From fee9d7fb66e1036c2295142d8a45e17e6404f568 Mon Sep 17 00:00:00 2001 From: Greg Lindsay Date: Tue, 17 Jul 2018 12:09:45 -0700 Subject: [PATCH 001/724] minor release --- windows/deployment/images/download.png | Bin 0 -> 4561 bytes windows/deployment/upgrade/setupdiag.md | 15 ++++++++++++--- 2 files changed, 12 insertions(+), 3 deletions(-) create mode 100644 windows/deployment/images/download.png diff --git a/windows/deployment/images/download.png b/windows/deployment/images/download.png new file mode 100644 index 0000000000000000000000000000000000000000..df12d22f7ad2540eb9cfc16370cef346d7891cf5 GIT binary patch literal 4561 zcmV;?5iahDP)Px#1ZP1_K>z@;j|==^1poj532;bRa{vGi!~g&e!~vBn4jTXf5oSq5K~#8N?OO?W z6-5%R+zGi85+H=!37{wjMLZBh!BrQZd5MAnJl5h~TOS z2p)K>h+J}q1VRYmOhWGa*#GaDc?^%2kZ3UZ-1$F;m)FzNU0qdwRdvtP$?NIlnv#kt z5ho|HV8O!ghqL}^!GeWGf<-C|78)51CskFAc3H4s!66z(Dv&8A#9g9sS;Vqn!7&;} zs*)=C{O)l1=Kctg;wrt-f&~j^G>lY8PNkJK>at+Lf@3s%PX#{J@E;2nEI35NNoB!; zg*su8sv$5=K5NcnrmoiK;OCzm)Z_WoWfP(Kkc!GJtvd56uNJAm)f^NLNB8q~5r16H z&Q9k?CJ@Qf-C51S&svGacIt+QMZ8LIQBTbQl*??xGTnyuYoY!qdpSOvi|mbrhW$*b zpi;Jsj}tF`1HY&QiD+HUXhJwe^yFFY}kB+w(z01gyq#X81?S)C7qOcGnwDqYAQ*`t-QW z`8rDr6d+j5tWN6Q&?QG?(Z<}S4VsOJ=CcYDr)PYZEsw7}AuD#lae1Crct;Mw!MEgWvfK!FF>W<8Qt$P~&1uemBN6!5C73QJ?+T zpXH3XT;-=xrWNY<4fzcivhsP%Yut7)t-3$;=1?1ljX8wbhJF)JqTQa`FWq9oRq`R4?&$Oo#<`+TYcyFXft$VT2q1k{PzcoWyJDh zGUw-9$;UV@D4A#9)>;N!8K{+fAeQs^y%IG&RTiO-%9x}#6w=by|t_w6(zF}3#R>0|cM72KxUrYPs{`cafo(Uj%v*Cp9$a)-{3j%%46IP? zO9o>;k^nlGep9GCdR36bw((Rlw+nKYq?=pGrw>NSvJsJTHwkDEix>3T2X{ToqbRl-6;S1U{AGf zTb}g4B2Yet)7oS5x|8w@qV%P3fK4DvIU;*GoZZJmi(xJk_ewR1#bv+LQ9QW$&`}5{ zV!tIQ%?8c4EC1k(&wzkQ*R@n%nGHsMa!hs~K$c<_=kVy0I;p+H2D?cPoG?h=ll4L= z`5o3)^?V2Q-3+IDw#od5qvgJ?{_+#{Hdnp8UpZ*b%nKzDL>+^w;gw}arRJT^s{iK9 zQn?g+Ap=~S$K$&dv9?T%mqh6K&7V%ms1J{5r5*^{yOW=+1sMoel&Mu&Wl}TuV)gx| zcQR!4hEtL`qoaiRxk(nXR7-u`Gr!M~v6!0}-6up|?Hj88Cd@A9Jt@6K zWLq&bT=n^ujt2CKL6kvO~lWFEX2P6SNt9U{IcS$TkP9h})?%x>|0Y?u515)fm%2P@*g(yz55 zR2g&^hK$_q#Z>V$$#NDzwn=dCZAUeIT!XB&YjljPe=J6v=u99{Qr}jJP^*&*CHRq@ z685~7>6aoaS0gBeJd0qcV;G#3`V(YlLpQ~ywUXcjgMt}>UM}K0d7pH7BTapG$J~RN zRqXU+1G31b!w8Z(I<-PDG`UJ8lQZl*d0jRLw^u^O?2*n0ti+gW^vnsp7=+^XzzzN0 z0uc=~lO(0!m{cHC?~cB*{fQW5D6_;~SR8%I2Hu17{DL~Y@5O!^8Gj2{wm1UXV}rG* zbp)A`1Q~#hJn`H&Ig*CRT98vNxXl*?ce54yo zB4FWGw3$xKCalIdnCG=0P8&?%MCL_TK&A_$Q4;BR@`Fq%MKu2Kt1Lxy;+76Rk_KYC z!r_(;kB|e?+Dq4PZO#agngQsqlogovO|~3G^goR3%+j}3Frs0+L}cIoD63Mk%T+Vi zc<8A(mDLA#_E&8*%Z$6iWn{Mi^*zKJYe107Vg;b%Ku(3E9RWc}NFDY0waf#{k4hm3 zx^+i^%36fVT(#K{x{C@teXz0@`?|9{4ojzcz=Xk28W3Wg5pdBtT*@w zN=gIDHuOzB^9}EcCy?8&~w z9;Q#6w=CG4Co7RXY=EN~W1Qe221{LxaYn$h2X9h2SpJGld6Ix^@q(UFnPH`khppVZ z66+pzS%5r(eJ9IiMRwjZiLI8UuiaRpG9NE=H`?rR)FiLbr^ZfjH4gt_mV=#=uGjax zKpCnETipim_?_iz>9g%+3bK59Zl#R*LbH_uZio4q1g8!-KR%ix9FqzTJ`cuv0t>tK z0w0+>1SJ)Tg+(Zbr#`4eWT@A$xgCfMm9#cXUSEqS-w4N|z9@6tyqu+7h`ancA>O9{ zajT$cWR1<4W$OEoL}V-y51a5Ii5hWKX#`Rf9xqe1er&M2+||Vo&y+|p-{Sx`B2#s0 z@i+JX#q ztZW0uNM^(aZpVI6xF5iO13PP3*db5`y>Lq_iN-ui&-ickK5b132rR$qrQrgQF8HAx z68PvYi5kCGJbB#CC7GN#G7v=6OT1J10m%g@TU8rupor=KgD4{d8t(Hw6S0v2&lH?k z64F-w2pltqww3-DYFT;YieuV=ib=gC2t@Z>u4UA9sYTKcrSxKCEgR5%$8k+pMB7*d z#8VYANYBE}4UQQ=#kX*lmsg)q8^sY2elqHR5{q0?K?#mLj;A+Q2dUb2+GkJ}BcaJ? z4T8zv)}vf1o7O>HkZrb4N{|f`J6k5cL@l z4m=Sn=@a5)I|9!75fSQ^A}Abv;+I+(%)Q7e+@FIgV$U-P@gNAJ`b+!QBy*u0(HS^?$>jxsbsI=sOLz&tu>L(w~f#_2c7YF#@`Q z-|BYf1CC6mfl?yUj78o09!eKR-P^7YRwrzykfCns5iBo(RLgee%flbQkr|&i@z z9Y<-Ai>S%#N9>p0`stJeOihtRJW$|?5G;@hr{D=;2FjX?T6-wc9D_r3d+VU2a6?R@ zz-hUM;{K-^QGjxi^dEpohO@6=8_P#H0)NTDOv3C&dH9U2q@knO_rd1==DCN|DHp$A z4`*=3`WO6?D?Mi&M2+e$eUP14+Fab)Q@kP5lyzBZT$L5zSSz>WNfJoFJ|y~Asm1c@ z4>?NaY*q%kgW3RD-`+Nt7`wkIUuI zIZr9murF)<9Om{w2M|`-4|AU^s#LzR7r|#Sbbjr;Lo#qK^um&teqz!mfA;kyeC*o; z8nK5a`pcljM{IV|j$n-b^#MFkekx8Lg#iMbES zqOpONa8RD;bme;_IM`VZ&`{8U^=PHQ;V2W!2u3zjX`w)cmsE=@HvQ~Y0cERx=JJz$ zba^#Gq9YxeV1K$HE#&78kTtaeO|X(xjrV_otYed?=6qrZ9vm!omdr5i(LHXHNSB`d0eGv3qfG3`fdTUSF- z*Zd&s*P~-(Gxly9QNkx8vyZ=4D=Wuh??03Kd6K^wKo2kH0F{nt(s5dZ;~ zer*v=MJR%b=lr}H%do!%oSRw5kqm~6b;)P+sV|KFwarNweQKMVZG7H5uklQ6W9o1< ze77Eb8-%*%2ibg)y~iRuE&WGZ8=<)8pNYM{{XVTJ(Xb!XBCY!%)qA_U$njH1!$vt_ z;m;40jJ?|XD4*YySt@ys_I&3PsFs{CA72#&csk2rl#aWxx31(VB+JLfB=_$`?W8i7 z4`!$`7dIR!lugZOaTXdG+=~(R8Sak)w;|l)(JwiDQ^|1-I8HSNp?Gm2=F4E3eLI`g z#eXdPDWMJH-CtZF_t>^zJXTids z6pl%S%oBh*^}#Cw)%%S4fWKUyzcEj;cnsZ4BZvhHe*|jZQ?aD0C!uU$TDAyf;r|@9 v*J&gNkIWl#S%k7+p`P!lELgBmPl)^vVh#pts|Zio00000NkvXXu0mjfU?ZM9 literal 0 HcmV?d00001 diff --git a/windows/deployment/upgrade/setupdiag.md b/windows/deployment/upgrade/setupdiag.md index 70e120e841..1d903718ab 100644 --- a/windows/deployment/upgrade/setupdiag.md +++ b/windows/deployment/upgrade/setupdiag.md @@ -18,13 +18,19 @@ ms.localizationpriority: high >[!NOTE] >This is a 300 level topic (moderate advanced).
->See [Resolve Windows 10 upgrade errors](resolve-windows-10-upgrade-errors.md) for a full list of topics in this article. +>See [Resolve Windows 10 upgrade errors](resolve-windows-10-upgrade-errors.md) for a full list of topics in this article.
-[SetupDiag.exe](https://go.microsoft.com/fwlink/?linkid=870142) is a standalone diagnostic tool that can be used to obtain details about why a Windows 10 upgrade was unsuccessful. +[![Download SetupDiag](../images/download.png)](https://go.microsoft.com/fwlink/?linkid=870142) + +## About SetupDiag + +Current version of SetupDiag: 1.3.1.0 + +SetupDiag is a standalone diagnostic tool that can be used to obtain details about why a Windows 10 upgrade was unsuccessful. SetupDiag works by examining Windows Setup log files. It attempts to parse these log files to determine the root cause of a failure to update or upgrade the computer to Windows 10. SetupDiag can be run on the computer that failed to update, or you can export logs from the computer to another location and run SetupDiag in offline mode. -See the [Release notes](#release-notes) section at the bottom of this topic for information about updates to this tool. +See the [Release notes](#release-notes) section at the bottom of this topic for information about the latest updates to this tool. ## Requirements @@ -356,6 +362,9 @@ Each rule name and its associated unique rule identifier are listed with a descr ## Release notes +07/16/2018 - SetupDiag v1.3.1 is released with 44 rules, as a standalone tool available from the Download Center. + - This release fixes a problem that can occur when running SetupDiag in online mode on a computer that produces a setupmem.dmp file, but does not have debugger binaries installed. + 07/10/2018 - SetupDiag v1.30 is released with 44 rules, as a standalone tool available from the Download Center. - Bug fix for an over-matched plug-in rule. The rule will now correctly match only critical (setup failure) plug-in issues. - New feature: Ability to output logs in JSON and XML format. From 120449d99eb48b25d368ab7e55d46563b4e01325 Mon Sep 17 00:00:00 2001 From: Greg Lindsay Date: Tue, 17 Jul 2018 13:35:49 -0700 Subject: [PATCH 002/724] minor release --- windows/deployment/images/download.png | Bin 4561 -> 5398 bytes windows/deployment/upgrade/setupdiag.md | 12 +++++++++++- 2 files changed, 11 insertions(+), 1 deletion(-) diff --git a/windows/deployment/images/download.png b/windows/deployment/images/download.png index df12d22f7ad2540eb9cfc16370cef346d7891cf5..266a2a196beb87cd5126018bfd3dea1bcd998439 100644 GIT binary patch delta 5396 zcmV+v73=EJBbF*5iBL{Q4GJ0x0000DNk~Le0002F0000g2nGNE0PkP=v5_G(e-x`p zL_t(|UhP^3d{kBT{@!FV=^=ptp+o3M??UJ*9YhciL}fumghgBn?7{*Hh=Rnzf}sc^ z5a~(@l2D`uf;2;iKoTGcg!DEuY5Sc!nf#)ETm$PL-TdAs*O~Y3efOSw&Ueav6D`?V zPyih|N-?y17MGQF0qn~%eC6R|B=wBAhDx-+EFAQ?O4F1&Oy&HV}5s{JCNWp7cOGfK!5mDu7-bX{(<}U`aeW>@dT3NGjQqH zL8RP?BjJtktyKrLTegGIXe<%Y4Mv-zh-3V2Iu&Abu7m4W@}q#4e+KpGK=~^A)kVX{ z+k;t+_{F0~vFNoCsNJG1-d(%F77QP;eYIT)4@q(#V3Lr0@F)x-$x9N+-MxYL z`}adq+)cI79IJ(7H_#9cG=vr1UKoc#Z%sxviTs8TTj1*H@iUS;y91#sRw8)uhbkE4t4@spAO&x%+K#$y zTHA>GA0PoG@a47n8QVVgicf9}`!Yt7Nc6^K>b-7@x6^2Z?Hzuc)8*iuxJJ ze%8+>_oPo`f6Et-Dulh?K33$4i%!7qr3*=ZFH~>b0=>siL66ZBP_s!Zj?FI`Z{L$c zp>9MDx$j6Pi8yo=fA7)|TNlov4jiEs>Q44Aa@h4)K)LKXQ`Z#DK1O7*&oBFzb*1Ig z;hb252yt8X8if9nXP{N@XBfeaaPjcKrnysadQTXve-x4!8;fsauIX>3_1)OgM2>V%KA9|dMwU{ z?!x7;f1^y_cTur!T~()MBxm68H>+{wSQsk!HH4G96XLI3$I(qexEmdf%JmyDx`1QW z;M{@zsL{MV&TyWH{d-}}w$j-=5WaN-Zv6Czfy&On_u{;1lxu}y9o z{Le?}QqJ9~|1hR?C*@Q!mjm~9p6gr=+s}QP@bcmfX#P}N)MUE%A2|Y^ z<*O)NQv_NcIJIjhE*w07w8Rwn*7H-P!sW0Nh}av9jKl;uxwyfcW#*o&@bs;UJ?t#cl4h{PF=ud7beJb!dlwsLOoTN(4R@k%p~_=bv1!gc zgnjcR(;-tLHDF{0*fQ4zuPpx#HCy^op=*$II~v~A{LpS_Z-nvsBuVN(ay02Re+1_A zRD>-37*5Wvcyi(-l57*AP91|+r7B2_zRo%Gs8A0aTDuf)Za&25W>6)kK%z-Loh0Q> zI#!M!f_ogF%koO&e+EXZ`u;ue{KBP5_JC*lBkD}JGOoxd=rQgcJn`DADmCx?>@yr# zwTKhuv+mD=XNAge_9&yqiB3d!e`0(=J`Gr{We3{@*IGPwAo{#96OEtfgj|+R6hS$8 zT+~ghcx5m$Q<7K~uge{$NZcbKLjxDUy=-|L4qAqLQIV9De+LBWro-?t z7%=s11{mdE3TBH18MGmnfm?Z3v}a~Mw0a58H8G$maUO82hb<xMZT%TFNe)I#NwdPJsrxTue9#`&zn;h@QLdgi%Jd|Me<+&)3+Ta;O1FPF z1*wce^*VIN+_N#5aXcE8>OY2S#}DH0y02B~QmH{ROx|_^fl;?GVdDXK_*B5j?}Cte z&y2fKcMuk|0xoo>VIMBXr_r%!*rg|OEo22Dk(r#x{guJT zk$3SNYvat!4DR1uwE_o&Dm}zGoOvx|6MIN1a8|E=3ec!WKP!}IT zXcrfJ|M^_FFmoRb`UZ(Hk#O@ai|L0W@xl4q%zR~FVxSUR+sdT}YX*B1{;ejp+qLj; zEFLjLML4OegbuPv2l7VJ+meybB9q}ck1V<094eBtPe>%jwMQ`_za`s3f$|yo@?d0L zcW%#4b?BvwBEM1X>JwK^Y*CULJQN1@*f1A-N4KQ!e4=)ih)z+<|X{CdzO( z&z-@Y>sMHsWTQrFe=vZks49+Gy+wPt_&C6~acwHoM@8o3_}i*ZEdu9FjLSznokcd; z<<)mojVXJ5tmiX4$eD2Ea40A?dQF{;+ZTVrinpgDfB2(+s6L527D>woLpfPK%bWVB z+r2AN7zI0ynXL9%KqdTAN7Bee_>Ucf@tcmouYFgghdkB^L2r#_*>no2NvTNS-rT&( z(TDS}ZE29o5GIx;ccZQ%i*jc2kgD{|b&~Jps;DXik?hM4WcjP3^X z`0I51xMeLqd2JHT@7X=F-?VPaVZqV~4^>$>lU{q+(+t?qJRMe`iUkEN)t}dE0%OU7-SAs&PVk=d!?w zO8_7L`B4uhqJj$__HgSAhIK%QJ1#O0p zqp@8W)qX0@woaz>4|T~(TwH3hjOx?~SAmP8zl`?5ziJMy`>*=(j=X)GGoL_#sa ze;|iV2%yHW+_`)G9zN~U7CUB7#?>QxSRPo_I?B+T(~^}=BWrMGG?L69kvflxkkUrY z!NI@Omt;jN$GQ9ZV90_67_)A_dR|ienH?LMEtx&J2O;qO#d8rn_iY?o8whJ=8sex2 z2|zNB9Yt%{^-s}6ooc_7QA8D??Q#e-e>zqHn`BIJZgrdEWoU$~XyoJEVWpIbh&V;4T}-v%L{%s@iqWi_Wj-p+_jQlf~y%diAxC8YGFUP%?= zm%1uRD{&;3TB??RJB(PqT@iiN>u)L#OpLjX)qm*?kBXHsI%p?7)m16wesf6Ue?J8W zrXQaDxRG4!p1%Z__HI+JqZ;)btRjLJHz|=W_S`9zIUHFECEScu9xZ9hn~~Ag*AYH` z^^txj77;twqioGOsM@w6Tv<;hv6hTEa~u`wH-=*w4<(ZwqW7Q4BgQMdF1%DkbSdYm zUcJd%gX`f3VPY_I;GyUi562SSe|;M@$Ho1@tPwNN?CDXMb~Fsn1qRs&&VDQBa4qM{ zuLVeny{UfqkvSylt8#_oB%9eYnv#bEkKkc)_ks^tZt>7U;uxIWcy^FlFkh8(8lBA9 z%@YN5vI(IVF^_5g{cBNp|8gWI?mfgv&pC@n6epvaH;2#5GeROc;Toy`e~e@X6OvgV z>nk-;t~{1PX-qqgEFn@85|GVF4Lr#^iL)2er6bEBC+;bY*=6&TsU+@2+nv<_wXM#mHOj8MGx$EX2y`;1a5>MU|`|=lu>jqj>928 z(^W~EL4+u2%c7C0w{L~PfB)Kyiy>RMunCceLs*NK!AtA**gQ`nZW>|&PszfPlds^VGDXaP^Ec$q~5s&Gi%ant^8Glk%&aDf7w7GM3&+_u*+wM zL?DfkxB1YQX>bb;F=B?y3&6I&&%)IM!78IP9WquqtCSwM&xT`XzzTddsvjNEtg@Vy z&(-Mol&WXb@7%`Lw_nD-fF%g|;BU&%Y8|y!F+EWRX(!ixfn|f*U=DQ@IItyBZbd1_ zsMBKrOr8eryA#Z*f5}+=d=CUK2t;VWax5A+2-glrsO;!kp%Qg!g(V{mp&w00E9foNLU(IG0fYi~kgfe>uH!R+<0g`epc*!EO7r zS5!8ZACy?GqhX(+%t-0vRVe%B;@hb+aAnUn*7nXy&qDGdU6rsI#Csm3Ni?d}xgGk> zTZN3fvFe@o$e{hoVSZY|Qd{*>I0bW&WqT{4l7`k$;`Z-En4}bF;W*#skHeChh|IfjsMw^n$~fgo_O#e& zq{YRcQVaIe@nmg@Mp^gbSqi1t$}hQRmnS<@IYL%a0x~(q!ssFars?oucw*WoEEl|S z{L7CKvGprdYTOD#mj}bGvN!7Y9fI0j`Xb@#IfSnYe?Xn?1JxlogC&%On{lb&hW-oJ z!PUzLkq5rV`Rzey`TXlhC26y{RxTr}T^4Clrj(_#S8vx%)!3|wSWy^w7_EbT^H-yW ze_N0PcyiW!G#N6QwZ9pMKA(l7OXo2-J8``#YQNrfYpZpv>8Us!^aalC{02@e3%gHU zsDe|>fAJp>bMgpU4u2JCw{OrcwwhQROrn92*`hLacWBXj?2ksZww*B`;7fI0$e}l6 zC*DOS^(GD@8ODJbraa~D^}z}}_1-M7a#V!0GRuiRGwW8`_+gZvUG^U3&Z zjwuk97lYKUvTu<~f~u@3^T^(0eu1p($N(&B$#*3e$5`k9YCb+Eb2w6V`7U~sJ{d2v z$TRl87m_jZDSM7PeH!0Sd4Xff;F)E+e^9Qrhgw@?wotz!vpg$$Q|sDMxW25TI8X?Y zQRI;4vJ!2365Gh9nwK(&F64W*yqctrq~C6H9;vW<#z(lcZH>x`PtIOYWV@0=`!uR# zB$vf4>FKzQvW|Pf)_&0Ad*qU;RLe2luL4Ecvxt&Y9n=$>nPpO z=ID`JM=3|~mq0pnluGF3ijGnbZJu7P=qTkV@q2O|I{sIoEsD`euA_8A3%se5Tu14K yw(_=4avh}`+S*v1w2kpP$#s-w0RINcd;qU9Rnav70000pA``G{QnRyJ4myl>M`P}(GhnLsW(_LLve^qtQ z)5+`UcW`P5|-q4|)C$}O!rfAcD@7OBA1 z925^n_w#lUe_YPaPUlA^5XsZsSV}6!yh?CUPt5_8%WT6k-G=sSq5dd) zIX;_`1HY&QiDiYmyqzIycY{=oP4c2jSvovI{(h04e6%B92FyDo zV2yqgV6+FJ(w~l(hyXXeQ9~w3A3ibp+%^HBI<@tZdoS~srQ7pCLfX>LM`Y2)+@=khjfm#63KOSie3vbcuRI|u zcENFhj-ej1;h{*4P>j?BiOABT2mt}ks7ei^#Na1OB3?$B#u9_y`3%8!b06bxzAjMX zVoZKF#x%hgQh`yQ{n(%7jJaIpr%|RA>h}%#4H&ZWdCY6ve|9jfxiP#d9cT96@8 zFQv+mC7H4&h2+qc$cM`u$i()O<+5XRv^?HD2wZ~sd7q%1l*7;uL7gg{=xzL4edqXS zGjwEHQ-S{c_Xmq*#PVY@=jU9>$2cx1nP=bDS_WJhsFi#mmh>XDHjyex}#6w=bf4#M=8Wkn82DOpy@!p!jl`}X= zzs`O#Z%A8N`)D-ohe?PZG6@}npi{uvp1rk|e1Yc&UK^|&uvWn7dPKEQe=7)VKNO|r?i}F-nX1JV8EN{kcItWJ(W?XG<$-NQ z@++j@ezdf2P4(m-B@xO#MALh zMybqOb3z_mbXfc+B%=(hQ0+?wV?L4qI+%V_s62XAki@p}R5G^}HgIEgY49 z_I(=yK5Huf5?@b~ZHHK6W4!!I`3TN&M<-uNM+p`+VXxXZBqzm7Ld!GDjABG&?{ToqbRl-6;S1U{AGfTb}g4B2Yet)7oS5x|8w@qV%P3fK4DvIU;*GoZZJm zi(xJk_ewR1#bv+LQ9QW$&`}5{V!tIQ%?8c4EC1k(&wzkQ*R@n%nGHsMa!hs~K$c<_ z=kVy0I;p+H2D?cPoG?h=ll4L=`5o3)fAxF^_1z4od$!5^hoj}buKw~9_BL0&yk9wJ z&dduX5JVk=s^OJoN2TVS&Z__B%u=}&dm#f{o5$n36|uHVjF&{{`OTkB$*2#HXr&$q z+PjmVtOXeeSCpw$S!Gf)_hR+^rgt)A^@dZDIisV5`MF6JvQ$fb-7~+>k+GPYe;C~- zL|*M1s{SU-F6TWdS&B=cQ_@O2j0hkcC*+*qK-P-iph5s@r= z;51XueBmn8FUwhjNITz1gRHe{ zbd0QjEJmE@OdwHG-&TrHtCI^Q_>r9w_Pmzqmm(`yBPfMDi(sf@7@U>*e-mV9LpQ~y zwUXcjgMt}>UM}K0d7pH7BTapG$J~RNRqXU+1G31b!w8Z(I<-PDG`UJ8lQZl*d0jRL zw^u^O?2*n0ti+gW^vnsp7=+^XzzzN00uc=~lO(0!m{cHC?~cB*{fQW5D6_;~SR8%I z2Hu17{DL~Y@5O!^8Gj2{f3`RR+GB&YsC5LHk^~umjXd$(H#w4q$Xbw7F5}mnRBe4p z0{GX5zvip&JwTqY7>z&+w`grW6MUo_OCn(5RAe~_91=&zI&nD$M! z97Xg$jO@(Pw^lHsVZ20S-~K48QnJfcGuL?NsW_F@2Y2>YZ8Xb_yTWB;w*d7$#2afs zkji2OpyNPJg`^z;K}kp*_4&2T1Iv#}Aqcv4M}f*(gvwmC*$}#m3Os$VvKRZhvpf$X zEZmwWPxlIzZIk0=fAu}5%TyBXGQI32#=U<;Dv^~&eWYcu<_5>4f?q^K2^Y2UMBN;9 z2C+&Jjcg`h8}5C0e}r5HhlvS-;!FgrH~0ujN(0I^^i4hU4eyF52y8hF1481K-kR9Q zNis%ul!?XMI{~hAJbZtDn?|6kBfaD{lwri^&rhh&J}CX@e~83Eo_?8}isc|l=5DIG z%!eohml*1!l~oE=kdtGesYs93Wmv>y?8&~w9;Q#6w=CG4Co7RXY=EN~W1Qe221{Lx zaYn$h2X9h2SpJGld6Ix^@q(UFnPH`khppVZ66+pzS%5r(eJ9IiMRwjZiLI8UuiaRp zG9NE=H`?rRf7B$e(Wk~va5WD9VU~lPlCIbHyg(VM3R~R<@c5nOYw5G?WeT!92b!z1y%Xb!N#yM?Y_=)!Aw7Z-QHxPG& zDdNX>z}#>IZ;TnltOk6UQUnLl_CBH0Qe@hK40Wt*1I9>Z#0GB1eo?p|z<&cfYgyPK zPzJqle@iQg#ym>T_;2+-ZA}UYEWhfd;R28@_@NyV_~g= zNxdZqME6{-Wz==4MbZzY^kQT!8_<2naZOi5f7@6D#8VYANYBE}4UQQ=#kX*lmsg)q z8^sY2elqHR5{q0?K?#mLj;A+Q2dUb2+GkJ}BcaJ?4T8zv)}vf1o7O>HkZrb4N{|f`5r+76EyEo|EICmotM+M`XW!TuS%)ioQoQ=k1AzjRekFP-ym3^dteldd z-aiqFxFE%|C>Mzv;=N^4QoI~}v4aHbna0JDWf1il5Dq*ME9n#BWIF=R`VkT8mLez| zed3o|8O*)ND%_ugDq_zw3Gzfw?BkfNf8gx95O9cp{jH7cq|6}E8l9XZ(&niNatv9+ z08ie{c)C|h`5yBZOg-J_qo1^6aaAb*55Q+ipYI^KlN01|?jeDt+Y4ka*Q_7d7~sL( z5tOb(Z)EjFCCEH8mn%Xa3=!ymwr8KHmc%1n68Ra zO_4=BP~eFWERYGO;0a*{%9@K>dnnQzgF|(D>!74?LrkK;X}O2u{-+vIfO3-bAAm@P zv#($q%SSi@f62j2!t6$Q_>8Tjf1#t;_rd1==DCN|DHp$A4`*=3`WO6?D?Mi&M2+e$ zeUP14+Fab)Q@kP5lyzBZT$L5zSSz>WNfJoFJ|y~Asm1c@4>?NaY*q%kgW3RD-`j)37gV{T$}@KnD<3 z*$;D{EUHw#vKPT;F?4?IyhAc@F7(2ZmwsZ>Cx7K)kuQT}0t6PMpbfunkf0U4LCK;O&=l(?n7R|Tc>k)~$56PmjftGMkp6GPtdn7p6 zSq{)p(1G=6rNH4R6UzujHdAS#K!ul7iz_z$>{bC~tA6J4lYMk~HA12z9h&70!B+x? z+?<;-FjJ6}Bo6lu1m7)j68k>X4ULIE{rue|KM(i0zhZ#lxGYWaf8mMmr6^a_8YmOx z!Wu{x7qnGzd_KoMTnERo2jz!s?vRNkRv~}-!~Vvc98-Tc=LwQg>=Mew;9+EC z_Qx0jxSv~q=h=+g>Rpzvi&RoS+zU|$yeKP(V!Tr5K0950+)*GtA#PHbg>|8-QR#-@ zOI!14A!Xt%&P^H2e|~1xCvAiMtWPk;q`ZV-C+eS|DRYpKL*22lE0Y^~1j(9VTBddy zxkCk&=79SBOo`5e1@D<0FC9X(a_m5Mxx`N0ciNau0UE@xA4RBZ4d)Y-gZ5X>X(xjr zV_otYed?=6qrZ9vm!omdr5i(LHXHNSB`d0eGv3qfG3`fde_K~WQP=z+>(`@WWHa_| z8&Se1BD0UbRx2yVV(&kb`+1VT89)y&=Kz(CXwq?7s(PVVfG8OI!hUTLO+_ezis$^i z8q2W11)Q5%$dL?&jCILp^r3>6$E%X%VCs`yRo;f(L+~d(NIek;faSk|6H3p%0e{mt^%V3&)JDb(Te=Phdp$;2x zHI*ZCUe3=$oTilH9B`beDy!v^2rt?C&uG1&e&{|YU4Bfh=l>{Y!NQ*uj!A{g6M#DP z!7BpQ`;7X4zg(ZcF;B914Bbp4hy@FO1Zv+?v81afp=@AUwg_e6{~Wc~X(R`a%o}o9 ngtB0vAD-{2ELgBmPl)^vVh#pts|Zio00000NkvXXu0mjfi>aoe diff --git a/windows/deployment/upgrade/setupdiag.md b/windows/deployment/upgrade/setupdiag.md index 1d903718ab..a9b454c671 100644 --- a/windows/deployment/upgrade/setupdiag.md +++ b/windows/deployment/upgrade/setupdiag.md @@ -20,7 +20,7 @@ ms.localizationpriority: high >This is a 300 level topic (moderate advanced).
>See [Resolve Windows 10 upgrade errors](resolve-windows-10-upgrade-errors.md) for a full list of topics in this article.
-[![Download SetupDiag](../images/download.png)](https://go.microsoft.com/fwlink/?linkid=870142) + [![Download SetupDiag](../images/download.png)](https://go.microsoft.com/fwlink/?linkid=870142) ## About SetupDiag @@ -30,6 +30,16 @@ SetupDiag is a standalone diagnostic tool that can be used to obtain details abo SetupDiag works by examining Windows Setup log files. It attempts to parse these log files to determine the root cause of a failure to update or upgrade the computer to Windows 10. SetupDiag can be run on the computer that failed to update, or you can export logs from the computer to another location and run SetupDiag in offline mode. +To quickly use SetupDiag on your current computer: +1. Click [Download SetupDiag](https://go.microsoft.com/fwlink/?linkid=870142). +2. If your web browser asks what to do with the file, choose **Save**. By default, the file will be saved to your **Downloads** folder. +3. When SetupDiag has finished downloading, open the **Downloads** folder. If you downloaded the file somewhere else, open that folder instead. +4. Double-click the SetupDiag file. Click **Yes** if you are asked to approve running the program. +5. A command window will open while SetupDiag diagnoses your computer. Wait for this to finish. +6. When SetupDiag finishes, two files will be created in the same folder where you double-clicked SetupDiag. One is a configuration file, the other is a log file. +7. Use Notepad or another text file viewer application to open the log file displaying the current date in the name (ex: SetupDiag_17-Jul-2018.log). +8. Review the information to discover if any rules were matched that can tell you why the computer failed to upgrade. For an example, see the [Text log sample](#text-log-sample) below. + See the [Release notes](#release-notes) section at the bottom of this topic for information about the latest updates to this tool. ## Requirements From 516a40ebb1f114654af4bceebee38a04b8da45c3 Mon Sep 17 00:00:00 2001 From: Greg Lindsay Date: Tue, 17 Jul 2018 16:26:09 -0700 Subject: [PATCH 003/724] update --- windows/deployment/upgrade/setupdiag.md | 10 +++++----- 1 file changed, 5 insertions(+), 5 deletions(-) diff --git a/windows/deployment/upgrade/setupdiag.md b/windows/deployment/upgrade/setupdiag.md index a9b454c671..11c041aa61 100644 --- a/windows/deployment/upgrade/setupdiag.md +++ b/windows/deployment/upgrade/setupdiag.md @@ -32,13 +32,13 @@ SetupDiag works by examining Windows Setup log files. It attempts to parse these To quickly use SetupDiag on your current computer: 1. Click [Download SetupDiag](https://go.microsoft.com/fwlink/?linkid=870142). -2. If your web browser asks what to do with the file, choose **Save**. By default, the file will be saved to your **Downloads** folder. -3. When SetupDiag has finished downloading, open the **Downloads** folder. If you downloaded the file somewhere else, open that folder instead. -4. Double-click the SetupDiag file. Click **Yes** if you are asked to approve running the program. +2. If your web browser asks what to do with the file, choose **Save**. By default, the file will be saved to your **Downloads** folder. You can also save it to a different location if desired by using **Save As**. +3. When SetupDiag has finished downloading, open the folder where you downloaded the file. As mentioned above, by default this is your **Downloads** folder which is displayed in File Explorer under **Quick access** in the left pane. +4. Double-click the SetupDiag file to run it. Click **Yes** if you are asked to approve running the program. 5. A command window will open while SetupDiag diagnoses your computer. Wait for this to finish. 6. When SetupDiag finishes, two files will be created in the same folder where you double-clicked SetupDiag. One is a configuration file, the other is a log file. -7. Use Notepad or another text file viewer application to open the log file displaying the current date in the name (ex: SetupDiag_17-Jul-2018.log). -8. Review the information to discover if any rules were matched that can tell you why the computer failed to upgrade. For an example, see the [Text log sample](#text-log-sample) below. +7. Use Notepad or another text file viewer application to open the log file (SetupDiagResults.log). +8. Review the information to discover if any rules were matched that can tell you why the computer failed to upgrade. See the [Text log sample](#text-log-sample) below. See the [Release notes](#release-notes) section at the bottom of this topic for information about the latest updates to this tool. From 8a6c0851ddeead8174c5ad4c0068dc45e958909d Mon Sep 17 00:00:00 2001 From: Greg Lindsay Date: Tue, 17 Jul 2018 16:28:10 -0700 Subject: [PATCH 004/724] update --- windows/deployment/upgrade/setupdiag.md | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/windows/deployment/upgrade/setupdiag.md b/windows/deployment/upgrade/setupdiag.md index 11c041aa61..0aae00a355 100644 --- a/windows/deployment/upgrade/setupdiag.md +++ b/windows/deployment/upgrade/setupdiag.md @@ -7,7 +7,7 @@ ms.mktglfcycl: deploy ms.sitesec: library ms.pagetype: deploy author: greg-lindsay -ms.date: 07/10/2018 +ms.date: 07/17/2018 ms.localizationpriority: high --- From eebf26a9081cde52a73de22e141561f71c1d40b2 Mon Sep 17 00:00:00 2001 From: Greg Lindsay Date: Tue, 17 Jul 2018 16:35:24 -0700 Subject: [PATCH 005/724] update --- windows/deployment/upgrade/setupdiag.md | 21 ++++++++++++--------- 1 file changed, 12 insertions(+), 9 deletions(-) diff --git a/windows/deployment/upgrade/setupdiag.md b/windows/deployment/upgrade/setupdiag.md index 0aae00a355..f1cadc868c 100644 --- a/windows/deployment/upgrade/setupdiag.md +++ b/windows/deployment/upgrade/setupdiag.md @@ -31,16 +31,19 @@ SetupDiag is a standalone diagnostic tool that can be used to obtain details abo SetupDiag works by examining Windows Setup log files. It attempts to parse these log files to determine the root cause of a failure to update or upgrade the computer to Windows 10. SetupDiag can be run on the computer that failed to update, or you can export logs from the computer to another location and run SetupDiag in offline mode. To quickly use SetupDiag on your current computer: -1. Click [Download SetupDiag](https://go.microsoft.com/fwlink/?linkid=870142). -2. If your web browser asks what to do with the file, choose **Save**. By default, the file will be saved to your **Downloads** folder. You can also save it to a different location if desired by using **Save As**. -3. When SetupDiag has finished downloading, open the folder where you downloaded the file. As mentioned above, by default this is your **Downloads** folder which is displayed in File Explorer under **Quick access** in the left pane. -4. Double-click the SetupDiag file to run it. Click **Yes** if you are asked to approve running the program. -5. A command window will open while SetupDiag diagnoses your computer. Wait for this to finish. -6. When SetupDiag finishes, two files will be created in the same folder where you double-clicked SetupDiag. One is a configuration file, the other is a log file. -7. Use Notepad or another text file viewer application to open the log file (SetupDiagResults.log). -8. Review the information to discover if any rules were matched that can tell you why the computer failed to upgrade. See the [Text log sample](#text-log-sample) below. +1. Verify that your system meets the [requirements](#requirements) described below. If needed, install the [.NET framework 4.6](https://www.microsoft.com/download/details.aspx?id=48137). +2. Click [Download SetupDiag](https://go.microsoft.com/fwlink/?linkid=870142). +3. If your web browser asks what to do with the file, choose **Save**. By default, the file will be saved to your **Downloads** folder. You can also save it to a different location if desired by using **Save As**. +4. When SetupDiag has finished downloading, open the folder where you downloaded the file. As mentioned above, by default this is your **Downloads** folder which is displayed in File Explorer under **Quick access** in the left pane. +5. Double-click the SetupDiag file to run it. Click **Yes** if you are asked to approve running the program. +6. A command window will open while SetupDiag diagnoses your computer. Wait for this to finish. +7. When SetupDiag finishes, two files will be created in the same folder where you double-clicked SetupDiag. One is a configuration file, the other is a log file. +8. Use Notepad to open the log file: **SetupDiagResults.log**. +9. Review the information that is displayed. If a rule was matched this can tell you why the computer failed to upgrade, and potentially how to fix the problem. See the [Text log sample](#text-log-sample) below. -See the [Release notes](#release-notes) section at the bottom of this topic for information about the latest updates to this tool. +For instructions on how to run the tool in offline more and with more advanced options, see the [Parameters](#parameters) section below. + +See the [Release notes](#release-notes) section at the bottom of this topic for information about recent updates to this tool. ## Requirements From 8d931f475c887f3519580b9474ac1c2fb899cade Mon Sep 17 00:00:00 2001 From: Greg Lindsay Date: Tue, 17 Jul 2018 16:43:48 -0700 Subject: [PATCH 006/724] update --- windows/deployment/upgrade/setupdiag.md | 11 ++++++----- 1 file changed, 6 insertions(+), 5 deletions(-) diff --git a/windows/deployment/upgrade/setupdiag.md b/windows/deployment/upgrade/setupdiag.md index f1cadc868c..640c908099 100644 --- a/windows/deployment/upgrade/setupdiag.md +++ b/windows/deployment/upgrade/setupdiag.md @@ -35,11 +35,12 @@ To quickly use SetupDiag on your current computer: 2. Click [Download SetupDiag](https://go.microsoft.com/fwlink/?linkid=870142). 3. If your web browser asks what to do with the file, choose **Save**. By default, the file will be saved to your **Downloads** folder. You can also save it to a different location if desired by using **Save As**. 4. When SetupDiag has finished downloading, open the folder where you downloaded the file. As mentioned above, by default this is your **Downloads** folder which is displayed in File Explorer under **Quick access** in the left pane. -5. Double-click the SetupDiag file to run it. Click **Yes** if you are asked to approve running the program. -6. A command window will open while SetupDiag diagnoses your computer. Wait for this to finish. -7. When SetupDiag finishes, two files will be created in the same folder where you double-clicked SetupDiag. One is a configuration file, the other is a log file. -8. Use Notepad to open the log file: **SetupDiagResults.log**. -9. Review the information that is displayed. If a rule was matched this can tell you why the computer failed to upgrade, and potentially how to fix the problem. See the [Text log sample](#text-log-sample) below. +5. Double-click the SetupDiag file to run it. Click **Yes** if you are asked to approve running the program. + >Double-clicking the file to run it will automatically close the command window when SetupDiag has completed its analysis. If you wish to keep this window open instead, and review the messages that you see, run the program by typing SetupDiag at the command prompt instead of double-clicking it. You will need to change directories to the location of SetupDiag to run it this way. +1. A command window will open while SetupDiag diagnoses your computer. Wait for this to finish. +2. When SetupDiag finishes, two files will be created in the same folder where you double-clicked SetupDiag. One is a configuration file, the other is a log file. +3. Use Notepad to open the log file: **SetupDiagResults.log**. +4. Review the information that is displayed. If a rule was matched this can tell you why the computer failed to upgrade, and potentially how to fix the problem. See the [Text log sample](#text-log-sample) below. For instructions on how to run the tool in offline more and with more advanced options, see the [Parameters](#parameters) section below. From fe4e7c76c681576bf8226083fc829015369d09d1 Mon Sep 17 00:00:00 2001 From: Greg Lindsay Date: Wed, 18 Jul 2018 11:16:06 -0700 Subject: [PATCH 007/724] update --- windows/deployment/upgrade/setupdiag.md | 22 +++++++++++----------- 1 file changed, 11 insertions(+), 11 deletions(-) diff --git a/windows/deployment/upgrade/setupdiag.md b/windows/deployment/upgrade/setupdiag.md index 640c908099..6e2f61c6a9 100644 --- a/windows/deployment/upgrade/setupdiag.md +++ b/windows/deployment/upgrade/setupdiag.md @@ -32,19 +32,19 @@ SetupDiag works by examining Windows Setup log files. It attempts to parse these To quickly use SetupDiag on your current computer: 1. Verify that your system meets the [requirements](#requirements) described below. If needed, install the [.NET framework 4.6](https://www.microsoft.com/download/details.aspx?id=48137). -2. Click [Download SetupDiag](https://go.microsoft.com/fwlink/?linkid=870142). +2. [Download SetupDiag](https://go.microsoft.com/fwlink/?linkid=870142). 3. If your web browser asks what to do with the file, choose **Save**. By default, the file will be saved to your **Downloads** folder. You can also save it to a different location if desired by using **Save As**. -4. When SetupDiag has finished downloading, open the folder where you downloaded the file. As mentioned above, by default this is your **Downloads** folder which is displayed in File Explorer under **Quick access** in the left pane. -5. Double-click the SetupDiag file to run it. Click **Yes** if you are asked to approve running the program. - >Double-clicking the file to run it will automatically close the command window when SetupDiag has completed its analysis. If you wish to keep this window open instead, and review the messages that you see, run the program by typing SetupDiag at the command prompt instead of double-clicking it. You will need to change directories to the location of SetupDiag to run it this way. -1. A command window will open while SetupDiag diagnoses your computer. Wait for this to finish. -2. When SetupDiag finishes, two files will be created in the same folder where you double-clicked SetupDiag. One is a configuration file, the other is a log file. -3. Use Notepad to open the log file: **SetupDiagResults.log**. -4. Review the information that is displayed. If a rule was matched this can tell you why the computer failed to upgrade, and potentially how to fix the problem. See the [Text log sample](#text-log-sample) below. +4. When SetupDiag has finished downloading, open the folder where you downloaded the file. As mentioned above, by default this is your **Downloads** folder which is displayed in File Explorer under **Quick access** in the left navigation pane. +5. Double-click the **SetupDiag** file to run it. Click **Yes** if you are asked to approve running the program. + - Double-clicking the file to run it will automatically close the command window when SetupDiag has completed its analysis. If you wish to keep this window open instead, and review the messages that you see, run the program by typing **SetupDiag** at the command prompt instead of double-clicking it. You will need to change directories to the location of SetupDiag to run it this way. +6. A command window will open while SetupDiag diagnoses your computer. Wait for this to finish. +7. When SetupDiag finishes, two files will be created in the same folder where you double-clicked SetupDiag. One is a configuration file, the other is a log file. +8. Use Notepad to open the log file: **SetupDiagResults.log**. +9. Review the information that is displayed. If a rule was matched this can tell you why the computer failed to upgrade, and potentially how to fix the problem. See the [Text log sample](#text-log-sample) below. -For instructions on how to run the tool in offline more and with more advanced options, see the [Parameters](#parameters) section below. +For instructions on how to run the tool in offline more and with more advanced options, see the [Parameters](#parameters) and [Examples](#examples) sections below. -See the [Release notes](#release-notes) section at the bottom of this topic for information about recent updates to this tool. +The [Release notes](#release-notes) section at the bottom of this topic has information about recent updates to this tool. ## Requirements @@ -63,7 +63,7 @@ See the [Release notes](#release-notes) section at the bottom of this topic for | /Output:\ |
  • This optional parameter enables you to specify the output file for results. This is where you will find what SetupDiag was able to determine. Only text format output is supported. UNC paths will work, provided the context under which SetupDiag runs has access to the UNC path. If the path has a space in it, you must enclose the entire path in double quotes (see the example section below).
  • Default: If not specified, SetupDiag will create the file **SetupDiagResults.log** in the same directory where SetupDiag.exe is run.
| | /Mode:\ |
  • This optional parameter allows you to specify the mode in which SetupDiag will operate: Offline or Online.
  • Offline: tells SetupDiag to run against a set of log files already captured from a failed system. In this mode you can run anywhere you have access to the log files. This mode does not require SetupDiag to be run on the computer that failed to update. When you specify offline mode, you must also specify the /LogsPath: parameter.
  • Online: tells SetupDiag that it is being run on the computer that failed to update. SetupDiag will attempt find log files and resources in standard Windows locations, such as the **%SystemDrive%\$Windows.~bt** directory for setup log files.
  • Log file search paths are configurable in the SetupDiag.exe.config file, under the SearchPath key. Search paths are comma separated. Note: A large number of search paths will extend the time required for SetupDiag to return results.
  • Default: If not specified, SetupDiag will run in Online mode.
| | /LogsPath:\ |
  • This optional parameter is required only when **/Mode:Offline** is specified. This tells SetupDiag.exe where to find the log files. These log files can be in a flat folder format, or containing multiple subdirectories. SetupDiag will recursively search all child directories. This parameter should be omitted when the **/Mode:Online** is specified.
| -| /ZipLogs:\ |
  • This optional parameter tells SetupDiag.exe to create a zip file continuing its results and all the log files it parsed. The zip file is created in the same directory where SetupDiag.exe is run.
  • Default: If not specified, a value of 'true' is used.
| +| /ZipLogs:\ |
  • This optional parameter tells SetupDiag.exe to create a zip file containing the results and all the log files it parsed. The zip file is created in the same directory where SetupDiag.exe is run.
  • Default: If not specified, a value of 'true' is used.
| | /Verbose |
  • This optional parameter will output much more data to the log file produced by SetupDiag.exe. By default SetupDiag will only produce a log file entry for serious errors. Using **/Verbose** will cause SetupDiag to always produce a log file with debugging details, which can be useful when reporting a problem with SetupDiag.
| | /Format:\ |
  • This optional parameter can be used to output log files in xml or JSON format. If this parameter is not specified, text format is used by default.
| From 503947c89d6170b4b889d4c0f85aeb027c0b409b Mon Sep 17 00:00:00 2001 From: Greg Lindsay Date: Wed, 18 Jul 2018 14:21:42 -0700 Subject: [PATCH 008/724] update --- windows/deployment/upgrade/setupdiag.md | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/windows/deployment/upgrade/setupdiag.md b/windows/deployment/upgrade/setupdiag.md index 90965a2bd0..3f9716261b 100644 --- a/windows/deployment/upgrade/setupdiag.md +++ b/windows/deployment/upgrade/setupdiag.md @@ -64,7 +64,7 @@ The [Release notes](#release-notes) section at the bottom of this topic has info | /Mode:\ |
  • This optional parameter allows you to specify the mode in which SetupDiag will operate: Offline or Online.
  • Offline: tells SetupDiag to run against a set of log files already captured from a failed system. In this mode you can run anywhere you have access to the log files. This mode does not require SetupDiag to be run on the computer that failed to update. When you specify offline mode, you must also specify the /LogsPath: parameter.
  • Online: tells SetupDiag that it is being run on the computer that failed to update. SetupDiag will attempt find log files and resources in standard Windows locations, such as the **%SystemDrive%\$Windows.~bt** directory for setup log files.
  • Log file search paths are configurable in the SetupDiag.exe.config file, under the SearchPath key. Search paths are comma separated. Note: A large number of search paths will extend the time required for SetupDiag to return results.
  • Default: If not specified, SetupDiag will run in Online mode.
| | /LogsPath:\ |
  • This optional parameter is required only when **/Mode:Offline** is specified. This tells SetupDiag.exe where to find the log files. These log files can be in a flat folder format, or containing multiple subdirectories. SetupDiag will recursively search all child directories. This parameter should be omitted when the **/Mode:Online** is specified.
| | /ZipLogs:\ |
  • This optional parameter tells SetupDiag.exe to create a zip file containing the results and all the log files it parsed. The zip file is created in the same directory where SetupDiag.exe is run.
  • Default: If not specified, a value of 'true' is used.
| -| /Verbose |
  • This optional parameter will output much more data to the log file produced by SetupDiag.exe. By default SetupDiag will only produce a log file entry for serious errors. Using **/Verbose** will cause SetupDiag to always produce a log file with debugging details, which can be useful when reporting a problem with SetupDiag.
| +| /Verbose |
  • This optional parameter will output much more data to a log file. By default SetupDiag will only produce a log file entry for serious errors. Using **/Verbose** will cause SetupDiag to always produce an additional log file with debugging details. These details can be useful when reporting a problem with SetupDiag.
| | /Format:\ |
  • This optional parameter can be used to output log files in xml or JSON format. If this parameter is not specified, text format is used by default.
| ### Examples: From f354a053804c92d22f20a38eeb1f15db23f94760 Mon Sep 17 00:00:00 2001 From: Greg Lindsay Date: Fri, 14 Dec 2018 15:03:18 -0800 Subject: [PATCH 009/724] 1.4.0.0 --- windows/deployment/upgrade/setupdiag.md | 23 +++++++++++++++++------ 1 file changed, 17 insertions(+), 6 deletions(-) diff --git a/windows/deployment/upgrade/setupdiag.md b/windows/deployment/upgrade/setupdiag.md index 893d357f79..794be7b222 100644 --- a/windows/deployment/upgrade/setupdiag.md +++ b/windows/deployment/upgrade/setupdiag.md @@ -7,7 +7,7 @@ ms.mktglfcycl: deploy ms.sitesec: library ms.pagetype: deploy author: greg-lindsay -ms.date: 08/16/2018 +ms.date: 12/14/2018 ms.localizationpriority: medium --- @@ -24,7 +24,7 @@ ms.localizationpriority: medium ## About SetupDiag -Current version of SetupDiag: 1.3.1.0 +Current version of SetupDiag: 1.4.0.0 SetupDiag is a standalone diagnostic tool that can be used to obtain details about why a Windows 10 upgrade was unsuccessful. @@ -61,11 +61,14 @@ The [Release notes](#release-notes) section at the bottom of this topic has info | --- | --- | | /? |
  • Displays interactive help
| | /Output:\ |
  • This optional parameter enables you to specify the output file for results. This is where you will find what SetupDiag was able to determine. Only text format output is supported. UNC paths will work, provided the context under which SetupDiag runs has access to the UNC path. If the path has a space in it, you must enclose the entire path in double quotes (see the example section below).
  • Default: If not specified, SetupDiag will create the file **SetupDiagResults.log** in the same directory where SetupDiag.exe is run.
| -| /Mode:\ |
  • This optional parameter allows you to specify the mode in which SetupDiag will operate: Offline or Online.
  • Offline: tells SetupDiag to run against a set of log files already captured from a failed system. In this mode you can run anywhere you have access to the log files. This mode does not require SetupDiag to be run on the computer that failed to update. When you specify offline mode, you must also specify the /LogsPath: parameter.
  • Online: tells SetupDiag that it is being run on the computer that failed to update. SetupDiag will attempt find log files and resources in standard Windows locations, such as the **%SystemDrive%\$Windows.~bt** directory for setup log files.
  • Log file search paths are configurable in the SetupDiag.exe.config file, under the SearchPath key. Search paths are comma separated. Note: A large number of search paths will extend the time required for SetupDiag to return results.
  • Default: If not specified, SetupDiag will run in Online mode.
| | /LogsPath:\ |
  • This optional parameter is required only when **/Mode:Offline** is specified. This tells SetupDiag.exe where to find the log files. These log files can be in a flat folder format, or containing multiple subdirectories. SetupDiag will recursively search all child directories. This parameter should be omitted when the **/Mode:Online** is specified.
| | /ZipLogs:\ |
  • This optional parameter tells SetupDiag.exe to create a zip file containing the results and all the log files it parsed. The zip file is created in the same directory where SetupDiag.exe is run.
  • Default: If not specified, a value of 'true' is used.
| | /Verbose |
  • This optional parameter will output much more data to a log file. By default, SetupDiag will only produce a log file entry for serious errors. Using **/Verbose** will cause SetupDiag to always produce an additional log file with debugging details. These details can be useful when reporting a problem with SetupDiag.
| | /Format:\ |
  • This optional parameter can be used to output log files in xml or JSON format. If this parameter is not specified, text format is used by default.
| +| /NoTel |
  • This optional parameter tells SetupDiag.exe not to send diagnostic telemetry to Microsoft.
| + +Note: The **/Mode** parameter is deprecated in version 1.4.0.0 of SetupDiag. +- In previous versions, this command was used with the LogsPath parameter to specify that SetupDiag should run in an offline manner to analyze a set of log files that were captured from a different computer. In version 1.4.0.0 when you specify /LogsPath then SetupDiag will automatically run in offline mode, therefore the /Mode parameter is not needed. ### Examples: @@ -75,10 +78,10 @@ In the following example, SetupDiag is run with default parameters (online mode, SetupDiag.exe ``` -In the following example, SetupDiag is specified to run in Online mode (this is the default). It will know where to look for logs on the current (failing) system, so there is no need to gather logs ahead of time. A custom location for results is specified. +In the following example, SetupDiag is run in online mode (this is the default). It will know where to look for logs on the current (failing) system, so there is no need to gather logs ahead of time. A custom location for results is specified. ``` -SetupDiag.exe /Output:C:\SetupDiag\Results.log /Mode:Online +SetupDiag.exe /Output:C:\SetupDiag\Results.log ``` The following example uses the /Output parameter to save results to a path name that contains a space: @@ -90,7 +93,7 @@ SetupDiag /Output:"C:\Tools\SetupDiag\SetupDiag Results\Results.log" The following example specifies that SetupDiag is to run in offline mode, and to process the log files found in **D:\Temp\Logs\LogSet1**. ``` -SetupDiag.exe /Output:C:\SetupDiag\Results.log /Mode:Offline /LogsPath:D:\Temp\Logs\LogSet1 +SetupDiag.exe /Output:C:\SetupDiag\Results.log /LogsPath:D:\Temp\Logs\LogSet1 ``` ## Log files @@ -375,6 +378,14 @@ Each rule name and its associated unique rule identifier are listed with a descr ## Release notes +12/16/2018 - SetupDiag v1.4.0.0 is released with 44 rules, as a standalone tool available from the Download Center. + - This release includes major improvements in rule processing performance: about 3x faster in processing rules! + - The FindDownlevelFailure rule is up to 10x faster. + - New rules have been added to analyze failures upgrading to Windows 10 version 1809. + - A new help link is available for resolving servicing stack failures on the down-level OS when the rule match indicates this type of failure. + - Removed the need to specify /Mode parameter. Now if you specify /LogsPath, it automatically assumes offline mode. + - A few other minor improvements were made in specific rules. + 07/16/2018 - SetupDiag v1.3.1 is released with 44 rules, as a standalone tool available from the Download Center. - This release fixes a problem that can occur when running SetupDiag in online mode on a computer that produces a setupmem.dmp file, but does not have debugger binaries installed. From 34d4a6bdc7c5826fc472899cce7a1698fb0c2ba8 Mon Sep 17 00:00:00 2001 From: Greg Lindsay Date: Tue, 18 Dec 2018 12:01:44 -0800 Subject: [PATCH 010/724] setupdiag 1.4 --- windows/deployment/upgrade/setupdiag.md | 30 ++++++++++++++++++++----- 1 file changed, 24 insertions(+), 6 deletions(-) diff --git a/windows/deployment/upgrade/setupdiag.md b/windows/deployment/upgrade/setupdiag.md index 794be7b222..b3f10c8d57 100644 --- a/windows/deployment/upgrade/setupdiag.md +++ b/windows/deployment/upgrade/setupdiag.md @@ -7,7 +7,7 @@ ms.mktglfcycl: deploy ms.sitesec: library ms.pagetype: deploy author: greg-lindsay -ms.date: 12/14/2018 +ms.date: 12/18/2018 ms.localizationpriority: medium --- @@ -368,23 +368,41 @@ Each rule name and its associated unique rule identifier are listed with a descr 40. UpdateAgentExpanderFailure – 66E496B3-7D19-47FA-B19B-4040B9FD17E2 - Matches DPX expander failures in the down-level phase of update from WU. Will output the package name, function, expression and error code. 41. FindFatalPluginFailure – E48E3F1C-26F6-4AFB-859B-BF637DA49636 - - Matches any plug in failure that setupplatform decides is fatal to setup. Will output the plugin name, operation and error code. + - Matches any plug-in failure that setupplatform decides is fatal to setup. Will output the plugin name, operation and error code. 42. AdvancedInstallerFailed - 77D36C96-32BE-42A2-BB9C-AAFFE64FCADC - Indicates critical failure in the AdvancedInstaller while running an installer package, includes the .exe being called, the phase, mode, component and error codes. 43. MigrationAbortedDueToPluginFailure - D07A24F6-5B25-474E-B516-A730085940C9 - - Indicates a critical failure in a migration plugin that causes setup to abort the migration. Will provide the setup operation, plug in name, plug in action and error code. + - Indicates a critical failure in a migration plugin that causes setup to abort the migration. Will provide the setup operation, plug-in name, plug-in action and error code. 44. DISMAddPackageFailed - 6196FF5B-E69E-4117-9EC6-9C1EAB20A3B9 - Indicates a critical failure during a DISM add package operation. Will specify the Package Name, DISM error and add package error code. +45. PlugInComplianceBlock - D912150B-1302-4860-91B5-527907D08960 + - Detects all compat blocks from Server compliance plug-ins. Outputs the block information and remediation. +46. AdvancedInstallerGenericFailure - 4019550D-4CAA-45B0-A222-349C48E86F71 + - Triggers on advanced installer failures in a generic sense, outputting the application called, phase, mode, component and error code. +47. FindMigGatherApplyFailure - A9964E6C-A2A8-45FF-B6B5-25E0BD71428E + - Shows errors when the migration Engine fails out on a gather or apply operation. Indicates the Migration Object (file or registry path), the Migration +48. OptionalComponentFailedToGetOCsFromPackage - D012E2A2-99D8-4A8C-BBB2-088B92083D78 + - Indicates the optional component (OC) migration operation failed to enumerate optional components from an OC Package. Outputs the package name and error code. +49. OptionalComponentOpenPackageFailed - 22952520-EC89-4FBD-94E0-B67DF88347F6 + - Indicates the optional component migration operation failed to open an optional component Package. Outputs the package name and error code. +50. OptionalComponentInitCBSSessionFailed - 63340812-9252-45F3-A0F2-B2A4CA5E9317 + - Indicates corruption in the servicing stack on the down-level system. Outputs the error code encountered while trying to initialize the servicing component on the existing OS. +51. DISMproviderFailure - D76EF86F-B3F8-433F-9EBF-B4411F8141F4 + - Triggers when a DISM provider (plug-in) fails in a critical operation. Outputs the file (plug-in name), function called + error code, and error message from the provider. +52. SysPrepLaunchModuleFailure - 7905655C-F295-45F7-8873-81D6F9149BFD + - Indicates a sysPrep plug-in has failed in a critical operation. Indicates the plug-in name, operation name and error code. +53. UserProvidedDriverInjectionFailure - 2247C48A-7EE3-4037-AFAB-95B92DE1D980 + - A driver provided to setup (via command line input) has failed in some way. Outputs the driver install function and error code. ## Release notes -12/16/2018 - SetupDiag v1.4.0.0 is released with 44 rules, as a standalone tool available from the Download Center. - - This release includes major improvements in rule processing performance: about 3x faster in processing rules! +12/18/2018 - SetupDiag v1.4.0.0 is released with 53 rules, as a standalone tool available from the Download Center. + - This release includes major improvements in rule processing performance: ~3x faster rule processing performance! - The FindDownlevelFailure rule is up to 10x faster. - New rules have been added to analyze failures upgrading to Windows 10 version 1809. - A new help link is available for resolving servicing stack failures on the down-level OS when the rule match indicates this type of failure. - Removed the need to specify /Mode parameter. Now if you specify /LogsPath, it automatically assumes offline mode. - - A few other minor improvements were made in specific rules. + - Some functional and output improvements were made for several rules. 07/16/2018 - SetupDiag v1.3.1 is released with 44 rules, as a standalone tool available from the Download Center. - This release fixes a problem that can occur when running SetupDiag in online mode on a computer that produces a setupmem.dmp file, but does not have debugger binaries installed. From c84b6501db90326c7903f884d29561b69115a21d Mon Sep 17 00:00:00 2001 From: Greg Lindsay Date: Tue, 18 Dec 2018 12:11:04 -0800 Subject: [PATCH 011/724] setupdiag 1.4 --- windows/deployment/deploy-whats-new.md | 12 +++++++++++- 1 file changed, 11 insertions(+), 1 deletion(-) diff --git a/windows/deployment/deploy-whats-new.md b/windows/deployment/deploy-whats-new.md index 4e9ee7e411..a0d7f4cfa8 100644 --- a/windows/deployment/deploy-whats-new.md +++ b/windows/deployment/deploy-whats-new.md @@ -7,7 +7,7 @@ ms.localizationpriority: medium ms.prod: w10 ms.sitesec: library ms.pagetype: deploy -ms.date: 12/07/2018 +ms.date: 12/18/2018 author: greg-lindsay --- @@ -23,6 +23,10 @@ This topic provides an overview of new solutions and online content related to d - For an all-up overview of new features in Windows 10, see [What's new in Windows 10](https://technet.microsoft.com/itpro/windows/whats-new/index). - For a detailed list of changes to Windows 10 ITPro TechNet library content, see [Online content change history](#online-content-change-history). +## Recent additions to this page + +[SetupDiag](#setupdiag) 1.4 is released. + ## The Modern Desktop Deployment Center The [Modern Desktop Deployment Center](https://docs.microsoft.com/microsoft-365/enterprise/desktop-deployment-center-home) has launched with tons of content to help you with large-scale deployment of Windows 10 and Office 365 ProPlus. @@ -56,6 +60,12 @@ Windows Autopilot streamlines and automates the process of setting up and config Windows Autopilot joins devices to Azure Active Directory (Azure AD), optionally enrolls into MDM services, configures security policies, and sets a custom out-of-box-experience (OOBE) for the end user. For more information, see [Overview of Windows Autopilot](windows-autopilot/windows-autopilot.md). +### SetupDiag + +[SetupDiag](upgrade/setupdiag.md) is a standalone diagnostic tool that can be used to obtain details about why a Windows 10 upgrade was unsuccessful. + +SetupDiag version 1.4 was released on 12/18/2018. + ### Upgrade Readiness The Upgrade Readiness tool moved from public preview to general availability on March 2, 2017. From fd152689337b3356a230b029a538d61deb6f1989 Mon Sep 17 00:00:00 2001 From: Greg Lindsay Date: Tue, 18 Dec 2018 12:35:22 -0800 Subject: [PATCH 012/724] removed references to /mode --- windows/deployment/upgrade/setupdiag.md | 8 ++++---- 1 file changed, 4 insertions(+), 4 deletions(-) diff --git a/windows/deployment/upgrade/setupdiag.md b/windows/deployment/upgrade/setupdiag.md index b3f10c8d57..2382a0a80a 100644 --- a/windows/deployment/upgrade/setupdiag.md +++ b/windows/deployment/upgrade/setupdiag.md @@ -61,7 +61,7 @@ The [Release notes](#release-notes) section at the bottom of this topic has info | --- | --- | | /? |
  • Displays interactive help
| | /Output:\ |
  • This optional parameter enables you to specify the output file for results. This is where you will find what SetupDiag was able to determine. Only text format output is supported. UNC paths will work, provided the context under which SetupDiag runs has access to the UNC path. If the path has a space in it, you must enclose the entire path in double quotes (see the example section below).
  • Default: If not specified, SetupDiag will create the file **SetupDiagResults.log** in the same directory where SetupDiag.exe is run.
| -| /LogsPath:\ |
  • This optional parameter is required only when **/Mode:Offline** is specified. This tells SetupDiag.exe where to find the log files. These log files can be in a flat folder format, or containing multiple subdirectories. SetupDiag will recursively search all child directories. This parameter should be omitted when the **/Mode:Online** is specified.
| +| /LogsPath:\ |
  • This optional parameter tells SetupDiag.exe where to find the log files for an offline analysis. These log files can be in a flat folder format, or containing multiple subdirectories. SetupDiag will recursively search all child directories.
| | /ZipLogs:\ |
  • This optional parameter tells SetupDiag.exe to create a zip file containing the results and all the log files it parsed. The zip file is created in the same directory where SetupDiag.exe is run.
  • Default: If not specified, a value of 'true' is used.
| | /Verbose |
  • This optional parameter will output much more data to a log file. By default, SetupDiag will only produce a log file entry for serious errors. Using **/Verbose** will cause SetupDiag to always produce an additional log file with debugging details. These details can be useful when reporting a problem with SetupDiag.
| | /Format:\ |
  • This optional parameter can be used to output log files in xml or JSON format. If this parameter is not specified, text format is used by default.
| @@ -114,7 +114,7 @@ When Microsoft Windows encounters a condition that compromises safe system opera If crash dumps [are enabled](https://docs.microsoft.com/windows-hardware/drivers/debugger/enabling-a-kernel-mode-dump-file) on the system, a crash dump file is created. If the bug check occurs during an upgrade, Windows Setup will extract a minidump (setupmem.dmp) file. SetupDiag can also debug these setup related minidumps. To debug a setup related bug check, you must: -- Specify the **/Mode:Offline** and **/LogsPath** parameters. You cannot debug memory dumps in online mode. +- Specify the **/LogsPath** parameter. You cannot debug memory dumps in online mode. - Gather the setup memory dump file (setupmem.dmp) from the failing system. - Setupmem.dmp will be created in either **%SystemDrive%\$Windows.~bt\Sources\Rollback**, or in **%WinDir%\Panther\NewOS\Rollback** depending on when the bug check occurs. - Install the [Windows Debugging Tools](https://docs.microsoft.com/windows-hardware/drivers/debugger/debugger-download-tools) on the computer that runs SetupDiag. @@ -122,7 +122,7 @@ To debug a setup related bug check, you must: In the following example, the **setupmem.dmp** file is copied to the **D:\Dump** directory and the Windows Debugging Tools are installed prior to running SetupDiag: ``` -SetupDiag.exe /Output:C:\SetupDiag\Dumpdebug.log /Mode:Offline /LogsPath:D:\Dump +SetupDiag.exe /Output:C:\SetupDiag\Dumpdebug.log /LogsPath:D:\Dump ``` ## Known issues @@ -138,7 +138,7 @@ The following is an example where SetupDiag is run in offline mode. In this exam The output also provides an error code 0xC1900208 - 0x4000C which corresponds to a compatibility issue as documented in the [Upgrade error codes](upgrade-error-codes.md#result-codes) and [Resolution procedures](resolution-procedures.md#modern-setup-errors) topics in this article. ``` -C:\SetupDiag>SetupDiag.exe /Output:C:\SetupDiag\Results.log /Mode:Offline /LogsPath:C:\Temp\BobMacNeill +C:\SetupDiag>SetupDiag.exe /Output:C:\SetupDiag\Results.log /LogsPath:C:\Temp\BobMacNeill SetupDiag v1.01 Copyright (c) Microsoft Corporation. All rights reserved From f9df450acf6cad167da362ea4cbd1354918f4123 Mon Sep 17 00:00:00 2001 From: Greg Lindsay Date: Tue, 18 Dec 2018 13:02:23 -0800 Subject: [PATCH 013/724] updated one line --- windows/deployment/upgrade/setupdiag.md | 4 ++-- 1 file changed, 2 insertions(+), 2 deletions(-) diff --git a/windows/deployment/upgrade/setupdiag.md b/windows/deployment/upgrade/setupdiag.md index 2382a0a80a..53856948d2 100644 --- a/windows/deployment/upgrade/setupdiag.md +++ b/windows/deployment/upgrade/setupdiag.md @@ -140,8 +140,8 @@ The output also provides an error code 0xC1900208 - 0x4000C which corresponds to ``` C:\SetupDiag>SetupDiag.exe /Output:C:\SetupDiag\Results.log /LogsPath:C:\Temp\BobMacNeill -SetupDiag v1.01 -Copyright (c) Microsoft Corporation. All rights reserved +SetupDiag v1.4.0.0 +Copyright (c) Microsoft Corporation. All rights reserved. Searching for setup logs, this can take a minute or more depending on the number and size of the logs...please wait. Found 4 setupact.logs. From 62db25d6d14b27096fe717308a0aa38f44f52c5d Mon Sep 17 00:00:00 2001 From: Brian Lich Date: Thu, 17 Jan 2019 09:05:51 -0800 Subject: [PATCH 014/724] new build 011719 --- windows/privacy/TOC.md | 1 + ...ndows-diagnostic-events-and-fields-19H1.md | 5817 +++++++++++++++++ 2 files changed, 5818 insertions(+) create mode 100644 windows/privacy/basic-level-windows-diagnostic-events-and-fields-19H1.md diff --git a/windows/privacy/TOC.md b/windows/privacy/TOC.md index 35561d07af..e2a139c80d 100644 --- a/windows/privacy/TOC.md +++ b/windows/privacy/TOC.md @@ -7,6 +7,7 @@ ### [Diagnostic Data Viewer Overview](diagnostic-data-viewer-overview.md) ### [Diagnostic Data Viewer for PowerShell Overview](Microsoft-DiagnosticDataViewer.md) ## Basic level Windows diagnostic data events and fields +### [Windows 10, version 19H1 basic level Windows diagnostic events and fields](basic-level-windows-diagnostic-events-and-fields-19H1.md) ### [Windows 10, version 1809 basic level Windows diagnostic events and fields](basic-level-windows-diagnostic-events-and-fields-1809.md) ### [Windows 10, version 1803 basic level Windows diagnostic events and fields](basic-level-windows-diagnostic-events-and-fields-1803.md) ### [Windows 10, version 1709 basic level Windows diagnostic events and fields](basic-level-windows-diagnostic-events-and-fields-1709.md) diff --git a/windows/privacy/basic-level-windows-diagnostic-events-and-fields-19H1.md b/windows/privacy/basic-level-windows-diagnostic-events-and-fields-19H1.md new file mode 100644 index 0000000000..da9e5f277e --- /dev/null +++ b/windows/privacy/basic-level-windows-diagnostic-events-and-fields-19H1.md @@ -0,0 +1,5817 @@ +--- +description: Use this article to learn more about what Windows diagnostic data is gathered at the basic level. +title: Windows 10, version 19H1 basic diagnostic events and fields (Windows 10) +keywords: privacy, telemetry +ms.prod: w10 +ms.mktglfcycl: manage +ms.sitesec: library +ms.pagetype: security +localizationpriority: high +author: brianlic-msft +ms.author: brianlic +ms.date: 01/17/2019 +--- + + +# Windows 10, version 19H1 basic level Windows diagnostic events and fields + + +> [!IMPORTANT] +> Some information relates to prereleased product which may be substantially modified before it's commercially released. Microsoft makes no warranties, express or implied, with respect to the information provided here. + + + **Applies to** + +- Windows 10, version 19H1 + + +The Basic level gathers a limited set of information that is critical for understanding the device and its configuration including: basic device information, quality-related information, app compatibility, and Microsoft Store. When the level is set to Basic, it also includes the Security level information. + +The Basic level helps to identify problems that can occur on a particular device hardware or software configuration. For example, it can help determine if crashes are more frequent on devices with a specific amount of memory or that are running a particular driver version. This helps Microsoft fix operating system or app problems. + +Use this article to learn about diagnostic events, grouped by event area, and the fields within each event. A brief description is provided for each field. Every event generated includes common data, which collects device data. + +You can learn more about Windows functional and diagnostic data through these articles: + + +- [Windows 10, version 1809 basic diagnostic events and fields](basic-level-windows-diagnostic-events-and-fields-1809.md) +- [Windows 10, version 1803 basic diagnostic events and fields](basic-level-windows-diagnostic-events-and-fields-1803.md) +- [Windows 10, version 1709 basic diagnostic events and fields](basic-level-windows-diagnostic-events-and-fields-1709.md) +- [Windows 10, version 1703 basic diagnostic events and fields](basic-level-windows-diagnostic-events-and-fields-1703.md) +- [Manage connections from Windows operating system components to Microsoft services](manage-connections-from-windows-operating-system-components-to-microsoft-services.md) +- [Configure Windows diagnostic data in your organization](configure-windows-diagnostic-data-in-your-organization.md) + + + + +## AppLocker events + +### Microsoft.Windows.Security.AppLockerCSP.AddParams + +Parameters passed to Add function of the AppLockerCSP Node. + +The following fields are available: + +- **child** The child URI of the node to add. +- **uri** URI of the node relative to %SYSTEM32%/AppLocker. + + +### Microsoft.Windows.Security.AppLockerCSP.AddStart + +Start of "Add" Operation for the AppLockerCSP Node. + + + +### Microsoft.Windows.Security.AppLockerCSP.AddStop + +End of "Add" Operation for AppLockerCSP Node. + +The following fields are available: + +- **hr** The HRESULT returned by Add function in AppLockerCSP. + + +### Microsoft.Windows.Security.AppLockerCSP.CAppLockerCSP::Commit + +No content is currently available. + +The following fields are available: + +- **oldId** No content is currently available. +- **txId** No content is currently available. + + +### Microsoft.Windows.Security.AppLockerCSP.ClearParams + +Parameters passed to the "Clear" operation for AppLockerCSP. + +The following fields are available: + +- **uri** The URI relative to the %SYSTEM32%\AppLocker folder. + + +### Microsoft.Windows.Security.AppLockerCSP.ConfigManagerNotificationStart + +Start of the "ConfigManagerNotification" operation for AppLockerCSP. + +The following fields are available: + +- **NotifyState** State sent by ConfigManager to AppLockerCSP. + + +### Microsoft.Windows.Security.AppLockerCSP.ConfigManagerNotificationStop + +End of the "ConfigManagerNotification" operation for AppLockerCSP. + +The following fields are available: + +- **hr** HRESULT returned by the ConfigManagerNotification function in AppLockerCSP. + + +### Microsoft.Windows.Security.AppLockerCSP.CreateNodeInstanceParams + +Parameters passed to the CreateNodeInstance function of the AppLockerCSP node. + +The following fields are available: + +- **NodeId** NodeId passed to CreateNodeInstance. +- **nodeOps** NodeOperations parameter passed to CreateNodeInstance. +- **uri** URI passed to CreateNodeInstance, relative to %SYSTEM32%\AppLocker. + + +### Microsoft.Windows.Security.AppLockerCSP.CreateNodeInstanceStart + +Start of the "CreateNodeInstance" operation for the AppLockerCSP node. + + + +### Microsoft.Windows.Security.AppLockerCSP.CreateNodeInstanceStop + +End of the "CreateNodeInstance" operation for the AppLockerCSP node + +The following fields are available: + +- **hr** HRESULT returned by the CreateNodeInstance function in AppLockerCSP. + + +### Microsoft.Windows.Security.AppLockerCSP.DeleteChildParams + +Parameters passed to the DeleteChild function of the AppLockerCSP node. + +The following fields are available: + +- **child** The child URI of the node to delete. +- **uri** URI relative to %SYSTEM32%\AppLocker. + + +### Microsoft.Windows.Security.AppLockerCSP.EnumPolicies + +Logged URI relative to %SYSTEM32%\AppLocker, if the Plugin GUID is null, or the CSP doesn't believe the old policy is present. + +The following fields are available: + +- **uri** URI relative to %SYSTEM32%\AppLocker. + + +### Microsoft.Windows.Security.AppLockerCSP.GetChildNodeNamesParams + +Parameters passed to the GetChildNodeNames function of the AppLockerCSP node. + +The following fields are available: + +- **uri** URI relative to %SYSTEM32%/AppLocker for MDM node. + + +### Microsoft.Windows.Security.AppLockerCSP.GetChildNodeNamesStart + +Start of the "GetChildNodeNames" operation for the AppLockerCSP node. + + + +### Microsoft.Windows.Security.AppLockerCSP.GetChildNodeNamesStop + +End of the "GetChildNodeNames" operation for the AppLockerCSP node. + +The following fields are available: + +- **child[0]** If function succeeded, the first child's name, else "NA". +- **count** If function succeeded, the number of child node names returned by the function, else 0. +- **hr** HRESULT returned by the GetChildNodeNames function of AppLockerCSP. + + +### Microsoft.Windows.Security.AppLockerCSP.GetLatestId + +The result of 'GetLatestId' in AppLockerCSP (the latest time stamped GUID). + +The following fields are available: + +- **dirId** The latest directory identifier found by GetLatestId. +- **id** The id returned by GetLatestId if id > 0 - otherwise the dirId parameter. + + +### Microsoft.Windows.Security.AppLockerCSP.HResultException + +HRESULT thrown by any arbitrary function in AppLockerCSP. + +The following fields are available: + +- **file** File in the OS code base in which the exception occurs. +- **function** Function in the OS code base in which the exception occurs. +- **hr** HRESULT that is reported. +- **line** Line in the file in the OS code base in which the exception occurs. + + +### Microsoft.Windows.Security.AppLockerCSP.SetValueParams + +Parameters passed to the SetValue function of the AppLockerCSP node. + +The following fields are available: + +- **dataLength** Length of the value to set. +- **uri** The node URI to that should contain the value, relative to %SYSTEM32%\AppLocker. + + +### Microsoft.Windows.Security.AppLockerCSP.SetValueStart + +Start of the "SetValue" operation for the AppLockerCSP node. + + + +### Microsoft.Windows.Security.AppLockerCSP.SetValueStop + +End of the "SetValue" operation for the AppLockerCSP node. + +The following fields are available: + +- **hr** HRESULT returned by the SetValue function in AppLockerCSP. + + +### Microsoft.Windows.Security.AppLockerCSP.TryRemediateMissingPolicies + +EntryPoint of fix step or policy remediation, includes URI relative to %SYSTEM32%\AppLocker that needs to be fixed. + +The following fields are available: + +- **uri** URI for node relative to %SYSTEM32%/AppLocker. + + +## Appraiser events + +### Microsoft.Windows.Appraiser.General.ChecksumTotalPictureCount + +This event lists the types of objects and how many of each exist on the client device. This allows for a quick way to ensure that the records present on the server match what is present on the client. + +The following fields are available: + +- **DatasourceApplicationFile_19A** No content is currently available. +- **DatasourceApplicationFile_19ASetup** The count of the number of this particular object type present on this device. +- **DatasourceApplicationFile_19H1** The count of the number of this particular object type present on this device. +- **DatasourceApplicationFile_19H1Setup** The count of the number of this particular object type present on this device. +- **DatasourceApplicationFile_RS4** The count of the number of this particular object type present on this device. +- **DatasourceApplicationFile_RS5** The count of the number of this particular object type present on this device. +- **DatasourceApplicationFile_RS5Setup** The count of the number of this particular object type present on this device. +- **DatasourceApplicationFile_TH2** The count of the number of this particular object type present on this device. +- **DatasourceDevicePnp_19A** No content is currently available. +- **DatasourceDevicePnp_19ASetup** The count of the number of this particular object type present on this device. +- **DatasourceDevicePnp_19H1** The count of the number of this particular object type present on this device. +- **DatasourceDevicePnp_19H1Setup** The count of the number of this particular object type present on this device. +- **DatasourceDevicePnp_RS4** The count of the number of this particular object type present on this device. +- **DatasourceDevicePnp_RS5** The count of the number of this particular object type present on this device. +- **DatasourceDevicePnp_RS5Setup** The count of the number of this particular object type present on this device. +- **DatasourceDevicePnp_TH2** The count of the number of this particular object type present on this device. +- **DatasourceDriverPackage_19A** No content is currently available. +- **DatasourceDriverPackage_19ASetup** The count of the number of this particular object type present on this device. +- **DatasourceDriverPackage_19H1** The count of the number of this particular object type present on this device. +- **DatasourceDriverPackage_19H1Setup** The count of the number of this particular object type present on this device. +- **DatasourceDriverPackage_RS4** The count of the number of this particular object type present on this device. +- **DatasourceDriverPackage_RS5** The count of the number of this particular object type present on this device. +- **DatasourceDriverPackage_RS5Setup** The count of the number of this particular object type present on this device. +- **DatasourceDriverPackage_TH2** The count of the number of this particular object type present on this device. +- **DataSourceMatchingInfoBlock_19A** No content is currently available. +- **DataSourceMatchingInfoBlock_19ASetup** The count of the number of this particular object type present on this device. +- **DataSourceMatchingInfoBlock_19H1** The count of the number of this particular object type present on this device. +- **DataSourceMatchingInfoBlock_19H1Setup** The count of the number of this particular object type present on this device. +- **DataSourceMatchingInfoBlock_RS4** The count of the number of this particular object type present on this device. +- **DataSourceMatchingInfoBlock_RS5** The count of the number of this particular object type present on this device. +- **DataSourceMatchingInfoBlock_RS5Setup** The count of the number of this particular object type present on this device. +- **DataSourceMatchingInfoBlock_TH2** The count of the number of this particular object type present on this device. +- **DataSourceMatchingInfoPassive_19A** No content is currently available. +- **DataSourceMatchingInfoPassive_19ASetup** The count of the number of this particular object type present on this device. +- **DataSourceMatchingInfoPassive_19H1** The count of the number of this particular object type present on this device. +- **DataSourceMatchingInfoPassive_19H1Setup** The count of the number of this particular object type present on this device. +- **DataSourceMatchingInfoPassive_RS4** The count of the number of this particular object type present on this device. +- **DataSourceMatchingInfoPassive_RS5** The count of the number of this particular object type present on this device. +- **DataSourceMatchingInfoPassive_RS5Setup** The count of the number of this particular object type present on this device. +- **DataSourceMatchingInfoPassive_TH2** The count of the number of this particular object type present on this device. +- **DataSourceMatchingInfoPostUpgrade_19A** No content is currently available. +- **DataSourceMatchingInfoPostUpgrade_19ASetup** The count of the number of this particular object type present on this device. +- **DataSourceMatchingInfoPostUpgrade_19H1** The count of the number of this particular object type present on this device. +- **DataSourceMatchingInfoPostUpgrade_19H1Setup** The count of the number of this particular object type present on this device. +- **DataSourceMatchingInfoPostUpgrade_RS1** The total DataSourceMatchingInfoPostUpgrade objects targeting Windows 10 version 1607 on this device. +- **DataSourceMatchingInfoPostUpgrade_RS4** The count of the number of this particular object type present on this device. +- **DataSourceMatchingInfoPostUpgrade_RS5** The count of the number of this particular object type present on this device. +- **DataSourceMatchingInfoPostUpgrade_RS5Setup** The count of the number of this particular object type present on this device. +- **DataSourceMatchingInfoPostUpgrade_TH2** The count of the number of this particular object type present on this device. +- **DatasourceSystemBios_19A** No content is currently available. +- **DatasourceSystemBios_19ASetup** The count of the number of this particular object type present on this device. +- **DatasourceSystemBios_19H1** The count of the number of this particular object type present on this device. +- **DatasourceSystemBios_19H1Setup** The count of the number of this particular object type present on this device. +- **DatasourceSystemBios_RS4** The count of the number of this particular object type present on this device. +- **DatasourceSystemBios_RS5** The count of the number of this particular object type present on this device. +- **DatasourceSystemBios_RS5Setup** The count of the number of this particular object type present on this device. +- **DatasourceSystemBios_TH2** The count of the number of this particular object type present on this device. +- **DecisionApplicationFile_19A** No content is currently available. +- **DecisionApplicationFile_19ASetup** The count of the number of this particular object type present on this device. +- **DecisionApplicationFile_19H1** The count of the number of this particular object type present on this device. +- **DecisionApplicationFile_19H1Setup** The count of the number of this particular object type present on this device. +- **DecisionApplicationFile_RS4** The count of the number of this particular object type present on this device. +- **DecisionApplicationFile_RS5** The count of the number of this particular object type present on this device. +- **DecisionApplicationFile_RS5Setup** The count of the number of this particular object type present on this device. +- **DecisionApplicationFile_TH2** The count of the number of this particular object type present on this device. +- **DecisionDevicePnp_19A** No content is currently available. +- **DecisionDevicePnp_19ASetup** The count of the number of this particular object type present on this device. +- **DecisionDevicePnp_19H1** The count of the number of this particular object type present on this device. +- **DecisionDevicePnp_19H1Setup** The count of the number of this particular object type present on this device. +- **DecisionDevicePnp_RS4** The count of the number of this particular object type present on this device. +- **DecisionDevicePnp_RS5** The count of the number of this particular object type present on this device. +- **DecisionDevicePnp_RS5Setup** The count of the number of this particular object type present on this device. +- **DecisionDevicePnp_TH2** The count of the number of this particular object type present on this device. +- **DecisionDriverPackage_19A** No content is currently available. +- **DecisionDriverPackage_19ASetup** The count of the number of this particular object type present on this device. +- **DecisionDriverPackage_19H1** The count of the number of this particular object type present on this device. +- **DecisionDriverPackage_19H1Setup** The count of the number of this particular object type present on this device. +- **DecisionDriverPackage_RS4** The count of the number of this particular object type present on this device. +- **DecisionDriverPackage_RS5** The count of the number of this particular object type present on this device. +- **DecisionDriverPackage_RS5Setup** The count of the number of this particular object type present on this device. +- **DecisionDriverPackage_TH2** The count of the number of this particular object type present on this device. +- **DecisionMatchingInfoBlock_19A** No content is currently available. +- **DecisionMatchingInfoBlock_19ASetup** The count of the number of this particular object type present on this device. +- **DecisionMatchingInfoBlock_19H1** The count of the number of this particular object type present on this device. +- **DecisionMatchingInfoBlock_19H1Setup** The count of the number of this particular object type present on this device. +- **DecisionMatchingInfoBlock_RS4** The count of the number of this particular object type present on this device. +- **DecisionMatchingInfoBlock_RS5** The count of the number of this particular object type present on this device. +- **DecisionMatchingInfoBlock_RS5Setup** The count of the number of this particular object type present on this device. +- **DecisionMatchingInfoBlock_TH2** The count of the number of this particular object type present on this device. +- **DecisionMatchingInfoPassive_19A** No content is currently available. +- **DecisionMatchingInfoPassive_19ASetup** The count of the number of this particular object type present on this device. +- **DecisionMatchingInfoPassive_19H1** The count of the number of this particular object type present on this device. +- **DecisionMatchingInfoPassive_19H1Setup** The count of the number of this particular object type present on this device. +- **DecisionMatchingInfoPassive_RS4** The count of the number of this particular object type present on this device. +- **DecisionMatchingInfoPassive_RS5** The count of the number of this particular object type present on this device. +- **DecisionMatchingInfoPassive_RS5Setup** The count of the number of this particular object type present on this device. +- **DecisionMatchingInfoPassive_TH2** The count of the number of this particular object type present on this device. +- **DecisionMatchingInfoPostUpgrade_19A** No content is currently available. +- **DecisionMatchingInfoPostUpgrade_19ASetup** The count of the number of this particular object type present on this device. +- **DecisionMatchingInfoPostUpgrade_19H1** The count of the number of this particular object type present on this device. +- **DecisionMatchingInfoPostUpgrade_19H1Setup** The count of the number of this particular object type present on this device. +- **DecisionMatchingInfoPostUpgrade_RS1** The total DecisionMatchingInfoPostUpgrade objects targeting Windows 10 version 1607 on this device. +- **DecisionMatchingInfoPostUpgrade_RS4** The count of the number of this particular object type present on this device. +- **DecisionMatchingInfoPostUpgrade_RS5** The count of the number of this particular object type present on this device. +- **DecisionMatchingInfoPostUpgrade_RS5Setup** The count of the number of this particular object type present on this device. +- **DecisionMatchingInfoPostUpgrade_TH2** The count of the number of this particular object type present on this device. +- **DecisionMediaCenter_19A** No content is currently available. +- **DecisionMediaCenter_19ASetup** The count of the number of this particular object type present on this device. +- **DecisionMediaCenter_19H1** The count of the number of this particular object type present on this device. +- **DecisionMediaCenter_19H1Setup** The total DecisionMediaCenter objects targeting the next release of Windows on this device. +- **DecisionMediaCenter_RS4** The count of the number of this particular object type present on this device. +- **DecisionMediaCenter_RS5** The count of the number of this particular object type present on this device. +- **DecisionMediaCenter_RS5Setup** The count of the number of this particular object type present on this device. +- **DecisionMediaCenter_TH2** The count of the number of this particular object type present on this device. +- **DecisionSystemBios_19A** No content is currently available. +- **DecisionSystemBios_19ASetup** The total DecisionSystemBios objects targeting the next release of Windows on this device. +- **DecisionSystemBios_19H1** The count of the number of this particular object type present on this device. +- **DecisionSystemBios_19H1Setup** The total DecisionSystemBios objects targeting the next release of Windows on this device. +- **DecisionSystemBios_RS4** The total DecisionSystemBios objects targeting Windows 10 version, 1803 present on this device. +- **DecisionSystemBios_RS5** The total DecisionSystemBios objects targeting the next release of Windows on this device. +- **DecisionSystemBios_RS5Setup** The total DecisionSystemBios objects targeting the next release of Windows on this device. +- **DecisionSystemBios_TH2** The count of the number of this particular object type present on this device. +- **InventoryApplicationFile** The count of the number of this particular object type present on this device. +- **InventoryLanguagePack** The count of the number of this particular object type present on this device. +- **InventoryMediaCenter** The count of the number of this particular object type present on this device. +- **InventorySystemBios** The count of the number of this particular object type present on this device. +- **InventoryUplevelDriverPackage** The count of the number of this particular object type present on this device. +- **PCFP** The count of the number of this particular object type present on this device. +- **SystemMemory** The count of the number of this particular object type present on this device. +- **SystemProcessorCompareExchange** The count of the number of this particular object type present on this device. +- **SystemProcessorLahfSahf** The count of the number of this particular object type present on this device. +- **SystemProcessorNx** The total number of objects of this type present on this device. +- **SystemProcessorPrefetchW** The total number of objects of this type present on this device. +- **SystemProcessorSse2** The total number of objects of this type present on this device. +- **SystemTouch** The count of the number of this particular object type present on this device. +- **SystemWim** The total number of objects of this type present on this device. +- **SystemWindowsActivationStatus** The count of the number of this particular object type present on this device. +- **SystemWlan** The total number of objects of this type present on this device. +- **Wmdrm_19A** No content is currently available. +- **Wmdrm_19ASetup** The count of the number of this particular object type present on this device. +- **Wmdrm_19H1** The count of the number of this particular object type present on this device. +- **Wmdrm_19H1Setup** The total Wmdrm objects targeting the next release of Windows on this device. +- **Wmdrm_RS4** The total Wmdrm objects targeting Windows 10, version 1803 present on this device. +- **Wmdrm_RS5** The count of the number of this particular object type present on this device. +- **Wmdrm_RS5Setup** The count of the number of this particular object type present on this device. +- **Wmdrm_TH2** The count of the number of this particular object type present on this device. + + +### Microsoft.Windows.Appraiser.General.DatasourceApplicationFileAdd + +Represents the basic metadata about specific application files installed on the system. + +This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedeviceinventorychange). + +The following fields are available: + +- **AppraiserVersion** The version of the appraiser file that is generating the events. +- **AvDisplayName** If the app is an anti-virus app, this is its display name. +- **CompatModelIndex** The compatibility prediction for this file. +- **HasCitData** Indicates whether the file is present in CIT data. +- **HasUpgradeExe** Indicates whether the anti-virus app has an upgrade.exe file. +- **IsAv** Is the file an anti-virus reporting EXE? +- **ResolveAttempted** This will always be an empty string when sending telemetry. +- **SdbEntries** An array of fields that indicates the SDB entries that apply to this file. + + +### Microsoft.Windows.Appraiser.General.DatasourceApplicationFileRemove + +This event indicates that the DatasourceApplicationFile object is no longer present. + +This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedeviceinventorychange). + +The following fields are available: + +- **AppraiserVersion** The version of the Appraiser file that is generating the events. + + +### Microsoft.Windows.Appraiser.General.DatasourceApplicationFileStartSync + +This event indicates that a new set of DatasourceApplicationFileAdd events will be sent. + +This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedeviceinventorychange). + +The following fields are available: + +- **AppraiserVersion** The version of the Appraiser file that is generating the events. + + +### Microsoft.Windows.Appraiser.General.DatasourceDevicePnpAdd + +This event sends compatibility data for a Plug and Play device, to help keep Windows up to date. + +This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedeviceinventorychange). + +The following fields are available: + +- **ActiveNetworkConnection** Indicates whether the device is an active network device. +- **AppraiserVersion** The version of the appraiser file generating the events. +- **CosDeviceRating** An enumeration that indicates if there is a driver on the target operating system. +- **CosDeviceSolution** An enumeration that indicates how a driver on the target operating system is available. +- **CosDeviceSolutionUrl** Microsoft.Windows.Appraiser.General.DatasourceDevicePnpAdd . Empty string +- **CosPopulatedFromId** The expected uplevel driver matching ID based on driver coverage data. +- **IsBootCritical** Indicates whether the device boot is critical. +- **UplevelInboxDriver** Indicates whether there is a driver uplevel for this device. +- **WuDriverCoverage** Indicates whether there is a driver uplevel for this device, according to Windows Update. +- **WuDriverUpdateId** The Windows Update ID of the applicable uplevel driver. +- **WuPopulatedFromId** The expected uplevel driver matching ID based on driver coverage from Windows Update. + + +### Microsoft.Windows.Appraiser.General.DatasourceDevicePnpRemove + +This event indicates that the DatasourceDevicePnp object is no longer present. + +This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedeviceinventorychange). + +The following fields are available: + +- **AppraiserVersion** The version of the Appraiser file that is generating the events. + + +### Microsoft.Windows.Appraiser.General.DatasourceDevicePnpStartSync + +This event indicates that a new set of DatasourceDevicePnpAdd events will be sent. + +This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedeviceinventorychange). + +The following fields are available: + +- **AppraiserVersion** The version of the Appraiser file that is generating the events. + + +### Microsoft.Windows.Appraiser.General.DatasourceDriverPackageAdd + +This event sends compatibility database data about driver packages to help keep Windows up to date. + +This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedeviceinventorychange). + +The following fields are available: + +- **AppraiserVersion** The version of the appraiser file generating the events. + + +### Microsoft.Windows.Appraiser.General.DatasourceDriverPackageRemove + +This event indicates that the DatasourceDriverPackage object is no longer present. + +This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedeviceinventorychange). + +The following fields are available: + +- **AppraiserVersion** The version of the Appraiser file that is generating the events. + + +### Microsoft.Windows.Appraiser.General.DatasourceDriverPackageStartSync + +This event indicates that a new set of DatasourceDriverPackageAdd events will be sent. + +This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedeviceinventorychange). + +The following fields are available: + +- **AppraiserVersion** The version of the Appraiser file that is generating the events. + + +### Microsoft.Windows.Appraiser.General.DataSourceMatchingInfoBlockAdd + +This event sends blocking data about any compatibility blocking entries hit on the system that are not directly related to specific applications or devices, to help keep Windows up-to-date. + +This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedeviceinventorychange). + +The following fields are available: + +- **AppraiserVersion** The version of the appraiser file generating the events. + + +### Microsoft.Windows.Appraiser.General.DataSourceMatchingInfoBlockStartSync + +This event indicates that a full set of DataSourceMatchingInfoBlockStAdd events have been sent. + +This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedeviceinventorychange). + +The following fields are available: + +- **AppraiserVersion** The version of the Appraiser file that is generating the events. + + +### Microsoft.Windows.Appraiser.General.DataSourceMatchingInfoPassiveAdd + +This event sends compatibility database information about non-blocking compatibility entries on the system that are not keyed by either applications or devices, to help keep Windows up-to-date. + +This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedeviceinventorychange). + +The following fields are available: + +- **AppraiserVersion** The version of the appraiser file generating the events. + + +### Microsoft.Windows.Appraiser.General.DataSourceMatchingInfoPassiveStartSync + +This event indicates that a new set of DataSourceMatchingInfoPassiveAdd events will be sent. + +This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedeviceinventorychange). + +The following fields are available: + +- **AppraiserVersion** The version of the Appraiser file that is generating the events. + + +### Microsoft.Windows.Appraiser.General.DataSourceMatchingInfoPostUpgradeAdd + +This event sends compatibility database information about entries requiring reinstallation after an upgrade on the system that are not keyed by either applications or devices, to help keep Windows up-to-date. + +This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedeviceinventorychange). + +The following fields are available: + +- **AppraiserVersion** The version of the appraiser file generating the events. + + +### Microsoft.Windows.Appraiser.General.DataSourceMatchingInfoPostUpgradeStartSync + +This event indicates that a new set of DataSourceMatchingInfoPostUpgradeAdd events will be sent. + +This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedeviceinventorychange). + +The following fields are available: + +- **AppraiserVersion** The version of the Appraiser file that is generating the events. + + +### Microsoft.Windows.Appraiser.General.DatasourceSystemBiosAdd + +This event sends compatibility database information about the BIOS to help keep Windows up-to-date. + +This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedeviceinventorychange). + +The following fields are available: + +- **AppraiserVersion** The version of the Appraiser file generating the events. + + +### Microsoft.Windows.Appraiser.General.DatasourceSystemBiosStartSync + +This event indicates that a new set of DatasourceSystemBiosAdd events will be sent. + +This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedeviceinventorychange). + +The following fields are available: + +- **AppraiserVersion** The version of the Appraiser file that is generating the events. + + +### Microsoft.Windows.Appraiser.General.DecisionApplicationFileAdd + +This event sends compatibility decision data about a file to help keep Windows up-to-date. + +This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedeviceinventorychange). + +The following fields are available: + +- **AppraiserVersion** The version of the appraiser file that is generating the events. +- **BlockAlreadyInbox** The uplevel runtime block on the file already existed on the current OS. +- **BlockingApplication** Indicates whether there are any application issues that interfere with the upgrade due to the file in question. +- **DisplayGenericMessage** Will be a generic message be shown for this file? +- **DisplayGenericMessageGated** Indicates whether a generic message be shown for this file. +- **HardBlock** This file is blocked in the SDB. +- **HasUxBlockOverride** Does the file have a block that is overridden by a tag in the SDB? +- **MigApplication** Does the file have a MigXML from the SDB associated with it that applies to the current upgrade mode? +- **MigRemoval** Does the file have a MigXML from the SDB that will cause the app to be removed on upgrade? +- **NeedsDismissAction** Will the file cause an action that can be dimissed? +- **NeedsInstallPostUpgradeData** After upgrade, the file will have a post-upgrade notification to install a replacement for the app. +- **NeedsNotifyPostUpgradeData** Does the file have a notification that should be shown after upgrade? +- **NeedsReinstallPostUpgradeData** After upgrade, this file will have a post-upgrade notification to reinstall the app. +- **NeedsUninstallAction** The file must be uninstalled to complete the upgrade. +- **SdbBlockUpgrade** The file is tagged as blocking upgrade in the SDB, +- **SdbBlockUpgradeCanReinstall** The file is tagged as blocking upgrade in the SDB. It can be reinstalled after upgrade. +- **SdbBlockUpgradeUntilUpdate** The file is tagged as blocking upgrade in the SDB. If the app is updated, the upgrade can proceed. +- **SdbReinstallUpgrade** The file is tagged as needing to be reinstalled after upgrade in the SDB. It does not block upgrade. +- **SdbReinstallUpgradeWarn** The file is tagged as needing to be reinstalled after upgrade with a warning in the SDB. It does not block upgrade. +- **SoftBlock** The file is softblocked in the SDB and has a warning. + + +### Microsoft.Windows.Appraiser.General.DecisionApplicationFileStartSync + +This event indicates that a new set of DecisionApplicationFileAdd events will be sent. + +This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedeviceinventorychange). + +The following fields are available: + +- **AppraiserVersion** The version of the Appraiser file that is generating the events. + + +### Microsoft.Windows.Appraiser.General.DecisionDevicePnpAdd + +This event sends compatibility decision data about a PNP device to help keep Windows up to date. + +This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedeviceinventorychange). + +The following fields are available: + +- **AppraiserVersion** The version of the appraiser file generating the events. +- **AssociatedDriverIsBlocked** Is the driver associated with this PNP device blocked? +- **AssociatedDriverWillNotMigrate** Will the driver associated with this plug-and-play device migrate? +- **BlockAssociatedDriver** Should the driver associated with this PNP device be blocked? +- **BlockingDevice** Is this PNP device blocking upgrade? +- **BlockUpgradeIfDriverBlocked** Is the PNP device both boot critical and does not have a driver included with the OS? +- **BlockUpgradeIfDriverBlockedAndOnlyActiveNetwork** Is this PNP device the only active network device? +- **DisplayGenericMessage** Will a generic message be shown during Setup for this PNP device? +- **DisplayGenericMessageGated** Indicates whether a generic message will be shown during Setup for this PNP device. +- **DriverAvailableInbox** Is a driver included with the operating system for this PNP device? +- **DriverAvailableOnline** Is there a driver for this PNP device on Windows Update? +- **DriverAvailableUplevel** Is there a driver on Windows Update or included with the operating system for this PNP device? +- **DriverBlockOverridden** Is there is a driver block on the device that has been overridden? +- **NeedsDismissAction** Will the user would need to dismiss a warning during Setup for this device? +- **NotRegressed** Does the device have a problem code on the source OS that is no better than the one it would have on the target OS? +- **SdbDeviceBlockUpgrade** Is there an SDB block on the PNP device that blocks upgrade? +- **SdbDriverBlockOverridden** Is there an SDB block on the PNP device that blocks upgrade, but that block was overridden? +- **TEMP_WuFalseAndCosInbox** No content is currently available. +- **TEMP_WuFalseAndCosOnline** No content is currently available. +- **TEMP_WuFalseAndNoCos** No content is currently available. +- **TEMP_WuTrueAndCosInbox** No content is currently available. +- **TEMP_WuTrueAndCosOnline** No content is currently available. +- **TEMP_WuTrueAndNoCos** No content is currently available. + + +### Microsoft.Windows.Appraiser.General.DecisionDevicePnpRemove + +This event indicates that the DecisionDevicePnp object is no longer present. + +This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedeviceinventorychange). + +The following fields are available: + +- **AppraiserVersion** The version of the Appraiser file that is generating the events. + + +### Microsoft.Windows.Appraiser.General.DecisionDevicePnpStartSync + +The DecisionDevicePnpStartSync event indicates that a new set of DecisionDevicePnpAdd events will be sent. + +This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedeviceinventorychange). + +The following fields are available: + +- **AppraiserVersion** The version of the Appraiser file that is generating the events. + + +### Microsoft.Windows.Appraiser.General.DecisionDriverPackageAdd + +This event sends decision data about driver package compatibility to help keep Windows up to date. + +This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedeviceinventorychange). + +The following fields are available: + +- **AppraiserVersion** The version of the appraiser file generating the events. +- **DisplayGenericMessageGated** Indicates whether a generic offer block message will be shown for this driver package. +- **DriverBlockOverridden** Does the driver package have an SDB block that blocks it from migrating, but that block has been overridden? +- **DriverIsDeviceBlocked** Was the driver package was blocked because of a device block? +- **DriverIsDriverBlocked** Is the driver package blocked because of a driver block? +- **DriverShouldNotMigrate** Should the driver package be migrated during upgrade? +- **SdbDriverBlockOverridden** Does the driver package have an SDB block that blocks it from migrating, but that block has been overridden? + + +### Microsoft.Windows.Appraiser.General.DecisionDriverPackageRemove + +This event indicates that the DecisionDriverPackage object is no longer present. + +This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedeviceinventorychange). + +The following fields are available: + +- **AppraiserVersion** The version of the Appraiser file that is generating the events. + + +### Microsoft.Windows.Appraiser.General.DecisionDriverPackageStartSync + +This event indicates that a new set of DecisionDriverPackageAdd events will be sent. + +This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedeviceinventorychange). + +The following fields are available: + +- **AppraiserVersion** The version of the Appraiser file that is generating the events. + + +### Microsoft.Windows.Appraiser.General.DecisionMatchingInfoBlockAdd + +This event sends compatibility decision data about blocking entries on the system that are not keyed by either applications or devices, to help keep Windows up to date. + +This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedeviceinventorychange). + +The following fields are available: + +- **AppraiserVersion** The version of the appraiser file generating the events. +- **BlockingApplication** Are there are any application issues that interfere with upgrade due to matching info blocks? +- **DisplayGenericMessage** Will a generic message be shown for this block? +- **NeedsUninstallAction** Does the user need to take an action in setup due to a matching info block? +- **SdbBlockUpgrade** Is a matching info block blocking upgrade? +- **SdbBlockUpgradeCanReinstall** Is a matching info block blocking upgrade, but has the can reinstall tag? +- **SdbBlockUpgradeUntilUpdate** Is a matching info block blocking upgrade but has the until update tag? + + +### Microsoft.Windows.Appraiser.General.DecisionMatchingInfoBlockStartSync + +This event indicates that a new set of DecisionMatchingInfoBlockAdd events will be sent. + +This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedeviceinventorychange). + +The following fields are available: + +- **AppraiserVersion** The version of the Appraiser file that is generating the events. + + +### Microsoft.Windows.Appraiser.General.DecisionMatchingInfoPassiveAdd + +This event sends compatibility decision data about non-blocking entries on the system that are not keyed by either applications or devices, to help keep Windows up-to-date. + +This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedeviceinventorychange). + +The following fields are available: + +- **AppraiserVersion** The version of the Appraiser file that is generating the events. +- **BlockingApplication** Are there any application issues that interfere with upgrade due to matching info blocks? +- **DisplayGenericMessageGated** Indicates whether a generic offer block message will be shown due to matching info blocks. +- **MigApplication** Is there a matching info block with a mig for the current mode of upgrade? + + +### Microsoft.Windows.Appraiser.General.DecisionMatchingInfoPassiveStartSync + +This event indicates that a new set of DecisionMatchingInfoPassiveAdd events will be sent. + +This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedeviceinventorychange). + +The following fields are available: + +- **AppraiserVersion** The version of the Appraiser file that is generating the events. + + +### Microsoft.Windows.Appraiser.General.DecisionMatchingInfoPostUpgradeAdd + +This event sends compatibility decision data about entries that require reinstall after upgrade. It's used to help keep Windows up to date. + +This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedeviceinventorychange). + +The following fields are available: + +- **AppraiserVersion** The version of the Appraiser file that is generating the events. +- **NeedsInstallPostUpgradeData** Will the file have a notification after upgrade to install a replacement for the app? +- **NeedsNotifyPostUpgradeData** Should a notification be shown for this file after upgrade? +- **NeedsReinstallPostUpgradeData** Will the file have a notification after upgrade to reinstall the app? +- **SdbReinstallUpgrade** The file is tagged as needing to be reinstalled after upgrade in the compatibility database (but is not blocking upgrade). + + +### Microsoft.Windows.Appraiser.General.DecisionMatchingInfoPostUpgradeStartSync + +This event indicates that a new set of DecisionMatchingInfoPostUpgradeAdd events will be sent. + +This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedeviceinventorychange). + +The following fields are available: + +- **AppraiserVersion** The version of the Appraiser file that is generating the events. + + +### Microsoft.Windows.Appraiser.General.DecisionMediaCenterAdd + +This event sends decision data about the presence of Windows Media Center, to help keep Windows up to date. + +This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedeviceinventorychange). + +The following fields are available: + +- **AppraiserVersion** The version of the Appraiser file generating the events. +- **BlockingApplication** Is there any application issues that interfere with upgrade due to Windows Media Center? +- **MediaCenterActivelyUsed** If Windows Media Center is supported on the edition, has it been run at least once and are the MediaCenterIndicators are true? +- **MediaCenterIndicators** Do any indicators imply that Windows Media Center is in active use? +- **MediaCenterInUse** Is Windows Media Center actively being used? +- **MediaCenterPaidOrActivelyUsed** Is Windows Media Center actively being used or is it running on a supported edition? +- **NeedsDismissAction** Are there any actions that can be dismissed coming from Windows Media Center? + + +### Microsoft.Windows.Appraiser.General.DecisionMediaCenterStartSync + +This event indicates that a new set of DecisionMediaCenterAdd events will be sent. + +This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedeviceinventorychange). + +The following fields are available: + +- **AppraiserVersion** The version of the Appraiser file that is generating the events. + + +### Microsoft.Windows.Appraiser.General.DecisionSystemBiosAdd + +This event sends compatibility decision data about the BIOS to help keep Windows up to date. + +This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedeviceinventorychange). + +The following fields are available: + +- **AppraiserVersion** The version of the Appraiser file generating the events. +- **Blocking** Is the device blocked from upgrade due to a BIOS block? +- **DisplayGenericMessageGated** Indicates whether a generic offer block message will be shown for the bios. +- **HasBiosBlock** Does the device have a BIOS block? +- **HasBiosBlockServicing** No content is currently available. +- **HasBiosBlockSwap** No content is currently available. + + +### Microsoft.Windows.Appraiser.General.DecisionSystemBiosStartSync + +This event indicates that a new set of DecisionSystemBiosAdd events will be sent. + +This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedeviceinventorychange). + +The following fields are available: + +- **AppraiserVersion** The version of the Appraiser file that is generating the events. + + +### Microsoft.Windows.Appraiser.General.DecisionTestRemove + +No content is currently available. + +This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedeviceinventorychange). + +The following fields are available: + +- **AppraiserVersion** No content is currently available. + + +### Microsoft.Windows.Appraiser.General.DecisionTestStartSync + +No content is currently available. + +This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedeviceinventorychange). + +The following fields are available: + +- **AppraiserVersion** No content is currently available. + + +### Microsoft.Windows.Appraiser.General.GatedRegChange + +This event sends data about the results of running a set of quick-blocking instructions, to help keep Windows up to date. + +The following fields are available: + +- **NewData** The data in the registry value after the scan completed. +- **OldData** The previous data in the registry value before the scan ran. +- **PCFP** An ID for the system calculated by hashing hardware identifiers. +- **RegKey** The registry key name for which a result is being sent. +- **RegValue** The registry value for which a result is being sent. +- **Time** The client time of the event. + + +### Microsoft.Windows.Appraiser.General.InventoryApplicationFileAdd + +This event represents the basic metadata about a file on the system. The file must be part of an app and either have a block in the compatibility database or be part of an antivirus program. + +This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedeviceinventorychange). + +The following fields are available: + +- **AppraiserVersion** The version of the Appraiser file generating the events. +- **AvDisplayName** If the app is an antivirus app, this is its display name. +- **AvProductState** Indicates whether the antivirus program is turned on and the signatures are up to date. +- **BinaryType** A binary type. Example: UNINITIALIZED, ZERO_BYTE, DATA_ONLY, DOS_MODULE, NE16_MODULE, PE32_UNKNOWN, PE32_I386, PE32_ARM, PE64_UNKNOWN, PE64_AMD64, PE64_ARM64, PE64_IA64, PE32_CLR_32, PE32_CLR_IL, PE32_CLR_IL_PREFER32, PE64_CLR_64. +- **BinFileVersion** An attempt to clean up FileVersion at the client that tries to place the version into 4 octets. +- **BinProductVersion** An attempt to clean up ProductVersion at the client that tries to place the version into 4 octets. +- **BoeProgramId** If there is no entry in Add/Remove Programs, this is the ProgramID that is generated from the file metadata. +- **CompanyName** The company name of the vendor who developed this file. +- **FileId** A hash that uniquely identifies a file. +- **FileVersion** The File version field from the file metadata under Properties -> Details. +- **HasUpgradeExe** Indicates whether the antivirus app has an upgrade.exe file. +- **IsAv** Indicates whether the file an antivirus reporting EXE. +- **LinkDate** The date and time that this file was linked on. +- **LowerCaseLongPath** The full file path to the file that was inventoried on the device. +- **Name** The name of the file that was inventoried. +- **ProductName** The Product name field from the file metadata under Properties -> Details. +- **ProductVersion** The Product version field from the file metadata under Properties -> Details. +- **ProgramId** A hash of the Name, Version, Publisher, and Language of an application used to identify it. +- **Size** The size of the file (in hexadecimal bytes). + + +### Microsoft.Windows.Appraiser.General.InventoryApplicationFileRemove + +This event indicates that the InventoryApplicationFile object is no longer present. + +This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedeviceinventorychange). + +The following fields are available: + +- **AppraiserVersion** The version of the Appraiser file that is generating the events. + + +### Microsoft.Windows.Appraiser.General.InventoryApplicationFileStartSync + +This event indicates indicates that a new set of InventoryApplicationFileAdd events will be sent. + +This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedeviceinventorychange). + +The following fields are available: + +- **AppraiserVersion** The version of the Appraiser file that is generating the events. + + +### Microsoft.Windows.Appraiser.General.InventoryLanguagePackAdd + +This event sends data about the number of language packs installed on the system, to help keep Windows up to date. + +This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedeviceinventorychange). + +The following fields are available: + +- **AppraiserVersion** The version of the Appraiser file that is generating the events. +- **HasLanguagePack** Indicates whether this device has 2 or more language packs. +- **LanguagePackCount** The number of language packs are installed. + + +### Microsoft.Windows.Appraiser.General.InventoryLanguagePackRemove + +This event indicates that the InventoryLanguagePack object is no longer present. + +This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedeviceinventorychange). + +The following fields are available: + +- **AppraiserVersion** The version of the Appraiser file that is generating the events. + + +### Microsoft.Windows.Appraiser.General.InventoryLanguagePackStartSync + +This event indicates that a new set of InventoryLanguagePackAdd events will be sent. + +This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedeviceinventorychange). + +The following fields are available: + +- **AppraiserVersion** The version of the Appraiser file that is generating the events. + + +### Microsoft.Windows.Appraiser.General.InventoryMediaCenterAdd + +This event sends true/false data about decision points used to understand whether Windows Media Center is used on the system, to help keep Windows up to date. + +This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedeviceinventorychange). + +The following fields are available: + +- **AppraiserVersion** The version of the Appraiser file generating the events. +- **EverLaunched** Has Windows Media Center ever been launched? +- **HasConfiguredTv** Has the user configured a TV tuner through Windows Media Center? +- **HasExtendedUserAccounts** Are any Windows Media Center Extender user accounts configured? +- **HasWatchedFolders** Are any folders configured for Windows Media Center to watch? +- **IsDefaultLauncher** Is Windows Media Center the default app for opening music or video files? +- **IsPaid** Is the user running a Windows Media Center edition that implies they paid for Windows Media Center? +- **IsSupported** Does the running OS support Windows Media Center? + + +### Microsoft.Windows.Appraiser.General.InventoryMediaCenterRemove + +This event indicates that the InventoryMediaCenter object is no longer present. + +This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedeviceinventorychange). + +The following fields are available: + +- **AppraiserVersion** The version of the Appraiser file that is generating the events. + + +### Microsoft.Windows.Appraiser.General.InventoryMediaCenterStartSync + +This event indicates that a new set of InventoryMediaCenterAdd events will be sent. + +This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedeviceinventorychange). + +The following fields are available: + +- **AppraiserVersion** The version of the Appraiser file that is generating the events. + + +### Microsoft.Windows.Appraiser.General.InventorySystemBiosAdd + +This event sends basic metadata about the BIOS to determine whether it has a compatibility block. + +This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedeviceinventorychange). + +The following fields are available: + +- **AppraiserVersion** The version of the Appraiser file that is generating the events. +- **BiosDate** The release date of the BIOS in UTC format. +- **BiosName** The name field from Win32_BIOS. +- **Manufacturer** The manufacturer field from Win32_ComputerSystem. +- **Model** The model field from Win32_ComputerSystem. + + +### Microsoft.Windows.Appraiser.General.InventorySystemBiosStartSync + +This event indicates that a new set of InventorySystemBiosAdd events will be sent. + +This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedeviceinventorychange). + +The following fields are available: + +- **AppraiserVersion** The version of the Appraiser file that is generating the events. + + +### Microsoft.Windows.Appraiser.General.InventoryTestRemove + +No content is currently available. + +This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedeviceinventorychange). + +The following fields are available: + +- **AppraiserVersion** No content is currently available. + + +### Microsoft.Windows.Appraiser.General.InventoryTestStartSync + +No content is currently available. + +This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedeviceinventorychange). + +The following fields are available: + +- **AppraiserVersion** No content is currently available. + + +### Microsoft.Windows.Appraiser.General.InventoryUplevelDriverPackageAdd + +This event is only runs during setup. It provides a listing of the uplevel driver packages that were downloaded before the upgrade. Is critical to understanding if failures in setup can be traced to not having sufficient uplevel drivers before the upgrade. + +This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedeviceinventorychange). + +The following fields are available: + +- **AppraiserVersion** The version of the Appraiser file that is generating the events. +- **BootCritical** Is the driver package marked as boot critical? +- **Build** The build value from the driver package. +- **CatalogFile** The name of the catalog file within the driver package. +- **Class** The device class from the driver package. +- **ClassGuid** The device class unique ID from the driver package. +- **Date** The date from the driver package. +- **Inbox** Is the driver package of a driver that is included with Windows? +- **OriginalName** The original name of the INF file before it was renamed. Generally a path under $WINDOWS.~BT\Drivers\DU. +- **Provider** The provider of the driver package. +- **PublishedName** The name of the INF file after it was renamed. +- **Revision** The revision of the driver package. +- **SignatureStatus** Indicates if the driver package is signed. Unknown = 0, Unsigned = 1, Signed = 2. +- **VersionMajor** The major version of the driver package. +- **VersionMinor** The minor version of the driver package. + + +### Microsoft.Windows.Appraiser.General.InventoryUplevelDriverPackageRemove + +This event indicates that the InventoryUplevelDriverPackage object is no longer present. + +This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedeviceinventorychange). + +The following fields are available: + +- **AppraiserVersion** The version of the Appraiser file that is generating the events. + + +### Microsoft.Windows.Appraiser.General.InventoryUplevelDriverPackageStartSync + +This event indicates that a new set of InventoryUplevelDriverPackageAdd events will be sent. + +This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedeviceinventorychange). + +The following fields are available: + +- **AppraiserVersion** The version of the Appraiser file that is generating the events. + + +### Microsoft.Windows.Appraiser.General.RunContext + +This event indicates what should be expected in the data payload. + +The following fields are available: + +- **AppraiserBranch** The source branch in which the currently running version of Appraiser was built. +- **AppraiserProcess** The name of the process that launched Appraiser. +- **AppraiserVersion** The version of the Appraiser file generating the events. +- **CensusId** No content is currently available. +- **Context** Indicates what mode Appraiser is running in. Example: Setup or Telemetry. +- **PCFP** An ID for the system calculated by hashing hardware identifiers. +- **Subcontext** Indicates what categories of incompatibilities appraiser is scanning for. Can be N/A, Resolve, or a semicolon-delimited list that can include App, Dev, Sys, Gat, or Rescan. +- **Time** The client time of the event. + + +### Microsoft.Windows.Appraiser.General.SystemMemoryAdd + +This event sends data on the amount of memory on the system and whether it meets requirements, to help keep Windows up-to-date. + +This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedeviceinventorychange). + +The following fields are available: + +- **AppraiserVersion** The version of the Appraiser file generating the events. +- **Blocking** Is the device from upgrade due to memory restrictions? +- **MemoryRequirementViolated** Was a memory requirement violated? +- **pageFile** The current committed memory limit for the system or the current process, whichever is smaller (in bytes). +- **ram** The amount of memory on the device. +- **ramKB** The amount of memory (in KB). +- **virtual** The size of the user-mode portion of the virtual address space of the calling process (in bytes). +- **virtualKB** The amount of virtual memory (in KB). + + +### Microsoft.Windows.Appraiser.General.SystemMemoryStartSync + +This event indicates that a new set of SystemMemoryAdd events will be sent. + +This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedeviceinventorychange). + +The following fields are available: + +- **AppraiserVersion** The version of the Appraiser file that is generating the events. + + +### Microsoft.Windows.Appraiser.General.SystemProcessorCompareExchangeAdd + +This event sends data indicating whether the system supports the CompareExchange128 CPU requirement, to help keep Windows up to date. + +This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedeviceinventorychange). + +The following fields are available: + +- **AppraiserVersion** The version of the Appraiser file generating the events. +- **Blocking** Is the upgrade blocked due to the processor? +- **CompareExchange128Support** Does the CPU support CompareExchange128? + + +### Microsoft.Windows.Appraiser.General.SystemProcessorCompareExchangeStartSync + +This event indicates that a new set of SystemProcessorCompareExchangeAdd events will be sent. + +This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedeviceinventorychange). + +The following fields are available: + +- **AppraiserVersion** The version of the Appraiser file that is generating the events. + + +### Microsoft.Windows.Appraiser.General.SystemProcessorLahfSahfAdd + +This event sends data indicating whether the system supports the LahfSahf CPU requirement, to help keep Windows up-to-date. + +This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedeviceinventorychange). + +The following fields are available: + +- **AppraiserVersion** The version of the Appraiser file generating the events. +- **Blocking** Is the upgrade blocked due to the processor? +- **LahfSahfSupport** Does the CPU support LAHF/SAHF? + + +### Microsoft.Windows.Appraiser.General.SystemProcessorLahfSahfStartSync + +This event indicates that a new set of SystemProcessorLahfSahfAdd events will be sent. + +This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedeviceinventorychange). + +The following fields are available: + +- **AppraiserVersion** The version of the Appraiser file that is generating the events. + + +### Microsoft.Windows.Appraiser.General.SystemProcessorNxAdd + +This event sends data indicating whether the system supports the NX CPU requirement, to help keep Windows up-to-date. + +This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedeviceinventorychange). + +The following fields are available: + +- **AppraiserVersion** The version of the Appraiser file that is generating the events. +- **Blocking** Is the upgrade blocked due to the processor? +- **NXDriverResult** The result of the driver used to do a non-deterministic check for NX support. +- **NXProcessorSupport** Does the processor support NX? + + +### Microsoft.Windows.Appraiser.General.SystemProcessorNxStartSync + +This event indicates that a new set of SystemProcessorNxAdd events will be sent. + +This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedeviceinventorychange). + +The following fields are available: + +- **AppraiserVersion** The version of the Appraiser file that is generating the events. + + +### Microsoft.Windows.Appraiser.General.SystemProcessorPrefetchWAdd + +This event sends data indicating whether the system supports the PrefetchW CPU requirement, to help keep Windows up to date. + +This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedeviceinventorychange). + +The following fields are available: + +- **AppraiserVersion** The version of the Appraiser file that is generating the events. +- **Blocking** Is the upgrade blocked due to the processor? +- **PrefetchWSupport** Does the processor support PrefetchW? + + +### Microsoft.Windows.Appraiser.General.SystemProcessorPrefetchWStartSync + +This event indicates that a new set of SystemProcessorPrefetchWAdd events will be sent. + +This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedeviceinventorychange). + +The following fields are available: + +- **AppraiserVersion** The version of the Appraiser file that is generating the events. + + +### Microsoft.Windows.Appraiser.General.SystemProcessorSse2Add + +This event sends data indicating whether the system supports the SSE2 CPU requirement, to help keep Windows up to date. + +This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedeviceinventorychange). + +The following fields are available: + +- **AppraiserVersion** The version of the Appraiser file that is generating the events. +- **Blocking** Is the upgrade blocked due to the processor? +- **SSE2ProcessorSupport** Does the processor support SSE2? + + +### Microsoft.Windows.Appraiser.General.SystemProcessorSse2StartSync + +This event indicates that a new set of SystemProcessorSse2Add events will be sent. + +This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedeviceinventorychange). + +The following fields are available: + +- **AppraiserVersion** The version of the Appraiser file that is generating the events. + + +### Microsoft.Windows.Appraiser.General.SystemTouchAdd + +This event sends data indicating whether the system supports touch, to help keep Windows up to date. + +This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedeviceinventorychange). + +The following fields are available: + +- **AppraiserVersion** The version of the Appraiser file that is generating the events. +- **IntegratedTouchDigitizerPresent** Is there an integrated touch digitizer? +- **MaximumTouches** The maximum number of touch points supported by the device hardware. + + +### Microsoft.Windows.Appraiser.General.SystemTouchStartSync + +This event indicates that a new set of SystemTouchAdd events will be sent. + +This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedeviceinventorychange). + +The following fields are available: + +- **AppraiserVersion** The version of the Appraiser file that is generating the events. + + +### Microsoft.Windows.Appraiser.General.SystemWimAdd + +This event sends data indicating whether the operating system is running from a compressed Windows Imaging Format (WIM) file, to help keep Windows up to date. + +This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedeviceinventorychange). + +The following fields are available: + +- **AppraiserVersion** The version of the Appraiser file that is generating the events. +- **IsWimBoot** Is the current operating system running from a compressed WIM file? +- **RegistryWimBootValue** The raw value from the registry that is used to indicate if the device is running from a WIM. + + +### Microsoft.Windows.Appraiser.General.SystemWimStartSync + +This event indicates that a new set of SystemWimAdd events will be sent. + +This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedeviceinventorychange). + +The following fields are available: + +- **AppraiserVersion** The version of the Appraiser file that is generating the events. + + +### Microsoft.Windows.Appraiser.General.SystemWindowsActivationStatusAdd + +This event sends data indicating whether the current operating system is activated, to help keep Windows up to date. + +This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedeviceinventorychange). + +The following fields are available: + +- **AppraiserVersion** The version of the Appraiser file that is generating the events. +- **WindowsIsLicensedApiValue** The result from the API that's used to indicate if operating system is activated. +- **WindowsNotActivatedDecision** Is the current operating system activated? + + +### Microsoft.Windows.Appraiser.General.SystemWindowsActivationStatusStartSync + +This event indicates that a new set of SystemWindowsActivationStatusAdd events will be sent. + +This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedeviceinventorychange). + +The following fields are available: + +- **AppraiserVersion** The version of the Appraiser file that is generating the events. + + +### Microsoft.Windows.Appraiser.General.SystemWlanAdd + +This event sends data indicating whether the system has WLAN, and if so, whether it uses an emulated driver that could block an upgrade, to help keep Windows up-to-date. + +This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedeviceinventorychange). + +The following fields are available: + +- **AppraiserVersion** The version of the Appraiser file that is generating the events. +- **Blocking** Is the upgrade blocked because of an emulated WLAN driver? +- **HasWlanBlock** Does the emulated WLAN driver have an upgrade block? +- **WlanEmulatedDriver** Does the device have an emulated WLAN driver? +- **WlanExists** Does the device support WLAN at all? +- **WlanModulePresent** Are any WLAN modules present? +- **WlanNativeDriver** Does the device have a non-emulated WLAN driver? + + +### Microsoft.Windows.Appraiser.General.SystemWlanStartSync + +This event indicates that a new set of SystemWlanAdd events will be sent. + +This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedeviceinventorychange). + +The following fields are available: + +- **AppraiserVersion** The version of the Appraiser file that is generating the events. + + +### Microsoft.Windows.Appraiser.General.TelemetryRunHealth + +This event indicates the parameters and result of a telemetry (diagnostic) run. This allows the rest of the data sent over the course of the run to be properly contextualized and understood, which is then used to keep Windows up to date. + +The following fields are available: + +- **AppraiserBranch** The source branch in which the version of Appraiser that is running was built. +- **AppraiserDataVersion** The version of the data files being used by the Appraiser telemetry run. +- **AppraiserProcess** The name of the process that launched Appraiser. +- **AppraiserVersion** The file version (major, minor and build) of the Appraiser DLL, concatenated without dots. +- **AuxFinal** Obsolete, always set to false. +- **AuxInitial** Obsolete, indicates if Appraiser is writing data files to be read by the Get Windows 10 app. +- **DeadlineDate** A timestamp representing the deadline date, which is the time until which appraiser will wait to do a full scan. +- **EnterpriseRun** Indicates if the telemetry run is an enterprise run, which means appraiser was run from the command line with an extra enterprise parameter. +- **FullSync** Indicates if Appraiser is performing a full sync, which means that full set of events representing the state of the machine are sent. Otherwise, only the changes from the previous run are sent. +- **InboxDataVersion** The original version of the data files before retrieving any newer version. +- **IndicatorsWritten** Indicates if all relevant UEX indicators were successfully written or updated. +- **InventoryFullSync** Indicates if inventory is performing a full sync, which means that the full set of events representing the inventory of machine are sent. +- **PCFP** An ID for the system calculated by hashing hardware identifiers. +- **PerfBackoff** Indicates if the run was invoked with logic to stop running when a user is present. Helps to understand why a run may have a longer elapsed time than normal. +- **PerfBackoffInsurance** Indicates if appraiser is running without performance backoff because it has run with perf backoff and failed to complete several times in a row. +- **RunAppraiser** Indicates if Appraiser was set to run at all. If this if false, it is understood that data events will not be received from this device. +- **RunDate** The date that the telemetry run was stated, expressed as a filetime. +- **RunGeneralTel** Indicates if the generaltel.dll component was run. Generaltel collects additional telemetry on an infrequent schedule and only from machines at telemetry levels higher than Basic. +- **RunOnline** Indicates if appraiser was able to connect to Windows Update and theefore is making decisions using up-to-date driver coverage information. +- **RunResult** The hresult of the Appraiser telemetry run. +- **ScheduledUploadDay** The day scheduled for the upload. +- **SendingUtc** Indicates if the Appraiser client is sending events during the current telemetry run. +- **StoreHandleIsNotNull** Obsolete, always set to false +- **TelementrySent** Indicates if telemetry was successfully sent. +- **ThrottlingUtc** Indicates if the Appraiser client is throttling its output of CUET events to avoid being disabled. This increases runtime but also telemetry reliability. +- **Time** The client time of the event. +- **VerboseMode** Indicates if appraiser ran in Verbose mode, which is a test-only mode with extra logging. +- **WhyFullSyncWithoutTablePrefix** Indicates the reason or reasons that a full sync was generated. + + +### Microsoft.Windows.Appraiser.General.WmdrmAdd + +This event sends data about the usage of older digital rights management on the system, to help keep Windows up to date. This data does not indicate the details of the media using the digital rights management, only whether any such files exist. Collecting this data was critical to ensuring the correct mitigation for customers, and should be able to be removed once all mitigations are in place. + +This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedeviceinventorychange). + +The following fields are available: + +- **AppraiserVersion** The version of the Appraiser file that is generating the events. +- **BlockingApplication** Same as NeedsDismissAction. +- **NeedsDismissAction** Indicates if a dismissible message is needed to warn the user about a potential loss of data due to DRM deprecation. +- **WmdrmApiResult** Raw value of the API used to gather DRM state. +- **WmdrmCdRipped** Indicates if the system has any files encrypted with personal DRM, which was used for ripped CDs. +- **WmdrmIndicators** WmdrmCdRipped OR WmdrmPurchased. +- **WmdrmInUse** WmdrmIndicators AND dismissible block in setup was not dismissed. +- **WmdrmNonPermanent** Indicates if the system has any files with non-permanent licenses. +- **WmdrmPurchased** Indicates if the system has any files with permanent licenses. + + +### Microsoft.Windows.Appraiser.General.WmdrmStartSync + +This event indicates that a new set of WmdrmAdd events will be sent. + +This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedeviceinventorychange). + +The following fields are available: + +- **AppraiserVersion** The version of the Appraiser file that is generating the events. + + +## Census events + +### Census.App + +Provides information on IE and Census versions running on the device + +The following fields are available: + +- **AppraiserEnterpriseErrorCode** The error code of the last Appraiser enterprise run. +- **AppraiserErrorCode** The error code of the last Appraiser run. +- **AppraiserRunEndTimeStamp** The end time of the last Appraiser run. +- **AppraiserRunIsInProgressOrCrashed** Flag that indicates if the Appraiser run is in progress or has crashed. +- **AppraiserRunStartTimeStamp** The start time of the last Appraiser run. +- **AppraiserTaskEnabled** Whether the Appraiser task is enabled. +- **AppraiserTaskExitCode** The Appraiser task exist code. +- **AppraiserTaskLastRun** The last runtime for the Appraiser task. +- **CensusVersion** The version of Census that generated the current data for this device. +- **IEVersion** The version of Internet Explorer that is running on the device. + + +### Census.Battery + +This event sends type and capacity data about the battery on the device, as well as the number of connected standby devices in use, type to help keep Windows up to date. + +The following fields are available: + +- **InternalBatteryCapablities** Represents information about what the battery is capable of doing. +- **InternalBatteryCapacityCurrent** Represents the battery's current fully charged capacity in mWh (or relative). Compare this value to DesignedCapacity  to estimate the battery's wear. +- **InternalBatteryCapacityDesign** Represents the theoretical capacity of the battery when new, in mWh. +- **InternalBatteryNumberOfCharges** Provides the number of battery charges. This is used when creating new products and validating that existing products meets targeted functionality performance. +- **IsAlwaysOnAlwaysConnectedCapable** Represents whether the battery enables the device to be AlwaysOnAlwaysConnected . Boolean value. + + +### Census.Camera + +This event sends data about the resolution of cameras on the device, to help keep Windows up to date. + +The following fields are available: + +- **FrontFacingCameraResolution** Represents the resolution of the front facing camera in megapixels. If a front facing camera does not exist, then the value is 0. +- **RearFacingCameraResolution** Represents the resolution of the rear facing camera in megapixels. If a rear facing camera does not exist, then the value is 0. + + +### Census.Enterprise + +This event sends data about Azure presence, type, and cloud domain use in order to provide an understanding of the use and integration of devices in an enterprise, cloud, and server environment. + +The following fields are available: + +- **AADDeviceId** Azure Active Directory device ID. +- **AzureOSIDPresent** Represents the field used to identify an Azure machine. +- **AzureVMType** Represents whether the instance is Azure VM PAAS, Azure VM IAAS or any other VMs. +- **CDJType** Represents the type of cloud domain joined for the machine. +- **CommercialId** Represents the GUID for the commercial entity which the device is a member of.  Will be used to reflect insights back to customers. +- **ContainerType** The type of container, such as process or virtual machine hosted. +- **EnrollmentType** Defines the type of MDM enrollment on the device. +- **HashedDomain** The hashed representation of the user domain used for login. +- **IsCloudDomainJoined** Is this device joined to an Azure Active Directory (AAD) tenant? true/false +- **IsDERequirementMet** Represents if the device can do device encryption. +- **IsDeviceProtected** Represents if Device protected by BitLocker/Device Encryption +- **IsDomainJoined** Indicates whether a machine is joined to a domain. +- **IsEDPEnabled** Represents if Enterprise data protected on the device. +- **IsMDMEnrolled** Whether the device has been MDM Enrolled or not. +- **MPNId** Returns the Partner ID/MPN ID from Regkey. HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\DeployID +- **SCCMClientId** This ID correlate systems that send data to Compat Analytics (OMS) and other OMS based systems with systems in an Enterprise SCCM environment. +- **ServerFeatures** Represents the features installed on a Windows   Server. This can be used by developers and administrators who need to automate the process of determining the features installed on a set of server computers. +- **SystemCenterID** The SCCM ID is an anonymized one-way hash of the Active Directory Organization identifier + + +### Census.Firmware + +This event sends data about the BIOS and startup embedded in the device, to help keep Windows up to date. + +The following fields are available: + +- **FirmwareManufacturer** Represents the manufacturer of the device's firmware (BIOS). +- **FirmwareReleaseDate** Represents the date the current firmware was released. +- **FirmwareType** Represents the firmware type. The various types can be unknown, BIOS, UEFI. +- **FirmwareVersion** Represents the version of the current firmware. + + +### Census.Flighting + +This event sends Windows Insider data from customers participating in improvement testing and feedback programs, to help keep Windows up to date. + +The following fields are available: + +- **DeviceSampleRate** The telemetry sample rate assigned to the device. +- **DriverTargetRing** No content is currently available. +- **EnablePreviewBuilds** Used to enable Windows Insider builds on a device. +- **FlightIds** A list of the different Windows Insider builds on this device. +- **FlightingBranchName** The name of the Windows Insider branch currently used by the device. +- **IsFlightsDisabled** Represents if the device is participating in the Windows Insider program. +- **MSA_Accounts** Represents a list of hashed IDs of the Microsoft Accounts that are flighting (pre-release builds) on this device. +- **SSRK** Retrieves the mobile targeting settings. + + +### Census.Hardware + +This event sends data about the device, including hardware type, OEM brand, model line, model, telemetry level setting, and TPM support, to help keep Windows up to date. + +The following fields are available: + +- **ActiveMicCount** The number of active microphones attached to the device. +- **ChassisType** Represents the type of device chassis, such as desktop or low profile desktop. The possible values can range between 1 - 36. +- **ComputerHardwareID** Identifies a device class that is represented by a hash of different SMBIOS fields. +- **D3DMaxFeatureLevel** Supported Direct3D version. +- **DeviceForm** Indicates the form as per the device classification. +- **DeviceName** The device name that is set by the user. +- **DigitizerSupport** Is a digitizer supported? +- **DUID** The device unique ID. +- **Gyroscope** Indicates whether the device has a gyroscope (a mechanical component that measures and maintains orientation). +- **InventoryId** The device ID used for compatibility testing. +- **Magnetometer** Indicates whether the device has a magnetometer (a mechanical component that works like a compass). +- **NFCProximity** Indicates whether the device supports NFC (a set of communication protocols that helps establish communication when applicable devices are brought close together.) +- **OEMDigitalMarkerFileName** The name of the file placed in the \Windows\system32\drivers directory that specifies the OEM and model name of the device. +- **OEMManufacturerName** The device manufacturer name. The OEMName for an inactive device is not reprocessed even if the clean OEM name is changed at a later date. +- **OEMModelBaseBoard** The baseboard model used by the OEM. +- **OEMModelBaseBoardVersion** Differentiates between developer and retail devices. +- **OEMModelName** The device model name. +- **OEMModelNumber** The device model number. +- **OEMModelSKU** The device edition that is defined by the manufacturer. +- **OEMModelSystemFamily** The system family set on the device by an OEM. +- **OEMModelSystemVersion** The system model version set on the device by the OEM. +- **OEMOptionalIdentifier** A Microsoft assigned value that represents a specific OEM subsidiary. +- **OEMSerialNumber** The serial number of the device that is set by the manufacturer. +- **PhoneManufacturer** The friendly name of the phone manufacturer. +- **PowerPlatformRole** The OEM preferred power management profile. It's used to help to identify the basic form factor of the device. +- **SoCName** The firmware manufacturer of the device. +- **StudyID** Used to identify retail and non-retail device. +- **TelemetryLevel** The telemetry level the user has opted into, such as Basic or Enhanced. +- **TelemetryLevelLimitEnhanced** The telemetry level for Windows Analytics-based solutions. +- **TelemetrySettingAuthority** Determines who set the telemetry level, such as GP, MDM, or the user. +- **TPMManufacturerId** The ID of the TPM manufacturer. +- **TPMManufacturerVersion** The version of the TPM manufacturer. +- **TPMVersion** The supported Trusted Platform Module (TPM) on the device. If no TPM is present, the value is 0. +- **VoiceSupported** Does the device have a cellular radio capable of making voice calls? + + +### Census.Memory + +This event sends data about the memory on the device, including ROM and RAM, to help keep Windows up to date. + +The following fields are available: + +- **TotalPhysicalRAM** Represents the physical memory (in MB). +- **TotalVisibleMemory** Represents the memory that is not reserved by the system. + + +### Census.Network + +This event sends data about the mobile and cellular network used by the device (mobile service provider, network, device ID, and service cost factors), to help keep Windows up to date. + +The following fields are available: + +- **IMEI0** Represents the International Mobile Station Equipment Identity. This number is usually unique and used by the mobile operator to distinguish different phone hardware. Microsoft does not have access to mobile operator billing data so collecting this data does not expose or identify the user. The two fields represent phone with dual sim coverage. +- **IMEI1** Represents the International Mobile Station Equipment Identity. This number is usually unique and used by the mobile operator to distinguish different phone hardware. Microsoft does not have access to mobile operator billing data so collecting this data does not expose or identify the user. The two fields represent phone with dual sim coverage. +- **MCC0** Represents the Mobile Country Code (MCC). It used with the Mobile Network Code (MNC) to uniquely identify a mobile network operator. The two fields represent phone with dual sim coverage. +- **MCC1** Represents the Mobile Country Code (MCC). It used with the Mobile Network Code (MNC) to uniquely identify a mobile network operator. The two fields represent phone with dual sim coverage. +- **MEID** Represents the Mobile Equipment Identity (MEID). MEID is a worldwide unique phone ID assigned to CDMA phones. MEID replaces electronic serial number (ESN), and is equivalent to IMEI for GSM and WCDMA phones. Microsoft does not have access to mobile operator billing data so collecting this data does not expose or identify the user. +- **MNC0** Retrieves the Mobile Network Code (MNC). It used with the Mobile Country Code (MCC) to uniquely identify a mobile network operator. The two fields represent phone with dual sim coverage. +- **MNC1** Retrieves the Mobile Network Code (MNC). It used with the Mobile Country Code (MCC) to uniquely identify a mobile network operator. The two fields represent phone with dual sim coverage. +- **MobileOperatorBilling** Represents the telephone company that provides services for mobile phone users. +- **MobileOperatorCommercialized** Represents which reseller and geography the phone is commercialized for. This is the set of values on the phone for who and where it was intended to be used. For example, the commercialized mobile operator code AT&T in the US would be ATT-US. +- **MobileOperatorNetwork0** Represents the operator of the current mobile network that the device is used on. (AT&T, T-Mobile, Vodafone). The two fields represent phone with dual sim coverage. +- **MobileOperatorNetwork1** Represents the operator of the current mobile network that the device is used on. (AT&T, T-Mobile, Vodafone). The two fields represent phone with dual sim coverage. +- **NetworkAdapterGUID** The GUID of the primary network adapter. +- **NetworkCost** Represents the network cost associated with a connection. +- **SPN0** Retrieves the Service Provider Name (SPN). For example, these might be AT&T, Sprint, T-Mobile, or Verizon. The two fields represent phone with dual sim coverage. +- **SPN1** Retrieves the Service Provider Name (SPN). For example, these might be AT&T, Sprint, T-Mobile, or Verizon. The two fields represent phone with dual sim coverage. + + +### Census.OS + +This event sends data about the operating system such as the version, locale, update service configuration, when and how it was originally installed, and whether it is a virtual device, to help keep Windows up to date. + +The following fields are available: + +- **ActivationChannel** Retrieves the retail license key or Volume license key for a machine. +- **AssignedAccessStatus** Kiosk configuration mode. +- **CompactOS** Indicates if the Compact OS feature from Win10 is enabled. +- **DeveloperUnlockStatus** Represents if a device has been developer unlocked by the user or Group Policy. +- **DeviceTimeZone** The time zone that is set on the device. Example: Pacific Standard Time +- **GenuineState** Retrieves the ID Value specifying the OS Genuine check. +- **InstallationType** Retrieves the type of OS installation. (Clean, Upgrade, Reset, Refresh, Update). +- **InstallLanguage** The first language installed on the user machine. +- **IsDeviceRetailDemo** Retrieves if the device is running in demo mode. +- **IsEduData** Returns Boolean if the education data policy is enabled. +- **IsPortableOperatingSystem** Retrieves whether OS is running Windows-To-Go +- **IsSecureBootEnabled** Retrieves whether Boot chain is signed under UEFI. +- **LanguagePacks** The list of language packages installed on the device. +- **LicenseStateReason** Retrieves why (or how) a system is licensed or unlicensed. The HRESULT may indicate an error code that indicates a key blocked error, or it may indicate that we are running an OS License granted by the MS store. +- **OA3xOriginalProductKey** Retrieves the License key stamped by the OEM to the machine. +- **OSEdition** Retrieves the version of the current OS. +- **OSInstallType** Retrieves a numeric description of what install was used on the device i.e. clean, upgrade, refresh, reset, etc +- **OSOOBEDateTime** Retrieves Out of Box Experience (OOBE) Date in Coordinated Universal Time (UTC). +- **OSSKU** Retrieves the Friendly Name of OS Edition. +- **OSSubscriptionStatus** Represents the existing status for enterprise subscription feature for PRO machines. +- **OSSubscriptionTypeId** Returns boolean for enterprise subscription feature for selected PRO machines. +- **OSTimeZoneBiasInMins** Retrieves the time zone set on machine. +- **OSUILocale** Retrieves the locale of the UI that is currently used by the OS. +- **ProductActivationResult** Returns Boolean if the OS Activation was successful. +- **ProductActivationTime** Returns the OS Activation time for tracking piracy issues. +- **ProductKeyID2** Retrieves the License key if the machine is updated with a new license key. +- **RACw7Id** Retrieves the Microsoft Reliability Analysis Component (RAC) Win7 Identifier. RAC is used to monitor and analyze system usage and reliability. +- **ServiceMachineIP** Retrieves the IP address of the KMS host used for anti-piracy. +- **ServiceMachinePort** Retrieves the port of the KMS host used for anti-piracy. +- **ServiceProductKeyID** Retrieves the License key of the KMS +- **SharedPCMode** Returns Boolean for education devices used as shared cart +- **Signature** Retrieves if it is a signature machine sold by Microsoft store. +- **SLICStatus** Whether a SLIC table exists on the device. +- **SLICVersion** Returns OS type/version from SLIC table. + + +### Census.PrivacySettings + +This event provides information about the device level privacy settings and whether device-level access was granted to these capabilities. Not all settings are applicable to all devices. Each field records the consent state for the corresponding privacy setting. The consent state is encoded as a 16-bit signed integer, where the first 8 bits represents the effective consent value, and the last 8 bits represent the authority that set the value. The effective consent (first 8 bits) is one of the following values: -3 = unexpected consent value, -2 = value was not requested, -1 = an error occurred while attempting to retrieve the value, 0 = undefined, 1 = allow, 2 = deny, 3 = prompt. The consent authority (last 8 bits) is one of the following values: -3 = unexpected authority, -2 = value was not requested, -1 = an error occurred while attempting to retrieve the value, 0 = system, 1 = a higher authority (a gating setting, the system-wide setting, or a group policy), 2 = advertising ID group policy, 3 = advertising ID policy for child account, 4 = privacy setting provider doesn't know the actual consent authority, 5 = consent was not configured and a default set in code was used, 6 = system default, 7 = organization policy, 8 = OneSettings. + +The following fields are available: + +- **Activity** Current state of the activity history setting. +- **ActivityHistoryCloudSync** Current state of the activity history cloud sync setting. +- **ActivityHistoryCollection** Current state of the activity history collection setting. +- **AdvertisingId** Current state of the advertising ID setting. +- **AppDiagnostics** Current state of the app diagnostics setting. +- **Appointments** Current state of the calendar setting. +- **Bluetooth** Current state of the Bluetooth capability setting. +- **BluetoothSync** Current state of the Bluetooth sync capability setting. +- **BroadFileSystemAccess** Current state of the broad file system access setting. +- **CellularData** Current state of the cellular data capability setting. +- **Chat** Current state of the chat setting. +- **Contacts** Current state of the contacts setting. +- **DocumentsLibrary** Current state of the documents library setting. +- **Email** Current state of the email setting. +- **FindMyDevice** Current state of the "find my device" setting. +- **GazeInput** Current state of the gaze input setting. +- **HumanInterfaceDevice** Current state of the human interface device setting. +- **InkTypeImprovement** Current state of the improve inking and typing setting. +- **Location** Current state of the location setting. +- **LocationHistory** Current state of the location history setting. +- **LocationHistoryCloudSync** No content is currently available. +- **LocationHistoryOnTimeline** No content is currently available. +- **Microphone** Current state of the microphone setting. +- **PhoneCall** Current state of the phone call setting. +- **PhoneCallHistory** Current state of the call history setting. +- **PicturesLibrary** Current state of the pictures library setting. +- **Radios** Current state of the radios setting. +- **SensorsCustom** Current state of the custom sensor setting. +- **SerialCommunication** Current state of the serial communication setting. +- **Sms** Current state of the text messaging setting. +- **SpeechPersonalization** Current state of the speech services setting. +- **USB** Current state of the USB setting. +- **UserAccountInformation** Current state of the account information setting. +- **UserDataTasks** Current state of the tasks setting. +- **UserNotificationListener** Current state of the notifications setting. +- **VideosLibrary** Current state of the videos library setting. +- **Webcam** Current state of the camera setting. +- **WiFiDirect** Current state of the Wi-Fi direct setting. + + +### Census.Processor + +Provides information on several important data points about Processor settings + +The following fields are available: + +- **KvaShadow** This is the micro code information of the processor. +- **MMSettingOverride** Microcode setting of the processor. +- **MMSettingOverrideMask** Microcode setting override of the processor. +- **PreviousUpdateRevision** Previous microcode revision +- **ProcessorArchitecture** Retrieves the processor architecture of the installed operating system. +- **ProcessorClockSpeed** Clock speed of the processor in MHz. +- **ProcessorCores** Number of logical cores in the processor. +- **ProcessorIdentifier** Processor Identifier of a manufacturer. +- **ProcessorManufacturer** Name of the processor manufacturer. +- **ProcessorModel** Name of the processor model. +- **ProcessorPhysicalCores** Number of physical cores in the processor. +- **ProcessorUpdateRevision** The microcode revision. +- **ProcessorUpdateStatus** Enum value that represents the processor microcode load status +- **SocketCount** Count of CPU sockets. +- **SpeculationControl** If the system has enabled protections needed to validate the speculation control vulnerability. + + +### Census.Security + +This event provides information on about security settings used to help keep Windows up to date and secure. + +The following fields are available: + +- **AvailableSecurityProperties** This field helps to enumerate and report state on the relevant security properties for Device Guard. +- **CGRunning** Credential Guard isolates and hardens key system and user secrets against compromise, helping to minimize the impact and breadth of a Pass the Hash style attack in the event that malicious code is already running via a local or network based vector. This field tells if Credential Guard is running. +- **DGState** This field summarizes the Device Guard state. +- **HVCIRunning** Hypervisor Code Integrity (HVCI) enables Device Guard to help protect kernel mode processes and drivers from vulnerability exploits and zero days. HVCI uses the processor’s functionality to force all software running in kernel mode to safely allocate memory. This field tells if HVCI is running. +- **IsSawGuest** Indicates whether the device is running as a Secure Admin Workstation Guest. +- **IsSawHost** Indicates whether the device is running as a Secure Admin Workstation Host. +- **RequiredSecurityProperties** Describes the required security properties to enable virtualization-based security. +- **SecureBootCapable** Systems that support Secure Boot can have the feature turned off via BIOS. This field tells if the system is capable of running Secure Boot, regardless of the BIOS setting. +- **SModeState** The Windows S mode trail state. +- **VBSState** Virtualization-based security (VBS) uses the hypervisor to help protect the kernel and other parts of the operating system. Credential Guard and Hypervisor Code Integrity (HVCI) both depend on VBS to isolate/protect secrets, and kernel-mode code integrity validation. VBS has a tri-state that can be Disabled, Enabled, or Running. + + +### Census.Speech + +This event is used to gather basic speech settings on the device. + +The following fields are available: + +- **AboveLockEnabled** Cortana setting that represents if Cortana can be invoked when the device is locked. +- **GPAllowInputPersonalization** Indicates if a Group Policy setting has enabled speech functionalities. +- **HolographicSpeechInputDisabled** Holographic setting that represents if the attached HMD devices have speech functionality disabled by the user. +- **HolographicSpeechInputDisabledRemote** Indicates if a remote policy has disabled speech functionalities for the HMD devices. +- **KeyVer** Version information for the census speech event. +- **KWSEnabled** Cortana setting that represents if a user has enabled the "Hey Cortana" keyword spotter (KWS). +- **MDMAllowInputPersonalization** Indicates if an MDM policy has enabled speech functionalities. +- **RemotelyManaged** Indicates if the device is being controlled by a remote administrator (MDM or Group Policy) in the context of speech functionalities. +- **SpeakerIdEnabled** Cortana setting that represents if keyword detection has been trained to try to respond to a single user's voice. +- **SpeechServicesEnabled** Windows setting that represents whether a user is opted-in for speech services on the device. +- **SpeechServicesValueSource** Indicates the deciding factor for the effective online speech recognition privacy policy settings: remote admin, local admin, or user preference. + + +### Census.Storage + +This event sends data about the total capacity of the system volume and primary disk, to help keep Windows up to date. + +The following fields are available: + +- **PrimaryDiskTotalCapacity** Retrieves the amount of disk space on the primary disk of the device in MB. +- **PrimaryDiskType** Retrieves an enumerator value of type STORAGE_BUS_TYPE that indicates the type of bus to which the device is connected. This should be used to interpret the raw device properties at the end of this structure (if any). +- **StorageReservePassedPolicy** No content is currently available. +- **SystemVolumeTotalCapacity** Retrieves the size of the partition that the System volume is installed on in MB. + + +### Census.Userdefault + +This event sends data about the current user's default preferences for browser and several of the most popular extensions and protocols, to help keep Windows up to date. + +The following fields are available: + +- **CalendarType** The calendar identifiers that are used to specify different calendars. +- **DefaultApp** The current uer's default program selected for the following extension or protocol: .html, .htm, .jpg, .jpeg, .png, .mp3, .mp4, .mov, .pdf. +- **DefaultBrowserProgId** The ProgramId of the current user's default browser. +- **LongDateFormat** The long date format the user has selected. +- **ShortDateFormat** The short date format the user has selected. + + +### Census.UserDisplay + +This event sends data about the logical/physical display size, resolution and number of internal/external displays, and VRAM on the system, to help keep Windows up to date. + +The following fields are available: + +- **InternalPrimaryDisplayLogicalDPIX** Retrieves the logical DPI in the x-direction of the internal display. +- **InternalPrimaryDisplayLogicalDPIY** Retrieves the logical DPI in the y-direction of the internal display. +- **InternalPrimaryDisplayPhysicalDPIX** Retrieves the physical DPI in the x-direction of the internal display. +- **InternalPrimaryDisplayPhysicalDPIY** Retrieves the physical DPI in the y-direction of the internal display. +- **InternalPrimaryDisplayResolutionHorizontal** Retrieves the number of pixels in the horizontal direction of the internal display. +- **InternalPrimaryDisplayResolutionVertical** Retrieves the number of pixels in the vertical direction of the internal display. +- **InternalPrimaryDisplaySizePhysicalH** Retrieves the physical horizontal length of the display in mm. Used for calculating the diagonal length in inches . +- **InternalPrimaryDisplaySizePhysicalY** Retrieves the physical vertical length of the display in mm. Used for calculating the diagonal length in inches +- **NumberofExternalDisplays** Retrieves the number of external displays connected to the machine +- **NumberofInternalDisplays** Retrieves the number of internal displays in a machine. +- **VRAMDedicated** Retrieves the video RAM in MB. +- **VRAMDedicatedSystem** Retrieves the amount of memory on the dedicated video card. +- **VRAMSharedSystem** Retrieves the amount of RAM memory that the video card can use. + + +### Census.UserNLS + +This event sends data about the default app language, input, and display language preferences set by the user, to help keep Windows up to date. + +The following fields are available: + +- **DefaultAppLanguage** The current user Default App Language. +- **DisplayLanguage** The current user preferred Windows Display Language. +- **HomeLocation** The current user location, which is populated using GetUserGeoId() function. +- **KeyboardInputLanguages** The Keyboard input languages installed on the device. +- **SpeechInputLanguages** The Speech Input languages installed on the device. + + +### Census.UserPrivacySettings + +This event provides information about the current users privacy settings and whether device-level access was granted to these capabilities. Not all settings are applicable to all devices. Each field records the consent state for the corresponding privacy setting. The consent state is encoded as a 16-bit signed integer, where the first 8 bits represents the effective consent value, and the last 8 bits represents the authority that set the value. The effective consent is one of the following values: -3 = unexpected consent value, -2 = value was not requested, -1 = an error occurred while attempting to retrieve the value, 0 = undefined, 1 = allow, 2 = deny, 3 = prompt. The consent authority is one of the following values: -3 = unexpected authority, -2 = value was not requested, -1 = an error occurred while attempting to retrieve the value, 0 = user, 1 = a higher authority (a gating setting, the system-wide setting, or a group policy), 2 = advertising ID group policy, 3 = advertising ID policy for child account, 4 = privacy setting provider doesn't know the actual consent authority, 5 = consent was not configured and a default set in code was used, 6 = system default, 7 = organization policy, 8 = OneSettings. + +The following fields are available: + +- **Activity** Current state of the activity history setting. +- **ActivityHistoryCloudSync** Current state of the activity history cloud sync setting. +- **ActivityHistoryCollection** Current state of the activity history collection setting. +- **AdvertisingId** Current state of the advertising ID setting. +- **AppDiagnostics** Current state of the app diagnostics setting. +- **Appointments** Current state of the calendar setting. +- **Bluetooth** Current state of the Bluetooth capability setting. +- **BluetoothSync** Current state of the Bluetooth sync capability setting. +- **BroadFileSystemAccess** Current state of the broad file system access setting. +- **CellularData** Current state of the cellular data capability setting. +- **Chat** Current state of the chat setting. +- **Contacts** Current state of the contacts setting. +- **DocumentsLibrary** Current state of the documents library setting. +- **Email** Current state of the email setting. +- **GazeInput** Current state of the gaze input setting. +- **HumanInterfaceDevice** Current state of the human interface device setting. +- **InkTypeImprovement** Current state of the improve inking and typing setting. +- **InkTypePersonalization** Current state of the inking and typing personalization setting. +- **Location** Current state of the location setting. +- **LocationHistory** Current state of the location history setting. +- **LocationHistoryCloudSync** No content is currently available. +- **LocationHistoryOnTimeline** No content is currently available. +- **Microphone** Current state of the microphone setting. +- **PhoneCall** Current state of the phone call setting. +- **PhoneCallHistory** Current state of the call history setting. +- **PicturesLibrary** Current state of the pictures library setting. +- **Radios** Current state of the radios setting. +- **SensorsCustom** Current state of the custom sensor setting. +- **SerialCommunication** Current state of the serial communication setting. +- **Sms** Current state of the text messaging setting. +- **SpeechPersonalization** Current state of the speech services setting. +- **USB** Current state of the USB setting. +- **UserAccountInformation** Current state of the account information setting. +- **UserDataTasks** Current state of the tasks setting. +- **UserNotificationListener** Current state of the notifications setting. +- **VideosLibrary** Current state of the videos library setting. +- **Webcam** Current state of the camera setting. +- **WiFiDirect** Current state of the Wi-Fi direct setting. + + +### Census.VM + +This event sends data indicating whether virtualization is enabled on the device, and its various characteristics, to help keep Windows up to date. + +The following fields are available: + +- **CloudService** Indicates which cloud service, if any, that this virtual machine is running within. +- **HyperVisor** Retrieves whether the current OS is running on top of a Hypervisor. +- **IOMMUPresent** Represents if an input/output memory management unit (IOMMU) is present. +- **IsVDI** Is the device using Virtual Desktop Infrastructure? +- **IsVirtualDevice** Retrieves that when the Hypervisor is Microsoft's Hyper-V Hypervisor or other Hv#1 Hypervisor, this field will be set to FALSE for the Hyper-V host OS and TRUE for any guest OS's. This field should not be relied upon for non-Hv#1 Hypervisors. +- **SLATSupported** Represents whether Second Level Address Translation (SLAT) is supported by the hardware. +- **VirtualizationFirmwareEnabled** Represents whether virtualization is enabled in the firmware. + + +### Census.WU + +This event sends data about the Windows update server and other App store policies, to help keep Windows up to date. + +The following fields are available: + +- **AppraiserGatedStatus** Indicates whether a device has been gated for upgrading. +- **AppStoreAutoUpdate** Retrieves the Appstore settings for auto upgrade. (Enable/Disabled). +- **AppStoreAutoUpdateMDM** Retrieves the App Auto Update value for MDM: 0 - Disallowed. 1 - Allowed. 2 - Not configured. Default: [2] Not configured +- **AppStoreAutoUpdatePolicy** Retrieves the Microsoft Store App Auto Update group policy setting +- **DelayUpgrade** Retrieves the Windows upgrade flag for delaying upgrades. +- **OSAssessmentFeatureOutOfDate** How many days has it been since a the last feature update was released but the device did not install it? +- **OSAssessmentForFeatureUpdate** Is the device is on the latest feature update? +- **OSAssessmentForQualityUpdate** Is the device on the latest quality update? +- **OSAssessmentForSecurityUpdate** Is the device on the latest security update? +- **OSAssessmentQualityOutOfDate** How many days has it been since a the last quality update was released but the device did not install it? +- **OSAssessmentReleaseInfoTime** The freshness of release information used to perform an assessment. +- **OSRollbackCount** The number of times feature updates have rolled back on the device. +- **OSRolledBack** A flag that represents when a feature update has rolled back during setup. +- **OSUninstalled** A flag that represents when a feature update is uninstalled on a device . +- **OSWUAutoUpdateOptions** Retrieves the auto update settings on the device. +- **OSWUAutoUpdateOptionsSource** The source of auto update setting that appears in the OSWUAutoUpdateOptions field. For example: Group Policy (GP), Mobile Device Management (MDM), and Default. +- **UninstallActive** A flag that represents when a device has uninstalled a previous upgrade recently. +- **UpdateServiceURLConfigured** Retrieves if the device is managed by Windows Server Update Services (WSUS). +- **WUDeferUpdatePeriod** Retrieves if deferral is set for Updates. +- **WUDeferUpgradePeriod** Retrieves if deferral is set for Upgrades. +- **WUDODownloadMode** Retrieves whether DO is turned on and how to acquire/distribute updates Delivery Optimization (DO) allows users to deploy previously downloaded WU updates to other devices on the same network. +- **WUMachineId** Retrieves the Windows Update (WU) Machine Identifier. +- **WUPauseState** Retrieves WU setting to determine if updates are paused. +- **WUServer** Retrieves the HTTP(S) URL of the WSUS server that is used by Automatic Updates and API callers (by default). + + +## Common data extensions + +### Common Data Extensions.app + +Describes the properties of the running application. This extension could be populated by a client app or a web app. + +The following fields are available: + +- **asId** An integer value that represents the app session. This value starts at 0 on the first app launch and increments after each subsequent app launch per boot session. +- **env** The environment from which the event was logged. +- **expId** Associates a flight, such as an OS flight, or an experiment, such as a web site UX experiment, with an event. +- **id** Represents a unique identifier of the client application currently loaded in the process producing the event; and is used to group events together and understand usage pattern, errors by application. +- **locale** The locale of the app. +- **name** The name of the app. +- **userId** The userID as known by the application. +- **ver** Represents the version number of the application. Used to understand errors by Version, Usage by Version across an app. + + +### Common Data Extensions.container + +Describes the properties of the container for events logged within a container. + +The following fields are available: + +- **epoch** An ID that's incremented for each SDK initialization. +- **localId** The device ID as known by the client. +- **osVer** The operating system version. +- **seq** An ID that's incremented for each event. +- **type** The container type. Examples: Process or VMHost + + +### Common Data Extensions.cs + +Describes properties related to the schema of the event. + +The following fields are available: + +- **sig** A common schema signature that identifies new and modified event schemas. + + +### Common Data Extensions.device + +Describes the device-related fields. + +The following fields are available: + +- **deviceClass** The device classification. For example, Desktop, Server, or Mobile. +- **localId** A locally-defined unique ID for the device. This is not the human-readable device name. Most likely equal to the value stored at HKLM\Software\Microsoft\SQMClient\MachineId +- **make** Device manufacturer. +- **model** Device model. + + +### Common Data Extensions.Envelope + +Represents an envelope that contains all of the common data extensions. + +The following fields are available: + +- **cV** Represents the Correlation Vector: A single field for tracking partial order of related telemetry events across component boundaries. +- **data** Represents the optional unique diagnostic data for a particular event schema. +- **ext_app** Describes the properties of the running application. This extension could be populated by either a client app or a web app. See [Common Data Extensions.app](#common-data-extensionsapp). +- **ext_container** Describes the properties of the container for events logged within a container. See [Common Data Extensions.container](#common-data-extensionscontainer). +- **ext_cs** Describes properties related to the schema of the event. See [Common Data Extensions.cs](#common-data-extensionscs). +- **ext_device** Describes the device-related fields. See [Common Data Extensions.device](#common-data-extensionsdevice). +- **ext_os** Describes the operating system properties that would be populated by the client. See [Common Data Extensions.os](#common-data-extensionsos). +- **ext_receipts** Describes the fields related to time as provided by the client for debugging purposes. See [Common Data Extensions.receipts](#common-data-extensionsreceipts). +- **ext_sdk** Describes the fields related to a platform library required for a specific SDK. See [Common Data Extensions.sdk](#common-data-extensionssdk). +- **ext_user** Describes the fields related to a user. See [Common Data Extensions.user](#common-data-extensionsuser). +- **ext_utc** Describes the fields that might be populated by a logging library on Windows. See [Common Data Extensions.utc](#common-data-extensionsutc). +- **ext_xbl** Describes the fields related to XBOX Live. See [Common Data Extensions.xbl](#common-data-extensionsxbl). +- **flags** Represents a collection of bits that describe how the event should be processed by the Connected User Experience and Telemetry component pipeline. The lowest-order byte is the event persistence. The next byte is the event latency. +- **iKey** Represents an ID for applications or other logical groupings of events. +- **name** Represents the uniquely qualified name for the event. +- **popSample** Represents the effective sample rate for this event at the time it was generated by a client. +- **time** Represents the event date time in Coordinated Universal Time (UTC) when the event was generated on the client. This should be in ISO 8601 format. +- **ver** Represents the major and minor version of the extension. + + +### Common Data Extensions.os + +Describes some properties of the operating system. + +The following fields are available: + +- **bootId** An integer value that represents the boot session. This value starts at 0 on first boot after OS install and increments after every reboot. +- **expId** Represents the experiment ID. The standard for associating a flight, such as an OS flight (pre-release build), or an experiment, such as a web site UX experiment, with an event is to record the flight / experiment IDs in Part A of the common schema. +- **locale** Represents the locale of the operating system. +- **name** Represents the operating system name. +- **ver** Represents the major and minor version of the extension. + + +### Common Data Extensions.receipts + +Represents various time information as provided by the client and helps for debugging purposes. + +The following fields are available: + +- **originalTime** The original event time. +- **uploadTime** The time the event was uploaded. + + +### Common Data Extensions.sdk + +Used by platform specific libraries to record fields that are required for a specific SDK. + +The following fields are available: + +- **epoch** An ID that is incremented for each SDK initialization. +- **installId** An ID that's created during the initialization of the SDK for the first time. +- **libVer** The SDK version. +- **seq** An ID that is incremented for each event. + + +### Common Data Extensions.user + +Describes the fields related to a user. + +The following fields are available: + +- **authId** This is an ID of the user associated with this event that is deduced from a token such as a Microsoft Account ticket or an XBOX token. +- **locale** The language and region. +- **localId** Represents a unique user identity that is created locally and added by the client. This is not the user's account ID. + + +### Common Data Extensions.utc + +Describes the properties that could be populated by a logging library on Windows. + +The following fields are available: + +- **aId** Represents the ETW ActivityId. Logged via TraceLogging or directly via ETW. +- **bSeq** Upload buffer sequence number in the format: buffer identifier:sequence number +- **cat** Represents a bitmask of the ETW Keywords associated with the event. +- **cpId** The composer ID, such as Reference, Desktop, Phone, Holographic, Hub, IoT Composer. +- **epoch** Represents the epoch and seqNum fields, which help track how many events were fired and how many events were uploaded, and enables identification of data lost during upload and de-duplication of events on the ingress server. +- **flags** Represents the bitmap that captures various Windows specific flags. +- **mon** Combined monitor and event sequence numbers in the format: monitor sequence : event sequence +- **op** Represents the ETW Op Code. +- **raId** Represents the ETW Related ActivityId. Logged via TraceLogging or directly via ETW. +- **seq** Represents the sequence field used to track absolute order of uploaded events. It is an incrementing identifier for each event added to the upload queue. The Sequence helps track how many events were fired and how many events were uploaded and enables identification of data lost during upload and de-duplication of events on the ingress server. +- **stId** Represents the Scenario Entry Point ID. This is a unique GUID for each event in a diagnostic scenario. This used to be Scenario Trigger ID. + + +### Common Data Extensions.xbl + +Describes the fields that are related to XBOX Live. + +The following fields are available: + +- **claims** Any additional claims whose short claim name hasn't been added to this structure. +- **did** XBOX device ID +- **dty** XBOX device type +- **dvr** The version of the operating system on the device. +- **eid** A unique ID that represents the developer entity. +- **exp** Expiration time +- **ip** The IP address of the client device. +- **nbf** Not before time +- **pid** A comma separated list of PUIDs listed as base10 numbers. +- **sbx** XBOX sandbox identifier +- **sid** The service instance ID. +- **sty** The service type. +- **tid** The XBOX Live title ID. +- **tvr** The XBOX Live title version. +- **uts** A bit field, with 2 bits being assigned to each user ID listed in xid. This field is omitted if all users are retail accounts. +- **xid** A list of base10-encoded XBOX User IDs. + + +## Common data fields + +### Ms.Device.DeviceInventoryChange + +Describes the installation state for all hardware and software components available on a particular device. + +The following fields are available: + +- **action** The change that was invoked on a device inventory object. +- **inventoryId** Device ID used for Compatibility testing +- **objectInstanceId** Object identity which is unique within the device scope. +- **objectType** Indicates the object type that the event applies to. +- **syncId** A string used to group StartSync, EndSync, Add, and Remove operations that belong together. This field is unique by Sync period and is used to disambiguate in situations where multiple agents perform overlapping inventories for the same object. + + +## Component-based servicing events + +### CbsServicingProvider.CbsCapabilityEnumeration + +This event reports on the results of scanning for optional Windows content on Windows Update. + +The following fields are available: + +- **architecture** Indicates the scan was limited to the specified architecture. +- **capabilityCount** The number of optional content packages found during the scan. +- **clientId** The name of the application requesting the optional content. +- **duration** The amount of time it took to complete the scan. +- **hrStatus** The HReturn code of the scan. +- **language** Indicates the scan was limited to the specified language. +- **majorVersion** Indicates the scan was limited to the specified major version. +- **minorVersion** Indicates the scan was limited to the specified minor version. +- **namespace** Indicates the scan was limited to packages in the specified namespace. +- **sourceFilter** A bitmask indicating the scan checked for locally available optional content. +- **stackBuild** The build number of the servicing stack. +- **stackMajorVersion** The major version number of the servicing stack. +- **stackMinorVersion** The minor version number of the servicing stack. +- **stackRevision** The revision number of the servicing stack. + + +### CbsServicingProvider.CbsCapabilitySessionFinalize + +This event provides information about the results of installing or uninstalling optional Windows content from Windows Update. + +The following fields are available: + +- **capabilities** The names of the optional content packages that were installed. +- **clientId** The name of the application requesting the optional content. +- **currentID** The ID of the current install session. +- **downloadSource** The source of the download. +- **highestState** The highest final install state of the optional content. +- **hrLCUReservicingStatus** Indicates whether the optional content was updated to the latest available version. +- **hrStatus** The HReturn code of the install operation. +- **rebootCount** The number of reboots required to complete the install. +- **retryID** The session ID that will be used to retry a failed operation. +- **retryStatus** Indicates whether the install will be retried in the event of failure. +- **stackBuild** The build number of the servicing stack. +- **stackMajorVersion** The major version number of the servicing stack. +- **stackMinorVersion** The minor version number of the servicing stack. +- **stackRevision** The revision number of the servicing stack. + + +### CbsServicingProvider.CbsCapabilitySessionPended + +This event provides information about the results of installing optional Windows content that requires a reboot to keep Windows up to date. + +The following fields are available: + +- **clientId** The name of the application requesting the optional content. +- **pendingDecision** Indicates the cause of reboot, if applicable. + + +### CbsServicingProvider.CbsSelectableUpdateChangeV2 + +No content is currently available. + +The following fields are available: + +- **applicableUpdateState** No content is currently available. +- **buildVersion** No content is currently available. +- **clientId** No content is currently available. +- **downloadSource** No content is currently available. +- **downloadtimeInSeconds** No content is currently available. +- **executionID** No content is currently available. +- **executionSequence** No content is currently available. +- **firstMergedExecutionSequence** No content is currently available. +- **firstMergedID** No content is currently available. +- **hrDownloadResult** No content is currently available. +- **hrStatusUpdate** No content is currently available. +- **identityHash** No content is currently available. +- **initiatedOffline** No content is currently available. +- **majorVersion** No content is currently available. +- **minorVersion** No content is currently available. +- **packageArchitecture** No content is currently available. +- **packageLanguage** No content is currently available. +- **packageName** No content is currently available. +- **rebootRequired** No content is currently available. +- **revisionVersion** No content is currently available. +- **stackBuild** No content is currently available. +- **stackMajorVersion** No content is currently available. +- **stackMinorVersion** No content is currently available. +- **stackRevision** No content is currently available. +- **updateName** No content is currently available. +- **updateStartState** No content is currently available. +- **updateTargetState** No content is currently available. + + +## Diagnostic data events + +### TelClientSynthetic.ConnectivityHeartBeat_0 + +This event sends data about the connectivity status of the Connected User Experience and Telemetry component that uploads telemetry events. If an unrestricted free network (such as Wi-Fi) is available, this event updates the last successful upload time. Otherwise, it checks whether a Connectivity Heartbeat event was fired in the past 24 hours, and if not, it fires an event. A Connectivity Heartbeat event also fires when a device recovers from costed network to free network. + +The following fields are available: + +- **CensusExitCode** Returns last execution codes from census client run. +- **CensusStartTime** Returns timestamp corresponding to last successful census run. +- **CensusTaskEnabled** Returns Boolean value for the census task (Enable/Disable) on client machine. +- **LastConnectivityLossTime** Retrieves the last time the device lost free network. +- **NetworkState** Retrieves the network state: 0 = No network. 1 = Restricted network. 2 = Free network. +- **NoNetworkTime** Retrieves the time spent with no network (since the last time) in seconds. +- **RestrictedNetworkTime** Retrieves the time spent on a metered (cost restricted) network in seconds. + + +### TelClientSynthetic.HeartBeat_5 + +This event sends data about the health and quality of the diagnostic data from the given device, to help keep Windows up to date. It also enables data analysts to determine how 'trusted' the data is from a given device. + +The following fields are available: + +- **AgentConnectionErrorsCount** Number of non-timeout errors associated with the host/agent channel. +- **CensusExitCode** The last exit code of the Census task. +- **CensusStartTime** Time of last Census run. +- **CensusTaskEnabled** True if Census is enabled, false otherwise. +- **CompressedBytesUploaded** Number of compressed bytes uploaded. +- **ConsumerDroppedCount** Number of events dropped at consumer layer of telemetry client. +- **CriticalDataDbDroppedCount** Number of critical data sampled events dropped at the database layer. +- **CriticalDataThrottleDroppedCount** The number of critical data sampled events that were dropped because of throttling. +- **CriticalOverflowEntersCounter** Number of times critical overflow mode was entered in event DB. +- **DbCriticalDroppedCount** Total number of dropped critical events in event DB. +- **DbDroppedCount** Number of events dropped due to DB fullness. +- **DbDroppedFailureCount** Number of events dropped due to DB failures. +- **DbDroppedFullCount** Number of events dropped due to DB fullness. +- **DecodingDroppedCount** Number of events dropped due to decoding failures. +- **EnteringCriticalOverflowDroppedCounter** Number of events dropped due to critical overflow mode being initiated. +- **EtwDroppedBufferCount** Number of buffers dropped in the UTC ETW session. +- **EtwDroppedCount** Number of events dropped at ETW layer of telemetry client. +- **EventsPersistedCount** Number of events that reached the PersistEvent stage. +- **EventStoreLifetimeResetCounter** Number of times event DB was reset for the lifetime of UTC. +- **EventStoreResetCounter** Number of times event DB was reset. +- **EventStoreResetSizeSum** Total size of event DB across all resets reports in this instance. +- **EventsUploaded** Number of events uploaded. +- **Flags** Flags indicating device state such as network state, battery state, and opt-in state. +- **FullTriggerBufferDroppedCount** Number of events dropped due to trigger buffer being full. +- **HeartBeatSequenceNumber** The sequence number of this heartbeat. +- **InvalidHttpCodeCount** Number of invalid HTTP codes received from contacting Vortex. +- **LastAgentConnectionError** Last non-timeout error encountered in the host/agent channel. +- **LastEventSizeOffender** Event name of last event which exceeded max event size. +- **LastInvalidHttpCode** Last invalid HTTP code received from Vortex. +- **MaxActiveAgentConnectionCount** The maximum number of active agents during this heartbeat timeframe. +- **MaxInUseScenarioCounter** Soft maximum number of scenarios loaded by UTC. +- **PreviousHeartBeatTime** Time of last heartbeat event (allows chaining of events). +- **PrivacyBlockedCount** No content is currently available. +- **RepeatedUploadFailureDropped** Number of events lost due to repeated upload failures for a single buffer. +- **SettingsHttpAttempts** Number of attempts to contact OneSettings service. +- **SettingsHttpFailures** The number of failures from contacting the OneSettings service. +- **ThrottledDroppedCount** Number of events dropped due to throttling of noisy providers. +- **TopUploaderErrors** List of top errors received from the upload endpoint. +- **UploaderDroppedCount** Number of events dropped at the uploader layer of telemetry client. +- **UploaderErrorCount** Number of errors received from the upload endpoint. +- **VortexFailuresTimeout** The number of timeout failures received from Vortex. +- **VortexHttpAttempts** Number of attempts to contact Vortex. +- **VortexHttpFailures4xx** Number of 400-499 error codes received from Vortex. +- **VortexHttpFailures5xx** Number of 500-599 error codes received from Vortex. +- **VortexHttpResponseFailures** Number of Vortex responses that are not 2XX or 400. +- **VortexHttpResponsesWithDroppedEvents** Number of Vortex responses containing at least 1 dropped event. + + +## DxgKernelTelemetry events + +### DxgKrnlTelemetry.GPUAdapterInventoryV2 + +This event sends basic GPU and display driver information to keep Windows and display drivers up-to-date. + +The following fields are available: + +- **AdapterTypeValue** The numeric value indicating the type of Graphics adapter. +- **aiSeqId** The event sequence ID. +- **bootId** The system boot ID. +- **BrightnessVersionViaDDI** The version of the Display Brightness Interface. +- **ComputePreemptionLevel** The maximum preemption level supported by GPU for compute payload. +- **DedicatedSystemMemoryB** The amount of system memory dedicated for GPU use (in bytes). +- **DedicatedVideoMemoryB** The amount of dedicated VRAM of the GPU (in bytes). +- **DisplayAdapterLuid** The display adapter LUID. +- **DriverDate** The date of the display driver. +- **DriverRank** The rank of the display driver. +- **DriverVersion** The display driver version. +- **DX10UMDFilePath** The file path to the location of the DirectX 10 Display User Mode Driver in the Driver Store. +- **DX11UMDFilePath** The file path to the location of the DirectX 11 Display User Mode Driver in the Driver Store. +- **DX12UMDFilePath** The file path to the location of the DirectX 12 Display User Mode Driver in the Driver Store. +- **DX9UMDFilePath** The file path to the location of the DirectX 9 Display User Mode Driver in the Driver Store. +- **GPUDeviceID** The GPU device ID. +- **GPUPreemptionLevel** The maximum preemption level supported by GPU for graphics payload. +- **GPURevisionID** The GPU revision ID. +- **GPUVendorID** The GPU vendor ID. +- **InterfaceId** The GPU interface ID. +- **IsDisplayDevice** Does the GPU have displaying capabilities? +- **IsHwSchSupported** No content is currently available. +- **IsHybridDiscrete** Does the GPU have discrete GPU capabilities in a hybrid device? +- **IsHybridIntegrated** Does the GPU have integrated GPU capabilities in a hybrid device? +- **IsLDA** Is the GPU comprised of Linked Display Adapters? +- **IsMiracastSupported** Does the GPU support Miracast? +- **IsMismatchLDA** Is at least one device in the Linked Display Adapters chain from a different vendor? +- **IsMPOSupported** Does the GPU support Multi-Plane Overlays? +- **IsMsMiracastSupported** Are the GPU Miracast capabilities driven by a Microsoft solution? +- **IsPostAdapter** Is this GPU the POST GPU in the device? +- **IsRemovable** TRUE if the adapter supports being disabled or removed. +- **IsRenderDevice** Does the GPU have rendering capabilities? +- **IsSoftwareDevice** Is this a software implementation of the GPU? +- **KMDFilePath** The file path to the location of the Display Kernel Mode Driver in the Driver Store. +- **MeasureEnabled** Is the device listening to MICROSOFT_KEYWORD_MEASURES? +- **NumVidPnSources** The number of supported display output sources. +- **NumVidPnTargets** The number of supported display output targets. +- **SharedSystemMemoryB** The amount of system memory shared by GPU and CPU (in bytes). +- **SubSystemID** The subsystem ID. +- **SubVendorID** The GPU sub vendor ID. +- **TelemetryEnabled** Is the device listening to MICROSOFT_KEYWORD_TELEMETRY? +- **TelInvEvntTrigger** What triggered this event to be logged? Example: 0 (GPU enumeration) or 1 (DxgKrnlTelemetry provider toggling) +- **version** The event version. +- **WDDMVersion** The Windows Display Driver Model version. + + +## Fault Reporting events + +### Microsoft.Windows.FaultReporting.AppCrashEvent + +This event sends data about crashes for both native and managed applications, to help keep Windows up to date. The data includes information about the crashing process and a summary of its exception record. It does not contain any Watson bucketing information. The bucketing information is recorded in a Windows Error Reporting (WER) event that is generated when the WER client reports the crash to the Watson service, and the WER event will contain the same ReportID (see field 14 of crash event, field 19 of WER event) as the crash event for the crash being reported. AppCrash is emitted once for each crash handled by WER (e.g. from an unhandled exception or FailFast or ReportException). Note that Generic Watson event types (e.g. from PLM) that may be considered crashes\" by a user DO NOT emit this event. + +The following fields are available: + +- **AppName** The name of the app that has crashed. +- **AppSessionGuid** GUID made up of process ID and is used as a correlation vector for process instances in the telemetry backend. +- **AppTimeStamp** The date/time stamp of the app. +- **AppVersion** The version of the app that has crashed. +- **ExceptionCode** The exception code returned by the process that has crashed. +- **ExceptionOffset** The address where the exception had occurred. +- **Flags** Flags indicating how reporting is done. For example, queue the report, do not offer JIT debugging, or do not terminate the process after reporting. +- **FriendlyAppName** The description of the app that has crashed, if different from the AppName. Otherwise, the process name. +- **IsFatal** True/False to indicate whether the crash resulted in process termination. +- **ModName** Exception module name (e.g. bar.dll). +- **ModTimeStamp** The date/time stamp of the module. +- **ModVersion** The version of the module that has crashed. +- **PackageFullName** Store application identity. +- **PackageRelativeAppId** Store application identity. +- **ProcessArchitecture** Architecture of the crashing process, as one of the PROCESSOR_ARCHITECTURE_* constants: 0: PROCESSOR_ARCHITECTURE_INTEL. 5: PROCESSOR_ARCHITECTURE_ARM. 9: PROCESSOR_ARCHITECTURE_AMD64. 12: PROCESSOR_ARCHITECTURE_ARM64. +- **ProcessCreateTime** The time of creation of the process that has crashed. +- **ProcessId** The ID of the process that has crashed. +- **ReportId** A GUID used to identify the report. This can used to track the report across Watson. +- **TargetAppId** The kernel reported AppId of the application being reported. +- **TargetAppVer** The specific version of the application being reported +- **TargetAsId** The sequence number for the hanging process. + + +## Hang Reporting events + +### Microsoft.Windows.HangReporting.AppHangEvent + +This event sends data about hangs for both native and managed applications, to help keep Windows up to date. It does not contain any Watson bucketing information. The bucketing information is recorded in a Windows Error Reporting (WER) event that is generated when the WER client reports the hang to the Watson service, and the WER event will contain the same ReportID (see field 13 of hang event, field 19 of WER event) as the hang event for the hang being reported. AppHang is reported only on PC devices. It handles classic Win32 hangs and is emitted only once per report. Some behaviors that may be perceived by a user as a hang are reported by app managers (e.g. PLM/RM/EM) as Watson Generics and will not produce AppHang events. + +The following fields are available: + +- **AppName** The name of the app that has hung. +- **AppSessionGuid** GUID made up of process id used as a correlation vector for process instances in the telemetry backend. +- **AppVersion** The version of the app that has hung. +- **IsFatal** True/False based on whether the hung application caused the creation of a Fatal Hang Report. +- **PackageFullName** Store application identity. +- **PackageRelativeAppId** Store application identity. +- **ProcessArchitecture** Architecture of the hung process, as one of the PROCESSOR_ARCHITECTURE_* constants: 0: PROCESSOR_ARCHITECTURE_INTEL. 5: PROCESSOR_ARCHITECTURE_ARM. 9: PROCESSOR_ARCHITECTURE_AMD64. 12: PROCESSOR_ARCHITECTURE_ARM64. +- **ProcessCreateTime** The time of creation of the process that has hung. +- **ProcessId** The ID of the process that has hung. +- **ReportId** A GUID used to identify the report. This can used to track the report across Watson. +- **TargetAppId** The kernel reported AppId of the application being reported. +- **TargetAppVer** The specific version of the application being reported. +- **TargetAsId** The sequence number for the hanging process. +- **TypeCode** Bitmap describing the hang type. +- **WaitingOnAppName** If this is a cross process hang waiting for an application, this has the name of the application. +- **WaitingOnAppVersion** If this is a cross process hang, this has the version of the application for which it is waiting. +- **WaitingOnPackageFullName** If this is a cross process hang waiting for a package, this has the full name of the package for which it is waiting. +- **WaitingOnPackageRelativeAppId** If this is a cross process hang waiting for a package, this has the relative application id of the package. + + +## Inventory events + +### Microsoft.Windows.Inventory.Core.AmiTelCacheChecksum + +This event captures basic checksum data about the device inventory items stored in the cache for use in validating data completeness for Microsoft.Windows.Inventory.Core events. The fields in this event may change over time, but they will always represent a count of a given object. + +The following fields are available: + +- **Device** A count of device objects in cache. +- **DeviceCensus** A count of device census objects in cache. +- **DriverPackageExtended** A count of driverpackageextended objects in cache. +- **File** A count of file objects in cache. +- **FileSigningInfo** A count of file signing objects in cache. +- **Generic** A count of generic objects in cache. +- **HwItem** A count of hwitem objects in cache. +- **InventoryApplication** A count of application objects in cache. +- **InventoryApplicationAppV** A count of application AppV objects in cache. +- **InventoryApplicationDriver** A count of application driver objects in cache +- **InventoryApplicationFile** A count of application file objects in cache. +- **InventoryApplicationFramework** A count of application framework objects in cache +- **InventoryApplicationShortcut** A count of application shortcut objects in cache +- **InventoryDeviceContainer** A count of device container objects in cache. +- **InventoryDeviceInterface** A count of Plug and Play device interface objects in cache. +- **InventoryDeviceMediaClass** A count of device media objects in cache. +- **InventoryDevicePnp** A count of device Plug and Play objects in cache. +- **InventoryDeviceUsbHubClass** A count of device usb objects in cache +- **InventoryDriverBinary** A count of driver binary objects in cache. +- **InventoryDriverPackage** A count of device objects in cache. +- **InventoryMiscellaneousOfficeAddIn** A count of office add-in objects in cache +- **InventoryMiscellaneousOfficeAddInUsage** A count of office add-in usage objects in cache. +- **InventoryMiscellaneousOfficeIdentifiers** A count of office identifier objects in cache +- **InventoryMiscellaneousOfficeIESettings** A count of office ie settings objects in cache +- **InventoryMiscellaneousOfficeInsights** A count of office insights objects in cache +- **InventoryMiscellaneousOfficeProducts** A count of office products objects in cache +- **InventoryMiscellaneousOfficeSettings** A count of office settings objects in cache +- **InventoryMiscellaneousOfficeVBA** A count of office vba objects in cache +- **InventoryMiscellaneousOfficeVBARuleViolations** A count of office vba rule violations objects in cache +- **InventoryMiscellaneousUUPInfo** A count of uup info objects in cache +- **Metadata** A count of metadata objects in cache. +- **Orphan** A count of orphan file objects in cache. +- **Programs** A count of program objects in cache. + + +### Microsoft.Windows.Inventory.Core.AmiTelCacheVersions + +This event sends inventory component versions for the Device Inventory data. + +The following fields are available: + +- **aeinv** The version of the App inventory component. +- **devinv** The file version of the Device inventory component. + + +### Microsoft.Windows.Inventory.Core.FileSigningInfoAdd + +This event enumerates the signatures of files, either driver packages or application executables. For driver packages, this data is collected on demand via Telecommand to limit it only to unrecognized driver packages, saving time for the client and space on the server. For applications, this data is collected for up to 10 random executables on a system. + +This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedeviceinventorychange). + +The following fields are available: + +- **CatalogSigners** Signers from catalog. Each signer starts with Chain. +- **DigestAlgorithm** No content is currently available. +- **DriverPackageStrongName** Optional. Available only if FileSigningInfo is collected on a driver package. +- **EmbeddedSigners** Embedded signers. Each signer starts with Chain. +- **FileName** The file name of the file whose signatures are listed. +- **FileType** Either exe or sys, depending on if a driver package or application executable. +- **InventoryVersion** The version of the inventory file generating the events. +- **Thumbprint** Comma separated hash of the leaf node of each signer. Semicolon is used to separate CatalogSigners from EmbeddedSigners. There will always be a trailing comma. + + +### Microsoft.Windows.Inventory.Core.InventoryApplicationAdd + +This event sends basic metadata about an application on the system to help keep Windows up to date. + +This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedeviceinventorychange). + +The following fields are available: + +- **HiddenArp** Indicates whether a program hides itself from showing up in ARP. +- **InstallDate** The date the application was installed (a best guess based on folder creation date heuristics). +- **InstallDateArpLastModified** The date of the registry ARP key for a given application. Hints at install date but not always accurate. Passed as an array. Example: 4/11/2015 00:00:00 +- **InstallDateFromLinkFile** The estimated date of install based on the links to the files. Passed as an array. +- **InstallDateMsi** The install date if the application was installed via Microsoft Installer (MSI). Passed as an array. +- **InventoryVersion** The version of the inventory file generating the events. +- **Language** The language code of the program. +- **MsiPackageCode** A GUID that describes the MSI Package. Multiple 'Products' (apps) can make up an MsiPackage. +- **MsiProductCode** A GUID that describe the MSI Product. +- **Name** The name of the application. +- **OSVersionAtInstallTime** The four octets from the OS version at the time of the application's install. +- **PackageFullName** The package full name for a Store application. +- **ProgramInstanceId** A hash of the file IDs in an app. +- **Publisher** The Publisher of the application. Location pulled from depends on the 'Source' field. +- **RootDirPath** The path to the root directory where the program was installed. +- **Source** How the program was installed (for example, ARP, MSI, Appx). +- **StoreAppType** A sub-classification for the type of Microsoft Store app, such as UWP or Win8StoreApp. +- **Type** One of ("Application", "Hotfix", "BOE", "Service", "Unknown"). Application indicates Win32 or Appx app, Hotfix indicates app updates (KBs), BOE indicates it's an app with no ARP or MSI entry, Service indicates that it is a service. Application and BOE are the ones most likely seen. +- **Version** The version number of the program. + + +### Microsoft.Windows.Inventory.Core.InventoryApplicationDriverAdd + +This event represents what drivers an application installs. + +This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedeviceinventorychange). + +The following fields are available: + +- **InventoryVersion** The version of the inventory component +- **ProgramIds** The unique program identifier the driver is associated with + + +### Microsoft.Windows.Inventory.Core.InventoryApplicationDriverStartSync + +The InventoryApplicationDriverStartSync event indicates that a new set of InventoryApplicationDriverStartAdd events will be sent. + +This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedeviceinventorychange). + +The following fields are available: + +- **InventoryVersion** The version of the inventory component. + + +### Microsoft.Windows.Inventory.Core.InventoryApplicationFileAdd + +No content is currently available. + +This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedeviceinventorychange). + +The following fields are available: + +- **BinaryType** No content is currently available. +- **BinFileVersion** No content is currently available. +- **BinProductVersion** No content is currently available. +- **BoeProgramId** No content is currently available. +- **CompanyName** No content is currently available. +- **FileId** No content is currently available. +- **FileVersion** No content is currently available. +- **InventoryVersion** No content is currently available. +- **Language** No content is currently available. +- **LinkDate** No content is currently available. +- **LowerCaseLongPath** No content is currently available. +- **Name** No content is currently available. +- **ProductName** No content is currently available. +- **ProductVersion** No content is currently available. +- **ProgramId** No content is currently available. +- **Size** No content is currently available. + + +### Microsoft.Windows.Inventory.Core.InventoryApplicationFrameworkAdd + +This event provides the basic metadata about the frameworks an application may depend on. + +This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedeviceinventorychange). + +The following fields are available: + +- **FileId** A hash that uniquely identifies a file. +- **Frameworks** The list of frameworks this file depends on. +- **InventoryVersion** The version of the inventory file generating the events. + + +### Microsoft.Windows.Inventory.Core.InventoryApplicationFrameworkStartSync + +This event indicates that a new set of InventoryApplicationFrameworkAdd events will be sent. + +This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedeviceinventorychange). + +The following fields are available: + +- **InventoryVersion** The version of the inventory file generating the events. + + +### Microsoft.Windows.Inventory.Core.InventoryApplicationRemove + +This event indicates that a new set of InventoryDevicePnpAdd events will be sent. + +This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedeviceinventorychange). + +The following fields are available: + +- **InventoryVersion** The version of the inventory file generating the events. + + +### Microsoft.Windows.Inventory.Core.InventoryApplicationStartSync + +This event indicates that a new set of InventoryApplicationAdd events will be sent. + +This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedeviceinventorychange). + +The following fields are available: + +- **InventoryVersion** The version of the inventory file generating the events. + + +### Microsoft.Windows.Inventory.Core.InventoryDeviceContainerAdd + +This event sends basic metadata about a device container (such as a monitor or printer as opposed to a Plug and Play device) to help keep Windows up to date. + +This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedeviceinventorychange). + +The following fields are available: + +- **Categories** A comma separated list of functional categories in which the container belongs. +- **DiscoveryMethod** The discovery method for the device container. +- **FriendlyName** The name of the device container. +- **Icon** No content is currently available. +- **InventoryVersion** The version of the inventory file generating the events. +- **IsActive** Is the device connected, or has it been seen in the last 14 days? +- **IsConnected** For a physically attached device, this value is the same as IsPresent. For wireless a device, this value represents a communication link. +- **IsMachineContainer** Is the container the root device itself? +- **IsNetworked** Is this a networked device? +- **IsPaired** Does the device container require pairing? +- **Manufacturer** The manufacturer name for the device container. +- **ModelId** A unique model ID. +- **ModelName** The model name. +- **ModelNumber** The model number for the device container. +- **PrimaryCategory** The primary category for the device container. + + +### Microsoft.Windows.Inventory.Core.InventoryDeviceContainerRemove + +This event indicates that the InventoryDeviceContainer object is no longer present. + +This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedeviceinventorychange). + +The following fields are available: + +- **InventoryVersion** The version of the inventory file generating the events. + + +### Microsoft.Windows.Inventory.Core.InventoryDeviceContainerStartSync + +This event indicates that a new set of InventoryDeviceContainerAdd events will be sent. + +This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedeviceinventorychange). + +The following fields are available: + +- **InventoryVersion** The version of the inventory file generating the events. + + +### Microsoft.Windows.Inventory.Core.InventoryDeviceInterfaceAdd + +This event retrieves information about what sensor interfaces are available on the device. + +This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedeviceinventorychange). + +The following fields are available: + +- **Accelerometer3D** Indicates if an Accelerator3D sensor is found. +- **ActivityDetection** Indicates if an Activity Detection sensor is found. +- **AmbientLight** Indicates if an Ambient Light sensor is found. +- **Barometer** Indicates if a Barometer sensor is found. +- **Custom** Indicates if a Custom sensor is found. +- **EnergyMeter** Indicates if an Energy sensor is found. +- **FloorElevation** Indicates if a Floor Elevation sensor is found. +- **GeomagneticOrientation** Indicates if a Geo Magnetic Orientation sensor is found. +- **GravityVector** Indicates if a Gravity Detector sensor is found. +- **Gyrometer3D** Indicates if a Gyrometer3D sensor is found. +- **Humidity** Indicates if a Humidity sensor is found. +- **InventoryVersion** The version of the inventory file generating the events. +- **LinearAccelerometer** Indicates if a Linear Accelerometer sensor is found. +- **Magnetometer3D** Indicates if a Magnetometer3D sensor is found. +- **Orientation** Indicates if an Orientation sensor is found. +- **Pedometer** Indicates if a Pedometer sensor is found. +- **Proximity** Indicates if a Proximity sensor is found. +- **RelativeOrientation** Indicates if a Relative Orientation sensor is found. +- **SimpleDeviceOrientation** Indicates if a Simple Device Orientation sensor is found. +- **Temperature** Indicates if a Temperature sensor is found. + + +### Microsoft.Windows.Inventory.Core.InventoryDeviceInterfaceStartSync + +This event indicates that a new set of InventoryDeviceInterfaceAdd events will be sent. + +This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedeviceinventorychange). + +The following fields are available: + +- **InventoryVersion** The version of the inventory file generating the events. + + +### Microsoft.Windows.Inventory.Core.InventoryDeviceMediaClassAdd + +This event sends additional metadata about a Plug and Play device that is specific to a particular class of devices to help keep Windows up to date while reducing overall size of data payload. + +This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedeviceinventorychange). + +The following fields are available: + +- **Audio_CaptureDriver** The Audio device capture driver endpoint. +- **Audio_RenderDriver** The Audio device render driver endpoint. +- **InventoryVersion** The version of the inventory file generating the events. + + +### Microsoft.Windows.Inventory.Core.InventoryDeviceMediaClassRemove + +This event indicates that the InventoryDeviceMediaClassRemove object is no longer present. + +This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedeviceinventorychange). + +The following fields are available: + +- **InventoryVersion** The version of the inventory file generating the events. + + +### Microsoft.Windows.Inventory.Core.InventoryDeviceMediaClassStartSync + +This event indicates that a new set of InventoryDeviceMediaClassSAdd events will be sent. + +This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedeviceinventorychange). + +The following fields are available: + +- **InventoryVersion** The version of the inventory file generating the events. + + +### Microsoft.Windows.Inventory.Core.InventoryDevicePnpAdd + +This event represents the basic metadata about a plug and play (PNP) device and its associated driver. + +This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedeviceinventorychange). + +The following fields are available: + +- **BusReportedDescription** The description of the device reported by the bux. +- **Class** The device setup class of the driver loaded for the device. +- **ClassGuid** The device class GUID from the driver package +- **COMPID** The device setup class guid of the driver loaded for the device. +- **ContainerId** The list of compat ids for the device. +- **Description** System-supplied GUID that uniquely groups the functional devices associated with a single-function or multifunction device installed in the computer. +- **DeviceInterfaceClasses** No content is currently available. +- **DeviceState** The device description. +- **DriverId** DeviceState is a bitmask of the following: DEVICE_IS_CONNECTED 0x0001 (currently only for container). DEVICE_IS_NETWORK_DEVICE 0x0002 (currently only for container). DEVICE_IS_PAIRED 0x0004 (currently only for container). DEVICE_IS_ACTIVE 0x0008 (currently never set). DEVICE_IS_MACHINE 0x0010 (currently only for container). DEVICE_IS_PRESENT 0x0020 (currently always set). DEVICE_IS_HIDDEN 0x0040. DEVICE_IS_PRINTER 0x0080 (currently only for container). DEVICE_IS_WIRELESS 0x0100. DEVICE_IS_WIRELESS_FAT 0x0200. The most common values are therefore: 32 (0x20)= device is present. 96 (0x60)= device is present but hidden. 288 (0x120)= device is a wireless device that is present +- **DriverName** A unique identifier for the driver installed. +- **DriverPackageStrongName** The immediate parent directory name in the Directory field of InventoryDriverPackage +- **DriverVerDate** Name of the .sys image file (or wudfrd.sys if using user mode driver framework). +- **DriverVerVersion** The immediate parent directory name in the Directory field of InventoryDriverPackage. +- **Enumerator** The date of the driver loaded for the device. +- **ExtendedInfs** The extended INF file names. +- **HWID** The version of the driver loaded for the device. +- **Inf** The bus that enumerated the device. +- **InstallState** The device installation state. One of these values: https://msdn.microsoft.com/en-us/library/windows/hardware/ff543130.aspx +- **InventoryVersion** List of hardware ids for the device. +- **LowerClassFilters** Lower filter class drivers IDs installed for the device +- **LowerFilters** Lower filter drivers IDs installed for the device +- **Manufacturer** INF file name (the name could be renamed by OS, such as oemXX.inf) +- **MatchingID** Device installation state. +- **Model** The version of the inventory binary generating the events. +- **ParentId** Lower filter class drivers IDs installed for the device. +- **ProblemCode** Lower filter drivers IDs installed for the device. +- **Provider** The device manufacturer. +- **Service** The device service name +- **STACKID** Represents the hardware ID or compatible ID that Windows uses to install a device instance. +- **UpperClassFilters** Upper filter drivers IDs installed for the device +- **UpperFilters** The device model. + + +### Microsoft.Windows.Inventory.Core.InventoryDevicePnpRemove + +This event indicates that the InventoryDevicePnpRemove object is no longer present. + +This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedeviceinventorychange). + +The following fields are available: + +- **InventoryVersion** The version of the inventory file generating the events. + + +### Microsoft.Windows.Inventory.Core.InventoryDevicePnpStartSync + +This event indicates that a new set of InventoryDevicePnpAdd events will be sent. + +This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedeviceinventorychange). + +The following fields are available: + +- **InventoryVersion** The version of the inventory file generating the events. + + +### Microsoft.Windows.Inventory.Core.InventoryDeviceUsbHubClassAdd + +This event sends basic metadata about the USB hubs on the device. + +This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedeviceinventorychange). + +The following fields are available: + +- **InventoryVersion** The version of the inventory file generating the events. +- **TotalUserConnectablePorts** Total number of connectable USB ports. +- **TotalUserConnectableTypeCPorts** Total number of connectable USB Type C ports. + + +### Microsoft.Windows.Inventory.Core.InventoryDeviceUsbHubClassStartSync + +This event indicates that a new set of InventoryDeviceUsbHubClassAdd events will be sent. + +This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedeviceinventorychange). + +The following fields are available: + +- **InventoryVersion** The version of the inventory file generating the events. + + +### Microsoft.Windows.Inventory.Core.InventoryDriverBinaryAdd + +This event provides the basic metadata about driver binaries running on the system. + +This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedeviceinventorychange). + +The following fields are available: + +- **DriverCheckSum** The checksum of the driver file. +- **DriverCompany** The company name that developed the driver. +- **DriverInBox** Is the driver included with the operating system? +- **DriverIsKernelMode** Is it a kernel mode driver? +- **DriverName** The file name of the driver. +- **DriverPackageStrongName** The strong name of the driver package +- **DriverSigned** The strong name of the driver package +- **DriverTimeStamp** The low 32 bits of the time stamp of the driver file. +- **DriverType** A bitfield of driver attributes: 1. define DRIVER_MAP_DRIVER_TYPE_PRINTER 0x0001. 2. define DRIVER_MAP_DRIVER_TYPE_KERNEL 0x0002. 3. define DRIVER_MAP_DRIVER_TYPE_USER 0x0004. 4. define DRIVER_MAP_DRIVER_IS_SIGNED 0x0008. 5. define DRIVER_MAP_DRIVER_IS_INBOX 0x0010. 6. define DRIVER_MAP_DRIVER_IS_WINQUAL 0x0040. 7. define DRIVER_MAP_DRIVER_IS_SELF_SIGNED 0x0020. 8. define DRIVER_MAP_DRIVER_IS_CI_SIGNED 0x0080. 9. define DRIVER_MAP_DRIVER_HAS_BOOT_SERVICE 0x0100. 10. define DRIVER_MAP_DRIVER_TYPE_I386 0x10000. 11. define DRIVER_MAP_DRIVER_TYPE_IA64 0x20000. 12. define DRIVER_MAP_DRIVER_TYPE_AMD64 0x40000. 13. define DRIVER_MAP_DRIVER_TYPE_ARM 0x100000. 14. define DRIVER_MAP_DRIVER_TYPE_THUMB 0x200000. 15. define DRIVER_MAP_DRIVER_TYPE_ARMNT 0x400000. 16. define DRIVER_MAP_DRIVER_IS_TIME_STAMPED 0x800000. +- **DriverVersion** The version of the driver file. +- **ImageSize** The size of the driver file. +- **Inf** The name of the INF file. +- **InventoryVersion** The version of the inventory file generating the events. +- **Product** The product name that is included in the driver file. +- **ProductVersion** The product version that is included in the driver file. +- **Service** The name of the service that is installed for the device. +- **WdfVersion** The Windows Driver Framework version. + + +### Microsoft.Windows.Inventory.Core.InventoryDriverBinaryRemove + +This event indicates that the InventoryDriverBinary object is no longer present. + +This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedeviceinventorychange). + +The following fields are available: + +- **InventoryVersion** The version of the inventory file generating the events. + + +### Microsoft.Windows.Inventory.Core.InventoryDriverBinaryStartSync + +This event indicates that a new set of InventoryDriverBinaryAdd events will be sent. + +This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedeviceinventorychange). + +The following fields are available: + +- **InventoryVersion** The version of the inventory file generating the events. + + +### Microsoft.Windows.Inventory.Core.InventoryDriverPackageAdd + +This event sends basic metadata about drive packages installed on the system to help keep Windows up to date. + +This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedeviceinventorychange). + +The following fields are available: + +- **Class** The class name for the device driver. +- **ClassGuid** The class GUID for the device driver. +- **Date** The driver package date. +- **Directory** The path to the driver package. +- **DriverInBox** Is the driver included with the operating system? +- **Inf** The INF name of the driver package. +- **InventoryVersion** The version of the inventory file generating the events. +- **Provider** The provider for the driver package. +- **SubmissionId** The HLK submission ID for the driver package. +- **Version** The version of the driver package. + + +### Microsoft.Windows.Inventory.Core.InventoryDriverPackageRemove + +This event indicates that the InventoryDriverPackageRemove object is no longer present. + +This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedeviceinventorychange). + +The following fields are available: + +- **InventoryVersion** The version of the inventory file generating the events. + + +### Microsoft.Windows.Inventory.Core.InventoryDriverPackageStartSync + +This event indicates that a new set of InventoryDriverPackageAdd events will be sent. + +This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedeviceinventorychange). + +The following fields are available: + +- **InventoryVersion** The version of the inventory file generating the events. + + +### Microsoft.Windows.Inventory.Core.StartUtcJsonTrace + +This event collects traces of all other Core events, not used in typical customer scenarios. This event signals the beginning of the event download, and that tracing should begin. + + + +### Microsoft.Windows.Inventory.Core.StopUtcJsonTrace + +This event collects traces of all other Core events, not used in typical customer scenarios. This event signals the end of the event download, and that tracing should end. + + + +### Microsoft.Windows.Inventory.General.InventoryMiscellaneousOfficeAddInAdd + +Provides data on the installed Office Add-ins. + +This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedeviceinventorychange). + +The following fields are available: + +- **AddinCLSID** The class identifier key for the Microsoft Office add-in. +- **AddInId** The identifier for the Microsoft Office add-in. +- **AddinType** The type of the Microsoft Office add-in. +- **BinFileTimestamp** The timestamp of the Office add-in. +- **BinFileVersion** The version of the Microsoft Office add-in. +- **Description** Description of the Microsoft Office add-in. +- **FileId** The file identifier of the Microsoft Office add-in. +- **FileSize** The file size of the Microsoft Office add-in. +- **FriendlyName** The friendly name for the Microsoft Office add-in. +- **FullPath** The full path to the Microsoft Office add-in. +- **InventoryVersion** The version of the inventory binary generating the events. +- **LoadBehavior** Integer that describes the load behavior. +- **OfficeApplication** The Microsoft Office application associated with the add-in. +- **OfficeArchitecture** The architecture of the add-in. +- **OfficeVersion** The Microsoft Office version for this add-in. +- **OutlookCrashingAddin** Indicates whether crashes have been found for this add-in. +- **ProductCompany** The name of the company associated with the Office add-in. +- **ProductName** The product name associated with the Microsoft Office add-in. +- **ProductVersion** The version associated with the Office add-in. +- **ProgramId** The unique program identifier of the Microsoft Office add-in. +- **Provider** Name of the provider for this add-in. + + +### Microsoft.Windows.Inventory.General.InventoryMiscellaneousOfficeAddInRemove + +Indicates that this particular data object represented by the objectInstanceId is no longer present. + +This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedeviceinventorychange). + +The following fields are available: + +- **InventoryVersion** The version of the inventory binary generating the events. + + +### Microsoft.Windows.Inventory.General.InventoryMiscellaneousOfficeAddInStartSync + +This event indicates that a new sync is being generated for this object type. + +This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedeviceinventorychange). + +The following fields are available: + +- **InventoryVersion** The version of the inventory binary generating the events. + + +### Microsoft.Windows.Inventory.General.InventoryMiscellaneousOfficeIdentifiersAdd + +Provides data on the Office identifiers. + +This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedeviceinventorychange). + +The following fields are available: + +- **InventoryVersion** The version of the inventory binary generating the events. +- **OAudienceData** Sub-identifier for Microsoft Office release management, identifying the pilot group for a device +- **OAudienceId** Microsoft Office identifier for Microsoft Office release management, identifying the pilot group for a device +- **OMID** Identifier for the Office SQM Machine +- **OPlatform** Whether the installed Microsoft Office product is 32-bit or 64-bit +- **OTenantId** Unique GUID representing the Microsoft O365 Tenant +- **OVersion** Installed version of Microsoft Office. For example, 16.0.8602.1000 +- **OWowMID** Legacy Microsoft Office telemetry identifier (SQM Machine ID) for WoW systems (32-bit Microsoft Office on 64-bit Windows) + + +### Microsoft.Windows.Inventory.General.InventoryMiscellaneousOfficeIdentifiersStartSync + +Diagnostic event to indicate a new sync is being generated for this object type. + +This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedeviceinventorychange). + +The following fields are available: + +- **InventoryVersion** The version of the inventory binary generating the events. + + +### Microsoft.Windows.Inventory.General.InventoryMiscellaneousOfficeIESettingsAdd + +Provides data on Office-related Internet Explorer features. + +This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedeviceinventorychange). + +The following fields are available: + +- **InventoryVersion** The version of the inventory binary generating the events. +- **OIeFeatureAddon** Flag indicating which Microsoft Office products have this setting enabled. The FEATURE_ADDON_MANAGEMENT feature lets applications hosting the WebBrowser Control to respect add-on management selections made using the Add-on Manager feature of Internet Explorer. Add-ons disabled by the user or by administrative group policy will also be disabled in applications that enable this feature. +- **OIeMachineLockdown** Flag indicating which Microsoft Office products have this setting enabled. When the FEATURE_LOCALMACHINE_LOCKDOWN feature is enabled, Internet Explorer applies security restrictions on content loaded from the user's local machine, which helps prevent malicious behavior involving local files. +- **OIeMimeHandling** Flag indicating which Microsoft Office products have this setting enabled. When the FEATURE_MIME_HANDLING feature control is enabled, Internet Explorer handles MIME types more securely. Only applies to Windows Internet Explorer 6 for Windows XP Service Pack 2 (SP2) +- **OIeMimeSniffing** Flag indicating which Microsoft Office products have this setting enabled. Determines a file's type by examining its bit signature. Windows Internet Explorer uses this information to determine how to render the file. The FEATURE_MIME_SNIFFING feature, when enabled, allows to be set differently for each security zone by using the URLACTION_FEATURE_MIME_SNIFFING URL action flag +- **OIeNoAxInstall** Flag indicating which Microsoft Office products have this setting enabled. When a webpage attempts to load or install an ActiveX control that isn't already installed, the FEATURE_RESTRICT_ACTIVEXINSTALL feature blocks the request. When a webpage tries to load or install an ActiveX control that isn't already installed, the FEATURE_RESTRICT_ACTIVEXINSTALL feature blocks the request +- **OIeNoDownload** Flag indicating which Microsoft Office products have this setting enabled. The FEATURE_RESTRICT_FILEDOWNLOAD feature blocks file download requests that navigate to a resource, that display a file download dialog box, or that are not initiated explicitly by a user action (for example, a mouse click or key press). Only applies to Windows Internet Explorer 6 for Windows XP Service Pack 2 (SP2) +- **OIeObjectCaching** Flag indicating which Microsoft Office products have this setting enabled. When enabled, the FEATURE_OBJECT_CACHING feature prevents webpages from accessing or instantiating ActiveX controls cached from different domains or security contexts +- **OIePasswordDisable** Flag indicating which Microsoft Office products have this setting enabled. After Windows Internet Explorer 6 for Windows XP Service Pack 2 (SP2), Internet Explorer no longer allows usernames and passwords to be specified in URLs that use the HTTP or HTTPS protocols. URLs using other protocols, such as FTP, still allow usernames and passwords +- **OIeSafeBind** Flag indicating which Microsoft Office products have this setting enabled. The FEATURE_SAFE_BINDTOOBJECT feature performs additional safety checks when calling MonikerBindToObject to create and initialize Microsoft ActiveX controls. Specifically, prevent the control from being created if COMPAT_EVIL_DONT_LOAD is in the registry for the control +- **OIeSecurityBand** Flag indicating which Microsoft Office products have this setting enabled. The FEATURE_SECURITYBAND feature controls the display of the Internet Explorer Information bar. When enabled, the Information bar appears when file download or code installation is restricted +- **OIeUncSaveCheck** Flag indicating which Microsoft Office products have this setting enabled. The FEATURE_UNC_SAVEDFILECHECK feature enables the Mark of the Web (MOTW) for local files loaded from network locations that have been shared by using the Universal Naming Convention (UNC) +- **OIeValidateUrl** Flag indicating which Microsoft Office products have this setting enabled. When enabled, the FEATURE_VALIDATE_NAVIGATE_URL feature control prevents Windows Internet Explorer from navigating to a badly formed URL +- **OIeWebOcPopup** Flag indicating which Microsoft Office products have this setting enabled. The FEATURE_WEBOC_POPUPMANAGEMENT feature allows applications hosting the WebBrowser Control to receive the default Internet Explorer pop-up window management behavior +- **OIeWinRestrict** Flag indicating which Microsoft Office products have this setting enabled. When enabled, the FEATURE_WINDOW_RESTRICTIONS feature adds several restrictions to the size and behavior of popup windows +- **OIeZoneElevate** Flag indicating which Microsoft Office products have this setting enabled. When enabled, the FEATURE_ZONE_ELEVATION feature prevents pages in one zone from navigating to pages in a higher security zone unless the navigation is generated by the user + + +### Microsoft.Windows.Inventory.General.InventoryMiscellaneousOfficeIESettingsStartSync + +Diagnostic event to indicate a new sync is being generated for this object type. + +This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedeviceinventorychange). + +The following fields are available: + +- **InventoryVersion** The version of the inventory binary generating the events. + + +### Microsoft.Windows.Inventory.General.InventoryMiscellaneousOfficeInsightsAdd + +This event provides insight data on the installed Office products + +This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedeviceinventorychange). + +The following fields are available: + +- **InventoryVersion** The version of the inventory binary generating the events. +- **OfficeApplication** The name of the Office application. +- **OfficeArchitecture** The bitness of the Office application. +- **OfficeVersion** The version of the Office application. +- **Value** The insights collected about this entity. + + +### Microsoft.Windows.Inventory.General.InventoryMiscellaneousOfficeInsightsRemove + +Indicates that this particular data object represented by the objectInstanceId is no longer present. + +This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedeviceinventorychange). + +The following fields are available: + +- **InventoryVersion** The version of the inventory binary generating the events. + + +### Microsoft.Windows.Inventory.General.InventoryMiscellaneousOfficeInsightsStartSync + +This diagnostic event indicates that a new sync is being generated for this object type. + +This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedeviceinventorychange). + +The following fields are available: + +- **InventoryVersion** The version of the inventory binary generating the events. + + +### Microsoft.Windows.Inventory.General.InventoryMiscellaneousOfficeProductsAdd + +Describes Office Products installed. + +This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedeviceinventorychange). + +The following fields are available: + +- **InventoryVersion** The version of the inventory binary generating the events. +- **OC2rApps** A GUID the describes the Office Click-To-Run apps +- **OC2rSkus** Comma-delimited list (CSV) of Office Click-To-Run products installed on the device. For example, Office 2016 ProPlus +- **OMsiApps** Comma-delimited list (CSV) of Office MSI products installed on the device. For example, Microsoft Word +- **OProductCodes** A GUID that describes the Office MSI products + + +### Microsoft.Windows.Inventory.General.InventoryMiscellaneousOfficeProductsStartSync + +Diagnostic event to indicate a new sync is being generated for this object type. + +This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedeviceinventorychange). + +The following fields are available: + +- **InventoryVersion** The version of the inventory binary generating the events. + + +### Microsoft.Windows.Inventory.General.InventoryMiscellaneousOfficeSettingsAdd + +This event describes various Office settings + +This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedeviceinventorychange). + +The following fields are available: + +- **BrowserFlags** Browser flags for Office-related products +- **ExchangeProviderFlags** Provider policies for Office Exchange +- **InventoryVersion** The version of the inventory binary generating the events. +- **SharedComputerLicensing** Office shared computer licensing policies + + +### Microsoft.Windows.Inventory.General.InventoryMiscellaneousOfficeSettingsStartSync + +Indicates a new sync is being generated for this object type. + +This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedeviceinventorychange). + +The following fields are available: + +- **InventoryVersion** The version of the inventory binary generating the events. + + +### Microsoft.Windows.Inventory.General.InventoryMiscellaneousOfficeVBAAdd + +This event provides a summary rollup count of conditions encountered while performing a local scan of Office files, analyzing for known VBA programmability compatibility issues between legacy office version and ProPlus, and between 32 and 64-bit versions + +This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedeviceinventorychange). + +The following fields are available: + +- **Design** Count of files with design issues found. +- **Design_x64** Count of files with 64 bit design issues found. +- **DuplicateVBA** Count of files with duplicate VBA code. +- **HasVBA** Count of files with VBA code. +- **Inaccessible** Count of files that were inaccessible for scanning. +- **InventoryVersion** The version of the inventory binary generating the events. +- **Issues** Count of files with issues detected. +- **Issues_x64** Count of files with 64-bit issues detected. +- **IssuesNone** Count of files with no issues detected. +- **IssuesNone_x64** Count of files with no 64-bit issues detected. +- **Locked** Count of files that were locked, preventing scanning. +- **NoVBA** Count of files with no VBA inside. +- **Protected** Count of files that were password protected, preventing scanning. +- **RemLimited** Count of files that require limited remediation changes. +- **RemLimited_x64** Count of files that require limited remediation changes for 64-bit issues. +- **RemSignificant** Count of files that require significant remediation changes. +- **RemSignificant_x64** Count of files that require significant remediation changes for 64-bit issues. +- **Score** Overall compatibility score calculated for scanned content. +- **Score_x64** Overall 64-bit compatibility score calculated for scanned content. +- **Total** Total number of files scanned. +- **Validation** Count of files that require additional manual validation. +- **Validation_x64** Count of files that require additional manual validation for 64-bit issues. + + +### Microsoft.Windows.Inventory.General.InventoryMiscellaneousOfficeVBARemove + +Indicates that this particular data object represented by the objectInstanceId is no longer present. + +This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedeviceinventorychange). + +The following fields are available: + +- **InventoryVersion** The version of the inventory binary generating the events. + + +### Microsoft.Windows.Inventory.General.InventoryMiscellaneousOfficeVBARuleViolationsAdd + +This event provides data on Microsoft Office VBA rule violations, including a rollup count per violation type, giving an indication of remediation requirements for an organization. The event identifier is a unique GUID, associated with the validation rule + +This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedeviceinventorychange). + +The following fields are available: + +- **Count** Count of total Microsoft Office VBA rule violations +- **InventoryVersion** The version of the inventory binary generating the events. + + +### Microsoft.Windows.Inventory.General.InventoryMiscellaneousOfficeVBARuleViolationsRemove + +Indicates that this particular data object represented by the objectInstanceId is no longer present. + +This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedeviceinventorychange). + +The following fields are available: + +- **InventoryVersion** The version of the inventory binary generating the events. + + +### Microsoft.Windows.Inventory.General.InventoryMiscellaneousOfficeVBARuleViolationsStartSync + +This event indicates that a new sync is being generated for this object type. + +This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedeviceinventorychange). + +The following fields are available: + +- **InventoryVersion** The version of the inventory binary generating the events. + + +### Microsoft.Windows.Inventory.General.InventoryMiscellaneousOfficeVBAStartSync + +Diagnostic event to indicate a new sync is being generated for this object type. + +This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedeviceinventorychange). + +The following fields are available: + +- **InventoryVersion** The version of the inventory binary generating the events. + + +### Microsoft.Windows.Inventory.General.InventoryMiscellaneousUUPInfoAdd + +Provides data on Unified Update Platform (UUP) products and what version they are at. + +This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedeviceinventorychange). + +The following fields are available: + +- **Identifier** UUP identifier +- **LastActivatedVersion** Last activated version +- **PreviousVersion** Previous version +- **Source** UUP source +- **Version** UUP version + + +### Microsoft.Windows.Inventory.General.InventoryMiscellaneousUUPInfoRemove + +Indicates that this particular data object represented by the objectInstanceId is no longer present. + +This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedeviceinventorychange). + + + +### Microsoft.Windows.Inventory.General.InventoryMiscellaneousUUPInfoStartSync + +Diagnostic event to indicate a new sync is being generated for this object type. + +This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedeviceinventorychange). + + + +### Microsoft.Windows.Inventory.Indicators.Checksum + +This event summarizes the counts for the InventoryMiscellaneousUexIndicatorAdd events. + +The following fields are available: + +- **CensusId** A unique hardware identifier. +- **ChecksumDictionary** A count of each operating system indicator. +- **PCFP** Equivalent to the InventoryId field that is found in other core events. + + +### Microsoft.Windows.Inventory.Indicators.InventoryMiscellaneousUexIndicatorAdd + +These events represent the basic metadata about the OS indicators installed on the system which are used for keeping the device up to date. + +This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedeviceinventorychange). + +The following fields are available: + +- **IndicatorValue** The indicator value. + + +### Microsoft.Windows.Inventory.Indicators.InventoryMiscellaneousUexIndicatorEndSync + +No content is currently available. + +This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedeviceinventorychange). + + + +### Microsoft.Windows.Inventory.Indicators.InventoryMiscellaneousUexIndicatorRemove + +This event is a counterpart to InventoryMiscellaneousUexIndicatorAdd that indicates that the item has been removed. + +This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedeviceinventorychange). + + + +### Microsoft.Windows.Inventory.Indicators.InventoryMiscellaneousUexIndicatorStartSync + +This event indicates that a new set of InventoryMiscellaneousUexIndicatorAdd events will be sent. + +This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedeviceinventorychange). + + + +## Kernel events + +### IO + +This event indicates the number of bytes read from or read by the OS and written to or written by the OS upon system startup. + +The following fields are available: + +- **BytesRead** The total number of bytes read from or read by the OS upon system startup. +- **BytesWritten** The total number of bytes written to or written by the OS upon system startup. + + +### Microsoft.Windows.Kernel.BootEnvironment.OsLaunch + +OS information collected during Boot, used to evaluate the success of the upgrade process. + +The following fields are available: + +- **BootApplicationId** This field tells us what the OS Loader Application Identifier is. +- **BootAttemptCount** The number of consecutive times the boot manager has attempted to boot into this operating system. +- **BootSequence** The current Boot ID, used to correlate events related to a particular boot session. +- **BootStatusPolicy** Identifies the applicable Boot Status Policy. +- **BootType** Identifies the type of boot (e.g.: "Cold", "Hiber", "Resume"). +- **EventTimestamp** Seconds elapsed since an arbitrary time point. This can be used to identify the time difference in successive boot attempts being made. +- **FirmwareResetReasonEmbeddedController** Reason for system reset provided by firmware. +- **FirmwareResetReasonEmbeddedControllerAdditional** Additional information on system reset reason provided by firmware if needed. +- **FirmwareResetReasonPch** Reason for system reset provided by firmware. +- **FirmwareResetReasonPchAdditional** Additional information on system reset reason provided by firmware if needed. +- **FirmwareResetReasonSupplied** Flag indicating that a reason for system reset was provided by firmware. +- **IO** Amount of data written to and read from the disk by the OS Loader during boot. See [IO](#io). +- **LastBootSucceeded** Flag indicating whether the last boot was successful. +- **LastShutdownSucceeded** Flag indicating whether the last shutdown was successful. +- **MaxAbove4GbFreeRange** This field describes the largest memory range available above 4Gb. +- **MaxBelow4GbFreeRange** This field describes the largest memory range available below 4Gb. +- **MeasuredLaunchPrepared** This field tells us if the OS launch was initiated using Measured/Secure Boot over DRTM (Dynamic Root of Trust for Measurement). +- **MeasuredLaunchResume** This field tells us if Dynamic Root of Trust for Measurement (DRTM) was used when resuming from hibernation. +- **MenuPolicy** Type of advanced options menu that should be shown to the user (Legacy, Standard, etc.). +- **RecoveryEnabled** Indicates whether recovery is enabled. +- **TcbLaunch** Indicates whether the Trusted Computing Base was used during the boot flow. +- **UserInputTime** The amount of time the loader application spent waiting for user input. + + +## Other events + +### Microsoft.Windows.Cast.Miracast.MiracastSessionEnd + +No content is currently available. + +The following fields are available: + +- **AudioChannelCount** No content is currently available. +- **AudioSampleRate** No content is currently available. +- **AudioSubtype** No content is currently available. +- **AverageBitrate** No content is currently available. +- **AverageDataRate** No content is currently available. +- **AveragePacketSendTimeInMs** No content is currently available. +- **ConnectorType** No content is currently available. +- **EncodeAverageTimeMS** No content is currently available. +- **EncodeCount** No content is currently available. +- **EncodeMaxTimeMS** No content is currently available. +- **EncodeMinTimeMS** No content is currently available. +- **EncoderCreationTimeInMs** No content is currently available. +- **ErrorSource** No content is currently available. +- **FirstFrameTime** No content is currently available. +- **FirstLatencyMode** No content is currently available. +- **FrameAverageTimeMS** No content is currently available. +- **FrameCount** No content is currently available. +- **FrameMaxTimeMS** No content is currently available. +- **FrameMinTimeMS** No content is currently available. +- **Glitches** No content is currently available. +- **HardwareCursorEnabled** No content is currently available. +- **HDCPState** No content is currently available. +- **HighestBitrate** No content is currently available. +- **HighestDataRate** No content is currently available. +- **LastLatencyMode** No content is currently available. +- **LogTimeReference** No content is currently available. +- **LowestBitrate** No content is currently available. +- **LowestDataRate** No content is currently available. +- **MediaErrorCode** No content is currently available. +- **MiracastEntry** No content is currently available. +- **MiracastM1** No content is currently available. +- **MiracastM2** No content is currently available. +- **MiracastM3** No content is currently available. +- **MiracastM4** No content is currently available. +- **MiracastM5** No content is currently available. +- **MiracastM6** No content is currently available. +- **MiracastM7** No content is currently available. +- **MiracastSessionState** No content is currently available. +- **MiracastStreaming** No content is currently available. +- **ProfileCount** No content is currently available. +- **ProfileCountAfterFiltering** No content is currently available. +- **RefreshRate** No content is currently available. +- **RotationSupported** No content is currently available. +- **RTSPSessionId** No content is currently available. +- **SessionGuid** No content is currently available. +- **SinkHadEdid** No content is currently available. +- **SupportMicrosoftColorSpaceConversion** No content is currently available. +- **SupportsMicrosoftDiagnostics** No content is currently available. +- **SupportsMicrosoftFormatChange** No content is currently available. +- **SupportsMicrosoftLatencyManagement** No content is currently available. +- **SupportsMicrosoftRTCP** No content is currently available. +- **SupportsMicrosoftVideoFormats** No content is currently available. +- **SupportsWiDi** No content is currently available. +- **TeardownErrorCode** No content is currently available. +- **TeardownErrorReason** No content is currently available. +- **UIBCEndState** No content is currently available. +- **UIBCEverEnabled** No content is currently available. +- **UIBCStatus** No content is currently available. +- **VideoBitrate** No content is currently available. +- **VideoCodecLevel** No content is currently available. +- **VideoHeight** No content is currently available. +- **VideoSubtype** No content is currently available. +- **VideoWidth** No content is currently available. +- **WFD2Supported** No content is currently available. + + +### Microsoft.Windows.Mitigation.AccountTraceLoggingProvider.General + +This event provides information about application properties to indicate the successful execution. + +The following fields are available: + +- **AppMode** Indicates the mode the app is being currently run around privileges. +- **ExitCode** Indicates the exit code of the app. +- **Help** Indicates if the app needs to be launched in the help mode. +- **ParseError** Indicates if there was a parse error during the execution. +- **RightsAcquired** Indicates if the right privileges were acquired for successful execution. +- **RightsWereEnabled** Indicates if the right privileges were enabled for successful execution. +- **TestMode** Indicates whether the app is being run in test mode. + + +### Microsoft.Windows.Mitigation.AccountTraceLoggingProvider.GetCount + +This event provides information about the properties of user accounts in the Administrator group. + +The following fields are available: + +- **Internal** Indicates the internal property associated with the count group. +- **LastError** The error code (if applicable) for the cause of the failure to get the count of the user account. +- **Result** The HResult error. + + +### Microsoft.Windows.UpdateReserveManager.InitializeUpdateReserveManager + +No content is currently available. + +The following fields are available: + +- **ClientId** No content is currently available. +- **Flags** No content is currently available. +- **FlightId** No content is currently available. +- **Offline** No content is currently available. +- **PolicyPassed** No content is currently available. +- **ReturnCode** No content is currently available. +- **Version** No content is currently available. + + +### Value + +This event returns data about Mean Time to Failure (MTTF) for Windows devices. It is the primary means of estimating reliability problems in Basic Diagnostic reporting with very strong privacy guarantees. Since Basic Diagnostic reporting does not include system up-time, and since that information is important to ensuring the safe and stable operation of Windows, the data provided by this event provides that data in a manner which does not threaten a user’s privacy. + +The following fields are available: + +- **Algorithm** The algorithm used to preserve privacy. +- **DPRange** The upper bound of the range being measured. +- **DPValue** The randomized response returned by the client. +- **Epsilon** The level of privacy to be applied. +- **HistType** The histogram type if the algorithm is a histogram algorithm. +- **PertProb** The probability the entry will be Perturbed if the algorithm chosen is “heavy-hitters”. + + +## Privacy consent logging events + +### Microsoft.Windows.Shell.PrivacyConsentLogging.PrivacyConsentCompleted + +This event is used to determine whether the user successfully completed the privacy consent experience. + +The following fields are available: + +- **presentationVersion** Which display version of the privacy consent experience the user completed +- **privacyConsentState** The current state of the privacy consent experience +- **settingsVersion** Which setting version of the privacy consent experience the user completed +- **userOobeExitReason** The exit reason of the privacy consent experience + + +### Microsoft.Windows.Shell.PrivacyConsentLogging.PrivacyConsentStatus + +Event tells us effectiveness of new privacy experience. + +The following fields are available: + +- **isAdmin** whether the person who is logging in is an admin +- **isExistingUser** whether the account existed in a downlevel OS +- **isLaunching** Whether or not the privacy consent experience will be launched +- **isSilentElevation** whether the user has most restrictive UAC controls +- **privacyConsentState** whether the user has completed privacy experience +- **userRegionCode** The current user's region setting + + +## Sediment events + +### Microsoft.Windows.Sediment.Info.DetailedState + +This event is sent when detailed state information is needed from an update trial run. + +The following fields are available: + +- **Data** Data relevant to the state, such as what percent of disk space the directory takes up. +- **Id** Identifies the trial being run, such as a disk related trial. +- **ReleaseVer** The version of the component. +- **State** The state of the reporting data from the trial, such as the top-level directory analysis. +- **Time** The time the event was fired. + + +## Setup events + +### SetupPlatformTel.SetupPlatformTelActivityEvent + +This event sends basic metadata about the SetupPlatform update installation process, to help keep Windows up to date. + +The following fields are available: + +- **FieldName** Retrieves the event name/data point. Examples: InstallStartTime, InstallEndtime, OverallResult etc. +- **GroupName** Retrieves the groupname the event belongs to. Example: Install Information, DU Information, Disk Space Information etc. +- **Value** Value associated with the corresponding event name. For example, time-related events will include the system time + + +### SetupPlatformTel.SetupPlatformTelActivityStarted + +This event sends basic metadata about the update installation process generated by SetupPlatform to help keep Windows up to date. + +The following fields are available: + +- **Name** The name of the dynamic update type. Example: GDR driver + + +### SetupPlatformTel.SetupPlatformTelActivityStopped + +This event sends basic metadata about the update installation process generated by SetupPlatform to help keep Windows up to date. + + + +### SetupPlatformTel.SetupPlatformTelEvent + +This service retrieves events generated by SetupPlatform, the engine that drives the various deployment scenarios. + +The following fields are available: + +- **FieldName** Retrieves the event name/data point. Examples: InstallStartTime, InstallEndtime, OverallResult etc. +- **GroupName** Retrieves the groupname the event belongs to. Example: Install Information, DU Information, Disk Space Information etc. +- **Value** Retrieves the value associated with the corresponding event name (Field Name). For example: For time related events this will include the system time. + + +## Software update events + +### SoftwareUpdateClientTelemetry.CheckForUpdates + +Scan process event on Windows Update client. See the EventScenario field for specifics (started/failed/succeeded). + +The following fields are available: + +- **ActivityMatchingId** Contains a unique ID identifying a single CheckForUpdates session from initialization to completion. +- **AllowCachedResults** Indicates if the scan allowed using cached results. +- **ApplicableUpdateInfo** Metadata for the updates which were detected as applicable +- **BiosFamily** The family of the BIOS (Basic Input Output System). +- **BiosName** The name of the device BIOS. +- **BiosReleaseDate** The release date of the device BIOS. +- **BiosSKUNumber** The sku number of the device BIOS. +- **BIOSVendor** The vendor of the BIOS. +- **BiosVersion** The version of the BIOS. +- **BranchReadinessLevel** The servicing branch configured on the device. +- **CachedEngineVersion** For self-initiated healing, the version of the SIH engine that is cached on the device. If the SIH engine does not exist, the value is null. +- **CallerApplicationName** The name provided by the caller who initiated API calls into the software distribution client. +- **CapabilityDetectoidGuid** The GUID for a hardware applicability detectoid that could not be evaluated. +- **CDNCountryCode** Two letter country abbreviation for the Content Distribution Network (CDN) location. +- **CDNId** The unique identifier of a specific device, used to identify how many devices are encountering success or a particular issue. +- **ClientVersion** The version number of the software distribution client. +- **CommonProps** A bitmask for future flags associated with the Windows Update client behavior. No data is currently reported in this field. Expected value for this field is 0. +- **Context** Gives context on where the error has occurred. Example: AutoEnable, GetSLSData, AddService, Misc, or Unknown +- **CurrentMobileOperator** The mobile operator the device is currently connected to. +- **DeferralPolicySources** Sources for any update deferral policies defined (GPO = 0x10, MDM = 0x100, Flight = 0x1000, UX = 0x10000). +- **DeferredUpdates** Update IDs which are currently being deferred until a later time +- **DeviceModel** What is the device model. +- **DriverError** The error code hit during a driver scan. This is 0 if no error was encountered. +- **DriverExclusionPolicy** Indicates if the policy for not including drivers with Windows Update is enabled. +- **DriverSyncPassPerformed** Were drivers scanned this time? +- **EventInstanceID** A globally unique identifier for event instance. +- **EventScenario** Indicates the purpose of sending this event - whether because the software distribution just started checking for content, or whether it was cancelled, succeeded, or failed. +- **ExtendedMetadataCabUrl** Hostname that is used to download an update. +- **ExtendedStatusCode** Secondary error code for certain scenarios where StatusCode wasn't specific enough. +- **FailedUpdateGuids** The GUIDs for the updates that failed to be evaluated during the scan. +- **FailedUpdatesCount** The number of updates that failed to be evaluated during the scan. +- **FeatureUpdateDeferral** The deferral period configured for feature OS updates on the device (in days). +- **FeatureUpdatePause** Indicates whether feature OS updates are paused on the device. +- **FeatureUpdatePausePeriod** The pause duration configured for feature OS updates on the device (in days). +- **FlightBranch** The branch that a device is on if participating in flighting (pre-release builds). +- **FlightRing** The ring (speed of getting builds) that a device is on if participating in flighting (pre-release builds). +- **HomeMobileOperator** The mobile operator that the device was originally intended to work with. +- **IntentPFNs** Intended application-set metadata for atomic update scenarios. +- **IPVersion** Indicates whether the download took place over IPv4 or IPv6 +- **IsWUfBDualScanEnabled** Indicates if Windows Update for Business dual scan is enabled on the device. +- **IsWUfBEnabled** Indicates if Windows Update for Business is enabled on the device. +- **IsWUfBFederatedScanDisabled** Indicates if Windows Update for Business federated scan is disabled on the device. +- **MetadataIntegrityMode** The mode of the update transport metadata integrity check. 0-Unknown, 1-Ignoe, 2-Audit, 3-Enforce +- **MSIError** The last error that was encountered during a scan for updates. +- **NetworkConnectivityDetected** Indicates the type of network connectivity that was detected. 0 - IPv4, 1 - IPv6 +- **NumberOfApplicableUpdates** The number of updates which were ultimately deemed applicable to the system after the detection process is complete +- **NumberOfApplicationsCategoryScanEvaluated** The number of categories (apps) for which an app update scan checked +- **NumberOfLoop** The number of round trips the scan required +- **NumberOfNewUpdatesFromServiceSync** The number of updates which were seen for the first time in this scan +- **NumberOfUpdatesEvaluated** The total number of updates which were evaluated as a part of the scan +- **NumFailedMetadataSignatures** The number of metadata signatures checks which failed for new metadata synced down. +- **Online** Indicates if this was an online scan. +- **PausedUpdates** A list of UpdateIds which that currently being paused. +- **PauseFeatureUpdatesEndTime** If feature OS updates are paused on the device, this is the date and time for the end of the pause time window. +- **PauseFeatureUpdatesStartTime** If feature OS updates are paused on the device, this is the date and time for the beginning of the pause time window. +- **PauseQualityUpdatesEndTime** If quality OS updates are paused on the device, this is the date and time for the end of the pause time window. +- **PauseQualityUpdatesStartTime** If quality OS updates are paused on the device, this is the date and time for the beginning of the pause time window. +- **PhonePreviewEnabled** Indicates whether a phone was getting preview build, prior to flighting (pre-release builds) being introduced. +- **ProcessName** The process name of the caller who initiated API calls, in the event where CallerApplicationName was not provided. +- **QualityUpdateDeferral** The deferral period configured for quality OS updates on the device (in days). +- **QualityUpdatePause** Indicates whether quality OS updates are paused on the device. +- **QualityUpdatePausePeriod** The pause duration configured for quality OS updates on the device (in days). +- **RelatedCV** The previous Correlation Vector that was used before swapping with a new one +- **ScanDurationInSeconds** The number of seconds a scan took +- **ScanEnqueueTime** The number of seconds it took to initialize a scan +- **ScanProps** This is a 32-bit integer containing Boolean properties for a given Windows Update scan. The following bits are used; all remaining bits are reserved and set to zero. Bit 0 (0x1): IsInteractive - is set to 1 if the scan is requested by a user, or 0 if the scan is requested by Automatic Updates. Bit 1 (0x2): IsSeeker - is set to 1 if the Windows Update client's Seeker functionality is enabled. Seeker functionality is enabled on certain interactive scans, and results in the scans returning certain updates that are in the initial stages of release (not yet released for full adoption via Automatic Updates). +- **ServiceGuid** An ID which represents which service the software distribution client is checking for content (Windows Update, Microsoft Store, etc.). +- **ServiceUrl** The environment URL a device is configured to scan with +- **ShippingMobileOperator** The mobile operator that a device shipped on. +- **StatusCode** Indicates the result of a CheckForUpdates event (success, cancellation, failure code HResult). +- **SyncType** Describes the type of scan the event was +- **SystemBIOSMajorRelease** Major version of the BIOS. +- **SystemBIOSMinorRelease** Minor version of the BIOS. +- **TargetMetadataVersion** For self-initiated healing, this is the target version of the SIH engine to download (if needed). If not, the value is null. +- **TotalNumMetadataSignatures** The total number of metadata signatures checks done for new metadata that was synced down. +- **WebServiceRetryMethods** Web service method requests that needed to be retried to complete operation. +- **WUDeviceID** The unique identifier of a specific device, used to identify how many devices are encountering success or a particular issue. + + +### SoftwareUpdateClientTelemetry.Commit + +This event tracks the commit process post the update installation when software update client is trying to update the device. + +The following fields are available: + +- **BiosFamily** Device family as defined in the system BIOS +- **BiosName** Name of the system BIOS +- **BiosReleaseDate** Release date of the system BIOS +- **BiosSKUNumber** Device SKU as defined in the system BIOS +- **BIOSVendor** Vendor of the system BIOS +- **BiosVersion** Version of the system BIOS +- **BundleId** Identifier associated with the specific content bundle; should not be all zeros if the bundleID was found. +- **BundleRevisionNumber** Identifies the revision number of the content bundle +- **CallerApplicationName** Name provided by the caller who initiated API calls into the software distribution client +- **ClientVersion** Version number of the software distribution client +- **DeploymentProviderMode** No content is currently available. +- **DeviceModel** Device model as defined in the system bios +- **EventInstanceID** A globally unique identifier for event instance +- **EventScenario** Indicates the purpose of the event - whether because scan started, succeded, failed, etc. +- **EventType** Possible values are "Child", "Bundle", "Relase" or "Driver". +- **FlightId** The specific id of the flight the device is getting +- **HandlerType** Indicates the kind of content (app, driver, windows patch, etc.) +- **RevisionNumber** Identifies the revision number of this specific piece of content +- **ServiceGuid** Identifier for the service to which the software distribution client is connecting (Windows Update, Windows Store, etc) +- **SystemBIOSMajorRelease** Major release version of the system bios +- **SystemBIOSMinorRelease** Minor release version of the system bios +- **UpdateId** Identifier associated with the specific piece of content +- **WUDeviceID** Unique device id controlled by the software distribution client + + +### SoftwareUpdateClientTelemetry.Download + +Download process event for target update on Windows Update client. See the EventScenario field for specifics (started/failed/succeeded). + +The following fields are available: + +- **ActiveDownloadTime** Number of seconds the update was actively being downloaded. +- **AppXBlockHashFailures** Indicates the number of blocks that failed hash validation during download of the app payload. +- **AppXBlockHashValidationFailureCount** A count of the number of blocks that have failed validation after being downloaded. +- **AppXDownloadScope** Indicates the scope of the download for application content. For streaming install scenarios, AllContent - non-streaming download, RequiredOnly - streaming download requested content required for launch, AutomaticOnly - streaming download requested automatic streams for the app, and Unknown - for events sent before download scope is determined by the Windows Update client. +- **AppXScope** Indicates the scope of the app download. +- **BiosFamily** The family of the BIOS (Basic Input Output System). +- **BiosName** The name of the device BIOS. +- **BiosReleaseDate** The release date of the device BIOS. +- **BiosSKUNumber** The sku number of the device BIOS. +- **BIOSVendor** The vendor of the BIOS. +- **BiosVersion** The version of the BIOS. +- **BundleBytesDownloaded** Number of bytes downloaded for the specific content bundle. +- **BundleId** Identifier associated with the specific content bundle; should not be all zeros if the bundleID was found. +- **BundleRepeatFailCount** Indicates whether this particular update bundle has previously failed. +- **BundleRepeatFailFlag** Indicates whether this particular update bundle previously failed to download. +- **BundleRevisionNumber** Identifies the revision number of the content bundle. +- **BytesDownloaded** Number of bytes that were downloaded for an individual piece of content (not the entire bundle). +- **CallerApplicationName** The name provided by the caller who initiated API calls into the software distribution client. +- **CbsDownloadMethod** Indicates whether the download was a full-file download or a partial/delta download. +- **CbsMethod** The method used for downloading the update content related to the Component Based Servicing (CBS) technology. +- **CDNCountryCode** Two letter country abbreviation for the Content Distribution Network (CDN) location. +- **CDNId** ID which defines which CDN the software distribution client downloaded the content from. +- **ClientVersion** The version number of the software distribution client. +- **CommonProps** A bitmask for future flags associated with the Windows Update client behavior. +- **ConnectTime** Indicates the cumulative amount of time (in seconds) it took to establish the connection for all updates in an update bundle. +- **CurrentMobileOperator** The mobile operator the device is currently connected to. +- **DeviceModel** What is the device model. +- **DownloadPriority** Indicates whether a download happened at background, normal, or foreground priority. +- **DownloadProps** Information about the download operation. +- **EventInstanceID** A globally unique identifier for event instance. +- **EventScenario** Indicates the purpose of sending this event - whether because the software distribution just started downloading content, or whether it was cancelled, succeeded, or failed. +- **EventType** Possible values are Child, Bundle, or Driver. +- **ExtendedStatusCode** Secondary error code for certain scenarios where StatusCode wasn't specific enough. +- **FeatureUpdatePause** Indicates whether feature OS updates are paused on the device. +- **FlightBranch** The branch that a device is on if participating in flighting (pre-release builds). +- **FlightBuildNumber** If this download was for a flight (pre-release build), this indicates the build number of that flight. +- **FlightId** The specific ID of the flight (pre-release build) the device is getting. +- **FlightRing** The ring (speed of getting builds) that a device is on if participating in flighting (pre-release builds). +- **HandlerType** Indicates what kind of content is being downloaded (app, driver, windows patch, etc.). +- **HardwareId** If this download was for a driver targeted to a particular device model, this ID indicates the model of the device. +- **HomeMobileOperator** The mobile operator that the device was originally intended to work with. +- **HostName** The hostname URL the content is downloading from. +- **IPVersion** Indicates whether the download took place over IPv4 or IPv6. +- **IsDependentSet** Indicates whether a driver is a part of a larger System Hardware/Firmware Update +- **IsWUfBDualScanEnabled** Indicates if Windows Update for Business dual scan is enabled on the device. +- **IsWUfBEnabled** Indicates if Windows Update for Business is enabled on the device. +- **NetworkCost** A flag indicating the cost of the network (congested, fixed, variable, over data limit, roaming, etc.) used for downloading the update content. +- **NetworkCostBitMask** Indicates what kind of network the device is connected to (roaming, metered, over data cap, etc.) +- **NetworkRestrictionStatus** More general version of NetworkCostBitMask, specifying whether Windows considered the current network to be "metered." +- **PackageFullName** The package name of the content. +- **PhonePreviewEnabled** Indicates whether a phone was opted-in to getting preview builds, prior to flighting (pre-release builds) being introduced. +- **PostDnldTime** Time taken (in seconds) to signal download completion after the last job has completed downloading payload. +- **ProcessName** The process name of the caller who initiated API calls, in the event where CallerApplicationName was not provided. +- **QualityUpdatePause** Indicates whether quality OS updates are paused on the device. +- **Reason** A 32-bit integer representing the reason the update is blocked from being downloaded in the background. +- **RegulationReason** The reason that the update is regulated +- **RegulationResult** The result code (HResult) of the last attempt to contact the regulation web service for download regulation of update content. +- **RelatedCV** The previous Correlation Vector that was used before swapping with a new one. +- **RepeatFailCount** Indicates whether this specific content has previously failed. +- **RepeatFailFlag** Indicates whether this specific piece of content had previously failed to download. +- **RevisionNumber** The revision number of the specified piece of content. +- **ServiceGuid** An ID that represents which service the software distribution client is installing content for (Windows Update, Windows Store, etc.). +- **Setup360Phase** If the download is for an operating system upgrade, this datapoint indicates which phase of the upgrade is underway. +- **ShippingMobileOperator** The mobile operator that a device shipped on. +- **SizeCalcTime** Time taken (in seconds) to calculate the total download size of the payload. +- **StatusCode** Indicates the result of a Download event (success, cancellation, failure code HResult). +- **SystemBIOSMajorRelease** Major version of the BIOS. +- **SystemBIOSMinorRelease** Minor version of the BIOS. +- **TargetGroupId** For drivers targeted to a specific device model, this ID indicates the distribution group of devices receiving that driver. +- **TargetingVersion** For drivers targeted to a specific device model, this is the version number of the drivers being distributed to the device. +- **ThrottlingServiceHResult** Result code (success/failure) while contacting a web service to determine whether this device should download content yet. +- **TimeToEstablishConnection** Time (in ms) it took to establish the connection prior to beginning downloaded. +- **TotalExpectedBytes** The total count of bytes that the download is expected to be. +- **UpdateId** An identifier associated with the specific piece of content. +- **UpdateImportance** Indicates whether a piece of content was marked as Important, Recommended, or Optional. +- **UsedDO** Whether the download used the delivery optimization service. +- **UsedSystemVolume** Indicates whether the content was downloaded to the device's main system storage drive, or an alternate storage drive. +- **WUDeviceID** The unique identifier of a specific device, used to identify how many devices are encountering success or a particular issue. + + +### SoftwareUpdateClientTelemetry.DownloadCheckpoint + +This event provides a checkpoint between each of the Windows Update download phases for UUP content + +The following fields are available: + +- **CallerApplicationName** The name provided by the caller who initiated API calls into the software distribution client +- **ClientVersion** The version number of the software distribution client +- **EventScenario** Indicates the purpose of sending this event - whether because the software distribution just started checking for content, or whether it was cancelled, succeeded, or failed +- **EventType** Possible values are "Child", "Bundle", "Relase" or "Driver" +- **ExtendedStatusCode** Secondary error code for certain scenarios where StatusCode wasn't specific enough +- **FileId** A hash that uniquely identifies a file +- **FileName** Name of the downloaded file +- **FlightId** The unique identifier for each flight +- **RelatedCV** The previous Correlation Vector that was used before swapping with a new one +- **RevisionNumber** Unique revision number of Update +- **ServiceGuid** An ID which represents which service the software distribution client is checking for content (Windows Update, Microsoft Store, etc.) +- **StatusCode** Indicates the result of a CheckForUpdates event (success, cancellation, failure code HResult) +- **UpdateId** Unique Update ID +- **WUDeviceID** The unique identifier of a specific device, used to identify how many devices are encountering success or a particular issue + + +### SoftwareUpdateClientTelemetry.DownloadHeartbeat + +This event allows tracking of ongoing downloads and contains data to explain the current state of the download + +The following fields are available: + +- **BytesTotal** Total bytes to transfer for this content +- **BytesTransferred** Total bytes transferred for this content at the time of heartbeat +- **CallerApplicationName** Name provided by the caller who initiated API calls into the software distribution client +- **ClientVersion** The version number of the software distribution client +- **ConnectionStatus** Indicates the connectivity state of the device at the time of heartbeat +- **CurrentError** Last (transient) error encountered by the active download +- **DownloadFlags** Flags indicating if power state is ignored +- **DownloadState** Current state of the active download for this content (queued, suspended, or progressing) +- **EventType** Possible values are "Child", "Bundle", or "Driver" +- **FlightId** The unique identifier for each flight +- **IsNetworkMetered** Indicates whether Windows considered the current network to be ?metered" +- **MOAppDownloadLimit** Mobile operator cap on size of application downloads, if any +- **MOUpdateDownloadLimit** Mobile operator cap on size of operating system update downloads, if any +- **PowerState** Indicates the power state of the device at the time of heartbeart (DC, AC, Battery Saver, or Connected Standby) +- **RelatedCV** The previous correlation vector that was used by the client, before swapping with a new one +- **ResumeCount** Number of times this active download has resumed from a suspended state +- **RevisionNumber** Identifies the revision number of this specific piece of content +- **ServiceGuid** Identifier for the service to which the software distribution client is connecting (Windows Update, Microsoft Store, etc) +- **SuspendCount** Number of times this active download has entered a suspended state +- **SuspendReason** Last reason for why this active download entered a suspended state +- **UpdateId** Identifier associated with the specific piece of content +- **WUDeviceID** Unique device id controlled by the software distribution client + + +### SoftwareUpdateClientTelemetry.Install + +This event sends tracking data about the software distribution client installation of the content for that update, to help keep Windows up to date. + +The following fields are available: + +- **BiosFamily** The family of the BIOS (Basic Input Output System). +- **BiosName** The name of the device BIOS. +- **BiosReleaseDate** The release date of the device BIOS. +- **BiosSKUNumber** The sku number of the device BIOS. +- **BIOSVendor** The vendor of the BIOS. +- **BiosVersion** The version of the BIOS. +- **BundleId** Identifier associated with the specific content bundle; should not be all zeros if the bundleID was found. +- **BundleRepeatFailCount** Indicates whether this particular update bundle has previously failed. +- **BundleRepeatFailFlag** Indicates whether this particular update bundle previously failed to install. +- **BundleRevisionNumber** Identifies the revision number of the content bundle. +- **CallerApplicationName** The name provided by the caller who initiated API calls into the software distribution client. +- **ClientVersion** The version number of the software distribution client. +- **CommonProps** A bitmask for future flags associated with the Windows Update client behavior. No value is currently reported in this field. Expected value for this field is 0. +- **CSIErrorType** The stage of CBS installation where it failed. +- **CurrentMobileOperator** The mobile operator to which the device is currently connected. +- **DeploymentProviderMode** No content is currently available. +- **DeviceModel** The device model. +- **DriverPingBack** Contains information about the previous driver and system state. +- **DriverRecoveryIds** The list of identifiers that could be used for uninstalling the drivers if a recovery is required. +- **EventInstanceID** A globally unique identifier for event instance. +- **EventScenario** Indicates the purpose of sending this event - whether because the software distribution just started installing content, or whether it was cancelled, succeeded, or failed. +- **EventType** Possible values are Child, Bundle, or Driver. +- **ExtendedErrorCode** The extended error code. +- **ExtendedStatusCode** Secondary error code for certain scenarios where StatusCode is not specific enough. +- **FeatureUpdatePause** Indicates whether feature OS updates are paused on the device. +- **FlightBranch** The branch that a device is on if participating in the Windows Insider Program. +- **FlightBuildNumber** If this installation was for a Windows Insider build, this is the build number of that build. +- **FlightId** The specific ID of the Windows Insider build the device is getting. +- **FlightRing** The ring that a device is on if participating in the Windows Insider Program. +- **HandlerType** Indicates what kind of content is being installed (for example, app, driver, Windows update). +- **HardwareId** If this install was for a driver targeted to a particular device model, this ID indicates the model of the device. +- **HomeMobileOperator** The mobile operator that the device was originally intended to work with. +- **InstallProps** A bitmask for future flags associated with the install operation. No value is currently reported in this field. Expected value for this field is 0. +- **IntentPFNs** Intended application-set metadata for atomic update scenarios. +- **IsDependentSet** Indicates whether the driver is part of a larger System Hardware/Firmware update. +- **IsFinalOutcomeEvent** Indicates whether this event signals the end of the update/upgrade process. +- **IsFirmware** Indicates whether this update is a firmware update. +- **IsSuccessFailurePostReboot** Indicates whether the update succeeded and then failed after a restart. +- **IsWUfBDualScanEnabled** Indicates whether Windows Update for Business dual scan is enabled on the device. +- **IsWUfBEnabled** Indicates whether Windows Update for Business is enabled on the device. +- **MergedUpdate** Indicates whether the OS update and a BSP update merged for installation. +- **MsiAction** The stage of MSI installation where it failed. +- **MsiProductCode** The unique identifier of the MSI installer. +- **PackageFullName** The package name of the content being installed. +- **PhonePreviewEnabled** Indicates whether a phone was getting preview build, prior to flighting being introduced. +- **ProcessName** The process name of the caller who initiated API calls, in the event that CallerApplicationName was not provided. +- **QualityUpdatePause** Indicates whether quality OS updates are paused on the device. +- **RelatedCV** The previous Correlation Vector that was used before swapping with a new one +- **RepeatFailCount** Indicates whether this specific piece of content has previously failed. +- **RepeatFailFlag** Indicates whether this specific piece of content previously failed to install. +- **RevisionNumber** The revision number of this specific piece of content. +- **ServiceGuid** An ID which represents which service the software distribution client is installing content for (Windows Update, Microsoft Store, etc.). +- **Setup360Phase** If the install is for an operating system upgrade, indicates which phase of the upgrade is underway. +- **ShippingMobileOperator** The mobile operator that a device shipped on. +- **StatusCode** Indicates the result of an installation event (success, cancellation, failure code HResult). +- **SystemBIOSMajorRelease** Major version of the BIOS. +- **SystemBIOSMinorRelease** Minor version of the BIOS. +- **TargetGroupId** For drivers targeted to a specific device model, this ID indicates the distribution group of devices receiving that driver. +- **TargetingVersion** For drivers targeted to a specific device model, this is the version number of the drivers being distributed to the device. +- **TransactionCode** The ID that represents a given MSI installation. +- **UpdateId** Unique update ID. +- **UpdateImportance** Indicates whether a piece of content was marked as Important, Recommended, or Optional. +- **UsedSystemVolume** Indicates whether the content was downloaded and then installed from the device's main system storage drive, or an alternate storage drive. +- **WUDeviceID** The unique identifier of a specific device, used to identify how many devices are encountering success or a particular issue. + + +### SoftwareUpdateClientTelemetry.Revert + +Revert event for target update on Windows Update Client. See EventScenario field for specifics (for example, Started/Failed/Succeeded). + +The following fields are available: + +- **BundleId** Identifier associated with the specific content bundle. Should not be all zeros if the BundleId was found. +- **BundleRepeatFailCount** Indicates whether this particular update bundle has previously failed. +- **BundleRevisionNumber** Identifies the revision number of the content bundle. +- **CallerApplicationName** Name of application making the Windows Update request. Used to identify context of request. +- **ClientVersion** Version number of the software distribution client. +- **CommonProps** A bitmask for future flags associated with the Windows Update client behavior. There is no value being reported in this field right now. Expected value for this field is 0. +- **CSIErrorType** Stage of CBS installation that failed. +- **DeploymentProviderMode** No content is currently available. +- **DriverPingBack** Contains information about the previous driver and system state. +- **DriverRecoveryIds** The list of identifiers that could be used for uninstalling the drivers if a recovery is required. +- **EventInstanceID** A globally unique identifier for event instance. +- **EventScenario** Indicates the purpose of the event (scan started, succeeded, failed, etc.). +- **EventType** Event type (Child, Bundle, Release, or Driver). +- **ExtendedStatusCode** Secondary status code for certain scenarios where StatusCode is not specific enough. +- **FeatureUpdatePause** Indicates whether feature OS updates are paused on the device. +- **FlightBuildNumber** Indicates the build number of the flight. +- **FlightId** The specific ID of the flight the device is getting. +- **HandlerType** Indicates the kind of content (app, driver, windows patch, etc.). +- **HardwareId** If this download was for a driver targeted to a particular device model, this ID indicates the model of the device. +- **IsFinalOutcomeEvent** Indicates whether this event signals the end of the update/upgrade process. +- **IsFirmware** Indicates whether an update was a firmware update. +- **IsSuccessFailurePostReboot** Indicates whether an initial success was a failure after a reboot. +- **IsWUfBDualScanEnabled** Flag indicating whether WU-for-Business dual scan is enabled on the device. +- **IsWUfBEnabled** Flag indicating whether WU-for-Business is enabled on the device. +- **MergedUpdate** Indicates whether an OS update and a BSP update were merged for install. +- **ProcessName** Process name of the caller who initiated API calls into the software distribution client. +- **QualityUpdatePause** Indicates whether quality OS updates are paused on the device. +- **RelatedCV** The previous correlation vector that was used by the client before swapping with a new one. +- **RepeatFailCount** Indicates whether this specific piece of content has previously failed. +- **RevisionNumber** Identifies the revision number of this specific piece of content. +- **ServiceGuid** Identifier for the service to which the software distribution client is connecting (Windows Update, Windows Store, etc.). +- **StatusCode** Result code of the event (success, cancellation, failure code HResult). +- **TargetGroupId** For drivers targeted to a specific device model, this ID indicates the distribution group of devices receiving that driver. +- **TargetingVersion** For drivers targeted to a specific device model, this is the version number of the drivers being distributed to the device. +- **UpdateId** The identifier associated with the specific piece of content. +- **UpdateImportance** Indicates the importance of a driver, and why it received that importance level (0-Unknown, 1-Optional, 2-Important-DNF, 3-Important-Generic, 4-Important-Other, 5-Recommended). +- **UsedSystemVolume** Indicates whether the device's main system storage drive or an alternate storage drive was used. +- **WUDeviceID** Unique device ID controlled by the software distribution client. + + +### SoftwareUpdateClientTelemetry.TaskRun + +Start event for Server Initiated Healing client. See EventScenario field for specifics (for example, started/completed). + +The following fields are available: + +- **CallerApplicationName** Name of application making the Windows Update request. Used to identify context of request. +- **ClientVersion** Version number of the software distribution client. +- **CmdLineArgs** Command line arguments passed in by the caller. +- **EventInstanceID** A globally unique identifier for the event instance. +- **EventScenario** Indicates the purpose of the event (scan started, succeeded, failed, etc.). +- **Mode** No content is currently available. +- **ServiceGuid** Identifier for the service to which the software distribution client is connecting (Windows Update, Microsoft Store, etc.). +- **StatusCode** Result code of the event (success, cancellation, failure code HResult). +- **WUDeviceID** Unique device ID controlled by the software distribution client. + + +### SoftwareUpdateClientTelemetry.Uninstall + +Uninstall event for target update on Windows Update Client. See EventScenario field for specifics (for example, Started/Failed/Succeeded). + +The following fields are available: + +- **BundleId** The identifier associated with the specific content bundle. This should not be all zeros if the bundleID was found. +- **BundleRepeatFailCount** Indicates whether this particular update bundle previously failed. +- **BundleRevisionNumber** Identifies the revision number of the content bundle. +- **CallerApplicationName** Name of the application making the Windows Update request. Used to identify context of request. +- **ClientVersion** Version number of the software distribution client. +- **CommonProps** A bitmask for future flags associated with the Windows Update client behavior. There is no value being reported in this field right now. Expected value for this field is 0. +- **DeploymentProviderMode** No content is currently available. +- **DriverPingBack** Contains information about the previous driver and system state. +- **DriverRecoveryIds** The list of identifiers that could be used for uninstalling the drivers when a recovery is required. +- **EventInstanceID** A globally unique identifier for event instance. +- **EventScenario** Indicates the purpose of the event (a scan started, succeded, failed, etc.). +- **EventType** Indicates the event type. Possible values are "Child", "Bundle", "Release" or "Driver". +- **ExtendedStatusCode** Secondary status code for certain scenarios where StatusCode is not specific enough. +- **FeatureUpdatePause** Indicates whether feature OS updates are paused on the device. +- **FlightBuildNumber** Indicates the build number of the flight. +- **FlightId** The specific ID of the flight the device is getting. +- **HandlerType** Indicates the kind of content (app, driver, windows patch, etc.). +- **HardwareId** If the download was for a driver targeted to a particular device model, this ID indicates the model of the device. +- **IsFinalOutcomeEvent** Indicates whether this event signals the end of the update/upgrade process. +- **IsFirmware** Indicates whether an update was a firmware update. +- **IsSuccessFailurePostReboot** Indicates whether an initial success was then a failure after a reboot. +- **IsWUfBDualScanEnabled** Flag indicating whether WU-for-Business dual scan is enabled on the device. +- **IsWUfBEnabled** Flag indicating whether WU-for-Business is enabled on the device. +- **MergedUpdate** Indicates whether an OS update and a BSP update were merged for install. +- **ProcessName** Process name of the caller who initiated API calls into the software distribution client. +- **QualityUpdatePause** Indicates whether quality OS updates are paused on the device. +- **RelatedCV** The previous correlation vector that was used by the client before swapping with a new one. +- **RepeatFailCount** Indicates whether this specific piece of content previously failed. +- **RevisionNumber** Identifies the revision number of this specific piece of content. +- **ServiceGuid** Identifier for the service to which the software distribution client is connecting (Windows Update, Windows Store, etc.). +- **StatusCode** Result code of the event (success, cancellation, failure code HResult). +- **TargetGroupId** For drivers targeted to a specific device model, this ID indicates the distribution group of devices receiving that driver. +- **TargetingVersion** For drivers targeted to a specific device model, this is the version number of the drivers being distributed to the device. +- **UpdateId** Identifier associated with the specific piece of content. +- **UpdateImportance** Indicates the importance of a driver and why it received that importance level (0-Unknown, 1-Optional, 2-Important-DNF, 3-Important-Generic, 4-Important-Other, 5-Recommended). +- **UsedSystemVolume** Indicates whether the device’s main system storage drive or an alternate storage drive was used. +- **WUDeviceID** Unique device ID controlled by the software distribution client. + + +### SoftwareUpdateClientTelemetry.UpdateDetected + +This event sends data about an AppX app that has been updated from the Microsoft Store, including what app needs an update and what version/architecture is required, in order to understand and address problems with apps getting required updates. + +The following fields are available: + +- **ApplicableUpdateInfo** Metadata for the updates which were detected as applicable. +- **CallerApplicationName** The name provided by the caller who initiated API calls into the software distribution client. +- **IntentPFNs** Intended application-set metadata for atomic update scenarios. +- **NumberOfApplicableUpdates** The number of updates ultimately deemed applicable to the system after the detection process is complete. +- **RelatedCV** The previous Correlation Vector that was used before swapping with a new one. +- **ServiceGuid** An ID that represents which service the software distribution client is connecting to (Windows Update, Microsoft Store, etc.). +- **WUDeviceID** The unique device ID controlled by the software distribution client. + + +### SoftwareUpdateClientTelemetry.UpdateMetadataIntegrity + +Ensures Windows Updates are secure and complete. Event helps to identify whether update content has been tampered with and protects against man-in-the-middle attack. + +The following fields are available: + +- **CallerApplicationName** Name of application making the Windows Update request. Used to identify context of request. +- **EndpointUrl** The endpoint URL where the device obtains update metadata. This is used to distinguish between test, staging, and production environments. +- **EventScenario** The purpose of this event, such as scan started, scan succeeded, or scan failed. +- **ExtendedStatusCode** The secondary status code of the event. +- **LeafCertId** The integral ID from the FragmentSigning data for the certificate that failed. +- **ListOfSHA256OfIntermediateCerData** A semicolon delimited list of base64 encoding of hashes for the Base64CerData in the FragmentSigning data of an intermediate certificate. +- **MetadataIntegrityMode** The mode of the transport metadata integrity check. 0 = unknown; 1 = ignore; 2 = audit; 3 = enforce +- **MetadataSignature** A base64-encoded string of the signature associated with the update metadata (specified by revision ID). +- **RawMode** The raw unparsed mode string from the SLS response. This field is null if not applicable. +- **RawValidityWindowInDays** The raw unparsed validity window string in days of the timestamp token. This field is null if not applicable. +- **RevisionId** The revision ID for a specific piece of content. +- **RevisionNumber** The revision number for a specific piece of content. +- **ServiceGuid** Identifies the service to which the software distribution client is connected, Example: Windows Update or Microsoft Store +- **SHA256OfLeafCerData** A base64 encoding of the hash for the Base64CerData in the FragmentSigning data of the leaf certificate. +- **SHA256OfLeafCertPublicKey** A base64 encoding of the hash of the Base64CertData in the FragmentSigning data of the leaf certificate. +- **SHA256OfTimestampToken** An encoded string of the timestamp token. +- **SignatureAlgorithm** The hash algorithm for the metadata signature. +- **SLSPrograms** A test program to which a device may have opted in. Example: Insider Fast +- **StatusCode** The status code of the event. +- **TimestampTokenCertThumbprint** The thumbprint of the encoded timestamp token. +- **TimestampTokenId** The time this was created. It is encoded in a timestamp blob and will be zero if the token is malformed. +- **UpdateId** The update ID for a specific piece of content. +- **ValidityWindowInDays** The validity window that's in effect when verifying the timestamp. + + +## Update events + +### Update360Telemetry.Revert + +This event sends data relating to the Revert phase of updating Windows. + +The following fields are available: + +- **ErrorCode** The error code returned for the Revert phase. +- **FlightId** Unique ID for the flight (test instance version). +- **ObjectId** The unique value for each Update Agent mode. +- **RebootRequired** Indicates reboot is required. +- **RelatedCV** The correlation vector value generated from the latest USO (Update Service Orchestrator) scan. +- **RevertResult** The result code returned for the Revert operation. +- **ScenarioId** The ID of the update scenario. +- **SessionId** The ID of the update attempt. +- **UpdateId** The ID of the update. + + +### Update360Telemetry.UpdateAgentCommit + +This event collects information regarding the commit phase of the new Unified Update Platform (UUP) update scenario, which is leveraged by both Mobile and Desktop. + +The following fields are available: + +- **ErrorCode** The error code returned for the current install phase. +- **FlightId** Unique ID for each flight. +- **ObjectId** Unique value for each Update Agent mode. +- **RelatedCV** Correlation vector value generated from the latest USO scan. +- **Result** Outcome of the install phase of the update. +- **ScenarioId** Indicates the update scenario. +- **SessionId** Unique value for each update attempt. +- **UpdateId** Unique ID for each update. + + +### Update360Telemetry.UpdateAgentDownloadRequest + +This event sends data for the download request phase of updating Windows via the new Unified Update Platform (UUP) scenario. Applicable to PC and Mobile. + +The following fields are available: + +- **DeletedCorruptFiles** Boolean indicating whether corrupt payload was deleted. +- **DownloadRequests** Number of times a download was retried. +- **ErrorCode** The error code returned for the current download request phase. +- **ExtensionName** Indicates whether the payload is related to Operating System content or a plugin. +- **FlightId** Unique ID for each flight. +- **InternalFailureResult** Indicates a non-fatal error from a plugin. +- **ObjectId** Unique value for each Update Agent mode (same concept as InstanceId for Setup360). +- **PackageCategoriesSkipped** Indicates package categories that were skipped, if applicable. +- **PackageCountOptional** Number of optional packages requested. +- **PackageCountRequired** Number of required packages requested. +- **PackageCountTotal** Total number of packages needed. +- **PackageCountTotalCanonical** Total number of canonical packages. +- **PackageCountTotalDiff** Total number of diff packages. +- **PackageCountTotalExpress** Total number of express packages. +- **PackageExpressType** Type of express package. +- **PackageSizeCanonical** Size of canonical packages in bytes. +- **PackageSizeDiff** Size of diff packages in bytes. +- **PackageSizeExpress** Size of express packages in bytes. +- **RangeRequestState** Indicates the range request type used. +- **RelatedCV** Correlation vector value generated from the latest USO scan. +- **Result** Outcome of the download request phase of update. +- **ScenarioId** Indicates the update scenario. +- **SessionId** Unique value for each attempt (same value for initialize, download, install commit phases). +- **UpdateId** Unique ID for each update. + + +### Update360Telemetry.UpdateAgentExpand + +This event collects information regarding the expansion phase of the new Unified Update Platform (UUP) update scenario, which is leveraged by both Mobile and Desktop. + +The following fields are available: + +- **ElapsedTickCount** Time taken for expand phase. +- **EndFreeSpace** Free space after expand phase. +- **EndSandboxSize** Sandbox size after expand phase. +- **ErrorCode** The error code returned for the current install phase. +- **FlightId** Unique ID for each flight. +- **ObjectId** Unique value for each Update Agent mode. +- **RelatedCV** Correlation vector value generated from the latest USO scan. +- **ScenarioId** Indicates the update scenario. +- **SessionId** Unique value for each update attempt. +- **StartFreeSpace** Free space before expand phase. +- **StartSandboxSize** Sandbox size after expand phase. +- **UpdateId** Unique ID for each update. + + +### Update360Telemetry.UpdateAgentFellBackToCanonical + +This event collects information when express could not be used and we fall back to canonical during the new Unified Update Platform (UUP) update scenario, which is leveraged by both Mobile and Desktop. + +The following fields are available: + +- **FlightId** Unique ID for each flight. +- **ObjectId** Unique value for each Update Agent mode. +- **PackageCount** Number of packages that feel back to canonical. +- **PackageList** PackageIds which fell back to canonical. +- **RelatedCV** Correlation vector value generated from the latest USO scan. +- **ScenarioId** Indicates the update scenario. +- **SessionId** Unique value for each update attempt. +- **UpdateId** Unique ID for each update. + + +### Update360Telemetry.UpdateAgentInitialize + +This event sends data for the initialize phase of updating Windows via the new Unified Update Platform (UUP) scenario, which is applicable to both PCs and Mobile. + +The following fields are available: + +- **ErrorCode** The error code returned for the current install phase. +- **FlightId** Unique ID for each flight. +- **FlightMetadata** Contains the FlightId and the build being flighted. +- **ObjectId** Unique value for each Update Agent mode. +- **RelatedCV** Correlation vector value generated from the latest USO scan. +- **Result** Outcome of the install phase of the update. +- **ScenarioId** Indicates the update scenario. +- **SessionData** String containing instructions to update agent for processing FODs and DUICs (Null for other scenarios). +- **SessionId** Unique value for each update attempt. +- **UpdateId** Unique ID for each update. + + +### Update360Telemetry.UpdateAgentInstall + +This event sends data for the install phase of updating Windows. + +The following fields are available: + +- **ErrorCode** The error code returned for the current install phase. +- **ExtensionName** Indicates whether the payload is related to Operating System content or a plugin. +- **FlightId** Unique value for each Update Agent mode (same concept as InstanceId for Setup360). +- **InternalFailureResult** Indicates a non-fatal error from a plugin. +- **ObjectId** Correlation vector value generated from the latest USO scan. +- **RelatedCV** Correlation vector value generated from the latest USO scan. +- **Result** The result for the current install phase. +- **ScenarioId** Indicates the update scenario. +- **SessionId** Unique value for each update attempt. +- **UpdateId** Unique ID for each update. + + +### Update360Telemetry.UpdateAgentMerge + +The UpdateAgentMerge event sends data on the merge phase when updating Windows. + +The following fields are available: + +- **ErrorCode** The error code returned for the current merge phase. +- **FlightId** Unique ID for each flight. +- **MergeId** The unique ID to join two update sessions being merged. +- **ObjectId** Unique value for each Update Agent mode. +- **RelatedCV** Related correlation vector value. +- **Result** Outcome of the merge phase of the update. +- **ScenarioId** Indicates the update scenario. +- **SessionId** Unique value for each attempt. +- **UpdateId** Unique ID for each update. + + +### Update360Telemetry.UpdateAgentMitigationResult + +This event sends data indicating the result of each update agent mitigation. + +The following fields are available: + +- **Applicable** Indicates whether the mitigation is applicable for the current update. +- **CommandCount** The number of command operations in the mitigation entry. +- **CustomCount** The number of custom operations in the mitigation entry. +- **FileCount** The number of file operations in the mitigation entry. +- **FlightId** Unique identifier for each flight. +- **Index** The mitigation index of this particular mitigation. +- **MitigationScenario** The update scenario in which the mitigation was executed. +- **Name** The friendly name of the mitigation. +- **ObjectId** Unique value for each Update Agent mode. +- **OperationIndex** The mitigation operation index (in the event of a failure). +- **OperationName** The friendly name of the mitigation operation (in the event of failure). +- **RegistryCount** The number of registry operations in the mitigation entry. +- **RelatedCV** The correlation vector value generated from the latest USO scan. +- **Result** The HResult of this operation. +- **ScenarioId** The update agent scenario ID. +- **SessionId** Unique value for each update attempt. +- **TimeDiff** The amount of time spent performing the mitigation (in 100-nanosecond increments). +- **UpdateId** Unique ID for each Update. + + +### Update360Telemetry.UpdateAgentMitigationSummary + +This event sends a summary of all the update agent mitigations available for an this update. + +The following fields are available: + +- **Applicable** The count of mitigations that were applicable to the system and scenario. +- **Failed** The count of mitigations that failed. +- **FlightId** Unique identifier for each flight. +- **MitigationScenario** The update scenario in which the mitigations were attempted. +- **ObjectId** The unique value for each Update Agent mode. +- **RelatedCV** The correlation vector value generated from the latest USO scan. +- **Result** The HResult of this operation. +- **ScenarioId** The update agent scenario ID. +- **SessionId** Unique value for each update attempt. +- **TimeDiff** The amount of time spent performing all mitigations (in 100-nanosecond increments). +- **Total** Total number of mitigations that were available. +- **UpdateId** Unique ID for each update. + + +### Update360Telemetry.UpdateAgentModeStart + +This event sends data for the start of each mode during the process of updating Windows via the new Unified Update Platform (UUP) scenario. Applicable to both PCs and Mobile. + +The following fields are available: + +- **FlightId** Unique ID for each flight. +- **Mode** Indicates the mode that has started. +- **ObjectId** Unique value for each Update Agent mode. +- **RelatedCV** Correlation vector value generated from the latest USO scan. +- **ScenarioId** Indicates the update scenario. +- **SessionId** Unique value for each update attempt. +- **UpdateId** Unique ID for each update. +- **Version** Version of update + + +### Update360Telemetry.UpdateAgentOneSettings + +This event collects information regarding the post reboot phase of the new UUP (Unified Update Platform) update scenario; which is leveraged by both Mobile and Desktop. + +The following fields are available: + +- **Count** The count of applicable OneSettings for the device. +- **FlightId** Unique ID for the flight (test instance version). +- **ObjectId** The unique value for each Update Agent mode. +- **Parameters** The set of name value pair parameters sent to OneSettings to determine if there are any applicable OneSettings. +- **RelatedCV** The correlation vector value generated from the latest USO (Update Service Orchestrator) scan. +- **Result** The HResult of the event. +- **ScenarioId** The ID of the update scenario. +- **SessionId** The ID of the update attempt. +- **UpdateId** The ID of the update. +- **Values** The values sent back to the device, if applicable. + + +### Update360Telemetry.UpdateAgentPostRebootResult + +This event collects information for both Mobile and Desktop regarding the post reboot phase of the new Unified Update Platform (UUP) update scenario. + +The following fields are available: + +- **ErrorCode** The error code returned for the current post reboot phase. +- **FlightId** The specific ID of the Windows Insider build the device is getting. +- **ObjectId** Unique value for each Update Agent mode. +- **PostRebootResult** Indicates the Hresult. +- **RelatedCV** Correlation vector value generated from the latest USO scan. +- **ScenarioId** The scenario ID. Example: MobileUpdate, DesktopLanguagePack, DesktopFeatureOnDemand, or DesktopDriverUpdate. +- **SessionId** Unique value for each update attempt. +- **UpdateId** Unique ID for each update. + + +### Update360Telemetry.UpdateAgentReboot + +This event sends information indicating that a request has been sent to suspend an update. + +The following fields are available: + +- **ErrorCode** The error code returned for the current reboot. +- **FlightId** Unique ID for the flight (test instance version). +- **ObjectId** The unique value for each Update Agent mode. +- **RelatedCV** The correlation vector value generated from the latest USO (Update Service Orchestrator) scan. +- **Result** The HResult of the event. +- **ScenarioId** The ID of the update scenario. +- **SessionId** The ID of the update attempt. +- **UpdateId** The ID of the update. + + +### Update360Telemetry.UpdateAgentSetupBoxLaunch + +The UpdateAgent_SetupBoxLaunch event sends data for the launching of the setup box when updating Windows via the new Unified Update Platform (UUP) scenario. This event is only applicable to PCs. + +The following fields are available: + +- **ContainsExpressPackage** Indicates whether the download package is express. +- **FlightId** Unique ID for each flight. +- **FreeSpace** Free space on OS partition. +- **InstallCount** Number of install attempts using the same sandbox. +- **ObjectId** Unique value for each Update Agent mode. +- **Quiet** Indicates whether setup is running in quiet mode. +- **RelatedCV** Correlation vector value generated from the latest USO scan. +- **SandboxSize** Size of the sandbox. +- **ScenarioId** Indicates the update scenario. +- **SessionId** Unique value for each update attempt. +- **SetupMode** Mode of setup to be launched. +- **UpdateId** Unique ID for each Update. +- **UserSession** Indicates whether install was invoked by user actions. + + +## Upgrade events + +### FacilitatorTelemetry.DCATDownload + +This event indicates whether devices received additional or critical supplemental content during an OS Upgrade, to help keep Windows up-to-date and secure. + +The following fields are available: + +- **DownloadSize** Download size of payload. +- **ElapsedTime** Time taken to download payload. +- **MediaFallbackUsed** Used to determine if we used Media CompDBs to figure out package requirements for the upgrade. +- **ResultCode** Result returned by the Facilitator DCAT call. +- **Scenario** Dynamic update scenario (Image DU, or Setup DU). +- **Type** Type of package that was downloaded. +- **UpdateId** No content is currently available. + + +### FacilitatorTelemetry.InitializeDU + +This event determines whether devices received additional or critical supplemental content during an OS upgrade. + +The following fields are available: + +- **DownloadRequestAttributes** The attributes we send to DCAT. +- **ResultCode** The result returned from the initiation of Facilitator with the URL/attributes. +- **Scenario** Dynamic Update scenario (Image DU, or Setup DU). +- **Url** The Delivery Catalog (DCAT) URL we send the request to. +- **Version** Version of Facilitator. + + +### Setup360Telemetry.Downlevel + +This event sends data indicating that the device has started the downlevel phase of the upgrade, to help keep Windows up-to-date and secure. + +The following fields are available: + +- **ClientId** If using Windows Update, this will be the Windows Update client ID that is passed to Setup. In Media setup, the default value is Media360, but it can be overwritten by the caller to a unique value. +- **FlightData** Unique value that identifies the flight. +- **HostOSBuildNumber** The build number of the downlevel OS. +- **HostOsSkuName** The operating system edition which is running Setup360 instance (downlevel OS). +- **InstanceId** A unique GUID that identifies each instance of setuphost.exe. +- **ReportId** In the Windows Update scenario, this is the updateID that is passed to Setup. In media setup, this is the GUID for the install.wim. +- **Setup360Extended** More detailed information about phase/action when the potential failure occurred. +- **Setup360Mode** The phase of Setup360 (for example, Predownload, Install, Finalize, Rollback). +- **Setup360Result** The result of Setup360 (HRESULT used to diagnose errors). +- **Setup360Scenario** The Setup360 flow type (for example, Boot, Media, Update, MCT). +- **SetupVersionBuildNumber** The build number of Setup360 (build number of the target OS). +- **State** Exit state of given Setup360 run. Example: succeeded, failed, blocked, cancelled. +- **TestId** An ID that uniquely identifies a group of events. +- **WuId** This is the Windows Update Client ID. In the Windows Update scenario, this is the same as the clientId. + + +### Setup360Telemetry.Finalize + +This event sends data indicating that the device has started the phase of finalizing the upgrade, to help keep Windows up-to-date and secure. + +The following fields are available: + +- **ClientId** With Windows Update, this will be the Windows Update client ID that is passed to Setup. In Media setup, default value is Media360, but can be overwritten by the caller to a unique value. +- **FlightData** Unique value that identifies the flight. +- **HostOSBuildNumber** The build number of the previous OS. +- **HostOsSkuName** The OS edition which is running Setup360 instance (previous OS). +- **InstanceId** A unique GUID that identifies each instance of setuphost.exe +- **ReportId** With Windows Update, this is the updateID that is passed to Setup. In media setup, this is the GUID for the install.wim. +- **Setup360Extended** More detailed information about the phase/action when the potential failure occurred. +- **Setup360Mode** The phase of Setup360. Example: Predownload, Install, Finalize, Rollback. +- **Setup360Result** The result of Setup360. This is an HRESULT error code that is used to diagnose errors. +- **Setup360Scenario** The Setup360 flow type. Example: Boot, Media, Update, MCT. +- **SetupVersionBuildNumber** The build number of Setup360 (build number of target OS). +- **State** The exit state of a Setup360 run. Example: succeeded, failed, blocked, cancelled. +- **TestId** ID that uniquely identifies a group of events. +- **WuId** This is the Windows Update Client ID. With Windows Update, this is the same as the clientId. + + +### Setup360Telemetry.OsUninstall + +This event sends data regarding OS updates and upgrades from Windows 7, Windows 8, and Windows 10. Specifically, it indicates the outcome of an OS uninstall. + +The following fields are available: + +- **ClientId** For Windows Update, this will be the Windows Update client ID that is passed to Setup. In Media setup, default value is Media360, but can be overwritten by the caller to a unique value. +- **FlightData** Unique value that identifies the flight. +- **HostOSBuildNumber** The build number of the previous OS. +- **HostOsSkuName** The OS edition which is running the Setup360 instance (previous OS). +- **InstanceId** A unique GUID that identifies each instance of setuphost.exe. +- **ReportId** For Windows Update, this will be the Windows Update client ID that is passed to Setup. In Media setup, this is the GUID for the install.wim. +- **Setup360Extended** Detailed information about the phase or action when the potential failure occurred. +- **Setup360Mode** The phase of Setup360. Example: Predownload, Install, Finalize, Rollback. +- **Setup360Result** The result of Setup360. This is an HRESULT error code that is used to diagnose errors. +- **Setup360Scenario** The Setup360 flow type. Example: Boot, Media, Update, MCT +- **SetupVersionBuildNumber** The build number of Setup360 (build number of target OS). +- **State** Exit state of a Setup360 run. Example: succeeded, failed, blocked, cancelled. +- **TestId** ID that uniquely identifies a group of events. +- **WuId** Windows Update client ID. + + +### Setup360Telemetry.PostRebootInstall + +This event sends data indicating that the device has invoked the post reboot install phase of the upgrade, to help keep Windows up-to-date. + +The following fields are available: + +- **ClientId** With Windows Update, this is the Windows Update client ID that is passed to Setup. In Media setup, the default value is Media360, but can be overwritten by the caller to a unique value. +- **FlightData** Unique value that identifies the flight. +- **HostOSBuildNumber** The build number of the previous OS. +- **HostOsSkuName** The OS edition which is running Setup360 instance (previous OS). +- **InstanceId** A unique GUID that identifies each instance of setuphost.exe. +- **ReportId** With Windows Update, this is the updateID that is passed to Setup. In media setup, this is the GUID for the install.wim. +- **Setup360Extended** Extension of result - more granular information about phase/action when the potential failure happened +- **Setup360Mode** The phase of Setup360. Example: Predownload, Install, Finalize, Rollback +- **Setup360Result** The result of Setup360. This is an HRESULT error code that's used to diagnose errors. +- **Setup360Scenario** The Setup360 flow type. Example: Boot, Media, Update, MCT +- **SetupVersionBuildNumber** The build number of Setup360 (build number of target OS). +- **State** The exit state of a Setup360 run. Example: succeeded, failed, blocked, cancelled +- **TestId** A string to uniquely identify a group of events. +- **WuId** This is the Windows Update Client ID. With Windows Update, this is the same as ClientId. + + +### Setup360Telemetry.PreDownloadQuiet + +This event sends data indicating that the device has invoked the predownload quiet phase of the upgrade, to help keep Windows up to date. + +The following fields are available: + +- **ClientId** Using Windows Update, this will be the Windows Update client ID that is passed to Setup. In Media setup, default value is Media360, but can be overwritten by the caller to a unique value. +- **FlightData** Unique value that identifies the flight. +- **HostOSBuildNumber** The build number of the previous OS. +- **HostOsSkuName** The OS edition which is running Setup360 instance (previous operating system). +- **InstanceId** A unique GUID that identifies each instance of setuphost.exe. +- **ReportId** Using Windows Update, this is the updateID that is passed to Setup. In media setup, this is the GUID for the install.wim. +- **Setup360Extended** Detailed information about the phase/action when the potential failure occurred. +- **Setup360Mode** The phase of Setup360. Example: Predownload, Install, Finalize, Rollback. +- **Setup360Result** The result of Setup360. This is an HRESULT error code that is used to diagnose errors. +- **Setup360Scenario** The Setup360 flow type. Example: Boot, Media, Update, MCT. +- **SetupVersionBuildNumber** The build number of Setup360 (build number of target OS). +- **State** The exit state of a Setup360 run. Example: succeeded, failed, blocked, canceled. +- **TestId** ID that uniquely identifies a group of events. +- **WuId** This is the Windows Update Client ID. Using Windows Update, this is the same as the clientId. + + +### Setup360Telemetry.PreDownloadUX + +This event sends data regarding OS Updates and Upgrades from Windows 7.X, Windows 8.X, Windows 10 and RS, to help keep Windows up-to-date and secure. Specifically, it indicates the outcome of the PredownloadUX portion of the update process. + +The following fields are available: + +- **ClientId** For Windows Update, this will be the Windows Update client ID that is passed to Setup. In Media setup, default value is Media360, but can be overwritten by the caller to a unique value. +- **FlightData** In the WU scenario, this will be the WU client ID that is passed to Setup. In Media setup, default value is Media360, but can be overwritten by the caller to a unique value. +- **HostOSBuildNumber** The build number of the previous operating system. +- **HostOsSkuName** The OS edition which is running the Setup360 instance (previous operating system). +- **InstanceId** Unique GUID that identifies each instance of setuphost.exe. +- **ReportId** For Windows Update, this will be the Windows Update client ID that is passed to Setup. In Media setup, this is the GUID for the install.wim. +- **Setup360Extended** Detailed information about the phase/action when the potential failure occurred. +- **Setup360Mode** The phase of Setup360. Example: Predownload, Install, Finalize, Rollback. +- **Setup360Result** The result of Setup360. This is an HRESULT error code that can be used to diagnose errors. +- **Setup360Scenario** The Setup360 flow type. Example: Boot, Media, Update, MCT. +- **SetupVersionBuildNumber** The build number of Setup360 (build number of the target OS). +- **State** The exit state of the Setup360 run. Example: succeeded, failed, blocked, cancelled. +- **TestId** ID that uniquely identifies a group of events. +- **WuId** Windows Update client ID. + + +### Setup360Telemetry.PreInstallQuiet + +This event sends data indicating that the device has invoked the preinstall quiet phase of the upgrade, to help keep Windows up-to-date. + +The following fields are available: + +- **ClientId** With Windows Update, this will be the Windows Update client ID that is passed to Setup. In Media setup, default value is Media360, but can be overwritten by the caller to a unique value. +- **FlightData** Unique value that identifies the flight. +- **HostOSBuildNumber** The build number of the previous OS. +- **HostOsSkuName** The OS edition which is running Setup360 instance (previous OS). +- **InstanceId** A unique GUID that identifies each instance of setuphost.exe +- **ReportId** With Windows Update, this is the updateID that is passed to Setup. In media setup, this is the GUID for the install.wim. +- **Setup360Extended** Detailed information about the phase/action when the potential failure occurred. +- **Setup360Mode** The phase of Setup360. Example: Predownload, Install, Finalize, Rollback. +- **Setup360Result** The result of Setup360. This is an HRESULT error code that can be used to diagnose errors. +- **Setup360Scenario** Setup360 flow type (Boot, Media, Update, MCT). +- **SetupVersionBuildNumber** The build number of Setup360 (build number of target OS). +- **State** The exit state of a Setup360 run. Example: succeeded, failed, blocked, cancelled. +- **TestId** A string to uniquely identify a group of events. +- **WuId** This is the Windows Update Client ID. With Windows Update, this is the same as the clientId. + + +### Setup360Telemetry.PreInstallUX + +This event sends data regarding OS updates and upgrades from Windows 7, Windows 8, and Windows 10, to help keep Windows up-to-date. Specifically, it indicates the outcome of the PreinstallUX portion of the update process. + +The following fields are available: + +- **ClientId** For Windows Update, this will be the Windows Update client ID that is passed to Setup. In Media setup, default value is Media360, but can be overwritten by the caller to a unique value. +- **FlightData** Unique value that identifies the flight. +- **HostOSBuildNumber** The build number of the previous OS. +- **HostOsSkuName** The OS edition which is running the Setup360 instance (previous OS). +- **InstanceId** A unique GUID that identifies each instance of setuphost.exe. +- **ReportId** For Windows Update, this will be the Windows Update client ID that is passed to Setup. In Media setup, this is the GUID for the install.wim. +- **Setup360Extended** Detailed information about the phase/action when the potential failure occurred. +- **Setup360Mode** The phase of Setup360. Example: Predownload, Install, Finalize, Rollback. +- **Setup360Result** The result of Setup360. This is an HRESULT error code that is used to diagnose errors. +- **Setup360Scenario** The Setup360 flow type, Example: Boot, Media, Update, MCT. +- **SetupVersionBuildNumber** The build number of Setup360 (build number of target OS). +- **State** The exit state of a Setup360 run. Example: succeeded, failed, blocked, cancelled. +- **TestId** A string to uniquely identify a group of events. +- **WuId** Windows Update client ID. + + +### Setup360Telemetry.Setup360 + +This event sends data about OS deployment scenarios, to help keep Windows up-to-date. + +The following fields are available: + +- **ClientId** Retrieves the upgrade ID. In the Windows Update scenario, this will be the Windows Update client ID. In Media setup, default value is Media360, but can be overwritten by the caller to a unique value. +- **FieldName** Retrieves the data point. +- **FlightData** Specifies a unique identifier for each group of Windows Insider builds. +- **InstanceId** Retrieves a unique identifier for each instance of a setup session. +- **ReportId** Retrieves the report ID. +- **ScenarioId** Retrieves the deployment scenario. +- **Value** Retrieves the value associated with the corresponding FieldName. + + +### Setup360Telemetry.Setup360DynamicUpdate + +This event helps determine whether the device received supplemental content during an operating system upgrade, to help keep Windows up-to-date. + +The following fields are available: + +- **FlightData** Specifies a unique identifier for each group of Windows Insider builds. +- **InstanceId** Retrieves a unique identifier for each instance of a setup session. +- **Operation** Facilitator's last known operation (scan, download, etc.). +- **ReportId** ID for tying together events stream side. +- **ResultCode** Result returned for the entire setup operation. +- **Scenario** Dynamic Update scenario (Image DU, or Setup DU). +- **ScenarioId** Identifies the update scenario. +- **TargetBranch** Branch of the target OS. +- **TargetBuild** Build of the target OS. + + +### Setup360Telemetry.Setup360MitigationResult + +This event sends data indicating the result of each setup mitigation. + +The following fields are available: + +- **Applicable** TRUE if the mitigation is applicable for the current update. +- **ClientId** In the Windows Update scenario, this is the client ID passed to Setup. In Media setup, default value is Media360, but can be overwritten by the caller to a unique value. +- **CommandCount** The number of command operations in the mitigation entry. +- **CustomCount** The number of custom operations in the mitigation entry. +- **FileCount** The number of file operations in the mitigation entry. +- **FlightData** The unique identifier for each flight (test release). +- **Index** The mitigation index of this particular mitigation. +- **InstanceId** The GUID (Globally Unique ID) that identifies each instance of SetupHost.EXE. +- **MitigationScenario** The update scenario in which the mitigation was executed. +- **Name** The friendly (descriptive) name of the mitigation. +- **OperationIndex** The mitigation operation index (in the event of a failure). +- **OperationName** The friendly (descriptive) name of the mitigation operation (in the event of failure). +- **RegistryCount** The number of registry operations in the mitigation entry. +- **ReportId** In the Windows Update scenario, the Update ID that is passed to Setup. In media setup, this is the GUID for the INSTALL.WIM. +- **Result** HResult of this operation. +- **ScenarioId** Setup360 flow type. +- **TimeDiff** The amount of time spent performing the mitigation (in 100-nanosecond increments). + + +### Setup360Telemetry.Setup360MitigationSummary + +This event sends a summary of all the setup mitigations available for this update. + +The following fields are available: + +- **Applicable** The count of mitigations that were applicable to the system and scenario. +- **ClientId** The Windows Update client ID passed to Setup. +- **Failed** The count of mitigations that failed. +- **FlightData** The unique identifier for each flight (test release). +- **InstanceId** The GUID (Globally Unique ID) that identifies each instance of SetupHost.EXE. +- **MitigationScenario** The update scenario in which the mitigations were attempted. +- **ReportId** In the Windows Update scenario, the Update ID that is passed to Setup. In media setup, this is the GUID for the INSTALL.WIM. +- **Result** HResult of this operation. +- **ScenarioId** Setup360 flow type. +- **TimeDiff** The amount of time spent performing the mitigation (in 100-nanosecond increments). +- **Total** The total number of mitigations that were available. + + +### Setup360Telemetry.Setup360OneSettings + +This event collects information regarding the post reboot phase of the new UUP (Unified Update Platform) update scenario; which is leveraged by both Mobile and Desktop. + +The following fields are available: + +- **ClientId** The Windows Update client ID passed to Setup. +- **Count** The count of applicable OneSettings for the device. +- **FlightData** The ID for the flight (test instance version). +- **InstanceId** The GUID (Globally-Unique ID) that identifies each instance of setuphost.exe. +- **Parameters** The set of name value pair parameters sent to OneSettings to determine if there are any applicable OneSettings. +- **ReportId** The Update ID passed to Setup. +- **Result** The HResult of the event error. +- **ScenarioId** The update scenario ID. +- **Values** Values sent back to the device, if applicable. + + +### Setup360Telemetry.UnexpectedEvent + +This event sends data indicating that the device has invoked the unexpected event phase of the upgrade, to help keep Windows up to date. + +The following fields are available: + +- **ClientId** With Windows Update, this will be the Windows Update client ID that is passed to Setup. In Media setup, default value is Media360, but can be overwritten by the caller to a unique value. +- **FlightData** Unique value that identifies the flight. +- **HostOSBuildNumber** The build number of the previous OS. +- **HostOsSkuName** The OS edition which is running Setup360 instance (previous OS). +- **InstanceId** A unique GUID that identifies each instance of setuphost.exe +- **ReportId** With Windows Update, this is the updateID that is passed to Setup. In media setup, this is the GUID for the install.wim. +- **Setup360Extended** Detailed information about the phase/action when the potential failure occurred. +- **Setup360Mode** The phase of Setup360. Example: Predownload, Install, Finalize, Rollback. +- **Setup360Result** The result of Setup360. This is an HRESULT error code that can be used used to diagnose errors. +- **Setup360Scenario** The Setup360 flow type. Example: Boot, Media, Update, MCT. +- **SetupVersionBuildNumber** The build number of Setup360 (build number of target OS). +- **State** The exit state of a Setup360 run. Example: succeeded, failed, blocked, cancelled. +- **TestId** A string to uniquely identify a group of events. +- **WuId** This is the Windows Update Client ID. With Windows Update, this is the same as the clientId. + + +## Windows as a Service diagnostic events + +### Microsoft.Windows.WaaSMedic.SummaryEvent + +Result of the WaaSMedic operation. + +The following fields are available: + +- **callerApplication** The name of the calling application. +- **capsuleCount** No content is currently available. +- **capsuleFailureCount** No content is currently available. +- **detectionSummary** Result of each applicable detection that was run. +- **featureAssessmentImpact** WaaS Assessment impact for feature updates. +- **hrEngineResult** Error code from the engine operation. +- **hrLastSandboxError** No content is currently available. +- **initSummary** No content is currently available. +- **isInteractiveMode** The user started a run of WaaSMedic. +- **isManaged** Device is managed for updates. +- **isWUConnected** Device is connected to Windows Update. +- **noMoreActions** No more applicable diagnostics. +- **pluginFailureCount** No content is currently available. +- **pluginsCount** No content is currently available. +- **qualityAssessmentImpact** WaaS Assessment impact for quality updates. +- **remediationSummary** Result of each operation performed on a device to fix an invalid state or configuration that's preventing the device from getting updates. For example, if Windows Update service is turned off, the fix is to turn the it back on. +- **usingBackupFeatureAssessment** Relying on backup feature assessment. +- **usingBackupQualityAssessment** Relying on backup quality assessment. +- **usingCachedFeatureAssessment** WaaS Medic run did not get OS build age from the network on the previous run. +- **usingCachedQualityAssessment** WaaS Medic run did not get OS revision age from the network on the previous run. +- **versionString** Version of the WaaSMedic engine. +- **waasMedicRunMode** Indicates whether this was a background regular run of the medic or whether it was triggered by a user launching Windows Update Troubleshooter. + + +## Windows Error Reporting events + +### Microsoft.Windows.WERVertical.OSCrash + +This event sends binary data from the collected dump file wheneveer a bug check occurs, to help keep Windows up to date. The is the OneCore version of this event. + +The following fields are available: + +- **BootId** Uint32 identifying the boot number for this device. +- **BugCheckCode** Uint64 "bugcheck code" that identifies a proximate cause of the bug check. +- **BugCheckParameter1** Uint64 parameter providing additional information. +- **BugCheckParameter2** Uint64 parameter providing additional information. +- **BugCheckParameter3** Uint64 parameter providing additional information. +- **BugCheckParameter4** Uint64 parameter providing additional information. +- **DumpFileAttributes** Codes that identify the type of data contained in the dump file +- **DumpFileSize** Size of the dump file +- **IsValidDumpFile** True if the dump file is valid for the debugger, false otherwise +- **ReportId** WER Report Id associated with this bug check (used for finding the corresponding report archive in Watson). + + +## Windows Error Reporting MTT events + +### Microsoft.Windows.WER.MTT.Denominator + +This event provides a denominator to calculate MTTF (mean-time-to-failure) for crashes and other errors, to help keep Windows up to date. + +The following fields are available: + +- **Value** Standard UTC emitted DP value structure See [Value](#value). + + +## Windows Store events + +### Microsoft.Windows.StoreAgent.Telemetry.AbortedInstallation + +This event is sent when an installation or update is canceled by a user or the system and is used to help keep Windows Apps up to date and secure. + +The following fields are available: + +- **AggregatedPackageFullNames** The names of all packages to be downloaded and installed. +- **AttemptNumber** Number of retry attempts before it was canceled. +- **BundleId** The Item Bundle ID. +- **CategoryId** The Item Category ID. +- **ClientAppId** The identity of the app that initiated this operation. +- **HResult** The result code of the last action performed before this operation. +- **IsBundle** Is this a bundle? +- **IsInteractive** Was this requested by a user? +- **IsMandatory** Was this a mandatory update? +- **IsRemediation** Was this a remediation install? +- **IsRestore** Is this automatically restoring a previously acquired product? +- **IsUpdate** Flag indicating if this is an update. +- **ParentBundleId** The product ID of the parent (if this product is part of a bundle). +- **PFN** The product family name of the product being installed. +- **ProductId** The identity of the package or packages being installed. +- **SystemAttemptNumber** The total number of automatic attempts at installation before it was canceled. +- **UserAttemptNumber** The total number of user attempts at installation before it was canceled. +- **WUContentId** The Windows Update content ID. + + +### Microsoft.Windows.StoreAgent.Telemetry.BeginGetInstalledContentIds + +This event is sent when an inventory of the apps installed is started to determine whether updates for those apps are available. It's used to help keep Windows up-to-date and secure. + + + +### Microsoft.Windows.StoreAgent.Telemetry.BeginUpdateMetadataPrepare + +This event is sent when the Store Agent cache is refreshed with any available package updates. It's used to help keep Windows up-to-date and secure. + + + +### Microsoft.Windows.StoreAgent.Telemetry.CancelInstallation + +This event is sent when an app update or installation is canceled while in interactive mode. This can be canceled by the user or the system. It's used to help keep Windows up-to-date and secure. + +The following fields are available: + +- **AggregatedPackageFullNames** The names of all package or packages to be downloaded and installed. +- **AttemptNumber** Total number of installation attempts. +- **BundleId** The identity of the Windows Insider build that is associated with this product. +- **CategoryId** The identity of the package or packages being installed. +- **ClientAppId** The identity of the app that initiated this operation. +- **IsBundle** Is this a bundle? +- **IsInteractive** Was this requested by a user? +- **IsMandatory** Is this a mandatory update? +- **IsRemediation** Is this repairing a previous installation? +- **IsRestore** Is this an automatic restore of a previously acquired product? +- **IsUpdate** Is this a product update? +- **ParentBundleId** The product ID of the parent (if this product is part of a bundle). +- **PFN** The name of all packages to be downloaded and installed. +- **PreviousHResult** The previous HResult code. +- **PreviousInstallState** Previous installation state before it was canceled. +- **ProductId** The name of the package or packages requested for installation. +- **RelatedCV** Correlation Vector of a previous performed action on this product. +- **SystemAttemptNumber** Total number of automatic attempts to install before it was canceled. +- **UserAttemptNumber** Total number of user attempts to install before it was canceled. +- **WUContentId** The Windows Update content ID. + + +### Microsoft.Windows.StoreAgent.Telemetry.CompleteInstallOperationRequest + +This event is sent at the end of app installations or updates to help keep Windows up-to-date and secure. + +The following fields are available: + +- **CatalogId** The Store Product ID of the app being installed. +- **HResult** HResult code of the action being performed. +- **IsBundle** Is this a bundle? +- **PackageFamilyName** The name of the package being installed. +- **ProductId** The Store Product ID of the product being installed. +- **SkuId** Specific edition of the item being installed. + + +### Microsoft.Windows.StoreAgent.Telemetry.EndAcquireLicense + +This event is sent after the license is acquired when a product is being installed. It's used to help keep Windows up-to-date and secure. + +The following fields are available: + +- **AggregatedPackageFullNames** Includes a set of package full names for each app that is part of an atomic set. +- **AttemptNumber** The total number of attempts to acquire this product. +- **CategoryId** The identity of the package or packages being installed. +- **ClientAppId** The identity of the app that initiated this operation. +- **HResult** HResult code to show the result of the operation (success/failure). +- **IsBundle** Is this a bundle? +- **IsInteractive** Did the user initiate the installation? +- **IsMandatory** Is this a mandatory update? +- **IsRemediation** Is this repairing a previous installation? +- **IsRestore** Is this happening after a device restore? +- **IsUpdate** Is this an update? +- **PFN** Product Family Name of the product being installed. +- **ProductId** The Store Product ID for the product being installed. +- **SystemAttemptNumber** The number of attempts by the system to acquire this product. +- **UserAttemptNumber** The number of attempts by the user to acquire this product +- **WUContentId** The Windows Update content ID. + + +### Microsoft.Windows.StoreAgent.Telemetry.EndDownload + +This event is sent after an app is downloaded to help keep Windows up-to-date and secure. + +The following fields are available: + +- **AggregatedPackageFullNames** The name of all packages to be downloaded and installed. +- **AttemptNumber** Number of retry attempts before it was canceled. +- **BundleId** The identity of the Windows Insider build associated with this product. +- **CategoryId** The identity of the package or packages being installed. +- **ClientAppId** The identity of the app that initiated this operation. +- **DownloadSize** The total size of the download. +- **ExtendedHResult** Any extended HResult error codes. +- **HResult** The result code of the last action performed. +- **IsBundle** Is this a bundle? +- **IsInteractive** Is this initiated by the user? +- **IsMandatory** Is this a mandatory installation? +- **IsRemediation** Is this repairing a previous installation? +- **IsRestore** Is this a restore of a previously acquired product? +- **IsUpdate** Is this an update? +- **ParentBundleId** The parent bundle ID (if it's part of a bundle). +- **PFN** The Product Family Name of the app being download. +- **ProductId** The Store Product ID for the product being installed. +- **SystemAttemptNumber** The number of attempts by the system to download. +- **UserAttemptNumber** The number of attempts by the user to download. +- **WUContentId** The Windows Update content ID. + + +### Microsoft.Windows.StoreAgent.Telemetry.EndFrameworkUpdate + +This event is sent when an app update requires an updated Framework package and the process starts to download it. It is used to help keep Windows up-to-date and secure. + +The following fields are available: + +- **HResult** The result code of the last action performed before this operation. + + +### Microsoft.Windows.StoreAgent.Telemetry.EndGetInstalledContentIds + +This event is sent after sending the inventory of the products installed to determine whether updates for those products are available. It's used to help keep Windows up-to-date and secure. + +The following fields are available: + +- **HResult** The result code of the last action performed before this operation. + + +### Microsoft.Windows.StoreAgent.Telemetry.EndInstall + +This event is sent after a product has been installed to help keep Windows up-to-date and secure. + +The following fields are available: + +- **AggregatedPackageFullNames** The names of all packages to be downloaded and installed. +- **AttemptNumber** The number of retry attempts before it was canceled. +- **BundleId** The identity of the build associated with this product. +- **CategoryId** The identity of the package or packages being installed. +- **ClientAppId** The identity of the app that initiated this operation. +- **ExtendedHResult** The extended HResult error code. +- **HResult** The result code of the last action performed. +- **IsBundle** Is this a bundle? +- **IsInteractive** Is this an interactive installation? +- **IsMandatory** Is this a mandatory installation? +- **IsRemediation** Is this repairing a previous installation? +- **IsRestore** Is this automatically restoring a previously acquired product? +- **IsUpdate** Is this an update? +- **ParentBundleId** The product ID of the parent (if this product is part of a bundle). +- **PFN** Product Family Name of the product being installed. +- **ProductId** The Store Product ID for the product being installed. +- **SystemAttemptNumber** The total number of system attempts. +- **UserAttemptNumber** The total number of user attempts. +- **WUContentId** The Windows Update content ID. + + +### Microsoft.Windows.StoreAgent.Telemetry.EndScanForUpdates + +This event is sent after a scan for product updates to determine if there are packages to install. It's used to help keep Windows up-to-date and secure. + +The following fields are available: + +- **ClientAppId** The identity of the app that initiated this operation. +- **HResult** The result code of the last action performed. +- **IsApplicability** Is this request to only check if there are any applicable packages to install? +- **IsInteractive** Is this user requested? +- **IsOnline** Is the request doing an online check? + + +### Microsoft.Windows.StoreAgent.Telemetry.EndSearchUpdatePackages + +This event is sent after searching for update packages to install. It is used to help keep Windows up-to-date and secure. + +The following fields are available: + +- **AggregatedPackageFullNames** The names of all packages to be downloaded and installed. +- **AttemptNumber** The total number of retry attempts before it was canceled. +- **BundleId** The identity of the build associated with this product. +- **CategoryId** The identity of the package or packages being installed. +- **ClientAppId** The identity of the app that initiated this operation. +- **HResult** The result code of the last action performed. +- **IsBundle** Is this a bundle? +- **IsInteractive** Is this user requested? +- **IsMandatory** Is this a mandatory update? +- **IsRemediation** Is this repairing a previous installation? +- **IsRestore** Is this restoring previously acquired content? +- **IsUpdate** Is this an update? +- **ParentBundleId** The product ID of the parent (if this product is part of a bundle). +- **PFN** The name of the package or packages requested for install. +- **ProductId** The Store Product ID for the product being installed. +- **SystemAttemptNumber** The total number of system attempts. +- **UserAttemptNumber** The total number of user attempts. +- **WUContentId** The Windows Update content ID. + + +### Microsoft.Windows.StoreAgent.Telemetry.EndStageUserData + +This event is sent after restoring user data (if any) that needs to be restored following a product install. It is used to keep Windows up-to-date and secure. + +The following fields are available: + +- **AggregatedPackageFullNames** The name of all packages to be downloaded and installed. +- **AttemptNumber** The total number of retry attempts before it was canceled. +- **BundleId** The identity of the build associated with this product. +- **CategoryId** The identity of the package or packages being installed. +- **ClientAppId** The identity of the app that initiated this operation. +- **HResult** The result code of the last action performed. +- **IsBundle** Is this a bundle? +- **IsInteractive** Is this user requested? +- **IsMandatory** Is this a mandatory update? +- **IsRemediation** Is this repairing a previous installation? +- **IsRestore** Is this restoring previously acquired content? +- **IsUpdate** Is this an update? +- **ParentBundleId** The product ID of the parent (if this product is part of a bundle). +- **PFN** The name of the package or packages requested for install. +- **ProductId** The Store Product ID for the product being installed. +- **SystemAttemptNumber** The total number of system attempts. +- **UserAttemptNumber** The total number of system attempts. +- **WUContentId** The Windows Update content ID. + + +### Microsoft.Windows.StoreAgent.Telemetry.EndUpdateMetadataPrepare + +This event is sent after a scan for available app updates to help keep Windows up-to-date and secure. + +The following fields are available: + +- **HResult** The result code of the last action performed. + + +### Microsoft.Windows.StoreAgent.Telemetry.FulfillmentComplete + +This event is sent at the end of an app install or update to help keep Windows up-to-date and secure. + +The following fields are available: + +- **CatalogId** The name of the product catalog from which this app was chosen. +- **FailedRetry** Indicates whether the installation or update retry was successful. +- **HResult** The HResult code of the operation. +- **PFN** The Package Family Name of the app that is being installed or updated. +- **ProductId** The product ID of the app that is being updated or installed. + + +### Microsoft.Windows.StoreAgent.Telemetry.FulfillmentInitiate + +This event is sent at the beginning of an app install or update to help keep Windows up-to-date and secure. + +The following fields are available: + +- **CatalogId** The name of the product catalog from which this app was chosen. +- **fulfillmentPluginId** No content is currently available. +- **FulfillmentPluginId** No content is currently available. +- **PFN** The Package Family Name of the app that is being installed or updated. +- **pluginTelemetryData** No content is currently available. +- **PluginTelemetryData** No content is currently available. +- **ProductId** The product ID of the app that is being updated or installed. + + +### Microsoft.Windows.StoreAgent.Telemetry.InstallOperationRequest + +This event is sent when a product install or update is initiated, to help keep Windows up-to-date and secure. + +The following fields are available: + +- **BundleId** The identity of the build associated with this product. +- **CatalogId** If this product is from a private catalog, the Store Product ID for the product being installed. +- **ProductId** The Store Product ID for the product being installed. +- **SkuId** Specific edition ID being installed. +- **VolumePath** The disk path of the installation. + + +### Microsoft.Windows.StoreAgent.Telemetry.PauseInstallation + +This event is sent when a product install or update is paused (either by a user or the system), to help keep Windows up-to-date and secure. + +The following fields are available: + +- **AggregatedPackageFullNames** The names of all packages to be downloaded and installed. +- **AttemptNumber** The total number of retry attempts before it was canceled. +- **BundleId** The identity of the build associated with this product. +- **CategoryId** The identity of the package or packages being installed. +- **ClientAppId** The identity of the app that initiated this operation. +- **IsBundle** Is this a bundle? +- **IsInteractive** Is this user requested? +- **IsMandatory** Is this a mandatory update? +- **IsRemediation** Is this repairing a previous installation? +- **IsRestore** Is this restoring previously acquired content? +- **IsUpdate** Is this an update? +- **ParentBundleId** The product ID of the parent (if this product is part of a bundle). +- **PFN** The Product Full Name. +- **PreviousHResult** The result code of the last action performed before this operation. +- **PreviousInstallState** Previous state before the installation or update was paused. +- **ProductId** The Store Product ID for the product being installed. +- **RelatedCV** Correlation Vector of a previous performed action on this product. +- **SystemAttemptNumber** The total number of system attempts. +- **UserAttemptNumber** The total number of user attempts. +- **WUContentId** The Windows Update content ID. + + +### Microsoft.Windows.StoreAgent.Telemetry.ResumeInstallation + +This event is sent when a product install or update is resumed (either by a user or the system), to help keep Windows up-to-date and secure. + +The following fields are available: + +- **AggregatedPackageFullNames** The names of all packages to be downloaded and installed. +- **AttemptNumber** The number of retry attempts before it was canceled. +- **BundleId** The identity of the build associated with this product. +- **CategoryId** The identity of the package or packages being installed. +- **ClientAppId** The identity of the app that initiated this operation. +- **HResult** The result code of the last action performed before this operation. +- **IsBundle** Is this a bundle? +- **IsInteractive** Is this user requested? +- **IsMandatory** Is this a mandatory update? +- **IsRemediation** Is this repairing a previous installation? +- **IsRestore** Is this restoring previously acquired content? +- **IsUpdate** Is this an update? +- **IsUserRetry** Did the user initiate the retry? +- **ParentBundleId** The product ID of the parent (if this product is part of a bundle). +- **PFN** The name of the package or packages requested for install. +- **PreviousHResult** The previous HResult error code. +- **PreviousInstallState** Previous state before the installation was paused. +- **ProductId** The Store Product ID for the product being installed. +- **RelatedCV** Correlation Vector for the original install before it was resumed. +- **ResumeClientId** The ID of the app that initiated the resume operation. +- **SystemAttemptNumber** The total number of system attempts. +- **UserAttemptNumber** The total number of user attempts. +- **WUContentId** The Windows Update content ID. + + +### Microsoft.Windows.StoreAgent.Telemetry.ResumeOperationRequest + +This event is sent when a product install or update is resumed by a user or on installation retries, to help keep Windows up-to-date and secure. + +The following fields are available: + +- **ProductId** The Store Product ID for the product being installed. + + +### Microsoft.Windows.StoreAgent.Telemetry.SearchForUpdateOperationRequest + +This event is sent when searching for update packages to install, to help keep Windows up-to-date and secure. + +The following fields are available: + +- **CatalogId** The Store Catalog ID for the product being installed. +- **ProductId** The Store Product ID for the product being installed. +- **SkuId** Specfic edition of the app being updated. + + +### Microsoft.Windows.StoreAgent.Telemetry.StateTransition + +No content is currently available. + +The following fields are available: + +- **CatalogId** No content is currently available. +- **FulfillmentPluginId** No content is currently available. +- **HResult** No content is currently available. +- **NewState** No content is currently available. +- **PFN** No content is currently available. +- **PluginLastStage** No content is currently available. +- **PluginTelemetryData** No content is currently available. +- **Prevstate** No content is currently available. +- **ProductId** No content is currently available. + + +### Microsoft.Windows.StoreAgent.Telemetry.UpdateAppOperationRequest + +This event occurs when an update is requested for an app, to help keep Windows up-to-date and secure. + +The following fields are available: + +- **PFamN** The name of the app that is requested for update. + + +## Windows Update Delivery Optimization events + +### Microsoft.OSG.DU.DeliveryOptClient.DownloadCanceled + +This event describes when a download was canceled with Delivery Optimization. It's used to understand and address problems regarding downloads. + +The following fields are available: + +- **background** Is the download being done in the background? +- **bytesFromCacheServer** Bytes received from a cache host. +- **bytesFromCDN** The number of bytes received from a CDN source. +- **bytesFromGroupPeers** The number of bytes received from a peer in the same group. +- **bytesFromIntPeers** The number of bytes received from peers not in the same LAN or in the same group. +- **bytesFromLinkLocalPeers** No content is currently available. +- **bytesFromLocalCache** Bytes copied over from local (on disk) cache. +- **bytesFromPeers** The number of bytes received from a peer in the same LAN. +- **cdnErrorCodes** A list of CDN connection errors since the last FailureCDNCommunication event. +- **cdnErrorCounts** The number of times each error in cdnErrorCodes was encountered. +- **cdnIp** The IP Address of the source CDN (Content Delivery Network). +- **cdnUrl** The URL of the source CDN (Content Delivery Network). +- **dataSourcesTotal** Bytes received per source type, accumulated for the whole session. +- **errorCode** The error code that was returned. +- **experimentId** When running a test, this is used to correlate events that are part of the same test. +- **fileID** The ID of the file being downloaded. +- **gCurMemoryStreamBytes** Current usage for memory streaming. +- **gMaxMemoryStreamBytes** Maximum usage for memory streaming. +- **isVpn** Is the device connected to a Virtual Private Network? +- **jobID** Identifier for the Windows Update job. +- **predefinedCallerName** The name of the API Caller. +- **reasonCode** Reason the action or event occurred. +- **routeToCacheServer** The cache server setting, source, and value. +- **sessionID** The ID of the file download session. +- **updateID** The ID of the update being downloaded. +- **usedMemoryStream** TRUE if the download is using memory streaming for App downloads. + + +### Microsoft.OSG.DU.DeliveryOptClient.DownloadCompleted + +This event describes when a download has completed with Delivery Optimization. It's used to understand and address problems regarding downloads. + +The following fields are available: + +- **background** Is the download a background download? +- **bytesFromCacheServer** Bytes received from a cache host. +- **bytesFromCDN** The number of bytes received from a CDN source. +- **bytesFromGroupPeers** The number of bytes received from a peer in the same domain group. +- **bytesFromIntPeers** The number of bytes received from peers not in the same LAN or in the same domain group. +- **bytesFromLinkLocalPeers** No content is currently available. +- **bytesFromLocalCache** Bytes copied over from local (on disk) cache. +- **bytesFromPeers** The number of bytes received from a peer in the same LAN. +- **bytesRequested** The total number of bytes requested for download. +- **cacheServerConnectionCount** Number of connections made to cache hosts. +- **cdnConnectionCount** The total number of connections made to the CDN. +- **cdnErrorCodes** A list of CDN connection errors since the last FailureCDNCommunication event. +- **cdnErrorCounts** The number of times each error in cdnErrorCodes was encountered. +- **cdnIp** The IP address of the source CDN. +- **cdnUrl** Url of the source Content Distribution Network (CDN). +- **dataSourcesTotal** Bytes received per source type, accumulated for the whole session. +- **doErrorCode** The Delivery Optimization error code that was returned. +- **downlinkBps** The maximum measured available download bandwidth (in bytes per second). +- **downlinkUsageBps** The download speed (in bytes per second). +- **downloadMode** The download mode used for this file download session. +- **downloadModeReason** Reason for the download. +- **downloadModeSrc** Source of the DownloadMode setting (KvsProvider = 0, GeoProvider = 1, GeoVerProvider = 2, CpProvider = 3, DiscoveryProvider = 4, RegistryProvider = 5, GroupPolicyProvider = 6, MdmProvider = 7, SettingsProvider = 8, InvalidProviderType = 9). +- **experimentId** When running a test, this is used to correlate with other events that are part of the same test. +- **fileID** The ID of the file being downloaded. +- **fileSize** The size of the file being downloaded. +- **gCurMemoryStreamBytes** Current usage for memory streaming. +- **gMaxMemoryStreamBytes** Maximum usage for memory streaming. +- **groupConnectionCount** The total number of connections made to peers in the same group. +- **internetConnectionCount** The total number of connections made to peers not in the same LAN or the same group. +- **isEncrypted** TRUE if the file is encrypted and will be decrypted after download. +- **isVpn** Is the device connected to a Virtual Private Network? +- **jobID** Identifier for the Windows Update job. +- **lanConnectionCount** The total number of connections made to peers in the same LAN. +- **linkLocalConnectionCount** No content is currently available. +- **numPeers** The total number of peers used for this download. +- **numPeersLocal** No content is currently available. +- **predefinedCallerName** The name of the API Caller. +- **restrictedUpload** Is the upload restricted? +- **routeToCacheServer** The cache server setting, source, and value. +- **sessionID** The ID of the download session. +- **totalTimeMs** Duration of the download (in seconds). +- **updateID** The ID of the update being downloaded. +- **uplinkBps** The maximum measured available upload bandwidth (in bytes per second). +- **uplinkUsageBps** The upload speed (in bytes per second). +- **usedMemoryStream** TRUE if the download is using memory streaming for App downloads. + + +### Microsoft.OSG.DU.DeliveryOptClient.DownloadPaused + +This event represents a temporary suspension of a download with Delivery Optimization. It's used to understand and address problems regarding downloads. + +The following fields are available: + +- **background** Is the download a background download? +- **cdnUrl** The URL of the source CDN (Content Delivery Network). +- **errorCode** The error code that was returned. +- **experimentId** When running a test, this is used to correlate with other events that are part of the same test. +- **fileID** The ID of the file being paused. +- **isVpn** Is the device connected to a Virtual Private Network? +- **jobID** Identifier for the Windows Update job. +- **predefinedCallerName** The name of the API Caller object. +- **reasonCode** The reason for pausing the download. +- **routeToCacheServer** The cache server setting, source, and value. +- **sessionID** The ID of the download session. +- **updateID** The ID of the update being paused. + + +### Microsoft.OSG.DU.DeliveryOptClient.DownloadStarted + +This event sends data describing the start of a new download to enable Delivery Optimization. It's used to understand and address problems regarding downloads. + +The following fields are available: + +- **background** Indicates whether the download is happening in the background. +- **bytesRequested** Number of bytes requested for the download. +- **cdnUrl** The URL of the source Content Distribution Network (CDN). +- **costFlags** A set of flags representing network cost. +- **deviceProfile** Identifies the usage or form factor (such as Desktop, Xbox, or VM). +- **diceRoll** Random number used for determining if a client will use peering. +- **doClientVersion** The version of the Delivery Optimization client. +- **doErrorCode** The Delivery Optimization error code that was returned. +- **downloadMode** The download mode used for this file download session (CdnOnly = 0, Lan = 1, Group = 2, Internet = 3, Simple = 99, Bypass = 100). +- **downloadModeReason** No content is currently available. +- **downloadModeSrc** Source of the DownloadMode setting (KvsProvider = 0, GeoProvider = 1, GeoVerProvider = 2, CpProvider = 3, DiscoveryProvider = 4, RegistryProvider = 5, GroupPolicyProvider = 6, MdmProvider = 7, SettingsProvider = 8, InvalidProviderType = 9). +- **errorCode** The error code that was returned. +- **experimentId** ID used to correlate client/services calls that are part of the same test during A/B testing. +- **fileID** The ID of the file being downloaded. +- **filePath** The path to where the downloaded file will be written. +- **fileSize** Total file size of the file that was downloaded. +- **fileSizeCaller** Value for total file size provided by our caller. +- **groupID** ID for the group. +- **isEncrypted** Indicates whether the download is encrypted. +- **isVpn** Indicates whether the device is connected to a Virtual Private Network. +- **jobID** The ID of the Windows Update job. +- **peerID** The ID for this delivery optimization client. +- **predefinedCallerName** Name of the API caller. +- **routeToCacheServer** Cache server setting, source, and value. +- **sessionID** The ID for the file download session. +- **setConfigs** A JSON representation of the configurations that have been set, and their sources. +- **updateID** The ID of the update being downloaded. +- **usedMemoryStream** Indicates whether the download used memory streaming. + + +### Microsoft.OSG.DU.DeliveryOptClient.FailureCdnCommunication + +This event represents a failure to download from a CDN with Delivery Optimization. It's used to understand and address problems regarding downloads. + +The following fields are available: + +- **cdnHeaders** The HTTP headers returned by the CDN. +- **cdnIp** The IP address of the CDN. +- **cdnUrl** The URL of the CDN. +- **errorCode** The error code that was returned. +- **errorCount** The total number of times this error code was seen since the last FailureCdnCommunication event was encountered. +- **experimentId** When running a test, this is used to correlate with other events that are part of the same test. +- **fileID** The ID of the file being downloaded. +- **httpStatusCode** The HTTP status code returned by the CDN. +- **isHeadRequest** The type of HTTP request that was sent to the CDN. Example: HEAD or GET +- **peerType** The type of peer (LAN, Group, Internet, CDN, Cache Host, etc.). +- **requestOffset** The byte offset within the file in the sent request. +- **requestSize** The size of the range requested from the CDN. +- **responseSize** The size of the range response received from the CDN. +- **sessionID** The ID of the download session. + + +### Microsoft.OSG.DU.DeliveryOptClient.JobError + +This event represents a Windows Update job error. It allows for investigation of top errors. + +The following fields are available: + +- **cdnIp** The IP Address of the source CDN (Content Delivery Network). +- **doErrorCode** Error code returned for delivery optimization. +- **errorCode** The error code returned. +- **experimentId** When running a test, this is used to correlate with other events that are part of the same test. +- **fileID** The ID of the file being downloaded. +- **jobID** The Windows Update job ID. + + +## Windows Update events + +### Microsoft.Windows.Update.NotificationUx.DialogNotificationToBeDisplayed + +This event indicates that a notification dialog box is about to be displayed to user. + +The following fields are available: + +- **AcceptAutoModeLimit** The maximum number of days for a device to automatically enter Auto Reboot mode. +- **AutoToAutoFailedLimit** The maximum number of days for Auto Reboot mode to fail before the RebootFailed dialog box is shown. +- **DaysSinceRebootRequired** Number of days since restart was required. +- **DeviceLocalTime** The local time on the device sending the event. +- **EngagedModeLimit** The number of days to switch between DTE dialog boxes. +- **EnterAutoModeLimit** The maximum number of days for a device to enter Auto Reboot mode. +- **ETag** OneSettings versioning value. +- **IsForcedEnabled** Indicates whether Forced Reboot mode is enabled for this device. +- **IsUltimateForcedEnabled** Indicates whether Ultimate Forced Reboot mode is enabled for this device. +- **NotificationUxState** Indicates which dialog box is shown. +- **NotificationUxStateString** Indicates which dialog box is shown. +- **RebootUxState** Indicates the state of the restart (Engaged, Auto, Forced, or UltimateForced). +- **RebootUxStateString** Indicates the state of the restart (Engaged, Auto, Forced, or UltimateForced). +- **RebootVersion** Version of DTE. +- **SkipToAutoModeLimit** The minimum length of time to pass in restart pending before a device can be put into auto mode. +- **UpdateId** The ID of the update that is pending restart to finish installation. +- **UpdateRevision** The revision of the update that is pending restart to finish installation. +- **UtcTime** The time the dialog box notification will be displayed, in Coordinated Universal Time. + + +### Microsoft.Windows.Update.NotificationUx.EnhancedEngagedRebootRebootFailedDialog + +This event indicates that the Enhanced Engaged restart "restart failed" dialog box was displayed. + +The following fields are available: + +- **DeviceLocalTime** The local time of the device sending the event. +- **EnterpriseAttributionValue** No content is currently available. +- **ETag** OneSettings versioning value. +- **ExitCode** Indicates how users exited the dialog box. +- **RebootVersion** Version of DTE. +- **UpdateId** The ID of the update that is pending restart to finish installation. +- **UpdateRevision** The revision of the update that is pending restart to finish installation. +- **UserResponseString** The option that the user chose in this dialog box. +- **UtcTime** The time that the dialog box was displayed, in Coordinated Universal Time. + + +### Microsoft.Windows.Update.NotificationUx.EnhancedEngagedRebootRebootImminentDialog + +This event indicates that the Enhanced Engaged restart "restart imminent" dialog box was displayed. + +The following fields are available: + +- **DeviceLocalTime** Time the dialog box was shown on the local device. +- **EnterpriseAttributionValue** No content is currently available. +- **ETag** OneSettings versioning value. +- **ExitCode** Indicates how users exited the dialog box. +- **RebootVersion** Version of DTE. +- **UpdateId** The ID of the update that is pending restart to finish installation. +- **UpdateRevision** The revision of the update that is pending restart to finish installation. +- **UserResponseString** The option that user chose in this dialog box. +- **UtcTime** The time that dialog box was displayed, in Coordinated Universal Time. + + +### Microsoft.Windows.Update.NotificationUx.EnhancedEngagedRebootReminderDialog + +This event returns information relating to the Enhanced Engaged reboot reminder dialog that was displayed. + +The following fields are available: + +- **DeviceLocalTime** The time at which the reboot reminder dialog was shown (based on the local device time settings). +- **EnterpriseAttributionValue** No content is currently available. +- **ETag** The OneSettings versioning value. +- **ExitCode** Indicates how users exited the reboot reminder dialog box. +- **RebootVersion** The version of the DTE (Direct-to-Engaged). +- **UpdateId** The ID of the update that is waiting for reboot to finish installation. +- **UpdateRevision** The revision of the update that is waiting for reboot to finish installation. +- **UserResponseString** The option chosen by the user on the reboot dialog box. +- **UtcTime** The time at which the reboot reminder dialog was shown (in UTC). + + +### Microsoft.Windows.Update.Orchestrator.ActivityRestrictedByActiveHoursPolicy + +This event indicates a policy is present that may restrict update activity to outside of active hours. + +The following fields are available: + +- **activeHoursEnd** The end of the active hours window. +- **activeHoursStart** The start of the active hours window. +- **wuDeviceid** Unique device ID used by Windows Update. + + +### Microsoft.Windows.Update.Orchestrator.DeferRestart + +This event indicates that a restart required for installing updates was postponed. + +The following fields are available: + +- **displayNeededReason** List of reasons for needing display. +- **eventScenario** Indicates the purpose of the event (scan started, succeeded, failed, etc.). +- **filteredDeferReason** Applicable filtered reasons why reboot was postponed (such as user active, or low battery). +- **gameModeReason** Name of the executable that caused the game mode state check to start. +- **ignoredReason** List of reasons that were intentionally ignored. +- **IgnoreReasonsForRestart** List of reasons why restart was deferred. +- **revisionNumber** Update ID revision number. +- **systemNeededReason** List of reasons why system is needed. +- **updateId** Update ID. +- **updateScenarioType** Update session type. +- **wuDeviceid** Unique device ID used by Windows Update. + + +### Microsoft.Windows.Update.Orchestrator.Detection + +This event indicates that a scan for a Windows Update occurred. + +The following fields are available: + +- **deferReason** Reason why the device could not check for updates. +- **detectionBlockingPolicy** State of update action. +- **detectionBlockreason** The reason detection did not complete. +- **detectionRetryMode** Indicates whether we will try to scan again. +- **errorCode** The error code returned for the current process. +- **eventScenario** End-to-end update session ID, or indicates the purpose of sending this event - whether because the software distribution just started installing content, or whether it was cancelled, succeeded, or failed. +- **flightID** The specific ID of the Windows Insider build the device is getting. +- **interactive** Indicates whether the session was user initiated. +- **networkStatus** Error info +- **revisionNumber** Update revision number. +- **scanTriggerSource** Source of the triggered scan. +- **updateId** Update ID. +- **updateScenarioType** Identifies the type of update session being performed. +- **wuDeviceid** The unique device ID used by Windows Update. + + +### Microsoft.Windows.Update.Orchestrator.DisplayNeeded + +This event indicates the reboot was postponed due to needing a display. + +The following fields are available: + +- **displayNeededReason** Reason the display is needed. +- **eventScenario** Indicates the purpose of sending this event - whether because the software distribution just started checking for content, or whether it was cancelled, succeeded, or failed. +- **rebootOutsideOfActiveHours** Indicates whether the reboot was to occur outside of active hours. +- **revisionNumber** Revision number of the update. +- **updateId** Update ID. +- **updateScenarioType** The update session type. +- **uxRebootstate** Indicates the exact state of the user experience at the time the required reboot was initiated. +- **wuDeviceid** The unique identifier of a specific device, used to identify how many devices are encountering success or a particular issue + + +### Microsoft.Windows.Update.Orchestrator.Download + +This event sends launch data for a Windows Update download to help keep Windows up to date. + +The following fields are available: + +- **deferReason** Reason for download not completing. +- **errorCode** An error code represented as a hexadecimal value. +- **eventScenario** End-to-end update session ID. +- **flightID** The specific ID of the Windows Insider build the device is getting. +- **interactive** Indicates whether the session is user initiated. +- **revisionNumber** Update revision number. +- **updateId** Update ID. +- **updateScenarioType** The update session type. +- **wuDeviceid** Unique device ID used by Windows Update. + + +### Microsoft.Windows.Update.Orchestrator.EscalationRiskLevels + +This event is sent during update scan, download, or install, and indicates that the device is at risk of being out-of-date. + +The following fields are available: + +- **configVersion** The escalation configuration version on the device. +- **downloadElapsedTime** Indicates how long since the download is required on device. +- **downloadRiskLevel** At-risk level of download phase. +- **installElapsedTime** Indicates how long since the install is required on device. +- **installRiskLevel** The at-risk level of install phase. +- **isSediment** Assessment of whether is device is at risk. +- **scanElapsedTime** Indicates how long since the scan is required on device. +- **scanRiskLevel** At-risk level of the scan phase. +- **wuDeviceid** Device ID used by Windows Update. + + +### Microsoft.Windows.Update.Orchestrator.FailedToAddTimeTriggerToScanTask + +This event indicated that USO failed to add a trigger time to a task. + +The following fields are available: + +- **errorCode** The Windows Update error code. +- **wuDeviceid** The Windows Update device ID. + + +### Microsoft.Windows.Update.Orchestrator.FlightInapplicable + +This event indicates that the update is no longer applicable to this device. + +The following fields are available: + +- **EventPublishedTime** Time when this event was generated. +- **flightID** The specific ID of the Windows Insider build. +- **inapplicableReason** No content is currently available. +- **revisionNumber** Update revision number. +- **updateId** Unique Windows Update ID. +- **updateScenarioType** Update session type. +- **UpdateStatus** Last status of update. +- **UUPFallBackConfigured** Indicates whether UUP fallback is configured. +- **wuDeviceid** Unique Device ID. + + +### Microsoft.Windows.Update.Orchestrator.InitiatingReboot + +This event sends data about an Orchestrator requesting a reboot from power management to help keep Windows up to date. + +The following fields are available: + +- **EventPublishedTime** Time of the event. +- **flightID** Unique update ID +- **interactive** Indicates whether the reboot initiation stage of the update process was entered as a result of user action. +- **rebootOutsideOfActiveHours** Indicates whether the reboot was to occur outside of active hours. +- **revisionNumber** Revision number of the update. +- **updateId** Update ID. +- **updateScenarioType** The update session type. +- **uxRebootstate** Indicates the exact state of the user experience at the time the required reboot was initiated. +- **wuDeviceid** Unique device ID used by Windows Update. + + +### Microsoft.Windows.Update.Orchestrator.Install + +This event sends launch data for a Windows Update install to help keep Windows up to date. + +The following fields are available: + +- **batteryLevel** Current battery capacity in mWh or percentage left. +- **deferReason** Reason for install not completing. +- **errorCode** The error code reppresented by a hexadecimal value. +- **eventScenario** End-to-end update session ID. +- **flightID** The ID of the Windows Insider build the device is getting. +- **flightUpdate** Indicates whether the update is a Windows Insider build. +- **ForcedRebootReminderSet** A boolean value that indicates if a forced reboot will happen for updates. +- **IgnoreReasonsForRestart** The reason(s) a Postpone Restart command was ignored. +- **installCommitfailedtime** The time it took for a reboot to happen but the upgrade failed to progress. +- **installRebootinitiatetime** The time it took for a reboot to be attempted. +- **interactive** Identifies if session is user initiated. +- **minutesToCommit** The time it took to install updates. +- **rebootOutsideOfActiveHours** Indicates whether a reboot is scheduled outside of active hours. +- **revisionNumber** Update revision number. +- **updateId** Update ID. +- **updateScenarioType** The update session type. +- **uxRebootstate** Indicates the exact state of the user experience at the time the required reboot was initiated to ensure the correct update process and experience is provided to keep Windows up to date. +- **wuDeviceid** Unique device ID used by Windows Update. + + +### Microsoft.Windows.Update.Orchestrator.LowUptimes + +This event is sent if a device is identified as not having sufficient uptime to reliably process updates in order to keep secure. + +The following fields are available: + +- **availableHistoryMinutes** The number of minutes available from the local machine activity history. +- **isLowUptimeMachine** Is the machine considered low uptime or not. +- **lowUptimeMinHours** Current setting for the minimum number of hours needed to not be considered low uptime. +- **lowUptimeQueryDays** Current setting for the number of recent days to check for uptime. +- **uptimeMinutes** Number of minutes of uptime measured. +- **wuDeviceid** Unique device ID for Windows Update. + + +### Microsoft.Windows.Update.Orchestrator.OneshotUpdateDetection + +This event returns data about scans initiated through settings UI, or background scans that are urgent; to help keep Windows up to date. + +The following fields are available: + +- **externalOneshotupdate** The last time a task-triggered scan was completed. +- **interactiveOneshotupdate** The last time an interactive scan was completed. +- **oldlastscanOneshotupdate** The last time a scan completed successfully. +- **wuDeviceid** The Windows Update Device GUID (Globally-Unique ID). + + +### Microsoft.Windows.Update.Orchestrator.PreShutdownStart + +This event is generated before the shutdown and commit operations. + +The following fields are available: + +- **wuDeviceid** The unique identifier of a specific device, used to identify how many devices are encountering success or a particular issue. + + +### Microsoft.Windows.Update.Orchestrator.RebootFailed + +This event sends information about whether an update required a reboot and reasons for failure, to help keep Windows up to date. + +The following fields are available: + +- **batteryLevel** Current battery capacity in mWh or percentage left. +- **deferReason** Reason for install not completing. +- **EventPublishedTime** The time that the reboot failure occurred. +- **flightID** Unique update ID. +- **rebootOutsideOfActiveHours** Indicates whether a reboot was scheduled outside of active hours. +- **RebootResults** Hex code indicating failure reason. Typically, we expect this to be a specific USO generated hex code. +- **revisionNumber** Update revision number. +- **updateId** Update ID. +- **updateScenarioType** The update session type. +- **uxRebootstate** Indicates the exact state of the user experience at the time the required reboot was initiated to ensure the correct update process and experience is provided to keep Windows up to date. +- **wuDeviceid** Unique device ID used by Windows Update. + + +### Microsoft.Windows.Update.Orchestrator.RefreshSettings + +This event sends basic data about the version of upgrade settings applied to the system to help keep Windows up to date. + +The following fields are available: + +- **errorCode** Hex code for the error message, to allow lookup of the specific error. +- **settingsDownloadTime** Timestamp of the last attempt to acquire settings. +- **settingsETag** Version identifier for the settings. +- **wuDeviceid** Unique device ID used by Windows Update. + + +### Microsoft.Windows.Update.Orchestrator.RestoreRebootTask + +This event sends data indicating that a reboot task is missing unexpectedly on a device and the task is restored because a reboot is still required, to help keep Windows up to date. + +The following fields are available: + +- **RebootTaskMissedTimeUTC** The time when the reboot task was scheduled to run, but did not. +- **RebootTaskNextTimeUTC** The time when the reboot task was rescheduled for. +- **RebootTaskRestoredTime** Time at which this reboot task was restored. +- **wuDeviceid** Device ID for the device on which the reboot is restored. + + +### Microsoft.Windows.Update.Orchestrator.ScanTriggered + +This event indicates that Update Orchestrator has started a scan operation. + +The following fields are available: + +- **interactive** Indicates whether the scan is interactive. +- **isDTUEnabled** Indicates whether DTU (internal abbreviation for Direct Feature Update) channel is enabled on the client system. +- **isScanPastSla** Indicates whether the SLA has elapsed for scanning. +- **isScanPastTriggerSla** Indicates whether the SLA has elapsed for triggering a scan. +- **minutesOverScanSla** Indicates how many minutes the scan exceeded the scan SLA. +- **minutesOverScanTriggerSla** Indicates how many minutes the scan exceeded the scan trigger SLA. +- **scanTriggerSource** Indicates what caused the scan. +- **updateScenarioType** The update session type. +- **wuDeviceid** Unique device ID used by Windows Update. + + +### Microsoft.Windows.Update.Orchestrator.StickUpdate + +This event is sent when the update service orchestrator (USO) indicates the update cannot be superseded by a newer update. + +The following fields are available: + +- **updateId** Identifier associated with the specific piece of content. +- **wuDeviceid** Unique device ID controlled by the software distribution client. + + +### Microsoft.Windows.Update.Orchestrator.SystemNeeded + +This event sends data about why a device is unable to reboot, to help keep Windows up to date. + +The following fields are available: + +- **eventScenario** End-to-end update session ID. +- **rebootOutsideOfActiveHours** Indicates whether a reboot is scheduled outside of active hours. +- **revisionNumber** Update revision number. +- **systemNeededReason** List of apps or tasks that are preventing the system from restarting. +- **updateId** Update ID. +- **updateScenarioType** The update session type. +- **uxRebootstate** Indicates the exact state of the user experience at the time the required reboot was initiated to ensure the correct update process and experience is provided to keep Windows up to date. +- **wuDeviceid** Unique device ID used by Windows Update. + + +### Microsoft.Windows.Update.Orchestrator.UnstickUpdate + +This event is sent when the update service orchestrator (USO) indicates that the update can be superseded by a newer update. + +The following fields are available: + +- **updateId** Identifier associated with the specific piece of content. +- **wuDeviceid** Unique device ID controlled by the software distribution client. + + +### Microsoft.Windows.Update.Orchestrator.UpdatePolicyCacheRefresh + +This event sends data on whether Update Management Policies were enabled on a device, to help keep Windows up to date. + +The following fields are available: + +- **configuredPoliciescount** Number of policies on the device. +- **policiesNamevaluesource** Policy name and source of policy (group policy, MDM or flight). +- **policyCacherefreshtime** Time when policy cache was refreshed. +- **updateInstalluxsetting** Indicates whether a user has set policies via a user experience option. +- **wuDeviceid** Unique device ID used by Windows Update. + + +### Microsoft.Windows.Update.Orchestrator.UpdateRebootRequired + +This event sends data about whether an update required a reboot to help keep Windows up to date. + +The following fields are available: + +- **flightID** The specific ID of the Windows Insider build the device is getting. +- **interactive** Indicates whether the reboot initiation stage of the update process was entered as a result of user action. +- **revisionNumber** Update revision number. +- **updateId** Update ID. +- **updateScenarioType** The update session type. +- **uxRebootstate** Indicates the exact state of the user experience at the time the required reboot was initiated to ensure the correct update process and experience is provided to keep Windows up to date. +- **wuDeviceid** Unique device ID used by Windows Update. + + +### Microsoft.Windows.Update.Orchestrator.updateSettingsFlushFailed + +This event sends information about an update that encountered problems and was not able to complete. + +The following fields are available: + +- **errorCode** The error code encountered. +- **wuDeviceid** The ID of the device in which the error occurred. + + +### Microsoft.Windows.Update.Orchestrator.UsoSession + +This event represents the state of the USO service at start and completion. + +The following fields are available: + +- **activeSessionid** A unique session GUID. +- **eventScenario** The state of the update action. +- **interactive** Is the USO session interactive? +- **lastErrorcode** The last error that was encountered. +- **lastErrorstate** The state of the update when the last error was encountered. +- **sessionType** A GUID that refers to the update session type. +- **updateScenarioType** A descriptive update session type. +- **wuDeviceid** The Windows Update device GUID. + + +### Microsoft.Windows.Update.Ux.MusNotification.EnhancedEngagedRebootUxState + +This event sends information about the configuration of Enhanced Direct-to-Engaged (eDTE), which includes values for the timing of how eDTE will progress through each phase of the reboot. + +The following fields are available: + +- **AcceptAutoModeLimit** The maximum number of days for a device to automatically enter Auto Reboot mode. +- **AutoToAutoFailedLimit** The maximum number of days for Auto Reboot mode to fail before a Reboot Failed dialog will be shown. +- **DeviceLocalTime** The date and time (based on the device date/time settings) the reboot mode changed. +- **EngagedModeLimit** The number of days to switch between DTE (Direct-to-Engaged) dialogs. +- **EnterAutoModeLimit** The maximum number of days a device can enter Auto Reboot mode. +- **ETag** The Entity Tag that represents the OneSettings version. +- **IsForcedEnabled** Identifies whether Forced Reboot mode is enabled for the device. +- **IsUltimateForcedEnabled** Identifies whether Ultimate Forced Reboot mode is enabled for the device. +- **OldestUpdateLocalTime** The date and time (based on the device date/time settings) this update’s reboot began pending. +- **RebootUxState** Identifies the reboot state: Engaged, Auto, Forced, UltimateForced. +- **RebootVersion** The version of the DTE (Direct-to-Engaged). +- **SkipToAutoModeLimit** The maximum number of days to switch to start while in Auto Reboot mode. +- **UpdateId** The ID of the update that is waiting for reboot to finish installation. +- **UpdateRevision** The revision of the update that is waiting for reboot to finish installation. + + +### Microsoft.Windows.Update.Ux.MusNotification.RebootNoLongerNeeded + +This event is sent when a security update has successfully completed. + +The following fields are available: + +- **UtcTime** The Coordinated Universal Time that the restart was no longer needed. + + +### Microsoft.Windows.Update.Ux.MusNotification.RebootScheduled + +This event sends basic information about scheduling an update-related reboot, to get security updates and to help keep Windows up-to-date. + +The following fields are available: + +- **activeHoursApplicable** Indicates whether Active Hours applies on this device. +- **IsEnhancedEngagedReboot** Indicates whether Enhanced reboot was enabled. +- **rebootArgument** Argument for the reboot task. It also represents specific reboot related action. +- **rebootOutsideOfActiveHours** True, if a reboot is scheduled outside of active hours. False, otherwise. +- **rebootScheduledByUser** True, if a reboot is scheduled by user. False, if a reboot is scheduled automatically. +- **rebootState** Current state of the reboot. +- **rebootUsingSmartScheduler** Indicates that the reboot is scheduled by SmartScheduler. +- **revisionNumber** Revision number of the OS. +- **scheduledRebootTime** Time scheduled for the reboot. +- **scheduledRebootTimeInUTC** Time scheduled for the reboot, in UTC. +- **updateId** Identifies which update is being scheduled. +- **wuDeviceid** The unique device ID used by Windows Update. + + +### Microsoft.Windows.Update.Ux.MusUpdateSettings.RebootScheduled + +This event sends basic information for scheduling a device restart to install security updates. It's used to help keep Windows up-to-date + +The following fields are available: + +- **activeHoursApplicable** Is the restart respecting Active Hours? +- **IsEnhancedEngagedReboot** TRUE if the reboot path is Enhanced Engaged. Otherwise, FALSE. +- **rebootArgument** The arguments that are passed to the OS for the restarted. +- **rebootOutsideOfActiveHours** Was the restart scheduled outside of Active Hours? +- **rebootScheduledByUser** Was the restart scheduled by the user? If the value is false, the restart was scheduled by the device. +- **rebootState** The state of the restart. +- **rebootUsingSmartScheduler** TRUE if the reboot should be performed by the Smart Scheduler. Otherwise, FALSE. +- **revisionNumber** The revision number of the OS being updated. +- **scheduledRebootTime** Time of the scheduled reboot +- **scheduledRebootTimeInUTC** Time of the scheduled restart, in Coordinated Universal Time. +- **updateId** The Windows Update device GUID. +- **wuDeviceid** The Windows Update device GUID. + + +## Windows Update mitigation events + +### Mitigation360Telemetry.MitigationCustom.CleanupSafeOsImages + +This event sends data specific to the CleanupSafeOsImages mitigation used for OS Updates. + +The following fields are available: + +- **ClientId** The client ID used by Windows Update. +- **FlightId** The ID of each Windows Insider build the device received. +- **InstanceId** A unique device ID that identifies each update instance. +- **MitigationScenario** The update scenario in which the mitigation was executed. +- **MountedImageCount** The number of mounted images. +- **MountedImageMatches** The number of mounted image matches. +- **MountedImagesFailed** The number of mounted images that could not be removed. +- **MountedImagesRemoved** The number of mounted images that were successfully removed. +- **MountedImagesSkipped** The number of mounted images that were not found. +- **RelatedCV** The correlation vector value generated from the latest USO scan. +- **Result** HResult of this operation. +- **ScenarioId** ID indicating the mitigation scenario. +- **ScenarioSupported** Indicates whether the scenario was supported. +- **SessionId** Unique value for each update attempt. +- **UpdateId** Unique ID for each Windows Update. +- **WuId** Unique ID for the Windows Update client. + + +### Mitigation360Telemetry.MitigationCustom.FixupEditionId + +This event sends data specific to the FixupEditionId mitigation used for OS updates. + +The following fields are available: + +- **ClientId** In the WU scenario, this will be the WU client ID that is passed to Setup. In Media setup, default value is Media360, but can be overwritten by the caller to a unique value. +- **EditionIdUpdated** Determine whether EditionId was changed. +- **FlightId** Unique identifier for each flight. +- **InstanceId** Unique GUID that identifies each instances of setuphost.exe. +- **MitigationScenario** The update scenario in which the mitigation was executed. +- **ProductEditionId** Expected EditionId value based on GetProductInfo. +- **ProductType** Value returned by GetProductInfo. +- **RegistryEditionId** EditionId value in the registry. +- **RelatedCV** Correlation vector value generated from the latest USO scan. +- **Result** HResult of this operation. +- **ScenarioId** ID indicating the mitigation scenario. +- **ScenarioSupported** Indicates whether the scenario was supported. +- **SessionId** Unique value for each update attempt. +- **UpdateId** Unique ID for each update. +- **WuId** Unique ID for the Windows Update client. + + +## Winlogon events + +### Microsoft.Windows.Security.Winlogon.SetupCompleteLogon + +This event signals the completion of the setup process. It happens only once during the first logon. + + + + From 17a6787e0ddf7d7b0b3bf20990137909e0262471 Mon Sep 17 00:00:00 2001 From: Brian Lich Date: Fri, 18 Jan 2019 08:50:56 -0800 Subject: [PATCH 015/724] new build 011819 --- .../basic-level-windows-diagnostic-events-and-fields-19H1.md | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/windows/privacy/basic-level-windows-diagnostic-events-and-fields-19H1.md b/windows/privacy/basic-level-windows-diagnostic-events-and-fields-19H1.md index da9e5f277e..2fd9b3a25f 100644 --- a/windows/privacy/basic-level-windows-diagnostic-events-and-fields-19H1.md +++ b/windows/privacy/basic-level-windows-diagnostic-events-and-fields-19H1.md @@ -9,7 +9,7 @@ ms.pagetype: security localizationpriority: high author: brianlic-msft ms.author: brianlic -ms.date: 01/17/2019 +ms.date: 01/18/2019 --- From 10f85d71532329e2429d2585793ca844f988c4d3 Mon Sep 17 00:00:00 2001 From: Brian Lich Date: Tue, 22 Jan 2019 09:08:29 -0800 Subject: [PATCH 016/724] new build 012219 --- ...windows-diagnostic-events-and-fields-19H1.md | 17 ++++++++++------- 1 file changed, 10 insertions(+), 7 deletions(-) diff --git a/windows/privacy/basic-level-windows-diagnostic-events-and-fields-19H1.md b/windows/privacy/basic-level-windows-diagnostic-events-and-fields-19H1.md index 2fd9b3a25f..d91af574a8 100644 --- a/windows/privacy/basic-level-windows-diagnostic-events-and-fields-19H1.md +++ b/windows/privacy/basic-level-windows-diagnostic-events-and-fields-19H1.md @@ -9,7 +9,7 @@ ms.pagetype: security localizationpriority: high author: brianlic-msft ms.author: brianlic -ms.date: 01/18/2019 +ms.date: 01/22/2019 --- @@ -706,6 +706,8 @@ The following fields are available: - **DriverIsDriverBlocked** Is the driver package blocked because of a driver block? - **DriverShouldNotMigrate** Should the driver package be migrated during upgrade? - **SdbDriverBlockOverridden** Does the driver package have an SDB block that blocks it from migrating, but that block has been overridden? +- **SdbDriverBlockServicing** No content is currently available. +- **SdbDriverBlockSwap** No content is currently available. ### Microsoft.Windows.Appraiser.General.DecisionDriverPackageRemove @@ -3973,12 +3975,12 @@ Ensures Windows Updates are secure and complete. Event helps to identify whether The following fields are available: - **CallerApplicationName** Name of application making the Windows Update request. Used to identify context of request. -- **EndpointUrl** The endpoint URL where the device obtains update metadata. This is used to distinguish between test, staging, and production environments. -- **EventScenario** The purpose of this event, such as scan started, scan succeeded, or scan failed. -- **ExtendedStatusCode** The secondary status code of the event. +- **EndpointUrl** URL of the endpoint where client obtains update metadata. Used to identify test vs staging vs production environments. +- **EventScenario** Indicates the purpose of the event - whether because scan started, succeded, failed, etc. +- **ExtendedStatusCode** Secondary status code for certain scenarios where StatusCode was not specific enough. - **LeafCertId** The integral ID from the FragmentSigning data for the certificate that failed. - **ListOfSHA256OfIntermediateCerData** A semicolon delimited list of base64 encoding of hashes for the Base64CerData in the FragmentSigning data of an intermediate certificate. -- **MetadataIntegrityMode** The mode of the transport metadata integrity check. 0 = unknown; 1 = ignore; 2 = audit; 3 = enforce +- **MetadataIntegrityMode** Mode of update transport metadata integrity check. 0-Unknown, 1-Ignoe, 2-Audit, 3-Enforce - **MetadataSignature** A base64-encoded string of the signature associated with the update metadata (specified by revision ID). - **RawMode** The raw unparsed mode string from the SLS response. This field is null if not applicable. - **RawValidityWindowInDays** The raw unparsed validity window string in days of the timestamp token. This field is null if not applicable. @@ -3989,8 +3991,8 @@ The following fields are available: - **SHA256OfLeafCertPublicKey** A base64 encoding of the hash of the Base64CertData in the FragmentSigning data of the leaf certificate. - **SHA256OfTimestampToken** An encoded string of the timestamp token. - **SignatureAlgorithm** The hash algorithm for the metadata signature. -- **SLSPrograms** A test program to which a device may have opted in. Example: Insider Fast -- **StatusCode** The status code of the event. +- **SLSPrograms** A test program a machine may be opted in. Examples include "Canary" and "Insider Fast". +- **StatusCode** Result code of the event (success, cancellation, failure code HResult) - **TimestampTokenCertThumbprint** The thumbprint of the encoded timestamp token. - **TimestampTokenId** The time this was created. It is encoded in a timestamp blob and will be zero if the token is malformed. - **UpdateId** The update ID for a specific piece of content. @@ -4620,6 +4622,7 @@ The following fields are available: - **capsuleFailureCount** No content is currently available. - **detectionSummary** Result of each applicable detection that was run. - **featureAssessmentImpact** WaaS Assessment impact for feature updates. +- **hrEngineBlockReason** No content is currently available. - **hrEngineResult** Error code from the engine operation. - **hrLastSandboxError** No content is currently available. - **initSummary** No content is currently available. From 1ba775d8adb99076810cff923e4afac479822f88 Mon Sep 17 00:00:00 2001 From: Brian Lich Date: Wed, 23 Jan 2019 08:32:26 -0800 Subject: [PATCH 017/724] new build --- ...ndows-diagnostic-events-and-fields-19H1.md | 56 ++++++++----------- 1 file changed, 24 insertions(+), 32 deletions(-) diff --git a/windows/privacy/basic-level-windows-diagnostic-events-and-fields-19H1.md b/windows/privacy/basic-level-windows-diagnostic-events-and-fields-19H1.md index d91af574a8..8af3ec5e62 100644 --- a/windows/privacy/basic-level-windows-diagnostic-events-and-fields-19H1.md +++ b/windows/privacy/basic-level-windows-diagnostic-events-and-fields-19H1.md @@ -9,7 +9,7 @@ ms.pagetype: security localizationpriority: high author: brianlic-msft ms.author: brianlic -ms.date: 01/22/2019 +ms.date: 01/23/2019 --- @@ -73,12 +73,12 @@ The following fields are available: ### Microsoft.Windows.Security.AppLockerCSP.CAppLockerCSP::Commit -No content is currently available. +This event returns information about the “Commit” operation in AppLockerCSP. The following fields are available: -- **oldId** No content is currently available. -- **txId** No content is currently available. +- **oldId** The unique identifier for the most recent previous CSP transaction. +- **txId** The unique identifier for the current CSP transaction. ### Microsoft.Windows.Security.AppLockerCSP.ClearParams @@ -243,7 +243,7 @@ This event lists the types of objects and how many of each exist on the client d The following fields are available: -- **DatasourceApplicationFile_19A** No content is currently available. +- **DatasourceApplicationFile_19A** The count of the number of this particular object type present on this device. - **DatasourceApplicationFile_19ASetup** The count of the number of this particular object type present on this device. - **DatasourceApplicationFile_19H1** The count of the number of this particular object type present on this device. - **DatasourceApplicationFile_19H1Setup** The count of the number of this particular object type present on this device. @@ -251,7 +251,7 @@ The following fields are available: - **DatasourceApplicationFile_RS5** The count of the number of this particular object type present on this device. - **DatasourceApplicationFile_RS5Setup** The count of the number of this particular object type present on this device. - **DatasourceApplicationFile_TH2** The count of the number of this particular object type present on this device. -- **DatasourceDevicePnp_19A** No content is currently available. +- **DatasourceDevicePnp_19A** The count of the number of this particular object type present on this device. - **DatasourceDevicePnp_19ASetup** The count of the number of this particular object type present on this device. - **DatasourceDevicePnp_19H1** The count of the number of this particular object type present on this device. - **DatasourceDevicePnp_19H1Setup** The count of the number of this particular object type present on this device. @@ -259,7 +259,7 @@ The following fields are available: - **DatasourceDevicePnp_RS5** The count of the number of this particular object type present on this device. - **DatasourceDevicePnp_RS5Setup** The count of the number of this particular object type present on this device. - **DatasourceDevicePnp_TH2** The count of the number of this particular object type present on this device. -- **DatasourceDriverPackage_19A** No content is currently available. +- **DatasourceDriverPackage_19A** The count of the number of this particular object type present on this device. - **DatasourceDriverPackage_19ASetup** The count of the number of this particular object type present on this device. - **DatasourceDriverPackage_19H1** The count of the number of this particular object type present on this device. - **DatasourceDriverPackage_19H1Setup** The count of the number of this particular object type present on this device. @@ -267,7 +267,7 @@ The following fields are available: - **DatasourceDriverPackage_RS5** The count of the number of this particular object type present on this device. - **DatasourceDriverPackage_RS5Setup** The count of the number of this particular object type present on this device. - **DatasourceDriverPackage_TH2** The count of the number of this particular object type present on this device. -- **DataSourceMatchingInfoBlock_19A** No content is currently available. +- **DataSourceMatchingInfoBlock_19A** The count of the number of this particular object type present on this device. - **DataSourceMatchingInfoBlock_19ASetup** The count of the number of this particular object type present on this device. - **DataSourceMatchingInfoBlock_19H1** The count of the number of this particular object type present on this device. - **DataSourceMatchingInfoBlock_19H1Setup** The count of the number of this particular object type present on this device. @@ -275,7 +275,7 @@ The following fields are available: - **DataSourceMatchingInfoBlock_RS5** The count of the number of this particular object type present on this device. - **DataSourceMatchingInfoBlock_RS5Setup** The count of the number of this particular object type present on this device. - **DataSourceMatchingInfoBlock_TH2** The count of the number of this particular object type present on this device. -- **DataSourceMatchingInfoPassive_19A** No content is currently available. +- **DataSourceMatchingInfoPassive_19A** The count of the number of this particular object type present on this device. - **DataSourceMatchingInfoPassive_19ASetup** The count of the number of this particular object type present on this device. - **DataSourceMatchingInfoPassive_19H1** The count of the number of this particular object type present on this device. - **DataSourceMatchingInfoPassive_19H1Setup** The count of the number of this particular object type present on this device. @@ -283,7 +283,7 @@ The following fields are available: - **DataSourceMatchingInfoPassive_RS5** The count of the number of this particular object type present on this device. - **DataSourceMatchingInfoPassive_RS5Setup** The count of the number of this particular object type present on this device. - **DataSourceMatchingInfoPassive_TH2** The count of the number of this particular object type present on this device. -- **DataSourceMatchingInfoPostUpgrade_19A** No content is currently available. +- **DataSourceMatchingInfoPostUpgrade_19A** The count of the number of this particular object type present on this device. - **DataSourceMatchingInfoPostUpgrade_19ASetup** The count of the number of this particular object type present on this device. - **DataSourceMatchingInfoPostUpgrade_19H1** The count of the number of this particular object type present on this device. - **DataSourceMatchingInfoPostUpgrade_19H1Setup** The count of the number of this particular object type present on this device. @@ -292,7 +292,7 @@ The following fields are available: - **DataSourceMatchingInfoPostUpgrade_RS5** The count of the number of this particular object type present on this device. - **DataSourceMatchingInfoPostUpgrade_RS5Setup** The count of the number of this particular object type present on this device. - **DataSourceMatchingInfoPostUpgrade_TH2** The count of the number of this particular object type present on this device. -- **DatasourceSystemBios_19A** No content is currently available. +- **DatasourceSystemBios_19A** The count of the number of this particular object type present on this device. - **DatasourceSystemBios_19ASetup** The count of the number of this particular object type present on this device. - **DatasourceSystemBios_19H1** The count of the number of this particular object type present on this device. - **DatasourceSystemBios_19H1Setup** The count of the number of this particular object type present on this device. @@ -300,7 +300,7 @@ The following fields are available: - **DatasourceSystemBios_RS5** The count of the number of this particular object type present on this device. - **DatasourceSystemBios_RS5Setup** The count of the number of this particular object type present on this device. - **DatasourceSystemBios_TH2** The count of the number of this particular object type present on this device. -- **DecisionApplicationFile_19A** No content is currently available. +- **DecisionApplicationFile_19A** The count of the number of this particular object type present on this device. - **DecisionApplicationFile_19ASetup** The count of the number of this particular object type present on this device. - **DecisionApplicationFile_19H1** The count of the number of this particular object type present on this device. - **DecisionApplicationFile_19H1Setup** The count of the number of this particular object type present on this device. @@ -308,7 +308,7 @@ The following fields are available: - **DecisionApplicationFile_RS5** The count of the number of this particular object type present on this device. - **DecisionApplicationFile_RS5Setup** The count of the number of this particular object type present on this device. - **DecisionApplicationFile_TH2** The count of the number of this particular object type present on this device. -- **DecisionDevicePnp_19A** No content is currently available. +- **DecisionDevicePnp_19A** The count of the number of this particular object type present on this device. - **DecisionDevicePnp_19ASetup** The count of the number of this particular object type present on this device. - **DecisionDevicePnp_19H1** The count of the number of this particular object type present on this device. - **DecisionDevicePnp_19H1Setup** The count of the number of this particular object type present on this device. @@ -316,7 +316,7 @@ The following fields are available: - **DecisionDevicePnp_RS5** The count of the number of this particular object type present on this device. - **DecisionDevicePnp_RS5Setup** The count of the number of this particular object type present on this device. - **DecisionDevicePnp_TH2** The count of the number of this particular object type present on this device. -- **DecisionDriverPackage_19A** No content is currently available. +- **DecisionDriverPackage_19A** The count of the number of this particular object type present on this device. - **DecisionDriverPackage_19ASetup** The count of the number of this particular object type present on this device. - **DecisionDriverPackage_19H1** The count of the number of this particular object type present on this device. - **DecisionDriverPackage_19H1Setup** The count of the number of this particular object type present on this device. @@ -324,7 +324,7 @@ The following fields are available: - **DecisionDriverPackage_RS5** The count of the number of this particular object type present on this device. - **DecisionDriverPackage_RS5Setup** The count of the number of this particular object type present on this device. - **DecisionDriverPackage_TH2** The count of the number of this particular object type present on this device. -- **DecisionMatchingInfoBlock_19A** No content is currently available. +- **DecisionMatchingInfoBlock_19A** The count of the number of this particular object type present on this device. - **DecisionMatchingInfoBlock_19ASetup** The count of the number of this particular object type present on this device. - **DecisionMatchingInfoBlock_19H1** The count of the number of this particular object type present on this device. - **DecisionMatchingInfoBlock_19H1Setup** The count of the number of this particular object type present on this device. @@ -332,7 +332,7 @@ The following fields are available: - **DecisionMatchingInfoBlock_RS5** The count of the number of this particular object type present on this device. - **DecisionMatchingInfoBlock_RS5Setup** The count of the number of this particular object type present on this device. - **DecisionMatchingInfoBlock_TH2** The count of the number of this particular object type present on this device. -- **DecisionMatchingInfoPassive_19A** No content is currently available. +- **DecisionMatchingInfoPassive_19A** The count of the number of this particular object type present on this device. - **DecisionMatchingInfoPassive_19ASetup** The count of the number of this particular object type present on this device. - **DecisionMatchingInfoPassive_19H1** The count of the number of this particular object type present on this device. - **DecisionMatchingInfoPassive_19H1Setup** The count of the number of this particular object type present on this device. @@ -340,7 +340,7 @@ The following fields are available: - **DecisionMatchingInfoPassive_RS5** The count of the number of this particular object type present on this device. - **DecisionMatchingInfoPassive_RS5Setup** The count of the number of this particular object type present on this device. - **DecisionMatchingInfoPassive_TH2** The count of the number of this particular object type present on this device. -- **DecisionMatchingInfoPostUpgrade_19A** No content is currently available. +- **DecisionMatchingInfoPostUpgrade_19A** The count of the number of this particular object type present on this device. - **DecisionMatchingInfoPostUpgrade_19ASetup** The count of the number of this particular object type present on this device. - **DecisionMatchingInfoPostUpgrade_19H1** The count of the number of this particular object type present on this device. - **DecisionMatchingInfoPostUpgrade_19H1Setup** The count of the number of this particular object type present on this device. @@ -349,7 +349,7 @@ The following fields are available: - **DecisionMatchingInfoPostUpgrade_RS5** The count of the number of this particular object type present on this device. - **DecisionMatchingInfoPostUpgrade_RS5Setup** The count of the number of this particular object type present on this device. - **DecisionMatchingInfoPostUpgrade_TH2** The count of the number of this particular object type present on this device. -- **DecisionMediaCenter_19A** No content is currently available. +- **DecisionMediaCenter_19A** The count of the number of this particular object type present on this device. - **DecisionMediaCenter_19ASetup** The count of the number of this particular object type present on this device. - **DecisionMediaCenter_19H1** The count of the number of this particular object type present on this device. - **DecisionMediaCenter_19H1Setup** The total DecisionMediaCenter objects targeting the next release of Windows on this device. @@ -357,13 +357,13 @@ The following fields are available: - **DecisionMediaCenter_RS5** The count of the number of this particular object type present on this device. - **DecisionMediaCenter_RS5Setup** The count of the number of this particular object type present on this device. - **DecisionMediaCenter_TH2** The count of the number of this particular object type present on this device. -- **DecisionSystemBios_19A** No content is currently available. -- **DecisionSystemBios_19ASetup** The total DecisionSystemBios objects targeting the next release of Windows on this device. +- **DecisionSystemBios_19A** The count of the number of this particular object type present on this device. +- **DecisionSystemBios_19ASetup** The count of the number of this particular object type present on this device. - **DecisionSystemBios_19H1** The count of the number of this particular object type present on this device. - **DecisionSystemBios_19H1Setup** The total DecisionSystemBios objects targeting the next release of Windows on this device. - **DecisionSystemBios_RS4** The total DecisionSystemBios objects targeting Windows 10 version, 1803 present on this device. - **DecisionSystemBios_RS5** The total DecisionSystemBios objects targeting the next release of Windows on this device. -- **DecisionSystemBios_RS5Setup** The total DecisionSystemBios objects targeting the next release of Windows on this device. +- **DecisionSystemBios_RS5Setup** The count of the number of this particular object type present on this device. - **DecisionSystemBios_TH2** The count of the number of this particular object type present on this device. - **InventoryApplicationFile** The count of the number of this particular object type present on this device. - **InventoryLanguagePack** The count of the number of this particular object type present on this device. @@ -381,7 +381,7 @@ The following fields are available: - **SystemWim** The total number of objects of this type present on this device. - **SystemWindowsActivationStatus** The count of the number of this particular object type present on this device. - **SystemWlan** The total number of objects of this type present on this device. -- **Wmdrm_19A** No content is currently available. +- **Wmdrm_19A** The count of the number of this particular object type present on this device. - **Wmdrm_19ASetup** The count of the number of this particular object type present on this device. - **Wmdrm_19H1** The count of the number of this particular object type present on this device. - **Wmdrm_19H1Setup** The total Wmdrm objects targeting the next release of Windows on this device. @@ -661,12 +661,6 @@ The following fields are available: - **NotRegressed** Does the device have a problem code on the source OS that is no better than the one it would have on the target OS? - **SdbDeviceBlockUpgrade** Is there an SDB block on the PNP device that blocks upgrade? - **SdbDriverBlockOverridden** Is there an SDB block on the PNP device that blocks upgrade, but that block was overridden? -- **TEMP_WuFalseAndCosInbox** No content is currently available. -- **TEMP_WuFalseAndCosOnline** No content is currently available. -- **TEMP_WuFalseAndNoCos** No content is currently available. -- **TEMP_WuTrueAndCosInbox** No content is currently available. -- **TEMP_WuTrueAndCosOnline** No content is currently available. -- **TEMP_WuTrueAndNoCos** No content is currently available. ### Microsoft.Windows.Appraiser.General.DecisionDevicePnpRemove @@ -2300,7 +2294,7 @@ The following fields are available: - **GPUVendorID** The GPU vendor ID. - **InterfaceId** The GPU interface ID. - **IsDisplayDevice** Does the GPU have displaying capabilities? -- **IsHwSchSupported** No content is currently available. +- **IsHwSchSupported** Indicates whether the adapter supports hardware scheduling. - **IsHybridDiscrete** Does the GPU have discrete GPU capabilities in a hybrid device? - **IsHybridIntegrated** Does the GPU have integrated GPU capabilities in a hybrid device? - **IsLDA** Is the GPU comprised of Linked Display Adapters? @@ -3408,7 +3402,7 @@ The following fields are available: ### Microsoft.Windows.UpdateReserveManager.InitializeUpdateReserveManager -No content is currently available. +This event returns data about the Update Reserve Manager, including whether it’s been initialized. The following fields are available: @@ -4946,10 +4940,8 @@ This event is sent at the beginning of an app install or update to help keep Win The following fields are available: - **CatalogId** The name of the product catalog from which this app was chosen. -- **fulfillmentPluginId** No content is currently available. - **FulfillmentPluginId** No content is currently available. - **PFN** The Package Family Name of the app that is being installed or updated. -- **pluginTelemetryData** No content is currently available. - **PluginTelemetryData** No content is currently available. - **ProductId** The product ID of the app that is being updated or installed. From c19b9d50fcc815ccaaff9aa5c940f2f37fc23303 Mon Sep 17 00:00:00 2001 From: Brian Lich Date: Wed, 23 Jan 2019 13:16:16 -0800 Subject: [PATCH 018/724] new build --- ...ndows-diagnostic-events-and-fields-19H1.md | 44 +++++++++++++++++++ 1 file changed, 44 insertions(+) diff --git a/windows/privacy/basic-level-windows-diagnostic-events-and-fields-19H1.md b/windows/privacy/basic-level-windows-diagnostic-events-and-fields-19H1.md index 8af3ec5e62..569959e879 100644 --- a/windows/privacy/basic-level-windows-diagnostic-events-and-fields-19H1.md +++ b/windows/privacy/basic-level-windows-diagnostic-events-and-fields-19H1.md @@ -3400,6 +3400,16 @@ The following fields are available: - **Result** The HResult error. +### Microsoft.Windows.UpdateReserveManager.CommitPendingHardReserveAdjustment + +No content is currently available. + +The following fields are available: + +- **FinalAdjustment** No content is currently available. +- **InitialAdjustment** No content is currently available. + + ### Microsoft.Windows.UpdateReserveManager.InitializeUpdateReserveManager This event returns data about the Update Reserve Manager, including whether it’s been initialized. @@ -3415,6 +3425,23 @@ The following fields are available: - **Version** No content is currently available. +### Microsoft.Windows.UpdateReserveManager.RemovePendingHardReserveAdjustment + +No content is currently available. + + + +### Microsoft.Windows.UpdateReserveManager.UpdatePendingHardReserveAdjustment + +No content is currently available. + +The following fields are available: + +- **ChangeSize** No content is currently available. +- **PendingHardReserveAdjustment** No content is currently available. +- **UpdateType** No content is currently available. + + ### Value This event returns data about Mean Time to Failure (MTTF) for Windows devices. It is the primary means of estimating reliability problems in Basic Diagnostic reporting with very strong privacy guarantees. Since Basic Diagnostic reporting does not include system up-time, and since that information is important to ensuring the safe and stable operation of Windows, the data provided by this event provides that data in a manner which does not threaten a user’s privacy. @@ -5273,6 +5300,23 @@ The following fields are available: - **UtcTime** The time the dialog box notification will be displayed, in Coordinated Universal Time. +### Microsoft.Windows.Update.NotificationUx.EnhancedEngagedRebootAcceptAutoDialog + +This event indicates that the Enhanced Engaged restart "accept automatically" dialog box was displayed. + +The following fields are available: + +- **DeviceLocalTime** The local time on the device sending the event. +- **EnterpriseAttributionValue** No content is currently available. +- **ETag** OneSettings versioning value. +- **ExitCode** Indicates how users exited the dialog box. +- **RebootVersion** Version of DTE. +- **UpdateId** The ID of the update that is pending restart to finish installation. +- **UpdateRevision** The revision of the update that is pending restart to finish installation. +- **UserResponseString** The option that user chose on this dialog box. +- **UtcTime** The time that the dialog box was displayed, in Coordinated Universal Time. + + ### Microsoft.Windows.Update.NotificationUx.EnhancedEngagedRebootRebootFailedDialog This event indicates that the Enhanced Engaged restart "restart failed" dialog box was displayed. From 2c981087b5dde7b2480acb1a5e2944687858a59a Mon Sep 17 00:00:00 2001 From: Brian Lich Date: Thu, 24 Jan 2019 08:20:29 -0800 Subject: [PATCH 019/724] new build --- ...ndows-diagnostic-events-and-fields-19H1.md | 376 ++++++++++++++---- 1 file changed, 289 insertions(+), 87 deletions(-) diff --git a/windows/privacy/basic-level-windows-diagnostic-events-and-fields-19H1.md b/windows/privacy/basic-level-windows-diagnostic-events-and-fields-19H1.md index 569959e879..c7d639913e 100644 --- a/windows/privacy/basic-level-windows-diagnostic-events-and-fields-19H1.md +++ b/windows/privacy/basic-level-windows-diagnostic-events-and-fields-19H1.md @@ -9,7 +9,7 @@ ms.pagetype: security localizationpriority: high author: brianlic-msft ms.author: brianlic -ms.date: 01/23/2019 +ms.date: 01/24/2019 --- @@ -756,7 +756,7 @@ The following fields are available: ### Microsoft.Windows.Appraiser.General.DecisionMatchingInfoPassiveAdd -This event sends compatibility decision data about non-blocking entries on the system that are not keyed by either applications or devices, to help keep Windows up-to-date. +This event sends compatibility decision data about non-blocking entries on the system that are not keyed by either applications or devices, to help keep Windows up to date. This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedeviceinventorychange). @@ -2161,37 +2161,37 @@ The following fields are available: ### CbsServicingProvider.CbsSelectableUpdateChangeV2 -No content is currently available. +This event reports the results of enabling or disabling optional Windows Content to keep Windows up to date. The following fields are available: -- **applicableUpdateState** No content is currently available. -- **buildVersion** No content is currently available. -- **clientId** No content is currently available. -- **downloadSource** No content is currently available. -- **downloadtimeInSeconds** No content is currently available. -- **executionID** No content is currently available. -- **executionSequence** No content is currently available. -- **firstMergedExecutionSequence** No content is currently available. -- **firstMergedID** No content is currently available. -- **hrDownloadResult** No content is currently available. -- **hrStatusUpdate** No content is currently available. -- **identityHash** No content is currently available. -- **initiatedOffline** No content is currently available. -- **majorVersion** No content is currently available. -- **minorVersion** No content is currently available. -- **packageArchitecture** No content is currently available. -- **packageLanguage** No content is currently available. -- **packageName** No content is currently available. -- **rebootRequired** No content is currently available. -- **revisionVersion** No content is currently available. -- **stackBuild** No content is currently available. -- **stackMajorVersion** No content is currently available. -- **stackMinorVersion** No content is currently available. -- **stackRevision** No content is currently available. -- **updateName** No content is currently available. -- **updateStartState** No content is currently available. -- **updateTargetState** No content is currently available. +- **applicableUpdateState** Indicates the highest applicable state of the optional content. +- **buildVersion** The build version of the package being installed. +- **clientId** The name of the application requesting the optional content change. +- **downloadSource** Indicates if optional content was obtained from Windows Update or a locally accessible file. +- **downloadtimeInSeconds** Indicates if optional content was obtained from Windows Update or a locally accessible file. +- **executionID** A unique ID used to identify events associated with a single servicing operation and not reused for future operations. +- **executionSequence** A counter that tracks the number of servicing operations attempted on the device. +- **firstMergedExecutionSequence** The value of a pervious executionSequence counter that is being merged with the current operation, if applicable. +- **firstMergedID** A unique ID of a pervious servicing operation that is being merged with this operation, if applicable. +- **hrDownloadResult** The return code of the download operation. +- **hrStatusUpdate** The return code of the servicing operation. +- **identityHash** A pseudonymized (hashed) identifier for the Windows Package that is being installed or uninstalled. +- **initiatedOffline** Indicates whether the operation was performed against an offline Windows image file or a running instance of Windows. +- **majorVersion** The major version of the package being installed. +- **minorVersion** The minor version of the package being installed. +- **packageArchitecture** The architecture of the package being installed. +- **packageLanguage** The language of the package being installed. +- **packageName** The name of the package being installed. +- **rebootRequired** Indicates whether a reboot is required to complete the operation. +- **revisionVersion** The revision number of the package being installed. +- **stackBuild** The build number of the servicing stack binary performing the installation. +- **stackMajorVersion** The major version number of the servicing stack binary performing the installation. +- **stackMinorVersion** The minor version number of the servicing stack binary performing the installation. +- **stackRevision** The revision number of the servicing stack binary performing the installation. +- **updateName** The name of the optional Windows Operation System feature being enabled or disabled. +- **updateStartState** A value indicating the state of the optional content before the operation started. +- **updateTargetState** A value indicating the desired state of the optional content. ## Diagnostic data events @@ -2249,7 +2249,7 @@ The following fields are available: - **MaxActiveAgentConnectionCount** The maximum number of active agents during this heartbeat timeframe. - **MaxInUseScenarioCounter** Soft maximum number of scenarios loaded by UTC. - **PreviousHeartBeatTime** Time of last heartbeat event (allows chaining of events). -- **PrivacyBlockedCount** No content is currently available. +- **PrivacyBlockedCount** The number of events blocked due to privacy settings or tags. - **RepeatedUploadFailureDropped** Number of events lost due to repeated upload failures for a single buffer. - **SettingsHttpAttempts** Number of attempts to contact OneSettings service. - **SettingsHttpFailures** The number of failures from contacting the OneSettings service. @@ -3300,7 +3300,7 @@ The following fields are available: - **UserInputTime** The amount of time the loader application spent waiting for user input. -## Other events +## Miracast events ### Microsoft.Windows.Cast.Miracast.MiracastSessionEnd @@ -3374,72 +3374,85 @@ The following fields are available: - **WFD2Supported** No content is currently available. -### Microsoft.Windows.Mitigation.AccountTraceLoggingProvider.General +## Other events -This event provides information about application properties to indicate the successful execution. - -The following fields are available: - -- **AppMode** Indicates the mode the app is being currently run around privileges. -- **ExitCode** Indicates the exit code of the app. -- **Help** Indicates if the app needs to be launched in the help mode. -- **ParseError** Indicates if there was a parse error during the execution. -- **RightsAcquired** Indicates if the right privileges were acquired for successful execution. -- **RightsWereEnabled** Indicates if the right privileges were enabled for successful execution. -- **TestMode** Indicates whether the app is being run in test mode. - - -### Microsoft.Windows.Mitigation.AccountTraceLoggingProvider.GetCount - -This event provides information about the properties of user accounts in the Administrator group. - -The following fields are available: - -- **Internal** Indicates the internal property associated with the count group. -- **LastError** The error code (if applicable) for the cause of the failure to get the count of the user account. -- **Result** The HResult error. - - -### Microsoft.Windows.UpdateReserveManager.CommitPendingHardReserveAdjustment - -No content is currently available. - -The following fields are available: - -- **FinalAdjustment** No content is currently available. -- **InitialAdjustment** No content is currently available. - - -### Microsoft.Windows.UpdateReserveManager.InitializeUpdateReserveManager - -This event returns data about the Update Reserve Manager, including whether it’s been initialized. - -The following fields are available: - -- **ClientId** No content is currently available. -- **Flags** No content is currently available. -- **FlightId** No content is currently available. -- **Offline** No content is currently available. -- **PolicyPassed** No content is currently available. -- **ReturnCode** No content is currently available. -- **Version** No content is currently available. - - -### Microsoft.Windows.UpdateReserveManager.RemovePendingHardReserveAdjustment +### Microsoft.Windows.IoT.Client.CEPAL.MonitorStarted No content is currently available. -### Microsoft.Windows.UpdateReserveManager.UpdatePendingHardReserveAdjustment +### Microsoft.Windows.Server.FailoverClusteringCritical.ClusterSummary2 No content is currently available. The following fields are available: -- **ChangeSize** No content is currently available. -- **PendingHardReserveAdjustment** No content is currently available. -- **UpdateType** No content is currently available. +- **autoAssignSite** No content is currently available. +- **autoBalancerLevel** No content is currently available. +- **autoBalancerMode** No content is currently available. +- **blockCacheSize** No content is currently available. +- **ClusterAdConfiguration** No content is currently available. +- **clusterAdType** No content is currently available. +- **clusterDumpPolicy** No content is currently available. +- **clusterFunctionalLevel** No content is currently available. +- **clusterGuid** No content is currently available. +- **clusterWitnessType** No content is currently available. +- **countNodesInSite** No content is currently available. +- **crossSiteDelay** No content is currently available. +- **crossSiteThreshold** No content is currently available. +- **crossSubnetDelay** No content is currently available. +- **crossSubnetThreshold** No content is currently available. +- **csvCompatibleFilters** No content is currently available. +- **csvIncompatibleFilters** No content is currently available. +- **csvResourceCount** No content is currently available. +- **currentNodeSite** No content is currently available. +- **dasModeBusType** No content is currently available. +- **downLevelNodeCount** No content is currently available. +- **drainOnShutdown** No content is currently available. +- **dynamicQuorumEnabled** No content is currently available. +- **enforcedAntiAffinity** No content is currently available. +- **genAppNames** No content is currently available. +- **genSvcNames** No content is currently available. +- **hangRecoveryAction** No content is currently available. +- **hangTimeOut** No content is currently available. +- **isCalabria** No content is currently available. +- **isMixedMode** No content is currently available. +- **isRunningDownLevel** No content is currently available. +- **logLevel** No content is currently available. +- **logSize** No content is currently available. +- **lowerQuorumPriorityNodeId** No content is currently available. +- **minNeverPreempt** No content is currently available. +- **minPreemptor** No content is currently available. +- **netftIpsecEnabled** No content is currently available. +- **NodeCount** No content is currently available. +- **nodeId** No content is currently available. +- **nodeResourceCounts** No content is currently available. +- **nodeResourceOnlineCounts** No content is currently available. +- **numberOfSites** No content is currently available. +- **numNodesInNoSite** No content is currently available. +- **plumbAllCrossSubnetRoutes** No content is currently available. +- **preferredSite** No content is currently available. +- **privateCloudWitness** No content is currently available. +- **quarantineDuration** No content is currently available. +- **quarantineThreshold** No content is currently available. +- **quorumArbitrationTimeout** No content is currently available. +- **resiliencyLevel** No content is currently available. +- **resourceCounts** No content is currently available. +- **resourceTypeCounts** No content is currently available. +- **resourceTypes** No content is currently available. +- **resourceTypesPath** No content is currently available. +- **sameSubnetDelay** No content is currently available. +- **sameSubnetThreshold** No content is currently available. +- **secondsInMixedMode** No content is currently available. +- **securityLevel** No content is currently available. +- **securityLevelForStorage** No content is currently available. +- **sharedVolumeBlockCacheSize** No content is currently available. +- **shutdownTimeoutMinutes** No content is currently available. +- **upNodeCount** No content is currently available. +- **useClientAccessNetworksForCsv** No content is currently available. +- **vmIsolationTime** No content is currently available. +- **witnessDatabaseWriteTimeout** No content is currently available. ### Value @@ -5368,6 +5381,22 @@ The following fields are available: - **UtcTime** The time at which the reboot reminder dialog was shown (in UTC). +### Microsoft.Windows.Update.NotificationUx.EnhancedEngagedRebootReminderToast + +No content is currently available. + +The following fields are available: + +- **DeviceLocalTime** No content is currently available. +- **ETag** No content is currently available. +- **ExitCode** No content is currently available. +- **RebootVersion** No content is currently available. +- **UpdateId** No content is currently available. +- **UpdateRevision** No content is currently available. +- **UserResponseString** No content is currently available. +- **UtcTime** No content is currently available. + + ### Microsoft.Windows.Update.Orchestrator.ActivityRestrictedByActiveHoursPolicy This event indicates a policy is present that may restrict update activity to outside of active hours. @@ -5798,6 +5827,32 @@ The following fields are available: ## Windows Update mitigation events +### Microsoft.Windows.Mitigation.AccountTraceLoggingProvider.General + +This event provides information about application properties to indicate the successful execution. + +The following fields are available: + +- **AppMode** Indicates the mode the app is being currently run around privileges. +- **ExitCode** Indicates the exit code of the app. +- **Help** Indicates if the app needs to be launched in the help mode. +- **ParseError** Indicates if there was a parse error during the execution. +- **RightsAcquired** Indicates if the right privileges were acquired for successful execution. +- **RightsWereEnabled** Indicates if the right privileges were enabled for successful execution. +- **TestMode** Indicates whether the app is being run in test mode. + + +### Microsoft.Windows.Mitigation.AccountTraceLoggingProvider.GetCount + +This event provides information about the properties of user accounts in the Administrator group. + +The following fields are available: + +- **Internal** Indicates the internal property associated with the count group. +- **LastError** The error code (if applicable) for the cause of the failure to get the count of the user account. +- **Result** The HResult error. + + ### Mitigation360Telemetry.MitigationCustom.CleanupSafeOsImages This event sends data specific to the CleanupSafeOsImages mitigation used for OS Updates. @@ -5845,6 +5900,153 @@ The following fields are available: - **WuId** Unique ID for the Windows Update client. +## Windows Update Reserve Manager events + +### Microsoft.Windows.UpdateReserveManager.BeginScenario + +No content is currently available. + +The following fields are available: + +- **Flags** No content is currently available. +- **HardReserveSize** No content is currently available. +- **HardReserveUsedSpace** No content is currently available. +- **OwningScenarioId** No content is currently available. +- **ReturnCode** No content is currently available. +- **ScenarioId** No content is currently available. + + +### Microsoft.Windows.UpdateReserveManager.ClearSoftReserve + +No content is currently available. + + + +### Microsoft.Windows.UpdateReserveManager.CommitPendingHardReserveAdjustment + +No content is currently available. + +The following fields are available: + +- **FinalAdjustment** No content is currently available. +- **InitialAdjustment** No content is currently available. + + +### Microsoft.Windows.UpdateReserveManager.EndScenario + +No content is currently available. + +The following fields are available: + +- **ActiveScenario** No content is currently available. +- **Flags** No content is currently available. +- **HardReserveSize** No content is currently available. +- **HardReserveUsedSpace** No content is currently available. +- **ReturnCode** No content is currently available. +- **ScenarioId** No content is currently available. + + +### Microsoft.Windows.UpdateReserveManager.FunctionReturnedError + +No content is currently available. + +The following fields are available: + +- **FailedExpression** No content is currently available. +- **FailedFile** No content is currently available. +- **FailedFunction** No content is currently available. +- **FailedLine** No content is currently available. +- **ReturnCode** No content is currently available. + + +### Microsoft.Windows.UpdateReserveManager.InitializeReserves + +No content is currently available. + +The following fields are available: + +- **FallbackInitUsed** No content is currently available. +- **Flags** No content is currently available. +- **HardReserveFinalSize** No content is currently available. +- **HardReserveFinalUsedSpace** No content is currently available. +- **HardReserveInitialSize** No content is currently available. +- **HardReserveInitialUsedSpace** No content is currently available. +- **HardReserveTargetSize** No content is currently available. +- **InitialUserFreeSpace** No content is currently available. +- **PostUpgradeFreeSpace** No content is currently available. +- **SoftReserveFinalSize** No content is currently available. +- **SoftReserveFinalUsedSpace** No content is currently available. +- **SoftReserveInitialSize** No content is currently available. +- **SoftReserveInitialUsedSpace** No content is currently available. +- **SoftReserveTargetSize** No content is currently available. +- **TargetUserFreeSpace** No content is currently available. +- **UpdateScratchFinalUsedSpace** No content is currently available. +- **UpdateScratchInitialUsedSpace** No content is currently available. +- **UpdateScratchReserveFinalSize** No content is currently available. +- **UpdateScratchReserveInitialSize** No content is currently available. + + +### Microsoft.Windows.UpdateReserveManager.InitializeUpdateReserveManager + +This event returns data about the Update Reserve Manager, including whether it’s been initialized. + +The following fields are available: + +- **ClientId** No content is currently available. +- **Flags** No content is currently available. +- **FlightId** No content is currently available. +- **Offline** No content is currently available. +- **PolicyPassed** No content is currently available. +- **ReturnCode** No content is currently available. +- **Version** No content is currently available. + + +### Microsoft.Windows.UpdateReserveManager.PrepareTIForReserveInitialization + +No content is currently available. + +The following fields are available: + +- **Flags** No content is currently available. + + +### Microsoft.Windows.UpdateReserveManager.ReevaluatePolicy + +No content is currently available. + +The following fields are available: + +- **PolicyChanged** No content is currently available. +- **PolicyFailedEnum** No content is currently available. +- **PolicyPassed** No content is currently available. + + +### Microsoft.Windows.UpdateReserveManager.RemovePendingHardReserveAdjustment + +No content is currently available. + + + +### Microsoft.Windows.UpdateReserveManager.TurnOffReserves + +No content is currently available. + +The following fields are available: + +- **Flags** No content is currently available. + + +### Microsoft.Windows.UpdateReserveManager.UpdatePendingHardReserveAdjustment + +No content is currently available. + +The following fields are available: + +- **ChangeSize** No content is currently available. +- **PendingHardReserveAdjustment** No content is currently available. +- **UpdateType** No content is currently available. + + ## Winlogon events ### Microsoft.Windows.Security.Winlogon.SetupCompleteLogon From c89d3c9b014105290f2d1732522eaebb88d80c4a Mon Sep 17 00:00:00 2001 From: Brian Lich Date: Thu, 24 Jan 2019 12:20:18 -0800 Subject: [PATCH 020/724] new build --- ...ndows-diagnostic-events-and-fields-19H1.md | 170 +++++++++--------- 1 file changed, 85 insertions(+), 85 deletions(-) diff --git a/windows/privacy/basic-level-windows-diagnostic-events-and-fields-19H1.md b/windows/privacy/basic-level-windows-diagnostic-events-and-fields-19H1.md index c7d639913e..4f2cd83eb0 100644 --- a/windows/privacy/basic-level-windows-diagnostic-events-and-fields-19H1.md +++ b/windows/privacy/basic-level-windows-diagnostic-events-and-fields-19H1.md @@ -700,8 +700,6 @@ The following fields are available: - **DriverIsDriverBlocked** Is the driver package blocked because of a driver block? - **DriverShouldNotMigrate** Should the driver package be migrated during upgrade? - **SdbDriverBlockOverridden** Does the driver package have an SDB block that blocks it from migrating, but that block has been overridden? -- **SdbDriverBlockServicing** No content is currently available. -- **SdbDriverBlockSwap** No content is currently available. ### Microsoft.Windows.Appraiser.General.DecisionDriverPackageRemove @@ -845,8 +843,6 @@ The following fields are available: - **Blocking** Is the device blocked from upgrade due to a BIOS block? - **DisplayGenericMessageGated** Indicates whether a generic offer block message will be shown for the bios. - **HasBiosBlock** Does the device have a BIOS block? -- **HasBiosBlockServicing** No content is currently available. -- **HasBiosBlockSwap** No content is currently available. ### Microsoft.Windows.Appraiser.General.DecisionSystemBiosStartSync @@ -1689,8 +1685,8 @@ The following fields are available: - **InkTypeImprovement** Current state of the improve inking and typing setting. - **Location** Current state of the location setting. - **LocationHistory** Current state of the location history setting. -- **LocationHistoryCloudSync** No content is currently available. -- **LocationHistoryOnTimeline** No content is currently available. +- **LocationHistoryCloudSync** Current state of the location history cloud sync setting. +- **LocationHistoryOnTimeline** Current state of the location history on timeline setting. - **Microphone** Current state of the microphone setting. - **PhoneCall** Current state of the phone call setting. - **PhoneCallHistory** Current state of the call history setting. @@ -2319,6 +2315,81 @@ The following fields are available: - **WDDMVersion** The Windows Display Driver Model version. +## Failover Clustering events + +### Microsoft.Windows.Server.FailoverClusteringCritical.ClusterSummary2 + +No content is currently available. + +The following fields are available: + +- **autoAssignSite** No content is currently available. +- **autoBalancerLevel** No content is currently available. +- **autoBalancerMode** No content is currently available. +- **blockCacheSize** No content is currently available. +- **ClusterAdConfiguration** No content is currently available. +- **clusterAdType** No content is currently available. +- **clusterDumpPolicy** No content is currently available. +- **clusterFunctionalLevel** No content is currently available. +- **clusterGuid** No content is currently available. +- **clusterWitnessType** No content is currently available. +- **countNodesInSite** No content is currently available. +- **crossSiteDelay** No content is currently available. +- **crossSiteThreshold** No content is currently available. +- **crossSubnetDelay** No content is currently available. +- **crossSubnetThreshold** No content is currently available. +- **csvCompatibleFilters** No content is currently available. +- **csvIncompatibleFilters** No content is currently available. +- **csvResourceCount** No content is currently available. +- **currentNodeSite** No content is currently available. +- **dasModeBusType** No content is currently available. +- **downLevelNodeCount** No content is currently available. +- **drainOnShutdown** No content is currently available. +- **dynamicQuorumEnabled** No content is currently available. +- **enforcedAntiAffinity** No content is currently available. +- **genAppNames** No content is currently available. +- **genSvcNames** No content is currently available. +- **hangRecoveryAction** No content is currently available. +- **hangTimeOut** No content is currently available. +- **isCalabria** No content is currently available. +- **isMixedMode** No content is currently available. +- **isRunningDownLevel** No content is currently available. +- **logLevel** No content is currently available. +- **logSize** No content is currently available. +- **lowerQuorumPriorityNodeId** No content is currently available. +- **minNeverPreempt** No content is currently available. +- **minPreemptor** No content is currently available. +- **netftIpsecEnabled** No content is currently available. +- **NodeCount** No content is currently available. +- **nodeId** No content is currently available. +- **nodeResourceCounts** No content is currently available. +- **nodeResourceOnlineCounts** No content is currently available. +- **numberOfSites** No content is currently available. +- **numNodesInNoSite** No content is currently available. +- **plumbAllCrossSubnetRoutes** No content is currently available. +- **preferredSite** No content is currently available. +- **privateCloudWitness** No content is currently available. +- **quarantineDuration** No content is currently available. +- **quarantineThreshold** No content is currently available. +- **quorumArbitrationTimeout** No content is currently available. +- **resiliencyLevel** No content is currently available. +- **resourceCounts** No content is currently available. +- **resourceTypeCounts** No content is currently available. +- **resourceTypes** No content is currently available. +- **resourceTypesPath** No content is currently available. +- **sameSubnetDelay** No content is currently available. +- **sameSubnetThreshold** No content is currently available. +- **secondsInMixedMode** No content is currently available. +- **securityLevel** No content is currently available. +- **securityLevelForStorage** No content is currently available. +- **sharedVolumeBlockCacheSize** No content is currently available. +- **shutdownTimeoutMinutes** No content is currently available. +- **upNodeCount** No content is currently available. +- **useClientAccessNetworksForCsv** No content is currently available. +- **vmIsolationTime** No content is currently available. +- **witnessDatabaseWriteTimeout** No content is currently available. + + ## Fault Reporting events ### Microsoft.Windows.FaultReporting.AppCrashEvent @@ -3258,6 +3329,14 @@ This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedevic +## IoT events + +### Microsoft.Windows.IoT.Client.CEPAL.MonitorStarted + +No content is currently available. + + + ## Kernel events ### IO @@ -3376,85 +3455,6 @@ The following fields are available: ## Other events -### Microsoft.Windows.IoT.Client.CEPAL.MonitorStarted - -No content is currently available. - - - -### Microsoft.Windows.Server.FailoverClusteringCritical.ClusterSummary2 - -No content is currently available. - -The following fields are available: - -- **autoAssignSite** No content is currently available. -- **autoBalancerLevel** No content is currently available. -- **autoBalancerMode** No content is currently available. -- **blockCacheSize** No content is currently available. -- **ClusterAdConfiguration** No content is currently available. -- **clusterAdType** No content is currently available. -- **clusterDumpPolicy** No content is currently available. -- **clusterFunctionalLevel** No content is currently available. -- **clusterGuid** No content is currently available. -- **clusterWitnessType** No content is currently available. -- **countNodesInSite** No content is currently available. -- **crossSiteDelay** No content is currently available. -- **crossSiteThreshold** No content is currently available. -- **crossSubnetDelay** No content is currently available. -- **crossSubnetThreshold** No content is currently available. -- **csvCompatibleFilters** No content is currently available. -- **csvIncompatibleFilters** No content is currently available. -- **csvResourceCount** No content is currently available. -- **currentNodeSite** No content is currently available. -- **dasModeBusType** No content is currently available. -- **downLevelNodeCount** No content is currently available. -- **drainOnShutdown** No content is currently available. -- **dynamicQuorumEnabled** No content is currently available. -- **enforcedAntiAffinity** No content is currently available. -- **genAppNames** No content is currently available. -- **genSvcNames** No content is currently available. -- **hangRecoveryAction** No content is currently available. -- **hangTimeOut** No content is currently available. -- **isCalabria** No content is currently available. -- **isMixedMode** No content is currently available. -- **isRunningDownLevel** No content is currently available. -- **logLevel** No content is currently available. -- **logSize** No content is currently available. -- **lowerQuorumPriorityNodeId** No content is currently available. -- **minNeverPreempt** No content is currently available. -- **minPreemptor** No content is currently available. -- **netftIpsecEnabled** No content is currently available. -- **NodeCount** No content is currently available. -- **nodeId** No content is currently available. -- **nodeResourceCounts** No content is currently available. -- **nodeResourceOnlineCounts** No content is currently available. -- **numberOfSites** No content is currently available. -- **numNodesInNoSite** No content is currently available. -- **plumbAllCrossSubnetRoutes** No content is currently available. -- **preferredSite** No content is currently available. -- **privateCloudWitness** No content is currently available. -- **quarantineDuration** No content is currently available. -- **quarantineThreshold** No content is currently available. -- **quorumArbitrationTimeout** No content is currently available. -- **resiliencyLevel** No content is currently available. -- **resourceCounts** No content is currently available. -- **resourceTypeCounts** No content is currently available. -- **resourceTypes** No content is currently available. -- **resourceTypesPath** No content is currently available. -- **sameSubnetDelay** No content is currently available. -- **sameSubnetThreshold** No content is currently available. -- **secondsInMixedMode** No content is currently available. -- **securityLevel** No content is currently available. -- **securityLevelForStorage** No content is currently available. -- **sharedVolumeBlockCacheSize** No content is currently available. -- **shutdownTimeoutMinutes** No content is currently available. -- **upNodeCount** No content is currently available. -- **useClientAccessNetworksForCsv** No content is currently available. -- **vmIsolationTime** No content is currently available. -- **witnessDatabaseWriteTimeout** No content is currently available. - - ### Value This event returns data about Mean Time to Failure (MTTF) for Windows devices. It is the primary means of estimating reliability problems in Basic Diagnostic reporting with very strong privacy guarantees. Since Basic Diagnostic reporting does not include system up-time, and since that information is important to ensuring the safe and stable operation of Windows, the data provided by this event provides that data in a manner which does not threaten a user’s privacy. From 69a68a7a7efe6fe5bec75034cec1800f72b2cd64 Mon Sep 17 00:00:00 2001 From: Brian Lich Date: Fri, 25 Jan 2019 09:07:55 -0800 Subject: [PATCH 021/724] new build --- ...ndows-diagnostic-events-and-fields-19H1.md | 58 +++++++++---------- 1 file changed, 29 insertions(+), 29 deletions(-) diff --git a/windows/privacy/basic-level-windows-diagnostic-events-and-fields-19H1.md b/windows/privacy/basic-level-windows-diagnostic-events-and-fields-19H1.md index 4f2cd83eb0..5675334faa 100644 --- a/windows/privacy/basic-level-windows-diagnostic-events-and-fields-19H1.md +++ b/windows/privacy/basic-level-windows-diagnostic-events-and-fields-19H1.md @@ -9,7 +9,7 @@ ms.pagetype: security localizationpriority: high author: brianlic-msft ms.author: brianlic -ms.date: 01/24/2019 +ms.date: 01/25/2019 --- @@ -858,24 +858,24 @@ The following fields are available: ### Microsoft.Windows.Appraiser.General.DecisionTestRemove -No content is currently available. +This event provides data that allows testing of “Remove” decisions to help keep Windows up to date. This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedeviceinventorychange). The following fields are available: -- **AppraiserVersion** No content is currently available. +- **AppraiserVersion** The version of the appraiser binary (executable) generating the events. ### Microsoft.Windows.Appraiser.General.DecisionTestStartSync -No content is currently available. +This event provides data that allows testing of “Start Sync” decisions to help keep Windows up to date. This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedeviceinventorychange). The following fields are available: -- **AppraiserVersion** No content is currently available. +- **AppraiserVersion** The version of the appraiser binary (executable) generating the events. ### Microsoft.Windows.Appraiser.General.GatedRegChange @@ -1046,24 +1046,24 @@ The following fields are available: ### Microsoft.Windows.Appraiser.General.InventoryTestRemove -No content is currently available. +This event provides data that allows testing of “Remove” decisions to help keep Windows up to date. This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedeviceinventorychange). The following fields are available: -- **AppraiserVersion** No content is currently available. +- **AppraiserVersion** The version of the appraiser binary (executable) generating the events. ### Microsoft.Windows.Appraiser.General.InventoryTestStartSync -No content is currently available. +This event provides data that allows testing of “Start Sync” decisions to help keep Windows up to date. This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedeviceinventorychange). The following fields are available: -- **AppraiserVersion** No content is currently available. +- **AppraiserVersion** The version of the appraiser binary (executable) generating the events. ### Microsoft.Windows.Appraiser.General.InventoryUplevelDriverPackageAdd @@ -1533,7 +1533,7 @@ This event sends Windows Insider data from customers participating in improvemen The following fields are available: - **DeviceSampleRate** The telemetry sample rate assigned to the device. -- **DriverTargetRing** No content is currently available. +- **DriverTargetRing** Indicates if the device is participating in receiving pre-release drivers and firmware contrent. - **EnablePreviewBuilds** Used to enable Windows Insider builds on a device. - **FlightIds** A list of the different Windows Insider builds on this device. - **FlightingBranchName** The name of the Windows Insider branch currently used by the device. @@ -1850,8 +1850,8 @@ The following fields are available: - **InkTypePersonalization** Current state of the inking and typing personalization setting. - **Location** Current state of the location setting. - **LocationHistory** Current state of the location history setting. -- **LocationHistoryCloudSync** No content is currently available. -- **LocationHistoryOnTimeline** No content is currently available. +- **LocationHistoryCloudSync** Current state of the location history cloud sync setting. +- **LocationHistoryOnTimeline** Current state of the location history on timeline setting. - **Microphone** Current state of the microphone setting. - **PhoneCall** Current state of the phone call setting. - **PhoneCallHistory** Current state of the call history setting. @@ -2574,28 +2574,28 @@ The following fields are available: ### Microsoft.Windows.Inventory.Core.InventoryApplicationFileAdd -No content is currently available. +This event provides file-level information about the applications that exist on the system. This event is used to understand the applications on a device to determine if those applications will experience compatibility issues when upgrading Windows. This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedeviceinventorychange). The following fields are available: -- **BinaryType** No content is currently available. -- **BinFileVersion** No content is currently available. -- **BinProductVersion** No content is currently available. -- **BoeProgramId** No content is currently available. -- **CompanyName** No content is currently available. -- **FileId** No content is currently available. -- **FileVersion** No content is currently available. -- **InventoryVersion** No content is currently available. -- **Language** No content is currently available. -- **LinkDate** No content is currently available. -- **LowerCaseLongPath** No content is currently available. -- **Name** No content is currently available. -- **ProductName** No content is currently available. -- **ProductVersion** No content is currently available. -- **ProgramId** No content is currently available. -- **Size** No content is currently available. +- **BinaryType** The architecture of the binary (executable) file. +- **BinFileVersion** Version information for the binary (executable) file. +- **BinProductVersion** The product version provided by the binary (executable) file. +- **BoeProgramId** The “bag of evidence” program identifier. +- **CompanyName** The company name included in the binary (executable) file. +- **FileId** A pseudonymized (hashed) unique identifier derived from the file itself. +- **FileVersion** The version of the file. +- **InventoryVersion** The version of the inventory component. +- **Language** The language declared in the binary (executable) file. +- **LinkDate** The compiler link date. +- **LowerCaseLongPath** The file path in “long” format. +- **Name** The file name. +- **ProductName** The product name declared in the binary (executable) file. +- **ProductVersion** The product version declared in the binary (executable) file. +- **ProgramId** The program identifier associated with the binary (executable) file. +- **Size** The size of the binary (executable) file. ### Microsoft.Windows.Inventory.Core.InventoryApplicationFrameworkAdd From d7a06c7cf6a56ebcbc7f249e82b65b597bc6c649 Mon Sep 17 00:00:00 2001 From: Brian Lich Date: Mon, 28 Jan 2019 11:36:37 -0800 Subject: [PATCH 022/724] new build --- .../basic-level-windows-diagnostic-events-and-fields-19H1.md | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/windows/privacy/basic-level-windows-diagnostic-events-and-fields-19H1.md b/windows/privacy/basic-level-windows-diagnostic-events-and-fields-19H1.md index 5675334faa..e54b7bbbad 100644 --- a/windows/privacy/basic-level-windows-diagnostic-events-and-fields-19H1.md +++ b/windows/privacy/basic-level-windows-diagnostic-events-and-fields-19H1.md @@ -9,7 +9,7 @@ ms.pagetype: security localizationpriority: high author: brianlic-msft ms.author: brianlic -ms.date: 01/25/2019 +ms.date: 01/28/2019 --- From 96ab744003029a05fb2d0ea59e3f34af1d22d620 Mon Sep 17 00:00:00 2001 From: Brian Lich Date: Fri, 1 Feb 2019 09:05:09 -0800 Subject: [PATCH 023/724] new build --- ...ndows-diagnostic-events-and-fields-19H1.md | 153 +++++++++++++++--- 1 file changed, 133 insertions(+), 20 deletions(-) diff --git a/windows/privacy/basic-level-windows-diagnostic-events-and-fields-19H1.md b/windows/privacy/basic-level-windows-diagnostic-events-and-fields-19H1.md index e54b7bbbad..feff722d43 100644 --- a/windows/privacy/basic-level-windows-diagnostic-events-and-fields-19H1.md +++ b/windows/privacy/basic-level-windows-diagnostic-events-and-fields-19H1.md @@ -9,7 +9,7 @@ ms.pagetype: security localizationpriority: high author: brianlic-msft ms.author: brianlic -ms.date: 01/28/2019 +ms.date: 02/01/2019 --- @@ -625,6 +625,17 @@ The following fields are available: - **SoftBlock** The file is softblocked in the SDB and has a warning. +### Microsoft.Windows.Appraiser.General.DecisionApplicationFileRemove + +This event indicates Indicates that the DecisionApplicationFile object is no longer present. + +This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedeviceinventorychange). + +The following fields are available: + +- **AppraiserVersion** The version of the Appraiser file that is generating the events. + + ### Microsoft.Windows.Appraiser.General.DecisionApplicationFileStartSync This event indicates that a new set of DecisionApplicationFileAdd events will be sent. @@ -1122,7 +1133,7 @@ The following fields are available: - **AppraiserBranch** The source branch in which the currently running version of Appraiser was built. - **AppraiserProcess** The name of the process that launched Appraiser. - **AppraiserVersion** The version of the Appraiser file generating the events. -- **CensusId** No content is currently available. +- **CensusId** A unique hardware identifier. - **Context** Indicates what mode Appraiser is running in. Example: Setup or Telemetry. - **PCFP** An ID for the system calculated by hashing hardware identifiers. - **Subcontext** Indicates what categories of incompatibilities appraiser is scanning for. Can be N/A, Resolve, or a semicolon-delimited list that can include App, Dev, Sys, Gat, or Rescan. @@ -1773,7 +1784,7 @@ The following fields are available: - **PrimaryDiskTotalCapacity** Retrieves the amount of disk space on the primary disk of the device in MB. - **PrimaryDiskType** Retrieves an enumerator value of type STORAGE_BUS_TYPE that indicates the type of bus to which the device is connected. This should be used to interpret the raw device properties at the end of this structure (if any). -- **StorageReservePassedPolicy** No content is currently available. +- **StorageReservePassedPolicy** Indicates whether the Storage Reserve policy, which ensures that updates have enough disk space and customers are on the latest OS, is enabled on this device. - **SystemVolumeTotalCapacity** Retrieves the size of the partition that the System volume is installed on in MB. @@ -2155,6 +2166,42 @@ The following fields are available: - **pendingDecision** Indicates the cause of reboot, if applicable. +### CbsServicingProvider.CbsQualityUpdateInstall + +No content is currently available. + +The following fields are available: + +- **buildVersion** No content is currently available. +- **clientId** No content is currently available. +- **corruptionHistoryFlags** No content is currently available. +- **corruptionType** No content is currently available. +- **currentStateEnd** No content is currently available. +- **doqTimeSeconds** No content is currently available. +- **executeTimeSeconds** No content is currently available. +- **failureDetails** No content is currently available. +- **failureSourceEnd** No content is currently available. +- **hrStatusEnd** No content is currently available. +- **initiatedOffline** No content is currently available. +- **majorVersion** No content is currently available. +- **minorVersion** No content is currently available. +- **originalState** No content is currently available. +- **overallTimeSeconds** No content is currently available. +- **planTimeSeconds** No content is currently available. +- **poqTimeSeconds** No content is currently available. +- **postRebootTimeSeconds** No content is currently available. +- **preRebootTimeSeconds** No content is currently available. +- **primitiveExecutionContext** No content is currently available. +- **rebootCount** No content is currently available. +- **rebootTimeSeconds** No content is currently available. +- **resolveTimeSeconds** No content is currently available. +- **revisionVersion** No content is currently available. +- **rptTimeSeconds** No content is currently available. +- **shutdownTimeSeconds** No content is currently available. +- **stackRevision** No content is currently available. +- **stageTimeSeconds** No content is currently available. + + ### CbsServicingProvider.CbsSelectableUpdateChangeV2 This event reports the results of enabling or disabling optional Windows Content to keep Windows up to date. @@ -2781,7 +2828,7 @@ The following fields are available: - **COMPID** The device setup class guid of the driver loaded for the device. - **ContainerId** The list of compat ids for the device. - **Description** System-supplied GUID that uniquely groups the functional devices associated with a single-function or multifunction device installed in the computer. -- **DeviceInterfaceClasses** No content is currently available. +- **DeviceInterfaceClasses** The device interfaces that this device implements. - **DeviceState** The device description. - **DriverId** DeviceState is a bitmask of the following: DEVICE_IS_CONNECTED 0x0001 (currently only for container). DEVICE_IS_NETWORK_DEVICE 0x0002 (currently only for container). DEVICE_IS_PAIRED 0x0004 (currently only for container). DEVICE_IS_ACTIVE 0x0008 (currently never set). DEVICE_IS_MACHINE 0x0010 (currently only for container). DEVICE_IS_PRESENT 0x0020 (currently always set). DEVICE_IS_HIDDEN 0x0040. DEVICE_IS_PRINTER 0x0080 (currently only for container). DEVICE_IS_WIRELESS 0x0100. DEVICE_IS_WIRELESS_FAT 0x0200. The most common values are therefore: 32 (0x20)= device is present. 96 (0x60)= device is present but hidden. 288 (0x120)= device is a wireless device that is present - **DriverName** A unique identifier for the driver installed. @@ -3455,6 +3502,28 @@ The following fields are available: ## Other events +### Microsoft.Xbox.XamTelemetry.AppActivity + +This event is triggered whenever the current app state is changed by: launch, switch, terminate, snap, etc. + +The following fields are available: + +- **AppActionId** The ID of the application action. +- **AppCurrentVisibilityState** The ID of the current application visibility state. +- **AppId** The Xbox LIVE Title ID of the app. +- **AppPackageFullName** The full name of the application package. +- **AppPreviousVisibilityState** The ID of the previous application visibility state. +- **AppSessionId** The application session ID. +- **AppType** The type ID of the application (AppType_NotKnown, AppType_Era, AppType_Sra, AppType_Uwa). +- **BCACode** The BCA (Burst Cutting Area) mark code of the optical disc used to launch the application. +- **DurationMs** The amount of time (in milliseconds) since the last application state transition. +- **IsTrialLicense** This boolean value is TRUE if the application is on a trial license. +- **LicenseType** The type of licensed used to authorize the app (0 - Unknown, 1 - User, 2 - Subscription, 3 - Offline, 4 - Disc). +- **LicenseXuid** If the license type is 1 (User), this field contains the XUID (Xbox User ID) of the registered owner of the license. +- **ProductGuid** The Xbox product GUID (Globally-Unique ID) of the application. +- **UserId** The XUID (Xbox User ID) of the current user. + + ### Value This event returns data about Mean Time to Failure (MTTF) for Windows devices. It is the primary means of estimating reliability problems in Basic Diagnostic reporting with very strong privacy guarantees. Since Basic Diagnostic reporting does not include system up-time, and since that information is important to ensuring the safe and stable operation of Windows, the data provided by this event provides that data in a manner which does not threaten a user’s privacy. @@ -3469,6 +3538,36 @@ The following fields are available: - **PertProb** The probability the entry will be Perturbed if the algorithm chosen is “heavy-hitters”. +### WheaProvider.WheaErrorRecord + +No content is currently available. + +The following fields are available: + +- **creatorId** No content is currently available. +- **CreatorId** No content is currently available. +- **errorFlags** No content is currently available. +- **ErrorFlags** No content is currently available. +- **notifyType** No content is currently available. +- **NotifyType** No content is currently available. +- **partitionId** No content is currently available. +- **PartitionId** No content is currently available. +- **platformId** No content is currently available. +- **PlatformId** No content is currently available. +- **record** No content is currently available. +- **Record** No content is currently available. +- **recordId** No content is currently available. +- **RecordId** No content is currently available. +- **sectionFlags** No content is currently available. +- **SectionFlags** No content is currently available. +- **SectionSeverity** No content is currently available. +- **sectionTypes** No content is currently available. +- **SectionTypes** No content is currently available. +- **severityCount** No content is currently available. +- **timeStamp** No content is currently available. +- **TimeStamp** No content is currently available. + + ## Privacy consent logging events ### Microsoft.Windows.Shell.PrivacyConsentLogging.PrivacyConsentCompleted @@ -3512,6 +3611,17 @@ The following fields are available: - **Time** The time the event was fired. +### Microsoft.Windows.Sediment.Info.PhaseChange + +The event indicates progress made by the updater. This information assists in keeping Windows up to date. + +The following fields are available: + +- **NewPhase** The phase of progress made. +- **ReleaseVer** The version information for the component in which the change occurred. +- **Time** The system time at which the phase chance occurred. + + ## Setup events ### SetupPlatformTel.SetupPlatformTelActivityEvent @@ -3828,7 +3938,7 @@ The following fields are available: - **CommonProps** A bitmask for future flags associated with the Windows Update client behavior. No value is currently reported in this field. Expected value for this field is 0. - **CSIErrorType** The stage of CBS installation where it failed. - **CurrentMobileOperator** The mobile operator to which the device is currently connected. -- **DeploymentProviderMode** No content is currently available. +- **DeploymentProviderMode** The mode of operation of the update deployment provider. - **DeviceModel** The device model. - **DriverPingBack** Contains information about the previous driver and system state. - **DriverRecoveryIds** The list of identifiers that could be used for uninstalling the drivers if a recovery is required. @@ -4088,10 +4198,12 @@ The following fields are available: - **PackageCountTotalCanonical** Total number of canonical packages. - **PackageCountTotalDiff** Total number of diff packages. - **PackageCountTotalExpress** Total number of express packages. +- **PackageCountTotalPSFX** No content is currently available. - **PackageExpressType** Type of express package. - **PackageSizeCanonical** Size of canonical packages in bytes. - **PackageSizeDiff** Size of diff packages in bytes. - **PackageSizeExpress** Size of express packages in bytes. +- **PackageSizePSFX** No content is currently available. - **RangeRequestState** Indicates the range request type used. - **RelatedCV** Correlation vector value generated from the latest USO scan. - **Result** Outcome of the download request phase of update. @@ -4106,6 +4218,7 @@ This event collects information regarding the expansion phase of the new Unified The following fields are available: +- **CanonicalRequestedOnError** No content is currently available. - **ElapsedTickCount** Time taken for expand phase. - **EndFreeSpace** Free space after expand phase. - **EndSandboxSize** Sandbox size after expand phase. @@ -4336,7 +4449,7 @@ The following fields are available: - **ResultCode** Result returned by the Facilitator DCAT call. - **Scenario** Dynamic update scenario (Image DU, or Setup DU). - **Type** Type of package that was downloaded. -- **UpdateId** No content is currently available. +- **UpdateId** The ID of the update that was downloaded. ### FacilitatorTelemetry.InitializeDU @@ -4980,9 +5093,9 @@ This event is sent at the beginning of an app install or update to help keep Win The following fields are available: - **CatalogId** The name of the product catalog from which this app was chosen. -- **FulfillmentPluginId** No content is currently available. +- **FulfillmentPluginId** The ID of the plugin needed to install the package type of the product. - **PFN** The Package Family Name of the app that is being installed or updated. -- **PluginTelemetryData** No content is currently available. +- **PluginTelemetryData** Diagnostic information specific to the package-type plug-in. - **ProductId** The product ID of the app that is being updated or installed. @@ -5151,7 +5264,7 @@ The following fields are available: - **bytesFromCDN** The number of bytes received from a CDN source. - **bytesFromGroupPeers** The number of bytes received from a peer in the same domain group. - **bytesFromIntPeers** The number of bytes received from peers not in the same LAN or in the same domain group. -- **bytesFromLinkLocalPeers** No content is currently available. +- **bytesFromLinkLocalPeers** The number of bytes received from local peers. - **bytesFromLocalCache** Bytes copied over from local (on disk) cache. - **bytesFromPeers** The number of bytes received from a peer in the same LAN. - **bytesRequested** The total number of bytes requested for download. @@ -5181,7 +5294,7 @@ The following fields are available: - **lanConnectionCount** The total number of connections made to peers in the same LAN. - **linkLocalConnectionCount** No content is currently available. - **numPeers** The total number of peers used for this download. -- **numPeersLocal** No content is currently available. +- **numPeersLocal** The total number of local peers used for this download. - **predefinedCallerName** The name of the API Caller. - **restrictedUpload** Is the upload restricted? - **routeToCacheServer** The cache server setting, source, and value. @@ -5228,7 +5341,7 @@ The following fields are available: - **doClientVersion** The version of the Delivery Optimization client. - **doErrorCode** The Delivery Optimization error code that was returned. - **downloadMode** The download mode used for this file download session (CdnOnly = 0, Lan = 1, Group = 2, Internet = 3, Simple = 99, Bypass = 100). -- **downloadModeReason** No content is currently available. +- **downloadModeReason** Reason for the download. - **downloadModeSrc** Source of the DownloadMode setting (KvsProvider = 0, GeoProvider = 1, GeoVerProvider = 2, CpProvider = 3, DiscoveryProvider = 4, RegistryProvider = 5, GroupPolicyProvider = 6, MdmProvider = 7, SettingsProvider = 8, InvalidProviderType = 9). - **errorCode** The error code that was returned. - **experimentId** ID used to correlate client/services calls that are part of the same test during A/B testing. @@ -5383,18 +5496,18 @@ The following fields are available: ### Microsoft.Windows.Update.NotificationUx.EnhancedEngagedRebootReminderToast -No content is currently available. +This event indicates that the Enhanced Engaged restart reminder pop-up banner was displayed. The following fields are available: -- **DeviceLocalTime** No content is currently available. -- **ETag** No content is currently available. -- **ExitCode** No content is currently available. -- **RebootVersion** No content is currently available. -- **UpdateId** No content is currently available. -- **UpdateRevision** No content is currently available. -- **UserResponseString** No content is currently available. -- **UtcTime** No content is currently available. +- **DeviceLocalTime** The local time on the device sending the event. +- **ETag** OneSettings versioning value. +- **ExitCode** Indicates how users exited the pop-up banner. +- **RebootVersion** The version of the reboot logic. +- **UpdateId** The ID of the update that is pending restart to finish installation. +- **UpdateRevision** The revision of the update that is pending restart to finish installation. +- **UserResponseString** The option that the user chose in pop-up banner. +- **UtcTime** The time that the pop-up banner was displayed, in Coordinated Universal Time. ### Microsoft.Windows.Update.Orchestrator.ActivityRestrictedByActiveHoursPolicy From 52d04855120793db0365d00d11cee4e7f6b9ecd6 Mon Sep 17 00:00:00 2001 From: Brian Lich Date: Mon, 4 Feb 2019 10:30:35 -0800 Subject: [PATCH 024/724] new build --- ...ndows-diagnostic-events-and-fields-19H1.md | 278 ++++++++++-------- 1 file changed, 153 insertions(+), 125 deletions(-) diff --git a/windows/privacy/basic-level-windows-diagnostic-events-and-fields-19H1.md b/windows/privacy/basic-level-windows-diagnostic-events-and-fields-19H1.md index feff722d43..3c14a15736 100644 --- a/windows/privacy/basic-level-windows-diagnostic-events-and-fields-19H1.md +++ b/windows/privacy/basic-level-windows-diagnostic-events-and-fields-19H1.md @@ -9,7 +9,7 @@ ms.pagetype: security localizationpriority: high author: brianlic-msft ms.author: brianlic -ms.date: 02/01/2019 +ms.date: 02/04/2019 --- @@ -2168,38 +2168,38 @@ The following fields are available: ### CbsServicingProvider.CbsQualityUpdateInstall -No content is currently available. +This event reports on the performance and reliability results of installing Servicing content from Windows Update to keep Windows up to date. The following fields are available: -- **buildVersion** No content is currently available. -- **clientId** No content is currently available. -- **corruptionHistoryFlags** No content is currently available. -- **corruptionType** No content is currently available. -- **currentStateEnd** No content is currently available. -- **doqTimeSeconds** No content is currently available. -- **executeTimeSeconds** No content is currently available. -- **failureDetails** No content is currently available. -- **failureSourceEnd** No content is currently available. -- **hrStatusEnd** No content is currently available. -- **initiatedOffline** No content is currently available. -- **majorVersion** No content is currently available. -- **minorVersion** No content is currently available. -- **originalState** No content is currently available. -- **overallTimeSeconds** No content is currently available. -- **planTimeSeconds** No content is currently available. -- **poqTimeSeconds** No content is currently available. -- **postRebootTimeSeconds** No content is currently available. -- **preRebootTimeSeconds** No content is currently available. -- **primitiveExecutionContext** No content is currently available. -- **rebootCount** No content is currently available. -- **rebootTimeSeconds** No content is currently available. -- **resolveTimeSeconds** No content is currently available. -- **revisionVersion** No content is currently available. -- **rptTimeSeconds** No content is currently available. -- **shutdownTimeSeconds** No content is currently available. -- **stackRevision** No content is currently available. -- **stageTimeSeconds** No content is currently available. +- **buildVersion** The build version number of the update package. +- **clientId** The name of the application requesting the optional content. +- **corruptionHistoryFlags** A bitmask of the types of component store corruption that have caused update failures on the device. +- **corruptionType** An enumeration listing the type of data corruption responsible for the current update failure. +- **currentStateEnd** The final state of the package after the operation has completed. +- **doqTimeSeconds** The time in seconds spent updating drivers. +- **executeTimeSeconds** The number of seconds required to execute the install. +- **failureDetails** The driver or installer that caused the update to fail. +- **failureSourceEnd** An enumeration indicating at what phase of the update a failure occurred. +- **hrStatusEnd** The return code of the install operation. +- **initiatedOffline** A true or false value indicating whether the package was installed into an offline Windows Imaging Format (WIM) file. +- **majorVersion** The major version number of the update package. +- **minorVersion** The minor version number of the update package. +- **originalState** The starting state of the package. +- **overallTimeSeconds** The time (in seconds) to perform the overall servicing operation. +- **planTimeSeconds** The time in seconds required to plan the update operations. +- **poqTimeSeconds** The time in seconds processing file and registry operations. +- **postRebootTimeSeconds** The time (in seconds) to do startup processing for the update. +- **preRebootTimeSeconds** The time (in seconds) between execution of the installation and the reboot. +- **primitiveExecutionContext** An enumeration indicating at what phase of shutdown or startup the update was installed. +- **rebootCount** The number of reboots required to install the update. +- **rebootTimeSeconds** The time (in seconds) before startup processing begins for the update. +- **resolveTimeSeconds** The time in seconds required to resolve the packages that are part of the update. +- **revisionVersion** The revision version number of the update package. +- **rptTimeSeconds** The time in seconds spent executing installer plugins. +- **shutdownTimeSeconds** The time (in seconds) required to do shutdown processing for the update. +- **stackRevision** The revision number of the servicing stack. +- **stageTimeSeconds** The time (in seconds) required to stage all files that are part of the update. ### CbsServicingProvider.CbsSelectableUpdateChangeV2 @@ -2366,75 +2366,75 @@ The following fields are available: ### Microsoft.Windows.Server.FailoverClusteringCritical.ClusterSummary2 -No content is currently available. +This event returns information about how many resources and of what type are in the server cluster. This data is collected to keep Windows Server safe, secure, and up to date. The data includes information about whether hardware is configured correctly, if the software is patched correctly, and assists in preventing crashes by attributing issues (like fatal errors) to workloads and system configurations. The following fields are available: -- **autoAssignSite** No content is currently available. -- **autoBalancerLevel** No content is currently available. -- **autoBalancerMode** No content is currently available. -- **blockCacheSize** No content is currently available. -- **ClusterAdConfiguration** No content is currently available. -- **clusterAdType** No content is currently available. -- **clusterDumpPolicy** No content is currently available. -- **clusterFunctionalLevel** No content is currently available. -- **clusterGuid** No content is currently available. -- **clusterWitnessType** No content is currently available. -- **countNodesInSite** No content is currently available. -- **crossSiteDelay** No content is currently available. -- **crossSiteThreshold** No content is currently available. -- **crossSubnetDelay** No content is currently available. -- **crossSubnetThreshold** No content is currently available. -- **csvCompatibleFilters** No content is currently available. -- **csvIncompatibleFilters** No content is currently available. -- **csvResourceCount** No content is currently available. -- **currentNodeSite** No content is currently available. -- **dasModeBusType** No content is currently available. -- **downLevelNodeCount** No content is currently available. -- **drainOnShutdown** No content is currently available. -- **dynamicQuorumEnabled** No content is currently available. -- **enforcedAntiAffinity** No content is currently available. -- **genAppNames** No content is currently available. -- **genSvcNames** No content is currently available. -- **hangRecoveryAction** No content is currently available. -- **hangTimeOut** No content is currently available. -- **isCalabria** No content is currently available. -- **isMixedMode** No content is currently available. -- **isRunningDownLevel** No content is currently available. -- **logLevel** No content is currently available. -- **logSize** No content is currently available. -- **lowerQuorumPriorityNodeId** No content is currently available. -- **minNeverPreempt** No content is currently available. -- **minPreemptor** No content is currently available. -- **netftIpsecEnabled** No content is currently available. -- **NodeCount** No content is currently available. -- **nodeId** No content is currently available. -- **nodeResourceCounts** No content is currently available. -- **nodeResourceOnlineCounts** No content is currently available. -- **numberOfSites** No content is currently available. -- **numNodesInNoSite** No content is currently available. -- **plumbAllCrossSubnetRoutes** No content is currently available. -- **preferredSite** No content is currently available. -- **privateCloudWitness** No content is currently available. -- **quarantineDuration** No content is currently available. -- **quarantineThreshold** No content is currently available. -- **quorumArbitrationTimeout** No content is currently available. -- **resiliencyLevel** No content is currently available. -- **resourceCounts** No content is currently available. -- **resourceTypeCounts** No content is currently available. -- **resourceTypes** No content is currently available. -- **resourceTypesPath** No content is currently available. -- **sameSubnetDelay** No content is currently available. -- **sameSubnetThreshold** No content is currently available. -- **secondsInMixedMode** No content is currently available. -- **securityLevel** No content is currently available. -- **securityLevelForStorage** No content is currently available. -- **sharedVolumeBlockCacheSize** No content is currently available. -- **shutdownTimeoutMinutes** No content is currently available. -- **upNodeCount** No content is currently available. -- **useClientAccessNetworksForCsv** No content is currently available. -- **vmIsolationTime** No content is currently available. -- **witnessDatabaseWriteTimeout** No content is currently available. +- **autoAssignSite** The cluster parameter: auto site. +- **autoBalancerLevel** The cluster parameter: auto balancer level. +- **autoBalancerMode** The cluster parameter: auto balancer mode. +- **blockCacheSize** The configured size of the block cache. +- **ClusterAdConfiguration** The ad configuration of the cluster. +- **clusterAdType** The cluster parameter: mgmt_point_type. +- **clusterDumpPolicy** The cluster configured dump policy. +- **clusterFunctionalLevel** The current cluster functional level. +- **clusterGuid** The unique identifier for the cluster. +- **clusterWitnessType** The witness type the cluster is configured for. +- **countNodesInSite** The number of nodes in the cluster. +- **crossSiteDelay** The cluster parameter: CrossSiteDelay. +- **crossSiteThreshold** The cluster parameter: CrossSiteThreshold. +- **crossSubnetDelay** The cluster parameter: CrossSubnetDelay. +- **crossSubnetThreshold** The cluster parameter: CrossSubnetThreshold. +- **csvCompatibleFilters** The cluster parameter: ClusterCsvCompatibleFilters. +- **csvIncompatibleFilters** The cluster parameter: ClusterCsvIncompatibleFilters. +- **csvResourceCount** The number of resources in the cluster. +- **currentNodeSite** The name configured for the current site for the cluster. +- **dasModeBusType** The direct storage bus type of the storage spaces. +- **downLevelNodeCount** The number of nodes in the cluster that are running down-level. +- **drainOnShutdown** Specifies whether a node should be drained when it is shut down. +- **dynamicQuorumEnabled** Specifies whether dynamic Quorum has been enabled. +- **enforcedAntiAffinity** The cluster parameter: enforced anti affinity. +- **genAppNames** The win32 service name of a clustered service. +- **genSvcNames** The command line of a clustered genapp. +- **hangRecoveryAction** The cluster parameter: hang recovery action. +- **hangTimeOut** Specifies the “hang time out” parameter for the cluster. +- **isCalabria** Specifies whether storage spaces direct is enabled. +- **isMixedMode** Identifies if the cluster is running with different version of OS for nodes. +- **isRunningDownLevel** Identifies if the current node is running down-level. +- **logLevel** Specifies the granularity that is logged in the cluster log. +- **logSize** Specifies the size of the cluster log. +- **lowerQuorumPriorityNodeId** The cluster parameter: lower quorum priority node ID. +- **minNeverPreempt** The cluster parameter: minimum never preempt. +- **minPreemptor** The cluster parameter: minimum preemptor priority. +- **netftIpsecEnabled** The parameter: netftIpsecEnabled. +- **NodeCount** The number of nodes in the cluster. +- **nodeId** The current node number in the cluster. +- **nodeResourceCounts** Specifies the number of node resources. +- **nodeResourceOnlineCounts** Specifies the number of node resources that are online. +- **numberOfSites** The number of different sites. +- **numNodesInNoSite** The number of nodes not belonging to a site. +- **plumbAllCrossSubnetRoutes** The cluster parameter: plumb all cross subnet routes. +- **preferredSite** The preferred site location. +- **privateCloudWitness** Specifies whether a private cloud witness exists for this cluster. +- **quarantineDuration** The quarantine duration. +- **quarantineThreshold** The quarantine threshold. +- **quorumArbitrationTimeout** In the event of an arbitration event, this specifies the quorum timeout period. +- **resiliencyLevel** Specifies the level of resiliency. +- **resourceCounts** Specifies the number of resources. +- **resourceTypeCounts** Specifies the number of resource types in the cluster. +- **resourceTypes** Data representative of each resource type. +- **resourceTypesPath** Data representative of the DLL path for each resource type. +- **sameSubnetDelay** The cluster parameter: same subnet delay. +- **sameSubnetThreshold** The cluster parameter: same subnet threshold. +- **secondsInMixedMode** The amount of time (in seconds) that the cluster has been in mixed mode (nodes with different operating system versions in the same cluster). +- **securityLevel** The cluster parameter: security level. +- **securityLevelForStorage** The cluster parameter: security level for storage. +- **sharedVolumeBlockCacheSize** Specifies the block cache size for shared for shared volumes. +- **shutdownTimeoutMinutes** Specifies the amount of time it takes to time out when shutting down. +- **upNodeCount** Specifies the number of nodes that are up (online). +- **useClientAccessNetworksForCsv** The cluster parameter: use client access networks for CSV. +- **vmIsolationTime** The cluster parameter: VM isolation time. +- **witnessDatabaseWriteTimeout** Specifies the timeout period for writing to the quorum witness database. ## Fault Reporting events @@ -3568,6 +3568,32 @@ The following fields are available: - **TimeStamp** No content is currently available. +### wilActivity + +This event provides a Windows Internal Library context used for Product and Service diagnostics. + +The following fields are available: + +- **callContext** The function where the failure occurred. +- **currentContextId** The ID of the current call context where the failure occurred. +- **currentContextMessage** The message of the current call context where the failure occurred. +- **currentContextName** The name of the current call context where the failure occurred. +- **failureCount** The number of failures for this failure ID. +- **failureId** The ID of the failure that occurred. +- **failureType** The type of the failure that occurred. +- **fileName** The file name where the failure occurred. +- **function** The function where the failure occurred. +- **hresult** The HResult of the overall activity. +- **hrspult** No content is currently available. +- **lineNumber** The line number where the failure occurred. +- **message** The message of the failure that occurred. +- **module** The module where the failure occurred. +- **originatingContextId** The ID of the originating call context that resulted in the failure. +- **originatingContextMessage** The message of the originating call context that resulted in the failure. +- **originatingContextName** The name of the originating call context that resulted in the failure. +- **threadId** The ID of the thread on which the activity is executing. + + ## Privacy consent logging events ### Microsoft.Windows.Shell.PrivacyConsentLogging.PrivacyConsentCompleted @@ -3764,7 +3790,7 @@ The following fields are available: - **BundleRevisionNumber** Identifies the revision number of the content bundle - **CallerApplicationName** Name provided by the caller who initiated API calls into the software distribution client - **ClientVersion** Version number of the software distribution client -- **DeploymentProviderMode** No content is currently available. +- **DeploymentProviderMode** The mode of operation of the update deployment provider. - **DeviceModel** Device model as defined in the system bios - **EventInstanceID** A globally unique identifier for event instance - **EventScenario** Indicates the purpose of the event - whether because scan started, succeded, failed, etc. @@ -3786,10 +3812,10 @@ Download process event for target update on Windows Update client. See the Event The following fields are available: - **ActiveDownloadTime** Number of seconds the update was actively being downloaded. -- **AppXBlockHashFailures** Indicates the number of blocks that failed hash validation during download of the app payload. +- **AppXBlockHashFailures** No content is currently available. - **AppXBlockHashValidationFailureCount** A count of the number of blocks that have failed validation after being downloaded. - **AppXDownloadScope** Indicates the scope of the download for application content. For streaming install scenarios, AllContent - non-streaming download, RequiredOnly - streaming download requested content required for launch, AutomaticOnly - streaming download requested automatic streams for the app, and Unknown - for events sent before download scope is determined by the Windows Update client. -- **AppXScope** Indicates the scope of the app download. +- **AppXScope** No content is currently available. - **BiosFamily** The family of the BIOS (Basic Input Output System). - **BiosName** The name of the device BIOS. - **BiosReleaseDate** The release date of the device BIOS. @@ -3798,18 +3824,18 @@ The following fields are available: - **BiosVersion** The version of the BIOS. - **BundleBytesDownloaded** Number of bytes downloaded for the specific content bundle. - **BundleId** Identifier associated with the specific content bundle; should not be all zeros if the bundleID was found. -- **BundleRepeatFailCount** Indicates whether this particular update bundle has previously failed. +- **BundleRepeatFailCount** No content is currently available. - **BundleRepeatFailFlag** Indicates whether this particular update bundle previously failed to download. - **BundleRevisionNumber** Identifies the revision number of the content bundle. - **BytesDownloaded** Number of bytes that were downloaded for an individual piece of content (not the entire bundle). - **CallerApplicationName** The name provided by the caller who initiated API calls into the software distribution client. - **CbsDownloadMethod** Indicates whether the download was a full-file download or a partial/delta download. -- **CbsMethod** The method used for downloading the update content related to the Component Based Servicing (CBS) technology. +- **CbsMethod** No content is currently available. - **CDNCountryCode** Two letter country abbreviation for the Content Distribution Network (CDN) location. - **CDNId** ID which defines which CDN the software distribution client downloaded the content from. - **ClientVersion** The version number of the software distribution client. - **CommonProps** A bitmask for future flags associated with the Windows Update client behavior. -- **ConnectTime** Indicates the cumulative amount of time (in seconds) it took to establish the connection for all updates in an update bundle. +- **ConnectTime** No content is currently available. - **CurrentMobileOperator** The mobile operator the device is currently connected to. - **DeviceModel** What is the device model. - **DownloadPriority** Indicates whether a download happened at background, normal, or foreground priority. @@ -3843,7 +3869,7 @@ The following fields are available: - **RegulationReason** The reason that the update is regulated - **RegulationResult** The result code (HResult) of the last attempt to contact the regulation web service for download regulation of update content. - **RelatedCV** The previous Correlation Vector that was used before swapping with a new one. -- **RepeatFailCount** Indicates whether this specific content has previously failed. +- **RepeatFailCount** No content is currently available. - **RepeatFailFlag** Indicates whether this specific piece of content had previously failed to download. - **RevisionNumber** The revision number of the specified piece of content. - **ServiceGuid** An ID that represents which service the software distribution client is installing content for (Windows Update, Windows Store, etc.). @@ -4207,6 +4233,7 @@ The following fields are available: - **RangeRequestState** Indicates the range request type used. - **RelatedCV** Correlation vector value generated from the latest USO scan. - **Result** Outcome of the download request phase of update. +- **SandboxTaggedForReserves** No content is currently available. - **ScenarioId** Indicates the update scenario. - **SessionId** Unique value for each attempt (same value for initialize, download, install commit phases). - **UpdateId** Unique ID for each update. @@ -5282,6 +5309,7 @@ The following fields are available: - **downloadModeReason** Reason for the download. - **downloadModeSrc** Source of the DownloadMode setting (KvsProvider = 0, GeoProvider = 1, GeoVerProvider = 2, CpProvider = 3, DiscoveryProvider = 4, RegistryProvider = 5, GroupPolicyProvider = 6, MdmProvider = 7, SettingsProvider = 8, InvalidProviderType = 9). - **experimentId** When running a test, this is used to correlate with other events that are part of the same test. +- **expiresAt** No content is currently available. - **fileID** The ID of the file being downloaded. - **fileSize** The size of the file being downloaded. - **gCurMemoryStreamBytes** Current usage for memory streaming. @@ -5630,7 +5658,7 @@ The following fields are available: - **EventPublishedTime** Time when this event was generated. - **flightID** The specific ID of the Windows Insider build. -- **inapplicableReason** No content is currently available. +- **inapplicableReason** The reason why the update is inapplicable. - **revisionNumber** Update revision number. - **updateId** Unique Windows Update ID. - **updateScenarioType** Update session type. @@ -6037,12 +6065,12 @@ No content is currently available. ### Microsoft.Windows.UpdateReserveManager.CommitPendingHardReserveAdjustment -No content is currently available. +This event is sent when the Update Reserve Manager commits a hard reserve adjustment that was pending. The following fields are available: -- **FinalAdjustment** No content is currently available. -- **InitialAdjustment** No content is currently available. +- **FinalAdjustment** Final adjustment for the hard reserve following the addition or removal of optional content. +- **InitialAdjustment** Initial intended adjustment for the hard reserve following the addition or removal of optional content. ### Microsoft.Windows.UpdateReserveManager.EndScenario @@ -6061,15 +6089,15 @@ The following fields are available: ### Microsoft.Windows.UpdateReserveManager.FunctionReturnedError -No content is currently available. +This event is sent when the Update Reserve Manager returns an error from one of its internal functions. The following fields are available: -- **FailedExpression** No content is currently available. -- **FailedFile** No content is currently available. -- **FailedFunction** No content is currently available. -- **FailedLine** No content is currently available. -- **ReturnCode** No content is currently available. +- **FailedExpression** The failed expression that was returned. +- **FailedFile** The binary file that contained the failed function. +- **FailedFunction** The name of the function that originated the failure. +- **FailedLine** The line number of the failure. +- **ReturnCode** The return code of the function. ### Microsoft.Windows.UpdateReserveManager.InitializeReserves @@ -6105,22 +6133,22 @@ This event returns data about the Update Reserve Manager, including whether it The following fields are available: -- **ClientId** No content is currently available. -- **Flags** No content is currently available. -- **FlightId** No content is currently available. -- **Offline** No content is currently available. -- **PolicyPassed** No content is currently available. -- **ReturnCode** No content is currently available. +- **ClientId** The ID of the caller application. +- **Flags** The enumerated flags used to initialize the manager. +- **FlightId** The flight ID of the content the calling client is currently operating with. +- **Offline** Indicates whether or the reserve manager is called during offline operations. +- **PolicyPassed** Indicates whether the machine is able to use reserves. +- **ReturnCode** Return code of the operation. - **Version** No content is currently available. ### Microsoft.Windows.UpdateReserveManager.PrepareTIForReserveInitialization -No content is currently available. +This event is sent when the Update Reserve Manager prepares the Trusted Installer to initialize reserves on the next boot. The following fields are available: -- **Flags** No content is currently available. +- **Flags** The flags that are passed to the function to prepare the Trusted Installer for reserve initialization. ### Microsoft.Windows.UpdateReserveManager.ReevaluatePolicy @@ -6136,7 +6164,7 @@ The following fields are available: ### Microsoft.Windows.UpdateReserveManager.RemovePendingHardReserveAdjustment -No content is currently available. +This event is sent when the Update Reserve Manager removes a pending hard reserve adjustment. @@ -6155,9 +6183,9 @@ No content is currently available. The following fields are available: -- **ChangeSize** No content is currently available. -- **PendingHardReserveAdjustment** No content is currently available. -- **UpdateType** No content is currently available. +- **ChangeSize** The change in the hard reserve size based on the addition or removal of optional content. +- **PendingHardReserveAdjustment** The final change to the hard reserve size. +- **UpdateType** Indicates whether the change is an increase or decrease in the size of the hard reserve. ## Winlogon events From 7fba077da2a1231a84cd1f7df3eb213dafe58a1c Mon Sep 17 00:00:00 2001 From: Brian Lich Date: Tue, 5 Feb 2019 08:44:22 -0800 Subject: [PATCH 025/724] new build --- ...ndows-diagnostic-events-and-fields-19H1.md | 20 +++++++++---------- 1 file changed, 10 insertions(+), 10 deletions(-) diff --git a/windows/privacy/basic-level-windows-diagnostic-events-and-fields-19H1.md b/windows/privacy/basic-level-windows-diagnostic-events-and-fields-19H1.md index 3c14a15736..84c660017a 100644 --- a/windows/privacy/basic-level-windows-diagnostic-events-and-fields-19H1.md +++ b/windows/privacy/basic-level-windows-diagnostic-events-and-fields-19H1.md @@ -9,7 +9,7 @@ ms.pagetype: security localizationpriority: high author: brianlic-msft ms.author: brianlic -ms.date: 02/04/2019 +ms.date: 02/05/2019 --- @@ -3812,10 +3812,10 @@ Download process event for target update on Windows Update client. See the Event The following fields are available: - **ActiveDownloadTime** Number of seconds the update was actively being downloaded. -- **AppXBlockHashFailures** No content is currently available. +- **AppXBlockHashFailures** Indicates the number of blocks that failed hash validation during download of the app payload. - **AppXBlockHashValidationFailureCount** A count of the number of blocks that have failed validation after being downloaded. - **AppXDownloadScope** Indicates the scope of the download for application content. For streaming install scenarios, AllContent - non-streaming download, RequiredOnly - streaming download requested content required for launch, AutomaticOnly - streaming download requested automatic streams for the app, and Unknown - for events sent before download scope is determined by the Windows Update client. -- **AppXScope** No content is currently available. +- **AppXScope** Indicates the scope of the app download. - **BiosFamily** The family of the BIOS (Basic Input Output System). - **BiosName** The name of the device BIOS. - **BiosReleaseDate** The release date of the device BIOS. @@ -3824,18 +3824,18 @@ The following fields are available: - **BiosVersion** The version of the BIOS. - **BundleBytesDownloaded** Number of bytes downloaded for the specific content bundle. - **BundleId** Identifier associated with the specific content bundle; should not be all zeros if the bundleID was found. -- **BundleRepeatFailCount** No content is currently available. +- **BundleRepeatFailCount** Indicates whether this particular update bundle has previously failed. - **BundleRepeatFailFlag** Indicates whether this particular update bundle previously failed to download. - **BundleRevisionNumber** Identifies the revision number of the content bundle. - **BytesDownloaded** Number of bytes that were downloaded for an individual piece of content (not the entire bundle). - **CallerApplicationName** The name provided by the caller who initiated API calls into the software distribution client. - **CbsDownloadMethod** Indicates whether the download was a full-file download or a partial/delta download. -- **CbsMethod** No content is currently available. +- **CbsMethod** The method used for downloading the update content related to the Component Based Servicing (CBS) technology. - **CDNCountryCode** Two letter country abbreviation for the Content Distribution Network (CDN) location. - **CDNId** ID which defines which CDN the software distribution client downloaded the content from. - **ClientVersion** The version number of the software distribution client. - **CommonProps** A bitmask for future flags associated with the Windows Update client behavior. -- **ConnectTime** No content is currently available. +- **ConnectTime** Indicates the cumulative amount of time (in seconds) it took to establish the connection for all updates in an update bundle. - **CurrentMobileOperator** The mobile operator the device is currently connected to. - **DeviceModel** What is the device model. - **DownloadPriority** Indicates whether a download happened at background, normal, or foreground priority. @@ -3869,7 +3869,7 @@ The following fields are available: - **RegulationReason** The reason that the update is regulated - **RegulationResult** The result code (HResult) of the last attempt to contact the regulation web service for download regulation of update content. - **RelatedCV** The previous Correlation Vector that was used before swapping with a new one. -- **RepeatFailCount** No content is currently available. +- **RepeatFailCount** Indicates whether this specific content has previously failed. - **RepeatFailFlag** Indicates whether this specific piece of content had previously failed to download. - **RevisionNumber** The revision number of the specified piece of content. - **ServiceGuid** An ID that represents which service the software distribution client is installing content for (Windows Update, Windows Store, etc.). @@ -4233,7 +4233,7 @@ The following fields are available: - **RangeRequestState** Indicates the range request type used. - **RelatedCV** Correlation vector value generated from the latest USO scan. - **Result** Outcome of the download request phase of update. -- **SandboxTaggedForReserves** No content is currently available. +- **SandboxTaggedForReserves** The sandbox for reserves. - **ScenarioId** Indicates the update scenario. - **SessionId** Unique value for each attempt (same value for initialize, download, install commit phases). - **UpdateId** Unique ID for each update. @@ -6139,7 +6139,7 @@ The following fields are available: - **Offline** Indicates whether or the reserve manager is called during offline operations. - **PolicyPassed** Indicates whether the machine is able to use reserves. - **ReturnCode** Return code of the operation. -- **Version** No content is currently available. +- **Version** The version of the Update Reserve Manager. ### Microsoft.Windows.UpdateReserveManager.PrepareTIForReserveInitialization @@ -6179,7 +6179,7 @@ The following fields are available: ### Microsoft.Windows.UpdateReserveManager.UpdatePendingHardReserveAdjustment -No content is currently available. +This event is sent when the Update Reserve Manager needs to adjust the size of the hard reserve after the option content is installed. The following fields are available: From 42fc5689fb6b83944eb5facbe9717f16e6bde48e Mon Sep 17 00:00:00 2001 From: Brian Lich Date: Wed, 6 Feb 2019 08:39:31 -0800 Subject: [PATCH 026/724] new build --- ...ndows-diagnostic-events-and-fields-19H1.md | 496 ++++++++++++------ 1 file changed, 337 insertions(+), 159 deletions(-) diff --git a/windows/privacy/basic-level-windows-diagnostic-events-and-fields-19H1.md b/windows/privacy/basic-level-windows-diagnostic-events-and-fields-19H1.md index 84c660017a..77792963db 100644 --- a/windows/privacy/basic-level-windows-diagnostic-events-and-fields-19H1.md +++ b/windows/privacy/basic-level-windows-diagnostic-events-and-fields-19H1.md @@ -9,7 +9,7 @@ ms.pagetype: security localizationpriority: high author: brianlic-msft ms.author: brianlic -ms.date: 02/05/2019 +ms.date: 02/06/2019 --- @@ -81,6 +81,16 @@ The following fields are available: - **txId** The unique identifier for the current CSP transaction. +### Microsoft.Windows.Security.AppLockerCSP.CAppLockerCSP::Rollback + +Result of the 'Rollback' operation in AppLockerCSP. + +The following fields are available: + +- **oldId** Previous id for the CSP transaction. +- **txId** Current id for the CSP transaction. + + ### Microsoft.Windows.Security.AppLockerCSP.ClearParams Parameters passed to the "Clear" operation for AppLockerCSP. @@ -90,6 +100,21 @@ The following fields are available: - **uri** The URI relative to the %SYSTEM32%\AppLocker folder. +### Microsoft.Windows.Security.AppLockerCSP.ClearStart + +Start of the "Clear" operation for the AppLockerCSP Node. + + + +### Microsoft.Windows.Security.AppLockerCSP.ClearStop + +End of the "Clear" operation for the AppLockerCSP node. + +The following fields are available: + +- **hr** HRESULT reported at the end of the 'Clear' function. + + ### Microsoft.Windows.Security.AppLockerCSP.ConfigManagerNotificationStart Start of the "ConfigManagerNotification" operation for AppLockerCSP. @@ -144,6 +169,21 @@ The following fields are available: - **uri** URI relative to %SYSTEM32%\AppLocker. +### Microsoft.Windows.Security.AppLockerCSP.DeleteChildStart + +Start of the "DeleteChild" operation for the AppLockerCSP node. + + + +### Microsoft.Windows.Security.AppLockerCSP.DeleteChildStop + +End of the "DeleteChild" operation for the AppLockerCSP node. + +The following fields are available: + +- **hr** HRESULT returned by the DeleteChild function in AppLockerCSP. + + ### Microsoft.Windows.Security.AppLockerCSP.EnumPolicies Logged URI relative to %SYSTEM32%\AppLocker, if the Plugin GUID is null, or the CSP doesn't believe the old policy is present. @@ -2239,6 +2279,43 @@ The following fields are available: ## Diagnostic data events +### TelClientSynthetic.AuthorizationInfo_RuntimeTransition + +This event sends data indicating that a device has undergone a change of telemetry opt-in level detected at UTC startup, to help keep Windows up to date. The telemetry opt-in level signals what data we are allowed to collect. + +The following fields are available: + +- **CanAddMsaToMsTelemetry** True if we can add MSA PUID and CID to telemetry, false otherwise. +- **CanCollectAnyTelemetry** True if we are allowed to collect partner telemetry, false otherwise. +- **CanCollectCoreTelemetry** True if we can collect CORE/Basic telemetry, false otherwise. +- **CanCollectHeartbeats** True if we can collect heartbeat telemetry, false otherwise. +- **CanCollectOsTelemetry** True if we can collect diagnostic data telemetry, false otherwise. +- **CanCollectWindowsAnalyticsEvents** True if we can collect Windows Analytics data, false otherwise. +- **CanPerformDiagnosticEscalations** True if we can perform diagnostic escalation collection, false otherwise. +- **CanReportScenarios** True if we can report scenario completions, false otherwise. +- **PreviousPermissions** Bitmask of previous telemetry state. +- **TransitionFromEverythingOff** True if we are transitioning from all telemetry being disabled, false otherwise. + + +### TelClientSynthetic.AuthorizationInfo_Startup + +Fired by UTC at startup to signal what data we are allowed to collect. + +The following fields are available: + +- **CanAddMsaToMsTelemetry** True if we can add MSA PUID and CID to telemetry, false otherwise. +- **CanCollectAnyTelemetry** True if we are allowed to collect partner telemetry, false otherwise. +- **CanCollectCoreTelemetry** True if we can collect CORE/Basic telemetry, false otherwise. +- **CanCollectHeartbeats** True if we can collect heartbeat telemetry, false otherwise. +- **CanCollectOsTelemetry** True if we can collect diagnostic data telemetry, false otherwise. +- **CanCollectWindowsAnalyticsEvents** True if we can collect Windows Analytics data, false otherwise. +- **CanPerformDiagnosticEscalations** True if we can perform diagnostic escalation collection, false otherwise. +- **CanPerformTraceEscalations** True if we can perform trace escalation collection, false otherwise. +- **CanReportScenarios** True if we can report scenario completions, false otherwise. +- **PreviousPermissions** Bitmask of previous telemetry state. +- **TransitionFromEverythingOff** True if we are transitioning from all telemetry being disabled, false otherwise. + + ### TelClientSynthetic.ConnectivityHeartBeat_0 This event sends data about the connectivity status of the Connected User Experience and Telemetry component that uploads telemetry events. If an unrestricted free network (such as Wi-Fi) is available, this event updates the last successful upload time. Otherwise, it checks whether a Connectivity Heartbeat event was fired in the past 24 hours, and if not, it fires an event. A Connectivity Heartbeat event also fires when a device recovers from costed network to free network. @@ -2254,6 +2331,22 @@ The following fields are available: - **RestrictedNetworkTime** Retrieves the time spent on a metered (cost restricted) network in seconds. +### TelClientSynthetic.EventMonitor_0 + +No content is currently available. + +The following fields are available: + +- **ConsumerCount** No content is currently available. +- **EventName** No content is currently available. +- **EventSnFirst** No content is currently available. +- **EventSnLast** No content is currently available. +- **EventStoreCount** No content is currently available. +- **MonitorSn** No content is currently available. +- **TriggerCount** No content is currently available. +- **UploadedCount** No content is currently available. + + ### TelClientSynthetic.HeartBeat_5 This event sends data about the health and quality of the diagnostic data from the given device, to help keep Windows up to date. It also enables data analysts to determine how 'trusted' the data is from a given device. @@ -2558,7 +2651,7 @@ This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedevic The following fields are available: - **CatalogSigners** Signers from catalog. Each signer starts with Chain. -- **DigestAlgorithm** No content is currently available. +- **DigestAlgorithm** The pseudonymizing (hashing) algorithm used when the file or package was signed. - **DriverPackageStrongName** Optional. Available only if FileSigningInfo is collected on a driver package. - **EmbeddedSigners** Embedded signers. Each signer starts with Chain. - **FileName** The file name of the file whose signatures are listed. @@ -2702,7 +2795,6 @@ The following fields are available: - **Categories** A comma separated list of functional categories in which the container belongs. - **DiscoveryMethod** The discovery method for the device container. - **FriendlyName** The name of the device container. -- **Icon** No content is currently available. - **InventoryVersion** The version of the inventory file generating the events. - **IsActive** Is the device connected, or has it been seen in the last 14 days? - **IsConnected** For a physically attached device, this value is the same as IsPresent. For wireless a device, this value represents a communication link. @@ -3354,7 +3446,7 @@ The following fields are available: ### Microsoft.Windows.Inventory.Indicators.InventoryMiscellaneousUexIndicatorEndSync -No content is currently available. +This event indicates that a new set of InventoryMiscellaneousUexIndicatorAdd events has been sent. This data helps ensure the device is up to date. This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedeviceinventorychange). @@ -3380,7 +3472,7 @@ This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedevic ### Microsoft.Windows.IoT.Client.CEPAL.MonitorStarted -No content is currently available. +This event identifies Windows Internet of Things (IoT) devices which are running the CE PAL subsystem by sending data during CE PAL startup. @@ -3430,77 +3522,164 @@ The following fields are available: ### Microsoft.Windows.Cast.Miracast.MiracastSessionEnd +This event sends data at the end of a Miracast session that helps determine RTSP related Miracast failures along with some statistics about the session + +The following fields are available: + +- **AudioChannelCount** The number of audio channels. +- **AudioSampleRate** The sample rate of audio in terms of samples per second. +- **AudioSubtype** The unique subtype identifier of the audio codec (encoding method) used for audio encoding. +- **AverageBitrate** The average video bitrate used during the Miracast session, in bits per second. +- **AverageDataRate** The average available bandwidth reported by the WiFi driver during the Miracast session, in bits per second. +- **AveragePacketSendTimeInMs** The average time required for the network to send a sample, in milliseconds. +- **ConnectorType** The type of connector used during the Miracast session. +- **EncodeAverageTimeMS** The average time to encode a frame of video, in milliseconds. +- **EncodeCount** The count of total frames encoded in the session. +- **EncodeMaxTimeMS** The maximum time to encode a frame, in milliseconds. +- **EncodeMinTimeMS** The minimum time to encode a frame, in milliseconds. +- **EncoderCreationTimeInMs** The time required to create the video encoder, in milliseconds. +- **ErrorSource** Identifies the component that encountered an error that caused a disconnect, if applicable. +- **FirstFrameTime** The time (tick count) when the first frame is sent. +- **FirstLatencyMode** The first latency mode. +- **FrameAverageTimeMS** Average time to process an entire frame, in milliseconds. +- **FrameCount** The total number of frames processed. +- **FrameMaxTimeMS** The maximum time required to process an entire frame, in milliseconds. +- **FrameMinTimeMS** The minimum time required to process an entire frame, in milliseconds. +- **Glitches** The number of frames that failed to be delivered on time. +- **HardwareCursorEnabled** Indicates if hardware cursor was enabled when the connection ended. +- **HDCPState** The state of HDCP (High-bandwidth Digital Content Protection) when the connection ended. +- **HighestBitrate** The highest video bitrate used during the Miracast session, in bits per second. +- **HighestDataRate** The highest available bandwidth reported by the WiFi driver, in bits per second. +- **LastLatencyMode** The last reported latency mode. +- **LogTimeReference** The reference time, in tick counts. +- **LowestBitrate** The lowest video bitrate used during the Miracast session, in bits per second. +- **LowestDataRate** The lowest video bitrate used during the Miracast session, in bits per second. +- **MediaErrorCode** The error code reported by the media session, if applicable. +- **MiracastEntry** The time (tick count) when the Miracast driver was first loaded. +- **MiracastM1** The time (tick count) when the M1 request was sent. +- **MiracastM2** The time (tick count) when the M2 request was sent. +- **MiracastM3** The time (tick count) when the M3 request was sent. +- **MiracastM4** The time (tick count) when the M4 request was sent. +- **MiracastM5** The time (tick count) when the M5 request was sent. +- **MiracastM6** The time (tick count) when the M6 request was sent. +- **MiracastM7** The time (tick count) when the M7 request was sent. +- **MiracastSessionState** The state of the Miracast session when the connection ended. +- **MiracastStreaming** The time (tick count) when the Miracast session first started processing frames. +- **ProfileCount** The count of profiles generated from the receiver M4 response. +- **ProfileCountAfterFiltering** The count of profiles after filtering based on available bandwidth and encoder capabilities. +- **RefreshRate** The refresh rate set on the remote display. +- **RotationSupported** Indicates if the Miracast receiver supports display rotation. +- **RTSPSessionId** The unique identifier of the RTSP session. This matches the RTSP session ID for the receiver for the same session. +- **SessionGuid** The unique identifier of to correlate various Miracast events from a session. +- **SinkHadEdid** Indicates if the Miracast receiver reported an EDID. +- **SupportMicrosoftColorSpaceConversion** Indicates whether the Microsoft color space conversion for extra color fidelity is supported by the receiver. +- **SupportsMicrosoftDiagnostics** Indicates whether the Miracast receiver supports the Microsoft Diagnostics Miracast extension. +- **SupportsMicrosoftFormatChange** Indicates whether the Miracast receiver supports the Microsoft Format Change Miracast extension. +- **SupportsMicrosoftLatencyManagement** Indicates whether the Miracast receiver supports the Microsoft Latency Management Miracast extension. +- **SupportsMicrosoftRTCP** Indicates whether the Miracast receiver supports the Microsoft RTCP Miracast extension. +- **SupportsMicrosoftVideoFormats** Indicates whether the Miracast receiver supports Microsoft video format for 3:2 resolution. +- **SupportsWiDi** Indicates whether Miracast receiver supports Intel WiDi extensions. +- **TeardownErrorCode** The error code reason for teardown provided by the receiver, if applicable. +- **TeardownErrorReason** The text string reason for teardown provided by the receiver, if applicable. +- **UIBCEndState** Indicates whether UIBC was enabled when the connection ended. +- **UIBCEverEnabled** Indicates whether UIBC was ever enabled. +- **UIBCStatus** The result code reported by the UIBC setup process. +- **VideoBitrate** The starting bitrate for the video encoder. +- **VideoCodecLevel** The encoding level used for encoding, specific to the video subtype. +- **VideoHeight** The height of encoded video frames. +- **VideoSubtype** The unique subtype identifier of the video codec (encoding method) used for video encoding. +- **VideoWidth** The width of encoded video frames. +- **WFD2Supported** Indicates if the Miracast receiver supports WFD2 protocol. + + +## Other events + +### Microsoft.Windows.SysReset.FlightUninstallCancel + +No content is currently available. + + + +### Microsoft.Windows.SysReset.FlightUninstallError + No content is currently available. The following fields are available: -- **AudioChannelCount** No content is currently available. -- **AudioSampleRate** No content is currently available. -- **AudioSubtype** No content is currently available. -- **AverageBitrate** No content is currently available. -- **AverageDataRate** No content is currently available. -- **AveragePacketSendTimeInMs** No content is currently available. -- **ConnectorType** No content is currently available. -- **EncodeAverageTimeMS** No content is currently available. -- **EncodeCount** No content is currently available. -- **EncodeMaxTimeMS** No content is currently available. -- **EncodeMinTimeMS** No content is currently available. -- **EncoderCreationTimeInMs** No content is currently available. -- **ErrorSource** No content is currently available. -- **FirstFrameTime** No content is currently available. -- **FirstLatencyMode** No content is currently available. -- **FrameAverageTimeMS** No content is currently available. -- **FrameCount** No content is currently available. -- **FrameMaxTimeMS** No content is currently available. -- **FrameMinTimeMS** No content is currently available. -- **Glitches** No content is currently available. -- **HardwareCursorEnabled** No content is currently available. -- **HDCPState** No content is currently available. -- **HighestBitrate** No content is currently available. -- **HighestDataRate** No content is currently available. -- **LastLatencyMode** No content is currently available. -- **LogTimeReference** No content is currently available. -- **LowestBitrate** No content is currently available. -- **LowestDataRate** No content is currently available. -- **MediaErrorCode** No content is currently available. -- **MiracastEntry** No content is currently available. -- **MiracastM1** No content is currently available. -- **MiracastM2** No content is currently available. -- **MiracastM3** No content is currently available. -- **MiracastM4** No content is currently available. -- **MiracastM5** No content is currently available. -- **MiracastM6** No content is currently available. -- **MiracastM7** No content is currently available. -- **MiracastSessionState** No content is currently available. -- **MiracastStreaming** No content is currently available. -- **ProfileCount** No content is currently available. -- **ProfileCountAfterFiltering** No content is currently available. -- **RefreshRate** No content is currently available. -- **RotationSupported** No content is currently available. -- **RTSPSessionId** No content is currently available. -- **SessionGuid** No content is currently available. -- **SinkHadEdid** No content is currently available. -- **SupportMicrosoftColorSpaceConversion** No content is currently available. -- **SupportsMicrosoftDiagnostics** No content is currently available. -- **SupportsMicrosoftFormatChange** No content is currently available. -- **SupportsMicrosoftLatencyManagement** No content is currently available. -- **SupportsMicrosoftRTCP** No content is currently available. -- **SupportsMicrosoftVideoFormats** No content is currently available. -- **SupportsWiDi** No content is currently available. -- **TeardownErrorCode** No content is currently available. -- **TeardownErrorReason** No content is currently available. -- **UIBCEndState** No content is currently available. -- **UIBCEverEnabled** No content is currently available. -- **UIBCStatus** No content is currently available. -- **VideoBitrate** No content is currently available. -- **VideoCodecLevel** No content is currently available. -- **VideoHeight** No content is currently available. -- **VideoSubtype** No content is currently available. -- **VideoWidth** No content is currently available. -- **WFD2Supported** No content is currently available. +- **ErrorCode** No content is currently available. -## Other events +### Microsoft.Windows.SysReset.FlightUninstallReboot + +No content is currently available. + + + +### Microsoft.Windows.SysReset.FlightUninstallStart + +No content is currently available. + + + +### Microsoft.Windows.SysReset.FlightUninstallUnavailable + +No content is currently available. + +The following fields are available: + +- **AddedProfiles** No content is currently available. +- **MissingExternalStorage** No content is currently available. +- **MissingInfra** No content is currently available. +- **MovedProfiles** No content is currently available. + + +### Microsoft.Windows.SysReset.HasPendingActions + +No content is currently available. + + + +### Microsoft.Windows.SysReset.PBREngineInitFailed + +No content is currently available. + +The following fields are available: + +- **Operation** No content is currently available. + + +### Microsoft.Windows.SysReset.PBREngineInitSucceed + +No content is currently available. + +The following fields are available: + +- **Operation** No content is currently available. + + +### Microsoft.Windows.SysReset.PBRFailedOffline + +No content is currently available. + +The following fields are available: + +- **HRESULT** No content is currently available. +- **PBRType** No content is currently available. +- **SessionID** No content is currently available. + + +### Microsoft.Xbox.XamTelemetry.AppActivationError + +This event indicates whether the system detected an activation error in the app. + +The following fields are available: + +- **ActivationUri** Activation URI (Uniform Resource Identifier) used in the attempt to activate the app. +- **AppId** The Xbox LIVE Title ID. +- **AppUserModelId** The AUMID (Application User Model ID) of the app to activate. +- **Result** The HResult error. +- **UserId** The Xbox LIVE User ID (XUID). + ### Microsoft.Xbox.XamTelemetry.AppActivity @@ -3540,32 +3719,32 @@ The following fields are available: ### WheaProvider.WheaErrorRecord -No content is currently available. +This event collects data about common platform hardware error recorded by the Windows Hardware Error Architecture (WHEA) mechanism. The following fields are available: -- **creatorId** No content is currently available. -- **CreatorId** No content is currently available. -- **errorFlags** No content is currently available. -- **ErrorFlags** No content is currently available. -- **notifyType** No content is currently available. -- **NotifyType** No content is currently available. -- **partitionId** No content is currently available. -- **PartitionId** No content is currently available. -- **platformId** No content is currently available. -- **PlatformId** No content is currently available. -- **record** No content is currently available. -- **Record** No content is currently available. -- **recordId** No content is currently available. -- **RecordId** No content is currently available. -- **sectionFlags** No content is currently available. -- **SectionFlags** No content is currently available. -- **SectionSeverity** No content is currently available. -- **sectionTypes** No content is currently available. -- **SectionTypes** No content is currently available. -- **severityCount** No content is currently available. -- **timeStamp** No content is currently available. -- **TimeStamp** No content is currently available. +- **creatorId** The unique identifier for the entity that created the error record. +- **CreatorId** The unique identifier for the entity that created the error record. +- **errorFlags** Any flags set on the error record. +- **ErrorFlags** Any flags set on the error record. +- **notifyType** The unique identifier for the notification mechanism which reported the error to the operating system. +- **NotifyType** The unique identifier for the notification mechanism which reported the error to the operating system. +- **partitionId** The unique identifier for the partition on which the hardware error occurred. +- **PartitionId** The unique identifier for the partition on which the hardware error occurred. +- **platformId** The unique identifier for the platform on which the hardware error occurred. +- **PlatformId** The unique identifier for the platform on which the hardware error occurred. +- **record** A collection of binary data containing the full error record. +- **Record** A collection of binary data containing the full error record. +- **recordId** The identifier of the error record. +- **RecordId** The identifier of the error record. +- **sectionFlags** The flags for each section recorded in the error record. +- **SectionFlags** The flags for each section recorded in the error record. +- **SectionSeverity** The severity of each individual section. +- **sectionTypes** The unique identifier that represents the type of sections contained in the error record. +- **SectionTypes** The unique identifier that represents the type of sections contained in the error record. +- **severityCount** The severity of each individual section. +- **timeStamp** The error time stamp as recorded in the error record. +- **TimeStamp** The error time stamp as recorded in the error record. ### wilActivity @@ -3584,7 +3763,6 @@ The following fields are available: - **fileName** The file name where the failure occurred. - **function** The function where the failure occurred. - **hresult** The HResult of the overall activity. -- **hrspult** No content is currently available. - **lineNumber** The line number where the failure occurred. - **message** The message of the failure that occurred. - **module** The module where the failure occurred. @@ -4028,7 +4206,7 @@ The following fields are available: - **ClientVersion** Version number of the software distribution client. - **CommonProps** A bitmask for future flags associated with the Windows Update client behavior. There is no value being reported in this field right now. Expected value for this field is 0. - **CSIErrorType** Stage of CBS installation that failed. -- **DeploymentProviderMode** No content is currently available. +- **DeploymentProviderMode** The mode of operation of the update deployment provider. - **DriverPingBack** Contains information about the previous driver and system state. - **DriverRecoveryIds** The list of identifiers that could be used for uninstalling the drivers if a recovery is required. - **EventInstanceID** A globally unique identifier for event instance. @@ -4072,7 +4250,7 @@ The following fields are available: - **CmdLineArgs** Command line arguments passed in by the caller. - **EventInstanceID** A globally unique identifier for the event instance. - **EventScenario** Indicates the purpose of the event (scan started, succeeded, failed, etc.). -- **Mode** No content is currently available. +- **Mode** Indicates the mode that has started. - **ServiceGuid** Identifier for the service to which the software distribution client is connecting (Windows Update, Microsoft Store, etc.). - **StatusCode** Result code of the event (success, cancellation, failure code HResult). - **WUDeviceID** Unique device ID controlled by the software distribution client. @@ -4090,7 +4268,7 @@ The following fields are available: - **CallerApplicationName** Name of the application making the Windows Update request. Used to identify context of request. - **ClientVersion** Version number of the software distribution client. - **CommonProps** A bitmask for future flags associated with the Windows Update client behavior. There is no value being reported in this field right now. Expected value for this field is 0. -- **DeploymentProviderMode** No content is currently available. +- **DeploymentProviderMode** The mode of operation of the Update Deployment Provider. - **DriverPingBack** Contains information about the previous driver and system state. - **DriverRecoveryIds** The list of identifiers that could be used for uninstalling the drivers when a recovery is required. - **EventInstanceID** A globally unique identifier for event instance. @@ -4792,20 +4970,20 @@ Result of the WaaSMedic operation. The following fields are available: - **callerApplication** The name of the calling application. -- **capsuleCount** No content is currently available. -- **capsuleFailureCount** No content is currently available. +- **capsuleCount** The number of Sediment Pack capsules. +- **capsuleFailureCount** The number of capsule failures. - **detectionSummary** Result of each applicable detection that was run. - **featureAssessmentImpact** WaaS Assessment impact for feature updates. -- **hrEngineBlockReason** No content is currently available. +- **hrEngineBlockReason** Indicates the reason for stopping WaaSMedic. - **hrEngineResult** Error code from the engine operation. -- **hrLastSandboxError** No content is currently available. -- **initSummary** No content is currently available. +- **hrLastSandboxError** The last error sent by the WaaSMedic sandbox. +- **initSummary** Summary data of the initialization method. - **isInteractiveMode** The user started a run of WaaSMedic. - **isManaged** Device is managed for updates. - **isWUConnected** Device is connected to Windows Update. - **noMoreActions** No more applicable diagnostics. -- **pluginFailureCount** No content is currently available. -- **pluginsCount** No content is currently available. +- **pluginFailureCount** The number of plugins that have failed. +- **pluginsCount** The number of plugins. - **qualityAssessmentImpact** WaaS Assessment impact for quality updates. - **remediationSummary** Result of each operation performed on a device to fix an invalid state or configuration that's preventing the device from getting updates. For example, if Windows Update service is turned off, the fix is to turn the it back on. - **usingBackupFeatureAssessment** Relying on backup feature assessment. @@ -5220,19 +5398,19 @@ The following fields are available: ### Microsoft.Windows.StoreAgent.Telemetry.StateTransition -No content is currently available. +Products in the process of being fulfilled (installed or updated) are maintained in a list. This event is sent any time there is a change in a product's fulfillment status (pending, working, paused, cancelled, or complete), to help keep Windows up to date and secure. The following fields are available: -- **CatalogId** No content is currently available. -- **FulfillmentPluginId** No content is currently available. -- **HResult** No content is currently available. -- **NewState** No content is currently available. -- **PFN** No content is currently available. -- **PluginLastStage** No content is currently available. -- **PluginTelemetryData** No content is currently available. -- **Prevstate** No content is currently available. -- **ProductId** No content is currently available. +- **CatalogId** The ID for the product being installed if the product is from a private catalog, such as the Enterprise catalog. +- **FulfillmentPluginId** The ID of the plugin needed to install the package type of the product. +- **HResult** The resulting HResult error/success code of this operation. +- **NewState** The current fulfillment state of this product. +- **PFN** The Package Family Name of the app that is being installed or updated. +- **PluginLastStage** The most recent product fulfillment step that the plug-in has reported (different than its state). +- **PluginTelemetryData** Diagnostic information specific to the package-type plug-in. +- **Prevstate** The previous fulfillment state of this product. +- **ProductId** Product ID of the app that is being updated or installed. ### Microsoft.Windows.StoreAgent.Telemetry.UpdateAppOperationRequest @@ -5257,7 +5435,7 @@ The following fields are available: - **bytesFromCDN** The number of bytes received from a CDN source. - **bytesFromGroupPeers** The number of bytes received from a peer in the same group. - **bytesFromIntPeers** The number of bytes received from peers not in the same LAN or in the same group. -- **bytesFromLinkLocalPeers** No content is currently available. +- **bytesFromLinkLocalPeers** The number of bytes received from local peers. - **bytesFromLocalCache** Bytes copied over from local (on disk) cache. - **bytesFromPeers** The number of bytes received from a peer in the same LAN. - **cdnErrorCodes** A list of CDN connection errors since the last FailureCDNCommunication event. @@ -5461,7 +5639,7 @@ This event indicates that the Enhanced Engaged restart "accept automatically" di The following fields are available: - **DeviceLocalTime** The local time on the device sending the event. -- **EnterpriseAttributionValue** No content is currently available. +- **EnterpriseAttributionValue** Indicates whether the Enterprise attribution is on in this dialog box. - **ETag** OneSettings versioning value. - **ExitCode** Indicates how users exited the dialog box. - **RebootVersion** Version of DTE. @@ -5478,7 +5656,7 @@ This event indicates that the Enhanced Engaged restart "restart failed" dialog b The following fields are available: - **DeviceLocalTime** The local time of the device sending the event. -- **EnterpriseAttributionValue** No content is currently available. +- **EnterpriseAttributionValue** Indicates whether the Enterprise attribution is on in this dialog box. - **ETag** OneSettings versioning value. - **ExitCode** Indicates how users exited the dialog box. - **RebootVersion** Version of DTE. @@ -5495,7 +5673,7 @@ This event indicates that the Enhanced Engaged restart "restart imminent" dialog The following fields are available: - **DeviceLocalTime** Time the dialog box was shown on the local device. -- **EnterpriseAttributionValue** No content is currently available. +- **EnterpriseAttributionValue** Indicates whether the Enterprise attribution is on in this dialog box. - **ETag** OneSettings versioning value. - **ExitCode** Indicates how users exited the dialog box. - **RebootVersion** Version of DTE. @@ -6045,21 +6223,21 @@ The following fields are available: ### Microsoft.Windows.UpdateReserveManager.BeginScenario -No content is currently available. +This event is sent when the Update Reserve Manager is called to begin a scenario. The following fields are available: -- **Flags** No content is currently available. -- **HardReserveSize** No content is currently available. -- **HardReserveUsedSpace** No content is currently available. -- **OwningScenarioId** No content is currently available. -- **ReturnCode** No content is currently available. -- **ScenarioId** No content is currently available. +- **Flags** The flags that are passed to the begin scenario function. +- **HardReserveSize** The size of the hard reserve. +- **HardReserveUsedSpace** The used space in the hard reserve. +- **OwningScenarioId** The scenario ID the client that called the begin scenario function. +- **ReturnCode** The return code for the begin scenario operation. +- **ScenarioId** The scenario ID that is internal to the reserve manager. ### Microsoft.Windows.UpdateReserveManager.ClearSoftReserve -No content is currently available. +This event is sent when the Update Reserve Manager clears the contents of the soft reserve. @@ -6075,16 +6253,16 @@ The following fields are available: ### Microsoft.Windows.UpdateReserveManager.EndScenario -No content is currently available. +This event is sent when the Update Reserve Manager ends an active scenario. The following fields are available: -- **ActiveScenario** No content is currently available. -- **Flags** No content is currently available. -- **HardReserveSize** No content is currently available. -- **HardReserveUsedSpace** No content is currently available. -- **ReturnCode** No content is currently available. -- **ScenarioId** No content is currently available. +- **ActiveScenario** The current active scenario. +- **Flags** The flags passed to the end scenario call. +- **HardReserveSize** The size of the hard reserve when the end scenario is called. +- **HardReserveUsedSpace** The used space in the hard reserve when the end scenario is called. +- **ReturnCode** The return code of this operation. +- **ScenarioId** The ID of the internal reserve manager scenario. ### Microsoft.Windows.UpdateReserveManager.FunctionReturnedError @@ -6102,29 +6280,29 @@ The following fields are available: ### Microsoft.Windows.UpdateReserveManager.InitializeReserves -No content is currently available. +This event is sent when reserves are initialized on the device. The following fields are available: -- **FallbackInitUsed** No content is currently available. -- **Flags** No content is currently available. -- **HardReserveFinalSize** No content is currently available. -- **HardReserveFinalUsedSpace** No content is currently available. -- **HardReserveInitialSize** No content is currently available. -- **HardReserveInitialUsedSpace** No content is currently available. -- **HardReserveTargetSize** No content is currently available. -- **InitialUserFreeSpace** No content is currently available. -- **PostUpgradeFreeSpace** No content is currently available. -- **SoftReserveFinalSize** No content is currently available. -- **SoftReserveFinalUsedSpace** No content is currently available. -- **SoftReserveInitialSize** No content is currently available. -- **SoftReserveInitialUsedSpace** No content is currently available. -- **SoftReserveTargetSize** No content is currently available. -- **TargetUserFreeSpace** No content is currently available. -- **UpdateScratchFinalUsedSpace** No content is currently available. -- **UpdateScratchInitialUsedSpace** No content is currently available. -- **UpdateScratchReserveFinalSize** No content is currently available. -- **UpdateScratchReserveInitialSize** No content is currently available. +- **FallbackInitUsed** Indicates whether fallback initialization is used. +- **Flags** The flags used in the initialization of Update Reserve Manager. +- **HardReserveFinalSize** The final size of the hard reserve. +- **HardReserveFinalUsedSpace** The used space in the hard reserve. +- **HardReserveInitialSize** The size of the hard reserve after initialization. +- **HardReserveInitialUsedSpace** The utilization of the hard reserve after initialization. +- **HardReserveTargetSize** The target size that was set for the hard reserve. +- **InitialUserFreeSpace** The user free space during initialization. +- **PostUpgradeFreeSpace** The free space value passed into the Update Reserve Manager to determine reserve sizing post upgrade. +- **SoftReserveFinalSize** The final size of the soft reserve. +- **SoftReserveFinalUsedSpace** The used space in the soft reserve. +- **SoftReserveInitialSize** The soft reserve size after initialization. +- **SoftReserveInitialUsedSpace** The utilization of the soft reserve after initialization. +- **SoftReserveTargetSize** The target size that was set for the soft reserve. +- **TargetUserFreeSpace** The target user free space that was passed into the reserve manager to determine reserve sizing post upgrade. +- **UpdateScratchFinalUsedSpace** The used space in the scratch reserve. +- **UpdateScratchInitialUsedSpace** The utilization of the scratch reserve after initialization. +- **UpdateScratchReserveFinalSize** The utilization of the scratch reserve after initialization. +- **UpdateScratchReserveInitialSize** The size of the scratch reserve after initialization. ### Microsoft.Windows.UpdateReserveManager.InitializeUpdateReserveManager @@ -6153,13 +6331,13 @@ The following fields are available: ### Microsoft.Windows.UpdateReserveManager.ReevaluatePolicy -No content is currently available. +This event is sent when the Update Reserve Manager reevaluates policy to determine reserve usage. The following fields are available: -- **PolicyChanged** No content is currently available. -- **PolicyFailedEnum** No content is currently available. -- **PolicyPassed** No content is currently available. +- **PolicyChanged** Indicates whether the policy has changed. +- **PolicyFailedEnum** The reason why the policy failed. +- **PolicyPassed** Indicates whether the policy passed. ### Microsoft.Windows.UpdateReserveManager.RemovePendingHardReserveAdjustment @@ -6170,11 +6348,11 @@ This event is sent when the Update Reserve Manager removes a pending hard reserv ### Microsoft.Windows.UpdateReserveManager.TurnOffReserves -No content is currently available. +This event is sent when the Update Reserve Manager turns off reserve functionality for certain operations. The following fields are available: -- **Flags** No content is currently available. +- **Flags** Flags used in the turn off reserves function. ### Microsoft.Windows.UpdateReserveManager.UpdatePendingHardReserveAdjustment From 20958845fe3656864c6472fd8c9f7838b9a8d7b9 Mon Sep 17 00:00:00 2001 From: Brian Lich Date: Thu, 7 Feb 2019 08:37:17 -0800 Subject: [PATCH 027/724] new build --- ...ndows-diagnostic-events-and-fields-19H1.md | 68 +++++++++---------- 1 file changed, 34 insertions(+), 34 deletions(-) diff --git a/windows/privacy/basic-level-windows-diagnostic-events-and-fields-19H1.md b/windows/privacy/basic-level-windows-diagnostic-events-and-fields-19H1.md index 77792963db..6dc649099d 100644 --- a/windows/privacy/basic-level-windows-diagnostic-events-and-fields-19H1.md +++ b/windows/privacy/basic-level-windows-diagnostic-events-and-fields-19H1.md @@ -9,7 +9,7 @@ ms.pagetype: security localizationpriority: high author: brianlic-msft ms.author: brianlic -ms.date: 02/06/2019 +ms.date: 02/07/2019 --- @@ -2333,18 +2333,18 @@ The following fields are available: ### TelClientSynthetic.EventMonitor_0 -No content is currently available. +This event provides statistics for specific diagnostic events. The following fields are available: -- **ConsumerCount** No content is currently available. -- **EventName** No content is currently available. -- **EventSnFirst** No content is currently available. -- **EventSnLast** No content is currently available. -- **EventStoreCount** No content is currently available. -- **MonitorSn** No content is currently available. -- **TriggerCount** No content is currently available. -- **UploadedCount** No content is currently available. +- **ConsumerCount** The number of instances seen in the Event Tracing for Windows consumer. +- **EventName** The name of the event being monitored. +- **EventSnFirst** The expected first event serial number. +- **EventSnLast** The expected last event serial number. +- **EventStoreCount** The number of events reaching the event store. +- **MonitorSn** The serial number of the monitor. +- **TriggerCount** The number of events reaching the trigger buffer. +- **UploadedCount** The number of events uploaded. ### TelClientSynthetic.HeartBeat_5 @@ -3596,76 +3596,76 @@ The following fields are available: ### Microsoft.Windows.SysReset.FlightUninstallCancel -No content is currently available. +This event indicates the customer has cancelled uninstallation of Windows. ### Microsoft.Windows.SysReset.FlightUninstallError -No content is currently available. +This event sends an error code when the Windows uninstallation fails. The following fields are available: -- **ErrorCode** No content is currently available. +- **ErrorCode** Error code for uninstallation failure. ### Microsoft.Windows.SysReset.FlightUninstallReboot -No content is currently available. +This event is sent to signal an upcoming reboot during uninstallation of Windows. ### Microsoft.Windows.SysReset.FlightUninstallStart -No content is currently available. +This event indicates that the Windows uninstallation has started. ### Microsoft.Windows.SysReset.FlightUninstallUnavailable -No content is currently available. +This event sends diagnostic data when the Windows uninstallation is not available. The following fields are available: -- **AddedProfiles** No content is currently available. -- **MissingExternalStorage** No content is currently available. -- **MissingInfra** No content is currently available. -- **MovedProfiles** No content is currently available. +- **AddedProfiles** Indicates that new user profiles have been created since the flight was installed. +- **MissingExternalStorage** Indicates that the external storage used to install the flight is not available. +- **MissingInfra** Indicates that uninstall resources are missing. +- **MovedProfiles** Indicates that the user profile has been moved since the flight was installed. ### Microsoft.Windows.SysReset.HasPendingActions -No content is currently available. +This event is sent when users have actions that will block the uninstall of the latest quality update. ### Microsoft.Windows.SysReset.PBREngineInitFailed -No content is currently available. +This event signals a failed handoff between two recovery binaries. The following fields are available: -- **Operation** No content is currently available. +- **Operation** Legacy customer scenario. ### Microsoft.Windows.SysReset.PBREngineInitSucceed -No content is currently available. +This event signals successful handoff between two recovery binaries. The following fields are available: -- **Operation** No content is currently available. +- **Operation** Legacy customer scenario. ### Microsoft.Windows.SysReset.PBRFailedOffline -No content is currently available. +This event reports the error code when recovery fails. The following fields are available: -- **HRESULT** No content is currently available. -- **PBRType** No content is currently available. -- **SessionID** No content is currently available. +- **HRESULT** Error code for the failure. +- **PBRType** The recovery scenario. +- **SessionID** The unique ID for the recovery session. ### Microsoft.Xbox.XamTelemetry.AppActivationError @@ -4402,12 +4402,12 @@ The following fields are available: - **PackageCountTotalCanonical** Total number of canonical packages. - **PackageCountTotalDiff** Total number of diff packages. - **PackageCountTotalExpress** Total number of express packages. -- **PackageCountTotalPSFX** No content is currently available. +- **PackageCountTotalPSFX** The total number of PSFX packages. - **PackageExpressType** Type of express package. - **PackageSizeCanonical** Size of canonical packages in bytes. - **PackageSizeDiff** Size of diff packages in bytes. - **PackageSizeExpress** Size of express packages in bytes. -- **PackageSizePSFX** No content is currently available. +- **PackageSizePSFX** The size of PSFX packages, in bytes. - **RangeRequestState** Indicates the range request type used. - **RelatedCV** Correlation vector value generated from the latest USO scan. - **Result** Outcome of the download request phase of update. @@ -5487,7 +5487,7 @@ The following fields are available: - **downloadModeReason** Reason for the download. - **downloadModeSrc** Source of the DownloadMode setting (KvsProvider = 0, GeoProvider = 1, GeoVerProvider = 2, CpProvider = 3, DiscoveryProvider = 4, RegistryProvider = 5, GroupPolicyProvider = 6, MdmProvider = 7, SettingsProvider = 8, InvalidProviderType = 9). - **experimentId** When running a test, this is used to correlate with other events that are part of the same test. -- **expiresAt** No content is currently available. +- **expiresAt** Time when the content will expire from the Delivery Optimization Cache. - **fileID** The ID of the file being downloaded. - **fileSize** The size of the file being downloaded. - **gCurMemoryStreamBytes** Current usage for memory streaming. @@ -5498,7 +5498,7 @@ The following fields are available: - **isVpn** Is the device connected to a Virtual Private Network? - **jobID** Identifier for the Windows Update job. - **lanConnectionCount** The total number of connections made to peers in the same LAN. -- **linkLocalConnectionCount** No content is currently available. +- **linkLocalConnectionCount** The number of connections made to peers in the same Link-local network. - **numPeers** The total number of peers used for this download. - **numPeersLocal** The total number of local peers used for this download. - **predefinedCallerName** The name of the API Caller. @@ -5690,7 +5690,7 @@ This event returns information relating to the Enhanced Engaged reboot reminder The following fields are available: - **DeviceLocalTime** The time at which the reboot reminder dialog was shown (based on the local device time settings). -- **EnterpriseAttributionValue** No content is currently available. +- **EnterpriseAttributionValue** Indicates whether Enterprise attribution is on for this dialog. - **ETag** The OneSettings versioning value. - **ExitCode** Indicates how users exited the reboot reminder dialog box. - **RebootVersion** The version of the DTE (Direct-to-Engaged). From b4323b9fe1355df994b76ef7cb4598d280d48795 Mon Sep 17 00:00:00 2001 From: Brian Lich Date: Fri, 8 Feb 2019 08:20:41 -0800 Subject: [PATCH 028/724] new build --- ...ndows-diagnostic-events-and-fields-19H1.md | 198 ++++++++++++++++-- 1 file changed, 186 insertions(+), 12 deletions(-) diff --git a/windows/privacy/basic-level-windows-diagnostic-events-and-fields-19H1.md b/windows/privacy/basic-level-windows-diagnostic-events-and-fields-19H1.md index 6dc649099d..5e8f28e0bf 100644 --- a/windows/privacy/basic-level-windows-diagnostic-events-and-fields-19H1.md +++ b/windows/privacy/basic-level-windows-diagnostic-events-and-fields-19H1.md @@ -9,7 +9,7 @@ ms.pagetype: security localizationpriority: high author: brianlic-msft ms.author: brianlic -ms.date: 02/07/2019 +ms.date: 02/08/2019 --- @@ -2347,6 +2347,19 @@ The following fields are available: - **UploadedCount** The number of events uploaded. +### TelClientSynthetic.GetFileInfoAction_FilePathNotApproved_0 + +No content is currently available. + +The following fields are available: + +- **FilePath** No content is currently available. +- **FilePathExpanded** No content is currently available. +- **FilePathExpandedScenario** No content is currently available. +- **ScenarioId** No content is currently available. +- **ScenarioInstanceId** No content is currently available. + + ### TelClientSynthetic.HeartBeat_5 This event sends data about the health and quality of the diagnostic data from the given device, to help keep Windows up to date. It also enables data analysts to determine how 'trusted' the data is from a given device. @@ -2401,6 +2414,134 @@ The following fields are available: - **VortexHttpResponsesWithDroppedEvents** Number of Vortex responses containing at least 1 dropped event. +### TelClientSynthetic.HeartBeat_Agent_5 + +No content is currently available. + +The following fields are available: + +- **ConsumerDroppedCount** No content is currently available. +- **ContainerBufferFullDropCount** No content is currently available. +- **ContainerBufferFullSevilleDropCount** No content is currently available. +- **CriticalDataThrottleDroppedCount** No content is currently available. +- **DecodingDroppedCount** No content is currently available. +- **EtwDroppedBufferCount** No content is currently available. +- **EtwDroppedCount** No content is currently available. +- **EventsForwardedToHost** No content is currently available. +- **FullTriggerBufferDroppedCount** No content is currently available. +- **HeartBeatSequenceNumber** No content is currently available. +- **HostConnectionErrorsCount** No content is currently available. +- **HostConnectionTimeoutsCount** No content is currently available. +- **LastHostConnectionError** No content is currently available. +- **PreviousHeartBeatTime** No content is currently available. +- **ThrottledDroppedCount** No content is currently available. + + +### TelClientSynthetic.HeartBeat_DevHealthMon_5 + +No content is currently available. + +The following fields are available: + +- **HeartBeatSequenceNumber** No content is currently available. +- **PreviousHeartBeatTime** No content is currently available. + + +### TelClientSynthetic.LifetimeManager_ConsumerBaseTimestampChange_0 + +No content is currently available. + +The following fields are available: + +- **NewBaseTime** No content is currently available. +- **NewSystemTime** No content is currently available. +- **OldSystemTime** No content is currently available. + + +### TelClientSynthetic.MatchEngine_ScenarioCompletionThrottled_0 + +No content is currently available. + +The following fields are available: + +- **MaxHourlyCompletionsSetting** No content is currently available. +- **ScenarioId** No content is currently available. +- **ScenarioName** No content is currently available. + + +### TelClientSynthetic.OsEvents_BootStatReset_0 + +No content is currently available. + +The following fields are available: + +- **BootId** No content is currently available. +- **ResetReason** No content is currently available. + + +### TelClientSynthetic.ProducerThrottled_At_TriggerBuffer_0 + +No content is currently available. + +The following fields are available: + +- **BufferSize** No content is currently available. +- **DataType** No content is currently available. +- **EstSeenCount** No content is currently available. +- **EstTopEvent1Count** No content is currently available. +- **EstTopEvent1Name** No content is currently available. +- **EstTopEvent2Count** No content is currently available. +- **EstTopEvent2Name** No content is currently available. +- **Hit** No content is currently available. +- **IKey** No content is currently available. +- **ProviderId** No content is currently available. +- **ProviderName** No content is currently available. +- **Threshold** No content is currently available. + + +### TelClientSynthetic.ProducerThrottled_Event_Rate_0 + +No content is currently available. + +The following fields are available: + +- **EstSeenCount** No content is currently available. +- **EstTopEvent1Count** No content is currently available. +- **EstTopEvent1Name** No content is currently available. +- **EstTopEvent2Count** No content is currently available. +- **EstTopEvent2Name** No content is currently available. +- **EventPerProviderThreshold** No content is currently available. +- **EventRateThreshold** No content is currently available. +- **Hit** No content is currently available. +- **IKey** No content is currently available. +- **ProviderId** No content is currently available. +- **ProviderName** No content is currently available. + + +### TelClientSynthetic.RunExeWithArgsAction_ExeTerminated_0 + +No content is currently available. + +The following fields are available: + +- **ExpandedExeName** No content is currently available. +- **MaximumRuntimeMs** No content is currently available. +- **ScenarioId** No content is currently available. +- **ScenarioInstanceId** No content is currently available. + + +### TelClientSynthetic.RunExeWithArgsAction_ProcessReturnedNonZeroExitCode + +No content is currently available. + +The following fields are available: + +- **ExitCode** No content is currently available. +- **ExpandedExeName** No content is currently available. +- **ScenarioId** No content is currently available. +- **ScenarioInstanceId** No content is currently available. + + ## DxgKernelTelemetry events ### DxgKrnlTelemetry.GPUAdapterInventoryV2 @@ -3668,6 +3809,18 @@ The following fields are available: - **SessionID** The unique ID for the recovery session. +### Microsoft.Windows.SystemReset.PBRCorruptionRepairOption + +No content is currently available. + +The following fields are available: + +- **cbsSessionOption** No content is currently available. +- **errorCode** No content is currently available. +- **meteredConnection** No content is currently available. +- **sessionID** No content is currently available. + + ### Microsoft.Xbox.XamTelemetry.AppActivationError This event indicates whether the system detected an activation error in the app. @@ -3990,10 +4143,10 @@ Download process event for target update on Windows Update client. See the Event The following fields are available: - **ActiveDownloadTime** Number of seconds the update was actively being downloaded. -- **AppXBlockHashFailures** Indicates the number of blocks that failed hash validation during download of the app payload. +- **AppXBlockHashFailures** No content is currently available. - **AppXBlockHashValidationFailureCount** A count of the number of blocks that have failed validation after being downloaded. - **AppXDownloadScope** Indicates the scope of the download for application content. For streaming install scenarios, AllContent - non-streaming download, RequiredOnly - streaming download requested content required for launch, AutomaticOnly - streaming download requested automatic streams for the app, and Unknown - for events sent before download scope is determined by the Windows Update client. -- **AppXScope** Indicates the scope of the app download. +- **AppXScope** No content is currently available. - **BiosFamily** The family of the BIOS (Basic Input Output System). - **BiosName** The name of the device BIOS. - **BiosReleaseDate** The release date of the device BIOS. @@ -4002,22 +4155,22 @@ The following fields are available: - **BiosVersion** The version of the BIOS. - **BundleBytesDownloaded** Number of bytes downloaded for the specific content bundle. - **BundleId** Identifier associated with the specific content bundle; should not be all zeros if the bundleID was found. -- **BundleRepeatFailCount** Indicates whether this particular update bundle has previously failed. +- **BundleRepeatFailCount** No content is currently available. - **BundleRepeatFailFlag** Indicates whether this particular update bundle previously failed to download. - **BundleRevisionNumber** Identifies the revision number of the content bundle. - **BytesDownloaded** Number of bytes that were downloaded for an individual piece of content (not the entire bundle). - **CallerApplicationName** The name provided by the caller who initiated API calls into the software distribution client. - **CbsDownloadMethod** Indicates whether the download was a full-file download or a partial/delta download. -- **CbsMethod** The method used for downloading the update content related to the Component Based Servicing (CBS) technology. +- **CbsMethod** No content is currently available. - **CDNCountryCode** Two letter country abbreviation for the Content Distribution Network (CDN) location. - **CDNId** ID which defines which CDN the software distribution client downloaded the content from. - **ClientVersion** The version number of the software distribution client. -- **CommonProps** A bitmask for future flags associated with the Windows Update client behavior. -- **ConnectTime** Indicates the cumulative amount of time (in seconds) it took to establish the connection for all updates in an update bundle. +- **CommonProps** No content is currently available. +- **ConnectTime** No content is currently available. - **CurrentMobileOperator** The mobile operator the device is currently connected to. - **DeviceModel** What is the device model. - **DownloadPriority** Indicates whether a download happened at background, normal, or foreground priority. -- **DownloadProps** Information about the download operation. +- **DownloadProps** No content is currently available. - **EventInstanceID** A globally unique identifier for event instance. - **EventScenario** Indicates the purpose of sending this event - whether because the software distribution just started downloading content, or whether it was cancelled, succeeded, or failed. - **EventType** Possible values are Child, Bundle, or Driver. @@ -4045,9 +4198,9 @@ The following fields are available: - **QualityUpdatePause** Indicates whether quality OS updates are paused on the device. - **Reason** A 32-bit integer representing the reason the update is blocked from being downloaded in the background. - **RegulationReason** The reason that the update is regulated -- **RegulationResult** The result code (HResult) of the last attempt to contact the regulation web service for download regulation of update content. +- **RegulationResult** No content is currently available. - **RelatedCV** The previous Correlation Vector that was used before swapping with a new one. -- **RepeatFailCount** Indicates whether this specific content has previously failed. +- **RepeatFailCount** No content is currently available. - **RepeatFailFlag** Indicates whether this specific piece of content had previously failed to download. - **RevisionNumber** The revision number of the specified piece of content. - **ServiceGuid** An ID that represents which service the software distribution client is installing content for (Windows Update, Windows Store, etc.). @@ -5485,9 +5638,9 @@ The following fields are available: - **downlinkUsageBps** The download speed (in bytes per second). - **downloadMode** The download mode used for this file download session. - **downloadModeReason** Reason for the download. -- **downloadModeSrc** Source of the DownloadMode setting (KvsProvider = 0, GeoProvider = 1, GeoVerProvider = 2, CpProvider = 3, DiscoveryProvider = 4, RegistryProvider = 5, GroupPolicyProvider = 6, MdmProvider = 7, SettingsProvider = 8, InvalidProviderType = 9). +- **downloadModeSrc** Source of the DownloadMode setting. - **experimentId** When running a test, this is used to correlate with other events that are part of the same test. -- **expiresAt** Time when the content will expire from the Delivery Optimization Cache. +- **expiresAt** The time when the content will expire from the Delivery Optimization Cache. - **fileID** The ID of the file being downloaded. - **fileSize** The size of the file being downloaded. - **gCurMemoryStreamBytes** Current usage for memory streaming. @@ -5716,6 +5869,26 @@ The following fields are available: - **UtcTime** The time that the pop-up banner was displayed, in Coordinated Universal Time. +### Microsoft.Windows.Update.NotificationUx.RebootScheduled + +Indicates when a reboot is scheduled by the system or a user for a security, quality, or feature update. + +The following fields are available: + +- **activeHoursApplicable** Indicates whether an Active Hours policy is present on the device. +- **IsEnhancedEngagedReboot** Indicates whether this is an Enhanced Engaged reboot. +- **rebootArgument** Argument for the reboot task. It also represents specific reboot related action. +- **rebootOutsideOfActiveHours** Indicates whether a restart is scheduled outside of active hours. +- **rebootScheduledByUser** Indicates whether the restart was scheduled by user (if not, it was scheduled automatically). +- **rebootState** The current state of the restart. +- **rebootUsingSmartScheduler** Indicates whether the reboot is scheduled by smart scheduler. +- **revisionNumber** Revision number of the update that is getting installed with this restart. +- **scheduledRebootTime** Time of the scheduled restart. +- **scheduledRebootTimeInUTC** Time of the scheduled restart in Coordinated Universal Time. +- **updateId** ID of the update that is getting installed with this restart. +- **wuDeviceid** Unique device ID used by Windows Update. + + ### Microsoft.Windows.Update.Orchestrator.ActivityRestrictedByActiveHoursPolicy This event indicates a policy is present that may restrict update activity to outside of active hours. @@ -6285,6 +6458,7 @@ This event is sent when reserves are initialized on the device. The following fields are available: - **FallbackInitUsed** Indicates whether fallback initialization is used. +- **FinalUserFreeSpace** No content is currently available. - **Flags** The flags used in the initialization of Update Reserve Manager. - **HardReserveFinalSize** The final size of the hard reserve. - **HardReserveFinalUsedSpace** The used space in the hard reserve. From e0db6ec4424acaafc6a6de23fe0f4c7a4cfbfa9f Mon Sep 17 00:00:00 2001 From: Brian Lich Date: Mon, 11 Feb 2019 08:49:04 -0800 Subject: [PATCH 029/724] new build --- ...ndows-diagnostic-events-and-fields-19H1.md | 23 +++++++++++-------- 1 file changed, 13 insertions(+), 10 deletions(-) diff --git a/windows/privacy/basic-level-windows-diagnostic-events-and-fields-19H1.md b/windows/privacy/basic-level-windows-diagnostic-events-and-fields-19H1.md index 5e8f28e0bf..47fa6009f5 100644 --- a/windows/privacy/basic-level-windows-diagnostic-events-and-fields-19H1.md +++ b/windows/privacy/basic-level-windows-diagnostic-events-and-fields-19H1.md @@ -9,7 +9,7 @@ ms.pagetype: security localizationpriority: high author: brianlic-msft ms.author: brianlic -ms.date: 02/08/2019 +ms.date: 02/11/2019 --- @@ -749,6 +749,7 @@ The following fields are available: - **DriverBlockOverridden** Does the driver package have an SDB block that blocks it from migrating, but that block has been overridden? - **DriverIsDeviceBlocked** Was the driver package was blocked because of a device block? - **DriverIsDriverBlocked** Is the driver package blocked because of a driver block? +- **DriverIsTroubleshooterBlocked** Indicates whether the driver package is blocked because of a troubleshooter block. - **DriverShouldNotMigrate** Should the driver package be migrated during upgrade? - **SdbDriverBlockOverridden** Does the driver package have an SDB block that blocks it from migrating, but that block has been overridden? @@ -4143,10 +4144,10 @@ Download process event for target update on Windows Update client. See the Event The following fields are available: - **ActiveDownloadTime** Number of seconds the update was actively being downloaded. -- **AppXBlockHashFailures** No content is currently available. +- **AppXBlockHashFailures** Indicates the number of blocks that failed hash validation during download of the app payload. - **AppXBlockHashValidationFailureCount** A count of the number of blocks that have failed validation after being downloaded. - **AppXDownloadScope** Indicates the scope of the download for application content. For streaming install scenarios, AllContent - non-streaming download, RequiredOnly - streaming download requested content required for launch, AutomaticOnly - streaming download requested automatic streams for the app, and Unknown - for events sent before download scope is determined by the Windows Update client. -- **AppXScope** No content is currently available. +- **AppXScope** Indicates the scope of the app download. - **BiosFamily** The family of the BIOS (Basic Input Output System). - **BiosName** The name of the device BIOS. - **BiosReleaseDate** The release date of the device BIOS. @@ -4155,22 +4156,22 @@ The following fields are available: - **BiosVersion** The version of the BIOS. - **BundleBytesDownloaded** Number of bytes downloaded for the specific content bundle. - **BundleId** Identifier associated with the specific content bundle; should not be all zeros if the bundleID was found. -- **BundleRepeatFailCount** No content is currently available. +- **BundleRepeatFailCount** Indicates whether this particular update bundle has previously failed. - **BundleRepeatFailFlag** Indicates whether this particular update bundle previously failed to download. - **BundleRevisionNumber** Identifies the revision number of the content bundle. - **BytesDownloaded** Number of bytes that were downloaded for an individual piece of content (not the entire bundle). - **CallerApplicationName** The name provided by the caller who initiated API calls into the software distribution client. - **CbsDownloadMethod** Indicates whether the download was a full-file download or a partial/delta download. -- **CbsMethod** No content is currently available. +- **CbsMethod** The method used for downloading the update content related to the Component Based Servicing (CBS) technology. - **CDNCountryCode** Two letter country abbreviation for the Content Distribution Network (CDN) location. - **CDNId** ID which defines which CDN the software distribution client downloaded the content from. - **ClientVersion** The version number of the software distribution client. -- **CommonProps** No content is currently available. -- **ConnectTime** No content is currently available. +- **CommonProps** A bitmask for future flags associated with the Windows Update client behavior. +- **ConnectTime** Indicates the cumulative amount of time (in seconds) it took to establish the connection for all updates in an update bundle. - **CurrentMobileOperator** The mobile operator the device is currently connected to. - **DeviceModel** What is the device model. - **DownloadPriority** Indicates whether a download happened at background, normal, or foreground priority. -- **DownloadProps** No content is currently available. +- **DownloadProps** Information about the download operation. - **EventInstanceID** A globally unique identifier for event instance. - **EventScenario** Indicates the purpose of sending this event - whether because the software distribution just started downloading content, or whether it was cancelled, succeeded, or failed. - **EventType** Possible values are Child, Bundle, or Driver. @@ -4198,9 +4199,9 @@ The following fields are available: - **QualityUpdatePause** Indicates whether quality OS updates are paused on the device. - **Reason** A 32-bit integer representing the reason the update is blocked from being downloaded in the background. - **RegulationReason** The reason that the update is regulated -- **RegulationResult** No content is currently available. +- **RegulationResult** The result code (HResult) of the last attempt to contact the regulation web service for download regulation of update content. - **RelatedCV** The previous Correlation Vector that was used before swapping with a new one. -- **RepeatFailCount** No content is currently available. +- **RepeatFailCount** Indicates whether this specific content has previously failed. - **RepeatFailFlag** Indicates whether this specific piece of content had previously failed to download. - **RevisionNumber** The revision number of the specified piece of content. - **ServiceGuid** An ID that represents which service the software distribution client is installing content for (Windows Update, Windows Store, etc.). @@ -6436,6 +6437,8 @@ The following fields are available: - **HardReserveUsedSpace** The used space in the hard reserve when the end scenario is called. - **ReturnCode** The return code of this operation. - **ScenarioId** The ID of the internal reserve manager scenario. +- **SoftReserveSize** No content is currently available. +- **SoftReserveUsedSpace** No content is currently available. ### Microsoft.Windows.UpdateReserveManager.FunctionReturnedError From 9e6edd0c766f22e95c49f51fbbbeb6cb139f40b1 Mon Sep 17 00:00:00 2001 From: Brian Lich Date: Tue, 12 Feb 2019 09:03:32 -0800 Subject: [PATCH 030/724] new build --- ...ndows-diagnostic-events-and-fields-19H1.md | 189 +++++++++--------- 1 file changed, 90 insertions(+), 99 deletions(-) diff --git a/windows/privacy/basic-level-windows-diagnostic-events-and-fields-19H1.md b/windows/privacy/basic-level-windows-diagnostic-events-and-fields-19H1.md index 47fa6009f5..064e2af5d3 100644 --- a/windows/privacy/basic-level-windows-diagnostic-events-and-fields-19H1.md +++ b/windows/privacy/basic-level-windows-diagnostic-events-and-fields-19H1.md @@ -9,7 +9,7 @@ ms.pagetype: security localizationpriority: high author: brianlic-msft ms.author: brianlic -ms.date: 02/11/2019 +ms.date: 02/12/2019 --- @@ -2350,15 +2350,15 @@ The following fields are available: ### TelClientSynthetic.GetFileInfoAction_FilePathNotApproved_0 -No content is currently available. +This event occurs when the DiagTrack escalation fails due to the scenario requesting a path that is not approved for GetFileInfo actions. The following fields are available: -- **FilePath** No content is currently available. -- **FilePathExpanded** No content is currently available. -- **FilePathExpandedScenario** No content is currently available. -- **ScenarioId** No content is currently available. -- **ScenarioInstanceId** No content is currently available. +- **FilePath** The unexpanded path in the scenario XML. +- **FilePathExpanded** The file path, with environment variables expanded. +- **FilePathExpandedScenario** The file path, with property identifiers and environment variables expanded. +- **ScenarioId** The globally unique identifier (GUID) of the scenario. +- **ScenarioInstanceId** The error code denoting which path failed (internal or external). ### TelClientSynthetic.HeartBeat_5 @@ -2417,130 +2417,130 @@ The following fields are available: ### TelClientSynthetic.HeartBeat_Agent_5 -No content is currently available. +This event sends data about the health and quality of the diagnostic data from the specified device (agent), to help keep Windows up to date. The following fields are available: -- **ConsumerDroppedCount** No content is currently available. -- **ContainerBufferFullDropCount** No content is currently available. -- **ContainerBufferFullSevilleDropCount** No content is currently available. -- **CriticalDataThrottleDroppedCount** No content is currently available. -- **DecodingDroppedCount** No content is currently available. -- **EtwDroppedBufferCount** No content is currently available. -- **EtwDroppedCount** No content is currently available. -- **EventsForwardedToHost** No content is currently available. -- **FullTriggerBufferDroppedCount** No content is currently available. -- **HeartBeatSequenceNumber** No content is currently available. -- **HostConnectionErrorsCount** No content is currently available. -- **HostConnectionTimeoutsCount** No content is currently available. -- **LastHostConnectionError** No content is currently available. -- **PreviousHeartBeatTime** No content is currently available. -- **ThrottledDroppedCount** No content is currently available. +- **ConsumerDroppedCount** The number of events dropped at the consumer layer of the diagnostic data collection client. +- **ContainerBufferFullDropCount** The number of events dropped due to the container buffer being full. +- **ContainerBufferFullSevilleDropCount** The number of “Seville” events dropped due to the container buffer being full. +- **CriticalDataThrottleDroppedCount** The number of critical data sampled events dropped due to data throttling. +- **DecodingDroppedCount** The number of events dropped due to decoding failures. +- **EtwDroppedBufferCount** The number of buffers dropped in the ETW (Event Tracing for Windows) session. +- **EtwDroppedCount** The number of events dropped at the ETW (Event Tracing for Windows) layer of the diagnostic data collection client on the user’s device. +- **EventsForwardedToHost** The number of events forwarded from agent (device) to host (server). +- **FullTriggerBufferDroppedCount** The number of events dropped due to the trigger buffer being full. +- **HeartBeatSequenceNumber** The heartbeat sequence number associated with this event. +- **HostConnectionErrorsCount** The number of non-timeout errors encountered in the host (server)/agent (device) socket transport channel. +- **HostConnectionTimeoutsCount** The number of connection timeouts between the host (server) and agent (device). +- **LastHostConnectionError** The last error from a connection between host (server) and agent (device). +- **PreviousHeartBeatTime** The timestamp of the last heartbeat event. +- **ThrottledDroppedCount** The number of events dropped due to throttling of “noisy” providers. ### TelClientSynthetic.HeartBeat_DevHealthMon_5 -No content is currently available. +This event sends data (for Surface Hub devices) to monitor and ensure the correct functioning of those Surface Hub devices. This data helps ensure the device is up-to-date with the latest security and safety features. The following fields are available: -- **HeartBeatSequenceNumber** No content is currently available. -- **PreviousHeartBeatTime** No content is currently available. +- **HeartBeatSequenceNumber** The heartbeat sequence number associated with this event. +- **PreviousHeartBeatTime** The timestamp of the last heartbeat event. ### TelClientSynthetic.LifetimeManager_ConsumerBaseTimestampChange_0 -No content is currently available. +This event sends data when the Windows Diagnostic data collection mechanism detects a timestamp adjustment for incoming diagnostic events. This data is critical for dealing with time changes during diagnostic data analysis, to help keep the device up to date. The following fields are available: -- **NewBaseTime** No content is currently available. -- **NewSystemTime** No content is currently available. -- **OldSystemTime** No content is currently available. +- **NewBaseTime** The new QPC (Query Performance Counter) base time from ETW (Event Tracing for Windows). +- **NewSystemTime** The new system time of the device. +- **OldSystemTime** The previous system time of the device. ### TelClientSynthetic.MatchEngine_ScenarioCompletionThrottled_0 -No content is currently available. +This event sends data when scenario completion is throttled (truncated or otherwise restricted) because the scenario is excessively large. The following fields are available: -- **MaxHourlyCompletionsSetting** No content is currently available. -- **ScenarioId** No content is currently available. -- **ScenarioName** No content is currently available. +- **MaxHourlyCompletionsSetting** The maximum number of scenario completions per hour until throttling kicks in. +- **ScenarioId** The globally unique identifier (GUID) of the scenario being throttled. +- **ScenarioName** The name of the scenario being throttled. ### TelClientSynthetic.OsEvents_BootStatReset_0 -No content is currently available. +This event sends data when the Windows diagnostic data collection mechanism resets the Boot ID. This data helps ensure Windows is up to date. The following fields are available: -- **BootId** No content is currently available. -- **ResetReason** No content is currently available. +- **BootId** The current Boot ID. +- **ResetReason** The reason code for resetting the Boot ID. ### TelClientSynthetic.ProducerThrottled_At_TriggerBuffer_0 -No content is currently available. +This event sends data when a producer is throttled due to the trigger buffer exceeding defined thresholds. The following fields are available: -- **BufferSize** No content is currently available. -- **DataType** No content is currently available. -- **EstSeenCount** No content is currently available. -- **EstTopEvent1Count** No content is currently available. -- **EstTopEvent1Name** No content is currently available. -- **EstTopEvent2Count** No content is currently available. -- **EstTopEvent2Name** No content is currently available. -- **Hit** No content is currently available. -- **IKey** No content is currently available. -- **ProviderId** No content is currently available. -- **ProviderName** No content is currently available. -- **Threshold** No content is currently available. +- **BufferSize** The size of the trigger buffer. +- **DataType** The type of event that this producer generates (Event Tracing for Windows, Time, Synthetic). +- **EstSeenCount** Estimated total number of inputs determining other “Est…” values. +- **EstTopEvent1Count** The count for estimated “noisiest” event from this producer. +- **EstTopEvent1Name** The name for estimated “noisiest” event from this producer. +- **EstTopEvent2Count** The count for estimated second “noisiest” event from this producer. +- **EstTopEvent2Name** The name for estimated second “noisiest” event from this producer. +- **Hit** The number of events seen from this producer. +- **IKey** The IKey identifier of the producer, if available. +- **ProviderId** The provider ID of the producer being throttled. +- **ProviderName** The provider name of the producer being throttled. +- **Threshold** The threshold crossed, which caused the throttling. ### TelClientSynthetic.ProducerThrottled_Event_Rate_0 -No content is currently available. +This event sends data when an event producer is throttled by the Windows Diagnostic data collection mechanism. This data helps ensure Windows is up to date. The following fields are available: -- **EstSeenCount** No content is currently available. -- **EstTopEvent1Count** No content is currently available. -- **EstTopEvent1Name** No content is currently available. -- **EstTopEvent2Count** No content is currently available. -- **EstTopEvent2Name** No content is currently available. -- **EventPerProviderThreshold** No content is currently available. -- **EventRateThreshold** No content is currently available. -- **Hit** No content is currently available. -- **IKey** No content is currently available. -- **ProviderId** No content is currently available. -- **ProviderName** No content is currently available. +- **EstSeenCount** Estimated total number of inputs determining other “Est…” values. +- **EstTopEvent1Count** The count for estimated “noisiest” event from this producer. +- **EstTopEvent1Name** The name for estimated “noisiest” event from this producer. +- **EstTopEvent2Count** The count for estimated second “noisiest” event from this producer. +- **EstTopEvent2Name** The name for estimated second “noisiest” event from this producer. +- **EventPerProviderThreshold** The trigger point for throttling (value for each provider). This value is only applied once EventRateThreshold has been met. +- **EventRateThreshold** The total event rate trigger point for throttling. +- **Hit** The number of events seen from this producer. +- **IKey** The IKey identifier of the producer, if available. +- **ProviderId** The provider ID of the producer being throttled. +- **ProviderName** The provider name of the producer being throttled. ### TelClientSynthetic.RunExeWithArgsAction_ExeTerminated_0 -No content is currently available. +This event sends data when an executable (EXE) file is terminated during escalation because it exceeded its maximum runtime (the maximum amount of time it was expected to run). This data helps ensure Windows is up to date. The following fields are available: -- **ExpandedExeName** No content is currently available. -- **MaximumRuntimeMs** No content is currently available. -- **ScenarioId** No content is currently available. -- **ScenarioInstanceId** No content is currently available. +- **ExpandedExeName** The expanded name of the executable (EXE) file. +- **MaximumRuntimeMs** The maximum runtime (in milliseconds) for this action. +- **ScenarioId** The globally unique identifier (GUID) of the scenario that was terminated. +- **ScenarioInstanceId** The globally unique identifier (GUID) of the scenario instance that was terminated. ### TelClientSynthetic.RunExeWithArgsAction_ProcessReturnedNonZeroExitCode -No content is currently available. +This event sends data when the RunExe process finishes during escalation, but returns a non-zero exit code. This data helps ensure Windows is up to date. The following fields are available: -- **ExitCode** No content is currently available. -- **ExpandedExeName** No content is currently available. -- **ScenarioId** No content is currently available. -- **ScenarioInstanceId** No content is currently available. +- **ExitCode** The exit code of the process +- **ExpandedExeName** The expanded name of the executable (EXE) file. +- **ScenarioId** The globally unique identifier (GUID) of the escalating scenario. +- **ScenarioInstanceId** The globally unique identifier (GUID) of the scenario instance. ## DxgKernelTelemetry events @@ -3812,14 +3812,14 @@ The following fields are available: ### Microsoft.Windows.SystemReset.PBRCorruptionRepairOption -No content is currently available. +This event sends corruption repair diagnostic data when the PBRCorruptionRepairOption encounters a corruption error. The following fields are available: -- **cbsSessionOption** No content is currently available. -- **errorCode** No content is currently available. -- **meteredConnection** No content is currently available. -- **sessionID** No content is currently available. +- **cbsSessionOption** The corruption repair configuration. +- **errorCode** The error code encountered. +- **meteredConnection** Indicates whether the device is connected to a metered network (wired or WiFi). +- **sessionID** The globally unique identifier (GUID) for the session. ### Microsoft.Xbox.XamTelemetry.AppActivationError @@ -4144,10 +4144,10 @@ Download process event for target update on Windows Update client. See the Event The following fields are available: - **ActiveDownloadTime** Number of seconds the update was actively being downloaded. -- **AppXBlockHashFailures** Indicates the number of blocks that failed hash validation during download of the app payload. +- **AppXBlockHashFailures** No content is currently available. - **AppXBlockHashValidationFailureCount** A count of the number of blocks that have failed validation after being downloaded. - **AppXDownloadScope** Indicates the scope of the download for application content. For streaming install scenarios, AllContent - non-streaming download, RequiredOnly - streaming download requested content required for launch, AutomaticOnly - streaming download requested automatic streams for the app, and Unknown - for events sent before download scope is determined by the Windows Update client. -- **AppXScope** Indicates the scope of the app download. +- **AppXScope** No content is currently available. - **BiosFamily** The family of the BIOS (Basic Input Output System). - **BiosName** The name of the device BIOS. - **BiosReleaseDate** The release date of the device BIOS. @@ -4156,18 +4156,18 @@ The following fields are available: - **BiosVersion** The version of the BIOS. - **BundleBytesDownloaded** Number of bytes downloaded for the specific content bundle. - **BundleId** Identifier associated with the specific content bundle; should not be all zeros if the bundleID was found. -- **BundleRepeatFailCount** Indicates whether this particular update bundle has previously failed. +- **BundleRepeatFailCount** No content is currently available. - **BundleRepeatFailFlag** Indicates whether this particular update bundle previously failed to download. - **BundleRevisionNumber** Identifies the revision number of the content bundle. - **BytesDownloaded** Number of bytes that were downloaded for an individual piece of content (not the entire bundle). - **CallerApplicationName** The name provided by the caller who initiated API calls into the software distribution client. - **CbsDownloadMethod** Indicates whether the download was a full-file download or a partial/delta download. -- **CbsMethod** The method used for downloading the update content related to the Component Based Servicing (CBS) technology. +- **CbsMethod** No content is currently available. - **CDNCountryCode** Two letter country abbreviation for the Content Distribution Network (CDN) location. - **CDNId** ID which defines which CDN the software distribution client downloaded the content from. - **ClientVersion** The version number of the software distribution client. - **CommonProps** A bitmask for future flags associated with the Windows Update client behavior. -- **ConnectTime** Indicates the cumulative amount of time (in seconds) it took to establish the connection for all updates in an update bundle. +- **ConnectTime** No content is currently available. - **CurrentMobileOperator** The mobile operator the device is currently connected to. - **DeviceModel** What is the device model. - **DownloadPriority** Indicates whether a download happened at background, normal, or foreground priority. @@ -4201,7 +4201,7 @@ The following fields are available: - **RegulationReason** The reason that the update is regulated - **RegulationResult** The result code (HResult) of the last attempt to contact the regulation web service for download regulation of update content. - **RelatedCV** The previous Correlation Vector that was used before swapping with a new one. -- **RepeatFailCount** Indicates whether this specific content has previously failed. +- **RepeatFailCount** No content is currently available. - **RepeatFailFlag** Indicates whether this specific piece of content had previously failed to download. - **RevisionNumber** The revision number of the specified piece of content. - **ServiceGuid** An ID that represents which service the software distribution client is installing content for (Windows Update, Windows Store, etc.). @@ -4577,7 +4577,7 @@ This event collects information regarding the expansion phase of the new Unified The following fields are available: -- **CanonicalRequestedOnError** No content is currently available. +- **CanonicalRequestedOnError** Indicates if an error caused a reversion to a different type of compressed update (TRUE or FALSE). - **ElapsedTickCount** Time taken for expand phase. - **EndFreeSpace** Free space after expand phase. - **EndSandboxSize** Sandbox size after expand phase. @@ -6482,21 +6482,6 @@ The following fields are available: - **UpdateScratchReserveInitialSize** The size of the scratch reserve after initialization. -### Microsoft.Windows.UpdateReserveManager.InitializeUpdateReserveManager - -This event returns data about the Update Reserve Manager, including whether it’s been initialized. - -The following fields are available: - -- **ClientId** The ID of the caller application. -- **Flags** The enumerated flags used to initialize the manager. -- **FlightId** The flight ID of the content the calling client is currently operating with. -- **Offline** Indicates whether or the reserve manager is called during offline operations. -- **PolicyPassed** Indicates whether the machine is able to use reserves. -- **ReturnCode** Return code of the operation. -- **Version** The version of the Update Reserve Manager. - - ### Microsoft.Windows.UpdateReserveManager.PrepareTIForReserveInitialization This event is sent when the Update Reserve Manager prepares the Trusted Installer to initialize reserves on the next boot. @@ -6530,6 +6515,12 @@ This event is sent when the Update Reserve Manager turns off reserve functionali The following fields are available: - **Flags** Flags used in the turn off reserves function. +- **HardReserveSize** No content is currently available. +- **HardReserveUsedSpace** No content is currently available. +- **ScratchReserveSize** No content is currently available. +- **ScratchReserveUsedSpace** No content is currently available. +- **SoftReserveSize** No content is currently available. +- **SoftReserveUsedSpace** No content is currently available. ### Microsoft.Windows.UpdateReserveManager.UpdatePendingHardReserveAdjustment From b5d294eeddb0e393e0e9562d1200eb622bd1a4ab Mon Sep 17 00:00:00 2001 From: Brian Lich Date: Tue, 12 Feb 2019 16:47:39 -0800 Subject: [PATCH 031/724] new build --- ...basic-level-windows-diagnostic-events-and-fields-19H1.md | 6 +++--- 1 file changed, 3 insertions(+), 3 deletions(-) diff --git a/windows/privacy/basic-level-windows-diagnostic-events-and-fields-19H1.md b/windows/privacy/basic-level-windows-diagnostic-events-and-fields-19H1.md index 064e2af5d3..0fa6cf4c9a 100644 --- a/windows/privacy/basic-level-windows-diagnostic-events-and-fields-19H1.md +++ b/windows/privacy/basic-level-windows-diagnostic-events-and-fields-19H1.md @@ -6437,8 +6437,8 @@ The following fields are available: - **HardReserveUsedSpace** The used space in the hard reserve when the end scenario is called. - **ReturnCode** The return code of this operation. - **ScenarioId** The ID of the internal reserve manager scenario. -- **SoftReserveSize** No content is currently available. -- **SoftReserveUsedSpace** No content is currently available. +- **SoftReserveSize** The size of the soft reserve when end scenario is called. +- **SoftReserveUsedSpace** The amount of the soft reserve used when end scenario is called. ### Microsoft.Windows.UpdateReserveManager.FunctionReturnedError @@ -6461,7 +6461,7 @@ This event is sent when reserves are initialized on the device. The following fields are available: - **FallbackInitUsed** Indicates whether fallback initialization is used. -- **FinalUserFreeSpace** No content is currently available. +- **FinalUserFreeSpace** The amount of user free space after initialization. - **Flags** The flags used in the initialization of Update Reserve Manager. - **HardReserveFinalSize** The final size of the hard reserve. - **HardReserveFinalUsedSpace** The used space in the hard reserve. From c0ff6390e9ee613d77ca1caa66d676ab553aba79 Mon Sep 17 00:00:00 2001 From: Brian Lich Date: Wed, 13 Feb 2019 08:30:52 -0800 Subject: [PATCH 032/724] new build --- ...ndows-diagnostic-events-and-fields-19H1.md | 28 +++++++++---------- 1 file changed, 14 insertions(+), 14 deletions(-) diff --git a/windows/privacy/basic-level-windows-diagnostic-events-and-fields-19H1.md b/windows/privacy/basic-level-windows-diagnostic-events-and-fields-19H1.md index 0fa6cf4c9a..dbaadb2de5 100644 --- a/windows/privacy/basic-level-windows-diagnostic-events-and-fields-19H1.md +++ b/windows/privacy/basic-level-windows-diagnostic-events-and-fields-19H1.md @@ -9,7 +9,7 @@ ms.pagetype: security localizationpriority: high author: brianlic-msft ms.author: brianlic -ms.date: 02/12/2019 +ms.date: 02/13/2019 --- @@ -4144,10 +4144,10 @@ Download process event for target update on Windows Update client. See the Event The following fields are available: - **ActiveDownloadTime** Number of seconds the update was actively being downloaded. -- **AppXBlockHashFailures** No content is currently available. +- **AppXBlockHashFailures** Indicates the number of blocks that failed hash validation during download. - **AppXBlockHashValidationFailureCount** A count of the number of blocks that have failed validation after being downloaded. - **AppXDownloadScope** Indicates the scope of the download for application content. For streaming install scenarios, AllContent - non-streaming download, RequiredOnly - streaming download requested content required for launch, AutomaticOnly - streaming download requested automatic streams for the app, and Unknown - for events sent before download scope is determined by the Windows Update client. -- **AppXScope** No content is currently available. +- **AppXScope** Indicates the scope of the app download. - **BiosFamily** The family of the BIOS (Basic Input Output System). - **BiosName** The name of the device BIOS. - **BiosReleaseDate** The release date of the device BIOS. @@ -4156,22 +4156,22 @@ The following fields are available: - **BiosVersion** The version of the BIOS. - **BundleBytesDownloaded** Number of bytes downloaded for the specific content bundle. - **BundleId** Identifier associated with the specific content bundle; should not be all zeros if the bundleID was found. -- **BundleRepeatFailCount** No content is currently available. +- **BundleRepeatFailCount** Indicates whether this particular update bundle previously failed. - **BundleRepeatFailFlag** Indicates whether this particular update bundle previously failed to download. - **BundleRevisionNumber** Identifies the revision number of the content bundle. - **BytesDownloaded** Number of bytes that were downloaded for an individual piece of content (not the entire bundle). - **CallerApplicationName** The name provided by the caller who initiated API calls into the software distribution client. - **CbsDownloadMethod** Indicates whether the download was a full-file download or a partial/delta download. -- **CbsMethod** No content is currently available. +- **CbsMethod** The method used for downloading the update content related to the Component Based Servicing (CBS) technology. - **CDNCountryCode** Two letter country abbreviation for the Content Distribution Network (CDN) location. - **CDNId** ID which defines which CDN the software distribution client downloaded the content from. - **ClientVersion** The version number of the software distribution client. - **CommonProps** A bitmask for future flags associated with the Windows Update client behavior. -- **ConnectTime** No content is currently available. +- **ConnectTime** Indicates the cumulative amount of time (in seconds) it took to establish the connection for all updates in an update bundle. - **CurrentMobileOperator** The mobile operator the device is currently connected to. - **DeviceModel** What is the device model. - **DownloadPriority** Indicates whether a download happened at background, normal, or foreground priority. -- **DownloadProps** Information about the download operation. +- **DownloadProps** No content is currently available. - **EventInstanceID** A globally unique identifier for event instance. - **EventScenario** Indicates the purpose of sending this event - whether because the software distribution just started downloading content, or whether it was cancelled, succeeded, or failed. - **EventType** Possible values are Child, Bundle, or Driver. @@ -4201,7 +4201,7 @@ The following fields are available: - **RegulationReason** The reason that the update is regulated - **RegulationResult** The result code (HResult) of the last attempt to contact the regulation web service for download regulation of update content. - **RelatedCV** The previous Correlation Vector that was used before swapping with a new one. -- **RepeatFailCount** No content is currently available. +- **RepeatFailCount** Indicates whether this specific content has previously failed. - **RepeatFailFlag** Indicates whether this specific piece of content had previously failed to download. - **RevisionNumber** The revision number of the specified piece of content. - **ServiceGuid** An ID that represents which service the software distribution client is installing content for (Windows Update, Windows Store, etc.). @@ -6515,12 +6515,12 @@ This event is sent when the Update Reserve Manager turns off reserve functionali The following fields are available: - **Flags** Flags used in the turn off reserves function. -- **HardReserveSize** No content is currently available. -- **HardReserveUsedSpace** No content is currently available. -- **ScratchReserveSize** No content is currently available. -- **ScratchReserveUsedSpace** No content is currently available. -- **SoftReserveSize** No content is currently available. -- **SoftReserveUsedSpace** No content is currently available. +- **HardReserveSize** The size of the hard reserve when Turn Off is called. +- **HardReserveUsedSpace** The amount of space used by the hard reserve when Turn Off is called +- **ScratchReserveSize** The size of the scratch reserve when Turn Off is called. +- **ScratchReserveUsedSpace** The amount of space used by the scratch reserve when Turn Off is called. +- **SoftReserveSize** The size of the soft reserve when Turn Off is called. +- **SoftReserveUsedSpace** The amount of the soft reserve used when Turn Off is called. ### Microsoft.Windows.UpdateReserveManager.UpdatePendingHardReserveAdjustment From 4adeb8d342d599d3e2844144dab99820ee0f6819 Mon Sep 17 00:00:00 2001 From: Brian Lich Date: Wed, 13 Feb 2019 14:03:24 -0800 Subject: [PATCH 033/724] new build --- .../basic-level-windows-diagnostic-events-and-fields-19H1.md | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/windows/privacy/basic-level-windows-diagnostic-events-and-fields-19H1.md b/windows/privacy/basic-level-windows-diagnostic-events-and-fields-19H1.md index dbaadb2de5..ad1566b7b2 100644 --- a/windows/privacy/basic-level-windows-diagnostic-events-and-fields-19H1.md +++ b/windows/privacy/basic-level-windows-diagnostic-events-and-fields-19H1.md @@ -4171,7 +4171,7 @@ The following fields are available: - **CurrentMobileOperator** The mobile operator the device is currently connected to. - **DeviceModel** What is the device model. - **DownloadPriority** Indicates whether a download happened at background, normal, or foreground priority. -- **DownloadProps** No content is currently available. +- **DownloadProps** Information about the download operation properties in the form of a bitmask. - **EventInstanceID** A globally unique identifier for event instance. - **EventScenario** Indicates the purpose of sending this event - whether because the software distribution just started downloading content, or whether it was cancelled, succeeded, or failed. - **EventType** Possible values are Child, Bundle, or Driver. From b3537b04295e09eadf44cd9b7dcc6eeef5ba2a97 Mon Sep 17 00:00:00 2001 From: Brian Lich Date: Fri, 15 Feb 2019 09:11:01 -0800 Subject: [PATCH 034/724] new build --- .../basic-level-windows-diagnostic-events-and-fields-19H1.md | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/windows/privacy/basic-level-windows-diagnostic-events-and-fields-19H1.md b/windows/privacy/basic-level-windows-diagnostic-events-and-fields-19H1.md index ad1566b7b2..0e7eebb254 100644 --- a/windows/privacy/basic-level-windows-diagnostic-events-and-fields-19H1.md +++ b/windows/privacy/basic-level-windows-diagnostic-events-and-fields-19H1.md @@ -9,7 +9,7 @@ ms.pagetype: security localizationpriority: high author: brianlic-msft ms.author: brianlic -ms.date: 02/13/2019 +ms.date: 02/15/2019 --- From 6e0a0fca1b293dc2072fe464355c712c42444f47 Mon Sep 17 00:00:00 2001 From: Brian Lich Date: Mon, 4 Mar 2019 14:28:11 -0800 Subject: [PATCH 035/724] new build --- ...ndows-diagnostic-events-and-fields-1703.md | 65 +- ...ndows-diagnostic-events-and-fields-1709.md | 10 +- ...ndows-diagnostic-events-and-fields-1803.md | 10 +- ...ndows-diagnostic-events-and-fields-1809.md | 15765 ++++++++-------- 4 files changed, 8183 insertions(+), 7667 deletions(-) diff --git a/windows/privacy/basic-level-windows-diagnostic-events-and-fields-1703.md b/windows/privacy/basic-level-windows-diagnostic-events-and-fields-1703.md index eaf8f033d0..5dfc2fcfac 100644 --- a/windows/privacy/basic-level-windows-diagnostic-events-and-fields-1703.md +++ b/windows/privacy/basic-level-windows-diagnostic-events-and-fields-1703.md @@ -7,13 +7,13 @@ ms.mktglfcycl: manage ms.sitesec: library ms.pagetype: security localizationpriority: high -audience: ITPro author: brianlic-msft ms.author: brianlic manager: dansimp ms.collection: M365-security-compliance ms.topic: article -ms.date: 02/15/2019 +audience: ITPro +ms.date: 03/04/2019 --- @@ -1822,61 +1822,6 @@ The following fields are available: ## Diagnostic data events -### TelClientSynthetic.AbnormalShutdown_0 - -This event sends data about boot IDs for which a normal clean shutdown was not observed, to help keep Windows up to date. - -The following fields are available: - -- **AbnormalShutdownBootId** Retrieves the Boot ID for which the abnormal shutdown was observed. -- **CrashDumpEnabled** Indicates whether crash dumps are enabled. -- **CumulativeCrashCount** Cumulative count of operating system crashes since the BootId reset. -- **CurrentBootId** BootId at the time the abnormal shutdown event was being reported. -- **FirmwareResetReasonEmbeddedController** Firmware-supplied reason for the reset. -- **FirmwareResetReasonEmbeddedControllerAdditional** Additional data related to the reset reason provided by the firmware. -- **FirmwareResetReasonPch** Hardware-supplied reason for the reset. -- **FirmwareResetReasonPchAdditional** Additional data related to the reset reason provided by the hardware. -- **FirmwareResetReasonSupplied** Indicates whether the firmware supplied any reset reason. -- **FirmwareType** ID of the FirmwareType as enumerated in DimFirmwareType. -- **HardwareWatchdogTimerGeneratedLastReset** Indicates whether the hardware watchdog timer caused the last reset. -- **HardwareWatchdogTimerPresent** Indicates whether hardware watchdog timer was present or not. -- **LastBugCheckBootId** The Boot ID of the last captured crash. -- **LastBugCheckCode** Code that indicates the type of error. -- **LastBugCheckContextFlags** Additional crash dump settings. -- **LastBugCheckOriginalDumpType** The type of crash dump the system intended to save. -- **LastBugCheckOtherSettings** Other crash dump settings. -- **LastBugCheckParameter1** The first parameter with additional info on the type of the error. -- **LastBugCheckProgress** Progress towards writing out the last crash dump. -- **LastSuccessfullyShutdownBootId** The Boot ID of the last fully successful shutdown. -- **PowerButtonCumulativePressCount** Indicates the number of times the power button has been pressed ("pressed" not to be confused with "released"). -- **PowerButtonCumulativeReleaseCount** Indicates the number of times the power button has been released ("released" not to be confused with "pressed"). -- **PowerButtonErrorCount** Indicates the number of times there was an error attempting to record Power Button metrics (e.g.: due to a failure to lock/update the bootstat file). -- **PowerButtonLastPressBootId** The Boot ID of the last time the Power Button was detected to have been pressed ("pressed" not to be confused with "released"). -- **PowerButtonLastPressTime** The date and time the Power Button was most recently pressed ("pressed" not to be confused with "released"). -- **PowerButtonLastReleaseBootId** The Boot ID of the last time the Power Button was released ("released" not to be confused with "pressed"). -- **PowerButtonLastReleaseTime** The date and time the Power Button was most recently released ("released" not to be confused with "pressed"). -- **PowerButtonPressCurrentCsPhase** Represents the phase of Connected Standby exit when the power button was pressed. -- **PowerButtonPressIsShutdownInProgress** Indicates whether a system shutdown was in progress at the last time the Power Button was pressed. -- **PowerButtonPressLastPowerWatchdogStage** The last stage completed when the Power Button was most recently pressed. -- **PowerButtonPressPowerWatchdogArmed** Indicates whether or not the watchdog for the monitor was active at the time of the last power button press. -- **TransitionInfoBootId** The Boot ID of the captured transition information. -- **TransitionInfoCSCount** The total number of times the system transitioned from "Connected Standby" mode to "On" when the last marker was saved. -- **TransitionInfoCSEntryReason** Indicates the reason the device last entered "Connected Standby" mode ("entered" not to be confused with "exited"). -- **TransitionInfoCSExitReason** Indicates the reason the device last exited "Connected Standby" mode ("exited" not to be confused with "entered"). -- **TransitionInfoCSInProgress** Indicates whether the system was in or entering Connected Standby mode when the last marker was saved. -- **TransitionInfoLastReferenceTimeChecksum** The checksum of TransitionInfoLastReferenceTimestamp. -- **TransitionInfoLastReferenceTimestamp** The date and time that the marker was last saved. -- **TransitionInfoPowerButtonTimestamp** The most recent date and time when the Power Button was pressed (collected via a different mechanism than PowerButtonLastPressTime). -- **TransitionInfoSleepInProgress** Indicates whether the system was in or entering Sleep mode when the last marker was saved. -- **TransitionInfoSleepTranstionsToOn** The total number of times the system transitioned from Sleep mode to on, when the last marker was saved. -- **TransitionInfoSystemRunning** Indicates whether the system was running when the last marker was saved. -- **TransitionInfoSystemShutdownInProgress** Indicates whether a device shutdown was in progress when the power button was pressed. -- **TransitionInfoUserShutdownInProgress** Indicates whether a user shutdown was in progress when the power button was pressed. -- **TransitionLatestCheckpointId** Represents a unique identifier for a checkpoint during the device state transition. -- **TransitionLatestCheckpointSeqNumber** Represents the chronological sequence number of the checkpoint. -- **TransitionLatestCheckpointType** Represents the type of the checkpoint, which can be the start of a phase, end of a phase, or just informational. - - ### TelClientSynthetic.AuthorizationInfo_RuntimeTransition This event sends data indicating that a device has undergone a change of telemetry opt-in level detected at UTC startup, to help keep Windows up to date. The telemetry opt-in level signals what data we are allowed to collect. @@ -6296,6 +6241,12 @@ This event sends data specific to the FixupEditionId mitigation used for OS Upda ## Windows Update Reserve Manager events +### Microsoft.Windows.UpdateReserveManager.InitializeUpdateReserveManager + +This event returns data about the Update Reserve Manager, including whether it’s been initialized. + + + ### Microsoft.Windows.UpdateReserveManager.RemovePendingHardReserveAdjustment This event is sent when the Update Reserve Manager removes a pending hard reserve adjustment. diff --git a/windows/privacy/basic-level-windows-diagnostic-events-and-fields-1709.md b/windows/privacy/basic-level-windows-diagnostic-events-and-fields-1709.md index 27fcd87f88..d516d29754 100644 --- a/windows/privacy/basic-level-windows-diagnostic-events-and-fields-1709.md +++ b/windows/privacy/basic-level-windows-diagnostic-events-and-fields-1709.md @@ -7,13 +7,13 @@ ms.mktglfcycl: manage ms.sitesec: library ms.pagetype: security localizationpriority: high -audience: ITPro author: brianlic-msft ms.author: brianlic manager: dansimp ms.collection: M365-security-compliance ms.topic: article -ms.date: 02/15/2019 +audience: ITPro +ms.date: 03/04/2019 --- @@ -6514,6 +6514,12 @@ The following fields are available: ## Windows Update Reserve Manager events +### Microsoft.Windows.UpdateReserveManager.InitializeUpdateReserveManager + +This event returns data about the Update Reserve Manager, including whether it’s been initialized. + + + ### Microsoft.Windows.UpdateReserveManager.RemovePendingHardReserveAdjustment This event is sent when the Update Reserve Manager removes a pending hard reserve adjustment. diff --git a/windows/privacy/basic-level-windows-diagnostic-events-and-fields-1803.md b/windows/privacy/basic-level-windows-diagnostic-events-and-fields-1803.md index e3c6418b17..6c84d0381d 100644 --- a/windows/privacy/basic-level-windows-diagnostic-events-and-fields-1803.md +++ b/windows/privacy/basic-level-windows-diagnostic-events-and-fields-1803.md @@ -7,13 +7,13 @@ ms.mktglfcycl: manage ms.sitesec: library ms.pagetype: security localizationpriority: high -audience: ITPro author: brianlic-msft ms.author: brianlic manager: dansimp ms.collection: M365-security-compliance ms.topic: article -ms.date: 02/15/2019 +audience: ITPro +ms.date: 03/04/2019 --- @@ -7646,6 +7646,12 @@ This event is sent when the Update Reserve Manager returns an error from one of +### Microsoft.Windows.UpdateReserveManager.InitializeUpdateReserveManager + +This event returns data about the Update Reserve Manager, including whether it’s been initialized. + + + ### Microsoft.Windows.UpdateReserveManager.PrepareTIForReserveInitialization This event is sent when the Update Reserve Manager prepares the Trusted Installer to initialize reserves on the next boot. diff --git a/windows/privacy/basic-level-windows-diagnostic-events-and-fields-1809.md b/windows/privacy/basic-level-windows-diagnostic-events-and-fields-1809.md index 8916790a12..0ed80bd117 100644 --- a/windows/privacy/basic-level-windows-diagnostic-events-and-fields-1809.md +++ b/windows/privacy/basic-level-windows-diagnostic-events-and-fields-1809.md @@ -1,7606 +1,8159 @@ ---- -description: Use this article to learn more about what Windows diagnostic data is gathered at the basic level. -title: Windows 10, version 1809 basic diagnostic events and fields (Windows 10) -keywords: privacy, telemetry -ms.prod: w10 -ms.mktglfcycl: manage -ms.sitesec: library -ms.pagetype: security -localizationpriority: high -audience: ITPro -author: brianlic-msft -ms.author: brianlic -manager: dansimp -ms.collection: M365-security-compliance -ms.topic: article -ms.date: 02/15/2019 ---- - - -# Windows 10, version 1809 basic level Windows diagnostic events and fields - - **Applies to** - -- Windows 10, version 1809 - - -The Basic level gathers a limited set of information that is critical for understanding the device and its configuration including: basic device information, quality-related information, app compatibility, and Microsoft Store. When the level is set to Basic, it also includes the Security level information. - -The Basic level helps to identify problems that can occur on a particular device hardware or software configuration. For example, it can help determine if crashes are more frequent on devices with a specific amount of memory or that are running a particular driver version. This helps Microsoft fix operating system or app problems. - -Use this article to learn about diagnostic events, grouped by event area, and the fields within each event. A brief description is provided for each field. Every event generated includes common data, which collects device data. - -You can learn more about Windows functional and diagnostic data through these articles: - - -- [Windows 10, version 1803 basic diagnostic events and fields](basic-level-windows-diagnostic-events-and-fields-1803.md) -- [Windows 10, version 1709 basic diagnostic events and fields](basic-level-windows-diagnostic-events-and-fields-1709.md) -- [Windows 10, version 1703 basic diagnostic events and fields](basic-level-windows-diagnostic-events-and-fields-1703.md) -- [Manage connections from Windows operating system components to Microsoft services](manage-connections-from-windows-operating-system-components-to-microsoft-services.md) -- [Configure Windows diagnostic data in your organization](configure-windows-diagnostic-data-in-your-organization.md) - - - - -## Account trace logging provider events - -### Microsoft.Windows.Mitigation.AccountTraceLoggingProvider.General - -This event provides information about application properties to indicate the successful execution. - -The following fields are available: - -- **AppMode** Indicates the mode the app is being currently run around privileges. -- **ExitCode** Indicates the exit code of the app. -- **Help** Indicates if the app needs to be launched in the help mode. -- **ParseError** Indicates if there was a parse error during the execution. -- **RightsAcquired** Indicates if the right privileges were acquired for successful execution. -- **RightsWereEnabled** Indicates if the right privileges were enabled for successful execution. -- **TestMode** Indicates whether the app is being run in test mode. - - -### Microsoft.Windows.Mitigation.AccountTraceLoggingProvider.GetCount - -This event provides information about the properties of user accounts in the Administrator group. - -The following fields are available: - -- **Internal** Indicates the internal property associated with the count group. -- **LastError** The error code (if applicable) for the cause of the failure to get the count of the user account. -- **Result** The HResult error. - - -## AppLocker events - -### Microsoft.Windows.Security.AppLockerCSP.ActivityStoppedAutomatically - -Automatically closed activity for start/stop operations that aren't explicitly closed. - - - -### Microsoft.Windows.Security.AppLockerCSP.AddParams - -Parameters passed to Add function of the AppLockerCSP Node. - -The following fields are available: - -- **child** The child URI of the node to add. -- **uri** URI of the node relative to %SYSTEM32%/AppLocker. - - -### Microsoft.Windows.Security.AppLockerCSP.AddStart - -Start of "Add" Operation for the AppLockerCSP Node. - - - -### Microsoft.Windows.Security.AppLockerCSP.AddStop - -End of "Add" Operation for AppLockerCSP Node. - -The following fields are available: - -- **hr** The HRESULT returned by Add function in AppLockerCSP. - - -### Microsoft.Windows.Security.AppLockerCSP.CAppLockerCSP::Rollback - -Result of the 'Rollback' operation in AppLockerCSP. - -The following fields are available: - -- **oldId** Previous id for the CSP transaction. -- **txId** Current id for the CSP transaction. - - -### Microsoft.Windows.Security.AppLockerCSP.ClearParams - -Parameters passed to the "Clear" operation for AppLockerCSP. - -The following fields are available: - -- **uri** The URI relative to the %SYSTEM32%\AppLocker folder. - - -### Microsoft.Windows.Security.AppLockerCSP.ClearStart - -Start of the "Clear" operation for the AppLockerCSP Node. - - - -### Microsoft.Windows.Security.AppLockerCSP.ClearStop - -End of the "Clear" operation for the AppLockerCSP node. - -The following fields are available: - -- **hr** HRESULT reported at the end of the 'Clear' function. - - -### Microsoft.Windows.Security.AppLockerCSP.ConfigManagerNotificationStart - -Start of the "ConfigManagerNotification" operation for AppLockerCSP. - -The following fields are available: - -- **NotifyState** State sent by ConfigManager to AppLockerCSP. - - -### Microsoft.Windows.Security.AppLockerCSP.ConfigManagerNotificationStop - -End of the "ConfigManagerNotification" operation for AppLockerCSP. - -The following fields are available: - -- **hr** HRESULT returned by the ConfigManagerNotification function in AppLockerCSP. - - -### Microsoft.Windows.Security.AppLockerCSP.CreateNodeInstanceParams - -Parameters passed to the CreateNodeInstance function of the AppLockerCSP node. - -The following fields are available: - -- **NodeId** NodeId passed to CreateNodeInstance. -- **nodeOps** NodeOperations parameter passed to CreateNodeInstance. -- **uri** URI passed to CreateNodeInstance, relative to %SYSTEM32%\AppLocker. - - -### Microsoft.Windows.Security.AppLockerCSP.CreateNodeInstanceStart - -Start of the "CreateNodeInstance" operation for the AppLockerCSP node. - - - -### Microsoft.Windows.Security.AppLockerCSP.CreateNodeInstanceStop - -End of the "CreateNodeInstance" operation for the AppLockerCSP node - -The following fields are available: - -- **hr** HRESULT returned by the CreateNodeInstance function in AppLockerCSP. - - -### Microsoft.Windows.Security.AppLockerCSP.DeleteChildParams - -Parameters passed to the DeleteChild function of the AppLockerCSP node. - -The following fields are available: - -- **child** The child URI of the node to delete. -- **uri** URI relative to %SYSTEM32%\AppLocker. - - -### Microsoft.Windows.Security.AppLockerCSP.DeleteChildStart - -Start of the "DeleteChild" operation for the AppLockerCSP node. - - - -### Microsoft.Windows.Security.AppLockerCSP.DeleteChildStop - -End of the "DeleteChild" operation for the AppLockerCSP node. - -The following fields are available: - -- **hr** HRESULT returned by the DeleteChild function in AppLockerCSP. - - -### Microsoft.Windows.Security.AppLockerCSP.EnumPolicies - -Logged URI relative to %SYSTEM32%\AppLocker, if the Plugin GUID is null, or the CSP doesn't believe the old policy is present. - -The following fields are available: - -- **uri** URI relative to %SYSTEM32%\AppLocker. - - -### Microsoft.Windows.Security.AppLockerCSP.GetChildNodeNamesParams - -Parameters passed to the GetChildNodeNames function of the AppLockerCSP node. - -The following fields are available: - -- **uri** URI relative to %SYSTEM32%/AppLocker for MDM node. - - -### Microsoft.Windows.Security.AppLockerCSP.GetChildNodeNamesStart - -Start of the "GetChildNodeNames" operation for the AppLockerCSP node. - - - -### Microsoft.Windows.Security.AppLockerCSP.GetChildNodeNamesStop - -End of the "GetChildNodeNames" operation for the AppLockerCSP node. - -The following fields are available: - -- **child[0]** If function succeeded, the first child's name, else "NA". -- **count** If function succeeded, the number of child node names returned by the function, else 0. -- **hr** HRESULT returned by the GetChildNodeNames function of AppLockerCSP. - - -### Microsoft.Windows.Security.AppLockerCSP.GetLatestId - -The result of 'GetLatestId' in AppLockerCSP (the latest time stamped GUID). - -The following fields are available: - -- **dirId** The latest directory identifier found by GetLatestId. -- **id** The id returned by GetLatestId if id > 0 - otherwise the dirId parameter. - - -### Microsoft.Windows.Security.AppLockerCSP.HResultException - -HRESULT thrown by any arbitrary function in AppLockerCSP. - -The following fields are available: - -- **file** File in the OS code base in which the exception occurs. -- **function** Function in the OS code base in which the exception occurs. -- **hr** HRESULT that is reported. -- **line** Line in the file in the OS code base in which the exception occurs. - - -### Microsoft.Windows.Security.AppLockerCSP.SetValueParams - -Parameters passed to the SetValue function of the AppLockerCSP node. - -The following fields are available: - -- **dataLength** Length of the value to set. -- **uri** The node URI to that should contain the value, relative to %SYSTEM32%\AppLocker. - - -### Microsoft.Windows.Security.AppLockerCSP.SetValueStart - -Start of the "SetValue" operation for the AppLockerCSP node. - - - -### Microsoft.Windows.Security.AppLockerCSP.SetValueStop - -End of the "SetValue" operation for the AppLockerCSP node. - -The following fields are available: - -- **hr** HRESULT returned by the SetValue function in AppLockerCSP. - - -### Microsoft.Windows.Security.AppLockerCSP.TryRemediateMissingPolicies - -EntryPoint of fix step or policy remediation, includes URI relative to %SYSTEM32%\AppLocker that needs to be fixed. - -The following fields are available: - -- **uri** URI for node relative to %SYSTEM32%/AppLocker. - - -## Appraiser events - -### Microsoft.Windows.Appraiser.General.ChecksumTotalPictureCount - -This event lists the types of objects and how many of each exist on the client device. This allows for a quick way to ensure that the records present on the server match what is present on the client. - -The following fields are available: - -- **DatasourceApplicationFile_19ASetup** The count of the number of this particular object type present on this device. -- **DatasourceApplicationFile_19H1** The count of the number of this particular object type present on this device. -- **DatasourceApplicationFile_19H1Setup** The count of the number of this particular object type present on this device. -- **DatasourceApplicationFile_RS1** An ID for the system, calculated by hashing hardware identifiers. -- **DatasourceApplicationFile_RS2** An ID for the system, calculated by hashing hardware identifiers. -- **DatasourceApplicationFile_RS3** The count of the number of this particular object type present on this device. -- **DatasourceApplicationFile_RS4** The count of the number of this particular object type present on this device. -- **DatasourceApplicationFile_RS4Setup** The count of the number of this particular object type present on this device. -- **DatasourceApplicationFile_RS5** The count of the number of this particular object type present on this device. -- **DatasourceApplicationFile_RS5Setup** The count of the number of this particular object type present on this device. -- **DatasourceApplicationFile_TH1** The count of the number of this particular object type present on this device. -- **DatasourceApplicationFile_TH2** The count of the number of this particular object type present on this device. -- **DatasourceDevicePnp_19ASetup** The count of the number of this particular object type present on this device. -- **DatasourceDevicePnp_19H1** The count of the number of this particular object type present on this device. -- **DatasourceDevicePnp_19H1Setup** The count of the number of this particular object type present on this device. -- **DatasourceDevicePnp_RS1** The total DataSourceDevicePnp objects targeting Windows 10 version 1607 on this device. -- **DatasourceDevicePnp_RS2** The count of the number of this particular object type present on this device. -- **DatasourceDevicePnp_RS3** The count of the number of this particular object type present on this device. -- **DatasourceDevicePnp_RS3Setup** The count of the number of this particular object type present on this device. -- **DatasourceDevicePnp_RS4** The count of the number of this particular object type present on this device. -- **DatasourceDevicePnp_RS4Setup** The count of the number of this particular object type present on this device. -- **DatasourceDevicePnp_RS5** The count of the number of this particular object type present on this device. -- **DatasourceDevicePnp_RS5Setup** The count of the number of this particular object type present on this device. -- **DatasourceDevicePnp_TH1** The count of the number of this particular object type present on this device. -- **DatasourceDevicePnp_TH2** The count of the number of this particular object type present on this device. -- **DatasourceDriverPackage_19ASetup** The count of the number of this particular object type present on this device. -- **DatasourceDriverPackage_19H1** The count of the number of this particular object type present on this device. -- **DatasourceDriverPackage_19H1Setup** The count of the number of this particular object type present on this device. -- **DatasourceDriverPackage_RS1** The total DataSourceDriverPackage objects targeting Windows 10 version 1607 on this device. -- **DatasourceDriverPackage_RS2** The total DataSourceDriverPackage objects targeting Windows 10, version 1703 on this device. -- **DatasourceDriverPackage_RS3** The count of the number of this particular object type present on this device. -- **DatasourceDriverPackage_RS3Setup** The count of the number of this particular object type present on this device. -- **DatasourceDriverPackage_RS4** The count of the number of this particular object type present on this device. -- **DatasourceDriverPackage_RS4Setup** The count of the number of this particular object type present on this device. -- **DatasourceDriverPackage_RS5** The count of the number of this particular object type present on this device. -- **DatasourceDriverPackage_RS5Setup** The count of the number of this particular object type present on this device. -- **DatasourceDriverPackage_TH1** The count of the number of this particular object type present on this device. -- **DatasourceDriverPackage_TH2** The count of the number of this particular object type present on this device. -- **DataSourceMatchingInfoBlock_19ASetup** The count of the number of this particular object type present on this device. -- **DataSourceMatchingInfoBlock_19H1** The count of the number of this particular object type present on this device. -- **DataSourceMatchingInfoBlock_19H1Setup** The count of the number of this particular object type present on this device. -- **DataSourceMatchingInfoBlock_RS1** The total DataSourceMatchingInfoBlock objects targeting Windows 10 version 1607 on this device. -- **DataSourceMatchingInfoBlock_RS2** The count of the number of this particular object type present on this device. -- **DataSourceMatchingInfoBlock_RS3** The count of the number of this particular object type present on this device. -- **DataSourceMatchingInfoBlock_RS4** The count of the number of this particular object type present on this device. -- **DataSourceMatchingInfoBlock_RS4Setup** The count of the number of this particular object type present on this device. -- **DataSourceMatchingInfoBlock_RS5** The count of the number of this particular object type present on this device. -- **DataSourceMatchingInfoBlock_RS5Setup** The count of the number of this particular object type present on this device. -- **DataSourceMatchingInfoBlock_TH1** The count of the number of this particular object type present on this device. -- **DataSourceMatchingInfoBlock_TH2** The count of the number of this particular object type present on this device. -- **DataSourceMatchingInfoPassive_19ASetup** The count of the number of this particular object type present on this device. -- **DataSourceMatchingInfoPassive_19H1** The count of the number of this particular object type present on this device. -- **DataSourceMatchingInfoPassive_19H1Setup** The count of the number of this particular object type present on this device. -- **DataSourceMatchingInfoPassive_RS1** The total DataSourceMatchingInfoPassive objects targeting Windows 10 version 1607 on this device. -- **DataSourceMatchingInfoPassive_RS2** The count of the number of this particular object type present on this device. -- **DataSourceMatchingInfoPassive_RS3** The count of the number of this particular object type present on this device. -- **DataSourceMatchingInfoPassive_RS4** The count of the number of this particular object type present on this device. -- **DataSourceMatchingInfoPassive_RS4Setup** The count of the number of this particular object type present on this device. -- **DataSourceMatchingInfoPassive_RS5** The count of the number of this particular object type present on this device. -- **DataSourceMatchingInfoPassive_RS5Setup** The count of the number of this particular object type present on this device. -- **DataSourceMatchingInfoPassive_TH1** The count of the number of this particular object type present on this device. -- **DataSourceMatchingInfoPassive_TH2** The count of the number of this particular object type present on this device. -- **DataSourceMatchingInfoPostUpgrade_19ASetup** The count of the number of this particular object type present on this device. -- **DataSourceMatchingInfoPostUpgrade_19H1** The count of the number of this particular object type present on this device. -- **DataSourceMatchingInfoPostUpgrade_19H1Setup** The count of the number of this particular object type present on this device. -- **DataSourceMatchingInfoPostUpgrade_RS1** The total DataSourceMatchingInfoPostUpgrade objects targeting Windows 10 version 1607 on this device. -- **DataSourceMatchingInfoPostUpgrade_RS2** The total DataSourceMatchingInfoPostUpgrade objects targeting Windows 10 version 1703 on this device. -- **DataSourceMatchingInfoPostUpgrade_RS3** The total DataSourceMatchingInfoPostUpgrade objects targeting Windows 10 version 1709 on this device. -- **DataSourceMatchingInfoPostUpgrade_RS4** The count of the number of this particular object type present on this device. -- **DataSourceMatchingInfoPostUpgrade_RS4Setup** The count of the number of this particular object type present on this device. -- **DataSourceMatchingInfoPostUpgrade_RS5** The count of the number of this particular object type present on this device. -- **DataSourceMatchingInfoPostUpgrade_RS5Setup** The count of the number of this particular object type present on this device. -- **DataSourceMatchingInfoPostUpgrade_TH1** The count of the number of this particular object type present on this device. -- **DataSourceMatchingInfoPostUpgrade_TH2** The count of the number of this particular object type present on this device. -- **DatasourceSystemBios_19ASetup** The count of the number of this particular object type present on this device. -- **DatasourceSystemBios_19H1** The count of the number of this particular object type present on this device. -- **DatasourceSystemBios_19H1Setup** The count of the number of this particular object type present on this device. -- **DatasourceSystemBios_RS1** The total DatasourceSystemBios objects targeting Windows 10 version 1607 present on this device. -- **DatasourceSystemBios_RS2** The total DatasourceSystemBios objects targeting Windows 10 version 1703 present on this device. -- **DatasourceSystemBios_RS3** The total DatasourceSystemBios objects targeting Windows 10 version 1709 present on this device. -- **DatasourceSystemBios_RS3Setup** The count of the number of this particular object type present on this device. -- **DatasourceSystemBios_RS4** The count of the number of this particular object type present on this device. -- **DatasourceSystemBios_RS4Setup** The count of the number of this particular object type present on this device. -- **DatasourceSystemBios_RS5** The count of the number of this particular object type present on this device. -- **DatasourceSystemBios_RS5Setup** The count of the number of this particular object type present on this device. -- **DatasourceSystemBios_TH1** The count of the number of this particular object type present on this device. -- **DatasourceSystemBios_TH2** The count of the number of this particular object type present on this device. -- **DecisionApplicationFile_19ASetup** The count of the number of this particular object type present on this device. -- **DecisionApplicationFile_19H1** The count of the number of this particular object type present on this device. -- **DecisionApplicationFile_19H1Setup** The count of the number of this particular object type present on this device. -- **DecisionApplicationFile_RS1** The count of the number of this particular object type present on this device. -- **DecisionApplicationFile_RS2** The count of the number of this particular object type present on this device. -- **DecisionApplicationFile_RS3** The count of the number of this particular object type present on this device. -- **DecisionApplicationFile_RS4** The count of the number of this particular object type present on this device. -- **DecisionApplicationFile_RS4Setup** The count of the number of this particular object type present on this device. -- **DecisionApplicationFile_RS5** The count of the number of this particular object type present on this device. -- **DecisionApplicationFile_RS5Setup** The count of the number of this particular object type present on this device. -- **DecisionApplicationFile_TH1** The count of the number of this particular object type present on this device. -- **DecisionApplicationFile_TH2** The count of the number of this particular object type present on this device. -- **DecisionDevicePnp_19ASetup** The count of the number of this particular object type present on this device. -- **DecisionDevicePnp_19H1** The count of the number of this particular object type present on this device. -- **DecisionDevicePnp_19H1Setup** The count of the number of this particular object type present on this device. -- **DecisionDevicePnp_RS1** The total DecisionDevicePnp objects targeting Windows 10 version 1607 on this device. -- **DecisionDevicePnp_RS2** The count of the number of this particular object type present on this device. -- **DecisionDevicePnp_RS3** The count of the number of this particular object type present on this device. -- **DecisionDevicePnp_RS3Setup** The count of the number of this particular object type present on this device. -- **DecisionDevicePnp_RS4** The count of the number of this particular object type present on this device. -- **DecisionDevicePnp_RS4Setup** The count of the number of this particular object type present on this device. -- **DecisionDevicePnp_RS5** The count of the number of this particular object type present on this device. -- **DecisionDevicePnp_RS5Setup** The count of the number of this particular object type present on this device. -- **DecisionDevicePnp_TH1** The count of the number of this particular object type present on this device. -- **DecisionDevicePnp_TH2** The count of the number of this particular object type present on this device. -- **DecisionDriverPackage_19ASetup** The count of the number of this particular object type present on this device. -- **DecisionDriverPackage_19H1** The count of the number of this particular object type present on this device. -- **DecisionDriverPackage_19H1Setup** The count of the number of this particular object type present on this device. -- **DecisionDriverPackage_RS1** The total DecisionDriverPackage objects targeting Windows 10 version 1607 on this device. -- **DecisionDriverPackage_RS2** The count of the number of this particular object type present on this device. -- **DecisionDriverPackage_RS3** The count of the number of this particular object type present on this device. -- **DecisionDriverPackage_RS3Setup** The count of the number of this particular object type present on this device. -- **DecisionDriverPackage_RS4** The count of the number of this particular object type present on this device. -- **DecisionDriverPackage_RS4Setup** The count of the number of this particular object type present on this device. -- **DecisionDriverPackage_RS5** The count of the number of this particular object type present on this device. -- **DecisionDriverPackage_RS5Setup** The count of the number of this particular object type present on this device. -- **DecisionDriverPackage_TH1** The count of the number of this particular object type present on this device. -- **DecisionDriverPackage_TH2** The count of the number of this particular object type present on this device. -- **DecisionMatchingInfoBlock_19ASetup** The count of the number of this particular object type present on this device. -- **DecisionMatchingInfoBlock_19H1** The count of the number of this particular object type present on this device. -- **DecisionMatchingInfoBlock_19H1Setup** The count of the number of this particular object type present on this device. -- **DecisionMatchingInfoBlock_RS1** The total DecisionMatchingInfoBlock objects targeting Windows 10 version 1607 present on this device. -- **DecisionMatchingInfoBlock_RS2** The total DecisionMatchingInfoBlock objects targeting Windows 10 version 1703 present on this device. -- **DecisionMatchingInfoBlock_RS3** The total DecisionMatchingInfoBlock objects targeting Windows 10 version 1709 present on this device. -- **DecisionMatchingInfoBlock_RS4** The total DecisionMatchingInfoBlock objects targeting Windows 10 version 1803 present on this device. -- **DecisionMatchingInfoBlock_RS4Setup** The count of the number of this particular object type present on this device. -- **DecisionMatchingInfoBlock_RS5** The count of the number of this particular object type present on this device. -- **DecisionMatchingInfoBlock_RS5Setup** The count of the number of this particular object type present on this device. -- **DecisionMatchingInfoBlock_TH1** The count of the number of this particular object type present on this device. -- **DecisionMatchingInfoBlock_TH2** The count of the number of this particular object type present on this device. -- **DecisionMatchingInfoPassive_19ASetup** The count of the number of this particular object type present on this device. -- **DecisionMatchingInfoPassive_19H1** The count of the number of this particular object type present on this device. -- **DecisionMatchingInfoPassive_19H1Setup** The count of the number of this particular object type present on this device. -- **DecisionMatchingInfoPassive_RS1** The total DecisionMatchingInfoPassive objects targeting Windows 10 version 1607 on this device. -- **DecisionMatchingInfoPassive_RS2** The total DecisionMatchingInfoPassive objects targeting Windows 10 version 1703 on this device. -- **DecisionMatchingInfoPassive_RS3** The total DecisionMatchingInfoPassive objects targeting Windows 10 version 1803 on this device. -- **DecisionMatchingInfoPassive_RS4** The count of the number of this particular object type present on this device. -- **DecisionMatchingInfoPassive_RS4Setup** The count of the number of this particular object type present on this device. -- **DecisionMatchingInfoPassive_RS5** The count of the number of this particular object type present on this device. -- **DecisionMatchingInfoPassive_RS5Setup** The count of the number of this particular object type present on this device. -- **DecisionMatchingInfoPassive_TH1** The count of the number of this particular object type present on this device. -- **DecisionMatchingInfoPassive_TH2** The count of the number of this particular object type present on this device. -- **DecisionMatchingInfoPostUpgrade_19ASetup** The count of the number of this particular object type present on this device. -- **DecisionMatchingInfoPostUpgrade_19H1** The count of the number of this particular object type present on this device. -- **DecisionMatchingInfoPostUpgrade_19H1Setup** The count of the number of this particular object type present on this device. -- **DecisionMatchingInfoPostUpgrade_RS1** The total DecisionMatchingInfoPostUpgrade objects targeting Windows 10 version 1607 on this device. -- **DecisionMatchingInfoPostUpgrade_RS2** The total DecisionMatchingInfoPostUpgrade objects targeting Windows 10 version 1703 on this device. -- **DecisionMatchingInfoPostUpgrade_RS3** The total DecisionMatchingInfoPostUpgrade objects targeting Windows 10 version 1709 on this device. -- **DecisionMatchingInfoPostUpgrade_RS4** The count of the number of this particular object type present on this device. -- **DecisionMatchingInfoPostUpgrade_RS4Setup** The count of the number of this particular object type present on this device. -- **DecisionMatchingInfoPostUpgrade_RS5** The count of the number of this particular object type present on this device. -- **DecisionMatchingInfoPostUpgrade_RS5Setup** The count of the number of this particular object type present on this device. -- **DecisionMatchingInfoPostUpgrade_TH1** The count of the number of this particular object type present on this device. -- **DecisionMatchingInfoPostUpgrade_TH2** The count of the number of this particular object type present on this device. -- **DecisionMediaCenter_19ASetup** The count of the number of this particular object type present on this device. -- **DecisionMediaCenter_19H1** The count of the number of this particular object type present on this device. -- **DecisionMediaCenter_19H1Setup** The total DecisionMediaCenter objects targeting the next release of Windows on this device. -- **DecisionMediaCenter_RS1** The total DecisionMediaCenter objects targeting Windows 10 version 1607 present on this device. -- **DecisionMediaCenter_RS2** The total DecisionMediaCenter objects targeting Windows 10 version 1703 present on this device. -- **DecisionMediaCenter_RS3** The total DecisionMediaCenter objects targeting Windows 10 version 1709 present on this device. -- **DecisionMediaCenter_RS4** The total DecisionMediaCenter objects targeting Windows 10 version 1803 present on this device. -- **DecisionMediaCenter_RS4Setup** The count of the number of this particular object type present on this device. -- **DecisionMediaCenter_RS5** The count of the number of this particular object type present on this device. -- **DecisionMediaCenter_RS5Setup** The count of the number of this particular object type present on this device. -- **DecisionMediaCenter_TH1** The count of the number of this particular object type present on this device. -- **DecisionMediaCenter_TH2** The count of the number of this particular object type present on this device. -- **DecisionSystemBios_19ASetup** The total DecisionSystemBios objects targeting the next release of Windows on this device. -- **DecisionSystemBios_19H1** The count of the number of this particular object type present on this device. -- **DecisionSystemBios_19H1Setup** The total DecisionSystemBios objects targeting the next release of Windows on this device. -- **DecisionSystemBios_RS1** The total DecisionSystemBios objects targeting Windows 10 version 1607 on this device. -- **DecisionSystemBios_RS2** The total DecisionSystemBios objects targeting Windows 10 version 1703 on this device. -- **DecisionSystemBios_RS3** The total DecisionSystemBios objects targeting Windows 10 version 1709 on this device. -- **DecisionSystemBios_RS3Setup** The count of the number of this particular object type present on this device. -- **DecisionSystemBios_RS4** The total DecisionSystemBios objects targeting Windows 10 version, 1803 present on this device. -- **DecisionSystemBios_RS4Setup** The total DecisionSystemBios objects targeting the next release of Windows on this device. -- **DecisionSystemBios_RS5** The total DecisionSystemBios objects targeting the next release of Windows on this device. -- **DecisionSystemBios_RS5Setup** The total DecisionSystemBios objects targeting the next release of Windows on this device. -- **DecisionSystemBios_TH1** The count of the number of this particular object type present on this device. -- **DecisionSystemBios_TH2** The count of the number of this particular object type present on this device. -- **DecisionSystemProcessor_RS2** The count of the number of this particular object type present on this device. -- **DecisionTest_RS1** An ID for the system, calculated by hashing hardware identifiers. -- **InventoryApplicationFile** The count of the number of this particular object type present on this device. -- **InventoryDeviceContainer** A count of device container objects in cache. -- **InventoryDevicePnp** A count of device Plug and Play objects in cache. -- **InventoryDriverBinary** A count of driver binary objects in cache. -- **InventoryDriverPackage** A count of device objects in cache. -- **InventoryLanguagePack** The count of the number of this particular object type present on this device. -- **InventoryMediaCenter** The count of the number of this particular object type present on this device. -- **InventorySystemBios** The count of the number of this particular object type present on this device. -- **InventorySystemMachine** The count of the number of this particular object type present on this device. -- **InventorySystemProcessor** The count of the number of this particular object type present on this device. -- **InventoryTest** The count of the number of this particular object type present on this device. -- **InventoryUplevelDriverPackage** The count of the number of this particular object type present on this device. -- **PCFP** The count of the number of this particular object type present on this device. -- **SystemMemory** The count of the number of this particular object type present on this device. -- **SystemProcessorCompareExchange** The count of the number of this particular object type present on this device. -- **SystemProcessorLahfSahf** The count of the number of this particular object type present on this device. -- **SystemProcessorNx** The total number of objects of this type present on this device. -- **SystemProcessorPrefetchW** The total number of objects of this type present on this device. -- **SystemProcessorSse2** The total number of objects of this type present on this device. -- **SystemTouch** The count of the number of this particular object type present on this device. -- **SystemWim** The total number of objects of this type present on this device. -- **SystemWindowsActivationStatus** The count of the number of this particular object type present on this device. -- **SystemWlan** The total number of objects of this type present on this device. -- **Wmdrm_19ASetup** The count of the number of this particular object type present on this device. -- **Wmdrm_19H1** The count of the number of this particular object type present on this device. -- **Wmdrm_19H1Setup** The total Wmdrm objects targeting the next release of Windows on this device. -- **Wmdrm_RS1** An ID for the system, calculated by hashing hardware identifiers. -- **Wmdrm_RS2** An ID for the system, calculated by hashing hardware identifiers. -- **Wmdrm_RS3** An ID for the system, calculated by hashing hardware identifiers. -- **Wmdrm_RS4** The total Wmdrm objects targeting Windows 10, version 1803 present on this device. -- **Wmdrm_RS4Setup** The count of the number of this particular object type present on this device. -- **Wmdrm_RS5** The count of the number of this particular object type present on this device. -- **Wmdrm_RS5Setup** The count of the number of this particular object type present on this device. -- **Wmdrm_TH1** The count of the number of this particular object type present on this device. -- **Wmdrm_TH2** The count of the number of this particular object type present on this device. - - -### Microsoft.Windows.Appraiser.General.DatasourceApplicationFileAdd - -Represents the basic metadata about specific application files installed on the system. - -This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedeviceinventorychange). - -The following fields are available: - -- **AppraiserVersion** The version of the appraiser file that is generating the events. -- **AvDisplayName** If the app is an anti-virus app, this is its display name. -- **CompatModelIndex** The compatibility prediction for this file. -- **HasCitData** Indicates whether the file is present in CIT data. -- **HasUpgradeExe** Indicates whether the anti-virus app has an upgrade.exe file. -- **IsAv** Is the file an anti-virus reporting EXE? -- **ResolveAttempted** This will always be an empty string when sending telemetry. -- **SdbEntries** An array of fields that indicates the SDB entries that apply to this file. - - -### Microsoft.Windows.Appraiser.General.DatasourceApplicationFileRemove - -This event indicates that the DatasourceApplicationFile object is no longer present. - -This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedeviceinventorychange). - -The following fields are available: - -- **AppraiserVersion** The version of the Appraiser file that is generating the events. - - -### Microsoft.Windows.Appraiser.General.DatasourceApplicationFileStartSync - -This event indicates that a new set of DatasourceApplicationFileAdd events will be sent. - -This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedeviceinventorychange). - -The following fields are available: - -- **AppraiserVersion** The version of the Appraiser file that is generating the events. - - -### Microsoft.Windows.Appraiser.General.DatasourceDevicePnpAdd - -This event sends compatibility data for a Plug and Play device, to help keep Windows up to date. - -This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedeviceinventorychange). - -The following fields are available: - -- **ActiveNetworkConnection** Indicates whether the device is an active network device. -- **AppraiserVersion** The version of the appraiser file generating the events. -- **CosDeviceRating** An enumeration that indicates if there is a driver on the target operating system. -- **CosDeviceSolution** An enumeration that indicates how a driver on the target operating system is available. -- **CosDeviceSolutionUrl** Microsoft.Windows.Appraiser.General.DatasourceDevicePnpAdd . Empty string -- **CosPopulatedFromId** The expected uplevel driver matching ID based on driver coverage data. -- **IsBootCritical** Indicates whether the device boot is critical. -- **UplevelInboxDriver** Indicates whether there is a driver uplevel for this device. -- **WuDriverCoverage** Indicates whether there is a driver uplevel for this device, according to Windows Update. -- **WuDriverUpdateId** The Windows Update ID of the applicable uplevel driver. -- **WuPopulatedFromId** The expected uplevel driver matching ID based on driver coverage from Windows Update. - - -### Microsoft.Windows.Appraiser.General.DatasourceDevicePnpRemove - -This event indicates that the DatasourceDevicePnp object is no longer present. - -This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedeviceinventorychange). - -The following fields are available: - -- **AppraiserVersion** The version of the Appraiser file that is generating the events. - - -### Microsoft.Windows.Appraiser.General.DatasourceDevicePnpStartSync - -This event indicates that a new set of DatasourceDevicePnpAdd events will be sent. - -This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedeviceinventorychange). - -The following fields are available: - -- **AppraiserVersion** The version of the Appraiser file that is generating the events. - - -### Microsoft.Windows.Appraiser.General.DatasourceDriverPackageAdd - -This event sends compatibility database data about driver packages to help keep Windows up to date. - -This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedeviceinventorychange). - -The following fields are available: - -- **AppraiserVersion** The version of the appraiser file generating the events. - - -### Microsoft.Windows.Appraiser.General.DatasourceDriverPackageStartSync - -This event indicates that a new set of DatasourceDriverPackageAdd events will be sent. - -This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedeviceinventorychange). - -The following fields are available: - -- **AppraiserVersion** The version of the Appraiser file that is generating the events. - - -### Microsoft.Windows.Appraiser.General.DataSourceMatchingInfoBlockAdd - -This event sends blocking data about any compatibility blocking entries hit on the system that are not directly related to specific applications or devices, to help keep Windows up-to-date. - -This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedeviceinventorychange). - -The following fields are available: - -- **AppraiserVersion** The version of the appraiser file generating the events. - - -### Microsoft.Windows.Appraiser.General.DataSourceMatchingInfoBlockRemove - -This event indicates that the DataSourceMatchingInfoBlock object is no longer present. - -This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedeviceinventorychange). - -The following fields are available: - -- **AppraiserVersion** The version of the Appraiser file that is generating the events. - - -### Microsoft.Windows.Appraiser.General.DataSourceMatchingInfoBlockStartSync - -This event indicates that a full set of DataSourceMatchingInfoBlockStAdd events have been sent. - -This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedeviceinventorychange). - -The following fields are available: - -- **AppraiserVersion** The version of the Appraiser file that is generating the events. - - -### Microsoft.Windows.Appraiser.General.DataSourceMatchingInfoPassiveAdd - -This event sends compatibility database information about non-blocking compatibility entries on the system that are not keyed by either applications or devices, to help keep Windows up-to-date. - -This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedeviceinventorychange). - -The following fields are available: - -- **AppraiserVersion** The version of the appraiser file generating the events. - - -### Microsoft.Windows.Appraiser.General.DataSourceMatchingInfoPassiveRemove - -This event indicates that the DataSourceMatchingInfoPassive object is no longer present. - -This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedeviceinventorychange). - -The following fields are available: - -- **AppraiserVersion** The version of the Appraiser file that is generating the events. - - -### Microsoft.Windows.Appraiser.General.DataSourceMatchingInfoPassiveStartSync - -This event indicates that a new set of DataSourceMatchingInfoPassiveAdd events will be sent. - -This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedeviceinventorychange). - -The following fields are available: - -- **AppraiserVersion** The version of the Appraiser file that is generating the events. - - -### Microsoft.Windows.Appraiser.General.DataSourceMatchingInfoPostUpgradeAdd - -This event sends compatibility database information about entries requiring reinstallation after an upgrade on the system that are not keyed by either applications or devices, to help keep Windows up-to-date. - -This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedeviceinventorychange). - -The following fields are available: - -- **AppraiserVersion** The version of the appraiser file generating the events. - - -### Microsoft.Windows.Appraiser.General.DataSourceMatchingInfoPostUpgradeRemove - -This event indicates that the DataSourceMatchingInfoPostUpgrade object is no longer present. - -This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedeviceinventorychange). - -The following fields are available: - -- **AppraiserVersion** The version of the Appraiser file that is generating the events. - - -### Microsoft.Windows.Appraiser.General.DataSourceMatchingInfoPostUpgradeStartSync - -This event indicates that a new set of DataSourceMatchingInfoPostUpgradeAdd events will be sent. - -This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedeviceinventorychange). - -The following fields are available: - -- **AppraiserVersion** The version of the Appraiser file that is generating the events. - - -### Microsoft.Windows.Appraiser.General.DatasourceSystemBiosAdd - -This event sends compatibility database information about the BIOS to help keep Windows up-to-date. - -This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedeviceinventorychange). - -The following fields are available: - -- **AppraiserVersion** The version of the Appraiser file generating the events. - - -### Microsoft.Windows.Appraiser.General.DatasourceSystemBiosRemove - -This event indicates that the DatasourceSystemBios object is no longer present. - -This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedeviceinventorychange). - -The following fields are available: - -- **AppraiserVersion** The version of the Appraiser file that is generating the events. - - -### Microsoft.Windows.Appraiser.General.DatasourceSystemBiosStartSync - -This event indicates that a new set of DatasourceSystemBiosAdd events will be sent. - -This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedeviceinventorychange). - -The following fields are available: - -- **AppraiserVersion** The version of the Appraiser file that is generating the events. - - -### Microsoft.Windows.Appraiser.General.DecisionApplicationFileAdd - -This event sends compatibility decision data about a file to help keep Windows up-to-date. - -This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedeviceinventorychange). - -The following fields are available: - -- **AppraiserVersion** The version of the appraiser file that is generating the events. -- **BlockAlreadyInbox** The uplevel runtime block on the file already existed on the current OS. -- **BlockingApplication** Indicates whether there are any application issues that interfere with the upgrade due to the file in question. -- **DisplayGenericMessage** Will be a generic message be shown for this file? -- **DisplayGenericMessageGated** Indicates whether a generic message be shown for this file. -- **HardBlock** This file is blocked in the SDB. -- **HasUxBlockOverride** Does the file have a block that is overridden by a tag in the SDB? -- **MigApplication** Does the file have a MigXML from the SDB associated with it that applies to the current upgrade mode? -- **MigRemoval** Does the file have a MigXML from the SDB that will cause the app to be removed on upgrade? -- **NeedsDismissAction** Will the file cause an action that can be dimissed? -- **NeedsInstallPostUpgradeData** After upgrade, the file will have a post-upgrade notification to install a replacement for the app. -- **NeedsNotifyPostUpgradeData** Does the file have a notification that should be shown after upgrade? -- **NeedsReinstallPostUpgradeData** After upgrade, this file will have a post-upgrade notification to reinstall the app. -- **NeedsUninstallAction** The file must be uninstalled to complete the upgrade. -- **SdbBlockUpgrade** The file is tagged as blocking upgrade in the SDB, -- **SdbBlockUpgradeCanReinstall** The file is tagged as blocking upgrade in the SDB. It can be reinstalled after upgrade. -- **SdbBlockUpgradeUntilUpdate** The file is tagged as blocking upgrade in the SDB. If the app is updated, the upgrade can proceed. -- **SdbReinstallUpgrade** The file is tagged as needing to be reinstalled after upgrade in the SDB. It does not block upgrade. -- **SdbReinstallUpgradeWarn** The file is tagged as needing to be reinstalled after upgrade with a warning in the SDB. It does not block upgrade. -- **SoftBlock** The file is softblocked in the SDB and has a warning. - - -### Microsoft.Windows.Appraiser.General.DecisionApplicationFileRemove - -This event indicates Indicates that the DecisionApplicationFile object is no longer present. - -This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedeviceinventorychange). - -The following fields are available: - -- **AppraiserVersion** The version of the Appraiser file that is generating the events. - - -### Microsoft.Windows.Appraiser.General.DecisionApplicationFileStartSync - -This event indicates that a new set of DecisionApplicationFileAdd events will be sent. - -This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedeviceinventorychange). - -The following fields are available: - -- **AppraiserVersion** The version of the Appraiser file that is generating the events. - - -### Microsoft.Windows.Appraiser.General.DecisionDevicePnpAdd - -This event sends compatibility decision data about a PNP device to help keep Windows up to date. - -This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedeviceinventorychange). - -The following fields are available: - -- **AppraiserVersion** The version of the appraiser file generating the events. -- **AssociatedDriverIsBlocked** Is the driver associated with this PNP device blocked? -- **AssociatedDriverWillNotMigrate** Will the driver associated with this plug-and-play device migrate? -- **BlockAssociatedDriver** Should the driver associated with this PNP device be blocked? -- **BlockingDevice** Is this PNP device blocking upgrade? -- **BlockUpgradeIfDriverBlocked** Is the PNP device both boot critical and does not have a driver included with the OS? -- **BlockUpgradeIfDriverBlockedAndOnlyActiveNetwork** Is this PNP device the only active network device? -- **DisplayGenericMessage** Will a generic message be shown during Setup for this PNP device? -- **DisplayGenericMessageGated** Indicates whether a generic message will be shown during Setup for this PNP device. -- **DriverAvailableInbox** Is a driver included with the operating system for this PNP device? -- **DriverAvailableOnline** Is there a driver for this PNP device on Windows Update? -- **DriverAvailableUplevel** Is there a driver on Windows Update or included with the operating system for this PNP device? -- **DriverBlockOverridden** Is there is a driver block on the device that has been overridden? -- **NeedsDismissAction** Will the user would need to dismiss a warning during Setup for this device? -- **NotRegressed** Does the device have a problem code on the source OS that is no better than the one it would have on the target OS? -- **SdbDeviceBlockUpgrade** Is there an SDB block on the PNP device that blocks upgrade? -- **SdbDriverBlockOverridden** Is there an SDB block on the PNP device that blocks upgrade, but that block was overridden? - - -### Microsoft.Windows.Appraiser.General.DecisionDevicePnpRemove - -This event indicates that the DecisionDevicePnp object is no longer present. - -This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedeviceinventorychange). - -The following fields are available: - -- **AppraiserVersion** The version of the Appraiser file that is generating the events. - - -### Microsoft.Windows.Appraiser.General.DecisionDevicePnpStartSync - -The DecisionDevicePnpStartSync event indicates that a new set of DecisionDevicePnpAdd events will be sent. - -This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedeviceinventorychange). - -The following fields are available: - -- **AppraiserVersion** The version of the Appraiser file that is generating the events. - - -### Microsoft.Windows.Appraiser.General.DecisionDriverPackageAdd - -This event sends decision data about driver package compatibility to help keep Windows up to date. - -This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedeviceinventorychange). - -The following fields are available: - -- **AppraiserVersion** The version of the appraiser file generating the events. -- **DisplayGenericMessageGated** Indicates whether a generic offer block message will be shown for this driver package. -- **DriverBlockOverridden** Does the driver package have an SDB block that blocks it from migrating, but that block has been overridden? -- **DriverIsDeviceBlocked** Was the driver package was blocked because of a device block? -- **DriverIsDriverBlocked** Is the driver package blocked because of a driver block? -- **DriverIsTroubleshooterBlocked** Indicates whether the driver package is blocked because of a troubleshooter block. -- **DriverShouldNotMigrate** Should the driver package be migrated during upgrade? -- **SdbDriverBlockOverridden** Does the driver package have an SDB block that blocks it from migrating, but that block has been overridden? - - -### Microsoft.Windows.Appraiser.General.DecisionDriverPackageRemove - -This event indicates that the DecisionDriverPackage object is no longer present. - -This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedeviceinventorychange). - -The following fields are available: - -- **AppraiserVersion** The version of the Appraiser file that is generating the events. - - -### Microsoft.Windows.Appraiser.General.DecisionDriverPackageStartSync - -This event indicates that a new set of DecisionDriverPackageAdd events will be sent. - -This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedeviceinventorychange). - -The following fields are available: - -- **AppraiserVersion** The version of the Appraiser file that is generating the events. - - -### Microsoft.Windows.Appraiser.General.DecisionMatchingInfoBlockAdd - -This event sends compatibility decision data about blocking entries on the system that are not keyed by either applications or devices, to help keep Windows up to date. - -This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedeviceinventorychange). - -The following fields are available: - -- **AppraiserVersion** The version of the appraiser file generating the events. -- **BlockingApplication** Are there are any application issues that interfere with upgrade due to matching info blocks? -- **DisplayGenericMessage** Will a generic message be shown for this block? -- **NeedsUninstallAction** Does the user need to take an action in setup due to a matching info block? -- **SdbBlockUpgrade** Is a matching info block blocking upgrade? -- **SdbBlockUpgradeCanReinstall** Is a matching info block blocking upgrade, but has the can reinstall tag? -- **SdbBlockUpgradeUntilUpdate** Is a matching info block blocking upgrade but has the until update tag? - - -### Microsoft.Windows.Appraiser.General.DecisionMatchingInfoBlockRemove - -This event indicates that the DecisionMatchingInfoBlock object is no longer present. - -This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedeviceinventorychange). - -The following fields are available: - -- **AppraiserVersion** The version of the Appraiser file that is generating the events. - - -### Microsoft.Windows.Appraiser.General.DecisionMatchingInfoBlockStartSync - -This event indicates that a new set of DecisionMatchingInfoBlockAdd events will be sent. - -This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedeviceinventorychange). - -The following fields are available: - -- **AppraiserVersion** The version of the Appraiser file that is generating the events. - - -### Microsoft.Windows.Appraiser.General.DecisionMatchingInfoPassiveAdd - -This event sends compatibility decision data about non-blocking entries on the system that are not keyed by either applications or devices, to help keep Windows up to date. - -This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedeviceinventorychange). - -The following fields are available: - -- **AppraiserVersion** The version of the Appraiser file that is generating the events. -- **BlockingApplication** Are there any application issues that interfere with upgrade due to matching info blocks? -- **DisplayGenericMessageGated** Indicates whether a generic offer block message will be shown due to matching info blocks. -- **MigApplication** Is there a matching info block with a mig for the current mode of upgrade? - - -### Microsoft.Windows.Appraiser.General.DecisionMatchingInfoPassiveRemove - -This event Indicates that the DecisionMatchingInfoPassive object is no longer present. - -This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedeviceinventorychange). - -The following fields are available: - -- **AppraiserVersion** The version of the Appraiser file that is generating the events. - - -### Microsoft.Windows.Appraiser.General.DecisionMatchingInfoPassiveStartSync - -This event indicates that a new set of DecisionMatchingInfoPassiveAdd events will be sent. - -This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedeviceinventorychange). - -The following fields are available: - -- **AppraiserVersion** The version of the Appraiser file that is generating the events. - - -### Microsoft.Windows.Appraiser.General.DecisionMatchingInfoPostUpgradeAdd - -This event sends compatibility decision data about entries that require reinstall after upgrade. It's used to help keep Windows up to date. - -This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedeviceinventorychange). - -The following fields are available: - -- **AppraiserVersion** The version of the Appraiser file that is generating the events. -- **NeedsInstallPostUpgradeData** Will the file have a notification after upgrade to install a replacement for the app? -- **NeedsNotifyPostUpgradeData** Should a notification be shown for this file after upgrade? -- **NeedsReinstallPostUpgradeData** Will the file have a notification after upgrade to reinstall the app? -- **SdbReinstallUpgrade** The file is tagged as needing to be reinstalled after upgrade in the compatibility database (but is not blocking upgrade). - - -### Microsoft.Windows.Appraiser.General.DecisionMatchingInfoPostUpgradeRemove - -This event indicates that the DecisionMatchingInfoPostUpgrade object is no longer present. - -This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedeviceinventorychange). - -The following fields are available: - -- **AppraiserVersion** The version of the Appraiser file that is generating the events. - - -### Microsoft.Windows.Appraiser.General.DecisionMatchingInfoPostUpgradeStartSync - -This event indicates that a new set of DecisionMatchingInfoPostUpgradeAdd events will be sent. - -This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedeviceinventorychange). - -The following fields are available: - -- **AppraiserVersion** The version of the Appraiser file that is generating the events. - - -### Microsoft.Windows.Appraiser.General.DecisionMediaCenterAdd - -This event sends decision data about the presence of Windows Media Center, to help keep Windows up to date. - -This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedeviceinventorychange). - -The following fields are available: - -- **AppraiserVersion** The version of the Appraiser file generating the events. -- **BlockingApplication** Is there any application issues that interfere with upgrade due to Windows Media Center? -- **MediaCenterActivelyUsed** If Windows Media Center is supported on the edition, has it been run at least once and are the MediaCenterIndicators are true? -- **MediaCenterIndicators** Do any indicators imply that Windows Media Center is in active use? -- **MediaCenterInUse** Is Windows Media Center actively being used? -- **MediaCenterPaidOrActivelyUsed** Is Windows Media Center actively being used or is it running on a supported edition? -- **NeedsDismissAction** Are there any actions that can be dismissed coming from Windows Media Center? - - -### Microsoft.Windows.Appraiser.General.DecisionMediaCenterRemove - -This event indicates that the DecisionMediaCenter object is no longer present. - -This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedeviceinventorychange). - -The following fields are available: - -- **AppraiserVersion** The version of the Appraiser file that is generating the events. - - -### Microsoft.Windows.Appraiser.General.DecisionMediaCenterStartSync - -This event indicates that a new set of DecisionMediaCenterAdd events will be sent. - -This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedeviceinventorychange). - -The following fields are available: - -- **AppraiserVersion** The version of the Appraiser file that is generating the events. - - -### Microsoft.Windows.Appraiser.General.DecisionSystemBiosAdd - -This event sends compatibility decision data about the BIOS to help keep Windows up to date. - -This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedeviceinventorychange). - -The following fields are available: - -- **AppraiserVersion** The version of the Appraiser file generating the events. -- **Blocking** Is the device blocked from upgrade due to a BIOS block? -- **DisplayGenericMessageGated** Indicates whether a generic offer block message will be shown for the bios. -- **HasBiosBlock** Does the device have a BIOS block? - - -### Microsoft.Windows.Appraiser.General.DecisionSystemBiosRemove - -This event indicates that the DecisionSystemBios object is no longer present. - -This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedeviceinventorychange). - -The following fields are available: - -- **AppraiserVersion** The version of the Appraiser file that is generating the events. - - -### Microsoft.Windows.Appraiser.General.DecisionSystemBiosStartSync - -This event indicates that a new set of DecisionSystemBiosAdd events will be sent. - -This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedeviceinventorychange). - -The following fields are available: - -- **AppraiserVersion** The version of the Appraiser file that is generating the events. - - -### Microsoft.Windows.Appraiser.General.GatedRegChange - -This event sends data about the results of running a set of quick-blocking instructions, to help keep Windows up to date. - -The following fields are available: - -- **NewData** The data in the registry value after the scan completed. -- **OldData** The previous data in the registry value before the scan ran. -- **PCFP** An ID for the system calculated by hashing hardware identifiers. -- **RegKey** The registry key name for which a result is being sent. -- **RegValue** The registry value for which a result is being sent. -- **Time** The client time of the event. - - -### Microsoft.Windows.Appraiser.General.InventoryApplicationFileAdd - -This event represents the basic metadata about a file on the system. The file must be part of an app and either have a block in the compatibility database or be part of an antivirus program. - -This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedeviceinventorychange). - -The following fields are available: - -- **AppraiserVersion** The version of the Appraiser file generating the events. -- **AvDisplayName** If the app is an antivirus app, this is its display name. -- **AvProductState** Indicates whether the antivirus program is turned on and the signatures are up to date. -- **BinaryType** A binary type. Example: UNINITIALIZED, ZERO_BYTE, DATA_ONLY, DOS_MODULE, NE16_MODULE, PE32_UNKNOWN, PE32_I386, PE32_ARM, PE64_UNKNOWN, PE64_AMD64, PE64_ARM64, PE64_IA64, PE32_CLR_32, PE32_CLR_IL, PE32_CLR_IL_PREFER32, PE64_CLR_64. -- **BinFileVersion** An attempt to clean up FileVersion at the client that tries to place the version into 4 octets. -- **BinProductVersion** An attempt to clean up ProductVersion at the client that tries to place the version into 4 octets. -- **BoeProgramId** If there is no entry in Add/Remove Programs, this is the ProgramID that is generated from the file metadata. -- **CompanyName** The company name of the vendor who developed this file. -- **FileId** A hash that uniquely identifies a file. -- **FileVersion** The File version field from the file metadata under Properties -> Details. -- **HasUpgradeExe** Indicates whether the antivirus app has an upgrade.exe file. -- **IsAv** Indicates whether the file an antivirus reporting EXE. -- **LinkDate** The date and time that this file was linked on. -- **LowerCaseLongPath** The full file path to the file that was inventoried on the device. -- **Name** The name of the file that was inventoried. -- **ProductName** The Product name field from the file metadata under Properties -> Details. -- **ProductVersion** The Product version field from the file metadata under Properties -> Details. -- **ProgramId** A hash of the Name, Version, Publisher, and Language of an application used to identify it. -- **Size** The size of the file (in hexadecimal bytes). - - -### Microsoft.Windows.Appraiser.General.InventoryApplicationFileRemove - -This event indicates that the InventoryApplicationFile object is no longer present. - -This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedeviceinventorychange). - -The following fields are available: - -- **AppraiserVersion** The version of the Appraiser file that is generating the events. - - -### Microsoft.Windows.Appraiser.General.InventoryApplicationFileStartSync - -This event indicates indicates that a new set of InventoryApplicationFileAdd events will be sent. - -This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedeviceinventorychange). - -The following fields are available: - -- **AppraiserVersion** The version of the Appraiser file that is generating the events. - - -### Microsoft.Windows.Appraiser.General.InventoryLanguagePackAdd - -This event sends data about the number of language packs installed on the system, to help keep Windows up to date. - -This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedeviceinventorychange). - -The following fields are available: - -- **AppraiserVersion** The version of the Appraiser file that is generating the events. -- **HasLanguagePack** Indicates whether this device has 2 or more language packs. -- **LanguagePackCount** The number of language packs are installed. - - -### Microsoft.Windows.Appraiser.General.InventoryLanguagePackRemove - -This event indicates that the InventoryLanguagePack object is no longer present. - -This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedeviceinventorychange). - -The following fields are available: - -- **AppraiserVersion** The version of the Appraiser file that is generating the events. - - -### Microsoft.Windows.Appraiser.General.InventoryLanguagePackStartSync - -This event indicates that a new set of InventoryLanguagePackAdd events will be sent. - -This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedeviceinventorychange). - -The following fields are available: - -- **AppraiserVersion** The version of the Appraiser file that is generating the events. - - -### Microsoft.Windows.Appraiser.General.InventoryMediaCenterAdd - -This event sends true/false data about decision points used to understand whether Windows Media Center is used on the system, to help keep Windows up to date. - -This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedeviceinventorychange). - -The following fields are available: - -- **AppraiserVersion** The version of the Appraiser file generating the events. -- **EverLaunched** Has Windows Media Center ever been launched? -- **HasConfiguredTv** Has the user configured a TV tuner through Windows Media Center? -- **HasExtendedUserAccounts** Are any Windows Media Center Extender user accounts configured? -- **HasWatchedFolders** Are any folders configured for Windows Media Center to watch? -- **IsDefaultLauncher** Is Windows Media Center the default app for opening music or video files? -- **IsPaid** Is the user running a Windows Media Center edition that implies they paid for Windows Media Center? -- **IsSupported** Does the running OS support Windows Media Center? - - -### Microsoft.Windows.Appraiser.General.InventoryMediaCenterRemove - -This event indicates that the InventoryMediaCenter object is no longer present. - -This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedeviceinventorychange). - -The following fields are available: - -- **AppraiserVersion** The version of the Appraiser file that is generating the events. - - -### Microsoft.Windows.Appraiser.General.InventoryMediaCenterStartSync - -This event indicates that a new set of InventoryMediaCenterAdd events will be sent. - -This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedeviceinventorychange). - -The following fields are available: - -- **AppraiserVersion** The version of the Appraiser file that is generating the events. - - -### Microsoft.Windows.Appraiser.General.InventorySystemBiosAdd - -This event sends basic metadata about the BIOS to determine whether it has a compatibility block. - -This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedeviceinventorychange). - -The following fields are available: - -- **AppraiserVersion** The version of the Appraiser file that is generating the events. -- **biosDate** The release date of the BIOS in UTC format. -- **BiosDate** The release date of the BIOS in UTC format. -- **biosName** The name field from Win32_BIOS. -- **BiosName** The name field from Win32_BIOS. -- **manufacturer** The manufacturer field from Win32_ComputerSystem. -- **Manufacturer** The manufacturer field from Win32_ComputerSystem. -- **model** The model field from Win32_ComputerSystem. -- **Model** The model field from Win32_ComputerSystem. - - -### Microsoft.Windows.Appraiser.General.InventorySystemBiosRemove - -This event indicates that the InventorySystemBios object is no longer present. - -This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedeviceinventorychange). - -The following fields are available: - -- **AppraiserVersion** The version of the Appraiser file that is generating the events. - - -### Microsoft.Windows.Appraiser.General.InventorySystemBiosStartSync - -This event indicates that a new set of InventorySystemBiosAdd events will be sent. - -This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedeviceinventorychange). - -The following fields are available: - -- **AppraiserVersion** The version of the Appraiser file that is generating the events. - - -### Microsoft.Windows.Appraiser.General.InventoryUplevelDriverPackageAdd - -This event is only runs during setup. It provides a listing of the uplevel driver packages that were downloaded before the upgrade. Is critical to understanding if failures in setup can be traced to not having sufficient uplevel drivers before the upgrade. - -This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedeviceinventorychange). - -The following fields are available: - -- **AppraiserVersion** The version of the Appraiser file that is generating the events. -- **BootCritical** Is the driver package marked as boot critical? -- **Build** The build value from the driver package. -- **CatalogFile** The name of the catalog file within the driver package. -- **Class** The device class from the driver package. -- **ClassGuid** The device class unique ID from the driver package. -- **Date** The date from the driver package. -- **Inbox** Is the driver package of a driver that is included with Windows? -- **OriginalName** The original name of the INF file before it was renamed. Generally a path under $WINDOWS.~BT\Drivers\DU. -- **Provider** The provider of the driver package. -- **PublishedName** The name of the INF file after it was renamed. -- **Revision** The revision of the driver package. -- **SignatureStatus** Indicates if the driver package is signed. Unknown = 0, Unsigned = 1, Signed = 2. -- **VersionMajor** The major version of the driver package. -- **VersionMinor** The minor version of the driver package. - - -### Microsoft.Windows.Appraiser.General.InventoryUplevelDriverPackageRemove - -This event indicates that the InventoryUplevelDriverPackage object is no longer present. - -This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedeviceinventorychange). - -The following fields are available: - -- **AppraiserVersion** The version of the Appraiser file that is generating the events. - - -### Microsoft.Windows.Appraiser.General.InventoryUplevelDriverPackageStartSync - -This event indicates that a new set of InventoryUplevelDriverPackageAdd events will be sent. - -This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedeviceinventorychange). - -The following fields are available: - -- **AppraiserVersion** The version of the Appraiser file that is generating the events. - - -### Microsoft.Windows.Appraiser.General.RunContext - -This event indicates what should be expected in the data payload. - -The following fields are available: - -- **AppraiserBranch** The source branch in which the currently running version of Appraiser was built. -- **AppraiserProcess** The name of the process that launched Appraiser. -- **AppraiserVersion** The version of the Appraiser file generating the events. -- **CensusId** A unique hardware identifier. -- **Context** Indicates what mode Appraiser is running in. Example: Setup or Telemetry. -- **PCFP** An ID for the system calculated by hashing hardware identifiers. -- **Subcontext** Indicates what categories of incompatibilities appraiser is scanning for. Can be N/A, Resolve, or a semicolon-delimited list that can include App, Dev, Sys, Gat, or Rescan. -- **Time** The client time of the event. - - -### Microsoft.Windows.Appraiser.General.SystemMemoryAdd - -This event sends data on the amount of memory on the system and whether it meets requirements, to help keep Windows up-to-date. - -This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedeviceinventorychange). - -The following fields are available: - -- **AppraiserVersion** The version of the Appraiser file generating the events. -- **Blocking** Is the device from upgrade due to memory restrictions? -- **MemoryRequirementViolated** Was a memory requirement violated? -- **pageFile** The current committed memory limit for the system or the current process, whichever is smaller (in bytes). -- **ram** The amount of memory on the device. -- **ramKB** The amount of memory (in KB). -- **virtual** The size of the user-mode portion of the virtual address space of the calling process (in bytes). -- **virtualKB** The amount of virtual memory (in KB). - - -### Microsoft.Windows.Appraiser.General.SystemMemoryRemove - -This event that the SystemMemory object is no longer present. - -This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedeviceinventorychange). - -The following fields are available: - -- **AppraiserVersion** The version of the Appraiser file that is generating the events. - - -### Microsoft.Windows.Appraiser.General.SystemMemoryStartSync - -This event indicates that a new set of SystemMemoryAdd events will be sent. - -This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedeviceinventorychange). - -The following fields are available: - -- **AppraiserVersion** The version of the Appraiser file that is generating the events. - - -### Microsoft.Windows.Appraiser.General.SystemProcessorCompareExchangeAdd - -This event sends data indicating whether the system supports the CompareExchange128 CPU requirement, to help keep Windows up to date. - -This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedeviceinventorychange). - -The following fields are available: - -- **AppraiserVersion** The version of the Appraiser file generating the events. -- **Blocking** Is the upgrade blocked due to the processor? -- **CompareExchange128Support** Does the CPU support CompareExchange128? - - -### Microsoft.Windows.Appraiser.General.SystemProcessorCompareExchangeRemove - -This event indicates that the SystemProcessorCompareExchange object is no longer present. - -This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedeviceinventorychange). - -The following fields are available: - -- **AppraiserVersion** The version of the Appraiser file that is generating the events. - - -### Microsoft.Windows.Appraiser.General.SystemProcessorCompareExchangeStartSync - -This event indicates that a new set of SystemProcessorCompareExchangeAdd events will be sent. - -This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedeviceinventorychange). - -The following fields are available: - -- **AppraiserVersion** The version of the Appraiser file that is generating the events. - - -### Microsoft.Windows.Appraiser.General.SystemProcessorLahfSahfAdd - -This event sends data indicating whether the system supports the LahfSahf CPU requirement, to help keep Windows up-to-date. - -This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedeviceinventorychange). - -The following fields are available: - -- **AppraiserVersion** The version of the Appraiser file generating the events. -- **Blocking** Is the upgrade blocked due to the processor? -- **LahfSahfSupport** Does the CPU support LAHF/SAHF? - - -### Microsoft.Windows.Appraiser.General.SystemProcessorLahfSahfRemove - -This event indicates that the SystemProcessorLahfSahf object is no longer present. - -This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedeviceinventorychange). - -The following fields are available: - -- **AppraiserVersion** The version of the Appraiser file that is generating the events. - - -### Microsoft.Windows.Appraiser.General.SystemProcessorLahfSahfStartSync - -This event indicates that a new set of SystemProcessorLahfSahfAdd events will be sent. - -This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedeviceinventorychange). - -The following fields are available: - -- **AppraiserVersion** The version of the Appraiser file that is generating the events. - - -### Microsoft.Windows.Appraiser.General.SystemProcessorNxAdd - -This event sends data indicating whether the system supports the NX CPU requirement, to help keep Windows up-to-date. - -This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedeviceinventorychange). - -The following fields are available: - -- **AppraiserVersion** The version of the Appraiser file that is generating the events. -- **Blocking** Is the upgrade blocked due to the processor? -- **NXDriverResult** The result of the driver used to do a non-deterministic check for NX support. -- **NXProcessorSupport** Does the processor support NX? - - -### Microsoft.Windows.Appraiser.General.SystemProcessorNxRemove - -This event indicates that the SystemProcessorNx object is no longer present. - -This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedeviceinventorychange). - -The following fields are available: - -- **AppraiserVersion** The version of the Appraiser file that is generating the events. - - -### Microsoft.Windows.Appraiser.General.SystemProcessorNxStartSync - -This event indicates that a new set of SystemProcessorNxAdd events will be sent. - -This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedeviceinventorychange). - -The following fields are available: - -- **AppraiserVersion** The version of the Appraiser file that is generating the events. - - -### Microsoft.Windows.Appraiser.General.SystemProcessorPrefetchWAdd - -This event sends data indicating whether the system supports the PrefetchW CPU requirement, to help keep Windows up to date. - -This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedeviceinventorychange). - -The following fields are available: - -- **AppraiserVersion** The version of the Appraiser file that is generating the events. -- **Blocking** Is the upgrade blocked due to the processor? -- **PrefetchWSupport** Does the processor support PrefetchW? - - -### Microsoft.Windows.Appraiser.General.SystemProcessorPrefetchWRemove - -This event indicates that the SystemProcessorPrefetchW object is no longer present. - -This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedeviceinventorychange). - -The following fields are available: - -- **AppraiserVersion** The version of the Appraiser file that is generating the events. - - -### Microsoft.Windows.Appraiser.General.SystemProcessorPrefetchWStartSync - -This event indicates that a new set of SystemProcessorPrefetchWAdd events will be sent. - -This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedeviceinventorychange). - -The following fields are available: - -- **AppraiserVersion** The version of the Appraiser file that is generating the events. - - -### Microsoft.Windows.Appraiser.General.SystemProcessorSse2Add - -This event sends data indicating whether the system supports the SSE2 CPU requirement, to help keep Windows up to date. - -This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedeviceinventorychange). - -The following fields are available: - -- **AppraiserVersion** The version of the Appraiser file that is generating the events. -- **Blocking** Is the upgrade blocked due to the processor? -- **SSE2ProcessorSupport** Does the processor support SSE2? - - -### Microsoft.Windows.Appraiser.General.SystemProcessorSse2Remove - -This event indicates that the SystemProcessorSse2 object is no longer present. - -This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedeviceinventorychange). - -The following fields are available: - -- **AppraiserVersion** The version of the Appraiser file that is generating the events. - - -### Microsoft.Windows.Appraiser.General.SystemProcessorSse2StartSync - -This event indicates that a new set of SystemProcessorSse2Add events will be sent. - -This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedeviceinventorychange). - -The following fields are available: - -- **AppraiserVersion** The version of the Appraiser file that is generating the events. - - -### Microsoft.Windows.Appraiser.General.SystemTouchAdd - -This event sends data indicating whether the system supports touch, to help keep Windows up to date. - -This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedeviceinventorychange). - -The following fields are available: - -- **AppraiserVersion** The version of the Appraiser file that is generating the events. -- **IntegratedTouchDigitizerPresent** Is there an integrated touch digitizer? -- **MaximumTouches** The maximum number of touch points supported by the device hardware. - - -### Microsoft.Windows.Appraiser.General.SystemTouchRemove - -This event indicates that the SystemTouch object is no longer present. - -This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedeviceinventorychange). - -The following fields are available: - -- **AppraiserVersion** The version of the Appraiser file that is generating the events. - - -### Microsoft.Windows.Appraiser.General.SystemTouchStartSync - -This event indicates that a new set of SystemTouchAdd events will be sent. - -This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedeviceinventorychange). - -The following fields are available: - -- **AppraiserVersion** The version of the Appraiser file that is generating the events. - - -### Microsoft.Windows.Appraiser.General.SystemWimAdd - -This event sends data indicating whether the operating system is running from a compressed Windows Imaging Format (WIM) file, to help keep Windows up to date. - -This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedeviceinventorychange). - -The following fields are available: - -- **AppraiserVersion** The version of the Appraiser file that is generating the events. -- **IsWimBoot** Is the current operating system running from a compressed WIM file? -- **RegistryWimBootValue** The raw value from the registry that is used to indicate if the device is running from a WIM. - - -### Microsoft.Windows.Appraiser.General.SystemWimRemove - -This event indicates that the SystemWim object is no longer present. - -This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedeviceinventorychange). - -The following fields are available: - -- **AppraiserVersion** The version of the Appraiser file that is generating the events. - - -### Microsoft.Windows.Appraiser.General.SystemWimStartSync - -This event indicates that a new set of SystemWimAdd events will be sent. - -This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedeviceinventorychange). - -The following fields are available: - -- **AppraiserVersion** The version of the Appraiser file that is generating the events. - - -### Microsoft.Windows.Appraiser.General.SystemWindowsActivationStatusAdd - -This event sends data indicating whether the current operating system is activated, to help keep Windows up to date. - -This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedeviceinventorychange). - -The following fields are available: - -- **AppraiserVersion** The version of the Appraiser file that is generating the events. -- **WindowsIsLicensedApiValue** The result from the API that's used to indicate if operating system is activated. -- **WindowsNotActivatedDecision** Is the current operating system activated? - - -### Microsoft.Windows.Appraiser.General.SystemWindowsActivationStatusRemove - -This event indicates that the SystemWindowsActivationStatus object is no longer present. - -This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedeviceinventorychange). - -The following fields are available: - -- **AppraiserVersion** The version of the Appraiser file that is generating the events. - - -### Microsoft.Windows.Appraiser.General.SystemWindowsActivationStatusStartSync - -This event indicates that a new set of SystemWindowsActivationStatusAdd events will be sent. - -This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedeviceinventorychange). - -The following fields are available: - -- **AppraiserVersion** The version of the Appraiser file that is generating the events. - - -### Microsoft.Windows.Appraiser.General.SystemWlanAdd - -This event sends data indicating whether the system has WLAN, and if so, whether it uses an emulated driver that could block an upgrade, to help keep Windows up-to-date. - -This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedeviceinventorychange). - -The following fields are available: - -- **AppraiserVersion** The version of the Appraiser file that is generating the events. -- **Blocking** Is the upgrade blocked because of an emulated WLAN driver? -- **HasWlanBlock** Does the emulated WLAN driver have an upgrade block? -- **WlanEmulatedDriver** Does the device have an emulated WLAN driver? -- **WlanExists** Does the device support WLAN at all? -- **WlanModulePresent** Are any WLAN modules present? -- **WlanNativeDriver** Does the device have a non-emulated WLAN driver? - - -### Microsoft.Windows.Appraiser.General.SystemWlanRemove - -This event indicates that the SystemWlan object is no longer present. - -This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedeviceinventorychange). - -The following fields are available: - -- **AppraiserVersion** The version of the Appraiser file that is generating the events. - - -### Microsoft.Windows.Appraiser.General.SystemWlanStartSync - -This event indicates that a new set of SystemWlanAdd events will be sent. - -This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedeviceinventorychange). - -The following fields are available: - -- **AppraiserVersion** The version of the Appraiser file that is generating the events. - - -### Microsoft.Windows.Appraiser.General.TelemetryRunHealth - -This event indicates the parameters and result of a telemetry (diagnostic) run. This allows the rest of the data sent over the course of the run to be properly contextualized and understood, which is then used to keep Windows up to date. - -The following fields are available: - -- **AppraiserBranch** The source branch in which the version of Appraiser that is running was built. -- **AppraiserDataVersion** The version of the data files being used by the Appraiser telemetry run. -- **AppraiserProcess** The name of the process that launched Appraiser. -- **AppraiserVersion** The file version (major, minor and build) of the Appraiser DLL, concatenated without dots. -- **AuxFinal** Obsolete, always set to false. -- **AuxInitial** Obsolete, indicates if Appraiser is writing data files to be read by the Get Windows 10 app. -- **DeadlineDate** A timestamp representing the deadline date, which is the time until which appraiser will wait to do a full scan. -- **EnterpriseRun** Indicates if the telemetry run is an enterprise run, which means appraiser was run from the command line with an extra enterprise parameter. -- **FullSync** Indicates if Appraiser is performing a full sync, which means that full set of events representing the state of the machine are sent. Otherwise, only the changes from the previous run are sent. -- **InboxDataVersion** The original version of the data files before retrieving any newer version. -- **IndicatorsWritten** Indicates if all relevant UEX indicators were successfully written or updated. -- **InventoryFullSync** Indicates if inventory is performing a full sync, which means that the full set of events representing the inventory of machine are sent. -- **PCFP** An ID for the system calculated by hashing hardware identifiers. -- **PerfBackoff** Indicates if the run was invoked with logic to stop running when a user is present. Helps to understand why a run may have a longer elapsed time than normal. -- **PerfBackoffInsurance** Indicates if appraiser is running without performance backoff because it has run with perf backoff and failed to complete several times in a row. -- **RunAppraiser** Indicates if Appraiser was set to run at all. If this if false, it is understood that data events will not be received from this device. -- **RunDate** The date that the telemetry run was stated, expressed as a filetime. -- **RunGeneralTel** Indicates if the generaltel.dll component was run. Generaltel collects additional telemetry on an infrequent schedule and only from machines at telemetry levels higher than Basic. -- **RunOnline** Indicates if appraiser was able to connect to Windows Update and theefore is making decisions using up-to-date driver coverage information. -- **RunResult** The hresult of the Appraiser telemetry run. -- **ScheduledUploadDay** The day scheduled for the upload. -- **SendingUtc** Indicates if the Appraiser client is sending events during the current telemetry run. -- **StoreHandleIsNotNull** Obsolete, always set to false -- **TelementrySent** Indicates if telemetry was successfully sent. -- **ThrottlingUtc** Indicates if the Appraiser client is throttling its output of CUET events to avoid being disabled. This increases runtime but also telemetry reliability. -- **Time** The client time of the event. -- **VerboseMode** Indicates if appraiser ran in Verbose mode, which is a test-only mode with extra logging. -- **WhyFullSyncWithoutTablePrefix** Indicates the reason or reasons that a full sync was generated. - - -### Microsoft.Windows.Appraiser.General.WmdrmAdd - -This event sends data about the usage of older digital rights management on the system, to help keep Windows up to date. This data does not indicate the details of the media using the digital rights management, only whether any such files exist. Collecting this data was critical to ensuring the correct mitigation for customers, and should be able to be removed once all mitigations are in place. - -This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedeviceinventorychange). - -The following fields are available: - -- **AppraiserVersion** The version of the Appraiser file that is generating the events. -- **BlockingApplication** Same as NeedsDismissAction. -- **NeedsDismissAction** Indicates if a dismissible message is needed to warn the user about a potential loss of data due to DRM deprecation. -- **WmdrmApiResult** Raw value of the API used to gather DRM state. -- **WmdrmCdRipped** Indicates if the system has any files encrypted with personal DRM, which was used for ripped CDs. -- **WmdrmIndicators** WmdrmCdRipped OR WmdrmPurchased. -- **WmdrmInUse** WmdrmIndicators AND dismissible block in setup was not dismissed. -- **WmdrmNonPermanent** Indicates if the system has any files with non-permanent licenses. -- **WmdrmPurchased** Indicates if the system has any files with permanent licenses. - - -### Microsoft.Windows.Appraiser.General.WmdrmRemove - -This event indicates that the Wmdrm object is no longer present. - -This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedeviceinventorychange). - -The following fields are available: - -- **AppraiserVersion** The version of the Appraiser file that is generating the events. - - -### Microsoft.Windows.Appraiser.General.WmdrmStartSync - -This event indicates that a new set of WmdrmAdd events will be sent. - -This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedeviceinventorychange). - -The following fields are available: - -- **AppraiserVersion** The version of the Appraiser file that is generating the events. - - -## Census events - -### Census.App - -Provides information on IE and Census versions running on the device - -The following fields are available: - -- **AppraiserEnterpriseErrorCode** The error code of the last Appraiser enterprise run. -- **AppraiserErrorCode** The error code of the last Appraiser run. -- **AppraiserRunEndTimeStamp** The end time of the last Appraiser run. -- **AppraiserRunIsInProgressOrCrashed** Flag that indicates if the Appraiser run is in progress or has crashed. -- **AppraiserRunStartTimeStamp** The start time of the last Appraiser run. -- **AppraiserTaskEnabled** Whether the Appraiser task is enabled. -- **AppraiserTaskExitCode** The Appraiser task exist code. -- **AppraiserTaskLastRun** The last runtime for the Appraiser task. -- **CensusVersion** The version of Census that generated the current data for this device. -- **IEVersion** The version of Internet Explorer that is running on the device. - - -### Census.Battery - -This event sends type and capacity data about the battery on the device, as well as the number of connected standby devices in use, type to help keep Windows up to date. - -The following fields are available: - -- **InternalBatteryCapablities** Represents information about what the battery is capable of doing. -- **InternalBatteryCapacityCurrent** Represents the battery's current fully charged capacity in mWh (or relative). Compare this value to DesignedCapacity  to estimate the battery's wear. -- **InternalBatteryCapacityDesign** Represents the theoretical capacity of the battery when new, in mWh. -- **InternalBatteryNumberOfCharges** Provides the number of battery charges. This is used when creating new products and validating that existing products meets targeted functionality performance. -- **IsAlwaysOnAlwaysConnectedCapable** Represents whether the battery enables the device to be AlwaysOnAlwaysConnected . Boolean value. - - -### Census.Camera - -This event sends data about the resolution of cameras on the device, to help keep Windows up to date. - -The following fields are available: - -- **FrontFacingCameraResolution** Represents the resolution of the front facing camera in megapixels. If a front facing camera does not exist, then the value is 0. -- **RearFacingCameraResolution** Represents the resolution of the rear facing camera in megapixels. If a rear facing camera does not exist, then the value is 0. - - -### Census.Enterprise - -This event sends data about Azure presence, type, and cloud domain use in order to provide an understanding of the use and integration of devices in an enterprise, cloud, and server environment. - -The following fields are available: - -- **AADDeviceId** Azure Active Directory device ID. -- **AzureOSIDPresent** Represents the field used to identify an Azure machine. -- **AzureVMType** Represents whether the instance is Azure VM PAAS, Azure VM IAAS or any other VMs. -- **CDJType** Represents the type of cloud domain joined for the machine. -- **CommercialId** Represents the GUID for the commercial entity which the device is a member of.  Will be used to reflect insights back to customers. -- **ContainerType** The type of container, such as process or virtual machine hosted. -- **EnrollmentType** Defines the type of MDM enrollment on the device. -- **HashedDomain** The hashed representation of the user domain used for login. -- **IsCloudDomainJoined** Is this device joined to an Azure Active Directory (AAD) tenant? true/false -- **IsDERequirementMet** Represents if the device can do device encryption. -- **IsDeviceProtected** Represents if Device protected by BitLocker/Device Encryption -- **IsDomainJoined** Indicates whether a machine is joined to a domain. -- **IsEDPEnabled** Represents if Enterprise data protected on the device. -- **IsMDMEnrolled** Whether the device has been MDM Enrolled or not. -- **MPNId** Returns the Partner ID/MPN ID from Regkey. HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\DeployID -- **SCCMClientId** This ID correlate systems that send data to Compat Analytics (OMS) and other OMS based systems with systems in an Enterprise SCCM environment. -- **ServerFeatures** Represents the features installed on a Windows   Server. This can be used by developers and administrators who need to automate the process of determining the features installed on a set of server computers. -- **SystemCenterID** The SCCM ID is an anonymized one-way hash of the Active Directory Organization identifier - - -### Census.Firmware - -This event sends data about the BIOS and startup embedded in the device, to help keep Windows up to date. - -The following fields are available: - -- **FirmwareManufacturer** Represents the manufacturer of the device's firmware (BIOS). -- **FirmwareReleaseDate** Represents the date the current firmware was released. -- **FirmwareType** Represents the firmware type. The various types can be unknown, BIOS, UEFI. -- **FirmwareVersion** Represents the version of the current firmware. - - -### Census.Flighting - -This event sends Windows Insider data from customers participating in improvement testing and feedback programs, to help keep Windows up to date. - -The following fields are available: - -- **DeviceSampleRate** The telemetry sample rate assigned to the device. -- **EnablePreviewBuilds** Used to enable Windows Insider builds on a device. -- **FlightIds** A list of the different Windows Insider builds on this device. -- **FlightingBranchName** The name of the Windows Insider branch currently used by the device. -- **IsFlightsDisabled** Represents if the device is participating in the Windows Insider program. -- **MSA_Accounts** Represents a list of hashed IDs of the Microsoft Accounts that are flighting (pre-release builds) on this device. -- **SSRK** Retrieves the mobile targeting settings. - - -### Census.Hardware - -This event sends data about the device, including hardware type, OEM brand, model line, model, telemetry level setting, and TPM support, to help keep Windows up to date. - -The following fields are available: - -- **ActiveMicCount** The number of active microphones attached to the device. -- **ChassisType** Represents the type of device chassis, such as desktop or low profile desktop. The possible values can range between 1 - 36. -- **ComputerHardwareID** Identifies a device class that is represented by a hash of different SMBIOS fields. -- **D3DMaxFeatureLevel** Supported Direct3D version. -- **DeviceColor** Indicates a color of the device. -- **DeviceForm** Indicates the form as per the device classification. -- **DeviceName** The device name that is set by the user. -- **DigitizerSupport** Is a digitizer supported? -- **DUID** The device unique ID. -- **Gyroscope** Indicates whether the device has a gyroscope (a mechanical component that measures and maintains orientation). -- **InventoryId** The device ID used for compatibility testing. -- **Magnetometer** Indicates whether the device has a magnetometer (a mechanical component that works like a compass). -- **NFCProximity** Indicates whether the device supports NFC (a set of communication protocols that helps establish communication when applicable devices are brought close together.) -- **OEMDigitalMarkerFileName** The name of the file placed in the \Windows\system32\drivers directory that specifies the OEM and model name of the device. -- **OEMManufacturerName** The device manufacturer name. The OEMName for an inactive device is not reprocessed even if the clean OEM name is changed at a later date. -- **OEMModelBaseBoard** The baseboard model used by the OEM. -- **OEMModelBaseBoardVersion** Differentiates between developer and retail devices. -- **OEMModelName** The device model name. -- **OEMModelNumber** The device model number. -- **OEMModelSKU** The device edition that is defined by the manufacturer. -- **OEMModelSystemFamily** The system family set on the device by an OEM. -- **OEMModelSystemVersion** The system model version set on the device by the OEM. -- **OEMOptionalIdentifier** A Microsoft assigned value that represents a specific OEM subsidiary. -- **OEMSerialNumber** The serial number of the device that is set by the manufacturer. -- **PhoneManufacturer** The friendly name of the phone manufacturer. -- **PowerPlatformRole** The OEM preferred power management profile. It's used to help to identify the basic form factor of the device. -- **SoCName** The firmware manufacturer of the device. -- **StudyID** Used to identify retail and non-retail device. -- **TelemetryLevel** The telemetry level the user has opted into, such as Basic or Enhanced. -- **TelemetryLevelLimitEnhanced** The telemetry level for Windows Analytics-based solutions. -- **TelemetrySettingAuthority** Determines who set the telemetry level, such as GP, MDM, or the user. -- **TPMManufacturerId** The ID of the TPM manufacturer. -- **TPMManufacturerVersion** The version of the TPM manufacturer. -- **TPMVersion** The supported Trusted Platform Module (TPM) on the device. If no TPM is present, the value is 0. -- **VoiceSupported** Does the device have a cellular radio capable of making voice calls? - - -### Census.Memory - -This event sends data about the memory on the device, including ROM and RAM, to help keep Windows up to date. - -The following fields are available: - -- **TotalPhysicalRAM** Represents the physical memory (in MB). -- **TotalVisibleMemory** Represents the memory that is not reserved by the system. - - -### Census.Network - -This event sends data about the mobile and cellular network used by the device (mobile service provider, network, device ID, and service cost factors), to help keep Windows up to date. - -The following fields are available: - -- **IMEI0** Represents the International Mobile Station Equipment Identity. This number is usually unique and used by the mobile operator to distinguish different phone hardware. Microsoft does not have access to mobile operator billing data so collecting this data does not expose or identify the user. The two fields represent phone with dual sim coverage. -- **IMEI1** Represents the International Mobile Station Equipment Identity. This number is usually unique and used by the mobile operator to distinguish different phone hardware. Microsoft does not have access to mobile operator billing data so collecting this data does not expose or identify the user. The two fields represent phone with dual sim coverage. -- **MCC0** Represents the Mobile Country Code (MCC). It used with the Mobile Network Code (MNC) to uniquely identify a mobile network operator. The two fields represent phone with dual sim coverage. -- **MCC1** Represents the Mobile Country Code (MCC). It used with the Mobile Network Code (MNC) to uniquely identify a mobile network operator. The two fields represent phone with dual sim coverage. -- **MEID** Represents the Mobile Equipment Identity (MEID). MEID is a worldwide unique phone ID assigned to CDMA phones. MEID replaces electronic serial number (ESN), and is equivalent to IMEI for GSM and WCDMA phones. Microsoft does not have access to mobile operator billing data so collecting this data does not expose or identify the user. -- **MNC0** Retrieves the Mobile Network Code (MNC). It used with the Mobile Country Code (MCC) to uniquely identify a mobile network operator. The two fields represent phone with dual sim coverage. -- **MNC1** Retrieves the Mobile Network Code (MNC). It used with the Mobile Country Code (MCC) to uniquely identify a mobile network operator. The two fields represent phone with dual sim coverage. -- **MobileOperatorBilling** Represents the telephone company that provides services for mobile phone users. -- **MobileOperatorCommercialized** Represents which reseller and geography the phone is commercialized for. This is the set of values on the phone for who and where it was intended to be used. For example, the commercialized mobile operator code AT&T in the US would be ATT-US. -- **MobileOperatorNetwork0** Represents the operator of the current mobile network that the device is used on. (AT&T, T-Mobile, Vodafone). The two fields represent phone with dual sim coverage. -- **MobileOperatorNetwork1** Represents the operator of the current mobile network that the device is used on. (AT&T, T-Mobile, Vodafone). The two fields represent phone with dual sim coverage. -- **NetworkAdapterGUID** The GUID of the primary network adapter. -- **NetworkCost** Represents the network cost associated with a connection. -- **SPN0** Retrieves the Service Provider Name (SPN). For example, these might be AT&T, Sprint, T-Mobile, or Verizon. The two fields represent phone with dual sim coverage. -- **SPN1** Retrieves the Service Provider Name (SPN). For example, these might be AT&T, Sprint, T-Mobile, or Verizon. The two fields represent phone with dual sim coverage. - - -### Census.OS - -This event sends data about the operating system such as the version, locale, update service configuration, when and how it was originally installed, and whether it is a virtual device, to help keep Windows up to date. - -The following fields are available: - -- **ActivationChannel** Retrieves the retail license key or Volume license key for a machine. -- **AssignedAccessStatus** Kiosk configuration mode. -- **CompactOS** Indicates if the Compact OS feature from Win10 is enabled. -- **DeveloperUnlockStatus** Represents if a device has been developer unlocked by the user or Group Policy. -- **DeviceTimeZone** The time zone that is set on the device. Example: Pacific Standard Time -- **GenuineState** Retrieves the ID Value specifying the OS Genuine check. -- **InstallationType** Retrieves the type of OS installation. (Clean, Upgrade, Reset, Refresh, Update). -- **InstallLanguage** The first language installed on the user machine. -- **IsDeviceRetailDemo** Retrieves if the device is running in demo mode. -- **IsEduData** Returns Boolean if the education data policy is enabled. -- **IsPortableOperatingSystem** Retrieves whether OS is running Windows-To-Go -- **IsSecureBootEnabled** Retrieves whether Boot chain is signed under UEFI. -- **LanguagePacks** The list of language packages installed on the device. -- **LicenseStateReason** Retrieves why (or how) a system is licensed or unlicensed. The HRESULT may indicate an error code that indicates a key blocked error, or it may indicate that we are running an OS License granted by the MS store. -- **OA3xOriginalProductKey** Retrieves the License key stamped by the OEM to the machine. -- **OSEdition** Retrieves the version of the current OS. -- **OSInstallType** Retrieves a numeric description of what install was used on the device i.e. clean, upgrade, refresh, reset, etc -- **OSOOBEDateTime** Retrieves Out of Box Experience (OOBE) Date in Coordinated Universal Time (UTC). -- **OSSKU** Retrieves the Friendly Name of OS Edition. -- **OSSubscriptionStatus** Represents the existing status for enterprise subscription feature for PRO machines. -- **OSSubscriptionTypeId** Returns boolean for enterprise subscription feature for selected PRO machines. -- **OSTimeZoneBiasInMins** Retrieves the time zone set on machine. -- **OSUILocale** Retrieves the locale of the UI that is currently used by the OS. -- **ProductActivationResult** Returns Boolean if the OS Activation was successful. -- **ProductActivationTime** Returns the OS Activation time for tracking piracy issues. -- **ProductKeyID2** Retrieves the License key if the machine is updated with a new license key. -- **RACw7Id** Retrieves the Microsoft Reliability Analysis Component (RAC) Win7 Identifier. RAC is used to monitor and analyze system usage and reliability. -- **ServiceMachineIP** Retrieves the IP address of the KMS host used for anti-piracy. -- **ServiceMachinePort** Retrieves the port of the KMS host used for anti-piracy. -- **ServiceProductKeyID** Retrieves the License key of the KMS -- **SharedPCMode** Returns Boolean for education devices used as shared cart -- **Signature** Retrieves if it is a signature machine sold by Microsoft store. -- **SLICStatus** Whether a SLIC table exists on the device. -- **SLICVersion** Returns OS type/version from SLIC table. - - -### Census.PrivacySettings - -This event provides information about the device level privacy settings and whether device-level access was granted to these capabilities. Not all settings are applicable to all devices. Each field records the consent state for the corresponding privacy setting. The consent state is encoded as a 16-bit signed integer, where the first 8 bits represents the effective consent value, and the last 8 bits represent the authority that set the value. The effective consent (first 8 bits) is one of the following values: -3 = unexpected consent value, -2 = value was not requested, -1 = an error occurred while attempting to retrieve the value, 0 = undefined, 1 = allow, 2 = deny, 3 = prompt. The consent authority (last 8 bits) is one of the following values: -3 = unexpected authority, -2 = value was not requested, -1 = an error occurred while attempting to retrieve the value, 0 = system, 1 = a higher authority (a gating setting, the system-wide setting, or a group policy), 2 = advertising ID group policy, 3 = advertising ID policy for child account, 4 = privacy setting provider doesn't know the actual consent authority, 5 = consent was not configured and a default set in code was used, 6 = system default, 7 = organization policy, 8 = OneSettings. - -The following fields are available: - -- **Activity** Current state of the activity history setting. -- **ActivityHistoryCloudSync** Current state of the activity history cloud sync setting. -- **ActivityHistoryCollection** Current state of the activity history collection setting. -- **AdvertisingId** Current state of the advertising ID setting. -- **AppDiagnostics** Current state of the app diagnostics setting. -- **Appointments** Current state of the calendar setting. -- **Bluetooth** Current state of the Bluetooth capability setting. -- **BluetoothSync** Current state of the Bluetooth sync capability setting. -- **BroadFileSystemAccess** Current state of the broad file system access setting. -- **CellularData** Current state of the cellular data capability setting. -- **Chat** Current state of the chat setting. -- **Contacts** Current state of the contacts setting. -- **DocumentsLibrary** Current state of the documents library setting. -- **Email** Current state of the email setting. -- **FindMyDevice** Current state of the "find my device" setting. -- **GazeInput** Current state of the gaze input setting. -- **HumanInterfaceDevice** Current state of the human interface device setting. -- **InkTypeImprovement** Current state of the improve inking and typing setting. -- **Location** Current state of the location setting. -- **LocationHistory** Current state of the location history setting. -- **LocationHistoryCloudSync** Current state of the location history cloud sync setting. -- **LocationHistoryOnTimeline** Current state of the location history on timeline setting. -- **Microphone** Current state of the microphone setting. -- **PhoneCall** Current state of the phone call setting. -- **PhoneCallHistory** Current state of the call history setting. -- **PicturesLibrary** Current state of the pictures library setting. -- **Radios** Current state of the radios setting. -- **SensorsCustom** Current state of the custom sensor setting. -- **SerialCommunication** Current state of the serial communication setting. -- **Sms** Current state of the text messaging setting. -- **SpeechPersonalization** Current state of the speech services setting. -- **USB** Current state of the USB setting. -- **UserAccountInformation** Current state of the account information setting. -- **UserDataTasks** Current state of the tasks setting. -- **UserNotificationListener** Current state of the notifications setting. -- **VideosLibrary** Current state of the videos library setting. -- **Webcam** Current state of the camera setting. -- **WiFiDirect** Current state of the Wi-Fi direct setting. - - -### Census.Processor - -Provides information on several important data points about Processor settings - -The following fields are available: - -- **KvaShadow** This is the micro code information of the processor. -- **MMSettingOverride** Microcode setting of the processor. -- **MMSettingOverrideMask** Microcode setting override of the processor. -- **PreviousUpdateRevision** Previous microcode revision -- **ProcessorArchitecture** Retrieves the processor architecture of the installed operating system. -- **ProcessorClockSpeed** Clock speed of the processor in MHz. -- **ProcessorCores** Number of logical cores in the processor. -- **ProcessorIdentifier** Processor Identifier of a manufacturer. -- **ProcessorManufacturer** Name of the processor manufacturer. -- **ProcessorModel** Name of the processor model. -- **ProcessorPhysicalCores** Number of physical cores in the processor. -- **ProcessorUpdateRevision** The microcode revision. -- **ProcessorUpdateStatus** Enum value that represents the processor microcode load status -- **SocketCount** Count of CPU sockets. -- **SpeculationControl** Indicates whether the system has enabled protections needed to validate the speculation control vulnerability. - - -### Census.Security - -This event provides information on about security settings used to help keep Windows up to date and secure. - -The following fields are available: - -- **AvailableSecurityProperties** This field helps to enumerate and report state on the relevant security properties for Device Guard. -- **CGRunning** Credential Guard isolates and hardens key system and user secrets against compromise, helping to minimize the impact and breadth of a Pass the Hash style attack in the event that malicious code is already running via a local or network based vector. This field tells if Credential Guard is running. -- **DGState** This field summarizes the Device Guard state. -- **HVCIRunning** Hypervisor Code Integrity (HVCI) enables Device Guard to help protect kernel mode processes and drivers from vulnerability exploits and zero days. HVCI uses the processor’s functionality to force all software running in kernel mode to safely allocate memory. This field tells if HVCI is running. -- **IsSawGuest** Indicates whether the device is running as a Secure Admin Workstation Guest. -- **IsSawHost** Indicates whether the device is running as a Secure Admin Workstation Host. -- **RequiredSecurityProperties** Describes the required security properties to enable virtualization-based security. -- **SecureBootCapable** Systems that support Secure Boot can have the feature turned off via BIOS. This field tells if the system is capable of running Secure Boot, regardless of the BIOS setting. -- **SModeState** The Windows S mode trail state. -- **VBSState** Virtualization-based security (VBS) uses the hypervisor to help protect the kernel and other parts of the operating system. Credential Guard and Hypervisor Code Integrity (HVCI) both depend on VBS to isolate/protect secrets, and kernel-mode code integrity validation. VBS has a tri-state that can be Disabled, Enabled, or Running. - - -### Census.Speech - -This event is used to gather basic speech settings on the device. - -The following fields are available: - -- **AboveLockEnabled** Cortana setting that represents if Cortana can be invoked when the device is locked. -- **GPAllowInputPersonalization** Indicates if a Group Policy setting has enabled speech functionalities. -- **HolographicSpeechInputDisabled** Holographic setting that represents if the attached HMD devices have speech functionality disabled by the user. -- **HolographicSpeechInputDisabledRemote** Indicates if a remote policy has disabled speech functionalities for the HMD devices. -- **KeyVer** Version information for the census speech event. -- **KWSEnabled** Cortana setting that represents if a user has enabled the "Hey Cortana" keyword spotter (KWS). -- **MDMAllowInputPersonalization** Indicates if an MDM policy has enabled speech functionalities. -- **RemotelyManaged** Indicates if the device is being controlled by a remote administrator (MDM or Group Policy) in the context of speech functionalities. -- **SpeakerIdEnabled** Cortana setting that represents if keyword detection has been trained to try to respond to a single user's voice. -- **SpeechServicesEnabled** Windows setting that represents whether a user is opted-in for speech services on the device. -- **SpeechServicesValueSource** Indicates the deciding factor for the effective online speech recognition privacy policy settings: remote admin, local admin, or user preference. - - -### Census.Storage - -This event sends data about the total capacity of the system volume and primary disk, to help keep Windows up to date. - -The following fields are available: - -- **PrimaryDiskTotalCapacity** Retrieves the amount of disk space on the primary disk of the device in MB. -- **PrimaryDiskType** Retrieves an enumerator value of type STORAGE_BUS_TYPE that indicates the type of bus to which the device is connected. This should be used to interpret the raw device properties at the end of this structure (if any). -- **StorageReservePassedPolicy** Indicates whether the Storage Reserve policy, which ensures that updates have enough disk space and customers are on the latest OS, is enabled on this device. -- **SystemVolumeTotalCapacity** Retrieves the size of the partition that the System volume is installed on in MB. - - -### Census.Userdefault - -This event sends data about the current user's default preferences for browser and several of the most popular extensions and protocols, to help keep Windows up to date. - -The following fields are available: - -- **CalendarType** The calendar identifiers that are used to specify different calendars. -- **DefaultApp** The current uer's default program selected for the following extension or protocol: .html, .htm, .jpg, .jpeg, .png, .mp3, .mp4, .mov, .pdf. -- **DefaultBrowserProgId** The ProgramId of the current user's default browser. -- **LongDateFormat** The long date format the user has selected. -- **ShortDateFormat** The short date format the user has selected. - - -### Census.UserDisplay - -This event sends data about the logical/physical display size, resolution and number of internal/external displays, and VRAM on the system, to help keep Windows up to date. - -The following fields are available: - -- **InternalPrimaryDisplayLogicalDPIX** Retrieves the logical DPI in the x-direction of the internal display. -- **InternalPrimaryDisplayLogicalDPIY** Retrieves the logical DPI in the y-direction of the internal display. -- **InternalPrimaryDisplayPhysicalDPIX** Retrieves the physical DPI in the x-direction of the internal display. -- **InternalPrimaryDisplayPhysicalDPIY** Retrieves the physical DPI in the y-direction of the internal display. -- **InternalPrimaryDisplayResolutionHorizontal** Retrieves the number of pixels in the horizontal direction of the internal display. -- **InternalPrimaryDisplayResolutionVertical** Retrieves the number of pixels in the vertical direction of the internal display. -- **InternalPrimaryDisplaySizePhysicalH** Retrieves the physical horizontal length of the display in mm. Used for calculating the diagonal length in inches . -- **InternalPrimaryDisplaySizePhysicalY** Retrieves the physical vertical length of the display in mm. Used for calculating the diagonal length in inches -- **NumberofExternalDisplays** Retrieves the number of external displays connected to the machine -- **NumberofInternalDisplays** Retrieves the number of internal displays in a machine. -- **VRAMDedicated** Retrieves the video RAM in MB. -- **VRAMDedicatedSystem** Retrieves the amount of memory on the dedicated video card. -- **VRAMSharedSystem** Retrieves the amount of RAM memory that the video card can use. - - -### Census.UserNLS - -This event sends data about the default app language, input, and display language preferences set by the user, to help keep Windows up to date. - -The following fields are available: - -- **DefaultAppLanguage** The current user Default App Language. -- **DisplayLanguage** The current user preferred Windows Display Language. -- **HomeLocation** The current user location, which is populated using GetUserGeoId() function. -- **KeyboardInputLanguages** The Keyboard input languages installed on the device. -- **SpeechInputLanguages** The Speech Input languages installed on the device. - - -### Census.UserPrivacySettings - -This event provides information about the current users privacy settings and whether device-level access was granted to these capabilities. Not all settings are applicable to all devices. Each field records the consent state for the corresponding privacy setting. The consent state is encoded as a 16-bit signed integer, where the first 8 bits represents the effective consent value, and the last 8 bits represents the authority that set the value. The effective consent is one of the following values: -3 = unexpected consent value, -2 = value was not requested, -1 = an error occurred while attempting to retrieve the value, 0 = undefined, 1 = allow, 2 = deny, 3 = prompt. The consent authority is one of the following values: -3 = unexpected authority, -2 = value was not requested, -1 = an error occurred while attempting to retrieve the value, 0 = user, 1 = a higher authority (a gating setting, the system-wide setting, or a group policy), 2 = advertising ID group policy, 3 = advertising ID policy for child account, 4 = privacy setting provider doesn't know the actual consent authority, 5 = consent was not configured and a default set in code was used, 6 = system default, 7 = organization policy, 8 = OneSettings. - -The following fields are available: - -- **Activity** Current state of the activity history setting. -- **ActivityHistoryCloudSync** Current state of the activity history cloud sync setting. -- **ActivityHistoryCollection** Current state of the activity history collection setting. -- **AdvertisingId** Current state of the advertising ID setting. -- **AppDiagnostics** Current state of the app diagnostics setting. -- **Appointments** Current state of the calendar setting. -- **Bluetooth** Current state of the Bluetooth capability setting. -- **BluetoothSync** Current state of the Bluetooth sync capability setting. -- **BroadFileSystemAccess** Current state of the broad file system access setting. -- **CellularData** Current state of the cellular data capability setting. -- **Chat** Current state of the chat setting. -- **Contacts** Current state of the contacts setting. -- **DocumentsLibrary** Current state of the documents library setting. -- **Email** Current state of the email setting. -- **GazeInput** Current state of the gaze input setting. -- **HumanInterfaceDevice** Current state of the human interface device setting. -- **InkTypeImprovement** Current state of the improve inking and typing setting. -- **InkTypePersonalization** Current state of the inking and typing personalization setting. -- **Location** Current state of the location setting. -- **LocationHistory** Current state of the location history setting. -- **LocationHistoryCloudSync** Current state of the location history cloud synchronization setting. -- **LocationHistoryOnTimeline** Current state of the location history on timeline setting. -- **Microphone** Current state of the microphone setting. -- **PhoneCall** Current state of the phone call setting. -- **PhoneCallHistory** Current state of the call history setting. -- **PicturesLibrary** Current state of the pictures library setting. -- **Radios** Current state of the radios setting. -- **SensorsCustom** Current state of the custom sensor setting. -- **SerialCommunication** Current state of the serial communication setting. -- **Sms** Current state of the text messaging setting. -- **SpeechPersonalization** Current state of the speech services setting. -- **USB** Current state of the USB setting. -- **UserAccountInformation** Current state of the account information setting. -- **UserDataTasks** Current state of the tasks setting. -- **UserNotificationListener** Current state of the notifications setting. -- **VideosLibrary** Current state of the videos library setting. -- **Webcam** Current state of the camera setting. -- **WiFiDirect** Current state of the Wi-Fi direct setting. - - -### Census.VM - -This event sends data indicating whether virtualization is enabled on the device, and its various characteristics, to help keep Windows up to date. - -The following fields are available: - -- **CloudService** Indicates which cloud service, if any, that this virtual machine is running within. -- **HyperVisor** Retrieves whether the current OS is running on top of a Hypervisor. -- **IOMMUPresent** Represents if an input/output memory management unit (IOMMU) is present. -- **IsVDI** Is the device using Virtual Desktop Infrastructure? -- **IsVirtualDevice** Retrieves that when the Hypervisor is Microsoft's Hyper-V Hypervisor or other Hv#1 Hypervisor, this field will be set to FALSE for the Hyper-V host OS and TRUE for any guest OS's. This field should not be relied upon for non-Hv#1 Hypervisors. -- **SLATSupported** Represents whether Second Level Address Translation (SLAT) is supported by the hardware. -- **VirtualizationFirmwareEnabled** Represents whether virtualization is enabled in the firmware. - - -### Census.WU - -This event sends data about the Windows update server and other App store policies, to help keep Windows up to date. - -The following fields are available: - -- **AppraiserGatedStatus** Indicates whether a device has been gated for upgrading. -- **AppStoreAutoUpdate** Retrieves the Appstore settings for auto upgrade. (Enable/Disabled). -- **AppStoreAutoUpdateMDM** Retrieves the App Auto Update value for MDM: 0 - Disallowed. 1 - Allowed. 2 - Not configured. Default: [2] Not configured -- **AppStoreAutoUpdatePolicy** Retrieves the Microsoft Store App Auto Update group policy setting -- **DelayUpgrade** Retrieves the Windows upgrade flag for delaying upgrades. -- **OSAssessmentFeatureOutOfDate** How many days has it been since a the last feature update was released but the device did not install it? -- **OSAssessmentForFeatureUpdate** Is the device is on the latest feature update? -- **OSAssessmentForQualityUpdate** Is the device on the latest quality update? -- **OSAssessmentForSecurityUpdate** Is the device on the latest security update? -- **OSAssessmentQualityOutOfDate** How many days has it been since a the last quality update was released but the device did not install it? -- **OSAssessmentReleaseInfoTime** The freshness of release information used to perform an assessment. -- **OSRollbackCount** The number of times feature updates have rolled back on the device. -- **OSRolledBack** A flag that represents when a feature update has rolled back during setup. -- **OSUninstalled** A flag that represents when a feature update is uninstalled on a device . -- **OSWUAutoUpdateOptions** Retrieves the auto update settings on the device. -- **OSWUAutoUpdateOptionsSource** The source of auto update setting that appears in the OSWUAutoUpdateOptions field. For example: Group Policy (GP), Mobile Device Management (MDM), and Default. -- **UninstallActive** A flag that represents when a device has uninstalled a previous upgrade recently. -- **UpdateServiceURLConfigured** Retrieves if the device is managed by Windows Server Update Services (WSUS). -- **WUDeferUpdatePeriod** Retrieves if deferral is set for Updates. -- **WUDeferUpgradePeriod** Retrieves if deferral is set for Upgrades. -- **WUDODownloadMode** Retrieves whether DO is turned on and how to acquire/distribute updates Delivery Optimization (DO) allows users to deploy previously downloaded WU updates to other devices on the same network. -- **WUMachineId** Retrieves the Windows Update (WU) Machine Identifier. -- **WUPauseState** Retrieves WU setting to determine if updates are paused. -- **WUServer** Retrieves the HTTP(S) URL of the WSUS server that is used by Automatic Updates and API callers (by default). - - -### Census.Xbox - -This event sends data about the Xbox Console, such as Serial Number and DeviceId, to help keep Windows up to date. - -The following fields are available: - -- **XboxConsolePreferredLanguage** Retrieves the preferred language selected by the user on Xbox console. -- **XboxConsoleSerialNumber** Retrieves the serial number of the Xbox console. -- **XboxLiveDeviceId** Retrieves the unique device ID of the console. -- **XboxLiveSandboxId** Retrieves the developer sandbox ID if the device is internal to Microsoft. - - -## Common data extensions - -### Common Data Extensions.app - -Describes the properties of the running application. This extension could be populated by a client app or a web app. - -The following fields are available: - -- **asId** An integer value that represents the app session. This value starts at 0 on the first app launch and increments after each subsequent app launch per boot session. -- **env** The environment from which the event was logged. -- **expId** Associates a flight, such as an OS flight, or an experiment, such as a web site UX experiment, with an event. -- **id** Represents a unique identifier of the client application currently loaded in the process producing the event; and is used to group events together and understand usage pattern, errors by application. -- **locale** The locale of the app. -- **name** The name of the app. -- **userId** The userID as known by the application. -- **ver** Represents the version number of the application. Used to understand errors by Version, Usage by Version across an app. - - -### Common Data Extensions.container - -Describes the properties of the container for events logged within a container. - -The following fields are available: - -- **epoch** An ID that's incremented for each SDK initialization. -- **localId** The device ID as known by the client. -- **osVer** The operating system version. -- **seq** An ID that's incremented for each event. -- **type** The container type. Examples: Process or VMHost - - -### Common Data Extensions.cs - -Describes properties related to the schema of the event. - -The following fields are available: - -- **sig** A common schema signature that identifies new and modified event schemas. - - -### Common Data Extensions.device - -Describes the device-related fields. - -The following fields are available: - -- **deviceClass** The device classification. For example, Desktop, Server, or Mobile. -- **localId** A locally-defined unique ID for the device. This is not the human-readable device name. Most likely equal to the value stored at HKLM\Software\Microsoft\SQMClient\MachineId -- **make** Device manufacturer. -- **model** Device model. - - -### Common Data Extensions.Envelope - -Represents an envelope that contains all of the common data extensions. - -The following fields are available: - -- **cV** Represents the Correlation Vector: A single field for tracking partial order of related telemetry events across component boundaries. -- **data** Represents the optional unique diagnostic data for a particular event schema. -- **ext_app** Describes the properties of the running application. This extension could be populated by either a client app or a web app. See [Common Data Extensions.app](#common-data-extensionsapp). -- **ext_container** Describes the properties of the container for events logged within a container. See [Common Data Extensions.container](#common-data-extensionscontainer). -- **ext_cs** Describes properties related to the schema of the event. See [Common Data Extensions.cs](#common-data-extensionscs). -- **ext_device** Describes the device-related fields. See [Common Data Extensions.device](#common-data-extensionsdevice). -- **ext_os** Describes the operating system properties that would be populated by the client. See [Common Data Extensions.os](#common-data-extensionsos). -- **ext_receipts** Describes the fields related to time as provided by the client for debugging purposes. See [Common Data Extensions.receipts](#common-data-extensionsreceipts). -- **ext_sdk** Describes the fields related to a platform library required for a specific SDK. See [Common Data Extensions.sdk](#common-data-extensionssdk). -- **ext_user** Describes the fields related to a user. See [Common Data Extensions.user](#common-data-extensionsuser). -- **ext_utc** Describes the fields that might be populated by a logging library on Windows. See [Common Data Extensions.utc](#common-data-extensionsutc). -- **ext_xbl** Describes the fields related to XBOX Live. See [Common Data Extensions.xbl](#common-data-extensionsxbl). -- **flags** Represents a collection of bits that describe how the event should be processed by the Connected User Experience and Telemetry component pipeline. The lowest-order byte is the event persistence. The next byte is the event latency. -- **iKey** Represents an ID for applications or other logical groupings of events. -- **name** Represents the uniquely qualified name for the event. -- **popSample** Represents the effective sample rate for this event at the time it was generated by a client. -- **time** Represents the event date time in Coordinated Universal Time (UTC) when the event was generated on the client. This should be in ISO 8601 format. -- **ver** Represents the major and minor version of the extension. - - -### Common Data Extensions.os - -Describes some properties of the operating system. - -The following fields are available: - -- **bootId** An integer value that represents the boot session. This value starts at 0 on first boot after OS install and increments after every reboot. -- **expId** Represents the experiment ID. The standard for associating a flight, such as an OS flight (pre-release build), or an experiment, such as a web site UX experiment, with an event is to record the flight / experiment IDs in Part A of the common schema. -- **locale** Represents the locale of the operating system. -- **name** Represents the operating system name. -- **ver** Represents the major and minor version of the extension. - - -### Common Data Extensions.receipts - -Represents various time information as provided by the client and helps for debugging purposes. - -The following fields are available: - -- **originalTime** The original event time. -- **uploadTime** The time the event was uploaded. - - -### Common Data Extensions.sdk - -Used by platform specific libraries to record fields that are required for a specific SDK. - -The following fields are available: - -- **epoch** An ID that is incremented for each SDK initialization. -- **installId** An ID that's created during the initialization of the SDK for the first time. -- **libVer** The SDK version. -- **seq** An ID that is incremented for each event. - - -### Common Data Extensions.user - -Describes the fields related to a user. - -The following fields are available: - -- **authId** This is an ID of the user associated with this event that is deduced from a token such as a Microsoft Account ticket or an XBOX token. -- **locale** The language and region. -- **localId** Represents a unique user identity that is created locally and added by the client. This is not the user's account ID. - - -### Common Data Extensions.utc - -Describes the properties that could be populated by a logging library on Windows. - -The following fields are available: - -- **aId** Represents the ETW ActivityId. Logged via TraceLogging or directly via ETW. -- **bSeq** Upload buffer sequence number in the format: buffer identifier:sequence number -- **cat** Represents a bitmask of the ETW Keywords associated with the event. -- **cpId** The composer ID, such as Reference, Desktop, Phone, Holographic, Hub, IoT Composer. -- **epoch** Represents the epoch and seqNum fields, which help track how many events were fired and how many events were uploaded, and enables identification of data lost during upload and de-duplication of events on the ingress server. -- **flags** Represents the bitmap that captures various Windows specific flags. -- **mon** Combined monitor and event sequence numbers in the format: monitor sequence : event sequence -- **op** Represents the ETW Op Code. -- **raId** Represents the ETW Related ActivityId. Logged via TraceLogging or directly via ETW. -- **seq** Represents the sequence field used to track absolute order of uploaded events. It is an incrementing identifier for each event added to the upload queue. The Sequence helps track how many events were fired and how many events were uploaded and enables identification of data lost during upload and de-duplication of events on the ingress server. -- **stId** Represents the Scenario Entry Point ID. This is a unique GUID for each event in a diagnostic scenario. This used to be Scenario Trigger ID. - - -### Common Data Extensions.xbl - -Describes the fields that are related to XBOX Live. - -The following fields are available: - -- **claims** Any additional claims whose short claim name hasn't been added to this structure. -- **did** XBOX device ID -- **dty** XBOX device type -- **dvr** The version of the operating system on the device. -- **eid** A unique ID that represents the developer entity. -- **exp** Expiration time -- **ip** The IP address of the client device. -- **nbf** Not before time -- **pid** A comma separated list of PUIDs listed as base10 numbers. -- **sbx** XBOX sandbox identifier -- **sid** The service instance ID. -- **sty** The service type. -- **tid** The XBOX Live title ID. -- **tvr** The XBOX Live title version. -- **uts** A bit field, with 2 bits being assigned to each user ID listed in xid. This field is omitted if all users are retail accounts. -- **xid** A list of base10-encoded XBOX User IDs. - - -## Common data fields - -### Ms.Device.DeviceInventoryChange - -Describes the installation state for all hardware and software components available on a particular device. - -The following fields are available: - -- **action** The change that was invoked on a device inventory object. -- **inventoryId** Device ID used for Compatibility testing -- **objectInstanceId** Object identity which is unique within the device scope. -- **objectType** Indicates the object type that the event applies to. -- **syncId** A string used to group StartSync, EndSync, Add, and Remove operations that belong together. This field is unique by Sync period and is used to disambiguate in situations where multiple agents perform overlapping inventories for the same object. - - -## Compatibility events - -### Microsoft.Windows.Compatibility.Apphelp.SdbFix - -Product instrumentation for helping debug/troubleshoot issues with inbox compatibility components. - -The following fields are available: - -- **AppName** Name of the application impacted by SDB. -- **FixID** SDB GUID. -- **Flags** List of flags applied. -- **ImageName** Name of file. - - -## Component-based servicing events - -### CbsServicingProvider.CbsCapabilityEnumeration - -This event reports on the results of scanning for optional Windows content on Windows Update. - -The following fields are available: - -- **architecture** Indicates the scan was limited to the specified architecture. -- **capabilityCount** The number of optional content packages found during the scan. -- **clientId** The name of the application requesting the optional content. -- **duration** The amount of time it took to complete the scan. -- **hrStatus** The HReturn code of the scan. -- **language** Indicates the scan was limited to the specified language. -- **majorVersion** Indicates the scan was limited to the specified major version. -- **minorVersion** Indicates the scan was limited to the specified minor version. -- **namespace** Indicates the scan was limited to packages in the specified namespace. -- **sourceFilter** A bitmask indicating the scan checked for locally available optional content. -- **stackBuild** The build number of the servicing stack. -- **stackMajorVersion** The major version number of the servicing stack. -- **stackMinorVersion** The minor version number of the servicing stack. -- **stackRevision** The revision number of the servicing stack. - - -### CbsServicingProvider.CbsCapabilitySessionFinalize - -This event provides information about the results of installing or uninstalling optional Windows content from Windows Update. - -The following fields are available: - -- **capabilities** The names of the optional content packages that were installed. -- **clientId** The name of the application requesting the optional content. -- **currentID** The ID of the current install session. -- **downloadSource** The source of the download. -- **highestState** The highest final install state of the optional content. -- **hrLCUReservicingStatus** Indicates whether the optional content was updated to the latest available version. -- **hrStatus** The HReturn code of the install operation. -- **rebootCount** The number of reboots required to complete the install. -- **retryID** The session ID that will be used to retry a failed operation. -- **retryStatus** Indicates whether the install will be retried in the event of failure. -- **stackBuild** The build number of the servicing stack. -- **stackMajorVersion** The major version number of the servicing stack. -- **stackMinorVersion** The minor version number of the servicing stack. -- **stackRevision** The revision number of the servicing stack. - - -### CbsServicingProvider.CbsCapabilitySessionPended - -This event provides information about the results of installing optional Windows content that requires a reboot to keep Windows up to date. - -The following fields are available: - -- **clientId** The name of the application requesting the optional content. -- **pendingDecision** Indicates the cause of reboot, if applicable. - - -### CbsServicingProvider.CbsLateAcquisition - -This event sends data to indicate if some Operating System packages could not be updated as part of an upgrade, to help keep Windows up to date. - -The following fields are available: - -- **Features** The list of feature packages that could not be updated. -- **RetryID** The ID identifying the retry attempt to update the listed packages. - - -### CbsServicingProvider.CbsPackageRemoval - -This event provides information about the results of uninstalling a Windows Cumulative Security Update to help keep Windows up to date. - -The following fields are available: - -- **buildVersion** The build number of the security update being uninstalled. -- **clientId** The name of the application requesting the uninstall. -- **currentStateEnd** The final state of the update after the operation. -- **failureDetails** Information about the cause of a failure, if applicable. -- **failureSourceEnd** The stage during the uninstall where the failure occurred. -- **hrStatusEnd** The overall exit code of the operation. -- **initiatedOffline** Indicates if the uninstall was initiated for a mounted Windows image. -- **majorVersion** The major version number of the security update being uninstalled. -- **minorVersion** The minor version number of the security update being uninstalled. -- **originalState** The starting state of the update before the operation. -- **pendingDecision** Indicates the cause of reboot, if applicable. -- **primitiveExecutionContext** The state during system startup when the uninstall was completed. -- **revisionVersion** The revision number of the security update being uninstalled. -- **transactionCanceled** Indicates whether the uninstall was cancelled. - - -### CbsServicingProvider.CbsQualityUpdateInstall - -This event reports on the performance and reliability results of installing Servicing content from Windows Update to keep Windows up to date. - -The following fields are available: - -- **buildVersion** The build version number of the update package. -- **clientId** The name of the application requesting the optional content. -- **corruptionHistoryFlags** A bitmask of the types of component store corruption that have caused update failures on the device. -- **corruptionType** An enumeration listing the type of data corruption responsible for the current update failure. -- **currentStateEnd** The final state of the package after the operation has completed. -- **doqTimeSeconds** The time in seconds spent updating drivers. -- **executeTimeSeconds** The number of seconds required to execute the install. -- **failureDetails** The driver or installer that caused the update to fail. -- **failureSourceEnd** An enumeration indicating at what phase of the update a failure occurred. -- **hrStatusEnd** The return code of the install operation. -- **initiatedOffline** A true or false value indicating whether the package was installed into an offline Windows Imaging Format (WIM) file. -- **majorVersion** The major version number of the update package. -- **minorVersion** The minor version number of the update package. -- **originalState** The starting state of the package. -- **overallTimeSeconds** The time (in seconds) to perform the overall servicing operation. -- **planTimeSeconds** The time in seconds required to plan the update operations. -- **poqTimeSeconds** The time in seconds processing file and registry operations. -- **postRebootTimeSeconds** The time (in seconds) to do startup processing for the update. -- **preRebootTimeSeconds** The time (in seconds) between execution of the installation and the reboot. -- **primitiveExecutionContext** An enumeration indicating at what phase of shutdown or startup the update was installed. -- **rebootCount** The number of reboots required to install the update. -- **rebootTimeSeconds** The time (in seconds) before startup processing begins for the update. -- **resolveTimeSeconds** The time in seconds required to resolve the packages that are part of the update. -- **revisionVersion** The revision version number of the update package. -- **rptTimeSeconds** The time in seconds spent executing installer plugins. -- **shutdownTimeSeconds** The time (in seconds) required to do shutdown processing for the update. -- **stackRevision** The revision number of the servicing stack. -- **stageTimeSeconds** The time (in seconds) required to stage all files that are part of the update. - - -## Deployment extensions - -### DeploymentTelemetry.Deployment_End - -This event indicates that a Deployment 360 API has completed. - -The following fields are available: - -- **ClientId** Client ID of the user utilizing the D360 API. -- **ErrorCode** Error code of action. -- **FlightId** The specific ID of the Windows Insider build the device is getting. -- **Mode** Phase in upgrade. -- **RelatedCV** The correction vector (CV) of any other related events -- **Result** End result of the action. - - -### DeploymentTelemetry.Deployment_SetupBoxLaunch - -This event indicates that the Deployment 360 APIs have launched Setup Box. - -The following fields are available: - -- **ClientId** The client ID of the user utilizing the D360 API. -- **FlightId** The specific ID of the Windows Insider build the device is getting. -- **Quiet** Whether Setup will run in quiet mode or full mode. -- **RelatedCV** The correlation vector (CV) of any other related events. -- **SetupMode** The current setup phase. - - -### DeploymentTelemetry.Deployment_SetupBoxResult - -This event indicates that the Deployment 360 APIs have received a return from Setup Box. - -The following fields are available: - -- **ClientId** Client ID of the user utilizing the D360 API. -- **ErrorCode** Error code of the action. -- **FlightId** The specific ID of the Windows Insider build the device is getting. -- **Quiet** Indicates whether Setup will run in quiet mode or full mode. -- **RelatedCV** The correlation vector (CV) of any other related events. -- **SetupMode** The current Setup phase. - - -### DeploymentTelemetry.Deployment_Start - -This event indicates that a Deployment 360 API has been called. - -The following fields are available: - -- **ClientId** Client ID of the user utilizing the D360 API. -- **FlightId** The specific ID of the Windows Insider build the device is getting. -- **Mode** The current phase of the upgrade. -- **RelatedCV** The correlation vector (CV) of any other related events. - - -## Diagnostic data events - -### TelClientSynthetic.AbnormalShutdown_0 - -This event sends data about boot IDs for which a normal clean shutdown was not observed, to help keep Windows up to date. - -The following fields are available: - -- **AbnormalShutdownBootId** BootId of the abnormal shutdown being reported by this event. -- **AcDcStateAtLastShutdown** Identifies if the device was on battery or plugged in. -- **BatteryLevelAtLastShutdown** The last recorded battery level. -- **BatteryPercentageAtLastShutdown** The battery percentage at the last shutdown. -- **CrashDumpEnabled** Indicates whether crash dumps are enabled. -- **CumulativeCrashCount** Cumulative count of operating system crashes since the BootId reset. -- **CurrentBootId** BootId at the time the abnormal shutdown event was being reported. -- **Firmwaredata->ResetReasonEmbeddedController** The reset reason that was supplied by the firmware. -- **Firmwaredata->ResetReasonEmbeddedControllerAdditional** Additional data related to reset reason provided by the firmware. -- **Firmwaredata->ResetReasonPch** The reset reason that was supplied by the hardware. -- **Firmwaredata->ResetReasonPchAdditional** Additional data related to the reset reason supplied by the hardware. -- **Firmwaredata->ResetReasonSupplied** Indicates whether the firmware supplied any reset reason or not. -- **FirmwareType** ID of the FirmwareType as enumerated in DimFirmwareType. -- **HardwareWatchdogTimerGeneratedLastReset** Indicates whether the hardware watchdog timer caused the last reset. -- **HardwareWatchdogTimerPresent** Indicates whether hardware watchdog timer was present or not. -- **LastBugCheckBootId** bootId of the last captured crash. -- **LastBugCheckCode** Code that indicates the type of error. -- **LastBugCheckContextFlags** Additional crash dump settings. -- **LastBugCheckOriginalDumpType** The type of crash dump the system intended to save. -- **LastBugCheckOtherSettings** Other crash dump settings. -- **LastBugCheckParameter1** The first parameter with additional info on the type of the error. -- **LastBugCheckProgress** Progress towards writing out the last crash dump. -- **LastBugCheckVersion** The version of the information struct written during the crash. -- **LastSuccessfullyShutdownBootId** BootId of the last fully successful shutdown. -- **LongPowerButtonPressDetected** Identifies if the user was pressing and holding power button. -- **OOBEInProgress** Identifies if the Out-Of-Box-Experience is running. -- **OSSetupInProgress** Identifies if the operating system setup is running. -- **PowerButtonCumulativePressCount** Indicates the number of times the power button has been pressed ("pressed" not to be confused with "released"). -- **PowerButtonCumulativeReleaseCount** Indicates the number of times the power button has been released ("released" not to be confused with "pressed"). -- **PowerButtonErrorCount** Indicates the number of times there was an error attempting to record Power Button metrics (e.g.: due to a failure to lock/update the bootstat file). -- **PowerButtonLastPressBootId** BootId of the last time the Power Button was detected to have been pressed ("pressed" not to be confused with "released"). -- **PowerButtonLastPressTime** Date/time of the last time the Power Button was pressed ("pressed" not to be confused with "released"). -- **PowerButtonLastReleaseBootId** The Boot ID of the last time the Power Button was released ("released" not to be confused with "pressed"). -- **PowerButtonLastReleaseTime** The date and time the Power Button was most recently released ("released" not to be confused with "pressed"). -- **PowerButtonPressCurrentCsPhase** Represents the phase of Connected Standby exit when the power button was pressed. -- **PowerButtonPressIsShutdownInProgress** Indicates whether a system shutdown was in progress at the last time the power button was pressed. -- **PowerButtonPressLastPowerWatchdogStage** The last stage completed when the Power Button was most recently pressed. -- **PowerButtonPressPowerWatchdogArmed** Indicates whether or not the watchdog for the monitor was active at the time of the last power button press. -- **ShutdownDeviceType** Identifies who triggered a shutdown. Is it because of battery, thermal zones, or through a Kernel API. -- **SleepCheckpoint** Provides the last checkpoint when there is a failure during a sleep transition. -- **SleepCheckpointSource** Indicates whether the source is the EFI variable or bootstat file. -- **SleepCheckpointStatus** Indicates whether the checkpoint information is valid. -- **StaleBootStatData** Identifies if the data from bootstat is stale. -- **TransitionInfoBootId** The Boot ID of the captured transition information. -- **TransitionInfoCSCount** The total number of times the system transitioned from "Connected Standby" mode to "On" when the last marker was saved. -- **TransitionInfoCSEntryReason** Indicates the reason the device last entered "Connected Standby" mode ("entered" not to be confused with "exited"). -- **TransitionInfoCSExitReason** Indicates the reason the device last exited "Connected Standby" mode ("exited" not to be confused with "entered"). -- **TransitionInfoCSInProgress** Indicates whether the system was in or entering Connected Standby mode when the last marker was saved. -- **TransitionInfoLastReferenceTimeChecksum** The checksum of TransitionInfoLastReferenceTimestamp. -- **TransitionInfoLastReferenceTimestamp** The date and time that the marker was last saved. -- **TransitionInfoLidState** Describes the state of the laptop lid. -- **TransitionInfoPowerButtonTimestamp** The most recent date and time when the Power Button was pressed (collected via a different mechanism than PowerButtonLastPressTime). -- **TransitionInfoSleepInProgress** Indicates whether the system was in or entering Sleep mode when the last marker was saved. -- **TransitionInfoSleepTranstionsToOn** The total number of times the system transitioned from Sleep mode to on, when the last marker was saved. -- **TransitionInfoSystemRunning** Indicates whether the system was running when the last marker was saved. -- **TransitionInfoSystemShutdownInProgress** Indicates whether a device shutdown was in progress when the power button was pressed. -- **TransitionInfoUserShutdownInProgress** Indicates whether a user shutdown was in progress when the power button was pressed. -- **TransitionLatestCheckpointId** Represents a unique identifier for a checkpoint during the device state transition. -- **TransitionLatestCheckpointSeqNumber** Represents the chronological sequence number of the checkpoint. -- **TransitionLatestCheckpointType** Represents the type of the checkpoint, which can be the start of a phase, end of a phase, or just informational. -- **VirtualMachineId** If the operating system is on a virtual Machine, it gives the virtual Machine ID (GUID) that can be used to correlate events on the host. - - -### TelClientSynthetic.AuthorizationInfo_RuntimeTransition - -This event sends data indicating that a device has undergone a change of telemetry opt-in level detected at UTC startup, to help keep Windows up to date. The telemetry opt-in level signals what data we are allowed to collect. - -The following fields are available: - -- **CanAddMsaToMsTelemetry** True if we can add MSA PUID and CID to telemetry, false otherwise. -- **CanCollectAnyTelemetry** True if we are allowed to collect partner telemetry, false otherwise. -- **CanCollectCoreTelemetry** True if we can collect CORE/Basic telemetry, false otherwise. -- **CanCollectHeartbeats** True if we can collect heartbeat telemetry, false otherwise. -- **CanCollectOsTelemetry** True if we can collect diagnostic data telemetry, false otherwise. -- **CanCollectWindowsAnalyticsEvents** True if we can collect Windows Analytics data, false otherwise. -- **CanPerformDiagnosticEscalations** True if we can perform diagnostic escalation collection, false otherwise. -- **CanPerformTraceEscalations** True if we can perform trace escalation collection, false otherwise. -- **CanReportScenarios** True if we can report scenario completions, false otherwise. -- **PreviousPermissions** Bitmask of previous telemetry state. -- **TransitionFromEverythingOff** True if we are transitioning from all telemetry being disabled, false otherwise. - - -### TelClientSynthetic.AuthorizationInfo_Startup - -Fired by UTC at startup to signal what data we are allowed to collect. - -The following fields are available: - -- **CanAddMsaToMsTelemetry** True if we can add MSA PUID and CID to telemetry, false otherwise. -- **CanCollectAnyTelemetry** True if we are allowed to collect partner telemetry, false otherwise. -- **CanCollectCoreTelemetry** True if we can collect CORE/Basic telemetry, false otherwise. -- **CanCollectHeartbeats** True if we can collect heartbeat telemetry, false otherwise. -- **CanCollectOsTelemetry** True if we can collect diagnostic data telemetry, false otherwise. -- **CanCollectWindowsAnalyticsEvents** True if we can collect Windows Analytics data, false otherwise. -- **CanPerformDiagnosticEscalations** True if we can perform diagnostic escalation collection, false otherwise. -- **CanPerformTraceEscalations** True if we can perform trace escalation collection, false otherwise. -- **CanReportScenarios** True if we can report scenario completions, false otherwise. -- **PreviousPermissions** Bitmask of previous telemetry state. -- **TransitionFromEverythingOff** True if we are transitioning from all telemetry being disabled, false otherwise. - - -### TelClientSynthetic.ConnectivityHeartBeat_0 - -This event sends data about the connectivity status of the Connected User Experience and Telemetry component that uploads telemetry events. If an unrestricted free network (such as Wi-Fi) is available, this event updates the last successful upload time. Otherwise, it checks whether a Connectivity Heartbeat event was fired in the past 24 hours, and if not, it fires an event. A Connectivity Heartbeat event also fires when a device recovers from costed network to free network. - -The following fields are available: - -- **CensusExitCode** Returns last execution codes from census client run. -- **CensusStartTime** Returns timestamp corresponding to last successful census run. -- **CensusTaskEnabled** Returns Boolean value for the census task (Enable/Disable) on client machine. -- **LastConnectivityLossTime** Retrieves the last time the device lost free network. -- **NetworkState** Retrieves the network state: 0 = No network. 1 = Restricted network. 2 = Free network. -- **NoNetworkTime** Retrieves the time spent with no network (since the last time) in seconds. -- **RestrictedNetworkTime** Retrieves the time spent on a metered (cost restricted) network in seconds. - - -### TelClientSynthetic.HeartBeat_5 - -This event sends data about the health and quality of the diagnostic data from the given device, to help keep Windows up to date. It also enables data analysts to determine how 'trusted' the data is from a given device. - -The following fields are available: - -- **AgentConnectionErrorsCount** Number of non-timeout errors associated with the host/agent channel. -- **CensusExitCode** The last exit code of the Census task. -- **CensusStartTime** Time of last Census run. -- **CensusTaskEnabled** True if Census is enabled, false otherwise. -- **CompressedBytesUploaded** Number of compressed bytes uploaded. -- **ConsumerDroppedCount** Number of events dropped at consumer layer of telemetry client. -- **CriticalDataDbDroppedCount** Number of critical data sampled events dropped at the database layer. -- **CriticalDataThrottleDroppedCount** The number of critical data sampled events that were dropped because of throttling. -- **CriticalOverflowEntersCounter** Number of times critical overflow mode was entered in event DB. -- **DbCriticalDroppedCount** Total number of dropped critical events in event DB. -- **DbDroppedCount** Number of events dropped due to DB fullness. -- **DbDroppedFailureCount** Number of events dropped due to DB failures. -- **DbDroppedFullCount** Number of events dropped due to DB fullness. -- **DecodingDroppedCount** Number of events dropped due to decoding failures. -- **EnteringCriticalOverflowDroppedCounter** Number of events dropped due to critical overflow mode being initiated. -- **EtwDroppedBufferCount** Number of buffers dropped in the UTC ETW session. -- **EtwDroppedCount** Number of events dropped at ETW layer of telemetry client. -- **EventsPersistedCount** Number of events that reached the PersistEvent stage. -- **EventStoreLifetimeResetCounter** Number of times event DB was reset for the lifetime of UTC. -- **EventStoreResetCounter** Number of times event DB was reset. -- **EventStoreResetSizeSum** Total size of event DB across all resets reports in this instance. -- **EventSubStoreResetCounter** Number of times event DB was reset. -- **EventSubStoreResetSizeSum** Total size of event DB across all resets reports in this instance. -- **EventsUploaded** Number of events uploaded. -- **Flags** Flags indicating device state such as network state, battery state, and opt-in state. -- **FullTriggerBufferDroppedCount** Number of events dropped due to trigger buffer being full. -- **HeartBeatSequenceNumber** The sequence number of this heartbeat. -- **InvalidHttpCodeCount** Number of invalid HTTP codes received from contacting Vortex. -- **LastAgentConnectionError** Last non-timeout error encountered in the host/agent channel. -- **LastEventSizeOffender** Event name of last event which exceeded max event size. -- **LastInvalidHttpCode** Last invalid HTTP code received from Vortex. -- **MaxActiveAgentConnectionCount** The maximum number of active agents during this heartbeat timeframe. -- **MaxInUseScenarioCounter** Soft maximum number of scenarios loaded by UTC. -- **PreviousHeartBeatTime** Time of last heartbeat event (allows chaining of events). -- **RepeatedUploadFailureDropped** Number of events lost due to repeated upload failures for a single buffer. -- **SettingsHttpAttempts** Number of attempts to contact OneSettings service. -- **SettingsHttpFailures** The number of failures from contacting the OneSettings service. -- **ThrottledDroppedCount** Number of events dropped due to throttling of noisy providers. -- **TopUploaderErrors** List of top errors received from the upload endpoint. -- **UploaderDroppedCount** Number of events dropped at the uploader layer of telemetry client. -- **UploaderErrorCount** Number of errors received from the upload endpoint. -- **VortexFailuresTimeout** The number of timeout failures received from Vortex. -- **VortexHttpAttempts** Number of attempts to contact Vortex. -- **VortexHttpFailures4xx** Number of 400-499 error codes received from Vortex. -- **VortexHttpFailures5xx** Number of 500-599 error codes received from Vortex. -- **VortexHttpResponseFailures** Number of Vortex responses that are not 2XX or 400. -- **VortexHttpResponsesWithDroppedEvents** Number of Vortex responses containing at least 1 dropped event. - - -### TelClientSynthetic.HeartBeat_Aria_5 - -This event is the telemetry client ARIA heartbeat. - -The following fields are available: - -- **CompressedBytesUploaded** Number of compressed bytes uploaded. -- **CriticalDataDbDroppedCount** Number of critical data sampled events dropped at the database layer. -- **CriticalOverflowEntersCounter** Number of times critical overflow mode was entered in event database. -- **DbCriticalDroppedCount** Total number of dropped critical events in event database. -- **DbDroppedCount** Number of events dropped at the database layer. -- **DbDroppedFailureCount** Number of events dropped due to database failures. -- **DbDroppedFullCount** Number of events dropped due to database being full. -- **EnteringCriticalOverflowDroppedCounter** Number of events dropped due to critical overflow mode being initiated. -- **EventsPersistedCount** Number of events that reached the PersistEvent stage. -- **EventStoreLifetimeResetCounter** Number of times the event store has been reset. -- **EventStoreResetCounter** Number of times the event store has been reset during this heartbeat. -- **EventStoreResetSizeSum** Size of event store reset in bytes. -- **EventsUploaded** Number of events uploaded. -- **HeartBeatSequenceNumber** The sequence number of this heartbeat. -- **InvalidHttpCodeCount** Number of invalid HTTP codes received from contacting Vortex. -- **LastEventSizeOffender** Event name of last event which exceeded max event size. -- **LastInvalidHttpCode** Last invalid HTTP code received from Vortex. -- **PreviousHeartBeatTime** The FILETIME of the previous heartbeat fire. -- **RepeatedUploadFailureDropped** Number of events lost due to repeated upload failures for a single buffer. -- **SettingsHttpAttempts** Number of attempts to contact OneSettings service. -- **SettingsHttpFailures** Number of failures from contacting OneSettings service. -- **TopUploaderErrors** List of top errors received from the upload endpoint. -- **UploaderDroppedCount** Number of events dropped at the uploader layer of telemetry client. -- **UploaderErrorCount** Number of errors received from the upload endpoint. -- **VortexFailuresTimeout** Number of time out failures received from Vortex. -- **VortexHttpAttempts** Number of attempts to contact Vortex. -- **VortexHttpFailures4xx** Number of 400-499 error codes received from Vortex. -- **VortexHttpFailures5xx** Number of 500-599 error codes received from Vortex. -- **VortexHttpResponseFailures** Number of Vortex responses that are not 2XX or 400. -- **VortexHttpResponsesWithDroppedEvents** Number of Vortex responses containing at least 1 dropped event. - - -### TelClientSynthetic.HeartBeat_Seville_5 - -This event is sent by the universal telemetry client (UTC) as a heartbeat signal for Sense. - -The following fields are available: - -- **AgentConnectionErrorsCount** Number of non-timeout errors associated with the host or agent channel. -- **CompressedBytesUploaded** Number of compressed bytes uploaded. -- **ConsumerDroppedCount** Number of events dropped at consumer layer of the telemetry client. -- **CriticalDataDbDroppedCount** Number of critical data sampled events dropped at the database layer. -- **CriticalDataThrottleDroppedCount** Number of critical data sampled events dropped due to throttling. -- **CriticalOverflowEntersCounter** Number of times critical overflow mode was entered in event database. -- **DailyUploadQuotaInBytes** Daily upload quota for Sense in bytes (only in in-proc mode). -- **DbCriticalDroppedCount** Total number of dropped critical events in event database. -- **DbDroppedCount** Number of events dropped due to database being full. -- **DbDroppedFailureCount** Number of events dropped due to database failures. -- **DbDroppedFullCount** Number of events dropped due to database being full. -- **DecodingDroppedCount** Number of events dropped due to decoding failures. -- **DiskSizeInBytes** Size of event store for Sense in bytes (only in in-proc mode). -- **EnteringCriticalOverflowDroppedCounter** Number of events dropped due to critical overflow mode being initiated. -- **EtwDroppedBufferCount** Number of buffers dropped in the universal telemetry client (UTC) event tracing for Windows (ETW) session. -- **EtwDroppedCount** Number of events dropped at the event tracing for Windows (ETW) layer of telemetry client. -- **EventsPersistedCount** Number of events that reached the PersistEvent stage. -- **EventStoreLifetimeResetCounter** Number of times event the database was reset for the lifetime of the universal telemetry client (UTC). -- **EventStoreResetCounter** Number of times the event database was reset. -- **EventStoreResetSizeSum** Total size of the event database across all resets reports in this instance. -- **EventsUploaded** Number of events uploaded. -- **Flags** Flags indicating device state, such as network state, battery state, and opt-in state. -- **FullTriggerBufferDroppedCount** Number of events dropped due to trigger buffer being full. -- **HeartBeatSequenceNumber** The sequence number of this heartbeat. -- **InvalidHttpCodeCount** Number of invalid HTTP codes received from contacting Vortex. -- **LastAgentConnectionError** Last non-timeout error encountered in the host/agent channel. -- **LastEventSizeOffender** Event name of last event which exceeded the maximum event size. -- **LastInvalidHttpCode** Last invalid HTTP code received from Vortex. -- **MaxActiveAgentConnectionCount** Maximum number of active agents during this heartbeat timeframe. -- **NormalUploadTimerMillis** Number of milliseconds between each upload of normal events for SENSE (only in in-proc mode). -- **PreviousHeartBeatTime** Time of last heartbeat event (allows chaining of events). -- **RepeatedUploadFailureDropped** Number of events lost due to repeated failed uploaded attempts. -- **SettingsHttpAttempts** Number of attempts to contact OneSettings service. -- **SettingsHttpFailures** Number of failures from contacting the OneSettings service. -- **ThrottledDroppedCount** Number of events dropped due to throttling of noisy providers. -- **TopUploaderErrors** Top uploader errors, grouped by endpoint and error type. -- **UploaderDroppedCount** Number of events dropped at the uploader layer of the telemetry client. -- **UploaderErrorCount** Number of input for the TopUploaderErrors mode estimation. -- **VortexFailuresTimeout** Number of time out failures received from Vortex. -- **VortexHttpAttempts** Number of attempts to contact Vortex. -- **VortexHttpFailures4xx** Number of 400-499 error codes received from Vortex. -- **VortexHttpFailures5xx** Number of 500-599 error codes received from Vortex. -- **VortexHttpResponseFailures** Number of Vortex responses that are not 2XX or 400. -- **VortexHttpResponsesWithDroppedEvents** Number of Vortex responses containing at least 1 dropped event. - - -## Direct to update events - -### Microsoft.Windows.DirectToUpdate.DTUCoordinatorCheckApplicabilityGenericFailure - -This event indicatse that we have received an unexpected error in the Direct to Update (DTU) Coordinators CheckApplicability call. - -The following fields are available: - -- **CampaignID** ID of the campaign being run. -- **ClientID** ID of the client receiving the update. -- **CoordinatorVersion** Coordinator version of Direct to Update. -- **CV** Correlation vector. -- **hResult** HRESULT of the failure. - - -### Microsoft.Windows.DirectToUpdate.DTUCoordinatorCleanupGenericFailure - -This event indicates that we have received an unexpected error in the Direct to Update (DTU) Coordinator Cleanup call. - -The following fields are available: - -- **CampaignID** Campaign ID being run -- **ClientID** Client ID being run -- **CoordinatorVersion** Coordinator version of DTU -- **CV** Correlation vector -- **hResult** HRESULT of the failure - - -### Microsoft.Windows.DirectToUpdate.DTUCoordinatorCleanupSuccess - -This event indicates that the Coordinator Cleanup call succeeded. - -The following fields are available: - -- **CampaignID** Campaign ID being run -- **ClientID** Client ID being run -- **CoordinatorVersion** Coordinator version of DTU -- **CV** Correlation vector - - -### Microsoft.Windows.DirectToUpdate.DTUCoordinatorCommitGenericFailure - -This event indicates that we have received an unexpected error in the Direct to Update (DTU) Coordinator Commit call. - -The following fields are available: - -- **CampaignID** Campaign ID being run. -- **ClientID** Client ID being run. -- **CoordinatorVersion** Coordinator version of DTU. -- **CV** Correlation vector. -- **hResult** HRESULT of the failure. - - -### Microsoft.Windows.DirectToUpdate.DTUCoordinatorCommitSuccess - -This event indicates that the Coordinator Commit call succeeded. - -The following fields are available: - -- **CampaignID** Campaign ID being run. -- **ClientID** Client ID being run. -- **CoordinatorVersion** Coordinator version of DTU. -- **CV** Correlation vector. - - -### Microsoft.Windows.DirectToUpdate.DTUCoordinatorDownloadGenericFailure - -This event indicates that we have received an unexpected error in the Direct to Update (DTU) Coordinator Download call. - -The following fields are available: - -- **CampaignID** Campaign ID being run. -- **ClientID** Client ID being run. -- **CoordinatorVersion** Coordinator version of DTU. -- **CV** Correlation vector. -- **hResult** HRESULT of the failure. - - -### Microsoft.Windows.DirectToUpdate.DTUCoordinatorDownloadIgnoredFailure - -This event indicates that we have received an error in the Direct to Update (DTU) Coordinator Download call that will be ignored. - -The following fields are available: - -- **CampaignID** Campaign ID being run. -- **ClientID** Client ID being run. -- **CoordinatorVersion** Coordinator version of DTU. -- **CV** Correlation vector. -- **hResult** HRESULT of the failure. - - -### Microsoft.Windows.DirectToUpdate.DTUCoordinatorDownloadSuccess - -This event indicates that the Coordinator Download call succeeded. - -The following fields are available: - -- **CampaignID** Campaign ID being run. -- **ClientID** Client ID being run. -- **CoordinatorVersion** Coordinator version of DTU. -- **CV** Correlation vector. - - -### Microsoft.Windows.DirectToUpdate.DTUCoordinatorHandleShutdownGenericFailure - -This event indicates that we have received an unexpected error in the Direct to Update (DTU) Coordinator HandleShutdown call. - -The following fields are available: - -- **CampaignID** Campaign ID being run. -- **ClientID** Client ID being run. -- **CoordinatorVersion** Coordinate version of DTU. -- **CV** Correlation vector. -- **hResult** HRESULT of the failure. - - -### Microsoft.Windows.DirectToUpdate.DTUCoordinatorHandleShutdownSuccess - -This event indicates that the Coordinator HandleShutdown call succeeded. - -The following fields are available: - -- **CampaignID** Campaign ID being run. -- **ClientID** Client ID being run. -- **CoordinatorVersion** Coordinator version of DTU. -- **CV** Correlation vector. - - -### Microsoft.Windows.DirectToUpdate.DTUCoordinatorInitializeGenericFailure - -This event indicates that we have received an unexpected error in the Direct to Update (DTU) Coordinator Initialize call. - -The following fields are available: - -- **CampaignID** Campaign ID being run. -- **ClientID** Client ID being run. -- **CoordinatorVersion** Coordinator version of DTU. -- **CV** Correlation vector. -- **hResult** HRESULT of the failure. - - -### Microsoft.Windows.DirectToUpdate.DTUCoordinatorInitializeSuccess - -This event indicates that the Coordinator Initialize call succeeded. - -The following fields are available: - -- **CampaignID** Campaign ID being run. -- **ClientID** Client ID being run. -- **CoordinatorVersion** Coordinator version of DTU. -- **CV** Correlation vector. - - -### Microsoft.Windows.DirectToUpdate.DTUCoordinatorInstallGenericFailure - -This event indicates that we have received an unexpected error in the Direct to Update (DTU) Coordinator Install call. - -The following fields are available: - -- **CampaignID** Campaign ID being run. -- **ClientID** Client ID being run. -- **CoordinatorVersion** Coordinator version of DTU. -- **CV** Correlation vector. -- **hResult** HRESULT of the failure. - - -### Microsoft.Windows.DirectToUpdate.DTUCoordinatorInstallIgnoredFailure - -This event indicates that we have received an error in the Direct to Update (DTU) Coordinator Install call that will be ignored. - -The following fields are available: - -- **CampaignID** Campaign ID being run. -- **ClientID** Client ID being run. -- **CoordinatorVersion** Coordinator version of DTU. -- **CV** Correlation vector. -- **hResult** HRESULT of the failure. - - -### Microsoft.Windows.DirectToUpdate.DTUCoordinatorInstallSuccess - -This event indicates that the Coordinator Install call succeeded. - -The following fields are available: - -- **CampaignID** Campaign ID being run. -- **ClientID** Client ID being run. -- **CoordinatorVersion** Coordinator version of DTU. -- **CV** Correlation vector. - - -### Microsoft.Windows.DirectToUpdate.DTUCoordinatorProgressCallBack - -This event indicates that the Coordinator's progress callback has been called. - -The following fields are available: - -- **CampaignID** Campaign ID being run. -- **ClientID** Client ID being run. -- **CoordinatorVersion** Coordinator version of DTU. -- **CV** Correlation vector. -- **DeployPhase** Current Deploy Phase. - - -### Microsoft.Windows.DirectToUpdate.DTUCoordinatorSetCommitReadySuccess - -This event indicates that the Coordinator SetCommitReady call succeeded. - -The following fields are available: - -- **CampaignID** ID of the update campaign being run. -- **ClientID** ID of the client receiving the update. -- **CoordinatorVersion** Coordinator version of Direct to Update. -- **CV** Correlation vector. - - -### Microsoft.Windows.DirectToUpdate.DTUCoordinatorWaitForRebootUiNotShown - -This event indicates that the Coordinator WaitForRebootUi call succeeded. - -The following fields are available: - -- **CampaignID** Campaign ID being run. -- **ClientID** ID of the client receiving the update. -- **CoordinatorVersion** Coordinator version of Direct to Update. -- **CV** Correlation vector. -- **hResult** HRESULT of the failure. - - -### Microsoft.Windows.DirectToUpdate.DTUCoordinatorWaitForRebootUiSelection - -This event indicates that the user selected an option on the Reboot UI. - -The following fields are available: - -- **CampaignID** ID of the update campaign being run. -- **ClientID** ID of the client receiving the update. -- **CoordinatorVersion** Coordinator version of Direct to Update. -- **CV** Correlation vector. -- **rebootUiSelection** Selection on the Reboot UI. - - -### Microsoft.Windows.DirectToUpdate.DTUCoordinatorWaitForRebootUiSuccess - -This event indicates that the Coordinator WaitForRebootUi call succeeded. - -The following fields are available: - -- **CampaignID** ID of the update campaign being run. -- **ClientID** ID of the client receiving the update. -- **CoordinatorVersion** Coordinator version of Direct to Update. -- **CV** Correlation vector. - - -### Microsoft.Windows.DirectToUpdate.DTUHandlerCheckApplicabilityInternalGenericFailure - -This event indicates that we have received an unexpected error in the Direct to Update (DTU) Handler CheckApplicabilityInternal call. - -The following fields are available: - -- **CampaignID** ID of the campaign being run. -- **ClientID** ID of the client receiving the update. -- **CoordinatorVersion** Coordinator version of Direct to Update. -- **CV** Correlation vector. -- **hResult** HRESULT of the failure. - - -### Microsoft.Windows.DirectToUpdate.DTUHandlerCheckApplicabilityInternalSuccess - -This event indicates that the Handler CheckApplicabilityInternal call succeeded. - -The following fields are available: - -- **ApplicabilityResult** The result of the applicability check. -- **CampaignID** ID of the update campaign being run. -- **ClientID** ID of the client receiving the update. -- **CoordinatorVersion** Coordinator version of Direct to Update. -- **CV** Correlation vector. - - -### Microsoft.Windows.DirectToUpdate.DTUHandlerCheckApplicabilitySuccess - -This event indicates that the Handler CheckApplicability call succeeded. - -The following fields are available: - -- **ApplicabilityResult** The result code indicating whether the update is applicable. -- **CampaignID** ID of the update campaign being run. -- **ClientID** ID of the client receiving the update. -- **CoordinatorVersion** Coordinator version of Direct to Update. -- **CV** Correlation vector. -- **CV_new** New correlation vector. - - -### Microsoft.Windows.DirectToUpdate.DTUHandlerCheckIfCoordinatorMinApplicableVersionSuccess - -This event indicates that the Handler CheckIfCoordinatorMinApplicableVersion call succeeded. - -The following fields are available: - -- **CampaignID** ID of the update campaign being run. -- **CheckIfCoordinatorMinApplicableVersionResult** Result of CheckIfCoordinatorMinApplicableVersion function. -- **ClientID** ID of the client receiving the update. -- **CoordinatorVersion** Coordinator version of Direct to Update. -- **CV** Correlation vector. - - -### Microsoft.Windows.DirectToUpdate.DTUHandlerCommitGenericFailure - -This event indicates that we have received an unexpected error in the Direct to Update (DTU) Handler Commit call. - -The following fields are available: - -- **CampaignID** ID of the update campaign being run. -- **ClientID** ID of the client receiving the update. -- **CoordinatorVersion** Coordinator version of Direct to Update. -- **CV** Correlation vector. -- **CV_new** New correlation vector. -- **hResult** HRESULT of the failure. - - -### Microsoft.Windows.DirectToUpdate.DTUHandlerCommitSuccess - -This event indicates that the Handler Commit call succeeded. - -The following fields are available: - -- **CampaignID** ID of the update campaign being run.run -- **ClientID** ID of the client receiving the update. -- **CoordinatorVersion** Coordinator version of Direct to Update. -- **CV** Correlation vector. -- **CV_new** New correlation vector. - - -### Microsoft.Windows.DirectToUpdate.DTUHandlerDownloadAndExtractCabFailure - -This event indicates that the Handler Download and Extract cab call failed. - -The following fields are available: - -- **CampaignID** ID of the update campaign being run. -- **ClientID** ID of the client receiving the update. -- **CoordinatorVersion** Coordinator version of Direct to Update. -- **CV** Correlation vector. -- **DownloadAndExtractCabFunction_failureReason** Reason why the update download and extract process failed. -- **hResult** HRESULT of the failure. - - -### Microsoft.Windows.DirectToUpdate.DTUHandlerDownloadAndExtractCabSuccess - -This event indicates that the Handler Download and Extract cab call succeeded. - -The following fields are available: - -- **CampaignID** ID of the update campaign being run. -- **ClientID** ID of the client receiving the update. -- **CoordinatorVersion** Coordinator version of Direct to Update. -- **CV** Correlation vector. - - -### Microsoft.Windows.DirectToUpdate.DTUHandlerDownloadGenericFailure - -This event indicates that we have received an unexpected error in the Direct to Update (DTU) Handler Download call. - -The following fields are available: - -- **CampaignID** ID of the update campaign being run. -- **ClientID** ID of the client receiving the update. -- **CoordinatorVersion** Coordinator version of Direct to Update. -- **CV** Correlation vector. -- **hResult** HRESULT of the failure. - - -### Microsoft.Windows.DirectToUpdate.DTUHandlerDownloadSuccess - -This event indicates that the Handler Download call succeeded. - -The following fields are available: - -- **CampaignID** ID of the update campaign being run. -- **ClientID** ID of the client receiving the update. -- **CoordinatorVersion** Coordinator version of Direct to Update. -- **CV** Correlation vector. - - -### Microsoft.Windows.DirectToUpdate.DTUHandlerInitializeGenericFailure - -This event indicates that we have received an unexpected error in the Direct to Update (DTU) Handler Initialize call. - -The following fields are available: - -- **CampaignID** ID of the update campaign being run. -- **ClientID** ID of the client receiving the update. -- **CoordinatorVersion** Coordinator version of Direct to Update. -- **CV** Correlation vector. -- **DownloadAndExtractCabFunction_hResult** HRESULT of the download and extract. -- **hResult** HRESULT of the failure. - - -### Microsoft.Windows.DirectToUpdate.DTUHandlerInitializeSuccess - -This event indicates that the Handler Initialize call succeeded. - -The following fields are available: - -- **CampaignID** ID of the update campaign being run. -- **ClientID** ID of the client receiving the update. -- **CoordinatorVersion** Coordinator version of Direct to Update. -- **CV** Correlation vector. -- **DownloadAndExtractCabFunction_hResult** HRESULT of the download and extraction. - - -### Microsoft.Windows.DirectToUpdate.DTUHandlerInstallGenericFailure - -This event indicates that we have received an unexpected error in the Direct to Update (DTU) Handler Install call. - -The following fields are available: - -- **CampaignID** ID of the update campaign being run. -- **ClientID** ID of the client receiving the update. -- **CoordinatorVersion** Coordinator version of Direct to Update. -- **CV** Correlation vector. -- **hResult** HRESULT of the failure. - - -### Microsoft.Windows.DirectToUpdate.DTUHandlerInstallSuccess - -This event indicates that the Coordinator Install call succeeded. - -The following fields are available: - -- **CampaignID** ID of the update campaign being run. -- **ClientID** ID of the client receiving the update. -- **CoordinatorVersion** Coordinator version of Direct to Update. -- **CV** Correlation vector. - - -### Microsoft.Windows.DirectToUpdate.DTUHandlerSetCommitReadySuccess - -This event indicates that the Handler SetCommitReady call succeeded. - -The following fields are available: - -- **CampaignID** ID of the campaign being run. -- **ClientID** ID of the client receiving the update. -- **CoordinatorVersion** Coordinator version of Direct to Update. -- **CV** Correlation vector. - - -### Microsoft.Windows.DirectToUpdate.DTUHandlerWaitForRebootUiGenericFailure - -This event indicates that we have received an unexpected error in the Direct to Update (DTU) Handler WaitForRebootUi call. - -The following fields are available: - -- **CampaignID** The ID of the campaigning being run. -- **ClientID** ID of the client receiving the update. -- **CoordinatorVersion** Coordinator version of Direct to Update. -- **CV** Correlation vector. -- **hResult** The HRESULT of the failure. - - -### Microsoft.Windows.DirectToUpdate.DTUHandlerWaitForRebootUiSuccess - -This event indicates that the Handler WaitForRebootUi call succeeded. - -The following fields are available: - -- **CampaignID** ID of the campaign being run. -- **ClientID** ID of the client receiving the update. -- **CoordinatorVersion** Coordinator version of Direct to Update. -- **CV** Correlation vector. - - -## DxgKernelTelemetry events - -### DxgKrnlTelemetry.GPUAdapterInventoryV2 - -This event sends basic GPU and display driver information to keep Windows and display drivers up-to-date. - -The following fields are available: - -- **AdapterTypeValue** The numeric value indicating the type of Graphics adapter. -- **aiSeqId** The event sequence ID. -- **bootId** The system boot ID. -- **BrightnessVersionViaDDI** The version of the Display Brightness Interface. -- **ComputePreemptionLevel** The maximum preemption level supported by GPU for compute payload. -- **DedicatedSystemMemoryB** The amount of system memory dedicated for GPU use (in bytes). -- **DedicatedVideoMemoryB** The amount of dedicated VRAM of the GPU (in bytes). -- **DisplayAdapterLuid** The display adapter LUID. -- **DriverDate** The date of the display driver. -- **DriverRank** The rank of the display driver. -- **DriverVersion** The display driver version. -- **DX10UMDFilePath** The file path to the location of the DirectX 10 Display User Mode Driver in the Driver Store. -- **DX11UMDFilePath** The file path to the location of the DirectX 11 Display User Mode Driver in the Driver Store. -- **DX12UMDFilePath** The file path to the location of the DirectX 12 Display User Mode Driver in the Driver Store. -- **DX9UMDFilePath** The file path to the location of the DirectX 9 Display User Mode Driver in the Driver Store. -- **GPUDeviceID** The GPU device ID. -- **GPUPreemptionLevel** The maximum preemption level supported by GPU for graphics payload. -- **GPURevisionID** The GPU revision ID. -- **GPUVendorID** The GPU vendor ID. -- **InterfaceId** The GPU interface ID. -- **IsDisplayDevice** Does the GPU have displaying capabilities? -- **IsHwSchSupported** Indicates whether the adapter supports hardware scheduling. -- **IsHybridDiscrete** Does the GPU have discrete GPU capabilities in a hybrid device? -- **IsHybridIntegrated** Does the GPU have integrated GPU capabilities in a hybrid device? -- **IsLDA** Is the GPU comprised of Linked Display Adapters? -- **IsMiracastSupported** Does the GPU support Miracast? -- **IsMismatchLDA** Is at least one device in the Linked Display Adapters chain from a different vendor? -- **IsMPOSupported** Does the GPU support Multi-Plane Overlays? -- **IsMsMiracastSupported** Are the GPU Miracast capabilities driven by a Microsoft solution? -- **IsPostAdapter** Is this GPU the POST GPU in the device? -- **IsRemovable** TRUE if the adapter supports being disabled or removed. -- **IsRenderDevice** Does the GPU have rendering capabilities? -- **IsSoftwareDevice** Is this a software implementation of the GPU? -- **KMDFilePath** The file path to the location of the Display Kernel Mode Driver in the Driver Store. -- **MeasureEnabled** Is the device listening to MICROSOFT_KEYWORD_MEASURES? -- **MsHybridDiscrete** Indicates whether the adapter is a discrete adapter in a hybrid configuration. -- **NumVidPnSources** The number of supported display output sources. -- **NumVidPnTargets** The number of supported display output targets. -- **SharedSystemMemoryB** The amount of system memory shared by GPU and CPU (in bytes). -- **SubSystemID** The subsystem ID. -- **SubVendorID** The GPU sub vendor ID. -- **TelemetryEnabled** Is the device listening to MICROSOFT_KEYWORD_TELEMETRY? -- **TelInvEvntTrigger** What triggered this event to be logged? Example: 0 (GPU enumeration) or 1 (DxgKrnlTelemetry provider toggling) -- **version** The event version. -- **WDDMVersion** The Windows Display Driver Model version. - - -## Failover Clustering events - -### Microsoft.Windows.Server.FailoverClusteringCritical.ClusterSummary2 - -This event returns information about how many resources and of what type are in the server cluster. This data is collected to keep Windows Server safe, secure, and up to date. The data includes information about whether hardware is configured correctly, if the software is patched correctly, and assists in preventing crashes by attributing issues (like fatal errors) to workloads and system configurations. - -The following fields are available: - -- **autoAssignSite** The cluster parameter: auto site. -- **autoBalancerLevel** The cluster parameter: auto balancer level. -- **autoBalancerMode** The cluster parameter: auto balancer mode. -- **blockCacheSize** The configured size of the block cache. -- **ClusterAdConfiguration** The ad configuration of the cluster. -- **clusterAdType** The cluster parameter: mgmt_point_type. -- **clusterDumpPolicy** The cluster configured dump policy. -- **clusterFunctionalLevel** The current cluster functional level. -- **clusterGuid** The unique identifier for the cluster. -- **clusterWitnessType** The witness type the cluster is configured for. -- **countNodesInSite** The number of nodes in the cluster. -- **crossSiteDelay** The cluster parameter: CrossSiteDelay. -- **crossSiteThreshold** The cluster parameter: CrossSiteThreshold. -- **crossSubnetDelay** The cluster parameter: CrossSubnetDelay. -- **crossSubnetThreshold** The cluster parameter: CrossSubnetThreshold. -- **csvCompatibleFilters** The cluster parameter: ClusterCsvCompatibleFilters. -- **csvIncompatibleFilters** The cluster parameter: ClusterCsvIncompatibleFilters. -- **csvResourceCount** The number of resources in the cluster. -- **currentNodeSite** The name configured for the current site for the cluster. -- **dasModeBusType** The direct storage bus type of the storage spaces. -- **downLevelNodeCount** The number of nodes in the cluster that are running down-level. -- **drainOnShutdown** Specifies whether a node should be drained when it is shut down. -- **dynamicQuorumEnabled** Specifies whether dynamic Quorum has been enabled. -- **enforcedAntiAffinity** The cluster parameter: enforced anti affinity. -- **genAppNames** The win32 service name of a clustered service. -- **genSvcNames** The command line of a clustered genapp. -- **hangRecoveryAction** The cluster parameter: hang recovery action. -- **hangTimeOut** Specifies the “hang time out” parameter for the cluster. -- **isCalabria** Specifies whether storage spaces direct is enabled. -- **isMixedMode** Identifies if the cluster is running with different version of OS for nodes. -- **isRunningDownLevel** Identifies if the current node is running down-level. -- **logLevel** Specifies the granularity that is logged in the cluster log. -- **logSize** Specifies the size of the cluster log. -- **lowerQuorumPriorityNodeId** The cluster parameter: lower quorum priority node ID. -- **minNeverPreempt** The cluster parameter: minimum never preempt. -- **minPreemptor** The cluster parameter: minimum preemptor priority. -- **netftIpsecEnabled** The parameter: netftIpsecEnabled. -- **NodeCount** The number of nodes in the cluster. -- **nodeId** The current node number in the cluster. -- **nodeResourceCounts** Specifies the number of node resources. -- **nodeResourceOnlineCounts** Specifies the number of node resources that are online. -- **numberOfSites** The number of different sites. -- **numNodesInNoSite** The number of nodes not belonging to a site. -- **plumbAllCrossSubnetRoutes** The cluster parameter: plumb all cross subnet routes. -- **preferredSite** The preferred site location. -- **privateCloudWitness** Specifies whether a private cloud witness exists for this cluster. -- **quarantineDuration** The quarantine duration. -- **quarantineThreshold** The quarantine threshold. -- **quorumArbitrationTimeout** In the event of an arbitration event, this specifies the quorum timeout period. -- **resiliencyLevel** Specifies the level of resiliency. -- **resourceCounts** Specifies the number of resources. -- **resourceTypeCounts** Specifies the number of resource types in the cluster. -- **resourceTypes** Data representative of each resource type. -- **resourceTypesPath** Data representative of the DLL path for each resource type. -- **sameSubnetDelay** The cluster parameter: same subnet delay. -- **sameSubnetThreshold** The cluster parameter: same subnet threshold. -- **secondsInMixedMode** The amount of time (in seconds) that the cluster has been in mixed mode (nodes with different operating system versions in the same cluster). -- **securityLevel** The cluster parameter: security level. -- **securityLevelForStorage** The cluster parameter: security level for storage. -- **sharedVolumeBlockCacheSize** Specifies the block cache size for shared for shared volumes. -- **shutdownTimeoutMinutes** Specifies the amount of time it takes to time out when shutting down. -- **upNodeCount** Specifies the number of nodes that are up (online). -- **useClientAccessNetworksForCsv** The cluster parameter: use client access networks for CSV. -- **vmIsolationTime** The cluster parameter: VM isolation time. -- **witnessDatabaseWriteTimeout** Specifies the timeout period for writing to the quorum witness database. - - -## Fault Reporting events - -### Microsoft.Windows.FaultReporting.AppCrashEvent - -This event sends data about crashes for both native and managed applications, to help keep Windows up to date. The data includes information about the crashing process and a summary of its exception record. It does not contain any Watson bucketing information. The bucketing information is recorded in a Windows Error Reporting (WER) event that is generated when the WER client reports the crash to the Watson service, and the WER event will contain the same ReportID (see field 14 of crash event, field 19 of WER event) as the crash event for the crash being reported. AppCrash is emitted once for each crash handled by WER (e.g. from an unhandled exception or FailFast or ReportException). Note that Generic Watson event types (e.g. from PLM) that may be considered crashes\" by a user DO NOT emit this event. - -The following fields are available: - -- **AppName** The name of the app that has crashed. -- **AppSessionGuid** GUID made up of process ID and is used as a correlation vector for process instances in the telemetry backend. -- **AppTimeStamp** The date/time stamp of the app. -- **AppVersion** The version of the app that has crashed. -- **ExceptionCode** The exception code returned by the process that has crashed. -- **ExceptionOffset** The address where the exception had occurred. -- **Flags** Flags indicating how reporting is done. For example, queue the report, do not offer JIT debugging, or do not terminate the process after reporting. -- **FriendlyAppName** The description of the app that has crashed, if different from the AppName. Otherwise, the process name. -- **IsFatal** True/False to indicate whether the crash resulted in process termination. -- **ModName** Exception module name (e.g. bar.dll). -- **ModTimeStamp** The date/time stamp of the module. -- **ModVersion** The version of the module that has crashed. -- **PackageFullName** Store application identity. -- **PackageRelativeAppId** Store application identity. -- **ProcessArchitecture** Architecture of the crashing process, as one of the PROCESSOR_ARCHITECTURE_* constants: 0: PROCESSOR_ARCHITECTURE_INTEL. 5: PROCESSOR_ARCHITECTURE_ARM. 9: PROCESSOR_ARCHITECTURE_AMD64. 12: PROCESSOR_ARCHITECTURE_ARM64. -- **ProcessCreateTime** The time of creation of the process that has crashed. -- **ProcessId** The ID of the process that has crashed. -- **ReportId** A GUID used to identify the report. This can used to track the report across Watson. -- **TargetAppId** The kernel reported AppId of the application being reported. -- **TargetAppVer** The specific version of the application being reported -- **TargetAsId** The sequence number for the hanging process. - - -## Feature update events - -### Microsoft.Windows.Upgrade.Uninstall.UninstallFinalizedAndRebootTriggered - -This event indicates that the uninstall was properly configured and that a system reboot was initiated. - - - -### Microsoft.Windows.Upgrade.Uninstall.UninstallGoBackButtonClicked - -This event sends basic metadata about the starting point of uninstalling a feature update, which helps ensure customers can safely revert to a well-known state if the update caused any problems. - - - -## Hang Reporting events - -### Microsoft.Windows.HangReporting.AppHangEvent - -This event sends data about hangs for both native and managed applications, to help keep Windows up to date. It does not contain any Watson bucketing information. The bucketing information is recorded in a Windows Error Reporting (WER) event that is generated when the WER client reports the hang to the Watson service, and the WER event will contain the same ReportID (see field 13 of hang event, field 19 of WER event) as the hang event for the hang being reported. AppHang is reported only on PC devices. It handles classic Win32 hangs and is emitted only once per report. Some behaviors that may be perceived by a user as a hang are reported by app managers (e.g. PLM/RM/EM) as Watson Generics and will not produce AppHang events. - -The following fields are available: - -- **AppName** The name of the app that has hung. -- **AppSessionGuid** GUID made up of process id used as a correlation vector for process instances in the telemetry backend. -- **AppVersion** The version of the app that has hung. -- **IsFatal** True/False based on whether the hung application caused the creation of a Fatal Hang Report. -- **PackageFullName** Store application identity. -- **PackageRelativeAppId** Store application identity. -- **ProcessArchitecture** Architecture of the hung process, as one of the PROCESSOR_ARCHITECTURE_* constants: 0: PROCESSOR_ARCHITECTURE_INTEL. 5: PROCESSOR_ARCHITECTURE_ARM. 9: PROCESSOR_ARCHITECTURE_AMD64. 12: PROCESSOR_ARCHITECTURE_ARM64. -- **ProcessCreateTime** The time of creation of the process that has hung. -- **ProcessId** The ID of the process that has hung. -- **ReportId** A GUID used to identify the report. This can used to track the report across Watson. -- **TargetAppId** The kernel reported AppId of the application being reported. -- **TargetAppVer** The specific version of the application being reported. -- **TargetAsId** The sequence number for the hanging process. -- **TypeCode** Bitmap describing the hang type. -- **WaitingOnAppName** If this is a cross process hang waiting for an application, this has the name of the application. -- **WaitingOnAppVersion** If this is a cross process hang, this has the version of the application for which it is waiting. -- **WaitingOnPackageFullName** If this is a cross process hang waiting for a package, this has the full name of the package for which it is waiting. -- **WaitingOnPackageRelativeAppId** If this is a cross process hang waiting for a package, this has the relative application id of the package. - - -## Inventory events - -### Microsoft.Windows.Inventory.Core.AmiTelCacheChecksum - -This event captures basic checksum data about the device inventory items stored in the cache for use in validating data completeness for Microsoft.Windows.Inventory.Core events. The fields in this event may change over time, but they will always represent a count of a given object. - -The following fields are available: - -- **Device** A count of device objects in cache. -- **DeviceCensus** A count of device census objects in cache. -- **DriverPackageExtended** A count of driverpackageextended objects in cache. -- **File** A count of file objects in cache. -- **FileSigningInfo** A count of file signing objects in cache. -- **Generic** A count of generic objects in cache. -- **HwItem** A count of hwitem objects in cache. -- **InventoryApplication** A count of application objects in cache. -- **InventoryApplicationAppV** A count of application AppV objects in cache. -- **InventoryApplicationDriver** A count of application driver objects in cache -- **InventoryApplicationFile** A count of application file objects in cache. -- **InventoryApplicationFramework** A count of application framework objects in cache -- **InventoryApplicationShortcut** A count of application shortcut objects in cache -- **InventoryDeviceContainer** A count of device container objects in cache. -- **InventoryDeviceInterface** A count of Plug and Play device interface objects in cache. -- **InventoryDeviceMediaClass** A count of device media objects in cache. -- **InventoryDevicePnp** A count of device Plug and Play objects in cache. -- **InventoryDeviceUsbHubClass** A count of device usb objects in cache -- **InventoryDriverBinary** A count of driver binary objects in cache. -- **InventoryDriverPackage** A count of device objects in cache. -- **InventoryMiscellaneousOfficeAddIn** A count of office add-in objects in cache -- **InventoryMiscellaneousOfficeAddInUsage** A count of office add-in usage objects in cache. -- **InventoryMiscellaneousOfficeIdentifiers** A count of office identifier objects in cache -- **InventoryMiscellaneousOfficeIESettings** A count of office ie settings objects in cache -- **InventoryMiscellaneousOfficeInsights** A count of office insights objects in cache -- **InventoryMiscellaneousOfficeProducts** A count of office products objects in cache -- **InventoryMiscellaneousOfficeSettings** A count of office settings objects in cache -- **InventoryMiscellaneousOfficeVBA** A count of office vba objects in cache -- **InventoryMiscellaneousOfficeVBARuleViolations** A count of office vba rule violations objects in cache -- **InventoryMiscellaneousUUPInfo** A count of uup info objects in cache -- **Metadata** A count of metadata objects in cache. -- **Orphan** A count of orphan file objects in cache. -- **Programs** A count of program objects in cache. - - -### Microsoft.Windows.Inventory.Core.AmiTelCacheFileInfo - -Diagnostic data about the inventory cache. - -The following fields are available: - -- **CacheFileSize** Size of the cache. -- **InventoryVersion** Inventory version of the cache. -- **TempCacheCount** Number of temp caches created. -- **TempCacheDeletedCount** Number of temp caches deleted. - - -### Microsoft.Windows.Inventory.Core.AmiTelCacheVersions - -This event sends inventory component versions for the Device Inventory data. - -The following fields are available: - -- **aeinv** The version of the App inventory component. -- **devinv** The file version of the Device inventory component. - - -### Microsoft.Windows.Inventory.Core.InventoryApplicationAdd - -This event sends basic metadata about an application on the system to help keep Windows up to date. - -This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedeviceinventorychange). - -The following fields are available: - -- **HiddenArp** Indicates whether a program hides itself from showing up in ARP. -- **InstallDate** The date the application was installed (a best guess based on folder creation date heuristics). -- **InstallDateArpLastModified** The date of the registry ARP key for a given application. Hints at install date but not always accurate. Passed as an array. Example: 4/11/2015 00:00:00 -- **InstallDateFromLinkFile** The estimated date of install based on the links to the files. Passed as an array. -- **InstallDateMsi** The install date if the application was installed via Microsoft Installer (MSI). Passed as an array. -- **InventoryVersion** The version of the inventory file generating the events. -- **Language** The language code of the program. -- **MsiPackageCode** A GUID that describes the MSI Package. Multiple 'Products' (apps) can make up an MsiPackage. -- **MsiProductCode** A GUID that describe the MSI Product. -- **Name** The name of the application. -- **OSVersionAtInstallTime** The four octets from the OS version at the time of the application's install. -- **PackageFullName** The package full name for a Store application. -- **ProgramInstanceId** A hash of the file IDs in an app. -- **Publisher** The Publisher of the application. Location pulled from depends on the 'Source' field. -- **RootDirPath** The path to the root directory where the program was installed. -- **Source** How the program was installed (for example, ARP, MSI, Appx). -- **StoreAppType** A sub-classification for the type of Microsoft Store app, such as UWP or Win8StoreApp. -- **Type** One of ("Application", "Hotfix", "BOE", "Service", "Unknown"). Application indicates Win32 or Appx app, Hotfix indicates app updates (KBs), BOE indicates it's an app with no ARP or MSI entry, Service indicates that it is a service. Application and BOE are the ones most likely seen. -- **Version** The version number of the program. - - -### Microsoft.Windows.Inventory.Core.InventoryApplicationDriverAdd - -This event represents what drivers an application installs. - -This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedeviceinventorychange). - -The following fields are available: - -- **InventoryVersion** The version of the inventory component. -- **ProgramIds** The unique program identifier the driver is associated with. - - -### Microsoft.Windows.Inventory.Core.InventoryApplicationDriverStartSync - -The InventoryApplicationDriverStartSync event indicates that a new set of InventoryApplicationDriverStartAdd events will be sent. - -This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedeviceinventorychange). - -The following fields are available: - -- **InventoryVersion** The version of the inventory component. - - -### Microsoft.Windows.Inventory.Core.InventoryApplicationFrameworkAdd - -This event provides the basic metadata about the frameworks an application may depend on. - -This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedeviceinventorychange). - -The following fields are available: - -- **FileId** A hash that uniquely identifies a file. -- **Frameworks** The list of frameworks this file depends on. -- **InventoryVersion** The version of the inventory file generating the events. - - -### Microsoft.Windows.Inventory.Core.InventoryApplicationFrameworkStartSync - -This event indicates that a new set of InventoryApplicationFrameworkAdd events will be sent. - -This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedeviceinventorychange). - -The following fields are available: - -- **InventoryVersion** The version of the inventory file generating the events. - - -### Microsoft.Windows.Inventory.Core.InventoryApplicationRemove - -This event indicates that a new set of InventoryDevicePnpAdd events will be sent. - -This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedeviceinventorychange). - -The following fields are available: - -- **InventoryVersion** The version of the inventory file generating the events. - - -### Microsoft.Windows.Inventory.Core.InventoryApplicationStartSync - -This event indicates that a new set of InventoryApplicationAdd events will be sent. - -This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedeviceinventorychange). - -The following fields are available: - -- **InventoryVersion** The version of the inventory file generating the events. - - -### Microsoft.Windows.Inventory.Core.InventoryDeviceContainerAdd - -This event sends basic metadata about a device container (such as a monitor or printer as opposed to a Plug and Play device) to help keep Windows up to date. - -This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedeviceinventorychange). - -The following fields are available: - -- **Categories** A comma separated list of functional categories in which the container belongs. -- **DiscoveryMethod** The discovery method for the device container. -- **FriendlyName** The name of the device container. -- **InventoryVersion** The version of the inventory file generating the events. -- **IsActive** Is the device connected, or has it been seen in the last 14 days? -- **IsConnected** For a physically attached device, this value is the same as IsPresent. For wireless a device, this value represents a communication link. -- **IsMachineContainer** Is the container the root device itself? -- **IsNetworked** Is this a networked device? -- **IsPaired** Does the device container require pairing? -- **Manufacturer** The manufacturer name for the device container. -- **ModelId** A unique model ID. -- **ModelName** The model name. -- **ModelNumber** The model number for the device container. -- **PrimaryCategory** The primary category for the device container. - - -### Microsoft.Windows.Inventory.Core.InventoryDeviceContainerRemove - -This event indicates that the InventoryDeviceContainer object is no longer present. - -This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedeviceinventorychange). - -The following fields are available: - -- **InventoryVersion** The version of the inventory file generating the events. - - -### Microsoft.Windows.Inventory.Core.InventoryDeviceContainerStartSync - -This event indicates that a new set of InventoryDeviceContainerAdd events will be sent. - -This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedeviceinventorychange). - -The following fields are available: - -- **InventoryVersion** The version of the inventory file generating the events. - - -### Microsoft.Windows.Inventory.Core.InventoryDeviceInterfaceAdd - -This event retrieves information about what sensor interfaces are available on the device. - -This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedeviceinventorychange). - -The following fields are available: - -- **Accelerometer3D** Indicates if an Accelerator3D sensor is found. -- **ActivityDetection** Indicates if an Activity Detection sensor is found. -- **AmbientLight** Indicates if an Ambient Light sensor is found. -- **Barometer** Indicates if a Barometer sensor is found. -- **Custom** Indicates if a Custom sensor is found. -- **EnergyMeter** Indicates if an Energy sensor is found. -- **FloorElevation** Indicates if a Floor Elevation sensor is found. -- **GeomagneticOrientation** Indicates if a Geo Magnetic Orientation sensor is found. -- **GravityVector** Indicates if a Gravity Detector sensor is found. -- **Gyrometer3D** Indicates if a Gyrometer3D sensor is found. -- **Humidity** Indicates if a Humidity sensor is found. -- **InventoryVersion** The version of the inventory file generating the events. -- **LinearAccelerometer** Indicates if a Linear Accelerometer sensor is found. -- **Magnetometer3D** Indicates if a Magnetometer3D sensor is found. -- **Orientation** Indicates if an Orientation sensor is found. -- **Pedometer** Indicates if a Pedometer sensor is found. -- **Proximity** Indicates if a Proximity sensor is found. -- **RelativeOrientation** Indicates if a Relative Orientation sensor is found. -- **SimpleDeviceOrientation** Indicates if a Simple Device Orientation sensor is found. -- **Temperature** Indicates if a Temperature sensor is found. - - -### Microsoft.Windows.Inventory.Core.InventoryDeviceInterfaceStartSync - -This event indicates that a new set of InventoryDeviceInterfaceAdd events will be sent. - -This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedeviceinventorychange). - -The following fields are available: - -- **InventoryVersion** The version of the inventory file generating the events. - - -### Microsoft.Windows.Inventory.Core.InventoryDeviceMediaClassAdd - -This event sends additional metadata about a Plug and Play device that is specific to a particular class of devices to help keep Windows up to date while reducing overall size of data payload. - -This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedeviceinventorychange). - -The following fields are available: - -- **audio.captureDriver** Audio device capture driver. Example: hdaudio.inf:db04a16ce4e8d6ee:HdAudModel:10.0.14887.1000:hdaudio\func_01 -- **audio.renderDriver** Audio device render driver. Example: hdaudio.inf:db04a16ce4e8d6ee:HdAudModel:10.0.14889.1001:hdaudio\func_01 -- **Audio_CaptureDriver** The Audio device capture driver endpoint. -- **Audio_RenderDriver** The Audio device render driver endpoint. -- **InventoryVersion** The version of the inventory file generating the events. - - -### Microsoft.Windows.Inventory.Core.InventoryDeviceMediaClassRemove - -This event indicates that the InventoryDeviceMediaClassRemove object is no longer present. - -This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedeviceinventorychange). - -The following fields are available: - -- **InventoryVersion** The version of the inventory file generating the events. - - -### Microsoft.Windows.Inventory.Core.InventoryDeviceMediaClassStartSync - -This event indicates that a new set of InventoryDeviceMediaClassSAdd events will be sent. - -This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedeviceinventorychange). - -The following fields are available: - -- **InventoryVersion** The version of the inventory file generating the events. - - -### Microsoft.Windows.Inventory.Core.InventoryDevicePnpAdd - -This event represents the basic metadata about a plug and play (PNP) device and its associated driver. - -This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedeviceinventorychange). - -The following fields are available: - -- **BusReportedDescription** The description of the device reported by the bux. -- **Class** The device setup class of the driver loaded for the device. -- **ClassGuid** The device class unique identifier of the driver package loaded on the device. -- **COMPID** The list of “Compatible IDs” for this device. -- **ContainerId** The system-supplied unique identifier that specifies which group(s) the device(s) installed on the parent (main) device belong to. -- **Description** The description of the device. -- **DeviceInterfaceClasses** The device interfaces that this device implements. -- **DeviceState** Identifies the current state of the parent (main) device. -- **DriverId** The unique identifier for the installed driver. -- **DriverName** The name of the driver image file. -- **DriverPackageStrongName** The immediate parent directory name in the Directory field of InventoryDriverPackage. -- **DriverVerDate** The date associated with the driver installed on the device. -- **DriverVerVersion** The version number of the driver installed on the device. -- **Enumerator** Identifies the bus that enumerated the device. -- **ExtendedInfs** The extended INF file names. -- **HWID** A list of hardware IDs for the device. -- **Inf** The name of the INF file (possibly renamed by the OS, such as oemXX.inf). -- **InstallState** The device installation state. For a list of values, see: https://msdn.microsoft.com/en-us/library/windows/hardware/ff543130.aspx -- **InventoryVersion** The version number of the inventory process generating the events. -- **LowerClassFilters** The identifiers of the Lower Class filters installed for the device. -- **LowerFilters** The identifiers of the Lower filters installed for the device. -- **Manufacturer** The manufacturer of the device. -- **MatchingID** The Hardware ID or Compatible ID that Windows uses to install a device instance. -- **Model** Identifies the model of the device. -- **ParentId** The Device Instance ID of the parent of the device. -- **ProblemCode** The error code currently returned by the device, if applicable. -- **Provider** Identifies the device provider. -- **Service** The name of the device service. -- **STACKID** The list of hardware IDs for the stack. -- **UpperClassFilters** The identifiers of the Upper Class filters installed for the device. -- **UpperFilters** The identifiers of the Upper filters installed for the device. - - -### Microsoft.Windows.Inventory.Core.InventoryDevicePnpRemove - -This event indicates that the InventoryDevicePnpRemove object is no longer present. - -This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedeviceinventorychange). - -The following fields are available: - -- **InventoryVersion** The version of the inventory file generating the events. - - -### Microsoft.Windows.Inventory.Core.InventoryDevicePnpStartSync - -This event indicates that a new set of InventoryDevicePnpAdd events will be sent. - -This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedeviceinventorychange). - -The following fields are available: - -- **InventoryVersion** The version of the inventory file generating the events. - - -### Microsoft.Windows.Inventory.Core.InventoryDeviceUsbHubClassAdd - -This event sends basic metadata about the USB hubs on the device. - -This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedeviceinventorychange). - -The following fields are available: - -- **InventoryVersion** The version of the inventory file generating the events. -- **TotalUserConnectablePorts** Total number of connectable USB ports. -- **TotalUserConnectableTypeCPorts** Total number of connectable USB Type C ports. - - -### Microsoft.Windows.Inventory.Core.InventoryDeviceUsbHubClassStartSync - -This event indicates that a new set of InventoryDeviceUsbHubClassAdd events will be sent. - - -The following fields are available: - -- **InventoryVersion** The version of the inventory file generating the events. - - -### Microsoft.Windows.Inventory.Core.InventoryDriverBinaryAdd - -This event provides the basic metadata about driver binaries running on the system. - -This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedeviceinventorychange). - -The following fields are available: - -- **DriverCheckSum** The checksum of the driver file. -- **DriverCompany** The company name that developed the driver. -- **DriverInBox** Is the driver included with the operating system? -- **DriverIsKernelMode** Is it a kernel mode driver? -- **DriverName** The file name of the driver. -- **DriverPackageStrongName** The strong name of the driver package -- **DriverSigned** The strong name of the driver package -- **DriverTimeStamp** The low 32 bits of the time stamp of the driver file. -- **DriverType** A bitfield of driver attributes: 1. define DRIVER_MAP_DRIVER_TYPE_PRINTER 0x0001. 2. define DRIVER_MAP_DRIVER_TYPE_KERNEL 0x0002. 3. define DRIVER_MAP_DRIVER_TYPE_USER 0x0004. 4. define DRIVER_MAP_DRIVER_IS_SIGNED 0x0008. 5. define DRIVER_MAP_DRIVER_IS_INBOX 0x0010. 6. define DRIVER_MAP_DRIVER_IS_WINQUAL 0x0040. 7. define DRIVER_MAP_DRIVER_IS_SELF_SIGNED 0x0020. 8. define DRIVER_MAP_DRIVER_IS_CI_SIGNED 0x0080. 9. define DRIVER_MAP_DRIVER_HAS_BOOT_SERVICE 0x0100. 10. define DRIVER_MAP_DRIVER_TYPE_I386 0x10000. 11. define DRIVER_MAP_DRIVER_TYPE_IA64 0x20000. 12. define DRIVER_MAP_DRIVER_TYPE_AMD64 0x40000. 13. define DRIVER_MAP_DRIVER_TYPE_ARM 0x100000. 14. define DRIVER_MAP_DRIVER_TYPE_THUMB 0x200000. 15. define DRIVER_MAP_DRIVER_TYPE_ARMNT 0x400000. 16. define DRIVER_MAP_DRIVER_IS_TIME_STAMPED 0x800000. -- **DriverVersion** The version of the driver file. -- **ImageSize** The size of the driver file. -- **Inf** The name of the INF file. -- **InventoryVersion** The version of the inventory file generating the events. -- **Product** The product name that is included in the driver file. -- **ProductVersion** The product version that is included in the driver file. -- **Service** The name of the service that is installed for the device. -- **WdfVersion** The Windows Driver Framework version. - - -### Microsoft.Windows.Inventory.Core.InventoryDriverBinaryRemove - -This event indicates that the InventoryDriverBinary object is no longer present. - -This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedeviceinventorychange). - -The following fields are available: - -- **InventoryVersion** The version of the inventory file generating the events. - - -### Microsoft.Windows.Inventory.Core.InventoryDriverBinaryStartSync - -This event indicates that a new set of InventoryDriverBinaryAdd events will be sent. - -This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedeviceinventorychange). - -The following fields are available: - -- **InventoryVersion** The version of the inventory file generating the events. - - -### Microsoft.Windows.Inventory.Core.InventoryDriverPackageAdd - -This event sends basic metadata about drive packages installed on the system to help keep Windows up to date. - -This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedeviceinventorychange). - -The following fields are available: - -- **Class** The class name for the device driver. -- **ClassGuid** The class GUID for the device driver. -- **Date** The driver package date. -- **Directory** The path to the driver package. -- **DriverInBox** Is the driver included with the operating system? -- **Inf** The INF name of the driver package. -- **InventoryVersion** The version of the inventory file generating the events. -- **Provider** The provider for the driver package. -- **SubmissionId** The HLK submission ID for the driver package. -- **Version** The version of the driver package. - - -### Microsoft.Windows.Inventory.Core.InventoryDriverPackageRemove - -This event indicates that the InventoryDriverPackageRemove object is no longer present. - -This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedeviceinventorychange). - -The following fields are available: - -- **InventoryVersion** The version of the inventory file generating the events. - - -### Microsoft.Windows.Inventory.Core.InventoryDriverPackageStartSync - -This event indicates that a new set of InventoryDriverPackageAdd events will be sent. - -This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedeviceinventorychange). - -The following fields are available: - -- **InventoryVersion** The version of the inventory file generating the events. - - -### Microsoft.Windows.Inventory.Core.StartUtcJsonTrace - -This event collects traces of all other Core events, not used in typical customer scenarios. This event signals the beginning of the event download, and that tracing should begin. - - - -### Microsoft.Windows.Inventory.Core.StopUtcJsonTrace - -This event collects traces of all other Core events, not used in typical customer scenarios. This event signals the end of the event download, and that tracing should end. - - - -### Microsoft.Windows.Inventory.General.AppHealthStaticAdd - -This event sends details collected for a specific application on the source device. - -The following fields are available: - -- **AhaVersion** The binary version of the App Health Analyzer tool. -- **ApplicationErrors** The count of application errors from the event log. -- **Bitness** The architecture type of the application (16 Bit or 32 bit or 64 bit). -- **device_level** Various JRE/JAVA versions installed on a particular device. -- **ExtendedProperties** Attribute used for aggregating all other attributes under this event type. -- **Jar** Flag to determine if an app has a Java JAR file dependency. -- **Jre** Flag to determine if an app has JRE framework dependency. -- **Jre_version** JRE versions an app has declared framework dependency for. -- **Name** Name of the application. -- **NonDPIAware** Flag to determine if an app is non-DPI aware. -- **NumBinaries** Count of all binaries (.sys,.dll,.ini) from application install location. -- **RequiresAdmin** Flag to determine if an app requests admin privileges for execution. -- **RequiresAdminv2** Additional flag to determine if an app requests admin privileges for execution. -- **RequiresUIAccess** Flag to determine if an app is based on UI features for accessibility. -- **VB6** Flag to determine if an app is based on VB6 framework. -- **VB6v2** Additional flag to determine if an app is based on VB6 framework. -- **Version** Version of the application. -- **VersionCheck** Flag to determine if an app has a static dependency on OS version. -- **VersionCheckv2** Additional flag to determine if an app has a static dependency on OS version. - - -### Microsoft.Windows.Inventory.General.AppHealthStaticStartSync - -This event indicates the beginning of a series of AppHealthStaticAdd events. - -The following fields are available: - -- **AllowTelemetry** Indicates the presence of the 'allowtelemetry' command line argument. -- **CommandLineArgs** Command line arguments passed when launching the App Health Analyzer executable. -- **Enhanced** Indicates the presence of the 'enhanced' command line argument. -- **StartTime** UTC date and time at which this event was sent. - - -### Microsoft.Windows.Inventory.General.InventoryMiscellaneousOfficeAddInAdd - -Provides data on the installed Office Add-ins. - -This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedeviceinventorychange). - -The following fields are available: - -- **AddinCLSID** The class identifier key for the Microsoft Office add-in. -- **AddInCLSID** The class identifier key for the Microsoft Office add-in. -- **AddInId** The identifier for the Microsoft Office add-in. -- **AddinType** The type of the Microsoft Office add-in. -- **BinFileTimestamp** The timestamp of the Office add-in. -- **BinFileVersion** The version of the Microsoft Office add-in. -- **Description** Description of the Microsoft Office add-in. -- **FileId** The file identifier of the Microsoft Office add-in. -- **FileSize** The file size of the Microsoft Office add-in. -- **FriendlyName** The friendly name for the Microsoft Office add-in. -- **FullPath** The full path to the Microsoft Office add-in. -- **InventoryVersion** The version of the inventory binary generating the events. -- **LoadBehavior** Integer that describes the load behavior. -- **LoadTime** Load time for the Office add-in. -- **OfficeApplication** The Microsoft Office application associated with the add-in. -- **OfficeArchitecture** The architecture of the add-in. -- **OfficeVersion** The Microsoft Office version for this add-in. -- **OutlookCrashingAddin** Indicates whether crashes have been found for this add-in. -- **ProductCompany** The name of the company associated with the Office add-in. -- **ProductName** The product name associated with the Microsoft Office add-in. -- **ProductVersion** The version associated with the Office add-in. -- **ProgramId** The unique program identifier of the Microsoft Office add-in. -- **Provider** Name of the provider for this add-in. -- **Usage** Data about usage for the add-in. - - -### Microsoft.Windows.Inventory.General.InventoryMiscellaneousOfficeAddInRemove - -Indicates that this particular data object represented by the objectInstanceId is no longer present. - -This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedeviceinventorychange). - -The following fields are available: - -- **InventoryVersion** The version of the inventory binary generating the events. - - -### Microsoft.Windows.Inventory.General.InventoryMiscellaneousOfficeAddInStartSync - -This event indicates that a new sync is being generated for this object type. - -This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedeviceinventorychange). - -The following fields are available: - -- **InventoryVersion** The version of the inventory binary generating the events. - - -### Microsoft.Windows.Inventory.General.InventoryMiscellaneousOfficeIdentifiersAdd - -Provides data on the Office identifiers. - -This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedeviceinventorychange). - -The following fields are available: - -- **InventoryVersion** The version of the inventory binary generating the events. -- **OAudienceData** Sub-identifier for Microsoft Office release management, identifying the pilot group for a device -- **OAudienceId** Microsoft Office identifier for Microsoft Office release management, identifying the pilot group for a device -- **OMID** Identifier for the Office SQM Machine -- **OPlatform** Whether the installed Microsoft Office product is 32-bit or 64-bit -- **OTenantId** Unique GUID representing the Microsoft O365 Tenant -- **OVersion** Installed version of Microsoft Office. For example, 16.0.8602.1000 -- **OWowMID** Legacy Microsoft Office telemetry identifier (SQM Machine ID) for WoW systems (32-bit Microsoft Office on 64-bit Windows) - - -### Microsoft.Windows.Inventory.General.InventoryMiscellaneousOfficeIdentifiersStartSync - -Diagnostic event to indicate a new sync is being generated for this object type. - -This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedeviceinventorychange). - -The following fields are available: - -- **InventoryVersion** The version of the inventory binary generating the events. - - -### Microsoft.Windows.Inventory.General.InventoryMiscellaneousOfficeIESettingsAdd - -Provides data on Office-related Internet Explorer features. - -This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedeviceinventorychange). - -The following fields are available: - -- **InventoryVersion** The version of the inventory binary generating the events. -- **OIeFeatureAddon** Flag indicating which Microsoft Office products have this setting enabled. The FEATURE_ADDON_MANAGEMENT feature lets applications hosting the WebBrowser Control to respect add-on management selections made using the Add-on Manager feature of Internet Explorer. Add-ons disabled by the user or by administrative group policy will also be disabled in applications that enable this feature. -- **OIeMachineLockdown** Flag indicating which Microsoft Office products have this setting enabled. When the FEATURE_LOCALMACHINE_LOCKDOWN feature is enabled, Internet Explorer applies security restrictions on content loaded from the user's local machine, which helps prevent malicious behavior involving local files. -- **OIeMimeHandling** Flag indicating which Microsoft Office products have this setting enabled. When the FEATURE_MIME_HANDLING feature control is enabled, Internet Explorer handles MIME types more securely. Only applies to Windows Internet Explorer 6 for Windows XP Service Pack 2 (SP2) -- **OIeMimeSniffing** Flag indicating which Microsoft Office products have this setting enabled. Determines a file's type by examining its bit signature. Windows Internet Explorer uses this information to determine how to render the file. The FEATURE_MIME_SNIFFING feature, when enabled, allows to be set differently for each security zone by using the URLACTION_FEATURE_MIME_SNIFFING URL action flag -- **OIeNoAxInstall** Flag indicating which Microsoft Office products have this setting enabled. When a webpage attempts to load or install an ActiveX control that isn't already installed, the FEATURE_RESTRICT_ACTIVEXINSTALL feature blocks the request. When a webpage tries to load or install an ActiveX control that isn't already installed, the FEATURE_RESTRICT_ACTIVEXINSTALL feature blocks the request -- **OIeNoDownload** Flag indicating which Microsoft Office products have this setting enabled. The FEATURE_RESTRICT_FILEDOWNLOAD feature blocks file download requests that navigate to a resource, that display a file download dialog box, or that are not initiated explicitly by a user action (for example, a mouse click or key press). Only applies to Windows Internet Explorer 6 for Windows XP Service Pack 2 (SP2) -- **OIeObjectCaching** Flag indicating which Microsoft Office products have this setting enabled. When enabled, the FEATURE_OBJECT_CACHING feature prevents webpages from accessing or instantiating ActiveX controls cached from different domains or security contexts -- **OIePasswordDisable** Flag indicating which Microsoft Office products have this setting enabled. After Windows Internet Explorer 6 for Windows XP Service Pack 2 (SP2), Internet Explorer no longer allows usernames and passwords to be specified in URLs that use the HTTP or HTTPS protocols. URLs using other protocols, such as FTP, still allow usernames and passwords -- **OIeSafeBind** Flag indicating which Microsoft Office products have this setting enabled. The FEATURE_SAFE_BINDTOOBJECT feature performs additional safety checks when calling MonikerBindToObject to create and initialize Microsoft ActiveX controls. Specifically, prevent the control from being created if COMPAT_EVIL_DONT_LOAD is in the registry for the control -- **OIeSecurityBand** Flag indicating which Microsoft Office products have this setting enabled. The FEATURE_SECURITYBAND feature controls the display of the Internet Explorer Information bar. When enabled, the Information bar appears when file download or code installation is restricted -- **OIeUncSaveCheck** Flag indicating which Microsoft Office products have this setting enabled. The FEATURE_UNC_SAVEDFILECHECK feature enables the Mark of the Web (MOTW) for local files loaded from network locations that have been shared by using the Universal Naming Convention (UNC) -- **OIeValidateUrl** Flag indicating which Microsoft Office products have this setting enabled. When enabled, the FEATURE_VALIDATE_NAVIGATE_URL feature control prevents Windows Internet Explorer from navigating to a badly formed URL -- **OIeWebOcPopup** Flag indicating which Microsoft Office products have this setting enabled. The FEATURE_WEBOC_POPUPMANAGEMENT feature allows applications hosting the WebBrowser Control to receive the default Internet Explorer pop-up window management behavior -- **OIeWinRestrict** Flag indicating which Microsoft Office products have this setting enabled. When enabled, the FEATURE_WINDOW_RESTRICTIONS feature adds several restrictions to the size and behavior of popup windows -- **OIeZoneElevate** Flag indicating which Microsoft Office products have this setting enabled. When enabled, the FEATURE_ZONE_ELEVATION feature prevents pages in one zone from navigating to pages in a higher security zone unless the navigation is generated by the user - - -### Microsoft.Windows.Inventory.General.InventoryMiscellaneousOfficeIESettingsStartSync - -Diagnostic event to indicate a new sync is being generated for this object type. - -This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedeviceinventorychange). - -The following fields are available: - -- **InventoryVersion** The version of the inventory binary generating the events. - - -### Microsoft.Windows.Inventory.General.InventoryMiscellaneousOfficeInsightsAdd - -This event provides insight data on the installed Office products - -This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedeviceinventorychange). - -The following fields are available: - -- **InventoryVersion** The version of the inventory binary generating the events. -- **OfficeApplication** The name of the Office application. -- **OfficeArchitecture** The bitness of the Office application. -- **OfficeVersion** The version of the Office application. -- **Value** The insights collected about this entity. - - -### Microsoft.Windows.Inventory.General.InventoryMiscellaneousOfficeInsightsRemove - -Indicates that this particular data object represented by the objectInstanceId is no longer present. - -This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedeviceinventorychange). - -The following fields are available: - -- **InventoryVersion** The version of the inventory binary generating the events. - - -### Microsoft.Windows.Inventory.General.InventoryMiscellaneousOfficeInsightsStartSync - -This diagnostic event indicates that a new sync is being generated for this object type. - -This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedeviceinventorychange). - -The following fields are available: - -- **InventoryVersion** The version of the inventory binary generating the events. - - -### Microsoft.Windows.Inventory.General.InventoryMiscellaneousOfficeProductsAdd - -Describes Office Products installed. - -This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedeviceinventorychange). - -The following fields are available: - -- **InventoryVersion** The version of the inventory binary generating the events. -- **OC2rApps** A GUID the describes the Office Click-To-Run apps -- **OC2rSkus** Comma-delimited list (CSV) of Office Click-To-Run products installed on the device. For example, Office 2016 ProPlus -- **OMsiApps** Comma-delimited list (CSV) of Office MSI products installed on the device. For example, Microsoft Word -- **OProductCodes** A GUID that describes the Office MSI products - - -### Microsoft.Windows.Inventory.General.InventoryMiscellaneousOfficeProductsStartSync - -Diagnostic event to indicate a new sync is being generated for this object type. - -This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedeviceinventorychange). - -The following fields are available: - -- **InventoryVersion** The version of the inventory binary generating the events. - - -### Microsoft.Windows.Inventory.General.InventoryMiscellaneousOfficeSettingsAdd - -This event describes various Office settings - -This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedeviceinventorychange). - -The following fields are available: - -- **BrowserFlags** Browser flags for Office-related products -- **ExchangeProviderFlags** Provider policies for Office Exchange -- **InventoryVersion** The version of the inventory binary generating the events. -- **SharedComputerLicensing** Office shared computer licensing policies - - -### Microsoft.Windows.Inventory.General.InventoryMiscellaneousOfficeSettingsStartSync - -Indicates a new sync is being generated for this object type. - -This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedeviceinventorychange). - -The following fields are available: - -- **InventoryVersion** The version of the inventory binary generating the events. - - -### Microsoft.Windows.Inventory.General.InventoryMiscellaneousOfficeVBAAdd - -This event provides a summary rollup count of conditions encountered while performing a local scan of Office files, analyzing for known VBA programmability compatibility issues between legacy office version and ProPlus, and between 32 and 64-bit versions - -This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedeviceinventorychange). - -The following fields are available: - -- **Design** Count of files with design issues found. -- **Design_x64** Count of files with 64 bit design issues found. -- **DuplicateVBA** Count of files with duplicate VBA code. -- **HasVBA** Count of files with VBA code. -- **Inaccessible** Count of files that were inaccessible for scanning. -- **InventoryVersion** The version of the inventory binary generating the events. -- **Issues** Count of files with issues detected. -- **Issues_x64** Count of files with 64-bit issues detected. -- **IssuesNone** Count of files with no issues detected. -- **IssuesNone_x64** Count of files with no 64-bit issues detected. -- **Locked** Count of files that were locked, preventing scanning. -- **NoVBA** Count of files with no VBA inside. -- **Protected** Count of files that were password protected, preventing scanning. -- **RemLimited** Count of files that require limited remediation changes. -- **RemLimited_x64** Count of files that require limited remediation changes for 64-bit issues. -- **RemSignificant** Count of files that require significant remediation changes. -- **RemSignificant_x64** Count of files that require significant remediation changes for 64-bit issues. -- **Score** Overall compatibility score calculated for scanned content. -- **Score_x64** Overall 64-bit compatibility score calculated for scanned content. -- **Total** Total number of files scanned. -- **Validation** Count of files that require additional manual validation. -- **Validation_x64** Count of files that require additional manual validation for 64-bit issues. - - -### Microsoft.Windows.Inventory.General.InventoryMiscellaneousOfficeVBARemove - -Indicates that this particular data object represented by the objectInstanceId is no longer present. - -This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedeviceinventorychange). - -The following fields are available: - -- **InventoryVersion** The version of the inventory binary generating the events. - - -### Microsoft.Windows.Inventory.General.InventoryMiscellaneousOfficeVBARuleViolationsAdd - -This event provides data on Microsoft Office VBA rule violations, including a rollup count per violation type, giving an indication of remediation requirements for an organization. The event identifier is a unique GUID, associated with the validation rule - -This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedeviceinventorychange). - -The following fields are available: - -- **Count** Count of total Microsoft Office VBA rule violations -- **InventoryVersion** The version of the inventory binary generating the events. - - -### Microsoft.Windows.Inventory.General.InventoryMiscellaneousOfficeVBARuleViolationsRemove - -Indicates that this particular data object represented by the objectInstanceId is no longer present. - -This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedeviceinventorychange). - -The following fields are available: - -- **InventoryVersion** The version of the inventory binary generating the events. - - -### Microsoft.Windows.Inventory.General.InventoryMiscellaneousOfficeVBARuleViolationsStartSync - -This event indicates that a new sync is being generated for this object type. - -This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedeviceinventorychange). - -The following fields are available: - -- **InventoryVersion** The version of the inventory binary generating the events. - - -### Microsoft.Windows.Inventory.General.InventoryMiscellaneousOfficeVBAStartSync - -Diagnostic event to indicate a new sync is being generated for this object type. - -This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedeviceinventorychange). - -The following fields are available: - -- **InventoryVersion** The version of the inventory binary generating the events. - - -### Microsoft.Windows.Inventory.General.InventoryMiscellaneousUUPInfoAdd - -Provides data on Unified Update Platform (UUP) products and what version they are at. - -This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedeviceinventorychange). - -The following fields are available: - -- **Identifier** UUP identifier -- **LastActivatedVersion** Last activated version -- **PreviousVersion** Previous version -- **Source** UUP source -- **Version** UUP version - - -### Microsoft.Windows.Inventory.General.InventoryMiscellaneousUUPInfoRemove - -Indicates that this particular data object represented by the objectInstanceId is no longer present. - -This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedeviceinventorychange). - - - -### Microsoft.Windows.Inventory.General.InventoryMiscellaneousUUPInfoStartSync - -Diagnostic event to indicate a new sync is being generated for this object type. - -This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedeviceinventorychange). - - - -### Microsoft.Windows.Inventory.Indicators.Checksum - -This event summarizes the counts for the InventoryMiscellaneousUexIndicatorAdd events. - -The following fields are available: - -- **CensusId** A unique hardware identifier. -- **ChecksumDictionary** A count of each operating system indicator. -- **PCFP** Equivalent to the InventoryId field that is found in other core events. - - -### Microsoft.Windows.Inventory.Indicators.InventoryMiscellaneousUexIndicatorAdd - -These events represent the basic metadata about the OS indicators installed on the system which are used for keeping the device up to date. - -This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedeviceinventorychange). - -The following fields are available: - -- **IndicatorValue** The indicator value. -- **Value** Describes an operating system indicator that may be relevant for the device upgrade. - - -### Microsoft.Windows.Inventory.Indicators.InventoryMiscellaneousUexIndicatorRemove - -This event is a counterpart to InventoryMiscellaneousUexIndicatorAdd that indicates that the item has been removed. - -This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedeviceinventorychange). - - - -### Microsoft.Windows.Inventory.Indicators.InventoryMiscellaneousUexIndicatorStartSync - -This event indicates that a new set of InventoryMiscellaneousUexIndicatorAdd events will be sent. - -This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedeviceinventorychange). - - - -## Kernel events - -### IO - -This event indicates the number of bytes read from or read by the OS and written to or written by the OS upon system startup. - -The following fields are available: - -- **BytesRead** The total number of bytes read from or read by the OS upon system startup. -- **BytesWritten** The total number of bytes written to or written by the OS upon system startup. - - -### Microsoft.Windows.Kernel.BootEnvironment.OsLaunch - -OS information collected during Boot, used to evaluate the success of the upgrade process. - -The following fields are available: - -- **BootApplicationId** This field tells us what the OS Loader Application Identifier is. -- **BootAttemptCount** The number of consecutive times the boot manager has attempted to boot into this operating system. -- **BootSequence** The current Boot ID, used to correlate events related to a particular boot session. -- **BootStatusPolicy** Identifies the applicable Boot Status Policy. -- **BootType** Identifies the type of boot (e.g.: "Cold", "Hiber", "Resume"). -- **EventTimestamp** Seconds elapsed since an arbitrary time point. This can be used to identify the time difference in successive boot attempts being made. -- **FirmwareResetReasonEmbeddedController** Reason for system reset provided by firmware. -- **FirmwareResetReasonEmbeddedControllerAdditional** Additional information on system reset reason provided by firmware if needed. -- **FirmwareResetReasonPch** Reason for system reset provided by firmware. -- **FirmwareResetReasonPchAdditional** Additional information on system reset reason provided by firmware if needed. -- **FirmwareResetReasonSupplied** Flag indicating that a reason for system reset was provided by firmware. -- **IO** Amount of data written to and read from the disk by the OS Loader during boot. See [IO](#io). -- **LastBootSucceeded** Flag indicating whether the last boot was successful. -- **LastShutdownSucceeded** Flag indicating whether the last shutdown was successful. -- **MaxAbove4GbFreeRange** This field describes the largest memory range available above 4Gb. -- **MaxBelow4GbFreeRange** This field describes the largest memory range available below 4Gb. -- **MeasuredLaunchPrepared** This field tells us if the OS launch was initiated using Measured/Secure Boot over DRTM (Dynamic Root of Trust for Measurement). -- **MeasuredLaunchResume** This field tells us if Dynamic Root of Trust for Measurement (DRTM) was used when resuming from hibernation. -- **MenuPolicy** Type of advanced options menu that should be shown to the user (Legacy, Standard, etc.). -- **RecoveryEnabled** Indicates whether recovery is enabled. -- **SecureLaunchPrepared** This field indicates if DRTM was prepared during boot. -- **TcbLaunch** Indicates whether the Trusted Computing Base was used during the boot flow. -- **UserInputTime** The amount of time the loader application spent waiting for user input. - - -## Miracast events - -### Microsoft.Windows.Cast.Miracast.MiracastSessionEnd - -This event sends data at the end of a Miracast session that helps determine RTSP related Miracast failures along with some statistics about the session - -The following fields are available: - -- **AudioChannelCount** The number of audio channels. -- **AudioSampleRate** The sample rate of audio in terms of samples per second. -- **AudioSubtype** The unique subtype identifier of the audio codec (encoding method) used for audio encoding. -- **AverageBitrate** The average video bitrate used during the Miracast session, in bits per second. -- **AverageDataRate** The average available bandwidth reported by the WiFi driver during the Miracast session, in bits per second. -- **AveragePacketSendTimeInMs** The average time required for the network to send a sample, in milliseconds. -- **ConnectorType** The type of connector used during the Miracast session. -- **EncodeAverageTimeMS** The average time to encode a frame of video, in milliseconds. -- **EncodeCount** The count of total frames encoded in the session. -- **EncodeMaxTimeMS** The maximum time to encode a frame, in milliseconds. -- **EncodeMinTimeMS** The minimum time to encode a frame, in milliseconds. -- **EncoderCreationTimeInMs** The time required to create the video encoder, in milliseconds. -- **ErrorSource** Identifies the component that encountered an error that caused a disconnect, if applicable. -- **FirstFrameTime** The time (tick count) when the first frame is sent. -- **FirstLatencyMode** The first latency mode. -- **FrameAverageTimeMS** Average time to process an entire frame, in milliseconds. -- **FrameCount** The total number of frames processed. -- **FrameMaxTimeMS** The maximum time required to process an entire frame, in milliseconds. -- **FrameMinTimeMS** The minimum time required to process an entire frame, in milliseconds. -- **Glitches** The number of frames that failed to be delivered on time. -- **HardwareCursorEnabled** Indicates if hardware cursor was enabled when the connection ended. -- **HDCPState** The state of HDCP (High-bandwidth Digital Content Protection) when the connection ended. -- **HighestBitrate** The highest video bitrate used during the Miracast session, in bits per second. -- **HighestDataRate** The highest available bandwidth reported by the WiFi driver, in bits per second. -- **LastLatencyMode** The last reported latency mode. -- **LogTimeReference** The reference time, in tick counts. -- **LowestBitrate** The lowest video bitrate used during the Miracast session, in bits per second. -- **LowestDataRate** The lowest video bitrate used during the Miracast session, in bits per second. -- **MediaErrorCode** The error code reported by the media session, if applicable. -- **MiracastEntry** The time (tick count) when the Miracast driver was first loaded. -- **MiracastM1** The time (tick count) when the M1 request was sent. -- **MiracastM2** The time (tick count) when the M2 request was sent. -- **MiracastM3** The time (tick count) when the M3 request was sent. -- **MiracastM4** The time (tick count) when the M4 request was sent. -- **MiracastM5** The time (tick count) when the M5 request was sent. -- **MiracastM6** The time (tick count) when the M6 request was sent. -- **MiracastM7** The time (tick count) when the M7 request was sent. -- **MiracastSessionState** The state of the Miracast session when the connection ended. -- **MiracastStreaming** The time (tick count) when the Miracast session first started processing frames. -- **ProfileCount** The count of profiles generated from the receiver M4 response. -- **ProfileCountAfterFiltering** The count of profiles after filtering based on available bandwidth and encoder capabilities. -- **RefreshRate** The refresh rate set on the remote display. -- **RotationSupported** Indicates if the Miracast receiver supports display rotation. -- **RTSPSessionId** The unique identifier of the RTSP session. This matches the RTSP session ID for the receiver for the same session. -- **SessionGuid** The unique identifier of to correlate various Miracast events from a session. -- **SinkHadEdid** Indicates if the Miracast receiver reported an EDID. -- **SupportMicrosoftColorSpaceConversion** Indicates whether the Microsoft color space conversion for extra color fidelity is supported by the receiver. -- **SupportsMicrosoftDiagnostics** Indicates whether the Miracast receiver supports the Microsoft Diagnostics Miracast extension. -- **SupportsMicrosoftFormatChange** Indicates whether the Miracast receiver supports the Microsoft Format Change Miracast extension. -- **SupportsMicrosoftLatencyManagement** Indicates whether the Miracast receiver supports the Microsoft Latency Management Miracast extension. -- **SupportsMicrosoftRTCP** Indicates whether the Miracast receiver supports the Microsoft RTCP Miracast extension. -- **SupportsMicrosoftVideoFormats** Indicates whether the Miracast receiver supports Microsoft video format for 3:2 resolution. -- **SupportsWiDi** Indicates whether Miracast receiver supports Intel WiDi extensions. -- **TeardownErrorCode** The error code reason for teardown provided by the receiver, if applicable. -- **TeardownErrorReason** The text string reason for teardown provided by the receiver, if applicable. -- **UIBCEndState** Indicates whether UIBC was enabled when the connection ended. -- **UIBCEverEnabled** Indicates whether UIBC was ever enabled. -- **UIBCStatus** The result code reported by the UIBC setup process. -- **VideoBitrate** The starting bitrate for the video encoder. -- **VideoCodecLevel** The encoding level used for encoding, specific to the video subtype. -- **VideoHeight** The height of encoded video frames. -- **VideoSubtype** The unique subtype identifier of the video codec (encoding method) used for video encoding. -- **VideoWidth** The width of encoded video frames. -- **WFD2Supported** Indicates if the Miracast receiver supports WFD2 protocol. - - -## OneDrive events - -### Microsoft.OneDrive.Sync.Setup.APIOperation - -This event includes basic data about install and uninstall OneDrive API operations. - -The following fields are available: - -- **APIName** The name of the API. -- **Duration** How long the operation took. -- **IsSuccess** Was the operation successful? -- **ResultCode** The result code. -- **ScenarioName** The name of the scenario. - - -### Microsoft.OneDrive.Sync.Setup.EndExperience - -This event includes a success or failure summary of the installation. - -The following fields are available: - -- **APIName** The name of the API. -- **HResult** HResult of the operation -- **IsSuccess** Whether the operation is successful or not -- **ScenarioName** The name of the scenario. - - -### Microsoft.OneDrive.Sync.Setup.OSUpgradeInstallationOperation - -This event is related to the OS version when the OS is upgraded with OneDrive installed. - -The following fields are available: - -- **CurrentOneDriveVersion** The current version of OneDrive. -- **CurrentOSBuildBranch** The current branch of the operating system. -- **CurrentOSBuildNumber** The current build number of the operating system. -- **CurrentOSVersion** The current version of the operating system. -- **HResult** The HResult of the operation. -- **SourceOSBuildBranch** The source branch of the operating system. -- **SourceOSBuildNumber** The source build number of the operating system. -- **SourceOSVersion** The source version of the operating system. - - -### Microsoft.OneDrive.Sync.Setup.RegisterStandaloneUpdaterAPIOperation - -This event is related to registering or unregistering the OneDrive update task. - -The following fields are available: - -- **APIName** The name of the API. -- **IsSuccess** Was the operation successful? -- **RegisterNewTaskResult** The HResult of the RegisterNewTask operation. -- **ScenarioName** The name of the scenario. -- **UnregisterOldTaskResult** The HResult of the UnregisterOldTask operation. - - -### Microsoft.OneDrive.Sync.Updater.ComponentInstallState - -This event includes basic data about the installation state of dependent OneDrive components. - -The following fields are available: - -- **ComponentName** The name of the dependent component. -- **isInstalled** Is the dependent component installed? - - -### Microsoft.OneDrive.Sync.Updater.OverlayIconStatus - -This event indicates if the OneDrive overlay icon is working correctly. 0 = healthy; 1 = can be fixed; 2 = broken - -The following fields are available: - -- **32bit** The status of the OneDrive overlay icon on a 32-bit operating system. -- **64bit** The status of the OneDrive overlay icon on a 64-bit operating system. - - -### Microsoft.OneDrive.Sync.Updater.UpdateOverallResult - -This event sends information describing the result of the update. - -The following fields are available: - -- **hr** The HResult of the operation. -- **IsLoggingEnabled** Indicates whether logging is enabled for the updater. -- **UpdaterVersion** The version of the updater. - - -### Microsoft.OneDrive.Sync.Updater.UpdateXmlDownloadHResult - -This event determines the status when downloading the OneDrive update configuration file. - -The following fields are available: - -- **hr** The HResult of the operation. - - -### Microsoft.OneDrive.Sync.Updater.WebConnectionStatus - -This event determines the error code that was returned when verifying Internet connectivity. - -The following fields are available: - -- **winInetError** The HResult of the operation. - - -## Privacy consent logging events - -### Microsoft.Windows.Shell.PrivacyConsentLogging.PrivacyConsentCompleted - -This event is used to determine whether the user successfully completed the privacy consent experience. - -The following fields are available: - -- **presentationVersion** Which display version of the privacy consent experience the user completed -- **privacyConsentState** The current state of the privacy consent experience -- **settingsVersion** Which setting version of the privacy consent experience the user completed -- **userOobeExitReason** The exit reason of the privacy consent experience - - -### Microsoft.Windows.Shell.PrivacyConsentLogging.PrivacyConsentStatus - -Event tells us effectiveness of new privacy experience. - -The following fields are available: - -- **isAdmin** whether the person who is logging in is an admin -- **isExistingUser** whether the account existed in a downlevel OS -- **isLaunching** Whether or not the privacy consent experience will be launched -- **isSilentElevation** whether the user has most restrictive UAC controls -- **privacyConsentState** whether the user has completed privacy experience -- **userRegionCode** The current user's region setting - - -### wilActivity - -This event provides a Windows Internal Library context used for Product and Service diagnostics. - -The following fields are available: - -- **callContext** The function where the failure occurred. -- **currentContextId** The ID of the current call context where the failure occurred. -- **currentContextMessage** The message of the current call context where the failure occurred. -- **currentContextName** The name of the current call context where the failure occurred. -- **failureCount** The number of failures for this failure ID. -- **failureId** The ID of the failure that occurred. -- **failureType** The type of the failure that occurred. -- **fileName** The file name where the failure occurred. -- **function** The function where the failure occurred. -- **hresult** The HResult of the overall activity. -- **lineNumber** The line number where the failure occurred. -- **message** The message of the failure that occurred. -- **module** The module where the failure occurred. -- **originatingContextId** The ID of the originating call context that resulted in the failure. -- **originatingContextMessage** The message of the originating call context that resulted in the failure. -- **originatingContextName** The name of the originating call context that resulted in the failure. -- **threadId** The ID of the thread on which the activity is executing. - - -## Sediment events - -### Microsoft.Windows.Sediment.Info.DetailedState - -This event is sent when detailed state information is needed from an update trial run. - -The following fields are available: - -- **Data** Data relevant to the state, such as what percent of disk space the directory takes up. -- **Id** Identifies the trial being run, such as a disk related trial. -- **ReleaseVer** The version of the component. -- **State** The state of the reporting data from the trial, such as the top-level directory analysis. -- **Time** The time the event was fired. - - -### Microsoft.Windows.Sediment.Info.Error - -This event indicates an error in the updater payload. This information assists in keeping Windows up to date. - -The following fields are available: - -- **FailureType** The type of error encountered. -- **FileName** The code file in which the error occurred. -- **HResult** The failure error code. -- **LineNumber** The line number in the code file at which the error occurred. -- **ReleaseVer** The version information for the component in which the error occurred. -- **Time** The system time at which the error occurred. - - -### Microsoft.Windows.Sediment.Info.PhaseChange - -The event indicates progress made by the updater. This information assists in keeping Windows up to date. - -The following fields are available: - -- **NewPhase** The phase of progress made. -- **ReleaseVer** The version information for the component in which the change occurred. -- **Time** The system time at which the phase chance occurred. - - -## Setup events - -### SetupPlatformTel.SetupPlatformTelActivityEvent - -This event sends basic metadata about the SetupPlatform update installation process, to help keep Windows up to date. - -The following fields are available: - -- **FieldName** Retrieves the event name/data point. Examples: InstallStartTime, InstallEndtime, OverallResult etc. -- **GroupName** Retrieves the groupname the event belongs to. Example: Install Information, DU Information, Disk Space Information etc. -- **Value** Value associated with the corresponding event name. For example, time-related events will include the system time - - -### SetupPlatformTel.SetupPlatformTelActivityStarted - -This event sends basic metadata about the update installation process generated by SetupPlatform to help keep Windows up to date. - -The following fields are available: - -- **Name** The name of the dynamic update type. Example: GDR driver - - -### SetupPlatformTel.SetupPlatformTelActivityStopped - -This event sends basic metadata about the update installation process generated by SetupPlatform to help keep Windows up to date. - - - -### SetupPlatformTel.SetupPlatformTelEvent - -This service retrieves events generated by SetupPlatform, the engine that drives the various deployment scenarios. - -The following fields are available: - -- **FieldName** Retrieves the event name/data point. Examples: InstallStartTime, InstallEndtime, OverallResult etc. -- **GroupName** Retrieves the groupname the event belongs to. Example: Install Information, DU Information, Disk Space Information etc. -- **Value** Retrieves the value associated with the corresponding event name (Field Name). For example: For time related events this will include the system time. - - -## Software update events - -### SoftwareUpdateClientTelemetry.CheckForUpdates - -Scan process event on Windows Update client. See the EventScenario field for specifics (started/failed/succeeded). - -The following fields are available: - -- **ActivityMatchingId** Contains a unique ID identifying a single CheckForUpdates session from initialization to completion. -- **AllowCachedResults** Indicates if the scan allowed using cached results. -- **ApplicableUpdateInfo** Metadata for the updates which were detected as applicable -- **BiosFamily** The family of the BIOS (Basic Input Output System). -- **BiosName** The name of the device BIOS. -- **BiosReleaseDate** The release date of the device BIOS. -- **BiosSKUNumber** The sku number of the device BIOS. -- **BIOSVendor** The vendor of the BIOS. -- **BiosVersion** The version of the BIOS. -- **BranchReadinessLevel** The servicing branch configured on the device. -- **CachedEngineVersion** For self-initiated healing, the version of the SIH engine that is cached on the device. If the SIH engine does not exist, the value is null. -- **CallerApplicationName** The name provided by the caller who initiated API calls into the software distribution client. -- **CapabilityDetectoidGuid** The GUID for a hardware applicability detectoid that could not be evaluated. -- **CDNCountryCode** Two letter country abbreviation for the Content Distribution Network (CDN) location. -- **CDNId** The unique identifier of a specific device, used to identify how many devices are encountering success or a particular issue. -- **ClientVersion** The version number of the software distribution client. -- **CommonProps** A bitmask for future flags associated with the Windows Update client behavior. No data is currently reported in this field. Expected value for this field is 0. -- **Context** Gives context on where the error has occurred. Example: AutoEnable, GetSLSData, AddService, Misc, or Unknown -- **CurrentMobileOperator** The mobile operator the device is currently connected to. -- **DeferralPolicySources** Sources for any update deferral policies defined (GPO = 0x10, MDM = 0x100, Flight = 0x1000, UX = 0x10000). -- **DeferredUpdates** Update IDs which are currently being deferred until a later time -- **DeviceModel** What is the device model. -- **DriverError** The error code hit during a driver scan. This is 0 if no error was encountered. -- **DriverExclusionPolicy** Indicates if the policy for not including drivers with Windows Update is enabled. -- **DriverSyncPassPerformed** Were drivers scanned this time? -- **EventInstanceID** A globally unique identifier for event instance. -- **EventScenario** Indicates the purpose of sending this event - whether because the software distribution just started checking for content, or whether it was cancelled, succeeded, or failed. -- **ExtendedMetadataCabUrl** Hostname that is used to download an update. -- **ExtendedStatusCode** Secondary error code for certain scenarios where StatusCode wasn't specific enough. -- **FailedUpdateGuids** The GUIDs for the updates that failed to be evaluated during the scan. -- **FailedUpdatesCount** The number of updates that failed to be evaluated during the scan. -- **FeatureUpdateDeferral** The deferral period configured for feature OS updates on the device (in days). -- **FeatureUpdatePause** Indicates whether feature OS updates are paused on the device. -- **FeatureUpdatePausePeriod** The pause duration configured for feature OS updates on the device (in days). -- **FlightBranch** The branch that a device is on if participating in flighting (pre-release builds). -- **FlightRing** The ring (speed of getting builds) that a device is on if participating in flighting (pre-release builds). -- **HomeMobileOperator** The mobile operator that the device was originally intended to work with. -- **IntentPFNs** Intended application-set metadata for atomic update scenarios. -- **IPVersion** Indicates whether the download took place over IPv4 or IPv6 -- **IsWUfBDualScanEnabled** Indicates if Windows Update for Business dual scan is enabled on the device. -- **IsWUfBEnabled** Indicates if Windows Update for Business is enabled on the device. -- **IsWUfBFederatedScanDisabled** Indicates if Windows Update for Business federated scan is disabled on the device. -- **MetadataIntegrityMode** The mode of the update transport metadata integrity check. 0-Unknown, 1-Ignoe, 2-Audit, 3-Enforce -- **MSIError** The last error that was encountered during a scan for updates. -- **NetworkConnectivityDetected** Indicates the type of network connectivity that was detected. 0 - IPv4, 1 - IPv6 -- **NumberOfApplicableUpdates** The number of updates which were ultimately deemed applicable to the system after the detection process is complete -- **NumberOfApplicationsCategoryScanEvaluated** The number of categories (apps) for which an app update scan checked -- **NumberOfLoop** The number of round trips the scan required -- **NumberOfNewUpdatesFromServiceSync** The number of updates which were seen for the first time in this scan -- **NumberOfUpdatesEvaluated** The total number of updates which were evaluated as a part of the scan -- **NumFailedMetadataSignatures** The number of metadata signatures checks which failed for new metadata synced down. -- **Online** Indicates if this was an online scan. -- **PausedUpdates** A list of UpdateIds which that currently being paused. -- **PauseFeatureUpdatesEndTime** If feature OS updates are paused on the device, this is the date and time for the end of the pause time window. -- **PauseFeatureUpdatesStartTime** If feature OS updates are paused on the device, this is the date and time for the beginning of the pause time window. -- **PauseQualityUpdatesEndTime** If quality OS updates are paused on the device, this is the date and time for the end of the pause time window. -- **PauseQualityUpdatesStartTime** If quality OS updates are paused on the device, this is the date and time for the beginning of the pause time window. -- **PhonePreviewEnabled** Indicates whether a phone was getting preview build, prior to flighting (pre-release builds) being introduced. -- **ProcessName** The process name of the caller who initiated API calls, in the event where CallerApplicationName was not provided. -- **QualityUpdateDeferral** The deferral period configured for quality OS updates on the device (in days). -- **QualityUpdatePause** Indicates whether quality OS updates are paused on the device. -- **QualityUpdatePausePeriod** The pause duration configured for quality OS updates on the device (in days). -- **RelatedCV** The previous Correlation Vector that was used before swapping with a new one -- **ScanDurationInSeconds** The number of seconds a scan took -- **ScanEnqueueTime** The number of seconds it took to initialize a scan -- **ScanProps** This is a 32-bit integer containing Boolean properties for a given Windows Update scan. The following bits are used; all remaining bits are reserved and set to zero. Bit 0 (0x1): IsInteractive - is set to 1 if the scan is requested by a user, or 0 if the scan is requested by Automatic Updates. Bit 1 (0x2): IsSeeker - is set to 1 if the Windows Update client's Seeker functionality is enabled. Seeker functionality is enabled on certain interactive scans, and results in the scans returning certain updates that are in the initial stages of release (not yet released for full adoption via Automatic Updates). -- **ServiceGuid** An ID which represents which service the software distribution client is checking for content (Windows Update, Microsoft Store, etc.). -- **ServiceUrl** The environment URL a device is configured to scan with -- **ShippingMobileOperator** The mobile operator that a device shipped on. -- **StatusCode** Indicates the result of a CheckForUpdates event (success, cancellation, failure code HResult). -- **SyncType** Describes the type of scan the event was -- **SystemBIOSMajorRelease** Major version of the BIOS. -- **SystemBIOSMinorRelease** Minor version of the BIOS. -- **TargetMetadataVersion** For self-initiated healing, this is the target version of the SIH engine to download (if needed). If not, the value is null. -- **TotalNumMetadataSignatures** The total number of metadata signatures checks done for new metadata that was synced down. -- **WebServiceRetryMethods** Web service method requests that needed to be retried to complete operation. -- **WUDeviceID** The unique identifier of a specific device, used to identify how many devices are encountering success or a particular issue. - - -### SoftwareUpdateClientTelemetry.Commit - -This event tracks the commit process post the update installation when software update client is trying to update the device. - -The following fields are available: - -- **BiosFamily** Device family as defined in the system BIOS -- **BiosName** Name of the system BIOS -- **BiosReleaseDate** Release date of the system BIOS -- **BiosSKUNumber** Device SKU as defined in the system BIOS -- **BIOSVendor** Vendor of the system BIOS -- **BiosVersion** Version of the system BIOS -- **BundleId** Identifier associated with the specific content bundle; should not be all zeros if the bundleID was found. -- **BundleRevisionNumber** Identifies the revision number of the content bundle -- **CallerApplicationName** Name provided by the caller who initiated API calls into the software distribution client -- **ClientVersion** Version number of the software distribution client -- **DeploymentProviderMode** The mode of operation of the update deployment provider. -- **DeviceModel** Device model as defined in the system bios -- **EventInstanceID** A globally unique identifier for event instance -- **EventScenario** Indicates the purpose of the event - whether because scan started, succeded, failed, etc. -- **EventType** Possible values are "Child", "Bundle", "Relase" or "Driver". -- **FlightId** The specific id of the flight the device is getting -- **HandlerType** Indicates the kind of content (app, driver, windows patch, etc.) -- **RevisionNumber** Identifies the revision number of this specific piece of content -- **ServiceGuid** Identifier for the service to which the software distribution client is connecting (Windows Update, Windows Store, etc) -- **SystemBIOSMajorRelease** Major release version of the system bios -- **SystemBIOSMinorRelease** Minor release version of the system bios -- **UpdateId** Identifier associated with the specific piece of content -- **WUDeviceID** Unique device id controlled by the software distribution client - - -### SoftwareUpdateClientTelemetry.Download - -Download process event for target update on Windows Update client. See the EventScenario field for specifics (started/failed/succeeded). - -The following fields are available: - -- **ActiveDownloadTime** How long the download took, in seconds, excluding time where the update wasn't actively being downloaded. -- **AppXBlockHashFailures** Indicates the number of blocks that failed hash validation during download of the app payload. -- **AppXBlockHashValidationFailureCount** A count of the number of blocks that have failed validation after being downloaded. -- **AppXDownloadScope** Indicates the scope of the download for application content. -- **AppXScope** Indicates the scope of the app download. -- **BiosFamily** The family of the BIOS (Basic Input Output System). -- **BiosName** The name of the device BIOS. -- **BiosReleaseDate** The release date of the device BIOS. -- **BiosSKUNumber** The sku number of the device BIOS. -- **BIOSVendor** The vendor of the BIOS. -- **BiosVersion** The version of the BIOS. -- **BundleBytesDownloaded** Number of bytes downloaded for the specific content bundle. -- **BundleId** Identifier associated with the specific content bundle. -- **BundleRepeatFailCount** Indicates whether this particular update bundle has previously failed. -- **BundleRepeatFailFlag** Indicates whether this particular update bundle previously failed to download. -- **BundleRevisionNumber** Identifies the revision number of the content bundle. -- **BytesDownloaded** Number of bytes that were downloaded for an individual piece of content (not the entire bundle). -- **CachedEngineVersion** The version of the “Self-Initiated Healing” (SIH) engine that is cached on the device, if applicable. -- **CallerApplicationName** The name provided by the application that initiated API calls into the software distribution client. -- **CbsDownloadMethod** Indicates whether the download was a full- or a partial-file download. -- **CbsMethod** The method used for downloading the update content related to the Component Based Servicing (CBS) technology. -- **CDNCountryCode** Two letter country abbreviation for the Content Distribution Network (CDN) location. -- **CDNId** ID which defines which CDN the software distribution client downloaded the content from. -- **ClientVersion** The version number of the software distribution client. -- **CommonProps** A bitmask for future flags associated with the Windows Update client behavior. -- **ConnectTime** Indicates the cumulative amount of time (in seconds) it took to establish the connection for all updates in an update bundle. -- **CurrentMobileOperator** The mobile operator the device is currently connected to. -- **DeviceModel** The model of the device. -- **DownloadPriority** Indicates whether a download happened at background, normal, or foreground priority. -- **DownloadProps** Information about the download operation. -- **DownloadType** Differentiates the download type of “Self-Initiated Healing” (SIH) downloads between Metadata and Payload downloads. -- **EventInstanceID** A globally unique identifier for event instance. -- **EventScenario** Indicates the purpose for sending this event: whether because the software distribution just started downloading content; or whether it was cancelled, succeeded, or failed. -- **EventType** Identifies the type of the event (Child, Bundle, or Driver). -- **ExtendedStatusCode** Secondary error code for certain scenarios where StatusCode wasn't specific enough. -- **FeatureUpdatePause** Indicates whether feature OS updates are paused on the device. -- **FlightBranch** The branch that a device is on if participating in flighting (pre-release builds). -- **FlightBuildNumber** If this download was for a flight (pre-release build), this indicates the build number of that flight. -- **FlightId** The specific ID of the flight (pre-release build) the device is getting. -- **FlightRing** The ring (speed of getting builds) that a device is on if participating in flighting (pre-release builds). -- **HandlerType** Indicates what kind of content is being downloaded (app, driver, windows patch, etc.). -- **HardwareId** If this download was for a driver targeted to a particular device model, this ID indicates the model of the device. -- **HomeMobileOperator** The mobile operator that the device was originally intended to work with. -- **HostName** The hostname URL the content is downloading from. -- **IPVersion** Indicates whether the download took place over IPv4 or IPv6. -- **IsDependentSet** Indicates whether a driver is a part of a larger System Hardware/Firmware Update -- **IsWUfBDualScanEnabled** Indicates if Windows Update for Business dual scan is enabled on the device. -- **IsWUfBEnabled** Indicates if Windows Update for Business is enabled on the device. -- **NetworkCost** A flag indicating the cost of the network (congested, fixed, variable, over data limit, roaming, etc.) used for downloading the update content. -- **NetworkCostBitMask** Indicates what kind of network the device is connected to (roaming, metered, over data cap, etc.) -- **NetworkRestrictionStatus** More general version of NetworkCostBitMask, specifying whether Windows considered the current network to be "metered." -- **PackageFullName** The package name of the content. -- **PhonePreviewEnabled** Indicates whether a phone was opted-in to getting preview builds, prior to flighting (pre-release builds) being introduced. -- **PostDnldTime** Time (in seconds) taken to signal download completion after the last job completed downloading the payload. -- **ProcessName** The process name of the application that initiated API calls, in the event where CallerApplicationName was not provided. -- **QualityUpdatePause** Indicates whether quality OS updates are paused on the device. -- **Reason** A 32-bit integer representing the reason the update is blocked from being downloaded in the background. -- **RegulationReason** The reason that the update is regulated -- **RegulationResult** The result code (HResult) of the last attempt to contact the regulation web service for download regulation of update content. -- **RelatedCV** The Correlation Vector that was used before the most recent change to a new Correlation Vector. -- **RepeatFailCount** Indicates whether this specific content has previously failed. -- **RepeatFailFlag** Indicates whether this specific content previously failed to download. -- **RevisionNumber** The revision number of the specified piece of content. -- **ServiceGuid** A unique identifier for the service that the software distribution client is installing content for (Windows Update, Windows Store, etc.). -- **Setup360Phase** Identifies the active phase of the upgrade download if the current download is for an Operating System upgrade. -- **ShippingMobileOperator** The mobile operator linked to the device when the device shipped. -- **SizeCalcTime** Time (in seconds) taken to calculate the total download size of the payload. -- **StatusCode** Indicates the result of a Download event (success, cancellation, failure code HResult). -- **SystemBIOSMajorRelease** Major version of the BIOS. -- **SystemBIOSMinorRelease** Minor version of the BIOS. -- **TargetGroupId** For drivers targeted to a specific device model, this ID indicates the distribution group of devices receiving that driver. -- **TargetingVersion** For drivers targeted to a specific device model, this is the version number of the drivers being distributed to the device. -- **TargetMetadataVersion** The version of the currently downloading (or most recently downloaded) package. -- **ThrottlingServiceHResult** Result code (success/failure) while contacting a web service to determine whether this device should download content yet. -- **TimeToEstablishConnection** Time (in milliseconds) it took to establish the connection prior to beginning downloaded. -- **TotalExpectedBytes** The total size (in Bytes) expected to be downloaded. -- **UpdateId** An identifier associated with the specific piece of content. -- **UpdateID** An identifier associated with the specific piece of content. -- **UpdateImportance** Indicates whether the content was marked as Important, Recommended, or Optional. -- **UsedDO** Indicates whether the download used the Delivery Optimization (DO) service. -- **UsedSystemVolume** Indicates whether the content was downloaded to the device's main system storage drive, or an alternate storage drive. -- **WUDeviceID** The unique identifier of a specific device, used to identify how many devices are encountering success or a particular issue. - - -### SoftwareUpdateClientTelemetry.DownloadCheckpoint - -This event provides a checkpoint between each of the Windows Update download phases for UUP content - -The following fields are available: - -- **CallerApplicationName** The name provided by the caller who initiated API calls into the software distribution client -- **ClientVersion** The version number of the software distribution client -- **EventScenario** Indicates the purpose of sending this event - whether because the software distribution just started checking for content, or whether it was cancelled, succeeded, or failed -- **EventType** Possible values are "Child", "Bundle", "Relase" or "Driver" -- **ExtendedStatusCode** Secondary error code for certain scenarios where StatusCode wasn't specific enough -- **FileId** A hash that uniquely identifies a file -- **FileName** Name of the downloaded file -- **FlightId** The unique identifier for each flight -- **RelatedCV** The previous Correlation Vector that was used before swapping with a new one -- **RevisionNumber** Unique revision number of Update -- **ServiceGuid** An ID which represents which service the software distribution client is checking for content (Windows Update, Microsoft Store, etc.) -- **StatusCode** Indicates the result of a CheckForUpdates event (success, cancellation, failure code HResult) -- **UpdateId** Unique Update ID -- **WUDeviceID** The unique identifier of a specific device, used to identify how many devices are encountering success or a particular issue - - -### SoftwareUpdateClientTelemetry.DownloadHeartbeat - -This event allows tracking of ongoing downloads and contains data to explain the current state of the download - -The following fields are available: - -- **BytesTotal** Total bytes to transfer for this content -- **BytesTransferred** Total bytes transferred for this content at the time of heartbeat -- **CallerApplicationName** Name provided by the caller who initiated API calls into the software distribution client -- **ClientVersion** The version number of the software distribution client -- **ConnectionStatus** Indicates the connectivity state of the device at the time of heartbeat -- **CurrentError** Last (transient) error encountered by the active download -- **DownloadFlags** Flags indicating if power state is ignored -- **DownloadState** Current state of the active download for this content (queued, suspended, or progressing) -- **EventType** Possible values are "Child", "Bundle", or "Driver" -- **FlightId** The unique identifier for each flight -- **IsNetworkMetered** Indicates whether Windows considered the current network to be ?metered" -- **MOAppDownloadLimit** Mobile operator cap on size of application downloads, if any -- **MOUpdateDownloadLimit** Mobile operator cap on size of operating system update downloads, if any -- **PowerState** Indicates the power state of the device at the time of heartbeart (DC, AC, Battery Saver, or Connected Standby) -- **RelatedCV** The previous correlation vector that was used by the client, before swapping with a new one -- **ResumeCount** Number of times this active download has resumed from a suspended state -- **RevisionNumber** Identifies the revision number of this specific piece of content -- **ServiceGuid** Identifier for the service to which the software distribution client is connecting (Windows Update, Microsoft Store, etc) -- **SuspendCount** Number of times this active download has entered a suspended state -- **SuspendReason** Last reason for why this active download entered a suspended state -- **UpdateId** Identifier associated with the specific piece of content -- **WUDeviceID** Unique device id controlled by the software distribution client - - -### SoftwareUpdateClientTelemetry.Install - -This event sends tracking data about the software distribution client installation of the content for that update, to help keep Windows up to date. - -The following fields are available: - -- **BiosFamily** The family of the BIOS (Basic Input Output System). -- **BiosName** The name of the device BIOS. -- **BiosReleaseDate** The release date of the device BIOS. -- **BiosSKUNumber** The sku number of the device BIOS. -- **BIOSVendor** The vendor of the BIOS. -- **BiosVersion** The version of the BIOS. -- **BundleId** Identifier associated with the specific content bundle; should not be all zeros if the bundleID was found. -- **BundleRepeatFailCount** Indicates whether this particular update bundle has previously failed. -- **BundleRepeatFailFlag** Indicates whether this particular update bundle previously failed to install. -- **BundleRevisionNumber** Identifies the revision number of the content bundle. -- **CachedEngineVersion** For self-initiated healing, the version of the SIH engine that is cached on the device. If the SIH engine does not exist, the value is null. -- **CallerApplicationName** The name provided by the caller who initiated API calls into the software distribution client. -- **ClientVersion** The version number of the software distribution client. -- **CommonProps** A bitmask for future flags associated with the Windows Update client behavior. No value is currently reported in this field. Expected value for this field is 0. -- **CSIErrorType** The stage of CBS installation where it failed. -- **CurrentMobileOperator** The mobile operator to which the device is currently connected. -- **DeploymentProviderMode** The mode of operation of the update deployment provider. -- **DeviceModel** The device model. -- **DriverPingBack** Contains information about the previous driver and system state. -- **DriverRecoveryIds** The list of identifiers that could be used for uninstalling the drivers if a recovery is required. -- **EventInstanceID** A globally unique identifier for event instance. -- **EventScenario** Indicates the purpose of sending this event - whether because the software distribution just started installing content, or whether it was cancelled, succeeded, or failed. -- **EventType** Possible values are Child, Bundle, or Driver. -- **ExtendedErrorCode** The extended error code. -- **ExtendedStatusCode** Secondary error code for certain scenarios where StatusCode is not specific enough. -- **FeatureUpdatePause** Indicates whether feature OS updates are paused on the device. -- **FlightBranch** The branch that a device is on if participating in the Windows Insider Program. -- **FlightBuildNumber** If this installation was for a Windows Insider build, this is the build number of that build. -- **FlightId** The specific ID of the Windows Insider build the device is getting. -- **FlightRing** The ring that a device is on if participating in the Windows Insider Program. -- **HandlerType** Indicates what kind of content is being installed (for example, app, driver, Windows update). -- **HardwareId** If this install was for a driver targeted to a particular device model, this ID indicates the model of the device. -- **HomeMobileOperator** The mobile operator that the device was originally intended to work with. -- **InstallProps** A bitmask for future flags associated with the install operation. No value is currently reported in this field. Expected value for this field is 0. -- **IntentPFNs** Intended application-set metadata for atomic update scenarios. -- **IsDependentSet** Indicates whether the driver is part of a larger System Hardware/Firmware update. -- **IsFinalOutcomeEvent** Indicates whether this event signals the end of the update/upgrade process. -- **IsFirmware** Indicates whether this update is a firmware update. -- **IsSuccessFailurePostReboot** Indicates whether the update succeeded and then failed after a restart. -- **IsWUfBDualScanEnabled** Indicates whether Windows Update for Business dual scan is enabled on the device. -- **IsWUfBEnabled** Indicates whether Windows Update for Business is enabled on the device. -- **MergedUpdate** Indicates whether the OS update and a BSP update merged for installation. -- **MsiAction** The stage of MSI installation where it failed. -- **MsiProductCode** The unique identifier of the MSI installer. -- **PackageFullName** The package name of the content being installed. -- **PhonePreviewEnabled** Indicates whether a phone was getting preview build, prior to flighting being introduced. -- **ProcessName** The process name of the caller who initiated API calls, in the event that CallerApplicationName was not provided. -- **QualityUpdatePause** Indicates whether quality OS updates are paused on the device. -- **RelatedCV** The previous Correlation Vector that was used before swapping with a new one -- **RepeatFailCount** Indicates whether this specific piece of content has previously failed. -- **RepeatFailFlag** Indicates whether this specific piece of content previously failed to install. -- **RevisionNumber** The revision number of this specific piece of content. -- **ServiceGuid** An ID which represents which service the software distribution client is installing content for (Windows Update, Microsoft Store, etc.). -- **Setup360Phase** If the install is for an operating system upgrade, indicates which phase of the upgrade is underway. -- **ShippingMobileOperator** The mobile operator that a device shipped on. -- **StatusCode** Indicates the result of an installation event (success, cancellation, failure code HResult). -- **SystemBIOSMajorRelease** Major version of the BIOS. -- **SystemBIOSMinorRelease** Minor version of the BIOS. -- **TargetGroupId** For drivers targeted to a specific device model, this ID indicates the distribution group of devices receiving that driver. -- **TargetingVersion** For drivers targeted to a specific device model, this is the version number of the drivers being distributed to the device. -- **TransactionCode** The ID that represents a given MSI installation. -- **UpdateId** Unique update ID. -- **UpdateID** An identifier associated with the specific piece of content. -- **UpdateImportance** Indicates whether a piece of content was marked as Important, Recommended, or Optional. -- **UsedSystemVolume** Indicates whether the content was downloaded and then installed from the device's main system storage drive, or an alternate storage drive. -- **WUDeviceID** The unique identifier of a specific device, used to identify how many devices are encountering success or a particular issue. - - -### SoftwareUpdateClientTelemetry.Revert - -Revert event for target update on Windows Update Client. See EventScenario field for specifics (for example, Started/Failed/Succeeded). - -The following fields are available: - -- **BundleId** Identifier associated with the specific content bundle. Should not be all zeros if the BundleId was found. -- **BundleRepeatFailCount** Indicates whether this particular update bundle has previously failed. -- **BundleRevisionNumber** Identifies the revision number of the content bundle. -- **CallerApplicationName** Name of application making the Windows Update request. Used to identify context of request. -- **ClientVersion** Version number of the software distribution client. -- **CommonProps** A bitmask for future flags associated with the Windows Update client behavior. There is no value being reported in this field right now. Expected value for this field is 0. -- **CSIErrorType** Stage of CBS installation that failed. -- **DriverPingBack** Contains information about the previous driver and system state. -- **DriverRecoveryIds** The list of identifiers that could be used for uninstalling the drivers if a recovery is required. -- **EventInstanceID** A globally unique identifier for event instance. -- **EventScenario** Indicates the purpose of the event (scan started, succeeded, failed, etc.). -- **EventType** Event type (Child, Bundle, Release, or Driver). -- **ExtendedStatusCode** Secondary status code for certain scenarios where StatusCode is not specific enough. -- **FeatureUpdatePause** Indicates whether feature OS updates are paused on the device. -- **FlightBuildNumber** Indicates the build number of the flight. -- **FlightId** The specific ID of the flight the device is getting. -- **HandlerType** Indicates the kind of content (app, driver, windows patch, etc.). -- **HardwareId** If this download was for a driver targeted to a particular device model, this ID indicates the model of the device. -- **IsFinalOutcomeEvent** Indicates whether this event signals the end of the update/upgrade process. -- **IsFirmware** Indicates whether an update was a firmware update. -- **IsSuccessFailurePostReboot** Indicates whether an initial success was a failure after a reboot. -- **IsWUfBDualScanEnabled** Flag indicating whether WU-for-Business dual scan is enabled on the device. -- **IsWUfBEnabled** Flag indicating whether WU-for-Business is enabled on the device. -- **MergedUpdate** Indicates whether an OS update and a BSP update were merged for install. -- **ProcessName** Process name of the caller who initiated API calls into the software distribution client. -- **QualityUpdatePause** Indicates whether quality OS updates are paused on the device. -- **RelatedCV** The previous correlation vector that was used by the client before swapping with a new one. -- **RepeatFailCount** Indicates whether this specific piece of content has previously failed. -- **RevisionNumber** Identifies the revision number of this specific piece of content. -- **ServiceGuid** Identifier for the service to which the software distribution client is connecting (Windows Update, Windows Store, etc.). -- **StatusCode** Result code of the event (success, cancellation, failure code HResult). -- **TargetGroupId** For drivers targeted to a specific device model, this ID indicates the distribution group of devices receiving that driver. -- **TargetingVersion** For drivers targeted to a specific device model, this is the version number of the drivers being distributed to the device. -- **UpdateId** The identifier associated with the specific piece of content. -- **UpdateImportance** Indicates the importance of a driver, and why it received that importance level (0-Unknown, 1-Optional, 2-Important-DNF, 3-Important-Generic, 4-Important-Other, 5-Recommended). -- **UsedSystemVolume** Indicates whether the device's main system storage drive or an alternate storage drive was used. -- **WUDeviceID** Unique device ID controlled by the software distribution client. - - -### SoftwareUpdateClientTelemetry.TaskRun - -Start event for Server Initiated Healing client. See EventScenario field for specifics (for example, started/completed). - -The following fields are available: - -- **CallerApplicationName** Name of application making the Windows Update request. Used to identify context of request. -- **ClientVersion** Version number of the software distribution client. -- **CmdLineArgs** Command line arguments passed in by the caller. -- **EventInstanceID** A globally unique identifier for the event instance. -- **EventScenario** Indicates the purpose of the event (scan started, succeeded, failed, etc.). -- **ServiceGuid** Identifier for the service to which the software distribution client is connecting (Windows Update, Microsoft Store, etc.). -- **StatusCode** Result code of the event (success, cancellation, failure code HResult). -- **WUDeviceID** Unique device ID controlled by the software distribution client. - - -### SoftwareUpdateClientTelemetry.Uninstall - -Uninstall event for target update on Windows Update Client. See EventScenario field for specifics (for example, Started/Failed/Succeeded). - -The following fields are available: - -- **BundleId** The identifier associated with the specific content bundle. This should not be all zeros if the bundleID was found. -- **BundleRepeatFailCount** Indicates whether this particular update bundle previously failed. -- **BundleRevisionNumber** Identifies the revision number of the content bundle. -- **CallerApplicationName** Name of the application making the Windows Update request. Used to identify context of request. -- **ClientVersion** Version number of the software distribution client. -- **CommonProps** A bitmask for future flags associated with the Windows Update client behavior. There is no value being reported in this field right now. Expected value for this field is 0. -- **DriverPingBack** Contains information about the previous driver and system state. -- **DriverRecoveryIds** The list of identifiers that could be used for uninstalling the drivers when a recovery is required. -- **EventInstanceID** A globally unique identifier for event instance. -- **EventScenario** Indicates the purpose of the event (a scan started, succeded, failed, etc.). -- **EventType** Indicates the event type. Possible values are "Child", "Bundle", "Release" or "Driver". -- **ExtendedStatusCode** Secondary status code for certain scenarios where StatusCode is not specific enough. -- **FeatureUpdatePause** Indicates whether feature OS updates are paused on the device. -- **FlightBuildNumber** Indicates the build number of the flight. -- **FlightId** The specific ID of the flight the device is getting. -- **HandlerType** Indicates the kind of content (app, driver, windows patch, etc.). -- **HardwareId** If the download was for a driver targeted to a particular device model, this ID indicates the model of the device. -- **IsFinalOutcomeEvent** Indicates whether this event signals the end of the update/upgrade process. -- **IsFirmware** Indicates whether an update was a firmware update. -- **IsSuccessFailurePostReboot** Indicates whether an initial success was then a failure after a reboot. -- **IsWUfBDualScanEnabled** Flag indicating whether WU-for-Business dual scan is enabled on the device. -- **IsWUfBEnabled** Flag indicating whether WU-for-Business is enabled on the device. -- **MergedUpdate** Indicates whether an OS update and a BSP update were merged for install. -- **ProcessName** Process name of the caller who initiated API calls into the software distribution client. -- **QualityUpdatePause** Indicates whether quality OS updates are paused on the device. -- **RelatedCV** The previous correlation vector that was used by the client before swapping with a new one. -- **RepeatFailCount** Indicates whether this specific piece of content previously failed. -- **RevisionNumber** Identifies the revision number of this specific piece of content. -- **ServiceGuid** Identifier for the service to which the software distribution client is connecting (Windows Update, Windows Store, etc.). -- **StatusCode** Result code of the event (success, cancellation, failure code HResult). -- **TargetGroupId** For drivers targeted to a specific device model, this ID indicates the distribution group of devices receiving that driver. -- **TargetingVersion** For drivers targeted to a specific device model, this is the version number of the drivers being distributed to the device. -- **UpdateId** Identifier associated with the specific piece of content. -- **UpdateImportance** Indicates the importance of a driver and why it received that importance level (0-Unknown, 1-Optional, 2-Important-DNF, 3-Important-Generic, 4-Important-Other, 5-Recommended). -- **UsedSystemVolume** Indicates whether the device’s main system storage drive or an alternate storage drive was used. -- **WUDeviceID** Unique device ID controlled by the software distribution client. - - -### SoftwareUpdateClientTelemetry.UpdateDetected - -This event sends data about an AppX app that has been updated from the Microsoft Store, including what app needs an update and what version/architecture is required, in order to understand and address problems with apps getting required updates. - -The following fields are available: - -- **ApplicableUpdateInfo** Metadata for the updates which were detected as applicable. -- **CallerApplicationName** The name provided by the caller who initiated API calls into the software distribution client. -- **IntentPFNs** Intended application-set metadata for atomic update scenarios. -- **NumberOfApplicableUpdates** The number of updates ultimately deemed applicable to the system after the detection process is complete. -- **RelatedCV** The previous Correlation Vector that was used before swapping with a new one. -- **ServiceGuid** An ID that represents which service the software distribution client is connecting to (Windows Update, Microsoft Store, etc.). -- **WUDeviceID** The unique device ID controlled by the software distribution client. - - -### SoftwareUpdateClientTelemetry.UpdateMetadataIntegrity - -Ensures Windows Updates are secure and complete. Event helps to identify whether update content has been tampered with and protects against man-in-the-middle attack. - -The following fields are available: - -- **CallerApplicationName** Name of application making the Windows Update request. Used to identify context of request. -- **EndpointUrl** The endpoint URL where the device obtains update metadata. This is used to distinguish between test, staging, and production environments. -- **EventScenario** The purpose of this event, such as scan started, scan succeeded, or scan failed. -- **ExtendedStatusCode** The secondary status code of the event. -- **LeafCertId** The integral ID from the FragmentSigning data for the certificate that failed. -- **ListOfSHA256OfIntermediateCerData** A semicolon delimited list of base64 encoding of hashes for the Base64CerData in the FragmentSigning data of an intermediate certificate. -- **MetadataIntegrityMode** The mode of the transport metadata integrity check. 0 = unknown; 1 = ignore; 2 = audit; 3 = enforce -- **MetadataSignature** A base64-encoded string of the signature associated with the update metadata (specified by revision ID). -- **RawMode** The raw unparsed mode string from the SLS response. This field is null if not applicable. -- **RawValidityWindowInDays** The raw unparsed validity window string in days of the timestamp token. This field is null if not applicable. -- **RevisionId** The revision ID for a specific piece of content. -- **RevisionNumber** The revision number for a specific piece of content. -- **ServiceGuid** Identifies the service to which the software distribution client is connected, Example: Windows Update or Microsoft Store -- **SHA256OfLeafCerData** A base64 encoding of the hash for the Base64CerData in the FragmentSigning data of the leaf certificate. -- **SHA256OfLeafCertPublicKey** A base64 encoding of the hash of the Base64CertData in the FragmentSigning data of the leaf certificate. -- **SHA256OfTimestampToken** An encoded string of the timestamp token. -- **SignatureAlgorithm** The hash algorithm for the metadata signature. -- **SLSPrograms** A test program to which a device may have opted in. Example: Insider Fast -- **StatusCode** The status code of the event. -- **TimestampTokenCertThumbprint** The thumbprint of the encoded timestamp token. -- **TimestampTokenId** The time this was created. It is encoded in a timestamp blob and will be zero if the token is malformed. -- **UpdateId** The update ID for a specific piece of content. -- **ValidityWindowInDays** The validity window that's in effect when verifying the timestamp. - - -## System Resource Usage Monitor events - -### Microsoft.Windows.Srum.Sdp.CpuUsage - -This event provides information on CPU usage. - -The following fields are available: - -- **UsageMax** The maximum of hourly average CPU usage. -- **UsageMean** The mean of hourly average CPU usage. -- **UsageMedian** The median of hourly average CPU usage. -- **UsageTwoHourMaxMean** The mean of the maximum of every two hour of hourly average CPU usage. -- **UsageTwoHourMedianMean** The mean of the median of every two hour of hourly average CPU usage. - - -### Microsoft.Windows.Srum.Sdp.NetworkUsage - -This event provides information on network usage. - -The following fields are available: - -- **AdapterGuid** The unique ID of the adapter. -- **BytesTotalMax** The maximum of the hourly average bytes total. -- **BytesTotalMean** The mean of the hourly average bytes total. -- **BytesTotalMedian** The median of the hourly average bytes total. -- **BytesTotalTwoHourMaxMean** The mean of the maximum of every two hours of hourly average bytes total. -- **BytesTotalTwoHourMedianMean** The mean of the median of every two hour of hourly average bytes total. -- **LinkSpeed** The adapter link speed. - - -## Update events - -### Update360Telemetry.Revert - -This event sends data relating to the Revert phase of updating Windows. - -The following fields are available: - -- **ErrorCode** The error code returned for the Revert phase. -- **FlightId** Unique ID for the flight (test instance version). -- **ObjectId** The unique value for each Update Agent mode. -- **RebootRequired** Indicates reboot is required. -- **RelatedCV** The correlation vector value generated from the latest USO (Update Service Orchestrator) scan. -- **Result** The HResult of the event. -- **RevertResult** The result code returned for the Revert operation. -- **ScenarioId** The ID of the update scenario. -- **SessionId** The ID of the update attempt. -- **UpdateId** The ID of the update. - - -### Update360Telemetry.UpdateAgentCommit - -This event collects information regarding the commit phase of the new Unified Update Platform (UUP) update scenario, which is leveraged by both Mobile and Desktop. - -The following fields are available: - -- **ErrorCode** The error code returned for the current install phase. -- **FlightId** Unique ID for each flight. -- **ObjectId** Unique value for each Update Agent mode. -- **RelatedCV** Correlation vector value generated from the latest USO scan. -- **Result** Outcome of the install phase of the update. -- **ScenarioId** Indicates the update scenario. -- **SessionId** Unique value for each update attempt. -- **UpdateId** Unique ID for each update. - - -### Update360Telemetry.UpdateAgentDownloadRequest - -This event sends data for the download request phase of updating Windows via the new Unified Update Platform (UUP) scenario. Applicable to PC and Mobile. - -The following fields are available: - -- **DeletedCorruptFiles** Boolean indicating whether corrupt payload was deleted. -- **DownloadRequests** Number of times a download was retried. -- **ErrorCode** The error code returned for the current download request phase. -- **ExtensionName** Indicates whether the payload is related to Operating System content or a plugin. -- **FlightId** Unique ID for each flight. -- **InternalFailureResult** Indicates a non-fatal error from a plugin. -- **ObjectId** Unique value for each Update Agent mode (same concept as InstanceId for Setup360). -- **PackageCategoriesSkipped** Indicates package categories that were skipped, if applicable. -- **PackageCountOptional** Number of optional packages requested. -- **PackageCountRequired** Number of required packages requested. -- **PackageCountTotal** Total number of packages needed. -- **PackageCountTotalCanonical** Total number of canonical packages. -- **PackageCountTotalDiff** Total number of diff packages. -- **PackageCountTotalExpress** Total number of express packages. -- **PackageExpressType** Type of express package. -- **PackageSizeCanonical** Size of canonical packages in bytes. -- **PackageSizeDiff** Size of diff packages in bytes. -- **PackageSizeExpress** Size of express packages in bytes. -- **RangeRequestState** Indicates the range request type used. -- **RelatedCV** Correlation vector value generated from the latest USO scan. -- **Result** Outcome of the download request phase of update. -- **SandboxTaggedForReserves** The sandbox for reserves. -- **ScenarioId** Indicates the update scenario. -- **SessionId** Unique value for each attempt (same value for initialize, download, install commit phases). -- **UpdateId** Unique ID for each update. - - -### Update360Telemetry.UpdateAgentExpand - -This event collects information regarding the expansion phase of the new Unified Update Platform (UUP) update scenario, which is leveraged by both Mobile and Desktop. - -The following fields are available: - -- **ElapsedTickCount** Time taken for expand phase. -- **EndFreeSpace** Free space after expand phase. -- **EndSandboxSize** Sandbox size after expand phase. -- **ErrorCode** The error code returned for the current install phase. -- **FlightId** Unique ID for each flight. -- **ObjectId** Unique value for each Update Agent mode. -- **RelatedCV** Correlation vector value generated from the latest USO scan. -- **ScenarioId** Indicates the update scenario. -- **SessionId** Unique value for each update attempt. -- **StartFreeSpace** Free space before expand phase. -- **StartSandboxSize** Sandbox size after expand phase. -- **UpdateId** Unique ID for each update. - - -### Update360Telemetry.UpdateAgentFellBackToCanonical - -This event collects information when express could not be used and we fall back to canonical during the new Unified Update Platform (UUP) update scenario, which is leveraged by both Mobile and Desktop. - -The following fields are available: - -- **FlightId** Unique ID for each flight. -- **ObjectId** Unique value for each Update Agent mode. -- **PackageCount** Number of packages that feel back to canonical. -- **PackageList** PackageIds which fell back to canonical. -- **RelatedCV** Correlation vector value generated from the latest USO scan. -- **ScenarioId** Indicates the update scenario. -- **SessionId** Unique value for each update attempt. -- **UpdateId** Unique ID for each update. - - -### Update360Telemetry.UpdateAgentInitialize - -This event sends data for the initialize phase of updating Windows via the new Unified Update Platform (UUP) scenario, which is applicable to both PCs and Mobile. - -The following fields are available: - -- **ErrorCode** The error code returned for the current install phase. -- **FlightId** Unique ID for each flight. -- **FlightMetadata** Contains the FlightId and the build being flighted. -- **ObjectId** Unique value for each Update Agent mode. -- **RelatedCV** Correlation vector value generated from the latest USO scan. -- **Result** Outcome of the install phase of the update. -- **ScenarioId** Indicates the update scenario. -- **SessionData** String containing instructions to update agent for processing FODs and DUICs (Null for other scenarios). -- **SessionId** Unique value for each update attempt. -- **UpdateId** Unique ID for each update. - - -### Update360Telemetry.UpdateAgentInstall - -This event sends data for the install phase of updating Windows. - -The following fields are available: - -- **ErrorCode** The error code returned for the current install phase. -- **ExtensionName** Indicates whether the payload is related to Operating System content or a plugin. -- **FlightId** Unique value for each Update Agent mode (same concept as InstanceId for Setup360). -- **InternalFailureResult** Indicates a non-fatal error from a plugin. -- **ObjectId** Correlation vector value generated from the latest USO scan. -- **RelatedCV** Correlation vector value generated from the latest USO scan. -- **Result** The result for the current install phase. -- **ScenarioId** Indicates the update scenario. -- **SessionId** Unique value for each update attempt. -- **UpdateId** Unique ID for each update. - - -### Update360Telemetry.UpdateAgentMerge - -The UpdateAgentMerge event sends data on the merge phase when updating Windows. - -The following fields are available: - -- **ErrorCode** The error code returned for the current merge phase. -- **FlightId** Unique ID for each flight. -- **MergeId** The unique ID to join two update sessions being merged. -- **ObjectId** Unique value for each Update Agent mode. -- **RelatedCV** Related correlation vector value. -- **Result** Outcome of the merge phase of the update. -- **ScenarioId** Indicates the update scenario. -- **SessionId** Unique value for each attempt. -- **UpdateId** Unique ID for each update. - - -### Update360Telemetry.UpdateAgentMitigationResult - -This event sends data indicating the result of each update agent mitigation. - -The following fields are available: - -- **Applicable** Indicates whether the mitigation is applicable for the current update. -- **CommandCount** The number of command operations in the mitigation entry. -- **CustomCount** The number of custom operations in the mitigation entry. -- **FileCount** The number of file operations in the mitigation entry. -- **FlightId** Unique identifier for each flight. -- **Index** The mitigation index of this particular mitigation. -- **MitigationScenario** The update scenario in which the mitigation was executed. -- **Name** The friendly name of the mitigation. -- **ObjectId** Unique value for each Update Agent mode. -- **OperationIndex** The mitigation operation index (in the event of a failure). -- **OperationName** The friendly name of the mitigation operation (in the event of failure). -- **RegistryCount** The number of registry operations in the mitigation entry. -- **RelatedCV** The correlation vector value generated from the latest USO scan. -- **Result** The HResult of this operation. -- **ScenarioId** The update agent scenario ID. -- **SessionId** Unique value for each update attempt. -- **TimeDiff** The amount of time spent performing the mitigation (in 100-nanosecond increments). -- **UpdateId** Unique ID for each Update. - - -### Update360Telemetry.UpdateAgentMitigationSummary - -This event sends a summary of all the update agent mitigations available for an this update. - -The following fields are available: - -- **Applicable** The count of mitigations that were applicable to the system and scenario. -- **Failed** The count of mitigations that failed. -- **FlightId** Unique identifier for each flight. -- **MitigationScenario** The update scenario in which the mitigations were attempted. -- **ObjectId** The unique value for each Update Agent mode. -- **RelatedCV** The correlation vector value generated from the latest USO scan. -- **Result** The HResult of this operation. -- **ScenarioId** The update agent scenario ID. -- **SessionId** Unique value for each update attempt. -- **TimeDiff** The amount of time spent performing all mitigations (in 100-nanosecond increments). -- **Total** Total number of mitigations that were available. -- **UpdateId** Unique ID for each update. - - -### Update360Telemetry.UpdateAgentModeStart - -This event sends data for the start of each mode during the process of updating Windows via the new Unified Update Platform (UUP) scenario. Applicable to both PCs and Mobile. - -The following fields are available: - -- **FlightId** Unique ID for each flight. -- **Mode** Indicates the mode that has started. -- **ObjectId** Unique value for each Update Agent mode. -- **RelatedCV** Correlation vector value generated from the latest USO scan. -- **ScenarioId** Indicates the update scenario. -- **SessionId** Unique value for each update attempt. -- **UpdateId** Unique ID for each update. -- **Version** Version of update - - -### Update360Telemetry.UpdateAgentOneSettings - -This event collects information regarding the post reboot phase of the new UUP (Unified Update Platform) update scenario; which is leveraged by both Mobile and Desktop. - -The following fields are available: - -- **Count** The count of applicable OneSettings for the device. -- **FlightId** Unique ID for the flight (test instance version). -- **ObjectId** The unique value for each Update Agent mode. -- **Parameters** The set of name value pair parameters sent to OneSettings to determine if there are any applicable OneSettings. -- **RelatedCV** The correlation vector value generated from the latest USO (Update Service Orchestrator) scan. -- **Result** The HResult of the event. -- **ScenarioId** The ID of the update scenario. -- **SessionId** The ID of the update attempt. -- **UpdateId** The ID of the update. -- **Values** The values sent back to the device, if applicable. - - -### Update360Telemetry.UpdateAgentPostRebootResult - -This event collects information for both Mobile and Desktop regarding the post reboot phase of the new Unified Update Platform (UUP) update scenario. - -The following fields are available: - -- **ErrorCode** The error code returned for the current post reboot phase. -- **FlightId** The specific ID of the Windows Insider build the device is getting. -- **ObjectId** Unique value for each Update Agent mode. -- **PostRebootResult** Indicates the Hresult. -- **RelatedCV** Correlation vector value generated from the latest USO scan. -- **ScenarioId** The scenario ID. Example: MobileUpdate, DesktopLanguagePack, DesktopFeatureOnDemand, or DesktopDriverUpdate. -- **SessionId** Unique value for each update attempt. -- **UpdateId** Unique ID for each update. - - -### Update360Telemetry.UpdateAgentReboot - -This event sends information indicating that a request has been sent to suspend an update. - -The following fields are available: - -- **ErrorCode** The error code returned for the current reboot. -- **FlightId** Unique ID for the flight (test instance version). -- **ObjectId** The unique value for each Update Agent mode. -- **RelatedCV** The correlation vector value generated from the latest USO (Update Service Orchestrator) scan. -- **Result** The HResult of the event. -- **ScenarioId** The ID of the update scenario. -- **SessionId** The ID of the update attempt. -- **UpdateId** The ID of the update. - - -### Update360Telemetry.UpdateAgentSetupBoxLaunch - -The UpdateAgent_SetupBoxLaunch event sends data for the launching of the setup box when updating Windows via the new Unified Update Platform (UUP) scenario. This event is only applicable to PCs. - -The following fields are available: - -- **ContainsExpressPackage** Indicates whether the download package is express. -- **FlightId** Unique ID for each flight. -- **FreeSpace** Free space on OS partition. -- **InstallCount** Number of install attempts using the same sandbox. -- **ObjectId** Unique value for each Update Agent mode. -- **Quiet** Indicates whether setup is running in quiet mode. -- **RelatedCV** Correlation vector value generated from the latest USO scan. -- **SandboxSize** Size of the sandbox. -- **ScenarioId** Indicates the update scenario. -- **SessionId** Unique value for each update attempt. -- **SetupMode** Mode of setup to be launched. -- **UpdateId** Unique ID for each Update. -- **UserSession** Indicates whether install was invoked by user actions. - - -## Update notification events - -### Microsoft.Windows.UpdateNotificationPipeline.UNPCampaignManagerHeartbeat - -This event is sent at the start of the CampaignManager event and is intended to be used as a heartbeat. - -The following fields are available: - -- **CampaignConfigVersion** Configuration version for the current campaign. -- **CampaignID** Currently campaign that is running on Update Notification Pipeline (UNP). -- **ConfigCatalogVersion** Current catalog version of UNP. -- **ContentVersion** Content version for the current campaign on UNP. -- **CV** Correlation vector. -- **DetectorVersion** Most recently run detector version for the current campaign on UNP. -- **GlobalEventCounter** Client-side counter that indicates the event ordering sent by the user. -- **PackageVersion** Current UNP package version. - - -## Upgrade events - -### FacilitatorTelemetry.DCATDownload - -This event indicates whether devices received additional or critical supplemental content during an OS Upgrade, to help keep Windows up-to-date and secure. - -The following fields are available: - -- **DownloadSize** Download size of payload. -- **ElapsedTime** Time taken to download payload. -- **MediaFallbackUsed** Used to determine if we used Media CompDBs to figure out package requirements for the upgrade. -- **ResultCode** Result returned by the Facilitator DCAT call. -- **Scenario** Dynamic update scenario (Image DU, or Setup DU). -- **Type** Type of package that was downloaded. -- **UpdateId** The ID of the update that was downloaded. - - -### FacilitatorTelemetry.DUDownload - -This event returns data about the download of supplemental packages critical to upgrading a device to the next version of Windows. - -The following fields are available: - -- **DownloadRequestAttributes** The attributes sent for download. -- **PackageCategoriesFailed** Lists the categories of packages that failed to download. -- **PackageCategoriesSkipped** Lists the categories of package downloads that were skipped. -- **ResultCode** The result of the event execution. -- **Scenario** Identifies the active Download scenario. -- **Url** The URL the download request was sent to. -- **Version** Identifies the version of Facilitator used. - - -### FacilitatorTelemetry.InitializeDU - -This event determines whether devices received additional or critical supplemental content during an OS upgrade. - -The following fields are available: - -- **DCATUrl** The Delivery Catalog (DCAT) URL we send the request to. -- **DownloadRequestAttributes** The attributes we send to DCAT. -- **ResultCode** The result returned from the initiation of Facilitator with the URL/attributes. -- **Scenario** Dynamic Update scenario (Image DU, or Setup DU). -- **Url** The Delivery Catalog (DCAT) URL we send the request to. -- **Version** Version of Facilitator. - - -### Setup360Telemetry.Downlevel - -This event sends data indicating that the device has started the downlevel phase of the upgrade, to help keep Windows up-to-date and secure. - -The following fields are available: - -- **ClientId** If using Windows Update, this will be the Windows Update client ID that is passed to Setup. In Media setup, the default value is Media360, but it can be overwritten by the caller to a unique value. -- **FlightData** Unique value that identifies the flight. -- **HostOSBuildNumber** The build number of the downlevel OS. -- **HostOsSkuName** The operating system edition which is running Setup360 instance (downlevel OS). -- **InstanceId** A unique GUID that identifies each instance of setuphost.exe. -- **ReportId** In the Windows Update scenario, this is the updateID that is passed to Setup. In media setup, this is the GUID for the install.wim. -- **Setup360Extended** More detailed information about phase/action when the potential failure occurred. -- **Setup360Mode** The phase of Setup360 (for example, Predownload, Install, Finalize, Rollback). -- **Setup360Result** The result of Setup360 (HRESULT used to diagnose errors). -- **Setup360Scenario** The Setup360 flow type (for example, Boot, Media, Update, MCT). -- **SetupVersionBuildNumber** The build number of Setup360 (build number of the target OS). -- **State** Exit state of given Setup360 run. Example: succeeded, failed, blocked, cancelled. -- **TestId** An ID that uniquely identifies a group of events. -- **WuId** This is the Windows Update Client ID. In the Windows Update scenario, this is the same as the clientId. - - -### Setup360Telemetry.Finalize - -This event sends data indicating that the device has started the phase of finalizing the upgrade, to help keep Windows up-to-date and secure. - -The following fields are available: - -- **ClientId** With Windows Update, this will be the Windows Update client ID that is passed to Setup. In Media setup, default value is Media360, but can be overwritten by the caller to a unique value. -- **FlightData** Unique value that identifies the flight. -- **HostOSBuildNumber** The build number of the previous OS. -- **HostOsSkuName** The OS edition which is running Setup360 instance (previous OS). -- **InstanceId** A unique GUID that identifies each instance of setuphost.exe -- **ReportId** With Windows Update, this is the updateID that is passed to Setup. In media setup, this is the GUID for the install.wim. -- **Setup360Extended** More detailed information about the phase/action when the potential failure occurred. -- **Setup360Mode** The phase of Setup360. Example: Predownload, Install, Finalize, Rollback. -- **Setup360Result** The result of Setup360. This is an HRESULT error code that is used to diagnose errors. -- **Setup360Scenario** The Setup360 flow type. Example: Boot, Media, Update, MCT. -- **SetupVersionBuildNumber** The build number of Setup360 (build number of target OS). -- **State** The exit state of a Setup360 run. Example: succeeded, failed, blocked, cancelled. -- **TestId** ID that uniquely identifies a group of events. -- **WuId** This is the Windows Update Client ID. With Windows Update, this is the same as the clientId. - - -### Setup360Telemetry.OsUninstall - -This event sends data regarding OS updates and upgrades from Windows 7, Windows 8, and Windows 10. Specifically, it indicates the outcome of an OS uninstall. - -The following fields are available: - -- **ClientId** For Windows Update, this will be the Windows Update client ID that is passed to Setup. In Media setup, default value is Media360, but can be overwritten by the caller to a unique value. -- **FlightData** Unique value that identifies the flight. -- **HostOSBuildNumber** The build number of the previous OS. -- **HostOsSkuName** The OS edition which is running the Setup360 instance (previous OS). -- **InstanceId** A unique GUID that identifies each instance of setuphost.exe. -- **ReportId** For Windows Update, this will be the Windows Update client ID that is passed to Setup. In Media setup, this is the GUID for the install.wim. -- **Setup360Extended** Detailed information about the phase or action when the potential failure occurred. -- **Setup360Mode** The phase of Setup360. Example: Predownload, Install, Finalize, Rollback. -- **Setup360Result** The result of Setup360. This is an HRESULT error code that is used to diagnose errors. -- **Setup360Scenario** The Setup360 flow type. Example: Boot, Media, Update, MCT -- **SetupVersionBuildNumber** The build number of Setup360 (build number of target OS). -- **State** Exit state of a Setup360 run. Example: succeeded, failed, blocked, cancelled. -- **TestId** ID that uniquely identifies a group of events. -- **WuId** Windows Update client ID. - - -### Setup360Telemetry.PostRebootInstall - -This event sends data indicating that the device has invoked the post reboot install phase of the upgrade, to help keep Windows up-to-date. - -The following fields are available: - -- **ClientId** With Windows Update, this is the Windows Update client ID that is passed to Setup. In Media setup, the default value is Media360, but can be overwritten by the caller to a unique value. -- **FlightData** Unique value that identifies the flight. -- **HostOSBuildNumber** The build number of the previous OS. -- **HostOsSkuName** The OS edition which is running Setup360 instance (previous OS). -- **InstanceId** A unique GUID that identifies each instance of setuphost.exe. -- **ReportId** With Windows Update, this is the updateID that is passed to Setup. In media setup, this is the GUID for the install.wim. -- **Setup360Extended** Extension of result - more granular information about phase/action when the potential failure happened -- **Setup360Mode** The phase of Setup360. Example: Predownload, Install, Finalize, Rollback -- **Setup360Result** The result of Setup360. This is an HRESULT error code that's used to diagnose errors. -- **Setup360Scenario** The Setup360 flow type. Example: Boot, Media, Update, MCT -- **SetupVersionBuildNumber** The build number of Setup360 (build number of target OS). -- **State** The exit state of a Setup360 run. Example: succeeded, failed, blocked, cancelled -- **TestId** A string to uniquely identify a group of events. -- **WuId** This is the Windows Update Client ID. With Windows Update, this is the same as ClientId. - - -### Setup360Telemetry.PreDownloadQuiet - -This event sends data indicating that the device has invoked the predownload quiet phase of the upgrade, to help keep Windows up to date. - -The following fields are available: - -- **ClientId** Using Windows Update, this will be the Windows Update client ID that is passed to Setup. In Media setup, default value is Media360, but can be overwritten by the caller to a unique value. -- **FlightData** Unique value that identifies the flight. -- **HostOSBuildNumber** The build number of the previous OS. -- **HostOsSkuName** The OS edition which is running Setup360 instance (previous operating system). -- **InstanceId** A unique GUID that identifies each instance of setuphost.exe. -- **ReportId** Using Windows Update, this is the updateID that is passed to Setup. In media setup, this is the GUID for the install.wim. -- **Setup360Extended** Detailed information about the phase/action when the potential failure occurred. -- **Setup360Mode** The phase of Setup360. Example: Predownload, Install, Finalize, Rollback. -- **Setup360Result** The result of Setup360. This is an HRESULT error code that is used to diagnose errors. -- **Setup360Scenario** The Setup360 flow type. Example: Boot, Media, Update, MCT. -- **SetupVersionBuildNumber** The build number of Setup360 (build number of target OS). -- **State** The exit state of a Setup360 run. Example: succeeded, failed, blocked, canceled. -- **TestId** ID that uniquely identifies a group of events. -- **WuId** This is the Windows Update Client ID. Using Windows Update, this is the same as the clientId. - - -### Setup360Telemetry.PreDownloadUX - -This event sends data regarding OS Updates and Upgrades from Windows 7.X, Windows 8.X, Windows 10 and RS, to help keep Windows up-to-date and secure. Specifically, it indicates the outcome of the PredownloadUX portion of the update process. - -The following fields are available: - -- **ClientId** For Windows Update, this will be the Windows Update client ID that is passed to Setup. In Media setup, default value is Media360, but can be overwritten by the caller to a unique value. -- **FlightData** In the WU scenario, this will be the WU client ID that is passed to Setup. In Media setup, default value is Media360, but can be overwritten by the caller to a unique value. -- **HostOSBuildNumber** The build number of the previous operating system. -- **HostOsSkuName** The OS edition which is running the Setup360 instance (previous operating system). -- **InstanceId** Unique GUID that identifies each instance of setuphost.exe. -- **ReportId** For Windows Update, this will be the Windows Update client ID that is passed to Setup. In Media setup, this is the GUID for the install.wim. -- **Setup360Extended** Detailed information about the phase/action when the potential failure occurred. -- **Setup360Mode** The phase of Setup360. Example: Predownload, Install, Finalize, Rollback. -- **Setup360Result** The result of Setup360. This is an HRESULT error code that can be used to diagnose errors. -- **Setup360Scenario** The Setup360 flow type. Example: Boot, Media, Update, MCT. -- **SetupVersionBuildNumber** The build number of Setup360 (build number of the target OS). -- **State** The exit state of the Setup360 run. Example: succeeded, failed, blocked, cancelled. -- **TestId** ID that uniquely identifies a group of events. -- **WuId** Windows Update client ID. - - -### Setup360Telemetry.PreInstallQuiet - -This event sends data indicating that the device has invoked the preinstall quiet phase of the upgrade, to help keep Windows up-to-date. - -The following fields are available: - -- **ClientId** With Windows Update, this will be the Windows Update client ID that is passed to Setup. In Media setup, default value is Media360, but can be overwritten by the caller to a unique value. -- **FlightData** Unique value that identifies the flight. -- **HostOSBuildNumber** The build number of the previous OS. -- **HostOsSkuName** The OS edition which is running Setup360 instance (previous OS). -- **InstanceId** A unique GUID that identifies each instance of setuphost.exe -- **ReportId** With Windows Update, this is the updateID that is passed to Setup. In media setup, this is the GUID for the install.wim. -- **Setup360Extended** Detailed information about the phase/action when the potential failure occurred. -- **Setup360Mode** The phase of Setup360. Example: Predownload, Install, Finalize, Rollback. -- **Setup360Result** The result of Setup360. This is an HRESULT error code that can be used to diagnose errors. -- **Setup360Scenario** Setup360 flow type (Boot, Media, Update, MCT). -- **SetupVersionBuildNumber** The build number of Setup360 (build number of target OS). -- **State** The exit state of a Setup360 run. Example: succeeded, failed, blocked, cancelled. -- **TestId** A string to uniquely identify a group of events. -- **WuId** This is the Windows Update Client ID. With Windows Update, this is the same as the clientId. - - -### Setup360Telemetry.PreInstallUX - -This event sends data regarding OS updates and upgrades from Windows 7, Windows 8, and Windows 10, to help keep Windows up-to-date. Specifically, it indicates the outcome of the PreinstallUX portion of the update process. - -The following fields are available: - -- **ClientId** For Windows Update, this will be the Windows Update client ID that is passed to Setup. In Media setup, default value is Media360, but can be overwritten by the caller to a unique value. -- **FlightData** Unique value that identifies the flight. -- **HostOSBuildNumber** The build number of the previous OS. -- **HostOsSkuName** The OS edition which is running the Setup360 instance (previous OS). -- **InstanceId** A unique GUID that identifies each instance of setuphost.exe. -- **ReportId** For Windows Update, this will be the Windows Update client ID that is passed to Setup. In Media setup, this is the GUID for the install.wim. -- **Setup360Extended** Detailed information about the phase/action when the potential failure occurred. -- **Setup360Mode** The phase of Setup360. Example: Predownload, Install, Finalize, Rollback. -- **Setup360Result** The result of Setup360. This is an HRESULT error code that is used to diagnose errors. -- **Setup360Scenario** The Setup360 flow type, Example: Boot, Media, Update, MCT. -- **SetupVersionBuildNumber** The build number of Setup360 (build number of target OS). -- **State** The exit state of a Setup360 run. Example: succeeded, failed, blocked, cancelled. -- **TestId** A string to uniquely identify a group of events. -- **WuId** Windows Update client ID. - - -### Setup360Telemetry.Setup360 - -This event sends data about OS deployment scenarios, to help keep Windows up-to-date. - -The following fields are available: - -- **ClientId** Retrieves the upgrade ID. In the Windows Update scenario, this will be the Windows Update client ID. In Media setup, default value is Media360, but can be overwritten by the caller to a unique value. -- **FieldName** Retrieves the data point. -- **FlightData** Specifies a unique identifier for each group of Windows Insider builds. -- **InstanceId** Retrieves a unique identifier for each instance of a setup session. -- **ReportId** Retrieves the report ID. -- **ScenarioId** Retrieves the deployment scenario. -- **Value** Retrieves the value associated with the corresponding FieldName. - - -### Setup360Telemetry.Setup360DynamicUpdate - -This event helps determine whether the device received supplemental content during an operating system upgrade, to help keep Windows up-to-date. - -The following fields are available: - -- **FlightData** Specifies a unique identifier for each group of Windows Insider builds. -- **InstanceId** Retrieves a unique identifier for each instance of a setup session. -- **Operation** Facilitator’s last known operation (scan, download, etc.). -- **ReportId** ID for tying together events stream side. -- **ResultCode** Result returned for the entire setup operation. -- **Scenario** Dynamic Update scenario (Image DU, or Setup DU). -- **ScenarioId** Identifies the update scenario. -- **TargetBranch** Branch of the target OS. -- **TargetBuild** Build of the target OS. - - -### Setup360Telemetry.Setup360MitigationResult - -This event sends data indicating the result of each setup mitigation. - -The following fields are available: - -- **Applicable** TRUE if the mitigation is applicable for the current update. -- **ClientId** In the Windows Update scenario, this is the client ID passed to Setup. In Media setup, default value is Media360, but can be overwritten by the caller to a unique value. -- **CommandCount** The number of command operations in the mitigation entry. -- **CustomCount** The number of custom operations in the mitigation entry. -- **FileCount** The number of file operations in the mitigation entry. -- **FlightData** The unique identifier for each flight (test release). -- **Index** The mitigation index of this particular mitigation. -- **InstanceId** The GUID (Globally Unique ID) that identifies each instance of SetupHost.EXE. -- **MitigationScenario** The update scenario in which the mitigation was executed. -- **Name** The friendly (descriptive) name of the mitigation. -- **OperationIndex** The mitigation operation index (in the event of a failure). -- **OperationName** The friendly (descriptive) name of the mitigation operation (in the event of failure). -- **RegistryCount** The number of registry operations in the mitigation entry. -- **ReportId** In the Windows Update scenario, the Update ID that is passed to Setup. In media setup, this is the GUID for the INSTALL.WIM. -- **Result** HResult of this operation. -- **ScenarioId** Setup360 flow type. -- **TimeDiff** The amount of time spent performing the mitigation (in 100-nanosecond increments). - - -### Setup360Telemetry.Setup360MitigationSummary - -This event sends a summary of all the setup mitigations available for this update. - -The following fields are available: - -- **Applicable** The count of mitigations that were applicable to the system and scenario. -- **ClientId** The Windows Update client ID passed to Setup. -- **Failed** The count of mitigations that failed. -- **FlightData** The unique identifier for each flight (test release). -- **InstanceId** The GUID (Globally Unique ID) that identifies each instance of SetupHost.EXE. -- **MitigationScenario** The update scenario in which the mitigations were attempted. -- **ReportId** In the Windows Update scenario, the Update ID that is passed to Setup. In media setup, this is the GUID for the INSTALL.WIM. -- **Result** HResult of this operation. -- **ScenarioId** Setup360 flow type. -- **TimeDiff** The amount of time spent performing the mitigation (in 100-nanosecond increments). -- **Total** The total number of mitigations that were available. - - -### Setup360Telemetry.Setup360OneSettings - -This event collects information regarding the post reboot phase of the new UUP (Unified Update Platform) update scenario; which is leveraged by both Mobile and Desktop. - -The following fields are available: - -- **ClientId** The Windows Update client ID passed to Setup. -- **Count** The count of applicable OneSettings for the device. -- **FlightData** The ID for the flight (test instance version). -- **InstanceId** The GUID (Globally-Unique ID) that identifies each instance of setuphost.exe. -- **Parameters** The set of name value pair parameters sent to OneSettings to determine if there are any applicable OneSettings. -- **ReportId** The Update ID passed to Setup. -- **Result** The HResult of the event error. -- **ScenarioId** The update scenario ID. -- **Values** Values sent back to the device, if applicable. - - -### Setup360Telemetry.UnexpectedEvent - -This event sends data indicating that the device has invoked the unexpected event phase of the upgrade, to help keep Windows up to date. - -The following fields are available: - -- **ClientId** With Windows Update, this will be the Windows Update client ID that is passed to Setup. In Media setup, default value is Media360, but can be overwritten by the caller to a unique value. -- **FlightData** Unique value that identifies the flight. -- **HostOSBuildNumber** The build number of the previous OS. -- **HostOsSkuName** The OS edition which is running Setup360 instance (previous OS). -- **InstanceId** A unique GUID that identifies each instance of setuphost.exe -- **ReportId** With Windows Update, this is the updateID that is passed to Setup. In media setup, this is the GUID for the install.wim. -- **Setup360Extended** Detailed information about the phase/action when the potential failure occurred. -- **Setup360Mode** The phase of Setup360. Example: Predownload, Install, Finalize, Rollback. -- **Setup360Result** The result of Setup360. This is an HRESULT error code that can be used used to diagnose errors. -- **Setup360Scenario** The Setup360 flow type. Example: Boot, Media, Update, MCT. -- **SetupVersionBuildNumber** The build number of Setup360 (build number of target OS). -- **State** The exit state of a Setup360 run. Example: succeeded, failed, blocked, cancelled. -- **TestId** A string to uniquely identify a group of events. -- **WuId** This is the Windows Update Client ID. With Windows Update, this is the same as the clientId. - - -## Windows as a Service diagnostic events - -### Microsoft.Windows.WaaSMedic.SummaryEvent - -Result of the WaaSMedic operation. - -The following fields are available: - -- **callerApplication** The name of the calling application. -- **detectionSummary** Result of each applicable detection that was run. -- **featureAssessmentImpact** WaaS Assessment impact for feature updates. -- **hrEngineResult** Error code from the engine operation. -- **insufficientSessions** Device not eligible for diagnostics. -- **isInteractiveMode** The user started a run of WaaSMedic. -- **isManaged** Device is managed for updates. -- **isWUConnected** Device is connected to Windows Update. -- **noMoreActions** No more applicable diagnostics. -- **qualityAssessmentImpact** WaaS Assessment impact for quality updates. -- **remediationSummary** Result of each operation performed on a device to fix an invalid state or configuration that's preventing the device from getting updates. For example, if Windows Update service is turned off, the fix is to turn the it back on. -- **usingBackupFeatureAssessment** Relying on backup feature assessment. -- **usingBackupQualityAssessment** Relying on backup quality assessment. -- **usingCachedFeatureAssessment** WaaS Medic run did not get OS build age from the network on the previous run. -- **usingCachedQualityAssessment** WaaS Medic run did not get OS revision age from the network on the previous run. -- **versionString** Version of the WaaSMedic engine. -- **waasMedicRunMode** Indicates whether this was a background regular run of the medic or whether it was triggered by a user launching Windows Update Troubleshooter. - - -## Windows Error Reporting events - -### Microsoft.Windows.WERVertical.OSCrash - -This event sends binary data from the collected dump file wheneveer a bug check occurs, to help keep Windows up to date. The is the OneCore version of this event. - -The following fields are available: - -- **BootId** Uint32 identifying the boot number for this device. -- **BugCheckCode** Uint64 "bugcheck code" that identifies a proximate cause of the bug check. -- **BugCheckParameter1** Uint64 parameter providing additional information. -- **BugCheckParameter2** Uint64 parameter providing additional information. -- **BugCheckParameter3** Uint64 parameter providing additional information. -- **BugCheckParameter4** Uint64 parameter providing additional information. -- **DumpFileAttributes** Codes that identify the type of data contained in the dump file -- **DumpFileSize** Size of the dump file -- **IsValidDumpFile** True if the dump file is valid for the debugger, false otherwise -- **ReportId** WER Report Id associated with this bug check (used for finding the corresponding report archive in Watson). - - -## Windows Error Reporting MTT events - -### Microsoft.Windows.WER.MTT.Denominator - -This event provides a denominator to calculate MTTF (mean-time-to-failure) for crashes and other errors, to help keep Windows up to date. - -The following fields are available: - -- **DPRange** Maximum mean value range. -- **DPValue** Randomized bit value (0 or 1) that can be reconstituted over a large population to estimate the mean. -- **Value** Standard UTC emitted DP value structure See [Value](#value). - - -### Value - -This event returns data about Mean Time to Failure (MTTF) for Windows devices. It is the primary means of estimating reliability problems in Basic Diagnostic reporting with very strong privacy guarantees. Since Basic Diagnostic reporting does not include system up-time, and since that information is important to ensuring the safe and stable operation of Windows, the data provided by this event provides that data in a manner which does not threaten a user’s privacy. - -The following fields are available: - -- **Algorithm** The algorithm used to preserve privacy. -- **DPRange** The upper bound of the range being measured. -- **DPValue** The randomized response returned by the client. -- **Epsilon** The level of privacy to be applied. -- **HistType** The histogram type if the algorithm is a histogram algorithm. -- **PertProb** The probability the entry will be Perturbed if the algorithm chosen is “heavy-hitters”. - - -## Windows Store events - -### Microsoft.Windows.Store.StoreActivating - -This event sends tracking data about when the Store app activation via protocol URI is in progress, to help keep Windows up to date. - - - -### Microsoft.Windows.StoreAgent.Telemetry.AbortedInstallation - -This event is sent when an installation or update is canceled by a user or the system and is used to help keep Windows Apps up to date and secure. - -The following fields are available: - -- **AggregatedPackageFullNames** The names of all packages to be downloaded and installed. -- **AttemptNumber** Number of retry attempts before it was canceled. -- **BundleId** The Item Bundle ID. -- **CategoryId** The Item Category ID. -- **ClientAppId** The identity of the app that initiated this operation. -- **HResult** The result code of the last action performed before this operation. -- **IsBundle** Is this a bundle? -- **IsInteractive** Was this requested by a user? -- **IsMandatory** Was this a mandatory update? -- **IsRemediation** Was this a remediation install? -- **IsRestore** Is this automatically restoring a previously acquired product? -- **IsUpdate** Flag indicating if this is an update. -- **ParentBundleId** The product ID of the parent (if this product is part of a bundle). -- **PFN** The product family name of the product being installed. -- **ProductId** The identity of the package or packages being installed. -- **SystemAttemptNumber** The total number of automatic attempts at installation before it was canceled. -- **UserAttemptNumber** The total number of user attempts at installation before it was canceled. -- **WUContentId** The Windows Update content ID. - - -### Microsoft.Windows.StoreAgent.Telemetry.BeginGetInstalledContentIds - -This event is sent when an inventory of the apps installed is started to determine whether updates for those apps are available. It's used to help keep Windows up-to-date and secure. - - - -### Microsoft.Windows.StoreAgent.Telemetry.BeginUpdateMetadataPrepare - -This event is sent when the Store Agent cache is refreshed with any available package updates. It's used to help keep Windows up-to-date and secure. - - - -### Microsoft.Windows.StoreAgent.Telemetry.CancelInstallation - -This event is sent when an app update or installation is canceled while in interactive mode. This can be canceled by the user or the system. It's used to help keep Windows up-to-date and secure. - -The following fields are available: - -- **AggregatedPackageFullNames** The names of all package or packages to be downloaded and installed. -- **AttemptNumber** Total number of installation attempts. -- **BundleId** The identity of the Windows Insider build that is associated with this product. -- **CategoryId** The identity of the package or packages being installed. -- **ClientAppId** The identity of the app that initiated this operation. -- **IsBundle** Is this a bundle? -- **IsInteractive** Was this requested by a user? -- **IsMandatory** Is this a mandatory update? -- **IsRemediation** Is this repairing a previous installation? -- **IsRestore** Is this an automatic restore of a previously acquired product? -- **IsUpdate** Is this a product update? -- **ParentBundleId** The product ID of the parent (if this product is part of a bundle). -- **PFN** The name of all packages to be downloaded and installed. -- **PreviousHResult** The previous HResult code. -- **PreviousInstallState** Previous installation state before it was canceled. -- **ProductId** The name of the package or packages requested for installation. -- **RelatedCV** Correlation Vector of a previous performed action on this product. -- **SystemAttemptNumber** Total number of automatic attempts to install before it was canceled. -- **UserAttemptNumber** Total number of user attempts to install before it was canceled. -- **WUContentId** The Windows Update content ID. - - -### Microsoft.Windows.StoreAgent.Telemetry.CompleteInstallOperationRequest - -This event is sent at the end of app installations or updates to help keep Windows up-to-date and secure. - -The following fields are available: - -- **CatalogId** The Store Product ID of the app being installed. -- **HResult** HResult code of the action being performed. -- **IsBundle** Is this a bundle? -- **PackageFamilyName** The name of the package being installed. -- **ProductId** The Store Product ID of the product being installed. -- **SkuId** Specific edition of the item being installed. - - -### Microsoft.Windows.StoreAgent.Telemetry.EndAcquireLicense - -This event is sent after the license is acquired when a product is being installed. It's used to help keep Windows up-to-date and secure. - -The following fields are available: - -- **AggregatedPackageFullNames** Includes a set of package full names for each app that is part of an atomic set. -- **AttemptNumber** The total number of attempts to acquire this product. -- **CategoryId** The identity of the package or packages being installed. -- **ClientAppId** The identity of the app that initiated this operation. -- **HResult** HResult code to show the result of the operation (success/failure). -- **IsBundle** Is this a bundle? -- **IsInteractive** Did the user initiate the installation? -- **IsMandatory** Is this a mandatory update? -- **IsRemediation** Is this repairing a previous installation? -- **IsRestore** Is this happening after a device restore? -- **IsUpdate** Is this an update? -- **PFN** Product Family Name of the product being installed. -- **ProductId** The Store Product ID for the product being installed. -- **SystemAttemptNumber** The number of attempts by the system to acquire this product. -- **UserAttemptNumber** The number of attempts by the user to acquire this product -- **WUContentId** The Windows Update content ID. - - -### Microsoft.Windows.StoreAgent.Telemetry.EndDownload - -This event is sent after an app is downloaded to help keep Windows up-to-date and secure. - -The following fields are available: - -- **AggregatedPackageFullNames** The name of all packages to be downloaded and installed. -- **AttemptNumber** Number of retry attempts before it was canceled. -- **BundleId** The identity of the Windows Insider build associated with this product. -- **CategoryId** The identity of the package or packages being installed. -- **ClientAppId** The identity of the app that initiated this operation. -- **DownloadSize** The total size of the download. -- **ExtendedHResult** Any extended HResult error codes. -- **HResult** The result code of the last action performed. -- **IsBundle** Is this a bundle? -- **IsInteractive** Is this initiated by the user? -- **IsMandatory** Is this a mandatory installation? -- **IsRemediation** Is this repairing a previous installation? -- **IsRestore** Is this a restore of a previously acquired product? -- **IsUpdate** Is this an update? -- **ParentBundleId** The parent bundle ID (if it's part of a bundle). -- **PFN** The Product Family Name of the app being download. -- **ProductId** The Store Product ID for the product being installed. -- **SystemAttemptNumber** The number of attempts by the system to download. -- **UserAttemptNumber** The number of attempts by the user to download. -- **WUContentId** The Windows Update content ID. - - -### Microsoft.Windows.StoreAgent.Telemetry.EndFrameworkUpdate - -This event is sent when an app update requires an updated Framework package and the process starts to download it. It is used to help keep Windows up-to-date and secure. - -The following fields are available: - -- **HResult** The result code of the last action performed before this operation. - - -### Microsoft.Windows.StoreAgent.Telemetry.EndGetInstalledContentIds - -This event is sent after sending the inventory of the products installed to determine whether updates for those products are available. It's used to help keep Windows up-to-date and secure. - -The following fields are available: - -- **HResult** The result code of the last action performed before this operation. - - -### Microsoft.Windows.StoreAgent.Telemetry.EndInstall - -This event is sent after a product has been installed to help keep Windows up-to-date and secure. - -The following fields are available: - -- **AggregatedPackageFullNames** The names of all packages to be downloaded and installed. -- **AttemptNumber** The number of retry attempts before it was canceled. -- **BundleId** The identity of the build associated with this product. -- **CategoryId** The identity of the package or packages being installed. -- **ClientAppId** The identity of the app that initiated this operation. -- **ExtendedHResult** The extended HResult error code. -- **HResult** The result code of the last action performed. -- **IsBundle** Is this a bundle? -- **IsInteractive** Is this an interactive installation? -- **IsMandatory** Is this a mandatory installation? -- **IsRemediation** Is this repairing a previous installation? -- **IsRestore** Is this automatically restoring a previously acquired product? -- **IsUpdate** Is this an update? -- **ParentBundleId** The product ID of the parent (if this product is part of a bundle). -- **PFN** Product Family Name of the product being installed. -- **ProductId** The Store Product ID for the product being installed. -- **SystemAttemptNumber** The total number of system attempts. -- **UserAttemptNumber** The total number of user attempts. -- **WUContentId** The Windows Update content ID. - - -### Microsoft.Windows.StoreAgent.Telemetry.EndScanForUpdates - -This event is sent after a scan for product updates to determine if there are packages to install. It's used to help keep Windows up-to-date and secure. - -The following fields are available: - -- **ClientAppId** The identity of the app that initiated this operation. -- **HResult** The result code of the last action performed. -- **IsApplicability** Is this request to only check if there are any applicable packages to install? -- **IsInteractive** Is this user requested? -- **IsOnline** Is the request doing an online check? - - -### Microsoft.Windows.StoreAgent.Telemetry.EndSearchUpdatePackages - -This event is sent after searching for update packages to install. It is used to help keep Windows up-to-date and secure. - -The following fields are available: - -- **AggregatedPackageFullNames** The names of all packages to be downloaded and installed. -- **AttemptNumber** The total number of retry attempts before it was canceled. -- **BundleId** The identity of the build associated with this product. -- **CategoryId** The identity of the package or packages being installed. -- **ClientAppId** The identity of the app that initiated this operation. -- **HResult** The result code of the last action performed. -- **IsBundle** Is this a bundle? -- **IsInteractive** Is this user requested? -- **IsMandatory** Is this a mandatory update? -- **IsRemediation** Is this repairing a previous installation? -- **IsRestore** Is this restoring previously acquired content? -- **IsUpdate** Is this an update? -- **ParentBundleId** The product ID of the parent (if this product is part of a bundle). -- **PFN** The name of the package or packages requested for install. -- **ProductId** The Store Product ID for the product being installed. -- **SystemAttemptNumber** The total number of system attempts. -- **UserAttemptNumber** The total number of user attempts. -- **WUContentId** The Windows Update content ID. - - -### Microsoft.Windows.StoreAgent.Telemetry.EndStageUserData - -This event is sent after restoring user data (if any) that needs to be restored following a product install. It is used to keep Windows up-to-date and secure. - -The following fields are available: - -- **AggregatedPackageFullNames** The name of all packages to be downloaded and installed. -- **AttemptNumber** The total number of retry attempts before it was canceled. -- **BundleId** The identity of the build associated with this product. -- **CategoryId** The identity of the package or packages being installed. -- **ClientAppId** The identity of the app that initiated this operation. -- **HResult** The result code of the last action performed. -- **IsBundle** Is this a bundle? -- **IsInteractive** Is this user requested? -- **IsMandatory** Is this a mandatory update? -- **IsRemediation** Is this repairing a previous installation? -- **IsRestore** Is this restoring previously acquired content? -- **IsUpdate** Is this an update? -- **ParentBundleId** The product ID of the parent (if this product is part of a bundle). -- **PFN** The name of the package or packages requested for install. -- **ProductId** The Store Product ID for the product being installed. -- **SystemAttemptNumber** The total number of system attempts. -- **UserAttemptNumber** The total number of system attempts. -- **WUContentId** The Windows Update content ID. - - -### Microsoft.Windows.StoreAgent.Telemetry.EndUpdateMetadataPrepare - -This event is sent after a scan for available app updates to help keep Windows up-to-date and secure. - -The following fields are available: - -- **HResult** The result code of the last action performed. - - -### Microsoft.Windows.StoreAgent.Telemetry.FulfillmentComplete - -This event is sent at the end of an app install or update to help keep Windows up-to-date and secure. - -The following fields are available: - -- **CatalogId** The name of the product catalog from which this app was chosen. -- **FailedRetry** Indicates whether the installation or update retry was successful. -- **HResult** The HResult code of the operation. -- **PFN** The Package Family Name of the app that is being installed or updated. -- **ProductId** The product ID of the app that is being updated or installed. - - -### Microsoft.Windows.StoreAgent.Telemetry.FulfillmentInitiate - -This event is sent at the beginning of an app install or update to help keep Windows up-to-date and secure. - -The following fields are available: - -- **CatalogId** The name of the product catalog from which this app was chosen. -- **FulfillmentPluginId** The ID of the plugin needed to install the package type of the product. -- **PFN** The Package Family Name of the app that is being installed or updated. -- **PluginTelemetryData** Diagnostic information specific to the package-type plug-in. -- **ProductId** The product ID of the app that is being updated or installed. - - -### Microsoft.Windows.StoreAgent.Telemetry.InstallOperationRequest - -This event is sent when a product install or update is initiated, to help keep Windows up-to-date and secure. - -The following fields are available: - -- **BundleId** The identity of the build associated with this product. -- **CatalogId** If this product is from a private catalog, the Store Product ID for the product being installed. -- **ProductId** The Store Product ID for the product being installed. -- **SkuId** Specific edition ID being installed. -- **VolumePath** The disk path of the installation. - - -### Microsoft.Windows.StoreAgent.Telemetry.PauseInstallation - -This event is sent when a product install or update is paused (either by a user or the system), to help keep Windows up-to-date and secure. - -The following fields are available: - -- **AggregatedPackageFullNames** The names of all packages to be downloaded and installed. -- **AttemptNumber** The total number of retry attempts before it was canceled. -- **BundleId** The identity of the build associated with this product. -- **CategoryId** The identity of the package or packages being installed. -- **ClientAppId** The identity of the app that initiated this operation. -- **IsBundle** Is this a bundle? -- **IsInteractive** Is this user requested? -- **IsMandatory** Is this a mandatory update? -- **IsRemediation** Is this repairing a previous installation? -- **IsRestore** Is this restoring previously acquired content? -- **IsUpdate** Is this an update? -- **ParentBundleId** The product ID of the parent (if this product is part of a bundle). -- **PFN** The Product Full Name. -- **PreviousHResult** The result code of the last action performed before this operation. -- **PreviousInstallState** Previous state before the installation or update was paused. -- **ProductId** The Store Product ID for the product being installed. -- **RelatedCV** Correlation Vector of a previous performed action on this product. -- **SystemAttemptNumber** The total number of system attempts. -- **UserAttemptNumber** The total number of user attempts. -- **WUContentId** The Windows Update content ID. - - -### Microsoft.Windows.StoreAgent.Telemetry.ResumeInstallation - -This event is sent when a product install or update is resumed (either by a user or the system), to help keep Windows up-to-date and secure. - -The following fields are available: - -- **AggregatedPackageFullNames** The names of all packages to be downloaded and installed. -- **AttemptNumber** The number of retry attempts before it was canceled. -- **BundleId** The identity of the build associated with this product. -- **CategoryId** The identity of the package or packages being installed. -- **ClientAppId** The identity of the app that initiated this operation. -- **HResult** The result code of the last action performed before this operation. -- **IsBundle** Is this a bundle? -- **IsInteractive** Is this user requested? -- **IsMandatory** Is this a mandatory update? -- **IsRemediation** Is this repairing a previous installation? -- **IsRestore** Is this restoring previously acquired content? -- **IsUpdate** Is this an update? -- **IsUserRetry** Did the user initiate the retry? -- **ParentBundleId** The product ID of the parent (if this product is part of a bundle). -- **PFN** The name of the package or packages requested for install. -- **PreviousHResult** The previous HResult error code. -- **PreviousInstallState** Previous state before the installation was paused. -- **ProductId** The Store Product ID for the product being installed. -- **RelatedCV** Correlation Vector for the original install before it was resumed. -- **ResumeClientId** The ID of the app that initiated the resume operation. -- **SystemAttemptNumber** The total number of system attempts. -- **UserAttemptNumber** The total number of user attempts. -- **WUContentId** The Windows Update content ID. - - -### Microsoft.Windows.StoreAgent.Telemetry.ResumeOperationRequest - -This event is sent when a product install or update is resumed by a user or on installation retries, to help keep Windows up-to-date and secure. - -The following fields are available: - -- **ProductId** The Store Product ID for the product being installed. - - -### Microsoft.Windows.StoreAgent.Telemetry.SearchForUpdateOperationRequest - -This event is sent when searching for update packages to install, to help keep Windows up-to-date and secure. - -The following fields are available: - -- **CatalogId** The Store Catalog ID for the product being installed. -- **ProductId** The Store Product ID for the product being installed. -- **SkuId** Specfic edition of the app being updated. - - -### Microsoft.Windows.StoreAgent.Telemetry.UpdateAppOperationRequest - -This event occurs when an update is requested for an app, to help keep Windows up-to-date and secure. - -The following fields are available: - -- **PFamN** The name of the app that is requested for update. - - -## Windows System Kit events - -### Microsoft.Windows.Kits.WSK.WskImageCreate - -This event sends simple Product and Service usage data when a user is using the Windows System Kit to create new OS “images”. The data includes the version of the Windows System Kit and the state of the event and is used to help investigate “image” creation failures. - -The following fields are available: - -- **Phase** The image creation phase. Values are “Start” or “End”. -- **WskVersion** The version of the Windows System Kit being used. - - -### Microsoft.Windows.Kits.WSK.WskImageCustomization - -This event sends simple Product and Service usage data when a user is using the Windows System Kit to create/modify configuration files allowing the customization of a new OS image with Apps or Drivers. The data includes the version of the Windows System Kit, the state of the event, the customization type (drivers or apps) and the mode (new or updating) and is used to help investigate configuration file creation failures. - -The following fields are available: - -- **CustomizationMode** Indicates the mode of the customization (new or updating). -- **CustomizationType** Indicates the type of customization (drivers or apps). -- **Mode** The mode of update to image configuration files. Values are “New” or “Update”. -- **Phase** The image creation phase. Values are “Start” or “End”. -- **Type** The type of update to image configuration files. Values are “Apps” or “Drivers”. -- **WskVersion** The version of the Windows System Kit being used. - - -### Microsoft.Windows.Kits.WSK.WskWorkspaceCreate - -This event sends simple Product and Service usage data when a user is using the Windows System Kit to create new workspace for generating OS “images”. The data includes the version of the Windows System Kit and the state of the event and is used to help investigate workspace creation failures. - -The following fields are available: - -- **Architecture** The OS architecture that the workspace will target. Values are one of: “AMD64”, “ARM64”, “x86”, or “ARM”. -- **OsEdition** The Operating System Edition that the workspace will target. -- **Phase** The image creation phase. Values are “Start” or “End”. -- **WorkspaceArchitecture** The operating system architecture that the workspace will target. -- **WorkspaceOsEdition** The operating system edition that the workspace will target. -- **WskVersion** The version of the Windows System Kit being used. - - -## Windows Update Delivery Optimization events - -### Microsoft.OSG.DU.DeliveryOptClient.DownloadCanceled - -This event describes when a download was canceled with Delivery Optimization. It's used to understand and address problems regarding downloads. - -The following fields are available: - -- **background** Is the download being done in the background? -- **bytesFromCacheServer** Bytes received from a cache host. -- **bytesFromCDN** The number of bytes received from a CDN source. -- **bytesFromGroupPeers** The number of bytes received from a peer in the same group. -- **bytesFromIntPeers** The number of bytes received from peers not in the same LAN or in the same group. -- **bytesFromLocalCache** Bytes copied over from local (on disk) cache. -- **bytesFromPeers** The number of bytes received from a peer in the same LAN. -- **cdnErrorCodes** A list of CDN connection errors since the last FailureCDNCommunication event. -- **cdnErrorCounts** The number of times each error in cdnErrorCodes was encountered. -- **cdnIp** The IP Address of the source CDN (Content Delivery Network). -- **cdnUrl** The URL of the source CDN (Content Delivery Network). -- **dataSourcesTotal** Bytes received per source type, accumulated for the whole session. -- **errorCode** The error code that was returned. -- **experimentId** When running a test, this is used to correlate events that are part of the same test. -- **fileID** The ID of the file being downloaded. -- **gCurMemoryStreamBytes** Current usage for memory streaming. -- **gMaxMemoryStreamBytes** Maximum usage for memory streaming. -- **isVpn** Indicates whether the device is connected to a VPN (Virtual Private Network). -- **jobID** Identifier for the Windows Update job. -- **predefinedCallerName** The name of the API Caller. -- **reasonCode** Reason the action or event occurred. -- **routeToCacheServer** The cache server setting, source, and value. -- **sessionID** The ID of the file download session. -- **updateID** The ID of the update being downloaded. -- **usedMemoryStream** TRUE if the download is using memory streaming for App downloads. - - -### Microsoft.OSG.DU.DeliveryOptClient.DownloadCompleted - -This event describes when a download has completed with Delivery Optimization. It's used to understand and address problems regarding downloads. - -The following fields are available: - -- **background** Is the download a background download? -- **bytesFromCacheServer** Bytes received from a cache host. -- **bytesFromCDN** The number of bytes received from a CDN source. -- **bytesFromGroupPeers** The number of bytes received from a peer in the same domain group. -- **bytesFromIntPeers** The number of bytes received from peers not in the same LAN or in the same domain group. -- **bytesFromLinkLocalPeers** The number of bytes received from local peers. -- **bytesFromLocalCache** Bytes copied over from local (on disk) cache. -- **bytesFromPeers** The number of bytes received from a peer in the same LAN. -- **bytesRequested** The total number of bytes requested for download. -- **cacheServerConnectionCount** Number of connections made to cache hosts. -- **cdnConnectionCount** The total number of connections made to the CDN. -- **cdnErrorCodes** A list of CDN connection errors since the last FailureCDNCommunication event. -- **cdnErrorCounts** The number of times each error in cdnErrorCodes was encountered. -- **cdnIp** The IP address of the source CDN. -- **cdnUrl** Url of the source Content Distribution Network (CDN). -- **dataSourcesTotal** Bytes received per source type, accumulated for the whole session. -- **doErrorCode** The Delivery Optimization error code that was returned. -- **downlinkBps** The maximum measured available download bandwidth (in bytes per second). -- **downlinkUsageBps** The download speed (in bytes per second). -- **downloadMode** The download mode used for this file download session. -- **downloadModeReason** Reason for the download. -- **downloadModeSrc** Source of the DownloadMode setting (KvsProvider = 0, GeoProvider = 1, GeoVerProvider = 2, CpProvider = 3, DiscoveryProvider = 4, RegistryProvider = 5, GroupPolicyProvider = 6, MdmProvider = 7, SettingsProvider = 8, InvalidProviderType = 9). -- **experimentId** When running a test, this is used to correlate with other events that are part of the same test. -- **fileID** The ID of the file being downloaded. -- **fileSize** The size of the file being downloaded. -- **gCurMemoryStreamBytes** Current usage for memory streaming. -- **gMaxMemoryStreamBytes** Maximum usage for memory streaming. -- **groupConnectionCount** The total number of connections made to peers in the same group. -- **internetConnectionCount** The total number of connections made to peers not in the same LAN or the same group. -- **isEncrypted** TRUE if the file is encrypted and will be decrypted after download. -- **isVpn** Is the device connected to a Virtual Private Network? -- **jobID** Identifier for the Windows Update job. -- **lanConnectionCount** The total number of connections made to peers in the same LAN. -- **linkLocalConnectionCount** The number of connections made to peers in the same Link-local network. -- **numPeers** The total number of peers used for this download. -- **numPeersLocal** The total number of local peers used for this download. -- **predefinedCallerName** The name of the API Caller. -- **restrictedUpload** Is the upload restricted? -- **routeToCacheServer** The cache server setting, source, and value. -- **sessionID** The ID of the download session. -- **totalTimeMs** Duration of the download (in seconds). -- **updateID** The ID of the update being downloaded. -- **uplinkBps** The maximum measured available upload bandwidth (in bytes per second). -- **uplinkUsageBps** The upload speed (in bytes per second). -- **usedMemoryStream** TRUE if the download is using memory streaming for App downloads. - - -### Microsoft.OSG.DU.DeliveryOptClient.DownloadPaused - -This event represents a temporary suspension of a download with Delivery Optimization. It's used to understand and address problems regarding downloads. - -The following fields are available: - -- **background** Is the download a background download? -- **cdnUrl** The URL of the source CDN (Content Delivery Network). -- **errorCode** The error code that was returned. -- **experimentId** When running a test, this is used to correlate with other events that are part of the same test. -- **fileID** The ID of the file being paused. -- **isVpn** Is the device connected to a Virtual Private Network? -- **jobID** Identifier for the Windows Update job. -- **predefinedCallerName** The name of the API Caller object. -- **reasonCode** The reason for pausing the download. -- **routeToCacheServer** The cache server setting, source, and value. -- **sessionID** The ID of the download session. -- **updateID** The ID of the update being paused. - - -### Microsoft.OSG.DU.DeliveryOptClient.DownloadStarted - -This event sends data describing the start of a new download to enable Delivery Optimization. It's used to understand and address problems regarding downloads. - -The following fields are available: - -- **background** Indicates whether the download is happening in the background. -- **bytesRequested** Number of bytes requested for the download. -- **cdnUrl** The URL of the source Content Distribution Network (CDN). -- **costFlags** A set of flags representing network cost. -- **deviceProfile** Identifies the usage or form factor (such as Desktop, Xbox, or VM). -- **diceRoll** Random number used for determining if a client will use peering. -- **doClientVersion** The version of the Delivery Optimization client. -- **doErrorCode** The Delivery Optimization error code that was returned. -- **downloadMode** The download mode used for this file download session (CdnOnly = 0, Lan = 1, Group = 2, Internet = 3, Simple = 99, Bypass = 100). -- **downloadModeReason** Reason for the download. -- **downloadModeSrc** Source of the DownloadMode setting (KvsProvider = 0, GeoProvider = 1, GeoVerProvider = 2, CpProvider = 3, DiscoveryProvider = 4, RegistryProvider = 5, GroupPolicyProvider = 6, MdmProvider = 7, SettingsProvider = 8, InvalidProviderType = 9). -- **errorCode** The error code that was returned. -- **experimentId** ID used to correlate client/services calls that are part of the same test during A/B testing. -- **fileID** The ID of the file being downloaded. -- **filePath** The path to where the downloaded file will be written. -- **fileSize** Total file size of the file that was downloaded. -- **fileSizeCaller** Value for total file size provided by our caller. -- **groupID** ID for the group. -- **isEncrypted** Indicates whether the download is encrypted. -- **isVpn** Indicates whether the device is connected to a Virtual Private Network. -- **jobID** The ID of the Windows Update job. -- **peerID** The ID for this delivery optimization client. -- **predefinedCallerName** Name of the API caller. -- **routeToCacheServer** Cache server setting, source, and value. -- **sessionID** The ID for the file download session. -- **setConfigs** A JSON representation of the configurations that have been set, and their sources. -- **updateID** The ID of the update being downloaded. -- **usedMemoryStream** Indicates whether the download used memory streaming. - - -### Microsoft.OSG.DU.DeliveryOptClient.FailureCdnCommunication - -This event represents a failure to download from a CDN with Delivery Optimization. It's used to understand and address problems regarding downloads. - -The following fields are available: - -- **cdnHeaders** The HTTP headers returned by the CDN. -- **cdnIp** The IP address of the CDN. -- **cdnUrl** The URL of the CDN. -- **errorCode** The error code that was returned. -- **errorCount** The total number of times this error code was seen since the last FailureCdnCommunication event was encountered. -- **experimentId** When running a test, this is used to correlate with other events that are part of the same test. -- **fileID** The ID of the file being downloaded. -- **httpStatusCode** The HTTP status code returned by the CDN. -- **isHeadRequest** The type of HTTP request that was sent to the CDN. Example: HEAD or GET -- **peerType** The type of peer (LAN, Group, Internet, CDN, Cache Host, etc.). -- **requestOffset** The byte offset within the file in the sent request. -- **requestSize** The size of the range requested from the CDN. -- **responseSize** The size of the range response received from the CDN. -- **sessionID** The ID of the download session. - - -### Microsoft.OSG.DU.DeliveryOptClient.JobError - -This event represents a Windows Update job error. It allows for investigation of top errors. - -The following fields are available: - -- **cdnIp** The IP Address of the source CDN (Content Delivery Network). -- **doErrorCode** Error code returned for delivery optimization. -- **errorCode** The error code returned. -- **experimentId** When running a test, this is used to correlate with other events that are part of the same test. -- **fileID** The ID of the file being downloaded. -- **jobID** The Windows Update job ID. - - -## Windows Update events - -### Microsoft.Windows.Update.DeviceUpdateAgent.UpdateAgentAnalysisSummary - -This event collects information regarding the state of devices and drivers on the system following a reboot after the install phase of the new device manifest UUP (Unified Update Platform) update scenario which is used to install a device manifest describing a set of driver packages. - -The following fields are available: - -- **activated** Whether the entire device manifest update is considered activated and in use. -- **analysisErrorCount** The number of driver packages that could not be analyzed because errors occurred during analysis. -- **flightId** Unique ID for each flight. -- **missingDriverCount** The number of driver packages delivered by the device manifest that are missing from the system. -- **missingUpdateCount** The number of updates in the device manifest that are missing from the system. -- **objectId** Unique value for each diagnostics session. -- **publishedCount** The number of drivers packages delivered by the device manifest that are published and available to be used on devices. -- **relatedCV** Correlation vector value generated from the latest USO scan. -- **scenarioId** Indicates the update scenario. -- **sessionId** Unique value for each update session. -- **summary** A summary string that contains basic information about driver packages that are part of the device manifest and any devices on the system that those driver packages match. -- **summaryAppendError** A Boolean indicating if there was an error appending more information to the summary string. -- **truncatedDeviceCount** The number of devices missing from the summary string because there is not enough room in the string. -- **truncatedDriverCount** The number of driver packages missing from the summary string because there is not enough room in the string. -- **unpublishedCount** How many drivers packages that were delivered by the device manifest that are still unpublished and unavailable to be used on devices. -- **updateId** The unique ID for each update. - - -### Microsoft.Windows.Update.DeviceUpdateAgent.UpdateAgentCommit - -This event collects information regarding the final commit phase of the new device manifest UUP (Unified Update Platform) update scenario, which is used to install a device manifest describing a set of driver packages. - -The following fields are available: - -- **errorCode** The error code returned for the current session initialization. -- **flightId** The unique identifier for each flight. -- **objectId** The unique GUID for each diagnostics session. -- **relatedCV** A correlation vector value generated from the latest USO scan. -- **result** Outcome of the initialization of the session. -- **scenarioId** Identifies the Update scenario. -- **sessionId** The unique value for each update session. -- **updateId** The unique identifier for each Update. - - -### Microsoft.Windows.Update.DeviceUpdateAgent.UpdateAgentDownloadRequest - -This event collects information regarding the download request phase of the new device manifest UUP (Unified Update Platform) update scenario, which is used to install a device manifest describing a set of driver packages. - -The following fields are available: - -- **deletedCorruptFiles** Indicates if UpdateAgent found any corrupt payload files and whether the payload was deleted. -- **errorCode** The error code returned for the current session initialization. -- **flightId** The unique identifier for each flight. -- **objectId** Unique value for each Update Agent mode. -- **packageCountOptional** Number of optional packages requested. -- **packageCountRequired** Number of required packages requested. -- **packageCountTotal** Total number of packages needed. -- **packageCountTotalCanonical** Total number of canonical packages. -- **packageCountTotalDiff** Total number of diff packages. -- **packageCountTotalExpress** Total number of express packages. -- **packageSizeCanonical** Size of canonical packages in bytes. -- **packageSizeDiff** Size of diff packages in bytes. -- **packageSizeExpress** Size of express packages in bytes. -- **rangeRequestState** Represents the state of the download range request. -- **relatedCV** Correlation vector value generated from the latest USO scan. -- **result** Result of the download request phase of update. -- **scenarioId** The scenario ID. Example: MobileUpdate, DesktopLanguagePack, DesktopFeatureOnDemand, or DesktopDriverUpdate. -- **sessionId** Unique value for each Update Agent mode attempt. -- **updateId** Unique ID for each update. - - -### Microsoft.Windows.Update.DeviceUpdateAgent.UpdateAgentInitialize - -This event sends data for initializing a new update session for the new device manifest UUP (Unified Update Platform) update scenario, which is used to install a device manifest describing a set of driver packages. - -The following fields are available: - -- **errorCode** The error code returned for the current session initialization. -- **flightId** The unique identifier for each flight. -- **flightMetadata** Contains the FlightId and the build being flighted. -- **objectId** Unique value for each Update Agent mode. -- **relatedCV** Correlation vector value generated from the latest USO scan. -- **result** Result of the initialize phase of the update. 0 = Succeeded, 1 = Failed, 2 = Cancelled, 3 = Blocked, 4 = BlockCancelled. -- **scenarioId** The scenario ID. Example: MobileUpdate, DesktopLanguagePack, DesktopFeatureOnDemand, or DesktopDriverUpdate. -- **sessionData** Contains instructions to update agent for processing FODs and DUICs (Null for other scenarios). -- **sessionId** Unique value for each Update Agent mode attempt. -- **updateId** Unique ID for each update. - - -### Microsoft.Windows.Update.DeviceUpdateAgent.UpdateAgentInstall - -This event collects information regarding the install phase of the new device manifest UUP (Unified Update Platform) update scenario, which is used to install a device manifest describing a set of driver packages. - -The following fields are available: - -- **errorCode** The error code returned for the current install phase. -- **flightId** The unique identifier for each flight (pre-release builds). -- **objectId** The unique identifier for each diagnostics session. -- **relatedCV** Correlation vector value generated from the latest scan. -- **result** Outcome of the install phase of the update. -- **scenarioId** The scenario ID. Example: MobileUpdate, DesktopLanguagePack, DesktopFeatureOnDemand, or DesktopDriverUpdate -- **sessionId** The unique identifier for each update session. -- **updateId** The unique identifier for each Update. - - -### Microsoft.Windows.Update.DeviceUpdateAgent.UpdateAgentModeStart - -This event sends data for the start of each mode during the process of updating device manifest assets via the UUP (Unified Update Platform) update scenario, which is used to install a device manifest describing a set of driver packages. - -The following fields are available: - -- **flightId** The unique identifier for each flight (pre-release builds). -- **mode** Indicates the active Update Agent mode. -- **objectId** Unique value for each diagnostics session. -- **relatedCV** Correlation vector value generated from the latest scan. -- **scenarioId** The scenario ID. Example: MobileUpdate, DesktopLanguagePack, DesktopFeatureOnDemand, or DesktopDriverUpdate. -- **sessionId** The unique identifier for each update session. -- **updateId** The unique identifier for each Update. - - -### Microsoft.Windows.Update.NotificationUx.DialogNotificationToBeDisplayed - -This event indicates that a notification dialog box is about to be displayed to user. - -The following fields are available: - -- **AcceptAutoModeLimit** The maximum number of days for a device to automatically enter Auto Reboot mode. -- **AutoToAutoFailedLimit** The maximum number of days for Auto Reboot mode to fail before the RebootFailed dialog box is shown. -- **DaysSinceRebootRequired** Number of days since restart was required. -- **DeviceLocalTime** The local time on the device sending the event. -- **EngagedModeLimit** The number of days to switch between DTE dialog boxes. -- **EnterAutoModeLimit** The maximum number of days for a device to enter Auto Reboot mode. -- **ETag** OneSettings versioning value. -- **IsForcedEnabled** Indicates whether Forced Reboot mode is enabled for this device. -- **IsUltimateForcedEnabled** Indicates whether Ultimate Forced Reboot mode is enabled for this device. -- **NotificationUxState** Indicates which dialog box is shown. -- **NotificationUxStateString** Indicates which dialog box is shown. -- **RebootUxState** Indicates the state of the restart (Engaged, Auto, Forced, or UltimateForced). -- **RebootUxStateString** Indicates the state of the restart (Engaged, Auto, Forced, or UltimateForced). -- **RebootVersion** Version of DTE. -- **SkipToAutoModeLimit** The minimum length of time to pass in restart pending before a device can be put into auto mode. -- **UpdateId** The ID of the update that is pending restart to finish installation. -- **UpdateRevision** The revision of the update that is pending restart to finish installation. -- **UtcTime** The time the dialog box notification will be displayed, in Coordinated Universal Time. - - -### Microsoft.Windows.Update.NotificationUx.EnhancedEngagedRebootAcceptAutoDialog - -This event indicates that the Enhanced Engaged restart "accept automatically" dialog box was displayed. - -The following fields are available: - -- **DeviceLocalTime** The local time on the device sending the event. -- **ETag** OneSettings versioning value. -- **ExitCode** Indicates how users exited the dialog box. -- **RebootVersion** Version of DTE. -- **UpdateId** The ID of the update that is pending restart to finish installation. -- **UpdateRevision** The revision of the update that is pending restart to finish installation. -- **UserResponseString** The option that user chose on this dialog box. -- **UtcTime** The time that the dialog box was displayed, in Coordinated Universal Time. - - -### Microsoft.Windows.Update.NotificationUx.EnhancedEngagedRebootFirstReminderDialog - -This event indicates that the Enhanced Engaged restart "first reminder" dialog box was displayed.. - -The following fields are available: - -- **DeviceLocalTime** The local time on the device sending the event. -- **ETag** OneSettings versioning value. -- **ExitCode** Indicates how users exited the dialog box. -- **RebootVersion** Version of DTE. -- **UpdateId** The ID of the update that is pending restart to finish installation. -- **UpdateRevision** The revision of the update that is pending restart to finish installation. -- **UserResponseString** The option that user chose in this dialog box. -- **UtcTime** The time that the dialog box was displayed, in Coordinated Universal Time. - - -### Microsoft.Windows.Update.NotificationUx.EnhancedEngagedRebootRebootFailedDialog - -This event indicates that the Enhanced Engaged restart "restart failed" dialog box was displayed. - -The following fields are available: - -- **DeviceLocalTime** The local time of the device sending the event. -- **ETag** OneSettings versioning value. -- **ExitCode** Indicates how users exited the dialog box. -- **RebootVersion** Version of DTE. -- **UpdateId** The ID of the update that is pending restart to finish installation. -- **UpdateRevision** The revision of the update that is pending restart to finish installation. -- **UserResponseString** The option that the user chose in this dialog box. -- **UtcTime** The time that the dialog box was displayed, in Coordinated Universal Time. - - -### Microsoft.Windows.Update.NotificationUx.EnhancedEngagedRebootRebootImminentDialog - -This event indicates that the Enhanced Engaged restart "restart imminent" dialog box was displayed. - -The following fields are available: - -- **DeviceLocalTime** Time the dialog box was shown on the local device. -- **ETag** OneSettings versioning value. -- **ExitCode** Indicates how users exited the dialog box. -- **RebootVersion** Version of DTE. -- **UpdateId** The ID of the update that is pending restart to finish installation. -- **UpdateRevision** The revision of the update that is pending restart to finish installation. -- **UserResponseString** The option that user chose in this dialog box. -- **UtcTime** The time that dialog box was displayed, in Coordinated Universal Time. - - -### Microsoft.Windows.Update.NotificationUx.EnhancedEngagedRebootReminderDialog - -This event returns information relating to the Enhanced Engaged reboot reminder dialog that was displayed. - -The following fields are available: - -- **DeviceLocalTime** The time at which the reboot reminder dialog was shown (based on the local device time settings). -- **ETag** The OneSettings versioning value. -- **ExitCode** Indicates how users exited the reboot reminder dialog box. -- **RebootVersion** The version of the DTE (Direct-to-Engaged). -- **UpdateId** The ID of the update that is waiting for reboot to finish installation. -- **UpdateRevision** The revision of the update that is waiting for reboot to finish installation. -- **UserResponseString** The option chosen by the user on the reboot dialog box. -- **UtcTime** The time at which the reboot reminder dialog was shown (in UTC). - - -### Microsoft.Windows.Update.NotificationUx.EnhancedEngagedRebootReminderToast - -This event indicates that the Enhanced Engaged restart reminder pop-up banner was displayed. - -The following fields are available: - -- **DeviceLocalTime** The local time on the device sending the event. -- **ETag** OneSettings versioning value. -- **ExitCode** Indicates how users exited the pop-up banner. -- **RebootVersion** The version of the reboot logic. -- **UpdateId** The ID of the update that is pending restart to finish installation. -- **UpdateRevision** The revision of the update that is pending restart to finish installation. -- **UserResponseString** The option that the user chose in the pop-up banner. -- **UtcTime** The time that the pop-up banner was displayed, in Coordinated Universal Time. - - -### Microsoft.Windows.Update.NotificationUx.RebootScheduled - -Indicates when a reboot is scheduled by the system or a user for a security, quality, or feature update. - -The following fields are available: - -- **activeHoursApplicable** Indicates whether an Active Hours policy is present on the device. -- **IsEnhancedEngagedReboot** Indicates whether this is an Enhanced Engaged reboot. -- **rebootArgument** Argument for the reboot task. It also represents specific reboot related action. -- **rebootOutsideOfActiveHours** Indicates whether a restart is scheduled outside of active hours. -- **rebootScheduledByUser** Indicates whether the restart was scheduled by user (if not, it was scheduled automatically). -- **rebootState** The current state of the restart. -- **rebootUsingSmartScheduler** Indicates whether the reboot is scheduled by smart scheduler. -- **revisionNumber** Revision number of the update that is getting installed with this restart. -- **scheduledRebootTime** Time of the scheduled restart. -- **scheduledRebootTimeInUTC** Time of the scheduled restart in Coordinated Universal Time. -- **updateId** ID of the update that is getting installed with this restart. -- **wuDeviceid** Unique device ID used by Windows Update. - - -### Microsoft.Windows.Update.Orchestrator.ActivityRestrictedByActiveHoursPolicy - -This event indicates a policy is present that may restrict update activity to outside of active hours. - -The following fields are available: - -- **activeHoursEnd** The end of the active hours window. -- **activeHoursStart** The start of the active hours window. -- **wuDeviceid** Unique device ID used by Windows Update. - - -### Microsoft.Windows.Update.Orchestrator.BlockedByActiveHours - -This event indicates that update activity was blocked because it is within the active hours window. - -The following fields are available: - -- **activeHoursEnd** The end of the active hours window. -- **activeHoursStart** The start of the active hours window. -- **updatePhase** The current state of the update process. -- **wuDeviceid** Unique device ID used by Windows Update. - - -### Microsoft.Windows.Update.Orchestrator.BlockedByBatteryLevel - -This event indicates that Windows Update activity was blocked due to low battery level. - -The following fields are available: - -- **batteryLevel** The current battery charge capacity. -- **batteryLevelThreshold** The battery capacity threshold to stop update activity. -- **updatePhase** The current state of the update process. -- **wuDeviceid** Device ID. - - -### Microsoft.Windows.Update.Orchestrator.DeferRestart - -This event indicates that a restart required for installing updates was postponed. - -The following fields are available: - -- **displayNeededReason** List of reasons for needing display. -- **eventScenario** Indicates the purpose of the event (scan started, succeeded, failed, etc.). -- **filteredDeferReason** Applicable filtered reasons why reboot was postponed (such as user active, or low battery). -- **gameModeReason** Name of the executable that caused the game mode state check to start. -- **ignoredReason** List of reasons that were intentionally ignored. -- **IgnoreReasonsForRestart** List of reasons why restart was deferred. -- **revisionNumber** Update ID revision number. -- **systemNeededReason** List of reasons why system is needed. -- **updateId** Update ID. -- **updateScenarioType** Update session type. -- **wuDeviceid** Unique device ID used by Windows Update. - - -### Microsoft.Windows.Update.Orchestrator.Detection - -This event indicates that a scan for a Windows Update occurred. - -The following fields are available: - -- **deferReason** The reason why the device could not check for updates. -- **detectionBlockingPolicy** The Policy that blocked detection. -- **detectionBlockreason** The reason detection did not complete. -- **detectionRetryMode** Indicates whether we will try to scan again. -- **errorCode** The error code returned for the current process. -- **eventScenario** End-to-end update session ID, or indicates the purpose of sending this event - whether because the software distribution just started installing content, or whether it was cancelled, succeeded, or failed. -- **flightID** The unique identifier for the flight (Windows Insider pre-release build) should be delivered to the device, if applicable. -- **interactive** Indicates whether the user initiated the session. -- **networkStatus** Indicates if the device is connected to the internet. -- **revisionNumber** The Update revision number. -- **scanTriggerSource** The source of the triggered scan. -- **updateId** The unique identifier of the Update. -- **updateScenarioType** Identifies the type of update session being performed. -- **wuDeviceid** The unique device ID used by Windows Update. - - -### Microsoft.Windows.Update.Orchestrator.DisplayNeeded - -This event indicates the reboot was postponed due to needing a display. - -The following fields are available: - -- **displayNeededReason** Reason the display is needed. -- **eventScenario** Indicates the purpose of sending this event - whether because the software distribution just started checking for content, or whether it was cancelled, succeeded, or failed. -- **rebootOutsideOfActiveHours** Indicates whether the reboot was to occur outside of active hours. -- **revisionNumber** Revision number of the update. -- **updateId** Update ID. -- **updateScenarioType** The update session type. -- **uxRebootstate** Indicates the exact state of the user experience at the time the required reboot was initiated. -- **wuDeviceid** The unique identifier of a specific device, used to identify how many devices are encountering success or a particular issue - - -### Microsoft.Windows.Update.Orchestrator.Download - -This event sends launch data for a Windows Update download to help keep Windows up to date. - -The following fields are available: - -- **deferReason** Reason for download not completing. -- **errorCode** An error code represented as a hexadecimal value. -- **eventScenario** End-to-end update session ID. -- **flightID** The specific ID of the Windows Insider build the device is getting. -- **interactive** Indicates whether the session is user initiated. -- **revisionNumber** Update revision number. -- **updateId** Update ID. -- **updateScenarioType** The update session type. -- **wuDeviceid** Unique device ID used by Windows Update. - - -### Microsoft.Windows.Update.Orchestrator.DTUCompletedWhenWuFlightPendingCommit - -This event indicates that DTU completed installation of the electronic software delivery (ESD), when Windows Update was already in Pending Commit phase of the feature update. - -The following fields are available: - -- **wuDeviceid** Device ID used by Windows Update. - - -### Microsoft.Windows.Update.Orchestrator.DTUEnabled - -This event indicates that Inbox DTU functionality was enabled. - -The following fields are available: - -- **wuDeviceid** Device ID used by Windows Update. - - -### Microsoft.Windows.Update.Orchestrator.DTUInitiated - -This event indicates that Inbox DTU functionality was intiated. - -The following fields are available: - -- **dtuErrorCode** Return code from creating the DTU Com Server. -- **isDtuApplicable** Determination of whether DTU is applicable to the machine it is running on. -- **wuDeviceid** Device ID used by Windows Update. - - -### Microsoft.Windows.Update.Orchestrator.EscalationRiskLevels - -This event is sent during update scan, download, or install, and indicates that the device is at risk of being out-of-date. - -The following fields are available: - -- **configVersion** The escalation configuration version on the device. -- **downloadElapsedTime** Indicates how long since the download is required on device. -- **downloadRiskLevel** At-risk level of download phase. -- **installElapsedTime** Indicates how long since the install is required on device. -- **installRiskLevel** The at-risk level of install phase. -- **isSediment** Assessment of whether is device is at risk. -- **scanElapsedTime** Indicates how long since the scan is required on device. -- **scanRiskLevel** At-risk level of the scan phase. -- **wuDeviceid** Device ID used by Windows Update. - - -### Microsoft.Windows.Update.Orchestrator.FailedToAddTimeTriggerToScanTask - -This event indicated that USO failed to add a trigger time to a task. - -The following fields are available: - -- **errorCode** The Windows Update error code. -- **wuDeviceid** The Windows Update device ID. - - -### Microsoft.Windows.Update.Orchestrator.FlightInapplicable - -This event indicates that the update is no longer applicable to this device. - -The following fields are available: - -- **EventPublishedTime** Time when this event was generated. -- **flightID** The specific ID of the Windows Insider build. -- **inapplicableReason** The reason why the update is inapplicable. -- **revisionNumber** Update revision number. -- **updateId** Unique Windows Update ID. -- **updateScenarioType** Update session type. -- **UpdateStatus** Last status of update. -- **UUPFallBackConfigured** Indicates whether UUP fallback is configured. -- **wuDeviceid** Unique Device ID. - - -### Microsoft.Windows.Update.Orchestrator.InitiatingReboot - -This event sends data about an Orchestrator requesting a reboot from power management to help keep Windows up to date. - -The following fields are available: - -- **EventPublishedTime** Time of the event. -- **flightID** Unique update ID -- **interactive** Indicates whether the reboot initiation stage of the update process was entered as a result of user action. -- **rebootOutsideOfActiveHours** Indicates whether the reboot was to occur outside of active hours. -- **revisionNumber** Revision number of the update. -- **updateId** Update ID. -- **updateScenarioType** The update session type. -- **uxRebootstate** Indicates the exact state of the user experience at the time the required reboot was initiated. -- **wuDeviceid** Unique device ID used by Windows Update. - - -### Microsoft.Windows.Update.Orchestrator.Install - -This event sends launch data for a Windows Update install to help keep Windows up to date. - -The following fields are available: - -- **batteryLevel** Current battery capacity in mWh or percentage left. -- **deferReason** Reason for install not completing. -- **errorCode** The error code reppresented by a hexadecimal value. -- **eventScenario** End-to-end update session ID. -- **flightID** The ID of the Windows Insider build the device is getting. -- **flightUpdate** Indicates whether the update is a Windows Insider build. -- **ForcedRebootReminderSet** A boolean value that indicates if a forced reboot will happen for updates. -- **IgnoreReasonsForRestart** The reason(s) a Postpone Restart command was ignored. -- **installCommitfailedtime** The time it took for a reboot to happen but the upgrade failed to progress. -- **installRebootinitiatetime** The time it took for a reboot to be attempted. -- **interactive** Identifies if session is user initiated. -- **minutesToCommit** The time it took to install updates. -- **rebootOutsideOfActiveHours** Indicates whether a reboot is scheduled outside of active hours. -- **revisionNumber** Update revision number. -- **updateId** Update ID. -- **updateScenarioType** The update session type. -- **uxRebootstate** Indicates the exact state of the user experience at the time the required reboot was initiated to ensure the correct update process and experience is provided to keep Windows up to date. -- **wuDeviceid** Unique device ID used by Windows Update. - - -### Microsoft.Windows.Update.Orchestrator.LowUptimes - -This event is sent if a device is identified as not having sufficient uptime to reliably process updates in order to keep secure. - -The following fields are available: - -- **availableHistoryMinutes** The number of minutes available from the local machine activity history. -- **isLowUptimeMachine** Is the machine considered low uptime or not. -- **lowUptimeMinHours** Current setting for the minimum number of hours needed to not be considered low uptime. -- **lowUptimeQueryDays** Current setting for the number of recent days to check for uptime. -- **uptimeMinutes** Number of minutes of uptime measured. -- **wuDeviceid** Unique device ID for Windows Update. - - -### Microsoft.Windows.Update.Orchestrator.OneshotUpdateDetection - -This event returns data about scans initiated through settings UI, or background scans that are urgent; to help keep Windows up to date. - -The following fields are available: - -- **externalOneshotupdate** The last time a task-triggered scan was completed. -- **interactiveOneshotupdate** The last time an interactive scan was completed. -- **oldlastscanOneshotupdate** The last time a scan completed successfully. -- **wuDeviceid** The Windows Update Device GUID (Globally-Unique ID). - - -### Microsoft.Windows.Update.Orchestrator.PreShutdownStart - -This event is generated before the shutdown and commit operations. - -The following fields are available: - -- **wuDeviceid** The unique identifier of a specific device, used to identify how many devices are encountering success or a particular issue. - - -### Microsoft.Windows.Update.Orchestrator.RebootFailed - -This event sends information about whether an update required a reboot and reasons for failure, to help keep Windows up to date. - -The following fields are available: - -- **batteryLevel** Current battery capacity in mWh or percentage left. -- **deferReason** Reason for install not completing. -- **EventPublishedTime** The time that the reboot failure occurred. -- **flightID** Unique update ID. -- **rebootOutsideOfActiveHours** Indicates whether a reboot was scheduled outside of active hours. -- **RebootResults** Hex code indicating failure reason. Typically, we expect this to be a specific USO generated hex code. -- **revisionNumber** Update revision number. -- **updateId** Update ID. -- **updateScenarioType** The update session type. -- **uxRebootstate** Indicates the exact state of the user experience at the time the required reboot was initiated to ensure the correct update process and experience is provided to keep Windows up to date. -- **wuDeviceid** Unique device ID used by Windows Update. - - -### Microsoft.Windows.Update.Orchestrator.RefreshSettings - -This event sends basic data about the version of upgrade settings applied to the system to help keep Windows up to date. - -The following fields are available: - -- **errorCode** Hex code for the error message, to allow lookup of the specific error. -- **settingsDownloadTime** Timestamp of the last attempt to acquire settings. -- **settingsETag** Version identifier for the settings. -- **wuDeviceid** Unique device ID used by Windows Update. - - -### Microsoft.Windows.Update.Orchestrator.RestoreRebootTask - -This event sends data indicating that a reboot task is missing unexpectedly on a device and the task is restored because a reboot is still required, to help keep Windows up to date. - -The following fields are available: - -- **RebootTaskMissedTimeUTC** The time when the reboot task was scheduled to run, but did not. -- **RebootTaskNextTimeUTC** The time when the reboot task was rescheduled for. -- **RebootTaskRestoredTime** Time at which this reboot task was restored. -- **wuDeviceid** Device ID for the device on which the reboot is restored. - - -### Microsoft.Windows.Update.Orchestrator.ScanTriggered - -This event indicates that Update Orchestrator has started a scan operation. - -The following fields are available: - -- **errorCode** The error code returned for the current scan operation. -- **eventScenario** Indicates the purpose of sending this event. -- **interactive** Indicates whether the scan is interactive. -- **isDTUEnabled** Indicates whether DTU (internal abbreviation for Direct Feature Update) channel is enabled on the client system. -- **isScanPastSla** Indicates whether the SLA has elapsed for scanning. -- **isScanPastTriggerSla** Indicates whether the SLA has elapsed for triggering a scan. -- **minutesOverScanSla** Indicates how many minutes the scan exceeded the scan SLA. -- **minutesOverScanTriggerSla** Indicates how many minutes the scan exceeded the scan trigger SLA. -- **scanTriggerSource** Indicates what caused the scan. -- **updateScenarioType** The update session type. -- **wuDeviceid** Unique device ID used by Windows Update. - - -### Microsoft.Windows.Update.Orchestrator.StickUpdate - -This event is sent when the update service orchestrator (USO) indicates the update cannot be superseded by a newer update. - -The following fields are available: - -- **updateId** Identifier associated with the specific piece of content. -- **wuDeviceid** Unique device ID controlled by the software distribution client. - - -### Microsoft.Windows.Update.Orchestrator.SystemNeeded - -This event sends data about why a device is unable to reboot, to help keep Windows up to date. - -The following fields are available: - -- **eventScenario** End-to-end update session ID. -- **rebootOutsideOfActiveHours** Indicates whether a reboot is scheduled outside of active hours. -- **revisionNumber** Update revision number. -- **systemNeededReason** List of apps or tasks that are preventing the system from restarting. -- **updateId** Update ID. -- **updateScenarioType** The update session type. -- **uxRebootstate** Indicates the exact state of the user experience at the time the required reboot was initiated to ensure the correct update process and experience is provided to keep Windows up to date. -- **wuDeviceid** Unique device ID used by Windows Update. - - -### Microsoft.Windows.Update.Orchestrator.TerminatedByActiveHours - -This event indicates that update activity was stopped due to active hours starting. - -The following fields are available: - -- **activeHoursEnd** The end of the active hours window. -- **activeHoursStart** The start of the active hours window. -- **updatePhase** The current state of the update process. -- **wuDeviceid** The device identifier. - - -### Microsoft.Windows.Update.Orchestrator.TerminatedByBatteryLevel - -This event is sent when update activity was stopped due to a low battery level. - -The following fields are available: - -- **batteryLevel** The current battery charge capacity. -- **batteryLevelThreshold** The battery capacity threshold to stop update activity. -- **updatePhase** The current state of the update process. -- **wuDeviceid** The device identifier. - - -### Microsoft.Windows.Update.Orchestrator.UnstickUpdate - -This event is sent when the update service orchestrator (USO) indicates that the update can be superseded by a newer update. - -The following fields are available: - -- **updateId** Identifier associated with the specific piece of content. -- **wuDeviceid** Unique device ID controlled by the software distribution client. - - -### Microsoft.Windows.Update.Orchestrator.UpdatePolicyCacheRefresh - -This event sends data on whether Update Management Policies were enabled on a device, to help keep Windows up to date. - -The following fields are available: - -- **configuredPoliciescount** Number of policies on the device. -- **policiesNamevaluesource** Policy name and source of policy (group policy, MDM or flight). -- **policyCacherefreshtime** Time when policy cache was refreshed. -- **updateInstalluxsetting** Indicates whether a user has set policies via a user experience option. -- **wuDeviceid** Unique device ID used by Windows Update. - - -### Microsoft.Windows.Update.Orchestrator.UpdateRebootRequired - -This event sends data about whether an update required a reboot to help keep Windows up to date. - -The following fields are available: - -- **flightID** The specific ID of the Windows Insider build the device is getting. -- **interactive** Indicates whether the reboot initiation stage of the update process was entered as a result of user action. -- **revisionNumber** Update revision number. -- **updateId** Update ID. -- **updateScenarioType** The update session type. -- **uxRebootstate** Indicates the exact state of the user experience at the time the required reboot was initiated to ensure the correct update process and experience is provided to keep Windows up to date. -- **wuDeviceid** Unique device ID used by Windows Update. - - -### Microsoft.Windows.Update.Orchestrator.updateSettingsFlushFailed - -This event sends information about an update that encountered problems and was not able to complete. - -The following fields are available: - -- **errorCode** The error code encountered. -- **wuDeviceid** The ID of the device in which the error occurred. - - -### Microsoft.Windows.Update.Orchestrator.UsoSession - -This event represents the state of the USO service at start and completion. - -The following fields are available: - -- **activeSessionid** A unique session GUID. -- **eventScenario** The state of the update action. -- **interactive** Is the USO session interactive? -- **lastErrorcode** The last error that was encountered. -- **lastErrorstate** The state of the update when the last error was encountered. -- **sessionType** A GUID that refers to the update session type. -- **updateScenarioType** A descriptive update session type. -- **wuDeviceid** The Windows Update device GUID. - - -### Microsoft.Windows.Update.Ux.MusNotification.EnhancedEngagedRebootUxState - -This event sends information about the configuration of Enhanced Direct-to-Engaged (eDTE), which includes values for the timing of how eDTE will progress through each phase of the reboot. - -The following fields are available: - -- **AcceptAutoModeLimit** The maximum number of days for a device to automatically enter Auto Reboot mode. -- **AutoToAutoFailedLimit** The maximum number of days for Auto Reboot mode to fail before a Reboot Failed dialog will be shown. -- **DeviceLocalTime** The date and time (based on the device date/time settings) the reboot mode changed. -- **EngagedModeLimit** The number of days to switch between DTE (Direct-to-Engaged) dialogs. -- **EnterAutoModeLimit** The maximum number of days a device can enter Auto Reboot mode. -- **ETag** The Entity Tag that represents the OneSettings version. -- **IsForcedEnabled** Identifies whether Forced Reboot mode is enabled for the device. -- **IsUltimateForcedEnabled** Identifies whether Ultimate Forced Reboot mode is enabled for the device. -- **OldestUpdateLocalTime** The date and time (based on the device date/time settings) this update’s reboot began pending. -- **RebootUxState** Identifies the reboot state: Engaged, Auto, Forced, UltimateForced. -- **RebootVersion** The version of the DTE (Direct-to-Engaged). -- **SkipToAutoModeLimit** The maximum number of days to switch to start while in Auto Reboot mode. -- **UpdateId** The ID of the update that is waiting for reboot to finish installation. -- **UpdateRevision** The revision of the update that is waiting for reboot to finish installation. - - -### Microsoft.Windows.Update.Ux.MusNotification.RebootNoLongerNeeded - -This event is sent when a security update has successfully completed. - -The following fields are available: - -- **UtcTime** The Coordinated Universal Time that the restart was no longer needed. - - -### Microsoft.Windows.Update.Ux.MusNotification.RebootScheduled - -This event sends basic information about scheduling an update-related reboot, to get security updates and to help keep Windows up-to-date. - -The following fields are available: - -- **activeHoursApplicable** Indicates whether Active Hours applies on this device. -- **IsEnhancedEngagedReboot** Indicates whether Enhanced reboot was enabled. -- **rebootArgument** Argument for the reboot task. It also represents specific reboot related action. -- **rebootOutsideOfActiveHours** True, if a reboot is scheduled outside of active hours. False, otherwise. -- **rebootScheduledByUser** True, if a reboot is scheduled by user. False, if a reboot is scheduled automatically. -- **rebootState** Current state of the reboot. -- **rebootUsingSmartScheduler** Indicates that the reboot is scheduled by SmartScheduler. -- **revisionNumber** Revision number of the OS. -- **scheduledRebootTime** Time scheduled for the reboot. -- **scheduledRebootTimeInUTC** Time scheduled for the reboot, in UTC. -- **updateId** Identifies which update is being scheduled. -- **wuDeviceid** The unique device ID used by Windows Update. - - -### Microsoft.Windows.Update.Ux.MusNotification.UxBrokerScheduledTask - -This event is sent when MUSE broker schedules a task. - -The following fields are available: - -- **TaskArgument** The arguments with which the task is scheduled. -- **TaskName** Name of the task. - - -### Microsoft.Windows.Update.Ux.MusUpdateSettings.RebootScheduled - -This event sends basic information for scheduling a device restart to install security updates. It's used to help keep Windows up to date. - -The following fields are available: - -- **activeHoursApplicable** Is the restart respecting Active Hours? -- **IsEnhancedEngagedReboot** TRUE if the reboot path is Enhanced Engaged. Otherwise, FALSE. -- **rebootArgument** The arguments that are passed to the OS for the restarted. -- **rebootOutsideOfActiveHours** Was the restart scheduled outside of Active Hours? -- **rebootScheduledByUser** Was the restart scheduled by the user? If the value is false, the restart was scheduled by the device. -- **rebootState** The state of the restart. -- **rebootUsingSmartScheduler** TRUE if the reboot should be performed by the Smart Scheduler. Otherwise, FALSE. -- **revisionNumber** The revision number of the OS being updated. -- **scheduledRebootTime** Time of the scheduled reboot -- **scheduledRebootTimeInUTC** Time of the scheduled restart, in Coordinated Universal Time. -- **updateId** The Windows Update device GUID. -- **wuDeviceid** The Windows Update device GUID. - - -## Windows Update mitigation events - -### Mitigation360Telemetry.MitigationCustom.CleanupSafeOsImages - -This event sends data specific to the CleanupSafeOsImages mitigation used for OS Updates. - -The following fields are available: - -- **ClientId** The client ID used by Windows Update. -- **FlightId** The ID of each Windows Insider build the device received. -- **InstanceId** A unique device ID that identifies each update instance. -- **MitigationScenario** The update scenario in which the mitigation was executed. -- **MountedImageCount** The number of mounted images. -- **MountedImageMatches** The number of mounted image matches. -- **MountedImagesFailed** The number of mounted images that could not be removed. -- **MountedImagesRemoved** The number of mounted images that were successfully removed. -- **MountedImagesSkipped** The number of mounted images that were not found. -- **RelatedCV** The correlation vector value generated from the latest USO scan. -- **Result** HResult of this operation. -- **ScenarioId** ID indicating the mitigation scenario. -- **ScenarioSupported** Indicates whether the scenario was supported. -- **SessionId** Unique value for each update attempt. -- **UpdateId** Unique ID for each Windows Update. -- **WuId** Unique ID for the Windows Update client. - - -### Mitigation360Telemetry.MitigationCustom.FixAppXReparsePoints - -This event sends data specific to the FixAppXReparsePoints mitigation used for OS updates. - -The following fields are available: - -- **ClientId** Unique identifier for each flight. -- **FlightId** Unique GUID that identifies each instances of setuphost.exe. -- **InstanceId** The update scenario in which the mitigation was executed. -- **MitigationScenario** Correlation vector value generated from the latest USO scan. -- **RelatedCV** Number of reparse points that are corrupted but we failed to fix them. -- **ReparsePointsFailed** Number of reparse points that were corrupted and were fixed by this mitigation. -- **ReparsePointsFixed** Number of reparse points that are not corrupted and no action is required. -- **ReparsePointsSkipped** HResult of this operation. -- **Result** ID indicating the mitigation scenario. -- **ScenarioId** Indicates whether the scenario was supported. -- **ScenarioSupported** Unique value for each update attempt. -- **SessionId** Unique ID for each Update. -- **UpdateId** Unique ID for the Windows Update client. -- **WuId** Unique ID for the Windows Update client. - - -### Mitigation360Telemetry.MitigationCustom.FixupEditionId - -This event sends data specific to the FixupEditionId mitigation used for OS updates. - -The following fields are available: - -- **ClientId** In the WU scenario, this will be the WU client ID that is passed to Setup. In Media setup, default value is Media360, but can be overwritten by the caller to a unique value. -- **EditionIdUpdated** Determine whether EditionId was changed. -- **FlightId** Unique identifier for each flight. -- **InstanceId** Unique GUID that identifies each instances of setuphost.exe. -- **MitigationScenario** The update scenario in which the mitigation was executed. -- **ProductEditionId** Expected EditionId value based on GetProductInfo. -- **ProductType** Value returned by GetProductInfo. -- **RegistryEditionId** EditionId value in the registry. -- **RelatedCV** Correlation vector value generated from the latest USO scan. -- **Result** HResult of this operation. -- **ScenarioId** ID indicating the mitigation scenario. -- **ScenarioSupported** Indicates whether the scenario was supported. -- **SessionId** Unique value for each update attempt. -- **UpdateId** Unique ID for each update. -- **WuId** Unique ID for the Windows Update client. - - -## Windows Update Reserve Manager events - -### Microsoft.Windows.UpdateReserveManager.CommitPendingHardReserveAdjustment - -This event is sent when the Update Reserve Manager commits a hard reserve adjustment that was pending. - -The following fields are available: - -- **FinalAdjustment** Final adjustment for the hard reserve following the addition or removal of optional content. -- **InitialAdjustment** Initial intended adjustment for the hard reserve following the addition/removal of optional content. - - -### Microsoft.Windows.UpdateReserveManager.FunctionReturnedError - -This event is sent when the Update Reserve Manager returns an error from one of its internal functions. - -The following fields are available: - -- **FailedExpression** The failed expression that was returned. -- **FailedFile** The binary file that contained the failed function. -- **FailedFunction** The name of the function that originated the failure. -- **FailedLine** The line number of the failure. -- **ReturnCode** The return code of the function. - - -### Microsoft.Windows.UpdateReserveManager.PrepareTIForReserveInitialization - -This event is sent when the Update Reserve Manager prepares the Trusted Installer to initialize reserves on the next boot. - -The following fields are available: - -- **Flags** The flags that are passed to the function to prepare the Trusted Installer for reserve initialization. - - -### Microsoft.Windows.UpdateReserveManager.RemovePendingHardReserveAdjustment - -This event is sent when the Update Reserve Manager removes a pending hard reserve adjustment. - - - -### Microsoft.Windows.UpdateReserveManager.UpdatePendingHardReserveAdjustment - -This event is sent when the Update Reserve Manager needs to adjust the size of the hard reserve after the option content is installed. - -The following fields are available: - -- **ChangeSize** The change in the hard reserve size based on the addition or removal of optional content. -- **PendingHardReserveAdjustment** The final change to the hard reserve size. -- **UpdateType** Indicates whether the change is an increase or decrease in the size of the hard reserve. - - -## Winlogon events - -### Microsoft.Windows.Security.Winlogon.SetupCompleteLogon - -This event signals the completion of the setup process. It happens only once during the first logon. - - - -## XBOX events - -### Microsoft.Xbox.XamTelemetry.AppActivationError - -This event indicates whether the system detected an activation error in the app. - -The following fields are available: - -- **ActivationUri** Activation URI (Uniform Resource Identifier) used in the attempt to activate the app. -- **AppId** The Xbox LIVE Title ID. -- **AppUserModelId** The AUMID (Application User Model ID) of the app to activate. -- **Result** The HResult error. -- **UserId** The Xbox LIVE User ID (XUID). - - -### Microsoft.Xbox.XamTelemetry.AppActivity - -This event is triggered whenever the current app state is changed by: launch, switch, terminate, snap, etc. - -The following fields are available: - -- **AppActionId** The ID of the application action. -- **AppCurrentVisibilityState** The ID of the current application visibility state. -- **AppId** The Xbox LIVE Title ID of the app. -- **AppPackageFullName** The full name of the application package. -- **AppPreviousVisibilityState** The ID of the previous application visibility state. -- **AppSessionId** The application session ID. -- **AppType** The type ID of the application (AppType_NotKnown, AppType_Era, AppType_Sra, AppType_Uwa). -- **BCACode** The BCA (Burst Cutting Area) mark code of the optical disc used to launch the application. -- **DurationMs** The amount of time (in milliseconds) since the last application state transition. -- **IsTrialLicense** This boolean value is TRUE if the application is on a trial license. -- **LicenseType** The type of licensed used to authorize the app (0 - Unknown, 1 - User, 2 - Subscription, 3 - Offline, 4 - Disc). -- **LicenseXuid** If the license type is 1 (User), this field contains the XUID (Xbox User ID) of the registered owner of the license. -- **ProductGuid** The Xbox product GUID (Globally-Unique ID) of the application. -- **UserId** The XUID (Xbox User ID) of the current user. - - - +--- +description: Use this article to learn more about what Windows diagnostic data is gathered at the basic level. +title: Windows 10, version 1809 basic diagnostic events and fields (Windows 10) +keywords: privacy, telemetry +ms.prod: w10 +ms.mktglfcycl: manage +ms.sitesec: library +ms.pagetype: security +localizationpriority: high +author: brianlic-msft +ms.author: brianlic +manager: dansimp +ms.collection: M365-security-compliance +ms.topic: article +audience: ITPro +ms.date: 03/04/2019 +--- + + +# Windows 10, version 1809 basic level Windows diagnostic events and fields + + **Applies to** + +- Windows 10, version 1809 + + +The Basic level gathers a limited set of information that is critical for understanding the device and its configuration including: basic device information, quality-related information, app compatibility, and Microsoft Store. When the level is set to Basic, it also includes the Security level information. + +The Basic level helps to identify problems that can occur on a particular device hardware or software configuration. For example, it can help determine if crashes are more frequent on devices with a specific amount of memory or that are running a particular driver version. This helps Microsoft fix operating system or app problems. + +Use this article to learn about diagnostic events, grouped by event area, and the fields within each event. A brief description is provided for each field. Every event generated includes common data, which collects device data. + +You can learn more about Windows functional and diagnostic data through these articles: + + +- [Windows 10, version 1803 basic diagnostic events and fields](basic-level-windows-diagnostic-events-and-fields-1803.md) +- [Windows 10, version 1709 basic diagnostic events and fields](basic-level-windows-diagnostic-events-and-fields-1709.md) +- [Windows 10, version 1703 basic diagnostic events and fields](basic-level-windows-diagnostic-events-and-fields-1703.md) +- [Manage connections from Windows operating system components to Microsoft services](manage-connections-from-windows-operating-system-components-to-microsoft-services.md) +- [Configure Windows diagnostic data in your organization](configure-windows-diagnostic-data-in-your-organization.md) + + + + +## Account trace logging provider events + +### Microsoft.Windows.Mitigation.AccountTraceLoggingProvider.General + +This event provides information about application properties to indicate the successful execution. + +The following fields are available: + +- **AppMode** Indicates the mode the app is being currently run around privileges. +- **ExitCode** Indicates the exit code of the app. +- **Help** Indicates if the app needs to be launched in the help mode. +- **ParseError** Indicates if there was a parse error during the execution. +- **RightsAcquired** Indicates if the right privileges were acquired for successful execution. +- **RightsWereEnabled** Indicates if the right privileges were enabled for successful execution. +- **TestMode** Indicates whether the app is being run in test mode. + + +### Microsoft.Windows.Mitigation.AccountTraceLoggingProvider.GetCount + +This event provides information about the properties of user accounts in the Administrator group. + +The following fields are available: + +- **Internal** Indicates the internal property associated with the count group. +- **LastError** The error code (if applicable) for the cause of the failure to get the count of the user account. +- **Result** The HResult error. + + +## AppLocker events + +### Microsoft.Windows.Security.AppLockerCSP.ActivityStoppedAutomatically + +Automatically closed activity for start/stop operations that aren't explicitly closed. + + + +### Microsoft.Windows.Security.AppLockerCSP.AddParams + +Parameters passed to Add function of the AppLockerCSP Node. + +The following fields are available: + +- **child** The child URI of the node to add. +- **uri** URI of the node relative to %SYSTEM32%/AppLocker. + + +### Microsoft.Windows.Security.AppLockerCSP.AddStart + +Start of "Add" Operation for the AppLockerCSP Node. + + + +### Microsoft.Windows.Security.AppLockerCSP.AddStop + +End of "Add" Operation for AppLockerCSP Node. + +The following fields are available: + +- **hr** The HRESULT returned by Add function in AppLockerCSP. + + +### Microsoft.Windows.Security.AppLockerCSP.CAppLockerCSP::Rollback + +Result of the 'Rollback' operation in AppLockerCSP. + +The following fields are available: + +- **oldId** Previous id for the CSP transaction. +- **txId** Current id for the CSP transaction. + + +### Microsoft.Windows.Security.AppLockerCSP.ClearParams + +Parameters passed to the "Clear" operation for AppLockerCSP. + +The following fields are available: + +- **uri** The URI relative to the %SYSTEM32%\AppLocker folder. + + +### Microsoft.Windows.Security.AppLockerCSP.ClearStart + +Start of the "Clear" operation for the AppLockerCSP Node. + + + +### Microsoft.Windows.Security.AppLockerCSP.ClearStop + +End of the "Clear" operation for the AppLockerCSP node. + +The following fields are available: + +- **hr** HRESULT reported at the end of the 'Clear' function. + + +### Microsoft.Windows.Security.AppLockerCSP.ConfigManagerNotificationStart + +Start of the "ConfigManagerNotification" operation for AppLockerCSP. + +The following fields are available: + +- **NotifyState** State sent by ConfigManager to AppLockerCSP. + + +### Microsoft.Windows.Security.AppLockerCSP.ConfigManagerNotificationStop + +End of the "ConfigManagerNotification" operation for AppLockerCSP. + +The following fields are available: + +- **hr** HRESULT returned by the ConfigManagerNotification function in AppLockerCSP. + + +### Microsoft.Windows.Security.AppLockerCSP.CreateNodeInstanceParams + +Parameters passed to the CreateNodeInstance function of the AppLockerCSP node. + +The following fields are available: + +- **NodeId** NodeId passed to CreateNodeInstance. +- **nodeOps** NodeOperations parameter passed to CreateNodeInstance. +- **uri** URI passed to CreateNodeInstance, relative to %SYSTEM32%\AppLocker. + + +### Microsoft.Windows.Security.AppLockerCSP.CreateNodeInstanceStart + +Start of the "CreateNodeInstance" operation for the AppLockerCSP node. + + + +### Microsoft.Windows.Security.AppLockerCSP.CreateNodeInstanceStop + +End of the "CreateNodeInstance" operation for the AppLockerCSP node + +The following fields are available: + +- **hr** HRESULT returned by the CreateNodeInstance function in AppLockerCSP. + + +### Microsoft.Windows.Security.AppLockerCSP.DeleteChildParams + +Parameters passed to the DeleteChild function of the AppLockerCSP node. + +The following fields are available: + +- **child** The child URI of the node to delete. +- **uri** URI relative to %SYSTEM32%\AppLocker. + + +### Microsoft.Windows.Security.AppLockerCSP.DeleteChildStart + +Start of the "DeleteChild" operation for the AppLockerCSP node. + + + +### Microsoft.Windows.Security.AppLockerCSP.DeleteChildStop + +End of the "DeleteChild" operation for the AppLockerCSP node. + +The following fields are available: + +- **hr** HRESULT returned by the DeleteChild function in AppLockerCSP. + + +### Microsoft.Windows.Security.AppLockerCSP.EnumPolicies + +Logged URI relative to %SYSTEM32%\AppLocker, if the Plugin GUID is null, or the CSP doesn't believe the old policy is present. + +The following fields are available: + +- **uri** URI relative to %SYSTEM32%\AppLocker. + + +### Microsoft.Windows.Security.AppLockerCSP.GetChildNodeNamesParams + +Parameters passed to the GetChildNodeNames function of the AppLockerCSP node. + +The following fields are available: + +- **uri** URI relative to %SYSTEM32%/AppLocker for MDM node. + + +### Microsoft.Windows.Security.AppLockerCSP.GetChildNodeNamesStart + +Start of the "GetChildNodeNames" operation for the AppLockerCSP node. + + + +### Microsoft.Windows.Security.AppLockerCSP.GetChildNodeNamesStop + +End of the "GetChildNodeNames" operation for the AppLockerCSP node. + +The following fields are available: + +- **child[0]** If function succeeded, the first child's name, else "NA". +- **count** If function succeeded, the number of child node names returned by the function, else 0. +- **hr** HRESULT returned by the GetChildNodeNames function of AppLockerCSP. + + +### Microsoft.Windows.Security.AppLockerCSP.GetLatestId + +The result of 'GetLatestId' in AppLockerCSP (the latest time stamped GUID). + +The following fields are available: + +- **dirId** The latest directory identifier found by GetLatestId. +- **id** The id returned by GetLatestId if id > 0 - otherwise the dirId parameter. + + +### Microsoft.Windows.Security.AppLockerCSP.HResultException + +HRESULT thrown by any arbitrary function in AppLockerCSP. + +The following fields are available: + +- **file** File in the OS code base in which the exception occurs. +- **function** Function in the OS code base in which the exception occurs. +- **hr** HRESULT that is reported. +- **line** Line in the file in the OS code base in which the exception occurs. + + +### Microsoft.Windows.Security.AppLockerCSP.SetValueParams + +Parameters passed to the SetValue function of the AppLockerCSP node. + +The following fields are available: + +- **dataLength** Length of the value to set. +- **uri** The node URI to that should contain the value, relative to %SYSTEM32%\AppLocker. + + +### Microsoft.Windows.Security.AppLockerCSP.SetValueStart + +Start of the "SetValue" operation for the AppLockerCSP node. + + + +### Microsoft.Windows.Security.AppLockerCSP.SetValueStop + +End of the "SetValue" operation for the AppLockerCSP node. + +The following fields are available: + +- **hr** HRESULT returned by the SetValue function in AppLockerCSP. + + +### Microsoft.Windows.Security.AppLockerCSP.TryRemediateMissingPolicies + +EntryPoint of fix step or policy remediation, includes URI relative to %SYSTEM32%\AppLocker that needs to be fixed. + +The following fields are available: + +- **uri** URI for node relative to %SYSTEM32%/AppLocker. + + +## Appraiser events + +### Microsoft.Windows.Appraiser.General.ChecksumTotalPictureCount + +This event lists the types of objects and how many of each exist on the client device. This allows for a quick way to ensure that the records present on the server match what is present on the client. + +The following fields are available: + +- **DatasourceApplicationFile_19ASetup** The count of the number of this particular object type present on this device. +- **DatasourceApplicationFile_19H1** The count of the number of this particular object type present on this device. +- **DatasourceApplicationFile_19H1Setup** The count of the number of this particular object type present on this device. +- **DatasourceApplicationFile_RS1** An ID for the system, calculated by hashing hardware identifiers. +- **DatasourceApplicationFile_RS2** An ID for the system, calculated by hashing hardware identifiers. +- **DatasourceApplicationFile_RS3** The count of the number of this particular object type present on this device. +- **DatasourceApplicationFile_RS3Setup** No content is currently available. +- **DatasourceApplicationFile_RS4** The count of the number of this particular object type present on this device. +- **DatasourceApplicationFile_RS4Setup** The count of the number of this particular object type present on this device. +- **DatasourceApplicationFile_RS5** The count of the number of this particular object type present on this device. +- **DatasourceApplicationFile_RS5Setup** The count of the number of this particular object type present on this device. +- **DatasourceApplicationFile_TH1** The count of the number of this particular object type present on this device. +- **DatasourceApplicationFile_TH2** The count of the number of this particular object type present on this device. +- **DatasourceDevicePnp_19ASetup** The count of the number of this particular object type present on this device. +- **DatasourceDevicePnp_19H1** The count of the number of this particular object type present on this device. +- **DatasourceDevicePnp_19H1Setup** The count of the number of this particular object type present on this device. +- **DatasourceDevicePnp_RS1** The total DataSourceDevicePnp objects targeting Windows 10 version 1607 on this device. +- **DatasourceDevicePnp_RS2** The count of the number of this particular object type present on this device. +- **DatasourceDevicePnp_RS3** The count of the number of this particular object type present on this device. +- **DatasourceDevicePnp_RS3Setup** The count of the number of this particular object type present on this device. +- **DatasourceDevicePnp_RS4** The count of the number of this particular object type present on this device. +- **DatasourceDevicePnp_RS4Setup** The count of the number of this particular object type present on this device. +- **DatasourceDevicePnp_RS5** The count of the number of this particular object type present on this device. +- **DatasourceDevicePnp_RS5Setup** The count of the number of this particular object type present on this device. +- **DatasourceDevicePnp_TH1** The count of the number of this particular object type present on this device. +- **DatasourceDevicePnp_TH2** The count of the number of this particular object type present on this device. +- **DatasourceDriverPackage_19ASetup** The count of the number of this particular object type present on this device. +- **DatasourceDriverPackage_19H1** The count of the number of this particular object type present on this device. +- **DatasourceDriverPackage_19H1Setup** The count of the number of this particular object type present on this device. +- **DatasourceDriverPackage_RS1** The total DataSourceDriverPackage objects targeting Windows 10 version 1607 on this device. +- **DatasourceDriverPackage_RS2** The total DataSourceDriverPackage objects targeting Windows 10, version 1703 on this device. +- **DatasourceDriverPackage_RS3** The count of the number of this particular object type present on this device. +- **DatasourceDriverPackage_RS3Setup** The count of the number of this particular object type present on this device. +- **DatasourceDriverPackage_RS4** The count of the number of this particular object type present on this device. +- **DatasourceDriverPackage_RS4Setup** The count of the number of this particular object type present on this device. +- **DatasourceDriverPackage_RS5** The count of the number of this particular object type present on this device. +- **DatasourceDriverPackage_RS5Setup** The count of the number of this particular object type present on this device. +- **DatasourceDriverPackage_TH1** The count of the number of this particular object type present on this device. +- **DatasourceDriverPackage_TH2** The count of the number of this particular object type present on this device. +- **DataSourceMatchingInfoBlock_19ASetup** The count of the number of this particular object type present on this device. +- **DataSourceMatchingInfoBlock_19H1** The count of the number of this particular object type present on this device. +- **DataSourceMatchingInfoBlock_19H1Setup** The count of the number of this particular object type present on this device. +- **DataSourceMatchingInfoBlock_RS1** The total DataSourceMatchingInfoBlock objects targeting Windows 10 version 1607 on this device. +- **DataSourceMatchingInfoBlock_RS2** The count of the number of this particular object type present on this device. +- **DataSourceMatchingInfoBlock_RS3** The count of the number of this particular object type present on this device. +- **DataSourceMatchingInfoBlock_RS3Setup** No content is currently available. +- **DataSourceMatchingInfoBlock_RS4** The count of the number of this particular object type present on this device. +- **DataSourceMatchingInfoBlock_RS4Setup** The count of the number of this particular object type present on this device. +- **DataSourceMatchingInfoBlock_RS5** The count of the number of this particular object type present on this device. +- **DataSourceMatchingInfoBlock_RS5Setup** The count of the number of this particular object type present on this device. +- **DataSourceMatchingInfoBlock_TH1** The count of the number of this particular object type present on this device. +- **DataSourceMatchingInfoBlock_TH2** The count of the number of this particular object type present on this device. +- **DataSourceMatchingInfoPassive_19ASetup** The count of the number of this particular object type present on this device. +- **DataSourceMatchingInfoPassive_19H1** The count of the number of this particular object type present on this device. +- **DataSourceMatchingInfoPassive_19H1Setup** The count of the number of this particular object type present on this device. +- **DataSourceMatchingInfoPassive_RS1** The total DataSourceMatchingInfoPassive objects targeting Windows 10 version 1607 on this device. +- **DataSourceMatchingInfoPassive_RS2** The count of the number of this particular object type present on this device. +- **DataSourceMatchingInfoPassive_RS3** The count of the number of this particular object type present on this device. +- **DataSourceMatchingInfoPassive_RS3Setup** No content is currently available. +- **DataSourceMatchingInfoPassive_RS4** The count of the number of this particular object type present on this device. +- **DataSourceMatchingInfoPassive_RS4Setup** The count of the number of this particular object type present on this device. +- **DataSourceMatchingInfoPassive_RS5** The count of the number of this particular object type present on this device. +- **DataSourceMatchingInfoPassive_RS5Setup** The count of the number of this particular object type present on this device. +- **DataSourceMatchingInfoPassive_TH1** The count of the number of this particular object type present on this device. +- **DataSourceMatchingInfoPassive_TH2** The count of the number of this particular object type present on this device. +- **DataSourceMatchingInfoPostUpgrade_19ASetup** The count of the number of this particular object type present on this device. +- **DataSourceMatchingInfoPostUpgrade_19H1** The count of the number of this particular object type present on this device. +- **DataSourceMatchingInfoPostUpgrade_19H1Setup** The count of the number of this particular object type present on this device. +- **DataSourceMatchingInfoPostUpgrade_RS1** The total DataSourceMatchingInfoPostUpgrade objects targeting Windows 10 version 1607 on this device. +- **DataSourceMatchingInfoPostUpgrade_RS2** The total DataSourceMatchingInfoPostUpgrade objects targeting Windows 10 version 1703 on this device. +- **DataSourceMatchingInfoPostUpgrade_RS3** The total DataSourceMatchingInfoPostUpgrade objects targeting Windows 10 version 1709 on this device. +- **DataSourceMatchingInfoPostUpgrade_RS3Setup** No content is currently available. +- **DataSourceMatchingInfoPostUpgrade_RS4** The count of the number of this particular object type present on this device. +- **DataSourceMatchingInfoPostUpgrade_RS4Setup** The count of the number of this particular object type present on this device. +- **DataSourceMatchingInfoPostUpgrade_RS5** The count of the number of this particular object type present on this device. +- **DataSourceMatchingInfoPostUpgrade_RS5Setup** The count of the number of this particular object type present on this device. +- **DataSourceMatchingInfoPostUpgrade_TH1** The count of the number of this particular object type present on this device. +- **DataSourceMatchingInfoPostUpgrade_TH2** The count of the number of this particular object type present on this device. +- **DatasourceSystemBios_19ASetup** The count of the number of this particular object type present on this device. +- **DatasourceSystemBios_19H1** The count of the number of this particular object type present on this device. +- **DatasourceSystemBios_19H1Setup** The count of the number of this particular object type present on this device. +- **DatasourceSystemBios_RS1** The total DatasourceSystemBios objects targeting Windows 10 version 1607 present on this device. +- **DatasourceSystemBios_RS2** The total DatasourceSystemBios objects targeting Windows 10 version 1703 present on this device. +- **DatasourceSystemBios_RS3** The total DatasourceSystemBios objects targeting Windows 10 version 1709 present on this device. +- **DatasourceSystemBios_RS3Setup** The count of the number of this particular object type present on this device. +- **DatasourceSystemBios_RS4** The count of the number of this particular object type present on this device. +- **DatasourceSystemBios_RS4Setup** The count of the number of this particular object type present on this device. +- **DatasourceSystemBios_RS5** The count of the number of this particular object type present on this device. +- **DatasourceSystemBios_RS5Setup** The count of the number of this particular object type present on this device. +- **DatasourceSystemBios_TH1** The count of the number of this particular object type present on this device. +- **DatasourceSystemBios_TH2** The count of the number of this particular object type present on this device. +- **DecisionApplicationFile_19ASetup** The count of the number of this particular object type present on this device. +- **DecisionApplicationFile_19H1** The count of the number of this particular object type present on this device. +- **DecisionApplicationFile_19H1Setup** The count of the number of this particular object type present on this device. +- **DecisionApplicationFile_RS1** The count of the number of this particular object type present on this device. +- **DecisionApplicationFile_RS2** The count of the number of this particular object type present on this device. +- **DecisionApplicationFile_RS3** The count of the number of this particular object type present on this device. +- **DecisionApplicationFile_RS3Setup** No content is currently available. +- **DecisionApplicationFile_RS4** The count of the number of this particular object type present on this device. +- **DecisionApplicationFile_RS4Setup** The count of the number of this particular object type present on this device. +- **DecisionApplicationFile_RS5** The count of the number of this particular object type present on this device. +- **DecisionApplicationFile_RS5Setup** The count of the number of this particular object type present on this device. +- **DecisionApplicationFile_TH1** The count of the number of this particular object type present on this device. +- **DecisionApplicationFile_TH2** The count of the number of this particular object type present on this device. +- **DecisionDevicePnp_19ASetup** The count of the number of this particular object type present on this device. +- **DecisionDevicePnp_19H1** The count of the number of this particular object type present on this device. +- **DecisionDevicePnp_19H1Setup** The count of the number of this particular object type present on this device. +- **DecisionDevicePnp_RS1** The total DecisionDevicePnp objects targeting Windows 10 version 1607 on this device. +- **DecisionDevicePnp_RS2** The count of the number of this particular object type present on this device. +- **DecisionDevicePnp_RS3** The count of the number of this particular object type present on this device. +- **DecisionDevicePnp_RS3Setup** The count of the number of this particular object type present on this device. +- **DecisionDevicePnp_RS4** The count of the number of this particular object type present on this device. +- **DecisionDevicePnp_RS4Setup** The count of the number of this particular object type present on this device. +- **DecisionDevicePnp_RS5** The count of the number of this particular object type present on this device. +- **DecisionDevicePnp_RS5Setup** The count of the number of this particular object type present on this device. +- **DecisionDevicePnp_TH1** The count of the number of this particular object type present on this device. +- **DecisionDevicePnp_TH2** The count of the number of this particular object type present on this device. +- **DecisionDriverPackage_19ASetup** The count of the number of this particular object type present on this device. +- **DecisionDriverPackage_19H1** The count of the number of this particular object type present on this device. +- **DecisionDriverPackage_19H1Setup** The count of the number of this particular object type present on this device. +- **DecisionDriverPackage_RS1** The total DecisionDriverPackage objects targeting Windows 10 version 1607 on this device. +- **DecisionDriverPackage_RS2** The count of the number of this particular object type present on this device. +- **DecisionDriverPackage_RS3** The count of the number of this particular object type present on this device. +- **DecisionDriverPackage_RS3Setup** The count of the number of this particular object type present on this device. +- **DecisionDriverPackage_RS4** The count of the number of this particular object type present on this device. +- **DecisionDriverPackage_RS4Setup** The count of the number of this particular object type present on this device. +- **DecisionDriverPackage_RS5** The count of the number of this particular object type present on this device. +- **DecisionDriverPackage_RS5Setup** The count of the number of this particular object type present on this device. +- **DecisionDriverPackage_TH1** The count of the number of this particular object type present on this device. +- **DecisionDriverPackage_TH2** The count of the number of this particular object type present on this device. +- **DecisionMatchingInfoBlock_19ASetup** The count of the number of this particular object type present on this device. +- **DecisionMatchingInfoBlock_19H1** The count of the number of this particular object type present on this device. +- **DecisionMatchingInfoBlock_19H1Setup** The count of the number of this particular object type present on this device. +- **DecisionMatchingInfoBlock_RS1** The total DecisionMatchingInfoBlock objects targeting Windows 10 version 1607 present on this device. +- **DecisionMatchingInfoBlock_RS2** The total DecisionMatchingInfoBlock objects targeting Windows 10 version 1703 present on this device. +- **DecisionMatchingInfoBlock_RS3** The total DecisionMatchingInfoBlock objects targeting Windows 10 version 1709 present on this device. +- **DecisionMatchingInfoBlock_RS3Setup** No content is currently available. +- **DecisionMatchingInfoBlock_RS4** The total DecisionMatchingInfoBlock objects targeting Windows 10 version 1803 present on this device. +- **DecisionMatchingInfoBlock_RS4Setup** The count of the number of this particular object type present on this device. +- **DecisionMatchingInfoBlock_RS5** The count of the number of this particular object type present on this device. +- **DecisionMatchingInfoBlock_RS5Setup** The count of the number of this particular object type present on this device. +- **DecisionMatchingInfoBlock_TH1** The count of the number of this particular object type present on this device. +- **DecisionMatchingInfoBlock_TH2** The count of the number of this particular object type present on this device. +- **DecisionMatchingInfoPassive_19ASetup** The count of the number of this particular object type present on this device. +- **DecisionMatchingInfoPassive_19H1** The count of the number of this particular object type present on this device. +- **DecisionMatchingInfoPassive_19H1Setup** The count of the number of this particular object type present on this device. +- **DecisionMatchingInfoPassive_RS1** The total DecisionMatchingInfoPassive objects targeting Windows 10 version 1607 on this device. +- **DecisionMatchingInfoPassive_RS2** The total DecisionMatchingInfoPassive objects targeting Windows 10 version 1703 on this device. +- **DecisionMatchingInfoPassive_RS3** The total DecisionMatchingInfoPassive objects targeting Windows 10 version 1803 on this device. +- **DecisionMatchingInfoPassive_RS3Setup** No content is currently available. +- **DecisionMatchingInfoPassive_RS4** The count of the number of this particular object type present on this device. +- **DecisionMatchingInfoPassive_RS4Setup** The count of the number of this particular object type present on this device. +- **DecisionMatchingInfoPassive_RS5** The count of the number of this particular object type present on this device. +- **DecisionMatchingInfoPassive_RS5Setup** The count of the number of this particular object type present on this device. +- **DecisionMatchingInfoPassive_TH1** The count of the number of this particular object type present on this device. +- **DecisionMatchingInfoPassive_TH2** The count of the number of this particular object type present on this device. +- **DecisionMatchingInfoPostUpgrade_19ASetup** The count of the number of this particular object type present on this device. +- **DecisionMatchingInfoPostUpgrade_19H1** The count of the number of this particular object type present on this device. +- **DecisionMatchingInfoPostUpgrade_19H1Setup** The count of the number of this particular object type present on this device. +- **DecisionMatchingInfoPostUpgrade_RS1** The total DecisionMatchingInfoPostUpgrade objects targeting Windows 10 version 1607 on this device. +- **DecisionMatchingInfoPostUpgrade_RS2** The total DecisionMatchingInfoPostUpgrade objects targeting Windows 10 version 1703 on this device. +- **DecisionMatchingInfoPostUpgrade_RS3** The total DecisionMatchingInfoPostUpgrade objects targeting Windows 10 version 1709 on this device. +- **DecisionMatchingInfoPostUpgrade_RS3Setup** No content is currently available. +- **DecisionMatchingInfoPostUpgrade_RS4** The count of the number of this particular object type present on this device. +- **DecisionMatchingInfoPostUpgrade_RS4Setup** The count of the number of this particular object type present on this device. +- **DecisionMatchingInfoPostUpgrade_RS5** The count of the number of this particular object type present on this device. +- **DecisionMatchingInfoPostUpgrade_RS5Setup** The count of the number of this particular object type present on this device. +- **DecisionMatchingInfoPostUpgrade_TH1** The count of the number of this particular object type present on this device. +- **DecisionMatchingInfoPostUpgrade_TH2** The count of the number of this particular object type present on this device. +- **DecisionMediaCenter_19ASetup** The count of the number of this particular object type present on this device. +- **DecisionMediaCenter_19H1** The count of the number of this particular object type present on this device. +- **DecisionMediaCenter_19H1Setup** The total DecisionMediaCenter objects targeting the next release of Windows on this device. +- **DecisionMediaCenter_RS1** The total DecisionMediaCenter objects targeting Windows 10 version 1607 present on this device. +- **DecisionMediaCenter_RS2** The total DecisionMediaCenter objects targeting Windows 10 version 1703 present on this device. +- **DecisionMediaCenter_RS3** The total DecisionMediaCenter objects targeting Windows 10 version 1709 present on this device. +- **DecisionMediaCenter_RS3Setup** No content is currently available. +- **DecisionMediaCenter_RS4** The total DecisionMediaCenter objects targeting Windows 10 version 1803 present on this device. +- **DecisionMediaCenter_RS4Setup** The count of the number of this particular object type present on this device. +- **DecisionMediaCenter_RS5** The count of the number of this particular object type present on this device. +- **DecisionMediaCenter_RS5Setup** The count of the number of this particular object type present on this device. +- **DecisionMediaCenter_TH1** The count of the number of this particular object type present on this device. +- **DecisionMediaCenter_TH2** The count of the number of this particular object type present on this device. +- **DecisionSystemBios_19ASetup** The total DecisionSystemBios objects targeting the next release of Windows on this device. +- **DecisionSystemBios_19H1** The count of the number of this particular object type present on this device. +- **DecisionSystemBios_19H1Setup** The total DecisionSystemBios objects targeting the next release of Windows on this device. +- **DecisionSystemBios_RS1** The total DecisionSystemBios objects targeting Windows 10 version 1607 on this device. +- **DecisionSystemBios_RS2** The total DecisionSystemBios objects targeting Windows 10 version 1703 on this device. +- **DecisionSystemBios_RS3** The total DecisionSystemBios objects targeting Windows 10 version 1709 on this device. +- **DecisionSystemBios_RS3Setup** The count of the number of this particular object type present on this device. +- **DecisionSystemBios_RS4** The total DecisionSystemBios objects targeting Windows 10 version, 1803 present on this device. +- **DecisionSystemBios_RS4Setup** The total DecisionSystemBios objects targeting the next release of Windows on this device. +- **DecisionSystemBios_RS5** The total DecisionSystemBios objects targeting the next release of Windows on this device. +- **DecisionSystemBios_RS5Setup** The total DecisionSystemBios objects targeting the next release of Windows on this device. +- **DecisionSystemBios_TH1** The count of the number of this particular object type present on this device. +- **DecisionSystemBios_TH2** The count of the number of this particular object type present on this device. +- **DecisionSystemProcessor_RS2** The count of the number of this particular object type present on this device. +- **DecisionTest_RS1** An ID for the system, calculated by hashing hardware identifiers. +- **InventoryApplicationFile** The count of the number of this particular object type present on this device. +- **InventoryDeviceContainer** A count of device container objects in cache. +- **InventoryDevicePnp** A count of device Plug and Play objects in cache. +- **InventoryDriverBinary** A count of driver binary objects in cache. +- **InventoryDriverPackage** A count of device objects in cache. +- **InventoryLanguagePack** The count of the number of this particular object type present on this device. +- **InventoryMediaCenter** The count of the number of this particular object type present on this device. +- **InventorySystemBios** The count of the number of this particular object type present on this device. +- **InventorySystemMachine** The count of the number of this particular object type present on this device. +- **InventorySystemProcessor** The count of the number of this particular object type present on this device. +- **InventoryTest** The count of the number of this particular object type present on this device. +- **InventoryUplevelDriverPackage** The count of the number of this particular object type present on this device. +- **PCFP** The count of the number of this particular object type present on this device. +- **SystemMemory** The count of the number of this particular object type present on this device. +- **SystemProcessorCompareExchange** The count of the number of this particular object type present on this device. +- **SystemProcessorLahfSahf** The count of the number of this particular object type present on this device. +- **SystemProcessorNx** The total number of objects of this type present on this device. +- **SystemProcessorPrefetchW** The total number of objects of this type present on this device. +- **SystemProcessorSse2** The total number of objects of this type present on this device. +- **SystemTouch** The count of the number of this particular object type present on this device. +- **SystemWim** The total number of objects of this type present on this device. +- **SystemWindowsActivationStatus** The count of the number of this particular object type present on this device. +- **SystemWlan** The total number of objects of this type present on this device. +- **Wmdrm_19ASetup** The count of the number of this particular object type present on this device. +- **Wmdrm_19H1** The count of the number of this particular object type present on this device. +- **Wmdrm_19H1Setup** The total Wmdrm objects targeting the next release of Windows on this device. +- **Wmdrm_RS1** An ID for the system, calculated by hashing hardware identifiers. +- **Wmdrm_RS2** An ID for the system, calculated by hashing hardware identifiers. +- **Wmdrm_RS3** An ID for the system, calculated by hashing hardware identifiers. +- **Wmdrm_RS3Setup** No content is currently available. +- **Wmdrm_RS4** The total Wmdrm objects targeting Windows 10, version 1803 present on this device. +- **Wmdrm_RS4Setup** The count of the number of this particular object type present on this device. +- **Wmdrm_RS5** The count of the number of this particular object type present on this device. +- **Wmdrm_RS5Setup** The count of the number of this particular object type present on this device. +- **Wmdrm_TH1** The count of the number of this particular object type present on this device. +- **Wmdrm_TH2** The count of the number of this particular object type present on this device. + + +### Microsoft.Windows.Appraiser.General.DatasourceApplicationFileAdd + +Represents the basic metadata about specific application files installed on the system. + +This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedeviceinventorychange). + +The following fields are available: + +- **AppraiserVersion** The version of the appraiser file that is generating the events. +- **AvDisplayName** If the app is an anti-virus app, this is its display name. +- **CompatModelIndex** The compatibility prediction for this file. +- **HasCitData** Indicates whether the file is present in CIT data. +- **HasUpgradeExe** Indicates whether the anti-virus app has an upgrade.exe file. +- **IsAv** Is the file an anti-virus reporting EXE? +- **ResolveAttempted** This will always be an empty string when sending telemetry. +- **SdbEntries** An array of fields that indicates the SDB entries that apply to this file. + + +### Microsoft.Windows.Appraiser.General.DatasourceApplicationFileRemove + +This event indicates that the DatasourceApplicationFile object is no longer present. + +This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedeviceinventorychange). + +The following fields are available: + +- **AppraiserVersion** The version of the Appraiser file that is generating the events. + + +### Microsoft.Windows.Appraiser.General.DatasourceApplicationFileStartSync + +This event indicates that a new set of DatasourceApplicationFileAdd events will be sent. + +This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedeviceinventorychange). + +The following fields are available: + +- **AppraiserVersion** The version of the Appraiser file that is generating the events. + + +### Microsoft.Windows.Appraiser.General.DatasourceDevicePnpAdd + +This event sends compatibility data for a Plug and Play device, to help keep Windows up to date. + +This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedeviceinventorychange). + +The following fields are available: + +- **ActiveNetworkConnection** Indicates whether the device is an active network device. +- **AppraiserVersion** The version of the appraiser file generating the events. +- **CosDeviceRating** An enumeration that indicates if there is a driver on the target operating system. +- **CosDeviceSolution** An enumeration that indicates how a driver on the target operating system is available. +- **CosDeviceSolutionUrl** Microsoft.Windows.Appraiser.General.DatasourceDevicePnpAdd . Empty string +- **CosPopulatedFromId** The expected uplevel driver matching ID based on driver coverage data. +- **IsBootCritical** Indicates whether the device boot is critical. +- **UplevelInboxDriver** Indicates whether there is a driver uplevel for this device. +- **WuDriverCoverage** Indicates whether there is a driver uplevel for this device, according to Windows Update. +- **WuDriverUpdateId** The Windows Update ID of the applicable uplevel driver. +- **WuPopulatedFromId** The expected uplevel driver matching ID based on driver coverage from Windows Update. + + +### Microsoft.Windows.Appraiser.General.DatasourceDevicePnpRemove + +This event indicates that the DatasourceDevicePnp object is no longer present. + +This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedeviceinventorychange). + +The following fields are available: + +- **AppraiserVersion** The version of the Appraiser file that is generating the events. + + +### Microsoft.Windows.Appraiser.General.DatasourceDevicePnpStartSync + +This event indicates that a new set of DatasourceDevicePnpAdd events will be sent. + +This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedeviceinventorychange). + +The following fields are available: + +- **AppraiserVersion** The version of the Appraiser file that is generating the events. + + +### Microsoft.Windows.Appraiser.General.DatasourceDriverPackageAdd + +This event sends compatibility database data about driver packages to help keep Windows up to date. + +This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedeviceinventorychange). + +The following fields are available: + +- **AppraiserVersion** The version of the appraiser file generating the events. + + +### Microsoft.Windows.Appraiser.General.DatasourceDriverPackageStartSync + +This event indicates that a new set of DatasourceDriverPackageAdd events will be sent. + +This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedeviceinventorychange). + +The following fields are available: + +- **AppraiserVersion** The version of the Appraiser file that is generating the events. + + +### Microsoft.Windows.Appraiser.General.DataSourceMatchingInfoBlockAdd + +This event sends blocking data about any compatibility blocking entries hit on the system that are not directly related to specific applications or devices, to help keep Windows up-to-date. + +This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedeviceinventorychange). + +The following fields are available: + +- **AppraiserVersion** The version of the appraiser file generating the events. + + +### Microsoft.Windows.Appraiser.General.DataSourceMatchingInfoBlockRemove + +This event indicates that the DataSourceMatchingInfoBlock object is no longer present. + +This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedeviceinventorychange). + +The following fields are available: + +- **AppraiserVersion** The version of the Appraiser file that is generating the events. + + +### Microsoft.Windows.Appraiser.General.DataSourceMatchingInfoBlockStartSync + +This event indicates that a full set of DataSourceMatchingInfoBlockStAdd events have been sent. + +This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedeviceinventorychange). + +The following fields are available: + +- **AppraiserVersion** The version of the Appraiser file that is generating the events. + + +### Microsoft.Windows.Appraiser.General.DataSourceMatchingInfoPassiveAdd + +This event sends compatibility database information about non-blocking compatibility entries on the system that are not keyed by either applications or devices, to help keep Windows up-to-date. + +This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedeviceinventorychange). + +The following fields are available: + +- **AppraiserVersion** The version of the appraiser file generating the events. + + +### Microsoft.Windows.Appraiser.General.DataSourceMatchingInfoPassiveRemove + +This event indicates that the DataSourceMatchingInfoPassive object is no longer present. + +This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedeviceinventorychange). + +The following fields are available: + +- **AppraiserVersion** The version of the Appraiser file that is generating the events. + + +### Microsoft.Windows.Appraiser.General.DataSourceMatchingInfoPassiveStartSync + +This event indicates that a new set of DataSourceMatchingInfoPassiveAdd events will be sent. + +This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedeviceinventorychange). + +The following fields are available: + +- **AppraiserVersion** The version of the Appraiser file that is generating the events. + + +### Microsoft.Windows.Appraiser.General.DataSourceMatchingInfoPostUpgradeAdd + +This event sends compatibility database information about entries requiring reinstallation after an upgrade on the system that are not keyed by either applications or devices, to help keep Windows up-to-date. + +This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedeviceinventorychange). + +The following fields are available: + +- **AppraiserVersion** The version of the appraiser file generating the events. + + +### Microsoft.Windows.Appraiser.General.DataSourceMatchingInfoPostUpgradeRemove + +This event indicates that the DataSourceMatchingInfoPostUpgrade object is no longer present. + +This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedeviceinventorychange). + +The following fields are available: + +- **AppraiserVersion** The version of the Appraiser file that is generating the events. + + +### Microsoft.Windows.Appraiser.General.DataSourceMatchingInfoPostUpgradeStartSync + +This event indicates that a new set of DataSourceMatchingInfoPostUpgradeAdd events will be sent. + +This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedeviceinventorychange). + +The following fields are available: + +- **AppraiserVersion** The version of the Appraiser file that is generating the events. + + +### Microsoft.Windows.Appraiser.General.DatasourceSystemBiosAdd + +This event sends compatibility database information about the BIOS to help keep Windows up-to-date. + +This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedeviceinventorychange). + +The following fields are available: + +- **AppraiserVersion** The version of the Appraiser file generating the events. + + +### Microsoft.Windows.Appraiser.General.DatasourceSystemBiosRemove + +This event indicates that the DatasourceSystemBios object is no longer present. + +This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedeviceinventorychange). + +The following fields are available: + +- **AppraiserVersion** The version of the Appraiser file that is generating the events. + + +### Microsoft.Windows.Appraiser.General.DatasourceSystemBiosStartSync + +This event indicates that a new set of DatasourceSystemBiosAdd events will be sent. + +This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedeviceinventorychange). + +The following fields are available: + +- **AppraiserVersion** The version of the Appraiser file that is generating the events. + + +### Microsoft.Windows.Appraiser.General.DecisionApplicationFileAdd + +This event sends compatibility decision data about a file to help keep Windows up-to-date. + +This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedeviceinventorychange). + +The following fields are available: + +- **AppraiserVersion** The version of the appraiser file that is generating the events. +- **BlockAlreadyInbox** The uplevel runtime block on the file already existed on the current OS. +- **BlockingApplication** Indicates whether there are any application issues that interfere with the upgrade due to the file in question. +- **DisplayGenericMessage** Will be a generic message be shown for this file? +- **DisplayGenericMessageGated** Indicates whether a generic message be shown for this file. +- **HardBlock** This file is blocked in the SDB. +- **HasUxBlockOverride** Does the file have a block that is overridden by a tag in the SDB? +- **MigApplication** Does the file have a MigXML from the SDB associated with it that applies to the current upgrade mode? +- **MigRemoval** Does the file have a MigXML from the SDB that will cause the app to be removed on upgrade? +- **NeedsDismissAction** Will the file cause an action that can be dimissed? +- **NeedsInstallPostUpgradeData** After upgrade, the file will have a post-upgrade notification to install a replacement for the app. +- **NeedsNotifyPostUpgradeData** Does the file have a notification that should be shown after upgrade? +- **NeedsReinstallPostUpgradeData** After upgrade, this file will have a post-upgrade notification to reinstall the app. +- **NeedsUninstallAction** The file must be uninstalled to complete the upgrade. +- **SdbBlockUpgrade** The file is tagged as blocking upgrade in the SDB, +- **SdbBlockUpgradeCanReinstall** The file is tagged as blocking upgrade in the SDB. It can be reinstalled after upgrade. +- **SdbBlockUpgradeUntilUpdate** The file is tagged as blocking upgrade in the SDB. If the app is updated, the upgrade can proceed. +- **SdbReinstallUpgrade** The file is tagged as needing to be reinstalled after upgrade in the SDB. It does not block upgrade. +- **SdbReinstallUpgradeWarn** The file is tagged as needing to be reinstalled after upgrade with a warning in the SDB. It does not block upgrade. +- **SoftBlock** The file is softblocked in the SDB and has a warning. + + +### Microsoft.Windows.Appraiser.General.DecisionApplicationFileRemove + +This event indicates Indicates that the DecisionApplicationFile object is no longer present. + +This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedeviceinventorychange). + +The following fields are available: + +- **AppraiserVersion** The version of the Appraiser file that is generating the events. + + +### Microsoft.Windows.Appraiser.General.DecisionApplicationFileStartSync + +This event indicates that a new set of DecisionApplicationFileAdd events will be sent. + +This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedeviceinventorychange). + +The following fields are available: + +- **AppraiserVersion** The version of the Appraiser file that is generating the events. + + +### Microsoft.Windows.Appraiser.General.DecisionDevicePnpAdd + +This event sends compatibility decision data about a PNP device to help keep Windows up to date. + +This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedeviceinventorychange). + +The following fields are available: + +- **AppraiserVersion** The version of the appraiser file generating the events. +- **AssociatedDriverIsBlocked** Is the driver associated with this PNP device blocked? +- **AssociatedDriverWillNotMigrate** Will the driver associated with this plug-and-play device migrate? +- **BlockAssociatedDriver** Should the driver associated with this PNP device be blocked? +- **BlockingDevice** Is this PNP device blocking upgrade? +- **BlockUpgradeIfDriverBlocked** Is the PNP device both boot critical and does not have a driver included with the OS? +- **BlockUpgradeIfDriverBlockedAndOnlyActiveNetwork** Is this PNP device the only active network device? +- **DisplayGenericMessage** Will a generic message be shown during Setup for this PNP device? +- **DisplayGenericMessageGated** Indicates whether a generic message will be shown during Setup for this PNP device. +- **DriverAvailableInbox** Is a driver included with the operating system for this PNP device? +- **DriverAvailableOnline** Is there a driver for this PNP device on Windows Update? +- **DriverAvailableUplevel** Is there a driver on Windows Update or included with the operating system for this PNP device? +- **DriverBlockOverridden** Is there is a driver block on the device that has been overridden? +- **NeedsDismissAction** Will the user would need to dismiss a warning during Setup for this device? +- **NotRegressed** Does the device have a problem code on the source OS that is no better than the one it would have on the target OS? +- **SdbDeviceBlockUpgrade** Is there an SDB block on the PNP device that blocks upgrade? +- **SdbDriverBlockOverridden** Is there an SDB block on the PNP device that blocks upgrade, but that block was overridden? + + +### Microsoft.Windows.Appraiser.General.DecisionDevicePnpRemove + +This event indicates that the DecisionDevicePnp object is no longer present. + +This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedeviceinventorychange). + +The following fields are available: + +- **AppraiserVersion** The version of the Appraiser file that is generating the events. + + +### Microsoft.Windows.Appraiser.General.DecisionDevicePnpStartSync + +The DecisionDevicePnpStartSync event indicates that a new set of DecisionDevicePnpAdd events will be sent. + +This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedeviceinventorychange). + +The following fields are available: + +- **AppraiserVersion** The version of the Appraiser file that is generating the events. + + +### Microsoft.Windows.Appraiser.General.DecisionDriverPackageAdd + +This event sends decision data about driver package compatibility to help keep Windows up to date. + +This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedeviceinventorychange). + +The following fields are available: + +- **AppraiserVersion** The version of the appraiser file generating the events. +- **DisplayGenericMessageGated** Indicates whether a generic offer block message will be shown for this driver package. +- **DriverBlockOverridden** Does the driver package have an SDB block that blocks it from migrating, but that block has been overridden? +- **DriverIsDeviceBlocked** Was the driver package was blocked because of a device block? +- **DriverIsDriverBlocked** Is the driver package blocked because of a driver block? +- **DriverIsTroubleshooterBlocked** Indicates whether the driver package is blocked because of a troubleshooter block. +- **DriverShouldNotMigrate** Should the driver package be migrated during upgrade? +- **SdbDriverBlockOverridden** Does the driver package have an SDB block that blocks it from migrating, but that block has been overridden? + + +### Microsoft.Windows.Appraiser.General.DecisionDriverPackageRemove + +This event indicates that the DecisionDriverPackage object is no longer present. + +This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedeviceinventorychange). + +The following fields are available: + +- **AppraiserVersion** The version of the Appraiser file that is generating the events. + + +### Microsoft.Windows.Appraiser.General.DecisionDriverPackageStartSync + +This event indicates that a new set of DecisionDriverPackageAdd events will be sent. + +This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedeviceinventorychange). + +The following fields are available: + +- **AppraiserVersion** The version of the Appraiser file that is generating the events. + + +### Microsoft.Windows.Appraiser.General.DecisionMatchingInfoBlockAdd + +This event sends compatibility decision data about blocking entries on the system that are not keyed by either applications or devices, to help keep Windows up to date. + +This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedeviceinventorychange). + +The following fields are available: + +- **AppraiserVersion** The version of the appraiser file generating the events. +- **BlockingApplication** Are there are any application issues that interfere with upgrade due to matching info blocks? +- **DisplayGenericMessage** Will a generic message be shown for this block? +- **NeedsUninstallAction** Does the user need to take an action in setup due to a matching info block? +- **SdbBlockUpgrade** Is a matching info block blocking upgrade? +- **SdbBlockUpgradeCanReinstall** Is a matching info block blocking upgrade, but has the can reinstall tag? +- **SdbBlockUpgradeUntilUpdate** Is a matching info block blocking upgrade but has the until update tag? + + +### Microsoft.Windows.Appraiser.General.DecisionMatchingInfoBlockRemove + +This event indicates that the DecisionMatchingInfoBlock object is no longer present. + +This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedeviceinventorychange). + +The following fields are available: + +- **AppraiserVersion** The version of the Appraiser file that is generating the events. + + +### Microsoft.Windows.Appraiser.General.DecisionMatchingInfoBlockStartSync + +This event indicates that a new set of DecisionMatchingInfoBlockAdd events will be sent. + +This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedeviceinventorychange). + +The following fields are available: + +- **AppraiserVersion** The version of the Appraiser file that is generating the events. + + +### Microsoft.Windows.Appraiser.General.DecisionMatchingInfoPassiveAdd + +This event sends compatibility decision data about non-blocking entries on the system that are not keyed by either applications or devices, to help keep Windows up to date. + +This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedeviceinventorychange). + +The following fields are available: + +- **AppraiserVersion** The version of the Appraiser file that is generating the events. +- **BlockingApplication** Are there any application issues that interfere with upgrade due to matching info blocks? +- **DisplayGenericMessageGated** Indicates whether a generic offer block message will be shown due to matching info blocks. +- **MigApplication** Is there a matching info block with a mig for the current mode of upgrade? + + +### Microsoft.Windows.Appraiser.General.DecisionMatchingInfoPassiveRemove + +This event Indicates that the DecisionMatchingInfoPassive object is no longer present. + +This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedeviceinventorychange). + +The following fields are available: + +- **AppraiserVersion** The version of the Appraiser file that is generating the events. + + +### Microsoft.Windows.Appraiser.General.DecisionMatchingInfoPassiveStartSync + +This event indicates that a new set of DecisionMatchingInfoPassiveAdd events will be sent. + +This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedeviceinventorychange). + +The following fields are available: + +- **AppraiserVersion** The version of the Appraiser file that is generating the events. + + +### Microsoft.Windows.Appraiser.General.DecisionMatchingInfoPostUpgradeAdd + +This event sends compatibility decision data about entries that require reinstall after upgrade. It's used to help keep Windows up to date. + +This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedeviceinventorychange). + +The following fields are available: + +- **AppraiserVersion** The version of the Appraiser file that is generating the events. +- **NeedsInstallPostUpgradeData** Will the file have a notification after upgrade to install a replacement for the app? +- **NeedsNotifyPostUpgradeData** Should a notification be shown for this file after upgrade? +- **NeedsReinstallPostUpgradeData** Will the file have a notification after upgrade to reinstall the app? +- **SdbReinstallUpgrade** The file is tagged as needing to be reinstalled after upgrade in the compatibility database (but is not blocking upgrade). + + +### Microsoft.Windows.Appraiser.General.DecisionMatchingInfoPostUpgradeRemove + +This event indicates that the DecisionMatchingInfoPostUpgrade object is no longer present. + +This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedeviceinventorychange). + +The following fields are available: + +- **AppraiserVersion** The version of the Appraiser file that is generating the events. + + +### Microsoft.Windows.Appraiser.General.DecisionMatchingInfoPostUpgradeStartSync + +This event indicates that a new set of DecisionMatchingInfoPostUpgradeAdd events will be sent. + +This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedeviceinventorychange). + +The following fields are available: + +- **AppraiserVersion** The version of the Appraiser file that is generating the events. + + +### Microsoft.Windows.Appraiser.General.DecisionMediaCenterAdd + +This event sends decision data about the presence of Windows Media Center, to help keep Windows up to date. + +This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedeviceinventorychange). + +The following fields are available: + +- **AppraiserVersion** The version of the Appraiser file generating the events. +- **BlockingApplication** Is there any application issues that interfere with upgrade due to Windows Media Center? +- **MediaCenterActivelyUsed** If Windows Media Center is supported on the edition, has it been run at least once and are the MediaCenterIndicators are true? +- **MediaCenterIndicators** Do any indicators imply that Windows Media Center is in active use? +- **MediaCenterInUse** Is Windows Media Center actively being used? +- **MediaCenterPaidOrActivelyUsed** Is Windows Media Center actively being used or is it running on a supported edition? +- **NeedsDismissAction** Are there any actions that can be dismissed coming from Windows Media Center? + + +### Microsoft.Windows.Appraiser.General.DecisionMediaCenterRemove + +This event indicates that the DecisionMediaCenter object is no longer present. + +This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedeviceinventorychange). + +The following fields are available: + +- **AppraiserVersion** The version of the Appraiser file that is generating the events. + + +### Microsoft.Windows.Appraiser.General.DecisionMediaCenterStartSync + +This event indicates that a new set of DecisionMediaCenterAdd events will be sent. + +This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedeviceinventorychange). + +The following fields are available: + +- **AppraiserVersion** The version of the Appraiser file that is generating the events. + + +### Microsoft.Windows.Appraiser.General.DecisionSystemBiosAdd + +This event sends compatibility decision data about the BIOS to help keep Windows up to date. + +This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedeviceinventorychange). + +The following fields are available: + +- **AppraiserVersion** The version of the Appraiser file generating the events. +- **Blocking** Is the device blocked from upgrade due to a BIOS block? +- **DisplayGenericMessageGated** Indicates whether a generic offer block message will be shown for the bios. +- **HasBiosBlock** Does the device have a BIOS block? + + +### Microsoft.Windows.Appraiser.General.DecisionSystemBiosRemove + +This event indicates that the DecisionSystemBios object is no longer present. + +This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedeviceinventorychange). + +The following fields are available: + +- **AppraiserVersion** The version of the Appraiser file that is generating the events. + + +### Microsoft.Windows.Appraiser.General.DecisionSystemBiosStartSync + +This event indicates that a new set of DecisionSystemBiosAdd events will be sent. + +This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedeviceinventorychange). + +The following fields are available: + +- **AppraiserVersion** The version of the Appraiser file that is generating the events. + + +### Microsoft.Windows.Appraiser.General.GatedRegChange + +This event sends data about the results of running a set of quick-blocking instructions, to help keep Windows up to date. + +The following fields are available: + +- **NewData** The data in the registry value after the scan completed. +- **OldData** The previous data in the registry value before the scan ran. +- **PCFP** An ID for the system calculated by hashing hardware identifiers. +- **RegKey** The registry key name for which a result is being sent. +- **RegValue** The registry value for which a result is being sent. +- **Time** The client time of the event. + + +### Microsoft.Windows.Appraiser.General.InventoryApplicationFileAdd + +This event represents the basic metadata about a file on the system. The file must be part of an app and either have a block in the compatibility database or be part of an antivirus program. + +This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedeviceinventorychange). + +The following fields are available: + +- **AppraiserVersion** The version of the Appraiser file generating the events. +- **AvDisplayName** If the app is an antivirus app, this is its display name. +- **AvProductState** Indicates whether the antivirus program is turned on and the signatures are up to date. +- **BinaryType** A binary type. Example: UNINITIALIZED, ZERO_BYTE, DATA_ONLY, DOS_MODULE, NE16_MODULE, PE32_UNKNOWN, PE32_I386, PE32_ARM, PE64_UNKNOWN, PE64_AMD64, PE64_ARM64, PE64_IA64, PE32_CLR_32, PE32_CLR_IL, PE32_CLR_IL_PREFER32, PE64_CLR_64. +- **BinFileVersion** An attempt to clean up FileVersion at the client that tries to place the version into 4 octets. +- **BinProductVersion** An attempt to clean up ProductVersion at the client that tries to place the version into 4 octets. +- **BoeProgramId** If there is no entry in Add/Remove Programs, this is the ProgramID that is generated from the file metadata. +- **CompanyName** The company name of the vendor who developed this file. +- **FileId** A hash that uniquely identifies a file. +- **FileVersion** The File version field from the file metadata under Properties -> Details. +- **HasUpgradeExe** Indicates whether the antivirus app has an upgrade.exe file. +- **IsAv** Indicates whether the file an antivirus reporting EXE. +- **LinkDate** The date and time that this file was linked on. +- **LowerCaseLongPath** The full file path to the file that was inventoried on the device. +- **Name** The name of the file that was inventoried. +- **ProductName** The Product name field from the file metadata under Properties -> Details. +- **ProductVersion** The Product version field from the file metadata under Properties -> Details. +- **ProgramId** A hash of the Name, Version, Publisher, and Language of an application used to identify it. +- **Size** The size of the file (in hexadecimal bytes). + + +### Microsoft.Windows.Appraiser.General.InventoryApplicationFileRemove + +This event indicates that the InventoryApplicationFile object is no longer present. + +This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedeviceinventorychange). + +The following fields are available: + +- **AppraiserVersion** The version of the Appraiser file that is generating the events. + + +### Microsoft.Windows.Appraiser.General.InventoryApplicationFileStartSync + +This event indicates indicates that a new set of InventoryApplicationFileAdd events will be sent. + +This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedeviceinventorychange). + +The following fields are available: + +- **AppraiserVersion** The version of the Appraiser file that is generating the events. + + +### Microsoft.Windows.Appraiser.General.InventoryLanguagePackAdd + +This event sends data about the number of language packs installed on the system, to help keep Windows up to date. + +This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedeviceinventorychange). + +The following fields are available: + +- **AppraiserVersion** The version of the Appraiser file that is generating the events. +- **HasLanguagePack** Indicates whether this device has 2 or more language packs. +- **LanguagePackCount** The number of language packs are installed. + + +### Microsoft.Windows.Appraiser.General.InventoryLanguagePackRemove + +This event indicates that the InventoryLanguagePack object is no longer present. + +This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedeviceinventorychange). + +The following fields are available: + +- **AppraiserVersion** The version of the Appraiser file that is generating the events. + + +### Microsoft.Windows.Appraiser.General.InventoryLanguagePackStartSync + +This event indicates that a new set of InventoryLanguagePackAdd events will be sent. + +This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedeviceinventorychange). + +The following fields are available: + +- **AppraiserVersion** The version of the Appraiser file that is generating the events. + + +### Microsoft.Windows.Appraiser.General.InventoryMediaCenterAdd + +This event sends true/false data about decision points used to understand whether Windows Media Center is used on the system, to help keep Windows up to date. + +This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedeviceinventorychange). + +The following fields are available: + +- **AppraiserVersion** The version of the Appraiser file generating the events. +- **EverLaunched** Has Windows Media Center ever been launched? +- **HasConfiguredTv** Has the user configured a TV tuner through Windows Media Center? +- **HasExtendedUserAccounts** Are any Windows Media Center Extender user accounts configured? +- **HasWatchedFolders** Are any folders configured for Windows Media Center to watch? +- **IsDefaultLauncher** Is Windows Media Center the default app for opening music or video files? +- **IsPaid** Is the user running a Windows Media Center edition that implies they paid for Windows Media Center? +- **IsSupported** Does the running OS support Windows Media Center? + + +### Microsoft.Windows.Appraiser.General.InventoryMediaCenterRemove + +This event indicates that the InventoryMediaCenter object is no longer present. + +This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedeviceinventorychange). + +The following fields are available: + +- **AppraiserVersion** The version of the Appraiser file that is generating the events. + + +### Microsoft.Windows.Appraiser.General.InventoryMediaCenterStartSync + +This event indicates that a new set of InventoryMediaCenterAdd events will be sent. + +This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedeviceinventorychange). + +The following fields are available: + +- **AppraiserVersion** The version of the Appraiser file that is generating the events. + + +### Microsoft.Windows.Appraiser.General.InventorySystemBiosAdd + +This event sends basic metadata about the BIOS to determine whether it has a compatibility block. + +This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedeviceinventorychange). + +The following fields are available: + +- **AppraiserVersion** The version of the Appraiser file that is generating the events. +- **biosDate** The release date of the BIOS in UTC format. +- **BiosDate** The release date of the BIOS in UTC format. +- **biosName** The name field from Win32_BIOS. +- **BiosName** The name field from Win32_BIOS. +- **manufacturer** The manufacturer field from Win32_ComputerSystem. +- **Manufacturer** The manufacturer field from Win32_ComputerSystem. +- **model** The model field from Win32_ComputerSystem. +- **Model** The model field from Win32_ComputerSystem. + + +### Microsoft.Windows.Appraiser.General.InventorySystemBiosRemove + +This event indicates that the InventorySystemBios object is no longer present. + +This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedeviceinventorychange). + +The following fields are available: + +- **AppraiserVersion** The version of the Appraiser file that is generating the events. + + +### Microsoft.Windows.Appraiser.General.InventorySystemBiosStartSync + +This event indicates that a new set of InventorySystemBiosAdd events will be sent. + +This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedeviceinventorychange). + +The following fields are available: + +- **AppraiserVersion** The version of the Appraiser file that is generating the events. + + +### Microsoft.Windows.Appraiser.General.InventoryUplevelDriverPackageAdd + +This event is only runs during setup. It provides a listing of the uplevel driver packages that were downloaded before the upgrade. Is critical to understanding if failures in setup can be traced to not having sufficient uplevel drivers before the upgrade. + +This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedeviceinventorychange). + +The following fields are available: + +- **AppraiserVersion** The version of the Appraiser file that is generating the events. +- **BootCritical** Is the driver package marked as boot critical? +- **Build** The build value from the driver package. +- **CatalogFile** The name of the catalog file within the driver package. +- **Class** The device class from the driver package. +- **ClassGuid** The device class unique ID from the driver package. +- **Date** The date from the driver package. +- **Inbox** Is the driver package of a driver that is included with Windows? +- **OriginalName** The original name of the INF file before it was renamed. Generally a path under $WINDOWS.~BT\Drivers\DU. +- **Provider** The provider of the driver package. +- **PublishedName** The name of the INF file after it was renamed. +- **Revision** The revision of the driver package. +- **SignatureStatus** Indicates if the driver package is signed. Unknown = 0, Unsigned = 1, Signed = 2. +- **VersionMajor** The major version of the driver package. +- **VersionMinor** The minor version of the driver package. + + +### Microsoft.Windows.Appraiser.General.InventoryUplevelDriverPackageRemove + +This event indicates that the InventoryUplevelDriverPackage object is no longer present. + +This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedeviceinventorychange). + +The following fields are available: + +- **AppraiserVersion** The version of the Appraiser file that is generating the events. + + +### Microsoft.Windows.Appraiser.General.InventoryUplevelDriverPackageStartSync + +This event indicates that a new set of InventoryUplevelDriverPackageAdd events will be sent. + +This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedeviceinventorychange). + +The following fields are available: + +- **AppraiserVersion** The version of the Appraiser file that is generating the events. + + +### Microsoft.Windows.Appraiser.General.RunContext + +This event indicates what should be expected in the data payload. + +The following fields are available: + +- **AppraiserBranch** The source branch in which the currently running version of Appraiser was built. +- **AppraiserProcess** The name of the process that launched Appraiser. +- **AppraiserVersion** The version of the Appraiser file generating the events. +- **CensusId** A unique hardware identifier. +- **Context** Indicates what mode Appraiser is running in. Example: Setup or Telemetry. +- **PCFP** An ID for the system calculated by hashing hardware identifiers. +- **Subcontext** Indicates what categories of incompatibilities appraiser is scanning for. Can be N/A, Resolve, or a semicolon-delimited list that can include App, Dev, Sys, Gat, or Rescan. +- **Time** The client time of the event. + + +### Microsoft.Windows.Appraiser.General.SystemMemoryAdd + +This event sends data on the amount of memory on the system and whether it meets requirements, to help keep Windows up-to-date. + +This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedeviceinventorychange). + +The following fields are available: + +- **AppraiserVersion** The version of the Appraiser file generating the events. +- **Blocking** Is the device from upgrade due to memory restrictions? +- **MemoryRequirementViolated** Was a memory requirement violated? +- **pageFile** The current committed memory limit for the system or the current process, whichever is smaller (in bytes). +- **ram** The amount of memory on the device. +- **ramKB** The amount of memory (in KB). +- **virtual** The size of the user-mode portion of the virtual address space of the calling process (in bytes). +- **virtualKB** The amount of virtual memory (in KB). + + +### Microsoft.Windows.Appraiser.General.SystemMemoryRemove + +This event that the SystemMemory object is no longer present. + +This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedeviceinventorychange). + +The following fields are available: + +- **AppraiserVersion** The version of the Appraiser file that is generating the events. + + +### Microsoft.Windows.Appraiser.General.SystemMemoryStartSync + +This event indicates that a new set of SystemMemoryAdd events will be sent. + +This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedeviceinventorychange). + +The following fields are available: + +- **AppraiserVersion** The version of the Appraiser file that is generating the events. + + +### Microsoft.Windows.Appraiser.General.SystemProcessorCompareExchangeAdd + +This event sends data indicating whether the system supports the CompareExchange128 CPU requirement, to help keep Windows up to date. + +This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedeviceinventorychange). + +The following fields are available: + +- **AppraiserVersion** The version of the Appraiser file generating the events. +- **Blocking** Is the upgrade blocked due to the processor? +- **CompareExchange128Support** Does the CPU support CompareExchange128? +- **CompareExchange128Swpport** No content is currently available. + + +### Microsoft.Windows.Appraiser.General.SystemProcessorCompareExchangeRemove + +This event indicates that the SystemProcessorCompareExchange object is no longer present. + +This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedeviceinventorychange). + +The following fields are available: + +- **AppraiserVersion** The version of the Appraiser file that is generating the events. + + +### Microsoft.Windows.Appraiser.General.SystemProcessorCompareExchangeStartSync + +This event indicates that a new set of SystemProcessorCompareExchangeAdd events will be sent. + +This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedeviceinventorychange). + +The following fields are available: + +- **AppraiserVersion** The version of the Appraiser file that is generating the events. + + +### Microsoft.Windows.Appraiser.General.SystemProcessorLahfSahfAdd + +This event sends data indicating whether the system supports the LahfSahf CPU requirement, to help keep Windows up-to-date. + +This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedeviceinventorychange). + +The following fields are available: + +- **AppraiserVersion** The version of the Appraiser file generating the events. +- **Blocking** Is the upgrade blocked due to the processor? +- **LahfSahfSupport** Does the CPU support LAHF/SAHF? + + +### Microsoft.Windows.Appraiser.General.SystemProcessorLahfSahfRemove + +This event indicates that the SystemProcessorLahfSahf object is no longer present. + +This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedeviceinventorychange). + +The following fields are available: + +- **AppraiserVersion** The version of the Appraiser file that is generating the events. + + +### Microsoft.Windows.Appraiser.General.SystemProcessorLahfSahfStartSync + +This event indicates that a new set of SystemProcessorLahfSahfAdd events will be sent. + +This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedeviceinventorychange). + +The following fields are available: + +- **AppraiserVersion** The version of the Appraiser file that is generating the events. + + +### Microsoft.Windows.Appraiser.General.SystemProcessorNxAdd + +This event sends data indicating whether the system supports the NX CPU requirement, to help keep Windows up-to-date. + +This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedeviceinventorychange). + +The following fields are available: + +- **AppraiserVersion** The version of the Appraiser file that is generating the events. +- **Blocking** Is the upgrade blocked due to the processor? +- **NXDriverResult** The result of the driver used to do a non-deterministic check for NX support. +- **NXProcessorSupport** Does the processor support NX? + + +### Microsoft.Windows.Appraiser.General.SystemProcessorNxRemove + +This event indicates that the SystemProcessorNx object is no longer present. + +This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedeviceinventorychange). + +The following fields are available: + +- **AppraiserVersion** The version of the Appraiser file that is generating the events. + + +### Microsoft.Windows.Appraiser.General.SystemProcessorNxStartSync + +This event indicates that a new set of SystemProcessorNxAdd events will be sent. + +This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedeviceinventorychange). + +The following fields are available: + +- **AppraiserVersion** The version of the Appraiser file that is generating the events. + + +### Microsoft.Windows.Appraiser.General.SystemProcessorPrefetchWAdd + +This event sends data indicating whether the system supports the PrefetchW CPU requirement, to help keep Windows up to date. + +This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedeviceinventorychange). + +The following fields are available: + +- **AppraiserVersion** The version of the Appraiser file that is generating the events. +- **Blocking** Is the upgrade blocked due to the processor? +- **PrefetchWSupport** Does the processor support PrefetchW? + + +### Microsoft.Windows.Appraiser.General.SystemProcessorPrefetchWRemove + +This event indicates that the SystemProcessorPrefetchW object is no longer present. + +This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedeviceinventorychange). + +The following fields are available: + +- **AppraiserVersion** The version of the Appraiser file that is generating the events. + + +### Microsoft.Windows.Appraiser.General.SystemProcessorPrefetchWStartSync + +This event indicates that a new set of SystemProcessorPrefetchWAdd events will be sent. + +This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedeviceinventorychange). + +The following fields are available: + +- **AppraiserVersion** The version of the Appraiser file that is generating the events. + + +### Microsoft.Windows.Appraiser.General.SystemProcessorSse2Add + +This event sends data indicating whether the system supports the SSE2 CPU requirement, to help keep Windows up to date. + +This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedeviceinventorychange). + +The following fields are available: + +- **AppraiserVersion** The version of the Appraiser file that is generating the events. +- **Blocking** Is the upgrade blocked due to the processor? +- **SSE2ProcessorSupport** Does the processor support SSE2? + + +### Microsoft.Windows.Appraiser.General.SystemProcessorSse2Remove + +This event indicates that the SystemProcessorSse2 object is no longer present. + +This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedeviceinventorychange). + +The following fields are available: + +- **AppraiserVersion** The version of the Appraiser file that is generating the events. + + +### Microsoft.Windows.Appraiser.General.SystemProcessorSse2StartSync + +This event indicates that a new set of SystemProcessorSse2Add events will be sent. + +This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedeviceinventorychange). + +The following fields are available: + +- **AppraiserVersion** The version of the Appraiser file that is generating the events. + + +### Microsoft.Windows.Appraiser.General.SystemTouchAdd + +This event sends data indicating whether the system supports touch, to help keep Windows up to date. + +This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedeviceinventorychange). + +The following fields are available: + +- **AppraiserVersion** The version of the Appraiser file that is generating the events. +- **IntegratedTouchDigitizerPresent** Is there an integrated touch digitizer? +- **MaximumTouches** The maximum number of touch points supported by the device hardware. + + +### Microsoft.Windows.Appraiser.General.SystemTouchRemove + +This event indicates that the SystemTouch object is no longer present. + +This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedeviceinventorychange). + +The following fields are available: + +- **AppraiserVersion** The version of the Appraiser file that is generating the events. + + +### Microsoft.Windows.Appraiser.General.SystemTouchStartSync + +This event indicates that a new set of SystemTouchAdd events will be sent. + +This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedeviceinventorychange). + +The following fields are available: + +- **AppraiserVersion** The version of the Appraiser file that is generating the events. + + +### Microsoft.Windows.Appraiser.General.SystemWimAdd + +This event sends data indicating whether the operating system is running from a compressed Windows Imaging Format (WIM) file, to help keep Windows up to date. + +This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedeviceinventorychange). + +The following fields are available: + +- **AppraiserVersion** The version of the Appraiser file that is generating the events. +- **IsWimBoot** Is the current operating system running from a compressed WIM file? +- **RegistryWimBootValue** The raw value from the registry that is used to indicate if the device is running from a WIM. + + +### Microsoft.Windows.Appraiser.General.SystemWimRemove + +This event indicates that the SystemWim object is no longer present. + +This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedeviceinventorychange). + +The following fields are available: + +- **AppraiserVersion** The version of the Appraiser file that is generating the events. + + +### Microsoft.Windows.Appraiser.General.SystemWimStartSync + +This event indicates that a new set of SystemWimAdd events will be sent. + +This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedeviceinventorychange). + +The following fields are available: + +- **AppraiserVersion** The version of the Appraiser file that is generating the events. + + +### Microsoft.Windows.Appraiser.General.SystemWindowsActivationStatusAdd + +This event sends data indicating whether the current operating system is activated, to help keep Windows up to date. + +This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedeviceinventorychange). + +The following fields are available: + +- **AppraiserVersion** The version of the Appraiser file that is generating the events. +- **WindowsIsLicensedApiValue** The result from the API that's used to indicate if operating system is activated. +- **WindowsNotActivatedDecision** Is the current operating system activated? + + +### Microsoft.Windows.Appraiser.General.SystemWindowsActivationStatusRemove + +This event indicates that the SystemWindowsActivationStatus object is no longer present. + +This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedeviceinventorychange). + +The following fields are available: + +- **AppraiserVersion** The version of the Appraiser file that is generating the events. + + +### Microsoft.Windows.Appraiser.General.SystemWindowsActivationStatusStartSync + +This event indicates that a new set of SystemWindowsActivationStatusAdd events will be sent. + +This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedeviceinventorychange). + +The following fields are available: + +- **AppraiserVersion** The version of the Appraiser file that is generating the events. + + +### Microsoft.Windows.Appraiser.General.SystemWlanAdd + +This event sends data indicating whether the system has WLAN, and if so, whether it uses an emulated driver that could block an upgrade, to help keep Windows up-to-date. + +This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedeviceinventorychange). + +The following fields are available: + +- **AppraiserVersion** The version of the Appraiser file that is generating the events. +- **Blocking** Is the upgrade blocked because of an emulated WLAN driver? +- **HasWlanBlock** Does the emulated WLAN driver have an upgrade block? +- **WlanEmulatedDriver** Does the device have an emulated WLAN driver? +- **WlanExists** Does the device support WLAN at all? +- **WlanModulePresent** Are any WLAN modules present? +- **WlanNativeDriver** Does the device have a non-emulated WLAN driver? + + +### Microsoft.Windows.Appraiser.General.SystemWlanRemove + +This event indicates that the SystemWlan object is no longer present. + +This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedeviceinventorychange). + +The following fields are available: + +- **AppraiserVersion** The version of the Appraiser file that is generating the events. + + +### Microsoft.Windows.Appraiser.General.SystemWlanStartSync + +This event indicates that a new set of SystemWlanAdd events will be sent. + +This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedeviceinventorychange). + +The following fields are available: + +- **AppraiserVersion** The version of the Appraiser file that is generating the events. + + +### Microsoft.Windows.Appraiser.General.TelemetryRunHealth + +This event indicates the parameters and result of a telemetry (diagnostic) run. This allows the rest of the data sent over the course of the run to be properly contextualized and understood, which is then used to keep Windows up to date. + +The following fields are available: + +- **AppraiserBranch** The source branch in which the version of Appraiser that is running was built. +- **AppraiserDataVersion** The version of the data files being used by the Appraiser telemetry run. +- **AppraiserProcess** The name of the process that launched Appraiser. +- **AppraiserVersion** The file version (major, minor and build) of the Appraiser DLL, concatenated without dots. +- **AuxFinal** Obsolete, always set to false. +- **AuxInitial** Obsolete, indicates if Appraiser is writing data files to be read by the Get Windows 10 app. +- **DeadlineDate** A timestamp representing the deadline date, which is the time until which appraiser will wait to do a full scan. +- **EnterpriseRun** Indicates if the telemetry run is an enterprise run, which means appraiser was run from the command line with an extra enterprise parameter. +- **FullSync** Indicates if Appraiser is performing a full sync, which means that full set of events representing the state of the machine are sent. Otherwise, only the changes from the previous run are sent. +- **InboxDataVersion** The original version of the data files before retrieving any newer version. +- **IndicatorsWritten** Indicates if all relevant UEX indicators were successfully written or updated. +- **InventoryFullSync** Indicates if inventory is performing a full sync, which means that the full set of events representing the inventory of machine are sent. +- **PCFP** An ID for the system calculated by hashing hardware identifiers. +- **PerfBackoff** Indicates if the run was invoked with logic to stop running when a user is present. Helps to understand why a run may have a longer elapsed time than normal. +- **PerfBackoffInsurance** Indicates if appraiser is running without performance backoff because it has run with perf backoff and failed to complete several times in a row. +- **RunAppraiser** Indicates if Appraiser was set to run at all. If this if false, it is understood that data events will not be received from this device. +- **RunDate** The date that the telemetry run was stated, expressed as a filetime. +- **RunGeneralTel** Indicates if the generaltel.dll component was run. Generaltel collects additional telemetry on an infrequent schedule and only from machines at telemetry levels higher than Basic. +- **RunOnline** Indicates if appraiser was able to connect to Windows Update and theefore is making decisions using up-to-date driver coverage information. +- **RunResult** The hresult of the Appraiser telemetry run. +- **ScheduledUploadDay** The day scheduled for the upload. +- **SendingUtc** Indicates if the Appraiser client is sending events during the current telemetry run. +- **StoreHandleIsNotNull** Obsolete, always set to false +- **TelementrySent** Indicates if telemetry was successfully sent. +- **ThrottlingUtc** Indicates if the Appraiser client is throttling its output of CUET events to avoid being disabled. This increases runtime but also telemetry reliability. +- **Time** The client time of the event. +- **VerboseMode** Indicates if appraiser ran in Verbose mode, which is a test-only mode with extra logging. +- **VicboseMode** No content is currently available. +- **WhyFullSyncWithoutTablePrefix** Indicates the reason or reasons that a full sync was generated. + + +### Microsoft.Windows.Appraiser.General.WmdrmAdd + +This event sends data about the usage of older digital rights management on the system, to help keep Windows up to date. This data does not indicate the details of the media using the digital rights management, only whether any such files exist. Collecting this data was critical to ensuring the correct mitigation for customers, and should be able to be removed once all mitigations are in place. + +This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedeviceinventorychange). + +The following fields are available: + +- **AppraiserVersion** The version of the Appraiser file that is generating the events. +- **BlockingApplication** Same as NeedsDismissAction. +- **NeedsDismissAction** Indicates if a dismissible message is needed to warn the user about a potential loss of data due to DRM deprecation. +- **WmdrmApiResult** Raw value of the API used to gather DRM state. +- **WmdrmCdRipped** Indicates if the system has any files encrypted with personal DRM, which was used for ripped CDs. +- **WmdrmIndicators** WmdrmCdRipped OR WmdrmPurchased. +- **WmdrmInUse** WmdrmIndicators AND dismissible block in setup was not dismissed. +- **WmdrmNonPermanent** Indicates if the system has any files with non-permanent licenses. +- **WmdrmPurchased** Indicates if the system has any files with permanent licenses. + + +### Microsoft.Windows.Appraiser.General.WmdrmRemove + +This event indicates that the Wmdrm object is no longer present. + +This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedeviceinventorychange). + +The following fields are available: + +- **AppraiserVersion** The version of the Appraiser file that is generating the events. + + +### Microsoft.Windows.Appraiser.General.WmdrmStartSync + +This event indicates that a new set of WmdrmAdd events will be sent. + +This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedeviceinventorychange). + +The following fields are available: + +- **AppraiserVersion** The version of the Appraiser file that is generating the events. + + +## Census events + +### Census.App + +Provides information on IE and Census versions running on the device + +The following fields are available: + +- **AppraiserEnterpriseErrorCode** The error code of the last Appraiser enterprise run. +- **AppraiserErrorCode** The error code of the last Appraiser run. +- **AppraiserRunEndT.ApStamp** No content is currently available. +- **AppraiserRunEndTimeStamp** The end time of the last Appraiser run. +- **AppraiserRunIsInProgressOrCrashed** Flag that indicates if the Appraiser run is in progress or has crashed. +- **AppraiserRunStartT.ApStamp** No content is currently available. +- **AppraiserRunStartTimeStamp** The start time of the last Appraiser run. +- **AppraiserTaskEnabled** Whether the Appraiser task is enabled. +- **AppraiserTaskExitCode** The Appraiser task exist code. +- **AppraiserTaskLastRun** The last runtime for the Appraiser task. +- **CensusVersion** The version of Census that generated the current data for this device. +- **IEVersion** The version of Internet Explorer that is running on the device. + + +### Census.Battery + +This event sends type and capacity data about the battery on the device, as well as the number of connected standby devices in use, type to help keep Windows up to date. + +The following fields are available: + +- **InternalBatteryCapablities** Represents information about what the battery is capable of doing. +- **InternalBatteryCapacityCurrent** Represents the battery's current fully charged capacity in mWh (or relative). Compare this value to DesignedCapacity  to estimate the battery's wear. +- **InternalBatteryCapacityDesign** Represents the theoretical capacity of the battery when new, in mWh. +- **InternalBatteryNumberOfCharges** Provides the number of battery charges. This is used when creating new products and validating that existing products meets targeted functionality performance. +- **IsAlwaysOnAlwaysConnectedCapable** Represents whether the battery enables the device to be AlwaysOnAlwaysConnected . Boolean value. + + +### Census.Camera + +This event sends data about the resolution of cameras on the device, to help keep Windows up to date. + +The following fields are available: + +- **FrontFacingCameraResolution** Represents the resolution of the front facing camera in megapixels. If a front facing camera does not exist, then the value is 0. +- **RearFacingCameraResolution** Represents the resolution of the rear facing camera in megapixels. If a rear facing camera does not exist, then the value is 0. + + +### Census.Enterprise + +This event sends data about Azure presence, type, and cloud domain use in order to provide an understanding of the use and integration of devices in an enterprise, cloud, and server environment. + +The following fields are available: + +- **AADDeviceId** Azure Active Directory device ID. +- **AzureOSIDPresent** Represents the field used to identify an Azure machine. +- **AZureOSIDPresent** No content is currently available. +- **AzureVMType** Represents whether the instance is Azure VM PAAS, Azure VM IAAS or any other VMs. +- **AZureVMType** No content is currently available. +- **CDJType** Represents the type of cloud domain joined for the machine. +- **CommercialId** Represents the GUID for the commercial entity which the device is a member of.  Will be used to reflect insights back to customers. +- **ContainerType** The type of container, such as process or virtual machine hosted. +- **EnrollmentType** Defines the type of MDM enrollment on the device. +- **HashedDomain** The hashed representation of the user domain used for login. +- **IsCloudDomainJoined** Is this device joined to an Azure Active Directory (AAD) tenant? true/false +- **IsDERequirementMet** Represents if the device can do device encryption. +- **IsDeviceProtected** Represents if Device protected by BitLocker/Device Encryption +- **IsDeviceRrotected** No content is currently available. +- **IsDomainJoined** Indicates whether a machine is joined to a domain. +- **IsEDPEnabled** Represents if Enterprise data protected on the device. +- **IsMDMEnrolled** Whether the device has been MDM Enrolled or not. +- **MPNId** Returns the Partner ID/MPN ID from Regkey. HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\DeployID +- **SCCMClientId** This ID correlate systems that send data to Compat Analytics (OMS) and other OMS based systems with systems in an Enterprise SCCM environment. +- **ServerFeatures** Represents the features installed on a Windows   Server. This can be used by developers and administrators who need to automate the process of determining the features installed on a set of server computers. +- **SystemCenterID** The SCCM ID is an anonymized one-way hash of the Active Directory Organization identifier + + +### Census.Firmware + +This event sends data about the BIOS and startup embedded in the device, to help keep Windows up to date. + +The following fields are available: + +- **FirmwareManufacturer** Represents the manufacturer of the device's firmware (BIOS). +- **FirmwareReleaseDate** Represents the date the current firmware was released. +- **FirmwareType** Represents the firmware type. The various types can be unknown, BIOS, UEFI. +- **FirmwareVersion** Represents the version of the current firmware. + + +### Census.Flighting + +This event sends Windows Insider data from customers participating in improvement testing and feedback programs, to help keep Windows up to date. + +The following fields are available: + +- **DeviceSampleRate** The telemetry sample rate assigned to the device. +- **EnablePreviewBuilds** Used to enable Windows Insider builds on a device. +- **FlightIds** A list of the different Windows Insider builds on this device. +- **FlightingBranchName** The name of the Windows Insider branch currently used by the device. +- **IsFlightsDisabled** Represents if the device is participating in the Windows Insider program. +- **MSA_Accounts** Represents a list of hashed IDs of the Microsoft Accounts that are flighting (pre-release builds) on this device. +- **SSRK** Retrieves the mobile targeting settings. + + +### Census.Hardware + +This event sends data about the device, including hardware type, OEM brand, model line, model, telemetry level setting, and TPM support, to help keep Windows up to date. + +The following fields are available: + +- **ActiveMicCount** The number of active microphones attached to the device. +- **ChassisType** Represents the type of device chassis, such as desktop or low profile desktop. The possible values can range between 1 - 36. +- **ComputerHardwareID** Identifies a device class that is represented by a hash of different SMBIOS fields. +- **D3DMaxFeatureLevel** Supported Direct3D version. +- **DeviceColor** Indicates a color of the device. +- **DeviceForm** Indicates the form as per the device classification. +- **DeviceName** The device name that is set by the user. +- **DigitizerSupport** Is a digitizer supported? +- **DUID** The device unique ID. +- **Gyroscope** Indicates whether the device has a gyroscope (a mechanical component that measures and maintains orientation). +- **InventoryId** The device ID used for compatibility testing. +- **Magnetometer** Indicates whether the device has a magnetometer (a mechanical component that works like a compass). +- **NFCProximity** Indicates whether the device supports NFC (a set of communication protocols that helps establish communication when applicable devices are brought close together.) +- **OEMDigitalMarkerFileName** The name of the file placed in the \Windows\system32\drivers directory that specifies the OEM and model name of the device. +- **OEMManufacturerName** The device manufacturer name. The OEMName for an inactive device is not reprocessed even if the clean OEM name is changed at a later date. +- **OEMModelBaseBoard** The baseboard model used by the OEM. +- **OEMModelBaseBoardVersion** Differentiates between developer and retail devices. +- **OEMModelName** The device model name. +- **OEMModelNumber** The device model number. +- **OEMModelSKU** The device edition that is defined by the manufacturer. +- **OEMModelSystemFamily** The system family set on the device by an OEM. +- **OEMModelSystemVersion** The system model version set on the device by the OEM. +- **OEMOptionalIdentifier** A Microsoft assigned value that represents a specific OEM subsidiary. +- **OEMSerialNumber** The serial number of the device that is set by the manufacturer. +- **PhoneManufacturer** The friendly name of the phone manufacturer. +- **PowerPlatformRole** The OEM preferred power management profile. It's used to help to identify the basic form factor of the device. +- **SoCName** The firmware manufacturer of the device. +- **StudyID** Used to identify retail and non-retail device. +- **TelemetryLevel** The telemetry level the user has opted into, such as Basic or Enhanced. +- **TelemetryLevelLimitEnha5Sed** No content is currently available. +- **TelemetryLevelLimitEnhanced** The telemetry level for Windows Analytics-based solutions. +- **TelemetrySettingAuthority** Determines who set the telemetry level, such as GP, MDM, or the user. +- **TPMManufacturerId** The ID of the TPM manufacturer. +- **TPMManufacturerVersion** The version of the TPM manufacturer. +- **TPMVersion** The supported Trusted Platform Module (TPM) on the device. If no TPM is present, the value is 0. +- **VoiceSupported** Does the device have a cellular radio capable of making voice calls? + + +### Census.Memory + +This event sends data about the memory on the device, including ROM and RAM, to help keep Windows up to date. + +The following fields are available: + +- **TotalPhysicalRAM** Represents the physical memory (in MB). +- **TotalVisibleMemory** Represents the memory that is not reserved by the system. + + +### Census.Network + +This event sends data about the mobile and cellular network used by the device (mobile service provider, network, device ID, and service cost factors), to help keep Windows up to date. + +The following fields are available: + +- **IMEI0** Represents the International Mobile Station Equipment Identity. This number is usually unique and used by the mobile operator to distinguish different phone hardware. Microsoft does not have access to mobile operator billing data so collecting this data does not expose or identify the user. The two fields represent phone with dual sim coverage. +- **IMEI1** Represents the International Mobile Station Equipment Identity. This number is usually unique and used by the mobile operator to distinguish different phone hardware. Microsoft does not have access to mobile operator billing data so collecting this data does not expose or identify the user. The two fields represent phone with dual sim coverage. +- **MCC0** Represents the Mobile Country Code (MCC). It used with the Mobile Network Code (MNC) to uniquely identify a mobile network operator. The two fields represent phone with dual sim coverage. +- **MCC1** Represents the Mobile Country Code (MCC). It used with the Mobile Network Code (MNC) to uniquely identify a mobile network operator. The two fields represent phone with dual sim coverage. +- **MEID** Represents the Mobile Equipment Identity (MEID). MEID is a worldwide unique phone ID assigned to CDMA phones. MEID replaces electronic serial number (ESN), and is equivalent to IMEI for GSM and WCDMA phones. Microsoft does not have access to mobile operator billing data so collecting this data does not expose or identify the user. +- **MNC0** Retrieves the Mobile Network Code (MNC). It used with the Mobile Country Code (MCC) to uniquely identify a mobile network operator. The two fields represent phone with dual sim coverage. +- **MNC1** Retrieves the Mobile Network Code (MNC). It used with the Mobile Country Code (MCC) to uniquely identify a mobile network operator. The two fields represent phone with dual sim coverage. +- **MobileOperatorBilling** Represents the telephone company that provides services for mobile phone users. +- **MobileOperatorCommercialized** Represents which reseller and geography the phone is commercialized for. This is the set of values on the phone for who and where it was intended to be used. For example, the commercialized mobile operator code AT&T in the US would be ATT-US. +- **MobileOperatorNetwork0** Represents the operator of the current mobile network that the device is used on. (AT&T, T-Mobile, Vodafone). The two fields represent phone with dual sim coverage. +- **MobileOperatorNetwork1** Represents the operator of the current mobile network that the device is used on. (AT&T, T-Mobile, Vodafone). The two fields represent phone with dual sim coverage. +- **NetworkAdapterGUID** The GUID of the primary network adapter. +- **NetworkCost** Represents the network cost associated with a connection. +- **SPN0** Retrieves the Service Provider Name (SPN). For example, these might be AT&T, Sprint, T-Mobile, or Verizon. The two fields represent phone with dual sim coverage. +- **SPN1** Retrieves the Service Provider Name (SPN). For example, these might be AT&T, Sprint, T-Mobile, or Verizon. The two fields represent phone with dual sim coverage. + + +### Census.OS + +This event sends data about the operating system such as the version, locale, update service configuration, when and how it was originally installed, and whether it is a virtual device, to help keep Windows up to date. + +The following fields are available: + +- **ActivationChannel** Retrieves the retail license key or Volume license key for a machine. +- **AssignedAccessStatus** Kiosk configuration mode. +- **CompactOS** Indicates if the Compact OS feature from Win10 is enabled. +- **DeveloperUnlockStatus** Represents if a device has been developer unlocked by the user or Group Policy. +- **DeviceTimeZone** The time zone that is set on the device. Example: Pacific Standard Time +- **GenuineState** Retrieves the ID Value specifying the OS Genuine check. +- **GenuineStateanchNIsPortableOperatingSystem** No content is currently available. +- **InstallationType** Retrieves the type of OS installation. (Clean, Upgrade, Reset, Refresh, Update). +- **InstallLanguage** The first language installed on the user machine. +- **IsDeviceRetailDemo** Retrieves if the device is running in demo mode. +- **IsEduData** Returns Boolean if the education data policy is enabled. +- **IsPortableOperatingSystem** Retrieves whether OS is running Windows-To-Go +- **IsSecureBootEnabled** Retrieves whether Boot chain is signed under UEFI. +- **LanguagePacks** The list of language packages installed on the device. +- **LicenseStateReason** Retrieves why (or how) a system is licensed or unlicensed. The HRESULT may indicate an error code that indicates a key blocked error, or it may indicate that we are running an OS License granted by the MS store. +- **OA3xOriginalProductKey** Retrieves the License key stamped by the OEM to the machine. +- **OSEdition** Retrieves the version of the current OS. +- **OSInstallType** Retrieves a numeric description of what install was used on the device i.e. clean, upgrade, refresh, reset, etc +- **OSOOBEDateTime** Retrieves Out of Box Experience (OOBE) Date in Coordinated Universal Time (UTC). +- **OSSKU** Retrieves the Friendly Name of OS Edition. +- **OSSubscriptionStatus** Represents the existing status for enterprise subscription feature for PRO machines. +- **OSSubscriptionTypeId** Returns boolean for enterprise subscription feature for selected PRO machines. +- **OSTimeZoneBiasInMins** Retrieves the time zone set on machine. +- **OSUILocale** Retrieves the locale of the UI that is currently used by the OS. +- **ProductActivationResult** Returns Boolean if the OS Activation was successful. +- **ProductActivationTime** Returns the OS Activation time for tracking piracy issues. +- **ProductKeyID2** Retrieves the License key if the machine is updated with a new license key. +- **RACw7Id** Retrieves the Microsoft Reliability Analysis Component (RAC) Win7 Identifier. RAC is used to monitor and analyze system usage and reliability. +- **ServiceMachineIP** Retrieves the IP address of the KMS host used for anti-piracy. +- **ServiceMachinePort** Retrieves the port of the KMS host used for anti-piracy. +- **ServiceProductKeyID** Retrieves the License key of the KMS +- **SharedPCMode** Returns Boolean for education devices used as shared cart +- **Signalure** No content is currently available. +- **Signature** Retrieves if it is a signature machine sold by Microsoft store. +- **SLICStatus** Whether a SLIC table exists on the device. +- **SLICVersion** Returns OS type/version from SLIC table. + + +### Census.PrivacySettings + +This event provides information about the device level privacy settings and whether device-level access was granted to these capabilities. Not all settings are applicable to all devices. Each field records the consent state for the corresponding privacy setting. The consent state is encoded as a 16-bit signed integer, where the first 8 bits represents the effective consent value, and the last 8 bits represent the authority that set the value. The effective consent (first 8 bits) is one of the following values: -3 = unexpected consent value, -2 = value was not requested, -1 = an error occurred while attempting to retrieve the value, 0 = undefined, 1 = allow, 2 = deny, 3 = prompt. The consent authority (last 8 bits) is one of the following values: -3 = unexpected authority, -2 = value was not requested, -1 = an error occurred while attempting to retrieve the value, 0 = system, 1 = a higher authority (a gating setting, the system-wide setting, or a group policy), 2 = advertising ID group policy, 3 = advertising ID policy for child account, 4 = privacy setting provider doesn't know the actual consent authority, 5 = consent was not configured and a default set in code was used, 6 = system default, 7 = organization policy, 8 = OneSettings. + +The following fields are available: + +- **Activity** Current state of the activity history setting. +- **ActivityHistoryCloudSync** Current state of the activity history cloud sync setting. +- **ActivityHistoryCollection** Current state of the activity history collection setting. +- **AdvertisingId** Current state of the advertising ID setting. +- **AdvertisiNgId** No content is currently available. +- **AppDiagnostics** Current state of the app diagnostics setting. +- **Appointments** Current state of the calendar setting. +- **Bluetooth** Current state of the Bluetooth capability setting. +- **BluetoothSync** Current state of the Bluetooth sync capability setting. +- **BroadFileSystemAccess** Current state of the broad file system access setting. +- **CellularData** Current state of the cellular data capability setting. +- **Chat** Current state of the chat setting. +- **Contacts** Current state of the contacts setting. +- **DocumentsLibrary** Current state of the documents library setting. +- **Email** Current state of the email setting. +- **FindMyDevice** Current state of the "find my device" setting. +- **GazeInput** Current state of the gaze input setting. +- **HumanInterfaceDevice** Current state of the human interface device setting. +- **InkTypeImpro_ement** No content is currently available. +- **InkTypeImprovement** Current state of the improve inking and typing setting. +- **Location** Current state of the location setting. +- **LocationHistory** Current state of the location history setting. +- **LocationHistoryCloudSync** Current state of the location history cloud sync setting. +- **LocationHistoryOnTimeline** Current state of the location history on timeline setting. +- **Microphone** Current state of the microphone setting. +- **PhoneCall** Current state of the phone call setting. +- **PhoneCallHistory** Current state of the call history setting. +- **PicturesLibrary** Current state of the pictures library setting. +- **Radios** Current state of the radios setting. +- **SensorsCustom** Current state of the custom sensor setting. +- **SerialCommunication** Current state of the serial communication setting. +- **Sms** Current state of the text messaging setting. +- **SpeechPersonalization** Current state of the speech services setting. +- **USB** Current state of the USB setting. +- **UserAccountInformation** Current state of the account information setting. +- **UserDataTasks** Current state of the tasks setting. +- **UserNotificationListener** Current state of the notifications setting. +- **VideosLibrary** Current state of the videos library setting. +- **Webcam** Current state of the camera setting. +- **WiFiDirect** Current state of the Wi-Fi direct setting. + + +### Census.Processor + +Provides information on several important data points about Processor settings + +The following fields are available: + +- **KvaShadow** This is the micro code information of the processor. +- **MMSettingOverride** Microcode setting of the processor. +- **MMSettingOverrideMask** Microcode setting override of the processor. +- **PreviousUpdateRevision** Previous microcode revision +- **ProcessorArchitecture** Retrieves the processor architecture of the installed operating system. +- **ProcessorClockSpeed** Clock speed of the processor in MHz. +- **ProcessorCores** Number of logical cores in the processor. +- **ProcessorIdentifier** Processor Identifier of a manufacturer. +- **ProcessorManufacturer** Name of the processor manufacturer. +- **ProcessorModel** Name of the processor model. +- **ProcessorPhysicalCores** Number of physical cores in the processor. +- **ProcessorUpdateRevision** The microcode revision. +- **ProcessorUpdateStatus** Enum value that represents the processor microcode load status +- **SocketCount** Count of CPU sockets. +- **SpeculationControl** Indicates whether the system has enabled protections needed to validate the speculation control vulnerability. + + +### Census.Security + +This event provides information on about security settings used to help keep Windows up to date and secure. + +The following fields are available: + +- **AvailableSecurityProperties** This field helps to enumerate and report state on the relevant security properties for Device Guard. +- **CGRunning** Credential Guard isolates and hardens key system and user secrets against compromise, helping to minimize the impact and breadth of a Pass the Hash style attack in the event that malicious code is already running via a local or network based vector. This field tells if Credential Guard is running. +- **DGState** This field summarizes the Device Guard state. +- **HVCIRunning** Hypervisor Code Integrity (HVCI) enables Device Guard to help protect kernel mode processes and drivers from vulnerability exploits and zero days. HVCI uses the processor’s functionality to force all software running in kernel mode to safely allocate memory. This field tells if HVCI is running. +- **IsSawGuest** Indicates whether the device is running as a Secure Admin Workstation Guest. +- **IsSawHost** Indicates whether the device is running as a Secure Admin Workstation Host. +- **RequiredSecurityProperties** Describes the required security properties to enable virtualization-based security. +- **SecureBootCapable** Systems that support Secure Boot can have the feature turned off via BIOS. This field tells if the system is capable of running Secure Boot, regardless of the BIOS setting. +- **SModeState** The Windows S mode trail state. +- **VBSState** Virtualization-based security (VBS) uses the hypervisor to help protect the kernel and other parts of the operating system. Credential Guard and Hypervisor Code Integrity (HVCI) both depend on VBS to isolate/protect secrets, and kernel-mode code integrity validation. VBS has a tri-state that can be Disabled, Enabled, or Running. + + +### Census.Speech + +This event is used to gather basic speech settings on the device. + +The following fields are available: + +- **Abo_eLockEnabled** No content is currently available. +- **AboveLockEnabled** Cortana setting that represents if Cortana can be invoked when the device is locked. +- **GPAllowInputPersonalization** Indicates if a Group Policy setting has enabled speech functionalities. +- **HolographicSpeechInputDisabled** Holographic setting that represents if the attached HMD devices have speech functionality disabled by the user. +- **HolographicSpeechInputDisabledRemote** Indicates if a remote policy has disabled speech functionalities for the HMD devices. +- **KeyVer** Version information for the census speech event. +- **KWSEnabled** Cortana setting that represents if a user has enabled the "Hey Cortana" keyword spotter (KWS). +- **MDMAllowInputPersonalization** Indicates if an MDM policy has enabled speech functionalities. +- **RemotelyManaged** Indicates if the device is being controlled by a remote administrator (MDM or Group Policy) in the context of speech functionalities. +- **SpeakerIdEnabled** Cortana setting that represents if keyword detection has been trained to try to respond to a single user's voice. +- **SpeechServicesEnabled** Windows setting that represents whether a user is opted-in for speech services on the device. +- **SpeechServicesValueSource** Indicates the deciding factor for the effective online speech recognition privacy policy settings: remote admin, local admin, or user preference. + + +### Census.Storage + +This event sends data about the total capacity of the system volume and primary disk, to help keep Windows up to date. + +The following fields are available: + +- **PrimaryDiskTotalCapacity** Retrieves the amount of disk space on the primary disk of the device in MB. +- **PrimaryDiskType** Retrieves an enumerator value of type STORAGE_BUS_TYPE that indicates the type of bus to which the device is connected. This should be used to interpret the raw device properties at the end of this structure (if any). +- **StorageReservePassedPolicy** Indicates whether the Storage Reserve policy, which ensures that updates have enough disk space and customers are on the latest OS, is enabled on this device. +- **SystemVolumeTotalCapacity** Retrieves the size of the partition that the System volume is installed on in MB. + + +### Census.Userdefault + +This event sends data about the current user's default preferences for browser and several of the most popular extensions and protocols, to help keep Windows up to date. + +The following fields are available: + +- **CalendarType** The calendar identifiers that are used to specify different calendars. +- **DefaultApp** The current uer's default program selected for the following extension or protocol: .html, .htm, .jpg, .jpeg, .png, .mp3, .mp4, .mov, .pdf. +- **DefaultBrowserProgId** The ProgramId of the current user's default browser. +- **LongDateFormat** The long date format the user has selected. +- **ShortDateFormat** The short date format the user has selected. + + +### Census.UserDisplay + +This event sends data about the logical/physical display size, resolution and number of internal/external displays, and VRAM on the system, to help keep Windows up to date. + +The following fields are available: + +- **InternalPrimaryDis0layResolutionHorizontal** No content is currently available. +- **InternalPrimaryDisplayLogicalDPIX** Retrieves the logical DPI in the x-direction of the internal display. +- **InternalPrimaryDisplayLogicalDPIY** Retrieves the logical DPI in the y-direction of the internal display. +- **InternalPrimaryDisplayPhysicalDPIX** Retrieves the physical DPI in the x-direction of the internal display. +- **InternalPrimaryDisplayPhysicalDPIY** Retrieves the physical DPI in the y-direction of the internal display. +- **InternalPrimaryDisplayResolutionHorizontal** Retrieves the number of pixels in the horizontal direction of the internal display. +- **InternalPrimaryDisplayResolutionVertical** Retrieves the number of pixels in the vertical direction of the internal display. +- **InternalPrimaryDisplaySizePhysicalH** Retrieves the physical horizontal length of the display in mm. Used for calculating the diagonal length in inches . +- **InternalPrimaryDisplaySizePhysicalY** Retrieves the physical vertical length of the display in mm. Used for calculating the diagonal length in inches +- **NumberofExternalDisplays** Retrieves the number of external displays connected to the machine +- **NumberofInternalDisplays** Retrieves the number of internal displays in a machine. +- **VRAMDedicated** Retrieves the video RAM in MB. +- **VRAMDedicatedSystem** Retrieves the amount of memory on the dedicated video card. +- **VRAMSharedSystem** Retrieves the amount of RAM memory that the video card can use. + + +### Census.UserNLS + +This event sends data about the default app language, input, and display language preferences set by the user, to help keep Windows up to date. + +The following fields are available: + +- **DefaultAppLanguage** The current user Default App Language. +- **DisplayLanguage** The current user preferred Windows Display Language. +- **HomeLocation** The current user location, which is populated using GetUserGeoId() function. +- **KeyboardInputLanguages** The Keyboard input languages installed on the device. +- **SpeechInputLanguages** The Speech Input languages installed on the device. + + +### Census.UserPrivacySettings + +This event provides information about the current users privacy settings and whether device-level access was granted to these capabilities. Not all settings are applicable to all devices. Each field records the consent state for the corresponding privacy setting. The consent state is encoded as a 16-bit signed integer, where the first 8 bits represents the effective consent value, and the last 8 bits represents the authority that set the value. The effective consent is one of the following values: -3 = unexpected consent value, -2 = value was not requested, -1 = an error occurred while attempting to retrieve the value, 0 = undefined, 1 = allow, 2 = deny, 3 = prompt. The consent authority is one of the following values: -3 = unexpected authority, -2 = value was not requested, -1 = an error occurred while attempting to retrieve the value, 0 = user, 1 = a higher authority (a gating setting, the system-wide setting, or a group policy), 2 = advertising ID group policy, 3 = advertising ID policy for child account, 4 = privacy setting provider doesn't know the actual consent authority, 5 = consent was not configured and a default set in code was used, 6 = system default, 7 = organization policy, 8 = OneSettings. + +The following fields are available: + +- **ActitityHistoryCollection** No content is currently available. +- **Activity** Current state of the activity history setting. +- **ActivityHistoryCloudSync** Current state of the activity history cloud sync setting. +- **ActivityHistoryCollection** Current state of the activity history collection setting. +- **AdvertisingId** Current state of the advertising ID setting. +- **AppDiagnostics** Current state of the app diagnostics setting. +- **Appointments** Current state of the calendar setting. +- **Bluatooth** No content is currently available. +- **Bluetooth** Current state of the Bluetooth capability setting. +- **BluetoothSync** Current state of the Bluetooth sync capability setting. +- **BroadFileSystemAccess** Current state of the broad file system access setting. +- **CellularData** Current state of the cellular data capability setting. +- **Chat** Current state of the chat setting. +- **Contacts** Current state of the contacts setting. +- **DocumentsLibrary** Current state of the documents library setting. +- **Email** Current state of the email setting. +- **GazeInput** Current state of the gaze input setting. +- **HumanInterfaceDevice** Current state of the human interface device setting. +- **InkTypeImprovement** Current state of the improve inking and typing setting. +- **InkTypePersonalization** Current state of the inking and typing personalization setting. +- **Location** Current state of the location setting. +- **LocationHistory** Current state of the location history setting. +- **LocationHistoryCloudSync** Current state of the location history cloud synchronization setting. +- **LocationHistoryOnTimeline** Current state of the location history on timeline setting. +- **Microphone** Current state of the microphone setting. +- **PhoneCall** Current state of the phone call setting. +- **PhoneCallHistory** Current state of the call history setting. +- **PicturesLibrary** Current state of the pictures library setting. +- **Radios** Current state of the radios setting. +- **SensorsCustom** Current state of the custom sensor setting. +- **SerialCommunication** Current state of the serial communication setting. +- **Sms** Current state of the text messaging setting. +- **SpeechPersonaliza|ion** No content is currently available. +- **SpeechPersonalization** Current state of the speech services setting. +- **USB** Current state of the USB setting. +- **UserAccountInformation** Current state of the account information setting. +- **UserDataTasks** Current state of the tasks setting. +- **UserNotificationListener** Current state of the notifications setting. +- **VideosLibrary** Current state of the videos library setting. +- **Webcam** Current state of the camera setting. +- **WiFiDirect** Current state of the Wi-Fi direct setting. + + +### Census.VM + +This event sends data indicating whether virtualization is enabled on the device, and its various characteristics, to help keep Windows up to date. + +The following fields are available: + +- **CloudService** Indicates which cloud service, if any, that this virtual machine is running within. +- **HyperVisor** Retrieves whether the current OS is running on top of a Hypervisor. +- **IOMMUPresent** Represents if an input/output memory management unit (IOMMU) is present. +- **IsVDI** Is the device using Virtual Desktop Infrastructure? +- **IsVirtualDevice** Retrieves that when the Hypervisor is Microsoft's Hyper-V Hypervisor or other Hv#1 Hypervisor, this field will be set to FALSE for the Hyper-V host OS and TRUE for any guest OS's. This field should not be relied upon for non-Hv#1 Hypervisors. +- **SLATSupported** Represents whether Second Level Address Translation (SLAT) is supported by the hardware. +- **VirtualizationFirmwareEnabled** Represents whether virtualization is enabled in the firmware. + + +### Census.WU + +This event sends data about the Windows update server and other App store policies, to help keep Windows up to date. + +The following fields are available: + +- **AppraiserGatedStatus** Indicates whether a device has been gated for upgrading. +- **AppStoreAutoUpdate** Retrieves the Appstore settings for auto upgrade. (Enable/Disabled). +- **AppStoreAutoUpdateMDM** Retrieves the App Auto Update value for MDM: 0 - Disallowed. 1 - Allowed. 2 - Not configured. Default: [2] Not configured +- **AppStoreAutoUpdatePolicy** Retrieves the Microsoft Store App Auto Update group policy setting +- **DelayeferUpg** No content is currently available. +- **DelayUpgrade** Retrieves the Windows upgrade flag for delaying upgrades. +- **OSAssessmentFeatureOutOfDate** How many days has it been since a the last feature update was released but the device did not install it? +- **OSAssessmentForFeatureUpdate** Is the device is on the latest feature update? +- **OSAssessmentForQualityUpdate** Is the device on the latest quality update? +- **OSAssessmentForSecurityUpdate** Is the device on the latest security update? +- **OSAssessmentQualityOutOfDate** How many days has it been since a the last quality update was released but the device did not install it? +- **OSAssessmentReleaseInfoTime** The freshness of release information used to perform an assessment. +- **OSRollbackCount** The number of times feature updates have rolled back on the device. +- **OSRolledBack** A flag that represents when a feature update has rolled back during setup. +- **OSUninstalled** A flag that represents when a feature update is uninstalled on a device . +- **OSWUAutoUpdateOptions** Retrieves the auto update settings on the device. +- **OSWUAutoUpdateOptionsSource** The source of auto update setting that appears in the OSWUAutoUpdateOptions field. For example: Group Policy (GP), Mobile Device Management (MDM), and Default. +- **UninstallActive** A flag that represents when a device has uninstalled a previous upgrade recently. +- **UpdateServiceURLConfigured** Retrieves if the device is managed by Windows Server Update Services (WSUS). +- **WUDeferUpdatePeriod** Retrieves if deferral is set for Updates. +- **WUDeferUpgradePeriod** Retrieves if deferral is set for Upgrades. +- **WUDODownloadMode** Retrieves whether DO is turned on and how to acquire/distribute updates Delivery Optimization (DO) allows users to deploy previously downloaded WU updates to other devices on the same network. +- **WUMachineId** Retrieves the Windows Update (WU) Machine Identifier. +- **WUPauseState** Retrieves WU setting to determine if updates are paused. +- **WUServer** Retrieves the HTTP(S) URL of the WSUS server that is used by Automatic Updates and API callers (by default). +- **WWPauseState** No content is currently available. + + +### Census.Xbox + +This event sends data about the Xbox Console, such as Serial Number and DeviceId, to help keep Windows up to date. + +The following fields are available: + +- **XboxConsolePreferredLanguage** Retrieves the preferred language selected by the user on Xbox console. +- **XboxConsoleSerialNumber** Retrieves the serial number of the Xbox console. +- **XboxLiveDeviceId** Retrieves the unique device ID of the console. +- **XboxLiveSandboxId** Retrieves the developer sandbox ID if the device is internal to Microsoft. + + +## Common data extensions + +### Common Data Extensions.app + +Describes the properties of the running application. This extension could be populated by a client app or a web app. + +The following fields are available: + +- **asId** An integer value that represents the app session. This value starts at 0 on the first app launch and increments after each subsequent app launch per boot session. +- **env** The environment from which the event was logged. +- **expId** Associates a flight, such as an OS flight, or an experiment, such as a web site UX experiment, with an event. +- **id** Represents a unique identifier of the client application currently loaded in the process producing the event; and is used to group events together and understand usage pattern, errors by application. +- **locale** The locale of the app. +- **name** The name of the app. +- **userId** The userID as known by the application. +- **ver** Represents the version number of the application. Used to understand errors by Version, Usage by Version across an app. + + +### Common Data Extensions.container + +Describes the properties of the container for events logged within a container. + +The following fields are available: + +- **epoch** An ID that's incremented for each SDK initialization. +- **localId** The device ID as known by the client. +- **osVer** The operating system version. +- **seq** An ID that's incremented for each event. +- **type** The container type. Examples: Process or VMHost + + +### Common Data Extensions.cs + +Describes properties related to the schema of the event. + +The following fields are available: + +- **sig** A common schema signature that identifies new and modified event schemas. + + +### Common Data Extensions.device + +Describes the device-related fields. + +The following fields are available: + +- **deviceClass** The device classification. For example, Desktop, Server, or Mobile. +- **localId** A locally-defined unique ID for the device. This is not the human-readable device name. Most likely equal to the value stored at HKLM\Software\Microsoft\SQMClient\MachineId +- **make** Device manufacturer. +- **model** Device model. + + +### Common Data Extensions.Envelope + +Represents an envelope that contains all of the common data extensions. + +The following fields are available: + +- **cV** Represents the Correlation Vector: A single field for tracking partial order of related telemetry events across component boundaries. +- **data** Represents the optional unique diagnostic data for a particular event schema. +- **ext_app** Describes the properties of the running application. This extension could be populated by either a client app or a web app. See [Common Data Extensions.app](#common-data-extensionsapp). +- **ext_container** Describes the properties of the container for events logged within a container. See [Common Data Extensions.container](#common-data-extensionscontainer). +- **ext_cs** Describes properties related to the schema of the event. See [Common Data Extensions.cs](#common-data-extensionscs). +- **ext_device** Describes the device-related fields. See [Common Data Extensions.device](#common-data-extensionsdevice). +- **ext_os** Describes the operating system properties that would be populated by the client. See [Common Data Extensions.os](#common-data-extensionsos). +- **ext_receipts** Describes the fields related to time as provided by the client for debugging purposes. See [Common Data Extensions.receipts](#common-data-extensionsreceipts). +- **ext_sdk** Describes the fields related to a platform library required for a specific SDK. See [Common Data Extensions.sdk](#common-data-extensionssdk). +- **ext_user** Describes the fields related to a user. See [Common Data Extensions.user](#common-data-extensionsuser). +- **ext_utc** Describes the fields that might be populated by a logging library on Windows. See [Common Data Extensions.utc](#common-data-extensionsutc). +- **ext_xbl** Describes the fields related to XBOX Live. See [Common Data Extensions.xbl](#common-data-extensionsxbl). +- **flags** Represents a collection of bits that describe how the event should be processed by the Connected User Experience and Telemetry component pipeline. The lowest-order byte is the event persistence. The next byte is the event latency. +- **iKey** Represents an ID for applications or other logical groupings of events. +- **name** Represents the uniquely qualified name for the event. +- **popSample** Represents the effective sample rate for this event at the time it was generated by a client. +- **time** Represents the event date time in Coordinated Universal Time (UTC) when the event was generated on the client. This should be in ISO 8601 format. +- **ver** Represents the major and minor version of the extension. + + +### Common Data Extensions.os + +Describes some properties of the operating system. + +The following fields are available: + +- **bootId** An integer value that represents the boot session. This value starts at 0 on first boot after OS install and increments after every reboot. +- **expId** Represents the experiment ID. The standard for associating a flight, such as an OS flight (pre-release build), or an experiment, such as a web site UX experiment, with an event is to record the flight / experiment IDs in Part A of the common schema. +- **locale** Represents the locale of the operating system. +- **name** Represents the operating system name. +- **ver** Represents the major and minor version of the extension. + + +### Common Data Extensions.receipts + +Represents various time information as provided by the client and helps for debugging purposes. + +The following fields are available: + +- **originalTime** The original event time. +- **uploadTime** The time the event was uploaded. + + +### Common Data Extensions.sdk + +Used by platform specific libraries to record fields that are required for a specific SDK. + +The following fields are available: + +- **epoch** An ID that is incremented for each SDK initialization. +- **installId** An ID that's created during the initialization of the SDK for the first time. +- **libVer** The SDK version. +- **seq** An ID that is incremented for each event. + + +### Common Data Extensions.user + +Describes the fields related to a user. + +The following fields are available: + +- **authId** This is an ID of the user associated with this event that is deduced from a token such as a Microsoft Account ticket or an XBOX token. +- **locale** The language and region. +- **localId** Represents a unique user identity that is created locally and added by the client. This is not the user's account ID. + + +### Common Data Extensions.utc + +Describes the properties that could be populated by a logging library on Windows. + +The following fields are available: + +- **aId** Represents the ETW ActivityId. Logged via TraceLogging or directly via ETW. +- **bSeq** Upload buffer sequence number in the format: buffer identifier:sequence number +- **cat** Represents a bitmask of the ETW Keywords associated with the event. +- **cpId** The composer ID, such as Reference, Desktop, Phone, Holographic, Hub, IoT Composer. +- **epoch** Represents the epoch and seqNum fields, which help track how many events were fired and how many events were uploaded, and enables identification of data lost during upload and de-duplication of events on the ingress server. +- **flags** Represents the bitmap that captures various Windows specific flags. +- **mon** Combined monitor and event sequence numbers in the format: monitor sequence : event sequence +- **op** Represents the ETW Op Code. +- **raId** Represents the ETW Related ActivityId. Logged via TraceLogging or directly via ETW. +- **seq** Represents the sequence field used to track absolute order of uploaded events. It is an incrementing identifier for each event added to the upload queue. The Sequence helps track how many events were fired and how many events were uploaded and enables identification of data lost during upload and de-duplication of events on the ingress server. +- **stId** Represents the Scenario Entry Point ID. This is a unique GUID for each event in a diagnostic scenario. This used to be Scenario Trigger ID. + + +### Common Data Extensions.xbl + +Describes the fields that are related to XBOX Live. + +The following fields are available: + +- **claims** Any additional claims whose short claim name hasn't been added to this structure. +- **did** XBOX device ID +- **dty** XBOX device type +- **dvr** The version of the operating system on the device. +- **eid** A unique ID that represents the developer entity. +- **exp** Expiration time +- **ip** The IP address of the client device. +- **nbf** Not before time +- **pid** A comma separated list of PUIDs listed as base10 numbers. +- **sbx** XBOX sandbox identifier +- **sid** The service instance ID. +- **sty** The service type. +- **tid** The XBOX Live title ID. +- **tvr** The XBOX Live title version. +- **uts** A bit field, with 2 bits being assigned to each user ID listed in xid. This field is omitted if all users are retail accounts. +- **xid** A list of base10-encoded XBOX User IDs. + + +## Common data fields + +### Ms.Device.DeviceInventoryChange + +Describes the installation state for all hardware and software components available on a particular device. + +The following fields are available: + +- **action** The change that was invoked on a device inventory object. +- **invent** No content is currently available. +- **inventoryId** Device ID used for Compatibility testing +- **objectInstanceId** Object identity which is unique within the device scope. +- **objectInstanceId** No content is currently available. +- **objectType** Indicates the object type that the event applies to. +- **syncId** A string used to group StartSync, EndSync, Add, and Remove operations that belong together. This field is unique by Sync period and is used to disambiguate in situations where multiple agents perform overlapping inventories for the same object. + + +## Compatibility events + +### Microsoft.Windows.Compatibility.Apphelp.SdbFix + +Product instrumentation for helping debug/troubleshoot issues with inbox compatibility components. + +The following fields are available: + +- **AppName** Name of the application impacted by SDB. +- **FixID** SDB GUID. +- **Flags** List of flags applied. +- **ImageName** Name of file. + + +## Component-based servicing events + +### CbsServicingProvider.CbsCapabilityEnumeration + +This event reports on the results of scanning for optional Windows content on Windows Update. + +The following fields are available: + +- **architecture** Indicates the scan was limited to the specified architecture. +- **capabilityCount** The number of optional content packages found during the scan. +- **clientId** The name of the application requesting the optional content. +- **duration** The amount of time it took to complete the scan. +- **hrStatus** The HReturn code of the scan. +- **language** Indicates the scan was limited to the specified language. +- **majorVersion** Indicates the scan was limited to the specified major version. +- **minorVersion** Indicates the scan was limited to the specified minor version. +- **namespace** Indicates the scan was limited to packages in the specified namespace. +- **sourceFilter** A bitmask indicating the scan checked for locally available optional content. +- **stackBuild** The build number of the servicing stack. +- **stackMajorVersion** The major version number of the servicing stack. +- **stackMinorVersion** The minor version number of the servicing stack. +- **stackRevision** The revision number of the servicing stack. + + +### CbsServicingProvider.CbsCapabilitySessionFinalize + +This event provides information about the results of installing or uninstalling optional Windows content from Windows Update. + +The following fields are available: + +- **capabilities** The names of the optional content packages that were installed. +- **clientId** The name of the application requesting the optional content. +- **currentID** The ID of the current install session. +- **downloadSource** The source of the download. +- **highestState** The highest final install state of the optional content. +- **hrLCUReservicingStatus** Indicates whether the optional content was updated to the latest available version. +- **hrStatus** The HReturn code of the install operation. +- **rebootCount** The number of reboots required to complete the install. +- **retryID** The session ID that will be used to retry a failed operation. +- **retryStatus** Indicates whether the install will be retried in the event of failure. +- **stackBuild** The build number of the servicing stack. +- **stackMajorVersion** The major version number of the servicing stack. +- **stackMinorVersion** The minor version number of the servicing stack. +- **stackRevision** The revision number of the servicing stack. + + +### CbsServicingProvider.CbsCapabilitySessionPended + +This event provides information about the results of installing optional Windows content that requires a reboot to keep Windows up to date. + +The following fields are available: + +- **clientId** The name of the application requesting the optional content. +- **pendingDecision** Indicates the cause of reboot, if applicable. + + +### CbsServicingProvider.CbsLateAcquisition + +This event sends data to indicate if some Operating System packages could not be updated as part of an upgrade, to help keep Windows up to date. + +The following fields are available: + +- **Features** The list of feature packages that could not be updated. +- **RetryID** The ID identifying the retry attempt to update the listed packages. + + +### CbsServicingProvider.CbsPackageRemoval + +This event provides information about the results of uninstalling a Windows Cumulative Security Update to help keep Windows up to date. + +The following fields are available: + +- **buildVersion** The build number of the security update being uninstalled. +- **clientId** The name of the application requesting the uninstall. +- **currentStateEnd** The final state of the update after the operation. +- **failureDetails** Information about the cause of a failure, if applicable. +- **failureSourceEnd** The stage during the uninstall where the failure occurred. +- **hrStatusEnd** The overall exit code of the operation. +- **initiatedOffline** Indicates if the uninstall was initiated for a mounted Windows image. +- **majorVersion** The major version number of the security update being uninstalled. +- **minorVersion** The minor version number of the security update being uninstalled. +- **originalState** The starting state of the update before the operation. +- **pendingDecision** Indicates the cause of reboot, if applicable. +- **primitiveExecutionContext** The state during system startup when the uninstall was completed. +- **revisionVersion** The revision number of the security update being uninstalled. +- **transactionCanceled** Indicates whether the uninstall was cancelled. + + +### CbsServicingProvider.CbsQualityUpdateInstall + +This event reports on the performance and reliability results of installing Servicing content from Windows Update to keep Windows up to date. + +The following fields are available: + +- **buildVersion** The build version number of the update package. +- **clientId** The name of the application requesting the optional content. +- **corruptionHistoryFlags** A bitmask of the types of component store corruption that have caused update failures on the device. +- **corruptionType** An enumeration listing the type of data corruption responsible for the current update failure. +- **currentStateEnd** The final state of the package after the operation has completed. +- **doqTimeSeconds** The time in seconds spent updating drivers. +- **executeTimeSeconds** The number of seconds required to execute the install. +- **failureDetails** The driver or installer that caused the update to fail. +- **failureSourceEnd** An enumeration indicating at what phase of the update a failure occurred. +- **hrStatusEnd** The return code of the install operation. +- **initiatedOffline** A true or false value indicating whether the package was installed into an offline Windows Imaging Format (WIM) file. +- **majorVersion** The major version number of the update package. +- **minorVersion** The minor version number of the update package. +- **originalState** The starting state of the package. +- **overallTimeSeconds** The time (in seconds) to perform the overall servicing operation. +- **planTimeSeconds** The time in seconds required to plan the update operations. +- **poqTimeSeconds** The time in seconds processing file and registry operations. +- **postRebootTimeSeconds** The time (in seconds) to do startup processing for the update. +- **preRebootTimeSeconds** The time (in seconds) between execution of the installation and the reboot. +- **primitiveExecutionContext** An enumeration indicating at what phase of shutdown or startup the update was installed. +- **rebootCount** The number of reboots required to install the update. +- **rebootTimeSeconds** The time (in seconds) before startup processing begins for the update. +- **resolveTimeSeconds** The time in seconds required to resolve the packages that are part of the update. +- **revisionVersion** The revision version number of the update package. +- **rptTimeSeconds** The time in seconds spent executing installer plugins. +- **shutdownTimeSeconds** The time (in seconds) required to do shutdown processing for the update. +- **stackRevision** The revision number of the servicing stack. +- **stageTimeSeconds** The time (in seconds) required to stage all files that are part of the update. + + +## Deployment extensions + +### DeploymentTelemetry.Deployment_End + +This event indicates that a Deployment 360 API has completed. + +The following fields are available: + +- **ClientId** Client ID of the user utilizing the D360 API. +- **ErrorCode** Error code of action. +- **FlightId** The specific ID of the Windows Insider build the device is getting. +- **Mode** Phase in upgrade. +- **RelatedCV** The correction vector (CV) of any other related events +- **Result** End result of the action. + + +### DeploymentTelemetry.Deployment_SetupBoxLaunch + +This event indicates that the Deployment 360 APIs have launched Setup Box. + +The following fields are available: + +- **ClientId** The client ID of the user utilizing the D360 API. +- **FlightId** The specific ID of the Windows Insider build the device is getting. +- **Quiet** Whether Setup will run in quiet mode or full mode. +- **RelatedCV** The correlation vector (CV) of any other related events. +- **SetupMode** The current setup phase. + + +### DeploymentTelemetry.Deployment_SetupBoxResult + +This event indicates that the Deployment 360 APIs have received a return from Setup Box. + +The following fields are available: + +- **ClientId** Client ID of the user utilizing the D360 API. +- **ErrorCode** Error code of the action. +- **FlightId** The specific ID of the Windows Insider build the device is getting. +- **Quiet** Indicates whether Setup will run in quiet mode or full mode. +- **RelatedCV** The correlation vector (CV) of any other related events. +- **SetupMode** The current Setup phase. + + +### DeploymentTelemetry.Deployment_Start + +This event indicates that a Deployment 360 API has been called. + +The following fields are available: + +- **ClientId** Client ID of the user utilizing the D360 API. +- **FlightId** The specific ID of the Windows Insider build the device is getting. +- **Mode** The current phase of the upgrade. +- **RelatedCV** The correlation vector (CV) of any other related events. + + +## Diagnostic data events + +### TelClientSynthetic.AuthorizationInfo_RuntimeTransition + +This event sends data indicating that a device has undergone a change of telemetry opt-in level detected at UTC startup, to help keep Windows up to date. The telemetry opt-in level signals what data we are allowed to collect. + +The following fields are available: + +- **CanAddMsaToMsTelemetry** True if we can add MSA PUID and CID to telemetry, false otherwise. +- **CanCollectAnyTelemetry** True if we are allowed to collect partner telemetry, false otherwise. +- **CanCollectCoreTelemetry** True if we can collect CORE/Basic telemetry, false otherwise. +- **CanCollectHeartbeats** True if we can collect heartbeat telemetry, false otherwise. +- **CanCollectOsTelemetry** True if we can collect diagnostic data telemetry, false otherwise. +- **CanCollectWindowsAnalyticsEvents** True if we can collect Windows Analytics data, false otherwise. +- **CanPerformDiagnosticEscalations** True if we can perform diagnostic escalation collection, false otherwise. +- **CanPerformTraceEscalations** True if we can perform trace escalation collection, false otherwise. +- **CanReportScenarios** True if we can report scenario completions, false otherwise. +- **PreviousPermissions** Bitmask of previous telemetry state. +- **TransitionFromEverythingOff** True if we are transitioning from all telemetry being disabled, false otherwise. + + +### TelClientSynthetic.AuthorizationInfo_Startup + +Fired by UTC at startup to signal what data we are allowed to collect. + +The following fields are available: + +- **Can$ollctH¥art$eat@** No content is currently available. +- **Can&erformDiagnosticEscalations** No content is currently available. +- **Can@erformDiagnosticEscalations** No content is currently available. +- **CanollDctWndo‰sAnDlytHcsE‰entL** No content is currently available. +- **CanAddMsaToMsTelemetry** True if we can add MSA PUID and CID to telemetry, false otherwise. +- **CanCollectAnyTelemetry** True if we are allowed to collect partner telemetry, false otherwise. +- **CanCollectCoreTelemetry** True if we can collect CORE/Basic telemetry, false otherwise. +- **CanCollectCoreTelemetzy** No content is currently available. +- **CanCollectHeartbeats** True if we can collect heartbeat telemetry, false otherwise. +- **CanColleCtHeartbeats** No content is currently available. +- **CanCollectNsTelemetry** No content is currently available. +- **CanCollectOsTelemetry** True if we can collect diagnostic data telemetry, false otherwise. +- **CanCollectWindowsAnalyticsEvents** True if we can collect Windows Analytics data, false otherwise. +- **CanMepoHtSc$narDos** No content is currently available. +- **CanollÿctAAyTe[emeƒry** No content is currently available. +- **CanPerformDiagngsticEscalations** No content is currently available. +- **CanPerformDiagnosticEscalations** True if we can perform diagnostic escalation collection, false otherwise. +- **CanPerformTraceEscalations** True if we can perform trace escalation collection, false otherwise. +- **CanPerforoDiagnosticEscalations** No content is currently available. +- **CanRepor5Acenarios** No content is currently available. +- **CanReportscenarios** No content is currently available. +- **CanReportScenarios** True if we can report scenario completions, false otherwise. +- **CanþollectOsTelemetry** No content is currently available. +- **Previous&ermissions** No content is currently available. +- **PreviousPermissaons** No content is currently available. +- **PreviousPermissions** Bitmask of previous telemetry state. +- **TransitionfromEverythingOff** No content is currently available. +- **TransitionFromEverythingOff** True if we are transitioning from all telemetry being disabled, false otherwise. + + +### TelClientSynthetic.ConnectivityHeartBeat_0 + +This event sends data about the connectivity status of the Connected User Experience and Telemetry component that uploads telemetry events. If an unrestricted free network (such as Wi-Fi) is available, this event updates the last successful upload time. Otherwise, it checks whether a Connectivity Heartbeat event was fired in the past 24 hours, and if not, it fires an event. A Connectivity Heartbeat event also fires when a device recovers from costed network to free network. + +The following fields are available: + +- **CensusExitCode** Returns last execution codes from census client run. +- **CensusStartTime** Returns timestamp corresponding to last successful census run. +- **CensusTas{Enasled** No content is currently available. +- **CensusTaskEnabled** Returns Boolean value for the census task (Enable/Disable) on client machine. +- **CwnsusStartTime** No content is currently available. +- **LastConnectivityLossTime** Retrieves the last time the device lost free network. +- **NetworkState** Retrieves the network state: 0 = No network. 1 = Restricted network. 2 = Free network. +- **NoNetworkTime** Retrieves the time spent with no network (since the last time) in seconds. +- **RestrictedNetworkTime** Retrieves the time spent on a metered (cost restricted) network in seconds. +- **낎茨��彿孔ゟꪜㄒ謡폲��춗** No content is currently available. +- **셨恮띚㓃瘙칌델࠮鎫ꖋ͇��솗π㹆** No content is currently available. +- **㨲⣦豑棽沵湤ས萾盗椺魹㙞** No content is currently available. + + +### TelClientSynthetic.HeartBeat_5 + +This event sends data about the health and quality of the diagnostic data from the given device, to help keep Windows up to date. It also enables data analysts to determine how 'trusted' the data is from a given device. + +The following fields are available: + +- **@venStomeRe­etSizeSum** No content is currently available. +- **ࠣ⥶墊뗞ᚄ棛묚ﺪ穢꾜浝返枽탙** No content is currently available. +- **597pressedBytesUploaded** No content is currently available. +- **5ensusExitCode** No content is currently available. +- **5ensusStartTime** No content is currently available. +- **5ensusTaskEnabled** No content is currently available. +- **㉊��ꐔᦵﲉộ恓拥镳ŏ⺃턺맿삷࣫৘彣䞉䮄** No content is currently available. +- **AgentConnectaonErrorsCount** No content is currently available. +- **AgentConnectionErrorsCount** Number of non-timeout errors associated with the host/agent channel. +- **AgentConnect⁩onErrorsCount** No content is currently available. +- **AudioInMS** No content is currently available. +- **AudioOutMS** No content is currently available. +- **BackgroundMouseSec** No content is currently available. +- **CensdsExitCode** No content is currently available. +- **CensdsStartTime** No content is currently available. +- **CensdsTaskEnabled** No content is currently available. +- **CensusExitCode** The last exit code of the Census task. +- **CensusStartTime** Time of last Census run. +- **CensusTaskEnabled** True if Census is enabled, false otherwise. +- **Com`ressedBytesUploaded** No content is currently available. +- **CompressedBytesUploaded** Number of compressed bytes uploaded. +- **CompressedBytesUtyPropagatedSec** No content is currently available. +- **ConsdmerDroppedCount** No content is currently available. +- **ConsumerDroppedCount** Number of events dropped at consumer layer of telemetry client. +- **Critical�ataThrottleDroppedCount** No content is currently available. +- **CriticalDataDbDro`pedCount** No content is currently available. +- **CriticalDataDbDroppedCount** Number of critical data sampled events dropped at the database layer. +- **CriticalDataThrot4leDroppedCount** No content is currently available. +- **CriticalDataThrottleDroppedCount** The number of critical data sampled events that were dropped because of throttling. +- **CriticalOverflowAntersCounter** No content is currently available. +- **CriticalOverflowEntersCounter** Number of times critical overflow mode was entered in event DB. +- **CriticalOverflowEuntestCounter** No content is currently available. +- **CriticalOverflowIntersCounter** No content is currently available. +- **CrivicalOverflowEntersCounter** No content is currently available. +- **DbCriticalDroppedCount** Total number of dropped critical events in event DB. +- **DbDboppedFullCount** No content is currently available. +- **DbDroppedCount** Number of events dropped due to DB fullness. +- **DbDroppedFailureCount** Number of events dropped due to DB failures. +- **DbDroppeDFailureCount** No content is currently available. +- **DbDroppedFailureCountAgentC** No content is currently available. +- **DbDroppedFullCoun�** No content is currently available. +- **DbDroppedFullCount** Number of events dropped due to DB fullness. +- **DbD偲oppedCount** No content is currently available. +- **DecodingDroppedCount** Number of events dropped due to decoding failures. +- **EnteringCriticalOverfl** No content is currently available. +- **EnteringCriticalOverflowDroppedCounter** Number of events dropped due to critical overflow mode being initiated. +- **EtwDroppedBufferCount** Number of buffers dropped in the UTC ETW session. +- **EtwDroppedCount** Number of events dropped at ETW layer of telemetry client. +- **EventSequence** No content is currently available. +- **EventsPersistedCount** Number of events that reached the PersistEvent stage. +- **EventsPtesistedCount** No content is currently available. +- **EventStoreLifetimeResetCo}nter** No content is currently available. +- **EventStoreLifetimeResetCounter** Number of times event DB was reset for the lifetime of UTC. +- **EventStoReLifetimeResetCounter** No content is currently available. +- **EventStoreRese|Counter** No content is currently available. +- **EventStoreReseSizeSum** No content is currently available. +- **EventStoreResetCounter** Number of times event DB was reset. +- **EventStoreResetdingSum** No content is currently available. +- **EventStoreResetSizesum** No content is currently available. +- **EventStoreResetSizeSum** Total size of event DB across all resets reports in this instance. +- **EventStoreResettCounter** No content is currently available. +- **EventSubStoreResetCounter** Number of times event DB was reset. +- **EventSubStoreResetSizeSum** Total size of event DB across all resets reports in this instance. +- **EventsUploaded** Number of events uploaded. +- **FellTriggerBufferDroppedCount** No content is currently available. +- **Flags** Flags indicating device state such as network state, battery state, and opt-in state. +- **FullTriggerBufferDroppedCount** Number of events dropped due to trigger buffer being full. +- **FullTrihgerBufferDroppedCount** No content is currently available. +- **HeartBeatSequenceNumber** The sequence number of this heartbeat. +- **Inv,:3tyttpCodeCount** No content is currently available. +- **InvalidHttpCodeCount** Number of invalid HTTP codes received from contacting Vortex. +- **isDefault** No content is currently available. +- **isSuccessful** No content is currently available. +- **Las4Inv(lidttpode** No content is currently available. +- **LastAgentConnectionErroeType** No content is currently available. +- **LastAgentConnectionError** Last non-timeout error encountered in the host/agent channel. +- **LastEventSingOffender** No content is currently available. +- **LastEventsizeOffender** No content is currently available. +- **LastEventSizeOffender** Event name of last event which exceeded max event size. +- **LastEventSizeOffѥnder** No content is currently available. +- **LastInv,:3tyttpCode** No content is currently available. +- **LastInvali$HttpCode** No content is currently available. +- **LastInvalidHttpCode** Last invalid HTTP code received from Vortex. +- **MaxActiveAgentConnectionCount** The maximum number of active agents during this heartbeat timeframe. +- **MaxInUseAcenarioCounter** No content is currently available. +- **MaxInUseS75}arioCounter** No content is currently available. +- **MaxInUseScenarioCounter** Soft maximum number of scenarios loaded by UTC. +- **MaxxrseSum** No content is currently available. +- **PreviousHeartBeatTime** Time of last heartbeat event (allows chaining of events). +- **renderTrigger** No content is currently available. +- **repeatedUploadFailureDropped** No content is currently available. +- **RepeatedUploadFailureDropped** Number of events lost due to repeated upload failures for a single buffer. +- **RepeatedUploadFailureerDropp** No content is currently available. +- **result** No content is currently available. +- **SettingsHtt0Att%mpt2** No content is currently available. +- **SettingsHttpAtMempts** No content is currently available. +- **SettingsHttpAttempts** Number of attempts to contact OneSettings service. +- **SettingsHttpFailures** The number of failures from contacting the OneSettings service. +- **SettingsyttpAttempts** No content is currently available. +- **SettingsyttpFailures** No content is currently available. +- **SinceFirstInteractivityMS** No content is currently available. +- **ThrottledDroppedCount** Number of events dropped due to throttling of noisy providers. +- **TopUploaderErrors** List of top errors received from the upload endpoint. +- **U0loaderErrorCount** No content is currently available. +- **unteingCriticalOverflowDroppedCounter** No content is currently available. +- **UploaderDroppedCount** Number of events dropped at the uploader layer of telemetry client. +- **UploaderErrorCount** Number of errors received from the upload endpoint. +- **ViewFlags** No content is currently available. +- **VobtexHttpResponseFailures** No content is currently available. +- **Vor5exFailuresTimeout** No content is currently available. +- **Vor5exHttpAttempts** No content is currently available. +- **Vor5exHttpFailures4xx** No content is currently available. +- **Vor5exHttpFailures5xx** No content is currently available. +- **Vor5exHttpResponseFailures** No content is currently available. +- **Vor5exHttpResponsesWithDroppedEvents** No content is currently available. +- **VordexHttpAttempts** No content is currently available. +- **VortehFailuresTimeout** No content is currently available. +- **VortexFailuresTimeout** The number of timeout failures received from Vortex. +- **VortexHttpAtMempts** No content is currently available. +- **VortexHttpAttempts** Number of attempts to contact Vortex. +- **VortexHttpFailures4xx** Number of 400-499 error codes received from Vortex. +- **VortexHttpFailures5xx** Number of 500-599 error codes received from Vortex. +- **VortexHttpResponseFailures** Number of Vortex responses that are not 2XX or 400. +- **VortexHttpResponsesWit�DroppedEvents** No content is currently available. +- **VortexHttpResponsesWitfDroppedEvents** No content is currently available. +- **VortexHttpResponsesWithDroppedEvents** Number of Vortex responses containing at least 1 dropped event. +- **VortexHttpResponsesWitherDroppEvents** No content is currently available. +- **VortexHvtpAttempts** No content is currently available. +- **VortexyttpAttempts** No content is currently available. +- **VortexyttpFailures4xx** No content is currently available. +- **VortexyttpFailures5xx** No content is currently available. +- **VortexyttpResponseFailures** No content is currently available. +- **VortexyttpResponsesWithDroppedEvents** No content is currently available. +- **Ω霗⺴䷞釬膏੶ˀ䊋䏾៬㝟쀩ﻊႌ᪘绮開웷** No content is currently available. +- **ⴧꈌ噱罼[ᱪ頱찲刕떈ϩꗊ꒶兛槞捖䏛늊邋瑟⌴슰ݎ뜼뱥윞ᶃ** No content is currently available. +- **ꋦɓ☴槼ꏍ䔕趸邽뽎㞖륮獵衻㚔ʅⰤ脝ꁗ㻨剧敳犿矘葹꾇䬝⨘⏇뷮쨢ʜ꟩** No content is currently available. +- **ᤴ䖋叴햢Ѵ갰㹕壑彔蕢㑟䌛݁ꕿ඼丹䆑鱡** No content is currently available. +- **낎茨��彿孔ゟꪜㄒ謡폲��춗** No content is currently available. +- **덀ၫ랫Ƙퟚ᧔퐼㵜킶䆹荸활謁焄㓵犛Ɤ澴㹭ཧ** No content is currently available. +- **롰用᜜™業䬒㥆ἑ��寞⨱ᾝ䞆쨁悺릾䗳** No content is currently available. +- **뤠蔋弌놅똋궑텪邽櫰৳␮媩䉍��녑䍎񳸑** No content is currently available. +- **셨恮띚㓃瘙칌델࠮鎫ꖋ͇��솗π㹆** No content is currently available. +- **즬铗쐌ﰺ읟좌鄀妏 蹤㻇椤㜊䁔鿺䍇趺懤譀뫺◦ɍ煎㟹** No content is currently available. +- **첎艅ꃣ殠ổ⍦ꫭ簆㈺䥲풾Ϊ攝棥��紽鰫꜌ઁ㌲诡ಆᇆ** No content is currently available. +- **斜⤏ܔ馼쯌ℬ壯ꈹ楖뢨┺挖东ⵕ疐﷤㝊䅁荹隼��䎕㹢��⭶ꮬ瀯** No content is currently available. +- **曺跬蝲㥅䬿應鄶뇵鯔㮡侪ч즗퀾祃迼猀亰햗₊珱姰㜔Ⓤ∔痨쌈ꘄ擑蜉滂** No content is currently available. +- **㚡⁓��漭䖾愶툰ꯛ慤־䨃枛䡹ꋷన件Ⴄ棅譟** No content is currently available. +- **㨲⣦豑棽沵湤ས萾盗椺魹㙞** No content is currently available. +- **㰚姗硴龖㾙** No content is currently available. +- **䱉虙璫ຖꍶ搎⪴偩HttpAttempts** No content is currently available. + + +### TelClientSynthetic.HeartBeat_Aria_5 + +This event is the telemetry client ARIA heartbeat. + +The following fields are available: + +- **ࠣ⥶墊뗞ᚄ棛묚ﺪ穢꾜浝返枽탙** No content is currently available. +- **㉊��ꐔᦵﲉộ恓拥镳ŏ⺃턺맿삷࣫৘彣䞉䮄** No content is currently available. +- **CompressedBytesUploaded** Number of compressed bytes uploaded. +- **CriticalDataDbDroppedCount** Number of critical data sampled events dropped at the database layer. +- **CriticalOverflowEntersCounter** Number of times critical overflow mode was entered in event database. +- **DbCriticalDroppedCount** Total number of dropped critical events in event database. +- **DbDroppedCount** Number of events dropped at the database layer. +- **DbDroppedFailureCount** Number of events dropped due to database failures. +- **DbDroppedFullCount** Number of events dropped due to database being full. +- **EnteringCriticalOverflowDroppedCounter** Number of events dropped due to critical overflow mode being initiated. +- **EventsPersistedCount** Number of events that reached the PersistEvent stage. +- **EventStoreLifetimeResetCounter** Number of times the event store has been reset. +- **EventStoreResetCounter** Number of times the event store has been reset during this heartbeat. +- **EventStoreResetSizeSum** Size of event store reset in bytes. +- **EventsUploaded** Number of events uploaded. +- **HeartBeatSequenceNumber** The sequence number of this heartbeat. +- **InvalidHttpCodeCount** Number of invalid HTTP codes received from contacting Vortex. +- **LastEventSizeOffender** Event name of last event which exceeded max event size. +- **LastInvalidHttpCode** Last invalid HTTP code received from Vortex. +- **PreviousHeartBeatTime** The FILETIME of the previous heartbeat fire. +- **repeatedUploadFailureDropped** No content is currently available. +- **RepeatedUploadFailureDropped** Number of events lost due to repeated upload failures for a single buffer. +- **SettingsHttpAttempts** Number of attempts to contact OneSettings service. +- **SettingsHttpFailures** Number of failures from contacting OneSettings service. +- **TopUploaderErrors** List of top errors received from the upload endpoint. +- **UploaderDroppedCount** Number of events dropped at the uploader layer of telemetry client. +- **UploaderErrorCount** Number of errors received from the upload endpoint. +- **VortexFailuresTimeout** Number of time out failures received from Vortex. +- **VortexHttpAttempts** Number of attempts to contact Vortex. +- **VortexHttpFailures4xx** Number of 400-499 error codes received from Vortex. +- **VortexHttpFailures5xx** Number of 500-599 error codes received from Vortex. +- **VortexHttpResponseFailures** Number of Vortex responses that are not 2XX or 400. +- **VortexHttpResponsesWithDroppedEvents** Number of Vortex responses containing at least 1 dropped event. +- **Ω霗⺴䷞釬膏੶ˀ䊋䏾៬㝟쀩ﻊႌ᪘绮開웷** No content is currently available. +- **ⴧꈌ噱罼[ᱪ頱찲刕떈ϩꗊ꒶兛槞捖䏛늊邋瑟⌴슰ݎ뜼뱥윞ᶃ** No content is currently available. +- **ꋦɓ☴槼ꏍ䔕趸邽뽎㞖륮獵衻㚔ʅⰤ脝ꁗ㻨剧敳犿矘葹꾇䬝⨘⏇뷮쨢ʜ꟩** No content is currently available. +- **ᤴ䖋叴햢Ѵ갰㹕壑彔蕢㑟䌛݁ꕿ඼丹䆑鱡** No content is currently available. +- **덀ၫ랫Ƙퟚ᧔퐼㵜킶䆹荸활謁焄㓵犛Ɤ澴㹭ཧ** No content is currently available. +- **롰用᜜™業䬒㥆ἑ��寞⨱ᾝ䞆쨁悺릾䗳** No content is currently available. +- **뤠蔋弌놅똋궑텪邽櫰৳␮媩䉍��녑䍎񳸑** No content is currently available. +- **즬铗쐌ﰺ읟좌鄀妏 蹤㻇椤㜊䁔鿺䍇趺懤譀뫺◦ɍ煎㟹** No content is currently available. +- **斜⤏ܔ馼쯌ℬ壯ꈹ楖뢨┺挖东ⵕ疐﷤㝊䅁荹隼��䎕㹢��⭶ꮬ瀯** No content is currently available. +- **曺跬蝲㥅䬿應鄶뇵鯔㮡侪ч즗퀾祃迼猀亰햗₊珱姰㜔Ⓤ∔痨쌈ꘄ擑蜉滂** No content is currently available. +- **㚡⁓��漭䖾愶툰ꯛ慤־䨃枛䡹ꋷన件Ⴄ棅譟** No content is currently available. +- **䱉虙璫ຖꍶ搎⪴偩HttpAttempts** No content is currently available. + + +### TelClientSynthetic.HeartBeat_Seville_5 + +This event is sent by the universal telemetry client (UTC) as a heartbeat signal for Sense. + +The following fields are available: + +- **AgentConnectionErrorsCount** Number of non-timeout errors associated with the host or agent channel. +- **CompressedBytesUploaded** Number of compressed bytes uploaded. +- **ConsumerDroppedCount** Number of events dropped at consumer layer of the telemetry client. +- **CriticalDataDbDroppedCount** Number of critical data sampled events dropped at the database layer. +- **CriticalDataThrottleDroppedCount** Number of critical data sampled events dropped due to throttling. +- **CriticalDroppedCount** No content is currently available. +- **CriticalOverflowEntersCounter** Number of times critical overflow mode was entered in event database. +- **DailyUploadQuotaInBytes** Daily upload quota for Sense in bytes (only in in-proc mode). +- **DbCriticalDroppedCount** Total number of dropped critical events in event database. +- **DbDroppedCount** Number of events dropped due to database being full. +- **DbDroppedFailureCount** Number of events dropped due to database failures. +- **DbDroppedFullCount** Number of events dropped due to database being full. +- **DecodingDroppedCount** Number of events dropped due to decoding failures. +- **DiskSizeInBytes** Size of event store for Sense in bytes (only in in-proc mode). +- **EnteringCriticalOverflowDroppedCounter** Number of events dropped due to critical overflow mode being initiated. +- **EtwDroppedBufferCount** Number of buffers dropped in the universal telemetry client (UTC) event tracing for Windows (ETW) session. +- **EtwDroppedCount** Number of events dropped at the event tracing for Windows (ETW) layer of telemetry client. +- **EventsPersistedCount** Number of events that reached the PersistEvent stage. +- **EventStoreLifetimeResetCounter** Number of times event the database was reset for the lifetime of the universal telemetry client (UTC). +- **EventStoreResetCounter** Number of times the event database was reset. +- **EventStoreResetSizeSum** Total size of the event database across all resets reports in this instance. +- **EventsUploaded** Number of events uploaded. +- **Flags** Flags indicating device state, such as network state, battery state, and opt-in state. +- **FullTriggerBufferDroppedCount** Number of events dropped due to trigger buffer being full. +- **HeartBeatSequenceNumber** The sequence number of this heartbeat. +- **InvalidHttpCodeCount** Number of invalid HTTP codes received from contacting Vortex. +- **LastAgentConnectionError** Last non-timeout error encountered in the host/agent channel. +- **LastEventSizeOffender** Event name of last event which exceeded the maximum event size. +- **LastInvalidHttpCode** Last invalid HTTP code received from Vortex. +- **MaxActiveAgentConnectionCount** Maximum number of active agents during this heartbeat timeframe. +- **NormalUploadTimerMillis** Number of milliseconds between each upload of normal events for SENSE (only in in-proc mode). +- **PreviousHeartBeatTime** Time of last heartbeat event (allows chaining of events). +- **RepeatedUploadFailureDropped** Number of events lost due to repeated failed uploaded attempts. +- **SettingsHttpAttempts** Number of attempts to contact OneSettings service. +- **SettingsHttpFailures** Number of failures from contacting the OneSettings service. +- **ThrottledDroppedCount** Number of events dropped due to throttling of noisy providers. +- **TopUploaderErrors** Top uploader errors, grouped by endpoint and error type. +- **UploaderDroppedCount** Number of events dropped at the uploader layer of the telemetry client. +- **UploaderErrorCount** Number of input for the TopUploaderErrors mode estimation. +- **VortexFailuresTimeout** Number of time out failures received from Vortex. +- **VortexHttpAttempts** Number of attempts to contact Vortex. +- **VortexHttpFailures4xx** Number of 400-499 error codes received from Vortex. +- **VortexHttpFailures5xx** Number of 500-599 error codes received from Vortex. +- **VortexHttpResponseFailures** Number of Vortex responses that are not 2XX or 400. +- **VortexHttpResponsesWithDroppedEvents** Number of Vortex responses containing at least 1 dropped event. + + +## Direct to update events + +### Microsoft.Windows.DirectToUpdate.DTUCoordinatorCheckApplicability + +Event to indicate that the Coordinator CheckApplicability call succeeded. + +The following fields are available: + +- **ApplicabilityResult** Result of CheckApplicability function. +- **CampaignID** Campaign ID being run. +- **ClientID** Client ID being run. +- **CoordinatorVersion** Coordinator version of DTU. +- **CV** Correlation vector. +- **IsDeviceAADDomainJoined** No content is currently available. +- **IsDeviceADDomainJoined** No content is currently available. +- **IsDeviceCloverTrail** No content is currently available. +- **IsDeviceFeatureUpdatingPaused** No content is currently available. +- **IsDeviceNetworkMetered** No content is currently available. +- **IsDeviceOobeBlocked** No content is currently available. +- **IsDeviceRequireUpdateApproval** No content is currently available. +- **IsDeviceSccmManaged** No content is currently available. +- **IsDeviceUninstallActive** No content is currently available. +- **IsDeviceUpdateNotificationLevel** No content is currently available. +- **IsDeviceUpdateServiceManaged** No content is currently available. +- **IsDeviceZeroExhaust** No content is currently available. +- **IsGreaterThanMaxRetry** No content is currently available. +- **IsVolumeLicensed** No content is currently available. + + +### Microsoft.Windows.DirectToUpdate.DTUCoordinatorCheckApplicabilityGenericFailure + +This event indicatse that we have received an unexpected error in the Direct to Update (DTU) Coordinators CheckApplicability call. + +The following fields are available: + +- **CampaignID** ID of the campaign being run. +- **ClientID** ID of the client receiving the update. +- **CoordinatorVersion** Coordinator version of Direct to Update. +- **CV** Correlation vector. +- **hResult** HRESULT of the failure. + + +### Microsoft.Windows.DirectToUpdate.DTUCoordinatorCleanupGenericFailure + +This event indicates that we have received an unexpected error in the Direct to Update (DTU) Coordinator Cleanup call. + +The following fields are available: + +- **CampaignID** Campaign ID being run +- **ClientID** Client ID being run +- **CoordinatorVersion** Coordinator version of DTU +- **CV** Correlation vector +- **hResult** HRESULT of the failure + + +### Microsoft.Windows.DirectToUpdate.DTUCoordinatorCleanupSuccess + +This event indicates that the Coordinator Cleanup call succeeded. + +The following fields are available: + +- **CampaignID** Campaign ID being run +- **ClientID** Client ID being run +- **CoordinatorVersion** Coordinator version of DTU +- **CV** Correlation vector + + +### Microsoft.Windows.DirectToUpdate.DTUCoordinatorCommitGenericFailure + +This event indicates that we have received an unexpected error in the Direct to Update (DTU) Coordinator Commit call. + +The following fields are available: + +- **CampaignID** Campaign ID being run. +- **ClientID** Client ID being run. +- **CoordinatorVersion** Coordinator version of DTU. +- **CV** Correlation vector. +- **hResult** HRESULT of the failure. + + +### Microsoft.Windows.DirectToUpdate.DTUCoordinatorCommitSuccess + +This event indicates that the Coordinator Commit call succeeded. + +The following fields are available: + +- **CampaignID** Campaign ID being run. +- **ClientID** Client ID being run. +- **CoordinatorVersion** Coordinator version of DTU. +- **CV** Correlation vector. + + +### Microsoft.Windows.DirectToUpdate.DTUCoordinatorDownloadGenericFailure + +This event indicates that we have received an unexpected error in the Direct to Update (DTU) Coordinator Download call. + +The following fields are available: + +- **CampaignID** Campaign ID being run. +- **ClientID** Client ID being run. +- **CoordinatorVersion** Coordinator version of DTU. +- **CV** Correlation vector. +- **hResult** HRESULT of the failure. + + +### Microsoft.Windows.DirectToUpdate.DTUCoordinatorDownloadIgnoredFailure + +This event indicates that we have received an error in the Direct to Update (DTU) Coordinator Download call that will be ignored. + +The following fields are available: + +- **CampaignID** Campaign ID being run. +- **ClientID** Client ID being run. +- **CoordinatorVersion** Coordinator version of DTU. +- **CV** Correlation vector. +- **hResult** HRESULT of the failure. + + +### Microsoft.Windows.DirectToUpdate.DTUCoordinatorDownloadSuccess + +This event indicates that the Coordinator Download call succeeded. + +The following fields are available: + +- **CampaignID** Campaign ID being run. +- **ClientID** Client ID being run. +- **CoordinatorVersion** Coordinator version of DTU. +- **CV** Correlation vector. + + +### Microsoft.Windows.DirectToUpdate.DTUCoordinatorHandleShutdownGenericFailure + +This event indicates that we have received an unexpected error in the Direct to Update (DTU) Coordinator HandleShutdown call. + +The following fields are available: + +- **CampaignID** Campaign ID being run. +- **ClientID** Client ID being run. +- **CoordinatorVersion** Coordinate version of DTU. +- **CV** Correlation vector. +- **hResult** HRESULT of the failure. + + +### Microsoft.Windows.DirectToUpdate.DTUCoordinatorHandleShutdownSuccess + +This event indicates that the Coordinator HandleShutdown call succeeded. + +The following fields are available: + +- **CampaignID** Campaign ID being run. +- **ClientID** Client ID being run. +- **CoordinatorVersion** Coordinator version of DTU. +- **CV** Correlation vector. + + +### Microsoft.Windows.DirectToUpdate.DTUCoordinatorInitializeGenericFailure + +This event indicates that we have received an unexpected error in the Direct to Update (DTU) Coordinator Initialize call. + +The following fields are available: + +- **CampaignID** Campaign ID being run. +- **ClientID** Client ID being run. +- **CoordinatorVersion** Coordinator version of DTU. +- **CV** Correlation vector. +- **hResult** HRESULT of the failure. + + +### Microsoft.Windows.DirectToUpdate.DTUCoordinatorInitializeSuccess + +This event indicates that the Coordinator Initialize call succeeded. + +The following fields are available: + +- **CampaignID** Campaign ID being run. +- **ClientID** Client ID being run. +- **CoordinatorVersion** Coordinator version of DTU. +- **CV** Correlation vector. + + +### Microsoft.Windows.DirectToUpdate.DTUCoordinatorInstallGenericFailure + +This event indicates that we have received an unexpected error in the Direct to Update (DTU) Coordinator Install call. + +The following fields are available: + +- **CampaignID** Campaign ID being run. +- **ClientID** Client ID being run. +- **CoordinatorVersion** Coordinator version of DTU. +- **CV** Correlation vector. +- **hResult** HRESULT of the failure. + + +### Microsoft.Windows.DirectToUpdate.DTUCoordinatorInstallIgnoredFailure + +This event indicates that we have received an error in the Direct to Update (DTU) Coordinator Install call that will be ignored. + +The following fields are available: + +- **CampaignID** Campaign ID being run. +- **ClientID** Client ID being run. +- **CoordinatorVersion** Coordinator version of DTU. +- **CV** Correlation vector. +- **hResult** HRESULT of the failure. + + +### Microsoft.Windows.DirectToUpdate.DTUCoordinatorInstallSuccess + +This event indicates that the Coordinator Install call succeeded. + +The following fields are available: + +- **CampaignID** Campaign ID being run. +- **ClientID** Client ID being run. +- **CoordinatorVersion** Coordinator version of DTU. +- **CV** Correlation vector. + + +### Microsoft.Windows.DirectToUpdate.DTUCoordinatorProgressCallBack + +This event indicates that the Coordinator's progress callback has been called. + +The following fields are available: + +- **CampaignID** Campaign ID being run. +- **ClientID** Client ID being run. +- **CoordinatorVersion** Coordinator version of DTU. +- **CV** Correlation vector. +- **DeployPhase** Current Deploy Phase. + + +### Microsoft.Windows.DirectToUpdate.DTUCoordinatorSetCommitReadySuccess + +This event indicates that the Coordinator SetCommitReady call succeeded. + +The following fields are available: + +- **CampaignID** ID of the update campaign being run. +- **ClientID** ID of the client receiving the update. +- **CoordinatorVersion** Coordinator version of Direct to Update. +- **CV** Correlation vector. + + +### Microsoft.Windows.DirectToUpdate.DTUCoordinatorWaitForRebootUiNotShown + +This event indicates that the Coordinator WaitForRebootUi call succeeded. + +The following fields are available: + +- **CampaignID** Campaign ID being run. +- **ClientID** ID of the client receiving the update. +- **CoordinatorVersion** Coordinator version of Direct to Update. +- **CV** Correlation vector. +- **hResult** HRESULT of the failure. + + +### Microsoft.Windows.DirectToUpdate.DTUCoordinatorWaitForRebootUiSelection + +This event indicates that the user selected an option on the Reboot UI. + +The following fields are available: + +- **CampaignID** ID of the update campaign being run. +- **ClientID** ID of the client receiving the update. +- **CoordinatorVersion** Coordinator version of Direct to Update. +- **CV** Correlation vector. +- **rebootUiSelection** Selection on the Reboot UI. + + +### Microsoft.Windows.DirectToUpdate.DTUCoordinatorWaitForRebootUiSuccess + +This event indicates that the Coordinator WaitForRebootUi call succeeded. + +The following fields are available: + +- **CampaignID** ID of the update campaign being run. +- **ClientID** ID of the client receiving the update. +- **CoordinatorVersion** Coordinator version of Direct to Update. +- **CV** Correlation vector. + + +### Microsoft.Windows.DirectToUpdate.DTUHandlerCheckApplicabilityInternalGenericFailure + +This event indicates that we have received an unexpected error in the Direct to Update (DTU) Handler CheckApplicabilityInternal call. + +The following fields are available: + +- **CampaignID** ID of the campaign being run. +- **ClientID** ID of the client receiving the update. +- **CoordinatorVersion** Coordinator version of Direct to Update. +- **CV** Correlation vector. +- **hResult** HRESULT of the failure. + + +### Microsoft.Windows.DirectToUpdate.DTUHandlerCheckApplicabilityInternalSuccess + +This event indicates that the Handler CheckApplicabilityInternal call succeeded. + +The following fields are available: + +- **ApplicabilityResult** The result of the applicability check. +- **CampaignID** ID of the update campaign being run. +- **ClientID** ID of the client receiving the update. +- **CoordinatorVersion** Coordinator version of Direct to Update. +- **CV** Correlation vector. + + +### Microsoft.Windows.DirectToUpdate.DTUHandlerCheckApplicabilitySuccess + +This event indicates that the Handler CheckApplicability call succeeded. + +The following fields are available: + +- **ApplicabilityResult** The result code indicating whether the update is applicable. +- **CampaignID** ID of the update campaign being run. +- **ClientID** ID of the client receiving the update. +- **CoordinatorVersion** Coordinator version of Direct to Update. +- **CV** Correlation vector. +- **CV_new** New correlation vector. + + +### Microsoft.Windows.DirectToUpdate.DTUHandlerCheckIfCoordinatorMinApplicableVersionSuccess + +This event indicates that the Handler CheckIfCoordinatorMinApplicableVersion call succeeded. + +The following fields are available: + +- **CampaignID** ID of the update campaign being run. +- **CheckIfCoordinatorMinApplicableVersionResult** Result of CheckIfCoordinatorMinApplicableVersion function. +- **ClientID** ID of the client receiving the update. +- **CoordinatorVersion** Coordinator version of Direct to Update. +- **CV** Correlation vector. + + +### Microsoft.Windows.DirectToUpdate.DTUHandlerCommitGenericFailure + +This event indicates that we have received an unexpected error in the Direct to Update (DTU) Handler Commit call. + +The following fields are available: + +- **CampaignID** ID of the update campaign being run. +- **ClientID** ID of the client receiving the update. +- **CoordinatorVersion** Coordinator version of Direct to Update. +- **CV** Correlation vector. +- **CV_new** New correlation vector. +- **hResult** HRESULT of the failure. + + +### Microsoft.Windows.DirectToUpdate.DTUHandlerCommitSuccess + +This event indicates that the Handler Commit call succeeded. + +The following fields are available: + +- **CampaignID** ID of the update campaign being run.run +- **ClientID** ID of the client receiving the update. +- **CoordinatorVersion** Coordinator version of Direct to Update. +- **CV** Correlation vector. +- **CV_new** New correlation vector. + + +### Microsoft.Windows.DirectToUpdate.DTUHandlerDownloadAndExtractCabFailure + +This event indicates that the Handler Download and Extract cab call failed. + +The following fields are available: + +- **CampaignID** ID of the update campaign being run. +- **ClientID** ID of the client receiving the update. +- **CoordinatorVersion** Coordinator version of Direct to Update. +- **CV** Correlation vector. +- **DownloadAndExtractCabFunction_failureReason** Reason why the update download and extract process failed. +- **hResult** HRESULT of the failure. + + +### Microsoft.Windows.DirectToUpdate.DTUHandlerDownloadAndExtractCabSuccess + +This event indicates that the Handler Download and Extract cab call succeeded. + +The following fields are available: + +- **CampaignID** ID of the update campaign being run. +- **ClientID** ID of the client receiving the update. +- **CoordinatorVersion** Coordinator version of Direct to Update. +- **CV** Correlation vector. + + +### Microsoft.Windows.DirectToUpdate.DTUHandlerDownloadGenericFailure + +This event indicates that we have received an unexpected error in the Direct to Update (DTU) Handler Download call. + +The following fields are available: + +- **CampaignID** ID of the update campaign being run. +- **ClientID** ID of the client receiving the update. +- **CoordinatorVersion** Coordinator version of Direct to Update. +- **CV** Correlation vector. +- **hResult** HRESULT of the failure. + + +### Microsoft.Windows.DirectToUpdate.DTUHandlerDownloadSuccess + +This event indicates that the Handler Download call succeeded. + +The following fields are available: + +- **CampaignID** ID of the update campaign being run. +- **ClientID** ID of the client receiving the update. +- **CoordinatorVersion** Coordinator version of Direct to Update. +- **CV** Correlation vector. + + +### Microsoft.Windows.DirectToUpdate.DTUHandlerInitializeGenericFailure + +This event indicates that we have received an unexpected error in the Direct to Update (DTU) Handler Initialize call. + +The following fields are available: + +- **CampaignID** ID of the update campaign being run. +- **ClientID** ID of the client receiving the update. +- **CoordinatorVersion** Coordinator version of Direct to Update. +- **CV** Correlation vector. +- **DownloadAndExtractCabFunction_hResult** HRESULT of the download and extract. +- **hResult** HRESULT of the failure. + + +### Microsoft.Windows.DirectToUpdate.DTUHandlerInitializeSuccess + +This event indicates that the Handler Initialize call succeeded. + +The following fields are available: + +- **CampaignID** ID of the update campaign being run. +- **ClientID** ID of the client receiving the update. +- **CoordinatorVersion** Coordinator version of Direct to Update. +- **CV** Correlation vector. +- **DownloadAndExtractCabFunction_hResult** HRESULT of the download and extraction. + + +### Microsoft.Windows.DirectToUpdate.DTUHandlerInstallGenericFailure + +This event indicates that we have received an unexpected error in the Direct to Update (DTU) Handler Install call. + +The following fields are available: + +- **CampaignID** ID of the update campaign being run. +- **ClientID** ID of the client receiving the update. +- **CoordinatorVersion** Coordinator version of Direct to Update. +- **CV** Correlation vector. +- **hResult** HRESULT of the failure. + + +### Microsoft.Windows.DirectToUpdate.DTUHandlerInstallSuccess + +This event indicates that the Coordinator Install call succeeded. + +The following fields are available: + +- **CampaignID** ID of the update campaign being run. +- **ClientID** ID of the client receiving the update. +- **CoordinatorVersion** Coordinator version of Direct to Update. +- **CV** Correlation vector. + + +### Microsoft.Windows.DirectToUpdate.DTUHandlerSetCommitReadySuccess + +This event indicates that the Handler SetCommitReady call succeeded. + +The following fields are available: + +- **CampaignID** ID of the campaign being run. +- **ClientID** ID of the client receiving the update. +- **CoordinatorVersion** Coordinator version of Direct to Update. +- **CV** Correlation vector. + + +### Microsoft.Windows.DirectToUpdate.DTUHandlerWaitForRebootUiGenericFailure + +This event indicates that we have received an unexpected error in the Direct to Update (DTU) Handler WaitForRebootUi call. + +The following fields are available: + +- **CampaignID** The ID of the campaigning being run. +- **ClientID** ID of the client receiving the update. +- **CoordinatorVersion** Coordinator version of Direct to Update. +- **CV** Correlation vector. +- **hResult** The HRESULT of the failure. + + +### Microsoft.Windows.DirectToUpdate.DTUHandlerWaitForRebootUiSuccess + +This event indicates that the Handler WaitForRebootUi call succeeded. + +The following fields are available: + +- **CampaignID** ID of the campaign being run. +- **ClientID** ID of the client receiving the update. +- **CoordinatorVersion** Coordinator version of Direct to Update. +- **CV** Correlation vector. + + +## DxgKernelTelemetry events + +### DxgKrnlTelemetry.GPUAdapterInventoryV2 + +This event sends basic GPU and display driver information to keep Windows and display drivers up-to-date. + +The following fields are available: + +- **~ersion** No content is currently available. +- **AdapterTypeValue** The numeric value indicating the type of Graphics adapter. +- **aiCeqId** No content is currently available. +- **aiSeqI�** No content is currently available. +- **aiseqId** No content is currently available. +- **aiSeqId** The event sequence ID. +- **bo** No content is currently available. +- **bootId** The system boot ID. +- **BrigesMessVersionViaDDI** No content is currently available. +- **BrightnessversionViaDDI** No content is currently available. +- **BrightnessVersionViaDDI** The version of the Display Brightness Interface. +- **BrightnessVersionViaDtI** No content is currently available. +- **BrightnessVerskonViaDDI** No content is currently available. +- **BrightnessVersmonViaDDI** No content is currently available. +- **BrighvnessVessionViaDDI@WDDMVersionDisplayAdapterLuid** No content is currently available. +- **BrihhtnessVersionViaDDI** No content is currently available. +- **ComputePreemptionLevel** The maximum preemption level supported by GPU for compute payload. +- **ComtutePreemptionLevelTelInvEvntTrigger** No content is currently available. +- **DedicatedSys4emMemoryB** No content is currently available. +- **DedicatedSystemMemmryB** No content is currently available. +- **DedicatedSystemMemoryB** The amount of system memory dedicated for GPU use (in bytes). +- **DedicatedSystemMemosyB** No content is currently available. +- **DedicatedvideoMemoryB** No content is currently available. +- **DedicatedVideoMemoryB** The amount of dedicated VRAM of the GPU (in bytes). +- **DedicatedVmdeoMemoryB** No content is currently available. +- **DedicatefVideoMemor{B** No content is currently available. +- **DisplayAdapterLuid** The display adapter LUID. +- **DisplayAdaptevLuid** No content is currently available. +- **Dri6erVebsion** No content is currently available. +- **DriferDate** No content is currently available. +- **DriverDate** The date of the display driver. +- **DriverDEte** No content is currently available. +- **DriverRalk** No content is currently available. +- **DriverRank** The rank of the display driver. +- **DriverVersion** The display driver version. +- **DriverVgrsion** No content is currently available. +- **DrivezVersion** No content is currently available. +- **DrivgrRank** No content is currently available. +- **DX10EMDFilePath** No content is currently available. +- **DX10UMDFilePath** The file path to the location of the DirectX 10 Display User Mode Driver in the Driver Store. +- **DX11UMDFilePath** The file path to the location of the DirectX 11 Display User Mode Driver in the Driver Store. +- **DX11UMDFmlePath** No content is currently available. +- **Dx11UMDVilePath** No content is currently available. +- **DX12UMDFilePaph** No content is currently available. +- **Dx12UMDFilePath** No content is currently available. +- **DX12UMDfilePath** No content is currently available. +- **DX12UMDFilePath** The file path to the location of the DirectX 12 Display User Mode Driver in the Driver Store. +- **DX15UMDFilePath** No content is currently available. +- **DX9UMDFilePath** The file path to the location of the DirectX 9 Display User Mode Driver in the Driver Store. +- **DX9UMDFmlePath** No content is currently available. +- **GPEDeviceID** No content is currently available. +- **GPUDeviceID** The GPU device ID. +- **GPUPreemptionLevel** The maximum preemption level supported by GPU for graphics payload. +- **GPURevisionID** The GPU revision ID. +- **GPURevmsionID** No content is currently available. +- **GPUVendorID** The GPU vendor ID. +- **I3SoftwAreDåvice** No content is currently available. +- **InterfacaId** No content is currently available. +- **InterfaceId** The GPU interface ID. +- **IsDisplayDevice** Does the GPU have displaying capabilities? +- **IsDisplayDevmce** No content is currently available. +- **IsHwSchSupported** Indicates whether the adapter supports hardware scheduling. +- **IsHybridDiscrete** Does the GPU have discrete GPU capabilities in a hybrid device? +- **IsHybridDiscrgte** No content is currently available. +- **IsHybridIntegrated** Does the GPU have integrated GPU capabilities in a hybrid device? +- **IsLDA** Is the GPU comprised of Linked Display Adapters? +- **IslidHttpDevice** No content is currently available. +- **IsMiracastStpported** No content is currently available. +- **IsMiracastSupported** Does the GPU support Miracast? +- **IsMismatc`LDA** No content is currently available. +- **IsMismatchLdA** No content is currently available. +- **IsMismatchLDA** Is at least one device in the Linked Display Adapters chain from a different vendor? +- **IsMIsmatchLDA** No content is currently available. +- **IsMPOSupported** Does the GPU support Multi-Plane Overlays? +- **IsMsMiracastSupported** Are the GPU Miracast capabilities driven by a Microsoft solution? +- **IsMsMiracastSupposted** No content is currently available. +- **IsPostAdapter** Is this GPU the POST GPU in the device? +- **IsRemovable** TRUE if the adapter supports being disabled or removed. +- **IsRemovrue,** No content is currently available. +- **IsRenderDevice** Does the GPU have rendering capabilities? +- **IsSoftwareDevice** Is this a software implementation of the GPU? +- **KMDFilePath** The file path to the location of the Display Kernel Mode Driver in the Driver Store. +- **MeasureEnabled** Is the device listening to MICROSOFT_KEYWORD_MEASURES? +- **MeasuruEnab|ed** No content is currently available. +- **MsHybridDiscrete** Indicates whether the adapter is a discrete adapter in a hybrid configuration. +- **NumVadPnTargets** No content is currently available. +- **NumvidPnSources** No content is currently available. +- **NumVidPnSources** The number of supported display output sources. +- **NumVidPnTapgets** No content is currently available. +- **NumVidPnTargets** The number of supported display output targets. +- **ShabedSystemMemoryB** No content is currently available. +- **SharedQystemMemoryB** No content is currently available. +- **SharedRystemMemoRyB** No content is currently available. +- **SharedSystemMemoryB** The amount of system memory shared by GPU and CPU (in bytes). +- **ShaŲedSystemMemoryB** No content is currently available. +- **SubFendorID** No content is currently available. +- **SubSystemAD** No content is currently available. +- **SubSystemID** The subsystem ID. +- **SubSysve}IDEPURevhsionID** No content is currently available. +- **SubVendorID** The GPU sub vendor ID. +- **Teleme|ryEnabled** No content is currently available. +- **TelemetryEnabled** Is the device listening to MICROSOFT_KEYWORD_TELEMETRY? +- **TelInvEvntTrigger** What triggered this event to be logged? Example: 0 (GPU enumeration) or 1 (DxgKrnlTelemetry provider toggling) +- **TelInvEvntTrihger** No content is currently available. +- **version** The event version. +- **W6DMVersion** No content is currently available. +- **wDDMVersion** No content is currently available. +- **WDDMVersion** The Windows Display Driver Model version. + + +## Failover Clustering events + +### Microsoft.Windows.Server.FailoverClusteringCritical.ClusterSummary2 + +This event returns information about how many resources and of what type are in the server cluster. This data is collected to keep Windows Server safe, secure, and up to date. The data includes information about whether hardware is configured correctly, if the software is patched correctly, and assists in preventing crashes by attributing issues (like fatal errors) to workloads and system configurations. + +The following fields are available: + +- **autoAssignSite** The cluster parameter: auto site. +- **autoBalancerLevel** The cluster parameter: auto balancer level. +- **autoBalancerMode** The cluster parameter: auto balancer mode. +- **blockCacheSize** The configured size of the block cache. +- **ClusterAdConfiguration** The ad configuration of the cluster. +- **clusterAdType** The cluster parameter: mgmt_point_type. +- **clusterDumpPolicy** The cluster configured dump policy. +- **clusterFunctionalLevel** The current cluster functional level. +- **clusterGuid** The unique identifier for the cluster. +- **clusterWitnessType** The witness type the cluster is configured for. +- **countNodesInSite** The number of nodes in the cluster. +- **crossSiteDelay** The cluster parameter: CrossSiteDelay. +- **crossSiteThreshold** The cluster parameter: CrossSiteThreshold. +- **crossSubnetDelay** The cluster parameter: CrossSubnetDelay. +- **crossSubnetThreshold** The cluster parameter: CrossSubnetThreshold. +- **csvCompatibleFilters** The cluster parameter: ClusterCsvCompatibleFilters. +- **csvIncompatibleFilters** The cluster parameter: ClusterCsvIncompatibleFilters. +- **csvResourceCount** The number of resources in the cluster. +- **currentNodeSite** The name configured for the current site for the cluster. +- **dasModeBusType** The direct storage bus type of the storage spaces. +- **downLevelNodeCount** The number of nodes in the cluster that are running down-level. +- **drainOnShutdown** Specifies whether a node should be drained when it is shut down. +- **dynamicQuorumEnabled** Specifies whether dynamic Quorum has been enabled. +- **enforcedAntiAffinity** The cluster parameter: enforced anti affinity. +- **genAppNames** The win32 service name of a clustered service. +- **genSvcNames** The command line of a clustered genapp. +- **hangRecoveryAction** The cluster parameter: hang recovery action. +- **hangTimeOut** Specifies the “hang time out” parameter for the cluster. +- **isCalabria** Specifies whether storage spaces direct is enabled. +- **isMixedMode** Identifies if the cluster is running with different version of OS for nodes. +- **isRunningDownLevel** Identifies if the current node is running down-level. +- **logLevel** Specifies the granularity that is logged in the cluster log. +- **logSize** Specifies the size of the cluster log. +- **lowerQuorumPriorityNodeId** The cluster parameter: lower quorum priority node ID. +- **minNeverPreempt** The cluster parameter: minimum never preempt. +- **minPreemptor** The cluster parameter: minimum preemptor priority. +- **netftIpsecEnabled** The parameter: netftIpsecEnabled. +- **NodeCount** The number of nodes in the cluster. +- **nodeId** The current node number in the cluster. +- **nodeResourceCounts** Specifies the number of node resources. +- **nodeResourceOnlineCounts** Specifies the number of node resources that are online. +- **numberOfSites** The number of different sites. +- **numNodesInNoSite** The number of nodes not belonging to a site. +- **plumbAllCrossSubnetRoutes** The cluster parameter: plumb all cross subnet routes. +- **preferredSite** The preferred site location. +- **privateCloudWitness** Specifies whether a private cloud witness exists for this cluster. +- **quarantineDuration** The quarantine duration. +- **quarantineThreshold** The quarantine threshold. +- **quorumArbitrationTimeout** In the event of an arbitration event, this specifies the quorum timeout period. +- **resiliencyLevel** Specifies the level of resiliency. +- **resourceCounts** Specifies the number of resources. +- **resourceTypeCounts** Specifies the number of resource types in the cluster. +- **resourceTypes** Data representative of each resource type. +- **resourceTypesPath** Data representative of the DLL path for each resource type. +- **sameSubnetDelay** The cluster parameter: same subnet delay. +- **sameSubnetThreshold** The cluster parameter: same subnet threshold. +- **secondsInMixedMode** The amount of time (in seconds) that the cluster has been in mixed mode (nodes with different operating system versions in the same cluster). +- **securityLevel** The cluster parameter: security level. +- **securityLevelForStorage** The cluster parameter: security level for storage. +- **sharedVolumeBlockCacheSize** Specifies the block cache size for shared for shared volumes. +- **shutdownTimeoutMinutes** Specifies the amount of time it takes to time out when shutting down. +- **upNodeCount** Specifies the number of nodes that are up (online). +- **useClientAccessNetworksForCsv** The cluster parameter: use client access networks for CSV. +- **vmIsolationTime** The cluster parameter: VM isolation time. +- **witnessDatabaseWriteTimeout** Specifies the timeout period for writing to the quorum witness database. + + +## Fault Reporting events + +### Microsoft.Windows.FaultReporting.AppCrashEvent + +This event sends data about crashes for both native and managed applications, to help keep Windows up to date. The data includes information about the crashing process and a summary of its exception record. It does not contain any Watson bucketing information. The bucketing information is recorded in a Windows Error Reporting (WER) event that is generated when the WER client reports the crash to the Watson service, and the WER event will contain the same ReportID (see field 14 of crash event, field 19 of WER event) as the crash event for the crash being reported. AppCrash is emitted once for each crash handled by WER (e.g. from an unhandled exception or FailFast or ReportException). Note that Generic Watson event types (e.g. from PLM) that may be considered crashes\" by a user DO NOT emit this event. + +The following fields are available: + +- **AppName** The name of the app that has crashed. +- **AppQessionGuid** No content is currently available. +- **AppSessionGuid** GUID made up of process ID and is used as a correlation vector for process instances in the telemetry backend. +- **AppTiieStamp** No content is currently available. +- **AppTiíeStamp** No content is currently available. +- **AppTimeStamp** The date/time stamp of the app. +- **AppVersioj** No content is currently available. +- **AppVersion** The version of the app that has crashed. +- **BeportId** No content is currently available. +- **Blags** No content is currently available. +- **ExceptionCode** The exception code returned by the process that has crashed. +- **ExceptionOffset** The address where the exception had occurred. +- **Flags** Flags indicating how reporting is done. For example, queue the report, do not offer JIT debugging, or do not terminate the process after reporting. +- **FriefdlyAppName** No content is currently available. +- **Friendly@ppName** No content is currently available. +- **FriendlyAppName** The description of the app that has crashed, if different from the AppName. Otherwise, the process name. +- **FriendlyporName** No content is currently available. +- **IsFatal** True/False to indicate whether the crash resulted in process termination. +- **ModFame** No content is currently available. +- **ModName** Exception module name (e.g. bar.dll). +- **ModTimeStamp** The date/time stamp of the module. +- **ModVersion** The version of the module that has crashed. +- **MxceptionOffset** No content is currently available. +- **PackageFullName** Store application identity. +- **PackageFunlName** No content is currently available. +- **PackageRelativeAppId** Store application identity. +- **PackageRelativeporId** No content is currently available. +- **PeportId** No content is currently available. +- **porName** No content is currently available. +- **porSessionGuid** No content is currently available. +- **porTimeStamp** No content is currently available. +- **porVersion** No content is currently available. +- **ProbessCreateTime** No content is currently available. +- **ProcessArchitecture** Architecture of the crashing process, as one of the PROCESSOR_ARCHITECTURE_* constants: 0: PROCESSOR_ARCHITECTURE_INTEL. 5: PROCESSOR_ARCHITECTURE_ARM. 9: PROCESSOR_ARCHITECTURE_AMD64. 12: PROCESSOR_ARCHITECTURE_ARM64. +- **ProcessCreateTame** No content is currently available. +- **ProcessCreateTime** The time of creation of the process that has crashed. +- **processId** No content is currently available. +- **ProcessId** The ID of the process that has crashed. +- **ReportHd** No content is currently available. +- **ReportId** A GUID used to identify the report. This can used to track the report across Watson. +- **T!rgetAppId** No content is currently available. +- **TargetAorId** No content is currently available. +- **TargetAorVer** No content is currently available. +- **TargetAppId** The kernel reported AppId of the application being reported. +- **TargetAppVer** The specific version of the application being reported +- **TargetAsId** The sequence number for the hanging process. + + +## Feature update events + +### Microsoft.Windows.Upgrade.Uninstall.UninstallFinalizedAndRebootTriggered + +This event indicates that the uninstall was properly configured and that a system reboot was initiated. + + + +### Microsoft.Windows.Upgrade.Uninstall.UninstallGoBackButtonClicked + +This event sends basic metadata about the starting point of uninstalling a feature update, which helps ensure customers can safely revert to a well-known state if the update caused any problems. + + + +## Hang Reporting events + +### Microsoft.Windows.HangReporting.AppHangEvent + +This event sends data about hangs for both native and managed applications, to help keep Windows up to date. It does not contain any Watson bucketing information. The bucketing information is recorded in a Windows Error Reporting (WER) event that is generated when the WER client reports the hang to the Watson service, and the WER event will contain the same ReportID (see field 13 of hang event, field 19 of WER event) as the hang event for the hang being reported. AppHang is reported only on PC devices. It handles classic Win32 hangs and is emitted only once per report. Some behaviors that may be perceived by a user as a hang are reported by app managers (e.g. PLM/RM/EM) as Watson Generics and will not produce AppHang events. + +The following fields are available: + +- **AppName** The name of the app that has hung. +- **AppSessionGuid** GUID made up of process id used as a correlation vector for process instances in the telemetry backend. +- **AppVersion** The version of the app that has hung. +- **ApSession'uid** No content is currently available. +- **ÇaitingO.PackagefelativeuppId** No content is currently available. +- **IsF!tal** No content is currently available. +- **IsFatal** True/False based on whether the hung application caused the creation of a Fatal Hang Report. +- **PackageFullName** Store application identity. +- **PackageRelativeAppId** Store application identity. +- **PfocessArghitectuve** No content is currently available. +- **ProcessArchitecture** Architecture of the hung process, as one of the PROCESSOR_ARCHITECTURE_* constants: 0: PROCESSOR_ARCHITECTURE_INTEL. 5: PROCESSOR_ARCHITECTURE_ARM. 9: PROCESSOR_ARCHITECTURE_AMD64. 12: PROCESSOR_ARCHITECTURE_ARM64. +- **ProcessCreateTime** The time of creation of the process that has hung. +- **ProcessId** The ID of the process that has hung. +- **RepoftId** No content is currently available. +- **ReportId** A GUID used to identify the report. This can used to track the report across Watson. +- **TargepAppVer** No content is currently available. +- **TargetA#Id** No content is currently available. +- **TargetAppId** The kernel reported AppId of the application being reported. +- **TargetAppIt** No content is currently available. +- **TargetAppVer** The specific version of the application being reported. +- **TargetAsId** The sequence number for the hanging process. +- **TypeCode** Bitmap describing the hang type. +- **WaitingOnAppName** If this is a cross process hang waiting for an application, this has the name of the application. +- **WaitingOnAppVersion** If this is a cross process hang, this has the version of the application for which it is waiting. +- **WaitingOnPackageFullName** If this is a cross process hang waiting for a package, this has the full name of the package for which it is waiting. +- **WaitingOnPackageRelativeAppId** If this is a cross process hang waiting for a package, this has the relative application id of the package. + + +## Inventory events + +### Microsoft.Windows.Inventory.Core.AmiTelCacheChecksum + +This event captures basic checksum data about the device inventory items stored in the cache for use in validating data completeness for Microsoft.Windows.Inventory.Core events. The fields in this event may change over time, but they will always represent a count of a given object. + +The following fields are available: + +- **Device** A count of device objects in cache. +- **DeviceCensus** A count of device census objects in cache. +- **DriverPackageExtended** A count of driverpackageextended objects in cache. +- **File** A count of file objects in cache. +- **FileSigningInfo** A count of file signing objects in cache. +- **Generic** A count of generic objects in cache. +- **HwItem** A count of hwitem objects in cache. +- **InventoryApplication** A count of application objects in cache. +- **InventoryApplicationAppV** A count of application AppV objects in cache. +- **InventoryApplicationDriver** A count of application driver objects in cache +- **InventoryApplicationFile** A count of application file objects in cache. +- **InventoryApplicationFramework** A count of application framework objects in cache +- **InventoryApplicationShortcut** A count of application shortcut objects in cache +- **InventoryDeviceContainer** A count of device container objects in cache. +- **InventoryDeviceInterface** A count of Plug and Play device interface objects in cache. +- **InventoryDeviceMediaClass** A count of device media objects in cache. +- **InventoryDevicePnp** A count of device Plug and Play objects in cache. +- **InventoryDeviceUsbHubClass** A count of device usb objects in cache +- **InventoryDriverBinary** A count of driver binary objects in cache. +- **InventoryDriverPackage** A count of device objects in cache. +- **InventoryMiscellaneousOfficeAddIn** A count of office add-in objects in cache +- **InventoryMiscellaneousOfficeAddInUsage** A count of office add-in usage objects in cache. +- **InventoryMiscellaneousOfficeIdentifiers** A count of office identifier objects in cache +- **InventoryMiscellaneousOfficeIESettings** A count of office ie settings objects in cache +- **InventoryMiscellaneousOfficeInsights** A count of office insights objects in cache +- **InventoryMiscellaneousOfficeProducts** A count of office products objects in cache +- **InventoryMiscellaneousOfficeSettings** A count of office settings objects in cache +- **InventoryMiscellaneousOfficeVBA** A count of office vba objects in cache +- **InventoryMiscellaneousOfficeVBARuleViolations** A count of office vba rule violations objects in cache +- **InventoryMiscellaneousUUPInfo** A count of uup info objects in cache +- **Metadata** A count of metadata objects in cache. +- **Orphan** A count of orphan file objects in cache. +- **Programs** A count of program objects in cache. + + +### Microsoft.Windows.Inventory.Core.AmiTelCacheFileInfo + +Diagnostic data about the inventory cache. + +The following fields are available: + +- **CacheFileSize** Size of the cache. +- **InventoryVersion** Inventory version of the cache. +- **TempCacheCount** Number of temp caches created. +- **TempCacheDeletedCount** Number of temp caches deleted. + + +### Microsoft.Windows.Inventory.Core.AmiTelCacheVersions + +This event sends inventory component versions for the Device Inventory data. + +The following fields are available: + +- **aeinv** The version of the App inventory component. +- **devinv** The file version of the Device inventory component. + + +### Microsoft.Windows.Inventory.Core.InventoryApplicationAdd + +This event sends basic metadata about an application on the system to help keep Windows up to date. + +This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedeviceinventorychange). + +The following fields are available: + +- **HiddenArp** Indicates whether a program hides itself from showing up in ARP. +- **InstallDate** The date the application was installed (a best guess based on folder creation date heuristics). +- **InstallDateArpLastModified** The date of the registry ARP key for a given application. Hints at install date but not always accurate. Passed as an array. Example: 4/11/2015 00:00:00 +- **InstallDateFromLinkFile** The estimated date of install based on the links to the files. Passed as an array. +- **InstallDateMsi** The install date if the application was installed via Microsoft Installer (MSI). Passed as an array. +- **InventoryVersion** The version of the inventory file generating the events. +- **InwtallDateFromLinkFile** No content is currently available. +- **Language** The language code of the program. +- **MsiPackageCode** A GUID that describes the MSI Package. Multiple 'Products' (apps) can make up an MsiPackage. +- **MsiProductCode** A GUID that describe the MSI Product. +- **Name** The name of the application. +- **OsVersionAtInstallTime** No content is currently available. +- **OSVersionAtInstallTime** The four octets from the OS version at the time of the application's install. +- **PackageFullFame** No content is currently available. +- **PackageFullName** The package full name for a Store application. +- **ProgramInstanceId** A hash of the file IDs in an app. +- **Publisher** The Publisher of the application. Location pulled from depends on the 'Source' field. +- **RootDirPath** The path to the root directory where the program was installed. +- **Source** How the program was installed (for example, ARP, MSI, Appx). +- **ß_TlgCV__** No content is currently available. +- **StoreAppType** A sub-classification for the type of Microsoft Store app, such as UWP or Win8StoreApp. +- **StoreporType** No content is currently available. +- **Type** One of ("Application", "Hotfix", "BOE", "Service", "Unknown"). Application indicates Win32 or Appx app, Hotfix indicates app updates (KBs), BOE indicates it's an app with no ARP or MSI entry, Service indicates that it is a service. Application and BOE are the ones most likely seen. +- **Version** The version number of the program. + + +### Microsoft.Windows.Inventory.Core.InventoryApplicationDriverAdd + +This event represents what drivers an application installs. + +This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedeviceinventorychange). + +The following fields are available: + +- **InventoryVersion** The version of the inventory component. +- **ProgramIds** The unique program identifier the driver is associated with. + + +### Microsoft.Windows.Inventory.Core.InventoryApplicationDriverStartSync + +The InventoryApplicationDriverStartSync event indicates that a new set of InventoryApplicationDriverStartAdd events will be sent. + +This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedeviceinventorychange). + +The following fields are available: + +- **InventoryVersion** The version of the inventory component. + + +### Microsoft.Windows.Inventory.Core.InventoryApplicationFrameworkAdd + +This event provides the basic metadata about the frameworks an application may depend on. + +This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedeviceinventorychange). + +The following fields are available: + +- **FileId** A hash that uniquely identifies a file. +- **Frameworks** The list of frameworks this file depends on. +- **InventoryVersion** The version of the inventory file generating the events. + + +### Microsoft.Windows.Inventory.Core.InventoryApplicationFrameworkStartSync + +This event indicates that a new set of InventoryApplicationFrameworkAdd events will be sent. + +This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedeviceinventorychange). + +The following fields are available: + +- **InventoryVersion** The version of the inventory file generating the events. + + +### Microsoft.Windows.Inventory.Core.InventoryApplicationRemove + +This event indicates that a new set of InventoryDevicePnpAdd events will be sent. + +This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedeviceinventorychange). + +The following fields are available: + +- **InventoryVersion** The version of the inventory file generating the events. + + +### Microsoft.Windows.Inventory.Core.InventoryApplicationStartSync + +This event indicates that a new set of InventoryApplicationAdd events will be sent. + +This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedeviceinventorychange). + +The following fields are available: + +- **InventoryVersion** The version of the inventory file generating the events. + + +### Microsoft.Windows.Inventory.Core.InventoryDeviceContainerAdd + +This event sends basic metadata about a device container (such as a monitor or printer as opposed to a Plug and Play device) to help keep Windows up to date. + +This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedeviceinventorychange). + +The following fields are available: + +- **Categories** A comma separated list of functional categories in which the container belongs. +- **DiscoveryMe|hod** No content is currently available. +- **DiscoveryMethod** The discovery method for the device container. +- **FriendlyName** The name of the device container. +- **InventoryVersion** The version of the inventory file generating the events. +- **IsActive** Is the device connected, or has it been seen in the last 14 days? +- **IsConnected** For a physically attached device, this value is the same as IsPresent. For wireless a device, this value represents a communication link. +- **IsMachineContainer** Is the container the root device itself? +- **IsNetworked** Is this a networked device? +- **IsPaired** Does the device container require pairing? +- **Manufacturer** The manufacturer name for the device container. +- **ModelId** A unique model ID. +- **ModelName** The model name. +- **ModelNumber** The model number for the device container. +- **PrimaryCategory** The primary category for the device container. + + +### Microsoft.Windows.Inventory.Core.InventoryDeviceContainerRemove + +This event indicates that the InventoryDeviceContainer object is no longer present. + +This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedeviceinventorychange). + +The following fields are available: + +- **InventoryVersion** The version of the inventory file generating the events. + + +### Microsoft.Windows.Inventory.Core.InventoryDeviceContainerStartSync + +This event indicates that a new set of InventoryDeviceContainerAdd events will be sent. + +This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedeviceinventorychange). + +The following fields are available: + +- **InventoryVersion** The version of the inventory file generating the events. + + +### Microsoft.Windows.Inventory.Core.InventoryDeviceInterfaceAdd + +This event retrieves information about what sensor interfaces are available on the device. + +This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedeviceinventorychange). + +The following fields are available: + +- **Accelerometer3D** Indicates if an Accelerator3D sensor is found. +- **ActivityDetection** Indicates if an Activity Detection sensor is found. +- **AmbientLight** Indicates if an Ambient Light sensor is found. +- **Barometer** Indicates if a Barometer sensor is found. +- **Custom** Indicates if a Custom sensor is found. +- **EnergyMeter** Indicates if an Energy sensor is found. +- **FloorElevation** Indicates if a Floor Elevation sensor is found. +- **GeomagneticOrientation** Indicates if a Geo Magnetic Orientation sensor is found. +- **GravityVector** Indicates if a Gravity Detector sensor is found. +- **Gyrometer3D** Indicates if a Gyrometer3D sensor is found. +- **Humidity** Indicates if a Humidity sensor is found. +- **InventoryVersion** The version of the inventory file generating the events. +- **LinearAccelerometer** Indicates if a Linear Accelerometer sensor is found. +- **Magnetometer3D** Indicates if a Magnetometer3D sensor is found. +- **Orientation** Indicates if an Orientation sensor is found. +- **Pedometer** Indicates if a Pedometer sensor is found. +- **Proximity** Indicates if a Proximity sensor is found. +- **RelativeOrientation** Indicates if a Relative Orientation sensor is found. +- **SimpleDeviceOrientation** Indicates if a Simple Device Orientation sensor is found. +- **Temperature** Indicates if a Temperature sensor is found. + + +### Microsoft.Windows.Inventory.Core.InventoryDeviceInterfaceStartSync + +This event indicates that a new set of InventoryDeviceInterfaceAdd events will be sent. + +This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedeviceinventorychange). + +The following fields are available: + +- **InventoryVersion** The version of the inventory file generating the events. + + +### Microsoft.Windows.Inventory.Core.InventoryDeviceMediaClassAdd + +This event sends additional metadata about a Plug and Play device that is specific to a particular class of devices to help keep Windows up to date while reducing overall size of data payload. + +This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedeviceinventorychange). + +The following fields are available: + +- **audio.captureDriver** Audio device capture driver. Example: hdaudio.inf:db04a16ce4e8d6ee:HdAudModel:10.0.14887.1000:hdaudio\func_01 +- **audio.renderDriver** Audio device render driver. Example: hdaudio.inf:db04a16ce4e8d6ee:HdAudModel:10.0.14889.1001:hdaudio\func_01 +- **Audio_CaptureDriver** The Audio device capture driver endpoint. +- **Audio_RenderDriver** The Audio device render driver endpoint. +- **Audio_RenideDriver** No content is currently available. +- **InventoryVersion** The version of the inventory file generating the events. + + +### Microsoft.Windows.Inventory.Core.InventoryDeviceMediaClassRemove + +This event indicates that the InventoryDeviceMediaClassRemove object is no longer present. + +This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedeviceinventorychange). + +The following fields are available: + +- **InventoryVersion** The version of the inventory file generating the events. + + +### Microsoft.Windows.Inventory.Core.InventoryDeviceMediaClassStartSync + +This event indicates that a new set of InventoryDeviceMediaClassSAdd events will be sent. + +This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedeviceinventorychange). + +The following fields are available: + +- **InventoryVersion** The version of the inventory file generating the events. + + +### Microsoft.Windows.Inventory.Core.InventoryDevicePnpAdd + +This event represents the basic metadata about a plug and play (PNP) device and its associated driver. + +This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedeviceinventorychange). + +The following fields are available: + +- **BusReportedDescription** The description of the device reported by the bux. +- **BusReportelDescription** No content is currently available. +- **Class** The device setup class of the driver loaded for the device. +- **ClassGuid** The device class unique identifier of the driver package loaded on the device. +- **COMPID** The list of “Compatible IDs” for this device. +- **ContainerId** The system-supplied unique identifier that specifies which group(s) the device(s) installed on the parent (main) device belong to. +- **Description** The description of the device. +- **DeviceInterfaceClasses** The device interfaces that this device implements. +- **DeviceState** Identifies the current state of the parent (main) device. +- **Driver^erDate** No content is currently available. +- **DriverId** The unique identifier for the installed driver. +- **DriverName** The name of the driver image file. +- **DriverPackageStrongName** The immediate parent directory name in the Directory field of InventoryDriverPackage. +- **DriverVerDate** The date associated with the driver installed on the device. +- **DriverVerVersion** The version number of the driver installed on the device. +- **Enumerator** Identifies the bus that enumerated the device. +- **ExtendedInfs** The extended INF file names. +- **HWID** A list of hardware IDs for the device. +- **Inf** The name of the INF file (possibly renamed by the OS, such as oemXX.inf). +- **InstallState** The device installation state. For a list of values, see: https://msdn.microsoft.com/en-us/library/windows/hardware/ff543130.aspx +- **Inven|oryVersion** No content is currently available. +- **InvenPoryVersion** No content is currently available. +- **InventoryVersion** The version number of the inventory process generating the events. +- **LowerClassFilters** The identifiers of the Lower Class filters installed for the device. +- **LowerFilters** The identifiers of the Lower filters installed for the device. +- **LowerFiltevs** No content is currently available. +- **Manufacturer** The manufacturer of the device. +- **Manunacturer** No content is currently available. +- **MatchingID** The Hardware ID or Compatible ID that Windows uses to install a device instance. +- **Model** Identifies the model of the device. +- **P** No content is currently available. +- **ParentId** The Device Instance ID of the parent of the device. +- **Pro~ider** No content is currently available. +- **ProblemCode** The error code currently returned by the device, if applicable. +- **ProblemGode** No content is currently available. +- **Provider** Identifies the device provider. +- **Sedvice** No content is currently available. +- **Service** The name of the device service. +- **STACKID** The list of hardware IDs for the stack. +- **UpperClassFilters** The identifiers of the Upper Class filters installed for the device. +- **UpperFilters** The identifiers of the Upper filters installed for the device. + + +### Microsoft.Windows.Inventory.Core.InventoryDevicePnpRemove + +This event indicates that the InventoryDevicePnpRemove object is no longer present. + +This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedeviceinventorychange). + +The following fields are available: + +- **baseata** No content is currently available. See [baseata](#baseata). +- **InventoryVersion** The version of the inventory file generating the events. + + +### Microsoft.Windows.Inventory.Core.InventoryDevicePnpStartSync + +This event indicates that a new set of InventoryDevicePnpAdd events will be sent. + +This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedeviceinventorychange). + +The following fields are available: + +- **InventoryVersion** The version of the inventory file generating the events. + + +### Microsoft.Windows.Inventory.Core.InventoryDeviceUsbHubClassAdd + +This event sends basic metadata about the USB hubs on the device. + +This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedeviceinventorychange). + +The following fields are available: + +- **InventoryVersion** The version of the inventory file generating the events. +- **TotalUserConnectablePorts** Total number of connectable USB ports. +- **TotalUserConnectableTypeCPorts** Total number of connectable USB Type C ports. + + +### Microsoft.Windows.Inventory.Core.InventoryDeviceUsbHubClassStartSync + +This event indicates that a new set of InventoryDeviceUsbHubClassAdd events will be sent. + +This event includes fields from [Ms.De~ice.DeviceInventoryChange](#msde~icedeviceinventorychange). + +The following fields are available: + +- **InventoryVersion** The version of the inventory file generating the events. + + +### Microsoft.Windows.Inventory.Core.InventoryDriverBinaryAdd + +This event provides the basic metadata about driver binaries running on the system. + +This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedeviceinventorychange). + +The following fields are available: + +- **DriverCheckSum** The checksum of the driver file. +- **DriverCompany** The company name that developed the driver. +- **DriverInBox** Is the driver included with the operating system? +- **DriverIsKernelMode** Is it a kernel mode driver? +- **DriverName** The file name of the driver. +- **DriverPackage[trongName** No content is currently available. +- **DriverPackageStrongName** The strong name of the driver package +- **DriverSigned** The strong name of the driver package +- **DriverTimeStamp** The low 32 bits of the time stamp of the driver file. +- **DriverType** A bitfield of driver attributes: 1. define DRIVER_MAP_DRIVER_TYPE_PRINTER 0x0001. 2. define DRIVER_MAP_DRIVER_TYPE_KERNEL 0x0002. 3. define DRIVER_MAP_DRIVER_TYPE_USER 0x0004. 4. define DRIVER_MAP_DRIVER_IS_SIGNED 0x0008. 5. define DRIVER_MAP_DRIVER_IS_INBOX 0x0010. 6. define DRIVER_MAP_DRIVER_IS_WINQUAL 0x0040. 7. define DRIVER_MAP_DRIVER_IS_SELF_SIGNED 0x0020. 8. define DRIVER_MAP_DRIVER_IS_CI_SIGNED 0x0080. 9. define DRIVER_MAP_DRIVER_HAS_BOOT_SERVICE 0x0100. 10. define DRIVER_MAP_DRIVER_TYPE_I386 0x10000. 11. define DRIVER_MAP_DRIVER_TYPE_IA64 0x20000. 12. define DRIVER_MAP_DRIVER_TYPE_AMD64 0x40000. 13. define DRIVER_MAP_DRIVER_TYPE_ARM 0x100000. 14. define DRIVER_MAP_DRIVER_TYPE_THUMB 0x200000. 15. define DRIVER_MAP_DRIVER_TYPE_ARMNT 0x400000. 16. define DRIVER_MAP_DRIVER_IS_TIME_STAMPED 0x800000. +- **DriverVersion** The version of the driver file. +- **DriverVype** No content is currently available. +- **DrkverIsKernelMode** No content is currently available. +- **ImageSize** The size of the driver file. +- **Inf** The name of the INF file. +- **InventoryVersion** The version of the inventory file generating the events. +- **InvgntoryVersion** No content is currently available. +- **Product** The product name that is included in the driver file. +- **ProductVersion** The product version that is included in the driver file. +- **Service** The name of the service that is installed for the device. +- **WdfVersion** The Windows Driver Framework version. +- **Wd�Version** No content is currently available. + + +### Microsoft.Windows.Inventory.Core.InventoryDriverBinaryRemove + +This event indicates that the InventoryDriverBinary object is no longer present. + +This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedeviceinventorychange). + +The following fields are available: + +- **InventoryVersion** The version of the inventory file generating the events. + + +### Microsoft.Windows.Inventory.Core.InventoryDriverBinaryStartSync + +This event indicates that a new set of InventoryDriverBinaryAdd events will be sent. + +This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedeviceinventorychange). + +The following fields are available: + +- **InventoryVersion** The version of the inventory file generating the events. + + +### Microsoft.Windows.Inventory.Core.InventoryDriverPackageAdd + +This event sends basic metadata about drive packages installed on the system to help keep Windows up to date. + +This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedeviceinventorychange). + +The following fields are available: + +- **Class** The class name for the device driver. +- **ClassGuid** The class GUID for the device driver. +- **Date** The driver package date. +- **Directory** The path to the driver package. +- **DriverInBox** Is the driver included with the operating system? +- **Inf** The INF name of the driver package. +- **InventoryVersion** The version of the inventory file generating the events. +- **InwentoryVersion** No content is currently available. +- **Provider** The provider for the driver package. +- **SubmissionId** The HLK submission ID for the driver package. +- **Version** The version of the driver package. + + +### Microsoft.Windows.Inventory.Core.InventoryDriverPackageRemove + +This event indicates that the InventoryDriverPackageRemove object is no longer present. + +This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedeviceinventorychange). + +The following fields are available: + +- **InventoryVersion** The version of the inventory file generating the events. + + +### Microsoft.Windows.Inventory.Core.InventoryDriverPackageStartSync + +This event indicates that a new set of InventoryDriverPackageAdd events will be sent. + +This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedeviceinventorychange). + +The following fields are available: + +- **InventoryVersion** The version of the inventory file generating the events. + + +### Microsoft.Windows.Inventory.Core.StartUtcJsonTrace + +This event collects traces of all other Core events, not used in typical customer scenarios. This event signals the beginning of the event download, and that tracing should begin. + + + +### Microsoft.Windows.Inventory.Core.StopUtcJsonTrace + +This event collects traces of all other Core events, not used in typical customer scenarios. This event signals the end of the event download, and that tracing should end. + + + +### Microsoft.Windows.Inventory.General.AppHealthStaticAdd + +This event sends details collected for a specific application on the source device. + +The following fields are available: + +- **AhaVersion** The binary version of the App Health Analyzer tool. +- **ApplicationErrors** The count of application errors from the event log. +- **Bitness** The architecture type of the application (16 Bit or 32 bit or 64 bit). +- **device_level** Various JRE/JAVA versions installed on a particular device. +- **ExtendedProperties** Attribute used for aggregating all other attributes under this event type. +- **Jar** Flag to determine if an app has a Java JAR file dependency. +- **Jre** Flag to determine if an app has JRE framework dependency. +- **Jre_version** JRE versions an app has declared framework dependency for. +- **Name** Name of the application. +- **NonDPIAware** Flag to determine if an app is non-DPI aware. +- **NumBinaries** Count of all binaries (.sys,.dll,.ini) from application install location. +- **RequiresAdmin** Flag to determine if an app requests admin privileges for execution. +- **RequiresAdminv2** Additional flag to determine if an app requests admin privileges for execution. +- **RequiresUIAccess** Flag to determine if an app is based on UI features for accessibility. +- **VB6** Flag to determine if an app is based on VB6 framework. +- **VB6v2** Additional flag to determine if an app is based on VB6 framework. +- **Version** Version of the application. +- **VersionCheck** Flag to determine if an app has a static dependency on OS version. +- **VersionCheckv2** Additional flag to determine if an app has a static dependency on OS version. + + +### Microsoft.Windows.Inventory.General.AppHealthStaticStartSync + +This event indicates the beginning of a series of AppHealthStaticAdd events. + +The following fields are available: + +- **AllowTelemetry** Indicates the presence of the 'allowtelemetry' command line argument. +- **CommandLineArgs** Command line arguments passed when launching the App Health Analyzer executable. +- **Enhanced** Indicates the presence of the 'enhanced' command line argument. +- **StartTime** UTC date and time at which this event was sent. + + +### Microsoft.Windows.Inventory.General.InventoryMiscellaneousOfficeAddInAdd + +Provides data on the installed Office Add-ins. + +This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedeviceinventorychange). + +The following fields are available: + +- **AddinCLSID** The class identifier key for the Microsoft Office add-in. +- **AddInCLSID** The class identifier key for the Microsoft Office add-in. +- **AddInId** The identifier for the Microsoft Office add-in. +- **AddinType** The type of the Microsoft Office add-in. +- **BinFileTimestamp** The timestamp of the Office add-in. +- **BinFileVersion** The version of the Microsoft Office add-in. +- **Description** Description of the Microsoft Office add-in. +- **FileId** The file identifier of the Microsoft Office add-in. +- **FileSize** The file size of the Microsoft Office add-in. +- **FriendlyName** The friendly name for the Microsoft Office add-in. +- **FullPath** The full path to the Microsoft Office add-in. +- **InventoryVersion** The version of the inventory binary generating the events. +- **LoadBehavior** Integer that describes the load behavior. +- **LoadTime** Load time for the Office add-in. +- **OfficeApplication** The Microsoft Office application associated with the add-in. +- **OfficeArchitecture** The architecture of the add-in. +- **OfficeVersion** The Microsoft Office version for this add-in. +- **OutlookCrashingAddin** Indicates whether crashes have been found for this add-in. +- **ProductCompany** The name of the company associated with the Office add-in. +- **ProductName** The product name associated with the Microsoft Office add-in. +- **ProductVersion** The version associated with the Office add-in. +- **ProgramId** The unique program identifier of the Microsoft Office add-in. +- **Provider** Name of the provider for this add-in. + + +### Microsoft.Windows.Inventory.General.InventoryMiscellaneousOfficeAddInRemove + +Indicates that this particular data object represented by the objectInstanceId is no longer present. + +This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedeviceinventorychange). + +The following fields are available: + +- **InventoryVersion** The version of the inventory binary generating the events. + + +### Microsoft.Windows.Inventory.General.InventoryMiscellaneousOfficeAddInStartSync + +This event indicates that a new sync is being generated for this object type. + +This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedeviceinventorychange). + +The following fields are available: + +- **InventoryVersion** The version of the inventory binary generating the events. + + +### Microsoft.Windows.Inventory.General.InventoryMiscellaneousOfficeIdentifiersAdd + +Provides data on the Office identifiers. + +This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedeviceinventorychange). + +The following fields are available: + +- **InventoryVersion** The version of the inventory binary generating the events. +- **OAudienceData** Sub-identifier for Microsoft Office release management, identifying the pilot group for a device +- **OAudienceId** Microsoft Office identifier for Microsoft Office release management, identifying the pilot group for a device +- **OMID** Identifier for the Office SQM Machine +- **OPlatform** Whether the installed Microsoft Office product is 32-bit or 64-bit +- **OTenantId** Unique GUID representing the Microsoft O365 Tenant +- **OVersion** Installed version of Microsoft Office. For example, 16.0.8602.1000 +- **OWowMID** Legacy Microsoft Office telemetry identifier (SQM Machine ID) for WoW systems (32-bit Microsoft Office on 64-bit Windows) + + +### Microsoft.Windows.Inventory.General.InventoryMiscellaneousOfficeIdentifiersStartSync + +Diagnostic event to indicate a new sync is being generated for this object type. + +This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedeviceinventorychange). + +The following fields are available: + +- **InventoryVersion** The version of the inventory binary generating the events. + + +### Microsoft.Windows.Inventory.General.InventoryMiscellaneousOfficeIESettingsAdd + +Provides data on Office-related Internet Explorer features. + +This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedeviceinventorychange). + +The following fields are available: + +- **InventoryVersion** The version of the inventory binary generating the events. +- **OIeFeatureAddon** Flag indicating which Microsoft Office products have this setting enabled. The FEATURE_ADDON_MANAGEMENT feature lets applications hosting the WebBrowser Control to respect add-on management selections made using the Add-on Manager feature of Internet Explorer. Add-ons disabled by the user or by administrative group policy will also be disabled in applications that enable this feature. +- **OIeMachineLockdown** Flag indicating which Microsoft Office products have this setting enabled. When the FEATURE_LOCALMACHINE_LOCKDOWN feature is enabled, Internet Explorer applies security restrictions on content loaded from the user's local machine, which helps prevent malicious behavior involving local files. +- **OIeMimeHandling** Flag indicating which Microsoft Office products have this setting enabled. When the FEATURE_MIME_HANDLING feature control is enabled, Internet Explorer handles MIME types more securely. Only applies to Windows Internet Explorer 6 for Windows XP Service Pack 2 (SP2) +- **OIeMimeSniffing** Flag indicating which Microsoft Office products have this setting enabled. Determines a file's type by examining its bit signature. Windows Internet Explorer uses this information to determine how to render the file. The FEATURE_MIME_SNIFFING feature, when enabled, allows to be set differently for each security zone by using the URLACTION_FEATURE_MIME_SNIFFING URL action flag +- **OIeNoAxInstall** Flag indicating which Microsoft Office products have this setting enabled. When a webpage attempts to load or install an ActiveX control that isn't already installed, the FEATURE_RESTRICT_ACTIVEXINSTALL feature blocks the request. When a webpage tries to load or install an ActiveX control that isn't already installed, the FEATURE_RESTRICT_ACTIVEXINSTALL feature blocks the request +- **OIeNoDownload** Flag indicating which Microsoft Office products have this setting enabled. The FEATURE_RESTRICT_FILEDOWNLOAD feature blocks file download requests that navigate to a resource, that display a file download dialog box, or that are not initiated explicitly by a user action (for example, a mouse click or key press). Only applies to Windows Internet Explorer 6 for Windows XP Service Pack 2 (SP2) +- **OIeObjectCaching** Flag indicating which Microsoft Office products have this setting enabled. When enabled, the FEATURE_OBJECT_CACHING feature prevents webpages from accessing or instantiating ActiveX controls cached from different domains or security contexts +- **OIePasswordDisable** Flag indicating which Microsoft Office products have this setting enabled. After Windows Internet Explorer 6 for Windows XP Service Pack 2 (SP2), Internet Explorer no longer allows usernames and passwords to be specified in URLs that use the HTTP or HTTPS protocols. URLs using other protocols, such as FTP, still allow usernames and passwords +- **OIeSafeBind** Flag indicating which Microsoft Office products have this setting enabled. The FEATURE_SAFE_BINDTOOBJECT feature performs additional safety checks when calling MonikerBindToObject to create and initialize Microsoft ActiveX controls. Specifically, prevent the control from being created if COMPAT_EVIL_DONT_LOAD is in the registry for the control +- **OIeSecurityBand** Flag indicating which Microsoft Office products have this setting enabled. The FEATURE_SECURITYBAND feature controls the display of the Internet Explorer Information bar. When enabled, the Information bar appears when file download or code installation is restricted +- **OIeUncSaveCheck** Flag indicating which Microsoft Office products have this setting enabled. The FEATURE_UNC_SAVEDFILECHECK feature enables the Mark of the Web (MOTW) for local files loaded from network locations that have been shared by using the Universal Naming Convention (UNC) +- **OIeValidateUrl** Flag indicating which Microsoft Office products have this setting enabled. When enabled, the FEATURE_VALIDATE_NAVIGATE_URL feature control prevents Windows Internet Explorer from navigating to a badly formed URL +- **OIeWebOcPopup** Flag indicating which Microsoft Office products have this setting enabled. The FEATURE_WEBOC_POPUPMANAGEMENT feature allows applications hosting the WebBrowser Control to receive the default Internet Explorer pop-up window management behavior +- **OIeWinRestrict** Flag indicating which Microsoft Office products have this setting enabled. When enabled, the FEATURE_WINDOW_RESTRICTIONS feature adds several restrictions to the size and behavior of popup windows +- **OIeZoneElevate** Flag indicating which Microsoft Office products have this setting enabled. When enabled, the FEATURE_ZONE_ELEVATION feature prevents pages in one zone from navigating to pages in a higher security zone unless the navigation is generated by the user + + +### Microsoft.Windows.Inventory.General.InventoryMiscellaneousOfficeIESettingsStartSync + +Diagnostic event to indicate a new sync is being generated for this object type. + +This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedeviceinventorychange). + +The following fields are available: + +- **InventoryVersion** The version of the inventory binary generating the events. + + +### Microsoft.Windows.Inventory.General.InventoryMiscellaneousOfficeInsightsAdd + +This event provides insight data on the installed Office products + +This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedeviceinventorychange). + +The following fields are available: + +- **InventoryVersion** The version of the inventory binary generating the events. +- **OfficeApplication** The name of the Office application. +- **OfficeArchitecture** The bitness of the Office application. +- **OfficeVersion** The version of the Office application. +- **Value** The insights collected about this entity. + + +### Microsoft.Windows.Inventory.General.InventoryMiscellaneousOfficeInsightsRemove + +Indicates that this particular data object represented by the objectInstanceId is no longer present. + +This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedeviceinventorychange). + +The following fields are available: + +- **InventoryVersion** The version of the inventory binary generating the events. + + +### Microsoft.Windows.Inventory.General.InventoryMiscellaneousOfficeInsightsStartSync + +This diagnostic event indicates that a new sync is being generated for this object type. + +This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedeviceinventorychange). + +The following fields are available: + +- **InventoryVersion** The version of the inventory binary generating the events. + + +### Microsoft.Windows.Inventory.General.InventoryMiscellaneousOfficeProductsAdd + +Describes Office Products installed. + +This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedeviceinventorychange). + +The following fields are available: + +- **InventoryVersion** The version of the inventory binary generating the events. +- **OC2rApps** A GUID the describes the Office Click-To-Run apps +- **OC2rSkus** Comma-delimited list (CSV) of Office Click-To-Run products installed on the device. For example, Office 2016 ProPlus +- **OMsiApps** Comma-delimited list (CSV) of Office MSI products installed on the device. For example, Microsoft Word +- **OProductCodes** A GUID that describes the Office MSI products + + +### Microsoft.Windows.Inventory.General.InventoryMiscellaneousOfficeProductsStartSync + +Diagnostic event to indicate a new sync is being generated for this object type. + +This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedeviceinventorychange). + +The following fields are available: + +- **InventoryVersion** The version of the inventory binary generating the events. + + +### Microsoft.Windows.Inventory.General.InventoryMiscellaneousOfficeSettingsAdd + +This event describes various Office settings + +This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedeviceinventorychange). + +The following fields are available: + +- **BrowserFlags** Browser flags for Office-related products +- **ExchangeProviderFlags** Provider policies for Office Exchange +- **InventoryVersion** The version of the inventory binary generating the events. +- **SharedComputerLicensing** Office shared computer licensing policies + + +### Microsoft.Windows.Inventory.General.InventoryMiscellaneousOfficeSettingsStartSync + +Indicates a new sync is being generated for this object type. + +This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedeviceinventorychange). + +The following fields are available: + +- **InventoryVersion** The version of the inventory binary generating the events. + + +### Microsoft.Windows.Inventory.General.InventoryMiscellaneousOfficeVBAAdd + +This event provides a summary rollup count of conditions encountered while performing a local scan of Office files, analyzing for known VBA programmability compatibility issues between legacy office version and ProPlus, and between 32 and 64-bit versions + +This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedeviceinventorychange). + +The following fields are available: + +- **Design** Count of files with design issues found. +- **Design_x64** Count of files with 64 bit design issues found. +- **DuplicateVBA** Count of files with duplicate VBA code. +- **HasVBA** Count of files with VBA code. +- **Inaccessible** Count of files that were inaccessible for scanning. +- **InventoryVersion** The version of the inventory binary generating the events. +- **Issues** Count of files with issues detected. +- **Issues_x64** Count of files with 64-bit issues detected. +- **IssuesNone** Count of files with no issues detected. +- **IssuesNone_x64** Count of files with no 64-bit issues detected. +- **Locked** Count of files that were locked, preventing scanning. +- **NoVBA** Count of files with no VBA inside. +- **Protected** Count of files that were password protected, preventing scanning. +- **RemLimited** Count of files that require limited remediation changes. +- **RemLimited_x64** Count of files that require limited remediation changes for 64-bit issues. +- **RemSignificant** Count of files that require significant remediation changes. +- **RemSignificant_x64** Count of files that require significant remediation changes for 64-bit issues. +- **Score** Overall compatibility score calculated for scanned content. +- **Score_x64** Overall 64-bit compatibility score calculated for scanned content. +- **Total** Total number of files scanned. +- **Validation** Count of files that require additional manual validation. +- **Validation_x64** Count of files that require additional manual validation for 64-bit issues. + + +### Microsoft.Windows.Inventory.General.InventoryMiscellaneousOfficeVBARemove + +Indicates that this particular data object represented by the objectInstanceId is no longer present. + +This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedeviceinventorychange). + +The following fields are available: + +- **InventoryVersion** The version of the inventory binary generating the events. + + +### Microsoft.Windows.Inventory.General.InventoryMiscellaneousOfficeVBARuleViolationsAdd + +This event provides data on Microsoft Office VBA rule violations, including a rollup count per violation type, giving an indication of remediation requirements for an organization. The event identifier is a unique GUID, associated with the validation rule + +This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedeviceinventorychange). + +The following fields are available: + +- **Count** Count of total Microsoft Office VBA rule violations +- **InventoryVersion** The version of the inventory binary generating the events. + + +### Microsoft.Windows.Inventory.General.InventoryMiscellaneousOfficeVBARuleViolationsRemove + +Indicates that this particular data object represented by the objectInstanceId is no longer present. + +This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedeviceinventorychange). + +The following fields are available: + +- **InventoryVersion** The version of the inventory binary generating the events. + + +### Microsoft.Windows.Inventory.General.InventoryMiscellaneousOfficeVBARuleViolationsStartSync + +This event indicates that a new sync is being generated for this object type. + +This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedeviceinventorychange). + +The following fields are available: + +- **InventoryVersion** The version of the inventory binary generating the events. + + +### Microsoft.Windows.Inventory.General.InventoryMiscellaneousOfficeVBAStartSync + +Diagnostic event to indicate a new sync is being generated for this object type. + +This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedeviceinventorychange). + +The following fields are available: + +- **InventoryVersion** The version of the inventory binary generating the events. + + +### Microsoft.Windows.Inventory.General.InventoryMiscellaneousUUPInfoAdd + +Provides data on Unified Update Platform (UUP) products and what version they are at. + +This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedeviceinventorychange). + +The following fields are available: + +- **Identifier** UUP identifier +- **LastActivatedVersion** Last activated version +- **PreviousVersion** Previous version +- **Source** UUP source +- **Version** UUP version + + +### Microsoft.Windows.Inventory.General.InventoryMiscellaneousUUPInfoRemove + +Indicates that this particular data object represented by the objectInstanceId is no longer present. + +This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedeviceinventorychange). + + + +### Microsoft.Windows.Inventory.General.InventoryMiscellaneousUUPInfoStartSync + +Diagnostic event to indicate a new sync is being generated for this object type. + +This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedeviceinventorychange). + + + +### Microsoft.Windows.Inventory.Indicators.Checksum + +This event summarizes the counts for the InventoryMiscellaneousUexIndicatorAdd events. + +The following fields are available: + +- **CensusId** A unique hardware identifier. +- **ChecksumDictionary** A count of each operating system indicator. +- **PCFP** Equivalent to the InventoryId field that is found in other core events. + + +### Microsoft.Windows.Inventory.Indicators.InventoryMiscellaneousUexIndicatorAdd + +These events represent the basic metadata about the OS indicators installed on the system which are used for keeping the device up to date. + +This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedeviceinventorychange). + +The following fields are available: + +- **IndicatorValue** The indicator value. +- **Value** Describes an operating system indicator that may be relevant for the device upgrade. + + +### Microsoft.Windows.Inventory.Indicators.InventoryMiscellaneousUexIndicatorRemove + +This event is a counterpart to InventoryMiscellaneousUexIndicatorAdd that indicates that the item has been removed. + +This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedeviceinventorychange). + + + +### Microsoft.Windows.Inventory.Indicators.InventoryMiscellaneousUexIndicatorStartSync + +This event indicates that a new set of InventoryMiscellaneousUexIndicatorAdd events will be sent. + +This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedeviceinventorychange). + + + +## Kernel events + +### IO + +This event indicates the number of bytes read from or read by the OS and written to or written by the OS upon system startup. + +The following fields are available: + +- **BytesRead** The total number of bytes read from or read by the OS upon system startup. +- **BytesWritten** The total number of bytes written to or written by the OS upon system startup. +- **f** No content is currently available. See [f](#f). + + +### Microsoft.Windows.Kernel.BootEnvironment.OsLaunch + +OS information collected during Boot, used to evaluate the success of the upgrade process. + +The following fields are available: + +- **BootApplicationId** This field tells us what the OS Loader Application Identifier is. +- **BootAttemptCount** The number of consecutive times the boot manager has attempted to boot into this operating system. +- **BootSequence** The current Boot ID, used to correlate events related to a particular boot session. +- **BootStatusPolicy** Identifies the applicable Boot Status Policy. +- **BootType** Identifies the type of boot (e.g.: "Cold", "Hiber", "Resume"). +- **EventTimestamp** Seconds elapsed since an arbitrary time point. This can be used to identify the time difference in successive boot attempts being made. +- **FirmwareResetReasonEmbeddedController** Reason for system reset provided by firmware. +- **FirmwareResetReasonEmbeddedControllerAdditional** Additional information on system reset reason provided by firmware if needed. +- **FirmwareResetReasonEmbeddedControln09eddedBootSequence** No content is currently available. +- **FirmwareResetReasonPch** Reason for system reset provided by firmware. +- **FirmwareResetReasonPchAdditional** Additional information on system reset reason provided by firmware if needed. +- **FirmwareResetReasonSupplied** Flag indicating that a reason for system reset was provided by firmware. +- **IO** Amount of data written to and read from the disk by the OS Loader during boot. See [IO](#io). +- **LastBootSucceeded** Flag indicating whether the last boot was successful. +- **LastShutdownSucceeded** Flag indicating whether the last shutdown was successful. +- **MaxAbove4GbFr6eRange** No content is currently available. +- **MaxAbove4GbFreeRange** This field describes the largest memory range available above 4Gb. +- **MaxBelow4GbFr6eRange** No content is currently available. +- **MaxBelow4GbFreeRange** This field describes the largest memory range available below 4Gb. +- **MeasuredLaun#hPrepared** No content is currently available. +- **MeasuredLaunchPrepared** This field tells us if the OS launch was initiated using Measured/Secure Boot over DRTM (Dynamic Root of Trust for Measurement). +- **MeasuredLaunchResume** This field tells us if Dynamic Root of Trust for Measurement (DRTM) was used when resuming from hibernation. +- **MenuPolicy** Type of advanced options menu that should be shown to the user (Legacy, Standard, etc.). +- **recoveryEnabled** No content is currently available. +- **Recoveryenabled** No content is currently available. +- **RecoveryEnabled** Indicates whether recovery is enabled. +- **SecureLaunchPrepared** This field indicates if DRTM was prepared during boot. +- **TcbLaunch** Indicates whether the Trusted Computing Base was used during the boot flow. +- **UserInputTime** The amount of time the loader application spent waiting for user input. + + +## Miracast events + +### Microsoft.Windows.Cast.Miracast.MiracastSessionEnd + +This event sends data at the end of a Miracast session that helps determine RTSP related Miracast failures along with some statistics about the session + +The following fields are available: + +- **AudioChannelCount** The number of audio channels. +- **AudioSampleRate** The sample rate of audio in terms of samples per second. +- **AudioSubtype** The unique subtype identifier of the audio codec (encoding method) used for audio encoding. +- **AverageBitrate** The average video bitrate used during the Miracast session, in bits per second. +- **AverageDataRate** The average available bandwidth reported by the WiFi driver during the Miracast session, in bits per second. +- **AveragePacketSendTimeInMs** The average time required for the network to send a sample, in milliseconds. +- **ConnectorType** The type of connector used during the Miracast session. +- **EncodeAverageTimeMS** The average time to encode a frame of video, in milliseconds. +- **EncodeCount** The count of total frames encoded in the session. +- **EncodeMaxTimeMS** The maximum time to encode a frame, in milliseconds. +- **EncodeMinTimeMS** The minimum time to encode a frame, in milliseconds. +- **EncoderCreationTimeInMs** The time required to create the video encoder, in milliseconds. +- **ErrorSource** Identifies the component that encountered an error that caused a disconnect, if applicable. +- **FirstFrameTime** The time (tick count) when the first frame is sent. +- **FirstLatencyMode** The first latency mode. +- **FrameAverageTimeMS** Average time to process an entire frame, in milliseconds. +- **FrameCount** The total number of frames processed. +- **FrameMaxTimeMS** The maximum time required to process an entire frame, in milliseconds. +- **FrameMinTimeMS** The minimum time required to process an entire frame, in milliseconds. +- **Glitches** The number of frames that failed to be delivered on time. +- **HardwareCursorEnabled** Indicates if hardware cursor was enabled when the connection ended. +- **HDCPState** The state of HDCP (High-bandwidth Digital Content Protection) when the connection ended. +- **HighestBitrate** The highest video bitrate used during the Miracast session, in bits per second. +- **HighestDataRate** The highest available bandwidth reported by the WiFi driver, in bits per second. +- **LastLatencyMode** The last reported latency mode. +- **LogTimeReference** The reference time, in tick counts. +- **LowestBitrate** The lowest video bitrate used during the Miracast session, in bits per second. +- **LowestDataRate** The lowest video bitrate used during the Miracast session, in bits per second. +- **MediaErrorCode** The error code reported by the media session, if applicable. +- **MiracastEntry** The time (tick count) when the Miracast driver was first loaded. +- **MiracastM1** The time (tick count) when the M1 request was sent. +- **MiracastM2** The time (tick count) when the M2 request was sent. +- **MiracastM3** The time (tick count) when the M3 request was sent. +- **MiracastM4** The time (tick count) when the M4 request was sent. +- **MiracastM5** The time (tick count) when the M5 request was sent. +- **MiracastM6** The time (tick count) when the M6 request was sent. +- **MiracastM7** The time (tick count) when the M7 request was sent. +- **MiracastSessionState** The state of the Miracast session when the connection ended. +- **MiracastStreaming** The time (tick count) when the Miracast session first started processing frames. +- **ProfileCount** The count of profiles generated from the receiver M4 response. +- **ProfileCountAfterFiltering** The count of profiles after filtering based on available bandwidth and encoder capabilities. +- **RefreshRate** The refresh rate set on the remote display. +- **RotationSupported** Indicates if the Miracast receiver supports display rotation. +- **RTSPSessionId** The unique identifier of the RTSP session. This matches the RTSP session ID for the receiver for the same session. +- **SessionGuid** The unique identifier of to correlate various Miracast events from a session. +- **SinkHadEdid** Indicates if the Miracast receiver reported an EDID. +- **SupportMicrosoftColorSpaceConversion** Indicates whether the Microsoft color space conversion for extra color fidelity is supported by the receiver. +- **SupportsMicrosoftDiagnostics** Indicates whether the Miracast receiver supports the Microsoft Diagnostics Miracast extension. +- **SupportsMicrosoftFormatChange** Indicates whether the Miracast receiver supports the Microsoft Format Change Miracast extension. +- **SupportsMicrosoftLatencyManagement** Indicates whether the Miracast receiver supports the Microsoft Latency Management Miracast extension. +- **SupportsMicrosoftRTCP** Indicates whether the Miracast receiver supports the Microsoft RTCP Miracast extension. +- **SupportsMicrosoftVideoFormats** Indicates whether the Miracast receiver supports Microsoft video format for 3:2 resolution. +- **SupportsWiDi** Indicates whether Miracast receiver supports Intel WiDi extensions. +- **TeardownErrorCode** The error code reason for teardown provided by the receiver, if applicable. +- **TeardownErrorReason** The text string reason for teardown provided by the receiver, if applicable. +- **UIBCEndState** Indicates whether UIBC was enabled when the connection ended. +- **UIBCEverEnabled** Indicates whether UIBC was ever enabled. +- **UIBCStatus** The result code reported by the UIBC setup process. +- **VideoBitrate** The starting bitrate for the video encoder. +- **VideoCodecLevel** The encoding level used for encoding, specific to the video subtype. +- **VideoHeight** The height of encoded video frames. +- **VideoSubtype** The unique subtype identifier of the video codec (encoding method) used for video encoding. +- **VideoWidth** The width of encoded video frames. +- **WFD2Supported** Indicates if the Miracast receiver supports WFD2 protocol. + + +## OneDrive events + +### Microsoft.OneDrive.Sync.Setup.APIOperation + +This event includes basic data about install and uninstall OneDrive API operations. + +The following fields are available: + +- **APIName** The name of the API. +- **Duration** How long the operation took. +- **IsSuccess** Was the operation successful? +- **Res}ltCode** No content is currently available. +- **ResultCode** The result code. +- **ScenarioName** The name of the scenario. + + +### Microsoft.OneDrive.Sync.Setup.EndExperience + +This event includes a success or failure summary of the installation. + +The following fields are available: + +- **APIName** The name of the API. +- **HResult** HResult of the operation +- **IsSuccess** Whether the operation is successful or not +- **ScenarioName** The name of the scenario. + + +### Microsoft.OneDrive.Sync.Setup.OSUpgradeInstallationOperation + +This event is related to the OS version when the OS is upgraded with OneDrive installed. + +The following fields are available: + +- **CurrentOneDriveVersion** The current version of OneDrive. +- **CurrentOSBuildBranch** The current branch of the operating system. +- **CurrentOSBuildNumber** The current build number of the operating system. +- **CurrentOSVersion** The current version of the operating system. +- **HResult** The HResult of the operation. +- **SourceOSBuildBranch** The source branch of the operating system. +- **SourceOSBuildNumber** The source build number of the operating system. +- **SourceOSVersion** The source version of the operating system. + + +### Microsoft.OneDrive.Sync.Setup.RegisterStandaloneUpdaterAPIOperation + +This event is related to registering or unregistering the OneDrive update task. + +The following fields are available: + +- **APIName** The name of the API. +- **IsSuccess** Was the operation successful? +- **RegisterNewTaskResult** The HResult of the RegisterNewTask operation. +- **ScenarioName** The name of the scenario. +- **UnregisterOldTaskResult** The HResult of the UnregisterOldTask operation. + + +### Microsoft.OneDrive.Sync.Updater.ComponentInstallState + +This event includes basic data about the installation state of dependent OneDrive components. + +The following fields are available: + +- **ComponentName** The name of the dependent component. +- **isInstalled** Is the dependent component installed? + + +### Microsoft.OneDrive.Sync.Updater.OverlayIconStatus + +This event indicates if the OneDrive overlay icon is working correctly. 0 = healthy; 1 = can be fixed; 2 = broken + +The following fields are available: + +- **32bit** The status of the OneDrive overlay icon on a 32-bit operating system. +- **64bit** The status of the OneDrive overlay icon on a 64-bit operating system. + + +### Microsoft.OneDrive.Sync.Updater.UpdateOverallResult + +This event sends information describing the result of the update. + +The following fields are available: + +- **hr** The HResult of the operation. +- **IsLoggingEnabled** Indicates whether logging is enabled for the updater. +- **UpdaterVersion** The version of the updater. + + +### Microsoft.OneDrive.Sync.Updater.UpdateXmlDownloadHResult + +This event determines the status when downloading the OneDrive update configuration file. + +The following fields are available: + +- **hr** The HResult of the operation. + + +### Microsoft.OneDrive.Sync.Updater.WebConnectionStatus + +This event determines the error code that was returned when verifying Internet connectivity. + +The following fields are available: + +- **winInetError** The HResult of the operation. + + +## Privacy consent logging events + +### Microsoft.Windows.Shell.PrivacyConsentLogging.PrivacyConsentCompleted + +This event is used to determine whether the user successfully completed the privacy consent experience. + +The following fields are available: + +- **presentationVersion** Which display version of the privacy consent experience the user completed +- **privacyConsentState** The current state of the privacy consent experience +- **settingsVersion** Which setting version of the privacy consent experience the user completed +- **userOobeExitReason** The exit reason of the privacy consent experience + + +### Microsoft.Windows.Shell.PrivacyConsentLogging.PrivacyConsentStatus + +Event tells us effectiveness of new privacy experience. + +The following fields are available: + +- **isAdmin** whether the person who is logging in is an admin +- **isExistingUser** whether the account existed in a downlevel OS +- **isLaunching** Whether or not the privacy consent experience will be launched +- **isSilentElevation** whether the user has most restrictive UAC controls +- **privacyConsentState** whether the user has completed privacy experience +- **userRegionCode** The current user's region setting + + +### wilActivity + +This event provides a Windows Internal Library context used for Product and Service diagnostics. + +The following fields are available: + +- **callContext** The function where the failure occurred. +- **currentContextId** The ID of the current call context where the failure occurred. +- **currentContextMessage** The message of the current call context where the failure occurred. +- **currentContextName** The name of the current call context where the failure occurred. +- **failureCount** The number of failures for this failure ID. +- **failureId** The ID of the failure that occurred. +- **failureType** The type of the failure that occurred. +- **fileName** The file name where the failure occurred. +- **function** The function where the failure occurred. +- **hresult** The HResult of the overall activity. +- **lineNumber** The line number where the failure occurred. +- **message** The message of the failure that occurred. +- **module** The module where the failure occurred. +- **originatingContextId** The ID of the originating call context that resulted in the failure. +- **originatingContextMessage** The message of the originating call context that resulted in the failure. +- **originatingContextName** The name of the originating call context that resulted in the failure. +- **threadId** The ID of the thread on which the activity is executing. + + +## Sediment events + +### Microsoft.Windows.Sediment.Info.DetailedState + +This event is sent when detailed state information is needed from an update trial run. + +The following fields are available: + +- **Data** Data relevant to the state, such as what percent of disk space the directory takes up. +- **Id** Identifies the trial being run, such as a disk related trial. +- **ReleaseVer** The version of the component. +- **State** The state of the reporting data from the trial, such as the top-level directory analysis. +- **Time** The time the event was fired. + + +### Microsoft.Windows.Sediment.Info.Error + +This event indicates an error in the updater payload. This information assists in keeping Windows up to date. + +The following fields are available: + +- **FailureType** The type of error encountered. +- **FileName** The code file in which the error occurred. +- **HResult** The failure error code. +- **LineNumber** The line number in the code file at which the error occurred. +- **ReleaseVer** The version information for the component in which the error occurred. +- **Time** The system time at which the error occurred. + + +### Microsoft.Windows.Sediment.Info.PhaseChange + +The event indicates progress made by the updater. This information assists in keeping Windows up to date. + +The following fields are available: + +- **NewPhase** The phase of progress made. +- **ReleaseVer** The version information for the component in which the change occurred. +- **Time** The system time at which the phase chance occurred. + + +## Setup events + +### SetupPlatformTel.SetupPlatformTelActivityEvent + +This event sends basic metadata about the SetupPlatform update installation process, to help keep Windows up to date. + +The following fields are available: + +- **FieldName** Retrieves the event name/data point. Examples: InstallStartTime, InstallEndtime, OverallResult etc. +- **GroupName** Retrieves the groupname the event belongs to. Example: Install Information, DU Information, Disk Space Information etc. +- **Value** Value associated with the corresponding event name. For example, time-related events will include the system time + + +### SetupPlatformTel.SetupPlatformTelActivityStarted + +This event sends basic metadata about the update installation process generated by SetupPlatform to help keep Windows up to date. + +The following fields are available: + +- **Name** The name of the dynamic update type. Example: GDR driver + + +### SetupPlatformTel.SetupPlatformTelActivityStopped + +This event sends basic metadata about the update installation process generated by SetupPlatform to help keep Windows up to date. + + + +### SetupPlatformTel.SetupPlatformTelEvent + +This service retrieves events generated by SetupPlatform, the engine that drives the various deployment scenarios. + +The following fields are available: + +- **FieldName** Retrieves the event name/data point. Examples: InstallStartTime, InstallEndtime, OverallResult etc. +- **GroupName** Retrieves the groupname the event belongs to. Example: Install Information, DU Information, Disk Space Information etc. +- **Value** Retrieves the value associated with the corresponding event name (Field Name). For example: For time related events this will include the system time. + + +## Software update events + +### SoftwareUpdateClientTelemetry.CheckForUpdates + +Scan process event on Windows Update client. See the EventScenario field for specifics (started/failed/succeeded). + +The following fields are available: + +- **[yncType** No content is currently available. +- **ActivityMatchingId** Contains a unique ID identifying a single CheckForUpdates session from initialization to completion. +- **ActivityMatghingId** No content is currently available. +- **AllowCachedResu~ts** No content is currently available. +- **AllowCachedResults** Indicates if the scan allowed using cached results. +- **ApplicableUpdateinfo** No content is currently available. +- **ApplicableUpdateInfo** Metadata for the updates which were detected as applicable +- **BiosFamily** The family of the BIOS (Basic Input Output System). +- **BiosName** The name of the device BIOS. +- **BiosReleaseDate** The release date of the device BIOS. +- **BiosSKUNumber** The sku number of the device BIOS. +- **BIOSVendor** The vendor of the BIOS. +- **BiosVersion** The version of the BIOS. +- **BranchReadinessLevel** The servicing branch configured on the device. +- **BranchRQadinessLevel** No content is currently available. +- **CachedEngineVersion** For self-initiated healing, the version of the SIH engine that is cached on the device. If the SIH engine does not exist, the value is null. +- **CadlerApplicationName** No content is currently available. +- **CallerApplicafionName** No content is currently available. +- **CallerApplicationName** The name provided by the caller who initiated API calls into the software distribution client. +- **CallerApplicationRame** No content is currently available. +- **canDurapionInSeconds** No content is currently available. +- **CapabilityDetectoidGuid** The GUID for a hardware applicability detectoid that could not be evaluated. +- **CcanDurationInSeconds** No content is currently available. +- **CcanEnqueueTime** No content is currently available. +- **CcanProps** No content is currently available. +- **CClienVersion** No content is currently available. +- **CDNCountryCode** Two letter country abbreviation for the Content Distribution Network (CDN) location. +- **CDNId** The unique identifier of a specific device, used to identify how many devices are encountering success or a particular issue. +- **ClientVer�ion** No content is currently available. +- **Clientversion** No content is currently available. +- **ClientVersion** The version number of the software distribution client. +- **ClientVersiOn** No content is currently available. +- **CommonProps** A bitmask for future flags associated with the Windows Update client behavior. No data is currently reported in this field. Expected value for this field is 0. +- **Context** Gives context on where the error has occurred. Example: AutoEnable, GetSLSData, AddService, Misc, or Unknown +- **ContusCode** No content is currently available. +- **CurrentMobileOperator** The mobile operator the device is currently connected to. +- **DeferralPolicySources** Sources for any update deferral policies defined (GPO = 0x10, MDM = 0x100, Flight = 0x1000, UX = 0x10000). +- **DeferredUpdates** Update IDs which are currently being deferred until a later time +- **DeviceModel** What is the device model. +- **DrivarExclusionPolicy** No content is currently available. +- **DriverError** The error code hit during a driver scan. This is 0 if no error was encountered. +- **DriverExclusionPolicy** Indicates if the policy for not including drivers with Windows Update is enabled. +- **DriverSyncPassPerformed** Were drivers scanned this time? +- **DriverSyncPassPerformud** No content is currently available. +- **e:4|SInstanceID** No content is currently available. +- **e:4|SScenario** No content is currently available. +- **E~entScenario** No content is currently available. +- **eallerApplicationName** No content is currently available. +- **eClienVersion** No content is currently available. +- **Even5InstanceID** No content is currently available. +- **EventInstanceID** A globally unique identifier for event instance. +- **EventScenari0** No content is currently available. +- **Eventscenario** No content is currently available. +- **EventScenario** Indicates the purpose of sending this event - whether because the software distribution just started checking for content, or whether it was cancelled, succeeded, or failed. +- **EventScenário** No content is currently available. +- **EventScenavio** No content is currently available. +- **ExtendedContusCode** No content is currently available. +- **ExtendedMetadataCabUrl** Hostname that is used to download an update. +- **ExtendedSsatusCode** No content is currently available. +- **ExtendedStatusCode** Secondary error code for certain scenarios where StatusCode wasn't specific enough. +- **FailedUpdateGuids** The GUIDs for the updates that failed to be evaluated during the scan. +- **FailedUpdatesCount** The number of updates that failed to be evaluated during the scan. +- **FeapureUpdatePause** No content is currently available. +- **FeatureUpdateDeferral** The deferral period configured for feature OS updates on the device (in days). +- **FeatureUpdatePause** Indicates whether feature OS updates are paused on the device. +- **FeatureUpdatePausePeriod** The pause duration configured for feature OS updates on the device (in days). +- **FeatureUpdatePawse** No content is currently available. +- **FlightBranch** The branch that a device is on if participating in flighting (pre-release builds). +- **FlightRing** The ring (speed of getting builds) that a device is on if participating in flighting (pre-release builds). +- **HomeMobileOperator** The mobile operator that the device was originally intended to work with. +- **I{WUfBDualScanEnabled** No content is currently available. +- **IntentPFNs** Intended application-set metadata for atomic update scenarios. +- **IPVersion** Indicates whether the download took place over IPv4 or IPv6 +- **IsWUfBDtyUScanEnabled** No content is currently available. +- **IsWUfBDualCcanEnabled** No content is currently available. +- **IsWUfbDualScanEnabled** No content is currently available. +- **IsWUfBDualscanEnabled** No content is currently available. +- **IsWUfBDualScanEnabled** Indicates if Windows Update for Business dual scan is enabled on the device. +- **IsWUfBEnabled** Indicates if Windows Update for Business is enabled on the device. +- **IsWUfBFederatedScanDisabled** Indicates if Windows Update for Business federated scan is disabled on the device. +- **IsWUMcBederatedScanDisabled** No content is currently available. +- **IsWUMcDualScanEnabled** No content is currently available. +- **IsWUMcEnabled** No content is currently available. +- **ITVersion** No content is currently available. +- **ityUpdatePausDeferral** No content is currently available. +- **IwWUfBDualScanEnabled** No content is currently available. +- **MetadataIntegrityMode** The mode of the update transport metadata integrity check. 0-Unknown, 1-Ignoe, 2-Audit, 3-Enforce +- **MSIError** The last error that was encountered during a scan for updates. +- **NetworkConnectivityDetected** Indicates the type of network connectivity that was detected. 0 - IPv4, 1 - IPv6 +- **NueFailedMetadataSignatures** No content is currently available. +- **NumberOfApplicableUpdates** The number of updates which were ultimately deemed applicable to the system after the detection process is complete +- **NumberOfApplicationsCategoryScanEvaluated** The number of categories (apps) for which an app update scan checked +- **NumberOfApplicationsCategoryScanEvalunted** No content is currently available. +- **NumberOfLo-l** No content is currently available. +- **NumberOfLoop** The number of round trips the scan required +- **NumberOfNewUpdadesFromServiceSync** No content is currently available. +- **NumberOfNewupdatesFromServiceSync** No content is currently available. +- **NumberOfNewUpdatesFromServiceSync** The number of updates which were seen for the first time in this scan +- **NumberOfUpdatesEvaluated** The total number of updates which were evaluated as a part of the scan +- **NumberOfUpdatesEvalunted** No content is currently available. +- **NumFailedMetadataSignatures** The number of metadata signatures checks which failed for new metadata synced down. +- **Online** Indicates if this was an online scan. +- **PaeseFeatureUpdatesEndTime** No content is currently available. +- **Pau³eQualityUpdatesStartTime** No content is currently available. +- **PausedUpdates** A list of UpdateIds which that currently being paused. +- **PauseFeatureUpdatesEndTime** If feature OS updates are paused on the device, this is the date and time for the end of the pause time window. +- **PauseFeatureUpdatesSsartTime** No content is currently available. +- **PauseFeatureUpdatesSta2tTime** No content is currently available. +- **PauseFeatureUpdatesStartTime** If feature OS updates are paused on the device, this is the date and time for the beginning of the pause time window. +- **PauseFeatureUpdatesStartTiMe** No content is currently available. +- **PauseityUpdatePaussEndTime** No content is currently available. +- **PauseityUpdatePaussStartTime** No content is currently available. +- **PauseQualityUpdatesDndTime** No content is currently available. +- **PauseQualityUpdatesEndTime** If quality OS updates are paused on the device, this is the date and time for the end of the pause time window. +- **PauseQualityUpdatesSsartTime** No content is currently available. +- **PauseQualityUpdatesStartTime** If quality OS updates are paused on the device, this is the date and time for the beginning of the pause time window. +- **PauseQualityUpdatEsStartTime** No content is currently available. +- **PhonePreviewEnabled** Indicates whether a phone was getting preview build, prior to flighting (pre-release builds) being introduced. +- **ProceosName** No content is currently available. +- **ProcessName** The process name of the caller who initiated API calls, in the event where CallerApplicationName was not provided. +- **ProcessNcme** No content is currently available. +- **ProcessRame** No content is currently available. +- **QualityUpdateDeferral** The deferral period configured for quality OS updates on the device (in days). +- **QualityUpdatePause** Indicates whether quality OS updates are paused on the device. +- **QualityUpdatePausePeriod** The pause duration configured for quality OS updates on the device (in days). +- **QualityUplatePausmPeriod** No content is currently available. +- **RelatedCV** The previous Correlation Vector that was used before swapping with a new one +- **RelntedCV** No content is currently available. +- **ScanDSrationInSeconds** No content is currently available. +- **ScanDurationInSeconds** The number of seconds a scan took +- **ScanEnqueueTime** The number of seconds it took to initialize a scan +- **ScanProps** This is a 32-bit integer containing Boolean properties for a given Windows Update scan. The following bits are used; all remaining bits are reserved and set to zero. Bit 0 (0x1): IsInteractive - is set to 1 if the scan is requested by a user, or 0 if the scan is requested by Automatic Updates. Bit 1 (0x2): IsSeeker - is set to 1 if the Windows Update client's Seeker functionality is enabled. Seeker functionality is enabled on certain interactive scans, and results in the scans returning certain updates that are in the initial stages of release (not yet released for full adoption via Automatic Updates). +- **ServiceGuid** An ID which represents which service the software distribution client is checking for content (Windows Update, Microsoft Store, etc.). +- **ServiceUrl** The environment URL a device is configured to scan with +- **ShippingMobileOperator** The mobile operator that a device shipped on. +- **SsatusCode** No content is currently available. +- **StatusCodd** No content is currently available. +- **statusCode** No content is currently available. +- **StatusCode** Indicates the result of a CheckForUpdates event (success, cancellation, failure code HResult). +- **Synctate** No content is currently available. +- **SyncType** Describes the type of scan the event was +- **SystemBIOSMajorRelease** Major version of the BIOS. +- **SystemBIOSMinorRelease** Minor version of the BIOS. +- **TargetMetadataVersion** For self-initiated healing, this is the target version of the SIH engine to download (if needed). If not, the value is null. +- **TotalNumMetadataSignatures** The total number of metadata signatures checks done for new metadata that was synced down. +- **TotalNumMetadaTaSignatures** No content is currently available. +- **WebServiceRetryMethods** Web service method requests that needed to be retried to complete operation. +- **WUDericeID** No content is currently available. +- **WUDeviceID** The unique identifier of a specific device, used to identify how many devices are encountering success or a particular issue. +- **WUDewiceID** No content is currently available. + + +### SoftwareUpdateClientTelemetry.Commit + +This event tracks the commit process post the update installation when software update client is trying to update the device. + +The following fields are available: + +- **BiosFamily** Device family as defined in the system BIOS +- **BiosName** Name of the system BIOS +- **BiosReleaseDate** Release date of the system BIOS +- **BiosSKUNumber** Device SKU as defined in the system BIOS +- **BIOSVendor** Vendor of the system BIOS +- **BiosVersion** Version of the system BIOS +- **BundleId** Identifier associated with the specific content bundle; should not be all zeros if the bundleID was found. +- **BundleRevisionNumbe2** No content is currently available. +- **BundleRevisionNumber** Identifies the revision number of the content bundle +- **CallerApplicationName** Name provided by the caller who initiated API calls into the software distribution client +- **ClientVersion** Version number of the software distribution client +- **DeploymentProviderMode** The mode of operation of the update deployment provider. +- **DeviceModel** Device model as defined in the system bios +- **EventInstanceID** A globally unique identifier for event instance +- **EventScenario** Indicates the purpose of the event - whether because scan started, succeded, failed, etc. +- **EventType** Possible values are "Child", "Bundle", "Relase" or "Driver". +- **FlightId** The specific id of the flight the device is getting +- **HandlerType** Indicates the kind of content (app, driver, windows patch, etc.) +- **RevisionNumber** Identifies the revision number of this specific piece of content +- **ServiceGuid** Identifier for the service to which the software distribution client is connecting (Windows Update, Windows Store, etc) +- **SystemBIOSMajorRelease** Major release version of the system bios +- **SystemBIOSMinorRelease** Minor release version of the system bios +- **UpdateId** Identifier associated with the specific piece of content +- **WUDeviceID** Unique device id controlled by the software distribution client + + +### SoftwareUpdateClientTelemetry.Download + +Download process event for target update on Windows Update client. See the EventScenario field for specifics (started/failed/succeeded). + +The following fields are available: + +- **ActiveDownloadTime** How long the download took, in seconds, excluding time where the update wasn't actively being downloaded. +- **AppXBlockHalhFailures** No content is currently available. +- **AppXBlockHashFailures** Indicates the number of blocks that failed hash validation during download of the app payload. +- **AppXBlockHashValidationFailureCount** A count of the number of blocks that have failed validation after being downloaded. +- **AppXBoockHashFailures** No content is currently available. +- **AppXDownloadScope** Indicates the scope of the download for application content. +- **AppXScope** Indicates the scope of the app download. +- **AppXScopr** No content is currently available. +- **BiosFamily** The family of the BIOS (Basic Input Output System). +- **BiosName** The name of the device BIOS. +- **BiosReleaseDate** The release date of the device BIOS. +- **BiosSKUNumber** The sku number of the device BIOS. +- **BIOSVendor** The vendor of the BIOS. +- **BiosVersion** The version of the BIOS. +- **BundleBytesDownloaded** Number of bytes downloaded for the specific content bundle. +- **BundleId** Identifier associated with the specific content bundle. +- **BundleRepeatFailCoqnt** No content is currently available. +- **BundleRepeatFailCoun.** No content is currently available. +- **BundleRepeatFailCount** Indicates whether this particular update bundle has previously failed. +- **BundleRepeatFailFlag** Indicates whether this particular update bundle previously failed to download. +- **BundleRevisionNumber** Identifies the revision number of the content bundle. +- **BytesDownloaded** Number of bytes that were downloaded for an individual piece of content (not the entire bundle). +- **BytesDownnoaded** No content is currently available. +- **CachedEngineVersion** The version of the “Self-Initiated Healing” (SIH) engine that is cached on the device, if applicable. +- **CallerApplicationname** No content is currently available. +- **CallerApplicationName** The name provided by the application that initiated API calls into the software distribution client. +- **CallerApplictionaName** No content is currently available. +- **CbsDownloadMethod** Indicates whether the download was a full- or a partial-file download. +- **CbsMethod** The method used for downloading the update content related to the Component Based Servicing (CBS) technology. +- **CDNCoun.ryCdel** No content is currently available. +- **CDNCoundryCode** No content is currently available. +- **CDNCountryCode** Two letter country abbreviation for the Content Distribution Network (CDN) location. +- **CDNd** No content is currently available. +- **CDNId** ID which defines which CDN the software distribution client downloaded the content from. +- **ClientVersion** The version number of the software distribution client. +- **CommonProps** A bitmask for future flags associated with the Windows Update client behavior. +- **ConnectTime** Indicates the cumulative amount of time (in seconds) it took to establish the connection for all updates in an update bundle. +- **CtatusCode** No content is currently available. +- **CurrentMobileOperator** The mobile operator the device is currently connected to. +- **DeviceModel** The model of the device. +- **DownhoadProps** No content is currently available. +- **DownloadPriority** Indicates whether a download happened at background, normal, or foreground priority. +- **DownloadProps** Information about the download operation properties in the form of a bitmask. +- **DownloadType** Differentiates the download type of “Self-Initiated Healing” (SIH) downloads between Metadata and Payload downloads. +- **DownloedPriority** No content is currently available. +- **DventInstanceID** No content is currently available. +- **e:4|SInstanceID** No content is currently available. +- **e:4|SScenario** No content is currently available. +- **E:4|State** No content is currently available. +- **EöentInstanceID** No content is currently available. +- **Eve.tScenario** No content is currently available. +- **EventInst.9ceID** No content is currently available. +- **EventInstanceID** A globally unique identifier for event instance. +- **EventPype** No content is currently available. +- **EventScanario** No content is currently available. +- **eventScenario** No content is currently available. +- **EventScenario** Indicates the purpose for sending this event: whether because the software distribution just started downloading content; or whether it was cancelled, succeeded, or failed. +- **EventType** Identifies the type of the event (Child, Bundle, or Driver). +- **EventTypr** No content is currently available. +- **ExtendedStatusCode** Secondary error code for certain scenarios where StatusCode wasn't specific enough. +- **ExtendedtartusCdel** No content is currently available. +- **FeatureUpdatePaser** No content is currently available. +- **FeatureUpdatePause** Indicates whether feature OS updates are paused on the device. +- **Fli.c9BuildNumber** No content is currently available. +- **Fli.c9Id** No content is currently available. +- **FlightBranch** The branch that a device is on if participating in flighting (pre-release builds). +- **FlightBuildNumber** If this download was for a flight (pre-release build), this indicates the build number of that flight. +- **FlightId** The specific ID of the flight (pre-release build) the device is getting. +- **FlightRing** The ring (speed of getting builds) that a device is on if participating in flighting (pre-release builds). +- **HandlerType** Indicates what kind of content is being downloaded (app, driver, windows patch, etc.). +- **HardwareId** If this download was for a driver targeted to a particular device model, this ID indicates the model of the device. +- **HomeMobileOperator** The mobile operator that the device was originally intended to work with. +- **HospName** No content is currently available. +- **HostName** The hostname URL the content is downloading from. +- **Hst.Name** No content is currently available. +- **IPVersion** Indicates whether the download took place over IPv4 or IPv6. +- **IsDependentSet** Indicates whether a driver is a part of a larger System Hardware/Firmware Update +- **IsWQfBEnabled** No content is currently available. +- **IsWUfBDualCcanEnabled** No content is currently available. +- **IsWUfBDualScanEnabled** Indicates if Windows Update for Business dual scan is enabled on the device. +- **IsWUfBEnablad** No content is currently available. +- **IsWUfBEnabled** Indicates if Windows Update for Business is enabled on the device. +- **NetworkCost** A flag indicating the cost of the network (congested, fixed, variable, over data limit, roaming, etc.) used for downloading the update content. +- **NetworkCostBitMask** Indicates what kind of network the device is connected to (roaming, metered, over data cap, etc.) +- **NetworkCst.** No content is currently available. +- **NetworkRestrictionStatus** More general version of NetworkCostBitMask, specifying whether Windows considered the current network to be "metered." +- **NetworkRestrictiontartus** No content is currently available. +- **oadPriority** No content is currently available. +- **PackageFullName** The package name of the content. +- **PegulationResult** No content is currently available. +- **PhonePreviewEnabled** Indicates whether a phone was opted-in to getting preview builds, prior to flighting (pre-release builds) being introduced. +- **PostDnldDime** No content is currently available. +- **PostDnldTime** Time (in seconds) taken to signal download completion after the last job completed downloading the payload. +- **ProcessName** The process name of the application that initiated API calls, in the event where CallerApplicationName was not provided. +- **Pst.DnldTime** No content is currently available. +- **PvocessName** No content is currently available. +- **QpdateId** No content is currently available. +- **QualityreUpdaPause** No content is currently available. +- **QualityUpdatePaser** No content is currently available. +- **QualityUpdatePatse** No content is currently available. +- **QualityUpdatePausa** No content is currently available. +- **QualityUpdatePause** Indicates whether quality OS updates are paused on the device. +- **RdvisionNumber** No content is currently available. +- **Reason** A 32-bit integer representing the reason the update is blocked from being downloaded in the background. +- **RegulationReason** The reason that the update is regulated +- **regulationResult** No content is currently available. +- **RegulationResult** The result code (HResult) of the last attempt to contact the regulation web service for download regulation of update content. +- **RegulatIonResult** No content is currently available. +- **RelatedCS** No content is currently available. +- **RelatedCV** The Correlation Vector that was used before the most recent change to a new Correlation Vector. +- **RelntedCV** No content is currently available. +- **RepeatFailCoun.** No content is currently available. +- **RepeatFailCount** Indicates whether this specific content has previously failed. +- **RepeatFailFlag** Indicates whether this specific content previously failed to download. +- **RevisionNumber** The revision number of the specified piece of content. +- **SericeCGuid** No content is currently available. +- **ServiceGuid** A unique identifier for the service that the software distribution client is installing content for (Windows Update, Windows Store, etc.). +- **Setup360Phase** Identifies the active phase of the upgrade download if the current download is for an Operating System upgrade. +- **ShippingMobileOperator** The mobile operator linked to the device when the device shipped. +- **SizeCalcTime** Time (in seconds) taken to calculate the total download size of the payload. +- **StatusCode** Indicates the result of a Download event (success, cancellation, failure code HResult). +- **SystemBIOSMajorRelease** Major version of the BIOS. +- **SystemBIOSMinorRelease** Minor version of the BIOS. +- **TargetGroupId** For drivers targeted to a specific device model, this ID indicates the distribution group of devices receiving that driver. +- **TargetingVersion** For drivers targeted to a specific device model, this is the version number of the drivers being distributed to the device. +- **TargetMetadataVersion** The version of the currently downloading (or most recently downloaded) package. +- **tartusCdel** No content is currently available. +- **ThrottlingServiceHResult** Result code (success/failure) while contacting a web service to determine whether this device should download content yet. +- **TimeToEstablishConnection** Time (in milliseconds) it took to establish the connection prior to beginning downloaded. +- **tizeCalcTime** No content is currently available. +- **TotalExpectedBytes** The total size (in Bytes) expected to be downloaded. +- **UpdateId** An identifier associated with the specific piece of content. +- **UpdateID** An identifier associated with the specific piece of content. +- **UpdateImporEvent** No content is currently available. +- **UpdateImpornstan** No content is currently available. +- **UpdateImport.9ce** No content is currently available. +- **UpdateImportance** Indicates whether the content was marked as Important, Recommended, or Optional. +- **UsedDO** Indicates whether the download used the Delivery Optimization (DO) service. +- **UsedSystemVolume** Indicates whether the content was downloaded to the device's main system storage drive, or an alternate storage drive. +- **WUDericeID** No content is currently available. +- **WUDeviceId** No content is currently available. +- **WUDeviceID** The unique identifier of a specific device, used to identify how many devices are encountering success or a particular issue. +- **WUDviceCID** No content is currently available. + + +### SoftwareUpdateClientTelemetry.DownloadCheckpoint + +This event provides a checkpoint between each of the Windows Update download phases for UUP content + +The following fields are available: + +- **CallerApplicationName** The name provided by the caller who initiated API calls into the software distribution client +- **ClientVersion** The version number of the software distribution client +- **EventScenario** Indicates the purpose of sending this event - whether because the software distribution just started checking for content, or whether it was cancelled, succeeded, or failed +- **EventType** Possible values are "Child", "Bundle", "Relase" or "Driver" +- **ExtendedStatusCode** Secondary error code for certain scenarios where StatusCode wasn't specific enough +- **FileId** A hash that uniquely identifies a file +- **FileName** Name of the downloaded file +- **FlightId** The unique identifier for each flight +- **RelatedCV** The previous Correlation Vector that was used before swapping with a new one +- **RevisionNumber** Unique revision number of Update +- **ServiceGuid** An ID which represents which service the software distribution client is checking for content (Windows Update, Microsoft Store, etc.) +- **StatusCode** Indicates the result of a CheckForUpdates event (success, cancellation, failure code HResult) +- **UpdateId** Unique Update ID +- **WUDeviceID** The unique identifier of a specific device, used to identify how many devices are encountering success or a particular issue + + +### SoftwareUpdateClientTelemetry.DownloadHeartbeat + +This event allows tracking of ongoing downloads and contains data to explain the current state of the download + +The following fields are available: + +- **BytesTotal** Total bytes to transfer for this content +- **BytesTransferred** Total bytes transferred for this content at the time of heartbeat +- **CallerApplicationName** Name provided by the caller who initiated API calls into the software distribution client +- **ClientVersion** The version number of the software distribution client +- **ConnectionStatus** Indicates the connectivity state of the device at the time of heartbeat +- **CurrentError** Last (transient) error encountered by the active download +- **DownloadFlags** Flags indicating if power state is ignored +- **DownloadState** Current state of the active download for this content (queued, suspended, or progressing) +- **EventType** Possible values are "Child", "Bundle", or "Driver" +- **FlightId** The unique identifier for each flight +- **IsNetworkMetered** Indicates whether Windows considered the current network to be ?metered" +- **MOAppDownloadLimit** Mobile operator cap on size of application downloads, if any +- **MOUpdateDownloadLimit** Mobile operator cap on size of operating system update downloads, if any +- **PowerState** Indicates the power state of the device at the time of heartbeart (DC, AC, Battery Saver, or Connected Standby) +- **RelatedCV** The previous correlation vector that was used by the client, before swapping with a new one +- **ResumeCount** Number of times this active download has resumed from a suspended state +- **RevisionNumber** Identifies the revision number of this specific piece of content +- **ServiceGuid** Identifier for the service to which the software distribution client is connecting (Windows Update, Microsoft Store, etc) +- **SuspendCount** Number of times this active download has entered a suspended state +- **SuspendReason** Last reason for why this active download entered a suspended state +- **UpdateId** Identifier associated with the specific piece of content +- **WUDeviceID** Unique device id controlled by the software distribution client + + +### SoftwareUpdateClientTelemetry.Install + +This event sends tracking data about the software distribution client installation of the content for that update, to help keep Windows up to date. + +The following fields are available: + +- **BiosFamily** The family of the BIOS (Basic Input Output System). +- **BiosName** The name of the device BIOS. +- **BiosReleaseDate** The release date of the device BIOS. +- **BiosSKUNumber** The sku number of the device BIOS. +- **BIOSVendor** The vendor of the BIOS. +- **BiosVersion** The version of the BIOS. +- **BundleId** Identifier associated with the specific content bundle; should not be all zeros if the bundleID was found. +- **BundleRepeatFailCoun.** No content is currently available. +- **BundleRepeatFailCount** Indicates whether this particular update bundle has previously failed. +- **BundleRepeatFailFlag** Indicates whether this particular update bundle previously failed to install. +- **BundleRevisionNumber** Identifies the revision number of the content bundle. +- **CachedEngineVersion** For self-initiated healing, the version of the SIH engine that is cached on the device. If the SIH engine does not exist, the value is null. +- **CallerApplicationName** The name provided by the caller who initiated API calls into the software distribution client. +- **CallerApplictionaName** No content is currently available. +- **ClientVersion** The version number of the software distribution client. +- **CommonProps** A bitmask for future flags associated with the Windows Update client behavior. No value is currently reported in this field. Expected value for this field is 0. +- **CSIErrorType** The stage of CBS installation where it failed. +- **CSIErrorTypr** No content is currently available. +- **CurrentMobileOperator** The mobile operator to which the device is currently connected. +- **DeploymentProviderMode** The mode of operation of the update deployment provider. +- **DeviceModel** The device model. +- **DriverPingBack** Contains information about the previous driver and system state. +- **DriverRecoveryIds** The list of identifiers that could be used for uninstalling the drivers if a recovery is required. +- **DriverRecoverySds** No content is currently available. +- **EvåntInstanceID** No content is currently available. +- **EventInstanceID** A globally unique identifier for event instance. +- **EventInstapceID** No content is currently available. +- **EventScenario** Indicates the purpose of sending this event - whether because the software distribution just started installing content, or whether it was cancelled, succeeded, or failed. +- **EventType** Possible values are Child, Bundle, or Driver. +- **EventTypr** No content is currently available. +- **ExtendedErrorCdel** No content is currently available. +- **ExtendedErrorCode** The extended error code. +- **ExtendedStatusCode** Secondary error code for certain scenarios where StatusCode is not specific enough. +- **ExtendedtartusCdel** No content is currently available. +- **FeatureUpdatePaser** No content is currently available. +- **FeatureUpdatePause** Indicates whether feature OS updates are paused on the device. +- **FlightBranch** The branch that a device is on if participating in the Windows Insider Program. +- **FlightBuildNumber** If this installation was for a Windows Insider build, this is the build number of that build. +- **FlightId** The specific ID of the Windows Insider build the device is getting. +- **FlightRing** The ring that a device is on if participating in the Windows Insider Program. +- **HandlerType** Indicates what kind of content is being installed (for example, app, driver, Windows update). +- **HandlerTypr** No content is currently available. +- **HardwareId** If this install was for a driver targeted to a particular device model, this ID indicates the model of the device. +- **HomeMobileOperator** The mobile operator that the device was originally intended to work with. +- **InstallProps** A bitmask for future flags associated with the install operation. No value is currently reported in this field. Expected value for this field is 0. +- **IntentPFNs** Intended application-set metadata for atomic update scenarios. +- **IsDependentSet** Indicates whether the driver is part of a larger System Hardware/Firmware update. +- **IsFinalOutcomeEvent** Indicates whether this event signals the end of the update/upgrade process. +- **IsFirmware** Indicates whether this update is a firmware update. +- **IsKcfBDualScanEnabled** No content is currently available. +- **IsKcfBEnabled** No content is currently available. +- **IsSuccessFailurePostReboot** Indicates whether the update succeeded and then failed after a restart. +- **IsSuccessFailurePst.Reboot** No content is currently available. +- **IsWUfBDualScanEnabled** Indicates whether Windows Update for Business dual scan is enabled on the device. +- **IsWUfBEnabled** Indicates whether Windows Update for Business is enabled on the device. +- **IsWVfBDualScanEnabled** No content is currently available. +- **IsWVfBEnabled** No content is currently available. +- **lundleId** No content is currently available. +- **lundleRepeatFailCount** No content is currently available. +- **lundleRevisionNumber** No content is currently available. +- **MergedUpdate** Indicates whether the OS update and a BSP update merged for installation. +- **MsiAction** The stage of MSI installation where it failed. +- **MsiProductCdel** No content is currently available. +- **MsiProductCode** The unique identifier of the MSI installer. +- **PackageBullName** No content is currently available. +- **PackageFullName** The package name of the content being installed. +- **PhonePreviewEnabled** Indicates whether a phone was getting preview build, prior to flighting being introduced. +- **ProcessName** The process name of the caller who initiated API calls, in the event that CallerApplicationName was not provided. +- **QualityUpdatePaser** No content is currently available. +- **QualityUpdatePause** Indicates whether quality OS updates are paused on the device. +- **RelatedCV** The previous Correlation Vector that was used before swapping with a new one +- **RepeatFailCoun.** No content is currently available. +- **RepeatFailCount** Indicates whether this specific piece of content has previously failed. +- **RepeatFailFlag** Indicates whether this specific piece of content previously failed to install. +- **RevisionNumber** The revision number of this specific piece of content. +- **SericeCGuid** No content is currently available. +- **ServiceGuid** An ID which represents which service the software distribution client is installing content for (Windows Update, Microsoft Store, etc.). +- **Setup360Phase** If the install is for an operating system upgrade, indicates which phase of the upgrade is underway. +- **ShippingMobileOperator** The mobile operator that a device shipped on. +- **StatusCode** Indicates the result of an installation event (success, cancellation, failure code HResult). +- **SystemBIOSMajorRelease** Major version of the BIOS. +- **SystemBIOSMinorRelease** Minor version of the BIOS. +- **TargetGroupId** For drivers targeted to a specific device model, this ID indicates the distribution group of devices receiving that driver. +- **TargetingVersaon** No content is currently available. +- **TargetingVersion** For drivers targeted to a specific device model, this is the version number of the drivers being distributed to the device. +- **TargetingVession** No content is currently available. +- **tartusCdel** No content is currently available. +- **TransactionCdel** No content is currently available. +- **TransactionCode** The ID that represents a given MSI installation. +- **UpdateId** Unique update ID. +- **UpdateID** An identifier associated with the specific piece of content. +- **UpdateImportance** Indicates whether a piece of content was marked as Important, Recommended, or Optional. +- **UpdateImportapce** No content is currently available. +- **UsedSystemVolume** Indicates whether the content was downloaded and then installed from the device's main system storage drive, or an alternate storage drive. +- **WUDdviceID** No content is currently available. +- **WUDeviceID** The unique identifier of a specific device, used to identify how many devices are encountering success or a particular issue. +- **WUDevi'eID** No content is currently available. +- **WUDviceCID** No content is currently available. + + +### SoftwareUpdateClientTelemetry.Revert + +Revert event for target update on Windows Update Client. See EventScenario field for specifics (for example, Started/Failed/Succeeded). + +The following fields are available: + +- **BundleId** Identifier associated with the specific content bundle. Should not be all zeros if the BundleId was found. +- **BundleRepeatFailCount** Indicates whether this particular update bundle has previously failed. +- **BundleRevisionNumber** Identifies the revision number of the content bundle. +- **CallerApplicationName** Name of application making the Windows Update request. Used to identify context of request. +- **ClientVersion** Version number of the software distribution client. +- **CommonProps** A bitmask for future flags associated with the Windows Update client behavior. There is no value being reported in this field right now. Expected value for this field is 0. +- **CSIErrorType** Stage of CBS installation that failed. +- **DriverPingBack** Contains information about the previous driver and system state. +- **DriverRecoveryIds** The list of identifiers that could be used for uninstalling the drivers if a recovery is required. +- **EventInstanceID** A globally unique identifier for event instance. +- **EventScenario** Indicates the purpose of the event (scan started, succeeded, failed, etc.). +- **EventType** Event type (Child, Bundle, Release, or Driver). +- **ExtendedStatusCode** Secondary status code for certain scenarios where StatusCode is not specific enough. +- **FeatureUpdatePause** Indicates whether feature OS updates are paused on the device. +- **FlightBuildNumber** Indicates the build number of the flight. +- **FlightId** The specific ID of the flight the device is getting. +- **HandlerType** Indicates the kind of content (app, driver, windows patch, etc.). +- **HardwareId** If this download was for a driver targeted to a particular device model, this ID indicates the model of the device. +- **IsFinalOutcomeEvent** Indicates whether this event signals the end of the update/upgrade process. +- **IsFirmware** Indicates whether an update was a firmware update. +- **IsSuccessFailurePostReboot** Indicates whether an initial success was a failure after a reboot. +- **IsWUfBDualScanEnabled** Flag indicating whether WU-for-Business dual scan is enabled on the device. +- **IsWUfBEnabled** Flag indicating whether WU-for-Business is enabled on the device. +- **MergedUpdate** Indicates whether an OS update and a BSP update were merged for install. +- **ProcessName** Process name of the caller who initiated API calls into the software distribution client. +- **QualityUpdatePause** Indicates whether quality OS updates are paused on the device. +- **RelatedCV** The previous correlation vector that was used by the client before swapping with a new one. +- **RepeatFailCount** Indicates whether this specific piece of content has previously failed. +- **RevisionNumber** Identifies the revision number of this specific piece of content. +- **ServiceGuid** Identifier for the service to which the software distribution client is connecting (Windows Update, Windows Store, etc.). +- **StatusCode** Result code of the event (success, cancellation, failure code HResult). +- **TargetGroupId** For drivers targeted to a specific device model, this ID indicates the distribution group of devices receiving that driver. +- **TargetingVersion** For drivers targeted to a specific device model, this is the version number of the drivers being distributed to the device. +- **UpdateId** The identifier associated with the specific piece of content. +- **UpdateImportance** Indicates the importance of a driver, and why it received that importance level (0-Unknown, 1-Optional, 2-Important-DNF, 3-Important-Generic, 4-Important-Other, 5-Recommended). +- **UsedSystemVolume** Indicates whether the device's main system storage drive or an alternate storage drive was used. +- **WUDeviceID** Unique device ID controlled by the software distribution client. + + +### SoftwareUpdateClientTelemetry.TaskRun + +Start event for Server Initiated Healing client. See EventScenario field for specifics (for example, started/completed). + +The following fields are available: + +- **CallerApplicationName** Name of application making the Windows Update request. Used to identify context of request. +- **ClientVersion** Version number of the software distribution client. +- **CmdLineArgs** Command line arguments passed in by the caller. +- **EventInstanceID** A globally unique identifier for the event instance. +- **EventScenario** Indicates the purpose of the event (scan started, succeeded, failed, etc.). +- **ServiceGuid** Identifier for the service to which the software distribution client is connecting (Windows Update, Microsoft Store, etc.). +- **StatusCode** Result code of the event (success, cancellation, failure code HResult). +- **WUDeviceID** Unique device ID controlled by the software distribution client. + + +### SoftwareUpdateClientTelemetry.Uninstall + +Uninstall event for target update on Windows Update Client. See EventScenario field for specifics (for example, Started/Failed/Succeeded). + +The following fields are available: + +- **BundleId** The identifier associated with the specific content bundle. This should not be all zeros if the bundleID was found. +- **BundleRepeatFailCount** Indicates whether this particular update bundle previously failed. +- **BundleRevisionNumber** Identifies the revision number of the content bundle. +- **CallerApplicationName** Name of the application making the Windows Update request. Used to identify context of request. +- **ClientVersion** Version number of the software distribution client. +- **CommonProps** A bitmask for future flags associated with the Windows Update client behavior. There is no value being reported in this field right now. Expected value for this field is 0. +- **DriverPingBack** Contains information about the previous driver and system state. +- **DriverRecoveryIds** The list of identifiers that could be used for uninstalling the drivers when a recovery is required. +- **EventInstanceID** A globally unique identifier for event instance. +- **EventScenario** Indicates the purpose of the event (a scan started, succeded, failed, etc.). +- **EventType** Indicates the event type. Possible values are "Child", "Bundle", "Release" or "Driver". +- **ExtendedStatusCode** Secondary status code for certain scenarios where StatusCode is not specific enough. +- **FeatureUpdatePause** Indicates whether feature OS updates are paused on the device. +- **FlightBuildNumber** Indicates the build number of the flight. +- **FlightId** The specific ID of the flight the device is getting. +- **HandlerType** Indicates the kind of content (app, driver, windows patch, etc.). +- **HardwareId** If the download was for a driver targeted to a particular device model, this ID indicates the model of the device. +- **IsFinalOutcomeEvent** Indicates whether this event signals the end of the update/upgrade process. +- **IsFirmware** Indicates whether an update was a firmware update. +- **IsSuccessFailurePostReboot** Indicates whether an initial success was then a failure after a reboot. +- **IsWUfBDualScanEnabled** Flag indicating whether WU-for-Business dual scan is enabled on the device. +- **IsWUfBEnabled** Flag indicating whether WU-for-Business is enabled on the device. +- **MergedUpdate** Indicates whether an OS update and a BSP update were merged for install. +- **ProcessName** Process name of the caller who initiated API calls into the software distribution client. +- **QualityUpdatePause** Indicates whether quality OS updates are paused on the device. +- **RelatedCV** The previous correlation vector that was used by the client before swapping with a new one. +- **RepeatFailCount** Indicates whether this specific piece of content previously failed. +- **RevisionNumber** Identifies the revision number of this specific piece of content. +- **ServiceGuid** Identifier for the service to which the software distribution client is connecting (Windows Update, Windows Store, etc.). +- **StatusCode** Result code of the event (success, cancellation, failure code HResult). +- **TargetGroupId** For drivers targeted to a specific device model, this ID indicates the distribution group of devices receiving that driver. +- **TargetingVersion** For drivers targeted to a specific device model, this is the version number of the drivers being distributed to the device. +- **UpdateId** Identifier associated with the specific piece of content. +- **UpdateImportance** Indicates the importance of a driver and why it received that importance level (0-Unknown, 1-Optional, 2-Important-DNF, 3-Important-Generic, 4-Important-Other, 5-Recommended). +- **UsedSystemVolume** Indicates whether the device’s main system storage drive or an alternate storage drive was used. +- **WUDeviceID** Unique device ID controlled by the software distribution client. + + +### SoftwareUpdateClientTelemetry.UpdateDetected + +This event sends data about an AppX app that has been updated from the Microsoft Store, including what app needs an update and what version/architecture is required, in order to understand and address problems with apps getting required updates. + +The following fields are available: + +- **ApplicableUpdateInfo** Metadata for the updates which were detected as applicable. +- **CallerApplicationName** The name provided by the caller who initiated API calls into the software distribution client. +- **IntentPFNs** Intended application-set metadata for atomic update scenarios. +- **NumberOfApplicableUpdates** The number of updates ultimately deemed applicable to the system after the detection process is complete. +- **RelatedCV** The previous Correlation Vector that was used before swapping with a new one. +- **RelntedCV** No content is currently available. +- **ServiceGuid** An ID that represents which service the software distribution client is connecting to (Windows Update, Microsoft Store, etc.). +- **umberOfApplicableUpdates** No content is currently available. +- **WUDeviceID** The unique device ID controlled by the software distribution client. + + +### SoftwareUpdateClientTelemetry.UpdateMetadataIntegrity + +Ensures Windows Updates are secure and complete. Event helps to identify whether update content has been tampered with and protects against man-in-the-middle attack. + +The following fields are available: + +- **CallerApplicationName** Name of application making the Windows Update request. Used to identify context of request. +- **CallerLoglicationName** No content is currently available. +- **EndpointUrl** URL of the endpoint where client obtains update metadata. Used to identify test vs staging vs production environments. +- **EventScenario** The purpose of this event, such as scan started, scan succeeded, or scan failed. +- **ExtendedStatusCode** The secondary status code of the event. +- **ExtendefStatusCode** No content is currently available. +- **LeafCertId** The integral ID from the FragmentSigning data for the certificate that failed. +- **ListOfSHA256OfIntermediateCerData** A semicolon delimited list of base64 encoding of hashes for the Base64CerData in the FragmentSigning data of an intermediate certificate. +- **MetadataIntegrityMode** The mode of the transport metadata integrity check. 0 = unknown; 1 = ignore; 2 = audit; 3 = enforce +- **MetadataSignature** A base64-encoded string of the signature associated with the update metadata (specified by revision ID). +- **RawMode** The raw unparsed mode string from the SLS response. This field is null if not applicable. +- **RawValidityWindowInDays** The raw unparsed validity window string in days of the timestamp token. This field is null if not applicable. +- **RcwMode** No content is currently available. +- **RevisionId** The revision ID for a specific piece of content. +- **RevisionNumber** The revision number for a specific piece of content. +- **SedviceGuid** No content is currently available. +- **ServiceGuid** Identifies the service to which the software distribution client is connected, Example: Windows Update or Microsoft Store +- **ServiceGuidEndpointUrl** No content is currently available. +- **SHA256OfLeafCerData** A base64 encoding of the hash for the Base64CerData in the FragmentSigning data of the leaf certificate. +- **SHA256OfLeafCertPublicKey** A base64 encoding of the hash of the Base64CertData in the FragmentSigning data of the leaf certificate. +- **SHA256OfTimestampToken** An encoded string of the timestamp token. +- **SignatureAlgorithm** The hash algorithm for the metadata signature. +- **SLSPrograms** A test program to which a device may have opted in. Example: Insider Fast +- **StatusCode** The status code of the event. +- **TimestampTokenCertThumbprint** The thumbprint of the encoded timestamp token. +- **TimestampTokenId** The time this was created. It is encoded in a timestamp blob and will be zero if the token is malformed. +- **UpdateId** The update ID for a specific piece of content. +- **ValidityWindowInDays** The validity window that's in effect when verifying the timestamp. + + +## System Resource Usage Monitor events + +### Microsoft.Windows.Srum.Sdp.CpuUsage + +This event provides information on CPU usage. + +The following fields are available: + +- **UsageMax** The maximum of hourly average CPU usage. +- **UsageMean** The mean of hourly average CPU usage. +- **UsageMedian** The median of hourly average CPU usage. +- **UsageTwoHourMaxMean** The mean of the maximum of every two hour of hourly average CPU usage. +- **UsageTwoHourMedianMean** The mean of the median of every two hour of hourly average CPU usage. + + +### Microsoft.Windows.Srum.Sdp.NetworkUsage + +This event provides information on network usage. + +The following fields are available: + +- **AdapterGuid** The unique ID of the adapter. +- **BytesTotalMax** The maximum of the hourly average bytes total. +- **BytesTotalMean** The mean of the hourly average bytes total. +- **BytesTotalMedian** The median of the hourly average bytes total. +- **BytesTotalTwoHourMaxMean** The mean of the maximum of every two hours of hourly average bytes total. +- **BytesTotalTwoHourMedianMean** The mean of the median of every two hour of hourly average bytes total. +- **LinkSpeed** The adapter link speed. + + +## Update events + +### Update360Telemetry.Revert + +This event sends data relating to the Revert phase of updating Windows. + +The following fields are available: + +- **ErrorCode** The error code returned for the Revert phase. +- **FlightId** Unique ID for the flight (test instance version). +- **ObjectId** The unique value for each Update Agent mode. +- **RebootRequired** Indicates reboot is required. +- **RelatedCV** The correlation vector value generated from the latest USO (Update Service Orchestrator) scan. +- **Result** The HResult of the event. +- **RevertResult** The result code returned for the Revert operation. +- **ScenarioId** The ID of the update scenario. +- **SessionId** The ID of the update attempt. +- **UpdateId** The ID of the update. + + +### Update360Telemetry.UpdateAgentCommit + +This event collects information regarding the commit phase of the new Unified Update Platform (UUP) update scenario, which is leveraged by both Mobile and Desktop. + +The following fields are available: + +- **ErrorCode** The error code returned for the current install phase. +- **FlightId** Unique ID for each flight. +- **ObjectId** Unique value for each Update Agent mode. +- **RelatedCV** Correlation vector value generated from the latest USO scan. +- **Result** Outcome of the install phase of the update. +- **ScenarioId** Indicates the update scenario. +- **SessionId** Unique value for each update attempt. +- **UpdateId** Unique ID for each update. + + +### Update360Telemetry.UpdateAgentDownloadRequest + +This event sends data for the download request phase of updating Windows via the new Unified Update Platform (UUP) scenario. Applicable to PC and Mobile. + +The following fields are available: + +- **DeletedCorruptFiles** Boolean indicating whether corrupt payload was deleted. +- **DownloadRequests** Number of times a download was retried. +- **ErrorCode** The error code returned for the current download request phase. +- **ExtensionName** Indicates whether the payload is related to Operating System content or a plugin. +- **FlightId** Unique ID for each flight. +- **InternalFailureResult** Indicates a non-fatal error from a plugin. +- **ObjectId** Unique value for each Update Agent mode (same concept as InstanceId for Setup360). +- **PackageCategoriesSkipped** Indicates package categories that were skipped, if applicable. +- **PackageCountOptional** Number of optional packages requested. +- **PackageCountRequired** Number of required packages requested. +- **PackageCountTotal** Total number of packages needed. +- **PackageCountTotalCanonical** Total number of canonical packages. +- **PackageCountTotalDiff** Total number of diff packages. +- **PackageCountTotalExpress** Total number of express packages. +- **PackageCountTotalPSFX** The total number of PSFX packages. +- **PackageExpressType** Type of express package. +- **PackageSizeCanonical** Size of canonical packages in bytes. +- **PackageSizeDiff** Size of diff packages in bytes. +- **PackageSizeExpress** Size of express packages in bytes. +- **PackageSizePSFX** The size of PSFX packages, in bytes. +- **RangeRequestState** Indicates the range request type used. +- **RelatedCV** Correlation vector value generated from the latest USO scan. +- **Result** Outcome of the download request phase of update. +- **SandboxTaggedForReserves** The sandbox for reserves. +- **ScenarioId** Indicates the update scenario. +- **SessionId** Unique value for each attempt (same value for initialize, download, install commit phases). +- **UpdateId** Unique ID for each update. + + +### Update360Telemetry.UpdateAgentExpand + +This event collects information regarding the expansion phase of the new Unified Update Platform (UUP) update scenario, which is leveraged by both Mobile and Desktop. + +The following fields are available: + +- **ElapsedTickCount** Time taken for expand phase. +- **EndFreeSpace** Free space after expand phase. +- **EndSandboxSize** Sandbox size after expand phase. +- **ErrorCode** The error code returned for the current install phase. +- **FlightId** Unique ID for each flight. +- **ObjectId** Unique value for each Update Agent mode. +- **RelatedCV** Correlation vector value generated from the latest USO scan. +- **ScenarioId** Indicates the update scenario. +- **SessionId** Unique value for each update attempt. +- **StartFreeSpace** Free space before expand phase. +- **StartSandboxSize** Sandbox size after expand phase. +- **UpdateId** Unique ID for each update. + + +### Update360Telemetry.UpdateAgentFellBackToCanonical + +This event collects information when express could not be used and we fall back to canonical during the new Unified Update Platform (UUP) update scenario, which is leveraged by both Mobile and Desktop. + +The following fields are available: + +- **FlightId** Unique ID for each flight. +- **ObjectId** Unique value for each Update Agent mode. +- **PackageCount** Number of packages that feel back to canonical. +- **PackageList** PackageIds which fell back to canonical. +- **RelatedCV** Correlation vector value generated from the latest USO scan. +- **ScenarioId** Indicates the update scenario. +- **SessionId** Unique value for each update attempt. +- **UpdateId** Unique ID for each update. + + +### Update360Telemetry.UpdateAgentInitialize + +This event sends data for the initialize phase of updating Windows via the new Unified Update Platform (UUP) scenario, which is applicable to both PCs and Mobile. + +The following fields are available: + +- **ErrorCode** The error code returned for the current install phase. +- **essionData** No content is currently available. +- **FlightId** Unique ID for each flight. +- **FlightMetadata** Contains the FlightId and the build being flighted. +- **ObjectId** Unique value for each Update Agent mode. +- **RelatedCV** Correlation vector value generated from the latest USO scan. +- **Result** Outcome of the install phase of the update. +- **ScenarioId** Indicates the update scenario. +- **SessionData** String containing instructions to update agent for processing FODs and DUICs (Null for other scenarios). +- **SessionId** Unique value for each update attempt. +- **UpdateId** Unique ID for each update. + + +### Update360Telemetry.UpdateAgentInstall + +This event sends data for the install phase of updating Windows. + +The following fields are available: + +- **ErrorCode** The error code returned for the current install phase. +- **ExtensionName** Indicates whether the payload is related to Operating System content or a plugin. +- **FlightId** Unique value for each Update Agent mode (same concept as InstanceId for Setup360). +- **InternalFailureResult** Indicates a non-fatal error from a plugin. +- **ObjectId** Correlation vector value generated from the latest USO scan. +- **RelatedCV** Correlation vector value generated from the latest USO scan. +- **Result** The result for the current install phase. +- **ScenarioId** Indicates the update scenario. +- **SessionId** Unique value for each update attempt. +- **UpdateId** Unique ID for each update. + + +### Update360Telemetry.UpdateAgentMerge + +The UpdateAgentMerge event sends data on the merge phase when updating Windows. + +The following fields are available: + +- **ErrorCode** The error code returned for the current merge phase. +- **FlightId** Unique ID for each flight. +- **MergeId** The unique ID to join two update sessions being merged. +- **ObjectId** Unique value for each Update Agent mode. +- **RelatedCV** Related correlation vector value. +- **Result** Outcome of the merge phase of the update. +- **ScenarioId** Indicates the update scenario. +- **SessionId** Unique value for each attempt. +- **UpdateId** Unique ID for each update. + + +### Update360Telemetry.UpdateAgentMitigationResult + +This event sends data indicating the result of each update agent mitigation. + +The following fields are available: + +- **Applicable** Indicates whether the mitigation is applicable for the current update. +- **CommandCount** The number of command operations in the mitigation entry. +- **CustomCount** The number of custom operations in the mitigation entry. +- **FileCount** The number of file operations in the mitigation entry. +- **FlightId** Unique identifier for each flight. +- **Index** The mitigation index of this particular mitigation. +- **MitigationScenario** The update scenario in which the mitigation was executed. +- **Name** The friendly name of the mitigation. +- **ObjectId** Unique value for each Update Agent mode. +- **OperationIndex** The mitigation operation index (in the event of a failure). +- **OperationName** The friendly name of the mitigation operation (in the event of failure). +- **RegistryCount** The number of registry operations in the mitigation entry. +- **RelatedCV** The correlation vector value generated from the latest USO scan. +- **Result** The HResult of this operation. +- **ScenarioId** The update agent scenario ID. +- **SessionId** Unique value for each update attempt. +- **TimeDiff** The amount of time spent performing the mitigation (in 100-nanosecond increments). +- **UpdateId** Unique ID for each Update. + + +### Update360Telemetry.UpdateAgentMitigationSummary + +This event sends a summary of all the update agent mitigations available for an this update. + +The following fields are available: + +- **Applicable** The count of mitigations that were applicable to the system and scenario. +- **Failed** The count of mitigations that failed. +- **FlightId** Unique identifier for each flight. +- **Friled** No content is currently available. +- **MitigationScenario** The update scenario in which the mitigations were attempted. +- **ObjectId** The unique value for each Update Agent mode. +- **RelatedCV** The correlation vector value generated from the latest USO scan. +- **Result** The HResult of this operation. +- **ScenarioId** The update agent scenario ID. +- **SessionId** Unique value for each update attempt. +- **TimeDiff** The amount of time spent performing all mitigations (in 100-nanosecond increments). +- **Total** Total number of mitigations that were available. +- **UpdateId** Unique ID for each update. + + +### Update360Telemetry.UpdateAgentModeStart + +This event sends data for the start of each mode during the process of updating Windows via the new Unified Update Platform (UUP) scenario. Applicable to both PCs and Mobile. + +The following fields are available: + +- **FlightId** Unique ID for each flight. +- **Mode** Indicates the mode that has started. +- **ObjectId** Unique value for each Update Agent mode. +- **RelatedCV** Correlation vector value generated from the latest USO scan. +- **ScenarioId** Indicates the update scenario. +- **SessionId** Unique value for each update attempt. +- **UpdateId** Unique ID for each update. +- **Version** Version of update + + +### Update360Telemetry.UpdateAgentOneSettings + +This event collects information regarding the post reboot phase of the new UUP (Unified Update Platform) update scenario; which is leveraged by both Mobile and Desktop. + +The following fields are available: + +- **Count** The count of applicable OneSettings for the device. +- **FlightId** Unique ID for the flight (test instance version). +- **ObjectId** The unique value for each Update Agent mode. +- **Parameters** The set of name value pair parameters sent to OneSettings to determine if there are any applicable OneSettings. +- **RelatedCV** The correlation vector value generated from the latest USO (Update Service Orchestrator) scan. +- **Result** The HResult of the event. +- **ScenarioId** The ID of the update scenario. +- **SessionId** The ID of the update attempt. +- **UpdateId** The ID of the update. +- **Values** The values sent back to the device, if applicable. + + +### Update360Telemetry.UpdateAgentPostRebootResult + +This event collects information for both Mobile and Desktop regarding the post reboot phase of the new Unified Update Platform (UUP) update scenario. + +The following fields are available: + +- **ErrorCode** The error code returned for the current post reboot phase. +- **FlightId** The specific ID of the Windows Insider build the device is getting. +- **ObjectId** Unique value for each Update Agent mode. +- **PostRebootResult** Indicates the Hresult. +- **RelatedCV** Correlation vector value generated from the latest USO scan. +- **ScenarioId** The scenario ID. Example: MobileUpdate, DesktopLanguagePack, DesktopFeatureOnDemand, or DesktopDriverUpdate. +- **SessionId** Unique value for each update attempt. +- **UpdateId** Unique ID for each update. + + +### Update360Telemetry.UpdateAgentReboot + +This event sends information indicating that a request has been sent to suspend an update. + +The following fields are available: + +- **ErrorCode** The error code returned for the current reboot. +- **FlightId** Unique ID for the flight (test instance version). +- **ObjectId** The unique value for each Update Agent mode. +- **RelatedCV** The correlation vector value generated from the latest USO (Update Service Orchestrator) scan. +- **Result** The HResult of the event. +- **ScenarioId** The ID of the update scenario. +- **SessionId** The ID of the update attempt. +- **UpdateId** The ID of the update. + + +### Update360Telemetry.UpdateAgentSetupBoxLaunch + +The UpdateAgent_SetupBoxLaunch event sends data for the launching of the setup box when updating Windows via the new Unified Update Platform (UUP) scenario. This event is only applicable to PCs. + +The following fields are available: + +- **ContainsExpressPackage** Indicates whether the download package is express. +- **FlightId** Unique ID for each flight. +- **FreeSpace** Free space on OS partition. +- **InstallCount** Number of install attempts using the same sandbox. +- **ObjectId** Unique value for each Update Agent mode. +- **Quiet** Indicates whether setup is running in quiet mode. +- **RelatedCV** Correlation vector value generated from the latest USO scan. +- **SandboxSize** Size of the sandbox. +- **ScenarioId** Indicates the update scenario. +- **SessionId** Unique value for each update attempt. +- **SetupMode** Mode of setup to be launched. +- **UpdateId** Unique ID for each Update. +- **UserSession** Indicates whether install was invoked by user actions. + + +## Update notification events + +### Microsoft.Windows.UpdateNotificationPipeline.UNPCampaignManagerHeartbeat + +This event is sent at the start of the CampaignManager event and is intended to be used as a heartbeat. + +The following fields are available: + +- **CampaignConfigVersion** Configuration version for the current campaign. +- **CampaignID** Currently campaign that is running on Update Notification Pipeline (UNP). +- **ConfigCatalogVersion** Current catalog version of UNP. +- **ContentVersion** Content version for the current campaign on UNP. +- **CV** Correlation vector. +- **DetectorVersion** Most recently run detector version for the current campaign on UNP. +- **GlobalEventCounter** Client-side counter that indicates the event ordering sent by the user. +- **PackageVersion** Current UNP package version. + + +## Upgrade events + +### FacilitatorTelemetry.DCATDownload + +This event indicates whether devices received additional or critical supplemental content during an OS Upgrade, to help keep Windows up-to-date and secure. + +The following fields are available: + +- **DownloadSize** Download size of payload. +- **ElapsedTime** Time taken to download payload. +- **MediaFallbackUsed** Used to determine if we used Media CompDBs to figure out package requirements for the upgrade. +- **ResultCode** Result returned by the Facilitator DCAT call. +- **Scenario** Dynamic update scenario (Image DU, or Setup DU). +- **Type** Type of package that was downloaded. +- **UpdateId** The ID of the update that was downloaded. + + +### FacilitatorTelemetry.DUDownload + +This event returns data about the download of supplemental packages critical to upgrading a device to the next version of Windows. + +The following fields are available: + +- **DownloadRequestAttributes** The attributes sent for download. +- **PackageCategoriesFailed** Lists the categories of packages that failed to download. +- **PackageCategoriesSkipped** Lists the categories of package downloads that were skipped. +- **ResultCode** The result of the event execution. +- **Scenario** Identifies the active Download scenario. +- **Url** The URL the download request was sent to. +- **Version** Identifies the version of Facilitator used. + + +### FacilitatorTelemetry.InitializeDU + +This event determines whether devices received additional or critical supplemental content during an OS upgrade. + +The following fields are available: + +- **DCATUrl** The Delivery Catalog (DCAT) URL we send the request to. +- **DownloadRequestAttributes** The attributes we send to DCAT. +- **ResultCode** The result returned from the initiation of Facilitator with the URL/attributes. +- **Scenario** Dynamic Update scenario (Image DU, or Setup DU). +- **Url** The Delivery Catalog (DCAT) URL we send the request to. +- **Version** Version of Facilitator. + + +### Setup360Telemetry.Downlevel + +This event sends data indicating that the device has started the downlevel phase of the upgrade, to help keep Windows up-to-date and secure. + +The following fields are available: + +- **ClientId** If using Windows Update, this will be the Windows Update client ID that is passed to Setup. In Media setup, the default value is Media360, but it can be overwritten by the caller to a unique value. +- **FlightData** Unique value that identifies the flight. +- **HostOSBuildNumber** The build number of the downlevel OS. +- **HostOsSkuName** The operating system edition which is running Setup360 instance (downlevel OS). +- **InstanceId** A unique GUID that identifies each instance of setuphost.exe. +- **ReportId** In the Windows Update scenario, this is the updateID that is passed to Setup. In media setup, this is the GUID for the install.wim. +- **Setup360Extended** More detailed information about phase/action when the potential failure occurred. +- **Setup360Mode** The phase of Setup360 (for example, Predownload, Install, Finalize, Rollback). +- **Setup360Result** The result of Setup360 (HRESULT used to diagnose errors). +- **Setup360Scenario** The Setup360 flow type (for example, Boot, Media, Update, MCT). +- **SetupVersionBuildNumber** The build number of Setup360 (build number of the target OS). +- **State** Exit state of given Setup360 run. Example: succeeded, failed, blocked, cancelled. +- **TestId** An ID that uniquely identifies a group of events. +- **WuId** This is the Windows Update Client ID. In the Windows Update scenario, this is the same as the clientId. + + +### Setup360Telemetry.Finalize + +This event sends data indicating that the device has started the phase of finalizing the upgrade, to help keep Windows up-to-date and secure. + +The following fields are available: + +- **ClientId** With Windows Update, this will be the Windows Update client ID that is passed to Setup. In Media setup, default value is Media360, but can be overwritten by the caller to a unique value. +- **FlightData** Unique value that identifies the flight. +- **HostOSBuildNumber** The build number of the previous OS. +- **HostOsSkuName** The OS edition which is running Setup360 instance (previous OS). +- **InstanceId** A unique GUID that identifies each instance of setuphost.exe +- **ReportId** With Windows Update, this is the updateID that is passed to Setup. In media setup, this is the GUID for the install.wim. +- **Setup360Extended** More detailed information about the phase/action when the potential failure occurred. +- **Setup360Mode** The phase of Setup360. Example: Predownload, Install, Finalize, Rollback. +- **Setup360Result** The result of Setup360. This is an HRESULT error code that is used to diagnose errors. +- **Setup360Scenario** The Setup360 flow type. Example: Boot, Media, Update, MCT. +- **SetupVersionBuildNumber** The build number of Setup360 (build number of target OS). +- **State** The exit state of a Setup360 run. Example: succeeded, failed, blocked, cancelled. +- **TestId** ID that uniquely identifies a group of events. +- **WuId** This is the Windows Update Client ID. With Windows Update, this is the same as the clientId. + + +### Setup360Telemetry.OsUninstall + +This event sends data regarding OS updates and upgrades from Windows 7, Windows 8, and Windows 10. Specifically, it indicates the outcome of an OS uninstall. + +The following fields are available: + +- **ClientId** For Windows Update, this will be the Windows Update client ID that is passed to Setup. In Media setup, default value is Media360, but can be overwritten by the caller to a unique value. +- **FlightData** Unique value that identifies the flight. +- **HostOSBuildNumber** The build number of the previous OS. +- **HostOsSkuName** The OS edition which is running the Setup360 instance (previous OS). +- **InstanceId** A unique GUID that identifies each instance of setuphost.exe. +- **ReportId** For Windows Update, this will be the Windows Update client ID that is passed to Setup. In Media setup, this is the GUID for the install.wim. +- **Setup360Extended** Detailed information about the phase or action when the potential failure occurred. +- **Setup360Mode** The phase of Setup360. Example: Predownload, Install, Finalize, Rollback. +- **Setup360Result** The result of Setup360. This is an HRESULT error code that is used to diagnose errors. +- **Setup360Scenario** The Setup360 flow type. Example: Boot, Media, Update, MCT +- **SetupVersionBuildNumber** The build number of Setup360 (build number of target OS). +- **State** Exit state of a Setup360 run. Example: succeeded, failed, blocked, cancelled. +- **TestId** ID that uniquely identifies a group of events. +- **WuId** Windows Update client ID. + + +### Setup360Telemetry.PostRebootInstall + +This event sends data indicating that the device has invoked the post reboot install phase of the upgrade, to help keep Windows up-to-date. + +The following fields are available: + +- **ClientId** With Windows Update, this is the Windows Update client ID that is passed to Setup. In Media setup, the default value is Media360, but can be overwritten by the caller to a unique value. +- **FlightData** Unique value that identifies the flight. +- **HostOSBuildNumber** The build number of the previous OS. +- **HostOsSkuName** The OS edition which is running Setup360 instance (previous OS). +- **InstanceId** A unique GUID that identifies each instance of setuphost.exe. +- **ReportId** With Windows Update, this is the updateID that is passed to Setup. In media setup, this is the GUID for the install.wim. +- **Setup360Extended** Extension of result - more granular information about phase/action when the potential failure happened +- **Setup360Mode** The phase of Setup360. Example: Predownload, Install, Finalize, Rollback +- **Setup360Result** The result of Setup360. This is an HRESULT error code that's used to diagnose errors. +- **Setup360Scenario** The Setup360 flow type. Example: Boot, Media, Update, MCT +- **SetupVersionBuildNumber** The build number of Setup360 (build number of target OS). +- **State** The exit state of a Setup360 run. Example: succeeded, failed, blocked, cancelled +- **TestId** A string to uniquely identify a group of events. +- **WuId** This is the Windows Update Client ID. With Windows Update, this is the same as ClientId. + + +### Setup360Telemetry.PreDownloadQuiet + +This event sends data indicating that the device has invoked the predownload quiet phase of the upgrade, to help keep Windows up to date. + +The following fields are available: + +- **ClientId** Using Windows Update, this will be the Windows Update client ID that is passed to Setup. In Media setup, default value is Media360, but can be overwritten by the caller to a unique value. +- **FlightData** Unique value that identifies the flight. +- **HostOSBuildNumber** The build number of the previous OS. +- **HostOsSkuName** The OS edition which is running Setup360 instance (previous operating system). +- **InstanceId** A unique GUID that identifies each instance of setuphost.exe. +- **ReportId** Using Windows Update, this is the updateID that is passed to Setup. In media setup, this is the GUID for the install.wim. +- **Setup360Extended** Detailed information about the phase/action when the potential failure occurred. +- **Setup360Mode** The phase of Setup360. Example: Predownload, Install, Finalize, Rollback. +- **Setup360Result** The result of Setup360. This is an HRESULT error code that is used to diagnose errors. +- **Setup360Scenario** The Setup360 flow type. Example: Boot, Media, Update, MCT. +- **SetupVersionBuildNumber** The build number of Setup360 (build number of target OS). +- **State** The exit state of a Setup360 run. Example: succeeded, failed, blocked, canceled. +- **TestId** ID that uniquely identifies a group of events. +- **WuId** This is the Windows Update Client ID. Using Windows Update, this is the same as the clientId. + + +### Setup360Telemetry.PreDownloadUX + +This event sends data regarding OS Updates and Upgrades from Windows 7.X, Windows 8.X, Windows 10 and RS, to help keep Windows up-to-date and secure. Specifically, it indicates the outcome of the PredownloadUX portion of the update process. + +The following fields are available: + +- **ClientId** For Windows Update, this will be the Windows Update client ID that is passed to Setup. In Media setup, default value is Media360, but can be overwritten by the caller to a unique value. +- **FlightData** In the WU scenario, this will be the WU client ID that is passed to Setup. In Media setup, default value is Media360, but can be overwritten by the caller to a unique value. +- **HostOSBuildNumber** The build number of the previous operating system. +- **HostOsSkuName** The OS edition which is running the Setup360 instance (previous operating system). +- **InstanceId** Unique GUID that identifies each instance of setuphost.exe. +- **ReportId** For Windows Update, this will be the Windows Update client ID that is passed to Setup. In Media setup, this is the GUID for the install.wim. +- **Setup360Extended** Detailed information about the phase/action when the potential failure occurred. +- **Setup360Mode** The phase of Setup360. Example: Predownload, Install, Finalize, Rollback. +- **Setup360Result** The result of Setup360. This is an HRESULT error code that can be used to diagnose errors. +- **Setup360Scenario** The Setup360 flow type. Example: Boot, Media, Update, MCT. +- **SetupVersionBuildNumber** The build number of Setup360 (build number of the target OS). +- **State** The exit state of the Setup360 run. Example: succeeded, failed, blocked, cancelled. +- **TestId** ID that uniquely identifies a group of events. +- **WuId** Windows Update client ID. + + +### Setup360Telemetry.PreInstallQuiet + +This event sends data indicating that the device has invoked the preinstall quiet phase of the upgrade, to help keep Windows up-to-date. + +The following fields are available: + +- **ClientId** With Windows Update, this will be the Windows Update client ID that is passed to Setup. In Media setup, default value is Media360, but can be overwritten by the caller to a unique value. +- **FlightData** Unique value that identifies the flight. +- **HostOSBuildNumber** The build number of the previous OS. +- **HostOsSkuName** The OS edition which is running Setup360 instance (previous OS). +- **InstanceId** A unique GUID that identifies each instance of setuphost.exe +- **ReportId** With Windows Update, this is the updateID that is passed to Setup. In media setup, this is the GUID for the install.wim. +- **Setup360Extended** Detailed information about the phase/action when the potential failure occurred. +- **Setup360Mode** The phase of Setup360. Example: Predownload, Install, Finalize, Rollback. +- **Setup360Result** The result of Setup360. This is an HRESULT error code that can be used to diagnose errors. +- **Setup360Scenario** Setup360 flow type (Boot, Media, Update, MCT). +- **SetupVersionBuildNumber** The build number of Setup360 (build number of target OS). +- **State** The exit state of a Setup360 run. Example: succeeded, failed, blocked, cancelled. +- **TestId** A string to uniquely identify a group of events. +- **WuId** This is the Windows Update Client ID. With Windows Update, this is the same as the clientId. + + +### Setup360Telemetry.PreInstallUX + +This event sends data regarding OS updates and upgrades from Windows 7, Windows 8, and Windows 10, to help keep Windows up-to-date. Specifically, it indicates the outcome of the PreinstallUX portion of the update process. + +The following fields are available: + +- **ClientId** For Windows Update, this will be the Windows Update client ID that is passed to Setup. In Media setup, default value is Media360, but can be overwritten by the caller to a unique value. +- **FlightData** Unique value that identifies the flight. +- **HostOSBuildNumber** The build number of the previous OS. +- **HostOsSkuName** The OS edition which is running the Setup360 instance (previous OS). +- **InstanceId** A unique GUID that identifies each instance of setuphost.exe. +- **ReportId** For Windows Update, this will be the Windows Update client ID that is passed to Setup. In Media setup, this is the GUID for the install.wim. +- **Setup360Extended** Detailed information about the phase/action when the potential failure occurred. +- **Setup360Mode** The phase of Setup360. Example: Predownload, Install, Finalize, Rollback. +- **Setup360Result** The result of Setup360. This is an HRESULT error code that is used to diagnose errors. +- **Setup360Scenario** The Setup360 flow type, Example: Boot, Media, Update, MCT. +- **SetupVersionBuildNumber** The build number of Setup360 (build number of target OS). +- **State** The exit state of a Setup360 run. Example: succeeded, failed, blocked, cancelled. +- **TestId** A string to uniquely identify a group of events. +- **WuId** Windows Update client ID. + + +### Setup360Telemetry.Setup360 + +This event sends data about OS deployment scenarios, to help keep Windows up-to-date. + +The following fields are available: + +- **ClientId** Retrieves the upgrade ID. In the Windows Update scenario, this will be the Windows Update client ID. In Media setup, default value is Media360, but can be overwritten by the caller to a unique value. +- **FieldName** Retrieves the data point. +- **FlightData** Specifies a unique identifier for each group of Windows Insider builds. +- **InstanãeId** No content is currently available. +- **InstanceId** Retrieves a unique identifier for each instance of a setup session. +- **ReportId** Retrieves the report ID. +- **ScenarioId** Retrieves the deployment scenario. +- **value** No content is currently available. +- **Value** Retrieves the value associated with the corresponding FieldName. + + +### Setup360Telemetry.Setup360DynamicUpdate + +This event helps determine whether the device received supplemental content during an operating system upgrade, to help keep Windows up-to-date. + +The following fields are available: + +- **FlightData** Specifies a unique identifier for each group of Windows Insider builds. +- **InstanceId** Retrieves a unique identifier for each instance of a setup session. +- **Operation** Facilitator’s last known operation (scan, download, etc.). +- **ReportId** ID for tying together events stream side. +- **ResultCode** Result returned for the entire setup operation. +- **Scenario** Dynamic Update scenario (Image DU, or Setup DU). +- **ScenarioId** Identifies the update scenario. +- **TargetBranch** Branch of the target OS. +- **TargetBuild** Build of the target OS. + + +### Setup360Telemetry.Setup360MitigationResult + +This event sends data indicating the result of each setup mitigation. + +The following fields are available: + +- **Applicable** TRUE if the mitigation is applicable for the current update. +- **ClientId** In the Windows Update scenario, this is the client ID passed to Setup. In Media setup, default value is Media360, but can be overwritten by the caller to a unique value. +- **CommandCount** The number of command operations in the mitigation entry. +- **CustomCount** The number of custom operations in the mitigation entry. +- **FileCount** The number of file operations in the mitigation entry. +- **FlightData** The unique identifier for each flight (test release). +- **Index** The mitigation index of this particular mitigation. +- **InstanceId** The GUID (Globally Unique ID) that identifies each instance of SetupHost.EXE. +- **MitigationScenario** The update scenario in which the mitigation was executed. +- **Name** The friendly (descriptive) name of the mitigation. +- **OperationIndex** The mitigation operation index (in the event of a failure). +- **OperationName** The friendly (descriptive) name of the mitigation operation (in the event of failure). +- **RegistryCount** The number of registry operations in the mitigation entry. +- **ReportId** In the Windows Update scenario, the Update ID that is passed to Setup. In media setup, this is the GUID for the INSTALL.WIM. +- **Result** HResult of this operation. +- **ScenarioId** Setup360 flow type. +- **TimeDiff** The amount of time spent performing the mitigation (in 100-nanosecond increments). + + +### Setup360Telemetry.Setup360MitigationSummary + +This event sends a summary of all the setup mitigations available for this update. + +The following fields are available: + +- **Applicable** The count of mitigations that were applicable to the system and scenario. +- **ClientId** The Windows Update client ID passed to Setup. +- **Failed** The count of mitigations that failed. +- **FlightData** The unique identifier for each flight (test release). +- **InstanceId** The GUID (Globally Unique ID) that identifies each instance of SetupHost.EXE. +- **MitigationScenario** The update scenario in which the mitigations were attempted. +- **ReportId** In the Windows Update scenario, the Update ID that is passed to Setup. In media setup, this is the GUID for the INSTALL.WIM. +- **Result** HResult of this operation. +- **ScenarioId** Setup360 flow type. +- **TimeDiff** The amount of time spent performing the mitigation (in 100-nanosecond increments). +- **Total** The total number of mitigations that were available. + + +### Setup360Telemetry.Setup360OneSettings + +This event collects information regarding the post reboot phase of the new UUP (Unified Update Platform) update scenario; which is leveraged by both Mobile and Desktop. + +The following fields are available: + +- **ClientId** The Windows Update client ID passed to Setup. +- **Count** The count of applicable OneSettings for the device. +- **FlightData** The ID for the flight (test instance version). +- **InstanceId** The GUID (Globally-Unique ID) that identifies each instance of setuphost.exe. +- **Parameters** The set of name value pair parameters sent to OneSettings to determine if there are any applicable OneSettings. +- **ReportId** The Update ID passed to Setup. +- **Result** The HResult of the event error. +- **ScenarioId** The update scenario ID. +- **Values** Values sent back to the device, if applicable. + + +### Setup360Telemetry.UnexpectedEvent + +This event sends data indicating that the device has invoked the unexpected event phase of the upgrade, to help keep Windows up to date. + +The following fields are available: + +- **ClientId** With Windows Update, this will be the Windows Update client ID that is passed to Setup. In Media setup, default value is Media360, but can be overwritten by the caller to a unique value. +- **FlightData** Unique value that identifies the flight. +- **HostOSBuildNumber** The build number of the previous OS. +- **HostOsSkuName** The OS edition which is running Setup360 instance (previous OS). +- **InstanceId** A unique GUID that identifies each instance of setuphost.exe +- **o-Ste** No content is currently available. +- **ReportId** With Windows Update, this is the updateID that is passed to Setup. In media setup, this is the GUID for the install.wim. +- **Setup360Extended** Detailed information about the phase/action when the potential failure occurred. +- **Setup360Mode** The phase of Setup360. Example: Predownload, Install, Finalize, Rollback. +- **Setup360Result** The result of Setup360. This is an HRESULT error code that can be used used to diagnose errors. +- **Setup360Scenario** The Setup360 flow type. Example: Boot, Media, Update, MCT. +- **SetupVersionBuildNumber** The build number of Setup360 (build number of target OS). +- **State** The exit state of a Setup360 run. Example: succeeded, failed, blocked, cancelled. +- **TestId** A string to uniquely identify a group of events. +- **WuId** This is the Windows Update Client ID. With Windows Update, this is the same as the clientId. + + +## Windows as a Service diagnostic events + +### Microsoft.Windows.WaaSMedic.SummaryEvent + +Result of the WaaSMedic operation. + +The following fields are available: + +- **callerApplication** The name of the calling application. +- **detectionSummary** Result of each applicable detection that was run. +- **featureAssessmentImpact** WaaS Assessment impact for feature updates. +- **hrEngineResult** Error code from the engine operation. +- **insufficientSessions** Device not eligible for diagnostics. +- **isInteractiveMode** The user started a run of WaaSMedic. +- **isManaged** Device is managed for updates. +- **isWUConnected** Device is connected to Windows Update. +- **noMoreActions** No more applicable diagnostics. +- **qualityAssessmentImpact** WaaS Assessment impact for quality updates. +- **remediationSummary** Result of each operation performed on a device to fix an invalid state or configuration that's preventing the device from getting updates. For example, if Windows Update service is turned off, the fix is to turn the it back on. +- **usingBackupFeatureAssessment** Relying on backup feature assessment. +- **usingBackupQualityAssessment** Relying on backup quality assessment. +- **usingCachedFeatureAssessment** WaaS Medic run did not get OS build age from the network on the previous run. +- **usingCachedQualityAssessment** WaaS Medic run did not get OS revision age from the network on the previous run. +- **versionString** Version of the WaaSMedic engine. +- **waasMedicRunMode** Indicates whether this was a background regular run of the medic or whether it was triggered by a user launching Windows Update Troubleshooter. + + +## Windows Error Reporting events + +### Microsoft.Windows.WERVertical.OSCrash + +This event sends binary data from the collected dump file wheneveer a bug check occurs, to help keep Windows up to date. The is the OneCore version of this event. + +The following fields are available: + +- **BootId** Uint32 identifying the boot number for this device. +- **BugCheckCode** Uint64 "bugcheck code" that identifies a proximate cause of the bug check. +- **BugCheckPar%meter2** No content is currently available. +- **BugCheckParameter1** Uint64 parameter providing additional information. +- **BugCheckParameter2** Uint64 parameter providing additional information. +- **BugCheckParameter3** Uint64 parameter providing additional information. +- **BugCheckParameter4** Uint64 parameter providing additional information. +- **DumpFileAttributes** Codes that identify the type of data contained in the dump file +- **DumpFileSize** Size of the dump file +- **IsValidDumpFile** True if the dump file is valid for the debugger, false otherwise +- **ReportId** WER Report Id associated with this bug check (used for finding the corresponding report archive in Watson). + + +## Windows Error Reporting MTT events + +### Microsoft.Windows.WER.MTT.Denominator + +This event provides a denominator to calculate MTTF (mean-time-to-failure) for crashes and other errors, to help keep Windows up to date. + +The following fields are available: + +- **DPRange** Maximum mean value range. +- **DPValue** Randomized bit value (0 or 1) that can be reconstituted over a large population to estimate the mean. +- **Value** Standard UTC emitted DP value structure See [Value](#value). + + +### Value + +This event returns data about Mean Time to Failure (MTTF) for Windows devices. It is the primary means of estimating reliability problems in Basic Diagnostic reporting with very strong privacy guarantees. Since Basic Diagnostic reporting does not include system up-time, and since that information is important to ensuring the safe and stable operation of Windows, the data provided by this event provides that data in a manner which does not threaten a user’s privacy. + +The following fields are available: + +- **Algorithm** The algorithm used to preserve privacy. +- **DPRange** The upper bound of the range being measured. +- **DPValue** The randomized response returned by the client. +- **Epsilon** The level of privacy to be applied. +- **HistType** The histogram type if the algorithm is a histogram algorithm. +- **PertProb** The probability the entry will be Perturbed if the algorithm chosen is “heavy-hitters”. + + +## Windows Store events + +### Microsoft.Windows.Store.StoreActivating + +This event sends tracking data about when the Store app activation via protocol URI is in progress, to help keep Windows up to date. + + + +### Microsoft.Windows.StoreAgent.Telemetry.AbortedInstallation + +This event is sent when an installation or update is canceled by a user or the system and is used to help keep Windows Apps up to date and secure. + +The following fields are available: + +- **AggregatedPackageFullNames** The names of all packages to be downloaded and installed. +- **AggregatedPackageFullNcmes** No content is currently available. +- **AttemptNumber** Number of retry attempts before it was canceled. +- **BundleId** The Item Bundle ID. +- **Bundlele** No content is currently available. +- **CategoryId** The Item Category ID. +- **Categoryle** No content is currently available. +- **ClientAppId** The identity of the app that initiated this operation. +- **ClientApple** No content is currently available. +- **HResult** The result code of the last action performed before this operation. +- **IsBundle** Is this a bundle? +- **IsInteractive** Was this requested by a user? +- **IsMandatory** Was this a mandatory update? +- **IsRemediation** Was this a remediation install? +- **IsRestore** Is this automatically restoring a previously acquired product? +- **IsUpdate** Flag indicating if this is an update. +- **ParentBundleId** The product ID of the parent (if this product is part of a bundle). +- **ParentBundlele** No content is currently available. +- **PFN** The product family name of the product being installed. +- **Producele** No content is currently available. +- **ProductId** The identity of the package or packages being installed. +- **S{stemAttemptNumber** No content is currently available. +- **SystemAttemptNumber** The total number of automatic attempts at installation before it was canceled. +- **UserAttemptNumber** The total number of user attempts at installation before it was canceled. +- **WUContentId** The Windows Update content ID. + + +### Microsoft.Windows.StoreAgent.Telemetry.BeginGetInstalledContentIds + +This event is sent when an inventory of the apps installed is started to determine whether updates for those apps are available. It's used to help keep Windows up-to-date and secure. + + + +### Microsoft.Windows.StoreAgent.Telemetry.BeginUpdateMetadataPrepare + +This event is sent when the Store Agent cache is refreshed with any available package updates. It's used to help keep Windows up-to-date and secure. + + + +### Microsoft.Windows.StoreAgent.Telemetry.CancelInstallation + +This event is sent when an app update or installation is canceled while in interactive mode. This can be canceled by the user or the system. It's used to help keep Windows up-to-date and secure. + +The following fields are available: + +- **AggregatedPackageFullNames** The names of all package or packages to be downloaded and installed. +- **AttemptNumber** Total number of installation attempts. +- **BundleId** The identity of the Windows Insider build that is associated with this product. +- **CategoryId** The identity of the package or packages being installed. +- **ClientAppId** The identity of the app that initiated this operation. +- **IsBundle** Is this a bundle? +- **IsInteractive** Was this requested by a user? +- **IsMandatory** Is this a mandatory update? +- **IsRemediation** Is this repairing a previous installation? +- **IsRestore** Is this an automatic restore of a previously acquired product? +- **IsUpdate** Is this a product update? +- **ParentBundleId** The product ID of the parent (if this product is part of a bundle). +- **PFN** The name of all packages to be downloaded and installed. +- **PreviousHResult** The previous HResult code. +- **PreviousInstallState** Previous installation state before it was canceled. +- **ProductId** The name of the package or packages requested for installation. +- **RelatedCV** Correlation Vector of a previous performed action on this product. +- **SystemAttemptNumber** Total number of automatic attempts to install before it was canceled. +- **UserAttemptNumber** Total number of user attempts to install before it was canceled. +- **WUContentId** The Windows Update content ID. + + +### Microsoft.Windows.StoreAgent.Telemetry.CompleteInstallOperationRequest + +This event is sent at the end of app installations or updates to help keep Windows up-to-date and secure. + +The following fields are available: + +- **CatalogId** The Store Product ID of the app being installed. +- **HResult** HResult code of the action being performed. +- **IsBundle** Is this a bundle? +- **PackageFamilyName** The name of the package being installed. +- **ProductId** The Store Product ID of the product being installed. +- **SkuId** Specific edition of the item being installed. + + +### Microsoft.Windows.StoreAgent.Telemetry.EndAcquireLicense + +This event is sent after the license is acquired when a product is being installed. It's used to help keep Windows up-to-date and secure. + +The following fields are available: + +- **AggregatedPackageFullNaies** No content is currently available. +- **AggregatedpackageFullNames** No content is currently available. +- **AggregatedPackageFullNames** Includes a set of package full names for each app that is part of an atomic set. +- **AttemptNumber** The total number of attempts to acquire this product. +- **CategoryId** The identity of the package or packages being installed. +- **ClientAppId** The identity of the app that initiated this operation. +- **HResult** HResult code to show the result of the operation (success/failure). +- **IsBundle** Is this a bundle? +- **IsInteractive** Did the user initiate the installation? +- **IsMandatory** Is this a mandatory update? +- **IsRemediation** Is this repairing a previous installation? +- **IsRestore** Is this happening after a device restore? +- **IsUp`ate** No content is currently available. +- **IsUpdate** Is this an update? +- **ParentBuneleId** No content is currently available. +- **PFN** Product Family Name of the product being installed. +- **productId** No content is currently available. +- **ProductId** The Store Product ID for the product being installed. +- **SystemAttemptNumber** The number of attempts by the system to acquire this product. +- **UserAttemptNumber** The number of attempts by the user to acquire this product +- **WUContentId** The Windows Update content ID. + + +### Microsoft.Windows.StoreAgent.Telemetry.EndDownload + +This event is sent after an app is downloaded to help keep Windows up-to-date and secure. + +The following fields are available: + +- **AggregatedPackageFullNaðes** No content is currently available. +- **AggregatedPackageFullNames** The name of all packages to be downloaded and installed. +- **AttemptNumber** Number of retry attempts before it was canceled. +- **BundleId** The identity of the Windows Insider build associated with this product. +- **CategoryId** The identity of the package or packages being installed. +- **ClientAppId** The identity of the app that initiated this operation. +- **DownloadSize** The total size of the download. +- **ExtendedHResult** Any extended HResult error codes. +- **HResult** The result code of the last action performed. +- **IsBundle** Is this a bundle? +- **IsInteractive** Is this initiated by the user? +- **IsMandatory** Is this a mandatory installation? +- **IsRemediation** Is this repairing a previous installation? +- **IsRestore** Is this a restore of a previously acquired product? +- **IsUpdate** Is this an update? +- **ParentBundleId** The parent bundle ID (if it's part of a bundle). +- **PFN** The Product Family Name of the app being download. +- **ProductId** The Store Product ID for the product being installed. +- **SystemAttemptNumber** The number of attempts by the system to download. +- **UserAttemptNumber** The number of attempts by the user to download. +- **WUContentId** The Windows Update content ID. + + +### Microsoft.Windows.StoreAgent.Telemetry.EndFrameworkUpdate + +This event is sent when an app update requires an updated Framework package and the process starts to download it. It is used to help keep Windows up-to-date and secure. + +The following fields are available: + +- **HResult** The result code of the last action performed before this operation. + + +### Microsoft.Windows.StoreAgent.Telemetry.EndGetInstalledContentIds + +This event is sent after sending the inventory of the products installed to determine whether updates for those products are available. It's used to help keep Windows up-to-date and secure. + +The following fields are available: + +- **HResult** The result code of the last action performed before this operation. + + +### Microsoft.Windows.StoreAgent.Telemetry.EndInstall + +This event is sent after a product has been installed to help keep Windows up-to-date and secure. + +The following fields are available: + +- **__TlgCÖ__** No content is currently available. +- **AggregatedPackageFullNames** The names of all packages to be downloaded and installed. +- **AttemptNumber** The number of retry attempts before it was canceled. +- **BundleId** The identity of the build associated with this product. +- **CategoryId** The identity of the package or packages being installed. +- **ClientAppId** The identity of the app that initiated this operation. +- **ExtendedHResult** The extended HResult error code. +- **HResult** The result code of the last action performed. +- **IsBundle** Is this a bundle? +- **IsInteractive** Is this an interactive installation? +- **IsInteragtive** No content is currently available. +- **IsMandatory** Is this a mandatory installation? +- **IsRemediation** Is this repairing a previous installation? +- **IsRestore** Is this automatically restoring a previously acquired product? +- **IsUpdate** Is this an update? +- **ParentBundleId** The product ID of the parent (if this product is part of a bundle). +- **PFN** Product Family Name of the product being installed. +- **ProductId** The Store Product ID for the product being installed. +- **SystemAttemptNumber** The total number of system attempts. +- **UserAttemptNumber** The total number of user attempts. +- **WUContentId** The Windows Update content ID. + + +### Microsoft.Windows.StoreAgent.Telemetry.EndScanForUpdates + +This event is sent after a scan for product updates to determine if there are packages to install. It's used to help keep Windows up-to-date and secure. + +The following fields are available: + +- **ClientAppId** The identity of the app that initiated this operation. +- **HResult** The result code of the last action performed. +- **IsApplicability** Is this request to only check if there are any applicable packages to install? +- **IsInteractive** Is this user requested? +- **IsOnline** Is the request doing an online check? + + +### Microsoft.Windows.StoreAgent.Telemetry.EndSearchUpdatePackages + +This event is sent after searching for update packages to install. It is used to help keep Windows up-to-date and secure. + +The following fields are available: + +- **AggregatedPackageFullNames** The names of all packages to be downloaded and installed. +- **AttemptNumber** The total number of retry attempts before it was canceled. +- **BundleId** The identity of the build associated with this product. +- **CategoryId** The identity of the package or packages being installed. +- **ClientAppId** The identity of the app that initiated this operation. +- **HResult** The result code of the last action performed. +- **IsBundle** Is this a bundle? +- **IsInteractive** Is this user requested? +- **IsMandatory** Is this a mandatory update? +- **IsRemediation** Is this repairing a previous installation? +- **IsRestore** Is this restoring previously acquired content? +- **IsUpdate** Is this an update? +- **ParentBundleId** The product ID of the parent (if this product is part of a bundle). +- **PFN** The name of the package or packages requested for install. +- **ProductId** The Store Product ID for the product being installed. +- **SystemAttemptNumber** The total number of system attempts. +- **UserAttemptNumber** The total number of user attempts. +- **WUContentId** The Windows Update content ID. + + +### Microsoft.Windows.StoreAgent.Telemetry.EndStageUserData + +This event is sent after restoring user data (if any) that needs to be restored following a product install. It is used to keep Windows up-to-date and secure. + +The following fields are available: + +- **AggregatedPackageFullNames** The name of all packages to be downloaded and installed. +- **AttemptNumber** The total number of retry attempts before it was canceled. +- **BundleId** The identity of the build associated with this product. +- **CategoryId** The identity of the package or packages being installed. +- **ClientAppId** The identity of the app that initiated this operation. +- **HResult** The result code of the last action performed. +- **IsBundle** Is this a bundle? +- **IsInteractive** Is this user requested? +- **IsMandatory** Is this a mandatory update? +- **IsRemediation** Is this repairing a previous installation? +- **IsRestore** Is this restoring previously acquired content? +- **IsUpdate** Is this an update? +- **ParentBundleId** The product ID of the parent (if this product is part of a bundle). +- **PFN** The name of the package or packages requested for install. +- **ProductId** The Store Product ID for the product being installed. +- **SystemAttemptNumber** The total number of system attempts. +- **UserAttemptNumber** The total number of system attempts. +- **WUContentId** The Windows Update content ID. + + +### Microsoft.Windows.StoreAgent.Telemetry.EndUpdateMetadataPrepare + +This event is sent after a scan for available app updates to help keep Windows up-to-date and secure. + +The following fields are available: + +- **HResult** The result code of the last action performed. + + +### Microsoft.Windows.StoreAgent.Telemetry.FulfillmentComplete + +This event is sent at the end of an app install or update to help keep Windows up-to-date and secure. + +The following fields are available: + +- **CatalogId** The name of the product catalog from which this app was chosen. +- **CatanogId** No content is currently available. +- **CatdlogId** No content is currently available. +- **FailedRetry** Indicates whether the installation or update retry was successful. +- **HResult** The HResult code of the operation. +- **JResult** No content is currently available. +- **PFN** The Package Family Name of the app that is being installed or updated. +- **Producele** No content is currently available. +- **ProductId** The product ID of the app that is being updated or installed. + + +### Microsoft.Windows.StoreAgent.Telemetry.FulfillmentInitiate + +This event is sent at the beginning of an app install or update to help keep Windows up-to-date and secure. + +The following fields are available: + +- **CatalogId** The name of the product catalog from which this app was chosen. +- **FulfillmentPluginId** The ID of the plugin needed to install the package type of the product. +- **PFN** The Package Family Name of the app that is being installed or updated. +- **PluginTelemetryData** Diagnostic information specific to the package-type plug-in. +- **ProductId** The product ID of the app that is being updated or installed. + + +### Microsoft.Windows.StoreAgent.Telemetry.InstallOperationRequest + +This event is sent when a product install or update is initiated, to help keep Windows up-to-date and secure. + +The following fields are available: + +- **BundleId** The identity of the build associated with this product. +- **CatalogId** If this product is from a private catalog, the Store Product ID for the product being installed. +- **ProductId** The Store Product ID for the product being installed. +- **SkuId** Specific edition ID being installed. +- **VolumePath** The disk path of the installation. + + +### Microsoft.Windows.StoreAgent.Telemetry.PauseInstallation + +This event is sent when a product install or update is paused (either by a user or the system), to help keep Windows up-to-date and secure. + +The following fields are available: + +- **AggregatedPackageFullNames** The names of all packages to be downloaded and installed. +- **AttemptNumber** The total number of retry attempts before it was canceled. +- **BundleId** The identity of the build associated with this product. +- **CategoryId** The identity of the package or packages being installed. +- **ClientAppId** The identity of the app that initiated this operation. +- **IsBundle** Is this a bundle? +- **IsInteractive** Is this user requested? +- **IsMandatory** Is this a mandatory update? +- **IsRemediation** Is this repairing a previous installation? +- **IsRestore** Is this restoring previously acquired content? +- **IsUpdate** Is this an update? +- **ParentBundleId** The product ID of the parent (if this product is part of a bundle). +- **PFN** The Product Full Name. +- **PreviousHResult** The result code of the last action performed before this operation. +- **PreviousInstallState** Previous state before the installation or update was paused. +- **ProductId** The Store Product ID for the product being installed. +- **RelatedCV** Correlation Vector of a previous performed action on this product. +- **SystemAttemptNumber** The total number of system attempts. +- **UserAttemptNumber** The total number of user attempts. +- **WUContentId** The Windows Update content ID. + + +### Microsoft.Windows.StoreAgent.Telemetry.ResumeInstallation + +This event is sent when a product install or update is resumed (either by a user or the system), to help keep Windows up-to-date and secure. + +The following fields are available: + +- **AggregatedPackageFullNames** The names of all packages to be downloaded and installed. +- **AttemptNumber** The number of retry attempts before it was canceled. +- **BundleId** The identity of the build associated with this product. +- **categoryId** No content is currently available. +- **CategoryId** The identity of the package or packages being installed. +- **ClientAppId** The identity of the app that initiated this operation. +- **HResult** The result code of the last action performed before this operation. +- **IsBundle** Is this a bundle? +- **IsInteractive** Is this user requested? +- **IsMandatory** Is this a mandatory update? +- **IsRemediation** Is this repairing a previous installation? +- **IsRestore** Is this restoring previously acquired content? +- **IsUpdate** Is this an update? +- **IsUserRetry** Did the user initiate the retry? +- **ParentBundleId** The product ID of the parent (if this product is part of a bundle). +- **PFN** The name of the package or packages requested for install. +- **PreviousHResult** The previous HResult error code. +- **PreviousInstallState** Previous state before the installation was paused. +- **ProductId** The Store Product ID for the product being installed. +- **RelatedCV** Correlation Vector for the original install before it was resumed. +- **ResumeClientId** The ID of the app that initiated the resume operation. +- **SystemAttemptNumber** The total number of system attempts. +- **UserAttemptNumber** The total number of user attempts. +- **WUContentId** The Windows Update content ID. + + +### Microsoft.Windows.StoreAgent.Telemetry.ResumeOperationRequest + +This event is sent when a product install or update is resumed by a user or on installation retries, to help keep Windows up-to-date and secure. + +The following fields are available: + +- **ProductId** The Store Product ID for the product being installed. + + +### Microsoft.Windows.StoreAgent.Telemetry.SearchForUpdateOperationRequest + +This event is sent when searching for update packages to install, to help keep Windows up-to-date and secure. + +The following fields are available: + +- **CatalogId** The Store Catalog ID for the product being installed. +- **ProductId** The Store Product ID for the product being installed. +- **SkuId** Specfic edition of the app being updated. + + +### Microsoft.Windows.StoreAgent.Telemetry.UpdateAppOperationRequest + +This event occurs when an update is requested for an app, to help keep Windows up-to-date and secure. + +The following fields are available: + +- **PFamN** The name of the app that is requested for update. + + +## Windows System Kit events + +### Microsoft.Windows.Kits.WSK.WskImageCreate + +This event sends simple Product and Service usage data when a user is using the Windows System Kit to create new OS “images”. The data includes the version of the Windows System Kit and the state of the event and is used to help investigate “image” creation failures. + +The following fields are available: + +- **Phase** The image creation phase. Values are “Start” or “End”. +- **WskVersion** The version of the Windows System Kit being used. + + +### Microsoft.Windows.Kits.WSK.WskImageCustomization + +This event sends simple Product and Service usage data when a user is using the Windows System Kit to create/modify configuration files allowing the customization of a new OS image with Apps or Drivers. The data includes the version of the Windows System Kit, the state of the event, the customization type (drivers or apps) and the mode (new or updating) and is used to help investigate configuration file creation failures. + +The following fields are available: + +- **CustomizationMode** Indicates the mode of the customization (new or updating). +- **CustomizationType** Indicates the type of customization (drivers or apps). +- **Mode** The mode of update to image configuration files. Values are “New” or “Update”. +- **Phase** The image creation phase. Values are “Start” or “End”. +- **Type** The type of update to image configuration files. Values are “Apps” or “Drivers”. +- **WskVersion** The version of the Windows System Kit being used. + + +### Microsoft.Windows.Kits.WSK.WskWorkspaceCreate + +This event sends simple Product and Service usage data when a user is using the Windows System Kit to create new workspace for generating OS “images”. The data includes the version of the Windows System Kit and the state of the event and is used to help investigate workspace creation failures. + +The following fields are available: + +- **Architecture** The OS architecture that the workspace will target. Values are one of: “AMD64”, “ARM64”, “x86”, or “ARM”. +- **OsEdition** The Operating System Edition that the workspace will target. +- **Phase** The image creation phase. Values are “Start” or “End”. +- **WorkspaceArchitecture** The operating system architecture that the workspace will target. +- **WorkspaceOsEdition** The operating system edition that the workspace will target. +- **WskVersion** The version of the Windows System Kit being used. + + +## Windows Update Delivery Optimization events + +### Microsoft.OSG.DU.DeliveryOptClient.DownloadCanceled + +This event describes when a download was canceled with Delivery Optimization. It's used to understand and address problems regarding downloads. + +The following fields are available: + +- **background** Is the download being done in the background? +- **bytesFromCacheServer** Bytes received from a cache host. +- **bytesFromCDN** The number of bytes received from a CDN source. +- **bytesFromGroupPeers** The number of bytes received from a peer in the same group. +- **bytesFromIntPeers** The number of bytes received from peers not in the same LAN or in the same group. +- **bytesFromLocalCache** Bytes copied over from local (on disk) cache. +- **bytesFromPeers** The number of bytes received from a peer in the same LAN. +- **cdnErrorCodes** A list of CDN connection errors since the last FailureCDNCommunication event. +- **cdnErrorCounts** The number of times each error in cdnErrorCodes was encountered. +- **cdnIp** The IP Address of the source CDN (Content Delivery Network). +- **cdnUrl** The URL of the source CDN (Content Delivery Network). +- **dataSourcesTotal** Bytes received per source type, accumulated for the whole session. +- **errorCode** The error code that was returned. +- **experimentId** When running a test, this is used to correlate events that are part of the same test. +- **fileID** The ID of the file being downloaded. +- **gCurMemoryStreamBytes** Current usage for memory streaming. +- **gMaxMemoryStreamBytes** Maximum usage for memory streaming. +- **isVpn** Indicates whether the device is connected to a VPN (Virtual Private Network). +- **jobID** Identifier for the Windows Update job. +- **predefinedCallerName** The name of the API Caller. +- **reasonCode** Reason the action or event occurred. +- **routeToCacheServer** The cache server setting, source, and value. +- **sessionID** The ID of the file download session. +- **updateID** The ID of the update being downloaded. +- **usedMemoryStream** TRUE if the download is using memory streaming for App downloads. + + +### Microsoft.OSG.DU.DeliveryOptClient.DownloadCompleted + +This event describes when a download has completed with Delivery Optimization. It's used to understand and address problems regarding downloads. + +The following fields are available: + +- **#dnErrorCounts** No content is currently available. +- **__TlgCVß_** No content is currently available. +- **|anConnectionCount** No content is currently available. +- **0redefinedCallerName** No content is currently available. +- **b6nConnectionCount** No content is currently available. +- **b6nErrorCodes** No content is currently available. +- **b6nErrorCounts** No content is currently available. +- **b6nIp** No content is currently available. +- **b6nUrl** No content is currently available. +- **background** Is the download a background download? +- **bytesFrkmIntPeers** No content is currently available. +- **bytesFromCacheSedver** No content is currently available. +- **bytesFromCacheServer** Bytes received from a cache host. +- **bytesFromCDN** The number of bytes received from a CDN source. +- **bytesFromGroupPeers** The number of bytes received from a peer in the same domain group. +- **bytesFromIntÐeers** No content is currently available. +- **bytesFromIntPeers** The number of bytes received from peers not in the same LAN or in the same domain group. +- **bytesFromLinkLocalPeers** The number of bytes received from local peers. +- **bytesFromLocalCache** Bytes copied over from local (on disk) cache. +- **bytesFromPeers** The number of bytes received from a peer in the same LAN. +- **bytesRequested** The total number of bytes requested for download. +- **cacheSarverConnectionCount** No content is currently available. +- **cacheSedverConnectionCount** No content is currently available. +- **cacheServerConndctionCount** No content is currently available. +- **cacheServerConnectionCoujt** No content is currently available. +- **cacheServerConnectionCount** Number of connections made to cache hosts. +- **cdnConnectionCount** The total number of connections made to the CDN. +- **cdnErrorCodes** A list of CDN connection errors since the last FailureCDNCommunication event. +- **cdnErrorCounts** The number of times each error in cdnErrorCodes was encountered. +- **cdnIp** The IP address of the source CDN. +- **cdnSonnectionCount** No content is currently available. +- **cdnUrl** Url of the source Content Distribution Network (CDN). +- **dataSourcesTotal** Bytes received per source type, accumulated for the whole session. +- **dkwnloadModeSrc** No content is currently available. +- **doErrorCode** The Delivery Optimization error code that was returned. +- **dowflinkBps** No content is currently available. +- **dow�loadMode** No content is currently available. +- **downlinkBps** The maximum measured available download bandwidth (in bytes per second). +- **downlinkUsageBps** The download speed (in bytes per second). +- **downloadMode** The download mode used for this file download session. +- **downloadModeReason** Reason for the download. +- **downloadModeSrc** Source of the DownloadMode setting (KvsProvider = 0, GeoProvider = 1, GeoVerProvider = 2, CpProvider = 3, DiscoveryProvider = 4, RegistryProvider = 5, GroupPolicyProvider = 6, MdmProvider = 7, SettingsProvider = 8, InvalidProviderType = 9). +- **downloadMofeSrc** No content is currently available. +- **experimentId** When running a test, this is used to correlate with other events that are part of the same test. +- **fileID** The ID of the file being downloaded. +- **fileSize** The size of the file being downloaded. +- **gCurMemoryStreamBytes** Current usage for memory streaming. +- **gMaxMemoryStreamBytes** Maximum usage for memory streaming. +- **groupConjectionCount** No content is currently available. +- **groupConnectionCount** The total number of connections made to peers in the same group. +- **internetConnectionCount** The total number of connections made to peers not in the same LAN or the same group. +- **internetConnectionCountdownlinkBps** No content is currently available. +- **isEjcrypted** No content is currently available. +- **isEncryptdd** No content is currently available. +- **isEncrypted** TRUE if the file is encrypted and will be decrypted after download. +- **isVpn** Is the device connected to a Virtual Private Network? +- **jobID** Identifier for the Windows Update job. +- **lanConnectionCount** The total number of connections made to peers in the same LAN. +- **linkLocalConnectionCount** The number of connections made to peers in the same Link-local network. +- **numPeers** The total number of peers used for this download. +- **numPeersLocal** The total number of local peers used for this download. +- **predefi.edCallerName** No content is currently available. +- **predefinedCallerName** The name of the API Caller. +- **predefinedCalleRName** No content is currently available. +- **restrictedUpload** Is the upload restricted? +- **romteToCacheServer** No content is currently available. +- **roupeToCacheServer** No content is currently available. +- **routeTnCacheServer** No content is currently available. +- **routeToCacheSedver** No content is currently available. +- **routeToCacheServer** The cache server setting, source, and value. +- **sessionID** The ID of the download session. +- **totalTimeMs** Duration of the download (in seconds). +- **updateID** The ID of the update being downloaded. +- **uplinkBps** The maximum measured available upload bandwidth (in bytes per second). +- **uplinkUsageBps** The upload speed (in bytes per second). +- **uplinkUsegeBps** No content is currently available. +- **usedMemoryStream** TRUE if the download is using memory streaming for App downloads. + + +### Microsoft.OSG.DU.DeliveryOptClient.DownloadPaused + +This event represents a temporary suspension of a download with Delivery Optimization. It's used to understand and address problems regarding downloads. + +The following fields are available: + +- **backgground** No content is currently available. +- **backgrou|d** No content is currently available. +- **background** Is the download a background download? +- **c`nUrl** No content is currently available. +- **cdnUrl** The URL of the source CDN (Content Delivery Network). +- **errorBode** No content is currently available. +- **errorCode** The error code that was returned. +- **expebimentId** No content is currently available. +- **expebimentIderrorCode** No content is currently available. +- **experiientId** No content is currently available. +- **experimenpId** No content is currently available. +- **experimentId** When running a test, this is used to correlate with other events that are part of the same test. +- **fileID** The ID of the file being paused. +- **isVp|** No content is currently available. +- **isVpn** Is the device connected to a Virtual Private Network? +- **jobID** Identifier for the Windows Update job. +- **predefinedCallerName** The name of the API Caller object. +- **reasonCod%** No content is currently available. +- **reasonCode** The reason for pausing the download. +- **recsonCodesessiolID** No content is currently available. +- **routeToCacheSedver** No content is currently available. +- **routeToCacheServer** The cache server setting, source, and value. +- **sessionID** The ID of the download session. +- **updateID** The ID of the update being paused. +- **updateMD** No content is currently available. + + +### Microsoft.OSG.DU.DeliveryOptClient.DownloadStarted + +This event sends data describing the start of a new download to enable Delivery Optimization. It's used to understand and address problems regarding downloads. + +The following fields are available: + +- **b6nUrl** No content is currently available. +- **background** Indicates whether the download is happening in the background. +- **bacoground** No content is currently available. +- **bileSizeCaller** No content is currently available. +- **bytesRequested** Number of bytes requested for the download. +- **cdnUrl** The URL of the source Content Distribution Network (CDN). +- **costFlags** A set of flags representing network cost. +- **costFlaos** No content is currently available. +- **deviceProfile** Identifies the usage or form factor (such as Desktop, Xbox, or VM). +- **diceRoll** Random number used for determining if a client will use peering. +- **doClientVersion** The version of the Delivery Optimization client. +- **doErrorC/de** No content is currently available. +- **doErrorCode** The Delivery Optimization error code that was returned. +- **downloadMode** The download mode used for this file download session (CdnOnly = 0, Lan = 1, Group = 2, Internet = 3, Simple = 99, Bypass = 100). +- **downloadModeReason** Reason for the download. +- **downloadModeSrc** Source of the DownloadMode setting (KvsProvider = 0, GeoProvider = 1, GeoVerProvider = 2, CpProvider = 3, DiscoveryProvider = 4, RegistryProvider = 5, GroupPolicyProvider = 6, MdmProvider = 7, SettingsProvider = 8, InvalidProviderType = 9). +- **errorCode** The error code that was returned. +- **experimejtId** No content is currently available. +- **experimen�Id** No content is currently available. +- **experimentId** ID used to correlate client/services calls that are part of the same test during A/B testing. +- **fiheID** No content is currently available. +- **fileID** The ID of the file being downloaded. +- **filePat(** No content is currently available. +- **filePath** The path to where the downloaded file will be written. +- **fileSize** Total file size of the file that was downloaded. +- **fileSizeCaller** Value for total file size provided by our caller. +- **groqpID** No content is currently available. +- **groupID** ID for the group. +- **isEncrypted** Indicates whether the download is encrypted. +- **isFpn** No content is currently available. +- **isVpn** Indicates whether the device is connected to a Virtual Private Network. +- **jobID** The ID of the Windows Update job. +- **peerID** The ID for this delivery optimization client. +- **predefinedCallerName** Name of the API caller. +- **rimentId** No content is currently available. +- **routeToCacheSedver** No content is currently available. +- **routeToCacheServer** Cache server setting, source, and value. +- **sessionID** The ID for the file download session. +- **sessmonID** No content is currently available. +- **setConfigs** A JSON representation of the configurations that have been set, and their sources. +- **updateID** The ID of the update being downloaded. +- **updateYD** No content is currently available. +- **usedMemoryStream** Indicates whether the download used memory streaming. + + +### Microsoft.OSG.DU.DeliveryOptClient.FailureCdnCommunication + +This event represents a failure to download from a CDN with Delivery Optimization. It's used to understand and address problems regarding downloads. + +The following fields are available: + +- **`esponseAize** No content is currently available. +- **cdnHeaders** The HTTP headers returned by the CDN. +- **cdnIp** The IP address of the CDN. +- **cdnUrl** The URL of the CDN. +- **eErrorCode** No content is currently available. +- **eErrorCunt** No content is currently available. +- **errorCode** The error code that was returned. +- **errorCode‡httpStatusCodw** No content is currently available. +- **errorCode‡httpSvatusCodw** No content is currently available. +- **errorCount** The total number of times this error code was seen since the last FailureCdnCommunication event was encountered. +- **errorSount** No content is currently available. +- **experimentId** When running a test, this is used to correlate with other events that are part of the same test. +- **f{leID** No content is currently available. +- **fileID** The ID of the file being downloaded. +- **fkleID** No content is currently available. +- **htppStatusCode** No content is currently available. +- **httpStatusCode** The HTTP status code returned by the CDN. +- **isHeadRequest** The type of HTTP request that was sent to the CDN. Example: HEAD or GET +- **peerType** The type of peer (LAN, Group, Internet, CDN, Cache Host, etc.). +- **requestOffset** The byte offset within the file in the sent request. +- **requestSize** The size of the range requested from the CDN. +- **responseSize** The size of the range response received from the CDN. +- **sessionID** The ID of the download session. +- **swssionIDcdnUrl** No content is currently available. + + +### Microsoft.OSG.DU.DeliveryOptClient.JobError + +This event represents a Windows Update job error. It allows for investigation of top errors. + +The following fields are available: + +- **cdnIp** The IP Address of the source CDN (Content Delivery Network). +- **doErrorCode** Error code returned for delivery optimization. +- **errorCode** The error code returned. +- **experimentId** When running a test, this is used to correlate with other events that are part of the same test. +- **fileID** The ID of the file being downloaded. +- **jobID** The Windows Update job ID. + + +## Windows Update events + +### Microsoft.Windows.Update.DeviceUpdateAgent.UpdateAgentAnalysisSummary + +This event collects information regarding the state of devices and drivers on the system following a reboot after the install phase of the new device manifest UUP (Unified Update Platform) update scenario which is used to install a device manifest describing a set of driver packages. + +The following fields are available: + +- **activated** Whether the entire device manifest update is considered activated and in use. +- **analysisErrorCount** The number of driver packages that could not be analyzed because errors occurred during analysis. +- **flightId** Unique ID for each flight. +- **missingDriverCount** The number of driver packages delivered by the device manifest that are missing from the system. +- **missingUpdateCount** The number of updates in the device manifest that are missing from the system. +- **objectId** Unique value for each diagnostics session. +- **publishedCount** The number of drivers packages delivered by the device manifest that are published and available to be used on devices. +- **relatedCV** Correlation vector value generated from the latest USO scan. +- **scenarioId** Indicates the update scenario. +- **sessionId** Unique value for each update session. +- **summary** A summary string that contains basic information about driver packages that are part of the device manifest and any devices on the system that those driver packages match. +- **summaryAppendError** A Boolean indicating if there was an error appending more information to the summary string. +- **truncatedDeviceCount** The number of devices missing from the summary string because there is not enough room in the string. +- **truncatedDriverCount** The number of driver packages missing from the summary string because there is not enough room in the string. +- **unpublishedCount** How many drivers packages that were delivered by the device manifest that are still unpublished and unavailable to be used on devices. +- **updateId** The unique ID for each update. + + +### Microsoft.Windows.Update.DeviceUpdateAgent.UpdateAgentCommit + +This event collects information regarding the final commit phase of the new device manifest UUP (Unified Update Platform) update scenario, which is used to install a device manifest describing a set of driver packages. + +The following fields are available: + +- **errorCode** The error code returned for the current session initialization. +- **flightId** The unique identifier for each flight. +- **objectId** The unique GUID for each diagnostics session. +- **relatedCV** A correlation vector value generated from the latest USO scan. +- **result** Outcome of the initialization of the session. +- **scenarioId** Identifies the Update scenario. +- **sessionId** The unique value for each update session. +- **updateId** The unique identifier for each Update. + + +### Microsoft.Windows.Update.DeviceUpdateAgent.UpdateAgentDownloadRequest + +This event collects information regarding the download request phase of the new device manifest UUP (Unified Update Platform) update scenario, which is used to install a device manifest describing a set of driver packages. + +The following fields are available: + +- **deletedCorruptFiles** Indicates if UpdateAgent found any corrupt payload files and whether the payload was deleted. +- **errorCode** The error code returned for the current session initialization. +- **flightId** The unique identifier for each flight. +- **objectId** Unique value for each Update Agent mode. +- **packageCountOptional** Number of optional packages requested. +- **packageCountRequired** Number of required packages requested. +- **packageCountTotal** Total number of packages needed. +- **packageCountTotalCanonical** Total number of canonical packages. +- **packageCountTotalDiff** Total number of diff packages. +- **packageCountTotalExpress** Total number of express packages. +- **packageSizeCanonical** Size of canonical packages in bytes. +- **packageSizeDiff** Size of diff packages in bytes. +- **packageSizeExpress** Size of express packages in bytes. +- **rangeRequestState** Represents the state of the download range request. +- **relatedCV** Correlation vector value generated from the latest USO scan. +- **result** Result of the download request phase of update. +- **scenarioId** The scenario ID. Example: MobileUpdate, DesktopLanguagePack, DesktopFeatureOnDemand, or DesktopDriverUpdate. +- **sessionId** Unique value for each Update Agent mode attempt. +- **updateId** Unique ID for each update. + + +### Microsoft.Windows.Update.DeviceUpdateAgent.UpdateAgentInitialize + +This event sends data for initializing a new update session for the new device manifest UUP (Unified Update Platform) update scenario, which is used to install a device manifest describing a set of driver packages. + +The following fields are available: + +- **errorCode** The error code returned for the current session initialization. +- **flightId** The unique identifier for each flight. +- **flightMetadata** Contains the FlightId and the build being flighted. +- **objectId** Unique value for each Update Agent mode. +- **relatedCV** Correlation vector value generated from the latest USO scan. +- **result** Result of the initialize phase of the update. 0 = Succeeded, 1 = Failed, 2 = Cancelled, 3 = Blocked, 4 = BlockCancelled. +- **scenarioId** The scenario ID. Example: MobileUpdate, DesktopLanguagePack, DesktopFeatureOnDemand, or DesktopDriverUpdate. +- **sessionData** Contains instructions to update agent for processing FODs and DUICs (Null for other scenarios). +- **sessionId** Unique value for each Update Agent mode attempt. +- **updateId** Unique ID for each update. + + +### Microsoft.Windows.Update.DeviceUpdateAgent.UpdateAgentInstall + +This event collects information regarding the install phase of the new device manifest UUP (Unified Update Platform) update scenario, which is used to install a device manifest describing a set of driver packages. + +The following fields are available: + +- **errorCode** The error code returned for the current install phase. +- **flightId** The unique identifier for each flight (pre-release builds). +- **objectId** The unique identifier for each diagnostics session. +- **relatedCV** Correlation vector value generated from the latest scan. +- **result** Outcome of the install phase of the update. +- **scenarioId** The scenario ID. Example: MobileUpdate, DesktopLanguagePack, DesktopFeatureOnDemand, or DesktopDriverUpdate +- **sessionId** The unique identifier for each update session. +- **updateId** The unique identifier for each Update. + + +### Microsoft.Windows.Update.DeviceUpdateAgent.UpdateAgentModeStart + +This event sends data for the start of each mode during the process of updating device manifest assets via the UUP (Unified Update Platform) update scenario, which is used to install a device manifest describing a set of driver packages. + +The following fields are available: + +- **flightId** The unique identifier for each flight (pre-release builds). +- **mode** Indicates the active Update Agent mode. +- **objectId** Unique value for each diagnostics session. +- **relatedCV** Correlation vector value generated from the latest scan. +- **scenarioId** The scenario ID. Example: MobileUpdate, DesktopLanguagePack, DesktopFeatureOnDemand, or DesktopDriverUpdate. +- **sessionId** The unique identifier for each update session. +- **updateId** The unique identifier for each Update. + + +### Microsoft.Windows.Update.NotificationUx.DialogNotificationToBeDisplayed + +This event indicates that a notification dialog box is about to be displayed to user. + +The following fields are available: + +- **AcceptAutoModeLimit** The maximum number of days for a device to automatically enter Auto Reboot mode. +- **AutoToAutoFailedLimit** The maximum number of days for Auto Reboot mode to fail before the RebootFailed dialog box is shown. +- **DaysSinceRebootRequired** Number of days since restart was required. +- **DeviceLocalTime** The local time on the device sending the event. +- **EngagedModeLimit** The number of days to switch between DTE dialog boxes. +- **EnterAutoModeLimit** The maximum number of days for a device to enter Auto Reboot mode. +- **ETag** OneSettings versioning value. +- **IsForcedEnabled** Indicates whether Forced Reboot mode is enabled for this device. +- **IsUltimateForcedEnabled** Indicates whether Ultimate Forced Reboot mode is enabled for this device. +- **NotificationUxState** Indicates which dialog box is shown. +- **NotificationUxStateString** Indicates which dialog box is shown. +- **RebootUxState** Indicates the state of the restart (Engaged, Auto, Forced, or UltimateForced). +- **RebootUxStateString** Indicates the state of the restart (Engaged, Auto, Forced, or UltimateForced). +- **RebootVersion** Version of DTE. +- **SkipToAutoModeLimit** The minimum length of time to pass in restart pending before a device can be put into auto mode. +- **UpdateId** The ID of the update that is pending restart to finish installation. +- **UpdateRevision** The revision of the update that is pending restart to finish installation. +- **UtcTime** The time the dialog box notification will be displayed, in Coordinated Universal Time. + + +### Microsoft.Windows.Update.NotificationUx.EnhancedEngagedRebootAcceptAutoDialog + +This event indicates that the Enhanced Engaged restart "accept automatically" dialog box was displayed. + +The following fields are available: + +- **DeviceLocalTime** The local time on the device sending the event. +- **ETag** OneSettings versioning value. +- **ExitCode** Indicates how users exited the dialog box. +- **RebootVersion** Version of DTE. +- **UpdateId** The ID of the update that is pending restart to finish installation. +- **UpdateRevision** The revision of the update that is pending restart to finish installation. +- **UserResponseString** The option that user chose on this dialog box. +- **UtcTime** The time that the dialog box was displayed, in Coordinated Universal Time. + + +### Microsoft.Windows.Update.NotificationUx.EnhancedEngagedRebootFirstReminderDialog + +This event indicates that the Enhanced Engaged restart "first reminder" dialog box was displayed.. + +The following fields are available: + +- **DeviceLocalTime** The local time on the device sending the event. +- **ETag** OneSettings versioning value. +- **ExitCode** Indicates how users exited the dialog box. +- **RebootVersion** Version of DTE. +- **UpdateId** The ID of the update that is pending restart to finish installation. +- **UpdateRevision** The revision of the update that is pending restart to finish installation. +- **UserResponseString** The option that user chose in this dialog box. +- **UtcTime** The time that the dialog box was displayed, in Coordinated Universal Time. + + +### Microsoft.Windows.Update.NotificationUx.EnhancedEngagedRebootRebootFailedDialog + +This event indicates that the Enhanced Engaged restart "restart failed" dialog box was displayed. + +The following fields are available: + +- **DeviceLocalTime** The local time of the device sending the event. +- **ETag** OneSettings versioning value. +- **ExitCode** Indicates how users exited the dialog box. +- **RebootVersion** Version of DTE. +- **UpdateId** The ID of the update that is pending restart to finish installation. +- **UpdateRevision** The revision of the update that is pending restart to finish installation. +- **UserResponseString** The option that the user chose in this dialog box. +- **UtcTime** The time that the dialog box was displayed, in Coordinated Universal Time. + + +### Microsoft.Windows.Update.NotificationUx.EnhancedEngagedRebootRebootImminentDialog + +This event indicates that the Enhanced Engaged restart "restart imminent" dialog box was displayed. + +The following fields are available: + +- **DeviceLocalTime** Time the dialog box was shown on the local device. +- **ETag** OneSettings versioning value. +- **ExitCode** Indicates how users exited the dialog box. +- **RebootVersion** Version of DTE. +- **UpdateId** The ID of the update that is pending restart to finish installation. +- **UpdateRevision** The revision of the update that is pending restart to finish installation. +- **UserResponseString** The option that user chose in this dialog box. +- **UtcTime** The time that dialog box was displayed, in Coordinated Universal Time. + + +### Microsoft.Windows.Update.NotificationUx.EnhancedEngagedRebootReminderDialog + +This event returns information relating to the Enhanced Engaged reboot reminder dialog that was displayed. + +The following fields are available: + +- **DeviceLocalTime** The time at which the reboot reminder dialog was shown (based on the local device time settings). +- **ETag** The OneSettings versioning value. +- **ExitCode** Indicates how users exited the reboot reminder dialog box. +- **RebootVersion** The version of the DTE (Direct-to-Engaged). +- **UpdateId** The ID of the update that is waiting for reboot to finish installation. +- **UpdateRevision** The revision of the update that is waiting for reboot to finish installation. +- **UserResponseString** The option chosen by the user on the reboot dialog box. +- **UtcTime** The time at which the reboot reminder dialog was shown (in UTC). + + +### Microsoft.Windows.Update.NotificationUx.EnhancedEngagedRebootReminderToast + +This event indicates that the Enhanced Engaged restart reminder pop-up banner was displayed. + +The following fields are available: + +- **DeviceLocalTime** The local time on the device sending the event. +- **ETag** OneSettings versioning value. +- **ExitCode** Indicates how users exited the pop-up banner. +- **RebootVersion** The version of the reboot logic. +- **UpdateId** The ID of the update that is pending restart to finish installation. +- **UpdateRevision** The revision of the update that is pending restart to finish installation. +- **UserResponseString** The option that the user chose in the pop-up banner. +- **UtcTime** The time that the pop-up banner was displayed, in Coordinated Universal Time. + + +### Microsoft.Windows.Update.NotificationUx.RebootScheduled + +Indicates when a reboot is scheduled by the system or a user for a security, quality, or feature update. + +The following fields are available: + +- **activeHoursApplicable** Indicates whether an Active Hours policy is present on the device. +- **IsEnhancedEngagedReboot** Indicates whether this is an Enhanced Engaged reboot. +- **rebootArgument** Argument for the reboot task. It also represents specific reboot related action. +- **rebootOutsideOfActiveHours** Indicates whether a restart is scheduled outside of active hours. +- **rebootScheduledByUser** Indicates whether the restart was scheduled by user (if not, it was scheduled automatically). +- **rebootState** The current state of the restart. +- **rebootUsingSmartScheduler** Indicates whether the reboot is scheduled by smart scheduler. +- **revisionNumber** Revision number of the update that is getting installed with this restart. +- **scheduledRebootTime** Time of the scheduled restart. +- **scheduledRebootTimeInUTC** Time of the scheduled restart in Coordinated Universal Time. +- **updateId** ID of the update that is getting installed with this restart. +- **wuDeviceid** Unique device ID used by Windows Update. + + +### Microsoft.Windows.Update.Orchestrator.ActivityRestrictedByActiveHoursPolicy + +This event indicates a policy is present that may restrict update activity to outside of active hours. + +The following fields are available: + +- **activeHoursEnd** The end of the active hours window. +- **activeHoursStart** The start of the active hours window. +- **wuDeviceid** Unique device ID used by Windows Update. + + +### Microsoft.Windows.Update.Orchestrator.BlockedByActiveHours + +This event indicates that update activity was blocked because it is within the active hours window. + +The following fields are available: + +- **activeHoursEnd** The end of the active hours window. +- **activeHoursStart** The start of the active hours window. +- **updatePhase** The current state of the update process. +- **wuDeviceid** Unique device ID used by Windows Update. + + +### Microsoft.Windows.Update.Orchestrator.BlockedByBatteryLevel + +This event indicates that Windows Update activity was blocked due to low battery level. + +The following fields are available: + +- **batteryLevel** The current battery charge capacity. +- **batteryLevelThreshold** The battery capacity threshold to stop update activity. +- **updatePhase** The current state of the update process. +- **wuDeviceid** Device ID. + + +### Microsoft.Windows.Update.Orchestrator.DeferRestart + +This event indicates that a restart required for installing updates was postponed. + +The following fields are available: + +- **displayNeededReason** List of reasons for needing display. +- **eventScenario** Indicates the purpose of the event (scan started, succeeded, failed, etc.). +- **filteredDeferReason** Applicable filtered reasons why reboot was postponed (such as user active, or low battery). +- **gameModeReason** Name of the executable that caused the game mode state check to start. +- **ignoredReason** List of reasons that were intentionally ignored. +- **IgnoreReasonsForRestart** List of reasons why restart was deferred. +- **revisionNumber** Update ID revision number. +- **systemNeededReason** List of reasons why system is needed. +- **updateId** Update ID. +- **updateScenarioType** Update session type. +- **wuDeviceid** Unique device ID used by Windows Update. + + +### Microsoft.Windows.Update.Orchestrator.Detection + +This event indicates that a scan for a Windows Update occurred. + +The following fields are available: + +- **deferReason** The reason why the device could not check for updates. +- **detectionBlockingPolicy** The Policy that blocked detection. +- **detectionBlockreason** The reason detection did not complete. +- **detectionRetryMode** Indicates whether we will try to scan again. +- **errorCode** The error code returned for the current process. +- **eventScenario** End-to-end update session ID, or indicates the purpose of sending this event - whether because the software distribution just started installing content, or whether it was cancelled, succeeded, or failed. +- **flightID** The unique identifier for the flight (Windows Insider pre-release build) should be delivered to the device, if applicable. +- **interactive** Indicates whether the user initiated the session. +- **networkStatus** Indicates if the device is connected to the internet. +- **revisionNumber** The Update revision number. +- **scanTriggerSource** The source of the triggered scan. +- **updateId** The unique identifier of the Update. +- **updateScenarioType** Identifies the type of update session being performed. +- **wuDeviceid** The unique device ID used by Windows Update. + + +### Microsoft.Windows.Update.Orchestrator.DisplayNeeded + +This event indicates the reboot was postponed due to needing a display. + +The following fields are available: + +- **displayNeededReason** Reason the display is needed. +- **eventScenario** Indicates the purpose of sending this event - whether because the software distribution just started checking for content, or whether it was cancelled, succeeded, or failed. +- **rebootOutsideOfActiveHours** Indicates whether the reboot was to occur outside of active hours. +- **revisionNumber** Revision number of the update. +- **updateId** Update ID. +- **updateScenarioType** The update session type. +- **uxRebootstate** Indicates the exact state of the user experience at the time the required reboot was initiated. +- **wuDeviceid** The unique identifier of a specific device, used to identify how many devices are encountering success or a particular issue + + +### Microsoft.Windows.Update.Orchestrator.Download + +This event sends launch data for a Windows Update download to help keep Windows up to date. + +The following fields are available: + +- **deferReason** Reason for download not completing. +- **e:4|SScenario** No content is currently available. +- **errorCode** An error code represented as a hexadecimal value. +- **eventScenario** End-to-end update session ID. +- **flightID** The specific ID of the Windows Insider build the device is getting. +- **interactive** Indicates whether the session is user initiated. +- **interactiveelatedCVerrorCode** No content is currently available. +- **revisionNumber** Update revision number. +- **updateId** Update ID. +- **updateScenariotate** No content is currently available. +- **updateScenarioType** The update session type. +- **wuDeviceid** Unique device ID used by Windows Update. + + +### Microsoft.Windows.Update.Orchestrator.DTUCompletedWhenWuFlightPendingCommit + +This event indicates that DTU completed installation of the electronic software delivery (ESD), when Windows Update was already in Pending Commit phase of the feature update. + +The following fields are available: + +- **wuDeviceid** Device ID used by Windows Update. + + +### Microsoft.Windows.Update.Orchestrator.DTUEnabled + +This event indicates that Inbox DTU functionality was enabled. + +The following fields are available: + +- **wuDeviceid** Device ID used by Windows Update. + + +### Microsoft.Windows.Update.Orchestrator.DTUInitiated + +This event indicates that Inbox DTU functionality was intiated. + +The following fields are available: + +- **dtuErrorCode** Return code from creating the DTU Com Server. +- **isDtuApplicable** Determination of whether DTU is applicable to the machine it is running on. +- **wuDeviceid** Device ID used by Windows Update. + + +### Microsoft.Windows.Update.Orchestrator.EscalationRiskLevels + +This event is sent during update scan, download, or install, and indicates that the device is at risk of being out-of-date. + +The following fields are available: + +- **configVersion** The escalation configuration version on the device. +- **downloadElapsedTime** Indicates how long since the download is required on device. +- **downloadRiskLevel** At-risk level of download phase. +- **installElapsedTime** Indicates how long since the install is required on device. +- **installRiskLevel** The at-risk level of install phase. +- **isSediment** Assessment of whether is device is at risk. +- **scanElapsedTime** Indicates how long since the scan is required on device. +- **scanRiskLevel** At-risk level of the scan phase. +- **wuDeviceid** Device ID used by Windows Update. + + +### Microsoft.Windows.Update.Orchestrator.FailedToAddTimeTriggerToScanTask + +This event indicated that USO failed to add a trigger time to a task. + +The following fields are available: + +- **errorCode** The Windows Update error code. +- **wuDeviceid** The Windows Update device ID. + + +### Microsoft.Windows.Update.Orchestrator.FlightInapplicable + +This event indicates that the update is no longer applicable to this device. + +The following fields are available: + +- **EventPublishedTime** Time when this event was generated. +- **flightID** The specific ID of the Windows Insider build. +- **inapplicableReason** The reason why the update is inapplicable. +- **revisionNumber** Update revision number. +- **updateId** Unique Windows Update ID. +- **updateScenarioType** Update session type. +- **UpdateStatus** Last status of update. +- **UUPFallBackConfigured** Indicates whether UUP fallback is configured. +- **wuDeviceid** Unique Device ID. + + +### Microsoft.Windows.Update.Orchestrator.InitiatingReboot + +This event sends data about an Orchestrator requesting a reboot from power management to help keep Windows up to date. + +The following fields are available: + +- **EventPublishedTime** Time of the event. +- **flightID** Unique update ID +- **interactive** Indicates whether the reboot initiation stage of the update process was entered as a result of user action. +- **rebootOutsideOfActiveHours** Indicates whether the reboot was to occur outside of active hours. +- **revisionNumber** Revision number of the update. +- **updateId** Update ID. +- **updateScenarioType** The update session type. +- **uxRebootstate** Indicates the exact state of the user experience at the time the required reboot was initiated. +- **wuDeviceid** Unique device ID used by Windows Update. + + +### Microsoft.Windows.Update.Orchestrator.Install + +This event sends launch data for a Windows Update install to help keep Windows up to date. + +The following fields are available: + +- **batteryLevel** Current battery capacity in mWh or percentage left. +- **defeec-9-0S** No content is currently available. +- **deferReason** Reason for install not completing. +- **errorCode** The error code reppresented by a hexadecimal value. +- **eventScenario** End-to-end update session ID. +- **flightID** The ID of the Windows Insider build the device is getting. +- **flightUpdate** Indicates whether the update is a Windows Insider build. +- **ForcedRebootReminderSet** A boolean value that indicates if a forced reboot will happen for updates. +- **Ignorec-9-0SsFoec-start** No content is currently available. +- **IgnoreReasonsForRestart** The reason(s) a Postpone Restart command was ignored. +- **installCommitfailedtime** The time it took for a reboot to happen but the upgrade failed to progress. +- **installRebootinitiatetime** The time it took for a reboot to be attempted. +- **interactive** Identifies if session is user initiated. +- **minutesToCommit** The time it took to install updates. +- **rebootOutsideOfActiveHours** Indicates whether a reboot is scheduled outside of active hours. +- **revisionNumber** Update revision number. +- **updateId** Update ID. +- **updateMd** No content is currently available. +- **updateScenarioType** The update session type. +- **uxRebootstate** Indicates the exact state of the user experience at the time the required reboot was initiated to ensure the correct update process and experience is provided to keep Windows up to date. +- **wuDeviceid** Unique device ID used by Windows Update. + + +### Microsoft.Windows.Update.Orchestrator.LowUptimes + +This event is sent if a device is identified as not having sufficient uptime to reliably process updates in order to keep secure. + +The following fields are available: + +- **availableHistoryMinutes** The number of minutes available from the local machine activity history. +- **isLowUptimeMachine** Is the machine considered low uptime or not. +- **lowUptimeMinHours** Current setting for the minimum number of hours needed to not be considered low uptime. +- **lowUptimeQueryDays** Current setting for the number of recent days to check for uptime. +- **uptimeMinutes** Number of minutes of uptime measured. +- **wuDeviceid** Unique device ID for Windows Update. + + +### Microsoft.Windows.Update.Orchestrator.OneshotUpdateDetection + +This event returns data about scans initiated through settings UI, or background scans that are urgent; to help keep Windows up to date. + +The following fields are available: + +- **externalOneshotupdate** The last time a task-triggered scan was completed. +- **interactiveOneshotupdate** The last time an interactive scan was completed. +- **oldlastscanOneshotupdate** The last time a scan completed successfully. +- **wuDeviceid** The Windows Update Device GUID (Globally-Unique ID). + + +### Microsoft.Windows.Update.Orchestrator.PreShutdownStart + +This event is generated before the shutdown and commit operations. + +The following fields are available: + +- **wuDeviceid** The unique identifier of a specific device, used to identify how many devices are encountering success or a particular issue. + + +### Microsoft.Windows.Update.Orchestrator.RebootFailed + +This event sends information about whether an update required a reboot and reasons for failure, to help keep Windows up to date. + +The following fields are available: + +- **batteryLevel** Current battery capacity in mWh or percentage left. +- **deferReason** Reason for install not completing. +- **EventPublishedTime** The time that the reboot failure occurred. +- **flightID** Unique update ID. +- **rebootOutsideOfActiveHours** Indicates whether a reboot was scheduled outside of active hours. +- **RebootResults** Hex code indicating failure reason. Typically, we expect this to be a specific USO generated hex code. +- **revisionNumber** Update revision number. +- **updateId** Update ID. +- **updateScenarioType** The update session type. +- **uxRebootstate** Indicates the exact state of the user experience at the time the required reboot was initiated to ensure the correct update process and experience is provided to keep Windows up to date. +- **wuDeviceid** Unique device ID used by Windows Update. + + +### Microsoft.Windows.Update.Orchestrator.RefreshSettings + +This event sends basic data about the version of upgrade settings applied to the system to help keep Windows up to date. + +The following fields are available: + +- **errorCode** Hex code for the error message, to allow lookup of the specific error. +- **settingsDownloadTime** Timestamp of the last attempt to acquire settings. +- **settingsETag** Version identifier for the settings. +- **wuDeviceid** Unique device ID used by Windows Update. + + +### Microsoft.Windows.Update.Orchestrator.RestoreRebootTask + +This event sends data indicating that a reboot task is missing unexpectedly on a device and the task is restored because a reboot is still required, to help keep Windows up to date. + +The following fields are available: + +- **RebootTaskMissedTimeUTC** The time when the reboot task was scheduled to run, but did not. +- **RebootTaskNextTimeUTC** The time when the reboot task was rescheduled for. +- **RebootTaskRestoredTime** Time at which this reboot task was restored. +- **wuDeviceid** Device ID for the device on which the reboot is restored. + + +### Microsoft.Windows.Update.Orchestrator.ScanTriggered + +This event indicates that Update Orchestrator has started a scan operation. + +The following fields are available: + +- **errorCode** The error code returned for the current scan operation. +- **eventScenario** Indicates the purpose of sending this event. +- **interactive** Indicates whether the scan is interactive. +- **isDTUEnabled** Indicates whether DTU (internal abbreviation for Direct Feature Update) channel is enabled on the client system. +- **isScanPastSla** Indicates whether the SLA has elapsed for scanning. +- **isScanPastTriggerSla** Indicates whether the SLA has elapsed for triggering a scan. +- **minutesOverScanSla** Indicates how many minutes the scan exceeded the scan SLA. +- **minutesOverScanTriggerSla** Indicates how many minutes the scan exceeded the scan trigger SLA. +- **scanTriggerSource** Indicates what caused the scan. +- **updateScenarioType** The update session type. +- **wuDeviceid** Unique device ID used by Windows Update. + + +### Microsoft.Windows.Update.Orchestrator.StickUpdate + +This event is sent when the update service orchestrator (USO) indicates the update cannot be superseded by a newer update. + +The following fields are available: + +- **updateId** Identifier associated with the specific piece of content. +- **wuDeviceid** Unique device ID controlled by the software distribution client. + + +### Microsoft.Windows.Update.Orchestrator.SystemNeeded + +This event sends data about why a device is unable to reboot, to help keep Windows up to date. + +The following fields are available: + +- **eventScenario** End-to-end update session ID. +- **rebootOutsideOfActiveHours** Indicates whether a reboot is scheduled outside of active hours. +- **revisionNumber** Update revision number. +- **systemNeededReason** List of apps or tasks that are preventing the system from restarting. +- **updateId** Update ID. +- **updateScenarioType** The update session type. +- **uxRebootstate** Indicates the exact state of the user experience at the time the required reboot was initiated to ensure the correct update process and experience is provided to keep Windows up to date. +- **wuDeviceid** Unique device ID used by Windows Update. + + +### Microsoft.Windows.Update.Orchestrator.TerminatedByActiveHours + +This event indicates that update activity was stopped due to active hours starting. + +The following fields are available: + +- **activeHoursEnd** The end of the active hours window. +- **activeHoursStart** The start of the active hours window. +- **updatePhase** The current state of the update process. +- **wuDeviceid** The device identifier. + + +### Microsoft.Windows.Update.Orchestrator.TerminatedByBatteryLevel + +This event is sent when update activity was stopped due to a low battery level. + +The following fields are available: + +- **batteryLevel** The current battery charge capacity. +- **batteryLevelThreshold** The battery capacity threshold to stop update activity. +- **updatePhase** The current state of the update process. +- **wuDeviceid** The device identifier. + + +### Microsoft.Windows.Update.Orchestrator.UnstickUpdate + +This event is sent when the update service orchestrator (USO) indicates that the update can be superseded by a newer update. + +The following fields are available: + +- **updateId** Identifier associated with the specific piece of content. +- **wuDeviceid** Unique device ID controlled by the software distribution client. + + +### Microsoft.Windows.Update.Orchestrator.UpdatePolicyCacheRefresh + +This event sends data on whether Update Management Policies were enabled on a device, to help keep Windows up to date. + +The following fields are available: + +- **configuredPoliciescount** Number of policies on the device. +- **policiesNamevaluesource** Policy name and source of policy (group policy, MDM or flight). +- **policyCacherefreshtime** Time when policy cache was refreshed. +- **updateInstalluxsetting** Indicates whether a user has set policies via a user experience option. +- **wuDeviceid** Unique device ID used by Windows Update. + + +### Microsoft.Windows.Update.Orchestrator.UpdateRebootRequired + +This event sends data about whether an update required a reboot to help keep Windows up to date. + +The following fields are available: + +- **flightID** The specific ID of the Windows Insider build the device is getting. +- **interactive** Indicates whether the reboot initiation stage of the update process was entered as a result of user action. +- **revisionNumber** Update revision number. +- **updateId** Update ID. +- **updateScenarioType** The update session type. +- **uxRebootstate** Indicates the exact state of the user experience at the time the required reboot was initiated to ensure the correct update process and experience is provided to keep Windows up to date. +- **wuDeviceid** Unique device ID used by Windows Update. + + +### Microsoft.Windows.Update.Orchestrator.updateSettingsFlushFailed + +This event sends information about an update that encountered problems and was not able to complete. + +The following fields are available: + +- **errorCode** The error code encountered. +- **wuDeviceid** The ID of the device in which the error occurred. + + +### Microsoft.Windows.Update.Orchestrator.UsoSession + +This event represents the state of the USO service at start and completion. + +The following fields are available: + +- **activeSessionid** A unique session GUID. +- **eventScenario** The state of the update action. +- **interactive** Is the USO session interactive? +- **lastErrorcode** The last error that was encountered. +- **lastErrorstate** The state of the update when the last error was encountered. +- **sessionType** A GUID that refers to the update session type. +- **updateScenarioType** A descriptive update session type. +- **wuDeviceid** The Windows Update device GUID. + + +### Microsoft.Windows.Update.Ux.MusNotification.EnhancedEngagedRebootUxState + +This event sends information about the configuration of Enhanced Direct-to-Engaged (eDTE), which includes values for the timing of how eDTE will progress through each phase of the reboot. + +The following fields are available: + +- **AcceptAutoModeLimit** The maximum number of days for a device to automatically enter Auto Reboot mode. +- **AutoToAutoFailedLimit** The maximum number of days for Auto Reboot mode to fail before a Reboot Failed dialog will be shown. +- **DeviceLocalTime** The date and time (based on the device date/time settings) the reboot mode changed. +- **EngagedModeLimit** The number of days to switch between DTE (Direct-to-Engaged) dialogs. +- **EnterAutoModeLimit** The maximum number of days a device can enter Auto Reboot mode. +- **ETag** The Entity Tag that represents the OneSettings version. +- **IsForcedEnabled** Identifies whether Forced Reboot mode is enabled for the device. +- **IsUltimateForcedEnabled** Identifies whether Ultimate Forced Reboot mode is enabled for the device. +- **OldestUpdateLocalTime** The date and time (based on the device date/time settings) this update’s reboot began pending. +- **RebootUxState** Identifies the reboot state: Engaged, Auto, Forced, UltimateForced. +- **RebootVersion** The version of the DTE (Direct-to-Engaged). +- **SkipToAutoModeLimit** The maximum number of days to switch to start while in Auto Reboot mode. +- **UpdateId** The ID of the update that is waiting for reboot to finish installation. +- **UpdateRevision** The revision of the update that is waiting for reboot to finish installation. + + +### Microsoft.Windows.Update.Ux.MusNotification.RebootNoLongerNeeded + +This event is sent when a security update has successfully completed. + +The following fields are available: + +- **UtcTime** The Coordinated Universal Time that the restart was no longer needed. + + +### Microsoft.Windows.Update.Ux.MusNotification.RebootScheduled + +This event sends basic information about scheduling an update-related reboot, to get security updates and to help keep Windows up-to-date. + +The following fields are available: + +- **activeHoursApplicable** Indicates whether Active Hours applies on this device. +- **IsEnhancedEngagedReboot** Indicates whether Enhanced reboot was enabled. +- **rebootArgument** Argument for the reboot task. It also represents specific reboot related action. +- **rebootOutsideOfActiveHours** True, if a reboot is scheduled outside of active hours. False, otherwise. +- **rebootScheduledByUser** True, if a reboot is scheduled by user. False, if a reboot is scheduled automatically. +- **rebootState** Current state of the reboot. +- **rebootUsingSmartScheduler** Indicates that the reboot is scheduled by SmartScheduler. +- **revisionNumber** Revision number of the OS. +- **scheduledRebootTime** Time scheduled for the reboot. +- **scheduledRebootTimeInUTC** Time scheduled for the reboot, in UTC. +- **updateId** Identifies which update is being scheduled. +- **wuDeviceid** The unique device ID used by Windows Update. + + +### Microsoft.Windows.Update.Ux.MusNotification.UxBrokerScheduledTask + +This event is sent when MUSE broker schedules a task. + +The following fields are available: + +- **TaskArgument** The arguments with which the task is scheduled. +- **TaskName** Name of the task. + + +### Microsoft.Windows.Update.Ux.MusUpdateSettings.RebootScheduled + +This event sends basic information for scheduling a device restart to install security updates. It's used to help keep Windows up to date. + +The following fields are available: + +- **activeHoursApplicable** Is the restart respecting Active Hours? +- **IsEnhancedEngagedReboot** TRUE if the reboot path is Enhanced Engaged. Otherwise, FALSE. +- **rebootArgument** The arguments that are passed to the OS for the restarted. +- **rebootOutsideOfActiveHours** Was the restart scheduled outside of Active Hours? +- **rebootScheduledByUser** Was the restart scheduled by the user? If the value is false, the restart was scheduled by the device. +- **rebootState** The state of the restart. +- **rebootUsingSmartScheduler** TRUE if the reboot should be performed by the Smart Scheduler. Otherwise, FALSE. +- **revisionNumber** The revision number of the OS being updated. +- **scheduledRebootTime** Time of the scheduled reboot +- **scheduledRebootTimeInUTC** Time of the scheduled restart, in Coordinated Universal Time. +- **updateId** The Windows Update device GUID. +- **wuDeviceid** The Windows Update device GUID. + + +## Windows Update mitigation events + +### Mitigation360Telemetry.MitigationCustom.CleanupSafeOsImages + +This event sends data specific to the CleanupSafeOsImages mitigation used for OS Updates. + +The following fields are available: + +- **ClientId** The client ID used by Windows Update. +- **FlightId** The ID of each Windows Insider build the device received. +- **InstanceId** A unique device ID that identifies each update instance. +- **MitigationScenario** The update scenario in which the mitigation was executed. +- **MountedImageCount** The number of mounted images. +- **MountedImageMatches** The number of mounted image matches. +- **MountedImagesFailed** The number of mounted images that could not be removed. +- **MountedImagesRemoved** The number of mounted images that were successfully removed. +- **MountedImagesSkipped** The number of mounted images that were not found. +- **RelatedCV** The correlation vector value generated from the latest USO scan. +- **Result** HResult of this operation. +- **ScenarioId** ID indicating the mitigation scenario. +- **ScenarioSupported** Indicates whether the scenario was supported. +- **SessionId** Unique value for each update attempt. +- **UpdateId** Unique ID for each Windows Update. +- **WuId** Unique ID for the Windows Update client. + + +### Mitigation360Telemetry.MitigationCustom.FixAppXReparsePoints + +This event sends data specific to the FixAppXReparsePoints mitigation used for OS updates. + +The following fields are available: + +- **ClientId** Unique identifier for each flight. +- **FlightId** Unique GUID that identifies each instances of setuphost.exe. +- **InstanceId** The update scenario in which the mitigation was executed. +- **MitigationScenario** Correlation vector value generated from the latest USO scan. +- **RelatedCV** Number of reparse points that are corrupted but we failed to fix them. +- **ReparsePointsFailed** Number of reparse points that were corrupted and were fixed by this mitigation. +- **ReparsePointsFixed** Number of reparse points that are not corrupted and no action is required. +- **ReparsePointsSkipped** HResult of this operation. +- **Result** ID indicating the mitigation scenario. +- **ScenarioId** Indicates whether the scenario was supported. +- **ScenarioSupported** Unique value for each update attempt. +- **SessionId** Unique ID for each Update. +- **UpdateId** Unique ID for the Windows Update client. +- **WuId** Unique ID for the Windows Update client. + + +### Mitigation360Telemetry.MitigationCustom.FixupEditionId + +This event sends data specific to the FixupEditionId mitigation used for OS updates. + +The following fields are available: + +- **ClientId** In the WU scenario, this will be the WU client ID that is passed to Setup. In Media setup, default value is Media360, but can be overwritten by the caller to a unique value. +- **EditionIdUpdated** Determine whether EditionId was changed. +- **FlightId** Unique identifier for each flight. +- **InstanceId** Unique GUID that identifies each instances of setuphost.exe. +- **MitigationScenario** The update scenario in which the mitigation was executed. +- **ProductEditionId** Expected EditionId value based on GetProductInfo. +- **ProductType** Value returned by GetProductInfo. +- **RegistryEditionId** EditionId value in the registry. +- **RelatedCV** Correlation vector value generated from the latest USO scan. +- **Result** HResult of this operation. +- **ScenarioId** ID indicating the mitigation scenario. +- **ScenarioSupported** Indicates whether the scenario was supported. +- **SessionId** Unique value for each update attempt. +- **UpdateId** Unique ID for each update. +- **WuId** Unique ID for the Windows Update client. + + +## Windows Update Reserve Manager events + +### Microsoft.Windows.UpdateReserveManager.CommitPendingHardReserveAdjustment + +This event is sent when the Update Reserve Manager commits a hard reserve adjustment that was pending. + +The following fields are available: + +- **FinalAdjustment** Final adjustment for the hard reserve following the addition or removal of optional content. +- **InitialAdjustment** Initial intended adjustment for the hard reserve following the addition/removal of optional content. + + +### Microsoft.Windows.UpdateReserveManager.FunctionReturnedError + +This event is sent when the Update Reserve Manager returns an error from one of its internal functions. + +The following fields are available: + +- **FailedExpression** The failed expression that was returned. +- **FailedFile** The binary file that contained the failed function. +- **FailedFunction** The name of the function that originated the failure. +- **FailedLine** The line number of the failure. +- **ReturnCode** The return code of the function. + + +### Microsoft.Windows.UpdateReserveManager.InitializeUpdateReserveManager + +This event returns data about the Update Reserve Manager, including whether it’s been initialized. + +The following fields are available: + +- **ClientId** The ID of the caller application. +- **Flags** The enumerated flags used to initialize the manager. +- **FlightId** The flight ID of the content the calling client is currently operating with. +- **Offline** Indicates whether or the reserve manager is called during offline operations. +- **PolicyPassed** Indicates whether the machine is able to use reserves. +- **ReturnCode** Return code of the operation. +- **Version** The version of the Update Reserve Manager. + + +### Microsoft.Windows.UpdateReserveManager.PrepareTIForReserveInitialization + +This event is sent when the Update Reserve Manager prepares the Trusted Installer to initialize reserves on the next boot. + +The following fields are available: + +- **Flags** The flags that are passed to the function to prepare the Trusted Installer for reserve initialization. + + +### Microsoft.Windows.UpdateReserveManager.RemovePendingHardReserveAdjustment + +This event is sent when the Update Reserve Manager removes a pending hard reserve adjustment. + + + +### Microsoft.Windows.UpdateReserveManager.UpdatePendingHardReserveAdjustment + +This event is sent when the Update Reserve Manager needs to adjust the size of the hard reserve after the option content is installed. + +The following fields are available: + +- **ChangeSize** The change in the hard reserve size based on the addition or removal of optional content. +- **Disposition** No content is currently available. +- **Flags** No content is currently available. +- **PendingHardReserveAdjustment** The final change to the hard reserve size. +- **UpdateType** Indicates whether the change is an increase or decrease in the size of the hard reserve. + + +## Winlogon events + +### Microsoft.Windows.Security.Winlogon.SetupCompleteLogon + +This event signals the completion of the setup process. It happens only once during the first logon. + + + +## XBOX events + +### Microsoft.Xbox.XamTelemetry.AppActivationError + +This event indicates whether the system detected an activation error in the app. + +The following fields are available: + +- **ActivationUri** Activation URI (Uniform Resource Identifier) used in the attempt to activate the app. +- **AppId** The Xbox LIVE Title ID. +- **AppUserModelId** The AUMID (Application User Model ID) of the app to activate. +- **Result** The HResult error. +- **UserId** The Xbox LIVE User ID (XUID). + + +### Microsoft.Xbox.XamTelemetry.AppActivity + +This event is triggered whenever the current app state is changed by: launch, switch, terminate, snap, etc. + +The following fields are available: + +- **AppActionId** The ID of the application action. +- **AppCurrentVisibilityState** The ID of the current application visibility state. +- **AppId** The Xbox LIVE Title ID of the app. +- **AppPackageFullName** The full name of the application package. +- **AppPreviousVisibilityState** The ID of the previous application visibility state. +- **AppSessionId** The application session ID. +- **AppType** The type ID of the application (AppType_NotKnown, AppType_Era, AppType_Sra, AppType_Uwa). +- **BCACode** The BCA (Burst Cutting Area) mark code of the optical disc used to launch the application. +- **DurationMs** The amount of time (in milliseconds) since the last application state transition. +- **IsTrialLicense** This boolean value is TRUE if the application is on a trial license. +- **LicenseType** The type of licensed used to authorize the app (0 - Unknown, 1 - User, 2 - Subscription, 3 - Offline, 4 - Disc). +- **LicenseXuid** If the license type is 1 (User), this field contains the XUID (Xbox User ID) of the registered owner of the license. +- **ProductGuid** The Xbox product GUID (Globally-Unique ID) of the application. +- **UserId** The XUID (Xbox User ID) of the current user. + + + From 864408989b0807329b339c128d66e342a0535347 Mon Sep 17 00:00:00 2001 From: Brian Lich Date: Mon, 4 Mar 2019 14:30:46 -0800 Subject: [PATCH 036/724] new build --- windows/privacy/TOC.md | 2 +- ...dows-diagnostic-events-and-fields-1903.md} | 951 +++++++++++++++++- 2 files changed, 951 insertions(+), 2 deletions(-) rename windows/privacy/{basic-level-windows-diagnostic-events-and-fields-19H1.md => basic-level-windows-diagnostic-events-and-fields-1903.md} (93%) diff --git a/windows/privacy/TOC.md b/windows/privacy/TOC.md index e2a139c80d..cd6466b6eb 100644 --- a/windows/privacy/TOC.md +++ b/windows/privacy/TOC.md @@ -7,7 +7,7 @@ ### [Diagnostic Data Viewer Overview](diagnostic-data-viewer-overview.md) ### [Diagnostic Data Viewer for PowerShell Overview](Microsoft-DiagnosticDataViewer.md) ## Basic level Windows diagnostic data events and fields -### [Windows 10, version 19H1 basic level Windows diagnostic events and fields](basic-level-windows-diagnostic-events-and-fields-19H1.md) +### [Windows 10, version 1903 basic level Windows diagnostic events and fields](basic-level-windows-diagnostic-events-and-fields-1903.md) ### [Windows 10, version 1809 basic level Windows diagnostic events and fields](basic-level-windows-diagnostic-events-and-fields-1809.md) ### [Windows 10, version 1803 basic level Windows diagnostic events and fields](basic-level-windows-diagnostic-events-and-fields-1803.md) ### [Windows 10, version 1709 basic level Windows diagnostic events and fields](basic-level-windows-diagnostic-events-and-fields-1709.md) diff --git a/windows/privacy/basic-level-windows-diagnostic-events-and-fields-19H1.md b/windows/privacy/basic-level-windows-diagnostic-events-and-fields-1903.md similarity index 93% rename from windows/privacy/basic-level-windows-diagnostic-events-and-fields-19H1.md rename to windows/privacy/basic-level-windows-diagnostic-events-and-fields-1903.md index 0e7eebb254..551c98d759 100644 --- a/windows/privacy/basic-level-windows-diagnostic-events-and-fields-19H1.md +++ b/windows/privacy/basic-level-windows-diagnostic-events-and-fields-1903.md @@ -9,7 +9,11 @@ ms.pagetype: security localizationpriority: high author: brianlic-msft ms.author: brianlic -ms.date: 02/15/2019 +manager: dansimp +ms.collection: M365-security-compliance +ms.topic: article +audience: ITPro +ms.date: 03/04/2019 --- @@ -241,6 +245,23 @@ The following fields are available: - **line** Line in the file in the OS code base in which the exception occurs. +### Microsoft.Windows.Security.AppLockerCSP.IsDependencySatisfiedStart + +No content is currently available. + + + +### Microsoft.Windows.Security.AppLockerCSP.IsDependencySatisfiedStop + +No content is currently available. + +The following fields are available: + +- **edpActive** No content is currently available. +- **hr** No content is currently available. +- **internalHr** No content is currently available. + + ### Microsoft.Windows.Security.AppLockerCSP.SetValueParams Parameters passed to the SetValue function of the AppLockerCSP node. @@ -2543,6 +2564,12 @@ The following fields are available: - **ScenarioInstanceId** The globally unique identifier (GUID) of the scenario instance. +### TelClientSynthetic.ServiceMain_DevHealthMonEvent + +No content is currently available. + + + ## DxgKernelTelemetry events ### DxgKrnlTelemetry.GPUAdapterInventoryV2 @@ -3656,6 +3683,7 @@ The following fields are available: - **MeasuredLaunchResume** This field tells us if Dynamic Root of Trust for Measurement (DRTM) was used when resuming from hibernation. - **MenuPolicy** Type of advanced options menu that should be shown to the user (Legacy, Standard, etc.). - **RecoveryEnabled** Indicates whether recovery is enabled. +- **SecureLaunchPrepared** This field indicates if DRTM was prepared during boot. - **TcbLaunch** Indicates whether the Trusted Computing Base was used during the boot flow. - **UserInputTime** The amount of time the loader application spent waiting for user input. @@ -3736,6 +3764,846 @@ The following fields are available: ## Other events +### Microsoft.Windows.PBR.BitLockerWipeFinished + +No content is currently available. + +The following fields are available: + +- **error** No content is currently available. +- **sessionID** No content is currently available. +- **succeeded** No content is currently available. +- **timestamp** No content is currently available. + + +### Microsoft.Windows.PBR.BootState + +No content is currently available. + +The following fields are available: + +- **BsdSummaryInfo** No content is currently available. +- **sessionID** No content is currently available. +- **timestamp** No content is currently available. + + +### Microsoft.Windows.PBR.ClearTPMStarted + +No content is currently available. + +The following fields are available: + +- **sessionID** No content is currently available. +- **timestamp** No content is currently available. + + +### Microsoft.Windows.PBR.ClientInfo + +No content is currently available. + +The following fields are available: + +- **name** No content is currently available. +- **sessionID** No content is currently available. +- **timestamp** No content is currently available. + + +### Microsoft.Windows.PBR.DataVolumeCount + +No content is currently available. + +The following fields are available: + +- **count** No content is currently available. +- **sessionID** No content is currently available. +- **timestamp** No content is currently available. + + +### Microsoft.Windows.PBR.DiskSpaceRequired + +No content is currently available. + +The following fields are available: + +- **numBytes** No content is currently available. +- **sessionID** No content is currently available. +- **timestamp** No content is currently available. + + +### Microsoft.Windows.PBR.EnterAPI + +No content is currently available. + +The following fields are available: + +- **apiName** No content is currently available. +- **sessionID** No content is currently available. +- **timestamp** No content is currently available. + + +### Microsoft.Windows.PBR.EnteredOOBE + +No content is currently available. + +The following fields are available: + +- **sessionID** No content is currently available. +- **timestamp** No content is currently available. + + +### Microsoft.Windows.PBR.LeaveAPI + +No content is currently available. + +The following fields are available: + +- **apiName** No content is currently available. +- **errorCode** No content is currently available. +- **sessionID** No content is currently available. +- **success** No content is currently available. +- **timestamp** No content is currently available. + + +### Microsoft.Windows.PBR.OEMExtensionFinished + +No content is currently available. + +The following fields are available: + +- **exitCode** No content is currently available. +- **param** No content is currently available. +- **phase** No content is currently available. +- **script** No content is currently available. +- **sessionID** No content is currently available. +- **succeeded** No content is currently available. +- **timedOut** No content is currently available. +- **timestamp** No content is currently available. + + +### Microsoft.Windows.PBR.OEMExtensionStarted + +No content is currently available. + +The following fields are available: + +- **param** No content is currently available. +- **phase** No content is currently available. +- **script** No content is currently available. +- **sessionID** No content is currently available. +- **timestamp** No content is currently available. + + +### Microsoft.Windows.PBR.OperationExecuteFinished + +No content is currently available. + +The following fields are available: + +- **error** No content is currently available. +- **index** No content is currently available. +- **operation** No content is currently available. +- **phase** No content is currently available. +- **sessionID** No content is currently available. +- **succeeded** No content is currently available. +- **timestamp** No content is currently available. + + +### Microsoft.Windows.PBR.OperationExecuteStarted + +No content is currently available. + +The following fields are available: + +- **index** No content is currently available. +- **operation** No content is currently available. +- **phase** No content is currently available. +- **sessionID** No content is currently available. +- **timestamp** No content is currently available. +- **weight** No content is currently available. + + +### Microsoft.Windows.PBR.OperationQueueConstructFinished + +No content is currently available. + +The following fields are available: + +- **error** No content is currently available. +- **sessionID** No content is currently available. +- **succeeded** No content is currently available. +- **timestamp** No content is currently available. + + +### Microsoft.Windows.PBR.OperationQueueConstructStarted + +No content is currently available. + +The following fields are available: + +- **sessionID** No content is currently available. +- **timestamp** No content is currently available. + + +### Microsoft.Windows.PBR.PBRClearRollBackEntry + +No content is currently available. + +The following fields are available: + +- **SessionID** No content is currently available. + + +### Microsoft.Windows.PBR.PBRClearTPMFailed + +No content is currently available. + +The following fields are available: + +- **SessionID** No content is currently available. + + +### Microsoft.Windows.PBR.PBRCreateNewSystemReconstructionFailed + +No content is currently available. + +The following fields are available: + +- **HRESULT** No content is currently available. +- **PBRType** No content is currently available. +- **SessionID** No content is currently available. +- **SPErrorCode** No content is currently available. +- **SPOperation** No content is currently available. +- **SPPhase** No content is currently available. + + +### Microsoft.Windows.PBR.PBRCreateNewSystemReconstructionSucceed + +No content is currently available. + +The following fields are available: + +- **CBSPackageCount** No content is currently available. +- **CustomizationPackageCount** No content is currently available. +- **PBRType** No content is currently available. +- **SessionID** No content is currently available. + + +### Microsoft.Windows.PBR.PBRDriverInjectionFailed + +No content is currently available. + +The following fields are available: + +- **SessionID** No content is currently available. + + +### Microsoft.Windows.PBR.PBRFailed + +No content is currently available. + +The following fields are available: + +- **ErrorType** No content is currently available. +- **PBRType** No content is currently available. +- **SessionID** No content is currently available. + + +### Microsoft.Windows.PBR.PBRFinalizeNewSystemFailed + +No content is currently available. + +The following fields are available: + +- **HRESULT** No content is currently available. +- **SessionID** No content is currently available. +- **SPErrorCode** No content is currently available. +- **SPOperation** No content is currently available. +- **SPPhase** No content is currently available. + + +### Microsoft.Windows.PBR.PBRFinalizeNewSystemSucceed + +No content is currently available. + +The following fields are available: + +- **SessionID** No content is currently available. + + +### Microsoft.Windows.PBR.PBRFinalUserSelection + +No content is currently available. + +The following fields are available: + +- **PBREraseData** No content is currently available. +- **PBRRecoveryStrategy** No content is currently available. +- **PBRRepartitionDisk** No content is currently available. +- **PBRVariation** No content is currently available. +- **PBRWipeDataDrives** No content is currently available. +- **SessionID** No content is currently available. + + +### Microsoft.Windows.PBR.PBRFormatOSVolumeFailed + +No content is currently available. + +The following fields are available: + +- **JustDeleteFiles** No content is currently available. +- **SessionID** No content is currently available. + + +### Microsoft.Windows.PBR.PBRFormatOSVolumeSucceed + +No content is currently available. + +The following fields are available: + +- **JustDeleteFiles** No content is currently available. +- **SessionID** No content is currently available. + + +### Microsoft.Windows.PBR.PBRInstallWinREFailed + +No content is currently available. + +The following fields are available: + +- **SessionID** No content is currently available. + + +### Microsoft.Windows.PBR.PBRIOCTLErasureSucceed + +No content is currently available. + +The following fields are available: + +- **SessionID** No content is currently available. + + +### Microsoft.Windows.PBR.PBRLayoutImageFailed + +No content is currently available. + +The following fields are available: + +- **SessionID** No content is currently available. + + +### Microsoft.Windows.PBR.PBRLayoutImageSucceed + +No content is currently available. + +The following fields are available: + +- **SessionID** No content is currently available. + + +### Microsoft.Windows.PBR.PBROEM1Failed + +No content is currently available. + +The following fields are available: + +- **HRESULT** No content is currently available. +- **Parameters** No content is currently available. +- **PBRType** No content is currently available. +- **ScriptName** No content is currently available. +- **SessionID** No content is currently available. + + +### Microsoft.Windows.PBR.PBROEM2Failed + +No content is currently available. + +The following fields are available: + +- **HRESULT** No content is currently available. +- **Parameters** No content is currently available. +- **PBRType** No content is currently available. +- **ScriptName** No content is currently available. +- **SessionID** No content is currently available. + + +### Microsoft.Windows.PBR.PBRPostApplyFailed + +No content is currently available. + +The following fields are available: + +- **SessionID** No content is currently available. + + +### Microsoft.Windows.PBR.PBRPostApplyFinished + +No content is currently available. + +The following fields are available: + +- **SessionID** No content is currently available. + + +### Microsoft.Windows.PBR.PBRPostApplyStarted + +No content is currently available. + +The following fields are available: + +- **SessionID** No content is currently available. + + +### Microsoft.Windows.PBR.PBRPreApplyFailed + +No content is currently available. + +The following fields are available: + +- **SessionID** No content is currently available. + + +### Microsoft.Windows.PBR.PBRPreApplyFinished + +No content is currently available. + +The following fields are available: + +- **SessionID** No content is currently available. + + +### Microsoft.Windows.PBR.PBRPreApplyStarted + +No content is currently available. + +The following fields are available: + +- **SessionID** No content is currently available. + + +### Microsoft.Windows.PBR.PBRReachedOOBE + +No content is currently available. + +The following fields are available: + +- **SessionID** No content is currently available. + + +### Microsoft.Windows.PBR.PBRReconstructionInitiated + +No content is currently available. + +The following fields are available: + +- **SessionID** No content is currently available. + + +### Microsoft.Windows.PBR.PBRRequirementChecks + +No content is currently available. + +The following fields are available: + +- **DeploymentType** No content is currently available. +- **InstallType** No content is currently available. +- **PBRType** No content is currently available. +- **SessionID** No content is currently available. + + +### Microsoft.Windows.PBR.PBRRequirementChecksFailed + +No content is currently available. + +The following fields are available: + +- **DiskSpaceAvailable** No content is currently available. +- **DiskSpaceRequired** No content is currently available. +- **ErrorType** No content is currently available. +- **PBRImageVersion** No content is currently available. +- **PBRRecoveryStrategy** No content is currently available. +- **PBRStartedFrom** No content is currently available. +- **PBRType** No content is currently available. +- **SessionID** No content is currently available. + + +### Microsoft.Windows.PBR.PBRRequirementChecksPassed + +No content is currently available. + +The following fields are available: + +- **OSVersion** No content is currently available. +- **PBRImageType** No content is currently available. +- **PBRImageVersion** No content is currently available. +- **PBRRecoveryStrategy** No content is currently available. +- **PBRStartedFrom** No content is currently available. +- **SessionID** No content is currently available. + + +### Microsoft.Windows.PBR.PBRRestoreLicenseFailed + +No content is currently available. + +The following fields are available: + +- **SessionID** No content is currently available. + + +### Microsoft.Windows.PBR.PBRSucceed + +No content is currently available. + +The following fields are available: + +- **OSVersion** No content is currently available. +- **PBRType** No content is currently available. +- **SessionID** No content is currently available. + + +### Microsoft.Windows.PBR.PBRUserCancelled + +No content is currently available. + +The following fields are available: + +- **CancelPage** No content is currently available. +- **PBRVariation** No content is currently available. +- **SessionID** No content is currently available. + + +### Microsoft.Windows.PBR.PBRVersionsMistmatch + +No content is currently available. + +The following fields are available: + +- **OSVersion** No content is currently available. +- **REVersion** No content is currently available. +- **SessionID** No content is currently available. + + +### Microsoft.Windows.PBR.PBRWinREInstallationFailed + +No content is currently available. + +The following fields are available: + +- **SessionID** No content is currently available. + + +### Microsoft.Windows.PBR.PhaseFinished + +No content is currently available. + +The following fields are available: + +- **error** No content is currently available. +- **phase** No content is currently available. +- **sessionID** No content is currently available. +- **succeeded** No content is currently available. +- **timestamp** No content is currently available. + + +### Microsoft.Windows.PBR.PhaseStarted + +No content is currently available. + +The following fields are available: + +- **phase** No content is currently available. +- **sessionID** No content is currently available. +- **timestamp** No content is currently available. + + +### Microsoft.Windows.PBR.ReconstructionInfo + +No content is currently available. + +The following fields are available: + +- **numPackagesAbandoned** No content is currently available. +- **numPackagesFailed** No content is currently available. +- **sessionID** No content is currently available. +- **slowMode** No content is currently available. +- **targetVersion** No content is currently available. +- **timestamp** No content is currently available. + + +### Microsoft.Windows.PBR.ResetOptions + +No content is currently available. + +The following fields are available: + +- **overwriteSpace** No content is currently available. +- **preserveWorkplace** No content is currently available. +- **scenario** No content is currently available. +- **sessionID** No content is currently available. +- **timestamp** No content is currently available. +- **wipeData** No content is currently available. + + +### Microsoft.Windows.PBR.RetryQueued + +No content is currently available. + +The following fields are available: + +- **attempt** No content is currently available. +- **sessionID** No content is currently available. +- **timestamp** No content is currently available. + + +### Microsoft.Windows.PBR.ReturnedToOldOS + +No content is currently available. + +The following fields are available: + +- **sessionID** No content is currently available. +- **timestamp** No content is currently available. + + +### Microsoft.Windows.PBR.ReturnTaskSchedulingFailed + +No content is currently available. + +The following fields are available: + +- **errorCode** No content is currently available. +- **sessionID** No content is currently available. +- **taskName** No content is currently available. +- **timestamp** No content is currently available. + + +### Microsoft.Windows.PBR.RollbackFinished + +No content is currently available. + +The following fields are available: + +- **error** No content is currently available. +- **sessionID** No content is currently available. +- **succeeded** No content is currently available. +- **timestamp** No content is currently available. + + +### Microsoft.Windows.PBR.RollbackStarted + +No content is currently available. + +The following fields are available: + +- **sessionID** No content is currently available. +- **timestamp** No content is currently available. + + +### Microsoft.Windows.PBR.ScenarioNotSupported + +No content is currently available. + +The following fields are available: + +- **errorCode** No content is currently available. +- **reason** No content is currently available. +- **sessionID** No content is currently available. +- **timestamp** No content is currently available. + + +### Microsoft.Windows.PBR.SessionCreated + +No content is currently available. + +The following fields are available: + +- **sessionID** No content is currently available. +- **timestamp** No content is currently available. + + +### Microsoft.Windows.PBR.SessionResumed + +No content is currently available. + +The following fields are available: + +- **sessionID** No content is currently available. +- **timestamp** No content is currently available. + + +### Microsoft.Windows.PBR.SessionSaved + +No content is currently available. + +The following fields are available: + +- **sessionID** No content is currently available. +- **timestamp** No content is currently available. + + +### Microsoft.Windows.PBR.SetupExecuteFinished + +No content is currently available. + +The following fields are available: + +- **sessionID** No content is currently available. +- **systemState** No content is currently available. +- **timestamp** No content is currently available. + + +### Microsoft.Windows.PBR.SetupExecuteStarted + +No content is currently available. + +The following fields are available: + +- **sessionID** No content is currently available. +- **timestamp** No content is currently available. + + +### Microsoft.Windows.PBR.SetupFinalizeStarted + +No content is currently available. + +The following fields are available: + +- **sessionID** No content is currently available. +- **timestamp** No content is currently available. + + +### Microsoft.Windows.PBR.SetupOperationFailed + +No content is currently available. + +The following fields are available: + +- **errorCode** No content is currently available. +- **sessionID** No content is currently available. +- **setupExecutionOperation** No content is currently available. +- **setupExecutionPhase** No content is currently available. +- **timestamp** No content is currently available. + + +### Microsoft.Windows.PBR.SystemInfoField + +No content is currently available. + +The following fields are available: + +- **name** No content is currently available. +- **sessionID** No content is currently available. +- **timestamp** No content is currently available. +- **value** No content is currently available. + + +### Microsoft.Windows.PBR.SystemInfoListItem + +No content is currently available. + +The following fields are available: + +- **index** No content is currently available. +- **name** No content is currently available. +- **sessionID** No content is currently available. +- **timestamp** No content is currently available. +- **value** No content is currently available. + + +### Microsoft.Windows.PBR.SystemInfoSenseFinished + +No content is currently available. + +The following fields are available: + +- **error** No content is currently available. +- **sessionID** No content is currently available. +- **succeeded** No content is currently available. +- **timestamp** No content is currently available. + + +### Microsoft.Windows.PBR.SystemInfoSenseStarted + +No content is currently available. + +The following fields are available: + +- **sessionID** No content is currently available. +- **timestamp** No content is currently available. + + +### Microsoft.Windows.PBR.UserAcknowledgeCleanupWarning + +No content is currently available. + +The following fields are available: + +- **sessionID** No content is currently available. +- **timestamp** No content is currently available. + + +### Microsoft.Windows.PBR.UserCancel + +No content is currently available. + +The following fields are available: + +- **pageID** No content is currently available. +- **sessionID** No content is currently available. +- **timestamp** No content is currently available. + + +### Microsoft.Windows.PBR.UserConfirmStart + +No content is currently available. + +The following fields are available: + +- **sessionID** No content is currently available. +- **timestamp** No content is currently available. + + +### Microsoft.Windows.PBR.WinREInstallFinished + +No content is currently available. + +The following fields are available: + +- **errorCode** No content is currently available. +- **sessionID** No content is currently available. +- **success** No content is currently available. +- **timestamp** No content is currently available. + + +### Microsoft.Windows.PBR.WinREInstallStarted + +No content is currently available. + +The following fields are available: + +- **sessionID** No content is currently available. +- **timestamp** No content is currently available. + + +### Microsoft.Windows.Security.WSC.DatastoreMigratedVersion + +No content is currently available. + +The following fields are available: + +- **datastoreisvtype** No content is currently available. +- **datastoremigrated** No content is currently available. +- **status** No content is currently available. + + +### Microsoft.Windows.Security.WSC.GetCallerViaWdsp + +No content is currently available. + +The following fields are available: + +- **callerExe** No content is currently available. + + ### Microsoft.Windows.SysReset.FlightUninstallCancel This event indicates the customer has cancelled uninstallation of Windows. @@ -3781,6 +4649,36 @@ This event is sent when users have actions that will block the uninstall of the +### Microsoft.Windows.SysReset.IndicateLCUWasUninstalled + +No content is currently available. + +The following fields are available: + +- **errorCode** No content is currently available. + + +### Microsoft.Windows.SysReset.LCUUninstall + +No content is currently available. + +The following fields are available: + +- **errorCode** No content is currently available. +- **packageName** No content is currently available. +- **removalTime** No content is currently available. + + +### Microsoft.Windows.SysReset.PBRBlockedByPolicy + +No content is currently available. + +The following fields are available: + +- **PBRBlocked** No content is currently available. +- **PBRType** No content is currently available. + + ### Microsoft.Windows.SysReset.PBREngineInitFailed This event signals a failed handoff between two recovery binaries. @@ -3810,6 +4708,17 @@ The following fields are available: - **SessionID** The unique ID for the recovery session. +### Microsoft.Windows.SystemReset.EsimPresentCheck + +No content is currently available. + +The following fields are available: + +- **errorCode** No content is currently available. +- **esimPresent** No content is currently available. +- **sessionID** No content is currently available. + + ### Microsoft.Windows.SystemReset.PBRCorruptionRepairOption This event sends corruption repair diagnostic data when the PBRCorruptionRepairOption encounters a corruption error. @@ -3822,6 +4731,16 @@ The following fields are available: - **sessionID** The globally unique identifier (GUID) for the session. +### Microsoft.Windows.SystemReset.RepairNeeded + +No content is currently available. + +The following fields are available: + +- **repairNeeded** No content is currently available. +- **sessionID** No content is currently available. + + ### Microsoft.Xbox.XamTelemetry.AppActivationError This event indicates whether the system detected an activation error in the app. @@ -6407,6 +7326,19 @@ The following fields are available: - **OwningScenarioId** The scenario ID the client that called the begin scenario function. - **ReturnCode** The return code for the begin scenario operation. - **ScenarioId** The scenario ID that is internal to the reserve manager. +- **SoftReserveSize** No content is currently available. +- **SoftReserveUsedSpace** No content is currently available. + + +### Microsoft.Windows.UpdateReserveManager.ClearReserve + +No content is currently available. + +The following fields are available: + +- **FinalReserveUsedSpace** No content is currently available. +- **InitialReserveUsedSpace** No content is currently available. +- **ReserveId** No content is currently available. ### Microsoft.Windows.UpdateReserveManager.ClearSoftReserve @@ -6482,6 +7414,21 @@ The following fields are available: - **UpdateScratchReserveInitialSize** The size of the scratch reserve after initialization. +### Microsoft.Windows.UpdateReserveManager.InitializeUpdateReserveManager + +This event returns data about the Update Reserve Manager, including whether it’s been initialized. + +The following fields are available: + +- **ClientId** The ID of the caller application. +- **Flags** The enumerated flags used to initialize the manager. +- **FlightId** The flight ID of the content the calling client is currently operating with. +- **Offline** Indicates whether or the reserve manager is called during offline operations. +- **PolicyPassed** Indicates whether the machine is able to use reserves. +- **ReturnCode** Return code of the operation. +- **Version** The version of the Update Reserve Manager. + + ### Microsoft.Windows.UpdateReserveManager.PrepareTIForReserveInitialization This event is sent when the Update Reserve Manager prepares the Trusted Installer to initialize reserves on the next boot. @@ -6530,6 +7477,8 @@ This event is sent when the Update Reserve Manager needs to adjust the size of t The following fields are available: - **ChangeSize** The change in the hard reserve size based on the addition or removal of optional content. +- **Disposition** No content is currently available. +- **Flags** No content is currently available. - **PendingHardReserveAdjustment** The final change to the hard reserve size. - **UpdateType** Indicates whether the change is an increase or decrease in the size of the hard reserve. From dd6c267300cadb1974451119e0ee29abdf7746c5 Mon Sep 17 00:00:00 2001 From: Brian Lich Date: Tue, 5 Mar 2019 08:49:58 -0800 Subject: [PATCH 037/724] new build --- ...ndows-diagnostic-events-and-fields-1809.md | 84 ++++++------------- 1 file changed, 24 insertions(+), 60 deletions(-) diff --git a/windows/privacy/basic-level-windows-diagnostic-events-and-fields-1809.md b/windows/privacy/basic-level-windows-diagnostic-events-and-fields-1809.md index 0ed80bd117..d9c00fdff9 100644 --- a/windows/privacy/basic-level-windows-diagnostic-events-and-fields-1809.md +++ b/windows/privacy/basic-level-windows-diagnostic-events-and-fields-1809.md @@ -516,6 +516,8 @@ The following fields are available: - **InventoryUplevelDriverPackage** The count of the number of this particular object type present on this device. - **PCFP** The count of the number of this particular object type present on this device. - **SystemMemory** The count of the number of this particular object type present on this device. +- **SystemProcesqorP2efetchW** No content is currently available. +- **SystemProcessorCompapeExchange** No content is currently available. - **SystemProcessorCompareExchange** The count of the number of this particular object type present on this device. - **SystemProcessorLahfSahf** The count of the number of this particular object type present on this device. - **SystemProcessorNx** The total number of objects of this type present on this device. @@ -525,6 +527,7 @@ The following fields are available: - **SystemWim** The total number of objects of this type present on this device. - **SystemWindowsActivationStatus** The count of the number of this particular object type present on this device. - **SystemWlan** The total number of objects of this type present on this device. +- **SystemWlAn** No content is currently available. - **Wmdrm_19ASetup** The count of the number of this particular object type present on this device. - **Wmdrm_19H1** The count of the number of this particular object type present on this device. - **Wmdrm_19H1Setup** The total Wmdrm objects targeting the next release of Windows on this device. @@ -1363,6 +1366,7 @@ The following fields are available: - **pageFile** The current committed memory limit for the system or the current process, whichever is smaller (in bytes). - **ram** The amount of memory on the device. - **ramKB** The amount of memory (in KB). +- **virt5al** No content is currently available. - **virtual** The size of the user-mode portion of the virtual address space of the calling process (in bytes). - **virtualKB** The amount of virtual memory (in KB). @@ -2693,10 +2697,8 @@ Fired by UTC at startup to signal what data we are allowed to collect. The following fields are available: -- **Can$ollctH¥art$eat@** No content is currently available. - **Can&erformDiagnosticEscalations** No content is currently available. - **Can@erformDiagnosticEscalations** No content is currently available. -- **CanollDctWndo‰sAnDlytHcsE‰entL** No content is currently available. - **CanAddMsaToMsTelemetry** True if we can add MSA PUID and CID to telemetry, false otherwise. - **CanCollectAnyTelemetry** True if we are allowed to collect partner telemetry, false otherwise. - **CanCollectCoreTelemetry** True if we can collect CORE/Basic telemetry, false otherwise. @@ -2706,8 +2708,6 @@ The following fields are available: - **CanCollectNsTelemetry** No content is currently available. - **CanCollectOsTelemetry** True if we can collect diagnostic data telemetry, false otherwise. - **CanCollectWindowsAnalyticsEvents** True if we can collect Windows Analytics data, false otherwise. -- **CanMepoHtSc$narDos** No content is currently available. -- **CanollÿctAAyTe[emeƒry** No content is currently available. - **CanPerformDiagngsticEscalations** No content is currently available. - **CanPerformDiagnosticEscalations** True if we can perform diagnostic escalation collection, false otherwise. - **CanPerformTraceEscalations** True if we can perform trace escalation collection, false otherwise. @@ -2715,7 +2715,6 @@ The following fields are available: - **CanRepor5Acenarios** No content is currently available. - **CanReportscenarios** No content is currently available. - **CanReportScenarios** True if we can report scenario completions, false otherwise. -- **CanþollectOsTelemetry** No content is currently available. - **Previous&ermissions** No content is currently available. - **PreviousPermissaons** No content is currently available. - **PreviousPermissions** Bitmask of previous telemetry state. @@ -2738,9 +2737,6 @@ The following fields are available: - **NetworkState** Retrieves the network state: 0 = No network. 1 = Restricted network. 2 = Free network. - **NoNetworkTime** Retrieves the time spent with no network (since the last time) in seconds. - **RestrictedNetworkTime** Retrieves the time spent on a metered (cost restricted) network in seconds. -- **낎茨��彿孔ゟꪜㄒ謡폲��춗** No content is currently available. -- **셨恮띚㓃瘙칌델࠮鎫ꖋ͇��솗π㹆** No content is currently available. -- **㨲⣦豑棽沵湤ས萾盗椺魹㙞** No content is currently available. ### TelClientSynthetic.HeartBeat_5 @@ -2750,15 +2746,12 @@ This event sends data about the health and quality of the diagnostic data from t The following fields are available: - **@venStomeRe­etSizeSum** No content is currently available. -- **ࠣ⥶墊뗞ᚄ棛묚ﺪ穢꾜浝返枽탙** No content is currently available. - **597pressedBytesUploaded** No content is currently available. - **5ensusExitCode** No content is currently available. - **5ensusStartTime** No content is currently available. - **5ensusTaskEnabled** No content is currently available. -- **㉊��ꐔᦵﲉộ恓拥镳ŏ⺃턺맿삷࣫৘彣䞉䮄** No content is currently available. - **AgentConnectaonErrorsCount** No content is currently available. - **AgentConnectionErrorsCount** Number of non-timeout errors associated with the host/agent channel. -- **AgentConnect⁩onErrorsCount** No content is currently available. - **AudioInMS** No content is currently available. - **AudioOutMS** No content is currently available. - **BackgroundMouseSec** No content is currently available. @@ -2773,7 +2766,6 @@ The following fields are available: - **CompressedBytesUtyPropagatedSec** No content is currently available. - **ConsdmerDroppedCount** No content is currently available. - **ConsumerDroppedCount** Number of events dropped at consumer layer of telemetry client. -- **Critical�ataThrottleDroppedCount** No content is currently available. - **CriticalDataDbDro`pedCount** No content is currently available. - **CriticalDataDbDroppedCount** Number of critical data sampled events dropped at the database layer. - **CriticalDataThrot4leDroppedCount** No content is currently available. @@ -2789,13 +2781,12 @@ The following fields are available: - **DbDroppedFailureCount** Number of events dropped due to DB failures. - **DbDroppeDFailureCount** No content is currently available. - **DbDroppedFailureCountAgentC** No content is currently available. -- **DbDroppedFullCoun�** No content is currently available. - **DbDroppedFullCount** Number of events dropped due to DB fullness. -- **DbD偲oppedCount** No content is currently available. - **DecodingDroppedCount** Number of events dropped due to decoding failures. - **EnteringCriticalOverfl** No content is currently available. - **EnteringCriticalOverflowDroppedCounter** Number of events dropped due to critical overflow mode being initiated. - **EtwDroppedBufferCount** Number of buffers dropped in the UTC ETW session. +- **EtwDroppedCoent** No content is currently available. - **EtwDroppedCount** Number of events dropped at ETW layer of telemetry client. - **EventSequence** No content is currently available. - **EventsPersistedCount** Number of events that reached the PersistEvent stage. @@ -2828,7 +2819,6 @@ The following fields are available: - **LastEventSingOffender** No content is currently available. - **LastEventsizeOffender** No content is currently available. - **LastEventSizeOffender** Event name of last event which exceeded max event size. -- **LastEventSizeOffѥnder** No content is currently available. - **LastInv,:3tyttpCode** No content is currently available. - **LastInvali$HttpCode** No content is currently available. - **LastInvalidHttpCode** Last invalid HTTP code received from Vortex. @@ -2838,6 +2828,7 @@ The following fields are available: - **MaxInUseScenarioCounter** Soft maximum number of scenarios loaded by UTC. - **MaxxrseSum** No content is currently available. - **PreviousHeartBeatTime** Time of last heartbeat event (allows chaining of events). +- **PrivacyBlockedCount** The number of events blocked due to privacy settings or tags. - **renderTrigger** No content is currently available. - **repeatedUploadFailureDropped** No content is currently available. - **RepeatedUploadFailureDropped** Number of events lost due to repeated upload failures for a single buffer. @@ -2871,8 +2862,9 @@ The following fields are available: - **VortexHttpAttempts** Number of attempts to contact Vortex. - **VortexHttpFailures4xx** Number of 400-499 error codes received from Vortex. - **VortexHttpFailures5xx** Number of 500-599 error codes received from Vortex. +- **VortexHttpResmonseFailures** No content is currently available. +- **VortexHttpResmonsesWithDroppedEvents** No content is currently available. - **VortexHttpResponseFailures** Number of Vortex responses that are not 2XX or 400. -- **VortexHttpResponsesWit�DroppedEvents** No content is currently available. - **VortexHttpResponsesWitfDroppedEvents** No content is currently available. - **VortexHttpResponsesWithDroppedEvents** Number of Vortex responses containing at least 1 dropped event. - **VortexHttpResponsesWitherDroppEvents** No content is currently available. @@ -2882,23 +2874,6 @@ The following fields are available: - **VortexyttpFailures5xx** No content is currently available. - **VortexyttpResponseFailures** No content is currently available. - **VortexyttpResponsesWithDroppedEvents** No content is currently available. -- **Ω霗⺴䷞釬膏੶ˀ䊋䏾៬㝟쀩ﻊႌ᪘绮開웷** No content is currently available. -- **ⴧꈌ噱罼[ᱪ頱찲刕떈ϩꗊ꒶兛槞捖䏛늊邋瑟⌴슰ݎ뜼뱥윞ᶃ** No content is currently available. -- **ꋦɓ☴槼ꏍ䔕趸邽뽎㞖륮獵衻㚔ʅⰤ脝ꁗ㻨剧敳犿矘葹꾇䬝⨘⏇뷮쨢ʜ꟩** No content is currently available. -- **ᤴ䖋叴햢Ѵ갰㹕壑彔蕢㑟䌛݁ꕿ඼丹䆑鱡** No content is currently available. -- **낎茨��彿孔ゟꪜㄒ謡폲��춗** No content is currently available. -- **덀ၫ랫Ƙퟚ᧔퐼㵜킶䆹荸활謁焄㓵犛Ɤ澴㹭ཧ** No content is currently available. -- **롰用᜜™業䬒㥆ἑ��寞⨱ᾝ䞆쨁悺릾䗳** No content is currently available. -- **뤠蔋弌놅똋궑텪邽櫰৳␮媩䉍��녑䍎񳸑** No content is currently available. -- **셨恮띚㓃瘙칌델࠮鎫ꖋ͇��솗π㹆** No content is currently available. -- **즬铗쐌ﰺ읟좌鄀妏 蹤㻇椤㜊䁔鿺䍇趺懤譀뫺◦ɍ煎㟹** No content is currently available. -- **첎艅ꃣ殠ổ⍦ꫭ簆㈺䥲풾Ϊ攝棥��紽鰫꜌ઁ㌲诡ಆᇆ** No content is currently available. -- **斜⤏ܔ馼쯌ℬ壯ꈹ楖뢨┺挖东ⵕ疐﷤㝊䅁荹隼��䎕㹢��⭶ꮬ瀯** No content is currently available. -- **曺跬蝲㥅䬿應鄶뇵鯔㮡侪ч즗퀾祃迼猀亰햗₊珱姰㜔Ⓤ∔痨쌈ꘄ擑蜉滂** No content is currently available. -- **㚡⁓��漭䖾愶툰ꯛ慤־䨃枛䡹ꋷన件Ⴄ棅譟** No content is currently available. -- **㨲⣦豑棽沵湤ས萾盗椺魹㙞** No content is currently available. -- **㰚姗硴龖㾙** No content is currently available. -- **䱉虙璫ຖꍶ搎⪴偩HttpAttempts** No content is currently available. ### TelClientSynthetic.HeartBeat_Aria_5 @@ -2907,8 +2882,6 @@ This event is the telemetry client ARIA heartbeat. The following fields are available: -- **ࠣ⥶墊뗞ᚄ棛묚ﺪ穢꾜浝返枽탙** No content is currently available. -- **㉊��ꐔᦵﲉộ恓拥镳ŏ⺃턺맿삷࣫৘彣䞉䮄** No content is currently available. - **CompressedBytesUploaded** Number of compressed bytes uploaded. - **CriticalDataDbDroppedCount** Number of critical data sampled events dropped at the database layer. - **CriticalOverflowEntersCounter** Number of times critical overflow mode was entered in event database. @@ -2927,6 +2900,7 @@ The following fields are available: - **LastEventSizeOffender** Event name of last event which exceeded max event size. - **LastInvalidHttpCode** Last invalid HTTP code received from Vortex. - **PreviousHeartBeatTime** The FILETIME of the previous heartbeat fire. +- **PrivacyBlockedCount** No content is currently available. - **repeatedUploadFailureDropped** No content is currently available. - **RepeatedUploadFailureDropped** Number of events lost due to repeated upload failures for a single buffer. - **SettingsHttpAttempts** Number of attempts to contact OneSettings service. @@ -2940,18 +2914,6 @@ The following fields are available: - **VortexHttpFailures5xx** Number of 500-599 error codes received from Vortex. - **VortexHttpResponseFailures** Number of Vortex responses that are not 2XX or 400. - **VortexHttpResponsesWithDroppedEvents** Number of Vortex responses containing at least 1 dropped event. -- **Ω霗⺴䷞釬膏੶ˀ䊋䏾៬㝟쀩ﻊႌ᪘绮開웷** No content is currently available. -- **ⴧꈌ噱罼[ᱪ頱찲刕떈ϩꗊ꒶兛槞捖䏛늊邋瑟⌴슰ݎ뜼뱥윞ᶃ** No content is currently available. -- **ꋦɓ☴槼ꏍ䔕趸邽뽎㞖륮獵衻㚔ʅⰤ脝ꁗ㻨剧敳犿矘葹꾇䬝⨘⏇뷮쨢ʜ꟩** No content is currently available. -- **ᤴ䖋叴햢Ѵ갰㹕壑彔蕢㑟䌛݁ꕿ඼丹䆑鱡** No content is currently available. -- **덀ၫ랫Ƙퟚ᧔퐼㵜킶䆹荸활謁焄㓵犛Ɤ澴㹭ཧ** No content is currently available. -- **롰用᜜™業䬒㥆ἑ��寞⨱ᾝ䞆쨁悺릾䗳** No content is currently available. -- **뤠蔋弌놅똋궑텪邽櫰৳␮媩䉍��녑䍎񳸑** No content is currently available. -- **즬铗쐌ﰺ읟좌鄀妏 蹤㻇椤㜊䁔鿺䍇趺懤譀뫺◦ɍ煎㟹** No content is currently available. -- **斜⤏ܔ馼쯌ℬ壯ꈹ楖뢨┺挖东ⵕ疐﷤㝊䅁荹隼��䎕㹢��⭶ꮬ瀯** No content is currently available. -- **曺跬蝲㥅䬿應鄶뇵鯔㮡侪ч즗퀾祃迼猀亰햗₊珱姰㜔Ⓤ∔痨쌈ꘄ擑蜉滂** No content is currently available. -- **㚡⁓��漭䖾愶툰ꯛ慤־䨃枛䡹ꋷన件Ⴄ棅譟** No content is currently available. -- **䱉虙璫ຖꍶ搎⪴偩HttpAttempts** No content is currently available. ### TelClientSynthetic.HeartBeat_Seville_5 @@ -3519,7 +3481,6 @@ The following fields are available: - **~ersion** No content is currently available. - **AdapterTypeValue** The numeric value indicating the type of Graphics adapter. - **aiCeqId** No content is currently available. -- **aiSeqI�** No content is currently available. - **aiseqId** No content is currently available. - **aiSeqId** The event sequence ID. - **bo** No content is currently available. @@ -3577,19 +3538,23 @@ The following fields are available: - **InterfaceId** The GPU interface ID. - **IsDisplayDevice** Does the GPU have displaying capabilities? - **IsDisplayDevmce** No content is currently available. +- **IsDmsplayDevice** No content is currently available. - **IsHwSchSupported** Indicates whether the adapter supports hardware scheduling. - **IsHybridDiscrete** Does the GPU have discrete GPU capabilities in a hybrid device? - **IsHybridDiscrgte** No content is currently available. - **IsHybridIntegrated** Does the GPU have integrated GPU capabilities in a hybrid device? - **IsLDA** Is the GPU comprised of Linked Display Adapters? - **IslidHttpDevice** No content is currently available. +- **IsMiracastScWported** No content is currently available. - **IsMiracastStpported** No content is currently available. - **IsMiracastSupported** Does the GPU support Miracast? - **IsMismatc`LDA** No content is currently available. - **IsMismatchLdA** No content is currently available. - **IsMismatchLDA** Is at least one device in the Linked Display Adapters chain from a different vendor? - **IsMIsmatchLDA** No content is currently available. +- **IsMPOScWported** No content is currently available. - **IsMPOSupported** Does the GPU support Multi-Plane Overlays? +- **IsMsMiracastScWported** No content is currently available. - **IsMsMiracastSupported** Are the GPU Miracast capabilities driven by a Microsoft solution? - **IsMsMiracastSupposted** No content is currently available. - **IsPostAdapter** Is this GPU the POST GPU in the device? @@ -3598,6 +3563,7 @@ The following fields are available: - **IsRenderDevice** Does the GPU have rendering capabilities? - **IsSoftwareDevice** Is this a software implementation of the GPU? - **KMDFilePath** The file path to the location of the Display Kernel Mode Driver in the Driver Store. +- **KMDFmlePath** No content is currently available. - **MeasureEnabled** Is the device listening to MICROSOFT_KEYWORD_MEASURES? - **MeasuruEnab|ed** No content is currently available. - **MsHybridDiscrete** Indicates whether the adapter is a discrete adapter in a hybrid configuration. @@ -3610,7 +3576,6 @@ The following fields are available: - **SharedQystemMemoryB** No content is currently available. - **SharedRystemMemoRyB** No content is currently available. - **SharedSystemMemoryB** The amount of system memory shared by GPU and CPU (in bytes). -- **ShaŲedSystemMemoryB** No content is currently available. - **SubFendorID** No content is currently available. - **SubSystemAD** No content is currently available. - **SubSystemID** The subsystem ID. @@ -3618,6 +3583,7 @@ The following fields are available: - **SubVendorID** The GPU sub vendor ID. - **Teleme|ryEnabled** No content is currently available. - **TelemetryEnabled** Is the device listening to MICROSOFT_KEYWORD_TELEMETRY? +- **TelInvEvntTragger** No content is currently available. - **TelInvEvntTrigger** What triggered this event to be logged? Example: 0 (GPU enumeration) or 1 (DxgKrnlTelemetry provider toggling) - **TelInvEvntTrihger** No content is currently available. - **version** The event version. @@ -3715,6 +3681,8 @@ The following fields are available: - **AppTiieStamp** No content is currently available. - **AppTiíeStamp** No content is currently available. - **AppTimeStamp** The date/time stamp of the app. +- **AppTimeSTamp** No content is currently available. +- **AppVerrion** No content is currently available. - **AppVersioj** No content is currently available. - **AppVersion** The version of the app that has crashed. - **BeportId** No content is currently available. @@ -4228,7 +4196,6 @@ The following fields are available: - **ProductVersion** The product version that is included in the driver file. - **Service** The name of the service that is installed for the device. - **WdfVersion** The Windows Driver Framework version. -- **Wd�Version** No content is currently available. ### Microsoft.Windows.Inventory.Core.InventoryDriverBinaryRemove @@ -5112,7 +5079,6 @@ The following fields are available: - **CClienVersion** No content is currently available. - **CDNCountryCode** Two letter country abbreviation for the Content Distribution Network (CDN) location. - **CDNId** The unique identifier of a specific device, used to identify how many devices are encountering success or a particular issue. -- **ClientVer�ion** No content is currently available. - **Clientversion** No content is currently available. - **ClientVersion** The version number of the software distribution client. - **ClientVersiOn** No content is currently available. @@ -5210,6 +5176,7 @@ The following fields are available: - **QualityUpdatePause** Indicates whether quality OS updates are paused on the device. - **QualityUpdatePausePeriod** The pause duration configured for quality OS updates on the device (in days). - **QualityUplatePausmPeriod** No content is currently available. +- **QualityWpdatePause** No content is currently available. - **RelatedCV** The previous Correlation Vector that was used before swapping with a new one - **RelntedCV** No content is currently available. - **ScanDSrationInSeconds** No content is currently available. @@ -5231,6 +5198,7 @@ The following fields are available: - **TotalNumMetadataSignatures** The total number of metadata signatures checks done for new metadata that was synced down. - **TotalNumMetadaTaSignatures** No content is currently available. - **WebServiceRetryMethods** Web service method requests that needed to be retried to complete operation. +- **WebServicmRetryMethods** No content is currently available. - **WUDericeID** No content is currently available. - **WUDeviceID** The unique identifier of a specific device, used to identify how many devices are encountering success or a particular issue. - **WUDewiceID** No content is currently available. @@ -5303,6 +5271,7 @@ The following fields are available: - **CallerApplictionaName** No content is currently available. - **CbsDownloadMethod** Indicates whether the download was a full- or a partial-file download. - **CbsMethod** The method used for downloading the update content related to the Component Based Servicing (CBS) technology. +- **CDNCotntryCode** No content is currently available. - **CDNCoun.ryCdel** No content is currently available. - **CDNCoundryCode** No content is currently available. - **CDNCountryCode** Two letter country abbreviation for the Content Distribution Network (CDN) location. @@ -5378,10 +5347,12 @@ The following fields are available: - **QualityUpdatePause** Indicates whether quality OS updates are paused on the device. - **RdvisionNumber** No content is currently available. - **Reason** A 32-bit integer representing the reason the update is blocked from being downloaded in the background. +- **ReguiationResult** No content is currently available. - **RegulationReason** The reason that the update is regulated - **regulationResult** No content is currently available. - **RegulationResult** The result code (HResult) of the last attempt to contact the regulation web service for download regulation of update content. - **RegulatIonResult** No content is currently available. +- **ReiatedCV** No content is currently available. - **RelatedCS** No content is currently available. - **RelatedCV** The Correlation Vector that was used before the most recent change to a new Correlation Vector. - **RelntedCV** No content is currently available. @@ -5531,6 +5502,7 @@ The following fields are available: - **IsSuccessFailurePostReboot** Indicates whether the update succeeded and then failed after a restart. - **IsSuccessFailurePst.Reboot** No content is currently available. - **IsWUfBDualScanEnabled** Indicates whether Windows Update for Business dual scan is enabled on the device. +- **IsWufBEnabled** No content is currently available. - **IsWUfBEnabled** Indicates whether Windows Update for Business is enabled on the device. - **IsWVfBDualScanEnabled** No content is currently available. - **IsWVfBEnabled** No content is currently available. @@ -7016,7 +6988,6 @@ The following fields are available: - **dkwnloadModeSrc** No content is currently available. - **doErrorCode** The Delivery Optimization error code that was returned. - **dowflinkBps** No content is currently available. -- **dow�loadMode** No content is currently available. - **downlinkBps** The maximum measured available download bandwidth (in bytes per second). - **downlinkUsageBps** The download speed (in bytes per second). - **downloadMode** The download mode used for this file download session. @@ -7111,12 +7082,12 @@ The following fields are available: - **doClientVersion** The version of the Delivery Optimization client. - **doErrorC/de** No content is currently available. - **doErrorCode** The Delivery Optimization error code that was returned. +- **doErrorCoee** No content is currently available. - **downloadMode** The download mode used for this file download session (CdnOnly = 0, Lan = 1, Group = 2, Internet = 3, Simple = 99, Bypass = 100). - **downloadModeReason** Reason for the download. - **downloadModeSrc** Source of the DownloadMode setting (KvsProvider = 0, GeoProvider = 1, GeoVerProvider = 2, CpProvider = 3, DiscoveryProvider = 4, RegistryProvider = 5, GroupPolicyProvider = 6, MdmProvider = 7, SettingsProvider = 8, InvalidProviderType = 9). - **errorCode** The error code that was returned. - **experimejtId** No content is currently available. -- **experimen�Id** No content is currently available. - **experimentId** ID used to correlate client/services calls that are part of the same test during A/B testing. - **fiheID** No content is currently available. - **fileID** The ID of the file being downloaded. @@ -7149,21 +7120,15 @@ This event represents a failure to download from a CDN with Delivery Optimizatio The following fields are available: -- **`esponseAize** No content is currently available. - **cdnHeaders** The HTTP headers returned by the CDN. - **cdnIp** The IP address of the CDN. - **cdnUrl** The URL of the CDN. - **eErrorCode** No content is currently available. - **eErrorCunt** No content is currently available. - **errorCode** The error code that was returned. -- **errorCode‡httpStatusCodw** No content is currently available. -- **errorCode‡httpSvatusCodw** No content is currently available. - **errorCount** The total number of times this error code was seen since the last FailureCdnCommunication event was encountered. -- **errorSount** No content is currently available. - **experimentId** When running a test, this is used to correlate with other events that are part of the same test. -- **f{leID** No content is currently available. - **fileID** The ID of the file being downloaded. -- **fkleID** No content is currently available. - **htppStatusCode** No content is currently available. - **httpStatusCode** The HTTP status code returned by the CDN. - **isHeadRequest** The type of HTTP request that was sent to the CDN. Example: HEAD or GET @@ -7172,7 +7137,6 @@ The following fields are available: - **requestSize** The size of the range requested from the CDN. - **responseSize** The size of the range response received from the CDN. - **sessionID** The ID of the download session. -- **swssionIDcdnUrl** No content is currently available. ### Microsoft.OSG.DU.DeliveryOptClient.JobError From 7a947ae3519aedbde69470085100caf413902771 Mon Sep 17 00:00:00 2001 From: Brian Lich Date: Tue, 5 Mar 2019 08:50:03 -0800 Subject: [PATCH 038/724] new build --- ...ndows-diagnostic-events-and-fields-1903.md | 22 +++++++++---------- 1 file changed, 11 insertions(+), 11 deletions(-) diff --git a/windows/privacy/basic-level-windows-diagnostic-events-and-fields-1903.md b/windows/privacy/basic-level-windows-diagnostic-events-and-fields-1903.md index 551c98d759..2c69ccb1c3 100644 --- a/windows/privacy/basic-level-windows-diagnostic-events-and-fields-1903.md +++ b/windows/privacy/basic-level-windows-diagnostic-events-and-fields-1903.md @@ -247,19 +247,19 @@ The following fields are available: ### Microsoft.Windows.Security.AppLockerCSP.IsDependencySatisfiedStart -No content is currently available. +Indicates the start of a call to the IsDependencySatisfied function in the Configuration Service Provider (CSP). ### Microsoft.Windows.Security.AppLockerCSP.IsDependencySatisfiedStop -No content is currently available. +Indicates the end of an IsDependencySatisfied function call in the Configuration Service Provider (CSP). The following fields are available: -- **edpActive** No content is currently available. -- **hr** No content is currently available. -- **internalHr** No content is currently available. +- **edpActive** Indicates whether enterprise data protection is active. +- **hr** HRESULT that is reported. +- **internalHr** Internal HRESULT that is reported. ### Microsoft.Windows.Security.AppLockerCSP.SetValueParams @@ -2566,7 +2566,7 @@ The following fields are available: ### TelClientSynthetic.ServiceMain_DevHealthMonEvent -No content is currently available. +This event is a low latency health alert that is part of the 4Nines device health monitoring feature currently available on Surface Hub devices. For a device that is opted in, this event is sent before shutdown to signal that the device is about to be powered down. @@ -3766,14 +3766,14 @@ The following fields are available: ### Microsoft.Windows.PBR.BitLockerWipeFinished -No content is currently available. +This event sends error data after the BitLocker wipe finishes if there were any issues during the wipe. The following fields are available: -- **error** No content is currently available. -- **sessionID** No content is currently available. -- **succeeded** No content is currently available. -- **timestamp** No content is currently available. +- **error** The error code if there were any issues during the BitLocker wipe. +- **sessionID** This is the session ID. +- **succeeded** Indicates the BitLocker wipe successful completed. +- **timestamp** Timestamp of the BitLocker wipe. ### Microsoft.Windows.PBR.BootState From bd69c42d7cf792a0f1c46a63f841068d4d16639f Mon Sep 17 00:00:00 2001 From: Jeanie Decker Date: Wed, 6 Mar 2019 08:15:25 -0800 Subject: [PATCH 039/724] Privacy setting --- windows/configuration/TOC.md | 1 + windows/configuration/wcd/wcd-privacy.md | 30 ++++++++++++++++++++++++ windows/configuration/wcd/wcd.md | 3 ++- 3 files changed, 33 insertions(+), 1 deletion(-) create mode 100644 windows/configuration/wcd/wcd-privacy.md diff --git a/windows/configuration/TOC.md b/windows/configuration/TOC.md index 6be8931eeb..b7102419c7 100644 --- a/windows/configuration/TOC.md +++ b/windows/configuration/TOC.md @@ -102,6 +102,7 @@ #### [OtherAssets](wcd/wcd-otherassets.md) #### [Personalization](wcd/wcd-personalization.md) #### [Policies](wcd/wcd-policies.md) +#### [Privacy](wcd/wcd-privacy.md) #### [ProvisioningCommands](wcd/wcd-provisioningcommands.md) #### [RcsPresence](wcd/wcd-rcspresence.md) #### [SharedPC](wcd/wcd-sharedpc.md) diff --git a/windows/configuration/wcd/wcd-privacy.md b/windows/configuration/wcd/wcd-privacy.md new file mode 100644 index 0000000000..1451f639d8 --- /dev/null +++ b/windows/configuration/wcd/wcd-privacy.md @@ -0,0 +1,30 @@ +--- +title: Privacy (Windows 10) +description: This section describes the Privacy settings that you can configure in provisioning packages for Windows 10 using Windows Configuration Designer. +ms.prod: w10 +ms.mktglfcycl: deploy +ms.sitesec: library +author: jdeckerMS +ms.localizationpriority: medium +ms.author: jdecker +ms.topic: article +ms.date: 09/06/2017 +--- + +# Privacy (Windows Configuration Designer reference) + +Use **Privacy** to configure settings for app activation with voice. + +## Applies to + +| Setting | Desktop editions | Mobile editions | Surface Hub | HoloLens | IoT Core | +| --- | :---: | :---: | :---: | :---: | :---: | +| All settings | X | X | X | | X | + +## LetAppsActivateWithVoice + +Select between **User is in control**, **Force allow**, or **Force deny**. + +## LetAppsActivateWithVoiceAboveLock + +Select between **User is in control**, **Force allow**, or **Force deny**. \ No newline at end of file diff --git a/windows/configuration/wcd/wcd.md b/windows/configuration/wcd/wcd.md index c3a9c02907..5f712fd6a9 100644 --- a/windows/configuration/wcd/wcd.md +++ b/windows/configuration/wcd/wcd.md @@ -62,8 +62,9 @@ This section describes the settings that you can configure in [provisioning pack | [OtherAssets](wcd-otherassets.md) | | X | | | | | [Personalization](wcd-personalization.md) | X | | | | | | [Policies](wcd-policies.md) | X | X | X | X | X | +| [Privacy](wcd-folders.md) |X | X | X | | X | | [ProvisioningCommands](wcd-provisioningcommands.md) | X | | | | | -[RcsPresence](wcd-rcspresence.md) | | X | | | | +| [RcsPresence](wcd-rcspresence.md) | | X | | | | | [SharedPC](wcd-sharedpc.md) | X | | | | | | [Shell](wcd-shell.md) | | X | | | | | [SMISettings](wcd-smisettings.md) | X | | | | | From c46365464072c7c0be4181132f85d8a14ff78271 Mon Sep 17 00:00:00 2001 From: Jeanie Decker Date: Wed, 6 Mar 2019 08:17:45 -0800 Subject: [PATCH 040/724] Privacy added to changed settings --- windows/configuration/wcd/wcd-changes.md | 10 ++++++++-- 1 file changed, 8 insertions(+), 2 deletions(-) diff --git a/windows/configuration/wcd/wcd-changes.md b/windows/configuration/wcd/wcd-changes.md index b51c2ab60e..7b0376fa7e 100644 --- a/windows/configuration/wcd/wcd-changes.md +++ b/windows/configuration/wcd/wcd-changes.md @@ -13,7 +13,13 @@ ms.date: 10/02/2018 # Changes to settings in Windows Configuration Designer -Settings added in Windows 10, version 1809 +## Settings added in Windows 10, version ? + +- [Privacy](wcd-privacy.md) + +## Settings removed in Windows 10, version ? + +## Settings added in Windows 10, version 1809 - [Browser > AllowPrelaunch](wcd-browser.md#allowprelaunch) @@ -74,7 +80,7 @@ Settings added in Windows 10, version 1809 - [WindowsHelloForBusiness](wcd-windowshelloforbusiness.md) -Settings removed in Windows 10, version 1809 +## Settings removed in Windows 10, version 1809 - [CellCore](wcd-cellcore.md) - [Policies > Browser:](wcd-policies.md#browser) From d2a0ddf817893187444845abcc26d145c355b35a Mon Sep 17 00:00:00 2001 From: Brian Lich Date: Wed, 6 Mar 2019 08:55:45 -0800 Subject: [PATCH 041/724] new build --- ...ndows-diagnostic-events-and-fields-1703.md | 2 +- ...ndows-diagnostic-events-and-fields-1709.md | 2 +- ...ndows-diagnostic-events-and-fields-1803.md | 2 +- ...ndows-diagnostic-events-and-fields-1809.md | 89 ++++++------------- 4 files changed, 32 insertions(+), 63 deletions(-) diff --git a/windows/privacy/basic-level-windows-diagnostic-events-and-fields-1703.md b/windows/privacy/basic-level-windows-diagnostic-events-and-fields-1703.md index 5dfc2fcfac..326d9590b2 100644 --- a/windows/privacy/basic-level-windows-diagnostic-events-and-fields-1703.md +++ b/windows/privacy/basic-level-windows-diagnostic-events-and-fields-1703.md @@ -13,7 +13,7 @@ manager: dansimp ms.collection: M365-security-compliance ms.topic: article audience: ITPro -ms.date: 03/04/2019 +ms.date: 03/05/2019 --- diff --git a/windows/privacy/basic-level-windows-diagnostic-events-and-fields-1709.md b/windows/privacy/basic-level-windows-diagnostic-events-and-fields-1709.md index d516d29754..2e4fd66068 100644 --- a/windows/privacy/basic-level-windows-diagnostic-events-and-fields-1709.md +++ b/windows/privacy/basic-level-windows-diagnostic-events-and-fields-1709.md @@ -13,7 +13,7 @@ manager: dansimp ms.collection: M365-security-compliance ms.topic: article audience: ITPro -ms.date: 03/04/2019 +ms.date: 03/05/2019 --- diff --git a/windows/privacy/basic-level-windows-diagnostic-events-and-fields-1803.md b/windows/privacy/basic-level-windows-diagnostic-events-and-fields-1803.md index 6c84d0381d..055c370bdd 100644 --- a/windows/privacy/basic-level-windows-diagnostic-events-and-fields-1803.md +++ b/windows/privacy/basic-level-windows-diagnostic-events-and-fields-1803.md @@ -13,7 +13,7 @@ manager: dansimp ms.collection: M365-security-compliance ms.topic: article audience: ITPro -ms.date: 03/04/2019 +ms.date: 03/05/2019 --- diff --git a/windows/privacy/basic-level-windows-diagnostic-events-and-fields-1809.md b/windows/privacy/basic-level-windows-diagnostic-events-and-fields-1809.md index d9c00fdff9..f2bfe87d9d 100644 --- a/windows/privacy/basic-level-windows-diagnostic-events-and-fields-1809.md +++ b/windows/privacy/basic-level-windows-diagnostic-events-and-fields-1809.md @@ -13,7 +13,7 @@ manager: dansimp ms.collection: M365-security-compliance ms.topic: article audience: ITPro -ms.date: 03/04/2019 +ms.date: 03/05/2019 --- @@ -311,7 +311,7 @@ The following fields are available: - **DatasourceApplicationFile_RS1** An ID for the system, calculated by hashing hardware identifiers. - **DatasourceApplicationFile_RS2** An ID for the system, calculated by hashing hardware identifiers. - **DatasourceApplicationFile_RS3** The count of the number of this particular object type present on this device. -- **DatasourceApplicationFile_RS3Setup** No content is currently available. +- **DatasourceApplicationFile_RS3Setup** The count of the number of this particular object type present on this device. - **DatasourceApplicationFile_RS4** The count of the number of this particular object type present on this device. - **DatasourceApplicationFile_RS4Setup** The count of the number of this particular object type present on this device. - **DatasourceApplicationFile_RS5** The count of the number of this particular object type present on this device. @@ -350,7 +350,7 @@ The following fields are available: - **DataSourceMatchingInfoBlock_RS1** The total DataSourceMatchingInfoBlock objects targeting Windows 10 version 1607 on this device. - **DataSourceMatchingInfoBlock_RS2** The count of the number of this particular object type present on this device. - **DataSourceMatchingInfoBlock_RS3** The count of the number of this particular object type present on this device. -- **DataSourceMatchingInfoBlock_RS3Setup** No content is currently available. +- **DataSourceMatchingInfoBlock_RS3Setup** The count of the number of this particular object type present on this device. - **DataSourceMatchingInfoBlock_RS4** The count of the number of this particular object type present on this device. - **DataSourceMatchingInfoBlock_RS4Setup** The count of the number of this particular object type present on this device. - **DataSourceMatchingInfoBlock_RS5** The count of the number of this particular object type present on this device. @@ -363,7 +363,7 @@ The following fields are available: - **DataSourceMatchingInfoPassive_RS1** The total DataSourceMatchingInfoPassive objects targeting Windows 10 version 1607 on this device. - **DataSourceMatchingInfoPassive_RS2** The count of the number of this particular object type present on this device. - **DataSourceMatchingInfoPassive_RS3** The count of the number of this particular object type present on this device. -- **DataSourceMatchingInfoPassive_RS3Setup** No content is currently available. +- **DataSourceMatchingInfoPassive_RS3Setup** The count of the number of this particular object type present on this device. - **DataSourceMatchingInfoPassive_RS4** The count of the number of this particular object type present on this device. - **DataSourceMatchingInfoPassive_RS4Setup** The count of the number of this particular object type present on this device. - **DataSourceMatchingInfoPassive_RS5** The count of the number of this particular object type present on this device. @@ -376,7 +376,7 @@ The following fields are available: - **DataSourceMatchingInfoPostUpgrade_RS1** The total DataSourceMatchingInfoPostUpgrade objects targeting Windows 10 version 1607 on this device. - **DataSourceMatchingInfoPostUpgrade_RS2** The total DataSourceMatchingInfoPostUpgrade objects targeting Windows 10 version 1703 on this device. - **DataSourceMatchingInfoPostUpgrade_RS3** The total DataSourceMatchingInfoPostUpgrade objects targeting Windows 10 version 1709 on this device. -- **DataSourceMatchingInfoPostUpgrade_RS3Setup** No content is currently available. +- **DataSourceMatchingInfoPostUpgrade_RS3Setup** The count of the number of this particular object type present on this device. - **DataSourceMatchingInfoPostUpgrade_RS4** The count of the number of this particular object type present on this device. - **DataSourceMatchingInfoPostUpgrade_RS4Setup** The count of the number of this particular object type present on this device. - **DataSourceMatchingInfoPostUpgrade_RS5** The count of the number of this particular object type present on this device. @@ -402,7 +402,7 @@ The following fields are available: - **DecisionApplicationFile_RS1** The count of the number of this particular object type present on this device. - **DecisionApplicationFile_RS2** The count of the number of this particular object type present on this device. - **DecisionApplicationFile_RS3** The count of the number of this particular object type present on this device. -- **DecisionApplicationFile_RS3Setup** No content is currently available. +- **DecisionApplicationFile_RS3Setup** The count of the number of this particular object type present on this device. - **DecisionApplicationFile_RS4** The count of the number of this particular object type present on this device. - **DecisionApplicationFile_RS4Setup** The count of the number of this particular object type present on this device. - **DecisionApplicationFile_RS5** The count of the number of this particular object type present on this device. @@ -441,7 +441,7 @@ The following fields are available: - **DecisionMatchingInfoBlock_RS1** The total DecisionMatchingInfoBlock objects targeting Windows 10 version 1607 present on this device. - **DecisionMatchingInfoBlock_RS2** The total DecisionMatchingInfoBlock objects targeting Windows 10 version 1703 present on this device. - **DecisionMatchingInfoBlock_RS3** The total DecisionMatchingInfoBlock objects targeting Windows 10 version 1709 present on this device. -- **DecisionMatchingInfoBlock_RS3Setup** No content is currently available. +- **DecisionMatchingInfoBlock_RS3Setup** The count of the number of this particular object type present on this device. - **DecisionMatchingInfoBlock_RS4** The total DecisionMatchingInfoBlock objects targeting Windows 10 version 1803 present on this device. - **DecisionMatchingInfoBlock_RS4Setup** The count of the number of this particular object type present on this device. - **DecisionMatchingInfoBlock_RS5** The count of the number of this particular object type present on this device. @@ -454,7 +454,7 @@ The following fields are available: - **DecisionMatchingInfoPassive_RS1** The total DecisionMatchingInfoPassive objects targeting Windows 10 version 1607 on this device. - **DecisionMatchingInfoPassive_RS2** The total DecisionMatchingInfoPassive objects targeting Windows 10 version 1703 on this device. - **DecisionMatchingInfoPassive_RS3** The total DecisionMatchingInfoPassive objects targeting Windows 10 version 1803 on this device. -- **DecisionMatchingInfoPassive_RS3Setup** No content is currently available. +- **DecisionMatchingInfoPassive_RS3Setup** The count of the number of this particular object type present on this device. - **DecisionMatchingInfoPassive_RS4** The count of the number of this particular object type present on this device. - **DecisionMatchingInfoPassive_RS4Setup** The count of the number of this particular object type present on this device. - **DecisionMatchingInfoPassive_RS5** The count of the number of this particular object type present on this device. @@ -467,7 +467,7 @@ The following fields are available: - **DecisionMatchingInfoPostUpgrade_RS1** The total DecisionMatchingInfoPostUpgrade objects targeting Windows 10 version 1607 on this device. - **DecisionMatchingInfoPostUpgrade_RS2** The total DecisionMatchingInfoPostUpgrade objects targeting Windows 10 version 1703 on this device. - **DecisionMatchingInfoPostUpgrade_RS3** The total DecisionMatchingInfoPostUpgrade objects targeting Windows 10 version 1709 on this device. -- **DecisionMatchingInfoPostUpgrade_RS3Setup** No content is currently available. +- **DecisionMatchingInfoPostUpgrade_RS3Setup** The count of the number of this particular object type present on this device. - **DecisionMatchingInfoPostUpgrade_RS4** The count of the number of this particular object type present on this device. - **DecisionMatchingInfoPostUpgrade_RS4Setup** The count of the number of this particular object type present on this device. - **DecisionMatchingInfoPostUpgrade_RS5** The count of the number of this particular object type present on this device. @@ -480,7 +480,7 @@ The following fields are available: - **DecisionMediaCenter_RS1** The total DecisionMediaCenter objects targeting Windows 10 version 1607 present on this device. - **DecisionMediaCenter_RS2** The total DecisionMediaCenter objects targeting Windows 10 version 1703 present on this device. - **DecisionMediaCenter_RS3** The total DecisionMediaCenter objects targeting Windows 10 version 1709 present on this device. -- **DecisionMediaCenter_RS3Setup** No content is currently available. +- **DecisionMediaCenter_RS3Setup** The count of the number of this particular object type present on this device. - **DecisionMediaCenter_RS4** The total DecisionMediaCenter objects targeting Windows 10 version 1803 present on this device. - **DecisionMediaCenter_RS4Setup** The count of the number of this particular object type present on this device. - **DecisionMediaCenter_RS5** The count of the number of this particular object type present on this device. @@ -516,8 +516,6 @@ The following fields are available: - **InventoryUplevelDriverPackage** The count of the number of this particular object type present on this device. - **PCFP** The count of the number of this particular object type present on this device. - **SystemMemory** The count of the number of this particular object type present on this device. -- **SystemProcesqorP2efetchW** No content is currently available. -- **SystemProcessorCompapeExchange** No content is currently available. - **SystemProcessorCompareExchange** The count of the number of this particular object type present on this device. - **SystemProcessorLahfSahf** The count of the number of this particular object type present on this device. - **SystemProcessorNx** The total number of objects of this type present on this device. @@ -527,14 +525,13 @@ The following fields are available: - **SystemWim** The total number of objects of this type present on this device. - **SystemWindowsActivationStatus** The count of the number of this particular object type present on this device. - **SystemWlan** The total number of objects of this type present on this device. -- **SystemWlAn** No content is currently available. - **Wmdrm_19ASetup** The count of the number of this particular object type present on this device. - **Wmdrm_19H1** The count of the number of this particular object type present on this device. - **Wmdrm_19H1Setup** The total Wmdrm objects targeting the next release of Windows on this device. - **Wmdrm_RS1** An ID for the system, calculated by hashing hardware identifiers. - **Wmdrm_RS2** An ID for the system, calculated by hashing hardware identifiers. - **Wmdrm_RS3** An ID for the system, calculated by hashing hardware identifiers. -- **Wmdrm_RS3Setup** No content is currently available. +- **Wmdrm_RS3Setup** The count of the number of this particular object type present on this device. - **Wmdrm_RS4** The total Wmdrm objects targeting Windows 10, version 1803 present on this device. - **Wmdrm_RS4Setup** The count of the number of this particular object type present on this device. - **Wmdrm_RS5** The count of the number of this particular object type present on this device. @@ -1366,7 +1363,6 @@ The following fields are available: - **pageFile** The current committed memory limit for the system or the current process, whichever is smaller (in bytes). - **ram** The amount of memory on the device. - **ramKB** The amount of memory (in KB). -- **virt5al** No content is currently available. - **virtual** The size of the user-mode portion of the virtual address space of the calling process (in bytes). - **virtualKB** The amount of virtual memory (in KB). @@ -1404,7 +1400,6 @@ The following fields are available: - **AppraiserVersion** The version of the Appraiser file generating the events. - **Blocking** Is the upgrade blocked due to the processor? - **CompareExchange128Support** Does the CPU support CompareExchange128? -- **CompareExchange128Swpport** No content is currently available. ### Microsoft.Windows.Appraiser.General.SystemProcessorCompareExchangeRemove @@ -1747,7 +1742,6 @@ The following fields are available: - **ThrottlingUtc** Indicates if the Appraiser client is throttling its output of CUET events to avoid being disabled. This increases runtime but also telemetry reliability. - **Time** The client time of the event. - **VerboseMode** Indicates if appraiser ran in Verbose mode, which is a test-only mode with extra logging. -- **VicboseMode** No content is currently available. - **WhyFullSyncWithoutTablePrefix** Indicates the reason or reasons that a full sync was generated. @@ -1802,10 +1796,8 @@ The following fields are available: - **AppraiserEnterpriseErrorCode** The error code of the last Appraiser enterprise run. - **AppraiserErrorCode** The error code of the last Appraiser run. -- **AppraiserRunEndT.ApStamp** No content is currently available. - **AppraiserRunEndTimeStamp** The end time of the last Appraiser run. - **AppraiserRunIsInProgressOrCrashed** Flag that indicates if the Appraiser run is in progress or has crashed. -- **AppraiserRunStartT.ApStamp** No content is currently available. - **AppraiserRunStartTimeStamp** The start time of the last Appraiser run. - **AppraiserTaskEnabled** Whether the Appraiser task is enabled. - **AppraiserTaskExitCode** The Appraiser task exist code. @@ -1845,9 +1837,7 @@ The following fields are available: - **AADDeviceId** Azure Active Directory device ID. - **AzureOSIDPresent** Represents the field used to identify an Azure machine. -- **AZureOSIDPresent** No content is currently available. - **AzureVMType** Represents whether the instance is Azure VM PAAS, Azure VM IAAS or any other VMs. -- **AZureVMType** No content is currently available. - **CDJType** Represents the type of cloud domain joined for the machine. - **CommercialId** Represents the GUID for the commercial entity which the device is a member of.  Will be used to reflect insights back to customers. - **ContainerType** The type of container, such as process or virtual machine hosted. @@ -1856,7 +1846,6 @@ The following fields are available: - **IsCloudDomainJoined** Is this device joined to an Azure Active Directory (AAD) tenant? true/false - **IsDERequirementMet** Represents if the device can do device encryption. - **IsDeviceProtected** Represents if Device protected by BitLocker/Device Encryption -- **IsDeviceRrotected** No content is currently available. - **IsDomainJoined** Indicates whether a machine is joined to a domain. - **IsEDPEnabled** Represents if Enterprise data protected on the device. - **IsMDMEnrolled** Whether the device has been MDM Enrolled or not. @@ -1928,7 +1917,6 @@ The following fields are available: - **SoCName** The firmware manufacturer of the device. - **StudyID** Used to identify retail and non-retail device. - **TelemetryLevel** The telemetry level the user has opted into, such as Basic or Enhanced. -- **TelemetryLevelLimitEnha5Sed** No content is currently available. - **TelemetryLevelLimitEnhanced** The telemetry level for Windows Analytics-based solutions. - **TelemetrySettingAuthority** Determines who set the telemetry level, such as GP, MDM, or the user. - **TPMManufacturerId** The ID of the TPM manufacturer. @@ -1982,7 +1970,6 @@ The following fields are available: - **DeveloperUnlockStatus** Represents if a device has been developer unlocked by the user or Group Policy. - **DeviceTimeZone** The time zone that is set on the device. Example: Pacific Standard Time - **GenuineState** Retrieves the ID Value specifying the OS Genuine check. -- **GenuineStateanchNIsPortableOperatingSystem** No content is currently available. - **InstallationType** Retrieves the type of OS installation. (Clean, Upgrade, Reset, Refresh, Update). - **InstallLanguage** The first language installed on the user machine. - **IsDeviceRetailDemo** Retrieves if the device is running in demo mode. @@ -2008,7 +1995,6 @@ The following fields are available: - **ServiceMachinePort** Retrieves the port of the KMS host used for anti-piracy. - **ServiceProductKeyID** Retrieves the License key of the KMS - **SharedPCMode** Returns Boolean for education devices used as shared cart -- **Signalure** No content is currently available. - **Signature** Retrieves if it is a signature machine sold by Microsoft store. - **SLICStatus** Whether a SLIC table exists on the device. - **SLICVersion** Returns OS type/version from SLIC table. @@ -2024,7 +2010,6 @@ The following fields are available: - **ActivityHistoryCloudSync** Current state of the activity history cloud sync setting. - **ActivityHistoryCollection** Current state of the activity history collection setting. - **AdvertisingId** Current state of the advertising ID setting. -- **AdvertisiNgId** No content is currently available. - **AppDiagnostics** Current state of the app diagnostics setting. - **Appointments** Current state of the calendar setting. - **Bluetooth** Current state of the Bluetooth capability setting. @@ -2038,7 +2023,6 @@ The following fields are available: - **FindMyDevice** Current state of the "find my device" setting. - **GazeInput** Current state of the gaze input setting. - **HumanInterfaceDevice** Current state of the human interface device setting. -- **InkTypeImpro_ement** No content is currently available. - **InkTypeImprovement** Current state of the improve inking and typing setting. - **Location** Current state of the location setting. - **LocationHistory** Current state of the location history setting. @@ -2109,7 +2093,6 @@ This event is used to gather basic speech settings on the device. The following fields are available: -- **Abo_eLockEnabled** No content is currently available. - **AboveLockEnabled** Cortana setting that represents if Cortana can be invoked when the device is locked. - **GPAllowInputPersonalization** Indicates if a Group Policy setting has enabled speech functionalities. - **HolographicSpeechInputDisabled** Holographic setting that represents if the attached HMD devices have speech functionality disabled by the user. @@ -2154,7 +2137,6 @@ This event sends data about the logical/physical display size, resolution and nu The following fields are available: -- **InternalPrimaryDis0layResolutionHorizontal** No content is currently available. - **InternalPrimaryDisplayLogicalDPIX** Retrieves the logical DPI in the x-direction of the internal display. - **InternalPrimaryDisplayLogicalDPIY** Retrieves the logical DPI in the y-direction of the internal display. - **InternalPrimaryDisplayPhysicalDPIX** Retrieves the physical DPI in the x-direction of the internal display. @@ -2189,14 +2171,12 @@ This event provides information about the current users privacy settings and whe The following fields are available: -- **ActitityHistoryCollection** No content is currently available. - **Activity** Current state of the activity history setting. - **ActivityHistoryCloudSync** Current state of the activity history cloud sync setting. - **ActivityHistoryCollection** Current state of the activity history collection setting. - **AdvertisingId** Current state of the advertising ID setting. - **AppDiagnostics** Current state of the app diagnostics setting. - **Appointments** Current state of the calendar setting. -- **Bluatooth** No content is currently available. - **Bluetooth** Current state of the Bluetooth capability setting. - **BluetoothSync** Current state of the Bluetooth sync capability setting. - **BroadFileSystemAccess** Current state of the broad file system access setting. @@ -2221,7 +2201,6 @@ The following fields are available: - **SensorsCustom** Current state of the custom sensor setting. - **SerialCommunication** Current state of the serial communication setting. - **Sms** Current state of the text messaging setting. -- **SpeechPersonaliza|ion** No content is currently available. - **SpeechPersonalization** Current state of the speech services setting. - **USB** Current state of the USB setting. - **UserAccountInformation** Current state of the account information setting. @@ -2257,7 +2236,6 @@ The following fields are available: - **AppStoreAutoUpdate** Retrieves the Appstore settings for auto upgrade. (Enable/Disabled). - **AppStoreAutoUpdateMDM** Retrieves the App Auto Update value for MDM: 0 - Disallowed. 1 - Allowed. 2 - Not configured. Default: [2] Not configured - **AppStoreAutoUpdatePolicy** Retrieves the Microsoft Store App Auto Update group policy setting -- **DelayeferUpg** No content is currently available. - **DelayUpgrade** Retrieves the Windows upgrade flag for delaying upgrades. - **OSAssessmentFeatureOutOfDate** How many days has it been since a the last feature update was released but the device did not install it? - **OSAssessmentForFeatureUpdate** Is the device is on the latest feature update? @@ -2278,7 +2256,6 @@ The following fields are available: - **WUMachineId** Retrieves the Windows Update (WU) Machine Identifier. - **WUPauseState** Retrieves WU setting to determine if updates are paused. - **WUServer** Retrieves the HTTP(S) URL of the WSUS server that is used by Automatic Updates and API callers (by default). -- **WWPauseState** No content is currently available. ### Census.Xbox @@ -2469,10 +2446,8 @@ Describes the installation state for all hardware and software components availa The following fields are available: - **action** The change that was invoked on a device inventory object. -- **invent** No content is currently available. - **inventoryId** Device ID used for Compatibility testing - **objectInstanceId** Object identity which is unique within the device scope. -- **objectInstanceId** No content is currently available. - **objectType** Indicates the object type that the event applies to. - **syncId** A string used to group StartSync, EndSync, Add, and Remove operations that belong together. This field is unique by Sync period and is used to disambiguate in situations where multiple agents perform overlapping inventories for the same object. @@ -2697,28 +2672,16 @@ Fired by UTC at startup to signal what data we are allowed to collect. The following fields are available: -- **Can&erformDiagnosticEscalations** No content is currently available. -- **Can@erformDiagnosticEscalations** No content is currently available. - **CanAddMsaToMsTelemetry** True if we can add MSA PUID and CID to telemetry, false otherwise. - **CanCollectAnyTelemetry** True if we are allowed to collect partner telemetry, false otherwise. - **CanCollectCoreTelemetry** True if we can collect CORE/Basic telemetry, false otherwise. -- **CanCollectCoreTelemetzy** No content is currently available. - **CanCollectHeartbeats** True if we can collect heartbeat telemetry, false otherwise. -- **CanColleCtHeartbeats** No content is currently available. -- **CanCollectNsTelemetry** No content is currently available. - **CanCollectOsTelemetry** True if we can collect diagnostic data telemetry, false otherwise. - **CanCollectWindowsAnalyticsEvents** True if we can collect Windows Analytics data, false otherwise. -- **CanPerformDiagngsticEscalations** No content is currently available. - **CanPerformDiagnosticEscalations** True if we can perform diagnostic escalation collection, false otherwise. - **CanPerformTraceEscalations** True if we can perform trace escalation collection, false otherwise. -- **CanPerforoDiagnosticEscalations** No content is currently available. -- **CanRepor5Acenarios** No content is currently available. -- **CanReportscenarios** No content is currently available. - **CanReportScenarios** True if we can report scenario completions, false otherwise. -- **Previous&ermissions** No content is currently available. -- **PreviousPermissaons** No content is currently available. - **PreviousPermissions** Bitmask of previous telemetry state. -- **TransitionfromEverythingOff** No content is currently available. - **TransitionFromEverythingOff** True if we are transitioning from all telemetry being disabled, false otherwise. @@ -2730,9 +2693,7 @@ The following fields are available: - **CensusExitCode** Returns last execution codes from census client run. - **CensusStartTime** Returns timestamp corresponding to last successful census run. -- **CensusTas{Enasled** No content is currently available. - **CensusTaskEnabled** Returns Boolean value for the census task (Enable/Disable) on client machine. -- **CwnsusStartTime** No content is currently available. - **LastConnectivityLossTime** Retrieves the last time the device lost free network. - **NetworkState** Retrieves the network state: 0 = No network. 1 = Restricted network. 2 = Free network. - **NoNetworkTime** Retrieves the time spent with no network (since the last time) in seconds. @@ -2745,26 +2706,17 @@ This event sends data about the health and quality of the diagnostic data from t The following fields are available: -- **@venStomeRe­etSizeSum** No content is currently available. -- **597pressedBytesUploaded** No content is currently available. -- **5ensusExitCode** No content is currently available. -- **5ensusStartTime** No content is currently available. -- **5ensusTaskEnabled** No content is currently available. - **AgentConnectaonErrorsCount** No content is currently available. - **AgentConnectionErrorsCount** Number of non-timeout errors associated with the host/agent channel. - **AudioInMS** No content is currently available. - **AudioOutMS** No content is currently available. - **BackgroundMouseSec** No content is currently available. -- **CensdsExitCode** No content is currently available. -- **CensdsStartTime** No content is currently available. -- **CensdsTaskEnabled** No content is currently available. - **CensusExitCode** The last exit code of the Census task. - **CensusStartTime** Time of last Census run. - **CensusTaskEnabled** True if Census is enabled, false otherwise. - **Com`ressedBytesUploaded** No content is currently available. - **CompressedBytesUploaded** Number of compressed bytes uploaded. - **CompressedBytesUtyPropagatedSec** No content is currently available. -- **ConsdmerDroppedCount** No content is currently available. - **ConsumerDroppedCount** Number of events dropped at consumer layer of telemetry client. - **CriticalDataDbDro`pedCount** No content is currently available. - **CriticalDataDbDroppedCount** Number of critical data sampled events dropped at the database layer. @@ -2783,12 +2735,16 @@ The following fields are available: - **DbDroppedFailureCountAgentC** No content is currently available. - **DbDroppedFullCount** Number of events dropped due to DB fullness. - **DecodingDroppedCount** Number of events dropped due to decoding failures. +- **eettingsHttpAttempts** No content is currently available. +- **eettingsHttpFailures** No content is currently available. - **EnteringCriticalOverfl** No content is currently available. - **EnteringCriticalOverflowDroppedCounter** Number of events dropped due to critical overflow mode being initiated. - **EtwDroppedBufferCount** Number of buffers dropped in the UTC ETW session. +- **EtwDroppedBuffinCount** No content is currently available. - **EtwDroppedCoent** No content is currently available. - **EtwDroppedCount** Number of events dropped at ETW layer of telemetry client. - **EventSequence** No content is currently available. +- **EventsPersistedCkunt** No content is currently available. - **EventsPersistedCount** Number of events that reached the PersistEvent stage. - **EventsPtesistedCount** No content is currently available. - **EventStoreLifetimeResetCo}nter** No content is currently available. @@ -2807,6 +2763,7 @@ The following fields are available: - **FellTriggerBufferDroppedCount** No content is currently available. - **Flags** Flags indicating device state such as network state, battery state, and opt-in state. - **FullTriggerBufferDroppedCount** Number of events dropped due to trigger buffer being full. +- **FullTriggerBuffinDroppedCount** No content is currently available. - **FullTrihgerBufferDroppedCount** No content is currently available. - **HeartBeatSequenceNumber** The sequence number of this heartbeat. - **Inv,:3tyttpCodeCount** No content is currently available. @@ -2819,6 +2776,7 @@ The following fields are available: - **LastEventSingOffender** No content is currently available. - **LastEventsizeOffender** No content is currently available. - **LastEventSizeOffender** Event name of last event which exceeded max event size. +- **LastEventSizeOffinder** No content is currently available. - **LastInv,:3tyttpCode** No content is currently available. - **LastInvali$HttpCode** No content is currently available. - **LastInvalidHttpCode** Last invalid HTTP code received from Vortex. @@ -2865,7 +2823,7 @@ The following fields are available: - **VortexHttpResmonseFailures** No content is currently available. - **VortexHttpResmonsesWithDroppedEvents** No content is currently available. - **VortexHttpResponseFailures** Number of Vortex responses that are not 2XX or 400. -- **VortexHttpResponsesWitfDroppedEvents** No content is currently available. +- **VortexHttpResponsesWihDroppedEvents** No content is currently available. - **VortexHttpResponsesWithDroppedEvents** Number of Vortex responses containing at least 1 dropped event. - **VortexHttpResponsesWitherDroppEvents** No content is currently available. - **VortexHvtpAttempts** No content is currently available. @@ -3517,22 +3475,28 @@ The following fields are available: - **DrivgrRank** No content is currently available. - **DX10EMDFilePath** No content is currently available. - **DX10UMDFilePath** The file path to the location of the DirectX 10 Display User Mode Driver in the Driver Store. +- **DX10UMDFileTath** No content is currently available. - **DX11UMDFilePath** The file path to the location of the DirectX 11 Display User Mode Driver in the Driver Store. +- **DX11UMDFileTath** No content is currently available. - **DX11UMDFmlePath** No content is currently available. - **Dx11UMDVilePath** No content is currently available. - **DX12UMDFilePaph** No content is currently available. - **Dx12UMDFilePath** No content is currently available. - **DX12UMDfilePath** No content is currently available. - **DX12UMDFilePath** The file path to the location of the DirectX 12 Display User Mode Driver in the Driver Store. +- **DX12UMDFileTath** No content is currently available. - **DX15UMDFilePath** No content is currently available. - **DX9UMDFilePath** The file path to the location of the DirectX 9 Display User Mode Driver in the Driver Store. +- **DX9UMDFileTath** No content is currently available. - **DX9UMDFmlePath** No content is currently available. +- **GP]DeviceID** No content is currently available. - **GPEDeviceID** No content is currently available. - **GPUDeviceID** The GPU device ID. - **GPUPreemptionLevel** The maximum preemption level supported by GPU for graphics payload. - **GPURevisionID** The GPU revision ID. - **GPURevmsionID** No content is currently available. - **GPUVendorID** The GPU vendor ID. +- **I3LDA** No content is currently available. - **I3SoftwAreDåvice** No content is currently available. - **InterfacaId** No content is currently available. - **InterfaceId** The GPU interface ID. @@ -3563,6 +3527,7 @@ The following fields are available: - **IsRenderDevice** Does the GPU have rendering capabilities? - **IsSoftwareDevice** Is this a software implementation of the GPU? - **KMDFilePath** The file path to the location of the Display Kernel Mode Driver in the Driver Store. +- **KMDFileTath** No content is currently available. - **KMDFmlePath** No content is currently available. - **MeasureEnabled** Is the device listening to MICROSOFT_KEYWORD_MEASURES? - **MeasuruEnab|ed** No content is currently available. @@ -4077,6 +4042,7 @@ This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedevic The following fields are available: +- **basedata** No content is currently available. See [basedata](#basedata). - **BusReportedDescription** The description of the device reported by the bux. - **BusReportelDescription** No content is currently available. - **Class** The device setup class of the driver loaded for the device. @@ -4085,6 +4051,7 @@ The following fields are available: - **ContainerId** The system-supplied unique identifier that specifies which group(s) the device(s) installed on the parent (main) device belong to. - **Description** The description of the device. - **DeviceInterfaceClasses** The device interfaces that this device implements. +- **DeviceSta|e** No content is currently available. - **DeviceState** Identifies the current state of the parent (main) device. - **Driver^erDate** No content is currently available. - **DriverId** The unique identifier for the installed driver. @@ -5172,6 +5139,7 @@ The following fields are available: - **ProcessName** The process name of the caller who initiated API calls, in the event where CallerApplicationName was not provided. - **ProcessNcme** No content is currently available. - **ProcessRame** No content is currently available. +- **QualityUpdateDefe2ral** No content is currently available. - **QualityUpdateDeferral** The deferral period configured for quality OS updates on the device (in days). - **QualityUpdatePause** Indicates whether quality OS updates are paused on the device. - **QualityUpdatePausePeriod** The pause duration configured for quality OS updates on the device (in days). @@ -5184,6 +5152,7 @@ The following fields are available: - **ScanEnqueueTime** The number of seconds it took to initialize a scan - **ScanProps** This is a 32-bit integer containing Boolean properties for a given Windows Update scan. The following bits are used; all remaining bits are reserved and set to zero. Bit 0 (0x1): IsInteractive - is set to 1 if the scan is requested by a user, or 0 if the scan is requested by Automatic Updates. Bit 1 (0x2): IsSeeker - is set to 1 if the Windows Update client's Seeker functionality is enabled. Seeker functionality is enabled on certain interactive scans, and results in the scans returning certain updates that are in the initial stages of release (not yet released for full adoption via Automatic Updates). - **ServiceGuid** An ID which represents which service the software distribution client is checking for content (Windows Update, Microsoft Store, etc.). +- **ServiceGuld** No content is currently available. - **ServiceUrl** The environment URL a device is configured to scan with - **ShippingMobileOperator** The mobile operator that a device shipped on. - **SsatusCode** No content is currently available. From fa7b429c080d0a15bb6af21ba32d81e4e4c50261 Mon Sep 17 00:00:00 2001 From: Brian Lich Date: Wed, 6 Mar 2019 08:55:50 -0800 Subject: [PATCH 042/724] new build --- ...ndows-diagnostic-events-and-fields-1903.md | 94 +++++++++++++++++-- 1 file changed, 87 insertions(+), 7 deletions(-) diff --git a/windows/privacy/basic-level-windows-diagnostic-events-and-fields-1903.md b/windows/privacy/basic-level-windows-diagnostic-events-and-fields-1903.md index 2c69ccb1c3..acf6f3f503 100644 --- a/windows/privacy/basic-level-windows-diagnostic-events-and-fields-1903.md +++ b/windows/privacy/basic-level-windows-diagnostic-events-and-fields-1903.md @@ -13,7 +13,7 @@ manager: dansimp ms.collection: M365-security-compliance ms.topic: article audience: ITPro -ms.date: 03/04/2019 +ms.date: 03/05/2019 --- @@ -2301,6 +2301,76 @@ The following fields are available: ## Diagnostic data events +### TelClientSynthetic.AbnormalShutdown_0 + +This event sends data about boot IDs for which a normal clean shutdown was not observed, to help keep Windows up to date. + +The following fields are available: + +- **AbnormalShutdownBootId** BootId of the abnormal shutdown being reported by this event. +- **AcDcStateAtLastShutdown** Identifies if the device was on battery or plugged in. +- **BatteryLevelAtLastShutdown** The last recorded battery level. +- **BatteryPercentageAtLastShutdown** The battery percentage at the last shutdown. +- **CrashDumpEnabled** Are crash dumps enabled? +- **CumulativeCrashCount** Cumulative count of operating system crashes since the BootId reset. +- **CurrentBootId** BootId at the time the abnormal shutdown event was being reported. +- **Firmwaredata->ResetReasonEmbeddedController** The reset reason that was supplied by the firmware. +- **Firmwaredata->ResetReasonEmbeddedControllerAdditional** Additional data related to reset reason provided by the firmware. +- **Firmwaredata->ResetReasonPch** The reset reason that was supplied by the hardware. +- **Firmwaredata->ResetReasonPchAdditional** Additional data related to the reset reason supplied by the hardware. +- **Firmwaredata->ResetReasonSupplied** Indicates whether the firmware supplied any reset reason or not. +- **FirmwareType** ID of the FirmwareType as enumerated in DimFirmwareType. +- **HardwareWatchdogTimerGeneratedLastReset** Indicates whether the hardware watchdog timer caused the last reset. +- **HardwareWatchdogTimerPresent** Indicates whether hardware watchdog timer was present or not. +- **LastBugCheckBootId** bootId of the last captured crash. +- **LastBugCheckCode** Code that indicates the type of error. +- **LastBugCheckContextFlags** Additional crash dump settings. +- **LastBugCheckOriginalDumpType** The type of crash dump the system intended to save. +- **LastBugCheckOtherSettings** Other crash dump settings. +- **LastBugCheckParameter1** The first parameter with additional info on the type of the error. +- **LastBugCheckProgress** Progress towards writing out the last crash dump. +- **LastBugCheckVersion** The version of the information struct written during the crash. +- **LastSuccessfullyShutdownBootId** BootId of the last fully successful shutdown. +- **LongPowerButtonPressDetected** Identifies if the user was pressing and holding power button. +- **OOBEInProgress** Identifies if OOBE is running. +- **OSSetupInProgress** Identifies if the operating system setup is running. +- **PowerButtonCumulativePressCount** How many times has the power button been pressed? +- **PowerButtonCumulativeReleaseCount** How many times has the power button been released? +- **PowerButtonErrorCount** Indicates the number of times there was an error attempting to record power button metrics. +- **PowerButtonLastPressBootId** BootId of the last time the power button was pressed. +- **PowerButtonLastPressTime** Date and time of the last time the power button was pressed. +- **PowerButtonLastReleaseBootId** BootId of the last time the power button was released. +- **PowerButtonLastReleaseTime** Date and time of the last time the power button was released. +- **PowerButtonPressCurrentCsPhase** Represents the phase of Connected Standby exit when the power button was pressed. +- **PowerButtonPressIsShutdownInProgress** Indicates whether a system shutdown was in progress at the last time the power button was pressed. +- **PowerButtonPressLastPowerWatchdogStage** Progress while the monitor is being turned on. +- **PowerButtonPressPowerWatchdogArmed** Indicates whether or not the watchdog for the monitor was active at the time of the last power button press. +- **RegKeyLastShutdownBootId** No content is currently available. +- **ShutdownDeviceType** Identifies who triggered a shutdown. Is it because of battery, thermal zones, or through a Kernel API. +- **SleepCheckpoint** Provides the last checkpoint when there is a failure during a sleep transition. +- **SleepCheckpointSource** Indicates whether the source is the EFI variable or bootstat file. +- **SleepCheckpointStatus** Indicates whether the checkpoint information is valid. +- **StaleBootStatData** Identifies if the data from bootstat is stale. +- **TransitionInfoBootId** BootId of the captured transition info. +- **TransitionInfoCSCount** l number of times the system transitioned from Connected Standby mode. +- **TransitionInfoCSEntryReason** Indicates the reason the device last entered Connected Standby mode. +- **TransitionInfoCSExitReason** Indicates the reason the device last exited Connected Standby mode. +- **TransitionInfoCSInProgress** At the time the last marker was saved, the system was in or entering Connected Standby mode. +- **TransitionInfoLastReferenceTimeChecksum** The checksum of TransitionInfoLastReferenceTimestamp, +- **TransitionInfoLastReferenceTimestamp** The date and time that the marker was last saved. +- **TransitionInfoLidState** Describes the state of the laptop lid. +- **TransitionInfoPowerButtonTimestamp** The date and time of the last time the power button was pressed. +- **TransitionInfoSleepInProgress** At the time the last marker was saved, the system was in or entering sleep mode. +- **TransitionInfoSleepTranstionsToOn** Total number of times the device transitioned from sleep mode. +- **TransitionInfoSystemRunning** At the time the last marker was saved, the device was running. +- **TransitionInfoSystemShutdownInProgress** Indicates whether a device shutdown was in progress when the power button was pressed. +- **TransitionInfoUserShutdownInProgress** Indicates whether a user shutdown was in progress when the power button was pressed. +- **TransitionLatestCheckpointId** Represents a unique identifier for a checkpoint during the device state transition. +- **TransitionLatestCheckpointSeqNumber** Represents the chronological sequence number of the checkpoint. +- **TransitionLatestCheckpointType** Represents the type of the checkpoint, which can be the start of a phase, end of a phase, or just informational. +- **VirtualMachineId** If the operating system is on a virtual Machine, it gives the virtual Machine ID (GUID) that can be used to correlate events on the host. + + ### TelClientSynthetic.AuthorizationInfo_RuntimeTransition This event sends data indicating that a device has undergone a change of telemetry opt-in level detected at UTC startup, to help keep Windows up to date. The telemetry opt-in level signals what data we are allowed to collect. @@ -3773,7 +3843,7 @@ The following fields are available: - **error** The error code if there were any issues during the BitLocker wipe. - **sessionID** This is the session ID. - **succeeded** Indicates the BitLocker wipe successful completed. -- **timestamp** Timestamp of the BitLocker wipe. +- **timestamp** Time the event occurred. ### Microsoft.Windows.PBR.BootState @@ -3789,7 +3859,7 @@ The following fields are available: ### Microsoft.Windows.PBR.ClearTPMStarted -No content is currently available. +This event sends basic data about the recovery operation on the device to allow investigation. The following fields are available: @@ -3808,6 +3878,16 @@ The following fields are available: - **timestamp** No content is currently available. +### Microsoft.Windows.PBR.Completed + +No content is currently available. + +The following fields are available: + +- **sessionID** No content is currently available. +- **timestamp** No content is currently available. + + ### Microsoft.Windows.PBR.DataVolumeCount No content is currently available. @@ -3836,9 +3916,9 @@ No content is currently available. The following fields are available: -- **apiName** No content is currently available. -- **sessionID** No content is currently available. -- **timestamp** No content is currently available. +- **apiName** Name of the API command that is about to execute. +- **sessionID** The session ID. +- **timestamp** Time the event occurred. ### Microsoft.Windows.PBR.EnteredOOBE @@ -4586,7 +4666,7 @@ The following fields are available: ### Microsoft.Windows.Security.WSC.DatastoreMigratedVersion -No content is currently available. +This event provides information about the datastore migration and whether it was successful. The following fields are available: From 85d69bae6492fd0cb0442675c074447e30857076 Mon Sep 17 00:00:00 2001 From: Jeanie Decker Date: Wed, 6 Mar 2019 09:24:40 -0800 Subject: [PATCH 043/724] DeviceUpdatecenter --- windows/configuration/TOC.md | 1 + windows/configuration/wcd/wcd-changes.md | 1 + .../wcd/wcd-deviceupdatecenter.md | 36 +++++++++++++++++++ windows/configuration/wcd/wcd.md | 1 + 4 files changed, 39 insertions(+) create mode 100644 windows/configuration/wcd/wcd-deviceupdatecenter.md diff --git a/windows/configuration/TOC.md b/windows/configuration/TOC.md index b7102419c7..6d017d3a92 100644 --- a/windows/configuration/TOC.md +++ b/windows/configuration/TOC.md @@ -79,6 +79,7 @@ #### [DeviceFormFactor](wcd/wcd-deviceformfactor.md) #### [DeviceInfo](wcd/wcd-deviceinfo.md) #### [DeviceManagement](wcd/wcd-devicemanagement.md) +#### [DeviceUpdateCenter](wcd/wcd-deviceupdatecenter.md) #### [DMClient](wcd/wcd-dmclient.md) #### [EditionUpgrade](wcd/wcd-editionupgrade.md) #### [EmbeddedLockdownProfiles](wcd/wcd-embeddedlockdownprofiles.md) diff --git a/windows/configuration/wcd/wcd-changes.md b/windows/configuration/wcd/wcd-changes.md index 7b0376fa7e..47da52ab8b 100644 --- a/windows/configuration/wcd/wcd-changes.md +++ b/windows/configuration/wcd/wcd-changes.md @@ -15,6 +15,7 @@ ms.date: 10/02/2018 ## Settings added in Windows 10, version ? +- [DeviceUpdateCenter](wcd-deviceupdatecenter.md) - [Privacy](wcd-privacy.md) ## Settings removed in Windows 10, version ? diff --git a/windows/configuration/wcd/wcd-deviceupdatecenter.md b/windows/configuration/wcd/wcd-deviceupdatecenter.md new file mode 100644 index 0000000000..66331ab161 --- /dev/null +++ b/windows/configuration/wcd/wcd-deviceupdatecenter.md @@ -0,0 +1,36 @@ +--- +title: DeviceUpdateCenter (Windows 10) +description: This section describes the DeviceUpdateCenter settings that you can configure in provisioning packages for Windows 10 using Windows Configuration Designer. +ms.prod: w10 +ms.mktglfcycl: deploy +ms.sitesec: library +author: jdeckerMS +ms.localizationpriority: medium +ms.author: jdecker +ms.topic: article +ms.date: 09/06/2017 +--- + +# DeviceUpdateCenter (Windows Configuration Designer reference) + +Use **DeviceUpdateCenter** to configure settings for + +## Applies to + +| Setting | Desktop editions | Mobile editions | Surface Hub | HoloLens | IoT Core | +| --- | :---: | :---: | :---: | :---: | :---: | +| All settings | X | | | | | + +## CustomPackageId + + + +## DeviceModelId + + + +## OemPartnerRing + + + +## PublisherId \ No newline at end of file diff --git a/windows/configuration/wcd/wcd.md b/windows/configuration/wcd/wcd.md index 5f712fd6a9..5b762d47e7 100644 --- a/windows/configuration/wcd/wcd.md +++ b/windows/configuration/wcd/wcd.md @@ -39,6 +39,7 @@ This section describes the settings that you can configure in [provisioning pack | [DeviceFormFactor](wcd-deviceformfactor.md) | X | X | X | X | | | [DeviceInfo](wcd-deviceinfo.md) | | X | | | | | [DeviceManagement](wcd-devicemanagement.md) | X | X | X | X | | +| [DeviceUpdateCenter](wcd-deviceupdatecenter.md) | X | | | | | | [DMClient](wcd-dmclient.md) | X | X | X | X | X | | [EditionUpgrade](wcd-editionupgrade.md) | X | X | X | X | | | [EmbeddedLockdownProfiles](wcd-embeddedlockdownprofiles.md) | | X | | | | From ae257a5d27c0b48bcf15104db839b98c4ed8cdde Mon Sep 17 00:00:00 2001 From: Jeanie Decker Date: Wed, 6 Mar 2019 11:01:54 -0800 Subject: [PATCH 044/724] finish DeviceUpdateCenter --- .../configuration/wcd/wcd-deviceupdatecenter.md | 15 +-------------- 1 file changed, 1 insertion(+), 14 deletions(-) diff --git a/windows/configuration/wcd/wcd-deviceupdatecenter.md b/windows/configuration/wcd/wcd-deviceupdatecenter.md index 66331ab161..7417a12104 100644 --- a/windows/configuration/wcd/wcd-deviceupdatecenter.md +++ b/windows/configuration/wcd/wcd-deviceupdatecenter.md @@ -13,7 +13,7 @@ ms.date: 09/06/2017 # DeviceUpdateCenter (Windows Configuration Designer reference) -Use **DeviceUpdateCenter** to configure settings for +Do not use **DeviceUpdateCenter** settings at this time. ## Applies to @@ -21,16 +21,3 @@ Use **DeviceUpdateCenter** to configure settings for | --- | :---: | :---: | :---: | :---: | :---: | | All settings | X | | | | | -## CustomPackageId - - - -## DeviceModelId - - - -## OemPartnerRing - - - -## PublisherId \ No newline at end of file From 6fe75560490053a09545ccb973aaf58ee36969a5 Mon Sep 17 00:00:00 2001 From: "Andrea Bichsel (Aquent LLC)" Date: Fri, 8 Mar 2019 22:23:59 +0000 Subject: [PATCH 045/724] Draft --- ...ecurity-settings-with-tamper-protection.md | 39 +++++++++++++++++++ 1 file changed, 39 insertions(+) create mode 100644 windows/security/threat-protection/windows-defender-antivirus/prevent-changes-to-security-settings-with-tamper-protection.md diff --git a/windows/security/threat-protection/windows-defender-antivirus/prevent-changes-to-security-settings-with-tamper-protection.md b/windows/security/threat-protection/windows-defender-antivirus/prevent-changes-to-security-settings-with-tamper-protection.md new file mode 100644 index 0000000000..4a79a4cae8 --- /dev/null +++ b/windows/security/threat-protection/windows-defender-antivirus/prevent-changes-to-security-settings-with-tamper-protection.md @@ -0,0 +1,39 @@ + + + + +Prevent security settings changes with Tamper Protection + +Tamper Protection helps prevent malicious apps from changing important security settings. These settings include: + +• Real-time protection +• Cloud-delivered protection +• IOfficeAntivirus (IOAV) +• Behavior monitoring +• Scheduled scans +• Policy override settings + +With Tamper Protection set to On, you can still change these settings in the Windows Security app. The following apps and methods can't change these settings: + +• Mobile device management (MDM) apps like Intune +• Enterprise configuration management apps like System Center Configuration Manager (SCCM) +• Command line instruction MpCmdRun.exe -removedefinitions -dynamicsignatures +• Windows System Image Manager (Windows SIM) settings DisableAntiSpyware ad DisableAntiMalware (used in Windows unattended setup) +• Group Policy +• Other Windows Management Instrumentation (WMI) apps + +The Tamper Protection setting doesn't affect how third party antivirus apps register with the Windows Security app. + +On computers running Windows 10 Enterprise E5, users can't change the Tamper Protection setting. + +Tamper Protection is On by default. If you set Tamper Protection to Off, you will see a yellow warning in the Windows Security app under Virus & threat protection. + +Configure Tamper Protection + +1. Open the Windows Security app by clicking the shield icon in the task bar or searching the start menu for Defender. +2. Select Virus & threat protection, then select Virus & threat protection settings. +3. Set Tamper Protection to On or Off. + +Note +If your computer is running Windows 10 Enterprise E5, you can't change the Tamper Protection setting. + From a82e95f29fd3f6c571db912a82298c77061f3d98 Mon Sep 17 00:00:00 2001 From: "Andrea Bichsel (Aquent LLC)" Date: Fri, 8 Mar 2019 22:36:13 +0000 Subject: [PATCH 046/724] Formatting --- ...ecurity-settings-with-tamper-protection.md | 65 ++++++++++++------- 1 file changed, 40 insertions(+), 25 deletions(-) diff --git a/windows/security/threat-protection/windows-defender-antivirus/prevent-changes-to-security-settings-with-tamper-protection.md b/windows/security/threat-protection/windows-defender-antivirus/prevent-changes-to-security-settings-with-tamper-protection.md index 4a79a4cae8..66d5e0fe86 100644 --- a/windows/security/threat-protection/windows-defender-antivirus/prevent-changes-to-security-settings-with-tamper-protection.md +++ b/windows/security/threat-protection/windows-defender-antivirus/prevent-changes-to-security-settings-with-tamper-protection.md @@ -1,39 +1,54 @@ +--- +title: Prevent security settings changes with Tamper Protection +description: Use tamper protection to prevent malicious apps from changing important security settings. +keywords: malware, defender, antivirus, tamper protection +search.product: eADQiWindows 10XVcnh +ms.pagetype: security +ms.prod: w10 +ms.mktglfcycl: manage +ms.sitesec: library +ms.pagetype: security +ms.localizationpriority: medium +author: andreabichsel +ms.author: v-anbic +--- +# Prevent security settings changes with tamper protection +**Applies to:** +- Windows 10 -Prevent security settings changes with Tamper Protection +Tamper protection helps prevent malicious apps from changing important security settings. These settings include: -Tamper Protection helps prevent malicious apps from changing important security settings. These settings include: +- Real-time protection +- Cloud-delivered protection +- IOfficeAntivirus (IOAV) +- Behavior monitoring +- Scheduled scans +- Policy override settings -• Real-time protection -• Cloud-delivered protection -• IOfficeAntivirus (IOAV) -• Behavior monitoring -• Scheduled scans -• Policy override settings +With tamper protection set to **On**, you can still change these settings in the Windows Security app. The following apps and methods can't change these settings: -With Tamper Protection set to On, you can still change these settings in the Windows Security app. The following apps and methods can't change these settings: +- Mobile device management (MDM) apps like Intune +- Enterprise configuration management apps like System Center Configuration Manager (SCCM) +- Command line instruction MpCmdRun.exe -removedefinitions -dynamicsignatures +- Windows System Image Manager (Windows SIM) settings DisableAntiSpyware ad DisableAntiMalware (used in Windows unattended setup) +- Group Policy +- Other Windows Management Instrumentation (WMI) apps -• Mobile device management (MDM) apps like Intune -• Enterprise configuration management apps like System Center Configuration Manager (SCCM) -• Command line instruction MpCmdRun.exe -removedefinitions -dynamicsignatures -• Windows System Image Manager (Windows SIM) settings DisableAntiSpyware ad DisableAntiMalware (used in Windows unattended setup) -• Group Policy -• Other Windows Management Instrumentation (WMI) apps +The tamper protection setting doesn't affect how third party antivirus apps register with the Windows Security app. -The Tamper Protection setting doesn't affect how third party antivirus apps register with the Windows Security app. +On computers running Windows 10 Enterprise E5, users can't change the tamper protection setting. -On computers running Windows 10 Enterprise E5, users can't change the Tamper Protection setting. +Tamper protection is On by default. If you set tamper protection to **Off**, you will see a yellow warning in the Windows Security app under **Virus & threat protection**. -Tamper Protection is On by default. If you set Tamper Protection to Off, you will see a yellow warning in the Windows Security app under Virus & threat protection. +##Configure tamper protection -Configure Tamper Protection +1. Open the Windows Security app by clicking the shield icon in the task bar or searching the start menu for **Defender**. +2. Select **Virus & threat protection**, then select **Virus & threat protection settings**. +3. Set **Tamper Protection** to **On** or **Off**. -1. Open the Windows Security app by clicking the shield icon in the task bar or searching the start menu for Defender. -2. Select Virus & threat protection, then select Virus & threat protection settings. -3. Set Tamper Protection to On or Off. - -Note -If your computer is running Windows 10 Enterprise E5, you can't change the Tamper Protection setting. +>[!NOTE] +>If your computer is running Windows 10 Enterprise E5, you can't change the tamper protection setting. From 8de2be98e03365fe164d7754f582fa992793dfe1 Mon Sep 17 00:00:00 2001 From: "Andrea Bichsel (Aquent LLC)" Date: Fri, 8 Mar 2019 22:37:36 +0000 Subject: [PATCH 047/724] Fixed typo --- ...event-changes-to-security-settings-with-tamper-protection.md | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/windows/security/threat-protection/windows-defender-antivirus/prevent-changes-to-security-settings-with-tamper-protection.md b/windows/security/threat-protection/windows-defender-antivirus/prevent-changes-to-security-settings-with-tamper-protection.md index 66d5e0fe86..930eb2406a 100644 --- a/windows/security/threat-protection/windows-defender-antivirus/prevent-changes-to-security-settings-with-tamper-protection.md +++ b/windows/security/threat-protection/windows-defender-antivirus/prevent-changes-to-security-settings-with-tamper-protection.md @@ -33,7 +33,7 @@ With tamper protection set to **On**, you can still change these settings in the - Mobile device management (MDM) apps like Intune - Enterprise configuration management apps like System Center Configuration Manager (SCCM) - Command line instruction MpCmdRun.exe -removedefinitions -dynamicsignatures -- Windows System Image Manager (Windows SIM) settings DisableAntiSpyware ad DisableAntiMalware (used in Windows unattended setup) +- Windows System Image Manager (Windows SIM) settings DisableAntiSpyware and DisableAntiMalware (used in Windows unattended setup) - Group Policy - Other Windows Management Instrumentation (WMI) apps From 94c2799be4a0ca332e0974ab76a946d1524271f9 Mon Sep 17 00:00:00 2001 From: Jeanie Decker Date: Tue, 12 Mar 2019 07:49:42 -0700 Subject: [PATCH 048/724] time --- windows/configuration/wcd/wcd-time.md | 30 +++++++++++++++++++++++++++ 1 file changed, 30 insertions(+) create mode 100644 windows/configuration/wcd/wcd-time.md diff --git a/windows/configuration/wcd/wcd-time.md b/windows/configuration/wcd/wcd-time.md new file mode 100644 index 0000000000..1451f639d8 --- /dev/null +++ b/windows/configuration/wcd/wcd-time.md @@ -0,0 +1,30 @@ +--- +title: Privacy (Windows 10) +description: This section describes the Privacy settings that you can configure in provisioning packages for Windows 10 using Windows Configuration Designer. +ms.prod: w10 +ms.mktglfcycl: deploy +ms.sitesec: library +author: jdeckerMS +ms.localizationpriority: medium +ms.author: jdecker +ms.topic: article +ms.date: 09/06/2017 +--- + +# Privacy (Windows Configuration Designer reference) + +Use **Privacy** to configure settings for app activation with voice. + +## Applies to + +| Setting | Desktop editions | Mobile editions | Surface Hub | HoloLens | IoT Core | +| --- | :---: | :---: | :---: | :---: | :---: | +| All settings | X | X | X | | X | + +## LetAppsActivateWithVoice + +Select between **User is in control**, **Force allow**, or **Force deny**. + +## LetAppsActivateWithVoiceAboveLock + +Select between **User is in control**, **Force allow**, or **Force deny**. \ No newline at end of file From a43f3bf1001164189866202907a91695ff97c092 Mon Sep 17 00:00:00 2001 From: Jeanie Decker Date: Tue, 12 Mar 2019 08:09:24 -0700 Subject: [PATCH 049/724] Time --- windows/configuration/TOC.md | 3 ++- windows/configuration/wcd/wcd-changes.md | 1 + windows/configuration/wcd/wcd-time.md | 17 +++++++---------- windows/configuration/wcd/wcd.md | 1 + 4 files changed, 11 insertions(+), 11 deletions(-) diff --git a/windows/configuration/TOC.md b/windows/configuration/TOC.md index 6d017d3a92..b0edfde74e 100644 --- a/windows/configuration/TOC.md +++ b/windows/configuration/TOC.md @@ -116,7 +116,8 @@ #### [TabletMode](wcd/wcd-tabletmode.md) #### [TakeATest](wcd/wcd-takeatest.md) #### [TextInput](wcd/wcd-textinput.md) -#### [Theme](wcd/wcd-theme.md) +#### [Theme](wcd/wcd-theme.md) +#### [Time](wcd/wcd-time.md) #### [UnifiedWriteFilter](wcd/wcd-unifiedwritefilter.md) #### [UniversalAppInstall](wcd/wcd-universalappinstall.md) #### [UniversalAppUninstall](wcd/wcd-universalappuninstall.md) diff --git a/windows/configuration/wcd/wcd-changes.md b/windows/configuration/wcd/wcd-changes.md index 47da52ab8b..f235ced4e7 100644 --- a/windows/configuration/wcd/wcd-changes.md +++ b/windows/configuration/wcd/wcd-changes.md @@ -17,6 +17,7 @@ ms.date: 10/02/2018 - [DeviceUpdateCenter](wcd-deviceupdatecenter.md) - [Privacy](wcd-privacy.md) +- [Time](wcd-time.md) ## Settings removed in Windows 10, version ? diff --git a/windows/configuration/wcd/wcd-time.md b/windows/configuration/wcd/wcd-time.md index 1451f639d8..d3d0a9c80e 100644 --- a/windows/configuration/wcd/wcd-time.md +++ b/windows/configuration/wcd/wcd-time.md @@ -1,6 +1,6 @@ --- -title: Privacy (Windows 10) -description: This section describes the Privacy settings that you can configure in provisioning packages for Windows 10 using Windows Configuration Designer. +title: Time (Windows 10) +description: This section describes the Time settings that you can configure in provisioning packages for Windows 10 using Windows Configuration Designer. ms.prod: w10 ms.mktglfcycl: deploy ms.sitesec: library @@ -11,20 +11,17 @@ ms.topic: article ms.date: 09/06/2017 --- -# Privacy (Windows Configuration Designer reference) - -Use **Privacy** to configure settings for app activation with voice. +Use **Time** to configure settings for time zone setup for Windows 10, version (TBD) and later. ## Applies to | Setting | Desktop editions | Mobile editions | Surface Hub | HoloLens | IoT Core | | --- | :---: | :---: | :---: | :---: | :---: | -| All settings | X | X | X | | X | +| [ProvisionSetTimeZone](#provisionsettimezone) | X | | | | | -## LetAppsActivateWithVoice +## ProvisionSetTimeZone -Select between **User is in control**, **Force allow**, or **Force deny**. +Set to **True** to skip time zone assignment when the first user signs in. -## LetAppsActivateWithVoiceAboveLock +Set to **False** for time zone assignment to occur when the first user signs in. -Select between **User is in control**, **Force allow**, or **Force deny**. \ No newline at end of file diff --git a/windows/configuration/wcd/wcd.md b/windows/configuration/wcd/wcd.md index 5b762d47e7..b19b249d08 100644 --- a/windows/configuration/wcd/wcd.md +++ b/windows/configuration/wcd/wcd.md @@ -77,6 +77,7 @@ This section describes the settings that you can configure in [provisioning pack | [TakeATest](wcd-takeatest.md) | X | | | | | | [TextInput](wcd-textinput.md) | | X | | | | | [Theme](wcd-theme.md) | | X | | | | +| [Time](wcd-time.md) | X | | | | | | [UnifiedWriteFilter](wcd-unifiedwritefilter.md) | X | | | | X | | [UniversalAppInstall](wcd-universalappinstall.md) | X | X | X | X | X | | [UniversalAppUninstall](wcd-universalappuninstall.md) | X | X | X | X | X | From 5dea266c3da874da90f967c8a0f36e5a33c3a38c Mon Sep 17 00:00:00 2001 From: Jeanie Decker Date: Tue, 12 Mar 2019 08:38:18 -0700 Subject: [PATCH 050/724] fix h1 --- windows/configuration/wcd/wcd-time.md | 2 ++ 1 file changed, 2 insertions(+) diff --git a/windows/configuration/wcd/wcd-time.md b/windows/configuration/wcd/wcd-time.md index d3d0a9c80e..52ade98614 100644 --- a/windows/configuration/wcd/wcd-time.md +++ b/windows/configuration/wcd/wcd-time.md @@ -11,6 +11,8 @@ ms.topic: article ms.date: 09/06/2017 --- +# Time + Use **Time** to configure settings for time zone setup for Windows 10, version (TBD) and later. ## Applies to From 3e645c8e1ad75e02afdbca38a58579c8d476d084 Mon Sep 17 00:00:00 2001 From: Brian Lich Date: Tue, 12 Mar 2019 08:43:04 -0700 Subject: [PATCH 051/724] new build 3012019 --- ...ndows-diagnostic-events-and-fields-1903.md | 674 ++++++++++++------ 1 file changed, 449 insertions(+), 225 deletions(-) diff --git a/windows/privacy/basic-level-windows-diagnostic-events-and-fields-1903.md b/windows/privacy/basic-level-windows-diagnostic-events-and-fields-1903.md index acf6f3f503..ac9b7be4f3 100644 --- a/windows/privacy/basic-level-windows-diagnostic-events-and-fields-1903.md +++ b/windows/privacy/basic-level-windows-diagnostic-events-and-fields-1903.md @@ -13,7 +13,7 @@ manager: dansimp ms.collection: M365-security-compliance ms.topic: article audience: ITPro -ms.date: 03/05/2019 +ms.date: 03/12/2019 --- @@ -1744,14 +1744,18 @@ The following fields are available: - **AdvertisingId** Current state of the advertising ID setting. - **AppDiagnostics** Current state of the app diagnostics setting. - **Appointments** Current state of the calendar setting. +- **AppointmentsSystem** No content is currently available. - **Bluetooth** Current state of the Bluetooth capability setting. - **BluetoothSync** Current state of the Bluetooth sync capability setting. - **BroadFileSystemAccess** Current state of the broad file system access setting. - **CellularData** Current state of the cellular data capability setting. - **Chat** Current state of the chat setting. +- **ChatSystem** Current state of the chat setting. - **Contacts** Current state of the contacts setting. +- **ContactsSystem** No content is currently available. - **DocumentsLibrary** Current state of the documents library setting. - **Email** Current state of the email setting. +- **EmailSystem** No content is currently available. - **FindMyDevice** Current state of the "find my device" setting. - **GazeInput** Current state of the gaze input setting. - **HumanInterfaceDevice** Current state of the human interface device setting. @@ -1763,6 +1767,7 @@ The following fields are available: - **Microphone** Current state of the microphone setting. - **PhoneCall** Current state of the phone call setting. - **PhoneCallHistory** Current state of the call history setting. +- **PhoneCallHistorySystem** No content is currently available. - **PicturesLibrary** Current state of the pictures library setting. - **Radios** Current state of the radios setting. - **SensorsCustom** Current state of the custom sensor setting. @@ -1772,6 +1777,7 @@ The following fields are available: - **USB** Current state of the USB setting. - **UserAccountInformation** Current state of the account information setting. - **UserDataTasks** Current state of the tasks setting. +- **UserDataTasksSystem** No content is currently available. - **UserNotificationListener** Current state of the notifications setting. - **VideosLibrary** Current state of the videos library setting. - **Webcam** Current state of the camera setting. @@ -1909,14 +1915,18 @@ The following fields are available: - **AdvertisingId** Current state of the advertising ID setting. - **AppDiagnostics** Current state of the app diagnostics setting. - **Appointments** Current state of the calendar setting. +- **AppointmentsSystem** No content is currently available. - **Bluetooth** Current state of the Bluetooth capability setting. - **BluetoothSync** Current state of the Bluetooth sync capability setting. - **BroadFileSystemAccess** Current state of the broad file system access setting. - **CellularData** Current state of the cellular data capability setting. - **Chat** Current state of the chat setting. +- **ChatSystem** No content is currently available. - **Contacts** Current state of the contacts setting. +- **ContactsSystem** No content is currently available. - **DocumentsLibrary** Current state of the documents library setting. - **Email** Current state of the email setting. +- **EmailSystem** No content is currently available. - **GazeInput** Current state of the gaze input setting. - **HumanInterfaceDevice** Current state of the human interface device setting. - **InkTypeImprovement** Current state of the improve inking and typing setting. @@ -1928,6 +1938,7 @@ The following fields are available: - **Microphone** Current state of the microphone setting. - **PhoneCall** Current state of the phone call setting. - **PhoneCallHistory** Current state of the call history setting. +- **PhoneCallHistorySystem** No content is currently available. - **PicturesLibrary** Current state of the pictures library setting. - **Radios** Current state of the radios setting. - **SensorsCustom** Current state of the custom sensor setting. @@ -1937,6 +1948,7 @@ The following fields are available: - **USB** Current state of the USB setting. - **UserAccountInformation** Current state of the account information setting. - **UserDataTasks** Current state of the tasks setting. +- **UserDataTasksSystem** No content is currently available. - **UserNotificationListener** Current state of the notifications setting. - **VideosLibrary** Current state of the videos library setting. - **Webcam** Current state of the camera setting. @@ -2345,7 +2357,7 @@ The following fields are available: - **PowerButtonPressIsShutdownInProgress** Indicates whether a system shutdown was in progress at the last time the power button was pressed. - **PowerButtonPressLastPowerWatchdogStage** Progress while the monitor is being turned on. - **PowerButtonPressPowerWatchdogArmed** Indicates whether or not the watchdog for the monitor was active at the time of the last power button press. -- **RegKeyLastShutdownBootId** No content is currently available. +- **RegKeyLastShutdownBootId** The last recorded boot ID. - **ShutdownDeviceType** Identifies who triggered a shutdown. Is it because of battery, thermal zones, or through a Kernel API. - **SleepCheckpoint** Provides the last checkpoint when there is a failure during a sleep transition. - **SleepCheckpointSource** Indicates whether the source is the EFI variable or bootstat file. @@ -3758,6 +3770,59 @@ The following fields are available: - **UserInputTime** The amount of time the loader application spent waiting for user input. +### Microsoft.Windows.Kernel.DeviceConfig.DeviceConfig + +No content is currently available. + +The following fields are available: + +- **ClassGuid** No content is currently available. +- **DeviceInstanceId** No content is currently available. +- **DriverDate** No content is currently available. +- **DriverFlightIds** No content is currently available. +- **DriverInfName** No content is currently available. +- **DriverProvider** No content is currently available. +- **DriverSubmissionId** No content is currently available. +- **DriverVersion** No content is currently available. +- **ExtensionDrivers** No content is currently available. +- **FirstHardwareId** No content is currently available. +- **InboxDriver** No content is currently available. +- **InstallDate** No content is currently available. +- **LastCompatibleId** No content is currently available. +- **Legacy** No content is currently available. +- **NeedReboot** No content is currently available. +- **SetupMode** No content is currently available. +- **StatusCode** No content is currently available. + + +### Microsoft.Windows.Kernel.PnP.AggregateClearDevNodeProblem + +No content is currently available. + +The following fields are available: + +- **Count** No content is currently available. +- **DeviceInstanceId** No content is currently available. +- **LastProblem** No content is currently available. +- **LastProblemStatus** No content is currently available. +- **ServiceName** No content is currently available. + + +### Microsoft.Windows.Kernel.PnP.AggregateSetDevNodeProblem + +No content is currently available. + +The following fields are available: + +- **Count** No content is currently available. +- **DeviceInstanceId** No content is currently available. +- **LastProblem** No content is currently available. +- **LastProblemStatus** No content is currently available. +- **Problem** No content is currently available. +- **ProblemStatus** No content is currently available. +- **ServiceName** No content is currently available. + + ## Miracast events ### Microsoft.Windows.Cast.Miracast.MiracastSessionEnd @@ -3834,6 +3899,165 @@ The following fields are available: ## Other events +### MicArrayGeometry + +No content is currently available. + +The following fields are available: + +- **MicCoords** No content is currently available. +- **usFrequencyBandHi** No content is currently available. +- **usFrequencyBandLo** No content is currently available. +- **usMicArrayType** No content is currently available. +- **usNumberOfMicrophones** No content is currently available. +- **usVersion** No content is currently available. +- **wHorizontalAngleBegin** No content is currently available. +- **wHorizontalAngleEnd** No content is currently available. +- **wVerticalAngleBegin** No content is currently available. +- **wVerticalAngleEnd** No content is currently available. + + +### MicCoords + +No content is currently available. + +The following fields are available: + +- **usType** No content is currently available. +- **wHorizontalAngle** No content is currently available. +- **wVerticalAngle** No content is currently available. +- **wXCoord** No content is currently available. +- **wYCoord** No content is currently available. +- **wZCoord** No content is currently available. + + +### Microsoft.Windows.Audio.EndpointBuilder.DeviceInfo + +No content is currently available. + +The following fields are available: + +- **BusEnumeratorName** No content is currently available. +- **ContainerId** No content is currently available. +- **DeviceInstanceId** No content is currently available. +- **EndpointDevnodeId** No content is currently available. +- **endpointEffectClsid** No content is currently available. +- **endpointEffectModule** No content is currently available. +- **EndpointFormFactor** No content is currently available. +- **endpointID** No content is currently available. +- **endpointInstanceId** No content is currently available. +- **Flow** No content is currently available. +- **globalEffectClsid** No content is currently available. +- **globalEffectModule** No content is currently available. +- **HWID** No content is currently available. +- **IsBluetooth** No content is currently available. +- **isFarField** No content is currently available. +- **IsSideband** No content is currently available. +- **IsUSB** No content is currently available. +- **JackSubType** No content is currently available. +- **localEffectClsid** No content is currently available. +- **localEffectModule** No content is currently available. +- **MicArrayGeometry** No content is currently available. See [MicArrayGeometry](#micarraygeometry). +- **modeEffectClsid** No content is currently available. +- **modeEffectModule** No content is currently available. +- **persistentId** No content is currently available. +- **streamEffectClsid** No content is currently available. +- **streamEffectModule** No content is currently available. + + +### Microsoft.Windows.DriverInstall.DeviceInstall + +No content is currently available. + +The following fields are available: + +- **ClassGuid** No content is currently available. +- **ClassLowerFilters** No content is currently available. +- **ClassUpperFilters** No content is currently available. +- **CoInstallers** No content is currently available. +- **ConfigFlags** No content is currently available. +- **DeviceConfigured** No content is currently available. +- **DeviceInstanceId** No content is currently available. +- **DeviceStack** No content is currently available. +- **DriverDate** No content is currently available. +- **DriverDescription** No content is currently available. +- **DriverInfName** No content is currently available. +- **DriverInfSectionName** No content is currently available. +- **DriverPackageId** No content is currently available. +- **DriverProvider** No content is currently available. +- **DriverUpdated** No content is currently available. +- **DriverVersion** No content is currently available. +- **EndTime** No content is currently available. +- **Error** No content is currently available. +- **ExtensionDrivers** No content is currently available. +- **FinishInstallAction** No content is currently available. +- **FinishInstallUI** No content is currently available. +- **FirmwareDate** No content is currently available. +- **FirmwareRevision** No content is currently available. +- **FirmwareVersion** No content is currently available. +- **FirstHardwareId** No content is currently available. +- **FlightIds** No content is currently available. +- **GenericDriver** No content is currently available. +- **Inbox** No content is currently available. +- **InstallDate** No content is currently available. +- **LastCompatibleId** No content is currently available. +- **LegacyInstallReasonError** No content is currently available. +- **LowerFilters** No content is currently available. +- **MatchingDeviceId** No content is currently available. +- **NeedReboot** No content is currently available. +- **OriginalDriverInfName** No content is currently available. +- **ParentDeviceInstanceId** No content is currently available. +- **PendedUntilReboot** No content is currently available. +- **Problem** No content is currently available. +- **ProblemStatus** No content is currently available. +- **SecondaryDevice** No content is currently available. +- **ServiceName** No content is currently available. +- **SetupMode** No content is currently available. +- **StartTime** No content is currently available. +- **SubmissionId** No content is currently available. +- **UpperFilters** No content is currently available. + + +### Microsoft.Windows.DriverInstall.NewDevInstallDeviceEnd + +No content is currently available. + +The following fields are available: + +- **DeviceInstanceId** No content is currently available. +- **DriverUpdated** No content is currently available. +- **Error** No content is currently available. +- **FlightId** No content is currently available. +- **InstallDate** No content is currently available. +- **InstallFlags** No content is currently available. +- **RebootRequired** No content is currently available. +- **RollbackPossible** No content is currently available. +- **WuTargetedHardwareId** No content is currently available. +- **WuUntargetedHardwareId** No content is currently available. + + +### Microsoft.Windows.DriverInstall.NewDevInstallDeviceStart + +No content is currently available. + +The following fields are available: + +- **DeviceInstanceId** No content is currently available. +- **FirstInstallDate** No content is currently available. +- **LastDriverDate** No content is currently available. +- **LastDriverInbox** No content is currently available. +- **LastDriverInfName** No content is currently available. +- **LastDriverVersion** No content is currently available. +- **LastFirmwareDate** No content is currently available. +- **LastFirmwareRevision** No content is currently available. +- **LastFirmwareVersion** No content is currently available. +- **LastInstallDate** No content is currently available. +- **LastMatchingDeviceId** No content is currently available. +- **LastProblem** No content is currently available. +- **LastProblemStatus** No content is currently available. +- **LastSubmissionId** No content is currently available. + + ### Microsoft.Windows.PBR.BitLockerWipeFinished This event sends error data after the BitLocker wipe finishes if there were any issues during the wipe. @@ -3848,7 +4072,7 @@ The following fields are available: ### Microsoft.Windows.PBR.BootState -No content is currently available. +This event sends data on the Windows Recovery Environment (WinRE) boot, which can be used to determine whether the boot was successful. The following fields are available: @@ -3884,8 +4108,8 @@ No content is currently available. The following fields are available: -- **sessionID** No content is currently available. -- **timestamp** No content is currently available. +- **sessionID** The ID of the push-button reset session. +- **timestamp** Timestamp of this push-button reset event. ### Microsoft.Windows.PBR.DataVolumeCount @@ -3918,7 +4142,7 @@ The following fields are available: - **apiName** Name of the API command that is about to execute. - **sessionID** The session ID. -- **timestamp** Time the event occurred. +- **timestamp** Timestamp of this push-button reset event. ### Microsoft.Windows.PBR.EnteredOOBE @@ -3927,8 +4151,8 @@ No content is currently available. The following fields are available: -- **sessionID** No content is currently available. -- **timestamp** No content is currently available. +- **sessionID** The ID of this push-button reset session. +- **timestamp** Timestamp of this push-button reset event. ### Microsoft.Windows.PBR.LeaveAPI @@ -3937,10 +4161,10 @@ No content is currently available. The following fields are available: -- **apiName** No content is currently available. -- **errorCode** No content is currently available. -- **sessionID** No content is currently available. -- **success** No content is currently available. +- **apiName** Name of the API command that completed. +- **errorCode** Error code if an error occurred during the API call. +- **sessionID** The ID of this push-button reset session. +- **success** Indicates whether the API call was successful. - **timestamp** No content is currently available. @@ -3950,14 +4174,14 @@ No content is currently available. The following fields are available: -- **exitCode** No content is currently available. -- **param** No content is currently available. -- **phase** No content is currently available. -- **script** No content is currently available. -- **sessionID** No content is currently available. -- **succeeded** No content is currently available. -- **timedOut** No content is currently available. -- **timestamp** No content is currently available. +- **exitCode** The exit code from OEM extensibility scripts to push-button reset. +- **param** Parameters used for the OEM extensibility script. +- **phase** Name of the OEM extensibility script phase. +- **script** The path to the OEM extensibility script. +- **sessionID** The ID of this push-button reset session. +- **succeeded** Indicates whether the OEM extensibility script executed successfully. +- **timedOut** Indicates whether the OEM extensibility script timed out. +- **timestamp** Timestamp of this push-button reset event. ### Microsoft.Windows.PBR.OEMExtensionStarted @@ -3966,11 +4190,11 @@ No content is currently available. The following fields are available: -- **param** No content is currently available. -- **phase** No content is currently available. -- **script** No content is currently available. -- **sessionID** No content is currently available. -- **timestamp** No content is currently available. +- **param** The parameters used by the OEM extensibility script. +- **phase** The name of the OEM extensibility script phase. +- **script** The path to the OEM extensibility script. +- **sessionID** The ID of this push-button reset session. +- **timestamp** Timestamp of this push-button reset event. ### Microsoft.Windows.PBR.OperationExecuteFinished @@ -3979,13 +4203,13 @@ No content is currently available. The following fields are available: -- **error** No content is currently available. -- **index** No content is currently available. -- **operation** No content is currently available. -- **phase** No content is currently available. -- **sessionID** No content is currently available. -- **succeeded** No content is currently available. -- **timestamp** No content is currently available. +- **error** Indicates the result code of the event. +- **index** The operation index. +- **operation** The name of the operation. +- **phase** The name of the operation phase. +- **sessionID** The ID of this push-button reset session. +- **succeeded** Indicates whether the operation successfully completed. +- **timestamp** Timestamp of this push-button reset event. ### Microsoft.Windows.PBR.OperationExecuteStarted @@ -3994,12 +4218,12 @@ No content is currently available. The following fields are available: -- **index** No content is currently available. -- **operation** No content is currently available. -- **phase** No content is currently available. -- **sessionID** No content is currently available. -- **timestamp** No content is currently available. -- **weight** No content is currently available. +- **index** The index of this operation. +- **operation** The name of this operation. +- **phase** The phase of this operation. +- **sessionID** The ID of this push-button reset session. +- **timestamp** Timestamp of this push-button reset event. +- **weight** The weight of the operation used to distribute the change in percentage. ### Microsoft.Windows.PBR.OperationQueueConstructFinished @@ -4008,10 +4232,10 @@ No content is currently available. The following fields are available: -- **error** No content is currently available. -- **sessionID** No content is currently available. -- **succeeded** No content is currently available. -- **timestamp** No content is currently available. +- **error** The result code for operation queue construction. +- **sessionID** The ID of this push-button reset session. +- **succeeded** Indicates whether the operation successfully completed. +- **timestamp** Timestamp of this push-button reset event. ### Microsoft.Windows.PBR.OperationQueueConstructStarted @@ -4020,8 +4244,8 @@ No content is currently available. The following fields are available: -- **sessionID** No content is currently available. -- **timestamp** No content is currently available. +- **sessionID** The ID of this push-button reset session. +- **timestamp** Timestamp of this push-button reset event. ### Microsoft.Windows.PBR.PBRClearRollBackEntry @@ -4030,7 +4254,7 @@ No content is currently available. The following fields are available: -- **SessionID** No content is currently available. +- **SessionID** The ID of this push-button reset session. ### Microsoft.Windows.PBR.PBRClearTPMFailed @@ -4039,7 +4263,7 @@ No content is currently available. The following fields are available: -- **SessionID** No content is currently available. +- **SessionID** The ID of this push-button reset session. ### Microsoft.Windows.PBR.PBRCreateNewSystemReconstructionFailed @@ -4048,12 +4272,12 @@ No content is currently available. The following fields are available: -- **HRESULT** No content is currently available. -- **PBRType** No content is currently available. -- **SessionID** No content is currently available. -- **SPErrorCode** No content is currently available. -- **SPOperation** No content is currently available. -- **SPPhase** No content is currently available. +- **HRESULT** Indicates the result code of the event. +- **PBRType** The type of push-button reset. +- **SessionID** The ID of this push-button reset session. +- **SPErrorCode** The error code for the Setup Platform operation. +- **SPOperation** The last Setup Platform operation. +- **SPPhase** The last phase of the Setup Platform operation. ### Microsoft.Windows.PBR.PBRCreateNewSystemReconstructionSucceed @@ -4062,10 +4286,10 @@ No content is currently available. The following fields are available: -- **CBSPackageCount** No content is currently available. -- **CustomizationPackageCount** No content is currently available. -- **PBRType** No content is currently available. -- **SessionID** No content is currently available. +- **CBSPackageCount** The Component Based Servicing package count. +- **CustomizationPackageCount** The Customization package count. +- **PBRType** The type of push-button reset. +- **SessionID** The ID of this push-button reset session. ### Microsoft.Windows.PBR.PBRDriverInjectionFailed @@ -4074,7 +4298,7 @@ No content is currently available. The following fields are available: -- **SessionID** No content is currently available. +- **SessionID** The ID of this push-button reset session. ### Microsoft.Windows.PBR.PBRFailed @@ -4083,9 +4307,9 @@ No content is currently available. The following fields are available: -- **ErrorType** No content is currently available. -- **PBRType** No content is currently available. -- **SessionID** No content is currently available. +- **ErrorType** The result code for the push-button reset error. +- **PBRType** The type of push-button reset. +- **SessionID** The ID of this push-button reset session. ### Microsoft.Windows.PBR.PBRFinalizeNewSystemFailed @@ -4094,11 +4318,11 @@ No content is currently available. The following fields are available: -- **HRESULT** No content is currently available. -- **SessionID** No content is currently available. -- **SPErrorCode** No content is currently available. -- **SPOperation** No content is currently available. -- **SPPhase** No content is currently available. +- **HRESULT** The result error code. +- **SessionID** The ID of this push-button reset session. +- **SPErrorCode** The error code for the Setup Platform operation. +- **SPOperation** The Setup Platform operation. +- **SPPhase** The phase of the Setup Platform operation. ### Microsoft.Windows.PBR.PBRFinalizeNewSystemSucceed @@ -4107,7 +4331,7 @@ No content is currently available. The following fields are available: -- **SessionID** No content is currently available. +- **SessionID** The ID of this push-button reset session. ### Microsoft.Windows.PBR.PBRFinalUserSelection @@ -4116,12 +4340,12 @@ No content is currently available. The following fields are available: -- **PBREraseData** No content is currently available. -- **PBRRecoveryStrategy** No content is currently available. -- **PBRRepartitionDisk** No content is currently available. -- **PBRVariation** No content is currently available. -- **PBRWipeDataDrives** No content is currently available. -- **SessionID** No content is currently available. +- **PBREraseData** Indicates whether the option to erase data is selected. +- **PBRRecoveryStrategy** The recovery strategy for the push-button reset operation. +- **PBRRepartitionDisk** Indicates whether the user has selected the option to repartition the disk. +- **PBRVariation** Indicates the push-button reset type. +- **PBRWipeDataDrives** Indicates whether the option to wipe the data drives is selected. +- **SessionID** The ID of this push-button reset session. ### Microsoft.Windows.PBR.PBRFormatOSVolumeFailed @@ -4130,8 +4354,8 @@ No content is currently available. The following fields are available: -- **JustDeleteFiles** No content is currently available. -- **SessionID** No content is currently available. +- **JustDeleteFiles** Indicates whether disk formatting was skipped. +- **SessionID** The ID of this push-button reset session. ### Microsoft.Windows.PBR.PBRFormatOSVolumeSucceed @@ -4150,7 +4374,7 @@ No content is currently available. The following fields are available: -- **SessionID** No content is currently available. +- **SessionID** The ID of this push-button reset session. ### Microsoft.Windows.PBR.PBRIOCTLErasureSucceed @@ -4159,7 +4383,7 @@ No content is currently available. The following fields are available: -- **SessionID** No content is currently available. +- **SessionID** The ID of this push-button reset session. ### Microsoft.Windows.PBR.PBRLayoutImageFailed @@ -4168,7 +4392,7 @@ No content is currently available. The following fields are available: -- **SessionID** No content is currently available. +- **SessionID** The ID of this push-button reset session. ### Microsoft.Windows.PBR.PBRLayoutImageSucceed @@ -4177,7 +4401,7 @@ No content is currently available. The following fields are available: -- **SessionID** No content is currently available. +- **SessionID** The ID of this push-button reset session. ### Microsoft.Windows.PBR.PBROEM1Failed @@ -4186,11 +4410,11 @@ No content is currently available. The following fields are available: -- **HRESULT** No content is currently available. -- **Parameters** No content is currently available. -- **PBRType** No content is currently available. -- **ScriptName** No content is currently available. -- **SessionID** No content is currently available. +- **HRESULT** The result error code from the OEM extensibility script. +- **Parameters** The parameters that were passed to the OEM extensibility script. +- **PBRType** The type of push-button reset. +- **ScriptName** The path to the OEM extensibility script. +- **SessionID** The ID of this push-button reset session. ### Microsoft.Windows.PBR.PBROEM2Failed @@ -4199,11 +4423,11 @@ No content is currently available. The following fields are available: -- **HRESULT** No content is currently available. -- **Parameters** No content is currently available. -- **PBRType** No content is currently available. -- **ScriptName** No content is currently available. -- **SessionID** No content is currently available. +- **HRESULT** The result code for the error that occurred while running the OEM extensibility script. +- **Parameters** The parameters to the OEM extensibility script. +- **PBRType** The type of push-button reset. +- **ScriptName** The path to the push-button reset script. +- **SessionID** The ID of the push-button reset session. ### Microsoft.Windows.PBR.PBRPostApplyFailed @@ -4212,7 +4436,7 @@ No content is currently available. The following fields are available: -- **SessionID** No content is currently available. +- **SessionID** The ID of this push-button reset session. ### Microsoft.Windows.PBR.PBRPostApplyFinished @@ -4221,7 +4445,7 @@ No content is currently available. The following fields are available: -- **SessionID** No content is currently available. +- **SessionID** The ID of this push-button reset session. ### Microsoft.Windows.PBR.PBRPostApplyStarted @@ -4230,7 +4454,7 @@ No content is currently available. The following fields are available: -- **SessionID** No content is currently available. +- **SessionID** The ID of this push-button reset session. ### Microsoft.Windows.PBR.PBRPreApplyFailed @@ -4239,7 +4463,7 @@ No content is currently available. The following fields are available: -- **SessionID** No content is currently available. +- **SessionID** The ID of this push-button reset session. ### Microsoft.Windows.PBR.PBRPreApplyFinished @@ -4248,7 +4472,7 @@ No content is currently available. The following fields are available: -- **SessionID** No content is currently available. +- **SessionID** The ID of this push-button reset session. ### Microsoft.Windows.PBR.PBRPreApplyStarted @@ -4257,7 +4481,7 @@ No content is currently available. The following fields are available: -- **SessionID** No content is currently available. +- **SessionID** The ID of this push-button reset session. ### Microsoft.Windows.PBR.PBRReachedOOBE @@ -4275,7 +4499,7 @@ No content is currently available. The following fields are available: -- **SessionID** No content is currently available. +- **SessionID** The ID of this push-button reset session. ### Microsoft.Windows.PBR.PBRRequirementChecks @@ -4284,10 +4508,10 @@ No content is currently available. The following fields are available: -- **DeploymentType** No content is currently available. -- **InstallType** No content is currently available. -- **PBRType** No content is currently available. -- **SessionID** No content is currently available. +- **DeploymentType** The type of deployment. +- **InstallType** The type of installation. +- **PBRType** The type of push-button reset. +- **SessionID** The ID for this push-button reset session. ### Microsoft.Windows.PBR.PBRRequirementChecksFailed @@ -4296,14 +4520,14 @@ No content is currently available. The following fields are available: -- **DiskSpaceAvailable** No content is currently available. -- **DiskSpaceRequired** No content is currently available. -- **ErrorType** No content is currently available. -- **PBRImageVersion** No content is currently available. -- **PBRRecoveryStrategy** No content is currently available. +- **DiskSpaceAvailable** The disk space available for the push-button reset. +- **DiskSpaceRequired** The disk space required for the push-button reset. +- **ErrorType** The type of error that occurred during the requirement checks phase of the push-button reset operation. +- **PBRImageVersion** The image version of the push-button reset tool. +- **PBRRecoveryStrategy** The recovery strategy for this phase of push-button reset. - **PBRStartedFrom** No content is currently available. - **PBRType** No content is currently available. -- **SessionID** No content is currently available. +- **SessionID** The ID of this push-button reset session. ### Microsoft.Windows.PBR.PBRRequirementChecksPassed @@ -4314,10 +4538,10 @@ The following fields are available: - **OSVersion** No content is currently available. - **PBRImageType** No content is currently available. -- **PBRImageVersion** No content is currently available. +- **PBRImageVersion** The version of the push-button reset image. - **PBRRecoveryStrategy** No content is currently available. - **PBRStartedFrom** No content is currently available. -- **SessionID** No content is currently available. +- **SessionID** The ID of this push-button reset session. ### Microsoft.Windows.PBR.PBRRestoreLicenseFailed @@ -4326,7 +4550,7 @@ No content is currently available. The following fields are available: -- **SessionID** No content is currently available. +- **SessionID** The ID of this push-button reset session. ### Microsoft.Windows.PBR.PBRSucceed @@ -4336,8 +4560,8 @@ No content is currently available. The following fields are available: - **OSVersion** No content is currently available. -- **PBRType** No content is currently available. -- **SessionID** No content is currently available. +- **PBRType** The type of push-button reset. +- **SessionID** The ID of this push-button reset session. ### Microsoft.Windows.PBR.PBRUserCancelled @@ -4346,9 +4570,9 @@ No content is currently available. The following fields are available: -- **CancelPage** No content is currently available. -- **PBRVariation** No content is currently available. -- **SessionID** No content is currently available. +- **CancelPage** The ID of the page where the user clicked Cancel. +- **PBRVariation** The type of push-button reset. +- **SessionID** The ID of this push-button reset session. ### Microsoft.Windows.PBR.PBRVersionsMistmatch @@ -4358,8 +4582,8 @@ No content is currently available. The following fields are available: - **OSVersion** No content is currently available. -- **REVersion** No content is currently available. -- **SessionID** No content is currently available. +- **REVersion** The version of Windows Recovery Environment (WinRE). +- **SessionID** The ID of this push-button reset session. ### Microsoft.Windows.PBR.PBRWinREInstallationFailed @@ -4368,7 +4592,7 @@ No content is currently available. The following fields are available: -- **SessionID** No content is currently available. +- **SessionID** The ID of this push-button reset session. ### Microsoft.Windows.PBR.PhaseFinished @@ -4377,11 +4601,11 @@ No content is currently available. The following fields are available: -- **error** No content is currently available. -- **phase** No content is currently available. -- **sessionID** No content is currently available. -- **succeeded** No content is currently available. -- **timestamp** No content is currently available. +- **error** The result code for this phase of push-button reset. +- **phase** The name of this push-button reset phase. +- **sessionID** The ID of this push-button reset session. +- **succeeded** Indicates whether this phase of push-button reset executed successfully. +- **timestamp** The timestamp for this push-button reset event. ### Microsoft.Windows.PBR.PhaseStarted @@ -4390,9 +4614,9 @@ No content is currently available. The following fields are available: -- **phase** No content is currently available. -- **sessionID** No content is currently available. -- **timestamp** No content is currently available. +- **phase** The name of this phase of push-button reset. +- **sessionID** The ID of this push-button reset session. +- **timestamp** The timestamp for this push-button reset event. ### Microsoft.Windows.PBR.ReconstructionInfo @@ -4401,12 +4625,12 @@ No content is currently available. The following fields are available: -- **numPackagesAbandoned** No content is currently available. -- **numPackagesFailed** No content is currently available. -- **sessionID** No content is currently available. -- **slowMode** No content is currently available. +- **numPackagesAbandoned** The number of packages that were abandoned during the reconstruction operation of push-button reset. +- **numPackagesFailed** The number of packages that failed during the reconstruction operation of push-button reset. +- **sessionID** The ID of this push-button reset session. +- **slowMode** The mode of reconstruction. - **targetVersion** No content is currently available. -- **timestamp** No content is currently available. +- **timestamp** The timestamp of this push-button reset event. ### Microsoft.Windows.PBR.ResetOptions @@ -4415,12 +4639,12 @@ No content is currently available. The following fields are available: -- **overwriteSpace** No content is currently available. -- **preserveWorkplace** No content is currently available. -- **scenario** No content is currently available. -- **sessionID** No content is currently available. -- **timestamp** No content is currently available. -- **wipeData** No content is currently available. +- **overwriteSpace** Indicates whether the option was selected to erase data during push-button reset. +- **preserveWorkplace** Indicates whether the option was selected to reserve the workplace during push-button reset. +- **scenario** The selected scenario for the push-button on reset operation. +- **sessionID** The ID of this push-button on reset session. +- **timestamp** The timestamp of this push-button on reset event. +- **wipeData** Indicates whether the option was selected to wipe additional drives during push-button reset. ### Microsoft.Windows.PBR.RetryQueued @@ -4429,9 +4653,9 @@ No content is currently available. The following fields are available: -- **attempt** No content is currently available. -- **sessionID** No content is currently available. -- **timestamp** No content is currently available. +- **attempt** The number of retry attempts that were made +- **sessionID** The ID of this push-button reset session. +- **timestamp** The timestamp of this push-button reset event. ### Microsoft.Windows.PBR.ReturnedToOldOS @@ -4440,8 +4664,8 @@ No content is currently available. The following fields are available: -- **sessionID** No content is currently available. -- **timestamp** No content is currently available. +- **sessionID** The ID of this push-button reset session. +- **timestamp** The timestamp of this push-button reset event. ### Microsoft.Windows.PBR.ReturnTaskSchedulingFailed @@ -4450,10 +4674,10 @@ No content is currently available. The following fields are available: -- **errorCode** No content is currently available. -- **sessionID** No content is currently available. -- **taskName** No content is currently available. -- **timestamp** No content is currently available. +- **errorCode** The error that occurred while scheduling the task. +- **sessionID** The ID of this push-button reset session. +- **taskName** The name of the task. +- **timestamp** The ID of this push-button reset event. ### Microsoft.Windows.PBR.RollbackFinished @@ -4462,10 +4686,10 @@ No content is currently available. The following fields are available: -- **error** No content is currently available. -- **sessionID** No content is currently available. -- **succeeded** No content is currently available. -- **timestamp** No content is currently available. +- **error** Any errors that occurred during rollback to the old operating system. +- **sessionID** The ID of this push-button reset session. +- **succeeded** Indicates whether the rollback succeeded. +- **timestamp** The timestamp of this push-button reset event. ### Microsoft.Windows.PBR.RollbackStarted @@ -4474,8 +4698,8 @@ No content is currently available. The following fields are available: -- **sessionID** No content is currently available. -- **timestamp** No content is currently available. +- **sessionID** The ID of this push-button reset session. +- **timestamp** The timestamp of this push-button reset event. ### Microsoft.Windows.PBR.ScenarioNotSupported @@ -4484,10 +4708,10 @@ No content is currently available. The following fields are available: -- **errorCode** No content is currently available. -- **reason** No content is currently available. -- **sessionID** No content is currently available. -- **timestamp** No content is currently available. +- **errorCode** The error that occurred. +- **reason** The reason why this push-button reset scenario is not supported. +- **sessionID** The ID for this push-button reset session. +- **timestamp** The timestamp of this push-button reset event. ### Microsoft.Windows.PBR.SessionCreated @@ -4496,8 +4720,8 @@ No content is currently available. The following fields are available: -- **sessionID** No content is currently available. -- **timestamp** No content is currently available. +- **sessionID** The ID of this push-button reset session. +- **timestamp** The timestamp of this push-button reset event. ### Microsoft.Windows.PBR.SessionResumed @@ -4506,8 +4730,8 @@ No content is currently available. The following fields are available: -- **sessionID** No content is currently available. -- **timestamp** No content is currently available. +- **sessionID** The ID of this push-button reset session. +- **timestamp** The timestamp of this push-button reset event. ### Microsoft.Windows.PBR.SessionSaved @@ -4516,8 +4740,8 @@ No content is currently available. The following fields are available: -- **sessionID** No content is currently available. -- **timestamp** No content is currently available. +- **sessionID** The ID of this push-button reset session. +- **timestamp** The timestamp of this push-button reset event. ### Microsoft.Windows.PBR.SetupExecuteFinished @@ -4527,8 +4751,8 @@ No content is currently available. The following fields are available: - **sessionID** No content is currently available. -- **systemState** No content is currently available. -- **timestamp** No content is currently available. +- **systemState** Information about the system state of the Setup Platform operation. +- **timestamp** The timestamp of this push-button reset event. ### Microsoft.Windows.PBR.SetupExecuteStarted @@ -4537,8 +4761,8 @@ No content is currently available. The following fields are available: -- **sessionID** No content is currently available. -- **timestamp** No content is currently available. +- **sessionID** The ID of this push-button reset session. +- **timestamp** The timestamp for this push-button reset event. ### Microsoft.Windows.PBR.SetupFinalizeStarted @@ -4547,8 +4771,8 @@ No content is currently available. The following fields are available: -- **sessionID** No content is currently available. -- **timestamp** No content is currently available. +- **sessionID** The ID of this push-button reset session. +- **timestamp** The timestamp for this push-button reset event. ### Microsoft.Windows.PBR.SetupOperationFailed @@ -4557,11 +4781,11 @@ No content is currently available. The following fields are available: -- **errorCode** No content is currently available. -- **sessionID** No content is currently available. -- **setupExecutionOperation** No content is currently available. -- **setupExecutionPhase** No content is currently available. -- **timestamp** No content is currently available. +- **errorCode** An error that occurred during the setup phase of push-button reset. +- **sessionID** The ID of this push-button reset session. +- **setupExecutionOperation** The name of the Setup Platform operation. +- **setupExecutionPhase** The phase of the setup operation that failed. +- **timestamp** The timestamp of this push-button reset event. ### Microsoft.Windows.PBR.SystemInfoField @@ -4570,10 +4794,10 @@ No content is currently available. The following fields are available: -- **name** No content is currently available. -- **sessionID** No content is currently available. -- **timestamp** No content is currently available. -- **value** No content is currently available. +- **name** Name of the system information field. +- **sessionID** The ID of this push-button reset session. +- **timestamp** The timestamp of this push-button reset event. +- **value** The system information field value. ### Microsoft.Windows.PBR.SystemInfoListItem @@ -4582,11 +4806,11 @@ No content is currently available. The following fields are available: -- **index** No content is currently available. -- **name** No content is currently available. -- **sessionID** No content is currently available. -- **timestamp** No content is currently available. -- **value** No content is currently available. +- **index** The index number associated with the system information item. +- **name** The name of the list of system information items. +- **sessionID** The ID of this push-button reset session. +- **timestamp** The timestamp for this push-button reset event. +- **value** The value of the system information item. ### Microsoft.Windows.PBR.SystemInfoSenseFinished @@ -4595,10 +4819,10 @@ No content is currently available. The following fields are available: -- **error** No content is currently available. -- **sessionID** No content is currently available. -- **succeeded** No content is currently available. -- **timestamp** No content is currently available. +- **error** The error code if an error occurred while querying for system information. +- **sessionID** The ID of this push-button reset session. +- **succeeded** Indicates whether the query for system information was successful. +- **timestamp** The timestamp of this push-button reset event. ### Microsoft.Windows.PBR.SystemInfoSenseStarted @@ -4607,8 +4831,8 @@ No content is currently available. The following fields are available: -- **sessionID** No content is currently available. -- **timestamp** No content is currently available. +- **sessionID** The ID of this push-button reset event. +- **timestamp** The timestamp of this push-button reset event. ### Microsoft.Windows.PBR.UserAcknowledgeCleanupWarning @@ -4617,8 +4841,8 @@ No content is currently available. The following fields are available: -- **sessionID** No content is currently available. -- **timestamp** No content is currently available. +- **sessionID** The ID of this push-button reset session. +- **timestamp** The timestamp for this push-button reset event. ### Microsoft.Windows.PBR.UserCancel @@ -4627,9 +4851,9 @@ No content is currently available. The following fields are available: -- **pageID** No content is currently available. -- **sessionID** No content is currently available. -- **timestamp** No content is currently available. +- **pageID** The page ID for the page the user canceled. +- **sessionID** The ID of this push-button reset session. +- **timestamp** The timestamp for this push-button reset event. ### Microsoft.Windows.PBR.UserConfirmStart @@ -4638,8 +4862,8 @@ No content is currently available. The following fields are available: -- **sessionID** No content is currently available. -- **timestamp** No content is currently available. +- **sessionID** The ID of this push-button reset session. +- **timestamp** The timestamp for this push-button reset event. ### Microsoft.Windows.PBR.WinREInstallFinished @@ -4648,10 +4872,10 @@ No content is currently available. The following fields are available: -- **errorCode** No content is currently available. -- **sessionID** No content is currently available. -- **success** No content is currently available. -- **timestamp** No content is currently available. +- **errorCode** Any error that occurred during the Windows Recovery Environment (WinRE) installation. +- **sessionID** The ID of this push-button reset session. +- **success** Indicates whether the Windows Recovery Environment (WinRE) installation successfully completed. +- **timestamp** The timestamp for this push-button reset event. ### Microsoft.Windows.PBR.WinREInstallStarted @@ -4660,8 +4884,8 @@ No content is currently available. The following fields are available: -- **sessionID** No content is currently available. -- **timestamp** No content is currently available. +- **sessionID** The ID of this push-button reset session. +- **timestamp** The timestamp for this push-button reset event. ### Microsoft.Windows.Security.WSC.DatastoreMigratedVersion @@ -4670,9 +4894,9 @@ This event provides information about the datastore migration and whether it was The following fields are available: -- **datastoreisvtype** No content is currently available. -- **datastoremigrated** No content is currently available. -- **status** No content is currently available. +- **datastoreisvtype** The product category of the datastore. +- **datastoremigrated** The version of the datastore that was migrated. +- **status** The result code of the migration. ### Microsoft.Windows.Security.WSC.GetCallerViaWdsp @@ -4735,28 +4959,28 @@ No content is currently available. The following fields are available: -- **errorCode** No content is currently available. +- **errorCode** The error code if there was a failure during uninstallation of the latest cumulative Windows update package. ### Microsoft.Windows.SysReset.LCUUninstall -No content is currently available. +This event is sent when the latest cumulative Windows update was uninstalled on a device. The following fields are available: -- **errorCode** No content is currently available. -- **packageName** No content is currently available. -- **removalTime** No content is currently available. +- **errorCode** An error that occurred while the Windows update package was being uninstalled. +- **packageName** The name of the Windows update package that is being uninstalled. +- **removalTime** The amount of time it took to uninstall the Windows update package. ### Microsoft.Windows.SysReset.PBRBlockedByPolicy -No content is currently available. +This event is sent when a push-button reset operation is blocked by the System Administrator. The following fields are available: -- **PBRBlocked** No content is currently available. -- **PBRType** No content is currently available. +- **PBRBlocked** Reason the push-button reset operation was blocked. +- **PBRType** The type of push-button reset operation that was blocked. ### Microsoft.Windows.SysReset.PBREngineInitFailed @@ -4790,13 +5014,13 @@ The following fields are available: ### Microsoft.Windows.SystemReset.EsimPresentCheck -No content is currently available. +This event is sent when a device is checked to see whether it has an embedded SIM (eSIM). The following fields are available: -- **errorCode** No content is currently available. -- **esimPresent** No content is currently available. -- **sessionID** No content is currently available. +- **errorCode** Any error that occurred while checking for the presence of an embedded SIM. +- **esimPresent** Indicates whether an embedded SIM is present on the device. +- **sessionID** The ID of this session. ### Microsoft.Windows.SystemReset.PBRCorruptionRepairOption @@ -4813,12 +5037,12 @@ The following fields are available: ### Microsoft.Windows.SystemReset.RepairNeeded -No content is currently available. +This event provides information about whether a system reset needs repair. The following fields are available: -- **repairNeeded** No content is currently available. -- **sessionID** No content is currently available. +- **repairNeeded** Indicates whether there was corruption in the system reset which needs repair. +- **sessionID** The ID of this push-button reset session. ### Microsoft.Xbox.XamTelemetry.AppActivationError @@ -7406,19 +7630,19 @@ The following fields are available: - **OwningScenarioId** The scenario ID the client that called the begin scenario function. - **ReturnCode** The return code for the begin scenario operation. - **ScenarioId** The scenario ID that is internal to the reserve manager. -- **SoftReserveSize** No content is currently available. -- **SoftReserveUsedSpace** No content is currently available. +- **SoftReserveSize** The size of the soft reserve. +- **SoftReserveUsedSpace** The amount of soft reserve space that was used. ### Microsoft.Windows.UpdateReserveManager.ClearReserve -No content is currently available. +This event is sent when the Update Reserve Manager clears one of the reserves. The following fields are available: -- **FinalReserveUsedSpace** No content is currently available. -- **InitialReserveUsedSpace** No content is currently available. -- **ReserveId** No content is currently available. +- **FinalReserveUsedSpace** The amount of used space for the reserve after it was cleared. +- **InitialReserveUsedSpace** The amount of used space for the reserve before it was cleared. +- **ReserveId** The ID of the reserve that needs to be cleared. ### Microsoft.Windows.UpdateReserveManager.ClearSoftReserve @@ -7557,8 +7781,8 @@ This event is sent when the Update Reserve Manager needs to adjust the size of t The following fields are available: - **ChangeSize** The change in the hard reserve size based on the addition or removal of optional content. -- **Disposition** No content is currently available. -- **Flags** No content is currently available. +- **Disposition** The parameter for the hard reserve adjustment function. +- **Flags** The flags passed to the hard reserve adjustment function. - **PendingHardReserveAdjustment** The final change to the hard reserve size. - **UpdateType** Indicates whether the change is an increase or decrease in the size of the hard reserve. From 6d94f92d119702fd58fb35a2dc28a4b2042b5c0e Mon Sep 17 00:00:00 2001 From: Jeanie Decker Date: Tue, 12 Mar 2019 09:00:25 -0700 Subject: [PATCH 052/724] kick --- windows/configuration/wcd/wcd-time.md | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/windows/configuration/wcd/wcd-time.md b/windows/configuration/wcd/wcd-time.md index 52ade98614..53ddcd5768 100644 --- a/windows/configuration/wcd/wcd-time.md +++ b/windows/configuration/wcd/wcd-time.md @@ -13,7 +13,7 @@ ms.date: 09/06/2017 # Time -Use **Time** to configure settings for time zone setup for Windows 10, version (TBD) and later. +Use **Time** to configure settings for time zone setup for Windows 10, version (TBD) and later. ## Applies to From 69c866cdb8abfd71ae970761a553a8904d871876 Mon Sep 17 00:00:00 2001 From: Jeanie Decker Date: Tue, 12 Mar 2019 09:11:35 -0700 Subject: [PATCH 053/724] dataclassmapping --- windows/configuration/wcd/wcd-cellular.md | 4 ++++ 1 file changed, 4 insertions(+) diff --git a/windows/configuration/wcd/wcd-cellular.md b/windows/configuration/wcd/wcd-cellular.md index f6c9545c4a..1019d87dd8 100644 --- a/windows/configuration/wcd/wcd-cellular.md +++ b/windows/configuration/wcd/wcd-cellular.md @@ -52,6 +52,10 @@ Enter the destination path for the BrandingIcon .ico file. Enter the service provider name for the mobile operator. +### DataClassMappingTable + +Enter a customized string for the appropriate [data class](https://docs.microsoft.com/windows/desktop/api/mbnapi/ne-mbnapi-mbn_data_class). + ### NetworkBlockList Enter a comma-separated list of mobile country code (MCC) and mobile network code (MCC) pairs (MCC:MNC). From 0d9297789312bb864eddb6ad42dd1277846cabec Mon Sep 17 00:00:00 2001 From: Jeanie Decker Date: Tue, 12 Mar 2019 09:28:16 -0700 Subject: [PATCH 054/724] enablecortanavoice --- windows/configuration/wcd/wcd-changes.md | 2 ++ windows/configuration/wcd/wcd-oobe.md | 30 +++++++++++++++--------- 2 files changed, 21 insertions(+), 11 deletions(-) diff --git a/windows/configuration/wcd/wcd-changes.md b/windows/configuration/wcd/wcd-changes.md index f235ced4e7..909614945c 100644 --- a/windows/configuration/wcd/wcd-changes.md +++ b/windows/configuration/wcd/wcd-changes.md @@ -18,6 +18,8 @@ ms.date: 10/02/2018 - [DeviceUpdateCenter](wcd-deviceupdatecenter.md) - [Privacy](wcd-privacy.md) - [Time](wcd-time.md) +- [Cellular > DataClassMappingTable](wcd-cellular.md#dataclassmappingtable) +- [OOBE > EnableCortanaVoice](wcd-oobe.md#enablecortanavoice) ## Settings removed in Windows 10, version ? diff --git a/windows/configuration/wcd/wcd-oobe.md b/windows/configuration/wcd/wcd-oobe.md index 35acf44bc2..8c3e9913d9 100644 --- a/windows/configuration/wcd/wcd-oobe.md +++ b/windows/configuration/wcd/wcd-oobe.md @@ -19,9 +19,27 @@ Use to configure settings for the Out Of Box Experience (OOBE). | Setting | Desktop editions | Mobile editions | Surface Hub | HoloLens | IoT Core | | --- | :---: | :---: | :---: | :---: | :---: | +| [Desktop > EnableCortanaVoice](#enablecortanavoice) | X | | | | | +| [Desktop > HideOobe](#hided) | X | | | | | | [Mobile > EnforceEnterpriseProvisioning](#nforce) | | X | | | | | [Mobile > HideOobe](#hidem) | | X | | | | -| [Desktop > HideOobe](#hided) | X | | | | | + + + + +## EnableCortanaVoice + +Use this setting to control whether Cortana voice-over is enabled during OOBE. The voice-over is disabled by default. Select **True** to enable voice-over during OOBE on Windows 10 Pro, Education, and Enterprise. + + +## HideOobe for desktop + +When set to **True**, it hides the interactive OOBE flow for Windows 10. + +>[!NOTE] +>You must create a user account if you set the value to true or the device will not be usable. + +When set to **False**, the OOBE screens are displayed. ## EnforceEnterpriseProvisioning @@ -35,14 +53,4 @@ When set to **False**, it does not force the OOBE flow to the enterprise provisi When set to **True**, it hides the interactive OOBE flow for Windows 10 Mobile. -When set to **False**, the OOBE screens are displayed. - - -## HideOobe for desktop - -When set to **True**, it hides the interactive OOBE flow for Windows 10. - ->[!NOTE] ->You must create a user account if you set the value to true or the device will not be usable. - When set to **False**, the OOBE screens are displayed. \ No newline at end of file From d3b8b81f0229a494b1db52579589ecd2c31bec44 Mon Sep 17 00:00:00 2001 From: Jeanie Decker Date: Tue, 12 Mar 2019 11:22:20 -0700 Subject: [PATCH 055/724] tweak --- windows/configuration/wcd/wcd-oobe.md | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/windows/configuration/wcd/wcd-oobe.md b/windows/configuration/wcd/wcd-oobe.md index 8c3e9913d9..b6ca14a3ca 100644 --- a/windows/configuration/wcd/wcd-oobe.md +++ b/windows/configuration/wcd/wcd-oobe.md @@ -29,7 +29,7 @@ Use to configure settings for the Out Of Box Experience (OOBE). ## EnableCortanaVoice -Use this setting to control whether Cortana voice-over is enabled during OOBE. The voice-over is disabled by default. Select **True** to enable voice-over during OOBE on Windows 10 Pro, Education, and Enterprise. +Use this setting to control whether Cortana voice-over is enabled during OOBE. The voice-over is disabled by default on Windows 10 Pro, Education, and Enterprise. The voice-over is enabled by default on Windows 10 Home. Select **True** to enable voice-over during OOBE. ## HideOobe for desktop From afc765a3568c666251a9d43ff34e1780826970b2 Mon Sep 17 00:00:00 2001 From: Brian Lich Date: Tue, 12 Mar 2019 16:33:28 -0700 Subject: [PATCH 056/724] new build 3/12/2019 4:33 PM --- ...ndows-diagnostic-events-and-fields-1703.md | 71 +- ...ndows-diagnostic-events-and-fields-1709.md | 18 +- ...ndows-diagnostic-events-and-fields-1803.md | 16 +- ...ndows-diagnostic-events-and-fields-1809.md | 15449 ++++++++-------- 4 files changed, 7947 insertions(+), 7607 deletions(-) diff --git a/windows/privacy/basic-level-windows-diagnostic-events-and-fields-1703.md b/windows/privacy/basic-level-windows-diagnostic-events-and-fields-1703.md index ab42290c6b..2e2ac4486f 100644 --- a/windows/privacy/basic-level-windows-diagnostic-events-and-fields-1703.md +++ b/windows/privacy/basic-level-windows-diagnostic-events-and-fields-1703.md @@ -7,13 +7,13 @@ ms.mktglfcycl: manage ms.sitesec: library ms.pagetype: security localizationpriority: high -audience: ITPro author: brianlic-msft ms.author: brianlic manager: dansimp ms.collection: M365-security-compliance ms.topic: article -ms.date: 02/15/2019 +audience: ITPro +ms.date: 03/12/2019 --- @@ -1822,61 +1822,6 @@ The following fields are available: ## Diagnostic data events -### TelClientSynthetic.AbnormalShutdown_0 - -This event sends data about boot IDs for which a normal clean shutdown was not observed, to help keep Windows up to date. - -The following fields are available: - -- **AbnormalShutdownBootId** Retrieves the Boot ID for which the abnormal shutdown was observed. -- **CrashDumpEnabled** Indicates whether crash dumps are enabled. -- **CumulativeCrashCount** Cumulative count of operating system crashes since the BootId reset. -- **CurrentBootId** BootId at the time the abnormal shutdown event was being reported. -- **FirmwareResetReasonEmbeddedController** Firmware-supplied reason for the reset. -- **FirmwareResetReasonEmbeddedControllerAdditional** Additional data related to the reset reason provided by the firmware. -- **FirmwareResetReasonPch** Hardware-supplied reason for the reset. -- **FirmwareResetReasonPchAdditional** Additional data related to the reset reason provided by the hardware. -- **FirmwareResetReasonSupplied** Indicates whether the firmware supplied any reset reason. -- **FirmwareType** ID of the FirmwareType as enumerated in DimFirmwareType. -- **HardwareWatchdogTimerGeneratedLastReset** Indicates whether the hardware watchdog timer caused the last reset. -- **HardwareWatchdogTimerPresent** Indicates whether hardware watchdog timer was present or not. -- **LastBugCheckBootId** The Boot ID of the last captured crash. -- **LastBugCheckCode** Code that indicates the type of error. -- **LastBugCheckContextFlags** Additional crash dump settings. -- **LastBugCheckOriginalDumpType** The type of crash dump the system intended to save. -- **LastBugCheckOtherSettings** Other crash dump settings. -- **LastBugCheckParameter1** The first parameter with additional info on the type of the error. -- **LastBugCheckProgress** Progress towards writing out the last crash dump. -- **LastSuccessfullyShutdownBootId** The Boot ID of the last fully successful shutdown. -- **PowerButtonCumulativePressCount** Indicates the number of times the power button has been pressed ("pressed" not to be confused with "released"). -- **PowerButtonCumulativeReleaseCount** Indicates the number of times the power button has been released ("released" not to be confused with "pressed"). -- **PowerButtonErrorCount** Indicates the number of times there was an error attempting to record Power Button metrics (e.g.: due to a failure to lock/update the bootstat file). -- **PowerButtonLastPressBootId** The Boot ID of the last time the Power Button was detected to have been pressed ("pressed" not to be confused with "released"). -- **PowerButtonLastPressTime** The date and time the Power Button was most recently pressed ("pressed" not to be confused with "released"). -- **PowerButtonLastReleaseBootId** The Boot ID of the last time the Power Button was released ("released" not to be confused with "pressed"). -- **PowerButtonLastReleaseTime** The date and time the Power Button was most recently released ("released" not to be confused with "pressed"). -- **PowerButtonPressCurrentCsPhase** Represents the phase of Connected Standby exit when the power button was pressed. -- **PowerButtonPressIsShutdownInProgress** Indicates whether a system shutdown was in progress at the last time the Power Button was pressed. -- **PowerButtonPressLastPowerWatchdogStage** The last stage completed when the Power Button was most recently pressed. -- **PowerButtonPressPowerWatchdogArmed** Indicates whether or not the watchdog for the monitor was active at the time of the last power button press. -- **TransitionInfoBootId** The Boot ID of the captured transition information. -- **TransitionInfoCSCount** The total number of times the system transitioned from "Connected Standby" mode to "On" when the last marker was saved. -- **TransitionInfoCSEntryReason** Indicates the reason the device last entered "Connected Standby" mode ("entered" not to be confused with "exited"). -- **TransitionInfoCSExitReason** Indicates the reason the device last exited "Connected Standby" mode ("exited" not to be confused with "entered"). -- **TransitionInfoCSInProgress** Indicates whether the system was in or entering Connected Standby mode when the last marker was saved. -- **TransitionInfoLastReferenceTimeChecksum** The checksum of TransitionInfoLastReferenceTimestamp. -- **TransitionInfoLastReferenceTimestamp** The date and time that the marker was last saved. -- **TransitionInfoPowerButtonTimestamp** The most recent date and time when the Power Button was pressed (collected via a different mechanism than PowerButtonLastPressTime). -- **TransitionInfoSleepInProgress** Indicates whether the system was in or entering Sleep mode when the last marker was saved. -- **TransitionInfoSleepTranstionsToOn** The total number of times the system transitioned from Sleep mode to on, when the last marker was saved. -- **TransitionInfoSystemRunning** Indicates whether the system was running when the last marker was saved. -- **TransitionInfoSystemShutdownInProgress** Indicates whether a device shutdown was in progress when the power button was pressed. -- **TransitionInfoUserShutdownInProgress** Indicates whether a user shutdown was in progress when the power button was pressed. -- **TransitionLatestCheckpointId** Represents a unique identifier for a checkpoint during the device state transition. -- **TransitionLatestCheckpointSeqNumber** Represents the chronological sequence number of the checkpoint. -- **TransitionLatestCheckpointType** Represents the type of the checkpoint, which can be the start of a phase, end of a phase, or just informational. - - ### TelClientSynthetic.AuthorizationInfo_RuntimeTransition This event sends data indicating that a device has undergone a change of telemetry opt-in level detected at UTC startup, to help keep Windows up to date. The telemetry opt-in level signals what data we are allowed to collect. @@ -4236,7 +4181,7 @@ The following fields are available: - **RelatedCV** The Correlation Vector that was used before the most recent change to a new Correlation Vector. - **RepeatFailFlag** Indicates whether this specific piece of content had previously failed to download. - **RevisionNumber** The revision number of the specified piece of content. -- **ServiceGuid** A unique identifier for the service that the software distribution client is installing content for (Windows Update, Microsoft Store, etc.). +- **ServiceGuid** A unique identifier for the service that the software distribution client is installing content for (Windows Update, Windows Store, etc.). - **Setup360Phase** Identifies the active phase of the upgrade download if the current download is for an Operating System upgrade. - **ShippingMobileOperator** The mobile operator linked to the device when the device shipped. - **StatusCode** Indicates the result of a Download event (success, cancellation, failure code HResult). @@ -5127,12 +5072,12 @@ This event lists the reboot reason when an app is going to reboot. The following fields are available: -- **BootId** The boot ID. +- **BootId** The system boot ID. - **BoottimeSinceLastShutdown** The boot time since the last shutdown. - **RebootReason** Reason for the reboot. -## Microsoft Store events +## Windows Store events ### Microsoft.Windows.Store.Partner.ReportApplication @@ -6296,6 +6241,12 @@ This event sends data specific to the FixupEditionId mitigation used for OS Upda ## Windows Update Reserve Manager events +### Microsoft.Windows.UpdateReserveManager.InitializeUpdateReserveManager + +This event returns data about the Update Reserve Manager, including whether it’s been initialized. + + + ### Microsoft.Windows.UpdateReserveManager.RemovePendingHardReserveAdjustment This event is sent when the Update Reserve Manager removes a pending hard reserve adjustment. diff --git a/windows/privacy/basic-level-windows-diagnostic-events-and-fields-1709.md b/windows/privacy/basic-level-windows-diagnostic-events-and-fields-1709.md index 658324d8b4..d6a2e128d8 100644 --- a/windows/privacy/basic-level-windows-diagnostic-events-and-fields-1709.md +++ b/windows/privacy/basic-level-windows-diagnostic-events-and-fields-1709.md @@ -7,13 +7,13 @@ ms.mktglfcycl: manage ms.sitesec: library ms.pagetype: security localizationpriority: high -audience: ITPro author: brianlic-msft ms.author: brianlic manager: dansimp ms.collection: M365-security-compliance ms.topic: article -ms.date: 02/15/2019 +audience: ITPro +ms.date: 03/12/2019 --- @@ -68,7 +68,7 @@ The following fields are available: - **DecisionSystemBios_19H1Setup** The total DecisionSystemBios objects targeting the next release of Windows on this device. - **DecisionSystemBios_RS4** The total DecisionSystemBios objects targeting Windows 10 version, 1803 present on this device. - **InventoryApplicationFile** The count of the number of this particular object type present on this device. -- **InventoryLanguagePack** The count of the number of this particular object type present on this device. +- **InventoryLanguagePack** The count of InventoryLanguagePack objects present on this machine. - **InventoryMediaCenter** The count of the number of this particular object type present on this device. - **InventorySystemBios** The count of the number of this particular object type present on this device. - **InventoryUplevelDriverPackage** The count of the number of this particular object type present on this device. @@ -4128,7 +4128,7 @@ The following fields are available: - **HandlerType** Indicates the kind of content (app, driver, windows patch, etc.) - **RevisionNumber** Unique revision number of Update - **ServerId** Identifier for the service to which the software distribution client is connecting, such as Windows Update and Microsoft Store. -- **ServiceGuid** Identifier for the service to which the software distribution client is connecting (Windows Update, Microsoft Store, etc) +- **ServiceGuid** Identifier for the service to which the software distribution client is connecting (Windows Update, Windows Store, etc) - **SystemBIOSMajorRelease** Major version of the BIOS. - **SystemBIOSMinorRelease** Minor version of the BIOS. - **UpdateId** Unique Update ID @@ -4192,7 +4192,7 @@ The following fields are available: - **RelatedCV** The previous Correlation Vector that was used before swapping with a new one - **RepeatFailFlag** Indicates whether this specific piece of content had previously failed to download. - **RevisionNumber** The revision number of the specified piece of content. -- **ServiceGuid** A unique identifier for the service that the software distribution client is installing content for (Windows Update, Microsoft Store, etc.). +- **ServiceGuid** A unique identifier for the service that the software distribution client is installing content for (Windows Update, Windows Store, etc.). - **Setup360Phase** Identifies the active phase of the upgrade download if the current download is for an Operating System upgrade. - **ShippingMobileOperator** The mobile operator linked to the device when the device shipped. - **StatusCode** Indicates the result of a Download event (success, cancellation, failure code HResult). @@ -5298,7 +5298,7 @@ The following fields are available: - **ReportId** WER Report Id associated with this bug check (used for finding the corresponding report archive in Watson). -## Microsoft Store events +## Windows Store events ### Microsoft.Windows.Store.Partner.ReportApplication @@ -6514,6 +6514,12 @@ The following fields are available: ## Windows Update Reserve Manager events +### Microsoft.Windows.UpdateReserveManager.InitializeUpdateReserveManager + +This event returns data about the Update Reserve Manager, including whether it’s been initialized. + + + ### Microsoft.Windows.UpdateReserveManager.RemovePendingHardReserveAdjustment This event is sent when the Update Reserve Manager removes a pending hard reserve adjustment. diff --git a/windows/privacy/basic-level-windows-diagnostic-events-and-fields-1803.md b/windows/privacy/basic-level-windows-diagnostic-events-and-fields-1803.md index 55e5adf886..e88b4da389 100644 --- a/windows/privacy/basic-level-windows-diagnostic-events-and-fields-1803.md +++ b/windows/privacy/basic-level-windows-diagnostic-events-and-fields-1803.md @@ -7,13 +7,13 @@ ms.mktglfcycl: manage ms.sitesec: library ms.pagetype: security localizationpriority: high -audience: ITPro author: brianlic-msft ms.author: brianlic manager: dansimp ms.collection: M365-security-compliance ms.topic: article -ms.date: 02/15/2019 +audience: ITPro +ms.date: 03/12/2019 --- @@ -4934,7 +4934,7 @@ The following fields are available: - **FlightId** The specific id of the flight the device is getting - **HandlerType** Indicates the kind of content (app, driver, windows patch, etc.) - **RevisionNumber** Identifies the revision number of this specific piece of content -- **ServiceGuid** Identifier for the service to which the software distribution client is connecting (Windows Update, Microsoft Store, etc) +- **ServiceGuid** Identifier for the service to which the software distribution client is connecting (Windows Update, Windows Store, etc) - **SystemBIOSMajorRelease** Major release version of the system bios - **SystemBIOSMinorRelease** Minor release version of the system bios - **UpdateId** Identifier associated with the specific piece of content @@ -4997,7 +4997,7 @@ The following fields are available: - **RelatedCV** The Correlation Vector that was used before the most recent change to a new Correlation Vector. - **RepeatFailFlag** Indicates whether this specific piece of content had previously failed to download. - **RevisionNumber** The revision number of the specified piece of content. -- **ServiceGuid** A unique identifier for the service that the software distribution client is installing content for (Windows Update, Microsoft Store, etc.). +- **ServiceGuid** A unique identifier for the service that the software distribution client is installing content for (Windows Update, Windows Store, etc.). - **Setup360Phase** Identifies the active phase of the upgrade download if the current download is for an Operating System upgrade. - **ShippingMobileOperator** The mobile operator linked to the device when the device shipped. - **StatusCode** Indicates the result of a Download event (success, cancellation, failure code HResult). @@ -5988,7 +5988,7 @@ The following fields are available: - **PertProb** Constant used in algorithm for randomization. -## Microsoft Store events +## Windows Store events ### Microsoft.Windows.Store.StoreActivating @@ -7646,6 +7646,12 @@ This event is sent when the Update Reserve Manager returns an error from one of +### Microsoft.Windows.UpdateReserveManager.InitializeUpdateReserveManager + +This event returns data about the Update Reserve Manager, including whether it’s been initialized. + + + ### Microsoft.Windows.UpdateReserveManager.PrepareTIForReserveInitialization This event is sent when the Update Reserve Manager prepares the Trusted Installer to initialize reserves on the next boot. diff --git a/windows/privacy/basic-level-windows-diagnostic-events-and-fields-1809.md b/windows/privacy/basic-level-windows-diagnostic-events-and-fields-1809.md index f8a042ef3d..fd7cd31194 100644 --- a/windows/privacy/basic-level-windows-diagnostic-events-and-fields-1809.md +++ b/windows/privacy/basic-level-windows-diagnostic-events-and-fields-1809.md @@ -1,7536 +1,7913 @@ ---- -description: Use this article to learn more about what Windows diagnostic data is gathered at the basic level. -title: Windows 10, version 1809 basic diagnostic events and fields (Windows 10) -keywords: privacy, telemetry -ms.prod: w10 -ms.mktglfcycl: manage -ms.sitesec: library -ms.pagetype: security -localizationpriority: high -audience: ITPro -author: brianlic-msft -ms.author: brianlic -manager: dansimp -ms.collection: M365-security-compliance -ms.topic: article -ms.date: 02/15/2019 ---- - - -# Windows 10, version 1809 basic level Windows diagnostic events and fields - - **Applies to** - -- Windows 10, version 1809 - - -The Basic level gathers a limited set of information that is critical for understanding the device and its configuration including: basic device information, quality-related information, app compatibility, and Microsoft Store. When the level is set to Basic, it also includes the Security level information. - -The Basic level helps to identify problems that can occur on a particular device hardware or software configuration. For example, it can help determine if crashes are more frequent on devices with a specific amount of memory or that are running a particular driver version. This helps Microsoft fix operating system or app problems. - -Use this article to learn about diagnostic events, grouped by event area, and the fields within each event. A brief description is provided for each field. Every event generated includes common data, which collects device data. - -You can learn more about Windows functional and diagnostic data through these articles: - - -- [Windows 10, version 1803 basic diagnostic events and fields](basic-level-windows-diagnostic-events-and-fields-1803.md) -- [Windows 10, version 1709 basic diagnostic events and fields](basic-level-windows-diagnostic-events-and-fields-1709.md) -- [Windows 10, version 1703 basic diagnostic events and fields](basic-level-windows-diagnostic-events-and-fields-1703.md) -- [Manage connections from Windows operating system components to Microsoft services](manage-connections-from-windows-operating-system-components-to-microsoft-services.md) -- [Configure Windows diagnostic data in your organization](configure-windows-diagnostic-data-in-your-organization.md) - - - - -## Account trace logging provider events - -### Microsoft.Windows.Mitigation.AccountTraceLoggingProvider.General - -This event provides information about application properties to indicate the successful execution. - -The following fields are available: - -- **AppMode** Indicates the mode the app is being currently run around privileges. -- **ExitCode** Indicates the exit code of the app. -- **Help** Indicates if the app needs to be launched in the help mode. -- **ParseError** Indicates if there was a parse error during the execution. -- **RightsAcquired** Indicates if the right privileges were acquired for successful execution. -- **RightsWereEnabled** Indicates if the right privileges were enabled for successful execution. -- **TestMode** Indicates whether the app is being run in test mode. - - -### Microsoft.Windows.Mitigation.AccountTraceLoggingProvider.GetCount - -This event provides information about the properties of user accounts in the Administrator group. - -The following fields are available: - -- **Internal** Indicates the internal property associated with the count group. -- **LastError** The error code (if applicable) for the cause of the failure to get the count of the user account. -- **Result** The HResult error. - - -## AppLocker events - -### Microsoft.Windows.Security.AppLockerCSP.ActivityStoppedAutomatically - -Automatically closed activity for start/stop operations that aren't explicitly closed. - - - -### Microsoft.Windows.Security.AppLockerCSP.AddParams - -Parameters passed to Add function of the AppLockerCSP Node. - -The following fields are available: - -- **child** The child URI of the node to add. -- **uri** URI of the node relative to %SYSTEM32%/AppLocker. - - -### Microsoft.Windows.Security.AppLockerCSP.AddStart - -Start of "Add" Operation for the AppLockerCSP Node. - - - -### Microsoft.Windows.Security.AppLockerCSP.AddStop - -End of "Add" Operation for AppLockerCSP Node. - -The following fields are available: - -- **hr** The HRESULT returned by Add function in AppLockerCSP. - - -### Microsoft.Windows.Security.AppLockerCSP.CAppLockerCSP::Rollback - -Result of the 'Rollback' operation in AppLockerCSP. - -The following fields are available: - -- **oldId** Previous id for the CSP transaction. -- **txId** Current id for the CSP transaction. - - -### Microsoft.Windows.Security.AppLockerCSP.ClearParams - -Parameters passed to the "Clear" operation for AppLockerCSP. - -The following fields are available: - -- **uri** The URI relative to the %SYSTEM32%\AppLocker folder. - - -### Microsoft.Windows.Security.AppLockerCSP.ClearStart - -Start of the "Clear" operation for the AppLockerCSP Node. - - - -### Microsoft.Windows.Security.AppLockerCSP.ClearStop - -End of the "Clear" operation for the AppLockerCSP node. - -The following fields are available: - -- **hr** HRESULT reported at the end of the 'Clear' function. - - -### Microsoft.Windows.Security.AppLockerCSP.ConfigManagerNotificationStart - -Start of the "ConfigManagerNotification" operation for AppLockerCSP. - -The following fields are available: - -- **NotifyState** State sent by ConfigManager to AppLockerCSP. - - -### Microsoft.Windows.Security.AppLockerCSP.ConfigManagerNotificationStop - -End of the "ConfigManagerNotification" operation for AppLockerCSP. - -The following fields are available: - -- **hr** HRESULT returned by the ConfigManagerNotification function in AppLockerCSP. - - -### Microsoft.Windows.Security.AppLockerCSP.CreateNodeInstanceParams - -Parameters passed to the CreateNodeInstance function of the AppLockerCSP node. - -The following fields are available: - -- **NodeId** NodeId passed to CreateNodeInstance. -- **nodeOps** NodeOperations parameter passed to CreateNodeInstance. -- **uri** URI passed to CreateNodeInstance, relative to %SYSTEM32%\AppLocker. - - -### Microsoft.Windows.Security.AppLockerCSP.CreateNodeInstanceStart - -Start of the "CreateNodeInstance" operation for the AppLockerCSP node. - - - -### Microsoft.Windows.Security.AppLockerCSP.CreateNodeInstanceStop - -End of the "CreateNodeInstance" operation for the AppLockerCSP node - -The following fields are available: - -- **hr** HRESULT returned by the CreateNodeInstance function in AppLockerCSP. - - -### Microsoft.Windows.Security.AppLockerCSP.DeleteChildParams - -Parameters passed to the DeleteChild function of the AppLockerCSP node. - -The following fields are available: - -- **child** The child URI of the node to delete. -- **uri** URI relative to %SYSTEM32%\AppLocker. - - -### Microsoft.Windows.Security.AppLockerCSP.DeleteChildStart - -Start of the "DeleteChild" operation for the AppLockerCSP node. - - - -### Microsoft.Windows.Security.AppLockerCSP.DeleteChildStop - -End of the "DeleteChild" operation for the AppLockerCSP node. - -The following fields are available: - -- **hr** HRESULT returned by the DeleteChild function in AppLockerCSP. - - -### Microsoft.Windows.Security.AppLockerCSP.EnumPolicies - -Logged URI relative to %SYSTEM32%\AppLocker, if the Plugin GUID is null, or the CSP doesn't believe the old policy is present. - -The following fields are available: - -- **uri** URI relative to %SYSTEM32%\AppLocker. - - -### Microsoft.Windows.Security.AppLockerCSP.GetChildNodeNamesParams - -Parameters passed to the GetChildNodeNames function of the AppLockerCSP node. - -The following fields are available: - -- **uri** URI relative to %SYSTEM32%/AppLocker for MDM node. - - -### Microsoft.Windows.Security.AppLockerCSP.GetChildNodeNamesStart - -Start of the "GetChildNodeNames" operation for the AppLockerCSP node. - - - -### Microsoft.Windows.Security.AppLockerCSP.GetChildNodeNamesStop - -End of the "GetChildNodeNames" operation for the AppLockerCSP node. - -The following fields are available: - -- **child[0]** If function succeeded, the first child's name, else "NA". -- **count** If function succeeded, the number of child node names returned by the function, else 0. -- **hr** HRESULT returned by the GetChildNodeNames function of AppLockerCSP. - - -### Microsoft.Windows.Security.AppLockerCSP.GetLatestId - -The result of 'GetLatestId' in AppLockerCSP (the latest time stamped GUID). - -The following fields are available: - -- **dirId** The latest directory identifier found by GetLatestId. -- **id** The id returned by GetLatestId if id > 0 - otherwise the dirId parameter. - - -### Microsoft.Windows.Security.AppLockerCSP.HResultException - -HRESULT thrown by any arbitrary function in AppLockerCSP. - -The following fields are available: - -- **file** File in the OS code base in which the exception occurs. -- **function** Function in the OS code base in which the exception occurs. -- **hr** HRESULT that is reported. -- **line** Line in the file in the OS code base in which the exception occurs. - - -### Microsoft.Windows.Security.AppLockerCSP.SetValueParams - -Parameters passed to the SetValue function of the AppLockerCSP node. - -The following fields are available: - -- **dataLength** Length of the value to set. -- **uri** The node URI to that should contain the value, relative to %SYSTEM32%\AppLocker. - - -### Microsoft.Windows.Security.AppLockerCSP.SetValueStart - -Start of the "SetValue" operation for the AppLockerCSP node. - - - -### Microsoft.Windows.Security.AppLockerCSP.SetValueStop - -End of the "SetValue" operation for the AppLockerCSP node. - -The following fields are available: - -- **hr** HRESULT returned by the SetValue function in AppLockerCSP. - - -### Microsoft.Windows.Security.AppLockerCSP.TryRemediateMissingPolicies - -EntryPoint of fix step or policy remediation, includes URI relative to %SYSTEM32%\AppLocker that needs to be fixed. - -The following fields are available: - -- **uri** URI for node relative to %SYSTEM32%/AppLocker. - - -## Appraiser events - -### Microsoft.Windows.Appraiser.General.ChecksumTotalPictureCount - -This event lists the types of objects and how many of each exist on the client device. This allows for a quick way to ensure that the records present on the server match what is present on the client. - -The following fields are available: - -- **DatasourceApplicationFile_19ASetup** The count of the number of this particular object type present on this device. -- **DatasourceApplicationFile_19H1** The count of the number of this particular object type present on this device. -- **DatasourceApplicationFile_19H1Setup** The count of the number of this particular object type present on this device. -- **DatasourceApplicationFile_RS1** An ID for the system, calculated by hashing hardware identifiers. -- **DatasourceApplicationFile_RS2** An ID for the system, calculated by hashing hardware identifiers. -- **DatasourceApplicationFile_RS3** The count of the number of this particular object type present on this device. -- **DatasourceApplicationFile_RS4** The count of the number of this particular object type present on this device. -- **DatasourceApplicationFile_RS4Setup** The count of the number of this particular object type present on this device. -- **DatasourceApplicationFile_RS5** The count of the number of this particular object type present on this device. -- **DatasourceApplicationFile_RS5Setup** The count of the number of this particular object type present on this device. -- **DatasourceApplicationFile_TH1** The count of the number of this particular object type present on this device. -- **DatasourceApplicationFile_TH2** The count of the number of this particular object type present on this device. -- **DatasourceDevicePnp_19ASetup** The count of the number of this particular object type present on this device. -- **DatasourceDevicePnp_19H1** The count of the number of this particular object type present on this device. -- **DatasourceDevicePnp_19H1Setup** The count of the number of this particular object type present on this device. -- **DatasourceDevicePnp_RS1** The total DataSourceDevicePnp objects targeting Windows 10 version 1607 on this device. -- **DatasourceDevicePnp_RS2** The count of the number of this particular object type present on this device. -- **DatasourceDevicePnp_RS3** The count of the number of this particular object type present on this device. -- **DatasourceDevicePnp_RS3Setup** The count of the number of this particular object type present on this device. -- **DatasourceDevicePnp_RS4** The count of the number of this particular object type present on this device. -- **DatasourceDevicePnp_RS4Setup** The count of the number of this particular object type present on this device. -- **DatasourceDevicePnp_RS5** The count of the number of this particular object type present on this device. -- **DatasourceDevicePnp_RS5Setup** The count of the number of this particular object type present on this device. -- **DatasourceDevicePnp_TH1** The count of the number of this particular object type present on this device. -- **DatasourceDevicePnp_TH2** The count of the number of this particular object type present on this device. -- **DatasourceDriverPackage_19ASetup** The count of the number of this particular object type present on this device. -- **DatasourceDriverPackage_19H1** The count of the number of this particular object type present on this device. -- **DatasourceDriverPackage_19H1Setup** The count of the number of this particular object type present on this device. -- **DatasourceDriverPackage_RS1** The total DataSourceDriverPackage objects targeting Windows 10 version 1607 on this device. -- **DatasourceDriverPackage_RS2** The total DataSourceDriverPackage objects targeting Windows 10, version 1703 on this device. -- **DatasourceDriverPackage_RS3** The count of the number of this particular object type present on this device. -- **DatasourceDriverPackage_RS3Setup** The count of the number of this particular object type present on this device. -- **DatasourceDriverPackage_RS4** The count of the number of this particular object type present on this device. -- **DatasourceDriverPackage_RS4Setup** The count of the number of this particular object type present on this device. -- **DatasourceDriverPackage_RS5** The count of the number of this particular object type present on this device. -- **DatasourceDriverPackage_RS5Setup** The count of the number of this particular object type present on this device. -- **DatasourceDriverPackage_TH1** The count of the number of this particular object type present on this device. -- **DatasourceDriverPackage_TH2** The count of the number of this particular object type present on this device. -- **DataSourceMatchingInfoBlock_19ASetup** The count of the number of this particular object type present on this device. -- **DataSourceMatchingInfoBlock_19H1** The count of the number of this particular object type present on this device. -- **DataSourceMatchingInfoBlock_19H1Setup** The count of the number of this particular object type present on this device. -- **DataSourceMatchingInfoBlock_RS1** The total DataSourceMatchingInfoBlock objects targeting Windows 10 version 1607 on this device. -- **DataSourceMatchingInfoBlock_RS2** The count of the number of this particular object type present on this device. -- **DataSourceMatchingInfoBlock_RS3** The count of the number of this particular object type present on this device. -- **DataSourceMatchingInfoBlock_RS4** The count of the number of this particular object type present on this device. -- **DataSourceMatchingInfoBlock_RS4Setup** The count of the number of this particular object type present on this device. -- **DataSourceMatchingInfoBlock_RS5** The count of the number of this particular object type present on this device. -- **DataSourceMatchingInfoBlock_RS5Setup** The count of the number of this particular object type present on this device. -- **DataSourceMatchingInfoBlock_TH1** The count of the number of this particular object type present on this device. -- **DataSourceMatchingInfoBlock_TH2** The count of the number of this particular object type present on this device. -- **DataSourceMatchingInfoPassive_19ASetup** The count of the number of this particular object type present on this device. -- **DataSourceMatchingInfoPassive_19H1** The count of the number of this particular object type present on this device. -- **DataSourceMatchingInfoPassive_19H1Setup** The count of the number of this particular object type present on this device. -- **DataSourceMatchingInfoPassive_RS1** The total DataSourceMatchingInfoPassive objects targeting Windows 10 version 1607 on this device. -- **DataSourceMatchingInfoPassive_RS2** The count of the number of this particular object type present on this device. -- **DataSourceMatchingInfoPassive_RS3** The count of the number of this particular object type present on this device. -- **DataSourceMatchingInfoPassive_RS4** The count of the number of this particular object type present on this device. -- **DataSourceMatchingInfoPassive_RS4Setup** The count of the number of this particular object type present on this device. -- **DataSourceMatchingInfoPassive_RS5** The count of the number of this particular object type present on this device. -- **DataSourceMatchingInfoPassive_RS5Setup** The count of the number of this particular object type present on this device. -- **DataSourceMatchingInfoPassive_TH1** The count of the number of this particular object type present on this device. -- **DataSourceMatchingInfoPassive_TH2** The count of the number of this particular object type present on this device. -- **DataSourceMatchingInfoPostUpgrade_19ASetup** The count of the number of this particular object type present on this device. -- **DataSourceMatchingInfoPostUpgrade_19H1** The count of the number of this particular object type present on this device. -- **DataSourceMatchingInfoPostUpgrade_19H1Setup** The count of the number of this particular object type present on this device. -- **DataSourceMatchingInfoPostUpgrade_RS1** The total DataSourceMatchingInfoPostUpgrade objects targeting Windows 10 version 1607 on this device. -- **DataSourceMatchingInfoPostUpgrade_RS2** The total DataSourceMatchingInfoPostUpgrade objects targeting Windows 10 version 1703 on this device. -- **DataSourceMatchingInfoPostUpgrade_RS3** The total DataSourceMatchingInfoPostUpgrade objects targeting Windows 10 version 1709 on this device. -- **DataSourceMatchingInfoPostUpgrade_RS4** The count of the number of this particular object type present on this device. -- **DataSourceMatchingInfoPostUpgrade_RS4Setup** The count of the number of this particular object type present on this device. -- **DataSourceMatchingInfoPostUpgrade_RS5** The count of the number of this particular object type present on this device. -- **DataSourceMatchingInfoPostUpgrade_RS5Setup** The count of the number of this particular object type present on this device. -- **DataSourceMatchingInfoPostUpgrade_TH1** The count of the number of this particular object type present on this device. -- **DataSourceMatchingInfoPostUpgrade_TH2** The count of the number of this particular object type present on this device. -- **DatasourceSystemBios_19ASetup** The count of the number of this particular object type present on this device. -- **DatasourceSystemBios_19H1** The count of the number of this particular object type present on this device. -- **DatasourceSystemBios_19H1Setup** The count of the number of this particular object type present on this device. -- **DatasourceSystemBios_RS1** The total DatasourceSystemBios objects targeting Windows 10 version 1607 present on this device. -- **DatasourceSystemBios_RS2** The total DatasourceSystemBios objects targeting Windows 10 version 1703 present on this device. -- **DatasourceSystemBios_RS3** The total DatasourceSystemBios objects targeting Windows 10 version 1709 present on this device. -- **DatasourceSystemBios_RS3Setup** The count of the number of this particular object type present on this device. -- **DatasourceSystemBios_RS4** The count of the number of this particular object type present on this device. -- **DatasourceSystemBios_RS4Setup** The count of the number of this particular object type present on this device. -- **DatasourceSystemBios_RS5** The count of the number of this particular object type present on this device. -- **DatasourceSystemBios_RS5Setup** The count of the number of this particular object type present on this device. -- **DatasourceSystemBios_TH1** The count of the number of this particular object type present on this device. -- **DatasourceSystemBios_TH2** The count of the number of this particular object type present on this device. -- **DecisionApplicationFile_19ASetup** The count of the number of this particular object type present on this device. -- **DecisionApplicationFile_19H1** The count of the number of this particular object type present on this device. -- **DecisionApplicationFile_19H1Setup** The count of the number of this particular object type present on this device. -- **DecisionApplicationFile_RS1** The count of the number of this particular object type present on this device. -- **DecisionApplicationFile_RS2** The count of the number of this particular object type present on this device. -- **DecisionApplicationFile_RS3** The count of the number of this particular object type present on this device. -- **DecisionApplicationFile_RS4** The count of the number of this particular object type present on this device. -- **DecisionApplicationFile_RS4Setup** The count of the number of this particular object type present on this device. -- **DecisionApplicationFile_RS5** The count of the number of this particular object type present on this device. -- **DecisionApplicationFile_RS5Setup** The count of the number of this particular object type present on this device. -- **DecisionApplicationFile_TH1** The count of the number of this particular object type present on this device. -- **DecisionApplicationFile_TH2** The count of the number of this particular object type present on this device. -- **DecisionDevicePnp_19ASetup** The count of the number of this particular object type present on this device. -- **DecisionDevicePnp_19H1** The count of the number of this particular object type present on this device. -- **DecisionDevicePnp_19H1Setup** The count of the number of this particular object type present on this device. -- **DecisionDevicePnp_RS1** The total DecisionDevicePnp objects targeting Windows 10 version 1607 on this device. -- **DecisionDevicePnp_RS2** The count of the number of this particular object type present on this device. -- **DecisionDevicePnp_RS3** The count of the number of this particular object type present on this device. -- **DecisionDevicePnp_RS3Setup** The count of the number of this particular object type present on this device. -- **DecisionDevicePnp_RS4** The count of the number of this particular object type present on this device. -- **DecisionDevicePnp_RS4Setup** The count of the number of this particular object type present on this device. -- **DecisionDevicePnp_RS5** The count of the number of this particular object type present on this device. -- **DecisionDevicePnp_RS5Setup** The count of the number of this particular object type present on this device. -- **DecisionDevicePnp_TH1** The count of the number of this particular object type present on this device. -- **DecisionDevicePnp_TH2** The count of the number of this particular object type present on this device. -- **DecisionDriverPackage_19ASetup** The count of the number of this particular object type present on this device. -- **DecisionDriverPackage_19H1** The count of the number of this particular object type present on this device. -- **DecisionDriverPackage_19H1Setup** The count of the number of this particular object type present on this device. -- **DecisionDriverPackage_RS1** The total DecisionDriverPackage objects targeting Windows 10 version 1607 on this device. -- **DecisionDriverPackage_RS2** The count of the number of this particular object type present on this device. -- **DecisionDriverPackage_RS3** The count of the number of this particular object type present on this device. -- **DecisionDriverPackage_RS3Setup** The count of the number of this particular object type present on this device. -- **DecisionDriverPackage_RS4** The count of the number of this particular object type present on this device. -- **DecisionDriverPackage_RS4Setup** The count of the number of this particular object type present on this device. -- **DecisionDriverPackage_RS5** The count of the number of this particular object type present on this device. -- **DecisionDriverPackage_RS5Setup** The count of the number of this particular object type present on this device. -- **DecisionDriverPackage_TH1** The count of the number of this particular object type present on this device. -- **DecisionDriverPackage_TH2** The count of the number of this particular object type present on this device. -- **DecisionMatchingInfoBlock_19ASetup** The count of the number of this particular object type present on this device. -- **DecisionMatchingInfoBlock_19H1** The count of the number of this particular object type present on this device. -- **DecisionMatchingInfoBlock_19H1Setup** The count of the number of this particular object type present on this device. -- **DecisionMatchingInfoBlock_RS1** The total DecisionMatchingInfoBlock objects targeting Windows 10 version 1607 present on this device. -- **DecisionMatchingInfoBlock_RS2** The total DecisionMatchingInfoBlock objects targeting Windows 10 version 1703 present on this device. -- **DecisionMatchingInfoBlock_RS3** The total DecisionMatchingInfoBlock objects targeting Windows 10 version 1709 present on this device. -- **DecisionMatchingInfoBlock_RS4** The total DecisionMatchingInfoBlock objects targeting Windows 10 version 1803 present on this device. -- **DecisionMatchingInfoBlock_RS4Setup** The count of the number of this particular object type present on this device. -- **DecisionMatchingInfoBlock_RS5** The count of the number of this particular object type present on this device. -- **DecisionMatchingInfoBlock_RS5Setup** The count of the number of this particular object type present on this device. -- **DecisionMatchingInfoBlock_TH1** The count of the number of this particular object type present on this device. -- **DecisionMatchingInfoBlock_TH2** The count of the number of this particular object type present on this device. -- **DecisionMatchingInfoPassive_19ASetup** The count of the number of this particular object type present on this device. -- **DecisionMatchingInfoPassive_19H1** The count of the number of this particular object type present on this device. -- **DecisionMatchingInfoPassive_19H1Setup** The count of the number of this particular object type present on this device. -- **DecisionMatchingInfoPassive_RS1** The total DecisionMatchingInfoPassive objects targeting Windows 10 version 1607 on this device. -- **DecisionMatchingInfoPassive_RS2** The total DecisionMatchingInfoPassive objects targeting Windows 10 version 1703 on this device. -- **DecisionMatchingInfoPassive_RS3** The total DecisionMatchingInfoPassive objects targeting Windows 10 version 1803 on this device. -- **DecisionMatchingInfoPassive_RS4** The count of the number of this particular object type present on this device. -- **DecisionMatchingInfoPassive_RS4Setup** The count of the number of this particular object type present on this device. -- **DecisionMatchingInfoPassive_RS5** The count of the number of this particular object type present on this device. -- **DecisionMatchingInfoPassive_RS5Setup** The count of the number of this particular object type present on this device. -- **DecisionMatchingInfoPassive_TH1** The count of the number of this particular object type present on this device. -- **DecisionMatchingInfoPassive_TH2** The count of the number of this particular object type present on this device. -- **DecisionMatchingInfoPostUpgrade_19ASetup** The count of the number of this particular object type present on this device. -- **DecisionMatchingInfoPostUpgrade_19H1** The count of the number of this particular object type present on this device. -- **DecisionMatchingInfoPostUpgrade_19H1Setup** The count of the number of this particular object type present on this device. -- **DecisionMatchingInfoPostUpgrade_RS1** The total DecisionMatchingInfoPostUpgrade objects targeting Windows 10 version 1607 on this device. -- **DecisionMatchingInfoPostUpgrade_RS2** The total DecisionMatchingInfoPostUpgrade objects targeting Windows 10 version 1703 on this device. -- **DecisionMatchingInfoPostUpgrade_RS3** The total DecisionMatchingInfoPostUpgrade objects targeting Windows 10 version 1709 on this device. -- **DecisionMatchingInfoPostUpgrade_RS4** The count of the number of this particular object type present on this device. -- **DecisionMatchingInfoPostUpgrade_RS4Setup** The count of the number of this particular object type present on this device. -- **DecisionMatchingInfoPostUpgrade_RS5** The count of the number of this particular object type present on this device. -- **DecisionMatchingInfoPostUpgrade_RS5Setup** The count of the number of this particular object type present on this device. -- **DecisionMatchingInfoPostUpgrade_TH1** The count of the number of this particular object type present on this device. -- **DecisionMatchingInfoPostUpgrade_TH2** The count of the number of this particular object type present on this device. -- **DecisionMediaCenter_19ASetup** The count of the number of this particular object type present on this device. -- **DecisionMediaCenter_19H1** The count of the number of this particular object type present on this device. -- **DecisionMediaCenter_19H1Setup** The total DecisionMediaCenter objects targeting the next release of Windows on this device. -- **DecisionMediaCenter_RS1** The total DecisionMediaCenter objects targeting Windows 10 version 1607 present on this device. -- **DecisionMediaCenter_RS2** The total DecisionMediaCenter objects targeting Windows 10 version 1703 present on this device. -- **DecisionMediaCenter_RS3** The total DecisionMediaCenter objects targeting Windows 10 version 1709 present on this device. -- **DecisionMediaCenter_RS4** The total DecisionMediaCenter objects targeting Windows 10 version 1803 present on this device. -- **DecisionMediaCenter_RS4Setup** The count of the number of this particular object type present on this device. -- **DecisionMediaCenter_RS5** The count of the number of this particular object type present on this device. -- **DecisionMediaCenter_RS5Setup** The count of the number of this particular object type present on this device. -- **DecisionMediaCenter_TH1** The count of the number of this particular object type present on this device. -- **DecisionMediaCenter_TH2** The count of the number of this particular object type present on this device. -- **DecisionSystemBios_19ASetup** The total DecisionSystemBios objects targeting the next release of Windows on this device. -- **DecisionSystemBios_19H1** The count of the number of this particular object type present on this device. -- **DecisionSystemBios_19H1Setup** The total DecisionSystemBios objects targeting the next release of Windows on this device. -- **DecisionSystemBios_RS1** The total DecisionSystemBios objects targeting Windows 10 version 1607 on this device. -- **DecisionSystemBios_RS2** The total DecisionSystemBios objects targeting Windows 10 version 1703 on this device. -- **DecisionSystemBios_RS3** The total DecisionSystemBios objects targeting Windows 10 version 1709 on this device. -- **DecisionSystemBios_RS3Setup** The count of the number of this particular object type present on this device. -- **DecisionSystemBios_RS4** The total DecisionSystemBios objects targeting Windows 10 version, 1803 present on this device. -- **DecisionSystemBios_RS4Setup** The total DecisionSystemBios objects targeting the next release of Windows on this device. -- **DecisionSystemBios_RS5** The total DecisionSystemBios objects targeting the next release of Windows on this device. -- **DecisionSystemBios_RS5Setup** The total DecisionSystemBios objects targeting the next release of Windows on this device. -- **DecisionSystemBios_TH1** The count of the number of this particular object type present on this device. -- **DecisionSystemBios_TH2** The count of the number of this particular object type present on this device. -- **DecisionSystemProcessor_RS2** The count of the number of this particular object type present on this device. -- **DecisionTest_RS1** An ID for the system, calculated by hashing hardware identifiers. -- **InventoryApplicationFile** The count of the number of this particular object type present on this device. -- **InventoryDeviceContainer** A count of device container objects in cache. -- **InventoryDevicePnp** A count of device Plug and Play objects in cache. -- **InventoryDriverBinary** A count of driver binary objects in cache. -- **InventoryDriverPackage** A count of device objects in cache. -- **InventoryLanguagePack** The count of the number of this particular object type present on this device. -- **InventoryMediaCenter** The count of the number of this particular object type present on this device. -- **InventorySystemBios** The count of the number of this particular object type present on this device. -- **InventorySystemMachine** The count of the number of this particular object type present on this device. -- **InventorySystemProcessor** The count of the number of this particular object type present on this device. -- **InventoryTest** The count of the number of this particular object type present on this device. -- **InventoryUplevelDriverPackage** The count of the number of this particular object type present on this device. -- **PCFP** The count of the number of this particular object type present on this device. -- **SystemMemory** The count of the number of this particular object type present on this device. -- **SystemProcessorCompareExchange** The count of the number of this particular object type present on this device. -- **SystemProcessorLahfSahf** The count of the number of this particular object type present on this device. -- **SystemProcessorNx** The total number of objects of this type present on this device. -- **SystemProcessorPrefetchW** The total number of objects of this type present on this device. -- **SystemProcessorSse2** The total number of objects of this type present on this device. -- **SystemTouch** The count of the number of this particular object type present on this device. -- **SystemWim** The total number of objects of this type present on this device. -- **SystemWindowsActivationStatus** The count of the number of this particular object type present on this device. -- **SystemWlan** The total number of objects of this type present on this device. -- **Wmdrm_19ASetup** The count of the number of this particular object type present on this device. -- **Wmdrm_19H1** The count of the number of this particular object type present on this device. -- **Wmdrm_19H1Setup** The total Wmdrm objects targeting the next release of Windows on this device. -- **Wmdrm_RS1** An ID for the system, calculated by hashing hardware identifiers. -- **Wmdrm_RS2** An ID for the system, calculated by hashing hardware identifiers. -- **Wmdrm_RS3** An ID for the system, calculated by hashing hardware identifiers. -- **Wmdrm_RS4** The total Wmdrm objects targeting Windows 10, version 1803 present on this device. -- **Wmdrm_RS4Setup** The count of the number of this particular object type present on this device. -- **Wmdrm_RS5** The count of the number of this particular object type present on this device. -- **Wmdrm_RS5Setup** The count of the number of this particular object type present on this device. -- **Wmdrm_TH1** The count of the number of this particular object type present on this device. -- **Wmdrm_TH2** The count of the number of this particular object type present on this device. - - -### Microsoft.Windows.Appraiser.General.DatasourceApplicationFileAdd - -Represents the basic metadata about specific application files installed on the system. - -This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedeviceinventorychange). - -The following fields are available: - -- **AppraiserVersion** The version of the appraiser file that is generating the events. -- **AvDisplayName** If the app is an anti-virus app, this is its display name. -- **CompatModelIndex** The compatibility prediction for this file. -- **HasCitData** Indicates whether the file is present in CIT data. -- **HasUpgradeExe** Indicates whether the anti-virus app has an upgrade.exe file. -- **IsAv** Is the file an anti-virus reporting EXE? -- **ResolveAttempted** This will always be an empty string when sending telemetry. -- **SdbEntries** An array of fields that indicates the SDB entries that apply to this file. - - -### Microsoft.Windows.Appraiser.General.DatasourceApplicationFileRemove - -This event indicates that the DatasourceApplicationFile object is no longer present. - -This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedeviceinventorychange). - -The following fields are available: - -- **AppraiserVersion** The version of the Appraiser file that is generating the events. - - -### Microsoft.Windows.Appraiser.General.DatasourceApplicationFileStartSync - -This event indicates that a new set of DatasourceApplicationFileAdd events will be sent. - -This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedeviceinventorychange). - -The following fields are available: - -- **AppraiserVersion** The version of the Appraiser file that is generating the events. - - -### Microsoft.Windows.Appraiser.General.DatasourceDevicePnpAdd - -This event sends compatibility data for a Plug and Play device, to help keep Windows up to date. - -This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedeviceinventorychange). - -The following fields are available: - -- **ActiveNetworkConnection** Indicates whether the device is an active network device. -- **AppraiserVersion** The version of the appraiser file generating the events. -- **CosDeviceRating** An enumeration that indicates if there is a driver on the target operating system. -- **CosDeviceSolution** An enumeration that indicates how a driver on the target operating system is available. -- **CosDeviceSolutionUrl** Microsoft.Windows.Appraiser.General.DatasourceDevicePnpAdd . Empty string -- **CosPopulatedFromId** The expected uplevel driver matching ID based on driver coverage data. -- **IsBootCritical** Indicates whether the device boot is critical. -- **UplevelInboxDriver** Indicates whether there is a driver uplevel for this device. -- **WuDriverCoverage** Indicates whether there is a driver uplevel for this device, according to Windows Update. -- **WuDriverUpdateId** The Windows Update ID of the applicable uplevel driver. -- **WuPopulatedFromId** The expected uplevel driver matching ID based on driver coverage from Windows Update. - - -### Microsoft.Windows.Appraiser.General.DatasourceDevicePnpRemove - -This event indicates that the DatasourceDevicePnp object is no longer present. - -This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedeviceinventorychange). - -The following fields are available: - -- **AppraiserVersion** The version of the Appraiser file that is generating the events. - - -### Microsoft.Windows.Appraiser.General.DatasourceDevicePnpStartSync - -This event indicates that a new set of DatasourceDevicePnpAdd events will be sent. - -This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedeviceinventorychange). - -The following fields are available: - -- **AppraiserVersion** The version of the Appraiser file that is generating the events. - - -### Microsoft.Windows.Appraiser.General.DatasourceDriverPackageAdd - -This event sends compatibility database data about driver packages to help keep Windows up to date. - -This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedeviceinventorychange). - -The following fields are available: - -- **AppraiserVersion** The version of the appraiser file generating the events. - - -### Microsoft.Windows.Appraiser.General.DatasourceDriverPackageStartSync - -This event indicates that a new set of DatasourceDriverPackageAdd events will be sent. - -This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedeviceinventorychange). - -The following fields are available: - -- **AppraiserVersion** The version of the Appraiser file that is generating the events. - - -### Microsoft.Windows.Appraiser.General.DataSourceMatchingInfoBlockAdd - -This event sends blocking data about any compatibility blocking entries hit on the system that are not directly related to specific applications or devices, to help keep Windows up-to-date. - -This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedeviceinventorychange). - -The following fields are available: - -- **AppraiserVersion** The version of the appraiser file generating the events. - - -### Microsoft.Windows.Appraiser.General.DataSourceMatchingInfoBlockRemove - -This event indicates that the DataSourceMatchingInfoBlock object is no longer present. - -This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedeviceinventorychange). - -The following fields are available: - -- **AppraiserVersion** The version of the Appraiser file that is generating the events. - - -### Microsoft.Windows.Appraiser.General.DataSourceMatchingInfoBlockStartSync - -This event indicates that a full set of DataSourceMatchingInfoBlockStAdd events have been sent. - -This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedeviceinventorychange). - -The following fields are available: - -- **AppraiserVersion** The version of the Appraiser file that is generating the events. - - -### Microsoft.Windows.Appraiser.General.DataSourceMatchingInfoPassiveAdd - -This event sends compatibility database information about non-blocking compatibility entries on the system that are not keyed by either applications or devices, to help keep Windows up-to-date. - -This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedeviceinventorychange). - -The following fields are available: - -- **AppraiserVersion** The version of the appraiser file generating the events. - - -### Microsoft.Windows.Appraiser.General.DataSourceMatchingInfoPassiveRemove - -This event indicates that the DataSourceMatchingInfoPassive object is no longer present. - -This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedeviceinventorychange). - -The following fields are available: - -- **AppraiserVersion** The version of the Appraiser file that is generating the events. - - -### Microsoft.Windows.Appraiser.General.DataSourceMatchingInfoPassiveStartSync - -This event indicates that a new set of DataSourceMatchingInfoPassiveAdd events will be sent. - -This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedeviceinventorychange). - -The following fields are available: - -- **AppraiserVersion** The version of the Appraiser file that is generating the events. - - -### Microsoft.Windows.Appraiser.General.DataSourceMatchingInfoPostUpgradeAdd - -This event sends compatibility database information about entries requiring reinstallation after an upgrade on the system that are not keyed by either applications or devices, to help keep Windows up-to-date. - -This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedeviceinventorychange). - -The following fields are available: - -- **AppraiserVersion** The version of the appraiser file generating the events. - - -### Microsoft.Windows.Appraiser.General.DataSourceMatchingInfoPostUpgradeRemove - -This event indicates that the DataSourceMatchingInfoPostUpgrade object is no longer present. - -This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedeviceinventorychange). - -The following fields are available: - -- **AppraiserVersion** The version of the Appraiser file that is generating the events. - - -### Microsoft.Windows.Appraiser.General.DataSourceMatchingInfoPostUpgradeStartSync - -This event indicates that a new set of DataSourceMatchingInfoPostUpgradeAdd events will be sent. - -This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedeviceinventorychange). - -The following fields are available: - -- **AppraiserVersion** The version of the Appraiser file that is generating the events. - - -### Microsoft.Windows.Appraiser.General.DatasourceSystemBiosAdd - -This event sends compatibility database information about the BIOS to help keep Windows up-to-date. - -This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedeviceinventorychange). - -The following fields are available: - -- **AppraiserVersion** The version of the Appraiser file generating the events. - - -### Microsoft.Windows.Appraiser.General.DatasourceSystemBiosRemove - -This event indicates that the DatasourceSystemBios object is no longer present. - -This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedeviceinventorychange). - -The following fields are available: - -- **AppraiserVersion** The version of the Appraiser file that is generating the events. - - -### Microsoft.Windows.Appraiser.General.DatasourceSystemBiosStartSync - -This event indicates that a new set of DatasourceSystemBiosAdd events will be sent. - -This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedeviceinventorychange). - -The following fields are available: - -- **AppraiserVersion** The version of the Appraiser file that is generating the events. - - -### Microsoft.Windows.Appraiser.General.DecisionApplicationFileAdd - -This event sends compatibility decision data about a file to help keep Windows up-to-date. - -This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedeviceinventorychange). - -The following fields are available: - -- **AppraiserVersion** The version of the appraiser file that is generating the events. -- **BlockAlreadyInbox** The uplevel runtime block on the file already existed on the current OS. -- **BlockingApplication** Indicates whether there are any application issues that interfere with the upgrade due to the file in question. -- **DisplayGenericMessage** Will be a generic message be shown for this file? -- **DisplayGenericMessageGated** Indicates whether a generic message be shown for this file. -- **HardBlock** This file is blocked in the SDB. -- **HasUxBlockOverride** Does the file have a block that is overridden by a tag in the SDB? -- **MigApplication** Does the file have a MigXML from the SDB associated with it that applies to the current upgrade mode? -- **MigRemoval** Does the file have a MigXML from the SDB that will cause the app to be removed on upgrade? -- **NeedsDismissAction** Will the file cause an action that can be dimissed? -- **NeedsInstallPostUpgradeData** After upgrade, the file will have a post-upgrade notification to install a replacement for the app. -- **NeedsNotifyPostUpgradeData** Does the file have a notification that should be shown after upgrade? -- **NeedsReinstallPostUpgradeData** After upgrade, this file will have a post-upgrade notification to reinstall the app. -- **NeedsUninstallAction** The file must be uninstalled to complete the upgrade. -- **SdbBlockUpgrade** The file is tagged as blocking upgrade in the SDB, -- **SdbBlockUpgradeCanReinstall** The file is tagged as blocking upgrade in the SDB. It can be reinstalled after upgrade. -- **SdbBlockUpgradeUntilUpdate** The file is tagged as blocking upgrade in the SDB. If the app is updated, the upgrade can proceed. -- **SdbReinstallUpgrade** The file is tagged as needing to be reinstalled after upgrade in the SDB. It does not block upgrade. -- **SdbReinstallUpgradeWarn** The file is tagged as needing to be reinstalled after upgrade with a warning in the SDB. It does not block upgrade. -- **SoftBlock** The file is softblocked in the SDB and has a warning. - - -### Microsoft.Windows.Appraiser.General.DecisionApplicationFileRemove - -This event indicates Indicates that the DecisionApplicationFile object is no longer present. - -This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedeviceinventorychange). - -The following fields are available: - -- **AppraiserVersion** The version of the Appraiser file that is generating the events. - - -### Microsoft.Windows.Appraiser.General.DecisionApplicationFileStartSync - -This event indicates that a new set of DecisionApplicationFileAdd events will be sent. - -This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedeviceinventorychange). - -The following fields are available: - -- **AppraiserVersion** The version of the Appraiser file that is generating the events. - - -### Microsoft.Windows.Appraiser.General.DecisionDevicePnpAdd - -This event sends compatibility decision data about a PNP device to help keep Windows up to date. - -This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedeviceinventorychange). - -The following fields are available: - -- **AppraiserVersion** The version of the appraiser file generating the events. -- **AssociatedDriverIsBlocked** Is the driver associated with this PNP device blocked? -- **AssociatedDriverWillNotMigrate** Will the driver associated with this plug-and-play device migrate? -- **BlockAssociatedDriver** Should the driver associated with this PNP device be blocked? -- **BlockingDevice** Is this PNP device blocking upgrade? -- **BlockUpgradeIfDriverBlocked** Is the PNP device both boot critical and does not have a driver included with the OS? -- **BlockUpgradeIfDriverBlockedAndOnlyActiveNetwork** Is this PNP device the only active network device? -- **DisplayGenericMessage** Will a generic message be shown during Setup for this PNP device? -- **DisplayGenericMessageGated** Indicates whether a generic message will be shown during Setup for this PNP device. -- **DriverAvailableInbox** Is a driver included with the operating system for this PNP device? -- **DriverAvailableOnline** Is there a driver for this PNP device on Windows Update? -- **DriverAvailableUplevel** Is there a driver on Windows Update or included with the operating system for this PNP device? -- **DriverBlockOverridden** Is there is a driver block on the device that has been overridden? -- **NeedsDismissAction** Will the user would need to dismiss a warning during Setup for this device? -- **NotRegressed** Does the device have a problem code on the source OS that is no better than the one it would have on the target OS? -- **SdbDeviceBlockUpgrade** Is there an SDB block on the PNP device that blocks upgrade? -- **SdbDriverBlockOverridden** Is there an SDB block on the PNP device that blocks upgrade, but that block was overridden? - - -### Microsoft.Windows.Appraiser.General.DecisionDevicePnpRemove - -This event indicates that the DecisionDevicePnp object is no longer present. - -This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedeviceinventorychange). - -The following fields are available: - -- **AppraiserVersion** The version of the Appraiser file that is generating the events. - - -### Microsoft.Windows.Appraiser.General.DecisionDevicePnpStartSync - -The DecisionDevicePnpStartSync event indicates that a new set of DecisionDevicePnpAdd events will be sent. - -This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedeviceinventorychange). - -The following fields are available: - -- **AppraiserVersion** The version of the Appraiser file that is generating the events. - - -### Microsoft.Windows.Appraiser.General.DecisionDriverPackageAdd - -This event sends decision data about driver package compatibility to help keep Windows up to date. - -This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedeviceinventorychange). - -The following fields are available: - -- **AppraiserVersion** The version of the appraiser file generating the events. -- **DisplayGenericMessageGated** Indicates whether a generic offer block message will be shown for this driver package. -- **DriverBlockOverridden** Does the driver package have an SDB block that blocks it from migrating, but that block has been overridden? -- **DriverIsDeviceBlocked** Was the driver package was blocked because of a device block? -- **DriverIsDriverBlocked** Is the driver package blocked because of a driver block? -- **DriverIsTroubleshooterBlocked** Indicates whether the driver package is blocked because of a troubleshooter block. -- **DriverShouldNotMigrate** Should the driver package be migrated during upgrade? -- **SdbDriverBlockOverridden** Does the driver package have an SDB block that blocks it from migrating, but that block has been overridden? - - -### Microsoft.Windows.Appraiser.General.DecisionDriverPackageRemove - -This event indicates that the DecisionDriverPackage object is no longer present. - -This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedeviceinventorychange). - -The following fields are available: - -- **AppraiserVersion** The version of the Appraiser file that is generating the events. - - -### Microsoft.Windows.Appraiser.General.DecisionDriverPackageStartSync - -This event indicates that a new set of DecisionDriverPackageAdd events will be sent. - -This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedeviceinventorychange). - -The following fields are available: - -- **AppraiserVersion** The version of the Appraiser file that is generating the events. - - -### Microsoft.Windows.Appraiser.General.DecisionMatchingInfoBlockAdd - -This event sends compatibility decision data about blocking entries on the system that are not keyed by either applications or devices, to help keep Windows up to date. - -This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedeviceinventorychange). - -The following fields are available: - -- **AppraiserVersion** The version of the appraiser file generating the events. -- **BlockingApplication** Are there are any application issues that interfere with upgrade due to matching info blocks? -- **DisplayGenericMessage** Will a generic message be shown for this block? -- **NeedsUninstallAction** Does the user need to take an action in setup due to a matching info block? -- **SdbBlockUpgrade** Is a matching info block blocking upgrade? -- **SdbBlockUpgradeCanReinstall** Is a matching info block blocking upgrade, but has the can reinstall tag? -- **SdbBlockUpgradeUntilUpdate** Is a matching info block blocking upgrade but has the until update tag? - - -### Microsoft.Windows.Appraiser.General.DecisionMatchingInfoBlockRemove - -This event indicates that the DecisionMatchingInfoBlock object is no longer present. - -This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedeviceinventorychange). - -The following fields are available: - -- **AppraiserVersion** The version of the Appraiser file that is generating the events. - - -### Microsoft.Windows.Appraiser.General.DecisionMatchingInfoBlockStartSync - -This event indicates that a new set of DecisionMatchingInfoBlockAdd events will be sent. - -This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedeviceinventorychange). - -The following fields are available: - -- **AppraiserVersion** The version of the Appraiser file that is generating the events. - - -### Microsoft.Windows.Appraiser.General.DecisionMatchingInfoPassiveAdd - -This event sends compatibility decision data about non-blocking entries on the system that are not keyed by either applications or devices, to help keep Windows up to date. - -This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedeviceinventorychange). - -The following fields are available: - -- **AppraiserVersion** The version of the Appraiser file that is generating the events. -- **BlockingApplication** Are there any application issues that interfere with upgrade due to matching info blocks? -- **DisplayGenericMessageGated** Indicates whether a generic offer block message will be shown due to matching info blocks. -- **MigApplication** Is there a matching info block with a mig for the current mode of upgrade? - - -### Microsoft.Windows.Appraiser.General.DecisionMatchingInfoPassiveRemove - -This event Indicates that the DecisionMatchingInfoPassive object is no longer present. - -This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedeviceinventorychange). - -The following fields are available: - -- **AppraiserVersion** The version of the Appraiser file that is generating the events. - - -### Microsoft.Windows.Appraiser.General.DecisionMatchingInfoPassiveStartSync - -This event indicates that a new set of DecisionMatchingInfoPassiveAdd events will be sent. - -This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedeviceinventorychange). - -The following fields are available: - -- **AppraiserVersion** The version of the Appraiser file that is generating the events. - - -### Microsoft.Windows.Appraiser.General.DecisionMatchingInfoPostUpgradeAdd - -This event sends compatibility decision data about entries that require reinstall after upgrade. It's used to help keep Windows up to date. - -This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedeviceinventorychange). - -The following fields are available: - -- **AppraiserVersion** The version of the Appraiser file that is generating the events. -- **NeedsInstallPostUpgradeData** Will the file have a notification after upgrade to install a replacement for the app? -- **NeedsNotifyPostUpgradeData** Should a notification be shown for this file after upgrade? -- **NeedsReinstallPostUpgradeData** Will the file have a notification after upgrade to reinstall the app? -- **SdbReinstallUpgrade** The file is tagged as needing to be reinstalled after upgrade in the compatibility database (but is not blocking upgrade). - - -### Microsoft.Windows.Appraiser.General.DecisionMatchingInfoPostUpgradeRemove - -This event indicates that the DecisionMatchingInfoPostUpgrade object is no longer present. - -This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedeviceinventorychange). - -The following fields are available: - -- **AppraiserVersion** The version of the Appraiser file that is generating the events. - - -### Microsoft.Windows.Appraiser.General.DecisionMatchingInfoPostUpgradeStartSync - -This event indicates that a new set of DecisionMatchingInfoPostUpgradeAdd events will be sent. - -This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedeviceinventorychange). - -The following fields are available: - -- **AppraiserVersion** The version of the Appraiser file that is generating the events. - - -### Microsoft.Windows.Appraiser.General.DecisionMediaCenterAdd - -This event sends decision data about the presence of Windows Media Center, to help keep Windows up to date. - -This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedeviceinventorychange). - -The following fields are available: - -- **AppraiserVersion** The version of the Appraiser file generating the events. -- **BlockingApplication** Is there any application issues that interfere with upgrade due to Windows Media Center? -- **MediaCenterActivelyUsed** If Windows Media Center is supported on the edition, has it been run at least once and are the MediaCenterIndicators are true? -- **MediaCenterIndicators** Do any indicators imply that Windows Media Center is in active use? -- **MediaCenterInUse** Is Windows Media Center actively being used? -- **MediaCenterPaidOrActivelyUsed** Is Windows Media Center actively being used or is it running on a supported edition? -- **NeedsDismissAction** Are there any actions that can be dismissed coming from Windows Media Center? - - -### Microsoft.Windows.Appraiser.General.DecisionMediaCenterRemove - -This event indicates that the DecisionMediaCenter object is no longer present. - -This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedeviceinventorychange). - -The following fields are available: - -- **AppraiserVersion** The version of the Appraiser file that is generating the events. - - -### Microsoft.Windows.Appraiser.General.DecisionMediaCenterStartSync - -This event indicates that a new set of DecisionMediaCenterAdd events will be sent. - -This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedeviceinventorychange). - -The following fields are available: - -- **AppraiserVersion** The version of the Appraiser file that is generating the events. - - -### Microsoft.Windows.Appraiser.General.DecisionSystemBiosAdd - -This event sends compatibility decision data about the BIOS to help keep Windows up to date. - -This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedeviceinventorychange). - -The following fields are available: - -- **AppraiserVersion** The version of the Appraiser file generating the events. -- **Blocking** Is the device blocked from upgrade due to a BIOS block? -- **DisplayGenericMessageGated** Indicates whether a generic offer block message will be shown for the bios. -- **HasBiosBlock** Does the device have a BIOS block? - - -### Microsoft.Windows.Appraiser.General.DecisionSystemBiosRemove - -This event indicates that the DecisionSystemBios object is no longer present. - -This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedeviceinventorychange). - -The following fields are available: - -- **AppraiserVersion** The version of the Appraiser file that is generating the events. - - -### Microsoft.Windows.Appraiser.General.DecisionSystemBiosStartSync - -This event indicates that a new set of DecisionSystemBiosAdd events will be sent. - -This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedeviceinventorychange). - -The following fields are available: - -- **AppraiserVersion** The version of the Appraiser file that is generating the events. - - -### Microsoft.Windows.Appraiser.General.GatedRegChange - -This event sends data about the results of running a set of quick-blocking instructions, to help keep Windows up to date. - -The following fields are available: - -- **NewData** The data in the registry value after the scan completed. -- **OldData** The previous data in the registry value before the scan ran. -- **PCFP** An ID for the system calculated by hashing hardware identifiers. -- **RegKey** The registry key name for which a result is being sent. -- **RegValue** The registry value for which a result is being sent. -- **Time** The client time of the event. - - -### Microsoft.Windows.Appraiser.General.InventoryApplicationFileAdd - -This event represents the basic metadata about a file on the system. The file must be part of an app and either have a block in the compatibility database or be part of an antivirus program. - -This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedeviceinventorychange). - -The following fields are available: - -- **AppraiserVersion** The version of the Appraiser file generating the events. -- **AvDisplayName** If the app is an antivirus app, this is its display name. -- **AvProductState** Indicates whether the antivirus program is turned on and the signatures are up to date. -- **BinaryType** A binary type. Example: UNINITIALIZED, ZERO_BYTE, DATA_ONLY, DOS_MODULE, NE16_MODULE, PE32_UNKNOWN, PE32_I386, PE32_ARM, PE64_UNKNOWN, PE64_AMD64, PE64_ARM64, PE64_IA64, PE32_CLR_32, PE32_CLR_IL, PE32_CLR_IL_PREFER32, PE64_CLR_64. -- **BinFileVersion** An attempt to clean up FileVersion at the client that tries to place the version into 4 octets. -- **BinProductVersion** An attempt to clean up ProductVersion at the client that tries to place the version into 4 octets. -- **BoeProgramId** If there is no entry in Add/Remove Programs, this is the ProgramID that is generated from the file metadata. -- **CompanyName** The company name of the vendor who developed this file. -- **FileId** A hash that uniquely identifies a file. -- **FileVersion** The File version field from the file metadata under Properties -> Details. -- **HasUpgradeExe** Indicates whether the antivirus app has an upgrade.exe file. -- **IsAv** Indicates whether the file an antivirus reporting EXE. -- **LinkDate** The date and time that this file was linked on. -- **LowerCaseLongPath** The full file path to the file that was inventoried on the device. -- **Name** The name of the file that was inventoried. -- **ProductName** The Product name field from the file metadata under Properties -> Details. -- **ProductVersion** The Product version field from the file metadata under Properties -> Details. -- **ProgramId** A hash of the Name, Version, Publisher, and Language of an application used to identify it. -- **Size** The size of the file (in hexadecimal bytes). - - -### Microsoft.Windows.Appraiser.General.InventoryApplicationFileRemove - -This event indicates that the InventoryApplicationFile object is no longer present. - -This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedeviceinventorychange). - -The following fields are available: - -- **AppraiserVersion** The version of the Appraiser file that is generating the events. - - -### Microsoft.Windows.Appraiser.General.InventoryApplicationFileStartSync - -This event indicates indicates that a new set of InventoryApplicationFileAdd events will be sent. - -This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedeviceinventorychange). - -The following fields are available: - -- **AppraiserVersion** The version of the Appraiser file that is generating the events. - - -### Microsoft.Windows.Appraiser.General.InventoryLanguagePackAdd - -This event sends data about the number of language packs installed on the system, to help keep Windows up to date. - -This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedeviceinventorychange). - -The following fields are available: - -- **AppraiserVersion** The version of the Appraiser file that is generating the events. -- **HasLanguagePack** Indicates whether this device has 2 or more language packs. -- **LanguagePackCount** The number of language packs are installed. - - -### Microsoft.Windows.Appraiser.General.InventoryLanguagePackRemove - -This event indicates that the InventoryLanguagePack object is no longer present. - -This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedeviceinventorychange). - -The following fields are available: - -- **AppraiserVersion** The version of the Appraiser file that is generating the events. - - -### Microsoft.Windows.Appraiser.General.InventoryLanguagePackStartSync - -This event indicates that a new set of InventoryLanguagePackAdd events will be sent. - -This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedeviceinventorychange). - -The following fields are available: - -- **AppraiserVersion** The version of the Appraiser file that is generating the events. - - -### Microsoft.Windows.Appraiser.General.InventoryMediaCenterAdd - -This event sends true/false data about decision points used to understand whether Windows Media Center is used on the system, to help keep Windows up to date. - -This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedeviceinventorychange). - -The following fields are available: - -- **AppraiserVersion** The version of the Appraiser file generating the events. -- **EverLaunched** Has Windows Media Center ever been launched? -- **HasConfiguredTv** Has the user configured a TV tuner through Windows Media Center? -- **HasExtendedUserAccounts** Are any Windows Media Center Extender user accounts configured? -- **HasWatchedFolders** Are any folders configured for Windows Media Center to watch? -- **IsDefaultLauncher** Is Windows Media Center the default app for opening music or video files? -- **IsPaid** Is the user running a Windows Media Center edition that implies they paid for Windows Media Center? -- **IsSupported** Does the running OS support Windows Media Center? - - -### Microsoft.Windows.Appraiser.General.InventoryMediaCenterRemove - -This event indicates that the InventoryMediaCenter object is no longer present. - -This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedeviceinventorychange). - -The following fields are available: - -- **AppraiserVersion** The version of the Appraiser file that is generating the events. - - -### Microsoft.Windows.Appraiser.General.InventoryMediaCenterStartSync - -This event indicates that a new set of InventoryMediaCenterAdd events will be sent. - -This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedeviceinventorychange). - -The following fields are available: - -- **AppraiserVersion** The version of the Appraiser file that is generating the events. - - -### Microsoft.Windows.Appraiser.General.InventorySystemBiosAdd - -This event sends basic metadata about the BIOS to determine whether it has a compatibility block. - -This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedeviceinventorychange). - -The following fields are available: - -- **AppraiserVersion** The version of the Appraiser file that is generating the events. -- **biosDate** The release date of the BIOS in UTC format. -- **BiosDate** The release date of the BIOS in UTC format. -- **biosName** The name field from Win32_BIOS. -- **BiosName** The name field from Win32_BIOS. -- **manufacturer** The manufacturer field from Win32_ComputerSystem. -- **Manufacturer** The manufacturer field from Win32_ComputerSystem. -- **model** The model field from Win32_ComputerSystem. -- **Model** The model field from Win32_ComputerSystem. - - -### Microsoft.Windows.Appraiser.General.InventorySystemBiosRemove - -This event indicates that the InventorySystemBios object is no longer present. - -This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedeviceinventorychange). - -The following fields are available: - -- **AppraiserVersion** The version of the Appraiser file that is generating the events. - - -### Microsoft.Windows.Appraiser.General.InventorySystemBiosStartSync - -This event indicates that a new set of InventorySystemBiosAdd events will be sent. - -This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedeviceinventorychange). - -The following fields are available: - -- **AppraiserVersion** The version of the Appraiser file that is generating the events. - - -### Microsoft.Windows.Appraiser.General.InventoryUplevelDriverPackageAdd - -This event is only runs during setup. It provides a listing of the uplevel driver packages that were downloaded before the upgrade. Is critical to understanding if failures in setup can be traced to not having sufficient uplevel drivers before the upgrade. - -This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedeviceinventorychange). - -The following fields are available: - -- **AppraiserVersion** The version of the Appraiser file that is generating the events. -- **BootCritical** Is the driver package marked as boot critical? -- **Build** The build value from the driver package. -- **CatalogFile** The name of the catalog file within the driver package. -- **Class** The device class from the driver package. -- **ClassGuid** The device class unique ID from the driver package. -- **Date** The date from the driver package. -- **Inbox** Is the driver package of a driver that is included with Windows? -- **OriginalName** The original name of the INF file before it was renamed. Generally a path under $WINDOWS.~BT\Drivers\DU. -- **Provider** The provider of the driver package. -- **PublishedName** The name of the INF file after it was renamed. -- **Revision** The revision of the driver package. -- **SignatureStatus** Indicates if the driver package is signed. Unknown = 0, Unsigned = 1, Signed = 2. -- **VersionMajor** The major version of the driver package. -- **VersionMinor** The minor version of the driver package. - - -### Microsoft.Windows.Appraiser.General.InventoryUplevelDriverPackageRemove - -This event indicates that the InventoryUplevelDriverPackage object is no longer present. - -This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedeviceinventorychange). - -The following fields are available: - -- **AppraiserVersion** The version of the Appraiser file that is generating the events. - - -### Microsoft.Windows.Appraiser.General.InventoryUplevelDriverPackageStartSync - -This event indicates that a new set of InventoryUplevelDriverPackageAdd events will be sent. - -This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedeviceinventorychange). - -The following fields are available: - -- **AppraiserVersion** The version of the Appraiser file that is generating the events. - - -### Microsoft.Windows.Appraiser.General.RunContext - -This event indicates what should be expected in the data payload. - -The following fields are available: - -- **AppraiserBranch** The source branch in which the currently running version of Appraiser was built. -- **AppraiserProcess** The name of the process that launched Appraiser. -- **AppraiserVersion** The version of the Appraiser file generating the events. -- **CensusId** A unique hardware identifier. -- **Context** Indicates what mode Appraiser is running in. Example: Setup or Telemetry. -- **PCFP** An ID for the system calculated by hashing hardware identifiers. -- **Subcontext** Indicates what categories of incompatibilities appraiser is scanning for. Can be N/A, Resolve, or a semicolon-delimited list that can include App, Dev, Sys, Gat, or Rescan. -- **Time** The client time of the event. - - -### Microsoft.Windows.Appraiser.General.SystemMemoryAdd - -This event sends data on the amount of memory on the system and whether it meets requirements, to help keep Windows up-to-date. - -This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedeviceinventorychange). - -The following fields are available: - -- **AppraiserVersion** The version of the Appraiser file generating the events. -- **Blocking** Is the device from upgrade due to memory restrictions? -- **MemoryRequirementViolated** Was a memory requirement violated? -- **pageFile** The current committed memory limit for the system or the current process, whichever is smaller (in bytes). -- **ram** The amount of memory on the device. -- **ramKB** The amount of memory (in KB). -- **virtual** The size of the user-mode portion of the virtual address space of the calling process (in bytes). -- **virtualKB** The amount of virtual memory (in KB). - - -### Microsoft.Windows.Appraiser.General.SystemMemoryRemove - -This event that the SystemMemory object is no longer present. - -This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedeviceinventorychange). - -The following fields are available: - -- **AppraiserVersion** The version of the Appraiser file that is generating the events. - - -### Microsoft.Windows.Appraiser.General.SystemMemoryStartSync - -This event indicates that a new set of SystemMemoryAdd events will be sent. - -This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedeviceinventorychange). - -The following fields are available: - -- **AppraiserVersion** The version of the Appraiser file that is generating the events. - - -### Microsoft.Windows.Appraiser.General.SystemProcessorCompareExchangeAdd - -This event sends data indicating whether the system supports the CompareExchange128 CPU requirement, to help keep Windows up to date. - -This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedeviceinventorychange). - -The following fields are available: - -- **AppraiserVersion** The version of the Appraiser file generating the events. -- **Blocking** Is the upgrade blocked due to the processor? -- **CompareExchange128Support** Does the CPU support CompareExchange128? - - -### Microsoft.Windows.Appraiser.General.SystemProcessorCompareExchangeRemove - -This event indicates that the SystemProcessorCompareExchange object is no longer present. - -This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedeviceinventorychange). - -The following fields are available: - -- **AppraiserVersion** The version of the Appraiser file that is generating the events. - - -### Microsoft.Windows.Appraiser.General.SystemProcessorCompareExchangeStartSync - -This event indicates that a new set of SystemProcessorCompareExchangeAdd events will be sent. - -This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedeviceinventorychange). - -The following fields are available: - -- **AppraiserVersion** The version of the Appraiser file that is generating the events. - - -### Microsoft.Windows.Appraiser.General.SystemProcessorLahfSahfAdd - -This event sends data indicating whether the system supports the LahfSahf CPU requirement, to help keep Windows up-to-date. - -This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedeviceinventorychange). - -The following fields are available: - -- **AppraiserVersion** The version of the Appraiser file generating the events. -- **Blocking** Is the upgrade blocked due to the processor? -- **LahfSahfSupport** Does the CPU support LAHF/SAHF? - - -### Microsoft.Windows.Appraiser.General.SystemProcessorLahfSahfRemove - -This event indicates that the SystemProcessorLahfSahf object is no longer present. - -This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedeviceinventorychange). - -The following fields are available: - -- **AppraiserVersion** The version of the Appraiser file that is generating the events. - - -### Microsoft.Windows.Appraiser.General.SystemProcessorLahfSahfStartSync - -This event indicates that a new set of SystemProcessorLahfSahfAdd events will be sent. - -This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedeviceinventorychange). - -The following fields are available: - -- **AppraiserVersion** The version of the Appraiser file that is generating the events. - - -### Microsoft.Windows.Appraiser.General.SystemProcessorNxAdd - -This event sends data indicating whether the system supports the NX CPU requirement, to help keep Windows up-to-date. - -This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedeviceinventorychange). - -The following fields are available: - -- **AppraiserVersion** The version of the Appraiser file that is generating the events. -- **Blocking** Is the upgrade blocked due to the processor? -- **NXDriverResult** The result of the driver used to do a non-deterministic check for NX support. -- **NXProcessorSupport** Does the processor support NX? - - -### Microsoft.Windows.Appraiser.General.SystemProcessorNxRemove - -This event indicates that the SystemProcessorNx object is no longer present. - -This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedeviceinventorychange). - -The following fields are available: - -- **AppraiserVersion** The version of the Appraiser file that is generating the events. - - -### Microsoft.Windows.Appraiser.General.SystemProcessorNxStartSync - -This event indicates that a new set of SystemProcessorNxAdd events will be sent. - -This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedeviceinventorychange). - -The following fields are available: - -- **AppraiserVersion** The version of the Appraiser file that is generating the events. - - -### Microsoft.Windows.Appraiser.General.SystemProcessorPrefetchWAdd - -This event sends data indicating whether the system supports the PrefetchW CPU requirement, to help keep Windows up to date. - -This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedeviceinventorychange). - -The following fields are available: - -- **AppraiserVersion** The version of the Appraiser file that is generating the events. -- **Blocking** Is the upgrade blocked due to the processor? -- **PrefetchWSupport** Does the processor support PrefetchW? - - -### Microsoft.Windows.Appraiser.General.SystemProcessorPrefetchWRemove - -This event indicates that the SystemProcessorPrefetchW object is no longer present. - -This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedeviceinventorychange). - -The following fields are available: - -- **AppraiserVersion** The version of the Appraiser file that is generating the events. - - -### Microsoft.Windows.Appraiser.General.SystemProcessorPrefetchWStartSync - -This event indicates that a new set of SystemProcessorPrefetchWAdd events will be sent. - -This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedeviceinventorychange). - -The following fields are available: - -- **AppraiserVersion** The version of the Appraiser file that is generating the events. - - -### Microsoft.Windows.Appraiser.General.SystemProcessorSse2Add - -This event sends data indicating whether the system supports the SSE2 CPU requirement, to help keep Windows up to date. - -This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedeviceinventorychange). - -The following fields are available: - -- **AppraiserVersion** The version of the Appraiser file that is generating the events. -- **Blocking** Is the upgrade blocked due to the processor? -- **SSE2ProcessorSupport** Does the processor support SSE2? - - -### Microsoft.Windows.Appraiser.General.SystemProcessorSse2Remove - -This event indicates that the SystemProcessorSse2 object is no longer present. - -This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedeviceinventorychange). - -The following fields are available: - -- **AppraiserVersion** The version of the Appraiser file that is generating the events. - - -### Microsoft.Windows.Appraiser.General.SystemProcessorSse2StartSync - -This event indicates that a new set of SystemProcessorSse2Add events will be sent. - -This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedeviceinventorychange). - -The following fields are available: - -- **AppraiserVersion** The version of the Appraiser file that is generating the events. - - -### Microsoft.Windows.Appraiser.General.SystemTouchAdd - -This event sends data indicating whether the system supports touch, to help keep Windows up to date. - -This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedeviceinventorychange). - -The following fields are available: - -- **AppraiserVersion** The version of the Appraiser file that is generating the events. -- **IntegratedTouchDigitizerPresent** Is there an integrated touch digitizer? -- **MaximumTouches** The maximum number of touch points supported by the device hardware. - - -### Microsoft.Windows.Appraiser.General.SystemTouchRemove - -This event indicates that the SystemTouch object is no longer present. - -This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedeviceinventorychange). - -The following fields are available: - -- **AppraiserVersion** The version of the Appraiser file that is generating the events. - - -### Microsoft.Windows.Appraiser.General.SystemTouchStartSync - -This event indicates that a new set of SystemTouchAdd events will be sent. - -This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedeviceinventorychange). - -The following fields are available: - -- **AppraiserVersion** The version of the Appraiser file that is generating the events. - - -### Microsoft.Windows.Appraiser.General.SystemWimAdd - -This event sends data indicating whether the operating system is running from a compressed Windows Imaging Format (WIM) file, to help keep Windows up to date. - -This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedeviceinventorychange). - -The following fields are available: - -- **AppraiserVersion** The version of the Appraiser file that is generating the events. -- **IsWimBoot** Is the current operating system running from a compressed WIM file? -- **RegistryWimBootValue** The raw value from the registry that is used to indicate if the device is running from a WIM. - - -### Microsoft.Windows.Appraiser.General.SystemWimRemove - -This event indicates that the SystemWim object is no longer present. - -This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedeviceinventorychange). - -The following fields are available: - -- **AppraiserVersion** The version of the Appraiser file that is generating the events. - - -### Microsoft.Windows.Appraiser.General.SystemWimStartSync - -This event indicates that a new set of SystemWimAdd events will be sent. - -This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedeviceinventorychange). - -The following fields are available: - -- **AppraiserVersion** The version of the Appraiser file that is generating the events. - - -### Microsoft.Windows.Appraiser.General.SystemWindowsActivationStatusAdd - -This event sends data indicating whether the current operating system is activated, to help keep Windows up to date. - -This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedeviceinventorychange). - -The following fields are available: - -- **AppraiserVersion** The version of the Appraiser file that is generating the events. -- **WindowsIsLicensedApiValue** The result from the API that's used to indicate if operating system is activated. -- **WindowsNotActivatedDecision** Is the current operating system activated? - - -### Microsoft.Windows.Appraiser.General.SystemWindowsActivationStatusRemove - -This event indicates that the SystemWindowsActivationStatus object is no longer present. - -This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedeviceinventorychange). - -The following fields are available: - -- **AppraiserVersion** The version of the Appraiser file that is generating the events. - - -### Microsoft.Windows.Appraiser.General.SystemWindowsActivationStatusStartSync - -This event indicates that a new set of SystemWindowsActivationStatusAdd events will be sent. - -This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedeviceinventorychange). - -The following fields are available: - -- **AppraiserVersion** The version of the Appraiser file that is generating the events. - - -### Microsoft.Windows.Appraiser.General.SystemWlanAdd - -This event sends data indicating whether the system has WLAN, and if so, whether it uses an emulated driver that could block an upgrade, to help keep Windows up-to-date. - -This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedeviceinventorychange). - -The following fields are available: - -- **AppraiserVersion** The version of the Appraiser file that is generating the events. -- **Blocking** Is the upgrade blocked because of an emulated WLAN driver? -- **HasWlanBlock** Does the emulated WLAN driver have an upgrade block? -- **WlanEmulatedDriver** Does the device have an emulated WLAN driver? -- **WlanExists** Does the device support WLAN at all? -- **WlanModulePresent** Are any WLAN modules present? -- **WlanNativeDriver** Does the device have a non-emulated WLAN driver? - - -### Microsoft.Windows.Appraiser.General.SystemWlanRemove - -This event indicates that the SystemWlan object is no longer present. - -This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedeviceinventorychange). - -The following fields are available: - -- **AppraiserVersion** The version of the Appraiser file that is generating the events. - - -### Microsoft.Windows.Appraiser.General.SystemWlanStartSync - -This event indicates that a new set of SystemWlanAdd events will be sent. - -This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedeviceinventorychange). - -The following fields are available: - -- **AppraiserVersion** The version of the Appraiser file that is generating the events. - - -### Microsoft.Windows.Appraiser.General.TelemetryRunHealth - -This event indicates the parameters and result of a telemetry (diagnostic) run. This allows the rest of the data sent over the course of the run to be properly contextualized and understood, which is then used to keep Windows up to date. - -The following fields are available: - -- **AppraiserBranch** The source branch in which the version of Appraiser that is running was built. -- **AppraiserDataVersion** The version of the data files being used by the Appraiser telemetry run. -- **AppraiserProcess** The name of the process that launched Appraiser. -- **AppraiserVersion** The file version (major, minor and build) of the Appraiser DLL, concatenated without dots. -- **AuxFinal** Obsolete, always set to false. -- **AuxInitial** Obsolete, indicates if Appraiser is writing data files to be read by the Get Windows 10 app. -- **DeadlineDate** A timestamp representing the deadline date, which is the time until which appraiser will wait to do a full scan. -- **EnterpriseRun** Indicates if the telemetry run is an enterprise run, which means appraiser was run from the command line with an extra enterprise parameter. -- **FullSync** Indicates if Appraiser is performing a full sync, which means that full set of events representing the state of the machine are sent. Otherwise, only the changes from the previous run are sent. -- **InboxDataVersion** The original version of the data files before retrieving any newer version. -- **IndicatorsWritten** Indicates if all relevant UEX indicators were successfully written or updated. -- **InventoryFullSync** Indicates if inventory is performing a full sync, which means that the full set of events representing the inventory of machine are sent. -- **PCFP** An ID for the system calculated by hashing hardware identifiers. -- **PerfBackoff** Indicates if the run was invoked with logic to stop running when a user is present. Helps to understand why a run may have a longer elapsed time than normal. -- **PerfBackoffInsurance** Indicates if appraiser is running without performance backoff because it has run with perf backoff and failed to complete several times in a row. -- **RunAppraiser** Indicates if Appraiser was set to run at all. If this if false, it is understood that data events will not be received from this device. -- **RunDate** The date that the telemetry run was stated, expressed as a filetime. -- **RunGeneralTel** Indicates if the generaltel.dll component was run. Generaltel collects additional telemetry on an infrequent schedule and only from machines at telemetry levels higher than Basic. -- **RunOnline** Indicates if appraiser was able to connect to Windows Update and theefore is making decisions using up-to-date driver coverage information. -- **RunResult** The hresult of the Appraiser telemetry run. -- **ScheduledUploadDay** The day scheduled for the upload. -- **SendingUtc** Indicates if the Appraiser client is sending events during the current telemetry run. -- **StoreHandleIsNotNull** Obsolete, always set to false -- **TelementrySent** Indicates if telemetry was successfully sent. -- **ThrottlingUtc** Indicates if the Appraiser client is throttling its output of CUET events to avoid being disabled. This increases runtime but also telemetry reliability. -- **Time** The client time of the event. -- **VerboseMode** Indicates if appraiser ran in Verbose mode, which is a test-only mode with extra logging. -- **WhyFullSyncWithoutTablePrefix** Indicates the reason or reasons that a full sync was generated. - - -### Microsoft.Windows.Appraiser.General.WmdrmAdd - -This event sends data about the usage of older digital rights management on the system, to help keep Windows up to date. This data does not indicate the details of the media using the digital rights management, only whether any such files exist. Collecting this data was critical to ensuring the correct mitigation for customers, and should be able to be removed once all mitigations are in place. - -This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedeviceinventorychange). - -The following fields are available: - -- **AppraiserVersion** The version of the Appraiser file that is generating the events. -- **BlockingApplication** Same as NeedsDismissAction. -- **NeedsDismissAction** Indicates if a dismissible message is needed to warn the user about a potential loss of data due to DRM deprecation. -- **WmdrmApiResult** Raw value of the API used to gather DRM state. -- **WmdrmCdRipped** Indicates if the system has any files encrypted with personal DRM, which was used for ripped CDs. -- **WmdrmIndicators** WmdrmCdRipped OR WmdrmPurchased. -- **WmdrmInUse** WmdrmIndicators AND dismissible block in setup was not dismissed. -- **WmdrmNonPermanent** Indicates if the system has any files with non-permanent licenses. -- **WmdrmPurchased** Indicates if the system has any files with permanent licenses. - - -### Microsoft.Windows.Appraiser.General.WmdrmRemove - -This event indicates that the Wmdrm object is no longer present. - -This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedeviceinventorychange). - -The following fields are available: - -- **AppraiserVersion** The version of the Appraiser file that is generating the events. - - -### Microsoft.Windows.Appraiser.General.WmdrmStartSync - -This event indicates that a new set of WmdrmAdd events will be sent. - -This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedeviceinventorychange). - -The following fields are available: - -- **AppraiserVersion** The version of the Appraiser file that is generating the events. - - -## Census events - -### Census.App - -Provides information on IE and Census versions running on the device - -The following fields are available: - -- **AppraiserEnterpriseErrorCode** The error code of the last Appraiser enterprise run. -- **AppraiserErrorCode** The error code of the last Appraiser run. -- **AppraiserRunEndTimeStamp** The end time of the last Appraiser run. -- **AppraiserRunIsInProgressOrCrashed** Flag that indicates if the Appraiser run is in progress or has crashed. -- **AppraiserRunStartTimeStamp** The start time of the last Appraiser run. -- **AppraiserTaskEnabled** Whether the Appraiser task is enabled. -- **AppraiserTaskExitCode** The Appraiser task exist code. -- **AppraiserTaskLastRun** The last runtime for the Appraiser task. -- **CensusVersion** The version of Census that generated the current data for this device. -- **IEVersion** The version of Internet Explorer that is running on the device. - - -### Census.Battery - -This event sends type and capacity data about the battery on the device, as well as the number of connected standby devices in use, type to help keep Windows up to date. - -The following fields are available: - -- **InternalBatteryCapablities** Represents information about what the battery is capable of doing. -- **InternalBatteryCapacityCurrent** Represents the battery's current fully charged capacity in mWh (or relative). Compare this value to DesignedCapacity  to estimate the battery's wear. -- **InternalBatteryCapacityDesign** Represents the theoretical capacity of the battery when new, in mWh. -- **InternalBatteryNumberOfCharges** Provides the number of battery charges. This is used when creating new products and validating that existing products meets targeted functionality performance. -- **IsAlwaysOnAlwaysConnectedCapable** Represents whether the battery enables the device to be AlwaysOnAlwaysConnected . Boolean value. - - -### Census.Camera - -This event sends data about the resolution of cameras on the device, to help keep Windows up to date. - -The following fields are available: - -- **FrontFacingCameraResolution** Represents the resolution of the front facing camera in megapixels. If a front facing camera does not exist, then the value is 0. -- **RearFacingCameraResolution** Represents the resolution of the rear facing camera in megapixels. If a rear facing camera does not exist, then the value is 0. - - -### Census.Enterprise - -This event sends data about Azure presence, type, and cloud domain use in order to provide an understanding of the use and integration of devices in an enterprise, cloud, and server environment. - -The following fields are available: - -- **AADDeviceId** Azure Active Directory device ID. -- **AzureOSIDPresent** Represents the field used to identify an Azure machine. -- **AzureVMType** Represents whether the instance is Azure VM PAAS, Azure VM IAAS or any other VMs. -- **CDJType** Represents the type of cloud domain joined for the machine. -- **CommercialId** Represents the GUID for the commercial entity which the device is a member of.  Will be used to reflect insights back to customers. -- **ContainerType** The type of container, such as process or virtual machine hosted. -- **EnrollmentType** Defines the type of MDM enrollment on the device. -- **HashedDomain** The hashed representation of the user domain used for login. -- **IsCloudDomainJoined** Is this device joined to an Azure Active Directory (AAD) tenant? true/false -- **IsDERequirementMet** Represents if the device can do device encryption. -- **IsDeviceProtected** Represents if Device protected by BitLocker/Device Encryption -- **IsDomainJoined** Indicates whether a machine is joined to a domain. -- **IsEDPEnabled** Represents if Enterprise data protected on the device. -- **IsMDMEnrolled** Whether the device has been MDM Enrolled or not. -- **MPNId** Returns the Partner ID/MPN ID from Regkey. HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\DeployID -- **SCCMClientId** This ID correlate systems that send data to Compat Analytics (OMS) and other OMS based systems with systems in an Enterprise SCCM environment. -- **ServerFeatures** Represents the features installed on a Windows   Server. This can be used by developers and administrators who need to automate the process of determining the features installed on a set of server computers. -- **SystemCenterID** The SCCM ID is an anonymized one-way hash of the Active Directory Organization identifier - - -### Census.Firmware - -This event sends data about the BIOS and startup embedded in the device, to help keep Windows up to date. - -The following fields are available: - -- **FirmwareManufacturer** Represents the manufacturer of the device's firmware (BIOS). -- **FirmwareReleaseDate** Represents the date the current firmware was released. -- **FirmwareType** Represents the firmware type. The various types can be unknown, BIOS, UEFI. -- **FirmwareVersion** Represents the version of the current firmware. - - -### Census.Flighting - -This event sends Windows Insider data from customers participating in improvement testing and feedback programs, to help keep Windows up to date. - -The following fields are available: - -- **DeviceSampleRate** The telemetry sample rate assigned to the device. -- **EnablePreviewBuilds** Used to enable Windows Insider builds on a device. -- **FlightIds** A list of the different Windows Insider builds on this device. -- **FlightingBranchName** The name of the Windows Insider branch currently used by the device. -- **IsFlightsDisabled** Represents if the device is participating in the Windows Insider program. -- **MSA_Accounts** Represents a list of hashed IDs of the Microsoft Accounts that are flighting (pre-release builds) on this device. -- **SSRK** Retrieves the mobile targeting settings. - - -### Census.Hardware - -This event sends data about the device, including hardware type, OEM brand, model line, model, telemetry level setting, and TPM support, to help keep Windows up to date. - -The following fields are available: - -- **ActiveMicCount** The number of active microphones attached to the device. -- **ChassisType** Represents the type of device chassis, such as desktop or low profile desktop. The possible values can range between 1 - 36. -- **ComputerHardwareID** Identifies a device class that is represented by a hash of different SMBIOS fields. -- **D3DMaxFeatureLevel** Supported Direct3D version. -- **DeviceColor** Indicates a color of the device. -- **DeviceForm** Indicates the form as per the device classification. -- **DeviceName** The device name that is set by the user. -- **DigitizerSupport** Is a digitizer supported? -- **DUID** The device unique ID. -- **Gyroscope** Indicates whether the device has a gyroscope (a mechanical component that measures and maintains orientation). -- **InventoryId** The device ID used for compatibility testing. -- **Magnetometer** Indicates whether the device has a magnetometer (a mechanical component that works like a compass). -- **NFCProximity** Indicates whether the device supports NFC (a set of communication protocols that helps establish communication when applicable devices are brought close together.) -- **OEMDigitalMarkerFileName** The name of the file placed in the \Windows\system32\drivers directory that specifies the OEM and model name of the device. -- **OEMManufacturerName** The device manufacturer name. The OEMName for an inactive device is not reprocessed even if the clean OEM name is changed at a later date. -- **OEMModelBaseBoard** The baseboard model used by the OEM. -- **OEMModelBaseBoardVersion** Differentiates between developer and retail devices. -- **OEMModelName** The device model name. -- **OEMModelNumber** The device model number. -- **OEMModelSKU** The device edition that is defined by the manufacturer. -- **OEMModelSystemFamily** The system family set on the device by an OEM. -- **OEMModelSystemVersion** The system model version set on the device by the OEM. -- **OEMOptionalIdentifier** A Microsoft assigned value that represents a specific OEM subsidiary. -- **OEMSerialNumber** The serial number of the device that is set by the manufacturer. -- **PhoneManufacturer** The friendly name of the phone manufacturer. -- **PowerPlatformRole** The OEM preferred power management profile. It's used to help to identify the basic form factor of the device. -- **SoCName** The firmware manufacturer of the device. -- **StudyID** Used to identify retail and non-retail device. -- **TelemetryLevel** The telemetry level the user has opted into, such as Basic or Enhanced. -- **TelemetryLevelLimitEnhanced** The telemetry level for Windows Analytics-based solutions. -- **TelemetrySettingAuthority** Determines who set the telemetry level, such as GP, MDM, or the user. -- **TPMManufacturerId** The ID of the TPM manufacturer. -- **TPMManufacturerVersion** The version of the TPM manufacturer. -- **TPMVersion** The supported Trusted Platform Module (TPM) on the device. If no TPM is present, the value is 0. -- **VoiceSupported** Does the device have a cellular radio capable of making voice calls? - - -### Census.Memory - -This event sends data about the memory on the device, including ROM and RAM, to help keep Windows up to date. - -The following fields are available: - -- **TotalPhysicalRAM** Represents the physical memory (in MB). -- **TotalVisibleMemory** Represents the memory that is not reserved by the system. - - -### Census.Network - -This event sends data about the mobile and cellular network used by the device (mobile service provider, network, device ID, and service cost factors), to help keep Windows up to date. - -The following fields are available: - -- **IMEI0** Represents the International Mobile Station Equipment Identity. This number is usually unique and used by the mobile operator to distinguish different phone hardware. Microsoft does not have access to mobile operator billing data so collecting this data does not expose or identify the user. The two fields represent phone with dual sim coverage. -- **IMEI1** Represents the International Mobile Station Equipment Identity. This number is usually unique and used by the mobile operator to distinguish different phone hardware. Microsoft does not have access to mobile operator billing data so collecting this data does not expose or identify the user. The two fields represent phone with dual sim coverage. -- **MCC0** Represents the Mobile Country Code (MCC). It used with the Mobile Network Code (MNC) to uniquely identify a mobile network operator. The two fields represent phone with dual sim coverage. -- **MCC1** Represents the Mobile Country Code (MCC). It used with the Mobile Network Code (MNC) to uniquely identify a mobile network operator. The two fields represent phone with dual sim coverage. -- **MEID** Represents the Mobile Equipment Identity (MEID). MEID is a worldwide unique phone ID assigned to CDMA phones. MEID replaces electronic serial number (ESN), and is equivalent to IMEI for GSM and WCDMA phones. Microsoft does not have access to mobile operator billing data so collecting this data does not expose or identify the user. -- **MNC0** Retrieves the Mobile Network Code (MNC). It used with the Mobile Country Code (MCC) to uniquely identify a mobile network operator. The two fields represent phone with dual sim coverage. -- **MNC1** Retrieves the Mobile Network Code (MNC). It used with the Mobile Country Code (MCC) to uniquely identify a mobile network operator. The two fields represent phone with dual sim coverage. -- **MobileOperatorBilling** Represents the telephone company that provides services for mobile phone users. -- **MobileOperatorCommercialized** Represents which reseller and geography the phone is commercialized for. This is the set of values on the phone for who and where it was intended to be used. For example, the commercialized mobile operator code AT&T in the US would be ATT-US. -- **MobileOperatorNetwork0** Represents the operator of the current mobile network that the device is used on. (AT&T, T-Mobile, Vodafone). The two fields represent phone with dual sim coverage. -- **MobileOperatorNetwork1** Represents the operator of the current mobile network that the device is used on. (AT&T, T-Mobile, Vodafone). The two fields represent phone with dual sim coverage. -- **NetworkAdapterGUID** The GUID of the primary network adapter. -- **NetworkCost** Represents the network cost associated with a connection. -- **SPN0** Retrieves the Service Provider Name (SPN). For example, these might be AT&T, Sprint, T-Mobile, or Verizon. The two fields represent phone with dual sim coverage. -- **SPN1** Retrieves the Service Provider Name (SPN). For example, these might be AT&T, Sprint, T-Mobile, or Verizon. The two fields represent phone with dual sim coverage. - - -### Census.OS - -This event sends data about the operating system such as the version, locale, update service configuration, when and how it was originally installed, and whether it is a virtual device, to help keep Windows up to date. - -The following fields are available: - -- **ActivationChannel** Retrieves the retail license key or Volume license key for a machine. -- **AssignedAccessStatus** Kiosk configuration mode. -- **CompactOS** Indicates if the Compact OS feature from Win10 is enabled. -- **DeveloperUnlockStatus** Represents if a device has been developer unlocked by the user or Group Policy. -- **DeviceTimeZone** The time zone that is set on the device. Example: Pacific Standard Time -- **GenuineState** Retrieves the ID Value specifying the OS Genuine check. -- **InstallationType** Retrieves the type of OS installation. (Clean, Upgrade, Reset, Refresh, Update). -- **InstallLanguage** The first language installed on the user machine. -- **IsDeviceRetailDemo** Retrieves if the device is running in demo mode. -- **IsEduData** Returns Boolean if the education data policy is enabled. -- **IsPortableOperatingSystem** Retrieves whether OS is running Windows-To-Go -- **IsSecureBootEnabled** Retrieves whether Boot chain is signed under UEFI. -- **LanguagePacks** The list of language packages installed on the device. -- **LicenseStateReason** Retrieves why (or how) a system is licensed or unlicensed. The HRESULT may indicate an error code that indicates a key blocked error, or it may indicate that we are running an OS License granted by the MS store. -- **OA3xOriginalProductKey** Retrieves the License key stamped by the OEM to the machine. -- **OSEdition** Retrieves the version of the current OS. -- **OSInstallType** Retrieves a numeric description of what install was used on the device i.e. clean, upgrade, refresh, reset, etc -- **OSOOBEDateTime** Retrieves Out of Box Experience (OOBE) Date in Coordinated Universal Time (UTC). -- **OSSKU** Retrieves the Friendly Name of OS Edition. -- **OSSubscriptionStatus** Represents the existing status for enterprise subscription feature for PRO machines. -- **OSSubscriptionTypeId** Returns boolean for enterprise subscription feature for selected PRO machines. -- **OSTimeZoneBiasInMins** Retrieves the time zone set on machine. -- **OSUILocale** Retrieves the locale of the UI that is currently used by the OS. -- **ProductActivationResult** Returns Boolean if the OS Activation was successful. -- **ProductActivationTime** Returns the OS Activation time for tracking piracy issues. -- **ProductKeyID2** Retrieves the License key if the machine is updated with a new license key. -- **RACw7Id** Retrieves the Microsoft Reliability Analysis Component (RAC) Win7 Identifier. RAC is used to monitor and analyze system usage and reliability. -- **ServiceMachineIP** Retrieves the IP address of the KMS host used for anti-piracy. -- **ServiceMachinePort** Retrieves the port of the KMS host used for anti-piracy. -- **ServiceProductKeyID** Retrieves the License key of the KMS -- **SharedPCMode** Returns Boolean for education devices used as shared cart -- **Signature** Retrieves if it is a signature machine sold by Microsoft store. -- **SLICStatus** Whether a SLIC table exists on the device. -- **SLICVersion** Returns OS type/version from SLIC table. - - -### Census.PrivacySettings - -This event provides information about the device level privacy settings and whether device-level access was granted to these capabilities. Not all settings are applicable to all devices. Each field records the consent state for the corresponding privacy setting. The consent state is encoded as a 16-bit signed integer, where the first 8 bits represents the effective consent value, and the last 8 bits represent the authority that set the value. The effective consent (first 8 bits) is one of the following values: -3 = unexpected consent value, -2 = value was not requested, -1 = an error occurred while attempting to retrieve the value, 0 = undefined, 1 = allow, 2 = deny, 3 = prompt. The consent authority (last 8 bits) is one of the following values: -3 = unexpected authority, -2 = value was not requested, -1 = an error occurred while attempting to retrieve the value, 0 = system, 1 = a higher authority (a gating setting, the system-wide setting, or a group policy), 2 = advertising ID group policy, 3 = advertising ID policy for child account, 4 = privacy setting provider doesn't know the actual consent authority, 5 = consent was not configured and a default set in code was used, 6 = system default, 7 = organization policy, 8 = OneSettings. - -The following fields are available: - -- **Activity** Current state of the activity history setting. -- **ActivityHistoryCloudSync** Current state of the activity history cloud sync setting. -- **ActivityHistoryCollection** Current state of the activity history collection setting. -- **AdvertisingId** Current state of the advertising ID setting. -- **AppDiagnostics** Current state of the app diagnostics setting. -- **Appointments** Current state of the calendar setting. -- **Bluetooth** Current state of the Bluetooth capability setting. -- **BluetoothSync** Current state of the Bluetooth sync capability setting. -- **BroadFileSystemAccess** Current state of the broad file system access setting. -- **CellularData** Current state of the cellular data capability setting. -- **Chat** Current state of the chat setting. -- **Contacts** Current state of the contacts setting. -- **DocumentsLibrary** Current state of the documents library setting. -- **Email** Current state of the email setting. -- **FindMyDevice** Current state of the "find my device" setting. -- **GazeInput** Current state of the gaze input setting. -- **HumanInterfaceDevice** Current state of the human interface device setting. -- **InkTypeImprovement** Current state of the improve inking and typing setting. -- **Location** Current state of the location setting. -- **LocationHistory** Current state of the location history setting. -- **LocationHistoryCloudSync** Current state of the location history cloud sync setting. -- **LocationHistoryOnTimeline** Current state of the location history on timeline setting. -- **Microphone** Current state of the microphone setting. -- **PhoneCall** Current state of the phone call setting. -- **PhoneCallHistory** Current state of the call history setting. -- **PicturesLibrary** Current state of the pictures library setting. -- **Radios** Current state of the radios setting. -- **SensorsCustom** Current state of the custom sensor setting. -- **SerialCommunication** Current state of the serial communication setting. -- **Sms** Current state of the text messaging setting. -- **SpeechPersonalization** Current state of the speech services setting. -- **USB** Current state of the USB setting. -- **UserAccountInformation** Current state of the account information setting. -- **UserDataTasks** Current state of the tasks setting. -- **UserNotificationListener** Current state of the notifications setting. -- **VideosLibrary** Current state of the videos library setting. -- **Webcam** Current state of the camera setting. -- **WiFiDirect** Current state of the Wi-Fi direct setting. - - -### Census.Processor - -Provides information on several important data points about Processor settings - -The following fields are available: - -- **KvaShadow** This is the micro code information of the processor. -- **MMSettingOverride** Microcode setting of the processor. -- **MMSettingOverrideMask** Microcode setting override of the processor. -- **PreviousUpdateRevision** Previous microcode revision -- **ProcessorArchitecture** Retrieves the processor architecture of the installed operating system. -- **ProcessorClockSpeed** Clock speed of the processor in MHz. -- **ProcessorCores** Number of logical cores in the processor. -- **ProcessorIdentifier** Processor Identifier of a manufacturer. -- **ProcessorManufacturer** Name of the processor manufacturer. -- **ProcessorModel** Name of the processor model. -- **ProcessorPhysicalCores** Number of physical cores in the processor. -- **ProcessorUpdateRevision** The microcode revision. -- **ProcessorUpdateStatus** Enum value that represents the processor microcode load status -- **SocketCount** Count of CPU sockets. -- **SpeculationControl** Indicates whether the system has enabled protections needed to validate the speculation control vulnerability. - - -### Census.Security - -This event provides information on about security settings used to help keep Windows up to date and secure. - -The following fields are available: - -- **AvailableSecurityProperties** This field helps to enumerate and report state on the relevant security properties for Device Guard. -- **CGRunning** Credential Guard isolates and hardens key system and user secrets against compromise, helping to minimize the impact and breadth of a Pass the Hash style attack in the event that malicious code is already running via a local or network based vector. This field tells if Credential Guard is running. -- **DGState** This field summarizes the Device Guard state. -- **HVCIRunning** Hypervisor Code Integrity (HVCI) enables Device Guard to help protect kernel mode processes and drivers from vulnerability exploits and zero days. HVCI uses the processor’s functionality to force all software running in kernel mode to safely allocate memory. This field tells if HVCI is running. -- **IsSawGuest** Indicates whether the device is running as a Secure Admin Workstation Guest. -- **IsSawHost** Indicates whether the device is running as a Secure Admin Workstation Host. -- **RequiredSecurityProperties** Describes the required security properties to enable virtualization-based security. -- **SecureBootCapable** Systems that support Secure Boot can have the feature turned off via BIOS. This field tells if the system is capable of running Secure Boot, regardless of the BIOS setting. -- **SModeState** The Windows S mode trail state. -- **VBSState** Virtualization-based security (VBS) uses the hypervisor to help protect the kernel and other parts of the operating system. Credential Guard and Hypervisor Code Integrity (HVCI) both depend on VBS to isolate/protect secrets, and kernel-mode code integrity validation. VBS has a tri-state that can be Disabled, Enabled, or Running. - - -### Census.Speech - -This event is used to gather basic speech settings on the device. - -The following fields are available: - -- **AboveLockEnabled** Cortana setting that represents if Cortana can be invoked when the device is locked. -- **GPAllowInputPersonalization** Indicates if a Group Policy setting has enabled speech functionalities. -- **HolographicSpeechInputDisabled** Holographic setting that represents if the attached HMD devices have speech functionality disabled by the user. -- **HolographicSpeechInputDisabledRemote** Indicates if a remote policy has disabled speech functionalities for the HMD devices. -- **KeyVer** Version information for the census speech event. -- **KWSEnabled** Cortana setting that represents if a user has enabled the "Hey Cortana" keyword spotter (KWS). -- **MDMAllowInputPersonalization** Indicates if an MDM policy has enabled speech functionalities. -- **RemotelyManaged** Indicates if the device is being controlled by a remote administrator (MDM or Group Policy) in the context of speech functionalities. -- **SpeakerIdEnabled** Cortana setting that represents if keyword detection has been trained to try to respond to a single user's voice. -- **SpeechServicesEnabled** Windows setting that represents whether a user is opted-in for speech services on the device. -- **SpeechServicesValueSource** Indicates the deciding factor for the effective online speech recognition privacy policy settings: remote admin, local admin, or user preference. - - -### Census.Storage - -This event sends data about the total capacity of the system volume and primary disk, to help keep Windows up to date. - -The following fields are available: - -- **PrimaryDiskTotalCapacity** Retrieves the amount of disk space on the primary disk of the device in MB. -- **PrimaryDiskType** Retrieves an enumerator value of type STORAGE_BUS_TYPE that indicates the type of bus to which the device is connected. This should be used to interpret the raw device properties at the end of this structure (if any). -- **StorageReservePassedPolicy** Indicates whether the Storage Reserve policy, which ensures that updates have enough disk space and customers are on the latest OS, is enabled on this device. -- **SystemVolumeTotalCapacity** Retrieves the size of the partition that the System volume is installed on in MB. - - -### Census.Userdefault - -This event sends data about the current user's default preferences for browser and several of the most popular extensions and protocols, to help keep Windows up to date. - -The following fields are available: - -- **CalendarType** The calendar identifiers that are used to specify different calendars. -- **DefaultApp** The current uer's default program selected for the following extension or protocol: .html, .htm, .jpg, .jpeg, .png, .mp3, .mp4, .mov, .pdf. -- **DefaultBrowserProgId** The ProgramId of the current user's default browser. -- **LongDateFormat** The long date format the user has selected. -- **ShortDateFormat** The short date format the user has selected. - - -### Census.UserDisplay - -This event sends data about the logical/physical display size, resolution and number of internal/external displays, and VRAM on the system, to help keep Windows up to date. - -The following fields are available: - -- **InternalPrimaryDisplayLogicalDPIX** Retrieves the logical DPI in the x-direction of the internal display. -- **InternalPrimaryDisplayLogicalDPIY** Retrieves the logical DPI in the y-direction of the internal display. -- **InternalPrimaryDisplayPhysicalDPIX** Retrieves the physical DPI in the x-direction of the internal display. -- **InternalPrimaryDisplayPhysicalDPIY** Retrieves the physical DPI in the y-direction of the internal display. -- **InternalPrimaryDisplayResolutionHorizontal** Retrieves the number of pixels in the horizontal direction of the internal display. -- **InternalPrimaryDisplayResolutionVertical** Retrieves the number of pixels in the vertical direction of the internal display. -- **InternalPrimaryDisplaySizePhysicalH** Retrieves the physical horizontal length of the display in mm. Used for calculating the diagonal length in inches . -- **InternalPrimaryDisplaySizePhysicalY** Retrieves the physical vertical length of the display in mm. Used for calculating the diagonal length in inches -- **NumberofExternalDisplays** Retrieves the number of external displays connected to the machine -- **NumberofInternalDisplays** Retrieves the number of internal displays in a machine. -- **VRAMDedicated** Retrieves the video RAM in MB. -- **VRAMDedicatedSystem** Retrieves the amount of memory on the dedicated video card. -- **VRAMSharedSystem** Retrieves the amount of RAM memory that the video card can use. - - -### Census.UserNLS - -This event sends data about the default app language, input, and display language preferences set by the user, to help keep Windows up to date. - -The following fields are available: - -- **DefaultAppLanguage** The current user Default App Language. -- **DisplayLanguage** The current user preferred Windows Display Language. -- **HomeLocation** The current user location, which is populated using GetUserGeoId() function. -- **KeyboardInputLanguages** The Keyboard input languages installed on the device. -- **SpeechInputLanguages** The Speech Input languages installed on the device. - - -### Census.UserPrivacySettings - -This event provides information about the current users privacy settings and whether device-level access was granted to these capabilities. Not all settings are applicable to all devices. Each field records the consent state for the corresponding privacy setting. The consent state is encoded as a 16-bit signed integer, where the first 8 bits represents the effective consent value, and the last 8 bits represents the authority that set the value. The effective consent is one of the following values: -3 = unexpected consent value, -2 = value was not requested, -1 = an error occurred while attempting to retrieve the value, 0 = undefined, 1 = allow, 2 = deny, 3 = prompt. The consent authority is one of the following values: -3 = unexpected authority, -2 = value was not requested, -1 = an error occurred while attempting to retrieve the value, 0 = user, 1 = a higher authority (a gating setting, the system-wide setting, or a group policy), 2 = advertising ID group policy, 3 = advertising ID policy for child account, 4 = privacy setting provider doesn't know the actual consent authority, 5 = consent was not configured and a default set in code was used, 6 = system default, 7 = organization policy, 8 = OneSettings. - -The following fields are available: - -- **Activity** Current state of the activity history setting. -- **ActivityHistoryCloudSync** Current state of the activity history cloud sync setting. -- **ActivityHistoryCollection** Current state of the activity history collection setting. -- **AdvertisingId** Current state of the advertising ID setting. -- **AppDiagnostics** Current state of the app diagnostics setting. -- **Appointments** Current state of the calendar setting. -- **Bluetooth** Current state of the Bluetooth capability setting. -- **BluetoothSync** Current state of the Bluetooth sync capability setting. -- **BroadFileSystemAccess** Current state of the broad file system access setting. -- **CellularData** Current state of the cellular data capability setting. -- **Chat** Current state of the chat setting. -- **Contacts** Current state of the contacts setting. -- **DocumentsLibrary** Current state of the documents library setting. -- **Email** Current state of the email setting. -- **GazeInput** Current state of the gaze input setting. -- **HumanInterfaceDevice** Current state of the human interface device setting. -- **InkTypeImprovement** Current state of the improve inking and typing setting. -- **InkTypePersonalization** Current state of the inking and typing personalization setting. -- **Location** Current state of the location setting. -- **LocationHistory** Current state of the location history setting. -- **LocationHistoryCloudSync** Current state of the location history cloud synchronization setting. -- **LocationHistoryOnTimeline** Current state of the location history on timeline setting. -- **Microphone** Current state of the microphone setting. -- **PhoneCall** Current state of the phone call setting. -- **PhoneCallHistory** Current state of the call history setting. -- **PicturesLibrary** Current state of the pictures library setting. -- **Radios** Current state of the radios setting. -- **SensorsCustom** Current state of the custom sensor setting. -- **SerialCommunication** Current state of the serial communication setting. -- **Sms** Current state of the text messaging setting. -- **SpeechPersonalization** Current state of the speech services setting. -- **USB** Current state of the USB setting. -- **UserAccountInformation** Current state of the account information setting. -- **UserDataTasks** Current state of the tasks setting. -- **UserNotificationListener** Current state of the notifications setting. -- **VideosLibrary** Current state of the videos library setting. -- **Webcam** Current state of the camera setting. -- **WiFiDirect** Current state of the Wi-Fi direct setting. - - -### Census.VM - -This event sends data indicating whether virtualization is enabled on the device, and its various characteristics, to help keep Windows up to date. - -The following fields are available: - -- **CloudService** Indicates which cloud service, if any, that this virtual machine is running within. -- **HyperVisor** Retrieves whether the current OS is running on top of a Hypervisor. -- **IOMMUPresent** Represents if an input/output memory management unit (IOMMU) is present. -- **IsVDI** Is the device using Virtual Desktop Infrastructure? -- **IsVirtualDevice** Retrieves that when the Hypervisor is Microsoft's Hyper-V Hypervisor or other Hv#1 Hypervisor, this field will be set to FALSE for the Hyper-V host OS and TRUE for any guest OS's. This field should not be relied upon for non-Hv#1 Hypervisors. -- **SLATSupported** Represents whether Second Level Address Translation (SLAT) is supported by the hardware. -- **VirtualizationFirmwareEnabled** Represents whether virtualization is enabled in the firmware. - - -### Census.WU - -This event sends data about the Windows update server and other App store policies, to help keep Windows up to date. - -The following fields are available: - -- **AppraiserGatedStatus** Indicates whether a device has been gated for upgrading. -- **AppStoreAutoUpdate** Retrieves the Appstore settings for auto upgrade. (Enable/Disabled). -- **AppStoreAutoUpdateMDM** Retrieves the App Auto Update value for MDM: 0 - Disallowed. 1 - Allowed. 2 - Not configured. Default: [2] Not configured -- **AppStoreAutoUpdatePolicy** Retrieves the Microsoft Store App Auto Update group policy setting -- **DelayUpgrade** Retrieves the Windows upgrade flag for delaying upgrades. -- **OSAssessmentFeatureOutOfDate** How many days has it been since a the last feature update was released but the device did not install it? -- **OSAssessmentForFeatureUpdate** Is the device is on the latest feature update? -- **OSAssessmentForQualityUpdate** Is the device on the latest quality update? -- **OSAssessmentForSecurityUpdate** Is the device on the latest security update? -- **OSAssessmentQualityOutOfDate** How many days has it been since a the last quality update was released but the device did not install it? -- **OSAssessmentReleaseInfoTime** The freshness of release information used to perform an assessment. -- **OSRollbackCount** The number of times feature updates have rolled back on the device. -- **OSRolledBack** A flag that represents when a feature update has rolled back during setup. -- **OSUninstalled** A flag that represents when a feature update is uninstalled on a device . -- **OSWUAutoUpdateOptions** Retrieves the auto update settings on the device. -- **OSWUAutoUpdateOptionsSource** The source of auto update setting that appears in the OSWUAutoUpdateOptions field. For example: Group Policy (GP), Mobile Device Management (MDM), and Default. -- **UninstallActive** A flag that represents when a device has uninstalled a previous upgrade recently. -- **UpdateServiceURLConfigured** Retrieves if the device is managed by Windows Server Update Services (WSUS). -- **WUDeferUpdatePeriod** Retrieves if deferral is set for Updates. -- **WUDeferUpgradePeriod** Retrieves if deferral is set for Upgrades. -- **WUDODownloadMode** Retrieves whether DO is turned on and how to acquire/distribute updates Delivery Optimization (DO) allows users to deploy previously downloaded WU updates to other devices on the same network. -- **WUMachineId** Retrieves the Windows Update (WU) Machine Identifier. -- **WUPauseState** Retrieves WU setting to determine if updates are paused. -- **WUServer** Retrieves the HTTP(S) URL of the WSUS server that is used by Automatic Updates and API callers (by default). - - -### Census.Xbox - -This event sends data about the Xbox Console, such as Serial Number and DeviceId, to help keep Windows up to date. - -The following fields are available: - -- **XboxConsolePreferredLanguage** Retrieves the preferred language selected by the user on Xbox console. -- **XboxConsoleSerialNumber** Retrieves the serial number of the Xbox console. -- **XboxLiveDeviceId** Retrieves the unique device ID of the console. -- **XboxLiveSandboxId** Retrieves the developer sandbox ID if the device is internal to Microsoft. - - -## Common data extensions - -### Common Data Extensions.app - -Describes the properties of the running application. This extension could be populated by a client app or a web app. - -The following fields are available: - -- **asId** An integer value that represents the app session. This value starts at 0 on the first app launch and increments after each subsequent app launch per boot session. -- **env** The environment from which the event was logged. -- **expId** Associates a flight, such as an OS flight, or an experiment, such as a web site UX experiment, with an event. -- **id** Represents a unique identifier of the client application currently loaded in the process producing the event; and is used to group events together and understand usage pattern, errors by application. -- **locale** The locale of the app. -- **name** The name of the app. -- **userId** The userID as known by the application. -- **ver** Represents the version number of the application. Used to understand errors by Version, Usage by Version across an app. - - -### Common Data Extensions.container - -Describes the properties of the container for events logged within a container. - -The following fields are available: - -- **epoch** An ID that's incremented for each SDK initialization. -- **localId** The device ID as known by the client. -- **osVer** The operating system version. -- **seq** An ID that's incremented for each event. -- **type** The container type. Examples: Process or VMHost - - -### Common Data Extensions.cs - -Describes properties related to the schema of the event. - -The following fields are available: - -- **sig** A common schema signature that identifies new and modified event schemas. - - -### Common Data Extensions.device - -Describes the device-related fields. - -The following fields are available: - -- **deviceClass** The device classification. For example, Desktop, Server, or Mobile. -- **localId** A locally-defined unique ID for the device. This is not the human-readable device name. Most likely equal to the value stored at HKLM\Software\Microsoft\SQMClient\MachineId -- **make** Device manufacturer. -- **model** Device model. - - -### Common Data Extensions.Envelope - -Represents an envelope that contains all of the common data extensions. - -The following fields are available: - -- **cV** Represents the Correlation Vector: A single field for tracking partial order of related telemetry events across component boundaries. -- **data** Represents the optional unique diagnostic data for a particular event schema. -- **ext_app** Describes the properties of the running application. This extension could be populated by either a client app or a web app. See [Common Data Extensions.app](#common-data-extensionsapp). -- **ext_container** Describes the properties of the container for events logged within a container. See [Common Data Extensions.container](#common-data-extensionscontainer). -- **ext_cs** Describes properties related to the schema of the event. See [Common Data Extensions.cs](#common-data-extensionscs). -- **ext_device** Describes the device-related fields. See [Common Data Extensions.device](#common-data-extensionsdevice). -- **ext_os** Describes the operating system properties that would be populated by the client. See [Common Data Extensions.os](#common-data-extensionsos). -- **ext_receipts** Describes the fields related to time as provided by the client for debugging purposes. See [Common Data Extensions.receipts](#common-data-extensionsreceipts). -- **ext_sdk** Describes the fields related to a platform library required for a specific SDK. See [Common Data Extensions.sdk](#common-data-extensionssdk). -- **ext_user** Describes the fields related to a user. See [Common Data Extensions.user](#common-data-extensionsuser). -- **ext_utc** Describes the fields that might be populated by a logging library on Windows. See [Common Data Extensions.utc](#common-data-extensionsutc). -- **ext_xbl** Describes the fields related to XBOX Live. See [Common Data Extensions.xbl](#common-data-extensionsxbl). -- **flags** Represents a collection of bits that describe how the event should be processed by the Connected User Experience and Telemetry component pipeline. The lowest-order byte is the event persistence. The next byte is the event latency. -- **iKey** Represents an ID for applications or other logical groupings of events. -- **name** Represents the uniquely qualified name for the event. -- **popSample** Represents the effective sample rate for this event at the time it was generated by a client. -- **time** Represents the event date time in Coordinated Universal Time (UTC) when the event was generated on the client. This should be in ISO 8601 format. -- **ver** Represents the major and minor version of the extension. - - -### Common Data Extensions.os - -Describes some properties of the operating system. - -The following fields are available: - -- **bootId** An integer value that represents the boot session. This value starts at 0 on first boot after OS install and increments after every reboot. -- **expId** Represents the experiment ID. The standard for associating a flight, such as an OS flight (pre-release build), or an experiment, such as a web site UX experiment, with an event is to record the flight / experiment IDs in Part A of the common schema. -- **locale** Represents the locale of the operating system. -- **name** Represents the operating system name. -- **ver** Represents the major and minor version of the extension. - - -### Common Data Extensions.receipts - -Represents various time information as provided by the client and helps for debugging purposes. - -The following fields are available: - -- **originalTime** The original event time. -- **uploadTime** The time the event was uploaded. - - -### Common Data Extensions.sdk - -Used by platform specific libraries to record fields that are required for a specific SDK. - -The following fields are available: - -- **epoch** An ID that is incremented for each SDK initialization. -- **installId** An ID that's created during the initialization of the SDK for the first time. -- **libVer** The SDK version. -- **seq** An ID that is incremented for each event. - - -### Common Data Extensions.user - -Describes the fields related to a user. - -The following fields are available: - -- **authId** This is an ID of the user associated with this event that is deduced from a token such as a Microsoft Account ticket or an XBOX token. -- **locale** The language and region. -- **localId** Represents a unique user identity that is created locally and added by the client. This is not the user's account ID. - - -### Common Data Extensions.utc - -Describes the properties that could be populated by a logging library on Windows. - -The following fields are available: - -- **aId** Represents the ETW ActivityId. Logged via TraceLogging or directly via ETW. -- **bSeq** Upload buffer sequence number in the format: buffer identifier:sequence number -- **cat** Represents a bitmask of the ETW Keywords associated with the event. -- **cpId** The composer ID, such as Reference, Desktop, Phone, Holographic, Hub, IoT Composer. -- **epoch** Represents the epoch and seqNum fields, which help track how many events were fired and how many events were uploaded, and enables identification of data lost during upload and de-duplication of events on the ingress server. -- **flags** Represents the bitmap that captures various Windows specific flags. -- **mon** Combined monitor and event sequence numbers in the format: monitor sequence : event sequence -- **op** Represents the ETW Op Code. -- **raId** Represents the ETW Related ActivityId. Logged via TraceLogging or directly via ETW. -- **seq** Represents the sequence field used to track absolute order of uploaded events. It is an incrementing identifier for each event added to the upload queue. The Sequence helps track how many events were fired and how many events were uploaded and enables identification of data lost during upload and de-duplication of events on the ingress server. -- **stId** Represents the Scenario Entry Point ID. This is a unique GUID for each event in a diagnostic scenario. This used to be Scenario Trigger ID. - - -### Common Data Extensions.xbl - -Describes the fields that are related to XBOX Live. - -The following fields are available: - -- **claims** Any additional claims whose short claim name hasn't been added to this structure. -- **did** XBOX device ID -- **dty** XBOX device type -- **dvr** The version of the operating system on the device. -- **eid** A unique ID that represents the developer entity. -- **exp** Expiration time -- **ip** The IP address of the client device. -- **nbf** Not before time -- **pid** A comma separated list of PUIDs listed as base10 numbers. -- **sbx** XBOX sandbox identifier -- **sid** The service instance ID. -- **sty** The service type. -- **tid** The XBOX Live title ID. -- **tvr** The XBOX Live title version. -- **uts** A bit field, with 2 bits being assigned to each user ID listed in xid. This field is omitted if all users are retail accounts. -- **xid** A list of base10-encoded XBOX User IDs. - - -## Common data fields - -### Ms.Device.DeviceInventoryChange - -Describes the installation state for all hardware and software components available on a particular device. - -The following fields are available: - -- **action** The change that was invoked on a device inventory object. -- **inventoryId** Device ID used for Compatibility testing -- **objectInstanceId** Object identity which is unique within the device scope. -- **objectType** Indicates the object type that the event applies to. -- **syncId** A string used to group StartSync, EndSync, Add, and Remove operations that belong together. This field is unique by Sync period and is used to disambiguate in situations where multiple agents perform overlapping inventories for the same object. - - -## Compatibility events - -### Microsoft.Windows.Compatibility.Apphelp.SdbFix - -Product instrumentation for helping debug/troubleshoot issues with inbox compatibility components. - -The following fields are available: - -- **AppName** Name of the application impacted by SDB. -- **FixID** SDB GUID. -- **Flags** List of flags applied. -- **ImageName** Name of file. - - -## Component-based servicing events - -### CbsServicingProvider.CbsCapabilityEnumeration - -This event reports on the results of scanning for optional Windows content on Windows Update. - -The following fields are available: - -- **architecture** Indicates the scan was limited to the specified architecture. -- **capabilityCount** The number of optional content packages found during the scan. -- **clientId** The name of the application requesting the optional content. -- **duration** The amount of time it took to complete the scan. -- **hrStatus** The HReturn code of the scan. -- **language** Indicates the scan was limited to the specified language. -- **majorVersion** Indicates the scan was limited to the specified major version. -- **minorVersion** Indicates the scan was limited to the specified minor version. -- **namespace** Indicates the scan was limited to packages in the specified namespace. -- **sourceFilter** A bitmask indicating the scan checked for locally available optional content. -- **stackBuild** The build number of the servicing stack. -- **stackMajorVersion** The major version number of the servicing stack. -- **stackMinorVersion** The minor version number of the servicing stack. -- **stackRevision** The revision number of the servicing stack. - - -### CbsServicingProvider.CbsCapabilitySessionFinalize - -This event provides information about the results of installing or uninstalling optional Windows content from Windows Update. - -The following fields are available: - -- **capabilities** The names of the optional content packages that were installed. -- **clientId** The name of the application requesting the optional content. -- **currentID** The ID of the current install session. -- **downloadSource** The source of the download. -- **highestState** The highest final install state of the optional content. -- **hrLCUReservicingStatus** Indicates whether the optional content was updated to the latest available version. -- **hrStatus** The HReturn code of the install operation. -- **rebootCount** The number of reboots required to complete the install. -- **retryID** The session ID that will be used to retry a failed operation. -- **retryStatus** Indicates whether the install will be retried in the event of failure. -- **stackBuild** The build number of the servicing stack. -- **stackMajorVersion** The major version number of the servicing stack. -- **stackMinorVersion** The minor version number of the servicing stack. -- **stackRevision** The revision number of the servicing stack. - - -### CbsServicingProvider.CbsCapabilitySessionPended - -This event provides information about the results of installing optional Windows content that requires a reboot to keep Windows up to date. - -The following fields are available: - -- **clientId** The name of the application requesting the optional content. -- **pendingDecision** Indicates the cause of reboot, if applicable. - - -### CbsServicingProvider.CbsLateAcquisition - -This event sends data to indicate if some Operating System packages could not be updated as part of an upgrade, to help keep Windows up to date. - -The following fields are available: - -- **Features** The list of feature packages that could not be updated. -- **RetryID** The ID identifying the retry attempt to update the listed packages. - - -### CbsServicingProvider.CbsPackageRemoval - -This event provides information about the results of uninstalling a Windows Cumulative Security Update to help keep Windows up to date. - -The following fields are available: - -- **buildVersion** The build number of the security update being uninstalled. -- **clientId** The name of the application requesting the uninstall. -- **currentStateEnd** The final state of the update after the operation. -- **failureDetails** Information about the cause of a failure, if applicable. -- **failureSourceEnd** The stage during the uninstall where the failure occurred. -- **hrStatusEnd** The overall exit code of the operation. -- **initiatedOffline** Indicates if the uninstall was initiated for a mounted Windows image. -- **majorVersion** The major version number of the security update being uninstalled. -- **minorVersion** The minor version number of the security update being uninstalled. -- **originalState** The starting state of the update before the operation. -- **pendingDecision** Indicates the cause of reboot, if applicable. -- **primitiveExecutionContext** The state during system startup when the uninstall was completed. -- **revisionVersion** The revision number of the security update being uninstalled. -- **transactionCanceled** Indicates whether the uninstall was cancelled. - - -### CbsServicingProvider.CbsQualityUpdateInstall - -This event reports on the performance and reliability results of installing Servicing content from Windows Update to keep Windows up to date. - -The following fields are available: - -- **buildVersion** The build version number of the update package. -- **clientId** The name of the application requesting the optional content. -- **corruptionHistoryFlags** A bitmask of the types of component store corruption that have caused update failures on the device. -- **corruptionType** An enumeration listing the type of data corruption responsible for the current update failure. -- **currentStateEnd** The final state of the package after the operation has completed. -- **doqTimeSeconds** The time in seconds spent updating drivers. -- **executeTimeSeconds** The number of seconds required to execute the install. -- **failureDetails** The driver or installer that caused the update to fail. -- **failureSourceEnd** An enumeration indicating at what phase of the update a failure occurred. -- **hrStatusEnd** The return code of the install operation. -- **initiatedOffline** A true or false value indicating whether the package was installed into an offline Windows Imaging Format (WIM) file. -- **majorVersion** The major version number of the update package. -- **minorVersion** The minor version number of the update package. -- **originalState** The starting state of the package. -- **overallTimeSeconds** The time (in seconds) to perform the overall servicing operation. -- **planTimeSeconds** The time in seconds required to plan the update operations. -- **poqTimeSeconds** The time in seconds processing file and registry operations. -- **postRebootTimeSeconds** The time (in seconds) to do startup processing for the update. -- **preRebootTimeSeconds** The time (in seconds) between execution of the installation and the reboot. -- **primitiveExecutionContext** An enumeration indicating at what phase of shutdown or startup the update was installed. -- **rebootCount** The number of reboots required to install the update. -- **rebootTimeSeconds** The time (in seconds) before startup processing begins for the update. -- **resolveTimeSeconds** The time in seconds required to resolve the packages that are part of the update. -- **revisionVersion** The revision version number of the update package. -- **rptTimeSeconds** The time in seconds spent executing installer plugins. -- **shutdownTimeSeconds** The time (in seconds) required to do shutdown processing for the update. -- **stackRevision** The revision number of the servicing stack. -- **stageTimeSeconds** The time (in seconds) required to stage all files that are part of the update. - - -## Deployment extensions - -### DeploymentTelemetry.Deployment_End - -This event indicates that a Deployment 360 API has completed. - -The following fields are available: - -- **ClientId** Client ID of the user utilizing the D360 API. -- **ErrorCode** Error code of action. -- **FlightId** The specific ID of the Windows Insider build the device is getting. -- **Mode** Phase in upgrade. -- **RelatedCV** The correction vector (CV) of any other related events -- **Result** End result of the action. - - -### DeploymentTelemetry.Deployment_SetupBoxLaunch - -This event indicates that the Deployment 360 APIs have launched Setup Box. - -The following fields are available: - -- **ClientId** The client ID of the user utilizing the D360 API. -- **FlightId** The specific ID of the Windows Insider build the device is getting. -- **Quiet** Whether Setup will run in quiet mode or full mode. -- **RelatedCV** The correlation vector (CV) of any other related events. -- **SetupMode** The current setup phase. - - -### DeploymentTelemetry.Deployment_SetupBoxResult - -This event indicates that the Deployment 360 APIs have received a return from Setup Box. - -The following fields are available: - -- **ClientId** Client ID of the user utilizing the D360 API. -- **ErrorCode** Error code of the action. -- **FlightId** The specific ID of the Windows Insider build the device is getting. -- **Quiet** Indicates whether Setup will run in quiet mode or full mode. -- **RelatedCV** The correlation vector (CV) of any other related events. -- **SetupMode** The current Setup phase. - - -### DeploymentTelemetry.Deployment_Start - -This event indicates that a Deployment 360 API has been called. - -The following fields are available: - -- **ClientId** Client ID of the user utilizing the D360 API. -- **FlightId** The specific ID of the Windows Insider build the device is getting. -- **Mode** The current phase of the upgrade. -- **RelatedCV** The correlation vector (CV) of any other related events. - - -## Diagnostic data events - -### TelClientSynthetic.AuthorizationInfo_RuntimeTransition - -This event sends data indicating that a device has undergone a change of telemetry opt-in level detected at UTC startup, to help keep Windows up to date. The telemetry opt-in level signals what data we are allowed to collect. - -The following fields are available: - -- **CanAddMsaToMsTelemetry** True if we can add MSA PUID and CID to telemetry, false otherwise. -- **CanCollectAnyTelemetry** True if we are allowed to collect partner telemetry, false otherwise. -- **CanCollectCoreTelemetry** True if we can collect CORE/Basic telemetry, false otherwise. -- **CanCollectHeartbeats** True if we can collect heartbeat telemetry, false otherwise. -- **CanCollectOsTelemetry** True if we can collect diagnostic data telemetry, false otherwise. -- **CanCollectWindowsAnalyticsEvents** True if we can collect Windows Analytics data, false otherwise. -- **CanPerformDiagnosticEscalations** True if we can perform diagnostic escalation collection, false otherwise. -- **CanPerformTraceEscalations** True if we can perform trace escalation collection, false otherwise. -- **CanReportScenarios** True if we can report scenario completions, false otherwise. -- **PreviousPermissions** Bitmask of previous telemetry state. -- **TransitionFromEverythingOff** True if we are transitioning from all telemetry being disabled, false otherwise. - - -### TelClientSynthetic.AuthorizationInfo_Startup - -Fired by UTC at startup to signal what data we are allowed to collect. - -The following fields are available: - -- **CanAddMsaToMsTelemetry** True if we can add MSA PUID and CID to telemetry, false otherwise. -- **CanCollectAnyTelemetry** True if we are allowed to collect partner telemetry, false otherwise. -- **CanCollectCoreTelemetry** True if we can collect CORE/Basic telemetry, false otherwise. -- **CanCollectHeartbeats** True if we can collect heartbeat telemetry, false otherwise. -- **CanCollectOsTelemetry** True if we can collect diagnostic data telemetry, false otherwise. -- **CanCollectWindowsAnalyticsEvents** True if we can collect Windows Analytics data, false otherwise. -- **CanPerformDiagnosticEscalations** True if we can perform diagnostic escalation collection, false otherwise. -- **CanPerformTraceEscalations** True if we can perform trace escalation collection, false otherwise. -- **CanReportScenarios** True if we can report scenario completions, false otherwise. -- **PreviousPermissions** Bitmask of previous telemetry state. -- **TransitionFromEverythingOff** True if we are transitioning from all telemetry being disabled, false otherwise. - - -### TelClientSynthetic.ConnectivityHeartBeat_0 - -This event sends data about the connectivity status of the Connected User Experience and Telemetry component that uploads telemetry events. If an unrestricted free network (such as Wi-Fi) is available, this event updates the last successful upload time. Otherwise, it checks whether a Connectivity Heartbeat event was fired in the past 24 hours, and if not, it fires an event. A Connectivity Heartbeat event also fires when a device recovers from costed network to free network. - -The following fields are available: - -- **CensusExitCode** Returns last execution codes from census client run. -- **CensusStartTime** Returns timestamp corresponding to last successful census run. -- **CensusTaskEnabled** Returns Boolean value for the census task (Enable/Disable) on client machine. -- **LastConnectivityLossTime** Retrieves the last time the device lost free network. -- **NetworkState** Retrieves the network state: 0 = No network. 1 = Restricted network. 2 = Free network. -- **NoNetworkTime** Retrieves the time spent with no network (since the last time) in seconds. -- **RestrictedNetworkTime** Retrieves the time spent on a metered (cost restricted) network in seconds. - - -### TelClientSynthetic.HeartBeat_5 - -This event sends data about the health and quality of the diagnostic data from the given device, to help keep Windows up to date. It also enables data analysts to determine how 'trusted' the data is from a given device. - -The following fields are available: - -- **AgentConnectionErrorsCount** Number of non-timeout errors associated with the host/agent channel. -- **CensusExitCode** The last exit code of the Census task. -- **CensusStartTime** Time of last Census run. -- **CensusTaskEnabled** True if Census is enabled, false otherwise. -- **CompressedBytesUploaded** Number of compressed bytes uploaded. -- **ConsumerDroppedCount** Number of events dropped at consumer layer of telemetry client. -- **CriticalDataDbDroppedCount** Number of critical data sampled events dropped at the database layer. -- **CriticalDataThrottleDroppedCount** The number of critical data sampled events that were dropped because of throttling. -- **CriticalOverflowEntersCounter** Number of times critical overflow mode was entered in event DB. -- **DbCriticalDroppedCount** Total number of dropped critical events in event DB. -- **DbDroppedCount** Number of events dropped due to DB fullness. -- **DbDroppedFailureCount** Number of events dropped due to DB failures. -- **DbDroppedFullCount** Number of events dropped due to DB fullness. -- **DecodingDroppedCount** Number of events dropped due to decoding failures. -- **EnteringCriticalOverflowDroppedCounter** Number of events dropped due to critical overflow mode being initiated. -- **EtwDroppedBufferCount** Number of buffers dropped in the UTC ETW session. -- **EtwDroppedCount** Number of events dropped at ETW layer of telemetry client. -- **EventsPersistedCount** Number of events that reached the PersistEvent stage. -- **EventStoreLifetimeResetCounter** Number of times event DB was reset for the lifetime of UTC. -- **EventStoreResetCounter** Number of times event DB was reset. -- **EventStoreResetSizeSum** Total size of event DB across all resets reports in this instance. -- **EventSubStoreResetCounter** Number of times event DB was reset. -- **EventSubStoreResetSizeSum** Total size of event DB across all resets reports in this instance. -- **EventsUploaded** Number of events uploaded. -- **Flags** Flags indicating device state such as network state, battery state, and opt-in state. -- **FullTriggerBufferDroppedCount** Number of events dropped due to trigger buffer being full. -- **HeartBeatSequenceNumber** The sequence number of this heartbeat. -- **InvalidHttpCodeCount** Number of invalid HTTP codes received from contacting Vortex. -- **LastAgentConnectionError** Last non-timeout error encountered in the host/agent channel. -- **LastEventSizeOffender** Event name of last event which exceeded max event size. -- **LastInvalidHttpCode** Last invalid HTTP code received from Vortex. -- **MaxActiveAgentConnectionCount** The maximum number of active agents during this heartbeat timeframe. -- **MaxInUseScenarioCounter** Soft maximum number of scenarios loaded by UTC. -- **PreviousHeartBeatTime** Time of last heartbeat event (allows chaining of events). -- **RepeatedUploadFailureDropped** Number of events lost due to repeated upload failures for a single buffer. -- **SettingsHttpAttempts** Number of attempts to contact OneSettings service. -- **SettingsHttpFailures** The number of failures from contacting the OneSettings service. -- **ThrottledDroppedCount** Number of events dropped due to throttling of noisy providers. -- **TopUploaderErrors** List of top errors received from the upload endpoint. -- **UploaderDroppedCount** Number of events dropped at the uploader layer of telemetry client. -- **UploaderErrorCount** Number of errors received from the upload endpoint. -- **VortexFailuresTimeout** The number of timeout failures received from Vortex. -- **VortexHttpAttempts** Number of attempts to contact Vortex. -- **VortexHttpFailures4xx** Number of 400-499 error codes received from Vortex. -- **VortexHttpFailures5xx** Number of 500-599 error codes received from Vortex. -- **VortexHttpResponseFailures** Number of Vortex responses that are not 2XX or 400. -- **VortexHttpResponsesWithDroppedEvents** Number of Vortex responses containing at least 1 dropped event. - - -### TelClientSynthetic.HeartBeat_Aria_5 - -This event is the telemetry client ARIA heartbeat. - -The following fields are available: - -- **CompressedBytesUploaded** Number of compressed bytes uploaded. -- **CriticalDataDbDroppedCount** Number of critical data sampled events dropped at the database layer. -- **CriticalOverflowEntersCounter** Number of times critical overflow mode was entered in event database. -- **DbCriticalDroppedCount** Total number of dropped critical events in event database. -- **DbDroppedCount** Number of events dropped at the database layer. -- **DbDroppedFailureCount** Number of events dropped due to database failures. -- **DbDroppedFullCount** Number of events dropped due to database being full. -- **EnteringCriticalOverflowDroppedCounter** Number of events dropped due to critical overflow mode being initiated. -- **EventsPersistedCount** Number of events that reached the PersistEvent stage. -- **EventStoreLifetimeResetCounter** Number of times the event store has been reset. -- **EventStoreResetCounter** Number of times the event store has been reset during this heartbeat. -- **EventStoreResetSizeSum** Size of event store reset in bytes. -- **EventsUploaded** Number of events uploaded. -- **HeartBeatSequenceNumber** The sequence number of this heartbeat. -- **InvalidHttpCodeCount** Number of invalid HTTP codes received from contacting Vortex. -- **LastEventSizeOffender** Event name of last event which exceeded max event size. -- **LastInvalidHttpCode** Last invalid HTTP code received from Vortex. -- **PreviousHeartBeatTime** The FILETIME of the previous heartbeat fire. -- **RepeatedUploadFailureDropped** Number of events lost due to repeated upload failures for a single buffer. -- **SettingsHttpAttempts** Number of attempts to contact OneSettings service. -- **SettingsHttpFailures** Number of failures from contacting OneSettings service. -- **TopUploaderErrors** List of top errors received from the upload endpoint. -- **UploaderDroppedCount** Number of events dropped at the uploader layer of telemetry client. -- **UploaderErrorCount** Number of errors received from the upload endpoint. -- **VortexFailuresTimeout** Number of time out failures received from Vortex. -- **VortexHttpAttempts** Number of attempts to contact Vortex. -- **VortexHttpFailures4xx** Number of 400-499 error codes received from Vortex. -- **VortexHttpFailures5xx** Number of 500-599 error codes received from Vortex. -- **VortexHttpResponseFailures** Number of Vortex responses that are not 2XX or 400. -- **VortexHttpResponsesWithDroppedEvents** Number of Vortex responses containing at least 1 dropped event. - - -### TelClientSynthetic.HeartBeat_Seville_5 - -This event is sent by the universal telemetry client (UTC) as a heartbeat signal for Sense. - -The following fields are available: - -- **AgentConnectionErrorsCount** Number of non-timeout errors associated with the host or agent channel. -- **CompressedBytesUploaded** Number of compressed bytes uploaded. -- **ConsumerDroppedCount** Number of events dropped at consumer layer of the telemetry client. -- **CriticalDataDbDroppedCount** Number of critical data sampled events dropped at the database layer. -- **CriticalDataThrottleDroppedCount** Number of critical data sampled events dropped due to throttling. -- **CriticalOverflowEntersCounter** Number of times critical overflow mode was entered in event database. -- **DailyUploadQuotaInBytes** Daily upload quota for Sense in bytes (only in in-proc mode). -- **DbCriticalDroppedCount** Total number of dropped critical events in event database. -- **DbDroppedCount** Number of events dropped due to database being full. -- **DbDroppedFailureCount** Number of events dropped due to database failures. -- **DbDroppedFullCount** Number of events dropped due to database being full. -- **DecodingDroppedCount** Number of events dropped due to decoding failures. -- **DiskSizeInBytes** Size of event store for Sense in bytes (only in in-proc mode). -- **EnteringCriticalOverflowDroppedCounter** Number of events dropped due to critical overflow mode being initiated. -- **EtwDroppedBufferCount** Number of buffers dropped in the universal telemetry client (UTC) event tracing for Windows (ETW) session. -- **EtwDroppedCount** Number of events dropped at the event tracing for Windows (ETW) layer of telemetry client. -- **EventsPersistedCount** Number of events that reached the PersistEvent stage. -- **EventStoreLifetimeResetCounter** Number of times event the database was reset for the lifetime of the universal telemetry client (UTC). -- **EventStoreResetCounter** Number of times the event database was reset. -- **EventStoreResetSizeSum** Total size of the event database across all resets reports in this instance. -- **EventsUploaded** Number of events uploaded. -- **Flags** Flags indicating device state, such as network state, battery state, and opt-in state. -- **FullTriggerBufferDroppedCount** Number of events dropped due to trigger buffer being full. -- **HeartBeatSequenceNumber** The sequence number of this heartbeat. -- **InvalidHttpCodeCount** Number of invalid HTTP codes received from contacting Vortex. -- **LastAgentConnectionError** Last non-timeout error encountered in the host/agent channel. -- **LastEventSizeOffender** Event name of last event which exceeded the maximum event size. -- **LastInvalidHttpCode** Last invalid HTTP code received from Vortex. -- **MaxActiveAgentConnectionCount** Maximum number of active agents during this heartbeat timeframe. -- **NormalUploadTimerMillis** Number of milliseconds between each upload of normal events for SENSE (only in in-proc mode). -- **PreviousHeartBeatTime** Time of last heartbeat event (allows chaining of events). -- **RepeatedUploadFailureDropped** Number of events lost due to repeated failed uploaded attempts. -- **SettingsHttpAttempts** Number of attempts to contact OneSettings service. -- **SettingsHttpFailures** Number of failures from contacting the OneSettings service. -- **ThrottledDroppedCount** Number of events dropped due to throttling of noisy providers. -- **TopUploaderErrors** Top uploader errors, grouped by endpoint and error type. -- **UploaderDroppedCount** Number of events dropped at the uploader layer of the telemetry client. -- **UploaderErrorCount** Number of input for the TopUploaderErrors mode estimation. -- **VortexFailuresTimeout** Number of time out failures received from Vortex. -- **VortexHttpAttempts** Number of attempts to contact Vortex. -- **VortexHttpFailures4xx** Number of 400-499 error codes received from Vortex. -- **VortexHttpFailures5xx** Number of 500-599 error codes received from Vortex. -- **VortexHttpResponseFailures** Number of Vortex responses that are not 2XX or 400. -- **VortexHttpResponsesWithDroppedEvents** Number of Vortex responses containing at least 1 dropped event. - - -## Direct to update events - -### Microsoft.Windows.DirectToUpdate.DTUCoordinatorCheckApplicabilityGenericFailure - -This event indicatse that we have received an unexpected error in the Direct to Update (DTU) Coordinators CheckApplicability call. - -The following fields are available: - -- **CampaignID** ID of the campaign being run. -- **ClientID** ID of the client receiving the update. -- **CoordinatorVersion** Coordinator version of Direct to Update. -- **CV** Correlation vector. -- **hResult** HRESULT of the failure. - - -### Microsoft.Windows.DirectToUpdate.DTUCoordinatorCleanupGenericFailure - -This event indicates that we have received an unexpected error in the Direct to Update (DTU) Coordinator Cleanup call. - -The following fields are available: - -- **CampaignID** Campaign ID being run -- **ClientID** Client ID being run -- **CoordinatorVersion** Coordinator version of DTU -- **CV** Correlation vector -- **hResult** HRESULT of the failure - - -### Microsoft.Windows.DirectToUpdate.DTUCoordinatorCleanupSuccess - -This event indicates that the Coordinator Cleanup call succeeded. - -The following fields are available: - -- **CampaignID** Campaign ID being run -- **ClientID** Client ID being run -- **CoordinatorVersion** Coordinator version of DTU -- **CV** Correlation vector - - -### Microsoft.Windows.DirectToUpdate.DTUCoordinatorCommitGenericFailure - -This event indicates that we have received an unexpected error in the Direct to Update (DTU) Coordinator Commit call. - -The following fields are available: - -- **CampaignID** Campaign ID being run. -- **ClientID** Client ID being run. -- **CoordinatorVersion** Coordinator version of DTU. -- **CV** Correlation vector. -- **hResult** HRESULT of the failure. - - -### Microsoft.Windows.DirectToUpdate.DTUCoordinatorCommitSuccess - -This event indicates that the Coordinator Commit call succeeded. - -The following fields are available: - -- **CampaignID** Campaign ID being run. -- **ClientID** Client ID being run. -- **CoordinatorVersion** Coordinator version of DTU. -- **CV** Correlation vector. - - -### Microsoft.Windows.DirectToUpdate.DTUCoordinatorDownloadGenericFailure - -This event indicates that we have received an unexpected error in the Direct to Update (DTU) Coordinator Download call. - -The following fields are available: - -- **CampaignID** Campaign ID being run. -- **ClientID** Client ID being run. -- **CoordinatorVersion** Coordinator version of DTU. -- **CV** Correlation vector. -- **hResult** HRESULT of the failure. - - -### Microsoft.Windows.DirectToUpdate.DTUCoordinatorDownloadIgnoredFailure - -This event indicates that we have received an error in the Direct to Update (DTU) Coordinator Download call that will be ignored. - -The following fields are available: - -- **CampaignID** Campaign ID being run. -- **ClientID** Client ID being run. -- **CoordinatorVersion** Coordinator version of DTU. -- **CV** Correlation vector. -- **hResult** HRESULT of the failure. - - -### Microsoft.Windows.DirectToUpdate.DTUCoordinatorDownloadSuccess - -This event indicates that the Coordinator Download call succeeded. - -The following fields are available: - -- **CampaignID** Campaign ID being run. -- **ClientID** Client ID being run. -- **CoordinatorVersion** Coordinator version of DTU. -- **CV** Correlation vector. - - -### Microsoft.Windows.DirectToUpdate.DTUCoordinatorHandleShutdownGenericFailure - -This event indicates that we have received an unexpected error in the Direct to Update (DTU) Coordinator HandleShutdown call. - -The following fields are available: - -- **CampaignID** Campaign ID being run. -- **ClientID** Client ID being run. -- **CoordinatorVersion** Coordinate version of DTU. -- **CV** Correlation vector. -- **hResult** HRESULT of the failure. - - -### Microsoft.Windows.DirectToUpdate.DTUCoordinatorHandleShutdownSuccess - -This event indicates that the Coordinator HandleShutdown call succeeded. - -The following fields are available: - -- **CampaignID** Campaign ID being run. -- **ClientID** Client ID being run. -- **CoordinatorVersion** Coordinator version of DTU. -- **CV** Correlation vector. - - -### Microsoft.Windows.DirectToUpdate.DTUCoordinatorInitializeGenericFailure - -This event indicates that we have received an unexpected error in the Direct to Update (DTU) Coordinator Initialize call. - -The following fields are available: - -- **CampaignID** Campaign ID being run. -- **ClientID** Client ID being run. -- **CoordinatorVersion** Coordinator version of DTU. -- **CV** Correlation vector. -- **hResult** HRESULT of the failure. - - -### Microsoft.Windows.DirectToUpdate.DTUCoordinatorInitializeSuccess - -This event indicates that the Coordinator Initialize call succeeded. - -The following fields are available: - -- **CampaignID** Campaign ID being run. -- **ClientID** Client ID being run. -- **CoordinatorVersion** Coordinator version of DTU. -- **CV** Correlation vector. - - -### Microsoft.Windows.DirectToUpdate.DTUCoordinatorInstallGenericFailure - -This event indicates that we have received an unexpected error in the Direct to Update (DTU) Coordinator Install call. - -The following fields are available: - -- **CampaignID** Campaign ID being run. -- **ClientID** Client ID being run. -- **CoordinatorVersion** Coordinator version of DTU. -- **CV** Correlation vector. -- **hResult** HRESULT of the failure. - - -### Microsoft.Windows.DirectToUpdate.DTUCoordinatorInstallIgnoredFailure - -This event indicates that we have received an error in the Direct to Update (DTU) Coordinator Install call that will be ignored. - -The following fields are available: - -- **CampaignID** Campaign ID being run. -- **ClientID** Client ID being run. -- **CoordinatorVersion** Coordinator version of DTU. -- **CV** Correlation vector. -- **hResult** HRESULT of the failure. - - -### Microsoft.Windows.DirectToUpdate.DTUCoordinatorInstallSuccess - -This event indicates that the Coordinator Install call succeeded. - -The following fields are available: - -- **CampaignID** Campaign ID being run. -- **ClientID** Client ID being run. -- **CoordinatorVersion** Coordinator version of DTU. -- **CV** Correlation vector. - - -### Microsoft.Windows.DirectToUpdate.DTUCoordinatorProgressCallBack - -This event indicates that the Coordinator's progress callback has been called. - -The following fields are available: - -- **CampaignID** Campaign ID being run. -- **ClientID** Client ID being run. -- **CoordinatorVersion** Coordinator version of DTU. -- **CV** Correlation vector. -- **DeployPhase** Current Deploy Phase. - - -### Microsoft.Windows.DirectToUpdate.DTUCoordinatorSetCommitReadySuccess - -This event indicates that the Coordinator SetCommitReady call succeeded. - -The following fields are available: - -- **CampaignID** ID of the update campaign being run. -- **ClientID** ID of the client receiving the update. -- **CoordinatorVersion** Coordinator version of Direct to Update. -- **CV** Correlation vector. - - -### Microsoft.Windows.DirectToUpdate.DTUCoordinatorWaitForRebootUiNotShown - -This event indicates that the Coordinator WaitForRebootUi call succeeded. - -The following fields are available: - -- **CampaignID** Campaign ID being run. -- **ClientID** ID of the client receiving the update. -- **CoordinatorVersion** Coordinator version of Direct to Update. -- **CV** Correlation vector. -- **hResult** HRESULT of the failure. - - -### Microsoft.Windows.DirectToUpdate.DTUCoordinatorWaitForRebootUiSelection - -This event indicates that the user selected an option on the Reboot UI. - -The following fields are available: - -- **CampaignID** ID of the update campaign being run. -- **ClientID** ID of the client receiving the update. -- **CoordinatorVersion** Coordinator version of Direct to Update. -- **CV** Correlation vector. -- **rebootUiSelection** Selection on the Reboot UI. - - -### Microsoft.Windows.DirectToUpdate.DTUCoordinatorWaitForRebootUiSuccess - -This event indicates that the Coordinator WaitForRebootUi call succeeded. - -The following fields are available: - -- **CampaignID** ID of the update campaign being run. -- **ClientID** ID of the client receiving the update. -- **CoordinatorVersion** Coordinator version of Direct to Update. -- **CV** Correlation vector. - - -### Microsoft.Windows.DirectToUpdate.DTUHandlerCheckApplicabilityInternalGenericFailure - -This event indicates that we have received an unexpected error in the Direct to Update (DTU) Handler CheckApplicabilityInternal call. - -The following fields are available: - -- **CampaignID** ID of the campaign being run. -- **ClientID** ID of the client receiving the update. -- **CoordinatorVersion** Coordinator version of Direct to Update. -- **CV** Correlation vector. -- **hResult** HRESULT of the failure. - - -### Microsoft.Windows.DirectToUpdate.DTUHandlerCheckApplicabilityInternalSuccess - -This event indicates that the Handler CheckApplicabilityInternal call succeeded. - -The following fields are available: - -- **ApplicabilityResult** The result of the applicability check. -- **CampaignID** ID of the update campaign being run. -- **ClientID** ID of the client receiving the update. -- **CoordinatorVersion** Coordinator version of Direct to Update. -- **CV** Correlation vector. - - -### Microsoft.Windows.DirectToUpdate.DTUHandlerCheckApplicabilitySuccess - -This event indicates that the Handler CheckApplicability call succeeded. - -The following fields are available: - -- **ApplicabilityResult** The result code indicating whether the update is applicable. -- **CampaignID** ID of the update campaign being run. -- **ClientID** ID of the client receiving the update. -- **CoordinatorVersion** Coordinator version of Direct to Update. -- **CV** Correlation vector. -- **CV_new** New correlation vector. - - -### Microsoft.Windows.DirectToUpdate.DTUHandlerCheckIfCoordinatorMinApplicableVersionSuccess - -This event indicates that the Handler CheckIfCoordinatorMinApplicableVersion call succeeded. - -The following fields are available: - -- **CampaignID** ID of the update campaign being run. -- **CheckIfCoordinatorMinApplicableVersionResult** Result of CheckIfCoordinatorMinApplicableVersion function. -- **ClientID** ID of the client receiving the update. -- **CoordinatorVersion** Coordinator version of Direct to Update. -- **CV** Correlation vector. - - -### Microsoft.Windows.DirectToUpdate.DTUHandlerCommitGenericFailure - -This event indicates that we have received an unexpected error in the Direct to Update (DTU) Handler Commit call. - -The following fields are available: - -- **CampaignID** ID of the update campaign being run. -- **ClientID** ID of the client receiving the update. -- **CoordinatorVersion** Coordinator version of Direct to Update. -- **CV** Correlation vector. -- **CV_new** New correlation vector. -- **hResult** HRESULT of the failure. - - -### Microsoft.Windows.DirectToUpdate.DTUHandlerCommitSuccess - -This event indicates that the Handler Commit call succeeded. - -The following fields are available: - -- **CampaignID** ID of the update campaign being run.run -- **ClientID** ID of the client receiving the update. -- **CoordinatorVersion** Coordinator version of Direct to Update. -- **CV** Correlation vector. -- **CV_new** New correlation vector. - - -### Microsoft.Windows.DirectToUpdate.DTUHandlerDownloadAndExtractCabFailure - -This event indicates that the Handler Download and Extract cab call failed. - -The following fields are available: - -- **CampaignID** ID of the update campaign being run. -- **ClientID** ID of the client receiving the update. -- **CoordinatorVersion** Coordinator version of Direct to Update. -- **CV** Correlation vector. -- **DownloadAndExtractCabFunction_failureReason** Reason why the update download and extract process failed. -- **hResult** HRESULT of the failure. - - -### Microsoft.Windows.DirectToUpdate.DTUHandlerDownloadAndExtractCabSuccess - -This event indicates that the Handler Download and Extract cab call succeeded. - -The following fields are available: - -- **CampaignID** ID of the update campaign being run. -- **ClientID** ID of the client receiving the update. -- **CoordinatorVersion** Coordinator version of Direct to Update. -- **CV** Correlation vector. - - -### Microsoft.Windows.DirectToUpdate.DTUHandlerDownloadGenericFailure - -This event indicates that we have received an unexpected error in the Direct to Update (DTU) Handler Download call. - -The following fields are available: - -- **CampaignID** ID of the update campaign being run. -- **ClientID** ID of the client receiving the update. -- **CoordinatorVersion** Coordinator version of Direct to Update. -- **CV** Correlation vector. -- **hResult** HRESULT of the failure. - - -### Microsoft.Windows.DirectToUpdate.DTUHandlerDownloadSuccess - -This event indicates that the Handler Download call succeeded. - -The following fields are available: - -- **CampaignID** ID of the update campaign being run. -- **ClientID** ID of the client receiving the update. -- **CoordinatorVersion** Coordinator version of Direct to Update. -- **CV** Correlation vector. - - -### Microsoft.Windows.DirectToUpdate.DTUHandlerInitializeGenericFailure - -This event indicates that we have received an unexpected error in the Direct to Update (DTU) Handler Initialize call. - -The following fields are available: - -- **CampaignID** ID of the update campaign being run. -- **ClientID** ID of the client receiving the update. -- **CoordinatorVersion** Coordinator version of Direct to Update. -- **CV** Correlation vector. -- **DownloadAndExtractCabFunction_hResult** HRESULT of the download and extract. -- **hResult** HRESULT of the failure. - - -### Microsoft.Windows.DirectToUpdate.DTUHandlerInitializeSuccess - -This event indicates that the Handler Initialize call succeeded. - -The following fields are available: - -- **CampaignID** ID of the update campaign being run. -- **ClientID** ID of the client receiving the update. -- **CoordinatorVersion** Coordinator version of Direct to Update. -- **CV** Correlation vector. -- **DownloadAndExtractCabFunction_hResult** HRESULT of the download and extraction. - - -### Microsoft.Windows.DirectToUpdate.DTUHandlerInstallGenericFailure - -This event indicates that we have received an unexpected error in the Direct to Update (DTU) Handler Install call. - -The following fields are available: - -- **CampaignID** ID of the update campaign being run. -- **ClientID** ID of the client receiving the update. -- **CoordinatorVersion** Coordinator version of Direct to Update. -- **CV** Correlation vector. -- **hResult** HRESULT of the failure. - - -### Microsoft.Windows.DirectToUpdate.DTUHandlerInstallSuccess - -This event indicates that the Coordinator Install call succeeded. - -The following fields are available: - -- **CampaignID** ID of the update campaign being run. -- **ClientID** ID of the client receiving the update. -- **CoordinatorVersion** Coordinator version of Direct to Update. -- **CV** Correlation vector. - - -### Microsoft.Windows.DirectToUpdate.DTUHandlerSetCommitReadySuccess - -This event indicates that the Handler SetCommitReady call succeeded. - -The following fields are available: - -- **CampaignID** ID of the campaign being run. -- **ClientID** ID of the client receiving the update. -- **CoordinatorVersion** Coordinator version of Direct to Update. -- **CV** Correlation vector. - - -### Microsoft.Windows.DirectToUpdate.DTUHandlerWaitForRebootUiGenericFailure - -This event indicates that we have received an unexpected error in the Direct to Update (DTU) Handler WaitForRebootUi call. - -The following fields are available: - -- **CampaignID** The ID of the campaigning being run. -- **ClientID** ID of the client receiving the update. -- **CoordinatorVersion** Coordinator version of Direct to Update. -- **CV** Correlation vector. -- **hResult** The HRESULT of the failure. - - -### Microsoft.Windows.DirectToUpdate.DTUHandlerWaitForRebootUiSuccess - -This event indicates that the Handler WaitForRebootUi call succeeded. - -The following fields are available: - -- **CampaignID** ID of the campaign being run. -- **ClientID** ID of the client receiving the update. -- **CoordinatorVersion** Coordinator version of Direct to Update. -- **CV** Correlation vector. - - -## DxgKernelTelemetry events - -### DxgKrnlTelemetry.GPUAdapterInventoryV2 - -This event sends basic GPU and display driver information to keep Windows and display drivers up-to-date. - -The following fields are available: - -- **AdapterTypeValue** The numeric value indicating the type of Graphics adapter. -- **aiSeqId** The event sequence ID. -- **bootId** The system boot ID. -- **BrightnessVersionViaDDI** The version of the Display Brightness Interface. -- **ComputePreemptionLevel** The maximum preemption level supported by GPU for compute payload. -- **DedicatedSystemMemoryB** The amount of system memory dedicated for GPU use (in bytes). -- **DedicatedVideoMemoryB** The amount of dedicated VRAM of the GPU (in bytes). -- **DisplayAdapterLuid** The display adapter LUID. -- **DriverDate** The date of the display driver. -- **DriverRank** The rank of the display driver. -- **DriverVersion** The display driver version. -- **DX10UMDFilePath** The file path to the location of the DirectX 10 Display User Mode Driver in the Driver Store. -- **DX11UMDFilePath** The file path to the location of the DirectX 11 Display User Mode Driver in the Driver Store. -- **DX12UMDFilePath** The file path to the location of the DirectX 12 Display User Mode Driver in the Driver Store. -- **DX9UMDFilePath** The file path to the location of the DirectX 9 Display User Mode Driver in the Driver Store. -- **GPUDeviceID** The GPU device ID. -- **GPUPreemptionLevel** The maximum preemption level supported by GPU for graphics payload. -- **GPURevisionID** The GPU revision ID. -- **GPUVendorID** The GPU vendor ID. -- **InterfaceId** The GPU interface ID. -- **IsDisplayDevice** Does the GPU have displaying capabilities? -- **IsHwSchSupported** Indicates whether the adapter supports hardware scheduling. -- **IsHybridDiscrete** Does the GPU have discrete GPU capabilities in a hybrid device? -- **IsHybridIntegrated** Does the GPU have integrated GPU capabilities in a hybrid device? -- **IsLDA** Is the GPU comprised of Linked Display Adapters? -- **IsMiracastSupported** Does the GPU support Miracast? -- **IsMismatchLDA** Is at least one device in the Linked Display Adapters chain from a different vendor? -- **IsMPOSupported** Does the GPU support Multi-Plane Overlays? -- **IsMsMiracastSupported** Are the GPU Miracast capabilities driven by a Microsoft solution? -- **IsPostAdapter** Is this GPU the POST GPU in the device? -- **IsRemovable** TRUE if the adapter supports being disabled or removed. -- **IsRenderDevice** Does the GPU have rendering capabilities? -- **IsSoftwareDevice** Is this a software implementation of the GPU? -- **KMDFilePath** The file path to the location of the Display Kernel Mode Driver in the Driver Store. -- **MeasureEnabled** Is the device listening to MICROSOFT_KEYWORD_MEASURES? -- **MsHybridDiscrete** Indicates whether the adapter is a discrete adapter in a hybrid configuration. -- **NumVidPnSources** The number of supported display output sources. -- **NumVidPnTargets** The number of supported display output targets. -- **SharedSystemMemoryB** The amount of system memory shared by GPU and CPU (in bytes). -- **SubSystemID** The subsystem ID. -- **SubVendorID** The GPU sub vendor ID. -- **TelemetryEnabled** Is the device listening to MICROSOFT_KEYWORD_TELEMETRY? -- **TelInvEvntTrigger** What triggered this event to be logged? Example: 0 (GPU enumeration) or 1 (DxgKrnlTelemetry provider toggling) -- **version** The event version. -- **WDDMVersion** The Windows Display Driver Model version. - - -## Failover Clustering events - -### Microsoft.Windows.Server.FailoverClusteringCritical.ClusterSummary2 - -This event returns information about how many resources and of what type are in the server cluster. This data is collected to keep Windows Server safe, secure, and up to date. The data includes information about whether hardware is configured correctly, if the software is patched correctly, and assists in preventing crashes by attributing issues (like fatal errors) to workloads and system configurations. - -The following fields are available: - -- **autoAssignSite** The cluster parameter: auto site. -- **autoBalancerLevel** The cluster parameter: auto balancer level. -- **autoBalancerMode** The cluster parameter: auto balancer mode. -- **blockCacheSize** The configured size of the block cache. -- **ClusterAdConfiguration** The ad configuration of the cluster. -- **clusterAdType** The cluster parameter: mgmt_point_type. -- **clusterDumpPolicy** The cluster configured dump policy. -- **clusterFunctionalLevel** The current cluster functional level. -- **clusterGuid** The unique identifier for the cluster. -- **clusterWitnessType** The witness type the cluster is configured for. -- **countNodesInSite** The number of nodes in the cluster. -- **crossSiteDelay** The cluster parameter: CrossSiteDelay. -- **crossSiteThreshold** The cluster parameter: CrossSiteThreshold. -- **crossSubnetDelay** The cluster parameter: CrossSubnetDelay. -- **crossSubnetThreshold** The cluster parameter: CrossSubnetThreshold. -- **csvCompatibleFilters** The cluster parameter: ClusterCsvCompatibleFilters. -- **csvIncompatibleFilters** The cluster parameter: ClusterCsvIncompatibleFilters. -- **csvResourceCount** The number of resources in the cluster. -- **currentNodeSite** The name configured for the current site for the cluster. -- **dasModeBusType** The direct storage bus type of the storage spaces. -- **downLevelNodeCount** The number of nodes in the cluster that are running down-level. -- **drainOnShutdown** Specifies whether a node should be drained when it is shut down. -- **dynamicQuorumEnabled** Specifies whether dynamic Quorum has been enabled. -- **enforcedAntiAffinity** The cluster parameter: enforced anti affinity. -- **genAppNames** The win32 service name of a clustered service. -- **genSvcNames** The command line of a clustered genapp. -- **hangRecoveryAction** The cluster parameter: hang recovery action. -- **hangTimeOut** Specifies the “hang time out” parameter for the cluster. -- **isCalabria** Specifies whether storage spaces direct is enabled. -- **isMixedMode** Identifies if the cluster is running with different version of OS for nodes. -- **isRunningDownLevel** Identifies if the current node is running down-level. -- **logLevel** Specifies the granularity that is logged in the cluster log. -- **logSize** Specifies the size of the cluster log. -- **lowerQuorumPriorityNodeId** The cluster parameter: lower quorum priority node ID. -- **minNeverPreempt** The cluster parameter: minimum never preempt. -- **minPreemptor** The cluster parameter: minimum preemptor priority. -- **netftIpsecEnabled** The parameter: netftIpsecEnabled. -- **NodeCount** The number of nodes in the cluster. -- **nodeId** The current node number in the cluster. -- **nodeResourceCounts** Specifies the number of node resources. -- **nodeResourceOnlineCounts** Specifies the number of node resources that are online. -- **numberOfSites** The number of different sites. -- **numNodesInNoSite** The number of nodes not belonging to a site. -- **plumbAllCrossSubnetRoutes** The cluster parameter: plumb all cross subnet routes. -- **preferredSite** The preferred site location. -- **privateCloudWitness** Specifies whether a private cloud witness exists for this cluster. -- **quarantineDuration** The quarantine duration. -- **quarantineThreshold** The quarantine threshold. -- **quorumArbitrationTimeout** In the event of an arbitration event, this specifies the quorum timeout period. -- **resiliencyLevel** Specifies the level of resiliency. -- **resourceCounts** Specifies the number of resources. -- **resourceTypeCounts** Specifies the number of resource types in the cluster. -- **resourceTypes** Data representative of each resource type. -- **resourceTypesPath** Data representative of the DLL path for each resource type. -- **sameSubnetDelay** The cluster parameter: same subnet delay. -- **sameSubnetThreshold** The cluster parameter: same subnet threshold. -- **secondsInMixedMode** The amount of time (in seconds) that the cluster has been in mixed mode (nodes with different operating system versions in the same cluster). -- **securityLevel** The cluster parameter: security level. -- **securityLevelForStorage** The cluster parameter: security level for storage. -- **sharedVolumeBlockCacheSize** Specifies the block cache size for shared for shared volumes. -- **shutdownTimeoutMinutes** Specifies the amount of time it takes to time out when shutting down. -- **upNodeCount** Specifies the number of nodes that are up (online). -- **useClientAccessNetworksForCsv** The cluster parameter: use client access networks for CSV. -- **vmIsolationTime** The cluster parameter: VM isolation time. -- **witnessDatabaseWriteTimeout** Specifies the timeout period for writing to the quorum witness database. - - -## Fault Reporting events - -### Microsoft.Windows.FaultReporting.AppCrashEvent - -This event sends data about crashes for both native and managed applications, to help keep Windows up to date. The data includes information about the crashing process and a summary of its exception record. It does not contain any Watson bucketing information. The bucketing information is recorded in a Windows Error Reporting (WER) event that is generated when the WER client reports the crash to the Watson service, and the WER event will contain the same ReportID (see field 14 of crash event, field 19 of WER event) as the crash event for the crash being reported. AppCrash is emitted once for each crash handled by WER (e.g. from an unhandled exception or FailFast or ReportException). Note that Generic Watson event types (e.g. from PLM) that may be considered crashes\" by a user DO NOT emit this event. - -The following fields are available: - -- **AppName** The name of the app that has crashed. -- **AppSessionGuid** GUID made up of process ID and is used as a correlation vector for process instances in the telemetry backend. -- **AppTimeStamp** The date/time stamp of the app. -- **AppVersion** The version of the app that has crashed. -- **ExceptionCode** The exception code returned by the process that has crashed. -- **ExceptionOffset** The address where the exception had occurred. -- **Flags** Flags indicating how reporting is done. For example, queue the report, do not offer JIT debugging, or do not terminate the process after reporting. -- **FriendlyAppName** The description of the app that has crashed, if different from the AppName. Otherwise, the process name. -- **IsFatal** True/False to indicate whether the crash resulted in process termination. -- **ModName** Exception module name (e.g. bar.dll). -- **ModTimeStamp** The date/time stamp of the module. -- **ModVersion** The version of the module that has crashed. -- **PackageFullName** Store application identity. -- **PackageRelativeAppId** Store application identity. -- **ProcessArchitecture** Architecture of the crashing process, as one of the PROCESSOR_ARCHITECTURE_* constants: 0: PROCESSOR_ARCHITECTURE_INTEL. 5: PROCESSOR_ARCHITECTURE_ARM. 9: PROCESSOR_ARCHITECTURE_AMD64. 12: PROCESSOR_ARCHITECTURE_ARM64. -- **ProcessCreateTime** The time of creation of the process that has crashed. -- **ProcessId** The ID of the process that has crashed. -- **ReportId** A GUID used to identify the report. This can used to track the report across Watson. -- **TargetAppId** The kernel reported AppId of the application being reported. -- **TargetAppVer** The specific version of the application being reported -- **TargetAsId** The sequence number for the hanging process. - - -## Feature update events - -### Microsoft.Windows.Upgrade.Uninstall.UninstallFinalizedAndRebootTriggered - -This event indicates that the uninstall was properly configured and that a system reboot was initiated. - - - -### Microsoft.Windows.Upgrade.Uninstall.UninstallGoBackButtonClicked - -This event sends basic metadata about the starting point of uninstalling a feature update, which helps ensure customers can safely revert to a well-known state if the update caused any problems. - - - -## Hang Reporting events - -### Microsoft.Windows.HangReporting.AppHangEvent - -This event sends data about hangs for both native and managed applications, to help keep Windows up to date. It does not contain any Watson bucketing information. The bucketing information is recorded in a Windows Error Reporting (WER) event that is generated when the WER client reports the hang to the Watson service, and the WER event will contain the same ReportID (see field 13 of hang event, field 19 of WER event) as the hang event for the hang being reported. AppHang is reported only on PC devices. It handles classic Win32 hangs and is emitted only once per report. Some behaviors that may be perceived by a user as a hang are reported by app managers (e.g. PLM/RM/EM) as Watson Generics and will not produce AppHang events. - -The following fields are available: - -- **AppName** The name of the app that has hung. -- **AppSessionGuid** GUID made up of process id used as a correlation vector for process instances in the telemetry backend. -- **AppVersion** The version of the app that has hung. -- **IsFatal** True/False based on whether the hung application caused the creation of a Fatal Hang Report. -- **PackageFullName** Store application identity. -- **PackageRelativeAppId** Store application identity. -- **ProcessArchitecture** Architecture of the hung process, as one of the PROCESSOR_ARCHITECTURE_* constants: 0: PROCESSOR_ARCHITECTURE_INTEL. 5: PROCESSOR_ARCHITECTURE_ARM. 9: PROCESSOR_ARCHITECTURE_AMD64. 12: PROCESSOR_ARCHITECTURE_ARM64. -- **ProcessCreateTime** The time of creation of the process that has hung. -- **ProcessId** The ID of the process that has hung. -- **ReportId** A GUID used to identify the report. This can used to track the report across Watson. -- **TargetAppId** The kernel reported AppId of the application being reported. -- **TargetAppVer** The specific version of the application being reported. -- **TargetAsId** The sequence number for the hanging process. -- **TypeCode** Bitmap describing the hang type. -- **WaitingOnAppName** If this is a cross process hang waiting for an application, this has the name of the application. -- **WaitingOnAppVersion** If this is a cross process hang, this has the version of the application for which it is waiting. -- **WaitingOnPackageFullName** If this is a cross process hang waiting for a package, this has the full name of the package for which it is waiting. -- **WaitingOnPackageRelativeAppId** If this is a cross process hang waiting for a package, this has the relative application id of the package. - - -## Inventory events - -### Microsoft.Windows.Inventory.Core.AmiTelCacheChecksum - -This event captures basic checksum data about the device inventory items stored in the cache for use in validating data completeness for Microsoft.Windows.Inventory.Core events. The fields in this event may change over time, but they will always represent a count of a given object. - -The following fields are available: - -- **Device** A count of device objects in cache. -- **DeviceCensus** A count of device census objects in cache. -- **DriverPackageExtended** A count of driverpackageextended objects in cache. -- **File** A count of file objects in cache. -- **FileSigningInfo** A count of file signing objects in cache. -- **Generic** A count of generic objects in cache. -- **HwItem** A count of hwitem objects in cache. -- **InventoryApplication** A count of application objects in cache. -- **InventoryApplicationAppV** A count of application AppV objects in cache. -- **InventoryApplicationDriver** A count of application driver objects in cache -- **InventoryApplicationFile** A count of application file objects in cache. -- **InventoryApplicationFramework** A count of application framework objects in cache -- **InventoryApplicationShortcut** A count of application shortcut objects in cache -- **InventoryDeviceContainer** A count of device container objects in cache. -- **InventoryDeviceInterface** A count of Plug and Play device interface objects in cache. -- **InventoryDeviceMediaClass** A count of device media objects in cache. -- **InventoryDevicePnp** A count of device Plug and Play objects in cache. -- **InventoryDeviceUsbHubClass** A count of device usb objects in cache -- **InventoryDriverBinary** A count of driver binary objects in cache. -- **InventoryDriverPackage** A count of device objects in cache. -- **InventoryMiscellaneousOfficeAddIn** A count of office add-in objects in cache -- **InventoryMiscellaneousOfficeAddInUsage** A count of office add-in usage objects in cache. -- **InventoryMiscellaneousOfficeIdentifiers** A count of office identifier objects in cache -- **InventoryMiscellaneousOfficeIESettings** A count of office ie settings objects in cache -- **InventoryMiscellaneousOfficeInsights** A count of office insights objects in cache -- **InventoryMiscellaneousOfficeProducts** A count of office products objects in cache -- **InventoryMiscellaneousOfficeSettings** A count of office settings objects in cache -- **InventoryMiscellaneousOfficeVBA** A count of office vba objects in cache -- **InventoryMiscellaneousOfficeVBARuleViolations** A count of office vba rule violations objects in cache -- **InventoryMiscellaneousUUPInfo** A count of uup info objects in cache -- **Metadata** A count of metadata objects in cache. -- **Orphan** A count of orphan file objects in cache. -- **Programs** A count of program objects in cache. - - -### Microsoft.Windows.Inventory.Core.AmiTelCacheFileInfo - -Diagnostic data about the inventory cache. - -The following fields are available: - -- **CacheFileSize** Size of the cache. -- **InventoryVersion** Inventory version of the cache. -- **TempCacheCount** Number of temp caches created. -- **TempCacheDeletedCount** Number of temp caches deleted. - - -### Microsoft.Windows.Inventory.Core.AmiTelCacheVersions - -This event sends inventory component versions for the Device Inventory data. - -The following fields are available: - -- **aeinv** The version of the App inventory component. -- **devinv** The file version of the Device inventory component. - - -### Microsoft.Windows.Inventory.Core.InventoryApplicationAdd - -This event sends basic metadata about an application on the system to help keep Windows up to date. - -This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedeviceinventorychange). - -The following fields are available: - -- **HiddenArp** Indicates whether a program hides itself from showing up in ARP. -- **InstallDate** The date the application was installed (a best guess based on folder creation date heuristics). -- **InstallDateArpLastModified** The date of the registry ARP key for a given application. Hints at install date but not always accurate. Passed as an array. Example: 4/11/2015 00:00:00 -- **InstallDateFromLinkFile** The estimated date of install based on the links to the files. Passed as an array. -- **InstallDateMsi** The install date if the application was installed via Microsoft Installer (MSI). Passed as an array. -- **InventoryVersion** The version of the inventory file generating the events. -- **Language** The language code of the program. -- **MsiPackageCode** A GUID that describes the MSI Package. Multiple 'Products' (apps) can make up an MsiPackage. -- **MsiProductCode** A GUID that describe the MSI Product. -- **Name** The name of the application. -- **OSVersionAtInstallTime** The four octets from the OS version at the time of the application's install. -- **PackageFullName** The package full name for a Store application. -- **ProgramInstanceId** A hash of the file IDs in an app. -- **Publisher** The Publisher of the application. Location pulled from depends on the 'Source' field. -- **RootDirPath** The path to the root directory where the program was installed. -- **Source** How the program was installed (for example, ARP, MSI, Appx). -- **StoreAppType** A sub-classification for the type of Microsoft Store app, such as UWP or Win8StoreApp. -- **Type** One of ("Application", "Hotfix", "BOE", "Service", "Unknown"). Application indicates Win32 or Appx app, Hotfix indicates app updates (KBs), BOE indicates it's an app with no ARP or MSI entry, Service indicates that it is a service. Application and BOE are the ones most likely seen. -- **Version** The version number of the program. - - -### Microsoft.Windows.Inventory.Core.InventoryApplicationDriverAdd - -This event represents what drivers an application installs. - -This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedeviceinventorychange). - -The following fields are available: - -- **InventoryVersion** The version of the inventory component. -- **ProgramIds** The unique program identifier the driver is associated with. - - -### Microsoft.Windows.Inventory.Core.InventoryApplicationDriverStartSync - -The InventoryApplicationDriverStartSync event indicates that a new set of InventoryApplicationDriverStartAdd events will be sent. - -This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedeviceinventorychange). - -The following fields are available: - -- **InventoryVersion** The version of the inventory component. - - -### Microsoft.Windows.Inventory.Core.InventoryApplicationFrameworkAdd - -This event provides the basic metadata about the frameworks an application may depend on. - -This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedeviceinventorychange). - -The following fields are available: - -- **FileId** A hash that uniquely identifies a file. -- **Frameworks** The list of frameworks this file depends on. -- **InventoryVersion** The version of the inventory file generating the events. - - -### Microsoft.Windows.Inventory.Core.InventoryApplicationFrameworkStartSync - -This event indicates that a new set of InventoryApplicationFrameworkAdd events will be sent. - -This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedeviceinventorychange). - -The following fields are available: - -- **InventoryVersion** The version of the inventory file generating the events. - - -### Microsoft.Windows.Inventory.Core.InventoryApplicationRemove - -This event indicates that a new set of InventoryDevicePnpAdd events will be sent. - -This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedeviceinventorychange). - -The following fields are available: - -- **InventoryVersion** The version of the inventory file generating the events. - - -### Microsoft.Windows.Inventory.Core.InventoryApplicationStartSync - -This event indicates that a new set of InventoryApplicationAdd events will be sent. - -This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedeviceinventorychange). - -The following fields are available: - -- **InventoryVersion** The version of the inventory file generating the events. - - -### Microsoft.Windows.Inventory.Core.InventoryDeviceContainerAdd - -This event sends basic metadata about a device container (such as a monitor or printer as opposed to a Plug and Play device) to help keep Windows up to date. - -This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedeviceinventorychange). - -The following fields are available: - -- **Categories** A comma separated list of functional categories in which the container belongs. -- **DiscoveryMethod** The discovery method for the device container. -- **FriendlyName** The name of the device container. -- **InventoryVersion** The version of the inventory file generating the events. -- **IsActive** Is the device connected, or has it been seen in the last 14 days? -- **IsConnected** For a physically attached device, this value is the same as IsPresent. For wireless a device, this value represents a communication link. -- **IsMachineContainer** Is the container the root device itself? -- **IsNetworked** Is this a networked device? -- **IsPaired** Does the device container require pairing? -- **Manufacturer** The manufacturer name for the device container. -- **ModelId** A unique model ID. -- **ModelName** The model name. -- **ModelNumber** The model number for the device container. -- **PrimaryCategory** The primary category for the device container. - - -### Microsoft.Windows.Inventory.Core.InventoryDeviceContainerRemove - -This event indicates that the InventoryDeviceContainer object is no longer present. - -This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedeviceinventorychange). - -The following fields are available: - -- **InventoryVersion** The version of the inventory file generating the events. - - -### Microsoft.Windows.Inventory.Core.InventoryDeviceContainerStartSync - -This event indicates that a new set of InventoryDeviceContainerAdd events will be sent. - -This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedeviceinventorychange). - -The following fields are available: - -- **InventoryVersion** The version of the inventory file generating the events. - - -### Microsoft.Windows.Inventory.Core.InventoryDeviceInterfaceAdd - -This event retrieves information about what sensor interfaces are available on the device. - -This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedeviceinventorychange). - -The following fields are available: - -- **Accelerometer3D** Indicates if an Accelerator3D sensor is found. -- **ActivityDetection** Indicates if an Activity Detection sensor is found. -- **AmbientLight** Indicates if an Ambient Light sensor is found. -- **Barometer** Indicates if a Barometer sensor is found. -- **Custom** Indicates if a Custom sensor is found. -- **EnergyMeter** Indicates if an Energy sensor is found. -- **FloorElevation** Indicates if a Floor Elevation sensor is found. -- **GeomagneticOrientation** Indicates if a Geo Magnetic Orientation sensor is found. -- **GravityVector** Indicates if a Gravity Detector sensor is found. -- **Gyrometer3D** Indicates if a Gyrometer3D sensor is found. -- **Humidity** Indicates if a Humidity sensor is found. -- **InventoryVersion** The version of the inventory file generating the events. -- **LinearAccelerometer** Indicates if a Linear Accelerometer sensor is found. -- **Magnetometer3D** Indicates if a Magnetometer3D sensor is found. -- **Orientation** Indicates if an Orientation sensor is found. -- **Pedometer** Indicates if a Pedometer sensor is found. -- **Proximity** Indicates if a Proximity sensor is found. -- **RelativeOrientation** Indicates if a Relative Orientation sensor is found. -- **SimpleDeviceOrientation** Indicates if a Simple Device Orientation sensor is found. -- **Temperature** Indicates if a Temperature sensor is found. - - -### Microsoft.Windows.Inventory.Core.InventoryDeviceInterfaceStartSync - -This event indicates that a new set of InventoryDeviceInterfaceAdd events will be sent. - -This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedeviceinventorychange). - -The following fields are available: - -- **InventoryVersion** The version of the inventory file generating the events. - - -### Microsoft.Windows.Inventory.Core.InventoryDeviceMediaClassAdd - -This event sends additional metadata about a Plug and Play device that is specific to a particular class of devices to help keep Windows up to date while reducing overall size of data payload. - -This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedeviceinventorychange). - -The following fields are available: - -- **audio.captureDriver** Audio device capture driver. Example: hdaudio.inf:db04a16ce4e8d6ee:HdAudModel:10.0.14887.1000:hdaudio\func_01 -- **audio.renderDriver** Audio device render driver. Example: hdaudio.inf:db04a16ce4e8d6ee:HdAudModel:10.0.14889.1001:hdaudio\func_01 -- **Audio_CaptureDriver** The Audio device capture driver endpoint. -- **Audio_RenderDriver** The Audio device render driver endpoint. -- **InventoryVersion** The version of the inventory file generating the events. - - -### Microsoft.Windows.Inventory.Core.InventoryDeviceMediaClassRemove - -This event indicates that the InventoryDeviceMediaClassRemove object is no longer present. - -This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedeviceinventorychange). - -The following fields are available: - -- **InventoryVersion** The version of the inventory file generating the events. - - -### Microsoft.Windows.Inventory.Core.InventoryDeviceMediaClassStartSync - -This event indicates that a new set of InventoryDeviceMediaClassSAdd events will be sent. - -This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedeviceinventorychange). - -The following fields are available: - -- **InventoryVersion** The version of the inventory file generating the events. - - -### Microsoft.Windows.Inventory.Core.InventoryDevicePnpAdd - -This event represents the basic metadata about a plug and play (PNP) device and its associated driver. - -This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedeviceinventorychange). - -The following fields are available: - -- **BusReportedDescription** The description of the device reported by the bux. -- **Class** The device setup class of the driver loaded for the device. -- **ClassGuid** The device class unique identifier of the driver package loaded on the device. -- **COMPID** The list of “Compatible IDs” for this device. -- **ContainerId** The system-supplied unique identifier that specifies which group(s) the device(s) installed on the parent (main) device belong to. -- **Description** The description of the device. -- **DeviceInterfaceClasses** The device interfaces that this device implements. -- **DeviceState** Identifies the current state of the parent (main) device. -- **DriverId** The unique identifier for the installed driver. -- **DriverName** The name of the driver image file. -- **DriverPackageStrongName** The immediate parent directory name in the Directory field of InventoryDriverPackage. -- **DriverVerDate** The date associated with the driver installed on the device. -- **DriverVerVersion** The version number of the driver installed on the device. -- **Enumerator** Identifies the bus that enumerated the device. -- **ExtendedInfs** The extended INF file names. -- **HWID** A list of hardware IDs for the device. -- **Inf** The name of the INF file (possibly renamed by the OS, such as oemXX.inf). -- **InstallState** The device installation state. For a list of values, see: https://msdn.microsoft.com/en-us/library/windows/hardware/ff543130.aspx -- **InventoryVersion** The version number of the inventory process generating the events. -- **LowerClassFilters** The identifiers of the Lower Class filters installed for the device. -- **LowerFilters** The identifiers of the Lower filters installed for the device. -- **Manufacturer** The manufacturer of the device. -- **MatchingID** The Hardware ID or Compatible ID that Windows uses to install a device instance. -- **Model** Identifies the model of the device. -- **ParentId** The Device Instance ID of the parent of the device. -- **ProblemCode** The error code currently returned by the device, if applicable. -- **Provider** Identifies the device provider. -- **Service** The name of the device service. -- **STACKID** The list of hardware IDs for the stack. -- **UpperClassFilters** The identifiers of the Upper Class filters installed for the device. -- **UpperFilters** The identifiers of the Upper filters installed for the device. - - -### Microsoft.Windows.Inventory.Core.InventoryDevicePnpRemove - -This event indicates that the InventoryDevicePnpRemove object is no longer present. - -This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedeviceinventorychange). - -The following fields are available: - -- **InventoryVersion** The version of the inventory file generating the events. - - -### Microsoft.Windows.Inventory.Core.InventoryDevicePnpStartSync - -This event indicates that a new set of InventoryDevicePnpAdd events will be sent. - -This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedeviceinventorychange). - -The following fields are available: - -- **InventoryVersion** The version of the inventory file generating the events. - - -### Microsoft.Windows.Inventory.Core.InventoryDeviceUsbHubClassAdd - -This event sends basic metadata about the USB hubs on the device. - -This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedeviceinventorychange). - -The following fields are available: - -- **InventoryVersion** The version of the inventory file generating the events. -- **TotalUserConnectablePorts** Total number of connectable USB ports. -- **TotalUserConnectableTypeCPorts** Total number of connectable USB Type C ports. - - -### Microsoft.Windows.Inventory.Core.InventoryDeviceUsbHubClassStartSync - -This event indicates that a new set of InventoryDeviceUsbHubClassAdd events will be sent. - - -The following fields are available: - -- **InventoryVersion** The version of the inventory file generating the events. - - -### Microsoft.Windows.Inventory.Core.InventoryDriverBinaryAdd - -This event provides the basic metadata about driver binaries running on the system. - -This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedeviceinventorychange). - -The following fields are available: - -- **DriverCheckSum** The checksum of the driver file. -- **DriverCompany** The company name that developed the driver. -- **DriverInBox** Is the driver included with the operating system? -- **DriverIsKernelMode** Is it a kernel mode driver? -- **DriverName** The file name of the driver. -- **DriverPackageStrongName** The strong name of the driver package -- **DriverSigned** The strong name of the driver package -- **DriverTimeStamp** The low 32 bits of the time stamp of the driver file. -- **DriverType** A bitfield of driver attributes: 1. define DRIVER_MAP_DRIVER_TYPE_PRINTER 0x0001. 2. define DRIVER_MAP_DRIVER_TYPE_KERNEL 0x0002. 3. define DRIVER_MAP_DRIVER_TYPE_USER 0x0004. 4. define DRIVER_MAP_DRIVER_IS_SIGNED 0x0008. 5. define DRIVER_MAP_DRIVER_IS_INBOX 0x0010. 6. define DRIVER_MAP_DRIVER_IS_WINQUAL 0x0040. 7. define DRIVER_MAP_DRIVER_IS_SELF_SIGNED 0x0020. 8. define DRIVER_MAP_DRIVER_IS_CI_SIGNED 0x0080. 9. define DRIVER_MAP_DRIVER_HAS_BOOT_SERVICE 0x0100. 10. define DRIVER_MAP_DRIVER_TYPE_I386 0x10000. 11. define DRIVER_MAP_DRIVER_TYPE_IA64 0x20000. 12. define DRIVER_MAP_DRIVER_TYPE_AMD64 0x40000. 13. define DRIVER_MAP_DRIVER_TYPE_ARM 0x100000. 14. define DRIVER_MAP_DRIVER_TYPE_THUMB 0x200000. 15. define DRIVER_MAP_DRIVER_TYPE_ARMNT 0x400000. 16. define DRIVER_MAP_DRIVER_IS_TIME_STAMPED 0x800000. -- **DriverVersion** The version of the driver file. -- **ImageSize** The size of the driver file. -- **Inf** The name of the INF file. -- **InventoryVersion** The version of the inventory file generating the events. -- **Product** The product name that is included in the driver file. -- **ProductVersion** The product version that is included in the driver file. -- **Service** The name of the service that is installed for the device. -- **WdfVersion** The Windows Driver Framework version. - - -### Microsoft.Windows.Inventory.Core.InventoryDriverBinaryRemove - -This event indicates that the InventoryDriverBinary object is no longer present. - -This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedeviceinventorychange). - -The following fields are available: - -- **InventoryVersion** The version of the inventory file generating the events. - - -### Microsoft.Windows.Inventory.Core.InventoryDriverBinaryStartSync - -This event indicates that a new set of InventoryDriverBinaryAdd events will be sent. - -This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedeviceinventorychange). - -The following fields are available: - -- **InventoryVersion** The version of the inventory file generating the events. - - -### Microsoft.Windows.Inventory.Core.InventoryDriverPackageAdd - -This event sends basic metadata about drive packages installed on the system to help keep Windows up to date. - -This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedeviceinventorychange). - -The following fields are available: - -- **Class** The class name for the device driver. -- **ClassGuid** The class GUID for the device driver. -- **Date** The driver package date. -- **Directory** The path to the driver package. -- **DriverInBox** Is the driver included with the operating system? -- **Inf** The INF name of the driver package. -- **InventoryVersion** The version of the inventory file generating the events. -- **Provider** The provider for the driver package. -- **SubmissionId** The HLK submission ID for the driver package. -- **Version** The version of the driver package. - - -### Microsoft.Windows.Inventory.Core.InventoryDriverPackageRemove - -This event indicates that the InventoryDriverPackageRemove object is no longer present. - -This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedeviceinventorychange). - -The following fields are available: - -- **InventoryVersion** The version of the inventory file generating the events. - - -### Microsoft.Windows.Inventory.Core.InventoryDriverPackageStartSync - -This event indicates that a new set of InventoryDriverPackageAdd events will be sent. - -This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedeviceinventorychange). - -The following fields are available: - -- **InventoryVersion** The version of the inventory file generating the events. - - -### Microsoft.Windows.Inventory.Core.StartUtcJsonTrace - -This event collects traces of all other Core events, not used in typical customer scenarios. This event signals the beginning of the event download, and that tracing should begin. - - - -### Microsoft.Windows.Inventory.Core.StopUtcJsonTrace - -This event collects traces of all other Core events, not used in typical customer scenarios. This event signals the end of the event download, and that tracing should end. - - - -### Microsoft.Windows.Inventory.General.AppHealthStaticAdd - -This event sends details collected for a specific application on the source device. - -The following fields are available: - -- **AhaVersion** The binary version of the App Health Analyzer tool. -- **ApplicationErrors** The count of application errors from the event log. -- **Bitness** The architecture type of the application (16 Bit or 32 bit or 64 bit). -- **device_level** Various JRE/JAVA versions installed on a particular device. -- **ExtendedProperties** Attribute used for aggregating all other attributes under this event type. -- **Jar** Flag to determine if an app has a Java JAR file dependency. -- **Jre** Flag to determine if an app has JRE framework dependency. -- **Jre_version** JRE versions an app has declared framework dependency for. -- **Name** Name of the application. -- **NonDPIAware** Flag to determine if an app is non-DPI aware. -- **NumBinaries** Count of all binaries (.sys,.dll,.ini) from application install location. -- **RequiresAdmin** Flag to determine if an app requests admin privileges for execution. -- **RequiresAdminv2** Additional flag to determine if an app requests admin privileges for execution. -- **RequiresUIAccess** Flag to determine if an app is based on UI features for accessibility. -- **VB6** Flag to determine if an app is based on VB6 framework. -- **VB6v2** Additional flag to determine if an app is based on VB6 framework. -- **Version** Version of the application. -- **VersionCheck** Flag to determine if an app has a static dependency on OS version. -- **VersionCheckv2** Additional flag to determine if an app has a static dependency on OS version. - - -### Microsoft.Windows.Inventory.General.AppHealthStaticStartSync - -This event indicates the beginning of a series of AppHealthStaticAdd events. - -The following fields are available: - -- **AllowTelemetry** Indicates the presence of the 'allowtelemetry' command line argument. -- **CommandLineArgs** Command line arguments passed when launching the App Health Analyzer executable. -- **Enhanced** Indicates the presence of the 'enhanced' command line argument. -- **StartTime** UTC date and time at which this event was sent. - - -### Microsoft.Windows.Inventory.General.InventoryMiscellaneousOfficeAddInAdd - -Provides data on the installed Office Add-ins. - -This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedeviceinventorychange). - -The following fields are available: - -- **AddinCLSID** The class identifier key for the Microsoft Office add-in. -- **AddInCLSID** The class identifier key for the Microsoft Office add-in. -- **AddInId** The identifier for the Microsoft Office add-in. -- **AddinType** The type of the Microsoft Office add-in. -- **BinFileTimestamp** The timestamp of the Office add-in. -- **BinFileVersion** The version of the Microsoft Office add-in. -- **Description** Description of the Microsoft Office add-in. -- **FileId** The file identifier of the Microsoft Office add-in. -- **FileSize** The file size of the Microsoft Office add-in. -- **FriendlyName** The friendly name for the Microsoft Office add-in. -- **FullPath** The full path to the Microsoft Office add-in. -- **InventoryVersion** The version of the inventory binary generating the events. -- **LoadBehavior** Integer that describes the load behavior. -- **LoadTime** Load time for the Office add-in. -- **OfficeApplication** The Microsoft Office application associated with the add-in. -- **OfficeArchitecture** The architecture of the add-in. -- **OfficeVersion** The Microsoft Office version for this add-in. -- **OutlookCrashingAddin** Indicates whether crashes have been found for this add-in. -- **ProductCompany** The name of the company associated with the Office add-in. -- **ProductName** The product name associated with the Microsoft Office add-in. -- **ProductVersion** The version associated with the Office add-in. -- **ProgramId** The unique program identifier of the Microsoft Office add-in. -- **Provider** Name of the provider for this add-in. - - -### Microsoft.Windows.Inventory.General.InventoryMiscellaneousOfficeAddInRemove - -Indicates that this particular data object represented by the objectInstanceId is no longer present. - -This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedeviceinventorychange). - -The following fields are available: - -- **InventoryVersion** The version of the inventory binary generating the events. - - -### Microsoft.Windows.Inventory.General.InventoryMiscellaneousOfficeAddInStartSync - -This event indicates that a new sync is being generated for this object type. - -This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedeviceinventorychange). - -The following fields are available: - -- **InventoryVersion** The version of the inventory binary generating the events. - - -### Microsoft.Windows.Inventory.General.InventoryMiscellaneousOfficeIdentifiersAdd - -Provides data on the Office identifiers. - -This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedeviceinventorychange). - -The following fields are available: - -- **InventoryVersion** The version of the inventory binary generating the events. -- **OAudienceData** Sub-identifier for Microsoft Office release management, identifying the pilot group for a device -- **OAudienceId** Microsoft Office identifier for Microsoft Office release management, identifying the pilot group for a device -- **OMID** Identifier for the Office SQM Machine -- **OPlatform** Whether the installed Microsoft Office product is 32-bit or 64-bit -- **OTenantId** Unique GUID representing the Microsoft O365 Tenant -- **OVersion** Installed version of Microsoft Office. For example, 16.0.8602.1000 -- **OWowMID** Legacy Microsoft Office telemetry identifier (SQM Machine ID) for WoW systems (32-bit Microsoft Office on 64-bit Windows) - - -### Microsoft.Windows.Inventory.General.InventoryMiscellaneousOfficeIdentifiersStartSync - -Diagnostic event to indicate a new sync is being generated for this object type. - -This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedeviceinventorychange). - -The following fields are available: - -- **InventoryVersion** The version of the inventory binary generating the events. - - -### Microsoft.Windows.Inventory.General.InventoryMiscellaneousOfficeIESettingsAdd - -Provides data on Office-related Internet Explorer features. - -This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedeviceinventorychange). - -The following fields are available: - -- **InventoryVersion** The version of the inventory binary generating the events. -- **OIeFeatureAddon** Flag indicating which Microsoft Office products have this setting enabled. The FEATURE_ADDON_MANAGEMENT feature lets applications hosting the WebBrowser Control to respect add-on management selections made using the Add-on Manager feature of Internet Explorer. Add-ons disabled by the user or by administrative group policy will also be disabled in applications that enable this feature. -- **OIeMachineLockdown** Flag indicating which Microsoft Office products have this setting enabled. When the FEATURE_LOCALMACHINE_LOCKDOWN feature is enabled, Internet Explorer applies security restrictions on content loaded from the user's local machine, which helps prevent malicious behavior involving local files. -- **OIeMimeHandling** Flag indicating which Microsoft Office products have this setting enabled. When the FEATURE_MIME_HANDLING feature control is enabled, Internet Explorer handles MIME types more securely. Only applies to Windows Internet Explorer 6 for Windows XP Service Pack 2 (SP2) -- **OIeMimeSniffing** Flag indicating which Microsoft Office products have this setting enabled. Determines a file's type by examining its bit signature. Windows Internet Explorer uses this information to determine how to render the file. The FEATURE_MIME_SNIFFING feature, when enabled, allows to be set differently for each security zone by using the URLACTION_FEATURE_MIME_SNIFFING URL action flag -- **OIeNoAxInstall** Flag indicating which Microsoft Office products have this setting enabled. When a webpage attempts to load or install an ActiveX control that isn't already installed, the FEATURE_RESTRICT_ACTIVEXINSTALL feature blocks the request. When a webpage tries to load or install an ActiveX control that isn't already installed, the FEATURE_RESTRICT_ACTIVEXINSTALL feature blocks the request -- **OIeNoDownload** Flag indicating which Microsoft Office products have this setting enabled. The FEATURE_RESTRICT_FILEDOWNLOAD feature blocks file download requests that navigate to a resource, that display a file download dialog box, or that are not initiated explicitly by a user action (for example, a mouse click or key press). Only applies to Windows Internet Explorer 6 for Windows XP Service Pack 2 (SP2) -- **OIeObjectCaching** Flag indicating which Microsoft Office products have this setting enabled. When enabled, the FEATURE_OBJECT_CACHING feature prevents webpages from accessing or instantiating ActiveX controls cached from different domains or security contexts -- **OIePasswordDisable** Flag indicating which Microsoft Office products have this setting enabled. After Windows Internet Explorer 6 for Windows XP Service Pack 2 (SP2), Internet Explorer no longer allows usernames and passwords to be specified in URLs that use the HTTP or HTTPS protocols. URLs using other protocols, such as FTP, still allow usernames and passwords -- **OIeSafeBind** Flag indicating which Microsoft Office products have this setting enabled. The FEATURE_SAFE_BINDTOOBJECT feature performs additional safety checks when calling MonikerBindToObject to create and initialize Microsoft ActiveX controls. Specifically, prevent the control from being created if COMPAT_EVIL_DONT_LOAD is in the registry for the control -- **OIeSecurityBand** Flag indicating which Microsoft Office products have this setting enabled. The FEATURE_SECURITYBAND feature controls the display of the Internet Explorer Information bar. When enabled, the Information bar appears when file download or code installation is restricted -- **OIeUncSaveCheck** Flag indicating which Microsoft Office products have this setting enabled. The FEATURE_UNC_SAVEDFILECHECK feature enables the Mark of the Web (MOTW) for local files loaded from network locations that have been shared by using the Universal Naming Convention (UNC) -- **OIeValidateUrl** Flag indicating which Microsoft Office products have this setting enabled. When enabled, the FEATURE_VALIDATE_NAVIGATE_URL feature control prevents Windows Internet Explorer from navigating to a badly formed URL -- **OIeWebOcPopup** Flag indicating which Microsoft Office products have this setting enabled. The FEATURE_WEBOC_POPUPMANAGEMENT feature allows applications hosting the WebBrowser Control to receive the default Internet Explorer pop-up window management behavior -- **OIeWinRestrict** Flag indicating which Microsoft Office products have this setting enabled. When enabled, the FEATURE_WINDOW_RESTRICTIONS feature adds several restrictions to the size and behavior of popup windows -- **OIeZoneElevate** Flag indicating which Microsoft Office products have this setting enabled. When enabled, the FEATURE_ZONE_ELEVATION feature prevents pages in one zone from navigating to pages in a higher security zone unless the navigation is generated by the user - - -### Microsoft.Windows.Inventory.General.InventoryMiscellaneousOfficeIESettingsStartSync - -Diagnostic event to indicate a new sync is being generated for this object type. - -This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedeviceinventorychange). - -The following fields are available: - -- **InventoryVersion** The version of the inventory binary generating the events. - - -### Microsoft.Windows.Inventory.General.InventoryMiscellaneousOfficeInsightsAdd - -This event provides insight data on the installed Office products - -This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedeviceinventorychange). - -The following fields are available: - -- **InventoryVersion** The version of the inventory binary generating the events. -- **OfficeApplication** The name of the Office application. -- **OfficeArchitecture** The bitness of the Office application. -- **OfficeVersion** The version of the Office application. -- **Value** The insights collected about this entity. - - -### Microsoft.Windows.Inventory.General.InventoryMiscellaneousOfficeInsightsRemove - -Indicates that this particular data object represented by the objectInstanceId is no longer present. - -This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedeviceinventorychange). - -The following fields are available: - -- **InventoryVersion** The version of the inventory binary generating the events. - - -### Microsoft.Windows.Inventory.General.InventoryMiscellaneousOfficeInsightsStartSync - -This diagnostic event indicates that a new sync is being generated for this object type. - -This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedeviceinventorychange). - -The following fields are available: - -- **InventoryVersion** The version of the inventory binary generating the events. - - -### Microsoft.Windows.Inventory.General.InventoryMiscellaneousOfficeProductsAdd - -Describes Office Products installed. - -This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedeviceinventorychange). - -The following fields are available: - -- **InventoryVersion** The version of the inventory binary generating the events. -- **OC2rApps** A GUID the describes the Office Click-To-Run apps -- **OC2rSkus** Comma-delimited list (CSV) of Office Click-To-Run products installed on the device. For example, Office 2016 ProPlus -- **OMsiApps** Comma-delimited list (CSV) of Office MSI products installed on the device. For example, Microsoft Word -- **OProductCodes** A GUID that describes the Office MSI products - - -### Microsoft.Windows.Inventory.General.InventoryMiscellaneousOfficeProductsStartSync - -Diagnostic event to indicate a new sync is being generated for this object type. - -This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedeviceinventorychange). - -The following fields are available: - -- **InventoryVersion** The version of the inventory binary generating the events. - - -### Microsoft.Windows.Inventory.General.InventoryMiscellaneousOfficeSettingsAdd - -This event describes various Office settings - -This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedeviceinventorychange). - -The following fields are available: - -- **BrowserFlags** Browser flags for Office-related products -- **ExchangeProviderFlags** Provider policies for Office Exchange -- **InventoryVersion** The version of the inventory binary generating the events. -- **SharedComputerLicensing** Office shared computer licensing policies - - -### Microsoft.Windows.Inventory.General.InventoryMiscellaneousOfficeSettingsStartSync - -Indicates a new sync is being generated for this object type. - -This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedeviceinventorychange). - -The following fields are available: - -- **InventoryVersion** The version of the inventory binary generating the events. - - -### Microsoft.Windows.Inventory.General.InventoryMiscellaneousOfficeVBAAdd - -This event provides a summary rollup count of conditions encountered while performing a local scan of Office files, analyzing for known VBA programmability compatibility issues between legacy office version and ProPlus, and between 32 and 64-bit versions - -This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedeviceinventorychange). - -The following fields are available: - -- **Design** Count of files with design issues found. -- **Design_x64** Count of files with 64 bit design issues found. -- **DuplicateVBA** Count of files with duplicate VBA code. -- **HasVBA** Count of files with VBA code. -- **Inaccessible** Count of files that were inaccessible for scanning. -- **InventoryVersion** The version of the inventory binary generating the events. -- **Issues** Count of files with issues detected. -- **Issues_x64** Count of files with 64-bit issues detected. -- **IssuesNone** Count of files with no issues detected. -- **IssuesNone_x64** Count of files with no 64-bit issues detected. -- **Locked** Count of files that were locked, preventing scanning. -- **NoVBA** Count of files with no VBA inside. -- **Protected** Count of files that were password protected, preventing scanning. -- **RemLimited** Count of files that require limited remediation changes. -- **RemLimited_x64** Count of files that require limited remediation changes for 64-bit issues. -- **RemSignificant** Count of files that require significant remediation changes. -- **RemSignificant_x64** Count of files that require significant remediation changes for 64-bit issues. -- **Score** Overall compatibility score calculated for scanned content. -- **Score_x64** Overall 64-bit compatibility score calculated for scanned content. -- **Total** Total number of files scanned. -- **Validation** Count of files that require additional manual validation. -- **Validation_x64** Count of files that require additional manual validation for 64-bit issues. - - -### Microsoft.Windows.Inventory.General.InventoryMiscellaneousOfficeVBARemove - -Indicates that this particular data object represented by the objectInstanceId is no longer present. - -This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedeviceinventorychange). - -The following fields are available: - -- **InventoryVersion** The version of the inventory binary generating the events. - - -### Microsoft.Windows.Inventory.General.InventoryMiscellaneousOfficeVBARuleViolationsAdd - -This event provides data on Microsoft Office VBA rule violations, including a rollup count per violation type, giving an indication of remediation requirements for an organization. The event identifier is a unique GUID, associated with the validation rule - -This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedeviceinventorychange). - -The following fields are available: - -- **Count** Count of total Microsoft Office VBA rule violations -- **InventoryVersion** The version of the inventory binary generating the events. - - -### Microsoft.Windows.Inventory.General.InventoryMiscellaneousOfficeVBARuleViolationsRemove - -Indicates that this particular data object represented by the objectInstanceId is no longer present. - -This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedeviceinventorychange). - -The following fields are available: - -- **InventoryVersion** The version of the inventory binary generating the events. - - -### Microsoft.Windows.Inventory.General.InventoryMiscellaneousOfficeVBARuleViolationsStartSync - -This event indicates that a new sync is being generated for this object type. - -This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedeviceinventorychange). - -The following fields are available: - -- **InventoryVersion** The version of the inventory binary generating the events. - - -### Microsoft.Windows.Inventory.General.InventoryMiscellaneousOfficeVBAStartSync - -Diagnostic event to indicate a new sync is being generated for this object type. - -This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedeviceinventorychange). - -The following fields are available: - -- **InventoryVersion** The version of the inventory binary generating the events. - - -### Microsoft.Windows.Inventory.General.InventoryMiscellaneousUUPInfoAdd - -Provides data on Unified Update Platform (UUP) products and what version they are at. - -This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedeviceinventorychange). - -The following fields are available: - -- **Identifier** UUP identifier -- **LastActivatedVersion** Last activated version -- **PreviousVersion** Previous version -- **Source** UUP source -- **Version** UUP version - - -### Microsoft.Windows.Inventory.General.InventoryMiscellaneousUUPInfoRemove - -Indicates that this particular data object represented by the objectInstanceId is no longer present. - -This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedeviceinventorychange). - - - -### Microsoft.Windows.Inventory.General.InventoryMiscellaneousUUPInfoStartSync - -Diagnostic event to indicate a new sync is being generated for this object type. - -This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedeviceinventorychange). - - - -### Microsoft.Windows.Inventory.Indicators.Checksum - -This event summarizes the counts for the InventoryMiscellaneousUexIndicatorAdd events. - -The following fields are available: - -- **CensusId** A unique hardware identifier. -- **ChecksumDictionary** A count of each operating system indicator. -- **PCFP** Equivalent to the InventoryId field that is found in other core events. - - -### Microsoft.Windows.Inventory.Indicators.InventoryMiscellaneousUexIndicatorAdd - -These events represent the basic metadata about the OS indicators installed on the system which are used for keeping the device up to date. - -This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedeviceinventorychange). - -The following fields are available: - -- **IndicatorValue** The indicator value. -- **Value** Describes an operating system indicator that may be relevant for the device upgrade. - - -### Microsoft.Windows.Inventory.Indicators.InventoryMiscellaneousUexIndicatorRemove - -This event is a counterpart to InventoryMiscellaneousUexIndicatorAdd that indicates that the item has been removed. - -This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedeviceinventorychange). - - - -### Microsoft.Windows.Inventory.Indicators.InventoryMiscellaneousUexIndicatorStartSync - -This event indicates that a new set of InventoryMiscellaneousUexIndicatorAdd events will be sent. - -This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedeviceinventorychange). - - - -## Kernel events - -### IO - -This event indicates the number of bytes read from or read by the OS and written to or written by the OS upon system startup. - -The following fields are available: - -- **BytesRead** The total number of bytes read from or read by the OS upon system startup. -- **BytesWritten** The total number of bytes written to or written by the OS upon system startup. - - -### Microsoft.Windows.Kernel.BootEnvironment.OsLaunch - -OS information collected during Boot, used to evaluate the success of the upgrade process. - -The following fields are available: - -- **BootApplicationId** This field tells us what the OS Loader Application Identifier is. -- **BootAttemptCount** The number of consecutive times the boot manager has attempted to boot into this operating system. -- **BootSequence** The current Boot ID, used to correlate events related to a particular boot session. -- **BootStatusPolicy** Identifies the applicable Boot Status Policy. -- **BootType** Identifies the type of boot (e.g.: "Cold", "Hiber", "Resume"). -- **EventTimestamp** Seconds elapsed since an arbitrary time point. This can be used to identify the time difference in successive boot attempts being made. -- **FirmwareResetReasonEmbeddedController** Reason for system reset provided by firmware. -- **FirmwareResetReasonEmbeddedControllerAdditional** Additional information on system reset reason provided by firmware if needed. -- **FirmwareResetReasonPch** Reason for system reset provided by firmware. -- **FirmwareResetReasonPchAdditional** Additional information on system reset reason provided by firmware if needed. -- **FirmwareResetReasonSupplied** Flag indicating that a reason for system reset was provided by firmware. -- **IO** Amount of data written to and read from the disk by the OS Loader during boot. See [IO](#io). -- **LastBootSucceeded** Flag indicating whether the last boot was successful. -- **LastShutdownSucceeded** Flag indicating whether the last shutdown was successful. -- **MaxAbove4GbFreeRange** This field describes the largest memory range available above 4Gb. -- **MaxBelow4GbFreeRange** This field describes the largest memory range available below 4Gb. -- **MeasuredLaunchPrepared** This field tells us if the OS launch was initiated using Measured/Secure Boot over DRTM (Dynamic Root of Trust for Measurement). -- **MeasuredLaunchResume** This field tells us if Dynamic Root of Trust for Measurement (DRTM) was used when resuming from hibernation. -- **MenuPolicy** Type of advanced options menu that should be shown to the user (Legacy, Standard, etc.). -- **RecoveryEnabled** Indicates whether recovery is enabled. -- **SecureLaunchPrepared** This field indicates if DRTM was prepared during boot. -- **TcbLaunch** Indicates whether the Trusted Computing Base was used during the boot flow. -- **UserInputTime** The amount of time the loader application spent waiting for user input. - - -## Miracast events - -### Microsoft.Windows.Cast.Miracast.MiracastSessionEnd - -This event sends data at the end of a Miracast session that helps determine RTSP related Miracast failures along with some statistics about the session - -The following fields are available: - -- **AudioChannelCount** The number of audio channels. -- **AudioSampleRate** The sample rate of audio in terms of samples per second. -- **AudioSubtype** The unique subtype identifier of the audio codec (encoding method) used for audio encoding. -- **AverageBitrate** The average video bitrate used during the Miracast session, in bits per second. -- **AverageDataRate** The average available bandwidth reported by the WiFi driver during the Miracast session, in bits per second. -- **AveragePacketSendTimeInMs** The average time required for the network to send a sample, in milliseconds. -- **ConnectorType** The type of connector used during the Miracast session. -- **EncodeAverageTimeMS** The average time to encode a frame of video, in milliseconds. -- **EncodeCount** The count of total frames encoded in the session. -- **EncodeMaxTimeMS** The maximum time to encode a frame, in milliseconds. -- **EncodeMinTimeMS** The minimum time to encode a frame, in milliseconds. -- **EncoderCreationTimeInMs** The time required to create the video encoder, in milliseconds. -- **ErrorSource** Identifies the component that encountered an error that caused a disconnect, if applicable. -- **FirstFrameTime** The time (tick count) when the first frame is sent. -- **FirstLatencyMode** The first latency mode. -- **FrameAverageTimeMS** Average time to process an entire frame, in milliseconds. -- **FrameCount** The total number of frames processed. -- **FrameMaxTimeMS** The maximum time required to process an entire frame, in milliseconds. -- **FrameMinTimeMS** The minimum time required to process an entire frame, in milliseconds. -- **Glitches** The number of frames that failed to be delivered on time. -- **HardwareCursorEnabled** Indicates if hardware cursor was enabled when the connection ended. -- **HDCPState** The state of HDCP (High-bandwidth Digital Content Protection) when the connection ended. -- **HighestBitrate** The highest video bitrate used during the Miracast session, in bits per second. -- **HighestDataRate** The highest available bandwidth reported by the WiFi driver, in bits per second. -- **LastLatencyMode** The last reported latency mode. -- **LogTimeReference** The reference time, in tick counts. -- **LowestBitrate** The lowest video bitrate used during the Miracast session, in bits per second. -- **LowestDataRate** The lowest video bitrate used during the Miracast session, in bits per second. -- **MediaErrorCode** The error code reported by the media session, if applicable. -- **MiracastEntry** The time (tick count) when the Miracast driver was first loaded. -- **MiracastM1** The time (tick count) when the M1 request was sent. -- **MiracastM2** The time (tick count) when the M2 request was sent. -- **MiracastM3** The time (tick count) when the M3 request was sent. -- **MiracastM4** The time (tick count) when the M4 request was sent. -- **MiracastM5** The time (tick count) when the M5 request was sent. -- **MiracastM6** The time (tick count) when the M6 request was sent. -- **MiracastM7** The time (tick count) when the M7 request was sent. -- **MiracastSessionState** The state of the Miracast session when the connection ended. -- **MiracastStreaming** The time (tick count) when the Miracast session first started processing frames. -- **ProfileCount** The count of profiles generated from the receiver M4 response. -- **ProfileCountAfterFiltering** The count of profiles after filtering based on available bandwidth and encoder capabilities. -- **RefreshRate** The refresh rate set on the remote display. -- **RotationSupported** Indicates if the Miracast receiver supports display rotation. -- **RTSPSessionId** The unique identifier of the RTSP session. This matches the RTSP session ID for the receiver for the same session. -- **SessionGuid** The unique identifier of to correlate various Miracast events from a session. -- **SinkHadEdid** Indicates if the Miracast receiver reported an EDID. -- **SupportMicrosoftColorSpaceConversion** Indicates whether the Microsoft color space conversion for extra color fidelity is supported by the receiver. -- **SupportsMicrosoftDiagnostics** Indicates whether the Miracast receiver supports the Microsoft Diagnostics Miracast extension. -- **SupportsMicrosoftFormatChange** Indicates whether the Miracast receiver supports the Microsoft Format Change Miracast extension. -- **SupportsMicrosoftLatencyManagement** Indicates whether the Miracast receiver supports the Microsoft Latency Management Miracast extension. -- **SupportsMicrosoftRTCP** Indicates whether the Miracast receiver supports the Microsoft RTCP Miracast extension. -- **SupportsMicrosoftVideoFormats** Indicates whether the Miracast receiver supports Microsoft video format for 3:2 resolution. -- **SupportsWiDi** Indicates whether Miracast receiver supports Intel WiDi extensions. -- **TeardownErrorCode** The error code reason for teardown provided by the receiver, if applicable. -- **TeardownErrorReason** The text string reason for teardown provided by the receiver, if applicable. -- **UIBCEndState** Indicates whether UIBC was enabled when the connection ended. -- **UIBCEverEnabled** Indicates whether UIBC was ever enabled. -- **UIBCStatus** The result code reported by the UIBC setup process. -- **VideoBitrate** The starting bitrate for the video encoder. -- **VideoCodecLevel** The encoding level used for encoding, specific to the video subtype. -- **VideoHeight** The height of encoded video frames. -- **VideoSubtype** The unique subtype identifier of the video codec (encoding method) used for video encoding. -- **VideoWidth** The width of encoded video frames. -- **WFD2Supported** Indicates if the Miracast receiver supports WFD2 protocol. - - -## OneDrive events - -### Microsoft.OneDrive.Sync.Setup.APIOperation - -This event includes basic data about install and uninstall OneDrive API operations. - -The following fields are available: - -- **APIName** The name of the API. -- **Duration** How long the operation took. -- **IsSuccess** Was the operation successful? -- **ResultCode** The result code. -- **ScenarioName** The name of the scenario. - - -### Microsoft.OneDrive.Sync.Setup.EndExperience - -This event includes a success or failure summary of the installation. - -The following fields are available: - -- **APIName** The name of the API. -- **HResult** HResult of the operation -- **IsSuccess** Whether the operation is successful or not -- **ScenarioName** The name of the scenario. - - -### Microsoft.OneDrive.Sync.Setup.OSUpgradeInstallationOperation - -This event is related to the OS version when the OS is upgraded with OneDrive installed. - -The following fields are available: - -- **CurrentOneDriveVersion** The current version of OneDrive. -- **CurrentOSBuildBranch** The current branch of the operating system. -- **CurrentOSBuildNumber** The current build number of the operating system. -- **CurrentOSVersion** The current version of the operating system. -- **HResult** The HResult of the operation. -- **SourceOSBuildBranch** The source branch of the operating system. -- **SourceOSBuildNumber** The source build number of the operating system. -- **SourceOSVersion** The source version of the operating system. - - -### Microsoft.OneDrive.Sync.Setup.RegisterStandaloneUpdaterAPIOperation - -This event is related to registering or unregistering the OneDrive update task. - -The following fields are available: - -- **APIName** The name of the API. -- **IsSuccess** Was the operation successful? -- **RegisterNewTaskResult** The HResult of the RegisterNewTask operation. -- **ScenarioName** The name of the scenario. -- **UnregisterOldTaskResult** The HResult of the UnregisterOldTask operation. - - -### Microsoft.OneDrive.Sync.Updater.ComponentInstallState - -This event includes basic data about the installation state of dependent OneDrive components. - -The following fields are available: - -- **ComponentName** The name of the dependent component. -- **isInstalled** Is the dependent component installed? - - -### Microsoft.OneDrive.Sync.Updater.OverlayIconStatus - -This event indicates if the OneDrive overlay icon is working correctly. 0 = healthy; 1 = can be fixed; 2 = broken - -The following fields are available: - -- **32bit** The status of the OneDrive overlay icon on a 32-bit operating system. -- **64bit** The status of the OneDrive overlay icon on a 64-bit operating system. - - -### Microsoft.OneDrive.Sync.Updater.UpdateOverallResult - -This event sends information describing the result of the update. - -The following fields are available: - -- **hr** The HResult of the operation. -- **IsLoggingEnabled** Indicates whether logging is enabled for the updater. -- **UpdaterVersion** The version of the updater. - - -### Microsoft.OneDrive.Sync.Updater.UpdateXmlDownloadHResult - -This event determines the status when downloading the OneDrive update configuration file. - -The following fields are available: - -- **hr** The HResult of the operation. - - -### Microsoft.OneDrive.Sync.Updater.WebConnectionStatus - -This event determines the error code that was returned when verifying Internet connectivity. - -The following fields are available: - -- **winInetError** The HResult of the operation. - - -## Privacy consent logging events - -### Microsoft.Windows.Shell.PrivacyConsentLogging.PrivacyConsentCompleted - -This event is used to determine whether the user successfully completed the privacy consent experience. - -The following fields are available: - -- **presentationVersion** Which display version of the privacy consent experience the user completed -- **privacyConsentState** The current state of the privacy consent experience -- **settingsVersion** Which setting version of the privacy consent experience the user completed -- **userOobeExitReason** The exit reason of the privacy consent experience - - -### Microsoft.Windows.Shell.PrivacyConsentLogging.PrivacyConsentStatus - -Event tells us effectiveness of new privacy experience. - -The following fields are available: - -- **isAdmin** whether the person who is logging in is an admin -- **isExistingUser** whether the account existed in a downlevel OS -- **isLaunching** Whether or not the privacy consent experience will be launched -- **isSilentElevation** whether the user has most restrictive UAC controls -- **privacyConsentState** whether the user has completed privacy experience -- **userRegionCode** The current user's region setting - - -### wilActivity - -This event provides a Windows Internal Library context used for Product and Service diagnostics. - -The following fields are available: - -- **callContext** The function where the failure occurred. -- **currentContextId** The ID of the current call context where the failure occurred. -- **currentContextMessage** The message of the current call context where the failure occurred. -- **currentContextName** The name of the current call context where the failure occurred. -- **failureCount** The number of failures for this failure ID. -- **failureId** The ID of the failure that occurred. -- **failureType** The type of the failure that occurred. -- **fileName** The file name where the failure occurred. -- **function** The function where the failure occurred. -- **hresult** The HResult of the overall activity. -- **lineNumber** The line number where the failure occurred. -- **message** The message of the failure that occurred. -- **module** The module where the failure occurred. -- **originatingContextId** The ID of the originating call context that resulted in the failure. -- **originatingContextMessage** The message of the originating call context that resulted in the failure. -- **originatingContextName** The name of the originating call context that resulted in the failure. -- **threadId** The ID of the thread on which the activity is executing. - - -## Sediment events - -### Microsoft.Windows.Sediment.Info.DetailedState - -This event is sent when detailed state information is needed from an update trial run. - -The following fields are available: - -- **Data** Data relevant to the state, such as what percent of disk space the directory takes up. -- **Id** Identifies the trial being run, such as a disk related trial. -- **ReleaseVer** The version of the component. -- **State** The state of the reporting data from the trial, such as the top-level directory analysis. -- **Time** The time the event was fired. - - -### Microsoft.Windows.Sediment.Info.Error - -This event indicates an error in the updater payload. This information assists in keeping Windows up to date. - -The following fields are available: - -- **FailureType** The type of error encountered. -- **FileName** The code file in which the error occurred. -- **HResult** The failure error code. -- **LineNumber** The line number in the code file at which the error occurred. -- **ReleaseVer** The version information for the component in which the error occurred. -- **Time** The system time at which the error occurred. - - -### Microsoft.Windows.Sediment.Info.PhaseChange - -The event indicates progress made by the updater. This information assists in keeping Windows up to date. - -The following fields are available: - -- **NewPhase** The phase of progress made. -- **ReleaseVer** The version information for the component in which the change occurred. -- **Time** The system time at which the phase chance occurred. - - -## Setup events - -### SetupPlatformTel.SetupPlatformTelActivityEvent - -This event sends basic metadata about the SetupPlatform update installation process, to help keep Windows up to date. - -The following fields are available: - -- **FieldName** Retrieves the event name/data point. Examples: InstallStartTime, InstallEndtime, OverallResult etc. -- **GroupName** Retrieves the groupname the event belongs to. Example: Install Information, DU Information, Disk Space Information etc. -- **Value** Value associated with the corresponding event name. For example, time-related events will include the system time - - -### SetupPlatformTel.SetupPlatformTelActivityStarted - -This event sends basic metadata about the update installation process generated by SetupPlatform to help keep Windows up to date. - -The following fields are available: - -- **Name** The name of the dynamic update type. Example: GDR driver - - -### SetupPlatformTel.SetupPlatformTelActivityStopped - -This event sends basic metadata about the update installation process generated by SetupPlatform to help keep Windows up to date. - - - -### SetupPlatformTel.SetupPlatformTelEvent - -This service retrieves events generated by SetupPlatform, the engine that drives the various deployment scenarios. - -The following fields are available: - -- **FieldName** Retrieves the event name/data point. Examples: InstallStartTime, InstallEndtime, OverallResult etc. -- **GroupName** Retrieves the groupname the event belongs to. Example: Install Information, DU Information, Disk Space Information etc. -- **Value** Retrieves the value associated with the corresponding event name (Field Name). For example: For time related events this will include the system time. - - -## Software update events - -### SoftwareUpdateClientTelemetry.CheckForUpdates - -Scan process event on Windows Update client. See the EventScenario field for specifics (started/failed/succeeded). - -The following fields are available: - -- **ActivityMatchingId** Contains a unique ID identifying a single CheckForUpdates session from initialization to completion. -- **AllowCachedResults** Indicates if the scan allowed using cached results. -- **ApplicableUpdateInfo** Metadata for the updates which were detected as applicable -- **BiosFamily** The family of the BIOS (Basic Input Output System). -- **BiosName** The name of the device BIOS. -- **BiosReleaseDate** The release date of the device BIOS. -- **BiosSKUNumber** The sku number of the device BIOS. -- **BIOSVendor** The vendor of the BIOS. -- **BiosVersion** The version of the BIOS. -- **BranchReadinessLevel** The servicing branch configured on the device. -- **CachedEngineVersion** For self-initiated healing, the version of the SIH engine that is cached on the device. If the SIH engine does not exist, the value is null. -- **CallerApplicationName** The name provided by the caller who initiated API calls into the software distribution client. -- **CapabilityDetectoidGuid** The GUID for a hardware applicability detectoid that could not be evaluated. -- **CDNCountryCode** Two letter country abbreviation for the Content Distribution Network (CDN) location. -- **CDNId** The unique identifier of a specific device, used to identify how many devices are encountering success or a particular issue. -- **ClientVersion** The version number of the software distribution client. -- **CommonProps** A bitmask for future flags associated with the Windows Update client behavior. No data is currently reported in this field. Expected value for this field is 0. -- **Context** Gives context on where the error has occurred. Example: AutoEnable, GetSLSData, AddService, Misc, or Unknown -- **CurrentMobileOperator** The mobile operator the device is currently connected to. -- **DeferralPolicySources** Sources for any update deferral policies defined (GPO = 0x10, MDM = 0x100, Flight = 0x1000, UX = 0x10000). -- **DeferredUpdates** Update IDs which are currently being deferred until a later time -- **DeviceModel** What is the device model. -- **DriverError** The error code hit during a driver scan. This is 0 if no error was encountered. -- **DriverExclusionPolicy** Indicates if the policy for not including drivers with Windows Update is enabled. -- **DriverSyncPassPerformed** Were drivers scanned this time? -- **EventInstanceID** A globally unique identifier for event instance. -- **EventScenario** Indicates the purpose of sending this event - whether because the software distribution just started checking for content, or whether it was cancelled, succeeded, or failed. -- **ExtendedMetadataCabUrl** Hostname that is used to download an update. -- **ExtendedStatusCode** Secondary error code for certain scenarios where StatusCode wasn't specific enough. -- **FailedUpdateGuids** The GUIDs for the updates that failed to be evaluated during the scan. -- **FailedUpdatesCount** The number of updates that failed to be evaluated during the scan. -- **FeatureUpdateDeferral** The deferral period configured for feature OS updates on the device (in days). -- **FeatureUpdatePause** Indicates whether feature OS updates are paused on the device. -- **FeatureUpdatePausePeriod** The pause duration configured for feature OS updates on the device (in days). -- **FlightBranch** The branch that a device is on if participating in flighting (pre-release builds). -- **FlightRing** The ring (speed of getting builds) that a device is on if participating in flighting (pre-release builds). -- **HomeMobileOperator** The mobile operator that the device was originally intended to work with. -- **IntentPFNs** Intended application-set metadata for atomic update scenarios. -- **IPVersion** Indicates whether the download took place over IPv4 or IPv6 -- **IsWUfBDualScanEnabled** Indicates if Windows Update for Business dual scan is enabled on the device. -- **IsWUfBEnabled** Indicates if Windows Update for Business is enabled on the device. -- **IsWUfBFederatedScanDisabled** Indicates if Windows Update for Business federated scan is disabled on the device. -- **MetadataIntegrityMode** The mode of the update transport metadata integrity check. 0-Unknown, 1-Ignoe, 2-Audit, 3-Enforce -- **MSIError** The last error that was encountered during a scan for updates. -- **NetworkConnectivityDetected** Indicates the type of network connectivity that was detected. 0 - IPv4, 1 - IPv6 -- **NumberOfApplicableUpdates** The number of updates which were ultimately deemed applicable to the system after the detection process is complete -- **NumberOfApplicationsCategoryScanEvaluated** The number of categories (apps) for which an app update scan checked -- **NumberOfLoop** The number of round trips the scan required -- **NumberOfNewUpdatesFromServiceSync** The number of updates which were seen for the first time in this scan -- **NumberOfUpdatesEvaluated** The total number of updates which were evaluated as a part of the scan -- **NumFailedMetadataSignatures** The number of metadata signatures checks which failed for new metadata synced down. -- **Online** Indicates if this was an online scan. -- **PausedUpdates** A list of UpdateIds which that currently being paused. -- **PauseFeatureUpdatesEndTime** If feature OS updates are paused on the device, this is the date and time for the end of the pause time window. -- **PauseFeatureUpdatesStartTime** If feature OS updates are paused on the device, this is the date and time for the beginning of the pause time window. -- **PauseQualityUpdatesEndTime** If quality OS updates are paused on the device, this is the date and time for the end of the pause time window. -- **PauseQualityUpdatesStartTime** If quality OS updates are paused on the device, this is the date and time for the beginning of the pause time window. -- **PhonePreviewEnabled** Indicates whether a phone was getting preview build, prior to flighting (pre-release builds) being introduced. -- **ProcessName** The process name of the caller who initiated API calls, in the event where CallerApplicationName was not provided. -- **QualityUpdateDeferral** The deferral period configured for quality OS updates on the device (in days). -- **QualityUpdatePause** Indicates whether quality OS updates are paused on the device. -- **QualityUpdatePausePeriod** The pause duration configured for quality OS updates on the device (in days). -- **RelatedCV** The previous Correlation Vector that was used before swapping with a new one -- **ScanDurationInSeconds** The number of seconds a scan took -- **ScanEnqueueTime** The number of seconds it took to initialize a scan -- **ScanProps** This is a 32-bit integer containing Boolean properties for a given Windows Update scan. The following bits are used; all remaining bits are reserved and set to zero. Bit 0 (0x1): IsInteractive - is set to 1 if the scan is requested by a user, or 0 if the scan is requested by Automatic Updates. Bit 1 (0x2): IsSeeker - is set to 1 if the Windows Update client's Seeker functionality is enabled. Seeker functionality is enabled on certain interactive scans, and results in the scans returning certain updates that are in the initial stages of release (not yet released for full adoption via Automatic Updates). -- **ServiceGuid** An ID which represents which service the software distribution client is checking for content (Windows Update, Microsoft Store, etc.). -- **ServiceUrl** The environment URL a device is configured to scan with -- **ShippingMobileOperator** The mobile operator that a device shipped on. -- **StatusCode** Indicates the result of a CheckForUpdates event (success, cancellation, failure code HResult). -- **SyncType** Describes the type of scan the event was -- **SystemBIOSMajorRelease** Major version of the BIOS. -- **SystemBIOSMinorRelease** Minor version of the BIOS. -- **TargetMetadataVersion** For self-initiated healing, this is the target version of the SIH engine to download (if needed). If not, the value is null. -- **TotalNumMetadataSignatures** The total number of metadata signatures checks done for new metadata that was synced down. -- **WebServiceRetryMethods** Web service method requests that needed to be retried to complete operation. -- **WUDeviceID** The unique identifier of a specific device, used to identify how many devices are encountering success or a particular issue. - - -### SoftwareUpdateClientTelemetry.Commit - -This event tracks the commit process post the update installation when software update client is trying to update the device. - -The following fields are available: - -- **BiosFamily** Device family as defined in the system BIOS -- **BiosName** Name of the system BIOS -- **BiosReleaseDate** Release date of the system BIOS -- **BiosSKUNumber** Device SKU as defined in the system BIOS -- **BIOSVendor** Vendor of the system BIOS -- **BiosVersion** Version of the system BIOS -- **BundleId** Identifier associated with the specific content bundle; should not be all zeros if the bundleID was found. -- **BundleRevisionNumber** Identifies the revision number of the content bundle -- **CallerApplicationName** Name provided by the caller who initiated API calls into the software distribution client -- **ClientVersion** Version number of the software distribution client -- **DeploymentProviderMode** The mode of operation of the update deployment provider. -- **DeviceModel** Device model as defined in the system bios -- **EventInstanceID** A globally unique identifier for event instance -- **EventScenario** Indicates the purpose of the event - whether because scan started, succeded, failed, etc. -- **EventType** Possible values are "Child", "Bundle", "Relase" or "Driver". -- **FlightId** The specific id of the flight the device is getting -- **HandlerType** Indicates the kind of content (app, driver, windows patch, etc.) -- **RevisionNumber** Identifies the revision number of this specific piece of content -- **ServiceGuid** Identifier for the service to which the software distribution client is connecting (Windows Update, Microsoft Store, etc) -- **SystemBIOSMajorRelease** Major release version of the system bios -- **SystemBIOSMinorRelease** Minor release version of the system bios -- **UpdateId** Identifier associated with the specific piece of content -- **WUDeviceID** Unique device id controlled by the software distribution client - - -### SoftwareUpdateClientTelemetry.Download - -Download process event for target update on Windows Update client. See the EventScenario field for specifics (started/failed/succeeded). - -The following fields are available: - -- **ActiveDownloadTime** How long the download took, in seconds, excluding time where the update wasn't actively being downloaded. -- **AppXBlockHashFailures** Indicates the number of blocks that failed hash validation during download of the app payload. -- **AppXBlockHashValidationFailureCount** A count of the number of blocks that have failed validation after being downloaded. -- **AppXDownloadScope** Indicates the scope of the download for application content. -- **AppXScope** Indicates the scope of the app download. -- **BiosFamily** The family of the BIOS (Basic Input Output System). -- **BiosName** The name of the device BIOS. -- **BiosReleaseDate** The release date of the device BIOS. -- **BiosSKUNumber** The sku number of the device BIOS. -- **BIOSVendor** The vendor of the BIOS. -- **BiosVersion** The version of the BIOS. -- **BundleBytesDownloaded** Number of bytes downloaded for the specific content bundle. -- **BundleId** Identifier associated with the specific content bundle. -- **BundleRepeatFailCount** Indicates whether this particular update bundle has previously failed. -- **BundleRepeatFailFlag** Indicates whether this particular update bundle previously failed to download. -- **BundleRevisionNumber** Identifies the revision number of the content bundle. -- **BytesDownloaded** Number of bytes that were downloaded for an individual piece of content (not the entire bundle). -- **CachedEngineVersion** The version of the “Self-Initiated Healing” (SIH) engine that is cached on the device, if applicable. -- **CallerApplicationName** The name provided by the application that initiated API calls into the software distribution client. -- **CbsDownloadMethod** Indicates whether the download was a full- or a partial-file download. -- **CbsMethod** The method used for downloading the update content related to the Component Based Servicing (CBS) technology. -- **CDNCountryCode** Two letter country abbreviation for the Content Distribution Network (CDN) location. -- **CDNId** ID which defines which CDN the software distribution client downloaded the content from. -- **ClientVersion** The version number of the software distribution client. -- **CommonProps** A bitmask for future flags associated with the Windows Update client behavior. -- **ConnectTime** Indicates the cumulative amount of time (in seconds) it took to establish the connection for all updates in an update bundle. -- **CurrentMobileOperator** The mobile operator the device is currently connected to. -- **DeviceModel** The model of the device. -- **DownloadPriority** Indicates whether a download happened at background, normal, or foreground priority. -- **DownloadProps** Information about the download operation. -- **DownloadType** Differentiates the download type of “Self-Initiated Healing” (SIH) downloads between Metadata and Payload downloads. -- **EventInstanceID** A globally unique identifier for event instance. -- **EventScenario** Indicates the purpose for sending this event: whether because the software distribution just started downloading content; or whether it was cancelled, succeeded, or failed. -- **EventType** Identifies the type of the event (Child, Bundle, or Driver). -- **ExtendedStatusCode** Secondary error code for certain scenarios where StatusCode wasn't specific enough. -- **FeatureUpdatePause** Indicates whether feature OS updates are paused on the device. -- **FlightBranch** The branch that a device is on if participating in flighting (pre-release builds). -- **FlightBuildNumber** If this download was for a flight (pre-release build), this indicates the build number of that flight. -- **FlightId** The specific ID of the flight (pre-release build) the device is getting. -- **FlightRing** The ring (speed of getting builds) that a device is on if participating in flighting (pre-release builds). -- **HandlerType** Indicates what kind of content is being downloaded (app, driver, windows patch, etc.). -- **HardwareId** If this download was for a driver targeted to a particular device model, this ID indicates the model of the device. -- **HomeMobileOperator** The mobile operator that the device was originally intended to work with. -- **HostName** The hostname URL the content is downloading from. -- **IPVersion** Indicates whether the download took place over IPv4 or IPv6. -- **IsDependentSet** Indicates whether a driver is a part of a larger System Hardware/Firmware Update -- **IsWUfBDualScanEnabled** Indicates if Windows Update for Business dual scan is enabled on the device. -- **IsWUfBEnabled** Indicates if Windows Update for Business is enabled on the device. -- **NetworkCost** A flag indicating the cost of the network (congested, fixed, variable, over data limit, roaming, etc.) used for downloading the update content. -- **NetworkCostBitMask** Indicates what kind of network the device is connected to (roaming, metered, over data cap, etc.) -- **NetworkRestrictionStatus** More general version of NetworkCostBitMask, specifying whether Windows considered the current network to be "metered." -- **PackageFullName** The package name of the content. -- **PhonePreviewEnabled** Indicates whether a phone was opted-in to getting preview builds, prior to flighting (pre-release builds) being introduced. -- **PostDnldTime** Time (in seconds) taken to signal download completion after the last job completed downloading the payload. -- **ProcessName** The process name of the application that initiated API calls, in the event where CallerApplicationName was not provided. -- **QualityUpdatePause** Indicates whether quality OS updates are paused on the device. -- **Reason** A 32-bit integer representing the reason the update is blocked from being downloaded in the background. -- **RegulationReason** The reason that the update is regulated -- **RegulationResult** The result code (HResult) of the last attempt to contact the regulation web service for download regulation of update content. -- **RelatedCV** The Correlation Vector that was used before the most recent change to a new Correlation Vector. -- **RepeatFailCount** Indicates whether this specific content has previously failed. -- **RepeatFailFlag** Indicates whether this specific content previously failed to download. -- **RevisionNumber** The revision number of the specified piece of content. -- **ServiceGuid** A unique identifier for the service that the software distribution client is installing content for (Windows Update, Microsoft Store, etc.). -- **Setup360Phase** Identifies the active phase of the upgrade download if the current download is for an Operating System upgrade. -- **ShippingMobileOperator** The mobile operator linked to the device when the device shipped. -- **SizeCalcTime** Time (in seconds) taken to calculate the total download size of the payload. -- **StatusCode** Indicates the result of a Download event (success, cancellation, failure code HResult). -- **SystemBIOSMajorRelease** Major version of the BIOS. -- **SystemBIOSMinorRelease** Minor version of the BIOS. -- **TargetGroupId** For drivers targeted to a specific device model, this ID indicates the distribution group of devices receiving that driver. -- **TargetingVersion** For drivers targeted to a specific device model, this is the version number of the drivers being distributed to the device. -- **TargetMetadataVersion** The version of the currently downloading (or most recently downloaded) package. -- **ThrottlingServiceHResult** Result code (success/failure) while contacting a web service to determine whether this device should download content yet. -- **TimeToEstablishConnection** Time (in milliseconds) it took to establish the connection prior to beginning downloaded. -- **TotalExpectedBytes** The total size (in Bytes) expected to be downloaded. -- **UpdateId** An identifier associated with the specific piece of content. -- **UpdateID** An identifier associated with the specific piece of content. -- **UpdateImportance** Indicates whether the content was marked as Important, Recommended, or Optional. -- **UsedDO** Indicates whether the download used the Delivery Optimization (DO) service. -- **UsedSystemVolume** Indicates whether the content was downloaded to the device's main system storage drive, or an alternate storage drive. -- **WUDeviceID** The unique identifier of a specific device, used to identify how many devices are encountering success or a particular issue. - - -### SoftwareUpdateClientTelemetry.DownloadCheckpoint - -This event provides a checkpoint between each of the Windows Update download phases for UUP content - -The following fields are available: - -- **CallerApplicationName** The name provided by the caller who initiated API calls into the software distribution client -- **ClientVersion** The version number of the software distribution client -- **EventScenario** Indicates the purpose of sending this event - whether because the software distribution just started checking for content, or whether it was cancelled, succeeded, or failed -- **EventType** Possible values are "Child", "Bundle", "Relase" or "Driver" -- **ExtendedStatusCode** Secondary error code for certain scenarios where StatusCode wasn't specific enough -- **FileId** A hash that uniquely identifies a file -- **FileName** Name of the downloaded file -- **FlightId** The unique identifier for each flight -- **RelatedCV** The previous Correlation Vector that was used before swapping with a new one -- **RevisionNumber** Unique revision number of Update -- **ServiceGuid** An ID which represents which service the software distribution client is checking for content (Windows Update, Microsoft Store, etc.) -- **StatusCode** Indicates the result of a CheckForUpdates event (success, cancellation, failure code HResult) -- **UpdateId** Unique Update ID -- **WUDeviceID** The unique identifier of a specific device, used to identify how many devices are encountering success or a particular issue - - -### SoftwareUpdateClientTelemetry.DownloadHeartbeat - -This event allows tracking of ongoing downloads and contains data to explain the current state of the download - -The following fields are available: - -- **BytesTotal** Total bytes to transfer for this content -- **BytesTransferred** Total bytes transferred for this content at the time of heartbeat -- **CallerApplicationName** Name provided by the caller who initiated API calls into the software distribution client -- **ClientVersion** The version number of the software distribution client -- **ConnectionStatus** Indicates the connectivity state of the device at the time of heartbeat -- **CurrentError** Last (transient) error encountered by the active download -- **DownloadFlags** Flags indicating if power state is ignored -- **DownloadState** Current state of the active download for this content (queued, suspended, or progressing) -- **EventType** Possible values are "Child", "Bundle", or "Driver" -- **FlightId** The unique identifier for each flight -- **IsNetworkMetered** Indicates whether Windows considered the current network to be ?metered" -- **MOAppDownloadLimit** Mobile operator cap on size of application downloads, if any -- **MOUpdateDownloadLimit** Mobile operator cap on size of operating system update downloads, if any -- **PowerState** Indicates the power state of the device at the time of heartbeart (DC, AC, Battery Saver, or Connected Standby) -- **RelatedCV** The previous correlation vector that was used by the client, before swapping with a new one -- **ResumeCount** Number of times this active download has resumed from a suspended state -- **RevisionNumber** Identifies the revision number of this specific piece of content -- **ServiceGuid** Identifier for the service to which the software distribution client is connecting (Windows Update, Microsoft Store, etc) -- **SuspendCount** Number of times this active download has entered a suspended state -- **SuspendReason** Last reason for why this active download entered a suspended state -- **UpdateId** Identifier associated with the specific piece of content -- **WUDeviceID** Unique device id controlled by the software distribution client - - -### SoftwareUpdateClientTelemetry.Install - -This event sends tracking data about the software distribution client installation of the content for that update, to help keep Windows up to date. - -The following fields are available: - -- **BiosFamily** The family of the BIOS (Basic Input Output System). -- **BiosName** The name of the device BIOS. -- **BiosReleaseDate** The release date of the device BIOS. -- **BiosSKUNumber** The sku number of the device BIOS. -- **BIOSVendor** The vendor of the BIOS. -- **BiosVersion** The version of the BIOS. -- **BundleId** Identifier associated with the specific content bundle; should not be all zeros if the bundleID was found. -- **BundleRepeatFailCount** Indicates whether this particular update bundle has previously failed. -- **BundleRepeatFailFlag** Indicates whether this particular update bundle previously failed to install. -- **BundleRevisionNumber** Identifies the revision number of the content bundle. -- **CachedEngineVersion** For self-initiated healing, the version of the SIH engine that is cached on the device. If the SIH engine does not exist, the value is null. -- **CallerApplicationName** The name provided by the caller who initiated API calls into the software distribution client. -- **ClientVersion** The version number of the software distribution client. -- **CommonProps** A bitmask for future flags associated with the Windows Update client behavior. No value is currently reported in this field. Expected value for this field is 0. -- **CSIErrorType** The stage of CBS installation where it failed. -- **CurrentMobileOperator** The mobile operator to which the device is currently connected. -- **DeploymentProviderMode** The mode of operation of the update deployment provider. -- **DeviceModel** The device model. -- **DriverPingBack** Contains information about the previous driver and system state. -- **DriverRecoveryIds** The list of identifiers that could be used for uninstalling the drivers if a recovery is required. -- **EventInstanceID** A globally unique identifier for event instance. -- **EventScenario** Indicates the purpose of sending this event - whether because the software distribution just started installing content, or whether it was cancelled, succeeded, or failed. -- **EventType** Possible values are Child, Bundle, or Driver. -- **ExtendedErrorCode** The extended error code. -- **ExtendedStatusCode** Secondary error code for certain scenarios where StatusCode is not specific enough. -- **FeatureUpdatePause** Indicates whether feature OS updates are paused on the device. -- **FlightBranch** The branch that a device is on if participating in the Windows Insider Program. -- **FlightBuildNumber** If this installation was for a Windows Insider build, this is the build number of that build. -- **FlightId** The specific ID of the Windows Insider build the device is getting. -- **FlightRing** The ring that a device is on if participating in the Windows Insider Program. -- **HandlerType** Indicates what kind of content is being installed (for example, app, driver, Windows update). -- **HardwareId** If this install was for a driver targeted to a particular device model, this ID indicates the model of the device. -- **HomeMobileOperator** The mobile operator that the device was originally intended to work with. -- **InstallProps** A bitmask for future flags associated with the install operation. No value is currently reported in this field. Expected value for this field is 0. -- **IntentPFNs** Intended application-set metadata for atomic update scenarios. -- **IsDependentSet** Indicates whether the driver is part of a larger System Hardware/Firmware update. -- **IsFinalOutcomeEvent** Indicates whether this event signals the end of the update/upgrade process. -- **IsFirmware** Indicates whether this update is a firmware update. -- **IsSuccessFailurePostReboot** Indicates whether the update succeeded and then failed after a restart. -- **IsWUfBDualScanEnabled** Indicates whether Windows Update for Business dual scan is enabled on the device. -- **IsWUfBEnabled** Indicates whether Windows Update for Business is enabled on the device. -- **MergedUpdate** Indicates whether the OS update and a BSP update merged for installation. -- **MsiAction** The stage of MSI installation where it failed. -- **MsiProductCode** The unique identifier of the MSI installer. -- **PackageFullName** The package name of the content being installed. -- **PhonePreviewEnabled** Indicates whether a phone was getting preview build, prior to flighting being introduced. -- **ProcessName** The process name of the caller who initiated API calls, in the event that CallerApplicationName was not provided. -- **QualityUpdatePause** Indicates whether quality OS updates are paused on the device. -- **RelatedCV** The previous Correlation Vector that was used before swapping with a new one -- **RepeatFailCount** Indicates whether this specific piece of content has previously failed. -- **RepeatFailFlag** Indicates whether this specific piece of content previously failed to install. -- **RevisionNumber** The revision number of this specific piece of content. -- **ServiceGuid** An ID which represents which service the software distribution client is installing content for (Windows Update, Microsoft Store, etc.). -- **Setup360Phase** If the install is for an operating system upgrade, indicates which phase of the upgrade is underway. -- **ShippingMobileOperator** The mobile operator that a device shipped on. -- **StatusCode** Indicates the result of an installation event (success, cancellation, failure code HResult). -- **SystemBIOSMajorRelease** Major version of the BIOS. -- **SystemBIOSMinorRelease** Minor version of the BIOS. -- **TargetGroupId** For drivers targeted to a specific device model, this ID indicates the distribution group of devices receiving that driver. -- **TargetingVersion** For drivers targeted to a specific device model, this is the version number of the drivers being distributed to the device. -- **TransactionCode** The ID that represents a given MSI installation. -- **UpdateId** Unique update ID. -- **UpdateID** An identifier associated with the specific piece of content. -- **UpdateImportance** Indicates whether a piece of content was marked as Important, Recommended, or Optional. -- **UsedSystemVolume** Indicates whether the content was downloaded and then installed from the device's main system storage drive, or an alternate storage drive. -- **WUDeviceID** The unique identifier of a specific device, used to identify how many devices are encountering success or a particular issue. - - -### SoftwareUpdateClientTelemetry.Revert - -Revert event for target update on Windows Update Client. See EventScenario field for specifics (for example, Started/Failed/Succeeded). - -The following fields are available: - -- **BundleId** Identifier associated with the specific content bundle. Should not be all zeros if the BundleId was found. -- **BundleRepeatFailCount** Indicates whether this particular update bundle has previously failed. -- **BundleRevisionNumber** Identifies the revision number of the content bundle. -- **CallerApplicationName** Name of application making the Windows Update request. Used to identify context of request. -- **ClientVersion** Version number of the software distribution client. -- **CommonProps** A bitmask for future flags associated with the Windows Update client behavior. There is no value being reported in this field right now. Expected value for this field is 0. -- **CSIErrorType** Stage of CBS installation that failed. -- **DriverPingBack** Contains information about the previous driver and system state. -- **DriverRecoveryIds** The list of identifiers that could be used for uninstalling the drivers if a recovery is required. -- **EventInstanceID** A globally unique identifier for event instance. -- **EventScenario** Indicates the purpose of the event (scan started, succeeded, failed, etc.). -- **EventType** Event type (Child, Bundle, Release, or Driver). -- **ExtendedStatusCode** Secondary status code for certain scenarios where StatusCode is not specific enough. -- **FeatureUpdatePause** Indicates whether feature OS updates are paused on the device. -- **FlightBuildNumber** Indicates the build number of the flight. -- **FlightId** The specific ID of the flight the device is getting. -- **HandlerType** Indicates the kind of content (app, driver, windows patch, etc.). -- **HardwareId** If this download was for a driver targeted to a particular device model, this ID indicates the model of the device. -- **IsFinalOutcomeEvent** Indicates whether this event signals the end of the update/upgrade process. -- **IsFirmware** Indicates whether an update was a firmware update. -- **IsSuccessFailurePostReboot** Indicates whether an initial success was a failure after a reboot. -- **IsWUfBDualScanEnabled** Flag indicating whether WU-for-Business dual scan is enabled on the device. -- **IsWUfBEnabled** Flag indicating whether WU-for-Business is enabled on the device. -- **MergedUpdate** Indicates whether an OS update and a BSP update were merged for install. -- **ProcessName** Process name of the caller who initiated API calls into the software distribution client. -- **QualityUpdatePause** Indicates whether quality OS updates are paused on the device. -- **RelatedCV** The previous correlation vector that was used by the client before swapping with a new one. -- **RepeatFailCount** Indicates whether this specific piece of content has previously failed. -- **RevisionNumber** Identifies the revision number of this specific piece of content. -- **ServiceGuid** Identifier for the service to which the software distribution client is connecting (Windows Update, Microsoft Store, etc.). -- **StatusCode** Result code of the event (success, cancellation, failure code HResult). -- **TargetGroupId** For drivers targeted to a specific device model, this ID indicates the distribution group of devices receiving that driver. -- **TargetingVersion** For drivers targeted to a specific device model, this is the version number of the drivers being distributed to the device. -- **UpdateId** The identifier associated with the specific piece of content. -- **UpdateImportance** Indicates the importance of a driver, and why it received that importance level (0-Unknown, 1-Optional, 2-Important-DNF, 3-Important-Generic, 4-Important-Other, 5-Recommended). -- **UsedSystemVolume** Indicates whether the device's main system storage drive or an alternate storage drive was used. -- **WUDeviceID** Unique device ID controlled by the software distribution client. - - -### SoftwareUpdateClientTelemetry.TaskRun - -Start event for Server Initiated Healing client. See EventScenario field for specifics (for example, started/completed). - -The following fields are available: - -- **CallerApplicationName** Name of application making the Windows Update request. Used to identify context of request. -- **ClientVersion** Version number of the software distribution client. -- **CmdLineArgs** Command line arguments passed in by the caller. -- **EventInstanceID** A globally unique identifier for the event instance. -- **EventScenario** Indicates the purpose of the event (scan started, succeeded, failed, etc.). -- **ServiceGuid** Identifier for the service to which the software distribution client is connecting (Windows Update, Microsoft Store, etc.). -- **StatusCode** Result code of the event (success, cancellation, failure code HResult). -- **WUDeviceID** Unique device ID controlled by the software distribution client. - - -### SoftwareUpdateClientTelemetry.Uninstall - -Uninstall event for target update on Windows Update Client. See EventScenario field for specifics (for example, Started/Failed/Succeeded). - -The following fields are available: - -- **BundleId** The identifier associated with the specific content bundle. This should not be all zeros if the bundleID was found. -- **BundleRepeatFailCount** Indicates whether this particular update bundle previously failed. -- **BundleRevisionNumber** Identifies the revision number of the content bundle. -- **CallerApplicationName** Name of the application making the Windows Update request. Used to identify context of request. -- **ClientVersion** Version number of the software distribution client. -- **CommonProps** A bitmask for future flags associated with the Windows Update client behavior. There is no value being reported in this field right now. Expected value for this field is 0. -- **DriverPingBack** Contains information about the previous driver and system state. -- **DriverRecoveryIds** The list of identifiers that could be used for uninstalling the drivers when a recovery is required. -- **EventInstanceID** A globally unique identifier for event instance. -- **EventScenario** Indicates the purpose of the event (a scan started, succeded, failed, etc.). -- **EventType** Indicates the event type. Possible values are "Child", "Bundle", "Release" or "Driver". -- **ExtendedStatusCode** Secondary status code for certain scenarios where StatusCode is not specific enough. -- **FeatureUpdatePause** Indicates whether feature OS updates are paused on the device. -- **FlightBuildNumber** Indicates the build number of the flight. -- **FlightId** The specific ID of the flight the device is getting. -- **HandlerType** Indicates the kind of content (app, driver, windows patch, etc.). -- **HardwareId** If the download was for a driver targeted to a particular device model, this ID indicates the model of the device. -- **IsFinalOutcomeEvent** Indicates whether this event signals the end of the update/upgrade process. -- **IsFirmware** Indicates whether an update was a firmware update. -- **IsSuccessFailurePostReboot** Indicates whether an initial success was then a failure after a reboot. -- **IsWUfBDualScanEnabled** Flag indicating whether WU-for-Business dual scan is enabled on the device. -- **IsWUfBEnabled** Flag indicating whether WU-for-Business is enabled on the device. -- **MergedUpdate** Indicates whether an OS update and a BSP update were merged for install. -- **ProcessName** Process name of the caller who initiated API calls into the software distribution client. -- **QualityUpdatePause** Indicates whether quality OS updates are paused on the device. -- **RelatedCV** The previous correlation vector that was used by the client before swapping with a new one. -- **RepeatFailCount** Indicates whether this specific piece of content previously failed. -- **RevisionNumber** Identifies the revision number of this specific piece of content. -- **ServiceGuid** Identifier for the service to which the software distribution client is connecting (Windows Update, Microsoft Store, etc.). -- **StatusCode** Result code of the event (success, cancellation, failure code HResult). -- **TargetGroupId** For drivers targeted to a specific device model, this ID indicates the distribution group of devices receiving that driver. -- **TargetingVersion** For drivers targeted to a specific device model, this is the version number of the drivers being distributed to the device. -- **UpdateId** Identifier associated with the specific piece of content. -- **UpdateImportance** Indicates the importance of a driver and why it received that importance level (0-Unknown, 1-Optional, 2-Important-DNF, 3-Important-Generic, 4-Important-Other, 5-Recommended). -- **UsedSystemVolume** Indicates whether the device’s main system storage drive or an alternate storage drive was used. -- **WUDeviceID** Unique device ID controlled by the software distribution client. - - -### SoftwareUpdateClientTelemetry.UpdateDetected - -This event sends data about an AppX app that has been updated from the Microsoft Store, including what app needs an update and what version/architecture is required, in order to understand and address problems with apps getting required updates. - -The following fields are available: - -- **ApplicableUpdateInfo** Metadata for the updates which were detected as applicable. -- **CallerApplicationName** The name provided by the caller who initiated API calls into the software distribution client. -- **IntentPFNs** Intended application-set metadata for atomic update scenarios. -- **NumberOfApplicableUpdates** The number of updates ultimately deemed applicable to the system after the detection process is complete. -- **RelatedCV** The previous Correlation Vector that was used before swapping with a new one. -- **ServiceGuid** An ID that represents which service the software distribution client is connecting to (Windows Update, Microsoft Store, etc.). -- **WUDeviceID** The unique device ID controlled by the software distribution client. - - -### SoftwareUpdateClientTelemetry.UpdateMetadataIntegrity - -Ensures Windows Updates are secure and complete. Event helps to identify whether update content has been tampered with and protects against man-in-the-middle attack. - -The following fields are available: - -- **CallerApplicationName** Name of application making the Windows Update request. Used to identify context of request. -- **EndpointUrl** The endpoint URL where the device obtains update metadata. This is used to distinguish between test, staging, and production environments. -- **EventScenario** The purpose of this event, such as scan started, scan succeeded, or scan failed. -- **ExtendedStatusCode** The secondary status code of the event. -- **LeafCertId** The integral ID from the FragmentSigning data for the certificate that failed. -- **ListOfSHA256OfIntermediateCerData** A semicolon delimited list of base64 encoding of hashes for the Base64CerData in the FragmentSigning data of an intermediate certificate. -- **MetadataIntegrityMode** The mode of the transport metadata integrity check. 0 = unknown; 1 = ignore; 2 = audit; 3 = enforce -- **MetadataSignature** A base64-encoded string of the signature associated with the update metadata (specified by revision ID). -- **RawMode** The raw unparsed mode string from the SLS response. This field is null if not applicable. -- **RawValidityWindowInDays** The raw unparsed validity window string in days of the timestamp token. This field is null if not applicable. -- **RevisionId** The revision ID for a specific piece of content. -- **RevisionNumber** The revision number for a specific piece of content. -- **ServiceGuid** Identifies the service to which the software distribution client is connected, Example: Windows Update or Microsoft Store -- **SHA256OfLeafCerData** A base64 encoding of the hash for the Base64CerData in the FragmentSigning data of the leaf certificate. -- **SHA256OfLeafCertPublicKey** A base64 encoding of the hash of the Base64CertData in the FragmentSigning data of the leaf certificate. -- **SHA256OfTimestampToken** An encoded string of the timestamp token. -- **SignatureAlgorithm** The hash algorithm for the metadata signature. -- **SLSPrograms** A test program to which a device may have opted in. Example: Insider Fast -- **StatusCode** The status code of the event. -- **TimestampTokenCertThumbprint** The thumbprint of the encoded timestamp token. -- **TimestampTokenId** The time this was created. It is encoded in a timestamp blob and will be zero if the token is malformed. -- **UpdateId** The update ID for a specific piece of content. -- **ValidityWindowInDays** The validity window that's in effect when verifying the timestamp. - - -## System Resource Usage Monitor events - -### Microsoft.Windows.Srum.Sdp.CpuUsage - -This event provides information on CPU usage. - -The following fields are available: - -- **UsageMax** The maximum of hourly average CPU usage. -- **UsageMean** The mean of hourly average CPU usage. -- **UsageMedian** The median of hourly average CPU usage. -- **UsageTwoHourMaxMean** The mean of the maximum of every two hour of hourly average CPU usage. -- **UsageTwoHourMedianMean** The mean of the median of every two hour of hourly average CPU usage. - - -### Microsoft.Windows.Srum.Sdp.NetworkUsage - -This event provides information on network usage. - -The following fields are available: - -- **AdapterGuid** The unique ID of the adapter. -- **BytesTotalMax** The maximum of the hourly average bytes total. -- **BytesTotalMean** The mean of the hourly average bytes total. -- **BytesTotalMedian** The median of the hourly average bytes total. -- **BytesTotalTwoHourMaxMean** The mean of the maximum of every two hours of hourly average bytes total. -- **BytesTotalTwoHourMedianMean** The mean of the median of every two hour of hourly average bytes total. -- **LinkSpeed** The adapter link speed. - - -## Update events - -### Update360Telemetry.Revert - -This event sends data relating to the Revert phase of updating Windows. - -The following fields are available: - -- **ErrorCode** The error code returned for the Revert phase. -- **FlightId** Unique ID for the flight (test instance version). -- **ObjectId** The unique value for each Update Agent mode. -- **RebootRequired** Indicates reboot is required. -- **RelatedCV** The correlation vector value generated from the latest USO (Update Service Orchestrator) scan. -- **Result** The HResult of the event. -- **RevertResult** The result code returned for the Revert operation. -- **ScenarioId** The ID of the update scenario. -- **SessionId** The ID of the update attempt. -- **UpdateId** The ID of the update. - - -### Update360Telemetry.UpdateAgentCommit - -This event collects information regarding the commit phase of the new Unified Update Platform (UUP) update scenario, which is leveraged by both Mobile and Desktop. - -The following fields are available: - -- **ErrorCode** The error code returned for the current install phase. -- **FlightId** Unique ID for each flight. -- **ObjectId** Unique value for each Update Agent mode. -- **RelatedCV** Correlation vector value generated from the latest USO scan. -- **Result** Outcome of the install phase of the update. -- **ScenarioId** Indicates the update scenario. -- **SessionId** Unique value for each update attempt. -- **UpdateId** Unique ID for each update. - - -### Update360Telemetry.UpdateAgentDownloadRequest - -This event sends data for the download request phase of updating Windows via the new Unified Update Platform (UUP) scenario. Applicable to PC and Mobile. - -The following fields are available: - -- **DeletedCorruptFiles** Boolean indicating whether corrupt payload was deleted. -- **DownloadRequests** Number of times a download was retried. -- **ErrorCode** The error code returned for the current download request phase. -- **ExtensionName** Indicates whether the payload is related to Operating System content or a plugin. -- **FlightId** Unique ID for each flight. -- **InternalFailureResult** Indicates a non-fatal error from a plugin. -- **ObjectId** Unique value for each Update Agent mode (same concept as InstanceId for Setup360). -- **PackageCategoriesSkipped** Indicates package categories that were skipped, if applicable. -- **PackageCountOptional** Number of optional packages requested. -- **PackageCountRequired** Number of required packages requested. -- **PackageCountTotal** Total number of packages needed. -- **PackageCountTotalCanonical** Total number of canonical packages. -- **PackageCountTotalDiff** Total number of diff packages. -- **PackageCountTotalExpress** Total number of express packages. -- **PackageExpressType** Type of express package. -- **PackageSizeCanonical** Size of canonical packages in bytes. -- **PackageSizeDiff** Size of diff packages in bytes. -- **PackageSizeExpress** Size of express packages in bytes. -- **RangeRequestState** Indicates the range request type used. -- **RelatedCV** Correlation vector value generated from the latest USO scan. -- **Result** Outcome of the download request phase of update. -- **SandboxTaggedForReserves** The sandbox for reserves. -- **ScenarioId** Indicates the update scenario. -- **SessionId** Unique value for each attempt (same value for initialize, download, install commit phases). -- **UpdateId** Unique ID for each update. - - -### Update360Telemetry.UpdateAgentExpand - -This event collects information regarding the expansion phase of the new Unified Update Platform (UUP) update scenario, which is leveraged by both Mobile and Desktop. - -The following fields are available: - -- **ElapsedTickCount** Time taken for expand phase. -- **EndFreeSpace** Free space after expand phase. -- **EndSandboxSize** Sandbox size after expand phase. -- **ErrorCode** The error code returned for the current install phase. -- **FlightId** Unique ID for each flight. -- **ObjectId** Unique value for each Update Agent mode. -- **RelatedCV** Correlation vector value generated from the latest USO scan. -- **ScenarioId** Indicates the update scenario. -- **SessionId** Unique value for each update attempt. -- **StartFreeSpace** Free space before expand phase. -- **StartSandboxSize** Sandbox size after expand phase. -- **UpdateId** Unique ID for each update. - - -### Update360Telemetry.UpdateAgentFellBackToCanonical - -This event collects information when express could not be used and we fall back to canonical during the new Unified Update Platform (UUP) update scenario, which is leveraged by both Mobile and Desktop. - -The following fields are available: - -- **FlightId** Unique ID for each flight. -- **ObjectId** Unique value for each Update Agent mode. -- **PackageCount** Number of packages that feel back to canonical. -- **PackageList** PackageIds which fell back to canonical. -- **RelatedCV** Correlation vector value generated from the latest USO scan. -- **ScenarioId** Indicates the update scenario. -- **SessionId** Unique value for each update attempt. -- **UpdateId** Unique ID for each update. - - -### Update360Telemetry.UpdateAgentInitialize - -This event sends data for the initialize phase of updating Windows via the new Unified Update Platform (UUP) scenario, which is applicable to both PCs and Mobile. - -The following fields are available: - -- **ErrorCode** The error code returned for the current install phase. -- **FlightId** Unique ID for each flight. -- **FlightMetadata** Contains the FlightId and the build being flighted. -- **ObjectId** Unique value for each Update Agent mode. -- **RelatedCV** Correlation vector value generated from the latest USO scan. -- **Result** Outcome of the install phase of the update. -- **ScenarioId** Indicates the update scenario. -- **SessionData** String containing instructions to update agent for processing FODs and DUICs (Null for other scenarios). -- **SessionId** Unique value for each update attempt. -- **UpdateId** Unique ID for each update. - - -### Update360Telemetry.UpdateAgentInstall - -This event sends data for the install phase of updating Windows. - -The following fields are available: - -- **ErrorCode** The error code returned for the current install phase. -- **ExtensionName** Indicates whether the payload is related to Operating System content or a plugin. -- **FlightId** Unique value for each Update Agent mode (same concept as InstanceId for Setup360). -- **InternalFailureResult** Indicates a non-fatal error from a plugin. -- **ObjectId** Correlation vector value generated from the latest USO scan. -- **RelatedCV** Correlation vector value generated from the latest USO scan. -- **Result** The result for the current install phase. -- **ScenarioId** Indicates the update scenario. -- **SessionId** Unique value for each update attempt. -- **UpdateId** Unique ID for each update. - - -### Update360Telemetry.UpdateAgentMerge - -The UpdateAgentMerge event sends data on the merge phase when updating Windows. - -The following fields are available: - -- **ErrorCode** The error code returned for the current merge phase. -- **FlightId** Unique ID for each flight. -- **MergeId** The unique ID to join two update sessions being merged. -- **ObjectId** Unique value for each Update Agent mode. -- **RelatedCV** Related correlation vector value. -- **Result** Outcome of the merge phase of the update. -- **ScenarioId** Indicates the update scenario. -- **SessionId** Unique value for each attempt. -- **UpdateId** Unique ID for each update. - - -### Update360Telemetry.UpdateAgentMitigationResult - -This event sends data indicating the result of each update agent mitigation. - -The following fields are available: - -- **Applicable** Indicates whether the mitigation is applicable for the current update. -- **CommandCount** The number of command operations in the mitigation entry. -- **CustomCount** The number of custom operations in the mitigation entry. -- **FileCount** The number of file operations in the mitigation entry. -- **FlightId** Unique identifier for each flight. -- **Index** The mitigation index of this particular mitigation. -- **MitigationScenario** The update scenario in which the mitigation was executed. -- **Name** The friendly name of the mitigation. -- **ObjectId** Unique value for each Update Agent mode. -- **OperationIndex** The mitigation operation index (in the event of a failure). -- **OperationName** The friendly name of the mitigation operation (in the event of failure). -- **RegistryCount** The number of registry operations in the mitigation entry. -- **RelatedCV** The correlation vector value generated from the latest USO scan. -- **Result** The HResult of this operation. -- **ScenarioId** The update agent scenario ID. -- **SessionId** Unique value for each update attempt. -- **TimeDiff** The amount of time spent performing the mitigation (in 100-nanosecond increments). -- **UpdateId** Unique ID for each Update. - - -### Update360Telemetry.UpdateAgentMitigationSummary - -This event sends a summary of all the update agent mitigations available for an this update. - -The following fields are available: - -- **Applicable** The count of mitigations that were applicable to the system and scenario. -- **Failed** The count of mitigations that failed. -- **FlightId** Unique identifier for each flight. -- **MitigationScenario** The update scenario in which the mitigations were attempted. -- **ObjectId** The unique value for each Update Agent mode. -- **RelatedCV** The correlation vector value generated from the latest USO scan. -- **Result** The HResult of this operation. -- **ScenarioId** The update agent scenario ID. -- **SessionId** Unique value for each update attempt. -- **TimeDiff** The amount of time spent performing all mitigations (in 100-nanosecond increments). -- **Total** Total number of mitigations that were available. -- **UpdateId** Unique ID for each update. - - -### Update360Telemetry.UpdateAgentModeStart - -This event sends data for the start of each mode during the process of updating Windows via the new Unified Update Platform (UUP) scenario. Applicable to both PCs and Mobile. - -The following fields are available: - -- **FlightId** Unique ID for each flight. -- **Mode** Indicates the mode that has started. -- **ObjectId** Unique value for each Update Agent mode. -- **RelatedCV** Correlation vector value generated from the latest USO scan. -- **ScenarioId** Indicates the update scenario. -- **SessionId** Unique value for each update attempt. -- **UpdateId** Unique ID for each update. -- **Version** Version of update - - -### Update360Telemetry.UpdateAgentOneSettings - -This event collects information regarding the post reboot phase of the new UUP (Unified Update Platform) update scenario; which is leveraged by both Mobile and Desktop. - -The following fields are available: - -- **Count** The count of applicable OneSettings for the device. -- **FlightId** Unique ID for the flight (test instance version). -- **ObjectId** The unique value for each Update Agent mode. -- **Parameters** The set of name value pair parameters sent to OneSettings to determine if there are any applicable OneSettings. -- **RelatedCV** The correlation vector value generated from the latest USO (Update Service Orchestrator) scan. -- **Result** The HResult of the event. -- **ScenarioId** The ID of the update scenario. -- **SessionId** The ID of the update attempt. -- **UpdateId** The ID of the update. -- **Values** The values sent back to the device, if applicable. - - -### Update360Telemetry.UpdateAgentPostRebootResult - -This event collects information for both Mobile and Desktop regarding the post reboot phase of the new Unified Update Platform (UUP) update scenario. - -The following fields are available: - -- **ErrorCode** The error code returned for the current post reboot phase. -- **FlightId** The specific ID of the Windows Insider build the device is getting. -- **ObjectId** Unique value for each Update Agent mode. -- **PostRebootResult** Indicates the Hresult. -- **RelatedCV** Correlation vector value generated from the latest USO scan. -- **ScenarioId** The scenario ID. Example: MobileUpdate, DesktopLanguagePack, DesktopFeatureOnDemand, or DesktopDriverUpdate. -- **SessionId** Unique value for each update attempt. -- **UpdateId** Unique ID for each update. - - -### Update360Telemetry.UpdateAgentReboot - -This event sends information indicating that a request has been sent to suspend an update. - -The following fields are available: - -- **ErrorCode** The error code returned for the current reboot. -- **FlightId** Unique ID for the flight (test instance version). -- **ObjectId** The unique value for each Update Agent mode. -- **RelatedCV** The correlation vector value generated from the latest USO (Update Service Orchestrator) scan. -- **Result** The HResult of the event. -- **ScenarioId** The ID of the update scenario. -- **SessionId** The ID of the update attempt. -- **UpdateId** The ID of the update. - - -### Update360Telemetry.UpdateAgentSetupBoxLaunch - -The UpdateAgent_SetupBoxLaunch event sends data for the launching of the setup box when updating Windows via the new Unified Update Platform (UUP) scenario. This event is only applicable to PCs. - -The following fields are available: - -- **ContainsExpressPackage** Indicates whether the download package is express. -- **FlightId** Unique ID for each flight. -- **FreeSpace** Free space on OS partition. -- **InstallCount** Number of install attempts using the same sandbox. -- **ObjectId** Unique value for each Update Agent mode. -- **Quiet** Indicates whether setup is running in quiet mode. -- **RelatedCV** Correlation vector value generated from the latest USO scan. -- **SandboxSize** Size of the sandbox. -- **ScenarioId** Indicates the update scenario. -- **SessionId** Unique value for each update attempt. -- **SetupMode** Mode of setup to be launched. -- **UpdateId** Unique ID for each Update. -- **UserSession** Indicates whether install was invoked by user actions. - - -## Update notification events - -### Microsoft.Windows.UpdateNotificationPipeline.UNPCampaignManagerHeartbeat - -This event is sent at the start of the CampaignManager event and is intended to be used as a heartbeat. - -The following fields are available: - -- **CampaignConfigVersion** Configuration version for the current campaign. -- **CampaignID** Currently campaign that is running on Update Notification Pipeline (UNP). -- **ConfigCatalogVersion** Current catalog version of UNP. -- **ContentVersion** Content version for the current campaign on UNP. -- **CV** Correlation vector. -- **DetectorVersion** Most recently run detector version for the current campaign on UNP. -- **GlobalEventCounter** Client-side counter that indicates the event ordering sent by the user. -- **PackageVersion** Current UNP package version. - - -## Upgrade events - -### FacilitatorTelemetry.DCATDownload - -This event indicates whether devices received additional or critical supplemental content during an OS Upgrade, to help keep Windows up-to-date and secure. - -The following fields are available: - -- **DownloadSize** Download size of payload. -- **ElapsedTime** Time taken to download payload. -- **MediaFallbackUsed** Used to determine if we used Media CompDBs to figure out package requirements for the upgrade. -- **ResultCode** Result returned by the Facilitator DCAT call. -- **Scenario** Dynamic update scenario (Image DU, or Setup DU). -- **Type** Type of package that was downloaded. -- **UpdateId** The ID of the update that was downloaded. - - -### FacilitatorTelemetry.DUDownload - -This event returns data about the download of supplemental packages critical to upgrading a device to the next version of Windows. - -The following fields are available: - -- **DownloadRequestAttributes** The attributes sent for download. -- **PackageCategoriesFailed** Lists the categories of packages that failed to download. -- **PackageCategoriesSkipped** Lists the categories of package downloads that were skipped. -- **ResultCode** The result of the event execution. -- **Scenario** Identifies the active Download scenario. -- **Url** The URL the download request was sent to. -- **Version** Identifies the version of Facilitator used. - - -### FacilitatorTelemetry.InitializeDU - -This event determines whether devices received additional or critical supplemental content during an OS upgrade. - -The following fields are available: - -- **DCATUrl** The Delivery Catalog (DCAT) URL we send the request to. -- **DownloadRequestAttributes** The attributes we send to DCAT. -- **ResultCode** The result returned from the initiation of Facilitator with the URL/attributes. -- **Scenario** Dynamic Update scenario (Image DU, or Setup DU). -- **Url** The Delivery Catalog (DCAT) URL we send the request to. -- **Version** Version of Facilitator. - - -### Setup360Telemetry.Downlevel - -This event sends data indicating that the device has started the downlevel phase of the upgrade, to help keep Windows up-to-date and secure. - -The following fields are available: - -- **ClientId** If using Windows Update, this will be the Windows Update client ID that is passed to Setup. In Media setup, the default value is Media360, but it can be overwritten by the caller to a unique value. -- **FlightData** Unique value that identifies the flight. -- **HostOSBuildNumber** The build number of the downlevel OS. -- **HostOsSkuName** The operating system edition which is running Setup360 instance (downlevel OS). -- **InstanceId** A unique GUID that identifies each instance of setuphost.exe. -- **ReportId** In the Windows Update scenario, this is the updateID that is passed to Setup. In media setup, this is the GUID for the install.wim. -- **Setup360Extended** More detailed information about phase/action when the potential failure occurred. -- **Setup360Mode** The phase of Setup360 (for example, Predownload, Install, Finalize, Rollback). -- **Setup360Result** The result of Setup360 (HRESULT used to diagnose errors). -- **Setup360Scenario** The Setup360 flow type (for example, Boot, Media, Update, MCT). -- **SetupVersionBuildNumber** The build number of Setup360 (build number of the target OS). -- **State** Exit state of given Setup360 run. Example: succeeded, failed, blocked, cancelled. -- **TestId** An ID that uniquely identifies a group of events. -- **WuId** This is the Windows Update Client ID. In the Windows Update scenario, this is the same as the clientId. - - -### Setup360Telemetry.Finalize - -This event sends data indicating that the device has started the phase of finalizing the upgrade, to help keep Windows up-to-date and secure. - -The following fields are available: - -- **ClientId** With Windows Update, this will be the Windows Update client ID that is passed to Setup. In Media setup, default value is Media360, but can be overwritten by the caller to a unique value. -- **FlightData** Unique value that identifies the flight. -- **HostOSBuildNumber** The build number of the previous OS. -- **HostOsSkuName** The OS edition which is running Setup360 instance (previous OS). -- **InstanceId** A unique GUID that identifies each instance of setuphost.exe -- **ReportId** With Windows Update, this is the updateID that is passed to Setup. In media setup, this is the GUID for the install.wim. -- **Setup360Extended** More detailed information about the phase/action when the potential failure occurred. -- **Setup360Mode** The phase of Setup360. Example: Predownload, Install, Finalize, Rollback. -- **Setup360Result** The result of Setup360. This is an HRESULT error code that is used to diagnose errors. -- **Setup360Scenario** The Setup360 flow type. Example: Boot, Media, Update, MCT. -- **SetupVersionBuildNumber** The build number of Setup360 (build number of target OS). -- **State** The exit state of a Setup360 run. Example: succeeded, failed, blocked, cancelled. -- **TestId** ID that uniquely identifies a group of events. -- **WuId** This is the Windows Update Client ID. With Windows Update, this is the same as the clientId. - - -### Setup360Telemetry.OsUninstall - -This event sends data regarding OS updates and upgrades from Windows 7, Windows 8, and Windows 10. Specifically, it indicates the outcome of an OS uninstall. - -The following fields are available: - -- **ClientId** For Windows Update, this will be the Windows Update client ID that is passed to Setup. In Media setup, default value is Media360, but can be overwritten by the caller to a unique value. -- **FlightData** Unique value that identifies the flight. -- **HostOSBuildNumber** The build number of the previous OS. -- **HostOsSkuName** The OS edition which is running the Setup360 instance (previous OS). -- **InstanceId** A unique GUID that identifies each instance of setuphost.exe. -- **ReportId** For Windows Update, this will be the Windows Update client ID that is passed to Setup. In Media setup, this is the GUID for the install.wim. -- **Setup360Extended** Detailed information about the phase or action when the potential failure occurred. -- **Setup360Mode** The phase of Setup360. Example: Predownload, Install, Finalize, Rollback. -- **Setup360Result** The result of Setup360. This is an HRESULT error code that is used to diagnose errors. -- **Setup360Scenario** The Setup360 flow type. Example: Boot, Media, Update, MCT -- **SetupVersionBuildNumber** The build number of Setup360 (build number of target OS). -- **State** Exit state of a Setup360 run. Example: succeeded, failed, blocked, cancelled. -- **TestId** ID that uniquely identifies a group of events. -- **WuId** Windows Update client ID. - - -### Setup360Telemetry.PostRebootInstall - -This event sends data indicating that the device has invoked the post reboot install phase of the upgrade, to help keep Windows up-to-date. - -The following fields are available: - -- **ClientId** With Windows Update, this is the Windows Update client ID that is passed to Setup. In Media setup, the default value is Media360, but can be overwritten by the caller to a unique value. -- **FlightData** Unique value that identifies the flight. -- **HostOSBuildNumber** The build number of the previous OS. -- **HostOsSkuName** The OS edition which is running Setup360 instance (previous OS). -- **InstanceId** A unique GUID that identifies each instance of setuphost.exe. -- **ReportId** With Windows Update, this is the updateID that is passed to Setup. In media setup, this is the GUID for the install.wim. -- **Setup360Extended** Extension of result - more granular information about phase/action when the potential failure happened -- **Setup360Mode** The phase of Setup360. Example: Predownload, Install, Finalize, Rollback -- **Setup360Result** The result of Setup360. This is an HRESULT error code that's used to diagnose errors. -- **Setup360Scenario** The Setup360 flow type. Example: Boot, Media, Update, MCT -- **SetupVersionBuildNumber** The build number of Setup360 (build number of target OS). -- **State** The exit state of a Setup360 run. Example: succeeded, failed, blocked, cancelled -- **TestId** A string to uniquely identify a group of events. -- **WuId** This is the Windows Update Client ID. With Windows Update, this is the same as ClientId. - - -### Setup360Telemetry.PreDownloadQuiet - -This event sends data indicating that the device has invoked the predownload quiet phase of the upgrade, to help keep Windows up to date. - -The following fields are available: - -- **ClientId** Using Windows Update, this will be the Windows Update client ID that is passed to Setup. In Media setup, default value is Media360, but can be overwritten by the caller to a unique value. -- **FlightData** Unique value that identifies the flight. -- **HostOSBuildNumber** The build number of the previous OS. -- **HostOsSkuName** The OS edition which is running Setup360 instance (previous operating system). -- **InstanceId** A unique GUID that identifies each instance of setuphost.exe. -- **ReportId** Using Windows Update, this is the updateID that is passed to Setup. In media setup, this is the GUID for the install.wim. -- **Setup360Extended** Detailed information about the phase/action when the potential failure occurred. -- **Setup360Mode** The phase of Setup360. Example: Predownload, Install, Finalize, Rollback. -- **Setup360Result** The result of Setup360. This is an HRESULT error code that is used to diagnose errors. -- **Setup360Scenario** The Setup360 flow type. Example: Boot, Media, Update, MCT. -- **SetupVersionBuildNumber** The build number of Setup360 (build number of target OS). -- **State** The exit state of a Setup360 run. Example: succeeded, failed, blocked, canceled. -- **TestId** ID that uniquely identifies a group of events. -- **WuId** This is the Windows Update Client ID. Using Windows Update, this is the same as the clientId. - - -### Setup360Telemetry.PreDownloadUX - -This event sends data regarding OS Updates and Upgrades from Windows 7.X, Windows 8.X, Windows 10 and RS, to help keep Windows up-to-date and secure. Specifically, it indicates the outcome of the PredownloadUX portion of the update process. - -The following fields are available: - -- **ClientId** For Windows Update, this will be the Windows Update client ID that is passed to Setup. In Media setup, default value is Media360, but can be overwritten by the caller to a unique value. -- **FlightData** In the WU scenario, this will be the WU client ID that is passed to Setup. In Media setup, default value is Media360, but can be overwritten by the caller to a unique value. -- **HostOSBuildNumber** The build number of the previous operating system. -- **HostOsSkuName** The OS edition which is running the Setup360 instance (previous operating system). -- **InstanceId** Unique GUID that identifies each instance of setuphost.exe. -- **ReportId** For Windows Update, this will be the Windows Update client ID that is passed to Setup. In Media setup, this is the GUID for the install.wim. -- **Setup360Extended** Detailed information about the phase/action when the potential failure occurred. -- **Setup360Mode** The phase of Setup360. Example: Predownload, Install, Finalize, Rollback. -- **Setup360Result** The result of Setup360. This is an HRESULT error code that can be used to diagnose errors. -- **Setup360Scenario** The Setup360 flow type. Example: Boot, Media, Update, MCT. -- **SetupVersionBuildNumber** The build number of Setup360 (build number of the target OS). -- **State** The exit state of the Setup360 run. Example: succeeded, failed, blocked, cancelled. -- **TestId** ID that uniquely identifies a group of events. -- **WuId** Windows Update client ID. - - -### Setup360Telemetry.PreInstallQuiet - -This event sends data indicating that the device has invoked the preinstall quiet phase of the upgrade, to help keep Windows up-to-date. - -The following fields are available: - -- **ClientId** With Windows Update, this will be the Windows Update client ID that is passed to Setup. In Media setup, default value is Media360, but can be overwritten by the caller to a unique value. -- **FlightData** Unique value that identifies the flight. -- **HostOSBuildNumber** The build number of the previous OS. -- **HostOsSkuName** The OS edition which is running Setup360 instance (previous OS). -- **InstanceId** A unique GUID that identifies each instance of setuphost.exe -- **ReportId** With Windows Update, this is the updateID that is passed to Setup. In media setup, this is the GUID for the install.wim. -- **Setup360Extended** Detailed information about the phase/action when the potential failure occurred. -- **Setup360Mode** The phase of Setup360. Example: Predownload, Install, Finalize, Rollback. -- **Setup360Result** The result of Setup360. This is an HRESULT error code that can be used to diagnose errors. -- **Setup360Scenario** Setup360 flow type (Boot, Media, Update, MCT). -- **SetupVersionBuildNumber** The build number of Setup360 (build number of target OS). -- **State** The exit state of a Setup360 run. Example: succeeded, failed, blocked, cancelled. -- **TestId** A string to uniquely identify a group of events. -- **WuId** This is the Windows Update Client ID. With Windows Update, this is the same as the clientId. - - -### Setup360Telemetry.PreInstallUX - -This event sends data regarding OS updates and upgrades from Windows 7, Windows 8, and Windows 10, to help keep Windows up-to-date. Specifically, it indicates the outcome of the PreinstallUX portion of the update process. - -The following fields are available: - -- **ClientId** For Windows Update, this will be the Windows Update client ID that is passed to Setup. In Media setup, default value is Media360, but can be overwritten by the caller to a unique value. -- **FlightData** Unique value that identifies the flight. -- **HostOSBuildNumber** The build number of the previous OS. -- **HostOsSkuName** The OS edition which is running the Setup360 instance (previous OS). -- **InstanceId** A unique GUID that identifies each instance of setuphost.exe. -- **ReportId** For Windows Update, this will be the Windows Update client ID that is passed to Setup. In Media setup, this is the GUID for the install.wim. -- **Setup360Extended** Detailed information about the phase/action when the potential failure occurred. -- **Setup360Mode** The phase of Setup360. Example: Predownload, Install, Finalize, Rollback. -- **Setup360Result** The result of Setup360. This is an HRESULT error code that is used to diagnose errors. -- **Setup360Scenario** The Setup360 flow type, Example: Boot, Media, Update, MCT. -- **SetupVersionBuildNumber** The build number of Setup360 (build number of target OS). -- **State** The exit state of a Setup360 run. Example: succeeded, failed, blocked, cancelled. -- **TestId** A string to uniquely identify a group of events. -- **WuId** Windows Update client ID. - - -### Setup360Telemetry.Setup360 - -This event sends data about OS deployment scenarios, to help keep Windows up-to-date. - -The following fields are available: - -- **ClientId** Retrieves the upgrade ID. In the Windows Update scenario, this will be the Windows Update client ID. In Media setup, default value is Media360, but can be overwritten by the caller to a unique value. -- **FieldName** Retrieves the data point. -- **FlightData** Specifies a unique identifier for each group of Windows Insider builds. -- **InstanceId** Retrieves a unique identifier for each instance of a setup session. -- **ReportId** Retrieves the report ID. -- **ScenarioId** Retrieves the deployment scenario. -- **Value** Retrieves the value associated with the corresponding FieldName. - - -### Setup360Telemetry.Setup360DynamicUpdate - -This event helps determine whether the device received supplemental content during an operating system upgrade, to help keep Windows up-to-date. - -The following fields are available: - -- **FlightData** Specifies a unique identifier for each group of Windows Insider builds. -- **InstanceId** Retrieves a unique identifier for each instance of a setup session. -- **Operation** Facilitator’s last known operation (scan, download, etc.). -- **ReportId** ID for tying together events stream side. -- **ResultCode** Result returned for the entire setup operation. -- **Scenario** Dynamic Update scenario (Image DU, or Setup DU). -- **ScenarioId** Identifies the update scenario. -- **TargetBranch** Branch of the target OS. -- **TargetBuild** Build of the target OS. - - -### Setup360Telemetry.Setup360MitigationResult - -This event sends data indicating the result of each setup mitigation. - -The following fields are available: - -- **Applicable** TRUE if the mitigation is applicable for the current update. -- **ClientId** In the Windows Update scenario, this is the client ID passed to Setup. In Media setup, default value is Media360, but can be overwritten by the caller to a unique value. -- **CommandCount** The number of command operations in the mitigation entry. -- **CustomCount** The number of custom operations in the mitigation entry. -- **FileCount** The number of file operations in the mitigation entry. -- **FlightData** The unique identifier for each flight (test release). -- **Index** The mitigation index of this particular mitigation. -- **InstanceId** The GUID (Globally Unique ID) that identifies each instance of SetupHost.EXE. -- **MitigationScenario** The update scenario in which the mitigation was executed. -- **Name** The friendly (descriptive) name of the mitigation. -- **OperationIndex** The mitigation operation index (in the event of a failure). -- **OperationName** The friendly (descriptive) name of the mitigation operation (in the event of failure). -- **RegistryCount** The number of registry operations in the mitigation entry. -- **ReportId** In the Windows Update scenario, the Update ID that is passed to Setup. In media setup, this is the GUID for the INSTALL.WIM. -- **Result** HResult of this operation. -- **ScenarioId** Setup360 flow type. -- **TimeDiff** The amount of time spent performing the mitigation (in 100-nanosecond increments). - - -### Setup360Telemetry.Setup360MitigationSummary - -This event sends a summary of all the setup mitigations available for this update. - -The following fields are available: - -- **Applicable** The count of mitigations that were applicable to the system and scenario. -- **ClientId** The Windows Update client ID passed to Setup. -- **Failed** The count of mitigations that failed. -- **FlightData** The unique identifier for each flight (test release). -- **InstanceId** The GUID (Globally Unique ID) that identifies each instance of SetupHost.EXE. -- **MitigationScenario** The update scenario in which the mitigations were attempted. -- **ReportId** In the Windows Update scenario, the Update ID that is passed to Setup. In media setup, this is the GUID for the INSTALL.WIM. -- **Result** HResult of this operation. -- **ScenarioId** Setup360 flow type. -- **TimeDiff** The amount of time spent performing the mitigation (in 100-nanosecond increments). -- **Total** The total number of mitigations that were available. - - -### Setup360Telemetry.Setup360OneSettings - -This event collects information regarding the post reboot phase of the new UUP (Unified Update Platform) update scenario; which is leveraged by both Mobile and Desktop. - -The following fields are available: - -- **ClientId** The Windows Update client ID passed to Setup. -- **Count** The count of applicable OneSettings for the device. -- **FlightData** The ID for the flight (test instance version). -- **InstanceId** The GUID (Globally-Unique ID) that identifies each instance of setuphost.exe. -- **Parameters** The set of name value pair parameters sent to OneSettings to determine if there are any applicable OneSettings. -- **ReportId** The Update ID passed to Setup. -- **Result** The HResult of the event error. -- **ScenarioId** The update scenario ID. -- **Values** Values sent back to the device, if applicable. - - -### Setup360Telemetry.UnexpectedEvent - -This event sends data indicating that the device has invoked the unexpected event phase of the upgrade, to help keep Windows up to date. - -The following fields are available: - -- **ClientId** With Windows Update, this will be the Windows Update client ID that is passed to Setup. In Media setup, default value is Media360, but can be overwritten by the caller to a unique value. -- **FlightData** Unique value that identifies the flight. -- **HostOSBuildNumber** The build number of the previous OS. -- **HostOsSkuName** The OS edition which is running Setup360 instance (previous OS). -- **InstanceId** A unique GUID that identifies each instance of setuphost.exe -- **ReportId** With Windows Update, this is the updateID that is passed to Setup. In media setup, this is the GUID for the install.wim. -- **Setup360Extended** Detailed information about the phase/action when the potential failure occurred. -- **Setup360Mode** The phase of Setup360. Example: Predownload, Install, Finalize, Rollback. -- **Setup360Result** The result of Setup360. This is an HRESULT error code that can be used used to diagnose errors. -- **Setup360Scenario** The Setup360 flow type. Example: Boot, Media, Update, MCT. -- **SetupVersionBuildNumber** The build number of Setup360 (build number of target OS). -- **State** The exit state of a Setup360 run. Example: succeeded, failed, blocked, cancelled. -- **TestId** A string to uniquely identify a group of events. -- **WuId** This is the Windows Update Client ID. With Windows Update, this is the same as the clientId. - - -## Windows as a Service diagnostic events - -### Microsoft.Windows.WaaSMedic.SummaryEvent - -Result of the WaaSMedic operation. - -The following fields are available: - -- **callerApplication** The name of the calling application. -- **detectionSummary** Result of each applicable detection that was run. -- **featureAssessmentImpact** WaaS Assessment impact for feature updates. -- **hrEngineResult** Error code from the engine operation. -- **insufficientSessions** Device not eligible for diagnostics. -- **isInteractiveMode** The user started a run of WaaSMedic. -- **isManaged** Device is managed for updates. -- **isWUConnected** Device is connected to Windows Update. -- **noMoreActions** No more applicable diagnostics. -- **qualityAssessmentImpact** WaaS Assessment impact for quality updates. -- **remediationSummary** Result of each operation performed on a device to fix an invalid state or configuration that's preventing the device from getting updates. For example, if Windows Update service is turned off, the fix is to turn the it back on. -- **usingBackupFeatureAssessment** Relying on backup feature assessment. -- **usingBackupQualityAssessment** Relying on backup quality assessment. -- **usingCachedFeatureAssessment** WaaS Medic run did not get OS build age from the network on the previous run. -- **usingCachedQualityAssessment** WaaS Medic run did not get OS revision age from the network on the previous run. -- **versionString** Version of the WaaSMedic engine. -- **waasMedicRunMode** Indicates whether this was a background regular run of the medic or whether it was triggered by a user launching Windows Update Troubleshooter. - - -## Windows Error Reporting events - -### Microsoft.Windows.WERVertical.OSCrash - -This event sends binary data from the collected dump file wheneveer a bug check occurs, to help keep Windows up to date. The is the OneCore version of this event. - -The following fields are available: - -- **BootId** Uint32 identifying the boot number for this device. -- **BugCheckCode** Uint64 "bugcheck code" that identifies a proximate cause of the bug check. -- **BugCheckParameter1** Uint64 parameter providing additional information. -- **BugCheckParameter2** Uint64 parameter providing additional information. -- **BugCheckParameter3** Uint64 parameter providing additional information. -- **BugCheckParameter4** Uint64 parameter providing additional information. -- **DumpFileAttributes** Codes that identify the type of data contained in the dump file -- **DumpFileSize** Size of the dump file -- **IsValidDumpFile** True if the dump file is valid for the debugger, false otherwise -- **ReportId** WER Report Id associated with this bug check (used for finding the corresponding report archive in Watson). - - -## Windows Error Reporting MTT events - -### Microsoft.Windows.WER.MTT.Denominator - -This event provides a denominator to calculate MTTF (mean-time-to-failure) for crashes and other errors, to help keep Windows up to date. - -The following fields are available: - -- **DPRange** Maximum mean value range. -- **DPValue** Randomized bit value (0 or 1) that can be reconstituted over a large population to estimate the mean. -- **Value** Standard UTC emitted DP value structure See [Value](#value). - - -### Value - -This event returns data about Mean Time to Failure (MTTF) for Windows devices. It is the primary means of estimating reliability problems in Basic Diagnostic reporting with very strong privacy guarantees. Since Basic Diagnostic reporting does not include system up-time, and since that information is important to ensuring the safe and stable operation of Windows, the data provided by this event provides that data in a manner which does not threaten a user’s privacy. - -The following fields are available: - -- **Algorithm** The algorithm used to preserve privacy. -- **DPRange** The upper bound of the range being measured. -- **DPValue** The randomized response returned by the client. -- **Epsilon** The level of privacy to be applied. -- **HistType** The histogram type if the algorithm is a histogram algorithm. -- **PertProb** The probability the entry will be Perturbed if the algorithm chosen is “heavy-hitters”. - - -## Microsoft Store events - -### Microsoft.Windows.Store.StoreActivating - -This event sends tracking data about when the Store app activation via protocol URI is in progress, to help keep Windows up to date. - - - -### Microsoft.Windows.StoreAgent.Telemetry.AbortedInstallation - -This event is sent when an installation or update is canceled by a user or the system and is used to help keep Windows Apps up to date and secure. - -The following fields are available: - -- **AggregatedPackageFullNames** The names of all packages to be downloaded and installed. -- **AttemptNumber** Number of retry attempts before it was canceled. -- **BundleId** The Item Bundle ID. -- **CategoryId** The Item Category ID. -- **ClientAppId** The identity of the app that initiated this operation. -- **HResult** The result code of the last action performed before this operation. -- **IsBundle** Is this a bundle? -- **IsInteractive** Was this requested by a user? -- **IsMandatory** Was this a mandatory update? -- **IsRemediation** Was this a remediation install? -- **IsRestore** Is this automatically restoring a previously acquired product? -- **IsUpdate** Flag indicating if this is an update. -- **ParentBundleId** The product ID of the parent (if this product is part of a bundle). -- **PFN** The product family name of the product being installed. -- **ProductId** The identity of the package or packages being installed. -- **SystemAttemptNumber** The total number of automatic attempts at installation before it was canceled. -- **UserAttemptNumber** The total number of user attempts at installation before it was canceled. -- **WUContentId** The Windows Update content ID. - - -### Microsoft.Windows.StoreAgent.Telemetry.BeginGetInstalledContentIds - -This event is sent when an inventory of the apps installed is started to determine whether updates for those apps are available. It's used to help keep Windows up-to-date and secure. - - - -### Microsoft.Windows.StoreAgent.Telemetry.BeginUpdateMetadataPrepare - -This event is sent when the Store Agent cache is refreshed with any available package updates. It's used to help keep Windows up-to-date and secure. - - - -### Microsoft.Windows.StoreAgent.Telemetry.CancelInstallation - -This event is sent when an app update or installation is canceled while in interactive mode. This can be canceled by the user or the system. It's used to help keep Windows up-to-date and secure. - -The following fields are available: - -- **AggregatedPackageFullNames** The names of all package or packages to be downloaded and installed. -- **AttemptNumber** Total number of installation attempts. -- **BundleId** The identity of the Windows Insider build that is associated with this product. -- **CategoryId** The identity of the package or packages being installed. -- **ClientAppId** The identity of the app that initiated this operation. -- **IsBundle** Is this a bundle? -- **IsInteractive** Was this requested by a user? -- **IsMandatory** Is this a mandatory update? -- **IsRemediation** Is this repairing a previous installation? -- **IsRestore** Is this an automatic restore of a previously acquired product? -- **IsUpdate** Is this a product update? -- **ParentBundleId** The product ID of the parent (if this product is part of a bundle). -- **PFN** The name of all packages to be downloaded and installed. -- **PreviousHResult** The previous HResult code. -- **PreviousInstallState** Previous installation state before it was canceled. -- **ProductId** The name of the package or packages requested for installation. -- **RelatedCV** Correlation Vector of a previous performed action on this product. -- **SystemAttemptNumber** Total number of automatic attempts to install before it was canceled. -- **UserAttemptNumber** Total number of user attempts to install before it was canceled. -- **WUContentId** The Windows Update content ID. - - -### Microsoft.Windows.StoreAgent.Telemetry.CompleteInstallOperationRequest - -This event is sent at the end of app installations or updates to help keep Windows up-to-date and secure. - -The following fields are available: - -- **CatalogId** The Store Product ID of the app being installed. -- **HResult** HResult code of the action being performed. -- **IsBundle** Is this a bundle? -- **PackageFamilyName** The name of the package being installed. -- **ProductId** The Store Product ID of the product being installed. -- **SkuId** Specific edition of the item being installed. - - -### Microsoft.Windows.StoreAgent.Telemetry.EndAcquireLicense - -This event is sent after the license is acquired when a product is being installed. It's used to help keep Windows up-to-date and secure. - -The following fields are available: - -- **AggregatedPackageFullNames** Includes a set of package full names for each app that is part of an atomic set. -- **AttemptNumber** The total number of attempts to acquire this product. -- **CategoryId** The identity of the package or packages being installed. -- **ClientAppId** The identity of the app that initiated this operation. -- **HResult** HResult code to show the result of the operation (success/failure). -- **IsBundle** Is this a bundle? -- **IsInteractive** Did the user initiate the installation? -- **IsMandatory** Is this a mandatory update? -- **IsRemediation** Is this repairing a previous installation? -- **IsRestore** Is this happening after a device restore? -- **IsUpdate** Is this an update? -- **PFN** Product Family Name of the product being installed. -- **ProductId** The Store Product ID for the product being installed. -- **SystemAttemptNumber** The number of attempts by the system to acquire this product. -- **UserAttemptNumber** The number of attempts by the user to acquire this product -- **WUContentId** The Windows Update content ID. - - -### Microsoft.Windows.StoreAgent.Telemetry.EndDownload - -This event is sent after an app is downloaded to help keep Windows up-to-date and secure. - -The following fields are available: - -- **AggregatedPackageFullNames** The name of all packages to be downloaded and installed. -- **AttemptNumber** Number of retry attempts before it was canceled. -- **BundleId** The identity of the Windows Insider build associated with this product. -- **CategoryId** The identity of the package or packages being installed. -- **ClientAppId** The identity of the app that initiated this operation. -- **DownloadSize** The total size of the download. -- **ExtendedHResult** Any extended HResult error codes. -- **HResult** The result code of the last action performed. -- **IsBundle** Is this a bundle? -- **IsInteractive** Is this initiated by the user? -- **IsMandatory** Is this a mandatory installation? -- **IsRemediation** Is this repairing a previous installation? -- **IsRestore** Is this a restore of a previously acquired product? -- **IsUpdate** Is this an update? -- **ParentBundleId** The parent bundle ID (if it's part of a bundle). -- **PFN** The Product Family Name of the app being download. -- **ProductId** The Store Product ID for the product being installed. -- **SystemAttemptNumber** The number of attempts by the system to download. -- **UserAttemptNumber** The number of attempts by the user to download. -- **WUContentId** The Windows Update content ID. - - -### Microsoft.Windows.StoreAgent.Telemetry.EndFrameworkUpdate - -This event is sent when an app update requires an updated Framework package and the process starts to download it. It is used to help keep Windows up-to-date and secure. - -The following fields are available: - -- **HResult** The result code of the last action performed before this operation. - - -### Microsoft.Windows.StoreAgent.Telemetry.EndGetInstalledContentIds - -This event is sent after sending the inventory of the products installed to determine whether updates for those products are available. It's used to help keep Windows up-to-date and secure. - -The following fields are available: - -- **HResult** The result code of the last action performed before this operation. - - -### Microsoft.Windows.StoreAgent.Telemetry.EndInstall - -This event is sent after a product has been installed to help keep Windows up-to-date and secure. - -The following fields are available: - -- **AggregatedPackageFullNames** The names of all packages to be downloaded and installed. -- **AttemptNumber** The number of retry attempts before it was canceled. -- **BundleId** The identity of the build associated with this product. -- **CategoryId** The identity of the package or packages being installed. -- **ClientAppId** The identity of the app that initiated this operation. -- **ExtendedHResult** The extended HResult error code. -- **HResult** The result code of the last action performed. -- **IsBundle** Is this a bundle? -- **IsInteractive** Is this an interactive installation? -- **IsMandatory** Is this a mandatory installation? -- **IsRemediation** Is this repairing a previous installation? -- **IsRestore** Is this automatically restoring a previously acquired product? -- **IsUpdate** Is this an update? -- **ParentBundleId** The product ID of the parent (if this product is part of a bundle). -- **PFN** Product Family Name of the product being installed. -- **ProductId** The Store Product ID for the product being installed. -- **SystemAttemptNumber** The total number of system attempts. -- **UserAttemptNumber** The total number of user attempts. -- **WUContentId** The Windows Update content ID. - - -### Microsoft.Windows.StoreAgent.Telemetry.EndScanForUpdates - -This event is sent after a scan for product updates to determine if there are packages to install. It's used to help keep Windows up-to-date and secure. - -The following fields are available: - -- **ClientAppId** The identity of the app that initiated this operation. -- **HResult** The result code of the last action performed. -- **IsApplicability** Is this request to only check if there are any applicable packages to install? -- **IsInteractive** Is this user requested? -- **IsOnline** Is the request doing an online check? - - -### Microsoft.Windows.StoreAgent.Telemetry.EndSearchUpdatePackages - -This event is sent after searching for update packages to install. It is used to help keep Windows up-to-date and secure. - -The following fields are available: - -- **AggregatedPackageFullNames** The names of all packages to be downloaded and installed. -- **AttemptNumber** The total number of retry attempts before it was canceled. -- **BundleId** The identity of the build associated with this product. -- **CategoryId** The identity of the package or packages being installed. -- **ClientAppId** The identity of the app that initiated this operation. -- **HResult** The result code of the last action performed. -- **IsBundle** Is this a bundle? -- **IsInteractive** Is this user requested? -- **IsMandatory** Is this a mandatory update? -- **IsRemediation** Is this repairing a previous installation? -- **IsRestore** Is this restoring previously acquired content? -- **IsUpdate** Is this an update? -- **ParentBundleId** The product ID of the parent (if this product is part of a bundle). -- **PFN** The name of the package or packages requested for install. -- **ProductId** The Store Product ID for the product being installed. -- **SystemAttemptNumber** The total number of system attempts. -- **UserAttemptNumber** The total number of user attempts. -- **WUContentId** The Windows Update content ID. - - -### Microsoft.Windows.StoreAgent.Telemetry.EndStageUserData - -This event is sent after restoring user data (if any) that needs to be restored following a product install. It is used to keep Windows up-to-date and secure. - -The following fields are available: - -- **AggregatedPackageFullNames** The name of all packages to be downloaded and installed. -- **AttemptNumber** The total number of retry attempts before it was canceled. -- **BundleId** The identity of the build associated with this product. -- **CategoryId** The identity of the package or packages being installed. -- **ClientAppId** The identity of the app that initiated this operation. -- **HResult** The result code of the last action performed. -- **IsBundle** Is this a bundle? -- **IsInteractive** Is this user requested? -- **IsMandatory** Is this a mandatory update? -- **IsRemediation** Is this repairing a previous installation? -- **IsRestore** Is this restoring previously acquired content? -- **IsUpdate** Is this an update? -- **ParentBundleId** The product ID of the parent (if this product is part of a bundle). -- **PFN** The name of the package or packages requested for install. -- **ProductId** The Store Product ID for the product being installed. -- **SystemAttemptNumber** The total number of system attempts. -- **UserAttemptNumber** The total number of system attempts. -- **WUContentId** The Windows Update content ID. - - -### Microsoft.Windows.StoreAgent.Telemetry.EndUpdateMetadataPrepare - -This event is sent after a scan for available app updates to help keep Windows up-to-date and secure. - -The following fields are available: - -- **HResult** The result code of the last action performed. - - -### Microsoft.Windows.StoreAgent.Telemetry.FulfillmentComplete - -This event is sent at the end of an app install or update to help keep Windows up-to-date and secure. - -The following fields are available: - -- **CatalogId** The name of the product catalog from which this app was chosen. -- **FailedRetry** Indicates whether the installation or update retry was successful. -- **HResult** The HResult code of the operation. -- **PFN** The Package Family Name of the app that is being installed or updated. -- **ProductId** The product ID of the app that is being updated or installed. - - -### Microsoft.Windows.StoreAgent.Telemetry.FulfillmentInitiate - -This event is sent at the beginning of an app install or update to help keep Windows up-to-date and secure. - -The following fields are available: - -- **CatalogId** The name of the product catalog from which this app was chosen. -- **FulfillmentPluginId** The ID of the plugin needed to install the package type of the product. -- **PFN** The Package Family Name of the app that is being installed or updated. -- **PluginTelemetryData** Diagnostic information specific to the package-type plug-in. -- **ProductId** The product ID of the app that is being updated or installed. - - -### Microsoft.Windows.StoreAgent.Telemetry.InstallOperationRequest - -This event is sent when a product install or update is initiated, to help keep Windows up-to-date and secure. - -The following fields are available: - -- **BundleId** The identity of the build associated with this product. -- **CatalogId** If this product is from a private catalog, the Store Product ID for the product being installed. -- **ProductId** The Store Product ID for the product being installed. -- **SkuId** Specific edition ID being installed. -- **VolumePath** The disk path of the installation. - - -### Microsoft.Windows.StoreAgent.Telemetry.PauseInstallation - -This event is sent when a product install or update is paused (either by a user or the system), to help keep Windows up-to-date and secure. - -The following fields are available: - -- **AggregatedPackageFullNames** The names of all packages to be downloaded and installed. -- **AttemptNumber** The total number of retry attempts before it was canceled. -- **BundleId** The identity of the build associated with this product. -- **CategoryId** The identity of the package or packages being installed. -- **ClientAppId** The identity of the app that initiated this operation. -- **IsBundle** Is this a bundle? -- **IsInteractive** Is this user requested? -- **IsMandatory** Is this a mandatory update? -- **IsRemediation** Is this repairing a previous installation? -- **IsRestore** Is this restoring previously acquired content? -- **IsUpdate** Is this an update? -- **ParentBundleId** The product ID of the parent (if this product is part of a bundle). -- **PFN** The Product Full Name. -- **PreviousHResult** The result code of the last action performed before this operation. -- **PreviousInstallState** Previous state before the installation or update was paused. -- **ProductId** The Store Product ID for the product being installed. -- **RelatedCV** Correlation Vector of a previous performed action on this product. -- **SystemAttemptNumber** The total number of system attempts. -- **UserAttemptNumber** The total number of user attempts. -- **WUContentId** The Windows Update content ID. - - -### Microsoft.Windows.StoreAgent.Telemetry.ResumeInstallation - -This event is sent when a product install or update is resumed (either by a user or the system), to help keep Windows up-to-date and secure. - -The following fields are available: - -- **AggregatedPackageFullNames** The names of all packages to be downloaded and installed. -- **AttemptNumber** The number of retry attempts before it was canceled. -- **BundleId** The identity of the build associated with this product. -- **CategoryId** The identity of the package or packages being installed. -- **ClientAppId** The identity of the app that initiated this operation. -- **HResult** The result code of the last action performed before this operation. -- **IsBundle** Is this a bundle? -- **IsInteractive** Is this user requested? -- **IsMandatory** Is this a mandatory update? -- **IsRemediation** Is this repairing a previous installation? -- **IsRestore** Is this restoring previously acquired content? -- **IsUpdate** Is this an update? -- **IsUserRetry** Did the user initiate the retry? -- **ParentBundleId** The product ID of the parent (if this product is part of a bundle). -- **PFN** The name of the package or packages requested for install. -- **PreviousHResult** The previous HResult error code. -- **PreviousInstallState** Previous state before the installation was paused. -- **ProductId** The Store Product ID for the product being installed. -- **RelatedCV** Correlation Vector for the original install before it was resumed. -- **ResumeClientId** The ID of the app that initiated the resume operation. -- **SystemAttemptNumber** The total number of system attempts. -- **UserAttemptNumber** The total number of user attempts. -- **WUContentId** The Windows Update content ID. - - -### Microsoft.Windows.StoreAgent.Telemetry.ResumeOperationRequest - -This event is sent when a product install or update is resumed by a user or on installation retries, to help keep Windows up-to-date and secure. - -The following fields are available: - -- **ProductId** The Store Product ID for the product being installed. - - -### Microsoft.Windows.StoreAgent.Telemetry.SearchForUpdateOperationRequest - -This event is sent when searching for update packages to install, to help keep Windows up-to-date and secure. - -The following fields are available: - -- **CatalogId** The Store Catalog ID for the product being installed. -- **ProductId** The Store Product ID for the product being installed. -- **SkuId** Specfic edition of the app being updated. - - -### Microsoft.Windows.StoreAgent.Telemetry.UpdateAppOperationRequest - -This event occurs when an update is requested for an app, to help keep Windows up-to-date and secure. - -The following fields are available: - -- **PFamN** The name of the app that is requested for update. - - -## Windows System Kit events - -### Microsoft.Windows.Kits.WSK.WskImageCreate - -This event sends simple Product and Service usage data when a user is using the Windows System Kit to create new OS “images”. The data includes the version of the Windows System Kit and the state of the event and is used to help investigate “image” creation failures. - -The following fields are available: - -- **Phase** The image creation phase. Values are “Start” or “End”. -- **WskVersion** The version of the Windows System Kit being used. - - -### Microsoft.Windows.Kits.WSK.WskImageCustomization - -This event sends simple Product and Service usage data when a user is using the Windows System Kit to create/modify configuration files allowing the customization of a new OS image with Apps or Drivers. The data includes the version of the Windows System Kit, the state of the event, the customization type (drivers or apps) and the mode (new or updating) and is used to help investigate configuration file creation failures. - -The following fields are available: - -- **CustomizationMode** Indicates the mode of the customization (new or updating). -- **CustomizationType** Indicates the type of customization (drivers or apps). -- **Mode** The mode of update to image configuration files. Values are “New” or “Update”. -- **Phase** The image creation phase. Values are “Start” or “End”. -- **Type** The type of update to image configuration files. Values are “Apps” or “Drivers”. -- **WskVersion** The version of the Windows System Kit being used. - - -### Microsoft.Windows.Kits.WSK.WskWorkspaceCreate - -This event sends simple Product and Service usage data when a user is using the Windows System Kit to create new workspace for generating OS “images”. The data includes the version of the Windows System Kit and the state of the event and is used to help investigate workspace creation failures. - -The following fields are available: - -- **Architecture** The OS architecture that the workspace will target. Values are one of: “AMD64”, “ARM64”, “x86”, or “ARM”. -- **OsEdition** The Operating System Edition that the workspace will target. -- **Phase** The image creation phase. Values are “Start” or “End”. -- **WorkspaceArchitecture** The operating system architecture that the workspace will target. -- **WorkspaceOsEdition** The operating system edition that the workspace will target. -- **WskVersion** The version of the Windows System Kit being used. - - -## Windows Update Delivery Optimization events - -### Microsoft.OSG.DU.DeliveryOptClient.DownloadCanceled - -This event describes when a download was canceled with Delivery Optimization. It's used to understand and address problems regarding downloads. - -The following fields are available: - -- **background** Is the download being done in the background? -- **bytesFromCacheServer** Bytes received from a cache host. -- **bytesFromCDN** The number of bytes received from a CDN source. -- **bytesFromGroupPeers** The number of bytes received from a peer in the same group. -- **bytesFromIntPeers** The number of bytes received from peers not in the same LAN or in the same group. -- **bytesFromLocalCache** Bytes copied over from local (on disk) cache. -- **bytesFromPeers** The number of bytes received from a peer in the same LAN. -- **cdnErrorCodes** A list of CDN connection errors since the last FailureCDNCommunication event. -- **cdnErrorCounts** The number of times each error in cdnErrorCodes was encountered. -- **cdnIp** The IP Address of the source CDN (Content Delivery Network). -- **cdnUrl** The URL of the source CDN (Content Delivery Network). -- **dataSourcesTotal** Bytes received per source type, accumulated for the whole session. -- **errorCode** The error code that was returned. -- **experimentId** When running a test, this is used to correlate events that are part of the same test. -- **fileID** The ID of the file being downloaded. -- **gCurMemoryStreamBytes** Current usage for memory streaming. -- **gMaxMemoryStreamBytes** Maximum usage for memory streaming. -- **isVpn** Indicates whether the device is connected to a VPN (Virtual Private Network). -- **jobID** Identifier for the Windows Update job. -- **predefinedCallerName** The name of the API Caller. -- **reasonCode** Reason the action or event occurred. -- **routeToCacheServer** The cache server setting, source, and value. -- **sessionID** The ID of the file download session. -- **updateID** The ID of the update being downloaded. -- **usedMemoryStream** TRUE if the download is using memory streaming for App downloads. - - -### Microsoft.OSG.DU.DeliveryOptClient.DownloadCompleted - -This event describes when a download has completed with Delivery Optimization. It's used to understand and address problems regarding downloads. - -The following fields are available: - -- **background** Is the download a background download? -- **bytesFromCacheServer** Bytes received from a cache host. -- **bytesFromCDN** The number of bytes received from a CDN source. -- **bytesFromGroupPeers** The number of bytes received from a peer in the same domain group. -- **bytesFromIntPeers** The number of bytes received from peers not in the same LAN or in the same domain group. -- **bytesFromLinkLocalPeers** The number of bytes received from local peers. -- **bytesFromLocalCache** Bytes copied over from local (on disk) cache. -- **bytesFromPeers** The number of bytes received from a peer in the same LAN. -- **bytesRequested** The total number of bytes requested for download. -- **cacheServerConnectionCount** Number of connections made to cache hosts. -- **cdnConnectionCount** The total number of connections made to the CDN. -- **cdnErrorCodes** A list of CDN connection errors since the last FailureCDNCommunication event. -- **cdnErrorCounts** The number of times each error in cdnErrorCodes was encountered. -- **cdnIp** The IP address of the source CDN. -- **cdnUrl** Url of the source Content Distribution Network (CDN). -- **dataSourcesTotal** Bytes received per source type, accumulated for the whole session. -- **doErrorCode** The Delivery Optimization error code that was returned. -- **downlinkBps** The maximum measured available download bandwidth (in bytes per second). -- **downlinkUsageBps** The download speed (in bytes per second). -- **downloadMode** The download mode used for this file download session. -- **downloadModeReason** Reason for the download. -- **downloadModeSrc** Source of the DownloadMode setting (KvsProvider = 0, GeoProvider = 1, GeoVerProvider = 2, CpProvider = 3, DiscoveryProvider = 4, RegistryProvider = 5, GroupPolicyProvider = 6, MdmProvider = 7, SettingsProvider = 8, InvalidProviderType = 9). -- **experimentId** When running a test, this is used to correlate with other events that are part of the same test. -- **fileID** The ID of the file being downloaded. -- **fileSize** The size of the file being downloaded. -- **gCurMemoryStreamBytes** Current usage for memory streaming. -- **gMaxMemoryStreamBytes** Maximum usage for memory streaming. -- **groupConnectionCount** The total number of connections made to peers in the same group. -- **internetConnectionCount** The total number of connections made to peers not in the same LAN or the same group. -- **isEncrypted** TRUE if the file is encrypted and will be decrypted after download. -- **isVpn** Is the device connected to a Virtual Private Network? -- **jobID** Identifier for the Windows Update job. -- **lanConnectionCount** The total number of connections made to peers in the same LAN. -- **linkLocalConnectionCount** The number of connections made to peers in the same Link-local network. -- **numPeers** The total number of peers used for this download. -- **numPeersLocal** The total number of local peers used for this download. -- **predefinedCallerName** The name of the API Caller. -- **restrictedUpload** Is the upload restricted? -- **routeToCacheServer** The cache server setting, source, and value. -- **sessionID** The ID of the download session. -- **totalTimeMs** Duration of the download (in seconds). -- **updateID** The ID of the update being downloaded. -- **uplinkBps** The maximum measured available upload bandwidth (in bytes per second). -- **uplinkUsageBps** The upload speed (in bytes per second). -- **usedMemoryStream** TRUE if the download is using memory streaming for App downloads. - - -### Microsoft.OSG.DU.DeliveryOptClient.DownloadPaused - -This event represents a temporary suspension of a download with Delivery Optimization. It's used to understand and address problems regarding downloads. - -The following fields are available: - -- **background** Is the download a background download? -- **cdnUrl** The URL of the source CDN (Content Delivery Network). -- **errorCode** The error code that was returned. -- **experimentId** When running a test, this is used to correlate with other events that are part of the same test. -- **fileID** The ID of the file being paused. -- **isVpn** Is the device connected to a Virtual Private Network? -- **jobID** Identifier for the Windows Update job. -- **predefinedCallerName** The name of the API Caller object. -- **reasonCode** The reason for pausing the download. -- **routeToCacheServer** The cache server setting, source, and value. -- **sessionID** The ID of the download session. -- **updateID** The ID of the update being paused. - - -### Microsoft.OSG.DU.DeliveryOptClient.DownloadStarted - -This event sends data describing the start of a new download to enable Delivery Optimization. It's used to understand and address problems regarding downloads. - -The following fields are available: - -- **background** Indicates whether the download is happening in the background. -- **bytesRequested** Number of bytes requested for the download. -- **cdnUrl** The URL of the source Content Distribution Network (CDN). -- **costFlags** A set of flags representing network cost. -- **deviceProfile** Identifies the usage or form factor (such as Desktop, Xbox, or VM). -- **diceRoll** Random number used for determining if a client will use peering. -- **doClientVersion** The version of the Delivery Optimization client. -- **doErrorCode** The Delivery Optimization error code that was returned. -- **downloadMode** The download mode used for this file download session (CdnOnly = 0, Lan = 1, Group = 2, Internet = 3, Simple = 99, Bypass = 100). -- **downloadModeReason** Reason for the download. -- **downloadModeSrc** Source of the DownloadMode setting (KvsProvider = 0, GeoProvider = 1, GeoVerProvider = 2, CpProvider = 3, DiscoveryProvider = 4, RegistryProvider = 5, GroupPolicyProvider = 6, MdmProvider = 7, SettingsProvider = 8, InvalidProviderType = 9). -- **errorCode** The error code that was returned. -- **experimentId** ID used to correlate client/services calls that are part of the same test during A/B testing. -- **fileID** The ID of the file being downloaded. -- **filePath** The path to where the downloaded file will be written. -- **fileSize** Total file size of the file that was downloaded. -- **fileSizeCaller** Value for total file size provided by our caller. -- **groupID** ID for the group. -- **isEncrypted** Indicates whether the download is encrypted. -- **isVpn** Indicates whether the device is connected to a Virtual Private Network. -- **jobID** The ID of the Windows Update job. -- **peerID** The ID for this delivery optimization client. -- **predefinedCallerName** Name of the API caller. -- **routeToCacheServer** Cache server setting, source, and value. -- **sessionID** The ID for the file download session. -- **setConfigs** A JSON representation of the configurations that have been set, and their sources. -- **updateID** The ID of the update being downloaded. -- **usedMemoryStream** Indicates whether the download used memory streaming. - - -### Microsoft.OSG.DU.DeliveryOptClient.FailureCdnCommunication - -This event represents a failure to download from a CDN with Delivery Optimization. It's used to understand and address problems regarding downloads. - -The following fields are available: - -- **cdnHeaders** The HTTP headers returned by the CDN. -- **cdnIp** The IP address of the CDN. -- **cdnUrl** The URL of the CDN. -- **errorCode** The error code that was returned. -- **errorCount** The total number of times this error code was seen since the last FailureCdnCommunication event was encountered. -- **experimentId** When running a test, this is used to correlate with other events that are part of the same test. -- **fileID** The ID of the file being downloaded. -- **httpStatusCode** The HTTP status code returned by the CDN. -- **isHeadRequest** The type of HTTP request that was sent to the CDN. Example: HEAD or GET -- **peerType** The type of peer (LAN, Group, Internet, CDN, Cache Host, etc.). -- **requestOffset** The byte offset within the file in the sent request. -- **requestSize** The size of the range requested from the CDN. -- **responseSize** The size of the range response received from the CDN. -- **sessionID** The ID of the download session. - - -### Microsoft.OSG.DU.DeliveryOptClient.JobError - -This event represents a Windows Update job error. It allows for investigation of top errors. - -The following fields are available: - -- **cdnIp** The IP Address of the source CDN (Content Delivery Network). -- **doErrorCode** Error code returned for delivery optimization. -- **errorCode** The error code returned. -- **experimentId** When running a test, this is used to correlate with other events that are part of the same test. -- **fileID** The ID of the file being downloaded. -- **jobID** The Windows Update job ID. - - -## Windows Update events - -### Microsoft.Windows.Update.DeviceUpdateAgent.UpdateAgentAnalysisSummary - -This event collects information regarding the state of devices and drivers on the system following a reboot after the install phase of the new device manifest UUP (Unified Update Platform) update scenario which is used to install a device manifest describing a set of driver packages. - -The following fields are available: - -- **activated** Whether the entire device manifest update is considered activated and in use. -- **analysisErrorCount** The number of driver packages that could not be analyzed because errors occurred during analysis. -- **flightId** Unique ID for each flight. -- **missingDriverCount** The number of driver packages delivered by the device manifest that are missing from the system. -- **missingUpdateCount** The number of updates in the device manifest that are missing from the system. -- **objectId** Unique value for each diagnostics session. -- **publishedCount** The number of drivers packages delivered by the device manifest that are published and available to be used on devices. -- **relatedCV** Correlation vector value generated from the latest USO scan. -- **scenarioId** Indicates the update scenario. -- **sessionId** Unique value for each update session. -- **summary** A summary string that contains basic information about driver packages that are part of the device manifest and any devices on the system that those driver packages match. -- **summaryAppendError** A Boolean indicating if there was an error appending more information to the summary string. -- **truncatedDeviceCount** The number of devices missing from the summary string because there is not enough room in the string. -- **truncatedDriverCount** The number of driver packages missing from the summary string because there is not enough room in the string. -- **unpublishedCount** How many drivers packages that were delivered by the device manifest that are still unpublished and unavailable to be used on devices. -- **updateId** The unique ID for each update. - - -### Microsoft.Windows.Update.DeviceUpdateAgent.UpdateAgentCommit - -This event collects information regarding the final commit phase of the new device manifest UUP (Unified Update Platform) update scenario, which is used to install a device manifest describing a set of driver packages. - -The following fields are available: - -- **errorCode** The error code returned for the current session initialization. -- **flightId** The unique identifier for each flight. -- **objectId** The unique GUID for each diagnostics session. -- **relatedCV** A correlation vector value generated from the latest USO scan. -- **result** Outcome of the initialization of the session. -- **scenarioId** Identifies the Update scenario. -- **sessionId** The unique value for each update session. -- **updateId** The unique identifier for each Update. - - -### Microsoft.Windows.Update.DeviceUpdateAgent.UpdateAgentDownloadRequest - -This event collects information regarding the download request phase of the new device manifest UUP (Unified Update Platform) update scenario, which is used to install a device manifest describing a set of driver packages. - -The following fields are available: - -- **deletedCorruptFiles** Indicates if UpdateAgent found any corrupt payload files and whether the payload was deleted. -- **errorCode** The error code returned for the current session initialization. -- **flightId** The unique identifier for each flight. -- **objectId** Unique value for each Update Agent mode. -- **packageCountOptional** Number of optional packages requested. -- **packageCountRequired** Number of required packages requested. -- **packageCountTotal** Total number of packages needed. -- **packageCountTotalCanonical** Total number of canonical packages. -- **packageCountTotalDiff** Total number of diff packages. -- **packageCountTotalExpress** Total number of express packages. -- **packageSizeCanonical** Size of canonical packages in bytes. -- **packageSizeDiff** Size of diff packages in bytes. -- **packageSizeExpress** Size of express packages in bytes. -- **rangeRequestState** Represents the state of the download range request. -- **relatedCV** Correlation vector value generated from the latest USO scan. -- **result** Result of the download request phase of update. -- **scenarioId** The scenario ID. Example: MobileUpdate, DesktopLanguagePack, DesktopFeatureOnDemand, or DesktopDriverUpdate. -- **sessionId** Unique value for each Update Agent mode attempt. -- **updateId** Unique ID for each update. - - -### Microsoft.Windows.Update.DeviceUpdateAgent.UpdateAgentInitialize - -This event sends data for initializing a new update session for the new device manifest UUP (Unified Update Platform) update scenario, which is used to install a device manifest describing a set of driver packages. - -The following fields are available: - -- **errorCode** The error code returned for the current session initialization. -- **flightId** The unique identifier for each flight. -- **flightMetadata** Contains the FlightId and the build being flighted. -- **objectId** Unique value for each Update Agent mode. -- **relatedCV** Correlation vector value generated from the latest USO scan. -- **result** Result of the initialize phase of the update. 0 = Succeeded, 1 = Failed, 2 = Cancelled, 3 = Blocked, 4 = BlockCancelled. -- **scenarioId** The scenario ID. Example: MobileUpdate, DesktopLanguagePack, DesktopFeatureOnDemand, or DesktopDriverUpdate. -- **sessionData** Contains instructions to update agent for processing FODs and DUICs (Null for other scenarios). -- **sessionId** Unique value for each Update Agent mode attempt. -- **updateId** Unique ID for each update. - - -### Microsoft.Windows.Update.DeviceUpdateAgent.UpdateAgentInstall - -This event collects information regarding the install phase of the new device manifest UUP (Unified Update Platform) update scenario, which is used to install a device manifest describing a set of driver packages. - -The following fields are available: - -- **errorCode** The error code returned for the current install phase. -- **flightId** The unique identifier for each flight (pre-release builds). -- **objectId** The unique identifier for each diagnostics session. -- **relatedCV** Correlation vector value generated from the latest scan. -- **result** Outcome of the install phase of the update. -- **scenarioId** The scenario ID. Example: MobileUpdate, DesktopLanguagePack, DesktopFeatureOnDemand, or DesktopDriverUpdate -- **sessionId** The unique identifier for each update session. -- **updateId** The unique identifier for each Update. - - -### Microsoft.Windows.Update.DeviceUpdateAgent.UpdateAgentModeStart - -This event sends data for the start of each mode during the process of updating device manifest assets via the UUP (Unified Update Platform) update scenario, which is used to install a device manifest describing a set of driver packages. - -The following fields are available: - -- **flightId** The unique identifier for each flight (pre-release builds). -- **mode** Indicates the active Update Agent mode. -- **objectId** Unique value for each diagnostics session. -- **relatedCV** Correlation vector value generated from the latest scan. -- **scenarioId** The scenario ID. Example: MobileUpdate, DesktopLanguagePack, DesktopFeatureOnDemand, or DesktopDriverUpdate. -- **sessionId** The unique identifier for each update session. -- **updateId** The unique identifier for each Update. - - -### Microsoft.Windows.Update.NotificationUx.DialogNotificationToBeDisplayed - -This event indicates that a notification dialog box is about to be displayed to user. - -The following fields are available: - -- **AcceptAutoModeLimit** The maximum number of days for a device to automatically enter Auto Reboot mode. -- **AutoToAutoFailedLimit** The maximum number of days for Auto Reboot mode to fail before the RebootFailed dialog box is shown. -- **DaysSinceRebootRequired** Number of days since restart was required. -- **DeviceLocalTime** The local time on the device sending the event. -- **EngagedModeLimit** The number of days to switch between DTE dialog boxes. -- **EnterAutoModeLimit** The maximum number of days for a device to enter Auto Reboot mode. -- **ETag** OneSettings versioning value. -- **IsForcedEnabled** Indicates whether Forced Reboot mode is enabled for this device. -- **IsUltimateForcedEnabled** Indicates whether Ultimate Forced Reboot mode is enabled for this device. -- **NotificationUxState** Indicates which dialog box is shown. -- **NotificationUxStateString** Indicates which dialog box is shown. -- **RebootUxState** Indicates the state of the restart (Engaged, Auto, Forced, or UltimateForced). -- **RebootUxStateString** Indicates the state of the restart (Engaged, Auto, Forced, or UltimateForced). -- **RebootVersion** Version of DTE. -- **SkipToAutoModeLimit** The minimum length of time to pass in restart pending before a device can be put into auto mode. -- **UpdateId** The ID of the update that is pending restart to finish installation. -- **UpdateRevision** The revision of the update that is pending restart to finish installation. -- **UtcTime** The time the dialog box notification will be displayed, in Coordinated Universal Time. - - -### Microsoft.Windows.Update.NotificationUx.EnhancedEngagedRebootAcceptAutoDialog - -This event indicates that the Enhanced Engaged restart "accept automatically" dialog box was displayed. - -The following fields are available: - -- **DeviceLocalTime** The local time on the device sending the event. -- **ETag** OneSettings versioning value. -- **ExitCode** Indicates how users exited the dialog box. -- **RebootVersion** Version of DTE. -- **UpdateId** The ID of the update that is pending restart to finish installation. -- **UpdateRevision** The revision of the update that is pending restart to finish installation. -- **UserResponseString** The option that user chose on this dialog box. -- **UtcTime** The time that the dialog box was displayed, in Coordinated Universal Time. - - -### Microsoft.Windows.Update.NotificationUx.EnhancedEngagedRebootFirstReminderDialog - -This event indicates that the Enhanced Engaged restart "first reminder" dialog box was displayed.. - -The following fields are available: - -- **DeviceLocalTime** The local time on the device sending the event. -- **ETag** OneSettings versioning value. -- **ExitCode** Indicates how users exited the dialog box. -- **RebootVersion** Version of DTE. -- **UpdateId** The ID of the update that is pending restart to finish installation. -- **UpdateRevision** The revision of the update that is pending restart to finish installation. -- **UserResponseString** The option that user chose in this dialog box. -- **UtcTime** The time that the dialog box was displayed, in Coordinated Universal Time. - - -### Microsoft.Windows.Update.NotificationUx.EnhancedEngagedRebootRebootFailedDialog - -This event indicates that the Enhanced Engaged restart "restart failed" dialog box was displayed. - -The following fields are available: - -- **DeviceLocalTime** The local time of the device sending the event. -- **ETag** OneSettings versioning value. -- **ExitCode** Indicates how users exited the dialog box. -- **RebootVersion** Version of DTE. -- **UpdateId** The ID of the update that is pending restart to finish installation. -- **UpdateRevision** The revision of the update that is pending restart to finish installation. -- **UserResponseString** The option that the user chose in this dialog box. -- **UtcTime** The time that the dialog box was displayed, in Coordinated Universal Time. - - -### Microsoft.Windows.Update.NotificationUx.EnhancedEngagedRebootRebootImminentDialog - -This event indicates that the Enhanced Engaged restart "restart imminent" dialog box was displayed. - -The following fields are available: - -- **DeviceLocalTime** Time the dialog box was shown on the local device. -- **ETag** OneSettings versioning value. -- **ExitCode** Indicates how users exited the dialog box. -- **RebootVersion** Version of DTE. -- **UpdateId** The ID of the update that is pending restart to finish installation. -- **UpdateRevision** The revision of the update that is pending restart to finish installation. -- **UserResponseString** The option that user chose in this dialog box. -- **UtcTime** The time that dialog box was displayed, in Coordinated Universal Time. - - -### Microsoft.Windows.Update.NotificationUx.EnhancedEngagedRebootReminderDialog - -This event returns information relating to the Enhanced Engaged reboot reminder dialog that was displayed. - -The following fields are available: - -- **DeviceLocalTime** The time at which the reboot reminder dialog was shown (based on the local device time settings). -- **ETag** The OneSettings versioning value. -- **ExitCode** Indicates how users exited the reboot reminder dialog box. -- **RebootVersion** The version of the DTE (Direct-to-Engaged). -- **UpdateId** The ID of the update that is waiting for reboot to finish installation. -- **UpdateRevision** The revision of the update that is waiting for reboot to finish installation. -- **UserResponseString** The option chosen by the user on the reboot dialog box. -- **UtcTime** The time at which the reboot reminder dialog was shown (in UTC). - - -### Microsoft.Windows.Update.NotificationUx.EnhancedEngagedRebootReminderToast - -This event indicates that the Enhanced Engaged restart reminder pop-up banner was displayed. - -The following fields are available: - -- **DeviceLocalTime** The local time on the device sending the event. -- **ETag** OneSettings versioning value. -- **ExitCode** Indicates how users exited the pop-up banner. -- **RebootVersion** The version of the reboot logic. -- **UpdateId** The ID of the update that is pending restart to finish installation. -- **UpdateRevision** The revision of the update that is pending restart to finish installation. -- **UserResponseString** The option that the user chose in the pop-up banner. -- **UtcTime** The time that the pop-up banner was displayed, in Coordinated Universal Time. - - -### Microsoft.Windows.Update.NotificationUx.RebootScheduled - -Indicates when a reboot is scheduled by the system or a user for a security, quality, or feature update. - -The following fields are available: - -- **activeHoursApplicable** Indicates whether an Active Hours policy is present on the device. -- **IsEnhancedEngagedReboot** Indicates whether this is an Enhanced Engaged reboot. -- **rebootArgument** Argument for the reboot task. It also represents specific reboot related action. -- **rebootOutsideOfActiveHours** Indicates whether a restart is scheduled outside of active hours. -- **rebootScheduledByUser** Indicates whether the restart was scheduled by user (if not, it was scheduled automatically). -- **rebootState** The current state of the restart. -- **rebootUsingSmartScheduler** Indicates whether the reboot is scheduled by smart scheduler. -- **revisionNumber** Revision number of the update that is getting installed with this restart. -- **scheduledRebootTime** Time of the scheduled restart. -- **scheduledRebootTimeInUTC** Time of the scheduled restart in Coordinated Universal Time. -- **updateId** ID of the update that is getting installed with this restart. -- **wuDeviceid** Unique device ID used by Windows Update. - - -### Microsoft.Windows.Update.Orchestrator.ActivityRestrictedByActiveHoursPolicy - -This event indicates a policy is present that may restrict update activity to outside of active hours. - -The following fields are available: - -- **activeHoursEnd** The end of the active hours window. -- **activeHoursStart** The start of the active hours window. -- **wuDeviceid** Unique device ID used by Windows Update. - - -### Microsoft.Windows.Update.Orchestrator.BlockedByActiveHours - -This event indicates that update activity was blocked because it is within the active hours window. - -The following fields are available: - -- **activeHoursEnd** The end of the active hours window. -- **activeHoursStart** The start of the active hours window. -- **updatePhase** The current state of the update process. -- **wuDeviceid** Unique device ID used by Windows Update. - - -### Microsoft.Windows.Update.Orchestrator.BlockedByBatteryLevel - -This event indicates that Windows Update activity was blocked due to low battery level. - -The following fields are available: - -- **batteryLevel** The current battery charge capacity. -- **batteryLevelThreshold** The battery capacity threshold to stop update activity. -- **updatePhase** The current state of the update process. -- **wuDeviceid** Device ID. - - -### Microsoft.Windows.Update.Orchestrator.DeferRestart - -This event indicates that a restart required for installing updates was postponed. - -The following fields are available: - -- **displayNeededReason** List of reasons for needing display. -- **eventScenario** Indicates the purpose of the event (scan started, succeeded, failed, etc.). -- **filteredDeferReason** Applicable filtered reasons why reboot was postponed (such as user active, or low battery). -- **gameModeReason** Name of the executable that caused the game mode state check to start. -- **ignoredReason** List of reasons that were intentionally ignored. -- **IgnoreReasonsForRestart** List of reasons why restart was deferred. -- **revisionNumber** Update ID revision number. -- **systemNeededReason** List of reasons why system is needed. -- **updateId** Update ID. -- **updateScenarioType** Update session type. -- **wuDeviceid** Unique device ID used by Windows Update. - - -### Microsoft.Windows.Update.Orchestrator.Detection - -This event indicates that a scan for a Windows Update occurred. - -The following fields are available: - -- **deferReason** The reason why the device could not check for updates. -- **detectionBlockingPolicy** The Policy that blocked detection. -- **detectionBlockreason** The reason detection did not complete. -- **detectionRetryMode** Indicates whether we will try to scan again. -- **errorCode** The error code returned for the current process. -- **eventScenario** End-to-end update session ID, or indicates the purpose of sending this event - whether because the software distribution just started installing content, or whether it was cancelled, succeeded, or failed. -- **flightID** The unique identifier for the flight (Windows Insider pre-release build) should be delivered to the device, if applicable. -- **interactive** Indicates whether the user initiated the session. -- **networkStatus** Indicates if the device is connected to the internet. -- **revisionNumber** The Update revision number. -- **scanTriggerSource** The source of the triggered scan. -- **updateId** The unique identifier of the Update. -- **updateScenarioType** Identifies the type of update session being performed. -- **wuDeviceid** The unique device ID used by Windows Update. - - -### Microsoft.Windows.Update.Orchestrator.DisplayNeeded - -This event indicates the reboot was postponed due to needing a display. - -The following fields are available: - -- **displayNeededReason** Reason the display is needed. -- **eventScenario** Indicates the purpose of sending this event - whether because the software distribution just started checking for content, or whether it was cancelled, succeeded, or failed. -- **rebootOutsideOfActiveHours** Indicates whether the reboot was to occur outside of active hours. -- **revisionNumber** Revision number of the update. -- **updateId** Update ID. -- **updateScenarioType** The update session type. -- **uxRebootstate** Indicates the exact state of the user experience at the time the required reboot was initiated. -- **wuDeviceid** The unique identifier of a specific device, used to identify how many devices are encountering success or a particular issue - - -### Microsoft.Windows.Update.Orchestrator.Download - -This event sends launch data for a Windows Update download to help keep Windows up to date. - -The following fields are available: - -- **deferReason** Reason for download not completing. -- **errorCode** An error code represented as a hexadecimal value. -- **eventScenario** End-to-end update session ID. -- **flightID** The specific ID of the Windows Insider build the device is getting. -- **interactive** Indicates whether the session is user initiated. -- **revisionNumber** Update revision number. -- **updateId** Update ID. -- **updateScenarioType** The update session type. -- **wuDeviceid** Unique device ID used by Windows Update. - - -### Microsoft.Windows.Update.Orchestrator.DTUCompletedWhenWuFlightPendingCommit - -This event indicates that DTU completed installation of the electronic software delivery (ESD), when Windows Update was already in Pending Commit phase of the feature update. - -The following fields are available: - -- **wuDeviceid** Device ID used by Windows Update. - - -### Microsoft.Windows.Update.Orchestrator.DTUEnabled - -This event indicates that Inbox DTU functionality was enabled. - -The following fields are available: - -- **wuDeviceid** Device ID used by Windows Update. - - -### Microsoft.Windows.Update.Orchestrator.DTUInitiated - -This event indicates that Inbox DTU functionality was intiated. - -The following fields are available: - -- **dtuErrorCode** Return code from creating the DTU Com Server. -- **isDtuApplicable** Determination of whether DTU is applicable to the machine it is running on. -- **wuDeviceid** Device ID used by Windows Update. - - -### Microsoft.Windows.Update.Orchestrator.EscalationRiskLevels - -This event is sent during update scan, download, or install, and indicates that the device is at risk of being out-of-date. - -The following fields are available: - -- **configVersion** The escalation configuration version on the device. -- **downloadElapsedTime** Indicates how long since the download is required on device. -- **downloadRiskLevel** At-risk level of download phase. -- **installElapsedTime** Indicates how long since the install is required on device. -- **installRiskLevel** The at-risk level of install phase. -- **isSediment** Assessment of whether is device is at risk. -- **scanElapsedTime** Indicates how long since the scan is required on device. -- **scanRiskLevel** At-risk level of the scan phase. -- **wuDeviceid** Device ID used by Windows Update. - - -### Microsoft.Windows.Update.Orchestrator.FailedToAddTimeTriggerToScanTask - -This event indicated that USO failed to add a trigger time to a task. - -The following fields are available: - -- **errorCode** The Windows Update error code. -- **wuDeviceid** The Windows Update device ID. - - -### Microsoft.Windows.Update.Orchestrator.FlightInapplicable - -This event indicates that the update is no longer applicable to this device. - -The following fields are available: - -- **EventPublishedTime** Time when this event was generated. -- **flightID** The specific ID of the Windows Insider build. -- **inapplicableReason** The reason why the update is inapplicable. -- **revisionNumber** Update revision number. -- **updateId** Unique Windows Update ID. -- **updateScenarioType** Update session type. -- **UpdateStatus** Last status of update. -- **UUPFallBackConfigured** Indicates whether UUP fallback is configured. -- **wuDeviceid** Unique Device ID. - - -### Microsoft.Windows.Update.Orchestrator.InitiatingReboot - -This event sends data about an Orchestrator requesting a reboot from power management to help keep Windows up to date. - -The following fields are available: - -- **EventPublishedTime** Time of the event. -- **flightID** Unique update ID -- **interactive** Indicates whether the reboot initiation stage of the update process was entered as a result of user action. -- **rebootOutsideOfActiveHours** Indicates whether the reboot was to occur outside of active hours. -- **revisionNumber** Revision number of the update. -- **updateId** Update ID. -- **updateScenarioType** The update session type. -- **uxRebootstate** Indicates the exact state of the user experience at the time the required reboot was initiated. -- **wuDeviceid** Unique device ID used by Windows Update. - - -### Microsoft.Windows.Update.Orchestrator.Install - -This event sends launch data for a Windows Update install to help keep Windows up to date. - -The following fields are available: - -- **batteryLevel** Current battery capacity in mWh or percentage left. -- **deferReason** Reason for install not completing. -- **errorCode** The error code reppresented by a hexadecimal value. -- **eventScenario** End-to-end update session ID. -- **flightID** The ID of the Windows Insider build the device is getting. -- **flightUpdate** Indicates whether the update is a Windows Insider build. -- **ForcedRebootReminderSet** A boolean value that indicates if a forced reboot will happen for updates. -- **IgnoreReasonsForRestart** The reason(s) a Postpone Restart command was ignored. -- **installCommitfailedtime** The time it took for a reboot to happen but the upgrade failed to progress. -- **installRebootinitiatetime** The time it took for a reboot to be attempted. -- **interactive** Identifies if session is user initiated. -- **minutesToCommit** The time it took to install updates. -- **rebootOutsideOfActiveHours** Indicates whether a reboot is scheduled outside of active hours. -- **revisionNumber** Update revision number. -- **updateId** Update ID. -- **updateScenarioType** The update session type. -- **uxRebootstate** Indicates the exact state of the user experience at the time the required reboot was initiated to ensure the correct update process and experience is provided to keep Windows up to date. -- **wuDeviceid** Unique device ID used by Windows Update. - - -### Microsoft.Windows.Update.Orchestrator.LowUptimes - -This event is sent if a device is identified as not having sufficient uptime to reliably process updates in order to keep secure. - -The following fields are available: - -- **availableHistoryMinutes** The number of minutes available from the local machine activity history. -- **isLowUptimeMachine** Is the machine considered low uptime or not. -- **lowUptimeMinHours** Current setting for the minimum number of hours needed to not be considered low uptime. -- **lowUptimeQueryDays** Current setting for the number of recent days to check for uptime. -- **uptimeMinutes** Number of minutes of uptime measured. -- **wuDeviceid** Unique device ID for Windows Update. - - -### Microsoft.Windows.Update.Orchestrator.OneshotUpdateDetection - -This event returns data about scans initiated through settings UI, or background scans that are urgent; to help keep Windows up to date. - -The following fields are available: - -- **externalOneshotupdate** The last time a task-triggered scan was completed. -- **interactiveOneshotupdate** The last time an interactive scan was completed. -- **oldlastscanOneshotupdate** The last time a scan completed successfully. -- **wuDeviceid** The Windows Update Device GUID (Globally-Unique ID). - - -### Microsoft.Windows.Update.Orchestrator.PreShutdownStart - -This event is generated before the shutdown and commit operations. - -The following fields are available: - -- **wuDeviceid** The unique identifier of a specific device, used to identify how many devices are encountering success or a particular issue. - - -### Microsoft.Windows.Update.Orchestrator.RebootFailed - -This event sends information about whether an update required a reboot and reasons for failure, to help keep Windows up to date. - -The following fields are available: - -- **batteryLevel** Current battery capacity in mWh or percentage left. -- **deferReason** Reason for install not completing. -- **EventPublishedTime** The time that the reboot failure occurred. -- **flightID** Unique update ID. -- **rebootOutsideOfActiveHours** Indicates whether a reboot was scheduled outside of active hours. -- **RebootResults** Hex code indicating failure reason. Typically, we expect this to be a specific USO generated hex code. -- **revisionNumber** Update revision number. -- **updateId** Update ID. -- **updateScenarioType** The update session type. -- **uxRebootstate** Indicates the exact state of the user experience at the time the required reboot was initiated to ensure the correct update process and experience is provided to keep Windows up to date. -- **wuDeviceid** Unique device ID used by Windows Update. - - -### Microsoft.Windows.Update.Orchestrator.RefreshSettings - -This event sends basic data about the version of upgrade settings applied to the system to help keep Windows up to date. - -The following fields are available: - -- **errorCode** Hex code for the error message, to allow lookup of the specific error. -- **settingsDownloadTime** Timestamp of the last attempt to acquire settings. -- **settingsETag** Version identifier for the settings. -- **wuDeviceid** Unique device ID used by Windows Update. - - -### Microsoft.Windows.Update.Orchestrator.RestoreRebootTask - -This event sends data indicating that a reboot task is missing unexpectedly on a device and the task is restored because a reboot is still required, to help keep Windows up to date. - -The following fields are available: - -- **RebootTaskMissedTimeUTC** The time when the reboot task was scheduled to run, but did not. -- **RebootTaskNextTimeUTC** The time when the reboot task was rescheduled for. -- **RebootTaskRestoredTime** Time at which this reboot task was restored. -- **wuDeviceid** Device ID for the device on which the reboot is restored. - - -### Microsoft.Windows.Update.Orchestrator.ScanTriggered - -This event indicates that Update Orchestrator has started a scan operation. - -The following fields are available: - -- **errorCode** The error code returned for the current scan operation. -- **eventScenario** Indicates the purpose of sending this event. -- **interactive** Indicates whether the scan is interactive. -- **isDTUEnabled** Indicates whether DTU (internal abbreviation for Direct Feature Update) channel is enabled on the client system. -- **isScanPastSla** Indicates whether the SLA has elapsed for scanning. -- **isScanPastTriggerSla** Indicates whether the SLA has elapsed for triggering a scan. -- **minutesOverScanSla** Indicates how many minutes the scan exceeded the scan SLA. -- **minutesOverScanTriggerSla** Indicates how many minutes the scan exceeded the scan trigger SLA. -- **scanTriggerSource** Indicates what caused the scan. -- **updateScenarioType** The update session type. -- **wuDeviceid** Unique device ID used by Windows Update. - - -### Microsoft.Windows.Update.Orchestrator.StickUpdate - -This event is sent when the update service orchestrator (USO) indicates the update cannot be superseded by a newer update. - -The following fields are available: - -- **updateId** Identifier associated with the specific piece of content. -- **wuDeviceid** Unique device ID controlled by the software distribution client. - - -### Microsoft.Windows.Update.Orchestrator.SystemNeeded - -This event sends data about why a device is unable to reboot, to help keep Windows up to date. - -The following fields are available: - -- **eventScenario** End-to-end update session ID. -- **rebootOutsideOfActiveHours** Indicates whether a reboot is scheduled outside of active hours. -- **revisionNumber** Update revision number. -- **systemNeededReason** List of apps or tasks that are preventing the system from restarting. -- **updateId** Update ID. -- **updateScenarioType** The update session type. -- **uxRebootstate** Indicates the exact state of the user experience at the time the required reboot was initiated to ensure the correct update process and experience is provided to keep Windows up to date. -- **wuDeviceid** Unique device ID used by Windows Update. - - -### Microsoft.Windows.Update.Orchestrator.TerminatedByActiveHours - -This event indicates that update activity was stopped due to active hours starting. - -The following fields are available: - -- **activeHoursEnd** The end of the active hours window. -- **activeHoursStart** The start of the active hours window. -- **updatePhase** The current state of the update process. -- **wuDeviceid** The device identifier. - - -### Microsoft.Windows.Update.Orchestrator.TerminatedByBatteryLevel - -This event is sent when update activity was stopped due to a low battery level. - -The following fields are available: - -- **batteryLevel** The current battery charge capacity. -- **batteryLevelThreshold** The battery capacity threshold to stop update activity. -- **updatePhase** The current state of the update process. -- **wuDeviceid** The device identifier. - - -### Microsoft.Windows.Update.Orchestrator.UnstickUpdate - -This event is sent when the update service orchestrator (USO) indicates that the update can be superseded by a newer update. - -The following fields are available: - -- **updateId** Identifier associated with the specific piece of content. -- **wuDeviceid** Unique device ID controlled by the software distribution client. - - -### Microsoft.Windows.Update.Orchestrator.UpdatePolicyCacheRefresh - -This event sends data on whether Update Management Policies were enabled on a device, to help keep Windows up to date. - -The following fields are available: - -- **configuredPoliciescount** Number of policies on the device. -- **policiesNamevaluesource** Policy name and source of policy (group policy, MDM or flight). -- **policyCacherefreshtime** Time when policy cache was refreshed. -- **updateInstalluxsetting** Indicates whether a user has set policies via a user experience option. -- **wuDeviceid** Unique device ID used by Windows Update. - - -### Microsoft.Windows.Update.Orchestrator.UpdateRebootRequired - -This event sends data about whether an update required a reboot to help keep Windows up to date. - -The following fields are available: - -- **flightID** The specific ID of the Windows Insider build the device is getting. -- **interactive** Indicates whether the reboot initiation stage of the update process was entered as a result of user action. -- **revisionNumber** Update revision number. -- **updateId** Update ID. -- **updateScenarioType** The update session type. -- **uxRebootstate** Indicates the exact state of the user experience at the time the required reboot was initiated to ensure the correct update process and experience is provided to keep Windows up to date. -- **wuDeviceid** Unique device ID used by Windows Update. - - -### Microsoft.Windows.Update.Orchestrator.updateSettingsFlushFailed - -This event sends information about an update that encountered problems and was not able to complete. - -The following fields are available: - -- **errorCode** The error code encountered. -- **wuDeviceid** The ID of the device in which the error occurred. - - -### Microsoft.Windows.Update.Orchestrator.UsoSession - -This event represents the state of the USO service at start and completion. - -The following fields are available: - -- **activeSessionid** A unique session GUID. -- **eventScenario** The state of the update action. -- **interactive** Is the USO session interactive? -- **lastErrorcode** The last error that was encountered. -- **lastErrorstate** The state of the update when the last error was encountered. -- **sessionType** A GUID that refers to the update session type. -- **updateScenarioType** A descriptive update session type. -- **wuDeviceid** The Windows Update device GUID. - - -### Microsoft.Windows.Update.Ux.MusNotification.EnhancedEngagedRebootUxState - -This event sends information about the configuration of Enhanced Direct-to-Engaged (eDTE), which includes values for the timing of how eDTE will progress through each phase of the reboot. - -The following fields are available: - -- **AcceptAutoModeLimit** The maximum number of days for a device to automatically enter Auto Reboot mode. -- **AutoToAutoFailedLimit** The maximum number of days for Auto Reboot mode to fail before a Reboot Failed dialog will be shown. -- **DeviceLocalTime** The date and time (based on the device date/time settings) the reboot mode changed. -- **EngagedModeLimit** The number of days to switch between DTE (Direct-to-Engaged) dialogs. -- **EnterAutoModeLimit** The maximum number of days a device can enter Auto Reboot mode. -- **ETag** The Entity Tag that represents the OneSettings version. -- **IsForcedEnabled** Identifies whether Forced Reboot mode is enabled for the device. -- **IsUltimateForcedEnabled** Identifies whether Ultimate Forced Reboot mode is enabled for the device. -- **OldestUpdateLocalTime** The date and time (based on the device date/time settings) this update’s reboot began pending. -- **RebootUxState** Identifies the reboot state: Engaged, Auto, Forced, UltimateForced. -- **RebootVersion** The version of the DTE (Direct-to-Engaged). -- **SkipToAutoModeLimit** The maximum number of days to switch to start while in Auto Reboot mode. -- **UpdateId** The ID of the update that is waiting for reboot to finish installation. -- **UpdateRevision** The revision of the update that is waiting for reboot to finish installation. - - -### Microsoft.Windows.Update.Ux.MusNotification.RebootNoLongerNeeded - -This event is sent when a security update has successfully completed. - -The following fields are available: - -- **UtcTime** The Coordinated Universal Time that the restart was no longer needed. - - -### Microsoft.Windows.Update.Ux.MusNotification.RebootScheduled - -This event sends basic information about scheduling an update-related reboot, to get security updates and to help keep Windows up-to-date. - -The following fields are available: - -- **activeHoursApplicable** Indicates whether Active Hours applies on this device. -- **IsEnhancedEngagedReboot** Indicates whether Enhanced reboot was enabled. -- **rebootArgument** Argument for the reboot task. It also represents specific reboot related action. -- **rebootOutsideOfActiveHours** True, if a reboot is scheduled outside of active hours. False, otherwise. -- **rebootScheduledByUser** True, if a reboot is scheduled by user. False, if a reboot is scheduled automatically. -- **rebootState** Current state of the reboot. -- **rebootUsingSmartScheduler** Indicates that the reboot is scheduled by SmartScheduler. -- **revisionNumber** Revision number of the OS. -- **scheduledRebootTime** Time scheduled for the reboot. -- **scheduledRebootTimeInUTC** Time scheduled for the reboot, in UTC. -- **updateId** Identifies which update is being scheduled. -- **wuDeviceid** The unique device ID used by Windows Update. - - -### Microsoft.Windows.Update.Ux.MusNotification.UxBrokerScheduledTask - -This event is sent when MUSE broker schedules a task. - -The following fields are available: - -- **TaskArgument** The arguments with which the task is scheduled. -- **TaskName** Name of the task. - - -### Microsoft.Windows.Update.Ux.MusUpdateSettings.RebootScheduled - -This event sends basic information for scheduling a device restart to install security updates. It's used to help keep Windows up to date. - -The following fields are available: - -- **activeHoursApplicable** Is the restart respecting Active Hours? -- **IsEnhancedEngagedReboot** TRUE if the reboot path is Enhanced Engaged. Otherwise, FALSE. -- **rebootArgument** The arguments that are passed to the OS for the restarted. -- **rebootOutsideOfActiveHours** Was the restart scheduled outside of Active Hours? -- **rebootScheduledByUser** Was the restart scheduled by the user? If the value is false, the restart was scheduled by the device. -- **rebootState** The state of the restart. -- **rebootUsingSmartScheduler** TRUE if the reboot should be performed by the Smart Scheduler. Otherwise, FALSE. -- **revisionNumber** The revision number of the OS being updated. -- **scheduledRebootTime** Time of the scheduled reboot -- **scheduledRebootTimeInUTC** Time of the scheduled restart, in Coordinated Universal Time. -- **updateId** The Windows Update device GUID. -- **wuDeviceid** The Windows Update device GUID. - - -## Windows Update mitigation events - -### Mitigation360Telemetry.MitigationCustom.CleanupSafeOsImages - -This event sends data specific to the CleanupSafeOsImages mitigation used for OS Updates. - -The following fields are available: - -- **ClientId** The client ID used by Windows Update. -- **FlightId** The ID of each Windows Insider build the device received. -- **InstanceId** A unique device ID that identifies each update instance. -- **MitigationScenario** The update scenario in which the mitigation was executed. -- **MountedImageCount** The number of mounted images. -- **MountedImageMatches** The number of mounted image matches. -- **MountedImagesFailed** The number of mounted images that could not be removed. -- **MountedImagesRemoved** The number of mounted images that were successfully removed. -- **MountedImagesSkipped** The number of mounted images that were not found. -- **RelatedCV** The correlation vector value generated from the latest USO scan. -- **Result** HResult of this operation. -- **ScenarioId** ID indicating the mitigation scenario. -- **ScenarioSupported** Indicates whether the scenario was supported. -- **SessionId** Unique value for each update attempt. -- **UpdateId** Unique ID for each Windows Update. -- **WuId** Unique ID for the Windows Update client. - - -### Mitigation360Telemetry.MitigationCustom.FixAppXReparsePoints - -This event sends data specific to the FixAppXReparsePoints mitigation used for OS updates. - -The following fields are available: - -- **ClientId** Unique identifier for each flight. -- **FlightId** Unique GUID that identifies each instances of setuphost.exe. -- **InstanceId** The update scenario in which the mitigation was executed. -- **MitigationScenario** Correlation vector value generated from the latest USO scan. -- **RelatedCV** Number of reparse points that are corrupted but we failed to fix them. -- **ReparsePointsFailed** Number of reparse points that were corrupted and were fixed by this mitigation. -- **ReparsePointsFixed** Number of reparse points that are not corrupted and no action is required. -- **ReparsePointsSkipped** HResult of this operation. -- **Result** ID indicating the mitigation scenario. -- **ScenarioId** Indicates whether the scenario was supported. -- **ScenarioSupported** Unique value for each update attempt. -- **SessionId** Unique ID for each Update. -- **UpdateId** Unique ID for the Windows Update client. -- **WuId** Unique ID for the Windows Update client. - - -### Mitigation360Telemetry.MitigationCustom.FixupEditionId - -This event sends data specific to the FixupEditionId mitigation used for OS updates. - -The following fields are available: - -- **ClientId** In the WU scenario, this will be the WU client ID that is passed to Setup. In Media setup, default value is Media360, but can be overwritten by the caller to a unique value. -- **EditionIdUpdated** Determine whether EditionId was changed. -- **FlightId** Unique identifier for each flight. -- **InstanceId** Unique GUID that identifies each instances of setuphost.exe. -- **MitigationScenario** The update scenario in which the mitigation was executed. -- **ProductEditionId** Expected EditionId value based on GetProductInfo. -- **ProductType** Value returned by GetProductInfo. -- **RegistryEditionId** EditionId value in the registry. -- **RelatedCV** Correlation vector value generated from the latest USO scan. -- **Result** HResult of this operation. -- **ScenarioId** ID indicating the mitigation scenario. -- **ScenarioSupported** Indicates whether the scenario was supported. -- **SessionId** Unique value for each update attempt. -- **UpdateId** Unique ID for each update. -- **WuId** Unique ID for the Windows Update client. - - -## Windows Update Reserve Manager events - -### Microsoft.Windows.UpdateReserveManager.CommitPendingHardReserveAdjustment - -This event is sent when the Update Reserve Manager commits a hard reserve adjustment that was pending. - -The following fields are available: - -- **FinalAdjustment** Final adjustment for the hard reserve following the addition or removal of optional content. -- **InitialAdjustment** Initial intended adjustment for the hard reserve following the addition/removal of optional content. - - -### Microsoft.Windows.UpdateReserveManager.FunctionReturnedError - -This event is sent when the Update Reserve Manager returns an error from one of its internal functions. - -The following fields are available: - -- **FailedExpression** The failed expression that was returned. -- **FailedFile** The binary file that contained the failed function. -- **FailedFunction** The name of the function that originated the failure. -- **FailedLine** The line number of the failure. -- **ReturnCode** The return code of the function. - - -### Microsoft.Windows.UpdateReserveManager.PrepareTIForReserveInitialization - -This event is sent when the Update Reserve Manager prepares the Trusted Installer to initialize reserves on the next boot. - -The following fields are available: - -- **Flags** The flags that are passed to the function to prepare the Trusted Installer for reserve initialization. - - -### Microsoft.Windows.UpdateReserveManager.RemovePendingHardReserveAdjustment - -This event is sent when the Update Reserve Manager removes a pending hard reserve adjustment. - - - -### Microsoft.Windows.UpdateReserveManager.UpdatePendingHardReserveAdjustment - -This event is sent when the Update Reserve Manager needs to adjust the size of the hard reserve after the option content is installed. - -The following fields are available: - -- **ChangeSize** The change in the hard reserve size based on the addition or removal of optional content. -- **PendingHardReserveAdjustment** The final change to the hard reserve size. -- **UpdateType** Indicates whether the change is an increase or decrease in the size of the hard reserve. - - -## Winlogon events - -### Microsoft.Windows.Security.Winlogon.SetupCompleteLogon - -This event signals the completion of the setup process. It happens only once during the first logon. - - - -## XBOX events - -### Microsoft.Xbox.XamTelemetry.AppActivationError - -This event indicates whether the system detected an activation error in the app. - -The following fields are available: - -- **ActivationUri** Activation URI (Uniform Resource Identifier) used in the attempt to activate the app. -- **AppId** The Xbox LIVE Title ID. -- **AppUserModelId** The AUMID (Application User Model ID) of the app to activate. -- **Result** The HResult error. -- **UserId** The Xbox LIVE User ID (XUID). - - -### Microsoft.Xbox.XamTelemetry.AppActivity - -This event is triggered whenever the current app state is changed by: launch, switch, terminate, snap, etc. - -The following fields are available: - -- **AppActionId** The ID of the application action. -- **AppCurrentVisibilityState** The ID of the current application visibility state. -- **AppId** The Xbox LIVE Title ID of the app. -- **AppPackageFullName** The full name of the application package. -- **AppPreviousVisibilityState** The ID of the previous application visibility state. -- **AppSessionId** The application session ID. -- **AppType** The type ID of the application (AppType_NotKnown, AppType_Era, AppType_Sra, AppType_Uwa). -- **BCACode** The BCA (Burst Cutting Area) mark code of the optical disc used to launch the application. -- **DurationMs** The amount of time (in milliseconds) since the last application state transition. -- **IsTrialLicense** This boolean value is TRUE if the application is on a trial license. -- **LicenseType** The type of licensed used to authorize the app (0 - Unknown, 1 - User, 2 - Subscription, 3 - Offline, 4 - Disc). -- **LicenseXuid** If the license type is 1 (User), this field contains the XUID (Xbox User ID) of the registered owner of the license. -- **ProductGuid** The Xbox product GUID (Globally-Unique ID) of the application. -- **UserId** The XUID (Xbox User ID) of the current user. - - - +--- +description: Use this article to learn more about what Windows diagnostic data is gathered at the basic level. +title: Windows 10, version 1809 basic diagnostic events and fields (Windows 10) +keywords: privacy, telemetry +ms.prod: w10 +ms.mktglfcycl: manage +ms.sitesec: library +ms.pagetype: security +localizationpriority: high +author: brianlic-msft +ms.author: brianlic +manager: dansimp +ms.collection: M365-security-compliance +ms.topic: article +audience: ITPro +ms.date: 03/12/2019 +--- + + +# Windows 10, version 1809 basic level Windows diagnostic events and fields + + **Applies to** + +- Windows 10, version 1809 + + +The Basic level gathers a limited set of information that is critical for understanding the device and its configuration including: basic device information, quality-related information, app compatibility, and Microsoft Store. When the level is set to Basic, it also includes the Security level information. + +The Basic level helps to identify problems that can occur on a particular device hardware or software configuration. For example, it can help determine if crashes are more frequent on devices with a specific amount of memory or that are running a particular driver version. This helps Microsoft fix operating system or app problems. + +Use this article to learn about diagnostic events, grouped by event area, and the fields within each event. A brief description is provided for each field. Every event generated includes common data, which collects device data. + +You can learn more about Windows functional and diagnostic data through these articles: + + +- [Windows 10, version 1803 basic diagnostic events and fields](basic-level-windows-diagnostic-events-and-fields-1803.md) +- [Windows 10, version 1709 basic diagnostic events and fields](basic-level-windows-diagnostic-events-and-fields-1709.md) +- [Windows 10, version 1703 basic diagnostic events and fields](basic-level-windows-diagnostic-events-and-fields-1703.md) +- [Manage connections from Windows operating system components to Microsoft services](manage-connections-from-windows-operating-system-components-to-microsoft-services.md) +- [Configure Windows diagnostic data in your organization](configure-windows-diagnostic-data-in-your-organization.md) + + + + +## Account trace logging provider events + +### Microsoft.Windows.Mitigation.AccountTraceLoggingProvider.General + +This event provides information about application properties to indicate the successful execution. + +The following fields are available: + +- **AppMode** Indicates the mode the app is being currently run around privileges. +- **ExitCode** Indicates the exit code of the app. +- **Help** Indicates if the app needs to be launched in the help mode. +- **ParseError** Indicates if there was a parse error during the execution. +- **RightsAcquired** Indicates if the right privileges were acquired for successful execution. +- **RightsWereEnabled** Indicates if the right privileges were enabled for successful execution. +- **TestMode** Indicates whether the app is being run in test mode. + + +### Microsoft.Windows.Mitigation.AccountTraceLoggingProvider.GetCount + +This event provides information about the properties of user accounts in the Administrator group. + +The following fields are available: + +- **Internal** Indicates the internal property associated with the count group. +- **LastError** The error code (if applicable) for the cause of the failure to get the count of the user account. +- **Result** The HResult error. + + +## AppLocker events + +### Microsoft.Windows.Security.AppLockerCSP.ActivityStoppedAutomatically + +Automatically closed activity for start/stop operations that aren't explicitly closed. + + + +### Microsoft.Windows.Security.AppLockerCSP.AddParams + +Parameters passed to Add function of the AppLockerCSP Node. + +The following fields are available: + +- **child** The child URI of the node to add. +- **uri** URI of the node relative to %SYSTEM32%/AppLocker. + + +### Microsoft.Windows.Security.AppLockerCSP.AddStart + +Start of "Add" Operation for the AppLockerCSP Node. + + + +### Microsoft.Windows.Security.AppLockerCSP.AddStop + +End of "Add" Operation for AppLockerCSP Node. + +The following fields are available: + +- **hr** The HRESULT returned by Add function in AppLockerCSP. + + +### Microsoft.Windows.Security.AppLockerCSP.CAppLockerCSP::Rollback + +Result of the 'Rollback' operation in AppLockerCSP. + +The following fields are available: + +- **oldId** Previous id for the CSP transaction. +- **txId** Current id for the CSP transaction. + + +### Microsoft.Windows.Security.AppLockerCSP.ClearParams + +Parameters passed to the "Clear" operation for AppLockerCSP. + +The following fields are available: + +- **uri** The URI relative to the %SYSTEM32%\AppLocker folder. + + +### Microsoft.Windows.Security.AppLockerCSP.ClearStart + +Start of the "Clear" operation for the AppLockerCSP Node. + + + +### Microsoft.Windows.Security.AppLockerCSP.ClearStop + +End of the "Clear" operation for the AppLockerCSP node. + +The following fields are available: + +- **hr** HRESULT reported at the end of the 'Clear' function. + + +### Microsoft.Windows.Security.AppLockerCSP.ConfigManagerNotificationStart + +Start of the "ConfigManagerNotification" operation for AppLockerCSP. + +The following fields are available: + +- **NotifyState** State sent by ConfigManager to AppLockerCSP. + + +### Microsoft.Windows.Security.AppLockerCSP.ConfigManagerNotificationStop + +End of the "ConfigManagerNotification" operation for AppLockerCSP. + +The following fields are available: + +- **hr** HRESULT returned by the ConfigManagerNotification function in AppLockerCSP. + + +### Microsoft.Windows.Security.AppLockerCSP.CreateNodeInstanceParams + +Parameters passed to the CreateNodeInstance function of the AppLockerCSP node. + +The following fields are available: + +- **NodeId** NodeId passed to CreateNodeInstance. +- **nodeOps** NodeOperations parameter passed to CreateNodeInstance. +- **uri** URI passed to CreateNodeInstance, relative to %SYSTEM32%\AppLocker. + + +### Microsoft.Windows.Security.AppLockerCSP.CreateNodeInstanceStart + +Start of the "CreateNodeInstance" operation for the AppLockerCSP node. + + + +### Microsoft.Windows.Security.AppLockerCSP.CreateNodeInstanceStop + +End of the "CreateNodeInstance" operation for the AppLockerCSP node + +The following fields are available: + +- **hr** HRESULT returned by the CreateNodeInstance function in AppLockerCSP. + + +### Microsoft.Windows.Security.AppLockerCSP.DeleteChildParams + +Parameters passed to the DeleteChild function of the AppLockerCSP node. + +The following fields are available: + +- **child** The child URI of the node to delete. +- **uri** URI relative to %SYSTEM32%\AppLocker. + + +### Microsoft.Windows.Security.AppLockerCSP.DeleteChildStart + +Start of the "DeleteChild" operation for the AppLockerCSP node. + + + +### Microsoft.Windows.Security.AppLockerCSP.DeleteChildStop + +End of the "DeleteChild" operation for the AppLockerCSP node. + +The following fields are available: + +- **hr** HRESULT returned by the DeleteChild function in AppLockerCSP. + + +### Microsoft.Windows.Security.AppLockerCSP.EnumPolicies + +Logged URI relative to %SYSTEM32%\AppLocker, if the Plugin GUID is null, or the CSP doesn't believe the old policy is present. + +The following fields are available: + +- **uri** URI relative to %SYSTEM32%\AppLocker. + + +### Microsoft.Windows.Security.AppLockerCSP.GetChildNodeNamesParams + +Parameters passed to the GetChildNodeNames function of the AppLockerCSP node. + +The following fields are available: + +- **uri** URI relative to %SYSTEM32%/AppLocker for MDM node. + + +### Microsoft.Windows.Security.AppLockerCSP.GetChildNodeNamesStart + +Start of the "GetChildNodeNames" operation for the AppLockerCSP node. + + + +### Microsoft.Windows.Security.AppLockerCSP.GetChildNodeNamesStop + +End of the "GetChildNodeNames" operation for the AppLockerCSP node. + +The following fields are available: + +- **child[0]** If function succeeded, the first child's name, else "NA". +- **count** If function succeeded, the number of child node names returned by the function, else 0. +- **hr** HRESULT returned by the GetChildNodeNames function of AppLockerCSP. + + +### Microsoft.Windows.Security.AppLockerCSP.GetLatestId + +The result of 'GetLatestId' in AppLockerCSP (the latest time stamped GUID). + +The following fields are available: + +- **dirId** The latest directory identifier found by GetLatestId. +- **id** The id returned by GetLatestId if id > 0 - otherwise the dirId parameter. + + +### Microsoft.Windows.Security.AppLockerCSP.HResultException + +HRESULT thrown by any arbitrary function in AppLockerCSP. + +The following fields are available: + +- **file** File in the OS code base in which the exception occurs. +- **function** Function in the OS code base in which the exception occurs. +- **hr** HRESULT that is reported. +- **line** Line in the file in the OS code base in which the exception occurs. + + +### Microsoft.Windows.Security.AppLockerCSP.SetValueParams + +Parameters passed to the SetValue function of the AppLockerCSP node. + +The following fields are available: + +- **dataLength** Length of the value to set. +- **uri** The node URI to that should contain the value, relative to %SYSTEM32%\AppLocker. + + +### Microsoft.Windows.Security.AppLockerCSP.SetValueStart + +Start of the "SetValue" operation for the AppLockerCSP node. + + + +### Microsoft.Windows.Security.AppLockerCSP.SetValueStop + +End of the "SetValue" operation for the AppLockerCSP node. + +The following fields are available: + +- **hr** HRESULT returned by the SetValue function in AppLockerCSP. + + +### Microsoft.Windows.Security.AppLockerCSP.TryRemediateMissingPolicies + +EntryPoint of fix step or policy remediation, includes URI relative to %SYSTEM32%\AppLocker that needs to be fixed. + +The following fields are available: + +- **uri** URI for node relative to %SYSTEM32%/AppLocker. + + +## Appraiser events + +### Microsoft.Windows.Appraiser.General.ChecksumTotalPictureCount + +This event lists the types of objects and how many of each exist on the client device. This allows for a quick way to ensure that the records present on the server match what is present on the client. + +The following fields are available: + +- **DatasourceApplicationFile_19ASetup** The count of the number of this particular object type present on this device. +- **DatasourceApplicationFile_19H1** The count of the number of this particular object type present on this device. +- **DatasourceApplicationFile_19H1Setup** The count of the number of this particular object type present on this device. +- **DatasourceApplicationFile_RS1** An ID for the system, calculated by hashing hardware identifiers. +- **DatasourceApplicationFile_RS2** An ID for the system, calculated by hashing hardware identifiers. +- **DatasourceApplicationFile_RS3** The count of the number of this particular object type present on this device. +- **DatasourceApplicationFile_RS3Setup** The count of the number of this particular object type present on this device. +- **DatasourceApplicationFile_RS4** The count of the number of this particular object type present on this device. +- **DatasourceApplicationFile_RS4Setup** The count of the number of this particular object type present on this device. +- **DatasourceApplicationFile_RS5** The count of the number of this particular object type present on this device. +- **DatasourceApplicationFile_RS5Setup** The count of the number of this particular object type present on this device. +- **DatasourceApplicationFile_TH1** The count of the number of this particular object type present on this device. +- **DatasourceApplicationFile_TH2** The count of the number of this particular object type present on this device. +- **DatasourceDevicePnp_19ASetup** The count of the number of this particular object type present on this device. +- **DatasourceDevicePnp_19H1** The count of the number of this particular object type present on this device. +- **DatasourceDevicePnp_19H1Setup** The count of the number of this particular object type present on this device. +- **DatasourceDevicePnp_RS1** The total DataSourceDevicePnp objects targeting Windows 10 version 1607 on this device. +- **DatasourceDevicePnp_RS2** The count of the number of this particular object type present on this device. +- **DatasourceDevicePnp_RS3** The count of the number of this particular object type present on this device. +- **DatasourceDevicePnp_RS3Setup** The count of the number of this particular object type present on this device. +- **DatasourceDevicePnp_RS4** The count of the number of this particular object type present on this device. +- **DatasourceDevicePnp_RS4Setup** The count of the number of this particular object type present on this device. +- **DatasourceDevicePnp_RS5** The count of the number of this particular object type present on this device. +- **DatasourceDevicePnp_RS5Setup** The count of the number of this particular object type present on this device. +- **DatasourceDevicePnp_TH1** The count of the number of this particular object type present on this device. +- **DatasourceDevicePnp_TH2** The count of the number of this particular object type present on this device. +- **DatasourceDriverPackage_19ASetup** The count of the number of this particular object type present on this device. +- **DatasourceDriverPackage_19H1** The count of the number of this particular object type present on this device. +- **DatasourceDriverPackage_19H1Setup** The count of the number of this particular object type present on this device. +- **DatasourceDriverPackage_RS1** The total DataSourceDriverPackage objects targeting Windows 10 version 1607 on this device. +- **DatasourceDriverPackage_RS2** The total DataSourceDriverPackage objects targeting Windows 10, version 1703 on this device. +- **DatasourceDriverPackage_RS3** The count of the number of this particular object type present on this device. +- **DatasourceDriverPackage_RS3Setup** The count of the number of this particular object type present on this device. +- **DatasourceDriverPackage_RS4** The count of the number of this particular object type present on this device. +- **DatasourceDriverPackage_RS4Setup** The count of the number of this particular object type present on this device. +- **DatasourceDriverPackage_RS5** The count of the number of this particular object type present on this device. +- **DatasourceDriverPackage_RS5Setup** The count of the number of this particular object type present on this device. +- **DatasourceDriverPackage_TH1** The count of the number of this particular object type present on this device. +- **DatasourceDriverPackage_TH2** The count of the number of this particular object type present on this device. +- **DataSourceMatchingInfoBlock_19ASetup** The count of the number of this particular object type present on this device. +- **DataSourceMatchingInfoBlock_19H1** The count of the number of this particular object type present on this device. +- **DataSourceMatchingInfoBlock_19H1Setup** The count of the number of this particular object type present on this device. +- **DataSourceMatchingInfoBlock_RS1** The total DataSourceMatchingInfoBlock objects targeting Windows 10 version 1607 on this device. +- **DataSourceMatchingInfoBlock_RS2** The count of the number of this particular object type present on this device. +- **DataSourceMatchingInfoBlock_RS3** The count of the number of this particular object type present on this device. +- **DataSourceMatchingInfoBlock_RS3Setup** The count of the number of this particular object type present on this device. +- **DataSourceMatchingInfoBlock_RS4** The count of the number of this particular object type present on this device. +- **DataSourceMatchingInfoBlock_RS4Setup** The count of the number of this particular object type present on this device. +- **DataSourceMatchingInfoBlock_RS5** The count of the number of this particular object type present on this device. +- **DataSourceMatchingInfoBlock_RS5Setup** The count of the number of this particular object type present on this device. +- **DataSourceMatchingInfoBlock_TH1** The count of the number of this particular object type present on this device. +- **DataSourceMatchingInfoBlock_TH2** The count of the number of this particular object type present on this device. +- **DataSourceMatchingInfoPassive_19ASetup** The count of the number of this particular object type present on this device. +- **DataSourceMatchingInfoPassive_19H1** The count of the number of this particular object type present on this device. +- **DataSourceMatchingInfoPassive_19H1Setup** The count of the number of this particular object type present on this device. +- **DataSourceMatchingInfoPassive_RS1** The total DataSourceMatchingInfoPassive objects targeting Windows 10 version 1607 on this device. +- **DataSourceMatchingInfoPassive_RS2** The count of the number of this particular object type present on this device. +- **DataSourceMatchingInfoPassive_RS3** The count of the number of this particular object type present on this device. +- **DataSourceMatchingInfoPassive_RS3Setup** The count of the number of this particular object type present on this device. +- **DataSourceMatchingInfoPassive_RS4** The count of the number of this particular object type present on this device. +- **DataSourceMatchingInfoPassive_RS4Setup** The count of the number of this particular object type present on this device. +- **DataSourceMatchingInfoPassive_RS5** The count of the number of this particular object type present on this device. +- **DataSourceMatchingInfoPassive_RS5Setup** The count of the number of this particular object type present on this device. +- **DataSourceMatchingInfoPassive_TH1** The count of the number of this particular object type present on this device. +- **DataSourceMatchingInfoPassive_TH2** The count of the number of this particular object type present on this device. +- **DataSourceMatchingInfoPostUpgrade_19ASetup** The count of the number of this particular object type present on this device. +- **DataSourceMatchingInfoPostUpgrade_19H1** The count of the number of this particular object type present on this device. +- **DataSourceMatchingInfoPostUpgrade_19H1Setup** The count of the number of this particular object type present on this device. +- **DataSourceMatchingInfoPostUpgrade_RS1** The total DataSourceMatchingInfoPostUpgrade objects targeting Windows 10 version 1607 on this device. +- **DataSourceMatchingInfoPostUpgrade_RS2** The total DataSourceMatchingInfoPostUpgrade objects targeting Windows 10 version 1703 on this device. +- **DataSourceMatchingInfoPostUpgrade_RS3** The total DataSourceMatchingInfoPostUpgrade objects targeting Windows 10 version 1709 on this device. +- **DataSourceMatchingInfoPostUpgrade_RS3Setup** The count of the number of this particular object type present on this device. +- **DataSourceMatchingInfoPostUpgrade_RS4** The count of the number of this particular object type present on this device. +- **DataSourceMatchingInfoPostUpgrade_RS4Setup** The count of the number of this particular object type present on this device. +- **DataSourceMatchingInfoPostUpgrade_RS5** The count of the number of this particular object type present on this device. +- **DataSourceMatchingInfoPostUpgrade_RS5Setup** The count of the number of this particular object type present on this device. +- **DataSourceMatchingInfoPostUpgrade_TH1** The count of the number of this particular object type present on this device. +- **DataSourceMatchingInfoPostUpgrade_TH2** The count of the number of this particular object type present on this device. +- **DatasourceSystemBios_19ASetup** The count of the number of this particular object type present on this device. +- **DatasourceSystemBios_19H1** The count of the number of this particular object type present on this device. +- **DatasourceSystemBios_19H1Setup** The count of the number of this particular object type present on this device. +- **DatasourceSystemBios_RS1** The total DatasourceSystemBios objects targeting Windows 10 version 1607 present on this device. +- **DatasourceSystemBios_RS2** The total DatasourceSystemBios objects targeting Windows 10 version 1703 present on this device. +- **DatasourceSystemBios_RS3** The total DatasourceSystemBios objects targeting Windows 10 version 1709 present on this device. +- **DatasourceSystemBios_RS3Setup** The count of the number of this particular object type present on this device. +- **DatasourceSystemBios_RS4** The count of the number of this particular object type present on this device. +- **DatasourceSystemBios_RS4Setup** The count of the number of this particular object type present on this device. +- **DatasourceSystemBios_RS5** The count of the number of this particular object type present on this device. +- **DatasourceSystemBios_RS5Setup** The count of the number of this particular object type present on this device. +- **DatasourceSystemBios_TH1** The count of the number of this particular object type present on this device. +- **DatasourceSystemBios_TH2** The count of the number of this particular object type present on this device. +- **DecisionApplicationFile_19ASetup** The count of the number of this particular object type present on this device. +- **DecisionApplicationFile_19H1** The count of the number of this particular object type present on this device. +- **DecisionApplicationFile_19H1Setup** The count of the number of this particular object type present on this device. +- **DecisionApplicationFile_RS1** The count of the number of this particular object type present on this device. +- **DecisionApplicationFile_RS2** The count of the number of this particular object type present on this device. +- **DecisionApplicationFile_RS3** The count of the number of this particular object type present on this device. +- **DecisionApplicationFile_RS3Setup** The count of the number of this particular object type present on this device. +- **DecisionApplicationFile_RS4** The count of the number of this particular object type present on this device. +- **DecisionApplicationFile_RS4Setup** The count of the number of this particular object type present on this device. +- **DecisionApplicationFile_RS5** The count of the number of this particular object type present on this device. +- **DecisionApplicationFile_RS5Setup** The count of the number of this particular object type present on this device. +- **DecisionApplicationFile_TH1** The count of the number of this particular object type present on this device. +- **DecisionApplicationFile_TH2** The count of the number of this particular object type present on this device. +- **DecisionDevicePnp_19ASetup** The count of the number of this particular object type present on this device. +- **DecisionDevicePnp_19H1** The count of the number of this particular object type present on this device. +- **DecisionDevicePnp_19H1Setup** The count of the number of this particular object type present on this device. +- **DecisionDevicePnp_RS1** The total DecisionDevicePnp objects targeting Windows 10 version 1607 on this device. +- **DecisionDevicePnp_RS2** The count of the number of this particular object type present on this device. +- **DecisionDevicePnp_RS3** The count of the number of this particular object type present on this device. +- **DecisionDevicePnp_RS3Setup** The count of the number of this particular object type present on this device. +- **DecisionDevicePnp_RS4** The count of the number of this particular object type present on this device. +- **DecisionDevicePnp_RS4Setup** The count of the number of this particular object type present on this device. +- **DecisionDevicePnp_RS5** The count of the number of this particular object type present on this device. +- **DecisionDevicePnp_RS5Setup** The count of the number of this particular object type present on this device. +- **DecisionDevicePnp_TH1** The count of the number of this particular object type present on this device. +- **DecisionDevicePnp_TH2** The count of the number of this particular object type present on this device. +- **DecisionDriverPackage_19ASetup** The count of the number of this particular object type present on this device. +- **DecisionDriverPackage_19H1** The count of the number of this particular object type present on this device. +- **DecisionDriverPackage_19H1Setup** The count of the number of this particular object type present on this device. +- **DecisionDriverPackage_RS1** The total DecisionDriverPackage objects targeting Windows 10 version 1607 on this device. +- **DecisionDriverPackage_RS2** The count of the number of this particular object type present on this device. +- **DecisionDriverPackage_RS3** The count of the number of this particular object type present on this device. +- **DecisionDriverPackage_RS3Setup** The count of the number of this particular object type present on this device. +- **DecisionDriverPackage_RS4** The count of the number of this particular object type present on this device. +- **DecisionDriverPackage_RS4Setup** The count of the number of this particular object type present on this device. +- **DecisionDriverPackage_RS5** The count of the number of this particular object type present on this device. +- **DecisionDriverPackage_RS5Setup** The count of the number of this particular object type present on this device. +- **DecisionDriverPackage_TH1** The count of the number of this particular object type present on this device. +- **DecisionDriverPackage_TH2** The count of the number of this particular object type present on this device. +- **DecisionMatchingInfoBlock_19ASetup** The count of the number of this particular object type present on this device. +- **DecisionMatchingInfoBlock_19H1** The count of the number of this particular object type present on this device. +- **DecisionMatchingInfoBlock_19H1Setup** The count of the number of this particular object type present on this device. +- **DecisionMatchingInfoBlock_RS1** The total DecisionMatchingInfoBlock objects targeting Windows 10 version 1607 present on this device. +- **DecisionMatchingInfoBlock_RS2** The total DecisionMatchingInfoBlock objects targeting Windows 10 version 1703 present on this device. +- **DecisionMatchingInfoBlock_RS3** The total DecisionMatchingInfoBlock objects targeting Windows 10 version 1709 present on this device. +- **DecisionMatchingInfoBlock_RS3Setup** The count of the number of this particular object type present on this device. +- **DecisionMatchingInfoBlock_RS4** The total DecisionMatchingInfoBlock objects targeting Windows 10 version 1803 present on this device. +- **DecisionMatchingInfoBlock_RS4Setup** The count of the number of this particular object type present on this device. +- **DecisionMatchingInfoBlock_RS5** The count of the number of this particular object type present on this device. +- **DecisionMatchingInfoBlock_RS5Setup** The count of the number of this particular object type present on this device. +- **DecisionMatchingInfoBlock_TH1** The count of the number of this particular object type present on this device. +- **DecisionMatchingInfoBlock_TH2** The count of the number of this particular object type present on this device. +- **DecisionMatchingInfoPassive_19ASetup** The count of the number of this particular object type present on this device. +- **DecisionMatchingInfoPassive_19H1** The count of the number of this particular object type present on this device. +- **DecisionMatchingInfoPassive_19H1Setup** The count of the number of this particular object type present on this device. +- **DecisionMatchingInfoPassive_RS1** The total DecisionMatchingInfoPassive objects targeting Windows 10 version 1607 on this device. +- **DecisionMatchingInfoPassive_RS2** The total DecisionMatchingInfoPassive objects targeting Windows 10 version 1703 on this device. +- **DecisionMatchingInfoPassive_RS3** The total DecisionMatchingInfoPassive objects targeting Windows 10 version 1803 on this device. +- **DecisionMatchingInfoPassive_RS3Setup** The count of the number of this particular object type present on this device. +- **DecisionMatchingInfoPassive_RS4** The count of the number of this particular object type present on this device. +- **DecisionMatchingInfoPassive_RS4Setup** The count of the number of this particular object type present on this device. +- **DecisionMatchingInfoPassive_RS5** The count of the number of this particular object type present on this device. +- **DecisionMatchingInfoPassive_RS5Setup** The count of the number of this particular object type present on this device. +- **DecisionMatchingInfoPassive_TH1** The count of the number of this particular object type present on this device. +- **DecisionMatchingInfoPassive_TH2** The count of the number of this particular object type present on this device. +- **DecisionMatchingInfoPostUpgrade_19ASetup** The count of the number of this particular object type present on this device. +- **DecisionMatchingInfoPostUpgrade_19H1** The count of the number of this particular object type present on this device. +- **DecisionMatchingInfoPostUpgrade_19H1Setup** The count of the number of this particular object type present on this device. +- **DecisionMatchingInfoPostUpgrade_RS1** The total DecisionMatchingInfoPostUpgrade objects targeting Windows 10 version 1607 on this device. +- **DecisionMatchingInfoPostUpgrade_RS2** The total DecisionMatchingInfoPostUpgrade objects targeting Windows 10 version 1703 on this device. +- **DecisionMatchingInfoPostUpgrade_RS3** The total DecisionMatchingInfoPostUpgrade objects targeting Windows 10 version 1709 on this device. +- **DecisionMatchingInfoPostUpgrade_RS3Setup** The count of the number of this particular object type present on this device. +- **DecisionMatchingInfoPostUpgrade_RS4** The count of the number of this particular object type present on this device. +- **DecisionMatchingInfoPostUpgrade_RS4Setup** The count of the number of this particular object type present on this device. +- **DecisionMatchingInfoPostUpgrade_RS5** The count of the number of this particular object type present on this device. +- **DecisionMatchingInfoPostUpgrade_RS5Setup** The count of the number of this particular object type present on this device. +- **DecisionMatchingInfoPostUpgrade_TH1** The count of the number of this particular object type present on this device. +- **DecisionMatchingInfoPostUpgrade_TH2** The count of the number of this particular object type present on this device. +- **DecisionMediaCenter_19ASetup** The count of the number of this particular object type present on this device. +- **DecisionMediaCenter_19H1** The count of the number of this particular object type present on this device. +- **DecisionMediaCenter_19H1Setup** The total DecisionMediaCenter objects targeting the next release of Windows on this device. +- **DecisionMediaCenter_RS1** The total DecisionMediaCenter objects targeting Windows 10 version 1607 present on this device. +- **DecisionMediaCenter_RS2** The total DecisionMediaCenter objects targeting Windows 10 version 1703 present on this device. +- **DecisionMediaCenter_RS3** The total DecisionMediaCenter objects targeting Windows 10 version 1709 present on this device. +- **DecisionMediaCenter_RS3Setup** The count of the number of this particular object type present on this device. +- **DecisionMediaCenter_RS4** The total DecisionMediaCenter objects targeting Windows 10 version 1803 present on this device. +- **DecisionMediaCenter_RS4Setup** The count of the number of this particular object type present on this device. +- **DecisionMediaCenter_RS5** The count of the number of this particular object type present on this device. +- **DecisionMediaCenter_RS5Setup** The count of the number of this particular object type present on this device. +- **DecisionMediaCenter_TH1** The count of the number of this particular object type present on this device. +- **DecisionMediaCenter_TH2** The count of the number of this particular object type present on this device. +- **DecisionSystemBios_19ASetup** The total DecisionSystemBios objects targeting the next release of Windows on this device. +- **DecisionSystemBios_19H1** The count of the number of this particular object type present on this device. +- **DecisionSystemBios_19H1Setup** The total DecisionSystemBios objects targeting the next release of Windows on this device. +- **DecisionSystemBios_RS1** The total DecisionSystemBios objects targeting Windows 10 version 1607 on this device. +- **DecisionSystemBios_RS2** The total DecisionSystemBios objects targeting Windows 10 version 1703 on this device. +- **DecisionSystemBios_RS3** The total DecisionSystemBios objects targeting Windows 10 version 1709 on this device. +- **DecisionSystemBios_RS3Setup** The count of the number of this particular object type present on this device. +- **DecisionSystemBios_RS4** The total DecisionSystemBios objects targeting Windows 10 version, 1803 present on this device. +- **DecisionSystemBios_RS4Setup** The total DecisionSystemBios objects targeting the next release of Windows on this device. +- **DecisionSystemBios_RS5** The total DecisionSystemBios objects targeting the next release of Windows on this device. +- **DecisionSystemBios_RS5Setup** The total DecisionSystemBios objects targeting the next release of Windows on this device. +- **DecisionSystemBios_TH1** The count of the number of this particular object type present on this device. +- **DecisionSystemBios_TH2** The count of the number of this particular object type present on this device. +- **DecisionSystemProcessor_RS2** The count of the number of this particular object type present on this device. +- **DecisionTest_RS1** An ID for the system, calculated by hashing hardware identifiers. +- **InventoryApplicationFile** The count of the number of this particular object type present on this device. +- **InventoryDeviceContainer** A count of device container objects in cache. +- **InventoryDevicePnp** A count of device Plug and Play objects in cache. +- **InventoryDriverBinary** A count of driver binary objects in cache. +- **InventoryDriverPackage** A count of device objects in cache. +- **InventoryLanguagePack** The count of the number of this particular object type present on this device. +- **InventoryMediaCenter** The count of the number of this particular object type present on this device. +- **InventorySystemBios** The count of the number of this particular object type present on this device. +- **InventorySystemMachine** The count of the number of this particular object type present on this device. +- **InventorySystemProcessor** The count of the number of this particular object type present on this device. +- **InventoryTest** The count of the number of this particular object type present on this device. +- **InventoryUplevelDriverPackage** The count of the number of this particular object type present on this device. +- **PCFP** The count of the number of this particular object type present on this device. +- **SystemMemory** The count of the number of this particular object type present on this device. +- **SystemProcessorCompareExchange** The count of the number of this particular object type present on this device. +- **SystemProcessorLahfSahf** The count of the number of this particular object type present on this device. +- **SystemProcessorNx** The total number of objects of this type present on this device. +- **SystemProcessorPrefetchW** The total number of objects of this type present on this device. +- **SystemProcessorSse2** The total number of objects of this type present on this device. +- **SystemTouch** The count of the number of this particular object type present on this device. +- **SystemWim** The total number of objects of this type present on this device. +- **SystemWindowsActivationStatus** The count of the number of this particular object type present on this device. +- **SystemWlan** The total number of objects of this type present on this device. +- **Wmdrm_19ASetup** The count of the number of this particular object type present on this device. +- **Wmdrm_19H1** The count of the number of this particular object type present on this device. +- **Wmdrm_19H1Setup** The total Wmdrm objects targeting the next release of Windows on this device. +- **Wmdrm_RS1** An ID for the system, calculated by hashing hardware identifiers. +- **Wmdrm_RS2** An ID for the system, calculated by hashing hardware identifiers. +- **Wmdrm_RS3** An ID for the system, calculated by hashing hardware identifiers. +- **Wmdrm_RS3Setup** The count of the number of this particular object type present on this device. +- **Wmdrm_RS4** The total Wmdrm objects targeting Windows 10, version 1803 present on this device. +- **Wmdrm_RS4Setup** The count of the number of this particular object type present on this device. +- **Wmdrm_RS5** The count of the number of this particular object type present on this device. +- **Wmdrm_RS5Setup** The count of the number of this particular object type present on this device. +- **Wmdrm_TH1** The count of the number of this particular object type present on this device. +- **Wmdrm_TH2** The count of the number of this particular object type present on this device. + + +### Microsoft.Windows.Appraiser.General.DatasourceApplicationFileAdd + +Represents the basic metadata about specific application files installed on the system. + +This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedeviceinventorychange). + +The following fields are available: + +- **AppraiserVersion** The version of the appraiser file that is generating the events. +- **AvDisplayName** If the app is an anti-virus app, this is its display name. +- **CompatModelIndex** The compatibility prediction for this file. +- **HasCitData** Indicates whether the file is present in CIT data. +- **HasUpgradeExe** Indicates whether the anti-virus app has an upgrade.exe file. +- **IsAv** Is the file an anti-virus reporting EXE? +- **ResolveAttempted** This will always be an empty string when sending telemetry. +- **SdbEntries** An array of fields that indicates the SDB entries that apply to this file. + + +### Microsoft.Windows.Appraiser.General.DatasourceApplicationFileRemove + +This event indicates that the DatasourceApplicationFile object is no longer present. + +This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedeviceinventorychange). + +The following fields are available: + +- **AppraiserVersion** The version of the Appraiser file that is generating the events. + + +### Microsoft.Windows.Appraiser.General.DatasourceApplicationFileStartSync + +This event indicates that a new set of DatasourceApplicationFileAdd events will be sent. + +This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedeviceinventorychange). + +The following fields are available: + +- **AppraiserVersion** The version of the Appraiser file that is generating the events. + + +### Microsoft.Windows.Appraiser.General.DatasourceDevicePnpAdd + +This event sends compatibility data for a Plug and Play device, to help keep Windows up to date. + +This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedeviceinventorychange). + +The following fields are available: + +- **ActiveNetworkConnection** Indicates whether the device is an active network device. +- **AppraiserVersion** The version of the appraiser file generating the events. +- **CosDeviceRating** An enumeration that indicates if there is a driver on the target operating system. +- **CosDeviceSolution** An enumeration that indicates how a driver on the target operating system is available. +- **CosDeviceSolutionUrl** Microsoft.Windows.Appraiser.General.DatasourceDevicePnpAdd . Empty string +- **CosPopulatedFromId** The expected uplevel driver matching ID based on driver coverage data. +- **IsBootCritical** Indicates whether the device boot is critical. +- **UplevelInboxDriver** Indicates whether there is a driver uplevel for this device. +- **WuDriverCoverage** Indicates whether there is a driver uplevel for this device, according to Windows Update. +- **WuDriverUpdateId** The Windows Update ID of the applicable uplevel driver. +- **WuPopulatedFromId** The expected uplevel driver matching ID based on driver coverage from Windows Update. + + +### Microsoft.Windows.Appraiser.General.DatasourceDevicePnpRemove + +This event indicates that the DatasourceDevicePnp object is no longer present. + +This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedeviceinventorychange). + +The following fields are available: + +- **AppraiserVersion** The version of the Appraiser file that is generating the events. + + +### Microsoft.Windows.Appraiser.General.DatasourceDevicePnpStartSync + +This event indicates that a new set of DatasourceDevicePnpAdd events will be sent. + +This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedeviceinventorychange). + +The following fields are available: + +- **AppraiserVersion** The version of the Appraiser file that is generating the events. + + +### Microsoft.Windows.Appraiser.General.DatasourceDriverPackageAdd + +This event sends compatibility database data about driver packages to help keep Windows up to date. + +This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedeviceinventorychange). + +The following fields are available: + +- **AppraiserVersion** The version of the appraiser file generating the events. + + +### Microsoft.Windows.Appraiser.General.DatasourceDriverPackageStartSync + +This event indicates that a new set of DatasourceDriverPackageAdd events will be sent. + +This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedeviceinventorychange). + +The following fields are available: + +- **AppraiserVersion** The version of the Appraiser file that is generating the events. + + +### Microsoft.Windows.Appraiser.General.DataSourceMatchingInfoBlockAdd + +This event sends blocking data about any compatibility blocking entries hit on the system that are not directly related to specific applications or devices, to help keep Windows up-to-date. + +This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedeviceinventorychange). + +The following fields are available: + +- **AppraiserVersion** The version of the appraiser file generating the events. + + +### Microsoft.Windows.Appraiser.General.DataSourceMatchingInfoBlockRemove + +This event indicates that the DataSourceMatchingInfoBlock object is no longer present. + +This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedeviceinventorychange). + +The following fields are available: + +- **AppraiserVersion** The version of the Appraiser file that is generating the events. + + +### Microsoft.Windows.Appraiser.General.DataSourceMatchingInfoBlockStartSync + +This event indicates that a full set of DataSourceMatchingInfoBlockStAdd events have been sent. + +This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedeviceinventorychange). + +The following fields are available: + +- **AppraiserVersion** The version of the Appraiser file that is generating the events. + + +### Microsoft.Windows.Appraiser.General.DataSourceMatchingInfoPassiveAdd + +This event sends compatibility database information about non-blocking compatibility entries on the system that are not keyed by either applications or devices, to help keep Windows up-to-date. + +This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedeviceinventorychange). + +The following fields are available: + +- **AppraiserVersion** The version of the appraiser file generating the events. + + +### Microsoft.Windows.Appraiser.General.DataSourceMatchingInfoPassiveRemove + +This event indicates that the DataSourceMatchingInfoPassive object is no longer present. + +This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedeviceinventorychange). + +The following fields are available: + +- **AppraiserVersion** The version of the Appraiser file that is generating the events. + + +### Microsoft.Windows.Appraiser.General.DataSourceMatchingInfoPassiveStartSync + +This event indicates that a new set of DataSourceMatchingInfoPassiveAdd events will be sent. + +This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedeviceinventorychange). + +The following fields are available: + +- **AppraiserVersion** The version of the Appraiser file that is generating the events. + + +### Microsoft.Windows.Appraiser.General.DataSourceMatchingInfoPostUpgradeAdd + +This event sends compatibility database information about entries requiring reinstallation after an upgrade on the system that are not keyed by either applications or devices, to help keep Windows up-to-date. + +This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedeviceinventorychange). + +The following fields are available: + +- **AppraiserVersion** The version of the appraiser file generating the events. + + +### Microsoft.Windows.Appraiser.General.DataSourceMatchingInfoPostUpgradeRemove + +This event indicates that the DataSourceMatchingInfoPostUpgrade object is no longer present. + +This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedeviceinventorychange). + +The following fields are available: + +- **AppraiserVersion** The version of the Appraiser file that is generating the events. + + +### Microsoft.Windows.Appraiser.General.DataSourceMatchingInfoPostUpgradeStartSync + +This event indicates that a new set of DataSourceMatchingInfoPostUpgradeAdd events will be sent. + +This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedeviceinventorychange). + +The following fields are available: + +- **AppraiserVersion** The version of the Appraiser file that is generating the events. + + +### Microsoft.Windows.Appraiser.General.DatasourceSystemBiosAdd + +This event sends compatibility database information about the BIOS to help keep Windows up-to-date. + +This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedeviceinventorychange). + +The following fields are available: + +- **AppraiserVersion** The version of the Appraiser file generating the events. + + +### Microsoft.Windows.Appraiser.General.DatasourceSystemBiosRemove + +This event indicates that the DatasourceSystemBios object is no longer present. + +This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedeviceinventorychange). + +The following fields are available: + +- **AppraiserVersion** The version of the Appraiser file that is generating the events. + + +### Microsoft.Windows.Appraiser.General.DatasourceSystemBiosStartSync + +This event indicates that a new set of DatasourceSystemBiosAdd events will be sent. + +This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedeviceinventorychange). + +The following fields are available: + +- **AppraiserVersion** The version of the Appraiser file that is generating the events. + + +### Microsoft.Windows.Appraiser.General.DecisionApplicationFileAdd + +This event sends compatibility decision data about a file to help keep Windows up-to-date. + +This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedeviceinventorychange). + +The following fields are available: + +- **AppraiserVersion** The version of the appraiser file that is generating the events. +- **BlockAlreadyInbox** The uplevel runtime block on the file already existed on the current OS. +- **BlockingApplication** Indicates whether there are any application issues that interfere with the upgrade due to the file in question. +- **DisplayGenericMessage** Will be a generic message be shown for this file? +- **DisplayGenericMessageGated** Indicates whether a generic message be shown for this file. +- **HardBlock** This file is blocked in the SDB. +- **HasUxBlockOverride** Does the file have a block that is overridden by a tag in the SDB? +- **MigApplication** Does the file have a MigXML from the SDB associated with it that applies to the current upgrade mode? +- **MigRemoval** Does the file have a MigXML from the SDB that will cause the app to be removed on upgrade? +- **NeedsDismissAction** Will the file cause an action that can be dimissed? +- **NeedsInstallPostUpgradeData** After upgrade, the file will have a post-upgrade notification to install a replacement for the app. +- **NeedsNotifyPostUpgradeData** Does the file have a notification that should be shown after upgrade? +- **NeedsReinstallPostUpgradeData** After upgrade, this file will have a post-upgrade notification to reinstall the app. +- **NeedsUninstallAction** The file must be uninstalled to complete the upgrade. +- **SdbBlockUpgrade** The file is tagged as blocking upgrade in the SDB, +- **SdbBlockUpgradeCanReinstall** The file is tagged as blocking upgrade in the SDB. It can be reinstalled after upgrade. +- **SdbBlockUpgradeUntilUpdate** The file is tagged as blocking upgrade in the SDB. If the app is updated, the upgrade can proceed. +- **SdbReinstallUpgrade** The file is tagged as needing to be reinstalled after upgrade in the SDB. It does not block upgrade. +- **SdbReinstallUpgradeWarn** The file is tagged as needing to be reinstalled after upgrade with a warning in the SDB. It does not block upgrade. +- **SoftBlock** The file is softblocked in the SDB and has a warning. + + +### Microsoft.Windows.Appraiser.General.DecisionApplicationFileRemove + +This event indicates Indicates that the DecisionApplicationFile object is no longer present. + +This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedeviceinventorychange). + +The following fields are available: + +- **AppraiserVersion** The version of the Appraiser file that is generating the events. + + +### Microsoft.Windows.Appraiser.General.DecisionApplicationFileStartSync + +This event indicates that a new set of DecisionApplicationFileAdd events will be sent. + +This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedeviceinventorychange). + +The following fields are available: + +- **AppraiserVersion** The version of the Appraiser file that is generating the events. + + +### Microsoft.Windows.Appraiser.General.DecisionDevicePnpAdd + +This event sends compatibility decision data about a PNP device to help keep Windows up to date. + +This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedeviceinventorychange). + +The following fields are available: + +- **AppraiserVersion** The version of the appraiser file generating the events. +- **AssociatedDriverIsBlocked** Is the driver associated with this PNP device blocked? +- **AssociatedDriverWillNotMigrate** Will the driver associated with this plug-and-play device migrate? +- **BlockAssociatedDriver** Should the driver associated with this PNP device be blocked? +- **BlockingDevice** Is this PNP device blocking upgrade? +- **BlockUpgradeIfDriverBlocked** Is the PNP device both boot critical and does not have a driver included with the OS? +- **BlockUpgradeIfDriverBlockedAndOnlyActiveNetwork** Is this PNP device the only active network device? +- **DisplayGenericMessage** Will a generic message be shown during Setup for this PNP device? +- **DisplayGenericMessageGated** Indicates whether a generic message will be shown during Setup for this PNP device. +- **DriverAvailableInbox** Is a driver included with the operating system for this PNP device? +- **DriverAvailableOnline** Is there a driver for this PNP device on Windows Update? +- **DriverAvailableUplevel** Is there a driver on Windows Update or included with the operating system for this PNP device? +- **DriverBlockOverridden** Is there is a driver block on the device that has been overridden? +- **NeedsDismissAction** Will the user would need to dismiss a warning during Setup for this device? +- **NotRegressed** Does the device have a problem code on the source OS that is no better than the one it would have on the target OS? +- **SdbDeviceBlockUpgrade** Is there an SDB block on the PNP device that blocks upgrade? +- **SdbDriverBlockOverridden** Is there an SDB block on the PNP device that blocks upgrade, but that block was overridden? + + +### Microsoft.Windows.Appraiser.General.DecisionDevicePnpRemove + +This event indicates that the DecisionDevicePnp object is no longer present. + +This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedeviceinventorychange). + +The following fields are available: + +- **AppraiserVersion** The version of the Appraiser file that is generating the events. + + +### Microsoft.Windows.Appraiser.General.DecisionDevicePnpStartSync + +The DecisionDevicePnpStartSync event indicates that a new set of DecisionDevicePnpAdd events will be sent. + +This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedeviceinventorychange). + +The following fields are available: + +- **AppraiserVersion** The version of the Appraiser file that is generating the events. + + +### Microsoft.Windows.Appraiser.General.DecisionDriverPackageAdd + +This event sends decision data about driver package compatibility to help keep Windows up to date. + +This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedeviceinventorychange). + +The following fields are available: + +- **AppraiserVersion** The version of the appraiser file generating the events. +- **DisplayGenericMessageGated** Indicates whether a generic offer block message will be shown for this driver package. +- **DriverBlockOverridden** Does the driver package have an SDB block that blocks it from migrating, but that block has been overridden? +- **DriverIsDeviceBlocked** Was the driver package was blocked because of a device block? +- **DriverIsDriverBlocked** Is the driver package blocked because of a driver block? +- **DriverIsTroubleshooterBlocked** Indicates whether the driver package is blocked because of a troubleshooter block. +- **DriverShouldNotMigrate** Should the driver package be migrated during upgrade? +- **SdbDriverBlockOverridden** Does the driver package have an SDB block that blocks it from migrating, but that block has been overridden? + + +### Microsoft.Windows.Appraiser.General.DecisionDriverPackageRemove + +This event indicates that the DecisionDriverPackage object is no longer present. + +This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedeviceinventorychange). + +The following fields are available: + +- **AppraiserVersion** The version of the Appraiser file that is generating the events. + + +### Microsoft.Windows.Appraiser.General.DecisionDriverPackageStartSync + +This event indicates that a new set of DecisionDriverPackageAdd events will be sent. + +This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedeviceinventorychange). + +The following fields are available: + +- **AppraiserVersion** The version of the Appraiser file that is generating the events. + + +### Microsoft.Windows.Appraiser.General.DecisionMatchingInfoBlockAdd + +This event sends compatibility decision data about blocking entries on the system that are not keyed by either applications or devices, to help keep Windows up to date. + +This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedeviceinventorychange). + +The following fields are available: + +- **AppraiserVersion** The version of the appraiser file generating the events. +- **BlockingApplication** Are there are any application issues that interfere with upgrade due to matching info blocks? +- **DisplayGenericMessage** Will a generic message be shown for this block? +- **NeedsUninstallAction** Does the user need to take an action in setup due to a matching info block? +- **SdbBlockUpgrade** Is a matching info block blocking upgrade? +- **SdbBlockUpgradeCanReinstall** Is a matching info block blocking upgrade, but has the can reinstall tag? +- **SdbBlockUpgradeUntilUpdate** Is a matching info block blocking upgrade but has the until update tag? + + +### Microsoft.Windows.Appraiser.General.DecisionMatchingInfoBlockRemove + +This event indicates that the DecisionMatchingInfoBlock object is no longer present. + +This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedeviceinventorychange). + +The following fields are available: + +- **AppraiserVersion** The version of the Appraiser file that is generating the events. + + +### Microsoft.Windows.Appraiser.General.DecisionMatchingInfoBlockStartSync + +This event indicates that a new set of DecisionMatchingInfoBlockAdd events will be sent. + +This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedeviceinventorychange). + +The following fields are available: + +- **AppraiserVersion** The version of the Appraiser file that is generating the events. + + +### Microsoft.Windows.Appraiser.General.DecisionMatchingInfoPassiveAdd + +This event sends compatibility decision data about non-blocking entries on the system that are not keyed by either applications or devices, to help keep Windows up to date. + +This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedeviceinventorychange). + +The following fields are available: + +- **AppraiserVersion** The version of the Appraiser file that is generating the events. +- **BlockingApplication** Are there any application issues that interfere with upgrade due to matching info blocks? +- **DisplayGenericMessageGated** Indicates whether a generic offer block message will be shown due to matching info blocks. +- **MigApplication** Is there a matching info block with a mig for the current mode of upgrade? + + +### Microsoft.Windows.Appraiser.General.DecisionMatchingInfoPassiveRemove + +This event Indicates that the DecisionMatchingInfoPassive object is no longer present. + +This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedeviceinventorychange). + +The following fields are available: + +- **AppraiserVersion** The version of the Appraiser file that is generating the events. + + +### Microsoft.Windows.Appraiser.General.DecisionMatchingInfoPassiveStartSync + +This event indicates that a new set of DecisionMatchingInfoPassiveAdd events will be sent. + +This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedeviceinventorychange). + +The following fields are available: + +- **AppraiserVersion** The version of the Appraiser file that is generating the events. + + +### Microsoft.Windows.Appraiser.General.DecisionMatchingInfoPostUpgradeAdd + +This event sends compatibility decision data about entries that require reinstall after upgrade. It's used to help keep Windows up to date. + +This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedeviceinventorychange). + +The following fields are available: + +- **AppraiserVersion** The version of the Appraiser file that is generating the events. +- **NeedsInstallPostUpgradeData** Will the file have a notification after upgrade to install a replacement for the app? +- **NeedsNotifyPostUpgradeData** Should a notification be shown for this file after upgrade? +- **NeedsReinstallPostUpgradeData** Will the file have a notification after upgrade to reinstall the app? +- **SdbReinstallUpgrade** The file is tagged as needing to be reinstalled after upgrade in the compatibility database (but is not blocking upgrade). + + +### Microsoft.Windows.Appraiser.General.DecisionMatchingInfoPostUpgradeRemove + +This event indicates that the DecisionMatchingInfoPostUpgrade object is no longer present. + +This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedeviceinventorychange). + +The following fields are available: + +- **AppraiserVersion** The version of the Appraiser file that is generating the events. + + +### Microsoft.Windows.Appraiser.General.DecisionMatchingInfoPostUpgradeStartSync + +This event indicates that a new set of DecisionMatchingInfoPostUpgradeAdd events will be sent. + +This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedeviceinventorychange). + +The following fields are available: + +- **AppraiserVersion** The version of the Appraiser file that is generating the events. + + +### Microsoft.Windows.Appraiser.General.DecisionMediaCenterAdd + +This event sends decision data about the presence of Windows Media Center, to help keep Windows up to date. + +This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedeviceinventorychange). + +The following fields are available: + +- **AppraiserVersion** The version of the Appraiser file generating the events. +- **BlockingApplication** Is there any application issues that interfere with upgrade due to Windows Media Center? +- **MediaCenterActivelyUsed** If Windows Media Center is supported on the edition, has it been run at least once and are the MediaCenterIndicators are true? +- **MediaCenterIndicators** Do any indicators imply that Windows Media Center is in active use? +- **MediaCenterInUse** Is Windows Media Center actively being used? +- **MediaCenterPaidOrActivelyUsed** Is Windows Media Center actively being used or is it running on a supported edition? +- **NeedsDismissAction** Are there any actions that can be dismissed coming from Windows Media Center? + + +### Microsoft.Windows.Appraiser.General.DecisionMediaCenterRemove + +This event indicates that the DecisionMediaCenter object is no longer present. + +This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedeviceinventorychange). + +The following fields are available: + +- **AppraiserVersion** The version of the Appraiser file that is generating the events. + + +### Microsoft.Windows.Appraiser.General.DecisionMediaCenterStartSync + +This event indicates that a new set of DecisionMediaCenterAdd events will be sent. + +This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedeviceinventorychange). + +The following fields are available: + +- **AppraiserVersion** The version of the Appraiser file that is generating the events. + + +### Microsoft.Windows.Appraiser.General.DecisionSystemBiosAdd + +This event sends compatibility decision data about the BIOS to help keep Windows up to date. + +This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedeviceinventorychange). + +The following fields are available: + +- **AppraiserVersion** The version of the Appraiser file generating the events. +- **Blocking** Is the device blocked from upgrade due to a BIOS block? +- **DisplayGenericMessageGated** Indicates whether a generic offer block message will be shown for the bios. +- **HasBiosBlock** Does the device have a BIOS block? + + +### Microsoft.Windows.Appraiser.General.DecisionSystemBiosRemove + +This event indicates that the DecisionSystemBios object is no longer present. + +This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedeviceinventorychange). + +The following fields are available: + +- **AppraiserVersion** The version of the Appraiser file that is generating the events. + + +### Microsoft.Windows.Appraiser.General.DecisionSystemBiosStartSync + +This event indicates that a new set of DecisionSystemBiosAdd events will be sent. + +This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedeviceinventorychange). + +The following fields are available: + +- **AppraiserVersion** The version of the Appraiser file that is generating the events. + + +### Microsoft.Windows.Appraiser.General.GatedRegChange + +This event sends data about the results of running a set of quick-blocking instructions, to help keep Windows up to date. + +The following fields are available: + +- **NewData** The data in the registry value after the scan completed. +- **OldData** The previous data in the registry value before the scan ran. +- **PCFP** An ID for the system calculated by hashing hardware identifiers. +- **RegKey** The registry key name for which a result is being sent. +- **RegValue** The registry value for which a result is being sent. +- **Time** The client time of the event. + + +### Microsoft.Windows.Appraiser.General.InventoryApplicationFileAdd + +This event represents the basic metadata about a file on the system. The file must be part of an app and either have a block in the compatibility database or be part of an antivirus program. + +This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedeviceinventorychange). + +The following fields are available: + +- **AppraiserVersion** The version of the Appraiser file generating the events. +- **AvDisplayName** If the app is an antivirus app, this is its display name. +- **AvProductState** Indicates whether the antivirus program is turned on and the signatures are up to date. +- **BinaryType** A binary type. Example: UNINITIALIZED, ZERO_BYTE, DATA_ONLY, DOS_MODULE, NE16_MODULE, PE32_UNKNOWN, PE32_I386, PE32_ARM, PE64_UNKNOWN, PE64_AMD64, PE64_ARM64, PE64_IA64, PE32_CLR_32, PE32_CLR_IL, PE32_CLR_IL_PREFER32, PE64_CLR_64. +- **BinFileVersion** An attempt to clean up FileVersion at the client that tries to place the version into 4 octets. +- **BinProductVersion** An attempt to clean up ProductVersion at the client that tries to place the version into 4 octets. +- **BoeProgramId** If there is no entry in Add/Remove Programs, this is the ProgramID that is generated from the file metadata. +- **CompanyName** The company name of the vendor who developed this file. +- **FileId** A hash that uniquely identifies a file. +- **FileVersion** The File version field from the file metadata under Properties -> Details. +- **HasUpgradeExe** Indicates whether the antivirus app has an upgrade.exe file. +- **IsAv** Indicates whether the file an antivirus reporting EXE. +- **LinkDate** The date and time that this file was linked on. +- **LowerCaseLongPath** The full file path to the file that was inventoried on the device. +- **Name** The name of the file that was inventoried. +- **ProductName** The Product name field from the file metadata under Properties -> Details. +- **ProductVersion** The Product version field from the file metadata under Properties -> Details. +- **ProgramId** A hash of the Name, Version, Publisher, and Language of an application used to identify it. +- **Size** The size of the file (in hexadecimal bytes). + + +### Microsoft.Windows.Appraiser.General.InventoryApplicationFileRemove + +This event indicates that the InventoryApplicationFile object is no longer present. + +This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedeviceinventorychange). + +The following fields are available: + +- **AppraiserVersion** The version of the Appraiser file that is generating the events. + + +### Microsoft.Windows.Appraiser.General.InventoryApplicationFileStartSync + +This event indicates indicates that a new set of InventoryApplicationFileAdd events will be sent. + +This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedeviceinventorychange). + +The following fields are available: + +- **AppraiserVersion** The version of the Appraiser file that is generating the events. + + +### Microsoft.Windows.Appraiser.General.InventoryLanguagePackAdd + +This event sends data about the number of language packs installed on the system, to help keep Windows up to date. + +This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedeviceinventorychange). + +The following fields are available: + +- **AppraiserVersion** The version of the Appraiser file that is generating the events. +- **HasLanguagePack** Indicates whether this device has 2 or more language packs. +- **LanguagePackCount** The number of language packs are installed. + + +### Microsoft.Windows.Appraiser.General.InventoryLanguagePackRemove + +This event indicates that the InventoryLanguagePack object is no longer present. + +This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedeviceinventorychange). + +The following fields are available: + +- **AppraiserVersion** The version of the Appraiser file that is generating the events. + + +### Microsoft.Windows.Appraiser.General.InventoryLanguagePackStartSync + +This event indicates that a new set of InventoryLanguagePackAdd events will be sent. + +This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedeviceinventorychange). + +The following fields are available: + +- **AppraiserVersion** The version of the Appraiser file that is generating the events. + + +### Microsoft.Windows.Appraiser.General.InventoryMediaCenterAdd + +This event sends true/false data about decision points used to understand whether Windows Media Center is used on the system, to help keep Windows up to date. + +This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedeviceinventorychange). + +The following fields are available: + +- **AppraiserVersion** The version of the Appraiser file generating the events. +- **EverLaunched** Has Windows Media Center ever been launched? +- **HasConfiguredTv** Has the user configured a TV tuner through Windows Media Center? +- **HasExtendedUserAccounts** Are any Windows Media Center Extender user accounts configured? +- **HasWatchedFolders** Are any folders configured for Windows Media Center to watch? +- **IsDefaultLauncher** Is Windows Media Center the default app for opening music or video files? +- **IsPaid** Is the user running a Windows Media Center edition that implies they paid for Windows Media Center? +- **IsSupported** Does the running OS support Windows Media Center? + + +### Microsoft.Windows.Appraiser.General.InventoryMediaCenterRemove + +This event indicates that the InventoryMediaCenter object is no longer present. + +This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedeviceinventorychange). + +The following fields are available: + +- **AppraiserVersion** The version of the Appraiser file that is generating the events. + + +### Microsoft.Windows.Appraiser.General.InventoryMediaCenterStartSync + +This event indicates that a new set of InventoryMediaCenterAdd events will be sent. + +This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedeviceinventorychange). + +The following fields are available: + +- **AppraiserVersion** The version of the Appraiser file that is generating the events. + + +### Microsoft.Windows.Appraiser.General.InventorySystemBiosAdd + +This event sends basic metadata about the BIOS to determine whether it has a compatibility block. + +This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedeviceinventorychange). + +The following fields are available: + +- **AppraiserVersion** The version of the Appraiser file that is generating the events. +- **biosDate** The release date of the BIOS in UTC format. +- **BiosDate** The release date of the BIOS in UTC format. +- **biosName** The name field from Win32_BIOS. +- **BiosName** The name field from Win32_BIOS. +- **manufacturer** The manufacturer field from Win32_ComputerSystem. +- **Manufacturer** The manufacturer field from Win32_ComputerSystem. +- **model** The model field from Win32_ComputerSystem. +- **Model** The model field from Win32_ComputerSystem. + + +### Microsoft.Windows.Appraiser.General.InventorySystemBiosRemove + +This event indicates that the InventorySystemBios object is no longer present. + +This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedeviceinventorychange). + +The following fields are available: + +- **AppraiserVersion** The version of the Appraiser file that is generating the events. + + +### Microsoft.Windows.Appraiser.General.InventorySystemBiosStartSync + +This event indicates that a new set of InventorySystemBiosAdd events will be sent. + +This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedeviceinventorychange). + +The following fields are available: + +- **AppraiserVersion** The version of the Appraiser file that is generating the events. + + +### Microsoft.Windows.Appraiser.General.InventoryUplevelDriverPackageAdd + +This event is only runs during setup. It provides a listing of the uplevel driver packages that were downloaded before the upgrade. Is critical to understanding if failures in setup can be traced to not having sufficient uplevel drivers before the upgrade. + +This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedeviceinventorychange). + +The following fields are available: + +- **AppraiserVersion** The version of the Appraiser file that is generating the events. +- **BootCritical** Is the driver package marked as boot critical? +- **Build** The build value from the driver package. +- **CatalogFile** The name of the catalog file within the driver package. +- **Class** The device class from the driver package. +- **ClassGuid** The device class unique ID from the driver package. +- **Date** The date from the driver package. +- **Inbox** Is the driver package of a driver that is included with Windows? +- **OriginalName** The original name of the INF file before it was renamed. Generally a path under $WINDOWS.~BT\Drivers\DU. +- **Provider** The provider of the driver package. +- **PublishedName** The name of the INF file after it was renamed. +- **Revision** The revision of the driver package. +- **SignatureStatus** Indicates if the driver package is signed. Unknown = 0, Unsigned = 1, Signed = 2. +- **VersionMajor** The major version of the driver package. +- **VersionMinor** The minor version of the driver package. + + +### Microsoft.Windows.Appraiser.General.InventoryUplevelDriverPackageRemove + +This event indicates that the InventoryUplevelDriverPackage object is no longer present. + +This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedeviceinventorychange). + +The following fields are available: + +- **AppraiserVersion** The version of the Appraiser file that is generating the events. + + +### Microsoft.Windows.Appraiser.General.InventoryUplevelDriverPackageStartSync + +This event indicates that a new set of InventoryUplevelDriverPackageAdd events will be sent. + +This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedeviceinventorychange). + +The following fields are available: + +- **AppraiserVersion** The version of the Appraiser file that is generating the events. + + +### Microsoft.Windows.Appraiser.General.RunContext + +This event indicates what should be expected in the data payload. + +The following fields are available: + +- **AppraiserBranch** The source branch in which the currently running version of Appraiser was built. +- **AppraiserProcess** The name of the process that launched Appraiser. +- **AppraiserVersion** The version of the Appraiser file generating the events. +- **CensusId** A unique hardware identifier. +- **Context** Indicates what mode Appraiser is running in. Example: Setup or Telemetry. +- **PCFP** An ID for the system calculated by hashing hardware identifiers. +- **Subcontext** Indicates what categories of incompatibilities appraiser is scanning for. Can be N/A, Resolve, or a semicolon-delimited list that can include App, Dev, Sys, Gat, or Rescan. +- **Time** The client time of the event. + + +### Microsoft.Windows.Appraiser.General.SystemMemoryAdd + +This event sends data on the amount of memory on the system and whether it meets requirements, to help keep Windows up-to-date. + +This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedeviceinventorychange). + +The following fields are available: + +- **AppraiserVersion** The version of the Appraiser file generating the events. +- **Blocking** Is the device from upgrade due to memory restrictions? +- **MemoryRequirementViolated** Was a memory requirement violated? +- **pageFile** The current committed memory limit for the system or the current process, whichever is smaller (in bytes). +- **ram** The amount of memory on the device. +- **ramKB** The amount of memory (in KB). +- **virtual** The size of the user-mode portion of the virtual address space of the calling process (in bytes). +- **virtualKB** The amount of virtual memory (in KB). + + +### Microsoft.Windows.Appraiser.General.SystemMemoryRemove + +This event that the SystemMemory object is no longer present. + +This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedeviceinventorychange). + +The following fields are available: + +- **AppraiserVersion** The version of the Appraiser file that is generating the events. + + +### Microsoft.Windows.Appraiser.General.SystemMemoryStartSync + +This event indicates that a new set of SystemMemoryAdd events will be sent. + +This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedeviceinventorychange). + +The following fields are available: + +- **AppraiserVersion** The version of the Appraiser file that is generating the events. + + +### Microsoft.Windows.Appraiser.General.SystemProcessorCompareExchangeAdd + +This event sends data indicating whether the system supports the CompareExchange128 CPU requirement, to help keep Windows up to date. + +This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedeviceinventorychange). + +The following fields are available: + +- **AppraiserVersion** The version of the Appraiser file generating the events. +- **Blocking** Is the upgrade blocked due to the processor? +- **CompareExchange128Support** Does the CPU support CompareExchange128? + + +### Microsoft.Windows.Appraiser.General.SystemProcessorCompareExchangeRemove + +This event indicates that the SystemProcessorCompareExchange object is no longer present. + +This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedeviceinventorychange). + +The following fields are available: + +- **AppraiserVersion** The version of the Appraiser file that is generating the events. + + +### Microsoft.Windows.Appraiser.General.SystemProcessorCompareExchangeStartSync + +This event indicates that a new set of SystemProcessorCompareExchangeAdd events will be sent. + +This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedeviceinventorychange). + +The following fields are available: + +- **AppraiserVersion** The version of the Appraiser file that is generating the events. + + +### Microsoft.Windows.Appraiser.General.SystemProcessorLahfSahfAdd + +This event sends data indicating whether the system supports the LahfSahf CPU requirement, to help keep Windows up-to-date. + +This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedeviceinventorychange). + +The following fields are available: + +- **AppraiserVersion** The version of the Appraiser file generating the events. +- **Blocking** Is the upgrade blocked due to the processor? +- **LahfSahfSupport** Does the CPU support LAHF/SAHF? + + +### Microsoft.Windows.Appraiser.General.SystemProcessorLahfSahfRemove + +This event indicates that the SystemProcessorLahfSahf object is no longer present. + +This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedeviceinventorychange). + +The following fields are available: + +- **AppraiserVersion** The version of the Appraiser file that is generating the events. + + +### Microsoft.Windows.Appraiser.General.SystemProcessorLahfSahfStartSync + +This event indicates that a new set of SystemProcessorLahfSahfAdd events will be sent. + +This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedeviceinventorychange). + +The following fields are available: + +- **AppraiserVersion** The version of the Appraiser file that is generating the events. + + +### Microsoft.Windows.Appraiser.General.SystemProcessorNxAdd + +This event sends data indicating whether the system supports the NX CPU requirement, to help keep Windows up-to-date. + +This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedeviceinventorychange). + +The following fields are available: + +- **AppraiserVersion** The version of the Appraiser file that is generating the events. +- **Blocking** Is the upgrade blocked due to the processor? +- **NXDriverResult** The result of the driver used to do a non-deterministic check for NX support. +- **NXProcessorSupport** Does the processor support NX? + + +### Microsoft.Windows.Appraiser.General.SystemProcessorNxRemove + +This event indicates that the SystemProcessorNx object is no longer present. + +This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedeviceinventorychange). + +The following fields are available: + +- **AppraiserVersion** The version of the Appraiser file that is generating the events. + + +### Microsoft.Windows.Appraiser.General.SystemProcessorNxStartSync + +This event indicates that a new set of SystemProcessorNxAdd events will be sent. + +This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedeviceinventorychange). + +The following fields are available: + +- **AppraiserVersion** The version of the Appraiser file that is generating the events. + + +### Microsoft.Windows.Appraiser.General.SystemProcessorPrefetchWAdd + +This event sends data indicating whether the system supports the PrefetchW CPU requirement, to help keep Windows up to date. + +This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedeviceinventorychange). + +The following fields are available: + +- **AppraiserVersion** The version of the Appraiser file that is generating the events. +- **Blocking** Is the upgrade blocked due to the processor? +- **PrefetchWSupport** Does the processor support PrefetchW? + + +### Microsoft.Windows.Appraiser.General.SystemProcessorPrefetchWRemove + +This event indicates that the SystemProcessorPrefetchW object is no longer present. + +This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedeviceinventorychange). + +The following fields are available: + +- **AppraiserVersion** The version of the Appraiser file that is generating the events. + + +### Microsoft.Windows.Appraiser.General.SystemProcessorPrefetchWStartSync + +This event indicates that a new set of SystemProcessorPrefetchWAdd events will be sent. + +This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedeviceinventorychange). + +The following fields are available: + +- **AppraiserVersion** The version of the Appraiser file that is generating the events. + + +### Microsoft.Windows.Appraiser.General.SystemProcessorSse2Add + +This event sends data indicating whether the system supports the SSE2 CPU requirement, to help keep Windows up to date. + +This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedeviceinventorychange). + +The following fields are available: + +- **AppraiserVersion** The version of the Appraiser file that is generating the events. +- **Blocking** Is the upgrade blocked due to the processor? +- **SSE2ProcessorSupport** Does the processor support SSE2? + + +### Microsoft.Windows.Appraiser.General.SystemProcessorSse2Remove + +This event indicates that the SystemProcessorSse2 object is no longer present. + +This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedeviceinventorychange). + +The following fields are available: + +- **AppraiserVersion** The version of the Appraiser file that is generating the events. + + +### Microsoft.Windows.Appraiser.General.SystemProcessorSse2StartSync + +This event indicates that a new set of SystemProcessorSse2Add events will be sent. + +This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedeviceinventorychange). + +The following fields are available: + +- **AppraiserVersion** The version of the Appraiser file that is generating the events. + + +### Microsoft.Windows.Appraiser.General.SystemTouchAdd + +This event sends data indicating whether the system supports touch, to help keep Windows up to date. + +This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedeviceinventorychange). + +The following fields are available: + +- **AppraiserVersion** The version of the Appraiser file that is generating the events. +- **IntegratedTouchDigitizerPresent** Is there an integrated touch digitizer? +- **MaximumTouches** The maximum number of touch points supported by the device hardware. + + +### Microsoft.Windows.Appraiser.General.SystemTouchRemove + +This event indicates that the SystemTouch object is no longer present. + +This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedeviceinventorychange). + +The following fields are available: + +- **AppraiserVersion** The version of the Appraiser file that is generating the events. + + +### Microsoft.Windows.Appraiser.General.SystemTouchStartSync + +This event indicates that a new set of SystemTouchAdd events will be sent. + +This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedeviceinventorychange). + +The following fields are available: + +- **AppraiserVersion** The version of the Appraiser file that is generating the events. + + +### Microsoft.Windows.Appraiser.General.SystemWimAdd + +This event sends data indicating whether the operating system is running from a compressed Windows Imaging Format (WIM) file, to help keep Windows up to date. + +This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedeviceinventorychange). + +The following fields are available: + +- **AppraiserVersion** The version of the Appraiser file that is generating the events. +- **IsWimBoot** Is the current operating system running from a compressed WIM file? +- **RegistryWimBootValue** The raw value from the registry that is used to indicate if the device is running from a WIM. + + +### Microsoft.Windows.Appraiser.General.SystemWimRemove + +This event indicates that the SystemWim object is no longer present. + +This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedeviceinventorychange). + +The following fields are available: + +- **AppraiserVersion** The version of the Appraiser file that is generating the events. + + +### Microsoft.Windows.Appraiser.General.SystemWimStartSync + +This event indicates that a new set of SystemWimAdd events will be sent. + +This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedeviceinventorychange). + +The following fields are available: + +- **AppraiserVersion** The version of the Appraiser file that is generating the events. + + +### Microsoft.Windows.Appraiser.General.SystemWindowsActivationStatusAdd + +This event sends data indicating whether the current operating system is activated, to help keep Windows up to date. + +This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedeviceinventorychange). + +The following fields are available: + +- **AppraiserVersion** The version of the Appraiser file that is generating the events. +- **WindowsIsLicensedApiValue** The result from the API that's used to indicate if operating system is activated. +- **WindowsNotActivatedDecision** Is the current operating system activated? + + +### Microsoft.Windows.Appraiser.General.SystemWindowsActivationStatusRemove + +This event indicates that the SystemWindowsActivationStatus object is no longer present. + +This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedeviceinventorychange). + +The following fields are available: + +- **AppraiserVersion** The version of the Appraiser file that is generating the events. + + +### Microsoft.Windows.Appraiser.General.SystemWindowsActivationStatusStartSync + +This event indicates that a new set of SystemWindowsActivationStatusAdd events will be sent. + +This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedeviceinventorychange). + +The following fields are available: + +- **AppraiserVersion** The version of the Appraiser file that is generating the events. + + +### Microsoft.Windows.Appraiser.General.SystemWlanAdd + +This event sends data indicating whether the system has WLAN, and if so, whether it uses an emulated driver that could block an upgrade, to help keep Windows up-to-date. + +This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedeviceinventorychange). + +The following fields are available: + +- **AppraiserVersion** The version of the Appraiser file that is generating the events. +- **Blocking** Is the upgrade blocked because of an emulated WLAN driver? +- **HasWlanBlock** Does the emulated WLAN driver have an upgrade block? +- **WlanEmulatedDriver** Does the device have an emulated WLAN driver? +- **WlanExists** Does the device support WLAN at all? +- **WlanModulePresent** Are any WLAN modules present? +- **WlanNativeDriver** Does the device have a non-emulated WLAN driver? + + +### Microsoft.Windows.Appraiser.General.SystemWlanRemove + +This event indicates that the SystemWlan object is no longer present. + +This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedeviceinventorychange). + +The following fields are available: + +- **AppraiserVersion** The version of the Appraiser file that is generating the events. + + +### Microsoft.Windows.Appraiser.General.SystemWlanStartSync + +This event indicates that a new set of SystemWlanAdd events will be sent. + +This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedeviceinventorychange). + +The following fields are available: + +- **AppraiserVersion** The version of the Appraiser file that is generating the events. + + +### Microsoft.Windows.Appraiser.General.TelemetryRunHealth + +This event indicates the parameters and result of a telemetry (diagnostic) run. This allows the rest of the data sent over the course of the run to be properly contextualized and understood, which is then used to keep Windows up to date. + +The following fields are available: + +- **AppraiserBranch** The source branch in which the version of Appraiser that is running was built. +- **AppraiserDataVersion** The version of the data files being used by the Appraiser telemetry run. +- **AppraiserProcess** The name of the process that launched Appraiser. +- **AppraiserVersion** The file version (major, minor and build) of the Appraiser DLL, concatenated without dots. +- **AuxFinal** Obsolete, always set to false. +- **AuxInitial** Obsolete, indicates if Appraiser is writing data files to be read by the Get Windows 10 app. +- **DeadlineDate** A timestamp representing the deadline date, which is the time until which appraiser will wait to do a full scan. +- **EnterpriseRun** Indicates if the telemetry run is an enterprise run, which means appraiser was run from the command line with an extra enterprise parameter. +- **FullSync** Indicates if Appraiser is performing a full sync, which means that full set of events representing the state of the machine are sent. Otherwise, only the changes from the previous run are sent. +- **InboxDataVersion** The original version of the data files before retrieving any newer version. +- **IndicatorsWritten** Indicates if all relevant UEX indicators were successfully written or updated. +- **InventoryFullSync** Indicates if inventory is performing a full sync, which means that the full set of events representing the inventory of machine are sent. +- **PCFP** An ID for the system calculated by hashing hardware identifiers. +- **PerfBackoff** Indicates if the run was invoked with logic to stop running when a user is present. Helps to understand why a run may have a longer elapsed time than normal. +- **PerfBackoffInsurance** Indicates if appraiser is running without performance backoff because it has run with perf backoff and failed to complete several times in a row. +- **RunAppraiser** Indicates if Appraiser was set to run at all. If this if false, it is understood that data events will not be received from this device. +- **RunDate** The date that the telemetry run was stated, expressed as a filetime. +- **RunGeneralTel** Indicates if the generaltel.dll component was run. Generaltel collects additional telemetry on an infrequent schedule and only from machines at telemetry levels higher than Basic. +- **RunOnline** Indicates if appraiser was able to connect to Windows Update and theefore is making decisions using up-to-date driver coverage information. +- **RunResult** The hresult of the Appraiser telemetry run. +- **ScheduledUploadDay** The day scheduled for the upload. +- **SendingUtc** Indicates if the Appraiser client is sending events during the current telemetry run. +- **StoreHandleIsNotNull** Obsolete, always set to false +- **TelementrySent** Indicates if telemetry was successfully sent. +- **ThrottlingUtc** Indicates if the Appraiser client is throttling its output of CUET events to avoid being disabled. This increases runtime but also telemetry reliability. +- **Time** The client time of the event. +- **VerboseMode** Indicates if appraiser ran in Verbose mode, which is a test-only mode with extra logging. +- **WhyFullSyncWithoutTablePrefix** Indicates the reason or reasons that a full sync was generated. + + +### Microsoft.Windows.Appraiser.General.WmdrmAdd + +This event sends data about the usage of older digital rights management on the system, to help keep Windows up to date. This data does not indicate the details of the media using the digital rights management, only whether any such files exist. Collecting this data was critical to ensuring the correct mitigation for customers, and should be able to be removed once all mitigations are in place. + +This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedeviceinventorychange). + +The following fields are available: + +- **AppraiserVersion** The version of the Appraiser file that is generating the events. +- **BlockingApplication** Same as NeedsDismissAction. +- **NeedsDismissAction** Indicates if a dismissible message is needed to warn the user about a potential loss of data due to DRM deprecation. +- **WmdrmApiResult** Raw value of the API used to gather DRM state. +- **WmdrmCdRipped** Indicates if the system has any files encrypted with personal DRM, which was used for ripped CDs. +- **WmdrmIndicators** WmdrmCdRipped OR WmdrmPurchased. +- **WmdrmInUse** WmdrmIndicators AND dismissible block in setup was not dismissed. +- **WmdrmNonPermanent** Indicates if the system has any files with non-permanent licenses. +- **WmdrmPurchased** Indicates if the system has any files with permanent licenses. + + +### Microsoft.Windows.Appraiser.General.WmdrmRemove + +This event indicates that the Wmdrm object is no longer present. + +This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedeviceinventorychange). + +The following fields are available: + +- **AppraiserVersion** The version of the Appraiser file that is generating the events. + + +### Microsoft.Windows.Appraiser.General.WmdrmStartSync + +This event indicates that a new set of WmdrmAdd events will be sent. + +This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedeviceinventorychange). + +The following fields are available: + +- **AppraiserVersion** The version of the Appraiser file that is generating the events. + + +## Census events + +### Census.App + +Provides information on IE and Census versions running on the device + +The following fields are available: + +- **AppraiserEnterpriseErrorCode** The error code of the last Appraiser enterprise run. +- **AppraiserErrorCode** The error code of the last Appraiser run. +- **AppraiserRunEndTimeStamp** The end time of the last Appraiser run. +- **AppraiserRunIsInProgressOrCrashed** Flag that indicates if the Appraiser run is in progress or has crashed. +- **AppraiserRunStartTimeStamp** The start time of the last Appraiser run. +- **AppraiserTaskEnabled** Whether the Appraiser task is enabled. +- **AppraiserTaskExitCode** The Appraiser task exist code. +- **AppraiserTaskLastRun** The last runtime for the Appraiser task. +- **CensusVersion** The version of Census that generated the current data for this device. +- **IEVersion** The version of Internet Explorer that is running on the device. + + +### Census.Battery + +This event sends type and capacity data about the battery on the device, as well as the number of connected standby devices in use, type to help keep Windows up to date. + +The following fields are available: + +- **InternalBatteryCapablities** Represents information about what the battery is capable of doing. +- **InternalBatteryCapacityCurrent** Represents the battery's current fully charged capacity in mWh (or relative). Compare this value to DesignedCapacity  to estimate the battery's wear. +- **InternalBatteryCapacityDesign** Represents the theoretical capacity of the battery when new, in mWh. +- **InternalBatteryNumberOfCharges** Provides the number of battery charges. This is used when creating new products and validating that existing products meets targeted functionality performance. +- **IsAlwaysOnAlwaysConnectedCapable** Represents whether the battery enables the device to be AlwaysOnAlwaysConnected . Boolean value. + + +### Census.Camera + +This event sends data about the resolution of cameras on the device, to help keep Windows up to date. + +The following fields are available: + +- **FrontFacingCameraResolution** Represents the resolution of the front facing camera in megapixels. If a front facing camera does not exist, then the value is 0. +- **RearFacingCameraResolution** Represents the resolution of the rear facing camera in megapixels. If a rear facing camera does not exist, then the value is 0. + + +### Census.Enterprise + +This event sends data about Azure presence, type, and cloud domain use in order to provide an understanding of the use and integration of devices in an enterprise, cloud, and server environment. + +The following fields are available: + +- **AADDeviceId** Azure Active Directory device ID. +- **AzureOSIDPresent** Represents the field used to identify an Azure machine. +- **AzureVMType** Represents whether the instance is Azure VM PAAS, Azure VM IAAS or any other VMs. +- **CDJType** Represents the type of cloud domain joined for the machine. +- **CommercialId** Represents the GUID for the commercial entity which the device is a member of.  Will be used to reflect insights back to customers. +- **ContainerType** The type of container, such as process or virtual machine hosted. +- **EnrollmentType** Defines the type of MDM enrollment on the device. +- **HashedDomain** The hashed representation of the user domain used for login. +- **IsCloudDomainJoined** Is this device joined to an Azure Active Directory (AAD) tenant? true/false +- **IsDERequirementMet** Represents if the device can do device encryption. +- **IsDeviceProtected** Represents if Device protected by BitLocker/Device Encryption +- **IsDomainJoined** Indicates whether a machine is joined to a domain. +- **IsEDPEnabled** Represents if Enterprise data protected on the device. +- **IsMDMEnrolled** Whether the device has been MDM Enrolled or not. +- **MPNId** Returns the Partner ID/MPN ID from Regkey. HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\DeployID +- **SCCMClientId** This ID correlate systems that send data to Compat Analytics (OMS) and other OMS based systems with systems in an Enterprise SCCM environment. +- **ServerFeatures** Represents the features installed on a Windows   Server. This can be used by developers and administrators who need to automate the process of determining the features installed on a set of server computers. +- **SystemCenterID** The SCCM ID is an anonymized one-way hash of the Active Directory Organization identifier + + +### Census.Firmware + +This event sends data about the BIOS and startup embedded in the device, to help keep Windows up to date. + +The following fields are available: + +- **FirmwareManufacturer** Represents the manufacturer of the device's firmware (BIOS). +- **FirmwareReleaseDate** Represents the date the current firmware was released. +- **FirmwareType** Represents the firmware type. The various types can be unknown, BIOS, UEFI. +- **FirmwareVersion** Represents the version of the current firmware. + + +### Census.Flighting + +This event sends Windows Insider data from customers participating in improvement testing and feedback programs, to help keep Windows up to date. + +The following fields are available: + +- **DeviceSampleRate** The telemetry sample rate assigned to the device. +- **EnablePreviewBuilds** Used to enable Windows Insider builds on a device. +- **FlightIds** A list of the different Windows Insider builds on this device. +- **FlightingBranchName** The name of the Windows Insider branch currently used by the device. +- **IsFlightsDisabled** Represents if the device is participating in the Windows Insider program. +- **MSA_Accounts** Represents a list of hashed IDs of the Microsoft Accounts that are flighting (pre-release builds) on this device. +- **SSRK** Retrieves the mobile targeting settings. + + +### Census.Hardware + +This event sends data about the device, including hardware type, OEM brand, model line, model, telemetry level setting, and TPM support, to help keep Windows up to date. + +The following fields are available: + +- **ActiveMicCount** The number of active microphones attached to the device. +- **ChassisType** Represents the type of device chassis, such as desktop or low profile desktop. The possible values can range between 1 - 36. +- **ComputerHardwareID** Identifies a device class that is represented by a hash of different SMBIOS fields. +- **D3DMaxFeatureLevel** Supported Direct3D version. +- **DeviceColor** Indicates a color of the device. +- **DeviceForm** Indicates the form as per the device classification. +- **DeviceName** The device name that is set by the user. +- **DigitizerSupport** Is a digitizer supported? +- **DUID** The device unique ID. +- **Gyroscope** Indicates whether the device has a gyroscope (a mechanical component that measures and maintains orientation). +- **InventoryId** The device ID used for compatibility testing. +- **Magnetometer** Indicates whether the device has a magnetometer (a mechanical component that works like a compass). +- **NFCProximity** Indicates whether the device supports NFC (a set of communication protocols that helps establish communication when applicable devices are brought close together.) +- **OEMDigitalMarkerFileName** The name of the file placed in the \Windows\system32\drivers directory that specifies the OEM and model name of the device. +- **OEMManufacturerName** The device manufacturer name. The OEMName for an inactive device is not reprocessed even if the clean OEM name is changed at a later date. +- **OEMModelBaseBoard** The baseboard model used by the OEM. +- **OEMModelBaseBoardVersion** Differentiates between developer and retail devices. +- **OEMModelName** The device model name. +- **OEMModelNumber** The device model number. +- **OEMModelSKU** The device edition that is defined by the manufacturer. +- **OEMModelSystemFamily** The system family set on the device by an OEM. +- **OEMModelSystemVersion** The system model version set on the device by the OEM. +- **OEMOptionalIdentifier** A Microsoft assigned value that represents a specific OEM subsidiary. +- **OEMSerialNumber** The serial number of the device that is set by the manufacturer. +- **PhoneManufacturer** The friendly name of the phone manufacturer. +- **PowerPlatformRole** The OEM preferred power management profile. It's used to help to identify the basic form factor of the device. +- **SoCName** The firmware manufacturer of the device. +- **StudyID** Used to identify retail and non-retail device. +- **TelemetryLevel** The telemetry level the user has opted into, such as Basic or Enhanced. +- **TelemetryLevelLimitEnhanced** The telemetry level for Windows Analytics-based solutions. +- **TelemetrySettingAuthority** Determines who set the telemetry level, such as GP, MDM, or the user. +- **TPMManufacturerId** The ID of the TPM manufacturer. +- **TPMManufacturerVersion** The version of the TPM manufacturer. +- **TPMVersion** The supported Trusted Platform Module (TPM) on the device. If no TPM is present, the value is 0. +- **VoiceSupported** Does the device have a cellular radio capable of making voice calls? + + +### Census.Memory + +This event sends data about the memory on the device, including ROM and RAM, to help keep Windows up to date. + +The following fields are available: + +- **TotalPhysicalRAM** Represents the physical memory (in MB). +- **TotalVisibleMemory** Represents the memory that is not reserved by the system. + + +### Census.Network + +This event sends data about the mobile and cellular network used by the device (mobile service provider, network, device ID, and service cost factors), to help keep Windows up to date. + +The following fields are available: + +- **IMEI0** Represents the International Mobile Station Equipment Identity. This number is usually unique and used by the mobile operator to distinguish different phone hardware. Microsoft does not have access to mobile operator billing data so collecting this data does not expose or identify the user. The two fields represent phone with dual sim coverage. +- **IMEI1** Represents the International Mobile Station Equipment Identity. This number is usually unique and used by the mobile operator to distinguish different phone hardware. Microsoft does not have access to mobile operator billing data so collecting this data does not expose or identify the user. The two fields represent phone with dual sim coverage. +- **MCC0** Represents the Mobile Country Code (MCC). It used with the Mobile Network Code (MNC) to uniquely identify a mobile network operator. The two fields represent phone with dual sim coverage. +- **MCC1** Represents the Mobile Country Code (MCC). It used with the Mobile Network Code (MNC) to uniquely identify a mobile network operator. The two fields represent phone with dual sim coverage. +- **MEID** Represents the Mobile Equipment Identity (MEID). MEID is a worldwide unique phone ID assigned to CDMA phones. MEID replaces electronic serial number (ESN), and is equivalent to IMEI for GSM and WCDMA phones. Microsoft does not have access to mobile operator billing data so collecting this data does not expose or identify the user. +- **MNC0** Retrieves the Mobile Network Code (MNC). It used with the Mobile Country Code (MCC) to uniquely identify a mobile network operator. The two fields represent phone with dual sim coverage. +- **MNC1** Retrieves the Mobile Network Code (MNC). It used with the Mobile Country Code (MCC) to uniquely identify a mobile network operator. The two fields represent phone with dual sim coverage. +- **MobileOperatorBilling** Represents the telephone company that provides services for mobile phone users. +- **MobileOperatorCommercialized** Represents which reseller and geography the phone is commercialized for. This is the set of values on the phone for who and where it was intended to be used. For example, the commercialized mobile operator code AT&T in the US would be ATT-US. +- **MobileOperatorNetwork0** Represents the operator of the current mobile network that the device is used on. (AT&T, T-Mobile, Vodafone). The two fields represent phone with dual sim coverage. +- **MobileOperatorNetwork1** Represents the operator of the current mobile network that the device is used on. (AT&T, T-Mobile, Vodafone). The two fields represent phone with dual sim coverage. +- **NetworkAdapterGUID** The GUID of the primary network adapter. +- **NetworkCost** Represents the network cost associated with a connection. +- **SPN0** Retrieves the Service Provider Name (SPN). For example, these might be AT&T, Sprint, T-Mobile, or Verizon. The two fields represent phone with dual sim coverage. +- **SPN1** Retrieves the Service Provider Name (SPN). For example, these might be AT&T, Sprint, T-Mobile, or Verizon. The two fields represent phone with dual sim coverage. + + +### Census.OS + +This event sends data about the operating system such as the version, locale, update service configuration, when and how it was originally installed, and whether it is a virtual device, to help keep Windows up to date. + +The following fields are available: + +- **ActivationChannel** Retrieves the retail license key or Volume license key for a machine. +- **AssignedAccessStatus** Kiosk configuration mode. +- **CompactOS** Indicates if the Compact OS feature from Win10 is enabled. +- **DeveloperUnlockStatus** Represents if a device has been developer unlocked by the user or Group Policy. +- **DeviceTimeZone** The time zone that is set on the device. Example: Pacific Standard Time +- **GenuineState** Retrieves the ID Value specifying the OS Genuine check. +- **InstallationType** Retrieves the type of OS installation. (Clean, Upgrade, Reset, Refresh, Update). +- **InstallLanguage** The first language installed on the user machine. +- **IsDeviceRetailDemo** Retrieves if the device is running in demo mode. +- **IsEduData** Returns Boolean if the education data policy is enabled. +- **IsPortableOperatingSystem** Retrieves whether OS is running Windows-To-Go +- **IsSecureBootEnabled** Retrieves whether Boot chain is signed under UEFI. +- **LanguagePacks** The list of language packages installed on the device. +- **LicenseStateReason** Retrieves why (or how) a system is licensed or unlicensed. The HRESULT may indicate an error code that indicates a key blocked error, or it may indicate that we are running an OS License granted by the MS store. +- **OA3xOriginalProductKey** Retrieves the License key stamped by the OEM to the machine. +- **OSEdition** Retrieves the version of the current OS. +- **OSInstallType** Retrieves a numeric description of what install was used on the device i.e. clean, upgrade, refresh, reset, etc +- **OSOOBEDateTime** Retrieves Out of Box Experience (OOBE) Date in Coordinated Universal Time (UTC). +- **OSSKU** Retrieves the Friendly Name of OS Edition. +- **OSSubscriptionStatus** Represents the existing status for enterprise subscription feature for PRO machines. +- **OSSubscriptionTypeId** Returns boolean for enterprise subscription feature for selected PRO machines. +- **OSTimeZoneBiasInMins** Retrieves the time zone set on machine. +- **OSUILocale** Retrieves the locale of the UI that is currently used by the OS. +- **ProductActivationResult** Returns Boolean if the OS Activation was successful. +- **ProductActivationTime** Returns the OS Activation time for tracking piracy issues. +- **ProductKeyID2** Retrieves the License key if the machine is updated with a new license key. +- **RACw7Id** Retrieves the Microsoft Reliability Analysis Component (RAC) Win7 Identifier. RAC is used to monitor and analyze system usage and reliability. +- **ServiceMachineIP** Retrieves the IP address of the KMS host used for anti-piracy. +- **ServiceMachinePort** Retrieves the port of the KMS host used for anti-piracy. +- **ServiceProductKeyID** Retrieves the License key of the KMS +- **SharedPCMode** Returns Boolean for education devices used as shared cart +- **Signature** Retrieves if it is a signature machine sold by Microsoft store. +- **SLICStatus** Whether a SLIC table exists on the device. +- **SLICVersion** Returns OS type/version from SLIC table. + + +### Census.PrivacySettings + +This event provides information about the device level privacy settings and whether device-level access was granted to these capabilities. Not all settings are applicable to all devices. Each field records the consent state for the corresponding privacy setting. The consent state is encoded as a 16-bit signed integer, where the first 8 bits represents the effective consent value, and the last 8 bits represent the authority that set the value. The effective consent (first 8 bits) is one of the following values: -3 = unexpected consent value, -2 = value was not requested, -1 = an error occurred while attempting to retrieve the value, 0 = undefined, 1 = allow, 2 = deny, 3 = prompt. The consent authority (last 8 bits) is one of the following values: -3 = unexpected authority, -2 = value was not requested, -1 = an error occurred while attempting to retrieve the value, 0 = system, 1 = a higher authority (a gating setting, the system-wide setting, or a group policy), 2 = advertising ID group policy, 3 = advertising ID policy for child account, 4 = privacy setting provider doesn't know the actual consent authority, 5 = consent was not configured and a default set in code was used, 6 = system default, 7 = organization policy, 8 = OneSettings. + +The following fields are available: + +- **Activity** Current state of the activity history setting. +- **ActivityHistoryCloudSync** Current state of the activity history cloud sync setting. +- **ActivityHistoryCollection** Current state of the activity history collection setting. +- **AdvertisingId** Current state of the advertising ID setting. +- **AppDiagnostics** Current state of the app diagnostics setting. +- **Appointments** Current state of the calendar setting. +- **Bluetooth** Current state of the Bluetooth capability setting. +- **BluetoothSync** Current state of the Bluetooth sync capability setting. +- **BroadFileSystemAccess** Current state of the broad file system access setting. +- **CellularData** Current state of the cellular data capability setting. +- **Chat** Current state of the chat setting. +- **Contacts** Current state of the contacts setting. +- **DocumentsLibrary** Current state of the documents library setting. +- **Email** Current state of the email setting. +- **FindMyDevice** Current state of the "find my device" setting. +- **GazeInput** Current state of the gaze input setting. +- **HumanInterfaceDevice** Current state of the human interface device setting. +- **InkTypeImprovement** Current state of the improve inking and typing setting. +- **Location** Current state of the location setting. +- **LocationHistory** Current state of the location history setting. +- **LocationHistoryCloudSync** Current state of the location history cloud sync setting. +- **LocationHistoryOnTimeline** Current state of the location history on timeline setting. +- **Microphone** Current state of the microphone setting. +- **PhoneCall** Current state of the phone call setting. +- **PhoneCallHistory** Current state of the call history setting. +- **PicturesLibrary** Current state of the pictures library setting. +- **Radios** Current state of the radios setting. +- **SensorsCustom** Current state of the custom sensor setting. +- **SerialCommunication** Current state of the serial communication setting. +- **Sms** Current state of the text messaging setting. +- **SpeechPersonalization** Current state of the speech services setting. +- **USB** Current state of the USB setting. +- **UserAccountInformation** Current state of the account information setting. +- **UserDataTasks** Current state of the tasks setting. +- **UserNotificationListener** Current state of the notifications setting. +- **VideosLibrary** Current state of the videos library setting. +- **Webcam** Current state of the camera setting. +- **WiFiDirect** Current state of the Wi-Fi direct setting. + + +### Census.Processor + +Provides information on several important data points about Processor settings + +The following fields are available: + +- **KvaShadow** This is the micro code information of the processor. +- **MMSettingOverride** Microcode setting of the processor. +- **MMSettingOverrideMask** Microcode setting override of the processor. +- **PreviousUpdateRevision** Previous microcode revision +- **ProcessorArchitecture** Retrieves the processor architecture of the installed operating system. +- **ProcessorClockSpeed** Clock speed of the processor in MHz. +- **ProcessorCores** Number of logical cores in the processor. +- **ProcessorIdentifier** Processor Identifier of a manufacturer. +- **ProcessorManufacturer** Name of the processor manufacturer. +- **ProcessorModel** Name of the processor model. +- **ProcessorPhysicalCores** Number of physical cores in the processor. +- **ProcessorUpdateRevision** The microcode revision. +- **ProcessorUpdateStatus** Enum value that represents the processor microcode load status +- **SocketCount** Count of CPU sockets. +- **SpeculationControl** Indicates whether the system has enabled protections needed to validate the speculation control vulnerability. + + +### Census.Security + +This event provides information on about security settings used to help keep Windows up to date and secure. + +The following fields are available: + +- **AvailableSecurityProperties** This field helps to enumerate and report state on the relevant security properties for Device Guard. +- **CGRunning** Credential Guard isolates and hardens key system and user secrets against compromise, helping to minimize the impact and breadth of a Pass the Hash style attack in the event that malicious code is already running via a local or network based vector. This field tells if Credential Guard is running. +- **DGState** This field summarizes the Device Guard state. +- **HVCIRunning** Hypervisor Code Integrity (HVCI) enables Device Guard to help protect kernel mode processes and drivers from vulnerability exploits and zero days. HVCI uses the processor’s functionality to force all software running in kernel mode to safely allocate memory. This field tells if HVCI is running. +- **IsSawGuest** Indicates whether the device is running as a Secure Admin Workstation Guest. +- **IsSawHost** Indicates whether the device is running as a Secure Admin Workstation Host. +- **RequiredSecurityProperties** Describes the required security properties to enable virtualization-based security. +- **SecureBootCapable** Systems that support Secure Boot can have the feature turned off via BIOS. This field tells if the system is capable of running Secure Boot, regardless of the BIOS setting. +- **SModeState** The Windows S mode trail state. +- **VBSState** Virtualization-based security (VBS) uses the hypervisor to help protect the kernel and other parts of the operating system. Credential Guard and Hypervisor Code Integrity (HVCI) both depend on VBS to isolate/protect secrets, and kernel-mode code integrity validation. VBS has a tri-state that can be Disabled, Enabled, or Running. + + +### Census.Speech + +This event is used to gather basic speech settings on the device. + +The following fields are available: + +- **AboveLockEnabled** Cortana setting that represents if Cortana can be invoked when the device is locked. +- **GPAllowInputPersonalization** Indicates if a Group Policy setting has enabled speech functionalities. +- **HolographicSpeechInputDisabled** Holographic setting that represents if the attached HMD devices have speech functionality disabled by the user. +- **HolographicSpeechInputDisabledRemote** Indicates if a remote policy has disabled speech functionalities for the HMD devices. +- **KeyVer** Version information for the census speech event. +- **KWSEnabled** Cortana setting that represents if a user has enabled the "Hey Cortana" keyword spotter (KWS). +- **MDMAllowInputPersonalization** Indicates if an MDM policy has enabled speech functionalities. +- **RemotelyManaged** Indicates if the device is being controlled by a remote administrator (MDM or Group Policy) in the context of speech functionalities. +- **SpeakerIdEnabled** Cortana setting that represents if keyword detection has been trained to try to respond to a single user's voice. +- **SpeechServicesEnabled** Windows setting that represents whether a user is opted-in for speech services on the device. +- **SpeechServicesValueSource** Indicates the deciding factor for the effective online speech recognition privacy policy settings: remote admin, local admin, or user preference. + + +### Census.Storage + +This event sends data about the total capacity of the system volume and primary disk, to help keep Windows up to date. + +The following fields are available: + +- **PrimaryDiskTotalCapacity** Retrieves the amount of disk space on the primary disk of the device in MB. +- **PrimaryDiskType** Retrieves an enumerator value of type STORAGE_BUS_TYPE that indicates the type of bus to which the device is connected. This should be used to interpret the raw device properties at the end of this structure (if any). +- **StorageReservePassedPolicy** Indicates whether the Storage Reserve policy, which ensures that updates have enough disk space and customers are on the latest OS, is enabled on this device. +- **SystemVolumeTotalCapacity** Retrieves the size of the partition that the System volume is installed on in MB. + + +### Census.Userdefault + +This event sends data about the current user's default preferences for browser and several of the most popular extensions and protocols, to help keep Windows up to date. + +The following fields are available: + +- **CalendarType** The calendar identifiers that are used to specify different calendars. +- **DefaultApp** The current uer's default program selected for the following extension or protocol: .html, .htm, .jpg, .jpeg, .png, .mp3, .mp4, .mov, .pdf. +- **DefaultBrowserProgId** The ProgramId of the current user's default browser. +- **LongDateFormat** The long date format the user has selected. +- **ShortDateFormat** The short date format the user has selected. + + +### Census.UserDisplay + +This event sends data about the logical/physical display size, resolution and number of internal/external displays, and VRAM on the system, to help keep Windows up to date. + +The following fields are available: + +- **InternalPrimaryDisplayLogicalDPIX** Retrieves the logical DPI in the x-direction of the internal display. +- **InternalPrimaryDisplayLogicalDPIY** Retrieves the logical DPI in the y-direction of the internal display. +- **InternalPrimaryDisplayPhysicalDPIX** Retrieves the physical DPI in the x-direction of the internal display. +- **InternalPrimaryDisplayPhysicalDPIY** Retrieves the physical DPI in the y-direction of the internal display. +- **InternalPrimaryDisplayResolutionHorizontal** Retrieves the number of pixels in the horizontal direction of the internal display. +- **InternalPrimaryDisplayResolutionVertical** Retrieves the number of pixels in the vertical direction of the internal display. +- **InternalPrimaryDisplaySizePhysicalH** Retrieves the physical horizontal length of the display in mm. Used for calculating the diagonal length in inches . +- **InternalPrimaryDisplaySizePhysicalY** Retrieves the physical vertical length of the display in mm. Used for calculating the diagonal length in inches +- **NumberofExternalDisplays** Retrieves the number of external displays connected to the machine +- **NumberofInternalDisplays** Retrieves the number of internal displays in a machine. +- **VRAMDedicated** Retrieves the video RAM in MB. +- **VRAMDedicatedSystem** Retrieves the amount of memory on the dedicated video card. +- **VRAMSharedSystem** Retrieves the amount of RAM memory that the video card can use. + + +### Census.UserNLS + +This event sends data about the default app language, input, and display language preferences set by the user, to help keep Windows up to date. + +The following fields are available: + +- **DefaultAppLanguage** The current user Default App Language. +- **DisplayLanguage** The current user preferred Windows Display Language. +- **HomeLocation** The current user location, which is populated using GetUserGeoId() function. +- **KeyboardInputLanguages** The Keyboard input languages installed on the device. +- **SpeechInputLanguages** The Speech Input languages installed on the device. + + +### Census.UserPrivacySettings + +This event provides information about the current users privacy settings and whether device-level access was granted to these capabilities. Not all settings are applicable to all devices. Each field records the consent state for the corresponding privacy setting. The consent state is encoded as a 16-bit signed integer, where the first 8 bits represents the effective consent value, and the last 8 bits represents the authority that set the value. The effective consent is one of the following values: -3 = unexpected consent value, -2 = value was not requested, -1 = an error occurred while attempting to retrieve the value, 0 = undefined, 1 = allow, 2 = deny, 3 = prompt. The consent authority is one of the following values: -3 = unexpected authority, -2 = value was not requested, -1 = an error occurred while attempting to retrieve the value, 0 = user, 1 = a higher authority (a gating setting, the system-wide setting, or a group policy), 2 = advertising ID group policy, 3 = advertising ID policy for child account, 4 = privacy setting provider doesn't know the actual consent authority, 5 = consent was not configured and a default set in code was used, 6 = system default, 7 = organization policy, 8 = OneSettings. + +The following fields are available: + +- **Activity** Current state of the activity history setting. +- **ActivityHistoryCloudSync** Current state of the activity history cloud sync setting. +- **ActivityHistoryCollection** Current state of the activity history collection setting. +- **AdvertisingId** Current state of the advertising ID setting. +- **AppDiagnostics** Current state of the app diagnostics setting. +- **Appointments** Current state of the calendar setting. +- **Bluetooth** Current state of the Bluetooth capability setting. +- **BluetoothSync** Current state of the Bluetooth sync capability setting. +- **BroadFileSystemAccess** Current state of the broad file system access setting. +- **CellularData** Current state of the cellular data capability setting. +- **Chat** Current state of the chat setting. +- **Contacts** Current state of the contacts setting. +- **DocumentsLibrary** Current state of the documents library setting. +- **Email** Current state of the email setting. +- **GazeInput** Current state of the gaze input setting. +- **HumanInterfaceDevice** Current state of the human interface device setting. +- **InkTypeImprovement** Current state of the improve inking and typing setting. +- **InkTypePersonalization** Current state of the inking and typing personalization setting. +- **Location** Current state of the location setting. +- **LocationHistory** Current state of the location history setting. +- **LocationHistoryCloudSync** Current state of the location history cloud synchronization setting. +- **LocationHistoryOnTimeline** Current state of the location history on timeline setting. +- **Microphone** Current state of the microphone setting. +- **PhoneCall** Current state of the phone call setting. +- **PhoneCallHistory** Current state of the call history setting. +- **PicturesLibrary** Current state of the pictures library setting. +- **Radios** Current state of the radios setting. +- **SensorsCustom** Current state of the custom sensor setting. +- **SerialCommunication** Current state of the serial communication setting. +- **Sms** Current state of the text messaging setting. +- **SpeechPersonalization** Current state of the speech services setting. +- **USB** Current state of the USB setting. +- **UserAccountInformation** Current state of the account information setting. +- **UserDataTasks** Current state of the tasks setting. +- **UserNotificationListener** Current state of the notifications setting. +- **VideosLibrary** Current state of the videos library setting. +- **Webcam** Current state of the camera setting. +- **WiFiDirect** Current state of the Wi-Fi direct setting. + + +### Census.VM + +This event sends data indicating whether virtualization is enabled on the device, and its various characteristics, to help keep Windows up to date. + +The following fields are available: + +- **CloudService** Indicates which cloud service, if any, that this virtual machine is running within. +- **HyperVisor** Retrieves whether the current OS is running on top of a Hypervisor. +- **IOMMUPresent** Represents if an input/output memory management unit (IOMMU) is present. +- **IsVDI** Is the device using Virtual Desktop Infrastructure? +- **IsVirtualDevice** Retrieves that when the Hypervisor is Microsoft's Hyper-V Hypervisor or other Hv#1 Hypervisor, this field will be set to FALSE for the Hyper-V host OS and TRUE for any guest OS's. This field should not be relied upon for non-Hv#1 Hypervisors. +- **SLATSupported** Represents whether Second Level Address Translation (SLAT) is supported by the hardware. +- **VirtualizationFirmwareEnabled** Represents whether virtualization is enabled in the firmware. + + +### Census.WU + +This event sends data about the Windows update server and other App store policies, to help keep Windows up to date. + +The following fields are available: + +- **AppraiserGatedStatus** Indicates whether a device has been gated for upgrading. +- **AppStoreAutoUpdate** Retrieves the Appstore settings for auto upgrade. (Enable/Disabled). +- **AppStoreAutoUpdateMDM** Retrieves the App Auto Update value for MDM: 0 - Disallowed. 1 - Allowed. 2 - Not configured. Default: [2] Not configured +- **AppStoreAutoUpdatePolicy** Retrieves the Microsoft Store App Auto Update group policy setting +- **DelayUpgrade** Retrieves the Windows upgrade flag for delaying upgrades. +- **OSAssessmentFeatureOutOfDate** How many days has it been since a the last feature update was released but the device did not install it? +- **OSAssessmentForFeatureUpdate** Is the device is on the latest feature update? +- **OSAssessmentForQualityUpdate** Is the device on the latest quality update? +- **OSAssessmentForSecurityUpdate** Is the device on the latest security update? +- **OSAssessmentQualityOutOfDate** How many days has it been since a the last quality update was released but the device did not install it? +- **OSAssessmentReleaseInfoTime** The freshness of release information used to perform an assessment. +- **OSRollbackCount** The number of times feature updates have rolled back on the device. +- **OSRolledBack** A flag that represents when a feature update has rolled back during setup. +- **OSUninstalled** A flag that represents when a feature update is uninstalled on a device . +- **OSWUAutoUpdateOptions** Retrieves the auto update settings on the device. +- **OSWUAutoUpdateOptionsSource** The source of auto update setting that appears in the OSWUAutoUpdateOptions field. For example: Group Policy (GP), Mobile Device Management (MDM), and Default. +- **UninstallActive** A flag that represents when a device has uninstalled a previous upgrade recently. +- **UpdateServiceURLConfigured** Retrieves if the device is managed by Windows Server Update Services (WSUS). +- **WUDeferUpdatePeriod** Retrieves if deferral is set for Updates. +- **WUDeferUpgradePeriod** Retrieves if deferral is set for Upgrades. +- **WUDODownloadMode** Retrieves whether DO is turned on and how to acquire/distribute updates Delivery Optimization (DO) allows users to deploy previously downloaded WU updates to other devices on the same network. +- **WUMachineId** Retrieves the Windows Update (WU) Machine Identifier. +- **WUPauseState** Retrieves WU setting to determine if updates are paused. +- **WUServer** Retrieves the HTTP(S) URL of the WSUS server that is used by Automatic Updates and API callers (by default). + + +### Census.Xbox + +This event sends data about the Xbox Console, such as Serial Number and DeviceId, to help keep Windows up to date. + +The following fields are available: + +- **XboxConsolePreferredLanguage** Retrieves the preferred language selected by the user on Xbox console. +- **XboxConsoleSerialNumber** Retrieves the serial number of the Xbox console. +- **XboxLiveDeviceId** Retrieves the unique device ID of the console. +- **XboxLiveSandboxId** Retrieves the developer sandbox ID if the device is internal to Microsoft. + + +## Common data extensions + +### Common Data Extensions.app + +Describes the properties of the running application. This extension could be populated by a client app or a web app. + +The following fields are available: + +- **asId** An integer value that represents the app session. This value starts at 0 on the first app launch and increments after each subsequent app launch per boot session. +- **env** The environment from which the event was logged. +- **expId** Associates a flight, such as an OS flight, or an experiment, such as a web site UX experiment, with an event. +- **id** Represents a unique identifier of the client application currently loaded in the process producing the event; and is used to group events together and understand usage pattern, errors by application. +- **locale** The locale of the app. +- **name** The name of the app. +- **userId** The userID as known by the application. +- **ver** Represents the version number of the application. Used to understand errors by Version, Usage by Version across an app. + + +### Common Data Extensions.container + +Describes the properties of the container for events logged within a container. + +The following fields are available: + +- **epoch** An ID that's incremented for each SDK initialization. +- **localId** The device ID as known by the client. +- **osVer** The operating system version. +- **seq** An ID that's incremented for each event. +- **type** The container type. Examples: Process or VMHost + + +### Common Data Extensions.cs + +Describes properties related to the schema of the event. + +The following fields are available: + +- **sig** A common schema signature that identifies new and modified event schemas. + + +### Common Data Extensions.device + +Describes the device-related fields. + +The following fields are available: + +- **deviceClass** The device classification. For example, Desktop, Server, or Mobile. +- **localId** A locally-defined unique ID for the device. This is not the human-readable device name. Most likely equal to the value stored at HKLM\Software\Microsoft\SQMClient\MachineId +- **make** Device manufacturer. +- **model** Device model. + + +### Common Data Extensions.Envelope + +Represents an envelope that contains all of the common data extensions. + +The following fields are available: + +- **cV** Represents the Correlation Vector: A single field for tracking partial order of related telemetry events across component boundaries. +- **data** Represents the optional unique diagnostic data for a particular event schema. +- **ext_app** Describes the properties of the running application. This extension could be populated by either a client app or a web app. See [Common Data Extensions.app](#common-data-extensionsapp). +- **ext_container** Describes the properties of the container for events logged within a container. See [Common Data Extensions.container](#common-data-extensionscontainer). +- **ext_cs** Describes properties related to the schema of the event. See [Common Data Extensions.cs](#common-data-extensionscs). +- **ext_device** Describes the device-related fields. See [Common Data Extensions.device](#common-data-extensionsdevice). +- **ext_os** Describes the operating system properties that would be populated by the client. See [Common Data Extensions.os](#common-data-extensionsos). +- **ext_receipts** Describes the fields related to time as provided by the client for debugging purposes. See [Common Data Extensions.receipts](#common-data-extensionsreceipts). +- **ext_sdk** Describes the fields related to a platform library required for a specific SDK. See [Common Data Extensions.sdk](#common-data-extensionssdk). +- **ext_user** Describes the fields related to a user. See [Common Data Extensions.user](#common-data-extensionsuser). +- **ext_utc** Describes the fields that might be populated by a logging library on Windows. See [Common Data Extensions.utc](#common-data-extensionsutc). +- **ext_xbl** Describes the fields related to XBOX Live. See [Common Data Extensions.xbl](#common-data-extensionsxbl). +- **flags** Represents a collection of bits that describe how the event should be processed by the Connected User Experience and Telemetry component pipeline. The lowest-order byte is the event persistence. The next byte is the event latency. +- **iKey** Represents an ID for applications or other logical groupings of events. +- **name** Represents the uniquely qualified name for the event. +- **popSample** Represents the effective sample rate for this event at the time it was generated by a client. +- **time** Represents the event date time in Coordinated Universal Time (UTC) when the event was generated on the client. This should be in ISO 8601 format. +- **ver** Represents the major and minor version of the extension. + + +### Common Data Extensions.os + +Describes some properties of the operating system. + +The following fields are available: + +- **bootId** An integer value that represents the boot session. This value starts at 0 on first boot after OS install and increments after every reboot. +- **expId** Represents the experiment ID. The standard for associating a flight, such as an OS flight (pre-release build), or an experiment, such as a web site UX experiment, with an event is to record the flight / experiment IDs in Part A of the common schema. +- **locale** Represents the locale of the operating system. +- **name** Represents the operating system name. +- **ver** Represents the major and minor version of the extension. + + +### Common Data Extensions.receipts + +Represents various time information as provided by the client and helps for debugging purposes. + +The following fields are available: + +- **originalTime** The original event time. +- **uploadTime** The time the event was uploaded. + + +### Common Data Extensions.sdk + +Used by platform specific libraries to record fields that are required for a specific SDK. + +The following fields are available: + +- **epoch** An ID that is incremented for each SDK initialization. +- **installId** An ID that's created during the initialization of the SDK for the first time. +- **libVer** The SDK version. +- **seq** An ID that is incremented for each event. + + +### Common Data Extensions.user + +Describes the fields related to a user. + +The following fields are available: + +- **authId** This is an ID of the user associated with this event that is deduced from a token such as a Microsoft Account ticket or an XBOX token. +- **locale** The language and region. +- **localId** Represents a unique user identity that is created locally and added by the client. This is not the user's account ID. + + +### Common Data Extensions.utc + +Describes the properties that could be populated by a logging library on Windows. + +The following fields are available: + +- **aId** Represents the ETW ActivityId. Logged via TraceLogging or directly via ETW. +- **bSeq** Upload buffer sequence number in the format: buffer identifier:sequence number +- **cat** Represents a bitmask of the ETW Keywords associated with the event. +- **cpId** The composer ID, such as Reference, Desktop, Phone, Holographic, Hub, IoT Composer. +- **epoch** Represents the epoch and seqNum fields, which help track how many events were fired and how many events were uploaded, and enables identification of data lost during upload and de-duplication of events on the ingress server. +- **flags** Represents the bitmap that captures various Windows specific flags. +- **mon** Combined monitor and event sequence numbers in the format: monitor sequence : event sequence +- **op** Represents the ETW Op Code. +- **raId** Represents the ETW Related ActivityId. Logged via TraceLogging or directly via ETW. +- **seq** Represents the sequence field used to track absolute order of uploaded events. It is an incrementing identifier for each event added to the upload queue. The Sequence helps track how many events were fired and how many events were uploaded and enables identification of data lost during upload and de-duplication of events on the ingress server. +- **stId** Represents the Scenario Entry Point ID. This is a unique GUID for each event in a diagnostic scenario. This used to be Scenario Trigger ID. + + +### Common Data Extensions.xbl + +Describes the fields that are related to XBOX Live. + +The following fields are available: + +- **claims** Any additional claims whose short claim name hasn't been added to this structure. +- **did** XBOX device ID +- **dty** XBOX device type +- **dvr** The version of the operating system on the device. +- **eid** A unique ID that represents the developer entity. +- **exp** Expiration time +- **ip** The IP address of the client device. +- **nbf** Not before time +- **pid** A comma separated list of PUIDs listed as base10 numbers. +- **sbx** XBOX sandbox identifier +- **sid** The service instance ID. +- **sty** The service type. +- **tid** The XBOX Live title ID. +- **tvr** The XBOX Live title version. +- **uts** A bit field, with 2 bits being assigned to each user ID listed in xid. This field is omitted if all users are retail accounts. +- **xid** A list of base10-encoded XBOX User IDs. + + +## Common data fields + +### Ms.Device.DeviceInventoryChange + +Describes the installation state for all hardware and software components available on a particular device. + +The following fields are available: + +- **action** The change that was invoked on a device inventory object. +- **inventoryId** Device ID used for Compatibility testing +- **objectIîstanceId** No content is currently available. +- **objectInstanceId** Object identity which is unique within the device scope. +- **objectType** Indicates the object type that the event applies to. +- **syncId** A string used to group StartSync, EndSync, Add, and Remove operations that belong together. This field is unique by Sync period and is used to disambiguate in situations where multiple agents perform overlapping inventories for the same object. + + +## Compatibility events + +### Microsoft.Windows.Compatibility.Apphelp.SdbFix + +Product instrumentation for helping debug/troubleshoot issues with inbox compatibility components. + +The following fields are available: + +- **AppName** Name of the application impacted by SDB. +- **FixID** SDB GUID. +- **Flags** List of flags applied. +- **ImageName** Name of file. + + +## Component-based servicing events + +### CbsServicingProvider.CbsCapabilityEnumeration + +This event reports on the results of scanning for optional Windows content on Windows Update. + +The following fields are available: + +- **architecture** Indicates the scan was limited to the specified architecture. +- **capabilityCount** The number of optional content packages found during the scan. +- **clientId** The name of the application requesting the optional content. +- **duration** The amount of time it took to complete the scan. +- **hrStatus** The HReturn code of the scan. +- **language** Indicates the scan was limited to the specified language. +- **majorVersion** Indicates the scan was limited to the specified major version. +- **minorVersion** Indicates the scan was limited to the specified minor version. +- **namespace** Indicates the scan was limited to packages in the specified namespace. +- **sourceFilter** A bitmask indicating the scan checked for locally available optional content. +- **stackBuild** The build number of the servicing stack. +- **stackMajorVersion** The major version number of the servicing stack. +- **stackMinorVersion** The minor version number of the servicing stack. +- **stackRevision** The revision number of the servicing stack. + + +### CbsServicingProvider.CbsCapabilitySessionFinalize + +This event provides information about the results of installing or uninstalling optional Windows content from Windows Update. + +The following fields are available: + +- **capabilities** The names of the optional content packages that were installed. +- **clientId** The name of the application requesting the optional content. +- **currentID** The ID of the current install session. +- **downloadSource** The source of the download. +- **highestState** The highest final install state of the optional content. +- **hrLCUReservicingStatus** Indicates whether the optional content was updated to the latest available version. +- **hrStatus** The HReturn code of the install operation. +- **rebootCount** The number of reboots required to complete the install. +- **retryID** The session ID that will be used to retry a failed operation. +- **retryStatus** Indicates whether the install will be retried in the event of failure. +- **stackBuild** The build number of the servicing stack. +- **stackMajorVersion** The major version number of the servicing stack. +- **stackMinorVersion** The minor version number of the servicing stack. +- **stackRevision** The revision number of the servicing stack. + + +### CbsServicingProvider.CbsCapabilitySessionPended + +This event provides information about the results of installing optional Windows content that requires a reboot to keep Windows up to date. + +The following fields are available: + +- **clientId** The name of the application requesting the optional content. +- **pendingDecision** Indicates the cause of reboot, if applicable. + + +### CbsServicingProvider.CbsLateAcquisition + +This event sends data to indicate if some Operating System packages could not be updated as part of an upgrade, to help keep Windows up to date. + +The following fields are available: + +- **Features** The list of feature packages that could not be updated. +- **RetryID** The ID identifying the retry attempt to update the listed packages. + + +### CbsServicingProvider.CbsPackageRemoval + +This event provides information about the results of uninstalling a Windows Cumulative Security Update to help keep Windows up to date. + +The following fields are available: + +- **buildVersion** The build number of the security update being uninstalled. +- **clientId** The name of the application requesting the uninstall. +- **currentStateEnd** The final state of the update after the operation. +- **failureDetails** Information about the cause of a failure, if applicable. +- **failureSourceEnd** The stage during the uninstall where the failure occurred. +- **hrStatusEnd** The overall exit code of the operation. +- **initiatedOffline** Indicates if the uninstall was initiated for a mounted Windows image. +- **majorVersion** The major version number of the security update being uninstalled. +- **minorVersion** The minor version number of the security update being uninstalled. +- **originalState** The starting state of the update before the operation. +- **pendingDecision** Indicates the cause of reboot, if applicable. +- **primitiveExecutionContext** The state during system startup when the uninstall was completed. +- **revisionVersion** The revision number of the security update being uninstalled. +- **transactionCanceled** Indicates whether the uninstall was cancelled. + + +### CbsServicingProvider.CbsQualityUpdateInstall + +This event reports on the performance and reliability results of installing Servicing content from Windows Update to keep Windows up to date. + +The following fields are available: + +- **buildVersion** The build version number of the update package. +- **clientId** The name of the application requesting the optional content. +- **corruptionHistoryFlags** A bitmask of the types of component store corruption that have caused update failures on the device. +- **corruptionType** An enumeration listing the type of data corruption responsible for the current update failure. +- **currentStateEnd** The final state of the package after the operation has completed. +- **doqTimeSeconds** The time in seconds spent updating drivers. +- **executeTimeSeconds** The number of seconds required to execute the install. +- **failureDetails** The driver or installer that caused the update to fail. +- **failureSourceEnd** An enumeration indicating at what phase of the update a failure occurred. +- **hrStatusEnd** The return code of the install operation. +- **initiatedOffline** A true or false value indicating whether the package was installed into an offline Windows Imaging Format (WIM) file. +- **majorVersion** The major version number of the update package. +- **minorVersion** The minor version number of the update package. +- **originalState** The starting state of the package. +- **overallTimeSeconds** The time (in seconds) to perform the overall servicing operation. +- **planTimeSeconds** The time in seconds required to plan the update operations. +- **poqTimeSeconds** The time in seconds processing file and registry operations. +- **postRebootTimeSeconds** The time (in seconds) to do startup processing for the update. +- **preRebootTimeSeconds** The time (in seconds) between execution of the installation and the reboot. +- **primitiveExecutionContext** An enumeration indicating at what phase of shutdown or startup the update was installed. +- **rebootCount** The number of reboots required to install the update. +- **rebootTimeSeconds** The time (in seconds) before startup processing begins for the update. +- **resolveTimeSeconds** The time in seconds required to resolve the packages that are part of the update. +- **revisionVersion** The revision version number of the update package. +- **rptTimeSeconds** The time in seconds spent executing installer plugins. +- **shutdownTimeSeconds** The time (in seconds) required to do shutdown processing for the update. +- **stackRevision** The revision number of the servicing stack. +- **stageTimeSeconds** The time (in seconds) required to stage all files that are part of the update. + + +## Deployment extensions + +### DeploymentTelemetry.Deployment_End + +This event indicates that a Deployment 360 API has completed. + +The following fields are available: + +- **ClientId** Client ID of the user utilizing the D360 API. +- **ErrorCode** Error code of action. +- **FlightId** The specific ID of the Windows Insider build the device is getting. +- **Mode** Phase in upgrade. +- **RelatedCV** The correction vector (CV) of any other related events +- **Result** End result of the action. + + +### DeploymentTelemetry.Deployment_SetupBoxLaunch + +This event indicates that the Deployment 360 APIs have launched Setup Box. + +The following fields are available: + +- **ClientId** The client ID of the user utilizing the D360 API. +- **FlightId** The specific ID of the Windows Insider build the device is getting. +- **Quiet** Whether Setup will run in quiet mode or full mode. +- **RelatedCV** The correlation vector (CV) of any other related events. +- **SetupMode** The current setup phase. + + +### DeploymentTelemetry.Deployment_SetupBoxResult + +This event indicates that the Deployment 360 APIs have received a return from Setup Box. + +The following fields are available: + +- **ClientId** Client ID of the user utilizing the D360 API. +- **ErrorCode** Error code of the action. +- **FlightId** The specific ID of the Windows Insider build the device is getting. +- **Quiet** Indicates whether Setup will run in quiet mode or full mode. +- **RelatedCV** The correlation vector (CV) of any other related events. +- **SetupMode** The current Setup phase. + + +### DeploymentTelemetry.Deployment_Start + +This event indicates that a Deployment 360 API has been called. + +The following fields are available: + +- **ClientId** Client ID of the user utilizing the D360 API. +- **FlightId** The specific ID of the Windows Insider build the device is getting. +- **Mode** The current phase of the upgrade. +- **RelatedCV** The correlation vector (CV) of any other related events. + + +## Diagnostic data events + +### TelClientSynthetic.AuthorizationInfo_RuntimeTransition + +This event sends data indicating that a device has undergone a change of telemetry opt-in level detected at UTC startup, to help keep Windows up to date. The telemetry opt-in level signals what data we are allowed to collect. + +The following fields are available: + +- **CanAddMsaToMsTelemetry** True if we can add MSA PUID and CID to telemetry, false otherwise. +- **CanCollectAnyTelemetry** True if we are allowed to collect partner telemetry, false otherwise. +- **CanCollectCoreTelemetry** True if we can collect CORE/Basic telemetry, false otherwise. +- **CanCollectHeartbeats** True if we can collect heartbeat telemetry, false otherwise. +- **CanCollectOsTelemetry** True if we can collect diagnostic data telemetry, false otherwise. +- **CanCollectWindowsAnalyticsEvents** True if we can collect Windows Analytics data, false otherwise. +- **CanPerformDiagnosticEscalations** True if we can perform diagnostic escalation collection, false otherwise. +- **CanPerformTraceEscalations** True if we can perform trace escalation collection, false otherwise. +- **CanReportScenarios** True if we can report scenario completions, false otherwise. +- **PreviousPermissions** Bitmask of previous telemetry state. +- **TransitionFromEverythingOff** True if we are transitioning from all telemetry being disabled, false otherwise. + + +### TelClientSynthetic.AuthorizationInfo_Startup + +Fired by UTC at startup to signal what data we are allowed to collect. + +The following fields are available: + +- **CanAddMsaToMsTelemetry** True if we can add MSA PUID and CID to telemetry, false otherwise. +- **CanCol|ectCoreTelemetry** No content is currently available. +- **CanCollactCoreTelemetry** No content is currently available. +- **CanCollectAnyTelemetry** True if we are allowed to collect partner telemetry, false otherwise. +- **CanCollectCoreTelemetry** True if we can collect CORE/Basic telemetry, false otherwise. +- **CanCollectHeartbeats** True if we can collect heartbeat telemetry, false otherwise. +- **CanCollectOsTelemetry** True if we can collect diagnostic data telemetry, false otherwise. +- **CanCollectWindowsAnalyticsEvents** True if we can collect Windows Analytics data, false otherwise. +- **CanPerformDiagnosticEscalations** True if we can perform diagnostic escalation collection, false otherwise. +- **CanPerformDiagnostigEscalations** No content is currently available. +- **CanPerformDkagnosticEscalations** No content is currently available. +- **CanPerformTraceEscalations** True if we can perform trace escalation collection, false otherwise. +- **CanReportScanarios** No content is currently available. +- **CanReportScenarios** True if we can report scenario completions, false otherwise. +- **PreviousPermissions** Bitmask of previous telemetry state. +- **TransitionFromEverythingOff** True if we are transitioning from all telemetry being disabled, false otherwise. + + +### TelClientSynthetic.ConnectivityHeartBeat_0 + +This event sends data about the connectivity status of the Connected User Experience and Telemetry component that uploads telemetry events. If an unrestricted free network (such as Wi-Fi) is available, this event updates the last successful upload time. Otherwise, it checks whether a Connectivity Heartbeat event was fired in the past 24 hours, and if not, it fires an event. A Connectivity Heartbeat event also fires when a device recovers from costed network to free network. + +The following fields are available: + +- **CensusExitCode** Returns last execution codes from census client run. +- **CensusStartTime** Returns timestamp corresponding to last successful census run. +- **CensusTaskEnabled** Returns Boolean value for the census task (Enable/Disable) on client machine. +- **LastConnectivityLossTime** Retrieves the last time the device lost free network. +- **NetworkState** Retrieves the network state: 0 = No network. 1 = Restricted network. 2 = Free network. +- **NoNetworkTime** Retrieves the time spent with no network (since the last time) in seconds. +- **RestrictedNetworkTime** Retrieves the time spent on a metered (cost restricted) network in seconds. + + +### TelClientSynthetic.HeartBeat_5 + +This event sends data about the health and quality of the diagnostic data from the given device, to help keep Windows up to date. It also enables data analysts to determine how 'trusted' the data is from a given device. + +The following fields are available: + +- **AgentConnctionErrorsCount** No content is currently available. +- **AgentConnectionErrorsCount** Number of non-timeout errors associated with the host/agent channel. +- **AgenticenectionErrorsCount** No content is currently available. +- **CeesusExitCode** No content is currently available. +- **CeesusStartTime** No content is currently available. +- **CeesusTaskEnabled** No content is currently available. +- **CensusExitCode** The last exit code of the Census task. +- **CensusStartTime** Time of last Census run. +- **CensusTaskEnabled** True if Census is enabled, false otherwise. +- **CompressedBytesUploaded** Number of compressed bytes uploaded. +- **ConsumerDroppedCount** Number of events dropped at consumer layer of telemetry client. +- **CriticalDataDbDroppedCount** Number of critical data sampled events dropped at the database layer. +- **CriticalDataDbLroppedCount** No content is currently available. +- **CriticalDataDhrottleDroppedCount** No content is currently available. +- **CriticalDataThrottleDroppedCount** The number of critical data sampled events that were dropped because of throttling. +- **CriticalOverflowEntersCounter** Number of times critical overflow mode was entered in event DB. +- **CriticamOverflowEntersCounter** No content is currently available. +- **DbCriticalDroppedCount** Total number of dropped critical events in event DB. +- **DbDroppedCount** Number of events dropped due to DB fullness. +- **DbDroppedFailureCount** Number of events dropped due to DB failures. +- **DbDroppedFullCount** Number of events dropped due to DB fullness. +- **DbDroppedOailureCount** No content is currently available. +- **DbDroppedOullCount** No content is currently available. +- **DecodingDroppedCount** Number of events dropped due to decoding failures. +- **DhrottledDroppedCount** No content is currently available. +- **EnteringCriticalOverflowDroppedCounter** Number of events dropped due to critical overflow mode being initiated. +- **EtwDroppedBufferCount** Number of buffers dropped in the UTC ETW session. +- **EtwDroppedCount** Number of events dropped at ETW layer of telemetry client. +- **Eve~tStoreResetCounter** No content is currently available. +- **EventSC06eLifetimeResetCounter** No content is currently available. +- **EventSC06eResetCounter** No content is currently available. +- **EventSC06eResetSizeSum** No content is currently available. +- **EventsPersistedCount** Number of events that reached the PersistEvent stage. +- **EventStoreLifetimeResetCounter** Number of times event DB was reset for the lifetime of UTC. +- **EventStoreResetCounter** Number of times event DB was reset. +- **EventStoreResetSizeSum** Total size of event DB across all resets reports in this instance. +- **EventSubStoreResetCounter** Number of times event DB was reset. +- **EventSubStoreResetSizeSum** Total size of event DB across all resets reports in this instance. +- **EventsUploaded** Number of events uploaded. +- **Flags** Flags indicating device state such as network state, battery state, and opt-in state. +- **FullTriggerBufferDroppedCount** Number of events dropped due to trigger buffer being full. +- **HeartBeatSequenceNumber** The sequence number of this heartbeat. +- **icesumerDroppedCount** No content is currently available. +- **icmpressedBytesUploaded** No content is currently available. +- **InvalidHttpCodeCount** Number of invalid HTTP codes received from contacting Vortex. +- **LastAgentConnectionError** Last non-timeout error encountered in the host/agent channel. +- **LastAgenticenectionError** No content is currently available. +- **LastEventSizeOffender** Event name of last event which exceeded max event size. +- **LastInvalidHttpCode** Last invalid HTTP code received from Vortex. +- **LastreReseizeOffender** No content is currently available. +- **MaxActiveAgentConnectionCount** The maximum number of active agents during this heartbeat timeframe. +- **MaxActiveAgenticenectionCount** No content is currently available. +- **MaxInUseScenarioCounter** Soft maximum number of scenarios loaded by UTC. +- **Olags** No content is currently available. +- **OullTriggerBufferDroppedCount** No content is currently available. +- **PreviousHeartBeatTime** Time of last heartbeat event (allows chaining of events). +- **PrivacyBlockedCount** The number of events blocked due to privacy settings or tags. +- **RepeatedUploadFailureDropped** Number of events lost due to repeated upload failures for a single buffer. +- **SettingsHttpAttempts** Number of attempts to contact OneSettings service. +- **SettingsHttpFailures** The number of failures from contacting the OneSettings service. +- **ThrottledDroppedCount** Number of events dropped due to throttling of noisy providers. +- **TopUploaderErrors** List of top errors received from the upload endpoint. +- **UploaderDroppedCount** Number of events dropped at the uploader layer of telemetry client. +- **UploaderErrorCount** Number of errors received from the upload endpoint. +- **VortexFailuresTimeout** The number of timeout failures received from Vortex. +- **VortexHttpAttempts** Number of attempts to contact Vortex. +- **VortexHttpFailures4xS** No content is currently available. +- **VortexHttpFailures4xx** Number of 400-499 error codes received from Vortex. +- **VortexHttpFailures5xS** No content is currently available. +- **VortexHttpFailures5xx** Number of 500-599 error codes received from Vortex. +- **VortexHttpResponseFailures** Number of Vortex responses that are not 2XX or 400. +- **VortexHttpResponsesWihDroppedEvents** No content is currently available. +- **VortexHttpResponsesWithDroppedEvents** Number of Vortex responses containing at least 1 dropped event. + + +### TelClientSynthetic.HeartBeat_Aria_5 + +This event is the telemetry client ARIA heartbeat. + +The following fields are available: + +- **CompressedBytesUploaded** Number of compressed bytes uploaded. +- **CriticalDataDbDroppedCount** Number of critical data sampled events dropped at the database layer. +- **CriticalOverflowEntersCounter** Number of times critical overflow mode was entered in event database. +- **DbCriticalDroppedCount** Total number of dropped critical events in event database. +- **DbDroppedCount** Number of events dropped at the database layer. +- **DbDroppedFailureCount** Number of events dropped due to database failures. +- **DbDroppedFullCount** Number of events dropped due to database being full. +- **EnteringCriticalOverflowDroppedCounter** Number of events dropped due to critical overflow mode being initiated. +- **EventsPersistedCount** Number of events that reached the PersistEvent stage. +- **EventStoreLifetimeResetCounter** Number of times the event store has been reset. +- **EventStoreResetCounter** Number of times the event store has been reset during this heartbeat. +- **EventStoreResetSizeSum** Size of event store reset in bytes. +- **EventsUploaded** Number of events uploaded. +- **HeartBeatSequenceNumber** The sequence number of this heartbeat. +- **InvalidHttpCodeCount** Number of invalid HTTP codes received from contacting Vortex. +- **LastEventSizeOffender** Event name of last event which exceeded max event size. +- **LastInvalidHttpCode** Last invalid HTTP code received from Vortex. +- **PreviousHeartBeatTime** The FILETIME of the previous heartbeat fire. +- **PrivacyBlockedCount** The number of events blocked due to privacy settings or tags. +- **RepeatedUploadFailureDropped** Number of events lost due to repeated upload failures for a single buffer. +- **SettingsHttpAttempts** Number of attempts to contact OneSettings service. +- **SettingsHttpFailures** Number of failures from contacting OneSettings service. +- **TopUploaderErrors** List of top errors received from the upload endpoint. +- **UploaderDroppedCount** Number of events dropped at the uploader layer of telemetry client. +- **UploaderErrorCount** Number of errors received from the upload endpoint. +- **VortexFailuresTimeout** Number of time out failures received from Vortex. +- **VortexHttpAttempts** Number of attempts to contact Vortex. +- **VortexHttpFailures4xx** Number of 400-499 error codes received from Vortex. +- **VortexHttpFailures5xx** Number of 500-599 error codes received from Vortex. +- **VortexHttpResponseFailures** Number of Vortex responses that are not 2XX or 400. +- **VortexHttpResponsesWithDroppedEvents** Number of Vortex responses containing at least 1 dropped event. + + +### TelClientSynthetic.HeartBeat_Seville_5 + +This event is sent by the universal telemetry client (UTC) as a heartbeat signal for Sense. + +The following fields are available: + +- **AgentConnectionErrorsCount** Number of non-timeout errors associated with the host or agent channel. +- **CompressedBytesUploaded** Number of compressed bytes uploaded. +- **ConsumerDroppedCount** Number of events dropped at consumer layer of the telemetry client. +- **CriticalDataDbDroppedCount** Number of critical data sampled events dropped at the database layer. +- **CriticalDataThrottleDroppedCount** Number of critical data sampled events dropped due to throttling. +- **CriticalOverflowEntersCounter** Number of times critical overflow mode was entered in event database. +- **DailyUploadQuotaInBytes** Daily upload quota for Sense in bytes (only in in-proc mode). +- **DbCriticalDroppedCount** Total number of dropped critical events in event database. +- **DbDroppedCount** Number of events dropped due to database being full. +- **DbDroppedFailureCount** Number of events dropped due to database failures. +- **DbDroppedFullCount** Number of events dropped due to database being full. +- **DecodingDroppedCount** Number of events dropped due to decoding failures. +- **DiskSizeInBytes** Size of event store for Sense in bytes (only in in-proc mode). +- **EnteringCriticalOverflowDroppedCounter** Number of events dropped due to critical overflow mode being initiated. +- **EtwDroppedBufferCount** Number of buffers dropped in the universal telemetry client (UTC) event tracing for Windows (ETW) session. +- **EtwDroppedCount** Number of events dropped at the event tracing for Windows (ETW) layer of telemetry client. +- **EventsPersistedCount** Number of events that reached the PersistEvent stage. +- **EventStoreLifetimeResetCounter** Number of times event the database was reset for the lifetime of the universal telemetry client (UTC). +- **EventStoreResetCounter** Number of times the event database was reset. +- **EventStoreResetSizeSum** Total size of the event database across all resets reports in this instance. +- **EventsUploaded** Number of events uploaded. +- **Flags** Flags indicating device state, such as network state, battery state, and opt-in state. +- **FullTriggerBufferDroppedCount** Number of events dropped due to trigger buffer being full. +- **HeartBeatSequenceNumber** The sequence number of this heartbeat. +- **InvalidHttpCodeCount** Number of invalid HTTP codes received from contacting Vortex. +- **LastAgentConnectionError** Last non-timeout error encountered in the host/agent channel. +- **LastEventSizeOffender** Event name of last event which exceeded the maximum event size. +- **LastInvalidHttpCode** Last invalid HTTP code received from Vortex. +- **MaxActiveAgentConnectionCount** Maximum number of active agents during this heartbeat timeframe. +- **NormalUploadTimerMillis** Number of milliseconds between each upload of normal events for SENSE (only in in-proc mode). +- **PreviousHeartBeatTime** Time of last heartbeat event (allows chaining of events). +- **RepeatedUploadFailureDropped** Number of events lost due to repeated failed uploaded attempts. +- **SettingsHttpAttempts** Number of attempts to contact OneSettings service. +- **SettingsHttpFailures** Number of failures from contacting the OneSettings service. +- **ThrottledDroppedCount** Number of events dropped due to throttling of noisy providers. +- **TopUploaderErrors** Top uploader errors, grouped by endpoint and error type. +- **UploaderDroppedCount** Number of events dropped at the uploader layer of the telemetry client. +- **UploaderErrorCount** Number of input for the TopUploaderErrors mode estimation. +- **VortexFailuresTimeout** Number of time out failures received from Vortex. +- **VortexHttpAttempts** Number of attempts to contact Vortex. +- **VortexHttpFailures4xx** Number of 400-499 error codes received from Vortex. +- **VortexHttpFailures5xx** Number of 500-599 error codes received from Vortex. +- **VortexHttpResponseFailures** Number of Vortex responses that are not 2XX or 400. +- **VortexHttpResponsesWithDroppedEvents** Number of Vortex responses containing at least 1 dropped event. + + +## Direct to update events + +### Microsoft.Windows.DirectToUpdate.DTUCoordinatorCheckApplicability + +Event to indicate that the Coordinator CheckApplicability call succeeded. + +The following fields are available: + +- **ApplicabilityResult** Result of CheckApplicability function. +- **CampaignID** Campaign ID being run. +- **ClientID** Client ID being run. +- **CoordinatorVersion** Coordinator version of DTU. +- **CV** Correlation vector. +- **IsDeviceAADDomainJoined** Indicates whether the device is logged in to the AAD (Azure Active Directory) domain. +- **IsDeviceADDomainJoined** Indicates whether the device is logged in to the AD (Active Directory) domain. +- **IsDeviceCloverTrail** Indicates whether the device has a Clover Trail system installed. +- **IsDeviceFeatureUpdatingPaused** Indicates whether Feature Update is paused on the device. +- **IsDeviceNetworkMetered** Indicates whether the device is connected to a metered network. +- **IsDeviceOobeBlocked** Indicates whether user approval is required to install updates on the device. +- **IsDeviceRequireUpdateApproval** Indicates whether user approval is required to install updates on the device. +- **IsDeviceSccmManaged** Indicates whether the device is running the Microsoft SCCM (System Center Configuration Manager) to keep the operating system and applications up to date. +- **IsDeviceUninstallActive** Indicates whether the OS (operating system) on the device was recently updated. +- **IsDeviceUpdateNotificationLevel** Indicates whether the device has a set policy to control update notifications. +- **IsDeviceUpdateServiceManaged** Indicates whether the device uses WSUS (Windows Server Update Services). +- **IsDeviceZeroExhaust** Indicates whether the device subscribes to the Zero Exhaust policy to minimize connections from Windows to Microsoft. +- **IsGreaterThanMaxRetry** Indicates whether the DTU (Direct to Update) service has exceeded its maximum retry count. +- **IsVolumeLicensed** Indicates whether a volume license was used to authenticate the operating system or applications on the device. + + +### Microsoft.Windows.DirectToUpdate.DTUCoordinatorCheckApplicabilityGenericFailure + +This event indicatse that we have received an unexpected error in the Direct to Update (DTU) Coordinators CheckApplicability call. + +The following fields are available: + +- **CampaignID** ID of the campaign being run. +- **ClientID** ID of the client receiving the update. +- **CoordinatorVersion** Coordinator version of Direct to Update. +- **CV** Correlation vector. +- **hResult** HRESULT of the failure. + + +### Microsoft.Windows.DirectToUpdate.DTUCoordinatorCleanupGenericFailure + +This event indicates that we have received an unexpected error in the Direct to Update (DTU) Coordinator Cleanup call. + +The following fields are available: + +- **CampaignID** Campaign ID being run +- **ClientID** Client ID being run +- **CoordinatorVersion** Coordinator version of DTU +- **CV** Correlation vector +- **hResult** HRESULT of the failure + + +### Microsoft.Windows.DirectToUpdate.DTUCoordinatorCleanupSuccess + +This event indicates that the Coordinator Cleanup call succeeded. + +The following fields are available: + +- **CampaignID** Campaign ID being run +- **ClientID** Client ID being run +- **CoordinatorVersion** Coordinator version of DTU +- **CV** Correlation vector + + +### Microsoft.Windows.DirectToUpdate.DTUCoordinatorCommitGenericFailure + +This event indicates that we have received an unexpected error in the Direct to Update (DTU) Coordinator Commit call. + +The following fields are available: + +- **CampaignID** Campaign ID being run. +- **ClientID** Client ID being run. +- **CoordinatorVersion** Coordinator version of DTU. +- **CV** Correlation vector. +- **hResult** HRESULT of the failure. + + +### Microsoft.Windows.DirectToUpdate.DTUCoordinatorCommitSuccess + +This event indicates that the Coordinator Commit call succeeded. + +The following fields are available: + +- **CampaignID** Campaign ID being run. +- **ClientID** Client ID being run. +- **CoordinatorVersion** Coordinator version of DTU. +- **CV** Correlation vector. + + +### Microsoft.Windows.DirectToUpdate.DTUCoordinatorDownloadGenericFailure + +This event indicates that we have received an unexpected error in the Direct to Update (DTU) Coordinator Download call. + +The following fields are available: + +- **CampaignID** Campaign ID being run. +- **ClientID** Client ID being run. +- **CoordinatorVersion** Coordinator version of DTU. +- **CV** Correlation vector. +- **hResult** HRESULT of the failure. + + +### Microsoft.Windows.DirectToUpdate.DTUCoordinatorDownloadIgnoredFailure + +This event indicates that we have received an error in the Direct to Update (DTU) Coordinator Download call that will be ignored. + +The following fields are available: + +- **CampaignID** Campaign ID being run. +- **ClientID** Client ID being run. +- **CoordinatorVersion** Coordinator version of DTU. +- **CV** Correlation vector. +- **hResult** HRESULT of the failure. + + +### Microsoft.Windows.DirectToUpdate.DTUCoordinatorDownloadSuccess + +This event indicates that the Coordinator Download call succeeded. + +The following fields are available: + +- **CampaignID** Campaign ID being run. +- **ClientID** Client ID being run. +- **CoordinatorVersion** Coordinator version of DTU. +- **CV** Correlation vector. + + +### Microsoft.Windows.DirectToUpdate.DTUCoordinatorHandleShutdownGenericFailure + +This event indicates that we have received an unexpected error in the Direct to Update (DTU) Coordinator HandleShutdown call. + +The following fields are available: + +- **CampaignID** Campaign ID being run. +- **ClientID** Client ID being run. +- **CoordinatorVersion** Coordinate version of DTU. +- **CV** Correlation vector. +- **hResult** HRESULT of the failure. + + +### Microsoft.Windows.DirectToUpdate.DTUCoordinatorHandleShutdownSuccess + +This event indicates that the Coordinator HandleShutdown call succeeded. + +The following fields are available: + +- **CampaignID** Campaign ID being run. +- **ClientID** Client ID being run. +- **CoordinatorVersion** Coordinator version of DTU. +- **CV** Correlation vector. + + +### Microsoft.Windows.DirectToUpdate.DTUCoordinatorInitializeGenericFailure + +This event indicates that we have received an unexpected error in the Direct to Update (DTU) Coordinator Initialize call. + +The following fields are available: + +- **CampaignID** Campaign ID being run. +- **ClientID** Client ID being run. +- **CoordinatorVersion** Coordinator version of DTU. +- **CV** Correlation vector. +- **hResult** HRESULT of the failure. + + +### Microsoft.Windows.DirectToUpdate.DTUCoordinatorInitializeSuccess + +This event indicates that the Coordinator Initialize call succeeded. + +The following fields are available: + +- **CampaignID** Campaign ID being run. +- **ClientID** Client ID being run. +- **CoordinatorVersion** Coordinator version of DTU. +- **CV** Correlation vector. + + +### Microsoft.Windows.DirectToUpdate.DTUCoordinatorInstallGenericFailure + +This event indicates that we have received an unexpected error in the Direct to Update (DTU) Coordinator Install call. + +The following fields are available: + +- **CampaignID** Campaign ID being run. +- **ClientID** Client ID being run. +- **CoordinatorVersion** Coordinator version of DTU. +- **CV** Correlation vector. +- **hResult** HRESULT of the failure. + + +### Microsoft.Windows.DirectToUpdate.DTUCoordinatorInstallIgnoredFailure + +This event indicates that we have received an error in the Direct to Update (DTU) Coordinator Install call that will be ignored. + +The following fields are available: + +- **CampaignID** Campaign ID being run. +- **ClientID** Client ID being run. +- **CoordinatorVersion** Coordinator version of DTU. +- **CV** Correlation vector. +- **hResult** HRESULT of the failure. + + +### Microsoft.Windows.DirectToUpdate.DTUCoordinatorInstallSuccess + +This event indicates that the Coordinator Install call succeeded. + +The following fields are available: + +- **CampaignID** Campaign ID being run. +- **ClientID** Client ID being run. +- **CoordinatorVersion** Coordinator version of DTU. +- **CV** Correlation vector. + + +### Microsoft.Windows.DirectToUpdate.DTUCoordinatorProgressCallBack + +This event indicates that the Coordinator's progress callback has been called. + +The following fields are available: + +- **CampaignID** Campaign ID being run. +- **ClientID** Client ID being run. +- **CoordinatorVersion** Coordinator version of DTU. +- **CV** Correlation vector. +- **DeployPhase** Current Deploy Phase. + + +### Microsoft.Windows.DirectToUpdate.DTUCoordinatorSetCommitReadySuccess + +This event indicates that the Coordinator SetCommitReady call succeeded. + +The following fields are available: + +- **CampaignID** ID of the update campaign being run. +- **ClientID** ID of the client receiving the update. +- **CoordinatorVersion** Coordinator version of Direct to Update. +- **CV** Correlation vector. + + +### Microsoft.Windows.DirectToUpdate.DTUCoordinatorWaitForRebootUiNotShown + +This event indicates that the Coordinator WaitForRebootUi call succeeded. + +The following fields are available: + +- **CampaignID** Campaign ID being run. +- **ClientID** ID of the client receiving the update. +- **CoordinatorVersion** Coordinator version of Direct to Update. +- **CV** Correlation vector. +- **hResult** HRESULT of the failure. + + +### Microsoft.Windows.DirectToUpdate.DTUCoordinatorWaitForRebootUiSelection + +This event indicates that the user selected an option on the Reboot UI. + +The following fields are available: + +- **CampaignID** ID of the update campaign being run. +- **ClientID** ID of the client receiving the update. +- **CoordinatorVersion** Coordinator version of Direct to Update. +- **CV** Correlation vector. +- **rebootUiSelection** Selection on the Reboot UI. + + +### Microsoft.Windows.DirectToUpdate.DTUCoordinatorWaitForRebootUiSuccess + +This event indicates that the Coordinator WaitForRebootUi call succeeded. + +The following fields are available: + +- **CampaignID** ID of the update campaign being run. +- **ClientID** ID of the client receiving the update. +- **CoordinatorVersion** Coordinator version of Direct to Update. +- **CV** Correlation vector. + + +### Microsoft.Windows.DirectToUpdate.DTUHandlerCheckApplicabilityInternalGenericFailure + +This event indicates that we have received an unexpected error in the Direct to Update (DTU) Handler CheckApplicabilityInternal call. + +The following fields are available: + +- **CampaignID** ID of the campaign being run. +- **ClientID** ID of the client receiving the update. +- **CoordinatorVersion** Coordinator version of Direct to Update. +- **CV** Correlation vector. +- **hResult** HRESULT of the failure. + + +### Microsoft.Windows.DirectToUpdate.DTUHandlerCheckApplicabilityInternalSuccess + +This event indicates that the Handler CheckApplicabilityInternal call succeeded. + +The following fields are available: + +- **ApplicabilityResult** The result of the applicability check. +- **CampaignID** ID of the update campaign being run. +- **ClientID** ID of the client receiving the update. +- **CoordinatorVersion** Coordinator version of Direct to Update. +- **CV** Correlation vector. + + +### Microsoft.Windows.DirectToUpdate.DTUHandlerCheckApplicabilitySuccess + +This event indicates that the Handler CheckApplicability call succeeded. + +The following fields are available: + +- **ApplicabilityResult** The result code indicating whether the update is applicable. +- **CampaignID** ID of the update campaign being run. +- **ClientID** ID of the client receiving the update. +- **CoordinatorVersion** Coordinator version of Direct to Update. +- **CV** Correlation vector. +- **CV_new** New correlation vector. + + +### Microsoft.Windows.DirectToUpdate.DTUHandlerCheckIfCoordinatorMinApplicableVersionSuccess + +This event indicates that the Handler CheckIfCoordinatorMinApplicableVersion call succeeded. + +The following fields are available: + +- **CampaignID** ID of the update campaign being run. +- **CheckIfCoordinatorMinApplicableVersionResult** Result of CheckIfCoordinatorMinApplicableVersion function. +- **ClientID** ID of the client receiving the update. +- **CoordinatorVersion** Coordinator version of Direct to Update. +- **CV** Correlation vector. + + +### Microsoft.Windows.DirectToUpdate.DTUHandlerCommitGenericFailure + +This event indicates that we have received an unexpected error in the Direct to Update (DTU) Handler Commit call. + +The following fields are available: + +- **CampaignID** ID of the update campaign being run. +- **ClientID** ID of the client receiving the update. +- **CoordinatorVersion** Coordinator version of Direct to Update. +- **CV** Correlation vector. +- **CV_new** New correlation vector. +- **hResult** HRESULT of the failure. + + +### Microsoft.Windows.DirectToUpdate.DTUHandlerCommitSuccess + +This event indicates that the Handler Commit call succeeded. + +The following fields are available: + +- **CampaignID** ID of the update campaign being run.run +- **ClientID** ID of the client receiving the update. +- **CoordinatorVersion** Coordinator version of Direct to Update. +- **CV** Correlation vector. +- **CV_new** New correlation vector. + + +### Microsoft.Windows.DirectToUpdate.DTUHandlerDownloadAndExtractCabFailure + +This event indicates that the Handler Download and Extract cab call failed. + +The following fields are available: + +- **CampaignID** ID of the update campaign being run. +- **ClientID** ID of the client receiving the update. +- **CoordinatorVersion** Coordinator version of Direct to Update. +- **CV** Correlation vector. +- **DownloadAndExtractCabFunction_failureReason** Reason why the update download and extract process failed. +- **hResult** HRESULT of the failure. + + +### Microsoft.Windows.DirectToUpdate.DTUHandlerDownloadAndExtractCabSuccess + +This event indicates that the Handler Download and Extract cab call succeeded. + +The following fields are available: + +- **CampaignID** ID of the update campaign being run. +- **ClientID** ID of the client receiving the update. +- **CoordinatorVersion** Coordinator version of Direct to Update. +- **CV** Correlation vector. + + +### Microsoft.Windows.DirectToUpdate.DTUHandlerDownloadGenericFailure + +This event indicates that we have received an unexpected error in the Direct to Update (DTU) Handler Download call. + +The following fields are available: + +- **CampaignID** ID of the update campaign being run. +- **ClientID** ID of the client receiving the update. +- **CoordinatorVersion** Coordinator version of Direct to Update. +- **CV** Correlation vector. +- **hResult** HRESULT of the failure. + + +### Microsoft.Windows.DirectToUpdate.DTUHandlerDownloadSuccess + +This event indicates that the Handler Download call succeeded. + +The following fields are available: + +- **CampaignID** ID of the update campaign being run. +- **ClientID** ID of the client receiving the update. +- **CoordinatorVersion** Coordinator version of Direct to Update. +- **CV** Correlation vector. + + +### Microsoft.Windows.DirectToUpdate.DTUHandlerInitializeGenericFailure + +This event indicates that we have received an unexpected error in the Direct to Update (DTU) Handler Initialize call. + +The following fields are available: + +- **CampaignID** ID of the update campaign being run. +- **ClientID** ID of the client receiving the update. +- **CoordinatorVersion** Coordinator version of Direct to Update. +- **CV** Correlation vector. +- **DownloadAndExtractCabFunction_hResult** HRESULT of the download and extract. +- **hResult** HRESULT of the failure. + + +### Microsoft.Windows.DirectToUpdate.DTUHandlerInitializeSuccess + +This event indicates that the Handler Initialize call succeeded. + +The following fields are available: + +- **CampaignID** ID of the update campaign being run. +- **ClientID** ID of the client receiving the update. +- **CoordinatorVersion** Coordinator version of Direct to Update. +- **CV** Correlation vector. +- **DownloadAndExtractCabFunction_hResult** HRESULT of the download and extraction. + + +### Microsoft.Windows.DirectToUpdate.DTUHandlerInstallGenericFailure + +This event indicates that we have received an unexpected error in the Direct to Update (DTU) Handler Install call. + +The following fields are available: + +- **CampaignID** ID of the update campaign being run. +- **ClientID** ID of the client receiving the update. +- **CoordinatorVersion** Coordinator version of Direct to Update. +- **CV** Correlation vector. +- **hResult** HRESULT of the failure. + + +### Microsoft.Windows.DirectToUpdate.DTUHandlerInstallSuccess + +This event indicates that the Coordinator Install call succeeded. + +The following fields are available: + +- **CampaignID** ID of the update campaign being run. +- **ClientID** ID of the client receiving the update. +- **CoordinatorVersion** Coordinator version of Direct to Update. +- **CV** Correlation vector. + + +### Microsoft.Windows.DirectToUpdate.DTUHandlerSetCommitReadySuccess + +This event indicates that the Handler SetCommitReady call succeeded. + +The following fields are available: + +- **CampaignID** ID of the campaign being run. +- **ClientID** ID of the client receiving the update. +- **CoordinatorVersion** Coordinator version of Direct to Update. +- **CV** Correlation vector. + + +### Microsoft.Windows.DirectToUpdate.DTUHandlerWaitForRebootUiGenericFailure + +This event indicates that we have received an unexpected error in the Direct to Update (DTU) Handler WaitForRebootUi call. + +The following fields are available: + +- **CampaignID** The ID of the campaigning being run. +- **ClientID** ID of the client receiving the update. +- **CoordinatorVersion** Coordinator version of Direct to Update. +- **CV** Correlation vector. +- **hResult** The HRESULT of the failure. + + +### Microsoft.Windows.DirectToUpdate.DTUHandlerWaitForRebootUiSuccess + +This event indicates that the Handler WaitForRebootUi call succeeded. + +The following fields are available: + +- **CampaignID** ID of the campaign being run. +- **ClientID** ID of the client receiving the update. +- **CoordinatorVersion** Coordinator version of Direct to Update. +- **CV** Correlation vector. + + +## DxgKernelTelemetry events + +### DxgKrnlTelemetry.GPUAdapterInventoryV2 + +This event sends basic GPU and display driver information to keep Windows and display drivers up-to-date. + +The following fields are available: + +- **AdapterDypeValue** No content is currently available. +- **AdapterTypeValue** The numeric value indicating the type of Graphics adapter. +- **aiSeqId** The event sequence ID. +- **bootId** The system boot ID. +- **BrightnessVersionViaDDI** The version of the Display Brightness Interface. +- **BvightnessVersionViaDDI** No content is currently available. +- **ComputePreemptionLevel** The maximum preemption level supported by GPU for compute payload. +- **DedicatedSystemMemoryB** The amount of system memory dedicated for GPU use (in bytes). +- **DedicatedVideoMemoryB** The amount of dedicated VRAM of the GPU (in bytes). +- **DisplayAdapterLuid** The display adapter LUID. +- **Driver48,k** No content is currently available. +- **DriverDate** The date of the display driver. +- **DriverRa~k** No content is currently available. +- **DriverRank** The rank of the display driver. +- **DriverVersion** The display driver version. +- **DX10UMDFilePath** The file path to the location of the DirectX 10 Display User Mode Driver in the Driver Store. +- **DX11UMDFilePath** The file path to the location of the DirectX 11 Display User Mode Driver in the Driver Store. +- **DX12UMDFilePath** The file path to the location of the DirectX 12 Display User Mode Driver in the Driver Store. +- **DX9]MDFilePath** No content is currently available. +- **DX9UMDFilePath** The file path to the location of the DirectX 9 Display User Mode Driver in the Driver Store. +- **GPUDeviceID** The GPU device ID. +- **GPUPree}ptionLevel** No content is currently available. +- **GPUPreemptionLdvel** No content is currently available. +- **GPUPreemptionLevel** The maximum preemption level supported by GPU for graphics payload. +- **GPURevisionID** The GPU revision ID. +- **GPUVendoeID** No content is currently available. +- **GPUVendorID** The GPU vendor ID. +- **InterbaceId** No content is currently available. +- **InterfaceId** The GPU interface ID. +- **IqMPOSupported** No content is currently available. +- **IrRemovable** No content is currently available. +- **IsDisp|ayDevice** No content is currently available. +- **IsDisplayDevice** Does the GPU have displaying capabilities? +- **IsHwSchSupported** Indicates whether the adapter supports hardware scheduling. +- **IsHybridDiscrete** Does the GPU have discrete GPU capabilities in a hybrid device? +- **IsHybridIntdgrated** No content is currently available. +- **IsHybridIntegrated** Does the GPU have integrated GPU capabilities in a hybrid device? +- **IsLDA** Is the GPU comprised of Linked Display Adapters? +- **IsMiracastSupported** Does the GPU support Miracast? +- **IsMismatchLDA** Is at least one device in the Linked Display Adapters chain from a different vendor? +- **IsMPOCupported** No content is currently available. +- **IsMPOSuppor|ed** No content is currently available. +- **IsMPOSupported** Does the GPU support Multi-Plane Overlays? +- **IsMsMiracastSupported** Are the GPU Miracast capabilities driven by a Microsoft solution? +- **IsPostAdapter** Is this GPU the POST GPU in the device? +- **IsRemovable** TRUE if the adapter supports being disabled or removed. +- **IsRenderDevice** Does the GPU have rendering capabilities? +- **IsSoftwareDevice** Is this a software implementation of the GPU? +- **IsSoftwareDevicg** No content is currently available. +- **KMDFilePath** The file path to the location of the Display Kernel Mode Driver in the Driver Store. +- **MeasureEnabled** Is the device listening to MICROSOFT_KEYWORD_MEASURES? +- **MsHybridDiscrete** Indicates whether the adapter is a discrete adapter in a hybrid configuration. +- **NumVidPnSources** The number of supported display output sources. +- **NumVidPnTargets** The number of supported display output targets. +- **SharedSystemMemoryB** The amount of system memory shared by GPU and CPU (in bytes). +- **SubSyste}ID** No content is currently available. +- **SubSystemID** The subsystem ID. +- **SubVendoeID** No content is currently available. +- **SubVendorID** The GPU sub vendor ID. +- **TelematryEnabled** No content is currently available. +- **TelemetryEnabled** Is the device listening to MICROSOFT_KEYWORD_TELEMETRY? +- **TelInvEvntTrigger** What triggered this event to be logged? Example: 0 (GPU enumeration) or 1 (DxgKrnlTelemetry provider toggling) +- **version** The event version. +- **WDDMVersion** The Windows Display Driver Model version. + + +## Failover Clustering events + +### Microsoft.Windows.Server.FailoverClusteringCritical.ClusterSummary2 + +This event returns information about how many resources and of what type are in the server cluster. This data is collected to keep Windows Server safe, secure, and up to date. The data includes information about whether hardware is configured correctly, if the software is patched correctly, and assists in preventing crashes by attributing issues (like fatal errors) to workloads and system configurations. + +The following fields are available: + +- **autoAssignSite** The cluster parameter: auto site. +- **autoBalancerLevel** The cluster parameter: auto balancer level. +- **autoBalancerMode** The cluster parameter: auto balancer mode. +- **blockCacheSize** The configured size of the block cache. +- **ClusterAdConfiguration** The ad configuration of the cluster. +- **clusterAdType** The cluster parameter: mgmt_point_type. +- **clusterDumpPolicy** The cluster configured dump policy. +- **clusterFunctionalLevel** The current cluster functional level. +- **clusterGuid** The unique identifier for the cluster. +- **clusterWitnessType** The witness type the cluster is configured for. +- **countNodesInSite** The number of nodes in the cluster. +- **crossSiteDelay** The cluster parameter: CrossSiteDelay. +- **crossSiteThreshold** The cluster parameter: CrossSiteThreshold. +- **crossSubnetDelay** The cluster parameter: CrossSubnetDelay. +- **crossSubnetThreshold** The cluster parameter: CrossSubnetThreshold. +- **csvCompatibleFilters** The cluster parameter: ClusterCsvCompatibleFilters. +- **csvIncompatibleFilters** The cluster parameter: ClusterCsvIncompatibleFilters. +- **csvResourceCount** The number of resources in the cluster. +- **currentNodeSite** The name configured for the current site for the cluster. +- **dasModeBusType** The direct storage bus type of the storage spaces. +- **downLevelNodeCount** The number of nodes in the cluster that are running down-level. +- **drainOnShutdown** Specifies whether a node should be drained when it is shut down. +- **dynamicQuorumEnabled** Specifies whether dynamic Quorum has been enabled. +- **enforcedAntiAffinity** The cluster parameter: enforced anti affinity. +- **genAppNames** The win32 service name of a clustered service. +- **genSvcNames** The command line of a clustered genapp. +- **hangRecoveryAction** The cluster parameter: hang recovery action. +- **hangTimeOut** Specifies the “hang time out” parameter for the cluster. +- **isCalabria** Specifies whether storage spaces direct is enabled. +- **isMixedMode** Identifies if the cluster is running with different version of OS for nodes. +- **isRunningDownLevel** Identifies if the current node is running down-level. +- **logLevel** Specifies the granularity that is logged in the cluster log. +- **logSize** Specifies the size of the cluster log. +- **lowerQuorumPriorityNodeId** The cluster parameter: lower quorum priority node ID. +- **minNeverPreempt** The cluster parameter: minimum never preempt. +- **minPreemptor** The cluster parameter: minimum preemptor priority. +- **netftIpsecEnabled** The parameter: netftIpsecEnabled. +- **NodeCount** The number of nodes in the cluster. +- **nodeId** The current node number in the cluster. +- **nodeResourceCounts** Specifies the number of node resources. +- **nodeResourceOnlineCounts** Specifies the number of node resources that are online. +- **numberOfSites** The number of different sites. +- **numNodesInNoSite** The number of nodes not belonging to a site. +- **plumbAllCrossSubnetRoutes** The cluster parameter: plumb all cross subnet routes. +- **preferredSite** The preferred site location. +- **privateCloudWitness** Specifies whether a private cloud witness exists for this cluster. +- **quarantineDuration** The quarantine duration. +- **quarantineThreshold** The quarantine threshold. +- **quorumArbitrationTimeout** In the event of an arbitration event, this specifies the quorum timeout period. +- **resiliencyLevel** Specifies the level of resiliency. +- **resourceCounts** Specifies the number of resources. +- **resourceTypeCounts** Specifies the number of resource types in the cluster. +- **resourceTypes** Data representative of each resource type. +- **resourceTypesPath** Data representative of the DLL path for each resource type. +- **sameSubnetDelay** The cluster parameter: same subnet delay. +- **sameSubnetThreshold** The cluster parameter: same subnet threshold. +- **secondsInMixedMode** The amount of time (in seconds) that the cluster has been in mixed mode (nodes with different operating system versions in the same cluster). +- **securityLevel** The cluster parameter: security level. +- **securityLevelForStorage** The cluster parameter: security level for storage. +- **sharedVolumeBlockCacheSize** Specifies the block cache size for shared for shared volumes. +- **shutdownTimeoutMinutes** Specifies the amount of time it takes to time out when shutting down. +- **upNodeCount** Specifies the number of nodes that are up (online). +- **useClientAccessNetworksForCsv** The cluster parameter: use client access networks for CSV. +- **vmIsolationTime** The cluster parameter: VM isolation time. +- **witnessDatabaseWriteTimeout** Specifies the timeout period for writing to the quorum witness database. + + +## Fault Reporting events + +### Microsoft.Windows.FaultReporting.AppCrashEvent + +This event sends data about crashes for both native and managed applications, to help keep Windows up to date. The data includes information about the crashing process and a summary of its exception record. It does not contain any Watson bucketing information. The bucketing information is recorded in a Windows Error Reporting (WER) event that is generated when the WER client reports the crash to the Watson service, and the WER event will contain the same ReportID (see field 14 of crash event, field 19 of WER event) as the crash event for the crash being reported. AppCrash is emitted once for each crash handled by WER (e.g. from an unhandled exception or FailFast or ReportException). Note that Generic Watson event types (e.g. from PLM) that may be considered crashes\" by a user DO NOT emit this event. + +The following fields are available: + +- **@ackageRelativeAppId** No content is currently available. +- **AppName** The name of the app that has crashed. +- **AppSeqsionGuid** No content is currently available. +- **AppSessionGuid** GUID made up of process ID and is used as a correlation vector for process instances in the telemetry backend. +- **AppTimeStamp** The date/time stamp of the app. +- **AppVersion** The version of the app that has crashed. +- **AptName** No content is currently available. +- **DargetAppId** No content is currently available. +- **ExceptionCode** The exception code returned by the process that has crashed. +- **ExceptionOffset** The address where the exception had occurred. +- **Flags** Flags indicating how reporting is done. For example, queue the report, do not offer JIT debugging, or do not terminate the process after reporting. +- **FriendlyAppName** The description of the app that has crashed, if different from the AppName. Otherwise, the process name. +- **IsFatal** True/False to indicate whether the crash resulted in process termination. +- **ModName** Exception module name (e.g. bar.dll). +- **ModNamevaultsv** No content is currently available. +- **ModTimeStamp** The date/time stamp of the module. +- **ModVersion** The version of the module that has crashed. +- **PackageFullName** Store application identity. +- **PackageRelaatieAppId** No content is currently available. +- **PackageRelativeAppId** Store application identity. +- **ProcessArchitecture** Architecture of the crashing process, as one of the PROCESSOR_ARCHITECTURE_* constants: 0: PROCESSOR_ARCHITECTURE_INTEL. 5: PROCESSOR_ARCHITECTURE_ARM. 9: PROCESSOR_ARCHITECTURE_AMD64. 12: PROCESSOR_ARCHITECTURE_ARM64. +- **ProcessCreateTime** The time of creation of the process that has crashed. +- **ProcessId** The ID of the process that has crashed. +- **ReportId** A GUID used to identify the report. This can used to track the report across Watson. +- **TargetAppId** The kernel reported AppId of the application being reported. +- **TargetAppVer** The specific version of the application being reported +- **TargetAsId** The sequence number for the hanging process. + + +## Feature update events + +### Microsoft.Windows.Upgrade.Uninstall.UninstallFinalizedAndRebootTriggered + +This event indicates that the uninstall was properly configured and that a system reboot was initiated. + + + +### Microsoft.Windows.Upgrade.Uninstall.UninstallGoBackButtonClicked + +This event sends basic metadata about the starting point of uninstalling a feature update, which helps ensure customers can safely revert to a well-known state if the update caused any problems. + + + +## Hang Reporting events + +### Microsoft.Windows.HangReporting.AppHangEvent + +This event sends data about hangs for both native and managed applications, to help keep Windows up to date. It does not contain any Watson bucketing information. The bucketing information is recorded in a Windows Error Reporting (WER) event that is generated when the WER client reports the hang to the Watson service, and the WER event will contain the same ReportID (see field 13 of hang event, field 19 of WER event) as the hang event for the hang being reported. AppHang is reported only on PC devices. It handles classic Win32 hangs and is emitted only once per report. Some behaviors that may be perceived by a user as a hang are reported by app managers (e.g. PLM/RM/EM) as Watson Generics and will not produce AppHang events. + +The following fields are available: + +- **AppName** The name of the app that has hung. +- **AppSessionGuid** GUID made up of process id used as a correlation vector for process instances in the telemetry backend. +- **AppVersion** The version of the app that has hung. +- **IsFatal** True/False based on whether the hung application caused the creation of a Fatal Hang Report. +- **PackageFullName** Store application identity. +- **PackageRelativeAppId** Store application identity. +- **ProcessArchitecture** Architecture of the hung process, as one of the PROCESSOR_ARCHITECTURE_* constants: 0: PROCESSOR_ARCHITECTURE_INTEL. 5: PROCESSOR_ARCHITECTURE_ARM. 9: PROCESSOR_ARCHITECTURE_AMD64. 12: PROCESSOR_ARCHITECTURE_ARM64. +- **ProcessCreateTime** The time of creation of the process that has hung. +- **ProcessId** The ID of the process that has hung. +- **ReportId** A GUID used to identify the report. This can used to track the report across Watson. +- **TargetAppId** The kernel reported AppId of the application being reported. +- **TargetAppVer** The specific version of the application being reported. +- **TargetAsId** The sequence number for the hanging process. +- **TypeCode** Bitmap describing the hang type. +- **WaitingOnAppName** If this is a cross process hang waiting for an application, this has the name of the application. +- **WaitingOnAppVersion** If this is a cross process hang, this has the version of the application for which it is waiting. +- **WaitingOnPackageFullName** If this is a cross process hang waiting for a package, this has the full name of the package for which it is waiting. +- **WaitingOnPackageRelativeAppId** If this is a cross process hang waiting for a package, this has the relative application id of the package. + + +## Inventory events + +### Microsoft.Windows.Inventory.Core.AmiTelCacheChecksum + +This event captures basic checksum data about the device inventory items stored in the cache for use in validating data completeness for Microsoft.Windows.Inventory.Core events. The fields in this event may change over time, but they will always represent a count of a given object. + +The following fields are available: + +- **Device** A count of device objects in cache. +- **DeviceCensus** A count of device census objects in cache. +- **DriverPackageExtended** A count of driverpackageextended objects in cache. +- **File** A count of file objects in cache. +- **FileSigningInfo** A count of file signing objects in cache. +- **Generic** A count of generic objects in cache. +- **HwItem** A count of hwitem objects in cache. +- **InventoryApplication** A count of application objects in cache. +- **InventoryApplicationAppV** A count of application AppV objects in cache. +- **InventoryApplicationDriver** A count of application driver objects in cache +- **InventoryApplicationFile** A count of application file objects in cache. +- **InventoryApplicationFramework** A count of application framework objects in cache +- **InventoryApplicationShortcut** A count of application shortcut objects in cache +- **InventoryDeviceContainer** A count of device container objects in cache. +- **InventoryDeviceInterface** A count of Plug and Play device interface objects in cache. +- **InventoryDeviceMediaClass** A count of device media objects in cache. +- **InventoryDevicePnp** A count of device Plug and Play objects in cache. +- **InventoryDeviceUsbHubClass** A count of device usb objects in cache +- **InventoryDriverBinary** A count of driver binary objects in cache. +- **InventoryDriverPackage** A count of device objects in cache. +- **InventoryMiscellaneousOfficeAddIn** A count of office add-in objects in cache +- **InventoryMiscellaneousOfficeAddInUsage** A count of office add-in usage objects in cache. +- **InventoryMiscellaneousOfficeIdentifiers** A count of office identifier objects in cache +- **InventoryMiscellaneousOfficeIESettings** A count of office ie settings objects in cache +- **InventoryMiscellaneousOfficeInsights** A count of office insights objects in cache +- **InventoryMiscellaneousOfficeProducts** A count of office products objects in cache +- **InventoryMiscellaneousOfficeSettings** A count of office settings objects in cache +- **InventoryMiscellaneousOfficeVBA** A count of office vba objects in cache +- **InventoryMiscellaneousOfficeVBARuleViolations** A count of office vba rule violations objects in cache +- **InventoryMiscellaneousUUPInfo** A count of uup info objects in cache +- **Metadata** A count of metadata objects in cache. +- **Orphan** A count of orphan file objects in cache. +- **Programs** A count of program objects in cache. + + +### Microsoft.Windows.Inventory.Core.AmiTelCacheFileInfo + +Diagnostic data about the inventory cache. + +The following fields are available: + +- **CacheFileSize** Size of the cache. +- **InventoryVersion** Inventory version of the cache. +- **TempCacheCount** Number of temp caches created. +- **TempCacheDeletedCount** Number of temp caches deleted. + + +### Microsoft.Windows.Inventory.Core.AmiTelCacheVersions + +This event sends inventory component versions for the Device Inventory data. + +The following fields are available: + +- **aeinv** The version of the App inventory component. +- **devinv** The file version of the Device inventory component. + + +### Microsoft.Windows.Inventory.Core.InventoryApplicationAdd + +This event sends basic metadata about an application on the system to help keep Windows up to date. + +This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedeviceinventorychange). + +The following fields are available: + +- **HiddenArp** Indicates whether a program hides itself from showing up in ARP. +- **InstallDate** The date the application was installed (a best guess based on folder creation date heuristics). +- **InstallDateArpLastModified** The date of the registry ARP key for a given application. Hints at install date but not always accurate. Passed as an array. Example: 4/11/2015 00:00:00 +- **InstallDateFromLinkFile** The estimated date of install based on the links to the files. Passed as an array. +- **InstallDateMsi** The install date if the application was installed via Microsoft Installer (MSI). Passed as an array. +- **InventoryVersion** The version of the inventory file generating the events. +- **Language** The language code of the program. +- **MsiPackageCode** A GUID that describes the MSI Package. Multiple 'Products' (apps) can make up an MsiPackage. +- **MsiProductCode** A GUID that describe the MSI Product. +- **Name** The name of the application. +- **OSVersionAtInstallTime** The four octets from the OS version at the time of the application's install. +- **PackageFullName** The package full name for a Store application. +- **ProgramInstanceId** A hash of the file IDs in an app. +- **Publisher** The Publisher of the application. Location pulled from depends on the 'Source' field. +- **RootDirPath** The path to the root directory where the program was installed. +- **Source** How the program was installed (for example, ARP, MSI, Appx). +- **StoreAppType** A sub-classification for the type of Microsoft Store app, such as UWP or Win8StoreApp. +- **Type** One of ("Application", "Hotfix", "BOE", "Service", "Unknown"). Application indicates Win32 or Appx app, Hotfix indicates app updates (KBs), BOE indicates it's an app with no ARP or MSI entry, Service indicates that it is a service. Application and BOE are the ones most likely seen. +- **Version** The version number of the program. + + +### Microsoft.Windows.Inventory.Core.InventoryApplicationDriverAdd + +This event represents what drivers an application installs. + +This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedeviceinventorychange). + +The following fields are available: + +- **InventoryVersion** The version of the inventory component. +- **ProgramIds** The unique program identifier the driver is associated with. + + +### Microsoft.Windows.Inventory.Core.InventoryApplicationDriverStartSync + +The InventoryApplicationDriverStartSync event indicates that a new set of InventoryApplicationDriverStartAdd events will be sent. + +This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedeviceinventorychange). + +The following fields are available: + +- **InventoryVersion** The version of the inventory component. + + +### Microsoft.Windows.Inventory.Core.InventoryApplicationFrameworkAdd + +This event provides the basic metadata about the frameworks an application may depend on. + +This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedeviceinventorychange). + +The following fields are available: + +- **FileId** A hash that uniquely identifies a file. +- **Frameworks** The list of frameworks this file depends on. +- **InventoryVersion** The version of the inventory file generating the events. + + +### Microsoft.Windows.Inventory.Core.InventoryApplicationFrameworkStartSync + +This event indicates that a new set of InventoryApplicationFrameworkAdd events will be sent. + +This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedeviceinventorychange). + +The following fields are available: + +- **InventoryVersion** The version of the inventory file generating the events. + + +### Microsoft.Windows.Inventory.Core.InventoryApplicationRemove + +This event indicates that a new set of InventoryDevicePnpAdd events will be sent. + +This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedeviceinventorychange). + +The following fields are available: + +- **InventoryVersion** The version of the inventory file generating the events. + + +### Microsoft.Windows.Inventory.Core.InventoryApplicationStartSync + +This event indicates that a new set of InventoryApplicationAdd events will be sent. + +This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedeviceinventorychange). + +The following fields are available: + +- **InventoryVersion** The version of the inventory file generating the events. + + +### Microsoft.Windows.Inventory.Core.InventoryDeviceContainerAdd + +This event sends basic metadata about a device container (such as a monitor or printer as opposed to a Plug and Play device) to help keep Windows up to date. + +This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedeviceinventorychange). + +The following fields are available: + +- **Categories** A comma separated list of functional categories in which the container belongs. +- **DiscoveryMethod** The discovery method for the device container. +- **FriendlyName** The name of the device container. +- **InventoryVersion** The version of the inventory file generating the events. +- **IsActive** Is the device connected, or has it been seen in the last 14 days? +- **IsConnected** For a physically attached device, this value is the same as IsPresent. For wireless a device, this value represents a communication link. +- **IsMachineContainer** Is the container the root device itself? +- **IsNetworked** Is this a networked device? +- **IsPaired** Does the device container require pairing? +- **Manufacturer** The manufacturer name for the device container. +- **ModelId** A unique model ID. +- **ModelName** The model name. +- **ModelNumber** The model number for the device container. +- **PrimaryCategory** The primary category for the device container. + + +### Microsoft.Windows.Inventory.Core.InventoryDeviceContainerRemove + +This event indicates that the InventoryDeviceContainer object is no longer present. + +This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedeviceinventorychange). + +The following fields are available: + +- **InventoryVersion** The version of the inventory file generating the events. + + +### Microsoft.Windows.Inventory.Core.InventoryDeviceContainerStartSync + +This event indicates that a new set of InventoryDeviceContainerAdd events will be sent. + +This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedeviceinventorychange). + +The following fields are available: + +- **InventoryVersion** The version of the inventory file generating the events. + + +### Microsoft.Windows.Inventory.Core.InventoryDeviceInterfaceAdd + +This event retrieves information about what sensor interfaces are available on the device. + +This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedeviceinventorychange). + +The following fields are available: + +- **Accelerometer3D** Indicates if an Accelerator3D sensor is found. +- **ActivityDetection** Indicates if an Activity Detection sensor is found. +- **AmbientLight** Indicates if an Ambient Light sensor is found. +- **Barometer** Indicates if a Barometer sensor is found. +- **Custom** Indicates if a Custom sensor is found. +- **EnergyMeter** Indicates if an Energy sensor is found. +- **FloorElevation** Indicates if a Floor Elevation sensor is found. +- **GeomagneticOrientation** Indicates if a Geo Magnetic Orientation sensor is found. +- **GravityVector** Indicates if a Gravity Detector sensor is found. +- **Gyrometer3D** Indicates if a Gyrometer3D sensor is found. +- **Humidity** Indicates if a Humidity sensor is found. +- **InventoryVersion** The version of the inventory file generating the events. +- **LinearAccelerometer** Indicates if a Linear Accelerometer sensor is found. +- **Magnetometer3D** Indicates if a Magnetometer3D sensor is found. +- **Orientation** Indicates if an Orientation sensor is found. +- **Pedometer** Indicates if a Pedometer sensor is found. +- **Proximity** Indicates if a Proximity sensor is found. +- **RelativeOrientation** Indicates if a Relative Orientation sensor is found. +- **SimpleDeviceOrientation** Indicates if a Simple Device Orientation sensor is found. +- **Temperature** Indicates if a Temperature sensor is found. + + +### Microsoft.Windows.Inventory.Core.InventoryDeviceInterfaceStartSync + +This event indicates that a new set of InventoryDeviceInterfaceAdd events will be sent. + +This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedeviceinventorychange). + +The following fields are available: + +- **InventoryVersion** The version of the inventory file generating the events. + + +### Microsoft.Windows.Inventory.Core.InventoryDeviceMediaClassAdd + +This event sends additional metadata about a Plug and Play device that is specific to a particular class of devices to help keep Windows up to date while reducing overall size of data payload. + +This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedeviceinventorychange). + +The following fields are available: + +- **audio.captureDriver** Audio device capture driver. Example: hdaudio.inf:db04a16ce4e8d6ee:HdAudModel:10.0.14887.1000:hdaudio\func_01 +- **audio.renderDriver** Audio device render driver. Example: hdaudio.inf:db04a16ce4e8d6ee:HdAudModel:10.0.14889.1001:hdaudio\func_01 +- **Audio_CaptureDriver** The Audio device capture driver endpoint. +- **Audio_RenderDriver** The Audio device render driver endpoint. +- **InventoryVersion** The version of the inventory file generating the events. + + +### Microsoft.Windows.Inventory.Core.InventoryDeviceMediaClassRemove + +This event indicates that the InventoryDeviceMediaClassRemove object is no longer present. + +This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedeviceinventorychange). + +The following fields are available: + +- **InventoryVersion** The version of the inventory file generating the events. + + +### Microsoft.Windows.Inventory.Core.InventoryDeviceMediaClassStartSync + +This event indicates that a new set of InventoryDeviceMediaClassSAdd events will be sent. + +This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedeviceinventorychange). + +The following fields are available: + +- **InventoryVersion** The version of the inventory file generating the events. + + +### Microsoft.Windows.Inventory.Core.InventoryDevicePnpAdd + +This event represents the basic metadata about a plug and play (PNP) device and its associated driver. + +This event includes fields from [Ms.Dedevi.DedeviInventoryChange](#msdedevidedeviinventorychange). + +The following fields are available: + +- **basedata** No content is currently available. See [basedata](#basedata). +- **BusReportedDescription** The description of the device reported by the bux. +- **Class** The device setup class of the driver loaded for the device. +- **ClassGuid** The device class unique identifier of the driver package loaded on the device. +- **COMPID** The list of “Compatible IDs” for this device. +- **COMPID.Count** No content is currently available. +- **ContainerId** The system-supplied unique identifier that specifies which group(s) the device(s) installed on the parent (main) device belong to. +- **Description** The description of the device. +- **DeviceInterfaceClasses** The device interfaces that this device implements. +- **DeviceState** Identifies the current state of the parent (main) device. +- **DriverId** The unique identifier for the installed driver. +- **DriverName** The name of the driver image file. +- **DriverPackageStrongName** The immediate parent directory name in the Directory field of InventoryDriverPackage. +- **DriverVerDate** The date associated with the driver installed on the device. +- **DriverVerVersion** The version number of the driver installed on the device. +- **Enumerator** Identifies the bus that enumerated the device. +- **ExtendedInfs** The extended INF file names. +- **HWID** A list of hardware IDs for the device. +- **HWID.Count** No content is currently available. +- **Inf** The name of the INF file (possibly renamed by the OS, such as oemXX.inf). +- **InstallState** The device installation state. For a list of values, see: https://msdn.microsoft.com/en-us/library/windows/hardware/ff543130.aspx +- **InventoryVersion** The version number of the inventory process generating the events. +- **LowerClassFilters** The identifiers of the Lower Class filters installed for the device. +- **LowerFilters** The identifiers of the Lower filters installed for the device. +- **Manufacturer** The manufacturer of the device. +- **MatchingID** The Hardware ID or Compatible ID that Windows uses to install a device instance. +- **Model** Identifies the model of the device. +- **ParentId** The Device Instance ID of the parent of the device. +- **ProblemCode** The error code currently returned by the device, if applicable. +- **Provider** Identifies the device provider. +- **Service** The name of the device service. +- **STACKID** The list of hardware IDs for the stack. +- **STACKID.Count** No content is currently available. +- **UpperClassFilters** The identifiers of the Upper Class filters installed for the device. +- **UpperFilters** The identifiers of the Upper filters installed for the device. + + +### Microsoft.Windows.Inventory.Core.InventoryDevicePnpRemove + +This event indicates that the InventoryDevicePnpRemove object is no longer present. + +This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedeviceinventorychange). + +The following fields are available: + +- **InventoryVersion** The version of the inventory file generating the events. + + +### Microsoft.Windows.Inventory.Core.InventoryDevicePnpStartSync + +This event indicates that a new set of InventoryDevicePnpAdd events will be sent. + +This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedeviceinventorychange). + +The following fields are available: + +- **InventoryVersion** The version of the inventory file generating the events. + + +### Microsoft.Windows.Inventory.Core.InventoryDeviceUsbHubClassAdd + +This event sends basic metadata about the USB hubs on the device. + +This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedeviceinventorychange). + +The following fields are available: + +- **InventoryVersion** The version of the inventory file generating the events. +- **TotalUserConnectablePorts** Total number of connectable USB ports. +- **TotalUserConnectableTypeCPorts** Total number of connectable USB Type C ports. + + +### Microsoft.Windows.Inventory.Core.InventoryDeviceUsbHubClassStartSync + +This event indicates that a new set of InventoryDeviceUsbHubClassAdd events will be sent. + +This event includes fields from [Ms.De~ice.DeviceInventoryChange](#msde~icedeviceinventorychange). + +The following fields are available: + +- **InventoryVersion** The version of the inventory file generating the events. + + +### Microsoft.Windows.Inventory.Core.InventoryDriverBinaryAdd + +This event provides the basic metadata about driver binaries running on the system. + +This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedeviceinventorychange). + +The following fields are available: + +- **DriverCheckSum** The checksum of the driver file. +- **DriverCompany** The company name that developed the driver. +- **DriverInBox** Is the driver included with the operating system? +- **DriverIsKernelMode** Is it a kernel mode driver? +- **DriverName** The file name of the driver. +- **DriverPackageStrongName** The strong name of the driver package +- **DriverSigned** The strong name of the driver package +- **DriverTimeStamp** The low 32 bits of the time stamp of the driver file. +- **DriverType** A bitfield of driver attributes: 1. define DRIVER_MAP_DRIVER_TYPE_PRINTER 0x0001. 2. define DRIVER_MAP_DRIVER_TYPE_KERNEL 0x0002. 3. define DRIVER_MAP_DRIVER_TYPE_USER 0x0004. 4. define DRIVER_MAP_DRIVER_IS_SIGNED 0x0008. 5. define DRIVER_MAP_DRIVER_IS_INBOX 0x0010. 6. define DRIVER_MAP_DRIVER_IS_WINQUAL 0x0040. 7. define DRIVER_MAP_DRIVER_IS_SELF_SIGNED 0x0020. 8. define DRIVER_MAP_DRIVER_IS_CI_SIGNED 0x0080. 9. define DRIVER_MAP_DRIVER_HAS_BOOT_SERVICE 0x0100. 10. define DRIVER_MAP_DRIVER_TYPE_I386 0x10000. 11. define DRIVER_MAP_DRIVER_TYPE_IA64 0x20000. 12. define DRIVER_MAP_DRIVER_TYPE_AMD64 0x40000. 13. define DRIVER_MAP_DRIVER_TYPE_ARM 0x100000. 14. define DRIVER_MAP_DRIVER_TYPE_THUMB 0x200000. 15. define DRIVER_MAP_DRIVER_TYPE_ARMNT 0x400000. 16. define DRIVER_MAP_DRIVER_IS_TIME_STAMPED 0x800000. +- **DriverVersion** The version of the driver file. +- **ImageSize** The size of the driver file. +- **Inf** The name of the INF file. +- **InventoryVersion** The version of the inventory file generating the events. +- **Product** The product name that is included in the driver file. +- **ProductVersio~** No content is currently available. +- **ProductVersion** The product version that is included in the driver file. +- **Service** The name of the service that is installed for the device. +- **WdfVersion** The Windows Driver Framework version. + + +### Microsoft.Windows.Inventory.Core.InventoryDriverBinaryRemove + +This event indicates that the InventoryDriverBinary object is no longer present. + +This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedeviceinventorychange). + +The following fields are available: + +- **InventoryVersion** The version of the inventory file generating the events. + + +### Microsoft.Windows.Inventory.Core.InventoryDriverBinaryStartSync + +This event indicates that a new set of InventoryDriverBinaryAdd events will be sent. + +This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedeviceinventorychange). + +The following fields are available: + +- **InventoryVersion** The version of the inventory file generating the events. + + +### Microsoft.Windows.Inventory.Core.InventoryDriverPackageAdd + +This event sends basic metadata about drive packages installed on the system to help keep Windows up to date. + +This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedeviceinventorychange). + +The following fields are available: + +- **Class** The class name for the device driver. +- **ClassGuid** The class GUID for the device driver. +- **Date** The driver package date. +- **Directory** The path to the driver package. +- **DriverInBox** Is the driver included with the operating system? +- **Inf** The INF name of the driver package. +- **InventoryVersion** The version of the inventory file generating the events. +- **Provider** The provider for the driver package. +- **SubmissionId** The HLK submission ID for the driver package. +- **Version** The version of the driver package. + + +### Microsoft.Windows.Inventory.Core.InventoryDriverPackageRemove + +This event indicates that the InventoryDriverPackageRemove object is no longer present. + +This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedeviceinventorychange). + +The following fields are available: + +- **InventoryVersion** The version of the inventory file generating the events. + + +### Microsoft.Windows.Inventory.Core.InventoryDriverPackageStartSync + +This event indicates that a new set of InventoryDriverPackageAdd events will be sent. + +This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedeviceinventorychange). + +The following fields are available: + +- **InventoryVersion** The version of the inventory file generating the events. + + +### Microsoft.Windows.Inventory.Core.StartUtcJsonTrace + +This event collects traces of all other Core events, not used in typical customer scenarios. This event signals the beginning of the event download, and that tracing should begin. + + + +### Microsoft.Windows.Inventory.Core.StopUtcJsonTrace + +This event collects traces of all other Core events, not used in typical customer scenarios. This event signals the end of the event download, and that tracing should end. + + + +### Microsoft.Windows.Inventory.General.AppHealthStaticAdd + +This event sends details collected for a specific application on the source device. + +The following fields are available: + +- **AhaVersion** The binary version of the App Health Analyzer tool. +- **ApplicationErrors** The count of application errors from the event log. +- **Bitness** The architecture type of the application (16 Bit or 32 bit or 64 bit). +- **device_level** Various JRE/JAVA versions installed on a particular device. +- **ExtendedProperties** Attribute used for aggregating all other attributes under this event type. +- **Jar** Flag to determine if an app has a Java JAR file dependency. +- **Jre** Flag to determine if an app has JRE framework dependency. +- **Jre_version** JRE versions an app has declared framework dependency for. +- **Name** Name of the application. +- **NonDPIAware** Flag to determine if an app is non-DPI aware. +- **NumBinaries** Count of all binaries (.sys,.dll,.ini) from application install location. +- **RequiresAdmin** Flag to determine if an app requests admin privileges for execution. +- **RequiresAdminv2** Additional flag to determine if an app requests admin privileges for execution. +- **RequiresUIAccess** Flag to determine if an app is based on UI features for accessibility. +- **VB6** Flag to determine if an app is based on VB6 framework. +- **VB6v2** Additional flag to determine if an app is based on VB6 framework. +- **Version** Version of the application. +- **VersionCheck** Flag to determine if an app has a static dependency on OS version. +- **VersionCheckv2** Additional flag to determine if an app has a static dependency on OS version. + + +### Microsoft.Windows.Inventory.General.AppHealthStaticStartSync + +This event indicates the beginning of a series of AppHealthStaticAdd events. + +The following fields are available: + +- **AllowTelemetry** Indicates the presence of the 'allowtelemetry' command line argument. +- **CommandLineArgs** Command line arguments passed when launching the App Health Analyzer executable. +- **Enhanced** Indicates the presence of the 'enhanced' command line argument. +- **StartTime** UTC date and time at which this event was sent. + + +### Microsoft.Windows.Inventory.General.InventoryMiscellaneousOfficeAddInAdd + +Provides data on the installed Office Add-ins. + +This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedeviceinventorychange). + +The following fields are available: + +- **AddinCLSID** The class identifier key for the Microsoft Office add-in. +- **AddInCLSID** The class identifier key for the Microsoft Office add-in. +- **AddInId** The identifier for the Microsoft Office add-in. +- **AddinType** The type of the Microsoft Office add-in. +- **BinFileTimestamp** The timestamp of the Office add-in. +- **BinFileVersion** The version of the Microsoft Office add-in. +- **Description** Description of the Microsoft Office add-in. +- **FileId** The file identifier of the Microsoft Office add-in. +- **FileSize** The file size of the Microsoft Office add-in. +- **FriendlyName** The friendly name for the Microsoft Office add-in. +- **FullPath** The full path to the Microsoft Office add-in. +- **InventoryVersion** The version of the inventory binary generating the events. +- **LoadBehavior** Integer that describes the load behavior. +- **LoadTime** Load time for the Office add-in. +- **OfficeApplication** The Microsoft Office application associated with the add-in. +- **OfficeArchitecture** The architecture of the add-in. +- **OfficeVersion** The Microsoft Office version for this add-in. +- **OutlookCrashingAddin** Indicates whether crashes have been found for this add-in. +- **ProductCompany** The name of the company associated with the Office add-in. +- **ProductName** The product name associated with the Microsoft Office add-in. +- **ProductVersion** The version associated with the Office add-in. +- **ProgramId** The unique program identifier of the Microsoft Office add-in. +- **Provider** Name of the provider for this add-in. + + +### Microsoft.Windows.Inventory.General.InventoryMiscellaneousOfficeAddInRemove + +Indicates that this particular data object represented by the objectInstanceId is no longer present. + +This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedeviceinventorychange). + +The following fields are available: + +- **InventoryVersion** The version of the inventory binary generating the events. + + +### Microsoft.Windows.Inventory.General.InventoryMiscellaneousOfficeAddInStartSync + +This event indicates that a new sync is being generated for this object type. + +This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedeviceinventorychange). + +The following fields are available: + +- **InventoryVersion** The version of the inventory binary generating the events. + + +### Microsoft.Windows.Inventory.General.InventoryMiscellaneousOfficeIdentifiersAdd + +Provides data on the Office identifiers. + +This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedeviceinventorychange). + +The following fields are available: + +- **InventoryVersion** The version of the inventory binary generating the events. +- **OAudienceData** Sub-identifier for Microsoft Office release management, identifying the pilot group for a device +- **OAudienceId** Microsoft Office identifier for Microsoft Office release management, identifying the pilot group for a device +- **OMID** Identifier for the Office SQM Machine +- **OPlatform** Whether the installed Microsoft Office product is 32-bit or 64-bit +- **OTenantId** Unique GUID representing the Microsoft O365 Tenant +- **OVersion** Installed version of Microsoft Office. For example, 16.0.8602.1000 +- **OWowMID** Legacy Microsoft Office telemetry identifier (SQM Machine ID) for WoW systems (32-bit Microsoft Office on 64-bit Windows) + + +### Microsoft.Windows.Inventory.General.InventoryMiscellaneousOfficeIdentifiersStartSync + +Diagnostic event to indicate a new sync is being generated for this object type. + +This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedeviceinventorychange). + +The following fields are available: + +- **InventoryVersion** The version of the inventory binary generating the events. + + +### Microsoft.Windows.Inventory.General.InventoryMiscellaneousOfficeIESettingsAdd + +Provides data on Office-related Internet Explorer features. + +This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedeviceinventorychange). + +The following fields are available: + +- **InventoryVersion** The version of the inventory binary generating the events. +- **OIeFeatureAddon** Flag indicating which Microsoft Office products have this setting enabled. The FEATURE_ADDON_MANAGEMENT feature lets applications hosting the WebBrowser Control to respect add-on management selections made using the Add-on Manager feature of Internet Explorer. Add-ons disabled by the user or by administrative group policy will also be disabled in applications that enable this feature. +- **OIeMachineLockdown** Flag indicating which Microsoft Office products have this setting enabled. When the FEATURE_LOCALMACHINE_LOCKDOWN feature is enabled, Internet Explorer applies security restrictions on content loaded from the user's local machine, which helps prevent malicious behavior involving local files. +- **OIeMimeHandling** Flag indicating which Microsoft Office products have this setting enabled. When the FEATURE_MIME_HANDLING feature control is enabled, Internet Explorer handles MIME types more securely. Only applies to Windows Internet Explorer 6 for Windows XP Service Pack 2 (SP2) +- **OIeMimeSniffing** Flag indicating which Microsoft Office products have this setting enabled. Determines a file's type by examining its bit signature. Windows Internet Explorer uses this information to determine how to render the file. The FEATURE_MIME_SNIFFING feature, when enabled, allows to be set differently for each security zone by using the URLACTION_FEATURE_MIME_SNIFFING URL action flag +- **OIeNoAxInstall** Flag indicating which Microsoft Office products have this setting enabled. When a webpage attempts to load or install an ActiveX control that isn't already installed, the FEATURE_RESTRICT_ACTIVEXINSTALL feature blocks the request. When a webpage tries to load or install an ActiveX control that isn't already installed, the FEATURE_RESTRICT_ACTIVEXINSTALL feature blocks the request +- **OIeNoDownload** Flag indicating which Microsoft Office products have this setting enabled. The FEATURE_RESTRICT_FILEDOWNLOAD feature blocks file download requests that navigate to a resource, that display a file download dialog box, or that are not initiated explicitly by a user action (for example, a mouse click or key press). Only applies to Windows Internet Explorer 6 for Windows XP Service Pack 2 (SP2) +- **OIeObjectCaching** Flag indicating which Microsoft Office products have this setting enabled. When enabled, the FEATURE_OBJECT_CACHING feature prevents webpages from accessing or instantiating ActiveX controls cached from different domains or security contexts +- **OIePasswordDisable** Flag indicating which Microsoft Office products have this setting enabled. After Windows Internet Explorer 6 for Windows XP Service Pack 2 (SP2), Internet Explorer no longer allows usernames and passwords to be specified in URLs that use the HTTP or HTTPS protocols. URLs using other protocols, such as FTP, still allow usernames and passwords +- **OIeSafeBind** Flag indicating which Microsoft Office products have this setting enabled. The FEATURE_SAFE_BINDTOOBJECT feature performs additional safety checks when calling MonikerBindToObject to create and initialize Microsoft ActiveX controls. Specifically, prevent the control from being created if COMPAT_EVIL_DONT_LOAD is in the registry for the control +- **OIeSecurityBand** Flag indicating which Microsoft Office products have this setting enabled. The FEATURE_SECURITYBAND feature controls the display of the Internet Explorer Information bar. When enabled, the Information bar appears when file download or code installation is restricted +- **OIeUncSaveCheck** Flag indicating which Microsoft Office products have this setting enabled. The FEATURE_UNC_SAVEDFILECHECK feature enables the Mark of the Web (MOTW) for local files loaded from network locations that have been shared by using the Universal Naming Convention (UNC) +- **OIeValidateUrl** Flag indicating which Microsoft Office products have this setting enabled. When enabled, the FEATURE_VALIDATE_NAVIGATE_URL feature control prevents Windows Internet Explorer from navigating to a badly formed URL +- **OIeWebOcPopup** Flag indicating which Microsoft Office products have this setting enabled. The FEATURE_WEBOC_POPUPMANAGEMENT feature allows applications hosting the WebBrowser Control to receive the default Internet Explorer pop-up window management behavior +- **OIeWinRestrict** Flag indicating which Microsoft Office products have this setting enabled. When enabled, the FEATURE_WINDOW_RESTRICTIONS feature adds several restrictions to the size and behavior of popup windows +- **OIeZoneElevate** Flag indicating which Microsoft Office products have this setting enabled. When enabled, the FEATURE_ZONE_ELEVATION feature prevents pages in one zone from navigating to pages in a higher security zone unless the navigation is generated by the user + + +### Microsoft.Windows.Inventory.General.InventoryMiscellaneousOfficeIESettingsStartSync + +Diagnostic event to indicate a new sync is being generated for this object type. + +This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedeviceinventorychange). + +The following fields are available: + +- **InventoryVersion** The version of the inventory binary generating the events. + + +### Microsoft.Windows.Inventory.General.InventoryMiscellaneousOfficeInsightsAdd + +This event provides insight data on the installed Office products + +This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedeviceinventorychange). + +The following fields are available: + +- **InventoryVersion** The version of the inventory binary generating the events. +- **OfficeApplication** The name of the Office application. +- **OfficeArchitecture** The bitness of the Office application. +- **OfficeVersion** The version of the Office application. +- **Value** The insights collected about this entity. + + +### Microsoft.Windows.Inventory.General.InventoryMiscellaneousOfficeInsightsRemove + +Indicates that this particular data object represented by the objectInstanceId is no longer present. + +This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedeviceinventorychange). + +The following fields are available: + +- **InventoryVersion** The version of the inventory binary generating the events. + + +### Microsoft.Windows.Inventory.General.InventoryMiscellaneousOfficeInsightsStartSync + +This diagnostic event indicates that a new sync is being generated for this object type. + +This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedeviceinventorychange). + +The following fields are available: + +- **InventoryVersion** The version of the inventory binary generating the events. + + +### Microsoft.Windows.Inventory.General.InventoryMiscellaneousOfficeProductsAdd + +Describes Office Products installed. + +This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedeviceinventorychange). + +The following fields are available: + +- **InventoryVersion** The version of the inventory binary generating the events. +- **OC2rApps** A GUID the describes the Office Click-To-Run apps +- **OC2rSkus** Comma-delimited list (CSV) of Office Click-To-Run products installed on the device. For example, Office 2016 ProPlus +- **OMsiApps** Comma-delimited list (CSV) of Office MSI products installed on the device. For example, Microsoft Word +- **OProductCodes** A GUID that describes the Office MSI products + + +### Microsoft.Windows.Inventory.General.InventoryMiscellaneousOfficeProductsStartSync + +Diagnostic event to indicate a new sync is being generated for this object type. + +This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedeviceinventorychange). + +The following fields are available: + +- **InventoryVersion** The version of the inventory binary generating the events. + + +### Microsoft.Windows.Inventory.General.InventoryMiscellaneousOfficeSettingsAdd + +This event describes various Office settings + +This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedeviceinventorychange). + +The following fields are available: + +- **BrowserFlags** Browser flags for Office-related products +- **ExchangeProviderFlags** Provider policies for Office Exchange +- **InventoryVersion** The version of the inventory binary generating the events. +- **SharedComputerLicensing** Office shared computer licensing policies + + +### Microsoft.Windows.Inventory.General.InventoryMiscellaneousOfficeSettingsStartSync + +Indicates a new sync is being generated for this object type. + +This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedeviceinventorychange). + +The following fields are available: + +- **InventoryVersion** The version of the inventory binary generating the events. + + +### Microsoft.Windows.Inventory.General.InventoryMiscellaneousOfficeVBAAdd + +This event provides a summary rollup count of conditions encountered while performing a local scan of Office files, analyzing for known VBA programmability compatibility issues between legacy office version and ProPlus, and between 32 and 64-bit versions + +This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedeviceinventorychange). + +The following fields are available: + +- **Design** Count of files with design issues found. +- **Design_x64** Count of files with 64 bit design issues found. +- **DuplicateVBA** Count of files with duplicate VBA code. +- **HasVBA** Count of files with VBA code. +- **Inaccessible** Count of files that were inaccessible for scanning. +- **InventoryVersion** The version of the inventory binary generating the events. +- **Issues** Count of files with issues detected. +- **Issues_x64** Count of files with 64-bit issues detected. +- **IssuesNone** Count of files with no issues detected. +- **IssuesNone_x64** Count of files with no 64-bit issues detected. +- **Locked** Count of files that were locked, preventing scanning. +- **NoVBA** Count of files with no VBA inside. +- **Protected** Count of files that were password protected, preventing scanning. +- **RemLimited** Count of files that require limited remediation changes. +- **RemLimited_x64** Count of files that require limited remediation changes for 64-bit issues. +- **RemSignificant** Count of files that require significant remediation changes. +- **RemSignificant_x64** Count of files that require significant remediation changes for 64-bit issues. +- **Score** Overall compatibility score calculated for scanned content. +- **Score_x64** Overall 64-bit compatibility score calculated for scanned content. +- **Total** Total number of files scanned. +- **Validation** Count of files that require additional manual validation. +- **Validation_x64** Count of files that require additional manual validation for 64-bit issues. + + +### Microsoft.Windows.Inventory.General.InventoryMiscellaneousOfficeVBARemove + +Indicates that this particular data object represented by the objectInstanceId is no longer present. + +This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedeviceinventorychange). + +The following fields are available: + +- **InventoryVersion** The version of the inventory binary generating the events. + + +### Microsoft.Windows.Inventory.General.InventoryMiscellaneousOfficeVBARuleViolationsAdd + +This event provides data on Microsoft Office VBA rule violations, including a rollup count per violation type, giving an indication of remediation requirements for an organization. The event identifier is a unique GUID, associated with the validation rule + +This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedeviceinventorychange). + +The following fields are available: + +- **Count** Count of total Microsoft Office VBA rule violations +- **InventoryVersion** The version of the inventory binary generating the events. + + +### Microsoft.Windows.Inventory.General.InventoryMiscellaneousOfficeVBARuleViolationsRemove + +Indicates that this particular data object represented by the objectInstanceId is no longer present. + +This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedeviceinventorychange). + +The following fields are available: + +- **InventoryVersion** The version of the inventory binary generating the events. + + +### Microsoft.Windows.Inventory.General.InventoryMiscellaneousOfficeVBARuleViolationsStartSync + +This event indicates that a new sync is being generated for this object type. + +This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedeviceinventorychange). + +The following fields are available: + +- **InventoryVersion** The version of the inventory binary generating the events. + + +### Microsoft.Windows.Inventory.General.InventoryMiscellaneousOfficeVBAStartSync + +Diagnostic event to indicate a new sync is being generated for this object type. + +This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedeviceinventorychange). + +The following fields are available: + +- **InventoryVersion** The version of the inventory binary generating the events. + + +### Microsoft.Windows.Inventory.General.InventoryMiscellaneousUUPInfoAdd + +Provides data on Unified Update Platform (UUP) products and what version they are at. + +This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedeviceinventorychange). + +The following fields are available: + +- **Identifier** UUP identifier +- **LastActivatedVersion** Last activated version +- **PreviousVersion** Previous version +- **Source** UUP source +- **Version** UUP version + + +### Microsoft.Windows.Inventory.General.InventoryMiscellaneousUUPInfoRemove + +Indicates that this particular data object represented by the objectInstanceId is no longer present. + +This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedeviceinventorychange). + + + +### Microsoft.Windows.Inventory.General.InventoryMiscellaneousUUPInfoStartSync + +Diagnostic event to indicate a new sync is being generated for this object type. + +This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedeviceinventorychange). + + + +### Microsoft.Windows.Inventory.Indicators.Checksum + +This event summarizes the counts for the InventoryMiscellaneousUexIndicatorAdd events. + +The following fields are available: + +- **CensusId** A unique hardware identifier. +- **ChecksumDictionary** A count of each operating system indicator. +- **PCFP** Equivalent to the InventoryId field that is found in other core events. + + +### Microsoft.Windows.Inventory.Indicators.InventoryMiscellaneousUexIndicatorAdd + +These events represent the basic metadata about the OS indicators installed on the system which are used for keeping the device up to date. + +This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedeviceinventorychange). + +The following fields are available: + +- **IndicatorValue** The indicator value. +- **Value** Describes an operating system indicator that may be relevant for the device upgrade. + + +### Microsoft.Windows.Inventory.Indicators.InventoryMiscellaneousUexIndicatorRemove + +This event is a counterpart to InventoryMiscellaneousUexIndicatorAdd that indicates that the item has been removed. + +This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedeviceinventorychange). + + + +### Microsoft.Windows.Inventory.Indicators.InventoryMiscellaneousUexIndicatorStartSync + +This event indicates that a new set of InventoryMiscellaneousUexIndicatorAdd events will be sent. + +This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedeviceinventorychange). + + + +## Kernel events + +### IO + +This event indicates the number of bytes read from or read by the OS and written to or written by the OS upon system startup. + +The following fields are available: + +- **BytesRead** The total number of bytes read from or read by the OS upon system startup. +- **BytesWritten** The total number of bytes written to or written by the OS upon system startup. +- **f** No content is currently available. See [f](#f). + + +### Microsoft.Windows.Kernel.BootEnvironment.OsLaunch + +OS information collected during Boot, used to evaluate the success of the upgrade process. + +The following fields are available: + +- **BootApplicationId** This field tells us what the OS Loader Application Identifier is. +- **BootAttemptCount** The number of consecutive times the boot manager has attempted to boot into this operating system. +- **BootSequence** The current Boot ID, used to correlate events related to a particular boot session. +- **BootStatusPolicy** Identifies the applicable Boot Status Policy. +- **BootType** Identifies the type of boot (e.g.: "Cold", "Hiber", "Resume"). +- **EventTimestamp** Seconds elapsed since an arbitrary time point. This can be used to identify the time difference in successive boot attempts being made. +- **FirmwareResetReasonEmbeddedController** Reason for system reset provided by firmware. +- **FirmwareResetReasonEmbeddedControllerAdditional** Additional information on system reset reason provided by firmware if needed. +- **FirmwareResetReasonPch** Reason for system reset provided by firmware. +- **FirmwareResetReasonPchAdditional** Additional information on system reset reason provided by firmware if needed. +- **FirmwareResetReasonSupplied** Flag indicating that a reason for system reset was provided by firmware. +- **IO** Amount of data written to and read from the disk by the OS Loader during boot. See [IO](#io). +- **LastBootSucceeded** Flag indicating whether the last boot was successful. +- **LastShutdownSucceeded** Flag indicating whether the last shutdown was successful. +- **MaxAbove4GbFreeRange** This field describes the largest memory range available above 4Gb. +- **MaxBelow4GbFreeRange** This field describes the largest memory range available below 4Gb. +- **MeasuredLaunchPrepared** This field tells us if the OS launch was initiated using Measured/Secure Boot over DRTM (Dynamic Root of Trust for Measurement). +- **MeasuredLaunchResume** This field tells us if Dynamic Root of Trust for Measurement (DRTM) was used when resuming from hibernation. +- **MenuPolicy** Type of advanced options menu that should be shown to the user (Legacy, Standard, etc.). +- **RecoveryEnabled** Indicates whether recovery is enabled. +- **SecureLaunchPrepared** This field indicates if DRTM was prepared during boot. +- **TcbLaunch** Indicates whether the Trusted Computing Base was used during the boot flow. +- **UserInputTime** The amount of time the loader application spent waiting for user input. + + +## Miracast events + +### Microsoft.Windows.Cast.Miracast.MiracastSessionEnd + +This event sends data at the end of a Miracast session that helps determine RTSP related Miracast failures along with some statistics about the session + +The following fields are available: + +- **AudioChannelCount** The number of audio channels. +- **AudioSampleRate** The sample rate of audio in terms of samples per second. +- **AudioSubtype** The unique subtype identifier of the audio codec (encoding method) used for audio encoding. +- **AverageBitrate** The average video bitrate used during the Miracast session, in bits per second. +- **AverageDataRate** The average available bandwidth reported by the WiFi driver during the Miracast session, in bits per second. +- **AveragePacketSendTimeInMs** The average time required for the network to send a sample, in milliseconds. +- **ConnectorType** The type of connector used during the Miracast session. +- **EncodeAverageTimeMS** The average time to encode a frame of video, in milliseconds. +- **EncodeCount** The count of total frames encoded in the session. +- **EncodeMaxTimeMS** The maximum time to encode a frame, in milliseconds. +- **EncodeMinTimeMS** The minimum time to encode a frame, in milliseconds. +- **EncoderCreationTimeInMs** The time required to create the video encoder, in milliseconds. +- **ErrorSource** Identifies the component that encountered an error that caused a disconnect, if applicable. +- **FirstFrameTime** The time (tick count) when the first frame is sent. +- **FirstLatencyMode** The first latency mode. +- **FrameAverageTimeMS** Average time to process an entire frame, in milliseconds. +- **FrameCount** The total number of frames processed. +- **FrameMaxTimeMS** The maximum time required to process an entire frame, in milliseconds. +- **FrameMinTimeMS** The minimum time required to process an entire frame, in milliseconds. +- **Glitches** The number of frames that failed to be delivered on time. +- **HardwareCursorEnabled** Indicates if hardware cursor was enabled when the connection ended. +- **HDCPState** The state of HDCP (High-bandwidth Digital Content Protection) when the connection ended. +- **HighestBitrate** The highest video bitrate used during the Miracast session, in bits per second. +- **HighestDataRate** The highest available bandwidth reported by the WiFi driver, in bits per second. +- **LastLatencyMode** The last reported latency mode. +- **LogTimeReference** The reference time, in tick counts. +- **LowestBitrate** The lowest video bitrate used during the Miracast session, in bits per second. +- **LowestDataRate** The lowest video bitrate used during the Miracast session, in bits per second. +- **MediaErrorCode** The error code reported by the media session, if applicable. +- **MiracastEntry** The time (tick count) when the Miracast driver was first loaded. +- **MiracastM1** The time (tick count) when the M1 request was sent. +- **MiracastM2** The time (tick count) when the M2 request was sent. +- **MiracastM3** The time (tick count) when the M3 request was sent. +- **MiracastM4** The time (tick count) when the M4 request was sent. +- **MiracastM5** The time (tick count) when the M5 request was sent. +- **MiracastM6** The time (tick count) when the M6 request was sent. +- **MiracastM7** The time (tick count) when the M7 request was sent. +- **MiracastSessionState** The state of the Miracast session when the connection ended. +- **MiracastStreaming** The time (tick count) when the Miracast session first started processing frames. +- **ProfileCount** The count of profiles generated from the receiver M4 response. +- **ProfileCountAfterFiltering** The count of profiles after filtering based on available bandwidth and encoder capabilities. +- **RefreshRate** The refresh rate set on the remote display. +- **RotationSupported** Indicates if the Miracast receiver supports display rotation. +- **RTSPSessionId** The unique identifier of the RTSP session. This matches the RTSP session ID for the receiver for the same session. +- **SessionGuid** The unique identifier of to correlate various Miracast events from a session. +- **SinkHadEdid** Indicates if the Miracast receiver reported an EDID. +- **SupportMicrosoftColorSpaceConversion** Indicates whether the Microsoft color space conversion for extra color fidelity is supported by the receiver. +- **SupportsMicrosoftDiagnostics** Indicates whether the Miracast receiver supports the Microsoft Diagnostics Miracast extension. +- **SupportsMicrosoftFormatChange** Indicates whether the Miracast receiver supports the Microsoft Format Change Miracast extension. +- **SupportsMicrosoftLatencyManagement** Indicates whether the Miracast receiver supports the Microsoft Latency Management Miracast extension. +- **SupportsMicrosoftRTCP** Indicates whether the Miracast receiver supports the Microsoft RTCP Miracast extension. +- **SupportsMicrosoftVideoFormats** Indicates whether the Miracast receiver supports Microsoft video format for 3:2 resolution. +- **SupportsWiDi** Indicates whether Miracast receiver supports Intel WiDi extensions. +- **TeardownErrorCode** The error code reason for teardown provided by the receiver, if applicable. +- **TeardownErrorReason** The text string reason for teardown provided by the receiver, if applicable. +- **UIBCEndState** Indicates whether UIBC was enabled when the connection ended. +- **UIBCEverEnabled** Indicates whether UIBC was ever enabled. +- **UIBCStatus** The result code reported by the UIBC setup process. +- **VideoBitrate** The starting bitrate for the video encoder. +- **VideoCodecLevel** The encoding level used for encoding, specific to the video subtype. +- **VideoHeight** The height of encoded video frames. +- **VideoSubtype** The unique subtype identifier of the video codec (encoding method) used for video encoding. +- **VideoWidth** The width of encoded video frames. +- **WFD2Supported** Indicates if the Miracast receiver supports WFD2 protocol. + + +## OneDrive events + +### Microsoft.OneDrive.Sync.Setup.APIOperation + +This event includes basic data about install and uninstall OneDrive API operations. + +The following fields are available: + +- **APIName** The name of the API. +- **Duration** How long the operation took. +- **IsSuccess** Was the operation successful? +- **ResultCode** The result code. +- **ScenarioName** The name of the scenario. + + +### Microsoft.OneDrive.Sync.Setup.EndExperience + +This event includes a success or failure summary of the installation. + +The following fields are available: + +- **APIName** The name of the API. +- **HResult** HResult of the operation +- **IsSuccess** Whether the operation is successful or not +- **ScenarioName** The name of the scenario. + + +### Microsoft.OneDrive.Sync.Setup.OSUpgradeInstallationOperation + +This event is related to the OS version when the OS is upgraded with OneDrive installed. + +The following fields are available: + +- **CurrentOneDriveVersion** The current version of OneDrive. +- **CurrentOSBuildBranch** The current branch of the operating system. +- **CurrentOSBuildNumber** The current build number of the operating system. +- **CurrentOSVersion** The current version of the operating system. +- **HResult** The HResult of the operation. +- **SourceOSBuildBranch** The source branch of the operating system. +- **SourceOSBuildNumber** The source build number of the operating system. +- **SourceOSVersion** The source version of the operating system. + + +### Microsoft.OneDrive.Sync.Setup.RegisterStandaloneUpdaterAPIOperation + +This event is related to registering or unregistering the OneDrive update task. + +The following fields are available: + +- **APIName** The name of the API. +- **IsSuccess** Was the operation successful? +- **RegisterNewTaskResult** The HResult of the RegisterNewTask operation. +- **ScenarioName** The name of the scenario. +- **UnregisterOldTaskResult** The HResult of the UnregisterOldTask operation. + + +### Microsoft.OneDrive.Sync.Updater.ComponentInstallState + +This event includes basic data about the installation state of dependent OneDrive components. + +The following fields are available: + +- **ComponentName** The name of the dependent component. +- **isInstalled** Is the dependent component installed? + + +### Microsoft.OneDrive.Sync.Updater.OverlayIconStatus + +This event indicates if the OneDrive overlay icon is working correctly. 0 = healthy; 1 = can be fixed; 2 = broken + +The following fields are available: + +- **32bit** The status of the OneDrive overlay icon on a 32-bit operating system. +- **64bit** The status of the OneDrive overlay icon on a 64-bit operating system. + + +### Microsoft.OneDrive.Sync.Updater.UpdateOverallResult + +This event sends information describing the result of the update. + +The following fields are available: + +- **hr** The HResult of the operation. +- **IsLoggingEnabled** Indicates whether logging is enabled for the updater. +- **UpdaterVersion** The version of the updater. + + +### Microsoft.OneDrive.Sync.Updater.UpdateXmlDownloadHResult + +This event determines the status when downloading the OneDrive update configuration file. + +The following fields are available: + +- **hr** The HResult of the operation. + + +### Microsoft.OneDrive.Sync.Updater.WebConnectionStatus + +This event determines the error code that was returned when verifying Internet connectivity. + +The following fields are available: + +- **winInetError** The HResult of the operation. + + +## Privacy consent logging events + +### Microsoft.Windows.Shell.PrivacyConsentLogging.PrivacyConsentCompleted + +This event is used to determine whether the user successfully completed the privacy consent experience. + +The following fields are available: + +- **presentationVersion** Which display version of the privacy consent experience the user completed +- **privacyConsentState** The current state of the privacy consent experience +- **settingsVersion** Which setting version of the privacy consent experience the user completed +- **userOobeExitReason** The exit reason of the privacy consent experience + + +### Microsoft.Windows.Shell.PrivacyConsentLogging.PrivacyConsentStatus + +Event tells us effectiveness of new privacy experience. + +The following fields are available: + +- **isAdmin** whether the person who is logging in is an admin +- **isExistingUser** whether the account existed in a downlevel OS +- **isLaunching** Whether or not the privacy consent experience will be launched +- **isSilentElevation** whether the user has most restrictive UAC controls +- **privacyConsentState** whether the user has completed privacy experience +- **userRegionCode** The current user's region setting + + +### wilActivity + +This event provides a Windows Internal Library context used for Product and Service diagnostics. + +The following fields are available: + +- **-149ngContextMessage** No content is currently available. +- **3645entContextName** No content is currently available. +- **379rentContextName** No content is currently available. +- **532rentContextName** No content is currently available. +- **677rentContextName** No content is currently available. +- **8108entContextName** No content is currently available. +- **8251entContextName** No content is currently available. +- **902rentContextName** No content is currently available. +- **9567ngContextMessage** No content is currently available. +- **9717ngContextMessage** No content is currently available. +- **callContext** The function where the failure occurred. +- **currentContextId** The ID of the current call context where the failure occurred. +- **currentContextMessage** The message of the current call context where the failure occurred. +- **currentContextMessaon** No content is currently available. +- **currentContextName** The name of the current call context where the failure occurred. +- **failureCount** The number of failures for this failure ID. +- **failureId** The ID of the failure that occurred. +- **failureType** The type of the failure that occurred. +- **fileName** The file name where the failure occurred. +- **functige** No content is currently available. +- **function** The function where the failure occurred. +- **hresult** The HResult of the overall activity. +- **lineNumber** The line number where the failure occurred. +- **message** The message of the failure that occurred. +- **module** The module where the failure occurred. +- **ori1-0467ngContextMessage** No content is currently available. +- **ori1-1210ngContextMessage** No content is currently available. +- **ori1143-7ngContextMessage** No content is currently available. +- **ori1-1945ngContextMessage** No content is currently available. +- **ori13s090ngContextMessage** No content is currently available. +- **ori1-4671entContextName** No content is currently available. +- **ori1-5108ngContextMessage** No content is currently available. +- **ori1-5686ngContextMessage** No content is currently available. +- **ori1n:667ngContextMessage** No content is currently available. +- **ori1n8488ngContextMessage** No content is currently available. +- **ori1-s4o5ngContextMessage** No content is currently available. +- **ori808467ngContextMessage** No content is currently available. +- **originatingContextId** The ID of the originating call context that resulted in the failure. +- **originatingContextMessage** The message of the originating call context that resulted in the failure. +- **originatingContextName** The name of the originating call context that resulted in the failure. +- **threadId** The ID of the thread on which the activity is executing. + + +## Sediment events + +### Microsoft.Windows.Sediment.Info.DetailedState + +This event is sent when detailed state information is needed from an update trial run. + +The following fields are available: + +- **Data** Data relevant to the state, such as what percent of disk space the directory takes up. +- **Id** Identifies the trial being run, such as a disk related trial. +- **ReleaseVer** The version of the component. +- **State** The state of the reporting data from the trial, such as the top-level directory analysis. +- **Time** The time the event was fired. + + +### Microsoft.Windows.Sediment.Info.Error + +This event indicates an error in the updater payload. This information assists in keeping Windows up to date. + +The following fields are available: + +- **FailureType** The type of error encountered. +- **FileName** The code file in which the error occurred. +- **HResult** The failure error code. +- **LineNumber** The line number in the code file at which the error occurred. +- **ReleaseVer** The version information for the component in which the error occurred. +- **Time** The system time at which the error occurred. + + +### Microsoft.Windows.Sediment.Info.PhaseChange + +The event indicates progress made by the updater. This information assists in keeping Windows up to date. + +The following fields are available: + +- **NewPhase** The phase of progress made. +- **ReleaseVer** The version information for the component in which the change occurred. +- **Time** The system time at which the phase chance occurred. + + +## Setup events + +### SetupPlatformTel.SetupPlatformTelActivityEvent + +This event sends basic metadata about the SetupPlatform update installation process, to help keep Windows up to date. + +The following fields are available: + +- **FieldName** Retrieves the event name/data point. Examples: InstallStartTime, InstallEndtime, OverallResult etc. +- **GroupName** Retrieves the groupname the event belongs to. Example: Install Information, DU Information, Disk Space Information etc. +- **Value** Value associated with the corresponding event name. For example, time-related events will include the system time + + +### SetupPlatformTel.SetupPlatformTelActivityStarted + +This event sends basic metadata about the update installation process generated by SetupPlatform to help keep Windows up to date. + +The following fields are available: + +- **Name** The name of the dynamic update type. Example: GDR driver + + +### SetupPlatformTel.SetupPlatformTelActivityStopped + +This event sends basic metadata about the update installation process generated by SetupPlatform to help keep Windows up to date. + + + +### SetupPlatformTel.SetupPlatformTelEvent + +This service retrieves events generated by SetupPlatform, the engine that drives the various deployment scenarios. + +The following fields are available: + +- **Falue** No content is currently available. +- **FieldName** Retrieves the event name/data point. Examples: InstallStartTime, InstallEndtime, OverallResult etc. +- **GroupName** Retrieves the groupname the event belongs to. Example: Install Information, DU Information, Disk Space Information etc. +- **Value** Retrieves the value associated with the corresponding event name (Field Name). For example: For time related events this will include the system time. + + +## Software update events + +### SoftwareUpdateClientTelemetry.CheckForUpdates + +Scan process event on Windows Update client. See the EventScenario field for specifics (started/failed/succeeded). + +The following fields are available: + +- **ActivityMatchingId** Contains a unique ID identifying a single CheckForUpdates session from initialization to completion. +- **AllowCachedResults** Indicates if the scan allowed using cached results. +- **ApplicableUpdateInfo** Metadata for the updates which were detected as applicable +- **BiosFamily** The family of the BIOS (Basic Input Output System). +- **BiosName** The name of the device BIOS. +- **BiosReleaseDate** The release date of the device BIOS. +- **BiosSKUNumber** The sku number of the device BIOS. +- **BIOSVendor** The vendor of the BIOS. +- **BiosVersion** The version of the BIOS. +- **BranchReadinessLevel** The servicing branch configured on the device. +- **CachedEngineVersion** For self-initiated healing, the version of the SIH engine that is cached on the device. If the SIH engine does not exist, the value is null. +- **CallerApplicationName** The name provided by the caller who initiated API calls into the software distribution client. +- **CapabilityDetectoidGuid** The GUID for a hardware applicability detectoid that could not be evaluated. +- **CDNCountryCode** Two letter country abbreviation for the Content Distribution Network (CDN) location. +- **CDNId** The unique identifier of a specific device, used to identify how many devices are encountering success or a particular issue. +- **ClientVersion** The version number of the software distribution client. +- **CommonProps** A bitmask for future flags associated with the Windows Update client behavior. No data is currently reported in this field. Expected value for this field is 0. +- **Context** Gives context on where the error has occurred. Example: AutoEnable, GetSLSData, AddService, Misc, or Unknown +- **CurrentMobileOperator** The mobile operator the device is currently connected to. +- **DeferralPolicySources** Sources for any update deferral policies defined (GPO = 0x10, MDM = 0x100, Flight = 0x1000, UX = 0x10000). +- **DeferredUpdates** Update IDs which are currently being deferred until a later time +- **DeviceModel** What is the device model. +- **DriverError** The error code hit during a driver scan. This is 0 if no error was encountered. +- **DriverExclusionPolicy** Indicates if the policy for not including drivers with Windows Update is enabled. +- **DriverSyncPassPerformed** Were drivers scanned this time? +- **EventInstanceID** A globally unique identifier for event instance. +- **EventScenario** Indicates the purpose of sending this event - whether because the software distribution just started checking for content, or whether it was cancelled, succeeded, or failed. +- **ExtendedetadataICabUrl** No content is currently available. +- **ExtendedMetadataCabUrl** Hostname that is used to download an update. +- **ExtendedStatusCode** Secondary error code for certain scenarios where StatusCode wasn't specific enough. +- **FailedUpdateGuids** The GUIDs for the updates that failed to be evaluated during the scan. +- **FailedUpdatesCount** The number of updates that failed to be evaluated during the scan. +- **FeatureUpdateDeferral** The deferral period configured for feature OS updates on the device (in days). +- **FeatureUpdatePause** Indicates whether feature OS updates are paused on the device. +- **FeatureUpdatePausePeriod** The pause duration configured for feature OS updates on the device (in days). +- **FlightBranch** The branch that a device is on if participating in flighting (pre-release builds). +- **FlightRing** The ring (speed of getting builds) that a device is on if participating in flighting (pre-release builds). +- **HomeMobileOperator** The mobile operator that the device was originally intended to work with. +- **IntentPFNs** Intended application-set metadata for atomic update scenarios. +- **IPVersion** Indicates whether the download took place over IPv4 or IPv6 +- **IsWUfBDualScanEnabled** Indicates if Windows Update for Business dual scan is enabled on the device. +- **IsWUfBEnabled** Indicates if Windows Update for Business is enabled on the device. +- **IsWUfBFederatedScanDisabled** Indicates if Windows Update for Business federated scan is disabled on the device. +- **MetadataIntegrityMode** The mode of the update transport metadata integrity check. 0-Unknown, 1-Ignoe, 2-Audit, 3-Enforce +- **MSIError** The last error that was encountered during a scan for updates. +- **NetworkConnectivityDetected** Indicates the type of network connectivity that was detected. 0 - IPv4, 1 - IPv6 +- **NumberOfApplicableUpdates** The number of updates which were ultimately deemed applicable to the system after the detection process is complete +- **NumberOfApplicationsCategoryScanEvaluated** The number of categories (apps) for which an app update scan checked +- **NumberOfLoop** The number of round trips the scan required +- **NumberOfNewUpdatesFromServiceSync** The number of updates which were seen for the first time in this scan +- **NumberOfUpdatesEvaluated** The total number of updates which were evaluated as a part of the scan +- **NumFailedetadataISignatures** No content is currently available. +- **NumFailedMetadataSignatures** The number of metadata signatures checks which failed for new metadata synced down. +- **Online** Indicates if this was an online scan. +- **PausedUpdates** A list of UpdateIds which that currently being paused. +- **PauseFeatureUpdatesEndTime** If feature OS updates are paused on the device, this is the date and time for the end of the pause time window. +- **PauseFeatureUpdatesStartTime** If feature OS updates are paused on the device, this is the date and time for the beginning of the pause time window. +- **PauseQualityUpdatesEndTime** If quality OS updates are paused on the device, this is the date and time for the end of the pause time window. +- **PauseQualityUpdatesStartTime** If quality OS updates are paused on the device, this is the date and time for the beginning of the pause time window. +- **PhonePreviewEnabled** Indicates whether a phone was getting preview build, prior to flighting (pre-release builds) being introduced. +- **ProcessName** The process name of the caller who initiated API calls, in the event where CallerApplicationName was not provided. +- **QualityUpdateDeferral** The deferral period configured for quality OS updates on the device (in days). +- **QualityUpdatePause** Indicates whether quality OS updates are paused on the device. +- **QualityUpdatePausePeriod** The pause duration configured for quality OS updates on the device (in days). +- **RelatedCV** The previous Correlation Vector that was used before swapping with a new one +- **ScanDurationInSeconds** The number of seconds a scan took +- **ScanEnqueueTime** The number of seconds it took to initialize a scan +- **ScanProps** This is a 32-bit integer containing Boolean properties for a given Windows Update scan. The following bits are used; all remaining bits are reserved and set to zero. Bit 0 (0x1): IsInteractive - is set to 1 if the scan is requested by a user, or 0 if the scan is requested by Automatic Updates. Bit 1 (0x2): IsSeeker - is set to 1 if the Windows Update client's Seeker functionality is enabled. Seeker functionality is enabled on certain interactive scans, and results in the scans returning certain updates that are in the initial stages of release (not yet released for full adoption via Automatic Updates). +- **ServiceGuid** An ID which represents which service the software distribution client is checking for content (Windows Update, Microsoft Store, etc.). +- **ServiceUrl** The environment URL a device is configured to scan with +- **ShippingMobileOperator** The mobile operator that a device shipped on. +- **StatusCode** Indicates the result of a CheckForUpdates event (success, cancellation, failure code HResult). +- **SyncType** Describes the type of scan the event was +- **SystemBIOSMajorRelease** Major version of the BIOS. +- **SystemBIOSMinorRelease** Minor version of the BIOS. +- **TargetMetadataVersion** For self-initiated healing, this is the target version of the SIH engine to download (if needed). If not, the value is null. +- **TotalNumetadataISignatures** No content is currently available. +- **TotalNumMetadataSignatures** The total number of metadata signatures checks done for new metadata that was synced down. +- **WebServiceRetryMethods** Web service method requests that needed to be retried to complete operation. +- **WUDeviceID** The unique identifier of a specific device, used to identify how many devices are encountering success or a particular issue. + + +### SoftwareUpdateClientTelemetry.Commit + +This event tracks the commit process post the update installation when software update client is trying to update the device. + +The following fields are available: + +- **BiosFamily** Device family as defined in the system BIOS +- **BiosName** Name of the system BIOS +- **BiosReleaseDate** Release date of the system BIOS +- **BiosSKUNumber** Device SKU as defined in the system BIOS +- **BIOSVendor** Vendor of the system BIOS +- **BiosVersion** Version of the system BIOS +- **BundleId** Identifier associated with the specific content bundle; should not be all zeros if the bundleID was found. +- **BundleRevisionNumbe2** No content is currently available. +- **BundleRevisionNumber** Identifies the revision number of the content bundle +- **CallerApplicationName** Name provided by the caller who initiated API calls into the software distribution client +- **ClientVersion** Version number of the software distribution client +- **DeploymentProviderMode** The mode of operation of the update deployment provider. +- **DeviceModel** Device model as defined in the system bios +- **EventInstanceID** A globally unique identifier for event instance +- **EventScenario** Indicates the purpose of the event - whether because scan started, succeded, failed, etc. +- **EventType** Possible values are "Child", "Bundle", "Relase" or "Driver". +- **FlightId** The specific id of the flight the device is getting +- **HandlerType** Indicates the kind of content (app, driver, windows patch, etc.) +- **RevisionNumber** Identifies the revision number of this specific piece of content +- **ServiceGuid** Identifier for the service to which the software distribution client is connecting (Windows Update, Windows Store, etc) +- **SystemBIOSMajorRelease** Major release version of the system bios +- **SystemBIOSMinorRelease** Minor release version of the system bios +- **UpdateId** Identifier associated with the specific piece of content +- **WUDeviceID** Unique device id controlled by the software distribution client + + +### SoftwareUpdateClientTelemetry.Download + +Download process event for target update on Windows Update client. See the EventScenario field for specifics (started/failed/succeeded). + +The following fields are available: + +- **ActiveDownloadTime** How long the download took, in seconds, excluding time where the update wasn't actively being downloaded. +- **AppXBlockHalhFailures** No content is currently available. +- **AppXBlockHashFailures** Indicates the number of blocks that failed hash validation during download of the app payload. +- **AppXBlockHashValidationFailureCount** A count of the number of blocks that have failed validation after being downloaded. +- **AppXBoockHashFailures** No content is currently available. +- **AppXDownloadScope** Indicates the scope of the download for application content. +- **AppXScope** Indicates the scope of the app download. +- **AppXScopr** No content is currently available. +- **B}ndleId** No content is currently available. +- **BiosFamily** The family of the BIOS (Basic Input Output System). +- **BiosName** The name of the device BIOS. +- **BiosReleaseDate** The release date of the device BIOS. +- **BiosSKUNumber** The sku number of the device BIOS. +- **BIOSVendor** The vendor of the BIOS. +- **BiosVersion** The version of the BIOS. +- **BundleBytesDownloaded** Number of bytes downloaded for the specific content bundle. +- **BundleId** Identifier associated with the specific content bundle. +- **BundleRepeatFailCoqnt** No content is currently available. +- **BundleRepeatFailCoun.** No content is currently available. +- **BundleRepeatFailCount** Indicates whether this particular update bundle has previously failed. +- **BundleRepeatFailFlag** Indicates whether this particular update bundle previously failed to download. +- **BundleRevisionNumber** Identifies the revision number of the content bundle. +- **BytesDownloaded** Number of bytes that were downloaded for an individual piece of content (not the entire bundle). +- **BytesDownnoaded** No content is currently available. +- **C`llerApplicationName** No content is currently available. +- **CachedEngineVersion** The version of the “Self-Initiated Healing” (SIH) engine that is cached on the device, if applicable. +- **CallerApplicationname** No content is currently available. +- **CallerApplicationName** The name provided by the application that initiated API calls into the software distribution client. +- **CalLerApplicationName** No content is currently available. +- **CallerApplictionaName** No content is currently available. +- **CbsDownloadMethod** Indicates whether the download was a full- or a partial-file download. +- **CbsMethod** The method used for downloading the update content related to the Component Based Servicing (CBS) technology. +- **CDNCotntryCode** No content is currently available. +- **CDNCoun.ryCdel** No content is currently available. +- **CDNCoundryCode** No content is currently available. +- **CDNCountryCode** Two letter country abbreviation for the Content Distribution Network (CDN) location. +- **CDNd** No content is currently available. +- **CDNId** ID which defines which CDN the software distribution client downloaded the content from. +- **ClientVersion** The version number of the software distribution client. +- **CommonProps** A bitmask for future flags associated with the Windows Update client behavior. +- **ConnectTime** Indicates the cumulative amount of time (in seconds) it took to establish the connection for all updates in an update bundle. +- **CtatusCode** No content is currently available. +- **CurrentMobileOperator** The mobile operator the device is currently connected to. +- **DeviceModel** The model of the device. +- **DownhoadProps** No content is currently available. +- **DownloadPriority** Indicates whether a download happened at background, normal, or foreground priority. +- **DownloadProps** Information about the download operation properties in the form of a bitmask. +- **DownloadType** Differentiates the download type of “Self-Initiated Healing” (SIH) downloads between Metadata and Payload downloads. +- **DownloedPriority** No content is currently available. +- **DventInstanceID** No content is currently available. +- **e:4|SInstanceID** No content is currently available. +- **e:4|SScenario** No content is currently available. +- **E:4|State** No content is currently available. +- **EöentInstanceID** No content is currently available. +- **Eve.tScenario** No content is currently available. +- **EventInst.9ceID** No content is currently available. +- **EventInstanceID** A globally unique identifier for event instance. +- **EventInstAnceID** No content is currently available. +- **EventPype** No content is currently available. +- **EventScanario** No content is currently available. +- **eventScenario** No content is currently available. +- **EventScenario** Indicates the purpose for sending this event: whether because the software distribution just started downloading content; or whether it was cancelled, succeeded, or failed. +- **EventType** Identifies the type of the event (Child, Bundle, or Driver). +- **EventTypr** No content is currently available. +- **ExtendedStatusCode** Secondary error code for certain scenarios where StatusCode wasn't specific enough. +- **ExtendedtartusCdel** No content is currently available. +- **FeatureUpdatePaser** No content is currently available. +- **FeatureUpdatePause** Indicates whether feature OS updates are paused on the device. +- **Fli.c9BuildNumber** No content is currently available. +- **Fli.c9Id** No content is currently available. +- **FlightBranch** The branch that a device is on if participating in flighting (pre-release builds). +- **FlightBuildNumber** If this download was for a flight (pre-release build), this indicates the build number of that flight. +- **FlightId** The specific ID of the flight (pre-release build) the device is getting. +- **FlightRing** The ring (speed of getting builds) that a device is on if participating in flighting (pre-release builds). +- **HandlerType** Indicates what kind of content is being downloaded (app, driver, windows patch, etc.). +- **HardwareId** If this download was for a driver targeted to a particular device model, this ID indicates the model of the device. +- **HomeMobileOperator** The mobile operator that the device was originally intended to work with. +- **HospName** No content is currently available. +- **HostName** The hostname URL the content is downloading from. +- **Hst.Name** No content is currently available. +- **IPVersion** Indicates whether the download took place over IPv4 or IPv6. +- **IsDependentSet** Indicates whether a driver is a part of a larger System Hardware/Firmware Update +- **IsWQfBEnabled** No content is currently available. +- **IsWUfBDualCcanEnabled** No content is currently available. +- **IsWUfBdualScanEnabled** No content is currently available. +- **IsWUfBDualScanEnabled** Indicates if Windows Update for Business dual scan is enabled on the device. +- **IsWUfBEnablad** No content is currently available. +- **IsWUfBEnabled** Indicates if Windows Update for Business is enabled on the device. +- **NetworkCost** A flag indicating the cost of the network (congested, fixed, variable, over data limit, roaming, etc.) used for downloading the update content. +- **NetworkCostBitMask** Indicates what kind of network the device is connected to (roaming, metered, over data cap, etc.) +- **NetworkCst.** No content is currently available. +- **NetworkRestrictionStatus** More general version of NetworkCostBitMask, specifying whether Windows considered the current network to be "metered." +- **NetworkRestrictiontartus** No content is currently available. +- **oadPriority** No content is currently available. +- **PackageFullName** The package name of the content. +- **PegulationResult** No content is currently available. +- **PhonePreviewEnabled** Indicates whether a phone was opted-in to getting preview builds, prior to flighting (pre-release builds) being introduced. +- **PostDnldDime** No content is currently available. +- **PostDnldTime** Time (in seconds) taken to signal download completion after the last job completed downloading the payload. +- **ProcessName** The process name of the application that initiated API calls, in the event where CallerApplicationName was not provided. +- **Pst.DnldTime** No content is currently available. +- **PvocessName** No content is currently available. +- **QpdateId** No content is currently available. +- **QualityreUpdaPause** No content is currently available. +- **QualityUpdatePa}se** No content is currently available. +- **QualityUpdatePaser** No content is currently available. +- **QualityUpdatePatse** No content is currently available. +- **QualityUpdatePausa** No content is currently available. +- **QualityUpdatePause** Indicates whether quality OS updates are paused on the device. +- **RdvisionNumber** No content is currently available. +- **Reason** A 32-bit integer representing the reason the update is blocked from being downloaded in the background. +- **ReguiationResult** No content is currently available. +- **RegulationReason** The reason that the update is regulated +- **regulationResult** No content is currently available. +- **RegulationResult** The result code (HResult) of the last attempt to contact the regulation web service for download regulation of update content. +- **RegulatIonResult** No content is currently available. +- **ReiatedCV** No content is currently available. +- **RelatedCS** No content is currently available. +- **RelatedCV** The Correlation Vector that was used before the most recent change to a new Correlation Vector. +- **RelntedCV** No content is currently available. +- **RepeatFailCoun.** No content is currently available. +- **RepeatFailCount** Indicates whether this specific content has previously failed. +- **RepeatFailFlag** Indicates whether this specific content previously failed to download. +- **RevisionNumber** The revision number of the specified piece of content. +- **SericeCGuid** No content is currently available. +- **ServiceGuid** A unique identifier for the service that the software distribution client is installing content for (Windows Update, Windows Store, etc.). +- **Setup360Phase** Identifies the active phase of the upgrade download if the current download is for an Operating System upgrade. +- **ShippingMobileOperator** The mobile operator linked to the device when the device shipped. +- **SizeCalcTime** Time (in seconds) taken to calculate the total download size of the payload. +- **StatusCode** Indicates the result of a Download event (success, cancellation, failure code HResult). +- **SystemBIOSMajorRelease** Major version of the BIOS. +- **SystemBIOSMinorRelease** Minor version of the BIOS. +- **TargetGroupId** For drivers targeted to a specific device model, this ID indicates the distribution group of devices receiving that driver. +- **TargetingVersion** For drivers targeted to a specific device model, this is the version number of the drivers being distributed to the device. +- **TargetMetadataVersion** The version of the currently downloading (or most recently downloaded) package. +- **tartusCdel** No content is currently available. +- **ThrottlingServiceHResult** Result code (success/failure) while contacting a web service to determine whether this device should download content yet. +- **TimeToEstablishConnection** Time (in milliseconds) it took to establish the connection prior to beginning downloaded. +- **tizeCalcTime** No content is currently available. +- **TotalExpectedBytes** The total size (in Bytes) expected to be downloaded. +- **Upda|eImportance** No content is currently available. +- **UpdateId** An identifier associated with the specific piece of content. +- **UpdateID** An identifier associated with the specific piece of content. +- **UpdateImporEvent** No content is currently available. +- **UpdateImpornstan** No content is currently available. +- **UpdateImport.9ce** No content is currently available. +- **UpdateImportance** Indicates whether the content was marked as Important, Recommended, or Optional. +- **Use** No content is currently available. +- **UsedDO** Indicates whether the download used the Delivery Optimization (DO) service. +- **UsedSystemVolume** Indicates whether the content was downloaded to the device's main system storage drive, or an alternate storage drive. +- **WUDericeID** No content is currently available. +- **WUDeviceId** No content is currently available. +- **WUDeviceID** The unique identifier of a specific device, used to identify how many devices are encountering success or a particular issue. +- **WUDviceCID** No content is currently available. + + +### SoftwareUpdateClientTelemetry.DownloadCheckpoint + +This event provides a checkpoint between each of the Windows Update download phases for UUP content + +The following fields are available: + +- **CallerApplicationName** The name provided by the caller who initiated API calls into the software distribution client +- **ClientVersion** The version number of the software distribution client +- **EventScenario** Indicates the purpose of sending this event - whether because the software distribution just started checking for content, or whether it was cancelled, succeeded, or failed +- **EventType** Possible values are "Child", "Bundle", "Relase" or "Driver" +- **ExtendedStatusCode** Secondary error code for certain scenarios where StatusCode wasn't specific enough +- **FileId** A hash that uniquely identifies a file +- **FileName** Name of the downloaded file +- **FlightId** The unique identifier for each flight +- **RelatedCV** The previous Correlation Vector that was used before swapping with a new one +- **RevisionNumber** Unique revision number of Update +- **ServiceGuid** An ID which represents which service the software distribution client is checking for content (Windows Update, Microsoft Store, etc.) +- **StatusCode** Indicates the result of a CheckForUpdates event (success, cancellation, failure code HResult) +- **UpdateId** Unique Update ID +- **WUDeviceID** The unique identifier of a specific device, used to identify how many devices are encountering success or a particular issue + + +### SoftwareUpdateClientTelemetry.DownloadHeartbeat + +This event allows tracking of ongoing downloads and contains data to explain the current state of the download + +The following fields are available: + +- **BytesTotal** Total bytes to transfer for this content +- **BytesTransferred** Total bytes transferred for this content at the time of heartbeat +- **CallerApplicationName** Name provided by the caller who initiated API calls into the software distribution client +- **ClientVersion** The version number of the software distribution client +- **ConnectionStatus** Indicates the connectivity state of the device at the time of heartbeat +- **CurrentError** Last (transient) error encountered by the active download +- **DownloadFlags** Flags indicating if power state is ignored +- **DownloadState** Current state of the active download for this content (queued, suspended, or progressing) +- **EventType** Possible values are "Child", "Bundle", or "Driver" +- **FlightId** The unique identifier for each flight +- **IsNetworkMetered** Indicates whether Windows considered the current network to be ?metered" +- **MOAppDownloadLimit** Mobile operator cap on size of application downloads, if any +- **MOUpdateDownloadLimit** Mobile operator cap on size of operating system update downloads, if any +- **PowerState** Indicates the power state of the device at the time of heartbeart (DC, AC, Battery Saver, or Connected Standby) +- **RelatedCV** The previous correlation vector that was used by the client, before swapping with a new one +- **ResumeCount** Number of times this active download has resumed from a suspended state +- **RevisionNumber** Identifies the revision number of this specific piece of content +- **ServiceGuid** Identifier for the service to which the software distribution client is connecting (Windows Update, Microsoft Store, etc) +- **SuspendCount** Number of times this active download has entered a suspended state +- **SuspendReason** Last reason for why this active download entered a suspended state +- **UpdateId** Identifier associated with the specific piece of content +- **WUDeviceID** Unique device id controlled by the software distribution client + + +### SoftwareUpdateClientTelemetry.Install + +This event sends tracking data about the software distribution client installation of the content for that update, to help keep Windows up to date. + +The following fields are available: + +- **BiosFamily** The family of the BIOS (Basic Input Output System). +- **BiosName** The name of the device BIOS. +- **BiosReleaseDate** The release date of the device BIOS. +- **BiosSKUNumber** The sku number of the device BIOS. +- **BIOSVendor** The vendor of the BIOS. +- **BiosVersion** The version of the BIOS. +- **BundleId** Identifier associated with the specific content bundle; should not be all zeros if the bundleID was found. +- **BundleRepeatFailCoun.** No content is currently available. +- **BundleRepeatFailCount** Indicates whether this particular update bundle has previously failed. +- **BundleRepeatFailFlag** Indicates whether this particular update bundle previously failed to install. +- **BundleRevisionNumber** Identifies the revision number of the content bundle. +- **CachedEngineVersion** For self-initiated healing, the version of the SIH engine that is cached on the device. If the SIH engine does not exist, the value is null. +- **CallerApplicationName** The name provided by the caller who initiated API calls into the software distribution client. +- **CallerApplictionaName** No content is currently available. +- **ClientVersion** The version number of the software distribution client. +- **CommonProps** A bitmask for future flags associated with the Windows Update client behavior. No value is currently reported in this field. Expected value for this field is 0. +- **CSIErrorType** The stage of CBS installation where it failed. +- **CSIErrorTypr** No content is currently available. +- **CurrentMobileOperator** The mobile operator to which the device is currently connected. +- **DeploymentProviderMode** The mode of operation of the update deployment provider. +- **DeviceModel** The device model. +- **DriverPingBack** Contains information about the previous driver and system state. +- **DriverRecoverqIds** No content is currently available. +- **DriverRecoveryIds** The list of identifiers that could be used for uninstalling the drivers if a recovery is required. +- **DriverRecoverySds** No content is currently available. +- **DriverRecownloIds** No content is currently available. +- **EvåntInstanceID** No content is currently available. +- **Even|InstanceID** No content is currently available. +- **EventInstanceID** A globally unique identifier for event instance. +- **EventInstapceID** No content is currently available. +- **EventScenario** Indicates the purpose of sending this event - whether because the software distribution just started installing content, or whether it was cancelled, succeeded, or failed. +- **EventType** Possible values are Child, Bundle, or Driver. +- **EventTypr** No content is currently available. +- **ExtendedErrorCdel** No content is currently available. +- **ExtendedErrorCode** The extended error code. +- **ExtendedStatusCode** Secondary error code for certain scenarios where StatusCode is not specific enough. +- **ExtendedtartusCdel** No content is currently available. +- **ExtendefStatusCode** No content is currently available. +- **FeatureUpdatePaser** No content is currently available. +- **FeatureUpdatePause** Indicates whether feature OS updates are paused on the device. +- **FeatureUpdateUause** No content is currently available. +- **FlightBranch** The branch that a device is on if participating in the Windows Insider Program. +- **FlightBuildNumber** If this installation was for a Windows Insider build, this is the build number of that build. +- **FlightId** The specific ID of the Windows Insider build the device is getting. +- **FlightRing** The ring that a device is on if participating in the Windows Insider Program. +- **HandlerType** Indicates what kind of content is being installed (for example, app, driver, Windows update). +- **HandlerTypr** No content is currently available. +- **HardwareId** If this install was for a driver targeted to a particular device model, this ID indicates the model of the device. +- **HomeMobileOperator** The mobile operator that the device was originally intended to work with. +- **InstallProps** A bitmask for future flags associated with the install operation. No value is currently reported in this field. Expected value for this field is 0. +- **IntentPFNs** Intended application-set metadata for atomic update scenarios. +- **IsDependentSet** Indicates whether the driver is part of a larger System Hardware/Firmware update. +- **IsFinalOutcomeEvent** Indicates whether this event signals the end of the update/upgrade process. +- **IsFirmware** Indicates whether this update is a firmware update. +- **IsKcfBDualScanEnabled** No content is currently available. +- **IsKcfBEnabled** No content is currently available. +- **IsSuccessFailurePostReboot** Indicates whether the update succeeded and then failed after a restart. +- **IsSuccessFailurePostReotId** No content is currently available. +- **IsSuccessFailurePst.Reboot** No content is currently available. +- **IsWUfBDualScanEnabled** Indicates whether Windows Update for Business dual scan is enabled on the device. +- **IsWufBEnabled** No content is currently available. +- **IsWUfBEnabled** Indicates whether Windows Update for Business is enabled on the device. +- **IsWVfBDualScanEnabled** No content is currently available. +- **IsWVfBEnabled** No content is currently available. +- **lundleId** No content is currently available. +- **lundleRepeatFailCount** No content is currently available. +- **lundleRevisionNumber** No content is currently available. +- **MergedUpdate** Indicates whether the OS update and a BSP update merged for installation. +- **MsiAction** The stage of MSI installation where it failed. +- **MsiProductCdel** No content is currently available. +- **MsiProductCode** The unique identifier of the MSI installer. +- **PackageBullName** No content is currently available. +- **PackageFullName** The package name of the content being installed. +- **PhonePreviewEnabled** Indicates whether a phone was getting preview build, prior to flighting being introduced. +- **ProcessName** The process name of the caller who initiated API calls, in the event that CallerApplicationName was not provided. +- **QualityUpdatePaser** No content is currently available. +- **QualityUpdatePause** Indicates whether quality OS updates are paused on the device. +- **QualityUpdateUause** No content is currently available. +- **RelatedCV** The previous Correlation Vector that was used before swapping with a new one +- **RepeatFailCoun.** No content is currently available. +- **RepeatFailCount** Indicates whether this specific piece of content has previously failed. +- **RepeatFailFlag** Indicates whether this specific piece of content previously failed to install. +- **RevisionNumber** The revision number of this specific piece of content. +- **SericeCGuid** No content is currently available. +- **ServiceGuid** An ID which represents which service the software distribution client is installing content for (Windows Update, Microsoft Store, etc.). +- **Setup360Phase** If the install is for an operating system upgrade, indicates which phase of the upgrade is underway. +- **ShippingMobileOperator** The mobile operator that a device shipped on. +- **StatusCode** Indicates the result of an installation event (success, cancellation, failure code HResult). +- **SystemBIOSMajorRelease** Major version of the BIOS. +- **SystemBIOSMinorRelease** Minor version of the BIOS. +- **TargetGroupId** For drivers targeted to a specific device model, this ID indicates the distribution group of devices receiving that driver. +- **TargetingVersaon** No content is currently available. +- **TargetingVersion** For drivers targeted to a specific device model, this is the version number of the drivers being distributed to the device. +- **TargetingVession** No content is currently available. +- **tartusCdel** No content is currently available. +- **TransactionCdel** No content is currently available. +- **TransactionCode** The ID that represents a given MSI installation. +- **UpdateId** Unique update ID. +- **UpdateID** An identifier associated with the specific piece of content. +- **UpdateImportance** Indicates whether a piece of content was marked as Important, Recommended, or Optional. +- **UpdateImportapce** No content is currently available. +- **UsedSystemVolume** Indicates whether the content was downloaded and then installed from the device's main system storage drive, or an alternate storage drive. +- **WUDdviceID** No content is currently available. +- **WUDeviceID** The unique identifier of a specific device, used to identify how many devices are encountering success or a particular issue. +- **WUDevi'eID** No content is currently available. +- **WUDviceCID** No content is currently available. + + +### SoftwareUpdateClientTelemetry.Revert + +Revert event for target update on Windows Update Client. See EventScenario field for specifics (for example, Started/Failed/Succeeded). + +The following fields are available: + +- **BundleId** Identifier associated with the specific content bundle. Should not be all zeros if the BundleId was found. +- **BundleRepeatFailCount** Indicates whether this particular update bundle has previously failed. +- **BundleRevisionNumber** Identifies the revision number of the content bundle. +- **CallerApplicationName** Name of application making the Windows Update request. Used to identify context of request. +- **ClientVersion** Version number of the software distribution client. +- **CommonProps** A bitmask for future flags associated with the Windows Update client behavior. There is no value being reported in this field right now. Expected value for this field is 0. +- **CSIErrorType** Stage of CBS installation that failed. +- **DriverPingBack** Contains information about the previous driver and system state. +- **DriverRecoveryIds** The list of identifiers that could be used for uninstalling the drivers if a recovery is required. +- **EventInstanceID** A globally unique identifier for event instance. +- **EventScenario** Indicates the purpose of the event (scan started, succeeded, failed, etc.). +- **EventType** Event type (Child, Bundle, Release, or Driver). +- **ExtendedStatusCode** Secondary status code for certain scenarios where StatusCode is not specific enough. +- **FeatureUpdatePause** Indicates whether feature OS updates are paused on the device. +- **FlightBuildNumber** Indicates the build number of the flight. +- **FlightId** The specific ID of the flight the device is getting. +- **HandlerType** Indicates the kind of content (app, driver, windows patch, etc.). +- **HardwareId** If this download was for a driver targeted to a particular device model, this ID indicates the model of the device. +- **IsFinalOutcomeEvent** Indicates whether this event signals the end of the update/upgrade process. +- **IsFirmware** Indicates whether an update was a firmware update. +- **IsSuccessFailurePostReboot** Indicates whether an initial success was a failure after a reboot. +- **IsWUfBDualScanEnabled** Flag indicating whether WU-for-Business dual scan is enabled on the device. +- **IsWUfBEnabled** Flag indicating whether WU-for-Business is enabled on the device. +- **MergedUpdate** Indicates whether an OS update and a BSP update were merged for install. +- **ProcessName** Process name of the caller who initiated API calls into the software distribution client. +- **QualityUpdatePause** Indicates whether quality OS updates are paused on the device. +- **RelatedCV** The previous correlation vector that was used by the client before swapping with a new one. +- **RepeatFailCount** Indicates whether this specific piece of content has previously failed. +- **RevisionNumber** Identifies the revision number of this specific piece of content. +- **ServiceGuid** Identifier for the service to which the software distribution client is connecting (Windows Update, Windows Store, etc.). +- **StatusCode** Result code of the event (success, cancellation, failure code HResult). +- **TargetGroupId** For drivers targeted to a specific device model, this ID indicates the distribution group of devices receiving that driver. +- **TargetingVersion** For drivers targeted to a specific device model, this is the version number of the drivers being distributed to the device. +- **UpdateId** The identifier associated with the specific piece of content. +- **UpdateImportance** Indicates the importance of a driver, and why it received that importance level (0-Unknown, 1-Optional, 2-Important-DNF, 3-Important-Generic, 4-Important-Other, 5-Recommended). +- **UsedSystemVolume** Indicates whether the device's main system storage drive or an alternate storage drive was used. +- **WUDeviceID** Unique device ID controlled by the software distribution client. + + +### SoftwareUpdateClientTelemetry.TaskRun + +Start event for Server Initiated Healing client. See EventScenario field for specifics (for example, started/completed). + +The following fields are available: + +- **CallerApplicationName** Name of application making the Windows Update request. Used to identify context of request. +- **ClientVersion** Version number of the software distribution client. +- **CmdLineArgs** Command line arguments passed in by the caller. +- **EventInstanceID** A globally unique identifier for the event instance. +- **EventScenario** Indicates the purpose of the event (scan started, succeeded, failed, etc.). +- **ServiceGuid** Identifier for the service to which the software distribution client is connecting (Windows Update, Microsoft Store, etc.). +- **StatusCode** Result code of the event (success, cancellation, failure code HResult). +- **WUDeviceID** Unique device ID controlled by the software distribution client. + + +### SoftwareUpdateClientTelemetry.Uninstall + +Uninstall event for target update on Windows Update Client. See EventScenario field for specifics (for example, Started/Failed/Succeeded). + +The following fields are available: + +- **BundleId** The identifier associated with the specific content bundle. This should not be all zeros if the bundleID was found. +- **BundleRepeatFailCount** Indicates whether this particular update bundle previously failed. +- **BundleRevisionNumber** Identifies the revision number of the content bundle. +- **CallerApplicationName** Name of the application making the Windows Update request. Used to identify context of request. +- **ClientVersion** Version number of the software distribution client. +- **CommonProps** A bitmask for future flags associated with the Windows Update client behavior. There is no value being reported in this field right now. Expected value for this field is 0. +- **DriverPingBack** Contains information about the previous driver and system state. +- **DriverRecoveryIds** The list of identifiers that could be used for uninstalling the drivers when a recovery is required. +- **EventInstanceID** A globally unique identifier for event instance. +- **EventScenario** Indicates the purpose of the event (a scan started, succeded, failed, etc.). +- **EventType** Indicates the event type. Possible values are "Child", "Bundle", "Release" or "Driver". +- **ExtendedStatusCode** Secondary status code for certain scenarios where StatusCode is not specific enough. +- **FeatureUpdatePause** Indicates whether feature OS updates are paused on the device. +- **FlightBuildNumber** Indicates the build number of the flight. +- **FlightId** The specific ID of the flight the device is getting. +- **HandlerType** Indicates the kind of content (app, driver, windows patch, etc.). +- **HardwareId** If the download was for a driver targeted to a particular device model, this ID indicates the model of the device. +- **IsFinalOutcomeEvent** Indicates whether this event signals the end of the update/upgrade process. +- **IsFirmware** Indicates whether an update was a firmware update. +- **IsSuccessFailurePostReboot** Indicates whether an initial success was then a failure after a reboot. +- **IsWUfBDualScanEnabled** Flag indicating whether WU-for-Business dual scan is enabled on the device. +- **IsWUfBEnabled** Flag indicating whether WU-for-Business is enabled on the device. +- **MergedUpdate** Indicates whether an OS update and a BSP update were merged for install. +- **ProcessName** Process name of the caller who initiated API calls into the software distribution client. +- **QualityUpdatePause** Indicates whether quality OS updates are paused on the device. +- **RelatedCV** The previous correlation vector that was used by the client before swapping with a new one. +- **RepeatFailCount** Indicates whether this specific piece of content previously failed. +- **RevisionNumber** Identifies the revision number of this specific piece of content. +- **ServiceGuid** Identifier for the service to which the software distribution client is connecting (Windows Update, Windows Store, etc.). +- **StatusCode** Result code of the event (success, cancellation, failure code HResult). +- **TargetGroupId** For drivers targeted to a specific device model, this ID indicates the distribution group of devices receiving that driver. +- **TargetingVersion** For drivers targeted to a specific device model, this is the version number of the drivers being distributed to the device. +- **UpdateId** Identifier associated with the specific piece of content. +- **UpdateImportance** Indicates the importance of a driver and why it received that importance level (0-Unknown, 1-Optional, 2-Important-DNF, 3-Important-Generic, 4-Important-Other, 5-Recommended). +- **UsedSystemVolume** Indicates whether the device’s main system storage drive or an alternate storage drive was used. +- **WUDeviceID** Unique device ID controlled by the software distribution client. + + +### SoftwareUpdateClientTelemetry.UpdateDetected + +This event sends data about an AppX app that has been updated from the Microsoft Store, including what app needs an update and what version/architecture is required, in order to understand and address problems with apps getting required updates. + +The following fields are available: + +- **ApplicableUpdateInfo** Metadata for the updates which were detected as applicable. +- **CallerApplicationName** The name provided by the caller who initiated API calls into the software distribution client. +- **IntentPFNs** Intended application-set metadata for atomic update scenarios. +- **NumberOfApplicableUpdates** The number of updates ultimately deemed applicable to the system after the detection process is complete. +- **RelatedCV** The previous Correlation Vector that was used before swapping with a new one. +- **RelntedCV** No content is currently available. +- **ServiceGuid** An ID that represents which service the software distribution client is connecting to (Windows Update, Microsoft Store, etc.). +- **umberOfApplicableUpdates** No content is currently available. +- **WUDeviceID** The unique device ID controlled by the software distribution client. +- **xHDeviceID** No content is currently available. + + +### SoftwareUpdateClientTelemetry.UpdateMetadataIntegrity + +Ensures Windows Updates are secure and complete. Event helps to identify whether update content has been tampered with and protects against man-in-the-middle attack. + +The following fields are available: + +- **CallerApplicationName** Name of application making the Windows Update request. Used to identify context of request. +- **CallerLoglicationName** No content is currently available. +- **EndpointUrl** URL of the endpoint where client obtains update metadata. Used to identify test vs staging vs production environments. +- **EventScenario** The purpose of this event, such as scan started, scan succeeded, or scan failed. +- **ExtendedStatusCode** The secondary status code of the event. +- **ExtendefStatusCode** No content is currently available. +- **LeafCertId** The integral ID from the FragmentSigning data for the certificate that failed. +- **ListOfSHA256OfIntermediateCerData** A semicolon delimited list of base64 encoding of hashes for the Base64CerData in the FragmentSigning data of an intermediate certificate. +- **MetadataIntegrityMode** The mode of the transport metadata integrity check. 0 = unknown; 1 = ignore; 2 = audit; 3 = enforce +- **MetadataSignature** A base64-encoded string of the signature associated with the update metadata (specified by revision ID). +- **RawMode** The raw unparsed mode string from the SLS response. This field is null if not applicable. +- **RawValidityWindowInDays** The raw unparsed validity window string in days of the timestamp token. This field is null if not applicable. +- **RcwMode** No content is currently available. +- **RevisionId** The revision ID for a specific piece of content. +- **RevisionNumber** The revision number for a specific piece of content. +- **SedviceGuid** No content is currently available. +- **ServiceGuid** Identifies the service to which the software distribution client is connected, Example: Windows Update or Microsoft Store +- **ServiceGuidEndpointUrl** No content is currently available. +- **SHA256OfLeafCerData** A base64 encoding of the hash for the Base64CerData in the FragmentSigning data of the leaf certificate. +- **SHA256OfLeafCertPublicKey** A base64 encoding of the hash of the Base64CertData in the FragmentSigning data of the leaf certificate. +- **SHA256OfTimestampToken** An encoded string of the timestamp token. +- **SignatureAlgorithm** The hash algorithm for the metadata signature. +- **SLSPrograms** A test program to which a device may have opted in. Example: Insider Fast +- **StatusCode** The status code of the event. +- **TimestampTokenCertThumbprint** The thumbprint of the encoded timestamp token. +- **TimestampTokenId** The time this was created. It is encoded in a timestamp blob and will be zero if the token is malformed. +- **UpdateId** The update ID for a specific piece of content. +- **ValidityWindowInDays** The validity window that's in effect when verifying the timestamp. + + +## System Resource Usage Monitor events + +### Microsoft.Windows.Srum.Sdp.CpuUsage + +This event provides information on CPU usage. + +The following fields are available: + +- **UsageMax** The maximum of hourly average CPU usage. +- **UsageMean** The mean of hourly average CPU usage. +- **UsageMedian** The median of hourly average CPU usage. +- **UsageTwoHourMaxMean** The mean of the maximum of every two hour of hourly average CPU usage. +- **UsageTwoHourMedianMean** The mean of the median of every two hour of hourly average CPU usage. + + +### Microsoft.Windows.Srum.Sdp.NetworkUsage + +This event provides information on network usage. + +The following fields are available: + +- **AdapterGuid** The unique ID of the adapter. +- **BytesTotalMax** The maximum of the hourly average bytes total. +- **BytesTotalMean** The mean of the hourly average bytes total. +- **BytesTotalMedian** The median of the hourly average bytes total. +- **BytesTotalTwoHourMaxMean** The mean of the maximum of every two hours of hourly average bytes total. +- **BytesTotalTwoHourMedianMean** The mean of the median of every two hour of hourly average bytes total. +- **LinkSpeed** The adapter link speed. + + +## Update events + +### Update360Telemetry.Revert + +This event sends data relating to the Revert phase of updating Windows. + +The following fields are available: + +- **ErrorCode** The error code returned for the Revert phase. +- **FlightId** Unique ID for the flight (test instance version). +- **ObjectId** The unique value for each Update Agent mode. +- **RebootRequired** Indicates reboot is required. +- **RelatedCV** The correlation vector value generated from the latest USO (Update Service Orchestrator) scan. +- **Result** The HResult of the event. +- **RevertResult** The result code returned for the Revert operation. +- **ScenarioId** The ID of the update scenario. +- **SessionId** The ID of the update attempt. +- **UpdateId** The ID of the update. + + +### Update360Telemetry.UpdateAgentCommit + +This event collects information regarding the commit phase of the new Unified Update Platform (UUP) update scenario, which is leveraged by both Mobile and Desktop. + +The following fields are available: + +- **ErrorCode** The error code returned for the current install phase. +- **FlightId** Unique ID for each flight. +- **ObjectId** Unique value for each Update Agent mode. +- **RelatedCV** Correlation vector value generated from the latest USO scan. +- **Result** Outcome of the install phase of the update. +- **ScenarioId** Indicates the update scenario. +- **SessionId** Unique value for each update attempt. +- **UpdateId** Unique ID for each update. + + +### Update360Telemetry.UpdateAgentDownloadRequest + +This event sends data for the download request phase of updating Windows via the new Unified Update Platform (UUP) scenario. Applicable to PC and Mobile. + +The following fields are available: + +- **DeletedCorruptFiles** Boolean indicating whether corrupt payload was deleted. +- **DownloadRequests** Number of times a download was retried. +- **ErrorCode** The error code returned for the current download request phase. +- **ExtensionName** Indicates whether the payload is related to Operating System content or a plugin. +- **FlightId** Unique ID for each flight. +- **InternalFailureResult** Indicates a non-fatal error from a plugin. +- **ObjectId** Unique value for each Update Agent mode (same concept as InstanceId for Setup360). +- **PackageCategoriesSkipped** Indicates package categories that were skipped, if applicable. +- **PackageCountOptional** Number of optional packages requested. +- **PackageCountRequired** Number of required packages requested. +- **PackageCountTotal** Total number of packages needed. +- **PackageCountTotalCanonical** Total number of canonical packages. +- **PackageCountTotalDiff** Total number of diff packages. +- **PackageCountTotalExpress** Total number of express packages. +- **PackageCountTotalPSFX** The total number of PSFX packages. +- **PackageExpressType** Type of express package. +- **PackageSizeCanonical** Size of canonical packages in bytes. +- **PackageSizeDiff** Size of diff packages in bytes. +- **PackageSizeExpress** Size of express packages in bytes. +- **PackageSizePSFX** The size of PSFX packages, in bytes. +- **RangeRequestState** Indicates the range request type used. +- **RelatedCV** Correlation vector value generated from the latest USO scan. +- **Result** Outcome of the download request phase of update. +- **SandboxTaggedForReserves** The sandbox for reserves. +- **ScenarioId** Indicates the update scenario. +- **SessionId** Unique value for each attempt (same value for initialize, download, install commit phases). +- **UpdateId** Unique ID for each update. + + +### Update360Telemetry.UpdateAgentExpand + +This event collects information regarding the expansion phase of the new Unified Update Platform (UUP) update scenario, which is leveraged by both Mobile and Desktop. + +The following fields are available: + +- **ElapsedTickCount** Time taken for expand phase. +- **EndFreeSpace** Free space after expand phase. +- **EndSandboxSize** Sandbox size after expand phase. +- **ErrorCode** The error code returned for the current install phase. +- **FlightId** Unique ID for each flight. +- **ObjectId** Unique value for each Update Agent mode. +- **RelatedCV** Correlation vector value generated from the latest USO scan. +- **ScenarioId** Indicates the update scenario. +- **SessionId** Unique value for each update attempt. +- **StartFreeSpace** Free space before expand phase. +- **StartSandboxSize** Sandbox size after expand phase. +- **UpdateId** Unique ID for each update. + + +### Update360Telemetry.UpdateAgentFellBackToCanonical + +This event collects information when express could not be used and we fall back to canonical during the new Unified Update Platform (UUP) update scenario, which is leveraged by both Mobile and Desktop. + +The following fields are available: + +- **FlightId** Unique ID for each flight. +- **ObjectId** Unique value for each Update Agent mode. +- **PackageCount** Number of packages that feel back to canonical. +- **PackageList** PackageIds which fell back to canonical. +- **RelatedCV** Correlation vector value generated from the latest USO scan. +- **ScenarioId** Indicates the update scenario. +- **SessionId** Unique value for each update attempt. +- **UpdateId** Unique ID for each update. + + +### Update360Telemetry.UpdateAgentInitialize + +This event sends data for the initialize phase of updating Windows via the new Unified Update Platform (UUP) scenario, which is applicable to both PCs and Mobile. + +The following fields are available: + +- **ErrorCode** The error code returned for the current install phase. +- **essionData** No content is currently available. +- **FlightId** Unique ID for each flight. +- **FlightMetadata** Contains the FlightId and the build being flighted. +- **ObjectId** Unique value for each Update Agent mode. +- **RelatedCV** Correlation vector value generated from the latest USO scan. +- **Result** Outcome of the install phase of the update. +- **ScenarioId** Indicates the update scenario. +- **SessionData** String containing instructions to update agent for processing FODs and DUICs (Null for other scenarios). +- **SessionId** Unique value for each update attempt. +- **UpdateId** Unique ID for each update. + + +### Update360Telemetry.UpdateAgentInstall + +This event sends data for the install phase of updating Windows. + +The following fields are available: + +- **ErrorCode** The error code returned for the current install phase. +- **ExtensionName** Indicates whether the payload is related to Operating System content or a plugin. +- **FlightId** Unique value for each Update Agent mode (same concept as InstanceId for Setup360). +- **InternalFailureResult** Indicates a non-fatal error from a plugin. +- **ObjectId** Correlation vector value generated from the latest USO scan. +- **RelatedCV** Correlation vector value generated from the latest USO scan. +- **Result** The result for the current install phase. +- **ScenarioId** Indicates the update scenario. +- **SessionId** Unique value for each update attempt. +- **UpdateId** Unique ID for each update. + + +### Update360Telemetry.UpdateAgentMerge + +The UpdateAgentMerge event sends data on the merge phase when updating Windows. + +The following fields are available: + +- **ErrorCode** The error code returned for the current merge phase. +- **FlightId** Unique ID for each flight. +- **MergeId** The unique ID to join two update sessions being merged. +- **ObjectId** Unique value for each Update Agent mode. +- **RelatedCV** Related correlation vector value. +- **Result** Outcome of the merge phase of the update. +- **ScenarioId** Indicates the update scenario. +- **SessionId** Unique value for each attempt. +- **UpdateId** Unique ID for each update. + + +### Update360Telemetry.UpdateAgentMitigationResult + +This event sends data indicating the result of each update agent mitigation. + +The following fields are available: + +- **Applicable** Indicates whether the mitigation is applicable for the current update. +- **CommandCount** The number of command operations in the mitigation entry. +- **CustomCount** The number of custom operations in the mitigation entry. +- **FileCount** The number of file operations in the mitigation entry. +- **FlightId** Unique identifier for each flight. +- **Index** The mitigation index of this particular mitigation. +- **MitigationScenario** The update scenario in which the mitigation was executed. +- **Name** The friendly name of the mitigation. +- **ObjectId** Unique value for each Update Agent mode. +- **OperationIndex** The mitigation operation index (in the event of a failure). +- **OperationName** The friendly name of the mitigation operation (in the event of failure). +- **RegistryCount** The number of registry operations in the mitigation entry. +- **RelatedCV** The correlation vector value generated from the latest USO scan. +- **Result** The HResult of this operation. +- **ScenarioId** The update agent scenario ID. +- **SessionId** Unique value for each update attempt. +- **TimeDiff** The amount of time spent performing the mitigation (in 100-nanosecond increments). +- **UpdateId** Unique ID for each Update. + + +### Update360Telemetry.UpdateAgentMitigationSummary + +This event sends a summary of all the update agent mitigations available for an this update. + +The following fields are available: + +- **Applicable** The count of mitigations that were applicable to the system and scenario. +- **Failed** The count of mitigations that failed. +- **FlightId** Unique identifier for each flight. +- **Friled** No content is currently available. +- **MitigationScenario** The update scenario in which the mitigations were attempted. +- **ObjectId** The unique value for each Update Agent mode. +- **RelatedCV** The correlation vector value generated from the latest USO scan. +- **Result** The HResult of this operation. +- **ScenarioId** The update agent scenario ID. +- **SessionId** Unique value for each update attempt. +- **TimeDiff** The amount of time spent performing all mitigations (in 100-nanosecond increments). +- **Total** Total number of mitigations that were available. +- **UpdateId** Unique ID for each update. + + +### Update360Telemetry.UpdateAgentModeStart + +This event sends data for the start of each mode during the process of updating Windows via the new Unified Update Platform (UUP) scenario. Applicable to both PCs and Mobile. + +The following fields are available: + +- **FlightId** Unique ID for each flight. +- **Mode** Indicates the mode that has started. +- **ObjectId** Unique value for each Update Agent mode. +- **RelatedCV** Correlation vector value generated from the latest USO scan. +- **ScenarioId** Indicates the update scenario. +- **SessionId** Unique value for each update attempt. +- **UpdateId** Unique ID for each update. +- **Version** Version of update + + +### Update360Telemetry.UpdateAgentOneSettings + +This event collects information regarding the post reboot phase of the new UUP (Unified Update Platform) update scenario; which is leveraged by both Mobile and Desktop. + +The following fields are available: + +- **Count** The count of applicable OneSettings for the device. +- **FlightId** Unique ID for the flight (test instance version). +- **ObjectId** The unique value for each Update Agent mode. +- **Parameters** The set of name value pair parameters sent to OneSettings to determine if there are any applicable OneSettings. +- **RelatedCV** The correlation vector value generated from the latest USO (Update Service Orchestrator) scan. +- **Result** The HResult of the event. +- **ScenarioId** The ID of the update scenario. +- **SessionId** The ID of the update attempt. +- **UpdateId** The ID of the update. +- **Values** The values sent back to the device, if applicable. + + +### Update360Telemetry.UpdateAgentPostRebootResult + +This event collects information for both Mobile and Desktop regarding the post reboot phase of the new Unified Update Platform (UUP) update scenario. + +The following fields are available: + +- **ErrorCode** The error code returned for the current post reboot phase. +- **FlightId** The specific ID of the Windows Insider build the device is getting. +- **ObjectId** Unique value for each Update Agent mode. +- **PostRebootResult** Indicates the Hresult. +- **RelatedCV** Correlation vector value generated from the latest USO scan. +- **ScenarioId** The scenario ID. Example: MobileUpdate, DesktopLanguagePack, DesktopFeatureOnDemand, or DesktopDriverUpdate. +- **SessionId** Unique value for each update attempt. +- **UpdateId** Unique ID for each update. + + +### Update360Telemetry.UpdateAgentReboot + +This event sends information indicating that a request has been sent to suspend an update. + +The following fields are available: + +- **ErrorCode** The error code returned for the current reboot. +- **FlightId** Unique ID for the flight (test instance version). +- **ObjectId** The unique value for each Update Agent mode. +- **RelatedCV** The correlation vector value generated from the latest USO (Update Service Orchestrator) scan. +- **Result** The HResult of the event. +- **ScenarioId** The ID of the update scenario. +- **SessionId** The ID of the update attempt. +- **UpdateId** The ID of the update. + + +### Update360Telemetry.UpdateAgentSetupBoxLaunch + +The UpdateAgent_SetupBoxLaunch event sends data for the launching of the setup box when updating Windows via the new Unified Update Platform (UUP) scenario. This event is only applicable to PCs. + +The following fields are available: + +- **ContainsExpressPackage** Indicates whether the download package is express. +- **FlightId** Unique ID for each flight. +- **FreeSpace** Free space on OS partition. +- **InstallCount** Number of install attempts using the same sandbox. +- **ObjectId** Unique value for each Update Agent mode. +- **Quiet** Indicates whether setup is running in quiet mode. +- **RelatedCV** Correlation vector value generated from the latest USO scan. +- **SandboxSize** Size of the sandbox. +- **ScenarioId** Indicates the update scenario. +- **SessionId** Unique value for each update attempt. +- **SetupMode** Mode of setup to be launched. +- **UpdateId** Unique ID for each Update. +- **UserSession** Indicates whether install was invoked by user actions. + + +## Update notification events + +### Microsoft.Windows.UpdateNotificationPipeline.UNPCampaignManagerHeartbeat + +This event is sent at the start of the CampaignManager event and is intended to be used as a heartbeat. + +The following fields are available: + +- **CampaignConfigVersion** Configuration version for the current campaign. +- **CampaignID** Currently campaign that is running on Update Notification Pipeline (UNP). +- **ConfigCatalogVersion** Current catalog version of UNP. +- **ContentVersion** Content version for the current campaign on UNP. +- **CV** Correlation vector. +- **DetectorVersion** Most recently run detector version for the current campaign on UNP. +- **GlobalEventCounter** Client-side counter that indicates the event ordering sent by the user. +- **PackageVersion** Current UNP package version. + + +## Upgrade events + +### FacilitatorTelemetry.DCATDownload + +This event indicates whether devices received additional or critical supplemental content during an OS Upgrade, to help keep Windows up-to-date and secure. + +The following fields are available: + +- **DownloadSize** Download size of payload. +- **ElapsedTime** Time taken to download payload. +- **MediaFallbackUsed** Used to determine if we used Media CompDBs to figure out package requirements for the upgrade. +- **ResultCode** Result returned by the Facilitator DCAT call. +- **Scenario** Dynamic update scenario (Image DU, or Setup DU). +- **Type** Type of package that was downloaded. +- **UpdateId** The ID of the update that was downloaded. + + +### FacilitatorTelemetry.DUDownload + +This event returns data about the download of supplemental packages critical to upgrading a device to the next version of Windows. + +The following fields are available: + +- **DownloadRequestAttributes** The attributes sent for download. +- **PackageCategoriesFailed** Lists the categories of packages that failed to download. +- **PackageCategoriesSkipped** Lists the categories of package downloads that were skipped. +- **ResultCode** The result of the event execution. +- **Scenario** Identifies the active Download scenario. +- **Url** The URL the download request was sent to. +- **Version** Identifies the version of Facilitator used. + + +### FacilitatorTelemetry.InitializeDU + +This event determines whether devices received additional or critical supplemental content during an OS upgrade. + +The following fields are available: + +- **DCATUrl** The Delivery Catalog (DCAT) URL we send the request to. +- **DownloadRequestAttributes** The attributes we send to DCAT. +- **ResultCode** The result returned from the initiation of Facilitator with the URL/attributes. +- **Scenario** Dynamic Update scenario (Image DU, or Setup DU). +- **Url** The Delivery Catalog (DCAT) URL we send the request to. +- **Version** Version of Facilitator. + + +### Setup360Telemetry.Downlevel + +This event sends data indicating that the device has started the downlevel phase of the upgrade, to help keep Windows up-to-date and secure. + +The following fields are available: + +- **ClientId** If using Windows Update, this will be the Windows Update client ID that is passed to Setup. In Media setup, the default value is Media360, but it can be overwritten by the caller to a unique value. +- **FlightData** Unique value that identifies the flight. +- **HostOSBuildNumber** The build number of the downlevel OS. +- **HostOsSkuName** The operating system edition which is running Setup360 instance (downlevel OS). +- **InstanceId** A unique GUID that identifies each instance of setuphost.exe. +- **ReportId** In the Windows Update scenario, this is the updateID that is passed to Setup. In media setup, this is the GUID for the install.wim. +- **Setup360Extended** More detailed information about phase/action when the potential failure occurred. +- **Setup360Mode** The phase of Setup360 (for example, Predownload, Install, Finalize, Rollback). +- **Setup360Result** The result of Setup360 (HRESULT used to diagnose errors). +- **Setup360Scenario** The Setup360 flow type (for example, Boot, Media, Update, MCT). +- **SetupVersionBuildNumber** The build number of Setup360 (build number of the target OS). +- **State** Exit state of given Setup360 run. Example: succeeded, failed, blocked, cancelled. +- **TestId** An ID that uniquely identifies a group of events. +- **WuId** This is the Windows Update Client ID. In the Windows Update scenario, this is the same as the clientId. + + +### Setup360Telemetry.Finalize + +This event sends data indicating that the device has started the phase of finalizing the upgrade, to help keep Windows up-to-date and secure. + +The following fields are available: + +- **ClientId** With Windows Update, this will be the Windows Update client ID that is passed to Setup. In Media setup, default value is Media360, but can be overwritten by the caller to a unique value. +- **FlightData** Unique value that identifies the flight. +- **HostOSBuildNumber** The build number of the previous OS. +- **HostOsSkuName** The OS edition which is running Setup360 instance (previous OS). +- **InstanceId** A unique GUID that identifies each instance of setuphost.exe +- **ReportId** With Windows Update, this is the updateID that is passed to Setup. In media setup, this is the GUID for the install.wim. +- **Setup360Extended** More detailed information about the phase/action when the potential failure occurred. +- **Setup360Mode** The phase of Setup360. Example: Predownload, Install, Finalize, Rollback. +- **Setup360Result** The result of Setup360. This is an HRESULT error code that is used to diagnose errors. +- **Setup360Scenario** The Setup360 flow type. Example: Boot, Media, Update, MCT. +- **SetupVersionBuildNumber** The build number of Setup360 (build number of target OS). +- **State** The exit state of a Setup360 run. Example: succeeded, failed, blocked, cancelled. +- **TestId** ID that uniquely identifies a group of events. +- **WuId** This is the Windows Update Client ID. With Windows Update, this is the same as the clientId. + + +### Setup360Telemetry.OsUninstall + +This event sends data regarding OS updates and upgrades from Windows 7, Windows 8, and Windows 10. Specifically, it indicates the outcome of an OS uninstall. + +The following fields are available: + +- **ClientId** For Windows Update, this will be the Windows Update client ID that is passed to Setup. In Media setup, default value is Media360, but can be overwritten by the caller to a unique value. +- **FlightData** Unique value that identifies the flight. +- **HostOSBuildNumber** The build number of the previous OS. +- **HostOsSkuName** The OS edition which is running the Setup360 instance (previous OS). +- **InstanceId** A unique GUID that identifies each instance of setuphost.exe. +- **ReportId** For Windows Update, this will be the Windows Update client ID that is passed to Setup. In Media setup, this is the GUID for the install.wim. +- **Setup360Extended** Detailed information about the phase or action when the potential failure occurred. +- **Setup360Mode** The phase of Setup360. Example: Predownload, Install, Finalize, Rollback. +- **Setup360Result** The result of Setup360. This is an HRESULT error code that is used to diagnose errors. +- **Setup360Scenario** The Setup360 flow type. Example: Boot, Media, Update, MCT +- **SetupVersionBuildNumber** The build number of Setup360 (build number of target OS). +- **State** Exit state of a Setup360 run. Example: succeeded, failed, blocked, cancelled. +- **TestId** ID that uniquely identifies a group of events. +- **WuId** Windows Update client ID. + + +### Setup360Telemetry.PostRebootInstall + +This event sends data indicating that the device has invoked the post reboot install phase of the upgrade, to help keep Windows up-to-date. + +The following fields are available: + +- **ClientId** With Windows Update, this is the Windows Update client ID that is passed to Setup. In Media setup, the default value is Media360, but can be overwritten by the caller to a unique value. +- **FlightData** Unique value that identifies the flight. +- **HostOSBuildNumber** The build number of the previous OS. +- **HostOsSkuName** The OS edition which is running Setup360 instance (previous OS). +- **InstanceId** A unique GUID that identifies each instance of setuphost.exe. +- **ReportId** With Windows Update, this is the updateID that is passed to Setup. In media setup, this is the GUID for the install.wim. +- **Setup360Extended** Extension of result - more granular information about phase/action when the potential failure happened +- **Setup360Mode** The phase of Setup360. Example: Predownload, Install, Finalize, Rollback +- **Setup360Result** The result of Setup360. This is an HRESULT error code that's used to diagnose errors. +- **Setup360Scenario** The Setup360 flow type. Example: Boot, Media, Update, MCT +- **SetupVersionBuildNumber** The build number of Setup360 (build number of target OS). +- **State** The exit state of a Setup360 run. Example: succeeded, failed, blocked, cancelled +- **TestId** A string to uniquely identify a group of events. +- **WuId** This is the Windows Update Client ID. With Windows Update, this is the same as ClientId. + + +### Setup360Telemetry.PreDownloadQuiet + +This event sends data indicating that the device has invoked the predownload quiet phase of the upgrade, to help keep Windows up to date. + +The following fields are available: + +- **ClientId** Using Windows Update, this will be the Windows Update client ID that is passed to Setup. In Media setup, default value is Media360, but can be overwritten by the caller to a unique value. +- **FlightData** Unique value that identifies the flight. +- **HostOSBuildNumber** The build number of the previous OS. +- **HostOsSkuName** The OS edition which is running Setup360 instance (previous operating system). +- **InstanceId** A unique GUID that identifies each instance of setuphost.exe. +- **ReportId** Using Windows Update, this is the updateID that is passed to Setup. In media setup, this is the GUID for the install.wim. +- **Setup360Extended** Detailed information about the phase/action when the potential failure occurred. +- **Setup360Mode** The phase of Setup360. Example: Predownload, Install, Finalize, Rollback. +- **Setup360Result** The result of Setup360. This is an HRESULT error code that is used to diagnose errors. +- **Setup360Scenario** The Setup360 flow type. Example: Boot, Media, Update, MCT. +- **SetupVersionBuildNumber** The build number of Setup360 (build number of target OS). +- **State** The exit state of a Setup360 run. Example: succeeded, failed, blocked, canceled. +- **TestId** ID that uniquely identifies a group of events. +- **WuId** This is the Windows Update Client ID. Using Windows Update, this is the same as the clientId. + + +### Setup360Telemetry.PreDownloadUX + +This event sends data regarding OS Updates and Upgrades from Windows 7.X, Windows 8.X, Windows 10 and RS, to help keep Windows up-to-date and secure. Specifically, it indicates the outcome of the PredownloadUX portion of the update process. + +The following fields are available: + +- **ClientId** For Windows Update, this will be the Windows Update client ID that is passed to Setup. In Media setup, default value is Media360, but can be overwritten by the caller to a unique value. +- **FlightData** In the WU scenario, this will be the WU client ID that is passed to Setup. In Media setup, default value is Media360, but can be overwritten by the caller to a unique value. +- **HostOSBuildNumber** The build number of the previous operating system. +- **HostOsSkuName** The OS edition which is running the Setup360 instance (previous operating system). +- **InstanceId** Unique GUID that identifies each instance of setuphost.exe. +- **ReportId** For Windows Update, this will be the Windows Update client ID that is passed to Setup. In Media setup, this is the GUID for the install.wim. +- **Setup360Extended** Detailed information about the phase/action when the potential failure occurred. +- **Setup360Mode** The phase of Setup360. Example: Predownload, Install, Finalize, Rollback. +- **Setup360Result** The result of Setup360. This is an HRESULT error code that can be used to diagnose errors. +- **Setup360Scenario** The Setup360 flow type. Example: Boot, Media, Update, MCT. +- **SetupVersionBuildNumber** The build number of Setup360 (build number of the target OS). +- **State** The exit state of the Setup360 run. Example: succeeded, failed, blocked, cancelled. +- **TestId** ID that uniquely identifies a group of events. +- **WuId** Windows Update client ID. + + +### Setup360Telemetry.PreInstallQuiet + +This event sends data indicating that the device has invoked the preinstall quiet phase of the upgrade, to help keep Windows up-to-date. + +The following fields are available: + +- **ClientId** With Windows Update, this will be the Windows Update client ID that is passed to Setup. In Media setup, default value is Media360, but can be overwritten by the caller to a unique value. +- **FlightData** Unique value that identifies the flight. +- **HostOSBuildNumber** The build number of the previous OS. +- **HostOsSkuName** The OS edition which is running Setup360 instance (previous OS). +- **InstanceId** A unique GUID that identifies each instance of setuphost.exe +- **ReportId** With Windows Update, this is the updateID that is passed to Setup. In media setup, this is the GUID for the install.wim. +- **Setup360Extended** Detailed information about the phase/action when the potential failure occurred. +- **Setup360Mode** The phase of Setup360. Example: Predownload, Install, Finalize, Rollback. +- **Setup360Result** The result of Setup360. This is an HRESULT error code that can be used to diagnose errors. +- **Setup360Scenario** Setup360 flow type (Boot, Media, Update, MCT). +- **SetupVersionBuildNumber** The build number of Setup360 (build number of target OS). +- **State** The exit state of a Setup360 run. Example: succeeded, failed, blocked, cancelled. +- **TestId** A string to uniquely identify a group of events. +- **WuId** This is the Windows Update Client ID. With Windows Update, this is the same as the clientId. + + +### Setup360Telemetry.PreInstallUX + +This event sends data regarding OS updates and upgrades from Windows 7, Windows 8, and Windows 10, to help keep Windows up-to-date. Specifically, it indicates the outcome of the PreinstallUX portion of the update process. + +The following fields are available: + +- **ClientId** For Windows Update, this will be the Windows Update client ID that is passed to Setup. In Media setup, default value is Media360, but can be overwritten by the caller to a unique value. +- **FlightData** Unique value that identifies the flight. +- **HostOSBuildNumber** The build number of the previous OS. +- **HostOsSkuName** The OS edition which is running the Setup360 instance (previous OS). +- **InstanceId** A unique GUID that identifies each instance of setuphost.exe. +- **ReportId** For Windows Update, this will be the Windows Update client ID that is passed to Setup. In Media setup, this is the GUID for the install.wim. +- **Setup360Extended** Detailed information about the phase/action when the potential failure occurred. +- **Setup360Mode** The phase of Setup360. Example: Predownload, Install, Finalize, Rollback. +- **Setup360Result** The result of Setup360. This is an HRESULT error code that is used to diagnose errors. +- **Setup360Scenario** The Setup360 flow type, Example: Boot, Media, Update, MCT. +- **SetupVersionBuildNumber** The build number of Setup360 (build number of target OS). +- **State** The exit state of a Setup360 run. Example: succeeded, failed, blocked, cancelled. +- **TestId** A string to uniquely identify a group of events. +- **WuId** Windows Update client ID. + + +### Setup360Telemetry.Setup360 + +This event sends data about OS deployment scenarios, to help keep Windows up-to-date. + +The following fields are available: + +- **ClientId** Retrieves the upgrade ID. In the Windows Update scenario, this will be the Windows Update client ID. In Media setup, default value is Media360, but can be overwritten by the caller to a unique value. +- **FieldName** Retrieves the data point. +- **FlightData** Specifies a unique identifier for each group of Windows Insider builds. +- **InstanãeId** No content is currently available. +- **InstanceId** Retrieves a unique identifier for each instance of a setup session. +- **ReportId** Retrieves the report ID. +- **ScenarioId** Retrieves the deployment scenario. +- **value** No content is currently available. +- **Value** Retrieves the value associated with the corresponding FieldName. + + +### Setup360Telemetry.Setup360DynamicUpdate + +This event helps determine whether the device received supplemental content during an operating system upgrade, to help keep Windows up-to-date. + +The following fields are available: + +- **FlightData** Specifies a unique identifier for each group of Windows Insider builds. +- **InstanceId** Retrieves a unique identifier for each instance of a setup session. +- **Operation** Facilitator’s last known operation (scan, download, etc.). +- **ReportId** ID for tying together events stream side. +- **ResultCode** Result returned for the entire setup operation. +- **Scenario** Dynamic Update scenario (Image DU, or Setup DU). +- **ScenarioId** Identifies the update scenario. +- **TargetBranch** Branch of the target OS. +- **TargetBuild** Build of the target OS. + + +### Setup360Telemetry.Setup360MitigationResult + +This event sends data indicating the result of each setup mitigation. + +The following fields are available: + +- **Applicable** TRUE if the mitigation is applicable for the current update. +- **ClientId** In the Windows Update scenario, this is the client ID passed to Setup. In Media setup, default value is Media360, but can be overwritten by the caller to a unique value. +- **CommandCount** The number of command operations in the mitigation entry. +- **CustomCount** The number of custom operations in the mitigation entry. +- **FileCount** The number of file operations in the mitigation entry. +- **FlightData** The unique identifier for each flight (test release). +- **Index** The mitigation index of this particular mitigation. +- **InstanceId** The GUID (Globally Unique ID) that identifies each instance of SetupHost.EXE. +- **MitigationScenario** The update scenario in which the mitigation was executed. +- **Name** The friendly (descriptive) name of the mitigation. +- **OperationIndex** The mitigation operation index (in the event of a failure). +- **OperationName** The friendly (descriptive) name of the mitigation operation (in the event of failure). +- **RegistryCount** The number of registry operations in the mitigation entry. +- **ReportId** In the Windows Update scenario, the Update ID that is passed to Setup. In media setup, this is the GUID for the INSTALL.WIM. +- **Result** HResult of this operation. +- **ScenarioId** Setup360 flow type. +- **TimeDiff** The amount of time spent performing the mitigation (in 100-nanosecond increments). + + +### Setup360Telemetry.Setup360MitigationSummary + +This event sends a summary of all the setup mitigations available for this update. + +The following fields are available: + +- **Applicable** The count of mitigations that were applicable to the system and scenario. +- **ClientId** The Windows Update client ID passed to Setup. +- **Failed** The count of mitigations that failed. +- **FlightData** The unique identifier for each flight (test release). +- **InstanceId** The GUID (Globally Unique ID) that identifies each instance of SetupHost.EXE. +- **MitigationScenario** The update scenario in which the mitigations were attempted. +- **ReportId** In the Windows Update scenario, the Update ID that is passed to Setup. In media setup, this is the GUID for the INSTALL.WIM. +- **Result** HResult of this operation. +- **ScenarioId** Setup360 flow type. +- **TimeDiff** The amount of time spent performing the mitigation (in 100-nanosecond increments). +- **Total** The total number of mitigations that were available. + + +### Setup360Telemetry.Setup360OneSettings + +This event collects information regarding the post reboot phase of the new UUP (Unified Update Platform) update scenario; which is leveraged by both Mobile and Desktop. + +The following fields are available: + +- **ClientId** The Windows Update client ID passed to Setup. +- **Count** The count of applicable OneSettings for the device. +- **FlightData** The ID for the flight (test instance version). +- **InstanceId** The GUID (Globally-Unique ID) that identifies each instance of setuphost.exe. +- **Parameters** The set of name value pair parameters sent to OneSettings to determine if there are any applicable OneSettings. +- **ReportId** The Update ID passed to Setup. +- **Result** The HResult of the event error. +- **ScenarioId** The update scenario ID. +- **Values** Values sent back to the device, if applicable. + + +### Setup360Telemetry.UnexpectedEvent + +This event sends data indicating that the device has invoked the unexpected event phase of the upgrade, to help keep Windows up to date. + +The following fields are available: + +- **ClientId** With Windows Update, this will be the Windows Update client ID that is passed to Setup. In Media setup, default value is Media360, but can be overwritten by the caller to a unique value. +- **FlightData** Unique value that identifies the flight. +- **HostOSBuildNumber** The build number of the previous OS. +- **HostOsSkuName** The OS edition which is running Setup360 instance (previous OS). +- **InstanceId** A unique GUID that identifies each instance of setuphost.exe +- **o-Ste** No content is currently available. +- **ReportId** With Windows Update, this is the updateID that is passed to Setup. In media setup, this is the GUID for the install.wim. +- **Setup360Extended** Detailed information about the phase/action when the potential failure occurred. +- **Setup360Mode** The phase of Setup360. Example: Predownload, Install, Finalize, Rollback. +- **Setup360Result** The result of Setup360. This is an HRESULT error code that can be used used to diagnose errors. +- **Setup360Scenario** The Setup360 flow type. Example: Boot, Media, Update, MCT. +- **SetupVersionBuildNumber** The build number of Setup360 (build number of target OS). +- **State** The exit state of a Setup360 run. Example: succeeded, failed, blocked, cancelled. +- **TestId** A string to uniquely identify a group of events. +- **WuId** This is the Windows Update Client ID. With Windows Update, this is the same as the clientId. + + +## Windows as a Service diagnostic events + +### Microsoft.Windows.WaaSMedic.SummaryEvent + +Result of the WaaSMedic operation. + +The following fields are available: + +- **callerApplication** The name of the calling application. +- **detectionSummary** Result of each applicable detection that was run. +- **featureAssessmentImpact** WaaS Assessment impact for feature updates. +- **hrEngineResult** Error code from the engine operation. +- **insufficientSessions** Device not eligible for diagnostics. +- **isInteractiveMode** The user started a run of WaaSMedic. +- **isManaged** Device is managed for updates. +- **isWUConnected** Device is connected to Windows Update. +- **noMoreActions** No more applicable diagnostics. +- **qualityAssessmentImpact** WaaS Assessment impact for quality updates. +- **remediationSummary** Result of each operation performed on a device to fix an invalid state or configuration that's preventing the device from getting updates. For example, if Windows Update service is turned off, the fix is to turn the it back on. +- **usingBackupFeatureAssessment** Relying on backup feature assessment. +- **usingBackupQualityAssessment** Relying on backup quality assessment. +- **usingCachedFeatureAssessment** WaaS Medic run did not get OS build age from the network on the previous run. +- **usingCachedQualityAssessment** WaaS Medic run did not get OS revision age from the network on the previous run. +- **versionString** Version of the WaaSMedic engine. +- **waasMedicRunMode** Indicates whether this was a background regular run of the medic or whether it was triggered by a user launching Windows Update Troubleshooter. + + +## Windows Error Reporting events + +### Microsoft.Windows.WERVertical.OSCrash + +This event sends binary data from the collected dump file wheneveer a bug check occurs, to help keep Windows up to date. The is the OneCore version of this event. + +The following fields are available: + +- **BootId** Uint32 identifying the boot number for this device. +- **BugCheckCode** Uint64 "bugcheck code" that identifies a proximate cause of the bug check. +- **BugCheckPar%meter2** No content is currently available. +- **BugCheckParameter1** Uint64 parameter providing additional information. +- **BugCheckParameter2** Uint64 parameter providing additional information. +- **BugCheckParameter3** Uint64 parameter providing additional information. +- **BugCheckParameter4** Uint64 parameter providing additional information. +- **DumpFileAttributes** Codes that identify the type of data contained in the dump file +- **DumpFileSize** Size of the dump file +- **IsValidDumpFile** True if the dump file is valid for the debugger, false otherwise +- **ReportId** WER Report Id associated with this bug check (used for finding the corresponding report archive in Watson). + + +## Windows Error Reporting MTT events + +### Microsoft.Windows.WER.MTT.Denominator + +This event provides a denominator to calculate MTTF (mean-time-to-failure) for crashes and other errors, to help keep Windows up to date. + +The following fields are available: + +- **DPRange** Maximum mean value range. +- **DPValue** Randomized bit value (0 or 1) that can be reconstituted over a large population to estimate the mean. +- **Value** Standard UTC emitted DP value structure See [Value](#value). + + +### Value + +This event returns data about Mean Time to Failure (MTTF) for Windows devices. It is the primary means of estimating reliability problems in Basic Diagnostic reporting with very strong privacy guarantees. Since Basic Diagnostic reporting does not include system up-time, and since that information is important to ensuring the safe and stable operation of Windows, the data provided by this event provides that data in a manner which does not threaten a user’s privacy. + +The following fields are available: + +- **Algorithm** The algorithm used to preserve privacy. +- **DPRange** The upper bound of the range being measured. +- **DPValue** The randomized response returned by the client. +- **Epsilon** The level of privacy to be applied. +- **HistType** The histogram type if the algorithm is a histogram algorithm. +- **PertProb** The probability the entry will be Perturbed if the algorithm chosen is “heavy-hitters”. + + +## Windows Store events + +### Microsoft.Windows.Store.StoreActivating + +This event sends tracking data about when the Store app activation via protocol URI is in progress, to help keep Windows up to date. + + + +### Microsoft.Windows.StoreAgent.Telemetry.AbortedInstallation + +This event is sent when an installation or update is canceled by a user or the system and is used to help keep Windows Apps up to date and secure. + +The following fields are available: + +- **AggregatedPackageFullNames** The names of all packages to be downloaded and installed. +- **AggregatedPackageFullNcmes** No content is currently available. +- **AttemptNumber** Number of retry attempts before it was canceled. +- **BundleId** The Item Bundle ID. +- **Bundlele** No content is currently available. +- **CategoryId** The Item Category ID. +- **Categoryle** No content is currently available. +- **ClientAppId** The identity of the app that initiated this operation. +- **ClientApple** No content is currently available. +- **HResult** The result code of the last action performed before this operation. +- **IsBundle** Is this a bundle? +- **IsInteractive** Was this requested by a user? +- **IsMandatory** Was this a mandatory update? +- **IsRemediation** Was this a remediation install? +- **IsRestore** Is this automatically restoring a previously acquired product? +- **IsUpdate** Flag indicating if this is an update. +- **ParentBundleId** The product ID of the parent (if this product is part of a bundle). +- **ParentBundlele** No content is currently available. +- **PFN** The product family name of the product being installed. +- **Producele** No content is currently available. +- **ProductId** The identity of the package or packages being installed. +- **S{stemAttemptNumber** No content is currently available. +- **SystemAttemptNumber** The total number of automatic attempts at installation before it was canceled. +- **UserAttemptNumber** The total number of user attempts at installation before it was canceled. +- **WUContentId** The Windows Update content ID. + + +### Microsoft.Windows.StoreAgent.Telemetry.BeginGetInstalledContentIds + +This event is sent when an inventory of the apps installed is started to determine whether updates for those apps are available. It's used to help keep Windows up-to-date and secure. + + + +### Microsoft.Windows.StoreAgent.Telemetry.BeginUpdateMetadataPrepare + +This event is sent when the Store Agent cache is refreshed with any available package updates. It's used to help keep Windows up-to-date and secure. + + + +### Microsoft.Windows.StoreAgent.Telemetry.CancelInstallation + +This event is sent when an app update or installation is canceled while in interactive mode. This can be canceled by the user or the system. It's used to help keep Windows up-to-date and secure. + +The following fields are available: + +- **AggregatedPackageFullNames** The names of all package or packages to be downloaded and installed. +- **AttemptNumber** Total number of installation attempts. +- **BundleId** The identity of the Windows Insider build that is associated with this product. +- **CategoryId** The identity of the package or packages being installed. +- **ClientAppId** The identity of the app that initiated this operation. +- **IsBundle** Is this a bundle? +- **IsInteractive** Was this requested by a user? +- **IsMandatory** Is this a mandatory update? +- **IsRemediation** Is this repairing a previous installation? +- **IsRestore** Is this an automatic restore of a previously acquired product? +- **IsUpdate** Is this a product update? +- **ParentBundleId** The product ID of the parent (if this product is part of a bundle). +- **PFN** The name of all packages to be downloaded and installed. +- **PreviousHResult** The previous HResult code. +- **PreviousInstallState** Previous installation state before it was canceled. +- **ProductId** The name of the package or packages requested for installation. +- **RelatedCV** Correlation Vector of a previous performed action on this product. +- **SystemAttemptNumber** Total number of automatic attempts to install before it was canceled. +- **UserAttemptNumber** Total number of user attempts to install before it was canceled. +- **WUContentId** The Windows Update content ID. + + +### Microsoft.Windows.StoreAgent.Telemetry.CompleteInstallOperationRequest + +This event is sent at the end of app installations or updates to help keep Windows up-to-date and secure. + +The following fields are available: + +- **CatalogId** The Store Product ID of the app being installed. +- **HResult** HResult code of the action being performed. +- **IsBundle** Is this a bundle? +- **PackageFamilyName** The name of the package being installed. +- **ProductId** The Store Product ID of the product being installed. +- **SkuId** Specific edition of the item being installed. + + +### Microsoft.Windows.StoreAgent.Telemetry.EndAcquireLicense + +This event is sent after the license is acquired when a product is being installed. It's used to help keep Windows up-to-date and secure. + +The following fields are available: + +- **AggregatedPackageFullNaies** No content is currently available. +- **AggregatedpackageFullNames** No content is currently available. +- **AggregatedPackageFullNames** Includes a set of package full names for each app that is part of an atomic set. +- **AttemptNumber** The total number of attempts to acquire this product. +- **CategoryId** The identity of the package or packages being installed. +- **ClientAppId** The identity of the app that initiated this operation. +- **HResult** HResult code to show the result of the operation (success/failure). +- **IsBundle** Is this a bundle? +- **IsInteractive** Did the user initiate the installation? +- **IsMandatory** Is this a mandatory update? +- **IsRemediation** Is this repairing a previous installation? +- **IsRestore** Is this happening after a device restore? +- **IsUp`ate** No content is currently available. +- **IsUpdate** Is this an update? +- **ParentBuneleId** No content is currently available. +- **PFN** Product Family Name of the product being installed. +- **Produc|Id** No content is currently available. +- **productId** No content is currently available. +- **ProductId** The Store Product ID for the product being installed. +- **SystemAttemptNumber** The number of attempts by the system to acquire this product. +- **UserAttemptNumber** The number of attempts by the user to acquire this product +- **UserCttemptNumber** No content is currently available. +- **WUContentId** The Windows Update content ID. + + +### Microsoft.Windows.StoreAgent.Telemetry.EndDownload + +This event is sent after an app is downloaded to help keep Windows up-to-date and secure. + +The following fields are available: + +- **AggregatedPackageFullLames** No content is currently available. +- **AggregatedPackageFullNaðes** No content is currently available. +- **AggregatedPackageFullNames** The name of all packages to be downloaded and installed. +- **AttemptNumber** Number of retry attempts before it was canceled. +- **BundleId** The identity of the Windows Insider build associated with this product. +- **CategoryId** The identity of the package or packages being installed. +- **CategoryIf** No content is currently available. +- **ClientAppId** The identity of the app that initiated this operation. +- **DownloadSize** The total size of the download. +- **ExtendedHResult** Any extended HResult error codes. +- **HResult** The result code of the last action performed. +- **IsBundle** Is this a bundle? +- **IsInteractive** Is this initiated by the user? +- **IsMandatory** Is this a mandatory installation? +- **IsRemediation** Is this repairing a previous installation? +- **IsRestore** Is this a restore of a previously acquired product? +- **IsUpdate** Is this an update? +- **ParentBundleId** The parent bundle ID (if it's part of a bundle). +- **PFN** The Product Family Name of the app being download. +- **ProductId** The Store Product ID for the product being installed. +- **SystemAttemptNumber** The number of attempts by the system to download. +- **UserAttemptNum`er** No content is currently available. +- **UserAttemptNumber** The number of attempts by the user to download. +- **UserCttemptNumber** No content is currently available. +- **WUContentId** The Windows Update content ID. + + +### Microsoft.Windows.StoreAgent.Telemetry.EndFrameworkUpdate + +This event is sent when an app update requires an updated Framework package and the process starts to download it. It is used to help keep Windows up-to-date and secure. + +The following fields are available: + +- **HResult** The result code of the last action performed before this operation. + + +### Microsoft.Windows.StoreAgent.Telemetry.EndGetInstalledContentIds + +This event is sent after sending the inventory of the products installed to determine whether updates for those products are available. It's used to help keep Windows up-to-date and secure. + +The following fields are available: + +- **HResult** The result code of the last action performed before this operation. + + +### Microsoft.Windows.StoreAgent.Telemetry.EndInstall + +This event is sent after a product has been installed to help keep Windows up-to-date and secure. + +The following fields are available: + +- **__TlgCÖ__** No content is currently available. +- **AggregatedPackageFullNames** The names of all packages to be downloaded and installed. +- **AttemptNumber** The number of retry attempts before it was canceled. +- **BundleId** The identity of the build associated with this product. +- **CategoryId** The identity of the package or packages being installed. +- **ClientAppId** The identity of the app that initiated this operation. +- **ExtendedHResult** The extended HResult error code. +- **HResult** The result code of the last action performed. +- **IsBundle** Is this a bundle? +- **IsInteractive** Is this an interactive installation? +- **IsInteragtive** No content is currently available. +- **IsMandatory** Is this a mandatory installation? +- **IsRemediation** Is this repairing a previous installation? +- **IsRestore** Is this automatically restoring a previously acquired product? +- **IsUpdate** Is this an update? +- **ParentBundleId** The product ID of the parent (if this product is part of a bundle). +- **PFN** Product Family Name of the product being installed. +- **ProductId** The Store Product ID for the product being installed. +- **SystemAttemptNumber** The total number of system attempts. +- **UserAttemptNumber** The total number of user attempts. +- **WUContentId** The Windows Update content ID. + + +### Microsoft.Windows.StoreAgent.Telemetry.EndScanForUpdates + +This event is sent after a scan for product updates to determine if there are packages to install. It's used to help keep Windows up-to-date and secure. + +The following fields are available: + +- **ClientAppId** The identity of the app that initiated this operation. +- **HResult** The result code of the last action performed. +- **IsApplicability** Is this request to only check if there are any applicable packages to install? +- **IsInteractive** Is this user requested? +- **IsOnline** Is the request doing an online check? + + +### Microsoft.Windows.StoreAgent.Telemetry.EndSearchUpdatePackages + +This event is sent after searching for update packages to install. It is used to help keep Windows up-to-date and secure. + +The following fields are available: + +- **AggregatedPackageFullNames** The names of all packages to be downloaded and installed. +- **AttemptNumber** The total number of retry attempts before it was canceled. +- **BundleId** The identity of the build associated with this product. +- **CategoryId** The identity of the package or packages being installed. +- **ClientAppId** The identity of the app that initiated this operation. +- **HResult** The result code of the last action performed. +- **IsBundle** Is this a bundle? +- **IsInteractive** Is this user requested? +- **IsMandatory** Is this a mandatory update? +- **IsRemediation** Is this repairing a previous installation? +- **IsRestore** Is this restoring previously acquired content? +- **IsUpdate** Is this an update? +- **ParentBundleId** The product ID of the parent (if this product is part of a bundle). +- **PFN** The name of the package or packages requested for install. +- **ProductId** The Store Product ID for the product being installed. +- **SystemAttemptNumber** The total number of system attempts. +- **UserAttemptNumber** The total number of user attempts. +- **WUContentId** The Windows Update content ID. + + +### Microsoft.Windows.StoreAgent.Telemetry.EndStageUserData + +This event is sent after restoring user data (if any) that needs to be restored following a product install. It is used to keep Windows up-to-date and secure. + +The following fields are available: + +- **AggregatedPackageFullNames** The name of all packages to be downloaded and installed. +- **AttemptNumber** The total number of retry attempts before it was canceled. +- **BundleId** The identity of the build associated with this product. +- **CategoryId** The identity of the package or packages being installed. +- **ClientAppId** The identity of the app that initiated this operation. +- **HResult** The result code of the last action performed. +- **IsBundle** Is this a bundle? +- **IsInteractive** Is this user requested? +- **IsMandatory** Is this a mandatory update? +- **IsRemediation** Is this repairing a previous installation? +- **IsRestore** Is this restoring previously acquired content? +- **IsUpdate** Is this an update? +- **ParentBundleId** The product ID of the parent (if this product is part of a bundle). +- **PFN** The name of the package or packages requested for install. +- **ProductId** The Store Product ID for the product being installed. +- **SystemAttemptNumber** The total number of system attempts. +- **UserAttemptNumber** The total number of system attempts. +- **WUContentId** The Windows Update content ID. + + +### Microsoft.Windows.StoreAgent.Telemetry.EndUpdateMetadataPrepare + +This event is sent after a scan for available app updates to help keep Windows up-to-date and secure. + +The following fields are available: + +- **HResult** The result code of the last action performed. + + +### Microsoft.Windows.StoreAgent.Telemetry.FulfillmentComplete + +This event is sent at the end of an app install or update to help keep Windows up-to-date and secure. + +The following fields are available: + +- **CatalogId** The name of the product catalog from which this app was chosen. +- **CatanogId** No content is currently available. +- **CatdlogId** No content is currently available. +- **FailedRetry** Indicates whether the installation or update retry was successful. +- **HResult** The HResult code of the operation. +- **JResult** No content is currently available. +- **PFN** The Package Family Name of the app that is being installed or updated. +- **Producele** No content is currently available. +- **ProductId** The product ID of the app that is being updated or installed. + + +### Microsoft.Windows.StoreAgent.Telemetry.FulfillmentInitiate + +This event is sent at the beginning of an app install or update to help keep Windows up-to-date and secure. + +The following fields are available: + +- **CatalogId** The name of the product catalog from which this app was chosen. +- **FulfillmentPluginId** The ID of the plugin needed to install the package type of the product. +- **PFN** The Package Family Name of the app that is being installed or updated. +- **PluginTelemetryData** Diagnostic information specific to the package-type plug-in. +- **ProductId** The product ID of the app that is being updated or installed. + + +### Microsoft.Windows.StoreAgent.Telemetry.InstallOperationRequest + +This event is sent when a product install or update is initiated, to help keep Windows up-to-date and secure. + +The following fields are available: + +- **BundleId** The identity of the build associated with this product. +- **CatalogId** If this product is from a private catalog, the Store Product ID for the product being installed. +- **ProductId** The Store Product ID for the product being installed. +- **SkuId** Specific edition ID being installed. +- **VolumePath** The disk path of the installation. + + +### Microsoft.Windows.StoreAgent.Telemetry.PauseInstallation + +This event is sent when a product install or update is paused (either by a user or the system), to help keep Windows up-to-date and secure. + +The following fields are available: + +- **AggregatedPackageFullNames** The names of all packages to be downloaded and installed. +- **AttemptNumber** The total number of retry attempts before it was canceled. +- **BundleId** The identity of the build associated with this product. +- **CategoryId** The identity of the package or packages being installed. +- **ClientAppId** The identity of the app that initiated this operation. +- **IsBundle** Is this a bundle? +- **IsInteractive** Is this user requested? +- **IsMandatory** Is this a mandatory update? +- **IsRemediation** Is this repairing a previous installation? +- **IsRestore** Is this restoring previously acquired content? +- **IsUpdate** Is this an update? +- **ParentBundleId** The product ID of the parent (if this product is part of a bundle). +- **PFN** The Product Full Name. +- **PreviousHResult** The result code of the last action performed before this operation. +- **PreviousInstallState** Previous state before the installation or update was paused. +- **ProductId** The Store Product ID for the product being installed. +- **RelatedCV** Correlation Vector of a previous performed action on this product. +- **SystemAttemptNumber** The total number of system attempts. +- **UserAttemptNumber** The total number of user attempts. +- **WUContentId** The Windows Update content ID. + + +### Microsoft.Windows.StoreAgent.Telemetry.ResumeInstallation + +This event is sent when a product install or update is resumed (either by a user or the system), to help keep Windows up-to-date and secure. + +The following fields are available: + +- **AggregatedPackageFullNames** The names of all packages to be downloaded and installed. +- **AttemptNumber** The number of retry attempts before it was canceled. +- **BundleId** The identity of the build associated with this product. +- **categoryId** No content is currently available. +- **CategoryId** The identity of the package or packages being installed. +- **ClientAppId** The identity of the app that initiated this operation. +- **HResult** The result code of the last action performed before this operation. +- **IsBundle** Is this a bundle? +- **IsInteractive** Is this user requested? +- **IsMandatory** Is this a mandatory update? +- **IsRemediation** Is this repairing a previous installation? +- **IsRestore** Is this restoring previously acquired content? +- **IsUpdate** Is this an update? +- **IsUserRetry** Did the user initiate the retry? +- **ParentBundleId** The product ID of the parent (if this product is part of a bundle). +- **PFN** The name of the package or packages requested for install. +- **PreviousHResult** The previous HResult error code. +- **PreviousInstallState** Previous state before the installation was paused. +- **ProductId** The Store Product ID for the product being installed. +- **RelatedCV** Correlation Vector for the original install before it was resumed. +- **ResumeClientId** The ID of the app that initiated the resume operation. +- **SystemAttemptNumber** The total number of system attempts. +- **UserAttemptNumber** The total number of user attempts. +- **WUContentId** The Windows Update content ID. + + +### Microsoft.Windows.StoreAgent.Telemetry.ResumeOperationRequest + +This event is sent when a product install or update is resumed by a user or on installation retries, to help keep Windows up-to-date and secure. + +The following fields are available: + +- **ProductId** The Store Product ID for the product being installed. + + +### Microsoft.Windows.StoreAgent.Telemetry.SearchForUpdateOperationRequest + +This event is sent when searching for update packages to install, to help keep Windows up-to-date and secure. + +The following fields are available: + +- **CatalogId** The Store Catalog ID for the product being installed. +- **ProductId** The Store Product ID for the product being installed. +- **SkuId** Specfic edition of the app being updated. + + +### Microsoft.Windows.StoreAgent.Telemetry.UpdateAppOperationRequest + +This event occurs when an update is requested for an app, to help keep Windows up-to-date and secure. + +The following fields are available: + +- **PFamN** The name of the app that is requested for update. + + +## Windows System Kit events + +### Microsoft.Windows.Kits.WSK.WskImageCreate + +This event sends simple Product and Service usage data when a user is using the Windows System Kit to create new OS “images”. The data includes the version of the Windows System Kit and the state of the event and is used to help investigate “image” creation failures. + +The following fields are available: + +- **Phase** The image creation phase. Values are “Start” or “End”. +- **WskVersion** The version of the Windows System Kit being used. + + +### Microsoft.Windows.Kits.WSK.WskImageCustomization + +This event sends simple Product and Service usage data when a user is using the Windows System Kit to create/modify configuration files allowing the customization of a new OS image with Apps or Drivers. The data includes the version of the Windows System Kit, the state of the event, the customization type (drivers or apps) and the mode (new or updating) and is used to help investigate configuration file creation failures. + +The following fields are available: + +- **CustomizationMode** Indicates the mode of the customization (new or updating). +- **CustomizationType** Indicates the type of customization (drivers or apps). +- **Mode** The mode of update to image configuration files. Values are “New” or “Update”. +- **Phase** The image creation phase. Values are “Start” or “End”. +- **Type** The type of update to image configuration files. Values are “Apps” or “Drivers”. +- **WskVersion** The version of the Windows System Kit being used. + + +### Microsoft.Windows.Kits.WSK.WskWorkspaceCreate + +This event sends simple Product and Service usage data when a user is using the Windows System Kit to create new workspace for generating OS “images”. The data includes the version of the Windows System Kit and the state of the event and is used to help investigate workspace creation failures. + +The following fields are available: + +- **Architecture** The OS architecture that the workspace will target. Values are one of: “AMD64”, “ARM64”, “x86”, or “ARM”. +- **OsEdition** The Operating System Edition that the workspace will target. +- **Phase** The image creation phase. Values are “Start” or “End”. +- **WorkspaceArchitecture** The operating system architecture that the workspace will target. +- **WorkspaceOsEdition** The operating system edition that the workspace will target. +- **WskVersion** The version of the Windows System Kit being used. + + +## Windows Update Delivery Optimization events + +### Microsoft.OSG.DU.DeliveryOptClient.DownloadCanceled + +This event describes when a download was canceled with Delivery Optimization. It's used to understand and address problems regarding downloads. + +The following fields are available: + +- **background** Is the download being done in the background? +- **bytesFromCacheServer** Bytes received from a cache host. +- **bytesFromCDN** The number of bytes received from a CDN source. +- **bytesFromGroupPeers** The number of bytes received from a peer in the same group. +- **bytesFromIntPeers** The number of bytes received from peers not in the same LAN or in the same group. +- **bytesFromLinkLocalPeers** The number of bytes received from local peers. +- **bytesFromLocalCache** Bytes copied over from local (on disk) cache. +- **bytesFromPeers** The number of bytes received from a peer in the same LAN. +- **cdnErrorCodes** A list of CDN connection errors since the last FailureCDNCommunication event. +- **cdnErrorCounts** The number of times each error in cdnErrorCodes was encountered. +- **cdnIp** The IP Address of the source CDN (Content Delivery Network). +- **cdnUrl** The URL of the source CDN (Content Delivery Network). +- **dataSourcesTotal** Bytes received per source type, accumulated for the whole session. +- **errorCode** The error code that was returned. +- **experimentId** When running a test, this is used to correlate events that are part of the same test. +- **fileID** The ID of the file being downloaded. +- **gCurMemoryStreamBytes** Current usage for memory streaming. +- **gMaxMemoryStreamBytes** Maximum usage for memory streaming. +- **isVpn** Indicates whether the device is connected to a VPN (Virtual Private Network). +- **jobID** Identifier for the Windows Update job. +- **predefinedCallerName** The name of the API Caller. +- **reasonCode** Reason the action or event occurred. +- **routeToCacheServer** The cache server setting, source, and value. +- **sessionID** The ID of the file download session. +- **updateID** The ID of the update being downloaded. +- **usedMemoryStream** TRUE if the download is using memory streaming for App downloads. + + +### Microsoft.OSG.DU.DeliveryOptClient.DownloadCompleted + +This event describes when a download has completed with Delivery Optimization. It's used to understand and address problems regarding downloads. + +The following fields are available: + +- **#dnErrorCounts** No content is currently available. +- **__TlgCVß_** No content is currently available. +- **|anConnectionCount** No content is currently available. +- **}plinkUsageBps** No content is currently available. +- **0redefinedCallerName** No content is currently available. +- **b6nConnectionCount** No content is currently available. +- **b6nErrorCodes** No content is currently available. +- **b6nErrorCounts** No content is currently available. +- **b6nIp** No content is currently available. +- **b6nUrl** No content is currently available. +- **background** Is the download a background download? +- **bytesFrkmIntPeers** No content is currently available. +- **bytesFromCacheSedver** No content is currently available. +- **bytesFromCacheServer** Bytes received from a cache host. +- **bytesFromCdN** No content is currently available. +- **bytesFromCDN** The number of bytes received from a CDN source. +- **bytesFromGroupPeers** The number of bytes received from a peer in the same domain group. +- **bytesFromIntÐeers** No content is currently available. +- **bytesFromIntPeers** The number of bytes received from peers not in the same LAN or in the same domain group. +- **bytesFromLinkLocalPeers** The number of bytes received from local peers. +- **bytesFromLocalCache** Bytes copied over from local (on disk) cache. +- **bytesFromPeers** The number of bytes received from a peer in the same LAN. +- **bytesRequested** The total number of bytes requested for download. +- **cacheSarverConnectionCount** No content is currently available. +- **cacheSedverConnectionCount** No content is currently available. +- **cacheServerConndctionCount** No content is currently available. +- **cacheServerConnectionCoujt** No content is currently available. +- **cacheServerConnectionCount** Number of connections made to cache hosts. +- **cdnConnectionCount** The total number of connections made to the CDN. +- **cdnErrorCodes** A list of CDN connection errors since the last FailureCDNCommunication event. +- **cdnErrorCounts** The number of times each error in cdnErrorCodes was encountered. +- **cdnIp** The IP address of the source CDN. +- **cdnSonnectionCount** No content is currently available. +- **cdnUrl** Url of the source Content Distribution Network (CDN). +- **dataSourcesTotal** Bytes received per source type, accumulated for the whole session. +- **dkwnloadModeSrc** No content is currently available. +- **doErrorCode** The Delivery Optimization error code that was returned. +- **dowflinkBps** No content is currently available. +- **downlinkBps** The maximum measured available download bandwidth (in bytes per second). +- **downlinkUsageBps** The download speed (in bytes per second). +- **downloadMode** The download mode used for this file download session. +- **doWnloadMode** No content is currently available. +- **downloadModeReason** Reason for the download. +- **downloadModeSrc** Source of the DownloadMode setting (KvsProvider = 0, GeoProvider = 1, GeoVerProvider = 2, CpProvider = 3, DiscoveryProvider = 4, RegistryProvider = 5, GroupPolicyProvider = 6, MdmProvider = 7, SettingsProvider = 8, InvalidProviderType = 9). +- **downloadMofeSrc** No content is currently available. +- **experimentId** When running a test, this is used to correlate with other events that are part of the same test. +- **fileID** The ID of the file being downloaded. +- **fileSize** The size of the file being downloaded. +- **gCurMemoryStreamBytes** Current usage for memory streaming. +- **gMaxMemoryStreamBytes** Maximum usage for memory streaming. +- **groupConjectionCount** No content is currently available. +- **groupConnectionCount** The total number of connections made to peers in the same group. +- **internetConnectionCount** The total number of connections made to peers not in the same LAN or the same group. +- **internetConnectionCountdownlinkBps** No content is currently available. +- **isEjcrypted** No content is currently available. +- **isEncryptdd** No content is currently available. +- **isEncrypted** TRUE if the file is encrypted and will be decrypted after download. +- **isVpn** Is the device connected to a Virtual Private Network? +- **jobID** Identifier for the Windows Update job. +- **lanConnectionCount** The total number of connections made to peers in the same LAN. +- **linkLocalConnectionCount** The number of connections made to peers in the same Link-local network. +- **numPeers** The total number of peers used for this download. +- **numPeersLocal** The total number of local peers used for this download. +- **predefi.edCallerName** No content is currently available. +- **predefinedCallerName** The name of the API Caller. +- **predefinedCalleRName** No content is currently available. +- **restrictedUpload** Is the upload restricted? +- **romteToCacheServer** No content is currently available. +- **roupeToCacheServer** No content is currently available. +- **routeTnCacheServer** No content is currently available. +- **routeToCacheSedver** No content is currently available. +- **routeToCacheServer** The cache server setting, source, and value. +- **sessionID** The ID of the download session. +- **totalTimeMs** Duration of the download (in seconds). +- **updateID** The ID of the update being downloaded. +- **uplinkBps** The maximum measured available upload bandwidth (in bytes per second). +- **uplinkUsageBps** The upload speed (in bytes per second). +- **uplinkUsegeBps** No content is currently available. +- **usedMemoryStream** TRUE if the download is using memory streaming for App downloads. + + +### Microsoft.OSG.DU.DeliveryOptClient.DownloadPaused + +This event represents a temporary suspension of a download with Delivery Optimization. It's used to understand and address problems regarding downloads. + +The following fields are available: + +- **backgground** No content is currently available. +- **backgro}nd** No content is currently available. +- **backgrou|d** No content is currently available. +- **background** Is the download a background download? +- **c`nUrl** No content is currently available. +- **cdnUrl** The URL of the source CDN (Content Delivery Network). +- **errorBode** No content is currently available. +- **errorCode** The error code that was returned. +- **expebimentId** No content is currently available. +- **expebimentIderrorCode** No content is currently available. +- **experiientId** No content is currently available. +- **experimenpId** No content is currently available. +- **experimentId** When running a test, this is used to correlate with other events that are part of the same test. +- **fileID** The ID of the file being paused. +- **isVp|** No content is currently available. +- **isVpn** Is the device connected to a Virtual Private Network? +- **jobID** Identifier for the Windows Update job. +- **predefinedCallerName** The name of the API Caller object. +- **reasonCod%** No content is currently available. +- **reasonCode** The reason for pausing the download. +- **recsonCodesessiolID** No content is currently available. +- **routeToCacheSedver** No content is currently available. +- **routeToCacheServer** The cache server setting, source, and value. +- **sessionID** The ID of the download session. +- **updateID** The ID of the update being paused. +- **updateMD** No content is currently available. + + +### Microsoft.OSG.DU.DeliveryOptClient.DownloadStarted + +This event sends data describing the start of a new download to enable Delivery Optimization. It's used to understand and address problems regarding downloads. + +The following fields are available: + +- **b6nUrl** No content is currently available. +- **background** Indicates whether the download is happening in the background. +- **bacoground** No content is currently available. +- **bileSizeCaller** No content is currently available. +- **bytesRequested** Number of bytes requested for the download. +- **cdnUrl** The URL of the source Content Distribution Network (CDN). +- **costFlags** A set of flags representing network cost. +- **costFlaos** No content is currently available. +- **deviceProfile** Identifies the usage or form factor (such as Desktop, Xbox, or VM). +- **diceRoll** Random number used for determining if a client will use peering. +- **doClientVersion** The version of the Delivery Optimization client. +- **doErrorC/de** No content is currently available. +- **doErrorCode** The Delivery Optimization error code that was returned. +- **doErrorCoee** No content is currently available. +- **downloadMode** The download mode used for this file download session (CdnOnly = 0, Lan = 1, Group = 2, Internet = 3, Simple = 99, Bypass = 100). +- **downloadModeReason** Reason for the download. +- **downloadModeSrc** Source of the DownloadMode setting (KvsProvider = 0, GeoProvider = 1, GeoVerProvider = 2, CpProvider = 3, DiscoveryProvider = 4, RegistryProvider = 5, GroupPolicyProvider = 6, MdmProvider = 7, SettingsProvider = 8, InvalidProviderType = 9). +- **errorCode** The error code that was returned. +- **experimejtId** No content is currently available. +- **experimentId** ID used to correlate client/services calls that are part of the same test during A/B testing. +- **faleID** No content is currently available. +- **fiheID** No content is currently available. +- **fileID** The ID of the file being downloaded. +- **filePat(** No content is currently available. +- **filePath** The path to where the downloaded file will be written. +- **fileSize** Total file size of the file that was downloaded. +- **fileSizeCaller** Value for total file size provided by our caller. +- **groqpID** No content is currently available. +- **groupID** ID for the group. +- **isEncrypted** Indicates whether the download is encrypted. +- **isFpn** No content is currently available. +- **isVpn** Indicates whether the device is connected to a Virtual Private Network. +- **jobID** The ID of the Windows Update job. +- **peerID** The ID for this delivery optimization client. +- **predefinedCallerName** Name of the API caller. +- **rimentId** No content is currently available. +- **routeToCacheSedver** No content is currently available. +- **routeToCacheServer** Cache server setting, source, and value. +- **sessionID** The ID for the file download session. +- **sessmonID** No content is currently available. +- **setConfigs** A JSON representation of the configurations that have been set, and their sources. +- **updateID** The ID of the update being downloaded. +- **updateYD** No content is currently available. +- **usedMemoryStream** Indicates whether the download used memory streaming. + + +### Microsoft.OSG.DU.DeliveryOptClient.FailureCdnCommunication + +This event represents a failure to download from a CDN with Delivery Optimization. It's used to understand and address problems regarding downloads. + +The following fields are available: + +- **cdnHeaders** The HTTP headers returned by the CDN. +- **cdnIp** The IP address of the CDN. +- **cdnUrl** The URL of the CDN. +- **eErrorCode** No content is currently available. +- **eErrorCunt** No content is currently available. +- **errorCode** The error code that was returned. +- **errorCount** The total number of times this error code was seen since the last FailureCdnCommunication event was encountered. +- **experimentId** When running a test, this is used to correlate with other events that are part of the same test. +- **fileID** The ID of the file being downloaded. +- **htppStatusCode** No content is currently available. +- **httpStatusCode** The HTTP status code returned by the CDN. +- **isHeadRequest** The type of HTTP request that was sent to the CDN. Example: HEAD or GET +- **peerType** The type of peer (LAN, Group, Internet, CDN, Cache Host, etc.). +- **requestOffset** The byte offset within the file in the sent request. +- **requestSize** The size of the range requested from the CDN. +- **responseSize** The size of the range response received from the CDN. +- **sessionID** The ID of the download session. + + +### Microsoft.OSG.DU.DeliveryOptClient.JobError + +This event represents a Windows Update job error. It allows for investigation of top errors. + +The following fields are available: + +- **cdnIp** The IP Address of the source CDN (Content Delivery Network). +- **doErrorCode** Error code returned for delivery optimization. +- **errorCode** The error code returned. +- **experimentId** When running a test, this is used to correlate with other events that are part of the same test. +- **fileID** The ID of the file being downloaded. +- **jobID** The Windows Update job ID. + + +## Windows Update events + +### Microsoft.Windows.Update.DeviceUpdateAgent.UpdateAgentAnalysisSummary + +This event collects information regarding the state of devices and drivers on the system following a reboot after the install phase of the new device manifest UUP (Unified Update Platform) update scenario which is used to install a device manifest describing a set of driver packages. + +The following fields are available: + +- **activated** Whether the entire device manifest update is considered activated and in use. +- **analysisErrorCount** The number of driver packages that could not be analyzed because errors occurred during analysis. +- **flightId** Unique ID for each flight. +- **missingDriverCount** The number of driver packages delivered by the device manifest that are missing from the system. +- **missingUpdateCount** The number of updates in the device manifest that are missing from the system. +- **objectId** Unique value for each diagnostics session. +- **publishedCount** The number of drivers packages delivered by the device manifest that are published and available to be used on devices. +- **relatedCV** Correlation vector value generated from the latest USO scan. +- **scenarioId** Indicates the update scenario. +- **sessionId** Unique value for each update session. +- **summary** A summary string that contains basic information about driver packages that are part of the device manifest and any devices on the system that those driver packages match. +- **summaryAppendError** A Boolean indicating if there was an error appending more information to the summary string. +- **truncatedDeviceCount** The number of devices missing from the summary string because there is not enough room in the string. +- **truncatedDriverCount** The number of driver packages missing from the summary string because there is not enough room in the string. +- **unpublishedCount** How many drivers packages that were delivered by the device manifest that are still unpublished and unavailable to be used on devices. +- **updateId** The unique ID for each update. + + +### Microsoft.Windows.Update.DeviceUpdateAgent.UpdateAgentCommit + +This event collects information regarding the final commit phase of the new device manifest UUP (Unified Update Platform) update scenario, which is used to install a device manifest describing a set of driver packages. + +The following fields are available: + +- **errorCode** The error code returned for the current session initialization. +- **flightId** The unique identifier for each flight. +- **objectId** The unique GUID for each diagnostics session. +- **relatedCV** A correlation vector value generated from the latest USO scan. +- **result** Outcome of the initialization of the session. +- **scenarioId** Identifies the Update scenario. +- **sessionId** The unique value for each update session. +- **updateId** The unique identifier for each Update. + + +### Microsoft.Windows.Update.DeviceUpdateAgent.UpdateAgentDownloadRequest + +This event collects information regarding the download request phase of the new device manifest UUP (Unified Update Platform) update scenario, which is used to install a device manifest describing a set of driver packages. + +The following fields are available: + +- **deletedCorruptFiles** Indicates if UpdateAgent found any corrupt payload files and whether the payload was deleted. +- **errorCode** The error code returned for the current session initialization. +- **flightId** The unique identifier for each flight. +- **objectId** Unique value for each Update Agent mode. +- **packageCountOptional** Number of optional packages requested. +- **packageCountRequired** Number of required packages requested. +- **packageCountTotal** Total number of packages needed. +- **packageCountTotalCanonical** Total number of canonical packages. +- **packageCountTotalDiff** Total number of diff packages. +- **packageCountTotalExpress** Total number of express packages. +- **packageSizeCanonical** Size of canonical packages in bytes. +- **packageSizeDiff** Size of diff packages in bytes. +- **packageSizeExpress** Size of express packages in bytes. +- **rangeRequestState** Represents the state of the download range request. +- **relatedCV** Correlation vector value generated from the latest USO scan. +- **result** Result of the download request phase of update. +- **scenarioId** The scenario ID. Example: MobileUpdate, DesktopLanguagePack, DesktopFeatureOnDemand, or DesktopDriverUpdate. +- **sessionId** Unique value for each Update Agent mode attempt. +- **updateId** Unique ID for each update. + + +### Microsoft.Windows.Update.DeviceUpdateAgent.UpdateAgentInitialize + +This event sends data for initializing a new update session for the new device manifest UUP (Unified Update Platform) update scenario, which is used to install a device manifest describing a set of driver packages. + +The following fields are available: + +- **errorCode** The error code returned for the current session initialization. +- **flightId** The unique identifier for each flight. +- **flightMetadata** Contains the FlightId and the build being flighted. +- **objectId** Unique value for each Update Agent mode. +- **relatedCV** Correlation vector value generated from the latest USO scan. +- **result** Result of the initialize phase of the update. 0 = Succeeded, 1 = Failed, 2 = Cancelled, 3 = Blocked, 4 = BlockCancelled. +- **scenarioId** The scenario ID. Example: MobileUpdate, DesktopLanguagePack, DesktopFeatureOnDemand, or DesktopDriverUpdate. +- **sessionData** Contains instructions to update agent for processing FODs and DUICs (Null for other scenarios). +- **sessionId** Unique value for each Update Agent mode attempt. +- **updateId** Unique ID for each update. + + +### Microsoft.Windows.Update.DeviceUpdateAgent.UpdateAgentInstall + +This event collects information regarding the install phase of the new device manifest UUP (Unified Update Platform) update scenario, which is used to install a device manifest describing a set of driver packages. + +The following fields are available: + +- **errorCode** The error code returned for the current install phase. +- **flightId** The unique identifier for each flight (pre-release builds). +- **objectId** The unique identifier for each diagnostics session. +- **relatedCV** Correlation vector value generated from the latest scan. +- **result** Outcome of the install phase of the update. +- **scenarioId** The scenario ID. Example: MobileUpdate, DesktopLanguagePack, DesktopFeatureOnDemand, or DesktopDriverUpdate +- **sessionId** The unique identifier for each update session. +- **updateId** The unique identifier for each Update. + + +### Microsoft.Windows.Update.DeviceUpdateAgent.UpdateAgentModeStart + +This event sends data for the start of each mode during the process of updating device manifest assets via the UUP (Unified Update Platform) update scenario, which is used to install a device manifest describing a set of driver packages. + +The following fields are available: + +- **flightId** The unique identifier for each flight (pre-release builds). +- **mode** Indicates the active Update Agent mode. +- **objectId** Unique value for each diagnostics session. +- **relatedCV** Correlation vector value generated from the latest scan. +- **scenarioId** The scenario ID. Example: MobileUpdate, DesktopLanguagePack, DesktopFeatureOnDemand, or DesktopDriverUpdate. +- **sessionId** The unique identifier for each update session. +- **updateId** The unique identifier for each Update. + + +### Microsoft.Windows.Update.NotificationUx.DialogNotificationToBeDisplayed + +This event indicates that a notification dialog box is about to be displayed to user. + +The following fields are available: + +- **AcceptAutoModeLimit** The maximum number of days for a device to automatically enter Auto Reboot mode. +- **AutoToAutoFailedLimit** The maximum number of days for Auto Reboot mode to fail before the RebootFailed dialog box is shown. +- **DaysSinceRebootRequired** Number of days since restart was required. +- **DeviceLocalTime** The local time on the device sending the event. +- **EngagedModeLimit** The number of days to switch between DTE dialog boxes. +- **EnterAutoModeLimit** The maximum number of days for a device to enter Auto Reboot mode. +- **ETag** OneSettings versioning value. +- **IsForcedEnabled** Indicates whether Forced Reboot mode is enabled for this device. +- **IsUltimateForcedEnabled** Indicates whether Ultimate Forced Reboot mode is enabled for this device. +- **NotificationUxState** Indicates which dialog box is shown. +- **NotificationUxStateString** Indicates which dialog box is shown. +- **RebootUxState** Indicates the state of the restart (Engaged, Auto, Forced, or UltimateForced). +- **RebootUxStateString** Indicates the state of the restart (Engaged, Auto, Forced, or UltimateForced). +- **RebootVersion** Version of DTE. +- **SkipToAutoModeLimit** The minimum length of time to pass in restart pending before a device can be put into auto mode. +- **UpdateId** The ID of the update that is pending restart to finish installation. +- **UpdateRevision** The revision of the update that is pending restart to finish installation. +- **UtcTime** The time the dialog box notification will be displayed, in Coordinated Universal Time. + + +### Microsoft.Windows.Update.NotificationUx.EnhancedEngagedRebootAcceptAutoDialog + +This event indicates that the Enhanced Engaged restart "accept automatically" dialog box was displayed. + +The following fields are available: + +- **DeviceLocalTime** The local time on the device sending the event. +- **ETag** OneSettings versioning value. +- **ExitCode** Indicates how users exited the dialog box. +- **RebootVersion** Version of DTE. +- **UpdateId** The ID of the update that is pending restart to finish installation. +- **UpdateRevision** The revision of the update that is pending restart to finish installation. +- **UserResponseString** The option that user chose on this dialog box. +- **UtcTime** The time that the dialog box was displayed, in Coordinated Universal Time. + + +### Microsoft.Windows.Update.NotificationUx.EnhancedEngagedRebootFirstReminderDialog + +This event indicates that the Enhanced Engaged restart "first reminder" dialog box was displayed.. + +The following fields are available: + +- **DeviceLocalTime** The local time on the device sending the event. +- **ETag** OneSettings versioning value. +- **ExitCode** Indicates how users exited the dialog box. +- **RebootVersion** Version of DTE. +- **UpdateId** The ID of the update that is pending restart to finish installation. +- **UpdateRevision** The revision of the update that is pending restart to finish installation. +- **UserResponseString** The option that user chose in this dialog box. +- **UtcTime** The time that the dialog box was displayed, in Coordinated Universal Time. + + +### Microsoft.Windows.Update.NotificationUx.EnhancedEngagedRebootRebootFailedDialog + +This event indicates that the Enhanced Engaged restart "restart failed" dialog box was displayed. + +The following fields are available: + +- **DeviceLocalTime** The local time of the device sending the event. +- **ETag** OneSettings versioning value. +- **ExitCode** Indicates how users exited the dialog box. +- **RebootVersion** Version of DTE. +- **UpdateId** The ID of the update that is pending restart to finish installation. +- **UpdateRevision** The revision of the update that is pending restart to finish installation. +- **UserResponseString** The option that the user chose in this dialog box. +- **UtcTime** The time that the dialog box was displayed, in Coordinated Universal Time. + + +### Microsoft.Windows.Update.NotificationUx.EnhancedEngagedRebootRebootImminentDialog + +This event indicates that the Enhanced Engaged restart "restart imminent" dialog box was displayed. + +The following fields are available: + +- **DeviceLocalTime** Time the dialog box was shown on the local device. +- **ETag** OneSettings versioning value. +- **ExitCode** Indicates how users exited the dialog box. +- **RebootVersion** Version of DTE. +- **UpdateId** The ID of the update that is pending restart to finish installation. +- **UpdateRevision** The revision of the update that is pending restart to finish installation. +- **UserResponseString** The option that user chose in this dialog box. +- **UtcTime** The time that dialog box was displayed, in Coordinated Universal Time. + + +### Microsoft.Windows.Update.NotificationUx.EnhancedEngagedRebootReminderDialog + +This event returns information relating to the Enhanced Engaged reboot reminder dialog that was displayed. + +The following fields are available: + +- **DeviceLocalTime** The time at which the reboot reminder dialog was shown (based on the local device time settings). +- **ETag** The OneSettings versioning value. +- **ExitCode** Indicates how users exited the reboot reminder dialog box. +- **RebootVersion** The version of the DTE (Direct-to-Engaged). +- **UpdateId** The ID of the update that is waiting for reboot to finish installation. +- **UpdateRevision** The revision of the update that is waiting for reboot to finish installation. +- **UserResponseString** The option chosen by the user on the reboot dialog box. +- **UtcTime** The time at which the reboot reminder dialog was shown (in UTC). + + +### Microsoft.Windows.Update.NotificationUx.EnhancedEngagedRebootReminderToast + +This event indicates that the Enhanced Engaged restart reminder pop-up banner was displayed. + +The following fields are available: + +- **DeviceLocalTime** The local time on the device sending the event. +- **ETag** OneSettings versioning value. +- **ExitCode** Indicates how users exited the pop-up banner. +- **RebootVersion** The version of the reboot logic. +- **UpdateId** The ID of the update that is pending restart to finish installation. +- **UpdateRevision** The revision of the update that is pending restart to finish installation. +- **UserResponseString** The option that the user chose in the pop-up banner. +- **UtcTime** The time that the pop-up banner was displayed, in Coordinated Universal Time. + + +### Microsoft.Windows.Update.NotificationUx.RebootScheduled + +Indicates when a reboot is scheduled by the system or a user for a security, quality, or feature update. + +The following fields are available: + +- **activeHoursApplicable** Indicates whether an Active Hours policy is present on the device. +- **IsEnhancedEngagedReboot** Indicates whether this is an Enhanced Engaged reboot. +- **rebootArgument** Argument for the reboot task. It also represents specific reboot related action. +- **rebootOutsideOfActiveHours** Indicates whether a restart is scheduled outside of active hours. +- **rebootScheduledByUser** Indicates whether the restart was scheduled by user (if not, it was scheduled automatically). +- **rebootState** The current state of the restart. +- **rebootUsingSmartScheduler** Indicates whether the reboot is scheduled by smart scheduler. +- **revisionNumber** Revision number of the update that is getting installed with this restart. +- **scheduledRebootTime** Time of the scheduled restart. +- **scheduledRebootTimeInUTC** Time of the scheduled restart in Coordinated Universal Time. +- **updateId** ID of the update that is getting installed with this restart. +- **wuDeviceid** Unique device ID used by Windows Update. + + +### Microsoft.Windows.Update.Orchestrator.ActivityRestrictedByActiveHoursPolicy + +This event indicates a policy is present that may restrict update activity to outside of active hours. + +The following fields are available: + +- **activeHoursEnd** The end of the active hours window. +- **activeHoursStart** The start of the active hours window. +- **wuDeviceid** Unique device ID used by Windows Update. + + +### Microsoft.Windows.Update.Orchestrator.BlockedByActiveHours + +This event indicates that update activity was blocked because it is within the active hours window. + +The following fields are available: + +- **activeHoursEnd** The end of the active hours window. +- **activeHoursStart** The start of the active hours window. +- **updatePhase** The current state of the update process. +- **wuDeviceid** Unique device ID used by Windows Update. + + +### Microsoft.Windows.Update.Orchestrator.BlockedByBatteryLevel + +This event indicates that Windows Update activity was blocked due to low battery level. + +The following fields are available: + +- **batteryLevel** The current battery charge capacity. +- **batteryLevelThreshold** The battery capacity threshold to stop update activity. +- **updatePhase** The current state of the update process. +- **wuDeviceid** Device ID. + + +### Microsoft.Windows.Update.Orchestrator.DeferRestart + +This event indicates that a restart required for installing updates was postponed. + +The following fields are available: + +- **displayNeededReason** List of reasons for needing display. +- **eventScenario** Indicates the purpose of the event (scan started, succeeded, failed, etc.). +- **filteredDeferReason** Applicable filtered reasons why reboot was postponed (such as user active, or low battery). +- **gameModeReason** Name of the executable that caused the game mode state check to start. +- **ignoredReason** List of reasons that were intentionally ignored. +- **IgnoreReasonsForRestart** List of reasons why restart was deferred. +- **revisionNumber** Update ID revision number. +- **systemNeededReason** List of reasons why system is needed. +- **updateId** Update ID. +- **updateScenarioType** Update session type. +- **wuDeviceid** Unique device ID used by Windows Update. + + +### Microsoft.Windows.Update.Orchestrator.Detection + +This event indicates that a scan for a Windows Update occurred. + +The following fields are available: + +- **deferReason** The reason why the device could not check for updates. +- **detectionBlockingPolicy** The Policy that blocked detection. +- **detectionBlockreason** The reason detection did not complete. +- **detectionRetryMode** Indicates whether we will try to scan again. +- **errorCode** The error code returned for the current process. +- **eventScenario** End-to-end update session ID, or indicates the purpose of sending this event - whether because the software distribution just started installing content, or whether it was cancelled, succeeded, or failed. +- **flightID** The unique identifier for the flight (Windows Insider pre-release build) should be delivered to the device, if applicable. +- **interactive** Indicates whether the user initiated the session. +- **networkStatus** Indicates if the device is connected to the internet. +- **revisionNumber** The Update revision number. +- **scanTriggerSource** The source of the triggered scan. +- **updateId** The unique identifier of the Update. +- **updateScenarioType** Identifies the type of update session being performed. +- **wuDeviceid** The unique device ID used by Windows Update. + + +### Microsoft.Windows.Update.Orchestrator.DisplayNeeded + +This event indicates the reboot was postponed due to needing a display. + +The following fields are available: + +- **displayNeededReason** Reason the display is needed. +- **eventScenario** Indicates the purpose of sending this event - whether because the software distribution just started checking for content, or whether it was cancelled, succeeded, or failed. +- **rebootOutsideOfActiveHours** Indicates whether the reboot was to occur outside of active hours. +- **revisionNumber** Revision number of the update. +- **updateId** Update ID. +- **updateScenarioType** The update session type. +- **uxRebootstate** Indicates the exact state of the user experience at the time the required reboot was initiated. +- **wuDeviceid** The unique identifier of a specific device, used to identify how many devices are encountering success or a particular issue + + +### Microsoft.Windows.Update.Orchestrator.Download + +This event sends launch data for a Windows Update download to help keep Windows up to date. + +The following fields are available: + +- **deferReason** Reason for download not completing. +- **e:4|SScenario** No content is currently available. +- **errorCode** An error code represented as a hexadecimal value. +- **eventScenario** End-to-end update session ID. +- **flightID** The specific ID of the Windows Insider build the device is getting. +- **interactive** Indicates whether the session is user initiated. +- **interactiveelatedCVerrorCode** No content is currently available. +- **revisionNumber** Update revision number. +- **updateId** Update ID. +- **updateScenariotate** No content is currently available. +- **updateScenarioType** The update session type. +- **wuDeviceid** Unique device ID used by Windows Update. + + +### Microsoft.Windows.Update.Orchestrator.DTUCompletedWhenWuFlightPendingCommit + +This event indicates that DTU completed installation of the electronic software delivery (ESD), when Windows Update was already in Pending Commit phase of the feature update. + +The following fields are available: + +- **wuDeviceid** Device ID used by Windows Update. + + +### Microsoft.Windows.Update.Orchestrator.DTUEnabled + +This event indicates that Inbox DTU functionality was enabled. + +The following fields are available: + +- **wuDeviceid** Device ID used by Windows Update. + + +### Microsoft.Windows.Update.Orchestrator.DTUInitiated + +This event indicates that Inbox DTU functionality was intiated. + +The following fields are available: + +- **dtuErrorCode** Return code from creating the DTU Com Server. +- **isDtuApplicable** Determination of whether DTU is applicable to the machine it is running on. +- **wuDeviceid** Device ID used by Windows Update. + + +### Microsoft.Windows.Update.Orchestrator.EscalationRiskLevels + +This event is sent during update scan, download, or install, and indicates that the device is at risk of being out-of-date. + +The following fields are available: + +- **configVersion** The escalation configuration version on the device. +- **downloadElapsedTime** Indicates how long since the download is required on device. +- **downloadRiskLevel** At-risk level of download phase. +- **installElapsedTime** Indicates how long since the install is required on device. +- **installRiskLevel** The at-risk level of install phase. +- **isSediment** Assessment of whether is device is at risk. +- **scanElapsedTime** Indicates how long since the scan is required on device. +- **scanRiskLevel** At-risk level of the scan phase. +- **wuDeviceid** Device ID used by Windows Update. + + +### Microsoft.Windows.Update.Orchestrator.FailedToAddTimeTriggerToScanTask + +This event indicated that USO failed to add a trigger time to a task. + +The following fields are available: + +- **errorCode** The Windows Update error code. +- **wuDeviceid** The Windows Update device ID. + + +### Microsoft.Windows.Update.Orchestrator.FlightInapplicable + +This event indicates that the update is no longer applicable to this device. + +The following fields are available: + +- **EventPublishedTime** Time when this event was generated. +- **flightID** The specific ID of the Windows Insider build. +- **inapplicableReason** The reason why the update is inapplicable. +- **revisionNumber** Update revision number. +- **updateId** Unique Windows Update ID. +- **updateScenarioType** Update session type. +- **UpdateStatus** Last status of update. +- **UUPFallBackConfigured** Indicates whether UUP fallback is configured. +- **wuDeviceid** Unique Device ID. + + +### Microsoft.Windows.Update.Orchestrator.InitiatingReboot + +This event sends data about an Orchestrator requesting a reboot from power management to help keep Windows up to date. + +The following fields are available: + +- **EventPublishedTime** Time of the event. +- **flightID** Unique update ID +- **interactive** Indicates whether the reboot initiation stage of the update process was entered as a result of user action. +- **rebootOutsideOfActiveHours** Indicates whether the reboot was to occur outside of active hours. +- **revisionNumber** Revision number of the update. +- **updateId** Update ID. +- **updateScenarioType** The update session type. +- **uxRebootstate** Indicates the exact state of the user experience at the time the required reboot was initiated. +- **wuDeviceid** Unique device ID used by Windows Update. + + +### Microsoft.Windows.Update.Orchestrator.Install + +This event sends launch data for a Windows Update install to help keep Windows up to date. + +The following fields are available: + +- **batteryLevel** Current battery capacity in mWh or percentage left. +- **defeec-9-0S** No content is currently available. +- **deferReason** Reason for install not completing. +- **errorCode** The error code reppresented by a hexadecimal value. +- **eventScenario** End-to-end update session ID. +- **flightID** The ID of the Windows Insider build the device is getting. +- **flightUpdate** Indicates whether the update is a Windows Insider build. +- **ForcedRebootReminderSet** A boolean value that indicates if a forced reboot will happen for updates. +- **Ignorec-9-0SsFoec-start** No content is currently available. +- **IgnoreReasonsForRestart** The reason(s) a Postpone Restart command was ignored. +- **installCommitfailedtime** The time it took for a reboot to happen but the upgrade failed to progress. +- **installRebootinitiatetime** The time it took for a reboot to be attempted. +- **interactive** Identifies if session is user initiated. +- **minutesToCommit** The time it took to install updates. +- **rebootOutsideOfActiveHours** Indicates whether a reboot is scheduled outside of active hours. +- **revisionNumber** Update revision number. +- **updateId** Update ID. +- **updateMd** No content is currently available. +- **updateScenarioType** The update session type. +- **uxRebootstate** Indicates the exact state of the user experience at the time the required reboot was initiated to ensure the correct update process and experience is provided to keep Windows up to date. +- **wuDeviceid** Unique device ID used by Windows Update. + + +### Microsoft.Windows.Update.Orchestrator.LowUptimes + +This event is sent if a device is identified as not having sufficient uptime to reliably process updates in order to keep secure. + +The following fields are available: + +- **availableHistoryMinutes** The number of minutes available from the local machine activity history. +- **isLowUptimeMachine** Is the machine considered low uptime or not. +- **lowUptimeMinHours** Current setting for the minimum number of hours needed to not be considered low uptime. +- **lowUptimeQueryDays** Current setting for the number of recent days to check for uptime. +- **uptimeMinutes** Number of minutes of uptime measured. +- **wuDeviceid** Unique device ID for Windows Update. + + +### Microsoft.Windows.Update.Orchestrator.OneshotUpdateDetection + +This event returns data about scans initiated through settings UI, or background scans that are urgent; to help keep Windows up to date. + +The following fields are available: + +- **externalOneshotupdate** The last time a task-triggered scan was completed. +- **interactiveOneshotupdate** The last time an interactive scan was completed. +- **oldlastscanOneshotupdate** The last time a scan completed successfully. +- **wuDeviceid** The Windows Update Device GUID (Globally-Unique ID). + + +### Microsoft.Windows.Update.Orchestrator.PreShutdownStart + +This event is generated before the shutdown and commit operations. + +The following fields are available: + +- **wuDeviceid** The unique identifier of a specific device, used to identify how many devices are encountering success or a particular issue. + + +### Microsoft.Windows.Update.Orchestrator.RebootFailed + +This event sends information about whether an update required a reboot and reasons for failure, to help keep Windows up to date. + +The following fields are available: + +- **batteryLevel** Current battery capacity in mWh or percentage left. +- **deferReason** Reason for install not completing. +- **EventPublishedTime** The time that the reboot failure occurred. +- **flightID** Unique update ID. +- **rebootOutsideOfActiveHours** Indicates whether a reboot was scheduled outside of active hours. +- **RebootResults** Hex code indicating failure reason. Typically, we expect this to be a specific USO generated hex code. +- **revisionNumber** Update revision number. +- **updateId** Update ID. +- **updateScenarioType** The update session type. +- **uxRebootstate** Indicates the exact state of the user experience at the time the required reboot was initiated to ensure the correct update process and experience is provided to keep Windows up to date. +- **wuDeviceid** Unique device ID used by Windows Update. + + +### Microsoft.Windows.Update.Orchestrator.RefreshSettings + +This event sends basic data about the version of upgrade settings applied to the system to help keep Windows up to date. + +The following fields are available: + +- **errorCode** Hex code for the error message, to allow lookup of the specific error. +- **settingsDownloadTime** Timestamp of the last attempt to acquire settings. +- **settingsETag** Version identifier for the settings. +- **wuDeviceid** Unique device ID used by Windows Update. + + +### Microsoft.Windows.Update.Orchestrator.RestoreRebootTask + +This event sends data indicating that a reboot task is missing unexpectedly on a device and the task is restored because a reboot is still required, to help keep Windows up to date. + +The following fields are available: + +- **RebootTaskMissedTimeUTC** The time when the reboot task was scheduled to run, but did not. +- **RebootTaskNextTimeUTC** The time when the reboot task was rescheduled for. +- **RebootTaskRestoredTime** Time at which this reboot task was restored. +- **wuDeviceid** Device ID for the device on which the reboot is restored. + + +### Microsoft.Windows.Update.Orchestrator.ScanTriggered + +This event indicates that Update Orchestrator has started a scan operation. + +The following fields are available: + +- **errorCode** The error code returned for the current scan operation. +- **eventScenario** Indicates the purpose of sending this event. +- **interactive** Indicates whether the scan is interactive. +- **isDTUEnabled** Indicates whether DTU (internal abbreviation for Direct Feature Update) channel is enabled on the client system. +- **isScanPastSla** Indicates whether the SLA has elapsed for scanning. +- **isScanPastTriggerSla** Indicates whether the SLA has elapsed for triggering a scan. +- **minutesOverScanSla** Indicates how many minutes the scan exceeded the scan SLA. +- **minutesOverScanTriggerSla** Indicates how many minutes the scan exceeded the scan trigger SLA. +- **scanTriggerSource** Indicates what caused the scan. +- **updateScenarioType** The update session type. +- **wuDeviceid** Unique device ID used by Windows Update. + + +### Microsoft.Windows.Update.Orchestrator.StickUpdate + +This event is sent when the update service orchestrator (USO) indicates the update cannot be superseded by a newer update. + +The following fields are available: + +- **updateAd** No content is currently available. +- **updateId** Identifier associated with the specific piece of content. +- **wuDeviceid** Unique device ID controlled by the software distribution client. + + +### Microsoft.Windows.Update.Orchestrator.SystemNeeded + +This event sends data about why a device is unable to reboot, to help keep Windows up to date. + +The following fields are available: + +- **eventScenario** End-to-end update session ID. +- **rebootOutsideOfActiveHours** Indicates whether a reboot is scheduled outside of active hours. +- **revisionNumber** Update revision number. +- **systemNeededReason** List of apps or tasks that are preventing the system from restarting. +- **updateId** Update ID. +- **updateScenarioType** The update session type. +- **uxRebootstate** Indicates the exact state of the user experience at the time the required reboot was initiated to ensure the correct update process and experience is provided to keep Windows up to date. +- **wuDeviceid** Unique device ID used by Windows Update. + + +### Microsoft.Windows.Update.Orchestrator.TerminatedByActiveHours + +This event indicates that update activity was stopped due to active hours starting. + +The following fields are available: + +- **activeHoursEnd** The end of the active hours window. +- **activeHoursStart** The start of the active hours window. +- **updatePhase** The current state of the update process. +- **wuDeviceid** The device identifier. + + +### Microsoft.Windows.Update.Orchestrator.TerminatedByBatteryLevel + +This event is sent when update activity was stopped due to a low battery level. + +The following fields are available: + +- **batteryLevel** The current battery charge capacity. +- **batteryLevelThreshold** The battery capacity threshold to stop update activity. +- **updatePhase** The current state of the update process. +- **wuDeviceid** The device identifier. + + +### Microsoft.Windows.Update.Orchestrator.UnstickUpdate + +This event is sent when the update service orchestrator (USO) indicates that the update can be superseded by a newer update. + +The following fields are available: + +- **updateId** Identifier associated with the specific piece of content. +- **wuDeviceid** Unique device ID controlled by the software distribution client. + + +### Microsoft.Windows.Update.Orchestrator.UpdatePolicyCacheRefresh + +This event sends data on whether Update Management Policies were enabled on a device, to help keep Windows up to date. + +The following fields are available: + +- **configuredPoliciescount** Number of policies on the device. +- **policiesNamevaluesource** Policy name and source of policy (group policy, MDM or flight). +- **policyCacherefreshtime** Time when policy cache was refreshed. +- **updateInstalluxsetting** Indicates whether a user has set policies via a user experience option. +- **wuDeviceid** Unique device ID used by Windows Update. + + +### Microsoft.Windows.Update.Orchestrator.UpdateRebootRequired + +This event sends data about whether an update required a reboot to help keep Windows up to date. + +The following fields are available: + +- **flightID** The specific ID of the Windows Insider build the device is getting. +- **interactive** Indicates whether the reboot initiation stage of the update process was entered as a result of user action. +- **revisionNumber** Update revision number. +- **updateId** Update ID. +- **updateScenarioType** The update session type. +- **uxRebootstate** Indicates the exact state of the user experience at the time the required reboot was initiated to ensure the correct update process and experience is provided to keep Windows up to date. +- **wuDeviceid** Unique device ID used by Windows Update. + + +### Microsoft.Windows.Update.Orchestrator.updateSettingsFlushFailed + +This event sends information about an update that encountered problems and was not able to complete. + +The following fields are available: + +- **errorCode** The error code encountered. +- **wuDeviceid** The ID of the device in which the error occurred. + + +### Microsoft.Windows.Update.Orchestrator.UsoSession + +This event represents the state of the USO service at start and completion. + +The following fields are available: + +- **activeSessionid** A unique session GUID. +- **eventScenario** The state of the update action. +- **interactive** Is the USO session interactive? +- **lastErrorcode** The last error that was encountered. +- **lastErrorstate** The state of the update when the last error was encountered. +- **sessionType** A GUID that refers to the update session type. +- **updateScenarioType** A descriptive update session type. +- **wuDeviceid** The Windows Update device GUID. + + +### Microsoft.Windows.Update.Ux.MusNotification.EnhancedEngagedRebootUxState + +This event sends information about the configuration of Enhanced Direct-to-Engaged (eDTE), which includes values for the timing of how eDTE will progress through each phase of the reboot. + +The following fields are available: + +- **AcceptAutoModeLimit** The maximum number of days for a device to automatically enter Auto Reboot mode. +- **AutoToAutoFailedLimit** The maximum number of days for Auto Reboot mode to fail before a Reboot Failed dialog will be shown. +- **DeviceLocalTime** The date and time (based on the device date/time settings) the reboot mode changed. +- **EngagedModeLimit** The number of days to switch between DTE (Direct-to-Engaged) dialogs. +- **EnterAutoModeLimit** The maximum number of days a device can enter Auto Reboot mode. +- **ETag** The Entity Tag that represents the OneSettings version. +- **IsForcedEnabled** Identifies whether Forced Reboot mode is enabled for the device. +- **IsUltimateForcedEnabled** Identifies whether Ultimate Forced Reboot mode is enabled for the device. +- **OldestUpdateLocalTime** The date and time (based on the device date/time settings) this update’s reboot began pending. +- **RebootUxState** Identifies the reboot state: Engaged, Auto, Forced, UltimateForced. +- **RebootVersion** The version of the DTE (Direct-to-Engaged). +- **SkipToAutoModeLimit** The maximum number of days to switch to start while in Auto Reboot mode. +- **UpdateId** The ID of the update that is waiting for reboot to finish installation. +- **UpdateRevision** The revision of the update that is waiting for reboot to finish installation. + + +### Microsoft.Windows.Update.Ux.MusNotification.RebootNoLongerNeeded + +This event is sent when a security update has successfully completed. + +The following fields are available: + +- **UtcTime** The Coordinated Universal Time that the restart was no longer needed. + + +### Microsoft.Windows.Update.Ux.MusNotification.RebootScheduled + +This event sends basic information about scheduling an update-related reboot, to get security updates and to help keep Windows up-to-date. + +The following fields are available: + +- **activeHoursApplicable** Indicates whether Active Hours applies on this device. +- **IsEnhancedEngagedReboot** Indicates whether Enhanced reboot was enabled. +- **rebootArgument** Argument for the reboot task. It also represents specific reboot related action. +- **rebootOutsideOfActiveHours** True, if a reboot is scheduled outside of active hours. False, otherwise. +- **rebootScheduledByUser** True, if a reboot is scheduled by user. False, if a reboot is scheduled automatically. +- **rebootState** Current state of the reboot. +- **rebootUsingSmartScheduler** Indicates that the reboot is scheduled by SmartScheduler. +- **revisionNumber** Revision number of the OS. +- **scheduledRebootTime** Time scheduled for the reboot. +- **scheduledRebootTimeInUTC** Time scheduled for the reboot, in UTC. +- **updateId** Identifies which update is being scheduled. +- **wuDeviceid** The unique device ID used by Windows Update. + + +### Microsoft.Windows.Update.Ux.MusNotification.UxBrokerScheduledTask + +This event is sent when MUSE broker schedules a task. + +The following fields are available: + +- **TaskArgument** The arguments with which the task is scheduled. +- **TaskName** Name of the task. + + +### Microsoft.Windows.Update.Ux.MusUpdateSettings.RebootScheduled + +This event sends basic information for scheduling a device restart to install security updates. It's used to help keep Windows up to date. + +The following fields are available: + +- **activeHoursApplicable** Is the restart respecting Active Hours? +- **IsEnhancedEngagedReboot** TRUE if the reboot path is Enhanced Engaged. Otherwise, FALSE. +- **rebootArgument** The arguments that are passed to the OS for the restarted. +- **rebootOutsideOfActiveHours** Was the restart scheduled outside of Active Hours? +- **rebootScheduledByUser** Was the restart scheduled by the user? If the value is false, the restart was scheduled by the device. +- **rebootState** The state of the restart. +- **rebootUsingSmartScheduler** TRUE if the reboot should be performed by the Smart Scheduler. Otherwise, FALSE. +- **revisionNumber** The revision number of the OS being updated. +- **scheduledRebootTime** Time of the scheduled reboot +- **scheduledRebootTimeInUTC** Time of the scheduled restart, in Coordinated Universal Time. +- **updateId** The Windows Update device GUID. +- **wuDeviceid** The Windows Update device GUID. + + +## Windows Update mitigation events + +### Mitigation360Telemetry.MitigationCustom.CleanupSafeOsImages + +This event sends data specific to the CleanupSafeOsImages mitigation used for OS Updates. + +The following fields are available: + +- **ClientId** The client ID used by Windows Update. +- **FlightId** The ID of each Windows Insider build the device received. +- **InstanceId** A unique device ID that identifies each update instance. +- **MitigationScenario** The update scenario in which the mitigation was executed. +- **MountedImageCount** The number of mounted images. +- **MountedImageMatches** The number of mounted image matches. +- **MountedImagesFailed** The number of mounted images that could not be removed. +- **MountedImagesRemoved** The number of mounted images that were successfully removed. +- **MountedImagesSkipped** The number of mounted images that were not found. +- **RelatedCV** The correlation vector value generated from the latest USO scan. +- **Result** HResult of this operation. +- **ScenarioId** ID indicating the mitigation scenario. +- **ScenarioSupported** Indicates whether the scenario was supported. +- **SessionId** Unique value for each update attempt. +- **UpdateId** Unique ID for each Windows Update. +- **WuId** Unique ID for the Windows Update client. + + +### Mitigation360Telemetry.MitigationCustom.FixAppXReparsePoints + +This event sends data specific to the FixAppXReparsePoints mitigation used for OS updates. + +The following fields are available: + +- **ClientId** Unique identifier for each flight. +- **FlightId** Unique GUID that identifies each instances of setuphost.exe. +- **InstanceId** The update scenario in which the mitigation was executed. +- **MitigationScenario** Correlation vector value generated from the latest USO scan. +- **RelatedCV** Number of reparse points that are corrupted but we failed to fix them. +- **ReparsePointsFailed** Number of reparse points that were corrupted and were fixed by this mitigation. +- **ReparsePointsFixed** Number of reparse points that are not corrupted and no action is required. +- **ReparsePointsSkipped** HResult of this operation. +- **Result** ID indicating the mitigation scenario. +- **ScenarioId** Indicates whether the scenario was supported. +- **ScenarioSupported** Unique value for each update attempt. +- **SessionId** Unique ID for each Update. +- **UpdateId** Unique ID for the Windows Update client. +- **WuId** Unique ID for the Windows Update client. + + +### Mitigation360Telemetry.MitigationCustom.FixupEditionId + +This event sends data specific to the FixupEditionId mitigation used for OS updates. + +The following fields are available: + +- **ClientId** In the WU scenario, this will be the WU client ID that is passed to Setup. In Media setup, default value is Media360, but can be overwritten by the caller to a unique value. +- **EditionIdUpdated** Determine whether EditionId was changed. +- **FlightId** Unique identifier for each flight. +- **InstanceId** Unique GUID that identifies each instances of setuphost.exe. +- **MitigationScenario** The update scenario in which the mitigation was executed. +- **ProductEditionId** Expected EditionId value based on GetProductInfo. +- **ProductType** Value returned by GetProductInfo. +- **RegistryEditionId** EditionId value in the registry. +- **RelatedCV** Correlation vector value generated from the latest USO scan. +- **Result** HResult of this operation. +- **ScenarioId** ID indicating the mitigation scenario. +- **ScenarioSupported** Indicates whether the scenario was supported. +- **SessionId** Unique value for each update attempt. +- **UpdateId** Unique ID for each update. +- **WuId** Unique ID for the Windows Update client. + + +## Windows Update Reserve Manager events + +### Microsoft.Windows.UpdateReserveManager.CommitPendingHardReserveAdjustment + +This event is sent when the Update Reserve Manager commits a hard reserve adjustment that was pending. + +The following fields are available: + +- **FinalAdjustment** Final adjustment for the hard reserve following the addition or removal of optional content. +- **InitialAdjustment** Initial intended adjustment for the hard reserve following the addition/removal of optional content. + + +### Microsoft.Windows.UpdateReserveManager.FunctionReturnedError + +This event is sent when the Update Reserve Manager returns an error from one of its internal functions. + +The following fields are available: + +- **FailedExpression** The failed expression that was returned. +- **FailedFile** The binary file that contained the failed function. +- **FailedFunction** The name of the function that originated the failure. +- **FailedLine** The line number of the failure. +- **ReturnCode** The return code of the function. + + +### Microsoft.Windows.UpdateReserveManager.InitializeUpdateReserveManager + +This event returns data about the Update Reserve Manager, including whether it’s been initialized. + +The following fields are available: + +- **ClientId** The ID of the caller application. +- **Flags** The enumerated flags used to initialize the manager. +- **FlightId** The flight ID of the content the calling client is currently operating with. +- **Offline** Indicates whether or the reserve manager is called during offline operations. +- **PolicyPassed** Indicates whether the machine is able to use reserves. +- **ReturnCode** Return code of the operation. +- **Version** The version of the Update Reserve Manager. + + +### Microsoft.Windows.UpdateReserveManager.PrepareTIForReserveInitialization + +This event is sent when the Update Reserve Manager prepares the Trusted Installer to initialize reserves on the next boot. + +The following fields are available: + +- **Flags** The flags that are passed to the function to prepare the Trusted Installer for reserve initialization. + + +### Microsoft.Windows.UpdateReserveManager.RemovePendingHardReserveAdjustment + +This event is sent when the Update Reserve Manager removes a pending hard reserve adjustment. + + + +### Microsoft.Windows.UpdateReserveManager.UpdatePendingHardReserveAdjustment + +This event is sent when the Update Reserve Manager needs to adjust the size of the hard reserve after the option content is installed. + +The following fields are available: + +- **ChangeSize** The change in the hard reserve size based on the addition or removal of optional content. +- **Disposition** The parameter for the hard reserve adjustment function. +- **Flags** The flags passed to the hard reserve adjustment function. +- **PendingHardReserveAdjustment** The final change to the hard reserve size. +- **UpdateType** Indicates whether the change is an increase or decrease in the size of the hard reserve. + + +## Winlogon events + +### Microsoft.Windows.Security.Winlogon.SetupCompleteLogon + +This event signals the completion of the setup process. It happens only once during the first logon. + + + +## XBOX events + +### Microsoft.Xbox.XamTelemetry.AppActivationError + +This event indicates whether the system detected an activation error in the app. + +The following fields are available: + +- **ActivationUri** Activation URI (Uniform Resource Identifier) used in the attempt to activate the app. +- **AppId** The Xbox LIVE Title ID. +- **AppUserModelId** The AUMID (Application User Model ID) of the app to activate. +- **Result** The HResult error. +- **UserId** The Xbox LIVE User ID (XUID). + + +### Microsoft.Xbox.XamTelemetry.AppActivity + +This event is triggered whenever the current app state is changed by: launch, switch, terminate, snap, etc. + +The following fields are available: + +- **AppActionId** The ID of the application action. +- **AppCurrentVisibilityState** The ID of the current application visibility state. +- **AppId** The Xbox LIVE Title ID of the app. +- **AppPackageFullName** The full name of the application package. +- **AppPreviousVisibilityState** The ID of the previous application visibility state. +- **AppSessionId** The application session ID. +- **AppType** The type ID of the application (AppType_NotKnown, AppType_Era, AppType_Sra, AppType_Uwa). +- **BCACode** The BCA (Burst Cutting Area) mark code of the optical disc used to launch the application. +- **DurationMs** The amount of time (in milliseconds) since the last application state transition. +- **IsTrialLicense** This boolean value is TRUE if the application is on a trial license. +- **LicenseType** The type of licensed used to authorize the app (0 - Unknown, 1 - User, 2 - Subscription, 3 - Offline, 4 - Disc). +- **LicenseXuid** If the license type is 1 (User), this field contains the XUID (Xbox User ID) of the registered owner of the license. +- **ProductGuid** The Xbox product GUID (Globally-Unique ID) of the application. +- **UserId** The XUID (Xbox User ID) of the current user. + + + From b958493992a0f8e3b9518844f867cc7740444f84 Mon Sep 17 00:00:00 2001 From: Brian Lich Date: Tue, 12 Mar 2019 16:37:06 -0700 Subject: [PATCH 057/724] new build 3/12/2019 4:37 PM --- ...ndows-diagnostic-events-and-fields-1703.md | 8 +- ...ndows-diagnostic-events-and-fields-1709.md | 10 +- ...ndows-diagnostic-events-and-fields-1803.md | 8 +- ...ndows-diagnostic-events-and-fields-1809.md | 15449 ++++++++-------- 4 files changed, 7926 insertions(+), 7549 deletions(-) diff --git a/windows/privacy/basic-level-windows-diagnostic-events-and-fields-1703.md b/windows/privacy/basic-level-windows-diagnostic-events-and-fields-1703.md index 30e23dda88..2e2ac4486f 100644 --- a/windows/privacy/basic-level-windows-diagnostic-events-and-fields-1703.md +++ b/windows/privacy/basic-level-windows-diagnostic-events-and-fields-1703.md @@ -13,7 +13,7 @@ manager: dansimp ms.collection: M365-security-compliance ms.topic: article audience: ITPro -ms.date: 03/05/2019 +ms.date: 03/12/2019 --- @@ -4181,7 +4181,7 @@ The following fields are available: - **RelatedCV** The Correlation Vector that was used before the most recent change to a new Correlation Vector. - **RepeatFailFlag** Indicates whether this specific piece of content had previously failed to download. - **RevisionNumber** The revision number of the specified piece of content. -- **ServiceGuid** A unique identifier for the service that the software distribution client is installing content for (Windows Update, Microsoft Store, etc.). +- **ServiceGuid** A unique identifier for the service that the software distribution client is installing content for (Windows Update, Windows Store, etc.). - **Setup360Phase** Identifies the active phase of the upgrade download if the current download is for an Operating System upgrade. - **ShippingMobileOperator** The mobile operator linked to the device when the device shipped. - **StatusCode** Indicates the result of a Download event (success, cancellation, failure code HResult). @@ -5072,12 +5072,12 @@ This event lists the reboot reason when an app is going to reboot. The following fields are available: -- **BootId** The boot ID. +- **BootId** The system boot ID. - **BoottimeSinceLastShutdown** The boot time since the last shutdown. - **RebootReason** Reason for the reboot. -## Microsoft Store events +## Windows Store events ### Microsoft.Windows.Store.Partner.ReportApplication diff --git a/windows/privacy/basic-level-windows-diagnostic-events-and-fields-1709.md b/windows/privacy/basic-level-windows-diagnostic-events-and-fields-1709.md index 58818d2e66..d6a2e128d8 100644 --- a/windows/privacy/basic-level-windows-diagnostic-events-and-fields-1709.md +++ b/windows/privacy/basic-level-windows-diagnostic-events-and-fields-1709.md @@ -13,7 +13,7 @@ manager: dansimp ms.collection: M365-security-compliance ms.topic: article audience: ITPro -ms.date: 03/05/2019 +ms.date: 03/12/2019 --- @@ -68,7 +68,7 @@ The following fields are available: - **DecisionSystemBios_19H1Setup** The total DecisionSystemBios objects targeting the next release of Windows on this device. - **DecisionSystemBios_RS4** The total DecisionSystemBios objects targeting Windows 10 version, 1803 present on this device. - **InventoryApplicationFile** The count of the number of this particular object type present on this device. -- **InventoryLanguagePack** The count of the number of this particular object type present on this device. +- **InventoryLanguagePack** The count of InventoryLanguagePack objects present on this machine. - **InventoryMediaCenter** The count of the number of this particular object type present on this device. - **InventorySystemBios** The count of the number of this particular object type present on this device. - **InventoryUplevelDriverPackage** The count of the number of this particular object type present on this device. @@ -4128,7 +4128,7 @@ The following fields are available: - **HandlerType** Indicates the kind of content (app, driver, windows patch, etc.) - **RevisionNumber** Unique revision number of Update - **ServerId** Identifier for the service to which the software distribution client is connecting, such as Windows Update and Microsoft Store. -- **ServiceGuid** Identifier for the service to which the software distribution client is connecting (Windows Update, Microsoft Store, etc) +- **ServiceGuid** Identifier for the service to which the software distribution client is connecting (Windows Update, Windows Store, etc) - **SystemBIOSMajorRelease** Major version of the BIOS. - **SystemBIOSMinorRelease** Minor version of the BIOS. - **UpdateId** Unique Update ID @@ -4192,7 +4192,7 @@ The following fields are available: - **RelatedCV** The previous Correlation Vector that was used before swapping with a new one - **RepeatFailFlag** Indicates whether this specific piece of content had previously failed to download. - **RevisionNumber** The revision number of the specified piece of content. -- **ServiceGuid** A unique identifier for the service that the software distribution client is installing content for (Windows Update, Microsoft Store, etc.). +- **ServiceGuid** A unique identifier for the service that the software distribution client is installing content for (Windows Update, Windows Store, etc.). - **Setup360Phase** Identifies the active phase of the upgrade download if the current download is for an Operating System upgrade. - **ShippingMobileOperator** The mobile operator linked to the device when the device shipped. - **StatusCode** Indicates the result of a Download event (success, cancellation, failure code HResult). @@ -5298,7 +5298,7 @@ The following fields are available: - **ReportId** WER Report Id associated with this bug check (used for finding the corresponding report archive in Watson). -## Microsoft Store events +## Windows Store events ### Microsoft.Windows.Store.Partner.ReportApplication diff --git a/windows/privacy/basic-level-windows-diagnostic-events-and-fields-1803.md b/windows/privacy/basic-level-windows-diagnostic-events-and-fields-1803.md index 2108b3c666..e88b4da389 100644 --- a/windows/privacy/basic-level-windows-diagnostic-events-and-fields-1803.md +++ b/windows/privacy/basic-level-windows-diagnostic-events-and-fields-1803.md @@ -13,7 +13,7 @@ manager: dansimp ms.collection: M365-security-compliance ms.topic: article audience: ITPro -ms.date: 03/05/2019 +ms.date: 03/12/2019 --- @@ -4934,7 +4934,7 @@ The following fields are available: - **FlightId** The specific id of the flight the device is getting - **HandlerType** Indicates the kind of content (app, driver, windows patch, etc.) - **RevisionNumber** Identifies the revision number of this specific piece of content -- **ServiceGuid** Identifier for the service to which the software distribution client is connecting (Windows Update, Microsoft Store, etc) +- **ServiceGuid** Identifier for the service to which the software distribution client is connecting (Windows Update, Windows Store, etc) - **SystemBIOSMajorRelease** Major release version of the system bios - **SystemBIOSMinorRelease** Minor release version of the system bios - **UpdateId** Identifier associated with the specific piece of content @@ -4997,7 +4997,7 @@ The following fields are available: - **RelatedCV** The Correlation Vector that was used before the most recent change to a new Correlation Vector. - **RepeatFailFlag** Indicates whether this specific piece of content had previously failed to download. - **RevisionNumber** The revision number of the specified piece of content. -- **ServiceGuid** A unique identifier for the service that the software distribution client is installing content for (Windows Update, Microsoft Store, etc.). +- **ServiceGuid** A unique identifier for the service that the software distribution client is installing content for (Windows Update, Windows Store, etc.). - **Setup360Phase** Identifies the active phase of the upgrade download if the current download is for an Operating System upgrade. - **ShippingMobileOperator** The mobile operator linked to the device when the device shipped. - **StatusCode** Indicates the result of a Download event (success, cancellation, failure code HResult). @@ -5988,7 +5988,7 @@ The following fields are available: - **PertProb** Constant used in algorithm for randomization. -## Microsoft Store events +## Windows Store events ### Microsoft.Windows.Store.StoreActivating diff --git a/windows/privacy/basic-level-windows-diagnostic-events-and-fields-1809.md b/windows/privacy/basic-level-windows-diagnostic-events-and-fields-1809.md index f8a042ef3d..fd7cd31194 100644 --- a/windows/privacy/basic-level-windows-diagnostic-events-and-fields-1809.md +++ b/windows/privacy/basic-level-windows-diagnostic-events-and-fields-1809.md @@ -1,7536 +1,7913 @@ ---- -description: Use this article to learn more about what Windows diagnostic data is gathered at the basic level. -title: Windows 10, version 1809 basic diagnostic events and fields (Windows 10) -keywords: privacy, telemetry -ms.prod: w10 -ms.mktglfcycl: manage -ms.sitesec: library -ms.pagetype: security -localizationpriority: high -audience: ITPro -author: brianlic-msft -ms.author: brianlic -manager: dansimp -ms.collection: M365-security-compliance -ms.topic: article -ms.date: 02/15/2019 ---- - - -# Windows 10, version 1809 basic level Windows diagnostic events and fields - - **Applies to** - -- Windows 10, version 1809 - - -The Basic level gathers a limited set of information that is critical for understanding the device and its configuration including: basic device information, quality-related information, app compatibility, and Microsoft Store. When the level is set to Basic, it also includes the Security level information. - -The Basic level helps to identify problems that can occur on a particular device hardware or software configuration. For example, it can help determine if crashes are more frequent on devices with a specific amount of memory or that are running a particular driver version. This helps Microsoft fix operating system or app problems. - -Use this article to learn about diagnostic events, grouped by event area, and the fields within each event. A brief description is provided for each field. Every event generated includes common data, which collects device data. - -You can learn more about Windows functional and diagnostic data through these articles: - - -- [Windows 10, version 1803 basic diagnostic events and fields](basic-level-windows-diagnostic-events-and-fields-1803.md) -- [Windows 10, version 1709 basic diagnostic events and fields](basic-level-windows-diagnostic-events-and-fields-1709.md) -- [Windows 10, version 1703 basic diagnostic events and fields](basic-level-windows-diagnostic-events-and-fields-1703.md) -- [Manage connections from Windows operating system components to Microsoft services](manage-connections-from-windows-operating-system-components-to-microsoft-services.md) -- [Configure Windows diagnostic data in your organization](configure-windows-diagnostic-data-in-your-organization.md) - - - - -## Account trace logging provider events - -### Microsoft.Windows.Mitigation.AccountTraceLoggingProvider.General - -This event provides information about application properties to indicate the successful execution. - -The following fields are available: - -- **AppMode** Indicates the mode the app is being currently run around privileges. -- **ExitCode** Indicates the exit code of the app. -- **Help** Indicates if the app needs to be launched in the help mode. -- **ParseError** Indicates if there was a parse error during the execution. -- **RightsAcquired** Indicates if the right privileges were acquired for successful execution. -- **RightsWereEnabled** Indicates if the right privileges were enabled for successful execution. -- **TestMode** Indicates whether the app is being run in test mode. - - -### Microsoft.Windows.Mitigation.AccountTraceLoggingProvider.GetCount - -This event provides information about the properties of user accounts in the Administrator group. - -The following fields are available: - -- **Internal** Indicates the internal property associated with the count group. -- **LastError** The error code (if applicable) for the cause of the failure to get the count of the user account. -- **Result** The HResult error. - - -## AppLocker events - -### Microsoft.Windows.Security.AppLockerCSP.ActivityStoppedAutomatically - -Automatically closed activity for start/stop operations that aren't explicitly closed. - - - -### Microsoft.Windows.Security.AppLockerCSP.AddParams - -Parameters passed to Add function of the AppLockerCSP Node. - -The following fields are available: - -- **child** The child URI of the node to add. -- **uri** URI of the node relative to %SYSTEM32%/AppLocker. - - -### Microsoft.Windows.Security.AppLockerCSP.AddStart - -Start of "Add" Operation for the AppLockerCSP Node. - - - -### Microsoft.Windows.Security.AppLockerCSP.AddStop - -End of "Add" Operation for AppLockerCSP Node. - -The following fields are available: - -- **hr** The HRESULT returned by Add function in AppLockerCSP. - - -### Microsoft.Windows.Security.AppLockerCSP.CAppLockerCSP::Rollback - -Result of the 'Rollback' operation in AppLockerCSP. - -The following fields are available: - -- **oldId** Previous id for the CSP transaction. -- **txId** Current id for the CSP transaction. - - -### Microsoft.Windows.Security.AppLockerCSP.ClearParams - -Parameters passed to the "Clear" operation for AppLockerCSP. - -The following fields are available: - -- **uri** The URI relative to the %SYSTEM32%\AppLocker folder. - - -### Microsoft.Windows.Security.AppLockerCSP.ClearStart - -Start of the "Clear" operation for the AppLockerCSP Node. - - - -### Microsoft.Windows.Security.AppLockerCSP.ClearStop - -End of the "Clear" operation for the AppLockerCSP node. - -The following fields are available: - -- **hr** HRESULT reported at the end of the 'Clear' function. - - -### Microsoft.Windows.Security.AppLockerCSP.ConfigManagerNotificationStart - -Start of the "ConfigManagerNotification" operation for AppLockerCSP. - -The following fields are available: - -- **NotifyState** State sent by ConfigManager to AppLockerCSP. - - -### Microsoft.Windows.Security.AppLockerCSP.ConfigManagerNotificationStop - -End of the "ConfigManagerNotification" operation for AppLockerCSP. - -The following fields are available: - -- **hr** HRESULT returned by the ConfigManagerNotification function in AppLockerCSP. - - -### Microsoft.Windows.Security.AppLockerCSP.CreateNodeInstanceParams - -Parameters passed to the CreateNodeInstance function of the AppLockerCSP node. - -The following fields are available: - -- **NodeId** NodeId passed to CreateNodeInstance. -- **nodeOps** NodeOperations parameter passed to CreateNodeInstance. -- **uri** URI passed to CreateNodeInstance, relative to %SYSTEM32%\AppLocker. - - -### Microsoft.Windows.Security.AppLockerCSP.CreateNodeInstanceStart - -Start of the "CreateNodeInstance" operation for the AppLockerCSP node. - - - -### Microsoft.Windows.Security.AppLockerCSP.CreateNodeInstanceStop - -End of the "CreateNodeInstance" operation for the AppLockerCSP node - -The following fields are available: - -- **hr** HRESULT returned by the CreateNodeInstance function in AppLockerCSP. - - -### Microsoft.Windows.Security.AppLockerCSP.DeleteChildParams - -Parameters passed to the DeleteChild function of the AppLockerCSP node. - -The following fields are available: - -- **child** The child URI of the node to delete. -- **uri** URI relative to %SYSTEM32%\AppLocker. - - -### Microsoft.Windows.Security.AppLockerCSP.DeleteChildStart - -Start of the "DeleteChild" operation for the AppLockerCSP node. - - - -### Microsoft.Windows.Security.AppLockerCSP.DeleteChildStop - -End of the "DeleteChild" operation for the AppLockerCSP node. - -The following fields are available: - -- **hr** HRESULT returned by the DeleteChild function in AppLockerCSP. - - -### Microsoft.Windows.Security.AppLockerCSP.EnumPolicies - -Logged URI relative to %SYSTEM32%\AppLocker, if the Plugin GUID is null, or the CSP doesn't believe the old policy is present. - -The following fields are available: - -- **uri** URI relative to %SYSTEM32%\AppLocker. - - -### Microsoft.Windows.Security.AppLockerCSP.GetChildNodeNamesParams - -Parameters passed to the GetChildNodeNames function of the AppLockerCSP node. - -The following fields are available: - -- **uri** URI relative to %SYSTEM32%/AppLocker for MDM node. - - -### Microsoft.Windows.Security.AppLockerCSP.GetChildNodeNamesStart - -Start of the "GetChildNodeNames" operation for the AppLockerCSP node. - - - -### Microsoft.Windows.Security.AppLockerCSP.GetChildNodeNamesStop - -End of the "GetChildNodeNames" operation for the AppLockerCSP node. - -The following fields are available: - -- **child[0]** If function succeeded, the first child's name, else "NA". -- **count** If function succeeded, the number of child node names returned by the function, else 0. -- **hr** HRESULT returned by the GetChildNodeNames function of AppLockerCSP. - - -### Microsoft.Windows.Security.AppLockerCSP.GetLatestId - -The result of 'GetLatestId' in AppLockerCSP (the latest time stamped GUID). - -The following fields are available: - -- **dirId** The latest directory identifier found by GetLatestId. -- **id** The id returned by GetLatestId if id > 0 - otherwise the dirId parameter. - - -### Microsoft.Windows.Security.AppLockerCSP.HResultException - -HRESULT thrown by any arbitrary function in AppLockerCSP. - -The following fields are available: - -- **file** File in the OS code base in which the exception occurs. -- **function** Function in the OS code base in which the exception occurs. -- **hr** HRESULT that is reported. -- **line** Line in the file in the OS code base in which the exception occurs. - - -### Microsoft.Windows.Security.AppLockerCSP.SetValueParams - -Parameters passed to the SetValue function of the AppLockerCSP node. - -The following fields are available: - -- **dataLength** Length of the value to set. -- **uri** The node URI to that should contain the value, relative to %SYSTEM32%\AppLocker. - - -### Microsoft.Windows.Security.AppLockerCSP.SetValueStart - -Start of the "SetValue" operation for the AppLockerCSP node. - - - -### Microsoft.Windows.Security.AppLockerCSP.SetValueStop - -End of the "SetValue" operation for the AppLockerCSP node. - -The following fields are available: - -- **hr** HRESULT returned by the SetValue function in AppLockerCSP. - - -### Microsoft.Windows.Security.AppLockerCSP.TryRemediateMissingPolicies - -EntryPoint of fix step or policy remediation, includes URI relative to %SYSTEM32%\AppLocker that needs to be fixed. - -The following fields are available: - -- **uri** URI for node relative to %SYSTEM32%/AppLocker. - - -## Appraiser events - -### Microsoft.Windows.Appraiser.General.ChecksumTotalPictureCount - -This event lists the types of objects and how many of each exist on the client device. This allows for a quick way to ensure that the records present on the server match what is present on the client. - -The following fields are available: - -- **DatasourceApplicationFile_19ASetup** The count of the number of this particular object type present on this device. -- **DatasourceApplicationFile_19H1** The count of the number of this particular object type present on this device. -- **DatasourceApplicationFile_19H1Setup** The count of the number of this particular object type present on this device. -- **DatasourceApplicationFile_RS1** An ID for the system, calculated by hashing hardware identifiers. -- **DatasourceApplicationFile_RS2** An ID for the system, calculated by hashing hardware identifiers. -- **DatasourceApplicationFile_RS3** The count of the number of this particular object type present on this device. -- **DatasourceApplicationFile_RS4** The count of the number of this particular object type present on this device. -- **DatasourceApplicationFile_RS4Setup** The count of the number of this particular object type present on this device. -- **DatasourceApplicationFile_RS5** The count of the number of this particular object type present on this device. -- **DatasourceApplicationFile_RS5Setup** The count of the number of this particular object type present on this device. -- **DatasourceApplicationFile_TH1** The count of the number of this particular object type present on this device. -- **DatasourceApplicationFile_TH2** The count of the number of this particular object type present on this device. -- **DatasourceDevicePnp_19ASetup** The count of the number of this particular object type present on this device. -- **DatasourceDevicePnp_19H1** The count of the number of this particular object type present on this device. -- **DatasourceDevicePnp_19H1Setup** The count of the number of this particular object type present on this device. -- **DatasourceDevicePnp_RS1** The total DataSourceDevicePnp objects targeting Windows 10 version 1607 on this device. -- **DatasourceDevicePnp_RS2** The count of the number of this particular object type present on this device. -- **DatasourceDevicePnp_RS3** The count of the number of this particular object type present on this device. -- **DatasourceDevicePnp_RS3Setup** The count of the number of this particular object type present on this device. -- **DatasourceDevicePnp_RS4** The count of the number of this particular object type present on this device. -- **DatasourceDevicePnp_RS4Setup** The count of the number of this particular object type present on this device. -- **DatasourceDevicePnp_RS5** The count of the number of this particular object type present on this device. -- **DatasourceDevicePnp_RS5Setup** The count of the number of this particular object type present on this device. -- **DatasourceDevicePnp_TH1** The count of the number of this particular object type present on this device. -- **DatasourceDevicePnp_TH2** The count of the number of this particular object type present on this device. -- **DatasourceDriverPackage_19ASetup** The count of the number of this particular object type present on this device. -- **DatasourceDriverPackage_19H1** The count of the number of this particular object type present on this device. -- **DatasourceDriverPackage_19H1Setup** The count of the number of this particular object type present on this device. -- **DatasourceDriverPackage_RS1** The total DataSourceDriverPackage objects targeting Windows 10 version 1607 on this device. -- **DatasourceDriverPackage_RS2** The total DataSourceDriverPackage objects targeting Windows 10, version 1703 on this device. -- **DatasourceDriverPackage_RS3** The count of the number of this particular object type present on this device. -- **DatasourceDriverPackage_RS3Setup** The count of the number of this particular object type present on this device. -- **DatasourceDriverPackage_RS4** The count of the number of this particular object type present on this device. -- **DatasourceDriverPackage_RS4Setup** The count of the number of this particular object type present on this device. -- **DatasourceDriverPackage_RS5** The count of the number of this particular object type present on this device. -- **DatasourceDriverPackage_RS5Setup** The count of the number of this particular object type present on this device. -- **DatasourceDriverPackage_TH1** The count of the number of this particular object type present on this device. -- **DatasourceDriverPackage_TH2** The count of the number of this particular object type present on this device. -- **DataSourceMatchingInfoBlock_19ASetup** The count of the number of this particular object type present on this device. -- **DataSourceMatchingInfoBlock_19H1** The count of the number of this particular object type present on this device. -- **DataSourceMatchingInfoBlock_19H1Setup** The count of the number of this particular object type present on this device. -- **DataSourceMatchingInfoBlock_RS1** The total DataSourceMatchingInfoBlock objects targeting Windows 10 version 1607 on this device. -- **DataSourceMatchingInfoBlock_RS2** The count of the number of this particular object type present on this device. -- **DataSourceMatchingInfoBlock_RS3** The count of the number of this particular object type present on this device. -- **DataSourceMatchingInfoBlock_RS4** The count of the number of this particular object type present on this device. -- **DataSourceMatchingInfoBlock_RS4Setup** The count of the number of this particular object type present on this device. -- **DataSourceMatchingInfoBlock_RS5** The count of the number of this particular object type present on this device. -- **DataSourceMatchingInfoBlock_RS5Setup** The count of the number of this particular object type present on this device. -- **DataSourceMatchingInfoBlock_TH1** The count of the number of this particular object type present on this device. -- **DataSourceMatchingInfoBlock_TH2** The count of the number of this particular object type present on this device. -- **DataSourceMatchingInfoPassive_19ASetup** The count of the number of this particular object type present on this device. -- **DataSourceMatchingInfoPassive_19H1** The count of the number of this particular object type present on this device. -- **DataSourceMatchingInfoPassive_19H1Setup** The count of the number of this particular object type present on this device. -- **DataSourceMatchingInfoPassive_RS1** The total DataSourceMatchingInfoPassive objects targeting Windows 10 version 1607 on this device. -- **DataSourceMatchingInfoPassive_RS2** The count of the number of this particular object type present on this device. -- **DataSourceMatchingInfoPassive_RS3** The count of the number of this particular object type present on this device. -- **DataSourceMatchingInfoPassive_RS4** The count of the number of this particular object type present on this device. -- **DataSourceMatchingInfoPassive_RS4Setup** The count of the number of this particular object type present on this device. -- **DataSourceMatchingInfoPassive_RS5** The count of the number of this particular object type present on this device. -- **DataSourceMatchingInfoPassive_RS5Setup** The count of the number of this particular object type present on this device. -- **DataSourceMatchingInfoPassive_TH1** The count of the number of this particular object type present on this device. -- **DataSourceMatchingInfoPassive_TH2** The count of the number of this particular object type present on this device. -- **DataSourceMatchingInfoPostUpgrade_19ASetup** The count of the number of this particular object type present on this device. -- **DataSourceMatchingInfoPostUpgrade_19H1** The count of the number of this particular object type present on this device. -- **DataSourceMatchingInfoPostUpgrade_19H1Setup** The count of the number of this particular object type present on this device. -- **DataSourceMatchingInfoPostUpgrade_RS1** The total DataSourceMatchingInfoPostUpgrade objects targeting Windows 10 version 1607 on this device. -- **DataSourceMatchingInfoPostUpgrade_RS2** The total DataSourceMatchingInfoPostUpgrade objects targeting Windows 10 version 1703 on this device. -- **DataSourceMatchingInfoPostUpgrade_RS3** The total DataSourceMatchingInfoPostUpgrade objects targeting Windows 10 version 1709 on this device. -- **DataSourceMatchingInfoPostUpgrade_RS4** The count of the number of this particular object type present on this device. -- **DataSourceMatchingInfoPostUpgrade_RS4Setup** The count of the number of this particular object type present on this device. -- **DataSourceMatchingInfoPostUpgrade_RS5** The count of the number of this particular object type present on this device. -- **DataSourceMatchingInfoPostUpgrade_RS5Setup** The count of the number of this particular object type present on this device. -- **DataSourceMatchingInfoPostUpgrade_TH1** The count of the number of this particular object type present on this device. -- **DataSourceMatchingInfoPostUpgrade_TH2** The count of the number of this particular object type present on this device. -- **DatasourceSystemBios_19ASetup** The count of the number of this particular object type present on this device. -- **DatasourceSystemBios_19H1** The count of the number of this particular object type present on this device. -- **DatasourceSystemBios_19H1Setup** The count of the number of this particular object type present on this device. -- **DatasourceSystemBios_RS1** The total DatasourceSystemBios objects targeting Windows 10 version 1607 present on this device. -- **DatasourceSystemBios_RS2** The total DatasourceSystemBios objects targeting Windows 10 version 1703 present on this device. -- **DatasourceSystemBios_RS3** The total DatasourceSystemBios objects targeting Windows 10 version 1709 present on this device. -- **DatasourceSystemBios_RS3Setup** The count of the number of this particular object type present on this device. -- **DatasourceSystemBios_RS4** The count of the number of this particular object type present on this device. -- **DatasourceSystemBios_RS4Setup** The count of the number of this particular object type present on this device. -- **DatasourceSystemBios_RS5** The count of the number of this particular object type present on this device. -- **DatasourceSystemBios_RS5Setup** The count of the number of this particular object type present on this device. -- **DatasourceSystemBios_TH1** The count of the number of this particular object type present on this device. -- **DatasourceSystemBios_TH2** The count of the number of this particular object type present on this device. -- **DecisionApplicationFile_19ASetup** The count of the number of this particular object type present on this device. -- **DecisionApplicationFile_19H1** The count of the number of this particular object type present on this device. -- **DecisionApplicationFile_19H1Setup** The count of the number of this particular object type present on this device. -- **DecisionApplicationFile_RS1** The count of the number of this particular object type present on this device. -- **DecisionApplicationFile_RS2** The count of the number of this particular object type present on this device. -- **DecisionApplicationFile_RS3** The count of the number of this particular object type present on this device. -- **DecisionApplicationFile_RS4** The count of the number of this particular object type present on this device. -- **DecisionApplicationFile_RS4Setup** The count of the number of this particular object type present on this device. -- **DecisionApplicationFile_RS5** The count of the number of this particular object type present on this device. -- **DecisionApplicationFile_RS5Setup** The count of the number of this particular object type present on this device. -- **DecisionApplicationFile_TH1** The count of the number of this particular object type present on this device. -- **DecisionApplicationFile_TH2** The count of the number of this particular object type present on this device. -- **DecisionDevicePnp_19ASetup** The count of the number of this particular object type present on this device. -- **DecisionDevicePnp_19H1** The count of the number of this particular object type present on this device. -- **DecisionDevicePnp_19H1Setup** The count of the number of this particular object type present on this device. -- **DecisionDevicePnp_RS1** The total DecisionDevicePnp objects targeting Windows 10 version 1607 on this device. -- **DecisionDevicePnp_RS2** The count of the number of this particular object type present on this device. -- **DecisionDevicePnp_RS3** The count of the number of this particular object type present on this device. -- **DecisionDevicePnp_RS3Setup** The count of the number of this particular object type present on this device. -- **DecisionDevicePnp_RS4** The count of the number of this particular object type present on this device. -- **DecisionDevicePnp_RS4Setup** The count of the number of this particular object type present on this device. -- **DecisionDevicePnp_RS5** The count of the number of this particular object type present on this device. -- **DecisionDevicePnp_RS5Setup** The count of the number of this particular object type present on this device. -- **DecisionDevicePnp_TH1** The count of the number of this particular object type present on this device. -- **DecisionDevicePnp_TH2** The count of the number of this particular object type present on this device. -- **DecisionDriverPackage_19ASetup** The count of the number of this particular object type present on this device. -- **DecisionDriverPackage_19H1** The count of the number of this particular object type present on this device. -- **DecisionDriverPackage_19H1Setup** The count of the number of this particular object type present on this device. -- **DecisionDriverPackage_RS1** The total DecisionDriverPackage objects targeting Windows 10 version 1607 on this device. -- **DecisionDriverPackage_RS2** The count of the number of this particular object type present on this device. -- **DecisionDriverPackage_RS3** The count of the number of this particular object type present on this device. -- **DecisionDriverPackage_RS3Setup** The count of the number of this particular object type present on this device. -- **DecisionDriverPackage_RS4** The count of the number of this particular object type present on this device. -- **DecisionDriverPackage_RS4Setup** The count of the number of this particular object type present on this device. -- **DecisionDriverPackage_RS5** The count of the number of this particular object type present on this device. -- **DecisionDriverPackage_RS5Setup** The count of the number of this particular object type present on this device. -- **DecisionDriverPackage_TH1** The count of the number of this particular object type present on this device. -- **DecisionDriverPackage_TH2** The count of the number of this particular object type present on this device. -- **DecisionMatchingInfoBlock_19ASetup** The count of the number of this particular object type present on this device. -- **DecisionMatchingInfoBlock_19H1** The count of the number of this particular object type present on this device. -- **DecisionMatchingInfoBlock_19H1Setup** The count of the number of this particular object type present on this device. -- **DecisionMatchingInfoBlock_RS1** The total DecisionMatchingInfoBlock objects targeting Windows 10 version 1607 present on this device. -- **DecisionMatchingInfoBlock_RS2** The total DecisionMatchingInfoBlock objects targeting Windows 10 version 1703 present on this device. -- **DecisionMatchingInfoBlock_RS3** The total DecisionMatchingInfoBlock objects targeting Windows 10 version 1709 present on this device. -- **DecisionMatchingInfoBlock_RS4** The total DecisionMatchingInfoBlock objects targeting Windows 10 version 1803 present on this device. -- **DecisionMatchingInfoBlock_RS4Setup** The count of the number of this particular object type present on this device. -- **DecisionMatchingInfoBlock_RS5** The count of the number of this particular object type present on this device. -- **DecisionMatchingInfoBlock_RS5Setup** The count of the number of this particular object type present on this device. -- **DecisionMatchingInfoBlock_TH1** The count of the number of this particular object type present on this device. -- **DecisionMatchingInfoBlock_TH2** The count of the number of this particular object type present on this device. -- **DecisionMatchingInfoPassive_19ASetup** The count of the number of this particular object type present on this device. -- **DecisionMatchingInfoPassive_19H1** The count of the number of this particular object type present on this device. -- **DecisionMatchingInfoPassive_19H1Setup** The count of the number of this particular object type present on this device. -- **DecisionMatchingInfoPassive_RS1** The total DecisionMatchingInfoPassive objects targeting Windows 10 version 1607 on this device. -- **DecisionMatchingInfoPassive_RS2** The total DecisionMatchingInfoPassive objects targeting Windows 10 version 1703 on this device. -- **DecisionMatchingInfoPassive_RS3** The total DecisionMatchingInfoPassive objects targeting Windows 10 version 1803 on this device. -- **DecisionMatchingInfoPassive_RS4** The count of the number of this particular object type present on this device. -- **DecisionMatchingInfoPassive_RS4Setup** The count of the number of this particular object type present on this device. -- **DecisionMatchingInfoPassive_RS5** The count of the number of this particular object type present on this device. -- **DecisionMatchingInfoPassive_RS5Setup** The count of the number of this particular object type present on this device. -- **DecisionMatchingInfoPassive_TH1** The count of the number of this particular object type present on this device. -- **DecisionMatchingInfoPassive_TH2** The count of the number of this particular object type present on this device. -- **DecisionMatchingInfoPostUpgrade_19ASetup** The count of the number of this particular object type present on this device. -- **DecisionMatchingInfoPostUpgrade_19H1** The count of the number of this particular object type present on this device. -- **DecisionMatchingInfoPostUpgrade_19H1Setup** The count of the number of this particular object type present on this device. -- **DecisionMatchingInfoPostUpgrade_RS1** The total DecisionMatchingInfoPostUpgrade objects targeting Windows 10 version 1607 on this device. -- **DecisionMatchingInfoPostUpgrade_RS2** The total DecisionMatchingInfoPostUpgrade objects targeting Windows 10 version 1703 on this device. -- **DecisionMatchingInfoPostUpgrade_RS3** The total DecisionMatchingInfoPostUpgrade objects targeting Windows 10 version 1709 on this device. -- **DecisionMatchingInfoPostUpgrade_RS4** The count of the number of this particular object type present on this device. -- **DecisionMatchingInfoPostUpgrade_RS4Setup** The count of the number of this particular object type present on this device. -- **DecisionMatchingInfoPostUpgrade_RS5** The count of the number of this particular object type present on this device. -- **DecisionMatchingInfoPostUpgrade_RS5Setup** The count of the number of this particular object type present on this device. -- **DecisionMatchingInfoPostUpgrade_TH1** The count of the number of this particular object type present on this device. -- **DecisionMatchingInfoPostUpgrade_TH2** The count of the number of this particular object type present on this device. -- **DecisionMediaCenter_19ASetup** The count of the number of this particular object type present on this device. -- **DecisionMediaCenter_19H1** The count of the number of this particular object type present on this device. -- **DecisionMediaCenter_19H1Setup** The total DecisionMediaCenter objects targeting the next release of Windows on this device. -- **DecisionMediaCenter_RS1** The total DecisionMediaCenter objects targeting Windows 10 version 1607 present on this device. -- **DecisionMediaCenter_RS2** The total DecisionMediaCenter objects targeting Windows 10 version 1703 present on this device. -- **DecisionMediaCenter_RS3** The total DecisionMediaCenter objects targeting Windows 10 version 1709 present on this device. -- **DecisionMediaCenter_RS4** The total DecisionMediaCenter objects targeting Windows 10 version 1803 present on this device. -- **DecisionMediaCenter_RS4Setup** The count of the number of this particular object type present on this device. -- **DecisionMediaCenter_RS5** The count of the number of this particular object type present on this device. -- **DecisionMediaCenter_RS5Setup** The count of the number of this particular object type present on this device. -- **DecisionMediaCenter_TH1** The count of the number of this particular object type present on this device. -- **DecisionMediaCenter_TH2** The count of the number of this particular object type present on this device. -- **DecisionSystemBios_19ASetup** The total DecisionSystemBios objects targeting the next release of Windows on this device. -- **DecisionSystemBios_19H1** The count of the number of this particular object type present on this device. -- **DecisionSystemBios_19H1Setup** The total DecisionSystemBios objects targeting the next release of Windows on this device. -- **DecisionSystemBios_RS1** The total DecisionSystemBios objects targeting Windows 10 version 1607 on this device. -- **DecisionSystemBios_RS2** The total DecisionSystemBios objects targeting Windows 10 version 1703 on this device. -- **DecisionSystemBios_RS3** The total DecisionSystemBios objects targeting Windows 10 version 1709 on this device. -- **DecisionSystemBios_RS3Setup** The count of the number of this particular object type present on this device. -- **DecisionSystemBios_RS4** The total DecisionSystemBios objects targeting Windows 10 version, 1803 present on this device. -- **DecisionSystemBios_RS4Setup** The total DecisionSystemBios objects targeting the next release of Windows on this device. -- **DecisionSystemBios_RS5** The total DecisionSystemBios objects targeting the next release of Windows on this device. -- **DecisionSystemBios_RS5Setup** The total DecisionSystemBios objects targeting the next release of Windows on this device. -- **DecisionSystemBios_TH1** The count of the number of this particular object type present on this device. -- **DecisionSystemBios_TH2** The count of the number of this particular object type present on this device. -- **DecisionSystemProcessor_RS2** The count of the number of this particular object type present on this device. -- **DecisionTest_RS1** An ID for the system, calculated by hashing hardware identifiers. -- **InventoryApplicationFile** The count of the number of this particular object type present on this device. -- **InventoryDeviceContainer** A count of device container objects in cache. -- **InventoryDevicePnp** A count of device Plug and Play objects in cache. -- **InventoryDriverBinary** A count of driver binary objects in cache. -- **InventoryDriverPackage** A count of device objects in cache. -- **InventoryLanguagePack** The count of the number of this particular object type present on this device. -- **InventoryMediaCenter** The count of the number of this particular object type present on this device. -- **InventorySystemBios** The count of the number of this particular object type present on this device. -- **InventorySystemMachine** The count of the number of this particular object type present on this device. -- **InventorySystemProcessor** The count of the number of this particular object type present on this device. -- **InventoryTest** The count of the number of this particular object type present on this device. -- **InventoryUplevelDriverPackage** The count of the number of this particular object type present on this device. -- **PCFP** The count of the number of this particular object type present on this device. -- **SystemMemory** The count of the number of this particular object type present on this device. -- **SystemProcessorCompareExchange** The count of the number of this particular object type present on this device. -- **SystemProcessorLahfSahf** The count of the number of this particular object type present on this device. -- **SystemProcessorNx** The total number of objects of this type present on this device. -- **SystemProcessorPrefetchW** The total number of objects of this type present on this device. -- **SystemProcessorSse2** The total number of objects of this type present on this device. -- **SystemTouch** The count of the number of this particular object type present on this device. -- **SystemWim** The total number of objects of this type present on this device. -- **SystemWindowsActivationStatus** The count of the number of this particular object type present on this device. -- **SystemWlan** The total number of objects of this type present on this device. -- **Wmdrm_19ASetup** The count of the number of this particular object type present on this device. -- **Wmdrm_19H1** The count of the number of this particular object type present on this device. -- **Wmdrm_19H1Setup** The total Wmdrm objects targeting the next release of Windows on this device. -- **Wmdrm_RS1** An ID for the system, calculated by hashing hardware identifiers. -- **Wmdrm_RS2** An ID for the system, calculated by hashing hardware identifiers. -- **Wmdrm_RS3** An ID for the system, calculated by hashing hardware identifiers. -- **Wmdrm_RS4** The total Wmdrm objects targeting Windows 10, version 1803 present on this device. -- **Wmdrm_RS4Setup** The count of the number of this particular object type present on this device. -- **Wmdrm_RS5** The count of the number of this particular object type present on this device. -- **Wmdrm_RS5Setup** The count of the number of this particular object type present on this device. -- **Wmdrm_TH1** The count of the number of this particular object type present on this device. -- **Wmdrm_TH2** The count of the number of this particular object type present on this device. - - -### Microsoft.Windows.Appraiser.General.DatasourceApplicationFileAdd - -Represents the basic metadata about specific application files installed on the system. - -This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedeviceinventorychange). - -The following fields are available: - -- **AppraiserVersion** The version of the appraiser file that is generating the events. -- **AvDisplayName** If the app is an anti-virus app, this is its display name. -- **CompatModelIndex** The compatibility prediction for this file. -- **HasCitData** Indicates whether the file is present in CIT data. -- **HasUpgradeExe** Indicates whether the anti-virus app has an upgrade.exe file. -- **IsAv** Is the file an anti-virus reporting EXE? -- **ResolveAttempted** This will always be an empty string when sending telemetry. -- **SdbEntries** An array of fields that indicates the SDB entries that apply to this file. - - -### Microsoft.Windows.Appraiser.General.DatasourceApplicationFileRemove - -This event indicates that the DatasourceApplicationFile object is no longer present. - -This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedeviceinventorychange). - -The following fields are available: - -- **AppraiserVersion** The version of the Appraiser file that is generating the events. - - -### Microsoft.Windows.Appraiser.General.DatasourceApplicationFileStartSync - -This event indicates that a new set of DatasourceApplicationFileAdd events will be sent. - -This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedeviceinventorychange). - -The following fields are available: - -- **AppraiserVersion** The version of the Appraiser file that is generating the events. - - -### Microsoft.Windows.Appraiser.General.DatasourceDevicePnpAdd - -This event sends compatibility data for a Plug and Play device, to help keep Windows up to date. - -This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedeviceinventorychange). - -The following fields are available: - -- **ActiveNetworkConnection** Indicates whether the device is an active network device. -- **AppraiserVersion** The version of the appraiser file generating the events. -- **CosDeviceRating** An enumeration that indicates if there is a driver on the target operating system. -- **CosDeviceSolution** An enumeration that indicates how a driver on the target operating system is available. -- **CosDeviceSolutionUrl** Microsoft.Windows.Appraiser.General.DatasourceDevicePnpAdd . Empty string -- **CosPopulatedFromId** The expected uplevel driver matching ID based on driver coverage data. -- **IsBootCritical** Indicates whether the device boot is critical. -- **UplevelInboxDriver** Indicates whether there is a driver uplevel for this device. -- **WuDriverCoverage** Indicates whether there is a driver uplevel for this device, according to Windows Update. -- **WuDriverUpdateId** The Windows Update ID of the applicable uplevel driver. -- **WuPopulatedFromId** The expected uplevel driver matching ID based on driver coverage from Windows Update. - - -### Microsoft.Windows.Appraiser.General.DatasourceDevicePnpRemove - -This event indicates that the DatasourceDevicePnp object is no longer present. - -This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedeviceinventorychange). - -The following fields are available: - -- **AppraiserVersion** The version of the Appraiser file that is generating the events. - - -### Microsoft.Windows.Appraiser.General.DatasourceDevicePnpStartSync - -This event indicates that a new set of DatasourceDevicePnpAdd events will be sent. - -This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedeviceinventorychange). - -The following fields are available: - -- **AppraiserVersion** The version of the Appraiser file that is generating the events. - - -### Microsoft.Windows.Appraiser.General.DatasourceDriverPackageAdd - -This event sends compatibility database data about driver packages to help keep Windows up to date. - -This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedeviceinventorychange). - -The following fields are available: - -- **AppraiserVersion** The version of the appraiser file generating the events. - - -### Microsoft.Windows.Appraiser.General.DatasourceDriverPackageStartSync - -This event indicates that a new set of DatasourceDriverPackageAdd events will be sent. - -This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedeviceinventorychange). - -The following fields are available: - -- **AppraiserVersion** The version of the Appraiser file that is generating the events. - - -### Microsoft.Windows.Appraiser.General.DataSourceMatchingInfoBlockAdd - -This event sends blocking data about any compatibility blocking entries hit on the system that are not directly related to specific applications or devices, to help keep Windows up-to-date. - -This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedeviceinventorychange). - -The following fields are available: - -- **AppraiserVersion** The version of the appraiser file generating the events. - - -### Microsoft.Windows.Appraiser.General.DataSourceMatchingInfoBlockRemove - -This event indicates that the DataSourceMatchingInfoBlock object is no longer present. - -This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedeviceinventorychange). - -The following fields are available: - -- **AppraiserVersion** The version of the Appraiser file that is generating the events. - - -### Microsoft.Windows.Appraiser.General.DataSourceMatchingInfoBlockStartSync - -This event indicates that a full set of DataSourceMatchingInfoBlockStAdd events have been sent. - -This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedeviceinventorychange). - -The following fields are available: - -- **AppraiserVersion** The version of the Appraiser file that is generating the events. - - -### Microsoft.Windows.Appraiser.General.DataSourceMatchingInfoPassiveAdd - -This event sends compatibility database information about non-blocking compatibility entries on the system that are not keyed by either applications or devices, to help keep Windows up-to-date. - -This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedeviceinventorychange). - -The following fields are available: - -- **AppraiserVersion** The version of the appraiser file generating the events. - - -### Microsoft.Windows.Appraiser.General.DataSourceMatchingInfoPassiveRemove - -This event indicates that the DataSourceMatchingInfoPassive object is no longer present. - -This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedeviceinventorychange). - -The following fields are available: - -- **AppraiserVersion** The version of the Appraiser file that is generating the events. - - -### Microsoft.Windows.Appraiser.General.DataSourceMatchingInfoPassiveStartSync - -This event indicates that a new set of DataSourceMatchingInfoPassiveAdd events will be sent. - -This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedeviceinventorychange). - -The following fields are available: - -- **AppraiserVersion** The version of the Appraiser file that is generating the events. - - -### Microsoft.Windows.Appraiser.General.DataSourceMatchingInfoPostUpgradeAdd - -This event sends compatibility database information about entries requiring reinstallation after an upgrade on the system that are not keyed by either applications or devices, to help keep Windows up-to-date. - -This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedeviceinventorychange). - -The following fields are available: - -- **AppraiserVersion** The version of the appraiser file generating the events. - - -### Microsoft.Windows.Appraiser.General.DataSourceMatchingInfoPostUpgradeRemove - -This event indicates that the DataSourceMatchingInfoPostUpgrade object is no longer present. - -This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedeviceinventorychange). - -The following fields are available: - -- **AppraiserVersion** The version of the Appraiser file that is generating the events. - - -### Microsoft.Windows.Appraiser.General.DataSourceMatchingInfoPostUpgradeStartSync - -This event indicates that a new set of DataSourceMatchingInfoPostUpgradeAdd events will be sent. - -This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedeviceinventorychange). - -The following fields are available: - -- **AppraiserVersion** The version of the Appraiser file that is generating the events. - - -### Microsoft.Windows.Appraiser.General.DatasourceSystemBiosAdd - -This event sends compatibility database information about the BIOS to help keep Windows up-to-date. - -This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedeviceinventorychange). - -The following fields are available: - -- **AppraiserVersion** The version of the Appraiser file generating the events. - - -### Microsoft.Windows.Appraiser.General.DatasourceSystemBiosRemove - -This event indicates that the DatasourceSystemBios object is no longer present. - -This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedeviceinventorychange). - -The following fields are available: - -- **AppraiserVersion** The version of the Appraiser file that is generating the events. - - -### Microsoft.Windows.Appraiser.General.DatasourceSystemBiosStartSync - -This event indicates that a new set of DatasourceSystemBiosAdd events will be sent. - -This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedeviceinventorychange). - -The following fields are available: - -- **AppraiserVersion** The version of the Appraiser file that is generating the events. - - -### Microsoft.Windows.Appraiser.General.DecisionApplicationFileAdd - -This event sends compatibility decision data about a file to help keep Windows up-to-date. - -This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedeviceinventorychange). - -The following fields are available: - -- **AppraiserVersion** The version of the appraiser file that is generating the events. -- **BlockAlreadyInbox** The uplevel runtime block on the file already existed on the current OS. -- **BlockingApplication** Indicates whether there are any application issues that interfere with the upgrade due to the file in question. -- **DisplayGenericMessage** Will be a generic message be shown for this file? -- **DisplayGenericMessageGated** Indicates whether a generic message be shown for this file. -- **HardBlock** This file is blocked in the SDB. -- **HasUxBlockOverride** Does the file have a block that is overridden by a tag in the SDB? -- **MigApplication** Does the file have a MigXML from the SDB associated with it that applies to the current upgrade mode? -- **MigRemoval** Does the file have a MigXML from the SDB that will cause the app to be removed on upgrade? -- **NeedsDismissAction** Will the file cause an action that can be dimissed? -- **NeedsInstallPostUpgradeData** After upgrade, the file will have a post-upgrade notification to install a replacement for the app. -- **NeedsNotifyPostUpgradeData** Does the file have a notification that should be shown after upgrade? -- **NeedsReinstallPostUpgradeData** After upgrade, this file will have a post-upgrade notification to reinstall the app. -- **NeedsUninstallAction** The file must be uninstalled to complete the upgrade. -- **SdbBlockUpgrade** The file is tagged as blocking upgrade in the SDB, -- **SdbBlockUpgradeCanReinstall** The file is tagged as blocking upgrade in the SDB. It can be reinstalled after upgrade. -- **SdbBlockUpgradeUntilUpdate** The file is tagged as blocking upgrade in the SDB. If the app is updated, the upgrade can proceed. -- **SdbReinstallUpgrade** The file is tagged as needing to be reinstalled after upgrade in the SDB. It does not block upgrade. -- **SdbReinstallUpgradeWarn** The file is tagged as needing to be reinstalled after upgrade with a warning in the SDB. It does not block upgrade. -- **SoftBlock** The file is softblocked in the SDB and has a warning. - - -### Microsoft.Windows.Appraiser.General.DecisionApplicationFileRemove - -This event indicates Indicates that the DecisionApplicationFile object is no longer present. - -This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedeviceinventorychange). - -The following fields are available: - -- **AppraiserVersion** The version of the Appraiser file that is generating the events. - - -### Microsoft.Windows.Appraiser.General.DecisionApplicationFileStartSync - -This event indicates that a new set of DecisionApplicationFileAdd events will be sent. - -This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedeviceinventorychange). - -The following fields are available: - -- **AppraiserVersion** The version of the Appraiser file that is generating the events. - - -### Microsoft.Windows.Appraiser.General.DecisionDevicePnpAdd - -This event sends compatibility decision data about a PNP device to help keep Windows up to date. - -This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedeviceinventorychange). - -The following fields are available: - -- **AppraiserVersion** The version of the appraiser file generating the events. -- **AssociatedDriverIsBlocked** Is the driver associated with this PNP device blocked? -- **AssociatedDriverWillNotMigrate** Will the driver associated with this plug-and-play device migrate? -- **BlockAssociatedDriver** Should the driver associated with this PNP device be blocked? -- **BlockingDevice** Is this PNP device blocking upgrade? -- **BlockUpgradeIfDriverBlocked** Is the PNP device both boot critical and does not have a driver included with the OS? -- **BlockUpgradeIfDriverBlockedAndOnlyActiveNetwork** Is this PNP device the only active network device? -- **DisplayGenericMessage** Will a generic message be shown during Setup for this PNP device? -- **DisplayGenericMessageGated** Indicates whether a generic message will be shown during Setup for this PNP device. -- **DriverAvailableInbox** Is a driver included with the operating system for this PNP device? -- **DriverAvailableOnline** Is there a driver for this PNP device on Windows Update? -- **DriverAvailableUplevel** Is there a driver on Windows Update or included with the operating system for this PNP device? -- **DriverBlockOverridden** Is there is a driver block on the device that has been overridden? -- **NeedsDismissAction** Will the user would need to dismiss a warning during Setup for this device? -- **NotRegressed** Does the device have a problem code on the source OS that is no better than the one it would have on the target OS? -- **SdbDeviceBlockUpgrade** Is there an SDB block on the PNP device that blocks upgrade? -- **SdbDriverBlockOverridden** Is there an SDB block on the PNP device that blocks upgrade, but that block was overridden? - - -### Microsoft.Windows.Appraiser.General.DecisionDevicePnpRemove - -This event indicates that the DecisionDevicePnp object is no longer present. - -This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedeviceinventorychange). - -The following fields are available: - -- **AppraiserVersion** The version of the Appraiser file that is generating the events. - - -### Microsoft.Windows.Appraiser.General.DecisionDevicePnpStartSync - -The DecisionDevicePnpStartSync event indicates that a new set of DecisionDevicePnpAdd events will be sent. - -This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedeviceinventorychange). - -The following fields are available: - -- **AppraiserVersion** The version of the Appraiser file that is generating the events. - - -### Microsoft.Windows.Appraiser.General.DecisionDriverPackageAdd - -This event sends decision data about driver package compatibility to help keep Windows up to date. - -This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedeviceinventorychange). - -The following fields are available: - -- **AppraiserVersion** The version of the appraiser file generating the events. -- **DisplayGenericMessageGated** Indicates whether a generic offer block message will be shown for this driver package. -- **DriverBlockOverridden** Does the driver package have an SDB block that blocks it from migrating, but that block has been overridden? -- **DriverIsDeviceBlocked** Was the driver package was blocked because of a device block? -- **DriverIsDriverBlocked** Is the driver package blocked because of a driver block? -- **DriverIsTroubleshooterBlocked** Indicates whether the driver package is blocked because of a troubleshooter block. -- **DriverShouldNotMigrate** Should the driver package be migrated during upgrade? -- **SdbDriverBlockOverridden** Does the driver package have an SDB block that blocks it from migrating, but that block has been overridden? - - -### Microsoft.Windows.Appraiser.General.DecisionDriverPackageRemove - -This event indicates that the DecisionDriverPackage object is no longer present. - -This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedeviceinventorychange). - -The following fields are available: - -- **AppraiserVersion** The version of the Appraiser file that is generating the events. - - -### Microsoft.Windows.Appraiser.General.DecisionDriverPackageStartSync - -This event indicates that a new set of DecisionDriverPackageAdd events will be sent. - -This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedeviceinventorychange). - -The following fields are available: - -- **AppraiserVersion** The version of the Appraiser file that is generating the events. - - -### Microsoft.Windows.Appraiser.General.DecisionMatchingInfoBlockAdd - -This event sends compatibility decision data about blocking entries on the system that are not keyed by either applications or devices, to help keep Windows up to date. - -This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedeviceinventorychange). - -The following fields are available: - -- **AppraiserVersion** The version of the appraiser file generating the events. -- **BlockingApplication** Are there are any application issues that interfere with upgrade due to matching info blocks? -- **DisplayGenericMessage** Will a generic message be shown for this block? -- **NeedsUninstallAction** Does the user need to take an action in setup due to a matching info block? -- **SdbBlockUpgrade** Is a matching info block blocking upgrade? -- **SdbBlockUpgradeCanReinstall** Is a matching info block blocking upgrade, but has the can reinstall tag? -- **SdbBlockUpgradeUntilUpdate** Is a matching info block blocking upgrade but has the until update tag? - - -### Microsoft.Windows.Appraiser.General.DecisionMatchingInfoBlockRemove - -This event indicates that the DecisionMatchingInfoBlock object is no longer present. - -This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedeviceinventorychange). - -The following fields are available: - -- **AppraiserVersion** The version of the Appraiser file that is generating the events. - - -### Microsoft.Windows.Appraiser.General.DecisionMatchingInfoBlockStartSync - -This event indicates that a new set of DecisionMatchingInfoBlockAdd events will be sent. - -This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedeviceinventorychange). - -The following fields are available: - -- **AppraiserVersion** The version of the Appraiser file that is generating the events. - - -### Microsoft.Windows.Appraiser.General.DecisionMatchingInfoPassiveAdd - -This event sends compatibility decision data about non-blocking entries on the system that are not keyed by either applications or devices, to help keep Windows up to date. - -This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedeviceinventorychange). - -The following fields are available: - -- **AppraiserVersion** The version of the Appraiser file that is generating the events. -- **BlockingApplication** Are there any application issues that interfere with upgrade due to matching info blocks? -- **DisplayGenericMessageGated** Indicates whether a generic offer block message will be shown due to matching info blocks. -- **MigApplication** Is there a matching info block with a mig for the current mode of upgrade? - - -### Microsoft.Windows.Appraiser.General.DecisionMatchingInfoPassiveRemove - -This event Indicates that the DecisionMatchingInfoPassive object is no longer present. - -This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedeviceinventorychange). - -The following fields are available: - -- **AppraiserVersion** The version of the Appraiser file that is generating the events. - - -### Microsoft.Windows.Appraiser.General.DecisionMatchingInfoPassiveStartSync - -This event indicates that a new set of DecisionMatchingInfoPassiveAdd events will be sent. - -This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedeviceinventorychange). - -The following fields are available: - -- **AppraiserVersion** The version of the Appraiser file that is generating the events. - - -### Microsoft.Windows.Appraiser.General.DecisionMatchingInfoPostUpgradeAdd - -This event sends compatibility decision data about entries that require reinstall after upgrade. It's used to help keep Windows up to date. - -This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedeviceinventorychange). - -The following fields are available: - -- **AppraiserVersion** The version of the Appraiser file that is generating the events. -- **NeedsInstallPostUpgradeData** Will the file have a notification after upgrade to install a replacement for the app? -- **NeedsNotifyPostUpgradeData** Should a notification be shown for this file after upgrade? -- **NeedsReinstallPostUpgradeData** Will the file have a notification after upgrade to reinstall the app? -- **SdbReinstallUpgrade** The file is tagged as needing to be reinstalled after upgrade in the compatibility database (but is not blocking upgrade). - - -### Microsoft.Windows.Appraiser.General.DecisionMatchingInfoPostUpgradeRemove - -This event indicates that the DecisionMatchingInfoPostUpgrade object is no longer present. - -This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedeviceinventorychange). - -The following fields are available: - -- **AppraiserVersion** The version of the Appraiser file that is generating the events. - - -### Microsoft.Windows.Appraiser.General.DecisionMatchingInfoPostUpgradeStartSync - -This event indicates that a new set of DecisionMatchingInfoPostUpgradeAdd events will be sent. - -This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedeviceinventorychange). - -The following fields are available: - -- **AppraiserVersion** The version of the Appraiser file that is generating the events. - - -### Microsoft.Windows.Appraiser.General.DecisionMediaCenterAdd - -This event sends decision data about the presence of Windows Media Center, to help keep Windows up to date. - -This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedeviceinventorychange). - -The following fields are available: - -- **AppraiserVersion** The version of the Appraiser file generating the events. -- **BlockingApplication** Is there any application issues that interfere with upgrade due to Windows Media Center? -- **MediaCenterActivelyUsed** If Windows Media Center is supported on the edition, has it been run at least once and are the MediaCenterIndicators are true? -- **MediaCenterIndicators** Do any indicators imply that Windows Media Center is in active use? -- **MediaCenterInUse** Is Windows Media Center actively being used? -- **MediaCenterPaidOrActivelyUsed** Is Windows Media Center actively being used or is it running on a supported edition? -- **NeedsDismissAction** Are there any actions that can be dismissed coming from Windows Media Center? - - -### Microsoft.Windows.Appraiser.General.DecisionMediaCenterRemove - -This event indicates that the DecisionMediaCenter object is no longer present. - -This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedeviceinventorychange). - -The following fields are available: - -- **AppraiserVersion** The version of the Appraiser file that is generating the events. - - -### Microsoft.Windows.Appraiser.General.DecisionMediaCenterStartSync - -This event indicates that a new set of DecisionMediaCenterAdd events will be sent. - -This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedeviceinventorychange). - -The following fields are available: - -- **AppraiserVersion** The version of the Appraiser file that is generating the events. - - -### Microsoft.Windows.Appraiser.General.DecisionSystemBiosAdd - -This event sends compatibility decision data about the BIOS to help keep Windows up to date. - -This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedeviceinventorychange). - -The following fields are available: - -- **AppraiserVersion** The version of the Appraiser file generating the events. -- **Blocking** Is the device blocked from upgrade due to a BIOS block? -- **DisplayGenericMessageGated** Indicates whether a generic offer block message will be shown for the bios. -- **HasBiosBlock** Does the device have a BIOS block? - - -### Microsoft.Windows.Appraiser.General.DecisionSystemBiosRemove - -This event indicates that the DecisionSystemBios object is no longer present. - -This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedeviceinventorychange). - -The following fields are available: - -- **AppraiserVersion** The version of the Appraiser file that is generating the events. - - -### Microsoft.Windows.Appraiser.General.DecisionSystemBiosStartSync - -This event indicates that a new set of DecisionSystemBiosAdd events will be sent. - -This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedeviceinventorychange). - -The following fields are available: - -- **AppraiserVersion** The version of the Appraiser file that is generating the events. - - -### Microsoft.Windows.Appraiser.General.GatedRegChange - -This event sends data about the results of running a set of quick-blocking instructions, to help keep Windows up to date. - -The following fields are available: - -- **NewData** The data in the registry value after the scan completed. -- **OldData** The previous data in the registry value before the scan ran. -- **PCFP** An ID for the system calculated by hashing hardware identifiers. -- **RegKey** The registry key name for which a result is being sent. -- **RegValue** The registry value for which a result is being sent. -- **Time** The client time of the event. - - -### Microsoft.Windows.Appraiser.General.InventoryApplicationFileAdd - -This event represents the basic metadata about a file on the system. The file must be part of an app and either have a block in the compatibility database or be part of an antivirus program. - -This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedeviceinventorychange). - -The following fields are available: - -- **AppraiserVersion** The version of the Appraiser file generating the events. -- **AvDisplayName** If the app is an antivirus app, this is its display name. -- **AvProductState** Indicates whether the antivirus program is turned on and the signatures are up to date. -- **BinaryType** A binary type. Example: UNINITIALIZED, ZERO_BYTE, DATA_ONLY, DOS_MODULE, NE16_MODULE, PE32_UNKNOWN, PE32_I386, PE32_ARM, PE64_UNKNOWN, PE64_AMD64, PE64_ARM64, PE64_IA64, PE32_CLR_32, PE32_CLR_IL, PE32_CLR_IL_PREFER32, PE64_CLR_64. -- **BinFileVersion** An attempt to clean up FileVersion at the client that tries to place the version into 4 octets. -- **BinProductVersion** An attempt to clean up ProductVersion at the client that tries to place the version into 4 octets. -- **BoeProgramId** If there is no entry in Add/Remove Programs, this is the ProgramID that is generated from the file metadata. -- **CompanyName** The company name of the vendor who developed this file. -- **FileId** A hash that uniquely identifies a file. -- **FileVersion** The File version field from the file metadata under Properties -> Details. -- **HasUpgradeExe** Indicates whether the antivirus app has an upgrade.exe file. -- **IsAv** Indicates whether the file an antivirus reporting EXE. -- **LinkDate** The date and time that this file was linked on. -- **LowerCaseLongPath** The full file path to the file that was inventoried on the device. -- **Name** The name of the file that was inventoried. -- **ProductName** The Product name field from the file metadata under Properties -> Details. -- **ProductVersion** The Product version field from the file metadata under Properties -> Details. -- **ProgramId** A hash of the Name, Version, Publisher, and Language of an application used to identify it. -- **Size** The size of the file (in hexadecimal bytes). - - -### Microsoft.Windows.Appraiser.General.InventoryApplicationFileRemove - -This event indicates that the InventoryApplicationFile object is no longer present. - -This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedeviceinventorychange). - -The following fields are available: - -- **AppraiserVersion** The version of the Appraiser file that is generating the events. - - -### Microsoft.Windows.Appraiser.General.InventoryApplicationFileStartSync - -This event indicates indicates that a new set of InventoryApplicationFileAdd events will be sent. - -This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedeviceinventorychange). - -The following fields are available: - -- **AppraiserVersion** The version of the Appraiser file that is generating the events. - - -### Microsoft.Windows.Appraiser.General.InventoryLanguagePackAdd - -This event sends data about the number of language packs installed on the system, to help keep Windows up to date. - -This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedeviceinventorychange). - -The following fields are available: - -- **AppraiserVersion** The version of the Appraiser file that is generating the events. -- **HasLanguagePack** Indicates whether this device has 2 or more language packs. -- **LanguagePackCount** The number of language packs are installed. - - -### Microsoft.Windows.Appraiser.General.InventoryLanguagePackRemove - -This event indicates that the InventoryLanguagePack object is no longer present. - -This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedeviceinventorychange). - -The following fields are available: - -- **AppraiserVersion** The version of the Appraiser file that is generating the events. - - -### Microsoft.Windows.Appraiser.General.InventoryLanguagePackStartSync - -This event indicates that a new set of InventoryLanguagePackAdd events will be sent. - -This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedeviceinventorychange). - -The following fields are available: - -- **AppraiserVersion** The version of the Appraiser file that is generating the events. - - -### Microsoft.Windows.Appraiser.General.InventoryMediaCenterAdd - -This event sends true/false data about decision points used to understand whether Windows Media Center is used on the system, to help keep Windows up to date. - -This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedeviceinventorychange). - -The following fields are available: - -- **AppraiserVersion** The version of the Appraiser file generating the events. -- **EverLaunched** Has Windows Media Center ever been launched? -- **HasConfiguredTv** Has the user configured a TV tuner through Windows Media Center? -- **HasExtendedUserAccounts** Are any Windows Media Center Extender user accounts configured? -- **HasWatchedFolders** Are any folders configured for Windows Media Center to watch? -- **IsDefaultLauncher** Is Windows Media Center the default app for opening music or video files? -- **IsPaid** Is the user running a Windows Media Center edition that implies they paid for Windows Media Center? -- **IsSupported** Does the running OS support Windows Media Center? - - -### Microsoft.Windows.Appraiser.General.InventoryMediaCenterRemove - -This event indicates that the InventoryMediaCenter object is no longer present. - -This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedeviceinventorychange). - -The following fields are available: - -- **AppraiserVersion** The version of the Appraiser file that is generating the events. - - -### Microsoft.Windows.Appraiser.General.InventoryMediaCenterStartSync - -This event indicates that a new set of InventoryMediaCenterAdd events will be sent. - -This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedeviceinventorychange). - -The following fields are available: - -- **AppraiserVersion** The version of the Appraiser file that is generating the events. - - -### Microsoft.Windows.Appraiser.General.InventorySystemBiosAdd - -This event sends basic metadata about the BIOS to determine whether it has a compatibility block. - -This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedeviceinventorychange). - -The following fields are available: - -- **AppraiserVersion** The version of the Appraiser file that is generating the events. -- **biosDate** The release date of the BIOS in UTC format. -- **BiosDate** The release date of the BIOS in UTC format. -- **biosName** The name field from Win32_BIOS. -- **BiosName** The name field from Win32_BIOS. -- **manufacturer** The manufacturer field from Win32_ComputerSystem. -- **Manufacturer** The manufacturer field from Win32_ComputerSystem. -- **model** The model field from Win32_ComputerSystem. -- **Model** The model field from Win32_ComputerSystem. - - -### Microsoft.Windows.Appraiser.General.InventorySystemBiosRemove - -This event indicates that the InventorySystemBios object is no longer present. - -This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedeviceinventorychange). - -The following fields are available: - -- **AppraiserVersion** The version of the Appraiser file that is generating the events. - - -### Microsoft.Windows.Appraiser.General.InventorySystemBiosStartSync - -This event indicates that a new set of InventorySystemBiosAdd events will be sent. - -This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedeviceinventorychange). - -The following fields are available: - -- **AppraiserVersion** The version of the Appraiser file that is generating the events. - - -### Microsoft.Windows.Appraiser.General.InventoryUplevelDriverPackageAdd - -This event is only runs during setup. It provides a listing of the uplevel driver packages that were downloaded before the upgrade. Is critical to understanding if failures in setup can be traced to not having sufficient uplevel drivers before the upgrade. - -This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedeviceinventorychange). - -The following fields are available: - -- **AppraiserVersion** The version of the Appraiser file that is generating the events. -- **BootCritical** Is the driver package marked as boot critical? -- **Build** The build value from the driver package. -- **CatalogFile** The name of the catalog file within the driver package. -- **Class** The device class from the driver package. -- **ClassGuid** The device class unique ID from the driver package. -- **Date** The date from the driver package. -- **Inbox** Is the driver package of a driver that is included with Windows? -- **OriginalName** The original name of the INF file before it was renamed. Generally a path under $WINDOWS.~BT\Drivers\DU. -- **Provider** The provider of the driver package. -- **PublishedName** The name of the INF file after it was renamed. -- **Revision** The revision of the driver package. -- **SignatureStatus** Indicates if the driver package is signed. Unknown = 0, Unsigned = 1, Signed = 2. -- **VersionMajor** The major version of the driver package. -- **VersionMinor** The minor version of the driver package. - - -### Microsoft.Windows.Appraiser.General.InventoryUplevelDriverPackageRemove - -This event indicates that the InventoryUplevelDriverPackage object is no longer present. - -This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedeviceinventorychange). - -The following fields are available: - -- **AppraiserVersion** The version of the Appraiser file that is generating the events. - - -### Microsoft.Windows.Appraiser.General.InventoryUplevelDriverPackageStartSync - -This event indicates that a new set of InventoryUplevelDriverPackageAdd events will be sent. - -This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedeviceinventorychange). - -The following fields are available: - -- **AppraiserVersion** The version of the Appraiser file that is generating the events. - - -### Microsoft.Windows.Appraiser.General.RunContext - -This event indicates what should be expected in the data payload. - -The following fields are available: - -- **AppraiserBranch** The source branch in which the currently running version of Appraiser was built. -- **AppraiserProcess** The name of the process that launched Appraiser. -- **AppraiserVersion** The version of the Appraiser file generating the events. -- **CensusId** A unique hardware identifier. -- **Context** Indicates what mode Appraiser is running in. Example: Setup or Telemetry. -- **PCFP** An ID for the system calculated by hashing hardware identifiers. -- **Subcontext** Indicates what categories of incompatibilities appraiser is scanning for. Can be N/A, Resolve, or a semicolon-delimited list that can include App, Dev, Sys, Gat, or Rescan. -- **Time** The client time of the event. - - -### Microsoft.Windows.Appraiser.General.SystemMemoryAdd - -This event sends data on the amount of memory on the system and whether it meets requirements, to help keep Windows up-to-date. - -This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedeviceinventorychange). - -The following fields are available: - -- **AppraiserVersion** The version of the Appraiser file generating the events. -- **Blocking** Is the device from upgrade due to memory restrictions? -- **MemoryRequirementViolated** Was a memory requirement violated? -- **pageFile** The current committed memory limit for the system or the current process, whichever is smaller (in bytes). -- **ram** The amount of memory on the device. -- **ramKB** The amount of memory (in KB). -- **virtual** The size of the user-mode portion of the virtual address space of the calling process (in bytes). -- **virtualKB** The amount of virtual memory (in KB). - - -### Microsoft.Windows.Appraiser.General.SystemMemoryRemove - -This event that the SystemMemory object is no longer present. - -This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedeviceinventorychange). - -The following fields are available: - -- **AppraiserVersion** The version of the Appraiser file that is generating the events. - - -### Microsoft.Windows.Appraiser.General.SystemMemoryStartSync - -This event indicates that a new set of SystemMemoryAdd events will be sent. - -This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedeviceinventorychange). - -The following fields are available: - -- **AppraiserVersion** The version of the Appraiser file that is generating the events. - - -### Microsoft.Windows.Appraiser.General.SystemProcessorCompareExchangeAdd - -This event sends data indicating whether the system supports the CompareExchange128 CPU requirement, to help keep Windows up to date. - -This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedeviceinventorychange). - -The following fields are available: - -- **AppraiserVersion** The version of the Appraiser file generating the events. -- **Blocking** Is the upgrade blocked due to the processor? -- **CompareExchange128Support** Does the CPU support CompareExchange128? - - -### Microsoft.Windows.Appraiser.General.SystemProcessorCompareExchangeRemove - -This event indicates that the SystemProcessorCompareExchange object is no longer present. - -This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedeviceinventorychange). - -The following fields are available: - -- **AppraiserVersion** The version of the Appraiser file that is generating the events. - - -### Microsoft.Windows.Appraiser.General.SystemProcessorCompareExchangeStartSync - -This event indicates that a new set of SystemProcessorCompareExchangeAdd events will be sent. - -This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedeviceinventorychange). - -The following fields are available: - -- **AppraiserVersion** The version of the Appraiser file that is generating the events. - - -### Microsoft.Windows.Appraiser.General.SystemProcessorLahfSahfAdd - -This event sends data indicating whether the system supports the LahfSahf CPU requirement, to help keep Windows up-to-date. - -This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedeviceinventorychange). - -The following fields are available: - -- **AppraiserVersion** The version of the Appraiser file generating the events. -- **Blocking** Is the upgrade blocked due to the processor? -- **LahfSahfSupport** Does the CPU support LAHF/SAHF? - - -### Microsoft.Windows.Appraiser.General.SystemProcessorLahfSahfRemove - -This event indicates that the SystemProcessorLahfSahf object is no longer present. - -This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedeviceinventorychange). - -The following fields are available: - -- **AppraiserVersion** The version of the Appraiser file that is generating the events. - - -### Microsoft.Windows.Appraiser.General.SystemProcessorLahfSahfStartSync - -This event indicates that a new set of SystemProcessorLahfSahfAdd events will be sent. - -This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedeviceinventorychange). - -The following fields are available: - -- **AppraiserVersion** The version of the Appraiser file that is generating the events. - - -### Microsoft.Windows.Appraiser.General.SystemProcessorNxAdd - -This event sends data indicating whether the system supports the NX CPU requirement, to help keep Windows up-to-date. - -This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedeviceinventorychange). - -The following fields are available: - -- **AppraiserVersion** The version of the Appraiser file that is generating the events. -- **Blocking** Is the upgrade blocked due to the processor? -- **NXDriverResult** The result of the driver used to do a non-deterministic check for NX support. -- **NXProcessorSupport** Does the processor support NX? - - -### Microsoft.Windows.Appraiser.General.SystemProcessorNxRemove - -This event indicates that the SystemProcessorNx object is no longer present. - -This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedeviceinventorychange). - -The following fields are available: - -- **AppraiserVersion** The version of the Appraiser file that is generating the events. - - -### Microsoft.Windows.Appraiser.General.SystemProcessorNxStartSync - -This event indicates that a new set of SystemProcessorNxAdd events will be sent. - -This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedeviceinventorychange). - -The following fields are available: - -- **AppraiserVersion** The version of the Appraiser file that is generating the events. - - -### Microsoft.Windows.Appraiser.General.SystemProcessorPrefetchWAdd - -This event sends data indicating whether the system supports the PrefetchW CPU requirement, to help keep Windows up to date. - -This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedeviceinventorychange). - -The following fields are available: - -- **AppraiserVersion** The version of the Appraiser file that is generating the events. -- **Blocking** Is the upgrade blocked due to the processor? -- **PrefetchWSupport** Does the processor support PrefetchW? - - -### Microsoft.Windows.Appraiser.General.SystemProcessorPrefetchWRemove - -This event indicates that the SystemProcessorPrefetchW object is no longer present. - -This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedeviceinventorychange). - -The following fields are available: - -- **AppraiserVersion** The version of the Appraiser file that is generating the events. - - -### Microsoft.Windows.Appraiser.General.SystemProcessorPrefetchWStartSync - -This event indicates that a new set of SystemProcessorPrefetchWAdd events will be sent. - -This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedeviceinventorychange). - -The following fields are available: - -- **AppraiserVersion** The version of the Appraiser file that is generating the events. - - -### Microsoft.Windows.Appraiser.General.SystemProcessorSse2Add - -This event sends data indicating whether the system supports the SSE2 CPU requirement, to help keep Windows up to date. - -This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedeviceinventorychange). - -The following fields are available: - -- **AppraiserVersion** The version of the Appraiser file that is generating the events. -- **Blocking** Is the upgrade blocked due to the processor? -- **SSE2ProcessorSupport** Does the processor support SSE2? - - -### Microsoft.Windows.Appraiser.General.SystemProcessorSse2Remove - -This event indicates that the SystemProcessorSse2 object is no longer present. - -This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedeviceinventorychange). - -The following fields are available: - -- **AppraiserVersion** The version of the Appraiser file that is generating the events. - - -### Microsoft.Windows.Appraiser.General.SystemProcessorSse2StartSync - -This event indicates that a new set of SystemProcessorSse2Add events will be sent. - -This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedeviceinventorychange). - -The following fields are available: - -- **AppraiserVersion** The version of the Appraiser file that is generating the events. - - -### Microsoft.Windows.Appraiser.General.SystemTouchAdd - -This event sends data indicating whether the system supports touch, to help keep Windows up to date. - -This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedeviceinventorychange). - -The following fields are available: - -- **AppraiserVersion** The version of the Appraiser file that is generating the events. -- **IntegratedTouchDigitizerPresent** Is there an integrated touch digitizer? -- **MaximumTouches** The maximum number of touch points supported by the device hardware. - - -### Microsoft.Windows.Appraiser.General.SystemTouchRemove - -This event indicates that the SystemTouch object is no longer present. - -This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedeviceinventorychange). - -The following fields are available: - -- **AppraiserVersion** The version of the Appraiser file that is generating the events. - - -### Microsoft.Windows.Appraiser.General.SystemTouchStartSync - -This event indicates that a new set of SystemTouchAdd events will be sent. - -This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedeviceinventorychange). - -The following fields are available: - -- **AppraiserVersion** The version of the Appraiser file that is generating the events. - - -### Microsoft.Windows.Appraiser.General.SystemWimAdd - -This event sends data indicating whether the operating system is running from a compressed Windows Imaging Format (WIM) file, to help keep Windows up to date. - -This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedeviceinventorychange). - -The following fields are available: - -- **AppraiserVersion** The version of the Appraiser file that is generating the events. -- **IsWimBoot** Is the current operating system running from a compressed WIM file? -- **RegistryWimBootValue** The raw value from the registry that is used to indicate if the device is running from a WIM. - - -### Microsoft.Windows.Appraiser.General.SystemWimRemove - -This event indicates that the SystemWim object is no longer present. - -This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedeviceinventorychange). - -The following fields are available: - -- **AppraiserVersion** The version of the Appraiser file that is generating the events. - - -### Microsoft.Windows.Appraiser.General.SystemWimStartSync - -This event indicates that a new set of SystemWimAdd events will be sent. - -This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedeviceinventorychange). - -The following fields are available: - -- **AppraiserVersion** The version of the Appraiser file that is generating the events. - - -### Microsoft.Windows.Appraiser.General.SystemWindowsActivationStatusAdd - -This event sends data indicating whether the current operating system is activated, to help keep Windows up to date. - -This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedeviceinventorychange). - -The following fields are available: - -- **AppraiserVersion** The version of the Appraiser file that is generating the events. -- **WindowsIsLicensedApiValue** The result from the API that's used to indicate if operating system is activated. -- **WindowsNotActivatedDecision** Is the current operating system activated? - - -### Microsoft.Windows.Appraiser.General.SystemWindowsActivationStatusRemove - -This event indicates that the SystemWindowsActivationStatus object is no longer present. - -This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedeviceinventorychange). - -The following fields are available: - -- **AppraiserVersion** The version of the Appraiser file that is generating the events. - - -### Microsoft.Windows.Appraiser.General.SystemWindowsActivationStatusStartSync - -This event indicates that a new set of SystemWindowsActivationStatusAdd events will be sent. - -This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedeviceinventorychange). - -The following fields are available: - -- **AppraiserVersion** The version of the Appraiser file that is generating the events. - - -### Microsoft.Windows.Appraiser.General.SystemWlanAdd - -This event sends data indicating whether the system has WLAN, and if so, whether it uses an emulated driver that could block an upgrade, to help keep Windows up-to-date. - -This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedeviceinventorychange). - -The following fields are available: - -- **AppraiserVersion** The version of the Appraiser file that is generating the events. -- **Blocking** Is the upgrade blocked because of an emulated WLAN driver? -- **HasWlanBlock** Does the emulated WLAN driver have an upgrade block? -- **WlanEmulatedDriver** Does the device have an emulated WLAN driver? -- **WlanExists** Does the device support WLAN at all? -- **WlanModulePresent** Are any WLAN modules present? -- **WlanNativeDriver** Does the device have a non-emulated WLAN driver? - - -### Microsoft.Windows.Appraiser.General.SystemWlanRemove - -This event indicates that the SystemWlan object is no longer present. - -This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedeviceinventorychange). - -The following fields are available: - -- **AppraiserVersion** The version of the Appraiser file that is generating the events. - - -### Microsoft.Windows.Appraiser.General.SystemWlanStartSync - -This event indicates that a new set of SystemWlanAdd events will be sent. - -This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedeviceinventorychange). - -The following fields are available: - -- **AppraiserVersion** The version of the Appraiser file that is generating the events. - - -### Microsoft.Windows.Appraiser.General.TelemetryRunHealth - -This event indicates the parameters and result of a telemetry (diagnostic) run. This allows the rest of the data sent over the course of the run to be properly contextualized and understood, which is then used to keep Windows up to date. - -The following fields are available: - -- **AppraiserBranch** The source branch in which the version of Appraiser that is running was built. -- **AppraiserDataVersion** The version of the data files being used by the Appraiser telemetry run. -- **AppraiserProcess** The name of the process that launched Appraiser. -- **AppraiserVersion** The file version (major, minor and build) of the Appraiser DLL, concatenated without dots. -- **AuxFinal** Obsolete, always set to false. -- **AuxInitial** Obsolete, indicates if Appraiser is writing data files to be read by the Get Windows 10 app. -- **DeadlineDate** A timestamp representing the deadline date, which is the time until which appraiser will wait to do a full scan. -- **EnterpriseRun** Indicates if the telemetry run is an enterprise run, which means appraiser was run from the command line with an extra enterprise parameter. -- **FullSync** Indicates if Appraiser is performing a full sync, which means that full set of events representing the state of the machine are sent. Otherwise, only the changes from the previous run are sent. -- **InboxDataVersion** The original version of the data files before retrieving any newer version. -- **IndicatorsWritten** Indicates if all relevant UEX indicators were successfully written or updated. -- **InventoryFullSync** Indicates if inventory is performing a full sync, which means that the full set of events representing the inventory of machine are sent. -- **PCFP** An ID for the system calculated by hashing hardware identifiers. -- **PerfBackoff** Indicates if the run was invoked with logic to stop running when a user is present. Helps to understand why a run may have a longer elapsed time than normal. -- **PerfBackoffInsurance** Indicates if appraiser is running without performance backoff because it has run with perf backoff and failed to complete several times in a row. -- **RunAppraiser** Indicates if Appraiser was set to run at all. If this if false, it is understood that data events will not be received from this device. -- **RunDate** The date that the telemetry run was stated, expressed as a filetime. -- **RunGeneralTel** Indicates if the generaltel.dll component was run. Generaltel collects additional telemetry on an infrequent schedule and only from machines at telemetry levels higher than Basic. -- **RunOnline** Indicates if appraiser was able to connect to Windows Update and theefore is making decisions using up-to-date driver coverage information. -- **RunResult** The hresult of the Appraiser telemetry run. -- **ScheduledUploadDay** The day scheduled for the upload. -- **SendingUtc** Indicates if the Appraiser client is sending events during the current telemetry run. -- **StoreHandleIsNotNull** Obsolete, always set to false -- **TelementrySent** Indicates if telemetry was successfully sent. -- **ThrottlingUtc** Indicates if the Appraiser client is throttling its output of CUET events to avoid being disabled. This increases runtime but also telemetry reliability. -- **Time** The client time of the event. -- **VerboseMode** Indicates if appraiser ran in Verbose mode, which is a test-only mode with extra logging. -- **WhyFullSyncWithoutTablePrefix** Indicates the reason or reasons that a full sync was generated. - - -### Microsoft.Windows.Appraiser.General.WmdrmAdd - -This event sends data about the usage of older digital rights management on the system, to help keep Windows up to date. This data does not indicate the details of the media using the digital rights management, only whether any such files exist. Collecting this data was critical to ensuring the correct mitigation for customers, and should be able to be removed once all mitigations are in place. - -This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedeviceinventorychange). - -The following fields are available: - -- **AppraiserVersion** The version of the Appraiser file that is generating the events. -- **BlockingApplication** Same as NeedsDismissAction. -- **NeedsDismissAction** Indicates if a dismissible message is needed to warn the user about a potential loss of data due to DRM deprecation. -- **WmdrmApiResult** Raw value of the API used to gather DRM state. -- **WmdrmCdRipped** Indicates if the system has any files encrypted with personal DRM, which was used for ripped CDs. -- **WmdrmIndicators** WmdrmCdRipped OR WmdrmPurchased. -- **WmdrmInUse** WmdrmIndicators AND dismissible block in setup was not dismissed. -- **WmdrmNonPermanent** Indicates if the system has any files with non-permanent licenses. -- **WmdrmPurchased** Indicates if the system has any files with permanent licenses. - - -### Microsoft.Windows.Appraiser.General.WmdrmRemove - -This event indicates that the Wmdrm object is no longer present. - -This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedeviceinventorychange). - -The following fields are available: - -- **AppraiserVersion** The version of the Appraiser file that is generating the events. - - -### Microsoft.Windows.Appraiser.General.WmdrmStartSync - -This event indicates that a new set of WmdrmAdd events will be sent. - -This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedeviceinventorychange). - -The following fields are available: - -- **AppraiserVersion** The version of the Appraiser file that is generating the events. - - -## Census events - -### Census.App - -Provides information on IE and Census versions running on the device - -The following fields are available: - -- **AppraiserEnterpriseErrorCode** The error code of the last Appraiser enterprise run. -- **AppraiserErrorCode** The error code of the last Appraiser run. -- **AppraiserRunEndTimeStamp** The end time of the last Appraiser run. -- **AppraiserRunIsInProgressOrCrashed** Flag that indicates if the Appraiser run is in progress or has crashed. -- **AppraiserRunStartTimeStamp** The start time of the last Appraiser run. -- **AppraiserTaskEnabled** Whether the Appraiser task is enabled. -- **AppraiserTaskExitCode** The Appraiser task exist code. -- **AppraiserTaskLastRun** The last runtime for the Appraiser task. -- **CensusVersion** The version of Census that generated the current data for this device. -- **IEVersion** The version of Internet Explorer that is running on the device. - - -### Census.Battery - -This event sends type and capacity data about the battery on the device, as well as the number of connected standby devices in use, type to help keep Windows up to date. - -The following fields are available: - -- **InternalBatteryCapablities** Represents information about what the battery is capable of doing. -- **InternalBatteryCapacityCurrent** Represents the battery's current fully charged capacity in mWh (or relative). Compare this value to DesignedCapacity  to estimate the battery's wear. -- **InternalBatteryCapacityDesign** Represents the theoretical capacity of the battery when new, in mWh. -- **InternalBatteryNumberOfCharges** Provides the number of battery charges. This is used when creating new products and validating that existing products meets targeted functionality performance. -- **IsAlwaysOnAlwaysConnectedCapable** Represents whether the battery enables the device to be AlwaysOnAlwaysConnected . Boolean value. - - -### Census.Camera - -This event sends data about the resolution of cameras on the device, to help keep Windows up to date. - -The following fields are available: - -- **FrontFacingCameraResolution** Represents the resolution of the front facing camera in megapixels. If a front facing camera does not exist, then the value is 0. -- **RearFacingCameraResolution** Represents the resolution of the rear facing camera in megapixels. If a rear facing camera does not exist, then the value is 0. - - -### Census.Enterprise - -This event sends data about Azure presence, type, and cloud domain use in order to provide an understanding of the use and integration of devices in an enterprise, cloud, and server environment. - -The following fields are available: - -- **AADDeviceId** Azure Active Directory device ID. -- **AzureOSIDPresent** Represents the field used to identify an Azure machine. -- **AzureVMType** Represents whether the instance is Azure VM PAAS, Azure VM IAAS or any other VMs. -- **CDJType** Represents the type of cloud domain joined for the machine. -- **CommercialId** Represents the GUID for the commercial entity which the device is a member of.  Will be used to reflect insights back to customers. -- **ContainerType** The type of container, such as process or virtual machine hosted. -- **EnrollmentType** Defines the type of MDM enrollment on the device. -- **HashedDomain** The hashed representation of the user domain used for login. -- **IsCloudDomainJoined** Is this device joined to an Azure Active Directory (AAD) tenant? true/false -- **IsDERequirementMet** Represents if the device can do device encryption. -- **IsDeviceProtected** Represents if Device protected by BitLocker/Device Encryption -- **IsDomainJoined** Indicates whether a machine is joined to a domain. -- **IsEDPEnabled** Represents if Enterprise data protected on the device. -- **IsMDMEnrolled** Whether the device has been MDM Enrolled or not. -- **MPNId** Returns the Partner ID/MPN ID from Regkey. HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\DeployID -- **SCCMClientId** This ID correlate systems that send data to Compat Analytics (OMS) and other OMS based systems with systems in an Enterprise SCCM environment. -- **ServerFeatures** Represents the features installed on a Windows   Server. This can be used by developers and administrators who need to automate the process of determining the features installed on a set of server computers. -- **SystemCenterID** The SCCM ID is an anonymized one-way hash of the Active Directory Organization identifier - - -### Census.Firmware - -This event sends data about the BIOS and startup embedded in the device, to help keep Windows up to date. - -The following fields are available: - -- **FirmwareManufacturer** Represents the manufacturer of the device's firmware (BIOS). -- **FirmwareReleaseDate** Represents the date the current firmware was released. -- **FirmwareType** Represents the firmware type. The various types can be unknown, BIOS, UEFI. -- **FirmwareVersion** Represents the version of the current firmware. - - -### Census.Flighting - -This event sends Windows Insider data from customers participating in improvement testing and feedback programs, to help keep Windows up to date. - -The following fields are available: - -- **DeviceSampleRate** The telemetry sample rate assigned to the device. -- **EnablePreviewBuilds** Used to enable Windows Insider builds on a device. -- **FlightIds** A list of the different Windows Insider builds on this device. -- **FlightingBranchName** The name of the Windows Insider branch currently used by the device. -- **IsFlightsDisabled** Represents if the device is participating in the Windows Insider program. -- **MSA_Accounts** Represents a list of hashed IDs of the Microsoft Accounts that are flighting (pre-release builds) on this device. -- **SSRK** Retrieves the mobile targeting settings. - - -### Census.Hardware - -This event sends data about the device, including hardware type, OEM brand, model line, model, telemetry level setting, and TPM support, to help keep Windows up to date. - -The following fields are available: - -- **ActiveMicCount** The number of active microphones attached to the device. -- **ChassisType** Represents the type of device chassis, such as desktop or low profile desktop. The possible values can range between 1 - 36. -- **ComputerHardwareID** Identifies a device class that is represented by a hash of different SMBIOS fields. -- **D3DMaxFeatureLevel** Supported Direct3D version. -- **DeviceColor** Indicates a color of the device. -- **DeviceForm** Indicates the form as per the device classification. -- **DeviceName** The device name that is set by the user. -- **DigitizerSupport** Is a digitizer supported? -- **DUID** The device unique ID. -- **Gyroscope** Indicates whether the device has a gyroscope (a mechanical component that measures and maintains orientation). -- **InventoryId** The device ID used for compatibility testing. -- **Magnetometer** Indicates whether the device has a magnetometer (a mechanical component that works like a compass). -- **NFCProximity** Indicates whether the device supports NFC (a set of communication protocols that helps establish communication when applicable devices are brought close together.) -- **OEMDigitalMarkerFileName** The name of the file placed in the \Windows\system32\drivers directory that specifies the OEM and model name of the device. -- **OEMManufacturerName** The device manufacturer name. The OEMName for an inactive device is not reprocessed even if the clean OEM name is changed at a later date. -- **OEMModelBaseBoard** The baseboard model used by the OEM. -- **OEMModelBaseBoardVersion** Differentiates between developer and retail devices. -- **OEMModelName** The device model name. -- **OEMModelNumber** The device model number. -- **OEMModelSKU** The device edition that is defined by the manufacturer. -- **OEMModelSystemFamily** The system family set on the device by an OEM. -- **OEMModelSystemVersion** The system model version set on the device by the OEM. -- **OEMOptionalIdentifier** A Microsoft assigned value that represents a specific OEM subsidiary. -- **OEMSerialNumber** The serial number of the device that is set by the manufacturer. -- **PhoneManufacturer** The friendly name of the phone manufacturer. -- **PowerPlatformRole** The OEM preferred power management profile. It's used to help to identify the basic form factor of the device. -- **SoCName** The firmware manufacturer of the device. -- **StudyID** Used to identify retail and non-retail device. -- **TelemetryLevel** The telemetry level the user has opted into, such as Basic or Enhanced. -- **TelemetryLevelLimitEnhanced** The telemetry level for Windows Analytics-based solutions. -- **TelemetrySettingAuthority** Determines who set the telemetry level, such as GP, MDM, or the user. -- **TPMManufacturerId** The ID of the TPM manufacturer. -- **TPMManufacturerVersion** The version of the TPM manufacturer. -- **TPMVersion** The supported Trusted Platform Module (TPM) on the device. If no TPM is present, the value is 0. -- **VoiceSupported** Does the device have a cellular radio capable of making voice calls? - - -### Census.Memory - -This event sends data about the memory on the device, including ROM and RAM, to help keep Windows up to date. - -The following fields are available: - -- **TotalPhysicalRAM** Represents the physical memory (in MB). -- **TotalVisibleMemory** Represents the memory that is not reserved by the system. - - -### Census.Network - -This event sends data about the mobile and cellular network used by the device (mobile service provider, network, device ID, and service cost factors), to help keep Windows up to date. - -The following fields are available: - -- **IMEI0** Represents the International Mobile Station Equipment Identity. This number is usually unique and used by the mobile operator to distinguish different phone hardware. Microsoft does not have access to mobile operator billing data so collecting this data does not expose or identify the user. The two fields represent phone with dual sim coverage. -- **IMEI1** Represents the International Mobile Station Equipment Identity. This number is usually unique and used by the mobile operator to distinguish different phone hardware. Microsoft does not have access to mobile operator billing data so collecting this data does not expose or identify the user. The two fields represent phone with dual sim coverage. -- **MCC0** Represents the Mobile Country Code (MCC). It used with the Mobile Network Code (MNC) to uniquely identify a mobile network operator. The two fields represent phone with dual sim coverage. -- **MCC1** Represents the Mobile Country Code (MCC). It used with the Mobile Network Code (MNC) to uniquely identify a mobile network operator. The two fields represent phone with dual sim coverage. -- **MEID** Represents the Mobile Equipment Identity (MEID). MEID is a worldwide unique phone ID assigned to CDMA phones. MEID replaces electronic serial number (ESN), and is equivalent to IMEI for GSM and WCDMA phones. Microsoft does not have access to mobile operator billing data so collecting this data does not expose or identify the user. -- **MNC0** Retrieves the Mobile Network Code (MNC). It used with the Mobile Country Code (MCC) to uniquely identify a mobile network operator. The two fields represent phone with dual sim coverage. -- **MNC1** Retrieves the Mobile Network Code (MNC). It used with the Mobile Country Code (MCC) to uniquely identify a mobile network operator. The two fields represent phone with dual sim coverage. -- **MobileOperatorBilling** Represents the telephone company that provides services for mobile phone users. -- **MobileOperatorCommercialized** Represents which reseller and geography the phone is commercialized for. This is the set of values on the phone for who and where it was intended to be used. For example, the commercialized mobile operator code AT&T in the US would be ATT-US. -- **MobileOperatorNetwork0** Represents the operator of the current mobile network that the device is used on. (AT&T, T-Mobile, Vodafone). The two fields represent phone with dual sim coverage. -- **MobileOperatorNetwork1** Represents the operator of the current mobile network that the device is used on. (AT&T, T-Mobile, Vodafone). The two fields represent phone with dual sim coverage. -- **NetworkAdapterGUID** The GUID of the primary network adapter. -- **NetworkCost** Represents the network cost associated with a connection. -- **SPN0** Retrieves the Service Provider Name (SPN). For example, these might be AT&T, Sprint, T-Mobile, or Verizon. The two fields represent phone with dual sim coverage. -- **SPN1** Retrieves the Service Provider Name (SPN). For example, these might be AT&T, Sprint, T-Mobile, or Verizon. The two fields represent phone with dual sim coverage. - - -### Census.OS - -This event sends data about the operating system such as the version, locale, update service configuration, when and how it was originally installed, and whether it is a virtual device, to help keep Windows up to date. - -The following fields are available: - -- **ActivationChannel** Retrieves the retail license key or Volume license key for a machine. -- **AssignedAccessStatus** Kiosk configuration mode. -- **CompactOS** Indicates if the Compact OS feature from Win10 is enabled. -- **DeveloperUnlockStatus** Represents if a device has been developer unlocked by the user or Group Policy. -- **DeviceTimeZone** The time zone that is set on the device. Example: Pacific Standard Time -- **GenuineState** Retrieves the ID Value specifying the OS Genuine check. -- **InstallationType** Retrieves the type of OS installation. (Clean, Upgrade, Reset, Refresh, Update). -- **InstallLanguage** The first language installed on the user machine. -- **IsDeviceRetailDemo** Retrieves if the device is running in demo mode. -- **IsEduData** Returns Boolean if the education data policy is enabled. -- **IsPortableOperatingSystem** Retrieves whether OS is running Windows-To-Go -- **IsSecureBootEnabled** Retrieves whether Boot chain is signed under UEFI. -- **LanguagePacks** The list of language packages installed on the device. -- **LicenseStateReason** Retrieves why (or how) a system is licensed or unlicensed. The HRESULT may indicate an error code that indicates a key blocked error, or it may indicate that we are running an OS License granted by the MS store. -- **OA3xOriginalProductKey** Retrieves the License key stamped by the OEM to the machine. -- **OSEdition** Retrieves the version of the current OS. -- **OSInstallType** Retrieves a numeric description of what install was used on the device i.e. clean, upgrade, refresh, reset, etc -- **OSOOBEDateTime** Retrieves Out of Box Experience (OOBE) Date in Coordinated Universal Time (UTC). -- **OSSKU** Retrieves the Friendly Name of OS Edition. -- **OSSubscriptionStatus** Represents the existing status for enterprise subscription feature for PRO machines. -- **OSSubscriptionTypeId** Returns boolean for enterprise subscription feature for selected PRO machines. -- **OSTimeZoneBiasInMins** Retrieves the time zone set on machine. -- **OSUILocale** Retrieves the locale of the UI that is currently used by the OS. -- **ProductActivationResult** Returns Boolean if the OS Activation was successful. -- **ProductActivationTime** Returns the OS Activation time for tracking piracy issues. -- **ProductKeyID2** Retrieves the License key if the machine is updated with a new license key. -- **RACw7Id** Retrieves the Microsoft Reliability Analysis Component (RAC) Win7 Identifier. RAC is used to monitor and analyze system usage and reliability. -- **ServiceMachineIP** Retrieves the IP address of the KMS host used for anti-piracy. -- **ServiceMachinePort** Retrieves the port of the KMS host used for anti-piracy. -- **ServiceProductKeyID** Retrieves the License key of the KMS -- **SharedPCMode** Returns Boolean for education devices used as shared cart -- **Signature** Retrieves if it is a signature machine sold by Microsoft store. -- **SLICStatus** Whether a SLIC table exists on the device. -- **SLICVersion** Returns OS type/version from SLIC table. - - -### Census.PrivacySettings - -This event provides information about the device level privacy settings and whether device-level access was granted to these capabilities. Not all settings are applicable to all devices. Each field records the consent state for the corresponding privacy setting. The consent state is encoded as a 16-bit signed integer, where the first 8 bits represents the effective consent value, and the last 8 bits represent the authority that set the value. The effective consent (first 8 bits) is one of the following values: -3 = unexpected consent value, -2 = value was not requested, -1 = an error occurred while attempting to retrieve the value, 0 = undefined, 1 = allow, 2 = deny, 3 = prompt. The consent authority (last 8 bits) is one of the following values: -3 = unexpected authority, -2 = value was not requested, -1 = an error occurred while attempting to retrieve the value, 0 = system, 1 = a higher authority (a gating setting, the system-wide setting, or a group policy), 2 = advertising ID group policy, 3 = advertising ID policy for child account, 4 = privacy setting provider doesn't know the actual consent authority, 5 = consent was not configured and a default set in code was used, 6 = system default, 7 = organization policy, 8 = OneSettings. - -The following fields are available: - -- **Activity** Current state of the activity history setting. -- **ActivityHistoryCloudSync** Current state of the activity history cloud sync setting. -- **ActivityHistoryCollection** Current state of the activity history collection setting. -- **AdvertisingId** Current state of the advertising ID setting. -- **AppDiagnostics** Current state of the app diagnostics setting. -- **Appointments** Current state of the calendar setting. -- **Bluetooth** Current state of the Bluetooth capability setting. -- **BluetoothSync** Current state of the Bluetooth sync capability setting. -- **BroadFileSystemAccess** Current state of the broad file system access setting. -- **CellularData** Current state of the cellular data capability setting. -- **Chat** Current state of the chat setting. -- **Contacts** Current state of the contacts setting. -- **DocumentsLibrary** Current state of the documents library setting. -- **Email** Current state of the email setting. -- **FindMyDevice** Current state of the "find my device" setting. -- **GazeInput** Current state of the gaze input setting. -- **HumanInterfaceDevice** Current state of the human interface device setting. -- **InkTypeImprovement** Current state of the improve inking and typing setting. -- **Location** Current state of the location setting. -- **LocationHistory** Current state of the location history setting. -- **LocationHistoryCloudSync** Current state of the location history cloud sync setting. -- **LocationHistoryOnTimeline** Current state of the location history on timeline setting. -- **Microphone** Current state of the microphone setting. -- **PhoneCall** Current state of the phone call setting. -- **PhoneCallHistory** Current state of the call history setting. -- **PicturesLibrary** Current state of the pictures library setting. -- **Radios** Current state of the radios setting. -- **SensorsCustom** Current state of the custom sensor setting. -- **SerialCommunication** Current state of the serial communication setting. -- **Sms** Current state of the text messaging setting. -- **SpeechPersonalization** Current state of the speech services setting. -- **USB** Current state of the USB setting. -- **UserAccountInformation** Current state of the account information setting. -- **UserDataTasks** Current state of the tasks setting. -- **UserNotificationListener** Current state of the notifications setting. -- **VideosLibrary** Current state of the videos library setting. -- **Webcam** Current state of the camera setting. -- **WiFiDirect** Current state of the Wi-Fi direct setting. - - -### Census.Processor - -Provides information on several important data points about Processor settings - -The following fields are available: - -- **KvaShadow** This is the micro code information of the processor. -- **MMSettingOverride** Microcode setting of the processor. -- **MMSettingOverrideMask** Microcode setting override of the processor. -- **PreviousUpdateRevision** Previous microcode revision -- **ProcessorArchitecture** Retrieves the processor architecture of the installed operating system. -- **ProcessorClockSpeed** Clock speed of the processor in MHz. -- **ProcessorCores** Number of logical cores in the processor. -- **ProcessorIdentifier** Processor Identifier of a manufacturer. -- **ProcessorManufacturer** Name of the processor manufacturer. -- **ProcessorModel** Name of the processor model. -- **ProcessorPhysicalCores** Number of physical cores in the processor. -- **ProcessorUpdateRevision** The microcode revision. -- **ProcessorUpdateStatus** Enum value that represents the processor microcode load status -- **SocketCount** Count of CPU sockets. -- **SpeculationControl** Indicates whether the system has enabled protections needed to validate the speculation control vulnerability. - - -### Census.Security - -This event provides information on about security settings used to help keep Windows up to date and secure. - -The following fields are available: - -- **AvailableSecurityProperties** This field helps to enumerate and report state on the relevant security properties for Device Guard. -- **CGRunning** Credential Guard isolates and hardens key system and user secrets against compromise, helping to minimize the impact and breadth of a Pass the Hash style attack in the event that malicious code is already running via a local or network based vector. This field tells if Credential Guard is running. -- **DGState** This field summarizes the Device Guard state. -- **HVCIRunning** Hypervisor Code Integrity (HVCI) enables Device Guard to help protect kernel mode processes and drivers from vulnerability exploits and zero days. HVCI uses the processor’s functionality to force all software running in kernel mode to safely allocate memory. This field tells if HVCI is running. -- **IsSawGuest** Indicates whether the device is running as a Secure Admin Workstation Guest. -- **IsSawHost** Indicates whether the device is running as a Secure Admin Workstation Host. -- **RequiredSecurityProperties** Describes the required security properties to enable virtualization-based security. -- **SecureBootCapable** Systems that support Secure Boot can have the feature turned off via BIOS. This field tells if the system is capable of running Secure Boot, regardless of the BIOS setting. -- **SModeState** The Windows S mode trail state. -- **VBSState** Virtualization-based security (VBS) uses the hypervisor to help protect the kernel and other parts of the operating system. Credential Guard and Hypervisor Code Integrity (HVCI) both depend on VBS to isolate/protect secrets, and kernel-mode code integrity validation. VBS has a tri-state that can be Disabled, Enabled, or Running. - - -### Census.Speech - -This event is used to gather basic speech settings on the device. - -The following fields are available: - -- **AboveLockEnabled** Cortana setting that represents if Cortana can be invoked when the device is locked. -- **GPAllowInputPersonalization** Indicates if a Group Policy setting has enabled speech functionalities. -- **HolographicSpeechInputDisabled** Holographic setting that represents if the attached HMD devices have speech functionality disabled by the user. -- **HolographicSpeechInputDisabledRemote** Indicates if a remote policy has disabled speech functionalities for the HMD devices. -- **KeyVer** Version information for the census speech event. -- **KWSEnabled** Cortana setting that represents if a user has enabled the "Hey Cortana" keyword spotter (KWS). -- **MDMAllowInputPersonalization** Indicates if an MDM policy has enabled speech functionalities. -- **RemotelyManaged** Indicates if the device is being controlled by a remote administrator (MDM or Group Policy) in the context of speech functionalities. -- **SpeakerIdEnabled** Cortana setting that represents if keyword detection has been trained to try to respond to a single user's voice. -- **SpeechServicesEnabled** Windows setting that represents whether a user is opted-in for speech services on the device. -- **SpeechServicesValueSource** Indicates the deciding factor for the effective online speech recognition privacy policy settings: remote admin, local admin, or user preference. - - -### Census.Storage - -This event sends data about the total capacity of the system volume and primary disk, to help keep Windows up to date. - -The following fields are available: - -- **PrimaryDiskTotalCapacity** Retrieves the amount of disk space on the primary disk of the device in MB. -- **PrimaryDiskType** Retrieves an enumerator value of type STORAGE_BUS_TYPE that indicates the type of bus to which the device is connected. This should be used to interpret the raw device properties at the end of this structure (if any). -- **StorageReservePassedPolicy** Indicates whether the Storage Reserve policy, which ensures that updates have enough disk space and customers are on the latest OS, is enabled on this device. -- **SystemVolumeTotalCapacity** Retrieves the size of the partition that the System volume is installed on in MB. - - -### Census.Userdefault - -This event sends data about the current user's default preferences for browser and several of the most popular extensions and protocols, to help keep Windows up to date. - -The following fields are available: - -- **CalendarType** The calendar identifiers that are used to specify different calendars. -- **DefaultApp** The current uer's default program selected for the following extension or protocol: .html, .htm, .jpg, .jpeg, .png, .mp3, .mp4, .mov, .pdf. -- **DefaultBrowserProgId** The ProgramId of the current user's default browser. -- **LongDateFormat** The long date format the user has selected. -- **ShortDateFormat** The short date format the user has selected. - - -### Census.UserDisplay - -This event sends data about the logical/physical display size, resolution and number of internal/external displays, and VRAM on the system, to help keep Windows up to date. - -The following fields are available: - -- **InternalPrimaryDisplayLogicalDPIX** Retrieves the logical DPI in the x-direction of the internal display. -- **InternalPrimaryDisplayLogicalDPIY** Retrieves the logical DPI in the y-direction of the internal display. -- **InternalPrimaryDisplayPhysicalDPIX** Retrieves the physical DPI in the x-direction of the internal display. -- **InternalPrimaryDisplayPhysicalDPIY** Retrieves the physical DPI in the y-direction of the internal display. -- **InternalPrimaryDisplayResolutionHorizontal** Retrieves the number of pixels in the horizontal direction of the internal display. -- **InternalPrimaryDisplayResolutionVertical** Retrieves the number of pixels in the vertical direction of the internal display. -- **InternalPrimaryDisplaySizePhysicalH** Retrieves the physical horizontal length of the display in mm. Used for calculating the diagonal length in inches . -- **InternalPrimaryDisplaySizePhysicalY** Retrieves the physical vertical length of the display in mm. Used for calculating the diagonal length in inches -- **NumberofExternalDisplays** Retrieves the number of external displays connected to the machine -- **NumberofInternalDisplays** Retrieves the number of internal displays in a machine. -- **VRAMDedicated** Retrieves the video RAM in MB. -- **VRAMDedicatedSystem** Retrieves the amount of memory on the dedicated video card. -- **VRAMSharedSystem** Retrieves the amount of RAM memory that the video card can use. - - -### Census.UserNLS - -This event sends data about the default app language, input, and display language preferences set by the user, to help keep Windows up to date. - -The following fields are available: - -- **DefaultAppLanguage** The current user Default App Language. -- **DisplayLanguage** The current user preferred Windows Display Language. -- **HomeLocation** The current user location, which is populated using GetUserGeoId() function. -- **KeyboardInputLanguages** The Keyboard input languages installed on the device. -- **SpeechInputLanguages** The Speech Input languages installed on the device. - - -### Census.UserPrivacySettings - -This event provides information about the current users privacy settings and whether device-level access was granted to these capabilities. Not all settings are applicable to all devices. Each field records the consent state for the corresponding privacy setting. The consent state is encoded as a 16-bit signed integer, where the first 8 bits represents the effective consent value, and the last 8 bits represents the authority that set the value. The effective consent is one of the following values: -3 = unexpected consent value, -2 = value was not requested, -1 = an error occurred while attempting to retrieve the value, 0 = undefined, 1 = allow, 2 = deny, 3 = prompt. The consent authority is one of the following values: -3 = unexpected authority, -2 = value was not requested, -1 = an error occurred while attempting to retrieve the value, 0 = user, 1 = a higher authority (a gating setting, the system-wide setting, or a group policy), 2 = advertising ID group policy, 3 = advertising ID policy for child account, 4 = privacy setting provider doesn't know the actual consent authority, 5 = consent was not configured and a default set in code was used, 6 = system default, 7 = organization policy, 8 = OneSettings. - -The following fields are available: - -- **Activity** Current state of the activity history setting. -- **ActivityHistoryCloudSync** Current state of the activity history cloud sync setting. -- **ActivityHistoryCollection** Current state of the activity history collection setting. -- **AdvertisingId** Current state of the advertising ID setting. -- **AppDiagnostics** Current state of the app diagnostics setting. -- **Appointments** Current state of the calendar setting. -- **Bluetooth** Current state of the Bluetooth capability setting. -- **BluetoothSync** Current state of the Bluetooth sync capability setting. -- **BroadFileSystemAccess** Current state of the broad file system access setting. -- **CellularData** Current state of the cellular data capability setting. -- **Chat** Current state of the chat setting. -- **Contacts** Current state of the contacts setting. -- **DocumentsLibrary** Current state of the documents library setting. -- **Email** Current state of the email setting. -- **GazeInput** Current state of the gaze input setting. -- **HumanInterfaceDevice** Current state of the human interface device setting. -- **InkTypeImprovement** Current state of the improve inking and typing setting. -- **InkTypePersonalization** Current state of the inking and typing personalization setting. -- **Location** Current state of the location setting. -- **LocationHistory** Current state of the location history setting. -- **LocationHistoryCloudSync** Current state of the location history cloud synchronization setting. -- **LocationHistoryOnTimeline** Current state of the location history on timeline setting. -- **Microphone** Current state of the microphone setting. -- **PhoneCall** Current state of the phone call setting. -- **PhoneCallHistory** Current state of the call history setting. -- **PicturesLibrary** Current state of the pictures library setting. -- **Radios** Current state of the radios setting. -- **SensorsCustom** Current state of the custom sensor setting. -- **SerialCommunication** Current state of the serial communication setting. -- **Sms** Current state of the text messaging setting. -- **SpeechPersonalization** Current state of the speech services setting. -- **USB** Current state of the USB setting. -- **UserAccountInformation** Current state of the account information setting. -- **UserDataTasks** Current state of the tasks setting. -- **UserNotificationListener** Current state of the notifications setting. -- **VideosLibrary** Current state of the videos library setting. -- **Webcam** Current state of the camera setting. -- **WiFiDirect** Current state of the Wi-Fi direct setting. - - -### Census.VM - -This event sends data indicating whether virtualization is enabled on the device, and its various characteristics, to help keep Windows up to date. - -The following fields are available: - -- **CloudService** Indicates which cloud service, if any, that this virtual machine is running within. -- **HyperVisor** Retrieves whether the current OS is running on top of a Hypervisor. -- **IOMMUPresent** Represents if an input/output memory management unit (IOMMU) is present. -- **IsVDI** Is the device using Virtual Desktop Infrastructure? -- **IsVirtualDevice** Retrieves that when the Hypervisor is Microsoft's Hyper-V Hypervisor or other Hv#1 Hypervisor, this field will be set to FALSE for the Hyper-V host OS and TRUE for any guest OS's. This field should not be relied upon for non-Hv#1 Hypervisors. -- **SLATSupported** Represents whether Second Level Address Translation (SLAT) is supported by the hardware. -- **VirtualizationFirmwareEnabled** Represents whether virtualization is enabled in the firmware. - - -### Census.WU - -This event sends data about the Windows update server and other App store policies, to help keep Windows up to date. - -The following fields are available: - -- **AppraiserGatedStatus** Indicates whether a device has been gated for upgrading. -- **AppStoreAutoUpdate** Retrieves the Appstore settings for auto upgrade. (Enable/Disabled). -- **AppStoreAutoUpdateMDM** Retrieves the App Auto Update value for MDM: 0 - Disallowed. 1 - Allowed. 2 - Not configured. Default: [2] Not configured -- **AppStoreAutoUpdatePolicy** Retrieves the Microsoft Store App Auto Update group policy setting -- **DelayUpgrade** Retrieves the Windows upgrade flag for delaying upgrades. -- **OSAssessmentFeatureOutOfDate** How many days has it been since a the last feature update was released but the device did not install it? -- **OSAssessmentForFeatureUpdate** Is the device is on the latest feature update? -- **OSAssessmentForQualityUpdate** Is the device on the latest quality update? -- **OSAssessmentForSecurityUpdate** Is the device on the latest security update? -- **OSAssessmentQualityOutOfDate** How many days has it been since a the last quality update was released but the device did not install it? -- **OSAssessmentReleaseInfoTime** The freshness of release information used to perform an assessment. -- **OSRollbackCount** The number of times feature updates have rolled back on the device. -- **OSRolledBack** A flag that represents when a feature update has rolled back during setup. -- **OSUninstalled** A flag that represents when a feature update is uninstalled on a device . -- **OSWUAutoUpdateOptions** Retrieves the auto update settings on the device. -- **OSWUAutoUpdateOptionsSource** The source of auto update setting that appears in the OSWUAutoUpdateOptions field. For example: Group Policy (GP), Mobile Device Management (MDM), and Default. -- **UninstallActive** A flag that represents when a device has uninstalled a previous upgrade recently. -- **UpdateServiceURLConfigured** Retrieves if the device is managed by Windows Server Update Services (WSUS). -- **WUDeferUpdatePeriod** Retrieves if deferral is set for Updates. -- **WUDeferUpgradePeriod** Retrieves if deferral is set for Upgrades. -- **WUDODownloadMode** Retrieves whether DO is turned on and how to acquire/distribute updates Delivery Optimization (DO) allows users to deploy previously downloaded WU updates to other devices on the same network. -- **WUMachineId** Retrieves the Windows Update (WU) Machine Identifier. -- **WUPauseState** Retrieves WU setting to determine if updates are paused. -- **WUServer** Retrieves the HTTP(S) URL of the WSUS server that is used by Automatic Updates and API callers (by default). - - -### Census.Xbox - -This event sends data about the Xbox Console, such as Serial Number and DeviceId, to help keep Windows up to date. - -The following fields are available: - -- **XboxConsolePreferredLanguage** Retrieves the preferred language selected by the user on Xbox console. -- **XboxConsoleSerialNumber** Retrieves the serial number of the Xbox console. -- **XboxLiveDeviceId** Retrieves the unique device ID of the console. -- **XboxLiveSandboxId** Retrieves the developer sandbox ID if the device is internal to Microsoft. - - -## Common data extensions - -### Common Data Extensions.app - -Describes the properties of the running application. This extension could be populated by a client app or a web app. - -The following fields are available: - -- **asId** An integer value that represents the app session. This value starts at 0 on the first app launch and increments after each subsequent app launch per boot session. -- **env** The environment from which the event was logged. -- **expId** Associates a flight, such as an OS flight, or an experiment, such as a web site UX experiment, with an event. -- **id** Represents a unique identifier of the client application currently loaded in the process producing the event; and is used to group events together and understand usage pattern, errors by application. -- **locale** The locale of the app. -- **name** The name of the app. -- **userId** The userID as known by the application. -- **ver** Represents the version number of the application. Used to understand errors by Version, Usage by Version across an app. - - -### Common Data Extensions.container - -Describes the properties of the container for events logged within a container. - -The following fields are available: - -- **epoch** An ID that's incremented for each SDK initialization. -- **localId** The device ID as known by the client. -- **osVer** The operating system version. -- **seq** An ID that's incremented for each event. -- **type** The container type. Examples: Process or VMHost - - -### Common Data Extensions.cs - -Describes properties related to the schema of the event. - -The following fields are available: - -- **sig** A common schema signature that identifies new and modified event schemas. - - -### Common Data Extensions.device - -Describes the device-related fields. - -The following fields are available: - -- **deviceClass** The device classification. For example, Desktop, Server, or Mobile. -- **localId** A locally-defined unique ID for the device. This is not the human-readable device name. Most likely equal to the value stored at HKLM\Software\Microsoft\SQMClient\MachineId -- **make** Device manufacturer. -- **model** Device model. - - -### Common Data Extensions.Envelope - -Represents an envelope that contains all of the common data extensions. - -The following fields are available: - -- **cV** Represents the Correlation Vector: A single field for tracking partial order of related telemetry events across component boundaries. -- **data** Represents the optional unique diagnostic data for a particular event schema. -- **ext_app** Describes the properties of the running application. This extension could be populated by either a client app or a web app. See [Common Data Extensions.app](#common-data-extensionsapp). -- **ext_container** Describes the properties of the container for events logged within a container. See [Common Data Extensions.container](#common-data-extensionscontainer). -- **ext_cs** Describes properties related to the schema of the event. See [Common Data Extensions.cs](#common-data-extensionscs). -- **ext_device** Describes the device-related fields. See [Common Data Extensions.device](#common-data-extensionsdevice). -- **ext_os** Describes the operating system properties that would be populated by the client. See [Common Data Extensions.os](#common-data-extensionsos). -- **ext_receipts** Describes the fields related to time as provided by the client for debugging purposes. See [Common Data Extensions.receipts](#common-data-extensionsreceipts). -- **ext_sdk** Describes the fields related to a platform library required for a specific SDK. See [Common Data Extensions.sdk](#common-data-extensionssdk). -- **ext_user** Describes the fields related to a user. See [Common Data Extensions.user](#common-data-extensionsuser). -- **ext_utc** Describes the fields that might be populated by a logging library on Windows. See [Common Data Extensions.utc](#common-data-extensionsutc). -- **ext_xbl** Describes the fields related to XBOX Live. See [Common Data Extensions.xbl](#common-data-extensionsxbl). -- **flags** Represents a collection of bits that describe how the event should be processed by the Connected User Experience and Telemetry component pipeline. The lowest-order byte is the event persistence. The next byte is the event latency. -- **iKey** Represents an ID for applications or other logical groupings of events. -- **name** Represents the uniquely qualified name for the event. -- **popSample** Represents the effective sample rate for this event at the time it was generated by a client. -- **time** Represents the event date time in Coordinated Universal Time (UTC) when the event was generated on the client. This should be in ISO 8601 format. -- **ver** Represents the major and minor version of the extension. - - -### Common Data Extensions.os - -Describes some properties of the operating system. - -The following fields are available: - -- **bootId** An integer value that represents the boot session. This value starts at 0 on first boot after OS install and increments after every reboot. -- **expId** Represents the experiment ID. The standard for associating a flight, such as an OS flight (pre-release build), or an experiment, such as a web site UX experiment, with an event is to record the flight / experiment IDs in Part A of the common schema. -- **locale** Represents the locale of the operating system. -- **name** Represents the operating system name. -- **ver** Represents the major and minor version of the extension. - - -### Common Data Extensions.receipts - -Represents various time information as provided by the client and helps for debugging purposes. - -The following fields are available: - -- **originalTime** The original event time. -- **uploadTime** The time the event was uploaded. - - -### Common Data Extensions.sdk - -Used by platform specific libraries to record fields that are required for a specific SDK. - -The following fields are available: - -- **epoch** An ID that is incremented for each SDK initialization. -- **installId** An ID that's created during the initialization of the SDK for the first time. -- **libVer** The SDK version. -- **seq** An ID that is incremented for each event. - - -### Common Data Extensions.user - -Describes the fields related to a user. - -The following fields are available: - -- **authId** This is an ID of the user associated with this event that is deduced from a token such as a Microsoft Account ticket or an XBOX token. -- **locale** The language and region. -- **localId** Represents a unique user identity that is created locally and added by the client. This is not the user's account ID. - - -### Common Data Extensions.utc - -Describes the properties that could be populated by a logging library on Windows. - -The following fields are available: - -- **aId** Represents the ETW ActivityId. Logged via TraceLogging or directly via ETW. -- **bSeq** Upload buffer sequence number in the format: buffer identifier:sequence number -- **cat** Represents a bitmask of the ETW Keywords associated with the event. -- **cpId** The composer ID, such as Reference, Desktop, Phone, Holographic, Hub, IoT Composer. -- **epoch** Represents the epoch and seqNum fields, which help track how many events were fired and how many events were uploaded, and enables identification of data lost during upload and de-duplication of events on the ingress server. -- **flags** Represents the bitmap that captures various Windows specific flags. -- **mon** Combined monitor and event sequence numbers in the format: monitor sequence : event sequence -- **op** Represents the ETW Op Code. -- **raId** Represents the ETW Related ActivityId. Logged via TraceLogging or directly via ETW. -- **seq** Represents the sequence field used to track absolute order of uploaded events. It is an incrementing identifier for each event added to the upload queue. The Sequence helps track how many events were fired and how many events were uploaded and enables identification of data lost during upload and de-duplication of events on the ingress server. -- **stId** Represents the Scenario Entry Point ID. This is a unique GUID for each event in a diagnostic scenario. This used to be Scenario Trigger ID. - - -### Common Data Extensions.xbl - -Describes the fields that are related to XBOX Live. - -The following fields are available: - -- **claims** Any additional claims whose short claim name hasn't been added to this structure. -- **did** XBOX device ID -- **dty** XBOX device type -- **dvr** The version of the operating system on the device. -- **eid** A unique ID that represents the developer entity. -- **exp** Expiration time -- **ip** The IP address of the client device. -- **nbf** Not before time -- **pid** A comma separated list of PUIDs listed as base10 numbers. -- **sbx** XBOX sandbox identifier -- **sid** The service instance ID. -- **sty** The service type. -- **tid** The XBOX Live title ID. -- **tvr** The XBOX Live title version. -- **uts** A bit field, with 2 bits being assigned to each user ID listed in xid. This field is omitted if all users are retail accounts. -- **xid** A list of base10-encoded XBOX User IDs. - - -## Common data fields - -### Ms.Device.DeviceInventoryChange - -Describes the installation state for all hardware and software components available on a particular device. - -The following fields are available: - -- **action** The change that was invoked on a device inventory object. -- **inventoryId** Device ID used for Compatibility testing -- **objectInstanceId** Object identity which is unique within the device scope. -- **objectType** Indicates the object type that the event applies to. -- **syncId** A string used to group StartSync, EndSync, Add, and Remove operations that belong together. This field is unique by Sync period and is used to disambiguate in situations where multiple agents perform overlapping inventories for the same object. - - -## Compatibility events - -### Microsoft.Windows.Compatibility.Apphelp.SdbFix - -Product instrumentation for helping debug/troubleshoot issues with inbox compatibility components. - -The following fields are available: - -- **AppName** Name of the application impacted by SDB. -- **FixID** SDB GUID. -- **Flags** List of flags applied. -- **ImageName** Name of file. - - -## Component-based servicing events - -### CbsServicingProvider.CbsCapabilityEnumeration - -This event reports on the results of scanning for optional Windows content on Windows Update. - -The following fields are available: - -- **architecture** Indicates the scan was limited to the specified architecture. -- **capabilityCount** The number of optional content packages found during the scan. -- **clientId** The name of the application requesting the optional content. -- **duration** The amount of time it took to complete the scan. -- **hrStatus** The HReturn code of the scan. -- **language** Indicates the scan was limited to the specified language. -- **majorVersion** Indicates the scan was limited to the specified major version. -- **minorVersion** Indicates the scan was limited to the specified minor version. -- **namespace** Indicates the scan was limited to packages in the specified namespace. -- **sourceFilter** A bitmask indicating the scan checked for locally available optional content. -- **stackBuild** The build number of the servicing stack. -- **stackMajorVersion** The major version number of the servicing stack. -- **stackMinorVersion** The minor version number of the servicing stack. -- **stackRevision** The revision number of the servicing stack. - - -### CbsServicingProvider.CbsCapabilitySessionFinalize - -This event provides information about the results of installing or uninstalling optional Windows content from Windows Update. - -The following fields are available: - -- **capabilities** The names of the optional content packages that were installed. -- **clientId** The name of the application requesting the optional content. -- **currentID** The ID of the current install session. -- **downloadSource** The source of the download. -- **highestState** The highest final install state of the optional content. -- **hrLCUReservicingStatus** Indicates whether the optional content was updated to the latest available version. -- **hrStatus** The HReturn code of the install operation. -- **rebootCount** The number of reboots required to complete the install. -- **retryID** The session ID that will be used to retry a failed operation. -- **retryStatus** Indicates whether the install will be retried in the event of failure. -- **stackBuild** The build number of the servicing stack. -- **stackMajorVersion** The major version number of the servicing stack. -- **stackMinorVersion** The minor version number of the servicing stack. -- **stackRevision** The revision number of the servicing stack. - - -### CbsServicingProvider.CbsCapabilitySessionPended - -This event provides information about the results of installing optional Windows content that requires a reboot to keep Windows up to date. - -The following fields are available: - -- **clientId** The name of the application requesting the optional content. -- **pendingDecision** Indicates the cause of reboot, if applicable. - - -### CbsServicingProvider.CbsLateAcquisition - -This event sends data to indicate if some Operating System packages could not be updated as part of an upgrade, to help keep Windows up to date. - -The following fields are available: - -- **Features** The list of feature packages that could not be updated. -- **RetryID** The ID identifying the retry attempt to update the listed packages. - - -### CbsServicingProvider.CbsPackageRemoval - -This event provides information about the results of uninstalling a Windows Cumulative Security Update to help keep Windows up to date. - -The following fields are available: - -- **buildVersion** The build number of the security update being uninstalled. -- **clientId** The name of the application requesting the uninstall. -- **currentStateEnd** The final state of the update after the operation. -- **failureDetails** Information about the cause of a failure, if applicable. -- **failureSourceEnd** The stage during the uninstall where the failure occurred. -- **hrStatusEnd** The overall exit code of the operation. -- **initiatedOffline** Indicates if the uninstall was initiated for a mounted Windows image. -- **majorVersion** The major version number of the security update being uninstalled. -- **minorVersion** The minor version number of the security update being uninstalled. -- **originalState** The starting state of the update before the operation. -- **pendingDecision** Indicates the cause of reboot, if applicable. -- **primitiveExecutionContext** The state during system startup when the uninstall was completed. -- **revisionVersion** The revision number of the security update being uninstalled. -- **transactionCanceled** Indicates whether the uninstall was cancelled. - - -### CbsServicingProvider.CbsQualityUpdateInstall - -This event reports on the performance and reliability results of installing Servicing content from Windows Update to keep Windows up to date. - -The following fields are available: - -- **buildVersion** The build version number of the update package. -- **clientId** The name of the application requesting the optional content. -- **corruptionHistoryFlags** A bitmask of the types of component store corruption that have caused update failures on the device. -- **corruptionType** An enumeration listing the type of data corruption responsible for the current update failure. -- **currentStateEnd** The final state of the package after the operation has completed. -- **doqTimeSeconds** The time in seconds spent updating drivers. -- **executeTimeSeconds** The number of seconds required to execute the install. -- **failureDetails** The driver or installer that caused the update to fail. -- **failureSourceEnd** An enumeration indicating at what phase of the update a failure occurred. -- **hrStatusEnd** The return code of the install operation. -- **initiatedOffline** A true or false value indicating whether the package was installed into an offline Windows Imaging Format (WIM) file. -- **majorVersion** The major version number of the update package. -- **minorVersion** The minor version number of the update package. -- **originalState** The starting state of the package. -- **overallTimeSeconds** The time (in seconds) to perform the overall servicing operation. -- **planTimeSeconds** The time in seconds required to plan the update operations. -- **poqTimeSeconds** The time in seconds processing file and registry operations. -- **postRebootTimeSeconds** The time (in seconds) to do startup processing for the update. -- **preRebootTimeSeconds** The time (in seconds) between execution of the installation and the reboot. -- **primitiveExecutionContext** An enumeration indicating at what phase of shutdown or startup the update was installed. -- **rebootCount** The number of reboots required to install the update. -- **rebootTimeSeconds** The time (in seconds) before startup processing begins for the update. -- **resolveTimeSeconds** The time in seconds required to resolve the packages that are part of the update. -- **revisionVersion** The revision version number of the update package. -- **rptTimeSeconds** The time in seconds spent executing installer plugins. -- **shutdownTimeSeconds** The time (in seconds) required to do shutdown processing for the update. -- **stackRevision** The revision number of the servicing stack. -- **stageTimeSeconds** The time (in seconds) required to stage all files that are part of the update. - - -## Deployment extensions - -### DeploymentTelemetry.Deployment_End - -This event indicates that a Deployment 360 API has completed. - -The following fields are available: - -- **ClientId** Client ID of the user utilizing the D360 API. -- **ErrorCode** Error code of action. -- **FlightId** The specific ID of the Windows Insider build the device is getting. -- **Mode** Phase in upgrade. -- **RelatedCV** The correction vector (CV) of any other related events -- **Result** End result of the action. - - -### DeploymentTelemetry.Deployment_SetupBoxLaunch - -This event indicates that the Deployment 360 APIs have launched Setup Box. - -The following fields are available: - -- **ClientId** The client ID of the user utilizing the D360 API. -- **FlightId** The specific ID of the Windows Insider build the device is getting. -- **Quiet** Whether Setup will run in quiet mode or full mode. -- **RelatedCV** The correlation vector (CV) of any other related events. -- **SetupMode** The current setup phase. - - -### DeploymentTelemetry.Deployment_SetupBoxResult - -This event indicates that the Deployment 360 APIs have received a return from Setup Box. - -The following fields are available: - -- **ClientId** Client ID of the user utilizing the D360 API. -- **ErrorCode** Error code of the action. -- **FlightId** The specific ID of the Windows Insider build the device is getting. -- **Quiet** Indicates whether Setup will run in quiet mode or full mode. -- **RelatedCV** The correlation vector (CV) of any other related events. -- **SetupMode** The current Setup phase. - - -### DeploymentTelemetry.Deployment_Start - -This event indicates that a Deployment 360 API has been called. - -The following fields are available: - -- **ClientId** Client ID of the user utilizing the D360 API. -- **FlightId** The specific ID of the Windows Insider build the device is getting. -- **Mode** The current phase of the upgrade. -- **RelatedCV** The correlation vector (CV) of any other related events. - - -## Diagnostic data events - -### TelClientSynthetic.AuthorizationInfo_RuntimeTransition - -This event sends data indicating that a device has undergone a change of telemetry opt-in level detected at UTC startup, to help keep Windows up to date. The telemetry opt-in level signals what data we are allowed to collect. - -The following fields are available: - -- **CanAddMsaToMsTelemetry** True if we can add MSA PUID and CID to telemetry, false otherwise. -- **CanCollectAnyTelemetry** True if we are allowed to collect partner telemetry, false otherwise. -- **CanCollectCoreTelemetry** True if we can collect CORE/Basic telemetry, false otherwise. -- **CanCollectHeartbeats** True if we can collect heartbeat telemetry, false otherwise. -- **CanCollectOsTelemetry** True if we can collect diagnostic data telemetry, false otherwise. -- **CanCollectWindowsAnalyticsEvents** True if we can collect Windows Analytics data, false otherwise. -- **CanPerformDiagnosticEscalations** True if we can perform diagnostic escalation collection, false otherwise. -- **CanPerformTraceEscalations** True if we can perform trace escalation collection, false otherwise. -- **CanReportScenarios** True if we can report scenario completions, false otherwise. -- **PreviousPermissions** Bitmask of previous telemetry state. -- **TransitionFromEverythingOff** True if we are transitioning from all telemetry being disabled, false otherwise. - - -### TelClientSynthetic.AuthorizationInfo_Startup - -Fired by UTC at startup to signal what data we are allowed to collect. - -The following fields are available: - -- **CanAddMsaToMsTelemetry** True if we can add MSA PUID and CID to telemetry, false otherwise. -- **CanCollectAnyTelemetry** True if we are allowed to collect partner telemetry, false otherwise. -- **CanCollectCoreTelemetry** True if we can collect CORE/Basic telemetry, false otherwise. -- **CanCollectHeartbeats** True if we can collect heartbeat telemetry, false otherwise. -- **CanCollectOsTelemetry** True if we can collect diagnostic data telemetry, false otherwise. -- **CanCollectWindowsAnalyticsEvents** True if we can collect Windows Analytics data, false otherwise. -- **CanPerformDiagnosticEscalations** True if we can perform diagnostic escalation collection, false otherwise. -- **CanPerformTraceEscalations** True if we can perform trace escalation collection, false otherwise. -- **CanReportScenarios** True if we can report scenario completions, false otherwise. -- **PreviousPermissions** Bitmask of previous telemetry state. -- **TransitionFromEverythingOff** True if we are transitioning from all telemetry being disabled, false otherwise. - - -### TelClientSynthetic.ConnectivityHeartBeat_0 - -This event sends data about the connectivity status of the Connected User Experience and Telemetry component that uploads telemetry events. If an unrestricted free network (such as Wi-Fi) is available, this event updates the last successful upload time. Otherwise, it checks whether a Connectivity Heartbeat event was fired in the past 24 hours, and if not, it fires an event. A Connectivity Heartbeat event also fires when a device recovers from costed network to free network. - -The following fields are available: - -- **CensusExitCode** Returns last execution codes from census client run. -- **CensusStartTime** Returns timestamp corresponding to last successful census run. -- **CensusTaskEnabled** Returns Boolean value for the census task (Enable/Disable) on client machine. -- **LastConnectivityLossTime** Retrieves the last time the device lost free network. -- **NetworkState** Retrieves the network state: 0 = No network. 1 = Restricted network. 2 = Free network. -- **NoNetworkTime** Retrieves the time spent with no network (since the last time) in seconds. -- **RestrictedNetworkTime** Retrieves the time spent on a metered (cost restricted) network in seconds. - - -### TelClientSynthetic.HeartBeat_5 - -This event sends data about the health and quality of the diagnostic data from the given device, to help keep Windows up to date. It also enables data analysts to determine how 'trusted' the data is from a given device. - -The following fields are available: - -- **AgentConnectionErrorsCount** Number of non-timeout errors associated with the host/agent channel. -- **CensusExitCode** The last exit code of the Census task. -- **CensusStartTime** Time of last Census run. -- **CensusTaskEnabled** True if Census is enabled, false otherwise. -- **CompressedBytesUploaded** Number of compressed bytes uploaded. -- **ConsumerDroppedCount** Number of events dropped at consumer layer of telemetry client. -- **CriticalDataDbDroppedCount** Number of critical data sampled events dropped at the database layer. -- **CriticalDataThrottleDroppedCount** The number of critical data sampled events that were dropped because of throttling. -- **CriticalOverflowEntersCounter** Number of times critical overflow mode was entered in event DB. -- **DbCriticalDroppedCount** Total number of dropped critical events in event DB. -- **DbDroppedCount** Number of events dropped due to DB fullness. -- **DbDroppedFailureCount** Number of events dropped due to DB failures. -- **DbDroppedFullCount** Number of events dropped due to DB fullness. -- **DecodingDroppedCount** Number of events dropped due to decoding failures. -- **EnteringCriticalOverflowDroppedCounter** Number of events dropped due to critical overflow mode being initiated. -- **EtwDroppedBufferCount** Number of buffers dropped in the UTC ETW session. -- **EtwDroppedCount** Number of events dropped at ETW layer of telemetry client. -- **EventsPersistedCount** Number of events that reached the PersistEvent stage. -- **EventStoreLifetimeResetCounter** Number of times event DB was reset for the lifetime of UTC. -- **EventStoreResetCounter** Number of times event DB was reset. -- **EventStoreResetSizeSum** Total size of event DB across all resets reports in this instance. -- **EventSubStoreResetCounter** Number of times event DB was reset. -- **EventSubStoreResetSizeSum** Total size of event DB across all resets reports in this instance. -- **EventsUploaded** Number of events uploaded. -- **Flags** Flags indicating device state such as network state, battery state, and opt-in state. -- **FullTriggerBufferDroppedCount** Number of events dropped due to trigger buffer being full. -- **HeartBeatSequenceNumber** The sequence number of this heartbeat. -- **InvalidHttpCodeCount** Number of invalid HTTP codes received from contacting Vortex. -- **LastAgentConnectionError** Last non-timeout error encountered in the host/agent channel. -- **LastEventSizeOffender** Event name of last event which exceeded max event size. -- **LastInvalidHttpCode** Last invalid HTTP code received from Vortex. -- **MaxActiveAgentConnectionCount** The maximum number of active agents during this heartbeat timeframe. -- **MaxInUseScenarioCounter** Soft maximum number of scenarios loaded by UTC. -- **PreviousHeartBeatTime** Time of last heartbeat event (allows chaining of events). -- **RepeatedUploadFailureDropped** Number of events lost due to repeated upload failures for a single buffer. -- **SettingsHttpAttempts** Number of attempts to contact OneSettings service. -- **SettingsHttpFailures** The number of failures from contacting the OneSettings service. -- **ThrottledDroppedCount** Number of events dropped due to throttling of noisy providers. -- **TopUploaderErrors** List of top errors received from the upload endpoint. -- **UploaderDroppedCount** Number of events dropped at the uploader layer of telemetry client. -- **UploaderErrorCount** Number of errors received from the upload endpoint. -- **VortexFailuresTimeout** The number of timeout failures received from Vortex. -- **VortexHttpAttempts** Number of attempts to contact Vortex. -- **VortexHttpFailures4xx** Number of 400-499 error codes received from Vortex. -- **VortexHttpFailures5xx** Number of 500-599 error codes received from Vortex. -- **VortexHttpResponseFailures** Number of Vortex responses that are not 2XX or 400. -- **VortexHttpResponsesWithDroppedEvents** Number of Vortex responses containing at least 1 dropped event. - - -### TelClientSynthetic.HeartBeat_Aria_5 - -This event is the telemetry client ARIA heartbeat. - -The following fields are available: - -- **CompressedBytesUploaded** Number of compressed bytes uploaded. -- **CriticalDataDbDroppedCount** Number of critical data sampled events dropped at the database layer. -- **CriticalOverflowEntersCounter** Number of times critical overflow mode was entered in event database. -- **DbCriticalDroppedCount** Total number of dropped critical events in event database. -- **DbDroppedCount** Number of events dropped at the database layer. -- **DbDroppedFailureCount** Number of events dropped due to database failures. -- **DbDroppedFullCount** Number of events dropped due to database being full. -- **EnteringCriticalOverflowDroppedCounter** Number of events dropped due to critical overflow mode being initiated. -- **EventsPersistedCount** Number of events that reached the PersistEvent stage. -- **EventStoreLifetimeResetCounter** Number of times the event store has been reset. -- **EventStoreResetCounter** Number of times the event store has been reset during this heartbeat. -- **EventStoreResetSizeSum** Size of event store reset in bytes. -- **EventsUploaded** Number of events uploaded. -- **HeartBeatSequenceNumber** The sequence number of this heartbeat. -- **InvalidHttpCodeCount** Number of invalid HTTP codes received from contacting Vortex. -- **LastEventSizeOffender** Event name of last event which exceeded max event size. -- **LastInvalidHttpCode** Last invalid HTTP code received from Vortex. -- **PreviousHeartBeatTime** The FILETIME of the previous heartbeat fire. -- **RepeatedUploadFailureDropped** Number of events lost due to repeated upload failures for a single buffer. -- **SettingsHttpAttempts** Number of attempts to contact OneSettings service. -- **SettingsHttpFailures** Number of failures from contacting OneSettings service. -- **TopUploaderErrors** List of top errors received from the upload endpoint. -- **UploaderDroppedCount** Number of events dropped at the uploader layer of telemetry client. -- **UploaderErrorCount** Number of errors received from the upload endpoint. -- **VortexFailuresTimeout** Number of time out failures received from Vortex. -- **VortexHttpAttempts** Number of attempts to contact Vortex. -- **VortexHttpFailures4xx** Number of 400-499 error codes received from Vortex. -- **VortexHttpFailures5xx** Number of 500-599 error codes received from Vortex. -- **VortexHttpResponseFailures** Number of Vortex responses that are not 2XX or 400. -- **VortexHttpResponsesWithDroppedEvents** Number of Vortex responses containing at least 1 dropped event. - - -### TelClientSynthetic.HeartBeat_Seville_5 - -This event is sent by the universal telemetry client (UTC) as a heartbeat signal for Sense. - -The following fields are available: - -- **AgentConnectionErrorsCount** Number of non-timeout errors associated with the host or agent channel. -- **CompressedBytesUploaded** Number of compressed bytes uploaded. -- **ConsumerDroppedCount** Number of events dropped at consumer layer of the telemetry client. -- **CriticalDataDbDroppedCount** Number of critical data sampled events dropped at the database layer. -- **CriticalDataThrottleDroppedCount** Number of critical data sampled events dropped due to throttling. -- **CriticalOverflowEntersCounter** Number of times critical overflow mode was entered in event database. -- **DailyUploadQuotaInBytes** Daily upload quota for Sense in bytes (only in in-proc mode). -- **DbCriticalDroppedCount** Total number of dropped critical events in event database. -- **DbDroppedCount** Number of events dropped due to database being full. -- **DbDroppedFailureCount** Number of events dropped due to database failures. -- **DbDroppedFullCount** Number of events dropped due to database being full. -- **DecodingDroppedCount** Number of events dropped due to decoding failures. -- **DiskSizeInBytes** Size of event store for Sense in bytes (only in in-proc mode). -- **EnteringCriticalOverflowDroppedCounter** Number of events dropped due to critical overflow mode being initiated. -- **EtwDroppedBufferCount** Number of buffers dropped in the universal telemetry client (UTC) event tracing for Windows (ETW) session. -- **EtwDroppedCount** Number of events dropped at the event tracing for Windows (ETW) layer of telemetry client. -- **EventsPersistedCount** Number of events that reached the PersistEvent stage. -- **EventStoreLifetimeResetCounter** Number of times event the database was reset for the lifetime of the universal telemetry client (UTC). -- **EventStoreResetCounter** Number of times the event database was reset. -- **EventStoreResetSizeSum** Total size of the event database across all resets reports in this instance. -- **EventsUploaded** Number of events uploaded. -- **Flags** Flags indicating device state, such as network state, battery state, and opt-in state. -- **FullTriggerBufferDroppedCount** Number of events dropped due to trigger buffer being full. -- **HeartBeatSequenceNumber** The sequence number of this heartbeat. -- **InvalidHttpCodeCount** Number of invalid HTTP codes received from contacting Vortex. -- **LastAgentConnectionError** Last non-timeout error encountered in the host/agent channel. -- **LastEventSizeOffender** Event name of last event which exceeded the maximum event size. -- **LastInvalidHttpCode** Last invalid HTTP code received from Vortex. -- **MaxActiveAgentConnectionCount** Maximum number of active agents during this heartbeat timeframe. -- **NormalUploadTimerMillis** Number of milliseconds between each upload of normal events for SENSE (only in in-proc mode). -- **PreviousHeartBeatTime** Time of last heartbeat event (allows chaining of events). -- **RepeatedUploadFailureDropped** Number of events lost due to repeated failed uploaded attempts. -- **SettingsHttpAttempts** Number of attempts to contact OneSettings service. -- **SettingsHttpFailures** Number of failures from contacting the OneSettings service. -- **ThrottledDroppedCount** Number of events dropped due to throttling of noisy providers. -- **TopUploaderErrors** Top uploader errors, grouped by endpoint and error type. -- **UploaderDroppedCount** Number of events dropped at the uploader layer of the telemetry client. -- **UploaderErrorCount** Number of input for the TopUploaderErrors mode estimation. -- **VortexFailuresTimeout** Number of time out failures received from Vortex. -- **VortexHttpAttempts** Number of attempts to contact Vortex. -- **VortexHttpFailures4xx** Number of 400-499 error codes received from Vortex. -- **VortexHttpFailures5xx** Number of 500-599 error codes received from Vortex. -- **VortexHttpResponseFailures** Number of Vortex responses that are not 2XX or 400. -- **VortexHttpResponsesWithDroppedEvents** Number of Vortex responses containing at least 1 dropped event. - - -## Direct to update events - -### Microsoft.Windows.DirectToUpdate.DTUCoordinatorCheckApplicabilityGenericFailure - -This event indicatse that we have received an unexpected error in the Direct to Update (DTU) Coordinators CheckApplicability call. - -The following fields are available: - -- **CampaignID** ID of the campaign being run. -- **ClientID** ID of the client receiving the update. -- **CoordinatorVersion** Coordinator version of Direct to Update. -- **CV** Correlation vector. -- **hResult** HRESULT of the failure. - - -### Microsoft.Windows.DirectToUpdate.DTUCoordinatorCleanupGenericFailure - -This event indicates that we have received an unexpected error in the Direct to Update (DTU) Coordinator Cleanup call. - -The following fields are available: - -- **CampaignID** Campaign ID being run -- **ClientID** Client ID being run -- **CoordinatorVersion** Coordinator version of DTU -- **CV** Correlation vector -- **hResult** HRESULT of the failure - - -### Microsoft.Windows.DirectToUpdate.DTUCoordinatorCleanupSuccess - -This event indicates that the Coordinator Cleanup call succeeded. - -The following fields are available: - -- **CampaignID** Campaign ID being run -- **ClientID** Client ID being run -- **CoordinatorVersion** Coordinator version of DTU -- **CV** Correlation vector - - -### Microsoft.Windows.DirectToUpdate.DTUCoordinatorCommitGenericFailure - -This event indicates that we have received an unexpected error in the Direct to Update (DTU) Coordinator Commit call. - -The following fields are available: - -- **CampaignID** Campaign ID being run. -- **ClientID** Client ID being run. -- **CoordinatorVersion** Coordinator version of DTU. -- **CV** Correlation vector. -- **hResult** HRESULT of the failure. - - -### Microsoft.Windows.DirectToUpdate.DTUCoordinatorCommitSuccess - -This event indicates that the Coordinator Commit call succeeded. - -The following fields are available: - -- **CampaignID** Campaign ID being run. -- **ClientID** Client ID being run. -- **CoordinatorVersion** Coordinator version of DTU. -- **CV** Correlation vector. - - -### Microsoft.Windows.DirectToUpdate.DTUCoordinatorDownloadGenericFailure - -This event indicates that we have received an unexpected error in the Direct to Update (DTU) Coordinator Download call. - -The following fields are available: - -- **CampaignID** Campaign ID being run. -- **ClientID** Client ID being run. -- **CoordinatorVersion** Coordinator version of DTU. -- **CV** Correlation vector. -- **hResult** HRESULT of the failure. - - -### Microsoft.Windows.DirectToUpdate.DTUCoordinatorDownloadIgnoredFailure - -This event indicates that we have received an error in the Direct to Update (DTU) Coordinator Download call that will be ignored. - -The following fields are available: - -- **CampaignID** Campaign ID being run. -- **ClientID** Client ID being run. -- **CoordinatorVersion** Coordinator version of DTU. -- **CV** Correlation vector. -- **hResult** HRESULT of the failure. - - -### Microsoft.Windows.DirectToUpdate.DTUCoordinatorDownloadSuccess - -This event indicates that the Coordinator Download call succeeded. - -The following fields are available: - -- **CampaignID** Campaign ID being run. -- **ClientID** Client ID being run. -- **CoordinatorVersion** Coordinator version of DTU. -- **CV** Correlation vector. - - -### Microsoft.Windows.DirectToUpdate.DTUCoordinatorHandleShutdownGenericFailure - -This event indicates that we have received an unexpected error in the Direct to Update (DTU) Coordinator HandleShutdown call. - -The following fields are available: - -- **CampaignID** Campaign ID being run. -- **ClientID** Client ID being run. -- **CoordinatorVersion** Coordinate version of DTU. -- **CV** Correlation vector. -- **hResult** HRESULT of the failure. - - -### Microsoft.Windows.DirectToUpdate.DTUCoordinatorHandleShutdownSuccess - -This event indicates that the Coordinator HandleShutdown call succeeded. - -The following fields are available: - -- **CampaignID** Campaign ID being run. -- **ClientID** Client ID being run. -- **CoordinatorVersion** Coordinator version of DTU. -- **CV** Correlation vector. - - -### Microsoft.Windows.DirectToUpdate.DTUCoordinatorInitializeGenericFailure - -This event indicates that we have received an unexpected error in the Direct to Update (DTU) Coordinator Initialize call. - -The following fields are available: - -- **CampaignID** Campaign ID being run. -- **ClientID** Client ID being run. -- **CoordinatorVersion** Coordinator version of DTU. -- **CV** Correlation vector. -- **hResult** HRESULT of the failure. - - -### Microsoft.Windows.DirectToUpdate.DTUCoordinatorInitializeSuccess - -This event indicates that the Coordinator Initialize call succeeded. - -The following fields are available: - -- **CampaignID** Campaign ID being run. -- **ClientID** Client ID being run. -- **CoordinatorVersion** Coordinator version of DTU. -- **CV** Correlation vector. - - -### Microsoft.Windows.DirectToUpdate.DTUCoordinatorInstallGenericFailure - -This event indicates that we have received an unexpected error in the Direct to Update (DTU) Coordinator Install call. - -The following fields are available: - -- **CampaignID** Campaign ID being run. -- **ClientID** Client ID being run. -- **CoordinatorVersion** Coordinator version of DTU. -- **CV** Correlation vector. -- **hResult** HRESULT of the failure. - - -### Microsoft.Windows.DirectToUpdate.DTUCoordinatorInstallIgnoredFailure - -This event indicates that we have received an error in the Direct to Update (DTU) Coordinator Install call that will be ignored. - -The following fields are available: - -- **CampaignID** Campaign ID being run. -- **ClientID** Client ID being run. -- **CoordinatorVersion** Coordinator version of DTU. -- **CV** Correlation vector. -- **hResult** HRESULT of the failure. - - -### Microsoft.Windows.DirectToUpdate.DTUCoordinatorInstallSuccess - -This event indicates that the Coordinator Install call succeeded. - -The following fields are available: - -- **CampaignID** Campaign ID being run. -- **ClientID** Client ID being run. -- **CoordinatorVersion** Coordinator version of DTU. -- **CV** Correlation vector. - - -### Microsoft.Windows.DirectToUpdate.DTUCoordinatorProgressCallBack - -This event indicates that the Coordinator's progress callback has been called. - -The following fields are available: - -- **CampaignID** Campaign ID being run. -- **ClientID** Client ID being run. -- **CoordinatorVersion** Coordinator version of DTU. -- **CV** Correlation vector. -- **DeployPhase** Current Deploy Phase. - - -### Microsoft.Windows.DirectToUpdate.DTUCoordinatorSetCommitReadySuccess - -This event indicates that the Coordinator SetCommitReady call succeeded. - -The following fields are available: - -- **CampaignID** ID of the update campaign being run. -- **ClientID** ID of the client receiving the update. -- **CoordinatorVersion** Coordinator version of Direct to Update. -- **CV** Correlation vector. - - -### Microsoft.Windows.DirectToUpdate.DTUCoordinatorWaitForRebootUiNotShown - -This event indicates that the Coordinator WaitForRebootUi call succeeded. - -The following fields are available: - -- **CampaignID** Campaign ID being run. -- **ClientID** ID of the client receiving the update. -- **CoordinatorVersion** Coordinator version of Direct to Update. -- **CV** Correlation vector. -- **hResult** HRESULT of the failure. - - -### Microsoft.Windows.DirectToUpdate.DTUCoordinatorWaitForRebootUiSelection - -This event indicates that the user selected an option on the Reboot UI. - -The following fields are available: - -- **CampaignID** ID of the update campaign being run. -- **ClientID** ID of the client receiving the update. -- **CoordinatorVersion** Coordinator version of Direct to Update. -- **CV** Correlation vector. -- **rebootUiSelection** Selection on the Reboot UI. - - -### Microsoft.Windows.DirectToUpdate.DTUCoordinatorWaitForRebootUiSuccess - -This event indicates that the Coordinator WaitForRebootUi call succeeded. - -The following fields are available: - -- **CampaignID** ID of the update campaign being run. -- **ClientID** ID of the client receiving the update. -- **CoordinatorVersion** Coordinator version of Direct to Update. -- **CV** Correlation vector. - - -### Microsoft.Windows.DirectToUpdate.DTUHandlerCheckApplicabilityInternalGenericFailure - -This event indicates that we have received an unexpected error in the Direct to Update (DTU) Handler CheckApplicabilityInternal call. - -The following fields are available: - -- **CampaignID** ID of the campaign being run. -- **ClientID** ID of the client receiving the update. -- **CoordinatorVersion** Coordinator version of Direct to Update. -- **CV** Correlation vector. -- **hResult** HRESULT of the failure. - - -### Microsoft.Windows.DirectToUpdate.DTUHandlerCheckApplicabilityInternalSuccess - -This event indicates that the Handler CheckApplicabilityInternal call succeeded. - -The following fields are available: - -- **ApplicabilityResult** The result of the applicability check. -- **CampaignID** ID of the update campaign being run. -- **ClientID** ID of the client receiving the update. -- **CoordinatorVersion** Coordinator version of Direct to Update. -- **CV** Correlation vector. - - -### Microsoft.Windows.DirectToUpdate.DTUHandlerCheckApplicabilitySuccess - -This event indicates that the Handler CheckApplicability call succeeded. - -The following fields are available: - -- **ApplicabilityResult** The result code indicating whether the update is applicable. -- **CampaignID** ID of the update campaign being run. -- **ClientID** ID of the client receiving the update. -- **CoordinatorVersion** Coordinator version of Direct to Update. -- **CV** Correlation vector. -- **CV_new** New correlation vector. - - -### Microsoft.Windows.DirectToUpdate.DTUHandlerCheckIfCoordinatorMinApplicableVersionSuccess - -This event indicates that the Handler CheckIfCoordinatorMinApplicableVersion call succeeded. - -The following fields are available: - -- **CampaignID** ID of the update campaign being run. -- **CheckIfCoordinatorMinApplicableVersionResult** Result of CheckIfCoordinatorMinApplicableVersion function. -- **ClientID** ID of the client receiving the update. -- **CoordinatorVersion** Coordinator version of Direct to Update. -- **CV** Correlation vector. - - -### Microsoft.Windows.DirectToUpdate.DTUHandlerCommitGenericFailure - -This event indicates that we have received an unexpected error in the Direct to Update (DTU) Handler Commit call. - -The following fields are available: - -- **CampaignID** ID of the update campaign being run. -- **ClientID** ID of the client receiving the update. -- **CoordinatorVersion** Coordinator version of Direct to Update. -- **CV** Correlation vector. -- **CV_new** New correlation vector. -- **hResult** HRESULT of the failure. - - -### Microsoft.Windows.DirectToUpdate.DTUHandlerCommitSuccess - -This event indicates that the Handler Commit call succeeded. - -The following fields are available: - -- **CampaignID** ID of the update campaign being run.run -- **ClientID** ID of the client receiving the update. -- **CoordinatorVersion** Coordinator version of Direct to Update. -- **CV** Correlation vector. -- **CV_new** New correlation vector. - - -### Microsoft.Windows.DirectToUpdate.DTUHandlerDownloadAndExtractCabFailure - -This event indicates that the Handler Download and Extract cab call failed. - -The following fields are available: - -- **CampaignID** ID of the update campaign being run. -- **ClientID** ID of the client receiving the update. -- **CoordinatorVersion** Coordinator version of Direct to Update. -- **CV** Correlation vector. -- **DownloadAndExtractCabFunction_failureReason** Reason why the update download and extract process failed. -- **hResult** HRESULT of the failure. - - -### Microsoft.Windows.DirectToUpdate.DTUHandlerDownloadAndExtractCabSuccess - -This event indicates that the Handler Download and Extract cab call succeeded. - -The following fields are available: - -- **CampaignID** ID of the update campaign being run. -- **ClientID** ID of the client receiving the update. -- **CoordinatorVersion** Coordinator version of Direct to Update. -- **CV** Correlation vector. - - -### Microsoft.Windows.DirectToUpdate.DTUHandlerDownloadGenericFailure - -This event indicates that we have received an unexpected error in the Direct to Update (DTU) Handler Download call. - -The following fields are available: - -- **CampaignID** ID of the update campaign being run. -- **ClientID** ID of the client receiving the update. -- **CoordinatorVersion** Coordinator version of Direct to Update. -- **CV** Correlation vector. -- **hResult** HRESULT of the failure. - - -### Microsoft.Windows.DirectToUpdate.DTUHandlerDownloadSuccess - -This event indicates that the Handler Download call succeeded. - -The following fields are available: - -- **CampaignID** ID of the update campaign being run. -- **ClientID** ID of the client receiving the update. -- **CoordinatorVersion** Coordinator version of Direct to Update. -- **CV** Correlation vector. - - -### Microsoft.Windows.DirectToUpdate.DTUHandlerInitializeGenericFailure - -This event indicates that we have received an unexpected error in the Direct to Update (DTU) Handler Initialize call. - -The following fields are available: - -- **CampaignID** ID of the update campaign being run. -- **ClientID** ID of the client receiving the update. -- **CoordinatorVersion** Coordinator version of Direct to Update. -- **CV** Correlation vector. -- **DownloadAndExtractCabFunction_hResult** HRESULT of the download and extract. -- **hResult** HRESULT of the failure. - - -### Microsoft.Windows.DirectToUpdate.DTUHandlerInitializeSuccess - -This event indicates that the Handler Initialize call succeeded. - -The following fields are available: - -- **CampaignID** ID of the update campaign being run. -- **ClientID** ID of the client receiving the update. -- **CoordinatorVersion** Coordinator version of Direct to Update. -- **CV** Correlation vector. -- **DownloadAndExtractCabFunction_hResult** HRESULT of the download and extraction. - - -### Microsoft.Windows.DirectToUpdate.DTUHandlerInstallGenericFailure - -This event indicates that we have received an unexpected error in the Direct to Update (DTU) Handler Install call. - -The following fields are available: - -- **CampaignID** ID of the update campaign being run. -- **ClientID** ID of the client receiving the update. -- **CoordinatorVersion** Coordinator version of Direct to Update. -- **CV** Correlation vector. -- **hResult** HRESULT of the failure. - - -### Microsoft.Windows.DirectToUpdate.DTUHandlerInstallSuccess - -This event indicates that the Coordinator Install call succeeded. - -The following fields are available: - -- **CampaignID** ID of the update campaign being run. -- **ClientID** ID of the client receiving the update. -- **CoordinatorVersion** Coordinator version of Direct to Update. -- **CV** Correlation vector. - - -### Microsoft.Windows.DirectToUpdate.DTUHandlerSetCommitReadySuccess - -This event indicates that the Handler SetCommitReady call succeeded. - -The following fields are available: - -- **CampaignID** ID of the campaign being run. -- **ClientID** ID of the client receiving the update. -- **CoordinatorVersion** Coordinator version of Direct to Update. -- **CV** Correlation vector. - - -### Microsoft.Windows.DirectToUpdate.DTUHandlerWaitForRebootUiGenericFailure - -This event indicates that we have received an unexpected error in the Direct to Update (DTU) Handler WaitForRebootUi call. - -The following fields are available: - -- **CampaignID** The ID of the campaigning being run. -- **ClientID** ID of the client receiving the update. -- **CoordinatorVersion** Coordinator version of Direct to Update. -- **CV** Correlation vector. -- **hResult** The HRESULT of the failure. - - -### Microsoft.Windows.DirectToUpdate.DTUHandlerWaitForRebootUiSuccess - -This event indicates that the Handler WaitForRebootUi call succeeded. - -The following fields are available: - -- **CampaignID** ID of the campaign being run. -- **ClientID** ID of the client receiving the update. -- **CoordinatorVersion** Coordinator version of Direct to Update. -- **CV** Correlation vector. - - -## DxgKernelTelemetry events - -### DxgKrnlTelemetry.GPUAdapterInventoryV2 - -This event sends basic GPU and display driver information to keep Windows and display drivers up-to-date. - -The following fields are available: - -- **AdapterTypeValue** The numeric value indicating the type of Graphics adapter. -- **aiSeqId** The event sequence ID. -- **bootId** The system boot ID. -- **BrightnessVersionViaDDI** The version of the Display Brightness Interface. -- **ComputePreemptionLevel** The maximum preemption level supported by GPU for compute payload. -- **DedicatedSystemMemoryB** The amount of system memory dedicated for GPU use (in bytes). -- **DedicatedVideoMemoryB** The amount of dedicated VRAM of the GPU (in bytes). -- **DisplayAdapterLuid** The display adapter LUID. -- **DriverDate** The date of the display driver. -- **DriverRank** The rank of the display driver. -- **DriverVersion** The display driver version. -- **DX10UMDFilePath** The file path to the location of the DirectX 10 Display User Mode Driver in the Driver Store. -- **DX11UMDFilePath** The file path to the location of the DirectX 11 Display User Mode Driver in the Driver Store. -- **DX12UMDFilePath** The file path to the location of the DirectX 12 Display User Mode Driver in the Driver Store. -- **DX9UMDFilePath** The file path to the location of the DirectX 9 Display User Mode Driver in the Driver Store. -- **GPUDeviceID** The GPU device ID. -- **GPUPreemptionLevel** The maximum preemption level supported by GPU for graphics payload. -- **GPURevisionID** The GPU revision ID. -- **GPUVendorID** The GPU vendor ID. -- **InterfaceId** The GPU interface ID. -- **IsDisplayDevice** Does the GPU have displaying capabilities? -- **IsHwSchSupported** Indicates whether the adapter supports hardware scheduling. -- **IsHybridDiscrete** Does the GPU have discrete GPU capabilities in a hybrid device? -- **IsHybridIntegrated** Does the GPU have integrated GPU capabilities in a hybrid device? -- **IsLDA** Is the GPU comprised of Linked Display Adapters? -- **IsMiracastSupported** Does the GPU support Miracast? -- **IsMismatchLDA** Is at least one device in the Linked Display Adapters chain from a different vendor? -- **IsMPOSupported** Does the GPU support Multi-Plane Overlays? -- **IsMsMiracastSupported** Are the GPU Miracast capabilities driven by a Microsoft solution? -- **IsPostAdapter** Is this GPU the POST GPU in the device? -- **IsRemovable** TRUE if the adapter supports being disabled or removed. -- **IsRenderDevice** Does the GPU have rendering capabilities? -- **IsSoftwareDevice** Is this a software implementation of the GPU? -- **KMDFilePath** The file path to the location of the Display Kernel Mode Driver in the Driver Store. -- **MeasureEnabled** Is the device listening to MICROSOFT_KEYWORD_MEASURES? -- **MsHybridDiscrete** Indicates whether the adapter is a discrete adapter in a hybrid configuration. -- **NumVidPnSources** The number of supported display output sources. -- **NumVidPnTargets** The number of supported display output targets. -- **SharedSystemMemoryB** The amount of system memory shared by GPU and CPU (in bytes). -- **SubSystemID** The subsystem ID. -- **SubVendorID** The GPU sub vendor ID. -- **TelemetryEnabled** Is the device listening to MICROSOFT_KEYWORD_TELEMETRY? -- **TelInvEvntTrigger** What triggered this event to be logged? Example: 0 (GPU enumeration) or 1 (DxgKrnlTelemetry provider toggling) -- **version** The event version. -- **WDDMVersion** The Windows Display Driver Model version. - - -## Failover Clustering events - -### Microsoft.Windows.Server.FailoverClusteringCritical.ClusterSummary2 - -This event returns information about how many resources and of what type are in the server cluster. This data is collected to keep Windows Server safe, secure, and up to date. The data includes information about whether hardware is configured correctly, if the software is patched correctly, and assists in preventing crashes by attributing issues (like fatal errors) to workloads and system configurations. - -The following fields are available: - -- **autoAssignSite** The cluster parameter: auto site. -- **autoBalancerLevel** The cluster parameter: auto balancer level. -- **autoBalancerMode** The cluster parameter: auto balancer mode. -- **blockCacheSize** The configured size of the block cache. -- **ClusterAdConfiguration** The ad configuration of the cluster. -- **clusterAdType** The cluster parameter: mgmt_point_type. -- **clusterDumpPolicy** The cluster configured dump policy. -- **clusterFunctionalLevel** The current cluster functional level. -- **clusterGuid** The unique identifier for the cluster. -- **clusterWitnessType** The witness type the cluster is configured for. -- **countNodesInSite** The number of nodes in the cluster. -- **crossSiteDelay** The cluster parameter: CrossSiteDelay. -- **crossSiteThreshold** The cluster parameter: CrossSiteThreshold. -- **crossSubnetDelay** The cluster parameter: CrossSubnetDelay. -- **crossSubnetThreshold** The cluster parameter: CrossSubnetThreshold. -- **csvCompatibleFilters** The cluster parameter: ClusterCsvCompatibleFilters. -- **csvIncompatibleFilters** The cluster parameter: ClusterCsvIncompatibleFilters. -- **csvResourceCount** The number of resources in the cluster. -- **currentNodeSite** The name configured for the current site for the cluster. -- **dasModeBusType** The direct storage bus type of the storage spaces. -- **downLevelNodeCount** The number of nodes in the cluster that are running down-level. -- **drainOnShutdown** Specifies whether a node should be drained when it is shut down. -- **dynamicQuorumEnabled** Specifies whether dynamic Quorum has been enabled. -- **enforcedAntiAffinity** The cluster parameter: enforced anti affinity. -- **genAppNames** The win32 service name of a clustered service. -- **genSvcNames** The command line of a clustered genapp. -- **hangRecoveryAction** The cluster parameter: hang recovery action. -- **hangTimeOut** Specifies the “hang time out” parameter for the cluster. -- **isCalabria** Specifies whether storage spaces direct is enabled. -- **isMixedMode** Identifies if the cluster is running with different version of OS for nodes. -- **isRunningDownLevel** Identifies if the current node is running down-level. -- **logLevel** Specifies the granularity that is logged in the cluster log. -- **logSize** Specifies the size of the cluster log. -- **lowerQuorumPriorityNodeId** The cluster parameter: lower quorum priority node ID. -- **minNeverPreempt** The cluster parameter: minimum never preempt. -- **minPreemptor** The cluster parameter: minimum preemptor priority. -- **netftIpsecEnabled** The parameter: netftIpsecEnabled. -- **NodeCount** The number of nodes in the cluster. -- **nodeId** The current node number in the cluster. -- **nodeResourceCounts** Specifies the number of node resources. -- **nodeResourceOnlineCounts** Specifies the number of node resources that are online. -- **numberOfSites** The number of different sites. -- **numNodesInNoSite** The number of nodes not belonging to a site. -- **plumbAllCrossSubnetRoutes** The cluster parameter: plumb all cross subnet routes. -- **preferredSite** The preferred site location. -- **privateCloudWitness** Specifies whether a private cloud witness exists for this cluster. -- **quarantineDuration** The quarantine duration. -- **quarantineThreshold** The quarantine threshold. -- **quorumArbitrationTimeout** In the event of an arbitration event, this specifies the quorum timeout period. -- **resiliencyLevel** Specifies the level of resiliency. -- **resourceCounts** Specifies the number of resources. -- **resourceTypeCounts** Specifies the number of resource types in the cluster. -- **resourceTypes** Data representative of each resource type. -- **resourceTypesPath** Data representative of the DLL path for each resource type. -- **sameSubnetDelay** The cluster parameter: same subnet delay. -- **sameSubnetThreshold** The cluster parameter: same subnet threshold. -- **secondsInMixedMode** The amount of time (in seconds) that the cluster has been in mixed mode (nodes with different operating system versions in the same cluster). -- **securityLevel** The cluster parameter: security level. -- **securityLevelForStorage** The cluster parameter: security level for storage. -- **sharedVolumeBlockCacheSize** Specifies the block cache size for shared for shared volumes. -- **shutdownTimeoutMinutes** Specifies the amount of time it takes to time out when shutting down. -- **upNodeCount** Specifies the number of nodes that are up (online). -- **useClientAccessNetworksForCsv** The cluster parameter: use client access networks for CSV. -- **vmIsolationTime** The cluster parameter: VM isolation time. -- **witnessDatabaseWriteTimeout** Specifies the timeout period for writing to the quorum witness database. - - -## Fault Reporting events - -### Microsoft.Windows.FaultReporting.AppCrashEvent - -This event sends data about crashes for both native and managed applications, to help keep Windows up to date. The data includes information about the crashing process and a summary of its exception record. It does not contain any Watson bucketing information. The bucketing information is recorded in a Windows Error Reporting (WER) event that is generated when the WER client reports the crash to the Watson service, and the WER event will contain the same ReportID (see field 14 of crash event, field 19 of WER event) as the crash event for the crash being reported. AppCrash is emitted once for each crash handled by WER (e.g. from an unhandled exception or FailFast or ReportException). Note that Generic Watson event types (e.g. from PLM) that may be considered crashes\" by a user DO NOT emit this event. - -The following fields are available: - -- **AppName** The name of the app that has crashed. -- **AppSessionGuid** GUID made up of process ID and is used as a correlation vector for process instances in the telemetry backend. -- **AppTimeStamp** The date/time stamp of the app. -- **AppVersion** The version of the app that has crashed. -- **ExceptionCode** The exception code returned by the process that has crashed. -- **ExceptionOffset** The address where the exception had occurred. -- **Flags** Flags indicating how reporting is done. For example, queue the report, do not offer JIT debugging, or do not terminate the process after reporting. -- **FriendlyAppName** The description of the app that has crashed, if different from the AppName. Otherwise, the process name. -- **IsFatal** True/False to indicate whether the crash resulted in process termination. -- **ModName** Exception module name (e.g. bar.dll). -- **ModTimeStamp** The date/time stamp of the module. -- **ModVersion** The version of the module that has crashed. -- **PackageFullName** Store application identity. -- **PackageRelativeAppId** Store application identity. -- **ProcessArchitecture** Architecture of the crashing process, as one of the PROCESSOR_ARCHITECTURE_* constants: 0: PROCESSOR_ARCHITECTURE_INTEL. 5: PROCESSOR_ARCHITECTURE_ARM. 9: PROCESSOR_ARCHITECTURE_AMD64. 12: PROCESSOR_ARCHITECTURE_ARM64. -- **ProcessCreateTime** The time of creation of the process that has crashed. -- **ProcessId** The ID of the process that has crashed. -- **ReportId** A GUID used to identify the report. This can used to track the report across Watson. -- **TargetAppId** The kernel reported AppId of the application being reported. -- **TargetAppVer** The specific version of the application being reported -- **TargetAsId** The sequence number for the hanging process. - - -## Feature update events - -### Microsoft.Windows.Upgrade.Uninstall.UninstallFinalizedAndRebootTriggered - -This event indicates that the uninstall was properly configured and that a system reboot was initiated. - - - -### Microsoft.Windows.Upgrade.Uninstall.UninstallGoBackButtonClicked - -This event sends basic metadata about the starting point of uninstalling a feature update, which helps ensure customers can safely revert to a well-known state if the update caused any problems. - - - -## Hang Reporting events - -### Microsoft.Windows.HangReporting.AppHangEvent - -This event sends data about hangs for both native and managed applications, to help keep Windows up to date. It does not contain any Watson bucketing information. The bucketing information is recorded in a Windows Error Reporting (WER) event that is generated when the WER client reports the hang to the Watson service, and the WER event will contain the same ReportID (see field 13 of hang event, field 19 of WER event) as the hang event for the hang being reported. AppHang is reported only on PC devices. It handles classic Win32 hangs and is emitted only once per report. Some behaviors that may be perceived by a user as a hang are reported by app managers (e.g. PLM/RM/EM) as Watson Generics and will not produce AppHang events. - -The following fields are available: - -- **AppName** The name of the app that has hung. -- **AppSessionGuid** GUID made up of process id used as a correlation vector for process instances in the telemetry backend. -- **AppVersion** The version of the app that has hung. -- **IsFatal** True/False based on whether the hung application caused the creation of a Fatal Hang Report. -- **PackageFullName** Store application identity. -- **PackageRelativeAppId** Store application identity. -- **ProcessArchitecture** Architecture of the hung process, as one of the PROCESSOR_ARCHITECTURE_* constants: 0: PROCESSOR_ARCHITECTURE_INTEL. 5: PROCESSOR_ARCHITECTURE_ARM. 9: PROCESSOR_ARCHITECTURE_AMD64. 12: PROCESSOR_ARCHITECTURE_ARM64. -- **ProcessCreateTime** The time of creation of the process that has hung. -- **ProcessId** The ID of the process that has hung. -- **ReportId** A GUID used to identify the report. This can used to track the report across Watson. -- **TargetAppId** The kernel reported AppId of the application being reported. -- **TargetAppVer** The specific version of the application being reported. -- **TargetAsId** The sequence number for the hanging process. -- **TypeCode** Bitmap describing the hang type. -- **WaitingOnAppName** If this is a cross process hang waiting for an application, this has the name of the application. -- **WaitingOnAppVersion** If this is a cross process hang, this has the version of the application for which it is waiting. -- **WaitingOnPackageFullName** If this is a cross process hang waiting for a package, this has the full name of the package for which it is waiting. -- **WaitingOnPackageRelativeAppId** If this is a cross process hang waiting for a package, this has the relative application id of the package. - - -## Inventory events - -### Microsoft.Windows.Inventory.Core.AmiTelCacheChecksum - -This event captures basic checksum data about the device inventory items stored in the cache for use in validating data completeness for Microsoft.Windows.Inventory.Core events. The fields in this event may change over time, but they will always represent a count of a given object. - -The following fields are available: - -- **Device** A count of device objects in cache. -- **DeviceCensus** A count of device census objects in cache. -- **DriverPackageExtended** A count of driverpackageextended objects in cache. -- **File** A count of file objects in cache. -- **FileSigningInfo** A count of file signing objects in cache. -- **Generic** A count of generic objects in cache. -- **HwItem** A count of hwitem objects in cache. -- **InventoryApplication** A count of application objects in cache. -- **InventoryApplicationAppV** A count of application AppV objects in cache. -- **InventoryApplicationDriver** A count of application driver objects in cache -- **InventoryApplicationFile** A count of application file objects in cache. -- **InventoryApplicationFramework** A count of application framework objects in cache -- **InventoryApplicationShortcut** A count of application shortcut objects in cache -- **InventoryDeviceContainer** A count of device container objects in cache. -- **InventoryDeviceInterface** A count of Plug and Play device interface objects in cache. -- **InventoryDeviceMediaClass** A count of device media objects in cache. -- **InventoryDevicePnp** A count of device Plug and Play objects in cache. -- **InventoryDeviceUsbHubClass** A count of device usb objects in cache -- **InventoryDriverBinary** A count of driver binary objects in cache. -- **InventoryDriverPackage** A count of device objects in cache. -- **InventoryMiscellaneousOfficeAddIn** A count of office add-in objects in cache -- **InventoryMiscellaneousOfficeAddInUsage** A count of office add-in usage objects in cache. -- **InventoryMiscellaneousOfficeIdentifiers** A count of office identifier objects in cache -- **InventoryMiscellaneousOfficeIESettings** A count of office ie settings objects in cache -- **InventoryMiscellaneousOfficeInsights** A count of office insights objects in cache -- **InventoryMiscellaneousOfficeProducts** A count of office products objects in cache -- **InventoryMiscellaneousOfficeSettings** A count of office settings objects in cache -- **InventoryMiscellaneousOfficeVBA** A count of office vba objects in cache -- **InventoryMiscellaneousOfficeVBARuleViolations** A count of office vba rule violations objects in cache -- **InventoryMiscellaneousUUPInfo** A count of uup info objects in cache -- **Metadata** A count of metadata objects in cache. -- **Orphan** A count of orphan file objects in cache. -- **Programs** A count of program objects in cache. - - -### Microsoft.Windows.Inventory.Core.AmiTelCacheFileInfo - -Diagnostic data about the inventory cache. - -The following fields are available: - -- **CacheFileSize** Size of the cache. -- **InventoryVersion** Inventory version of the cache. -- **TempCacheCount** Number of temp caches created. -- **TempCacheDeletedCount** Number of temp caches deleted. - - -### Microsoft.Windows.Inventory.Core.AmiTelCacheVersions - -This event sends inventory component versions for the Device Inventory data. - -The following fields are available: - -- **aeinv** The version of the App inventory component. -- **devinv** The file version of the Device inventory component. - - -### Microsoft.Windows.Inventory.Core.InventoryApplicationAdd - -This event sends basic metadata about an application on the system to help keep Windows up to date. - -This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedeviceinventorychange). - -The following fields are available: - -- **HiddenArp** Indicates whether a program hides itself from showing up in ARP. -- **InstallDate** The date the application was installed (a best guess based on folder creation date heuristics). -- **InstallDateArpLastModified** The date of the registry ARP key for a given application. Hints at install date but not always accurate. Passed as an array. Example: 4/11/2015 00:00:00 -- **InstallDateFromLinkFile** The estimated date of install based on the links to the files. Passed as an array. -- **InstallDateMsi** The install date if the application was installed via Microsoft Installer (MSI). Passed as an array. -- **InventoryVersion** The version of the inventory file generating the events. -- **Language** The language code of the program. -- **MsiPackageCode** A GUID that describes the MSI Package. Multiple 'Products' (apps) can make up an MsiPackage. -- **MsiProductCode** A GUID that describe the MSI Product. -- **Name** The name of the application. -- **OSVersionAtInstallTime** The four octets from the OS version at the time of the application's install. -- **PackageFullName** The package full name for a Store application. -- **ProgramInstanceId** A hash of the file IDs in an app. -- **Publisher** The Publisher of the application. Location pulled from depends on the 'Source' field. -- **RootDirPath** The path to the root directory where the program was installed. -- **Source** How the program was installed (for example, ARP, MSI, Appx). -- **StoreAppType** A sub-classification for the type of Microsoft Store app, such as UWP or Win8StoreApp. -- **Type** One of ("Application", "Hotfix", "BOE", "Service", "Unknown"). Application indicates Win32 or Appx app, Hotfix indicates app updates (KBs), BOE indicates it's an app with no ARP or MSI entry, Service indicates that it is a service. Application and BOE are the ones most likely seen. -- **Version** The version number of the program. - - -### Microsoft.Windows.Inventory.Core.InventoryApplicationDriverAdd - -This event represents what drivers an application installs. - -This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedeviceinventorychange). - -The following fields are available: - -- **InventoryVersion** The version of the inventory component. -- **ProgramIds** The unique program identifier the driver is associated with. - - -### Microsoft.Windows.Inventory.Core.InventoryApplicationDriverStartSync - -The InventoryApplicationDriverStartSync event indicates that a new set of InventoryApplicationDriverStartAdd events will be sent. - -This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedeviceinventorychange). - -The following fields are available: - -- **InventoryVersion** The version of the inventory component. - - -### Microsoft.Windows.Inventory.Core.InventoryApplicationFrameworkAdd - -This event provides the basic metadata about the frameworks an application may depend on. - -This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedeviceinventorychange). - -The following fields are available: - -- **FileId** A hash that uniquely identifies a file. -- **Frameworks** The list of frameworks this file depends on. -- **InventoryVersion** The version of the inventory file generating the events. - - -### Microsoft.Windows.Inventory.Core.InventoryApplicationFrameworkStartSync - -This event indicates that a new set of InventoryApplicationFrameworkAdd events will be sent. - -This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedeviceinventorychange). - -The following fields are available: - -- **InventoryVersion** The version of the inventory file generating the events. - - -### Microsoft.Windows.Inventory.Core.InventoryApplicationRemove - -This event indicates that a new set of InventoryDevicePnpAdd events will be sent. - -This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedeviceinventorychange). - -The following fields are available: - -- **InventoryVersion** The version of the inventory file generating the events. - - -### Microsoft.Windows.Inventory.Core.InventoryApplicationStartSync - -This event indicates that a new set of InventoryApplicationAdd events will be sent. - -This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedeviceinventorychange). - -The following fields are available: - -- **InventoryVersion** The version of the inventory file generating the events. - - -### Microsoft.Windows.Inventory.Core.InventoryDeviceContainerAdd - -This event sends basic metadata about a device container (such as a monitor or printer as opposed to a Plug and Play device) to help keep Windows up to date. - -This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedeviceinventorychange). - -The following fields are available: - -- **Categories** A comma separated list of functional categories in which the container belongs. -- **DiscoveryMethod** The discovery method for the device container. -- **FriendlyName** The name of the device container. -- **InventoryVersion** The version of the inventory file generating the events. -- **IsActive** Is the device connected, or has it been seen in the last 14 days? -- **IsConnected** For a physically attached device, this value is the same as IsPresent. For wireless a device, this value represents a communication link. -- **IsMachineContainer** Is the container the root device itself? -- **IsNetworked** Is this a networked device? -- **IsPaired** Does the device container require pairing? -- **Manufacturer** The manufacturer name for the device container. -- **ModelId** A unique model ID. -- **ModelName** The model name. -- **ModelNumber** The model number for the device container. -- **PrimaryCategory** The primary category for the device container. - - -### Microsoft.Windows.Inventory.Core.InventoryDeviceContainerRemove - -This event indicates that the InventoryDeviceContainer object is no longer present. - -This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedeviceinventorychange). - -The following fields are available: - -- **InventoryVersion** The version of the inventory file generating the events. - - -### Microsoft.Windows.Inventory.Core.InventoryDeviceContainerStartSync - -This event indicates that a new set of InventoryDeviceContainerAdd events will be sent. - -This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedeviceinventorychange). - -The following fields are available: - -- **InventoryVersion** The version of the inventory file generating the events. - - -### Microsoft.Windows.Inventory.Core.InventoryDeviceInterfaceAdd - -This event retrieves information about what sensor interfaces are available on the device. - -This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedeviceinventorychange). - -The following fields are available: - -- **Accelerometer3D** Indicates if an Accelerator3D sensor is found. -- **ActivityDetection** Indicates if an Activity Detection sensor is found. -- **AmbientLight** Indicates if an Ambient Light sensor is found. -- **Barometer** Indicates if a Barometer sensor is found. -- **Custom** Indicates if a Custom sensor is found. -- **EnergyMeter** Indicates if an Energy sensor is found. -- **FloorElevation** Indicates if a Floor Elevation sensor is found. -- **GeomagneticOrientation** Indicates if a Geo Magnetic Orientation sensor is found. -- **GravityVector** Indicates if a Gravity Detector sensor is found. -- **Gyrometer3D** Indicates if a Gyrometer3D sensor is found. -- **Humidity** Indicates if a Humidity sensor is found. -- **InventoryVersion** The version of the inventory file generating the events. -- **LinearAccelerometer** Indicates if a Linear Accelerometer sensor is found. -- **Magnetometer3D** Indicates if a Magnetometer3D sensor is found. -- **Orientation** Indicates if an Orientation sensor is found. -- **Pedometer** Indicates if a Pedometer sensor is found. -- **Proximity** Indicates if a Proximity sensor is found. -- **RelativeOrientation** Indicates if a Relative Orientation sensor is found. -- **SimpleDeviceOrientation** Indicates if a Simple Device Orientation sensor is found. -- **Temperature** Indicates if a Temperature sensor is found. - - -### Microsoft.Windows.Inventory.Core.InventoryDeviceInterfaceStartSync - -This event indicates that a new set of InventoryDeviceInterfaceAdd events will be sent. - -This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedeviceinventorychange). - -The following fields are available: - -- **InventoryVersion** The version of the inventory file generating the events. - - -### Microsoft.Windows.Inventory.Core.InventoryDeviceMediaClassAdd - -This event sends additional metadata about a Plug and Play device that is specific to a particular class of devices to help keep Windows up to date while reducing overall size of data payload. - -This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedeviceinventorychange). - -The following fields are available: - -- **audio.captureDriver** Audio device capture driver. Example: hdaudio.inf:db04a16ce4e8d6ee:HdAudModel:10.0.14887.1000:hdaudio\func_01 -- **audio.renderDriver** Audio device render driver. Example: hdaudio.inf:db04a16ce4e8d6ee:HdAudModel:10.0.14889.1001:hdaudio\func_01 -- **Audio_CaptureDriver** The Audio device capture driver endpoint. -- **Audio_RenderDriver** The Audio device render driver endpoint. -- **InventoryVersion** The version of the inventory file generating the events. - - -### Microsoft.Windows.Inventory.Core.InventoryDeviceMediaClassRemove - -This event indicates that the InventoryDeviceMediaClassRemove object is no longer present. - -This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedeviceinventorychange). - -The following fields are available: - -- **InventoryVersion** The version of the inventory file generating the events. - - -### Microsoft.Windows.Inventory.Core.InventoryDeviceMediaClassStartSync - -This event indicates that a new set of InventoryDeviceMediaClassSAdd events will be sent. - -This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedeviceinventorychange). - -The following fields are available: - -- **InventoryVersion** The version of the inventory file generating the events. - - -### Microsoft.Windows.Inventory.Core.InventoryDevicePnpAdd - -This event represents the basic metadata about a plug and play (PNP) device and its associated driver. - -This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedeviceinventorychange). - -The following fields are available: - -- **BusReportedDescription** The description of the device reported by the bux. -- **Class** The device setup class of the driver loaded for the device. -- **ClassGuid** The device class unique identifier of the driver package loaded on the device. -- **COMPID** The list of “Compatible IDs” for this device. -- **ContainerId** The system-supplied unique identifier that specifies which group(s) the device(s) installed on the parent (main) device belong to. -- **Description** The description of the device. -- **DeviceInterfaceClasses** The device interfaces that this device implements. -- **DeviceState** Identifies the current state of the parent (main) device. -- **DriverId** The unique identifier for the installed driver. -- **DriverName** The name of the driver image file. -- **DriverPackageStrongName** The immediate parent directory name in the Directory field of InventoryDriverPackage. -- **DriverVerDate** The date associated with the driver installed on the device. -- **DriverVerVersion** The version number of the driver installed on the device. -- **Enumerator** Identifies the bus that enumerated the device. -- **ExtendedInfs** The extended INF file names. -- **HWID** A list of hardware IDs for the device. -- **Inf** The name of the INF file (possibly renamed by the OS, such as oemXX.inf). -- **InstallState** The device installation state. For a list of values, see: https://msdn.microsoft.com/en-us/library/windows/hardware/ff543130.aspx -- **InventoryVersion** The version number of the inventory process generating the events. -- **LowerClassFilters** The identifiers of the Lower Class filters installed for the device. -- **LowerFilters** The identifiers of the Lower filters installed for the device. -- **Manufacturer** The manufacturer of the device. -- **MatchingID** The Hardware ID or Compatible ID that Windows uses to install a device instance. -- **Model** Identifies the model of the device. -- **ParentId** The Device Instance ID of the parent of the device. -- **ProblemCode** The error code currently returned by the device, if applicable. -- **Provider** Identifies the device provider. -- **Service** The name of the device service. -- **STACKID** The list of hardware IDs for the stack. -- **UpperClassFilters** The identifiers of the Upper Class filters installed for the device. -- **UpperFilters** The identifiers of the Upper filters installed for the device. - - -### Microsoft.Windows.Inventory.Core.InventoryDevicePnpRemove - -This event indicates that the InventoryDevicePnpRemove object is no longer present. - -This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedeviceinventorychange). - -The following fields are available: - -- **InventoryVersion** The version of the inventory file generating the events. - - -### Microsoft.Windows.Inventory.Core.InventoryDevicePnpStartSync - -This event indicates that a new set of InventoryDevicePnpAdd events will be sent. - -This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedeviceinventorychange). - -The following fields are available: - -- **InventoryVersion** The version of the inventory file generating the events. - - -### Microsoft.Windows.Inventory.Core.InventoryDeviceUsbHubClassAdd - -This event sends basic metadata about the USB hubs on the device. - -This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedeviceinventorychange). - -The following fields are available: - -- **InventoryVersion** The version of the inventory file generating the events. -- **TotalUserConnectablePorts** Total number of connectable USB ports. -- **TotalUserConnectableTypeCPorts** Total number of connectable USB Type C ports. - - -### Microsoft.Windows.Inventory.Core.InventoryDeviceUsbHubClassStartSync - -This event indicates that a new set of InventoryDeviceUsbHubClassAdd events will be sent. - - -The following fields are available: - -- **InventoryVersion** The version of the inventory file generating the events. - - -### Microsoft.Windows.Inventory.Core.InventoryDriverBinaryAdd - -This event provides the basic metadata about driver binaries running on the system. - -This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedeviceinventorychange). - -The following fields are available: - -- **DriverCheckSum** The checksum of the driver file. -- **DriverCompany** The company name that developed the driver. -- **DriverInBox** Is the driver included with the operating system? -- **DriverIsKernelMode** Is it a kernel mode driver? -- **DriverName** The file name of the driver. -- **DriverPackageStrongName** The strong name of the driver package -- **DriverSigned** The strong name of the driver package -- **DriverTimeStamp** The low 32 bits of the time stamp of the driver file. -- **DriverType** A bitfield of driver attributes: 1. define DRIVER_MAP_DRIVER_TYPE_PRINTER 0x0001. 2. define DRIVER_MAP_DRIVER_TYPE_KERNEL 0x0002. 3. define DRIVER_MAP_DRIVER_TYPE_USER 0x0004. 4. define DRIVER_MAP_DRIVER_IS_SIGNED 0x0008. 5. define DRIVER_MAP_DRIVER_IS_INBOX 0x0010. 6. define DRIVER_MAP_DRIVER_IS_WINQUAL 0x0040. 7. define DRIVER_MAP_DRIVER_IS_SELF_SIGNED 0x0020. 8. define DRIVER_MAP_DRIVER_IS_CI_SIGNED 0x0080. 9. define DRIVER_MAP_DRIVER_HAS_BOOT_SERVICE 0x0100. 10. define DRIVER_MAP_DRIVER_TYPE_I386 0x10000. 11. define DRIVER_MAP_DRIVER_TYPE_IA64 0x20000. 12. define DRIVER_MAP_DRIVER_TYPE_AMD64 0x40000. 13. define DRIVER_MAP_DRIVER_TYPE_ARM 0x100000. 14. define DRIVER_MAP_DRIVER_TYPE_THUMB 0x200000. 15. define DRIVER_MAP_DRIVER_TYPE_ARMNT 0x400000. 16. define DRIVER_MAP_DRIVER_IS_TIME_STAMPED 0x800000. -- **DriverVersion** The version of the driver file. -- **ImageSize** The size of the driver file. -- **Inf** The name of the INF file. -- **InventoryVersion** The version of the inventory file generating the events. -- **Product** The product name that is included in the driver file. -- **ProductVersion** The product version that is included in the driver file. -- **Service** The name of the service that is installed for the device. -- **WdfVersion** The Windows Driver Framework version. - - -### Microsoft.Windows.Inventory.Core.InventoryDriverBinaryRemove - -This event indicates that the InventoryDriverBinary object is no longer present. - -This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedeviceinventorychange). - -The following fields are available: - -- **InventoryVersion** The version of the inventory file generating the events. - - -### Microsoft.Windows.Inventory.Core.InventoryDriverBinaryStartSync - -This event indicates that a new set of InventoryDriverBinaryAdd events will be sent. - -This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedeviceinventorychange). - -The following fields are available: - -- **InventoryVersion** The version of the inventory file generating the events. - - -### Microsoft.Windows.Inventory.Core.InventoryDriverPackageAdd - -This event sends basic metadata about drive packages installed on the system to help keep Windows up to date. - -This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedeviceinventorychange). - -The following fields are available: - -- **Class** The class name for the device driver. -- **ClassGuid** The class GUID for the device driver. -- **Date** The driver package date. -- **Directory** The path to the driver package. -- **DriverInBox** Is the driver included with the operating system? -- **Inf** The INF name of the driver package. -- **InventoryVersion** The version of the inventory file generating the events. -- **Provider** The provider for the driver package. -- **SubmissionId** The HLK submission ID for the driver package. -- **Version** The version of the driver package. - - -### Microsoft.Windows.Inventory.Core.InventoryDriverPackageRemove - -This event indicates that the InventoryDriverPackageRemove object is no longer present. - -This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedeviceinventorychange). - -The following fields are available: - -- **InventoryVersion** The version of the inventory file generating the events. - - -### Microsoft.Windows.Inventory.Core.InventoryDriverPackageStartSync - -This event indicates that a new set of InventoryDriverPackageAdd events will be sent. - -This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedeviceinventorychange). - -The following fields are available: - -- **InventoryVersion** The version of the inventory file generating the events. - - -### Microsoft.Windows.Inventory.Core.StartUtcJsonTrace - -This event collects traces of all other Core events, not used in typical customer scenarios. This event signals the beginning of the event download, and that tracing should begin. - - - -### Microsoft.Windows.Inventory.Core.StopUtcJsonTrace - -This event collects traces of all other Core events, not used in typical customer scenarios. This event signals the end of the event download, and that tracing should end. - - - -### Microsoft.Windows.Inventory.General.AppHealthStaticAdd - -This event sends details collected for a specific application on the source device. - -The following fields are available: - -- **AhaVersion** The binary version of the App Health Analyzer tool. -- **ApplicationErrors** The count of application errors from the event log. -- **Bitness** The architecture type of the application (16 Bit or 32 bit or 64 bit). -- **device_level** Various JRE/JAVA versions installed on a particular device. -- **ExtendedProperties** Attribute used for aggregating all other attributes under this event type. -- **Jar** Flag to determine if an app has a Java JAR file dependency. -- **Jre** Flag to determine if an app has JRE framework dependency. -- **Jre_version** JRE versions an app has declared framework dependency for. -- **Name** Name of the application. -- **NonDPIAware** Flag to determine if an app is non-DPI aware. -- **NumBinaries** Count of all binaries (.sys,.dll,.ini) from application install location. -- **RequiresAdmin** Flag to determine if an app requests admin privileges for execution. -- **RequiresAdminv2** Additional flag to determine if an app requests admin privileges for execution. -- **RequiresUIAccess** Flag to determine if an app is based on UI features for accessibility. -- **VB6** Flag to determine if an app is based on VB6 framework. -- **VB6v2** Additional flag to determine if an app is based on VB6 framework. -- **Version** Version of the application. -- **VersionCheck** Flag to determine if an app has a static dependency on OS version. -- **VersionCheckv2** Additional flag to determine if an app has a static dependency on OS version. - - -### Microsoft.Windows.Inventory.General.AppHealthStaticStartSync - -This event indicates the beginning of a series of AppHealthStaticAdd events. - -The following fields are available: - -- **AllowTelemetry** Indicates the presence of the 'allowtelemetry' command line argument. -- **CommandLineArgs** Command line arguments passed when launching the App Health Analyzer executable. -- **Enhanced** Indicates the presence of the 'enhanced' command line argument. -- **StartTime** UTC date and time at which this event was sent. - - -### Microsoft.Windows.Inventory.General.InventoryMiscellaneousOfficeAddInAdd - -Provides data on the installed Office Add-ins. - -This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedeviceinventorychange). - -The following fields are available: - -- **AddinCLSID** The class identifier key for the Microsoft Office add-in. -- **AddInCLSID** The class identifier key for the Microsoft Office add-in. -- **AddInId** The identifier for the Microsoft Office add-in. -- **AddinType** The type of the Microsoft Office add-in. -- **BinFileTimestamp** The timestamp of the Office add-in. -- **BinFileVersion** The version of the Microsoft Office add-in. -- **Description** Description of the Microsoft Office add-in. -- **FileId** The file identifier of the Microsoft Office add-in. -- **FileSize** The file size of the Microsoft Office add-in. -- **FriendlyName** The friendly name for the Microsoft Office add-in. -- **FullPath** The full path to the Microsoft Office add-in. -- **InventoryVersion** The version of the inventory binary generating the events. -- **LoadBehavior** Integer that describes the load behavior. -- **LoadTime** Load time for the Office add-in. -- **OfficeApplication** The Microsoft Office application associated with the add-in. -- **OfficeArchitecture** The architecture of the add-in. -- **OfficeVersion** The Microsoft Office version for this add-in. -- **OutlookCrashingAddin** Indicates whether crashes have been found for this add-in. -- **ProductCompany** The name of the company associated with the Office add-in. -- **ProductName** The product name associated with the Microsoft Office add-in. -- **ProductVersion** The version associated with the Office add-in. -- **ProgramId** The unique program identifier of the Microsoft Office add-in. -- **Provider** Name of the provider for this add-in. - - -### Microsoft.Windows.Inventory.General.InventoryMiscellaneousOfficeAddInRemove - -Indicates that this particular data object represented by the objectInstanceId is no longer present. - -This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedeviceinventorychange). - -The following fields are available: - -- **InventoryVersion** The version of the inventory binary generating the events. - - -### Microsoft.Windows.Inventory.General.InventoryMiscellaneousOfficeAddInStartSync - -This event indicates that a new sync is being generated for this object type. - -This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedeviceinventorychange). - -The following fields are available: - -- **InventoryVersion** The version of the inventory binary generating the events. - - -### Microsoft.Windows.Inventory.General.InventoryMiscellaneousOfficeIdentifiersAdd - -Provides data on the Office identifiers. - -This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedeviceinventorychange). - -The following fields are available: - -- **InventoryVersion** The version of the inventory binary generating the events. -- **OAudienceData** Sub-identifier for Microsoft Office release management, identifying the pilot group for a device -- **OAudienceId** Microsoft Office identifier for Microsoft Office release management, identifying the pilot group for a device -- **OMID** Identifier for the Office SQM Machine -- **OPlatform** Whether the installed Microsoft Office product is 32-bit or 64-bit -- **OTenantId** Unique GUID representing the Microsoft O365 Tenant -- **OVersion** Installed version of Microsoft Office. For example, 16.0.8602.1000 -- **OWowMID** Legacy Microsoft Office telemetry identifier (SQM Machine ID) for WoW systems (32-bit Microsoft Office on 64-bit Windows) - - -### Microsoft.Windows.Inventory.General.InventoryMiscellaneousOfficeIdentifiersStartSync - -Diagnostic event to indicate a new sync is being generated for this object type. - -This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedeviceinventorychange). - -The following fields are available: - -- **InventoryVersion** The version of the inventory binary generating the events. - - -### Microsoft.Windows.Inventory.General.InventoryMiscellaneousOfficeIESettingsAdd - -Provides data on Office-related Internet Explorer features. - -This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedeviceinventorychange). - -The following fields are available: - -- **InventoryVersion** The version of the inventory binary generating the events. -- **OIeFeatureAddon** Flag indicating which Microsoft Office products have this setting enabled. The FEATURE_ADDON_MANAGEMENT feature lets applications hosting the WebBrowser Control to respect add-on management selections made using the Add-on Manager feature of Internet Explorer. Add-ons disabled by the user or by administrative group policy will also be disabled in applications that enable this feature. -- **OIeMachineLockdown** Flag indicating which Microsoft Office products have this setting enabled. When the FEATURE_LOCALMACHINE_LOCKDOWN feature is enabled, Internet Explorer applies security restrictions on content loaded from the user's local machine, which helps prevent malicious behavior involving local files. -- **OIeMimeHandling** Flag indicating which Microsoft Office products have this setting enabled. When the FEATURE_MIME_HANDLING feature control is enabled, Internet Explorer handles MIME types more securely. Only applies to Windows Internet Explorer 6 for Windows XP Service Pack 2 (SP2) -- **OIeMimeSniffing** Flag indicating which Microsoft Office products have this setting enabled. Determines a file's type by examining its bit signature. Windows Internet Explorer uses this information to determine how to render the file. The FEATURE_MIME_SNIFFING feature, when enabled, allows to be set differently for each security zone by using the URLACTION_FEATURE_MIME_SNIFFING URL action flag -- **OIeNoAxInstall** Flag indicating which Microsoft Office products have this setting enabled. When a webpage attempts to load or install an ActiveX control that isn't already installed, the FEATURE_RESTRICT_ACTIVEXINSTALL feature blocks the request. When a webpage tries to load or install an ActiveX control that isn't already installed, the FEATURE_RESTRICT_ACTIVEXINSTALL feature blocks the request -- **OIeNoDownload** Flag indicating which Microsoft Office products have this setting enabled. The FEATURE_RESTRICT_FILEDOWNLOAD feature blocks file download requests that navigate to a resource, that display a file download dialog box, or that are not initiated explicitly by a user action (for example, a mouse click or key press). Only applies to Windows Internet Explorer 6 for Windows XP Service Pack 2 (SP2) -- **OIeObjectCaching** Flag indicating which Microsoft Office products have this setting enabled. When enabled, the FEATURE_OBJECT_CACHING feature prevents webpages from accessing or instantiating ActiveX controls cached from different domains or security contexts -- **OIePasswordDisable** Flag indicating which Microsoft Office products have this setting enabled. After Windows Internet Explorer 6 for Windows XP Service Pack 2 (SP2), Internet Explorer no longer allows usernames and passwords to be specified in URLs that use the HTTP or HTTPS protocols. URLs using other protocols, such as FTP, still allow usernames and passwords -- **OIeSafeBind** Flag indicating which Microsoft Office products have this setting enabled. The FEATURE_SAFE_BINDTOOBJECT feature performs additional safety checks when calling MonikerBindToObject to create and initialize Microsoft ActiveX controls. Specifically, prevent the control from being created if COMPAT_EVIL_DONT_LOAD is in the registry for the control -- **OIeSecurityBand** Flag indicating which Microsoft Office products have this setting enabled. The FEATURE_SECURITYBAND feature controls the display of the Internet Explorer Information bar. When enabled, the Information bar appears when file download or code installation is restricted -- **OIeUncSaveCheck** Flag indicating which Microsoft Office products have this setting enabled. The FEATURE_UNC_SAVEDFILECHECK feature enables the Mark of the Web (MOTW) for local files loaded from network locations that have been shared by using the Universal Naming Convention (UNC) -- **OIeValidateUrl** Flag indicating which Microsoft Office products have this setting enabled. When enabled, the FEATURE_VALIDATE_NAVIGATE_URL feature control prevents Windows Internet Explorer from navigating to a badly formed URL -- **OIeWebOcPopup** Flag indicating which Microsoft Office products have this setting enabled. The FEATURE_WEBOC_POPUPMANAGEMENT feature allows applications hosting the WebBrowser Control to receive the default Internet Explorer pop-up window management behavior -- **OIeWinRestrict** Flag indicating which Microsoft Office products have this setting enabled. When enabled, the FEATURE_WINDOW_RESTRICTIONS feature adds several restrictions to the size and behavior of popup windows -- **OIeZoneElevate** Flag indicating which Microsoft Office products have this setting enabled. When enabled, the FEATURE_ZONE_ELEVATION feature prevents pages in one zone from navigating to pages in a higher security zone unless the navigation is generated by the user - - -### Microsoft.Windows.Inventory.General.InventoryMiscellaneousOfficeIESettingsStartSync - -Diagnostic event to indicate a new sync is being generated for this object type. - -This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedeviceinventorychange). - -The following fields are available: - -- **InventoryVersion** The version of the inventory binary generating the events. - - -### Microsoft.Windows.Inventory.General.InventoryMiscellaneousOfficeInsightsAdd - -This event provides insight data on the installed Office products - -This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedeviceinventorychange). - -The following fields are available: - -- **InventoryVersion** The version of the inventory binary generating the events. -- **OfficeApplication** The name of the Office application. -- **OfficeArchitecture** The bitness of the Office application. -- **OfficeVersion** The version of the Office application. -- **Value** The insights collected about this entity. - - -### Microsoft.Windows.Inventory.General.InventoryMiscellaneousOfficeInsightsRemove - -Indicates that this particular data object represented by the objectInstanceId is no longer present. - -This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedeviceinventorychange). - -The following fields are available: - -- **InventoryVersion** The version of the inventory binary generating the events. - - -### Microsoft.Windows.Inventory.General.InventoryMiscellaneousOfficeInsightsStartSync - -This diagnostic event indicates that a new sync is being generated for this object type. - -This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedeviceinventorychange). - -The following fields are available: - -- **InventoryVersion** The version of the inventory binary generating the events. - - -### Microsoft.Windows.Inventory.General.InventoryMiscellaneousOfficeProductsAdd - -Describes Office Products installed. - -This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedeviceinventorychange). - -The following fields are available: - -- **InventoryVersion** The version of the inventory binary generating the events. -- **OC2rApps** A GUID the describes the Office Click-To-Run apps -- **OC2rSkus** Comma-delimited list (CSV) of Office Click-To-Run products installed on the device. For example, Office 2016 ProPlus -- **OMsiApps** Comma-delimited list (CSV) of Office MSI products installed on the device. For example, Microsoft Word -- **OProductCodes** A GUID that describes the Office MSI products - - -### Microsoft.Windows.Inventory.General.InventoryMiscellaneousOfficeProductsStartSync - -Diagnostic event to indicate a new sync is being generated for this object type. - -This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedeviceinventorychange). - -The following fields are available: - -- **InventoryVersion** The version of the inventory binary generating the events. - - -### Microsoft.Windows.Inventory.General.InventoryMiscellaneousOfficeSettingsAdd - -This event describes various Office settings - -This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedeviceinventorychange). - -The following fields are available: - -- **BrowserFlags** Browser flags for Office-related products -- **ExchangeProviderFlags** Provider policies for Office Exchange -- **InventoryVersion** The version of the inventory binary generating the events. -- **SharedComputerLicensing** Office shared computer licensing policies - - -### Microsoft.Windows.Inventory.General.InventoryMiscellaneousOfficeSettingsStartSync - -Indicates a new sync is being generated for this object type. - -This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedeviceinventorychange). - -The following fields are available: - -- **InventoryVersion** The version of the inventory binary generating the events. - - -### Microsoft.Windows.Inventory.General.InventoryMiscellaneousOfficeVBAAdd - -This event provides a summary rollup count of conditions encountered while performing a local scan of Office files, analyzing for known VBA programmability compatibility issues between legacy office version and ProPlus, and between 32 and 64-bit versions - -This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedeviceinventorychange). - -The following fields are available: - -- **Design** Count of files with design issues found. -- **Design_x64** Count of files with 64 bit design issues found. -- **DuplicateVBA** Count of files with duplicate VBA code. -- **HasVBA** Count of files with VBA code. -- **Inaccessible** Count of files that were inaccessible for scanning. -- **InventoryVersion** The version of the inventory binary generating the events. -- **Issues** Count of files with issues detected. -- **Issues_x64** Count of files with 64-bit issues detected. -- **IssuesNone** Count of files with no issues detected. -- **IssuesNone_x64** Count of files with no 64-bit issues detected. -- **Locked** Count of files that were locked, preventing scanning. -- **NoVBA** Count of files with no VBA inside. -- **Protected** Count of files that were password protected, preventing scanning. -- **RemLimited** Count of files that require limited remediation changes. -- **RemLimited_x64** Count of files that require limited remediation changes for 64-bit issues. -- **RemSignificant** Count of files that require significant remediation changes. -- **RemSignificant_x64** Count of files that require significant remediation changes for 64-bit issues. -- **Score** Overall compatibility score calculated for scanned content. -- **Score_x64** Overall 64-bit compatibility score calculated for scanned content. -- **Total** Total number of files scanned. -- **Validation** Count of files that require additional manual validation. -- **Validation_x64** Count of files that require additional manual validation for 64-bit issues. - - -### Microsoft.Windows.Inventory.General.InventoryMiscellaneousOfficeVBARemove - -Indicates that this particular data object represented by the objectInstanceId is no longer present. - -This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedeviceinventorychange). - -The following fields are available: - -- **InventoryVersion** The version of the inventory binary generating the events. - - -### Microsoft.Windows.Inventory.General.InventoryMiscellaneousOfficeVBARuleViolationsAdd - -This event provides data on Microsoft Office VBA rule violations, including a rollup count per violation type, giving an indication of remediation requirements for an organization. The event identifier is a unique GUID, associated with the validation rule - -This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedeviceinventorychange). - -The following fields are available: - -- **Count** Count of total Microsoft Office VBA rule violations -- **InventoryVersion** The version of the inventory binary generating the events. - - -### Microsoft.Windows.Inventory.General.InventoryMiscellaneousOfficeVBARuleViolationsRemove - -Indicates that this particular data object represented by the objectInstanceId is no longer present. - -This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedeviceinventorychange). - -The following fields are available: - -- **InventoryVersion** The version of the inventory binary generating the events. - - -### Microsoft.Windows.Inventory.General.InventoryMiscellaneousOfficeVBARuleViolationsStartSync - -This event indicates that a new sync is being generated for this object type. - -This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedeviceinventorychange). - -The following fields are available: - -- **InventoryVersion** The version of the inventory binary generating the events. - - -### Microsoft.Windows.Inventory.General.InventoryMiscellaneousOfficeVBAStartSync - -Diagnostic event to indicate a new sync is being generated for this object type. - -This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedeviceinventorychange). - -The following fields are available: - -- **InventoryVersion** The version of the inventory binary generating the events. - - -### Microsoft.Windows.Inventory.General.InventoryMiscellaneousUUPInfoAdd - -Provides data on Unified Update Platform (UUP) products and what version they are at. - -This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedeviceinventorychange). - -The following fields are available: - -- **Identifier** UUP identifier -- **LastActivatedVersion** Last activated version -- **PreviousVersion** Previous version -- **Source** UUP source -- **Version** UUP version - - -### Microsoft.Windows.Inventory.General.InventoryMiscellaneousUUPInfoRemove - -Indicates that this particular data object represented by the objectInstanceId is no longer present. - -This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedeviceinventorychange). - - - -### Microsoft.Windows.Inventory.General.InventoryMiscellaneousUUPInfoStartSync - -Diagnostic event to indicate a new sync is being generated for this object type. - -This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedeviceinventorychange). - - - -### Microsoft.Windows.Inventory.Indicators.Checksum - -This event summarizes the counts for the InventoryMiscellaneousUexIndicatorAdd events. - -The following fields are available: - -- **CensusId** A unique hardware identifier. -- **ChecksumDictionary** A count of each operating system indicator. -- **PCFP** Equivalent to the InventoryId field that is found in other core events. - - -### Microsoft.Windows.Inventory.Indicators.InventoryMiscellaneousUexIndicatorAdd - -These events represent the basic metadata about the OS indicators installed on the system which are used for keeping the device up to date. - -This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedeviceinventorychange). - -The following fields are available: - -- **IndicatorValue** The indicator value. -- **Value** Describes an operating system indicator that may be relevant for the device upgrade. - - -### Microsoft.Windows.Inventory.Indicators.InventoryMiscellaneousUexIndicatorRemove - -This event is a counterpart to InventoryMiscellaneousUexIndicatorAdd that indicates that the item has been removed. - -This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedeviceinventorychange). - - - -### Microsoft.Windows.Inventory.Indicators.InventoryMiscellaneousUexIndicatorStartSync - -This event indicates that a new set of InventoryMiscellaneousUexIndicatorAdd events will be sent. - -This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedeviceinventorychange). - - - -## Kernel events - -### IO - -This event indicates the number of bytes read from or read by the OS and written to or written by the OS upon system startup. - -The following fields are available: - -- **BytesRead** The total number of bytes read from or read by the OS upon system startup. -- **BytesWritten** The total number of bytes written to or written by the OS upon system startup. - - -### Microsoft.Windows.Kernel.BootEnvironment.OsLaunch - -OS information collected during Boot, used to evaluate the success of the upgrade process. - -The following fields are available: - -- **BootApplicationId** This field tells us what the OS Loader Application Identifier is. -- **BootAttemptCount** The number of consecutive times the boot manager has attempted to boot into this operating system. -- **BootSequence** The current Boot ID, used to correlate events related to a particular boot session. -- **BootStatusPolicy** Identifies the applicable Boot Status Policy. -- **BootType** Identifies the type of boot (e.g.: "Cold", "Hiber", "Resume"). -- **EventTimestamp** Seconds elapsed since an arbitrary time point. This can be used to identify the time difference in successive boot attempts being made. -- **FirmwareResetReasonEmbeddedController** Reason for system reset provided by firmware. -- **FirmwareResetReasonEmbeddedControllerAdditional** Additional information on system reset reason provided by firmware if needed. -- **FirmwareResetReasonPch** Reason for system reset provided by firmware. -- **FirmwareResetReasonPchAdditional** Additional information on system reset reason provided by firmware if needed. -- **FirmwareResetReasonSupplied** Flag indicating that a reason for system reset was provided by firmware. -- **IO** Amount of data written to and read from the disk by the OS Loader during boot. See [IO](#io). -- **LastBootSucceeded** Flag indicating whether the last boot was successful. -- **LastShutdownSucceeded** Flag indicating whether the last shutdown was successful. -- **MaxAbove4GbFreeRange** This field describes the largest memory range available above 4Gb. -- **MaxBelow4GbFreeRange** This field describes the largest memory range available below 4Gb. -- **MeasuredLaunchPrepared** This field tells us if the OS launch was initiated using Measured/Secure Boot over DRTM (Dynamic Root of Trust for Measurement). -- **MeasuredLaunchResume** This field tells us if Dynamic Root of Trust for Measurement (DRTM) was used when resuming from hibernation. -- **MenuPolicy** Type of advanced options menu that should be shown to the user (Legacy, Standard, etc.). -- **RecoveryEnabled** Indicates whether recovery is enabled. -- **SecureLaunchPrepared** This field indicates if DRTM was prepared during boot. -- **TcbLaunch** Indicates whether the Trusted Computing Base was used during the boot flow. -- **UserInputTime** The amount of time the loader application spent waiting for user input. - - -## Miracast events - -### Microsoft.Windows.Cast.Miracast.MiracastSessionEnd - -This event sends data at the end of a Miracast session that helps determine RTSP related Miracast failures along with some statistics about the session - -The following fields are available: - -- **AudioChannelCount** The number of audio channels. -- **AudioSampleRate** The sample rate of audio in terms of samples per second. -- **AudioSubtype** The unique subtype identifier of the audio codec (encoding method) used for audio encoding. -- **AverageBitrate** The average video bitrate used during the Miracast session, in bits per second. -- **AverageDataRate** The average available bandwidth reported by the WiFi driver during the Miracast session, in bits per second. -- **AveragePacketSendTimeInMs** The average time required for the network to send a sample, in milliseconds. -- **ConnectorType** The type of connector used during the Miracast session. -- **EncodeAverageTimeMS** The average time to encode a frame of video, in milliseconds. -- **EncodeCount** The count of total frames encoded in the session. -- **EncodeMaxTimeMS** The maximum time to encode a frame, in milliseconds. -- **EncodeMinTimeMS** The minimum time to encode a frame, in milliseconds. -- **EncoderCreationTimeInMs** The time required to create the video encoder, in milliseconds. -- **ErrorSource** Identifies the component that encountered an error that caused a disconnect, if applicable. -- **FirstFrameTime** The time (tick count) when the first frame is sent. -- **FirstLatencyMode** The first latency mode. -- **FrameAverageTimeMS** Average time to process an entire frame, in milliseconds. -- **FrameCount** The total number of frames processed. -- **FrameMaxTimeMS** The maximum time required to process an entire frame, in milliseconds. -- **FrameMinTimeMS** The minimum time required to process an entire frame, in milliseconds. -- **Glitches** The number of frames that failed to be delivered on time. -- **HardwareCursorEnabled** Indicates if hardware cursor was enabled when the connection ended. -- **HDCPState** The state of HDCP (High-bandwidth Digital Content Protection) when the connection ended. -- **HighestBitrate** The highest video bitrate used during the Miracast session, in bits per second. -- **HighestDataRate** The highest available bandwidth reported by the WiFi driver, in bits per second. -- **LastLatencyMode** The last reported latency mode. -- **LogTimeReference** The reference time, in tick counts. -- **LowestBitrate** The lowest video bitrate used during the Miracast session, in bits per second. -- **LowestDataRate** The lowest video bitrate used during the Miracast session, in bits per second. -- **MediaErrorCode** The error code reported by the media session, if applicable. -- **MiracastEntry** The time (tick count) when the Miracast driver was first loaded. -- **MiracastM1** The time (tick count) when the M1 request was sent. -- **MiracastM2** The time (tick count) when the M2 request was sent. -- **MiracastM3** The time (tick count) when the M3 request was sent. -- **MiracastM4** The time (tick count) when the M4 request was sent. -- **MiracastM5** The time (tick count) when the M5 request was sent. -- **MiracastM6** The time (tick count) when the M6 request was sent. -- **MiracastM7** The time (tick count) when the M7 request was sent. -- **MiracastSessionState** The state of the Miracast session when the connection ended. -- **MiracastStreaming** The time (tick count) when the Miracast session first started processing frames. -- **ProfileCount** The count of profiles generated from the receiver M4 response. -- **ProfileCountAfterFiltering** The count of profiles after filtering based on available bandwidth and encoder capabilities. -- **RefreshRate** The refresh rate set on the remote display. -- **RotationSupported** Indicates if the Miracast receiver supports display rotation. -- **RTSPSessionId** The unique identifier of the RTSP session. This matches the RTSP session ID for the receiver for the same session. -- **SessionGuid** The unique identifier of to correlate various Miracast events from a session. -- **SinkHadEdid** Indicates if the Miracast receiver reported an EDID. -- **SupportMicrosoftColorSpaceConversion** Indicates whether the Microsoft color space conversion for extra color fidelity is supported by the receiver. -- **SupportsMicrosoftDiagnostics** Indicates whether the Miracast receiver supports the Microsoft Diagnostics Miracast extension. -- **SupportsMicrosoftFormatChange** Indicates whether the Miracast receiver supports the Microsoft Format Change Miracast extension. -- **SupportsMicrosoftLatencyManagement** Indicates whether the Miracast receiver supports the Microsoft Latency Management Miracast extension. -- **SupportsMicrosoftRTCP** Indicates whether the Miracast receiver supports the Microsoft RTCP Miracast extension. -- **SupportsMicrosoftVideoFormats** Indicates whether the Miracast receiver supports Microsoft video format for 3:2 resolution. -- **SupportsWiDi** Indicates whether Miracast receiver supports Intel WiDi extensions. -- **TeardownErrorCode** The error code reason for teardown provided by the receiver, if applicable. -- **TeardownErrorReason** The text string reason for teardown provided by the receiver, if applicable. -- **UIBCEndState** Indicates whether UIBC was enabled when the connection ended. -- **UIBCEverEnabled** Indicates whether UIBC was ever enabled. -- **UIBCStatus** The result code reported by the UIBC setup process. -- **VideoBitrate** The starting bitrate for the video encoder. -- **VideoCodecLevel** The encoding level used for encoding, specific to the video subtype. -- **VideoHeight** The height of encoded video frames. -- **VideoSubtype** The unique subtype identifier of the video codec (encoding method) used for video encoding. -- **VideoWidth** The width of encoded video frames. -- **WFD2Supported** Indicates if the Miracast receiver supports WFD2 protocol. - - -## OneDrive events - -### Microsoft.OneDrive.Sync.Setup.APIOperation - -This event includes basic data about install and uninstall OneDrive API operations. - -The following fields are available: - -- **APIName** The name of the API. -- **Duration** How long the operation took. -- **IsSuccess** Was the operation successful? -- **ResultCode** The result code. -- **ScenarioName** The name of the scenario. - - -### Microsoft.OneDrive.Sync.Setup.EndExperience - -This event includes a success or failure summary of the installation. - -The following fields are available: - -- **APIName** The name of the API. -- **HResult** HResult of the operation -- **IsSuccess** Whether the operation is successful or not -- **ScenarioName** The name of the scenario. - - -### Microsoft.OneDrive.Sync.Setup.OSUpgradeInstallationOperation - -This event is related to the OS version when the OS is upgraded with OneDrive installed. - -The following fields are available: - -- **CurrentOneDriveVersion** The current version of OneDrive. -- **CurrentOSBuildBranch** The current branch of the operating system. -- **CurrentOSBuildNumber** The current build number of the operating system. -- **CurrentOSVersion** The current version of the operating system. -- **HResult** The HResult of the operation. -- **SourceOSBuildBranch** The source branch of the operating system. -- **SourceOSBuildNumber** The source build number of the operating system. -- **SourceOSVersion** The source version of the operating system. - - -### Microsoft.OneDrive.Sync.Setup.RegisterStandaloneUpdaterAPIOperation - -This event is related to registering or unregistering the OneDrive update task. - -The following fields are available: - -- **APIName** The name of the API. -- **IsSuccess** Was the operation successful? -- **RegisterNewTaskResult** The HResult of the RegisterNewTask operation. -- **ScenarioName** The name of the scenario. -- **UnregisterOldTaskResult** The HResult of the UnregisterOldTask operation. - - -### Microsoft.OneDrive.Sync.Updater.ComponentInstallState - -This event includes basic data about the installation state of dependent OneDrive components. - -The following fields are available: - -- **ComponentName** The name of the dependent component. -- **isInstalled** Is the dependent component installed? - - -### Microsoft.OneDrive.Sync.Updater.OverlayIconStatus - -This event indicates if the OneDrive overlay icon is working correctly. 0 = healthy; 1 = can be fixed; 2 = broken - -The following fields are available: - -- **32bit** The status of the OneDrive overlay icon on a 32-bit operating system. -- **64bit** The status of the OneDrive overlay icon on a 64-bit operating system. - - -### Microsoft.OneDrive.Sync.Updater.UpdateOverallResult - -This event sends information describing the result of the update. - -The following fields are available: - -- **hr** The HResult of the operation. -- **IsLoggingEnabled** Indicates whether logging is enabled for the updater. -- **UpdaterVersion** The version of the updater. - - -### Microsoft.OneDrive.Sync.Updater.UpdateXmlDownloadHResult - -This event determines the status when downloading the OneDrive update configuration file. - -The following fields are available: - -- **hr** The HResult of the operation. - - -### Microsoft.OneDrive.Sync.Updater.WebConnectionStatus - -This event determines the error code that was returned when verifying Internet connectivity. - -The following fields are available: - -- **winInetError** The HResult of the operation. - - -## Privacy consent logging events - -### Microsoft.Windows.Shell.PrivacyConsentLogging.PrivacyConsentCompleted - -This event is used to determine whether the user successfully completed the privacy consent experience. - -The following fields are available: - -- **presentationVersion** Which display version of the privacy consent experience the user completed -- **privacyConsentState** The current state of the privacy consent experience -- **settingsVersion** Which setting version of the privacy consent experience the user completed -- **userOobeExitReason** The exit reason of the privacy consent experience - - -### Microsoft.Windows.Shell.PrivacyConsentLogging.PrivacyConsentStatus - -Event tells us effectiveness of new privacy experience. - -The following fields are available: - -- **isAdmin** whether the person who is logging in is an admin -- **isExistingUser** whether the account existed in a downlevel OS -- **isLaunching** Whether or not the privacy consent experience will be launched -- **isSilentElevation** whether the user has most restrictive UAC controls -- **privacyConsentState** whether the user has completed privacy experience -- **userRegionCode** The current user's region setting - - -### wilActivity - -This event provides a Windows Internal Library context used for Product and Service diagnostics. - -The following fields are available: - -- **callContext** The function where the failure occurred. -- **currentContextId** The ID of the current call context where the failure occurred. -- **currentContextMessage** The message of the current call context where the failure occurred. -- **currentContextName** The name of the current call context where the failure occurred. -- **failureCount** The number of failures for this failure ID. -- **failureId** The ID of the failure that occurred. -- **failureType** The type of the failure that occurred. -- **fileName** The file name where the failure occurred. -- **function** The function where the failure occurred. -- **hresult** The HResult of the overall activity. -- **lineNumber** The line number where the failure occurred. -- **message** The message of the failure that occurred. -- **module** The module where the failure occurred. -- **originatingContextId** The ID of the originating call context that resulted in the failure. -- **originatingContextMessage** The message of the originating call context that resulted in the failure. -- **originatingContextName** The name of the originating call context that resulted in the failure. -- **threadId** The ID of the thread on which the activity is executing. - - -## Sediment events - -### Microsoft.Windows.Sediment.Info.DetailedState - -This event is sent when detailed state information is needed from an update trial run. - -The following fields are available: - -- **Data** Data relevant to the state, such as what percent of disk space the directory takes up. -- **Id** Identifies the trial being run, such as a disk related trial. -- **ReleaseVer** The version of the component. -- **State** The state of the reporting data from the trial, such as the top-level directory analysis. -- **Time** The time the event was fired. - - -### Microsoft.Windows.Sediment.Info.Error - -This event indicates an error in the updater payload. This information assists in keeping Windows up to date. - -The following fields are available: - -- **FailureType** The type of error encountered. -- **FileName** The code file in which the error occurred. -- **HResult** The failure error code. -- **LineNumber** The line number in the code file at which the error occurred. -- **ReleaseVer** The version information for the component in which the error occurred. -- **Time** The system time at which the error occurred. - - -### Microsoft.Windows.Sediment.Info.PhaseChange - -The event indicates progress made by the updater. This information assists in keeping Windows up to date. - -The following fields are available: - -- **NewPhase** The phase of progress made. -- **ReleaseVer** The version information for the component in which the change occurred. -- **Time** The system time at which the phase chance occurred. - - -## Setup events - -### SetupPlatformTel.SetupPlatformTelActivityEvent - -This event sends basic metadata about the SetupPlatform update installation process, to help keep Windows up to date. - -The following fields are available: - -- **FieldName** Retrieves the event name/data point. Examples: InstallStartTime, InstallEndtime, OverallResult etc. -- **GroupName** Retrieves the groupname the event belongs to. Example: Install Information, DU Information, Disk Space Information etc. -- **Value** Value associated with the corresponding event name. For example, time-related events will include the system time - - -### SetupPlatformTel.SetupPlatformTelActivityStarted - -This event sends basic metadata about the update installation process generated by SetupPlatform to help keep Windows up to date. - -The following fields are available: - -- **Name** The name of the dynamic update type. Example: GDR driver - - -### SetupPlatformTel.SetupPlatformTelActivityStopped - -This event sends basic metadata about the update installation process generated by SetupPlatform to help keep Windows up to date. - - - -### SetupPlatformTel.SetupPlatformTelEvent - -This service retrieves events generated by SetupPlatform, the engine that drives the various deployment scenarios. - -The following fields are available: - -- **FieldName** Retrieves the event name/data point. Examples: InstallStartTime, InstallEndtime, OverallResult etc. -- **GroupName** Retrieves the groupname the event belongs to. Example: Install Information, DU Information, Disk Space Information etc. -- **Value** Retrieves the value associated with the corresponding event name (Field Name). For example: For time related events this will include the system time. - - -## Software update events - -### SoftwareUpdateClientTelemetry.CheckForUpdates - -Scan process event on Windows Update client. See the EventScenario field for specifics (started/failed/succeeded). - -The following fields are available: - -- **ActivityMatchingId** Contains a unique ID identifying a single CheckForUpdates session from initialization to completion. -- **AllowCachedResults** Indicates if the scan allowed using cached results. -- **ApplicableUpdateInfo** Metadata for the updates which were detected as applicable -- **BiosFamily** The family of the BIOS (Basic Input Output System). -- **BiosName** The name of the device BIOS. -- **BiosReleaseDate** The release date of the device BIOS. -- **BiosSKUNumber** The sku number of the device BIOS. -- **BIOSVendor** The vendor of the BIOS. -- **BiosVersion** The version of the BIOS. -- **BranchReadinessLevel** The servicing branch configured on the device. -- **CachedEngineVersion** For self-initiated healing, the version of the SIH engine that is cached on the device. If the SIH engine does not exist, the value is null. -- **CallerApplicationName** The name provided by the caller who initiated API calls into the software distribution client. -- **CapabilityDetectoidGuid** The GUID for a hardware applicability detectoid that could not be evaluated. -- **CDNCountryCode** Two letter country abbreviation for the Content Distribution Network (CDN) location. -- **CDNId** The unique identifier of a specific device, used to identify how many devices are encountering success or a particular issue. -- **ClientVersion** The version number of the software distribution client. -- **CommonProps** A bitmask for future flags associated with the Windows Update client behavior. No data is currently reported in this field. Expected value for this field is 0. -- **Context** Gives context on where the error has occurred. Example: AutoEnable, GetSLSData, AddService, Misc, or Unknown -- **CurrentMobileOperator** The mobile operator the device is currently connected to. -- **DeferralPolicySources** Sources for any update deferral policies defined (GPO = 0x10, MDM = 0x100, Flight = 0x1000, UX = 0x10000). -- **DeferredUpdates** Update IDs which are currently being deferred until a later time -- **DeviceModel** What is the device model. -- **DriverError** The error code hit during a driver scan. This is 0 if no error was encountered. -- **DriverExclusionPolicy** Indicates if the policy for not including drivers with Windows Update is enabled. -- **DriverSyncPassPerformed** Were drivers scanned this time? -- **EventInstanceID** A globally unique identifier for event instance. -- **EventScenario** Indicates the purpose of sending this event - whether because the software distribution just started checking for content, or whether it was cancelled, succeeded, or failed. -- **ExtendedMetadataCabUrl** Hostname that is used to download an update. -- **ExtendedStatusCode** Secondary error code for certain scenarios where StatusCode wasn't specific enough. -- **FailedUpdateGuids** The GUIDs for the updates that failed to be evaluated during the scan. -- **FailedUpdatesCount** The number of updates that failed to be evaluated during the scan. -- **FeatureUpdateDeferral** The deferral period configured for feature OS updates on the device (in days). -- **FeatureUpdatePause** Indicates whether feature OS updates are paused on the device. -- **FeatureUpdatePausePeriod** The pause duration configured for feature OS updates on the device (in days). -- **FlightBranch** The branch that a device is on if participating in flighting (pre-release builds). -- **FlightRing** The ring (speed of getting builds) that a device is on if participating in flighting (pre-release builds). -- **HomeMobileOperator** The mobile operator that the device was originally intended to work with. -- **IntentPFNs** Intended application-set metadata for atomic update scenarios. -- **IPVersion** Indicates whether the download took place over IPv4 or IPv6 -- **IsWUfBDualScanEnabled** Indicates if Windows Update for Business dual scan is enabled on the device. -- **IsWUfBEnabled** Indicates if Windows Update for Business is enabled on the device. -- **IsWUfBFederatedScanDisabled** Indicates if Windows Update for Business federated scan is disabled on the device. -- **MetadataIntegrityMode** The mode of the update transport metadata integrity check. 0-Unknown, 1-Ignoe, 2-Audit, 3-Enforce -- **MSIError** The last error that was encountered during a scan for updates. -- **NetworkConnectivityDetected** Indicates the type of network connectivity that was detected. 0 - IPv4, 1 - IPv6 -- **NumberOfApplicableUpdates** The number of updates which were ultimately deemed applicable to the system after the detection process is complete -- **NumberOfApplicationsCategoryScanEvaluated** The number of categories (apps) for which an app update scan checked -- **NumberOfLoop** The number of round trips the scan required -- **NumberOfNewUpdatesFromServiceSync** The number of updates which were seen for the first time in this scan -- **NumberOfUpdatesEvaluated** The total number of updates which were evaluated as a part of the scan -- **NumFailedMetadataSignatures** The number of metadata signatures checks which failed for new metadata synced down. -- **Online** Indicates if this was an online scan. -- **PausedUpdates** A list of UpdateIds which that currently being paused. -- **PauseFeatureUpdatesEndTime** If feature OS updates are paused on the device, this is the date and time for the end of the pause time window. -- **PauseFeatureUpdatesStartTime** If feature OS updates are paused on the device, this is the date and time for the beginning of the pause time window. -- **PauseQualityUpdatesEndTime** If quality OS updates are paused on the device, this is the date and time for the end of the pause time window. -- **PauseQualityUpdatesStartTime** If quality OS updates are paused on the device, this is the date and time for the beginning of the pause time window. -- **PhonePreviewEnabled** Indicates whether a phone was getting preview build, prior to flighting (pre-release builds) being introduced. -- **ProcessName** The process name of the caller who initiated API calls, in the event where CallerApplicationName was not provided. -- **QualityUpdateDeferral** The deferral period configured for quality OS updates on the device (in days). -- **QualityUpdatePause** Indicates whether quality OS updates are paused on the device. -- **QualityUpdatePausePeriod** The pause duration configured for quality OS updates on the device (in days). -- **RelatedCV** The previous Correlation Vector that was used before swapping with a new one -- **ScanDurationInSeconds** The number of seconds a scan took -- **ScanEnqueueTime** The number of seconds it took to initialize a scan -- **ScanProps** This is a 32-bit integer containing Boolean properties for a given Windows Update scan. The following bits are used; all remaining bits are reserved and set to zero. Bit 0 (0x1): IsInteractive - is set to 1 if the scan is requested by a user, or 0 if the scan is requested by Automatic Updates. Bit 1 (0x2): IsSeeker - is set to 1 if the Windows Update client's Seeker functionality is enabled. Seeker functionality is enabled on certain interactive scans, and results in the scans returning certain updates that are in the initial stages of release (not yet released for full adoption via Automatic Updates). -- **ServiceGuid** An ID which represents which service the software distribution client is checking for content (Windows Update, Microsoft Store, etc.). -- **ServiceUrl** The environment URL a device is configured to scan with -- **ShippingMobileOperator** The mobile operator that a device shipped on. -- **StatusCode** Indicates the result of a CheckForUpdates event (success, cancellation, failure code HResult). -- **SyncType** Describes the type of scan the event was -- **SystemBIOSMajorRelease** Major version of the BIOS. -- **SystemBIOSMinorRelease** Minor version of the BIOS. -- **TargetMetadataVersion** For self-initiated healing, this is the target version of the SIH engine to download (if needed). If not, the value is null. -- **TotalNumMetadataSignatures** The total number of metadata signatures checks done for new metadata that was synced down. -- **WebServiceRetryMethods** Web service method requests that needed to be retried to complete operation. -- **WUDeviceID** The unique identifier of a specific device, used to identify how many devices are encountering success or a particular issue. - - -### SoftwareUpdateClientTelemetry.Commit - -This event tracks the commit process post the update installation when software update client is trying to update the device. - -The following fields are available: - -- **BiosFamily** Device family as defined in the system BIOS -- **BiosName** Name of the system BIOS -- **BiosReleaseDate** Release date of the system BIOS -- **BiosSKUNumber** Device SKU as defined in the system BIOS -- **BIOSVendor** Vendor of the system BIOS -- **BiosVersion** Version of the system BIOS -- **BundleId** Identifier associated with the specific content bundle; should not be all zeros if the bundleID was found. -- **BundleRevisionNumber** Identifies the revision number of the content bundle -- **CallerApplicationName** Name provided by the caller who initiated API calls into the software distribution client -- **ClientVersion** Version number of the software distribution client -- **DeploymentProviderMode** The mode of operation of the update deployment provider. -- **DeviceModel** Device model as defined in the system bios -- **EventInstanceID** A globally unique identifier for event instance -- **EventScenario** Indicates the purpose of the event - whether because scan started, succeded, failed, etc. -- **EventType** Possible values are "Child", "Bundle", "Relase" or "Driver". -- **FlightId** The specific id of the flight the device is getting -- **HandlerType** Indicates the kind of content (app, driver, windows patch, etc.) -- **RevisionNumber** Identifies the revision number of this specific piece of content -- **ServiceGuid** Identifier for the service to which the software distribution client is connecting (Windows Update, Microsoft Store, etc) -- **SystemBIOSMajorRelease** Major release version of the system bios -- **SystemBIOSMinorRelease** Minor release version of the system bios -- **UpdateId** Identifier associated with the specific piece of content -- **WUDeviceID** Unique device id controlled by the software distribution client - - -### SoftwareUpdateClientTelemetry.Download - -Download process event for target update on Windows Update client. See the EventScenario field for specifics (started/failed/succeeded). - -The following fields are available: - -- **ActiveDownloadTime** How long the download took, in seconds, excluding time where the update wasn't actively being downloaded. -- **AppXBlockHashFailures** Indicates the number of blocks that failed hash validation during download of the app payload. -- **AppXBlockHashValidationFailureCount** A count of the number of blocks that have failed validation after being downloaded. -- **AppXDownloadScope** Indicates the scope of the download for application content. -- **AppXScope** Indicates the scope of the app download. -- **BiosFamily** The family of the BIOS (Basic Input Output System). -- **BiosName** The name of the device BIOS. -- **BiosReleaseDate** The release date of the device BIOS. -- **BiosSKUNumber** The sku number of the device BIOS. -- **BIOSVendor** The vendor of the BIOS. -- **BiosVersion** The version of the BIOS. -- **BundleBytesDownloaded** Number of bytes downloaded for the specific content bundle. -- **BundleId** Identifier associated with the specific content bundle. -- **BundleRepeatFailCount** Indicates whether this particular update bundle has previously failed. -- **BundleRepeatFailFlag** Indicates whether this particular update bundle previously failed to download. -- **BundleRevisionNumber** Identifies the revision number of the content bundle. -- **BytesDownloaded** Number of bytes that were downloaded for an individual piece of content (not the entire bundle). -- **CachedEngineVersion** The version of the “Self-Initiated Healing” (SIH) engine that is cached on the device, if applicable. -- **CallerApplicationName** The name provided by the application that initiated API calls into the software distribution client. -- **CbsDownloadMethod** Indicates whether the download was a full- or a partial-file download. -- **CbsMethod** The method used for downloading the update content related to the Component Based Servicing (CBS) technology. -- **CDNCountryCode** Two letter country abbreviation for the Content Distribution Network (CDN) location. -- **CDNId** ID which defines which CDN the software distribution client downloaded the content from. -- **ClientVersion** The version number of the software distribution client. -- **CommonProps** A bitmask for future flags associated with the Windows Update client behavior. -- **ConnectTime** Indicates the cumulative amount of time (in seconds) it took to establish the connection for all updates in an update bundle. -- **CurrentMobileOperator** The mobile operator the device is currently connected to. -- **DeviceModel** The model of the device. -- **DownloadPriority** Indicates whether a download happened at background, normal, or foreground priority. -- **DownloadProps** Information about the download operation. -- **DownloadType** Differentiates the download type of “Self-Initiated Healing” (SIH) downloads between Metadata and Payload downloads. -- **EventInstanceID** A globally unique identifier for event instance. -- **EventScenario** Indicates the purpose for sending this event: whether because the software distribution just started downloading content; or whether it was cancelled, succeeded, or failed. -- **EventType** Identifies the type of the event (Child, Bundle, or Driver). -- **ExtendedStatusCode** Secondary error code for certain scenarios where StatusCode wasn't specific enough. -- **FeatureUpdatePause** Indicates whether feature OS updates are paused on the device. -- **FlightBranch** The branch that a device is on if participating in flighting (pre-release builds). -- **FlightBuildNumber** If this download was for a flight (pre-release build), this indicates the build number of that flight. -- **FlightId** The specific ID of the flight (pre-release build) the device is getting. -- **FlightRing** The ring (speed of getting builds) that a device is on if participating in flighting (pre-release builds). -- **HandlerType** Indicates what kind of content is being downloaded (app, driver, windows patch, etc.). -- **HardwareId** If this download was for a driver targeted to a particular device model, this ID indicates the model of the device. -- **HomeMobileOperator** The mobile operator that the device was originally intended to work with. -- **HostName** The hostname URL the content is downloading from. -- **IPVersion** Indicates whether the download took place over IPv4 or IPv6. -- **IsDependentSet** Indicates whether a driver is a part of a larger System Hardware/Firmware Update -- **IsWUfBDualScanEnabled** Indicates if Windows Update for Business dual scan is enabled on the device. -- **IsWUfBEnabled** Indicates if Windows Update for Business is enabled on the device. -- **NetworkCost** A flag indicating the cost of the network (congested, fixed, variable, over data limit, roaming, etc.) used for downloading the update content. -- **NetworkCostBitMask** Indicates what kind of network the device is connected to (roaming, metered, over data cap, etc.) -- **NetworkRestrictionStatus** More general version of NetworkCostBitMask, specifying whether Windows considered the current network to be "metered." -- **PackageFullName** The package name of the content. -- **PhonePreviewEnabled** Indicates whether a phone was opted-in to getting preview builds, prior to flighting (pre-release builds) being introduced. -- **PostDnldTime** Time (in seconds) taken to signal download completion after the last job completed downloading the payload. -- **ProcessName** The process name of the application that initiated API calls, in the event where CallerApplicationName was not provided. -- **QualityUpdatePause** Indicates whether quality OS updates are paused on the device. -- **Reason** A 32-bit integer representing the reason the update is blocked from being downloaded in the background. -- **RegulationReason** The reason that the update is regulated -- **RegulationResult** The result code (HResult) of the last attempt to contact the regulation web service for download regulation of update content. -- **RelatedCV** The Correlation Vector that was used before the most recent change to a new Correlation Vector. -- **RepeatFailCount** Indicates whether this specific content has previously failed. -- **RepeatFailFlag** Indicates whether this specific content previously failed to download. -- **RevisionNumber** The revision number of the specified piece of content. -- **ServiceGuid** A unique identifier for the service that the software distribution client is installing content for (Windows Update, Microsoft Store, etc.). -- **Setup360Phase** Identifies the active phase of the upgrade download if the current download is for an Operating System upgrade. -- **ShippingMobileOperator** The mobile operator linked to the device when the device shipped. -- **SizeCalcTime** Time (in seconds) taken to calculate the total download size of the payload. -- **StatusCode** Indicates the result of a Download event (success, cancellation, failure code HResult). -- **SystemBIOSMajorRelease** Major version of the BIOS. -- **SystemBIOSMinorRelease** Minor version of the BIOS. -- **TargetGroupId** For drivers targeted to a specific device model, this ID indicates the distribution group of devices receiving that driver. -- **TargetingVersion** For drivers targeted to a specific device model, this is the version number of the drivers being distributed to the device. -- **TargetMetadataVersion** The version of the currently downloading (or most recently downloaded) package. -- **ThrottlingServiceHResult** Result code (success/failure) while contacting a web service to determine whether this device should download content yet. -- **TimeToEstablishConnection** Time (in milliseconds) it took to establish the connection prior to beginning downloaded. -- **TotalExpectedBytes** The total size (in Bytes) expected to be downloaded. -- **UpdateId** An identifier associated with the specific piece of content. -- **UpdateID** An identifier associated with the specific piece of content. -- **UpdateImportance** Indicates whether the content was marked as Important, Recommended, or Optional. -- **UsedDO** Indicates whether the download used the Delivery Optimization (DO) service. -- **UsedSystemVolume** Indicates whether the content was downloaded to the device's main system storage drive, or an alternate storage drive. -- **WUDeviceID** The unique identifier of a specific device, used to identify how many devices are encountering success or a particular issue. - - -### SoftwareUpdateClientTelemetry.DownloadCheckpoint - -This event provides a checkpoint between each of the Windows Update download phases for UUP content - -The following fields are available: - -- **CallerApplicationName** The name provided by the caller who initiated API calls into the software distribution client -- **ClientVersion** The version number of the software distribution client -- **EventScenario** Indicates the purpose of sending this event - whether because the software distribution just started checking for content, or whether it was cancelled, succeeded, or failed -- **EventType** Possible values are "Child", "Bundle", "Relase" or "Driver" -- **ExtendedStatusCode** Secondary error code for certain scenarios where StatusCode wasn't specific enough -- **FileId** A hash that uniquely identifies a file -- **FileName** Name of the downloaded file -- **FlightId** The unique identifier for each flight -- **RelatedCV** The previous Correlation Vector that was used before swapping with a new one -- **RevisionNumber** Unique revision number of Update -- **ServiceGuid** An ID which represents which service the software distribution client is checking for content (Windows Update, Microsoft Store, etc.) -- **StatusCode** Indicates the result of a CheckForUpdates event (success, cancellation, failure code HResult) -- **UpdateId** Unique Update ID -- **WUDeviceID** The unique identifier of a specific device, used to identify how many devices are encountering success or a particular issue - - -### SoftwareUpdateClientTelemetry.DownloadHeartbeat - -This event allows tracking of ongoing downloads and contains data to explain the current state of the download - -The following fields are available: - -- **BytesTotal** Total bytes to transfer for this content -- **BytesTransferred** Total bytes transferred for this content at the time of heartbeat -- **CallerApplicationName** Name provided by the caller who initiated API calls into the software distribution client -- **ClientVersion** The version number of the software distribution client -- **ConnectionStatus** Indicates the connectivity state of the device at the time of heartbeat -- **CurrentError** Last (transient) error encountered by the active download -- **DownloadFlags** Flags indicating if power state is ignored -- **DownloadState** Current state of the active download for this content (queued, suspended, or progressing) -- **EventType** Possible values are "Child", "Bundle", or "Driver" -- **FlightId** The unique identifier for each flight -- **IsNetworkMetered** Indicates whether Windows considered the current network to be ?metered" -- **MOAppDownloadLimit** Mobile operator cap on size of application downloads, if any -- **MOUpdateDownloadLimit** Mobile operator cap on size of operating system update downloads, if any -- **PowerState** Indicates the power state of the device at the time of heartbeart (DC, AC, Battery Saver, or Connected Standby) -- **RelatedCV** The previous correlation vector that was used by the client, before swapping with a new one -- **ResumeCount** Number of times this active download has resumed from a suspended state -- **RevisionNumber** Identifies the revision number of this specific piece of content -- **ServiceGuid** Identifier for the service to which the software distribution client is connecting (Windows Update, Microsoft Store, etc) -- **SuspendCount** Number of times this active download has entered a suspended state -- **SuspendReason** Last reason for why this active download entered a suspended state -- **UpdateId** Identifier associated with the specific piece of content -- **WUDeviceID** Unique device id controlled by the software distribution client - - -### SoftwareUpdateClientTelemetry.Install - -This event sends tracking data about the software distribution client installation of the content for that update, to help keep Windows up to date. - -The following fields are available: - -- **BiosFamily** The family of the BIOS (Basic Input Output System). -- **BiosName** The name of the device BIOS. -- **BiosReleaseDate** The release date of the device BIOS. -- **BiosSKUNumber** The sku number of the device BIOS. -- **BIOSVendor** The vendor of the BIOS. -- **BiosVersion** The version of the BIOS. -- **BundleId** Identifier associated with the specific content bundle; should not be all zeros if the bundleID was found. -- **BundleRepeatFailCount** Indicates whether this particular update bundle has previously failed. -- **BundleRepeatFailFlag** Indicates whether this particular update bundle previously failed to install. -- **BundleRevisionNumber** Identifies the revision number of the content bundle. -- **CachedEngineVersion** For self-initiated healing, the version of the SIH engine that is cached on the device. If the SIH engine does not exist, the value is null. -- **CallerApplicationName** The name provided by the caller who initiated API calls into the software distribution client. -- **ClientVersion** The version number of the software distribution client. -- **CommonProps** A bitmask for future flags associated with the Windows Update client behavior. No value is currently reported in this field. Expected value for this field is 0. -- **CSIErrorType** The stage of CBS installation where it failed. -- **CurrentMobileOperator** The mobile operator to which the device is currently connected. -- **DeploymentProviderMode** The mode of operation of the update deployment provider. -- **DeviceModel** The device model. -- **DriverPingBack** Contains information about the previous driver and system state. -- **DriverRecoveryIds** The list of identifiers that could be used for uninstalling the drivers if a recovery is required. -- **EventInstanceID** A globally unique identifier for event instance. -- **EventScenario** Indicates the purpose of sending this event - whether because the software distribution just started installing content, or whether it was cancelled, succeeded, or failed. -- **EventType** Possible values are Child, Bundle, or Driver. -- **ExtendedErrorCode** The extended error code. -- **ExtendedStatusCode** Secondary error code for certain scenarios where StatusCode is not specific enough. -- **FeatureUpdatePause** Indicates whether feature OS updates are paused on the device. -- **FlightBranch** The branch that a device is on if participating in the Windows Insider Program. -- **FlightBuildNumber** If this installation was for a Windows Insider build, this is the build number of that build. -- **FlightId** The specific ID of the Windows Insider build the device is getting. -- **FlightRing** The ring that a device is on if participating in the Windows Insider Program. -- **HandlerType** Indicates what kind of content is being installed (for example, app, driver, Windows update). -- **HardwareId** If this install was for a driver targeted to a particular device model, this ID indicates the model of the device. -- **HomeMobileOperator** The mobile operator that the device was originally intended to work with. -- **InstallProps** A bitmask for future flags associated with the install operation. No value is currently reported in this field. Expected value for this field is 0. -- **IntentPFNs** Intended application-set metadata for atomic update scenarios. -- **IsDependentSet** Indicates whether the driver is part of a larger System Hardware/Firmware update. -- **IsFinalOutcomeEvent** Indicates whether this event signals the end of the update/upgrade process. -- **IsFirmware** Indicates whether this update is a firmware update. -- **IsSuccessFailurePostReboot** Indicates whether the update succeeded and then failed after a restart. -- **IsWUfBDualScanEnabled** Indicates whether Windows Update for Business dual scan is enabled on the device. -- **IsWUfBEnabled** Indicates whether Windows Update for Business is enabled on the device. -- **MergedUpdate** Indicates whether the OS update and a BSP update merged for installation. -- **MsiAction** The stage of MSI installation where it failed. -- **MsiProductCode** The unique identifier of the MSI installer. -- **PackageFullName** The package name of the content being installed. -- **PhonePreviewEnabled** Indicates whether a phone was getting preview build, prior to flighting being introduced. -- **ProcessName** The process name of the caller who initiated API calls, in the event that CallerApplicationName was not provided. -- **QualityUpdatePause** Indicates whether quality OS updates are paused on the device. -- **RelatedCV** The previous Correlation Vector that was used before swapping with a new one -- **RepeatFailCount** Indicates whether this specific piece of content has previously failed. -- **RepeatFailFlag** Indicates whether this specific piece of content previously failed to install. -- **RevisionNumber** The revision number of this specific piece of content. -- **ServiceGuid** An ID which represents which service the software distribution client is installing content for (Windows Update, Microsoft Store, etc.). -- **Setup360Phase** If the install is for an operating system upgrade, indicates which phase of the upgrade is underway. -- **ShippingMobileOperator** The mobile operator that a device shipped on. -- **StatusCode** Indicates the result of an installation event (success, cancellation, failure code HResult). -- **SystemBIOSMajorRelease** Major version of the BIOS. -- **SystemBIOSMinorRelease** Minor version of the BIOS. -- **TargetGroupId** For drivers targeted to a specific device model, this ID indicates the distribution group of devices receiving that driver. -- **TargetingVersion** For drivers targeted to a specific device model, this is the version number of the drivers being distributed to the device. -- **TransactionCode** The ID that represents a given MSI installation. -- **UpdateId** Unique update ID. -- **UpdateID** An identifier associated with the specific piece of content. -- **UpdateImportance** Indicates whether a piece of content was marked as Important, Recommended, or Optional. -- **UsedSystemVolume** Indicates whether the content was downloaded and then installed from the device's main system storage drive, or an alternate storage drive. -- **WUDeviceID** The unique identifier of a specific device, used to identify how many devices are encountering success or a particular issue. - - -### SoftwareUpdateClientTelemetry.Revert - -Revert event for target update on Windows Update Client. See EventScenario field for specifics (for example, Started/Failed/Succeeded). - -The following fields are available: - -- **BundleId** Identifier associated with the specific content bundle. Should not be all zeros if the BundleId was found. -- **BundleRepeatFailCount** Indicates whether this particular update bundle has previously failed. -- **BundleRevisionNumber** Identifies the revision number of the content bundle. -- **CallerApplicationName** Name of application making the Windows Update request. Used to identify context of request. -- **ClientVersion** Version number of the software distribution client. -- **CommonProps** A bitmask for future flags associated with the Windows Update client behavior. There is no value being reported in this field right now. Expected value for this field is 0. -- **CSIErrorType** Stage of CBS installation that failed. -- **DriverPingBack** Contains information about the previous driver and system state. -- **DriverRecoveryIds** The list of identifiers that could be used for uninstalling the drivers if a recovery is required. -- **EventInstanceID** A globally unique identifier for event instance. -- **EventScenario** Indicates the purpose of the event (scan started, succeeded, failed, etc.). -- **EventType** Event type (Child, Bundle, Release, or Driver). -- **ExtendedStatusCode** Secondary status code for certain scenarios where StatusCode is not specific enough. -- **FeatureUpdatePause** Indicates whether feature OS updates are paused on the device. -- **FlightBuildNumber** Indicates the build number of the flight. -- **FlightId** The specific ID of the flight the device is getting. -- **HandlerType** Indicates the kind of content (app, driver, windows patch, etc.). -- **HardwareId** If this download was for a driver targeted to a particular device model, this ID indicates the model of the device. -- **IsFinalOutcomeEvent** Indicates whether this event signals the end of the update/upgrade process. -- **IsFirmware** Indicates whether an update was a firmware update. -- **IsSuccessFailurePostReboot** Indicates whether an initial success was a failure after a reboot. -- **IsWUfBDualScanEnabled** Flag indicating whether WU-for-Business dual scan is enabled on the device. -- **IsWUfBEnabled** Flag indicating whether WU-for-Business is enabled on the device. -- **MergedUpdate** Indicates whether an OS update and a BSP update were merged for install. -- **ProcessName** Process name of the caller who initiated API calls into the software distribution client. -- **QualityUpdatePause** Indicates whether quality OS updates are paused on the device. -- **RelatedCV** The previous correlation vector that was used by the client before swapping with a new one. -- **RepeatFailCount** Indicates whether this specific piece of content has previously failed. -- **RevisionNumber** Identifies the revision number of this specific piece of content. -- **ServiceGuid** Identifier for the service to which the software distribution client is connecting (Windows Update, Microsoft Store, etc.). -- **StatusCode** Result code of the event (success, cancellation, failure code HResult). -- **TargetGroupId** For drivers targeted to a specific device model, this ID indicates the distribution group of devices receiving that driver. -- **TargetingVersion** For drivers targeted to a specific device model, this is the version number of the drivers being distributed to the device. -- **UpdateId** The identifier associated with the specific piece of content. -- **UpdateImportance** Indicates the importance of a driver, and why it received that importance level (0-Unknown, 1-Optional, 2-Important-DNF, 3-Important-Generic, 4-Important-Other, 5-Recommended). -- **UsedSystemVolume** Indicates whether the device's main system storage drive or an alternate storage drive was used. -- **WUDeviceID** Unique device ID controlled by the software distribution client. - - -### SoftwareUpdateClientTelemetry.TaskRun - -Start event for Server Initiated Healing client. See EventScenario field for specifics (for example, started/completed). - -The following fields are available: - -- **CallerApplicationName** Name of application making the Windows Update request. Used to identify context of request. -- **ClientVersion** Version number of the software distribution client. -- **CmdLineArgs** Command line arguments passed in by the caller. -- **EventInstanceID** A globally unique identifier for the event instance. -- **EventScenario** Indicates the purpose of the event (scan started, succeeded, failed, etc.). -- **ServiceGuid** Identifier for the service to which the software distribution client is connecting (Windows Update, Microsoft Store, etc.). -- **StatusCode** Result code of the event (success, cancellation, failure code HResult). -- **WUDeviceID** Unique device ID controlled by the software distribution client. - - -### SoftwareUpdateClientTelemetry.Uninstall - -Uninstall event for target update on Windows Update Client. See EventScenario field for specifics (for example, Started/Failed/Succeeded). - -The following fields are available: - -- **BundleId** The identifier associated with the specific content bundle. This should not be all zeros if the bundleID was found. -- **BundleRepeatFailCount** Indicates whether this particular update bundle previously failed. -- **BundleRevisionNumber** Identifies the revision number of the content bundle. -- **CallerApplicationName** Name of the application making the Windows Update request. Used to identify context of request. -- **ClientVersion** Version number of the software distribution client. -- **CommonProps** A bitmask for future flags associated with the Windows Update client behavior. There is no value being reported in this field right now. Expected value for this field is 0. -- **DriverPingBack** Contains information about the previous driver and system state. -- **DriverRecoveryIds** The list of identifiers that could be used for uninstalling the drivers when a recovery is required. -- **EventInstanceID** A globally unique identifier for event instance. -- **EventScenario** Indicates the purpose of the event (a scan started, succeded, failed, etc.). -- **EventType** Indicates the event type. Possible values are "Child", "Bundle", "Release" or "Driver". -- **ExtendedStatusCode** Secondary status code for certain scenarios where StatusCode is not specific enough. -- **FeatureUpdatePause** Indicates whether feature OS updates are paused on the device. -- **FlightBuildNumber** Indicates the build number of the flight. -- **FlightId** The specific ID of the flight the device is getting. -- **HandlerType** Indicates the kind of content (app, driver, windows patch, etc.). -- **HardwareId** If the download was for a driver targeted to a particular device model, this ID indicates the model of the device. -- **IsFinalOutcomeEvent** Indicates whether this event signals the end of the update/upgrade process. -- **IsFirmware** Indicates whether an update was a firmware update. -- **IsSuccessFailurePostReboot** Indicates whether an initial success was then a failure after a reboot. -- **IsWUfBDualScanEnabled** Flag indicating whether WU-for-Business dual scan is enabled on the device. -- **IsWUfBEnabled** Flag indicating whether WU-for-Business is enabled on the device. -- **MergedUpdate** Indicates whether an OS update and a BSP update were merged for install. -- **ProcessName** Process name of the caller who initiated API calls into the software distribution client. -- **QualityUpdatePause** Indicates whether quality OS updates are paused on the device. -- **RelatedCV** The previous correlation vector that was used by the client before swapping with a new one. -- **RepeatFailCount** Indicates whether this specific piece of content previously failed. -- **RevisionNumber** Identifies the revision number of this specific piece of content. -- **ServiceGuid** Identifier for the service to which the software distribution client is connecting (Windows Update, Microsoft Store, etc.). -- **StatusCode** Result code of the event (success, cancellation, failure code HResult). -- **TargetGroupId** For drivers targeted to a specific device model, this ID indicates the distribution group of devices receiving that driver. -- **TargetingVersion** For drivers targeted to a specific device model, this is the version number of the drivers being distributed to the device. -- **UpdateId** Identifier associated with the specific piece of content. -- **UpdateImportance** Indicates the importance of a driver and why it received that importance level (0-Unknown, 1-Optional, 2-Important-DNF, 3-Important-Generic, 4-Important-Other, 5-Recommended). -- **UsedSystemVolume** Indicates whether the device’s main system storage drive or an alternate storage drive was used. -- **WUDeviceID** Unique device ID controlled by the software distribution client. - - -### SoftwareUpdateClientTelemetry.UpdateDetected - -This event sends data about an AppX app that has been updated from the Microsoft Store, including what app needs an update and what version/architecture is required, in order to understand and address problems with apps getting required updates. - -The following fields are available: - -- **ApplicableUpdateInfo** Metadata for the updates which were detected as applicable. -- **CallerApplicationName** The name provided by the caller who initiated API calls into the software distribution client. -- **IntentPFNs** Intended application-set metadata for atomic update scenarios. -- **NumberOfApplicableUpdates** The number of updates ultimately deemed applicable to the system after the detection process is complete. -- **RelatedCV** The previous Correlation Vector that was used before swapping with a new one. -- **ServiceGuid** An ID that represents which service the software distribution client is connecting to (Windows Update, Microsoft Store, etc.). -- **WUDeviceID** The unique device ID controlled by the software distribution client. - - -### SoftwareUpdateClientTelemetry.UpdateMetadataIntegrity - -Ensures Windows Updates are secure and complete. Event helps to identify whether update content has been tampered with and protects against man-in-the-middle attack. - -The following fields are available: - -- **CallerApplicationName** Name of application making the Windows Update request. Used to identify context of request. -- **EndpointUrl** The endpoint URL where the device obtains update metadata. This is used to distinguish between test, staging, and production environments. -- **EventScenario** The purpose of this event, such as scan started, scan succeeded, or scan failed. -- **ExtendedStatusCode** The secondary status code of the event. -- **LeafCertId** The integral ID from the FragmentSigning data for the certificate that failed. -- **ListOfSHA256OfIntermediateCerData** A semicolon delimited list of base64 encoding of hashes for the Base64CerData in the FragmentSigning data of an intermediate certificate. -- **MetadataIntegrityMode** The mode of the transport metadata integrity check. 0 = unknown; 1 = ignore; 2 = audit; 3 = enforce -- **MetadataSignature** A base64-encoded string of the signature associated with the update metadata (specified by revision ID). -- **RawMode** The raw unparsed mode string from the SLS response. This field is null if not applicable. -- **RawValidityWindowInDays** The raw unparsed validity window string in days of the timestamp token. This field is null if not applicable. -- **RevisionId** The revision ID for a specific piece of content. -- **RevisionNumber** The revision number for a specific piece of content. -- **ServiceGuid** Identifies the service to which the software distribution client is connected, Example: Windows Update or Microsoft Store -- **SHA256OfLeafCerData** A base64 encoding of the hash for the Base64CerData in the FragmentSigning data of the leaf certificate. -- **SHA256OfLeafCertPublicKey** A base64 encoding of the hash of the Base64CertData in the FragmentSigning data of the leaf certificate. -- **SHA256OfTimestampToken** An encoded string of the timestamp token. -- **SignatureAlgorithm** The hash algorithm for the metadata signature. -- **SLSPrograms** A test program to which a device may have opted in. Example: Insider Fast -- **StatusCode** The status code of the event. -- **TimestampTokenCertThumbprint** The thumbprint of the encoded timestamp token. -- **TimestampTokenId** The time this was created. It is encoded in a timestamp blob and will be zero if the token is malformed. -- **UpdateId** The update ID for a specific piece of content. -- **ValidityWindowInDays** The validity window that's in effect when verifying the timestamp. - - -## System Resource Usage Monitor events - -### Microsoft.Windows.Srum.Sdp.CpuUsage - -This event provides information on CPU usage. - -The following fields are available: - -- **UsageMax** The maximum of hourly average CPU usage. -- **UsageMean** The mean of hourly average CPU usage. -- **UsageMedian** The median of hourly average CPU usage. -- **UsageTwoHourMaxMean** The mean of the maximum of every two hour of hourly average CPU usage. -- **UsageTwoHourMedianMean** The mean of the median of every two hour of hourly average CPU usage. - - -### Microsoft.Windows.Srum.Sdp.NetworkUsage - -This event provides information on network usage. - -The following fields are available: - -- **AdapterGuid** The unique ID of the adapter. -- **BytesTotalMax** The maximum of the hourly average bytes total. -- **BytesTotalMean** The mean of the hourly average bytes total. -- **BytesTotalMedian** The median of the hourly average bytes total. -- **BytesTotalTwoHourMaxMean** The mean of the maximum of every two hours of hourly average bytes total. -- **BytesTotalTwoHourMedianMean** The mean of the median of every two hour of hourly average bytes total. -- **LinkSpeed** The adapter link speed. - - -## Update events - -### Update360Telemetry.Revert - -This event sends data relating to the Revert phase of updating Windows. - -The following fields are available: - -- **ErrorCode** The error code returned for the Revert phase. -- **FlightId** Unique ID for the flight (test instance version). -- **ObjectId** The unique value for each Update Agent mode. -- **RebootRequired** Indicates reboot is required. -- **RelatedCV** The correlation vector value generated from the latest USO (Update Service Orchestrator) scan. -- **Result** The HResult of the event. -- **RevertResult** The result code returned for the Revert operation. -- **ScenarioId** The ID of the update scenario. -- **SessionId** The ID of the update attempt. -- **UpdateId** The ID of the update. - - -### Update360Telemetry.UpdateAgentCommit - -This event collects information regarding the commit phase of the new Unified Update Platform (UUP) update scenario, which is leveraged by both Mobile and Desktop. - -The following fields are available: - -- **ErrorCode** The error code returned for the current install phase. -- **FlightId** Unique ID for each flight. -- **ObjectId** Unique value for each Update Agent mode. -- **RelatedCV** Correlation vector value generated from the latest USO scan. -- **Result** Outcome of the install phase of the update. -- **ScenarioId** Indicates the update scenario. -- **SessionId** Unique value for each update attempt. -- **UpdateId** Unique ID for each update. - - -### Update360Telemetry.UpdateAgentDownloadRequest - -This event sends data for the download request phase of updating Windows via the new Unified Update Platform (UUP) scenario. Applicable to PC and Mobile. - -The following fields are available: - -- **DeletedCorruptFiles** Boolean indicating whether corrupt payload was deleted. -- **DownloadRequests** Number of times a download was retried. -- **ErrorCode** The error code returned for the current download request phase. -- **ExtensionName** Indicates whether the payload is related to Operating System content or a plugin. -- **FlightId** Unique ID for each flight. -- **InternalFailureResult** Indicates a non-fatal error from a plugin. -- **ObjectId** Unique value for each Update Agent mode (same concept as InstanceId for Setup360). -- **PackageCategoriesSkipped** Indicates package categories that were skipped, if applicable. -- **PackageCountOptional** Number of optional packages requested. -- **PackageCountRequired** Number of required packages requested. -- **PackageCountTotal** Total number of packages needed. -- **PackageCountTotalCanonical** Total number of canonical packages. -- **PackageCountTotalDiff** Total number of diff packages. -- **PackageCountTotalExpress** Total number of express packages. -- **PackageExpressType** Type of express package. -- **PackageSizeCanonical** Size of canonical packages in bytes. -- **PackageSizeDiff** Size of diff packages in bytes. -- **PackageSizeExpress** Size of express packages in bytes. -- **RangeRequestState** Indicates the range request type used. -- **RelatedCV** Correlation vector value generated from the latest USO scan. -- **Result** Outcome of the download request phase of update. -- **SandboxTaggedForReserves** The sandbox for reserves. -- **ScenarioId** Indicates the update scenario. -- **SessionId** Unique value for each attempt (same value for initialize, download, install commit phases). -- **UpdateId** Unique ID for each update. - - -### Update360Telemetry.UpdateAgentExpand - -This event collects information regarding the expansion phase of the new Unified Update Platform (UUP) update scenario, which is leveraged by both Mobile and Desktop. - -The following fields are available: - -- **ElapsedTickCount** Time taken for expand phase. -- **EndFreeSpace** Free space after expand phase. -- **EndSandboxSize** Sandbox size after expand phase. -- **ErrorCode** The error code returned for the current install phase. -- **FlightId** Unique ID for each flight. -- **ObjectId** Unique value for each Update Agent mode. -- **RelatedCV** Correlation vector value generated from the latest USO scan. -- **ScenarioId** Indicates the update scenario. -- **SessionId** Unique value for each update attempt. -- **StartFreeSpace** Free space before expand phase. -- **StartSandboxSize** Sandbox size after expand phase. -- **UpdateId** Unique ID for each update. - - -### Update360Telemetry.UpdateAgentFellBackToCanonical - -This event collects information when express could not be used and we fall back to canonical during the new Unified Update Platform (UUP) update scenario, which is leveraged by both Mobile and Desktop. - -The following fields are available: - -- **FlightId** Unique ID for each flight. -- **ObjectId** Unique value for each Update Agent mode. -- **PackageCount** Number of packages that feel back to canonical. -- **PackageList** PackageIds which fell back to canonical. -- **RelatedCV** Correlation vector value generated from the latest USO scan. -- **ScenarioId** Indicates the update scenario. -- **SessionId** Unique value for each update attempt. -- **UpdateId** Unique ID for each update. - - -### Update360Telemetry.UpdateAgentInitialize - -This event sends data for the initialize phase of updating Windows via the new Unified Update Platform (UUP) scenario, which is applicable to both PCs and Mobile. - -The following fields are available: - -- **ErrorCode** The error code returned for the current install phase. -- **FlightId** Unique ID for each flight. -- **FlightMetadata** Contains the FlightId and the build being flighted. -- **ObjectId** Unique value for each Update Agent mode. -- **RelatedCV** Correlation vector value generated from the latest USO scan. -- **Result** Outcome of the install phase of the update. -- **ScenarioId** Indicates the update scenario. -- **SessionData** String containing instructions to update agent for processing FODs and DUICs (Null for other scenarios). -- **SessionId** Unique value for each update attempt. -- **UpdateId** Unique ID for each update. - - -### Update360Telemetry.UpdateAgentInstall - -This event sends data for the install phase of updating Windows. - -The following fields are available: - -- **ErrorCode** The error code returned for the current install phase. -- **ExtensionName** Indicates whether the payload is related to Operating System content or a plugin. -- **FlightId** Unique value for each Update Agent mode (same concept as InstanceId for Setup360). -- **InternalFailureResult** Indicates a non-fatal error from a plugin. -- **ObjectId** Correlation vector value generated from the latest USO scan. -- **RelatedCV** Correlation vector value generated from the latest USO scan. -- **Result** The result for the current install phase. -- **ScenarioId** Indicates the update scenario. -- **SessionId** Unique value for each update attempt. -- **UpdateId** Unique ID for each update. - - -### Update360Telemetry.UpdateAgentMerge - -The UpdateAgentMerge event sends data on the merge phase when updating Windows. - -The following fields are available: - -- **ErrorCode** The error code returned for the current merge phase. -- **FlightId** Unique ID for each flight. -- **MergeId** The unique ID to join two update sessions being merged. -- **ObjectId** Unique value for each Update Agent mode. -- **RelatedCV** Related correlation vector value. -- **Result** Outcome of the merge phase of the update. -- **ScenarioId** Indicates the update scenario. -- **SessionId** Unique value for each attempt. -- **UpdateId** Unique ID for each update. - - -### Update360Telemetry.UpdateAgentMitigationResult - -This event sends data indicating the result of each update agent mitigation. - -The following fields are available: - -- **Applicable** Indicates whether the mitigation is applicable for the current update. -- **CommandCount** The number of command operations in the mitigation entry. -- **CustomCount** The number of custom operations in the mitigation entry. -- **FileCount** The number of file operations in the mitigation entry. -- **FlightId** Unique identifier for each flight. -- **Index** The mitigation index of this particular mitigation. -- **MitigationScenario** The update scenario in which the mitigation was executed. -- **Name** The friendly name of the mitigation. -- **ObjectId** Unique value for each Update Agent mode. -- **OperationIndex** The mitigation operation index (in the event of a failure). -- **OperationName** The friendly name of the mitigation operation (in the event of failure). -- **RegistryCount** The number of registry operations in the mitigation entry. -- **RelatedCV** The correlation vector value generated from the latest USO scan. -- **Result** The HResult of this operation. -- **ScenarioId** The update agent scenario ID. -- **SessionId** Unique value for each update attempt. -- **TimeDiff** The amount of time spent performing the mitigation (in 100-nanosecond increments). -- **UpdateId** Unique ID for each Update. - - -### Update360Telemetry.UpdateAgentMitigationSummary - -This event sends a summary of all the update agent mitigations available for an this update. - -The following fields are available: - -- **Applicable** The count of mitigations that were applicable to the system and scenario. -- **Failed** The count of mitigations that failed. -- **FlightId** Unique identifier for each flight. -- **MitigationScenario** The update scenario in which the mitigations were attempted. -- **ObjectId** The unique value for each Update Agent mode. -- **RelatedCV** The correlation vector value generated from the latest USO scan. -- **Result** The HResult of this operation. -- **ScenarioId** The update agent scenario ID. -- **SessionId** Unique value for each update attempt. -- **TimeDiff** The amount of time spent performing all mitigations (in 100-nanosecond increments). -- **Total** Total number of mitigations that were available. -- **UpdateId** Unique ID for each update. - - -### Update360Telemetry.UpdateAgentModeStart - -This event sends data for the start of each mode during the process of updating Windows via the new Unified Update Platform (UUP) scenario. Applicable to both PCs and Mobile. - -The following fields are available: - -- **FlightId** Unique ID for each flight. -- **Mode** Indicates the mode that has started. -- **ObjectId** Unique value for each Update Agent mode. -- **RelatedCV** Correlation vector value generated from the latest USO scan. -- **ScenarioId** Indicates the update scenario. -- **SessionId** Unique value for each update attempt. -- **UpdateId** Unique ID for each update. -- **Version** Version of update - - -### Update360Telemetry.UpdateAgentOneSettings - -This event collects information regarding the post reboot phase of the new UUP (Unified Update Platform) update scenario; which is leveraged by both Mobile and Desktop. - -The following fields are available: - -- **Count** The count of applicable OneSettings for the device. -- **FlightId** Unique ID for the flight (test instance version). -- **ObjectId** The unique value for each Update Agent mode. -- **Parameters** The set of name value pair parameters sent to OneSettings to determine if there are any applicable OneSettings. -- **RelatedCV** The correlation vector value generated from the latest USO (Update Service Orchestrator) scan. -- **Result** The HResult of the event. -- **ScenarioId** The ID of the update scenario. -- **SessionId** The ID of the update attempt. -- **UpdateId** The ID of the update. -- **Values** The values sent back to the device, if applicable. - - -### Update360Telemetry.UpdateAgentPostRebootResult - -This event collects information for both Mobile and Desktop regarding the post reboot phase of the new Unified Update Platform (UUP) update scenario. - -The following fields are available: - -- **ErrorCode** The error code returned for the current post reboot phase. -- **FlightId** The specific ID of the Windows Insider build the device is getting. -- **ObjectId** Unique value for each Update Agent mode. -- **PostRebootResult** Indicates the Hresult. -- **RelatedCV** Correlation vector value generated from the latest USO scan. -- **ScenarioId** The scenario ID. Example: MobileUpdate, DesktopLanguagePack, DesktopFeatureOnDemand, or DesktopDriverUpdate. -- **SessionId** Unique value for each update attempt. -- **UpdateId** Unique ID for each update. - - -### Update360Telemetry.UpdateAgentReboot - -This event sends information indicating that a request has been sent to suspend an update. - -The following fields are available: - -- **ErrorCode** The error code returned for the current reboot. -- **FlightId** Unique ID for the flight (test instance version). -- **ObjectId** The unique value for each Update Agent mode. -- **RelatedCV** The correlation vector value generated from the latest USO (Update Service Orchestrator) scan. -- **Result** The HResult of the event. -- **ScenarioId** The ID of the update scenario. -- **SessionId** The ID of the update attempt. -- **UpdateId** The ID of the update. - - -### Update360Telemetry.UpdateAgentSetupBoxLaunch - -The UpdateAgent_SetupBoxLaunch event sends data for the launching of the setup box when updating Windows via the new Unified Update Platform (UUP) scenario. This event is only applicable to PCs. - -The following fields are available: - -- **ContainsExpressPackage** Indicates whether the download package is express. -- **FlightId** Unique ID for each flight. -- **FreeSpace** Free space on OS partition. -- **InstallCount** Number of install attempts using the same sandbox. -- **ObjectId** Unique value for each Update Agent mode. -- **Quiet** Indicates whether setup is running in quiet mode. -- **RelatedCV** Correlation vector value generated from the latest USO scan. -- **SandboxSize** Size of the sandbox. -- **ScenarioId** Indicates the update scenario. -- **SessionId** Unique value for each update attempt. -- **SetupMode** Mode of setup to be launched. -- **UpdateId** Unique ID for each Update. -- **UserSession** Indicates whether install was invoked by user actions. - - -## Update notification events - -### Microsoft.Windows.UpdateNotificationPipeline.UNPCampaignManagerHeartbeat - -This event is sent at the start of the CampaignManager event and is intended to be used as a heartbeat. - -The following fields are available: - -- **CampaignConfigVersion** Configuration version for the current campaign. -- **CampaignID** Currently campaign that is running on Update Notification Pipeline (UNP). -- **ConfigCatalogVersion** Current catalog version of UNP. -- **ContentVersion** Content version for the current campaign on UNP. -- **CV** Correlation vector. -- **DetectorVersion** Most recently run detector version for the current campaign on UNP. -- **GlobalEventCounter** Client-side counter that indicates the event ordering sent by the user. -- **PackageVersion** Current UNP package version. - - -## Upgrade events - -### FacilitatorTelemetry.DCATDownload - -This event indicates whether devices received additional or critical supplemental content during an OS Upgrade, to help keep Windows up-to-date and secure. - -The following fields are available: - -- **DownloadSize** Download size of payload. -- **ElapsedTime** Time taken to download payload. -- **MediaFallbackUsed** Used to determine if we used Media CompDBs to figure out package requirements for the upgrade. -- **ResultCode** Result returned by the Facilitator DCAT call. -- **Scenario** Dynamic update scenario (Image DU, or Setup DU). -- **Type** Type of package that was downloaded. -- **UpdateId** The ID of the update that was downloaded. - - -### FacilitatorTelemetry.DUDownload - -This event returns data about the download of supplemental packages critical to upgrading a device to the next version of Windows. - -The following fields are available: - -- **DownloadRequestAttributes** The attributes sent for download. -- **PackageCategoriesFailed** Lists the categories of packages that failed to download. -- **PackageCategoriesSkipped** Lists the categories of package downloads that were skipped. -- **ResultCode** The result of the event execution. -- **Scenario** Identifies the active Download scenario. -- **Url** The URL the download request was sent to. -- **Version** Identifies the version of Facilitator used. - - -### FacilitatorTelemetry.InitializeDU - -This event determines whether devices received additional or critical supplemental content during an OS upgrade. - -The following fields are available: - -- **DCATUrl** The Delivery Catalog (DCAT) URL we send the request to. -- **DownloadRequestAttributes** The attributes we send to DCAT. -- **ResultCode** The result returned from the initiation of Facilitator with the URL/attributes. -- **Scenario** Dynamic Update scenario (Image DU, or Setup DU). -- **Url** The Delivery Catalog (DCAT) URL we send the request to. -- **Version** Version of Facilitator. - - -### Setup360Telemetry.Downlevel - -This event sends data indicating that the device has started the downlevel phase of the upgrade, to help keep Windows up-to-date and secure. - -The following fields are available: - -- **ClientId** If using Windows Update, this will be the Windows Update client ID that is passed to Setup. In Media setup, the default value is Media360, but it can be overwritten by the caller to a unique value. -- **FlightData** Unique value that identifies the flight. -- **HostOSBuildNumber** The build number of the downlevel OS. -- **HostOsSkuName** The operating system edition which is running Setup360 instance (downlevel OS). -- **InstanceId** A unique GUID that identifies each instance of setuphost.exe. -- **ReportId** In the Windows Update scenario, this is the updateID that is passed to Setup. In media setup, this is the GUID for the install.wim. -- **Setup360Extended** More detailed information about phase/action when the potential failure occurred. -- **Setup360Mode** The phase of Setup360 (for example, Predownload, Install, Finalize, Rollback). -- **Setup360Result** The result of Setup360 (HRESULT used to diagnose errors). -- **Setup360Scenario** The Setup360 flow type (for example, Boot, Media, Update, MCT). -- **SetupVersionBuildNumber** The build number of Setup360 (build number of the target OS). -- **State** Exit state of given Setup360 run. Example: succeeded, failed, blocked, cancelled. -- **TestId** An ID that uniquely identifies a group of events. -- **WuId** This is the Windows Update Client ID. In the Windows Update scenario, this is the same as the clientId. - - -### Setup360Telemetry.Finalize - -This event sends data indicating that the device has started the phase of finalizing the upgrade, to help keep Windows up-to-date and secure. - -The following fields are available: - -- **ClientId** With Windows Update, this will be the Windows Update client ID that is passed to Setup. In Media setup, default value is Media360, but can be overwritten by the caller to a unique value. -- **FlightData** Unique value that identifies the flight. -- **HostOSBuildNumber** The build number of the previous OS. -- **HostOsSkuName** The OS edition which is running Setup360 instance (previous OS). -- **InstanceId** A unique GUID that identifies each instance of setuphost.exe -- **ReportId** With Windows Update, this is the updateID that is passed to Setup. In media setup, this is the GUID for the install.wim. -- **Setup360Extended** More detailed information about the phase/action when the potential failure occurred. -- **Setup360Mode** The phase of Setup360. Example: Predownload, Install, Finalize, Rollback. -- **Setup360Result** The result of Setup360. This is an HRESULT error code that is used to diagnose errors. -- **Setup360Scenario** The Setup360 flow type. Example: Boot, Media, Update, MCT. -- **SetupVersionBuildNumber** The build number of Setup360 (build number of target OS). -- **State** The exit state of a Setup360 run. Example: succeeded, failed, blocked, cancelled. -- **TestId** ID that uniquely identifies a group of events. -- **WuId** This is the Windows Update Client ID. With Windows Update, this is the same as the clientId. - - -### Setup360Telemetry.OsUninstall - -This event sends data regarding OS updates and upgrades from Windows 7, Windows 8, and Windows 10. Specifically, it indicates the outcome of an OS uninstall. - -The following fields are available: - -- **ClientId** For Windows Update, this will be the Windows Update client ID that is passed to Setup. In Media setup, default value is Media360, but can be overwritten by the caller to a unique value. -- **FlightData** Unique value that identifies the flight. -- **HostOSBuildNumber** The build number of the previous OS. -- **HostOsSkuName** The OS edition which is running the Setup360 instance (previous OS). -- **InstanceId** A unique GUID that identifies each instance of setuphost.exe. -- **ReportId** For Windows Update, this will be the Windows Update client ID that is passed to Setup. In Media setup, this is the GUID for the install.wim. -- **Setup360Extended** Detailed information about the phase or action when the potential failure occurred. -- **Setup360Mode** The phase of Setup360. Example: Predownload, Install, Finalize, Rollback. -- **Setup360Result** The result of Setup360. This is an HRESULT error code that is used to diagnose errors. -- **Setup360Scenario** The Setup360 flow type. Example: Boot, Media, Update, MCT -- **SetupVersionBuildNumber** The build number of Setup360 (build number of target OS). -- **State** Exit state of a Setup360 run. Example: succeeded, failed, blocked, cancelled. -- **TestId** ID that uniquely identifies a group of events. -- **WuId** Windows Update client ID. - - -### Setup360Telemetry.PostRebootInstall - -This event sends data indicating that the device has invoked the post reboot install phase of the upgrade, to help keep Windows up-to-date. - -The following fields are available: - -- **ClientId** With Windows Update, this is the Windows Update client ID that is passed to Setup. In Media setup, the default value is Media360, but can be overwritten by the caller to a unique value. -- **FlightData** Unique value that identifies the flight. -- **HostOSBuildNumber** The build number of the previous OS. -- **HostOsSkuName** The OS edition which is running Setup360 instance (previous OS). -- **InstanceId** A unique GUID that identifies each instance of setuphost.exe. -- **ReportId** With Windows Update, this is the updateID that is passed to Setup. In media setup, this is the GUID for the install.wim. -- **Setup360Extended** Extension of result - more granular information about phase/action when the potential failure happened -- **Setup360Mode** The phase of Setup360. Example: Predownload, Install, Finalize, Rollback -- **Setup360Result** The result of Setup360. This is an HRESULT error code that's used to diagnose errors. -- **Setup360Scenario** The Setup360 flow type. Example: Boot, Media, Update, MCT -- **SetupVersionBuildNumber** The build number of Setup360 (build number of target OS). -- **State** The exit state of a Setup360 run. Example: succeeded, failed, blocked, cancelled -- **TestId** A string to uniquely identify a group of events. -- **WuId** This is the Windows Update Client ID. With Windows Update, this is the same as ClientId. - - -### Setup360Telemetry.PreDownloadQuiet - -This event sends data indicating that the device has invoked the predownload quiet phase of the upgrade, to help keep Windows up to date. - -The following fields are available: - -- **ClientId** Using Windows Update, this will be the Windows Update client ID that is passed to Setup. In Media setup, default value is Media360, but can be overwritten by the caller to a unique value. -- **FlightData** Unique value that identifies the flight. -- **HostOSBuildNumber** The build number of the previous OS. -- **HostOsSkuName** The OS edition which is running Setup360 instance (previous operating system). -- **InstanceId** A unique GUID that identifies each instance of setuphost.exe. -- **ReportId** Using Windows Update, this is the updateID that is passed to Setup. In media setup, this is the GUID for the install.wim. -- **Setup360Extended** Detailed information about the phase/action when the potential failure occurred. -- **Setup360Mode** The phase of Setup360. Example: Predownload, Install, Finalize, Rollback. -- **Setup360Result** The result of Setup360. This is an HRESULT error code that is used to diagnose errors. -- **Setup360Scenario** The Setup360 flow type. Example: Boot, Media, Update, MCT. -- **SetupVersionBuildNumber** The build number of Setup360 (build number of target OS). -- **State** The exit state of a Setup360 run. Example: succeeded, failed, blocked, canceled. -- **TestId** ID that uniquely identifies a group of events. -- **WuId** This is the Windows Update Client ID. Using Windows Update, this is the same as the clientId. - - -### Setup360Telemetry.PreDownloadUX - -This event sends data regarding OS Updates and Upgrades from Windows 7.X, Windows 8.X, Windows 10 and RS, to help keep Windows up-to-date and secure. Specifically, it indicates the outcome of the PredownloadUX portion of the update process. - -The following fields are available: - -- **ClientId** For Windows Update, this will be the Windows Update client ID that is passed to Setup. In Media setup, default value is Media360, but can be overwritten by the caller to a unique value. -- **FlightData** In the WU scenario, this will be the WU client ID that is passed to Setup. In Media setup, default value is Media360, but can be overwritten by the caller to a unique value. -- **HostOSBuildNumber** The build number of the previous operating system. -- **HostOsSkuName** The OS edition which is running the Setup360 instance (previous operating system). -- **InstanceId** Unique GUID that identifies each instance of setuphost.exe. -- **ReportId** For Windows Update, this will be the Windows Update client ID that is passed to Setup. In Media setup, this is the GUID for the install.wim. -- **Setup360Extended** Detailed information about the phase/action when the potential failure occurred. -- **Setup360Mode** The phase of Setup360. Example: Predownload, Install, Finalize, Rollback. -- **Setup360Result** The result of Setup360. This is an HRESULT error code that can be used to diagnose errors. -- **Setup360Scenario** The Setup360 flow type. Example: Boot, Media, Update, MCT. -- **SetupVersionBuildNumber** The build number of Setup360 (build number of the target OS). -- **State** The exit state of the Setup360 run. Example: succeeded, failed, blocked, cancelled. -- **TestId** ID that uniquely identifies a group of events. -- **WuId** Windows Update client ID. - - -### Setup360Telemetry.PreInstallQuiet - -This event sends data indicating that the device has invoked the preinstall quiet phase of the upgrade, to help keep Windows up-to-date. - -The following fields are available: - -- **ClientId** With Windows Update, this will be the Windows Update client ID that is passed to Setup. In Media setup, default value is Media360, but can be overwritten by the caller to a unique value. -- **FlightData** Unique value that identifies the flight. -- **HostOSBuildNumber** The build number of the previous OS. -- **HostOsSkuName** The OS edition which is running Setup360 instance (previous OS). -- **InstanceId** A unique GUID that identifies each instance of setuphost.exe -- **ReportId** With Windows Update, this is the updateID that is passed to Setup. In media setup, this is the GUID for the install.wim. -- **Setup360Extended** Detailed information about the phase/action when the potential failure occurred. -- **Setup360Mode** The phase of Setup360. Example: Predownload, Install, Finalize, Rollback. -- **Setup360Result** The result of Setup360. This is an HRESULT error code that can be used to diagnose errors. -- **Setup360Scenario** Setup360 flow type (Boot, Media, Update, MCT). -- **SetupVersionBuildNumber** The build number of Setup360 (build number of target OS). -- **State** The exit state of a Setup360 run. Example: succeeded, failed, blocked, cancelled. -- **TestId** A string to uniquely identify a group of events. -- **WuId** This is the Windows Update Client ID. With Windows Update, this is the same as the clientId. - - -### Setup360Telemetry.PreInstallUX - -This event sends data regarding OS updates and upgrades from Windows 7, Windows 8, and Windows 10, to help keep Windows up-to-date. Specifically, it indicates the outcome of the PreinstallUX portion of the update process. - -The following fields are available: - -- **ClientId** For Windows Update, this will be the Windows Update client ID that is passed to Setup. In Media setup, default value is Media360, but can be overwritten by the caller to a unique value. -- **FlightData** Unique value that identifies the flight. -- **HostOSBuildNumber** The build number of the previous OS. -- **HostOsSkuName** The OS edition which is running the Setup360 instance (previous OS). -- **InstanceId** A unique GUID that identifies each instance of setuphost.exe. -- **ReportId** For Windows Update, this will be the Windows Update client ID that is passed to Setup. In Media setup, this is the GUID for the install.wim. -- **Setup360Extended** Detailed information about the phase/action when the potential failure occurred. -- **Setup360Mode** The phase of Setup360. Example: Predownload, Install, Finalize, Rollback. -- **Setup360Result** The result of Setup360. This is an HRESULT error code that is used to diagnose errors. -- **Setup360Scenario** The Setup360 flow type, Example: Boot, Media, Update, MCT. -- **SetupVersionBuildNumber** The build number of Setup360 (build number of target OS). -- **State** The exit state of a Setup360 run. Example: succeeded, failed, blocked, cancelled. -- **TestId** A string to uniquely identify a group of events. -- **WuId** Windows Update client ID. - - -### Setup360Telemetry.Setup360 - -This event sends data about OS deployment scenarios, to help keep Windows up-to-date. - -The following fields are available: - -- **ClientId** Retrieves the upgrade ID. In the Windows Update scenario, this will be the Windows Update client ID. In Media setup, default value is Media360, but can be overwritten by the caller to a unique value. -- **FieldName** Retrieves the data point. -- **FlightData** Specifies a unique identifier for each group of Windows Insider builds. -- **InstanceId** Retrieves a unique identifier for each instance of a setup session. -- **ReportId** Retrieves the report ID. -- **ScenarioId** Retrieves the deployment scenario. -- **Value** Retrieves the value associated with the corresponding FieldName. - - -### Setup360Telemetry.Setup360DynamicUpdate - -This event helps determine whether the device received supplemental content during an operating system upgrade, to help keep Windows up-to-date. - -The following fields are available: - -- **FlightData** Specifies a unique identifier for each group of Windows Insider builds. -- **InstanceId** Retrieves a unique identifier for each instance of a setup session. -- **Operation** Facilitator’s last known operation (scan, download, etc.). -- **ReportId** ID for tying together events stream side. -- **ResultCode** Result returned for the entire setup operation. -- **Scenario** Dynamic Update scenario (Image DU, or Setup DU). -- **ScenarioId** Identifies the update scenario. -- **TargetBranch** Branch of the target OS. -- **TargetBuild** Build of the target OS. - - -### Setup360Telemetry.Setup360MitigationResult - -This event sends data indicating the result of each setup mitigation. - -The following fields are available: - -- **Applicable** TRUE if the mitigation is applicable for the current update. -- **ClientId** In the Windows Update scenario, this is the client ID passed to Setup. In Media setup, default value is Media360, but can be overwritten by the caller to a unique value. -- **CommandCount** The number of command operations in the mitigation entry. -- **CustomCount** The number of custom operations in the mitigation entry. -- **FileCount** The number of file operations in the mitigation entry. -- **FlightData** The unique identifier for each flight (test release). -- **Index** The mitigation index of this particular mitigation. -- **InstanceId** The GUID (Globally Unique ID) that identifies each instance of SetupHost.EXE. -- **MitigationScenario** The update scenario in which the mitigation was executed. -- **Name** The friendly (descriptive) name of the mitigation. -- **OperationIndex** The mitigation operation index (in the event of a failure). -- **OperationName** The friendly (descriptive) name of the mitigation operation (in the event of failure). -- **RegistryCount** The number of registry operations in the mitigation entry. -- **ReportId** In the Windows Update scenario, the Update ID that is passed to Setup. In media setup, this is the GUID for the INSTALL.WIM. -- **Result** HResult of this operation. -- **ScenarioId** Setup360 flow type. -- **TimeDiff** The amount of time spent performing the mitigation (in 100-nanosecond increments). - - -### Setup360Telemetry.Setup360MitigationSummary - -This event sends a summary of all the setup mitigations available for this update. - -The following fields are available: - -- **Applicable** The count of mitigations that were applicable to the system and scenario. -- **ClientId** The Windows Update client ID passed to Setup. -- **Failed** The count of mitigations that failed. -- **FlightData** The unique identifier for each flight (test release). -- **InstanceId** The GUID (Globally Unique ID) that identifies each instance of SetupHost.EXE. -- **MitigationScenario** The update scenario in which the mitigations were attempted. -- **ReportId** In the Windows Update scenario, the Update ID that is passed to Setup. In media setup, this is the GUID for the INSTALL.WIM. -- **Result** HResult of this operation. -- **ScenarioId** Setup360 flow type. -- **TimeDiff** The amount of time spent performing the mitigation (in 100-nanosecond increments). -- **Total** The total number of mitigations that were available. - - -### Setup360Telemetry.Setup360OneSettings - -This event collects information regarding the post reboot phase of the new UUP (Unified Update Platform) update scenario; which is leveraged by both Mobile and Desktop. - -The following fields are available: - -- **ClientId** The Windows Update client ID passed to Setup. -- **Count** The count of applicable OneSettings for the device. -- **FlightData** The ID for the flight (test instance version). -- **InstanceId** The GUID (Globally-Unique ID) that identifies each instance of setuphost.exe. -- **Parameters** The set of name value pair parameters sent to OneSettings to determine if there are any applicable OneSettings. -- **ReportId** The Update ID passed to Setup. -- **Result** The HResult of the event error. -- **ScenarioId** The update scenario ID. -- **Values** Values sent back to the device, if applicable. - - -### Setup360Telemetry.UnexpectedEvent - -This event sends data indicating that the device has invoked the unexpected event phase of the upgrade, to help keep Windows up to date. - -The following fields are available: - -- **ClientId** With Windows Update, this will be the Windows Update client ID that is passed to Setup. In Media setup, default value is Media360, but can be overwritten by the caller to a unique value. -- **FlightData** Unique value that identifies the flight. -- **HostOSBuildNumber** The build number of the previous OS. -- **HostOsSkuName** The OS edition which is running Setup360 instance (previous OS). -- **InstanceId** A unique GUID that identifies each instance of setuphost.exe -- **ReportId** With Windows Update, this is the updateID that is passed to Setup. In media setup, this is the GUID for the install.wim. -- **Setup360Extended** Detailed information about the phase/action when the potential failure occurred. -- **Setup360Mode** The phase of Setup360. Example: Predownload, Install, Finalize, Rollback. -- **Setup360Result** The result of Setup360. This is an HRESULT error code that can be used used to diagnose errors. -- **Setup360Scenario** The Setup360 flow type. Example: Boot, Media, Update, MCT. -- **SetupVersionBuildNumber** The build number of Setup360 (build number of target OS). -- **State** The exit state of a Setup360 run. Example: succeeded, failed, blocked, cancelled. -- **TestId** A string to uniquely identify a group of events. -- **WuId** This is the Windows Update Client ID. With Windows Update, this is the same as the clientId. - - -## Windows as a Service diagnostic events - -### Microsoft.Windows.WaaSMedic.SummaryEvent - -Result of the WaaSMedic operation. - -The following fields are available: - -- **callerApplication** The name of the calling application. -- **detectionSummary** Result of each applicable detection that was run. -- **featureAssessmentImpact** WaaS Assessment impact for feature updates. -- **hrEngineResult** Error code from the engine operation. -- **insufficientSessions** Device not eligible for diagnostics. -- **isInteractiveMode** The user started a run of WaaSMedic. -- **isManaged** Device is managed for updates. -- **isWUConnected** Device is connected to Windows Update. -- **noMoreActions** No more applicable diagnostics. -- **qualityAssessmentImpact** WaaS Assessment impact for quality updates. -- **remediationSummary** Result of each operation performed on a device to fix an invalid state or configuration that's preventing the device from getting updates. For example, if Windows Update service is turned off, the fix is to turn the it back on. -- **usingBackupFeatureAssessment** Relying on backup feature assessment. -- **usingBackupQualityAssessment** Relying on backup quality assessment. -- **usingCachedFeatureAssessment** WaaS Medic run did not get OS build age from the network on the previous run. -- **usingCachedQualityAssessment** WaaS Medic run did not get OS revision age from the network on the previous run. -- **versionString** Version of the WaaSMedic engine. -- **waasMedicRunMode** Indicates whether this was a background regular run of the medic or whether it was triggered by a user launching Windows Update Troubleshooter. - - -## Windows Error Reporting events - -### Microsoft.Windows.WERVertical.OSCrash - -This event sends binary data from the collected dump file wheneveer a bug check occurs, to help keep Windows up to date. The is the OneCore version of this event. - -The following fields are available: - -- **BootId** Uint32 identifying the boot number for this device. -- **BugCheckCode** Uint64 "bugcheck code" that identifies a proximate cause of the bug check. -- **BugCheckParameter1** Uint64 parameter providing additional information. -- **BugCheckParameter2** Uint64 parameter providing additional information. -- **BugCheckParameter3** Uint64 parameter providing additional information. -- **BugCheckParameter4** Uint64 parameter providing additional information. -- **DumpFileAttributes** Codes that identify the type of data contained in the dump file -- **DumpFileSize** Size of the dump file -- **IsValidDumpFile** True if the dump file is valid for the debugger, false otherwise -- **ReportId** WER Report Id associated with this bug check (used for finding the corresponding report archive in Watson). - - -## Windows Error Reporting MTT events - -### Microsoft.Windows.WER.MTT.Denominator - -This event provides a denominator to calculate MTTF (mean-time-to-failure) for crashes and other errors, to help keep Windows up to date. - -The following fields are available: - -- **DPRange** Maximum mean value range. -- **DPValue** Randomized bit value (0 or 1) that can be reconstituted over a large population to estimate the mean. -- **Value** Standard UTC emitted DP value structure See [Value](#value). - - -### Value - -This event returns data about Mean Time to Failure (MTTF) for Windows devices. It is the primary means of estimating reliability problems in Basic Diagnostic reporting with very strong privacy guarantees. Since Basic Diagnostic reporting does not include system up-time, and since that information is important to ensuring the safe and stable operation of Windows, the data provided by this event provides that data in a manner which does not threaten a user’s privacy. - -The following fields are available: - -- **Algorithm** The algorithm used to preserve privacy. -- **DPRange** The upper bound of the range being measured. -- **DPValue** The randomized response returned by the client. -- **Epsilon** The level of privacy to be applied. -- **HistType** The histogram type if the algorithm is a histogram algorithm. -- **PertProb** The probability the entry will be Perturbed if the algorithm chosen is “heavy-hitters”. - - -## Microsoft Store events - -### Microsoft.Windows.Store.StoreActivating - -This event sends tracking data about when the Store app activation via protocol URI is in progress, to help keep Windows up to date. - - - -### Microsoft.Windows.StoreAgent.Telemetry.AbortedInstallation - -This event is sent when an installation or update is canceled by a user or the system and is used to help keep Windows Apps up to date and secure. - -The following fields are available: - -- **AggregatedPackageFullNames** The names of all packages to be downloaded and installed. -- **AttemptNumber** Number of retry attempts before it was canceled. -- **BundleId** The Item Bundle ID. -- **CategoryId** The Item Category ID. -- **ClientAppId** The identity of the app that initiated this operation. -- **HResult** The result code of the last action performed before this operation. -- **IsBundle** Is this a bundle? -- **IsInteractive** Was this requested by a user? -- **IsMandatory** Was this a mandatory update? -- **IsRemediation** Was this a remediation install? -- **IsRestore** Is this automatically restoring a previously acquired product? -- **IsUpdate** Flag indicating if this is an update. -- **ParentBundleId** The product ID of the parent (if this product is part of a bundle). -- **PFN** The product family name of the product being installed. -- **ProductId** The identity of the package or packages being installed. -- **SystemAttemptNumber** The total number of automatic attempts at installation before it was canceled. -- **UserAttemptNumber** The total number of user attempts at installation before it was canceled. -- **WUContentId** The Windows Update content ID. - - -### Microsoft.Windows.StoreAgent.Telemetry.BeginGetInstalledContentIds - -This event is sent when an inventory of the apps installed is started to determine whether updates for those apps are available. It's used to help keep Windows up-to-date and secure. - - - -### Microsoft.Windows.StoreAgent.Telemetry.BeginUpdateMetadataPrepare - -This event is sent when the Store Agent cache is refreshed with any available package updates. It's used to help keep Windows up-to-date and secure. - - - -### Microsoft.Windows.StoreAgent.Telemetry.CancelInstallation - -This event is sent when an app update or installation is canceled while in interactive mode. This can be canceled by the user or the system. It's used to help keep Windows up-to-date and secure. - -The following fields are available: - -- **AggregatedPackageFullNames** The names of all package or packages to be downloaded and installed. -- **AttemptNumber** Total number of installation attempts. -- **BundleId** The identity of the Windows Insider build that is associated with this product. -- **CategoryId** The identity of the package or packages being installed. -- **ClientAppId** The identity of the app that initiated this operation. -- **IsBundle** Is this a bundle? -- **IsInteractive** Was this requested by a user? -- **IsMandatory** Is this a mandatory update? -- **IsRemediation** Is this repairing a previous installation? -- **IsRestore** Is this an automatic restore of a previously acquired product? -- **IsUpdate** Is this a product update? -- **ParentBundleId** The product ID of the parent (if this product is part of a bundle). -- **PFN** The name of all packages to be downloaded and installed. -- **PreviousHResult** The previous HResult code. -- **PreviousInstallState** Previous installation state before it was canceled. -- **ProductId** The name of the package or packages requested for installation. -- **RelatedCV** Correlation Vector of a previous performed action on this product. -- **SystemAttemptNumber** Total number of automatic attempts to install before it was canceled. -- **UserAttemptNumber** Total number of user attempts to install before it was canceled. -- **WUContentId** The Windows Update content ID. - - -### Microsoft.Windows.StoreAgent.Telemetry.CompleteInstallOperationRequest - -This event is sent at the end of app installations or updates to help keep Windows up-to-date and secure. - -The following fields are available: - -- **CatalogId** The Store Product ID of the app being installed. -- **HResult** HResult code of the action being performed. -- **IsBundle** Is this a bundle? -- **PackageFamilyName** The name of the package being installed. -- **ProductId** The Store Product ID of the product being installed. -- **SkuId** Specific edition of the item being installed. - - -### Microsoft.Windows.StoreAgent.Telemetry.EndAcquireLicense - -This event is sent after the license is acquired when a product is being installed. It's used to help keep Windows up-to-date and secure. - -The following fields are available: - -- **AggregatedPackageFullNames** Includes a set of package full names for each app that is part of an atomic set. -- **AttemptNumber** The total number of attempts to acquire this product. -- **CategoryId** The identity of the package or packages being installed. -- **ClientAppId** The identity of the app that initiated this operation. -- **HResult** HResult code to show the result of the operation (success/failure). -- **IsBundle** Is this a bundle? -- **IsInteractive** Did the user initiate the installation? -- **IsMandatory** Is this a mandatory update? -- **IsRemediation** Is this repairing a previous installation? -- **IsRestore** Is this happening after a device restore? -- **IsUpdate** Is this an update? -- **PFN** Product Family Name of the product being installed. -- **ProductId** The Store Product ID for the product being installed. -- **SystemAttemptNumber** The number of attempts by the system to acquire this product. -- **UserAttemptNumber** The number of attempts by the user to acquire this product -- **WUContentId** The Windows Update content ID. - - -### Microsoft.Windows.StoreAgent.Telemetry.EndDownload - -This event is sent after an app is downloaded to help keep Windows up-to-date and secure. - -The following fields are available: - -- **AggregatedPackageFullNames** The name of all packages to be downloaded and installed. -- **AttemptNumber** Number of retry attempts before it was canceled. -- **BundleId** The identity of the Windows Insider build associated with this product. -- **CategoryId** The identity of the package or packages being installed. -- **ClientAppId** The identity of the app that initiated this operation. -- **DownloadSize** The total size of the download. -- **ExtendedHResult** Any extended HResult error codes. -- **HResult** The result code of the last action performed. -- **IsBundle** Is this a bundle? -- **IsInteractive** Is this initiated by the user? -- **IsMandatory** Is this a mandatory installation? -- **IsRemediation** Is this repairing a previous installation? -- **IsRestore** Is this a restore of a previously acquired product? -- **IsUpdate** Is this an update? -- **ParentBundleId** The parent bundle ID (if it's part of a bundle). -- **PFN** The Product Family Name of the app being download. -- **ProductId** The Store Product ID for the product being installed. -- **SystemAttemptNumber** The number of attempts by the system to download. -- **UserAttemptNumber** The number of attempts by the user to download. -- **WUContentId** The Windows Update content ID. - - -### Microsoft.Windows.StoreAgent.Telemetry.EndFrameworkUpdate - -This event is sent when an app update requires an updated Framework package and the process starts to download it. It is used to help keep Windows up-to-date and secure. - -The following fields are available: - -- **HResult** The result code of the last action performed before this operation. - - -### Microsoft.Windows.StoreAgent.Telemetry.EndGetInstalledContentIds - -This event is sent after sending the inventory of the products installed to determine whether updates for those products are available. It's used to help keep Windows up-to-date and secure. - -The following fields are available: - -- **HResult** The result code of the last action performed before this operation. - - -### Microsoft.Windows.StoreAgent.Telemetry.EndInstall - -This event is sent after a product has been installed to help keep Windows up-to-date and secure. - -The following fields are available: - -- **AggregatedPackageFullNames** The names of all packages to be downloaded and installed. -- **AttemptNumber** The number of retry attempts before it was canceled. -- **BundleId** The identity of the build associated with this product. -- **CategoryId** The identity of the package or packages being installed. -- **ClientAppId** The identity of the app that initiated this operation. -- **ExtendedHResult** The extended HResult error code. -- **HResult** The result code of the last action performed. -- **IsBundle** Is this a bundle? -- **IsInteractive** Is this an interactive installation? -- **IsMandatory** Is this a mandatory installation? -- **IsRemediation** Is this repairing a previous installation? -- **IsRestore** Is this automatically restoring a previously acquired product? -- **IsUpdate** Is this an update? -- **ParentBundleId** The product ID of the parent (if this product is part of a bundle). -- **PFN** Product Family Name of the product being installed. -- **ProductId** The Store Product ID for the product being installed. -- **SystemAttemptNumber** The total number of system attempts. -- **UserAttemptNumber** The total number of user attempts. -- **WUContentId** The Windows Update content ID. - - -### Microsoft.Windows.StoreAgent.Telemetry.EndScanForUpdates - -This event is sent after a scan for product updates to determine if there are packages to install. It's used to help keep Windows up-to-date and secure. - -The following fields are available: - -- **ClientAppId** The identity of the app that initiated this operation. -- **HResult** The result code of the last action performed. -- **IsApplicability** Is this request to only check if there are any applicable packages to install? -- **IsInteractive** Is this user requested? -- **IsOnline** Is the request doing an online check? - - -### Microsoft.Windows.StoreAgent.Telemetry.EndSearchUpdatePackages - -This event is sent after searching for update packages to install. It is used to help keep Windows up-to-date and secure. - -The following fields are available: - -- **AggregatedPackageFullNames** The names of all packages to be downloaded and installed. -- **AttemptNumber** The total number of retry attempts before it was canceled. -- **BundleId** The identity of the build associated with this product. -- **CategoryId** The identity of the package or packages being installed. -- **ClientAppId** The identity of the app that initiated this operation. -- **HResult** The result code of the last action performed. -- **IsBundle** Is this a bundle? -- **IsInteractive** Is this user requested? -- **IsMandatory** Is this a mandatory update? -- **IsRemediation** Is this repairing a previous installation? -- **IsRestore** Is this restoring previously acquired content? -- **IsUpdate** Is this an update? -- **ParentBundleId** The product ID of the parent (if this product is part of a bundle). -- **PFN** The name of the package or packages requested for install. -- **ProductId** The Store Product ID for the product being installed. -- **SystemAttemptNumber** The total number of system attempts. -- **UserAttemptNumber** The total number of user attempts. -- **WUContentId** The Windows Update content ID. - - -### Microsoft.Windows.StoreAgent.Telemetry.EndStageUserData - -This event is sent after restoring user data (if any) that needs to be restored following a product install. It is used to keep Windows up-to-date and secure. - -The following fields are available: - -- **AggregatedPackageFullNames** The name of all packages to be downloaded and installed. -- **AttemptNumber** The total number of retry attempts before it was canceled. -- **BundleId** The identity of the build associated with this product. -- **CategoryId** The identity of the package or packages being installed. -- **ClientAppId** The identity of the app that initiated this operation. -- **HResult** The result code of the last action performed. -- **IsBundle** Is this a bundle? -- **IsInteractive** Is this user requested? -- **IsMandatory** Is this a mandatory update? -- **IsRemediation** Is this repairing a previous installation? -- **IsRestore** Is this restoring previously acquired content? -- **IsUpdate** Is this an update? -- **ParentBundleId** The product ID of the parent (if this product is part of a bundle). -- **PFN** The name of the package or packages requested for install. -- **ProductId** The Store Product ID for the product being installed. -- **SystemAttemptNumber** The total number of system attempts. -- **UserAttemptNumber** The total number of system attempts. -- **WUContentId** The Windows Update content ID. - - -### Microsoft.Windows.StoreAgent.Telemetry.EndUpdateMetadataPrepare - -This event is sent after a scan for available app updates to help keep Windows up-to-date and secure. - -The following fields are available: - -- **HResult** The result code of the last action performed. - - -### Microsoft.Windows.StoreAgent.Telemetry.FulfillmentComplete - -This event is sent at the end of an app install or update to help keep Windows up-to-date and secure. - -The following fields are available: - -- **CatalogId** The name of the product catalog from which this app was chosen. -- **FailedRetry** Indicates whether the installation or update retry was successful. -- **HResult** The HResult code of the operation. -- **PFN** The Package Family Name of the app that is being installed or updated. -- **ProductId** The product ID of the app that is being updated or installed. - - -### Microsoft.Windows.StoreAgent.Telemetry.FulfillmentInitiate - -This event is sent at the beginning of an app install or update to help keep Windows up-to-date and secure. - -The following fields are available: - -- **CatalogId** The name of the product catalog from which this app was chosen. -- **FulfillmentPluginId** The ID of the plugin needed to install the package type of the product. -- **PFN** The Package Family Name of the app that is being installed or updated. -- **PluginTelemetryData** Diagnostic information specific to the package-type plug-in. -- **ProductId** The product ID of the app that is being updated or installed. - - -### Microsoft.Windows.StoreAgent.Telemetry.InstallOperationRequest - -This event is sent when a product install or update is initiated, to help keep Windows up-to-date and secure. - -The following fields are available: - -- **BundleId** The identity of the build associated with this product. -- **CatalogId** If this product is from a private catalog, the Store Product ID for the product being installed. -- **ProductId** The Store Product ID for the product being installed. -- **SkuId** Specific edition ID being installed. -- **VolumePath** The disk path of the installation. - - -### Microsoft.Windows.StoreAgent.Telemetry.PauseInstallation - -This event is sent when a product install or update is paused (either by a user or the system), to help keep Windows up-to-date and secure. - -The following fields are available: - -- **AggregatedPackageFullNames** The names of all packages to be downloaded and installed. -- **AttemptNumber** The total number of retry attempts before it was canceled. -- **BundleId** The identity of the build associated with this product. -- **CategoryId** The identity of the package or packages being installed. -- **ClientAppId** The identity of the app that initiated this operation. -- **IsBundle** Is this a bundle? -- **IsInteractive** Is this user requested? -- **IsMandatory** Is this a mandatory update? -- **IsRemediation** Is this repairing a previous installation? -- **IsRestore** Is this restoring previously acquired content? -- **IsUpdate** Is this an update? -- **ParentBundleId** The product ID of the parent (if this product is part of a bundle). -- **PFN** The Product Full Name. -- **PreviousHResult** The result code of the last action performed before this operation. -- **PreviousInstallState** Previous state before the installation or update was paused. -- **ProductId** The Store Product ID for the product being installed. -- **RelatedCV** Correlation Vector of a previous performed action on this product. -- **SystemAttemptNumber** The total number of system attempts. -- **UserAttemptNumber** The total number of user attempts. -- **WUContentId** The Windows Update content ID. - - -### Microsoft.Windows.StoreAgent.Telemetry.ResumeInstallation - -This event is sent when a product install or update is resumed (either by a user or the system), to help keep Windows up-to-date and secure. - -The following fields are available: - -- **AggregatedPackageFullNames** The names of all packages to be downloaded and installed. -- **AttemptNumber** The number of retry attempts before it was canceled. -- **BundleId** The identity of the build associated with this product. -- **CategoryId** The identity of the package or packages being installed. -- **ClientAppId** The identity of the app that initiated this operation. -- **HResult** The result code of the last action performed before this operation. -- **IsBundle** Is this a bundle? -- **IsInteractive** Is this user requested? -- **IsMandatory** Is this a mandatory update? -- **IsRemediation** Is this repairing a previous installation? -- **IsRestore** Is this restoring previously acquired content? -- **IsUpdate** Is this an update? -- **IsUserRetry** Did the user initiate the retry? -- **ParentBundleId** The product ID of the parent (if this product is part of a bundle). -- **PFN** The name of the package or packages requested for install. -- **PreviousHResult** The previous HResult error code. -- **PreviousInstallState** Previous state before the installation was paused. -- **ProductId** The Store Product ID for the product being installed. -- **RelatedCV** Correlation Vector for the original install before it was resumed. -- **ResumeClientId** The ID of the app that initiated the resume operation. -- **SystemAttemptNumber** The total number of system attempts. -- **UserAttemptNumber** The total number of user attempts. -- **WUContentId** The Windows Update content ID. - - -### Microsoft.Windows.StoreAgent.Telemetry.ResumeOperationRequest - -This event is sent when a product install or update is resumed by a user or on installation retries, to help keep Windows up-to-date and secure. - -The following fields are available: - -- **ProductId** The Store Product ID for the product being installed. - - -### Microsoft.Windows.StoreAgent.Telemetry.SearchForUpdateOperationRequest - -This event is sent when searching for update packages to install, to help keep Windows up-to-date and secure. - -The following fields are available: - -- **CatalogId** The Store Catalog ID for the product being installed. -- **ProductId** The Store Product ID for the product being installed. -- **SkuId** Specfic edition of the app being updated. - - -### Microsoft.Windows.StoreAgent.Telemetry.UpdateAppOperationRequest - -This event occurs when an update is requested for an app, to help keep Windows up-to-date and secure. - -The following fields are available: - -- **PFamN** The name of the app that is requested for update. - - -## Windows System Kit events - -### Microsoft.Windows.Kits.WSK.WskImageCreate - -This event sends simple Product and Service usage data when a user is using the Windows System Kit to create new OS “images”. The data includes the version of the Windows System Kit and the state of the event and is used to help investigate “image” creation failures. - -The following fields are available: - -- **Phase** The image creation phase. Values are “Start” or “End”. -- **WskVersion** The version of the Windows System Kit being used. - - -### Microsoft.Windows.Kits.WSK.WskImageCustomization - -This event sends simple Product and Service usage data when a user is using the Windows System Kit to create/modify configuration files allowing the customization of a new OS image with Apps or Drivers. The data includes the version of the Windows System Kit, the state of the event, the customization type (drivers or apps) and the mode (new or updating) and is used to help investigate configuration file creation failures. - -The following fields are available: - -- **CustomizationMode** Indicates the mode of the customization (new or updating). -- **CustomizationType** Indicates the type of customization (drivers or apps). -- **Mode** The mode of update to image configuration files. Values are “New” or “Update”. -- **Phase** The image creation phase. Values are “Start” or “End”. -- **Type** The type of update to image configuration files. Values are “Apps” or “Drivers”. -- **WskVersion** The version of the Windows System Kit being used. - - -### Microsoft.Windows.Kits.WSK.WskWorkspaceCreate - -This event sends simple Product and Service usage data when a user is using the Windows System Kit to create new workspace for generating OS “images”. The data includes the version of the Windows System Kit and the state of the event and is used to help investigate workspace creation failures. - -The following fields are available: - -- **Architecture** The OS architecture that the workspace will target. Values are one of: “AMD64”, “ARM64”, “x86”, or “ARM”. -- **OsEdition** The Operating System Edition that the workspace will target. -- **Phase** The image creation phase. Values are “Start” or “End”. -- **WorkspaceArchitecture** The operating system architecture that the workspace will target. -- **WorkspaceOsEdition** The operating system edition that the workspace will target. -- **WskVersion** The version of the Windows System Kit being used. - - -## Windows Update Delivery Optimization events - -### Microsoft.OSG.DU.DeliveryOptClient.DownloadCanceled - -This event describes when a download was canceled with Delivery Optimization. It's used to understand and address problems regarding downloads. - -The following fields are available: - -- **background** Is the download being done in the background? -- **bytesFromCacheServer** Bytes received from a cache host. -- **bytesFromCDN** The number of bytes received from a CDN source. -- **bytesFromGroupPeers** The number of bytes received from a peer in the same group. -- **bytesFromIntPeers** The number of bytes received from peers not in the same LAN or in the same group. -- **bytesFromLocalCache** Bytes copied over from local (on disk) cache. -- **bytesFromPeers** The number of bytes received from a peer in the same LAN. -- **cdnErrorCodes** A list of CDN connection errors since the last FailureCDNCommunication event. -- **cdnErrorCounts** The number of times each error in cdnErrorCodes was encountered. -- **cdnIp** The IP Address of the source CDN (Content Delivery Network). -- **cdnUrl** The URL of the source CDN (Content Delivery Network). -- **dataSourcesTotal** Bytes received per source type, accumulated for the whole session. -- **errorCode** The error code that was returned. -- **experimentId** When running a test, this is used to correlate events that are part of the same test. -- **fileID** The ID of the file being downloaded. -- **gCurMemoryStreamBytes** Current usage for memory streaming. -- **gMaxMemoryStreamBytes** Maximum usage for memory streaming. -- **isVpn** Indicates whether the device is connected to a VPN (Virtual Private Network). -- **jobID** Identifier for the Windows Update job. -- **predefinedCallerName** The name of the API Caller. -- **reasonCode** Reason the action or event occurred. -- **routeToCacheServer** The cache server setting, source, and value. -- **sessionID** The ID of the file download session. -- **updateID** The ID of the update being downloaded. -- **usedMemoryStream** TRUE if the download is using memory streaming for App downloads. - - -### Microsoft.OSG.DU.DeliveryOptClient.DownloadCompleted - -This event describes when a download has completed with Delivery Optimization. It's used to understand and address problems regarding downloads. - -The following fields are available: - -- **background** Is the download a background download? -- **bytesFromCacheServer** Bytes received from a cache host. -- **bytesFromCDN** The number of bytes received from a CDN source. -- **bytesFromGroupPeers** The number of bytes received from a peer in the same domain group. -- **bytesFromIntPeers** The number of bytes received from peers not in the same LAN or in the same domain group. -- **bytesFromLinkLocalPeers** The number of bytes received from local peers. -- **bytesFromLocalCache** Bytes copied over from local (on disk) cache. -- **bytesFromPeers** The number of bytes received from a peer in the same LAN. -- **bytesRequested** The total number of bytes requested for download. -- **cacheServerConnectionCount** Number of connections made to cache hosts. -- **cdnConnectionCount** The total number of connections made to the CDN. -- **cdnErrorCodes** A list of CDN connection errors since the last FailureCDNCommunication event. -- **cdnErrorCounts** The number of times each error in cdnErrorCodes was encountered. -- **cdnIp** The IP address of the source CDN. -- **cdnUrl** Url of the source Content Distribution Network (CDN). -- **dataSourcesTotal** Bytes received per source type, accumulated for the whole session. -- **doErrorCode** The Delivery Optimization error code that was returned. -- **downlinkBps** The maximum measured available download bandwidth (in bytes per second). -- **downlinkUsageBps** The download speed (in bytes per second). -- **downloadMode** The download mode used for this file download session. -- **downloadModeReason** Reason for the download. -- **downloadModeSrc** Source of the DownloadMode setting (KvsProvider = 0, GeoProvider = 1, GeoVerProvider = 2, CpProvider = 3, DiscoveryProvider = 4, RegistryProvider = 5, GroupPolicyProvider = 6, MdmProvider = 7, SettingsProvider = 8, InvalidProviderType = 9). -- **experimentId** When running a test, this is used to correlate with other events that are part of the same test. -- **fileID** The ID of the file being downloaded. -- **fileSize** The size of the file being downloaded. -- **gCurMemoryStreamBytes** Current usage for memory streaming. -- **gMaxMemoryStreamBytes** Maximum usage for memory streaming. -- **groupConnectionCount** The total number of connections made to peers in the same group. -- **internetConnectionCount** The total number of connections made to peers not in the same LAN or the same group. -- **isEncrypted** TRUE if the file is encrypted and will be decrypted after download. -- **isVpn** Is the device connected to a Virtual Private Network? -- **jobID** Identifier for the Windows Update job. -- **lanConnectionCount** The total number of connections made to peers in the same LAN. -- **linkLocalConnectionCount** The number of connections made to peers in the same Link-local network. -- **numPeers** The total number of peers used for this download. -- **numPeersLocal** The total number of local peers used for this download. -- **predefinedCallerName** The name of the API Caller. -- **restrictedUpload** Is the upload restricted? -- **routeToCacheServer** The cache server setting, source, and value. -- **sessionID** The ID of the download session. -- **totalTimeMs** Duration of the download (in seconds). -- **updateID** The ID of the update being downloaded. -- **uplinkBps** The maximum measured available upload bandwidth (in bytes per second). -- **uplinkUsageBps** The upload speed (in bytes per second). -- **usedMemoryStream** TRUE if the download is using memory streaming for App downloads. - - -### Microsoft.OSG.DU.DeliveryOptClient.DownloadPaused - -This event represents a temporary suspension of a download with Delivery Optimization. It's used to understand and address problems regarding downloads. - -The following fields are available: - -- **background** Is the download a background download? -- **cdnUrl** The URL of the source CDN (Content Delivery Network). -- **errorCode** The error code that was returned. -- **experimentId** When running a test, this is used to correlate with other events that are part of the same test. -- **fileID** The ID of the file being paused. -- **isVpn** Is the device connected to a Virtual Private Network? -- **jobID** Identifier for the Windows Update job. -- **predefinedCallerName** The name of the API Caller object. -- **reasonCode** The reason for pausing the download. -- **routeToCacheServer** The cache server setting, source, and value. -- **sessionID** The ID of the download session. -- **updateID** The ID of the update being paused. - - -### Microsoft.OSG.DU.DeliveryOptClient.DownloadStarted - -This event sends data describing the start of a new download to enable Delivery Optimization. It's used to understand and address problems regarding downloads. - -The following fields are available: - -- **background** Indicates whether the download is happening in the background. -- **bytesRequested** Number of bytes requested for the download. -- **cdnUrl** The URL of the source Content Distribution Network (CDN). -- **costFlags** A set of flags representing network cost. -- **deviceProfile** Identifies the usage or form factor (such as Desktop, Xbox, or VM). -- **diceRoll** Random number used for determining if a client will use peering. -- **doClientVersion** The version of the Delivery Optimization client. -- **doErrorCode** The Delivery Optimization error code that was returned. -- **downloadMode** The download mode used for this file download session (CdnOnly = 0, Lan = 1, Group = 2, Internet = 3, Simple = 99, Bypass = 100). -- **downloadModeReason** Reason for the download. -- **downloadModeSrc** Source of the DownloadMode setting (KvsProvider = 0, GeoProvider = 1, GeoVerProvider = 2, CpProvider = 3, DiscoveryProvider = 4, RegistryProvider = 5, GroupPolicyProvider = 6, MdmProvider = 7, SettingsProvider = 8, InvalidProviderType = 9). -- **errorCode** The error code that was returned. -- **experimentId** ID used to correlate client/services calls that are part of the same test during A/B testing. -- **fileID** The ID of the file being downloaded. -- **filePath** The path to where the downloaded file will be written. -- **fileSize** Total file size of the file that was downloaded. -- **fileSizeCaller** Value for total file size provided by our caller. -- **groupID** ID for the group. -- **isEncrypted** Indicates whether the download is encrypted. -- **isVpn** Indicates whether the device is connected to a Virtual Private Network. -- **jobID** The ID of the Windows Update job. -- **peerID** The ID for this delivery optimization client. -- **predefinedCallerName** Name of the API caller. -- **routeToCacheServer** Cache server setting, source, and value. -- **sessionID** The ID for the file download session. -- **setConfigs** A JSON representation of the configurations that have been set, and their sources. -- **updateID** The ID of the update being downloaded. -- **usedMemoryStream** Indicates whether the download used memory streaming. - - -### Microsoft.OSG.DU.DeliveryOptClient.FailureCdnCommunication - -This event represents a failure to download from a CDN with Delivery Optimization. It's used to understand and address problems regarding downloads. - -The following fields are available: - -- **cdnHeaders** The HTTP headers returned by the CDN. -- **cdnIp** The IP address of the CDN. -- **cdnUrl** The URL of the CDN. -- **errorCode** The error code that was returned. -- **errorCount** The total number of times this error code was seen since the last FailureCdnCommunication event was encountered. -- **experimentId** When running a test, this is used to correlate with other events that are part of the same test. -- **fileID** The ID of the file being downloaded. -- **httpStatusCode** The HTTP status code returned by the CDN. -- **isHeadRequest** The type of HTTP request that was sent to the CDN. Example: HEAD or GET -- **peerType** The type of peer (LAN, Group, Internet, CDN, Cache Host, etc.). -- **requestOffset** The byte offset within the file in the sent request. -- **requestSize** The size of the range requested from the CDN. -- **responseSize** The size of the range response received from the CDN. -- **sessionID** The ID of the download session. - - -### Microsoft.OSG.DU.DeliveryOptClient.JobError - -This event represents a Windows Update job error. It allows for investigation of top errors. - -The following fields are available: - -- **cdnIp** The IP Address of the source CDN (Content Delivery Network). -- **doErrorCode** Error code returned for delivery optimization. -- **errorCode** The error code returned. -- **experimentId** When running a test, this is used to correlate with other events that are part of the same test. -- **fileID** The ID of the file being downloaded. -- **jobID** The Windows Update job ID. - - -## Windows Update events - -### Microsoft.Windows.Update.DeviceUpdateAgent.UpdateAgentAnalysisSummary - -This event collects information regarding the state of devices and drivers on the system following a reboot after the install phase of the new device manifest UUP (Unified Update Platform) update scenario which is used to install a device manifest describing a set of driver packages. - -The following fields are available: - -- **activated** Whether the entire device manifest update is considered activated and in use. -- **analysisErrorCount** The number of driver packages that could not be analyzed because errors occurred during analysis. -- **flightId** Unique ID for each flight. -- **missingDriverCount** The number of driver packages delivered by the device manifest that are missing from the system. -- **missingUpdateCount** The number of updates in the device manifest that are missing from the system. -- **objectId** Unique value for each diagnostics session. -- **publishedCount** The number of drivers packages delivered by the device manifest that are published and available to be used on devices. -- **relatedCV** Correlation vector value generated from the latest USO scan. -- **scenarioId** Indicates the update scenario. -- **sessionId** Unique value for each update session. -- **summary** A summary string that contains basic information about driver packages that are part of the device manifest and any devices on the system that those driver packages match. -- **summaryAppendError** A Boolean indicating if there was an error appending more information to the summary string. -- **truncatedDeviceCount** The number of devices missing from the summary string because there is not enough room in the string. -- **truncatedDriverCount** The number of driver packages missing from the summary string because there is not enough room in the string. -- **unpublishedCount** How many drivers packages that were delivered by the device manifest that are still unpublished and unavailable to be used on devices. -- **updateId** The unique ID for each update. - - -### Microsoft.Windows.Update.DeviceUpdateAgent.UpdateAgentCommit - -This event collects information regarding the final commit phase of the new device manifest UUP (Unified Update Platform) update scenario, which is used to install a device manifest describing a set of driver packages. - -The following fields are available: - -- **errorCode** The error code returned for the current session initialization. -- **flightId** The unique identifier for each flight. -- **objectId** The unique GUID for each diagnostics session. -- **relatedCV** A correlation vector value generated from the latest USO scan. -- **result** Outcome of the initialization of the session. -- **scenarioId** Identifies the Update scenario. -- **sessionId** The unique value for each update session. -- **updateId** The unique identifier for each Update. - - -### Microsoft.Windows.Update.DeviceUpdateAgent.UpdateAgentDownloadRequest - -This event collects information regarding the download request phase of the new device manifest UUP (Unified Update Platform) update scenario, which is used to install a device manifest describing a set of driver packages. - -The following fields are available: - -- **deletedCorruptFiles** Indicates if UpdateAgent found any corrupt payload files and whether the payload was deleted. -- **errorCode** The error code returned for the current session initialization. -- **flightId** The unique identifier for each flight. -- **objectId** Unique value for each Update Agent mode. -- **packageCountOptional** Number of optional packages requested. -- **packageCountRequired** Number of required packages requested. -- **packageCountTotal** Total number of packages needed. -- **packageCountTotalCanonical** Total number of canonical packages. -- **packageCountTotalDiff** Total number of diff packages. -- **packageCountTotalExpress** Total number of express packages. -- **packageSizeCanonical** Size of canonical packages in bytes. -- **packageSizeDiff** Size of diff packages in bytes. -- **packageSizeExpress** Size of express packages in bytes. -- **rangeRequestState** Represents the state of the download range request. -- **relatedCV** Correlation vector value generated from the latest USO scan. -- **result** Result of the download request phase of update. -- **scenarioId** The scenario ID. Example: MobileUpdate, DesktopLanguagePack, DesktopFeatureOnDemand, or DesktopDriverUpdate. -- **sessionId** Unique value for each Update Agent mode attempt. -- **updateId** Unique ID for each update. - - -### Microsoft.Windows.Update.DeviceUpdateAgent.UpdateAgentInitialize - -This event sends data for initializing a new update session for the new device manifest UUP (Unified Update Platform) update scenario, which is used to install a device manifest describing a set of driver packages. - -The following fields are available: - -- **errorCode** The error code returned for the current session initialization. -- **flightId** The unique identifier for each flight. -- **flightMetadata** Contains the FlightId and the build being flighted. -- **objectId** Unique value for each Update Agent mode. -- **relatedCV** Correlation vector value generated from the latest USO scan. -- **result** Result of the initialize phase of the update. 0 = Succeeded, 1 = Failed, 2 = Cancelled, 3 = Blocked, 4 = BlockCancelled. -- **scenarioId** The scenario ID. Example: MobileUpdate, DesktopLanguagePack, DesktopFeatureOnDemand, or DesktopDriverUpdate. -- **sessionData** Contains instructions to update agent for processing FODs and DUICs (Null for other scenarios). -- **sessionId** Unique value for each Update Agent mode attempt. -- **updateId** Unique ID for each update. - - -### Microsoft.Windows.Update.DeviceUpdateAgent.UpdateAgentInstall - -This event collects information regarding the install phase of the new device manifest UUP (Unified Update Platform) update scenario, which is used to install a device manifest describing a set of driver packages. - -The following fields are available: - -- **errorCode** The error code returned for the current install phase. -- **flightId** The unique identifier for each flight (pre-release builds). -- **objectId** The unique identifier for each diagnostics session. -- **relatedCV** Correlation vector value generated from the latest scan. -- **result** Outcome of the install phase of the update. -- **scenarioId** The scenario ID. Example: MobileUpdate, DesktopLanguagePack, DesktopFeatureOnDemand, or DesktopDriverUpdate -- **sessionId** The unique identifier for each update session. -- **updateId** The unique identifier for each Update. - - -### Microsoft.Windows.Update.DeviceUpdateAgent.UpdateAgentModeStart - -This event sends data for the start of each mode during the process of updating device manifest assets via the UUP (Unified Update Platform) update scenario, which is used to install a device manifest describing a set of driver packages. - -The following fields are available: - -- **flightId** The unique identifier for each flight (pre-release builds). -- **mode** Indicates the active Update Agent mode. -- **objectId** Unique value for each diagnostics session. -- **relatedCV** Correlation vector value generated from the latest scan. -- **scenarioId** The scenario ID. Example: MobileUpdate, DesktopLanguagePack, DesktopFeatureOnDemand, or DesktopDriverUpdate. -- **sessionId** The unique identifier for each update session. -- **updateId** The unique identifier for each Update. - - -### Microsoft.Windows.Update.NotificationUx.DialogNotificationToBeDisplayed - -This event indicates that a notification dialog box is about to be displayed to user. - -The following fields are available: - -- **AcceptAutoModeLimit** The maximum number of days for a device to automatically enter Auto Reboot mode. -- **AutoToAutoFailedLimit** The maximum number of days for Auto Reboot mode to fail before the RebootFailed dialog box is shown. -- **DaysSinceRebootRequired** Number of days since restart was required. -- **DeviceLocalTime** The local time on the device sending the event. -- **EngagedModeLimit** The number of days to switch between DTE dialog boxes. -- **EnterAutoModeLimit** The maximum number of days for a device to enter Auto Reboot mode. -- **ETag** OneSettings versioning value. -- **IsForcedEnabled** Indicates whether Forced Reboot mode is enabled for this device. -- **IsUltimateForcedEnabled** Indicates whether Ultimate Forced Reboot mode is enabled for this device. -- **NotificationUxState** Indicates which dialog box is shown. -- **NotificationUxStateString** Indicates which dialog box is shown. -- **RebootUxState** Indicates the state of the restart (Engaged, Auto, Forced, or UltimateForced). -- **RebootUxStateString** Indicates the state of the restart (Engaged, Auto, Forced, or UltimateForced). -- **RebootVersion** Version of DTE. -- **SkipToAutoModeLimit** The minimum length of time to pass in restart pending before a device can be put into auto mode. -- **UpdateId** The ID of the update that is pending restart to finish installation. -- **UpdateRevision** The revision of the update that is pending restart to finish installation. -- **UtcTime** The time the dialog box notification will be displayed, in Coordinated Universal Time. - - -### Microsoft.Windows.Update.NotificationUx.EnhancedEngagedRebootAcceptAutoDialog - -This event indicates that the Enhanced Engaged restart "accept automatically" dialog box was displayed. - -The following fields are available: - -- **DeviceLocalTime** The local time on the device sending the event. -- **ETag** OneSettings versioning value. -- **ExitCode** Indicates how users exited the dialog box. -- **RebootVersion** Version of DTE. -- **UpdateId** The ID of the update that is pending restart to finish installation. -- **UpdateRevision** The revision of the update that is pending restart to finish installation. -- **UserResponseString** The option that user chose on this dialog box. -- **UtcTime** The time that the dialog box was displayed, in Coordinated Universal Time. - - -### Microsoft.Windows.Update.NotificationUx.EnhancedEngagedRebootFirstReminderDialog - -This event indicates that the Enhanced Engaged restart "first reminder" dialog box was displayed.. - -The following fields are available: - -- **DeviceLocalTime** The local time on the device sending the event. -- **ETag** OneSettings versioning value. -- **ExitCode** Indicates how users exited the dialog box. -- **RebootVersion** Version of DTE. -- **UpdateId** The ID of the update that is pending restart to finish installation. -- **UpdateRevision** The revision of the update that is pending restart to finish installation. -- **UserResponseString** The option that user chose in this dialog box. -- **UtcTime** The time that the dialog box was displayed, in Coordinated Universal Time. - - -### Microsoft.Windows.Update.NotificationUx.EnhancedEngagedRebootRebootFailedDialog - -This event indicates that the Enhanced Engaged restart "restart failed" dialog box was displayed. - -The following fields are available: - -- **DeviceLocalTime** The local time of the device sending the event. -- **ETag** OneSettings versioning value. -- **ExitCode** Indicates how users exited the dialog box. -- **RebootVersion** Version of DTE. -- **UpdateId** The ID of the update that is pending restart to finish installation. -- **UpdateRevision** The revision of the update that is pending restart to finish installation. -- **UserResponseString** The option that the user chose in this dialog box. -- **UtcTime** The time that the dialog box was displayed, in Coordinated Universal Time. - - -### Microsoft.Windows.Update.NotificationUx.EnhancedEngagedRebootRebootImminentDialog - -This event indicates that the Enhanced Engaged restart "restart imminent" dialog box was displayed. - -The following fields are available: - -- **DeviceLocalTime** Time the dialog box was shown on the local device. -- **ETag** OneSettings versioning value. -- **ExitCode** Indicates how users exited the dialog box. -- **RebootVersion** Version of DTE. -- **UpdateId** The ID of the update that is pending restart to finish installation. -- **UpdateRevision** The revision of the update that is pending restart to finish installation. -- **UserResponseString** The option that user chose in this dialog box. -- **UtcTime** The time that dialog box was displayed, in Coordinated Universal Time. - - -### Microsoft.Windows.Update.NotificationUx.EnhancedEngagedRebootReminderDialog - -This event returns information relating to the Enhanced Engaged reboot reminder dialog that was displayed. - -The following fields are available: - -- **DeviceLocalTime** The time at which the reboot reminder dialog was shown (based on the local device time settings). -- **ETag** The OneSettings versioning value. -- **ExitCode** Indicates how users exited the reboot reminder dialog box. -- **RebootVersion** The version of the DTE (Direct-to-Engaged). -- **UpdateId** The ID of the update that is waiting for reboot to finish installation. -- **UpdateRevision** The revision of the update that is waiting for reboot to finish installation. -- **UserResponseString** The option chosen by the user on the reboot dialog box. -- **UtcTime** The time at which the reboot reminder dialog was shown (in UTC). - - -### Microsoft.Windows.Update.NotificationUx.EnhancedEngagedRebootReminderToast - -This event indicates that the Enhanced Engaged restart reminder pop-up banner was displayed. - -The following fields are available: - -- **DeviceLocalTime** The local time on the device sending the event. -- **ETag** OneSettings versioning value. -- **ExitCode** Indicates how users exited the pop-up banner. -- **RebootVersion** The version of the reboot logic. -- **UpdateId** The ID of the update that is pending restart to finish installation. -- **UpdateRevision** The revision of the update that is pending restart to finish installation. -- **UserResponseString** The option that the user chose in the pop-up banner. -- **UtcTime** The time that the pop-up banner was displayed, in Coordinated Universal Time. - - -### Microsoft.Windows.Update.NotificationUx.RebootScheduled - -Indicates when a reboot is scheduled by the system or a user for a security, quality, or feature update. - -The following fields are available: - -- **activeHoursApplicable** Indicates whether an Active Hours policy is present on the device. -- **IsEnhancedEngagedReboot** Indicates whether this is an Enhanced Engaged reboot. -- **rebootArgument** Argument for the reboot task. It also represents specific reboot related action. -- **rebootOutsideOfActiveHours** Indicates whether a restart is scheduled outside of active hours. -- **rebootScheduledByUser** Indicates whether the restart was scheduled by user (if not, it was scheduled automatically). -- **rebootState** The current state of the restart. -- **rebootUsingSmartScheduler** Indicates whether the reboot is scheduled by smart scheduler. -- **revisionNumber** Revision number of the update that is getting installed with this restart. -- **scheduledRebootTime** Time of the scheduled restart. -- **scheduledRebootTimeInUTC** Time of the scheduled restart in Coordinated Universal Time. -- **updateId** ID of the update that is getting installed with this restart. -- **wuDeviceid** Unique device ID used by Windows Update. - - -### Microsoft.Windows.Update.Orchestrator.ActivityRestrictedByActiveHoursPolicy - -This event indicates a policy is present that may restrict update activity to outside of active hours. - -The following fields are available: - -- **activeHoursEnd** The end of the active hours window. -- **activeHoursStart** The start of the active hours window. -- **wuDeviceid** Unique device ID used by Windows Update. - - -### Microsoft.Windows.Update.Orchestrator.BlockedByActiveHours - -This event indicates that update activity was blocked because it is within the active hours window. - -The following fields are available: - -- **activeHoursEnd** The end of the active hours window. -- **activeHoursStart** The start of the active hours window. -- **updatePhase** The current state of the update process. -- **wuDeviceid** Unique device ID used by Windows Update. - - -### Microsoft.Windows.Update.Orchestrator.BlockedByBatteryLevel - -This event indicates that Windows Update activity was blocked due to low battery level. - -The following fields are available: - -- **batteryLevel** The current battery charge capacity. -- **batteryLevelThreshold** The battery capacity threshold to stop update activity. -- **updatePhase** The current state of the update process. -- **wuDeviceid** Device ID. - - -### Microsoft.Windows.Update.Orchestrator.DeferRestart - -This event indicates that a restart required for installing updates was postponed. - -The following fields are available: - -- **displayNeededReason** List of reasons for needing display. -- **eventScenario** Indicates the purpose of the event (scan started, succeeded, failed, etc.). -- **filteredDeferReason** Applicable filtered reasons why reboot was postponed (such as user active, or low battery). -- **gameModeReason** Name of the executable that caused the game mode state check to start. -- **ignoredReason** List of reasons that were intentionally ignored. -- **IgnoreReasonsForRestart** List of reasons why restart was deferred. -- **revisionNumber** Update ID revision number. -- **systemNeededReason** List of reasons why system is needed. -- **updateId** Update ID. -- **updateScenarioType** Update session type. -- **wuDeviceid** Unique device ID used by Windows Update. - - -### Microsoft.Windows.Update.Orchestrator.Detection - -This event indicates that a scan for a Windows Update occurred. - -The following fields are available: - -- **deferReason** The reason why the device could not check for updates. -- **detectionBlockingPolicy** The Policy that blocked detection. -- **detectionBlockreason** The reason detection did not complete. -- **detectionRetryMode** Indicates whether we will try to scan again. -- **errorCode** The error code returned for the current process. -- **eventScenario** End-to-end update session ID, or indicates the purpose of sending this event - whether because the software distribution just started installing content, or whether it was cancelled, succeeded, or failed. -- **flightID** The unique identifier for the flight (Windows Insider pre-release build) should be delivered to the device, if applicable. -- **interactive** Indicates whether the user initiated the session. -- **networkStatus** Indicates if the device is connected to the internet. -- **revisionNumber** The Update revision number. -- **scanTriggerSource** The source of the triggered scan. -- **updateId** The unique identifier of the Update. -- **updateScenarioType** Identifies the type of update session being performed. -- **wuDeviceid** The unique device ID used by Windows Update. - - -### Microsoft.Windows.Update.Orchestrator.DisplayNeeded - -This event indicates the reboot was postponed due to needing a display. - -The following fields are available: - -- **displayNeededReason** Reason the display is needed. -- **eventScenario** Indicates the purpose of sending this event - whether because the software distribution just started checking for content, or whether it was cancelled, succeeded, or failed. -- **rebootOutsideOfActiveHours** Indicates whether the reboot was to occur outside of active hours. -- **revisionNumber** Revision number of the update. -- **updateId** Update ID. -- **updateScenarioType** The update session type. -- **uxRebootstate** Indicates the exact state of the user experience at the time the required reboot was initiated. -- **wuDeviceid** The unique identifier of a specific device, used to identify how many devices are encountering success or a particular issue - - -### Microsoft.Windows.Update.Orchestrator.Download - -This event sends launch data for a Windows Update download to help keep Windows up to date. - -The following fields are available: - -- **deferReason** Reason for download not completing. -- **errorCode** An error code represented as a hexadecimal value. -- **eventScenario** End-to-end update session ID. -- **flightID** The specific ID of the Windows Insider build the device is getting. -- **interactive** Indicates whether the session is user initiated. -- **revisionNumber** Update revision number. -- **updateId** Update ID. -- **updateScenarioType** The update session type. -- **wuDeviceid** Unique device ID used by Windows Update. - - -### Microsoft.Windows.Update.Orchestrator.DTUCompletedWhenWuFlightPendingCommit - -This event indicates that DTU completed installation of the electronic software delivery (ESD), when Windows Update was already in Pending Commit phase of the feature update. - -The following fields are available: - -- **wuDeviceid** Device ID used by Windows Update. - - -### Microsoft.Windows.Update.Orchestrator.DTUEnabled - -This event indicates that Inbox DTU functionality was enabled. - -The following fields are available: - -- **wuDeviceid** Device ID used by Windows Update. - - -### Microsoft.Windows.Update.Orchestrator.DTUInitiated - -This event indicates that Inbox DTU functionality was intiated. - -The following fields are available: - -- **dtuErrorCode** Return code from creating the DTU Com Server. -- **isDtuApplicable** Determination of whether DTU is applicable to the machine it is running on. -- **wuDeviceid** Device ID used by Windows Update. - - -### Microsoft.Windows.Update.Orchestrator.EscalationRiskLevels - -This event is sent during update scan, download, or install, and indicates that the device is at risk of being out-of-date. - -The following fields are available: - -- **configVersion** The escalation configuration version on the device. -- **downloadElapsedTime** Indicates how long since the download is required on device. -- **downloadRiskLevel** At-risk level of download phase. -- **installElapsedTime** Indicates how long since the install is required on device. -- **installRiskLevel** The at-risk level of install phase. -- **isSediment** Assessment of whether is device is at risk. -- **scanElapsedTime** Indicates how long since the scan is required on device. -- **scanRiskLevel** At-risk level of the scan phase. -- **wuDeviceid** Device ID used by Windows Update. - - -### Microsoft.Windows.Update.Orchestrator.FailedToAddTimeTriggerToScanTask - -This event indicated that USO failed to add a trigger time to a task. - -The following fields are available: - -- **errorCode** The Windows Update error code. -- **wuDeviceid** The Windows Update device ID. - - -### Microsoft.Windows.Update.Orchestrator.FlightInapplicable - -This event indicates that the update is no longer applicable to this device. - -The following fields are available: - -- **EventPublishedTime** Time when this event was generated. -- **flightID** The specific ID of the Windows Insider build. -- **inapplicableReason** The reason why the update is inapplicable. -- **revisionNumber** Update revision number. -- **updateId** Unique Windows Update ID. -- **updateScenarioType** Update session type. -- **UpdateStatus** Last status of update. -- **UUPFallBackConfigured** Indicates whether UUP fallback is configured. -- **wuDeviceid** Unique Device ID. - - -### Microsoft.Windows.Update.Orchestrator.InitiatingReboot - -This event sends data about an Orchestrator requesting a reboot from power management to help keep Windows up to date. - -The following fields are available: - -- **EventPublishedTime** Time of the event. -- **flightID** Unique update ID -- **interactive** Indicates whether the reboot initiation stage of the update process was entered as a result of user action. -- **rebootOutsideOfActiveHours** Indicates whether the reboot was to occur outside of active hours. -- **revisionNumber** Revision number of the update. -- **updateId** Update ID. -- **updateScenarioType** The update session type. -- **uxRebootstate** Indicates the exact state of the user experience at the time the required reboot was initiated. -- **wuDeviceid** Unique device ID used by Windows Update. - - -### Microsoft.Windows.Update.Orchestrator.Install - -This event sends launch data for a Windows Update install to help keep Windows up to date. - -The following fields are available: - -- **batteryLevel** Current battery capacity in mWh or percentage left. -- **deferReason** Reason for install not completing. -- **errorCode** The error code reppresented by a hexadecimal value. -- **eventScenario** End-to-end update session ID. -- **flightID** The ID of the Windows Insider build the device is getting. -- **flightUpdate** Indicates whether the update is a Windows Insider build. -- **ForcedRebootReminderSet** A boolean value that indicates if a forced reboot will happen for updates. -- **IgnoreReasonsForRestart** The reason(s) a Postpone Restart command was ignored. -- **installCommitfailedtime** The time it took for a reboot to happen but the upgrade failed to progress. -- **installRebootinitiatetime** The time it took for a reboot to be attempted. -- **interactive** Identifies if session is user initiated. -- **minutesToCommit** The time it took to install updates. -- **rebootOutsideOfActiveHours** Indicates whether a reboot is scheduled outside of active hours. -- **revisionNumber** Update revision number. -- **updateId** Update ID. -- **updateScenarioType** The update session type. -- **uxRebootstate** Indicates the exact state of the user experience at the time the required reboot was initiated to ensure the correct update process and experience is provided to keep Windows up to date. -- **wuDeviceid** Unique device ID used by Windows Update. - - -### Microsoft.Windows.Update.Orchestrator.LowUptimes - -This event is sent if a device is identified as not having sufficient uptime to reliably process updates in order to keep secure. - -The following fields are available: - -- **availableHistoryMinutes** The number of minutes available from the local machine activity history. -- **isLowUptimeMachine** Is the machine considered low uptime or not. -- **lowUptimeMinHours** Current setting for the minimum number of hours needed to not be considered low uptime. -- **lowUptimeQueryDays** Current setting for the number of recent days to check for uptime. -- **uptimeMinutes** Number of minutes of uptime measured. -- **wuDeviceid** Unique device ID for Windows Update. - - -### Microsoft.Windows.Update.Orchestrator.OneshotUpdateDetection - -This event returns data about scans initiated through settings UI, or background scans that are urgent; to help keep Windows up to date. - -The following fields are available: - -- **externalOneshotupdate** The last time a task-triggered scan was completed. -- **interactiveOneshotupdate** The last time an interactive scan was completed. -- **oldlastscanOneshotupdate** The last time a scan completed successfully. -- **wuDeviceid** The Windows Update Device GUID (Globally-Unique ID). - - -### Microsoft.Windows.Update.Orchestrator.PreShutdownStart - -This event is generated before the shutdown and commit operations. - -The following fields are available: - -- **wuDeviceid** The unique identifier of a specific device, used to identify how many devices are encountering success or a particular issue. - - -### Microsoft.Windows.Update.Orchestrator.RebootFailed - -This event sends information about whether an update required a reboot and reasons for failure, to help keep Windows up to date. - -The following fields are available: - -- **batteryLevel** Current battery capacity in mWh or percentage left. -- **deferReason** Reason for install not completing. -- **EventPublishedTime** The time that the reboot failure occurred. -- **flightID** Unique update ID. -- **rebootOutsideOfActiveHours** Indicates whether a reboot was scheduled outside of active hours. -- **RebootResults** Hex code indicating failure reason. Typically, we expect this to be a specific USO generated hex code. -- **revisionNumber** Update revision number. -- **updateId** Update ID. -- **updateScenarioType** The update session type. -- **uxRebootstate** Indicates the exact state of the user experience at the time the required reboot was initiated to ensure the correct update process and experience is provided to keep Windows up to date. -- **wuDeviceid** Unique device ID used by Windows Update. - - -### Microsoft.Windows.Update.Orchestrator.RefreshSettings - -This event sends basic data about the version of upgrade settings applied to the system to help keep Windows up to date. - -The following fields are available: - -- **errorCode** Hex code for the error message, to allow lookup of the specific error. -- **settingsDownloadTime** Timestamp of the last attempt to acquire settings. -- **settingsETag** Version identifier for the settings. -- **wuDeviceid** Unique device ID used by Windows Update. - - -### Microsoft.Windows.Update.Orchestrator.RestoreRebootTask - -This event sends data indicating that a reboot task is missing unexpectedly on a device and the task is restored because a reboot is still required, to help keep Windows up to date. - -The following fields are available: - -- **RebootTaskMissedTimeUTC** The time when the reboot task was scheduled to run, but did not. -- **RebootTaskNextTimeUTC** The time when the reboot task was rescheduled for. -- **RebootTaskRestoredTime** Time at which this reboot task was restored. -- **wuDeviceid** Device ID for the device on which the reboot is restored. - - -### Microsoft.Windows.Update.Orchestrator.ScanTriggered - -This event indicates that Update Orchestrator has started a scan operation. - -The following fields are available: - -- **errorCode** The error code returned for the current scan operation. -- **eventScenario** Indicates the purpose of sending this event. -- **interactive** Indicates whether the scan is interactive. -- **isDTUEnabled** Indicates whether DTU (internal abbreviation for Direct Feature Update) channel is enabled on the client system. -- **isScanPastSla** Indicates whether the SLA has elapsed for scanning. -- **isScanPastTriggerSla** Indicates whether the SLA has elapsed for triggering a scan. -- **minutesOverScanSla** Indicates how many minutes the scan exceeded the scan SLA. -- **minutesOverScanTriggerSla** Indicates how many minutes the scan exceeded the scan trigger SLA. -- **scanTriggerSource** Indicates what caused the scan. -- **updateScenarioType** The update session type. -- **wuDeviceid** Unique device ID used by Windows Update. - - -### Microsoft.Windows.Update.Orchestrator.StickUpdate - -This event is sent when the update service orchestrator (USO) indicates the update cannot be superseded by a newer update. - -The following fields are available: - -- **updateId** Identifier associated with the specific piece of content. -- **wuDeviceid** Unique device ID controlled by the software distribution client. - - -### Microsoft.Windows.Update.Orchestrator.SystemNeeded - -This event sends data about why a device is unable to reboot, to help keep Windows up to date. - -The following fields are available: - -- **eventScenario** End-to-end update session ID. -- **rebootOutsideOfActiveHours** Indicates whether a reboot is scheduled outside of active hours. -- **revisionNumber** Update revision number. -- **systemNeededReason** List of apps or tasks that are preventing the system from restarting. -- **updateId** Update ID. -- **updateScenarioType** The update session type. -- **uxRebootstate** Indicates the exact state of the user experience at the time the required reboot was initiated to ensure the correct update process and experience is provided to keep Windows up to date. -- **wuDeviceid** Unique device ID used by Windows Update. - - -### Microsoft.Windows.Update.Orchestrator.TerminatedByActiveHours - -This event indicates that update activity was stopped due to active hours starting. - -The following fields are available: - -- **activeHoursEnd** The end of the active hours window. -- **activeHoursStart** The start of the active hours window. -- **updatePhase** The current state of the update process. -- **wuDeviceid** The device identifier. - - -### Microsoft.Windows.Update.Orchestrator.TerminatedByBatteryLevel - -This event is sent when update activity was stopped due to a low battery level. - -The following fields are available: - -- **batteryLevel** The current battery charge capacity. -- **batteryLevelThreshold** The battery capacity threshold to stop update activity. -- **updatePhase** The current state of the update process. -- **wuDeviceid** The device identifier. - - -### Microsoft.Windows.Update.Orchestrator.UnstickUpdate - -This event is sent when the update service orchestrator (USO) indicates that the update can be superseded by a newer update. - -The following fields are available: - -- **updateId** Identifier associated with the specific piece of content. -- **wuDeviceid** Unique device ID controlled by the software distribution client. - - -### Microsoft.Windows.Update.Orchestrator.UpdatePolicyCacheRefresh - -This event sends data on whether Update Management Policies were enabled on a device, to help keep Windows up to date. - -The following fields are available: - -- **configuredPoliciescount** Number of policies on the device. -- **policiesNamevaluesource** Policy name and source of policy (group policy, MDM or flight). -- **policyCacherefreshtime** Time when policy cache was refreshed. -- **updateInstalluxsetting** Indicates whether a user has set policies via a user experience option. -- **wuDeviceid** Unique device ID used by Windows Update. - - -### Microsoft.Windows.Update.Orchestrator.UpdateRebootRequired - -This event sends data about whether an update required a reboot to help keep Windows up to date. - -The following fields are available: - -- **flightID** The specific ID of the Windows Insider build the device is getting. -- **interactive** Indicates whether the reboot initiation stage of the update process was entered as a result of user action. -- **revisionNumber** Update revision number. -- **updateId** Update ID. -- **updateScenarioType** The update session type. -- **uxRebootstate** Indicates the exact state of the user experience at the time the required reboot was initiated to ensure the correct update process and experience is provided to keep Windows up to date. -- **wuDeviceid** Unique device ID used by Windows Update. - - -### Microsoft.Windows.Update.Orchestrator.updateSettingsFlushFailed - -This event sends information about an update that encountered problems and was not able to complete. - -The following fields are available: - -- **errorCode** The error code encountered. -- **wuDeviceid** The ID of the device in which the error occurred. - - -### Microsoft.Windows.Update.Orchestrator.UsoSession - -This event represents the state of the USO service at start and completion. - -The following fields are available: - -- **activeSessionid** A unique session GUID. -- **eventScenario** The state of the update action. -- **interactive** Is the USO session interactive? -- **lastErrorcode** The last error that was encountered. -- **lastErrorstate** The state of the update when the last error was encountered. -- **sessionType** A GUID that refers to the update session type. -- **updateScenarioType** A descriptive update session type. -- **wuDeviceid** The Windows Update device GUID. - - -### Microsoft.Windows.Update.Ux.MusNotification.EnhancedEngagedRebootUxState - -This event sends information about the configuration of Enhanced Direct-to-Engaged (eDTE), which includes values for the timing of how eDTE will progress through each phase of the reboot. - -The following fields are available: - -- **AcceptAutoModeLimit** The maximum number of days for a device to automatically enter Auto Reboot mode. -- **AutoToAutoFailedLimit** The maximum number of days for Auto Reboot mode to fail before a Reboot Failed dialog will be shown. -- **DeviceLocalTime** The date and time (based on the device date/time settings) the reboot mode changed. -- **EngagedModeLimit** The number of days to switch between DTE (Direct-to-Engaged) dialogs. -- **EnterAutoModeLimit** The maximum number of days a device can enter Auto Reboot mode. -- **ETag** The Entity Tag that represents the OneSettings version. -- **IsForcedEnabled** Identifies whether Forced Reboot mode is enabled for the device. -- **IsUltimateForcedEnabled** Identifies whether Ultimate Forced Reboot mode is enabled for the device. -- **OldestUpdateLocalTime** The date and time (based on the device date/time settings) this update’s reboot began pending. -- **RebootUxState** Identifies the reboot state: Engaged, Auto, Forced, UltimateForced. -- **RebootVersion** The version of the DTE (Direct-to-Engaged). -- **SkipToAutoModeLimit** The maximum number of days to switch to start while in Auto Reboot mode. -- **UpdateId** The ID of the update that is waiting for reboot to finish installation. -- **UpdateRevision** The revision of the update that is waiting for reboot to finish installation. - - -### Microsoft.Windows.Update.Ux.MusNotification.RebootNoLongerNeeded - -This event is sent when a security update has successfully completed. - -The following fields are available: - -- **UtcTime** The Coordinated Universal Time that the restart was no longer needed. - - -### Microsoft.Windows.Update.Ux.MusNotification.RebootScheduled - -This event sends basic information about scheduling an update-related reboot, to get security updates and to help keep Windows up-to-date. - -The following fields are available: - -- **activeHoursApplicable** Indicates whether Active Hours applies on this device. -- **IsEnhancedEngagedReboot** Indicates whether Enhanced reboot was enabled. -- **rebootArgument** Argument for the reboot task. It also represents specific reboot related action. -- **rebootOutsideOfActiveHours** True, if a reboot is scheduled outside of active hours. False, otherwise. -- **rebootScheduledByUser** True, if a reboot is scheduled by user. False, if a reboot is scheduled automatically. -- **rebootState** Current state of the reboot. -- **rebootUsingSmartScheduler** Indicates that the reboot is scheduled by SmartScheduler. -- **revisionNumber** Revision number of the OS. -- **scheduledRebootTime** Time scheduled for the reboot. -- **scheduledRebootTimeInUTC** Time scheduled for the reboot, in UTC. -- **updateId** Identifies which update is being scheduled. -- **wuDeviceid** The unique device ID used by Windows Update. - - -### Microsoft.Windows.Update.Ux.MusNotification.UxBrokerScheduledTask - -This event is sent when MUSE broker schedules a task. - -The following fields are available: - -- **TaskArgument** The arguments with which the task is scheduled. -- **TaskName** Name of the task. - - -### Microsoft.Windows.Update.Ux.MusUpdateSettings.RebootScheduled - -This event sends basic information for scheduling a device restart to install security updates. It's used to help keep Windows up to date. - -The following fields are available: - -- **activeHoursApplicable** Is the restart respecting Active Hours? -- **IsEnhancedEngagedReboot** TRUE if the reboot path is Enhanced Engaged. Otherwise, FALSE. -- **rebootArgument** The arguments that are passed to the OS for the restarted. -- **rebootOutsideOfActiveHours** Was the restart scheduled outside of Active Hours? -- **rebootScheduledByUser** Was the restart scheduled by the user? If the value is false, the restart was scheduled by the device. -- **rebootState** The state of the restart. -- **rebootUsingSmartScheduler** TRUE if the reboot should be performed by the Smart Scheduler. Otherwise, FALSE. -- **revisionNumber** The revision number of the OS being updated. -- **scheduledRebootTime** Time of the scheduled reboot -- **scheduledRebootTimeInUTC** Time of the scheduled restart, in Coordinated Universal Time. -- **updateId** The Windows Update device GUID. -- **wuDeviceid** The Windows Update device GUID. - - -## Windows Update mitigation events - -### Mitigation360Telemetry.MitigationCustom.CleanupSafeOsImages - -This event sends data specific to the CleanupSafeOsImages mitigation used for OS Updates. - -The following fields are available: - -- **ClientId** The client ID used by Windows Update. -- **FlightId** The ID of each Windows Insider build the device received. -- **InstanceId** A unique device ID that identifies each update instance. -- **MitigationScenario** The update scenario in which the mitigation was executed. -- **MountedImageCount** The number of mounted images. -- **MountedImageMatches** The number of mounted image matches. -- **MountedImagesFailed** The number of mounted images that could not be removed. -- **MountedImagesRemoved** The number of mounted images that were successfully removed. -- **MountedImagesSkipped** The number of mounted images that were not found. -- **RelatedCV** The correlation vector value generated from the latest USO scan. -- **Result** HResult of this operation. -- **ScenarioId** ID indicating the mitigation scenario. -- **ScenarioSupported** Indicates whether the scenario was supported. -- **SessionId** Unique value for each update attempt. -- **UpdateId** Unique ID for each Windows Update. -- **WuId** Unique ID for the Windows Update client. - - -### Mitigation360Telemetry.MitigationCustom.FixAppXReparsePoints - -This event sends data specific to the FixAppXReparsePoints mitigation used for OS updates. - -The following fields are available: - -- **ClientId** Unique identifier for each flight. -- **FlightId** Unique GUID that identifies each instances of setuphost.exe. -- **InstanceId** The update scenario in which the mitigation was executed. -- **MitigationScenario** Correlation vector value generated from the latest USO scan. -- **RelatedCV** Number of reparse points that are corrupted but we failed to fix them. -- **ReparsePointsFailed** Number of reparse points that were corrupted and were fixed by this mitigation. -- **ReparsePointsFixed** Number of reparse points that are not corrupted and no action is required. -- **ReparsePointsSkipped** HResult of this operation. -- **Result** ID indicating the mitigation scenario. -- **ScenarioId** Indicates whether the scenario was supported. -- **ScenarioSupported** Unique value for each update attempt. -- **SessionId** Unique ID for each Update. -- **UpdateId** Unique ID for the Windows Update client. -- **WuId** Unique ID for the Windows Update client. - - -### Mitigation360Telemetry.MitigationCustom.FixupEditionId - -This event sends data specific to the FixupEditionId mitigation used for OS updates. - -The following fields are available: - -- **ClientId** In the WU scenario, this will be the WU client ID that is passed to Setup. In Media setup, default value is Media360, but can be overwritten by the caller to a unique value. -- **EditionIdUpdated** Determine whether EditionId was changed. -- **FlightId** Unique identifier for each flight. -- **InstanceId** Unique GUID that identifies each instances of setuphost.exe. -- **MitigationScenario** The update scenario in which the mitigation was executed. -- **ProductEditionId** Expected EditionId value based on GetProductInfo. -- **ProductType** Value returned by GetProductInfo. -- **RegistryEditionId** EditionId value in the registry. -- **RelatedCV** Correlation vector value generated from the latest USO scan. -- **Result** HResult of this operation. -- **ScenarioId** ID indicating the mitigation scenario. -- **ScenarioSupported** Indicates whether the scenario was supported. -- **SessionId** Unique value for each update attempt. -- **UpdateId** Unique ID for each update. -- **WuId** Unique ID for the Windows Update client. - - -## Windows Update Reserve Manager events - -### Microsoft.Windows.UpdateReserveManager.CommitPendingHardReserveAdjustment - -This event is sent when the Update Reserve Manager commits a hard reserve adjustment that was pending. - -The following fields are available: - -- **FinalAdjustment** Final adjustment for the hard reserve following the addition or removal of optional content. -- **InitialAdjustment** Initial intended adjustment for the hard reserve following the addition/removal of optional content. - - -### Microsoft.Windows.UpdateReserveManager.FunctionReturnedError - -This event is sent when the Update Reserve Manager returns an error from one of its internal functions. - -The following fields are available: - -- **FailedExpression** The failed expression that was returned. -- **FailedFile** The binary file that contained the failed function. -- **FailedFunction** The name of the function that originated the failure. -- **FailedLine** The line number of the failure. -- **ReturnCode** The return code of the function. - - -### Microsoft.Windows.UpdateReserveManager.PrepareTIForReserveInitialization - -This event is sent when the Update Reserve Manager prepares the Trusted Installer to initialize reserves on the next boot. - -The following fields are available: - -- **Flags** The flags that are passed to the function to prepare the Trusted Installer for reserve initialization. - - -### Microsoft.Windows.UpdateReserveManager.RemovePendingHardReserveAdjustment - -This event is sent when the Update Reserve Manager removes a pending hard reserve adjustment. - - - -### Microsoft.Windows.UpdateReserveManager.UpdatePendingHardReserveAdjustment - -This event is sent when the Update Reserve Manager needs to adjust the size of the hard reserve after the option content is installed. - -The following fields are available: - -- **ChangeSize** The change in the hard reserve size based on the addition or removal of optional content. -- **PendingHardReserveAdjustment** The final change to the hard reserve size. -- **UpdateType** Indicates whether the change is an increase or decrease in the size of the hard reserve. - - -## Winlogon events - -### Microsoft.Windows.Security.Winlogon.SetupCompleteLogon - -This event signals the completion of the setup process. It happens only once during the first logon. - - - -## XBOX events - -### Microsoft.Xbox.XamTelemetry.AppActivationError - -This event indicates whether the system detected an activation error in the app. - -The following fields are available: - -- **ActivationUri** Activation URI (Uniform Resource Identifier) used in the attempt to activate the app. -- **AppId** The Xbox LIVE Title ID. -- **AppUserModelId** The AUMID (Application User Model ID) of the app to activate. -- **Result** The HResult error. -- **UserId** The Xbox LIVE User ID (XUID). - - -### Microsoft.Xbox.XamTelemetry.AppActivity - -This event is triggered whenever the current app state is changed by: launch, switch, terminate, snap, etc. - -The following fields are available: - -- **AppActionId** The ID of the application action. -- **AppCurrentVisibilityState** The ID of the current application visibility state. -- **AppId** The Xbox LIVE Title ID of the app. -- **AppPackageFullName** The full name of the application package. -- **AppPreviousVisibilityState** The ID of the previous application visibility state. -- **AppSessionId** The application session ID. -- **AppType** The type ID of the application (AppType_NotKnown, AppType_Era, AppType_Sra, AppType_Uwa). -- **BCACode** The BCA (Burst Cutting Area) mark code of the optical disc used to launch the application. -- **DurationMs** The amount of time (in milliseconds) since the last application state transition. -- **IsTrialLicense** This boolean value is TRUE if the application is on a trial license. -- **LicenseType** The type of licensed used to authorize the app (0 - Unknown, 1 - User, 2 - Subscription, 3 - Offline, 4 - Disc). -- **LicenseXuid** If the license type is 1 (User), this field contains the XUID (Xbox User ID) of the registered owner of the license. -- **ProductGuid** The Xbox product GUID (Globally-Unique ID) of the application. -- **UserId** The XUID (Xbox User ID) of the current user. - - - +--- +description: Use this article to learn more about what Windows diagnostic data is gathered at the basic level. +title: Windows 10, version 1809 basic diagnostic events and fields (Windows 10) +keywords: privacy, telemetry +ms.prod: w10 +ms.mktglfcycl: manage +ms.sitesec: library +ms.pagetype: security +localizationpriority: high +author: brianlic-msft +ms.author: brianlic +manager: dansimp +ms.collection: M365-security-compliance +ms.topic: article +audience: ITPro +ms.date: 03/12/2019 +--- + + +# Windows 10, version 1809 basic level Windows diagnostic events and fields + + **Applies to** + +- Windows 10, version 1809 + + +The Basic level gathers a limited set of information that is critical for understanding the device and its configuration including: basic device information, quality-related information, app compatibility, and Microsoft Store. When the level is set to Basic, it also includes the Security level information. + +The Basic level helps to identify problems that can occur on a particular device hardware or software configuration. For example, it can help determine if crashes are more frequent on devices with a specific amount of memory or that are running a particular driver version. This helps Microsoft fix operating system or app problems. + +Use this article to learn about diagnostic events, grouped by event area, and the fields within each event. A brief description is provided for each field. Every event generated includes common data, which collects device data. + +You can learn more about Windows functional and diagnostic data through these articles: + + +- [Windows 10, version 1803 basic diagnostic events and fields](basic-level-windows-diagnostic-events-and-fields-1803.md) +- [Windows 10, version 1709 basic diagnostic events and fields](basic-level-windows-diagnostic-events-and-fields-1709.md) +- [Windows 10, version 1703 basic diagnostic events and fields](basic-level-windows-diagnostic-events-and-fields-1703.md) +- [Manage connections from Windows operating system components to Microsoft services](manage-connections-from-windows-operating-system-components-to-microsoft-services.md) +- [Configure Windows diagnostic data in your organization](configure-windows-diagnostic-data-in-your-organization.md) + + + + +## Account trace logging provider events + +### Microsoft.Windows.Mitigation.AccountTraceLoggingProvider.General + +This event provides information about application properties to indicate the successful execution. + +The following fields are available: + +- **AppMode** Indicates the mode the app is being currently run around privileges. +- **ExitCode** Indicates the exit code of the app. +- **Help** Indicates if the app needs to be launched in the help mode. +- **ParseError** Indicates if there was a parse error during the execution. +- **RightsAcquired** Indicates if the right privileges were acquired for successful execution. +- **RightsWereEnabled** Indicates if the right privileges were enabled for successful execution. +- **TestMode** Indicates whether the app is being run in test mode. + + +### Microsoft.Windows.Mitigation.AccountTraceLoggingProvider.GetCount + +This event provides information about the properties of user accounts in the Administrator group. + +The following fields are available: + +- **Internal** Indicates the internal property associated with the count group. +- **LastError** The error code (if applicable) for the cause of the failure to get the count of the user account. +- **Result** The HResult error. + + +## AppLocker events + +### Microsoft.Windows.Security.AppLockerCSP.ActivityStoppedAutomatically + +Automatically closed activity for start/stop operations that aren't explicitly closed. + + + +### Microsoft.Windows.Security.AppLockerCSP.AddParams + +Parameters passed to Add function of the AppLockerCSP Node. + +The following fields are available: + +- **child** The child URI of the node to add. +- **uri** URI of the node relative to %SYSTEM32%/AppLocker. + + +### Microsoft.Windows.Security.AppLockerCSP.AddStart + +Start of "Add" Operation for the AppLockerCSP Node. + + + +### Microsoft.Windows.Security.AppLockerCSP.AddStop + +End of "Add" Operation for AppLockerCSP Node. + +The following fields are available: + +- **hr** The HRESULT returned by Add function in AppLockerCSP. + + +### Microsoft.Windows.Security.AppLockerCSP.CAppLockerCSP::Rollback + +Result of the 'Rollback' operation in AppLockerCSP. + +The following fields are available: + +- **oldId** Previous id for the CSP transaction. +- **txId** Current id for the CSP transaction. + + +### Microsoft.Windows.Security.AppLockerCSP.ClearParams + +Parameters passed to the "Clear" operation for AppLockerCSP. + +The following fields are available: + +- **uri** The URI relative to the %SYSTEM32%\AppLocker folder. + + +### Microsoft.Windows.Security.AppLockerCSP.ClearStart + +Start of the "Clear" operation for the AppLockerCSP Node. + + + +### Microsoft.Windows.Security.AppLockerCSP.ClearStop + +End of the "Clear" operation for the AppLockerCSP node. + +The following fields are available: + +- **hr** HRESULT reported at the end of the 'Clear' function. + + +### Microsoft.Windows.Security.AppLockerCSP.ConfigManagerNotificationStart + +Start of the "ConfigManagerNotification" operation for AppLockerCSP. + +The following fields are available: + +- **NotifyState** State sent by ConfigManager to AppLockerCSP. + + +### Microsoft.Windows.Security.AppLockerCSP.ConfigManagerNotificationStop + +End of the "ConfigManagerNotification" operation for AppLockerCSP. + +The following fields are available: + +- **hr** HRESULT returned by the ConfigManagerNotification function in AppLockerCSP. + + +### Microsoft.Windows.Security.AppLockerCSP.CreateNodeInstanceParams + +Parameters passed to the CreateNodeInstance function of the AppLockerCSP node. + +The following fields are available: + +- **NodeId** NodeId passed to CreateNodeInstance. +- **nodeOps** NodeOperations parameter passed to CreateNodeInstance. +- **uri** URI passed to CreateNodeInstance, relative to %SYSTEM32%\AppLocker. + + +### Microsoft.Windows.Security.AppLockerCSP.CreateNodeInstanceStart + +Start of the "CreateNodeInstance" operation for the AppLockerCSP node. + + + +### Microsoft.Windows.Security.AppLockerCSP.CreateNodeInstanceStop + +End of the "CreateNodeInstance" operation for the AppLockerCSP node + +The following fields are available: + +- **hr** HRESULT returned by the CreateNodeInstance function in AppLockerCSP. + + +### Microsoft.Windows.Security.AppLockerCSP.DeleteChildParams + +Parameters passed to the DeleteChild function of the AppLockerCSP node. + +The following fields are available: + +- **child** The child URI of the node to delete. +- **uri** URI relative to %SYSTEM32%\AppLocker. + + +### Microsoft.Windows.Security.AppLockerCSP.DeleteChildStart + +Start of the "DeleteChild" operation for the AppLockerCSP node. + + + +### Microsoft.Windows.Security.AppLockerCSP.DeleteChildStop + +End of the "DeleteChild" operation for the AppLockerCSP node. + +The following fields are available: + +- **hr** HRESULT returned by the DeleteChild function in AppLockerCSP. + + +### Microsoft.Windows.Security.AppLockerCSP.EnumPolicies + +Logged URI relative to %SYSTEM32%\AppLocker, if the Plugin GUID is null, or the CSP doesn't believe the old policy is present. + +The following fields are available: + +- **uri** URI relative to %SYSTEM32%\AppLocker. + + +### Microsoft.Windows.Security.AppLockerCSP.GetChildNodeNamesParams + +Parameters passed to the GetChildNodeNames function of the AppLockerCSP node. + +The following fields are available: + +- **uri** URI relative to %SYSTEM32%/AppLocker for MDM node. + + +### Microsoft.Windows.Security.AppLockerCSP.GetChildNodeNamesStart + +Start of the "GetChildNodeNames" operation for the AppLockerCSP node. + + + +### Microsoft.Windows.Security.AppLockerCSP.GetChildNodeNamesStop + +End of the "GetChildNodeNames" operation for the AppLockerCSP node. + +The following fields are available: + +- **child[0]** If function succeeded, the first child's name, else "NA". +- **count** If function succeeded, the number of child node names returned by the function, else 0. +- **hr** HRESULT returned by the GetChildNodeNames function of AppLockerCSP. + + +### Microsoft.Windows.Security.AppLockerCSP.GetLatestId + +The result of 'GetLatestId' in AppLockerCSP (the latest time stamped GUID). + +The following fields are available: + +- **dirId** The latest directory identifier found by GetLatestId. +- **id** The id returned by GetLatestId if id > 0 - otherwise the dirId parameter. + + +### Microsoft.Windows.Security.AppLockerCSP.HResultException + +HRESULT thrown by any arbitrary function in AppLockerCSP. + +The following fields are available: + +- **file** File in the OS code base in which the exception occurs. +- **function** Function in the OS code base in which the exception occurs. +- **hr** HRESULT that is reported. +- **line** Line in the file in the OS code base in which the exception occurs. + + +### Microsoft.Windows.Security.AppLockerCSP.SetValueParams + +Parameters passed to the SetValue function of the AppLockerCSP node. + +The following fields are available: + +- **dataLength** Length of the value to set. +- **uri** The node URI to that should contain the value, relative to %SYSTEM32%\AppLocker. + + +### Microsoft.Windows.Security.AppLockerCSP.SetValueStart + +Start of the "SetValue" operation for the AppLockerCSP node. + + + +### Microsoft.Windows.Security.AppLockerCSP.SetValueStop + +End of the "SetValue" operation for the AppLockerCSP node. + +The following fields are available: + +- **hr** HRESULT returned by the SetValue function in AppLockerCSP. + + +### Microsoft.Windows.Security.AppLockerCSP.TryRemediateMissingPolicies + +EntryPoint of fix step or policy remediation, includes URI relative to %SYSTEM32%\AppLocker that needs to be fixed. + +The following fields are available: + +- **uri** URI for node relative to %SYSTEM32%/AppLocker. + + +## Appraiser events + +### Microsoft.Windows.Appraiser.General.ChecksumTotalPictureCount + +This event lists the types of objects and how many of each exist on the client device. This allows for a quick way to ensure that the records present on the server match what is present on the client. + +The following fields are available: + +- **DatasourceApplicationFile_19ASetup** The count of the number of this particular object type present on this device. +- **DatasourceApplicationFile_19H1** The count of the number of this particular object type present on this device. +- **DatasourceApplicationFile_19H1Setup** The count of the number of this particular object type present on this device. +- **DatasourceApplicationFile_RS1** An ID for the system, calculated by hashing hardware identifiers. +- **DatasourceApplicationFile_RS2** An ID for the system, calculated by hashing hardware identifiers. +- **DatasourceApplicationFile_RS3** The count of the number of this particular object type present on this device. +- **DatasourceApplicationFile_RS3Setup** The count of the number of this particular object type present on this device. +- **DatasourceApplicationFile_RS4** The count of the number of this particular object type present on this device. +- **DatasourceApplicationFile_RS4Setup** The count of the number of this particular object type present on this device. +- **DatasourceApplicationFile_RS5** The count of the number of this particular object type present on this device. +- **DatasourceApplicationFile_RS5Setup** The count of the number of this particular object type present on this device. +- **DatasourceApplicationFile_TH1** The count of the number of this particular object type present on this device. +- **DatasourceApplicationFile_TH2** The count of the number of this particular object type present on this device. +- **DatasourceDevicePnp_19ASetup** The count of the number of this particular object type present on this device. +- **DatasourceDevicePnp_19H1** The count of the number of this particular object type present on this device. +- **DatasourceDevicePnp_19H1Setup** The count of the number of this particular object type present on this device. +- **DatasourceDevicePnp_RS1** The total DataSourceDevicePnp objects targeting Windows 10 version 1607 on this device. +- **DatasourceDevicePnp_RS2** The count of the number of this particular object type present on this device. +- **DatasourceDevicePnp_RS3** The count of the number of this particular object type present on this device. +- **DatasourceDevicePnp_RS3Setup** The count of the number of this particular object type present on this device. +- **DatasourceDevicePnp_RS4** The count of the number of this particular object type present on this device. +- **DatasourceDevicePnp_RS4Setup** The count of the number of this particular object type present on this device. +- **DatasourceDevicePnp_RS5** The count of the number of this particular object type present on this device. +- **DatasourceDevicePnp_RS5Setup** The count of the number of this particular object type present on this device. +- **DatasourceDevicePnp_TH1** The count of the number of this particular object type present on this device. +- **DatasourceDevicePnp_TH2** The count of the number of this particular object type present on this device. +- **DatasourceDriverPackage_19ASetup** The count of the number of this particular object type present on this device. +- **DatasourceDriverPackage_19H1** The count of the number of this particular object type present on this device. +- **DatasourceDriverPackage_19H1Setup** The count of the number of this particular object type present on this device. +- **DatasourceDriverPackage_RS1** The total DataSourceDriverPackage objects targeting Windows 10 version 1607 on this device. +- **DatasourceDriverPackage_RS2** The total DataSourceDriverPackage objects targeting Windows 10, version 1703 on this device. +- **DatasourceDriverPackage_RS3** The count of the number of this particular object type present on this device. +- **DatasourceDriverPackage_RS3Setup** The count of the number of this particular object type present on this device. +- **DatasourceDriverPackage_RS4** The count of the number of this particular object type present on this device. +- **DatasourceDriverPackage_RS4Setup** The count of the number of this particular object type present on this device. +- **DatasourceDriverPackage_RS5** The count of the number of this particular object type present on this device. +- **DatasourceDriverPackage_RS5Setup** The count of the number of this particular object type present on this device. +- **DatasourceDriverPackage_TH1** The count of the number of this particular object type present on this device. +- **DatasourceDriverPackage_TH2** The count of the number of this particular object type present on this device. +- **DataSourceMatchingInfoBlock_19ASetup** The count of the number of this particular object type present on this device. +- **DataSourceMatchingInfoBlock_19H1** The count of the number of this particular object type present on this device. +- **DataSourceMatchingInfoBlock_19H1Setup** The count of the number of this particular object type present on this device. +- **DataSourceMatchingInfoBlock_RS1** The total DataSourceMatchingInfoBlock objects targeting Windows 10 version 1607 on this device. +- **DataSourceMatchingInfoBlock_RS2** The count of the number of this particular object type present on this device. +- **DataSourceMatchingInfoBlock_RS3** The count of the number of this particular object type present on this device. +- **DataSourceMatchingInfoBlock_RS3Setup** The count of the number of this particular object type present on this device. +- **DataSourceMatchingInfoBlock_RS4** The count of the number of this particular object type present on this device. +- **DataSourceMatchingInfoBlock_RS4Setup** The count of the number of this particular object type present on this device. +- **DataSourceMatchingInfoBlock_RS5** The count of the number of this particular object type present on this device. +- **DataSourceMatchingInfoBlock_RS5Setup** The count of the number of this particular object type present on this device. +- **DataSourceMatchingInfoBlock_TH1** The count of the number of this particular object type present on this device. +- **DataSourceMatchingInfoBlock_TH2** The count of the number of this particular object type present on this device. +- **DataSourceMatchingInfoPassive_19ASetup** The count of the number of this particular object type present on this device. +- **DataSourceMatchingInfoPassive_19H1** The count of the number of this particular object type present on this device. +- **DataSourceMatchingInfoPassive_19H1Setup** The count of the number of this particular object type present on this device. +- **DataSourceMatchingInfoPassive_RS1** The total DataSourceMatchingInfoPassive objects targeting Windows 10 version 1607 on this device. +- **DataSourceMatchingInfoPassive_RS2** The count of the number of this particular object type present on this device. +- **DataSourceMatchingInfoPassive_RS3** The count of the number of this particular object type present on this device. +- **DataSourceMatchingInfoPassive_RS3Setup** The count of the number of this particular object type present on this device. +- **DataSourceMatchingInfoPassive_RS4** The count of the number of this particular object type present on this device. +- **DataSourceMatchingInfoPassive_RS4Setup** The count of the number of this particular object type present on this device. +- **DataSourceMatchingInfoPassive_RS5** The count of the number of this particular object type present on this device. +- **DataSourceMatchingInfoPassive_RS5Setup** The count of the number of this particular object type present on this device. +- **DataSourceMatchingInfoPassive_TH1** The count of the number of this particular object type present on this device. +- **DataSourceMatchingInfoPassive_TH2** The count of the number of this particular object type present on this device. +- **DataSourceMatchingInfoPostUpgrade_19ASetup** The count of the number of this particular object type present on this device. +- **DataSourceMatchingInfoPostUpgrade_19H1** The count of the number of this particular object type present on this device. +- **DataSourceMatchingInfoPostUpgrade_19H1Setup** The count of the number of this particular object type present on this device. +- **DataSourceMatchingInfoPostUpgrade_RS1** The total DataSourceMatchingInfoPostUpgrade objects targeting Windows 10 version 1607 on this device. +- **DataSourceMatchingInfoPostUpgrade_RS2** The total DataSourceMatchingInfoPostUpgrade objects targeting Windows 10 version 1703 on this device. +- **DataSourceMatchingInfoPostUpgrade_RS3** The total DataSourceMatchingInfoPostUpgrade objects targeting Windows 10 version 1709 on this device. +- **DataSourceMatchingInfoPostUpgrade_RS3Setup** The count of the number of this particular object type present on this device. +- **DataSourceMatchingInfoPostUpgrade_RS4** The count of the number of this particular object type present on this device. +- **DataSourceMatchingInfoPostUpgrade_RS4Setup** The count of the number of this particular object type present on this device. +- **DataSourceMatchingInfoPostUpgrade_RS5** The count of the number of this particular object type present on this device. +- **DataSourceMatchingInfoPostUpgrade_RS5Setup** The count of the number of this particular object type present on this device. +- **DataSourceMatchingInfoPostUpgrade_TH1** The count of the number of this particular object type present on this device. +- **DataSourceMatchingInfoPostUpgrade_TH2** The count of the number of this particular object type present on this device. +- **DatasourceSystemBios_19ASetup** The count of the number of this particular object type present on this device. +- **DatasourceSystemBios_19H1** The count of the number of this particular object type present on this device. +- **DatasourceSystemBios_19H1Setup** The count of the number of this particular object type present on this device. +- **DatasourceSystemBios_RS1** The total DatasourceSystemBios objects targeting Windows 10 version 1607 present on this device. +- **DatasourceSystemBios_RS2** The total DatasourceSystemBios objects targeting Windows 10 version 1703 present on this device. +- **DatasourceSystemBios_RS3** The total DatasourceSystemBios objects targeting Windows 10 version 1709 present on this device. +- **DatasourceSystemBios_RS3Setup** The count of the number of this particular object type present on this device. +- **DatasourceSystemBios_RS4** The count of the number of this particular object type present on this device. +- **DatasourceSystemBios_RS4Setup** The count of the number of this particular object type present on this device. +- **DatasourceSystemBios_RS5** The count of the number of this particular object type present on this device. +- **DatasourceSystemBios_RS5Setup** The count of the number of this particular object type present on this device. +- **DatasourceSystemBios_TH1** The count of the number of this particular object type present on this device. +- **DatasourceSystemBios_TH2** The count of the number of this particular object type present on this device. +- **DecisionApplicationFile_19ASetup** The count of the number of this particular object type present on this device. +- **DecisionApplicationFile_19H1** The count of the number of this particular object type present on this device. +- **DecisionApplicationFile_19H1Setup** The count of the number of this particular object type present on this device. +- **DecisionApplicationFile_RS1** The count of the number of this particular object type present on this device. +- **DecisionApplicationFile_RS2** The count of the number of this particular object type present on this device. +- **DecisionApplicationFile_RS3** The count of the number of this particular object type present on this device. +- **DecisionApplicationFile_RS3Setup** The count of the number of this particular object type present on this device. +- **DecisionApplicationFile_RS4** The count of the number of this particular object type present on this device. +- **DecisionApplicationFile_RS4Setup** The count of the number of this particular object type present on this device. +- **DecisionApplicationFile_RS5** The count of the number of this particular object type present on this device. +- **DecisionApplicationFile_RS5Setup** The count of the number of this particular object type present on this device. +- **DecisionApplicationFile_TH1** The count of the number of this particular object type present on this device. +- **DecisionApplicationFile_TH2** The count of the number of this particular object type present on this device. +- **DecisionDevicePnp_19ASetup** The count of the number of this particular object type present on this device. +- **DecisionDevicePnp_19H1** The count of the number of this particular object type present on this device. +- **DecisionDevicePnp_19H1Setup** The count of the number of this particular object type present on this device. +- **DecisionDevicePnp_RS1** The total DecisionDevicePnp objects targeting Windows 10 version 1607 on this device. +- **DecisionDevicePnp_RS2** The count of the number of this particular object type present on this device. +- **DecisionDevicePnp_RS3** The count of the number of this particular object type present on this device. +- **DecisionDevicePnp_RS3Setup** The count of the number of this particular object type present on this device. +- **DecisionDevicePnp_RS4** The count of the number of this particular object type present on this device. +- **DecisionDevicePnp_RS4Setup** The count of the number of this particular object type present on this device. +- **DecisionDevicePnp_RS5** The count of the number of this particular object type present on this device. +- **DecisionDevicePnp_RS5Setup** The count of the number of this particular object type present on this device. +- **DecisionDevicePnp_TH1** The count of the number of this particular object type present on this device. +- **DecisionDevicePnp_TH2** The count of the number of this particular object type present on this device. +- **DecisionDriverPackage_19ASetup** The count of the number of this particular object type present on this device. +- **DecisionDriverPackage_19H1** The count of the number of this particular object type present on this device. +- **DecisionDriverPackage_19H1Setup** The count of the number of this particular object type present on this device. +- **DecisionDriverPackage_RS1** The total DecisionDriverPackage objects targeting Windows 10 version 1607 on this device. +- **DecisionDriverPackage_RS2** The count of the number of this particular object type present on this device. +- **DecisionDriverPackage_RS3** The count of the number of this particular object type present on this device. +- **DecisionDriverPackage_RS3Setup** The count of the number of this particular object type present on this device. +- **DecisionDriverPackage_RS4** The count of the number of this particular object type present on this device. +- **DecisionDriverPackage_RS4Setup** The count of the number of this particular object type present on this device. +- **DecisionDriverPackage_RS5** The count of the number of this particular object type present on this device. +- **DecisionDriverPackage_RS5Setup** The count of the number of this particular object type present on this device. +- **DecisionDriverPackage_TH1** The count of the number of this particular object type present on this device. +- **DecisionDriverPackage_TH2** The count of the number of this particular object type present on this device. +- **DecisionMatchingInfoBlock_19ASetup** The count of the number of this particular object type present on this device. +- **DecisionMatchingInfoBlock_19H1** The count of the number of this particular object type present on this device. +- **DecisionMatchingInfoBlock_19H1Setup** The count of the number of this particular object type present on this device. +- **DecisionMatchingInfoBlock_RS1** The total DecisionMatchingInfoBlock objects targeting Windows 10 version 1607 present on this device. +- **DecisionMatchingInfoBlock_RS2** The total DecisionMatchingInfoBlock objects targeting Windows 10 version 1703 present on this device. +- **DecisionMatchingInfoBlock_RS3** The total DecisionMatchingInfoBlock objects targeting Windows 10 version 1709 present on this device. +- **DecisionMatchingInfoBlock_RS3Setup** The count of the number of this particular object type present on this device. +- **DecisionMatchingInfoBlock_RS4** The total DecisionMatchingInfoBlock objects targeting Windows 10 version 1803 present on this device. +- **DecisionMatchingInfoBlock_RS4Setup** The count of the number of this particular object type present on this device. +- **DecisionMatchingInfoBlock_RS5** The count of the number of this particular object type present on this device. +- **DecisionMatchingInfoBlock_RS5Setup** The count of the number of this particular object type present on this device. +- **DecisionMatchingInfoBlock_TH1** The count of the number of this particular object type present on this device. +- **DecisionMatchingInfoBlock_TH2** The count of the number of this particular object type present on this device. +- **DecisionMatchingInfoPassive_19ASetup** The count of the number of this particular object type present on this device. +- **DecisionMatchingInfoPassive_19H1** The count of the number of this particular object type present on this device. +- **DecisionMatchingInfoPassive_19H1Setup** The count of the number of this particular object type present on this device. +- **DecisionMatchingInfoPassive_RS1** The total DecisionMatchingInfoPassive objects targeting Windows 10 version 1607 on this device. +- **DecisionMatchingInfoPassive_RS2** The total DecisionMatchingInfoPassive objects targeting Windows 10 version 1703 on this device. +- **DecisionMatchingInfoPassive_RS3** The total DecisionMatchingInfoPassive objects targeting Windows 10 version 1803 on this device. +- **DecisionMatchingInfoPassive_RS3Setup** The count of the number of this particular object type present on this device. +- **DecisionMatchingInfoPassive_RS4** The count of the number of this particular object type present on this device. +- **DecisionMatchingInfoPassive_RS4Setup** The count of the number of this particular object type present on this device. +- **DecisionMatchingInfoPassive_RS5** The count of the number of this particular object type present on this device. +- **DecisionMatchingInfoPassive_RS5Setup** The count of the number of this particular object type present on this device. +- **DecisionMatchingInfoPassive_TH1** The count of the number of this particular object type present on this device. +- **DecisionMatchingInfoPassive_TH2** The count of the number of this particular object type present on this device. +- **DecisionMatchingInfoPostUpgrade_19ASetup** The count of the number of this particular object type present on this device. +- **DecisionMatchingInfoPostUpgrade_19H1** The count of the number of this particular object type present on this device. +- **DecisionMatchingInfoPostUpgrade_19H1Setup** The count of the number of this particular object type present on this device. +- **DecisionMatchingInfoPostUpgrade_RS1** The total DecisionMatchingInfoPostUpgrade objects targeting Windows 10 version 1607 on this device. +- **DecisionMatchingInfoPostUpgrade_RS2** The total DecisionMatchingInfoPostUpgrade objects targeting Windows 10 version 1703 on this device. +- **DecisionMatchingInfoPostUpgrade_RS3** The total DecisionMatchingInfoPostUpgrade objects targeting Windows 10 version 1709 on this device. +- **DecisionMatchingInfoPostUpgrade_RS3Setup** The count of the number of this particular object type present on this device. +- **DecisionMatchingInfoPostUpgrade_RS4** The count of the number of this particular object type present on this device. +- **DecisionMatchingInfoPostUpgrade_RS4Setup** The count of the number of this particular object type present on this device. +- **DecisionMatchingInfoPostUpgrade_RS5** The count of the number of this particular object type present on this device. +- **DecisionMatchingInfoPostUpgrade_RS5Setup** The count of the number of this particular object type present on this device. +- **DecisionMatchingInfoPostUpgrade_TH1** The count of the number of this particular object type present on this device. +- **DecisionMatchingInfoPostUpgrade_TH2** The count of the number of this particular object type present on this device. +- **DecisionMediaCenter_19ASetup** The count of the number of this particular object type present on this device. +- **DecisionMediaCenter_19H1** The count of the number of this particular object type present on this device. +- **DecisionMediaCenter_19H1Setup** The total DecisionMediaCenter objects targeting the next release of Windows on this device. +- **DecisionMediaCenter_RS1** The total DecisionMediaCenter objects targeting Windows 10 version 1607 present on this device. +- **DecisionMediaCenter_RS2** The total DecisionMediaCenter objects targeting Windows 10 version 1703 present on this device. +- **DecisionMediaCenter_RS3** The total DecisionMediaCenter objects targeting Windows 10 version 1709 present on this device. +- **DecisionMediaCenter_RS3Setup** The count of the number of this particular object type present on this device. +- **DecisionMediaCenter_RS4** The total DecisionMediaCenter objects targeting Windows 10 version 1803 present on this device. +- **DecisionMediaCenter_RS4Setup** The count of the number of this particular object type present on this device. +- **DecisionMediaCenter_RS5** The count of the number of this particular object type present on this device. +- **DecisionMediaCenter_RS5Setup** The count of the number of this particular object type present on this device. +- **DecisionMediaCenter_TH1** The count of the number of this particular object type present on this device. +- **DecisionMediaCenter_TH2** The count of the number of this particular object type present on this device. +- **DecisionSystemBios_19ASetup** The total DecisionSystemBios objects targeting the next release of Windows on this device. +- **DecisionSystemBios_19H1** The count of the number of this particular object type present on this device. +- **DecisionSystemBios_19H1Setup** The total DecisionSystemBios objects targeting the next release of Windows on this device. +- **DecisionSystemBios_RS1** The total DecisionSystemBios objects targeting Windows 10 version 1607 on this device. +- **DecisionSystemBios_RS2** The total DecisionSystemBios objects targeting Windows 10 version 1703 on this device. +- **DecisionSystemBios_RS3** The total DecisionSystemBios objects targeting Windows 10 version 1709 on this device. +- **DecisionSystemBios_RS3Setup** The count of the number of this particular object type present on this device. +- **DecisionSystemBios_RS4** The total DecisionSystemBios objects targeting Windows 10 version, 1803 present on this device. +- **DecisionSystemBios_RS4Setup** The total DecisionSystemBios objects targeting the next release of Windows on this device. +- **DecisionSystemBios_RS5** The total DecisionSystemBios objects targeting the next release of Windows on this device. +- **DecisionSystemBios_RS5Setup** The total DecisionSystemBios objects targeting the next release of Windows on this device. +- **DecisionSystemBios_TH1** The count of the number of this particular object type present on this device. +- **DecisionSystemBios_TH2** The count of the number of this particular object type present on this device. +- **DecisionSystemProcessor_RS2** The count of the number of this particular object type present on this device. +- **DecisionTest_RS1** An ID for the system, calculated by hashing hardware identifiers. +- **InventoryApplicationFile** The count of the number of this particular object type present on this device. +- **InventoryDeviceContainer** A count of device container objects in cache. +- **InventoryDevicePnp** A count of device Plug and Play objects in cache. +- **InventoryDriverBinary** A count of driver binary objects in cache. +- **InventoryDriverPackage** A count of device objects in cache. +- **InventoryLanguagePack** The count of the number of this particular object type present on this device. +- **InventoryMediaCenter** The count of the number of this particular object type present on this device. +- **InventorySystemBios** The count of the number of this particular object type present on this device. +- **InventorySystemMachine** The count of the number of this particular object type present on this device. +- **InventorySystemProcessor** The count of the number of this particular object type present on this device. +- **InventoryTest** The count of the number of this particular object type present on this device. +- **InventoryUplevelDriverPackage** The count of the number of this particular object type present on this device. +- **PCFP** The count of the number of this particular object type present on this device. +- **SystemMemory** The count of the number of this particular object type present on this device. +- **SystemProcessorCompareExchange** The count of the number of this particular object type present on this device. +- **SystemProcessorLahfSahf** The count of the number of this particular object type present on this device. +- **SystemProcessorNx** The total number of objects of this type present on this device. +- **SystemProcessorPrefetchW** The total number of objects of this type present on this device. +- **SystemProcessorSse2** The total number of objects of this type present on this device. +- **SystemTouch** The count of the number of this particular object type present on this device. +- **SystemWim** The total number of objects of this type present on this device. +- **SystemWindowsActivationStatus** The count of the number of this particular object type present on this device. +- **SystemWlan** The total number of objects of this type present on this device. +- **Wmdrm_19ASetup** The count of the number of this particular object type present on this device. +- **Wmdrm_19H1** The count of the number of this particular object type present on this device. +- **Wmdrm_19H1Setup** The total Wmdrm objects targeting the next release of Windows on this device. +- **Wmdrm_RS1** An ID for the system, calculated by hashing hardware identifiers. +- **Wmdrm_RS2** An ID for the system, calculated by hashing hardware identifiers. +- **Wmdrm_RS3** An ID for the system, calculated by hashing hardware identifiers. +- **Wmdrm_RS3Setup** The count of the number of this particular object type present on this device. +- **Wmdrm_RS4** The total Wmdrm objects targeting Windows 10, version 1803 present on this device. +- **Wmdrm_RS4Setup** The count of the number of this particular object type present on this device. +- **Wmdrm_RS5** The count of the number of this particular object type present on this device. +- **Wmdrm_RS5Setup** The count of the number of this particular object type present on this device. +- **Wmdrm_TH1** The count of the number of this particular object type present on this device. +- **Wmdrm_TH2** The count of the number of this particular object type present on this device. + + +### Microsoft.Windows.Appraiser.General.DatasourceApplicationFileAdd + +Represents the basic metadata about specific application files installed on the system. + +This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedeviceinventorychange). + +The following fields are available: + +- **AppraiserVersion** The version of the appraiser file that is generating the events. +- **AvDisplayName** If the app is an anti-virus app, this is its display name. +- **CompatModelIndex** The compatibility prediction for this file. +- **HasCitData** Indicates whether the file is present in CIT data. +- **HasUpgradeExe** Indicates whether the anti-virus app has an upgrade.exe file. +- **IsAv** Is the file an anti-virus reporting EXE? +- **ResolveAttempted** This will always be an empty string when sending telemetry. +- **SdbEntries** An array of fields that indicates the SDB entries that apply to this file. + + +### Microsoft.Windows.Appraiser.General.DatasourceApplicationFileRemove + +This event indicates that the DatasourceApplicationFile object is no longer present. + +This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedeviceinventorychange). + +The following fields are available: + +- **AppraiserVersion** The version of the Appraiser file that is generating the events. + + +### Microsoft.Windows.Appraiser.General.DatasourceApplicationFileStartSync + +This event indicates that a new set of DatasourceApplicationFileAdd events will be sent. + +This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedeviceinventorychange). + +The following fields are available: + +- **AppraiserVersion** The version of the Appraiser file that is generating the events. + + +### Microsoft.Windows.Appraiser.General.DatasourceDevicePnpAdd + +This event sends compatibility data for a Plug and Play device, to help keep Windows up to date. + +This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedeviceinventorychange). + +The following fields are available: + +- **ActiveNetworkConnection** Indicates whether the device is an active network device. +- **AppraiserVersion** The version of the appraiser file generating the events. +- **CosDeviceRating** An enumeration that indicates if there is a driver on the target operating system. +- **CosDeviceSolution** An enumeration that indicates how a driver on the target operating system is available. +- **CosDeviceSolutionUrl** Microsoft.Windows.Appraiser.General.DatasourceDevicePnpAdd . Empty string +- **CosPopulatedFromId** The expected uplevel driver matching ID based on driver coverage data. +- **IsBootCritical** Indicates whether the device boot is critical. +- **UplevelInboxDriver** Indicates whether there is a driver uplevel for this device. +- **WuDriverCoverage** Indicates whether there is a driver uplevel for this device, according to Windows Update. +- **WuDriverUpdateId** The Windows Update ID of the applicable uplevel driver. +- **WuPopulatedFromId** The expected uplevel driver matching ID based on driver coverage from Windows Update. + + +### Microsoft.Windows.Appraiser.General.DatasourceDevicePnpRemove + +This event indicates that the DatasourceDevicePnp object is no longer present. + +This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedeviceinventorychange). + +The following fields are available: + +- **AppraiserVersion** The version of the Appraiser file that is generating the events. + + +### Microsoft.Windows.Appraiser.General.DatasourceDevicePnpStartSync + +This event indicates that a new set of DatasourceDevicePnpAdd events will be sent. + +This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedeviceinventorychange). + +The following fields are available: + +- **AppraiserVersion** The version of the Appraiser file that is generating the events. + + +### Microsoft.Windows.Appraiser.General.DatasourceDriverPackageAdd + +This event sends compatibility database data about driver packages to help keep Windows up to date. + +This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedeviceinventorychange). + +The following fields are available: + +- **AppraiserVersion** The version of the appraiser file generating the events. + + +### Microsoft.Windows.Appraiser.General.DatasourceDriverPackageStartSync + +This event indicates that a new set of DatasourceDriverPackageAdd events will be sent. + +This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedeviceinventorychange). + +The following fields are available: + +- **AppraiserVersion** The version of the Appraiser file that is generating the events. + + +### Microsoft.Windows.Appraiser.General.DataSourceMatchingInfoBlockAdd + +This event sends blocking data about any compatibility blocking entries hit on the system that are not directly related to specific applications or devices, to help keep Windows up-to-date. + +This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedeviceinventorychange). + +The following fields are available: + +- **AppraiserVersion** The version of the appraiser file generating the events. + + +### Microsoft.Windows.Appraiser.General.DataSourceMatchingInfoBlockRemove + +This event indicates that the DataSourceMatchingInfoBlock object is no longer present. + +This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedeviceinventorychange). + +The following fields are available: + +- **AppraiserVersion** The version of the Appraiser file that is generating the events. + + +### Microsoft.Windows.Appraiser.General.DataSourceMatchingInfoBlockStartSync + +This event indicates that a full set of DataSourceMatchingInfoBlockStAdd events have been sent. + +This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedeviceinventorychange). + +The following fields are available: + +- **AppraiserVersion** The version of the Appraiser file that is generating the events. + + +### Microsoft.Windows.Appraiser.General.DataSourceMatchingInfoPassiveAdd + +This event sends compatibility database information about non-blocking compatibility entries on the system that are not keyed by either applications or devices, to help keep Windows up-to-date. + +This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedeviceinventorychange). + +The following fields are available: + +- **AppraiserVersion** The version of the appraiser file generating the events. + + +### Microsoft.Windows.Appraiser.General.DataSourceMatchingInfoPassiveRemove + +This event indicates that the DataSourceMatchingInfoPassive object is no longer present. + +This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedeviceinventorychange). + +The following fields are available: + +- **AppraiserVersion** The version of the Appraiser file that is generating the events. + + +### Microsoft.Windows.Appraiser.General.DataSourceMatchingInfoPassiveStartSync + +This event indicates that a new set of DataSourceMatchingInfoPassiveAdd events will be sent. + +This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedeviceinventorychange). + +The following fields are available: + +- **AppraiserVersion** The version of the Appraiser file that is generating the events. + + +### Microsoft.Windows.Appraiser.General.DataSourceMatchingInfoPostUpgradeAdd + +This event sends compatibility database information about entries requiring reinstallation after an upgrade on the system that are not keyed by either applications or devices, to help keep Windows up-to-date. + +This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedeviceinventorychange). + +The following fields are available: + +- **AppraiserVersion** The version of the appraiser file generating the events. + + +### Microsoft.Windows.Appraiser.General.DataSourceMatchingInfoPostUpgradeRemove + +This event indicates that the DataSourceMatchingInfoPostUpgrade object is no longer present. + +This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedeviceinventorychange). + +The following fields are available: + +- **AppraiserVersion** The version of the Appraiser file that is generating the events. + + +### Microsoft.Windows.Appraiser.General.DataSourceMatchingInfoPostUpgradeStartSync + +This event indicates that a new set of DataSourceMatchingInfoPostUpgradeAdd events will be sent. + +This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedeviceinventorychange). + +The following fields are available: + +- **AppraiserVersion** The version of the Appraiser file that is generating the events. + + +### Microsoft.Windows.Appraiser.General.DatasourceSystemBiosAdd + +This event sends compatibility database information about the BIOS to help keep Windows up-to-date. + +This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedeviceinventorychange). + +The following fields are available: + +- **AppraiserVersion** The version of the Appraiser file generating the events. + + +### Microsoft.Windows.Appraiser.General.DatasourceSystemBiosRemove + +This event indicates that the DatasourceSystemBios object is no longer present. + +This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedeviceinventorychange). + +The following fields are available: + +- **AppraiserVersion** The version of the Appraiser file that is generating the events. + + +### Microsoft.Windows.Appraiser.General.DatasourceSystemBiosStartSync + +This event indicates that a new set of DatasourceSystemBiosAdd events will be sent. + +This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedeviceinventorychange). + +The following fields are available: + +- **AppraiserVersion** The version of the Appraiser file that is generating the events. + + +### Microsoft.Windows.Appraiser.General.DecisionApplicationFileAdd + +This event sends compatibility decision data about a file to help keep Windows up-to-date. + +This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedeviceinventorychange). + +The following fields are available: + +- **AppraiserVersion** The version of the appraiser file that is generating the events. +- **BlockAlreadyInbox** The uplevel runtime block on the file already existed on the current OS. +- **BlockingApplication** Indicates whether there are any application issues that interfere with the upgrade due to the file in question. +- **DisplayGenericMessage** Will be a generic message be shown for this file? +- **DisplayGenericMessageGated** Indicates whether a generic message be shown for this file. +- **HardBlock** This file is blocked in the SDB. +- **HasUxBlockOverride** Does the file have a block that is overridden by a tag in the SDB? +- **MigApplication** Does the file have a MigXML from the SDB associated with it that applies to the current upgrade mode? +- **MigRemoval** Does the file have a MigXML from the SDB that will cause the app to be removed on upgrade? +- **NeedsDismissAction** Will the file cause an action that can be dimissed? +- **NeedsInstallPostUpgradeData** After upgrade, the file will have a post-upgrade notification to install a replacement for the app. +- **NeedsNotifyPostUpgradeData** Does the file have a notification that should be shown after upgrade? +- **NeedsReinstallPostUpgradeData** After upgrade, this file will have a post-upgrade notification to reinstall the app. +- **NeedsUninstallAction** The file must be uninstalled to complete the upgrade. +- **SdbBlockUpgrade** The file is tagged as blocking upgrade in the SDB, +- **SdbBlockUpgradeCanReinstall** The file is tagged as blocking upgrade in the SDB. It can be reinstalled after upgrade. +- **SdbBlockUpgradeUntilUpdate** The file is tagged as blocking upgrade in the SDB. If the app is updated, the upgrade can proceed. +- **SdbReinstallUpgrade** The file is tagged as needing to be reinstalled after upgrade in the SDB. It does not block upgrade. +- **SdbReinstallUpgradeWarn** The file is tagged as needing to be reinstalled after upgrade with a warning in the SDB. It does not block upgrade. +- **SoftBlock** The file is softblocked in the SDB and has a warning. + + +### Microsoft.Windows.Appraiser.General.DecisionApplicationFileRemove + +This event indicates Indicates that the DecisionApplicationFile object is no longer present. + +This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedeviceinventorychange). + +The following fields are available: + +- **AppraiserVersion** The version of the Appraiser file that is generating the events. + + +### Microsoft.Windows.Appraiser.General.DecisionApplicationFileStartSync + +This event indicates that a new set of DecisionApplicationFileAdd events will be sent. + +This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedeviceinventorychange). + +The following fields are available: + +- **AppraiserVersion** The version of the Appraiser file that is generating the events. + + +### Microsoft.Windows.Appraiser.General.DecisionDevicePnpAdd + +This event sends compatibility decision data about a PNP device to help keep Windows up to date. + +This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedeviceinventorychange). + +The following fields are available: + +- **AppraiserVersion** The version of the appraiser file generating the events. +- **AssociatedDriverIsBlocked** Is the driver associated with this PNP device blocked? +- **AssociatedDriverWillNotMigrate** Will the driver associated with this plug-and-play device migrate? +- **BlockAssociatedDriver** Should the driver associated with this PNP device be blocked? +- **BlockingDevice** Is this PNP device blocking upgrade? +- **BlockUpgradeIfDriverBlocked** Is the PNP device both boot critical and does not have a driver included with the OS? +- **BlockUpgradeIfDriverBlockedAndOnlyActiveNetwork** Is this PNP device the only active network device? +- **DisplayGenericMessage** Will a generic message be shown during Setup for this PNP device? +- **DisplayGenericMessageGated** Indicates whether a generic message will be shown during Setup for this PNP device. +- **DriverAvailableInbox** Is a driver included with the operating system for this PNP device? +- **DriverAvailableOnline** Is there a driver for this PNP device on Windows Update? +- **DriverAvailableUplevel** Is there a driver on Windows Update or included with the operating system for this PNP device? +- **DriverBlockOverridden** Is there is a driver block on the device that has been overridden? +- **NeedsDismissAction** Will the user would need to dismiss a warning during Setup for this device? +- **NotRegressed** Does the device have a problem code on the source OS that is no better than the one it would have on the target OS? +- **SdbDeviceBlockUpgrade** Is there an SDB block on the PNP device that blocks upgrade? +- **SdbDriverBlockOverridden** Is there an SDB block on the PNP device that blocks upgrade, but that block was overridden? + + +### Microsoft.Windows.Appraiser.General.DecisionDevicePnpRemove + +This event indicates that the DecisionDevicePnp object is no longer present. + +This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedeviceinventorychange). + +The following fields are available: + +- **AppraiserVersion** The version of the Appraiser file that is generating the events. + + +### Microsoft.Windows.Appraiser.General.DecisionDevicePnpStartSync + +The DecisionDevicePnpStartSync event indicates that a new set of DecisionDevicePnpAdd events will be sent. + +This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedeviceinventorychange). + +The following fields are available: + +- **AppraiserVersion** The version of the Appraiser file that is generating the events. + + +### Microsoft.Windows.Appraiser.General.DecisionDriverPackageAdd + +This event sends decision data about driver package compatibility to help keep Windows up to date. + +This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedeviceinventorychange). + +The following fields are available: + +- **AppraiserVersion** The version of the appraiser file generating the events. +- **DisplayGenericMessageGated** Indicates whether a generic offer block message will be shown for this driver package. +- **DriverBlockOverridden** Does the driver package have an SDB block that blocks it from migrating, but that block has been overridden? +- **DriverIsDeviceBlocked** Was the driver package was blocked because of a device block? +- **DriverIsDriverBlocked** Is the driver package blocked because of a driver block? +- **DriverIsTroubleshooterBlocked** Indicates whether the driver package is blocked because of a troubleshooter block. +- **DriverShouldNotMigrate** Should the driver package be migrated during upgrade? +- **SdbDriverBlockOverridden** Does the driver package have an SDB block that blocks it from migrating, but that block has been overridden? + + +### Microsoft.Windows.Appraiser.General.DecisionDriverPackageRemove + +This event indicates that the DecisionDriverPackage object is no longer present. + +This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedeviceinventorychange). + +The following fields are available: + +- **AppraiserVersion** The version of the Appraiser file that is generating the events. + + +### Microsoft.Windows.Appraiser.General.DecisionDriverPackageStartSync + +This event indicates that a new set of DecisionDriverPackageAdd events will be sent. + +This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedeviceinventorychange). + +The following fields are available: + +- **AppraiserVersion** The version of the Appraiser file that is generating the events. + + +### Microsoft.Windows.Appraiser.General.DecisionMatchingInfoBlockAdd + +This event sends compatibility decision data about blocking entries on the system that are not keyed by either applications or devices, to help keep Windows up to date. + +This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedeviceinventorychange). + +The following fields are available: + +- **AppraiserVersion** The version of the appraiser file generating the events. +- **BlockingApplication** Are there are any application issues that interfere with upgrade due to matching info blocks? +- **DisplayGenericMessage** Will a generic message be shown for this block? +- **NeedsUninstallAction** Does the user need to take an action in setup due to a matching info block? +- **SdbBlockUpgrade** Is a matching info block blocking upgrade? +- **SdbBlockUpgradeCanReinstall** Is a matching info block blocking upgrade, but has the can reinstall tag? +- **SdbBlockUpgradeUntilUpdate** Is a matching info block blocking upgrade but has the until update tag? + + +### Microsoft.Windows.Appraiser.General.DecisionMatchingInfoBlockRemove + +This event indicates that the DecisionMatchingInfoBlock object is no longer present. + +This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedeviceinventorychange). + +The following fields are available: + +- **AppraiserVersion** The version of the Appraiser file that is generating the events. + + +### Microsoft.Windows.Appraiser.General.DecisionMatchingInfoBlockStartSync + +This event indicates that a new set of DecisionMatchingInfoBlockAdd events will be sent. + +This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedeviceinventorychange). + +The following fields are available: + +- **AppraiserVersion** The version of the Appraiser file that is generating the events. + + +### Microsoft.Windows.Appraiser.General.DecisionMatchingInfoPassiveAdd + +This event sends compatibility decision data about non-blocking entries on the system that are not keyed by either applications or devices, to help keep Windows up to date. + +This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedeviceinventorychange). + +The following fields are available: + +- **AppraiserVersion** The version of the Appraiser file that is generating the events. +- **BlockingApplication** Are there any application issues that interfere with upgrade due to matching info blocks? +- **DisplayGenericMessageGated** Indicates whether a generic offer block message will be shown due to matching info blocks. +- **MigApplication** Is there a matching info block with a mig for the current mode of upgrade? + + +### Microsoft.Windows.Appraiser.General.DecisionMatchingInfoPassiveRemove + +This event Indicates that the DecisionMatchingInfoPassive object is no longer present. + +This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedeviceinventorychange). + +The following fields are available: + +- **AppraiserVersion** The version of the Appraiser file that is generating the events. + + +### Microsoft.Windows.Appraiser.General.DecisionMatchingInfoPassiveStartSync + +This event indicates that a new set of DecisionMatchingInfoPassiveAdd events will be sent. + +This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedeviceinventorychange). + +The following fields are available: + +- **AppraiserVersion** The version of the Appraiser file that is generating the events. + + +### Microsoft.Windows.Appraiser.General.DecisionMatchingInfoPostUpgradeAdd + +This event sends compatibility decision data about entries that require reinstall after upgrade. It's used to help keep Windows up to date. + +This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedeviceinventorychange). + +The following fields are available: + +- **AppraiserVersion** The version of the Appraiser file that is generating the events. +- **NeedsInstallPostUpgradeData** Will the file have a notification after upgrade to install a replacement for the app? +- **NeedsNotifyPostUpgradeData** Should a notification be shown for this file after upgrade? +- **NeedsReinstallPostUpgradeData** Will the file have a notification after upgrade to reinstall the app? +- **SdbReinstallUpgrade** The file is tagged as needing to be reinstalled after upgrade in the compatibility database (but is not blocking upgrade). + + +### Microsoft.Windows.Appraiser.General.DecisionMatchingInfoPostUpgradeRemove + +This event indicates that the DecisionMatchingInfoPostUpgrade object is no longer present. + +This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedeviceinventorychange). + +The following fields are available: + +- **AppraiserVersion** The version of the Appraiser file that is generating the events. + + +### Microsoft.Windows.Appraiser.General.DecisionMatchingInfoPostUpgradeStartSync + +This event indicates that a new set of DecisionMatchingInfoPostUpgradeAdd events will be sent. + +This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedeviceinventorychange). + +The following fields are available: + +- **AppraiserVersion** The version of the Appraiser file that is generating the events. + + +### Microsoft.Windows.Appraiser.General.DecisionMediaCenterAdd + +This event sends decision data about the presence of Windows Media Center, to help keep Windows up to date. + +This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedeviceinventorychange). + +The following fields are available: + +- **AppraiserVersion** The version of the Appraiser file generating the events. +- **BlockingApplication** Is there any application issues that interfere with upgrade due to Windows Media Center? +- **MediaCenterActivelyUsed** If Windows Media Center is supported on the edition, has it been run at least once and are the MediaCenterIndicators are true? +- **MediaCenterIndicators** Do any indicators imply that Windows Media Center is in active use? +- **MediaCenterInUse** Is Windows Media Center actively being used? +- **MediaCenterPaidOrActivelyUsed** Is Windows Media Center actively being used or is it running on a supported edition? +- **NeedsDismissAction** Are there any actions that can be dismissed coming from Windows Media Center? + + +### Microsoft.Windows.Appraiser.General.DecisionMediaCenterRemove + +This event indicates that the DecisionMediaCenter object is no longer present. + +This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedeviceinventorychange). + +The following fields are available: + +- **AppraiserVersion** The version of the Appraiser file that is generating the events. + + +### Microsoft.Windows.Appraiser.General.DecisionMediaCenterStartSync + +This event indicates that a new set of DecisionMediaCenterAdd events will be sent. + +This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedeviceinventorychange). + +The following fields are available: + +- **AppraiserVersion** The version of the Appraiser file that is generating the events. + + +### Microsoft.Windows.Appraiser.General.DecisionSystemBiosAdd + +This event sends compatibility decision data about the BIOS to help keep Windows up to date. + +This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedeviceinventorychange). + +The following fields are available: + +- **AppraiserVersion** The version of the Appraiser file generating the events. +- **Blocking** Is the device blocked from upgrade due to a BIOS block? +- **DisplayGenericMessageGated** Indicates whether a generic offer block message will be shown for the bios. +- **HasBiosBlock** Does the device have a BIOS block? + + +### Microsoft.Windows.Appraiser.General.DecisionSystemBiosRemove + +This event indicates that the DecisionSystemBios object is no longer present. + +This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedeviceinventorychange). + +The following fields are available: + +- **AppraiserVersion** The version of the Appraiser file that is generating the events. + + +### Microsoft.Windows.Appraiser.General.DecisionSystemBiosStartSync + +This event indicates that a new set of DecisionSystemBiosAdd events will be sent. + +This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedeviceinventorychange). + +The following fields are available: + +- **AppraiserVersion** The version of the Appraiser file that is generating the events. + + +### Microsoft.Windows.Appraiser.General.GatedRegChange + +This event sends data about the results of running a set of quick-blocking instructions, to help keep Windows up to date. + +The following fields are available: + +- **NewData** The data in the registry value after the scan completed. +- **OldData** The previous data in the registry value before the scan ran. +- **PCFP** An ID for the system calculated by hashing hardware identifiers. +- **RegKey** The registry key name for which a result is being sent. +- **RegValue** The registry value for which a result is being sent. +- **Time** The client time of the event. + + +### Microsoft.Windows.Appraiser.General.InventoryApplicationFileAdd + +This event represents the basic metadata about a file on the system. The file must be part of an app and either have a block in the compatibility database or be part of an antivirus program. + +This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedeviceinventorychange). + +The following fields are available: + +- **AppraiserVersion** The version of the Appraiser file generating the events. +- **AvDisplayName** If the app is an antivirus app, this is its display name. +- **AvProductState** Indicates whether the antivirus program is turned on and the signatures are up to date. +- **BinaryType** A binary type. Example: UNINITIALIZED, ZERO_BYTE, DATA_ONLY, DOS_MODULE, NE16_MODULE, PE32_UNKNOWN, PE32_I386, PE32_ARM, PE64_UNKNOWN, PE64_AMD64, PE64_ARM64, PE64_IA64, PE32_CLR_32, PE32_CLR_IL, PE32_CLR_IL_PREFER32, PE64_CLR_64. +- **BinFileVersion** An attempt to clean up FileVersion at the client that tries to place the version into 4 octets. +- **BinProductVersion** An attempt to clean up ProductVersion at the client that tries to place the version into 4 octets. +- **BoeProgramId** If there is no entry in Add/Remove Programs, this is the ProgramID that is generated from the file metadata. +- **CompanyName** The company name of the vendor who developed this file. +- **FileId** A hash that uniquely identifies a file. +- **FileVersion** The File version field from the file metadata under Properties -> Details. +- **HasUpgradeExe** Indicates whether the antivirus app has an upgrade.exe file. +- **IsAv** Indicates whether the file an antivirus reporting EXE. +- **LinkDate** The date and time that this file was linked on. +- **LowerCaseLongPath** The full file path to the file that was inventoried on the device. +- **Name** The name of the file that was inventoried. +- **ProductName** The Product name field from the file metadata under Properties -> Details. +- **ProductVersion** The Product version field from the file metadata under Properties -> Details. +- **ProgramId** A hash of the Name, Version, Publisher, and Language of an application used to identify it. +- **Size** The size of the file (in hexadecimal bytes). + + +### Microsoft.Windows.Appraiser.General.InventoryApplicationFileRemove + +This event indicates that the InventoryApplicationFile object is no longer present. + +This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedeviceinventorychange). + +The following fields are available: + +- **AppraiserVersion** The version of the Appraiser file that is generating the events. + + +### Microsoft.Windows.Appraiser.General.InventoryApplicationFileStartSync + +This event indicates indicates that a new set of InventoryApplicationFileAdd events will be sent. + +This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedeviceinventorychange). + +The following fields are available: + +- **AppraiserVersion** The version of the Appraiser file that is generating the events. + + +### Microsoft.Windows.Appraiser.General.InventoryLanguagePackAdd + +This event sends data about the number of language packs installed on the system, to help keep Windows up to date. + +This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedeviceinventorychange). + +The following fields are available: + +- **AppraiserVersion** The version of the Appraiser file that is generating the events. +- **HasLanguagePack** Indicates whether this device has 2 or more language packs. +- **LanguagePackCount** The number of language packs are installed. + + +### Microsoft.Windows.Appraiser.General.InventoryLanguagePackRemove + +This event indicates that the InventoryLanguagePack object is no longer present. + +This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedeviceinventorychange). + +The following fields are available: + +- **AppraiserVersion** The version of the Appraiser file that is generating the events. + + +### Microsoft.Windows.Appraiser.General.InventoryLanguagePackStartSync + +This event indicates that a new set of InventoryLanguagePackAdd events will be sent. + +This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedeviceinventorychange). + +The following fields are available: + +- **AppraiserVersion** The version of the Appraiser file that is generating the events. + + +### Microsoft.Windows.Appraiser.General.InventoryMediaCenterAdd + +This event sends true/false data about decision points used to understand whether Windows Media Center is used on the system, to help keep Windows up to date. + +This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedeviceinventorychange). + +The following fields are available: + +- **AppraiserVersion** The version of the Appraiser file generating the events. +- **EverLaunched** Has Windows Media Center ever been launched? +- **HasConfiguredTv** Has the user configured a TV tuner through Windows Media Center? +- **HasExtendedUserAccounts** Are any Windows Media Center Extender user accounts configured? +- **HasWatchedFolders** Are any folders configured for Windows Media Center to watch? +- **IsDefaultLauncher** Is Windows Media Center the default app for opening music or video files? +- **IsPaid** Is the user running a Windows Media Center edition that implies they paid for Windows Media Center? +- **IsSupported** Does the running OS support Windows Media Center? + + +### Microsoft.Windows.Appraiser.General.InventoryMediaCenterRemove + +This event indicates that the InventoryMediaCenter object is no longer present. + +This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedeviceinventorychange). + +The following fields are available: + +- **AppraiserVersion** The version of the Appraiser file that is generating the events. + + +### Microsoft.Windows.Appraiser.General.InventoryMediaCenterStartSync + +This event indicates that a new set of InventoryMediaCenterAdd events will be sent. + +This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedeviceinventorychange). + +The following fields are available: + +- **AppraiserVersion** The version of the Appraiser file that is generating the events. + + +### Microsoft.Windows.Appraiser.General.InventorySystemBiosAdd + +This event sends basic metadata about the BIOS to determine whether it has a compatibility block. + +This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedeviceinventorychange). + +The following fields are available: + +- **AppraiserVersion** The version of the Appraiser file that is generating the events. +- **biosDate** The release date of the BIOS in UTC format. +- **BiosDate** The release date of the BIOS in UTC format. +- **biosName** The name field from Win32_BIOS. +- **BiosName** The name field from Win32_BIOS. +- **manufacturer** The manufacturer field from Win32_ComputerSystem. +- **Manufacturer** The manufacturer field from Win32_ComputerSystem. +- **model** The model field from Win32_ComputerSystem. +- **Model** The model field from Win32_ComputerSystem. + + +### Microsoft.Windows.Appraiser.General.InventorySystemBiosRemove + +This event indicates that the InventorySystemBios object is no longer present. + +This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedeviceinventorychange). + +The following fields are available: + +- **AppraiserVersion** The version of the Appraiser file that is generating the events. + + +### Microsoft.Windows.Appraiser.General.InventorySystemBiosStartSync + +This event indicates that a new set of InventorySystemBiosAdd events will be sent. + +This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedeviceinventorychange). + +The following fields are available: + +- **AppraiserVersion** The version of the Appraiser file that is generating the events. + + +### Microsoft.Windows.Appraiser.General.InventoryUplevelDriverPackageAdd + +This event is only runs during setup. It provides a listing of the uplevel driver packages that were downloaded before the upgrade. Is critical to understanding if failures in setup can be traced to not having sufficient uplevel drivers before the upgrade. + +This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedeviceinventorychange). + +The following fields are available: + +- **AppraiserVersion** The version of the Appraiser file that is generating the events. +- **BootCritical** Is the driver package marked as boot critical? +- **Build** The build value from the driver package. +- **CatalogFile** The name of the catalog file within the driver package. +- **Class** The device class from the driver package. +- **ClassGuid** The device class unique ID from the driver package. +- **Date** The date from the driver package. +- **Inbox** Is the driver package of a driver that is included with Windows? +- **OriginalName** The original name of the INF file before it was renamed. Generally a path under $WINDOWS.~BT\Drivers\DU. +- **Provider** The provider of the driver package. +- **PublishedName** The name of the INF file after it was renamed. +- **Revision** The revision of the driver package. +- **SignatureStatus** Indicates if the driver package is signed. Unknown = 0, Unsigned = 1, Signed = 2. +- **VersionMajor** The major version of the driver package. +- **VersionMinor** The minor version of the driver package. + + +### Microsoft.Windows.Appraiser.General.InventoryUplevelDriverPackageRemove + +This event indicates that the InventoryUplevelDriverPackage object is no longer present. + +This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedeviceinventorychange). + +The following fields are available: + +- **AppraiserVersion** The version of the Appraiser file that is generating the events. + + +### Microsoft.Windows.Appraiser.General.InventoryUplevelDriverPackageStartSync + +This event indicates that a new set of InventoryUplevelDriverPackageAdd events will be sent. + +This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedeviceinventorychange). + +The following fields are available: + +- **AppraiserVersion** The version of the Appraiser file that is generating the events. + + +### Microsoft.Windows.Appraiser.General.RunContext + +This event indicates what should be expected in the data payload. + +The following fields are available: + +- **AppraiserBranch** The source branch in which the currently running version of Appraiser was built. +- **AppraiserProcess** The name of the process that launched Appraiser. +- **AppraiserVersion** The version of the Appraiser file generating the events. +- **CensusId** A unique hardware identifier. +- **Context** Indicates what mode Appraiser is running in. Example: Setup or Telemetry. +- **PCFP** An ID for the system calculated by hashing hardware identifiers. +- **Subcontext** Indicates what categories of incompatibilities appraiser is scanning for. Can be N/A, Resolve, or a semicolon-delimited list that can include App, Dev, Sys, Gat, or Rescan. +- **Time** The client time of the event. + + +### Microsoft.Windows.Appraiser.General.SystemMemoryAdd + +This event sends data on the amount of memory on the system and whether it meets requirements, to help keep Windows up-to-date. + +This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedeviceinventorychange). + +The following fields are available: + +- **AppraiserVersion** The version of the Appraiser file generating the events. +- **Blocking** Is the device from upgrade due to memory restrictions? +- **MemoryRequirementViolated** Was a memory requirement violated? +- **pageFile** The current committed memory limit for the system or the current process, whichever is smaller (in bytes). +- **ram** The amount of memory on the device. +- **ramKB** The amount of memory (in KB). +- **virtual** The size of the user-mode portion of the virtual address space of the calling process (in bytes). +- **virtualKB** The amount of virtual memory (in KB). + + +### Microsoft.Windows.Appraiser.General.SystemMemoryRemove + +This event that the SystemMemory object is no longer present. + +This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedeviceinventorychange). + +The following fields are available: + +- **AppraiserVersion** The version of the Appraiser file that is generating the events. + + +### Microsoft.Windows.Appraiser.General.SystemMemoryStartSync + +This event indicates that a new set of SystemMemoryAdd events will be sent. + +This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedeviceinventorychange). + +The following fields are available: + +- **AppraiserVersion** The version of the Appraiser file that is generating the events. + + +### Microsoft.Windows.Appraiser.General.SystemProcessorCompareExchangeAdd + +This event sends data indicating whether the system supports the CompareExchange128 CPU requirement, to help keep Windows up to date. + +This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedeviceinventorychange). + +The following fields are available: + +- **AppraiserVersion** The version of the Appraiser file generating the events. +- **Blocking** Is the upgrade blocked due to the processor? +- **CompareExchange128Support** Does the CPU support CompareExchange128? + + +### Microsoft.Windows.Appraiser.General.SystemProcessorCompareExchangeRemove + +This event indicates that the SystemProcessorCompareExchange object is no longer present. + +This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedeviceinventorychange). + +The following fields are available: + +- **AppraiserVersion** The version of the Appraiser file that is generating the events. + + +### Microsoft.Windows.Appraiser.General.SystemProcessorCompareExchangeStartSync + +This event indicates that a new set of SystemProcessorCompareExchangeAdd events will be sent. + +This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedeviceinventorychange). + +The following fields are available: + +- **AppraiserVersion** The version of the Appraiser file that is generating the events. + + +### Microsoft.Windows.Appraiser.General.SystemProcessorLahfSahfAdd + +This event sends data indicating whether the system supports the LahfSahf CPU requirement, to help keep Windows up-to-date. + +This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedeviceinventorychange). + +The following fields are available: + +- **AppraiserVersion** The version of the Appraiser file generating the events. +- **Blocking** Is the upgrade blocked due to the processor? +- **LahfSahfSupport** Does the CPU support LAHF/SAHF? + + +### Microsoft.Windows.Appraiser.General.SystemProcessorLahfSahfRemove + +This event indicates that the SystemProcessorLahfSahf object is no longer present. + +This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedeviceinventorychange). + +The following fields are available: + +- **AppraiserVersion** The version of the Appraiser file that is generating the events. + + +### Microsoft.Windows.Appraiser.General.SystemProcessorLahfSahfStartSync + +This event indicates that a new set of SystemProcessorLahfSahfAdd events will be sent. + +This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedeviceinventorychange). + +The following fields are available: + +- **AppraiserVersion** The version of the Appraiser file that is generating the events. + + +### Microsoft.Windows.Appraiser.General.SystemProcessorNxAdd + +This event sends data indicating whether the system supports the NX CPU requirement, to help keep Windows up-to-date. + +This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedeviceinventorychange). + +The following fields are available: + +- **AppraiserVersion** The version of the Appraiser file that is generating the events. +- **Blocking** Is the upgrade blocked due to the processor? +- **NXDriverResult** The result of the driver used to do a non-deterministic check for NX support. +- **NXProcessorSupport** Does the processor support NX? + + +### Microsoft.Windows.Appraiser.General.SystemProcessorNxRemove + +This event indicates that the SystemProcessorNx object is no longer present. + +This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedeviceinventorychange). + +The following fields are available: + +- **AppraiserVersion** The version of the Appraiser file that is generating the events. + + +### Microsoft.Windows.Appraiser.General.SystemProcessorNxStartSync + +This event indicates that a new set of SystemProcessorNxAdd events will be sent. + +This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedeviceinventorychange). + +The following fields are available: + +- **AppraiserVersion** The version of the Appraiser file that is generating the events. + + +### Microsoft.Windows.Appraiser.General.SystemProcessorPrefetchWAdd + +This event sends data indicating whether the system supports the PrefetchW CPU requirement, to help keep Windows up to date. + +This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedeviceinventorychange). + +The following fields are available: + +- **AppraiserVersion** The version of the Appraiser file that is generating the events. +- **Blocking** Is the upgrade blocked due to the processor? +- **PrefetchWSupport** Does the processor support PrefetchW? + + +### Microsoft.Windows.Appraiser.General.SystemProcessorPrefetchWRemove + +This event indicates that the SystemProcessorPrefetchW object is no longer present. + +This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedeviceinventorychange). + +The following fields are available: + +- **AppraiserVersion** The version of the Appraiser file that is generating the events. + + +### Microsoft.Windows.Appraiser.General.SystemProcessorPrefetchWStartSync + +This event indicates that a new set of SystemProcessorPrefetchWAdd events will be sent. + +This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedeviceinventorychange). + +The following fields are available: + +- **AppraiserVersion** The version of the Appraiser file that is generating the events. + + +### Microsoft.Windows.Appraiser.General.SystemProcessorSse2Add + +This event sends data indicating whether the system supports the SSE2 CPU requirement, to help keep Windows up to date. + +This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedeviceinventorychange). + +The following fields are available: + +- **AppraiserVersion** The version of the Appraiser file that is generating the events. +- **Blocking** Is the upgrade blocked due to the processor? +- **SSE2ProcessorSupport** Does the processor support SSE2? + + +### Microsoft.Windows.Appraiser.General.SystemProcessorSse2Remove + +This event indicates that the SystemProcessorSse2 object is no longer present. + +This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedeviceinventorychange). + +The following fields are available: + +- **AppraiserVersion** The version of the Appraiser file that is generating the events. + + +### Microsoft.Windows.Appraiser.General.SystemProcessorSse2StartSync + +This event indicates that a new set of SystemProcessorSse2Add events will be sent. + +This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedeviceinventorychange). + +The following fields are available: + +- **AppraiserVersion** The version of the Appraiser file that is generating the events. + + +### Microsoft.Windows.Appraiser.General.SystemTouchAdd + +This event sends data indicating whether the system supports touch, to help keep Windows up to date. + +This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedeviceinventorychange). + +The following fields are available: + +- **AppraiserVersion** The version of the Appraiser file that is generating the events. +- **IntegratedTouchDigitizerPresent** Is there an integrated touch digitizer? +- **MaximumTouches** The maximum number of touch points supported by the device hardware. + + +### Microsoft.Windows.Appraiser.General.SystemTouchRemove + +This event indicates that the SystemTouch object is no longer present. + +This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedeviceinventorychange). + +The following fields are available: + +- **AppraiserVersion** The version of the Appraiser file that is generating the events. + + +### Microsoft.Windows.Appraiser.General.SystemTouchStartSync + +This event indicates that a new set of SystemTouchAdd events will be sent. + +This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedeviceinventorychange). + +The following fields are available: + +- **AppraiserVersion** The version of the Appraiser file that is generating the events. + + +### Microsoft.Windows.Appraiser.General.SystemWimAdd + +This event sends data indicating whether the operating system is running from a compressed Windows Imaging Format (WIM) file, to help keep Windows up to date. + +This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedeviceinventorychange). + +The following fields are available: + +- **AppraiserVersion** The version of the Appraiser file that is generating the events. +- **IsWimBoot** Is the current operating system running from a compressed WIM file? +- **RegistryWimBootValue** The raw value from the registry that is used to indicate if the device is running from a WIM. + + +### Microsoft.Windows.Appraiser.General.SystemWimRemove + +This event indicates that the SystemWim object is no longer present. + +This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedeviceinventorychange). + +The following fields are available: + +- **AppraiserVersion** The version of the Appraiser file that is generating the events. + + +### Microsoft.Windows.Appraiser.General.SystemWimStartSync + +This event indicates that a new set of SystemWimAdd events will be sent. + +This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedeviceinventorychange). + +The following fields are available: + +- **AppraiserVersion** The version of the Appraiser file that is generating the events. + + +### Microsoft.Windows.Appraiser.General.SystemWindowsActivationStatusAdd + +This event sends data indicating whether the current operating system is activated, to help keep Windows up to date. + +This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedeviceinventorychange). + +The following fields are available: + +- **AppraiserVersion** The version of the Appraiser file that is generating the events. +- **WindowsIsLicensedApiValue** The result from the API that's used to indicate if operating system is activated. +- **WindowsNotActivatedDecision** Is the current operating system activated? + + +### Microsoft.Windows.Appraiser.General.SystemWindowsActivationStatusRemove + +This event indicates that the SystemWindowsActivationStatus object is no longer present. + +This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedeviceinventorychange). + +The following fields are available: + +- **AppraiserVersion** The version of the Appraiser file that is generating the events. + + +### Microsoft.Windows.Appraiser.General.SystemWindowsActivationStatusStartSync + +This event indicates that a new set of SystemWindowsActivationStatusAdd events will be sent. + +This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedeviceinventorychange). + +The following fields are available: + +- **AppraiserVersion** The version of the Appraiser file that is generating the events. + + +### Microsoft.Windows.Appraiser.General.SystemWlanAdd + +This event sends data indicating whether the system has WLAN, and if so, whether it uses an emulated driver that could block an upgrade, to help keep Windows up-to-date. + +This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedeviceinventorychange). + +The following fields are available: + +- **AppraiserVersion** The version of the Appraiser file that is generating the events. +- **Blocking** Is the upgrade blocked because of an emulated WLAN driver? +- **HasWlanBlock** Does the emulated WLAN driver have an upgrade block? +- **WlanEmulatedDriver** Does the device have an emulated WLAN driver? +- **WlanExists** Does the device support WLAN at all? +- **WlanModulePresent** Are any WLAN modules present? +- **WlanNativeDriver** Does the device have a non-emulated WLAN driver? + + +### Microsoft.Windows.Appraiser.General.SystemWlanRemove + +This event indicates that the SystemWlan object is no longer present. + +This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedeviceinventorychange). + +The following fields are available: + +- **AppraiserVersion** The version of the Appraiser file that is generating the events. + + +### Microsoft.Windows.Appraiser.General.SystemWlanStartSync + +This event indicates that a new set of SystemWlanAdd events will be sent. + +This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedeviceinventorychange). + +The following fields are available: + +- **AppraiserVersion** The version of the Appraiser file that is generating the events. + + +### Microsoft.Windows.Appraiser.General.TelemetryRunHealth + +This event indicates the parameters and result of a telemetry (diagnostic) run. This allows the rest of the data sent over the course of the run to be properly contextualized and understood, which is then used to keep Windows up to date. + +The following fields are available: + +- **AppraiserBranch** The source branch in which the version of Appraiser that is running was built. +- **AppraiserDataVersion** The version of the data files being used by the Appraiser telemetry run. +- **AppraiserProcess** The name of the process that launched Appraiser. +- **AppraiserVersion** The file version (major, minor and build) of the Appraiser DLL, concatenated without dots. +- **AuxFinal** Obsolete, always set to false. +- **AuxInitial** Obsolete, indicates if Appraiser is writing data files to be read by the Get Windows 10 app. +- **DeadlineDate** A timestamp representing the deadline date, which is the time until which appraiser will wait to do a full scan. +- **EnterpriseRun** Indicates if the telemetry run is an enterprise run, which means appraiser was run from the command line with an extra enterprise parameter. +- **FullSync** Indicates if Appraiser is performing a full sync, which means that full set of events representing the state of the machine are sent. Otherwise, only the changes from the previous run are sent. +- **InboxDataVersion** The original version of the data files before retrieving any newer version. +- **IndicatorsWritten** Indicates if all relevant UEX indicators were successfully written or updated. +- **InventoryFullSync** Indicates if inventory is performing a full sync, which means that the full set of events representing the inventory of machine are sent. +- **PCFP** An ID for the system calculated by hashing hardware identifiers. +- **PerfBackoff** Indicates if the run was invoked with logic to stop running when a user is present. Helps to understand why a run may have a longer elapsed time than normal. +- **PerfBackoffInsurance** Indicates if appraiser is running without performance backoff because it has run with perf backoff and failed to complete several times in a row. +- **RunAppraiser** Indicates if Appraiser was set to run at all. If this if false, it is understood that data events will not be received from this device. +- **RunDate** The date that the telemetry run was stated, expressed as a filetime. +- **RunGeneralTel** Indicates if the generaltel.dll component was run. Generaltel collects additional telemetry on an infrequent schedule and only from machines at telemetry levels higher than Basic. +- **RunOnline** Indicates if appraiser was able to connect to Windows Update and theefore is making decisions using up-to-date driver coverage information. +- **RunResult** The hresult of the Appraiser telemetry run. +- **ScheduledUploadDay** The day scheduled for the upload. +- **SendingUtc** Indicates if the Appraiser client is sending events during the current telemetry run. +- **StoreHandleIsNotNull** Obsolete, always set to false +- **TelementrySent** Indicates if telemetry was successfully sent. +- **ThrottlingUtc** Indicates if the Appraiser client is throttling its output of CUET events to avoid being disabled. This increases runtime but also telemetry reliability. +- **Time** The client time of the event. +- **VerboseMode** Indicates if appraiser ran in Verbose mode, which is a test-only mode with extra logging. +- **WhyFullSyncWithoutTablePrefix** Indicates the reason or reasons that a full sync was generated. + + +### Microsoft.Windows.Appraiser.General.WmdrmAdd + +This event sends data about the usage of older digital rights management on the system, to help keep Windows up to date. This data does not indicate the details of the media using the digital rights management, only whether any such files exist. Collecting this data was critical to ensuring the correct mitigation for customers, and should be able to be removed once all mitigations are in place. + +This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedeviceinventorychange). + +The following fields are available: + +- **AppraiserVersion** The version of the Appraiser file that is generating the events. +- **BlockingApplication** Same as NeedsDismissAction. +- **NeedsDismissAction** Indicates if a dismissible message is needed to warn the user about a potential loss of data due to DRM deprecation. +- **WmdrmApiResult** Raw value of the API used to gather DRM state. +- **WmdrmCdRipped** Indicates if the system has any files encrypted with personal DRM, which was used for ripped CDs. +- **WmdrmIndicators** WmdrmCdRipped OR WmdrmPurchased. +- **WmdrmInUse** WmdrmIndicators AND dismissible block in setup was not dismissed. +- **WmdrmNonPermanent** Indicates if the system has any files with non-permanent licenses. +- **WmdrmPurchased** Indicates if the system has any files with permanent licenses. + + +### Microsoft.Windows.Appraiser.General.WmdrmRemove + +This event indicates that the Wmdrm object is no longer present. + +This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedeviceinventorychange). + +The following fields are available: + +- **AppraiserVersion** The version of the Appraiser file that is generating the events. + + +### Microsoft.Windows.Appraiser.General.WmdrmStartSync + +This event indicates that a new set of WmdrmAdd events will be sent. + +This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedeviceinventorychange). + +The following fields are available: + +- **AppraiserVersion** The version of the Appraiser file that is generating the events. + + +## Census events + +### Census.App + +Provides information on IE and Census versions running on the device + +The following fields are available: + +- **AppraiserEnterpriseErrorCode** The error code of the last Appraiser enterprise run. +- **AppraiserErrorCode** The error code of the last Appraiser run. +- **AppraiserRunEndTimeStamp** The end time of the last Appraiser run. +- **AppraiserRunIsInProgressOrCrashed** Flag that indicates if the Appraiser run is in progress or has crashed. +- **AppraiserRunStartTimeStamp** The start time of the last Appraiser run. +- **AppraiserTaskEnabled** Whether the Appraiser task is enabled. +- **AppraiserTaskExitCode** The Appraiser task exist code. +- **AppraiserTaskLastRun** The last runtime for the Appraiser task. +- **CensusVersion** The version of Census that generated the current data for this device. +- **IEVersion** The version of Internet Explorer that is running on the device. + + +### Census.Battery + +This event sends type and capacity data about the battery on the device, as well as the number of connected standby devices in use, type to help keep Windows up to date. + +The following fields are available: + +- **InternalBatteryCapablities** Represents information about what the battery is capable of doing. +- **InternalBatteryCapacityCurrent** Represents the battery's current fully charged capacity in mWh (or relative). Compare this value to DesignedCapacity  to estimate the battery's wear. +- **InternalBatteryCapacityDesign** Represents the theoretical capacity of the battery when new, in mWh. +- **InternalBatteryNumberOfCharges** Provides the number of battery charges. This is used when creating new products and validating that existing products meets targeted functionality performance. +- **IsAlwaysOnAlwaysConnectedCapable** Represents whether the battery enables the device to be AlwaysOnAlwaysConnected . Boolean value. + + +### Census.Camera + +This event sends data about the resolution of cameras on the device, to help keep Windows up to date. + +The following fields are available: + +- **FrontFacingCameraResolution** Represents the resolution of the front facing camera in megapixels. If a front facing camera does not exist, then the value is 0. +- **RearFacingCameraResolution** Represents the resolution of the rear facing camera in megapixels. If a rear facing camera does not exist, then the value is 0. + + +### Census.Enterprise + +This event sends data about Azure presence, type, and cloud domain use in order to provide an understanding of the use and integration of devices in an enterprise, cloud, and server environment. + +The following fields are available: + +- **AADDeviceId** Azure Active Directory device ID. +- **AzureOSIDPresent** Represents the field used to identify an Azure machine. +- **AzureVMType** Represents whether the instance is Azure VM PAAS, Azure VM IAAS or any other VMs. +- **CDJType** Represents the type of cloud domain joined for the machine. +- **CommercialId** Represents the GUID for the commercial entity which the device is a member of.  Will be used to reflect insights back to customers. +- **ContainerType** The type of container, such as process or virtual machine hosted. +- **EnrollmentType** Defines the type of MDM enrollment on the device. +- **HashedDomain** The hashed representation of the user domain used for login. +- **IsCloudDomainJoined** Is this device joined to an Azure Active Directory (AAD) tenant? true/false +- **IsDERequirementMet** Represents if the device can do device encryption. +- **IsDeviceProtected** Represents if Device protected by BitLocker/Device Encryption +- **IsDomainJoined** Indicates whether a machine is joined to a domain. +- **IsEDPEnabled** Represents if Enterprise data protected on the device. +- **IsMDMEnrolled** Whether the device has been MDM Enrolled or not. +- **MPNId** Returns the Partner ID/MPN ID from Regkey. HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\DeployID +- **SCCMClientId** This ID correlate systems that send data to Compat Analytics (OMS) and other OMS based systems with systems in an Enterprise SCCM environment. +- **ServerFeatures** Represents the features installed on a Windows   Server. This can be used by developers and administrators who need to automate the process of determining the features installed on a set of server computers. +- **SystemCenterID** The SCCM ID is an anonymized one-way hash of the Active Directory Organization identifier + + +### Census.Firmware + +This event sends data about the BIOS and startup embedded in the device, to help keep Windows up to date. + +The following fields are available: + +- **FirmwareManufacturer** Represents the manufacturer of the device's firmware (BIOS). +- **FirmwareReleaseDate** Represents the date the current firmware was released. +- **FirmwareType** Represents the firmware type. The various types can be unknown, BIOS, UEFI. +- **FirmwareVersion** Represents the version of the current firmware. + + +### Census.Flighting + +This event sends Windows Insider data from customers participating in improvement testing and feedback programs, to help keep Windows up to date. + +The following fields are available: + +- **DeviceSampleRate** The telemetry sample rate assigned to the device. +- **EnablePreviewBuilds** Used to enable Windows Insider builds on a device. +- **FlightIds** A list of the different Windows Insider builds on this device. +- **FlightingBranchName** The name of the Windows Insider branch currently used by the device. +- **IsFlightsDisabled** Represents if the device is participating in the Windows Insider program. +- **MSA_Accounts** Represents a list of hashed IDs of the Microsoft Accounts that are flighting (pre-release builds) on this device. +- **SSRK** Retrieves the mobile targeting settings. + + +### Census.Hardware + +This event sends data about the device, including hardware type, OEM brand, model line, model, telemetry level setting, and TPM support, to help keep Windows up to date. + +The following fields are available: + +- **ActiveMicCount** The number of active microphones attached to the device. +- **ChassisType** Represents the type of device chassis, such as desktop or low profile desktop. The possible values can range between 1 - 36. +- **ComputerHardwareID** Identifies a device class that is represented by a hash of different SMBIOS fields. +- **D3DMaxFeatureLevel** Supported Direct3D version. +- **DeviceColor** Indicates a color of the device. +- **DeviceForm** Indicates the form as per the device classification. +- **DeviceName** The device name that is set by the user. +- **DigitizerSupport** Is a digitizer supported? +- **DUID** The device unique ID. +- **Gyroscope** Indicates whether the device has a gyroscope (a mechanical component that measures and maintains orientation). +- **InventoryId** The device ID used for compatibility testing. +- **Magnetometer** Indicates whether the device has a magnetometer (a mechanical component that works like a compass). +- **NFCProximity** Indicates whether the device supports NFC (a set of communication protocols that helps establish communication when applicable devices are brought close together.) +- **OEMDigitalMarkerFileName** The name of the file placed in the \Windows\system32\drivers directory that specifies the OEM and model name of the device. +- **OEMManufacturerName** The device manufacturer name. The OEMName for an inactive device is not reprocessed even if the clean OEM name is changed at a later date. +- **OEMModelBaseBoard** The baseboard model used by the OEM. +- **OEMModelBaseBoardVersion** Differentiates between developer and retail devices. +- **OEMModelName** The device model name. +- **OEMModelNumber** The device model number. +- **OEMModelSKU** The device edition that is defined by the manufacturer. +- **OEMModelSystemFamily** The system family set on the device by an OEM. +- **OEMModelSystemVersion** The system model version set on the device by the OEM. +- **OEMOptionalIdentifier** A Microsoft assigned value that represents a specific OEM subsidiary. +- **OEMSerialNumber** The serial number of the device that is set by the manufacturer. +- **PhoneManufacturer** The friendly name of the phone manufacturer. +- **PowerPlatformRole** The OEM preferred power management profile. It's used to help to identify the basic form factor of the device. +- **SoCName** The firmware manufacturer of the device. +- **StudyID** Used to identify retail and non-retail device. +- **TelemetryLevel** The telemetry level the user has opted into, such as Basic or Enhanced. +- **TelemetryLevelLimitEnhanced** The telemetry level for Windows Analytics-based solutions. +- **TelemetrySettingAuthority** Determines who set the telemetry level, such as GP, MDM, or the user. +- **TPMManufacturerId** The ID of the TPM manufacturer. +- **TPMManufacturerVersion** The version of the TPM manufacturer. +- **TPMVersion** The supported Trusted Platform Module (TPM) on the device. If no TPM is present, the value is 0. +- **VoiceSupported** Does the device have a cellular radio capable of making voice calls? + + +### Census.Memory + +This event sends data about the memory on the device, including ROM and RAM, to help keep Windows up to date. + +The following fields are available: + +- **TotalPhysicalRAM** Represents the physical memory (in MB). +- **TotalVisibleMemory** Represents the memory that is not reserved by the system. + + +### Census.Network + +This event sends data about the mobile and cellular network used by the device (mobile service provider, network, device ID, and service cost factors), to help keep Windows up to date. + +The following fields are available: + +- **IMEI0** Represents the International Mobile Station Equipment Identity. This number is usually unique and used by the mobile operator to distinguish different phone hardware. Microsoft does not have access to mobile operator billing data so collecting this data does not expose or identify the user. The two fields represent phone with dual sim coverage. +- **IMEI1** Represents the International Mobile Station Equipment Identity. This number is usually unique and used by the mobile operator to distinguish different phone hardware. Microsoft does not have access to mobile operator billing data so collecting this data does not expose or identify the user. The two fields represent phone with dual sim coverage. +- **MCC0** Represents the Mobile Country Code (MCC). It used with the Mobile Network Code (MNC) to uniquely identify a mobile network operator. The two fields represent phone with dual sim coverage. +- **MCC1** Represents the Mobile Country Code (MCC). It used with the Mobile Network Code (MNC) to uniquely identify a mobile network operator. The two fields represent phone with dual sim coverage. +- **MEID** Represents the Mobile Equipment Identity (MEID). MEID is a worldwide unique phone ID assigned to CDMA phones. MEID replaces electronic serial number (ESN), and is equivalent to IMEI for GSM and WCDMA phones. Microsoft does not have access to mobile operator billing data so collecting this data does not expose or identify the user. +- **MNC0** Retrieves the Mobile Network Code (MNC). It used with the Mobile Country Code (MCC) to uniquely identify a mobile network operator. The two fields represent phone with dual sim coverage. +- **MNC1** Retrieves the Mobile Network Code (MNC). It used with the Mobile Country Code (MCC) to uniquely identify a mobile network operator. The two fields represent phone with dual sim coverage. +- **MobileOperatorBilling** Represents the telephone company that provides services for mobile phone users. +- **MobileOperatorCommercialized** Represents which reseller and geography the phone is commercialized for. This is the set of values on the phone for who and where it was intended to be used. For example, the commercialized mobile operator code AT&T in the US would be ATT-US. +- **MobileOperatorNetwork0** Represents the operator of the current mobile network that the device is used on. (AT&T, T-Mobile, Vodafone). The two fields represent phone with dual sim coverage. +- **MobileOperatorNetwork1** Represents the operator of the current mobile network that the device is used on. (AT&T, T-Mobile, Vodafone). The two fields represent phone with dual sim coverage. +- **NetworkAdapterGUID** The GUID of the primary network adapter. +- **NetworkCost** Represents the network cost associated with a connection. +- **SPN0** Retrieves the Service Provider Name (SPN). For example, these might be AT&T, Sprint, T-Mobile, or Verizon. The two fields represent phone with dual sim coverage. +- **SPN1** Retrieves the Service Provider Name (SPN). For example, these might be AT&T, Sprint, T-Mobile, or Verizon. The two fields represent phone with dual sim coverage. + + +### Census.OS + +This event sends data about the operating system such as the version, locale, update service configuration, when and how it was originally installed, and whether it is a virtual device, to help keep Windows up to date. + +The following fields are available: + +- **ActivationChannel** Retrieves the retail license key or Volume license key for a machine. +- **AssignedAccessStatus** Kiosk configuration mode. +- **CompactOS** Indicates if the Compact OS feature from Win10 is enabled. +- **DeveloperUnlockStatus** Represents if a device has been developer unlocked by the user or Group Policy. +- **DeviceTimeZone** The time zone that is set on the device. Example: Pacific Standard Time +- **GenuineState** Retrieves the ID Value specifying the OS Genuine check. +- **InstallationType** Retrieves the type of OS installation. (Clean, Upgrade, Reset, Refresh, Update). +- **InstallLanguage** The first language installed on the user machine. +- **IsDeviceRetailDemo** Retrieves if the device is running in demo mode. +- **IsEduData** Returns Boolean if the education data policy is enabled. +- **IsPortableOperatingSystem** Retrieves whether OS is running Windows-To-Go +- **IsSecureBootEnabled** Retrieves whether Boot chain is signed under UEFI. +- **LanguagePacks** The list of language packages installed on the device. +- **LicenseStateReason** Retrieves why (or how) a system is licensed or unlicensed. The HRESULT may indicate an error code that indicates a key blocked error, or it may indicate that we are running an OS License granted by the MS store. +- **OA3xOriginalProductKey** Retrieves the License key stamped by the OEM to the machine. +- **OSEdition** Retrieves the version of the current OS. +- **OSInstallType** Retrieves a numeric description of what install was used on the device i.e. clean, upgrade, refresh, reset, etc +- **OSOOBEDateTime** Retrieves Out of Box Experience (OOBE) Date in Coordinated Universal Time (UTC). +- **OSSKU** Retrieves the Friendly Name of OS Edition. +- **OSSubscriptionStatus** Represents the existing status for enterprise subscription feature for PRO machines. +- **OSSubscriptionTypeId** Returns boolean for enterprise subscription feature for selected PRO machines. +- **OSTimeZoneBiasInMins** Retrieves the time zone set on machine. +- **OSUILocale** Retrieves the locale of the UI that is currently used by the OS. +- **ProductActivationResult** Returns Boolean if the OS Activation was successful. +- **ProductActivationTime** Returns the OS Activation time for tracking piracy issues. +- **ProductKeyID2** Retrieves the License key if the machine is updated with a new license key. +- **RACw7Id** Retrieves the Microsoft Reliability Analysis Component (RAC) Win7 Identifier. RAC is used to monitor and analyze system usage and reliability. +- **ServiceMachineIP** Retrieves the IP address of the KMS host used for anti-piracy. +- **ServiceMachinePort** Retrieves the port of the KMS host used for anti-piracy. +- **ServiceProductKeyID** Retrieves the License key of the KMS +- **SharedPCMode** Returns Boolean for education devices used as shared cart +- **Signature** Retrieves if it is a signature machine sold by Microsoft store. +- **SLICStatus** Whether a SLIC table exists on the device. +- **SLICVersion** Returns OS type/version from SLIC table. + + +### Census.PrivacySettings + +This event provides information about the device level privacy settings and whether device-level access was granted to these capabilities. Not all settings are applicable to all devices. Each field records the consent state for the corresponding privacy setting. The consent state is encoded as a 16-bit signed integer, where the first 8 bits represents the effective consent value, and the last 8 bits represent the authority that set the value. The effective consent (first 8 bits) is one of the following values: -3 = unexpected consent value, -2 = value was not requested, -1 = an error occurred while attempting to retrieve the value, 0 = undefined, 1 = allow, 2 = deny, 3 = prompt. The consent authority (last 8 bits) is one of the following values: -3 = unexpected authority, -2 = value was not requested, -1 = an error occurred while attempting to retrieve the value, 0 = system, 1 = a higher authority (a gating setting, the system-wide setting, or a group policy), 2 = advertising ID group policy, 3 = advertising ID policy for child account, 4 = privacy setting provider doesn't know the actual consent authority, 5 = consent was not configured and a default set in code was used, 6 = system default, 7 = organization policy, 8 = OneSettings. + +The following fields are available: + +- **Activity** Current state of the activity history setting. +- **ActivityHistoryCloudSync** Current state of the activity history cloud sync setting. +- **ActivityHistoryCollection** Current state of the activity history collection setting. +- **AdvertisingId** Current state of the advertising ID setting. +- **AppDiagnostics** Current state of the app diagnostics setting. +- **Appointments** Current state of the calendar setting. +- **Bluetooth** Current state of the Bluetooth capability setting. +- **BluetoothSync** Current state of the Bluetooth sync capability setting. +- **BroadFileSystemAccess** Current state of the broad file system access setting. +- **CellularData** Current state of the cellular data capability setting. +- **Chat** Current state of the chat setting. +- **Contacts** Current state of the contacts setting. +- **DocumentsLibrary** Current state of the documents library setting. +- **Email** Current state of the email setting. +- **FindMyDevice** Current state of the "find my device" setting. +- **GazeInput** Current state of the gaze input setting. +- **HumanInterfaceDevice** Current state of the human interface device setting. +- **InkTypeImprovement** Current state of the improve inking and typing setting. +- **Location** Current state of the location setting. +- **LocationHistory** Current state of the location history setting. +- **LocationHistoryCloudSync** Current state of the location history cloud sync setting. +- **LocationHistoryOnTimeline** Current state of the location history on timeline setting. +- **Microphone** Current state of the microphone setting. +- **PhoneCall** Current state of the phone call setting. +- **PhoneCallHistory** Current state of the call history setting. +- **PicturesLibrary** Current state of the pictures library setting. +- **Radios** Current state of the radios setting. +- **SensorsCustom** Current state of the custom sensor setting. +- **SerialCommunication** Current state of the serial communication setting. +- **Sms** Current state of the text messaging setting. +- **SpeechPersonalization** Current state of the speech services setting. +- **USB** Current state of the USB setting. +- **UserAccountInformation** Current state of the account information setting. +- **UserDataTasks** Current state of the tasks setting. +- **UserNotificationListener** Current state of the notifications setting. +- **VideosLibrary** Current state of the videos library setting. +- **Webcam** Current state of the camera setting. +- **WiFiDirect** Current state of the Wi-Fi direct setting. + + +### Census.Processor + +Provides information on several important data points about Processor settings + +The following fields are available: + +- **KvaShadow** This is the micro code information of the processor. +- **MMSettingOverride** Microcode setting of the processor. +- **MMSettingOverrideMask** Microcode setting override of the processor. +- **PreviousUpdateRevision** Previous microcode revision +- **ProcessorArchitecture** Retrieves the processor architecture of the installed operating system. +- **ProcessorClockSpeed** Clock speed of the processor in MHz. +- **ProcessorCores** Number of logical cores in the processor. +- **ProcessorIdentifier** Processor Identifier of a manufacturer. +- **ProcessorManufacturer** Name of the processor manufacturer. +- **ProcessorModel** Name of the processor model. +- **ProcessorPhysicalCores** Number of physical cores in the processor. +- **ProcessorUpdateRevision** The microcode revision. +- **ProcessorUpdateStatus** Enum value that represents the processor microcode load status +- **SocketCount** Count of CPU sockets. +- **SpeculationControl** Indicates whether the system has enabled protections needed to validate the speculation control vulnerability. + + +### Census.Security + +This event provides information on about security settings used to help keep Windows up to date and secure. + +The following fields are available: + +- **AvailableSecurityProperties** This field helps to enumerate and report state on the relevant security properties for Device Guard. +- **CGRunning** Credential Guard isolates and hardens key system and user secrets against compromise, helping to minimize the impact and breadth of a Pass the Hash style attack in the event that malicious code is already running via a local or network based vector. This field tells if Credential Guard is running. +- **DGState** This field summarizes the Device Guard state. +- **HVCIRunning** Hypervisor Code Integrity (HVCI) enables Device Guard to help protect kernel mode processes and drivers from vulnerability exploits and zero days. HVCI uses the processor’s functionality to force all software running in kernel mode to safely allocate memory. This field tells if HVCI is running. +- **IsSawGuest** Indicates whether the device is running as a Secure Admin Workstation Guest. +- **IsSawHost** Indicates whether the device is running as a Secure Admin Workstation Host. +- **RequiredSecurityProperties** Describes the required security properties to enable virtualization-based security. +- **SecureBootCapable** Systems that support Secure Boot can have the feature turned off via BIOS. This field tells if the system is capable of running Secure Boot, regardless of the BIOS setting. +- **SModeState** The Windows S mode trail state. +- **VBSState** Virtualization-based security (VBS) uses the hypervisor to help protect the kernel and other parts of the operating system. Credential Guard and Hypervisor Code Integrity (HVCI) both depend on VBS to isolate/protect secrets, and kernel-mode code integrity validation. VBS has a tri-state that can be Disabled, Enabled, or Running. + + +### Census.Speech + +This event is used to gather basic speech settings on the device. + +The following fields are available: + +- **AboveLockEnabled** Cortana setting that represents if Cortana can be invoked when the device is locked. +- **GPAllowInputPersonalization** Indicates if a Group Policy setting has enabled speech functionalities. +- **HolographicSpeechInputDisabled** Holographic setting that represents if the attached HMD devices have speech functionality disabled by the user. +- **HolographicSpeechInputDisabledRemote** Indicates if a remote policy has disabled speech functionalities for the HMD devices. +- **KeyVer** Version information for the census speech event. +- **KWSEnabled** Cortana setting that represents if a user has enabled the "Hey Cortana" keyword spotter (KWS). +- **MDMAllowInputPersonalization** Indicates if an MDM policy has enabled speech functionalities. +- **RemotelyManaged** Indicates if the device is being controlled by a remote administrator (MDM or Group Policy) in the context of speech functionalities. +- **SpeakerIdEnabled** Cortana setting that represents if keyword detection has been trained to try to respond to a single user's voice. +- **SpeechServicesEnabled** Windows setting that represents whether a user is opted-in for speech services on the device. +- **SpeechServicesValueSource** Indicates the deciding factor for the effective online speech recognition privacy policy settings: remote admin, local admin, or user preference. + + +### Census.Storage + +This event sends data about the total capacity of the system volume and primary disk, to help keep Windows up to date. + +The following fields are available: + +- **PrimaryDiskTotalCapacity** Retrieves the amount of disk space on the primary disk of the device in MB. +- **PrimaryDiskType** Retrieves an enumerator value of type STORAGE_BUS_TYPE that indicates the type of bus to which the device is connected. This should be used to interpret the raw device properties at the end of this structure (if any). +- **StorageReservePassedPolicy** Indicates whether the Storage Reserve policy, which ensures that updates have enough disk space and customers are on the latest OS, is enabled on this device. +- **SystemVolumeTotalCapacity** Retrieves the size of the partition that the System volume is installed on in MB. + + +### Census.Userdefault + +This event sends data about the current user's default preferences for browser and several of the most popular extensions and protocols, to help keep Windows up to date. + +The following fields are available: + +- **CalendarType** The calendar identifiers that are used to specify different calendars. +- **DefaultApp** The current uer's default program selected for the following extension or protocol: .html, .htm, .jpg, .jpeg, .png, .mp3, .mp4, .mov, .pdf. +- **DefaultBrowserProgId** The ProgramId of the current user's default browser. +- **LongDateFormat** The long date format the user has selected. +- **ShortDateFormat** The short date format the user has selected. + + +### Census.UserDisplay + +This event sends data about the logical/physical display size, resolution and number of internal/external displays, and VRAM on the system, to help keep Windows up to date. + +The following fields are available: + +- **InternalPrimaryDisplayLogicalDPIX** Retrieves the logical DPI in the x-direction of the internal display. +- **InternalPrimaryDisplayLogicalDPIY** Retrieves the logical DPI in the y-direction of the internal display. +- **InternalPrimaryDisplayPhysicalDPIX** Retrieves the physical DPI in the x-direction of the internal display. +- **InternalPrimaryDisplayPhysicalDPIY** Retrieves the physical DPI in the y-direction of the internal display. +- **InternalPrimaryDisplayResolutionHorizontal** Retrieves the number of pixels in the horizontal direction of the internal display. +- **InternalPrimaryDisplayResolutionVertical** Retrieves the number of pixels in the vertical direction of the internal display. +- **InternalPrimaryDisplaySizePhysicalH** Retrieves the physical horizontal length of the display in mm. Used for calculating the diagonal length in inches . +- **InternalPrimaryDisplaySizePhysicalY** Retrieves the physical vertical length of the display in mm. Used for calculating the diagonal length in inches +- **NumberofExternalDisplays** Retrieves the number of external displays connected to the machine +- **NumberofInternalDisplays** Retrieves the number of internal displays in a machine. +- **VRAMDedicated** Retrieves the video RAM in MB. +- **VRAMDedicatedSystem** Retrieves the amount of memory on the dedicated video card. +- **VRAMSharedSystem** Retrieves the amount of RAM memory that the video card can use. + + +### Census.UserNLS + +This event sends data about the default app language, input, and display language preferences set by the user, to help keep Windows up to date. + +The following fields are available: + +- **DefaultAppLanguage** The current user Default App Language. +- **DisplayLanguage** The current user preferred Windows Display Language. +- **HomeLocation** The current user location, which is populated using GetUserGeoId() function. +- **KeyboardInputLanguages** The Keyboard input languages installed on the device. +- **SpeechInputLanguages** The Speech Input languages installed on the device. + + +### Census.UserPrivacySettings + +This event provides information about the current users privacy settings and whether device-level access was granted to these capabilities. Not all settings are applicable to all devices. Each field records the consent state for the corresponding privacy setting. The consent state is encoded as a 16-bit signed integer, where the first 8 bits represents the effective consent value, and the last 8 bits represents the authority that set the value. The effective consent is one of the following values: -3 = unexpected consent value, -2 = value was not requested, -1 = an error occurred while attempting to retrieve the value, 0 = undefined, 1 = allow, 2 = deny, 3 = prompt. The consent authority is one of the following values: -3 = unexpected authority, -2 = value was not requested, -1 = an error occurred while attempting to retrieve the value, 0 = user, 1 = a higher authority (a gating setting, the system-wide setting, or a group policy), 2 = advertising ID group policy, 3 = advertising ID policy for child account, 4 = privacy setting provider doesn't know the actual consent authority, 5 = consent was not configured and a default set in code was used, 6 = system default, 7 = organization policy, 8 = OneSettings. + +The following fields are available: + +- **Activity** Current state of the activity history setting. +- **ActivityHistoryCloudSync** Current state of the activity history cloud sync setting. +- **ActivityHistoryCollection** Current state of the activity history collection setting. +- **AdvertisingId** Current state of the advertising ID setting. +- **AppDiagnostics** Current state of the app diagnostics setting. +- **Appointments** Current state of the calendar setting. +- **Bluetooth** Current state of the Bluetooth capability setting. +- **BluetoothSync** Current state of the Bluetooth sync capability setting. +- **BroadFileSystemAccess** Current state of the broad file system access setting. +- **CellularData** Current state of the cellular data capability setting. +- **Chat** Current state of the chat setting. +- **Contacts** Current state of the contacts setting. +- **DocumentsLibrary** Current state of the documents library setting. +- **Email** Current state of the email setting. +- **GazeInput** Current state of the gaze input setting. +- **HumanInterfaceDevice** Current state of the human interface device setting. +- **InkTypeImprovement** Current state of the improve inking and typing setting. +- **InkTypePersonalization** Current state of the inking and typing personalization setting. +- **Location** Current state of the location setting. +- **LocationHistory** Current state of the location history setting. +- **LocationHistoryCloudSync** Current state of the location history cloud synchronization setting. +- **LocationHistoryOnTimeline** Current state of the location history on timeline setting. +- **Microphone** Current state of the microphone setting. +- **PhoneCall** Current state of the phone call setting. +- **PhoneCallHistory** Current state of the call history setting. +- **PicturesLibrary** Current state of the pictures library setting. +- **Radios** Current state of the radios setting. +- **SensorsCustom** Current state of the custom sensor setting. +- **SerialCommunication** Current state of the serial communication setting. +- **Sms** Current state of the text messaging setting. +- **SpeechPersonalization** Current state of the speech services setting. +- **USB** Current state of the USB setting. +- **UserAccountInformation** Current state of the account information setting. +- **UserDataTasks** Current state of the tasks setting. +- **UserNotificationListener** Current state of the notifications setting. +- **VideosLibrary** Current state of the videos library setting. +- **Webcam** Current state of the camera setting. +- **WiFiDirect** Current state of the Wi-Fi direct setting. + + +### Census.VM + +This event sends data indicating whether virtualization is enabled on the device, and its various characteristics, to help keep Windows up to date. + +The following fields are available: + +- **CloudService** Indicates which cloud service, if any, that this virtual machine is running within. +- **HyperVisor** Retrieves whether the current OS is running on top of a Hypervisor. +- **IOMMUPresent** Represents if an input/output memory management unit (IOMMU) is present. +- **IsVDI** Is the device using Virtual Desktop Infrastructure? +- **IsVirtualDevice** Retrieves that when the Hypervisor is Microsoft's Hyper-V Hypervisor or other Hv#1 Hypervisor, this field will be set to FALSE for the Hyper-V host OS and TRUE for any guest OS's. This field should not be relied upon for non-Hv#1 Hypervisors. +- **SLATSupported** Represents whether Second Level Address Translation (SLAT) is supported by the hardware. +- **VirtualizationFirmwareEnabled** Represents whether virtualization is enabled in the firmware. + + +### Census.WU + +This event sends data about the Windows update server and other App store policies, to help keep Windows up to date. + +The following fields are available: + +- **AppraiserGatedStatus** Indicates whether a device has been gated for upgrading. +- **AppStoreAutoUpdate** Retrieves the Appstore settings for auto upgrade. (Enable/Disabled). +- **AppStoreAutoUpdateMDM** Retrieves the App Auto Update value for MDM: 0 - Disallowed. 1 - Allowed. 2 - Not configured. Default: [2] Not configured +- **AppStoreAutoUpdatePolicy** Retrieves the Microsoft Store App Auto Update group policy setting +- **DelayUpgrade** Retrieves the Windows upgrade flag for delaying upgrades. +- **OSAssessmentFeatureOutOfDate** How many days has it been since a the last feature update was released but the device did not install it? +- **OSAssessmentForFeatureUpdate** Is the device is on the latest feature update? +- **OSAssessmentForQualityUpdate** Is the device on the latest quality update? +- **OSAssessmentForSecurityUpdate** Is the device on the latest security update? +- **OSAssessmentQualityOutOfDate** How many days has it been since a the last quality update was released but the device did not install it? +- **OSAssessmentReleaseInfoTime** The freshness of release information used to perform an assessment. +- **OSRollbackCount** The number of times feature updates have rolled back on the device. +- **OSRolledBack** A flag that represents when a feature update has rolled back during setup. +- **OSUninstalled** A flag that represents when a feature update is uninstalled on a device . +- **OSWUAutoUpdateOptions** Retrieves the auto update settings on the device. +- **OSWUAutoUpdateOptionsSource** The source of auto update setting that appears in the OSWUAutoUpdateOptions field. For example: Group Policy (GP), Mobile Device Management (MDM), and Default. +- **UninstallActive** A flag that represents when a device has uninstalled a previous upgrade recently. +- **UpdateServiceURLConfigured** Retrieves if the device is managed by Windows Server Update Services (WSUS). +- **WUDeferUpdatePeriod** Retrieves if deferral is set for Updates. +- **WUDeferUpgradePeriod** Retrieves if deferral is set for Upgrades. +- **WUDODownloadMode** Retrieves whether DO is turned on and how to acquire/distribute updates Delivery Optimization (DO) allows users to deploy previously downloaded WU updates to other devices on the same network. +- **WUMachineId** Retrieves the Windows Update (WU) Machine Identifier. +- **WUPauseState** Retrieves WU setting to determine if updates are paused. +- **WUServer** Retrieves the HTTP(S) URL of the WSUS server that is used by Automatic Updates and API callers (by default). + + +### Census.Xbox + +This event sends data about the Xbox Console, such as Serial Number and DeviceId, to help keep Windows up to date. + +The following fields are available: + +- **XboxConsolePreferredLanguage** Retrieves the preferred language selected by the user on Xbox console. +- **XboxConsoleSerialNumber** Retrieves the serial number of the Xbox console. +- **XboxLiveDeviceId** Retrieves the unique device ID of the console. +- **XboxLiveSandboxId** Retrieves the developer sandbox ID if the device is internal to Microsoft. + + +## Common data extensions + +### Common Data Extensions.app + +Describes the properties of the running application. This extension could be populated by a client app or a web app. + +The following fields are available: + +- **asId** An integer value that represents the app session. This value starts at 0 on the first app launch and increments after each subsequent app launch per boot session. +- **env** The environment from which the event was logged. +- **expId** Associates a flight, such as an OS flight, or an experiment, such as a web site UX experiment, with an event. +- **id** Represents a unique identifier of the client application currently loaded in the process producing the event; and is used to group events together and understand usage pattern, errors by application. +- **locale** The locale of the app. +- **name** The name of the app. +- **userId** The userID as known by the application. +- **ver** Represents the version number of the application. Used to understand errors by Version, Usage by Version across an app. + + +### Common Data Extensions.container + +Describes the properties of the container for events logged within a container. + +The following fields are available: + +- **epoch** An ID that's incremented for each SDK initialization. +- **localId** The device ID as known by the client. +- **osVer** The operating system version. +- **seq** An ID that's incremented for each event. +- **type** The container type. Examples: Process or VMHost + + +### Common Data Extensions.cs + +Describes properties related to the schema of the event. + +The following fields are available: + +- **sig** A common schema signature that identifies new and modified event schemas. + + +### Common Data Extensions.device + +Describes the device-related fields. + +The following fields are available: + +- **deviceClass** The device classification. For example, Desktop, Server, or Mobile. +- **localId** A locally-defined unique ID for the device. This is not the human-readable device name. Most likely equal to the value stored at HKLM\Software\Microsoft\SQMClient\MachineId +- **make** Device manufacturer. +- **model** Device model. + + +### Common Data Extensions.Envelope + +Represents an envelope that contains all of the common data extensions. + +The following fields are available: + +- **cV** Represents the Correlation Vector: A single field for tracking partial order of related telemetry events across component boundaries. +- **data** Represents the optional unique diagnostic data for a particular event schema. +- **ext_app** Describes the properties of the running application. This extension could be populated by either a client app or a web app. See [Common Data Extensions.app](#common-data-extensionsapp). +- **ext_container** Describes the properties of the container for events logged within a container. See [Common Data Extensions.container](#common-data-extensionscontainer). +- **ext_cs** Describes properties related to the schema of the event. See [Common Data Extensions.cs](#common-data-extensionscs). +- **ext_device** Describes the device-related fields. See [Common Data Extensions.device](#common-data-extensionsdevice). +- **ext_os** Describes the operating system properties that would be populated by the client. See [Common Data Extensions.os](#common-data-extensionsos). +- **ext_receipts** Describes the fields related to time as provided by the client for debugging purposes. See [Common Data Extensions.receipts](#common-data-extensionsreceipts). +- **ext_sdk** Describes the fields related to a platform library required for a specific SDK. See [Common Data Extensions.sdk](#common-data-extensionssdk). +- **ext_user** Describes the fields related to a user. See [Common Data Extensions.user](#common-data-extensionsuser). +- **ext_utc** Describes the fields that might be populated by a logging library on Windows. See [Common Data Extensions.utc](#common-data-extensionsutc). +- **ext_xbl** Describes the fields related to XBOX Live. See [Common Data Extensions.xbl](#common-data-extensionsxbl). +- **flags** Represents a collection of bits that describe how the event should be processed by the Connected User Experience and Telemetry component pipeline. The lowest-order byte is the event persistence. The next byte is the event latency. +- **iKey** Represents an ID for applications or other logical groupings of events. +- **name** Represents the uniquely qualified name for the event. +- **popSample** Represents the effective sample rate for this event at the time it was generated by a client. +- **time** Represents the event date time in Coordinated Universal Time (UTC) when the event was generated on the client. This should be in ISO 8601 format. +- **ver** Represents the major and minor version of the extension. + + +### Common Data Extensions.os + +Describes some properties of the operating system. + +The following fields are available: + +- **bootId** An integer value that represents the boot session. This value starts at 0 on first boot after OS install and increments after every reboot. +- **expId** Represents the experiment ID. The standard for associating a flight, such as an OS flight (pre-release build), or an experiment, such as a web site UX experiment, with an event is to record the flight / experiment IDs in Part A of the common schema. +- **locale** Represents the locale of the operating system. +- **name** Represents the operating system name. +- **ver** Represents the major and minor version of the extension. + + +### Common Data Extensions.receipts + +Represents various time information as provided by the client and helps for debugging purposes. + +The following fields are available: + +- **originalTime** The original event time. +- **uploadTime** The time the event was uploaded. + + +### Common Data Extensions.sdk + +Used by platform specific libraries to record fields that are required for a specific SDK. + +The following fields are available: + +- **epoch** An ID that is incremented for each SDK initialization. +- **installId** An ID that's created during the initialization of the SDK for the first time. +- **libVer** The SDK version. +- **seq** An ID that is incremented for each event. + + +### Common Data Extensions.user + +Describes the fields related to a user. + +The following fields are available: + +- **authId** This is an ID of the user associated with this event that is deduced from a token such as a Microsoft Account ticket or an XBOX token. +- **locale** The language and region. +- **localId** Represents a unique user identity that is created locally and added by the client. This is not the user's account ID. + + +### Common Data Extensions.utc + +Describes the properties that could be populated by a logging library on Windows. + +The following fields are available: + +- **aId** Represents the ETW ActivityId. Logged via TraceLogging or directly via ETW. +- **bSeq** Upload buffer sequence number in the format: buffer identifier:sequence number +- **cat** Represents a bitmask of the ETW Keywords associated with the event. +- **cpId** The composer ID, such as Reference, Desktop, Phone, Holographic, Hub, IoT Composer. +- **epoch** Represents the epoch and seqNum fields, which help track how many events were fired and how many events were uploaded, and enables identification of data lost during upload and de-duplication of events on the ingress server. +- **flags** Represents the bitmap that captures various Windows specific flags. +- **mon** Combined monitor and event sequence numbers in the format: monitor sequence : event sequence +- **op** Represents the ETW Op Code. +- **raId** Represents the ETW Related ActivityId. Logged via TraceLogging or directly via ETW. +- **seq** Represents the sequence field used to track absolute order of uploaded events. It is an incrementing identifier for each event added to the upload queue. The Sequence helps track how many events were fired and how many events were uploaded and enables identification of data lost during upload and de-duplication of events on the ingress server. +- **stId** Represents the Scenario Entry Point ID. This is a unique GUID for each event in a diagnostic scenario. This used to be Scenario Trigger ID. + + +### Common Data Extensions.xbl + +Describes the fields that are related to XBOX Live. + +The following fields are available: + +- **claims** Any additional claims whose short claim name hasn't been added to this structure. +- **did** XBOX device ID +- **dty** XBOX device type +- **dvr** The version of the operating system on the device. +- **eid** A unique ID that represents the developer entity. +- **exp** Expiration time +- **ip** The IP address of the client device. +- **nbf** Not before time +- **pid** A comma separated list of PUIDs listed as base10 numbers. +- **sbx** XBOX sandbox identifier +- **sid** The service instance ID. +- **sty** The service type. +- **tid** The XBOX Live title ID. +- **tvr** The XBOX Live title version. +- **uts** A bit field, with 2 bits being assigned to each user ID listed in xid. This field is omitted if all users are retail accounts. +- **xid** A list of base10-encoded XBOX User IDs. + + +## Common data fields + +### Ms.Device.DeviceInventoryChange + +Describes the installation state for all hardware and software components available on a particular device. + +The following fields are available: + +- **action** The change that was invoked on a device inventory object. +- **inventoryId** Device ID used for Compatibility testing +- **objectIîstanceId** No content is currently available. +- **objectInstanceId** Object identity which is unique within the device scope. +- **objectType** Indicates the object type that the event applies to. +- **syncId** A string used to group StartSync, EndSync, Add, and Remove operations that belong together. This field is unique by Sync period and is used to disambiguate in situations where multiple agents perform overlapping inventories for the same object. + + +## Compatibility events + +### Microsoft.Windows.Compatibility.Apphelp.SdbFix + +Product instrumentation for helping debug/troubleshoot issues with inbox compatibility components. + +The following fields are available: + +- **AppName** Name of the application impacted by SDB. +- **FixID** SDB GUID. +- **Flags** List of flags applied. +- **ImageName** Name of file. + + +## Component-based servicing events + +### CbsServicingProvider.CbsCapabilityEnumeration + +This event reports on the results of scanning for optional Windows content on Windows Update. + +The following fields are available: + +- **architecture** Indicates the scan was limited to the specified architecture. +- **capabilityCount** The number of optional content packages found during the scan. +- **clientId** The name of the application requesting the optional content. +- **duration** The amount of time it took to complete the scan. +- **hrStatus** The HReturn code of the scan. +- **language** Indicates the scan was limited to the specified language. +- **majorVersion** Indicates the scan was limited to the specified major version. +- **minorVersion** Indicates the scan was limited to the specified minor version. +- **namespace** Indicates the scan was limited to packages in the specified namespace. +- **sourceFilter** A bitmask indicating the scan checked for locally available optional content. +- **stackBuild** The build number of the servicing stack. +- **stackMajorVersion** The major version number of the servicing stack. +- **stackMinorVersion** The minor version number of the servicing stack. +- **stackRevision** The revision number of the servicing stack. + + +### CbsServicingProvider.CbsCapabilitySessionFinalize + +This event provides information about the results of installing or uninstalling optional Windows content from Windows Update. + +The following fields are available: + +- **capabilities** The names of the optional content packages that were installed. +- **clientId** The name of the application requesting the optional content. +- **currentID** The ID of the current install session. +- **downloadSource** The source of the download. +- **highestState** The highest final install state of the optional content. +- **hrLCUReservicingStatus** Indicates whether the optional content was updated to the latest available version. +- **hrStatus** The HReturn code of the install operation. +- **rebootCount** The number of reboots required to complete the install. +- **retryID** The session ID that will be used to retry a failed operation. +- **retryStatus** Indicates whether the install will be retried in the event of failure. +- **stackBuild** The build number of the servicing stack. +- **stackMajorVersion** The major version number of the servicing stack. +- **stackMinorVersion** The minor version number of the servicing stack. +- **stackRevision** The revision number of the servicing stack. + + +### CbsServicingProvider.CbsCapabilitySessionPended + +This event provides information about the results of installing optional Windows content that requires a reboot to keep Windows up to date. + +The following fields are available: + +- **clientId** The name of the application requesting the optional content. +- **pendingDecision** Indicates the cause of reboot, if applicable. + + +### CbsServicingProvider.CbsLateAcquisition + +This event sends data to indicate if some Operating System packages could not be updated as part of an upgrade, to help keep Windows up to date. + +The following fields are available: + +- **Features** The list of feature packages that could not be updated. +- **RetryID** The ID identifying the retry attempt to update the listed packages. + + +### CbsServicingProvider.CbsPackageRemoval + +This event provides information about the results of uninstalling a Windows Cumulative Security Update to help keep Windows up to date. + +The following fields are available: + +- **buildVersion** The build number of the security update being uninstalled. +- **clientId** The name of the application requesting the uninstall. +- **currentStateEnd** The final state of the update after the operation. +- **failureDetails** Information about the cause of a failure, if applicable. +- **failureSourceEnd** The stage during the uninstall where the failure occurred. +- **hrStatusEnd** The overall exit code of the operation. +- **initiatedOffline** Indicates if the uninstall was initiated for a mounted Windows image. +- **majorVersion** The major version number of the security update being uninstalled. +- **minorVersion** The minor version number of the security update being uninstalled. +- **originalState** The starting state of the update before the operation. +- **pendingDecision** Indicates the cause of reboot, if applicable. +- **primitiveExecutionContext** The state during system startup when the uninstall was completed. +- **revisionVersion** The revision number of the security update being uninstalled. +- **transactionCanceled** Indicates whether the uninstall was cancelled. + + +### CbsServicingProvider.CbsQualityUpdateInstall + +This event reports on the performance and reliability results of installing Servicing content from Windows Update to keep Windows up to date. + +The following fields are available: + +- **buildVersion** The build version number of the update package. +- **clientId** The name of the application requesting the optional content. +- **corruptionHistoryFlags** A bitmask of the types of component store corruption that have caused update failures on the device. +- **corruptionType** An enumeration listing the type of data corruption responsible for the current update failure. +- **currentStateEnd** The final state of the package after the operation has completed. +- **doqTimeSeconds** The time in seconds spent updating drivers. +- **executeTimeSeconds** The number of seconds required to execute the install. +- **failureDetails** The driver or installer that caused the update to fail. +- **failureSourceEnd** An enumeration indicating at what phase of the update a failure occurred. +- **hrStatusEnd** The return code of the install operation. +- **initiatedOffline** A true or false value indicating whether the package was installed into an offline Windows Imaging Format (WIM) file. +- **majorVersion** The major version number of the update package. +- **minorVersion** The minor version number of the update package. +- **originalState** The starting state of the package. +- **overallTimeSeconds** The time (in seconds) to perform the overall servicing operation. +- **planTimeSeconds** The time in seconds required to plan the update operations. +- **poqTimeSeconds** The time in seconds processing file and registry operations. +- **postRebootTimeSeconds** The time (in seconds) to do startup processing for the update. +- **preRebootTimeSeconds** The time (in seconds) between execution of the installation and the reboot. +- **primitiveExecutionContext** An enumeration indicating at what phase of shutdown or startup the update was installed. +- **rebootCount** The number of reboots required to install the update. +- **rebootTimeSeconds** The time (in seconds) before startup processing begins for the update. +- **resolveTimeSeconds** The time in seconds required to resolve the packages that are part of the update. +- **revisionVersion** The revision version number of the update package. +- **rptTimeSeconds** The time in seconds spent executing installer plugins. +- **shutdownTimeSeconds** The time (in seconds) required to do shutdown processing for the update. +- **stackRevision** The revision number of the servicing stack. +- **stageTimeSeconds** The time (in seconds) required to stage all files that are part of the update. + + +## Deployment extensions + +### DeploymentTelemetry.Deployment_End + +This event indicates that a Deployment 360 API has completed. + +The following fields are available: + +- **ClientId** Client ID of the user utilizing the D360 API. +- **ErrorCode** Error code of action. +- **FlightId** The specific ID of the Windows Insider build the device is getting. +- **Mode** Phase in upgrade. +- **RelatedCV** The correction vector (CV) of any other related events +- **Result** End result of the action. + + +### DeploymentTelemetry.Deployment_SetupBoxLaunch + +This event indicates that the Deployment 360 APIs have launched Setup Box. + +The following fields are available: + +- **ClientId** The client ID of the user utilizing the D360 API. +- **FlightId** The specific ID of the Windows Insider build the device is getting. +- **Quiet** Whether Setup will run in quiet mode or full mode. +- **RelatedCV** The correlation vector (CV) of any other related events. +- **SetupMode** The current setup phase. + + +### DeploymentTelemetry.Deployment_SetupBoxResult + +This event indicates that the Deployment 360 APIs have received a return from Setup Box. + +The following fields are available: + +- **ClientId** Client ID of the user utilizing the D360 API. +- **ErrorCode** Error code of the action. +- **FlightId** The specific ID of the Windows Insider build the device is getting. +- **Quiet** Indicates whether Setup will run in quiet mode or full mode. +- **RelatedCV** The correlation vector (CV) of any other related events. +- **SetupMode** The current Setup phase. + + +### DeploymentTelemetry.Deployment_Start + +This event indicates that a Deployment 360 API has been called. + +The following fields are available: + +- **ClientId** Client ID of the user utilizing the D360 API. +- **FlightId** The specific ID of the Windows Insider build the device is getting. +- **Mode** The current phase of the upgrade. +- **RelatedCV** The correlation vector (CV) of any other related events. + + +## Diagnostic data events + +### TelClientSynthetic.AuthorizationInfo_RuntimeTransition + +This event sends data indicating that a device has undergone a change of telemetry opt-in level detected at UTC startup, to help keep Windows up to date. The telemetry opt-in level signals what data we are allowed to collect. + +The following fields are available: + +- **CanAddMsaToMsTelemetry** True if we can add MSA PUID and CID to telemetry, false otherwise. +- **CanCollectAnyTelemetry** True if we are allowed to collect partner telemetry, false otherwise. +- **CanCollectCoreTelemetry** True if we can collect CORE/Basic telemetry, false otherwise. +- **CanCollectHeartbeats** True if we can collect heartbeat telemetry, false otherwise. +- **CanCollectOsTelemetry** True if we can collect diagnostic data telemetry, false otherwise. +- **CanCollectWindowsAnalyticsEvents** True if we can collect Windows Analytics data, false otherwise. +- **CanPerformDiagnosticEscalations** True if we can perform diagnostic escalation collection, false otherwise. +- **CanPerformTraceEscalations** True if we can perform trace escalation collection, false otherwise. +- **CanReportScenarios** True if we can report scenario completions, false otherwise. +- **PreviousPermissions** Bitmask of previous telemetry state. +- **TransitionFromEverythingOff** True if we are transitioning from all telemetry being disabled, false otherwise. + + +### TelClientSynthetic.AuthorizationInfo_Startup + +Fired by UTC at startup to signal what data we are allowed to collect. + +The following fields are available: + +- **CanAddMsaToMsTelemetry** True if we can add MSA PUID and CID to telemetry, false otherwise. +- **CanCol|ectCoreTelemetry** No content is currently available. +- **CanCollactCoreTelemetry** No content is currently available. +- **CanCollectAnyTelemetry** True if we are allowed to collect partner telemetry, false otherwise. +- **CanCollectCoreTelemetry** True if we can collect CORE/Basic telemetry, false otherwise. +- **CanCollectHeartbeats** True if we can collect heartbeat telemetry, false otherwise. +- **CanCollectOsTelemetry** True if we can collect diagnostic data telemetry, false otherwise. +- **CanCollectWindowsAnalyticsEvents** True if we can collect Windows Analytics data, false otherwise. +- **CanPerformDiagnosticEscalations** True if we can perform diagnostic escalation collection, false otherwise. +- **CanPerformDiagnostigEscalations** No content is currently available. +- **CanPerformDkagnosticEscalations** No content is currently available. +- **CanPerformTraceEscalations** True if we can perform trace escalation collection, false otherwise. +- **CanReportScanarios** No content is currently available. +- **CanReportScenarios** True if we can report scenario completions, false otherwise. +- **PreviousPermissions** Bitmask of previous telemetry state. +- **TransitionFromEverythingOff** True if we are transitioning from all telemetry being disabled, false otherwise. + + +### TelClientSynthetic.ConnectivityHeartBeat_0 + +This event sends data about the connectivity status of the Connected User Experience and Telemetry component that uploads telemetry events. If an unrestricted free network (such as Wi-Fi) is available, this event updates the last successful upload time. Otherwise, it checks whether a Connectivity Heartbeat event was fired in the past 24 hours, and if not, it fires an event. A Connectivity Heartbeat event also fires when a device recovers from costed network to free network. + +The following fields are available: + +- **CensusExitCode** Returns last execution codes from census client run. +- **CensusStartTime** Returns timestamp corresponding to last successful census run. +- **CensusTaskEnabled** Returns Boolean value for the census task (Enable/Disable) on client machine. +- **LastConnectivityLossTime** Retrieves the last time the device lost free network. +- **NetworkState** Retrieves the network state: 0 = No network. 1 = Restricted network. 2 = Free network. +- **NoNetworkTime** Retrieves the time spent with no network (since the last time) in seconds. +- **RestrictedNetworkTime** Retrieves the time spent on a metered (cost restricted) network in seconds. + + +### TelClientSynthetic.HeartBeat_5 + +This event sends data about the health and quality of the diagnostic data from the given device, to help keep Windows up to date. It also enables data analysts to determine how 'trusted' the data is from a given device. + +The following fields are available: + +- **AgentConnctionErrorsCount** No content is currently available. +- **AgentConnectionErrorsCount** Number of non-timeout errors associated with the host/agent channel. +- **AgenticenectionErrorsCount** No content is currently available. +- **CeesusExitCode** No content is currently available. +- **CeesusStartTime** No content is currently available. +- **CeesusTaskEnabled** No content is currently available. +- **CensusExitCode** The last exit code of the Census task. +- **CensusStartTime** Time of last Census run. +- **CensusTaskEnabled** True if Census is enabled, false otherwise. +- **CompressedBytesUploaded** Number of compressed bytes uploaded. +- **ConsumerDroppedCount** Number of events dropped at consumer layer of telemetry client. +- **CriticalDataDbDroppedCount** Number of critical data sampled events dropped at the database layer. +- **CriticalDataDbLroppedCount** No content is currently available. +- **CriticalDataDhrottleDroppedCount** No content is currently available. +- **CriticalDataThrottleDroppedCount** The number of critical data sampled events that were dropped because of throttling. +- **CriticalOverflowEntersCounter** Number of times critical overflow mode was entered in event DB. +- **CriticamOverflowEntersCounter** No content is currently available. +- **DbCriticalDroppedCount** Total number of dropped critical events in event DB. +- **DbDroppedCount** Number of events dropped due to DB fullness. +- **DbDroppedFailureCount** Number of events dropped due to DB failures. +- **DbDroppedFullCount** Number of events dropped due to DB fullness. +- **DbDroppedOailureCount** No content is currently available. +- **DbDroppedOullCount** No content is currently available. +- **DecodingDroppedCount** Number of events dropped due to decoding failures. +- **DhrottledDroppedCount** No content is currently available. +- **EnteringCriticalOverflowDroppedCounter** Number of events dropped due to critical overflow mode being initiated. +- **EtwDroppedBufferCount** Number of buffers dropped in the UTC ETW session. +- **EtwDroppedCount** Number of events dropped at ETW layer of telemetry client. +- **Eve~tStoreResetCounter** No content is currently available. +- **EventSC06eLifetimeResetCounter** No content is currently available. +- **EventSC06eResetCounter** No content is currently available. +- **EventSC06eResetSizeSum** No content is currently available. +- **EventsPersistedCount** Number of events that reached the PersistEvent stage. +- **EventStoreLifetimeResetCounter** Number of times event DB was reset for the lifetime of UTC. +- **EventStoreResetCounter** Number of times event DB was reset. +- **EventStoreResetSizeSum** Total size of event DB across all resets reports in this instance. +- **EventSubStoreResetCounter** Number of times event DB was reset. +- **EventSubStoreResetSizeSum** Total size of event DB across all resets reports in this instance. +- **EventsUploaded** Number of events uploaded. +- **Flags** Flags indicating device state such as network state, battery state, and opt-in state. +- **FullTriggerBufferDroppedCount** Number of events dropped due to trigger buffer being full. +- **HeartBeatSequenceNumber** The sequence number of this heartbeat. +- **icesumerDroppedCount** No content is currently available. +- **icmpressedBytesUploaded** No content is currently available. +- **InvalidHttpCodeCount** Number of invalid HTTP codes received from contacting Vortex. +- **LastAgentConnectionError** Last non-timeout error encountered in the host/agent channel. +- **LastAgenticenectionError** No content is currently available. +- **LastEventSizeOffender** Event name of last event which exceeded max event size. +- **LastInvalidHttpCode** Last invalid HTTP code received from Vortex. +- **LastreReseizeOffender** No content is currently available. +- **MaxActiveAgentConnectionCount** The maximum number of active agents during this heartbeat timeframe. +- **MaxActiveAgenticenectionCount** No content is currently available. +- **MaxInUseScenarioCounter** Soft maximum number of scenarios loaded by UTC. +- **Olags** No content is currently available. +- **OullTriggerBufferDroppedCount** No content is currently available. +- **PreviousHeartBeatTime** Time of last heartbeat event (allows chaining of events). +- **PrivacyBlockedCount** The number of events blocked due to privacy settings or tags. +- **RepeatedUploadFailureDropped** Number of events lost due to repeated upload failures for a single buffer. +- **SettingsHttpAttempts** Number of attempts to contact OneSettings service. +- **SettingsHttpFailures** The number of failures from contacting the OneSettings service. +- **ThrottledDroppedCount** Number of events dropped due to throttling of noisy providers. +- **TopUploaderErrors** List of top errors received from the upload endpoint. +- **UploaderDroppedCount** Number of events dropped at the uploader layer of telemetry client. +- **UploaderErrorCount** Number of errors received from the upload endpoint. +- **VortexFailuresTimeout** The number of timeout failures received from Vortex. +- **VortexHttpAttempts** Number of attempts to contact Vortex. +- **VortexHttpFailures4xS** No content is currently available. +- **VortexHttpFailures4xx** Number of 400-499 error codes received from Vortex. +- **VortexHttpFailures5xS** No content is currently available. +- **VortexHttpFailures5xx** Number of 500-599 error codes received from Vortex. +- **VortexHttpResponseFailures** Number of Vortex responses that are not 2XX or 400. +- **VortexHttpResponsesWihDroppedEvents** No content is currently available. +- **VortexHttpResponsesWithDroppedEvents** Number of Vortex responses containing at least 1 dropped event. + + +### TelClientSynthetic.HeartBeat_Aria_5 + +This event is the telemetry client ARIA heartbeat. + +The following fields are available: + +- **CompressedBytesUploaded** Number of compressed bytes uploaded. +- **CriticalDataDbDroppedCount** Number of critical data sampled events dropped at the database layer. +- **CriticalOverflowEntersCounter** Number of times critical overflow mode was entered in event database. +- **DbCriticalDroppedCount** Total number of dropped critical events in event database. +- **DbDroppedCount** Number of events dropped at the database layer. +- **DbDroppedFailureCount** Number of events dropped due to database failures. +- **DbDroppedFullCount** Number of events dropped due to database being full. +- **EnteringCriticalOverflowDroppedCounter** Number of events dropped due to critical overflow mode being initiated. +- **EventsPersistedCount** Number of events that reached the PersistEvent stage. +- **EventStoreLifetimeResetCounter** Number of times the event store has been reset. +- **EventStoreResetCounter** Number of times the event store has been reset during this heartbeat. +- **EventStoreResetSizeSum** Size of event store reset in bytes. +- **EventsUploaded** Number of events uploaded. +- **HeartBeatSequenceNumber** The sequence number of this heartbeat. +- **InvalidHttpCodeCount** Number of invalid HTTP codes received from contacting Vortex. +- **LastEventSizeOffender** Event name of last event which exceeded max event size. +- **LastInvalidHttpCode** Last invalid HTTP code received from Vortex. +- **PreviousHeartBeatTime** The FILETIME of the previous heartbeat fire. +- **PrivacyBlockedCount** The number of events blocked due to privacy settings or tags. +- **RepeatedUploadFailureDropped** Number of events lost due to repeated upload failures for a single buffer. +- **SettingsHttpAttempts** Number of attempts to contact OneSettings service. +- **SettingsHttpFailures** Number of failures from contacting OneSettings service. +- **TopUploaderErrors** List of top errors received from the upload endpoint. +- **UploaderDroppedCount** Number of events dropped at the uploader layer of telemetry client. +- **UploaderErrorCount** Number of errors received from the upload endpoint. +- **VortexFailuresTimeout** Number of time out failures received from Vortex. +- **VortexHttpAttempts** Number of attempts to contact Vortex. +- **VortexHttpFailures4xx** Number of 400-499 error codes received from Vortex. +- **VortexHttpFailures5xx** Number of 500-599 error codes received from Vortex. +- **VortexHttpResponseFailures** Number of Vortex responses that are not 2XX or 400. +- **VortexHttpResponsesWithDroppedEvents** Number of Vortex responses containing at least 1 dropped event. + + +### TelClientSynthetic.HeartBeat_Seville_5 + +This event is sent by the universal telemetry client (UTC) as a heartbeat signal for Sense. + +The following fields are available: + +- **AgentConnectionErrorsCount** Number of non-timeout errors associated with the host or agent channel. +- **CompressedBytesUploaded** Number of compressed bytes uploaded. +- **ConsumerDroppedCount** Number of events dropped at consumer layer of the telemetry client. +- **CriticalDataDbDroppedCount** Number of critical data sampled events dropped at the database layer. +- **CriticalDataThrottleDroppedCount** Number of critical data sampled events dropped due to throttling. +- **CriticalOverflowEntersCounter** Number of times critical overflow mode was entered in event database. +- **DailyUploadQuotaInBytes** Daily upload quota for Sense in bytes (only in in-proc mode). +- **DbCriticalDroppedCount** Total number of dropped critical events in event database. +- **DbDroppedCount** Number of events dropped due to database being full. +- **DbDroppedFailureCount** Number of events dropped due to database failures. +- **DbDroppedFullCount** Number of events dropped due to database being full. +- **DecodingDroppedCount** Number of events dropped due to decoding failures. +- **DiskSizeInBytes** Size of event store for Sense in bytes (only in in-proc mode). +- **EnteringCriticalOverflowDroppedCounter** Number of events dropped due to critical overflow mode being initiated. +- **EtwDroppedBufferCount** Number of buffers dropped in the universal telemetry client (UTC) event tracing for Windows (ETW) session. +- **EtwDroppedCount** Number of events dropped at the event tracing for Windows (ETW) layer of telemetry client. +- **EventsPersistedCount** Number of events that reached the PersistEvent stage. +- **EventStoreLifetimeResetCounter** Number of times event the database was reset for the lifetime of the universal telemetry client (UTC). +- **EventStoreResetCounter** Number of times the event database was reset. +- **EventStoreResetSizeSum** Total size of the event database across all resets reports in this instance. +- **EventsUploaded** Number of events uploaded. +- **Flags** Flags indicating device state, such as network state, battery state, and opt-in state. +- **FullTriggerBufferDroppedCount** Number of events dropped due to trigger buffer being full. +- **HeartBeatSequenceNumber** The sequence number of this heartbeat. +- **InvalidHttpCodeCount** Number of invalid HTTP codes received from contacting Vortex. +- **LastAgentConnectionError** Last non-timeout error encountered in the host/agent channel. +- **LastEventSizeOffender** Event name of last event which exceeded the maximum event size. +- **LastInvalidHttpCode** Last invalid HTTP code received from Vortex. +- **MaxActiveAgentConnectionCount** Maximum number of active agents during this heartbeat timeframe. +- **NormalUploadTimerMillis** Number of milliseconds between each upload of normal events for SENSE (only in in-proc mode). +- **PreviousHeartBeatTime** Time of last heartbeat event (allows chaining of events). +- **RepeatedUploadFailureDropped** Number of events lost due to repeated failed uploaded attempts. +- **SettingsHttpAttempts** Number of attempts to contact OneSettings service. +- **SettingsHttpFailures** Number of failures from contacting the OneSettings service. +- **ThrottledDroppedCount** Number of events dropped due to throttling of noisy providers. +- **TopUploaderErrors** Top uploader errors, grouped by endpoint and error type. +- **UploaderDroppedCount** Number of events dropped at the uploader layer of the telemetry client. +- **UploaderErrorCount** Number of input for the TopUploaderErrors mode estimation. +- **VortexFailuresTimeout** Number of time out failures received from Vortex. +- **VortexHttpAttempts** Number of attempts to contact Vortex. +- **VortexHttpFailures4xx** Number of 400-499 error codes received from Vortex. +- **VortexHttpFailures5xx** Number of 500-599 error codes received from Vortex. +- **VortexHttpResponseFailures** Number of Vortex responses that are not 2XX or 400. +- **VortexHttpResponsesWithDroppedEvents** Number of Vortex responses containing at least 1 dropped event. + + +## Direct to update events + +### Microsoft.Windows.DirectToUpdate.DTUCoordinatorCheckApplicability + +Event to indicate that the Coordinator CheckApplicability call succeeded. + +The following fields are available: + +- **ApplicabilityResult** Result of CheckApplicability function. +- **CampaignID** Campaign ID being run. +- **ClientID** Client ID being run. +- **CoordinatorVersion** Coordinator version of DTU. +- **CV** Correlation vector. +- **IsDeviceAADDomainJoined** Indicates whether the device is logged in to the AAD (Azure Active Directory) domain. +- **IsDeviceADDomainJoined** Indicates whether the device is logged in to the AD (Active Directory) domain. +- **IsDeviceCloverTrail** Indicates whether the device has a Clover Trail system installed. +- **IsDeviceFeatureUpdatingPaused** Indicates whether Feature Update is paused on the device. +- **IsDeviceNetworkMetered** Indicates whether the device is connected to a metered network. +- **IsDeviceOobeBlocked** Indicates whether user approval is required to install updates on the device. +- **IsDeviceRequireUpdateApproval** Indicates whether user approval is required to install updates on the device. +- **IsDeviceSccmManaged** Indicates whether the device is running the Microsoft SCCM (System Center Configuration Manager) to keep the operating system and applications up to date. +- **IsDeviceUninstallActive** Indicates whether the OS (operating system) on the device was recently updated. +- **IsDeviceUpdateNotificationLevel** Indicates whether the device has a set policy to control update notifications. +- **IsDeviceUpdateServiceManaged** Indicates whether the device uses WSUS (Windows Server Update Services). +- **IsDeviceZeroExhaust** Indicates whether the device subscribes to the Zero Exhaust policy to minimize connections from Windows to Microsoft. +- **IsGreaterThanMaxRetry** Indicates whether the DTU (Direct to Update) service has exceeded its maximum retry count. +- **IsVolumeLicensed** Indicates whether a volume license was used to authenticate the operating system or applications on the device. + + +### Microsoft.Windows.DirectToUpdate.DTUCoordinatorCheckApplicabilityGenericFailure + +This event indicatse that we have received an unexpected error in the Direct to Update (DTU) Coordinators CheckApplicability call. + +The following fields are available: + +- **CampaignID** ID of the campaign being run. +- **ClientID** ID of the client receiving the update. +- **CoordinatorVersion** Coordinator version of Direct to Update. +- **CV** Correlation vector. +- **hResult** HRESULT of the failure. + + +### Microsoft.Windows.DirectToUpdate.DTUCoordinatorCleanupGenericFailure + +This event indicates that we have received an unexpected error in the Direct to Update (DTU) Coordinator Cleanup call. + +The following fields are available: + +- **CampaignID** Campaign ID being run +- **ClientID** Client ID being run +- **CoordinatorVersion** Coordinator version of DTU +- **CV** Correlation vector +- **hResult** HRESULT of the failure + + +### Microsoft.Windows.DirectToUpdate.DTUCoordinatorCleanupSuccess + +This event indicates that the Coordinator Cleanup call succeeded. + +The following fields are available: + +- **CampaignID** Campaign ID being run +- **ClientID** Client ID being run +- **CoordinatorVersion** Coordinator version of DTU +- **CV** Correlation vector + + +### Microsoft.Windows.DirectToUpdate.DTUCoordinatorCommitGenericFailure + +This event indicates that we have received an unexpected error in the Direct to Update (DTU) Coordinator Commit call. + +The following fields are available: + +- **CampaignID** Campaign ID being run. +- **ClientID** Client ID being run. +- **CoordinatorVersion** Coordinator version of DTU. +- **CV** Correlation vector. +- **hResult** HRESULT of the failure. + + +### Microsoft.Windows.DirectToUpdate.DTUCoordinatorCommitSuccess + +This event indicates that the Coordinator Commit call succeeded. + +The following fields are available: + +- **CampaignID** Campaign ID being run. +- **ClientID** Client ID being run. +- **CoordinatorVersion** Coordinator version of DTU. +- **CV** Correlation vector. + + +### Microsoft.Windows.DirectToUpdate.DTUCoordinatorDownloadGenericFailure + +This event indicates that we have received an unexpected error in the Direct to Update (DTU) Coordinator Download call. + +The following fields are available: + +- **CampaignID** Campaign ID being run. +- **ClientID** Client ID being run. +- **CoordinatorVersion** Coordinator version of DTU. +- **CV** Correlation vector. +- **hResult** HRESULT of the failure. + + +### Microsoft.Windows.DirectToUpdate.DTUCoordinatorDownloadIgnoredFailure + +This event indicates that we have received an error in the Direct to Update (DTU) Coordinator Download call that will be ignored. + +The following fields are available: + +- **CampaignID** Campaign ID being run. +- **ClientID** Client ID being run. +- **CoordinatorVersion** Coordinator version of DTU. +- **CV** Correlation vector. +- **hResult** HRESULT of the failure. + + +### Microsoft.Windows.DirectToUpdate.DTUCoordinatorDownloadSuccess + +This event indicates that the Coordinator Download call succeeded. + +The following fields are available: + +- **CampaignID** Campaign ID being run. +- **ClientID** Client ID being run. +- **CoordinatorVersion** Coordinator version of DTU. +- **CV** Correlation vector. + + +### Microsoft.Windows.DirectToUpdate.DTUCoordinatorHandleShutdownGenericFailure + +This event indicates that we have received an unexpected error in the Direct to Update (DTU) Coordinator HandleShutdown call. + +The following fields are available: + +- **CampaignID** Campaign ID being run. +- **ClientID** Client ID being run. +- **CoordinatorVersion** Coordinate version of DTU. +- **CV** Correlation vector. +- **hResult** HRESULT of the failure. + + +### Microsoft.Windows.DirectToUpdate.DTUCoordinatorHandleShutdownSuccess + +This event indicates that the Coordinator HandleShutdown call succeeded. + +The following fields are available: + +- **CampaignID** Campaign ID being run. +- **ClientID** Client ID being run. +- **CoordinatorVersion** Coordinator version of DTU. +- **CV** Correlation vector. + + +### Microsoft.Windows.DirectToUpdate.DTUCoordinatorInitializeGenericFailure + +This event indicates that we have received an unexpected error in the Direct to Update (DTU) Coordinator Initialize call. + +The following fields are available: + +- **CampaignID** Campaign ID being run. +- **ClientID** Client ID being run. +- **CoordinatorVersion** Coordinator version of DTU. +- **CV** Correlation vector. +- **hResult** HRESULT of the failure. + + +### Microsoft.Windows.DirectToUpdate.DTUCoordinatorInitializeSuccess + +This event indicates that the Coordinator Initialize call succeeded. + +The following fields are available: + +- **CampaignID** Campaign ID being run. +- **ClientID** Client ID being run. +- **CoordinatorVersion** Coordinator version of DTU. +- **CV** Correlation vector. + + +### Microsoft.Windows.DirectToUpdate.DTUCoordinatorInstallGenericFailure + +This event indicates that we have received an unexpected error in the Direct to Update (DTU) Coordinator Install call. + +The following fields are available: + +- **CampaignID** Campaign ID being run. +- **ClientID** Client ID being run. +- **CoordinatorVersion** Coordinator version of DTU. +- **CV** Correlation vector. +- **hResult** HRESULT of the failure. + + +### Microsoft.Windows.DirectToUpdate.DTUCoordinatorInstallIgnoredFailure + +This event indicates that we have received an error in the Direct to Update (DTU) Coordinator Install call that will be ignored. + +The following fields are available: + +- **CampaignID** Campaign ID being run. +- **ClientID** Client ID being run. +- **CoordinatorVersion** Coordinator version of DTU. +- **CV** Correlation vector. +- **hResult** HRESULT of the failure. + + +### Microsoft.Windows.DirectToUpdate.DTUCoordinatorInstallSuccess + +This event indicates that the Coordinator Install call succeeded. + +The following fields are available: + +- **CampaignID** Campaign ID being run. +- **ClientID** Client ID being run. +- **CoordinatorVersion** Coordinator version of DTU. +- **CV** Correlation vector. + + +### Microsoft.Windows.DirectToUpdate.DTUCoordinatorProgressCallBack + +This event indicates that the Coordinator's progress callback has been called. + +The following fields are available: + +- **CampaignID** Campaign ID being run. +- **ClientID** Client ID being run. +- **CoordinatorVersion** Coordinator version of DTU. +- **CV** Correlation vector. +- **DeployPhase** Current Deploy Phase. + + +### Microsoft.Windows.DirectToUpdate.DTUCoordinatorSetCommitReadySuccess + +This event indicates that the Coordinator SetCommitReady call succeeded. + +The following fields are available: + +- **CampaignID** ID of the update campaign being run. +- **ClientID** ID of the client receiving the update. +- **CoordinatorVersion** Coordinator version of Direct to Update. +- **CV** Correlation vector. + + +### Microsoft.Windows.DirectToUpdate.DTUCoordinatorWaitForRebootUiNotShown + +This event indicates that the Coordinator WaitForRebootUi call succeeded. + +The following fields are available: + +- **CampaignID** Campaign ID being run. +- **ClientID** ID of the client receiving the update. +- **CoordinatorVersion** Coordinator version of Direct to Update. +- **CV** Correlation vector. +- **hResult** HRESULT of the failure. + + +### Microsoft.Windows.DirectToUpdate.DTUCoordinatorWaitForRebootUiSelection + +This event indicates that the user selected an option on the Reboot UI. + +The following fields are available: + +- **CampaignID** ID of the update campaign being run. +- **ClientID** ID of the client receiving the update. +- **CoordinatorVersion** Coordinator version of Direct to Update. +- **CV** Correlation vector. +- **rebootUiSelection** Selection on the Reboot UI. + + +### Microsoft.Windows.DirectToUpdate.DTUCoordinatorWaitForRebootUiSuccess + +This event indicates that the Coordinator WaitForRebootUi call succeeded. + +The following fields are available: + +- **CampaignID** ID of the update campaign being run. +- **ClientID** ID of the client receiving the update. +- **CoordinatorVersion** Coordinator version of Direct to Update. +- **CV** Correlation vector. + + +### Microsoft.Windows.DirectToUpdate.DTUHandlerCheckApplicabilityInternalGenericFailure + +This event indicates that we have received an unexpected error in the Direct to Update (DTU) Handler CheckApplicabilityInternal call. + +The following fields are available: + +- **CampaignID** ID of the campaign being run. +- **ClientID** ID of the client receiving the update. +- **CoordinatorVersion** Coordinator version of Direct to Update. +- **CV** Correlation vector. +- **hResult** HRESULT of the failure. + + +### Microsoft.Windows.DirectToUpdate.DTUHandlerCheckApplicabilityInternalSuccess + +This event indicates that the Handler CheckApplicabilityInternal call succeeded. + +The following fields are available: + +- **ApplicabilityResult** The result of the applicability check. +- **CampaignID** ID of the update campaign being run. +- **ClientID** ID of the client receiving the update. +- **CoordinatorVersion** Coordinator version of Direct to Update. +- **CV** Correlation vector. + + +### Microsoft.Windows.DirectToUpdate.DTUHandlerCheckApplicabilitySuccess + +This event indicates that the Handler CheckApplicability call succeeded. + +The following fields are available: + +- **ApplicabilityResult** The result code indicating whether the update is applicable. +- **CampaignID** ID of the update campaign being run. +- **ClientID** ID of the client receiving the update. +- **CoordinatorVersion** Coordinator version of Direct to Update. +- **CV** Correlation vector. +- **CV_new** New correlation vector. + + +### Microsoft.Windows.DirectToUpdate.DTUHandlerCheckIfCoordinatorMinApplicableVersionSuccess + +This event indicates that the Handler CheckIfCoordinatorMinApplicableVersion call succeeded. + +The following fields are available: + +- **CampaignID** ID of the update campaign being run. +- **CheckIfCoordinatorMinApplicableVersionResult** Result of CheckIfCoordinatorMinApplicableVersion function. +- **ClientID** ID of the client receiving the update. +- **CoordinatorVersion** Coordinator version of Direct to Update. +- **CV** Correlation vector. + + +### Microsoft.Windows.DirectToUpdate.DTUHandlerCommitGenericFailure + +This event indicates that we have received an unexpected error in the Direct to Update (DTU) Handler Commit call. + +The following fields are available: + +- **CampaignID** ID of the update campaign being run. +- **ClientID** ID of the client receiving the update. +- **CoordinatorVersion** Coordinator version of Direct to Update. +- **CV** Correlation vector. +- **CV_new** New correlation vector. +- **hResult** HRESULT of the failure. + + +### Microsoft.Windows.DirectToUpdate.DTUHandlerCommitSuccess + +This event indicates that the Handler Commit call succeeded. + +The following fields are available: + +- **CampaignID** ID of the update campaign being run.run +- **ClientID** ID of the client receiving the update. +- **CoordinatorVersion** Coordinator version of Direct to Update. +- **CV** Correlation vector. +- **CV_new** New correlation vector. + + +### Microsoft.Windows.DirectToUpdate.DTUHandlerDownloadAndExtractCabFailure + +This event indicates that the Handler Download and Extract cab call failed. + +The following fields are available: + +- **CampaignID** ID of the update campaign being run. +- **ClientID** ID of the client receiving the update. +- **CoordinatorVersion** Coordinator version of Direct to Update. +- **CV** Correlation vector. +- **DownloadAndExtractCabFunction_failureReason** Reason why the update download and extract process failed. +- **hResult** HRESULT of the failure. + + +### Microsoft.Windows.DirectToUpdate.DTUHandlerDownloadAndExtractCabSuccess + +This event indicates that the Handler Download and Extract cab call succeeded. + +The following fields are available: + +- **CampaignID** ID of the update campaign being run. +- **ClientID** ID of the client receiving the update. +- **CoordinatorVersion** Coordinator version of Direct to Update. +- **CV** Correlation vector. + + +### Microsoft.Windows.DirectToUpdate.DTUHandlerDownloadGenericFailure + +This event indicates that we have received an unexpected error in the Direct to Update (DTU) Handler Download call. + +The following fields are available: + +- **CampaignID** ID of the update campaign being run. +- **ClientID** ID of the client receiving the update. +- **CoordinatorVersion** Coordinator version of Direct to Update. +- **CV** Correlation vector. +- **hResult** HRESULT of the failure. + + +### Microsoft.Windows.DirectToUpdate.DTUHandlerDownloadSuccess + +This event indicates that the Handler Download call succeeded. + +The following fields are available: + +- **CampaignID** ID of the update campaign being run. +- **ClientID** ID of the client receiving the update. +- **CoordinatorVersion** Coordinator version of Direct to Update. +- **CV** Correlation vector. + + +### Microsoft.Windows.DirectToUpdate.DTUHandlerInitializeGenericFailure + +This event indicates that we have received an unexpected error in the Direct to Update (DTU) Handler Initialize call. + +The following fields are available: + +- **CampaignID** ID of the update campaign being run. +- **ClientID** ID of the client receiving the update. +- **CoordinatorVersion** Coordinator version of Direct to Update. +- **CV** Correlation vector. +- **DownloadAndExtractCabFunction_hResult** HRESULT of the download and extract. +- **hResult** HRESULT of the failure. + + +### Microsoft.Windows.DirectToUpdate.DTUHandlerInitializeSuccess + +This event indicates that the Handler Initialize call succeeded. + +The following fields are available: + +- **CampaignID** ID of the update campaign being run. +- **ClientID** ID of the client receiving the update. +- **CoordinatorVersion** Coordinator version of Direct to Update. +- **CV** Correlation vector. +- **DownloadAndExtractCabFunction_hResult** HRESULT of the download and extraction. + + +### Microsoft.Windows.DirectToUpdate.DTUHandlerInstallGenericFailure + +This event indicates that we have received an unexpected error in the Direct to Update (DTU) Handler Install call. + +The following fields are available: + +- **CampaignID** ID of the update campaign being run. +- **ClientID** ID of the client receiving the update. +- **CoordinatorVersion** Coordinator version of Direct to Update. +- **CV** Correlation vector. +- **hResult** HRESULT of the failure. + + +### Microsoft.Windows.DirectToUpdate.DTUHandlerInstallSuccess + +This event indicates that the Coordinator Install call succeeded. + +The following fields are available: + +- **CampaignID** ID of the update campaign being run. +- **ClientID** ID of the client receiving the update. +- **CoordinatorVersion** Coordinator version of Direct to Update. +- **CV** Correlation vector. + + +### Microsoft.Windows.DirectToUpdate.DTUHandlerSetCommitReadySuccess + +This event indicates that the Handler SetCommitReady call succeeded. + +The following fields are available: + +- **CampaignID** ID of the campaign being run. +- **ClientID** ID of the client receiving the update. +- **CoordinatorVersion** Coordinator version of Direct to Update. +- **CV** Correlation vector. + + +### Microsoft.Windows.DirectToUpdate.DTUHandlerWaitForRebootUiGenericFailure + +This event indicates that we have received an unexpected error in the Direct to Update (DTU) Handler WaitForRebootUi call. + +The following fields are available: + +- **CampaignID** The ID of the campaigning being run. +- **ClientID** ID of the client receiving the update. +- **CoordinatorVersion** Coordinator version of Direct to Update. +- **CV** Correlation vector. +- **hResult** The HRESULT of the failure. + + +### Microsoft.Windows.DirectToUpdate.DTUHandlerWaitForRebootUiSuccess + +This event indicates that the Handler WaitForRebootUi call succeeded. + +The following fields are available: + +- **CampaignID** ID of the campaign being run. +- **ClientID** ID of the client receiving the update. +- **CoordinatorVersion** Coordinator version of Direct to Update. +- **CV** Correlation vector. + + +## DxgKernelTelemetry events + +### DxgKrnlTelemetry.GPUAdapterInventoryV2 + +This event sends basic GPU and display driver information to keep Windows and display drivers up-to-date. + +The following fields are available: + +- **AdapterDypeValue** No content is currently available. +- **AdapterTypeValue** The numeric value indicating the type of Graphics adapter. +- **aiSeqId** The event sequence ID. +- **bootId** The system boot ID. +- **BrightnessVersionViaDDI** The version of the Display Brightness Interface. +- **BvightnessVersionViaDDI** No content is currently available. +- **ComputePreemptionLevel** The maximum preemption level supported by GPU for compute payload. +- **DedicatedSystemMemoryB** The amount of system memory dedicated for GPU use (in bytes). +- **DedicatedVideoMemoryB** The amount of dedicated VRAM of the GPU (in bytes). +- **DisplayAdapterLuid** The display adapter LUID. +- **Driver48,k** No content is currently available. +- **DriverDate** The date of the display driver. +- **DriverRa~k** No content is currently available. +- **DriverRank** The rank of the display driver. +- **DriverVersion** The display driver version. +- **DX10UMDFilePath** The file path to the location of the DirectX 10 Display User Mode Driver in the Driver Store. +- **DX11UMDFilePath** The file path to the location of the DirectX 11 Display User Mode Driver in the Driver Store. +- **DX12UMDFilePath** The file path to the location of the DirectX 12 Display User Mode Driver in the Driver Store. +- **DX9]MDFilePath** No content is currently available. +- **DX9UMDFilePath** The file path to the location of the DirectX 9 Display User Mode Driver in the Driver Store. +- **GPUDeviceID** The GPU device ID. +- **GPUPree}ptionLevel** No content is currently available. +- **GPUPreemptionLdvel** No content is currently available. +- **GPUPreemptionLevel** The maximum preemption level supported by GPU for graphics payload. +- **GPURevisionID** The GPU revision ID. +- **GPUVendoeID** No content is currently available. +- **GPUVendorID** The GPU vendor ID. +- **InterbaceId** No content is currently available. +- **InterfaceId** The GPU interface ID. +- **IqMPOSupported** No content is currently available. +- **IrRemovable** No content is currently available. +- **IsDisp|ayDevice** No content is currently available. +- **IsDisplayDevice** Does the GPU have displaying capabilities? +- **IsHwSchSupported** Indicates whether the adapter supports hardware scheduling. +- **IsHybridDiscrete** Does the GPU have discrete GPU capabilities in a hybrid device? +- **IsHybridIntdgrated** No content is currently available. +- **IsHybridIntegrated** Does the GPU have integrated GPU capabilities in a hybrid device? +- **IsLDA** Is the GPU comprised of Linked Display Adapters? +- **IsMiracastSupported** Does the GPU support Miracast? +- **IsMismatchLDA** Is at least one device in the Linked Display Adapters chain from a different vendor? +- **IsMPOCupported** No content is currently available. +- **IsMPOSuppor|ed** No content is currently available. +- **IsMPOSupported** Does the GPU support Multi-Plane Overlays? +- **IsMsMiracastSupported** Are the GPU Miracast capabilities driven by a Microsoft solution? +- **IsPostAdapter** Is this GPU the POST GPU in the device? +- **IsRemovable** TRUE if the adapter supports being disabled or removed. +- **IsRenderDevice** Does the GPU have rendering capabilities? +- **IsSoftwareDevice** Is this a software implementation of the GPU? +- **IsSoftwareDevicg** No content is currently available. +- **KMDFilePath** The file path to the location of the Display Kernel Mode Driver in the Driver Store. +- **MeasureEnabled** Is the device listening to MICROSOFT_KEYWORD_MEASURES? +- **MsHybridDiscrete** Indicates whether the adapter is a discrete adapter in a hybrid configuration. +- **NumVidPnSources** The number of supported display output sources. +- **NumVidPnTargets** The number of supported display output targets. +- **SharedSystemMemoryB** The amount of system memory shared by GPU and CPU (in bytes). +- **SubSyste}ID** No content is currently available. +- **SubSystemID** The subsystem ID. +- **SubVendoeID** No content is currently available. +- **SubVendorID** The GPU sub vendor ID. +- **TelematryEnabled** No content is currently available. +- **TelemetryEnabled** Is the device listening to MICROSOFT_KEYWORD_TELEMETRY? +- **TelInvEvntTrigger** What triggered this event to be logged? Example: 0 (GPU enumeration) or 1 (DxgKrnlTelemetry provider toggling) +- **version** The event version. +- **WDDMVersion** The Windows Display Driver Model version. + + +## Failover Clustering events + +### Microsoft.Windows.Server.FailoverClusteringCritical.ClusterSummary2 + +This event returns information about how many resources and of what type are in the server cluster. This data is collected to keep Windows Server safe, secure, and up to date. The data includes information about whether hardware is configured correctly, if the software is patched correctly, and assists in preventing crashes by attributing issues (like fatal errors) to workloads and system configurations. + +The following fields are available: + +- **autoAssignSite** The cluster parameter: auto site. +- **autoBalancerLevel** The cluster parameter: auto balancer level. +- **autoBalancerMode** The cluster parameter: auto balancer mode. +- **blockCacheSize** The configured size of the block cache. +- **ClusterAdConfiguration** The ad configuration of the cluster. +- **clusterAdType** The cluster parameter: mgmt_point_type. +- **clusterDumpPolicy** The cluster configured dump policy. +- **clusterFunctionalLevel** The current cluster functional level. +- **clusterGuid** The unique identifier for the cluster. +- **clusterWitnessType** The witness type the cluster is configured for. +- **countNodesInSite** The number of nodes in the cluster. +- **crossSiteDelay** The cluster parameter: CrossSiteDelay. +- **crossSiteThreshold** The cluster parameter: CrossSiteThreshold. +- **crossSubnetDelay** The cluster parameter: CrossSubnetDelay. +- **crossSubnetThreshold** The cluster parameter: CrossSubnetThreshold. +- **csvCompatibleFilters** The cluster parameter: ClusterCsvCompatibleFilters. +- **csvIncompatibleFilters** The cluster parameter: ClusterCsvIncompatibleFilters. +- **csvResourceCount** The number of resources in the cluster. +- **currentNodeSite** The name configured for the current site for the cluster. +- **dasModeBusType** The direct storage bus type of the storage spaces. +- **downLevelNodeCount** The number of nodes in the cluster that are running down-level. +- **drainOnShutdown** Specifies whether a node should be drained when it is shut down. +- **dynamicQuorumEnabled** Specifies whether dynamic Quorum has been enabled. +- **enforcedAntiAffinity** The cluster parameter: enforced anti affinity. +- **genAppNames** The win32 service name of a clustered service. +- **genSvcNames** The command line of a clustered genapp. +- **hangRecoveryAction** The cluster parameter: hang recovery action. +- **hangTimeOut** Specifies the “hang time out” parameter for the cluster. +- **isCalabria** Specifies whether storage spaces direct is enabled. +- **isMixedMode** Identifies if the cluster is running with different version of OS for nodes. +- **isRunningDownLevel** Identifies if the current node is running down-level. +- **logLevel** Specifies the granularity that is logged in the cluster log. +- **logSize** Specifies the size of the cluster log. +- **lowerQuorumPriorityNodeId** The cluster parameter: lower quorum priority node ID. +- **minNeverPreempt** The cluster parameter: minimum never preempt. +- **minPreemptor** The cluster parameter: minimum preemptor priority. +- **netftIpsecEnabled** The parameter: netftIpsecEnabled. +- **NodeCount** The number of nodes in the cluster. +- **nodeId** The current node number in the cluster. +- **nodeResourceCounts** Specifies the number of node resources. +- **nodeResourceOnlineCounts** Specifies the number of node resources that are online. +- **numberOfSites** The number of different sites. +- **numNodesInNoSite** The number of nodes not belonging to a site. +- **plumbAllCrossSubnetRoutes** The cluster parameter: plumb all cross subnet routes. +- **preferredSite** The preferred site location. +- **privateCloudWitness** Specifies whether a private cloud witness exists for this cluster. +- **quarantineDuration** The quarantine duration. +- **quarantineThreshold** The quarantine threshold. +- **quorumArbitrationTimeout** In the event of an arbitration event, this specifies the quorum timeout period. +- **resiliencyLevel** Specifies the level of resiliency. +- **resourceCounts** Specifies the number of resources. +- **resourceTypeCounts** Specifies the number of resource types in the cluster. +- **resourceTypes** Data representative of each resource type. +- **resourceTypesPath** Data representative of the DLL path for each resource type. +- **sameSubnetDelay** The cluster parameter: same subnet delay. +- **sameSubnetThreshold** The cluster parameter: same subnet threshold. +- **secondsInMixedMode** The amount of time (in seconds) that the cluster has been in mixed mode (nodes with different operating system versions in the same cluster). +- **securityLevel** The cluster parameter: security level. +- **securityLevelForStorage** The cluster parameter: security level for storage. +- **sharedVolumeBlockCacheSize** Specifies the block cache size for shared for shared volumes. +- **shutdownTimeoutMinutes** Specifies the amount of time it takes to time out when shutting down. +- **upNodeCount** Specifies the number of nodes that are up (online). +- **useClientAccessNetworksForCsv** The cluster parameter: use client access networks for CSV. +- **vmIsolationTime** The cluster parameter: VM isolation time. +- **witnessDatabaseWriteTimeout** Specifies the timeout period for writing to the quorum witness database. + + +## Fault Reporting events + +### Microsoft.Windows.FaultReporting.AppCrashEvent + +This event sends data about crashes for both native and managed applications, to help keep Windows up to date. The data includes information about the crashing process and a summary of its exception record. It does not contain any Watson bucketing information. The bucketing information is recorded in a Windows Error Reporting (WER) event that is generated when the WER client reports the crash to the Watson service, and the WER event will contain the same ReportID (see field 14 of crash event, field 19 of WER event) as the crash event for the crash being reported. AppCrash is emitted once for each crash handled by WER (e.g. from an unhandled exception or FailFast or ReportException). Note that Generic Watson event types (e.g. from PLM) that may be considered crashes\" by a user DO NOT emit this event. + +The following fields are available: + +- **@ackageRelativeAppId** No content is currently available. +- **AppName** The name of the app that has crashed. +- **AppSeqsionGuid** No content is currently available. +- **AppSessionGuid** GUID made up of process ID and is used as a correlation vector for process instances in the telemetry backend. +- **AppTimeStamp** The date/time stamp of the app. +- **AppVersion** The version of the app that has crashed. +- **AptName** No content is currently available. +- **DargetAppId** No content is currently available. +- **ExceptionCode** The exception code returned by the process that has crashed. +- **ExceptionOffset** The address where the exception had occurred. +- **Flags** Flags indicating how reporting is done. For example, queue the report, do not offer JIT debugging, or do not terminate the process after reporting. +- **FriendlyAppName** The description of the app that has crashed, if different from the AppName. Otherwise, the process name. +- **IsFatal** True/False to indicate whether the crash resulted in process termination. +- **ModName** Exception module name (e.g. bar.dll). +- **ModNamevaultsv** No content is currently available. +- **ModTimeStamp** The date/time stamp of the module. +- **ModVersion** The version of the module that has crashed. +- **PackageFullName** Store application identity. +- **PackageRelaatieAppId** No content is currently available. +- **PackageRelativeAppId** Store application identity. +- **ProcessArchitecture** Architecture of the crashing process, as one of the PROCESSOR_ARCHITECTURE_* constants: 0: PROCESSOR_ARCHITECTURE_INTEL. 5: PROCESSOR_ARCHITECTURE_ARM. 9: PROCESSOR_ARCHITECTURE_AMD64. 12: PROCESSOR_ARCHITECTURE_ARM64. +- **ProcessCreateTime** The time of creation of the process that has crashed. +- **ProcessId** The ID of the process that has crashed. +- **ReportId** A GUID used to identify the report. This can used to track the report across Watson. +- **TargetAppId** The kernel reported AppId of the application being reported. +- **TargetAppVer** The specific version of the application being reported +- **TargetAsId** The sequence number for the hanging process. + + +## Feature update events + +### Microsoft.Windows.Upgrade.Uninstall.UninstallFinalizedAndRebootTriggered + +This event indicates that the uninstall was properly configured and that a system reboot was initiated. + + + +### Microsoft.Windows.Upgrade.Uninstall.UninstallGoBackButtonClicked + +This event sends basic metadata about the starting point of uninstalling a feature update, which helps ensure customers can safely revert to a well-known state if the update caused any problems. + + + +## Hang Reporting events + +### Microsoft.Windows.HangReporting.AppHangEvent + +This event sends data about hangs for both native and managed applications, to help keep Windows up to date. It does not contain any Watson bucketing information. The bucketing information is recorded in a Windows Error Reporting (WER) event that is generated when the WER client reports the hang to the Watson service, and the WER event will contain the same ReportID (see field 13 of hang event, field 19 of WER event) as the hang event for the hang being reported. AppHang is reported only on PC devices. It handles classic Win32 hangs and is emitted only once per report. Some behaviors that may be perceived by a user as a hang are reported by app managers (e.g. PLM/RM/EM) as Watson Generics and will not produce AppHang events. + +The following fields are available: + +- **AppName** The name of the app that has hung. +- **AppSessionGuid** GUID made up of process id used as a correlation vector for process instances in the telemetry backend. +- **AppVersion** The version of the app that has hung. +- **IsFatal** True/False based on whether the hung application caused the creation of a Fatal Hang Report. +- **PackageFullName** Store application identity. +- **PackageRelativeAppId** Store application identity. +- **ProcessArchitecture** Architecture of the hung process, as one of the PROCESSOR_ARCHITECTURE_* constants: 0: PROCESSOR_ARCHITECTURE_INTEL. 5: PROCESSOR_ARCHITECTURE_ARM. 9: PROCESSOR_ARCHITECTURE_AMD64. 12: PROCESSOR_ARCHITECTURE_ARM64. +- **ProcessCreateTime** The time of creation of the process that has hung. +- **ProcessId** The ID of the process that has hung. +- **ReportId** A GUID used to identify the report. This can used to track the report across Watson. +- **TargetAppId** The kernel reported AppId of the application being reported. +- **TargetAppVer** The specific version of the application being reported. +- **TargetAsId** The sequence number for the hanging process. +- **TypeCode** Bitmap describing the hang type. +- **WaitingOnAppName** If this is a cross process hang waiting for an application, this has the name of the application. +- **WaitingOnAppVersion** If this is a cross process hang, this has the version of the application for which it is waiting. +- **WaitingOnPackageFullName** If this is a cross process hang waiting for a package, this has the full name of the package for which it is waiting. +- **WaitingOnPackageRelativeAppId** If this is a cross process hang waiting for a package, this has the relative application id of the package. + + +## Inventory events + +### Microsoft.Windows.Inventory.Core.AmiTelCacheChecksum + +This event captures basic checksum data about the device inventory items stored in the cache for use in validating data completeness for Microsoft.Windows.Inventory.Core events. The fields in this event may change over time, but they will always represent a count of a given object. + +The following fields are available: + +- **Device** A count of device objects in cache. +- **DeviceCensus** A count of device census objects in cache. +- **DriverPackageExtended** A count of driverpackageextended objects in cache. +- **File** A count of file objects in cache. +- **FileSigningInfo** A count of file signing objects in cache. +- **Generic** A count of generic objects in cache. +- **HwItem** A count of hwitem objects in cache. +- **InventoryApplication** A count of application objects in cache. +- **InventoryApplicationAppV** A count of application AppV objects in cache. +- **InventoryApplicationDriver** A count of application driver objects in cache +- **InventoryApplicationFile** A count of application file objects in cache. +- **InventoryApplicationFramework** A count of application framework objects in cache +- **InventoryApplicationShortcut** A count of application shortcut objects in cache +- **InventoryDeviceContainer** A count of device container objects in cache. +- **InventoryDeviceInterface** A count of Plug and Play device interface objects in cache. +- **InventoryDeviceMediaClass** A count of device media objects in cache. +- **InventoryDevicePnp** A count of device Plug and Play objects in cache. +- **InventoryDeviceUsbHubClass** A count of device usb objects in cache +- **InventoryDriverBinary** A count of driver binary objects in cache. +- **InventoryDriverPackage** A count of device objects in cache. +- **InventoryMiscellaneousOfficeAddIn** A count of office add-in objects in cache +- **InventoryMiscellaneousOfficeAddInUsage** A count of office add-in usage objects in cache. +- **InventoryMiscellaneousOfficeIdentifiers** A count of office identifier objects in cache +- **InventoryMiscellaneousOfficeIESettings** A count of office ie settings objects in cache +- **InventoryMiscellaneousOfficeInsights** A count of office insights objects in cache +- **InventoryMiscellaneousOfficeProducts** A count of office products objects in cache +- **InventoryMiscellaneousOfficeSettings** A count of office settings objects in cache +- **InventoryMiscellaneousOfficeVBA** A count of office vba objects in cache +- **InventoryMiscellaneousOfficeVBARuleViolations** A count of office vba rule violations objects in cache +- **InventoryMiscellaneousUUPInfo** A count of uup info objects in cache +- **Metadata** A count of metadata objects in cache. +- **Orphan** A count of orphan file objects in cache. +- **Programs** A count of program objects in cache. + + +### Microsoft.Windows.Inventory.Core.AmiTelCacheFileInfo + +Diagnostic data about the inventory cache. + +The following fields are available: + +- **CacheFileSize** Size of the cache. +- **InventoryVersion** Inventory version of the cache. +- **TempCacheCount** Number of temp caches created. +- **TempCacheDeletedCount** Number of temp caches deleted. + + +### Microsoft.Windows.Inventory.Core.AmiTelCacheVersions + +This event sends inventory component versions for the Device Inventory data. + +The following fields are available: + +- **aeinv** The version of the App inventory component. +- **devinv** The file version of the Device inventory component. + + +### Microsoft.Windows.Inventory.Core.InventoryApplicationAdd + +This event sends basic metadata about an application on the system to help keep Windows up to date. + +This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedeviceinventorychange). + +The following fields are available: + +- **HiddenArp** Indicates whether a program hides itself from showing up in ARP. +- **InstallDate** The date the application was installed (a best guess based on folder creation date heuristics). +- **InstallDateArpLastModified** The date of the registry ARP key for a given application. Hints at install date but not always accurate. Passed as an array. Example: 4/11/2015 00:00:00 +- **InstallDateFromLinkFile** The estimated date of install based on the links to the files. Passed as an array. +- **InstallDateMsi** The install date if the application was installed via Microsoft Installer (MSI). Passed as an array. +- **InventoryVersion** The version of the inventory file generating the events. +- **Language** The language code of the program. +- **MsiPackageCode** A GUID that describes the MSI Package. Multiple 'Products' (apps) can make up an MsiPackage. +- **MsiProductCode** A GUID that describe the MSI Product. +- **Name** The name of the application. +- **OSVersionAtInstallTime** The four octets from the OS version at the time of the application's install. +- **PackageFullName** The package full name for a Store application. +- **ProgramInstanceId** A hash of the file IDs in an app. +- **Publisher** The Publisher of the application. Location pulled from depends on the 'Source' field. +- **RootDirPath** The path to the root directory where the program was installed. +- **Source** How the program was installed (for example, ARP, MSI, Appx). +- **StoreAppType** A sub-classification for the type of Microsoft Store app, such as UWP or Win8StoreApp. +- **Type** One of ("Application", "Hotfix", "BOE", "Service", "Unknown"). Application indicates Win32 or Appx app, Hotfix indicates app updates (KBs), BOE indicates it's an app with no ARP or MSI entry, Service indicates that it is a service. Application and BOE are the ones most likely seen. +- **Version** The version number of the program. + + +### Microsoft.Windows.Inventory.Core.InventoryApplicationDriverAdd + +This event represents what drivers an application installs. + +This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedeviceinventorychange). + +The following fields are available: + +- **InventoryVersion** The version of the inventory component. +- **ProgramIds** The unique program identifier the driver is associated with. + + +### Microsoft.Windows.Inventory.Core.InventoryApplicationDriverStartSync + +The InventoryApplicationDriverStartSync event indicates that a new set of InventoryApplicationDriverStartAdd events will be sent. + +This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedeviceinventorychange). + +The following fields are available: + +- **InventoryVersion** The version of the inventory component. + + +### Microsoft.Windows.Inventory.Core.InventoryApplicationFrameworkAdd + +This event provides the basic metadata about the frameworks an application may depend on. + +This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedeviceinventorychange). + +The following fields are available: + +- **FileId** A hash that uniquely identifies a file. +- **Frameworks** The list of frameworks this file depends on. +- **InventoryVersion** The version of the inventory file generating the events. + + +### Microsoft.Windows.Inventory.Core.InventoryApplicationFrameworkStartSync + +This event indicates that a new set of InventoryApplicationFrameworkAdd events will be sent. + +This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedeviceinventorychange). + +The following fields are available: + +- **InventoryVersion** The version of the inventory file generating the events. + + +### Microsoft.Windows.Inventory.Core.InventoryApplicationRemove + +This event indicates that a new set of InventoryDevicePnpAdd events will be sent. + +This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedeviceinventorychange). + +The following fields are available: + +- **InventoryVersion** The version of the inventory file generating the events. + + +### Microsoft.Windows.Inventory.Core.InventoryApplicationStartSync + +This event indicates that a new set of InventoryApplicationAdd events will be sent. + +This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedeviceinventorychange). + +The following fields are available: + +- **InventoryVersion** The version of the inventory file generating the events. + + +### Microsoft.Windows.Inventory.Core.InventoryDeviceContainerAdd + +This event sends basic metadata about a device container (such as a monitor or printer as opposed to a Plug and Play device) to help keep Windows up to date. + +This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedeviceinventorychange). + +The following fields are available: + +- **Categories** A comma separated list of functional categories in which the container belongs. +- **DiscoveryMethod** The discovery method for the device container. +- **FriendlyName** The name of the device container. +- **InventoryVersion** The version of the inventory file generating the events. +- **IsActive** Is the device connected, or has it been seen in the last 14 days? +- **IsConnected** For a physically attached device, this value is the same as IsPresent. For wireless a device, this value represents a communication link. +- **IsMachineContainer** Is the container the root device itself? +- **IsNetworked** Is this a networked device? +- **IsPaired** Does the device container require pairing? +- **Manufacturer** The manufacturer name for the device container. +- **ModelId** A unique model ID. +- **ModelName** The model name. +- **ModelNumber** The model number for the device container. +- **PrimaryCategory** The primary category for the device container. + + +### Microsoft.Windows.Inventory.Core.InventoryDeviceContainerRemove + +This event indicates that the InventoryDeviceContainer object is no longer present. + +This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedeviceinventorychange). + +The following fields are available: + +- **InventoryVersion** The version of the inventory file generating the events. + + +### Microsoft.Windows.Inventory.Core.InventoryDeviceContainerStartSync + +This event indicates that a new set of InventoryDeviceContainerAdd events will be sent. + +This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedeviceinventorychange). + +The following fields are available: + +- **InventoryVersion** The version of the inventory file generating the events. + + +### Microsoft.Windows.Inventory.Core.InventoryDeviceInterfaceAdd + +This event retrieves information about what sensor interfaces are available on the device. + +This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedeviceinventorychange). + +The following fields are available: + +- **Accelerometer3D** Indicates if an Accelerator3D sensor is found. +- **ActivityDetection** Indicates if an Activity Detection sensor is found. +- **AmbientLight** Indicates if an Ambient Light sensor is found. +- **Barometer** Indicates if a Barometer sensor is found. +- **Custom** Indicates if a Custom sensor is found. +- **EnergyMeter** Indicates if an Energy sensor is found. +- **FloorElevation** Indicates if a Floor Elevation sensor is found. +- **GeomagneticOrientation** Indicates if a Geo Magnetic Orientation sensor is found. +- **GravityVector** Indicates if a Gravity Detector sensor is found. +- **Gyrometer3D** Indicates if a Gyrometer3D sensor is found. +- **Humidity** Indicates if a Humidity sensor is found. +- **InventoryVersion** The version of the inventory file generating the events. +- **LinearAccelerometer** Indicates if a Linear Accelerometer sensor is found. +- **Magnetometer3D** Indicates if a Magnetometer3D sensor is found. +- **Orientation** Indicates if an Orientation sensor is found. +- **Pedometer** Indicates if a Pedometer sensor is found. +- **Proximity** Indicates if a Proximity sensor is found. +- **RelativeOrientation** Indicates if a Relative Orientation sensor is found. +- **SimpleDeviceOrientation** Indicates if a Simple Device Orientation sensor is found. +- **Temperature** Indicates if a Temperature sensor is found. + + +### Microsoft.Windows.Inventory.Core.InventoryDeviceInterfaceStartSync + +This event indicates that a new set of InventoryDeviceInterfaceAdd events will be sent. + +This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedeviceinventorychange). + +The following fields are available: + +- **InventoryVersion** The version of the inventory file generating the events. + + +### Microsoft.Windows.Inventory.Core.InventoryDeviceMediaClassAdd + +This event sends additional metadata about a Plug and Play device that is specific to a particular class of devices to help keep Windows up to date while reducing overall size of data payload. + +This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedeviceinventorychange). + +The following fields are available: + +- **audio.captureDriver** Audio device capture driver. Example: hdaudio.inf:db04a16ce4e8d6ee:HdAudModel:10.0.14887.1000:hdaudio\func_01 +- **audio.renderDriver** Audio device render driver. Example: hdaudio.inf:db04a16ce4e8d6ee:HdAudModel:10.0.14889.1001:hdaudio\func_01 +- **Audio_CaptureDriver** The Audio device capture driver endpoint. +- **Audio_RenderDriver** The Audio device render driver endpoint. +- **InventoryVersion** The version of the inventory file generating the events. + + +### Microsoft.Windows.Inventory.Core.InventoryDeviceMediaClassRemove + +This event indicates that the InventoryDeviceMediaClassRemove object is no longer present. + +This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedeviceinventorychange). + +The following fields are available: + +- **InventoryVersion** The version of the inventory file generating the events. + + +### Microsoft.Windows.Inventory.Core.InventoryDeviceMediaClassStartSync + +This event indicates that a new set of InventoryDeviceMediaClassSAdd events will be sent. + +This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedeviceinventorychange). + +The following fields are available: + +- **InventoryVersion** The version of the inventory file generating the events. + + +### Microsoft.Windows.Inventory.Core.InventoryDevicePnpAdd + +This event represents the basic metadata about a plug and play (PNP) device and its associated driver. + +This event includes fields from [Ms.Dedevi.DedeviInventoryChange](#msdedevidedeviinventorychange). + +The following fields are available: + +- **basedata** No content is currently available. See [basedata](#basedata). +- **BusReportedDescription** The description of the device reported by the bux. +- **Class** The device setup class of the driver loaded for the device. +- **ClassGuid** The device class unique identifier of the driver package loaded on the device. +- **COMPID** The list of “Compatible IDs” for this device. +- **COMPID.Count** No content is currently available. +- **ContainerId** The system-supplied unique identifier that specifies which group(s) the device(s) installed on the parent (main) device belong to. +- **Description** The description of the device. +- **DeviceInterfaceClasses** The device interfaces that this device implements. +- **DeviceState** Identifies the current state of the parent (main) device. +- **DriverId** The unique identifier for the installed driver. +- **DriverName** The name of the driver image file. +- **DriverPackageStrongName** The immediate parent directory name in the Directory field of InventoryDriverPackage. +- **DriverVerDate** The date associated with the driver installed on the device. +- **DriverVerVersion** The version number of the driver installed on the device. +- **Enumerator** Identifies the bus that enumerated the device. +- **ExtendedInfs** The extended INF file names. +- **HWID** A list of hardware IDs for the device. +- **HWID.Count** No content is currently available. +- **Inf** The name of the INF file (possibly renamed by the OS, such as oemXX.inf). +- **InstallState** The device installation state. For a list of values, see: https://msdn.microsoft.com/en-us/library/windows/hardware/ff543130.aspx +- **InventoryVersion** The version number of the inventory process generating the events. +- **LowerClassFilters** The identifiers of the Lower Class filters installed for the device. +- **LowerFilters** The identifiers of the Lower filters installed for the device. +- **Manufacturer** The manufacturer of the device. +- **MatchingID** The Hardware ID or Compatible ID that Windows uses to install a device instance. +- **Model** Identifies the model of the device. +- **ParentId** The Device Instance ID of the parent of the device. +- **ProblemCode** The error code currently returned by the device, if applicable. +- **Provider** Identifies the device provider. +- **Service** The name of the device service. +- **STACKID** The list of hardware IDs for the stack. +- **STACKID.Count** No content is currently available. +- **UpperClassFilters** The identifiers of the Upper Class filters installed for the device. +- **UpperFilters** The identifiers of the Upper filters installed for the device. + + +### Microsoft.Windows.Inventory.Core.InventoryDevicePnpRemove + +This event indicates that the InventoryDevicePnpRemove object is no longer present. + +This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedeviceinventorychange). + +The following fields are available: + +- **InventoryVersion** The version of the inventory file generating the events. + + +### Microsoft.Windows.Inventory.Core.InventoryDevicePnpStartSync + +This event indicates that a new set of InventoryDevicePnpAdd events will be sent. + +This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedeviceinventorychange). + +The following fields are available: + +- **InventoryVersion** The version of the inventory file generating the events. + + +### Microsoft.Windows.Inventory.Core.InventoryDeviceUsbHubClassAdd + +This event sends basic metadata about the USB hubs on the device. + +This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedeviceinventorychange). + +The following fields are available: + +- **InventoryVersion** The version of the inventory file generating the events. +- **TotalUserConnectablePorts** Total number of connectable USB ports. +- **TotalUserConnectableTypeCPorts** Total number of connectable USB Type C ports. + + +### Microsoft.Windows.Inventory.Core.InventoryDeviceUsbHubClassStartSync + +This event indicates that a new set of InventoryDeviceUsbHubClassAdd events will be sent. + +This event includes fields from [Ms.De~ice.DeviceInventoryChange](#msde~icedeviceinventorychange). + +The following fields are available: + +- **InventoryVersion** The version of the inventory file generating the events. + + +### Microsoft.Windows.Inventory.Core.InventoryDriverBinaryAdd + +This event provides the basic metadata about driver binaries running on the system. + +This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedeviceinventorychange). + +The following fields are available: + +- **DriverCheckSum** The checksum of the driver file. +- **DriverCompany** The company name that developed the driver. +- **DriverInBox** Is the driver included with the operating system? +- **DriverIsKernelMode** Is it a kernel mode driver? +- **DriverName** The file name of the driver. +- **DriverPackageStrongName** The strong name of the driver package +- **DriverSigned** The strong name of the driver package +- **DriverTimeStamp** The low 32 bits of the time stamp of the driver file. +- **DriverType** A bitfield of driver attributes: 1. define DRIVER_MAP_DRIVER_TYPE_PRINTER 0x0001. 2. define DRIVER_MAP_DRIVER_TYPE_KERNEL 0x0002. 3. define DRIVER_MAP_DRIVER_TYPE_USER 0x0004. 4. define DRIVER_MAP_DRIVER_IS_SIGNED 0x0008. 5. define DRIVER_MAP_DRIVER_IS_INBOX 0x0010. 6. define DRIVER_MAP_DRIVER_IS_WINQUAL 0x0040. 7. define DRIVER_MAP_DRIVER_IS_SELF_SIGNED 0x0020. 8. define DRIVER_MAP_DRIVER_IS_CI_SIGNED 0x0080. 9. define DRIVER_MAP_DRIVER_HAS_BOOT_SERVICE 0x0100. 10. define DRIVER_MAP_DRIVER_TYPE_I386 0x10000. 11. define DRIVER_MAP_DRIVER_TYPE_IA64 0x20000. 12. define DRIVER_MAP_DRIVER_TYPE_AMD64 0x40000. 13. define DRIVER_MAP_DRIVER_TYPE_ARM 0x100000. 14. define DRIVER_MAP_DRIVER_TYPE_THUMB 0x200000. 15. define DRIVER_MAP_DRIVER_TYPE_ARMNT 0x400000. 16. define DRIVER_MAP_DRIVER_IS_TIME_STAMPED 0x800000. +- **DriverVersion** The version of the driver file. +- **ImageSize** The size of the driver file. +- **Inf** The name of the INF file. +- **InventoryVersion** The version of the inventory file generating the events. +- **Product** The product name that is included in the driver file. +- **ProductVersio~** No content is currently available. +- **ProductVersion** The product version that is included in the driver file. +- **Service** The name of the service that is installed for the device. +- **WdfVersion** The Windows Driver Framework version. + + +### Microsoft.Windows.Inventory.Core.InventoryDriverBinaryRemove + +This event indicates that the InventoryDriverBinary object is no longer present. + +This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedeviceinventorychange). + +The following fields are available: + +- **InventoryVersion** The version of the inventory file generating the events. + + +### Microsoft.Windows.Inventory.Core.InventoryDriverBinaryStartSync + +This event indicates that a new set of InventoryDriverBinaryAdd events will be sent. + +This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedeviceinventorychange). + +The following fields are available: + +- **InventoryVersion** The version of the inventory file generating the events. + + +### Microsoft.Windows.Inventory.Core.InventoryDriverPackageAdd + +This event sends basic metadata about drive packages installed on the system to help keep Windows up to date. + +This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedeviceinventorychange). + +The following fields are available: + +- **Class** The class name for the device driver. +- **ClassGuid** The class GUID for the device driver. +- **Date** The driver package date. +- **Directory** The path to the driver package. +- **DriverInBox** Is the driver included with the operating system? +- **Inf** The INF name of the driver package. +- **InventoryVersion** The version of the inventory file generating the events. +- **Provider** The provider for the driver package. +- **SubmissionId** The HLK submission ID for the driver package. +- **Version** The version of the driver package. + + +### Microsoft.Windows.Inventory.Core.InventoryDriverPackageRemove + +This event indicates that the InventoryDriverPackageRemove object is no longer present. + +This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedeviceinventorychange). + +The following fields are available: + +- **InventoryVersion** The version of the inventory file generating the events. + + +### Microsoft.Windows.Inventory.Core.InventoryDriverPackageStartSync + +This event indicates that a new set of InventoryDriverPackageAdd events will be sent. + +This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedeviceinventorychange). + +The following fields are available: + +- **InventoryVersion** The version of the inventory file generating the events. + + +### Microsoft.Windows.Inventory.Core.StartUtcJsonTrace + +This event collects traces of all other Core events, not used in typical customer scenarios. This event signals the beginning of the event download, and that tracing should begin. + + + +### Microsoft.Windows.Inventory.Core.StopUtcJsonTrace + +This event collects traces of all other Core events, not used in typical customer scenarios. This event signals the end of the event download, and that tracing should end. + + + +### Microsoft.Windows.Inventory.General.AppHealthStaticAdd + +This event sends details collected for a specific application on the source device. + +The following fields are available: + +- **AhaVersion** The binary version of the App Health Analyzer tool. +- **ApplicationErrors** The count of application errors from the event log. +- **Bitness** The architecture type of the application (16 Bit or 32 bit or 64 bit). +- **device_level** Various JRE/JAVA versions installed on a particular device. +- **ExtendedProperties** Attribute used for aggregating all other attributes under this event type. +- **Jar** Flag to determine if an app has a Java JAR file dependency. +- **Jre** Flag to determine if an app has JRE framework dependency. +- **Jre_version** JRE versions an app has declared framework dependency for. +- **Name** Name of the application. +- **NonDPIAware** Flag to determine if an app is non-DPI aware. +- **NumBinaries** Count of all binaries (.sys,.dll,.ini) from application install location. +- **RequiresAdmin** Flag to determine if an app requests admin privileges for execution. +- **RequiresAdminv2** Additional flag to determine if an app requests admin privileges for execution. +- **RequiresUIAccess** Flag to determine if an app is based on UI features for accessibility. +- **VB6** Flag to determine if an app is based on VB6 framework. +- **VB6v2** Additional flag to determine if an app is based on VB6 framework. +- **Version** Version of the application. +- **VersionCheck** Flag to determine if an app has a static dependency on OS version. +- **VersionCheckv2** Additional flag to determine if an app has a static dependency on OS version. + + +### Microsoft.Windows.Inventory.General.AppHealthStaticStartSync + +This event indicates the beginning of a series of AppHealthStaticAdd events. + +The following fields are available: + +- **AllowTelemetry** Indicates the presence of the 'allowtelemetry' command line argument. +- **CommandLineArgs** Command line arguments passed when launching the App Health Analyzer executable. +- **Enhanced** Indicates the presence of the 'enhanced' command line argument. +- **StartTime** UTC date and time at which this event was sent. + + +### Microsoft.Windows.Inventory.General.InventoryMiscellaneousOfficeAddInAdd + +Provides data on the installed Office Add-ins. + +This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedeviceinventorychange). + +The following fields are available: + +- **AddinCLSID** The class identifier key for the Microsoft Office add-in. +- **AddInCLSID** The class identifier key for the Microsoft Office add-in. +- **AddInId** The identifier for the Microsoft Office add-in. +- **AddinType** The type of the Microsoft Office add-in. +- **BinFileTimestamp** The timestamp of the Office add-in. +- **BinFileVersion** The version of the Microsoft Office add-in. +- **Description** Description of the Microsoft Office add-in. +- **FileId** The file identifier of the Microsoft Office add-in. +- **FileSize** The file size of the Microsoft Office add-in. +- **FriendlyName** The friendly name for the Microsoft Office add-in. +- **FullPath** The full path to the Microsoft Office add-in. +- **InventoryVersion** The version of the inventory binary generating the events. +- **LoadBehavior** Integer that describes the load behavior. +- **LoadTime** Load time for the Office add-in. +- **OfficeApplication** The Microsoft Office application associated with the add-in. +- **OfficeArchitecture** The architecture of the add-in. +- **OfficeVersion** The Microsoft Office version for this add-in. +- **OutlookCrashingAddin** Indicates whether crashes have been found for this add-in. +- **ProductCompany** The name of the company associated with the Office add-in. +- **ProductName** The product name associated with the Microsoft Office add-in. +- **ProductVersion** The version associated with the Office add-in. +- **ProgramId** The unique program identifier of the Microsoft Office add-in. +- **Provider** Name of the provider for this add-in. + + +### Microsoft.Windows.Inventory.General.InventoryMiscellaneousOfficeAddInRemove + +Indicates that this particular data object represented by the objectInstanceId is no longer present. + +This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedeviceinventorychange). + +The following fields are available: + +- **InventoryVersion** The version of the inventory binary generating the events. + + +### Microsoft.Windows.Inventory.General.InventoryMiscellaneousOfficeAddInStartSync + +This event indicates that a new sync is being generated for this object type. + +This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedeviceinventorychange). + +The following fields are available: + +- **InventoryVersion** The version of the inventory binary generating the events. + + +### Microsoft.Windows.Inventory.General.InventoryMiscellaneousOfficeIdentifiersAdd + +Provides data on the Office identifiers. + +This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedeviceinventorychange). + +The following fields are available: + +- **InventoryVersion** The version of the inventory binary generating the events. +- **OAudienceData** Sub-identifier for Microsoft Office release management, identifying the pilot group for a device +- **OAudienceId** Microsoft Office identifier for Microsoft Office release management, identifying the pilot group for a device +- **OMID** Identifier for the Office SQM Machine +- **OPlatform** Whether the installed Microsoft Office product is 32-bit or 64-bit +- **OTenantId** Unique GUID representing the Microsoft O365 Tenant +- **OVersion** Installed version of Microsoft Office. For example, 16.0.8602.1000 +- **OWowMID** Legacy Microsoft Office telemetry identifier (SQM Machine ID) for WoW systems (32-bit Microsoft Office on 64-bit Windows) + + +### Microsoft.Windows.Inventory.General.InventoryMiscellaneousOfficeIdentifiersStartSync + +Diagnostic event to indicate a new sync is being generated for this object type. + +This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedeviceinventorychange). + +The following fields are available: + +- **InventoryVersion** The version of the inventory binary generating the events. + + +### Microsoft.Windows.Inventory.General.InventoryMiscellaneousOfficeIESettingsAdd + +Provides data on Office-related Internet Explorer features. + +This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedeviceinventorychange). + +The following fields are available: + +- **InventoryVersion** The version of the inventory binary generating the events. +- **OIeFeatureAddon** Flag indicating which Microsoft Office products have this setting enabled. The FEATURE_ADDON_MANAGEMENT feature lets applications hosting the WebBrowser Control to respect add-on management selections made using the Add-on Manager feature of Internet Explorer. Add-ons disabled by the user or by administrative group policy will also be disabled in applications that enable this feature. +- **OIeMachineLockdown** Flag indicating which Microsoft Office products have this setting enabled. When the FEATURE_LOCALMACHINE_LOCKDOWN feature is enabled, Internet Explorer applies security restrictions on content loaded from the user's local machine, which helps prevent malicious behavior involving local files. +- **OIeMimeHandling** Flag indicating which Microsoft Office products have this setting enabled. When the FEATURE_MIME_HANDLING feature control is enabled, Internet Explorer handles MIME types more securely. Only applies to Windows Internet Explorer 6 for Windows XP Service Pack 2 (SP2) +- **OIeMimeSniffing** Flag indicating which Microsoft Office products have this setting enabled. Determines a file's type by examining its bit signature. Windows Internet Explorer uses this information to determine how to render the file. The FEATURE_MIME_SNIFFING feature, when enabled, allows to be set differently for each security zone by using the URLACTION_FEATURE_MIME_SNIFFING URL action flag +- **OIeNoAxInstall** Flag indicating which Microsoft Office products have this setting enabled. When a webpage attempts to load or install an ActiveX control that isn't already installed, the FEATURE_RESTRICT_ACTIVEXINSTALL feature blocks the request. When a webpage tries to load or install an ActiveX control that isn't already installed, the FEATURE_RESTRICT_ACTIVEXINSTALL feature blocks the request +- **OIeNoDownload** Flag indicating which Microsoft Office products have this setting enabled. The FEATURE_RESTRICT_FILEDOWNLOAD feature blocks file download requests that navigate to a resource, that display a file download dialog box, or that are not initiated explicitly by a user action (for example, a mouse click or key press). Only applies to Windows Internet Explorer 6 for Windows XP Service Pack 2 (SP2) +- **OIeObjectCaching** Flag indicating which Microsoft Office products have this setting enabled. When enabled, the FEATURE_OBJECT_CACHING feature prevents webpages from accessing or instantiating ActiveX controls cached from different domains or security contexts +- **OIePasswordDisable** Flag indicating which Microsoft Office products have this setting enabled. After Windows Internet Explorer 6 for Windows XP Service Pack 2 (SP2), Internet Explorer no longer allows usernames and passwords to be specified in URLs that use the HTTP or HTTPS protocols. URLs using other protocols, such as FTP, still allow usernames and passwords +- **OIeSafeBind** Flag indicating which Microsoft Office products have this setting enabled. The FEATURE_SAFE_BINDTOOBJECT feature performs additional safety checks when calling MonikerBindToObject to create and initialize Microsoft ActiveX controls. Specifically, prevent the control from being created if COMPAT_EVIL_DONT_LOAD is in the registry for the control +- **OIeSecurityBand** Flag indicating which Microsoft Office products have this setting enabled. The FEATURE_SECURITYBAND feature controls the display of the Internet Explorer Information bar. When enabled, the Information bar appears when file download or code installation is restricted +- **OIeUncSaveCheck** Flag indicating which Microsoft Office products have this setting enabled. The FEATURE_UNC_SAVEDFILECHECK feature enables the Mark of the Web (MOTW) for local files loaded from network locations that have been shared by using the Universal Naming Convention (UNC) +- **OIeValidateUrl** Flag indicating which Microsoft Office products have this setting enabled. When enabled, the FEATURE_VALIDATE_NAVIGATE_URL feature control prevents Windows Internet Explorer from navigating to a badly formed URL +- **OIeWebOcPopup** Flag indicating which Microsoft Office products have this setting enabled. The FEATURE_WEBOC_POPUPMANAGEMENT feature allows applications hosting the WebBrowser Control to receive the default Internet Explorer pop-up window management behavior +- **OIeWinRestrict** Flag indicating which Microsoft Office products have this setting enabled. When enabled, the FEATURE_WINDOW_RESTRICTIONS feature adds several restrictions to the size and behavior of popup windows +- **OIeZoneElevate** Flag indicating which Microsoft Office products have this setting enabled. When enabled, the FEATURE_ZONE_ELEVATION feature prevents pages in one zone from navigating to pages in a higher security zone unless the navigation is generated by the user + + +### Microsoft.Windows.Inventory.General.InventoryMiscellaneousOfficeIESettingsStartSync + +Diagnostic event to indicate a new sync is being generated for this object type. + +This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedeviceinventorychange). + +The following fields are available: + +- **InventoryVersion** The version of the inventory binary generating the events. + + +### Microsoft.Windows.Inventory.General.InventoryMiscellaneousOfficeInsightsAdd + +This event provides insight data on the installed Office products + +This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedeviceinventorychange). + +The following fields are available: + +- **InventoryVersion** The version of the inventory binary generating the events. +- **OfficeApplication** The name of the Office application. +- **OfficeArchitecture** The bitness of the Office application. +- **OfficeVersion** The version of the Office application. +- **Value** The insights collected about this entity. + + +### Microsoft.Windows.Inventory.General.InventoryMiscellaneousOfficeInsightsRemove + +Indicates that this particular data object represented by the objectInstanceId is no longer present. + +This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedeviceinventorychange). + +The following fields are available: + +- **InventoryVersion** The version of the inventory binary generating the events. + + +### Microsoft.Windows.Inventory.General.InventoryMiscellaneousOfficeInsightsStartSync + +This diagnostic event indicates that a new sync is being generated for this object type. + +This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedeviceinventorychange). + +The following fields are available: + +- **InventoryVersion** The version of the inventory binary generating the events. + + +### Microsoft.Windows.Inventory.General.InventoryMiscellaneousOfficeProductsAdd + +Describes Office Products installed. + +This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedeviceinventorychange). + +The following fields are available: + +- **InventoryVersion** The version of the inventory binary generating the events. +- **OC2rApps** A GUID the describes the Office Click-To-Run apps +- **OC2rSkus** Comma-delimited list (CSV) of Office Click-To-Run products installed on the device. For example, Office 2016 ProPlus +- **OMsiApps** Comma-delimited list (CSV) of Office MSI products installed on the device. For example, Microsoft Word +- **OProductCodes** A GUID that describes the Office MSI products + + +### Microsoft.Windows.Inventory.General.InventoryMiscellaneousOfficeProductsStartSync + +Diagnostic event to indicate a new sync is being generated for this object type. + +This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedeviceinventorychange). + +The following fields are available: + +- **InventoryVersion** The version of the inventory binary generating the events. + + +### Microsoft.Windows.Inventory.General.InventoryMiscellaneousOfficeSettingsAdd + +This event describes various Office settings + +This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedeviceinventorychange). + +The following fields are available: + +- **BrowserFlags** Browser flags for Office-related products +- **ExchangeProviderFlags** Provider policies for Office Exchange +- **InventoryVersion** The version of the inventory binary generating the events. +- **SharedComputerLicensing** Office shared computer licensing policies + + +### Microsoft.Windows.Inventory.General.InventoryMiscellaneousOfficeSettingsStartSync + +Indicates a new sync is being generated for this object type. + +This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedeviceinventorychange). + +The following fields are available: + +- **InventoryVersion** The version of the inventory binary generating the events. + + +### Microsoft.Windows.Inventory.General.InventoryMiscellaneousOfficeVBAAdd + +This event provides a summary rollup count of conditions encountered while performing a local scan of Office files, analyzing for known VBA programmability compatibility issues between legacy office version and ProPlus, and between 32 and 64-bit versions + +This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedeviceinventorychange). + +The following fields are available: + +- **Design** Count of files with design issues found. +- **Design_x64** Count of files with 64 bit design issues found. +- **DuplicateVBA** Count of files with duplicate VBA code. +- **HasVBA** Count of files with VBA code. +- **Inaccessible** Count of files that were inaccessible for scanning. +- **InventoryVersion** The version of the inventory binary generating the events. +- **Issues** Count of files with issues detected. +- **Issues_x64** Count of files with 64-bit issues detected. +- **IssuesNone** Count of files with no issues detected. +- **IssuesNone_x64** Count of files with no 64-bit issues detected. +- **Locked** Count of files that were locked, preventing scanning. +- **NoVBA** Count of files with no VBA inside. +- **Protected** Count of files that were password protected, preventing scanning. +- **RemLimited** Count of files that require limited remediation changes. +- **RemLimited_x64** Count of files that require limited remediation changes for 64-bit issues. +- **RemSignificant** Count of files that require significant remediation changes. +- **RemSignificant_x64** Count of files that require significant remediation changes for 64-bit issues. +- **Score** Overall compatibility score calculated for scanned content. +- **Score_x64** Overall 64-bit compatibility score calculated for scanned content. +- **Total** Total number of files scanned. +- **Validation** Count of files that require additional manual validation. +- **Validation_x64** Count of files that require additional manual validation for 64-bit issues. + + +### Microsoft.Windows.Inventory.General.InventoryMiscellaneousOfficeVBARemove + +Indicates that this particular data object represented by the objectInstanceId is no longer present. + +This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedeviceinventorychange). + +The following fields are available: + +- **InventoryVersion** The version of the inventory binary generating the events. + + +### Microsoft.Windows.Inventory.General.InventoryMiscellaneousOfficeVBARuleViolationsAdd + +This event provides data on Microsoft Office VBA rule violations, including a rollup count per violation type, giving an indication of remediation requirements for an organization. The event identifier is a unique GUID, associated with the validation rule + +This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedeviceinventorychange). + +The following fields are available: + +- **Count** Count of total Microsoft Office VBA rule violations +- **InventoryVersion** The version of the inventory binary generating the events. + + +### Microsoft.Windows.Inventory.General.InventoryMiscellaneousOfficeVBARuleViolationsRemove + +Indicates that this particular data object represented by the objectInstanceId is no longer present. + +This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedeviceinventorychange). + +The following fields are available: + +- **InventoryVersion** The version of the inventory binary generating the events. + + +### Microsoft.Windows.Inventory.General.InventoryMiscellaneousOfficeVBARuleViolationsStartSync + +This event indicates that a new sync is being generated for this object type. + +This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedeviceinventorychange). + +The following fields are available: + +- **InventoryVersion** The version of the inventory binary generating the events. + + +### Microsoft.Windows.Inventory.General.InventoryMiscellaneousOfficeVBAStartSync + +Diagnostic event to indicate a new sync is being generated for this object type. + +This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedeviceinventorychange). + +The following fields are available: + +- **InventoryVersion** The version of the inventory binary generating the events. + + +### Microsoft.Windows.Inventory.General.InventoryMiscellaneousUUPInfoAdd + +Provides data on Unified Update Platform (UUP) products and what version they are at. + +This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedeviceinventorychange). + +The following fields are available: + +- **Identifier** UUP identifier +- **LastActivatedVersion** Last activated version +- **PreviousVersion** Previous version +- **Source** UUP source +- **Version** UUP version + + +### Microsoft.Windows.Inventory.General.InventoryMiscellaneousUUPInfoRemove + +Indicates that this particular data object represented by the objectInstanceId is no longer present. + +This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedeviceinventorychange). + + + +### Microsoft.Windows.Inventory.General.InventoryMiscellaneousUUPInfoStartSync + +Diagnostic event to indicate a new sync is being generated for this object type. + +This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedeviceinventorychange). + + + +### Microsoft.Windows.Inventory.Indicators.Checksum + +This event summarizes the counts for the InventoryMiscellaneousUexIndicatorAdd events. + +The following fields are available: + +- **CensusId** A unique hardware identifier. +- **ChecksumDictionary** A count of each operating system indicator. +- **PCFP** Equivalent to the InventoryId field that is found in other core events. + + +### Microsoft.Windows.Inventory.Indicators.InventoryMiscellaneousUexIndicatorAdd + +These events represent the basic metadata about the OS indicators installed on the system which are used for keeping the device up to date. + +This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedeviceinventorychange). + +The following fields are available: + +- **IndicatorValue** The indicator value. +- **Value** Describes an operating system indicator that may be relevant for the device upgrade. + + +### Microsoft.Windows.Inventory.Indicators.InventoryMiscellaneousUexIndicatorRemove + +This event is a counterpart to InventoryMiscellaneousUexIndicatorAdd that indicates that the item has been removed. + +This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedeviceinventorychange). + + + +### Microsoft.Windows.Inventory.Indicators.InventoryMiscellaneousUexIndicatorStartSync + +This event indicates that a new set of InventoryMiscellaneousUexIndicatorAdd events will be sent. + +This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedeviceinventorychange). + + + +## Kernel events + +### IO + +This event indicates the number of bytes read from or read by the OS and written to or written by the OS upon system startup. + +The following fields are available: + +- **BytesRead** The total number of bytes read from or read by the OS upon system startup. +- **BytesWritten** The total number of bytes written to or written by the OS upon system startup. +- **f** No content is currently available. See [f](#f). + + +### Microsoft.Windows.Kernel.BootEnvironment.OsLaunch + +OS information collected during Boot, used to evaluate the success of the upgrade process. + +The following fields are available: + +- **BootApplicationId** This field tells us what the OS Loader Application Identifier is. +- **BootAttemptCount** The number of consecutive times the boot manager has attempted to boot into this operating system. +- **BootSequence** The current Boot ID, used to correlate events related to a particular boot session. +- **BootStatusPolicy** Identifies the applicable Boot Status Policy. +- **BootType** Identifies the type of boot (e.g.: "Cold", "Hiber", "Resume"). +- **EventTimestamp** Seconds elapsed since an arbitrary time point. This can be used to identify the time difference in successive boot attempts being made. +- **FirmwareResetReasonEmbeddedController** Reason for system reset provided by firmware. +- **FirmwareResetReasonEmbeddedControllerAdditional** Additional information on system reset reason provided by firmware if needed. +- **FirmwareResetReasonPch** Reason for system reset provided by firmware. +- **FirmwareResetReasonPchAdditional** Additional information on system reset reason provided by firmware if needed. +- **FirmwareResetReasonSupplied** Flag indicating that a reason for system reset was provided by firmware. +- **IO** Amount of data written to and read from the disk by the OS Loader during boot. See [IO](#io). +- **LastBootSucceeded** Flag indicating whether the last boot was successful. +- **LastShutdownSucceeded** Flag indicating whether the last shutdown was successful. +- **MaxAbove4GbFreeRange** This field describes the largest memory range available above 4Gb. +- **MaxBelow4GbFreeRange** This field describes the largest memory range available below 4Gb. +- **MeasuredLaunchPrepared** This field tells us if the OS launch was initiated using Measured/Secure Boot over DRTM (Dynamic Root of Trust for Measurement). +- **MeasuredLaunchResume** This field tells us if Dynamic Root of Trust for Measurement (DRTM) was used when resuming from hibernation. +- **MenuPolicy** Type of advanced options menu that should be shown to the user (Legacy, Standard, etc.). +- **RecoveryEnabled** Indicates whether recovery is enabled. +- **SecureLaunchPrepared** This field indicates if DRTM was prepared during boot. +- **TcbLaunch** Indicates whether the Trusted Computing Base was used during the boot flow. +- **UserInputTime** The amount of time the loader application spent waiting for user input. + + +## Miracast events + +### Microsoft.Windows.Cast.Miracast.MiracastSessionEnd + +This event sends data at the end of a Miracast session that helps determine RTSP related Miracast failures along with some statistics about the session + +The following fields are available: + +- **AudioChannelCount** The number of audio channels. +- **AudioSampleRate** The sample rate of audio in terms of samples per second. +- **AudioSubtype** The unique subtype identifier of the audio codec (encoding method) used for audio encoding. +- **AverageBitrate** The average video bitrate used during the Miracast session, in bits per second. +- **AverageDataRate** The average available bandwidth reported by the WiFi driver during the Miracast session, in bits per second. +- **AveragePacketSendTimeInMs** The average time required for the network to send a sample, in milliseconds. +- **ConnectorType** The type of connector used during the Miracast session. +- **EncodeAverageTimeMS** The average time to encode a frame of video, in milliseconds. +- **EncodeCount** The count of total frames encoded in the session. +- **EncodeMaxTimeMS** The maximum time to encode a frame, in milliseconds. +- **EncodeMinTimeMS** The minimum time to encode a frame, in milliseconds. +- **EncoderCreationTimeInMs** The time required to create the video encoder, in milliseconds. +- **ErrorSource** Identifies the component that encountered an error that caused a disconnect, if applicable. +- **FirstFrameTime** The time (tick count) when the first frame is sent. +- **FirstLatencyMode** The first latency mode. +- **FrameAverageTimeMS** Average time to process an entire frame, in milliseconds. +- **FrameCount** The total number of frames processed. +- **FrameMaxTimeMS** The maximum time required to process an entire frame, in milliseconds. +- **FrameMinTimeMS** The minimum time required to process an entire frame, in milliseconds. +- **Glitches** The number of frames that failed to be delivered on time. +- **HardwareCursorEnabled** Indicates if hardware cursor was enabled when the connection ended. +- **HDCPState** The state of HDCP (High-bandwidth Digital Content Protection) when the connection ended. +- **HighestBitrate** The highest video bitrate used during the Miracast session, in bits per second. +- **HighestDataRate** The highest available bandwidth reported by the WiFi driver, in bits per second. +- **LastLatencyMode** The last reported latency mode. +- **LogTimeReference** The reference time, in tick counts. +- **LowestBitrate** The lowest video bitrate used during the Miracast session, in bits per second. +- **LowestDataRate** The lowest video bitrate used during the Miracast session, in bits per second. +- **MediaErrorCode** The error code reported by the media session, if applicable. +- **MiracastEntry** The time (tick count) when the Miracast driver was first loaded. +- **MiracastM1** The time (tick count) when the M1 request was sent. +- **MiracastM2** The time (tick count) when the M2 request was sent. +- **MiracastM3** The time (tick count) when the M3 request was sent. +- **MiracastM4** The time (tick count) when the M4 request was sent. +- **MiracastM5** The time (tick count) when the M5 request was sent. +- **MiracastM6** The time (tick count) when the M6 request was sent. +- **MiracastM7** The time (tick count) when the M7 request was sent. +- **MiracastSessionState** The state of the Miracast session when the connection ended. +- **MiracastStreaming** The time (tick count) when the Miracast session first started processing frames. +- **ProfileCount** The count of profiles generated from the receiver M4 response. +- **ProfileCountAfterFiltering** The count of profiles after filtering based on available bandwidth and encoder capabilities. +- **RefreshRate** The refresh rate set on the remote display. +- **RotationSupported** Indicates if the Miracast receiver supports display rotation. +- **RTSPSessionId** The unique identifier of the RTSP session. This matches the RTSP session ID for the receiver for the same session. +- **SessionGuid** The unique identifier of to correlate various Miracast events from a session. +- **SinkHadEdid** Indicates if the Miracast receiver reported an EDID. +- **SupportMicrosoftColorSpaceConversion** Indicates whether the Microsoft color space conversion for extra color fidelity is supported by the receiver. +- **SupportsMicrosoftDiagnostics** Indicates whether the Miracast receiver supports the Microsoft Diagnostics Miracast extension. +- **SupportsMicrosoftFormatChange** Indicates whether the Miracast receiver supports the Microsoft Format Change Miracast extension. +- **SupportsMicrosoftLatencyManagement** Indicates whether the Miracast receiver supports the Microsoft Latency Management Miracast extension. +- **SupportsMicrosoftRTCP** Indicates whether the Miracast receiver supports the Microsoft RTCP Miracast extension. +- **SupportsMicrosoftVideoFormats** Indicates whether the Miracast receiver supports Microsoft video format for 3:2 resolution. +- **SupportsWiDi** Indicates whether Miracast receiver supports Intel WiDi extensions. +- **TeardownErrorCode** The error code reason for teardown provided by the receiver, if applicable. +- **TeardownErrorReason** The text string reason for teardown provided by the receiver, if applicable. +- **UIBCEndState** Indicates whether UIBC was enabled when the connection ended. +- **UIBCEverEnabled** Indicates whether UIBC was ever enabled. +- **UIBCStatus** The result code reported by the UIBC setup process. +- **VideoBitrate** The starting bitrate for the video encoder. +- **VideoCodecLevel** The encoding level used for encoding, specific to the video subtype. +- **VideoHeight** The height of encoded video frames. +- **VideoSubtype** The unique subtype identifier of the video codec (encoding method) used for video encoding. +- **VideoWidth** The width of encoded video frames. +- **WFD2Supported** Indicates if the Miracast receiver supports WFD2 protocol. + + +## OneDrive events + +### Microsoft.OneDrive.Sync.Setup.APIOperation + +This event includes basic data about install and uninstall OneDrive API operations. + +The following fields are available: + +- **APIName** The name of the API. +- **Duration** How long the operation took. +- **IsSuccess** Was the operation successful? +- **ResultCode** The result code. +- **ScenarioName** The name of the scenario. + + +### Microsoft.OneDrive.Sync.Setup.EndExperience + +This event includes a success or failure summary of the installation. + +The following fields are available: + +- **APIName** The name of the API. +- **HResult** HResult of the operation +- **IsSuccess** Whether the operation is successful or not +- **ScenarioName** The name of the scenario. + + +### Microsoft.OneDrive.Sync.Setup.OSUpgradeInstallationOperation + +This event is related to the OS version when the OS is upgraded with OneDrive installed. + +The following fields are available: + +- **CurrentOneDriveVersion** The current version of OneDrive. +- **CurrentOSBuildBranch** The current branch of the operating system. +- **CurrentOSBuildNumber** The current build number of the operating system. +- **CurrentOSVersion** The current version of the operating system. +- **HResult** The HResult of the operation. +- **SourceOSBuildBranch** The source branch of the operating system. +- **SourceOSBuildNumber** The source build number of the operating system. +- **SourceOSVersion** The source version of the operating system. + + +### Microsoft.OneDrive.Sync.Setup.RegisterStandaloneUpdaterAPIOperation + +This event is related to registering or unregistering the OneDrive update task. + +The following fields are available: + +- **APIName** The name of the API. +- **IsSuccess** Was the operation successful? +- **RegisterNewTaskResult** The HResult of the RegisterNewTask operation. +- **ScenarioName** The name of the scenario. +- **UnregisterOldTaskResult** The HResult of the UnregisterOldTask operation. + + +### Microsoft.OneDrive.Sync.Updater.ComponentInstallState + +This event includes basic data about the installation state of dependent OneDrive components. + +The following fields are available: + +- **ComponentName** The name of the dependent component. +- **isInstalled** Is the dependent component installed? + + +### Microsoft.OneDrive.Sync.Updater.OverlayIconStatus + +This event indicates if the OneDrive overlay icon is working correctly. 0 = healthy; 1 = can be fixed; 2 = broken + +The following fields are available: + +- **32bit** The status of the OneDrive overlay icon on a 32-bit operating system. +- **64bit** The status of the OneDrive overlay icon on a 64-bit operating system. + + +### Microsoft.OneDrive.Sync.Updater.UpdateOverallResult + +This event sends information describing the result of the update. + +The following fields are available: + +- **hr** The HResult of the operation. +- **IsLoggingEnabled** Indicates whether logging is enabled for the updater. +- **UpdaterVersion** The version of the updater. + + +### Microsoft.OneDrive.Sync.Updater.UpdateXmlDownloadHResult + +This event determines the status when downloading the OneDrive update configuration file. + +The following fields are available: + +- **hr** The HResult of the operation. + + +### Microsoft.OneDrive.Sync.Updater.WebConnectionStatus + +This event determines the error code that was returned when verifying Internet connectivity. + +The following fields are available: + +- **winInetError** The HResult of the operation. + + +## Privacy consent logging events + +### Microsoft.Windows.Shell.PrivacyConsentLogging.PrivacyConsentCompleted + +This event is used to determine whether the user successfully completed the privacy consent experience. + +The following fields are available: + +- **presentationVersion** Which display version of the privacy consent experience the user completed +- **privacyConsentState** The current state of the privacy consent experience +- **settingsVersion** Which setting version of the privacy consent experience the user completed +- **userOobeExitReason** The exit reason of the privacy consent experience + + +### Microsoft.Windows.Shell.PrivacyConsentLogging.PrivacyConsentStatus + +Event tells us effectiveness of new privacy experience. + +The following fields are available: + +- **isAdmin** whether the person who is logging in is an admin +- **isExistingUser** whether the account existed in a downlevel OS +- **isLaunching** Whether or not the privacy consent experience will be launched +- **isSilentElevation** whether the user has most restrictive UAC controls +- **privacyConsentState** whether the user has completed privacy experience +- **userRegionCode** The current user's region setting + + +### wilActivity + +This event provides a Windows Internal Library context used for Product and Service diagnostics. + +The following fields are available: + +- **-149ngContextMessage** No content is currently available. +- **3645entContextName** No content is currently available. +- **379rentContextName** No content is currently available. +- **532rentContextName** No content is currently available. +- **677rentContextName** No content is currently available. +- **8108entContextName** No content is currently available. +- **8251entContextName** No content is currently available. +- **902rentContextName** No content is currently available. +- **9567ngContextMessage** No content is currently available. +- **9717ngContextMessage** No content is currently available. +- **callContext** The function where the failure occurred. +- **currentContextId** The ID of the current call context where the failure occurred. +- **currentContextMessage** The message of the current call context where the failure occurred. +- **currentContextMessaon** No content is currently available. +- **currentContextName** The name of the current call context where the failure occurred. +- **failureCount** The number of failures for this failure ID. +- **failureId** The ID of the failure that occurred. +- **failureType** The type of the failure that occurred. +- **fileName** The file name where the failure occurred. +- **functige** No content is currently available. +- **function** The function where the failure occurred. +- **hresult** The HResult of the overall activity. +- **lineNumber** The line number where the failure occurred. +- **message** The message of the failure that occurred. +- **module** The module where the failure occurred. +- **ori1-0467ngContextMessage** No content is currently available. +- **ori1-1210ngContextMessage** No content is currently available. +- **ori1143-7ngContextMessage** No content is currently available. +- **ori1-1945ngContextMessage** No content is currently available. +- **ori13s090ngContextMessage** No content is currently available. +- **ori1-4671entContextName** No content is currently available. +- **ori1-5108ngContextMessage** No content is currently available. +- **ori1-5686ngContextMessage** No content is currently available. +- **ori1n:667ngContextMessage** No content is currently available. +- **ori1n8488ngContextMessage** No content is currently available. +- **ori1-s4o5ngContextMessage** No content is currently available. +- **ori808467ngContextMessage** No content is currently available. +- **originatingContextId** The ID of the originating call context that resulted in the failure. +- **originatingContextMessage** The message of the originating call context that resulted in the failure. +- **originatingContextName** The name of the originating call context that resulted in the failure. +- **threadId** The ID of the thread on which the activity is executing. + + +## Sediment events + +### Microsoft.Windows.Sediment.Info.DetailedState + +This event is sent when detailed state information is needed from an update trial run. + +The following fields are available: + +- **Data** Data relevant to the state, such as what percent of disk space the directory takes up. +- **Id** Identifies the trial being run, such as a disk related trial. +- **ReleaseVer** The version of the component. +- **State** The state of the reporting data from the trial, such as the top-level directory analysis. +- **Time** The time the event was fired. + + +### Microsoft.Windows.Sediment.Info.Error + +This event indicates an error in the updater payload. This information assists in keeping Windows up to date. + +The following fields are available: + +- **FailureType** The type of error encountered. +- **FileName** The code file in which the error occurred. +- **HResult** The failure error code. +- **LineNumber** The line number in the code file at which the error occurred. +- **ReleaseVer** The version information for the component in which the error occurred. +- **Time** The system time at which the error occurred. + + +### Microsoft.Windows.Sediment.Info.PhaseChange + +The event indicates progress made by the updater. This information assists in keeping Windows up to date. + +The following fields are available: + +- **NewPhase** The phase of progress made. +- **ReleaseVer** The version information for the component in which the change occurred. +- **Time** The system time at which the phase chance occurred. + + +## Setup events + +### SetupPlatformTel.SetupPlatformTelActivityEvent + +This event sends basic metadata about the SetupPlatform update installation process, to help keep Windows up to date. + +The following fields are available: + +- **FieldName** Retrieves the event name/data point. Examples: InstallStartTime, InstallEndtime, OverallResult etc. +- **GroupName** Retrieves the groupname the event belongs to. Example: Install Information, DU Information, Disk Space Information etc. +- **Value** Value associated with the corresponding event name. For example, time-related events will include the system time + + +### SetupPlatformTel.SetupPlatformTelActivityStarted + +This event sends basic metadata about the update installation process generated by SetupPlatform to help keep Windows up to date. + +The following fields are available: + +- **Name** The name of the dynamic update type. Example: GDR driver + + +### SetupPlatformTel.SetupPlatformTelActivityStopped + +This event sends basic metadata about the update installation process generated by SetupPlatform to help keep Windows up to date. + + + +### SetupPlatformTel.SetupPlatformTelEvent + +This service retrieves events generated by SetupPlatform, the engine that drives the various deployment scenarios. + +The following fields are available: + +- **Falue** No content is currently available. +- **FieldName** Retrieves the event name/data point. Examples: InstallStartTime, InstallEndtime, OverallResult etc. +- **GroupName** Retrieves the groupname the event belongs to. Example: Install Information, DU Information, Disk Space Information etc. +- **Value** Retrieves the value associated with the corresponding event name (Field Name). For example: For time related events this will include the system time. + + +## Software update events + +### SoftwareUpdateClientTelemetry.CheckForUpdates + +Scan process event on Windows Update client. See the EventScenario field for specifics (started/failed/succeeded). + +The following fields are available: + +- **ActivityMatchingId** Contains a unique ID identifying a single CheckForUpdates session from initialization to completion. +- **AllowCachedResults** Indicates if the scan allowed using cached results. +- **ApplicableUpdateInfo** Metadata for the updates which were detected as applicable +- **BiosFamily** The family of the BIOS (Basic Input Output System). +- **BiosName** The name of the device BIOS. +- **BiosReleaseDate** The release date of the device BIOS. +- **BiosSKUNumber** The sku number of the device BIOS. +- **BIOSVendor** The vendor of the BIOS. +- **BiosVersion** The version of the BIOS. +- **BranchReadinessLevel** The servicing branch configured on the device. +- **CachedEngineVersion** For self-initiated healing, the version of the SIH engine that is cached on the device. If the SIH engine does not exist, the value is null. +- **CallerApplicationName** The name provided by the caller who initiated API calls into the software distribution client. +- **CapabilityDetectoidGuid** The GUID for a hardware applicability detectoid that could not be evaluated. +- **CDNCountryCode** Two letter country abbreviation for the Content Distribution Network (CDN) location. +- **CDNId** The unique identifier of a specific device, used to identify how many devices are encountering success or a particular issue. +- **ClientVersion** The version number of the software distribution client. +- **CommonProps** A bitmask for future flags associated with the Windows Update client behavior. No data is currently reported in this field. Expected value for this field is 0. +- **Context** Gives context on where the error has occurred. Example: AutoEnable, GetSLSData, AddService, Misc, or Unknown +- **CurrentMobileOperator** The mobile operator the device is currently connected to. +- **DeferralPolicySources** Sources for any update deferral policies defined (GPO = 0x10, MDM = 0x100, Flight = 0x1000, UX = 0x10000). +- **DeferredUpdates** Update IDs which are currently being deferred until a later time +- **DeviceModel** What is the device model. +- **DriverError** The error code hit during a driver scan. This is 0 if no error was encountered. +- **DriverExclusionPolicy** Indicates if the policy for not including drivers with Windows Update is enabled. +- **DriverSyncPassPerformed** Were drivers scanned this time? +- **EventInstanceID** A globally unique identifier for event instance. +- **EventScenario** Indicates the purpose of sending this event - whether because the software distribution just started checking for content, or whether it was cancelled, succeeded, or failed. +- **ExtendedetadataICabUrl** No content is currently available. +- **ExtendedMetadataCabUrl** Hostname that is used to download an update. +- **ExtendedStatusCode** Secondary error code for certain scenarios where StatusCode wasn't specific enough. +- **FailedUpdateGuids** The GUIDs for the updates that failed to be evaluated during the scan. +- **FailedUpdatesCount** The number of updates that failed to be evaluated during the scan. +- **FeatureUpdateDeferral** The deferral period configured for feature OS updates on the device (in days). +- **FeatureUpdatePause** Indicates whether feature OS updates are paused on the device. +- **FeatureUpdatePausePeriod** The pause duration configured for feature OS updates on the device (in days). +- **FlightBranch** The branch that a device is on if participating in flighting (pre-release builds). +- **FlightRing** The ring (speed of getting builds) that a device is on if participating in flighting (pre-release builds). +- **HomeMobileOperator** The mobile operator that the device was originally intended to work with. +- **IntentPFNs** Intended application-set metadata for atomic update scenarios. +- **IPVersion** Indicates whether the download took place over IPv4 or IPv6 +- **IsWUfBDualScanEnabled** Indicates if Windows Update for Business dual scan is enabled on the device. +- **IsWUfBEnabled** Indicates if Windows Update for Business is enabled on the device. +- **IsWUfBFederatedScanDisabled** Indicates if Windows Update for Business federated scan is disabled on the device. +- **MetadataIntegrityMode** The mode of the update transport metadata integrity check. 0-Unknown, 1-Ignoe, 2-Audit, 3-Enforce +- **MSIError** The last error that was encountered during a scan for updates. +- **NetworkConnectivityDetected** Indicates the type of network connectivity that was detected. 0 - IPv4, 1 - IPv6 +- **NumberOfApplicableUpdates** The number of updates which were ultimately deemed applicable to the system after the detection process is complete +- **NumberOfApplicationsCategoryScanEvaluated** The number of categories (apps) for which an app update scan checked +- **NumberOfLoop** The number of round trips the scan required +- **NumberOfNewUpdatesFromServiceSync** The number of updates which were seen for the first time in this scan +- **NumberOfUpdatesEvaluated** The total number of updates which were evaluated as a part of the scan +- **NumFailedetadataISignatures** No content is currently available. +- **NumFailedMetadataSignatures** The number of metadata signatures checks which failed for new metadata synced down. +- **Online** Indicates if this was an online scan. +- **PausedUpdates** A list of UpdateIds which that currently being paused. +- **PauseFeatureUpdatesEndTime** If feature OS updates are paused on the device, this is the date and time for the end of the pause time window. +- **PauseFeatureUpdatesStartTime** If feature OS updates are paused on the device, this is the date and time for the beginning of the pause time window. +- **PauseQualityUpdatesEndTime** If quality OS updates are paused on the device, this is the date and time for the end of the pause time window. +- **PauseQualityUpdatesStartTime** If quality OS updates are paused on the device, this is the date and time for the beginning of the pause time window. +- **PhonePreviewEnabled** Indicates whether a phone was getting preview build, prior to flighting (pre-release builds) being introduced. +- **ProcessName** The process name of the caller who initiated API calls, in the event where CallerApplicationName was not provided. +- **QualityUpdateDeferral** The deferral period configured for quality OS updates on the device (in days). +- **QualityUpdatePause** Indicates whether quality OS updates are paused on the device. +- **QualityUpdatePausePeriod** The pause duration configured for quality OS updates on the device (in days). +- **RelatedCV** The previous Correlation Vector that was used before swapping with a new one +- **ScanDurationInSeconds** The number of seconds a scan took +- **ScanEnqueueTime** The number of seconds it took to initialize a scan +- **ScanProps** This is a 32-bit integer containing Boolean properties for a given Windows Update scan. The following bits are used; all remaining bits are reserved and set to zero. Bit 0 (0x1): IsInteractive - is set to 1 if the scan is requested by a user, or 0 if the scan is requested by Automatic Updates. Bit 1 (0x2): IsSeeker - is set to 1 if the Windows Update client's Seeker functionality is enabled. Seeker functionality is enabled on certain interactive scans, and results in the scans returning certain updates that are in the initial stages of release (not yet released for full adoption via Automatic Updates). +- **ServiceGuid** An ID which represents which service the software distribution client is checking for content (Windows Update, Microsoft Store, etc.). +- **ServiceUrl** The environment URL a device is configured to scan with +- **ShippingMobileOperator** The mobile operator that a device shipped on. +- **StatusCode** Indicates the result of a CheckForUpdates event (success, cancellation, failure code HResult). +- **SyncType** Describes the type of scan the event was +- **SystemBIOSMajorRelease** Major version of the BIOS. +- **SystemBIOSMinorRelease** Minor version of the BIOS. +- **TargetMetadataVersion** For self-initiated healing, this is the target version of the SIH engine to download (if needed). If not, the value is null. +- **TotalNumetadataISignatures** No content is currently available. +- **TotalNumMetadataSignatures** The total number of metadata signatures checks done for new metadata that was synced down. +- **WebServiceRetryMethods** Web service method requests that needed to be retried to complete operation. +- **WUDeviceID** The unique identifier of a specific device, used to identify how many devices are encountering success or a particular issue. + + +### SoftwareUpdateClientTelemetry.Commit + +This event tracks the commit process post the update installation when software update client is trying to update the device. + +The following fields are available: + +- **BiosFamily** Device family as defined in the system BIOS +- **BiosName** Name of the system BIOS +- **BiosReleaseDate** Release date of the system BIOS +- **BiosSKUNumber** Device SKU as defined in the system BIOS +- **BIOSVendor** Vendor of the system BIOS +- **BiosVersion** Version of the system BIOS +- **BundleId** Identifier associated with the specific content bundle; should not be all zeros if the bundleID was found. +- **BundleRevisionNumbe2** No content is currently available. +- **BundleRevisionNumber** Identifies the revision number of the content bundle +- **CallerApplicationName** Name provided by the caller who initiated API calls into the software distribution client +- **ClientVersion** Version number of the software distribution client +- **DeploymentProviderMode** The mode of operation of the update deployment provider. +- **DeviceModel** Device model as defined in the system bios +- **EventInstanceID** A globally unique identifier for event instance +- **EventScenario** Indicates the purpose of the event - whether because scan started, succeded, failed, etc. +- **EventType** Possible values are "Child", "Bundle", "Relase" or "Driver". +- **FlightId** The specific id of the flight the device is getting +- **HandlerType** Indicates the kind of content (app, driver, windows patch, etc.) +- **RevisionNumber** Identifies the revision number of this specific piece of content +- **ServiceGuid** Identifier for the service to which the software distribution client is connecting (Windows Update, Windows Store, etc) +- **SystemBIOSMajorRelease** Major release version of the system bios +- **SystemBIOSMinorRelease** Minor release version of the system bios +- **UpdateId** Identifier associated with the specific piece of content +- **WUDeviceID** Unique device id controlled by the software distribution client + + +### SoftwareUpdateClientTelemetry.Download + +Download process event for target update on Windows Update client. See the EventScenario field for specifics (started/failed/succeeded). + +The following fields are available: + +- **ActiveDownloadTime** How long the download took, in seconds, excluding time where the update wasn't actively being downloaded. +- **AppXBlockHalhFailures** No content is currently available. +- **AppXBlockHashFailures** Indicates the number of blocks that failed hash validation during download of the app payload. +- **AppXBlockHashValidationFailureCount** A count of the number of blocks that have failed validation after being downloaded. +- **AppXBoockHashFailures** No content is currently available. +- **AppXDownloadScope** Indicates the scope of the download for application content. +- **AppXScope** Indicates the scope of the app download. +- **AppXScopr** No content is currently available. +- **B}ndleId** No content is currently available. +- **BiosFamily** The family of the BIOS (Basic Input Output System). +- **BiosName** The name of the device BIOS. +- **BiosReleaseDate** The release date of the device BIOS. +- **BiosSKUNumber** The sku number of the device BIOS. +- **BIOSVendor** The vendor of the BIOS. +- **BiosVersion** The version of the BIOS. +- **BundleBytesDownloaded** Number of bytes downloaded for the specific content bundle. +- **BundleId** Identifier associated with the specific content bundle. +- **BundleRepeatFailCoqnt** No content is currently available. +- **BundleRepeatFailCoun.** No content is currently available. +- **BundleRepeatFailCount** Indicates whether this particular update bundle has previously failed. +- **BundleRepeatFailFlag** Indicates whether this particular update bundle previously failed to download. +- **BundleRevisionNumber** Identifies the revision number of the content bundle. +- **BytesDownloaded** Number of bytes that were downloaded for an individual piece of content (not the entire bundle). +- **BytesDownnoaded** No content is currently available. +- **C`llerApplicationName** No content is currently available. +- **CachedEngineVersion** The version of the “Self-Initiated Healing” (SIH) engine that is cached on the device, if applicable. +- **CallerApplicationname** No content is currently available. +- **CallerApplicationName** The name provided by the application that initiated API calls into the software distribution client. +- **CalLerApplicationName** No content is currently available. +- **CallerApplictionaName** No content is currently available. +- **CbsDownloadMethod** Indicates whether the download was a full- or a partial-file download. +- **CbsMethod** The method used for downloading the update content related to the Component Based Servicing (CBS) technology. +- **CDNCotntryCode** No content is currently available. +- **CDNCoun.ryCdel** No content is currently available. +- **CDNCoundryCode** No content is currently available. +- **CDNCountryCode** Two letter country abbreviation for the Content Distribution Network (CDN) location. +- **CDNd** No content is currently available. +- **CDNId** ID which defines which CDN the software distribution client downloaded the content from. +- **ClientVersion** The version number of the software distribution client. +- **CommonProps** A bitmask for future flags associated with the Windows Update client behavior. +- **ConnectTime** Indicates the cumulative amount of time (in seconds) it took to establish the connection for all updates in an update bundle. +- **CtatusCode** No content is currently available. +- **CurrentMobileOperator** The mobile operator the device is currently connected to. +- **DeviceModel** The model of the device. +- **DownhoadProps** No content is currently available. +- **DownloadPriority** Indicates whether a download happened at background, normal, or foreground priority. +- **DownloadProps** Information about the download operation properties in the form of a bitmask. +- **DownloadType** Differentiates the download type of “Self-Initiated Healing” (SIH) downloads between Metadata and Payload downloads. +- **DownloedPriority** No content is currently available. +- **DventInstanceID** No content is currently available. +- **e:4|SInstanceID** No content is currently available. +- **e:4|SScenario** No content is currently available. +- **E:4|State** No content is currently available. +- **EöentInstanceID** No content is currently available. +- **Eve.tScenario** No content is currently available. +- **EventInst.9ceID** No content is currently available. +- **EventInstanceID** A globally unique identifier for event instance. +- **EventInstAnceID** No content is currently available. +- **EventPype** No content is currently available. +- **EventScanario** No content is currently available. +- **eventScenario** No content is currently available. +- **EventScenario** Indicates the purpose for sending this event: whether because the software distribution just started downloading content; or whether it was cancelled, succeeded, or failed. +- **EventType** Identifies the type of the event (Child, Bundle, or Driver). +- **EventTypr** No content is currently available. +- **ExtendedStatusCode** Secondary error code for certain scenarios where StatusCode wasn't specific enough. +- **ExtendedtartusCdel** No content is currently available. +- **FeatureUpdatePaser** No content is currently available. +- **FeatureUpdatePause** Indicates whether feature OS updates are paused on the device. +- **Fli.c9BuildNumber** No content is currently available. +- **Fli.c9Id** No content is currently available. +- **FlightBranch** The branch that a device is on if participating in flighting (pre-release builds). +- **FlightBuildNumber** If this download was for a flight (pre-release build), this indicates the build number of that flight. +- **FlightId** The specific ID of the flight (pre-release build) the device is getting. +- **FlightRing** The ring (speed of getting builds) that a device is on if participating in flighting (pre-release builds). +- **HandlerType** Indicates what kind of content is being downloaded (app, driver, windows patch, etc.). +- **HardwareId** If this download was for a driver targeted to a particular device model, this ID indicates the model of the device. +- **HomeMobileOperator** The mobile operator that the device was originally intended to work with. +- **HospName** No content is currently available. +- **HostName** The hostname URL the content is downloading from. +- **Hst.Name** No content is currently available. +- **IPVersion** Indicates whether the download took place over IPv4 or IPv6. +- **IsDependentSet** Indicates whether a driver is a part of a larger System Hardware/Firmware Update +- **IsWQfBEnabled** No content is currently available. +- **IsWUfBDualCcanEnabled** No content is currently available. +- **IsWUfBdualScanEnabled** No content is currently available. +- **IsWUfBDualScanEnabled** Indicates if Windows Update for Business dual scan is enabled on the device. +- **IsWUfBEnablad** No content is currently available. +- **IsWUfBEnabled** Indicates if Windows Update for Business is enabled on the device. +- **NetworkCost** A flag indicating the cost of the network (congested, fixed, variable, over data limit, roaming, etc.) used for downloading the update content. +- **NetworkCostBitMask** Indicates what kind of network the device is connected to (roaming, metered, over data cap, etc.) +- **NetworkCst.** No content is currently available. +- **NetworkRestrictionStatus** More general version of NetworkCostBitMask, specifying whether Windows considered the current network to be "metered." +- **NetworkRestrictiontartus** No content is currently available. +- **oadPriority** No content is currently available. +- **PackageFullName** The package name of the content. +- **PegulationResult** No content is currently available. +- **PhonePreviewEnabled** Indicates whether a phone was opted-in to getting preview builds, prior to flighting (pre-release builds) being introduced. +- **PostDnldDime** No content is currently available. +- **PostDnldTime** Time (in seconds) taken to signal download completion after the last job completed downloading the payload. +- **ProcessName** The process name of the application that initiated API calls, in the event where CallerApplicationName was not provided. +- **Pst.DnldTime** No content is currently available. +- **PvocessName** No content is currently available. +- **QpdateId** No content is currently available. +- **QualityreUpdaPause** No content is currently available. +- **QualityUpdatePa}se** No content is currently available. +- **QualityUpdatePaser** No content is currently available. +- **QualityUpdatePatse** No content is currently available. +- **QualityUpdatePausa** No content is currently available. +- **QualityUpdatePause** Indicates whether quality OS updates are paused on the device. +- **RdvisionNumber** No content is currently available. +- **Reason** A 32-bit integer representing the reason the update is blocked from being downloaded in the background. +- **ReguiationResult** No content is currently available. +- **RegulationReason** The reason that the update is regulated +- **regulationResult** No content is currently available. +- **RegulationResult** The result code (HResult) of the last attempt to contact the regulation web service for download regulation of update content. +- **RegulatIonResult** No content is currently available. +- **ReiatedCV** No content is currently available. +- **RelatedCS** No content is currently available. +- **RelatedCV** The Correlation Vector that was used before the most recent change to a new Correlation Vector. +- **RelntedCV** No content is currently available. +- **RepeatFailCoun.** No content is currently available. +- **RepeatFailCount** Indicates whether this specific content has previously failed. +- **RepeatFailFlag** Indicates whether this specific content previously failed to download. +- **RevisionNumber** The revision number of the specified piece of content. +- **SericeCGuid** No content is currently available. +- **ServiceGuid** A unique identifier for the service that the software distribution client is installing content for (Windows Update, Windows Store, etc.). +- **Setup360Phase** Identifies the active phase of the upgrade download if the current download is for an Operating System upgrade. +- **ShippingMobileOperator** The mobile operator linked to the device when the device shipped. +- **SizeCalcTime** Time (in seconds) taken to calculate the total download size of the payload. +- **StatusCode** Indicates the result of a Download event (success, cancellation, failure code HResult). +- **SystemBIOSMajorRelease** Major version of the BIOS. +- **SystemBIOSMinorRelease** Minor version of the BIOS. +- **TargetGroupId** For drivers targeted to a specific device model, this ID indicates the distribution group of devices receiving that driver. +- **TargetingVersion** For drivers targeted to a specific device model, this is the version number of the drivers being distributed to the device. +- **TargetMetadataVersion** The version of the currently downloading (or most recently downloaded) package. +- **tartusCdel** No content is currently available. +- **ThrottlingServiceHResult** Result code (success/failure) while contacting a web service to determine whether this device should download content yet. +- **TimeToEstablishConnection** Time (in milliseconds) it took to establish the connection prior to beginning downloaded. +- **tizeCalcTime** No content is currently available. +- **TotalExpectedBytes** The total size (in Bytes) expected to be downloaded. +- **Upda|eImportance** No content is currently available. +- **UpdateId** An identifier associated with the specific piece of content. +- **UpdateID** An identifier associated with the specific piece of content. +- **UpdateImporEvent** No content is currently available. +- **UpdateImpornstan** No content is currently available. +- **UpdateImport.9ce** No content is currently available. +- **UpdateImportance** Indicates whether the content was marked as Important, Recommended, or Optional. +- **Use** No content is currently available. +- **UsedDO** Indicates whether the download used the Delivery Optimization (DO) service. +- **UsedSystemVolume** Indicates whether the content was downloaded to the device's main system storage drive, or an alternate storage drive. +- **WUDericeID** No content is currently available. +- **WUDeviceId** No content is currently available. +- **WUDeviceID** The unique identifier of a specific device, used to identify how many devices are encountering success or a particular issue. +- **WUDviceCID** No content is currently available. + + +### SoftwareUpdateClientTelemetry.DownloadCheckpoint + +This event provides a checkpoint between each of the Windows Update download phases for UUP content + +The following fields are available: + +- **CallerApplicationName** The name provided by the caller who initiated API calls into the software distribution client +- **ClientVersion** The version number of the software distribution client +- **EventScenario** Indicates the purpose of sending this event - whether because the software distribution just started checking for content, or whether it was cancelled, succeeded, or failed +- **EventType** Possible values are "Child", "Bundle", "Relase" or "Driver" +- **ExtendedStatusCode** Secondary error code for certain scenarios where StatusCode wasn't specific enough +- **FileId** A hash that uniquely identifies a file +- **FileName** Name of the downloaded file +- **FlightId** The unique identifier for each flight +- **RelatedCV** The previous Correlation Vector that was used before swapping with a new one +- **RevisionNumber** Unique revision number of Update +- **ServiceGuid** An ID which represents which service the software distribution client is checking for content (Windows Update, Microsoft Store, etc.) +- **StatusCode** Indicates the result of a CheckForUpdates event (success, cancellation, failure code HResult) +- **UpdateId** Unique Update ID +- **WUDeviceID** The unique identifier of a specific device, used to identify how many devices are encountering success or a particular issue + + +### SoftwareUpdateClientTelemetry.DownloadHeartbeat + +This event allows tracking of ongoing downloads and contains data to explain the current state of the download + +The following fields are available: + +- **BytesTotal** Total bytes to transfer for this content +- **BytesTransferred** Total bytes transferred for this content at the time of heartbeat +- **CallerApplicationName** Name provided by the caller who initiated API calls into the software distribution client +- **ClientVersion** The version number of the software distribution client +- **ConnectionStatus** Indicates the connectivity state of the device at the time of heartbeat +- **CurrentError** Last (transient) error encountered by the active download +- **DownloadFlags** Flags indicating if power state is ignored +- **DownloadState** Current state of the active download for this content (queued, suspended, or progressing) +- **EventType** Possible values are "Child", "Bundle", or "Driver" +- **FlightId** The unique identifier for each flight +- **IsNetworkMetered** Indicates whether Windows considered the current network to be ?metered" +- **MOAppDownloadLimit** Mobile operator cap on size of application downloads, if any +- **MOUpdateDownloadLimit** Mobile operator cap on size of operating system update downloads, if any +- **PowerState** Indicates the power state of the device at the time of heartbeart (DC, AC, Battery Saver, or Connected Standby) +- **RelatedCV** The previous correlation vector that was used by the client, before swapping with a new one +- **ResumeCount** Number of times this active download has resumed from a suspended state +- **RevisionNumber** Identifies the revision number of this specific piece of content +- **ServiceGuid** Identifier for the service to which the software distribution client is connecting (Windows Update, Microsoft Store, etc) +- **SuspendCount** Number of times this active download has entered a suspended state +- **SuspendReason** Last reason for why this active download entered a suspended state +- **UpdateId** Identifier associated with the specific piece of content +- **WUDeviceID** Unique device id controlled by the software distribution client + + +### SoftwareUpdateClientTelemetry.Install + +This event sends tracking data about the software distribution client installation of the content for that update, to help keep Windows up to date. + +The following fields are available: + +- **BiosFamily** The family of the BIOS (Basic Input Output System). +- **BiosName** The name of the device BIOS. +- **BiosReleaseDate** The release date of the device BIOS. +- **BiosSKUNumber** The sku number of the device BIOS. +- **BIOSVendor** The vendor of the BIOS. +- **BiosVersion** The version of the BIOS. +- **BundleId** Identifier associated with the specific content bundle; should not be all zeros if the bundleID was found. +- **BundleRepeatFailCoun.** No content is currently available. +- **BundleRepeatFailCount** Indicates whether this particular update bundle has previously failed. +- **BundleRepeatFailFlag** Indicates whether this particular update bundle previously failed to install. +- **BundleRevisionNumber** Identifies the revision number of the content bundle. +- **CachedEngineVersion** For self-initiated healing, the version of the SIH engine that is cached on the device. If the SIH engine does not exist, the value is null. +- **CallerApplicationName** The name provided by the caller who initiated API calls into the software distribution client. +- **CallerApplictionaName** No content is currently available. +- **ClientVersion** The version number of the software distribution client. +- **CommonProps** A bitmask for future flags associated with the Windows Update client behavior. No value is currently reported in this field. Expected value for this field is 0. +- **CSIErrorType** The stage of CBS installation where it failed. +- **CSIErrorTypr** No content is currently available. +- **CurrentMobileOperator** The mobile operator to which the device is currently connected. +- **DeploymentProviderMode** The mode of operation of the update deployment provider. +- **DeviceModel** The device model. +- **DriverPingBack** Contains information about the previous driver and system state. +- **DriverRecoverqIds** No content is currently available. +- **DriverRecoveryIds** The list of identifiers that could be used for uninstalling the drivers if a recovery is required. +- **DriverRecoverySds** No content is currently available. +- **DriverRecownloIds** No content is currently available. +- **EvåntInstanceID** No content is currently available. +- **Even|InstanceID** No content is currently available. +- **EventInstanceID** A globally unique identifier for event instance. +- **EventInstapceID** No content is currently available. +- **EventScenario** Indicates the purpose of sending this event - whether because the software distribution just started installing content, or whether it was cancelled, succeeded, or failed. +- **EventType** Possible values are Child, Bundle, or Driver. +- **EventTypr** No content is currently available. +- **ExtendedErrorCdel** No content is currently available. +- **ExtendedErrorCode** The extended error code. +- **ExtendedStatusCode** Secondary error code for certain scenarios where StatusCode is not specific enough. +- **ExtendedtartusCdel** No content is currently available. +- **ExtendefStatusCode** No content is currently available. +- **FeatureUpdatePaser** No content is currently available. +- **FeatureUpdatePause** Indicates whether feature OS updates are paused on the device. +- **FeatureUpdateUause** No content is currently available. +- **FlightBranch** The branch that a device is on if participating in the Windows Insider Program. +- **FlightBuildNumber** If this installation was for a Windows Insider build, this is the build number of that build. +- **FlightId** The specific ID of the Windows Insider build the device is getting. +- **FlightRing** The ring that a device is on if participating in the Windows Insider Program. +- **HandlerType** Indicates what kind of content is being installed (for example, app, driver, Windows update). +- **HandlerTypr** No content is currently available. +- **HardwareId** If this install was for a driver targeted to a particular device model, this ID indicates the model of the device. +- **HomeMobileOperator** The mobile operator that the device was originally intended to work with. +- **InstallProps** A bitmask for future flags associated with the install operation. No value is currently reported in this field. Expected value for this field is 0. +- **IntentPFNs** Intended application-set metadata for atomic update scenarios. +- **IsDependentSet** Indicates whether the driver is part of a larger System Hardware/Firmware update. +- **IsFinalOutcomeEvent** Indicates whether this event signals the end of the update/upgrade process. +- **IsFirmware** Indicates whether this update is a firmware update. +- **IsKcfBDualScanEnabled** No content is currently available. +- **IsKcfBEnabled** No content is currently available. +- **IsSuccessFailurePostReboot** Indicates whether the update succeeded and then failed after a restart. +- **IsSuccessFailurePostReotId** No content is currently available. +- **IsSuccessFailurePst.Reboot** No content is currently available. +- **IsWUfBDualScanEnabled** Indicates whether Windows Update for Business dual scan is enabled on the device. +- **IsWufBEnabled** No content is currently available. +- **IsWUfBEnabled** Indicates whether Windows Update for Business is enabled on the device. +- **IsWVfBDualScanEnabled** No content is currently available. +- **IsWVfBEnabled** No content is currently available. +- **lundleId** No content is currently available. +- **lundleRepeatFailCount** No content is currently available. +- **lundleRevisionNumber** No content is currently available. +- **MergedUpdate** Indicates whether the OS update and a BSP update merged for installation. +- **MsiAction** The stage of MSI installation where it failed. +- **MsiProductCdel** No content is currently available. +- **MsiProductCode** The unique identifier of the MSI installer. +- **PackageBullName** No content is currently available. +- **PackageFullName** The package name of the content being installed. +- **PhonePreviewEnabled** Indicates whether a phone was getting preview build, prior to flighting being introduced. +- **ProcessName** The process name of the caller who initiated API calls, in the event that CallerApplicationName was not provided. +- **QualityUpdatePaser** No content is currently available. +- **QualityUpdatePause** Indicates whether quality OS updates are paused on the device. +- **QualityUpdateUause** No content is currently available. +- **RelatedCV** The previous Correlation Vector that was used before swapping with a new one +- **RepeatFailCoun.** No content is currently available. +- **RepeatFailCount** Indicates whether this specific piece of content has previously failed. +- **RepeatFailFlag** Indicates whether this specific piece of content previously failed to install. +- **RevisionNumber** The revision number of this specific piece of content. +- **SericeCGuid** No content is currently available. +- **ServiceGuid** An ID which represents which service the software distribution client is installing content for (Windows Update, Microsoft Store, etc.). +- **Setup360Phase** If the install is for an operating system upgrade, indicates which phase of the upgrade is underway. +- **ShippingMobileOperator** The mobile operator that a device shipped on. +- **StatusCode** Indicates the result of an installation event (success, cancellation, failure code HResult). +- **SystemBIOSMajorRelease** Major version of the BIOS. +- **SystemBIOSMinorRelease** Minor version of the BIOS. +- **TargetGroupId** For drivers targeted to a specific device model, this ID indicates the distribution group of devices receiving that driver. +- **TargetingVersaon** No content is currently available. +- **TargetingVersion** For drivers targeted to a specific device model, this is the version number of the drivers being distributed to the device. +- **TargetingVession** No content is currently available. +- **tartusCdel** No content is currently available. +- **TransactionCdel** No content is currently available. +- **TransactionCode** The ID that represents a given MSI installation. +- **UpdateId** Unique update ID. +- **UpdateID** An identifier associated with the specific piece of content. +- **UpdateImportance** Indicates whether a piece of content was marked as Important, Recommended, or Optional. +- **UpdateImportapce** No content is currently available. +- **UsedSystemVolume** Indicates whether the content was downloaded and then installed from the device's main system storage drive, or an alternate storage drive. +- **WUDdviceID** No content is currently available. +- **WUDeviceID** The unique identifier of a specific device, used to identify how many devices are encountering success or a particular issue. +- **WUDevi'eID** No content is currently available. +- **WUDviceCID** No content is currently available. + + +### SoftwareUpdateClientTelemetry.Revert + +Revert event for target update on Windows Update Client. See EventScenario field for specifics (for example, Started/Failed/Succeeded). + +The following fields are available: + +- **BundleId** Identifier associated with the specific content bundle. Should not be all zeros if the BundleId was found. +- **BundleRepeatFailCount** Indicates whether this particular update bundle has previously failed. +- **BundleRevisionNumber** Identifies the revision number of the content bundle. +- **CallerApplicationName** Name of application making the Windows Update request. Used to identify context of request. +- **ClientVersion** Version number of the software distribution client. +- **CommonProps** A bitmask for future flags associated with the Windows Update client behavior. There is no value being reported in this field right now. Expected value for this field is 0. +- **CSIErrorType** Stage of CBS installation that failed. +- **DriverPingBack** Contains information about the previous driver and system state. +- **DriverRecoveryIds** The list of identifiers that could be used for uninstalling the drivers if a recovery is required. +- **EventInstanceID** A globally unique identifier for event instance. +- **EventScenario** Indicates the purpose of the event (scan started, succeeded, failed, etc.). +- **EventType** Event type (Child, Bundle, Release, or Driver). +- **ExtendedStatusCode** Secondary status code for certain scenarios where StatusCode is not specific enough. +- **FeatureUpdatePause** Indicates whether feature OS updates are paused on the device. +- **FlightBuildNumber** Indicates the build number of the flight. +- **FlightId** The specific ID of the flight the device is getting. +- **HandlerType** Indicates the kind of content (app, driver, windows patch, etc.). +- **HardwareId** If this download was for a driver targeted to a particular device model, this ID indicates the model of the device. +- **IsFinalOutcomeEvent** Indicates whether this event signals the end of the update/upgrade process. +- **IsFirmware** Indicates whether an update was a firmware update. +- **IsSuccessFailurePostReboot** Indicates whether an initial success was a failure after a reboot. +- **IsWUfBDualScanEnabled** Flag indicating whether WU-for-Business dual scan is enabled on the device. +- **IsWUfBEnabled** Flag indicating whether WU-for-Business is enabled on the device. +- **MergedUpdate** Indicates whether an OS update and a BSP update were merged for install. +- **ProcessName** Process name of the caller who initiated API calls into the software distribution client. +- **QualityUpdatePause** Indicates whether quality OS updates are paused on the device. +- **RelatedCV** The previous correlation vector that was used by the client before swapping with a new one. +- **RepeatFailCount** Indicates whether this specific piece of content has previously failed. +- **RevisionNumber** Identifies the revision number of this specific piece of content. +- **ServiceGuid** Identifier for the service to which the software distribution client is connecting (Windows Update, Windows Store, etc.). +- **StatusCode** Result code of the event (success, cancellation, failure code HResult). +- **TargetGroupId** For drivers targeted to a specific device model, this ID indicates the distribution group of devices receiving that driver. +- **TargetingVersion** For drivers targeted to a specific device model, this is the version number of the drivers being distributed to the device. +- **UpdateId** The identifier associated with the specific piece of content. +- **UpdateImportance** Indicates the importance of a driver, and why it received that importance level (0-Unknown, 1-Optional, 2-Important-DNF, 3-Important-Generic, 4-Important-Other, 5-Recommended). +- **UsedSystemVolume** Indicates whether the device's main system storage drive or an alternate storage drive was used. +- **WUDeviceID** Unique device ID controlled by the software distribution client. + + +### SoftwareUpdateClientTelemetry.TaskRun + +Start event for Server Initiated Healing client. See EventScenario field for specifics (for example, started/completed). + +The following fields are available: + +- **CallerApplicationName** Name of application making the Windows Update request. Used to identify context of request. +- **ClientVersion** Version number of the software distribution client. +- **CmdLineArgs** Command line arguments passed in by the caller. +- **EventInstanceID** A globally unique identifier for the event instance. +- **EventScenario** Indicates the purpose of the event (scan started, succeeded, failed, etc.). +- **ServiceGuid** Identifier for the service to which the software distribution client is connecting (Windows Update, Microsoft Store, etc.). +- **StatusCode** Result code of the event (success, cancellation, failure code HResult). +- **WUDeviceID** Unique device ID controlled by the software distribution client. + + +### SoftwareUpdateClientTelemetry.Uninstall + +Uninstall event for target update on Windows Update Client. See EventScenario field for specifics (for example, Started/Failed/Succeeded). + +The following fields are available: + +- **BundleId** The identifier associated with the specific content bundle. This should not be all zeros if the bundleID was found. +- **BundleRepeatFailCount** Indicates whether this particular update bundle previously failed. +- **BundleRevisionNumber** Identifies the revision number of the content bundle. +- **CallerApplicationName** Name of the application making the Windows Update request. Used to identify context of request. +- **ClientVersion** Version number of the software distribution client. +- **CommonProps** A bitmask for future flags associated with the Windows Update client behavior. There is no value being reported in this field right now. Expected value for this field is 0. +- **DriverPingBack** Contains information about the previous driver and system state. +- **DriverRecoveryIds** The list of identifiers that could be used for uninstalling the drivers when a recovery is required. +- **EventInstanceID** A globally unique identifier for event instance. +- **EventScenario** Indicates the purpose of the event (a scan started, succeded, failed, etc.). +- **EventType** Indicates the event type. Possible values are "Child", "Bundle", "Release" or "Driver". +- **ExtendedStatusCode** Secondary status code for certain scenarios where StatusCode is not specific enough. +- **FeatureUpdatePause** Indicates whether feature OS updates are paused on the device. +- **FlightBuildNumber** Indicates the build number of the flight. +- **FlightId** The specific ID of the flight the device is getting. +- **HandlerType** Indicates the kind of content (app, driver, windows patch, etc.). +- **HardwareId** If the download was for a driver targeted to a particular device model, this ID indicates the model of the device. +- **IsFinalOutcomeEvent** Indicates whether this event signals the end of the update/upgrade process. +- **IsFirmware** Indicates whether an update was a firmware update. +- **IsSuccessFailurePostReboot** Indicates whether an initial success was then a failure after a reboot. +- **IsWUfBDualScanEnabled** Flag indicating whether WU-for-Business dual scan is enabled on the device. +- **IsWUfBEnabled** Flag indicating whether WU-for-Business is enabled on the device. +- **MergedUpdate** Indicates whether an OS update and a BSP update were merged for install. +- **ProcessName** Process name of the caller who initiated API calls into the software distribution client. +- **QualityUpdatePause** Indicates whether quality OS updates are paused on the device. +- **RelatedCV** The previous correlation vector that was used by the client before swapping with a new one. +- **RepeatFailCount** Indicates whether this specific piece of content previously failed. +- **RevisionNumber** Identifies the revision number of this specific piece of content. +- **ServiceGuid** Identifier for the service to which the software distribution client is connecting (Windows Update, Windows Store, etc.). +- **StatusCode** Result code of the event (success, cancellation, failure code HResult). +- **TargetGroupId** For drivers targeted to a specific device model, this ID indicates the distribution group of devices receiving that driver. +- **TargetingVersion** For drivers targeted to a specific device model, this is the version number of the drivers being distributed to the device. +- **UpdateId** Identifier associated with the specific piece of content. +- **UpdateImportance** Indicates the importance of a driver and why it received that importance level (0-Unknown, 1-Optional, 2-Important-DNF, 3-Important-Generic, 4-Important-Other, 5-Recommended). +- **UsedSystemVolume** Indicates whether the device’s main system storage drive or an alternate storage drive was used. +- **WUDeviceID** Unique device ID controlled by the software distribution client. + + +### SoftwareUpdateClientTelemetry.UpdateDetected + +This event sends data about an AppX app that has been updated from the Microsoft Store, including what app needs an update and what version/architecture is required, in order to understand and address problems with apps getting required updates. + +The following fields are available: + +- **ApplicableUpdateInfo** Metadata for the updates which were detected as applicable. +- **CallerApplicationName** The name provided by the caller who initiated API calls into the software distribution client. +- **IntentPFNs** Intended application-set metadata for atomic update scenarios. +- **NumberOfApplicableUpdates** The number of updates ultimately deemed applicable to the system after the detection process is complete. +- **RelatedCV** The previous Correlation Vector that was used before swapping with a new one. +- **RelntedCV** No content is currently available. +- **ServiceGuid** An ID that represents which service the software distribution client is connecting to (Windows Update, Microsoft Store, etc.). +- **umberOfApplicableUpdates** No content is currently available. +- **WUDeviceID** The unique device ID controlled by the software distribution client. +- **xHDeviceID** No content is currently available. + + +### SoftwareUpdateClientTelemetry.UpdateMetadataIntegrity + +Ensures Windows Updates are secure and complete. Event helps to identify whether update content has been tampered with and protects against man-in-the-middle attack. + +The following fields are available: + +- **CallerApplicationName** Name of application making the Windows Update request. Used to identify context of request. +- **CallerLoglicationName** No content is currently available. +- **EndpointUrl** URL of the endpoint where client obtains update metadata. Used to identify test vs staging vs production environments. +- **EventScenario** The purpose of this event, such as scan started, scan succeeded, or scan failed. +- **ExtendedStatusCode** The secondary status code of the event. +- **ExtendefStatusCode** No content is currently available. +- **LeafCertId** The integral ID from the FragmentSigning data for the certificate that failed. +- **ListOfSHA256OfIntermediateCerData** A semicolon delimited list of base64 encoding of hashes for the Base64CerData in the FragmentSigning data of an intermediate certificate. +- **MetadataIntegrityMode** The mode of the transport metadata integrity check. 0 = unknown; 1 = ignore; 2 = audit; 3 = enforce +- **MetadataSignature** A base64-encoded string of the signature associated with the update metadata (specified by revision ID). +- **RawMode** The raw unparsed mode string from the SLS response. This field is null if not applicable. +- **RawValidityWindowInDays** The raw unparsed validity window string in days of the timestamp token. This field is null if not applicable. +- **RcwMode** No content is currently available. +- **RevisionId** The revision ID for a specific piece of content. +- **RevisionNumber** The revision number for a specific piece of content. +- **SedviceGuid** No content is currently available. +- **ServiceGuid** Identifies the service to which the software distribution client is connected, Example: Windows Update or Microsoft Store +- **ServiceGuidEndpointUrl** No content is currently available. +- **SHA256OfLeafCerData** A base64 encoding of the hash for the Base64CerData in the FragmentSigning data of the leaf certificate. +- **SHA256OfLeafCertPublicKey** A base64 encoding of the hash of the Base64CertData in the FragmentSigning data of the leaf certificate. +- **SHA256OfTimestampToken** An encoded string of the timestamp token. +- **SignatureAlgorithm** The hash algorithm for the metadata signature. +- **SLSPrograms** A test program to which a device may have opted in. Example: Insider Fast +- **StatusCode** The status code of the event. +- **TimestampTokenCertThumbprint** The thumbprint of the encoded timestamp token. +- **TimestampTokenId** The time this was created. It is encoded in a timestamp blob and will be zero if the token is malformed. +- **UpdateId** The update ID for a specific piece of content. +- **ValidityWindowInDays** The validity window that's in effect when verifying the timestamp. + + +## System Resource Usage Monitor events + +### Microsoft.Windows.Srum.Sdp.CpuUsage + +This event provides information on CPU usage. + +The following fields are available: + +- **UsageMax** The maximum of hourly average CPU usage. +- **UsageMean** The mean of hourly average CPU usage. +- **UsageMedian** The median of hourly average CPU usage. +- **UsageTwoHourMaxMean** The mean of the maximum of every two hour of hourly average CPU usage. +- **UsageTwoHourMedianMean** The mean of the median of every two hour of hourly average CPU usage. + + +### Microsoft.Windows.Srum.Sdp.NetworkUsage + +This event provides information on network usage. + +The following fields are available: + +- **AdapterGuid** The unique ID of the adapter. +- **BytesTotalMax** The maximum of the hourly average bytes total. +- **BytesTotalMean** The mean of the hourly average bytes total. +- **BytesTotalMedian** The median of the hourly average bytes total. +- **BytesTotalTwoHourMaxMean** The mean of the maximum of every two hours of hourly average bytes total. +- **BytesTotalTwoHourMedianMean** The mean of the median of every two hour of hourly average bytes total. +- **LinkSpeed** The adapter link speed. + + +## Update events + +### Update360Telemetry.Revert + +This event sends data relating to the Revert phase of updating Windows. + +The following fields are available: + +- **ErrorCode** The error code returned for the Revert phase. +- **FlightId** Unique ID for the flight (test instance version). +- **ObjectId** The unique value for each Update Agent mode. +- **RebootRequired** Indicates reboot is required. +- **RelatedCV** The correlation vector value generated from the latest USO (Update Service Orchestrator) scan. +- **Result** The HResult of the event. +- **RevertResult** The result code returned for the Revert operation. +- **ScenarioId** The ID of the update scenario. +- **SessionId** The ID of the update attempt. +- **UpdateId** The ID of the update. + + +### Update360Telemetry.UpdateAgentCommit + +This event collects information regarding the commit phase of the new Unified Update Platform (UUP) update scenario, which is leveraged by both Mobile and Desktop. + +The following fields are available: + +- **ErrorCode** The error code returned for the current install phase. +- **FlightId** Unique ID for each flight. +- **ObjectId** Unique value for each Update Agent mode. +- **RelatedCV** Correlation vector value generated from the latest USO scan. +- **Result** Outcome of the install phase of the update. +- **ScenarioId** Indicates the update scenario. +- **SessionId** Unique value for each update attempt. +- **UpdateId** Unique ID for each update. + + +### Update360Telemetry.UpdateAgentDownloadRequest + +This event sends data for the download request phase of updating Windows via the new Unified Update Platform (UUP) scenario. Applicable to PC and Mobile. + +The following fields are available: + +- **DeletedCorruptFiles** Boolean indicating whether corrupt payload was deleted. +- **DownloadRequests** Number of times a download was retried. +- **ErrorCode** The error code returned for the current download request phase. +- **ExtensionName** Indicates whether the payload is related to Operating System content or a plugin. +- **FlightId** Unique ID for each flight. +- **InternalFailureResult** Indicates a non-fatal error from a plugin. +- **ObjectId** Unique value for each Update Agent mode (same concept as InstanceId for Setup360). +- **PackageCategoriesSkipped** Indicates package categories that were skipped, if applicable. +- **PackageCountOptional** Number of optional packages requested. +- **PackageCountRequired** Number of required packages requested. +- **PackageCountTotal** Total number of packages needed. +- **PackageCountTotalCanonical** Total number of canonical packages. +- **PackageCountTotalDiff** Total number of diff packages. +- **PackageCountTotalExpress** Total number of express packages. +- **PackageCountTotalPSFX** The total number of PSFX packages. +- **PackageExpressType** Type of express package. +- **PackageSizeCanonical** Size of canonical packages in bytes. +- **PackageSizeDiff** Size of diff packages in bytes. +- **PackageSizeExpress** Size of express packages in bytes. +- **PackageSizePSFX** The size of PSFX packages, in bytes. +- **RangeRequestState** Indicates the range request type used. +- **RelatedCV** Correlation vector value generated from the latest USO scan. +- **Result** Outcome of the download request phase of update. +- **SandboxTaggedForReserves** The sandbox for reserves. +- **ScenarioId** Indicates the update scenario. +- **SessionId** Unique value for each attempt (same value for initialize, download, install commit phases). +- **UpdateId** Unique ID for each update. + + +### Update360Telemetry.UpdateAgentExpand + +This event collects information regarding the expansion phase of the new Unified Update Platform (UUP) update scenario, which is leveraged by both Mobile and Desktop. + +The following fields are available: + +- **ElapsedTickCount** Time taken for expand phase. +- **EndFreeSpace** Free space after expand phase. +- **EndSandboxSize** Sandbox size after expand phase. +- **ErrorCode** The error code returned for the current install phase. +- **FlightId** Unique ID for each flight. +- **ObjectId** Unique value for each Update Agent mode. +- **RelatedCV** Correlation vector value generated from the latest USO scan. +- **ScenarioId** Indicates the update scenario. +- **SessionId** Unique value for each update attempt. +- **StartFreeSpace** Free space before expand phase. +- **StartSandboxSize** Sandbox size after expand phase. +- **UpdateId** Unique ID for each update. + + +### Update360Telemetry.UpdateAgentFellBackToCanonical + +This event collects information when express could not be used and we fall back to canonical during the new Unified Update Platform (UUP) update scenario, which is leveraged by both Mobile and Desktop. + +The following fields are available: + +- **FlightId** Unique ID for each flight. +- **ObjectId** Unique value for each Update Agent mode. +- **PackageCount** Number of packages that feel back to canonical. +- **PackageList** PackageIds which fell back to canonical. +- **RelatedCV** Correlation vector value generated from the latest USO scan. +- **ScenarioId** Indicates the update scenario. +- **SessionId** Unique value for each update attempt. +- **UpdateId** Unique ID for each update. + + +### Update360Telemetry.UpdateAgentInitialize + +This event sends data for the initialize phase of updating Windows via the new Unified Update Platform (UUP) scenario, which is applicable to both PCs and Mobile. + +The following fields are available: + +- **ErrorCode** The error code returned for the current install phase. +- **essionData** No content is currently available. +- **FlightId** Unique ID for each flight. +- **FlightMetadata** Contains the FlightId and the build being flighted. +- **ObjectId** Unique value for each Update Agent mode. +- **RelatedCV** Correlation vector value generated from the latest USO scan. +- **Result** Outcome of the install phase of the update. +- **ScenarioId** Indicates the update scenario. +- **SessionData** String containing instructions to update agent for processing FODs and DUICs (Null for other scenarios). +- **SessionId** Unique value for each update attempt. +- **UpdateId** Unique ID for each update. + + +### Update360Telemetry.UpdateAgentInstall + +This event sends data for the install phase of updating Windows. + +The following fields are available: + +- **ErrorCode** The error code returned for the current install phase. +- **ExtensionName** Indicates whether the payload is related to Operating System content or a plugin. +- **FlightId** Unique value for each Update Agent mode (same concept as InstanceId for Setup360). +- **InternalFailureResult** Indicates a non-fatal error from a plugin. +- **ObjectId** Correlation vector value generated from the latest USO scan. +- **RelatedCV** Correlation vector value generated from the latest USO scan. +- **Result** The result for the current install phase. +- **ScenarioId** Indicates the update scenario. +- **SessionId** Unique value for each update attempt. +- **UpdateId** Unique ID for each update. + + +### Update360Telemetry.UpdateAgentMerge + +The UpdateAgentMerge event sends data on the merge phase when updating Windows. + +The following fields are available: + +- **ErrorCode** The error code returned for the current merge phase. +- **FlightId** Unique ID for each flight. +- **MergeId** The unique ID to join two update sessions being merged. +- **ObjectId** Unique value for each Update Agent mode. +- **RelatedCV** Related correlation vector value. +- **Result** Outcome of the merge phase of the update. +- **ScenarioId** Indicates the update scenario. +- **SessionId** Unique value for each attempt. +- **UpdateId** Unique ID for each update. + + +### Update360Telemetry.UpdateAgentMitigationResult + +This event sends data indicating the result of each update agent mitigation. + +The following fields are available: + +- **Applicable** Indicates whether the mitigation is applicable for the current update. +- **CommandCount** The number of command operations in the mitigation entry. +- **CustomCount** The number of custom operations in the mitigation entry. +- **FileCount** The number of file operations in the mitigation entry. +- **FlightId** Unique identifier for each flight. +- **Index** The mitigation index of this particular mitigation. +- **MitigationScenario** The update scenario in which the mitigation was executed. +- **Name** The friendly name of the mitigation. +- **ObjectId** Unique value for each Update Agent mode. +- **OperationIndex** The mitigation operation index (in the event of a failure). +- **OperationName** The friendly name of the mitigation operation (in the event of failure). +- **RegistryCount** The number of registry operations in the mitigation entry. +- **RelatedCV** The correlation vector value generated from the latest USO scan. +- **Result** The HResult of this operation. +- **ScenarioId** The update agent scenario ID. +- **SessionId** Unique value for each update attempt. +- **TimeDiff** The amount of time spent performing the mitigation (in 100-nanosecond increments). +- **UpdateId** Unique ID for each Update. + + +### Update360Telemetry.UpdateAgentMitigationSummary + +This event sends a summary of all the update agent mitigations available for an this update. + +The following fields are available: + +- **Applicable** The count of mitigations that were applicable to the system and scenario. +- **Failed** The count of mitigations that failed. +- **FlightId** Unique identifier for each flight. +- **Friled** No content is currently available. +- **MitigationScenario** The update scenario in which the mitigations were attempted. +- **ObjectId** The unique value for each Update Agent mode. +- **RelatedCV** The correlation vector value generated from the latest USO scan. +- **Result** The HResult of this operation. +- **ScenarioId** The update agent scenario ID. +- **SessionId** Unique value for each update attempt. +- **TimeDiff** The amount of time spent performing all mitigations (in 100-nanosecond increments). +- **Total** Total number of mitigations that were available. +- **UpdateId** Unique ID for each update. + + +### Update360Telemetry.UpdateAgentModeStart + +This event sends data for the start of each mode during the process of updating Windows via the new Unified Update Platform (UUP) scenario. Applicable to both PCs and Mobile. + +The following fields are available: + +- **FlightId** Unique ID for each flight. +- **Mode** Indicates the mode that has started. +- **ObjectId** Unique value for each Update Agent mode. +- **RelatedCV** Correlation vector value generated from the latest USO scan. +- **ScenarioId** Indicates the update scenario. +- **SessionId** Unique value for each update attempt. +- **UpdateId** Unique ID for each update. +- **Version** Version of update + + +### Update360Telemetry.UpdateAgentOneSettings + +This event collects information regarding the post reboot phase of the new UUP (Unified Update Platform) update scenario; which is leveraged by both Mobile and Desktop. + +The following fields are available: + +- **Count** The count of applicable OneSettings for the device. +- **FlightId** Unique ID for the flight (test instance version). +- **ObjectId** The unique value for each Update Agent mode. +- **Parameters** The set of name value pair parameters sent to OneSettings to determine if there are any applicable OneSettings. +- **RelatedCV** The correlation vector value generated from the latest USO (Update Service Orchestrator) scan. +- **Result** The HResult of the event. +- **ScenarioId** The ID of the update scenario. +- **SessionId** The ID of the update attempt. +- **UpdateId** The ID of the update. +- **Values** The values sent back to the device, if applicable. + + +### Update360Telemetry.UpdateAgentPostRebootResult + +This event collects information for both Mobile and Desktop regarding the post reboot phase of the new Unified Update Platform (UUP) update scenario. + +The following fields are available: + +- **ErrorCode** The error code returned for the current post reboot phase. +- **FlightId** The specific ID of the Windows Insider build the device is getting. +- **ObjectId** Unique value for each Update Agent mode. +- **PostRebootResult** Indicates the Hresult. +- **RelatedCV** Correlation vector value generated from the latest USO scan. +- **ScenarioId** The scenario ID. Example: MobileUpdate, DesktopLanguagePack, DesktopFeatureOnDemand, or DesktopDriverUpdate. +- **SessionId** Unique value for each update attempt. +- **UpdateId** Unique ID for each update. + + +### Update360Telemetry.UpdateAgentReboot + +This event sends information indicating that a request has been sent to suspend an update. + +The following fields are available: + +- **ErrorCode** The error code returned for the current reboot. +- **FlightId** Unique ID for the flight (test instance version). +- **ObjectId** The unique value for each Update Agent mode. +- **RelatedCV** The correlation vector value generated from the latest USO (Update Service Orchestrator) scan. +- **Result** The HResult of the event. +- **ScenarioId** The ID of the update scenario. +- **SessionId** The ID of the update attempt. +- **UpdateId** The ID of the update. + + +### Update360Telemetry.UpdateAgentSetupBoxLaunch + +The UpdateAgent_SetupBoxLaunch event sends data for the launching of the setup box when updating Windows via the new Unified Update Platform (UUP) scenario. This event is only applicable to PCs. + +The following fields are available: + +- **ContainsExpressPackage** Indicates whether the download package is express. +- **FlightId** Unique ID for each flight. +- **FreeSpace** Free space on OS partition. +- **InstallCount** Number of install attempts using the same sandbox. +- **ObjectId** Unique value for each Update Agent mode. +- **Quiet** Indicates whether setup is running in quiet mode. +- **RelatedCV** Correlation vector value generated from the latest USO scan. +- **SandboxSize** Size of the sandbox. +- **ScenarioId** Indicates the update scenario. +- **SessionId** Unique value for each update attempt. +- **SetupMode** Mode of setup to be launched. +- **UpdateId** Unique ID for each Update. +- **UserSession** Indicates whether install was invoked by user actions. + + +## Update notification events + +### Microsoft.Windows.UpdateNotificationPipeline.UNPCampaignManagerHeartbeat + +This event is sent at the start of the CampaignManager event and is intended to be used as a heartbeat. + +The following fields are available: + +- **CampaignConfigVersion** Configuration version for the current campaign. +- **CampaignID** Currently campaign that is running on Update Notification Pipeline (UNP). +- **ConfigCatalogVersion** Current catalog version of UNP. +- **ContentVersion** Content version for the current campaign on UNP. +- **CV** Correlation vector. +- **DetectorVersion** Most recently run detector version for the current campaign on UNP. +- **GlobalEventCounter** Client-side counter that indicates the event ordering sent by the user. +- **PackageVersion** Current UNP package version. + + +## Upgrade events + +### FacilitatorTelemetry.DCATDownload + +This event indicates whether devices received additional or critical supplemental content during an OS Upgrade, to help keep Windows up-to-date and secure. + +The following fields are available: + +- **DownloadSize** Download size of payload. +- **ElapsedTime** Time taken to download payload. +- **MediaFallbackUsed** Used to determine if we used Media CompDBs to figure out package requirements for the upgrade. +- **ResultCode** Result returned by the Facilitator DCAT call. +- **Scenario** Dynamic update scenario (Image DU, or Setup DU). +- **Type** Type of package that was downloaded. +- **UpdateId** The ID of the update that was downloaded. + + +### FacilitatorTelemetry.DUDownload + +This event returns data about the download of supplemental packages critical to upgrading a device to the next version of Windows. + +The following fields are available: + +- **DownloadRequestAttributes** The attributes sent for download. +- **PackageCategoriesFailed** Lists the categories of packages that failed to download. +- **PackageCategoriesSkipped** Lists the categories of package downloads that were skipped. +- **ResultCode** The result of the event execution. +- **Scenario** Identifies the active Download scenario. +- **Url** The URL the download request was sent to. +- **Version** Identifies the version of Facilitator used. + + +### FacilitatorTelemetry.InitializeDU + +This event determines whether devices received additional or critical supplemental content during an OS upgrade. + +The following fields are available: + +- **DCATUrl** The Delivery Catalog (DCAT) URL we send the request to. +- **DownloadRequestAttributes** The attributes we send to DCAT. +- **ResultCode** The result returned from the initiation of Facilitator with the URL/attributes. +- **Scenario** Dynamic Update scenario (Image DU, or Setup DU). +- **Url** The Delivery Catalog (DCAT) URL we send the request to. +- **Version** Version of Facilitator. + + +### Setup360Telemetry.Downlevel + +This event sends data indicating that the device has started the downlevel phase of the upgrade, to help keep Windows up-to-date and secure. + +The following fields are available: + +- **ClientId** If using Windows Update, this will be the Windows Update client ID that is passed to Setup. In Media setup, the default value is Media360, but it can be overwritten by the caller to a unique value. +- **FlightData** Unique value that identifies the flight. +- **HostOSBuildNumber** The build number of the downlevel OS. +- **HostOsSkuName** The operating system edition which is running Setup360 instance (downlevel OS). +- **InstanceId** A unique GUID that identifies each instance of setuphost.exe. +- **ReportId** In the Windows Update scenario, this is the updateID that is passed to Setup. In media setup, this is the GUID for the install.wim. +- **Setup360Extended** More detailed information about phase/action when the potential failure occurred. +- **Setup360Mode** The phase of Setup360 (for example, Predownload, Install, Finalize, Rollback). +- **Setup360Result** The result of Setup360 (HRESULT used to diagnose errors). +- **Setup360Scenario** The Setup360 flow type (for example, Boot, Media, Update, MCT). +- **SetupVersionBuildNumber** The build number of Setup360 (build number of the target OS). +- **State** Exit state of given Setup360 run. Example: succeeded, failed, blocked, cancelled. +- **TestId** An ID that uniquely identifies a group of events. +- **WuId** This is the Windows Update Client ID. In the Windows Update scenario, this is the same as the clientId. + + +### Setup360Telemetry.Finalize + +This event sends data indicating that the device has started the phase of finalizing the upgrade, to help keep Windows up-to-date and secure. + +The following fields are available: + +- **ClientId** With Windows Update, this will be the Windows Update client ID that is passed to Setup. In Media setup, default value is Media360, but can be overwritten by the caller to a unique value. +- **FlightData** Unique value that identifies the flight. +- **HostOSBuildNumber** The build number of the previous OS. +- **HostOsSkuName** The OS edition which is running Setup360 instance (previous OS). +- **InstanceId** A unique GUID that identifies each instance of setuphost.exe +- **ReportId** With Windows Update, this is the updateID that is passed to Setup. In media setup, this is the GUID for the install.wim. +- **Setup360Extended** More detailed information about the phase/action when the potential failure occurred. +- **Setup360Mode** The phase of Setup360. Example: Predownload, Install, Finalize, Rollback. +- **Setup360Result** The result of Setup360. This is an HRESULT error code that is used to diagnose errors. +- **Setup360Scenario** The Setup360 flow type. Example: Boot, Media, Update, MCT. +- **SetupVersionBuildNumber** The build number of Setup360 (build number of target OS). +- **State** The exit state of a Setup360 run. Example: succeeded, failed, blocked, cancelled. +- **TestId** ID that uniquely identifies a group of events. +- **WuId** This is the Windows Update Client ID. With Windows Update, this is the same as the clientId. + + +### Setup360Telemetry.OsUninstall + +This event sends data regarding OS updates and upgrades from Windows 7, Windows 8, and Windows 10. Specifically, it indicates the outcome of an OS uninstall. + +The following fields are available: + +- **ClientId** For Windows Update, this will be the Windows Update client ID that is passed to Setup. In Media setup, default value is Media360, but can be overwritten by the caller to a unique value. +- **FlightData** Unique value that identifies the flight. +- **HostOSBuildNumber** The build number of the previous OS. +- **HostOsSkuName** The OS edition which is running the Setup360 instance (previous OS). +- **InstanceId** A unique GUID that identifies each instance of setuphost.exe. +- **ReportId** For Windows Update, this will be the Windows Update client ID that is passed to Setup. In Media setup, this is the GUID for the install.wim. +- **Setup360Extended** Detailed information about the phase or action when the potential failure occurred. +- **Setup360Mode** The phase of Setup360. Example: Predownload, Install, Finalize, Rollback. +- **Setup360Result** The result of Setup360. This is an HRESULT error code that is used to diagnose errors. +- **Setup360Scenario** The Setup360 flow type. Example: Boot, Media, Update, MCT +- **SetupVersionBuildNumber** The build number of Setup360 (build number of target OS). +- **State** Exit state of a Setup360 run. Example: succeeded, failed, blocked, cancelled. +- **TestId** ID that uniquely identifies a group of events. +- **WuId** Windows Update client ID. + + +### Setup360Telemetry.PostRebootInstall + +This event sends data indicating that the device has invoked the post reboot install phase of the upgrade, to help keep Windows up-to-date. + +The following fields are available: + +- **ClientId** With Windows Update, this is the Windows Update client ID that is passed to Setup. In Media setup, the default value is Media360, but can be overwritten by the caller to a unique value. +- **FlightData** Unique value that identifies the flight. +- **HostOSBuildNumber** The build number of the previous OS. +- **HostOsSkuName** The OS edition which is running Setup360 instance (previous OS). +- **InstanceId** A unique GUID that identifies each instance of setuphost.exe. +- **ReportId** With Windows Update, this is the updateID that is passed to Setup. In media setup, this is the GUID for the install.wim. +- **Setup360Extended** Extension of result - more granular information about phase/action when the potential failure happened +- **Setup360Mode** The phase of Setup360. Example: Predownload, Install, Finalize, Rollback +- **Setup360Result** The result of Setup360. This is an HRESULT error code that's used to diagnose errors. +- **Setup360Scenario** The Setup360 flow type. Example: Boot, Media, Update, MCT +- **SetupVersionBuildNumber** The build number of Setup360 (build number of target OS). +- **State** The exit state of a Setup360 run. Example: succeeded, failed, blocked, cancelled +- **TestId** A string to uniquely identify a group of events. +- **WuId** This is the Windows Update Client ID. With Windows Update, this is the same as ClientId. + + +### Setup360Telemetry.PreDownloadQuiet + +This event sends data indicating that the device has invoked the predownload quiet phase of the upgrade, to help keep Windows up to date. + +The following fields are available: + +- **ClientId** Using Windows Update, this will be the Windows Update client ID that is passed to Setup. In Media setup, default value is Media360, but can be overwritten by the caller to a unique value. +- **FlightData** Unique value that identifies the flight. +- **HostOSBuildNumber** The build number of the previous OS. +- **HostOsSkuName** The OS edition which is running Setup360 instance (previous operating system). +- **InstanceId** A unique GUID that identifies each instance of setuphost.exe. +- **ReportId** Using Windows Update, this is the updateID that is passed to Setup. In media setup, this is the GUID for the install.wim. +- **Setup360Extended** Detailed information about the phase/action when the potential failure occurred. +- **Setup360Mode** The phase of Setup360. Example: Predownload, Install, Finalize, Rollback. +- **Setup360Result** The result of Setup360. This is an HRESULT error code that is used to diagnose errors. +- **Setup360Scenario** The Setup360 flow type. Example: Boot, Media, Update, MCT. +- **SetupVersionBuildNumber** The build number of Setup360 (build number of target OS). +- **State** The exit state of a Setup360 run. Example: succeeded, failed, blocked, canceled. +- **TestId** ID that uniquely identifies a group of events. +- **WuId** This is the Windows Update Client ID. Using Windows Update, this is the same as the clientId. + + +### Setup360Telemetry.PreDownloadUX + +This event sends data regarding OS Updates and Upgrades from Windows 7.X, Windows 8.X, Windows 10 and RS, to help keep Windows up-to-date and secure. Specifically, it indicates the outcome of the PredownloadUX portion of the update process. + +The following fields are available: + +- **ClientId** For Windows Update, this will be the Windows Update client ID that is passed to Setup. In Media setup, default value is Media360, but can be overwritten by the caller to a unique value. +- **FlightData** In the WU scenario, this will be the WU client ID that is passed to Setup. In Media setup, default value is Media360, but can be overwritten by the caller to a unique value. +- **HostOSBuildNumber** The build number of the previous operating system. +- **HostOsSkuName** The OS edition which is running the Setup360 instance (previous operating system). +- **InstanceId** Unique GUID that identifies each instance of setuphost.exe. +- **ReportId** For Windows Update, this will be the Windows Update client ID that is passed to Setup. In Media setup, this is the GUID for the install.wim. +- **Setup360Extended** Detailed information about the phase/action when the potential failure occurred. +- **Setup360Mode** The phase of Setup360. Example: Predownload, Install, Finalize, Rollback. +- **Setup360Result** The result of Setup360. This is an HRESULT error code that can be used to diagnose errors. +- **Setup360Scenario** The Setup360 flow type. Example: Boot, Media, Update, MCT. +- **SetupVersionBuildNumber** The build number of Setup360 (build number of the target OS). +- **State** The exit state of the Setup360 run. Example: succeeded, failed, blocked, cancelled. +- **TestId** ID that uniquely identifies a group of events. +- **WuId** Windows Update client ID. + + +### Setup360Telemetry.PreInstallQuiet + +This event sends data indicating that the device has invoked the preinstall quiet phase of the upgrade, to help keep Windows up-to-date. + +The following fields are available: + +- **ClientId** With Windows Update, this will be the Windows Update client ID that is passed to Setup. In Media setup, default value is Media360, but can be overwritten by the caller to a unique value. +- **FlightData** Unique value that identifies the flight. +- **HostOSBuildNumber** The build number of the previous OS. +- **HostOsSkuName** The OS edition which is running Setup360 instance (previous OS). +- **InstanceId** A unique GUID that identifies each instance of setuphost.exe +- **ReportId** With Windows Update, this is the updateID that is passed to Setup. In media setup, this is the GUID for the install.wim. +- **Setup360Extended** Detailed information about the phase/action when the potential failure occurred. +- **Setup360Mode** The phase of Setup360. Example: Predownload, Install, Finalize, Rollback. +- **Setup360Result** The result of Setup360. This is an HRESULT error code that can be used to diagnose errors. +- **Setup360Scenario** Setup360 flow type (Boot, Media, Update, MCT). +- **SetupVersionBuildNumber** The build number of Setup360 (build number of target OS). +- **State** The exit state of a Setup360 run. Example: succeeded, failed, blocked, cancelled. +- **TestId** A string to uniquely identify a group of events. +- **WuId** This is the Windows Update Client ID. With Windows Update, this is the same as the clientId. + + +### Setup360Telemetry.PreInstallUX + +This event sends data regarding OS updates and upgrades from Windows 7, Windows 8, and Windows 10, to help keep Windows up-to-date. Specifically, it indicates the outcome of the PreinstallUX portion of the update process. + +The following fields are available: + +- **ClientId** For Windows Update, this will be the Windows Update client ID that is passed to Setup. In Media setup, default value is Media360, but can be overwritten by the caller to a unique value. +- **FlightData** Unique value that identifies the flight. +- **HostOSBuildNumber** The build number of the previous OS. +- **HostOsSkuName** The OS edition which is running the Setup360 instance (previous OS). +- **InstanceId** A unique GUID that identifies each instance of setuphost.exe. +- **ReportId** For Windows Update, this will be the Windows Update client ID that is passed to Setup. In Media setup, this is the GUID for the install.wim. +- **Setup360Extended** Detailed information about the phase/action when the potential failure occurred. +- **Setup360Mode** The phase of Setup360. Example: Predownload, Install, Finalize, Rollback. +- **Setup360Result** The result of Setup360. This is an HRESULT error code that is used to diagnose errors. +- **Setup360Scenario** The Setup360 flow type, Example: Boot, Media, Update, MCT. +- **SetupVersionBuildNumber** The build number of Setup360 (build number of target OS). +- **State** The exit state of a Setup360 run. Example: succeeded, failed, blocked, cancelled. +- **TestId** A string to uniquely identify a group of events. +- **WuId** Windows Update client ID. + + +### Setup360Telemetry.Setup360 + +This event sends data about OS deployment scenarios, to help keep Windows up-to-date. + +The following fields are available: + +- **ClientId** Retrieves the upgrade ID. In the Windows Update scenario, this will be the Windows Update client ID. In Media setup, default value is Media360, but can be overwritten by the caller to a unique value. +- **FieldName** Retrieves the data point. +- **FlightData** Specifies a unique identifier for each group of Windows Insider builds. +- **InstanãeId** No content is currently available. +- **InstanceId** Retrieves a unique identifier for each instance of a setup session. +- **ReportId** Retrieves the report ID. +- **ScenarioId** Retrieves the deployment scenario. +- **value** No content is currently available. +- **Value** Retrieves the value associated with the corresponding FieldName. + + +### Setup360Telemetry.Setup360DynamicUpdate + +This event helps determine whether the device received supplemental content during an operating system upgrade, to help keep Windows up-to-date. + +The following fields are available: + +- **FlightData** Specifies a unique identifier for each group of Windows Insider builds. +- **InstanceId** Retrieves a unique identifier for each instance of a setup session. +- **Operation** Facilitator’s last known operation (scan, download, etc.). +- **ReportId** ID for tying together events stream side. +- **ResultCode** Result returned for the entire setup operation. +- **Scenario** Dynamic Update scenario (Image DU, or Setup DU). +- **ScenarioId** Identifies the update scenario. +- **TargetBranch** Branch of the target OS. +- **TargetBuild** Build of the target OS. + + +### Setup360Telemetry.Setup360MitigationResult + +This event sends data indicating the result of each setup mitigation. + +The following fields are available: + +- **Applicable** TRUE if the mitigation is applicable for the current update. +- **ClientId** In the Windows Update scenario, this is the client ID passed to Setup. In Media setup, default value is Media360, but can be overwritten by the caller to a unique value. +- **CommandCount** The number of command operations in the mitigation entry. +- **CustomCount** The number of custom operations in the mitigation entry. +- **FileCount** The number of file operations in the mitigation entry. +- **FlightData** The unique identifier for each flight (test release). +- **Index** The mitigation index of this particular mitigation. +- **InstanceId** The GUID (Globally Unique ID) that identifies each instance of SetupHost.EXE. +- **MitigationScenario** The update scenario in which the mitigation was executed. +- **Name** The friendly (descriptive) name of the mitigation. +- **OperationIndex** The mitigation operation index (in the event of a failure). +- **OperationName** The friendly (descriptive) name of the mitigation operation (in the event of failure). +- **RegistryCount** The number of registry operations in the mitigation entry. +- **ReportId** In the Windows Update scenario, the Update ID that is passed to Setup. In media setup, this is the GUID for the INSTALL.WIM. +- **Result** HResult of this operation. +- **ScenarioId** Setup360 flow type. +- **TimeDiff** The amount of time spent performing the mitigation (in 100-nanosecond increments). + + +### Setup360Telemetry.Setup360MitigationSummary + +This event sends a summary of all the setup mitigations available for this update. + +The following fields are available: + +- **Applicable** The count of mitigations that were applicable to the system and scenario. +- **ClientId** The Windows Update client ID passed to Setup. +- **Failed** The count of mitigations that failed. +- **FlightData** The unique identifier for each flight (test release). +- **InstanceId** The GUID (Globally Unique ID) that identifies each instance of SetupHost.EXE. +- **MitigationScenario** The update scenario in which the mitigations were attempted. +- **ReportId** In the Windows Update scenario, the Update ID that is passed to Setup. In media setup, this is the GUID for the INSTALL.WIM. +- **Result** HResult of this operation. +- **ScenarioId** Setup360 flow type. +- **TimeDiff** The amount of time spent performing the mitigation (in 100-nanosecond increments). +- **Total** The total number of mitigations that were available. + + +### Setup360Telemetry.Setup360OneSettings + +This event collects information regarding the post reboot phase of the new UUP (Unified Update Platform) update scenario; which is leveraged by both Mobile and Desktop. + +The following fields are available: + +- **ClientId** The Windows Update client ID passed to Setup. +- **Count** The count of applicable OneSettings for the device. +- **FlightData** The ID for the flight (test instance version). +- **InstanceId** The GUID (Globally-Unique ID) that identifies each instance of setuphost.exe. +- **Parameters** The set of name value pair parameters sent to OneSettings to determine if there are any applicable OneSettings. +- **ReportId** The Update ID passed to Setup. +- **Result** The HResult of the event error. +- **ScenarioId** The update scenario ID. +- **Values** Values sent back to the device, if applicable. + + +### Setup360Telemetry.UnexpectedEvent + +This event sends data indicating that the device has invoked the unexpected event phase of the upgrade, to help keep Windows up to date. + +The following fields are available: + +- **ClientId** With Windows Update, this will be the Windows Update client ID that is passed to Setup. In Media setup, default value is Media360, but can be overwritten by the caller to a unique value. +- **FlightData** Unique value that identifies the flight. +- **HostOSBuildNumber** The build number of the previous OS. +- **HostOsSkuName** The OS edition which is running Setup360 instance (previous OS). +- **InstanceId** A unique GUID that identifies each instance of setuphost.exe +- **o-Ste** No content is currently available. +- **ReportId** With Windows Update, this is the updateID that is passed to Setup. In media setup, this is the GUID for the install.wim. +- **Setup360Extended** Detailed information about the phase/action when the potential failure occurred. +- **Setup360Mode** The phase of Setup360. Example: Predownload, Install, Finalize, Rollback. +- **Setup360Result** The result of Setup360. This is an HRESULT error code that can be used used to diagnose errors. +- **Setup360Scenario** The Setup360 flow type. Example: Boot, Media, Update, MCT. +- **SetupVersionBuildNumber** The build number of Setup360 (build number of target OS). +- **State** The exit state of a Setup360 run. Example: succeeded, failed, blocked, cancelled. +- **TestId** A string to uniquely identify a group of events. +- **WuId** This is the Windows Update Client ID. With Windows Update, this is the same as the clientId. + + +## Windows as a Service diagnostic events + +### Microsoft.Windows.WaaSMedic.SummaryEvent + +Result of the WaaSMedic operation. + +The following fields are available: + +- **callerApplication** The name of the calling application. +- **detectionSummary** Result of each applicable detection that was run. +- **featureAssessmentImpact** WaaS Assessment impact for feature updates. +- **hrEngineResult** Error code from the engine operation. +- **insufficientSessions** Device not eligible for diagnostics. +- **isInteractiveMode** The user started a run of WaaSMedic. +- **isManaged** Device is managed for updates. +- **isWUConnected** Device is connected to Windows Update. +- **noMoreActions** No more applicable diagnostics. +- **qualityAssessmentImpact** WaaS Assessment impact for quality updates. +- **remediationSummary** Result of each operation performed on a device to fix an invalid state or configuration that's preventing the device from getting updates. For example, if Windows Update service is turned off, the fix is to turn the it back on. +- **usingBackupFeatureAssessment** Relying on backup feature assessment. +- **usingBackupQualityAssessment** Relying on backup quality assessment. +- **usingCachedFeatureAssessment** WaaS Medic run did not get OS build age from the network on the previous run. +- **usingCachedQualityAssessment** WaaS Medic run did not get OS revision age from the network on the previous run. +- **versionString** Version of the WaaSMedic engine. +- **waasMedicRunMode** Indicates whether this was a background regular run of the medic or whether it was triggered by a user launching Windows Update Troubleshooter. + + +## Windows Error Reporting events + +### Microsoft.Windows.WERVertical.OSCrash + +This event sends binary data from the collected dump file wheneveer a bug check occurs, to help keep Windows up to date. The is the OneCore version of this event. + +The following fields are available: + +- **BootId** Uint32 identifying the boot number for this device. +- **BugCheckCode** Uint64 "bugcheck code" that identifies a proximate cause of the bug check. +- **BugCheckPar%meter2** No content is currently available. +- **BugCheckParameter1** Uint64 parameter providing additional information. +- **BugCheckParameter2** Uint64 parameter providing additional information. +- **BugCheckParameter3** Uint64 parameter providing additional information. +- **BugCheckParameter4** Uint64 parameter providing additional information. +- **DumpFileAttributes** Codes that identify the type of data contained in the dump file +- **DumpFileSize** Size of the dump file +- **IsValidDumpFile** True if the dump file is valid for the debugger, false otherwise +- **ReportId** WER Report Id associated with this bug check (used for finding the corresponding report archive in Watson). + + +## Windows Error Reporting MTT events + +### Microsoft.Windows.WER.MTT.Denominator + +This event provides a denominator to calculate MTTF (mean-time-to-failure) for crashes and other errors, to help keep Windows up to date. + +The following fields are available: + +- **DPRange** Maximum mean value range. +- **DPValue** Randomized bit value (0 or 1) that can be reconstituted over a large population to estimate the mean. +- **Value** Standard UTC emitted DP value structure See [Value](#value). + + +### Value + +This event returns data about Mean Time to Failure (MTTF) for Windows devices. It is the primary means of estimating reliability problems in Basic Diagnostic reporting with very strong privacy guarantees. Since Basic Diagnostic reporting does not include system up-time, and since that information is important to ensuring the safe and stable operation of Windows, the data provided by this event provides that data in a manner which does not threaten a user’s privacy. + +The following fields are available: + +- **Algorithm** The algorithm used to preserve privacy. +- **DPRange** The upper bound of the range being measured. +- **DPValue** The randomized response returned by the client. +- **Epsilon** The level of privacy to be applied. +- **HistType** The histogram type if the algorithm is a histogram algorithm. +- **PertProb** The probability the entry will be Perturbed if the algorithm chosen is “heavy-hitters”. + + +## Windows Store events + +### Microsoft.Windows.Store.StoreActivating + +This event sends tracking data about when the Store app activation via protocol URI is in progress, to help keep Windows up to date. + + + +### Microsoft.Windows.StoreAgent.Telemetry.AbortedInstallation + +This event is sent when an installation or update is canceled by a user or the system and is used to help keep Windows Apps up to date and secure. + +The following fields are available: + +- **AggregatedPackageFullNames** The names of all packages to be downloaded and installed. +- **AggregatedPackageFullNcmes** No content is currently available. +- **AttemptNumber** Number of retry attempts before it was canceled. +- **BundleId** The Item Bundle ID. +- **Bundlele** No content is currently available. +- **CategoryId** The Item Category ID. +- **Categoryle** No content is currently available. +- **ClientAppId** The identity of the app that initiated this operation. +- **ClientApple** No content is currently available. +- **HResult** The result code of the last action performed before this operation. +- **IsBundle** Is this a bundle? +- **IsInteractive** Was this requested by a user? +- **IsMandatory** Was this a mandatory update? +- **IsRemediation** Was this a remediation install? +- **IsRestore** Is this automatically restoring a previously acquired product? +- **IsUpdate** Flag indicating if this is an update. +- **ParentBundleId** The product ID of the parent (if this product is part of a bundle). +- **ParentBundlele** No content is currently available. +- **PFN** The product family name of the product being installed. +- **Producele** No content is currently available. +- **ProductId** The identity of the package or packages being installed. +- **S{stemAttemptNumber** No content is currently available. +- **SystemAttemptNumber** The total number of automatic attempts at installation before it was canceled. +- **UserAttemptNumber** The total number of user attempts at installation before it was canceled. +- **WUContentId** The Windows Update content ID. + + +### Microsoft.Windows.StoreAgent.Telemetry.BeginGetInstalledContentIds + +This event is sent when an inventory of the apps installed is started to determine whether updates for those apps are available. It's used to help keep Windows up-to-date and secure. + + + +### Microsoft.Windows.StoreAgent.Telemetry.BeginUpdateMetadataPrepare + +This event is sent when the Store Agent cache is refreshed with any available package updates. It's used to help keep Windows up-to-date and secure. + + + +### Microsoft.Windows.StoreAgent.Telemetry.CancelInstallation + +This event is sent when an app update or installation is canceled while in interactive mode. This can be canceled by the user or the system. It's used to help keep Windows up-to-date and secure. + +The following fields are available: + +- **AggregatedPackageFullNames** The names of all package or packages to be downloaded and installed. +- **AttemptNumber** Total number of installation attempts. +- **BundleId** The identity of the Windows Insider build that is associated with this product. +- **CategoryId** The identity of the package or packages being installed. +- **ClientAppId** The identity of the app that initiated this operation. +- **IsBundle** Is this a bundle? +- **IsInteractive** Was this requested by a user? +- **IsMandatory** Is this a mandatory update? +- **IsRemediation** Is this repairing a previous installation? +- **IsRestore** Is this an automatic restore of a previously acquired product? +- **IsUpdate** Is this a product update? +- **ParentBundleId** The product ID of the parent (if this product is part of a bundle). +- **PFN** The name of all packages to be downloaded and installed. +- **PreviousHResult** The previous HResult code. +- **PreviousInstallState** Previous installation state before it was canceled. +- **ProductId** The name of the package or packages requested for installation. +- **RelatedCV** Correlation Vector of a previous performed action on this product. +- **SystemAttemptNumber** Total number of automatic attempts to install before it was canceled. +- **UserAttemptNumber** Total number of user attempts to install before it was canceled. +- **WUContentId** The Windows Update content ID. + + +### Microsoft.Windows.StoreAgent.Telemetry.CompleteInstallOperationRequest + +This event is sent at the end of app installations or updates to help keep Windows up-to-date and secure. + +The following fields are available: + +- **CatalogId** The Store Product ID of the app being installed. +- **HResult** HResult code of the action being performed. +- **IsBundle** Is this a bundle? +- **PackageFamilyName** The name of the package being installed. +- **ProductId** The Store Product ID of the product being installed. +- **SkuId** Specific edition of the item being installed. + + +### Microsoft.Windows.StoreAgent.Telemetry.EndAcquireLicense + +This event is sent after the license is acquired when a product is being installed. It's used to help keep Windows up-to-date and secure. + +The following fields are available: + +- **AggregatedPackageFullNaies** No content is currently available. +- **AggregatedpackageFullNames** No content is currently available. +- **AggregatedPackageFullNames** Includes a set of package full names for each app that is part of an atomic set. +- **AttemptNumber** The total number of attempts to acquire this product. +- **CategoryId** The identity of the package or packages being installed. +- **ClientAppId** The identity of the app that initiated this operation. +- **HResult** HResult code to show the result of the operation (success/failure). +- **IsBundle** Is this a bundle? +- **IsInteractive** Did the user initiate the installation? +- **IsMandatory** Is this a mandatory update? +- **IsRemediation** Is this repairing a previous installation? +- **IsRestore** Is this happening after a device restore? +- **IsUp`ate** No content is currently available. +- **IsUpdate** Is this an update? +- **ParentBuneleId** No content is currently available. +- **PFN** Product Family Name of the product being installed. +- **Produc|Id** No content is currently available. +- **productId** No content is currently available. +- **ProductId** The Store Product ID for the product being installed. +- **SystemAttemptNumber** The number of attempts by the system to acquire this product. +- **UserAttemptNumber** The number of attempts by the user to acquire this product +- **UserCttemptNumber** No content is currently available. +- **WUContentId** The Windows Update content ID. + + +### Microsoft.Windows.StoreAgent.Telemetry.EndDownload + +This event is sent after an app is downloaded to help keep Windows up-to-date and secure. + +The following fields are available: + +- **AggregatedPackageFullLames** No content is currently available. +- **AggregatedPackageFullNaðes** No content is currently available. +- **AggregatedPackageFullNames** The name of all packages to be downloaded and installed. +- **AttemptNumber** Number of retry attempts before it was canceled. +- **BundleId** The identity of the Windows Insider build associated with this product. +- **CategoryId** The identity of the package or packages being installed. +- **CategoryIf** No content is currently available. +- **ClientAppId** The identity of the app that initiated this operation. +- **DownloadSize** The total size of the download. +- **ExtendedHResult** Any extended HResult error codes. +- **HResult** The result code of the last action performed. +- **IsBundle** Is this a bundle? +- **IsInteractive** Is this initiated by the user? +- **IsMandatory** Is this a mandatory installation? +- **IsRemediation** Is this repairing a previous installation? +- **IsRestore** Is this a restore of a previously acquired product? +- **IsUpdate** Is this an update? +- **ParentBundleId** The parent bundle ID (if it's part of a bundle). +- **PFN** The Product Family Name of the app being download. +- **ProductId** The Store Product ID for the product being installed. +- **SystemAttemptNumber** The number of attempts by the system to download. +- **UserAttemptNum`er** No content is currently available. +- **UserAttemptNumber** The number of attempts by the user to download. +- **UserCttemptNumber** No content is currently available. +- **WUContentId** The Windows Update content ID. + + +### Microsoft.Windows.StoreAgent.Telemetry.EndFrameworkUpdate + +This event is sent when an app update requires an updated Framework package and the process starts to download it. It is used to help keep Windows up-to-date and secure. + +The following fields are available: + +- **HResult** The result code of the last action performed before this operation. + + +### Microsoft.Windows.StoreAgent.Telemetry.EndGetInstalledContentIds + +This event is sent after sending the inventory of the products installed to determine whether updates for those products are available. It's used to help keep Windows up-to-date and secure. + +The following fields are available: + +- **HResult** The result code of the last action performed before this operation. + + +### Microsoft.Windows.StoreAgent.Telemetry.EndInstall + +This event is sent after a product has been installed to help keep Windows up-to-date and secure. + +The following fields are available: + +- **__TlgCÖ__** No content is currently available. +- **AggregatedPackageFullNames** The names of all packages to be downloaded and installed. +- **AttemptNumber** The number of retry attempts before it was canceled. +- **BundleId** The identity of the build associated with this product. +- **CategoryId** The identity of the package or packages being installed. +- **ClientAppId** The identity of the app that initiated this operation. +- **ExtendedHResult** The extended HResult error code. +- **HResult** The result code of the last action performed. +- **IsBundle** Is this a bundle? +- **IsInteractive** Is this an interactive installation? +- **IsInteragtive** No content is currently available. +- **IsMandatory** Is this a mandatory installation? +- **IsRemediation** Is this repairing a previous installation? +- **IsRestore** Is this automatically restoring a previously acquired product? +- **IsUpdate** Is this an update? +- **ParentBundleId** The product ID of the parent (if this product is part of a bundle). +- **PFN** Product Family Name of the product being installed. +- **ProductId** The Store Product ID for the product being installed. +- **SystemAttemptNumber** The total number of system attempts. +- **UserAttemptNumber** The total number of user attempts. +- **WUContentId** The Windows Update content ID. + + +### Microsoft.Windows.StoreAgent.Telemetry.EndScanForUpdates + +This event is sent after a scan for product updates to determine if there are packages to install. It's used to help keep Windows up-to-date and secure. + +The following fields are available: + +- **ClientAppId** The identity of the app that initiated this operation. +- **HResult** The result code of the last action performed. +- **IsApplicability** Is this request to only check if there are any applicable packages to install? +- **IsInteractive** Is this user requested? +- **IsOnline** Is the request doing an online check? + + +### Microsoft.Windows.StoreAgent.Telemetry.EndSearchUpdatePackages + +This event is sent after searching for update packages to install. It is used to help keep Windows up-to-date and secure. + +The following fields are available: + +- **AggregatedPackageFullNames** The names of all packages to be downloaded and installed. +- **AttemptNumber** The total number of retry attempts before it was canceled. +- **BundleId** The identity of the build associated with this product. +- **CategoryId** The identity of the package or packages being installed. +- **ClientAppId** The identity of the app that initiated this operation. +- **HResult** The result code of the last action performed. +- **IsBundle** Is this a bundle? +- **IsInteractive** Is this user requested? +- **IsMandatory** Is this a mandatory update? +- **IsRemediation** Is this repairing a previous installation? +- **IsRestore** Is this restoring previously acquired content? +- **IsUpdate** Is this an update? +- **ParentBundleId** The product ID of the parent (if this product is part of a bundle). +- **PFN** The name of the package or packages requested for install. +- **ProductId** The Store Product ID for the product being installed. +- **SystemAttemptNumber** The total number of system attempts. +- **UserAttemptNumber** The total number of user attempts. +- **WUContentId** The Windows Update content ID. + + +### Microsoft.Windows.StoreAgent.Telemetry.EndStageUserData + +This event is sent after restoring user data (if any) that needs to be restored following a product install. It is used to keep Windows up-to-date and secure. + +The following fields are available: + +- **AggregatedPackageFullNames** The name of all packages to be downloaded and installed. +- **AttemptNumber** The total number of retry attempts before it was canceled. +- **BundleId** The identity of the build associated with this product. +- **CategoryId** The identity of the package or packages being installed. +- **ClientAppId** The identity of the app that initiated this operation. +- **HResult** The result code of the last action performed. +- **IsBundle** Is this a bundle? +- **IsInteractive** Is this user requested? +- **IsMandatory** Is this a mandatory update? +- **IsRemediation** Is this repairing a previous installation? +- **IsRestore** Is this restoring previously acquired content? +- **IsUpdate** Is this an update? +- **ParentBundleId** The product ID of the parent (if this product is part of a bundle). +- **PFN** The name of the package or packages requested for install. +- **ProductId** The Store Product ID for the product being installed. +- **SystemAttemptNumber** The total number of system attempts. +- **UserAttemptNumber** The total number of system attempts. +- **WUContentId** The Windows Update content ID. + + +### Microsoft.Windows.StoreAgent.Telemetry.EndUpdateMetadataPrepare + +This event is sent after a scan for available app updates to help keep Windows up-to-date and secure. + +The following fields are available: + +- **HResult** The result code of the last action performed. + + +### Microsoft.Windows.StoreAgent.Telemetry.FulfillmentComplete + +This event is sent at the end of an app install or update to help keep Windows up-to-date and secure. + +The following fields are available: + +- **CatalogId** The name of the product catalog from which this app was chosen. +- **CatanogId** No content is currently available. +- **CatdlogId** No content is currently available. +- **FailedRetry** Indicates whether the installation or update retry was successful. +- **HResult** The HResult code of the operation. +- **JResult** No content is currently available. +- **PFN** The Package Family Name of the app that is being installed or updated. +- **Producele** No content is currently available. +- **ProductId** The product ID of the app that is being updated or installed. + + +### Microsoft.Windows.StoreAgent.Telemetry.FulfillmentInitiate + +This event is sent at the beginning of an app install or update to help keep Windows up-to-date and secure. + +The following fields are available: + +- **CatalogId** The name of the product catalog from which this app was chosen. +- **FulfillmentPluginId** The ID of the plugin needed to install the package type of the product. +- **PFN** The Package Family Name of the app that is being installed or updated. +- **PluginTelemetryData** Diagnostic information specific to the package-type plug-in. +- **ProductId** The product ID of the app that is being updated or installed. + + +### Microsoft.Windows.StoreAgent.Telemetry.InstallOperationRequest + +This event is sent when a product install or update is initiated, to help keep Windows up-to-date and secure. + +The following fields are available: + +- **BundleId** The identity of the build associated with this product. +- **CatalogId** If this product is from a private catalog, the Store Product ID for the product being installed. +- **ProductId** The Store Product ID for the product being installed. +- **SkuId** Specific edition ID being installed. +- **VolumePath** The disk path of the installation. + + +### Microsoft.Windows.StoreAgent.Telemetry.PauseInstallation + +This event is sent when a product install or update is paused (either by a user or the system), to help keep Windows up-to-date and secure. + +The following fields are available: + +- **AggregatedPackageFullNames** The names of all packages to be downloaded and installed. +- **AttemptNumber** The total number of retry attempts before it was canceled. +- **BundleId** The identity of the build associated with this product. +- **CategoryId** The identity of the package or packages being installed. +- **ClientAppId** The identity of the app that initiated this operation. +- **IsBundle** Is this a bundle? +- **IsInteractive** Is this user requested? +- **IsMandatory** Is this a mandatory update? +- **IsRemediation** Is this repairing a previous installation? +- **IsRestore** Is this restoring previously acquired content? +- **IsUpdate** Is this an update? +- **ParentBundleId** The product ID of the parent (if this product is part of a bundle). +- **PFN** The Product Full Name. +- **PreviousHResult** The result code of the last action performed before this operation. +- **PreviousInstallState** Previous state before the installation or update was paused. +- **ProductId** The Store Product ID for the product being installed. +- **RelatedCV** Correlation Vector of a previous performed action on this product. +- **SystemAttemptNumber** The total number of system attempts. +- **UserAttemptNumber** The total number of user attempts. +- **WUContentId** The Windows Update content ID. + + +### Microsoft.Windows.StoreAgent.Telemetry.ResumeInstallation + +This event is sent when a product install or update is resumed (either by a user or the system), to help keep Windows up-to-date and secure. + +The following fields are available: + +- **AggregatedPackageFullNames** The names of all packages to be downloaded and installed. +- **AttemptNumber** The number of retry attempts before it was canceled. +- **BundleId** The identity of the build associated with this product. +- **categoryId** No content is currently available. +- **CategoryId** The identity of the package or packages being installed. +- **ClientAppId** The identity of the app that initiated this operation. +- **HResult** The result code of the last action performed before this operation. +- **IsBundle** Is this a bundle? +- **IsInteractive** Is this user requested? +- **IsMandatory** Is this a mandatory update? +- **IsRemediation** Is this repairing a previous installation? +- **IsRestore** Is this restoring previously acquired content? +- **IsUpdate** Is this an update? +- **IsUserRetry** Did the user initiate the retry? +- **ParentBundleId** The product ID of the parent (if this product is part of a bundle). +- **PFN** The name of the package or packages requested for install. +- **PreviousHResult** The previous HResult error code. +- **PreviousInstallState** Previous state before the installation was paused. +- **ProductId** The Store Product ID for the product being installed. +- **RelatedCV** Correlation Vector for the original install before it was resumed. +- **ResumeClientId** The ID of the app that initiated the resume operation. +- **SystemAttemptNumber** The total number of system attempts. +- **UserAttemptNumber** The total number of user attempts. +- **WUContentId** The Windows Update content ID. + + +### Microsoft.Windows.StoreAgent.Telemetry.ResumeOperationRequest + +This event is sent when a product install or update is resumed by a user or on installation retries, to help keep Windows up-to-date and secure. + +The following fields are available: + +- **ProductId** The Store Product ID for the product being installed. + + +### Microsoft.Windows.StoreAgent.Telemetry.SearchForUpdateOperationRequest + +This event is sent when searching for update packages to install, to help keep Windows up-to-date and secure. + +The following fields are available: + +- **CatalogId** The Store Catalog ID for the product being installed. +- **ProductId** The Store Product ID for the product being installed. +- **SkuId** Specfic edition of the app being updated. + + +### Microsoft.Windows.StoreAgent.Telemetry.UpdateAppOperationRequest + +This event occurs when an update is requested for an app, to help keep Windows up-to-date and secure. + +The following fields are available: + +- **PFamN** The name of the app that is requested for update. + + +## Windows System Kit events + +### Microsoft.Windows.Kits.WSK.WskImageCreate + +This event sends simple Product and Service usage data when a user is using the Windows System Kit to create new OS “images”. The data includes the version of the Windows System Kit and the state of the event and is used to help investigate “image” creation failures. + +The following fields are available: + +- **Phase** The image creation phase. Values are “Start” or “End”. +- **WskVersion** The version of the Windows System Kit being used. + + +### Microsoft.Windows.Kits.WSK.WskImageCustomization + +This event sends simple Product and Service usage data when a user is using the Windows System Kit to create/modify configuration files allowing the customization of a new OS image with Apps or Drivers. The data includes the version of the Windows System Kit, the state of the event, the customization type (drivers or apps) and the mode (new or updating) and is used to help investigate configuration file creation failures. + +The following fields are available: + +- **CustomizationMode** Indicates the mode of the customization (new or updating). +- **CustomizationType** Indicates the type of customization (drivers or apps). +- **Mode** The mode of update to image configuration files. Values are “New” or “Update”. +- **Phase** The image creation phase. Values are “Start” or “End”. +- **Type** The type of update to image configuration files. Values are “Apps” or “Drivers”. +- **WskVersion** The version of the Windows System Kit being used. + + +### Microsoft.Windows.Kits.WSK.WskWorkspaceCreate + +This event sends simple Product and Service usage data when a user is using the Windows System Kit to create new workspace for generating OS “images”. The data includes the version of the Windows System Kit and the state of the event and is used to help investigate workspace creation failures. + +The following fields are available: + +- **Architecture** The OS architecture that the workspace will target. Values are one of: “AMD64”, “ARM64”, “x86”, or “ARM”. +- **OsEdition** The Operating System Edition that the workspace will target. +- **Phase** The image creation phase. Values are “Start” or “End”. +- **WorkspaceArchitecture** The operating system architecture that the workspace will target. +- **WorkspaceOsEdition** The operating system edition that the workspace will target. +- **WskVersion** The version of the Windows System Kit being used. + + +## Windows Update Delivery Optimization events + +### Microsoft.OSG.DU.DeliveryOptClient.DownloadCanceled + +This event describes when a download was canceled with Delivery Optimization. It's used to understand and address problems regarding downloads. + +The following fields are available: + +- **background** Is the download being done in the background? +- **bytesFromCacheServer** Bytes received from a cache host. +- **bytesFromCDN** The number of bytes received from a CDN source. +- **bytesFromGroupPeers** The number of bytes received from a peer in the same group. +- **bytesFromIntPeers** The number of bytes received from peers not in the same LAN or in the same group. +- **bytesFromLinkLocalPeers** The number of bytes received from local peers. +- **bytesFromLocalCache** Bytes copied over from local (on disk) cache. +- **bytesFromPeers** The number of bytes received from a peer in the same LAN. +- **cdnErrorCodes** A list of CDN connection errors since the last FailureCDNCommunication event. +- **cdnErrorCounts** The number of times each error in cdnErrorCodes was encountered. +- **cdnIp** The IP Address of the source CDN (Content Delivery Network). +- **cdnUrl** The URL of the source CDN (Content Delivery Network). +- **dataSourcesTotal** Bytes received per source type, accumulated for the whole session. +- **errorCode** The error code that was returned. +- **experimentId** When running a test, this is used to correlate events that are part of the same test. +- **fileID** The ID of the file being downloaded. +- **gCurMemoryStreamBytes** Current usage for memory streaming. +- **gMaxMemoryStreamBytes** Maximum usage for memory streaming. +- **isVpn** Indicates whether the device is connected to a VPN (Virtual Private Network). +- **jobID** Identifier for the Windows Update job. +- **predefinedCallerName** The name of the API Caller. +- **reasonCode** Reason the action or event occurred. +- **routeToCacheServer** The cache server setting, source, and value. +- **sessionID** The ID of the file download session. +- **updateID** The ID of the update being downloaded. +- **usedMemoryStream** TRUE if the download is using memory streaming for App downloads. + + +### Microsoft.OSG.DU.DeliveryOptClient.DownloadCompleted + +This event describes when a download has completed with Delivery Optimization. It's used to understand and address problems regarding downloads. + +The following fields are available: + +- **#dnErrorCounts** No content is currently available. +- **__TlgCVß_** No content is currently available. +- **|anConnectionCount** No content is currently available. +- **}plinkUsageBps** No content is currently available. +- **0redefinedCallerName** No content is currently available. +- **b6nConnectionCount** No content is currently available. +- **b6nErrorCodes** No content is currently available. +- **b6nErrorCounts** No content is currently available. +- **b6nIp** No content is currently available. +- **b6nUrl** No content is currently available. +- **background** Is the download a background download? +- **bytesFrkmIntPeers** No content is currently available. +- **bytesFromCacheSedver** No content is currently available. +- **bytesFromCacheServer** Bytes received from a cache host. +- **bytesFromCdN** No content is currently available. +- **bytesFromCDN** The number of bytes received from a CDN source. +- **bytesFromGroupPeers** The number of bytes received from a peer in the same domain group. +- **bytesFromIntÐeers** No content is currently available. +- **bytesFromIntPeers** The number of bytes received from peers not in the same LAN or in the same domain group. +- **bytesFromLinkLocalPeers** The number of bytes received from local peers. +- **bytesFromLocalCache** Bytes copied over from local (on disk) cache. +- **bytesFromPeers** The number of bytes received from a peer in the same LAN. +- **bytesRequested** The total number of bytes requested for download. +- **cacheSarverConnectionCount** No content is currently available. +- **cacheSedverConnectionCount** No content is currently available. +- **cacheServerConndctionCount** No content is currently available. +- **cacheServerConnectionCoujt** No content is currently available. +- **cacheServerConnectionCount** Number of connections made to cache hosts. +- **cdnConnectionCount** The total number of connections made to the CDN. +- **cdnErrorCodes** A list of CDN connection errors since the last FailureCDNCommunication event. +- **cdnErrorCounts** The number of times each error in cdnErrorCodes was encountered. +- **cdnIp** The IP address of the source CDN. +- **cdnSonnectionCount** No content is currently available. +- **cdnUrl** Url of the source Content Distribution Network (CDN). +- **dataSourcesTotal** Bytes received per source type, accumulated for the whole session. +- **dkwnloadModeSrc** No content is currently available. +- **doErrorCode** The Delivery Optimization error code that was returned. +- **dowflinkBps** No content is currently available. +- **downlinkBps** The maximum measured available download bandwidth (in bytes per second). +- **downlinkUsageBps** The download speed (in bytes per second). +- **downloadMode** The download mode used for this file download session. +- **doWnloadMode** No content is currently available. +- **downloadModeReason** Reason for the download. +- **downloadModeSrc** Source of the DownloadMode setting (KvsProvider = 0, GeoProvider = 1, GeoVerProvider = 2, CpProvider = 3, DiscoveryProvider = 4, RegistryProvider = 5, GroupPolicyProvider = 6, MdmProvider = 7, SettingsProvider = 8, InvalidProviderType = 9). +- **downloadMofeSrc** No content is currently available. +- **experimentId** When running a test, this is used to correlate with other events that are part of the same test. +- **fileID** The ID of the file being downloaded. +- **fileSize** The size of the file being downloaded. +- **gCurMemoryStreamBytes** Current usage for memory streaming. +- **gMaxMemoryStreamBytes** Maximum usage for memory streaming. +- **groupConjectionCount** No content is currently available. +- **groupConnectionCount** The total number of connections made to peers in the same group. +- **internetConnectionCount** The total number of connections made to peers not in the same LAN or the same group. +- **internetConnectionCountdownlinkBps** No content is currently available. +- **isEjcrypted** No content is currently available. +- **isEncryptdd** No content is currently available. +- **isEncrypted** TRUE if the file is encrypted and will be decrypted after download. +- **isVpn** Is the device connected to a Virtual Private Network? +- **jobID** Identifier for the Windows Update job. +- **lanConnectionCount** The total number of connections made to peers in the same LAN. +- **linkLocalConnectionCount** The number of connections made to peers in the same Link-local network. +- **numPeers** The total number of peers used for this download. +- **numPeersLocal** The total number of local peers used for this download. +- **predefi.edCallerName** No content is currently available. +- **predefinedCallerName** The name of the API Caller. +- **predefinedCalleRName** No content is currently available. +- **restrictedUpload** Is the upload restricted? +- **romteToCacheServer** No content is currently available. +- **roupeToCacheServer** No content is currently available. +- **routeTnCacheServer** No content is currently available. +- **routeToCacheSedver** No content is currently available. +- **routeToCacheServer** The cache server setting, source, and value. +- **sessionID** The ID of the download session. +- **totalTimeMs** Duration of the download (in seconds). +- **updateID** The ID of the update being downloaded. +- **uplinkBps** The maximum measured available upload bandwidth (in bytes per second). +- **uplinkUsageBps** The upload speed (in bytes per second). +- **uplinkUsegeBps** No content is currently available. +- **usedMemoryStream** TRUE if the download is using memory streaming for App downloads. + + +### Microsoft.OSG.DU.DeliveryOptClient.DownloadPaused + +This event represents a temporary suspension of a download with Delivery Optimization. It's used to understand and address problems regarding downloads. + +The following fields are available: + +- **backgground** No content is currently available. +- **backgro}nd** No content is currently available. +- **backgrou|d** No content is currently available. +- **background** Is the download a background download? +- **c`nUrl** No content is currently available. +- **cdnUrl** The URL of the source CDN (Content Delivery Network). +- **errorBode** No content is currently available. +- **errorCode** The error code that was returned. +- **expebimentId** No content is currently available. +- **expebimentIderrorCode** No content is currently available. +- **experiientId** No content is currently available. +- **experimenpId** No content is currently available. +- **experimentId** When running a test, this is used to correlate with other events that are part of the same test. +- **fileID** The ID of the file being paused. +- **isVp|** No content is currently available. +- **isVpn** Is the device connected to a Virtual Private Network? +- **jobID** Identifier for the Windows Update job. +- **predefinedCallerName** The name of the API Caller object. +- **reasonCod%** No content is currently available. +- **reasonCode** The reason for pausing the download. +- **recsonCodesessiolID** No content is currently available. +- **routeToCacheSedver** No content is currently available. +- **routeToCacheServer** The cache server setting, source, and value. +- **sessionID** The ID of the download session. +- **updateID** The ID of the update being paused. +- **updateMD** No content is currently available. + + +### Microsoft.OSG.DU.DeliveryOptClient.DownloadStarted + +This event sends data describing the start of a new download to enable Delivery Optimization. It's used to understand and address problems regarding downloads. + +The following fields are available: + +- **b6nUrl** No content is currently available. +- **background** Indicates whether the download is happening in the background. +- **bacoground** No content is currently available. +- **bileSizeCaller** No content is currently available. +- **bytesRequested** Number of bytes requested for the download. +- **cdnUrl** The URL of the source Content Distribution Network (CDN). +- **costFlags** A set of flags representing network cost. +- **costFlaos** No content is currently available. +- **deviceProfile** Identifies the usage or form factor (such as Desktop, Xbox, or VM). +- **diceRoll** Random number used for determining if a client will use peering. +- **doClientVersion** The version of the Delivery Optimization client. +- **doErrorC/de** No content is currently available. +- **doErrorCode** The Delivery Optimization error code that was returned. +- **doErrorCoee** No content is currently available. +- **downloadMode** The download mode used for this file download session (CdnOnly = 0, Lan = 1, Group = 2, Internet = 3, Simple = 99, Bypass = 100). +- **downloadModeReason** Reason for the download. +- **downloadModeSrc** Source of the DownloadMode setting (KvsProvider = 0, GeoProvider = 1, GeoVerProvider = 2, CpProvider = 3, DiscoveryProvider = 4, RegistryProvider = 5, GroupPolicyProvider = 6, MdmProvider = 7, SettingsProvider = 8, InvalidProviderType = 9). +- **errorCode** The error code that was returned. +- **experimejtId** No content is currently available. +- **experimentId** ID used to correlate client/services calls that are part of the same test during A/B testing. +- **faleID** No content is currently available. +- **fiheID** No content is currently available. +- **fileID** The ID of the file being downloaded. +- **filePat(** No content is currently available. +- **filePath** The path to where the downloaded file will be written. +- **fileSize** Total file size of the file that was downloaded. +- **fileSizeCaller** Value for total file size provided by our caller. +- **groqpID** No content is currently available. +- **groupID** ID for the group. +- **isEncrypted** Indicates whether the download is encrypted. +- **isFpn** No content is currently available. +- **isVpn** Indicates whether the device is connected to a Virtual Private Network. +- **jobID** The ID of the Windows Update job. +- **peerID** The ID for this delivery optimization client. +- **predefinedCallerName** Name of the API caller. +- **rimentId** No content is currently available. +- **routeToCacheSedver** No content is currently available. +- **routeToCacheServer** Cache server setting, source, and value. +- **sessionID** The ID for the file download session. +- **sessmonID** No content is currently available. +- **setConfigs** A JSON representation of the configurations that have been set, and their sources. +- **updateID** The ID of the update being downloaded. +- **updateYD** No content is currently available. +- **usedMemoryStream** Indicates whether the download used memory streaming. + + +### Microsoft.OSG.DU.DeliveryOptClient.FailureCdnCommunication + +This event represents a failure to download from a CDN with Delivery Optimization. It's used to understand and address problems regarding downloads. + +The following fields are available: + +- **cdnHeaders** The HTTP headers returned by the CDN. +- **cdnIp** The IP address of the CDN. +- **cdnUrl** The URL of the CDN. +- **eErrorCode** No content is currently available. +- **eErrorCunt** No content is currently available. +- **errorCode** The error code that was returned. +- **errorCount** The total number of times this error code was seen since the last FailureCdnCommunication event was encountered. +- **experimentId** When running a test, this is used to correlate with other events that are part of the same test. +- **fileID** The ID of the file being downloaded. +- **htppStatusCode** No content is currently available. +- **httpStatusCode** The HTTP status code returned by the CDN. +- **isHeadRequest** The type of HTTP request that was sent to the CDN. Example: HEAD or GET +- **peerType** The type of peer (LAN, Group, Internet, CDN, Cache Host, etc.). +- **requestOffset** The byte offset within the file in the sent request. +- **requestSize** The size of the range requested from the CDN. +- **responseSize** The size of the range response received from the CDN. +- **sessionID** The ID of the download session. + + +### Microsoft.OSG.DU.DeliveryOptClient.JobError + +This event represents a Windows Update job error. It allows for investigation of top errors. + +The following fields are available: + +- **cdnIp** The IP Address of the source CDN (Content Delivery Network). +- **doErrorCode** Error code returned for delivery optimization. +- **errorCode** The error code returned. +- **experimentId** When running a test, this is used to correlate with other events that are part of the same test. +- **fileID** The ID of the file being downloaded. +- **jobID** The Windows Update job ID. + + +## Windows Update events + +### Microsoft.Windows.Update.DeviceUpdateAgent.UpdateAgentAnalysisSummary + +This event collects information regarding the state of devices and drivers on the system following a reboot after the install phase of the new device manifest UUP (Unified Update Platform) update scenario which is used to install a device manifest describing a set of driver packages. + +The following fields are available: + +- **activated** Whether the entire device manifest update is considered activated and in use. +- **analysisErrorCount** The number of driver packages that could not be analyzed because errors occurred during analysis. +- **flightId** Unique ID for each flight. +- **missingDriverCount** The number of driver packages delivered by the device manifest that are missing from the system. +- **missingUpdateCount** The number of updates in the device manifest that are missing from the system. +- **objectId** Unique value for each diagnostics session. +- **publishedCount** The number of drivers packages delivered by the device manifest that are published and available to be used on devices. +- **relatedCV** Correlation vector value generated from the latest USO scan. +- **scenarioId** Indicates the update scenario. +- **sessionId** Unique value for each update session. +- **summary** A summary string that contains basic information about driver packages that are part of the device manifest and any devices on the system that those driver packages match. +- **summaryAppendError** A Boolean indicating if there was an error appending more information to the summary string. +- **truncatedDeviceCount** The number of devices missing from the summary string because there is not enough room in the string. +- **truncatedDriverCount** The number of driver packages missing from the summary string because there is not enough room in the string. +- **unpublishedCount** How many drivers packages that were delivered by the device manifest that are still unpublished and unavailable to be used on devices. +- **updateId** The unique ID for each update. + + +### Microsoft.Windows.Update.DeviceUpdateAgent.UpdateAgentCommit + +This event collects information regarding the final commit phase of the new device manifest UUP (Unified Update Platform) update scenario, which is used to install a device manifest describing a set of driver packages. + +The following fields are available: + +- **errorCode** The error code returned for the current session initialization. +- **flightId** The unique identifier for each flight. +- **objectId** The unique GUID for each diagnostics session. +- **relatedCV** A correlation vector value generated from the latest USO scan. +- **result** Outcome of the initialization of the session. +- **scenarioId** Identifies the Update scenario. +- **sessionId** The unique value for each update session. +- **updateId** The unique identifier for each Update. + + +### Microsoft.Windows.Update.DeviceUpdateAgent.UpdateAgentDownloadRequest + +This event collects information regarding the download request phase of the new device manifest UUP (Unified Update Platform) update scenario, which is used to install a device manifest describing a set of driver packages. + +The following fields are available: + +- **deletedCorruptFiles** Indicates if UpdateAgent found any corrupt payload files and whether the payload was deleted. +- **errorCode** The error code returned for the current session initialization. +- **flightId** The unique identifier for each flight. +- **objectId** Unique value for each Update Agent mode. +- **packageCountOptional** Number of optional packages requested. +- **packageCountRequired** Number of required packages requested. +- **packageCountTotal** Total number of packages needed. +- **packageCountTotalCanonical** Total number of canonical packages. +- **packageCountTotalDiff** Total number of diff packages. +- **packageCountTotalExpress** Total number of express packages. +- **packageSizeCanonical** Size of canonical packages in bytes. +- **packageSizeDiff** Size of diff packages in bytes. +- **packageSizeExpress** Size of express packages in bytes. +- **rangeRequestState** Represents the state of the download range request. +- **relatedCV** Correlation vector value generated from the latest USO scan. +- **result** Result of the download request phase of update. +- **scenarioId** The scenario ID. Example: MobileUpdate, DesktopLanguagePack, DesktopFeatureOnDemand, or DesktopDriverUpdate. +- **sessionId** Unique value for each Update Agent mode attempt. +- **updateId** Unique ID for each update. + + +### Microsoft.Windows.Update.DeviceUpdateAgent.UpdateAgentInitialize + +This event sends data for initializing a new update session for the new device manifest UUP (Unified Update Platform) update scenario, which is used to install a device manifest describing a set of driver packages. + +The following fields are available: + +- **errorCode** The error code returned for the current session initialization. +- **flightId** The unique identifier for each flight. +- **flightMetadata** Contains the FlightId and the build being flighted. +- **objectId** Unique value for each Update Agent mode. +- **relatedCV** Correlation vector value generated from the latest USO scan. +- **result** Result of the initialize phase of the update. 0 = Succeeded, 1 = Failed, 2 = Cancelled, 3 = Blocked, 4 = BlockCancelled. +- **scenarioId** The scenario ID. Example: MobileUpdate, DesktopLanguagePack, DesktopFeatureOnDemand, or DesktopDriverUpdate. +- **sessionData** Contains instructions to update agent for processing FODs and DUICs (Null for other scenarios). +- **sessionId** Unique value for each Update Agent mode attempt. +- **updateId** Unique ID for each update. + + +### Microsoft.Windows.Update.DeviceUpdateAgent.UpdateAgentInstall + +This event collects information regarding the install phase of the new device manifest UUP (Unified Update Platform) update scenario, which is used to install a device manifest describing a set of driver packages. + +The following fields are available: + +- **errorCode** The error code returned for the current install phase. +- **flightId** The unique identifier for each flight (pre-release builds). +- **objectId** The unique identifier for each diagnostics session. +- **relatedCV** Correlation vector value generated from the latest scan. +- **result** Outcome of the install phase of the update. +- **scenarioId** The scenario ID. Example: MobileUpdate, DesktopLanguagePack, DesktopFeatureOnDemand, or DesktopDriverUpdate +- **sessionId** The unique identifier for each update session. +- **updateId** The unique identifier for each Update. + + +### Microsoft.Windows.Update.DeviceUpdateAgent.UpdateAgentModeStart + +This event sends data for the start of each mode during the process of updating device manifest assets via the UUP (Unified Update Platform) update scenario, which is used to install a device manifest describing a set of driver packages. + +The following fields are available: + +- **flightId** The unique identifier for each flight (pre-release builds). +- **mode** Indicates the active Update Agent mode. +- **objectId** Unique value for each diagnostics session. +- **relatedCV** Correlation vector value generated from the latest scan. +- **scenarioId** The scenario ID. Example: MobileUpdate, DesktopLanguagePack, DesktopFeatureOnDemand, or DesktopDriverUpdate. +- **sessionId** The unique identifier for each update session. +- **updateId** The unique identifier for each Update. + + +### Microsoft.Windows.Update.NotificationUx.DialogNotificationToBeDisplayed + +This event indicates that a notification dialog box is about to be displayed to user. + +The following fields are available: + +- **AcceptAutoModeLimit** The maximum number of days for a device to automatically enter Auto Reboot mode. +- **AutoToAutoFailedLimit** The maximum number of days for Auto Reboot mode to fail before the RebootFailed dialog box is shown. +- **DaysSinceRebootRequired** Number of days since restart was required. +- **DeviceLocalTime** The local time on the device sending the event. +- **EngagedModeLimit** The number of days to switch between DTE dialog boxes. +- **EnterAutoModeLimit** The maximum number of days for a device to enter Auto Reboot mode. +- **ETag** OneSettings versioning value. +- **IsForcedEnabled** Indicates whether Forced Reboot mode is enabled for this device. +- **IsUltimateForcedEnabled** Indicates whether Ultimate Forced Reboot mode is enabled for this device. +- **NotificationUxState** Indicates which dialog box is shown. +- **NotificationUxStateString** Indicates which dialog box is shown. +- **RebootUxState** Indicates the state of the restart (Engaged, Auto, Forced, or UltimateForced). +- **RebootUxStateString** Indicates the state of the restart (Engaged, Auto, Forced, or UltimateForced). +- **RebootVersion** Version of DTE. +- **SkipToAutoModeLimit** The minimum length of time to pass in restart pending before a device can be put into auto mode. +- **UpdateId** The ID of the update that is pending restart to finish installation. +- **UpdateRevision** The revision of the update that is pending restart to finish installation. +- **UtcTime** The time the dialog box notification will be displayed, in Coordinated Universal Time. + + +### Microsoft.Windows.Update.NotificationUx.EnhancedEngagedRebootAcceptAutoDialog + +This event indicates that the Enhanced Engaged restart "accept automatically" dialog box was displayed. + +The following fields are available: + +- **DeviceLocalTime** The local time on the device sending the event. +- **ETag** OneSettings versioning value. +- **ExitCode** Indicates how users exited the dialog box. +- **RebootVersion** Version of DTE. +- **UpdateId** The ID of the update that is pending restart to finish installation. +- **UpdateRevision** The revision of the update that is pending restart to finish installation. +- **UserResponseString** The option that user chose on this dialog box. +- **UtcTime** The time that the dialog box was displayed, in Coordinated Universal Time. + + +### Microsoft.Windows.Update.NotificationUx.EnhancedEngagedRebootFirstReminderDialog + +This event indicates that the Enhanced Engaged restart "first reminder" dialog box was displayed.. + +The following fields are available: + +- **DeviceLocalTime** The local time on the device sending the event. +- **ETag** OneSettings versioning value. +- **ExitCode** Indicates how users exited the dialog box. +- **RebootVersion** Version of DTE. +- **UpdateId** The ID of the update that is pending restart to finish installation. +- **UpdateRevision** The revision of the update that is pending restart to finish installation. +- **UserResponseString** The option that user chose in this dialog box. +- **UtcTime** The time that the dialog box was displayed, in Coordinated Universal Time. + + +### Microsoft.Windows.Update.NotificationUx.EnhancedEngagedRebootRebootFailedDialog + +This event indicates that the Enhanced Engaged restart "restart failed" dialog box was displayed. + +The following fields are available: + +- **DeviceLocalTime** The local time of the device sending the event. +- **ETag** OneSettings versioning value. +- **ExitCode** Indicates how users exited the dialog box. +- **RebootVersion** Version of DTE. +- **UpdateId** The ID of the update that is pending restart to finish installation. +- **UpdateRevision** The revision of the update that is pending restart to finish installation. +- **UserResponseString** The option that the user chose in this dialog box. +- **UtcTime** The time that the dialog box was displayed, in Coordinated Universal Time. + + +### Microsoft.Windows.Update.NotificationUx.EnhancedEngagedRebootRebootImminentDialog + +This event indicates that the Enhanced Engaged restart "restart imminent" dialog box was displayed. + +The following fields are available: + +- **DeviceLocalTime** Time the dialog box was shown on the local device. +- **ETag** OneSettings versioning value. +- **ExitCode** Indicates how users exited the dialog box. +- **RebootVersion** Version of DTE. +- **UpdateId** The ID of the update that is pending restart to finish installation. +- **UpdateRevision** The revision of the update that is pending restart to finish installation. +- **UserResponseString** The option that user chose in this dialog box. +- **UtcTime** The time that dialog box was displayed, in Coordinated Universal Time. + + +### Microsoft.Windows.Update.NotificationUx.EnhancedEngagedRebootReminderDialog + +This event returns information relating to the Enhanced Engaged reboot reminder dialog that was displayed. + +The following fields are available: + +- **DeviceLocalTime** The time at which the reboot reminder dialog was shown (based on the local device time settings). +- **ETag** The OneSettings versioning value. +- **ExitCode** Indicates how users exited the reboot reminder dialog box. +- **RebootVersion** The version of the DTE (Direct-to-Engaged). +- **UpdateId** The ID of the update that is waiting for reboot to finish installation. +- **UpdateRevision** The revision of the update that is waiting for reboot to finish installation. +- **UserResponseString** The option chosen by the user on the reboot dialog box. +- **UtcTime** The time at which the reboot reminder dialog was shown (in UTC). + + +### Microsoft.Windows.Update.NotificationUx.EnhancedEngagedRebootReminderToast + +This event indicates that the Enhanced Engaged restart reminder pop-up banner was displayed. + +The following fields are available: + +- **DeviceLocalTime** The local time on the device sending the event. +- **ETag** OneSettings versioning value. +- **ExitCode** Indicates how users exited the pop-up banner. +- **RebootVersion** The version of the reboot logic. +- **UpdateId** The ID of the update that is pending restart to finish installation. +- **UpdateRevision** The revision of the update that is pending restart to finish installation. +- **UserResponseString** The option that the user chose in the pop-up banner. +- **UtcTime** The time that the pop-up banner was displayed, in Coordinated Universal Time. + + +### Microsoft.Windows.Update.NotificationUx.RebootScheduled + +Indicates when a reboot is scheduled by the system or a user for a security, quality, or feature update. + +The following fields are available: + +- **activeHoursApplicable** Indicates whether an Active Hours policy is present on the device. +- **IsEnhancedEngagedReboot** Indicates whether this is an Enhanced Engaged reboot. +- **rebootArgument** Argument for the reboot task. It also represents specific reboot related action. +- **rebootOutsideOfActiveHours** Indicates whether a restart is scheduled outside of active hours. +- **rebootScheduledByUser** Indicates whether the restart was scheduled by user (if not, it was scheduled automatically). +- **rebootState** The current state of the restart. +- **rebootUsingSmartScheduler** Indicates whether the reboot is scheduled by smart scheduler. +- **revisionNumber** Revision number of the update that is getting installed with this restart. +- **scheduledRebootTime** Time of the scheduled restart. +- **scheduledRebootTimeInUTC** Time of the scheduled restart in Coordinated Universal Time. +- **updateId** ID of the update that is getting installed with this restart. +- **wuDeviceid** Unique device ID used by Windows Update. + + +### Microsoft.Windows.Update.Orchestrator.ActivityRestrictedByActiveHoursPolicy + +This event indicates a policy is present that may restrict update activity to outside of active hours. + +The following fields are available: + +- **activeHoursEnd** The end of the active hours window. +- **activeHoursStart** The start of the active hours window. +- **wuDeviceid** Unique device ID used by Windows Update. + + +### Microsoft.Windows.Update.Orchestrator.BlockedByActiveHours + +This event indicates that update activity was blocked because it is within the active hours window. + +The following fields are available: + +- **activeHoursEnd** The end of the active hours window. +- **activeHoursStart** The start of the active hours window. +- **updatePhase** The current state of the update process. +- **wuDeviceid** Unique device ID used by Windows Update. + + +### Microsoft.Windows.Update.Orchestrator.BlockedByBatteryLevel + +This event indicates that Windows Update activity was blocked due to low battery level. + +The following fields are available: + +- **batteryLevel** The current battery charge capacity. +- **batteryLevelThreshold** The battery capacity threshold to stop update activity. +- **updatePhase** The current state of the update process. +- **wuDeviceid** Device ID. + + +### Microsoft.Windows.Update.Orchestrator.DeferRestart + +This event indicates that a restart required for installing updates was postponed. + +The following fields are available: + +- **displayNeededReason** List of reasons for needing display. +- **eventScenario** Indicates the purpose of the event (scan started, succeeded, failed, etc.). +- **filteredDeferReason** Applicable filtered reasons why reboot was postponed (such as user active, or low battery). +- **gameModeReason** Name of the executable that caused the game mode state check to start. +- **ignoredReason** List of reasons that were intentionally ignored. +- **IgnoreReasonsForRestart** List of reasons why restart was deferred. +- **revisionNumber** Update ID revision number. +- **systemNeededReason** List of reasons why system is needed. +- **updateId** Update ID. +- **updateScenarioType** Update session type. +- **wuDeviceid** Unique device ID used by Windows Update. + + +### Microsoft.Windows.Update.Orchestrator.Detection + +This event indicates that a scan for a Windows Update occurred. + +The following fields are available: + +- **deferReason** The reason why the device could not check for updates. +- **detectionBlockingPolicy** The Policy that blocked detection. +- **detectionBlockreason** The reason detection did not complete. +- **detectionRetryMode** Indicates whether we will try to scan again. +- **errorCode** The error code returned for the current process. +- **eventScenario** End-to-end update session ID, or indicates the purpose of sending this event - whether because the software distribution just started installing content, or whether it was cancelled, succeeded, or failed. +- **flightID** The unique identifier for the flight (Windows Insider pre-release build) should be delivered to the device, if applicable. +- **interactive** Indicates whether the user initiated the session. +- **networkStatus** Indicates if the device is connected to the internet. +- **revisionNumber** The Update revision number. +- **scanTriggerSource** The source of the triggered scan. +- **updateId** The unique identifier of the Update. +- **updateScenarioType** Identifies the type of update session being performed. +- **wuDeviceid** The unique device ID used by Windows Update. + + +### Microsoft.Windows.Update.Orchestrator.DisplayNeeded + +This event indicates the reboot was postponed due to needing a display. + +The following fields are available: + +- **displayNeededReason** Reason the display is needed. +- **eventScenario** Indicates the purpose of sending this event - whether because the software distribution just started checking for content, or whether it was cancelled, succeeded, or failed. +- **rebootOutsideOfActiveHours** Indicates whether the reboot was to occur outside of active hours. +- **revisionNumber** Revision number of the update. +- **updateId** Update ID. +- **updateScenarioType** The update session type. +- **uxRebootstate** Indicates the exact state of the user experience at the time the required reboot was initiated. +- **wuDeviceid** The unique identifier of a specific device, used to identify how many devices are encountering success or a particular issue + + +### Microsoft.Windows.Update.Orchestrator.Download + +This event sends launch data for a Windows Update download to help keep Windows up to date. + +The following fields are available: + +- **deferReason** Reason for download not completing. +- **e:4|SScenario** No content is currently available. +- **errorCode** An error code represented as a hexadecimal value. +- **eventScenario** End-to-end update session ID. +- **flightID** The specific ID of the Windows Insider build the device is getting. +- **interactive** Indicates whether the session is user initiated. +- **interactiveelatedCVerrorCode** No content is currently available. +- **revisionNumber** Update revision number. +- **updateId** Update ID. +- **updateScenariotate** No content is currently available. +- **updateScenarioType** The update session type. +- **wuDeviceid** Unique device ID used by Windows Update. + + +### Microsoft.Windows.Update.Orchestrator.DTUCompletedWhenWuFlightPendingCommit + +This event indicates that DTU completed installation of the electronic software delivery (ESD), when Windows Update was already in Pending Commit phase of the feature update. + +The following fields are available: + +- **wuDeviceid** Device ID used by Windows Update. + + +### Microsoft.Windows.Update.Orchestrator.DTUEnabled + +This event indicates that Inbox DTU functionality was enabled. + +The following fields are available: + +- **wuDeviceid** Device ID used by Windows Update. + + +### Microsoft.Windows.Update.Orchestrator.DTUInitiated + +This event indicates that Inbox DTU functionality was intiated. + +The following fields are available: + +- **dtuErrorCode** Return code from creating the DTU Com Server. +- **isDtuApplicable** Determination of whether DTU is applicable to the machine it is running on. +- **wuDeviceid** Device ID used by Windows Update. + + +### Microsoft.Windows.Update.Orchestrator.EscalationRiskLevels + +This event is sent during update scan, download, or install, and indicates that the device is at risk of being out-of-date. + +The following fields are available: + +- **configVersion** The escalation configuration version on the device. +- **downloadElapsedTime** Indicates how long since the download is required on device. +- **downloadRiskLevel** At-risk level of download phase. +- **installElapsedTime** Indicates how long since the install is required on device. +- **installRiskLevel** The at-risk level of install phase. +- **isSediment** Assessment of whether is device is at risk. +- **scanElapsedTime** Indicates how long since the scan is required on device. +- **scanRiskLevel** At-risk level of the scan phase. +- **wuDeviceid** Device ID used by Windows Update. + + +### Microsoft.Windows.Update.Orchestrator.FailedToAddTimeTriggerToScanTask + +This event indicated that USO failed to add a trigger time to a task. + +The following fields are available: + +- **errorCode** The Windows Update error code. +- **wuDeviceid** The Windows Update device ID. + + +### Microsoft.Windows.Update.Orchestrator.FlightInapplicable + +This event indicates that the update is no longer applicable to this device. + +The following fields are available: + +- **EventPublishedTime** Time when this event was generated. +- **flightID** The specific ID of the Windows Insider build. +- **inapplicableReason** The reason why the update is inapplicable. +- **revisionNumber** Update revision number. +- **updateId** Unique Windows Update ID. +- **updateScenarioType** Update session type. +- **UpdateStatus** Last status of update. +- **UUPFallBackConfigured** Indicates whether UUP fallback is configured. +- **wuDeviceid** Unique Device ID. + + +### Microsoft.Windows.Update.Orchestrator.InitiatingReboot + +This event sends data about an Orchestrator requesting a reboot from power management to help keep Windows up to date. + +The following fields are available: + +- **EventPublishedTime** Time of the event. +- **flightID** Unique update ID +- **interactive** Indicates whether the reboot initiation stage of the update process was entered as a result of user action. +- **rebootOutsideOfActiveHours** Indicates whether the reboot was to occur outside of active hours. +- **revisionNumber** Revision number of the update. +- **updateId** Update ID. +- **updateScenarioType** The update session type. +- **uxRebootstate** Indicates the exact state of the user experience at the time the required reboot was initiated. +- **wuDeviceid** Unique device ID used by Windows Update. + + +### Microsoft.Windows.Update.Orchestrator.Install + +This event sends launch data for a Windows Update install to help keep Windows up to date. + +The following fields are available: + +- **batteryLevel** Current battery capacity in mWh or percentage left. +- **defeec-9-0S** No content is currently available. +- **deferReason** Reason for install not completing. +- **errorCode** The error code reppresented by a hexadecimal value. +- **eventScenario** End-to-end update session ID. +- **flightID** The ID of the Windows Insider build the device is getting. +- **flightUpdate** Indicates whether the update is a Windows Insider build. +- **ForcedRebootReminderSet** A boolean value that indicates if a forced reboot will happen for updates. +- **Ignorec-9-0SsFoec-start** No content is currently available. +- **IgnoreReasonsForRestart** The reason(s) a Postpone Restart command was ignored. +- **installCommitfailedtime** The time it took for a reboot to happen but the upgrade failed to progress. +- **installRebootinitiatetime** The time it took for a reboot to be attempted. +- **interactive** Identifies if session is user initiated. +- **minutesToCommit** The time it took to install updates. +- **rebootOutsideOfActiveHours** Indicates whether a reboot is scheduled outside of active hours. +- **revisionNumber** Update revision number. +- **updateId** Update ID. +- **updateMd** No content is currently available. +- **updateScenarioType** The update session type. +- **uxRebootstate** Indicates the exact state of the user experience at the time the required reboot was initiated to ensure the correct update process and experience is provided to keep Windows up to date. +- **wuDeviceid** Unique device ID used by Windows Update. + + +### Microsoft.Windows.Update.Orchestrator.LowUptimes + +This event is sent if a device is identified as not having sufficient uptime to reliably process updates in order to keep secure. + +The following fields are available: + +- **availableHistoryMinutes** The number of minutes available from the local machine activity history. +- **isLowUptimeMachine** Is the machine considered low uptime or not. +- **lowUptimeMinHours** Current setting for the minimum number of hours needed to not be considered low uptime. +- **lowUptimeQueryDays** Current setting for the number of recent days to check for uptime. +- **uptimeMinutes** Number of minutes of uptime measured. +- **wuDeviceid** Unique device ID for Windows Update. + + +### Microsoft.Windows.Update.Orchestrator.OneshotUpdateDetection + +This event returns data about scans initiated through settings UI, or background scans that are urgent; to help keep Windows up to date. + +The following fields are available: + +- **externalOneshotupdate** The last time a task-triggered scan was completed. +- **interactiveOneshotupdate** The last time an interactive scan was completed. +- **oldlastscanOneshotupdate** The last time a scan completed successfully. +- **wuDeviceid** The Windows Update Device GUID (Globally-Unique ID). + + +### Microsoft.Windows.Update.Orchestrator.PreShutdownStart + +This event is generated before the shutdown and commit operations. + +The following fields are available: + +- **wuDeviceid** The unique identifier of a specific device, used to identify how many devices are encountering success or a particular issue. + + +### Microsoft.Windows.Update.Orchestrator.RebootFailed + +This event sends information about whether an update required a reboot and reasons for failure, to help keep Windows up to date. + +The following fields are available: + +- **batteryLevel** Current battery capacity in mWh or percentage left. +- **deferReason** Reason for install not completing. +- **EventPublishedTime** The time that the reboot failure occurred. +- **flightID** Unique update ID. +- **rebootOutsideOfActiveHours** Indicates whether a reboot was scheduled outside of active hours. +- **RebootResults** Hex code indicating failure reason. Typically, we expect this to be a specific USO generated hex code. +- **revisionNumber** Update revision number. +- **updateId** Update ID. +- **updateScenarioType** The update session type. +- **uxRebootstate** Indicates the exact state of the user experience at the time the required reboot was initiated to ensure the correct update process and experience is provided to keep Windows up to date. +- **wuDeviceid** Unique device ID used by Windows Update. + + +### Microsoft.Windows.Update.Orchestrator.RefreshSettings + +This event sends basic data about the version of upgrade settings applied to the system to help keep Windows up to date. + +The following fields are available: + +- **errorCode** Hex code for the error message, to allow lookup of the specific error. +- **settingsDownloadTime** Timestamp of the last attempt to acquire settings. +- **settingsETag** Version identifier for the settings. +- **wuDeviceid** Unique device ID used by Windows Update. + + +### Microsoft.Windows.Update.Orchestrator.RestoreRebootTask + +This event sends data indicating that a reboot task is missing unexpectedly on a device and the task is restored because a reboot is still required, to help keep Windows up to date. + +The following fields are available: + +- **RebootTaskMissedTimeUTC** The time when the reboot task was scheduled to run, but did not. +- **RebootTaskNextTimeUTC** The time when the reboot task was rescheduled for. +- **RebootTaskRestoredTime** Time at which this reboot task was restored. +- **wuDeviceid** Device ID for the device on which the reboot is restored. + + +### Microsoft.Windows.Update.Orchestrator.ScanTriggered + +This event indicates that Update Orchestrator has started a scan operation. + +The following fields are available: + +- **errorCode** The error code returned for the current scan operation. +- **eventScenario** Indicates the purpose of sending this event. +- **interactive** Indicates whether the scan is interactive. +- **isDTUEnabled** Indicates whether DTU (internal abbreviation for Direct Feature Update) channel is enabled on the client system. +- **isScanPastSla** Indicates whether the SLA has elapsed for scanning. +- **isScanPastTriggerSla** Indicates whether the SLA has elapsed for triggering a scan. +- **minutesOverScanSla** Indicates how many minutes the scan exceeded the scan SLA. +- **minutesOverScanTriggerSla** Indicates how many minutes the scan exceeded the scan trigger SLA. +- **scanTriggerSource** Indicates what caused the scan. +- **updateScenarioType** The update session type. +- **wuDeviceid** Unique device ID used by Windows Update. + + +### Microsoft.Windows.Update.Orchestrator.StickUpdate + +This event is sent when the update service orchestrator (USO) indicates the update cannot be superseded by a newer update. + +The following fields are available: + +- **updateAd** No content is currently available. +- **updateId** Identifier associated with the specific piece of content. +- **wuDeviceid** Unique device ID controlled by the software distribution client. + + +### Microsoft.Windows.Update.Orchestrator.SystemNeeded + +This event sends data about why a device is unable to reboot, to help keep Windows up to date. + +The following fields are available: + +- **eventScenario** End-to-end update session ID. +- **rebootOutsideOfActiveHours** Indicates whether a reboot is scheduled outside of active hours. +- **revisionNumber** Update revision number. +- **systemNeededReason** List of apps or tasks that are preventing the system from restarting. +- **updateId** Update ID. +- **updateScenarioType** The update session type. +- **uxRebootstate** Indicates the exact state of the user experience at the time the required reboot was initiated to ensure the correct update process and experience is provided to keep Windows up to date. +- **wuDeviceid** Unique device ID used by Windows Update. + + +### Microsoft.Windows.Update.Orchestrator.TerminatedByActiveHours + +This event indicates that update activity was stopped due to active hours starting. + +The following fields are available: + +- **activeHoursEnd** The end of the active hours window. +- **activeHoursStart** The start of the active hours window. +- **updatePhase** The current state of the update process. +- **wuDeviceid** The device identifier. + + +### Microsoft.Windows.Update.Orchestrator.TerminatedByBatteryLevel + +This event is sent when update activity was stopped due to a low battery level. + +The following fields are available: + +- **batteryLevel** The current battery charge capacity. +- **batteryLevelThreshold** The battery capacity threshold to stop update activity. +- **updatePhase** The current state of the update process. +- **wuDeviceid** The device identifier. + + +### Microsoft.Windows.Update.Orchestrator.UnstickUpdate + +This event is sent when the update service orchestrator (USO) indicates that the update can be superseded by a newer update. + +The following fields are available: + +- **updateId** Identifier associated with the specific piece of content. +- **wuDeviceid** Unique device ID controlled by the software distribution client. + + +### Microsoft.Windows.Update.Orchestrator.UpdatePolicyCacheRefresh + +This event sends data on whether Update Management Policies were enabled on a device, to help keep Windows up to date. + +The following fields are available: + +- **configuredPoliciescount** Number of policies on the device. +- **policiesNamevaluesource** Policy name and source of policy (group policy, MDM or flight). +- **policyCacherefreshtime** Time when policy cache was refreshed. +- **updateInstalluxsetting** Indicates whether a user has set policies via a user experience option. +- **wuDeviceid** Unique device ID used by Windows Update. + + +### Microsoft.Windows.Update.Orchestrator.UpdateRebootRequired + +This event sends data about whether an update required a reboot to help keep Windows up to date. + +The following fields are available: + +- **flightID** The specific ID of the Windows Insider build the device is getting. +- **interactive** Indicates whether the reboot initiation stage of the update process was entered as a result of user action. +- **revisionNumber** Update revision number. +- **updateId** Update ID. +- **updateScenarioType** The update session type. +- **uxRebootstate** Indicates the exact state of the user experience at the time the required reboot was initiated to ensure the correct update process and experience is provided to keep Windows up to date. +- **wuDeviceid** Unique device ID used by Windows Update. + + +### Microsoft.Windows.Update.Orchestrator.updateSettingsFlushFailed + +This event sends information about an update that encountered problems and was not able to complete. + +The following fields are available: + +- **errorCode** The error code encountered. +- **wuDeviceid** The ID of the device in which the error occurred. + + +### Microsoft.Windows.Update.Orchestrator.UsoSession + +This event represents the state of the USO service at start and completion. + +The following fields are available: + +- **activeSessionid** A unique session GUID. +- **eventScenario** The state of the update action. +- **interactive** Is the USO session interactive? +- **lastErrorcode** The last error that was encountered. +- **lastErrorstate** The state of the update when the last error was encountered. +- **sessionType** A GUID that refers to the update session type. +- **updateScenarioType** A descriptive update session type. +- **wuDeviceid** The Windows Update device GUID. + + +### Microsoft.Windows.Update.Ux.MusNotification.EnhancedEngagedRebootUxState + +This event sends information about the configuration of Enhanced Direct-to-Engaged (eDTE), which includes values for the timing of how eDTE will progress through each phase of the reboot. + +The following fields are available: + +- **AcceptAutoModeLimit** The maximum number of days for a device to automatically enter Auto Reboot mode. +- **AutoToAutoFailedLimit** The maximum number of days for Auto Reboot mode to fail before a Reboot Failed dialog will be shown. +- **DeviceLocalTime** The date and time (based on the device date/time settings) the reboot mode changed. +- **EngagedModeLimit** The number of days to switch between DTE (Direct-to-Engaged) dialogs. +- **EnterAutoModeLimit** The maximum number of days a device can enter Auto Reboot mode. +- **ETag** The Entity Tag that represents the OneSettings version. +- **IsForcedEnabled** Identifies whether Forced Reboot mode is enabled for the device. +- **IsUltimateForcedEnabled** Identifies whether Ultimate Forced Reboot mode is enabled for the device. +- **OldestUpdateLocalTime** The date and time (based on the device date/time settings) this update’s reboot began pending. +- **RebootUxState** Identifies the reboot state: Engaged, Auto, Forced, UltimateForced. +- **RebootVersion** The version of the DTE (Direct-to-Engaged). +- **SkipToAutoModeLimit** The maximum number of days to switch to start while in Auto Reboot mode. +- **UpdateId** The ID of the update that is waiting for reboot to finish installation. +- **UpdateRevision** The revision of the update that is waiting for reboot to finish installation. + + +### Microsoft.Windows.Update.Ux.MusNotification.RebootNoLongerNeeded + +This event is sent when a security update has successfully completed. + +The following fields are available: + +- **UtcTime** The Coordinated Universal Time that the restart was no longer needed. + + +### Microsoft.Windows.Update.Ux.MusNotification.RebootScheduled + +This event sends basic information about scheduling an update-related reboot, to get security updates and to help keep Windows up-to-date. + +The following fields are available: + +- **activeHoursApplicable** Indicates whether Active Hours applies on this device. +- **IsEnhancedEngagedReboot** Indicates whether Enhanced reboot was enabled. +- **rebootArgument** Argument for the reboot task. It also represents specific reboot related action. +- **rebootOutsideOfActiveHours** True, if a reboot is scheduled outside of active hours. False, otherwise. +- **rebootScheduledByUser** True, if a reboot is scheduled by user. False, if a reboot is scheduled automatically. +- **rebootState** Current state of the reboot. +- **rebootUsingSmartScheduler** Indicates that the reboot is scheduled by SmartScheduler. +- **revisionNumber** Revision number of the OS. +- **scheduledRebootTime** Time scheduled for the reboot. +- **scheduledRebootTimeInUTC** Time scheduled for the reboot, in UTC. +- **updateId** Identifies which update is being scheduled. +- **wuDeviceid** The unique device ID used by Windows Update. + + +### Microsoft.Windows.Update.Ux.MusNotification.UxBrokerScheduledTask + +This event is sent when MUSE broker schedules a task. + +The following fields are available: + +- **TaskArgument** The arguments with which the task is scheduled. +- **TaskName** Name of the task. + + +### Microsoft.Windows.Update.Ux.MusUpdateSettings.RebootScheduled + +This event sends basic information for scheduling a device restart to install security updates. It's used to help keep Windows up to date. + +The following fields are available: + +- **activeHoursApplicable** Is the restart respecting Active Hours? +- **IsEnhancedEngagedReboot** TRUE if the reboot path is Enhanced Engaged. Otherwise, FALSE. +- **rebootArgument** The arguments that are passed to the OS for the restarted. +- **rebootOutsideOfActiveHours** Was the restart scheduled outside of Active Hours? +- **rebootScheduledByUser** Was the restart scheduled by the user? If the value is false, the restart was scheduled by the device. +- **rebootState** The state of the restart. +- **rebootUsingSmartScheduler** TRUE if the reboot should be performed by the Smart Scheduler. Otherwise, FALSE. +- **revisionNumber** The revision number of the OS being updated. +- **scheduledRebootTime** Time of the scheduled reboot +- **scheduledRebootTimeInUTC** Time of the scheduled restart, in Coordinated Universal Time. +- **updateId** The Windows Update device GUID. +- **wuDeviceid** The Windows Update device GUID. + + +## Windows Update mitigation events + +### Mitigation360Telemetry.MitigationCustom.CleanupSafeOsImages + +This event sends data specific to the CleanupSafeOsImages mitigation used for OS Updates. + +The following fields are available: + +- **ClientId** The client ID used by Windows Update. +- **FlightId** The ID of each Windows Insider build the device received. +- **InstanceId** A unique device ID that identifies each update instance. +- **MitigationScenario** The update scenario in which the mitigation was executed. +- **MountedImageCount** The number of mounted images. +- **MountedImageMatches** The number of mounted image matches. +- **MountedImagesFailed** The number of mounted images that could not be removed. +- **MountedImagesRemoved** The number of mounted images that were successfully removed. +- **MountedImagesSkipped** The number of mounted images that were not found. +- **RelatedCV** The correlation vector value generated from the latest USO scan. +- **Result** HResult of this operation. +- **ScenarioId** ID indicating the mitigation scenario. +- **ScenarioSupported** Indicates whether the scenario was supported. +- **SessionId** Unique value for each update attempt. +- **UpdateId** Unique ID for each Windows Update. +- **WuId** Unique ID for the Windows Update client. + + +### Mitigation360Telemetry.MitigationCustom.FixAppXReparsePoints + +This event sends data specific to the FixAppXReparsePoints mitigation used for OS updates. + +The following fields are available: + +- **ClientId** Unique identifier for each flight. +- **FlightId** Unique GUID that identifies each instances of setuphost.exe. +- **InstanceId** The update scenario in which the mitigation was executed. +- **MitigationScenario** Correlation vector value generated from the latest USO scan. +- **RelatedCV** Number of reparse points that are corrupted but we failed to fix them. +- **ReparsePointsFailed** Number of reparse points that were corrupted and were fixed by this mitigation. +- **ReparsePointsFixed** Number of reparse points that are not corrupted and no action is required. +- **ReparsePointsSkipped** HResult of this operation. +- **Result** ID indicating the mitigation scenario. +- **ScenarioId** Indicates whether the scenario was supported. +- **ScenarioSupported** Unique value for each update attempt. +- **SessionId** Unique ID for each Update. +- **UpdateId** Unique ID for the Windows Update client. +- **WuId** Unique ID for the Windows Update client. + + +### Mitigation360Telemetry.MitigationCustom.FixupEditionId + +This event sends data specific to the FixupEditionId mitigation used for OS updates. + +The following fields are available: + +- **ClientId** In the WU scenario, this will be the WU client ID that is passed to Setup. In Media setup, default value is Media360, but can be overwritten by the caller to a unique value. +- **EditionIdUpdated** Determine whether EditionId was changed. +- **FlightId** Unique identifier for each flight. +- **InstanceId** Unique GUID that identifies each instances of setuphost.exe. +- **MitigationScenario** The update scenario in which the mitigation was executed. +- **ProductEditionId** Expected EditionId value based on GetProductInfo. +- **ProductType** Value returned by GetProductInfo. +- **RegistryEditionId** EditionId value in the registry. +- **RelatedCV** Correlation vector value generated from the latest USO scan. +- **Result** HResult of this operation. +- **ScenarioId** ID indicating the mitigation scenario. +- **ScenarioSupported** Indicates whether the scenario was supported. +- **SessionId** Unique value for each update attempt. +- **UpdateId** Unique ID for each update. +- **WuId** Unique ID for the Windows Update client. + + +## Windows Update Reserve Manager events + +### Microsoft.Windows.UpdateReserveManager.CommitPendingHardReserveAdjustment + +This event is sent when the Update Reserve Manager commits a hard reserve adjustment that was pending. + +The following fields are available: + +- **FinalAdjustment** Final adjustment for the hard reserve following the addition or removal of optional content. +- **InitialAdjustment** Initial intended adjustment for the hard reserve following the addition/removal of optional content. + + +### Microsoft.Windows.UpdateReserveManager.FunctionReturnedError + +This event is sent when the Update Reserve Manager returns an error from one of its internal functions. + +The following fields are available: + +- **FailedExpression** The failed expression that was returned. +- **FailedFile** The binary file that contained the failed function. +- **FailedFunction** The name of the function that originated the failure. +- **FailedLine** The line number of the failure. +- **ReturnCode** The return code of the function. + + +### Microsoft.Windows.UpdateReserveManager.InitializeUpdateReserveManager + +This event returns data about the Update Reserve Manager, including whether it’s been initialized. + +The following fields are available: + +- **ClientId** The ID of the caller application. +- **Flags** The enumerated flags used to initialize the manager. +- **FlightId** The flight ID of the content the calling client is currently operating with. +- **Offline** Indicates whether or the reserve manager is called during offline operations. +- **PolicyPassed** Indicates whether the machine is able to use reserves. +- **ReturnCode** Return code of the operation. +- **Version** The version of the Update Reserve Manager. + + +### Microsoft.Windows.UpdateReserveManager.PrepareTIForReserveInitialization + +This event is sent when the Update Reserve Manager prepares the Trusted Installer to initialize reserves on the next boot. + +The following fields are available: + +- **Flags** The flags that are passed to the function to prepare the Trusted Installer for reserve initialization. + + +### Microsoft.Windows.UpdateReserveManager.RemovePendingHardReserveAdjustment + +This event is sent when the Update Reserve Manager removes a pending hard reserve adjustment. + + + +### Microsoft.Windows.UpdateReserveManager.UpdatePendingHardReserveAdjustment + +This event is sent when the Update Reserve Manager needs to adjust the size of the hard reserve after the option content is installed. + +The following fields are available: + +- **ChangeSize** The change in the hard reserve size based on the addition or removal of optional content. +- **Disposition** The parameter for the hard reserve adjustment function. +- **Flags** The flags passed to the hard reserve adjustment function. +- **PendingHardReserveAdjustment** The final change to the hard reserve size. +- **UpdateType** Indicates whether the change is an increase or decrease in the size of the hard reserve. + + +## Winlogon events + +### Microsoft.Windows.Security.Winlogon.SetupCompleteLogon + +This event signals the completion of the setup process. It happens only once during the first logon. + + + +## XBOX events + +### Microsoft.Xbox.XamTelemetry.AppActivationError + +This event indicates whether the system detected an activation error in the app. + +The following fields are available: + +- **ActivationUri** Activation URI (Uniform Resource Identifier) used in the attempt to activate the app. +- **AppId** The Xbox LIVE Title ID. +- **AppUserModelId** The AUMID (Application User Model ID) of the app to activate. +- **Result** The HResult error. +- **UserId** The Xbox LIVE User ID (XUID). + + +### Microsoft.Xbox.XamTelemetry.AppActivity + +This event is triggered whenever the current app state is changed by: launch, switch, terminate, snap, etc. + +The following fields are available: + +- **AppActionId** The ID of the application action. +- **AppCurrentVisibilityState** The ID of the current application visibility state. +- **AppId** The Xbox LIVE Title ID of the app. +- **AppPackageFullName** The full name of the application package. +- **AppPreviousVisibilityState** The ID of the previous application visibility state. +- **AppSessionId** The application session ID. +- **AppType** The type ID of the application (AppType_NotKnown, AppType_Era, AppType_Sra, AppType_Uwa). +- **BCACode** The BCA (Burst Cutting Area) mark code of the optical disc used to launch the application. +- **DurationMs** The amount of time (in milliseconds) since the last application state transition. +- **IsTrialLicense** This boolean value is TRUE if the application is on a trial license. +- **LicenseType** The type of licensed used to authorize the app (0 - Unknown, 1 - User, 2 - Subscription, 3 - Offline, 4 - Disc). +- **LicenseXuid** If the license type is 1 (User), this field contains the XUID (Xbox User ID) of the registered owner of the license. +- **ProductGuid** The Xbox product GUID (Globally-Unique ID) of the application. +- **UserId** The XUID (Xbox User ID) of the current user. + + + From 172404220c94a5c293ac9af9aa253f8e7dea7d5e Mon Sep 17 00:00:00 2001 From: Jeanie Decker Date: Wed, 13 Mar 2019 07:20:22 -0700 Subject: [PATCH 058/724] add link to customize-oobe --- windows/configuration/wcd/wcd-oobe.md | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/windows/configuration/wcd/wcd-oobe.md b/windows/configuration/wcd/wcd-oobe.md index b6ca14a3ca..ddb01d2e29 100644 --- a/windows/configuration/wcd/wcd-oobe.md +++ b/windows/configuration/wcd/wcd-oobe.md @@ -13,7 +13,7 @@ ms.date: 09/06/2017 # OOBE (Windows Configuration Designer reference) -Use to configure settings for the Out Of Box Experience (OOBE). +Use to configure settings for the [Out Of Box Experience (OOBE)](https://docs.microsoft.com/windows-hardware/customize/desktop/customize-oobe). ## Applies to From eff5194528d223fb57c241491751021f252970a1 Mon Sep 17 00:00:00 2001 From: Jeanie Decker Date: Wed, 13 Mar 2019 07:23:55 -0700 Subject: [PATCH 059/724] oobe all editions --- windows/configuration/wcd/wcd-oobe.md | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/windows/configuration/wcd/wcd-oobe.md b/windows/configuration/wcd/wcd-oobe.md index ddb01d2e29..5e91bed7c9 100644 --- a/windows/configuration/wcd/wcd-oobe.md +++ b/windows/configuration/wcd/wcd-oobe.md @@ -29,7 +29,7 @@ Use to configure settings for the [Out Of Box Experience (OOBE)](https://docs.mi ## EnableCortanaVoice -Use this setting to control whether Cortana voice-over is enabled during OOBE. The voice-over is disabled by default on Windows 10 Pro, Education, and Enterprise. The voice-over is enabled by default on Windows 10 Home. Select **True** to enable voice-over during OOBE. +Use this setting to control whether Cortana voice-over is enabled during OOBE. The voice-over is disabled by default on Windows 10 Pro, Education, and Enterprise. The voice-over is enabled by default on Windows 10 Home. Select **True** to enable voice-over during OOBE on all Windows 10 editions. ## HideOobe for desktop From 26e3f090475c4bb697652667b7652a88b64ae185 Mon Sep 17 00:00:00 2001 From: Jeanie Decker Date: Wed, 13 Mar 2019 07:36:36 -0700 Subject: [PATCH 060/724] storage3d --- windows/configuration/TOC.md | 1 + windows/configuration/wcd/wcd-changes.md | 1 + .../wcd/wcd-storaged3inmodernstandby.md | 25 +++++++++++++++++++ windows/configuration/wcd/wcd.md | 1 + 4 files changed, 28 insertions(+) create mode 100644 windows/configuration/wcd/wcd-storaged3inmodernstandby.md diff --git a/windows/configuration/TOC.md b/windows/configuration/TOC.md index b0edfde74e..c0ad05a8bd 100644 --- a/windows/configuration/TOC.md +++ b/windows/configuration/TOC.md @@ -112,6 +112,7 @@ #### [Start](wcd/wcd-start.md) #### [StartupApp](wcd/wcd-startupapp.md) #### [StartupBackgroundTasks](wcd/wcd-startupbackgroundtasks.md) +#### [StorageD3InModernStandby](wcd/wcd-storaged3inmodernstandby.md) #### [SurfaceHubManagement](wcd/wcd-surfacehubmanagement.md) #### [TabletMode](wcd/wcd-tabletmode.md) #### [TakeATest](wcd/wcd-takeatest.md) diff --git a/windows/configuration/wcd/wcd-changes.md b/windows/configuration/wcd/wcd-changes.md index 909614945c..962549f74e 100644 --- a/windows/configuration/wcd/wcd-changes.md +++ b/windows/configuration/wcd/wcd-changes.md @@ -20,6 +20,7 @@ ms.date: 10/02/2018 - [Time](wcd-time.md) - [Cellular > DataClassMappingTable](wcd-cellular.md#dataclassmappingtable) - [OOBE > EnableCortanaVoice](wcd-oobe.md#enablecortanavoice) +- [StorageD3InModernStandby](wcd/wcd-storaged3inmodernstandby.md) ## Settings removed in Windows 10, version ? diff --git a/windows/configuration/wcd/wcd-storaged3inmodernstandby.md b/windows/configuration/wcd/wcd-storaged3inmodernstandby.md new file mode 100644 index 0000000000..a866ee0dab --- /dev/null +++ b/windows/configuration/wcd/wcd-storaged3inmodernstandby.md @@ -0,0 +1,25 @@ +--- +title: StorageD3InModernStandby (Windows 10) +description: This section describes the StorageD3InModernStandby settings that you can configure in provisioning packages for Windows 10 using Windows Configuration Designer. +ms.prod: w10 +ms.mktglfcycl: deploy +ms.sitesec: library +author: jdeckerMS +ms.localizationpriority: medium +ms.author: jdecker +ms.topic: article +ms.date: 09/06/2017 +--- + +# StorageD3InModernStandby (Windows Configuration Designer reference) + +Use **StorageD3InModernStandby** to enable or disable low power state (D3) during standby. When this setting is configured to **Enable Storage Device D3**, SATA and NVMe devices will be able to enter the D3 state when the system transits to modern standby state, if they are using a Microsoft inbox driver such as StorAHCI, StorNVMe. + +[Learn more about device power states.](https://docs.microsoft.com/windows-hardware/drivers/kernel/device-power-states) + +## Applies to + +| Setting | Desktop editions | Mobile editions | Surface Hub | HoloLens | IoT Core | +| --- | :---: | :---: | :---: | :---: | :---: | +| All settings | X | X | X | | X | + diff --git a/windows/configuration/wcd/wcd.md b/windows/configuration/wcd/wcd.md index b19b249d08..47631ec5f0 100644 --- a/windows/configuration/wcd/wcd.md +++ b/windows/configuration/wcd/wcd.md @@ -72,6 +72,7 @@ This section describes the settings that you can configure in [provisioning pack | [Start](wcd-start.md) | X | X | | | | | [StartupApp](wcd-startupapp.md) | | | | | X | | [StartupBackgroundTasks](wcd-startupbackgroundtasks.md) | | | | | X | +| [StorageD3InModernStandby](wcd/wcd-storaged3inmodernstandby.md) |X | X | X | | X | | [SurfaceHubManagement](wcd-surfacehubmanagement.md) | | | X | | | | [TabletMode](wcd-tabletmode.md) |X | X | X | X | | | [TakeATest](wcd-takeatest.md) | X | | | | | From f1f5739a02260dbe008c5c5fd085793535a967f5 Mon Sep 17 00:00:00 2001 From: Jeanie Decker Date: Wed, 13 Mar 2019 07:54:18 -0700 Subject: [PATCH 061/724] fix link --- windows/configuration/wcd/wcd-changes.md | 2 +- windows/configuration/wcd/wcd.md | 2 +- 2 files changed, 2 insertions(+), 2 deletions(-) diff --git a/windows/configuration/wcd/wcd-changes.md b/windows/configuration/wcd/wcd-changes.md index 962549f74e..4f84e272f5 100644 --- a/windows/configuration/wcd/wcd-changes.md +++ b/windows/configuration/wcd/wcd-changes.md @@ -20,7 +20,7 @@ ms.date: 10/02/2018 - [Time](wcd-time.md) - [Cellular > DataClassMappingTable](wcd-cellular.md#dataclassmappingtable) - [OOBE > EnableCortanaVoice](wcd-oobe.md#enablecortanavoice) -- [StorageD3InModernStandby](wcd/wcd-storaged3inmodernstandby.md) +- [StorageD3InModernStandby](wcd-storaged3inmodernstandby.md) ## Settings removed in Windows 10, version ? diff --git a/windows/configuration/wcd/wcd.md b/windows/configuration/wcd/wcd.md index 47631ec5f0..2c764902cc 100644 --- a/windows/configuration/wcd/wcd.md +++ b/windows/configuration/wcd/wcd.md @@ -72,7 +72,7 @@ This section describes the settings that you can configure in [provisioning pack | [Start](wcd-start.md) | X | X | | | | | [StartupApp](wcd-startupapp.md) | | | | | X | | [StartupBackgroundTasks](wcd-startupbackgroundtasks.md) | | | | | X | -| [StorageD3InModernStandby](wcd/wcd-storaged3inmodernstandby.md) |X | X | X | | X | +| [StorageD3InModernStandby](wcd-storaged3inmodernstandby.md) |X | X | X | | X | | [SurfaceHubManagement](wcd-surfacehubmanagement.md) | | | X | | | | [TabletMode](wcd-tabletmode.md) |X | X | X | X | | | [TakeATest](wcd-takeatest.md) | X | | | | | From 7607f7772c32985857bb25f3c7fde47698a18b4f Mon Sep 17 00:00:00 2001 From: Brian Lich Date: Wed, 13 Mar 2019 08:32:49 -0700 Subject: [PATCH 062/724] new build 3/13/2019 8:32 AM --- ...ndows-diagnostic-events-and-fields-1903.md | 68 +++++++++---------- 1 file changed, 34 insertions(+), 34 deletions(-) diff --git a/windows/privacy/basic-level-windows-diagnostic-events-and-fields-1903.md b/windows/privacy/basic-level-windows-diagnostic-events-and-fields-1903.md index ac9b7be4f3..cd3421c1a4 100644 --- a/windows/privacy/basic-level-windows-diagnostic-events-and-fields-1903.md +++ b/windows/privacy/basic-level-windows-diagnostic-events-and-fields-1903.md @@ -13,7 +13,7 @@ manager: dansimp ms.collection: M365-security-compliance ms.topic: article audience: ITPro -ms.date: 03/12/2019 +ms.date: 03/13/2019 --- @@ -1744,7 +1744,7 @@ The following fields are available: - **AdvertisingId** Current state of the advertising ID setting. - **AppDiagnostics** Current state of the app diagnostics setting. - **Appointments** Current state of the calendar setting. -- **AppointmentsSystem** No content is currently available. +- **AppointmentsSystem** Current state of the calendar setting. - **Bluetooth** Current state of the Bluetooth capability setting. - **BluetoothSync** Current state of the Bluetooth sync capability setting. - **BroadFileSystemAccess** Current state of the broad file system access setting. @@ -1752,10 +1752,10 @@ The following fields are available: - **Chat** Current state of the chat setting. - **ChatSystem** Current state of the chat setting. - **Contacts** Current state of the contacts setting. -- **ContactsSystem** No content is currently available. +- **ContactsSystem** Current state of the Contacts setting. - **DocumentsLibrary** Current state of the documents library setting. - **Email** Current state of the email setting. -- **EmailSystem** No content is currently available. +- **EmailSystem** Current state of the email setting. - **FindMyDevice** Current state of the "find my device" setting. - **GazeInput** Current state of the gaze input setting. - **HumanInterfaceDevice** Current state of the human interface device setting. @@ -1767,7 +1767,7 @@ The following fields are available: - **Microphone** Current state of the microphone setting. - **PhoneCall** Current state of the phone call setting. - **PhoneCallHistory** Current state of the call history setting. -- **PhoneCallHistorySystem** No content is currently available. +- **PhoneCallHistorySystem** Current state of the call history setting. - **PicturesLibrary** Current state of the pictures library setting. - **Radios** Current state of the radios setting. - **SensorsCustom** Current state of the custom sensor setting. @@ -1777,7 +1777,7 @@ The following fields are available: - **USB** Current state of the USB setting. - **UserAccountInformation** Current state of the account information setting. - **UserDataTasks** Current state of the tasks setting. -- **UserDataTasksSystem** No content is currently available. +- **UserDataTasksSystem** Current state of the tasks setting. - **UserNotificationListener** Current state of the notifications setting. - **VideosLibrary** Current state of the videos library setting. - **Webcam** Current state of the camera setting. @@ -1915,18 +1915,18 @@ The following fields are available: - **AdvertisingId** Current state of the advertising ID setting. - **AppDiagnostics** Current state of the app diagnostics setting. - **Appointments** Current state of the calendar setting. -- **AppointmentsSystem** No content is currently available. +- **AppointmentsSystem** Current state of the calendar setting. - **Bluetooth** Current state of the Bluetooth capability setting. - **BluetoothSync** Current state of the Bluetooth sync capability setting. - **BroadFileSystemAccess** Current state of the broad file system access setting. - **CellularData** Current state of the cellular data capability setting. - **Chat** Current state of the chat setting. -- **ChatSystem** No content is currently available. +- **ChatSystem** Current state of the chat setting. - **Contacts** Current state of the contacts setting. -- **ContactsSystem** No content is currently available. +- **ContactsSystem** Current state of the Contacts setting. - **DocumentsLibrary** Current state of the documents library setting. - **Email** Current state of the email setting. -- **EmailSystem** No content is currently available. +- **EmailSystem** Current state of the email setting. - **GazeInput** Current state of the gaze input setting. - **HumanInterfaceDevice** Current state of the human interface device setting. - **InkTypeImprovement** Current state of the improve inking and typing setting. @@ -1938,7 +1938,7 @@ The following fields are available: - **Microphone** Current state of the microphone setting. - **PhoneCall** Current state of the phone call setting. - **PhoneCallHistory** Current state of the call history setting. -- **PhoneCallHistorySystem** No content is currently available. +- **PhoneCallHistorySystem** Current state of the call history setting. - **PicturesLibrary** Current state of the pictures library setting. - **Radios** Current state of the radios setting. - **SensorsCustom** Current state of the custom sensor setting. @@ -1948,7 +1948,7 @@ The following fields are available: - **USB** Current state of the USB setting. - **UserAccountInformation** Current state of the account information setting. - **UserDataTasks** Current state of the tasks setting. -- **UserDataTasksSystem** No content is currently available. +- **UserDataTasksSystem** Current state of the tasks setting. - **UserNotificationListener** Current state of the notifications setting. - **VideosLibrary** Current state of the videos library setting. - **Webcam** Current state of the camera setting. @@ -3772,27 +3772,27 @@ The following fields are available: ### Microsoft.Windows.Kernel.DeviceConfig.DeviceConfig -No content is currently available. +This critical device configuration event provides information about drivers for a driver installation that took place within the kernel. The following fields are available: -- **ClassGuid** No content is currently available. -- **DeviceInstanceId** No content is currently available. -- **DriverDate** No content is currently available. -- **DriverFlightIds** No content is currently available. -- **DriverInfName** No content is currently available. -- **DriverProvider** No content is currently available. -- **DriverSubmissionId** No content is currently available. -- **DriverVersion** No content is currently available. -- **ExtensionDrivers** No content is currently available. -- **FirstHardwareId** No content is currently available. -- **InboxDriver** No content is currently available. -- **InstallDate** No content is currently available. -- **LastCompatibleId** No content is currently available. -- **Legacy** No content is currently available. -- **NeedReboot** No content is currently available. -- **SetupMode** No content is currently available. -- **StatusCode** No content is currently available. +- **ClassGuid** The unique ID for the device class. +- **DeviceInstanceId** The unique ID for the device on the system. +- **DriverDate** The date the driver was installed. +- **DriverFlightIds** The IDs for the driver flights. +- **DriverInfName** Driver INF file name. +- **DriverProvider** The driver manufacturer or provider. +- **DriverSubmissionId** The driver submission ID assigned by the hardware developer center. +- **DriverVersion** The driver version number. +- **ExtensionDrivers** The list of extension driver INF files, extension IDs, and associated flight IDs. +- **FirstHardwareId** The ID in the hardware ID list that provides the most specific device description. +- **InboxDriver** Indicates whether the driver package is included with Windows. +- **InstallDate** Date the driver was installed. +- **LastCompatibleId** The ID in the hardware ID list that provides the least specific device description. +- **Legacy** Indicates whether the driver is a legacy driver. +- **NeedReboot** Indicates whether the driver requires a reboot. +- **SetupMode** Indicates whether the device configuration occurred during the initial installation of the device. +- **StatusCode** The NTSTATUS of device configuration operation. ### Microsoft.Windows.Kernel.PnP.AggregateClearDevNodeProblem @@ -5353,7 +5353,7 @@ The following fields are available: - **FlightId** The specific id of the flight the device is getting - **HandlerType** Indicates the kind of content (app, driver, windows patch, etc.) - **RevisionNumber** Identifies the revision number of this specific piece of content -- **ServiceGuid** Identifier for the service to which the software distribution client is connecting (Windows Update, Windows Store, etc) +- **ServiceGuid** A unique identifier for the service that the software distribution client is installing content for (Windows Update, Microsoft Store, etc). - **SystemBIOSMajorRelease** Major release version of the system bios - **SystemBIOSMinorRelease** Minor release version of the system bios - **UpdateId** Identifier associated with the specific piece of content @@ -5427,7 +5427,7 @@ The following fields are available: - **RepeatFailCount** Indicates whether this specific content has previously failed. - **RepeatFailFlag** Indicates whether this specific piece of content had previously failed to download. - **RevisionNumber** The revision number of the specified piece of content. -- **ServiceGuid** An ID that represents which service the software distribution client is installing content for (Windows Update, Windows Store, etc.). +- **ServiceGuid** A unique identifier for the service that the software distribution client is installing content for (Windows Update, Microsoft Store, etc). - **Setup360Phase** If the download is for an operating system upgrade, this datapoint indicates which phase of the upgrade is underway. - **ShippingMobileOperator** The mobile operator that a device shipped on. - **SizeCalcTime** Time taken (in seconds) to calculate the total download size of the payload. @@ -5606,7 +5606,7 @@ The following fields are available: - **RelatedCV** The previous correlation vector that was used by the client before swapping with a new one. - **RepeatFailCount** Indicates whether this specific piece of content has previously failed. - **RevisionNumber** Identifies the revision number of this specific piece of content. -- **ServiceGuid** Identifier for the service to which the software distribution client is connecting (Windows Update, Windows Store, etc.). +- **ServiceGuid** A unique identifier for the service that the software distribution client is installing content for (Windows Update, Microsoft Store, etc). - **StatusCode** Result code of the event (success, cancellation, failure code HResult). - **TargetGroupId** For drivers targeted to a specific device model, this ID indicates the distribution group of devices receiving that driver. - **TargetingVersion** For drivers targeted to a specific device model, this is the version number of the drivers being distributed to the device. @@ -5668,7 +5668,7 @@ The following fields are available: - **RelatedCV** The previous correlation vector that was used by the client before swapping with a new one. - **RepeatFailCount** Indicates whether this specific piece of content previously failed. - **RevisionNumber** Identifies the revision number of this specific piece of content. -- **ServiceGuid** Identifier for the service to which the software distribution client is connecting (Windows Update, Windows Store, etc.). +- **ServiceGuid** A unique identifier for the service that the software distribution client is installing content for (Windows Update, Microsoft Store, etc). - **StatusCode** Result code of the event (success, cancellation, failure code HResult). - **TargetGroupId** For drivers targeted to a specific device model, this ID indicates the distribution group of devices receiving that driver. - **TargetingVersion** For drivers targeted to a specific device model, this is the version number of the drivers being distributed to the device. From 36ebe477a6ddc7c10db110d8e58e5adc31f39ef6 Mon Sep 17 00:00:00 2001 From: Brian Lich Date: Wed, 13 Mar 2019 08:32:57 -0700 Subject: [PATCH 063/724] new build 3/13/2019 8:32 AM --- ...ndows-diagnostic-events-and-fields-1703.md | 4 +- ...ndows-diagnostic-events-and-fields-1709.md | 6 +- ...ndows-diagnostic-events-and-fields-1803.md | 6 +- ...ndows-diagnostic-events-and-fields-1809.md | 64 +++++++------------ 4 files changed, 32 insertions(+), 48 deletions(-) diff --git a/windows/privacy/basic-level-windows-diagnostic-events-and-fields-1703.md b/windows/privacy/basic-level-windows-diagnostic-events-and-fields-1703.md index 2e2ac4486f..3fad353220 100644 --- a/windows/privacy/basic-level-windows-diagnostic-events-and-fields-1703.md +++ b/windows/privacy/basic-level-windows-diagnostic-events-and-fields-1703.md @@ -13,7 +13,7 @@ manager: dansimp ms.collection: M365-security-compliance ms.topic: article audience: ITPro -ms.date: 03/12/2019 +ms.date: 03/13/2019 --- @@ -4181,7 +4181,7 @@ The following fields are available: - **RelatedCV** The Correlation Vector that was used before the most recent change to a new Correlation Vector. - **RepeatFailFlag** Indicates whether this specific piece of content had previously failed to download. - **RevisionNumber** The revision number of the specified piece of content. -- **ServiceGuid** A unique identifier for the service that the software distribution client is installing content for (Windows Update, Windows Store, etc.). +- **ServiceGuid** A unique identifier for the service that the software distribution client is installing content for (Windows Update, Microsoft Store, etc). - **Setup360Phase** Identifies the active phase of the upgrade download if the current download is for an Operating System upgrade. - **ShippingMobileOperator** The mobile operator linked to the device when the device shipped. - **StatusCode** Indicates the result of a Download event (success, cancellation, failure code HResult). diff --git a/windows/privacy/basic-level-windows-diagnostic-events-and-fields-1709.md b/windows/privacy/basic-level-windows-diagnostic-events-and-fields-1709.md index d6a2e128d8..4a60d0147d 100644 --- a/windows/privacy/basic-level-windows-diagnostic-events-and-fields-1709.md +++ b/windows/privacy/basic-level-windows-diagnostic-events-and-fields-1709.md @@ -13,7 +13,7 @@ manager: dansimp ms.collection: M365-security-compliance ms.topic: article audience: ITPro -ms.date: 03/12/2019 +ms.date: 03/13/2019 --- @@ -4128,7 +4128,7 @@ The following fields are available: - **HandlerType** Indicates the kind of content (app, driver, windows patch, etc.) - **RevisionNumber** Unique revision number of Update - **ServerId** Identifier for the service to which the software distribution client is connecting, such as Windows Update and Microsoft Store. -- **ServiceGuid** Identifier for the service to which the software distribution client is connecting (Windows Update, Windows Store, etc) +- **ServiceGuid** A unique identifier for the service that the software distribution client is installing content for (Windows Update, Microsoft Store, etc). - **SystemBIOSMajorRelease** Major version of the BIOS. - **SystemBIOSMinorRelease** Minor version of the BIOS. - **UpdateId** Unique Update ID @@ -4192,7 +4192,7 @@ The following fields are available: - **RelatedCV** The previous Correlation Vector that was used before swapping with a new one - **RepeatFailFlag** Indicates whether this specific piece of content had previously failed to download. - **RevisionNumber** The revision number of the specified piece of content. -- **ServiceGuid** A unique identifier for the service that the software distribution client is installing content for (Windows Update, Windows Store, etc.). +- **ServiceGuid** A unique identifier for the service that the software distribution client is installing content for (Windows Update, Microsoft Store, etc). - **Setup360Phase** Identifies the active phase of the upgrade download if the current download is for an Operating System upgrade. - **ShippingMobileOperator** The mobile operator linked to the device when the device shipped. - **StatusCode** Indicates the result of a Download event (success, cancellation, failure code HResult). diff --git a/windows/privacy/basic-level-windows-diagnostic-events-and-fields-1803.md b/windows/privacy/basic-level-windows-diagnostic-events-and-fields-1803.md index e88b4da389..d472800547 100644 --- a/windows/privacy/basic-level-windows-diagnostic-events-and-fields-1803.md +++ b/windows/privacy/basic-level-windows-diagnostic-events-and-fields-1803.md @@ -13,7 +13,7 @@ manager: dansimp ms.collection: M365-security-compliance ms.topic: article audience: ITPro -ms.date: 03/12/2019 +ms.date: 03/13/2019 --- @@ -4934,7 +4934,7 @@ The following fields are available: - **FlightId** The specific id of the flight the device is getting - **HandlerType** Indicates the kind of content (app, driver, windows patch, etc.) - **RevisionNumber** Identifies the revision number of this specific piece of content -- **ServiceGuid** Identifier for the service to which the software distribution client is connecting (Windows Update, Windows Store, etc) +- **ServiceGuid** A unique identifier for the service that the software distribution client is installing content for (Windows Update, Microsoft Store, etc). - **SystemBIOSMajorRelease** Major release version of the system bios - **SystemBIOSMinorRelease** Minor release version of the system bios - **UpdateId** Identifier associated with the specific piece of content @@ -4997,7 +4997,7 @@ The following fields are available: - **RelatedCV** The Correlation Vector that was used before the most recent change to a new Correlation Vector. - **RepeatFailFlag** Indicates whether this specific piece of content had previously failed to download. - **RevisionNumber** The revision number of the specified piece of content. -- **ServiceGuid** A unique identifier for the service that the software distribution client is installing content for (Windows Update, Windows Store, etc.). +- **ServiceGuid** A unique identifier for the service that the software distribution client is installing content for (Windows Update, Microsoft Store, etc). - **Setup360Phase** Identifies the active phase of the upgrade download if the current download is for an Operating System upgrade. - **ShippingMobileOperator** The mobile operator linked to the device when the device shipped. - **StatusCode** Indicates the result of a Download event (success, cancellation, failure code HResult). diff --git a/windows/privacy/basic-level-windows-diagnostic-events-and-fields-1809.md b/windows/privacy/basic-level-windows-diagnostic-events-and-fields-1809.md index fd7cd31194..85613743bd 100644 --- a/windows/privacy/basic-level-windows-diagnostic-events-and-fields-1809.md +++ b/windows/privacy/basic-level-windows-diagnostic-events-and-fields-1809.md @@ -13,7 +13,7 @@ manager: dansimp ms.collection: M365-security-compliance ms.topic: article audience: ITPro -ms.date: 03/12/2019 +ms.date: 03/13/2019 --- @@ -2676,6 +2676,7 @@ The following fields are available: - **CanAddMsaToMsTelemetry** True if we can add MSA PUID and CID to telemetry, false otherwise. - **CanCol|ectCoreTelemetry** No content is currently available. - **CanCollactCoreTelemetry** No content is currently available. +- **CanCollec|AnyTelemetry** No content is currently available. - **CanCollectAnyTelemetry** True if we are allowed to collect partner telemetry, false otherwise. - **CanCollectCoreTelemetry** True if we can collect CORE/Basic telemetry, false otherwise. - **CanCollectHeartbeats** True if we can collect heartbeat telemetry, false otherwise. @@ -2721,6 +2722,7 @@ The following fields are available: - **CensusExitCode** The last exit code of the Census task. - **CensusStartTime** Time of last Census run. - **CensusTaskEnabled** True if Census is enabled, false otherwise. +- **CensusTaskEnavled** No content is currently available. - **CompressedBytesUploaded** Number of compressed bytes uploaded. - **ConsumerDroppedCount** Number of events dropped at consumer layer of telemetry client. - **CriticalDataDbDroppedCount** Number of critical data sampled events dropped at the database layer. @@ -3392,6 +3394,7 @@ The following fields are available: - **aiSeqId** The event sequence ID. - **bootId** The system boot ID. - **BrightnessVersionViaDDI** The version of the Display Brightness Interface. +- **BrightnessVersIonViaDDI** No content is currently available. - **BvightnessVersionViaDDI** No content is currently available. - **ComputePreemptionLevel** The maximum preemption level supported by GPU for compute payload. - **DedicatedSystemMemoryB** The amount of system memory dedicated for GPU use (in bytes). @@ -3436,9 +3439,12 @@ The following fields are available: - **IsRenderDevice** Does the GPU have rendering capabilities? - **IsSoftwareDevice** Is this a software implementation of the GPU? - **IsSoftwareDevicg** No content is currently available. +- **KMD@ilePath** No content is currently available. - **KMDFilePath** The file path to the location of the Display Kernel Mode Driver in the Driver Store. - **MeasureEnabled** Is the device listening to MICROSOFT_KEYWORD_MEASURES? - **MsHybridDiscrete** Indicates whether the adapter is a discrete adapter in a hybrid configuration. +- **NumTidPlTarMets** No content is currently available. +- **NumVidPDSouPces** No content is currently available. - **NumVidPnSources** The number of supported display output sources. - **NumVidPnTargets** The number of supported display output targets. - **SharedSystemMemoryB** The amount of system memory shared by GPU and CPU (in bytes). @@ -3543,6 +3549,7 @@ The following fields are available: - **AppTimeStamp** The date/time stamp of the app. - **AppVersion** The version of the app that has crashed. - **AptName** No content is currently available. +- **AptSessionGuid** No content is currently available. - **DargetAppId** No content is currently available. - **ExceptionCode** The exception code returned by the process that has crashed. - **ExceptionOffset** The address where the exception had occurred. @@ -3553,16 +3560,23 @@ The following fields are available: - **ModNamevaultsv** No content is currently available. - **ModTimeStamp** The date/time stamp of the module. - **ModVersion** The version of the module that has crashed. +- **PaccageFullName** No content is currently available. - **PackageFullName** Store application identity. - **PackageRelaatieAppId** No content is currently available. +- **PackageRelativaAppId** No content is currently available. - **PackageRelativeAppId** Store application identity. - **ProcessArchitecture** Architecture of the crashing process, as one of the PROCESSOR_ARCHITECTURE_* constants: 0: PROCESSOR_ARCHITECTURE_INTEL. 5: PROCESSOR_ARCHITECTURE_ARM. 9: PROCESSOR_ARCHITECTURE_AMD64. 12: PROCESSOR_ARCHITECTURE_ARM64. - **ProcessCreateTime** The time of creation of the process that has crashed. - **ProcessId** The ID of the process that has crashed. +- **RepkrtId** No content is currently available. - **ReportId** A GUID used to identify the report. This can used to track the report across Watson. +- **TargepAppVer** No content is currently available. +- **TargetAppI`** No content is currently available. - **TargetAppId** The kernel reported AppId of the application being reported. - **TargetAppVer** The specific version of the application being reported - **TargetAsId** The sequence number for the hanging process. +- **TargetAwId** No content is currently available. +- **TrocessArchitecture** No content is currently available. ## Feature update events @@ -3683,6 +3697,7 @@ The following fields are available: - **HiddenArp** Indicates whether a program hides itself from showing up in ARP. - **InstallDate** The date the application was installed (a best guess based on folder creation date heuristics). - **InstallDateArpLastModified** The date of the registry ARP key for a given application. Hints at install date but not always accurate. Passed as an array. Example: 4/11/2015 00:00:00 +- **InstallDateArpLasuModified** No content is currently available. - **InstallDateFromLinkFile** The estimated date of install based on the links to the files. Passed as an array. - **InstallDateMsi** The install date if the application was installed via Microsoft Installer (MSI). Passed as an array. - **InventoryVersion** The version of the inventory file generating the events. @@ -4505,7 +4520,6 @@ The following fields are available: - **BytesRead** The total number of bytes read from or read by the OS upon system startup. - **BytesWritten** The total number of bytes written to or written by the OS upon system startup. -- **f** No content is currently available. See [f](#f). ### Microsoft.Windows.Kernel.BootEnvironment.OsLaunch @@ -4978,7 +4992,6 @@ The following fields are available: - **BIOSVendor** Vendor of the system BIOS - **BiosVersion** Version of the system BIOS - **BundleId** Identifier associated with the specific content bundle; should not be all zeros if the bundleID was found. -- **BundleRevisionNumbe2** No content is currently available. - **BundleRevisionNumber** Identifies the revision number of the content bundle - **CallerApplicationName** Name provided by the caller who initiated API calls into the software distribution client - **ClientVersion** Version number of the software distribution client @@ -4990,7 +5003,7 @@ The following fields are available: - **FlightId** The specific id of the flight the device is getting - **HandlerType** Indicates the kind of content (app, driver, windows patch, etc.) - **RevisionNumber** Identifies the revision number of this specific piece of content -- **ServiceGuid** Identifier for the service to which the software distribution client is connecting (Windows Update, Windows Store, etc) +- **ServiceGuid** A unique identifier for the service that the software distribution client is installing content for (Windows Update, Microsoft Store, etc). - **SystemBIOSMajorRelease** Major release version of the system bios - **SystemBIOSMinorRelease** Minor release version of the system bios - **UpdateId** Identifier associated with the specific piece of content @@ -5007,10 +5020,8 @@ The following fields are available: - **AppXBlockHalhFailures** No content is currently available. - **AppXBlockHashFailures** Indicates the number of blocks that failed hash validation during download of the app payload. - **AppXBlockHashValidationFailureCount** A count of the number of blocks that have failed validation after being downloaded. -- **AppXBoockHashFailures** No content is currently available. - **AppXDownloadScope** Indicates the scope of the download for application content. - **AppXScope** Indicates the scope of the app download. -- **AppXScopr** No content is currently available. - **B}ndleId** No content is currently available. - **BiosFamily** The family of the BIOS (Basic Input Output System). - **BiosName** The name of the device BIOS. @@ -5021,25 +5032,19 @@ The following fields are available: - **BundleBytesDownloaded** Number of bytes downloaded for the specific content bundle. - **BundleId** Identifier associated with the specific content bundle. - **BundleRepeatFailCoqnt** No content is currently available. -- **BundleRepeatFailCoun.** No content is currently available. - **BundleRepeatFailCount** Indicates whether this particular update bundle has previously failed. - **BundleRepeatFailFlag** Indicates whether this particular update bundle previously failed to download. - **BundleRevisionNumber** Identifies the revision number of the content bundle. - **BytesDownloaded** Number of bytes that were downloaded for an individual piece of content (not the entire bundle). -- **BytesDownnoaded** No content is currently available. - **C`llerApplicationName** No content is currently available. - **CachedEngineVersion** The version of the “Self-Initiated Healing” (SIH) engine that is cached on the device, if applicable. - **CallerApplicationname** No content is currently available. - **CallerApplicationName** The name provided by the application that initiated API calls into the software distribution client. -- **CalLerApplicationName** No content is currently available. -- **CallerApplictionaName** No content is currently available. - **CbsDownloadMethod** Indicates whether the download was a full- or a partial-file download. - **CbsMethod** The method used for downloading the update content related to the Component Based Servicing (CBS) technology. - **CDNCotntryCode** No content is currently available. -- **CDNCoun.ryCdel** No content is currently available. - **CDNCoundryCode** No content is currently available. - **CDNCountryCode** Two letter country abbreviation for the Content Distribution Network (CDN) location. -- **CDNd** No content is currently available. - **CDNId** ID which defines which CDN the software distribution client downloaded the content from. - **ClientVersion** The version number of the software distribution client. - **CommonProps** A bitmask for future flags associated with the Windows Update client behavior. @@ -5052,24 +5057,17 @@ The following fields are available: - **DownloadProps** Information about the download operation properties in the form of a bitmask. - **DownloadType** Differentiates the download type of “Self-Initiated Healing” (SIH) downloads between Metadata and Payload downloads. - **DownloedPriority** No content is currently available. -- **DventInstanceID** No content is currently available. - **e:4|SInstanceID** No content is currently available. - **e:4|SScenario** No content is currently available. - **E:4|State** No content is currently available. - **EöentInstanceID** No content is currently available. -- **Eve.tScenario** No content is currently available. -- **EventInst.9ceID** No content is currently available. - **EventInstanceID** A globally unique identifier for event instance. - **EventInstAnceID** No content is currently available. -- **EventPype** No content is currently available. - **EventScanario** No content is currently available. - **eventScenario** No content is currently available. - **EventScenario** Indicates the purpose for sending this event: whether because the software distribution just started downloading content; or whether it was cancelled, succeeded, or failed. - **EventType** Identifies the type of the event (Child, Bundle, or Driver). -- **EventTypr** No content is currently available. - **ExtendedStatusCode** Secondary error code for certain scenarios where StatusCode wasn't specific enough. -- **ExtendedtartusCdel** No content is currently available. -- **FeatureUpdatePaser** No content is currently available. - **FeatureUpdatePause** Indicates whether feature OS updates are paused on the device. - **Fli.c9BuildNumber** No content is currently available. - **Fli.c9Id** No content is currently available. @@ -5082,7 +5080,6 @@ The following fields are available: - **HomeMobileOperator** The mobile operator that the device was originally intended to work with. - **HospName** No content is currently available. - **HostName** The hostname URL the content is downloading from. -- **Hst.Name** No content is currently available. - **IPVersion** Indicates whether the download took place over IPv4 or IPv6. - **IsDependentSet** Indicates whether a driver is a part of a larger System Hardware/Firmware Update - **IsWQfBEnabled** No content is currently available. @@ -5093,26 +5090,18 @@ The following fields are available: - **IsWUfBEnabled** Indicates if Windows Update for Business is enabled on the device. - **NetworkCost** A flag indicating the cost of the network (congested, fixed, variable, over data limit, roaming, etc.) used for downloading the update content. - **NetworkCostBitMask** Indicates what kind of network the device is connected to (roaming, metered, over data cap, etc.) -- **NetworkCst.** No content is currently available. - **NetworkRestrictionStatus** More general version of NetworkCostBitMask, specifying whether Windows considered the current network to be "metered." -- **NetworkRestrictiontartus** No content is currently available. -- **oadPriority** No content is currently available. - **PackageFullName** The package name of the content. -- **PegulationResult** No content is currently available. - **PhonePreviewEnabled** Indicates whether a phone was opted-in to getting preview builds, prior to flighting (pre-release builds) being introduced. - **PostDnldDime** No content is currently available. - **PostDnldTime** Time (in seconds) taken to signal download completion after the last job completed downloading the payload. - **ProcessName** The process name of the application that initiated API calls, in the event where CallerApplicationName was not provided. -- **Pst.DnldTime** No content is currently available. - **PvocessName** No content is currently available. -- **QpdateId** No content is currently available. - **QualityreUpdaPause** No content is currently available. - **QualityUpdatePa}se** No content is currently available. -- **QualityUpdatePaser** No content is currently available. - **QualityUpdatePatse** No content is currently available. - **QualityUpdatePausa** No content is currently available. - **QualityUpdatePause** Indicates whether quality OS updates are paused on the device. -- **RdvisionNumber** No content is currently available. - **Reason** A 32-bit integer representing the reason the update is blocked from being downloaded in the background. - **ReguiationResult** No content is currently available. - **RegulationReason** The reason that the update is regulated @@ -5120,15 +5109,12 @@ The following fields are available: - **RegulationResult** The result code (HResult) of the last attempt to contact the regulation web service for download regulation of update content. - **RegulatIonResult** No content is currently available. - **ReiatedCV** No content is currently available. -- **RelatedCS** No content is currently available. - **RelatedCV** The Correlation Vector that was used before the most recent change to a new Correlation Vector. - **RelntedCV** No content is currently available. -- **RepeatFailCoun.** No content is currently available. - **RepeatFailCount** Indicates whether this specific content has previously failed. - **RepeatFailFlag** Indicates whether this specific content previously failed to download. - **RevisionNumber** The revision number of the specified piece of content. -- **SericeCGuid** No content is currently available. -- **ServiceGuid** A unique identifier for the service that the software distribution client is installing content for (Windows Update, Windows Store, etc.). +- **ServiceGuid** A unique identifier for the service that the software distribution client is installing content for (Windows Update, Microsoft Store, etc). - **Setup360Phase** Identifies the active phase of the upgrade download if the current download is for an Operating System upgrade. - **ShippingMobileOperator** The mobile operator linked to the device when the device shipped. - **SizeCalcTime** Time (in seconds) taken to calculate the total download size of the payload. @@ -5138,25 +5124,19 @@ The following fields are available: - **TargetGroupId** For drivers targeted to a specific device model, this ID indicates the distribution group of devices receiving that driver. - **TargetingVersion** For drivers targeted to a specific device model, this is the version number of the drivers being distributed to the device. - **TargetMetadataVersion** The version of the currently downloading (or most recently downloaded) package. -- **tartusCdel** No content is currently available. - **ThrottlingServiceHResult** Result code (success/failure) while contacting a web service to determine whether this device should download content yet. - **TimeToEstablishConnection** Time (in milliseconds) it took to establish the connection prior to beginning downloaded. -- **tizeCalcTime** No content is currently available. - **TotalExpectedBytes** The total size (in Bytes) expected to be downloaded. - **Upda|eImportance** No content is currently available. - **UpdateId** An identifier associated with the specific piece of content. - **UpdateID** An identifier associated with the specific piece of content. -- **UpdateImporEvent** No content is currently available. - **UpdateImpornstan** No content is currently available. -- **UpdateImport.9ce** No content is currently available. - **UpdateImportance** Indicates whether the content was marked as Important, Recommended, or Optional. - **Use** No content is currently available. - **UsedDO** Indicates whether the download used the Delivery Optimization (DO) service. - **UsedSystemVolume** Indicates whether the content was downloaded to the device's main system storage drive, or an alternate storage drive. -- **WUDericeID** No content is currently available. - **WUDeviceId** No content is currently available. - **WUDeviceID** The unique identifier of a specific device, used to identify how many devices are encountering success or a particular issue. -- **WUDviceCID** No content is currently available. ### SoftwareUpdateClientTelemetry.DownloadCheckpoint @@ -5360,7 +5340,7 @@ The following fields are available: - **RelatedCV** The previous correlation vector that was used by the client before swapping with a new one. - **RepeatFailCount** Indicates whether this specific piece of content has previously failed. - **RevisionNumber** Identifies the revision number of this specific piece of content. -- **ServiceGuid** Identifier for the service to which the software distribution client is connecting (Windows Update, Windows Store, etc.). +- **ServiceGuid** A unique identifier for the service that the software distribution client is installing content for (Windows Update, Microsoft Store, etc). - **StatusCode** Result code of the event (success, cancellation, failure code HResult). - **TargetGroupId** For drivers targeted to a specific device model, this ID indicates the distribution group of devices receiving that driver. - **TargetingVersion** For drivers targeted to a specific device model, this is the version number of the drivers being distributed to the device. @@ -5420,7 +5400,7 @@ The following fields are available: - **RelatedCV** The previous correlation vector that was used by the client before swapping with a new one. - **RepeatFailCount** Indicates whether this specific piece of content previously failed. - **RevisionNumber** Identifies the revision number of this specific piece of content. -- **ServiceGuid** Identifier for the service to which the software distribution client is connecting (Windows Update, Windows Store, etc.). +- **ServiceGuid** A unique identifier for the service that the software distribution client is installing content for (Windows Update, Microsoft Store, etc). - **StatusCode** Result code of the event (success, cancellation, failure code HResult). - **TargetGroupId** For drivers targeted to a specific device model, this ID indicates the distribution group of devices receiving that driver. - **TargetingVersion** For drivers targeted to a specific device model, this is the version number of the drivers being distributed to the device. @@ -5460,6 +5440,7 @@ The following fields are available: - **EventScenario** The purpose of this event, such as scan started, scan succeeded, or scan failed. - **ExtendedStatusCode** The secondary status code of the event. - **ExtendefStatusCode** No content is currently available. +- **imeZoScenario** No content is currently available. - **LeafCertId** The integral ID from the FragmentSigning data for the certificate that failed. - **ListOfSHA256OfIntermediateCerData** A semicolon delimited list of base64 encoding of hashes for the Base64CerData in the FragmentSigning data of an intermediate certificate. - **MetadataIntegrityMode** The mode of the transport metadata integrity check. 0 = unknown; 1 = ignore; 2 = audit; 3 = enforce @@ -6362,6 +6343,7 @@ The following fields are available: - **Produc|Id** No content is currently available. - **productId** No content is currently available. - **ProductId** The Store Product ID for the product being installed. +- **SystemAttemptNueber** No content is currently available. - **SystemAttemptNumber** The number of attempts by the system to acquire this product. - **UserAttemptNumber** The number of attempts by the user to acquire this product - **UserCttemptNumber** No content is currently available. @@ -6782,6 +6764,7 @@ The following fields are available: - **downloadModeSrc** Source of the DownloadMode setting (KvsProvider = 0, GeoProvider = 1, GeoVerProvider = 2, CpProvider = 3, DiscoveryProvider = 4, RegistryProvider = 5, GroupPolicyProvider = 6, MdmProvider = 7, SettingsProvider = 8, InvalidProviderType = 9). - **downloadMofeSrc** No content is currently available. - **experimentId** When running a test, this is used to correlate with other events that are part of the same test. +- **expiresAt** The time when the content will expire from the Delivery Optimization Cache. - **fileID** The ID of the file being downloaded. - **fileSize** The size of the file being downloaded. - **gCurMemoryStreamBytes** Current usage for memory streaming. @@ -6795,6 +6778,7 @@ The following fields are available: - **isEncrypted** TRUE if the file is encrypted and will be decrypted after download. - **isVpn** Is the device connected to a Virtual Private Network? - **jobID** Identifier for the Windows Update job. +- **lanConnectionCo}nt** No content is currently available. - **lanConnectionCount** The total number of connections made to peers in the same LAN. - **linkLocalConnectionCount** The number of connections made to peers in the same Link-local network. - **numPeers** The total number of peers used for this download. From 1d26a3157f7624ed3031a279b6bce5da2c47e91b Mon Sep 17 00:00:00 2001 From: Jeanie Decker Date: Wed, 13 Mar 2019 08:58:11 -0700 Subject: [PATCH 064/724] localpoliciessecurityoptions --- windows/configuration/wcd/wcd-policies.md | 8 ++++++++ 1 file changed, 8 insertions(+) diff --git a/windows/configuration/wcd/wcd-policies.md b/windows/configuration/wcd/wcd-policies.md index 5da3446971..8afa0ad845 100644 --- a/windows/configuration/wcd/wcd-policies.md +++ b/windows/configuration/wcd/wcd-policies.md @@ -337,6 +337,14 @@ To configure multiple URLs for **Blocked URL Exceptions** or **Blocked URLs** in 5. Open the project again in Windows Configuration Designer. 6. Export the package. Ensure you do not revisit the created policies under Kiosk Browser or else the null character will be removed. +## LocalPoliciesSecurityOptions + +| Setting | Description | Desktop editions | Mobile editions | Surface Hub | HoloLens | IoT Core | +| --- | --- | :---: | :---: | :---: | :---: | :---: | +| [InteractiveLogon_DoNotDisplayLastSignedIn](https://docs.microsoft.com/windows/client-management/mdm/policy-csp-localpoliciessecurityoptions#localpoliciessecurityoptions-interactivelogon-donotdisplaylastsignedin) | X | | | | | | +| [Shutdown_AllowSystemtobeShutDownWithoutHavingToLogOn](https://docs.microsoft.com/windows/client-management/mdm/policy-csp-localpoliciessecurityoptions#localpoliciessecurityoptions-shutdown-allowsystemtobeshutdownwithouthavingtologon) | X | | | | | | +| [UserAccountControl_BehaviorOfTheElevationPromptForStandardUsers](https://docs.microsoft.com/windows/client-management/mdm/policy-csp-localpoliciessecurityoptions#localpoliciessecurityoptions-useraccountcontrol-behavioroftheelevationpromptforstandardusers) | X | | | | | | + ## Location | Setting | Description | Desktop editions | Mobile editions | Surface Hub | HoloLens | IoT Core | From 7888f4cae72a5805ab9e2a88f391165f26a51370 Mon Sep 17 00:00:00 2001 From: Jeanie Decker Date: Wed, 13 Mar 2019 09:10:12 -0700 Subject: [PATCH 065/724] policies > power --- windows/configuration/wcd/wcd-policies.md | 25 +++++++++++++++++++++++ 1 file changed, 25 insertions(+) diff --git a/windows/configuration/wcd/wcd-policies.md b/windows/configuration/wcd/wcd-policies.md index 8afa0ad845..b77939b03c 100644 --- a/windows/configuration/wcd/wcd-policies.md +++ b/windows/configuration/wcd/wcd-policies.md @@ -351,6 +351,31 @@ To configure multiple URLs for **Blocked URL Exceptions** or **Blocked URLs** in | --- | --- | :---: | :---: | :---: | :---: | :---: | | [EnableLocation](https://docs.microsoft.com/windows/client-management/mdm/policy-configuration-service-provider#location-enablelocation) | Do not use. | | | | | | +## Power + +| Setting | Description | Desktop editions | Mobile editions | Surface Hub | HoloLens | IoT Core | +| --- | --- | :---: | :---: | :---: | :---: | :---: | +| [AllowStandbyStatesWhenSleepingOnBattery](https://docs.microsoft.com/windows/client-management/mdm/policy-configuration-service-provider#allowstandbystateswhensleepingonbattery) | X | | | | | | +| [AllowStandbyWhenSleepingPluggedIn](https://docs.microsoft.com/windows/client-management/mdm/policy-configuration-service-provider#allowstandbystateswhensleepingpluggedin) | X | | | | | | +| [DisplayOffTimeoutOnBattery](https://docs.microsoft.com/windows/client-management/mdm/policy-configuration-service-provider#displayofftimeoutonbattery) | X | | | | | | +| [DisplayOffTimeoutPluggedIn](https://docs.microsoft.com/windows/client-management/mdm/policy-configuration-service-provider#displayofftimeoutpluggedin) | X | | | | | | +| [EnergySaverBatteryThresholdOnBattery](https://docs.microsoft.com/windows/client-management/mdm/policy-configuration-service-provider#energysaverbatterythresholdonbattery) | X | | | | | | +| [EnergySaverBatteryThresholdPluggedIn](https://docs.microsoft.com/windows/client-management/mdm/policy-configuration-service-provider#EnergySaverBatteryThresholdPluggedIn) | X | | | | | | +| [HibernateTimeoutOnBattery](https://docs.microsoft.com/windows/client-management/mdm/policy-configuration-service-provider#hibernatetimeoutonbattery) | X | | | | | | +| [HibernateTimeoutPluggedIn](https://docs.microsoft.com/windows/client-management/mdm/policy-configuration-service-provider#hibernatetimeoutpluggedin) | X | | | | | | +| [SelectLidCloseActionOnBattery](https://docs.microsoft.com/windows/client-management/mdm/policy-configuration-service-provider#selectlidcloseactiononbattery) | X | | | | | | +| [SelectLidCloseActionPluggedIn](https://docs.microsoft.com/windows/client-management/mdm/policy-configuration-service-provider#selectlidcloseactionpluggedin) | X | | | | | | +| [SelectPowerButtonActionOnBattery](https://docs.microsoft.com/windows/client-management/mdm/policy-configuration-service-provider#selectpowerbuttonactiononbattery) | X | | | | | | +| [SelectPowerButtonActionPluggedIn](https://docs.microsoft.com/windows/client-management/mdm/policy-configuration-service-provider#selectpowerbuttonactionpluggedin) | X | | | | | | +| [SelectSleepButtonActionOnBattery](https://docs.microsoft.com/windows/client-management/mdm/policy-configuration-service-provider#selectsleepbuttonactiononbattery) | X | | | | | | +| [SelectSleepButtonActionPluggedIn](https://docs.microsoft.com/windows/client-management/mdm/policy-configuration-service-provider#selectsleepbuttonactionpluggedin) | X | | | | | | +| [StandbyTimeoutOnBattery](https://docs.microsoft.com/windows/client-management/mdm/policy-configuration-service-provider#StandbyTimeoutOnBattery) | X | | | | | | +| [StandbyTimeoutPluggedIn](https://docs.microsoft.com/windows/client-management/mdm/policy-configuration-service-provider#standbytimeoutpluggedin) | X | | | | | | +| [TurnOffHybridSleepOnBattery](https://docs.microsoft.com/windows/client-management/mdm/policy-configuration-service-provider#turnoffhybridsleeponbattery) | X | | | | | | +| [TurnOffHybridSleepPluggedIn](https://docs.microsoft.com/windows/client-management/mdm/policy-configuration-service-provider#turnoffhybridsleeppluggedin) | X | | | | | | +| [UnattendedSleepTimeoutOnBattery](https://docs.microsoft.com/windows/client-management/mdm/policy-configuration-service-provider#unattendedsleeptimeoutonbattery) | X | | | | | | +| [UnattendedSleepTimeoutPluggedIn](https://docs.microsoft.com/windows/client-management/mdm/policy-configuration-service-provider#unattendedsleeptimeoutpluggedin) | X | | | | | | + ## Privacy From 808f6c3224008e30620ed14633a5fedc6a5e8133 Mon Sep 17 00:00:00 2001 From: Jeanie Decker Date: Wed, 13 Mar 2019 09:22:32 -0700 Subject: [PATCH 066/724] fix tables --- windows/configuration/wcd/wcd-policies.md | 47 +++++++++++------------ 1 file changed, 23 insertions(+), 24 deletions(-) diff --git a/windows/configuration/wcd/wcd-policies.md b/windows/configuration/wcd/wcd-policies.md index b77939b03c..81758ffcf3 100644 --- a/windows/configuration/wcd/wcd-policies.md +++ b/windows/configuration/wcd/wcd-policies.md @@ -341,9 +341,9 @@ To configure multiple URLs for **Blocked URL Exceptions** or **Blocked URLs** in | Setting | Description | Desktop editions | Mobile editions | Surface Hub | HoloLens | IoT Core | | --- | --- | :---: | :---: | :---: | :---: | :---: | -| [InteractiveLogon_DoNotDisplayLastSignedIn](https://docs.microsoft.com/windows/client-management/mdm/policy-csp-localpoliciessecurityoptions#localpoliciessecurityoptions-interactivelogon-donotdisplaylastsignedin) | X | | | | | | -| [Shutdown_AllowSystemtobeShutDownWithoutHavingToLogOn](https://docs.microsoft.com/windows/client-management/mdm/policy-csp-localpoliciessecurityoptions#localpoliciessecurityoptions-shutdown-allowsystemtobeshutdownwithouthavingtologon) | X | | | | | | -| [UserAccountControl_BehaviorOfTheElevationPromptForStandardUsers](https://docs.microsoft.com/windows/client-management/mdm/policy-csp-localpoliciessecurityoptions#localpoliciessecurityoptions-useraccountcontrol-behavioroftheelevationpromptforstandardusers) | X | | | | | | +| [InteractiveLogon_DoNotDisplayLastSignedIn](https://docs.microsoft.com/windows/client-management/mdm/policy-csp-localpoliciessecurityoptions#localpoliciessecurityoptions-interactivelogon-donotdisplaylastsignedin) | | X | | | | | +| [Shutdown_AllowSystemtobeShutDownWithoutHavingToLogOn](https://docs.microsoft.com/windows/client-management/mdm/policy-csp-localpoliciessecurityoptions#localpoliciessecurityoptions-shutdown-allowsystemtobeshutdownwithouthavingtologon) | | X | | | | | +| [UserAccountControl_BehaviorOfTheElevationPromptForStandardUsers](https://docs.microsoft.com/windows/client-management/mdm/policy-csp-localpoliciessecurityoptions#localpoliciessecurityoptions-useraccountcontrol-behavioroftheelevationpromptforstandardusers) | | X | | | | | ## Location @@ -355,27 +355,26 @@ To configure multiple URLs for **Blocked URL Exceptions** or **Blocked URLs** in | Setting | Description | Desktop editions | Mobile editions | Surface Hub | HoloLens | IoT Core | | --- | --- | :---: | :---: | :---: | :---: | :---: | -| [AllowStandbyStatesWhenSleepingOnBattery](https://docs.microsoft.com/windows/client-management/mdm/policy-configuration-service-provider#allowstandbystateswhensleepingonbattery) | X | | | | | | -| [AllowStandbyWhenSleepingPluggedIn](https://docs.microsoft.com/windows/client-management/mdm/policy-configuration-service-provider#allowstandbystateswhensleepingpluggedin) | X | | | | | | -| [DisplayOffTimeoutOnBattery](https://docs.microsoft.com/windows/client-management/mdm/policy-configuration-service-provider#displayofftimeoutonbattery) | X | | | | | | -| [DisplayOffTimeoutPluggedIn](https://docs.microsoft.com/windows/client-management/mdm/policy-configuration-service-provider#displayofftimeoutpluggedin) | X | | | | | | -| [EnergySaverBatteryThresholdOnBattery](https://docs.microsoft.com/windows/client-management/mdm/policy-configuration-service-provider#energysaverbatterythresholdonbattery) | X | | | | | | -| [EnergySaverBatteryThresholdPluggedIn](https://docs.microsoft.com/windows/client-management/mdm/policy-configuration-service-provider#EnergySaverBatteryThresholdPluggedIn) | X | | | | | | -| [HibernateTimeoutOnBattery](https://docs.microsoft.com/windows/client-management/mdm/policy-configuration-service-provider#hibernatetimeoutonbattery) | X | | | | | | -| [HibernateTimeoutPluggedIn](https://docs.microsoft.com/windows/client-management/mdm/policy-configuration-service-provider#hibernatetimeoutpluggedin) | X | | | | | | -| [SelectLidCloseActionOnBattery](https://docs.microsoft.com/windows/client-management/mdm/policy-configuration-service-provider#selectlidcloseactiononbattery) | X | | | | | | -| [SelectLidCloseActionPluggedIn](https://docs.microsoft.com/windows/client-management/mdm/policy-configuration-service-provider#selectlidcloseactionpluggedin) | X | | | | | | -| [SelectPowerButtonActionOnBattery](https://docs.microsoft.com/windows/client-management/mdm/policy-configuration-service-provider#selectpowerbuttonactiononbattery) | X | | | | | | -| [SelectPowerButtonActionPluggedIn](https://docs.microsoft.com/windows/client-management/mdm/policy-configuration-service-provider#selectpowerbuttonactionpluggedin) | X | | | | | | -| [SelectSleepButtonActionOnBattery](https://docs.microsoft.com/windows/client-management/mdm/policy-configuration-service-provider#selectsleepbuttonactiononbattery) | X | | | | | | -| [SelectSleepButtonActionPluggedIn](https://docs.microsoft.com/windows/client-management/mdm/policy-configuration-service-provider#selectsleepbuttonactionpluggedin) | X | | | | | | -| [StandbyTimeoutOnBattery](https://docs.microsoft.com/windows/client-management/mdm/policy-configuration-service-provider#StandbyTimeoutOnBattery) | X | | | | | | -| [StandbyTimeoutPluggedIn](https://docs.microsoft.com/windows/client-management/mdm/policy-configuration-service-provider#standbytimeoutpluggedin) | X | | | | | | -| [TurnOffHybridSleepOnBattery](https://docs.microsoft.com/windows/client-management/mdm/policy-configuration-service-provider#turnoffhybridsleeponbattery) | X | | | | | | -| [TurnOffHybridSleepPluggedIn](https://docs.microsoft.com/windows/client-management/mdm/policy-configuration-service-provider#turnoffhybridsleeppluggedin) | X | | | | | | -| [UnattendedSleepTimeoutOnBattery](https://docs.microsoft.com/windows/client-management/mdm/policy-configuration-service-provider#unattendedsleeptimeoutonbattery) | X | | | | | | -| [UnattendedSleepTimeoutPluggedIn](https://docs.microsoft.com/windows/client-management/mdm/policy-configuration-service-provider#unattendedsleeptimeoutpluggedin) | X | | | | | | - +| [AllowStandbyStatesWhenSleepingOnBattery](https://docs.microsoft.com/windows/client-management/mdm/policy-configuration-service-provider#allowstandbystateswhensleepingonbattery) | | X | | | | | +| [AllowStandbyWhenSleepingPluggedIn](https://docs.microsoft.com/windows/client-management/mdm/policy-configuration-service-provider#allowstandbystateswhensleepingpluggedin) | | X | | | | | +| [DisplayOffTimeoutOnBattery](https://docs.microsoft.com/windows/client-management/mdm/policy-configuration-service-provider#displayofftimeoutonbattery) | | X | | | | | +| [DisplayOffTimeoutPluggedIn](https://docs.microsoft.com/windows/client-management/mdm/policy-configuration-service-provider#displayofftimeoutpluggedin) | | X | | | | | +| [EnergySaverBatteryThresholdOnBattery](https://docs.microsoft.com/windows/client-management/mdm/policy-configuration-service-provider#energysaverbatterythresholdonbattery) | | X | | | | | +| [EnergySaverBatteryThresholdPluggedIn](https://docs.microsoft.com/windows/client-management/mdm/policy-configuration-service-provider#EnergySaverBatteryThresholdPluggedIn) | | X | | | | | +| [HibernateTimeoutOnBattery](https://docs.microsoft.com/windows/client-management/mdm/policy-configuration-service-provider#hibernatetimeoutonbattery) | | X | | | | | +| [HibernateTimeoutPluggedIn](https://docs.microsoft.com/windows/client-management/mdm/policy-configuration-service-provider#hibernatetimeoutpluggedin) | | X | | | | | +| [SelectLidCloseActionOnBattery](https://docs.microsoft.com/windows/client-management/mdm/policy-configuration-service-provider#selectlidcloseactiononbattery) | | X | | | | | +| [SelectLidCloseActionPluggedIn](https://docs.microsoft.com/windows/client-management/mdm/policy-configuration-service-provider#selectlidcloseactionpluggedin) | | X | | | | | +| [SelectPowerButtonActionOnBattery](https://docs.microsoft.com/windows/client-management/mdm/policy-configuration-service-provider#selectpowerbuttonactiononbattery) | | X | | | | | +| [SelectPowerButtonActionPluggedIn](https://docs.microsoft.com/windows/client-management/mdm/policy-configuration-service-provider#selectpowerbuttonactionpluggedin) | | X | | | | | +| [SelectSleepButtonActionOnBattery](https://docs.microsoft.com/windows/client-management/mdm/policy-configuration-service-provider#selectsleepbuttonactiononbattery) | | X | | | | | +| [SelectSleepButtonActionPluggedIn](https://docs.microsoft.com/windows/client-management/mdm/policy-configuration-service-provider#selectsleepbuttonactionpluggedin) | | X | | | | | +| [StandbyTimeoutOnBattery](https://docs.microsoft.com/windows/client-management/mdm/policy-configuration-service-provider#StandbyTimeoutOnBattery) | | X | | | | | +| [StandbyTimeoutPluggedIn](https://docs.microsoft.com/windows/client-management/mdm/policy-configuration-service-provider#standbytimeoutpluggedin) | | X | | | | | +| [TurnOffHybridSleepOnBattery](https://docs.microsoft.com/windows/client-management/mdm/policy-configuration-service-provider#turnoffhybridsleeponbattery) | | X | | | | | +| [TurnOffHybridSleepPluggedIn](https://docs.microsoft.com/windows/client-management/mdm/policy-configuration-service-provider#turnoffhybridsleeppluggedin) | | X | | | | | +| [UnattendedSleepTimeoutOnBattery](https://docs.microsoft.com/windows/client-management/mdm/policy-configuration-service-provider#unattendedsleeptimeoutonbattery) | | X | | | | | +| [UnattendedSleepTimeoutPluggedIn](https://docs.microsoft.com/windows/client-management/mdm/policy-configuration-service-provider#unattendedsleeptimeoutpluggedin) | | X | | | | | ## Privacy From 771968bd6d55abb2a13d63b8706131e0392d1fc1 Mon Sep 17 00:00:00 2001 From: Jeanie Decker Date: Wed, 13 Mar 2019 09:33:50 -0700 Subject: [PATCH 067/724] fix power links --- windows/configuration/wcd/wcd-policies.md | 46 +++++++++++------------ 1 file changed, 23 insertions(+), 23 deletions(-) diff --git a/windows/configuration/wcd/wcd-policies.md b/windows/configuration/wcd/wcd-policies.md index 81758ffcf3..6841fc2423 100644 --- a/windows/configuration/wcd/wcd-policies.md +++ b/windows/configuration/wcd/wcd-policies.md @@ -341,9 +341,9 @@ To configure multiple URLs for **Blocked URL Exceptions** or **Blocked URLs** in | Setting | Description | Desktop editions | Mobile editions | Surface Hub | HoloLens | IoT Core | | --- | --- | :---: | :---: | :---: | :---: | :---: | -| [InteractiveLogon_DoNotDisplayLastSignedIn](https://docs.microsoft.com/windows/client-management/mdm/policy-csp-localpoliciessecurityoptions#localpoliciessecurityoptions-interactivelogon-donotdisplaylastsignedin) | | X | | | | | -| [Shutdown_AllowSystemtobeShutDownWithoutHavingToLogOn](https://docs.microsoft.com/windows/client-management/mdm/policy-csp-localpoliciessecurityoptions#localpoliciessecurityoptions-shutdown-allowsystemtobeshutdownwithouthavingtologon) | | X | | | | | -| [UserAccountControl_BehaviorOfTheElevationPromptForStandardUsers](https://docs.microsoft.com/windows/client-management/mdm/policy-csp-localpoliciessecurityoptions#localpoliciessecurityoptions-useraccountcontrol-behavioroftheelevationpromptforstandardusers) | | X | | | | | +| [InteractiveLogon_DoNotDisplayLastSignedIn](https://docs.microsoft.com/windows/client-management/mdm/policy-csp-localpoliciessecurityoptions#localpoliciessecurityoptions-interactivelogon-donotdisplaylastsignedin) | Specify whether the Windows sign-in screen will show the username of the last person who signed in. | X | | | | | +| [Shutdown_AllowSystemtobeShutDownWithoutHavingToLogOn](https://docs.microsoft.com/windows/client-management/mdm/policy-csp-localpoliciessecurityoptions#localpoliciessecurityoptions-shutdown-allowsystemtobeshutdownwithouthavingtologon) | Specify whether a computer can be shut down without signing in. | X | | | | | +| [UserAccountControl_BehaviorOfTheElevationPromptForStandardUsers](https://docs.microsoft.com/windows/client-management/mdm/policy-csp-localpoliciessecurityoptions#localpoliciessecurityoptions-useraccountcontrol-behavioroftheelevationpromptforstandardusers) | Configure how an elevation prompt should behave for standard users. | X | | | | | ## Location @@ -355,26 +355,26 @@ To configure multiple URLs for **Blocked URL Exceptions** or **Blocked URLs** in | Setting | Description | Desktop editions | Mobile editions | Surface Hub | HoloLens | IoT Core | | --- | --- | :---: | :---: | :---: | :---: | :---: | -| [AllowStandbyStatesWhenSleepingOnBattery](https://docs.microsoft.com/windows/client-management/mdm/policy-configuration-service-provider#allowstandbystateswhensleepingonbattery) | | X | | | | | -| [AllowStandbyWhenSleepingPluggedIn](https://docs.microsoft.com/windows/client-management/mdm/policy-configuration-service-provider#allowstandbystateswhensleepingpluggedin) | | X | | | | | -| [DisplayOffTimeoutOnBattery](https://docs.microsoft.com/windows/client-management/mdm/policy-configuration-service-provider#displayofftimeoutonbattery) | | X | | | | | -| [DisplayOffTimeoutPluggedIn](https://docs.microsoft.com/windows/client-management/mdm/policy-configuration-service-provider#displayofftimeoutpluggedin) | | X | | | | | -| [EnergySaverBatteryThresholdOnBattery](https://docs.microsoft.com/windows/client-management/mdm/policy-configuration-service-provider#energysaverbatterythresholdonbattery) | | X | | | | | -| [EnergySaverBatteryThresholdPluggedIn](https://docs.microsoft.com/windows/client-management/mdm/policy-configuration-service-provider#EnergySaverBatteryThresholdPluggedIn) | | X | | | | | -| [HibernateTimeoutOnBattery](https://docs.microsoft.com/windows/client-management/mdm/policy-configuration-service-provider#hibernatetimeoutonbattery) | | X | | | | | -| [HibernateTimeoutPluggedIn](https://docs.microsoft.com/windows/client-management/mdm/policy-configuration-service-provider#hibernatetimeoutpluggedin) | | X | | | | | -| [SelectLidCloseActionOnBattery](https://docs.microsoft.com/windows/client-management/mdm/policy-configuration-service-provider#selectlidcloseactiononbattery) | | X | | | | | -| [SelectLidCloseActionPluggedIn](https://docs.microsoft.com/windows/client-management/mdm/policy-configuration-service-provider#selectlidcloseactionpluggedin) | | X | | | | | -| [SelectPowerButtonActionOnBattery](https://docs.microsoft.com/windows/client-management/mdm/policy-configuration-service-provider#selectpowerbuttonactiononbattery) | | X | | | | | -| [SelectPowerButtonActionPluggedIn](https://docs.microsoft.com/windows/client-management/mdm/policy-configuration-service-provider#selectpowerbuttonactionpluggedin) | | X | | | | | -| [SelectSleepButtonActionOnBattery](https://docs.microsoft.com/windows/client-management/mdm/policy-configuration-service-provider#selectsleepbuttonactiononbattery) | | X | | | | | -| [SelectSleepButtonActionPluggedIn](https://docs.microsoft.com/windows/client-management/mdm/policy-configuration-service-provider#selectsleepbuttonactionpluggedin) | | X | | | | | -| [StandbyTimeoutOnBattery](https://docs.microsoft.com/windows/client-management/mdm/policy-configuration-service-provider#StandbyTimeoutOnBattery) | | X | | | | | -| [StandbyTimeoutPluggedIn](https://docs.microsoft.com/windows/client-management/mdm/policy-configuration-service-provider#standbytimeoutpluggedin) | | X | | | | | -| [TurnOffHybridSleepOnBattery](https://docs.microsoft.com/windows/client-management/mdm/policy-configuration-service-provider#turnoffhybridsleeponbattery) | | X | | | | | -| [TurnOffHybridSleepPluggedIn](https://docs.microsoft.com/windows/client-management/mdm/policy-configuration-service-provider#turnoffhybridsleeppluggedin) | | X | | | | | -| [UnattendedSleepTimeoutOnBattery](https://docs.microsoft.com/windows/client-management/mdm/policy-configuration-service-provider#unattendedsleeptimeoutonbattery) | | X | | | | | -| [UnattendedSleepTimeoutPluggedIn](https://docs.microsoft.com/windows/client-management/mdm/policy-configuration-service-provider#unattendedsleeptimeoutpluggedin) | | X | | | | | +| [AllowStandbyStatesWhenSleepingOnBattery](https://docs.microsoft.com/windows/client-management/mdm/policy-csp-power#allowstandbystateswhensleepingonbattery) | | X | | | | | +| [AllowStandbyWhenSleepingPluggedIn](https://docs.microsoft.com/windows/client-management/mdm/policy-csp-power#allowstandbystateswhensleepingpluggedin) | | X | | | | | +| [DisplayOffTimeoutOnBattery](https://docs.microsoft.com/windows/client-management/mdm/policy-csp-power#displayofftimeoutonbattery) | | X | | | | | +| [DisplayOffTimeoutPluggedIn](https://docs.microsoft.com/windows/client-management/mdm/policy-csp-power#displayofftimeoutpluggedin) | | X | | | | | +| [EnergySaverBatteryThresholdOnBattery](https://docs.microsoft.com/windows/client-management/mdm/policy-csp-power#energysaverbatterythresholdonbattery) | | X | | | | | +| [EnergySaverBatteryThresholdPluggedIn](https://docs.microsoft.com/windows/client-management/mdm/policy-csp-power#EnergySaverBatteryThresholdPluggedIn) | | X | | | | | +| [HibernateTimeoutOnBattery](https://docs.microsoft.com/windows/client-management/mdm/policy-csp-power#hibernatetimeoutonbattery) | | X | | | | | +| [HibernateTimeoutPluggedIn](https://docs.microsoft.com/windows/client-management/mdm/policy-csp-power#hibernatetimeoutpluggedin) | | X | | | | | +| [SelectLidCloseActionOnBattery](https://docs.microsoft.com/windows/client-management/mdm/policy-csp-power#selectlidcloseactiononbattery) | | X | | | | | +| [SelectLidCloseActionPluggedIn](https://docs.microsoft.com/windows/client-management/mdm/policy-csp-power#selectlidcloseactionpluggedin) | | X | | | | | +| [SelectPowerButtonActionOnBattery](https://docs.microsoft.com/windows/client-management/mdm/policy-csp-power#selectpowerbuttonactiononbattery) | | X | | | | | +| [SelectPowerButtonActionPluggedIn](https://docs.microsoft.com/windows/client-management/mdm/policy-csp-power#selectpowerbuttonactionpluggedin) | | X | | | | | +| [SelectSleepButtonActionOnBattery](https://docs.microsoft.com/windows/client-management/mdm/policy-csp-power#selectsleepbuttonactiononbattery) | | X | | | | | +| [SelectSleepButtonActionPluggedIn](https://docs.microsoft.com/windows/client-management/mdm/policy-csp-power#selectsleepbuttonactionpluggedin) | | X | | | | | +| [StandbyTimeoutOnBattery](https://docs.microsoft.com/windows/client-management/mdm/policy-csp-power#StandbyTimeoutOnBattery) | | X | | | | | +| [StandbyTimeoutPluggedIn](https://docs.microsoft.com/windows/client-management/mdm/policy-csp-power#standbytimeoutpluggedin) | | X | | | | | +| [TurnOffHybridSleepOnBattery](https://docs.microsoft.com/windows/client-management/mdm/policy-csp-power#turnoffhybridsleeponbattery) | | X | | | | | +| [TurnOffHybridSleepPluggedIn](https://docs.microsoft.com/windows/client-management/mdm/policy-csp-power#turnoffhybridsleeppluggedin) | | X | | | | | +| [UnattendedSleepTimeoutOnBattery](https://docs.microsoft.com/windows/client-management/mdm/policy-csp-power#unattendedsleeptimeoutonbattery) | | X | | | | | +| [UnattendedSleepTimeoutPluggedIn](https://docs.microsoft.com/windows/client-management/mdm/policy-csp-power#unattendedsleeptimeoutpluggedin) | | X | | | | | ## Privacy From c0baa2a12ee832d58480b021ba967c719747a43f Mon Sep 17 00:00:00 2001 From: Jeanie Decker Date: Wed, 13 Mar 2019 10:19:01 -0700 Subject: [PATCH 068/724] sync --- windows/configuration/wcd/wcd-changes.md | 2 ++ windows/configuration/wcd/wcd-policies.md | 19 ++++++++++--------- 2 files changed, 12 insertions(+), 9 deletions(-) diff --git a/windows/configuration/wcd/wcd-changes.md b/windows/configuration/wcd/wcd-changes.md index 4f84e272f5..0100391209 100644 --- a/windows/configuration/wcd/wcd-changes.md +++ b/windows/configuration/wcd/wcd-changes.md @@ -20,6 +20,8 @@ ms.date: 10/02/2018 - [Time](wcd-time.md) - [Cellular > DataClassMappingTable](wcd-cellular.md#dataclassmappingtable) - [OOBE > EnableCortanaVoice](wcd-oobe.md#enablecortanavoice) +- [Policies > LocalPoliciesSecurityOptions](wcd-policies.md#localpoliciessecurityoptions) +- [Policies > Power](wcd-policies.md#power) - [StorageD3InModernStandby](wcd-storaged3inmodernstandby.md) ## Settings removed in Windows 10, version ? diff --git a/windows/configuration/wcd/wcd-policies.md b/windows/configuration/wcd/wcd-policies.md index 6841fc2423..1ad4d0c2ac 100644 --- a/windows/configuration/wcd/wcd-policies.md +++ b/windows/configuration/wcd/wcd-policies.md @@ -355,15 +355,16 @@ To configure multiple URLs for **Blocked URL Exceptions** or **Blocked URLs** in | Setting | Description | Desktop editions | Mobile editions | Surface Hub | HoloLens | IoT Core | | --- | --- | :---: | :---: | :---: | :---: | :---: | -| [AllowStandbyStatesWhenSleepingOnBattery](https://docs.microsoft.com/windows/client-management/mdm/policy-csp-power#allowstandbystateswhensleepingonbattery) | | X | | | | | -| [AllowStandbyWhenSleepingPluggedIn](https://docs.microsoft.com/windows/client-management/mdm/policy-csp-power#allowstandbystateswhensleepingpluggedin) | | X | | | | | -| [DisplayOffTimeoutOnBattery](https://docs.microsoft.com/windows/client-management/mdm/policy-csp-power#displayofftimeoutonbattery) | | X | | | | | -| [DisplayOffTimeoutPluggedIn](https://docs.microsoft.com/windows/client-management/mdm/policy-csp-power#displayofftimeoutpluggedin) | | X | | | | | -| [EnergySaverBatteryThresholdOnBattery](https://docs.microsoft.com/windows/client-management/mdm/policy-csp-power#energysaverbatterythresholdonbattery) | | X | | | | | -| [EnergySaverBatteryThresholdPluggedIn](https://docs.microsoft.com/windows/client-management/mdm/policy-csp-power#EnergySaverBatteryThresholdPluggedIn) | | X | | | | | -| [HibernateTimeoutOnBattery](https://docs.microsoft.com/windows/client-management/mdm/policy-csp-power#hibernatetimeoutonbattery) | | X | | | | | -| [HibernateTimeoutPluggedIn](https://docs.microsoft.com/windows/client-management/mdm/policy-csp-power#hibernatetimeoutpluggedin) | | X | | | | | -| [SelectLidCloseActionOnBattery](https://docs.microsoft.com/windows/client-management/mdm/policy-csp-power#selectlidcloseactiononbattery) | | X | | | | | +| [AllowStandbyStatesWhenSleepingOnBattery](https://docs.microsoft.com/windows/client-management/mdm/policy-csp-power#allowstandbystateswhensleepingonbattery) | Specify whether Windows can use standby states when putting the computer in a sleep state while on battery. | X | | | | | +| [AllowStandbyWhenSleepingPluggedIn](https://docs.microsoft.com/windows/client-management/mdm/policy-csp-power#allowstandbystateswhensleepingpluggedin) | Specify whether Windows can use standby states when putting the computer in a sleep state while plugged in. | X | | | | | +| [DisplayOffTimeoutOnBattery](https://docs.microsoft.com/windows/client-management/mdm/policy-csp-power#displayofftimeoutonbattery) | Specify the period of inactivity before Windows turns off the display while on battery. | X | | | | | +| [DisplayOffTimeoutPluggedIn](https://docs.microsoft.com/windows/client-management/mdm/policy-csp-power#displayofftimeoutpluggedin) | Specify the period of inactivity before Windows turns off the display while plugged in. | X | | | | | +| [EnergySaverBatteryThresholdOnBattery](https://docs.microsoft.com/windows/client-management/mdm/policy-csp-power#energysaverbatterythresholdonbattery) | Specify the battery charge level at which Energy Saver is turned on while on battery. | X | | | | | +| [EnergySaverBatteryThresholdPluggedIn](https://docs.microsoft.com/windows/client-management/mdm/policy-csp-power#EnergySaverBatteryThresholdPluggedIn) | Specify the battery charge level at which Energy Saver is turned on while plugged in. | X | | | | | +| [HibernateTimeoutOnBattery](https://docs.microsoft.com/windows/client-management/mdm/policy-csp-power#hibernatetimeoutonbattery) | Specify the period of inactivity before Windows transitions the system to hibernate while on battery. | X | | | | | +| [HibernateTimeoutPluggedIn](https://docs.microsoft.com/windows/client-management/mdm/policy-csp-power#hibernatetimeoutpluggedin) | Specify the period of inactivity before Windows transitions the system to hibernate while plugged in. | X | | | | | +| [RequirePasswordWhenComputerWakesOnBattery](https://docs.microsoft.com/windows/client-management/mdm/policy-csp-power#requirepasswordwhencomputerwakesonbattery) | | X | | | | | +| [RequirePasswordWhenComputerWakesPluggedIn](https://docs.microsoft.com/windows/client-management/mdm/policy-csp-power#requirepasswordwhencomputerwakespluggedin) | | X | | | | | | [SelectLidCloseActionPluggedIn](https://docs.microsoft.com/windows/client-management/mdm/policy-csp-power#selectlidcloseactionpluggedin) | | X | | | | | | [SelectPowerButtonActionOnBattery](https://docs.microsoft.com/windows/client-management/mdm/policy-csp-power#selectpowerbuttonactiononbattery) | | X | | | | | | [SelectPowerButtonActionPluggedIn](https://docs.microsoft.com/windows/client-management/mdm/policy-csp-power#selectpowerbuttonactionpluggedin) | | X | | | | | From 2b70eca0f1d7364025771acfe27cb037e80f366c Mon Sep 17 00:00:00 2001 From: Jeanie Decker Date: Wed, 13 Mar 2019 12:32:01 -0700 Subject: [PATCH 069/724] finish power policies --- windows/configuration/wcd/wcd-policies.md | 27 ++++++++++++----------- 1 file changed, 14 insertions(+), 13 deletions(-) diff --git a/windows/configuration/wcd/wcd-policies.md b/windows/configuration/wcd/wcd-policies.md index 1ad4d0c2ac..814e7fbc1d 100644 --- a/windows/configuration/wcd/wcd-policies.md +++ b/windows/configuration/wcd/wcd-policies.md @@ -363,19 +363,20 @@ To configure multiple URLs for **Blocked URL Exceptions** or **Blocked URLs** in | [EnergySaverBatteryThresholdPluggedIn](https://docs.microsoft.com/windows/client-management/mdm/policy-csp-power#EnergySaverBatteryThresholdPluggedIn) | Specify the battery charge level at which Energy Saver is turned on while plugged in. | X | | | | | | [HibernateTimeoutOnBattery](https://docs.microsoft.com/windows/client-management/mdm/policy-csp-power#hibernatetimeoutonbattery) | Specify the period of inactivity before Windows transitions the system to hibernate while on battery. | X | | | | | | [HibernateTimeoutPluggedIn](https://docs.microsoft.com/windows/client-management/mdm/policy-csp-power#hibernatetimeoutpluggedin) | Specify the period of inactivity before Windows transitions the system to hibernate while plugged in. | X | | | | | -| [RequirePasswordWhenComputerWakesOnBattery](https://docs.microsoft.com/windows/client-management/mdm/policy-csp-power#requirepasswordwhencomputerwakesonbattery) | | X | | | | | -| [RequirePasswordWhenComputerWakesPluggedIn](https://docs.microsoft.com/windows/client-management/mdm/policy-csp-power#requirepasswordwhencomputerwakespluggedin) | | X | | | | | -| [SelectLidCloseActionPluggedIn](https://docs.microsoft.com/windows/client-management/mdm/policy-csp-power#selectlidcloseactionpluggedin) | | X | | | | | -| [SelectPowerButtonActionOnBattery](https://docs.microsoft.com/windows/client-management/mdm/policy-csp-power#selectpowerbuttonactiononbattery) | | X | | | | | -| [SelectPowerButtonActionPluggedIn](https://docs.microsoft.com/windows/client-management/mdm/policy-csp-power#selectpowerbuttonactionpluggedin) | | X | | | | | -| [SelectSleepButtonActionOnBattery](https://docs.microsoft.com/windows/client-management/mdm/policy-csp-power#selectsleepbuttonactiononbattery) | | X | | | | | -| [SelectSleepButtonActionPluggedIn](https://docs.microsoft.com/windows/client-management/mdm/policy-csp-power#selectsleepbuttonactionpluggedin) | | X | | | | | -| [StandbyTimeoutOnBattery](https://docs.microsoft.com/windows/client-management/mdm/policy-csp-power#StandbyTimeoutOnBattery) | | X | | | | | -| [StandbyTimeoutPluggedIn](https://docs.microsoft.com/windows/client-management/mdm/policy-csp-power#standbytimeoutpluggedin) | | X | | | | | -| [TurnOffHybridSleepOnBattery](https://docs.microsoft.com/windows/client-management/mdm/policy-csp-power#turnoffhybridsleeponbattery) | | X | | | | | -| [TurnOffHybridSleepPluggedIn](https://docs.microsoft.com/windows/client-management/mdm/policy-csp-power#turnoffhybridsleeppluggedin) | | X | | | | | -| [UnattendedSleepTimeoutOnBattery](https://docs.microsoft.com/windows/client-management/mdm/policy-csp-power#unattendedsleeptimeoutonbattery) | | X | | | | | -| [UnattendedSleepTimeoutPluggedIn](https://docs.microsoft.com/windows/client-management/mdm/policy-csp-power#unattendedsleeptimeoutpluggedin) | | X | | | | | +| [RequirePasswordWhenComputerWakesOnBattery](https://docs.microsoft.com/windows/client-management/mdm/policy-csp-power#requirepasswordwhencomputerwakesonbattery) | Specify whether the user is prompted for a password when the system resumes from sleep while on battery. | X | | | | | +| [RequirePasswordWhenComputerWakesPluggedIn](https://docs.microsoft.com/windows/client-management/mdm/policy-csp-power#requirepasswordwhencomputerwakespluggedin) | Specify whether the user is prompted for a password when the system resumes from sleep while plugged in. | X | | | | | +| [SelectLidCloseActionBattery](https://docs.microsoft.com/windows/client-management/mdm/policy-csp-power#selectlidcloseactionpluggedin) | Select the action to be taken when a user closes the lid on a mobile device while on battery. | X | | | | | +| [SelectLidCloseActionPluggedIn](https://docs.microsoft.com/windows/client-management/mdm/policy-csp-power#selectlidcloseactionpluggedin) | Select the action to be taken when a user closes the lid on a mobile device while on plugged in. | X | | | | | +| [SelectPowerButtonActionOnBattery](https://docs.microsoft.com/windows/client-management/mdm/policy-csp-power#selectpowerbuttonactiononbattery) | Select the action to be taken when the user presses the power button while on battery. | X | | | | | +| [SelectPowerButtonActionPluggedIn](https://docs.microsoft.com/windows/client-management/mdm/policy-csp-power#selectpowerbuttonactionpluggedin) | Select the action to be taken when the user presses the power button while on plugged in. | X | | | | | +| [SelectSleepButtonActionOnBattery](https://docs.microsoft.com/windows/client-management/mdm/policy-csp-power#selectsleepbuttonactiononbattery) | Select the action to be taken when the user presses the sleep button while on battery. | X | | | | | +| [SelectSleepButtonActionPluggedIn](https://docs.microsoft.com/windows/client-management/mdm/policy-csp-power#selectsleepbuttonactionpluggedin) | Select the action to be taken when the user presses the sleep button while plugged in. | X | | | | | +| [StandbyTimeoutOnBattery](https://docs.microsoft.com/windows/client-management/mdm/policy-csp-power#StandbyTimeoutOnBattery) | Specify the period of inactivity before Windows transitions the system to sleep while on battery. | X | | | | | +| [StandbyTimeoutPluggedIn](https://docs.microsoft.com/windows/client-management/mdm/policy-csp-power#standbytimeoutpluggedin) | Specify the period of inactivity before Windows transitions the system to sleep while plugged in. | X | | | | | +| [TurnOffHybridSleepOnBattery](https://docs.microsoft.com/windows/client-management/mdm/policy-csp-power#turnoffhybridsleeponbattery) | Turn off hybrid sleep while on battery. | X | | | | | +| [TurnOffHybridSleepPluggedIn](https://docs.microsoft.com/windows/client-management/mdm/policy-csp-power#turnoffhybridsleeppluggedin) | Turn off hybrid sleep while plugged in. | X | | | | | +| [UnattendedSleepTimeoutOnBattery](https://docs.microsoft.com/windows/client-management/mdm/policy-csp-power#unattendedsleeptimeoutonbattery) | Specify the period of inactivity before Windows transitions the system to sleep automatically when a user is not present while on battery. | X | | | | | +| [UnattendedSleepTimeoutPluggedIn](https://docs.microsoft.com/windows/client-management/mdm/policy-csp-power#unattendedsleeptimeoutpluggedin) | Specify the period of inactivity before Windows transitions the system to sleep automatically when a user is not present while plugged in. | X | | | | | ## Privacy From 93c25b80e4e7a7385419b04495f5217cad0554c1 Mon Sep 17 00:00:00 2001 From: Jeanie Decker Date: Wed, 13 Mar 2019 12:38:00 -0700 Subject: [PATCH 070/724] update timezone --- windows/configuration/wcd/wcd-time.md | 12 ++++++++++-- 1 file changed, 10 insertions(+), 2 deletions(-) diff --git a/windows/configuration/wcd/wcd-time.md b/windows/configuration/wcd/wcd-time.md index 53ddcd5768..57086da3c3 100644 --- a/windows/configuration/wcd/wcd-time.md +++ b/windows/configuration/wcd/wcd-time.md @@ -23,7 +23,15 @@ Use **Time** to configure settings for time zone setup for Windows 10, version ( ## ProvisionSetTimeZone -Set to **True** to skip time zone assignment when the first user signs in. +Set to **True** to skip time zone assignment when the first user signs in, in which case the device will remain in its default time zone. For the proper configuration, you should also use **Policies > TimeLanguageSettings > ConfigureTimeZone** to set the default time zone. + +>[!TIP] +>Configuring a time zone in **Policies > TimeLanguageSettings > ConfigureTimeZone** accomplishes the same purpose as setting **ProvisionSetTimeZone** to **True**, so you don't need to configure both settings. + +Set to **False** for time zone assignment to occur when the first user signs in. The user will be prompted to select a time zone during first sign-in. + +>[!NOTE] +>Do not set **Time > ProvisionSetTimeZone** to **False** and also set a time zone in **Policies > TimeLanguageSettings > ConfigureTimeZone**. + -Set to **False** for time zone assignment to occur when the first user signs in. From f423a5a632b6148886a3250073ee5ba225d81455 Mon Sep 17 00:00:00 2001 From: Jeanie Decker Date: Fri, 15 Mar 2019 06:13:18 -0700 Subject: [PATCH 071/724] fix cortana voice setting --- windows/configuration/wcd/wcd-oobe.md | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/windows/configuration/wcd/wcd-oobe.md b/windows/configuration/wcd/wcd-oobe.md index 5e91bed7c9..6bf1ca1d44 100644 --- a/windows/configuration/wcd/wcd-oobe.md +++ b/windows/configuration/wcd/wcd-oobe.md @@ -29,7 +29,7 @@ Use to configure settings for the [Out Of Box Experience (OOBE)](https://docs.mi ## EnableCortanaVoice -Use this setting to control whether Cortana voice-over is enabled during OOBE. The voice-over is disabled by default on Windows 10 Pro, Education, and Enterprise. The voice-over is enabled by default on Windows 10 Home. Select **True** to enable voice-over during OOBE on all Windows 10 editions. +Use this setting to control whether Cortana voice-over is enabled during OOBE. The voice-over is disabled by default on Windows 10 Pro, Education, and Enterprise. The voice-over is enabled by default on Windows 10 Home. Select **True** to enable voice-over during OOBE, or **False** to disable voice-over during OOBE. ## HideOobe for desktop From 4c2d4f7ba9ebcfbb6ab09b4aa7e896c069a0caa3 Mon Sep 17 00:00:00 2001 From: Brian Lich Date: Fri, 15 Mar 2019 09:16:55 -0700 Subject: [PATCH 072/724] new build 3/15/2019 9:16 AM --- ...ndows-diagnostic-events-and-fields-1903.md | 164 +++++++++++------- 1 file changed, 106 insertions(+), 58 deletions(-) diff --git a/windows/privacy/basic-level-windows-diagnostic-events-and-fields-1903.md b/windows/privacy/basic-level-windows-diagnostic-events-and-fields-1903.md index cd3421c1a4..2faca0d1a1 100644 --- a/windows/privacy/basic-level-windows-diagnostic-events-and-fields-1903.md +++ b/windows/privacy/basic-level-windows-diagnostic-events-and-fields-1903.md @@ -13,7 +13,7 @@ manager: dansimp ms.collection: M365-security-compliance ms.topic: article audience: ITPro -ms.date: 03/13/2019 +ms.date: 03/15/2019 --- @@ -3797,30 +3797,30 @@ The following fields are available: ### Microsoft.Windows.Kernel.PnP.AggregateClearDevNodeProblem -No content is currently available. +This event is sent when a problem code is cleared from a device. The following fields are available: -- **Count** No content is currently available. -- **DeviceInstanceId** No content is currently available. -- **LastProblem** No content is currently available. -- **LastProblemStatus** No content is currently available. -- **ServiceName** No content is currently available. +- **Count** The total number of events. +- **DeviceInstanceId** The unique identifier of the device on the system. +- **LastProblem** The previous problem that was cleared. +- **LastProblemStatus** The previous NTSTATUS value that was cleared. +- **ServiceName** The name of the driver or service attached to the device. ### Microsoft.Windows.Kernel.PnP.AggregateSetDevNodeProblem -No content is currently available. +This event is sent when a new problem code is assigned to a device. The following fields are available: -- **Count** No content is currently available. -- **DeviceInstanceId** No content is currently available. -- **LastProblem** No content is currently available. -- **LastProblemStatus** No content is currently available. -- **Problem** No content is currently available. -- **ProblemStatus** No content is currently available. -- **ServiceName** No content is currently available. +- **Count** The total number of events. +- **DeviceInstanceId** The unique identifier of the device in the system. +- **LastProblem** The previous problem code that was set on the device. +- **LastProblemStatus** The previous NTSTATUS value that was set on the device. +- **Problem** The new problem code that was set on the device. +- **ProblemStatus** The new NTSTATUS value that was set on the device. +- **ServiceName** The driver or service name that is attached to the device. ## Miracast events @@ -3901,84 +3901,84 @@ The following fields are available: ### MicArrayGeometry -No content is currently available. +This event provides information about the layout of the individual microphone elements in the microphone array. The following fields are available: -- **MicCoords** No content is currently available. -- **usFrequencyBandHi** No content is currently available. -- **usFrequencyBandLo** No content is currently available. -- **usMicArrayType** No content is currently available. -- **usNumberOfMicrophones** No content is currently available. -- **usVersion** No content is currently available. -- **wHorizontalAngleBegin** No content is currently available. -- **wHorizontalAngleEnd** No content is currently available. -- **wVerticalAngleBegin** No content is currently available. -- **wVerticalAngleEnd** No content is currently available. +- **MicCoords** The location and orientation of the microphone element. +- **usFrequencyBandHi** The high end of the frequency range for the microphone. +- **usFrequencyBandLo** The low end of the frequency range for the microphone. +- **usMicArrayType** The type of the microphone array. +- **usNumberOfMicrophones** The number of microphones in the array. +- **usVersion** The version of the microphone array specification. +- **wHorizontalAngleBegin** The horizontal angle of the start of the working volume (reported as radians times 10,000). +- **wHorizontalAngleEnd** The horizontal angle of the end of the working volume (reported as radians times 10,000). +- **wVerticalAngleBegin** The vertical angle of the start of the working volume (reported as radians times 10,000). +- **wVerticalAngleEnd** The vertical angle of the end of the working volume (reported as radians times 10,000). ### MicCoords -No content is currently available. +This event provides information about the location and orientation of the microphone element. The following fields are available: -- **usType** No content is currently available. -- **wHorizontalAngle** No content is currently available. -- **wVerticalAngle** No content is currently available. -- **wXCoord** No content is currently available. -- **wYCoord** No content is currently available. -- **wZCoord** No content is currently available. +- **usType** The type of microphone. +- **wHorizontalAngle** The horizontal angle of the microphone (reported as radians times 10,000). +- **wVerticalAngle** The vertical angle of the microphone (reported as radians times 10,000). +- **wXCoord** The x-coordinate of the microphone. +- **wYCoord** The y-coordinate of the microphone. +- **wZCoord** The z-coordinate of the microphone. ### Microsoft.Windows.Audio.EndpointBuilder.DeviceInfo -No content is currently available. +This event logs the successful enumeration of an audio endpoint (such as a microphone or speaker) and provides information about the audio endpoint. The following fields are available: -- **BusEnumeratorName** No content is currently available. -- **ContainerId** No content is currently available. -- **DeviceInstanceId** No content is currently available. -- **EndpointDevnodeId** No content is currently available. +- **BusEnumeratorName** The name of the bus enumerator (for example, HDAUDIO or USB). +- **ContainerId** An identifier that uniquely groups the functional devices associated with a single-function or multifunction device. +- **DeviceInstanceId** The unique identifier for this instance of the device. +- **EndpointDevnodeId** The IMMDevice identifier of the associated devnode. - **endpointEffectClsid** No content is currently available. - **endpointEffectModule** No content is currently available. -- **EndpointFormFactor** No content is currently available. -- **endpointID** No content is currently available. -- **endpointInstanceId** No content is currently available. -- **Flow** No content is currently available. +- **EndpointFormFactor** The enumeration value for the form factor of the endpoint device (for example speaker, microphone, remote network device). +- **endpointID** The unique identifier for the audio endpoint. +- **endpointInstanceId** The unique identifier for the software audio endpoint. Used for joining to other audio event. +- **Flow** Indicates whether the endpoint is capture (1) or render (0). - **globalEffectClsid** No content is currently available. - **globalEffectModule** No content is currently available. -- **HWID** No content is currently available. -- **IsBluetooth** No content is currently available. +- **HWID** The hardware identifier for the endpoint. +- **IsBluetooth** Indicates whether the device is a Bluetooth device. - **isFarField** No content is currently available. -- **IsSideband** No content is currently available. -- **IsUSB** No content is currently available. -- **JackSubType** No content is currently available. +- **IsSideband** Indicates whether the device is a sideband device. +- **IsUSB** Indicates whether the device is a USB device. +- **JackSubType** A unique ID representing the KS node type of the endpoint. - **localEffectClsid** No content is currently available. - **localEffectModule** No content is currently available. -- **MicArrayGeometry** No content is currently available. See [MicArrayGeometry](#micarraygeometry). +- **MicArrayGeometry** Describes the microphone array, including the microphone position, coordinates, type, and frequency range. See [MicArrayGeometry](#micarraygeometry). - **modeEffectClsid** No content is currently available. - **modeEffectModule** No content is currently available. -- **persistentId** No content is currently available. +- **persistentId** A unique ID for this endpoint which is retained across migrations. - **streamEffectClsid** No content is currently available. - **streamEffectModule** No content is currently available. ### Microsoft.Windows.DriverInstall.DeviceInstall -No content is currently available. +This critical event sends device instance properties for the driver installation that took place. The following fields are available: -- **ClassGuid** No content is currently available. -- **ClassLowerFilters** No content is currently available. -- **ClassUpperFilters** No content is currently available. -- **CoInstallers** No content is currently available. -- **ConfigFlags** No content is currently available. -- **DeviceConfigured** No content is currently available. -- **DeviceInstanceId** No content is currently available. -- **DeviceStack** No content is currently available. +- **ClassGuid** The unique ID for the device class. +- **ClassLowerFilters** The list of lower filter class drivers. +- **ClassUpperFilters** The list of upper filter class drivers. +- **CoInstallers** The list of coinstallers. +- **ConfigFlags** The device configuration flags. +- **DeviceConfigured** Indicates whether this device was configured through the kernel configuration. +- **DeviceInstanceId** The unique identifier of the device in the system. +- **DeviceStack** The device stack of the driver being installed. - **DriverDate** No content is currently available. - **DriverDescription** No content is currently available. - **DriverInfName** No content is currently available. @@ -5045,6 +5045,34 @@ The following fields are available: - **sessionID** The ID of this push-button reset session. +### Microsoft.Windows.UEFI.ESRT + +No content is currently available. + +The following fields are available: + +- **DriverFirmwareFilename** No content is currently available. +- **DriverFirmwarePolicy** No content is currently available. +- **DriverFirmwareStatus** No content is currently available. +- **DriverFirmwareVersion** No content is currently available. +- **FirmareLastAttemptVersion** No content is currently available. +- **FirmwareId** No content is currently available. +- **FirmwareLastAttemptStatus** No content is currently available. +- **FirmwareLastAttemptVersion** No content is currently available. +- **FirmwareType** No content is currently available. +- **FirmwareVersion** No content is currently available. +- **InitiateUpdate** No content is currently available. +- **LastAttemptDate** No content is currently available. +- **LastAttemptStatus** No content is currently available. +- **LastAttemptVersion** No content is currently available. +- **LowestSupportedFirmwareVersion** No content is currently available. +- **MaxRetryCount** No content is currently available. +- **PartA_PrivTags** No content is currently available. +- **RetryCount** No content is currently available. +- **Status** No content is currently available. +- **UpdateAttempted** No content is currently available. + + ### Microsoft.Xbox.XamTelemetry.AppActivationError This event indicates whether the system detected an activation error in the app. @@ -7165,6 +7193,26 @@ The following fields are available: - **wuDeviceid** The unique device ID used by Windows Update. +### Microsoft.Windows.Update.Orchestrator.DetectionActivity + +No content is currently available. + +The following fields are available: + +- **applicableUpdateIdList** No content is currently available. +- **applicableUpdateList** No content is currently available. +- **durationInSeconds** No content is currently available. +- **expeditedMode** No content is currently available. +- **networkCostPolicy** No content is currently available. +- **scanTriggerSource** No content is currently available. +- **scenario** No content is currently available. +- **scenarioReason** No content is currently available. +- **seekerUpdateIdList** No content is currently available. +- **seekerUpdateList** No content is currently available. +- **services** No content is currently available. +- **wilActivity** No content is currently available. See [wilActivity](#wilactivity). + + ### Microsoft.Windows.Update.Orchestrator.DisplayNeeded This event indicates the reboot was postponed due to needing a display. From 5f6aea33f705ed73bf7902534a6b512d09efa791 Mon Sep 17 00:00:00 2001 From: Brian Lich Date: Fri, 15 Mar 2019 09:17:00 -0700 Subject: [PATCH 073/724] new build 3/15/2019 9:16 AM --- ...ndows-diagnostic-events-and-fields-1703.md | 19 +- ...ndows-diagnostic-events-and-fields-1709.md | 19 +- ...ndows-diagnostic-events-and-fields-1803.md | 19 +- ...ndows-diagnostic-events-and-fields-1809.md | 175 ++++++------------ 4 files changed, 115 insertions(+), 117 deletions(-) diff --git a/windows/privacy/basic-level-windows-diagnostic-events-and-fields-1703.md b/windows/privacy/basic-level-windows-diagnostic-events-and-fields-1703.md index 3fad353220..4aebdedd33 100644 --- a/windows/privacy/basic-level-windows-diagnostic-events-and-fields-1703.md +++ b/windows/privacy/basic-level-windows-diagnostic-events-and-fields-1703.md @@ -13,7 +13,7 @@ manager: dansimp ms.collection: M365-security-compliance ms.topic: article audience: ITPro -ms.date: 03/13/2019 +ms.date: 03/15/2019 --- @@ -2954,6 +2954,23 @@ The following fields are available: - **winInetError** The HResult of the operation. +## Other events + +### Microsoft.Windows.Shell.PrivacyNotifierLogging.PrivacyNotifierCompleted + +No content is currently available. + +The following fields are available: + +- **cleanupTask** No content is currently available. +- **cleanupTaskResult** No content is currently available. +- **deviceEvaluated** No content is currently available. +- **deviceImpacted** No content is currently available. +- **modalAction** No content is currently available. +- **modalResult** No content is currently available. +- **resetSettingsResult** No content is currently available. + + ## Remediation events ### Microsoft.Windows.Remediation.Applicable diff --git a/windows/privacy/basic-level-windows-diagnostic-events-and-fields-1709.md b/windows/privacy/basic-level-windows-diagnostic-events-and-fields-1709.md index 4a60d0147d..0fa19351b5 100644 --- a/windows/privacy/basic-level-windows-diagnostic-events-and-fields-1709.md +++ b/windows/privacy/basic-level-windows-diagnostic-events-and-fields-1709.md @@ -13,7 +13,7 @@ manager: dansimp ms.collection: M365-security-compliance ms.topic: article audience: ITPro -ms.date: 03/13/2019 +ms.date: 03/15/2019 --- @@ -3107,6 +3107,23 @@ The following fields are available: - **winInetError** The HResult of the operation. +## Other events + +### Microsoft.Windows.Shell.PrivacyNotifierLogging.PrivacyNotifierCompleted + +No content is currently available. + +The following fields are available: + +- **cleanupTask** No content is currently available. +- **cleanupTaskResult** No content is currently available. +- **deviceEvaluated** No content is currently available. +- **deviceImpacted** No content is currently available. +- **modalAction** No content is currently available. +- **modalResult** No content is currently available. +- **resetSettingsResult** No content is currently available. + + ## Remediation events ### Microsoft.Windows.Remediation.Applicable diff --git a/windows/privacy/basic-level-windows-diagnostic-events-and-fields-1803.md b/windows/privacy/basic-level-windows-diagnostic-events-and-fields-1803.md index d472800547..cc061437ac 100644 --- a/windows/privacy/basic-level-windows-diagnostic-events-and-fields-1803.md +++ b/windows/privacy/basic-level-windows-diagnostic-events-and-fields-1803.md @@ -13,7 +13,7 @@ manager: dansimp ms.collection: M365-security-compliance ms.topic: article audience: ITPro -ms.date: 03/13/2019 +ms.date: 03/15/2019 --- @@ -4061,6 +4061,23 @@ The following fields are available: - **winInetError** The HResult of the operation. +## Other events + +### Microsoft.Windows.Shell.PrivacyNotifierLogging.PrivacyNotifierCompleted + +No content is currently available. + +The following fields are available: + +- **cleanupTask** No content is currently available. +- **cleanupTaskResult** No content is currently available. +- **deviceEvaluated** No content is currently available. +- **deviceImpacted** No content is currently available. +- **modalAction** No content is currently available. +- **modalResult** No content is currently available. +- **resetSettingsResult** No content is currently available. + + ## Privacy consent logging events ### Microsoft.Windows.Shell.PrivacyConsentLogging.PrivacyConsentCompleted diff --git a/windows/privacy/basic-level-windows-diagnostic-events-and-fields-1809.md b/windows/privacy/basic-level-windows-diagnostic-events-and-fields-1809.md index 85613743bd..db961c12d8 100644 --- a/windows/privacy/basic-level-windows-diagnostic-events-and-fields-1809.md +++ b/windows/privacy/basic-level-windows-diagnostic-events-and-fields-1809.md @@ -13,7 +13,7 @@ manager: dansimp ms.collection: M365-security-compliance ms.topic: article audience: ITPro -ms.date: 03/13/2019 +ms.date: 03/15/2019 --- @@ -2208,6 +2208,7 @@ The following fields are available: - **UserNotificationListener** Current state of the notifications setting. - **VideosLibrary** Current state of the videos library setting. - **Webcam** Current state of the camera setting. +- **WiFaDirect** No content is currently available. - **WiFiDirect** Current state of the Wi-Fi direct setting. @@ -2446,8 +2447,8 @@ Describes the installation state for all hardware and software components availa The following fields are available: - **action** The change that was invoked on a device inventory object. +- **cction** No content is currently available. - **inventoryId** Device ID used for Compatibility testing -- **objectIîstanceId** No content is currently available. - **objectInstanceId** Object identity which is unique within the device scope. - **objectType** Indicates the object type that the event applies to. - **syncId** A string used to group StartSync, EndSync, Add, and Remove operations that belong together. This field is unique by Sync period and is used to disambiguate in situations where multiple agents perform overlapping inventories for the same object. @@ -2674,19 +2675,13 @@ Fired by UTC at startup to signal what data we are allowed to collect. The following fields are available: - **CanAddMsaToMsTelemetry** True if we can add MSA PUID and CID to telemetry, false otherwise. -- **CanCol|ectCoreTelemetry** No content is currently available. -- **CanCollactCoreTelemetry** No content is currently available. -- **CanCollec|AnyTelemetry** No content is currently available. - **CanCollectAnyTelemetry** True if we are allowed to collect partner telemetry, false otherwise. - **CanCollectCoreTelemetry** True if we can collect CORE/Basic telemetry, false otherwise. - **CanCollectHeartbeats** True if we can collect heartbeat telemetry, false otherwise. - **CanCollectOsTelemetry** True if we can collect diagnostic data telemetry, false otherwise. - **CanCollectWindowsAnalyticsEvents** True if we can collect Windows Analytics data, false otherwise. - **CanPerformDiagnosticEscalations** True if we can perform diagnostic escalation collection, false otherwise. -- **CanPerformDiagnostigEscalations** No content is currently available. -- **CanPerformDkagnosticEscalations** No content is currently available. - **CanPerformTraceEscalations** True if we can perform trace escalation collection, false otherwise. -- **CanReportScanarios** No content is currently available. - **CanReportScenarios** True if we can report scenario completions, false otherwise. - **PreviousPermissions** Bitmask of previous telemetry state. - **TransitionFromEverythingOff** True if we are transitioning from all telemetry being disabled, false otherwise. @@ -2713,39 +2708,23 @@ This event sends data about the health and quality of the diagnostic data from t The following fields are available: -- **AgentConnctionErrorsCount** No content is currently available. - **AgentConnectionErrorsCount** Number of non-timeout errors associated with the host/agent channel. -- **AgenticenectionErrorsCount** No content is currently available. -- **CeesusExitCode** No content is currently available. -- **CeesusStartTime** No content is currently available. -- **CeesusTaskEnabled** No content is currently available. - **CensusExitCode** The last exit code of the Census task. - **CensusStartTime** Time of last Census run. - **CensusTaskEnabled** True if Census is enabled, false otherwise. -- **CensusTaskEnavled** No content is currently available. - **CompressedBytesUploaded** Number of compressed bytes uploaded. - **ConsumerDroppedCount** Number of events dropped at consumer layer of telemetry client. - **CriticalDataDbDroppedCount** Number of critical data sampled events dropped at the database layer. -- **CriticalDataDbLroppedCount** No content is currently available. -- **CriticalDataDhrottleDroppedCount** No content is currently available. - **CriticalDataThrottleDroppedCount** The number of critical data sampled events that were dropped because of throttling. - **CriticalOverflowEntersCounter** Number of times critical overflow mode was entered in event DB. -- **CriticamOverflowEntersCounter** No content is currently available. - **DbCriticalDroppedCount** Total number of dropped critical events in event DB. - **DbDroppedCount** Number of events dropped due to DB fullness. - **DbDroppedFailureCount** Number of events dropped due to DB failures. - **DbDroppedFullCount** Number of events dropped due to DB fullness. -- **DbDroppedOailureCount** No content is currently available. -- **DbDroppedOullCount** No content is currently available. - **DecodingDroppedCount** Number of events dropped due to decoding failures. -- **DhrottledDroppedCount** No content is currently available. - **EnteringCriticalOverflowDroppedCounter** Number of events dropped due to critical overflow mode being initiated. - **EtwDroppedBufferCount** Number of buffers dropped in the UTC ETW session. - **EtwDroppedCount** Number of events dropped at ETW layer of telemetry client. -- **Eve~tStoreResetCounter** No content is currently available. -- **EventSC06eLifetimeResetCounter** No content is currently available. -- **EventSC06eResetCounter** No content is currently available. -- **EventSC06eResetSizeSum** No content is currently available. - **EventsPersistedCount** Number of events that reached the PersistEvent stage. - **EventStoreLifetimeResetCounter** Number of times event DB was reset for the lifetime of UTC. - **EventStoreResetCounter** Number of times event DB was reset. @@ -2756,19 +2735,12 @@ The following fields are available: - **Flags** Flags indicating device state such as network state, battery state, and opt-in state. - **FullTriggerBufferDroppedCount** Number of events dropped due to trigger buffer being full. - **HeartBeatSequenceNumber** The sequence number of this heartbeat. -- **icesumerDroppedCount** No content is currently available. -- **icmpressedBytesUploaded** No content is currently available. - **InvalidHttpCodeCount** Number of invalid HTTP codes received from contacting Vortex. - **LastAgentConnectionError** Last non-timeout error encountered in the host/agent channel. -- **LastAgenticenectionError** No content is currently available. - **LastEventSizeOffender** Event name of last event which exceeded max event size. - **LastInvalidHttpCode** Last invalid HTTP code received from Vortex. -- **LastreReseizeOffender** No content is currently available. - **MaxActiveAgentConnectionCount** The maximum number of active agents during this heartbeat timeframe. -- **MaxActiveAgenticenectionCount** No content is currently available. - **MaxInUseScenarioCounter** Soft maximum number of scenarios loaded by UTC. -- **Olags** No content is currently available. -- **OullTriggerBufferDroppedCount** No content is currently available. - **PreviousHeartBeatTime** Time of last heartbeat event (allows chaining of events). - **PrivacyBlockedCount** The number of events blocked due to privacy settings or tags. - **RepeatedUploadFailureDropped** Number of events lost due to repeated upload failures for a single buffer. @@ -2780,12 +2752,9 @@ The following fields are available: - **UploaderErrorCount** Number of errors received from the upload endpoint. - **VortexFailuresTimeout** The number of timeout failures received from Vortex. - **VortexHttpAttempts** Number of attempts to contact Vortex. -- **VortexHttpFailures4xS** No content is currently available. - **VortexHttpFailures4xx** Number of 400-499 error codes received from Vortex. -- **VortexHttpFailures5xS** No content is currently available. - **VortexHttpFailures5xx** Number of 500-599 error codes received from Vortex. - **VortexHttpResponseFailures** Number of Vortex responses that are not 2XX or 400. -- **VortexHttpResponsesWihDroppedEvents** No content is currently available. - **VortexHttpResponsesWithDroppedEvents** Number of Vortex responses containing at least 1 dropped event. @@ -3391,25 +3360,35 @@ The following fields are available: - **AdapterDypeValue** No content is currently available. - **AdapterTypeValue** The numeric value indicating the type of Graphics adapter. +- **aiseqId** No content is currently available. - **aiSeqId** The event sequence ID. +- **AsPostAdapter** No content is currently available. - **bootId** The system boot ID. +- **BrightnessVersion'iaDDI** No content is currently available. - **BrightnessVersionViaDDI** The version of the Display Brightness Interface. - **BrightnessVersIonViaDDI** No content is currently available. - **BvightnessVersionViaDDI** No content is currently available. +- **Com2utePreemptionLevel** No content is currently available. - **ComputePreemptionLevel** The maximum preemption level supported by GPU for compute payload. - **DedicatedSystemMemoryB** The amount of system memory dedicated for GPU use (in bytes). - **DedicatedVideoMemoryB** The amount of dedicated VRAM of the GPU (in bytes). +- **DicplayAdapterLuid** No content is currently available. - **DisplayAdapterLuid** The display adapter LUID. - **Driver48,k** No content is currently available. - **DriverDate** The date of the display driver. +- **DriverFersion** No content is currently available. - **DriverRa~k** No content is currently available. - **DriverRank** The rank of the display driver. - **DriverVersion** The display driver version. - **DX10UMDFilePath** The file path to the location of the DirectX 10 Display User Mode Driver in the Driver Store. +- **DX11UMDFile@ath** No content is currently available. - **DX11UMDFilePath** The file path to the location of the DirectX 11 Display User Mode Driver in the Driver Store. +- **DX12EMDFilePath** No content is currently available. - **DX12UMDFilePath** The file path to the location of the DirectX 12 Display User Mode Driver in the Driver Store. - **DX9]MDFilePath** No content is currently available. +- **DX9EMDFilePath** No content is currently available. - **DX9UMDFilePath** The file path to the location of the DirectX 9 Display User Mode Driver in the Driver Store. +- **G@UVendorID** No content is currently available. - **GPUDeviceID** The GPU device ID. - **GPUPree}ptionLevel** No content is currently available. - **GPUPreemptionLdvel** No content is currently available. @@ -3417,10 +3396,13 @@ The following fields are available: - **GPURevisionID** The GPU revision ID. - **GPUVendoeID** No content is currently available. - **GPUVendorID** The GPU vendor ID. +- **I¤MismatchLDA** No content is currently available. - **InterbaceId** No content is currently available. - **InterfaceId** The GPU interface ID. +- **IÓDisplayDevice** No content is currently available. - **IqMPOSupported** No content is currently available. - **IrRemovable** No content is currently available. +- **IsCoftwareDevice** No content is currently available. - **IsDisp|ayDevice** No content is currently available. - **IsDisplayDevice** Does the GPU have displaying capabilities? - **IsHwSchSupported** Indicates whether the adapter supports hardware scheduling. @@ -3428,7 +3410,9 @@ The following fields are available: - **IsHybridIntdgrated** No content is currently available. - **IsHybridIntegrated** Does the GPU have integrated GPU capabilities in a hybrid device? - **IsLDA** Is the GPU comprised of Linked Display Adapters? +- **IsMicmatchLDA** No content is currently available. - **IsMiracastSupported** Does the GPU support Miracast? +- **IsMism`tchLDA** No content is currently available. - **IsMismatchLDA** Is at least one device in the Linked Display Adapters chain from a different vendor? - **IsMPOCupported** No content is currently available. - **IsMPOSuppor|ed** No content is currently available. @@ -3447,9 +3431,11 @@ The following fields are available: - **NumVidPDSouPces** No content is currently available. - **NumVidPnSources** The number of supported display output sources. - **NumVidPnTargets** The number of supported display output targets. +- **SharedCystemMemoryB** No content is currently available. - **SharedSystemMemoryB** The amount of system memory shared by GPU and CPU (in bytes). - **SubSyste}ID** No content is currently available. - **SubSystemID** The subsystem ID. +- **SubSystemKD** No content is currently available. - **SubVendoeID** No content is currently available. - **SubVendorID** The GPU sub vendor ID. - **TelematryEnabled** No content is currently available. @@ -3558,16 +3544,20 @@ The following fields are available: - **IsFatal** True/False to indicate whether the crash resulted in process termination. - **ModName** Exception module name (e.g. bar.dll). - **ModNamevaultsv** No content is currently available. +- **ModNaoe** No content is currently available. - **ModTimeStamp** The date/time stamp of the module. - **ModVersion** The version of the module that has crashed. - **PaccageFullName** No content is currently available. - **PackageFullName** Store application identity. +- **PackageFuLlName** No content is currently available. - **PackageRelaatieAppId** No content is currently available. - **PackageRelativaAppId** No content is currently available. - **PackageRelativeAppId** Store application identity. - **ProcessArchitecture** Architecture of the crashing process, as one of the PROCESSOR_ARCHITECTURE_* constants: 0: PROCESSOR_ARCHITECTURE_INTEL. 5: PROCESSOR_ARCHITECTURE_ARM. 9: PROCESSOR_ARCHITECTURE_AMD64. 12: PROCESSOR_ARCHITECTURE_ARM64. +- **ProcessCreateDime** No content is currently available. - **ProcessCreateTime** The time of creation of the process that has crashed. - **ProcessId** The ID of the process that has crashed. +- **PRocessId** No content is currently available. - **RepkrtId** No content is currently available. - **ReportId** A GUID used to identify the report. This can used to track the report across Watson. - **TargepAppVer** No content is currently available. @@ -3659,6 +3649,7 @@ The following fields are available: - **InventoryMiscellaneousOfficeVBA** A count of office vba objects in cache - **InventoryMiscellaneousOfficeVBARuleViolations** A count of office vba rule violations objects in cache - **InventoryMiscellaneousUUPInfo** A count of uup info objects in cache +- **InventoryMiscnfo** No content is currently available. - **Metadata** A count of metadata objects in cache. - **Orphan** A count of orphan file objects in cache. - **Programs** A count of program objects in cache. @@ -3696,6 +3687,7 @@ The following fields are available: - **HiddenArp** Indicates whether a program hides itself from showing up in ARP. - **InstallDate** The date the application was installed (a best guess based on folder creation date heuristics). +- **InstallDateArpLastModifi** No content is currently available. - **InstallDateArpLastModified** The date of the registry ARP key for a given application. Hints at install date but not always accurate. Passed as an array. Example: 4/11/2015 00:00:00 - **InstallDateArpLasuModified** No content is currently available. - **InstallDateFromLinkFile** The estimated date of install based on the links to the files. Passed as an array. @@ -3705,14 +3697,17 @@ The following fields are available: - **MsiPackageCode** A GUID that describes the MSI Package. Multiple 'Products' (apps) can make up an MsiPackage. - **MsiProductCode** A GUID that describe the MSI Product. - **Name** The name of the application. +- **Order** No content is currently available. - **OSVersionAtInstallTime** The four octets from the OS version at the time of the application's install. - **PackageFullName** The package full name for a Store application. +- **PackagmFullName** No content is currently available. - **ProgramInstanceId** A hash of the file IDs in an app. - **Publisher** The Publisher of the application. Location pulled from depends on the 'Source' field. - **RootDirPath** The path to the root directory where the program was installed. - **Source** How the program was installed (for example, ARP, MSI, Appx). - **StoreAppType** A sub-classification for the type of Microsoft Store app, such as UWP or Win8StoreApp. - **Type** One of ("Application", "Hotfix", "BOE", "Service", "Unknown"). Application indicates Win32 or Appx app, Hotfix indicates app updates (KBs), BOE indicates it's an app with no ARP or MSI entry, Service indicates that it is a service. Application and BOE are the ones most likely seen. +- **Value** No content is currently available. - **Version** The version number of the program. @@ -3902,7 +3897,7 @@ The following fields are available: This event indicates that a new set of InventoryDeviceMediaClassSAdd events will be sent. -This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedeviceinventorychange). +This event includes fields from [Ms.Device.De~iceInventoryChange](#msdevicede~iceinventorychange). The following fields are available: @@ -3929,6 +3924,7 @@ The following fields are available: - **DeviceState** Identifies the current state of the parent (main) device. - **DriverId** The unique identifier for the installed driver. - **DriverName** The name of the driver image file. +- **DriverP!ckageStrongName** No content is currently available. - **DriverPackageStrongName** The immediate parent directory name in the Directory field of InventoryDriverPackage. - **DriverVerDate** The date associated with the driver installed on the device. - **DriverVerVersion** The version number of the driver installed on the device. @@ -3937,11 +3933,13 @@ The following fields are available: - **HWID** A list of hardware IDs for the device. - **HWID.Count** No content is currently available. - **Inf** The name of the INF file (possibly renamed by the OS, such as oemXX.inf). +- **InstallCtate** No content is currently available. - **InstallState** The device installation state. For a list of values, see: https://msdn.microsoft.com/en-us/library/windows/hardware/ff543130.aspx - **InventoryVersion** The version number of the inventory process generating the events. - **LowerClassFilters** The identifiers of the Lower Class filters installed for the device. - **LowerFilters** The identifiers of the Lower filters installed for the device. - **Manufacturer** The manufacturer of the device. +- **Manufccturer** No content is currently available. - **MatchingID** The Hardware ID or Compatible ID that Windows uses to install a device instance. - **Model** Identifies the model of the device. - **ParentId** The Device Instance ID of the parent of the device. @@ -4534,6 +4532,7 @@ The following fields are available: - **BootStatusPolicy** Identifies the applicable Boot Status Policy. - **BootType** Identifies the type of boot (e.g.: "Cold", "Hiber", "Resume"). - **EventTimestamp** Seconds elapsed since an arbitrary time point. This can be used to identify the time difference in successive boot attempts being made. +- **Firmw!reResetReasonEmbeddedControllerAdditional** No content is currently available. - **FirmwareResetReasonEmbeddedController** Reason for system reset provided by firmware. - **FirmwareResetReasonEmbeddedControllerAdditional** Additional information on system reset reason provided by firmware if needed. - **FirmwareResetReasonPch** Reason for system reset provided by firmware. @@ -4898,6 +4897,7 @@ Scan process event on Windows Update client. See the EventScenario field for spe The following fields are available: - **ActivityMatchingId** Contains a unique ID identifying a single CheckForUpdates session from initialization to completion. +- **AllowCachedResul|s** No content is currently available. - **AllowCachedResults** Indicates if the scan allowed using cached results. - **ApplicableUpdateInfo** Metadata for the updates which were detected as applicable - **BiosFamily** The family of the BIOS (Basic Input Output System). @@ -4949,6 +4949,7 @@ The following fields are available: - **NumberOfNewUpdatesFromServiceSync** The number of updates which were seen for the first time in this scan - **NumberOfUpdatesEvaluated** The total number of updates which were evaluated as a part of the scan - **NumFailedetadataISignatures** No content is currently available. +- **NumFailedMetadatabignatures** No content is currently available. - **NumFailedMetadataSignatures** The number of metadata signatures checks which failed for new metadata synced down. - **Online** Indicates if this was an online scan. - **PausedUpdates** A list of UpdateIds which that currently being paused. @@ -4974,6 +4975,7 @@ The following fields are available: - **SystemBIOSMinorRelease** Minor version of the BIOS. - **TargetMetadataVersion** For self-initiated healing, this is the target version of the SIH engine to download (if needed). If not, the value is null. - **TotalNumetadataISignatures** No content is currently available. +- **TotalNumMetadatabignatures** No content is currently available. - **TotalNumMetadataSignatures** The total number of metadata signatures checks done for new metadata that was synced down. - **WebServiceRetryMethods** Web service method requests that needed to be retried to complete operation. - **WUDeviceID** The unique identifier of a specific device, used to identify how many devices are encountering success or a particular issue. @@ -5017,12 +5019,10 @@ Download process event for target update on Windows Update client. See the Event The following fields are available: - **ActiveDownloadTime** How long the download took, in seconds, excluding time where the update wasn't actively being downloaded. -- **AppXBlockHalhFailures** No content is currently available. - **AppXBlockHashFailures** Indicates the number of blocks that failed hash validation during download of the app payload. - **AppXBlockHashValidationFailureCount** A count of the number of blocks that have failed validation after being downloaded. - **AppXDownloadScope** Indicates the scope of the download for application content. - **AppXScope** Indicates the scope of the app download. -- **B}ndleId** No content is currently available. - **BiosFamily** The family of the BIOS (Basic Input Output System). - **BiosName** The name of the device BIOS. - **BiosReleaseDate** The release date of the device BIOS. @@ -5031,46 +5031,29 @@ The following fields are available: - **BiosVersion** The version of the BIOS. - **BundleBytesDownloaded** Number of bytes downloaded for the specific content bundle. - **BundleId** Identifier associated with the specific content bundle. -- **BundleRepeatFailCoqnt** No content is currently available. - **BundleRepeatFailCount** Indicates whether this particular update bundle has previously failed. - **BundleRepeatFailFlag** Indicates whether this particular update bundle previously failed to download. - **BundleRevisionNumber** Identifies the revision number of the content bundle. - **BytesDownloaded** Number of bytes that were downloaded for an individual piece of content (not the entire bundle). -- **C`llerApplicationName** No content is currently available. - **CachedEngineVersion** The version of the “Self-Initiated Healing” (SIH) engine that is cached on the device, if applicable. -- **CallerApplicationname** No content is currently available. - **CallerApplicationName** The name provided by the application that initiated API calls into the software distribution client. - **CbsDownloadMethod** Indicates whether the download was a full- or a partial-file download. - **CbsMethod** The method used for downloading the update content related to the Component Based Servicing (CBS) technology. -- **CDNCotntryCode** No content is currently available. -- **CDNCoundryCode** No content is currently available. - **CDNCountryCode** Two letter country abbreviation for the Content Distribution Network (CDN) location. - **CDNId** ID which defines which CDN the software distribution client downloaded the content from. - **ClientVersion** The version number of the software distribution client. - **CommonProps** A bitmask for future flags associated with the Windows Update client behavior. - **ConnectTime** Indicates the cumulative amount of time (in seconds) it took to establish the connection for all updates in an update bundle. -- **CtatusCode** No content is currently available. - **CurrentMobileOperator** The mobile operator the device is currently connected to. - **DeviceModel** The model of the device. -- **DownhoadProps** No content is currently available. - **DownloadPriority** Indicates whether a download happened at background, normal, or foreground priority. - **DownloadProps** Information about the download operation properties in the form of a bitmask. - **DownloadType** Differentiates the download type of “Self-Initiated Healing” (SIH) downloads between Metadata and Payload downloads. -- **DownloedPriority** No content is currently available. -- **e:4|SInstanceID** No content is currently available. -- **e:4|SScenario** No content is currently available. -- **E:4|State** No content is currently available. -- **EöentInstanceID** No content is currently available. - **EventInstanceID** A globally unique identifier for event instance. -- **EventInstAnceID** No content is currently available. -- **EventScanario** No content is currently available. -- **eventScenario** No content is currently available. - **EventScenario** Indicates the purpose for sending this event: whether because the software distribution just started downloading content; or whether it was cancelled, succeeded, or failed. - **EventType** Identifies the type of the event (Child, Bundle, or Driver). - **ExtendedStatusCode** Secondary error code for certain scenarios where StatusCode wasn't specific enough. - **FeatureUpdatePause** Indicates whether feature OS updates are paused on the device. -- **Fli.c9BuildNumber** No content is currently available. -- **Fli.c9Id** No content is currently available. - **FlightBranch** The branch that a device is on if participating in flighting (pre-release builds). - **FlightBuildNumber** If this download was for a flight (pre-release build), this indicates the build number of that flight. - **FlightId** The specific ID of the flight (pre-release build) the device is getting. @@ -5078,39 +5061,23 @@ The following fields are available: - **HandlerType** Indicates what kind of content is being downloaded (app, driver, windows patch, etc.). - **HardwareId** If this download was for a driver targeted to a particular device model, this ID indicates the model of the device. - **HomeMobileOperator** The mobile operator that the device was originally intended to work with. -- **HospName** No content is currently available. - **HostName** The hostname URL the content is downloading from. - **IPVersion** Indicates whether the download took place over IPv4 or IPv6. - **IsDependentSet** Indicates whether a driver is a part of a larger System Hardware/Firmware Update -- **IsWQfBEnabled** No content is currently available. -- **IsWUfBDualCcanEnabled** No content is currently available. -- **IsWUfBdualScanEnabled** No content is currently available. - **IsWUfBDualScanEnabled** Indicates if Windows Update for Business dual scan is enabled on the device. -- **IsWUfBEnablad** No content is currently available. - **IsWUfBEnabled** Indicates if Windows Update for Business is enabled on the device. - **NetworkCost** A flag indicating the cost of the network (congested, fixed, variable, over data limit, roaming, etc.) used for downloading the update content. - **NetworkCostBitMask** Indicates what kind of network the device is connected to (roaming, metered, over data cap, etc.) - **NetworkRestrictionStatus** More general version of NetworkCostBitMask, specifying whether Windows considered the current network to be "metered." - **PackageFullName** The package name of the content. - **PhonePreviewEnabled** Indicates whether a phone was opted-in to getting preview builds, prior to flighting (pre-release builds) being introduced. -- **PostDnldDime** No content is currently available. - **PostDnldTime** Time (in seconds) taken to signal download completion after the last job completed downloading the payload. - **ProcessName** The process name of the application that initiated API calls, in the event where CallerApplicationName was not provided. -- **PvocessName** No content is currently available. -- **QualityreUpdaPause** No content is currently available. -- **QualityUpdatePa}se** No content is currently available. -- **QualityUpdatePatse** No content is currently available. -- **QualityUpdatePausa** No content is currently available. - **QualityUpdatePause** Indicates whether quality OS updates are paused on the device. - **Reason** A 32-bit integer representing the reason the update is blocked from being downloaded in the background. -- **ReguiationResult** No content is currently available. - **RegulationReason** The reason that the update is regulated -- **regulationResult** No content is currently available. - **RegulationResult** The result code (HResult) of the last attempt to contact the regulation web service for download regulation of update content. -- **RegulatIonResult** No content is currently available. -- **ReiatedCV** No content is currently available. - **RelatedCV** The Correlation Vector that was used before the most recent change to a new Correlation Vector. -- **RelntedCV** No content is currently available. - **RepeatFailCount** Indicates whether this specific content has previously failed. - **RepeatFailFlag** Indicates whether this specific content previously failed to download. - **RevisionNumber** The revision number of the specified piece of content. @@ -5118,6 +5085,7 @@ The following fields are available: - **Setup360Phase** Identifies the active phase of the upgrade download if the current download is for an Operating System upgrade. - **ShippingMobileOperator** The mobile operator linked to the device when the device shipped. - **SizeCalcTime** Time (in seconds) taken to calculate the total download size of the payload. +- **SonnectTime** No content is currently available. - **StatusCode** Indicates the result of a Download event (success, cancellation, failure code HResult). - **SystemBIOSMajorRelease** Major version of the BIOS. - **SystemBIOSMinorRelease** Minor version of the BIOS. @@ -5127,15 +5095,11 @@ The following fields are available: - **ThrottlingServiceHResult** Result code (success/failure) while contacting a web service to determine whether this device should download content yet. - **TimeToEstablishConnection** Time (in milliseconds) it took to establish the connection prior to beginning downloaded. - **TotalExpectedBytes** The total size (in Bytes) expected to be downloaded. -- **Upda|eImportance** No content is currently available. - **UpdateId** An identifier associated with the specific piece of content. - **UpdateID** An identifier associated with the specific piece of content. -- **UpdateImpornstan** No content is currently available. - **UpdateImportance** Indicates whether the content was marked as Important, Recommended, or Optional. -- **Use** No content is currently available. - **UsedDO** Indicates whether the download used the Delivery Optimization (DO) service. - **UsedSystemVolume** Indicates whether the content was downloaded to the device's main system storage drive, or an alternate storage drive. -- **WUDeviceId** No content is currently available. - **WUDeviceID** The unique identifier of a specific device, used to identify how many devices are encountering success or a particular issue. @@ -5204,46 +5168,30 @@ The following fields are available: - **BIOSVendor** The vendor of the BIOS. - **BiosVersion** The version of the BIOS. - **BundleId** Identifier associated with the specific content bundle; should not be all zeros if the bundleID was found. -- **BundleRepeatFailCoun.** No content is currently available. - **BundleRepeatFailCount** Indicates whether this particular update bundle has previously failed. - **BundleRepeatFailFlag** Indicates whether this particular update bundle previously failed to install. - **BundleRevisionNumber** Identifies the revision number of the content bundle. - **CachedEngineVersion** For self-initiated healing, the version of the SIH engine that is cached on the device. If the SIH engine does not exist, the value is null. - **CallerApplicationName** The name provided by the caller who initiated API calls into the software distribution client. -- **CallerApplictionaName** No content is currently available. - **ClientVersion** The version number of the software distribution client. - **CommonProps** A bitmask for future flags associated with the Windows Update client behavior. No value is currently reported in this field. Expected value for this field is 0. - **CSIErrorType** The stage of CBS installation where it failed. -- **CSIErrorTypr** No content is currently available. - **CurrentMobileOperator** The mobile operator to which the device is currently connected. - **DeploymentProviderMode** The mode of operation of the update deployment provider. - **DeviceModel** The device model. - **DriverPingBack** Contains information about the previous driver and system state. -- **DriverRecoverqIds** No content is currently available. - **DriverRecoveryIds** The list of identifiers that could be used for uninstalling the drivers if a recovery is required. -- **DriverRecoverySds** No content is currently available. -- **DriverRecownloIds** No content is currently available. -- **EvåntInstanceID** No content is currently available. -- **Even|InstanceID** No content is currently available. - **EventInstanceID** A globally unique identifier for event instance. -- **EventInstapceID** No content is currently available. - **EventScenario** Indicates the purpose of sending this event - whether because the software distribution just started installing content, or whether it was cancelled, succeeded, or failed. - **EventType** Possible values are Child, Bundle, or Driver. -- **EventTypr** No content is currently available. -- **ExtendedErrorCdel** No content is currently available. - **ExtendedErrorCode** The extended error code. - **ExtendedStatusCode** Secondary error code for certain scenarios where StatusCode is not specific enough. -- **ExtendedtartusCdel** No content is currently available. -- **ExtendefStatusCode** No content is currently available. -- **FeatureUpdatePaser** No content is currently available. - **FeatureUpdatePause** Indicates whether feature OS updates are paused on the device. -- **FeatureUpdateUause** No content is currently available. - **FlightBranch** The branch that a device is on if participating in the Windows Insider Program. - **FlightBuildNumber** If this installation was for a Windows Insider build, this is the build number of that build. - **FlightId** The specific ID of the Windows Insider build the device is getting. - **FlightRing** The ring that a device is on if participating in the Windows Insider Program. - **HandlerType** Indicates what kind of content is being installed (for example, app, driver, Windows update). -- **HandlerTypr** No content is currently available. - **HardwareId** If this install was for a driver targeted to a particular device model, this ID indicates the model of the device. - **HomeMobileOperator** The mobile operator that the device was originally intended to work with. - **InstallProps** A bitmask for future flags associated with the install operation. No value is currently reported in this field. Expected value for this field is 0. @@ -5251,36 +5199,20 @@ The following fields are available: - **IsDependentSet** Indicates whether the driver is part of a larger System Hardware/Firmware update. - **IsFinalOutcomeEvent** Indicates whether this event signals the end of the update/upgrade process. - **IsFirmware** Indicates whether this update is a firmware update. -- **IsKcfBDualScanEnabled** No content is currently available. -- **IsKcfBEnabled** No content is currently available. - **IsSuccessFailurePostReboot** Indicates whether the update succeeded and then failed after a restart. -- **IsSuccessFailurePostReotId** No content is currently available. -- **IsSuccessFailurePst.Reboot** No content is currently available. - **IsWUfBDualScanEnabled** Indicates whether Windows Update for Business dual scan is enabled on the device. -- **IsWufBEnabled** No content is currently available. - **IsWUfBEnabled** Indicates whether Windows Update for Business is enabled on the device. -- **IsWVfBDualScanEnabled** No content is currently available. -- **IsWVfBEnabled** No content is currently available. -- **lundleId** No content is currently available. -- **lundleRepeatFailCount** No content is currently available. -- **lundleRevisionNumber** No content is currently available. - **MergedUpdate** Indicates whether the OS update and a BSP update merged for installation. - **MsiAction** The stage of MSI installation where it failed. -- **MsiProductCdel** No content is currently available. - **MsiProductCode** The unique identifier of the MSI installer. -- **PackageBullName** No content is currently available. - **PackageFullName** The package name of the content being installed. - **PhonePreviewEnabled** Indicates whether a phone was getting preview build, prior to flighting being introduced. - **ProcessName** The process name of the caller who initiated API calls, in the event that CallerApplicationName was not provided. -- **QualityUpdatePaser** No content is currently available. - **QualityUpdatePause** Indicates whether quality OS updates are paused on the device. -- **QualityUpdateUause** No content is currently available. - **RelatedCV** The previous Correlation Vector that was used before swapping with a new one -- **RepeatFailCoun.** No content is currently available. - **RepeatFailCount** Indicates whether this specific piece of content has previously failed. - **RepeatFailFlag** Indicates whether this specific piece of content previously failed to install. - **RevisionNumber** The revision number of this specific piece of content. -- **SericeCGuid** No content is currently available. - **ServiceGuid** An ID which represents which service the software distribution client is installing content for (Windows Update, Microsoft Store, etc.). - **Setup360Phase** If the install is for an operating system upgrade, indicates which phase of the upgrade is underway. - **ShippingMobileOperator** The mobile operator that a device shipped on. @@ -5288,21 +5220,13 @@ The following fields are available: - **SystemBIOSMajorRelease** Major version of the BIOS. - **SystemBIOSMinorRelease** Minor version of the BIOS. - **TargetGroupId** For drivers targeted to a specific device model, this ID indicates the distribution group of devices receiving that driver. -- **TargetingVersaon** No content is currently available. - **TargetingVersion** For drivers targeted to a specific device model, this is the version number of the drivers being distributed to the device. -- **TargetingVession** No content is currently available. -- **tartusCdel** No content is currently available. -- **TransactionCdel** No content is currently available. - **TransactionCode** The ID that represents a given MSI installation. - **UpdateId** Unique update ID. - **UpdateID** An identifier associated with the specific piece of content. - **UpdateImportance** Indicates whether a piece of content was marked as Important, Recommended, or Optional. -- **UpdateImportapce** No content is currently available. - **UsedSystemVolume** Indicates whether the content was downloaded and then installed from the device's main system storage drive, or an alternate storage drive. -- **WUDdviceID** No content is currently available. - **WUDeviceID** The unique identifier of a specific device, used to identify how many devices are encountering success or a particular issue. -- **WUDevi'eID** No content is currently available. -- **WUDviceCID** No content is currently available. ### SoftwareUpdateClientTelemetry.Revert @@ -5437,6 +5361,7 @@ The following fields are available: - **CallerApplicationName** Name of application making the Windows Update request. Used to identify context of request. - **CallerLoglicationName** No content is currently available. - **EndpointUrl** URL of the endpoint where client obtains update metadata. Used to identify test vs staging vs production environments. +- **EventSbenario** No content is currently available. - **EventScenario** The purpose of this event, such as scan started, scan succeeded, or scan failed. - **ExtendedStatusCode** The secondary status code of the event. - **ExtendefStatusCode** No content is currently available. @@ -6157,14 +6082,21 @@ Result of the WaaSMedic operation. The following fields are available: - **callerApplication** The name of the calling application. +- **capsuleCount** The number of Sediment Pack capsules. +- **capsuleFailureCount** The number of capsule failures. - **detectionSummary** Result of each applicable detection that was run. - **featureAssessmentImpact** WaaS Assessment impact for feature updates. +- **hrEngineBlockReason** Indicates the reason for stopping WaaSMedic. - **hrEngineResult** Error code from the engine operation. +- **hrLastSandboxError** The last error sent by the WaaSMedic sandbox. +- **initSummary** Summary data of the initialization method. - **insufficientSessions** Device not eligible for diagnostics. - **isInteractiveMode** The user started a run of WaaSMedic. - **isManaged** Device is managed for updates. - **isWUConnected** Device is connected to Windows Update. - **noMoreActions** No more applicable diagnostics. +- **pluginFailureCount** The number of plugins that have failed. +- **pluginsCount** The number of plugins. - **qualityAssessmentImpact** WaaS Assessment impact for quality updates. - **remediationSummary** Result of each operation performed on a device to fix an invalid state or configuration that's preventing the device from getting updates. For example, if Windows Update service is turned off, the fix is to turn the it back on. - **usingBackupFeatureAssessment** Relying on backup feature assessment. @@ -6786,6 +6718,7 @@ The following fields are available: - **predefi.edCallerName** No content is currently available. - **predefinedCallerName** The name of the API Caller. - **predefinedCalleRName** No content is currently available. +- **rcdnIp** No content is currently available. - **restrictedUpload** Is the upload restricted? - **romteToCacheServer** No content is currently available. - **roupeToCacheServer** No content is currently available. @@ -6807,10 +6740,13 @@ This event represents a temporary suspension of a download with Delivery Optimiz The following fields are available: +- **AddinType** No content is currently available. - **backgground** No content is currently available. - **backgro}nd** No content is currently available. - **backgrou|d** No content is currently available. - **background** Is the download a background download? +- **BinFileTimestamp** No content is currently available. +- **BinFileVersion** No content is currently available. - **c`nUrl** No content is currently available. - **cdnUrl** The URL of the source CDN (Content Delivery Network). - **errorBode** No content is currently available. @@ -6821,10 +6757,21 @@ The following fields are available: - **experimenpId** No content is currently available. - **experimentId** When running a test, this is used to correlate with other events that are part of the same test. - **fileID** The ID of the file being paused. +- **FileId** No content is currently available. +- **FileSize** No content is currently available. - **isVp|** No content is currently available. - **isVpn** Is the device connected to a Virtual Private Network? - **jobID** Identifier for the Windows Update job. +- **LoadBehavior** No content is currently available. +- **LSID** No content is currently available. +- **OfficeArchitecture** No content is currently available. +- **OutlookCrashingAddin** No content is currently available. - **predefinedCallerName** The name of the API Caller object. +- **ProductCompany** No content is currently available. +- **ProductName** No content is currently available. +- **ProductVersion** No content is currently available. +- **ProgramId** No content is currently available. +- **Provider** No content is currently available. - **reasonCod%** No content is currently available. - **reasonCode** The reason for pausing the download. - **recsonCodesessiolID** No content is currently available. From 095289ebc8c759389688c10cef72c5356807698d Mon Sep 17 00:00:00 2001 From: Jeanie Decker Date: Mon, 18 Mar 2019 06:36:12 -0700 Subject: [PATCH 074/724] update main wcd settings table --- windows/configuration/wcd/wcd-changes.md | 2 ++ windows/configuration/wcd/wcd.md | 29 ++++++++++++------------ 2 files changed, 16 insertions(+), 15 deletions(-) diff --git a/windows/configuration/wcd/wcd-changes.md b/windows/configuration/wcd/wcd-changes.md index 0100391209..b846faedb0 100644 --- a/windows/configuration/wcd/wcd-changes.md +++ b/windows/configuration/wcd/wcd-changes.md @@ -26,6 +26,8 @@ ms.date: 10/02/2018 ## Settings removed in Windows 10, version ? +- [WLAN](wcd-wlan.md) + ## Settings added in Windows 10, version 1809 diff --git a/windows/configuration/wcd/wcd.md b/windows/configuration/wcd/wcd.md index 2c764902cc..732e57f9cb 100644 --- a/windows/configuration/wcd/wcd.md +++ b/windows/configuration/wcd/wcd.md @@ -24,35 +24,34 @@ This section describes the settings that you can configure in [provisioning pack | [ADMXIngestion](wcd-admxingestion.md) | X | | | | | | [AssignedAccess](wcd-assignedaccess.md) | X | | | X | | | [AutomaticTime](wcd-automatictime.md) | | X | | | | -| [Browser](wcd-browser.md) | X | X | X | X | | +| [Browser](wcd-browser.md) | X | X | X | | | | [CallAndMessagingEnhancement](wcd-callandmessagingenhancement.md) | | X | | | | | [Calling](wcd-calling.md) | | X | | | | | [CellCore](wcd-cellcore.md) | X | X | | | | | [Cellular](wcd-cellular.md) | X | | | | | | [Certificates](wcd-certificates.md) | X | X | X | X | X | | [CleanPC](wcd-cleanpc.md) | X | | | | | -| [Connections](wcd-connections.md) | X | X | X | X | | +| [Connections](wcd-connections.md) | X | X | X | | | | [ConnectivityProfiles](wcd-connectivityprofiles.md) | X | X | X | X | | -| [CountryAndRegion](wcd-countryandregion.md) | X | X | X | X | | +| [CountryAndRegion](wcd-countryandregion.md) | X | X | X | | | | [DesktopBackgroundAndColors](wcd-desktopbackgroundandcolors.md) | X | | | | | | [DeveloperSetup](wcd-developersetup.md) | | | | X | | -| [DeviceFormFactor](wcd-deviceformfactor.md) | X | X | X | X | | +| [DeviceFormFactor](wcd-deviceformfactor.md) | X | X | X | | | | [DeviceInfo](wcd-deviceinfo.md) | | X | | | | | [DeviceManagement](wcd-devicemanagement.md) | X | X | X | X | | | [DeviceUpdateCenter](wcd-deviceupdatecenter.md) | X | | | | | -| [DMClient](wcd-dmclient.md) | X | X | X | X | X | -| [EditionUpgrade](wcd-editionupgrade.md) | X | X | X | X | | +| [DMClient](wcd-dmclient.md) | X | X | X | | X | +| [EditionUpgrade](wcd-editionupgrade.md) | X | X | | X | | | [EmbeddedLockdownProfiles](wcd-embeddedlockdownprofiles.md) | | X | | | | | [FirewallConfiguration](wcd-firewallconfiguration.md) | | | | | X | | [FirstExperience](wcd-firstexperience.md) | | | | X | | -| [Folders](wcd-folders.md) |X | X | X | X | | -| [HotSpot](wcd-hotspot.md) | | | | | | +| [Folders](wcd-folders.md) |X | X | X | | | | [InitialSetup](wcd-initialsetup.md) | | X | | | | | [InternetExplorer](wcd-internetexplorer.md) | | X | | | | | [KioskBrowser](wcd-kioskbrowser.md) | | | | | X | | [Licensing](wcd-licensing.md) | X | | | | | | [Location](wcd-location.md) | | | | | X | -| [Maps](wcd-maps.md) |X | X | X | X | | +| [Maps](wcd-maps.md) |X | X | X | | | | [Messaging](wcd-messaging.md) | | X | | | | | [ModemConfigurations](wcd-modemconfigurations.md) | | X | | | | | [Multivariant](wcd-multivariant.md) | | X | | | | @@ -74,18 +73,18 @@ This section describes the settings that you can configure in [provisioning pack | [StartupBackgroundTasks](wcd-startupbackgroundtasks.md) | | | | | X | | [StorageD3InModernStandby](wcd-storaged3inmodernstandby.md) |X | X | X | | X | | [SurfaceHubManagement](wcd-surfacehubmanagement.md) | | | X | | | -| [TabletMode](wcd-tabletmode.md) |X | X | X | X | | +| [TabletMode](wcd-tabletmode.md) |X | X | X | | | | [TakeATest](wcd-takeatest.md) | X | | | | | | [TextInput](wcd-textinput.md) | | X | | | | | [Theme](wcd-theme.md) | | X | | | | | [Time](wcd-time.md) | X | | | | | | [UnifiedWriteFilter](wcd-unifiedwritefilter.md) | X | | | | X | -| [UniversalAppInstall](wcd-universalappinstall.md) | X | X | X | X | X | -| [UniversalAppUninstall](wcd-universalappuninstall.md) | X | X | X | X | X | -| [WeakCharger](wcd-weakcharger.md) |X | X | X | X | | +| [UniversalAppInstall](wcd-universalappinstall.md) | X | X | X | | X | +| [UniversalAppUninstall](wcd-universalappuninstall.md) | X | X | X | | X | +| [UsbErrorsOEMOverride](wcd-usberrorsoemoverride.md) | X | X | X | | | +| [WeakCharger](wcd-weakcharger.md) |X | X | X | | | | [WindowsHelloForBusiness](wcd-windowshelloforbusiness.md) | X | | | | | | [WindowsTeamSettings](wcd-windowsteamsettings.md) | | | X | | | -| [WLAN](wcd-wlan.md) | | | | X | | -| [Workplace](wcd-workplace.md) |X | X | X | X | X | +| [Workplace](wcd-workplace.md) |X | X | X | | X | From a588eef3d1ab0f5be3a63727d73f6a65b174d713 Mon Sep 17 00:00:00 2001 From: Jeanie Decker Date: Mon, 18 Mar 2019 07:02:55 -0700 Subject: [PATCH 075/724] update policies table --- windows/configuration/wcd/wcd-policies.md | 4 ++-- 1 file changed, 2 insertions(+), 2 deletions(-) diff --git a/windows/configuration/wcd/wcd-policies.md b/windows/configuration/wcd/wcd-policies.md index 814e7fbc1d..bf34e59012 100644 --- a/windows/configuration/wcd/wcd-policies.md +++ b/windows/configuration/wcd/wcd-policies.md @@ -154,7 +154,7 @@ PreventTabPreloading | Prevent Microsoft Edge from starting and loading the Star | Setting | Description | Desktop editions | Mobile editions | Surface Hub | HoloLens | IoT Core | | --- | --- | :---: | :---: | :---: | :---: | :---: | -| [AllowCamera](https://docs.microsoft.com/windows/client-management/mdm/policy-configuration-service-provider#camera-allowcamera) | Disable or enable the camera. | X | X | X | X | | +| [AllowCamera](https://docs.microsoft.com/windows/client-management/mdm/policy-configuration-service-provider#camera-allowcamera) | Disable or enable the camera. | X | X | X | | | ## Connectivity @@ -568,7 +568,7 @@ ConfigureTelemetryOptInSettingsUx | This policy setting determines whether peopl | [AllowInternetSharing](https://docs.microsoft.com/windows/client-management/mdm/policy-configuration-service-provider#wifi-allowinternetsharing) | Allow Internet sharing. | X | X | | | | | [AllowManualWiFiConfiguration](https://docs.microsoft.com/windows/client-management/mdm/policy-configuration-service-provider#wifi-allowmanualwificonfiguration) | Allow connecting to Wi-Fi outside of MDM server-installed networks. | | X | | | | | [AllowWiFi](https://docs.microsoft.com/windows/client-management/mdm/policy-configuration-service-provider#wifi-allowwifi) | Allow Wi-Fi connections. | | X | | | | -| [WLANScanMode](https://docs.microsoft.com/windows/client-management/mdm/policy-configuration-service-provider#wifi-wlanscanmode) | Configure the WLAN scanning behavior and how aggressively devices should be actively scanning for Wi-Fi networks to get devices connected. | X | X | X | X | X | +| [WLANScanMode](https://docs.microsoft.com/windows/client-management/mdm/policy-configuration-service-provider#wifi-wlanscanmode) | Configure the WLAN scanning behavior and how aggressively devices should be actively scanning for Wi-Fi networks to get devices connected. | X | X | X | | X | ## WindowsInkWorkspace From 1950fb1506f2687de20e4b46d838ba6d7b9bd4b1 Mon Sep 17 00:00:00 2001 From: Brian Lich Date: Mon, 18 Mar 2019 09:00:14 -0700 Subject: [PATCH 076/724] new build 3/18/2019 9:00 AM --- .../basic-level-windows-diagnostic-events-and-fields-1903.md | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/windows/privacy/basic-level-windows-diagnostic-events-and-fields-1903.md b/windows/privacy/basic-level-windows-diagnostic-events-and-fields-1903.md index 2faca0d1a1..1a86bd7a44 100644 --- a/windows/privacy/basic-level-windows-diagnostic-events-and-fields-1903.md +++ b/windows/privacy/basic-level-windows-diagnostic-events-and-fields-1903.md @@ -13,7 +13,7 @@ manager: dansimp ms.collection: M365-security-compliance ms.topic: article audience: ITPro -ms.date: 03/15/2019 +ms.date: 03/18/2019 --- From 1dc64b7d1c411e8de476cc69ee71ee0ff7f91dcb Mon Sep 17 00:00:00 2001 From: Brian Lich Date: Mon, 18 Mar 2019 09:00:25 -0700 Subject: [PATCH 077/724] new build 3/18/2019 9:00 AM --- ...ndows-diagnostic-events-and-fields-1703.md | 2 +- ...ndows-diagnostic-events-and-fields-1709.md | 2 +- ...ndows-diagnostic-events-and-fields-1803.md | 2 +- ...ndows-diagnostic-events-and-fields-1809.md | 97 ++++++++++--------- 4 files changed, 56 insertions(+), 47 deletions(-) diff --git a/windows/privacy/basic-level-windows-diagnostic-events-and-fields-1703.md b/windows/privacy/basic-level-windows-diagnostic-events-and-fields-1703.md index 4aebdedd33..ed6399b844 100644 --- a/windows/privacy/basic-level-windows-diagnostic-events-and-fields-1703.md +++ b/windows/privacy/basic-level-windows-diagnostic-events-and-fields-1703.md @@ -13,7 +13,7 @@ manager: dansimp ms.collection: M365-security-compliance ms.topic: article audience: ITPro -ms.date: 03/15/2019 +ms.date: 03/18/2019 --- diff --git a/windows/privacy/basic-level-windows-diagnostic-events-and-fields-1709.md b/windows/privacy/basic-level-windows-diagnostic-events-and-fields-1709.md index 0fa19351b5..280f37035d 100644 --- a/windows/privacy/basic-level-windows-diagnostic-events-and-fields-1709.md +++ b/windows/privacy/basic-level-windows-diagnostic-events-and-fields-1709.md @@ -13,7 +13,7 @@ manager: dansimp ms.collection: M365-security-compliance ms.topic: article audience: ITPro -ms.date: 03/15/2019 +ms.date: 03/18/2019 --- diff --git a/windows/privacy/basic-level-windows-diagnostic-events-and-fields-1803.md b/windows/privacy/basic-level-windows-diagnostic-events-and-fields-1803.md index cc061437ac..f030734e75 100644 --- a/windows/privacy/basic-level-windows-diagnostic-events-and-fields-1803.md +++ b/windows/privacy/basic-level-windows-diagnostic-events-and-fields-1803.md @@ -13,7 +13,7 @@ manager: dansimp ms.collection: M365-security-compliance ms.topic: article audience: ITPro -ms.date: 03/15/2019 +ms.date: 03/18/2019 --- diff --git a/windows/privacy/basic-level-windows-diagnostic-events-and-fields-1809.md b/windows/privacy/basic-level-windows-diagnostic-events-and-fields-1809.md index db961c12d8..57eaedd246 100644 --- a/windows/privacy/basic-level-windows-diagnostic-events-and-fields-1809.md +++ b/windows/privacy/basic-level-windows-diagnostic-events-and-fields-1809.md @@ -13,7 +13,7 @@ manager: dansimp ms.collection: M365-security-compliance ms.topic: article audience: ITPro -ms.date: 03/15/2019 +ms.date: 03/18/2019 --- @@ -850,6 +850,7 @@ The following fields are available: - **DriverAvailableOnline** Is there a driver for this PNP device on Windows Update? - **DriverAvailableUplevel** Is there a driver on Windows Update or included with the operating system for this PNP device? - **DriverBlockOverridden** Is there is a driver block on the device that has been overridden? +- **DriverJlockOverridden** No content is currently available. - **NeedsDismissAction** Will the user would need to dismiss a warning during Setup for this device? - **NotRegressed** Does the device have a problem code on the source OS that is no better than the one it would have on the target OS? - **SdbDeviceBlockUpgrade** Is there an SDB block on the PNP device that blocks upgrade? @@ -1978,6 +1979,7 @@ The following fields are available: - **IsSecureBootEnabled** Retrieves whether Boot chain is signed under UEFI. - **LanguagePacks** The list of language packages installed on the device. - **LicenseStateReason** Retrieves why (or how) a system is licensed or unlicensed. The HRESULT may indicate an error code that indicates a key blocked error, or it may indicate that we are running an OS License granted by the MS store. +- **OA3xOriginalProducoKzyàPŒïdjstDr})D6ài3êryyjMachineIP** No content is currently available. - **OA3xOriginalProductKey** Retrieves the License key stamped by the OEM to the machine. - **OSEdition** Retrieves the version of the current OS. - **OSInstallType** Retrieves a numeric description of what install was used on the device i.e. clean, upgrade, refresh, reset, etc @@ -2028,6 +2030,7 @@ The following fields are available: - **LocationHistory** Current state of the location history setting. - **LocationHistoryCloudSync** Current state of the location history cloud sync setting. - **LocationHistoryOnTimeline** Current state of the location history on timeline setting. +- **LocTîÿxV4ocationHistory** No content is currently available. - **Microphone** Current state of the microphone setting. - **PhoneCall** Current state of the phone call setting. - **PhoneCallHistory** Current state of the call history setting. @@ -2147,6 +2150,8 @@ The following fields are available: - **InternalPrimaryDisplaySizePhysicalY** Retrieves the physical vertical length of the display in mm. Used for calculating the diagonal length in inches - **NumberofExternalDisplays** Retrieves the number of external displays connected to the machine - **NumberofInternalDisplays** Retrieves the number of internal displays in a machine. +- **OumberofExternalDisplays** No content is currently available. +- **OumberofInternalDisplays** No content is currently available. - **VRAMDedicated** Retrieves the video RAM in MB. - **VRAMDedicatedSystem** Retrieves the amount of memory on the dedicated video card. - **VRAMSharedSystem** Retrieves the amount of RAM memory that the video card can use. @@ -2267,6 +2272,7 @@ The following fields are available: - **XboxConsolePreferredLanguage** Retrieves the preferred language selected by the user on Xbox console. - **XboxConsoleSerialNumber** Retrieves the serial number of the Xbox console. +- **XboxConsoleSerialOumber** No content is currently available. - **XboxLiveDeviceId** Retrieves the unique device ID of the console. - **XboxLiveSandboxId** Retrieves the developer sandbox ID if the device is internal to Microsoft. @@ -2446,12 +2452,14 @@ Describes the installation state for all hardware and software components availa The following fields are available: +- **ac|ion** No content is currently available. - **action** The change that was invoked on a device inventory object. - **cction** No content is currently available. - **inventoryId** Device ID used for Compatibility testing - **objectInstanceId** Object identity which is unique within the device scope. - **objectType** Indicates the object type that the event applies to. - **syncId** A string used to group StartSync, EndSync, Add, and Remove operations that belong together. This field is unique by Sync period and is used to disambiguate in situations where multiple agents perform overlapping inventories for the same object. +- **synkId** No content is currently available. ## Compatibility events @@ -2709,6 +2717,7 @@ This event sends data about the health and quality of the diagnostic data from t The following fields are available: - **AgentConnectionErrorsCount** Number of non-timeout errors associated with the host/agent channel. +- **AgentConnectionrrorCsCount** No content is currently available. - **CensusExitCode** The last exit code of the Census task. - **CensusStartTime** Time of last Census run. - **CensusTaskEnabled** True if Census is enabled, false otherwise. @@ -2722,7 +2731,9 @@ The following fields are available: - **DbDroppedFailureCount** Number of events dropped due to DB failures. - **DbDroppedFullCount** Number of events dropped due to DB fullness. - **DecodingDroppedCount** Number of events dropped due to decoding failures. +- **DecodthiDroppedCount** No content is currently available. - **EnteringCriticalOverflowDroppedCounter** Number of events dropped due to critical overflow mode being initiated. +- **EnterthiCriticalOverflowDroppedCounter** No content is currently available. - **EtwDroppedBufferCount** Number of buffers dropped in the UTC ETW session. - **EtwDroppedCount** Number of events dropped at ETW layer of telemetry client. - **EventsPersistedCount** Number of events that reached the PersistEvent stage. @@ -2737,17 +2748,24 @@ The following fields are available: - **HeartBeatSequenceNumber** The sequence number of this heartbeat. - **InvalidHttpCodeCount** Number of invalid HTTP codes received from contacting Vortex. - **LastAgentConnectionError** Last non-timeout error encountered in the host/agent channel. +- **LastAgentConnectionrrorC** No content is currently available. - **LastEventSizeOffender** Event name of last event which exceeded max event size. - **LastInvalidHttpCode** Last invalid HTTP code received from Vortex. - **MaxActiveAgentConnectionCount** The maximum number of active agents during this heartbeat timeframe. - **MaxInUseScenarioCounter** Soft maximum number of scenarios loaded by UTC. +- **MaxInUseScenaryoCounter** No content is currently available. - **PreviousHeartBeatTime** Time of last heartbeat event (allows chaining of events). - **PrivacyBlockedCount** The number of events blocked due to privacy settings or tags. +- **RepeatedUploadFailqreDpopped** No content is currently available. - **RepeatedUploadFailureDropped** Number of events lost due to repeated upload failures for a single buffer. - **SettingsHttpAttempts** Number of attempts to contact OneSettings service. - **SettingsHttpFailures** The number of failures from contacting the OneSettings service. +- **SettthisHttpAttempts** No content is currently available. +- **SettthisHttpFailures** No content is currently available. - **ThrottledDroppedCount** Number of events dropped due to throttling of noisy providers. - **TopUploaderErrors** List of top errors received from the upload endpoint. +- **TopUploaderrrorCs** No content is currently available. +- **UphoaderErporCount** No content is currently available. - **UploaderDroppedCount** Number of events dropped at the uploader layer of telemetry client. - **UploaderErrorCount** Number of errors received from the upload endpoint. - **VortexFailuresTimeout** The number of timeout failures received from Vortex. @@ -2756,6 +2774,7 @@ The following fields are available: - **VortexHttpFailures5xx** Number of 500-599 error codes received from Vortex. - **VortexHttpResponseFailures** Number of Vortex responses that are not 2XX or 400. - **VortexHttpResponsesWithDroppedEvents** Number of Vortex responses containing at least 1 dropped event. +- **틠"怀⋖��"ꀀ⋙��"怀⋛"倀⋢** No content is currently available. ### TelClientSynthetic.HeartBeat_Aria_5 @@ -2772,6 +2791,7 @@ The following fields are available: - **DbDroppedFailureCount** Number of events dropped due to database failures. - **DbDroppedFullCount** Number of events dropped due to database being full. - **EnteringCriticalOverflowDroppedCounter** Number of events dropped due to critical overflow mode being initiated. +- **Eve~tStoreResetCounter** No content is currently available. - **EventsPersistedCount** Number of events that reached the PersistEvent stage. - **EventStoreLifetimeResetCounter** Number of times the event store has been reset. - **EventStoreResetCounter** Number of times the event store has been reset during this heartbeat. @@ -3358,87 +3378,50 @@ This event sends basic GPU and display driver information to keep Windows and di The following fields are available: -- **AdapterDypeValue** No content is currently available. - **AdapterTypeValue** The numeric value indicating the type of Graphics adapter. -- **aiseqId** No content is currently available. - **aiSeqId** The event sequence ID. -- **AsPostAdapter** No content is currently available. +- **AsMiracastSupported** No content is currently available. - **bootId** The system boot ID. -- **BrightnessVersion'iaDDI** No content is currently available. - **BrightnessVersionViaDDI** The version of the Display Brightness Interface. -- **BrightnessVersIonViaDDI** No content is currently available. -- **BvightnessVersionViaDDI** No content is currently available. -- **Com2utePreemptionLevel** No content is currently available. - **ComputePreemptionLevel** The maximum preemption level supported by GPU for compute payload. - **DedicatedSystemMemoryB** The amount of system memory dedicated for GPU use (in bytes). - **DedicatedVideoMemoryB** The amount of dedicated VRAM of the GPU (in bytes). -- **DicplayAdapterLuid** No content is currently available. +- **DisplaqAdapterLuid** No content is currently available. - **DisplayAdapterLuid** The display adapter LUID. -- **Driver48,k** No content is currently available. - **DriverDate** The date of the display driver. -- **DriverFersion** No content is currently available. -- **DriverRa~k** No content is currently available. - **DriverRank** The rank of the display driver. - **DriverVersion** The display driver version. - **DX10UMDFilePath** The file path to the location of the DirectX 10 Display User Mode Driver in the Driver Store. - **DX11UMDFile@ath** No content is currently available. - **DX11UMDFilePath** The file path to the location of the DirectX 11 Display User Mode Driver in the Driver Store. -- **DX12EMDFilePath** No content is currently available. - **DX12UMDFilePath** The file path to the location of the DirectX 12 Display User Mode Driver in the Driver Store. -- **DX9]MDFilePath** No content is currently available. -- **DX9EMDFilePath** No content is currently available. - **DX9UMDFilePath** The file path to the location of the DirectX 9 Display User Mode Driver in the Driver Store. -- **G@UVendorID** No content is currently available. - **GPUDeviceID** The GPU device ID. -- **GPUPree}ptionLevel** No content is currently available. -- **GPUPreemptionLdvel** No content is currently available. - **GPUPreemptionLevel** The maximum preemption level supported by GPU for graphics payload. - **GPURevisionID** The GPU revision ID. -- **GPUVendoeID** No content is currently available. - **GPUVendorID** The GPU vendor ID. -- **I¤MismatchLDA** No content is currently available. -- **InterbaceId** No content is currently available. - **InterfaceId** The GPU interface ID. -- **IÓDisplayDevice** No content is currently available. -- **IqMPOSupported** No content is currently available. -- **IrRemovable** No content is currently available. -- **IsCoftwareDevice** No content is currently available. -- **IsDisp|ayDevice** No content is currently available. - **IsDisplayDevice** Does the GPU have displaying capabilities? - **IsHwSchSupported** Indicates whether the adapter supports hardware scheduling. - **IsHybridDiscrete** Does the GPU have discrete GPU capabilities in a hybrid device? -- **IsHybridIntdgrated** No content is currently available. - **IsHybridIntegrated** Does the GPU have integrated GPU capabilities in a hybrid device? - **IsLDA** Is the GPU comprised of Linked Display Adapters? -- **IsMicmatchLDA** No content is currently available. - **IsMiracastSupported** Does the GPU support Miracast? -- **IsMism`tchLDA** No content is currently available. - **IsMismatchLDA** Is at least one device in the Linked Display Adapters chain from a different vendor? -- **IsMPOCupported** No content is currently available. -- **IsMPOSuppor|ed** No content is currently available. - **IsMPOSupported** Does the GPU support Multi-Plane Overlays? - **IsMsMiracastSupported** Are the GPU Miracast capabilities driven by a Microsoft solution? - **IsPostAdapter** Is this GPU the POST GPU in the device? - **IsRemovable** TRUE if the adapter supports being disabled or removed. - **IsRenderDevice** Does the GPU have rendering capabilities? - **IsSoftwareDevice** Is this a software implementation of the GPU? -- **IsSoftwareDevicg** No content is currently available. -- **KMD@ilePath** No content is currently available. - **KMDFilePath** The file path to the location of the Display Kernel Mode Driver in the Driver Store. - **MeasureEnabled** Is the device listening to MICROSOFT_KEYWORD_MEASURES? - **MsHybridDiscrete** Indicates whether the adapter is a discrete adapter in a hybrid configuration. -- **NumTidPlTarMets** No content is currently available. -- **NumVidPDSouPces** No content is currently available. - **NumVidPnSources** The number of supported display output sources. - **NumVidPnTargets** The number of supported display output targets. -- **SharedCystemMemoryB** No content is currently available. - **SharedSystemMemoryB** The amount of system memory shared by GPU and CPU (in bytes). -- **SubSyste}ID** No content is currently available. - **SubSystemID** The subsystem ID. -- **SubSystemKD** No content is currently available. -- **SubVendoeID** No content is currently available. - **SubVendorID** The GPU sub vendor ID. -- **TelematryEnabled** No content is currently available. - **TelemetryEnabled** Is the device listening to MICROSOFT_KEYWORD_TELEMETRY? - **TelInvEvntTrigger** What triggered this event to be logged? Example: 0 (GPU enumeration) or 1 (DxgKrnlTelemetry provider toggling) - **version** The event version. @@ -3540,21 +3523,19 @@ The following fields are available: - **ExceptionCode** The exception code returned by the process that has crashed. - **ExceptionOffset** The address where the exception had occurred. - **Flags** Flags indicating how reporting is done. For example, queue the report, do not offer JIT debugging, or do not terminate the process after reporting. +- **FoiendlyAppName** No content is currently available. - **FriendlyAppName** The description of the app that has crashed, if different from the AppName. Otherwise, the process name. - **IsFatal** True/False to indicate whether the crash resulted in process termination. - **ModName** Exception module name (e.g. bar.dll). - **ModNamevaultsv** No content is currently available. -- **ModNaoe** No content is currently available. - **ModTimeStamp** The date/time stamp of the module. - **ModVersion** The version of the module that has crashed. - **PaccageFullName** No content is currently available. - **PackageFullName** Store application identity. -- **PackageFuLlName** No content is currently available. - **PackageRelaatieAppId** No content is currently available. - **PackageRelativaAppId** No content is currently available. - **PackageRelativeAppId** Store application identity. - **ProcessArchitecture** Architecture of the crashing process, as one of the PROCESSOR_ARCHITECTURE_* constants: 0: PROCESSOR_ARCHITECTURE_INTEL. 5: PROCESSOR_ARCHITECTURE_ARM. 9: PROCESSOR_ARCHITECTURE_AMD64. 12: PROCESSOR_ARCHITECTURE_ARM64. -- **ProcessCreateDime** No content is currently available. - **ProcessCreateTime** The time of creation of the process that has crashed. - **ProcessId** The ID of the process that has crashed. - **PRocessId** No content is currently available. @@ -3567,6 +3548,7 @@ The following fields are available: - **TargetAsId** The sequence number for the hanging process. - **TargetAwId** No content is currently available. - **TrocessArchitecture** No content is currently available. +- **TrocessCreateTime** No content is currently available. ## Feature update events @@ -3908,7 +3890,7 @@ The following fields are available: This event represents the basic metadata about a plug and play (PNP) device and its associated driver. -This event includes fields from [Ms.Dedevi.DedeviInventoryChange](#msdedevidedeviinventorychange). +This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedeviceinventorychange). The following fields are available: @@ -3932,6 +3914,7 @@ The following fields are available: - **ExtendedInfs** The extended INF file names. - **HWID** A list of hardware IDs for the device. - **HWID.Count** No content is currently available. +- **IlstallStcte** No content is currently available. - **Inf** The name of the INF file (possibly renamed by the OS, such as oemXX.inf). - **InstallCtate** No content is currently available. - **InstallState** The device installation state. For a list of values, see: https://msdn.microsoft.com/en-us/library/windows/hardware/ff543130.aspx @@ -3943,12 +3926,16 @@ The following fields are available: - **MatchingID** The Hardware ID or Compatible ID that Windows uses to install a device instance. - **Model** Identifies the model of the device. - **ParentId** The Device Instance ID of the parent of the device. +- **Part@_Ms.Devkce.DeviaeInventmryChangg** No content is currently available. See [Part@_Ms.Devkce.DeviaeInventmryChangg](#part@_msdevkcedeviaeinventmrychangg). - **ProblemCode** The error code currently returned by the device, if applicable. - **Provider** Identifies the device provider. - **Service** The name of the device service. +- **STACKAD** No content is currently available. - **STACKID** The list of hardware IDs for the stack. - **STACKID.Count** No content is currently available. +- **UpperAlassFilvers** No content is currently available. - **UpperClassFilters** The identifiers of the Upper Class filters installed for the device. +- **UpperFilteps** No content is currently available. - **UpperFilters** The identifiers of the Upper filters installed for the device. @@ -4016,6 +4003,8 @@ The following fields are available: - **DriverTimeStamp** The low 32 bits of the time stamp of the driver file. - **DriverType** A bitfield of driver attributes: 1. define DRIVER_MAP_DRIVER_TYPE_PRINTER 0x0001. 2. define DRIVER_MAP_DRIVER_TYPE_KERNEL 0x0002. 3. define DRIVER_MAP_DRIVER_TYPE_USER 0x0004. 4. define DRIVER_MAP_DRIVER_IS_SIGNED 0x0008. 5. define DRIVER_MAP_DRIVER_IS_INBOX 0x0010. 6. define DRIVER_MAP_DRIVER_IS_WINQUAL 0x0040. 7. define DRIVER_MAP_DRIVER_IS_SELF_SIGNED 0x0020. 8. define DRIVER_MAP_DRIVER_IS_CI_SIGNED 0x0080. 9. define DRIVER_MAP_DRIVER_HAS_BOOT_SERVICE 0x0100. 10. define DRIVER_MAP_DRIVER_TYPE_I386 0x10000. 11. define DRIVER_MAP_DRIVER_TYPE_IA64 0x20000. 12. define DRIVER_MAP_DRIVER_TYPE_AMD64 0x40000. 13. define DRIVER_MAP_DRIVER_TYPE_ARM 0x100000. 14. define DRIVER_MAP_DRIVER_TYPE_THUMB 0x200000. 15. define DRIVER_MAP_DRIVER_TYPE_ARMNT 0x400000. 16. define DRIVER_MAP_DRIVER_IS_TIME_STAMPED 0x800000. - **DriverVersion** The version of the driver file. +- **DviverCompany** No content is currently available. +- **Imagesize** No content is currently available. - **ImageSize** The size of the driver file. - **Inf** The name of the INF file. - **InventoryVersion** The version of the inventory file generating the events. @@ -4805,6 +4794,7 @@ The following fields are available: - **originatingContextId** The ID of the originating call context that resulted in the failure. - **originatingContextMessage** The message of the originating call context that resulted in the failure. - **originatingContextName** The name of the originating call context that resulted in the failure. +- **threa0Id** No content is currently available. - **threadId** The ID of the thread on which the activity is executing. @@ -4896,9 +4886,12 @@ Scan process event on Windows Update client. See the EventScenario field for spe The following fields are available: +- **AativityMatchingId** No content is currently available. - **ActivityMatchingId** Contains a unique ID identifying a single CheckForUpdates session from initialization to completion. +- **ActivityMatcjingId** No content is currently available. - **AllowCachedResul|s** No content is currently available. - **AllowCachedResults** Indicates if the scan allowed using cached results. +- **AllowCachedRmsults** No content is currently available. - **ApplicableUpdateInfo** Metadata for the updates which were detected as applicable - **BiosFamily** The family of the BIOS (Basic Input Output System). - **BiosName** The name of the device BIOS. @@ -4922,6 +4915,7 @@ The following fields are available: - **DriverError** The error code hit during a driver scan. This is 0 if no error was encountered. - **DriverExclusionPolicy** Indicates if the policy for not including drivers with Windows Update is enabled. - **DriverSyncPassPerformed** Were drivers scanned this time? +- **DriverSyncPasSPerformed** No content is currently available. - **EventInstanceID** A globally unique identifier for event instance. - **EventScenario** Indicates the purpose of sending this event - whether because the software distribution just started checking for content, or whether it was cancelled, succeeded, or failed. - **ExtendedetadataICabUrl** No content is currently available. @@ -4931,6 +4925,7 @@ The following fields are available: - **FailedUpdatesCount** The number of updates that failed to be evaluated during the scan. - **FeatureUpdateDeferral** The deferral period configured for feature OS updates on the device (in days). - **FeatureUpdatePause** Indicates whether feature OS updates are paused on the device. +- **FeatureUpdatePausePerimd** No content is currently available. - **FeatureUpdatePausePeriod** The pause duration configured for feature OS updates on the device (in days). - **FlightBranch** The branch that a device is on if participating in flighting (pre-release builds). - **FlightRing** The ring (speed of getting builds) that a device is on if participating in flighting (pre-release builds). @@ -4938,10 +4933,12 @@ The following fields are available: - **IntentPFNs** Intended application-set metadata for atomic update scenarios. - **IPVersion** Indicates whether the download took place over IPv4 or IPv6 - **IsWUfBDualScanEnabled** Indicates if Windows Update for Business dual scan is enabled on the device. +- **IsWUfBEna`led** No content is currently available. - **IsWUfBEnabled** Indicates if Windows Update for Business is enabled on the device. - **IsWUfBFederatedScanDisabled** Indicates if Windows Update for Business federated scan is disabled on the device. - **MetadataIntegrityMode** The mode of the update transport metadata integrity check. 0-Unknown, 1-Ignoe, 2-Audit, 3-Enforce - **MSIError** The last error that was encountered during a scan for updates. +- **NetworkConneativityDetected** No content is currently available. - **NetworkConnectivityDetected** Indicates the type of network connectivity that was detected. 0 - IPv4, 1 - IPv6 - **NumberOfApplicableUpdates** The number of updates which were ultimately deemed applicable to the system after the detection process is complete - **NumberOfApplicationsCategoryScanEvaluated** The number of categories (apps) for which an app update scan checked @@ -4966,6 +4963,7 @@ The following fields are available: - **ScanDurationInSeconds** The number of seconds a scan took - **ScanEnqueueTime** The number of seconds it took to initialize a scan - **ScanProps** This is a 32-bit integer containing Boolean properties for a given Windows Update scan. The following bits are used; all remaining bits are reserved and set to zero. Bit 0 (0x1): IsInteractive - is set to 1 if the scan is requested by a user, or 0 if the scan is requested by Automatic Updates. Bit 1 (0x2): IsSeeker - is set to 1 if the Windows Update client's Seeker functionality is enabled. Seeker functionality is enabled on certain interactive scans, and results in the scans returning certain updates that are in the initial stages of release (not yet released for full adoption via Automatic Updates). +- **ServiaeUrl** No content is currently available. - **ServiceGuid** An ID which represents which service the software distribution client is checking for content (Windows Update, Microsoft Store, etc.). - **ServiceUrl** The environment URL a device is configured to scan with - **ShippingMobileOperator** The mobile operator that a device shipped on. @@ -5020,6 +5018,7 @@ The following fields are available: - **ActiveDownloadTime** How long the download took, in seconds, excluding time where the update wasn't actively being downloaded. - **AppXBlockHashFailures** Indicates the number of blocks that failed hash validation during download of the app payload. +- **AppXBlocKHashFailures** No content is currently available. - **AppXBlockHashValidationFailureCount** A count of the number of blocks that have failed validation after being downloaded. - **AppXDownloadScope** Indicates the scope of the download for application content. - **AppXScope** Indicates the scope of the app download. @@ -5037,6 +5036,7 @@ The following fields are available: - **BytesDownloaded** Number of bytes that were downloaded for an individual piece of content (not the entire bundle). - **CachedEngineVersion** The version of the “Self-Initiated Healing” (SIH) engine that is cached on the device, if applicable. - **CallerApplicationName** The name provided by the application that initiated API calls into the software distribution client. +- **CallerApplicavionName** No content is currently available. - **CbsDownloadMethod** Indicates whether the download was a full- or a partial-file download. - **CbsMethod** The method used for downloading the update content related to the Component Based Servicing (CBS) technology. - **CDNCountryCode** Two letter country abbreviation for the Content Distribution Network (CDN) location. @@ -5077,6 +5077,7 @@ The following fields are available: - **Reason** A 32-bit integer representing the reason the update is blocked from being downloaded in the background. - **RegulationReason** The reason that the update is regulated - **RegulationResult** The result code (HResult) of the last attempt to contact the regulation web service for download regulation of update content. +- **RegulitionResult** No content is currently available. - **RelatedCV** The Correlation Vector that was used before the most recent change to a new Correlation Vector. - **RepeatFailCount** Indicates whether this specific content has previously failed. - **RepeatFailFlag** Indicates whether this specific content previously failed to download. @@ -5179,6 +5180,7 @@ The following fields are available: - **CurrentMobileOperator** The mobile operator to which the device is currently connected. - **DeploymentProviderMode** The mode of operation of the update deployment provider. - **DeviceModel** The device model. +- **DriverPifgBack** No content is currently available. - **DriverPingBack** Contains information about the previous driver and system state. - **DriverRecoveryIds** The list of identifiers that could be used for uninstalling the drivers if a recovery is required. - **EventInstanceID** A globally unique identifier for event instance. @@ -5652,6 +5654,7 @@ The following fields are available: - **Count** The count of applicable OneSettings for the device. - **FlightId** Unique ID for the flight (test instance version). +- **Obj%ctId** No content is currently available. - **ObjectId** The unique value for each Update Agent mode. - **Parameters** The set of name value pair parameters sent to OneSettings to determine if there are any applicable OneSettings. - **RelatedCV** The correlation vector value generated from the latest USO (Update Service Orchestrator) scan. @@ -6666,6 +6669,7 @@ The following fields are available: - **bytesFromCacheServer** Bytes received from a cache host. - **bytesFromCdN** No content is currently available. - **bytesFromCDN** The number of bytes received from a CDN source. +- **bytesFromGpoupPeers** No content is currently available. - **bytesFromGroupPeers** The number of bytes received from a peer in the same domain group. - **bytesFromIntÐeers** No content is currently available. - **bytesFromIntPeers** The number of bytes received from peers not in the same LAN or in the same domain group. @@ -6703,6 +6707,7 @@ The following fields are available: - **gMaxMemoryStreamBytes** Maximum usage for memory streaming. - **groupConjectionCount** No content is currently available. - **groupConnectionCount** The total number of connections made to peers in the same group. +- **internetConnectionCnunt** No content is currently available. - **internetConnectionCount** The total number of connections made to peers not in the same LAN or the same group. - **internetConnectionCountdownlinkBps** No content is currently available. - **isEjcrypted** No content is currently available. @@ -6762,6 +6767,7 @@ The following fields are available: - **isVp|** No content is currently available. - **isVpn** Is the device connected to a Virtual Private Network? - **jobID** Identifier for the Windows Update job. +- **ksVpn** No content is currently available. - **LoadBehavior** No content is currently available. - **LSID** No content is currently available. - **OfficeArchitecture** No content is currently available. @@ -6827,6 +6833,7 @@ The following fields are available: - **routeToCacheSedver** No content is currently available. - **routeToCacheServer** Cache server setting, source, and value. - **sessionID** The ID for the file download session. +- **sessionIF** No content is currently available. - **sessmonID** No content is currently available. - **setConfigs** A JSON representation of the configurations that have been set, and their sources. - **updateID** The ID of the update being downloaded. @@ -6852,6 +6859,7 @@ The following fields are available: - **htppStatusCode** No content is currently available. - **httpStatusCode** The HTTP status code returned by the CDN. - **isHeadRequest** The type of HTTP request that was sent to the CDN. Example: HEAD or GET +- **peerTyp,** No content is currently available. - **peerType** The type of peer (LAN, Group, Internet, CDN, Cache Host, etc.). - **requestOffset** The byte offset within the file in the sent request. - **requestSize** The size of the range requested from the CDN. @@ -6871,6 +6879,7 @@ The following fields are available: - **experimentId** When running a test, this is used to correlate with other events that are part of the same test. - **fileID** The ID of the file being downloaded. - **jobID** The Windows Update job ID. +- **jobKD** No content is currently available. ## Windows Update events From 2f7c31ab8fea6329c5acb39b99b235deacdbd592 Mon Sep 17 00:00:00 2001 From: Jeanie Decker Date: Tue, 19 Mar 2019 08:26:28 -0700 Subject: [PATCH 078/724] version 1903 --- windows/configuration/wcd/wcd-changes.md | 4 ++-- 1 file changed, 2 insertions(+), 2 deletions(-) diff --git a/windows/configuration/wcd/wcd-changes.md b/windows/configuration/wcd/wcd-changes.md index b846faedb0..785a38cf30 100644 --- a/windows/configuration/wcd/wcd-changes.md +++ b/windows/configuration/wcd/wcd-changes.md @@ -13,7 +13,7 @@ ms.date: 10/02/2018 # Changes to settings in Windows Configuration Designer -## Settings added in Windows 10, version ? +## Settings added in Windows 10, version 1903 - [DeviceUpdateCenter](wcd-deviceupdatecenter.md) - [Privacy](wcd-privacy.md) @@ -24,7 +24,7 @@ ms.date: 10/02/2018 - [Policies > Power](wcd-policies.md#power) - [StorageD3InModernStandby](wcd-storaged3inmodernstandby.md) -## Settings removed in Windows 10, version ? +## Settings removed in Windows 10, version 1903 - [WLAN](wcd-wlan.md) From 630c0fb7caf1bf4a3cb209617ead0a2585959ef8 Mon Sep 17 00:00:00 2001 From: Brian Lich Date: Tue, 19 Mar 2019 09:08:15 -0700 Subject: [PATCH 079/724] new build 3/19/2019 9:08 AM --- .../basic-level-windows-diagnostic-events-and-fields-1903.md | 4 +++- 1 file changed, 3 insertions(+), 1 deletion(-) diff --git a/windows/privacy/basic-level-windows-diagnostic-events-and-fields-1903.md b/windows/privacy/basic-level-windows-diagnostic-events-and-fields-1903.md index 1a86bd7a44..03eb191a9a 100644 --- a/windows/privacy/basic-level-windows-diagnostic-events-and-fields-1903.md +++ b/windows/privacy/basic-level-windows-diagnostic-events-and-fields-1903.md @@ -13,7 +13,7 @@ manager: dansimp ms.collection: M365-security-compliance ms.topic: article audience: ITPro -ms.date: 03/18/2019 +ms.date: 03/19/2019 --- @@ -3130,6 +3130,8 @@ This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedevic The following fields are available: +- **Audio.CaptureDriver** No content is currently available. +- **Audio.RenderDriver** No content is currently available. - **Audio_CaptureDriver** The Audio device capture driver endpoint. - **Audio_RenderDriver** The Audio device render driver endpoint. - **InventoryVersion** The version of the inventory file generating the events. From 98569285e4f4f915486532c0c8f4426902d3a7e7 Mon Sep 17 00:00:00 2001 From: Brian Lich Date: Tue, 19 Mar 2019 09:08:22 -0700 Subject: [PATCH 080/724] new build 3/19/2019 9:08 AM --- ...ndows-diagnostic-events-and-fields-1703.md | 2 +- ...ndows-diagnostic-events-and-fields-1709.md | 2 +- ...ndows-diagnostic-events-and-fields-1803.md | 2 +- ...ndows-diagnostic-events-and-fields-1809.md | 15708 ++++++++-------- 4 files changed, 7858 insertions(+), 7856 deletions(-) diff --git a/windows/privacy/basic-level-windows-diagnostic-events-and-fields-1703.md b/windows/privacy/basic-level-windows-diagnostic-events-and-fields-1703.md index ed6399b844..28d0314670 100644 --- a/windows/privacy/basic-level-windows-diagnostic-events-and-fields-1703.md +++ b/windows/privacy/basic-level-windows-diagnostic-events-and-fields-1703.md @@ -13,7 +13,7 @@ manager: dansimp ms.collection: M365-security-compliance ms.topic: article audience: ITPro -ms.date: 03/18/2019 +ms.date: 03/19/2019 --- diff --git a/windows/privacy/basic-level-windows-diagnostic-events-and-fields-1709.md b/windows/privacy/basic-level-windows-diagnostic-events-and-fields-1709.md index 280f37035d..16140deb3c 100644 --- a/windows/privacy/basic-level-windows-diagnostic-events-and-fields-1709.md +++ b/windows/privacy/basic-level-windows-diagnostic-events-and-fields-1709.md @@ -13,7 +13,7 @@ manager: dansimp ms.collection: M365-security-compliance ms.topic: article audience: ITPro -ms.date: 03/18/2019 +ms.date: 03/19/2019 --- diff --git a/windows/privacy/basic-level-windows-diagnostic-events-and-fields-1803.md b/windows/privacy/basic-level-windows-diagnostic-events-and-fields-1803.md index f030734e75..cf362ccc46 100644 --- a/windows/privacy/basic-level-windows-diagnostic-events-and-fields-1803.md +++ b/windows/privacy/basic-level-windows-diagnostic-events-and-fields-1803.md @@ -13,7 +13,7 @@ manager: dansimp ms.collection: M365-security-compliance ms.topic: article audience: ITPro -ms.date: 03/18/2019 +ms.date: 03/19/2019 --- diff --git a/windows/privacy/basic-level-windows-diagnostic-events-and-fields-1809.md b/windows/privacy/basic-level-windows-diagnostic-events-and-fields-1809.md index 57eaedd246..1daea9d4d6 100644 --- a/windows/privacy/basic-level-windows-diagnostic-events-and-fields-1809.md +++ b/windows/privacy/basic-level-windows-diagnostic-events-and-fields-1809.md @@ -1,7853 +1,7855 @@ ---- -description: Use this article to learn more about what Windows diagnostic data is gathered at the basic level. -title: Windows 10, version 1809 basic diagnostic events and fields (Windows 10) -keywords: privacy, telemetry -ms.prod: w10 -ms.mktglfcycl: manage -ms.sitesec: library -ms.pagetype: security -localizationpriority: high -author: brianlic-msft -ms.author: brianlic -manager: dansimp -ms.collection: M365-security-compliance -ms.topic: article -audience: ITPro -ms.date: 03/18/2019 ---- - - -# Windows 10, version 1809 basic level Windows diagnostic events and fields - - **Applies to** - -- Windows 10, version 1809 - - -The Basic level gathers a limited set of information that is critical for understanding the device and its configuration including: basic device information, quality-related information, app compatibility, and Microsoft Store. When the level is set to Basic, it also includes the Security level information. - -The Basic level helps to identify problems that can occur on a particular device hardware or software configuration. For example, it can help determine if crashes are more frequent on devices with a specific amount of memory or that are running a particular driver version. This helps Microsoft fix operating system or app problems. - -Use this article to learn about diagnostic events, grouped by event area, and the fields within each event. A brief description is provided for each field. Every event generated includes common data, which collects device data. - -You can learn more about Windows functional and diagnostic data through these articles: - - -- [Windows 10, version 1803 basic diagnostic events and fields](basic-level-windows-diagnostic-events-and-fields-1803.md) -- [Windows 10, version 1709 basic diagnostic events and fields](basic-level-windows-diagnostic-events-and-fields-1709.md) -- [Windows 10, version 1703 basic diagnostic events and fields](basic-level-windows-diagnostic-events-and-fields-1703.md) -- [Manage connections from Windows operating system components to Microsoft services](manage-connections-from-windows-operating-system-components-to-microsoft-services.md) -- [Configure Windows diagnostic data in your organization](configure-windows-diagnostic-data-in-your-organization.md) - - - - -## Account trace logging provider events - -### Microsoft.Windows.Mitigation.AccountTraceLoggingProvider.General - -This event provides information about application properties to indicate the successful execution. - -The following fields are available: - -- **AppMode** Indicates the mode the app is being currently run around privileges. -- **ExitCode** Indicates the exit code of the app. -- **Help** Indicates if the app needs to be launched in the help mode. -- **ParseError** Indicates if there was a parse error during the execution. -- **RightsAcquired** Indicates if the right privileges were acquired for successful execution. -- **RightsWereEnabled** Indicates if the right privileges were enabled for successful execution. -- **TestMode** Indicates whether the app is being run in test mode. - - -### Microsoft.Windows.Mitigation.AccountTraceLoggingProvider.GetCount - -This event provides information about the properties of user accounts in the Administrator group. - -The following fields are available: - -- **Internal** Indicates the internal property associated with the count group. -- **LastError** The error code (if applicable) for the cause of the failure to get the count of the user account. -- **Result** The HResult error. - - -## AppLocker events - -### Microsoft.Windows.Security.AppLockerCSP.ActivityStoppedAutomatically - -Automatically closed activity for start/stop operations that aren't explicitly closed. - - - -### Microsoft.Windows.Security.AppLockerCSP.AddParams - -Parameters passed to Add function of the AppLockerCSP Node. - -The following fields are available: - -- **child** The child URI of the node to add. -- **uri** URI of the node relative to %SYSTEM32%/AppLocker. - - -### Microsoft.Windows.Security.AppLockerCSP.AddStart - -Start of "Add" Operation for the AppLockerCSP Node. - - - -### Microsoft.Windows.Security.AppLockerCSP.AddStop - -End of "Add" Operation for AppLockerCSP Node. - -The following fields are available: - -- **hr** The HRESULT returned by Add function in AppLockerCSP. - - -### Microsoft.Windows.Security.AppLockerCSP.CAppLockerCSP::Rollback - -Result of the 'Rollback' operation in AppLockerCSP. - -The following fields are available: - -- **oldId** Previous id for the CSP transaction. -- **txId** Current id for the CSP transaction. - - -### Microsoft.Windows.Security.AppLockerCSP.ClearParams - -Parameters passed to the "Clear" operation for AppLockerCSP. - -The following fields are available: - -- **uri** The URI relative to the %SYSTEM32%\AppLocker folder. - - -### Microsoft.Windows.Security.AppLockerCSP.ClearStart - -Start of the "Clear" operation for the AppLockerCSP Node. - - - -### Microsoft.Windows.Security.AppLockerCSP.ClearStop - -End of the "Clear" operation for the AppLockerCSP node. - -The following fields are available: - -- **hr** HRESULT reported at the end of the 'Clear' function. - - -### Microsoft.Windows.Security.AppLockerCSP.ConfigManagerNotificationStart - -Start of the "ConfigManagerNotification" operation for AppLockerCSP. - -The following fields are available: - -- **NotifyState** State sent by ConfigManager to AppLockerCSP. - - -### Microsoft.Windows.Security.AppLockerCSP.ConfigManagerNotificationStop - -End of the "ConfigManagerNotification" operation for AppLockerCSP. - -The following fields are available: - -- **hr** HRESULT returned by the ConfigManagerNotification function in AppLockerCSP. - - -### Microsoft.Windows.Security.AppLockerCSP.CreateNodeInstanceParams - -Parameters passed to the CreateNodeInstance function of the AppLockerCSP node. - -The following fields are available: - -- **NodeId** NodeId passed to CreateNodeInstance. -- **nodeOps** NodeOperations parameter passed to CreateNodeInstance. -- **uri** URI passed to CreateNodeInstance, relative to %SYSTEM32%\AppLocker. - - -### Microsoft.Windows.Security.AppLockerCSP.CreateNodeInstanceStart - -Start of the "CreateNodeInstance" operation for the AppLockerCSP node. - - - -### Microsoft.Windows.Security.AppLockerCSP.CreateNodeInstanceStop - -End of the "CreateNodeInstance" operation for the AppLockerCSP node - -The following fields are available: - -- **hr** HRESULT returned by the CreateNodeInstance function in AppLockerCSP. - - -### Microsoft.Windows.Security.AppLockerCSP.DeleteChildParams - -Parameters passed to the DeleteChild function of the AppLockerCSP node. - -The following fields are available: - -- **child** The child URI of the node to delete. -- **uri** URI relative to %SYSTEM32%\AppLocker. - - -### Microsoft.Windows.Security.AppLockerCSP.DeleteChildStart - -Start of the "DeleteChild" operation for the AppLockerCSP node. - - - -### Microsoft.Windows.Security.AppLockerCSP.DeleteChildStop - -End of the "DeleteChild" operation for the AppLockerCSP node. - -The following fields are available: - -- **hr** HRESULT returned by the DeleteChild function in AppLockerCSP. - - -### Microsoft.Windows.Security.AppLockerCSP.EnumPolicies - -Logged URI relative to %SYSTEM32%\AppLocker, if the Plugin GUID is null, or the CSP doesn't believe the old policy is present. - -The following fields are available: - -- **uri** URI relative to %SYSTEM32%\AppLocker. - - -### Microsoft.Windows.Security.AppLockerCSP.GetChildNodeNamesParams - -Parameters passed to the GetChildNodeNames function of the AppLockerCSP node. - -The following fields are available: - -- **uri** URI relative to %SYSTEM32%/AppLocker for MDM node. - - -### Microsoft.Windows.Security.AppLockerCSP.GetChildNodeNamesStart - -Start of the "GetChildNodeNames" operation for the AppLockerCSP node. - - - -### Microsoft.Windows.Security.AppLockerCSP.GetChildNodeNamesStop - -End of the "GetChildNodeNames" operation for the AppLockerCSP node. - -The following fields are available: - -- **child[0]** If function succeeded, the first child's name, else "NA". -- **count** If function succeeded, the number of child node names returned by the function, else 0. -- **hr** HRESULT returned by the GetChildNodeNames function of AppLockerCSP. - - -### Microsoft.Windows.Security.AppLockerCSP.GetLatestId - -The result of 'GetLatestId' in AppLockerCSP (the latest time stamped GUID). - -The following fields are available: - -- **dirId** The latest directory identifier found by GetLatestId. -- **id** The id returned by GetLatestId if id > 0 - otherwise the dirId parameter. - - -### Microsoft.Windows.Security.AppLockerCSP.HResultException - -HRESULT thrown by any arbitrary function in AppLockerCSP. - -The following fields are available: - -- **file** File in the OS code base in which the exception occurs. -- **function** Function in the OS code base in which the exception occurs. -- **hr** HRESULT that is reported. -- **line** Line in the file in the OS code base in which the exception occurs. - - -### Microsoft.Windows.Security.AppLockerCSP.SetValueParams - -Parameters passed to the SetValue function of the AppLockerCSP node. - -The following fields are available: - -- **dataLength** Length of the value to set. -- **uri** The node URI to that should contain the value, relative to %SYSTEM32%\AppLocker. - - -### Microsoft.Windows.Security.AppLockerCSP.SetValueStart - -Start of the "SetValue" operation for the AppLockerCSP node. - - - -### Microsoft.Windows.Security.AppLockerCSP.SetValueStop - -End of the "SetValue" operation for the AppLockerCSP node. - -The following fields are available: - -- **hr** HRESULT returned by the SetValue function in AppLockerCSP. - - -### Microsoft.Windows.Security.AppLockerCSP.TryRemediateMissingPolicies - -EntryPoint of fix step or policy remediation, includes URI relative to %SYSTEM32%\AppLocker that needs to be fixed. - -The following fields are available: - -- **uri** URI for node relative to %SYSTEM32%/AppLocker. - - -## Appraiser events - -### Microsoft.Windows.Appraiser.General.ChecksumTotalPictureCount - -This event lists the types of objects and how many of each exist on the client device. This allows for a quick way to ensure that the records present on the server match what is present on the client. - -The following fields are available: - -- **DatasourceApplicationFile_19ASetup** The count of the number of this particular object type present on this device. -- **DatasourceApplicationFile_19H1** The count of the number of this particular object type present on this device. -- **DatasourceApplicationFile_19H1Setup** The count of the number of this particular object type present on this device. -- **DatasourceApplicationFile_RS1** An ID for the system, calculated by hashing hardware identifiers. -- **DatasourceApplicationFile_RS2** An ID for the system, calculated by hashing hardware identifiers. -- **DatasourceApplicationFile_RS3** The count of the number of this particular object type present on this device. -- **DatasourceApplicationFile_RS3Setup** The count of the number of this particular object type present on this device. -- **DatasourceApplicationFile_RS4** The count of the number of this particular object type present on this device. -- **DatasourceApplicationFile_RS4Setup** The count of the number of this particular object type present on this device. -- **DatasourceApplicationFile_RS5** The count of the number of this particular object type present on this device. -- **DatasourceApplicationFile_RS5Setup** The count of the number of this particular object type present on this device. -- **DatasourceApplicationFile_TH1** The count of the number of this particular object type present on this device. -- **DatasourceApplicationFile_TH2** The count of the number of this particular object type present on this device. -- **DatasourceDevicePnp_19ASetup** The count of the number of this particular object type present on this device. -- **DatasourceDevicePnp_19H1** The count of the number of this particular object type present on this device. -- **DatasourceDevicePnp_19H1Setup** The count of the number of this particular object type present on this device. -- **DatasourceDevicePnp_RS1** The total DataSourceDevicePnp objects targeting Windows 10 version 1607 on this device. -- **DatasourceDevicePnp_RS2** The count of the number of this particular object type present on this device. -- **DatasourceDevicePnp_RS3** The count of the number of this particular object type present on this device. -- **DatasourceDevicePnp_RS3Setup** The count of the number of this particular object type present on this device. -- **DatasourceDevicePnp_RS4** The count of the number of this particular object type present on this device. -- **DatasourceDevicePnp_RS4Setup** The count of the number of this particular object type present on this device. -- **DatasourceDevicePnp_RS5** The count of the number of this particular object type present on this device. -- **DatasourceDevicePnp_RS5Setup** The count of the number of this particular object type present on this device. -- **DatasourceDevicePnp_TH1** The count of the number of this particular object type present on this device. -- **DatasourceDevicePnp_TH2** The count of the number of this particular object type present on this device. -- **DatasourceDriverPackage_19ASetup** The count of the number of this particular object type present on this device. -- **DatasourceDriverPackage_19H1** The count of the number of this particular object type present on this device. -- **DatasourceDriverPackage_19H1Setup** The count of the number of this particular object type present on this device. -- **DatasourceDriverPackage_RS1** The total DataSourceDriverPackage objects targeting Windows 10 version 1607 on this device. -- **DatasourceDriverPackage_RS2** The total DataSourceDriverPackage objects targeting Windows 10, version 1703 on this device. -- **DatasourceDriverPackage_RS3** The count of the number of this particular object type present on this device. -- **DatasourceDriverPackage_RS3Setup** The count of the number of this particular object type present on this device. -- **DatasourceDriverPackage_RS4** The count of the number of this particular object type present on this device. -- **DatasourceDriverPackage_RS4Setup** The count of the number of this particular object type present on this device. -- **DatasourceDriverPackage_RS5** The count of the number of this particular object type present on this device. -- **DatasourceDriverPackage_RS5Setup** The count of the number of this particular object type present on this device. -- **DatasourceDriverPackage_TH1** The count of the number of this particular object type present on this device. -- **DatasourceDriverPackage_TH2** The count of the number of this particular object type present on this device. -- **DataSourceMatchingInfoBlock_19ASetup** The count of the number of this particular object type present on this device. -- **DataSourceMatchingInfoBlock_19H1** The count of the number of this particular object type present on this device. -- **DataSourceMatchingInfoBlock_19H1Setup** The count of the number of this particular object type present on this device. -- **DataSourceMatchingInfoBlock_RS1** The total DataSourceMatchingInfoBlock objects targeting Windows 10 version 1607 on this device. -- **DataSourceMatchingInfoBlock_RS2** The count of the number of this particular object type present on this device. -- **DataSourceMatchingInfoBlock_RS3** The count of the number of this particular object type present on this device. -- **DataSourceMatchingInfoBlock_RS3Setup** The count of the number of this particular object type present on this device. -- **DataSourceMatchingInfoBlock_RS4** The count of the number of this particular object type present on this device. -- **DataSourceMatchingInfoBlock_RS4Setup** The count of the number of this particular object type present on this device. -- **DataSourceMatchingInfoBlock_RS5** The count of the number of this particular object type present on this device. -- **DataSourceMatchingInfoBlock_RS5Setup** The count of the number of this particular object type present on this device. -- **DataSourceMatchingInfoBlock_TH1** The count of the number of this particular object type present on this device. -- **DataSourceMatchingInfoBlock_TH2** The count of the number of this particular object type present on this device. -- **DataSourceMatchingInfoPassive_19ASetup** The count of the number of this particular object type present on this device. -- **DataSourceMatchingInfoPassive_19H1** The count of the number of this particular object type present on this device. -- **DataSourceMatchingInfoPassive_19H1Setup** The count of the number of this particular object type present on this device. -- **DataSourceMatchingInfoPassive_RS1** The total DataSourceMatchingInfoPassive objects targeting Windows 10 version 1607 on this device. -- **DataSourceMatchingInfoPassive_RS2** The count of the number of this particular object type present on this device. -- **DataSourceMatchingInfoPassive_RS3** The count of the number of this particular object type present on this device. -- **DataSourceMatchingInfoPassive_RS3Setup** The count of the number of this particular object type present on this device. -- **DataSourceMatchingInfoPassive_RS4** The count of the number of this particular object type present on this device. -- **DataSourceMatchingInfoPassive_RS4Setup** The count of the number of this particular object type present on this device. -- **DataSourceMatchingInfoPassive_RS5** The count of the number of this particular object type present on this device. -- **DataSourceMatchingInfoPassive_RS5Setup** The count of the number of this particular object type present on this device. -- **DataSourceMatchingInfoPassive_TH1** The count of the number of this particular object type present on this device. -- **DataSourceMatchingInfoPassive_TH2** The count of the number of this particular object type present on this device. -- **DataSourceMatchingInfoPostUpgrade_19ASetup** The count of the number of this particular object type present on this device. -- **DataSourceMatchingInfoPostUpgrade_19H1** The count of the number of this particular object type present on this device. -- **DataSourceMatchingInfoPostUpgrade_19H1Setup** The count of the number of this particular object type present on this device. -- **DataSourceMatchingInfoPostUpgrade_RS1** The total DataSourceMatchingInfoPostUpgrade objects targeting Windows 10 version 1607 on this device. -- **DataSourceMatchingInfoPostUpgrade_RS2** The total DataSourceMatchingInfoPostUpgrade objects targeting Windows 10 version 1703 on this device. -- **DataSourceMatchingInfoPostUpgrade_RS3** The total DataSourceMatchingInfoPostUpgrade objects targeting Windows 10 version 1709 on this device. -- **DataSourceMatchingInfoPostUpgrade_RS3Setup** The count of the number of this particular object type present on this device. -- **DataSourceMatchingInfoPostUpgrade_RS4** The count of the number of this particular object type present on this device. -- **DataSourceMatchingInfoPostUpgrade_RS4Setup** The count of the number of this particular object type present on this device. -- **DataSourceMatchingInfoPostUpgrade_RS5** The count of the number of this particular object type present on this device. -- **DataSourceMatchingInfoPostUpgrade_RS5Setup** The count of the number of this particular object type present on this device. -- **DataSourceMatchingInfoPostUpgrade_TH1** The count of the number of this particular object type present on this device. -- **DataSourceMatchingInfoPostUpgrade_TH2** The count of the number of this particular object type present on this device. -- **DatasourceSystemBios_19ASetup** The count of the number of this particular object type present on this device. -- **DatasourceSystemBios_19H1** The count of the number of this particular object type present on this device. -- **DatasourceSystemBios_19H1Setup** The count of the number of this particular object type present on this device. -- **DatasourceSystemBios_RS1** The total DatasourceSystemBios objects targeting Windows 10 version 1607 present on this device. -- **DatasourceSystemBios_RS2** The total DatasourceSystemBios objects targeting Windows 10 version 1703 present on this device. -- **DatasourceSystemBios_RS3** The total DatasourceSystemBios objects targeting Windows 10 version 1709 present on this device. -- **DatasourceSystemBios_RS3Setup** The count of the number of this particular object type present on this device. -- **DatasourceSystemBios_RS4** The count of the number of this particular object type present on this device. -- **DatasourceSystemBios_RS4Setup** The count of the number of this particular object type present on this device. -- **DatasourceSystemBios_RS5** The count of the number of this particular object type present on this device. -- **DatasourceSystemBios_RS5Setup** The count of the number of this particular object type present on this device. -- **DatasourceSystemBios_TH1** The count of the number of this particular object type present on this device. -- **DatasourceSystemBios_TH2** The count of the number of this particular object type present on this device. -- **DecisionApplicationFile_19ASetup** The count of the number of this particular object type present on this device. -- **DecisionApplicationFile_19H1** The count of the number of this particular object type present on this device. -- **DecisionApplicationFile_19H1Setup** The count of the number of this particular object type present on this device. -- **DecisionApplicationFile_RS1** The count of the number of this particular object type present on this device. -- **DecisionApplicationFile_RS2** The count of the number of this particular object type present on this device. -- **DecisionApplicationFile_RS3** The count of the number of this particular object type present on this device. -- **DecisionApplicationFile_RS3Setup** The count of the number of this particular object type present on this device. -- **DecisionApplicationFile_RS4** The count of the number of this particular object type present on this device. -- **DecisionApplicationFile_RS4Setup** The count of the number of this particular object type present on this device. -- **DecisionApplicationFile_RS5** The count of the number of this particular object type present on this device. -- **DecisionApplicationFile_RS5Setup** The count of the number of this particular object type present on this device. -- **DecisionApplicationFile_TH1** The count of the number of this particular object type present on this device. -- **DecisionApplicationFile_TH2** The count of the number of this particular object type present on this device. -- **DecisionDevicePnp_19ASetup** The count of the number of this particular object type present on this device. -- **DecisionDevicePnp_19H1** The count of the number of this particular object type present on this device. -- **DecisionDevicePnp_19H1Setup** The count of the number of this particular object type present on this device. -- **DecisionDevicePnp_RS1** The total DecisionDevicePnp objects targeting Windows 10 version 1607 on this device. -- **DecisionDevicePnp_RS2** The count of the number of this particular object type present on this device. -- **DecisionDevicePnp_RS3** The count of the number of this particular object type present on this device. -- **DecisionDevicePnp_RS3Setup** The count of the number of this particular object type present on this device. -- **DecisionDevicePnp_RS4** The count of the number of this particular object type present on this device. -- **DecisionDevicePnp_RS4Setup** The count of the number of this particular object type present on this device. -- **DecisionDevicePnp_RS5** The count of the number of this particular object type present on this device. -- **DecisionDevicePnp_RS5Setup** The count of the number of this particular object type present on this device. -- **DecisionDevicePnp_TH1** The count of the number of this particular object type present on this device. -- **DecisionDevicePnp_TH2** The count of the number of this particular object type present on this device. -- **DecisionDriverPackage_19ASetup** The count of the number of this particular object type present on this device. -- **DecisionDriverPackage_19H1** The count of the number of this particular object type present on this device. -- **DecisionDriverPackage_19H1Setup** The count of the number of this particular object type present on this device. -- **DecisionDriverPackage_RS1** The total DecisionDriverPackage objects targeting Windows 10 version 1607 on this device. -- **DecisionDriverPackage_RS2** The count of the number of this particular object type present on this device. -- **DecisionDriverPackage_RS3** The count of the number of this particular object type present on this device. -- **DecisionDriverPackage_RS3Setup** The count of the number of this particular object type present on this device. -- **DecisionDriverPackage_RS4** The count of the number of this particular object type present on this device. -- **DecisionDriverPackage_RS4Setup** The count of the number of this particular object type present on this device. -- **DecisionDriverPackage_RS5** The count of the number of this particular object type present on this device. -- **DecisionDriverPackage_RS5Setup** The count of the number of this particular object type present on this device. -- **DecisionDriverPackage_TH1** The count of the number of this particular object type present on this device. -- **DecisionDriverPackage_TH2** The count of the number of this particular object type present on this device. -- **DecisionMatchingInfoBlock_19ASetup** The count of the number of this particular object type present on this device. -- **DecisionMatchingInfoBlock_19H1** The count of the number of this particular object type present on this device. -- **DecisionMatchingInfoBlock_19H1Setup** The count of the number of this particular object type present on this device. -- **DecisionMatchingInfoBlock_RS1** The total DecisionMatchingInfoBlock objects targeting Windows 10 version 1607 present on this device. -- **DecisionMatchingInfoBlock_RS2** The total DecisionMatchingInfoBlock objects targeting Windows 10 version 1703 present on this device. -- **DecisionMatchingInfoBlock_RS3** The total DecisionMatchingInfoBlock objects targeting Windows 10 version 1709 present on this device. -- **DecisionMatchingInfoBlock_RS3Setup** The count of the number of this particular object type present on this device. -- **DecisionMatchingInfoBlock_RS4** The total DecisionMatchingInfoBlock objects targeting Windows 10 version 1803 present on this device. -- **DecisionMatchingInfoBlock_RS4Setup** The count of the number of this particular object type present on this device. -- **DecisionMatchingInfoBlock_RS5** The count of the number of this particular object type present on this device. -- **DecisionMatchingInfoBlock_RS5Setup** The count of the number of this particular object type present on this device. -- **DecisionMatchingInfoBlock_TH1** The count of the number of this particular object type present on this device. -- **DecisionMatchingInfoBlock_TH2** The count of the number of this particular object type present on this device. -- **DecisionMatchingInfoPassive_19ASetup** The count of the number of this particular object type present on this device. -- **DecisionMatchingInfoPassive_19H1** The count of the number of this particular object type present on this device. -- **DecisionMatchingInfoPassive_19H1Setup** The count of the number of this particular object type present on this device. -- **DecisionMatchingInfoPassive_RS1** The total DecisionMatchingInfoPassive objects targeting Windows 10 version 1607 on this device. -- **DecisionMatchingInfoPassive_RS2** The total DecisionMatchingInfoPassive objects targeting Windows 10 version 1703 on this device. -- **DecisionMatchingInfoPassive_RS3** The total DecisionMatchingInfoPassive objects targeting Windows 10 version 1803 on this device. -- **DecisionMatchingInfoPassive_RS3Setup** The count of the number of this particular object type present on this device. -- **DecisionMatchingInfoPassive_RS4** The count of the number of this particular object type present on this device. -- **DecisionMatchingInfoPassive_RS4Setup** The count of the number of this particular object type present on this device. -- **DecisionMatchingInfoPassive_RS5** The count of the number of this particular object type present on this device. -- **DecisionMatchingInfoPassive_RS5Setup** The count of the number of this particular object type present on this device. -- **DecisionMatchingInfoPassive_TH1** The count of the number of this particular object type present on this device. -- **DecisionMatchingInfoPassive_TH2** The count of the number of this particular object type present on this device. -- **DecisionMatchingInfoPostUpgrade_19ASetup** The count of the number of this particular object type present on this device. -- **DecisionMatchingInfoPostUpgrade_19H1** The count of the number of this particular object type present on this device. -- **DecisionMatchingInfoPostUpgrade_19H1Setup** The count of the number of this particular object type present on this device. -- **DecisionMatchingInfoPostUpgrade_RS1** The total DecisionMatchingInfoPostUpgrade objects targeting Windows 10 version 1607 on this device. -- **DecisionMatchingInfoPostUpgrade_RS2** The total DecisionMatchingInfoPostUpgrade objects targeting Windows 10 version 1703 on this device. -- **DecisionMatchingInfoPostUpgrade_RS3** The total DecisionMatchingInfoPostUpgrade objects targeting Windows 10 version 1709 on this device. -- **DecisionMatchingInfoPostUpgrade_RS3Setup** The count of the number of this particular object type present on this device. -- **DecisionMatchingInfoPostUpgrade_RS4** The count of the number of this particular object type present on this device. -- **DecisionMatchingInfoPostUpgrade_RS4Setup** The count of the number of this particular object type present on this device. -- **DecisionMatchingInfoPostUpgrade_RS5** The count of the number of this particular object type present on this device. -- **DecisionMatchingInfoPostUpgrade_RS5Setup** The count of the number of this particular object type present on this device. -- **DecisionMatchingInfoPostUpgrade_TH1** The count of the number of this particular object type present on this device. -- **DecisionMatchingInfoPostUpgrade_TH2** The count of the number of this particular object type present on this device. -- **DecisionMediaCenter_19ASetup** The count of the number of this particular object type present on this device. -- **DecisionMediaCenter_19H1** The count of the number of this particular object type present on this device. -- **DecisionMediaCenter_19H1Setup** The total DecisionMediaCenter objects targeting the next release of Windows on this device. -- **DecisionMediaCenter_RS1** The total DecisionMediaCenter objects targeting Windows 10 version 1607 present on this device. -- **DecisionMediaCenter_RS2** The total DecisionMediaCenter objects targeting Windows 10 version 1703 present on this device. -- **DecisionMediaCenter_RS3** The total DecisionMediaCenter objects targeting Windows 10 version 1709 present on this device. -- **DecisionMediaCenter_RS3Setup** The count of the number of this particular object type present on this device. -- **DecisionMediaCenter_RS4** The total DecisionMediaCenter objects targeting Windows 10 version 1803 present on this device. -- **DecisionMediaCenter_RS4Setup** The count of the number of this particular object type present on this device. -- **DecisionMediaCenter_RS5** The count of the number of this particular object type present on this device. -- **DecisionMediaCenter_RS5Setup** The count of the number of this particular object type present on this device. -- **DecisionMediaCenter_TH1** The count of the number of this particular object type present on this device. -- **DecisionMediaCenter_TH2** The count of the number of this particular object type present on this device. -- **DecisionSystemBios_19ASetup** The total DecisionSystemBios objects targeting the next release of Windows on this device. -- **DecisionSystemBios_19H1** The count of the number of this particular object type present on this device. -- **DecisionSystemBios_19H1Setup** The total DecisionSystemBios objects targeting the next release of Windows on this device. -- **DecisionSystemBios_RS1** The total DecisionSystemBios objects targeting Windows 10 version 1607 on this device. -- **DecisionSystemBios_RS2** The total DecisionSystemBios objects targeting Windows 10 version 1703 on this device. -- **DecisionSystemBios_RS3** The total DecisionSystemBios objects targeting Windows 10 version 1709 on this device. -- **DecisionSystemBios_RS3Setup** The count of the number of this particular object type present on this device. -- **DecisionSystemBios_RS4** The total DecisionSystemBios objects targeting Windows 10 version, 1803 present on this device. -- **DecisionSystemBios_RS4Setup** The total DecisionSystemBios objects targeting the next release of Windows on this device. -- **DecisionSystemBios_RS5** The total DecisionSystemBios objects targeting the next release of Windows on this device. -- **DecisionSystemBios_RS5Setup** The total DecisionSystemBios objects targeting the next release of Windows on this device. -- **DecisionSystemBios_TH1** The count of the number of this particular object type present on this device. -- **DecisionSystemBios_TH2** The count of the number of this particular object type present on this device. -- **DecisionSystemProcessor_RS2** The count of the number of this particular object type present on this device. -- **DecisionTest_RS1** An ID for the system, calculated by hashing hardware identifiers. -- **InventoryApplicationFile** The count of the number of this particular object type present on this device. -- **InventoryDeviceContainer** A count of device container objects in cache. -- **InventoryDevicePnp** A count of device Plug and Play objects in cache. -- **InventoryDriverBinary** A count of driver binary objects in cache. -- **InventoryDriverPackage** A count of device objects in cache. -- **InventoryLanguagePack** The count of the number of this particular object type present on this device. -- **InventoryMediaCenter** The count of the number of this particular object type present on this device. -- **InventorySystemBios** The count of the number of this particular object type present on this device. -- **InventorySystemMachine** The count of the number of this particular object type present on this device. -- **InventorySystemProcessor** The count of the number of this particular object type present on this device. -- **InventoryTest** The count of the number of this particular object type present on this device. -- **InventoryUplevelDriverPackage** The count of the number of this particular object type present on this device. -- **PCFP** The count of the number of this particular object type present on this device. -- **SystemMemory** The count of the number of this particular object type present on this device. -- **SystemProcessorCompareExchange** The count of the number of this particular object type present on this device. -- **SystemProcessorLahfSahf** The count of the number of this particular object type present on this device. -- **SystemProcessorNx** The total number of objects of this type present on this device. -- **SystemProcessorPrefetchW** The total number of objects of this type present on this device. -- **SystemProcessorSse2** The total number of objects of this type present on this device. -- **SystemTouch** The count of the number of this particular object type present on this device. -- **SystemWim** The total number of objects of this type present on this device. -- **SystemWindowsActivationStatus** The count of the number of this particular object type present on this device. -- **SystemWlan** The total number of objects of this type present on this device. -- **Wmdrm_19ASetup** The count of the number of this particular object type present on this device. -- **Wmdrm_19H1** The count of the number of this particular object type present on this device. -- **Wmdrm_19H1Setup** The total Wmdrm objects targeting the next release of Windows on this device. -- **Wmdrm_RS1** An ID for the system, calculated by hashing hardware identifiers. -- **Wmdrm_RS2** An ID for the system, calculated by hashing hardware identifiers. -- **Wmdrm_RS3** An ID for the system, calculated by hashing hardware identifiers. -- **Wmdrm_RS3Setup** The count of the number of this particular object type present on this device. -- **Wmdrm_RS4** The total Wmdrm objects targeting Windows 10, version 1803 present on this device. -- **Wmdrm_RS4Setup** The count of the number of this particular object type present on this device. -- **Wmdrm_RS5** The count of the number of this particular object type present on this device. -- **Wmdrm_RS5Setup** The count of the number of this particular object type present on this device. -- **Wmdrm_TH1** The count of the number of this particular object type present on this device. -- **Wmdrm_TH2** The count of the number of this particular object type present on this device. - - -### Microsoft.Windows.Appraiser.General.DatasourceApplicationFileAdd - -Represents the basic metadata about specific application files installed on the system. - -This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedeviceinventorychange). - -The following fields are available: - -- **AppraiserVersion** The version of the appraiser file that is generating the events. -- **AvDisplayName** If the app is an anti-virus app, this is its display name. -- **CompatModelIndex** The compatibility prediction for this file. -- **HasCitData** Indicates whether the file is present in CIT data. -- **HasUpgradeExe** Indicates whether the anti-virus app has an upgrade.exe file. -- **IsAv** Is the file an anti-virus reporting EXE? -- **ResolveAttempted** This will always be an empty string when sending telemetry. -- **SdbEntries** An array of fields that indicates the SDB entries that apply to this file. - - -### Microsoft.Windows.Appraiser.General.DatasourceApplicationFileRemove - -This event indicates that the DatasourceApplicationFile object is no longer present. - -This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedeviceinventorychange). - -The following fields are available: - -- **AppraiserVersion** The version of the Appraiser file that is generating the events. - - -### Microsoft.Windows.Appraiser.General.DatasourceApplicationFileStartSync - -This event indicates that a new set of DatasourceApplicationFileAdd events will be sent. - -This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedeviceinventorychange). - -The following fields are available: - -- **AppraiserVersion** The version of the Appraiser file that is generating the events. - - -### Microsoft.Windows.Appraiser.General.DatasourceDevicePnpAdd - -This event sends compatibility data for a Plug and Play device, to help keep Windows up to date. - -This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedeviceinventorychange). - -The following fields are available: - -- **ActiveNetworkConnection** Indicates whether the device is an active network device. -- **AppraiserVersion** The version of the appraiser file generating the events. -- **CosDeviceRating** An enumeration that indicates if there is a driver on the target operating system. -- **CosDeviceSolution** An enumeration that indicates how a driver on the target operating system is available. -- **CosDeviceSolutionUrl** Microsoft.Windows.Appraiser.General.DatasourceDevicePnpAdd . Empty string -- **CosPopulatedFromId** The expected uplevel driver matching ID based on driver coverage data. -- **IsBootCritical** Indicates whether the device boot is critical. -- **UplevelInboxDriver** Indicates whether there is a driver uplevel for this device. -- **WuDriverCoverage** Indicates whether there is a driver uplevel for this device, according to Windows Update. -- **WuDriverUpdateId** The Windows Update ID of the applicable uplevel driver. -- **WuPopulatedFromId** The expected uplevel driver matching ID based on driver coverage from Windows Update. - - -### Microsoft.Windows.Appraiser.General.DatasourceDevicePnpRemove - -This event indicates that the DatasourceDevicePnp object is no longer present. - -This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedeviceinventorychange). - -The following fields are available: - -- **AppraiserVersion** The version of the Appraiser file that is generating the events. - - -### Microsoft.Windows.Appraiser.General.DatasourceDevicePnpStartSync - -This event indicates that a new set of DatasourceDevicePnpAdd events will be sent. - -This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedeviceinventorychange). - -The following fields are available: - -- **AppraiserVersion** The version of the Appraiser file that is generating the events. - - -### Microsoft.Windows.Appraiser.General.DatasourceDriverPackageAdd - -This event sends compatibility database data about driver packages to help keep Windows up to date. - -This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedeviceinventorychange). - -The following fields are available: - -- **AppraiserVersion** The version of the appraiser file generating the events. - - -### Microsoft.Windows.Appraiser.General.DatasourceDriverPackageStartSync - -This event indicates that a new set of DatasourceDriverPackageAdd events will be sent. - -This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedeviceinventorychange). - -The following fields are available: - -- **AppraiserVersion** The version of the Appraiser file that is generating the events. - - -### Microsoft.Windows.Appraiser.General.DataSourceMatchingInfoBlockAdd - -This event sends blocking data about any compatibility blocking entries hit on the system that are not directly related to specific applications or devices, to help keep Windows up-to-date. - -This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedeviceinventorychange). - -The following fields are available: - -- **AppraiserVersion** The version of the appraiser file generating the events. - - -### Microsoft.Windows.Appraiser.General.DataSourceMatchingInfoBlockRemove - -This event indicates that the DataSourceMatchingInfoBlock object is no longer present. - -This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedeviceinventorychange). - -The following fields are available: - -- **AppraiserVersion** The version of the Appraiser file that is generating the events. - - -### Microsoft.Windows.Appraiser.General.DataSourceMatchingInfoBlockStartSync - -This event indicates that a full set of DataSourceMatchingInfoBlockStAdd events have been sent. - -This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedeviceinventorychange). - -The following fields are available: - -- **AppraiserVersion** The version of the Appraiser file that is generating the events. - - -### Microsoft.Windows.Appraiser.General.DataSourceMatchingInfoPassiveAdd - -This event sends compatibility database information about non-blocking compatibility entries on the system that are not keyed by either applications or devices, to help keep Windows up-to-date. - -This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedeviceinventorychange). - -The following fields are available: - -- **AppraiserVersion** The version of the appraiser file generating the events. - - -### Microsoft.Windows.Appraiser.General.DataSourceMatchingInfoPassiveRemove - -This event indicates that the DataSourceMatchingInfoPassive object is no longer present. - -This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedeviceinventorychange). - -The following fields are available: - -- **AppraiserVersion** The version of the Appraiser file that is generating the events. - - -### Microsoft.Windows.Appraiser.General.DataSourceMatchingInfoPassiveStartSync - -This event indicates that a new set of DataSourceMatchingInfoPassiveAdd events will be sent. - -This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedeviceinventorychange). - -The following fields are available: - -- **AppraiserVersion** The version of the Appraiser file that is generating the events. - - -### Microsoft.Windows.Appraiser.General.DataSourceMatchingInfoPostUpgradeAdd - -This event sends compatibility database information about entries requiring reinstallation after an upgrade on the system that are not keyed by either applications or devices, to help keep Windows up-to-date. - -This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedeviceinventorychange). - -The following fields are available: - -- **AppraiserVersion** The version of the appraiser file generating the events. - - -### Microsoft.Windows.Appraiser.General.DataSourceMatchingInfoPostUpgradeRemove - -This event indicates that the DataSourceMatchingInfoPostUpgrade object is no longer present. - -This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedeviceinventorychange). - -The following fields are available: - -- **AppraiserVersion** The version of the Appraiser file that is generating the events. - - -### Microsoft.Windows.Appraiser.General.DataSourceMatchingInfoPostUpgradeStartSync - -This event indicates that a new set of DataSourceMatchingInfoPostUpgradeAdd events will be sent. - -This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedeviceinventorychange). - -The following fields are available: - -- **AppraiserVersion** The version of the Appraiser file that is generating the events. - - -### Microsoft.Windows.Appraiser.General.DatasourceSystemBiosAdd - -This event sends compatibility database information about the BIOS to help keep Windows up-to-date. - -This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedeviceinventorychange). - -The following fields are available: - -- **AppraiserVersion** The version of the Appraiser file generating the events. - - -### Microsoft.Windows.Appraiser.General.DatasourceSystemBiosRemove - -This event indicates that the DatasourceSystemBios object is no longer present. - -This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedeviceinventorychange). - -The following fields are available: - -- **AppraiserVersion** The version of the Appraiser file that is generating the events. - - -### Microsoft.Windows.Appraiser.General.DatasourceSystemBiosStartSync - -This event indicates that a new set of DatasourceSystemBiosAdd events will be sent. - -This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedeviceinventorychange). - -The following fields are available: - -- **AppraiserVersion** The version of the Appraiser file that is generating the events. - - -### Microsoft.Windows.Appraiser.General.DecisionApplicationFileAdd - -This event sends compatibility decision data about a file to help keep Windows up-to-date. - -This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedeviceinventorychange). - -The following fields are available: - -- **AppraiserVersion** The version of the appraiser file that is generating the events. -- **BlockAlreadyInbox** The uplevel runtime block on the file already existed on the current OS. -- **BlockingApplication** Indicates whether there are any application issues that interfere with the upgrade due to the file in question. -- **DisplayGenericMessage** Will be a generic message be shown for this file? -- **DisplayGenericMessageGated** Indicates whether a generic message be shown for this file. -- **HardBlock** This file is blocked in the SDB. -- **HasUxBlockOverride** Does the file have a block that is overridden by a tag in the SDB? -- **MigApplication** Does the file have a MigXML from the SDB associated with it that applies to the current upgrade mode? -- **MigRemoval** Does the file have a MigXML from the SDB that will cause the app to be removed on upgrade? -- **NeedsDismissAction** Will the file cause an action that can be dimissed? -- **NeedsInstallPostUpgradeData** After upgrade, the file will have a post-upgrade notification to install a replacement for the app. -- **NeedsNotifyPostUpgradeData** Does the file have a notification that should be shown after upgrade? -- **NeedsReinstallPostUpgradeData** After upgrade, this file will have a post-upgrade notification to reinstall the app. -- **NeedsUninstallAction** The file must be uninstalled to complete the upgrade. -- **SdbBlockUpgrade** The file is tagged as blocking upgrade in the SDB, -- **SdbBlockUpgradeCanReinstall** The file is tagged as blocking upgrade in the SDB. It can be reinstalled after upgrade. -- **SdbBlockUpgradeUntilUpdate** The file is tagged as blocking upgrade in the SDB. If the app is updated, the upgrade can proceed. -- **SdbReinstallUpgrade** The file is tagged as needing to be reinstalled after upgrade in the SDB. It does not block upgrade. -- **SdbReinstallUpgradeWarn** The file is tagged as needing to be reinstalled after upgrade with a warning in the SDB. It does not block upgrade. -- **SoftBlock** The file is softblocked in the SDB and has a warning. - - -### Microsoft.Windows.Appraiser.General.DecisionApplicationFileRemove - -This event indicates Indicates that the DecisionApplicationFile object is no longer present. - -This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedeviceinventorychange). - -The following fields are available: - -- **AppraiserVersion** The version of the Appraiser file that is generating the events. - - -### Microsoft.Windows.Appraiser.General.DecisionApplicationFileStartSync - -This event indicates that a new set of DecisionApplicationFileAdd events will be sent. - -This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedeviceinventorychange). - -The following fields are available: - -- **AppraiserVersion** The version of the Appraiser file that is generating the events. - - -### Microsoft.Windows.Appraiser.General.DecisionDevicePnpAdd - -This event sends compatibility decision data about a PNP device to help keep Windows up to date. - -This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedeviceinventorychange). - -The following fields are available: - -- **AppraiserVersion** The version of the appraiser file generating the events. -- **AssociatedDriverIsBlocked** Is the driver associated with this PNP device blocked? -- **AssociatedDriverWillNotMigrate** Will the driver associated with this plug-and-play device migrate? -- **BlockAssociatedDriver** Should the driver associated with this PNP device be blocked? -- **BlockingDevice** Is this PNP device blocking upgrade? -- **BlockUpgradeIfDriverBlocked** Is the PNP device both boot critical and does not have a driver included with the OS? -- **BlockUpgradeIfDriverBlockedAndOnlyActiveNetwork** Is this PNP device the only active network device? -- **DisplayGenericMessage** Will a generic message be shown during Setup for this PNP device? -- **DisplayGenericMessageGated** Indicates whether a generic message will be shown during Setup for this PNP device. -- **DriverAvailableInbox** Is a driver included with the operating system for this PNP device? -- **DriverAvailableOnline** Is there a driver for this PNP device on Windows Update? -- **DriverAvailableUplevel** Is there a driver on Windows Update or included with the operating system for this PNP device? -- **DriverBlockOverridden** Is there is a driver block on the device that has been overridden? -- **DriverJlockOverridden** No content is currently available. -- **NeedsDismissAction** Will the user would need to dismiss a warning during Setup for this device? -- **NotRegressed** Does the device have a problem code on the source OS that is no better than the one it would have on the target OS? -- **SdbDeviceBlockUpgrade** Is there an SDB block on the PNP device that blocks upgrade? -- **SdbDriverBlockOverridden** Is there an SDB block on the PNP device that blocks upgrade, but that block was overridden? - - -### Microsoft.Windows.Appraiser.General.DecisionDevicePnpRemove - -This event indicates that the DecisionDevicePnp object is no longer present. - -This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedeviceinventorychange). - -The following fields are available: - -- **AppraiserVersion** The version of the Appraiser file that is generating the events. - - -### Microsoft.Windows.Appraiser.General.DecisionDevicePnpStartSync - -The DecisionDevicePnpStartSync event indicates that a new set of DecisionDevicePnpAdd events will be sent. - -This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedeviceinventorychange). - -The following fields are available: - -- **AppraiserVersion** The version of the Appraiser file that is generating the events. - - -### Microsoft.Windows.Appraiser.General.DecisionDriverPackageAdd - -This event sends decision data about driver package compatibility to help keep Windows up to date. - -This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedeviceinventorychange). - -The following fields are available: - -- **AppraiserVersion** The version of the appraiser file generating the events. -- **DisplayGenericMessageGated** Indicates whether a generic offer block message will be shown for this driver package. -- **DriverBlockOverridden** Does the driver package have an SDB block that blocks it from migrating, but that block has been overridden? -- **DriverIsDeviceBlocked** Was the driver package was blocked because of a device block? -- **DriverIsDriverBlocked** Is the driver package blocked because of a driver block? -- **DriverIsTroubleshooterBlocked** Indicates whether the driver package is blocked because of a troubleshooter block. -- **DriverShouldNotMigrate** Should the driver package be migrated during upgrade? -- **SdbDriverBlockOverridden** Does the driver package have an SDB block that blocks it from migrating, but that block has been overridden? - - -### Microsoft.Windows.Appraiser.General.DecisionDriverPackageRemove - -This event indicates that the DecisionDriverPackage object is no longer present. - -This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedeviceinventorychange). - -The following fields are available: - -- **AppraiserVersion** The version of the Appraiser file that is generating the events. - - -### Microsoft.Windows.Appraiser.General.DecisionDriverPackageStartSync - -This event indicates that a new set of DecisionDriverPackageAdd events will be sent. - -This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedeviceinventorychange). - -The following fields are available: - -- **AppraiserVersion** The version of the Appraiser file that is generating the events. - - -### Microsoft.Windows.Appraiser.General.DecisionMatchingInfoBlockAdd - -This event sends compatibility decision data about blocking entries on the system that are not keyed by either applications or devices, to help keep Windows up to date. - -This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedeviceinventorychange). - -The following fields are available: - -- **AppraiserVersion** The version of the appraiser file generating the events. -- **BlockingApplication** Are there are any application issues that interfere with upgrade due to matching info blocks? -- **DisplayGenericMessage** Will a generic message be shown for this block? -- **NeedsUninstallAction** Does the user need to take an action in setup due to a matching info block? -- **SdbBlockUpgrade** Is a matching info block blocking upgrade? -- **SdbBlockUpgradeCanReinstall** Is a matching info block blocking upgrade, but has the can reinstall tag? -- **SdbBlockUpgradeUntilUpdate** Is a matching info block blocking upgrade but has the until update tag? - - -### Microsoft.Windows.Appraiser.General.DecisionMatchingInfoBlockRemove - -This event indicates that the DecisionMatchingInfoBlock object is no longer present. - -This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedeviceinventorychange). - -The following fields are available: - -- **AppraiserVersion** The version of the Appraiser file that is generating the events. - - -### Microsoft.Windows.Appraiser.General.DecisionMatchingInfoBlockStartSync - -This event indicates that a new set of DecisionMatchingInfoBlockAdd events will be sent. - -This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedeviceinventorychange). - -The following fields are available: - -- **AppraiserVersion** The version of the Appraiser file that is generating the events. - - -### Microsoft.Windows.Appraiser.General.DecisionMatchingInfoPassiveAdd - -This event sends compatibility decision data about non-blocking entries on the system that are not keyed by either applications or devices, to help keep Windows up to date. - -This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedeviceinventorychange). - -The following fields are available: - -- **AppraiserVersion** The version of the Appraiser file that is generating the events. -- **BlockingApplication** Are there any application issues that interfere with upgrade due to matching info blocks? -- **DisplayGenericMessageGated** Indicates whether a generic offer block message will be shown due to matching info blocks. -- **MigApplication** Is there a matching info block with a mig for the current mode of upgrade? - - -### Microsoft.Windows.Appraiser.General.DecisionMatchingInfoPassiveRemove - -This event Indicates that the DecisionMatchingInfoPassive object is no longer present. - -This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedeviceinventorychange). - -The following fields are available: - -- **AppraiserVersion** The version of the Appraiser file that is generating the events. - - -### Microsoft.Windows.Appraiser.General.DecisionMatchingInfoPassiveStartSync - -This event indicates that a new set of DecisionMatchingInfoPassiveAdd events will be sent. - -This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedeviceinventorychange). - -The following fields are available: - -- **AppraiserVersion** The version of the Appraiser file that is generating the events. - - -### Microsoft.Windows.Appraiser.General.DecisionMatchingInfoPostUpgradeAdd - -This event sends compatibility decision data about entries that require reinstall after upgrade. It's used to help keep Windows up to date. - -This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedeviceinventorychange). - -The following fields are available: - -- **AppraiserVersion** The version of the Appraiser file that is generating the events. -- **NeedsInstallPostUpgradeData** Will the file have a notification after upgrade to install a replacement for the app? -- **NeedsNotifyPostUpgradeData** Should a notification be shown for this file after upgrade? -- **NeedsReinstallPostUpgradeData** Will the file have a notification after upgrade to reinstall the app? -- **SdbReinstallUpgrade** The file is tagged as needing to be reinstalled after upgrade in the compatibility database (but is not blocking upgrade). - - -### Microsoft.Windows.Appraiser.General.DecisionMatchingInfoPostUpgradeRemove - -This event indicates that the DecisionMatchingInfoPostUpgrade object is no longer present. - -This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedeviceinventorychange). - -The following fields are available: - -- **AppraiserVersion** The version of the Appraiser file that is generating the events. - - -### Microsoft.Windows.Appraiser.General.DecisionMatchingInfoPostUpgradeStartSync - -This event indicates that a new set of DecisionMatchingInfoPostUpgradeAdd events will be sent. - -This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedeviceinventorychange). - -The following fields are available: - -- **AppraiserVersion** The version of the Appraiser file that is generating the events. - - -### Microsoft.Windows.Appraiser.General.DecisionMediaCenterAdd - -This event sends decision data about the presence of Windows Media Center, to help keep Windows up to date. - -This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedeviceinventorychange). - -The following fields are available: - -- **AppraiserVersion** The version of the Appraiser file generating the events. -- **BlockingApplication** Is there any application issues that interfere with upgrade due to Windows Media Center? -- **MediaCenterActivelyUsed** If Windows Media Center is supported on the edition, has it been run at least once and are the MediaCenterIndicators are true? -- **MediaCenterIndicators** Do any indicators imply that Windows Media Center is in active use? -- **MediaCenterInUse** Is Windows Media Center actively being used? -- **MediaCenterPaidOrActivelyUsed** Is Windows Media Center actively being used or is it running on a supported edition? -- **NeedsDismissAction** Are there any actions that can be dismissed coming from Windows Media Center? - - -### Microsoft.Windows.Appraiser.General.DecisionMediaCenterRemove - -This event indicates that the DecisionMediaCenter object is no longer present. - -This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedeviceinventorychange). - -The following fields are available: - -- **AppraiserVersion** The version of the Appraiser file that is generating the events. - - -### Microsoft.Windows.Appraiser.General.DecisionMediaCenterStartSync - -This event indicates that a new set of DecisionMediaCenterAdd events will be sent. - -This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedeviceinventorychange). - -The following fields are available: - -- **AppraiserVersion** The version of the Appraiser file that is generating the events. - - -### Microsoft.Windows.Appraiser.General.DecisionSystemBiosAdd - -This event sends compatibility decision data about the BIOS to help keep Windows up to date. - -This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedeviceinventorychange). - -The following fields are available: - -- **AppraiserVersion** The version of the Appraiser file generating the events. -- **Blocking** Is the device blocked from upgrade due to a BIOS block? -- **DisplayGenericMessageGated** Indicates whether a generic offer block message will be shown for the bios. -- **HasBiosBlock** Does the device have a BIOS block? - - -### Microsoft.Windows.Appraiser.General.DecisionSystemBiosRemove - -This event indicates that the DecisionSystemBios object is no longer present. - -This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedeviceinventorychange). - -The following fields are available: - -- **AppraiserVersion** The version of the Appraiser file that is generating the events. - - -### Microsoft.Windows.Appraiser.General.DecisionSystemBiosStartSync - -This event indicates that a new set of DecisionSystemBiosAdd events will be sent. - -This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedeviceinventorychange). - -The following fields are available: - -- **AppraiserVersion** The version of the Appraiser file that is generating the events. - - -### Microsoft.Windows.Appraiser.General.GatedRegChange - -This event sends data about the results of running a set of quick-blocking instructions, to help keep Windows up to date. - -The following fields are available: - -- **NewData** The data in the registry value after the scan completed. -- **OldData** The previous data in the registry value before the scan ran. -- **PCFP** An ID for the system calculated by hashing hardware identifiers. -- **RegKey** The registry key name for which a result is being sent. -- **RegValue** The registry value for which a result is being sent. -- **Time** The client time of the event. - - -### Microsoft.Windows.Appraiser.General.InventoryApplicationFileAdd - -This event represents the basic metadata about a file on the system. The file must be part of an app and either have a block in the compatibility database or be part of an antivirus program. - -This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedeviceinventorychange). - -The following fields are available: - -- **AppraiserVersion** The version of the Appraiser file generating the events. -- **AvDisplayName** If the app is an antivirus app, this is its display name. -- **AvProductState** Indicates whether the antivirus program is turned on and the signatures are up to date. -- **BinaryType** A binary type. Example: UNINITIALIZED, ZERO_BYTE, DATA_ONLY, DOS_MODULE, NE16_MODULE, PE32_UNKNOWN, PE32_I386, PE32_ARM, PE64_UNKNOWN, PE64_AMD64, PE64_ARM64, PE64_IA64, PE32_CLR_32, PE32_CLR_IL, PE32_CLR_IL_PREFER32, PE64_CLR_64. -- **BinFileVersion** An attempt to clean up FileVersion at the client that tries to place the version into 4 octets. -- **BinProductVersion** An attempt to clean up ProductVersion at the client that tries to place the version into 4 octets. -- **BoeProgramId** If there is no entry in Add/Remove Programs, this is the ProgramID that is generated from the file metadata. -- **CompanyName** The company name of the vendor who developed this file. -- **FileId** A hash that uniquely identifies a file. -- **FileVersion** The File version field from the file metadata under Properties -> Details. -- **HasUpgradeExe** Indicates whether the antivirus app has an upgrade.exe file. -- **IsAv** Indicates whether the file an antivirus reporting EXE. -- **LinkDate** The date and time that this file was linked on. -- **LowerCaseLongPath** The full file path to the file that was inventoried on the device. -- **Name** The name of the file that was inventoried. -- **ProductName** The Product name field from the file metadata under Properties -> Details. -- **ProductVersion** The Product version field from the file metadata under Properties -> Details. -- **ProgramId** A hash of the Name, Version, Publisher, and Language of an application used to identify it. -- **Size** The size of the file (in hexadecimal bytes). - - -### Microsoft.Windows.Appraiser.General.InventoryApplicationFileRemove - -This event indicates that the InventoryApplicationFile object is no longer present. - -This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedeviceinventorychange). - -The following fields are available: - -- **AppraiserVersion** The version of the Appraiser file that is generating the events. - - -### Microsoft.Windows.Appraiser.General.InventoryApplicationFileStartSync - -This event indicates indicates that a new set of InventoryApplicationFileAdd events will be sent. - -This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedeviceinventorychange). - -The following fields are available: - -- **AppraiserVersion** The version of the Appraiser file that is generating the events. - - -### Microsoft.Windows.Appraiser.General.InventoryLanguagePackAdd - -This event sends data about the number of language packs installed on the system, to help keep Windows up to date. - -This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedeviceinventorychange). - -The following fields are available: - -- **AppraiserVersion** The version of the Appraiser file that is generating the events. -- **HasLanguagePack** Indicates whether this device has 2 or more language packs. -- **LanguagePackCount** The number of language packs are installed. - - -### Microsoft.Windows.Appraiser.General.InventoryLanguagePackRemove - -This event indicates that the InventoryLanguagePack object is no longer present. - -This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedeviceinventorychange). - -The following fields are available: - -- **AppraiserVersion** The version of the Appraiser file that is generating the events. - - -### Microsoft.Windows.Appraiser.General.InventoryLanguagePackStartSync - -This event indicates that a new set of InventoryLanguagePackAdd events will be sent. - -This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedeviceinventorychange). - -The following fields are available: - -- **AppraiserVersion** The version of the Appraiser file that is generating the events. - - -### Microsoft.Windows.Appraiser.General.InventoryMediaCenterAdd - -This event sends true/false data about decision points used to understand whether Windows Media Center is used on the system, to help keep Windows up to date. - -This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedeviceinventorychange). - -The following fields are available: - -- **AppraiserVersion** The version of the Appraiser file generating the events. -- **EverLaunched** Has Windows Media Center ever been launched? -- **HasConfiguredTv** Has the user configured a TV tuner through Windows Media Center? -- **HasExtendedUserAccounts** Are any Windows Media Center Extender user accounts configured? -- **HasWatchedFolders** Are any folders configured for Windows Media Center to watch? -- **IsDefaultLauncher** Is Windows Media Center the default app for opening music or video files? -- **IsPaid** Is the user running a Windows Media Center edition that implies they paid for Windows Media Center? -- **IsSupported** Does the running OS support Windows Media Center? - - -### Microsoft.Windows.Appraiser.General.InventoryMediaCenterRemove - -This event indicates that the InventoryMediaCenter object is no longer present. - -This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedeviceinventorychange). - -The following fields are available: - -- **AppraiserVersion** The version of the Appraiser file that is generating the events. - - -### Microsoft.Windows.Appraiser.General.InventoryMediaCenterStartSync - -This event indicates that a new set of InventoryMediaCenterAdd events will be sent. - -This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedeviceinventorychange). - -The following fields are available: - -- **AppraiserVersion** The version of the Appraiser file that is generating the events. - - -### Microsoft.Windows.Appraiser.General.InventorySystemBiosAdd - -This event sends basic metadata about the BIOS to determine whether it has a compatibility block. - -This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedeviceinventorychange). - -The following fields are available: - -- **AppraiserVersion** The version of the Appraiser file that is generating the events. -- **biosDate** The release date of the BIOS in UTC format. -- **BiosDate** The release date of the BIOS in UTC format. -- **biosName** The name field from Win32_BIOS. -- **BiosName** The name field from Win32_BIOS. -- **manufacturer** The manufacturer field from Win32_ComputerSystem. -- **Manufacturer** The manufacturer field from Win32_ComputerSystem. -- **model** The model field from Win32_ComputerSystem. -- **Model** The model field from Win32_ComputerSystem. - - -### Microsoft.Windows.Appraiser.General.InventorySystemBiosRemove - -This event indicates that the InventorySystemBios object is no longer present. - -This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedeviceinventorychange). - -The following fields are available: - -- **AppraiserVersion** The version of the Appraiser file that is generating the events. - - -### Microsoft.Windows.Appraiser.General.InventorySystemBiosStartSync - -This event indicates that a new set of InventorySystemBiosAdd events will be sent. - -This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedeviceinventorychange). - -The following fields are available: - -- **AppraiserVersion** The version of the Appraiser file that is generating the events. - - -### Microsoft.Windows.Appraiser.General.InventoryUplevelDriverPackageAdd - -This event is only runs during setup. It provides a listing of the uplevel driver packages that were downloaded before the upgrade. Is critical to understanding if failures in setup can be traced to not having sufficient uplevel drivers before the upgrade. - -This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedeviceinventorychange). - -The following fields are available: - -- **AppraiserVersion** The version of the Appraiser file that is generating the events. -- **BootCritical** Is the driver package marked as boot critical? -- **Build** The build value from the driver package. -- **CatalogFile** The name of the catalog file within the driver package. -- **Class** The device class from the driver package. -- **ClassGuid** The device class unique ID from the driver package. -- **Date** The date from the driver package. -- **Inbox** Is the driver package of a driver that is included with Windows? -- **OriginalName** The original name of the INF file before it was renamed. Generally a path under $WINDOWS.~BT\Drivers\DU. -- **Provider** The provider of the driver package. -- **PublishedName** The name of the INF file after it was renamed. -- **Revision** The revision of the driver package. -- **SignatureStatus** Indicates if the driver package is signed. Unknown = 0, Unsigned = 1, Signed = 2. -- **VersionMajor** The major version of the driver package. -- **VersionMinor** The minor version of the driver package. - - -### Microsoft.Windows.Appraiser.General.InventoryUplevelDriverPackageRemove - -This event indicates that the InventoryUplevelDriverPackage object is no longer present. - -This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedeviceinventorychange). - -The following fields are available: - -- **AppraiserVersion** The version of the Appraiser file that is generating the events. - - -### Microsoft.Windows.Appraiser.General.InventoryUplevelDriverPackageStartSync - -This event indicates that a new set of InventoryUplevelDriverPackageAdd events will be sent. - -This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedeviceinventorychange). - -The following fields are available: - -- **AppraiserVersion** The version of the Appraiser file that is generating the events. - - -### Microsoft.Windows.Appraiser.General.RunContext - -This event indicates what should be expected in the data payload. - -The following fields are available: - -- **AppraiserBranch** The source branch in which the currently running version of Appraiser was built. -- **AppraiserProcess** The name of the process that launched Appraiser. -- **AppraiserVersion** The version of the Appraiser file generating the events. -- **CensusId** A unique hardware identifier. -- **Context** Indicates what mode Appraiser is running in. Example: Setup or Telemetry. -- **PCFP** An ID for the system calculated by hashing hardware identifiers. -- **Subcontext** Indicates what categories of incompatibilities appraiser is scanning for. Can be N/A, Resolve, or a semicolon-delimited list that can include App, Dev, Sys, Gat, or Rescan. -- **Time** The client time of the event. - - -### Microsoft.Windows.Appraiser.General.SystemMemoryAdd - -This event sends data on the amount of memory on the system and whether it meets requirements, to help keep Windows up-to-date. - -This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedeviceinventorychange). - -The following fields are available: - -- **AppraiserVersion** The version of the Appraiser file generating the events. -- **Blocking** Is the device from upgrade due to memory restrictions? -- **MemoryRequirementViolated** Was a memory requirement violated? -- **pageFile** The current committed memory limit for the system or the current process, whichever is smaller (in bytes). -- **ram** The amount of memory on the device. -- **ramKB** The amount of memory (in KB). -- **virtual** The size of the user-mode portion of the virtual address space of the calling process (in bytes). -- **virtualKB** The amount of virtual memory (in KB). - - -### Microsoft.Windows.Appraiser.General.SystemMemoryRemove - -This event that the SystemMemory object is no longer present. - -This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedeviceinventorychange). - -The following fields are available: - -- **AppraiserVersion** The version of the Appraiser file that is generating the events. - - -### Microsoft.Windows.Appraiser.General.SystemMemoryStartSync - -This event indicates that a new set of SystemMemoryAdd events will be sent. - -This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedeviceinventorychange). - -The following fields are available: - -- **AppraiserVersion** The version of the Appraiser file that is generating the events. - - -### Microsoft.Windows.Appraiser.General.SystemProcessorCompareExchangeAdd - -This event sends data indicating whether the system supports the CompareExchange128 CPU requirement, to help keep Windows up to date. - -This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedeviceinventorychange). - -The following fields are available: - -- **AppraiserVersion** The version of the Appraiser file generating the events. -- **Blocking** Is the upgrade blocked due to the processor? -- **CompareExchange128Support** Does the CPU support CompareExchange128? - - -### Microsoft.Windows.Appraiser.General.SystemProcessorCompareExchangeRemove - -This event indicates that the SystemProcessorCompareExchange object is no longer present. - -This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedeviceinventorychange). - -The following fields are available: - -- **AppraiserVersion** The version of the Appraiser file that is generating the events. - - -### Microsoft.Windows.Appraiser.General.SystemProcessorCompareExchangeStartSync - -This event indicates that a new set of SystemProcessorCompareExchangeAdd events will be sent. - -This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedeviceinventorychange). - -The following fields are available: - -- **AppraiserVersion** The version of the Appraiser file that is generating the events. - - -### Microsoft.Windows.Appraiser.General.SystemProcessorLahfSahfAdd - -This event sends data indicating whether the system supports the LahfSahf CPU requirement, to help keep Windows up-to-date. - -This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedeviceinventorychange). - -The following fields are available: - -- **AppraiserVersion** The version of the Appraiser file generating the events. -- **Blocking** Is the upgrade blocked due to the processor? -- **LahfSahfSupport** Does the CPU support LAHF/SAHF? - - -### Microsoft.Windows.Appraiser.General.SystemProcessorLahfSahfRemove - -This event indicates that the SystemProcessorLahfSahf object is no longer present. - -This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedeviceinventorychange). - -The following fields are available: - -- **AppraiserVersion** The version of the Appraiser file that is generating the events. - - -### Microsoft.Windows.Appraiser.General.SystemProcessorLahfSahfStartSync - -This event indicates that a new set of SystemProcessorLahfSahfAdd events will be sent. - -This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedeviceinventorychange). - -The following fields are available: - -- **AppraiserVersion** The version of the Appraiser file that is generating the events. - - -### Microsoft.Windows.Appraiser.General.SystemProcessorNxAdd - -This event sends data indicating whether the system supports the NX CPU requirement, to help keep Windows up-to-date. - -This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedeviceinventorychange). - -The following fields are available: - -- **AppraiserVersion** The version of the Appraiser file that is generating the events. -- **Blocking** Is the upgrade blocked due to the processor? -- **NXDriverResult** The result of the driver used to do a non-deterministic check for NX support. -- **NXProcessorSupport** Does the processor support NX? - - -### Microsoft.Windows.Appraiser.General.SystemProcessorNxRemove - -This event indicates that the SystemProcessorNx object is no longer present. - -This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedeviceinventorychange). - -The following fields are available: - -- **AppraiserVersion** The version of the Appraiser file that is generating the events. - - -### Microsoft.Windows.Appraiser.General.SystemProcessorNxStartSync - -This event indicates that a new set of SystemProcessorNxAdd events will be sent. - -This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedeviceinventorychange). - -The following fields are available: - -- **AppraiserVersion** The version of the Appraiser file that is generating the events. - - -### Microsoft.Windows.Appraiser.General.SystemProcessorPrefetchWAdd - -This event sends data indicating whether the system supports the PrefetchW CPU requirement, to help keep Windows up to date. - -This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedeviceinventorychange). - -The following fields are available: - -- **AppraiserVersion** The version of the Appraiser file that is generating the events. -- **Blocking** Is the upgrade blocked due to the processor? -- **PrefetchWSupport** Does the processor support PrefetchW? - - -### Microsoft.Windows.Appraiser.General.SystemProcessorPrefetchWRemove - -This event indicates that the SystemProcessorPrefetchW object is no longer present. - -This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedeviceinventorychange). - -The following fields are available: - -- **AppraiserVersion** The version of the Appraiser file that is generating the events. - - -### Microsoft.Windows.Appraiser.General.SystemProcessorPrefetchWStartSync - -This event indicates that a new set of SystemProcessorPrefetchWAdd events will be sent. - -This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedeviceinventorychange). - -The following fields are available: - -- **AppraiserVersion** The version of the Appraiser file that is generating the events. - - -### Microsoft.Windows.Appraiser.General.SystemProcessorSse2Add - -This event sends data indicating whether the system supports the SSE2 CPU requirement, to help keep Windows up to date. - -This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedeviceinventorychange). - -The following fields are available: - -- **AppraiserVersion** The version of the Appraiser file that is generating the events. -- **Blocking** Is the upgrade blocked due to the processor? -- **SSE2ProcessorSupport** Does the processor support SSE2? - - -### Microsoft.Windows.Appraiser.General.SystemProcessorSse2Remove - -This event indicates that the SystemProcessorSse2 object is no longer present. - -This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedeviceinventorychange). - -The following fields are available: - -- **AppraiserVersion** The version of the Appraiser file that is generating the events. - - -### Microsoft.Windows.Appraiser.General.SystemProcessorSse2StartSync - -This event indicates that a new set of SystemProcessorSse2Add events will be sent. - -This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedeviceinventorychange). - -The following fields are available: - -- **AppraiserVersion** The version of the Appraiser file that is generating the events. - - -### Microsoft.Windows.Appraiser.General.SystemTouchAdd - -This event sends data indicating whether the system supports touch, to help keep Windows up to date. - -This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedeviceinventorychange). - -The following fields are available: - -- **AppraiserVersion** The version of the Appraiser file that is generating the events. -- **IntegratedTouchDigitizerPresent** Is there an integrated touch digitizer? -- **MaximumTouches** The maximum number of touch points supported by the device hardware. - - -### Microsoft.Windows.Appraiser.General.SystemTouchRemove - -This event indicates that the SystemTouch object is no longer present. - -This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedeviceinventorychange). - -The following fields are available: - -- **AppraiserVersion** The version of the Appraiser file that is generating the events. - - -### Microsoft.Windows.Appraiser.General.SystemTouchStartSync - -This event indicates that a new set of SystemTouchAdd events will be sent. - -This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedeviceinventorychange). - -The following fields are available: - -- **AppraiserVersion** The version of the Appraiser file that is generating the events. - - -### Microsoft.Windows.Appraiser.General.SystemWimAdd - -This event sends data indicating whether the operating system is running from a compressed Windows Imaging Format (WIM) file, to help keep Windows up to date. - -This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedeviceinventorychange). - -The following fields are available: - -- **AppraiserVersion** The version of the Appraiser file that is generating the events. -- **IsWimBoot** Is the current operating system running from a compressed WIM file? -- **RegistryWimBootValue** The raw value from the registry that is used to indicate if the device is running from a WIM. - - -### Microsoft.Windows.Appraiser.General.SystemWimRemove - -This event indicates that the SystemWim object is no longer present. - -This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedeviceinventorychange). - -The following fields are available: - -- **AppraiserVersion** The version of the Appraiser file that is generating the events. - - -### Microsoft.Windows.Appraiser.General.SystemWimStartSync - -This event indicates that a new set of SystemWimAdd events will be sent. - -This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedeviceinventorychange). - -The following fields are available: - -- **AppraiserVersion** The version of the Appraiser file that is generating the events. - - -### Microsoft.Windows.Appraiser.General.SystemWindowsActivationStatusAdd - -This event sends data indicating whether the current operating system is activated, to help keep Windows up to date. - -This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedeviceinventorychange). - -The following fields are available: - -- **AppraiserVersion** The version of the Appraiser file that is generating the events. -- **WindowsIsLicensedApiValue** The result from the API that's used to indicate if operating system is activated. -- **WindowsNotActivatedDecision** Is the current operating system activated? - - -### Microsoft.Windows.Appraiser.General.SystemWindowsActivationStatusRemove - -This event indicates that the SystemWindowsActivationStatus object is no longer present. - -This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedeviceinventorychange). - -The following fields are available: - -- **AppraiserVersion** The version of the Appraiser file that is generating the events. - - -### Microsoft.Windows.Appraiser.General.SystemWindowsActivationStatusStartSync - -This event indicates that a new set of SystemWindowsActivationStatusAdd events will be sent. - -This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedeviceinventorychange). - -The following fields are available: - -- **AppraiserVersion** The version of the Appraiser file that is generating the events. - - -### Microsoft.Windows.Appraiser.General.SystemWlanAdd - -This event sends data indicating whether the system has WLAN, and if so, whether it uses an emulated driver that could block an upgrade, to help keep Windows up-to-date. - -This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedeviceinventorychange). - -The following fields are available: - -- **AppraiserVersion** The version of the Appraiser file that is generating the events. -- **Blocking** Is the upgrade blocked because of an emulated WLAN driver? -- **HasWlanBlock** Does the emulated WLAN driver have an upgrade block? -- **WlanEmulatedDriver** Does the device have an emulated WLAN driver? -- **WlanExists** Does the device support WLAN at all? -- **WlanModulePresent** Are any WLAN modules present? -- **WlanNativeDriver** Does the device have a non-emulated WLAN driver? - - -### Microsoft.Windows.Appraiser.General.SystemWlanRemove - -This event indicates that the SystemWlan object is no longer present. - -This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedeviceinventorychange). - -The following fields are available: - -- **AppraiserVersion** The version of the Appraiser file that is generating the events. - - -### Microsoft.Windows.Appraiser.General.SystemWlanStartSync - -This event indicates that a new set of SystemWlanAdd events will be sent. - -This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedeviceinventorychange). - -The following fields are available: - -- **AppraiserVersion** The version of the Appraiser file that is generating the events. - - -### Microsoft.Windows.Appraiser.General.TelemetryRunHealth - -This event indicates the parameters and result of a telemetry (diagnostic) run. This allows the rest of the data sent over the course of the run to be properly contextualized and understood, which is then used to keep Windows up to date. - -The following fields are available: - -- **AppraiserBranch** The source branch in which the version of Appraiser that is running was built. -- **AppraiserDataVersion** The version of the data files being used by the Appraiser telemetry run. -- **AppraiserProcess** The name of the process that launched Appraiser. -- **AppraiserVersion** The file version (major, minor and build) of the Appraiser DLL, concatenated without dots. -- **AuxFinal** Obsolete, always set to false. -- **AuxInitial** Obsolete, indicates if Appraiser is writing data files to be read by the Get Windows 10 app. -- **DeadlineDate** A timestamp representing the deadline date, which is the time until which appraiser will wait to do a full scan. -- **EnterpriseRun** Indicates if the telemetry run is an enterprise run, which means appraiser was run from the command line with an extra enterprise parameter. -- **FullSync** Indicates if Appraiser is performing a full sync, which means that full set of events representing the state of the machine are sent. Otherwise, only the changes from the previous run are sent. -- **InboxDataVersion** The original version of the data files before retrieving any newer version. -- **IndicatorsWritten** Indicates if all relevant UEX indicators were successfully written or updated. -- **InventoryFullSync** Indicates if inventory is performing a full sync, which means that the full set of events representing the inventory of machine are sent. -- **PCFP** An ID for the system calculated by hashing hardware identifiers. -- **PerfBackoff** Indicates if the run was invoked with logic to stop running when a user is present. Helps to understand why a run may have a longer elapsed time than normal. -- **PerfBackoffInsurance** Indicates if appraiser is running without performance backoff because it has run with perf backoff and failed to complete several times in a row. -- **RunAppraiser** Indicates if Appraiser was set to run at all. If this if false, it is understood that data events will not be received from this device. -- **RunDate** The date that the telemetry run was stated, expressed as a filetime. -- **RunGeneralTel** Indicates if the generaltel.dll component was run. Generaltel collects additional telemetry on an infrequent schedule and only from machines at telemetry levels higher than Basic. -- **RunOnline** Indicates if appraiser was able to connect to Windows Update and theefore is making decisions using up-to-date driver coverage information. -- **RunResult** The hresult of the Appraiser telemetry run. -- **ScheduledUploadDay** The day scheduled for the upload. -- **SendingUtc** Indicates if the Appraiser client is sending events during the current telemetry run. -- **StoreHandleIsNotNull** Obsolete, always set to false -- **TelementrySent** Indicates if telemetry was successfully sent. -- **ThrottlingUtc** Indicates if the Appraiser client is throttling its output of CUET events to avoid being disabled. This increases runtime but also telemetry reliability. -- **Time** The client time of the event. -- **VerboseMode** Indicates if appraiser ran in Verbose mode, which is a test-only mode with extra logging. -- **WhyFullSyncWithoutTablePrefix** Indicates the reason or reasons that a full sync was generated. - - -### Microsoft.Windows.Appraiser.General.WmdrmAdd - -This event sends data about the usage of older digital rights management on the system, to help keep Windows up to date. This data does not indicate the details of the media using the digital rights management, only whether any such files exist. Collecting this data was critical to ensuring the correct mitigation for customers, and should be able to be removed once all mitigations are in place. - -This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedeviceinventorychange). - -The following fields are available: - -- **AppraiserVersion** The version of the Appraiser file that is generating the events. -- **BlockingApplication** Same as NeedsDismissAction. -- **NeedsDismissAction** Indicates if a dismissible message is needed to warn the user about a potential loss of data due to DRM deprecation. -- **WmdrmApiResult** Raw value of the API used to gather DRM state. -- **WmdrmCdRipped** Indicates if the system has any files encrypted with personal DRM, which was used for ripped CDs. -- **WmdrmIndicators** WmdrmCdRipped OR WmdrmPurchased. -- **WmdrmInUse** WmdrmIndicators AND dismissible block in setup was not dismissed. -- **WmdrmNonPermanent** Indicates if the system has any files with non-permanent licenses. -- **WmdrmPurchased** Indicates if the system has any files with permanent licenses. - - -### Microsoft.Windows.Appraiser.General.WmdrmRemove - -This event indicates that the Wmdrm object is no longer present. - -This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedeviceinventorychange). - -The following fields are available: - -- **AppraiserVersion** The version of the Appraiser file that is generating the events. - - -### Microsoft.Windows.Appraiser.General.WmdrmStartSync - -This event indicates that a new set of WmdrmAdd events will be sent. - -This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedeviceinventorychange). - -The following fields are available: - -- **AppraiserVersion** The version of the Appraiser file that is generating the events. - - -## Census events - -### Census.App - -Provides information on IE and Census versions running on the device - -The following fields are available: - -- **AppraiserEnterpriseErrorCode** The error code of the last Appraiser enterprise run. -- **AppraiserErrorCode** The error code of the last Appraiser run. -- **AppraiserRunEndTimeStamp** The end time of the last Appraiser run. -- **AppraiserRunIsInProgressOrCrashed** Flag that indicates if the Appraiser run is in progress or has crashed. -- **AppraiserRunStartTimeStamp** The start time of the last Appraiser run. -- **AppraiserTaskEnabled** Whether the Appraiser task is enabled. -- **AppraiserTaskExitCode** The Appraiser task exist code. -- **AppraiserTaskLastRun** The last runtime for the Appraiser task. -- **CensusVersion** The version of Census that generated the current data for this device. -- **IEVersion** The version of Internet Explorer that is running on the device. - - -### Census.Battery - -This event sends type and capacity data about the battery on the device, as well as the number of connected standby devices in use, type to help keep Windows up to date. - -The following fields are available: - -- **InternalBatteryCapablities** Represents information about what the battery is capable of doing. -- **InternalBatteryCapacityCurrent** Represents the battery's current fully charged capacity in mWh (or relative). Compare this value to DesignedCapacity  to estimate the battery's wear. -- **InternalBatteryCapacityDesign** Represents the theoretical capacity of the battery when new, in mWh. -- **InternalBatteryNumberOfCharges** Provides the number of battery charges. This is used when creating new products and validating that existing products meets targeted functionality performance. -- **IsAlwaysOnAlwaysConnectedCapable** Represents whether the battery enables the device to be AlwaysOnAlwaysConnected . Boolean value. - - -### Census.Camera - -This event sends data about the resolution of cameras on the device, to help keep Windows up to date. - -The following fields are available: - -- **FrontFacingCameraResolution** Represents the resolution of the front facing camera in megapixels. If a front facing camera does not exist, then the value is 0. -- **RearFacingCameraResolution** Represents the resolution of the rear facing camera in megapixels. If a rear facing camera does not exist, then the value is 0. - - -### Census.Enterprise - -This event sends data about Azure presence, type, and cloud domain use in order to provide an understanding of the use and integration of devices in an enterprise, cloud, and server environment. - -The following fields are available: - -- **AADDeviceId** Azure Active Directory device ID. -- **AzureOSIDPresent** Represents the field used to identify an Azure machine. -- **AzureVMType** Represents whether the instance is Azure VM PAAS, Azure VM IAAS or any other VMs. -- **CDJType** Represents the type of cloud domain joined for the machine. -- **CommercialId** Represents the GUID for the commercial entity which the device is a member of.  Will be used to reflect insights back to customers. -- **ContainerType** The type of container, such as process or virtual machine hosted. -- **EnrollmentType** Defines the type of MDM enrollment on the device. -- **HashedDomain** The hashed representation of the user domain used for login. -- **IsCloudDomainJoined** Is this device joined to an Azure Active Directory (AAD) tenant? true/false -- **IsDERequirementMet** Represents if the device can do device encryption. -- **IsDeviceProtected** Represents if Device protected by BitLocker/Device Encryption -- **IsDomainJoined** Indicates whether a machine is joined to a domain. -- **IsEDPEnabled** Represents if Enterprise data protected on the device. -- **IsMDMEnrolled** Whether the device has been MDM Enrolled or not. -- **MPNId** Returns the Partner ID/MPN ID from Regkey. HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\DeployID -- **SCCMClientId** This ID correlate systems that send data to Compat Analytics (OMS) and other OMS based systems with systems in an Enterprise SCCM environment. -- **ServerFeatures** Represents the features installed on a Windows   Server. This can be used by developers and administrators who need to automate the process of determining the features installed on a set of server computers. -- **SystemCenterID** The SCCM ID is an anonymized one-way hash of the Active Directory Organization identifier - - -### Census.Firmware - -This event sends data about the BIOS and startup embedded in the device, to help keep Windows up to date. - -The following fields are available: - -- **FirmwareManufacturer** Represents the manufacturer of the device's firmware (BIOS). -- **FirmwareReleaseDate** Represents the date the current firmware was released. -- **FirmwareType** Represents the firmware type. The various types can be unknown, BIOS, UEFI. -- **FirmwareVersion** Represents the version of the current firmware. - - -### Census.Flighting - -This event sends Windows Insider data from customers participating in improvement testing and feedback programs, to help keep Windows up to date. - -The following fields are available: - -- **DeviceSampleRate** The telemetry sample rate assigned to the device. -- **EnablePreviewBuilds** Used to enable Windows Insider builds on a device. -- **FlightIds** A list of the different Windows Insider builds on this device. -- **FlightingBranchName** The name of the Windows Insider branch currently used by the device. -- **IsFlightsDisabled** Represents if the device is participating in the Windows Insider program. -- **MSA_Accounts** Represents a list of hashed IDs of the Microsoft Accounts that are flighting (pre-release builds) on this device. -- **SSRK** Retrieves the mobile targeting settings. - - -### Census.Hardware - -This event sends data about the device, including hardware type, OEM brand, model line, model, telemetry level setting, and TPM support, to help keep Windows up to date. - -The following fields are available: - -- **ActiveMicCount** The number of active microphones attached to the device. -- **ChassisType** Represents the type of device chassis, such as desktop or low profile desktop. The possible values can range between 1 - 36. -- **ComputerHardwareID** Identifies a device class that is represented by a hash of different SMBIOS fields. -- **D3DMaxFeatureLevel** Supported Direct3D version. -- **DeviceColor** Indicates a color of the device. -- **DeviceForm** Indicates the form as per the device classification. -- **DeviceName** The device name that is set by the user. -- **DigitizerSupport** Is a digitizer supported? -- **DUID** The device unique ID. -- **Gyroscope** Indicates whether the device has a gyroscope (a mechanical component that measures and maintains orientation). -- **InventoryId** The device ID used for compatibility testing. -- **Magnetometer** Indicates whether the device has a magnetometer (a mechanical component that works like a compass). -- **NFCProximity** Indicates whether the device supports NFC (a set of communication protocols that helps establish communication when applicable devices are brought close together.) -- **OEMDigitalMarkerFileName** The name of the file placed in the \Windows\system32\drivers directory that specifies the OEM and model name of the device. -- **OEMManufacturerName** The device manufacturer name. The OEMName for an inactive device is not reprocessed even if the clean OEM name is changed at a later date. -- **OEMModelBaseBoard** The baseboard model used by the OEM. -- **OEMModelBaseBoardVersion** Differentiates between developer and retail devices. -- **OEMModelName** The device model name. -- **OEMModelNumber** The device model number. -- **OEMModelSKU** The device edition that is defined by the manufacturer. -- **OEMModelSystemFamily** The system family set on the device by an OEM. -- **OEMModelSystemVersion** The system model version set on the device by the OEM. -- **OEMOptionalIdentifier** A Microsoft assigned value that represents a specific OEM subsidiary. -- **OEMSerialNumber** The serial number of the device that is set by the manufacturer. -- **PhoneManufacturer** The friendly name of the phone manufacturer. -- **PowerPlatformRole** The OEM preferred power management profile. It's used to help to identify the basic form factor of the device. -- **SoCName** The firmware manufacturer of the device. -- **StudyID** Used to identify retail and non-retail device. -- **TelemetryLevel** The telemetry level the user has opted into, such as Basic or Enhanced. -- **TelemetryLevelLimitEnhanced** The telemetry level for Windows Analytics-based solutions. -- **TelemetrySettingAuthority** Determines who set the telemetry level, such as GP, MDM, or the user. -- **TPMManufacturerId** The ID of the TPM manufacturer. -- **TPMManufacturerVersion** The version of the TPM manufacturer. -- **TPMVersion** The supported Trusted Platform Module (TPM) on the device. If no TPM is present, the value is 0. -- **VoiceSupported** Does the device have a cellular radio capable of making voice calls? - - -### Census.Memory - -This event sends data about the memory on the device, including ROM and RAM, to help keep Windows up to date. - -The following fields are available: - -- **TotalPhysicalRAM** Represents the physical memory (in MB). -- **TotalVisibleMemory** Represents the memory that is not reserved by the system. - - -### Census.Network - -This event sends data about the mobile and cellular network used by the device (mobile service provider, network, device ID, and service cost factors), to help keep Windows up to date. - -The following fields are available: - -- **IMEI0** Represents the International Mobile Station Equipment Identity. This number is usually unique and used by the mobile operator to distinguish different phone hardware. Microsoft does not have access to mobile operator billing data so collecting this data does not expose or identify the user. The two fields represent phone with dual sim coverage. -- **IMEI1** Represents the International Mobile Station Equipment Identity. This number is usually unique and used by the mobile operator to distinguish different phone hardware. Microsoft does not have access to mobile operator billing data so collecting this data does not expose or identify the user. The two fields represent phone with dual sim coverage. -- **MCC0** Represents the Mobile Country Code (MCC). It used with the Mobile Network Code (MNC) to uniquely identify a mobile network operator. The two fields represent phone with dual sim coverage. -- **MCC1** Represents the Mobile Country Code (MCC). It used with the Mobile Network Code (MNC) to uniquely identify a mobile network operator. The two fields represent phone with dual sim coverage. -- **MEID** Represents the Mobile Equipment Identity (MEID). MEID is a worldwide unique phone ID assigned to CDMA phones. MEID replaces electronic serial number (ESN), and is equivalent to IMEI for GSM and WCDMA phones. Microsoft does not have access to mobile operator billing data so collecting this data does not expose or identify the user. -- **MNC0** Retrieves the Mobile Network Code (MNC). It used with the Mobile Country Code (MCC) to uniquely identify a mobile network operator. The two fields represent phone with dual sim coverage. -- **MNC1** Retrieves the Mobile Network Code (MNC). It used with the Mobile Country Code (MCC) to uniquely identify a mobile network operator. The two fields represent phone with dual sim coverage. -- **MobileOperatorBilling** Represents the telephone company that provides services for mobile phone users. -- **MobileOperatorCommercialized** Represents which reseller and geography the phone is commercialized for. This is the set of values on the phone for who and where it was intended to be used. For example, the commercialized mobile operator code AT&T in the US would be ATT-US. -- **MobileOperatorNetwork0** Represents the operator of the current mobile network that the device is used on. (AT&T, T-Mobile, Vodafone). The two fields represent phone with dual sim coverage. -- **MobileOperatorNetwork1** Represents the operator of the current mobile network that the device is used on. (AT&T, T-Mobile, Vodafone). The two fields represent phone with dual sim coverage. -- **NetworkAdapterGUID** The GUID of the primary network adapter. -- **NetworkCost** Represents the network cost associated with a connection. -- **SPN0** Retrieves the Service Provider Name (SPN). For example, these might be AT&T, Sprint, T-Mobile, or Verizon. The two fields represent phone with dual sim coverage. -- **SPN1** Retrieves the Service Provider Name (SPN). For example, these might be AT&T, Sprint, T-Mobile, or Verizon. The two fields represent phone with dual sim coverage. - - -### Census.OS - -This event sends data about the operating system such as the version, locale, update service configuration, when and how it was originally installed, and whether it is a virtual device, to help keep Windows up to date. - -The following fields are available: - -- **ActivationChannel** Retrieves the retail license key or Volume license key for a machine. -- **AssignedAccessStatus** Kiosk configuration mode. -- **CompactOS** Indicates if the Compact OS feature from Win10 is enabled. -- **DeveloperUnlockStatus** Represents if a device has been developer unlocked by the user or Group Policy. -- **DeviceTimeZone** The time zone that is set on the device. Example: Pacific Standard Time -- **GenuineState** Retrieves the ID Value specifying the OS Genuine check. -- **InstallationType** Retrieves the type of OS installation. (Clean, Upgrade, Reset, Refresh, Update). -- **InstallLanguage** The first language installed on the user machine. -- **IsDeviceRetailDemo** Retrieves if the device is running in demo mode. -- **IsEduData** Returns Boolean if the education data policy is enabled. -- **IsPortableOperatingSystem** Retrieves whether OS is running Windows-To-Go -- **IsSecureBootEnabled** Retrieves whether Boot chain is signed under UEFI. -- **LanguagePacks** The list of language packages installed on the device. -- **LicenseStateReason** Retrieves why (or how) a system is licensed or unlicensed. The HRESULT may indicate an error code that indicates a key blocked error, or it may indicate that we are running an OS License granted by the MS store. -- **OA3xOriginalProducoKzyàPŒïdjstDr})D6ài3êryyjMachineIP** No content is currently available. -- **OA3xOriginalProductKey** Retrieves the License key stamped by the OEM to the machine. -- **OSEdition** Retrieves the version of the current OS. -- **OSInstallType** Retrieves a numeric description of what install was used on the device i.e. clean, upgrade, refresh, reset, etc -- **OSOOBEDateTime** Retrieves Out of Box Experience (OOBE) Date in Coordinated Universal Time (UTC). -- **OSSKU** Retrieves the Friendly Name of OS Edition. -- **OSSubscriptionStatus** Represents the existing status for enterprise subscription feature for PRO machines. -- **OSSubscriptionTypeId** Returns boolean for enterprise subscription feature for selected PRO machines. -- **OSTimeZoneBiasInMins** Retrieves the time zone set on machine. -- **OSUILocale** Retrieves the locale of the UI that is currently used by the OS. -- **ProductActivationResult** Returns Boolean if the OS Activation was successful. -- **ProductActivationTime** Returns the OS Activation time for tracking piracy issues. -- **ProductKeyID2** Retrieves the License key if the machine is updated with a new license key. -- **RACw7Id** Retrieves the Microsoft Reliability Analysis Component (RAC) Win7 Identifier. RAC is used to monitor and analyze system usage and reliability. -- **ServiceMachineIP** Retrieves the IP address of the KMS host used for anti-piracy. -- **ServiceMachinePort** Retrieves the port of the KMS host used for anti-piracy. -- **ServiceProductKeyID** Retrieves the License key of the KMS -- **SharedPCMode** Returns Boolean for education devices used as shared cart -- **Signature** Retrieves if it is a signature machine sold by Microsoft store. -- **SLICStatus** Whether a SLIC table exists on the device. -- **SLICVersion** Returns OS type/version from SLIC table. - - -### Census.PrivacySettings - -This event provides information about the device level privacy settings and whether device-level access was granted to these capabilities. Not all settings are applicable to all devices. Each field records the consent state for the corresponding privacy setting. The consent state is encoded as a 16-bit signed integer, where the first 8 bits represents the effective consent value, and the last 8 bits represent the authority that set the value. The effective consent (first 8 bits) is one of the following values: -3 = unexpected consent value, -2 = value was not requested, -1 = an error occurred while attempting to retrieve the value, 0 = undefined, 1 = allow, 2 = deny, 3 = prompt. The consent authority (last 8 bits) is one of the following values: -3 = unexpected authority, -2 = value was not requested, -1 = an error occurred while attempting to retrieve the value, 0 = system, 1 = a higher authority (a gating setting, the system-wide setting, or a group policy), 2 = advertising ID group policy, 3 = advertising ID policy for child account, 4 = privacy setting provider doesn't know the actual consent authority, 5 = consent was not configured and a default set in code was used, 6 = system default, 7 = organization policy, 8 = OneSettings. - -The following fields are available: - -- **Activity** Current state of the activity history setting. -- **ActivityHistoryCloudSync** Current state of the activity history cloud sync setting. -- **ActivityHistoryCollection** Current state of the activity history collection setting. -- **AdvertisingId** Current state of the advertising ID setting. -- **AppDiagnostics** Current state of the app diagnostics setting. -- **Appointments** Current state of the calendar setting. -- **Bluetooth** Current state of the Bluetooth capability setting. -- **BluetoothSync** Current state of the Bluetooth sync capability setting. -- **BroadFileSystemAccess** Current state of the broad file system access setting. -- **CellularData** Current state of the cellular data capability setting. -- **Chat** Current state of the chat setting. -- **Contacts** Current state of the contacts setting. -- **DocumentsLibrary** Current state of the documents library setting. -- **Email** Current state of the email setting. -- **FindMyDevice** Current state of the "find my device" setting. -- **GazeInput** Current state of the gaze input setting. -- **HumanInterfaceDevice** Current state of the human interface device setting. -- **InkTypeImprovement** Current state of the improve inking and typing setting. -- **Location** Current state of the location setting. -- **LocationHistory** Current state of the location history setting. -- **LocationHistoryCloudSync** Current state of the location history cloud sync setting. -- **LocationHistoryOnTimeline** Current state of the location history on timeline setting. -- **LocTîÿxV4ocationHistory** No content is currently available. -- **Microphone** Current state of the microphone setting. -- **PhoneCall** Current state of the phone call setting. -- **PhoneCallHistory** Current state of the call history setting. -- **PicturesLibrary** Current state of the pictures library setting. -- **Radios** Current state of the radios setting. -- **SensorsCustom** Current state of the custom sensor setting. -- **SerialCommunication** Current state of the serial communication setting. -- **Sms** Current state of the text messaging setting. -- **SpeechPersonalization** Current state of the speech services setting. -- **USB** Current state of the USB setting. -- **UserAccountInformation** Current state of the account information setting. -- **UserDataTasks** Current state of the tasks setting. -- **UserNotificationListener** Current state of the notifications setting. -- **VideosLibrary** Current state of the videos library setting. -- **Webcam** Current state of the camera setting. -- **WiFiDirect** Current state of the Wi-Fi direct setting. - - -### Census.Processor - -Provides information on several important data points about Processor settings - -The following fields are available: - -- **KvaShadow** This is the micro code information of the processor. -- **MMSettingOverride** Microcode setting of the processor. -- **MMSettingOverrideMask** Microcode setting override of the processor. -- **PreviousUpdateRevision** Previous microcode revision -- **ProcessorArchitecture** Retrieves the processor architecture of the installed operating system. -- **ProcessorClockSpeed** Clock speed of the processor in MHz. -- **ProcessorCores** Number of logical cores in the processor. -- **ProcessorIdentifier** Processor Identifier of a manufacturer. -- **ProcessorManufacturer** Name of the processor manufacturer. -- **ProcessorModel** Name of the processor model. -- **ProcessorPhysicalCores** Number of physical cores in the processor. -- **ProcessorUpdateRevision** The microcode revision. -- **ProcessorUpdateStatus** Enum value that represents the processor microcode load status -- **SocketCount** Count of CPU sockets. -- **SpeculationControl** Indicates whether the system has enabled protections needed to validate the speculation control vulnerability. - - -### Census.Security - -This event provides information on about security settings used to help keep Windows up to date and secure. - -The following fields are available: - -- **AvailableSecurityProperties** This field helps to enumerate and report state on the relevant security properties for Device Guard. -- **CGRunning** Credential Guard isolates and hardens key system and user secrets against compromise, helping to minimize the impact and breadth of a Pass the Hash style attack in the event that malicious code is already running via a local or network based vector. This field tells if Credential Guard is running. -- **DGState** This field summarizes the Device Guard state. -- **HVCIRunning** Hypervisor Code Integrity (HVCI) enables Device Guard to help protect kernel mode processes and drivers from vulnerability exploits and zero days. HVCI uses the processor’s functionality to force all software running in kernel mode to safely allocate memory. This field tells if HVCI is running. -- **IsSawGuest** Indicates whether the device is running as a Secure Admin Workstation Guest. -- **IsSawHost** Indicates whether the device is running as a Secure Admin Workstation Host. -- **RequiredSecurityProperties** Describes the required security properties to enable virtualization-based security. -- **SecureBootCapable** Systems that support Secure Boot can have the feature turned off via BIOS. This field tells if the system is capable of running Secure Boot, regardless of the BIOS setting. -- **SModeState** The Windows S mode trail state. -- **VBSState** Virtualization-based security (VBS) uses the hypervisor to help protect the kernel and other parts of the operating system. Credential Guard and Hypervisor Code Integrity (HVCI) both depend on VBS to isolate/protect secrets, and kernel-mode code integrity validation. VBS has a tri-state that can be Disabled, Enabled, or Running. - - -### Census.Speech - -This event is used to gather basic speech settings on the device. - -The following fields are available: - -- **AboveLockEnabled** Cortana setting that represents if Cortana can be invoked when the device is locked. -- **GPAllowInputPersonalization** Indicates if a Group Policy setting has enabled speech functionalities. -- **HolographicSpeechInputDisabled** Holographic setting that represents if the attached HMD devices have speech functionality disabled by the user. -- **HolographicSpeechInputDisabledRemote** Indicates if a remote policy has disabled speech functionalities for the HMD devices. -- **KeyVer** Version information for the census speech event. -- **KWSEnabled** Cortana setting that represents if a user has enabled the "Hey Cortana" keyword spotter (KWS). -- **MDMAllowInputPersonalization** Indicates if an MDM policy has enabled speech functionalities. -- **RemotelyManaged** Indicates if the device is being controlled by a remote administrator (MDM or Group Policy) in the context of speech functionalities. -- **SpeakerIdEnabled** Cortana setting that represents if keyword detection has been trained to try to respond to a single user's voice. -- **SpeechServicesEnabled** Windows setting that represents whether a user is opted-in for speech services on the device. -- **SpeechServicesValueSource** Indicates the deciding factor for the effective online speech recognition privacy policy settings: remote admin, local admin, or user preference. - - -### Census.Storage - -This event sends data about the total capacity of the system volume and primary disk, to help keep Windows up to date. - -The following fields are available: - -- **PrimaryDiskTotalCapacity** Retrieves the amount of disk space on the primary disk of the device in MB. -- **PrimaryDiskType** Retrieves an enumerator value of type STORAGE_BUS_TYPE that indicates the type of bus to which the device is connected. This should be used to interpret the raw device properties at the end of this structure (if any). -- **StorageReservePassedPolicy** Indicates whether the Storage Reserve policy, which ensures that updates have enough disk space and customers are on the latest OS, is enabled on this device. -- **SystemVolumeTotalCapacity** Retrieves the size of the partition that the System volume is installed on in MB. - - -### Census.Userdefault - -This event sends data about the current user's default preferences for browser and several of the most popular extensions and protocols, to help keep Windows up to date. - -The following fields are available: - -- **CalendarType** The calendar identifiers that are used to specify different calendars. -- **DefaultApp** The current uer's default program selected for the following extension or protocol: .html, .htm, .jpg, .jpeg, .png, .mp3, .mp4, .mov, .pdf. -- **DefaultBrowserProgId** The ProgramId of the current user's default browser. -- **LongDateFormat** The long date format the user has selected. -- **ShortDateFormat** The short date format the user has selected. - - -### Census.UserDisplay - -This event sends data about the logical/physical display size, resolution and number of internal/external displays, and VRAM on the system, to help keep Windows up to date. - -The following fields are available: - -- **InternalPrimaryDisplayLogicalDPIX** Retrieves the logical DPI in the x-direction of the internal display. -- **InternalPrimaryDisplayLogicalDPIY** Retrieves the logical DPI in the y-direction of the internal display. -- **InternalPrimaryDisplayPhysicalDPIX** Retrieves the physical DPI in the x-direction of the internal display. -- **InternalPrimaryDisplayPhysicalDPIY** Retrieves the physical DPI in the y-direction of the internal display. -- **InternalPrimaryDisplayResolutionHorizontal** Retrieves the number of pixels in the horizontal direction of the internal display. -- **InternalPrimaryDisplayResolutionVertical** Retrieves the number of pixels in the vertical direction of the internal display. -- **InternalPrimaryDisplaySizePhysicalH** Retrieves the physical horizontal length of the display in mm. Used for calculating the diagonal length in inches . -- **InternalPrimaryDisplaySizePhysicalY** Retrieves the physical vertical length of the display in mm. Used for calculating the diagonal length in inches -- **NumberofExternalDisplays** Retrieves the number of external displays connected to the machine -- **NumberofInternalDisplays** Retrieves the number of internal displays in a machine. -- **OumberofExternalDisplays** No content is currently available. -- **OumberofInternalDisplays** No content is currently available. -- **VRAMDedicated** Retrieves the video RAM in MB. -- **VRAMDedicatedSystem** Retrieves the amount of memory on the dedicated video card. -- **VRAMSharedSystem** Retrieves the amount of RAM memory that the video card can use. - - -### Census.UserNLS - -This event sends data about the default app language, input, and display language preferences set by the user, to help keep Windows up to date. - -The following fields are available: - -- **DefaultAppLanguage** The current user Default App Language. -- **DisplayLanguage** The current user preferred Windows Display Language. -- **HomeLocation** The current user location, which is populated using GetUserGeoId() function. -- **KeyboardInputLanguages** The Keyboard input languages installed on the device. -- **SpeechInputLanguages** The Speech Input languages installed on the device. - - -### Census.UserPrivacySettings - -This event provides information about the current users privacy settings and whether device-level access was granted to these capabilities. Not all settings are applicable to all devices. Each field records the consent state for the corresponding privacy setting. The consent state is encoded as a 16-bit signed integer, where the first 8 bits represents the effective consent value, and the last 8 bits represents the authority that set the value. The effective consent is one of the following values: -3 = unexpected consent value, -2 = value was not requested, -1 = an error occurred while attempting to retrieve the value, 0 = undefined, 1 = allow, 2 = deny, 3 = prompt. The consent authority is one of the following values: -3 = unexpected authority, -2 = value was not requested, -1 = an error occurred while attempting to retrieve the value, 0 = user, 1 = a higher authority (a gating setting, the system-wide setting, or a group policy), 2 = advertising ID group policy, 3 = advertising ID policy for child account, 4 = privacy setting provider doesn't know the actual consent authority, 5 = consent was not configured and a default set in code was used, 6 = system default, 7 = organization policy, 8 = OneSettings. - -The following fields are available: - -- **Activity** Current state of the activity history setting. -- **ActivityHistoryCloudSync** Current state of the activity history cloud sync setting. -- **ActivityHistoryCollection** Current state of the activity history collection setting. -- **AdvertisingId** Current state of the advertising ID setting. -- **AppDiagnostics** Current state of the app diagnostics setting. -- **Appointments** Current state of the calendar setting. -- **Bluetooth** Current state of the Bluetooth capability setting. -- **BluetoothSync** Current state of the Bluetooth sync capability setting. -- **BroadFileSystemAccess** Current state of the broad file system access setting. -- **CellularData** Current state of the cellular data capability setting. -- **Chat** Current state of the chat setting. -- **Contacts** Current state of the contacts setting. -- **DocumentsLibrary** Current state of the documents library setting. -- **Email** Current state of the email setting. -- **GazeInput** Current state of the gaze input setting. -- **HumanInterfaceDevice** Current state of the human interface device setting. -- **InkTypeImprovement** Current state of the improve inking and typing setting. -- **InkTypePersonalization** Current state of the inking and typing personalization setting. -- **Location** Current state of the location setting. -- **LocationHistory** Current state of the location history setting. -- **LocationHistoryCloudSync** Current state of the location history cloud synchronization setting. -- **LocationHistoryOnTimeline** Current state of the location history on timeline setting. -- **Microphone** Current state of the microphone setting. -- **PhoneCall** Current state of the phone call setting. -- **PhoneCallHistory** Current state of the call history setting. -- **PicturesLibrary** Current state of the pictures library setting. -- **Radios** Current state of the radios setting. -- **SensorsCustom** Current state of the custom sensor setting. -- **SerialCommunication** Current state of the serial communication setting. -- **Sms** Current state of the text messaging setting. -- **SpeechPersonalization** Current state of the speech services setting. -- **USB** Current state of the USB setting. -- **UserAccountInformation** Current state of the account information setting. -- **UserDataTasks** Current state of the tasks setting. -- **UserNotificationListener** Current state of the notifications setting. -- **VideosLibrary** Current state of the videos library setting. -- **Webcam** Current state of the camera setting. -- **WiFaDirect** No content is currently available. -- **WiFiDirect** Current state of the Wi-Fi direct setting. - - -### Census.VM - -This event sends data indicating whether virtualization is enabled on the device, and its various characteristics, to help keep Windows up to date. - -The following fields are available: - -- **CloudService** Indicates which cloud service, if any, that this virtual machine is running within. -- **HyperVisor** Retrieves whether the current OS is running on top of a Hypervisor. -- **IOMMUPresent** Represents if an input/output memory management unit (IOMMU) is present. -- **IsVDI** Is the device using Virtual Desktop Infrastructure? -- **IsVirtualDevice** Retrieves that when the Hypervisor is Microsoft's Hyper-V Hypervisor or other Hv#1 Hypervisor, this field will be set to FALSE for the Hyper-V host OS and TRUE for any guest OS's. This field should not be relied upon for non-Hv#1 Hypervisors. -- **SLATSupported** Represents whether Second Level Address Translation (SLAT) is supported by the hardware. -- **VirtualizationFirmwareEnabled** Represents whether virtualization is enabled in the firmware. - - -### Census.WU - -This event sends data about the Windows update server and other App store policies, to help keep Windows up to date. - -The following fields are available: - -- **AppraiserGatedStatus** Indicates whether a device has been gated for upgrading. -- **AppStoreAutoUpdate** Retrieves the Appstore settings for auto upgrade. (Enable/Disabled). -- **AppStoreAutoUpdateMDM** Retrieves the App Auto Update value for MDM: 0 - Disallowed. 1 - Allowed. 2 - Not configured. Default: [2] Not configured -- **AppStoreAutoUpdatePolicy** Retrieves the Microsoft Store App Auto Update group policy setting -- **DelayUpgrade** Retrieves the Windows upgrade flag for delaying upgrades. -- **OSAssessmentFeatureOutOfDate** How many days has it been since a the last feature update was released but the device did not install it? -- **OSAssessmentForFeatureUpdate** Is the device is on the latest feature update? -- **OSAssessmentForQualityUpdate** Is the device on the latest quality update? -- **OSAssessmentForSecurityUpdate** Is the device on the latest security update? -- **OSAssessmentQualityOutOfDate** How many days has it been since a the last quality update was released but the device did not install it? -- **OSAssessmentReleaseInfoTime** The freshness of release information used to perform an assessment. -- **OSRollbackCount** The number of times feature updates have rolled back on the device. -- **OSRolledBack** A flag that represents when a feature update has rolled back during setup. -- **OSUninstalled** A flag that represents when a feature update is uninstalled on a device . -- **OSWUAutoUpdateOptions** Retrieves the auto update settings on the device. -- **OSWUAutoUpdateOptionsSource** The source of auto update setting that appears in the OSWUAutoUpdateOptions field. For example: Group Policy (GP), Mobile Device Management (MDM), and Default. -- **UninstallActive** A flag that represents when a device has uninstalled a previous upgrade recently. -- **UpdateServiceURLConfigured** Retrieves if the device is managed by Windows Server Update Services (WSUS). -- **WUDeferUpdatePeriod** Retrieves if deferral is set for Updates. -- **WUDeferUpgradePeriod** Retrieves if deferral is set for Upgrades. -- **WUDODownloadMode** Retrieves whether DO is turned on and how to acquire/distribute updates Delivery Optimization (DO) allows users to deploy previously downloaded WU updates to other devices on the same network. -- **WUMachineId** Retrieves the Windows Update (WU) Machine Identifier. -- **WUPauseState** Retrieves WU setting to determine if updates are paused. -- **WUServer** Retrieves the HTTP(S) URL of the WSUS server that is used by Automatic Updates and API callers (by default). - - -### Census.Xbox - -This event sends data about the Xbox Console, such as Serial Number and DeviceId, to help keep Windows up to date. - -The following fields are available: - -- **XboxConsolePreferredLanguage** Retrieves the preferred language selected by the user on Xbox console. -- **XboxConsoleSerialNumber** Retrieves the serial number of the Xbox console. -- **XboxConsoleSerialOumber** No content is currently available. -- **XboxLiveDeviceId** Retrieves the unique device ID of the console. -- **XboxLiveSandboxId** Retrieves the developer sandbox ID if the device is internal to Microsoft. - - -## Common data extensions - -### Common Data Extensions.app - -Describes the properties of the running application. This extension could be populated by a client app or a web app. - -The following fields are available: - -- **asId** An integer value that represents the app session. This value starts at 0 on the first app launch and increments after each subsequent app launch per boot session. -- **env** The environment from which the event was logged. -- **expId** Associates a flight, such as an OS flight, or an experiment, such as a web site UX experiment, with an event. -- **id** Represents a unique identifier of the client application currently loaded in the process producing the event; and is used to group events together and understand usage pattern, errors by application. -- **locale** The locale of the app. -- **name** The name of the app. -- **userId** The userID as known by the application. -- **ver** Represents the version number of the application. Used to understand errors by Version, Usage by Version across an app. - - -### Common Data Extensions.container - -Describes the properties of the container for events logged within a container. - -The following fields are available: - -- **epoch** An ID that's incremented for each SDK initialization. -- **localId** The device ID as known by the client. -- **osVer** The operating system version. -- **seq** An ID that's incremented for each event. -- **type** The container type. Examples: Process or VMHost - - -### Common Data Extensions.cs - -Describes properties related to the schema of the event. - -The following fields are available: - -- **sig** A common schema signature that identifies new and modified event schemas. - - -### Common Data Extensions.device - -Describes the device-related fields. - -The following fields are available: - -- **deviceClass** The device classification. For example, Desktop, Server, or Mobile. -- **localId** A locally-defined unique ID for the device. This is not the human-readable device name. Most likely equal to the value stored at HKLM\Software\Microsoft\SQMClient\MachineId -- **make** Device manufacturer. -- **model** Device model. - - -### Common Data Extensions.Envelope - -Represents an envelope that contains all of the common data extensions. - -The following fields are available: - -- **cV** Represents the Correlation Vector: A single field for tracking partial order of related telemetry events across component boundaries. -- **data** Represents the optional unique diagnostic data for a particular event schema. -- **ext_app** Describes the properties of the running application. This extension could be populated by either a client app or a web app. See [Common Data Extensions.app](#common-data-extensionsapp). -- **ext_container** Describes the properties of the container for events logged within a container. See [Common Data Extensions.container](#common-data-extensionscontainer). -- **ext_cs** Describes properties related to the schema of the event. See [Common Data Extensions.cs](#common-data-extensionscs). -- **ext_device** Describes the device-related fields. See [Common Data Extensions.device](#common-data-extensionsdevice). -- **ext_os** Describes the operating system properties that would be populated by the client. See [Common Data Extensions.os](#common-data-extensionsos). -- **ext_receipts** Describes the fields related to time as provided by the client for debugging purposes. See [Common Data Extensions.receipts](#common-data-extensionsreceipts). -- **ext_sdk** Describes the fields related to a platform library required for a specific SDK. See [Common Data Extensions.sdk](#common-data-extensionssdk). -- **ext_user** Describes the fields related to a user. See [Common Data Extensions.user](#common-data-extensionsuser). -- **ext_utc** Describes the fields that might be populated by a logging library on Windows. See [Common Data Extensions.utc](#common-data-extensionsutc). -- **ext_xbl** Describes the fields related to XBOX Live. See [Common Data Extensions.xbl](#common-data-extensionsxbl). -- **flags** Represents a collection of bits that describe how the event should be processed by the Connected User Experience and Telemetry component pipeline. The lowest-order byte is the event persistence. The next byte is the event latency. -- **iKey** Represents an ID for applications or other logical groupings of events. -- **name** Represents the uniquely qualified name for the event. -- **popSample** Represents the effective sample rate for this event at the time it was generated by a client. -- **time** Represents the event date time in Coordinated Universal Time (UTC) when the event was generated on the client. This should be in ISO 8601 format. -- **ver** Represents the major and minor version of the extension. - - -### Common Data Extensions.os - -Describes some properties of the operating system. - -The following fields are available: - -- **bootId** An integer value that represents the boot session. This value starts at 0 on first boot after OS install and increments after every reboot. -- **expId** Represents the experiment ID. The standard for associating a flight, such as an OS flight (pre-release build), or an experiment, such as a web site UX experiment, with an event is to record the flight / experiment IDs in Part A of the common schema. -- **locale** Represents the locale of the operating system. -- **name** Represents the operating system name. -- **ver** Represents the major and minor version of the extension. - - -### Common Data Extensions.receipts - -Represents various time information as provided by the client and helps for debugging purposes. - -The following fields are available: - -- **originalTime** The original event time. -- **uploadTime** The time the event was uploaded. - - -### Common Data Extensions.sdk - -Used by platform specific libraries to record fields that are required for a specific SDK. - -The following fields are available: - -- **epoch** An ID that is incremented for each SDK initialization. -- **installId** An ID that's created during the initialization of the SDK for the first time. -- **libVer** The SDK version. -- **seq** An ID that is incremented for each event. - - -### Common Data Extensions.user - -Describes the fields related to a user. - -The following fields are available: - -- **authId** This is an ID of the user associated with this event that is deduced from a token such as a Microsoft Account ticket or an XBOX token. -- **locale** The language and region. -- **localId** Represents a unique user identity that is created locally and added by the client. This is not the user's account ID. - - -### Common Data Extensions.utc - -Describes the properties that could be populated by a logging library on Windows. - -The following fields are available: - -- **aId** Represents the ETW ActivityId. Logged via TraceLogging or directly via ETW. -- **bSeq** Upload buffer sequence number in the format: buffer identifier:sequence number -- **cat** Represents a bitmask of the ETW Keywords associated with the event. -- **cpId** The composer ID, such as Reference, Desktop, Phone, Holographic, Hub, IoT Composer. -- **epoch** Represents the epoch and seqNum fields, which help track how many events were fired and how many events were uploaded, and enables identification of data lost during upload and de-duplication of events on the ingress server. -- **flags** Represents the bitmap that captures various Windows specific flags. -- **mon** Combined monitor and event sequence numbers in the format: monitor sequence : event sequence -- **op** Represents the ETW Op Code. -- **raId** Represents the ETW Related ActivityId. Logged via TraceLogging or directly via ETW. -- **seq** Represents the sequence field used to track absolute order of uploaded events. It is an incrementing identifier for each event added to the upload queue. The Sequence helps track how many events were fired and how many events were uploaded and enables identification of data lost during upload and de-duplication of events on the ingress server. -- **stId** Represents the Scenario Entry Point ID. This is a unique GUID for each event in a diagnostic scenario. This used to be Scenario Trigger ID. - - -### Common Data Extensions.xbl - -Describes the fields that are related to XBOX Live. - -The following fields are available: - -- **claims** Any additional claims whose short claim name hasn't been added to this structure. -- **did** XBOX device ID -- **dty** XBOX device type -- **dvr** The version of the operating system on the device. -- **eid** A unique ID that represents the developer entity. -- **exp** Expiration time -- **ip** The IP address of the client device. -- **nbf** Not before time -- **pid** A comma separated list of PUIDs listed as base10 numbers. -- **sbx** XBOX sandbox identifier -- **sid** The service instance ID. -- **sty** The service type. -- **tid** The XBOX Live title ID. -- **tvr** The XBOX Live title version. -- **uts** A bit field, with 2 bits being assigned to each user ID listed in xid. This field is omitted if all users are retail accounts. -- **xid** A list of base10-encoded XBOX User IDs. - - -## Common data fields - -### Ms.Device.DeviceInventoryChange - -Describes the installation state for all hardware and software components available on a particular device. - -The following fields are available: - -- **ac|ion** No content is currently available. -- **action** The change that was invoked on a device inventory object. -- **cction** No content is currently available. -- **inventoryId** Device ID used for Compatibility testing -- **objectInstanceId** Object identity which is unique within the device scope. -- **objectType** Indicates the object type that the event applies to. -- **syncId** A string used to group StartSync, EndSync, Add, and Remove operations that belong together. This field is unique by Sync period and is used to disambiguate in situations where multiple agents perform overlapping inventories for the same object. -- **synkId** No content is currently available. - - -## Compatibility events - -### Microsoft.Windows.Compatibility.Apphelp.SdbFix - -Product instrumentation for helping debug/troubleshoot issues with inbox compatibility components. - -The following fields are available: - -- **AppName** Name of the application impacted by SDB. -- **FixID** SDB GUID. -- **Flags** List of flags applied. -- **ImageName** Name of file. - - -## Component-based servicing events - -### CbsServicingProvider.CbsCapabilityEnumeration - -This event reports on the results of scanning for optional Windows content on Windows Update. - -The following fields are available: - -- **architecture** Indicates the scan was limited to the specified architecture. -- **capabilityCount** The number of optional content packages found during the scan. -- **clientId** The name of the application requesting the optional content. -- **duration** The amount of time it took to complete the scan. -- **hrStatus** The HReturn code of the scan. -- **language** Indicates the scan was limited to the specified language. -- **majorVersion** Indicates the scan was limited to the specified major version. -- **minorVersion** Indicates the scan was limited to the specified minor version. -- **namespace** Indicates the scan was limited to packages in the specified namespace. -- **sourceFilter** A bitmask indicating the scan checked for locally available optional content. -- **stackBuild** The build number of the servicing stack. -- **stackMajorVersion** The major version number of the servicing stack. -- **stackMinorVersion** The minor version number of the servicing stack. -- **stackRevision** The revision number of the servicing stack. - - -### CbsServicingProvider.CbsCapabilitySessionFinalize - -This event provides information about the results of installing or uninstalling optional Windows content from Windows Update. - -The following fields are available: - -- **capabilities** The names of the optional content packages that were installed. -- **clientId** The name of the application requesting the optional content. -- **currentID** The ID of the current install session. -- **downloadSource** The source of the download. -- **highestState** The highest final install state of the optional content. -- **hrLCUReservicingStatus** Indicates whether the optional content was updated to the latest available version. -- **hrStatus** The HReturn code of the install operation. -- **rebootCount** The number of reboots required to complete the install. -- **retryID** The session ID that will be used to retry a failed operation. -- **retryStatus** Indicates whether the install will be retried in the event of failure. -- **stackBuild** The build number of the servicing stack. -- **stackMajorVersion** The major version number of the servicing stack. -- **stackMinorVersion** The minor version number of the servicing stack. -- **stackRevision** The revision number of the servicing stack. - - -### CbsServicingProvider.CbsCapabilitySessionPended - -This event provides information about the results of installing optional Windows content that requires a reboot to keep Windows up to date. - -The following fields are available: - -- **clientId** The name of the application requesting the optional content. -- **pendingDecision** Indicates the cause of reboot, if applicable. - - -### CbsServicingProvider.CbsLateAcquisition - -This event sends data to indicate if some Operating System packages could not be updated as part of an upgrade, to help keep Windows up to date. - -The following fields are available: - -- **Features** The list of feature packages that could not be updated. -- **RetryID** The ID identifying the retry attempt to update the listed packages. - - -### CbsServicingProvider.CbsPackageRemoval - -This event provides information about the results of uninstalling a Windows Cumulative Security Update to help keep Windows up to date. - -The following fields are available: - -- **buildVersion** The build number of the security update being uninstalled. -- **clientId** The name of the application requesting the uninstall. -- **currentStateEnd** The final state of the update after the operation. -- **failureDetails** Information about the cause of a failure, if applicable. -- **failureSourceEnd** The stage during the uninstall where the failure occurred. -- **hrStatusEnd** The overall exit code of the operation. -- **initiatedOffline** Indicates if the uninstall was initiated for a mounted Windows image. -- **majorVersion** The major version number of the security update being uninstalled. -- **minorVersion** The minor version number of the security update being uninstalled. -- **originalState** The starting state of the update before the operation. -- **pendingDecision** Indicates the cause of reboot, if applicable. -- **primitiveExecutionContext** The state during system startup when the uninstall was completed. -- **revisionVersion** The revision number of the security update being uninstalled. -- **transactionCanceled** Indicates whether the uninstall was cancelled. - - -### CbsServicingProvider.CbsQualityUpdateInstall - -This event reports on the performance and reliability results of installing Servicing content from Windows Update to keep Windows up to date. - -The following fields are available: - -- **buildVersion** The build version number of the update package. -- **clientId** The name of the application requesting the optional content. -- **corruptionHistoryFlags** A bitmask of the types of component store corruption that have caused update failures on the device. -- **corruptionType** An enumeration listing the type of data corruption responsible for the current update failure. -- **currentStateEnd** The final state of the package after the operation has completed. -- **doqTimeSeconds** The time in seconds spent updating drivers. -- **executeTimeSeconds** The number of seconds required to execute the install. -- **failureDetails** The driver or installer that caused the update to fail. -- **failureSourceEnd** An enumeration indicating at what phase of the update a failure occurred. -- **hrStatusEnd** The return code of the install operation. -- **initiatedOffline** A true or false value indicating whether the package was installed into an offline Windows Imaging Format (WIM) file. -- **majorVersion** The major version number of the update package. -- **minorVersion** The minor version number of the update package. -- **originalState** The starting state of the package. -- **overallTimeSeconds** The time (in seconds) to perform the overall servicing operation. -- **planTimeSeconds** The time in seconds required to plan the update operations. -- **poqTimeSeconds** The time in seconds processing file and registry operations. -- **postRebootTimeSeconds** The time (in seconds) to do startup processing for the update. -- **preRebootTimeSeconds** The time (in seconds) between execution of the installation and the reboot. -- **primitiveExecutionContext** An enumeration indicating at what phase of shutdown or startup the update was installed. -- **rebootCount** The number of reboots required to install the update. -- **rebootTimeSeconds** The time (in seconds) before startup processing begins for the update. -- **resolveTimeSeconds** The time in seconds required to resolve the packages that are part of the update. -- **revisionVersion** The revision version number of the update package. -- **rptTimeSeconds** The time in seconds spent executing installer plugins. -- **shutdownTimeSeconds** The time (in seconds) required to do shutdown processing for the update. -- **stackRevision** The revision number of the servicing stack. -- **stageTimeSeconds** The time (in seconds) required to stage all files that are part of the update. - - -## Deployment extensions - -### DeploymentTelemetry.Deployment_End - -This event indicates that a Deployment 360 API has completed. - -The following fields are available: - -- **ClientId** Client ID of the user utilizing the D360 API. -- **ErrorCode** Error code of action. -- **FlightId** The specific ID of the Windows Insider build the device is getting. -- **Mode** Phase in upgrade. -- **RelatedCV** The correction vector (CV) of any other related events -- **Result** End result of the action. - - -### DeploymentTelemetry.Deployment_SetupBoxLaunch - -This event indicates that the Deployment 360 APIs have launched Setup Box. - -The following fields are available: - -- **ClientId** The client ID of the user utilizing the D360 API. -- **FlightId** The specific ID of the Windows Insider build the device is getting. -- **Quiet** Whether Setup will run in quiet mode or full mode. -- **RelatedCV** The correlation vector (CV) of any other related events. -- **SetupMode** The current setup phase. - - -### DeploymentTelemetry.Deployment_SetupBoxResult - -This event indicates that the Deployment 360 APIs have received a return from Setup Box. - -The following fields are available: - -- **ClientId** Client ID of the user utilizing the D360 API. -- **ErrorCode** Error code of the action. -- **FlightId** The specific ID of the Windows Insider build the device is getting. -- **Quiet** Indicates whether Setup will run in quiet mode or full mode. -- **RelatedCV** The correlation vector (CV) of any other related events. -- **SetupMode** The current Setup phase. - - -### DeploymentTelemetry.Deployment_Start - -This event indicates that a Deployment 360 API has been called. - -The following fields are available: - -- **ClientId** Client ID of the user utilizing the D360 API. -- **FlightId** The specific ID of the Windows Insider build the device is getting. -- **Mode** The current phase of the upgrade. -- **RelatedCV** The correlation vector (CV) of any other related events. - - -## Diagnostic data events - -### TelClientSynthetic.AuthorizationInfo_RuntimeTransition - -This event sends data indicating that a device has undergone a change of telemetry opt-in level detected at UTC startup, to help keep Windows up to date. The telemetry opt-in level signals what data we are allowed to collect. - -The following fields are available: - -- **CanAddMsaToMsTelemetry** True if we can add MSA PUID and CID to telemetry, false otherwise. -- **CanCollectAnyTelemetry** True if we are allowed to collect partner telemetry, false otherwise. -- **CanCollectCoreTelemetry** True if we can collect CORE/Basic telemetry, false otherwise. -- **CanCollectHeartbeats** True if we can collect heartbeat telemetry, false otherwise. -- **CanCollectOsTelemetry** True if we can collect diagnostic data telemetry, false otherwise. -- **CanCollectWindowsAnalyticsEvents** True if we can collect Windows Analytics data, false otherwise. -- **CanPerformDiagnosticEscalations** True if we can perform diagnostic escalation collection, false otherwise. -- **CanPerformTraceEscalations** True if we can perform trace escalation collection, false otherwise. -- **CanReportScenarios** True if we can report scenario completions, false otherwise. -- **PreviousPermissions** Bitmask of previous telemetry state. -- **TransitionFromEverythingOff** True if we are transitioning from all telemetry being disabled, false otherwise. - - -### TelClientSynthetic.AuthorizationInfo_Startup - -Fired by UTC at startup to signal what data we are allowed to collect. - -The following fields are available: - -- **CanAddMsaToMsTelemetry** True if we can add MSA PUID and CID to telemetry, false otherwise. -- **CanCollectAnyTelemetry** True if we are allowed to collect partner telemetry, false otherwise. -- **CanCollectCoreTelemetry** True if we can collect CORE/Basic telemetry, false otherwise. -- **CanCollectHeartbeats** True if we can collect heartbeat telemetry, false otherwise. -- **CanCollectOsTelemetry** True if we can collect diagnostic data telemetry, false otherwise. -- **CanCollectWindowsAnalyticsEvents** True if we can collect Windows Analytics data, false otherwise. -- **CanPerformDiagnosticEscalations** True if we can perform diagnostic escalation collection, false otherwise. -- **CanPerformTraceEscalations** True if we can perform trace escalation collection, false otherwise. -- **CanReportScenarios** True if we can report scenario completions, false otherwise. -- **PreviousPermissions** Bitmask of previous telemetry state. -- **TransitionFromEverythingOff** True if we are transitioning from all telemetry being disabled, false otherwise. - - -### TelClientSynthetic.ConnectivityHeartBeat_0 - -This event sends data about the connectivity status of the Connected User Experience and Telemetry component that uploads telemetry events. If an unrestricted free network (such as Wi-Fi) is available, this event updates the last successful upload time. Otherwise, it checks whether a Connectivity Heartbeat event was fired in the past 24 hours, and if not, it fires an event. A Connectivity Heartbeat event also fires when a device recovers from costed network to free network. - -The following fields are available: - -- **CensusExitCode** Returns last execution codes from census client run. -- **CensusStartTime** Returns timestamp corresponding to last successful census run. -- **CensusTaskEnabled** Returns Boolean value for the census task (Enable/Disable) on client machine. -- **LastConnectivityLossTime** Retrieves the last time the device lost free network. -- **NetworkState** Retrieves the network state: 0 = No network. 1 = Restricted network. 2 = Free network. -- **NoNetworkTime** Retrieves the time spent with no network (since the last time) in seconds. -- **RestrictedNetworkTime** Retrieves the time spent on a metered (cost restricted) network in seconds. - - -### TelClientSynthetic.HeartBeat_5 - -This event sends data about the health and quality of the diagnostic data from the given device, to help keep Windows up to date. It also enables data analysts to determine how 'trusted' the data is from a given device. - -The following fields are available: - -- **AgentConnectionErrorsCount** Number of non-timeout errors associated with the host/agent channel. -- **AgentConnectionrrorCsCount** No content is currently available. -- **CensusExitCode** The last exit code of the Census task. -- **CensusStartTime** Time of last Census run. -- **CensusTaskEnabled** True if Census is enabled, false otherwise. -- **CompressedBytesUploaded** Number of compressed bytes uploaded. -- **ConsumerDroppedCount** Number of events dropped at consumer layer of telemetry client. -- **CriticalDataDbDroppedCount** Number of critical data sampled events dropped at the database layer. -- **CriticalDataThrottleDroppedCount** The number of critical data sampled events that were dropped because of throttling. -- **CriticalOverflowEntersCounter** Number of times critical overflow mode was entered in event DB. -- **DbCriticalDroppedCount** Total number of dropped critical events in event DB. -- **DbDroppedCount** Number of events dropped due to DB fullness. -- **DbDroppedFailureCount** Number of events dropped due to DB failures. -- **DbDroppedFullCount** Number of events dropped due to DB fullness. -- **DecodingDroppedCount** Number of events dropped due to decoding failures. -- **DecodthiDroppedCount** No content is currently available. -- **EnteringCriticalOverflowDroppedCounter** Number of events dropped due to critical overflow mode being initiated. -- **EnterthiCriticalOverflowDroppedCounter** No content is currently available. -- **EtwDroppedBufferCount** Number of buffers dropped in the UTC ETW session. -- **EtwDroppedCount** Number of events dropped at ETW layer of telemetry client. -- **EventsPersistedCount** Number of events that reached the PersistEvent stage. -- **EventStoreLifetimeResetCounter** Number of times event DB was reset for the lifetime of UTC. -- **EventStoreResetCounter** Number of times event DB was reset. -- **EventStoreResetSizeSum** Total size of event DB across all resets reports in this instance. -- **EventSubStoreResetCounter** Number of times event DB was reset. -- **EventSubStoreResetSizeSum** Total size of event DB across all resets reports in this instance. -- **EventsUploaded** Number of events uploaded. -- **Flags** Flags indicating device state such as network state, battery state, and opt-in state. -- **FullTriggerBufferDroppedCount** Number of events dropped due to trigger buffer being full. -- **HeartBeatSequenceNumber** The sequence number of this heartbeat. -- **InvalidHttpCodeCount** Number of invalid HTTP codes received from contacting Vortex. -- **LastAgentConnectionError** Last non-timeout error encountered in the host/agent channel. -- **LastAgentConnectionrrorC** No content is currently available. -- **LastEventSizeOffender** Event name of last event which exceeded max event size. -- **LastInvalidHttpCode** Last invalid HTTP code received from Vortex. -- **MaxActiveAgentConnectionCount** The maximum number of active agents during this heartbeat timeframe. -- **MaxInUseScenarioCounter** Soft maximum number of scenarios loaded by UTC. -- **MaxInUseScenaryoCounter** No content is currently available. -- **PreviousHeartBeatTime** Time of last heartbeat event (allows chaining of events). -- **PrivacyBlockedCount** The number of events blocked due to privacy settings or tags. -- **RepeatedUploadFailqreDpopped** No content is currently available. -- **RepeatedUploadFailureDropped** Number of events lost due to repeated upload failures for a single buffer. -- **SettingsHttpAttempts** Number of attempts to contact OneSettings service. -- **SettingsHttpFailures** The number of failures from contacting the OneSettings service. -- **SettthisHttpAttempts** No content is currently available. -- **SettthisHttpFailures** No content is currently available. -- **ThrottledDroppedCount** Number of events dropped due to throttling of noisy providers. -- **TopUploaderErrors** List of top errors received from the upload endpoint. -- **TopUploaderrrorCs** No content is currently available. -- **UphoaderErporCount** No content is currently available. -- **UploaderDroppedCount** Number of events dropped at the uploader layer of telemetry client. -- **UploaderErrorCount** Number of errors received from the upload endpoint. -- **VortexFailuresTimeout** The number of timeout failures received from Vortex. -- **VortexHttpAttempts** Number of attempts to contact Vortex. -- **VortexHttpFailures4xx** Number of 400-499 error codes received from Vortex. -- **VortexHttpFailures5xx** Number of 500-599 error codes received from Vortex. -- **VortexHttpResponseFailures** Number of Vortex responses that are not 2XX or 400. -- **VortexHttpResponsesWithDroppedEvents** Number of Vortex responses containing at least 1 dropped event. -- **틠"怀⋖��"ꀀ⋙��"怀⋛"倀⋢** No content is currently available. - - -### TelClientSynthetic.HeartBeat_Aria_5 - -This event is the telemetry client ARIA heartbeat. - -The following fields are available: - -- **CompressedBytesUploaded** Number of compressed bytes uploaded. -- **CriticalDataDbDroppedCount** Number of critical data sampled events dropped at the database layer. -- **CriticalOverflowEntersCounter** Number of times critical overflow mode was entered in event database. -- **DbCriticalDroppedCount** Total number of dropped critical events in event database. -- **DbDroppedCount** Number of events dropped at the database layer. -- **DbDroppedFailureCount** Number of events dropped due to database failures. -- **DbDroppedFullCount** Number of events dropped due to database being full. -- **EnteringCriticalOverflowDroppedCounter** Number of events dropped due to critical overflow mode being initiated. -- **Eve~tStoreResetCounter** No content is currently available. -- **EventsPersistedCount** Number of events that reached the PersistEvent stage. -- **EventStoreLifetimeResetCounter** Number of times the event store has been reset. -- **EventStoreResetCounter** Number of times the event store has been reset during this heartbeat. -- **EventStoreResetSizeSum** Size of event store reset in bytes. -- **EventsUploaded** Number of events uploaded. -- **HeartBeatSequenceNumber** The sequence number of this heartbeat. -- **InvalidHttpCodeCount** Number of invalid HTTP codes received from contacting Vortex. -- **LastEventSizeOffender** Event name of last event which exceeded max event size. -- **LastInvalidHttpCode** Last invalid HTTP code received from Vortex. -- **PreviousHeartBeatTime** The FILETIME of the previous heartbeat fire. -- **PrivacyBlockedCount** The number of events blocked due to privacy settings or tags. -- **RepeatedUploadFailureDropped** Number of events lost due to repeated upload failures for a single buffer. -- **SettingsHttpAttempts** Number of attempts to contact OneSettings service. -- **SettingsHttpFailures** Number of failures from contacting OneSettings service. -- **TopUploaderErrors** List of top errors received from the upload endpoint. -- **UploaderDroppedCount** Number of events dropped at the uploader layer of telemetry client. -- **UploaderErrorCount** Number of errors received from the upload endpoint. -- **VortexFailuresTimeout** Number of time out failures received from Vortex. -- **VortexHttpAttempts** Number of attempts to contact Vortex. -- **VortexHttpFailures4xx** Number of 400-499 error codes received from Vortex. -- **VortexHttpFailures5xx** Number of 500-599 error codes received from Vortex. -- **VortexHttpResponseFailures** Number of Vortex responses that are not 2XX or 400. -- **VortexHttpResponsesWithDroppedEvents** Number of Vortex responses containing at least 1 dropped event. - - -### TelClientSynthetic.HeartBeat_Seville_5 - -This event is sent by the universal telemetry client (UTC) as a heartbeat signal for Sense. - -The following fields are available: - -- **AgentConnectionErrorsCount** Number of non-timeout errors associated with the host or agent channel. -- **CompressedBytesUploaded** Number of compressed bytes uploaded. -- **ConsumerDroppedCount** Number of events dropped at consumer layer of the telemetry client. -- **CriticalDataDbDroppedCount** Number of critical data sampled events dropped at the database layer. -- **CriticalDataThrottleDroppedCount** Number of critical data sampled events dropped due to throttling. -- **CriticalOverflowEntersCounter** Number of times critical overflow mode was entered in event database. -- **DailyUploadQuotaInBytes** Daily upload quota for Sense in bytes (only in in-proc mode). -- **DbCriticalDroppedCount** Total number of dropped critical events in event database. -- **DbDroppedCount** Number of events dropped due to database being full. -- **DbDroppedFailureCount** Number of events dropped due to database failures. -- **DbDroppedFullCount** Number of events dropped due to database being full. -- **DecodingDroppedCount** Number of events dropped due to decoding failures. -- **DiskSizeInBytes** Size of event store for Sense in bytes (only in in-proc mode). -- **EnteringCriticalOverflowDroppedCounter** Number of events dropped due to critical overflow mode being initiated. -- **EtwDroppedBufferCount** Number of buffers dropped in the universal telemetry client (UTC) event tracing for Windows (ETW) session. -- **EtwDroppedCount** Number of events dropped at the event tracing for Windows (ETW) layer of telemetry client. -- **EventsPersistedCount** Number of events that reached the PersistEvent stage. -- **EventStoreLifetimeResetCounter** Number of times event the database was reset for the lifetime of the universal telemetry client (UTC). -- **EventStoreResetCounter** Number of times the event database was reset. -- **EventStoreResetSizeSum** Total size of the event database across all resets reports in this instance. -- **EventsUploaded** Number of events uploaded. -- **Flags** Flags indicating device state, such as network state, battery state, and opt-in state. -- **FullTriggerBufferDroppedCount** Number of events dropped due to trigger buffer being full. -- **HeartBeatSequenceNumber** The sequence number of this heartbeat. -- **InvalidHttpCodeCount** Number of invalid HTTP codes received from contacting Vortex. -- **LastAgentConnectionError** Last non-timeout error encountered in the host/agent channel. -- **LastEventSizeOffender** Event name of last event which exceeded the maximum event size. -- **LastInvalidHttpCode** Last invalid HTTP code received from Vortex. -- **MaxActiveAgentConnectionCount** Maximum number of active agents during this heartbeat timeframe. -- **NormalUploadTimerMillis** Number of milliseconds between each upload of normal events for SENSE (only in in-proc mode). -- **PreviousHeartBeatTime** Time of last heartbeat event (allows chaining of events). -- **RepeatedUploadFailureDropped** Number of events lost due to repeated failed uploaded attempts. -- **SettingsHttpAttempts** Number of attempts to contact OneSettings service. -- **SettingsHttpFailures** Number of failures from contacting the OneSettings service. -- **ThrottledDroppedCount** Number of events dropped due to throttling of noisy providers. -- **TopUploaderErrors** Top uploader errors, grouped by endpoint and error type. -- **UploaderDroppedCount** Number of events dropped at the uploader layer of the telemetry client. -- **UploaderErrorCount** Number of input for the TopUploaderErrors mode estimation. -- **VortexFailuresTimeout** Number of time out failures received from Vortex. -- **VortexHttpAttempts** Number of attempts to contact Vortex. -- **VortexHttpFailures4xx** Number of 400-499 error codes received from Vortex. -- **VortexHttpFailures5xx** Number of 500-599 error codes received from Vortex. -- **VortexHttpResponseFailures** Number of Vortex responses that are not 2XX or 400. -- **VortexHttpResponsesWithDroppedEvents** Number of Vortex responses containing at least 1 dropped event. - - -## Direct to update events - -### Microsoft.Windows.DirectToUpdate.DTUCoordinatorCheckApplicability - -Event to indicate that the Coordinator CheckApplicability call succeeded. - -The following fields are available: - -- **ApplicabilityResult** Result of CheckApplicability function. -- **CampaignID** Campaign ID being run. -- **ClientID** Client ID being run. -- **CoordinatorVersion** Coordinator version of DTU. -- **CV** Correlation vector. -- **IsDeviceAADDomainJoined** Indicates whether the device is logged in to the AAD (Azure Active Directory) domain. -- **IsDeviceADDomainJoined** Indicates whether the device is logged in to the AD (Active Directory) domain. -- **IsDeviceCloverTrail** Indicates whether the device has a Clover Trail system installed. -- **IsDeviceFeatureUpdatingPaused** Indicates whether Feature Update is paused on the device. -- **IsDeviceNetworkMetered** Indicates whether the device is connected to a metered network. -- **IsDeviceOobeBlocked** Indicates whether user approval is required to install updates on the device. -- **IsDeviceRequireUpdateApproval** Indicates whether user approval is required to install updates on the device. -- **IsDeviceSccmManaged** Indicates whether the device is running the Microsoft SCCM (System Center Configuration Manager) to keep the operating system and applications up to date. -- **IsDeviceUninstallActive** Indicates whether the OS (operating system) on the device was recently updated. -- **IsDeviceUpdateNotificationLevel** Indicates whether the device has a set policy to control update notifications. -- **IsDeviceUpdateServiceManaged** Indicates whether the device uses WSUS (Windows Server Update Services). -- **IsDeviceZeroExhaust** Indicates whether the device subscribes to the Zero Exhaust policy to minimize connections from Windows to Microsoft. -- **IsGreaterThanMaxRetry** Indicates whether the DTU (Direct to Update) service has exceeded its maximum retry count. -- **IsVolumeLicensed** Indicates whether a volume license was used to authenticate the operating system or applications on the device. - - -### Microsoft.Windows.DirectToUpdate.DTUCoordinatorCheckApplicabilityGenericFailure - -This event indicatse that we have received an unexpected error in the Direct to Update (DTU) Coordinators CheckApplicability call. - -The following fields are available: - -- **CampaignID** ID of the campaign being run. -- **ClientID** ID of the client receiving the update. -- **CoordinatorVersion** Coordinator version of Direct to Update. -- **CV** Correlation vector. -- **hResult** HRESULT of the failure. - - -### Microsoft.Windows.DirectToUpdate.DTUCoordinatorCleanupGenericFailure - -This event indicates that we have received an unexpected error in the Direct to Update (DTU) Coordinator Cleanup call. - -The following fields are available: - -- **CampaignID** Campaign ID being run -- **ClientID** Client ID being run -- **CoordinatorVersion** Coordinator version of DTU -- **CV** Correlation vector -- **hResult** HRESULT of the failure - - -### Microsoft.Windows.DirectToUpdate.DTUCoordinatorCleanupSuccess - -This event indicates that the Coordinator Cleanup call succeeded. - -The following fields are available: - -- **CampaignID** Campaign ID being run -- **ClientID** Client ID being run -- **CoordinatorVersion** Coordinator version of DTU -- **CV** Correlation vector - - -### Microsoft.Windows.DirectToUpdate.DTUCoordinatorCommitGenericFailure - -This event indicates that we have received an unexpected error in the Direct to Update (DTU) Coordinator Commit call. - -The following fields are available: - -- **CampaignID** Campaign ID being run. -- **ClientID** Client ID being run. -- **CoordinatorVersion** Coordinator version of DTU. -- **CV** Correlation vector. -- **hResult** HRESULT of the failure. - - -### Microsoft.Windows.DirectToUpdate.DTUCoordinatorCommitSuccess - -This event indicates that the Coordinator Commit call succeeded. - -The following fields are available: - -- **CampaignID** Campaign ID being run. -- **ClientID** Client ID being run. -- **CoordinatorVersion** Coordinator version of DTU. -- **CV** Correlation vector. - - -### Microsoft.Windows.DirectToUpdate.DTUCoordinatorDownloadGenericFailure - -This event indicates that we have received an unexpected error in the Direct to Update (DTU) Coordinator Download call. - -The following fields are available: - -- **CampaignID** Campaign ID being run. -- **ClientID** Client ID being run. -- **CoordinatorVersion** Coordinator version of DTU. -- **CV** Correlation vector. -- **hResult** HRESULT of the failure. - - -### Microsoft.Windows.DirectToUpdate.DTUCoordinatorDownloadIgnoredFailure - -This event indicates that we have received an error in the Direct to Update (DTU) Coordinator Download call that will be ignored. - -The following fields are available: - -- **CampaignID** Campaign ID being run. -- **ClientID** Client ID being run. -- **CoordinatorVersion** Coordinator version of DTU. -- **CV** Correlation vector. -- **hResult** HRESULT of the failure. - - -### Microsoft.Windows.DirectToUpdate.DTUCoordinatorDownloadSuccess - -This event indicates that the Coordinator Download call succeeded. - -The following fields are available: - -- **CampaignID** Campaign ID being run. -- **ClientID** Client ID being run. -- **CoordinatorVersion** Coordinator version of DTU. -- **CV** Correlation vector. - - -### Microsoft.Windows.DirectToUpdate.DTUCoordinatorHandleShutdownGenericFailure - -This event indicates that we have received an unexpected error in the Direct to Update (DTU) Coordinator HandleShutdown call. - -The following fields are available: - -- **CampaignID** Campaign ID being run. -- **ClientID** Client ID being run. -- **CoordinatorVersion** Coordinate version of DTU. -- **CV** Correlation vector. -- **hResult** HRESULT of the failure. - - -### Microsoft.Windows.DirectToUpdate.DTUCoordinatorHandleShutdownSuccess - -This event indicates that the Coordinator HandleShutdown call succeeded. - -The following fields are available: - -- **CampaignID** Campaign ID being run. -- **ClientID** Client ID being run. -- **CoordinatorVersion** Coordinator version of DTU. -- **CV** Correlation vector. - - -### Microsoft.Windows.DirectToUpdate.DTUCoordinatorInitializeGenericFailure - -This event indicates that we have received an unexpected error in the Direct to Update (DTU) Coordinator Initialize call. - -The following fields are available: - -- **CampaignID** Campaign ID being run. -- **ClientID** Client ID being run. -- **CoordinatorVersion** Coordinator version of DTU. -- **CV** Correlation vector. -- **hResult** HRESULT of the failure. - - -### Microsoft.Windows.DirectToUpdate.DTUCoordinatorInitializeSuccess - -This event indicates that the Coordinator Initialize call succeeded. - -The following fields are available: - -- **CampaignID** Campaign ID being run. -- **ClientID** Client ID being run. -- **CoordinatorVersion** Coordinator version of DTU. -- **CV** Correlation vector. - - -### Microsoft.Windows.DirectToUpdate.DTUCoordinatorInstallGenericFailure - -This event indicates that we have received an unexpected error in the Direct to Update (DTU) Coordinator Install call. - -The following fields are available: - -- **CampaignID** Campaign ID being run. -- **ClientID** Client ID being run. -- **CoordinatorVersion** Coordinator version of DTU. -- **CV** Correlation vector. -- **hResult** HRESULT of the failure. - - -### Microsoft.Windows.DirectToUpdate.DTUCoordinatorInstallIgnoredFailure - -This event indicates that we have received an error in the Direct to Update (DTU) Coordinator Install call that will be ignored. - -The following fields are available: - -- **CampaignID** Campaign ID being run. -- **ClientID** Client ID being run. -- **CoordinatorVersion** Coordinator version of DTU. -- **CV** Correlation vector. -- **hResult** HRESULT of the failure. - - -### Microsoft.Windows.DirectToUpdate.DTUCoordinatorInstallSuccess - -This event indicates that the Coordinator Install call succeeded. - -The following fields are available: - -- **CampaignID** Campaign ID being run. -- **ClientID** Client ID being run. -- **CoordinatorVersion** Coordinator version of DTU. -- **CV** Correlation vector. - - -### Microsoft.Windows.DirectToUpdate.DTUCoordinatorProgressCallBack - -This event indicates that the Coordinator's progress callback has been called. - -The following fields are available: - -- **CampaignID** Campaign ID being run. -- **ClientID** Client ID being run. -- **CoordinatorVersion** Coordinator version of DTU. -- **CV** Correlation vector. -- **DeployPhase** Current Deploy Phase. - - -### Microsoft.Windows.DirectToUpdate.DTUCoordinatorSetCommitReadySuccess - -This event indicates that the Coordinator SetCommitReady call succeeded. - -The following fields are available: - -- **CampaignID** ID of the update campaign being run. -- **ClientID** ID of the client receiving the update. -- **CoordinatorVersion** Coordinator version of Direct to Update. -- **CV** Correlation vector. - - -### Microsoft.Windows.DirectToUpdate.DTUCoordinatorWaitForRebootUiNotShown - -This event indicates that the Coordinator WaitForRebootUi call succeeded. - -The following fields are available: - -- **CampaignID** Campaign ID being run. -- **ClientID** ID of the client receiving the update. -- **CoordinatorVersion** Coordinator version of Direct to Update. -- **CV** Correlation vector. -- **hResult** HRESULT of the failure. - - -### Microsoft.Windows.DirectToUpdate.DTUCoordinatorWaitForRebootUiSelection - -This event indicates that the user selected an option on the Reboot UI. - -The following fields are available: - -- **CampaignID** ID of the update campaign being run. -- **ClientID** ID of the client receiving the update. -- **CoordinatorVersion** Coordinator version of Direct to Update. -- **CV** Correlation vector. -- **rebootUiSelection** Selection on the Reboot UI. - - -### Microsoft.Windows.DirectToUpdate.DTUCoordinatorWaitForRebootUiSuccess - -This event indicates that the Coordinator WaitForRebootUi call succeeded. - -The following fields are available: - -- **CampaignID** ID of the update campaign being run. -- **ClientID** ID of the client receiving the update. -- **CoordinatorVersion** Coordinator version of Direct to Update. -- **CV** Correlation vector. - - -### Microsoft.Windows.DirectToUpdate.DTUHandlerCheckApplicabilityInternalGenericFailure - -This event indicates that we have received an unexpected error in the Direct to Update (DTU) Handler CheckApplicabilityInternal call. - -The following fields are available: - -- **CampaignID** ID of the campaign being run. -- **ClientID** ID of the client receiving the update. -- **CoordinatorVersion** Coordinator version of Direct to Update. -- **CV** Correlation vector. -- **hResult** HRESULT of the failure. - - -### Microsoft.Windows.DirectToUpdate.DTUHandlerCheckApplicabilityInternalSuccess - -This event indicates that the Handler CheckApplicabilityInternal call succeeded. - -The following fields are available: - -- **ApplicabilityResult** The result of the applicability check. -- **CampaignID** ID of the update campaign being run. -- **ClientID** ID of the client receiving the update. -- **CoordinatorVersion** Coordinator version of Direct to Update. -- **CV** Correlation vector. - - -### Microsoft.Windows.DirectToUpdate.DTUHandlerCheckApplicabilitySuccess - -This event indicates that the Handler CheckApplicability call succeeded. - -The following fields are available: - -- **ApplicabilityResult** The result code indicating whether the update is applicable. -- **CampaignID** ID of the update campaign being run. -- **ClientID** ID of the client receiving the update. -- **CoordinatorVersion** Coordinator version of Direct to Update. -- **CV** Correlation vector. -- **CV_new** New correlation vector. - - -### Microsoft.Windows.DirectToUpdate.DTUHandlerCheckIfCoordinatorMinApplicableVersionSuccess - -This event indicates that the Handler CheckIfCoordinatorMinApplicableVersion call succeeded. - -The following fields are available: - -- **CampaignID** ID of the update campaign being run. -- **CheckIfCoordinatorMinApplicableVersionResult** Result of CheckIfCoordinatorMinApplicableVersion function. -- **ClientID** ID of the client receiving the update. -- **CoordinatorVersion** Coordinator version of Direct to Update. -- **CV** Correlation vector. - - -### Microsoft.Windows.DirectToUpdate.DTUHandlerCommitGenericFailure - -This event indicates that we have received an unexpected error in the Direct to Update (DTU) Handler Commit call. - -The following fields are available: - -- **CampaignID** ID of the update campaign being run. -- **ClientID** ID of the client receiving the update. -- **CoordinatorVersion** Coordinator version of Direct to Update. -- **CV** Correlation vector. -- **CV_new** New correlation vector. -- **hResult** HRESULT of the failure. - - -### Microsoft.Windows.DirectToUpdate.DTUHandlerCommitSuccess - -This event indicates that the Handler Commit call succeeded. - -The following fields are available: - -- **CampaignID** ID of the update campaign being run.run -- **ClientID** ID of the client receiving the update. -- **CoordinatorVersion** Coordinator version of Direct to Update. -- **CV** Correlation vector. -- **CV_new** New correlation vector. - - -### Microsoft.Windows.DirectToUpdate.DTUHandlerDownloadAndExtractCabFailure - -This event indicates that the Handler Download and Extract cab call failed. - -The following fields are available: - -- **CampaignID** ID of the update campaign being run. -- **ClientID** ID of the client receiving the update. -- **CoordinatorVersion** Coordinator version of Direct to Update. -- **CV** Correlation vector. -- **DownloadAndExtractCabFunction_failureReason** Reason why the update download and extract process failed. -- **hResult** HRESULT of the failure. - - -### Microsoft.Windows.DirectToUpdate.DTUHandlerDownloadAndExtractCabSuccess - -This event indicates that the Handler Download and Extract cab call succeeded. - -The following fields are available: - -- **CampaignID** ID of the update campaign being run. -- **ClientID** ID of the client receiving the update. -- **CoordinatorVersion** Coordinator version of Direct to Update. -- **CV** Correlation vector. - - -### Microsoft.Windows.DirectToUpdate.DTUHandlerDownloadGenericFailure - -This event indicates that we have received an unexpected error in the Direct to Update (DTU) Handler Download call. - -The following fields are available: - -- **CampaignID** ID of the update campaign being run. -- **ClientID** ID of the client receiving the update. -- **CoordinatorVersion** Coordinator version of Direct to Update. -- **CV** Correlation vector. -- **hResult** HRESULT of the failure. - - -### Microsoft.Windows.DirectToUpdate.DTUHandlerDownloadSuccess - -This event indicates that the Handler Download call succeeded. - -The following fields are available: - -- **CampaignID** ID of the update campaign being run. -- **ClientID** ID of the client receiving the update. -- **CoordinatorVersion** Coordinator version of Direct to Update. -- **CV** Correlation vector. - - -### Microsoft.Windows.DirectToUpdate.DTUHandlerInitializeGenericFailure - -This event indicates that we have received an unexpected error in the Direct to Update (DTU) Handler Initialize call. - -The following fields are available: - -- **CampaignID** ID of the update campaign being run. -- **ClientID** ID of the client receiving the update. -- **CoordinatorVersion** Coordinator version of Direct to Update. -- **CV** Correlation vector. -- **DownloadAndExtractCabFunction_hResult** HRESULT of the download and extract. -- **hResult** HRESULT of the failure. - - -### Microsoft.Windows.DirectToUpdate.DTUHandlerInitializeSuccess - -This event indicates that the Handler Initialize call succeeded. - -The following fields are available: - -- **CampaignID** ID of the update campaign being run. -- **ClientID** ID of the client receiving the update. -- **CoordinatorVersion** Coordinator version of Direct to Update. -- **CV** Correlation vector. -- **DownloadAndExtractCabFunction_hResult** HRESULT of the download and extraction. - - -### Microsoft.Windows.DirectToUpdate.DTUHandlerInstallGenericFailure - -This event indicates that we have received an unexpected error in the Direct to Update (DTU) Handler Install call. - -The following fields are available: - -- **CampaignID** ID of the update campaign being run. -- **ClientID** ID of the client receiving the update. -- **CoordinatorVersion** Coordinator version of Direct to Update. -- **CV** Correlation vector. -- **hResult** HRESULT of the failure. - - -### Microsoft.Windows.DirectToUpdate.DTUHandlerInstallSuccess - -This event indicates that the Coordinator Install call succeeded. - -The following fields are available: - -- **CampaignID** ID of the update campaign being run. -- **ClientID** ID of the client receiving the update. -- **CoordinatorVersion** Coordinator version of Direct to Update. -- **CV** Correlation vector. - - -### Microsoft.Windows.DirectToUpdate.DTUHandlerSetCommitReadySuccess - -This event indicates that the Handler SetCommitReady call succeeded. - -The following fields are available: - -- **CampaignID** ID of the campaign being run. -- **ClientID** ID of the client receiving the update. -- **CoordinatorVersion** Coordinator version of Direct to Update. -- **CV** Correlation vector. - - -### Microsoft.Windows.DirectToUpdate.DTUHandlerWaitForRebootUiGenericFailure - -This event indicates that we have received an unexpected error in the Direct to Update (DTU) Handler WaitForRebootUi call. - -The following fields are available: - -- **CampaignID** The ID of the campaigning being run. -- **ClientID** ID of the client receiving the update. -- **CoordinatorVersion** Coordinator version of Direct to Update. -- **CV** Correlation vector. -- **hResult** The HRESULT of the failure. - - -### Microsoft.Windows.DirectToUpdate.DTUHandlerWaitForRebootUiSuccess - -This event indicates that the Handler WaitForRebootUi call succeeded. - -The following fields are available: - -- **CampaignID** ID of the campaign being run. -- **ClientID** ID of the client receiving the update. -- **CoordinatorVersion** Coordinator version of Direct to Update. -- **CV** Correlation vector. - - -## DxgKernelTelemetry events - -### DxgKrnlTelemetry.GPUAdapterInventoryV2 - -This event sends basic GPU and display driver information to keep Windows and display drivers up-to-date. - -The following fields are available: - -- **AdapterTypeValue** The numeric value indicating the type of Graphics adapter. -- **aiSeqId** The event sequence ID. -- **AsMiracastSupported** No content is currently available. -- **bootId** The system boot ID. -- **BrightnessVersionViaDDI** The version of the Display Brightness Interface. -- **ComputePreemptionLevel** The maximum preemption level supported by GPU for compute payload. -- **DedicatedSystemMemoryB** The amount of system memory dedicated for GPU use (in bytes). -- **DedicatedVideoMemoryB** The amount of dedicated VRAM of the GPU (in bytes). -- **DisplaqAdapterLuid** No content is currently available. -- **DisplayAdapterLuid** The display adapter LUID. -- **DriverDate** The date of the display driver. -- **DriverRank** The rank of the display driver. -- **DriverVersion** The display driver version. -- **DX10UMDFilePath** The file path to the location of the DirectX 10 Display User Mode Driver in the Driver Store. -- **DX11UMDFile@ath** No content is currently available. -- **DX11UMDFilePath** The file path to the location of the DirectX 11 Display User Mode Driver in the Driver Store. -- **DX12UMDFilePath** The file path to the location of the DirectX 12 Display User Mode Driver in the Driver Store. -- **DX9UMDFilePath** The file path to the location of the DirectX 9 Display User Mode Driver in the Driver Store. -- **GPUDeviceID** The GPU device ID. -- **GPUPreemptionLevel** The maximum preemption level supported by GPU for graphics payload. -- **GPURevisionID** The GPU revision ID. -- **GPUVendorID** The GPU vendor ID. -- **InterfaceId** The GPU interface ID. -- **IsDisplayDevice** Does the GPU have displaying capabilities? -- **IsHwSchSupported** Indicates whether the adapter supports hardware scheduling. -- **IsHybridDiscrete** Does the GPU have discrete GPU capabilities in a hybrid device? -- **IsHybridIntegrated** Does the GPU have integrated GPU capabilities in a hybrid device? -- **IsLDA** Is the GPU comprised of Linked Display Adapters? -- **IsMiracastSupported** Does the GPU support Miracast? -- **IsMismatchLDA** Is at least one device in the Linked Display Adapters chain from a different vendor? -- **IsMPOSupported** Does the GPU support Multi-Plane Overlays? -- **IsMsMiracastSupported** Are the GPU Miracast capabilities driven by a Microsoft solution? -- **IsPostAdapter** Is this GPU the POST GPU in the device? -- **IsRemovable** TRUE if the adapter supports being disabled or removed. -- **IsRenderDevice** Does the GPU have rendering capabilities? -- **IsSoftwareDevice** Is this a software implementation of the GPU? -- **KMDFilePath** The file path to the location of the Display Kernel Mode Driver in the Driver Store. -- **MeasureEnabled** Is the device listening to MICROSOFT_KEYWORD_MEASURES? -- **MsHybridDiscrete** Indicates whether the adapter is a discrete adapter in a hybrid configuration. -- **NumVidPnSources** The number of supported display output sources. -- **NumVidPnTargets** The number of supported display output targets. -- **SharedSystemMemoryB** The amount of system memory shared by GPU and CPU (in bytes). -- **SubSystemID** The subsystem ID. -- **SubVendorID** The GPU sub vendor ID. -- **TelemetryEnabled** Is the device listening to MICROSOFT_KEYWORD_TELEMETRY? -- **TelInvEvntTrigger** What triggered this event to be logged? Example: 0 (GPU enumeration) or 1 (DxgKrnlTelemetry provider toggling) -- **version** The event version. -- **WDDMVersion** The Windows Display Driver Model version. - - -## Failover Clustering events - -### Microsoft.Windows.Server.FailoverClusteringCritical.ClusterSummary2 - -This event returns information about how many resources and of what type are in the server cluster. This data is collected to keep Windows Server safe, secure, and up to date. The data includes information about whether hardware is configured correctly, if the software is patched correctly, and assists in preventing crashes by attributing issues (like fatal errors) to workloads and system configurations. - -The following fields are available: - -- **autoAssignSite** The cluster parameter: auto site. -- **autoBalancerLevel** The cluster parameter: auto balancer level. -- **autoBalancerMode** The cluster parameter: auto balancer mode. -- **blockCacheSize** The configured size of the block cache. -- **ClusterAdConfiguration** The ad configuration of the cluster. -- **clusterAdType** The cluster parameter: mgmt_point_type. -- **clusterDumpPolicy** The cluster configured dump policy. -- **clusterFunctionalLevel** The current cluster functional level. -- **clusterGuid** The unique identifier for the cluster. -- **clusterWitnessType** The witness type the cluster is configured for. -- **countNodesInSite** The number of nodes in the cluster. -- **crossSiteDelay** The cluster parameter: CrossSiteDelay. -- **crossSiteThreshold** The cluster parameter: CrossSiteThreshold. -- **crossSubnetDelay** The cluster parameter: CrossSubnetDelay. -- **crossSubnetThreshold** The cluster parameter: CrossSubnetThreshold. -- **csvCompatibleFilters** The cluster parameter: ClusterCsvCompatibleFilters. -- **csvIncompatibleFilters** The cluster parameter: ClusterCsvIncompatibleFilters. -- **csvResourceCount** The number of resources in the cluster. -- **currentNodeSite** The name configured for the current site for the cluster. -- **dasModeBusType** The direct storage bus type of the storage spaces. -- **downLevelNodeCount** The number of nodes in the cluster that are running down-level. -- **drainOnShutdown** Specifies whether a node should be drained when it is shut down. -- **dynamicQuorumEnabled** Specifies whether dynamic Quorum has been enabled. -- **enforcedAntiAffinity** The cluster parameter: enforced anti affinity. -- **genAppNames** The win32 service name of a clustered service. -- **genSvcNames** The command line of a clustered genapp. -- **hangRecoveryAction** The cluster parameter: hang recovery action. -- **hangTimeOut** Specifies the “hang time out” parameter for the cluster. -- **isCalabria** Specifies whether storage spaces direct is enabled. -- **isMixedMode** Identifies if the cluster is running with different version of OS for nodes. -- **isRunningDownLevel** Identifies if the current node is running down-level. -- **logLevel** Specifies the granularity that is logged in the cluster log. -- **logSize** Specifies the size of the cluster log. -- **lowerQuorumPriorityNodeId** The cluster parameter: lower quorum priority node ID. -- **minNeverPreempt** The cluster parameter: minimum never preempt. -- **minPreemptor** The cluster parameter: minimum preemptor priority. -- **netftIpsecEnabled** The parameter: netftIpsecEnabled. -- **NodeCount** The number of nodes in the cluster. -- **nodeId** The current node number in the cluster. -- **nodeResourceCounts** Specifies the number of node resources. -- **nodeResourceOnlineCounts** Specifies the number of node resources that are online. -- **numberOfSites** The number of different sites. -- **numNodesInNoSite** The number of nodes not belonging to a site. -- **plumbAllCrossSubnetRoutes** The cluster parameter: plumb all cross subnet routes. -- **preferredSite** The preferred site location. -- **privateCloudWitness** Specifies whether a private cloud witness exists for this cluster. -- **quarantineDuration** The quarantine duration. -- **quarantineThreshold** The quarantine threshold. -- **quorumArbitrationTimeout** In the event of an arbitration event, this specifies the quorum timeout period. -- **resiliencyLevel** Specifies the level of resiliency. -- **resourceCounts** Specifies the number of resources. -- **resourceTypeCounts** Specifies the number of resource types in the cluster. -- **resourceTypes** Data representative of each resource type. -- **resourceTypesPath** Data representative of the DLL path for each resource type. -- **sameSubnetDelay** The cluster parameter: same subnet delay. -- **sameSubnetThreshold** The cluster parameter: same subnet threshold. -- **secondsInMixedMode** The amount of time (in seconds) that the cluster has been in mixed mode (nodes with different operating system versions in the same cluster). -- **securityLevel** The cluster parameter: security level. -- **securityLevelForStorage** The cluster parameter: security level for storage. -- **sharedVolumeBlockCacheSize** Specifies the block cache size for shared for shared volumes. -- **shutdownTimeoutMinutes** Specifies the amount of time it takes to time out when shutting down. -- **upNodeCount** Specifies the number of nodes that are up (online). -- **useClientAccessNetworksForCsv** The cluster parameter: use client access networks for CSV. -- **vmIsolationTime** The cluster parameter: VM isolation time. -- **witnessDatabaseWriteTimeout** Specifies the timeout period for writing to the quorum witness database. - - -## Fault Reporting events - -### Microsoft.Windows.FaultReporting.AppCrashEvent - -This event sends data about crashes for both native and managed applications, to help keep Windows up to date. The data includes information about the crashing process and a summary of its exception record. It does not contain any Watson bucketing information. The bucketing information is recorded in a Windows Error Reporting (WER) event that is generated when the WER client reports the crash to the Watson service, and the WER event will contain the same ReportID (see field 14 of crash event, field 19 of WER event) as the crash event for the crash being reported. AppCrash is emitted once for each crash handled by WER (e.g. from an unhandled exception or FailFast or ReportException). Note that Generic Watson event types (e.g. from PLM) that may be considered crashes\" by a user DO NOT emit this event. - -The following fields are available: - -- **@ackageRelativeAppId** No content is currently available. -- **AppName** The name of the app that has crashed. -- **AppSeqsionGuid** No content is currently available. -- **AppSessionGuid** GUID made up of process ID and is used as a correlation vector for process instances in the telemetry backend. -- **AppTimeStamp** The date/time stamp of the app. -- **AppVersion** The version of the app that has crashed. -- **AptName** No content is currently available. -- **AptSessionGuid** No content is currently available. -- **DargetAppId** No content is currently available. -- **ExceptionCode** The exception code returned by the process that has crashed. -- **ExceptionOffset** The address where the exception had occurred. -- **Flags** Flags indicating how reporting is done. For example, queue the report, do not offer JIT debugging, or do not terminate the process after reporting. -- **FoiendlyAppName** No content is currently available. -- **FriendlyAppName** The description of the app that has crashed, if different from the AppName. Otherwise, the process name. -- **IsFatal** True/False to indicate whether the crash resulted in process termination. -- **ModName** Exception module name (e.g. bar.dll). -- **ModNamevaultsv** No content is currently available. -- **ModTimeStamp** The date/time stamp of the module. -- **ModVersion** The version of the module that has crashed. -- **PaccageFullName** No content is currently available. -- **PackageFullName** Store application identity. -- **PackageRelaatieAppId** No content is currently available. -- **PackageRelativaAppId** No content is currently available. -- **PackageRelativeAppId** Store application identity. -- **ProcessArchitecture** Architecture of the crashing process, as one of the PROCESSOR_ARCHITECTURE_* constants: 0: PROCESSOR_ARCHITECTURE_INTEL. 5: PROCESSOR_ARCHITECTURE_ARM. 9: PROCESSOR_ARCHITECTURE_AMD64. 12: PROCESSOR_ARCHITECTURE_ARM64. -- **ProcessCreateTime** The time of creation of the process that has crashed. -- **ProcessId** The ID of the process that has crashed. -- **PRocessId** No content is currently available. -- **RepkrtId** No content is currently available. -- **ReportId** A GUID used to identify the report. This can used to track the report across Watson. -- **TargepAppVer** No content is currently available. -- **TargetAppI`** No content is currently available. -- **TargetAppId** The kernel reported AppId of the application being reported. -- **TargetAppVer** The specific version of the application being reported -- **TargetAsId** The sequence number for the hanging process. -- **TargetAwId** No content is currently available. -- **TrocessArchitecture** No content is currently available. -- **TrocessCreateTime** No content is currently available. - - -## Feature update events - -### Microsoft.Windows.Upgrade.Uninstall.UninstallFinalizedAndRebootTriggered - -This event indicates that the uninstall was properly configured and that a system reboot was initiated. - - - -### Microsoft.Windows.Upgrade.Uninstall.UninstallGoBackButtonClicked - -This event sends basic metadata about the starting point of uninstalling a feature update, which helps ensure customers can safely revert to a well-known state if the update caused any problems. - - - -## Hang Reporting events - -### Microsoft.Windows.HangReporting.AppHangEvent - -This event sends data about hangs for both native and managed applications, to help keep Windows up to date. It does not contain any Watson bucketing information. The bucketing information is recorded in a Windows Error Reporting (WER) event that is generated when the WER client reports the hang to the Watson service, and the WER event will contain the same ReportID (see field 13 of hang event, field 19 of WER event) as the hang event for the hang being reported. AppHang is reported only on PC devices. It handles classic Win32 hangs and is emitted only once per report. Some behaviors that may be perceived by a user as a hang are reported by app managers (e.g. PLM/RM/EM) as Watson Generics and will not produce AppHang events. - -The following fields are available: - -- **AppName** The name of the app that has hung. -- **AppSessionGuid** GUID made up of process id used as a correlation vector for process instances in the telemetry backend. -- **AppVersion** The version of the app that has hung. -- **IsFatal** True/False based on whether the hung application caused the creation of a Fatal Hang Report. -- **PackageFullName** Store application identity. -- **PackageRelativeAppId** Store application identity. -- **ProcessArchitecture** Architecture of the hung process, as one of the PROCESSOR_ARCHITECTURE_* constants: 0: PROCESSOR_ARCHITECTURE_INTEL. 5: PROCESSOR_ARCHITECTURE_ARM. 9: PROCESSOR_ARCHITECTURE_AMD64. 12: PROCESSOR_ARCHITECTURE_ARM64. -- **ProcessCreateTime** The time of creation of the process that has hung. -- **ProcessId** The ID of the process that has hung. -- **ReportId** A GUID used to identify the report. This can used to track the report across Watson. -- **TargetAppId** The kernel reported AppId of the application being reported. -- **TargetAppVer** The specific version of the application being reported. -- **TargetAsId** The sequence number for the hanging process. -- **TypeCode** Bitmap describing the hang type. -- **WaitingOnAppName** If this is a cross process hang waiting for an application, this has the name of the application. -- **WaitingOnAppVersion** If this is a cross process hang, this has the version of the application for which it is waiting. -- **WaitingOnPackageFullName** If this is a cross process hang waiting for a package, this has the full name of the package for which it is waiting. -- **WaitingOnPackageRelativeAppId** If this is a cross process hang waiting for a package, this has the relative application id of the package. - - -## Inventory events - -### Microsoft.Windows.Inventory.Core.AmiTelCacheChecksum - -This event captures basic checksum data about the device inventory items stored in the cache for use in validating data completeness for Microsoft.Windows.Inventory.Core events. The fields in this event may change over time, but they will always represent a count of a given object. - -The following fields are available: - -- **Device** A count of device objects in cache. -- **DeviceCensus** A count of device census objects in cache. -- **DriverPackageExtended** A count of driverpackageextended objects in cache. -- **File** A count of file objects in cache. -- **FileSigningInfo** A count of file signing objects in cache. -- **Generic** A count of generic objects in cache. -- **HwItem** A count of hwitem objects in cache. -- **InventoryApplication** A count of application objects in cache. -- **InventoryApplicationAppV** A count of application AppV objects in cache. -- **InventoryApplicationDriver** A count of application driver objects in cache -- **InventoryApplicationFile** A count of application file objects in cache. -- **InventoryApplicationFramework** A count of application framework objects in cache -- **InventoryApplicationShortcut** A count of application shortcut objects in cache -- **InventoryDeviceContainer** A count of device container objects in cache. -- **InventoryDeviceInterface** A count of Plug and Play device interface objects in cache. -- **InventoryDeviceMediaClass** A count of device media objects in cache. -- **InventoryDevicePnp** A count of device Plug and Play objects in cache. -- **InventoryDeviceUsbHubClass** A count of device usb objects in cache -- **InventoryDriverBinary** A count of driver binary objects in cache. -- **InventoryDriverPackage** A count of device objects in cache. -- **InventoryMiscellaneousOfficeAddIn** A count of office add-in objects in cache -- **InventoryMiscellaneousOfficeAddInUsage** A count of office add-in usage objects in cache. -- **InventoryMiscellaneousOfficeIdentifiers** A count of office identifier objects in cache -- **InventoryMiscellaneousOfficeIESettings** A count of office ie settings objects in cache -- **InventoryMiscellaneousOfficeInsights** A count of office insights objects in cache -- **InventoryMiscellaneousOfficeProducts** A count of office products objects in cache -- **InventoryMiscellaneousOfficeSettings** A count of office settings objects in cache -- **InventoryMiscellaneousOfficeVBA** A count of office vba objects in cache -- **InventoryMiscellaneousOfficeVBARuleViolations** A count of office vba rule violations objects in cache -- **InventoryMiscellaneousUUPInfo** A count of uup info objects in cache -- **InventoryMiscnfo** No content is currently available. -- **Metadata** A count of metadata objects in cache. -- **Orphan** A count of orphan file objects in cache. -- **Programs** A count of program objects in cache. - - -### Microsoft.Windows.Inventory.Core.AmiTelCacheFileInfo - -Diagnostic data about the inventory cache. - -The following fields are available: - -- **CacheFileSize** Size of the cache. -- **InventoryVersion** Inventory version of the cache. -- **TempCacheCount** Number of temp caches created. -- **TempCacheDeletedCount** Number of temp caches deleted. - - -### Microsoft.Windows.Inventory.Core.AmiTelCacheVersions - -This event sends inventory component versions for the Device Inventory data. - -The following fields are available: - -- **aeinv** The version of the App inventory component. -- **devinv** The file version of the Device inventory component. - - -### Microsoft.Windows.Inventory.Core.InventoryApplicationAdd - -This event sends basic metadata about an application on the system to help keep Windows up to date. - -This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedeviceinventorychange). - -The following fields are available: - -- **HiddenArp** Indicates whether a program hides itself from showing up in ARP. -- **InstallDate** The date the application was installed (a best guess based on folder creation date heuristics). -- **InstallDateArpLastModifi** No content is currently available. -- **InstallDateArpLastModified** The date of the registry ARP key for a given application. Hints at install date but not always accurate. Passed as an array. Example: 4/11/2015 00:00:00 -- **InstallDateArpLasuModified** No content is currently available. -- **InstallDateFromLinkFile** The estimated date of install based on the links to the files. Passed as an array. -- **InstallDateMsi** The install date if the application was installed via Microsoft Installer (MSI). Passed as an array. -- **InventoryVersion** The version of the inventory file generating the events. -- **Language** The language code of the program. -- **MsiPackageCode** A GUID that describes the MSI Package. Multiple 'Products' (apps) can make up an MsiPackage. -- **MsiProductCode** A GUID that describe the MSI Product. -- **Name** The name of the application. -- **Order** No content is currently available. -- **OSVersionAtInstallTime** The four octets from the OS version at the time of the application's install. -- **PackageFullName** The package full name for a Store application. -- **PackagmFullName** No content is currently available. -- **ProgramInstanceId** A hash of the file IDs in an app. -- **Publisher** The Publisher of the application. Location pulled from depends on the 'Source' field. -- **RootDirPath** The path to the root directory where the program was installed. -- **Source** How the program was installed (for example, ARP, MSI, Appx). -- **StoreAppType** A sub-classification for the type of Microsoft Store app, such as UWP or Win8StoreApp. -- **Type** One of ("Application", "Hotfix", "BOE", "Service", "Unknown"). Application indicates Win32 or Appx app, Hotfix indicates app updates (KBs), BOE indicates it's an app with no ARP or MSI entry, Service indicates that it is a service. Application and BOE are the ones most likely seen. -- **Value** No content is currently available. -- **Version** The version number of the program. - - -### Microsoft.Windows.Inventory.Core.InventoryApplicationDriverAdd - -This event represents what drivers an application installs. - -This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedeviceinventorychange). - -The following fields are available: - -- **InventoryVersion** The version of the inventory component. -- **ProgramIds** The unique program identifier the driver is associated with. - - -### Microsoft.Windows.Inventory.Core.InventoryApplicationDriverStartSync - -The InventoryApplicationDriverStartSync event indicates that a new set of InventoryApplicationDriverStartAdd events will be sent. - -This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedeviceinventorychange). - -The following fields are available: - -- **InventoryVersion** The version of the inventory component. - - -### Microsoft.Windows.Inventory.Core.InventoryApplicationFrameworkAdd - -This event provides the basic metadata about the frameworks an application may depend on. - -This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedeviceinventorychange). - -The following fields are available: - -- **FileId** A hash that uniquely identifies a file. -- **Frameworks** The list of frameworks this file depends on. -- **InventoryVersion** The version of the inventory file generating the events. - - -### Microsoft.Windows.Inventory.Core.InventoryApplicationFrameworkStartSync - -This event indicates that a new set of InventoryApplicationFrameworkAdd events will be sent. - -This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedeviceinventorychange). - -The following fields are available: - -- **InventoryVersion** The version of the inventory file generating the events. - - -### Microsoft.Windows.Inventory.Core.InventoryApplicationRemove - -This event indicates that a new set of InventoryDevicePnpAdd events will be sent. - -This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedeviceinventorychange). - -The following fields are available: - -- **InventoryVersion** The version of the inventory file generating the events. - - -### Microsoft.Windows.Inventory.Core.InventoryApplicationStartSync - -This event indicates that a new set of InventoryApplicationAdd events will be sent. - -This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedeviceinventorychange). - -The following fields are available: - -- **InventoryVersion** The version of the inventory file generating the events. - - -### Microsoft.Windows.Inventory.Core.InventoryDeviceContainerAdd - -This event sends basic metadata about a device container (such as a monitor or printer as opposed to a Plug and Play device) to help keep Windows up to date. - -This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedeviceinventorychange). - -The following fields are available: - -- **Categories** A comma separated list of functional categories in which the container belongs. -- **DiscoveryMethod** The discovery method for the device container. -- **FriendlyName** The name of the device container. -- **InventoryVersion** The version of the inventory file generating the events. -- **IsActive** Is the device connected, or has it been seen in the last 14 days? -- **IsConnected** For a physically attached device, this value is the same as IsPresent. For wireless a device, this value represents a communication link. -- **IsMachineContainer** Is the container the root device itself? -- **IsNetworked** Is this a networked device? -- **IsPaired** Does the device container require pairing? -- **Manufacturer** The manufacturer name for the device container. -- **ModelId** A unique model ID. -- **ModelName** The model name. -- **ModelNumber** The model number for the device container. -- **PrimaryCategory** The primary category for the device container. - - -### Microsoft.Windows.Inventory.Core.InventoryDeviceContainerRemove - -This event indicates that the InventoryDeviceContainer object is no longer present. - -This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedeviceinventorychange). - -The following fields are available: - -- **InventoryVersion** The version of the inventory file generating the events. - - -### Microsoft.Windows.Inventory.Core.InventoryDeviceContainerStartSync - -This event indicates that a new set of InventoryDeviceContainerAdd events will be sent. - -This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedeviceinventorychange). - -The following fields are available: - -- **InventoryVersion** The version of the inventory file generating the events. - - -### Microsoft.Windows.Inventory.Core.InventoryDeviceInterfaceAdd - -This event retrieves information about what sensor interfaces are available on the device. - -This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedeviceinventorychange). - -The following fields are available: - -- **Accelerometer3D** Indicates if an Accelerator3D sensor is found. -- **ActivityDetection** Indicates if an Activity Detection sensor is found. -- **AmbientLight** Indicates if an Ambient Light sensor is found. -- **Barometer** Indicates if a Barometer sensor is found. -- **Custom** Indicates if a Custom sensor is found. -- **EnergyMeter** Indicates if an Energy sensor is found. -- **FloorElevation** Indicates if a Floor Elevation sensor is found. -- **GeomagneticOrientation** Indicates if a Geo Magnetic Orientation sensor is found. -- **GravityVector** Indicates if a Gravity Detector sensor is found. -- **Gyrometer3D** Indicates if a Gyrometer3D sensor is found. -- **Humidity** Indicates if a Humidity sensor is found. -- **InventoryVersion** The version of the inventory file generating the events. -- **LinearAccelerometer** Indicates if a Linear Accelerometer sensor is found. -- **Magnetometer3D** Indicates if a Magnetometer3D sensor is found. -- **Orientation** Indicates if an Orientation sensor is found. -- **Pedometer** Indicates if a Pedometer sensor is found. -- **Proximity** Indicates if a Proximity sensor is found. -- **RelativeOrientation** Indicates if a Relative Orientation sensor is found. -- **SimpleDeviceOrientation** Indicates if a Simple Device Orientation sensor is found. -- **Temperature** Indicates if a Temperature sensor is found. - - -### Microsoft.Windows.Inventory.Core.InventoryDeviceInterfaceStartSync - -This event indicates that a new set of InventoryDeviceInterfaceAdd events will be sent. - -This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedeviceinventorychange). - -The following fields are available: - -- **InventoryVersion** The version of the inventory file generating the events. - - -### Microsoft.Windows.Inventory.Core.InventoryDeviceMediaClassAdd - -This event sends additional metadata about a Plug and Play device that is specific to a particular class of devices to help keep Windows up to date while reducing overall size of data payload. - -This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedeviceinventorychange). - -The following fields are available: - -- **audio.captureDriver** Audio device capture driver. Example: hdaudio.inf:db04a16ce4e8d6ee:HdAudModel:10.0.14887.1000:hdaudio\func_01 -- **audio.renderDriver** Audio device render driver. Example: hdaudio.inf:db04a16ce4e8d6ee:HdAudModel:10.0.14889.1001:hdaudio\func_01 -- **Audio_CaptureDriver** The Audio device capture driver endpoint. -- **Audio_RenderDriver** The Audio device render driver endpoint. -- **InventoryVersion** The version of the inventory file generating the events. - - -### Microsoft.Windows.Inventory.Core.InventoryDeviceMediaClassRemove - -This event indicates that the InventoryDeviceMediaClassRemove object is no longer present. - -This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedeviceinventorychange). - -The following fields are available: - -- **InventoryVersion** The version of the inventory file generating the events. - - -### Microsoft.Windows.Inventory.Core.InventoryDeviceMediaClassStartSync - -This event indicates that a new set of InventoryDeviceMediaClassSAdd events will be sent. - -This event includes fields from [Ms.Device.De~iceInventoryChange](#msdevicede~iceinventorychange). - -The following fields are available: - -- **InventoryVersion** The version of the inventory file generating the events. - - -### Microsoft.Windows.Inventory.Core.InventoryDevicePnpAdd - -This event represents the basic metadata about a plug and play (PNP) device and its associated driver. - -This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedeviceinventorychange). - -The following fields are available: - -- **basedata** No content is currently available. See [basedata](#basedata). -- **BusReportedDescription** The description of the device reported by the bux. -- **Class** The device setup class of the driver loaded for the device. -- **ClassGuid** The device class unique identifier of the driver package loaded on the device. -- **COMPID** The list of “Compatible IDs” for this device. -- **COMPID.Count** No content is currently available. -- **ContainerId** The system-supplied unique identifier that specifies which group(s) the device(s) installed on the parent (main) device belong to. -- **Description** The description of the device. -- **DeviceInterfaceClasses** The device interfaces that this device implements. -- **DeviceState** Identifies the current state of the parent (main) device. -- **DriverId** The unique identifier for the installed driver. -- **DriverName** The name of the driver image file. -- **DriverP!ckageStrongName** No content is currently available. -- **DriverPackageStrongName** The immediate parent directory name in the Directory field of InventoryDriverPackage. -- **DriverVerDate** The date associated with the driver installed on the device. -- **DriverVerVersion** The version number of the driver installed on the device. -- **Enumerator** Identifies the bus that enumerated the device. -- **ExtendedInfs** The extended INF file names. -- **HWID** A list of hardware IDs for the device. -- **HWID.Count** No content is currently available. -- **IlstallStcte** No content is currently available. -- **Inf** The name of the INF file (possibly renamed by the OS, such as oemXX.inf). -- **InstallCtate** No content is currently available. -- **InstallState** The device installation state. For a list of values, see: https://msdn.microsoft.com/en-us/library/windows/hardware/ff543130.aspx -- **InventoryVersion** The version number of the inventory process generating the events. -- **LowerClassFilters** The identifiers of the Lower Class filters installed for the device. -- **LowerFilters** The identifiers of the Lower filters installed for the device. -- **Manufacturer** The manufacturer of the device. -- **Manufccturer** No content is currently available. -- **MatchingID** The Hardware ID or Compatible ID that Windows uses to install a device instance. -- **Model** Identifies the model of the device. -- **ParentId** The Device Instance ID of the parent of the device. -- **Part@_Ms.Devkce.DeviaeInventmryChangg** No content is currently available. See [Part@_Ms.Devkce.DeviaeInventmryChangg](#part@_msdevkcedeviaeinventmrychangg). -- **ProblemCode** The error code currently returned by the device, if applicable. -- **Provider** Identifies the device provider. -- **Service** The name of the device service. -- **STACKAD** No content is currently available. -- **STACKID** The list of hardware IDs for the stack. -- **STACKID.Count** No content is currently available. -- **UpperAlassFilvers** No content is currently available. -- **UpperClassFilters** The identifiers of the Upper Class filters installed for the device. -- **UpperFilteps** No content is currently available. -- **UpperFilters** The identifiers of the Upper filters installed for the device. - - -### Microsoft.Windows.Inventory.Core.InventoryDevicePnpRemove - -This event indicates that the InventoryDevicePnpRemove object is no longer present. - -This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedeviceinventorychange). - -The following fields are available: - -- **InventoryVersion** The version of the inventory file generating the events. - - -### Microsoft.Windows.Inventory.Core.InventoryDevicePnpStartSync - -This event indicates that a new set of InventoryDevicePnpAdd events will be sent. - -This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedeviceinventorychange). - -The following fields are available: - -- **InventoryVersion** The version of the inventory file generating the events. - - -### Microsoft.Windows.Inventory.Core.InventoryDeviceUsbHubClassAdd - -This event sends basic metadata about the USB hubs on the device. - -This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedeviceinventorychange). - -The following fields are available: - -- **InventoryVersion** The version of the inventory file generating the events. -- **TotalUserConnectablePorts** Total number of connectable USB ports. -- **TotalUserConnectableTypeCPorts** Total number of connectable USB Type C ports. - - -### Microsoft.Windows.Inventory.Core.InventoryDeviceUsbHubClassStartSync - -This event indicates that a new set of InventoryDeviceUsbHubClassAdd events will be sent. - -This event includes fields from [Ms.De~ice.DeviceInventoryChange](#msde~icedeviceinventorychange). - -The following fields are available: - -- **InventoryVersion** The version of the inventory file generating the events. - - -### Microsoft.Windows.Inventory.Core.InventoryDriverBinaryAdd - -This event provides the basic metadata about driver binaries running on the system. - -This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedeviceinventorychange). - -The following fields are available: - -- **DriverCheckSum** The checksum of the driver file. -- **DriverCompany** The company name that developed the driver. -- **DriverInBox** Is the driver included with the operating system? -- **DriverIsKernelMode** Is it a kernel mode driver? -- **DriverName** The file name of the driver. -- **DriverPackageStrongName** The strong name of the driver package -- **DriverSigned** The strong name of the driver package -- **DriverTimeStamp** The low 32 bits of the time stamp of the driver file. -- **DriverType** A bitfield of driver attributes: 1. define DRIVER_MAP_DRIVER_TYPE_PRINTER 0x0001. 2. define DRIVER_MAP_DRIVER_TYPE_KERNEL 0x0002. 3. define DRIVER_MAP_DRIVER_TYPE_USER 0x0004. 4. define DRIVER_MAP_DRIVER_IS_SIGNED 0x0008. 5. define DRIVER_MAP_DRIVER_IS_INBOX 0x0010. 6. define DRIVER_MAP_DRIVER_IS_WINQUAL 0x0040. 7. define DRIVER_MAP_DRIVER_IS_SELF_SIGNED 0x0020. 8. define DRIVER_MAP_DRIVER_IS_CI_SIGNED 0x0080. 9. define DRIVER_MAP_DRIVER_HAS_BOOT_SERVICE 0x0100. 10. define DRIVER_MAP_DRIVER_TYPE_I386 0x10000. 11. define DRIVER_MAP_DRIVER_TYPE_IA64 0x20000. 12. define DRIVER_MAP_DRIVER_TYPE_AMD64 0x40000. 13. define DRIVER_MAP_DRIVER_TYPE_ARM 0x100000. 14. define DRIVER_MAP_DRIVER_TYPE_THUMB 0x200000. 15. define DRIVER_MAP_DRIVER_TYPE_ARMNT 0x400000. 16. define DRIVER_MAP_DRIVER_IS_TIME_STAMPED 0x800000. -- **DriverVersion** The version of the driver file. -- **DviverCompany** No content is currently available. -- **Imagesize** No content is currently available. -- **ImageSize** The size of the driver file. -- **Inf** The name of the INF file. -- **InventoryVersion** The version of the inventory file generating the events. -- **Product** The product name that is included in the driver file. -- **ProductVersio~** No content is currently available. -- **ProductVersion** The product version that is included in the driver file. -- **Service** The name of the service that is installed for the device. -- **WdfVersion** The Windows Driver Framework version. - - -### Microsoft.Windows.Inventory.Core.InventoryDriverBinaryRemove - -This event indicates that the InventoryDriverBinary object is no longer present. - -This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedeviceinventorychange). - -The following fields are available: - -- **InventoryVersion** The version of the inventory file generating the events. - - -### Microsoft.Windows.Inventory.Core.InventoryDriverBinaryStartSync - -This event indicates that a new set of InventoryDriverBinaryAdd events will be sent. - -This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedeviceinventorychange). - -The following fields are available: - -- **InventoryVersion** The version of the inventory file generating the events. - - -### Microsoft.Windows.Inventory.Core.InventoryDriverPackageAdd - -This event sends basic metadata about drive packages installed on the system to help keep Windows up to date. - -This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedeviceinventorychange). - -The following fields are available: - -- **Class** The class name for the device driver. -- **ClassGuid** The class GUID for the device driver. -- **Date** The driver package date. -- **Directory** The path to the driver package. -- **DriverInBox** Is the driver included with the operating system? -- **Inf** The INF name of the driver package. -- **InventoryVersion** The version of the inventory file generating the events. -- **Provider** The provider for the driver package. -- **SubmissionId** The HLK submission ID for the driver package. -- **Version** The version of the driver package. - - -### Microsoft.Windows.Inventory.Core.InventoryDriverPackageRemove - -This event indicates that the InventoryDriverPackageRemove object is no longer present. - -This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedeviceinventorychange). - -The following fields are available: - -- **InventoryVersion** The version of the inventory file generating the events. - - -### Microsoft.Windows.Inventory.Core.InventoryDriverPackageStartSync - -This event indicates that a new set of InventoryDriverPackageAdd events will be sent. - -This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedeviceinventorychange). - -The following fields are available: - -- **InventoryVersion** The version of the inventory file generating the events. - - -### Microsoft.Windows.Inventory.Core.StartUtcJsonTrace - -This event collects traces of all other Core events, not used in typical customer scenarios. This event signals the beginning of the event download, and that tracing should begin. - - - -### Microsoft.Windows.Inventory.Core.StopUtcJsonTrace - -This event collects traces of all other Core events, not used in typical customer scenarios. This event signals the end of the event download, and that tracing should end. - - - -### Microsoft.Windows.Inventory.General.AppHealthStaticAdd - -This event sends details collected for a specific application on the source device. - -The following fields are available: - -- **AhaVersion** The binary version of the App Health Analyzer tool. -- **ApplicationErrors** The count of application errors from the event log. -- **Bitness** The architecture type of the application (16 Bit or 32 bit or 64 bit). -- **device_level** Various JRE/JAVA versions installed on a particular device. -- **ExtendedProperties** Attribute used for aggregating all other attributes under this event type. -- **Jar** Flag to determine if an app has a Java JAR file dependency. -- **Jre** Flag to determine if an app has JRE framework dependency. -- **Jre_version** JRE versions an app has declared framework dependency for. -- **Name** Name of the application. -- **NonDPIAware** Flag to determine if an app is non-DPI aware. -- **NumBinaries** Count of all binaries (.sys,.dll,.ini) from application install location. -- **RequiresAdmin** Flag to determine if an app requests admin privileges for execution. -- **RequiresAdminv2** Additional flag to determine if an app requests admin privileges for execution. -- **RequiresUIAccess** Flag to determine if an app is based on UI features for accessibility. -- **VB6** Flag to determine if an app is based on VB6 framework. -- **VB6v2** Additional flag to determine if an app is based on VB6 framework. -- **Version** Version of the application. -- **VersionCheck** Flag to determine if an app has a static dependency on OS version. -- **VersionCheckv2** Additional flag to determine if an app has a static dependency on OS version. - - -### Microsoft.Windows.Inventory.General.AppHealthStaticStartSync - -This event indicates the beginning of a series of AppHealthStaticAdd events. - -The following fields are available: - -- **AllowTelemetry** Indicates the presence of the 'allowtelemetry' command line argument. -- **CommandLineArgs** Command line arguments passed when launching the App Health Analyzer executable. -- **Enhanced** Indicates the presence of the 'enhanced' command line argument. -- **StartTime** UTC date and time at which this event was sent. - - -### Microsoft.Windows.Inventory.General.InventoryMiscellaneousOfficeAddInAdd - -Provides data on the installed Office Add-ins. - -This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedeviceinventorychange). - -The following fields are available: - -- **AddinCLSID** The class identifier key for the Microsoft Office add-in. -- **AddInCLSID** The class identifier key for the Microsoft Office add-in. -- **AddInId** The identifier for the Microsoft Office add-in. -- **AddinType** The type of the Microsoft Office add-in. -- **BinFileTimestamp** The timestamp of the Office add-in. -- **BinFileVersion** The version of the Microsoft Office add-in. -- **Description** Description of the Microsoft Office add-in. -- **FileId** The file identifier of the Microsoft Office add-in. -- **FileSize** The file size of the Microsoft Office add-in. -- **FriendlyName** The friendly name for the Microsoft Office add-in. -- **FullPath** The full path to the Microsoft Office add-in. -- **InventoryVersion** The version of the inventory binary generating the events. -- **LoadBehavior** Integer that describes the load behavior. -- **LoadTime** Load time for the Office add-in. -- **OfficeApplication** The Microsoft Office application associated with the add-in. -- **OfficeArchitecture** The architecture of the add-in. -- **OfficeVersion** The Microsoft Office version for this add-in. -- **OutlookCrashingAddin** Indicates whether crashes have been found for this add-in. -- **ProductCompany** The name of the company associated with the Office add-in. -- **ProductName** The product name associated with the Microsoft Office add-in. -- **ProductVersion** The version associated with the Office add-in. -- **ProgramId** The unique program identifier of the Microsoft Office add-in. -- **Provider** Name of the provider for this add-in. - - -### Microsoft.Windows.Inventory.General.InventoryMiscellaneousOfficeAddInRemove - -Indicates that this particular data object represented by the objectInstanceId is no longer present. - -This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedeviceinventorychange). - -The following fields are available: - -- **InventoryVersion** The version of the inventory binary generating the events. - - -### Microsoft.Windows.Inventory.General.InventoryMiscellaneousOfficeAddInStartSync - -This event indicates that a new sync is being generated for this object type. - -This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedeviceinventorychange). - -The following fields are available: - -- **InventoryVersion** The version of the inventory binary generating the events. - - -### Microsoft.Windows.Inventory.General.InventoryMiscellaneousOfficeIdentifiersAdd - -Provides data on the Office identifiers. - -This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedeviceinventorychange). - -The following fields are available: - -- **InventoryVersion** The version of the inventory binary generating the events. -- **OAudienceData** Sub-identifier for Microsoft Office release management, identifying the pilot group for a device -- **OAudienceId** Microsoft Office identifier for Microsoft Office release management, identifying the pilot group for a device -- **OMID** Identifier for the Office SQM Machine -- **OPlatform** Whether the installed Microsoft Office product is 32-bit or 64-bit -- **OTenantId** Unique GUID representing the Microsoft O365 Tenant -- **OVersion** Installed version of Microsoft Office. For example, 16.0.8602.1000 -- **OWowMID** Legacy Microsoft Office telemetry identifier (SQM Machine ID) for WoW systems (32-bit Microsoft Office on 64-bit Windows) - - -### Microsoft.Windows.Inventory.General.InventoryMiscellaneousOfficeIdentifiersStartSync - -Diagnostic event to indicate a new sync is being generated for this object type. - -This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedeviceinventorychange). - -The following fields are available: - -- **InventoryVersion** The version of the inventory binary generating the events. - - -### Microsoft.Windows.Inventory.General.InventoryMiscellaneousOfficeIESettingsAdd - -Provides data on Office-related Internet Explorer features. - -This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedeviceinventorychange). - -The following fields are available: - -- **InventoryVersion** The version of the inventory binary generating the events. -- **OIeFeatureAddon** Flag indicating which Microsoft Office products have this setting enabled. The FEATURE_ADDON_MANAGEMENT feature lets applications hosting the WebBrowser Control to respect add-on management selections made using the Add-on Manager feature of Internet Explorer. Add-ons disabled by the user or by administrative group policy will also be disabled in applications that enable this feature. -- **OIeMachineLockdown** Flag indicating which Microsoft Office products have this setting enabled. When the FEATURE_LOCALMACHINE_LOCKDOWN feature is enabled, Internet Explorer applies security restrictions on content loaded from the user's local machine, which helps prevent malicious behavior involving local files. -- **OIeMimeHandling** Flag indicating which Microsoft Office products have this setting enabled. When the FEATURE_MIME_HANDLING feature control is enabled, Internet Explorer handles MIME types more securely. Only applies to Windows Internet Explorer 6 for Windows XP Service Pack 2 (SP2) -- **OIeMimeSniffing** Flag indicating which Microsoft Office products have this setting enabled. Determines a file's type by examining its bit signature. Windows Internet Explorer uses this information to determine how to render the file. The FEATURE_MIME_SNIFFING feature, when enabled, allows to be set differently for each security zone by using the URLACTION_FEATURE_MIME_SNIFFING URL action flag -- **OIeNoAxInstall** Flag indicating which Microsoft Office products have this setting enabled. When a webpage attempts to load or install an ActiveX control that isn't already installed, the FEATURE_RESTRICT_ACTIVEXINSTALL feature blocks the request. When a webpage tries to load or install an ActiveX control that isn't already installed, the FEATURE_RESTRICT_ACTIVEXINSTALL feature blocks the request -- **OIeNoDownload** Flag indicating which Microsoft Office products have this setting enabled. The FEATURE_RESTRICT_FILEDOWNLOAD feature blocks file download requests that navigate to a resource, that display a file download dialog box, or that are not initiated explicitly by a user action (for example, a mouse click or key press). Only applies to Windows Internet Explorer 6 for Windows XP Service Pack 2 (SP2) -- **OIeObjectCaching** Flag indicating which Microsoft Office products have this setting enabled. When enabled, the FEATURE_OBJECT_CACHING feature prevents webpages from accessing or instantiating ActiveX controls cached from different domains or security contexts -- **OIePasswordDisable** Flag indicating which Microsoft Office products have this setting enabled. After Windows Internet Explorer 6 for Windows XP Service Pack 2 (SP2), Internet Explorer no longer allows usernames and passwords to be specified in URLs that use the HTTP or HTTPS protocols. URLs using other protocols, such as FTP, still allow usernames and passwords -- **OIeSafeBind** Flag indicating which Microsoft Office products have this setting enabled. The FEATURE_SAFE_BINDTOOBJECT feature performs additional safety checks when calling MonikerBindToObject to create and initialize Microsoft ActiveX controls. Specifically, prevent the control from being created if COMPAT_EVIL_DONT_LOAD is in the registry for the control -- **OIeSecurityBand** Flag indicating which Microsoft Office products have this setting enabled. The FEATURE_SECURITYBAND feature controls the display of the Internet Explorer Information bar. When enabled, the Information bar appears when file download or code installation is restricted -- **OIeUncSaveCheck** Flag indicating which Microsoft Office products have this setting enabled. The FEATURE_UNC_SAVEDFILECHECK feature enables the Mark of the Web (MOTW) for local files loaded from network locations that have been shared by using the Universal Naming Convention (UNC) -- **OIeValidateUrl** Flag indicating which Microsoft Office products have this setting enabled. When enabled, the FEATURE_VALIDATE_NAVIGATE_URL feature control prevents Windows Internet Explorer from navigating to a badly formed URL -- **OIeWebOcPopup** Flag indicating which Microsoft Office products have this setting enabled. The FEATURE_WEBOC_POPUPMANAGEMENT feature allows applications hosting the WebBrowser Control to receive the default Internet Explorer pop-up window management behavior -- **OIeWinRestrict** Flag indicating which Microsoft Office products have this setting enabled. When enabled, the FEATURE_WINDOW_RESTRICTIONS feature adds several restrictions to the size and behavior of popup windows -- **OIeZoneElevate** Flag indicating which Microsoft Office products have this setting enabled. When enabled, the FEATURE_ZONE_ELEVATION feature prevents pages in one zone from navigating to pages in a higher security zone unless the navigation is generated by the user - - -### Microsoft.Windows.Inventory.General.InventoryMiscellaneousOfficeIESettingsStartSync - -Diagnostic event to indicate a new sync is being generated for this object type. - -This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedeviceinventorychange). - -The following fields are available: - -- **InventoryVersion** The version of the inventory binary generating the events. - - -### Microsoft.Windows.Inventory.General.InventoryMiscellaneousOfficeInsightsAdd - -This event provides insight data on the installed Office products - -This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedeviceinventorychange). - -The following fields are available: - -- **InventoryVersion** The version of the inventory binary generating the events. -- **OfficeApplication** The name of the Office application. -- **OfficeArchitecture** The bitness of the Office application. -- **OfficeVersion** The version of the Office application. -- **Value** The insights collected about this entity. - - -### Microsoft.Windows.Inventory.General.InventoryMiscellaneousOfficeInsightsRemove - -Indicates that this particular data object represented by the objectInstanceId is no longer present. - -This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedeviceinventorychange). - -The following fields are available: - -- **InventoryVersion** The version of the inventory binary generating the events. - - -### Microsoft.Windows.Inventory.General.InventoryMiscellaneousOfficeInsightsStartSync - -This diagnostic event indicates that a new sync is being generated for this object type. - -This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedeviceinventorychange). - -The following fields are available: - -- **InventoryVersion** The version of the inventory binary generating the events. - - -### Microsoft.Windows.Inventory.General.InventoryMiscellaneousOfficeProductsAdd - -Describes Office Products installed. - -This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedeviceinventorychange). - -The following fields are available: - -- **InventoryVersion** The version of the inventory binary generating the events. -- **OC2rApps** A GUID the describes the Office Click-To-Run apps -- **OC2rSkus** Comma-delimited list (CSV) of Office Click-To-Run products installed on the device. For example, Office 2016 ProPlus -- **OMsiApps** Comma-delimited list (CSV) of Office MSI products installed on the device. For example, Microsoft Word -- **OProductCodes** A GUID that describes the Office MSI products - - -### Microsoft.Windows.Inventory.General.InventoryMiscellaneousOfficeProductsStartSync - -Diagnostic event to indicate a new sync is being generated for this object type. - -This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedeviceinventorychange). - -The following fields are available: - -- **InventoryVersion** The version of the inventory binary generating the events. - - -### Microsoft.Windows.Inventory.General.InventoryMiscellaneousOfficeSettingsAdd - -This event describes various Office settings - -This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedeviceinventorychange). - -The following fields are available: - -- **BrowserFlags** Browser flags for Office-related products -- **ExchangeProviderFlags** Provider policies for Office Exchange -- **InventoryVersion** The version of the inventory binary generating the events. -- **SharedComputerLicensing** Office shared computer licensing policies - - -### Microsoft.Windows.Inventory.General.InventoryMiscellaneousOfficeSettingsStartSync - -Indicates a new sync is being generated for this object type. - -This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedeviceinventorychange). - -The following fields are available: - -- **InventoryVersion** The version of the inventory binary generating the events. - - -### Microsoft.Windows.Inventory.General.InventoryMiscellaneousOfficeVBAAdd - -This event provides a summary rollup count of conditions encountered while performing a local scan of Office files, analyzing for known VBA programmability compatibility issues between legacy office version and ProPlus, and between 32 and 64-bit versions - -This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedeviceinventorychange). - -The following fields are available: - -- **Design** Count of files with design issues found. -- **Design_x64** Count of files with 64 bit design issues found. -- **DuplicateVBA** Count of files with duplicate VBA code. -- **HasVBA** Count of files with VBA code. -- **Inaccessible** Count of files that were inaccessible for scanning. -- **InventoryVersion** The version of the inventory binary generating the events. -- **Issues** Count of files with issues detected. -- **Issues_x64** Count of files with 64-bit issues detected. -- **IssuesNone** Count of files with no issues detected. -- **IssuesNone_x64** Count of files with no 64-bit issues detected. -- **Locked** Count of files that were locked, preventing scanning. -- **NoVBA** Count of files with no VBA inside. -- **Protected** Count of files that were password protected, preventing scanning. -- **RemLimited** Count of files that require limited remediation changes. -- **RemLimited_x64** Count of files that require limited remediation changes for 64-bit issues. -- **RemSignificant** Count of files that require significant remediation changes. -- **RemSignificant_x64** Count of files that require significant remediation changes for 64-bit issues. -- **Score** Overall compatibility score calculated for scanned content. -- **Score_x64** Overall 64-bit compatibility score calculated for scanned content. -- **Total** Total number of files scanned. -- **Validation** Count of files that require additional manual validation. -- **Validation_x64** Count of files that require additional manual validation for 64-bit issues. - - -### Microsoft.Windows.Inventory.General.InventoryMiscellaneousOfficeVBARemove - -Indicates that this particular data object represented by the objectInstanceId is no longer present. - -This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedeviceinventorychange). - -The following fields are available: - -- **InventoryVersion** The version of the inventory binary generating the events. - - -### Microsoft.Windows.Inventory.General.InventoryMiscellaneousOfficeVBARuleViolationsAdd - -This event provides data on Microsoft Office VBA rule violations, including a rollup count per violation type, giving an indication of remediation requirements for an organization. The event identifier is a unique GUID, associated with the validation rule - -This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedeviceinventorychange). - -The following fields are available: - -- **Count** Count of total Microsoft Office VBA rule violations -- **InventoryVersion** The version of the inventory binary generating the events. - - -### Microsoft.Windows.Inventory.General.InventoryMiscellaneousOfficeVBARuleViolationsRemove - -Indicates that this particular data object represented by the objectInstanceId is no longer present. - -This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedeviceinventorychange). - -The following fields are available: - -- **InventoryVersion** The version of the inventory binary generating the events. - - -### Microsoft.Windows.Inventory.General.InventoryMiscellaneousOfficeVBARuleViolationsStartSync - -This event indicates that a new sync is being generated for this object type. - -This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedeviceinventorychange). - -The following fields are available: - -- **InventoryVersion** The version of the inventory binary generating the events. - - -### Microsoft.Windows.Inventory.General.InventoryMiscellaneousOfficeVBAStartSync - -Diagnostic event to indicate a new sync is being generated for this object type. - -This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedeviceinventorychange). - -The following fields are available: - -- **InventoryVersion** The version of the inventory binary generating the events. - - -### Microsoft.Windows.Inventory.General.InventoryMiscellaneousUUPInfoAdd - -Provides data on Unified Update Platform (UUP) products and what version they are at. - -This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedeviceinventorychange). - -The following fields are available: - -- **Identifier** UUP identifier -- **LastActivatedVersion** Last activated version -- **PreviousVersion** Previous version -- **Source** UUP source -- **Version** UUP version - - -### Microsoft.Windows.Inventory.General.InventoryMiscellaneousUUPInfoRemove - -Indicates that this particular data object represented by the objectInstanceId is no longer present. - -This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedeviceinventorychange). - - - -### Microsoft.Windows.Inventory.General.InventoryMiscellaneousUUPInfoStartSync - -Diagnostic event to indicate a new sync is being generated for this object type. - -This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedeviceinventorychange). - - - -### Microsoft.Windows.Inventory.Indicators.Checksum - -This event summarizes the counts for the InventoryMiscellaneousUexIndicatorAdd events. - -The following fields are available: - -- **CensusId** A unique hardware identifier. -- **ChecksumDictionary** A count of each operating system indicator. -- **PCFP** Equivalent to the InventoryId field that is found in other core events. - - -### Microsoft.Windows.Inventory.Indicators.InventoryMiscellaneousUexIndicatorAdd - -These events represent the basic metadata about the OS indicators installed on the system which are used for keeping the device up to date. - -This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedeviceinventorychange). - -The following fields are available: - -- **IndicatorValue** The indicator value. -- **Value** Describes an operating system indicator that may be relevant for the device upgrade. - - -### Microsoft.Windows.Inventory.Indicators.InventoryMiscellaneousUexIndicatorRemove - -This event is a counterpart to InventoryMiscellaneousUexIndicatorAdd that indicates that the item has been removed. - -This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedeviceinventorychange). - - - -### Microsoft.Windows.Inventory.Indicators.InventoryMiscellaneousUexIndicatorStartSync - -This event indicates that a new set of InventoryMiscellaneousUexIndicatorAdd events will be sent. - -This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedeviceinventorychange). - - - -## Kernel events - -### IO - -This event indicates the number of bytes read from or read by the OS and written to or written by the OS upon system startup. - -The following fields are available: - -- **BytesRead** The total number of bytes read from or read by the OS upon system startup. -- **BytesWritten** The total number of bytes written to or written by the OS upon system startup. - - -### Microsoft.Windows.Kernel.BootEnvironment.OsLaunch - -OS information collected during Boot, used to evaluate the success of the upgrade process. - -The following fields are available: - -- **BootApplicationId** This field tells us what the OS Loader Application Identifier is. -- **BootAttemptCount** The number of consecutive times the boot manager has attempted to boot into this operating system. -- **BootSequence** The current Boot ID, used to correlate events related to a particular boot session. -- **BootStatusPolicy** Identifies the applicable Boot Status Policy. -- **BootType** Identifies the type of boot (e.g.: "Cold", "Hiber", "Resume"). -- **EventTimestamp** Seconds elapsed since an arbitrary time point. This can be used to identify the time difference in successive boot attempts being made. -- **Firmw!reResetReasonEmbeddedControllerAdditional** No content is currently available. -- **FirmwareResetReasonEmbeddedController** Reason for system reset provided by firmware. -- **FirmwareResetReasonEmbeddedControllerAdditional** Additional information on system reset reason provided by firmware if needed. -- **FirmwareResetReasonPch** Reason for system reset provided by firmware. -- **FirmwareResetReasonPchAdditional** Additional information on system reset reason provided by firmware if needed. -- **FirmwareResetReasonSupplied** Flag indicating that a reason for system reset was provided by firmware. -- **IO** Amount of data written to and read from the disk by the OS Loader during boot. See [IO](#io). -- **LastBootSucceeded** Flag indicating whether the last boot was successful. -- **LastShutdownSucceeded** Flag indicating whether the last shutdown was successful. -- **MaxAbove4GbFreeRange** This field describes the largest memory range available above 4Gb. -- **MaxBelow4GbFreeRange** This field describes the largest memory range available below 4Gb. -- **MeasuredLaunchPrepared** This field tells us if the OS launch was initiated using Measured/Secure Boot over DRTM (Dynamic Root of Trust for Measurement). -- **MeasuredLaunchResume** This field tells us if Dynamic Root of Trust for Measurement (DRTM) was used when resuming from hibernation. -- **MenuPolicy** Type of advanced options menu that should be shown to the user (Legacy, Standard, etc.). -- **RecoveryEnabled** Indicates whether recovery is enabled. -- **SecureLaunchPrepared** This field indicates if DRTM was prepared during boot. -- **TcbLaunch** Indicates whether the Trusted Computing Base was used during the boot flow. -- **UserInputTime** The amount of time the loader application spent waiting for user input. - - -## Miracast events - -### Microsoft.Windows.Cast.Miracast.MiracastSessionEnd - -This event sends data at the end of a Miracast session that helps determine RTSP related Miracast failures along with some statistics about the session - -The following fields are available: - -- **AudioChannelCount** The number of audio channels. -- **AudioSampleRate** The sample rate of audio in terms of samples per second. -- **AudioSubtype** The unique subtype identifier of the audio codec (encoding method) used for audio encoding. -- **AverageBitrate** The average video bitrate used during the Miracast session, in bits per second. -- **AverageDataRate** The average available bandwidth reported by the WiFi driver during the Miracast session, in bits per second. -- **AveragePacketSendTimeInMs** The average time required for the network to send a sample, in milliseconds. -- **ConnectorType** The type of connector used during the Miracast session. -- **EncodeAverageTimeMS** The average time to encode a frame of video, in milliseconds. -- **EncodeCount** The count of total frames encoded in the session. -- **EncodeMaxTimeMS** The maximum time to encode a frame, in milliseconds. -- **EncodeMinTimeMS** The minimum time to encode a frame, in milliseconds. -- **EncoderCreationTimeInMs** The time required to create the video encoder, in milliseconds. -- **ErrorSource** Identifies the component that encountered an error that caused a disconnect, if applicable. -- **FirstFrameTime** The time (tick count) when the first frame is sent. -- **FirstLatencyMode** The first latency mode. -- **FrameAverageTimeMS** Average time to process an entire frame, in milliseconds. -- **FrameCount** The total number of frames processed. -- **FrameMaxTimeMS** The maximum time required to process an entire frame, in milliseconds. -- **FrameMinTimeMS** The minimum time required to process an entire frame, in milliseconds. -- **Glitches** The number of frames that failed to be delivered on time. -- **HardwareCursorEnabled** Indicates if hardware cursor was enabled when the connection ended. -- **HDCPState** The state of HDCP (High-bandwidth Digital Content Protection) when the connection ended. -- **HighestBitrate** The highest video bitrate used during the Miracast session, in bits per second. -- **HighestDataRate** The highest available bandwidth reported by the WiFi driver, in bits per second. -- **LastLatencyMode** The last reported latency mode. -- **LogTimeReference** The reference time, in tick counts. -- **LowestBitrate** The lowest video bitrate used during the Miracast session, in bits per second. -- **LowestDataRate** The lowest video bitrate used during the Miracast session, in bits per second. -- **MediaErrorCode** The error code reported by the media session, if applicable. -- **MiracastEntry** The time (tick count) when the Miracast driver was first loaded. -- **MiracastM1** The time (tick count) when the M1 request was sent. -- **MiracastM2** The time (tick count) when the M2 request was sent. -- **MiracastM3** The time (tick count) when the M3 request was sent. -- **MiracastM4** The time (tick count) when the M4 request was sent. -- **MiracastM5** The time (tick count) when the M5 request was sent. -- **MiracastM6** The time (tick count) when the M6 request was sent. -- **MiracastM7** The time (tick count) when the M7 request was sent. -- **MiracastSessionState** The state of the Miracast session when the connection ended. -- **MiracastStreaming** The time (tick count) when the Miracast session first started processing frames. -- **ProfileCount** The count of profiles generated from the receiver M4 response. -- **ProfileCountAfterFiltering** The count of profiles after filtering based on available bandwidth and encoder capabilities. -- **RefreshRate** The refresh rate set on the remote display. -- **RotationSupported** Indicates if the Miracast receiver supports display rotation. -- **RTSPSessionId** The unique identifier of the RTSP session. This matches the RTSP session ID for the receiver for the same session. -- **SessionGuid** The unique identifier of to correlate various Miracast events from a session. -- **SinkHadEdid** Indicates if the Miracast receiver reported an EDID. -- **SupportMicrosoftColorSpaceConversion** Indicates whether the Microsoft color space conversion for extra color fidelity is supported by the receiver. -- **SupportsMicrosoftDiagnostics** Indicates whether the Miracast receiver supports the Microsoft Diagnostics Miracast extension. -- **SupportsMicrosoftFormatChange** Indicates whether the Miracast receiver supports the Microsoft Format Change Miracast extension. -- **SupportsMicrosoftLatencyManagement** Indicates whether the Miracast receiver supports the Microsoft Latency Management Miracast extension. -- **SupportsMicrosoftRTCP** Indicates whether the Miracast receiver supports the Microsoft RTCP Miracast extension. -- **SupportsMicrosoftVideoFormats** Indicates whether the Miracast receiver supports Microsoft video format for 3:2 resolution. -- **SupportsWiDi** Indicates whether Miracast receiver supports Intel WiDi extensions. -- **TeardownErrorCode** The error code reason for teardown provided by the receiver, if applicable. -- **TeardownErrorReason** The text string reason for teardown provided by the receiver, if applicable. -- **UIBCEndState** Indicates whether UIBC was enabled when the connection ended. -- **UIBCEverEnabled** Indicates whether UIBC was ever enabled. -- **UIBCStatus** The result code reported by the UIBC setup process. -- **VideoBitrate** The starting bitrate for the video encoder. -- **VideoCodecLevel** The encoding level used for encoding, specific to the video subtype. -- **VideoHeight** The height of encoded video frames. -- **VideoSubtype** The unique subtype identifier of the video codec (encoding method) used for video encoding. -- **VideoWidth** The width of encoded video frames. -- **WFD2Supported** Indicates if the Miracast receiver supports WFD2 protocol. - - -## OneDrive events - -### Microsoft.OneDrive.Sync.Setup.APIOperation - -This event includes basic data about install and uninstall OneDrive API operations. - -The following fields are available: - -- **APIName** The name of the API. -- **Duration** How long the operation took. -- **IsSuccess** Was the operation successful? -- **ResultCode** The result code. -- **ScenarioName** The name of the scenario. - - -### Microsoft.OneDrive.Sync.Setup.EndExperience - -This event includes a success or failure summary of the installation. - -The following fields are available: - -- **APIName** The name of the API. -- **HResult** HResult of the operation -- **IsSuccess** Whether the operation is successful or not -- **ScenarioName** The name of the scenario. - - -### Microsoft.OneDrive.Sync.Setup.OSUpgradeInstallationOperation - -This event is related to the OS version when the OS is upgraded with OneDrive installed. - -The following fields are available: - -- **CurrentOneDriveVersion** The current version of OneDrive. -- **CurrentOSBuildBranch** The current branch of the operating system. -- **CurrentOSBuildNumber** The current build number of the operating system. -- **CurrentOSVersion** The current version of the operating system. -- **HResult** The HResult of the operation. -- **SourceOSBuildBranch** The source branch of the operating system. -- **SourceOSBuildNumber** The source build number of the operating system. -- **SourceOSVersion** The source version of the operating system. - - -### Microsoft.OneDrive.Sync.Setup.RegisterStandaloneUpdaterAPIOperation - -This event is related to registering or unregistering the OneDrive update task. - -The following fields are available: - -- **APIName** The name of the API. -- **IsSuccess** Was the operation successful? -- **RegisterNewTaskResult** The HResult of the RegisterNewTask operation. -- **ScenarioName** The name of the scenario. -- **UnregisterOldTaskResult** The HResult of the UnregisterOldTask operation. - - -### Microsoft.OneDrive.Sync.Updater.ComponentInstallState - -This event includes basic data about the installation state of dependent OneDrive components. - -The following fields are available: - -- **ComponentName** The name of the dependent component. -- **isInstalled** Is the dependent component installed? - - -### Microsoft.OneDrive.Sync.Updater.OverlayIconStatus - -This event indicates if the OneDrive overlay icon is working correctly. 0 = healthy; 1 = can be fixed; 2 = broken - -The following fields are available: - -- **32bit** The status of the OneDrive overlay icon on a 32-bit operating system. -- **64bit** The status of the OneDrive overlay icon on a 64-bit operating system. - - -### Microsoft.OneDrive.Sync.Updater.UpdateOverallResult - -This event sends information describing the result of the update. - -The following fields are available: - -- **hr** The HResult of the operation. -- **IsLoggingEnabled** Indicates whether logging is enabled for the updater. -- **UpdaterVersion** The version of the updater. - - -### Microsoft.OneDrive.Sync.Updater.UpdateXmlDownloadHResult - -This event determines the status when downloading the OneDrive update configuration file. - -The following fields are available: - -- **hr** The HResult of the operation. - - -### Microsoft.OneDrive.Sync.Updater.WebConnectionStatus - -This event determines the error code that was returned when verifying Internet connectivity. - -The following fields are available: - -- **winInetError** The HResult of the operation. - - -## Privacy consent logging events - -### Microsoft.Windows.Shell.PrivacyConsentLogging.PrivacyConsentCompleted - -This event is used to determine whether the user successfully completed the privacy consent experience. - -The following fields are available: - -- **presentationVersion** Which display version of the privacy consent experience the user completed -- **privacyConsentState** The current state of the privacy consent experience -- **settingsVersion** Which setting version of the privacy consent experience the user completed -- **userOobeExitReason** The exit reason of the privacy consent experience - - -### Microsoft.Windows.Shell.PrivacyConsentLogging.PrivacyConsentStatus - -Event tells us effectiveness of new privacy experience. - -The following fields are available: - -- **isAdmin** whether the person who is logging in is an admin -- **isExistingUser** whether the account existed in a downlevel OS -- **isLaunching** Whether or not the privacy consent experience will be launched -- **isSilentElevation** whether the user has most restrictive UAC controls -- **privacyConsentState** whether the user has completed privacy experience -- **userRegionCode** The current user's region setting - - -### wilActivity - -This event provides a Windows Internal Library context used for Product and Service diagnostics. - -The following fields are available: - -- **-149ngContextMessage** No content is currently available. -- **3645entContextName** No content is currently available. -- **379rentContextName** No content is currently available. -- **532rentContextName** No content is currently available. -- **677rentContextName** No content is currently available. -- **8108entContextName** No content is currently available. -- **8251entContextName** No content is currently available. -- **902rentContextName** No content is currently available. -- **9567ngContextMessage** No content is currently available. -- **9717ngContextMessage** No content is currently available. -- **callContext** The function where the failure occurred. -- **currentContextId** The ID of the current call context where the failure occurred. -- **currentContextMessage** The message of the current call context where the failure occurred. -- **currentContextMessaon** No content is currently available. -- **currentContextName** The name of the current call context where the failure occurred. -- **failureCount** The number of failures for this failure ID. -- **failureId** The ID of the failure that occurred. -- **failureType** The type of the failure that occurred. -- **fileName** The file name where the failure occurred. -- **functige** No content is currently available. -- **function** The function where the failure occurred. -- **hresult** The HResult of the overall activity. -- **lineNumber** The line number where the failure occurred. -- **message** The message of the failure that occurred. -- **module** The module where the failure occurred. -- **ori1-0467ngContextMessage** No content is currently available. -- **ori1-1210ngContextMessage** No content is currently available. -- **ori1143-7ngContextMessage** No content is currently available. -- **ori1-1945ngContextMessage** No content is currently available. -- **ori13s090ngContextMessage** No content is currently available. -- **ori1-4671entContextName** No content is currently available. -- **ori1-5108ngContextMessage** No content is currently available. -- **ori1-5686ngContextMessage** No content is currently available. -- **ori1n:667ngContextMessage** No content is currently available. -- **ori1n8488ngContextMessage** No content is currently available. -- **ori1-s4o5ngContextMessage** No content is currently available. -- **ori808467ngContextMessage** No content is currently available. -- **originatingContextId** The ID of the originating call context that resulted in the failure. -- **originatingContextMessage** The message of the originating call context that resulted in the failure. -- **originatingContextName** The name of the originating call context that resulted in the failure. -- **threa0Id** No content is currently available. -- **threadId** The ID of the thread on which the activity is executing. - - -## Sediment events - -### Microsoft.Windows.Sediment.Info.DetailedState - -This event is sent when detailed state information is needed from an update trial run. - -The following fields are available: - -- **Data** Data relevant to the state, such as what percent of disk space the directory takes up. -- **Id** Identifies the trial being run, such as a disk related trial. -- **ReleaseVer** The version of the component. -- **State** The state of the reporting data from the trial, such as the top-level directory analysis. -- **Time** The time the event was fired. - - -### Microsoft.Windows.Sediment.Info.Error - -This event indicates an error in the updater payload. This information assists in keeping Windows up to date. - -The following fields are available: - -- **FailureType** The type of error encountered. -- **FileName** The code file in which the error occurred. -- **HResult** The failure error code. -- **LineNumber** The line number in the code file at which the error occurred. -- **ReleaseVer** The version information for the component in which the error occurred. -- **Time** The system time at which the error occurred. - - -### Microsoft.Windows.Sediment.Info.PhaseChange - -The event indicates progress made by the updater. This information assists in keeping Windows up to date. - -The following fields are available: - -- **NewPhase** The phase of progress made. -- **ReleaseVer** The version information for the component in which the change occurred. -- **Time** The system time at which the phase chance occurred. - - -## Setup events - -### SetupPlatformTel.SetupPlatformTelActivityEvent - -This event sends basic metadata about the SetupPlatform update installation process, to help keep Windows up to date. - -The following fields are available: - -- **FieldName** Retrieves the event name/data point. Examples: InstallStartTime, InstallEndtime, OverallResult etc. -- **GroupName** Retrieves the groupname the event belongs to. Example: Install Information, DU Information, Disk Space Information etc. -- **Value** Value associated with the corresponding event name. For example, time-related events will include the system time - - -### SetupPlatformTel.SetupPlatformTelActivityStarted - -This event sends basic metadata about the update installation process generated by SetupPlatform to help keep Windows up to date. - -The following fields are available: - -- **Name** The name of the dynamic update type. Example: GDR driver - - -### SetupPlatformTel.SetupPlatformTelActivityStopped - -This event sends basic metadata about the update installation process generated by SetupPlatform to help keep Windows up to date. - - - -### SetupPlatformTel.SetupPlatformTelEvent - -This service retrieves events generated by SetupPlatform, the engine that drives the various deployment scenarios. - -The following fields are available: - -- **Falue** No content is currently available. -- **FieldName** Retrieves the event name/data point. Examples: InstallStartTime, InstallEndtime, OverallResult etc. -- **GroupName** Retrieves the groupname the event belongs to. Example: Install Information, DU Information, Disk Space Information etc. -- **Value** Retrieves the value associated with the corresponding event name (Field Name). For example: For time related events this will include the system time. - - -## Software update events - -### SoftwareUpdateClientTelemetry.CheckForUpdates - -Scan process event on Windows Update client. See the EventScenario field for specifics (started/failed/succeeded). - -The following fields are available: - -- **AativityMatchingId** No content is currently available. -- **ActivityMatchingId** Contains a unique ID identifying a single CheckForUpdates session from initialization to completion. -- **ActivityMatcjingId** No content is currently available. -- **AllowCachedResul|s** No content is currently available. -- **AllowCachedResults** Indicates if the scan allowed using cached results. -- **AllowCachedRmsults** No content is currently available. -- **ApplicableUpdateInfo** Metadata for the updates which were detected as applicable -- **BiosFamily** The family of the BIOS (Basic Input Output System). -- **BiosName** The name of the device BIOS. -- **BiosReleaseDate** The release date of the device BIOS. -- **BiosSKUNumber** The sku number of the device BIOS. -- **BIOSVendor** The vendor of the BIOS. -- **BiosVersion** The version of the BIOS. -- **BranchReadinessLevel** The servicing branch configured on the device. -- **CachedEngineVersion** For self-initiated healing, the version of the SIH engine that is cached on the device. If the SIH engine does not exist, the value is null. -- **CallerApplicationName** The name provided by the caller who initiated API calls into the software distribution client. -- **CapabilityDetectoidGuid** The GUID for a hardware applicability detectoid that could not be evaluated. -- **CDNCountryCode** Two letter country abbreviation for the Content Distribution Network (CDN) location. -- **CDNId** The unique identifier of a specific device, used to identify how many devices are encountering success or a particular issue. -- **ClientVersion** The version number of the software distribution client. -- **CommonProps** A bitmask for future flags associated with the Windows Update client behavior. No data is currently reported in this field. Expected value for this field is 0. -- **Context** Gives context on where the error has occurred. Example: AutoEnable, GetSLSData, AddService, Misc, or Unknown -- **CurrentMobileOperator** The mobile operator the device is currently connected to. -- **DeferralPolicySources** Sources for any update deferral policies defined (GPO = 0x10, MDM = 0x100, Flight = 0x1000, UX = 0x10000). -- **DeferredUpdates** Update IDs which are currently being deferred until a later time -- **DeviceModel** What is the device model. -- **DriverError** The error code hit during a driver scan. This is 0 if no error was encountered. -- **DriverExclusionPolicy** Indicates if the policy for not including drivers with Windows Update is enabled. -- **DriverSyncPassPerformed** Were drivers scanned this time? -- **DriverSyncPasSPerformed** No content is currently available. -- **EventInstanceID** A globally unique identifier for event instance. -- **EventScenario** Indicates the purpose of sending this event - whether because the software distribution just started checking for content, or whether it was cancelled, succeeded, or failed. -- **ExtendedetadataICabUrl** No content is currently available. -- **ExtendedMetadataCabUrl** Hostname that is used to download an update. -- **ExtendedStatusCode** Secondary error code for certain scenarios where StatusCode wasn't specific enough. -- **FailedUpdateGuids** The GUIDs for the updates that failed to be evaluated during the scan. -- **FailedUpdatesCount** The number of updates that failed to be evaluated during the scan. -- **FeatureUpdateDeferral** The deferral period configured for feature OS updates on the device (in days). -- **FeatureUpdatePause** Indicates whether feature OS updates are paused on the device. -- **FeatureUpdatePausePerimd** No content is currently available. -- **FeatureUpdatePausePeriod** The pause duration configured for feature OS updates on the device (in days). -- **FlightBranch** The branch that a device is on if participating in flighting (pre-release builds). -- **FlightRing** The ring (speed of getting builds) that a device is on if participating in flighting (pre-release builds). -- **HomeMobileOperator** The mobile operator that the device was originally intended to work with. -- **IntentPFNs** Intended application-set metadata for atomic update scenarios. -- **IPVersion** Indicates whether the download took place over IPv4 or IPv6 -- **IsWUfBDualScanEnabled** Indicates if Windows Update for Business dual scan is enabled on the device. -- **IsWUfBEna`led** No content is currently available. -- **IsWUfBEnabled** Indicates if Windows Update for Business is enabled on the device. -- **IsWUfBFederatedScanDisabled** Indicates if Windows Update for Business federated scan is disabled on the device. -- **MetadataIntegrityMode** The mode of the update transport metadata integrity check. 0-Unknown, 1-Ignoe, 2-Audit, 3-Enforce -- **MSIError** The last error that was encountered during a scan for updates. -- **NetworkConneativityDetected** No content is currently available. -- **NetworkConnectivityDetected** Indicates the type of network connectivity that was detected. 0 - IPv4, 1 - IPv6 -- **NumberOfApplicableUpdates** The number of updates which were ultimately deemed applicable to the system after the detection process is complete -- **NumberOfApplicationsCategoryScanEvaluated** The number of categories (apps) for which an app update scan checked -- **NumberOfLoop** The number of round trips the scan required -- **NumberOfNewUpdatesFromServiceSync** The number of updates which were seen for the first time in this scan -- **NumberOfUpdatesEvaluated** The total number of updates which were evaluated as a part of the scan -- **NumFailedetadataISignatures** No content is currently available. -- **NumFailedMetadatabignatures** No content is currently available. -- **NumFailedMetadataSignatures** The number of metadata signatures checks which failed for new metadata synced down. -- **Online** Indicates if this was an online scan. -- **PausedUpdates** A list of UpdateIds which that currently being paused. -- **PauseFeatureUpdatesEndTime** If feature OS updates are paused on the device, this is the date and time for the end of the pause time window. -- **PauseFeatureUpdatesStartTime** If feature OS updates are paused on the device, this is the date and time for the beginning of the pause time window. -- **PauseQualityUpdatesEndTime** If quality OS updates are paused on the device, this is the date and time for the end of the pause time window. -- **PauseQualityUpdatesStartTime** If quality OS updates are paused on the device, this is the date and time for the beginning of the pause time window. -- **PhonePreviewEnabled** Indicates whether a phone was getting preview build, prior to flighting (pre-release builds) being introduced. -- **ProcessName** The process name of the caller who initiated API calls, in the event where CallerApplicationName was not provided. -- **QualityUpdateDeferral** The deferral period configured for quality OS updates on the device (in days). -- **QualityUpdatePause** Indicates whether quality OS updates are paused on the device. -- **QualityUpdatePausePeriod** The pause duration configured for quality OS updates on the device (in days). -- **RelatedCV** The previous Correlation Vector that was used before swapping with a new one -- **ScanDurationInSeconds** The number of seconds a scan took -- **ScanEnqueueTime** The number of seconds it took to initialize a scan -- **ScanProps** This is a 32-bit integer containing Boolean properties for a given Windows Update scan. The following bits are used; all remaining bits are reserved and set to zero. Bit 0 (0x1): IsInteractive - is set to 1 if the scan is requested by a user, or 0 if the scan is requested by Automatic Updates. Bit 1 (0x2): IsSeeker - is set to 1 if the Windows Update client's Seeker functionality is enabled. Seeker functionality is enabled on certain interactive scans, and results in the scans returning certain updates that are in the initial stages of release (not yet released for full adoption via Automatic Updates). -- **ServiaeUrl** No content is currently available. -- **ServiceGuid** An ID which represents which service the software distribution client is checking for content (Windows Update, Microsoft Store, etc.). -- **ServiceUrl** The environment URL a device is configured to scan with -- **ShippingMobileOperator** The mobile operator that a device shipped on. -- **StatusCode** Indicates the result of a CheckForUpdates event (success, cancellation, failure code HResult). -- **SyncType** Describes the type of scan the event was -- **SystemBIOSMajorRelease** Major version of the BIOS. -- **SystemBIOSMinorRelease** Minor version of the BIOS. -- **TargetMetadataVersion** For self-initiated healing, this is the target version of the SIH engine to download (if needed). If not, the value is null. -- **TotalNumetadataISignatures** No content is currently available. -- **TotalNumMetadatabignatures** No content is currently available. -- **TotalNumMetadataSignatures** The total number of metadata signatures checks done for new metadata that was synced down. -- **WebServiceRetryMethods** Web service method requests that needed to be retried to complete operation. -- **WUDeviceID** The unique identifier of a specific device, used to identify how many devices are encountering success or a particular issue. - - -### SoftwareUpdateClientTelemetry.Commit - -This event tracks the commit process post the update installation when software update client is trying to update the device. - -The following fields are available: - -- **BiosFamily** Device family as defined in the system BIOS -- **BiosName** Name of the system BIOS -- **BiosReleaseDate** Release date of the system BIOS -- **BiosSKUNumber** Device SKU as defined in the system BIOS -- **BIOSVendor** Vendor of the system BIOS -- **BiosVersion** Version of the system BIOS -- **BundleId** Identifier associated with the specific content bundle; should not be all zeros if the bundleID was found. -- **BundleRevisionNumber** Identifies the revision number of the content bundle -- **CallerApplicationName** Name provided by the caller who initiated API calls into the software distribution client -- **ClientVersion** Version number of the software distribution client -- **DeploymentProviderMode** The mode of operation of the update deployment provider. -- **DeviceModel** Device model as defined in the system bios -- **EventInstanceID** A globally unique identifier for event instance -- **EventScenario** Indicates the purpose of the event - whether because scan started, succeded, failed, etc. -- **EventType** Possible values are "Child", "Bundle", "Relase" or "Driver". -- **FlightId** The specific id of the flight the device is getting -- **HandlerType** Indicates the kind of content (app, driver, windows patch, etc.) -- **RevisionNumber** Identifies the revision number of this specific piece of content -- **ServiceGuid** A unique identifier for the service that the software distribution client is installing content for (Windows Update, Microsoft Store, etc). -- **SystemBIOSMajorRelease** Major release version of the system bios -- **SystemBIOSMinorRelease** Minor release version of the system bios -- **UpdateId** Identifier associated with the specific piece of content -- **WUDeviceID** Unique device id controlled by the software distribution client - - -### SoftwareUpdateClientTelemetry.Download - -Download process event for target update on Windows Update client. See the EventScenario field for specifics (started/failed/succeeded). - -The following fields are available: - -- **ActiveDownloadTime** How long the download took, in seconds, excluding time where the update wasn't actively being downloaded. -- **AppXBlockHashFailures** Indicates the number of blocks that failed hash validation during download of the app payload. -- **AppXBlocKHashFailures** No content is currently available. -- **AppXBlockHashValidationFailureCount** A count of the number of blocks that have failed validation after being downloaded. -- **AppXDownloadScope** Indicates the scope of the download for application content. -- **AppXScope** Indicates the scope of the app download. -- **BiosFamily** The family of the BIOS (Basic Input Output System). -- **BiosName** The name of the device BIOS. -- **BiosReleaseDate** The release date of the device BIOS. -- **BiosSKUNumber** The sku number of the device BIOS. -- **BIOSVendor** The vendor of the BIOS. -- **BiosVersion** The version of the BIOS. -- **BundleBytesDownloaded** Number of bytes downloaded for the specific content bundle. -- **BundleId** Identifier associated with the specific content bundle. -- **BundleRepeatFailCount** Indicates whether this particular update bundle has previously failed. -- **BundleRepeatFailFlag** Indicates whether this particular update bundle previously failed to download. -- **BundleRevisionNumber** Identifies the revision number of the content bundle. -- **BytesDownloaded** Number of bytes that were downloaded for an individual piece of content (not the entire bundle). -- **CachedEngineVersion** The version of the “Self-Initiated Healing” (SIH) engine that is cached on the device, if applicable. -- **CallerApplicationName** The name provided by the application that initiated API calls into the software distribution client. -- **CallerApplicavionName** No content is currently available. -- **CbsDownloadMethod** Indicates whether the download was a full- or a partial-file download. -- **CbsMethod** The method used for downloading the update content related to the Component Based Servicing (CBS) technology. -- **CDNCountryCode** Two letter country abbreviation for the Content Distribution Network (CDN) location. -- **CDNId** ID which defines which CDN the software distribution client downloaded the content from. -- **ClientVersion** The version number of the software distribution client. -- **CommonProps** A bitmask for future flags associated with the Windows Update client behavior. -- **ConnectTime** Indicates the cumulative amount of time (in seconds) it took to establish the connection for all updates in an update bundle. -- **CurrentMobileOperator** The mobile operator the device is currently connected to. -- **DeviceModel** The model of the device. -- **DownloadPriority** Indicates whether a download happened at background, normal, or foreground priority. -- **DownloadProps** Information about the download operation properties in the form of a bitmask. -- **DownloadType** Differentiates the download type of “Self-Initiated Healing” (SIH) downloads between Metadata and Payload downloads. -- **EventInstanceID** A globally unique identifier for event instance. -- **EventScenario** Indicates the purpose for sending this event: whether because the software distribution just started downloading content; or whether it was cancelled, succeeded, or failed. -- **EventType** Identifies the type of the event (Child, Bundle, or Driver). -- **ExtendedStatusCode** Secondary error code for certain scenarios where StatusCode wasn't specific enough. -- **FeatureUpdatePause** Indicates whether feature OS updates are paused on the device. -- **FlightBranch** The branch that a device is on if participating in flighting (pre-release builds). -- **FlightBuildNumber** If this download was for a flight (pre-release build), this indicates the build number of that flight. -- **FlightId** The specific ID of the flight (pre-release build) the device is getting. -- **FlightRing** The ring (speed of getting builds) that a device is on if participating in flighting (pre-release builds). -- **HandlerType** Indicates what kind of content is being downloaded (app, driver, windows patch, etc.). -- **HardwareId** If this download was for a driver targeted to a particular device model, this ID indicates the model of the device. -- **HomeMobileOperator** The mobile operator that the device was originally intended to work with. -- **HostName** The hostname URL the content is downloading from. -- **IPVersion** Indicates whether the download took place over IPv4 or IPv6. -- **IsDependentSet** Indicates whether a driver is a part of a larger System Hardware/Firmware Update -- **IsWUfBDualScanEnabled** Indicates if Windows Update for Business dual scan is enabled on the device. -- **IsWUfBEnabled** Indicates if Windows Update for Business is enabled on the device. -- **NetworkCost** A flag indicating the cost of the network (congested, fixed, variable, over data limit, roaming, etc.) used for downloading the update content. -- **NetworkCostBitMask** Indicates what kind of network the device is connected to (roaming, metered, over data cap, etc.) -- **NetworkRestrictionStatus** More general version of NetworkCostBitMask, specifying whether Windows considered the current network to be "metered." -- **PackageFullName** The package name of the content. -- **PhonePreviewEnabled** Indicates whether a phone was opted-in to getting preview builds, prior to flighting (pre-release builds) being introduced. -- **PostDnldTime** Time (in seconds) taken to signal download completion after the last job completed downloading the payload. -- **ProcessName** The process name of the application that initiated API calls, in the event where CallerApplicationName was not provided. -- **QualityUpdatePause** Indicates whether quality OS updates are paused on the device. -- **Reason** A 32-bit integer representing the reason the update is blocked from being downloaded in the background. -- **RegulationReason** The reason that the update is regulated -- **RegulationResult** The result code (HResult) of the last attempt to contact the regulation web service for download regulation of update content. -- **RegulitionResult** No content is currently available. -- **RelatedCV** The Correlation Vector that was used before the most recent change to a new Correlation Vector. -- **RepeatFailCount** Indicates whether this specific content has previously failed. -- **RepeatFailFlag** Indicates whether this specific content previously failed to download. -- **RevisionNumber** The revision number of the specified piece of content. -- **ServiceGuid** A unique identifier for the service that the software distribution client is installing content for (Windows Update, Microsoft Store, etc). -- **Setup360Phase** Identifies the active phase of the upgrade download if the current download is for an Operating System upgrade. -- **ShippingMobileOperator** The mobile operator linked to the device when the device shipped. -- **SizeCalcTime** Time (in seconds) taken to calculate the total download size of the payload. -- **SonnectTime** No content is currently available. -- **StatusCode** Indicates the result of a Download event (success, cancellation, failure code HResult). -- **SystemBIOSMajorRelease** Major version of the BIOS. -- **SystemBIOSMinorRelease** Minor version of the BIOS. -- **TargetGroupId** For drivers targeted to a specific device model, this ID indicates the distribution group of devices receiving that driver. -- **TargetingVersion** For drivers targeted to a specific device model, this is the version number of the drivers being distributed to the device. -- **TargetMetadataVersion** The version of the currently downloading (or most recently downloaded) package. -- **ThrottlingServiceHResult** Result code (success/failure) while contacting a web service to determine whether this device should download content yet. -- **TimeToEstablishConnection** Time (in milliseconds) it took to establish the connection prior to beginning downloaded. -- **TotalExpectedBytes** The total size (in Bytes) expected to be downloaded. -- **UpdateId** An identifier associated with the specific piece of content. -- **UpdateID** An identifier associated with the specific piece of content. -- **UpdateImportance** Indicates whether the content was marked as Important, Recommended, or Optional. -- **UsedDO** Indicates whether the download used the Delivery Optimization (DO) service. -- **UsedSystemVolume** Indicates whether the content was downloaded to the device's main system storage drive, or an alternate storage drive. -- **WUDeviceID** The unique identifier of a specific device, used to identify how many devices are encountering success or a particular issue. - - -### SoftwareUpdateClientTelemetry.DownloadCheckpoint - -This event provides a checkpoint between each of the Windows Update download phases for UUP content - -The following fields are available: - -- **CallerApplicationName** The name provided by the caller who initiated API calls into the software distribution client -- **ClientVersion** The version number of the software distribution client -- **EventScenario** Indicates the purpose of sending this event - whether because the software distribution just started checking for content, or whether it was cancelled, succeeded, or failed -- **EventType** Possible values are "Child", "Bundle", "Relase" or "Driver" -- **ExtendedStatusCode** Secondary error code for certain scenarios where StatusCode wasn't specific enough -- **FileId** A hash that uniquely identifies a file -- **FileName** Name of the downloaded file -- **FlightId** The unique identifier for each flight -- **RelatedCV** The previous Correlation Vector that was used before swapping with a new one -- **RevisionNumber** Unique revision number of Update -- **ServiceGuid** An ID which represents which service the software distribution client is checking for content (Windows Update, Microsoft Store, etc.) -- **StatusCode** Indicates the result of a CheckForUpdates event (success, cancellation, failure code HResult) -- **UpdateId** Unique Update ID -- **WUDeviceID** The unique identifier of a specific device, used to identify how many devices are encountering success or a particular issue - - -### SoftwareUpdateClientTelemetry.DownloadHeartbeat - -This event allows tracking of ongoing downloads and contains data to explain the current state of the download - -The following fields are available: - -- **BytesTotal** Total bytes to transfer for this content -- **BytesTransferred** Total bytes transferred for this content at the time of heartbeat -- **CallerApplicationName** Name provided by the caller who initiated API calls into the software distribution client -- **ClientVersion** The version number of the software distribution client -- **ConnectionStatus** Indicates the connectivity state of the device at the time of heartbeat -- **CurrentError** Last (transient) error encountered by the active download -- **DownloadFlags** Flags indicating if power state is ignored -- **DownloadState** Current state of the active download for this content (queued, suspended, or progressing) -- **EventType** Possible values are "Child", "Bundle", or "Driver" -- **FlightId** The unique identifier for each flight -- **IsNetworkMetered** Indicates whether Windows considered the current network to be ?metered" -- **MOAppDownloadLimit** Mobile operator cap on size of application downloads, if any -- **MOUpdateDownloadLimit** Mobile operator cap on size of operating system update downloads, if any -- **PowerState** Indicates the power state of the device at the time of heartbeart (DC, AC, Battery Saver, or Connected Standby) -- **RelatedCV** The previous correlation vector that was used by the client, before swapping with a new one -- **ResumeCount** Number of times this active download has resumed from a suspended state -- **RevisionNumber** Identifies the revision number of this specific piece of content -- **ServiceGuid** Identifier for the service to which the software distribution client is connecting (Windows Update, Microsoft Store, etc) -- **SuspendCount** Number of times this active download has entered a suspended state -- **SuspendReason** Last reason for why this active download entered a suspended state -- **UpdateId** Identifier associated with the specific piece of content -- **WUDeviceID** Unique device id controlled by the software distribution client - - -### SoftwareUpdateClientTelemetry.Install - -This event sends tracking data about the software distribution client installation of the content for that update, to help keep Windows up to date. - -The following fields are available: - -- **BiosFamily** The family of the BIOS (Basic Input Output System). -- **BiosName** The name of the device BIOS. -- **BiosReleaseDate** The release date of the device BIOS. -- **BiosSKUNumber** The sku number of the device BIOS. -- **BIOSVendor** The vendor of the BIOS. -- **BiosVersion** The version of the BIOS. -- **BundleId** Identifier associated with the specific content bundle; should not be all zeros if the bundleID was found. -- **BundleRepeatFailCount** Indicates whether this particular update bundle has previously failed. -- **BundleRepeatFailFlag** Indicates whether this particular update bundle previously failed to install. -- **BundleRevisionNumber** Identifies the revision number of the content bundle. -- **CachedEngineVersion** For self-initiated healing, the version of the SIH engine that is cached on the device. If the SIH engine does not exist, the value is null. -- **CallerApplicationName** The name provided by the caller who initiated API calls into the software distribution client. -- **ClientVersion** The version number of the software distribution client. -- **CommonProps** A bitmask for future flags associated with the Windows Update client behavior. No value is currently reported in this field. Expected value for this field is 0. -- **CSIErrorType** The stage of CBS installation where it failed. -- **CurrentMobileOperator** The mobile operator to which the device is currently connected. -- **DeploymentProviderMode** The mode of operation of the update deployment provider. -- **DeviceModel** The device model. -- **DriverPifgBack** No content is currently available. -- **DriverPingBack** Contains information about the previous driver and system state. -- **DriverRecoveryIds** The list of identifiers that could be used for uninstalling the drivers if a recovery is required. -- **EventInstanceID** A globally unique identifier for event instance. -- **EventScenario** Indicates the purpose of sending this event - whether because the software distribution just started installing content, or whether it was cancelled, succeeded, or failed. -- **EventType** Possible values are Child, Bundle, or Driver. -- **ExtendedErrorCode** The extended error code. -- **ExtendedStatusCode** Secondary error code for certain scenarios where StatusCode is not specific enough. -- **FeatureUpdatePause** Indicates whether feature OS updates are paused on the device. -- **FlightBranch** The branch that a device is on if participating in the Windows Insider Program. -- **FlightBuildNumber** If this installation was for a Windows Insider build, this is the build number of that build. -- **FlightId** The specific ID of the Windows Insider build the device is getting. -- **FlightRing** The ring that a device is on if participating in the Windows Insider Program. -- **HandlerType** Indicates what kind of content is being installed (for example, app, driver, Windows update). -- **HardwareId** If this install was for a driver targeted to a particular device model, this ID indicates the model of the device. -- **HomeMobileOperator** The mobile operator that the device was originally intended to work with. -- **InstallProps** A bitmask for future flags associated with the install operation. No value is currently reported in this field. Expected value for this field is 0. -- **IntentPFNs** Intended application-set metadata for atomic update scenarios. -- **IsDependentSet** Indicates whether the driver is part of a larger System Hardware/Firmware update. -- **IsFinalOutcomeEvent** Indicates whether this event signals the end of the update/upgrade process. -- **IsFirmware** Indicates whether this update is a firmware update. -- **IsSuccessFailurePostReboot** Indicates whether the update succeeded and then failed after a restart. -- **IsWUfBDualScanEnabled** Indicates whether Windows Update for Business dual scan is enabled on the device. -- **IsWUfBEnabled** Indicates whether Windows Update for Business is enabled on the device. -- **MergedUpdate** Indicates whether the OS update and a BSP update merged for installation. -- **MsiAction** The stage of MSI installation where it failed. -- **MsiProductCode** The unique identifier of the MSI installer. -- **PackageFullName** The package name of the content being installed. -- **PhonePreviewEnabled** Indicates whether a phone was getting preview build, prior to flighting being introduced. -- **ProcessName** The process name of the caller who initiated API calls, in the event that CallerApplicationName was not provided. -- **QualityUpdatePause** Indicates whether quality OS updates are paused on the device. -- **RelatedCV** The previous Correlation Vector that was used before swapping with a new one -- **RepeatFailCount** Indicates whether this specific piece of content has previously failed. -- **RepeatFailFlag** Indicates whether this specific piece of content previously failed to install. -- **RevisionNumber** The revision number of this specific piece of content. -- **ServiceGuid** An ID which represents which service the software distribution client is installing content for (Windows Update, Microsoft Store, etc.). -- **Setup360Phase** If the install is for an operating system upgrade, indicates which phase of the upgrade is underway. -- **ShippingMobileOperator** The mobile operator that a device shipped on. -- **StatusCode** Indicates the result of an installation event (success, cancellation, failure code HResult). -- **SystemBIOSMajorRelease** Major version of the BIOS. -- **SystemBIOSMinorRelease** Minor version of the BIOS. -- **TargetGroupId** For drivers targeted to a specific device model, this ID indicates the distribution group of devices receiving that driver. -- **TargetingVersion** For drivers targeted to a specific device model, this is the version number of the drivers being distributed to the device. -- **TransactionCode** The ID that represents a given MSI installation. -- **UpdateId** Unique update ID. -- **UpdateID** An identifier associated with the specific piece of content. -- **UpdateImportance** Indicates whether a piece of content was marked as Important, Recommended, or Optional. -- **UsedSystemVolume** Indicates whether the content was downloaded and then installed from the device's main system storage drive, or an alternate storage drive. -- **WUDeviceID** The unique identifier of a specific device, used to identify how many devices are encountering success or a particular issue. - - -### SoftwareUpdateClientTelemetry.Revert - -Revert event for target update on Windows Update Client. See EventScenario field for specifics (for example, Started/Failed/Succeeded). - -The following fields are available: - -- **BundleId** Identifier associated with the specific content bundle. Should not be all zeros if the BundleId was found. -- **BundleRepeatFailCount** Indicates whether this particular update bundle has previously failed. -- **BundleRevisionNumber** Identifies the revision number of the content bundle. -- **CallerApplicationName** Name of application making the Windows Update request. Used to identify context of request. -- **ClientVersion** Version number of the software distribution client. -- **CommonProps** A bitmask for future flags associated with the Windows Update client behavior. There is no value being reported in this field right now. Expected value for this field is 0. -- **CSIErrorType** Stage of CBS installation that failed. -- **DriverPingBack** Contains information about the previous driver and system state. -- **DriverRecoveryIds** The list of identifiers that could be used for uninstalling the drivers if a recovery is required. -- **EventInstanceID** A globally unique identifier for event instance. -- **EventScenario** Indicates the purpose of the event (scan started, succeeded, failed, etc.). -- **EventType** Event type (Child, Bundle, Release, or Driver). -- **ExtendedStatusCode** Secondary status code for certain scenarios where StatusCode is not specific enough. -- **FeatureUpdatePause** Indicates whether feature OS updates are paused on the device. -- **FlightBuildNumber** Indicates the build number of the flight. -- **FlightId** The specific ID of the flight the device is getting. -- **HandlerType** Indicates the kind of content (app, driver, windows patch, etc.). -- **HardwareId** If this download was for a driver targeted to a particular device model, this ID indicates the model of the device. -- **IsFinalOutcomeEvent** Indicates whether this event signals the end of the update/upgrade process. -- **IsFirmware** Indicates whether an update was a firmware update. -- **IsSuccessFailurePostReboot** Indicates whether an initial success was a failure after a reboot. -- **IsWUfBDualScanEnabled** Flag indicating whether WU-for-Business dual scan is enabled on the device. -- **IsWUfBEnabled** Flag indicating whether WU-for-Business is enabled on the device. -- **MergedUpdate** Indicates whether an OS update and a BSP update were merged for install. -- **ProcessName** Process name of the caller who initiated API calls into the software distribution client. -- **QualityUpdatePause** Indicates whether quality OS updates are paused on the device. -- **RelatedCV** The previous correlation vector that was used by the client before swapping with a new one. -- **RepeatFailCount** Indicates whether this specific piece of content has previously failed. -- **RevisionNumber** Identifies the revision number of this specific piece of content. -- **ServiceGuid** A unique identifier for the service that the software distribution client is installing content for (Windows Update, Microsoft Store, etc). -- **StatusCode** Result code of the event (success, cancellation, failure code HResult). -- **TargetGroupId** For drivers targeted to a specific device model, this ID indicates the distribution group of devices receiving that driver. -- **TargetingVersion** For drivers targeted to a specific device model, this is the version number of the drivers being distributed to the device. -- **UpdateId** The identifier associated with the specific piece of content. -- **UpdateImportance** Indicates the importance of a driver, and why it received that importance level (0-Unknown, 1-Optional, 2-Important-DNF, 3-Important-Generic, 4-Important-Other, 5-Recommended). -- **UsedSystemVolume** Indicates whether the device's main system storage drive or an alternate storage drive was used. -- **WUDeviceID** Unique device ID controlled by the software distribution client. - - -### SoftwareUpdateClientTelemetry.TaskRun - -Start event for Server Initiated Healing client. See EventScenario field for specifics (for example, started/completed). - -The following fields are available: - -- **CallerApplicationName** Name of application making the Windows Update request. Used to identify context of request. -- **ClientVersion** Version number of the software distribution client. -- **CmdLineArgs** Command line arguments passed in by the caller. -- **EventInstanceID** A globally unique identifier for the event instance. -- **EventScenario** Indicates the purpose of the event (scan started, succeeded, failed, etc.). -- **ServiceGuid** Identifier for the service to which the software distribution client is connecting (Windows Update, Microsoft Store, etc.). -- **StatusCode** Result code of the event (success, cancellation, failure code HResult). -- **WUDeviceID** Unique device ID controlled by the software distribution client. - - -### SoftwareUpdateClientTelemetry.Uninstall - -Uninstall event for target update on Windows Update Client. See EventScenario field for specifics (for example, Started/Failed/Succeeded). - -The following fields are available: - -- **BundleId** The identifier associated with the specific content bundle. This should not be all zeros if the bundleID was found. -- **BundleRepeatFailCount** Indicates whether this particular update bundle previously failed. -- **BundleRevisionNumber** Identifies the revision number of the content bundle. -- **CallerApplicationName** Name of the application making the Windows Update request. Used to identify context of request. -- **ClientVersion** Version number of the software distribution client. -- **CommonProps** A bitmask for future flags associated with the Windows Update client behavior. There is no value being reported in this field right now. Expected value for this field is 0. -- **DriverPingBack** Contains information about the previous driver and system state. -- **DriverRecoveryIds** The list of identifiers that could be used for uninstalling the drivers when a recovery is required. -- **EventInstanceID** A globally unique identifier for event instance. -- **EventScenario** Indicates the purpose of the event (a scan started, succeded, failed, etc.). -- **EventType** Indicates the event type. Possible values are "Child", "Bundle", "Release" or "Driver". -- **ExtendedStatusCode** Secondary status code for certain scenarios where StatusCode is not specific enough. -- **FeatureUpdatePause** Indicates whether feature OS updates are paused on the device. -- **FlightBuildNumber** Indicates the build number of the flight. -- **FlightId** The specific ID of the flight the device is getting. -- **HandlerType** Indicates the kind of content (app, driver, windows patch, etc.). -- **HardwareId** If the download was for a driver targeted to a particular device model, this ID indicates the model of the device. -- **IsFinalOutcomeEvent** Indicates whether this event signals the end of the update/upgrade process. -- **IsFirmware** Indicates whether an update was a firmware update. -- **IsSuccessFailurePostReboot** Indicates whether an initial success was then a failure after a reboot. -- **IsWUfBDualScanEnabled** Flag indicating whether WU-for-Business dual scan is enabled on the device. -- **IsWUfBEnabled** Flag indicating whether WU-for-Business is enabled on the device. -- **MergedUpdate** Indicates whether an OS update and a BSP update were merged for install. -- **ProcessName** Process name of the caller who initiated API calls into the software distribution client. -- **QualityUpdatePause** Indicates whether quality OS updates are paused on the device. -- **RelatedCV** The previous correlation vector that was used by the client before swapping with a new one. -- **RepeatFailCount** Indicates whether this specific piece of content previously failed. -- **RevisionNumber** Identifies the revision number of this specific piece of content. -- **ServiceGuid** A unique identifier for the service that the software distribution client is installing content for (Windows Update, Microsoft Store, etc). -- **StatusCode** Result code of the event (success, cancellation, failure code HResult). -- **TargetGroupId** For drivers targeted to a specific device model, this ID indicates the distribution group of devices receiving that driver. -- **TargetingVersion** For drivers targeted to a specific device model, this is the version number of the drivers being distributed to the device. -- **UpdateId** Identifier associated with the specific piece of content. -- **UpdateImportance** Indicates the importance of a driver and why it received that importance level (0-Unknown, 1-Optional, 2-Important-DNF, 3-Important-Generic, 4-Important-Other, 5-Recommended). -- **UsedSystemVolume** Indicates whether the device’s main system storage drive or an alternate storage drive was used. -- **WUDeviceID** Unique device ID controlled by the software distribution client. - - -### SoftwareUpdateClientTelemetry.UpdateDetected - -This event sends data about an AppX app that has been updated from the Microsoft Store, including what app needs an update and what version/architecture is required, in order to understand and address problems with apps getting required updates. - -The following fields are available: - -- **ApplicableUpdateInfo** Metadata for the updates which were detected as applicable. -- **CallerApplicationName** The name provided by the caller who initiated API calls into the software distribution client. -- **IntentPFNs** Intended application-set metadata for atomic update scenarios. -- **NumberOfApplicableUpdates** The number of updates ultimately deemed applicable to the system after the detection process is complete. -- **RelatedCV** The previous Correlation Vector that was used before swapping with a new one. -- **RelntedCV** No content is currently available. -- **ServiceGuid** An ID that represents which service the software distribution client is connecting to (Windows Update, Microsoft Store, etc.). -- **umberOfApplicableUpdates** No content is currently available. -- **WUDeviceID** The unique device ID controlled by the software distribution client. -- **xHDeviceID** No content is currently available. - - -### SoftwareUpdateClientTelemetry.UpdateMetadataIntegrity - -Ensures Windows Updates are secure and complete. Event helps to identify whether update content has been tampered with and protects against man-in-the-middle attack. - -The following fields are available: - -- **CallerApplicationName** Name of application making the Windows Update request. Used to identify context of request. -- **CallerLoglicationName** No content is currently available. -- **EndpointUrl** URL of the endpoint where client obtains update metadata. Used to identify test vs staging vs production environments. -- **EventSbenario** No content is currently available. -- **EventScenario** The purpose of this event, such as scan started, scan succeeded, or scan failed. -- **ExtendedStatusCode** The secondary status code of the event. -- **ExtendefStatusCode** No content is currently available. -- **imeZoScenario** No content is currently available. -- **LeafCertId** The integral ID from the FragmentSigning data for the certificate that failed. -- **ListOfSHA256OfIntermediateCerData** A semicolon delimited list of base64 encoding of hashes for the Base64CerData in the FragmentSigning data of an intermediate certificate. -- **MetadataIntegrityMode** The mode of the transport metadata integrity check. 0 = unknown; 1 = ignore; 2 = audit; 3 = enforce -- **MetadataSignature** A base64-encoded string of the signature associated with the update metadata (specified by revision ID). -- **RawMode** The raw unparsed mode string from the SLS response. This field is null if not applicable. -- **RawValidityWindowInDays** The raw unparsed validity window string in days of the timestamp token. This field is null if not applicable. -- **RcwMode** No content is currently available. -- **RevisionId** The revision ID for a specific piece of content. -- **RevisionNumber** The revision number for a specific piece of content. -- **SedviceGuid** No content is currently available. -- **ServiceGuid** Identifies the service to which the software distribution client is connected, Example: Windows Update or Microsoft Store -- **ServiceGuidEndpointUrl** No content is currently available. -- **SHA256OfLeafCerData** A base64 encoding of the hash for the Base64CerData in the FragmentSigning data of the leaf certificate. -- **SHA256OfLeafCertPublicKey** A base64 encoding of the hash of the Base64CertData in the FragmentSigning data of the leaf certificate. -- **SHA256OfTimestampToken** An encoded string of the timestamp token. -- **SignatureAlgorithm** The hash algorithm for the metadata signature. -- **SLSPrograms** A test program to which a device may have opted in. Example: Insider Fast -- **StatusCode** The status code of the event. -- **TimestampTokenCertThumbprint** The thumbprint of the encoded timestamp token. -- **TimestampTokenId** The time this was created. It is encoded in a timestamp blob and will be zero if the token is malformed. -- **UpdateId** The update ID for a specific piece of content. -- **ValidityWindowInDays** The validity window that's in effect when verifying the timestamp. - - -## System Resource Usage Monitor events - -### Microsoft.Windows.Srum.Sdp.CpuUsage - -This event provides information on CPU usage. - -The following fields are available: - -- **UsageMax** The maximum of hourly average CPU usage. -- **UsageMean** The mean of hourly average CPU usage. -- **UsageMedian** The median of hourly average CPU usage. -- **UsageTwoHourMaxMean** The mean of the maximum of every two hour of hourly average CPU usage. -- **UsageTwoHourMedianMean** The mean of the median of every two hour of hourly average CPU usage. - - -### Microsoft.Windows.Srum.Sdp.NetworkUsage - -This event provides information on network usage. - -The following fields are available: - -- **AdapterGuid** The unique ID of the adapter. -- **BytesTotalMax** The maximum of the hourly average bytes total. -- **BytesTotalMean** The mean of the hourly average bytes total. -- **BytesTotalMedian** The median of the hourly average bytes total. -- **BytesTotalTwoHourMaxMean** The mean of the maximum of every two hours of hourly average bytes total. -- **BytesTotalTwoHourMedianMean** The mean of the median of every two hour of hourly average bytes total. -- **LinkSpeed** The adapter link speed. - - -## Update events - -### Update360Telemetry.Revert - -This event sends data relating to the Revert phase of updating Windows. - -The following fields are available: - -- **ErrorCode** The error code returned for the Revert phase. -- **FlightId** Unique ID for the flight (test instance version). -- **ObjectId** The unique value for each Update Agent mode. -- **RebootRequired** Indicates reboot is required. -- **RelatedCV** The correlation vector value generated from the latest USO (Update Service Orchestrator) scan. -- **Result** The HResult of the event. -- **RevertResult** The result code returned for the Revert operation. -- **ScenarioId** The ID of the update scenario. -- **SessionId** The ID of the update attempt. -- **UpdateId** The ID of the update. - - -### Update360Telemetry.UpdateAgentCommit - -This event collects information regarding the commit phase of the new Unified Update Platform (UUP) update scenario, which is leveraged by both Mobile and Desktop. - -The following fields are available: - -- **ErrorCode** The error code returned for the current install phase. -- **FlightId** Unique ID for each flight. -- **ObjectId** Unique value for each Update Agent mode. -- **RelatedCV** Correlation vector value generated from the latest USO scan. -- **Result** Outcome of the install phase of the update. -- **ScenarioId** Indicates the update scenario. -- **SessionId** Unique value for each update attempt. -- **UpdateId** Unique ID for each update. - - -### Update360Telemetry.UpdateAgentDownloadRequest - -This event sends data for the download request phase of updating Windows via the new Unified Update Platform (UUP) scenario. Applicable to PC and Mobile. - -The following fields are available: - -- **DeletedCorruptFiles** Boolean indicating whether corrupt payload was deleted. -- **DownloadRequests** Number of times a download was retried. -- **ErrorCode** The error code returned for the current download request phase. -- **ExtensionName** Indicates whether the payload is related to Operating System content or a plugin. -- **FlightId** Unique ID for each flight. -- **InternalFailureResult** Indicates a non-fatal error from a plugin. -- **ObjectId** Unique value for each Update Agent mode (same concept as InstanceId for Setup360). -- **PackageCategoriesSkipped** Indicates package categories that were skipped, if applicable. -- **PackageCountOptional** Number of optional packages requested. -- **PackageCountRequired** Number of required packages requested. -- **PackageCountTotal** Total number of packages needed. -- **PackageCountTotalCanonical** Total number of canonical packages. -- **PackageCountTotalDiff** Total number of diff packages. -- **PackageCountTotalExpress** Total number of express packages. -- **PackageCountTotalPSFX** The total number of PSFX packages. -- **PackageExpressType** Type of express package. -- **PackageSizeCanonical** Size of canonical packages in bytes. -- **PackageSizeDiff** Size of diff packages in bytes. -- **PackageSizeExpress** Size of express packages in bytes. -- **PackageSizePSFX** The size of PSFX packages, in bytes. -- **RangeRequestState** Indicates the range request type used. -- **RelatedCV** Correlation vector value generated from the latest USO scan. -- **Result** Outcome of the download request phase of update. -- **SandboxTaggedForReserves** The sandbox for reserves. -- **ScenarioId** Indicates the update scenario. -- **SessionId** Unique value for each attempt (same value for initialize, download, install commit phases). -- **UpdateId** Unique ID for each update. - - -### Update360Telemetry.UpdateAgentExpand - -This event collects information regarding the expansion phase of the new Unified Update Platform (UUP) update scenario, which is leveraged by both Mobile and Desktop. - -The following fields are available: - -- **ElapsedTickCount** Time taken for expand phase. -- **EndFreeSpace** Free space after expand phase. -- **EndSandboxSize** Sandbox size after expand phase. -- **ErrorCode** The error code returned for the current install phase. -- **FlightId** Unique ID for each flight. -- **ObjectId** Unique value for each Update Agent mode. -- **RelatedCV** Correlation vector value generated from the latest USO scan. -- **ScenarioId** Indicates the update scenario. -- **SessionId** Unique value for each update attempt. -- **StartFreeSpace** Free space before expand phase. -- **StartSandboxSize** Sandbox size after expand phase. -- **UpdateId** Unique ID for each update. - - -### Update360Telemetry.UpdateAgentFellBackToCanonical - -This event collects information when express could not be used and we fall back to canonical during the new Unified Update Platform (UUP) update scenario, which is leveraged by both Mobile and Desktop. - -The following fields are available: - -- **FlightId** Unique ID for each flight. -- **ObjectId** Unique value for each Update Agent mode. -- **PackageCount** Number of packages that feel back to canonical. -- **PackageList** PackageIds which fell back to canonical. -- **RelatedCV** Correlation vector value generated from the latest USO scan. -- **ScenarioId** Indicates the update scenario. -- **SessionId** Unique value for each update attempt. -- **UpdateId** Unique ID for each update. - - -### Update360Telemetry.UpdateAgentInitialize - -This event sends data for the initialize phase of updating Windows via the new Unified Update Platform (UUP) scenario, which is applicable to both PCs and Mobile. - -The following fields are available: - -- **ErrorCode** The error code returned for the current install phase. -- **essionData** No content is currently available. -- **FlightId** Unique ID for each flight. -- **FlightMetadata** Contains the FlightId and the build being flighted. -- **ObjectId** Unique value for each Update Agent mode. -- **RelatedCV** Correlation vector value generated from the latest USO scan. -- **Result** Outcome of the install phase of the update. -- **ScenarioId** Indicates the update scenario. -- **SessionData** String containing instructions to update agent for processing FODs and DUICs (Null for other scenarios). -- **SessionId** Unique value for each update attempt. -- **UpdateId** Unique ID for each update. - - -### Update360Telemetry.UpdateAgentInstall - -This event sends data for the install phase of updating Windows. - -The following fields are available: - -- **ErrorCode** The error code returned for the current install phase. -- **ExtensionName** Indicates whether the payload is related to Operating System content or a plugin. -- **FlightId** Unique value for each Update Agent mode (same concept as InstanceId for Setup360). -- **InternalFailureResult** Indicates a non-fatal error from a plugin. -- **ObjectId** Correlation vector value generated from the latest USO scan. -- **RelatedCV** Correlation vector value generated from the latest USO scan. -- **Result** The result for the current install phase. -- **ScenarioId** Indicates the update scenario. -- **SessionId** Unique value for each update attempt. -- **UpdateId** Unique ID for each update. - - -### Update360Telemetry.UpdateAgentMerge - -The UpdateAgentMerge event sends data on the merge phase when updating Windows. - -The following fields are available: - -- **ErrorCode** The error code returned for the current merge phase. -- **FlightId** Unique ID for each flight. -- **MergeId** The unique ID to join two update sessions being merged. -- **ObjectId** Unique value for each Update Agent mode. -- **RelatedCV** Related correlation vector value. -- **Result** Outcome of the merge phase of the update. -- **ScenarioId** Indicates the update scenario. -- **SessionId** Unique value for each attempt. -- **UpdateId** Unique ID for each update. - - -### Update360Telemetry.UpdateAgentMitigationResult - -This event sends data indicating the result of each update agent mitigation. - -The following fields are available: - -- **Applicable** Indicates whether the mitigation is applicable for the current update. -- **CommandCount** The number of command operations in the mitigation entry. -- **CustomCount** The number of custom operations in the mitigation entry. -- **FileCount** The number of file operations in the mitigation entry. -- **FlightId** Unique identifier for each flight. -- **Index** The mitigation index of this particular mitigation. -- **MitigationScenario** The update scenario in which the mitigation was executed. -- **Name** The friendly name of the mitigation. -- **ObjectId** Unique value for each Update Agent mode. -- **OperationIndex** The mitigation operation index (in the event of a failure). -- **OperationName** The friendly name of the mitigation operation (in the event of failure). -- **RegistryCount** The number of registry operations in the mitigation entry. -- **RelatedCV** The correlation vector value generated from the latest USO scan. -- **Result** The HResult of this operation. -- **ScenarioId** The update agent scenario ID. -- **SessionId** Unique value for each update attempt. -- **TimeDiff** The amount of time spent performing the mitigation (in 100-nanosecond increments). -- **UpdateId** Unique ID for each Update. - - -### Update360Telemetry.UpdateAgentMitigationSummary - -This event sends a summary of all the update agent mitigations available for an this update. - -The following fields are available: - -- **Applicable** The count of mitigations that were applicable to the system and scenario. -- **Failed** The count of mitigations that failed. -- **FlightId** Unique identifier for each flight. -- **Friled** No content is currently available. -- **MitigationScenario** The update scenario in which the mitigations were attempted. -- **ObjectId** The unique value for each Update Agent mode. -- **RelatedCV** The correlation vector value generated from the latest USO scan. -- **Result** The HResult of this operation. -- **ScenarioId** The update agent scenario ID. -- **SessionId** Unique value for each update attempt. -- **TimeDiff** The amount of time spent performing all mitigations (in 100-nanosecond increments). -- **Total** Total number of mitigations that were available. -- **UpdateId** Unique ID for each update. - - -### Update360Telemetry.UpdateAgentModeStart - -This event sends data for the start of each mode during the process of updating Windows via the new Unified Update Platform (UUP) scenario. Applicable to both PCs and Mobile. - -The following fields are available: - -- **FlightId** Unique ID for each flight. -- **Mode** Indicates the mode that has started. -- **ObjectId** Unique value for each Update Agent mode. -- **RelatedCV** Correlation vector value generated from the latest USO scan. -- **ScenarioId** Indicates the update scenario. -- **SessionId** Unique value for each update attempt. -- **UpdateId** Unique ID for each update. -- **Version** Version of update - - -### Update360Telemetry.UpdateAgentOneSettings - -This event collects information regarding the post reboot phase of the new UUP (Unified Update Platform) update scenario; which is leveraged by both Mobile and Desktop. - -The following fields are available: - -- **Count** The count of applicable OneSettings for the device. -- **FlightId** Unique ID for the flight (test instance version). -- **Obj%ctId** No content is currently available. -- **ObjectId** The unique value for each Update Agent mode. -- **Parameters** The set of name value pair parameters sent to OneSettings to determine if there are any applicable OneSettings. -- **RelatedCV** The correlation vector value generated from the latest USO (Update Service Orchestrator) scan. -- **Result** The HResult of the event. -- **ScenarioId** The ID of the update scenario. -- **SessionId** The ID of the update attempt. -- **UpdateId** The ID of the update. -- **Values** The values sent back to the device, if applicable. - - -### Update360Telemetry.UpdateAgentPostRebootResult - -This event collects information for both Mobile and Desktop regarding the post reboot phase of the new Unified Update Platform (UUP) update scenario. - -The following fields are available: - -- **ErrorCode** The error code returned for the current post reboot phase. -- **FlightId** The specific ID of the Windows Insider build the device is getting. -- **ObjectId** Unique value for each Update Agent mode. -- **PostRebootResult** Indicates the Hresult. -- **RelatedCV** Correlation vector value generated from the latest USO scan. -- **ScenarioId** The scenario ID. Example: MobileUpdate, DesktopLanguagePack, DesktopFeatureOnDemand, or DesktopDriverUpdate. -- **SessionId** Unique value for each update attempt. -- **UpdateId** Unique ID for each update. - - -### Update360Telemetry.UpdateAgentReboot - -This event sends information indicating that a request has been sent to suspend an update. - -The following fields are available: - -- **ErrorCode** The error code returned for the current reboot. -- **FlightId** Unique ID for the flight (test instance version). -- **ObjectId** The unique value for each Update Agent mode. -- **RelatedCV** The correlation vector value generated from the latest USO (Update Service Orchestrator) scan. -- **Result** The HResult of the event. -- **ScenarioId** The ID of the update scenario. -- **SessionId** The ID of the update attempt. -- **UpdateId** The ID of the update. - - -### Update360Telemetry.UpdateAgentSetupBoxLaunch - -The UpdateAgent_SetupBoxLaunch event sends data for the launching of the setup box when updating Windows via the new Unified Update Platform (UUP) scenario. This event is only applicable to PCs. - -The following fields are available: - -- **ContainsExpressPackage** Indicates whether the download package is express. -- **FlightId** Unique ID for each flight. -- **FreeSpace** Free space on OS partition. -- **InstallCount** Number of install attempts using the same sandbox. -- **ObjectId** Unique value for each Update Agent mode. -- **Quiet** Indicates whether setup is running in quiet mode. -- **RelatedCV** Correlation vector value generated from the latest USO scan. -- **SandboxSize** Size of the sandbox. -- **ScenarioId** Indicates the update scenario. -- **SessionId** Unique value for each update attempt. -- **SetupMode** Mode of setup to be launched. -- **UpdateId** Unique ID for each Update. -- **UserSession** Indicates whether install was invoked by user actions. - - -## Update notification events - -### Microsoft.Windows.UpdateNotificationPipeline.UNPCampaignManagerHeartbeat - -This event is sent at the start of the CampaignManager event and is intended to be used as a heartbeat. - -The following fields are available: - -- **CampaignConfigVersion** Configuration version for the current campaign. -- **CampaignID** Currently campaign that is running on Update Notification Pipeline (UNP). -- **ConfigCatalogVersion** Current catalog version of UNP. -- **ContentVersion** Content version for the current campaign on UNP. -- **CV** Correlation vector. -- **DetectorVersion** Most recently run detector version for the current campaign on UNP. -- **GlobalEventCounter** Client-side counter that indicates the event ordering sent by the user. -- **PackageVersion** Current UNP package version. - - -## Upgrade events - -### FacilitatorTelemetry.DCATDownload - -This event indicates whether devices received additional or critical supplemental content during an OS Upgrade, to help keep Windows up-to-date and secure. - -The following fields are available: - -- **DownloadSize** Download size of payload. -- **ElapsedTime** Time taken to download payload. -- **MediaFallbackUsed** Used to determine if we used Media CompDBs to figure out package requirements for the upgrade. -- **ResultCode** Result returned by the Facilitator DCAT call. -- **Scenario** Dynamic update scenario (Image DU, or Setup DU). -- **Type** Type of package that was downloaded. -- **UpdateId** The ID of the update that was downloaded. - - -### FacilitatorTelemetry.DUDownload - -This event returns data about the download of supplemental packages critical to upgrading a device to the next version of Windows. - -The following fields are available: - -- **DownloadRequestAttributes** The attributes sent for download. -- **PackageCategoriesFailed** Lists the categories of packages that failed to download. -- **PackageCategoriesSkipped** Lists the categories of package downloads that were skipped. -- **ResultCode** The result of the event execution. -- **Scenario** Identifies the active Download scenario. -- **Url** The URL the download request was sent to. -- **Version** Identifies the version of Facilitator used. - - -### FacilitatorTelemetry.InitializeDU - -This event determines whether devices received additional or critical supplemental content during an OS upgrade. - -The following fields are available: - -- **DCATUrl** The Delivery Catalog (DCAT) URL we send the request to. -- **DownloadRequestAttributes** The attributes we send to DCAT. -- **ResultCode** The result returned from the initiation of Facilitator with the URL/attributes. -- **Scenario** Dynamic Update scenario (Image DU, or Setup DU). -- **Url** The Delivery Catalog (DCAT) URL we send the request to. -- **Version** Version of Facilitator. - - -### Setup360Telemetry.Downlevel - -This event sends data indicating that the device has started the downlevel phase of the upgrade, to help keep Windows up-to-date and secure. - -The following fields are available: - -- **ClientId** If using Windows Update, this will be the Windows Update client ID that is passed to Setup. In Media setup, the default value is Media360, but it can be overwritten by the caller to a unique value. -- **FlightData** Unique value that identifies the flight. -- **HostOSBuildNumber** The build number of the downlevel OS. -- **HostOsSkuName** The operating system edition which is running Setup360 instance (downlevel OS). -- **InstanceId** A unique GUID that identifies each instance of setuphost.exe. -- **ReportId** In the Windows Update scenario, this is the updateID that is passed to Setup. In media setup, this is the GUID for the install.wim. -- **Setup360Extended** More detailed information about phase/action when the potential failure occurred. -- **Setup360Mode** The phase of Setup360 (for example, Predownload, Install, Finalize, Rollback). -- **Setup360Result** The result of Setup360 (HRESULT used to diagnose errors). -- **Setup360Scenario** The Setup360 flow type (for example, Boot, Media, Update, MCT). -- **SetupVersionBuildNumber** The build number of Setup360 (build number of the target OS). -- **State** Exit state of given Setup360 run. Example: succeeded, failed, blocked, cancelled. -- **TestId** An ID that uniquely identifies a group of events. -- **WuId** This is the Windows Update Client ID. In the Windows Update scenario, this is the same as the clientId. - - -### Setup360Telemetry.Finalize - -This event sends data indicating that the device has started the phase of finalizing the upgrade, to help keep Windows up-to-date and secure. - -The following fields are available: - -- **ClientId** With Windows Update, this will be the Windows Update client ID that is passed to Setup. In Media setup, default value is Media360, but can be overwritten by the caller to a unique value. -- **FlightData** Unique value that identifies the flight. -- **HostOSBuildNumber** The build number of the previous OS. -- **HostOsSkuName** The OS edition which is running Setup360 instance (previous OS). -- **InstanceId** A unique GUID that identifies each instance of setuphost.exe -- **ReportId** With Windows Update, this is the updateID that is passed to Setup. In media setup, this is the GUID for the install.wim. -- **Setup360Extended** More detailed information about the phase/action when the potential failure occurred. -- **Setup360Mode** The phase of Setup360. Example: Predownload, Install, Finalize, Rollback. -- **Setup360Result** The result of Setup360. This is an HRESULT error code that is used to diagnose errors. -- **Setup360Scenario** The Setup360 flow type. Example: Boot, Media, Update, MCT. -- **SetupVersionBuildNumber** The build number of Setup360 (build number of target OS). -- **State** The exit state of a Setup360 run. Example: succeeded, failed, blocked, cancelled. -- **TestId** ID that uniquely identifies a group of events. -- **WuId** This is the Windows Update Client ID. With Windows Update, this is the same as the clientId. - - -### Setup360Telemetry.OsUninstall - -This event sends data regarding OS updates and upgrades from Windows 7, Windows 8, and Windows 10. Specifically, it indicates the outcome of an OS uninstall. - -The following fields are available: - -- **ClientId** For Windows Update, this will be the Windows Update client ID that is passed to Setup. In Media setup, default value is Media360, but can be overwritten by the caller to a unique value. -- **FlightData** Unique value that identifies the flight. -- **HostOSBuildNumber** The build number of the previous OS. -- **HostOsSkuName** The OS edition which is running the Setup360 instance (previous OS). -- **InstanceId** A unique GUID that identifies each instance of setuphost.exe. -- **ReportId** For Windows Update, this will be the Windows Update client ID that is passed to Setup. In Media setup, this is the GUID for the install.wim. -- **Setup360Extended** Detailed information about the phase or action when the potential failure occurred. -- **Setup360Mode** The phase of Setup360. Example: Predownload, Install, Finalize, Rollback. -- **Setup360Result** The result of Setup360. This is an HRESULT error code that is used to diagnose errors. -- **Setup360Scenario** The Setup360 flow type. Example: Boot, Media, Update, MCT -- **SetupVersionBuildNumber** The build number of Setup360 (build number of target OS). -- **State** Exit state of a Setup360 run. Example: succeeded, failed, blocked, cancelled. -- **TestId** ID that uniquely identifies a group of events. -- **WuId** Windows Update client ID. - - -### Setup360Telemetry.PostRebootInstall - -This event sends data indicating that the device has invoked the post reboot install phase of the upgrade, to help keep Windows up-to-date. - -The following fields are available: - -- **ClientId** With Windows Update, this is the Windows Update client ID that is passed to Setup. In Media setup, the default value is Media360, but can be overwritten by the caller to a unique value. -- **FlightData** Unique value that identifies the flight. -- **HostOSBuildNumber** The build number of the previous OS. -- **HostOsSkuName** The OS edition which is running Setup360 instance (previous OS). -- **InstanceId** A unique GUID that identifies each instance of setuphost.exe. -- **ReportId** With Windows Update, this is the updateID that is passed to Setup. In media setup, this is the GUID for the install.wim. -- **Setup360Extended** Extension of result - more granular information about phase/action when the potential failure happened -- **Setup360Mode** The phase of Setup360. Example: Predownload, Install, Finalize, Rollback -- **Setup360Result** The result of Setup360. This is an HRESULT error code that's used to diagnose errors. -- **Setup360Scenario** The Setup360 flow type. Example: Boot, Media, Update, MCT -- **SetupVersionBuildNumber** The build number of Setup360 (build number of target OS). -- **State** The exit state of a Setup360 run. Example: succeeded, failed, blocked, cancelled -- **TestId** A string to uniquely identify a group of events. -- **WuId** This is the Windows Update Client ID. With Windows Update, this is the same as ClientId. - - -### Setup360Telemetry.PreDownloadQuiet - -This event sends data indicating that the device has invoked the predownload quiet phase of the upgrade, to help keep Windows up to date. - -The following fields are available: - -- **ClientId** Using Windows Update, this will be the Windows Update client ID that is passed to Setup. In Media setup, default value is Media360, but can be overwritten by the caller to a unique value. -- **FlightData** Unique value that identifies the flight. -- **HostOSBuildNumber** The build number of the previous OS. -- **HostOsSkuName** The OS edition which is running Setup360 instance (previous operating system). -- **InstanceId** A unique GUID that identifies each instance of setuphost.exe. -- **ReportId** Using Windows Update, this is the updateID that is passed to Setup. In media setup, this is the GUID for the install.wim. -- **Setup360Extended** Detailed information about the phase/action when the potential failure occurred. -- **Setup360Mode** The phase of Setup360. Example: Predownload, Install, Finalize, Rollback. -- **Setup360Result** The result of Setup360. This is an HRESULT error code that is used to diagnose errors. -- **Setup360Scenario** The Setup360 flow type. Example: Boot, Media, Update, MCT. -- **SetupVersionBuildNumber** The build number of Setup360 (build number of target OS). -- **State** The exit state of a Setup360 run. Example: succeeded, failed, blocked, canceled. -- **TestId** ID that uniquely identifies a group of events. -- **WuId** This is the Windows Update Client ID. Using Windows Update, this is the same as the clientId. - - -### Setup360Telemetry.PreDownloadUX - -This event sends data regarding OS Updates and Upgrades from Windows 7.X, Windows 8.X, Windows 10 and RS, to help keep Windows up-to-date and secure. Specifically, it indicates the outcome of the PredownloadUX portion of the update process. - -The following fields are available: - -- **ClientId** For Windows Update, this will be the Windows Update client ID that is passed to Setup. In Media setup, default value is Media360, but can be overwritten by the caller to a unique value. -- **FlightData** In the WU scenario, this will be the WU client ID that is passed to Setup. In Media setup, default value is Media360, but can be overwritten by the caller to a unique value. -- **HostOSBuildNumber** The build number of the previous operating system. -- **HostOsSkuName** The OS edition which is running the Setup360 instance (previous operating system). -- **InstanceId** Unique GUID that identifies each instance of setuphost.exe. -- **ReportId** For Windows Update, this will be the Windows Update client ID that is passed to Setup. In Media setup, this is the GUID for the install.wim. -- **Setup360Extended** Detailed information about the phase/action when the potential failure occurred. -- **Setup360Mode** The phase of Setup360. Example: Predownload, Install, Finalize, Rollback. -- **Setup360Result** The result of Setup360. This is an HRESULT error code that can be used to diagnose errors. -- **Setup360Scenario** The Setup360 flow type. Example: Boot, Media, Update, MCT. -- **SetupVersionBuildNumber** The build number of Setup360 (build number of the target OS). -- **State** The exit state of the Setup360 run. Example: succeeded, failed, blocked, cancelled. -- **TestId** ID that uniquely identifies a group of events. -- **WuId** Windows Update client ID. - - -### Setup360Telemetry.PreInstallQuiet - -This event sends data indicating that the device has invoked the preinstall quiet phase of the upgrade, to help keep Windows up-to-date. - -The following fields are available: - -- **ClientId** With Windows Update, this will be the Windows Update client ID that is passed to Setup. In Media setup, default value is Media360, but can be overwritten by the caller to a unique value. -- **FlightData** Unique value that identifies the flight. -- **HostOSBuildNumber** The build number of the previous OS. -- **HostOsSkuName** The OS edition which is running Setup360 instance (previous OS). -- **InstanceId** A unique GUID that identifies each instance of setuphost.exe -- **ReportId** With Windows Update, this is the updateID that is passed to Setup. In media setup, this is the GUID for the install.wim. -- **Setup360Extended** Detailed information about the phase/action when the potential failure occurred. -- **Setup360Mode** The phase of Setup360. Example: Predownload, Install, Finalize, Rollback. -- **Setup360Result** The result of Setup360. This is an HRESULT error code that can be used to diagnose errors. -- **Setup360Scenario** Setup360 flow type (Boot, Media, Update, MCT). -- **SetupVersionBuildNumber** The build number of Setup360 (build number of target OS). -- **State** The exit state of a Setup360 run. Example: succeeded, failed, blocked, cancelled. -- **TestId** A string to uniquely identify a group of events. -- **WuId** This is the Windows Update Client ID. With Windows Update, this is the same as the clientId. - - -### Setup360Telemetry.PreInstallUX - -This event sends data regarding OS updates and upgrades from Windows 7, Windows 8, and Windows 10, to help keep Windows up-to-date. Specifically, it indicates the outcome of the PreinstallUX portion of the update process. - -The following fields are available: - -- **ClientId** For Windows Update, this will be the Windows Update client ID that is passed to Setup. In Media setup, default value is Media360, but can be overwritten by the caller to a unique value. -- **FlightData** Unique value that identifies the flight. -- **HostOSBuildNumber** The build number of the previous OS. -- **HostOsSkuName** The OS edition which is running the Setup360 instance (previous OS). -- **InstanceId** A unique GUID that identifies each instance of setuphost.exe. -- **ReportId** For Windows Update, this will be the Windows Update client ID that is passed to Setup. In Media setup, this is the GUID for the install.wim. -- **Setup360Extended** Detailed information about the phase/action when the potential failure occurred. -- **Setup360Mode** The phase of Setup360. Example: Predownload, Install, Finalize, Rollback. -- **Setup360Result** The result of Setup360. This is an HRESULT error code that is used to diagnose errors. -- **Setup360Scenario** The Setup360 flow type, Example: Boot, Media, Update, MCT. -- **SetupVersionBuildNumber** The build number of Setup360 (build number of target OS). -- **State** The exit state of a Setup360 run. Example: succeeded, failed, blocked, cancelled. -- **TestId** A string to uniquely identify a group of events. -- **WuId** Windows Update client ID. - - -### Setup360Telemetry.Setup360 - -This event sends data about OS deployment scenarios, to help keep Windows up-to-date. - -The following fields are available: - -- **ClientId** Retrieves the upgrade ID. In the Windows Update scenario, this will be the Windows Update client ID. In Media setup, default value is Media360, but can be overwritten by the caller to a unique value. -- **FieldName** Retrieves the data point. -- **FlightData** Specifies a unique identifier for each group of Windows Insider builds. -- **InstanãeId** No content is currently available. -- **InstanceId** Retrieves a unique identifier for each instance of a setup session. -- **ReportId** Retrieves the report ID. -- **ScenarioId** Retrieves the deployment scenario. -- **value** No content is currently available. -- **Value** Retrieves the value associated with the corresponding FieldName. - - -### Setup360Telemetry.Setup360DynamicUpdate - -This event helps determine whether the device received supplemental content during an operating system upgrade, to help keep Windows up-to-date. - -The following fields are available: - -- **FlightData** Specifies a unique identifier for each group of Windows Insider builds. -- **InstanceId** Retrieves a unique identifier for each instance of a setup session. -- **Operation** Facilitator’s last known operation (scan, download, etc.). -- **ReportId** ID for tying together events stream side. -- **ResultCode** Result returned for the entire setup operation. -- **Scenario** Dynamic Update scenario (Image DU, or Setup DU). -- **ScenarioId** Identifies the update scenario. -- **TargetBranch** Branch of the target OS. -- **TargetBuild** Build of the target OS. - - -### Setup360Telemetry.Setup360MitigationResult - -This event sends data indicating the result of each setup mitigation. - -The following fields are available: - -- **Applicable** TRUE if the mitigation is applicable for the current update. -- **ClientId** In the Windows Update scenario, this is the client ID passed to Setup. In Media setup, default value is Media360, but can be overwritten by the caller to a unique value. -- **CommandCount** The number of command operations in the mitigation entry. -- **CustomCount** The number of custom operations in the mitigation entry. -- **FileCount** The number of file operations in the mitigation entry. -- **FlightData** The unique identifier for each flight (test release). -- **Index** The mitigation index of this particular mitigation. -- **InstanceId** The GUID (Globally Unique ID) that identifies each instance of SetupHost.EXE. -- **MitigationScenario** The update scenario in which the mitigation was executed. -- **Name** The friendly (descriptive) name of the mitigation. -- **OperationIndex** The mitigation operation index (in the event of a failure). -- **OperationName** The friendly (descriptive) name of the mitigation operation (in the event of failure). -- **RegistryCount** The number of registry operations in the mitigation entry. -- **ReportId** In the Windows Update scenario, the Update ID that is passed to Setup. In media setup, this is the GUID for the INSTALL.WIM. -- **Result** HResult of this operation. -- **ScenarioId** Setup360 flow type. -- **TimeDiff** The amount of time spent performing the mitigation (in 100-nanosecond increments). - - -### Setup360Telemetry.Setup360MitigationSummary - -This event sends a summary of all the setup mitigations available for this update. - -The following fields are available: - -- **Applicable** The count of mitigations that were applicable to the system and scenario. -- **ClientId** The Windows Update client ID passed to Setup. -- **Failed** The count of mitigations that failed. -- **FlightData** The unique identifier for each flight (test release). -- **InstanceId** The GUID (Globally Unique ID) that identifies each instance of SetupHost.EXE. -- **MitigationScenario** The update scenario in which the mitigations were attempted. -- **ReportId** In the Windows Update scenario, the Update ID that is passed to Setup. In media setup, this is the GUID for the INSTALL.WIM. -- **Result** HResult of this operation. -- **ScenarioId** Setup360 flow type. -- **TimeDiff** The amount of time spent performing the mitigation (in 100-nanosecond increments). -- **Total** The total number of mitigations that were available. - - -### Setup360Telemetry.Setup360OneSettings - -This event collects information regarding the post reboot phase of the new UUP (Unified Update Platform) update scenario; which is leveraged by both Mobile and Desktop. - -The following fields are available: - -- **ClientId** The Windows Update client ID passed to Setup. -- **Count** The count of applicable OneSettings for the device. -- **FlightData** The ID for the flight (test instance version). -- **InstanceId** The GUID (Globally-Unique ID) that identifies each instance of setuphost.exe. -- **Parameters** The set of name value pair parameters sent to OneSettings to determine if there are any applicable OneSettings. -- **ReportId** The Update ID passed to Setup. -- **Result** The HResult of the event error. -- **ScenarioId** The update scenario ID. -- **Values** Values sent back to the device, if applicable. - - -### Setup360Telemetry.UnexpectedEvent - -This event sends data indicating that the device has invoked the unexpected event phase of the upgrade, to help keep Windows up to date. - -The following fields are available: - -- **ClientId** With Windows Update, this will be the Windows Update client ID that is passed to Setup. In Media setup, default value is Media360, but can be overwritten by the caller to a unique value. -- **FlightData** Unique value that identifies the flight. -- **HostOSBuildNumber** The build number of the previous OS. -- **HostOsSkuName** The OS edition which is running Setup360 instance (previous OS). -- **InstanceId** A unique GUID that identifies each instance of setuphost.exe -- **o-Ste** No content is currently available. -- **ReportId** With Windows Update, this is the updateID that is passed to Setup. In media setup, this is the GUID for the install.wim. -- **Setup360Extended** Detailed information about the phase/action when the potential failure occurred. -- **Setup360Mode** The phase of Setup360. Example: Predownload, Install, Finalize, Rollback. -- **Setup360Result** The result of Setup360. This is an HRESULT error code that can be used used to diagnose errors. -- **Setup360Scenario** The Setup360 flow type. Example: Boot, Media, Update, MCT. -- **SetupVersionBuildNumber** The build number of Setup360 (build number of target OS). -- **State** The exit state of a Setup360 run. Example: succeeded, failed, blocked, cancelled. -- **TestId** A string to uniquely identify a group of events. -- **WuId** This is the Windows Update Client ID. With Windows Update, this is the same as the clientId. - - -## Windows as a Service diagnostic events - -### Microsoft.Windows.WaaSMedic.SummaryEvent - -Result of the WaaSMedic operation. - -The following fields are available: - -- **callerApplication** The name of the calling application. -- **capsuleCount** The number of Sediment Pack capsules. -- **capsuleFailureCount** The number of capsule failures. -- **detectionSummary** Result of each applicable detection that was run. -- **featureAssessmentImpact** WaaS Assessment impact for feature updates. -- **hrEngineBlockReason** Indicates the reason for stopping WaaSMedic. -- **hrEngineResult** Error code from the engine operation. -- **hrLastSandboxError** The last error sent by the WaaSMedic sandbox. -- **initSummary** Summary data of the initialization method. -- **insufficientSessions** Device not eligible for diagnostics. -- **isInteractiveMode** The user started a run of WaaSMedic. -- **isManaged** Device is managed for updates. -- **isWUConnected** Device is connected to Windows Update. -- **noMoreActions** No more applicable diagnostics. -- **pluginFailureCount** The number of plugins that have failed. -- **pluginsCount** The number of plugins. -- **qualityAssessmentImpact** WaaS Assessment impact for quality updates. -- **remediationSummary** Result of each operation performed on a device to fix an invalid state or configuration that's preventing the device from getting updates. For example, if Windows Update service is turned off, the fix is to turn the it back on. -- **usingBackupFeatureAssessment** Relying on backup feature assessment. -- **usingBackupQualityAssessment** Relying on backup quality assessment. -- **usingCachedFeatureAssessment** WaaS Medic run did not get OS build age from the network on the previous run. -- **usingCachedQualityAssessment** WaaS Medic run did not get OS revision age from the network on the previous run. -- **versionString** Version of the WaaSMedic engine. -- **waasMedicRunMode** Indicates whether this was a background regular run of the medic or whether it was triggered by a user launching Windows Update Troubleshooter. - - -## Windows Error Reporting events - -### Microsoft.Windows.WERVertical.OSCrash - -This event sends binary data from the collected dump file wheneveer a bug check occurs, to help keep Windows up to date. The is the OneCore version of this event. - -The following fields are available: - -- **BootId** Uint32 identifying the boot number for this device. -- **BugCheckCode** Uint64 "bugcheck code" that identifies a proximate cause of the bug check. -- **BugCheckPar%meter2** No content is currently available. -- **BugCheckParameter1** Uint64 parameter providing additional information. -- **BugCheckParameter2** Uint64 parameter providing additional information. -- **BugCheckParameter3** Uint64 parameter providing additional information. -- **BugCheckParameter4** Uint64 parameter providing additional information. -- **DumpFileAttributes** Codes that identify the type of data contained in the dump file -- **DumpFileSize** Size of the dump file -- **IsValidDumpFile** True if the dump file is valid for the debugger, false otherwise -- **ReportId** WER Report Id associated with this bug check (used for finding the corresponding report archive in Watson). - - -## Windows Error Reporting MTT events - -### Microsoft.Windows.WER.MTT.Denominator - -This event provides a denominator to calculate MTTF (mean-time-to-failure) for crashes and other errors, to help keep Windows up to date. - -The following fields are available: - -- **DPRange** Maximum mean value range. -- **DPValue** Randomized bit value (0 or 1) that can be reconstituted over a large population to estimate the mean. -- **Value** Standard UTC emitted DP value structure See [Value](#value). - - -### Value - -This event returns data about Mean Time to Failure (MTTF) for Windows devices. It is the primary means of estimating reliability problems in Basic Diagnostic reporting with very strong privacy guarantees. Since Basic Diagnostic reporting does not include system up-time, and since that information is important to ensuring the safe and stable operation of Windows, the data provided by this event provides that data in a manner which does not threaten a user’s privacy. - -The following fields are available: - -- **Algorithm** The algorithm used to preserve privacy. -- **DPRange** The upper bound of the range being measured. -- **DPValue** The randomized response returned by the client. -- **Epsilon** The level of privacy to be applied. -- **HistType** The histogram type if the algorithm is a histogram algorithm. -- **PertProb** The probability the entry will be Perturbed if the algorithm chosen is “heavy-hitters”. - - -## Windows Store events - -### Microsoft.Windows.Store.StoreActivating - -This event sends tracking data about when the Store app activation via protocol URI is in progress, to help keep Windows up to date. - - - -### Microsoft.Windows.StoreAgent.Telemetry.AbortedInstallation - -This event is sent when an installation or update is canceled by a user or the system and is used to help keep Windows Apps up to date and secure. - -The following fields are available: - -- **AggregatedPackageFullNames** The names of all packages to be downloaded and installed. -- **AggregatedPackageFullNcmes** No content is currently available. -- **AttemptNumber** Number of retry attempts before it was canceled. -- **BundleId** The Item Bundle ID. -- **Bundlele** No content is currently available. -- **CategoryId** The Item Category ID. -- **Categoryle** No content is currently available. -- **ClientAppId** The identity of the app that initiated this operation. -- **ClientApple** No content is currently available. -- **HResult** The result code of the last action performed before this operation. -- **IsBundle** Is this a bundle? -- **IsInteractive** Was this requested by a user? -- **IsMandatory** Was this a mandatory update? -- **IsRemediation** Was this a remediation install? -- **IsRestore** Is this automatically restoring a previously acquired product? -- **IsUpdate** Flag indicating if this is an update. -- **ParentBundleId** The product ID of the parent (if this product is part of a bundle). -- **ParentBundlele** No content is currently available. -- **PFN** The product family name of the product being installed. -- **Producele** No content is currently available. -- **ProductId** The identity of the package or packages being installed. -- **S{stemAttemptNumber** No content is currently available. -- **SystemAttemptNumber** The total number of automatic attempts at installation before it was canceled. -- **UserAttemptNumber** The total number of user attempts at installation before it was canceled. -- **WUContentId** The Windows Update content ID. - - -### Microsoft.Windows.StoreAgent.Telemetry.BeginGetInstalledContentIds - -This event is sent when an inventory of the apps installed is started to determine whether updates for those apps are available. It's used to help keep Windows up-to-date and secure. - - - -### Microsoft.Windows.StoreAgent.Telemetry.BeginUpdateMetadataPrepare - -This event is sent when the Store Agent cache is refreshed with any available package updates. It's used to help keep Windows up-to-date and secure. - - - -### Microsoft.Windows.StoreAgent.Telemetry.CancelInstallation - -This event is sent when an app update or installation is canceled while in interactive mode. This can be canceled by the user or the system. It's used to help keep Windows up-to-date and secure. - -The following fields are available: - -- **AggregatedPackageFullNames** The names of all package or packages to be downloaded and installed. -- **AttemptNumber** Total number of installation attempts. -- **BundleId** The identity of the Windows Insider build that is associated with this product. -- **CategoryId** The identity of the package or packages being installed. -- **ClientAppId** The identity of the app that initiated this operation. -- **IsBundle** Is this a bundle? -- **IsInteractive** Was this requested by a user? -- **IsMandatory** Is this a mandatory update? -- **IsRemediation** Is this repairing a previous installation? -- **IsRestore** Is this an automatic restore of a previously acquired product? -- **IsUpdate** Is this a product update? -- **ParentBundleId** The product ID of the parent (if this product is part of a bundle). -- **PFN** The name of all packages to be downloaded and installed. -- **PreviousHResult** The previous HResult code. -- **PreviousInstallState** Previous installation state before it was canceled. -- **ProductId** The name of the package or packages requested for installation. -- **RelatedCV** Correlation Vector of a previous performed action on this product. -- **SystemAttemptNumber** Total number of automatic attempts to install before it was canceled. -- **UserAttemptNumber** Total number of user attempts to install before it was canceled. -- **WUContentId** The Windows Update content ID. - - -### Microsoft.Windows.StoreAgent.Telemetry.CompleteInstallOperationRequest - -This event is sent at the end of app installations or updates to help keep Windows up-to-date and secure. - -The following fields are available: - -- **CatalogId** The Store Product ID of the app being installed. -- **HResult** HResult code of the action being performed. -- **IsBundle** Is this a bundle? -- **PackageFamilyName** The name of the package being installed. -- **ProductId** The Store Product ID of the product being installed. -- **SkuId** Specific edition of the item being installed. - - -### Microsoft.Windows.StoreAgent.Telemetry.EndAcquireLicense - -This event is sent after the license is acquired when a product is being installed. It's used to help keep Windows up-to-date and secure. - -The following fields are available: - -- **AggregatedPackageFullNaies** No content is currently available. -- **AggregatedpackageFullNames** No content is currently available. -- **AggregatedPackageFullNames** Includes a set of package full names for each app that is part of an atomic set. -- **AttemptNumber** The total number of attempts to acquire this product. -- **CategoryId** The identity of the package or packages being installed. -- **ClientAppId** The identity of the app that initiated this operation. -- **HResult** HResult code to show the result of the operation (success/failure). -- **IsBundle** Is this a bundle? -- **IsInteractive** Did the user initiate the installation? -- **IsMandatory** Is this a mandatory update? -- **IsRemediation** Is this repairing a previous installation? -- **IsRestore** Is this happening after a device restore? -- **IsUp`ate** No content is currently available. -- **IsUpdate** Is this an update? -- **ParentBuneleId** No content is currently available. -- **PFN** Product Family Name of the product being installed. -- **Produc|Id** No content is currently available. -- **productId** No content is currently available. -- **ProductId** The Store Product ID for the product being installed. -- **SystemAttemptNueber** No content is currently available. -- **SystemAttemptNumber** The number of attempts by the system to acquire this product. -- **UserAttemptNumber** The number of attempts by the user to acquire this product -- **UserCttemptNumber** No content is currently available. -- **WUContentId** The Windows Update content ID. - - -### Microsoft.Windows.StoreAgent.Telemetry.EndDownload - -This event is sent after an app is downloaded to help keep Windows up-to-date and secure. - -The following fields are available: - -- **AggregatedPackageFullLames** No content is currently available. -- **AggregatedPackageFullNaðes** No content is currently available. -- **AggregatedPackageFullNames** The name of all packages to be downloaded and installed. -- **AttemptNumber** Number of retry attempts before it was canceled. -- **BundleId** The identity of the Windows Insider build associated with this product. -- **CategoryId** The identity of the package or packages being installed. -- **CategoryIf** No content is currently available. -- **ClientAppId** The identity of the app that initiated this operation. -- **DownloadSize** The total size of the download. -- **ExtendedHResult** Any extended HResult error codes. -- **HResult** The result code of the last action performed. -- **IsBundle** Is this a bundle? -- **IsInteractive** Is this initiated by the user? -- **IsMandatory** Is this a mandatory installation? -- **IsRemediation** Is this repairing a previous installation? -- **IsRestore** Is this a restore of a previously acquired product? -- **IsUpdate** Is this an update? -- **ParentBundleId** The parent bundle ID (if it's part of a bundle). -- **PFN** The Product Family Name of the app being download. -- **ProductId** The Store Product ID for the product being installed. -- **SystemAttemptNumber** The number of attempts by the system to download. -- **UserAttemptNum`er** No content is currently available. -- **UserAttemptNumber** The number of attempts by the user to download. -- **UserCttemptNumber** No content is currently available. -- **WUContentId** The Windows Update content ID. - - -### Microsoft.Windows.StoreAgent.Telemetry.EndFrameworkUpdate - -This event is sent when an app update requires an updated Framework package and the process starts to download it. It is used to help keep Windows up-to-date and secure. - -The following fields are available: - -- **HResult** The result code of the last action performed before this operation. - - -### Microsoft.Windows.StoreAgent.Telemetry.EndGetInstalledContentIds - -This event is sent after sending the inventory of the products installed to determine whether updates for those products are available. It's used to help keep Windows up-to-date and secure. - -The following fields are available: - -- **HResult** The result code of the last action performed before this operation. - - -### Microsoft.Windows.StoreAgent.Telemetry.EndInstall - -This event is sent after a product has been installed to help keep Windows up-to-date and secure. - -The following fields are available: - -- **__TlgCÖ__** No content is currently available. -- **AggregatedPackageFullNames** The names of all packages to be downloaded and installed. -- **AttemptNumber** The number of retry attempts before it was canceled. -- **BundleId** The identity of the build associated with this product. -- **CategoryId** The identity of the package or packages being installed. -- **ClientAppId** The identity of the app that initiated this operation. -- **ExtendedHResult** The extended HResult error code. -- **HResult** The result code of the last action performed. -- **IsBundle** Is this a bundle? -- **IsInteractive** Is this an interactive installation? -- **IsInteragtive** No content is currently available. -- **IsMandatory** Is this a mandatory installation? -- **IsRemediation** Is this repairing a previous installation? -- **IsRestore** Is this automatically restoring a previously acquired product? -- **IsUpdate** Is this an update? -- **ParentBundleId** The product ID of the parent (if this product is part of a bundle). -- **PFN** Product Family Name of the product being installed. -- **ProductId** The Store Product ID for the product being installed. -- **SystemAttemptNumber** The total number of system attempts. -- **UserAttemptNumber** The total number of user attempts. -- **WUContentId** The Windows Update content ID. - - -### Microsoft.Windows.StoreAgent.Telemetry.EndScanForUpdates - -This event is sent after a scan for product updates to determine if there are packages to install. It's used to help keep Windows up-to-date and secure. - -The following fields are available: - -- **ClientAppId** The identity of the app that initiated this operation. -- **HResult** The result code of the last action performed. -- **IsApplicability** Is this request to only check if there are any applicable packages to install? -- **IsInteractive** Is this user requested? -- **IsOnline** Is the request doing an online check? - - -### Microsoft.Windows.StoreAgent.Telemetry.EndSearchUpdatePackages - -This event is sent after searching for update packages to install. It is used to help keep Windows up-to-date and secure. - -The following fields are available: - -- **AggregatedPackageFullNames** The names of all packages to be downloaded and installed. -- **AttemptNumber** The total number of retry attempts before it was canceled. -- **BundleId** The identity of the build associated with this product. -- **CategoryId** The identity of the package or packages being installed. -- **ClientAppId** The identity of the app that initiated this operation. -- **HResult** The result code of the last action performed. -- **IsBundle** Is this a bundle? -- **IsInteractive** Is this user requested? -- **IsMandatory** Is this a mandatory update? -- **IsRemediation** Is this repairing a previous installation? -- **IsRestore** Is this restoring previously acquired content? -- **IsUpdate** Is this an update? -- **ParentBundleId** The product ID of the parent (if this product is part of a bundle). -- **PFN** The name of the package or packages requested for install. -- **ProductId** The Store Product ID for the product being installed. -- **SystemAttemptNumber** The total number of system attempts. -- **UserAttemptNumber** The total number of user attempts. -- **WUContentId** The Windows Update content ID. - - -### Microsoft.Windows.StoreAgent.Telemetry.EndStageUserData - -This event is sent after restoring user data (if any) that needs to be restored following a product install. It is used to keep Windows up-to-date and secure. - -The following fields are available: - -- **AggregatedPackageFullNames** The name of all packages to be downloaded and installed. -- **AttemptNumber** The total number of retry attempts before it was canceled. -- **BundleId** The identity of the build associated with this product. -- **CategoryId** The identity of the package or packages being installed. -- **ClientAppId** The identity of the app that initiated this operation. -- **HResult** The result code of the last action performed. -- **IsBundle** Is this a bundle? -- **IsInteractive** Is this user requested? -- **IsMandatory** Is this a mandatory update? -- **IsRemediation** Is this repairing a previous installation? -- **IsRestore** Is this restoring previously acquired content? -- **IsUpdate** Is this an update? -- **ParentBundleId** The product ID of the parent (if this product is part of a bundle). -- **PFN** The name of the package or packages requested for install. -- **ProductId** The Store Product ID for the product being installed. -- **SystemAttemptNumber** The total number of system attempts. -- **UserAttemptNumber** The total number of system attempts. -- **WUContentId** The Windows Update content ID. - - -### Microsoft.Windows.StoreAgent.Telemetry.EndUpdateMetadataPrepare - -This event is sent after a scan for available app updates to help keep Windows up-to-date and secure. - -The following fields are available: - -- **HResult** The result code of the last action performed. - - -### Microsoft.Windows.StoreAgent.Telemetry.FulfillmentComplete - -This event is sent at the end of an app install or update to help keep Windows up-to-date and secure. - -The following fields are available: - -- **CatalogId** The name of the product catalog from which this app was chosen. -- **CatanogId** No content is currently available. -- **CatdlogId** No content is currently available. -- **FailedRetry** Indicates whether the installation or update retry was successful. -- **HResult** The HResult code of the operation. -- **JResult** No content is currently available. -- **PFN** The Package Family Name of the app that is being installed or updated. -- **Producele** No content is currently available. -- **ProductId** The product ID of the app that is being updated or installed. - - -### Microsoft.Windows.StoreAgent.Telemetry.FulfillmentInitiate - -This event is sent at the beginning of an app install or update to help keep Windows up-to-date and secure. - -The following fields are available: - -- **CatalogId** The name of the product catalog from which this app was chosen. -- **FulfillmentPluginId** The ID of the plugin needed to install the package type of the product. -- **PFN** The Package Family Name of the app that is being installed or updated. -- **PluginTelemetryData** Diagnostic information specific to the package-type plug-in. -- **ProductId** The product ID of the app that is being updated or installed. - - -### Microsoft.Windows.StoreAgent.Telemetry.InstallOperationRequest - -This event is sent when a product install or update is initiated, to help keep Windows up-to-date and secure. - -The following fields are available: - -- **BundleId** The identity of the build associated with this product. -- **CatalogId** If this product is from a private catalog, the Store Product ID for the product being installed. -- **ProductId** The Store Product ID for the product being installed. -- **SkuId** Specific edition ID being installed. -- **VolumePath** The disk path of the installation. - - -### Microsoft.Windows.StoreAgent.Telemetry.PauseInstallation - -This event is sent when a product install or update is paused (either by a user or the system), to help keep Windows up-to-date and secure. - -The following fields are available: - -- **AggregatedPackageFullNames** The names of all packages to be downloaded and installed. -- **AttemptNumber** The total number of retry attempts before it was canceled. -- **BundleId** The identity of the build associated with this product. -- **CategoryId** The identity of the package or packages being installed. -- **ClientAppId** The identity of the app that initiated this operation. -- **IsBundle** Is this a bundle? -- **IsInteractive** Is this user requested? -- **IsMandatory** Is this a mandatory update? -- **IsRemediation** Is this repairing a previous installation? -- **IsRestore** Is this restoring previously acquired content? -- **IsUpdate** Is this an update? -- **ParentBundleId** The product ID of the parent (if this product is part of a bundle). -- **PFN** The Product Full Name. -- **PreviousHResult** The result code of the last action performed before this operation. -- **PreviousInstallState** Previous state before the installation or update was paused. -- **ProductId** The Store Product ID for the product being installed. -- **RelatedCV** Correlation Vector of a previous performed action on this product. -- **SystemAttemptNumber** The total number of system attempts. -- **UserAttemptNumber** The total number of user attempts. -- **WUContentId** The Windows Update content ID. - - -### Microsoft.Windows.StoreAgent.Telemetry.ResumeInstallation - -This event is sent when a product install or update is resumed (either by a user or the system), to help keep Windows up-to-date and secure. - -The following fields are available: - -- **AggregatedPackageFullNames** The names of all packages to be downloaded and installed. -- **AttemptNumber** The number of retry attempts before it was canceled. -- **BundleId** The identity of the build associated with this product. -- **categoryId** No content is currently available. -- **CategoryId** The identity of the package or packages being installed. -- **ClientAppId** The identity of the app that initiated this operation. -- **HResult** The result code of the last action performed before this operation. -- **IsBundle** Is this a bundle? -- **IsInteractive** Is this user requested? -- **IsMandatory** Is this a mandatory update? -- **IsRemediation** Is this repairing a previous installation? -- **IsRestore** Is this restoring previously acquired content? -- **IsUpdate** Is this an update? -- **IsUserRetry** Did the user initiate the retry? -- **ParentBundleId** The product ID of the parent (if this product is part of a bundle). -- **PFN** The name of the package or packages requested for install. -- **PreviousHResult** The previous HResult error code. -- **PreviousInstallState** Previous state before the installation was paused. -- **ProductId** The Store Product ID for the product being installed. -- **RelatedCV** Correlation Vector for the original install before it was resumed. -- **ResumeClientId** The ID of the app that initiated the resume operation. -- **SystemAttemptNumber** The total number of system attempts. -- **UserAttemptNumber** The total number of user attempts. -- **WUContentId** The Windows Update content ID. - - -### Microsoft.Windows.StoreAgent.Telemetry.ResumeOperationRequest - -This event is sent when a product install or update is resumed by a user or on installation retries, to help keep Windows up-to-date and secure. - -The following fields are available: - -- **ProductId** The Store Product ID for the product being installed. - - -### Microsoft.Windows.StoreAgent.Telemetry.SearchForUpdateOperationRequest - -This event is sent when searching for update packages to install, to help keep Windows up-to-date and secure. - -The following fields are available: - -- **CatalogId** The Store Catalog ID for the product being installed. -- **ProductId** The Store Product ID for the product being installed. -- **SkuId** Specfic edition of the app being updated. - - -### Microsoft.Windows.StoreAgent.Telemetry.UpdateAppOperationRequest - -This event occurs when an update is requested for an app, to help keep Windows up-to-date and secure. - -The following fields are available: - -- **PFamN** The name of the app that is requested for update. - - -## Windows System Kit events - -### Microsoft.Windows.Kits.WSK.WskImageCreate - -This event sends simple Product and Service usage data when a user is using the Windows System Kit to create new OS “images”. The data includes the version of the Windows System Kit and the state of the event and is used to help investigate “image” creation failures. - -The following fields are available: - -- **Phase** The image creation phase. Values are “Start” or “End”. -- **WskVersion** The version of the Windows System Kit being used. - - -### Microsoft.Windows.Kits.WSK.WskImageCustomization - -This event sends simple Product and Service usage data when a user is using the Windows System Kit to create/modify configuration files allowing the customization of a new OS image with Apps or Drivers. The data includes the version of the Windows System Kit, the state of the event, the customization type (drivers or apps) and the mode (new or updating) and is used to help investigate configuration file creation failures. - -The following fields are available: - -- **CustomizationMode** Indicates the mode of the customization (new or updating). -- **CustomizationType** Indicates the type of customization (drivers or apps). -- **Mode** The mode of update to image configuration files. Values are “New” or “Update”. -- **Phase** The image creation phase. Values are “Start” or “End”. -- **Type** The type of update to image configuration files. Values are “Apps” or “Drivers”. -- **WskVersion** The version of the Windows System Kit being used. - - -### Microsoft.Windows.Kits.WSK.WskWorkspaceCreate - -This event sends simple Product and Service usage data when a user is using the Windows System Kit to create new workspace for generating OS “images”. The data includes the version of the Windows System Kit and the state of the event and is used to help investigate workspace creation failures. - -The following fields are available: - -- **Architecture** The OS architecture that the workspace will target. Values are one of: “AMD64”, “ARM64”, “x86”, or “ARM”. -- **OsEdition** The Operating System Edition that the workspace will target. -- **Phase** The image creation phase. Values are “Start” or “End”. -- **WorkspaceArchitecture** The operating system architecture that the workspace will target. -- **WorkspaceOsEdition** The operating system edition that the workspace will target. -- **WskVersion** The version of the Windows System Kit being used. - - -## Windows Update Delivery Optimization events - -### Microsoft.OSG.DU.DeliveryOptClient.DownloadCanceled - -This event describes when a download was canceled with Delivery Optimization. It's used to understand and address problems regarding downloads. - -The following fields are available: - -- **background** Is the download being done in the background? -- **bytesFromCacheServer** Bytes received from a cache host. -- **bytesFromCDN** The number of bytes received from a CDN source. -- **bytesFromGroupPeers** The number of bytes received from a peer in the same group. -- **bytesFromIntPeers** The number of bytes received from peers not in the same LAN or in the same group. -- **bytesFromLinkLocalPeers** The number of bytes received from local peers. -- **bytesFromLocalCache** Bytes copied over from local (on disk) cache. -- **bytesFromPeers** The number of bytes received from a peer in the same LAN. -- **cdnErrorCodes** A list of CDN connection errors since the last FailureCDNCommunication event. -- **cdnErrorCounts** The number of times each error in cdnErrorCodes was encountered. -- **cdnIp** The IP Address of the source CDN (Content Delivery Network). -- **cdnUrl** The URL of the source CDN (Content Delivery Network). -- **dataSourcesTotal** Bytes received per source type, accumulated for the whole session. -- **errorCode** The error code that was returned. -- **experimentId** When running a test, this is used to correlate events that are part of the same test. -- **fileID** The ID of the file being downloaded. -- **gCurMemoryStreamBytes** Current usage for memory streaming. -- **gMaxMemoryStreamBytes** Maximum usage for memory streaming. -- **isVpn** Indicates whether the device is connected to a VPN (Virtual Private Network). -- **jobID** Identifier for the Windows Update job. -- **predefinedCallerName** The name of the API Caller. -- **reasonCode** Reason the action or event occurred. -- **routeToCacheServer** The cache server setting, source, and value. -- **sessionID** The ID of the file download session. -- **updateID** The ID of the update being downloaded. -- **usedMemoryStream** TRUE if the download is using memory streaming for App downloads. - - -### Microsoft.OSG.DU.DeliveryOptClient.DownloadCompleted - -This event describes when a download has completed with Delivery Optimization. It's used to understand and address problems regarding downloads. - -The following fields are available: - -- **#dnErrorCounts** No content is currently available. -- **__TlgCVß_** No content is currently available. -- **|anConnectionCount** No content is currently available. -- **}plinkUsageBps** No content is currently available. -- **0redefinedCallerName** No content is currently available. -- **b6nConnectionCount** No content is currently available. -- **b6nErrorCodes** No content is currently available. -- **b6nErrorCounts** No content is currently available. -- **b6nIp** No content is currently available. -- **b6nUrl** No content is currently available. -- **background** Is the download a background download? -- **bytesFrkmIntPeers** No content is currently available. -- **bytesFromCacheSedver** No content is currently available. -- **bytesFromCacheServer** Bytes received from a cache host. -- **bytesFromCdN** No content is currently available. -- **bytesFromCDN** The number of bytes received from a CDN source. -- **bytesFromGpoupPeers** No content is currently available. -- **bytesFromGroupPeers** The number of bytes received from a peer in the same domain group. -- **bytesFromIntÐeers** No content is currently available. -- **bytesFromIntPeers** The number of bytes received from peers not in the same LAN or in the same domain group. -- **bytesFromLinkLocalPeers** The number of bytes received from local peers. -- **bytesFromLocalCache** Bytes copied over from local (on disk) cache. -- **bytesFromPeers** The number of bytes received from a peer in the same LAN. -- **bytesRequested** The total number of bytes requested for download. -- **cacheSarverConnectionCount** No content is currently available. -- **cacheSedverConnectionCount** No content is currently available. -- **cacheServerConndctionCount** No content is currently available. -- **cacheServerConnectionCoujt** No content is currently available. -- **cacheServerConnectionCount** Number of connections made to cache hosts. -- **cdnConnectionCount** The total number of connections made to the CDN. -- **cdnErrorCodes** A list of CDN connection errors since the last FailureCDNCommunication event. -- **cdnErrorCounts** The number of times each error in cdnErrorCodes was encountered. -- **cdnIp** The IP address of the source CDN. -- **cdnSonnectionCount** No content is currently available. -- **cdnUrl** Url of the source Content Distribution Network (CDN). -- **dataSourcesTotal** Bytes received per source type, accumulated for the whole session. -- **dkwnloadModeSrc** No content is currently available. -- **doErrorCode** The Delivery Optimization error code that was returned. -- **dowflinkBps** No content is currently available. -- **downlinkBps** The maximum measured available download bandwidth (in bytes per second). -- **downlinkUsageBps** The download speed (in bytes per second). -- **downloadMode** The download mode used for this file download session. -- **doWnloadMode** No content is currently available. -- **downloadModeReason** Reason for the download. -- **downloadModeSrc** Source of the DownloadMode setting (KvsProvider = 0, GeoProvider = 1, GeoVerProvider = 2, CpProvider = 3, DiscoveryProvider = 4, RegistryProvider = 5, GroupPolicyProvider = 6, MdmProvider = 7, SettingsProvider = 8, InvalidProviderType = 9). -- **downloadMofeSrc** No content is currently available. -- **experimentId** When running a test, this is used to correlate with other events that are part of the same test. -- **expiresAt** The time when the content will expire from the Delivery Optimization Cache. -- **fileID** The ID of the file being downloaded. -- **fileSize** The size of the file being downloaded. -- **gCurMemoryStreamBytes** Current usage for memory streaming. -- **gMaxMemoryStreamBytes** Maximum usage for memory streaming. -- **groupConjectionCount** No content is currently available. -- **groupConnectionCount** The total number of connections made to peers in the same group. -- **internetConnectionCnunt** No content is currently available. -- **internetConnectionCount** The total number of connections made to peers not in the same LAN or the same group. -- **internetConnectionCountdownlinkBps** No content is currently available. -- **isEjcrypted** No content is currently available. -- **isEncryptdd** No content is currently available. -- **isEncrypted** TRUE if the file is encrypted and will be decrypted after download. -- **isVpn** Is the device connected to a Virtual Private Network? -- **jobID** Identifier for the Windows Update job. -- **lanConnectionCo}nt** No content is currently available. -- **lanConnectionCount** The total number of connections made to peers in the same LAN. -- **linkLocalConnectionCount** The number of connections made to peers in the same Link-local network. -- **numPeers** The total number of peers used for this download. -- **numPeersLocal** The total number of local peers used for this download. -- **predefi.edCallerName** No content is currently available. -- **predefinedCallerName** The name of the API Caller. -- **predefinedCalleRName** No content is currently available. -- **rcdnIp** No content is currently available. -- **restrictedUpload** Is the upload restricted? -- **romteToCacheServer** No content is currently available. -- **roupeToCacheServer** No content is currently available. -- **routeTnCacheServer** No content is currently available. -- **routeToCacheSedver** No content is currently available. -- **routeToCacheServer** The cache server setting, source, and value. -- **sessionID** The ID of the download session. -- **totalTimeMs** Duration of the download (in seconds). -- **updateID** The ID of the update being downloaded. -- **uplinkBps** The maximum measured available upload bandwidth (in bytes per second). -- **uplinkUsageBps** The upload speed (in bytes per second). -- **uplinkUsegeBps** No content is currently available. -- **usedMemoryStream** TRUE if the download is using memory streaming for App downloads. - - -### Microsoft.OSG.DU.DeliveryOptClient.DownloadPaused - -This event represents a temporary suspension of a download with Delivery Optimization. It's used to understand and address problems regarding downloads. - -The following fields are available: - -- **AddinType** No content is currently available. -- **backgground** No content is currently available. -- **backgro}nd** No content is currently available. -- **backgrou|d** No content is currently available. -- **background** Is the download a background download? -- **BinFileTimestamp** No content is currently available. -- **BinFileVersion** No content is currently available. -- **c`nUrl** No content is currently available. -- **cdnUrl** The URL of the source CDN (Content Delivery Network). -- **errorBode** No content is currently available. -- **errorCode** The error code that was returned. -- **expebimentId** No content is currently available. -- **expebimentIderrorCode** No content is currently available. -- **experiientId** No content is currently available. -- **experimenpId** No content is currently available. -- **experimentId** When running a test, this is used to correlate with other events that are part of the same test. -- **fileID** The ID of the file being paused. -- **FileId** No content is currently available. -- **FileSize** No content is currently available. -- **isVp|** No content is currently available. -- **isVpn** Is the device connected to a Virtual Private Network? -- **jobID** Identifier for the Windows Update job. -- **ksVpn** No content is currently available. -- **LoadBehavior** No content is currently available. -- **LSID** No content is currently available. -- **OfficeArchitecture** No content is currently available. -- **OutlookCrashingAddin** No content is currently available. -- **predefinedCallerName** The name of the API Caller object. -- **ProductCompany** No content is currently available. -- **ProductName** No content is currently available. -- **ProductVersion** No content is currently available. -- **ProgramId** No content is currently available. -- **Provider** No content is currently available. -- **reasonCod%** No content is currently available. -- **reasonCode** The reason for pausing the download. -- **recsonCodesessiolID** No content is currently available. -- **routeToCacheSedver** No content is currently available. -- **routeToCacheServer** The cache server setting, source, and value. -- **sessionID** The ID of the download session. -- **updateID** The ID of the update being paused. -- **updateMD** No content is currently available. - - -### Microsoft.OSG.DU.DeliveryOptClient.DownloadStarted - -This event sends data describing the start of a new download to enable Delivery Optimization. It's used to understand and address problems regarding downloads. - -The following fields are available: - -- **b6nUrl** No content is currently available. -- **background** Indicates whether the download is happening in the background. -- **bacoground** No content is currently available. -- **bileSizeCaller** No content is currently available. -- **bytesRequested** Number of bytes requested for the download. -- **cdnUrl** The URL of the source Content Distribution Network (CDN). -- **costFlags** A set of flags representing network cost. -- **costFlaos** No content is currently available. -- **deviceProfile** Identifies the usage or form factor (such as Desktop, Xbox, or VM). -- **diceRoll** Random number used for determining if a client will use peering. -- **doClientVersion** The version of the Delivery Optimization client. -- **doErrorC/de** No content is currently available. -- **doErrorCode** The Delivery Optimization error code that was returned. -- **doErrorCoee** No content is currently available. -- **downloadMode** The download mode used for this file download session (CdnOnly = 0, Lan = 1, Group = 2, Internet = 3, Simple = 99, Bypass = 100). -- **downloadModeReason** Reason for the download. -- **downloadModeSrc** Source of the DownloadMode setting (KvsProvider = 0, GeoProvider = 1, GeoVerProvider = 2, CpProvider = 3, DiscoveryProvider = 4, RegistryProvider = 5, GroupPolicyProvider = 6, MdmProvider = 7, SettingsProvider = 8, InvalidProviderType = 9). -- **errorCode** The error code that was returned. -- **experimejtId** No content is currently available. -- **experimentId** ID used to correlate client/services calls that are part of the same test during A/B testing. -- **faleID** No content is currently available. -- **fiheID** No content is currently available. -- **fileID** The ID of the file being downloaded. -- **filePat(** No content is currently available. -- **filePath** The path to where the downloaded file will be written. -- **fileSize** Total file size of the file that was downloaded. -- **fileSizeCaller** Value for total file size provided by our caller. -- **groqpID** No content is currently available. -- **groupID** ID for the group. -- **isEncrypted** Indicates whether the download is encrypted. -- **isFpn** No content is currently available. -- **isVpn** Indicates whether the device is connected to a Virtual Private Network. -- **jobID** The ID of the Windows Update job. -- **peerID** The ID for this delivery optimization client. -- **predefinedCallerName** Name of the API caller. -- **rimentId** No content is currently available. -- **routeToCacheSedver** No content is currently available. -- **routeToCacheServer** Cache server setting, source, and value. -- **sessionID** The ID for the file download session. -- **sessionIF** No content is currently available. -- **sessmonID** No content is currently available. -- **setConfigs** A JSON representation of the configurations that have been set, and their sources. -- **updateID** The ID of the update being downloaded. -- **updateYD** No content is currently available. -- **usedMemoryStream** Indicates whether the download used memory streaming. - - -### Microsoft.OSG.DU.DeliveryOptClient.FailureCdnCommunication - -This event represents a failure to download from a CDN with Delivery Optimization. It's used to understand and address problems regarding downloads. - -The following fields are available: - -- **cdnHeaders** The HTTP headers returned by the CDN. -- **cdnIp** The IP address of the CDN. -- **cdnUrl** The URL of the CDN. -- **eErrorCode** No content is currently available. -- **eErrorCunt** No content is currently available. -- **errorCode** The error code that was returned. -- **errorCount** The total number of times this error code was seen since the last FailureCdnCommunication event was encountered. -- **experimentId** When running a test, this is used to correlate with other events that are part of the same test. -- **fileID** The ID of the file being downloaded. -- **htppStatusCode** No content is currently available. -- **httpStatusCode** The HTTP status code returned by the CDN. -- **isHeadRequest** The type of HTTP request that was sent to the CDN. Example: HEAD or GET -- **peerTyp,** No content is currently available. -- **peerType** The type of peer (LAN, Group, Internet, CDN, Cache Host, etc.). -- **requestOffset** The byte offset within the file in the sent request. -- **requestSize** The size of the range requested from the CDN. -- **responseSize** The size of the range response received from the CDN. -- **sessionID** The ID of the download session. - - -### Microsoft.OSG.DU.DeliveryOptClient.JobError - -This event represents a Windows Update job error. It allows for investigation of top errors. - -The following fields are available: - -- **cdnIp** The IP Address of the source CDN (Content Delivery Network). -- **doErrorCode** Error code returned for delivery optimization. -- **errorCode** The error code returned. -- **experimentId** When running a test, this is used to correlate with other events that are part of the same test. -- **fileID** The ID of the file being downloaded. -- **jobID** The Windows Update job ID. -- **jobKD** No content is currently available. - - -## Windows Update events - -### Microsoft.Windows.Update.DeviceUpdateAgent.UpdateAgentAnalysisSummary - -This event collects information regarding the state of devices and drivers on the system following a reboot after the install phase of the new device manifest UUP (Unified Update Platform) update scenario which is used to install a device manifest describing a set of driver packages. - -The following fields are available: - -- **activated** Whether the entire device manifest update is considered activated and in use. -- **analysisErrorCount** The number of driver packages that could not be analyzed because errors occurred during analysis. -- **flightId** Unique ID for each flight. -- **missingDriverCount** The number of driver packages delivered by the device manifest that are missing from the system. -- **missingUpdateCount** The number of updates in the device manifest that are missing from the system. -- **objectId** Unique value for each diagnostics session. -- **publishedCount** The number of drivers packages delivered by the device manifest that are published and available to be used on devices. -- **relatedCV** Correlation vector value generated from the latest USO scan. -- **scenarioId** Indicates the update scenario. -- **sessionId** Unique value for each update session. -- **summary** A summary string that contains basic information about driver packages that are part of the device manifest and any devices on the system that those driver packages match. -- **summaryAppendError** A Boolean indicating if there was an error appending more information to the summary string. -- **truncatedDeviceCount** The number of devices missing from the summary string because there is not enough room in the string. -- **truncatedDriverCount** The number of driver packages missing from the summary string because there is not enough room in the string. -- **unpublishedCount** How many drivers packages that were delivered by the device manifest that are still unpublished and unavailable to be used on devices. -- **updateId** The unique ID for each update. - - -### Microsoft.Windows.Update.DeviceUpdateAgent.UpdateAgentCommit - -This event collects information regarding the final commit phase of the new device manifest UUP (Unified Update Platform) update scenario, which is used to install a device manifest describing a set of driver packages. - -The following fields are available: - -- **errorCode** The error code returned for the current session initialization. -- **flightId** The unique identifier for each flight. -- **objectId** The unique GUID for each diagnostics session. -- **relatedCV** A correlation vector value generated from the latest USO scan. -- **result** Outcome of the initialization of the session. -- **scenarioId** Identifies the Update scenario. -- **sessionId** The unique value for each update session. -- **updateId** The unique identifier for each Update. - - -### Microsoft.Windows.Update.DeviceUpdateAgent.UpdateAgentDownloadRequest - -This event collects information regarding the download request phase of the new device manifest UUP (Unified Update Platform) update scenario, which is used to install a device manifest describing a set of driver packages. - -The following fields are available: - -- **deletedCorruptFiles** Indicates if UpdateAgent found any corrupt payload files and whether the payload was deleted. -- **errorCode** The error code returned for the current session initialization. -- **flightId** The unique identifier for each flight. -- **objectId** Unique value for each Update Agent mode. -- **packageCountOptional** Number of optional packages requested. -- **packageCountRequired** Number of required packages requested. -- **packageCountTotal** Total number of packages needed. -- **packageCountTotalCanonical** Total number of canonical packages. -- **packageCountTotalDiff** Total number of diff packages. -- **packageCountTotalExpress** Total number of express packages. -- **packageSizeCanonical** Size of canonical packages in bytes. -- **packageSizeDiff** Size of diff packages in bytes. -- **packageSizeExpress** Size of express packages in bytes. -- **rangeRequestState** Represents the state of the download range request. -- **relatedCV** Correlation vector value generated from the latest USO scan. -- **result** Result of the download request phase of update. -- **scenarioId** The scenario ID. Example: MobileUpdate, DesktopLanguagePack, DesktopFeatureOnDemand, or DesktopDriverUpdate. -- **sessionId** Unique value for each Update Agent mode attempt. -- **updateId** Unique ID for each update. - - -### Microsoft.Windows.Update.DeviceUpdateAgent.UpdateAgentInitialize - -This event sends data for initializing a new update session for the new device manifest UUP (Unified Update Platform) update scenario, which is used to install a device manifest describing a set of driver packages. - -The following fields are available: - -- **errorCode** The error code returned for the current session initialization. -- **flightId** The unique identifier for each flight. -- **flightMetadata** Contains the FlightId and the build being flighted. -- **objectId** Unique value for each Update Agent mode. -- **relatedCV** Correlation vector value generated from the latest USO scan. -- **result** Result of the initialize phase of the update. 0 = Succeeded, 1 = Failed, 2 = Cancelled, 3 = Blocked, 4 = BlockCancelled. -- **scenarioId** The scenario ID. Example: MobileUpdate, DesktopLanguagePack, DesktopFeatureOnDemand, or DesktopDriverUpdate. -- **sessionData** Contains instructions to update agent for processing FODs and DUICs (Null for other scenarios). -- **sessionId** Unique value for each Update Agent mode attempt. -- **updateId** Unique ID for each update. - - -### Microsoft.Windows.Update.DeviceUpdateAgent.UpdateAgentInstall - -This event collects information regarding the install phase of the new device manifest UUP (Unified Update Platform) update scenario, which is used to install a device manifest describing a set of driver packages. - -The following fields are available: - -- **errorCode** The error code returned for the current install phase. -- **flightId** The unique identifier for each flight (pre-release builds). -- **objectId** The unique identifier for each diagnostics session. -- **relatedCV** Correlation vector value generated from the latest scan. -- **result** Outcome of the install phase of the update. -- **scenarioId** The scenario ID. Example: MobileUpdate, DesktopLanguagePack, DesktopFeatureOnDemand, or DesktopDriverUpdate -- **sessionId** The unique identifier for each update session. -- **updateId** The unique identifier for each Update. - - -### Microsoft.Windows.Update.DeviceUpdateAgent.UpdateAgentModeStart - -This event sends data for the start of each mode during the process of updating device manifest assets via the UUP (Unified Update Platform) update scenario, which is used to install a device manifest describing a set of driver packages. - -The following fields are available: - -- **flightId** The unique identifier for each flight (pre-release builds). -- **mode** Indicates the active Update Agent mode. -- **objectId** Unique value for each diagnostics session. -- **relatedCV** Correlation vector value generated from the latest scan. -- **scenarioId** The scenario ID. Example: MobileUpdate, DesktopLanguagePack, DesktopFeatureOnDemand, or DesktopDriverUpdate. -- **sessionId** The unique identifier for each update session. -- **updateId** The unique identifier for each Update. - - -### Microsoft.Windows.Update.NotificationUx.DialogNotificationToBeDisplayed - -This event indicates that a notification dialog box is about to be displayed to user. - -The following fields are available: - -- **AcceptAutoModeLimit** The maximum number of days for a device to automatically enter Auto Reboot mode. -- **AutoToAutoFailedLimit** The maximum number of days for Auto Reboot mode to fail before the RebootFailed dialog box is shown. -- **DaysSinceRebootRequired** Number of days since restart was required. -- **DeviceLocalTime** The local time on the device sending the event. -- **EngagedModeLimit** The number of days to switch between DTE dialog boxes. -- **EnterAutoModeLimit** The maximum number of days for a device to enter Auto Reboot mode. -- **ETag** OneSettings versioning value. -- **IsForcedEnabled** Indicates whether Forced Reboot mode is enabled for this device. -- **IsUltimateForcedEnabled** Indicates whether Ultimate Forced Reboot mode is enabled for this device. -- **NotificationUxState** Indicates which dialog box is shown. -- **NotificationUxStateString** Indicates which dialog box is shown. -- **RebootUxState** Indicates the state of the restart (Engaged, Auto, Forced, or UltimateForced). -- **RebootUxStateString** Indicates the state of the restart (Engaged, Auto, Forced, or UltimateForced). -- **RebootVersion** Version of DTE. -- **SkipToAutoModeLimit** The minimum length of time to pass in restart pending before a device can be put into auto mode. -- **UpdateId** The ID of the update that is pending restart to finish installation. -- **UpdateRevision** The revision of the update that is pending restart to finish installation. -- **UtcTime** The time the dialog box notification will be displayed, in Coordinated Universal Time. - - -### Microsoft.Windows.Update.NotificationUx.EnhancedEngagedRebootAcceptAutoDialog - -This event indicates that the Enhanced Engaged restart "accept automatically" dialog box was displayed. - -The following fields are available: - -- **DeviceLocalTime** The local time on the device sending the event. -- **ETag** OneSettings versioning value. -- **ExitCode** Indicates how users exited the dialog box. -- **RebootVersion** Version of DTE. -- **UpdateId** The ID of the update that is pending restart to finish installation. -- **UpdateRevision** The revision of the update that is pending restart to finish installation. -- **UserResponseString** The option that user chose on this dialog box. -- **UtcTime** The time that the dialog box was displayed, in Coordinated Universal Time. - - -### Microsoft.Windows.Update.NotificationUx.EnhancedEngagedRebootFirstReminderDialog - -This event indicates that the Enhanced Engaged restart "first reminder" dialog box was displayed.. - -The following fields are available: - -- **DeviceLocalTime** The local time on the device sending the event. -- **ETag** OneSettings versioning value. -- **ExitCode** Indicates how users exited the dialog box. -- **RebootVersion** Version of DTE. -- **UpdateId** The ID of the update that is pending restart to finish installation. -- **UpdateRevision** The revision of the update that is pending restart to finish installation. -- **UserResponseString** The option that user chose in this dialog box. -- **UtcTime** The time that the dialog box was displayed, in Coordinated Universal Time. - - -### Microsoft.Windows.Update.NotificationUx.EnhancedEngagedRebootRebootFailedDialog - -This event indicates that the Enhanced Engaged restart "restart failed" dialog box was displayed. - -The following fields are available: - -- **DeviceLocalTime** The local time of the device sending the event. -- **ETag** OneSettings versioning value. -- **ExitCode** Indicates how users exited the dialog box. -- **RebootVersion** Version of DTE. -- **UpdateId** The ID of the update that is pending restart to finish installation. -- **UpdateRevision** The revision of the update that is pending restart to finish installation. -- **UserResponseString** The option that the user chose in this dialog box. -- **UtcTime** The time that the dialog box was displayed, in Coordinated Universal Time. - - -### Microsoft.Windows.Update.NotificationUx.EnhancedEngagedRebootRebootImminentDialog - -This event indicates that the Enhanced Engaged restart "restart imminent" dialog box was displayed. - -The following fields are available: - -- **DeviceLocalTime** Time the dialog box was shown on the local device. -- **ETag** OneSettings versioning value. -- **ExitCode** Indicates how users exited the dialog box. -- **RebootVersion** Version of DTE. -- **UpdateId** The ID of the update that is pending restart to finish installation. -- **UpdateRevision** The revision of the update that is pending restart to finish installation. -- **UserResponseString** The option that user chose in this dialog box. -- **UtcTime** The time that dialog box was displayed, in Coordinated Universal Time. - - -### Microsoft.Windows.Update.NotificationUx.EnhancedEngagedRebootReminderDialog - -This event returns information relating to the Enhanced Engaged reboot reminder dialog that was displayed. - -The following fields are available: - -- **DeviceLocalTime** The time at which the reboot reminder dialog was shown (based on the local device time settings). -- **ETag** The OneSettings versioning value. -- **ExitCode** Indicates how users exited the reboot reminder dialog box. -- **RebootVersion** The version of the DTE (Direct-to-Engaged). -- **UpdateId** The ID of the update that is waiting for reboot to finish installation. -- **UpdateRevision** The revision of the update that is waiting for reboot to finish installation. -- **UserResponseString** The option chosen by the user on the reboot dialog box. -- **UtcTime** The time at which the reboot reminder dialog was shown (in UTC). - - -### Microsoft.Windows.Update.NotificationUx.EnhancedEngagedRebootReminderToast - -This event indicates that the Enhanced Engaged restart reminder pop-up banner was displayed. - -The following fields are available: - -- **DeviceLocalTime** The local time on the device sending the event. -- **ETag** OneSettings versioning value. -- **ExitCode** Indicates how users exited the pop-up banner. -- **RebootVersion** The version of the reboot logic. -- **UpdateId** The ID of the update that is pending restart to finish installation. -- **UpdateRevision** The revision of the update that is pending restart to finish installation. -- **UserResponseString** The option that the user chose in the pop-up banner. -- **UtcTime** The time that the pop-up banner was displayed, in Coordinated Universal Time. - - -### Microsoft.Windows.Update.NotificationUx.RebootScheduled - -Indicates when a reboot is scheduled by the system or a user for a security, quality, or feature update. - -The following fields are available: - -- **activeHoursApplicable** Indicates whether an Active Hours policy is present on the device. -- **IsEnhancedEngagedReboot** Indicates whether this is an Enhanced Engaged reboot. -- **rebootArgument** Argument for the reboot task. It also represents specific reboot related action. -- **rebootOutsideOfActiveHours** Indicates whether a restart is scheduled outside of active hours. -- **rebootScheduledByUser** Indicates whether the restart was scheduled by user (if not, it was scheduled automatically). -- **rebootState** The current state of the restart. -- **rebootUsingSmartScheduler** Indicates whether the reboot is scheduled by smart scheduler. -- **revisionNumber** Revision number of the update that is getting installed with this restart. -- **scheduledRebootTime** Time of the scheduled restart. -- **scheduledRebootTimeInUTC** Time of the scheduled restart in Coordinated Universal Time. -- **updateId** ID of the update that is getting installed with this restart. -- **wuDeviceid** Unique device ID used by Windows Update. - - -### Microsoft.Windows.Update.Orchestrator.ActivityRestrictedByActiveHoursPolicy - -This event indicates a policy is present that may restrict update activity to outside of active hours. - -The following fields are available: - -- **activeHoursEnd** The end of the active hours window. -- **activeHoursStart** The start of the active hours window. -- **wuDeviceid** Unique device ID used by Windows Update. - - -### Microsoft.Windows.Update.Orchestrator.BlockedByActiveHours - -This event indicates that update activity was blocked because it is within the active hours window. - -The following fields are available: - -- **activeHoursEnd** The end of the active hours window. -- **activeHoursStart** The start of the active hours window. -- **updatePhase** The current state of the update process. -- **wuDeviceid** Unique device ID used by Windows Update. - - -### Microsoft.Windows.Update.Orchestrator.BlockedByBatteryLevel - -This event indicates that Windows Update activity was blocked due to low battery level. - -The following fields are available: - -- **batteryLevel** The current battery charge capacity. -- **batteryLevelThreshold** The battery capacity threshold to stop update activity. -- **updatePhase** The current state of the update process. -- **wuDeviceid** Device ID. - - -### Microsoft.Windows.Update.Orchestrator.DeferRestart - -This event indicates that a restart required for installing updates was postponed. - -The following fields are available: - -- **displayNeededReason** List of reasons for needing display. -- **eventScenario** Indicates the purpose of the event (scan started, succeeded, failed, etc.). -- **filteredDeferReason** Applicable filtered reasons why reboot was postponed (such as user active, or low battery). -- **gameModeReason** Name of the executable that caused the game mode state check to start. -- **ignoredReason** List of reasons that were intentionally ignored. -- **IgnoreReasonsForRestart** List of reasons why restart was deferred. -- **revisionNumber** Update ID revision number. -- **systemNeededReason** List of reasons why system is needed. -- **updateId** Update ID. -- **updateScenarioType** Update session type. -- **wuDeviceid** Unique device ID used by Windows Update. - - -### Microsoft.Windows.Update.Orchestrator.Detection - -This event indicates that a scan for a Windows Update occurred. - -The following fields are available: - -- **deferReason** The reason why the device could not check for updates. -- **detectionBlockingPolicy** The Policy that blocked detection. -- **detectionBlockreason** The reason detection did not complete. -- **detectionRetryMode** Indicates whether we will try to scan again. -- **errorCode** The error code returned for the current process. -- **eventScenario** End-to-end update session ID, or indicates the purpose of sending this event - whether because the software distribution just started installing content, or whether it was cancelled, succeeded, or failed. -- **flightID** The unique identifier for the flight (Windows Insider pre-release build) should be delivered to the device, if applicable. -- **interactive** Indicates whether the user initiated the session. -- **networkStatus** Indicates if the device is connected to the internet. -- **revisionNumber** The Update revision number. -- **scanTriggerSource** The source of the triggered scan. -- **updateId** The unique identifier of the Update. -- **updateScenarioType** Identifies the type of update session being performed. -- **wuDeviceid** The unique device ID used by Windows Update. - - -### Microsoft.Windows.Update.Orchestrator.DisplayNeeded - -This event indicates the reboot was postponed due to needing a display. - -The following fields are available: - -- **displayNeededReason** Reason the display is needed. -- **eventScenario** Indicates the purpose of sending this event - whether because the software distribution just started checking for content, or whether it was cancelled, succeeded, or failed. -- **rebootOutsideOfActiveHours** Indicates whether the reboot was to occur outside of active hours. -- **revisionNumber** Revision number of the update. -- **updateId** Update ID. -- **updateScenarioType** The update session type. -- **uxRebootstate** Indicates the exact state of the user experience at the time the required reboot was initiated. -- **wuDeviceid** The unique identifier of a specific device, used to identify how many devices are encountering success or a particular issue - - -### Microsoft.Windows.Update.Orchestrator.Download - -This event sends launch data for a Windows Update download to help keep Windows up to date. - -The following fields are available: - -- **deferReason** Reason for download not completing. -- **e:4|SScenario** No content is currently available. -- **errorCode** An error code represented as a hexadecimal value. -- **eventScenario** End-to-end update session ID. -- **flightID** The specific ID of the Windows Insider build the device is getting. -- **interactive** Indicates whether the session is user initiated. -- **interactiveelatedCVerrorCode** No content is currently available. -- **revisionNumber** Update revision number. -- **updateId** Update ID. -- **updateScenariotate** No content is currently available. -- **updateScenarioType** The update session type. -- **wuDeviceid** Unique device ID used by Windows Update. - - -### Microsoft.Windows.Update.Orchestrator.DTUCompletedWhenWuFlightPendingCommit - -This event indicates that DTU completed installation of the electronic software delivery (ESD), when Windows Update was already in Pending Commit phase of the feature update. - -The following fields are available: - -- **wuDeviceid** Device ID used by Windows Update. - - -### Microsoft.Windows.Update.Orchestrator.DTUEnabled - -This event indicates that Inbox DTU functionality was enabled. - -The following fields are available: - -- **wuDeviceid** Device ID used by Windows Update. - - -### Microsoft.Windows.Update.Orchestrator.DTUInitiated - -This event indicates that Inbox DTU functionality was intiated. - -The following fields are available: - -- **dtuErrorCode** Return code from creating the DTU Com Server. -- **isDtuApplicable** Determination of whether DTU is applicable to the machine it is running on. -- **wuDeviceid** Device ID used by Windows Update. - - -### Microsoft.Windows.Update.Orchestrator.EscalationRiskLevels - -This event is sent during update scan, download, or install, and indicates that the device is at risk of being out-of-date. - -The following fields are available: - -- **configVersion** The escalation configuration version on the device. -- **downloadElapsedTime** Indicates how long since the download is required on device. -- **downloadRiskLevel** At-risk level of download phase. -- **installElapsedTime** Indicates how long since the install is required on device. -- **installRiskLevel** The at-risk level of install phase. -- **isSediment** Assessment of whether is device is at risk. -- **scanElapsedTime** Indicates how long since the scan is required on device. -- **scanRiskLevel** At-risk level of the scan phase. -- **wuDeviceid** Device ID used by Windows Update. - - -### Microsoft.Windows.Update.Orchestrator.FailedToAddTimeTriggerToScanTask - -This event indicated that USO failed to add a trigger time to a task. - -The following fields are available: - -- **errorCode** The Windows Update error code. -- **wuDeviceid** The Windows Update device ID. - - -### Microsoft.Windows.Update.Orchestrator.FlightInapplicable - -This event indicates that the update is no longer applicable to this device. - -The following fields are available: - -- **EventPublishedTime** Time when this event was generated. -- **flightID** The specific ID of the Windows Insider build. -- **inapplicableReason** The reason why the update is inapplicable. -- **revisionNumber** Update revision number. -- **updateId** Unique Windows Update ID. -- **updateScenarioType** Update session type. -- **UpdateStatus** Last status of update. -- **UUPFallBackConfigured** Indicates whether UUP fallback is configured. -- **wuDeviceid** Unique Device ID. - - -### Microsoft.Windows.Update.Orchestrator.InitiatingReboot - -This event sends data about an Orchestrator requesting a reboot from power management to help keep Windows up to date. - -The following fields are available: - -- **EventPublishedTime** Time of the event. -- **flightID** Unique update ID -- **interactive** Indicates whether the reboot initiation stage of the update process was entered as a result of user action. -- **rebootOutsideOfActiveHours** Indicates whether the reboot was to occur outside of active hours. -- **revisionNumber** Revision number of the update. -- **updateId** Update ID. -- **updateScenarioType** The update session type. -- **uxRebootstate** Indicates the exact state of the user experience at the time the required reboot was initiated. -- **wuDeviceid** Unique device ID used by Windows Update. - - -### Microsoft.Windows.Update.Orchestrator.Install - -This event sends launch data for a Windows Update install to help keep Windows up to date. - -The following fields are available: - -- **batteryLevel** Current battery capacity in mWh or percentage left. -- **defeec-9-0S** No content is currently available. -- **deferReason** Reason for install not completing. -- **errorCode** The error code reppresented by a hexadecimal value. -- **eventScenario** End-to-end update session ID. -- **flightID** The ID of the Windows Insider build the device is getting. -- **flightUpdate** Indicates whether the update is a Windows Insider build. -- **ForcedRebootReminderSet** A boolean value that indicates if a forced reboot will happen for updates. -- **Ignorec-9-0SsFoec-start** No content is currently available. -- **IgnoreReasonsForRestart** The reason(s) a Postpone Restart command was ignored. -- **installCommitfailedtime** The time it took for a reboot to happen but the upgrade failed to progress. -- **installRebootinitiatetime** The time it took for a reboot to be attempted. -- **interactive** Identifies if session is user initiated. -- **minutesToCommit** The time it took to install updates. -- **rebootOutsideOfActiveHours** Indicates whether a reboot is scheduled outside of active hours. -- **revisionNumber** Update revision number. -- **updateId** Update ID. -- **updateMd** No content is currently available. -- **updateScenarioType** The update session type. -- **uxRebootstate** Indicates the exact state of the user experience at the time the required reboot was initiated to ensure the correct update process and experience is provided to keep Windows up to date. -- **wuDeviceid** Unique device ID used by Windows Update. - - -### Microsoft.Windows.Update.Orchestrator.LowUptimes - -This event is sent if a device is identified as not having sufficient uptime to reliably process updates in order to keep secure. - -The following fields are available: - -- **availableHistoryMinutes** The number of minutes available from the local machine activity history. -- **isLowUptimeMachine** Is the machine considered low uptime or not. -- **lowUptimeMinHours** Current setting for the minimum number of hours needed to not be considered low uptime. -- **lowUptimeQueryDays** Current setting for the number of recent days to check for uptime. -- **uptimeMinutes** Number of minutes of uptime measured. -- **wuDeviceid** Unique device ID for Windows Update. - - -### Microsoft.Windows.Update.Orchestrator.OneshotUpdateDetection - -This event returns data about scans initiated through settings UI, or background scans that are urgent; to help keep Windows up to date. - -The following fields are available: - -- **externalOneshotupdate** The last time a task-triggered scan was completed. -- **interactiveOneshotupdate** The last time an interactive scan was completed. -- **oldlastscanOneshotupdate** The last time a scan completed successfully. -- **wuDeviceid** The Windows Update Device GUID (Globally-Unique ID). - - -### Microsoft.Windows.Update.Orchestrator.PreShutdownStart - -This event is generated before the shutdown and commit operations. - -The following fields are available: - -- **wuDeviceid** The unique identifier of a specific device, used to identify how many devices are encountering success or a particular issue. - - -### Microsoft.Windows.Update.Orchestrator.RebootFailed - -This event sends information about whether an update required a reboot and reasons for failure, to help keep Windows up to date. - -The following fields are available: - -- **batteryLevel** Current battery capacity in mWh or percentage left. -- **deferReason** Reason for install not completing. -- **EventPublishedTime** The time that the reboot failure occurred. -- **flightID** Unique update ID. -- **rebootOutsideOfActiveHours** Indicates whether a reboot was scheduled outside of active hours. -- **RebootResults** Hex code indicating failure reason. Typically, we expect this to be a specific USO generated hex code. -- **revisionNumber** Update revision number. -- **updateId** Update ID. -- **updateScenarioType** The update session type. -- **uxRebootstate** Indicates the exact state of the user experience at the time the required reboot was initiated to ensure the correct update process and experience is provided to keep Windows up to date. -- **wuDeviceid** Unique device ID used by Windows Update. - - -### Microsoft.Windows.Update.Orchestrator.RefreshSettings - -This event sends basic data about the version of upgrade settings applied to the system to help keep Windows up to date. - -The following fields are available: - -- **errorCode** Hex code for the error message, to allow lookup of the specific error. -- **settingsDownloadTime** Timestamp of the last attempt to acquire settings. -- **settingsETag** Version identifier for the settings. -- **wuDeviceid** Unique device ID used by Windows Update. - - -### Microsoft.Windows.Update.Orchestrator.RestoreRebootTask - -This event sends data indicating that a reboot task is missing unexpectedly on a device and the task is restored because a reboot is still required, to help keep Windows up to date. - -The following fields are available: - -- **RebootTaskMissedTimeUTC** The time when the reboot task was scheduled to run, but did not. -- **RebootTaskNextTimeUTC** The time when the reboot task was rescheduled for. -- **RebootTaskRestoredTime** Time at which this reboot task was restored. -- **wuDeviceid** Device ID for the device on which the reboot is restored. - - -### Microsoft.Windows.Update.Orchestrator.ScanTriggered - -This event indicates that Update Orchestrator has started a scan operation. - -The following fields are available: - -- **errorCode** The error code returned for the current scan operation. -- **eventScenario** Indicates the purpose of sending this event. -- **interactive** Indicates whether the scan is interactive. -- **isDTUEnabled** Indicates whether DTU (internal abbreviation for Direct Feature Update) channel is enabled on the client system. -- **isScanPastSla** Indicates whether the SLA has elapsed for scanning. -- **isScanPastTriggerSla** Indicates whether the SLA has elapsed for triggering a scan. -- **minutesOverScanSla** Indicates how many minutes the scan exceeded the scan SLA. -- **minutesOverScanTriggerSla** Indicates how many minutes the scan exceeded the scan trigger SLA. -- **scanTriggerSource** Indicates what caused the scan. -- **updateScenarioType** The update session type. -- **wuDeviceid** Unique device ID used by Windows Update. - - -### Microsoft.Windows.Update.Orchestrator.StickUpdate - -This event is sent when the update service orchestrator (USO) indicates the update cannot be superseded by a newer update. - -The following fields are available: - -- **updateAd** No content is currently available. -- **updateId** Identifier associated with the specific piece of content. -- **wuDeviceid** Unique device ID controlled by the software distribution client. - - -### Microsoft.Windows.Update.Orchestrator.SystemNeeded - -This event sends data about why a device is unable to reboot, to help keep Windows up to date. - -The following fields are available: - -- **eventScenario** End-to-end update session ID. -- **rebootOutsideOfActiveHours** Indicates whether a reboot is scheduled outside of active hours. -- **revisionNumber** Update revision number. -- **systemNeededReason** List of apps or tasks that are preventing the system from restarting. -- **updateId** Update ID. -- **updateScenarioType** The update session type. -- **uxRebootstate** Indicates the exact state of the user experience at the time the required reboot was initiated to ensure the correct update process and experience is provided to keep Windows up to date. -- **wuDeviceid** Unique device ID used by Windows Update. - - -### Microsoft.Windows.Update.Orchestrator.TerminatedByActiveHours - -This event indicates that update activity was stopped due to active hours starting. - -The following fields are available: - -- **activeHoursEnd** The end of the active hours window. -- **activeHoursStart** The start of the active hours window. -- **updatePhase** The current state of the update process. -- **wuDeviceid** The device identifier. - - -### Microsoft.Windows.Update.Orchestrator.TerminatedByBatteryLevel - -This event is sent when update activity was stopped due to a low battery level. - -The following fields are available: - -- **batteryLevel** The current battery charge capacity. -- **batteryLevelThreshold** The battery capacity threshold to stop update activity. -- **updatePhase** The current state of the update process. -- **wuDeviceid** The device identifier. - - -### Microsoft.Windows.Update.Orchestrator.UnstickUpdate - -This event is sent when the update service orchestrator (USO) indicates that the update can be superseded by a newer update. - -The following fields are available: - -- **updateId** Identifier associated with the specific piece of content. -- **wuDeviceid** Unique device ID controlled by the software distribution client. - - -### Microsoft.Windows.Update.Orchestrator.UpdatePolicyCacheRefresh - -This event sends data on whether Update Management Policies were enabled on a device, to help keep Windows up to date. - -The following fields are available: - -- **configuredPoliciescount** Number of policies on the device. -- **policiesNamevaluesource** Policy name and source of policy (group policy, MDM or flight). -- **policyCacherefreshtime** Time when policy cache was refreshed. -- **updateInstalluxsetting** Indicates whether a user has set policies via a user experience option. -- **wuDeviceid** Unique device ID used by Windows Update. - - -### Microsoft.Windows.Update.Orchestrator.UpdateRebootRequired - -This event sends data about whether an update required a reboot to help keep Windows up to date. - -The following fields are available: - -- **flightID** The specific ID of the Windows Insider build the device is getting. -- **interactive** Indicates whether the reboot initiation stage of the update process was entered as a result of user action. -- **revisionNumber** Update revision number. -- **updateId** Update ID. -- **updateScenarioType** The update session type. -- **uxRebootstate** Indicates the exact state of the user experience at the time the required reboot was initiated to ensure the correct update process and experience is provided to keep Windows up to date. -- **wuDeviceid** Unique device ID used by Windows Update. - - -### Microsoft.Windows.Update.Orchestrator.updateSettingsFlushFailed - -This event sends information about an update that encountered problems and was not able to complete. - -The following fields are available: - -- **errorCode** The error code encountered. -- **wuDeviceid** The ID of the device in which the error occurred. - - -### Microsoft.Windows.Update.Orchestrator.UsoSession - -This event represents the state of the USO service at start and completion. - -The following fields are available: - -- **activeSessionid** A unique session GUID. -- **eventScenario** The state of the update action. -- **interactive** Is the USO session interactive? -- **lastErrorcode** The last error that was encountered. -- **lastErrorstate** The state of the update when the last error was encountered. -- **sessionType** A GUID that refers to the update session type. -- **updateScenarioType** A descriptive update session type. -- **wuDeviceid** The Windows Update device GUID. - - -### Microsoft.Windows.Update.Ux.MusNotification.EnhancedEngagedRebootUxState - -This event sends information about the configuration of Enhanced Direct-to-Engaged (eDTE), which includes values for the timing of how eDTE will progress through each phase of the reboot. - -The following fields are available: - -- **AcceptAutoModeLimit** The maximum number of days for a device to automatically enter Auto Reboot mode. -- **AutoToAutoFailedLimit** The maximum number of days for Auto Reboot mode to fail before a Reboot Failed dialog will be shown. -- **DeviceLocalTime** The date and time (based on the device date/time settings) the reboot mode changed. -- **EngagedModeLimit** The number of days to switch between DTE (Direct-to-Engaged) dialogs. -- **EnterAutoModeLimit** The maximum number of days a device can enter Auto Reboot mode. -- **ETag** The Entity Tag that represents the OneSettings version. -- **IsForcedEnabled** Identifies whether Forced Reboot mode is enabled for the device. -- **IsUltimateForcedEnabled** Identifies whether Ultimate Forced Reboot mode is enabled for the device. -- **OldestUpdateLocalTime** The date and time (based on the device date/time settings) this update’s reboot began pending. -- **RebootUxState** Identifies the reboot state: Engaged, Auto, Forced, UltimateForced. -- **RebootVersion** The version of the DTE (Direct-to-Engaged). -- **SkipToAutoModeLimit** The maximum number of days to switch to start while in Auto Reboot mode. -- **UpdateId** The ID of the update that is waiting for reboot to finish installation. -- **UpdateRevision** The revision of the update that is waiting for reboot to finish installation. - - -### Microsoft.Windows.Update.Ux.MusNotification.RebootNoLongerNeeded - -This event is sent when a security update has successfully completed. - -The following fields are available: - -- **UtcTime** The Coordinated Universal Time that the restart was no longer needed. - - -### Microsoft.Windows.Update.Ux.MusNotification.RebootScheduled - -This event sends basic information about scheduling an update-related reboot, to get security updates and to help keep Windows up-to-date. - -The following fields are available: - -- **activeHoursApplicable** Indicates whether Active Hours applies on this device. -- **IsEnhancedEngagedReboot** Indicates whether Enhanced reboot was enabled. -- **rebootArgument** Argument for the reboot task. It also represents specific reboot related action. -- **rebootOutsideOfActiveHours** True, if a reboot is scheduled outside of active hours. False, otherwise. -- **rebootScheduledByUser** True, if a reboot is scheduled by user. False, if a reboot is scheduled automatically. -- **rebootState** Current state of the reboot. -- **rebootUsingSmartScheduler** Indicates that the reboot is scheduled by SmartScheduler. -- **revisionNumber** Revision number of the OS. -- **scheduledRebootTime** Time scheduled for the reboot. -- **scheduledRebootTimeInUTC** Time scheduled for the reboot, in UTC. -- **updateId** Identifies which update is being scheduled. -- **wuDeviceid** The unique device ID used by Windows Update. - - -### Microsoft.Windows.Update.Ux.MusNotification.UxBrokerScheduledTask - -This event is sent when MUSE broker schedules a task. - -The following fields are available: - -- **TaskArgument** The arguments with which the task is scheduled. -- **TaskName** Name of the task. - - -### Microsoft.Windows.Update.Ux.MusUpdateSettings.RebootScheduled - -This event sends basic information for scheduling a device restart to install security updates. It's used to help keep Windows up to date. - -The following fields are available: - -- **activeHoursApplicable** Is the restart respecting Active Hours? -- **IsEnhancedEngagedReboot** TRUE if the reboot path is Enhanced Engaged. Otherwise, FALSE. -- **rebootArgument** The arguments that are passed to the OS for the restarted. -- **rebootOutsideOfActiveHours** Was the restart scheduled outside of Active Hours? -- **rebootScheduledByUser** Was the restart scheduled by the user? If the value is false, the restart was scheduled by the device. -- **rebootState** The state of the restart. -- **rebootUsingSmartScheduler** TRUE if the reboot should be performed by the Smart Scheduler. Otherwise, FALSE. -- **revisionNumber** The revision number of the OS being updated. -- **scheduledRebootTime** Time of the scheduled reboot -- **scheduledRebootTimeInUTC** Time of the scheduled restart, in Coordinated Universal Time. -- **updateId** The Windows Update device GUID. -- **wuDeviceid** The Windows Update device GUID. - - -## Windows Update mitigation events - -### Mitigation360Telemetry.MitigationCustom.CleanupSafeOsImages - -This event sends data specific to the CleanupSafeOsImages mitigation used for OS Updates. - -The following fields are available: - -- **ClientId** The client ID used by Windows Update. -- **FlightId** The ID of each Windows Insider build the device received. -- **InstanceId** A unique device ID that identifies each update instance. -- **MitigationScenario** The update scenario in which the mitigation was executed. -- **MountedImageCount** The number of mounted images. -- **MountedImageMatches** The number of mounted image matches. -- **MountedImagesFailed** The number of mounted images that could not be removed. -- **MountedImagesRemoved** The number of mounted images that were successfully removed. -- **MountedImagesSkipped** The number of mounted images that were not found. -- **RelatedCV** The correlation vector value generated from the latest USO scan. -- **Result** HResult of this operation. -- **ScenarioId** ID indicating the mitigation scenario. -- **ScenarioSupported** Indicates whether the scenario was supported. -- **SessionId** Unique value for each update attempt. -- **UpdateId** Unique ID for each Windows Update. -- **WuId** Unique ID for the Windows Update client. - - -### Mitigation360Telemetry.MitigationCustom.FixAppXReparsePoints - -This event sends data specific to the FixAppXReparsePoints mitigation used for OS updates. - -The following fields are available: - -- **ClientId** Unique identifier for each flight. -- **FlightId** Unique GUID that identifies each instances of setuphost.exe. -- **InstanceId** The update scenario in which the mitigation was executed. -- **MitigationScenario** Correlation vector value generated from the latest USO scan. -- **RelatedCV** Number of reparse points that are corrupted but we failed to fix them. -- **ReparsePointsFailed** Number of reparse points that were corrupted and were fixed by this mitigation. -- **ReparsePointsFixed** Number of reparse points that are not corrupted and no action is required. -- **ReparsePointsSkipped** HResult of this operation. -- **Result** ID indicating the mitigation scenario. -- **ScenarioId** Indicates whether the scenario was supported. -- **ScenarioSupported** Unique value for each update attempt. -- **SessionId** Unique ID for each Update. -- **UpdateId** Unique ID for the Windows Update client. -- **WuId** Unique ID for the Windows Update client. - - -### Mitigation360Telemetry.MitigationCustom.FixupEditionId - -This event sends data specific to the FixupEditionId mitigation used for OS updates. - -The following fields are available: - -- **ClientId** In the WU scenario, this will be the WU client ID that is passed to Setup. In Media setup, default value is Media360, but can be overwritten by the caller to a unique value. -- **EditionIdUpdated** Determine whether EditionId was changed. -- **FlightId** Unique identifier for each flight. -- **InstanceId** Unique GUID that identifies each instances of setuphost.exe. -- **MitigationScenario** The update scenario in which the mitigation was executed. -- **ProductEditionId** Expected EditionId value based on GetProductInfo. -- **ProductType** Value returned by GetProductInfo. -- **RegistryEditionId** EditionId value in the registry. -- **RelatedCV** Correlation vector value generated from the latest USO scan. -- **Result** HResult of this operation. -- **ScenarioId** ID indicating the mitigation scenario. -- **ScenarioSupported** Indicates whether the scenario was supported. -- **SessionId** Unique value for each update attempt. -- **UpdateId** Unique ID for each update. -- **WuId** Unique ID for the Windows Update client. - - -## Windows Update Reserve Manager events - -### Microsoft.Windows.UpdateReserveManager.CommitPendingHardReserveAdjustment - -This event is sent when the Update Reserve Manager commits a hard reserve adjustment that was pending. - -The following fields are available: - -- **FinalAdjustment** Final adjustment for the hard reserve following the addition or removal of optional content. -- **InitialAdjustment** Initial intended adjustment for the hard reserve following the addition/removal of optional content. - - -### Microsoft.Windows.UpdateReserveManager.FunctionReturnedError - -This event is sent when the Update Reserve Manager returns an error from one of its internal functions. - -The following fields are available: - -- **FailedExpression** The failed expression that was returned. -- **FailedFile** The binary file that contained the failed function. -- **FailedFunction** The name of the function that originated the failure. -- **FailedLine** The line number of the failure. -- **ReturnCode** The return code of the function. - - -### Microsoft.Windows.UpdateReserveManager.InitializeUpdateReserveManager - -This event returns data about the Update Reserve Manager, including whether it’s been initialized. - -The following fields are available: - -- **ClientId** The ID of the caller application. -- **Flags** The enumerated flags used to initialize the manager. -- **FlightId** The flight ID of the content the calling client is currently operating with. -- **Offline** Indicates whether or the reserve manager is called during offline operations. -- **PolicyPassed** Indicates whether the machine is able to use reserves. -- **ReturnCode** Return code of the operation. -- **Version** The version of the Update Reserve Manager. - - -### Microsoft.Windows.UpdateReserveManager.PrepareTIForReserveInitialization - -This event is sent when the Update Reserve Manager prepares the Trusted Installer to initialize reserves on the next boot. - -The following fields are available: - -- **Flags** The flags that are passed to the function to prepare the Trusted Installer for reserve initialization. - - -### Microsoft.Windows.UpdateReserveManager.RemovePendingHardReserveAdjustment - -This event is sent when the Update Reserve Manager removes a pending hard reserve adjustment. - - - -### Microsoft.Windows.UpdateReserveManager.UpdatePendingHardReserveAdjustment - -This event is sent when the Update Reserve Manager needs to adjust the size of the hard reserve after the option content is installed. - -The following fields are available: - -- **ChangeSize** The change in the hard reserve size based on the addition or removal of optional content. -- **Disposition** The parameter for the hard reserve adjustment function. -- **Flags** The flags passed to the hard reserve adjustment function. -- **PendingHardReserveAdjustment** The final change to the hard reserve size. -- **UpdateType** Indicates whether the change is an increase or decrease in the size of the hard reserve. - - -## Winlogon events - -### Microsoft.Windows.Security.Winlogon.SetupCompleteLogon - -This event signals the completion of the setup process. It happens only once during the first logon. - - - -## XBOX events - -### Microsoft.Xbox.XamTelemetry.AppActivationError - -This event indicates whether the system detected an activation error in the app. - -The following fields are available: - -- **ActivationUri** Activation URI (Uniform Resource Identifier) used in the attempt to activate the app. -- **AppId** The Xbox LIVE Title ID. -- **AppUserModelId** The AUMID (Application User Model ID) of the app to activate. -- **Result** The HResult error. -- **UserId** The Xbox LIVE User ID (XUID). - - -### Microsoft.Xbox.XamTelemetry.AppActivity - -This event is triggered whenever the current app state is changed by: launch, switch, terminate, snap, etc. - -The following fields are available: - -- **AppActionId** The ID of the application action. -- **AppCurrentVisibilityState** The ID of the current application visibility state. -- **AppId** The Xbox LIVE Title ID of the app. -- **AppPackageFullName** The full name of the application package. -- **AppPreviousVisibilityState** The ID of the previous application visibility state. -- **AppSessionId** The application session ID. -- **AppType** The type ID of the application (AppType_NotKnown, AppType_Era, AppType_Sra, AppType_Uwa). -- **BCACode** The BCA (Burst Cutting Area) mark code of the optical disc used to launch the application. -- **DurationMs** The amount of time (in milliseconds) since the last application state transition. -- **IsTrialLicense** This boolean value is TRUE if the application is on a trial license. -- **LicenseType** The type of licensed used to authorize the app (0 - Unknown, 1 - User, 2 - Subscription, 3 - Offline, 4 - Disc). -- **LicenseXuid** If the license type is 1 (User), this field contains the XUID (Xbox User ID) of the registered owner of the license. -- **ProductGuid** The Xbox product GUID (Globally-Unique ID) of the application. -- **UserId** The XUID (Xbox User ID) of the current user. - - - +--- +description: Use this article to learn more about what Windows diagnostic data is gathered at the basic level. +title: Windows 10, version 1809 basic diagnostic events and fields (Windows 10) +keywords: privacy, telemetry +ms.prod: w10 +ms.mktglfcycl: manage +ms.sitesec: library +ms.pagetype: security +localizationpriority: high +author: brianlic-msft +ms.author: brianlic +manager: dansimp +ms.collection: M365-security-compliance +ms.topic: article +audience: ITPro +ms.date: 03/19/2019 +--- + + +# Windows 10, version 1809 basic level Windows diagnostic events and fields + + **Applies to** + +- Windows 10, version 1809 + + +The Basic level gathers a limited set of information that is critical for understanding the device and its configuration including: basic device information, quality-related information, app compatibility, and Microsoft Store. When the level is set to Basic, it also includes the Security level information. + +The Basic level helps to identify problems that can occur on a particular device hardware or software configuration. For example, it can help determine if crashes are more frequent on devices with a specific amount of memory or that are running a particular driver version. This helps Microsoft fix operating system or app problems. + +Use this article to learn about diagnostic events, grouped by event area, and the fields within each event. A brief description is provided for each field. Every event generated includes common data, which collects device data. + +You can learn more about Windows functional and diagnostic data through these articles: + + +- [Windows 10, version 1803 basic diagnostic events and fields](basic-level-windows-diagnostic-events-and-fields-1803.md) +- [Windows 10, version 1709 basic diagnostic events and fields](basic-level-windows-diagnostic-events-and-fields-1709.md) +- [Windows 10, version 1703 basic diagnostic events and fields](basic-level-windows-diagnostic-events-and-fields-1703.md) +- [Manage connections from Windows operating system components to Microsoft services](manage-connections-from-windows-operating-system-components-to-microsoft-services.md) +- [Configure Windows diagnostic data in your organization](configure-windows-diagnostic-data-in-your-organization.md) + + + + +## Account trace logging provider events + +### Microsoft.Windows.Mitigation.AccountTraceLoggingProvider.General + +This event provides information about application properties to indicate the successful execution. + +The following fields are available: + +- **AppMode** Indicates the mode the app is being currently run around privileges. +- **ExitCode** Indicates the exit code of the app. +- **Help** Indicates if the app needs to be launched in the help mode. +- **ParseError** Indicates if there was a parse error during the execution. +- **RightsAcquired** Indicates if the right privileges were acquired for successful execution. +- **RightsWereEnabled** Indicates if the right privileges were enabled for successful execution. +- **TestMode** Indicates whether the app is being run in test mode. + + +### Microsoft.Windows.Mitigation.AccountTraceLoggingProvider.GetCount + +This event provides information about the properties of user accounts in the Administrator group. + +The following fields are available: + +- **Internal** Indicates the internal property associated with the count group. +- **LastError** The error code (if applicable) for the cause of the failure to get the count of the user account. +- **Result** The HResult error. + + +## AppLocker events + +### Microsoft.Windows.Security.AppLockerCSP.ActivityStoppedAutomatically + +Automatically closed activity for start/stop operations that aren't explicitly closed. + + + +### Microsoft.Windows.Security.AppLockerCSP.AddParams + +Parameters passed to Add function of the AppLockerCSP Node. + +The following fields are available: + +- **child** The child URI of the node to add. +- **uri** URI of the node relative to %SYSTEM32%/AppLocker. + + +### Microsoft.Windows.Security.AppLockerCSP.AddStart + +Start of "Add" Operation for the AppLockerCSP Node. + + + +### Microsoft.Windows.Security.AppLockerCSP.AddStop + +End of "Add" Operation for AppLockerCSP Node. + +The following fields are available: + +- **hr** The HRESULT returned by Add function in AppLockerCSP. + + +### Microsoft.Windows.Security.AppLockerCSP.CAppLockerCSP::Rollback + +Result of the 'Rollback' operation in AppLockerCSP. + +The following fields are available: + +- **oldId** Previous id for the CSP transaction. +- **txId** Current id for the CSP transaction. + + +### Microsoft.Windows.Security.AppLockerCSP.ClearParams + +Parameters passed to the "Clear" operation for AppLockerCSP. + +The following fields are available: + +- **uri** The URI relative to the %SYSTEM32%\AppLocker folder. + + +### Microsoft.Windows.Security.AppLockerCSP.ClearStart + +Start of the "Clear" operation for the AppLockerCSP Node. + + + +### Microsoft.Windows.Security.AppLockerCSP.ClearStop + +End of the "Clear" operation for the AppLockerCSP node. + +The following fields are available: + +- **hr** HRESULT reported at the end of the 'Clear' function. + + +### Microsoft.Windows.Security.AppLockerCSP.ConfigManagerNotificationStart + +Start of the "ConfigManagerNotification" operation for AppLockerCSP. + +The following fields are available: + +- **NotifyState** State sent by ConfigManager to AppLockerCSP. + + +### Microsoft.Windows.Security.AppLockerCSP.ConfigManagerNotificationStop + +End of the "ConfigManagerNotification" operation for AppLockerCSP. + +The following fields are available: + +- **hr** HRESULT returned by the ConfigManagerNotification function in AppLockerCSP. + + +### Microsoft.Windows.Security.AppLockerCSP.CreateNodeInstanceParams + +Parameters passed to the CreateNodeInstance function of the AppLockerCSP node. + +The following fields are available: + +- **NodeId** NodeId passed to CreateNodeInstance. +- **nodeOps** NodeOperations parameter passed to CreateNodeInstance. +- **uri** URI passed to CreateNodeInstance, relative to %SYSTEM32%\AppLocker. + + +### Microsoft.Windows.Security.AppLockerCSP.CreateNodeInstanceStart + +Start of the "CreateNodeInstance" operation for the AppLockerCSP node. + + + +### Microsoft.Windows.Security.AppLockerCSP.CreateNodeInstanceStop + +End of the "CreateNodeInstance" operation for the AppLockerCSP node + +The following fields are available: + +- **hr** HRESULT returned by the CreateNodeInstance function in AppLockerCSP. + + +### Microsoft.Windows.Security.AppLockerCSP.DeleteChildParams + +Parameters passed to the DeleteChild function of the AppLockerCSP node. + +The following fields are available: + +- **child** The child URI of the node to delete. +- **uri** URI relative to %SYSTEM32%\AppLocker. + + +### Microsoft.Windows.Security.AppLockerCSP.DeleteChildStart + +Start of the "DeleteChild" operation for the AppLockerCSP node. + + + +### Microsoft.Windows.Security.AppLockerCSP.DeleteChildStop + +End of the "DeleteChild" operation for the AppLockerCSP node. + +The following fields are available: + +- **hr** HRESULT returned by the DeleteChild function in AppLockerCSP. + + +### Microsoft.Windows.Security.AppLockerCSP.EnumPolicies + +Logged URI relative to %SYSTEM32%\AppLocker, if the Plugin GUID is null, or the CSP doesn't believe the old policy is present. + +The following fields are available: + +- **uri** URI relative to %SYSTEM32%\AppLocker. + + +### Microsoft.Windows.Security.AppLockerCSP.GetChildNodeNamesParams + +Parameters passed to the GetChildNodeNames function of the AppLockerCSP node. + +The following fields are available: + +- **uri** URI relative to %SYSTEM32%/AppLocker for MDM node. + + +### Microsoft.Windows.Security.AppLockerCSP.GetChildNodeNamesStart + +Start of the "GetChildNodeNames" operation for the AppLockerCSP node. + + + +### Microsoft.Windows.Security.AppLockerCSP.GetChildNodeNamesStop + +End of the "GetChildNodeNames" operation for the AppLockerCSP node. + +The following fields are available: + +- **child[0]** If function succeeded, the first child's name, else "NA". +- **count** If function succeeded, the number of child node names returned by the function, else 0. +- **hr** HRESULT returned by the GetChildNodeNames function of AppLockerCSP. + + +### Microsoft.Windows.Security.AppLockerCSP.GetLatestId + +The result of 'GetLatestId' in AppLockerCSP (the latest time stamped GUID). + +The following fields are available: + +- **dirId** The latest directory identifier found by GetLatestId. +- **id** The id returned by GetLatestId if id > 0 - otherwise the dirId parameter. + + +### Microsoft.Windows.Security.AppLockerCSP.HResultException + +HRESULT thrown by any arbitrary function in AppLockerCSP. + +The following fields are available: + +- **file** File in the OS code base in which the exception occurs. +- **function** Function in the OS code base in which the exception occurs. +- **hr** HRESULT that is reported. +- **line** Line in the file in the OS code base in which the exception occurs. + + +### Microsoft.Windows.Security.AppLockerCSP.SetValueParams + +Parameters passed to the SetValue function of the AppLockerCSP node. + +The following fields are available: + +- **dataLength** Length of the value to set. +- **uri** The node URI to that should contain the value, relative to %SYSTEM32%\AppLocker. + + +### Microsoft.Windows.Security.AppLockerCSP.SetValueStart + +Start of the "SetValue" operation for the AppLockerCSP node. + + + +### Microsoft.Windows.Security.AppLockerCSP.SetValueStop + +End of the "SetValue" operation for the AppLockerCSP node. + +The following fields are available: + +- **hr** HRESULT returned by the SetValue function in AppLockerCSP. + + +### Microsoft.Windows.Security.AppLockerCSP.TryRemediateMissingPolicies + +EntryPoint of fix step or policy remediation, includes URI relative to %SYSTEM32%\AppLocker that needs to be fixed. + +The following fields are available: + +- **uri** URI for node relative to %SYSTEM32%/AppLocker. + + +## Appraiser events + +### Microsoft.Windows.Appraiser.General.ChecksumTotalPictureCount + +This event lists the types of objects and how many of each exist on the client device. This allows for a quick way to ensure that the records present on the server match what is present on the client. + +The following fields are available: + +- **DatasourceApplicationFile_19ASetup** The count of the number of this particular object type present on this device. +- **DatasourceApplicationFile_19H1** The count of the number of this particular object type present on this device. +- **DatasourceApplicationFile_19H1Setup** The count of the number of this particular object type present on this device. +- **DatasourceApplicationFile_RS1** An ID for the system, calculated by hashing hardware identifiers. +- **DatasourceApplicationFile_RS2** An ID for the system, calculated by hashing hardware identifiers. +- **DatasourceApplicationFile_RS3** The count of the number of this particular object type present on this device. +- **DatasourceApplicationFile_RS3Setup** The count of the number of this particular object type present on this device. +- **DatasourceApplicationFile_RS4** The count of the number of this particular object type present on this device. +- **DatasourceApplicationFile_RS4Setup** The count of the number of this particular object type present on this device. +- **DatasourceApplicationFile_RS5** The count of the number of this particular object type present on this device. +- **DatasourceApplicationFile_RS5Setup** The count of the number of this particular object type present on this device. +- **DatasourceApplicationFile_TH1** The count of the number of this particular object type present on this device. +- **DatasourceApplicationFile_TH2** The count of the number of this particular object type present on this device. +- **DatasourceDevicePnp_19ASetup** The count of the number of this particular object type present on this device. +- **DatasourceDevicePnp_19H1** The count of the number of this particular object type present on this device. +- **DatasourceDevicePnp_19H1Setup** The count of the number of this particular object type present on this device. +- **DatasourceDevicePnp_RS1** The total DataSourceDevicePnp objects targeting Windows 10 version 1607 on this device. +- **DatasourceDevicePnp_RS2** The count of the number of this particular object type present on this device. +- **DatasourceDevicePnp_RS3** The count of the number of this particular object type present on this device. +- **DatasourceDevicePnp_RS3Setup** The count of the number of this particular object type present on this device. +- **DatasourceDevicePnp_RS4** The count of the number of this particular object type present on this device. +- **DatasourceDevicePnp_RS4Setup** The count of the number of this particular object type present on this device. +- **DatasourceDevicePnp_RS5** The count of the number of this particular object type present on this device. +- **DatasourceDevicePnp_RS5Setup** The count of the number of this particular object type present on this device. +- **DatasourceDevicePnp_TH1** The count of the number of this particular object type present on this device. +- **DatasourceDevicePnp_TH2** The count of the number of this particular object type present on this device. +- **DatasourceDriverPackage_19ASetup** The count of the number of this particular object type present on this device. +- **DatasourceDriverPackage_19H1** The count of the number of this particular object type present on this device. +- **DatasourceDriverPackage_19H1Setup** The count of the number of this particular object type present on this device. +- **DatasourceDriverPackage_RS1** The total DataSourceDriverPackage objects targeting Windows 10 version 1607 on this device. +- **DatasourceDriverPackage_RS2** The total DataSourceDriverPackage objects targeting Windows 10, version 1703 on this device. +- **DatasourceDriverPackage_RS3** The count of the number of this particular object type present on this device. +- **DatasourceDriverPackage_RS3Setup** The count of the number of this particular object type present on this device. +- **DatasourceDriverPackage_RS4** The count of the number of this particular object type present on this device. +- **DatasourceDriverPackage_RS4Setup** The count of the number of this particular object type present on this device. +- **DatasourceDriverPackage_RS5** The count of the number of this particular object type present on this device. +- **DatasourceDriverPackage_RS5Setup** The count of the number of this particular object type present on this device. +- **DatasourceDriverPackage_TH1** The count of the number of this particular object type present on this device. +- **DatasourceDriverPackage_TH2** The count of the number of this particular object type present on this device. +- **DataSourceMatchingInfoBlock_19ASetup** The count of the number of this particular object type present on this device. +- **DataSourceMatchingInfoBlock_19H1** The count of the number of this particular object type present on this device. +- **DataSourceMatchingInfoBlock_19H1Setup** The count of the number of this particular object type present on this device. +- **DataSourceMatchingInfoBlock_RS1** The total DataSourceMatchingInfoBlock objects targeting Windows 10 version 1607 on this device. +- **DataSourceMatchingInfoBlock_RS2** The count of the number of this particular object type present on this device. +- **DataSourceMatchingInfoBlock_RS3** The count of the number of this particular object type present on this device. +- **DataSourceMatchingInfoBlock_RS3Setup** The count of the number of this particular object type present on this device. +- **DataSourceMatchingInfoBlock_RS4** The count of the number of this particular object type present on this device. +- **DataSourceMatchingInfoBlock_RS4Setup** The count of the number of this particular object type present on this device. +- **DataSourceMatchingInfoBlock_RS5** The count of the number of this particular object type present on this device. +- **DataSourceMatchingInfoBlock_RS5Setup** The count of the number of this particular object type present on this device. +- **DataSourceMatchingInfoBlock_TH1** The count of the number of this particular object type present on this device. +- **DataSourceMatchingInfoBlock_TH2** The count of the number of this particular object type present on this device. +- **DataSourceMatchingInfoPassive_19ASetup** The count of the number of this particular object type present on this device. +- **DataSourceMatchingInfoPassive_19H1** The count of the number of this particular object type present on this device. +- **DataSourceMatchingInfoPassive_19H1Setup** The count of the number of this particular object type present on this device. +- **DataSourceMatchingInfoPassive_RS1** The total DataSourceMatchingInfoPassive objects targeting Windows 10 version 1607 on this device. +- **DataSourceMatchingInfoPassive_RS2** The count of the number of this particular object type present on this device. +- **DataSourceMatchingInfoPassive_RS3** The count of the number of this particular object type present on this device. +- **DataSourceMatchingInfoPassive_RS3Setup** The count of the number of this particular object type present on this device. +- **DataSourceMatchingInfoPassive_RS4** The count of the number of this particular object type present on this device. +- **DataSourceMatchingInfoPassive_RS4Setup** The count of the number of this particular object type present on this device. +- **DataSourceMatchingInfoPassive_RS5** The count of the number of this particular object type present on this device. +- **DataSourceMatchingInfoPassive_RS5Setup** The count of the number of this particular object type present on this device. +- **DataSourceMatchingInfoPassive_TH1** The count of the number of this particular object type present on this device. +- **DataSourceMatchingInfoPassive_TH2** The count of the number of this particular object type present on this device. +- **DataSourceMatchingInfoPostUpgrade_19ASetup** The count of the number of this particular object type present on this device. +- **DataSourceMatchingInfoPostUpgrade_19H1** The count of the number of this particular object type present on this device. +- **DataSourceMatchingInfoPostUpgrade_19H1Setup** The count of the number of this particular object type present on this device. +- **DataSourceMatchingInfoPostUpgrade_RS1** The total DataSourceMatchingInfoPostUpgrade objects targeting Windows 10 version 1607 on this device. +- **DataSourceMatchingInfoPostUpgrade_RS2** The total DataSourceMatchingInfoPostUpgrade objects targeting Windows 10 version 1703 on this device. +- **DataSourceMatchingInfoPostUpgrade_RS3** The total DataSourceMatchingInfoPostUpgrade objects targeting Windows 10 version 1709 on this device. +- **DataSourceMatchingInfoPostUpgrade_RS3Setup** The count of the number of this particular object type present on this device. +- **DataSourceMatchingInfoPostUpgrade_RS4** The count of the number of this particular object type present on this device. +- **DataSourceMatchingInfoPostUpgrade_RS4Setup** The count of the number of this particular object type present on this device. +- **DataSourceMatchingInfoPostUpgrade_RS5** The count of the number of this particular object type present on this device. +- **DataSourceMatchingInfoPostUpgrade_RS5Setup** The count of the number of this particular object type present on this device. +- **DataSourceMatchingInfoPostUpgrade_TH1** The count of the number of this particular object type present on this device. +- **DataSourceMatchingInfoPostUpgrade_TH2** The count of the number of this particular object type present on this device. +- **DatasourceSystemBios_19ASetup** The count of the number of this particular object type present on this device. +- **DatasourceSystemBios_19H1** The count of the number of this particular object type present on this device. +- **DatasourceSystemBios_19H1Setup** The count of the number of this particular object type present on this device. +- **DatasourceSystemBios_RS1** The total DatasourceSystemBios objects targeting Windows 10 version 1607 present on this device. +- **DatasourceSystemBios_RS2** The total DatasourceSystemBios objects targeting Windows 10 version 1703 present on this device. +- **DatasourceSystemBios_RS3** The total DatasourceSystemBios objects targeting Windows 10 version 1709 present on this device. +- **DatasourceSystemBios_RS3Setup** The count of the number of this particular object type present on this device. +- **DatasourceSystemBios_RS4** The count of the number of this particular object type present on this device. +- **DatasourceSystemBios_RS4Setup** The count of the number of this particular object type present on this device. +- **DatasourceSystemBios_RS5** The count of the number of this particular object type present on this device. +- **DatasourceSystemBios_RS5Setup** The count of the number of this particular object type present on this device. +- **DatasourceSystemBios_TH1** The count of the number of this particular object type present on this device. +- **DatasourceSystemBios_TH2** The count of the number of this particular object type present on this device. +- **DecisionApplicationFile_19ASetup** The count of the number of this particular object type present on this device. +- **DecisionApplicationFile_19H1** The count of the number of this particular object type present on this device. +- **DecisionApplicationFile_19H1Setup** The count of the number of this particular object type present on this device. +- **DecisionApplicationFile_RS1** The count of the number of this particular object type present on this device. +- **DecisionApplicationFile_RS2** The count of the number of this particular object type present on this device. +- **DecisionApplicationFile_RS3** The count of the number of this particular object type present on this device. +- **DecisionApplicationFile_RS3Setup** The count of the number of this particular object type present on this device. +- **DecisionApplicationFile_RS4** The count of the number of this particular object type present on this device. +- **DecisionApplicationFile_RS4Setup** The count of the number of this particular object type present on this device. +- **DecisionApplicationFile_RS5** The count of the number of this particular object type present on this device. +- **DecisionApplicationFile_RS5Setup** The count of the number of this particular object type present on this device. +- **DecisionApplicationFile_TH1** The count of the number of this particular object type present on this device. +- **DecisionApplicationFile_TH2** The count of the number of this particular object type present on this device. +- **DecisionDevicePnp_19ASetup** The count of the number of this particular object type present on this device. +- **DecisionDevicePnp_19H1** The count of the number of this particular object type present on this device. +- **DecisionDevicePnp_19H1Setup** The count of the number of this particular object type present on this device. +- **DecisionDevicePnp_RS1** The total DecisionDevicePnp objects targeting Windows 10 version 1607 on this device. +- **DecisionDevicePnp_RS2** The count of the number of this particular object type present on this device. +- **DecisionDevicePnp_RS3** The count of the number of this particular object type present on this device. +- **DecisionDevicePnp_RS3Setup** The count of the number of this particular object type present on this device. +- **DecisionDevicePnp_RS4** The count of the number of this particular object type present on this device. +- **DecisionDevicePnp_RS4Setup** The count of the number of this particular object type present on this device. +- **DecisionDevicePnp_RS5** The count of the number of this particular object type present on this device. +- **DecisionDevicePnp_RS5Setup** The count of the number of this particular object type present on this device. +- **DecisionDevicePnp_TH1** The count of the number of this particular object type present on this device. +- **DecisionDevicePnp_TH2** The count of the number of this particular object type present on this device. +- **DecisionDriverPackage_19ASetup** The count of the number of this particular object type present on this device. +- **DecisionDriverPackage_19H1** The count of the number of this particular object type present on this device. +- **DecisionDriverPackage_19H1Setup** The count of the number of this particular object type present on this device. +- **DecisionDriverPackage_RS1** The total DecisionDriverPackage objects targeting Windows 10 version 1607 on this device. +- **DecisionDriverPackage_RS2** The count of the number of this particular object type present on this device. +- **DecisionDriverPackage_RS3** The count of the number of this particular object type present on this device. +- **DecisionDriverPackage_RS3Setup** The count of the number of this particular object type present on this device. +- **DecisionDriverPackage_RS4** The count of the number of this particular object type present on this device. +- **DecisionDriverPackage_RS4Setup** The count of the number of this particular object type present on this device. +- **DecisionDriverPackage_RS5** The count of the number of this particular object type present on this device. +- **DecisionDriverPackage_RS5Setup** The count of the number of this particular object type present on this device. +- **DecisionDriverPackage_TH1** The count of the number of this particular object type present on this device. +- **DecisionDriverPackage_TH2** The count of the number of this particular object type present on this device. +- **DecisionMatchingInfoBlock_19ASetup** The count of the number of this particular object type present on this device. +- **DecisionMatchingInfoBlock_19H1** The count of the number of this particular object type present on this device. +- **DecisionMatchingInfoBlock_19H1Setup** The count of the number of this particular object type present on this device. +- **DecisionMatchingInfoBlock_RS1** The total DecisionMatchingInfoBlock objects targeting Windows 10 version 1607 present on this device. +- **DecisionMatchingInfoBlock_RS2** The total DecisionMatchingInfoBlock objects targeting Windows 10 version 1703 present on this device. +- **DecisionMatchingInfoBlock_RS3** The total DecisionMatchingInfoBlock objects targeting Windows 10 version 1709 present on this device. +- **DecisionMatchingInfoBlock_RS3Setup** The count of the number of this particular object type present on this device. +- **DecisionMatchingInfoBlock_RS4** The total DecisionMatchingInfoBlock objects targeting Windows 10 version 1803 present on this device. +- **DecisionMatchingInfoBlock_RS4Setup** The count of the number of this particular object type present on this device. +- **DecisionMatchingInfoBlock_RS5** The count of the number of this particular object type present on this device. +- **DecisionMatchingInfoBlock_RS5Setup** The count of the number of this particular object type present on this device. +- **DecisionMatchingInfoBlock_TH1** The count of the number of this particular object type present on this device. +- **DecisionMatchingInfoBlock_TH2** The count of the number of this particular object type present on this device. +- **DecisionMatchingInfoPassive_19ASetup** The count of the number of this particular object type present on this device. +- **DecisionMatchingInfoPassive_19H1** The count of the number of this particular object type present on this device. +- **DecisionMatchingInfoPassive_19H1Setup** The count of the number of this particular object type present on this device. +- **DecisionMatchingInfoPassive_RS1** The total DecisionMatchingInfoPassive objects targeting Windows 10 version 1607 on this device. +- **DecisionMatchingInfoPassive_RS2** The total DecisionMatchingInfoPassive objects targeting Windows 10 version 1703 on this device. +- **DecisionMatchingInfoPassive_RS3** The total DecisionMatchingInfoPassive objects targeting Windows 10 version 1803 on this device. +- **DecisionMatchingInfoPassive_RS3Setup** The count of the number of this particular object type present on this device. +- **DecisionMatchingInfoPassive_RS4** The count of the number of this particular object type present on this device. +- **DecisionMatchingInfoPassive_RS4Setup** The count of the number of this particular object type present on this device. +- **DecisionMatchingInfoPassive_RS5** The count of the number of this particular object type present on this device. +- **DecisionMatchingInfoPassive_RS5Setup** The count of the number of this particular object type present on this device. +- **DecisionMatchingInfoPassive_TH1** The count of the number of this particular object type present on this device. +- **DecisionMatchingInfoPassive_TH2** The count of the number of this particular object type present on this device. +- **DecisionMatchingInfoPostUpgrade_19ASetup** The count of the number of this particular object type present on this device. +- **DecisionMatchingInfoPostUpgrade_19H1** The count of the number of this particular object type present on this device. +- **DecisionMatchingInfoPostUpgrade_19H1Setup** The count of the number of this particular object type present on this device. +- **DecisionMatchingInfoPostUpgrade_RS1** The total DecisionMatchingInfoPostUpgrade objects targeting Windows 10 version 1607 on this device. +- **DecisionMatchingInfoPostUpgrade_RS2** The total DecisionMatchingInfoPostUpgrade objects targeting Windows 10 version 1703 on this device. +- **DecisionMatchingInfoPostUpgrade_RS3** The total DecisionMatchingInfoPostUpgrade objects targeting Windows 10 version 1709 on this device. +- **DecisionMatchingInfoPostUpgrade_RS3Setup** The count of the number of this particular object type present on this device. +- **DecisionMatchingInfoPostUpgrade_RS4** The count of the number of this particular object type present on this device. +- **DecisionMatchingInfoPostUpgrade_RS4Setup** The count of the number of this particular object type present on this device. +- **DecisionMatchingInfoPostUpgrade_RS5** The count of the number of this particular object type present on this device. +- **DecisionMatchingInfoPostUpgrade_RS5Setup** The count of the number of this particular object type present on this device. +- **DecisionMatchingInfoPostUpgrade_TH1** The count of the number of this particular object type present on this device. +- **DecisionMatchingInfoPostUpgrade_TH2** The count of the number of this particular object type present on this device. +- **DecisionMediaCenter_19ASetup** The count of the number of this particular object type present on this device. +- **DecisionMediaCenter_19H1** The count of the number of this particular object type present on this device. +- **DecisionMediaCenter_19H1Setup** The total DecisionMediaCenter objects targeting the next release of Windows on this device. +- **DecisionMediaCenter_RS1** The total DecisionMediaCenter objects targeting Windows 10 version 1607 present on this device. +- **DecisionMediaCenter_RS2** The total DecisionMediaCenter objects targeting Windows 10 version 1703 present on this device. +- **DecisionMediaCenter_RS3** The total DecisionMediaCenter objects targeting Windows 10 version 1709 present on this device. +- **DecisionMediaCenter_RS3Setup** The count of the number of this particular object type present on this device. +- **DecisionMediaCenter_RS4** The total DecisionMediaCenter objects targeting Windows 10 version 1803 present on this device. +- **DecisionMediaCenter_RS4Setup** The count of the number of this particular object type present on this device. +- **DecisionMediaCenter_RS5** The count of the number of this particular object type present on this device. +- **DecisionMediaCenter_RS5Setup** The count of the number of this particular object type present on this device. +- **DecisionMediaCenter_TH1** The count of the number of this particular object type present on this device. +- **DecisionMediaCenter_TH2** The count of the number of this particular object type present on this device. +- **DecisionSystemBios_19ASetup** The total DecisionSystemBios objects targeting the next release of Windows on this device. +- **DecisionSystemBios_19H1** The count of the number of this particular object type present on this device. +- **DecisionSystemBios_19H1Setup** The total DecisionSystemBios objects targeting the next release of Windows on this device. +- **DecisionSystemBios_RS1** The total DecisionSystemBios objects targeting Windows 10 version 1607 on this device. +- **DecisionSystemBios_RS2** The total DecisionSystemBios objects targeting Windows 10 version 1703 on this device. +- **DecisionSystemBios_RS3** The total DecisionSystemBios objects targeting Windows 10 version 1709 on this device. +- **DecisionSystemBios_RS3Setup** The count of the number of this particular object type present on this device. +- **DecisionSystemBios_RS4** The total DecisionSystemBios objects targeting Windows 10 version, 1803 present on this device. +- **DecisionSystemBios_RS4Setup** The total DecisionSystemBios objects targeting the next release of Windows on this device. +- **DecisionSystemBios_RS5** The total DecisionSystemBios objects targeting the next release of Windows on this device. +- **DecisionSystemBios_RS5Setup** The total DecisionSystemBios objects targeting the next release of Windows on this device. +- **DecisionSystemBios_TH1** The count of the number of this particular object type present on this device. +- **DecisionSystemBios_TH2** The count of the number of this particular object type present on this device. +- **DecisionSystemProcessor_RS2** The count of the number of this particular object type present on this device. +- **DecisionTest_RS1** An ID for the system, calculated by hashing hardware identifiers. +- **InventoryApplicationFile** The count of the number of this particular object type present on this device. +- **InventoryDeviceContainer** A count of device container objects in cache. +- **InventoryDevicePnp** A count of device Plug and Play objects in cache. +- **InventoryDriverBinary** A count of driver binary objects in cache. +- **InventoryDriverPackage** A count of device objects in cache. +- **InventoryLanguagePack** The count of the number of this particular object type present on this device. +- **InventoryMediaCenter** The count of the number of this particular object type present on this device. +- **InventorySystemBios** The count of the number of this particular object type present on this device. +- **InventorySystemMachine** The count of the number of this particular object type present on this device. +- **InventorySystemProcessor** The count of the number of this particular object type present on this device. +- **InventoryTest** The count of the number of this particular object type present on this device. +- **InventoryUplevelDriverPackage** The count of the number of this particular object type present on this device. +- **PCFP** The count of the number of this particular object type present on this device. +- **SystemMemory** The count of the number of this particular object type present on this device. +- **SystemProcessorCompareExchange** The count of the number of this particular object type present on this device. +- **SystemProcessorLahfSahf** The count of the number of this particular object type present on this device. +- **SystemProcessorNx** The total number of objects of this type present on this device. +- **SystemProcessorPrefetchW** The total number of objects of this type present on this device. +- **SystemProcessorSse2** The total number of objects of this type present on this device. +- **SystemTouch** The count of the number of this particular object type present on this device. +- **SystemWim** The total number of objects of this type present on this device. +- **SystemWindowsActivationStatus** The count of the number of this particular object type present on this device. +- **SystemWlan** The total number of objects of this type present on this device. +- **Wmdrm_19ASetup** The count of the number of this particular object type present on this device. +- **Wmdrm_19H1** The count of the number of this particular object type present on this device. +- **Wmdrm_19H1Setup** The total Wmdrm objects targeting the next release of Windows on this device. +- **Wmdrm_RS1** An ID for the system, calculated by hashing hardware identifiers. +- **Wmdrm_RS2** An ID for the system, calculated by hashing hardware identifiers. +- **Wmdrm_RS3** An ID for the system, calculated by hashing hardware identifiers. +- **Wmdrm_RS3Setup** The count of the number of this particular object type present on this device. +- **Wmdrm_RS4** The total Wmdrm objects targeting Windows 10, version 1803 present on this device. +- **Wmdrm_RS4Setup** The count of the number of this particular object type present on this device. +- **Wmdrm_RS5** The count of the number of this particular object type present on this device. +- **Wmdrm_RS5Setup** The count of the number of this particular object type present on this device. +- **Wmdrm_TH1** The count of the number of this particular object type present on this device. +- **Wmdrm_TH2** The count of the number of this particular object type present on this device. + + +### Microsoft.Windows.Appraiser.General.DatasourceApplicationFileAdd + +Represents the basic metadata about specific application files installed on the system. + +This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedeviceinventorychange). + +The following fields are available: + +- **AppraiserVersion** The version of the appraiser file that is generating the events. +- **AvDisplayName** If the app is an anti-virus app, this is its display name. +- **CompatModelIndex** The compatibility prediction for this file. +- **HasCitData** Indicates whether the file is present in CIT data. +- **HasUpgradeExe** Indicates whether the anti-virus app has an upgrade.exe file. +- **IsAv** Is the file an anti-virus reporting EXE? +- **ResolveAttempted** This will always be an empty string when sending telemetry. +- **SdbEntries** An array of fields that indicates the SDB entries that apply to this file. + + +### Microsoft.Windows.Appraiser.General.DatasourceApplicationFileRemove + +This event indicates that the DatasourceApplicationFile object is no longer present. + +This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedeviceinventorychange). + +The following fields are available: + +- **AppraiserVersion** The version of the Appraiser file that is generating the events. + + +### Microsoft.Windows.Appraiser.General.DatasourceApplicationFileStartSync + +This event indicates that a new set of DatasourceApplicationFileAdd events will be sent. + +This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedeviceinventorychange). + +The following fields are available: + +- **AppraiserVersion** The version of the Appraiser file that is generating the events. + + +### Microsoft.Windows.Appraiser.General.DatasourceDevicePnpAdd + +This event sends compatibility data for a Plug and Play device, to help keep Windows up to date. + +This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedeviceinventorychange). + +The following fields are available: + +- **ActiveNetworkConnection** Indicates whether the device is an active network device. +- **AppraiserVersion** The version of the appraiser file generating the events. +- **CosDeviceRating** An enumeration that indicates if there is a driver on the target operating system. +- **CosDeviceSolution** An enumeration that indicates how a driver on the target operating system is available. +- **CosDeviceSolutionUrl** Microsoft.Windows.Appraiser.General.DatasourceDevicePnpAdd . Empty string +- **CosPopulatedFromId** The expected uplevel driver matching ID based on driver coverage data. +- **IsBootCritical** Indicates whether the device boot is critical. +- **UplevelInboxDriver** Indicates whether there is a driver uplevel for this device. +- **WuDriverCoverage** Indicates whether there is a driver uplevel for this device, according to Windows Update. +- **WuDriverUpdateId** The Windows Update ID of the applicable uplevel driver. +- **WuPopulatedFromId** The expected uplevel driver matching ID based on driver coverage from Windows Update. + + +### Microsoft.Windows.Appraiser.General.DatasourceDevicePnpRemove + +This event indicates that the DatasourceDevicePnp object is no longer present. + +This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedeviceinventorychange). + +The following fields are available: + +- **AppraiserVersion** The version of the Appraiser file that is generating the events. + + +### Microsoft.Windows.Appraiser.General.DatasourceDevicePnpStartSync + +This event indicates that a new set of DatasourceDevicePnpAdd events will be sent. + +This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedeviceinventorychange). + +The following fields are available: + +- **AppraiserVersion** The version of the Appraiser file that is generating the events. + + +### Microsoft.Windows.Appraiser.General.DatasourceDriverPackageAdd + +This event sends compatibility database data about driver packages to help keep Windows up to date. + +This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedeviceinventorychange). + +The following fields are available: + +- **AppraiserVersion** The version of the appraiser file generating the events. + + +### Microsoft.Windows.Appraiser.General.DatasourceDriverPackageStartSync + +This event indicates that a new set of DatasourceDriverPackageAdd events will be sent. + +This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedeviceinventorychange). + +The following fields are available: + +- **AppraiserVersion** The version of the Appraiser file that is generating the events. + + +### Microsoft.Windows.Appraiser.General.DataSourceMatchingInfoBlockAdd + +This event sends blocking data about any compatibility blocking entries hit on the system that are not directly related to specific applications or devices, to help keep Windows up-to-date. + +This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedeviceinventorychange). + +The following fields are available: + +- **AppraiserVersion** The version of the appraiser file generating the events. + + +### Microsoft.Windows.Appraiser.General.DataSourceMatchingInfoBlockRemove + +This event indicates that the DataSourceMatchingInfoBlock object is no longer present. + +This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedeviceinventorychange). + +The following fields are available: + +- **AppraiserVersion** The version of the Appraiser file that is generating the events. + + +### Microsoft.Windows.Appraiser.General.DataSourceMatchingInfoBlockStartSync + +This event indicates that a full set of DataSourceMatchingInfoBlockStAdd events have been sent. + +This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedeviceinventorychange). + +The following fields are available: + +- **AppraiserVersion** The version of the Appraiser file that is generating the events. + + +### Microsoft.Windows.Appraiser.General.DataSourceMatchingInfoPassiveAdd + +This event sends compatibility database information about non-blocking compatibility entries on the system that are not keyed by either applications or devices, to help keep Windows up-to-date. + +This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedeviceinventorychange). + +The following fields are available: + +- **AppraiserVersion** The version of the appraiser file generating the events. + + +### Microsoft.Windows.Appraiser.General.DataSourceMatchingInfoPassiveRemove + +This event indicates that the DataSourceMatchingInfoPassive object is no longer present. + +This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedeviceinventorychange). + +The following fields are available: + +- **AppraiserVersion** The version of the Appraiser file that is generating the events. + + +### Microsoft.Windows.Appraiser.General.DataSourceMatchingInfoPassiveStartSync + +This event indicates that a new set of DataSourceMatchingInfoPassiveAdd events will be sent. + +This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedeviceinventorychange). + +The following fields are available: + +- **AppraiserVersion** The version of the Appraiser file that is generating the events. + + +### Microsoft.Windows.Appraiser.General.DataSourceMatchingInfoPostUpgradeAdd + +This event sends compatibility database information about entries requiring reinstallation after an upgrade on the system that are not keyed by either applications or devices, to help keep Windows up-to-date. + +This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedeviceinventorychange). + +The following fields are available: + +- **AppraiserVersion** The version of the appraiser file generating the events. + + +### Microsoft.Windows.Appraiser.General.DataSourceMatchingInfoPostUpgradeRemove + +This event indicates that the DataSourceMatchingInfoPostUpgrade object is no longer present. + +This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedeviceinventorychange). + +The following fields are available: + +- **AppraiserVersion** The version of the Appraiser file that is generating the events. + + +### Microsoft.Windows.Appraiser.General.DataSourceMatchingInfoPostUpgradeStartSync + +This event indicates that a new set of DataSourceMatchingInfoPostUpgradeAdd events will be sent. + +This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedeviceinventorychange). + +The following fields are available: + +- **AppraiserVersion** The version of the Appraiser file that is generating the events. + + +### Microsoft.Windows.Appraiser.General.DatasourceSystemBiosAdd + +This event sends compatibility database information about the BIOS to help keep Windows up-to-date. + +This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedeviceinventorychange). + +The following fields are available: + +- **AppraiserVersion** The version of the Appraiser file generating the events. + + +### Microsoft.Windows.Appraiser.General.DatasourceSystemBiosRemove + +This event indicates that the DatasourceSystemBios object is no longer present. + +This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedeviceinventorychange). + +The following fields are available: + +- **AppraiserVersion** The version of the Appraiser file that is generating the events. + + +### Microsoft.Windows.Appraiser.General.DatasourceSystemBiosStartSync + +This event indicates that a new set of DatasourceSystemBiosAdd events will be sent. + +This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedeviceinventorychange). + +The following fields are available: + +- **AppraiserVersion** The version of the Appraiser file that is generating the events. + + +### Microsoft.Windows.Appraiser.General.DecisionApplicationFileAdd + +This event sends compatibility decision data about a file to help keep Windows up-to-date. + +This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedeviceinventorychange). + +The following fields are available: + +- **AppraiserVersion** The version of the appraiser file that is generating the events. +- **BlockAlreadyInbox** The uplevel runtime block on the file already existed on the current OS. +- **BlockingApplication** Indicates whether there are any application issues that interfere with the upgrade due to the file in question. +- **DisplayGenericMessage** Will be a generic message be shown for this file? +- **DisplayGenericMessageGated** Indicates whether a generic message be shown for this file. +- **HardBlock** This file is blocked in the SDB. +- **HasUxBlockOverride** Does the file have a block that is overridden by a tag in the SDB? +- **MigApplication** Does the file have a MigXML from the SDB associated with it that applies to the current upgrade mode? +- **MigRemoval** Does the file have a MigXML from the SDB that will cause the app to be removed on upgrade? +- **NeedsDismissAction** Will the file cause an action that can be dimissed? +- **NeedsInstallPostUpgradeData** After upgrade, the file will have a post-upgrade notification to install a replacement for the app. +- **NeedsNotifyPostUpgradeData** Does the file have a notification that should be shown after upgrade? +- **NeedsReinstallPostUpgradeData** After upgrade, this file will have a post-upgrade notification to reinstall the app. +- **NeedsUninstallAction** The file must be uninstalled to complete the upgrade. +- **SdbBlockUpgrade** The file is tagged as blocking upgrade in the SDB, +- **SdbBlockUpgradeCanReinstall** The file is tagged as blocking upgrade in the SDB. It can be reinstalled after upgrade. +- **SdbBlockUpgradeUntilUpdate** The file is tagged as blocking upgrade in the SDB. If the app is updated, the upgrade can proceed. +- **SdbReinstallUpgrade** The file is tagged as needing to be reinstalled after upgrade in the SDB. It does not block upgrade. +- **SdbReinstallUpgradeWarn** The file is tagged as needing to be reinstalled after upgrade with a warning in the SDB. It does not block upgrade. +- **SoftBlock** The file is softblocked in the SDB and has a warning. + + +### Microsoft.Windows.Appraiser.General.DecisionApplicationFileRemove + +This event indicates Indicates that the DecisionApplicationFile object is no longer present. + +This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedeviceinventorychange). + +The following fields are available: + +- **AppraiserVersion** The version of the Appraiser file that is generating the events. + + +### Microsoft.Windows.Appraiser.General.DecisionApplicationFileStartSync + +This event indicates that a new set of DecisionApplicationFileAdd events will be sent. + +This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedeviceinventorychange). + +The following fields are available: + +- **AppraiserVersion** The version of the Appraiser file that is generating the events. + + +### Microsoft.Windows.Appraiser.General.DecisionDevicePnpAdd + +This event sends compatibility decision data about a PNP device to help keep Windows up to date. + +This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedeviceinventorychange). + +The following fields are available: + +- **AppraiserVersion** The version of the appraiser file generating the events. +- **AssociatedDriverIsBlocked** Is the driver associated with this PNP device blocked? +- **AssociatedDriverWillNotMigrate** Will the driver associated with this plug-and-play device migrate? +- **BlockAssociatedDriver** Should the driver associated with this PNP device be blocked? +- **BlockingDevice** Is this PNP device blocking upgrade? +- **BlockUpgradeIfDriverBlocked** Is the PNP device both boot critical and does not have a driver included with the OS? +- **BlockUpgradeIfDriverBlockedAndOnlyActiveNetwork** Is this PNP device the only active network device? +- **DisplayGenericMessage** Will a generic message be shown during Setup for this PNP device? +- **DisplayGenericMessageGated** Indicates whether a generic message will be shown during Setup for this PNP device. +- **DriverAvailableInbox** Is a driver included with the operating system for this PNP device? +- **DriverAvailableOnline** Is there a driver for this PNP device on Windows Update? +- **DriverAvailableUplevel** Is there a driver on Windows Update or included with the operating system for this PNP device? +- **DriverBlockOverridden** Is there is a driver block on the device that has been overridden? +- **DriverJlockOverridden** No content is currently available. +- **NeedsDismissAction** Will the user would need to dismiss a warning during Setup for this device? +- **NotRegressed** Does the device have a problem code on the source OS that is no better than the one it would have on the target OS? +- **SdbDeviceBlockUpgrade** Is there an SDB block on the PNP device that blocks upgrade? +- **SdbDriverBlockOverridden** Is there an SDB block on the PNP device that blocks upgrade, but that block was overridden? + + +### Microsoft.Windows.Appraiser.General.DecisionDevicePnpRemove + +This event indicates that the DecisionDevicePnp object is no longer present. + +This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedeviceinventorychange). + +The following fields are available: + +- **AppraiserVersion** The version of the Appraiser file that is generating the events. + + +### Microsoft.Windows.Appraiser.General.DecisionDevicePnpStartSync + +The DecisionDevicePnpStartSync event indicates that a new set of DecisionDevicePnpAdd events will be sent. + +This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedeviceinventorychange). + +The following fields are available: + +- **AppraiserVersion** The version of the Appraiser file that is generating the events. + + +### Microsoft.Windows.Appraiser.General.DecisionDriverPackageAdd + +This event sends decision data about driver package compatibility to help keep Windows up to date. + +This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedeviceinventorychange). + +The following fields are available: + +- **AppraiserVersion** The version of the appraiser file generating the events. +- **DisplayGenericMessageGated** Indicates whether a generic offer block message will be shown for this driver package. +- **DriverBlockOverridden** Does the driver package have an SDB block that blocks it from migrating, but that block has been overridden? +- **DriverIsDeviceBlocked** Was the driver package was blocked because of a device block? +- **DriverIsDriverBlocked** Is the driver package blocked because of a driver block? +- **DriverIsTroubleshooterBlocked** Indicates whether the driver package is blocked because of a troubleshooter block. +- **DriverShouldNotMigrate** Should the driver package be migrated during upgrade? +- **SdbDriverBlockOverridden** Does the driver package have an SDB block that blocks it from migrating, but that block has been overridden? + + +### Microsoft.Windows.Appraiser.General.DecisionDriverPackageRemove + +This event indicates that the DecisionDriverPackage object is no longer present. + +This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedeviceinventorychange). + +The following fields are available: + +- **AppraiserVersion** The version of the Appraiser file that is generating the events. + + +### Microsoft.Windows.Appraiser.General.DecisionDriverPackageStartSync + +This event indicates that a new set of DecisionDriverPackageAdd events will be sent. + +This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedeviceinventorychange). + +The following fields are available: + +- **AppraiserVersion** The version of the Appraiser file that is generating the events. + + +### Microsoft.Windows.Appraiser.General.DecisionMatchingInfoBlockAdd + +This event sends compatibility decision data about blocking entries on the system that are not keyed by either applications or devices, to help keep Windows up to date. + +This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedeviceinventorychange). + +The following fields are available: + +- **AppraiserVersion** The version of the appraiser file generating the events. +- **BlockingApplication** Are there are any application issues that interfere with upgrade due to matching info blocks? +- **DisplayGenericMessage** Will a generic message be shown for this block? +- **NeedsUninstallAction** Does the user need to take an action in setup due to a matching info block? +- **SdbBlockUpgrade** Is a matching info block blocking upgrade? +- **SdbBlockUpgradeCanReinstall** Is a matching info block blocking upgrade, but has the can reinstall tag? +- **SdbBlockUpgradeUntilUpdate** Is a matching info block blocking upgrade but has the until update tag? + + +### Microsoft.Windows.Appraiser.General.DecisionMatchingInfoBlockRemove + +This event indicates that the DecisionMatchingInfoBlock object is no longer present. + +This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedeviceinventorychange). + +The following fields are available: + +- **AppraiserVersion** The version of the Appraiser file that is generating the events. + + +### Microsoft.Windows.Appraiser.General.DecisionMatchingInfoBlockStartSync + +This event indicates that a new set of DecisionMatchingInfoBlockAdd events will be sent. + +This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedeviceinventorychange). + +The following fields are available: + +- **AppraiserVersion** The version of the Appraiser file that is generating the events. + + +### Microsoft.Windows.Appraiser.General.DecisionMatchingInfoPassiveAdd + +This event sends compatibility decision data about non-blocking entries on the system that are not keyed by either applications or devices, to help keep Windows up to date. + +This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedeviceinventorychange). + +The following fields are available: + +- **AppraiserVersion** The version of the Appraiser file that is generating the events. +- **BlockingApplication** Are there any application issues that interfere with upgrade due to matching info blocks? +- **DisplayGenericMessageGated** Indicates whether a generic offer block message will be shown due to matching info blocks. +- **MigApplication** Is there a matching info block with a mig for the current mode of upgrade? + + +### Microsoft.Windows.Appraiser.General.DecisionMatchingInfoPassiveRemove + +This event Indicates that the DecisionMatchingInfoPassive object is no longer present. + +This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedeviceinventorychange). + +The following fields are available: + +- **AppraiserVersion** The version of the Appraiser file that is generating the events. + + +### Microsoft.Windows.Appraiser.General.DecisionMatchingInfoPassiveStartSync + +This event indicates that a new set of DecisionMatchingInfoPassiveAdd events will be sent. + +This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedeviceinventorychange). + +The following fields are available: + +- **AppraiserVersion** The version of the Appraiser file that is generating the events. + + +### Microsoft.Windows.Appraiser.General.DecisionMatchingInfoPostUpgradeAdd + +This event sends compatibility decision data about entries that require reinstall after upgrade. It's used to help keep Windows up to date. + +This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedeviceinventorychange). + +The following fields are available: + +- **AppraiserVersion** The version of the Appraiser file that is generating the events. +- **NeedsInstallPostUpgradeData** Will the file have a notification after upgrade to install a replacement for the app? +- **NeedsNotifyPostUpgradeData** Should a notification be shown for this file after upgrade? +- **NeedsReinstallPostUpgradeData** Will the file have a notification after upgrade to reinstall the app? +- **SdbReinstallUpgrade** The file is tagged as needing to be reinstalled after upgrade in the compatibility database (but is not blocking upgrade). + + +### Microsoft.Windows.Appraiser.General.DecisionMatchingInfoPostUpgradeRemove + +This event indicates that the DecisionMatchingInfoPostUpgrade object is no longer present. + +This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedeviceinventorychange). + +The following fields are available: + +- **AppraiserVersion** The version of the Appraiser file that is generating the events. + + +### Microsoft.Windows.Appraiser.General.DecisionMatchingInfoPostUpgradeStartSync + +This event indicates that a new set of DecisionMatchingInfoPostUpgradeAdd events will be sent. + +This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedeviceinventorychange). + +The following fields are available: + +- **AppraiserVersion** The version of the Appraiser file that is generating the events. + + +### Microsoft.Windows.Appraiser.General.DecisionMediaCenterAdd + +This event sends decision data about the presence of Windows Media Center, to help keep Windows up to date. + +This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedeviceinventorychange). + +The following fields are available: + +- **AppraiserVersion** The version of the Appraiser file generating the events. +- **BlockingApplication** Is there any application issues that interfere with upgrade due to Windows Media Center? +- **MediaCenterActivelyUsed** If Windows Media Center is supported on the edition, has it been run at least once and are the MediaCenterIndicators are true? +- **MediaCenterIndicators** Do any indicators imply that Windows Media Center is in active use? +- **MediaCenterInUse** Is Windows Media Center actively being used? +- **MediaCenterPaidOrActivelyUsed** Is Windows Media Center actively being used or is it running on a supported edition? +- **NeedsDismissAction** Are there any actions that can be dismissed coming from Windows Media Center? + + +### Microsoft.Windows.Appraiser.General.DecisionMediaCenterRemove + +This event indicates that the DecisionMediaCenter object is no longer present. + +This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedeviceinventorychange). + +The following fields are available: + +- **AppraiserVersion** The version of the Appraiser file that is generating the events. + + +### Microsoft.Windows.Appraiser.General.DecisionMediaCenterStartSync + +This event indicates that a new set of DecisionMediaCenterAdd events will be sent. + +This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedeviceinventorychange). + +The following fields are available: + +- **AppraiserVersion** The version of the Appraiser file that is generating the events. + + +### Microsoft.Windows.Appraiser.General.DecisionSystemBiosAdd + +This event sends compatibility decision data about the BIOS to help keep Windows up to date. + +This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedeviceinventorychange). + +The following fields are available: + +- **AppraiserVersion** The version of the Appraiser file generating the events. +- **Blocking** Is the device blocked from upgrade due to a BIOS block? +- **DisplayGenericMessageGated** Indicates whether a generic offer block message will be shown for the bios. +- **HasBiosBlock** Does the device have a BIOS block? + + +### Microsoft.Windows.Appraiser.General.DecisionSystemBiosRemove + +This event indicates that the DecisionSystemBios object is no longer present. + +This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedeviceinventorychange). + +The following fields are available: + +- **AppraiserVersion** The version of the Appraiser file that is generating the events. + + +### Microsoft.Windows.Appraiser.General.DecisionSystemBiosStartSync + +This event indicates that a new set of DecisionSystemBiosAdd events will be sent. + +This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedeviceinventorychange). + +The following fields are available: + +- **AppraiserVersion** The version of the Appraiser file that is generating the events. + + +### Microsoft.Windows.Appraiser.General.GatedRegChange + +This event sends data about the results of running a set of quick-blocking instructions, to help keep Windows up to date. + +The following fields are available: + +- **NewData** The data in the registry value after the scan completed. +- **OldData** The previous data in the registry value before the scan ran. +- **PCFP** An ID for the system calculated by hashing hardware identifiers. +- **RegKey** The registry key name for which a result is being sent. +- **RegValue** The registry value for which a result is being sent. +- **Time** The client time of the event. + + +### Microsoft.Windows.Appraiser.General.InventoryApplicationFileAdd + +This event represents the basic metadata about a file on the system. The file must be part of an app and either have a block in the compatibility database or be part of an antivirus program. + +This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedeviceinventorychange). + +The following fields are available: + +- **AppraiserVersion** The version of the Appraiser file generating the events. +- **AvDisplayName** If the app is an antivirus app, this is its display name. +- **AvProductState** Indicates whether the antivirus program is turned on and the signatures are up to date. +- **BinaryType** A binary type. Example: UNINITIALIZED, ZERO_BYTE, DATA_ONLY, DOS_MODULE, NE16_MODULE, PE32_UNKNOWN, PE32_I386, PE32_ARM, PE64_UNKNOWN, PE64_AMD64, PE64_ARM64, PE64_IA64, PE32_CLR_32, PE32_CLR_IL, PE32_CLR_IL_PREFER32, PE64_CLR_64. +- **BinFileVersion** An attempt to clean up FileVersion at the client that tries to place the version into 4 octets. +- **BinProductVersion** An attempt to clean up ProductVersion at the client that tries to place the version into 4 octets. +- **BoeProgramId** If there is no entry in Add/Remove Programs, this is the ProgramID that is generated from the file metadata. +- **CompanyName** The company name of the vendor who developed this file. +- **FileId** A hash that uniquely identifies a file. +- **FileVersion** The File version field from the file metadata under Properties -> Details. +- **HasUpgradeExe** Indicates whether the antivirus app has an upgrade.exe file. +- **IsAv** Indicates whether the file an antivirus reporting EXE. +- **LinkDate** The date and time that this file was linked on. +- **LowerCaseLongPath** The full file path to the file that was inventoried on the device. +- **Name** The name of the file that was inventoried. +- **ProductName** The Product name field from the file metadata under Properties -> Details. +- **ProductVersion** The Product version field from the file metadata under Properties -> Details. +- **ProgramId** A hash of the Name, Version, Publisher, and Language of an application used to identify it. +- **Size** The size of the file (in hexadecimal bytes). + + +### Microsoft.Windows.Appraiser.General.InventoryApplicationFileRemove + +This event indicates that the InventoryApplicationFile object is no longer present. + +This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedeviceinventorychange). + +The following fields are available: + +- **AppraiserVersion** The version of the Appraiser file that is generating the events. + + +### Microsoft.Windows.Appraiser.General.InventoryApplicationFileStartSync + +This event indicates indicates that a new set of InventoryApplicationFileAdd events will be sent. + +This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedeviceinventorychange). + +The following fields are available: + +- **AppraiserVersion** The version of the Appraiser file that is generating the events. + + +### Microsoft.Windows.Appraiser.General.InventoryLanguagePackAdd + +This event sends data about the number of language packs installed on the system, to help keep Windows up to date. + +This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedeviceinventorychange). + +The following fields are available: + +- **AppraiserVersion** The version of the Appraiser file that is generating the events. +- **HasLanguagePack** Indicates whether this device has 2 or more language packs. +- **LanguagePackCount** The number of language packs are installed. + + +### Microsoft.Windows.Appraiser.General.InventoryLanguagePackRemove + +This event indicates that the InventoryLanguagePack object is no longer present. + +This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedeviceinventorychange). + +The following fields are available: + +- **AppraiserVersion** The version of the Appraiser file that is generating the events. + + +### Microsoft.Windows.Appraiser.General.InventoryLanguagePackStartSync + +This event indicates that a new set of InventoryLanguagePackAdd events will be sent. + +This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedeviceinventorychange). + +The following fields are available: + +- **AppraiserVersion** The version of the Appraiser file that is generating the events. + + +### Microsoft.Windows.Appraiser.General.InventoryMediaCenterAdd + +This event sends true/false data about decision points used to understand whether Windows Media Center is used on the system, to help keep Windows up to date. + +This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedeviceinventorychange). + +The following fields are available: + +- **AppraiserVersion** The version of the Appraiser file generating the events. +- **EverLaunched** Has Windows Media Center ever been launched? +- **HasConfiguredTv** Has the user configured a TV tuner through Windows Media Center? +- **HasExtendedUserAccounts** Are any Windows Media Center Extender user accounts configured? +- **HasWatchedFolders** Are any folders configured for Windows Media Center to watch? +- **IsDefaultLauncher** Is Windows Media Center the default app for opening music or video files? +- **IsPaid** Is the user running a Windows Media Center edition that implies they paid for Windows Media Center? +- **IsSupported** Does the running OS support Windows Media Center? + + +### Microsoft.Windows.Appraiser.General.InventoryMediaCenterRemove + +This event indicates that the InventoryMediaCenter object is no longer present. + +This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedeviceinventorychange). + +The following fields are available: + +- **AppraiserVersion** The version of the Appraiser file that is generating the events. + + +### Microsoft.Windows.Appraiser.General.InventoryMediaCenterStartSync + +This event indicates that a new set of InventoryMediaCenterAdd events will be sent. + +This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedeviceinventorychange). + +The following fields are available: + +- **AppraiserVersion** The version of the Appraiser file that is generating the events. + + +### Microsoft.Windows.Appraiser.General.InventorySystemBiosAdd + +This event sends basic metadata about the BIOS to determine whether it has a compatibility block. + +This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedeviceinventorychange). + +The following fields are available: + +- **AppraiserVersion** The version of the Appraiser file that is generating the events. +- **biosDate** The release date of the BIOS in UTC format. +- **BiosDate** The release date of the BIOS in UTC format. +- **biosName** The name field from Win32_BIOS. +- **BiosName** The name field from Win32_BIOS. +- **manufacturer** The manufacturer field from Win32_ComputerSystem. +- **Manufacturer** The manufacturer field from Win32_ComputerSystem. +- **model** The model field from Win32_ComputerSystem. +- **Model** The model field from Win32_ComputerSystem. + + +### Microsoft.Windows.Appraiser.General.InventorySystemBiosRemove + +This event indicates that the InventorySystemBios object is no longer present. + +This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedeviceinventorychange). + +The following fields are available: + +- **AppraiserVersion** The version of the Appraiser file that is generating the events. + + +### Microsoft.Windows.Appraiser.General.InventorySystemBiosStartSync + +This event indicates that a new set of InventorySystemBiosAdd events will be sent. + +This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedeviceinventorychange). + +The following fields are available: + +- **AppraiserVersion** The version of the Appraiser file that is generating the events. + + +### Microsoft.Windows.Appraiser.General.InventoryUplevelDriverPackageAdd + +This event is only runs during setup. It provides a listing of the uplevel driver packages that were downloaded before the upgrade. Is critical to understanding if failures in setup can be traced to not having sufficient uplevel drivers before the upgrade. + +This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedeviceinventorychange). + +The following fields are available: + +- **AppraiserVersion** The version of the Appraiser file that is generating the events. +- **BootCritical** Is the driver package marked as boot critical? +- **Build** The build value from the driver package. +- **CatalogFile** The name of the catalog file within the driver package. +- **Class** The device class from the driver package. +- **ClassGuid** The device class unique ID from the driver package. +- **Date** The date from the driver package. +- **Inbox** Is the driver package of a driver that is included with Windows? +- **OriginalName** The original name of the INF file before it was renamed. Generally a path under $WINDOWS.~BT\Drivers\DU. +- **Provider** The provider of the driver package. +- **PublishedName** The name of the INF file after it was renamed. +- **Revision** The revision of the driver package. +- **SignatureStatus** Indicates if the driver package is signed. Unknown = 0, Unsigned = 1, Signed = 2. +- **VersionMajor** The major version of the driver package. +- **VersionMinor** The minor version of the driver package. + + +### Microsoft.Windows.Appraiser.General.InventoryUplevelDriverPackageRemove + +This event indicates that the InventoryUplevelDriverPackage object is no longer present. + +This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedeviceinventorychange). + +The following fields are available: + +- **AppraiserVersion** The version of the Appraiser file that is generating the events. + + +### Microsoft.Windows.Appraiser.General.InventoryUplevelDriverPackageStartSync + +This event indicates that a new set of InventoryUplevelDriverPackageAdd events will be sent. + +This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedeviceinventorychange). + +The following fields are available: + +- **AppraiserVersion** The version of the Appraiser file that is generating the events. + + +### Microsoft.Windows.Appraiser.General.RunContext + +This event indicates what should be expected in the data payload. + +The following fields are available: + +- **AppraiserBranch** The source branch in which the currently running version of Appraiser was built. +- **AppraiserProcess** The name of the process that launched Appraiser. +- **AppraiserVersion** The version of the Appraiser file generating the events. +- **CensusId** A unique hardware identifier. +- **Context** Indicates what mode Appraiser is running in. Example: Setup or Telemetry. +- **PCFP** An ID for the system calculated by hashing hardware identifiers. +- **Subcontext** Indicates what categories of incompatibilities appraiser is scanning for. Can be N/A, Resolve, or a semicolon-delimited list that can include App, Dev, Sys, Gat, or Rescan. +- **Time** The client time of the event. + + +### Microsoft.Windows.Appraiser.General.SystemMemoryAdd + +This event sends data on the amount of memory on the system and whether it meets requirements, to help keep Windows up-to-date. + +This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedeviceinventorychange). + +The following fields are available: + +- **AppraiserVersion** The version of the Appraiser file generating the events. +- **Blocking** Is the device from upgrade due to memory restrictions? +- **MemoryRequirementViolated** Was a memory requirement violated? +- **pageFile** The current committed memory limit for the system or the current process, whichever is smaller (in bytes). +- **ram** The amount of memory on the device. +- **ramKB** The amount of memory (in KB). +- **virtual** The size of the user-mode portion of the virtual address space of the calling process (in bytes). +- **virtualKB** The amount of virtual memory (in KB). + + +### Microsoft.Windows.Appraiser.General.SystemMemoryRemove + +This event that the SystemMemory object is no longer present. + +This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedeviceinventorychange). + +The following fields are available: + +- **AppraiserVersion** The version of the Appraiser file that is generating the events. + + +### Microsoft.Windows.Appraiser.General.SystemMemoryStartSync + +This event indicates that a new set of SystemMemoryAdd events will be sent. + +This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedeviceinventorychange). + +The following fields are available: + +- **AppraiserVersion** The version of the Appraiser file that is generating the events. + + +### Microsoft.Windows.Appraiser.General.SystemProcessorCompareExchangeAdd + +This event sends data indicating whether the system supports the CompareExchange128 CPU requirement, to help keep Windows up to date. + +This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedeviceinventorychange). + +The following fields are available: + +- **AppraiserVersion** The version of the Appraiser file generating the events. +- **Blocking** Is the upgrade blocked due to the processor? +- **CompareExchange128Support** Does the CPU support CompareExchange128? + + +### Microsoft.Windows.Appraiser.General.SystemProcessorCompareExchangeRemove + +This event indicates that the SystemProcessorCompareExchange object is no longer present. + +This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedeviceinventorychange). + +The following fields are available: + +- **AppraiserVersion** The version of the Appraiser file that is generating the events. + + +### Microsoft.Windows.Appraiser.General.SystemProcessorCompareExchangeStartSync + +This event indicates that a new set of SystemProcessorCompareExchangeAdd events will be sent. + +This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedeviceinventorychange). + +The following fields are available: + +- **AppraiserVersion** The version of the Appraiser file that is generating the events. + + +### Microsoft.Windows.Appraiser.General.SystemProcessorLahfSahfAdd + +This event sends data indicating whether the system supports the LahfSahf CPU requirement, to help keep Windows up-to-date. + +This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedeviceinventorychange). + +The following fields are available: + +- **AppraiserVersion** The version of the Appraiser file generating the events. +- **Blocking** Is the upgrade blocked due to the processor? +- **LahfSahfSupport** Does the CPU support LAHF/SAHF? + + +### Microsoft.Windows.Appraiser.General.SystemProcessorLahfSahfRemove + +This event indicates that the SystemProcessorLahfSahf object is no longer present. + +This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedeviceinventorychange). + +The following fields are available: + +- **AppraiserVersion** The version of the Appraiser file that is generating the events. + + +### Microsoft.Windows.Appraiser.General.SystemProcessorLahfSahfStartSync + +This event indicates that a new set of SystemProcessorLahfSahfAdd events will be sent. + +This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedeviceinventorychange). + +The following fields are available: + +- **AppraiserVersion** The version of the Appraiser file that is generating the events. + + +### Microsoft.Windows.Appraiser.General.SystemProcessorNxAdd + +This event sends data indicating whether the system supports the NX CPU requirement, to help keep Windows up-to-date. + +This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedeviceinventorychange). + +The following fields are available: + +- **AppraiserVersion** The version of the Appraiser file that is generating the events. +- **Blocking** Is the upgrade blocked due to the processor? +- **NXDriverResult** The result of the driver used to do a non-deterministic check for NX support. +- **NXProcessorSupport** Does the processor support NX? + + +### Microsoft.Windows.Appraiser.General.SystemProcessorNxRemove + +This event indicates that the SystemProcessorNx object is no longer present. + +This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedeviceinventorychange). + +The following fields are available: + +- **AppraiserVersion** The version of the Appraiser file that is generating the events. + + +### Microsoft.Windows.Appraiser.General.SystemProcessorNxStartSync + +This event indicates that a new set of SystemProcessorNxAdd events will be sent. + +This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedeviceinventorychange). + +The following fields are available: + +- **AppraiserVersion** The version of the Appraiser file that is generating the events. + + +### Microsoft.Windows.Appraiser.General.SystemProcessorPrefetchWAdd + +This event sends data indicating whether the system supports the PrefetchW CPU requirement, to help keep Windows up to date. + +This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedeviceinventorychange). + +The following fields are available: + +- **AppraiserVersion** The version of the Appraiser file that is generating the events. +- **Blocking** Is the upgrade blocked due to the processor? +- **PrefetchWSupport** Does the processor support PrefetchW? + + +### Microsoft.Windows.Appraiser.General.SystemProcessorPrefetchWRemove + +This event indicates that the SystemProcessorPrefetchW object is no longer present. + +This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedeviceinventorychange). + +The following fields are available: + +- **AppraiserVersion** The version of the Appraiser file that is generating the events. + + +### Microsoft.Windows.Appraiser.General.SystemProcessorPrefetchWStartSync + +This event indicates that a new set of SystemProcessorPrefetchWAdd events will be sent. + +This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedeviceinventorychange). + +The following fields are available: + +- **AppraiserVersion** The version of the Appraiser file that is generating the events. + + +### Microsoft.Windows.Appraiser.General.SystemProcessorSse2Add + +This event sends data indicating whether the system supports the SSE2 CPU requirement, to help keep Windows up to date. + +This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedeviceinventorychange). + +The following fields are available: + +- **AppraiserVersion** The version of the Appraiser file that is generating the events. +- **Blocking** Is the upgrade blocked due to the processor? +- **SSE2ProcessorSupport** Does the processor support SSE2? + + +### Microsoft.Windows.Appraiser.General.SystemProcessorSse2Remove + +This event indicates that the SystemProcessorSse2 object is no longer present. + +This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedeviceinventorychange). + +The following fields are available: + +- **AppraiserVersion** The version of the Appraiser file that is generating the events. + + +### Microsoft.Windows.Appraiser.General.SystemProcessorSse2StartSync + +This event indicates that a new set of SystemProcessorSse2Add events will be sent. + +This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedeviceinventorychange). + +The following fields are available: + +- **AppraiserVersion** The version of the Appraiser file that is generating the events. + + +### Microsoft.Windows.Appraiser.General.SystemTouchAdd + +This event sends data indicating whether the system supports touch, to help keep Windows up to date. + +This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedeviceinventorychange). + +The following fields are available: + +- **AppraiserVersion** The version of the Appraiser file that is generating the events. +- **IntegratedTouchDigitizerPresent** Is there an integrated touch digitizer? +- **MaximumTouches** The maximum number of touch points supported by the device hardware. + + +### Microsoft.Windows.Appraiser.General.SystemTouchRemove + +This event indicates that the SystemTouch object is no longer present. + +This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedeviceinventorychange). + +The following fields are available: + +- **AppraiserVersion** The version of the Appraiser file that is generating the events. + + +### Microsoft.Windows.Appraiser.General.SystemTouchStartSync + +This event indicates that a new set of SystemTouchAdd events will be sent. + +This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedeviceinventorychange). + +The following fields are available: + +- **AppraiserVersion** The version of the Appraiser file that is generating the events. + + +### Microsoft.Windows.Appraiser.General.SystemWimAdd + +This event sends data indicating whether the operating system is running from a compressed Windows Imaging Format (WIM) file, to help keep Windows up to date. + +This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedeviceinventorychange). + +The following fields are available: + +- **AppraiserVersion** The version of the Appraiser file that is generating the events. +- **IsWimBoot** Is the current operating system running from a compressed WIM file? +- **RegistryWimBootValue** The raw value from the registry that is used to indicate if the device is running from a WIM. + + +### Microsoft.Windows.Appraiser.General.SystemWimRemove + +This event indicates that the SystemWim object is no longer present. + +This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedeviceinventorychange). + +The following fields are available: + +- **AppraiserVersion** The version of the Appraiser file that is generating the events. + + +### Microsoft.Windows.Appraiser.General.SystemWimStartSync + +This event indicates that a new set of SystemWimAdd events will be sent. + +This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedeviceinventorychange). + +The following fields are available: + +- **AppraiserVersion** The version of the Appraiser file that is generating the events. + + +### Microsoft.Windows.Appraiser.General.SystemWindowsActivationStatusAdd + +This event sends data indicating whether the current operating system is activated, to help keep Windows up to date. + +This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedeviceinventorychange). + +The following fields are available: + +- **AppraiserVersion** The version of the Appraiser file that is generating the events. +- **WindowsIsLicensedApiValue** The result from the API that's used to indicate if operating system is activated. +- **WindowsNotActivatedDecision** Is the current operating system activated? + + +### Microsoft.Windows.Appraiser.General.SystemWindowsActivationStatusRemove + +This event indicates that the SystemWindowsActivationStatus object is no longer present. + +This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedeviceinventorychange). + +The following fields are available: + +- **AppraiserVersion** The version of the Appraiser file that is generating the events. + + +### Microsoft.Windows.Appraiser.General.SystemWindowsActivationStatusStartSync + +This event indicates that a new set of SystemWindowsActivationStatusAdd events will be sent. + +This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedeviceinventorychange). + +The following fields are available: + +- **AppraiserVersion** The version of the Appraiser file that is generating the events. + + +### Microsoft.Windows.Appraiser.General.SystemWlanAdd + +This event sends data indicating whether the system has WLAN, and if so, whether it uses an emulated driver that could block an upgrade, to help keep Windows up-to-date. + +This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedeviceinventorychange). + +The following fields are available: + +- **AppraiserVersion** The version of the Appraiser file that is generating the events. +- **Blocking** Is the upgrade blocked because of an emulated WLAN driver? +- **HasWlanBlock** Does the emulated WLAN driver have an upgrade block? +- **WlanEmulatedDriver** Does the device have an emulated WLAN driver? +- **WlanExists** Does the device support WLAN at all? +- **WlanModulePresent** Are any WLAN modules present? +- **WlanNativeDriver** Does the device have a non-emulated WLAN driver? + + +### Microsoft.Windows.Appraiser.General.SystemWlanRemove + +This event indicates that the SystemWlan object is no longer present. + +This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedeviceinventorychange). + +The following fields are available: + +- **AppraiserVersion** The version of the Appraiser file that is generating the events. + + +### Microsoft.Windows.Appraiser.General.SystemWlanStartSync + +This event indicates that a new set of SystemWlanAdd events will be sent. + +This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedeviceinventorychange). + +The following fields are available: + +- **AppraiserVersion** The version of the Appraiser file that is generating the events. + + +### Microsoft.Windows.Appraiser.General.TelemetryRunHealth + +This event indicates the parameters and result of a telemetry (diagnostic) run. This allows the rest of the data sent over the course of the run to be properly contextualized and understood, which is then used to keep Windows up to date. + +The following fields are available: + +- **AppraiserBranch** The source branch in which the version of Appraiser that is running was built. +- **AppraiserDataVersion** The version of the data files being used by the Appraiser telemetry run. +- **AppraiserProcess** The name of the process that launched Appraiser. +- **AppraiserVersion** The file version (major, minor and build) of the Appraiser DLL, concatenated without dots. +- **AuxFinal** Obsolete, always set to false. +- **AuxInitial** Obsolete, indicates if Appraiser is writing data files to be read by the Get Windows 10 app. +- **DeadlineDate** A timestamp representing the deadline date, which is the time until which appraiser will wait to do a full scan. +- **EnterpriseRun** Indicates if the telemetry run is an enterprise run, which means appraiser was run from the command line with an extra enterprise parameter. +- **FullSync** Indicates if Appraiser is performing a full sync, which means that full set of events representing the state of the machine are sent. Otherwise, only the changes from the previous run are sent. +- **InboxDataVersion** The original version of the data files before retrieving any newer version. +- **IndicatorsWritten** Indicates if all relevant UEX indicators were successfully written or updated. +- **InventoryFullSync** Indicates if inventory is performing a full sync, which means that the full set of events representing the inventory of machine are sent. +- **PCFP** An ID for the system calculated by hashing hardware identifiers. +- **PerfBackoff** Indicates if the run was invoked with logic to stop running when a user is present. Helps to understand why a run may have a longer elapsed time than normal. +- **PerfBackoffInsurance** Indicates if appraiser is running without performance backoff because it has run with perf backoff and failed to complete several times in a row. +- **RunAppraiser** Indicates if Appraiser was set to run at all. If this if false, it is understood that data events will not be received from this device. +- **RunDate** The date that the telemetry run was stated, expressed as a filetime. +- **RunGeneralTel** Indicates if the generaltel.dll component was run. Generaltel collects additional telemetry on an infrequent schedule and only from machines at telemetry levels higher than Basic. +- **RunOnline** Indicates if appraiser was able to connect to Windows Update and theefore is making decisions using up-to-date driver coverage information. +- **RunResult** The hresult of the Appraiser telemetry run. +- **ScheduledUploadDay** The day scheduled for the upload. +- **SendingUtc** Indicates if the Appraiser client is sending events during the current telemetry run. +- **StoreHandleIsNotNull** Obsolete, always set to false +- **TelementrySent** Indicates if telemetry was successfully sent. +- **ThrottlingUtc** Indicates if the Appraiser client is throttling its output of CUET events to avoid being disabled. This increases runtime but also telemetry reliability. +- **Time** The client time of the event. +- **VerboseMode** Indicates if appraiser ran in Verbose mode, which is a test-only mode with extra logging. +- **WhyFullSyncWithoutTablePrefix** Indicates the reason or reasons that a full sync was generated. + + +### Microsoft.Windows.Appraiser.General.WmdrmAdd + +This event sends data about the usage of older digital rights management on the system, to help keep Windows up to date. This data does not indicate the details of the media using the digital rights management, only whether any such files exist. Collecting this data was critical to ensuring the correct mitigation for customers, and should be able to be removed once all mitigations are in place. + +This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedeviceinventorychange). + +The following fields are available: + +- **AppraiserVersion** The version of the Appraiser file that is generating the events. +- **BlockingApplication** Same as NeedsDismissAction. +- **NeedsDismissAction** Indicates if a dismissible message is needed to warn the user about a potential loss of data due to DRM deprecation. +- **WmdrmApiResult** Raw value of the API used to gather DRM state. +- **WmdrmCdRipped** Indicates if the system has any files encrypted with personal DRM, which was used for ripped CDs. +- **WmdrmIndicators** WmdrmCdRipped OR WmdrmPurchased. +- **WmdrmInUse** WmdrmIndicators AND dismissible block in setup was not dismissed. +- **WmdrmNonPermanent** Indicates if the system has any files with non-permanent licenses. +- **WmdrmPurchased** Indicates if the system has any files with permanent licenses. + + +### Microsoft.Windows.Appraiser.General.WmdrmRemove + +This event indicates that the Wmdrm object is no longer present. + +This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedeviceinventorychange). + +The following fields are available: + +- **AppraiserVersion** The version of the Appraiser file that is generating the events. + + +### Microsoft.Windows.Appraiser.General.WmdrmStartSync + +This event indicates that a new set of WmdrmAdd events will be sent. + +This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedeviceinventorychange). + +The following fields are available: + +- **AppraiserVersion** The version of the Appraiser file that is generating the events. + + +## Census events + +### Census.App + +Provides information on IE and Census versions running on the device + +The following fields are available: + +- **AppraiserEnterpriseErrorCode** The error code of the last Appraiser enterprise run. +- **AppraiserErrorCode** The error code of the last Appraiser run. +- **AppraiserRunEndTimeStamp** The end time of the last Appraiser run. +- **AppraiserRunIsInProgressOrCrashed** Flag that indicates if the Appraiser run is in progress or has crashed. +- **AppraiserRunStartTimeStamp** The start time of the last Appraiser run. +- **AppraiserTaskEnabled** Whether the Appraiser task is enabled. +- **AppraiserTaskExitCode** The Appraiser task exist code. +- **AppraiserTaskLastRun** The last runtime for the Appraiser task. +- **CensusVersion** The version of Census that generated the current data for this device. +- **IEVersion** The version of Internet Explorer that is running on the device. + + +### Census.Battery + +This event sends type and capacity data about the battery on the device, as well as the number of connected standby devices in use, type to help keep Windows up to date. + +The following fields are available: + +- **InternalBatteryCapablities** Represents information about what the battery is capable of doing. +- **InternalBatteryCapacityCurrent** Represents the battery's current fully charged capacity in mWh (or relative). Compare this value to DesignedCapacity  to estimate the battery's wear. +- **InternalBatteryCapacityDesign** Represents the theoretical capacity of the battery when new, in mWh. +- **InternalBatteryNumberOfCharges** Provides the number of battery charges. This is used when creating new products and validating that existing products meets targeted functionality performance. +- **IsAlwaysOnAlwaysConnectedCapable** Represents whether the battery enables the device to be AlwaysOnAlwaysConnected . Boolean value. + + +### Census.Camera + +This event sends data about the resolution of cameras on the device, to help keep Windows up to date. + +The following fields are available: + +- **FrontFacingCameraResolution** Represents the resolution of the front facing camera in megapixels. If a front facing camera does not exist, then the value is 0. +- **RearFacingCameraResolution** Represents the resolution of the rear facing camera in megapixels. If a rear facing camera does not exist, then the value is 0. + + +### Census.Enterprise + +This event sends data about Azure presence, type, and cloud domain use in order to provide an understanding of the use and integration of devices in an enterprise, cloud, and server environment. + +The following fields are available: + +- **AADDeviceId** Azure Active Directory device ID. +- **AzureOSIDPresent** Represents the field used to identify an Azure machine. +- **AzureVMType** Represents whether the instance is Azure VM PAAS, Azure VM IAAS or any other VMs. +- **CDJType** Represents the type of cloud domain joined for the machine. +- **CommercialId** Represents the GUID for the commercial entity which the device is a member of.  Will be used to reflect insights back to customers. +- **ContainerType** The type of container, such as process or virtual machine hosted. +- **EnrollmentType** Defines the type of MDM enrollment on the device. +- **HashedDomain** The hashed representation of the user domain used for login. +- **IsCloudDomainJoined** Is this device joined to an Azure Active Directory (AAD) tenant? true/false +- **IsDERequirementMet** Represents if the device can do device encryption. +- **IsDeviceProtected** Represents if Device protected by BitLocker/Device Encryption +- **IsDomainJoined** Indicates whether a machine is joined to a domain. +- **IsEDPEnabled** Represents if Enterprise data protected on the device. +- **IsMDMEnrolled** Whether the device has been MDM Enrolled or not. +- **MPNId** Returns the Partner ID/MPN ID from Regkey. HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\DeployID +- **SCCMClientId** This ID correlate systems that send data to Compat Analytics (OMS) and other OMS based systems with systems in an Enterprise SCCM environment. +- **ServerFeatures** Represents the features installed on a Windows   Server. This can be used by developers and administrators who need to automate the process of determining the features installed on a set of server computers. +- **SystemCenterID** The SCCM ID is an anonymized one-way hash of the Active Directory Organization identifier + + +### Census.Firmware + +This event sends data about the BIOS and startup embedded in the device, to help keep Windows up to date. + +The following fields are available: + +- **FirmwareManufacturer** Represents the manufacturer of the device's firmware (BIOS). +- **FirmwareReleaseDate** Represents the date the current firmware was released. +- **FirmwareType** Represents the firmware type. The various types can be unknown, BIOS, UEFI. +- **FirmwareVersion** Represents the version of the current firmware. + + +### Census.Flighting + +This event sends Windows Insider data from customers participating in improvement testing and feedback programs, to help keep Windows up to date. + +The following fields are available: + +- **DeviceSampleRate** The telemetry sample rate assigned to the device. +- **EnablePreviewBuilds** Used to enable Windows Insider builds on a device. +- **FlightIds** A list of the different Windows Insider builds on this device. +- **FlightingBranchName** The name of the Windows Insider branch currently used by the device. +- **IsFlightsDisabled** Represents if the device is participating in the Windows Insider program. +- **MSA_Accounts** Represents a list of hashed IDs of the Microsoft Accounts that are flighting (pre-release builds) on this device. +- **SSRK** Retrieves the mobile targeting settings. + + +### Census.Hardware + +This event sends data about the device, including hardware type, OEM brand, model line, model, telemetry level setting, and TPM support, to help keep Windows up to date. + +The following fields are available: + +- **ActiveMicCount** The number of active microphones attached to the device. +- **ChassisType** Represents the type of device chassis, such as desktop or low profile desktop. The possible values can range between 1 - 36. +- **ComputerHardwareID** Identifies a device class that is represented by a hash of different SMBIOS fields. +- **D3DMaxFeatureLevel** Supported Direct3D version. +- **DeviceColor** Indicates a color of the device. +- **DeviceForm** Indicates the form as per the device classification. +- **DeviceName** The device name that is set by the user. +- **DigitizerSupport** Is a digitizer supported? +- **DUID** The device unique ID. +- **Gyroscope** Indicates whether the device has a gyroscope (a mechanical component that measures and maintains orientation). +- **InventoryId** The device ID used for compatibility testing. +- **Magnetometer** Indicates whether the device has a magnetometer (a mechanical component that works like a compass). +- **NFCProximity** Indicates whether the device supports NFC (a set of communication protocols that helps establish communication when applicable devices are brought close together.) +- **OEMDigitalMarkerFileName** The name of the file placed in the \Windows\system32\drivers directory that specifies the OEM and model name of the device. +- **OEMManufacturerName** The device manufacturer name. The OEMName for an inactive device is not reprocessed even if the clean OEM name is changed at a later date. +- **OEMModelBaseBoard** The baseboard model used by the OEM. +- **OEMModelBaseBoardVersion** Differentiates between developer and retail devices. +- **OEMModelName** The device model name. +- **OEMModelNumber** The device model number. +- **OEMModelSKU** The device edition that is defined by the manufacturer. +- **OEMModelSystemFamily** The system family set on the device by an OEM. +- **OEMModelSystemVersion** The system model version set on the device by the OEM. +- **OEMOptionalIdentifier** A Microsoft assigned value that represents a specific OEM subsidiary. +- **OEMSerialNumber** The serial number of the device that is set by the manufacturer. +- **PhoneManufacturer** The friendly name of the phone manufacturer. +- **PowerPlatformRole** The OEM preferred power management profile. It's used to help to identify the basic form factor of the device. +- **SoCName** The firmware manufacturer of the device. +- **StudyID** Used to identify retail and non-retail device. +- **TelemetryLevel** The telemetry level the user has opted into, such as Basic or Enhanced. +- **TelemetryLevelLimitEnhanced** The telemetry level for Windows Analytics-based solutions. +- **TelemetrySettingAuthority** Determines who set the telemetry level, such as GP, MDM, or the user. +- **TPMManufacturerId** The ID of the TPM manufacturer. +- **TPMManufacturerVersion** The version of the TPM manufacturer. +- **TPMVersion** The supported Trusted Platform Module (TPM) on the device. If no TPM is present, the value is 0. +- **VoiceSupported** Does the device have a cellular radio capable of making voice calls? + + +### Census.Memory + +This event sends data about the memory on the device, including ROM and RAM, to help keep Windows up to date. + +The following fields are available: + +- **TotalPhysicalRAM** Represents the physical memory (in MB). +- **TotalVisibleMemory** Represents the memory that is not reserved by the system. + + +### Census.Network + +This event sends data about the mobile and cellular network used by the device (mobile service provider, network, device ID, and service cost factors), to help keep Windows up to date. + +The following fields are available: + +- **IMEI0** Represents the International Mobile Station Equipment Identity. This number is usually unique and used by the mobile operator to distinguish different phone hardware. Microsoft does not have access to mobile operator billing data so collecting this data does not expose or identify the user. The two fields represent phone with dual sim coverage. +- **IMEI1** Represents the International Mobile Station Equipment Identity. This number is usually unique and used by the mobile operator to distinguish different phone hardware. Microsoft does not have access to mobile operator billing data so collecting this data does not expose or identify the user. The two fields represent phone with dual sim coverage. +- **MCC0** Represents the Mobile Country Code (MCC). It used with the Mobile Network Code (MNC) to uniquely identify a mobile network operator. The two fields represent phone with dual sim coverage. +- **MCC1** Represents the Mobile Country Code (MCC). It used with the Mobile Network Code (MNC) to uniquely identify a mobile network operator. The two fields represent phone with dual sim coverage. +- **MEID** Represents the Mobile Equipment Identity (MEID). MEID is a worldwide unique phone ID assigned to CDMA phones. MEID replaces electronic serial number (ESN), and is equivalent to IMEI for GSM and WCDMA phones. Microsoft does not have access to mobile operator billing data so collecting this data does not expose or identify the user. +- **MNC0** Retrieves the Mobile Network Code (MNC). It used with the Mobile Country Code (MCC) to uniquely identify a mobile network operator. The two fields represent phone with dual sim coverage. +- **MNC1** Retrieves the Mobile Network Code (MNC). It used with the Mobile Country Code (MCC) to uniquely identify a mobile network operator. The two fields represent phone with dual sim coverage. +- **MobileOperatorBilling** Represents the telephone company that provides services for mobile phone users. +- **MobileOperatorCommercialized** Represents which reseller and geography the phone is commercialized for. This is the set of values on the phone for who and where it was intended to be used. For example, the commercialized mobile operator code AT&T in the US would be ATT-US. +- **MobileOperatorNetwork0** Represents the operator of the current mobile network that the device is used on. (AT&T, T-Mobile, Vodafone). The two fields represent phone with dual sim coverage. +- **MobileOperatorNetwork1** Represents the operator of the current mobile network that the device is used on. (AT&T, T-Mobile, Vodafone). The two fields represent phone with dual sim coverage. +- **NetworkAdapterGUID** The GUID of the primary network adapter. +- **NetworkCost** Represents the network cost associated with a connection. +- **SPN0** Retrieves the Service Provider Name (SPN). For example, these might be AT&T, Sprint, T-Mobile, or Verizon. The two fields represent phone with dual sim coverage. +- **SPN1** Retrieves the Service Provider Name (SPN). For example, these might be AT&T, Sprint, T-Mobile, or Verizon. The two fields represent phone with dual sim coverage. + + +### Census.OS + +This event sends data about the operating system such as the version, locale, update service configuration, when and how it was originally installed, and whether it is a virtual device, to help keep Windows up to date. + +The following fields are available: + +- **ActivationChannel** Retrieves the retail license key or Volume license key for a machine. +- **AssignedAccessStatus** Kiosk configuration mode. +- **CompactOS** Indicates if the Compact OS feature from Win10 is enabled. +- **DeveloperUnlockStatus** Represents if a device has been developer unlocked by the user or Group Policy. +- **DeviceTimeZone** The time zone that is set on the device. Example: Pacific Standard Time +- **GenuineState** Retrieves the ID Value specifying the OS Genuine check. +- **InstallationType** Retrieves the type of OS installation. (Clean, Upgrade, Reset, Refresh, Update). +- **InstallLanguage** The first language installed on the user machine. +- **IsDeviceRetailDemo** Retrieves if the device is running in demo mode. +- **IsEduData** Returns Boolean if the education data policy is enabled. +- **IsPortableOperatingSystem** Retrieves whether OS is running Windows-To-Go +- **IsSecureBootEnabled** Retrieves whether Boot chain is signed under UEFI. +- **LanguagePacks** The list of language packages installed on the device. +- **LicenseStateReason** Retrieves why (or how) a system is licensed or unlicensed. The HRESULT may indicate an error code that indicates a key blocked error, or it may indicate that we are running an OS License granted by the MS store. +- **OA3xOriginalProductKey** Retrieves the License key stamped by the OEM to the machine. +- **OSEdition** Retrieves the version of the current OS. +- **OSInstallType** Retrieves a numeric description of what install was used on the device i.e. clean, upgrade, refresh, reset, etc +- **OSOOBEDateTime** Retrieves Out of Box Experience (OOBE) Date in Coordinated Universal Time (UTC). +- **OSSKU** Retrieves the Friendly Name of OS Edition. +- **OSSubscriptionStatus** Represents the existing status for enterprise subscription feature for PRO machines. +- **OSSubscriptionTypeId** Returns boolean for enterprise subscription feature for selected PRO machines. +- **OSTimeZoneBiasInMins** Retrieves the time zone set on machine. +- **OSUILocale** Retrieves the locale of the UI that is currently used by the OS. +- **ProductActivationResult** Returns Boolean if the OS Activation was successful. +- **ProductActivationTime** Returns the OS Activation time for tracking piracy issues. +- **ProductKeyID2** Retrieves the License key if the machine is updated with a new license key. +- **RACw7Id** Retrieves the Microsoft Reliability Analysis Component (RAC) Win7 Identifier. RAC is used to monitor and analyze system usage and reliability. +- **ServiceMachineIP** Retrieves the IP address of the KMS host used for anti-piracy. +- **ServiceMachinePort** Retrieves the port of the KMS host used for anti-piracy. +- **ServiceProductKeyID** Retrieves the License key of the KMS +- **SharedPCMode** Returns Boolean for education devices used as shared cart +- **Signature** Retrieves if it is a signature machine sold by Microsoft store. +- **SLICStatus** Whether a SLIC table exists on the device. +- **SLICVersion** Returns OS type/version from SLIC table. + + +### Census.PrivacySettings + +This event provides information about the device level privacy settings and whether device-level access was granted to these capabilities. Not all settings are applicable to all devices. Each field records the consent state for the corresponding privacy setting. The consent state is encoded as a 16-bit signed integer, where the first 8 bits represents the effective consent value, and the last 8 bits represent the authority that set the value. The effective consent (first 8 bits) is one of the following values: -3 = unexpected consent value, -2 = value was not requested, -1 = an error occurred while attempting to retrieve the value, 0 = undefined, 1 = allow, 2 = deny, 3 = prompt. The consent authority (last 8 bits) is one of the following values: -3 = unexpected authority, -2 = value was not requested, -1 = an error occurred while attempting to retrieve the value, 0 = system, 1 = a higher authority (a gating setting, the system-wide setting, or a group policy), 2 = advertising ID group policy, 3 = advertising ID policy for child account, 4 = privacy setting provider doesn't know the actual consent authority, 5 = consent was not configured and a default set in code was used, 6 = system default, 7 = organization policy, 8 = OneSettings. + +The following fields are available: + +- **Activity** Current state of the activity history setting. +- **ActivityHistoryCloudSync** Current state of the activity history cloud sync setting. +- **ActivityHistoryCollection** Current state of the activity history collection setting. +- **AdvertisingId** Current state of the advertising ID setting. +- **AppDiagnostics** Current state of the app diagnostics setting. +- **Appointments** Current state of the calendar setting. +- **Bluetooth** Current state of the Bluetooth capability setting. +- **BluetoothSync** Current state of the Bluetooth sync capability setting. +- **BroadFileSystemAccess** Current state of the broad file system access setting. +- **CellularData** Current state of the cellular data capability setting. +- **Chat** Current state of the chat setting. +- **Contacts** Current state of the contacts setting. +- **DocumentsLibrary** Current state of the documents library setting. +- **Email** Current state of the email setting. +- **FindMyDevice** Current state of the "find my device" setting. +- **GazeInput** Current state of the gaze input setting. +- **HumanInterfaceDevice** Current state of the human interface device setting. +- **InkTypeImprovement** Current state of the improve inking and typing setting. +- **Location** Current state of the location setting. +- **LocationHistory** Current state of the location history setting. +- **LocationHistoryCloudSync** Current state of the location history cloud sync setting. +- **LocationHistoryOnTimeline** Current state of the location history on timeline setting. +- **LocTîÿxV4ocationHistory** No content is currently available. +- **Microphone** Current state of the microphone setting. +- **PhoneCall** Current state of the phone call setting. +- **PhoneCallHistory** Current state of the call history setting. +- **PicturesLibrary** Current state of the pictures library setting. +- **Radios** Current state of the radios setting. +- **SensorsCustom** Current state of the custom sensor setting. +- **SerialCommunication** Current state of the serial communication setting. +- **Sms** Current state of the text messaging setting. +- **SpeechPersonalization** Current state of the speech services setting. +- **USB** Current state of the USB setting. +- **UserAccountInformation** Current state of the account information setting. +- **UserDataTasks** Current state of the tasks setting. +- **UserNotificationListener** Current state of the notifications setting. +- **VideosLibrary** Current state of the videos library setting. +- **Webcam** Current state of the camera setting. +- **WiFiDirect** Current state of the Wi-Fi direct setting. + + +### Census.Processor + +Provides information on several important data points about Processor settings + +The following fields are available: + +- **KvaShadow** This is the micro code information of the processor. +- **MMSettingOverride** Microcode setting of the processor. +- **MMSettingOverrideMask** Microcode setting override of the processor. +- **PreviousUpdateRevision** Previous microcode revision +- **ProcessorArchitecture** Retrieves the processor architecture of the installed operating system. +- **ProcessorClockSpeed** Clock speed of the processor in MHz. +- **ProcessorCores** Number of logical cores in the processor. +- **ProcessorIdentifier** Processor Identifier of a manufacturer. +- **ProcessorManufacturer** Name of the processor manufacturer. +- **ProcessorModel** Name of the processor model. +- **ProcessorPhysicalCores** Number of physical cores in the processor. +- **ProcessorUpdateRevision** The microcode revision. +- **ProcessorUpdateStatus** Enum value that represents the processor microcode load status +- **SocketCount** Count of CPU sockets. +- **SpeculationControl** Indicates whether the system has enabled protections needed to validate the speculation control vulnerability. + + +### Census.Security + +This event provides information on about security settings used to help keep Windows up to date and secure. + +The following fields are available: + +- **AvailableSecurityProperties** This field helps to enumerate and report state on the relevant security properties for Device Guard. +- **CGRunning** Credential Guard isolates and hardens key system and user secrets against compromise, helping to minimize the impact and breadth of a Pass the Hash style attack in the event that malicious code is already running via a local or network based vector. This field tells if Credential Guard is running. +- **DGState** This field summarizes the Device Guard state. +- **HVCIRunning** Hypervisor Code Integrity (HVCI) enables Device Guard to help protect kernel mode processes and drivers from vulnerability exploits and zero days. HVCI uses the processor’s functionality to force all software running in kernel mode to safely allocate memory. This field tells if HVCI is running. +- **IsSawGuest** Indicates whether the device is running as a Secure Admin Workstation Guest. +- **IsSawHost** Indicates whether the device is running as a Secure Admin Workstation Host. +- **RequiredSecurityProperties** Describes the required security properties to enable virtualization-based security. +- **SecureBootCapable** Systems that support Secure Boot can have the feature turned off via BIOS. This field tells if the system is capable of running Secure Boot, regardless of the BIOS setting. +- **SModeState** The Windows S mode trail state. +- **VBSState** Virtualization-based security (VBS) uses the hypervisor to help protect the kernel and other parts of the operating system. Credential Guard and Hypervisor Code Integrity (HVCI) both depend on VBS to isolate/protect secrets, and kernel-mode code integrity validation. VBS has a tri-state that can be Disabled, Enabled, or Running. + + +### Census.Speech + +This event is used to gather basic speech settings on the device. + +The following fields are available: + +- **AboveLockEnabled** Cortana setting that represents if Cortana can be invoked when the device is locked. +- **GPAllowInputPersonalization** Indicates if a Group Policy setting has enabled speech functionalities. +- **HolographicSpeechInputDisabled** Holographic setting that represents if the attached HMD devices have speech functionality disabled by the user. +- **HolographicSpeechInputDisabledRemote** Indicates if a remote policy has disabled speech functionalities for the HMD devices. +- **KeyVer** Version information for the census speech event. +- **KWSEnabled** Cortana setting that represents if a user has enabled the "Hey Cortana" keyword spotter (KWS). +- **MDMAllowInputPersonalization** Indicates if an MDM policy has enabled speech functionalities. +- **RemotelyManaged** Indicates if the device is being controlled by a remote administrator (MDM or Group Policy) in the context of speech functionalities. +- **SpeakerIdEnabled** Cortana setting that represents if keyword detection has been trained to try to respond to a single user's voice. +- **SpeechServicesEnabled** Windows setting that represents whether a user is opted-in for speech services on the device. +- **SpeechServicesValueSource** Indicates the deciding factor for the effective online speech recognition privacy policy settings: remote admin, local admin, or user preference. + + +### Census.Storage + +This event sends data about the total capacity of the system volume and primary disk, to help keep Windows up to date. + +The following fields are available: + +- **PrimaryDiskTotalCapacity** Retrieves the amount of disk space on the primary disk of the device in MB. +- **PrimaryDiskType** Retrieves an enumerator value of type STORAGE_BUS_TYPE that indicates the type of bus to which the device is connected. This should be used to interpret the raw device properties at the end of this structure (if any). +- **StorageReservePassedPolicy** Indicates whether the Storage Reserve policy, which ensures that updates have enough disk space and customers are on the latest OS, is enabled on this device. +- **SystemVolumeTotalCapacity** Retrieves the size of the partition that the System volume is installed on in MB. + + +### Census.Userdefault + +This event sends data about the current user's default preferences for browser and several of the most popular extensions and protocols, to help keep Windows up to date. + +The following fields are available: + +- **CalendarType** The calendar identifiers that are used to specify different calendars. +- **DefaultApp** The current uer's default program selected for the following extension or protocol: .html, .htm, .jpg, .jpeg, .png, .mp3, .mp4, .mov, .pdf. +- **DefaultBrowserProgId** The ProgramId of the current user's default browser. +- **LongDateFormat** The long date format the user has selected. +- **ShortDateFormat** The short date format the user has selected. + + +### Census.UserDisplay + +This event sends data about the logical/physical display size, resolution and number of internal/external displays, and VRAM on the system, to help keep Windows up to date. + +The following fields are available: + +- **ÉnternalPrimaryDisplayLogicalDPIY** No content is currently available. +- **IîternalPrimaryDisplayResolutionVertical** No content is currently available. +- **InterjalPrimaryDisplayResolutionHorizontal** No content is currently available. +- **InternalPrimaðyDisplayPhysicalDPIX** No content is currently available. +- **InternalPrimaryDisplayLogicalDPIX** Retrieves the logical DPI in the x-direction of the internal display. +- **InternalPrimaryDisplayLogicálDPIX** No content is currently available. +- **InternalPrimaryDisplayLogicalDPIY** Retrieves the logical DPI in the y-direction of the internal display. +- **InternalPrimaryDisplayPhysicalDPIX** Retrieves the physical DPI in the x-direction of the internal display. +- **InternalPrimaryDisplayPhysicalDPIY** Retrieves the physical DPI in the y-direction of the internal display. +- **InternalPrimaryDisplayResolutionHorizontal** Retrieves the number of pixels in the horizontal direction of the internal display. +- **InternalPrimaryDisplayResolutionVertical** Retrieves the number of pixels in the vertical direction of the internal display. +- **InternalPrimaryDisplaySizePhysicalH** Retrieves the physical horizontal length of the display in mm. Used for calculating the diagonal length in inches . +- **InternalPrimaryDisplaySizePhysicalY** Retrieves the physical vertical length of the display in mm. Used for calculating the diagonal length in inches +- **InternalPrimaryDiwplayPhysicalDPIY** No content is currently available. +- **NumberofExternalDisplays** Retrieves the number of external displays connected to the machine +- **NumberofInternalDisplays** Retrieves the number of internal displays in a machine. +- **OumberofExternalDisplays** No content is currently available. +- **OumberofInternalDisplays** No content is currently available. +- **VRAMDedicated** Retrieves the video RAM in MB. +- **VRAMDedicatedSystem** Retrieves the amount of memory on the dedicated video card. +- **VRAMSharedSystem** Retrieves the amount of RAM memory that the video card can use. + + +### Census.UserNLS + +This event sends data about the default app language, input, and display language preferences set by the user, to help keep Windows up to date. + +The following fields are available: + +- **DefaultAppLanguage** The current user Default App Language. +- **DisplayLanguage** The current user preferred Windows Display Language. +- **HomeLocation** The current user location, which is populated using GetUserGeoId() function. +- **KeyboardInputLanguages** The Keyboard input languages installed on the device. +- **SpeechInputLanguages** The Speech Input languages installed on the device. + + +### Census.UserPrivacySettings + +This event provides information about the current users privacy settings and whether device-level access was granted to these capabilities. Not all settings are applicable to all devices. Each field records the consent state for the corresponding privacy setting. The consent state is encoded as a 16-bit signed integer, where the first 8 bits represents the effective consent value, and the last 8 bits represents the authority that set the value. The effective consent is one of the following values: -3 = unexpected consent value, -2 = value was not requested, -1 = an error occurred while attempting to retrieve the value, 0 = undefined, 1 = allow, 2 = deny, 3 = prompt. The consent authority is one of the following values: -3 = unexpected authority, -2 = value was not requested, -1 = an error occurred while attempting to retrieve the value, 0 = user, 1 = a higher authority (a gating setting, the system-wide setting, or a group policy), 2 = advertising ID group policy, 3 = advertising ID policy for child account, 4 = privacy setting provider doesn't know the actual consent authority, 5 = consent was not configured and a default set in code was used, 6 = system default, 7 = organization policy, 8 = OneSettings. + +The following fields are available: + +- **Activity** Current state of the activity history setting. +- **ActivityHistoryCloudSync** Current state of the activity history cloud sync setting. +- **ActivityHistoryCollection** Current state of the activity history collection setting. +- **AdvertisingId** Current state of the advertising ID setting. +- **AppDiagnostics** Current state of the app diagnostics setting. +- **Appointments** Current state of the calendar setting. +- **Bluetooth** Current state of the Bluetooth capability setting. +- **BluetoothSync** Current state of the Bluetooth sync capability setting. +- **BroadFileSystemAccess** Current state of the broad file system access setting. +- **CellularData** Current state of the cellular data capability setting. +- **Chat** Current state of the chat setting. +- **Contacts** Current state of the contacts setting. +- **DocumentsLibrary** Current state of the documents library setting. +- **Email** Current state of the email setting. +- **GazeInput** Current state of the gaze input setting. +- **HumanInterfaceDevice** Current state of the human interface device setting. +- **InkTypeImprovement** Current state of the improve inking and typing setting. +- **InkTypePersonalization** Current state of the inking and typing personalization setting. +- **Location** Current state of the location setting. +- **LocationHistory** Current state of the location history setting. +- **LocationHistoryCloudSync** Current state of the location history cloud synchronization setting. +- **LocationHistoryOnTimeline** Current state of the location history on timeline setting. +- **Microphone** Current state of the microphone setting. +- **PhoneCall** Current state of the phone call setting. +- **PhoneCallHistory** Current state of the call history setting. +- **PicturesLibrary** Current state of the pictures library setting. +- **Radios** Current state of the radios setting. +- **SensorsCustom** Current state of the custom sensor setting. +- **SerialCommunication** Current state of the serial communication setting. +- **Sms** Current state of the text messaging setting. +- **SpeechPersonalization** Current state of the speech services setting. +- **USB** Current state of the USB setting. +- **UserAccountInformation** Current state of the account information setting. +- **UserDataTasks** Current state of the tasks setting. +- **UserNotificationListener** Current state of the notifications setting. +- **VideosLibrary** Current state of the videos library setting. +- **Webcam** Current state of the camera setting. +- **WiFiDirect** Current state of the Wi-Fi direct setting. + + +### Census.VM + +This event sends data indicating whether virtualization is enabled on the device, and its various characteristics, to help keep Windows up to date. + +The following fields are available: + +- **CloudService** Indicates which cloud service, if any, that this virtual machine is running within. +- **HyperVisor** Retrieves whether the current OS is running on top of a Hypervisor. +- **IOMMUPresent** Represents if an input/output memory management unit (IOMMU) is present. +- **IsVDI** Is the device using Virtual Desktop Infrastructure? +- **IsVirtualDevice** Retrieves that when the Hypervisor is Microsoft's Hyper-V Hypervisor or other Hv#1 Hypervisor, this field will be set to FALSE for the Hyper-V host OS and TRUE for any guest OS's. This field should not be relied upon for non-Hv#1 Hypervisors. +- **SLATSupported** Represents whether Second Level Address Translation (SLAT) is supported by the hardware. +- **VirtualizationFirmwareEnabled** Represents whether virtualization is enabled in the firmware. + + +### Census.WU + +This event sends data about the Windows update server and other App store policies, to help keep Windows up to date. + +The following fields are available: + +- **AppraiserGatedStatus** Indicates whether a device has been gated for upgrading. +- **AppStoreAutoUpdate** Retrieves the Appstore settings for auto upgrade. (Enable/Disabled). +- **AppStoreAutoUpdateMDM** Retrieves the App Auto Update value for MDM: 0 - Disallowed. 1 - Allowed. 2 - Not configured. Default: [2] Not configured +- **AppStoreAutoUpdatePolicy** Retrieves the Microsoft Store App Auto Update group policy setting +- **DelayUpgrade** Retrieves the Windows upgrade flag for delaying upgrades. +- **OSAssessmentFeatureOutOfDate** How many days has it been since a the last feature update was released but the device did not install it? +- **OSAssessmentForFeatureUpdate** Is the device is on the latest feature update? +- **OSAssessmentForQualityUpdate** Is the device on the latest quality update? +- **OSAssessmentForSecurityUpdate** Is the device on the latest security update? +- **OSAssessmentQualityOutOfDate** How many days has it been since a the last quality update was released but the device did not install it? +- **OSAssessmentReleaseInfoTime** The freshness of release information used to perform an assessment. +- **OSRollbackCount** The number of times feature updates have rolled back on the device. +- **OSRolledBack** A flag that represents when a feature update has rolled back during setup. +- **OSUninstalled** A flag that represents when a feature update is uninstalled on a device . +- **OSWUAutoUpdateOptions** Retrieves the auto update settings on the device. +- **OSWUAutoUpdateOptionsSource** The source of auto update setting that appears in the OSWUAutoUpdateOptions field. For example: Group Policy (GP), Mobile Device Management (MDM), and Default. +- **UninstallActive** A flag that represents when a device has uninstalled a previous upgrade recently. +- **UpdateServiceURLConfigured** Retrieves if the device is managed by Windows Server Update Services (WSUS). +- **WUDeferUpdatePeriod** Retrieves if deferral is set for Updates. +- **WUDeferUpgradePeriod** Retrieves if deferral is set for Upgrades. +- **WUDODownloadMode** Retrieves whether DO is turned on and how to acquire/distribute updates Delivery Optimization (DO) allows users to deploy previously downloaded WU updates to other devices on the same network. +- **WUMachineId** Retrieves the Windows Update (WU) Machine Identifier. +- **WUPauseState** Retrieves WU setting to determine if updates are paused. +- **WUServer** Retrieves the HTTP(S) URL of the WSUS server that is used by Automatic Updates and API callers (by default). + + +### Census.Xbox + +This event sends data about the Xbox Console, such as Serial Number and DeviceId, to help keep Windows up to date. + +The following fields are available: + +- **XboxConsolePreferredLanguage** Retrieves the preferred language selected by the user on Xbox console. +- **XboxConsoleSerialNumber** Retrieves the serial number of the Xbox console. +- **XboxConsoleSerialOumber** No content is currently available. +- **XboxLiveDeviceId** Retrieves the unique device ID of the console. +- **XboxLiveSandboxId** Retrieves the developer sandbox ID if the device is internal to Microsoft. + + +## Common data extensions + +### Common Data Extensions.app + +Describes the properties of the running application. This extension could be populated by a client app or a web app. + +The following fields are available: + +- **asId** An integer value that represents the app session. This value starts at 0 on the first app launch and increments after each subsequent app launch per boot session. +- **env** The environment from which the event was logged. +- **expId** Associates a flight, such as an OS flight, or an experiment, such as a web site UX experiment, with an event. +- **id** Represents a unique identifier of the client application currently loaded in the process producing the event; and is used to group events together and understand usage pattern, errors by application. +- **locale** The locale of the app. +- **name** The name of the app. +- **userId** The userID as known by the application. +- **ver** Represents the version number of the application. Used to understand errors by Version, Usage by Version across an app. + + +### Common Data Extensions.container + +Describes the properties of the container for events logged within a container. + +The following fields are available: + +- **epoch** An ID that's incremented for each SDK initialization. +- **localId** The device ID as known by the client. +- **osVer** The operating system version. +- **seq** An ID that's incremented for each event. +- **type** The container type. Examples: Process or VMHost + + +### Common Data Extensions.cs + +Describes properties related to the schema of the event. + +The following fields are available: + +- **sig** A common schema signature that identifies new and modified event schemas. + + +### Common Data Extensions.device + +Describes the device-related fields. + +The following fields are available: + +- **deviceClass** The device classification. For example, Desktop, Server, or Mobile. +- **localId** A locally-defined unique ID for the device. This is not the human-readable device name. Most likely equal to the value stored at HKLM\Software\Microsoft\SQMClient\MachineId +- **make** Device manufacturer. +- **model** Device model. + + +### Common Data Extensions.Envelope + +Represents an envelope that contains all of the common data extensions. + +The following fields are available: + +- **cV** Represents the Correlation Vector: A single field for tracking partial order of related telemetry events across component boundaries. +- **data** Represents the optional unique diagnostic data for a particular event schema. +- **ext_app** Describes the properties of the running application. This extension could be populated by either a client app or a web app. See [Common Data Extensions.app](#common-data-extensionsapp). +- **ext_container** Describes the properties of the container for events logged within a container. See [Common Data Extensions.container](#common-data-extensionscontainer). +- **ext_cs** Describes properties related to the schema of the event. See [Common Data Extensions.cs](#common-data-extensionscs). +- **ext_device** Describes the device-related fields. See [Common Data Extensions.device](#common-data-extensionsdevice). +- **ext_os** Describes the operating system properties that would be populated by the client. See [Common Data Extensions.os](#common-data-extensionsos). +- **ext_receipts** Describes the fields related to time as provided by the client for debugging purposes. See [Common Data Extensions.receipts](#common-data-extensionsreceipts). +- **ext_sdk** Describes the fields related to a platform library required for a specific SDK. See [Common Data Extensions.sdk](#common-data-extensionssdk). +- **ext_user** Describes the fields related to a user. See [Common Data Extensions.user](#common-data-extensionsuser). +- **ext_utc** Describes the fields that might be populated by a logging library on Windows. See [Common Data Extensions.utc](#common-data-extensionsutc). +- **ext_xbl** Describes the fields related to XBOX Live. See [Common Data Extensions.xbl](#common-data-extensionsxbl). +- **flags** Represents a collection of bits that describe how the event should be processed by the Connected User Experience and Telemetry component pipeline. The lowest-order byte is the event persistence. The next byte is the event latency. +- **iKey** Represents an ID for applications or other logical groupings of events. +- **name** Represents the uniquely qualified name for the event. +- **popSample** Represents the effective sample rate for this event at the time it was generated by a client. +- **time** Represents the event date time in Coordinated Universal Time (UTC) when the event was generated on the client. This should be in ISO 8601 format. +- **ver** Represents the major and minor version of the extension. + + +### Common Data Extensions.os + +Describes some properties of the operating system. + +The following fields are available: + +- **bootId** An integer value that represents the boot session. This value starts at 0 on first boot after OS install and increments after every reboot. +- **expId** Represents the experiment ID. The standard for associating a flight, such as an OS flight (pre-release build), or an experiment, such as a web site UX experiment, with an event is to record the flight / experiment IDs in Part A of the common schema. +- **locale** Represents the locale of the operating system. +- **name** Represents the operating system name. +- **ver** Represents the major and minor version of the extension. + + +### Common Data Extensions.receipts + +Represents various time information as provided by the client and helps for debugging purposes. + +The following fields are available: + +- **originalTime** The original event time. +- **uploadTime** The time the event was uploaded. + + +### Common Data Extensions.sdk + +Used by platform specific libraries to record fields that are required for a specific SDK. + +The following fields are available: + +- **epoch** An ID that is incremented for each SDK initialization. +- **installId** An ID that's created during the initialization of the SDK for the first time. +- **libVer** The SDK version. +- **seq** An ID that is incremented for each event. + + +### Common Data Extensions.user + +Describes the fields related to a user. + +The following fields are available: + +- **authId** This is an ID of the user associated with this event that is deduced from a token such as a Microsoft Account ticket or an XBOX token. +- **locale** The language and region. +- **localId** Represents a unique user identity that is created locally and added by the client. This is not the user's account ID. + + +### Common Data Extensions.utc + +Describes the properties that could be populated by a logging library on Windows. + +The following fields are available: + +- **aId** Represents the ETW ActivityId. Logged via TraceLogging or directly via ETW. +- **bSeq** Upload buffer sequence number in the format: buffer identifier:sequence number +- **cat** Represents a bitmask of the ETW Keywords associated with the event. +- **cpId** The composer ID, such as Reference, Desktop, Phone, Holographic, Hub, IoT Composer. +- **epoch** Represents the epoch and seqNum fields, which help track how many events were fired and how many events were uploaded, and enables identification of data lost during upload and de-duplication of events on the ingress server. +- **flags** Represents the bitmap that captures various Windows specific flags. +- **mon** Combined monitor and event sequence numbers in the format: monitor sequence : event sequence +- **op** Represents the ETW Op Code. +- **raId** Represents the ETW Related ActivityId. Logged via TraceLogging or directly via ETW. +- **seq** Represents the sequence field used to track absolute order of uploaded events. It is an incrementing identifier for each event added to the upload queue. The Sequence helps track how many events were fired and how many events were uploaded and enables identification of data lost during upload and de-duplication of events on the ingress server. +- **stId** Represents the Scenario Entry Point ID. This is a unique GUID for each event in a diagnostic scenario. This used to be Scenario Trigger ID. + + +### Common Data Extensions.xbl + +Describes the fields that are related to XBOX Live. + +The following fields are available: + +- **claims** Any additional claims whose short claim name hasn't been added to this structure. +- **did** XBOX device ID +- **dty** XBOX device type +- **dvr** The version of the operating system on the device. +- **eid** A unique ID that represents the developer entity. +- **exp** Expiration time +- **ip** The IP address of the client device. +- **nbf** Not before time +- **pid** A comma separated list of PUIDs listed as base10 numbers. +- **sbx** XBOX sandbox identifier +- **sid** The service instance ID. +- **sty** The service type. +- **tid** The XBOX Live title ID. +- **tvr** The XBOX Live title version. +- **uts** A bit field, with 2 bits being assigned to each user ID listed in xid. This field is omitted if all users are retail accounts. +- **xid** A list of base10-encoded XBOX User IDs. + + +## Common data fields + +### Ms.Device.DeviceInventoryChange + +Describes the installation state for all hardware and software components available on a particular device. + +The following fields are available: + +- **action** The change that was invoked on a device inventory object. +- **inventoryId** Device ID used for Compatibility testing +- **objectInstanceId** Object identity which is unique within the device scope. +- **objectType** Indicates the object type that the event applies to. +- **syncId** A string used to group StartSync, EndSync, Add, and Remove operations that belong together. This field is unique by Sync period and is used to disambiguate in situations where multiple agents perform overlapping inventories for the same object. + + +## Compatibility events + +### Microsoft.Windows.Compatibility.Apphelp.SdbFix + +Product instrumentation for helping debug/troubleshoot issues with inbox compatibility components. + +The following fields are available: + +- **AppName** Name of the application impacted by SDB. +- **FixID** SDB GUID. +- **Flags** List of flags applied. +- **ImageName** Name of file. + + +## Component-based servicing events + +### CbsServicingProvider.CbsCapabilityEnumeration + +This event reports on the results of scanning for optional Windows content on Windows Update. + +The following fields are available: + +- **architecture** Indicates the scan was limited to the specified architecture. +- **capabilityCount** The number of optional content packages found during the scan. +- **clientId** The name of the application requesting the optional content. +- **duration** The amount of time it took to complete the scan. +- **hrStatus** The HReturn code of the scan. +- **language** Indicates the scan was limited to the specified language. +- **majorVersion** Indicates the scan was limited to the specified major version. +- **minorVersion** Indicates the scan was limited to the specified minor version. +- **namespace** Indicates the scan was limited to packages in the specified namespace. +- **sourceFilter** A bitmask indicating the scan checked for locally available optional content. +- **stackBuild** The build number of the servicing stack. +- **stackMajorVersion** The major version number of the servicing stack. +- **stackMinorVersion** The minor version number of the servicing stack. +- **stackRevision** The revision number of the servicing stack. + + +### CbsServicingProvider.CbsCapabilitySessionFinalize + +This event provides information about the results of installing or uninstalling optional Windows content from Windows Update. + +The following fields are available: + +- **capabilities** The names of the optional content packages that were installed. +- **clientId** The name of the application requesting the optional content. +- **currentID** The ID of the current install session. +- **downloadSource** The source of the download. +- **highestState** The highest final install state of the optional content. +- **hrLCUReservicingStatus** Indicates whether the optional content was updated to the latest available version. +- **hrStatus** The HReturn code of the install operation. +- **rebootCount** The number of reboots required to complete the install. +- **retryID** The session ID that will be used to retry a failed operation. +- **retryStatus** Indicates whether the install will be retried in the event of failure. +- **stackBuild** The build number of the servicing stack. +- **stackMajorVersion** The major version number of the servicing stack. +- **stackMinorVersion** The minor version number of the servicing stack. +- **stackRevision** The revision number of the servicing stack. + + +### CbsServicingProvider.CbsCapabilitySessionPended + +This event provides information about the results of installing optional Windows content that requires a reboot to keep Windows up to date. + +The following fields are available: + +- **clientId** The name of the application requesting the optional content. +- **pendingDecision** Indicates the cause of reboot, if applicable. + + +### CbsServicingProvider.CbsLateAcquisition + +This event sends data to indicate if some Operating System packages could not be updated as part of an upgrade, to help keep Windows up to date. + +The following fields are available: + +- **Features** The list of feature packages that could not be updated. +- **RetryID** The ID identifying the retry attempt to update the listed packages. + + +### CbsServicingProvider.CbsPackageRemoval + +This event provides information about the results of uninstalling a Windows Cumulative Security Update to help keep Windows up to date. + +The following fields are available: + +- **buildVersion** The build number of the security update being uninstalled. +- **clientId** The name of the application requesting the uninstall. +- **currentStateEnd** The final state of the update after the operation. +- **failureDetails** Information about the cause of a failure, if applicable. +- **failureSourceEnd** The stage during the uninstall where the failure occurred. +- **hrStatusEnd** The overall exit code of the operation. +- **initiatedOffline** Indicates if the uninstall was initiated for a mounted Windows image. +- **majorVersion** The major version number of the security update being uninstalled. +- **minorVersion** The minor version number of the security update being uninstalled. +- **originalState** The starting state of the update before the operation. +- **pendingDecision** Indicates the cause of reboot, if applicable. +- **primitiveExecutionContext** The state during system startup when the uninstall was completed. +- **revisionVersion** The revision number of the security update being uninstalled. +- **transactionCanceled** Indicates whether the uninstall was cancelled. + + +### CbsServicingProvider.CbsQualityUpdateInstall + +This event reports on the performance and reliability results of installing Servicing content from Windows Update to keep Windows up to date. + +The following fields are available: + +- **buildVersion** The build version number of the update package. +- **clientId** The name of the application requesting the optional content. +- **corruptionHistoryFlags** A bitmask of the types of component store corruption that have caused update failures on the device. +- **corruptionType** An enumeration listing the type of data corruption responsible for the current update failure. +- **currentStateEnd** The final state of the package after the operation has completed. +- **doqTimeSeconds** The time in seconds spent updating drivers. +- **executeTimeSeconds** The number of seconds required to execute the install. +- **failureDetails** The driver or installer that caused the update to fail. +- **failureSourceEnd** An enumeration indicating at what phase of the update a failure occurred. +- **hrStatusEnd** The return code of the install operation. +- **initiatedOffline** A true or false value indicating whether the package was installed into an offline Windows Imaging Format (WIM) file. +- **majorVersion** The major version number of the update package. +- **minorVersion** The minor version number of the update package. +- **originalState** The starting state of the package. +- **overallTimeSeconds** The time (in seconds) to perform the overall servicing operation. +- **planTimeSeconds** The time in seconds required to plan the update operations. +- **poqTimeSeconds** The time in seconds processing file and registry operations. +- **postRebootTimeSeconds** The time (in seconds) to do startup processing for the update. +- **preRebootTimeSeconds** The time (in seconds) between execution of the installation and the reboot. +- **primitiveExecutionContext** An enumeration indicating at what phase of shutdown or startup the update was installed. +- **rebootCount** The number of reboots required to install the update. +- **rebootTimeSeconds** The time (in seconds) before startup processing begins for the update. +- **resolveTimeSeconds** The time in seconds required to resolve the packages that are part of the update. +- **revisionVersion** The revision version number of the update package. +- **rptTimeSeconds** The time in seconds spent executing installer plugins. +- **shutdownTimeSeconds** The time (in seconds) required to do shutdown processing for the update. +- **stackRevision** The revision number of the servicing stack. +- **stageTimeSeconds** The time (in seconds) required to stage all files that are part of the update. + + +## Deployment extensions + +### DeploymentTelemetry.Deployment_End + +This event indicates that a Deployment 360 API has completed. + +The following fields are available: + +- **ClientId** Client ID of the user utilizing the D360 API. +- **ErrorCode** Error code of action. +- **FlightId** The specific ID of the Windows Insider build the device is getting. +- **Mode** Phase in upgrade. +- **RelatedCV** The correction vector (CV) of any other related events +- **Result** End result of the action. + + +### DeploymentTelemetry.Deployment_SetupBoxLaunch + +This event indicates that the Deployment 360 APIs have launched Setup Box. + +The following fields are available: + +- **ClientId** The client ID of the user utilizing the D360 API. +- **FlightId** The specific ID of the Windows Insider build the device is getting. +- **Quiet** Whether Setup will run in quiet mode or full mode. +- **RelatedCV** The correlation vector (CV) of any other related events. +- **SetupMode** The current setup phase. + + +### DeploymentTelemetry.Deployment_SetupBoxResult + +This event indicates that the Deployment 360 APIs have received a return from Setup Box. + +The following fields are available: + +- **ClientId** Client ID of the user utilizing the D360 API. +- **ErrorCode** Error code of the action. +- **FlightId** The specific ID of the Windows Insider build the device is getting. +- **Quiet** Indicates whether Setup will run in quiet mode or full mode. +- **RelatedCV** The correlation vector (CV) of any other related events. +- **SetupMode** The current Setup phase. + + +### DeploymentTelemetry.Deployment_Start + +This event indicates that a Deployment 360 API has been called. + +The following fields are available: + +- **ClientId** Client ID of the user utilizing the D360 API. +- **FlightId** The specific ID of the Windows Insider build the device is getting. +- **Mode** The current phase of the upgrade. +- **RelatedCV** The correlation vector (CV) of any other related events. + + +## Diagnostic data events + +### TelClientSynthetic.AuthorizationInfo_RuntimeTransition + +This event sends data indicating that a device has undergone a change of telemetry opt-in level detected at UTC startup, to help keep Windows up to date. The telemetry opt-in level signals what data we are allowed to collect. + +The following fields are available: + +- **CanAddMsaToMsTelemetry** True if we can add MSA PUID and CID to telemetry, false otherwise. +- **CanCollectAnyTelemetry** True if we are allowed to collect partner telemetry, false otherwise. +- **CanCollectCoreTelemetry** True if we can collect CORE/Basic telemetry, false otherwise. +- **CanCollectHeartbeats** True if we can collect heartbeat telemetry, false otherwise. +- **CanCollectOsTelemetry** True if we can collect diagnostic data telemetry, false otherwise. +- **CanCollectWindowsAnalyticsEvents** True if we can collect Windows Analytics data, false otherwise. +- **CanPerformDiagnosticEscalations** True if we can perform diagnostic escalation collection, false otherwise. +- **CanPerformTraceEscalations** True if we can perform trace escalation collection, false otherwise. +- **CanReportScenarios** True if we can report scenario completions, false otherwise. +- **PreviousPermissions** Bitmask of previous telemetry state. +- **TransitionFromEverythingOff** True if we are transitioning from all telemetry being disabled, false otherwise. + + +### TelClientSynthetic.AuthorizationInfo_Startup + +Fired by UTC at startup to signal what data we are allowed to collect. + +The following fields are available: + +- **CanAddMsaToMsTelemetry** True if we can add MSA PUID and CID to telemetry, false otherwise. +- **CanCollectAnyTelemetry** True if we are allowed to collect partner telemetry, false otherwise. +- **CanCollectCoreTelemetry** True if we can collect CORE/Basic telemetry, false otherwise. +- **CanCollectHeartbeats** True if we can collect heartbeat telemetry, false otherwise. +- **CanCollectOsTelemetry** True if we can collect diagnostic data telemetry, false otherwise. +- **CanCollectWindowsAnalyticsEvents** True if we can collect Windows Analytics data, false otherwise. +- **CanPerformDiagnosticEscalations** True if we can perform diagnostic escalation collection, false otherwise. +- **CanPerformTraceEscalations** True if we can perform trace escalation collection, false otherwise. +- **CanReportScenarios** True if we can report scenario completions, false otherwise. +- **PreviousPermissions** Bitmask of previous telemetry state. +- **TransitionFromEverythingOff** True if we are transitioning from all telemetry being disabled, false otherwise. + + +### TelClientSynthetic.ConnectivityHeartBeat_0 + +This event sends data about the connectivity status of the Connected User Experience and Telemetry component that uploads telemetry events. If an unrestricted free network (such as Wi-Fi) is available, this event updates the last successful upload time. Otherwise, it checks whether a Connectivity Heartbeat event was fired in the past 24 hours, and if not, it fires an event. A Connectivity Heartbeat event also fires when a device recovers from costed network to free network. + +The following fields are available: + +- **CensusExitCode** Returns last execution codes from census client run. +- **CensusStartTime** Returns timestamp corresponding to last successful census run. +- **CensusTaskEnabled** Returns Boolean value for the census task (Enable/Disable) on client machine. +- **LastConnectivityLossTime** Retrieves the last time the device lost free network. +- **NetworkState** Retrieves the network state: 0 = No network. 1 = Restricted network. 2 = Free network. +- **NoNetworkTime** Retrieves the time spent with no network (since the last time) in seconds. +- **RestrictedNetworkTime** Retrieves the time spent on a metered (cost restricted) network in seconds. + + +### TelClientSynthetic.HeartBeat_5 + +This event sends data about the health and quality of the diagnostic data from the given device, to help keep Windows up to date. It also enables data analysts to determine how 'trusted' the data is from a given device. + +The following fields are available: + +- **AgentConnectionErrorsCount** Number of non-timeout errors associated with the host/agent channel. +- **AgentConnectionrrorCsCount** No content is currently available. +- **CensusExitCode** The last exit code of the Census task. +- **CensusStartTime** Time of last Census run. +- **CensusTaskEnabled** True if Census is enabled, false otherwise. +- **CompressedBytesUploaded** Number of compressed bytes uploaded. +- **ConsumerDroppedCount** Number of events dropped at consumer layer of telemetry client. +- **CriticalDataDbDroppedCount** Number of critical data sampled events dropped at the database layer. +- **CriticalDataThrottleDroppedCount** The number of critical data sampled events that were dropped because of throttling. +- **CriticalOverflowEntersCounter** Number of times critical overflow mode was entered in event DB. +- **DbCriticalDroppedCount** Total number of dropped critical events in event DB. +- **DbDroppedCount** Number of events dropped due to DB fullness. +- **DbDroppedFailureCount** Number of events dropped due to DB failures. +- **DbDroppedFullCount** Number of events dropped due to DB fullness. +- **DecodingDroppedCount** Number of events dropped due to decoding failures. +- **DecodthiDroppedCount** No content is currently available. +- **EnteringCriticalOverflowDroppedCounter** Number of events dropped due to critical overflow mode being initiated. +- **EnterthiCriticalOverflowDroppedCounter** No content is currently available. +- **EtwDroppedBufferCount** Number of buffers dropped in the UTC ETW session. +- **EtwDroppedCount** Number of events dropped at ETW layer of telemetry client. +- **EventsPersistedCount** Number of events that reached the PersistEvent stage. +- **EventStoreLifetimeResetCounter** Number of times event DB was reset for the lifetime of UTC. +- **EventStoreResetCounter** Number of times event DB was reset. +- **EventStoreResetSizeSum** Total size of event DB across all resets reports in this instance. +- **EventSubStoreResetCounter** Number of times event DB was reset. +- **EventSubStoreResetSizeSum** Total size of event DB across all resets reports in this instance. +- **EventsUploaded** Number of events uploaded. +- **Flags** Flags indicating device state such as network state, battery state, and opt-in state. +- **FullTriggerBufferDroppedCount** Number of events dropped due to trigger buffer being full. +- **HeartBeatSequenceNumber** The sequence number of this heartbeat. +- **InvalidHttpCodeCount** Number of invalid HTTP codes received from contacting Vortex. +- **LastAgentConnectionError** Last non-timeout error encountered in the host/agent channel. +- **LastAgentConnectionrrorC** No content is currently available. +- **LastEventSizeOffender** Event name of last event which exceeded max event size. +- **LastInvalidHttpCode** Last invalid HTTP code received from Vortex. +- **Max8ctiveAgentConnectionCount** No content is currently available. +- **MaxActiveAgentConnectionCount** The maximum number of active agents during this heartbeat timeframe. +- **MaxInUseScenarioCounter** Soft maximum number of scenarios loaded by UTC. +- **MaxInUseScenaryoCounter** No content is currently available. +- **omporessedBytesUploaded** No content is currently available. +- **PreviousHeartBeatTime** Time of last heartbeat event (allows chaining of events). +- **PrivacyBlockedCount** The number of events blocked due to privacy settings or tags. +- **RepeatedUploadFailqreDpopped** No content is currently available. +- **RepeatedUploadFailureDropped** Number of events lost due to repeated upload failures for a single buffer. +- **SettingsHttpAttempts** Number of attempts to contact OneSettings service. +- **SettingsHttpFailures** The number of failures from contacting the OneSettings service. +- **SettthisHttpAttempts** No content is currently available. +- **SettthisHttpFailures** No content is currently available. +- **ThrottledDroppedCount** Number of events dropped due to throttling of noisy providers. +- **TopUploaderErrors** List of top errors received from the upload endpoint. +- **TopUploaderrrorCs** No content is currently available. +- **UphoaderErporCount** No content is currently available. +- **UploaderDroppedCount** Number of events dropped at the uploader layer of telemetry client. +- **UploaderErrorCount** Number of errors received from the upload endpoint. +- **VortexFailuresTimeout** The number of timeout failures received from Vortex. +- **VortexHttpAttempts** Number of attempts to contact Vortex. +- **VortexHttpFailures4xx** Number of 400-499 error codes received from Vortex. +- **VortexHttpFailures5xx** Number of 500-599 error codes received from Vortex. +- **VortexHttpResponseFailures** Number of Vortex responses that are not 2XX or 400. +- **VortexHttpResponsesWirhDroppedEvents** No content is currently available. +- **VortexHttpResponsesWithDroppedEvents** Number of Vortex responses containing at least 1 dropped event. + + +### TelClientSynthetic.HeartBeat_Aria_5 + +This event is the telemetry client ARIA heartbeat. + +The following fields are available: + +- **CompressedBytesUploaded** Number of compressed bytes uploaded. +- **CriticalDataDbDroppedCount** Number of critical data sampled events dropped at the database layer. +- **CriticalOverflowEntersCounter** Number of times critical overflow mode was entered in event database. +- **DbCriticalDroppedCount** Total number of dropped critical events in event database. +- **DbDroppedCount** Number of events dropped at the database layer. +- **DbDroppedFailureCount** Number of events dropped due to database failures. +- **DbDroppedFullCount** Number of events dropped due to database being full. +- **EnteringCriticalOverflowDroppedCounter** Number of events dropped due to critical overflow mode being initiated. +- **Eve~tStoreResetCounter** No content is currently available. +- **EventsPersistedCount** Number of events that reached the PersistEvent stage. +- **EventStoreLifetimeResetCounter** Number of times the event store has been reset. +- **EventStoreResetCounter** Number of times the event store has been reset during this heartbeat. +- **EventStoreResetSizeSum** Size of event store reset in bytes. +- **EventsUploaded** Number of events uploaded. +- **HeartBeatSequenceNumber** The sequence number of this heartbeat. +- **InvalidHttpCodeCount** Number of invalid HTTP codes received from contacting Vortex. +- **LastEventSizeOffender** Event name of last event which exceeded max event size. +- **LastInvalidHttpCode** Last invalid HTTP code received from Vortex. +- **PreviousHeartBeatTime** The FILETIME of the previous heartbeat fire. +- **PrivacyBlockedCount** The number of events blocked due to privacy settings or tags. +- **RepeatedUploadFailureDropped** Number of events lost due to repeated upload failures for a single buffer. +- **SettingsHttpAttempts** Number of attempts to contact OneSettings service. +- **SettingsHttpFailures** Number of failures from contacting OneSettings service. +- **TopUploaderErrors** List of top errors received from the upload endpoint. +- **UploaderDroppedCount** Number of events dropped at the uploader layer of telemetry client. +- **UploaderErrorCount** Number of errors received from the upload endpoint. +- **VortexFailuresTimeout** Number of time out failures received from Vortex. +- **VortexHttpAttempts** Number of attempts to contact Vortex. +- **VortexHttpFailures4xx** Number of 400-499 error codes received from Vortex. +- **VortexHttpFailures5xx** Number of 500-599 error codes received from Vortex. +- **VortexHttpResponseFailures** Number of Vortex responses that are not 2XX or 400. +- **VortexHttpResponsesWithDroppedEvents** Number of Vortex responses containing at least 1 dropped event. + + +### TelClientSynthetic.HeartBeat_Seville_5 + +This event is sent by the universal telemetry client (UTC) as a heartbeat signal for Sense. + +The following fields are available: + +- **AgentConnectionErrorsCount** Number of non-timeout errors associated with the host or agent channel. +- **CompressedBytesUploaded** Number of compressed bytes uploaded. +- **ConsumerDroppedCount** Number of events dropped at consumer layer of the telemetry client. +- **CriticalDataDbDroppedCount** Number of critical data sampled events dropped at the database layer. +- **CriticalDataThrottleDroppedCount** Number of critical data sampled events dropped due to throttling. +- **CriticalOverflowEntersCounter** Number of times critical overflow mode was entered in event database. +- **DailyUploadQuotaInBytes** Daily upload quota for Sense in bytes (only in in-proc mode). +- **DbCriticalDroppedCount** Total number of dropped critical events in event database. +- **DbDroppedCount** Number of events dropped due to database being full. +- **DbDroppedFailureCount** Number of events dropped due to database failures. +- **DbDroppedFullCount** Number of events dropped due to database being full. +- **DecodingDroppedCount** Number of events dropped due to decoding failures. +- **DiskSizeInBytes** Size of event store for Sense in bytes (only in in-proc mode). +- **EnteringCriticalOverflowDroppedCounter** Number of events dropped due to critical overflow mode being initiated. +- **EtwDroppedBufferCount** Number of buffers dropped in the universal telemetry client (UTC) event tracing for Windows (ETW) session. +- **EtwDroppedCount** Number of events dropped at the event tracing for Windows (ETW) layer of telemetry client. +- **EventsPersistedCount** Number of events that reached the PersistEvent stage. +- **EventStoreLifetimeResetCounter** Number of times event the database was reset for the lifetime of the universal telemetry client (UTC). +- **EventStoreResetCounter** Number of times the event database was reset. +- **EventStoreResetSizeSum** Total size of the event database across all resets reports in this instance. +- **EventsUploaded** Number of events uploaded. +- **Flags** Flags indicating device state, such as network state, battery state, and opt-in state. +- **FullTriggerBufferDroppedCount** Number of events dropped due to trigger buffer being full. +- **HeartBeatSequenceNumber** The sequence number of this heartbeat. +- **InvalidHttpCodeCount** Number of invalid HTTP codes received from contacting Vortex. +- **LastAgentConnectionError** Last non-timeout error encountered in the host/agent channel. +- **LastEventSizeOffender** Event name of last event which exceeded the maximum event size. +- **LastInvalidHttpCode** Last invalid HTTP code received from Vortex. +- **MaxActiveAgentConnectionCount** Maximum number of active agents during this heartbeat timeframe. +- **NormalUploadTimerMillis** Number of milliseconds between each upload of normal events for SENSE (only in in-proc mode). +- **PreviousHeartBeatTime** Time of last heartbeat event (allows chaining of events). +- **RepeatedUploadFailureDropped** Number of events lost due to repeated failed uploaded attempts. +- **SettingsHttpAttempts** Number of attempts to contact OneSettings service. +- **SettingsHttpFailures** Number of failures from contacting the OneSettings service. +- **ThrottledDroppedCount** Number of events dropped due to throttling of noisy providers. +- **TopUploaderErrors** Top uploader errors, grouped by endpoint and error type. +- **UploaderDroppedCount** Number of events dropped at the uploader layer of the telemetry client. +- **UploaderErrorCount** Number of input for the TopUploaderErrors mode estimation. +- **VortexFailuresTimeout** Number of time out failures received from Vortex. +- **VortexHttpAttempts** Number of attempts to contact Vortex. +- **VortexHttpFailures4xx** Number of 400-499 error codes received from Vortex. +- **VortexHttpFailures5xx** Number of 500-599 error codes received from Vortex. +- **VortexHttpResponseFailures** Number of Vortex responses that are not 2XX or 400. +- **VortexHttpResponsesWithDroppedEvents** Number of Vortex responses containing at least 1 dropped event. + + +## Direct to update events + +### Microsoft.Windows.DirectToUpdate.DTUCoordinatorCheckApplicability + +Event to indicate that the Coordinator CheckApplicability call succeeded. + +The following fields are available: + +- **ApplicabilityResult** Result of CheckApplicability function. +- **CampaignID** Campaign ID being run. +- **ClientID** Client ID being run. +- **CoordinatorVersion** Coordinator version of DTU. +- **CV** Correlation vector. +- **IsDeviceAADDomainJoined** Indicates whether the device is logged in to the AAD (Azure Active Directory) domain. +- **IsDeviceADDomainJoined** Indicates whether the device is logged in to the AD (Active Directory) domain. +- **IsDeviceCloverTrail** Indicates whether the device has a Clover Trail system installed. +- **IsDeviceFeatureUpdatingPaused** Indicates whether Feature Update is paused on the device. +- **IsDeviceNetworkMetered** Indicates whether the device is connected to a metered network. +- **IsDeviceOobeBlocked** Indicates whether user approval is required to install updates on the device. +- **IsDeviceRequireUpdateApproval** Indicates whether user approval is required to install updates on the device. +- **IsDeviceSccmManaged** Indicates whether the device is running the Microsoft SCCM (System Center Configuration Manager) to keep the operating system and applications up to date. +- **IsDeviceUninstallActive** Indicates whether the OS (operating system) on the device was recently updated. +- **IsDeviceUpdateNotificationLevel** Indicates whether the device has a set policy to control update notifications. +- **IsDeviceUpdateServiceManaged** Indicates whether the device uses WSUS (Windows Server Update Services). +- **IsDeviceZeroExhaust** Indicates whether the device subscribes to the Zero Exhaust policy to minimize connections from Windows to Microsoft. +- **IsGreaterThanMaxRetry** Indicates whether the DTU (Direct to Update) service has exceeded its maximum retry count. +- **IsVolumeLicensed** Indicates whether a volume license was used to authenticate the operating system or applications on the device. + + +### Microsoft.Windows.DirectToUpdate.DTUCoordinatorCheckApplicabilityGenericFailure + +This event indicatse that we have received an unexpected error in the Direct to Update (DTU) Coordinators CheckApplicability call. + +The following fields are available: + +- **CampaignID** ID of the campaign being run. +- **ClientID** ID of the client receiving the update. +- **CoordinatorVersion** Coordinator version of Direct to Update. +- **CV** Correlation vector. +- **hResult** HRESULT of the failure. + + +### Microsoft.Windows.DirectToUpdate.DTUCoordinatorCleanupGenericFailure + +This event indicates that we have received an unexpected error in the Direct to Update (DTU) Coordinator Cleanup call. + +The following fields are available: + +- **CampaignID** Campaign ID being run +- **ClientID** Client ID being run +- **CoordinatorVersion** Coordinator version of DTU +- **CV** Correlation vector +- **hResult** HRESULT of the failure + + +### Microsoft.Windows.DirectToUpdate.DTUCoordinatorCleanupSuccess + +This event indicates that the Coordinator Cleanup call succeeded. + +The following fields are available: + +- **CampaignID** Campaign ID being run +- **ClientID** Client ID being run +- **CoordinatorVersion** Coordinator version of DTU +- **CV** Correlation vector + + +### Microsoft.Windows.DirectToUpdate.DTUCoordinatorCommitGenericFailure + +This event indicates that we have received an unexpected error in the Direct to Update (DTU) Coordinator Commit call. + +The following fields are available: + +- **CampaignID** Campaign ID being run. +- **ClientID** Client ID being run. +- **CoordinatorVersion** Coordinator version of DTU. +- **CV** Correlation vector. +- **hResult** HRESULT of the failure. + + +### Microsoft.Windows.DirectToUpdate.DTUCoordinatorCommitSuccess + +This event indicates that the Coordinator Commit call succeeded. + +The following fields are available: + +- **CampaignID** Campaign ID being run. +- **ClientID** Client ID being run. +- **CoordinatorVersion** Coordinator version of DTU. +- **CV** Correlation vector. + + +### Microsoft.Windows.DirectToUpdate.DTUCoordinatorDownloadGenericFailure + +This event indicates that we have received an unexpected error in the Direct to Update (DTU) Coordinator Download call. + +The following fields are available: + +- **CampaignID** Campaign ID being run. +- **ClientID** Client ID being run. +- **CoordinatorVersion** Coordinator version of DTU. +- **CV** Correlation vector. +- **hResult** HRESULT of the failure. + + +### Microsoft.Windows.DirectToUpdate.DTUCoordinatorDownloadIgnoredFailure + +This event indicates that we have received an error in the Direct to Update (DTU) Coordinator Download call that will be ignored. + +The following fields are available: + +- **CampaignID** Campaign ID being run. +- **ClientID** Client ID being run. +- **CoordinatorVersion** Coordinator version of DTU. +- **CV** Correlation vector. +- **hResult** HRESULT of the failure. + + +### Microsoft.Windows.DirectToUpdate.DTUCoordinatorDownloadSuccess + +This event indicates that the Coordinator Download call succeeded. + +The following fields are available: + +- **CampaignID** Campaign ID being run. +- **ClientID** Client ID being run. +- **CoordinatorVersion** Coordinator version of DTU. +- **CV** Correlation vector. + + +### Microsoft.Windows.DirectToUpdate.DTUCoordinatorHandleShutdownGenericFailure + +This event indicates that we have received an unexpected error in the Direct to Update (DTU) Coordinator HandleShutdown call. + +The following fields are available: + +- **CampaignID** Campaign ID being run. +- **ClientID** Client ID being run. +- **CoordinatorVersion** Coordinate version of DTU. +- **CV** Correlation vector. +- **hResult** HRESULT of the failure. + + +### Microsoft.Windows.DirectToUpdate.DTUCoordinatorHandleShutdownSuccess + +This event indicates that the Coordinator HandleShutdown call succeeded. + +The following fields are available: + +- **CampaignID** Campaign ID being run. +- **ClientID** Client ID being run. +- **CoordinatorVersion** Coordinator version of DTU. +- **CV** Correlation vector. + + +### Microsoft.Windows.DirectToUpdate.DTUCoordinatorInitializeGenericFailure + +This event indicates that we have received an unexpected error in the Direct to Update (DTU) Coordinator Initialize call. + +The following fields are available: + +- **CampaignID** Campaign ID being run. +- **ClientID** Client ID being run. +- **CoordinatorVersion** Coordinator version of DTU. +- **CV** Correlation vector. +- **hResult** HRESULT of the failure. + + +### Microsoft.Windows.DirectToUpdate.DTUCoordinatorInitializeSuccess + +This event indicates that the Coordinator Initialize call succeeded. + +The following fields are available: + +- **CampaignID** Campaign ID being run. +- **ClientID** Client ID being run. +- **CoordinatorVersion** Coordinator version of DTU. +- **CV** Correlation vector. + + +### Microsoft.Windows.DirectToUpdate.DTUCoordinatorInstallGenericFailure + +This event indicates that we have received an unexpected error in the Direct to Update (DTU) Coordinator Install call. + +The following fields are available: + +- **CampaignID** Campaign ID being run. +- **ClientID** Client ID being run. +- **CoordinatorVersion** Coordinator version of DTU. +- **CV** Correlation vector. +- **hResult** HRESULT of the failure. + + +### Microsoft.Windows.DirectToUpdate.DTUCoordinatorInstallIgnoredFailure + +This event indicates that we have received an error in the Direct to Update (DTU) Coordinator Install call that will be ignored. + +The following fields are available: + +- **CampaignID** Campaign ID being run. +- **ClientID** Client ID being run. +- **CoordinatorVersion** Coordinator version of DTU. +- **CV** Correlation vector. +- **hResult** HRESULT of the failure. + + +### Microsoft.Windows.DirectToUpdate.DTUCoordinatorInstallSuccess + +This event indicates that the Coordinator Install call succeeded. + +The following fields are available: + +- **CampaignID** Campaign ID being run. +- **ClientID** Client ID being run. +- **CoordinatorVersion** Coordinator version of DTU. +- **CV** Correlation vector. + + +### Microsoft.Windows.DirectToUpdate.DTUCoordinatorProgressCallBack + +This event indicates that the Coordinator's progress callback has been called. + +The following fields are available: + +- **CampaignID** Campaign ID being run. +- **ClientID** Client ID being run. +- **CoordinatorVersion** Coordinator version of DTU. +- **CV** Correlation vector. +- **DeployPhase** Current Deploy Phase. + + +### Microsoft.Windows.DirectToUpdate.DTUCoordinatorSetCommitReadySuccess + +This event indicates that the Coordinator SetCommitReady call succeeded. + +The following fields are available: + +- **CampaignID** ID of the update campaign being run. +- **ClientID** ID of the client receiving the update. +- **CoordinatorVersion** Coordinator version of Direct to Update. +- **CV** Correlation vector. + + +### Microsoft.Windows.DirectToUpdate.DTUCoordinatorWaitForRebootUiNotShown + +This event indicates that the Coordinator WaitForRebootUi call succeeded. + +The following fields are available: + +- **CampaignID** Campaign ID being run. +- **ClientID** ID of the client receiving the update. +- **CoordinatorVersion** Coordinator version of Direct to Update. +- **CV** Correlation vector. +- **hResult** HRESULT of the failure. + + +### Microsoft.Windows.DirectToUpdate.DTUCoordinatorWaitForRebootUiSelection + +This event indicates that the user selected an option on the Reboot UI. + +The following fields are available: + +- **CampaignID** ID of the update campaign being run. +- **ClientID** ID of the client receiving the update. +- **CoordinatorVersion** Coordinator version of Direct to Update. +- **CV** Correlation vector. +- **rebootUiSelection** Selection on the Reboot UI. + + +### Microsoft.Windows.DirectToUpdate.DTUCoordinatorWaitForRebootUiSuccess + +This event indicates that the Coordinator WaitForRebootUi call succeeded. + +The following fields are available: + +- **CampaignID** ID of the update campaign being run. +- **ClientID** ID of the client receiving the update. +- **CoordinatorVersion** Coordinator version of Direct to Update. +- **CV** Correlation vector. + + +### Microsoft.Windows.DirectToUpdate.DTUHandlerCheckApplicabilityInternalGenericFailure + +This event indicates that we have received an unexpected error in the Direct to Update (DTU) Handler CheckApplicabilityInternal call. + +The following fields are available: + +- **CampaignID** ID of the campaign being run. +- **ClientID** ID of the client receiving the update. +- **CoordinatorVersion** Coordinator version of Direct to Update. +- **CV** Correlation vector. +- **hResult** HRESULT of the failure. + + +### Microsoft.Windows.DirectToUpdate.DTUHandlerCheckApplicabilityInternalSuccess + +This event indicates that the Handler CheckApplicabilityInternal call succeeded. + +The following fields are available: + +- **ApplicabilityResult** The result of the applicability check. +- **CampaignID** ID of the update campaign being run. +- **ClientID** ID of the client receiving the update. +- **CoordinatorVersion** Coordinator version of Direct to Update. +- **CV** Correlation vector. + + +### Microsoft.Windows.DirectToUpdate.DTUHandlerCheckApplicabilitySuccess + +This event indicates that the Handler CheckApplicability call succeeded. + +The following fields are available: + +- **ApplicabilityResult** The result code indicating whether the update is applicable. +- **CampaignID** ID of the update campaign being run. +- **ClientID** ID of the client receiving the update. +- **CoordinatorVersion** Coordinator version of Direct to Update. +- **CV** Correlation vector. +- **CV_new** New correlation vector. + + +### Microsoft.Windows.DirectToUpdate.DTUHandlerCheckIfCoordinatorMinApplicableVersionSuccess + +This event indicates that the Handler CheckIfCoordinatorMinApplicableVersion call succeeded. + +The following fields are available: + +- **CampaignID** ID of the update campaign being run. +- **CheckIfCoordinatorMinApplicableVersionResult** Result of CheckIfCoordinatorMinApplicableVersion function. +- **ClientID** ID of the client receiving the update. +- **CoordinatorVersion** Coordinator version of Direct to Update. +- **CV** Correlation vector. + + +### Microsoft.Windows.DirectToUpdate.DTUHandlerCommitGenericFailure + +This event indicates that we have received an unexpected error in the Direct to Update (DTU) Handler Commit call. + +The following fields are available: + +- **CampaignID** ID of the update campaign being run. +- **ClientID** ID of the client receiving the update. +- **CoordinatorVersion** Coordinator version of Direct to Update. +- **CV** Correlation vector. +- **CV_new** New correlation vector. +- **hResult** HRESULT of the failure. + + +### Microsoft.Windows.DirectToUpdate.DTUHandlerCommitSuccess + +This event indicates that the Handler Commit call succeeded. + +The following fields are available: + +- **CampaignID** ID of the update campaign being run.run +- **ClientID** ID of the client receiving the update. +- **CoordinatorVersion** Coordinator version of Direct to Update. +- **CV** Correlation vector. +- **CV_new** New correlation vector. + + +### Microsoft.Windows.DirectToUpdate.DTUHandlerDownloadAndExtractCabFailure + +This event indicates that the Handler Download and Extract cab call failed. + +The following fields are available: + +- **CampaignID** ID of the update campaign being run. +- **ClientID** ID of the client receiving the update. +- **CoordinatorVersion** Coordinator version of Direct to Update. +- **CV** Correlation vector. +- **DownloadAndExtractCabFunction_failureReason** Reason why the update download and extract process failed. +- **hResult** HRESULT of the failure. + + +### Microsoft.Windows.DirectToUpdate.DTUHandlerDownloadAndExtractCabSuccess + +This event indicates that the Handler Download and Extract cab call succeeded. + +The following fields are available: + +- **CampaignID** ID of the update campaign being run. +- **ClientID** ID of the client receiving the update. +- **CoordinatorVersion** Coordinator version of Direct to Update. +- **CV** Correlation vector. + + +### Microsoft.Windows.DirectToUpdate.DTUHandlerDownloadGenericFailure + +This event indicates that we have received an unexpected error in the Direct to Update (DTU) Handler Download call. + +The following fields are available: + +- **CampaignID** ID of the update campaign being run. +- **ClientID** ID of the client receiving the update. +- **CoordinatorVersion** Coordinator version of Direct to Update. +- **CV** Correlation vector. +- **hResult** HRESULT of the failure. + + +### Microsoft.Windows.DirectToUpdate.DTUHandlerDownloadSuccess + +This event indicates that the Handler Download call succeeded. + +The following fields are available: + +- **CampaignID** ID of the update campaign being run. +- **ClientID** ID of the client receiving the update. +- **CoordinatorVersion** Coordinator version of Direct to Update. +- **CV** Correlation vector. + + +### Microsoft.Windows.DirectToUpdate.DTUHandlerInitializeGenericFailure + +This event indicates that we have received an unexpected error in the Direct to Update (DTU) Handler Initialize call. + +The following fields are available: + +- **CampaignID** ID of the update campaign being run. +- **ClientID** ID of the client receiving the update. +- **CoordinatorVersion** Coordinator version of Direct to Update. +- **CV** Correlation vector. +- **DownloadAndExtractCabFunction_hResult** HRESULT of the download and extract. +- **hResult** HRESULT of the failure. + + +### Microsoft.Windows.DirectToUpdate.DTUHandlerInitializeSuccess + +This event indicates that the Handler Initialize call succeeded. + +The following fields are available: + +- **CampaignID** ID of the update campaign being run. +- **ClientID** ID of the client receiving the update. +- **CoordinatorVersion** Coordinator version of Direct to Update. +- **CV** Correlation vector. +- **DownloadAndExtractCabFunction_hResult** HRESULT of the download and extraction. + + +### Microsoft.Windows.DirectToUpdate.DTUHandlerInstallGenericFailure + +This event indicates that we have received an unexpected error in the Direct to Update (DTU) Handler Install call. + +The following fields are available: + +- **CampaignID** ID of the update campaign being run. +- **ClientID** ID of the client receiving the update. +- **CoordinatorVersion** Coordinator version of Direct to Update. +- **CV** Correlation vector. +- **hResult** HRESULT of the failure. + + +### Microsoft.Windows.DirectToUpdate.DTUHandlerInstallSuccess + +This event indicates that the Coordinator Install call succeeded. + +The following fields are available: + +- **CampaignID** ID of the update campaign being run. +- **ClientID** ID of the client receiving the update. +- **CoordinatorVersion** Coordinator version of Direct to Update. +- **CV** Correlation vector. + + +### Microsoft.Windows.DirectToUpdate.DTUHandlerSetCommitReadySuccess + +This event indicates that the Handler SetCommitReady call succeeded. + +The following fields are available: + +- **CampaignID** ID of the campaign being run. +- **ClientID** ID of the client receiving the update. +- **CoordinatorVersion** Coordinator version of Direct to Update. +- **CV** Correlation vector. + + +### Microsoft.Windows.DirectToUpdate.DTUHandlerWaitForRebootUiGenericFailure + +This event indicates that we have received an unexpected error in the Direct to Update (DTU) Handler WaitForRebootUi call. + +The following fields are available: + +- **CampaignID** The ID of the campaigning being run. +- **ClientID** ID of the client receiving the update. +- **CoordinatorVersion** Coordinator version of Direct to Update. +- **CV** Correlation vector. +- **hResult** The HRESULT of the failure. + + +### Microsoft.Windows.DirectToUpdate.DTUHandlerWaitForRebootUiSuccess + +This event indicates that the Handler WaitForRebootUi call succeeded. + +The following fields are available: + +- **CampaignID** ID of the campaign being run. +- **ClientID** ID of the client receiving the update. +- **CoordinatorVersion** Coordinator version of Direct to Update. +- **CV** Correlation vector. + + +## DxgKernelTelemetry events + +### DxgKrnlTelemetry.GPUAdapterInventoryV2 + +This event sends basic GPU and display driver information to keep Windows and display drivers up-to-date. + +The following fields are available: + +- **AdapterTypeValue** The numeric value indicating the type of Graphics adapter. +- **aiSeqId** The event sequence ID. +- **bootId** The system boot ID. +- **BrightnessVersionViaDDI** The version of the Display Brightness Interface. +- **ComputePreemptionLevel** The maximum preemption level supported by GPU for compute payload. +- **DedicatedSystemMemoryB** The amount of system memory dedicated for GPU use (in bytes). +- **DedicatedVideoMemoryB** The amount of dedicated VRAM of the GPU (in bytes). +- **DedicatedVkdeoMemoryB** No content is currently available. +- **DisplayAdapterLuid** The display adapter LUID. +- **DriverDate** The date of the display driver. +- **DriverRank** The rank of the display driver. +- **DriverVersion** The display driver version. +- **DX10UMDFilePath** The file path to the location of the DirectX 10 Display User Mode Driver in the Driver Store. +- **DX11UMDFilePath** The file path to the location of the DirectX 11 Display User Mode Driver in the Driver Store. +- **DX12UMDFilePath** The file path to the location of the DirectX 12 Display User Mode Driver in the Driver Store. +- **DX9UMDFilePath** The file path to the location of the DirectX 9 Display User Mode Driver in the Driver Store. +- **GPUDeviceID** The GPU device ID. +- **GPUPreemptionLevel** The maximum preemption level supported by GPU for graphics payload. +- **GPURevisionID** The GPU revision ID. +- **GPUVendorID** The GPU vendor ID. +- **GPUVgndorID** No content is currently available. +- **InterfaceId** The GPU interface ID. +- **IsDisplayDevice** Does the GPU have displaying capabilities? +- **IsHwSchSupported** Indicates whether the adapter supports hardware scheduling. +- **IsHybridDiscrete** Does the GPU have discrete GPU capabilities in a hybrid device? +- **IsHybridIntegrated** Does the GPU have integrated GPU capabilities in a hybrid device? +- **IsLDA** Is the GPU comprised of Linked Display Adapters? +- **IsMiracastSupported** Does the GPU support Miracast? +- **IsMismatchLDA** Is at least one device in the Linked Display Adapters chain from a different vendor? +- **IsMPOSupported** Does the GPU support Multi-Plane Overlays? +- **IsMsMiracastSupported** Are the GPU Miracast capabilities driven by a Microsoft solution? +- **IsPostAdapter** Is this GPU the POST GPU in the device? +- **IsRemovable** TRUE if the adapter supports being disabled or removed. +- **IsRenderDevice** Does the GPU have rendering capabilities? +- **IsSoftwareDevice** Is this a software implementation of the GPU? +- **KMDFilePath** The file path to the location of the Display Kernel Mode Driver in the Driver Store. +- **MeasureEnabled** Is the device listening to MICROSOFT_KEYWORD_MEASURES? +- **MsHybridDiscrete** Indicates whether the adapter is a discrete adapter in a hybrid configuration. +- **N}mVidPnSources** No content is currently available. +- **NumVidPnSources** The number of supported display output sources. +- **NumVidPnTargets** The number of supported display output targets. +- **SharedSystemMemoryB** The amount of system memory shared by GPU and CPU (in bytes). +- **SubSystemID** The subsystem ID. +- **SubVendopID** No content is currently available. +- **SubVendorID** The GPU sub vendor ID. +- **TelemetryEnabled** Is the device listening to MICROSOFT_KEYWORD_TELEMETRY? +- **TelInvEvntTrigger** What triggered this event to be logged? Example: 0 (GPU enumeration) or 1 (DxgKrnlTelemetry provider toggling) +- **TenemetryEnabled** No content is currently available. +- **TenInvEvntTrigger** No content is currently available. +- **version** The event version. +- **WDDMVersion** The Windows Display Driver Model version. + + +## Failover Clustering events + +### Microsoft.Windows.Server.FailoverClusteringCritical.ClusterSummary2 + +This event returns information about how many resources and of what type are in the server cluster. This data is collected to keep Windows Server safe, secure, and up to date. The data includes information about whether hardware is configured correctly, if the software is patched correctly, and assists in preventing crashes by attributing issues (like fatal errors) to workloads and system configurations. + +The following fields are available: + +- **autoAssignSite** The cluster parameter: auto site. +- **autoBalancerLevel** The cluster parameter: auto balancer level. +- **autoBalancerMode** The cluster parameter: auto balancer mode. +- **blockCacheSize** The configured size of the block cache. +- **ClusterAdConfiguration** The ad configuration of the cluster. +- **clusterAdType** The cluster parameter: mgmt_point_type. +- **clusterDumpPolicy** The cluster configured dump policy. +- **clusterFunctionalLevel** The current cluster functional level. +- **clusterGuid** The unique identifier for the cluster. +- **clusterWitnessType** The witness type the cluster is configured for. +- **countNodesInSite** The number of nodes in the cluster. +- **crossSiteDelay** The cluster parameter: CrossSiteDelay. +- **crossSiteThreshold** The cluster parameter: CrossSiteThreshold. +- **crossSubnetDelay** The cluster parameter: CrossSubnetDelay. +- **crossSubnetThreshold** The cluster parameter: CrossSubnetThreshold. +- **csvCompatibleFilters** The cluster parameter: ClusterCsvCompatibleFilters. +- **csvIncompatibleFilters** The cluster parameter: ClusterCsvIncompatibleFilters. +- **csvResourceCount** The number of resources in the cluster. +- **currentNodeSite** The name configured for the current site for the cluster. +- **dasModeBusType** The direct storage bus type of the storage spaces. +- **downLevelNodeCount** The number of nodes in the cluster that are running down-level. +- **drainOnShutdown** Specifies whether a node should be drained when it is shut down. +- **dynamicQuorumEnabled** Specifies whether dynamic Quorum has been enabled. +- **enforcedAntiAffinity** The cluster parameter: enforced anti affinity. +- **genAppNames** The win32 service name of a clustered service. +- **genSvcNames** The command line of a clustered genapp. +- **hangRecoveryAction** The cluster parameter: hang recovery action. +- **hangTimeOut** Specifies the “hang time out” parameter for the cluster. +- **isCalabria** Specifies whether storage spaces direct is enabled. +- **isMixedMode** Identifies if the cluster is running with different version of OS for nodes. +- **isRunningDownLevel** Identifies if the current node is running down-level. +- **logLevel** Specifies the granularity that is logged in the cluster log. +- **logSize** Specifies the size of the cluster log. +- **lowerQuorumPriorityNodeId** The cluster parameter: lower quorum priority node ID. +- **minNeverPreempt** The cluster parameter: minimum never preempt. +- **minPreemptor** The cluster parameter: minimum preemptor priority. +- **netftIpsecEnabled** The parameter: netftIpsecEnabled. +- **NodeCount** The number of nodes in the cluster. +- **nodeId** The current node number in the cluster. +- **nodeResourceCounts** Specifies the number of node resources. +- **nodeResourceOnlineCounts** Specifies the number of node resources that are online. +- **numberOfSites** The number of different sites. +- **numNodesInNoSite** The number of nodes not belonging to a site. +- **plumbAllCrossSubnetRoutes** The cluster parameter: plumb all cross subnet routes. +- **preferredSite** The preferred site location. +- **privateCloudWitness** Specifies whether a private cloud witness exists for this cluster. +- **quarantineDuration** The quarantine duration. +- **quarantineThreshold** The quarantine threshold. +- **quorumArbitrationTimeout** In the event of an arbitration event, this specifies the quorum timeout period. +- **resiliencyLevel** Specifies the level of resiliency. +- **resourceCounts** Specifies the number of resources. +- **resourceTypeCounts** Specifies the number of resource types in the cluster. +- **resourceTypes** Data representative of each resource type. +- **resourceTypesPath** Data representative of the DLL path for each resource type. +- **sameSubnetDelay** The cluster parameter: same subnet delay. +- **sameSubnetThreshold** The cluster parameter: same subnet threshold. +- **secondsInMixedMode** The amount of time (in seconds) that the cluster has been in mixed mode (nodes with different operating system versions in the same cluster). +- **securityLevel** The cluster parameter: security level. +- **securityLevelForStorage** The cluster parameter: security level for storage. +- **sharedVolumeBlockCacheSize** Specifies the block cache size for shared for shared volumes. +- **shutdownTimeoutMinutes** Specifies the amount of time it takes to time out when shutting down. +- **upNodeCount** Specifies the number of nodes that are up (online). +- **useClientAccessNetworksForCsv** The cluster parameter: use client access networks for CSV. +- **vmIsolationTime** The cluster parameter: VM isolation time. +- **witnessDatabaseWriteTimeout** Specifies the timeout period for writing to the quorum witness database. + + +## Fault Reporting events + +### Microsoft.Windows.FaultReporting.AppCrashEvent + +This event sends data about crashes for both native and managed applications, to help keep Windows up to date. The data includes information about the crashing process and a summary of its exception record. It does not contain any Watson bucketing information. The bucketing information is recorded in a Windows Error Reporting (WER) event that is generated when the WER client reports the crash to the Watson service, and the WER event will contain the same ReportID (see field 14 of crash event, field 19 of WER event) as the crash event for the crash being reported. AppCrash is emitted once for each crash handled by WER (e.g. from an unhandled exception or FailFast or ReportException). Note that Generic Watson event types (e.g. from PLM) that may be considered crashes\" by a user DO NOT emit this event. + +The following fields are available: + +- **AppName** The name of the app that has crashed. +- **AppSessionGuid** GUID made up of process ID and is used as a correlation vector for process instances in the telemetry backend. +- **AppTimeStamp** The date/time stamp of the app. +- **AppVersion** The version of the app that has crashed. +- **ExceptionCode** The exception code returned by the process that has crashed. +- **ExceptionOffset** The address where the exception had occurred. +- **Flags** Flags indicating how reporting is done. For example, queue the report, do not offer JIT debugging, or do not terminate the process after reporting. +- **FriendlyAppName** The description of the app that has crashed, if different from the AppName. Otherwise, the process name. +- **IsFatal** True/False to indicate whether the crash resulted in process termination. +- **ModName** Exception module name (e.g. bar.dll). +- **ModTimeStamp** The date/time stamp of the module. +- **ModVersion** The version of the module that has crashed. +- **PackageFullName** Store application identity. +- **PackageRelativeAppId** Store application identity. +- **ProcessArchitecture** Architecture of the crashing process, as one of the PROCESSOR_ARCHITECTURE_* constants: 0: PROCESSOR_ARCHITECTURE_INTEL. 5: PROCESSOR_ARCHITECTURE_ARM. 9: PROCESSOR_ARCHITECTURE_AMD64. 12: PROCESSOR_ARCHITECTURE_ARM64. +- **ProcessCreateTime** The time of creation of the process that has crashed. +- **ProcessId** The ID of the process that has crashed. +- **ReportId** A GUID used to identify the report. This can used to track the report across Watson. +- **TargetAppId** The kernel reported AppId of the application being reported. +- **TargetAppVer** The specific version of the application being reported +- **TargetAsId** The sequence number for the hanging process. + + +## Feature update events + +### Microsoft.Windows.Upgrade.Uninstall.UninstallFinalizedAndRebootTriggered + +This event indicates that the uninstall was properly configured and that a system reboot was initiated. + + + +### Microsoft.Windows.Upgrade.Uninstall.UninstallGoBackButtonClicked + +This event sends basic metadata about the starting point of uninstalling a feature update, which helps ensure customers can safely revert to a well-known state if the update caused any problems. + + + +## Hang Reporting events + +### Microsoft.Windows.HangReporting.AppHangEvent + +This event sends data about hangs for both native and managed applications, to help keep Windows up to date. It does not contain any Watson bucketing information. The bucketing information is recorded in a Windows Error Reporting (WER) event that is generated when the WER client reports the hang to the Watson service, and the WER event will contain the same ReportID (see field 13 of hang event, field 19 of WER event) as the hang event for the hang being reported. AppHang is reported only on PC devices. It handles classic Win32 hangs and is emitted only once per report. Some behaviors that may be perceived by a user as a hang are reported by app managers (e.g. PLM/RM/EM) as Watson Generics and will not produce AppHang events. + +The following fields are available: + +- **AppName** The name of the app that has hung. +- **AppSessionGuid** GUID made up of process id used as a correlation vector for process instances in the telemetry backend. +- **AppVersion** The version of the app that has hung. +- **IsFatal** True/False based on whether the hung application caused the creation of a Fatal Hang Report. +- **PackageFullName** Store application identity. +- **PackageRelativeAppId** Store application identity. +- **ProcessArchitecture** Architecture of the hung process, as one of the PROCESSOR_ARCHITECTURE_* constants: 0: PROCESSOR_ARCHITECTURE_INTEL. 5: PROCESSOR_ARCHITECTURE_ARM. 9: PROCESSOR_ARCHITECTURE_AMD64. 12: PROCESSOR_ARCHITECTURE_ARM64. +- **ProcessCreateTime** The time of creation of the process that has hung. +- **ProcessId** The ID of the process that has hung. +- **ReportId** A GUID used to identify the report. This can used to track the report across Watson. +- **TargetAppId** The kernel reported AppId of the application being reported. +- **TargetAppVer** The specific version of the application being reported. +- **TargetAsId** The sequence number for the hanging process. +- **TypeCode** Bitmap describing the hang type. +- **WaitingOnAppName** If this is a cross process hang waiting for an application, this has the name of the application. +- **WaitingOnAppVersion** If this is a cross process hang, this has the version of the application for which it is waiting. +- **WaitingOnPackageFullName** If this is a cross process hang waiting for a package, this has the full name of the package for which it is waiting. +- **WaitingOnPackageRelativeAppId** If this is a cross process hang waiting for a package, this has the relative application id of the package. + + +## Inventory events + +### Microsoft.Windows.Inventory.Core.AmiTelCacheChecksum + +This event captures basic checksum data about the device inventory items stored in the cache for use in validating data completeness for Microsoft.Windows.Inventory.Core events. The fields in this event may change over time, but they will always represent a count of a given object. + +The following fields are available: + +- **Device** A count of device objects in cache. +- **DeviceCensus** A count of device census objects in cache. +- **DriverPackageExtended** A count of driverpackageextended objects in cache. +- **File** A count of file objects in cache. +- **FileSigningInfo** A count of file signing objects in cache. +- **Generic** A count of generic objects in cache. +- **HwItem** A count of hwitem objects in cache. +- **InventoryApplication** A count of application objects in cache. +- **InventoryApplicationAppV** A count of application AppV objects in cache. +- **InventoryApplicationDriver** A count of application driver objects in cache +- **InventoryApplicationFile** A count of application file objects in cache. +- **InventoryApplicationFramework** A count of application framework objects in cache +- **InventoryApplicationShortcut** A count of application shortcut objects in cache +- **InventoryDeviceContainer** A count of device container objects in cache. +- **InventoryDeviceInterface** A count of Plug and Play device interface objects in cache. +- **InventoryDeviceMediaClass** A count of device media objects in cache. +- **InventoryDevicePnp** A count of device Plug and Play objects in cache. +- **InventoryDeviceUsbHubClass** A count of device usb objects in cache +- **InventoryDriverBinary** A count of driver binary objects in cache. +- **InventoryDriverPackage** A count of device objects in cache. +- **InventoryMiscellaneousOfficeAddIn** A count of office add-in objects in cache +- **InventoryMiscellaneousOfficeAddInUsage** A count of office add-in usage objects in cache. +- **InventoryMiscellaneousOfficeIdentifiers** A count of office identifier objects in cache +- **InventoryMiscellaneousOfficeIESettings** A count of office ie settings objects in cache +- **InventoryMiscellaneousOfficeInsights** A count of office insights objects in cache +- **InventoryMiscellaneousOfficeProducts** A count of office products objects in cache +- **InventoryMiscellaneousOfficeSettings** A count of office settings objects in cache +- **InventoryMiscellaneousOfficeVBA** A count of office vba objects in cache +- **InventoryMiscellaneousOfficeVBARuleViolations** A count of office vba rule violations objects in cache +- **InventoryMiscellaneousUUPInfo** A count of uup info objects in cache +- **InventoryMiscnfo** No content is currently available. +- **Metadata** A count of metadata objects in cache. +- **Orphan** A count of orphan file objects in cache. +- **Programs** A count of program objects in cache. + + +### Microsoft.Windows.Inventory.Core.AmiTelCacheFileInfo + +Diagnostic data about the inventory cache. + +The following fields are available: + +- **CacheFileSize** Size of the cache. +- **InventoryVersion** Inventory version of the cache. +- **TempCacheCount** Number of temp caches created. +- **TempCacheDeletedCount** Number of temp caches deleted. + + +### Microsoft.Windows.Inventory.Core.AmiTelCacheVersions + +This event sends inventory component versions for the Device Inventory data. + +The following fields are available: + +- **aeinv** The version of the App inventory component. +- **devinv** The file version of the Device inventory component. + + +### Microsoft.Windows.Inventory.Core.InventoryApplicationAdd + +This event sends basic metadata about an application on the system to help keep Windows up to date. + +This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedeviceinventorychange). + +The following fields are available: + +- **HiddenArp** Indicates whether a program hides itself from showing up in ARP. +- **InstallDate** The date the application was installed (a best guess based on folder creation date heuristics). +- **InstallDateArpLastModified** The date of the registry ARP key for a given application. Hints at install date but not always accurate. Passed as an array. Example: 4/11/2015 00:00:00 +- **InstallDateFromLinkFile** The estimated date of install based on the links to the files. Passed as an array. +- **InstallDateMsi** The install date if the application was installed via Microsoft Installer (MSI). Passed as an array. +- **InventoryVersion** The version of the inventory file generating the events. +- **Language** The language code of the program. +- **MsiPackageCode** A GUID that describes the MSI Package. Multiple 'Products' (apps) can make up an MsiPackage. +- **MsiProductCode** A GUID that describe the MSI Product. +- **Name** The name of the application. +- **OSVersionAtInstallTime** The four octets from the OS version at the time of the application's install. +- **PackageFullName** The package full name for a Store application. +- **ProgramInstanceId** A hash of the file IDs in an app. +- **Publisher** The Publisher of the application. Location pulled from depends on the 'Source' field. +- **RootDirPath** The path to the root directory where the program was installed. +- **Source** How the program was installed (for example, ARP, MSI, Appx). +- **StoreAppType** A sub-classification for the type of Microsoft Store app, such as UWP or Win8StoreApp. +- **Type** One of ("Application", "Hotfix", "BOE", "Service", "Unknown"). Application indicates Win32 or Appx app, Hotfix indicates app updates (KBs), BOE indicates it's an app with no ARP or MSI entry, Service indicates that it is a service. Application and BOE are the ones most likely seen. +- **Version** The version number of the program. + + +### Microsoft.Windows.Inventory.Core.InventoryApplicationDriverAdd + +This event represents what drivers an application installs. + +This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedeviceinventorychange). + +The following fields are available: + +- **InventoryVersion** The version of the inventory component. +- **ProgramIds** The unique program identifier the driver is associated with. + + +### Microsoft.Windows.Inventory.Core.InventoryApplicationDriverStartSync + +The InventoryApplicationDriverStartSync event indicates that a new set of InventoryApplicationDriverStartAdd events will be sent. + +This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedeviceinventorychange). + +The following fields are available: + +- **InventoryVersion** The version of the inventory component. + + +### Microsoft.Windows.Inventory.Core.InventoryApplicationFrameworkAdd + +This event provides the basic metadata about the frameworks an application may depend on. + +This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedeviceinventorychange). + +The following fields are available: + +- **FileId** A hash that uniquely identifies a file. +- **Frameworks** The list of frameworks this file depends on. +- **InventoryVersion** The version of the inventory file generating the events. + + +### Microsoft.Windows.Inventory.Core.InventoryApplicationFrameworkStartSync + +This event indicates that a new set of InventoryApplicationFrameworkAdd events will be sent. + +This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedeviceinventorychange). + +The following fields are available: + +- **InventoryVersion** The version of the inventory file generating the events. + + +### Microsoft.Windows.Inventory.Core.InventoryApplicationRemove + +This event indicates that a new set of InventoryDevicePnpAdd events will be sent. + +This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedeviceinventorychange). + +The following fields are available: + +- **InventoryVersion** The version of the inventory file generating the events. + + +### Microsoft.Windows.Inventory.Core.InventoryApplicationStartSync + +This event indicates that a new set of InventoryApplicationAdd events will be sent. + +This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedeviceinventorychange). + +The following fields are available: + +- **InventoryVersion** The version of the inventory file generating the events. + + +### Microsoft.Windows.Inventory.Core.InventoryDeviceContainerAdd + +This event sends basic metadata about a device container (such as a monitor or printer as opposed to a Plug and Play device) to help keep Windows up to date. + +This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedeviceinventorychange). + +The following fields are available: + +- **Categories** A comma separated list of functional categories in which the container belongs. +- **DiscoveryMethod** The discovery method for the device container. +- **FriendlyName** The name of the device container. +- **InventoryVersion** The version of the inventory file generating the events. +- **IsActive** Is the device connected, or has it been seen in the last 14 days? +- **IsConnected** For a physically attached device, this value is the same as IsPresent. For wireless a device, this value represents a communication link. +- **IsMachineContainer** Is the container the root device itself? +- **IsMAchineContainer** No content is currently available. +- **IsNetworked** Is this a networked device? +- **IsPaired** Does the device container require pairing? +- **Manufacturer** The manufacturer name for the device container. +- **ModelId** A unique model ID. +- **ModelName** The model name. +- **ModelNumber** The model number for the device container. +- **PrimaryCategory** The primary category for the device container. + + +### Microsoft.Windows.Inventory.Core.InventoryDeviceContainerRemove + +This event indicates that the InventoryDeviceContainer object is no longer present. + +This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedeviceinventorychange). + +The following fields are available: + +- **InventoryVersion** The version of the inventory file generating the events. + + +### Microsoft.Windows.Inventory.Core.InventoryDeviceContainerStartSync + +This event indicates that a new set of InventoryDeviceContainerAdd events will be sent. + +This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedeviceinventorychange). + +The following fields are available: + +- **InventoryVersion** The version of the inventory file generating the events. + + +### Microsoft.Windows.Inventory.Core.InventoryDeviceInterfaceAdd + +This event retrieves information about what sensor interfaces are available on the device. + +This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedeviceinventorychange). + +The following fields are available: + +- **Accelerometer3D** Indicates if an Accelerator3D sensor is found. +- **ActivityDetection** Indicates if an Activity Detection sensor is found. +- **AmbientLight** Indicates if an Ambient Light sensor is found. +- **Barometer** Indicates if a Barometer sensor is found. +- **Custom** Indicates if a Custom sensor is found. +- **EnergyMeter** Indicates if an Energy sensor is found. +- **FloorElevation** Indicates if a Floor Elevation sensor is found. +- **GeomagneticOrientation** Indicates if a Geo Magnetic Orientation sensor is found. +- **GravityVector** Indicates if a Gravity Detector sensor is found. +- **Gyrometer3D** Indicates if a Gyrometer3D sensor is found. +- **Humidity** Indicates if a Humidity sensor is found. +- **InventoryVersion** The version of the inventory file generating the events. +- **LinearAccelerometer** Indicates if a Linear Accelerometer sensor is found. +- **Magnetometer3D** Indicates if a Magnetometer3D sensor is found. +- **Orientation** Indicates if an Orientation sensor is found. +- **Pedometer** Indicates if a Pedometer sensor is found. +- **Proximity** Indicates if a Proximity sensor is found. +- **RelativeOrientation** Indicates if a Relative Orientation sensor is found. +- **SimpleDeviceOrientation** Indicates if a Simple Device Orientation sensor is found. +- **Temperature** Indicates if a Temperature sensor is found. + + +### Microsoft.Windows.Inventory.Core.InventoryDeviceInterfaceStartSync + +This event indicates that a new set of InventoryDeviceInterfaceAdd events will be sent. + +This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedeviceinventorychange). + +The following fields are available: + +- **InventoryVersion** The version of the inventory file generating the events. + + +### Microsoft.Windows.Inventory.Core.InventoryDeviceMediaClassAdd + +This event sends additional metadata about a Plug and Play device that is specific to a particular class of devices to help keep Windows up to date while reducing overall size of data payload. + +This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedeviceinventorychange). + +The following fields are available: + +- **audio.captureDriver** Audio device capture driver. Example: hdaudio.inf:db04a16ce4e8d6ee:HdAudModel:10.0.14887.1000:hdaudio\func_01 +- **audio.renderDriver** Audio device render driver. Example: hdaudio.inf:db04a16ce4e8d6ee:HdAudModel:10.0.14889.1001:hdaudio\func_01 +- **Audio_CaptureDriver** The Audio device capture driver endpoint. +- **Audio_RenderDriver** The Audio device render driver endpoint. +- **InventoryVersion** The version of the inventory file generating the events. + + +### Microsoft.Windows.Inventory.Core.InventoryDeviceMediaClassRemove + +This event indicates that the InventoryDeviceMediaClassRemove object is no longer present. + +This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedeviceinventorychange). + +The following fields are available: + +- **InventoryVersion** The version of the inventory file generating the events. + + +### Microsoft.Windows.Inventory.Core.InventoryDeviceMediaClassStartSync + +This event indicates that a new set of InventoryDeviceMediaClassSAdd events will be sent. + +This event includes fields from [Ms.Device.De~iceInventoryChange](#msdevicede~iceinventorychange). + +The following fields are available: + +- **InventoryVersion** The version of the inventory file generating the events. + + +### Microsoft.Windows.Inventory.Core.InventoryDevicePnpAdd + +This event represents the basic metadata about a plug and play (PNP) device and its associated driver. + +This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedeviceinventorychange). + +The following fields are available: + +- **basedata** No content is currently available. See [basedata](#basedata). +- **BusReportedDescription** The description of the device reported by the bux. +- **Class** The device setup class of the driver loaded for the device. +- **ClassGuid** The device class unique identifier of the driver package loaded on the device. +- **COMPID** The list of “Compatible IDs” for this device. +- **ContainerId** The system-supplied unique identifier that specifies which group(s) the device(s) installed on the parent (main) device belong to. +- **Description** The description of the device. +- **DeviceInterfaceClasses** The device interfaces that this device implements. +- **DeviceState** Identifies the current state of the parent (main) device. +- **DriverId** The unique identifier for the installed driver. +- **DriverName** The name of the driver image file. +- **DriverPackageStrongName** The immediate parent directory name in the Directory field of InventoryDriverPackage. +- **DriveRPackageStrongNaMe** No content is currently available. +- **DriverVerDate** The date associated with the driver installed on the device. +- **DriverVerVersion** The version number of the driver installed on the device. +- **Enumerator** Identifies the bus that enumerated the device. +- **ExtendedInfs** The extended INF file names. +- **HWID** A list of hardware IDs for the device. +- **Inf** The name of the INF file (possibly renamed by the OS, such as oemXX.inf). +- **InstallState** The device installation state. For a list of values, see: https://msdn.microsoft.com/en-us/library/windows/hardware/ff543130.aspx +- **InventoryVersion** The version number of the inventory process generating the events. +- **LowerClassFilters** The identifiers of the Lower Class filters installed for the device. +- **LowerFilters** The identifiers of the Lower filters installed for the device. +- **Manufacturer** The manufacturer of the device. +- **MatchingID** The Hardware ID or Compatible ID that Windows uses to install a device instance. +- **Model** Identifies the model of the device. +- **ParentId** The Device Instance ID of the parent of the device. +- **ProblemCode** The error code currently returned by the device, if applicable. +- **Provider** Identifies the device provider. +- **Service** The name of the device service. +- **STACKID** The list of hardware IDs for the stack. +- **UpperClassFilters** The identifiers of the Upper Class filters installed for the device. +- **UpperFilters** The identifiers of the Upper filters installed for the device. + + +### Microsoft.Windows.Inventory.Core.InventoryDevicePnpRemove + +This event indicates that the InventoryDevicePnpRemove object is no longer present. + +This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedeviceinventorychange). + +The following fields are available: + +- **InventoryVersion** The version of the inventory file generating the events. + + +### Microsoft.Windows.Inventory.Core.InventoryDevicePnpStartSync + +This event indicates that a new set of InventoryDevicePnpAdd events will be sent. + +This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedeviceinventorychange). + +The following fields are available: + +- **InventoryVersion** The version of the inventory file generating the events. + + +### Microsoft.Windows.Inventory.Core.InventoryDeviceUsbHubClassAdd + +This event sends basic metadata about the USB hubs on the device. + +This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedeviceinventorychange). + +The following fields are available: + +- **InventoryVersion** The version of the inventory file generating the events. +- **TotalUserConnectablePorts** Total number of connectable USB ports. +- **TotalUserConnectableTypeCPorts** Total number of connectable USB Type C ports. + + +### Microsoft.Windows.Inventory.Core.InventoryDeviceUsbHubClassStartSync + +This event indicates that a new set of InventoryDeviceUsbHubClassAdd events will be sent. + +This event includes fields from [Ms.De~ice.DeviceInventoryChange](#msde~icedeviceinventorychange). + +The following fields are available: + +- **InventoryVersion** The version of the inventory file generating the events. + + +### Microsoft.Windows.Inventory.Core.InventoryDriverBinaryAdd + +This event provides the basic metadata about driver binaries running on the system. + +This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedeviceinventorychange). + +The following fields are available: + +- **Dri6erCompany** No content is currently available. +- **Driv%rPackageStrongName** No content is currently available. +- **Drive2Name** No content is currently available. +- **DriverCheckSum** The checksum of the driver file. +- **DriverCompa.y** No content is currently available. +- **DriverCompany** The company name that developed the driver. +- **DriverInBox** Is the driver included with the operating system? +- **DriverIsKernelMode** Is it a kernel mode driver? +- **DriverName** The file name of the driver. +- **DriverPackageStrongName** The strong name of the driver package +- **DriverSign%d** No content is currently available. +- **DriverSigned** The strong name of the driver package +- **DriverTimeStamp** The low 32 bits of the time stamp of the driver file. +- **DriverType** A bitfield of driver attributes: 1. define DRIVER_MAP_DRIVER_TYPE_PRINTER 0x0001. 2. define DRIVER_MAP_DRIVER_TYPE_KERNEL 0x0002. 3. define DRIVER_MAP_DRIVER_TYPE_USER 0x0004. 4. define DRIVER_MAP_DRIVER_IS_SIGNED 0x0008. 5. define DRIVER_MAP_DRIVER_IS_INBOX 0x0010. 6. define DRIVER_MAP_DRIVER_IS_WINQUAL 0x0040. 7. define DRIVER_MAP_DRIVER_IS_SELF_SIGNED 0x0020. 8. define DRIVER_MAP_DRIVER_IS_CI_SIGNED 0x0080. 9. define DRIVER_MAP_DRIVER_HAS_BOOT_SERVICE 0x0100. 10. define DRIVER_MAP_DRIVER_TYPE_I386 0x10000. 11. define DRIVER_MAP_DRIVER_TYPE_IA64 0x20000. 12. define DRIVER_MAP_DRIVER_TYPE_AMD64 0x40000. 13. define DRIVER_MAP_DRIVER_TYPE_ARM 0x100000. 14. define DRIVER_MAP_DRIVER_TYPE_THUMB 0x200000. 15. define DRIVER_MAP_DRIVER_TYPE_ARMNT 0x400000. 16. define DRIVER_MAP_DRIVER_IS_TIME_STAMPED 0x800000. +- **DriverVersion** The version of the driver file. +- **DviverCompany** No content is currently available. +- **I.f** No content is currently available. +- **Imagesize** No content is currently available. +- **ImageSize** The size of the driver file. +- **Inf** The name of the INF file. +- **Invento2yVersion** No content is currently available. +- **InventoryVersion** The version of the inventory file generating the events. +- **Product** The product name that is included in the driver file. +- **ProductVersio~** No content is currently available. +- **ProductVersion** The product version that is included in the driver file. +- **Service** The name of the service that is installed for the device. +- **WdfVersion** The Windows Driver Framework version. + + +### Microsoft.Windows.Inventory.Core.InventoryDriverBinaryRemove + +This event indicates that the InventoryDriverBinary object is no longer present. + +This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedeviceinventorychange). + +The following fields are available: + +- **InventoryVersion** The version of the inventory file generating the events. + + +### Microsoft.Windows.Inventory.Core.InventoryDriverBinaryStartSync + +This event indicates that a new set of InventoryDriverBinaryAdd events will be sent. + +This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedeviceinventorychange). + +The following fields are available: + +- **InventoryVersion** The version of the inventory file generating the events. + + +### Microsoft.Windows.Inventory.Core.InventoryDriverPackageAdd + +This event sends basic metadata about drive packages installed on the system to help keep Windows up to date. + +This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedeviceinventorychange). + +The following fields are available: + +- **Class** The class name for the device driver. +- **ClassGuid** The class GUID for the device driver. +- **Date** The driver package date. +- **Directory** The path to the driver package. +- **DriverInBox** Is the driver included with the operating system? +- **Inf** The INF name of the driver package. +- **InventoryVersion** The version of the inventory file generating the events. +- **Provider** The provider for the driver package. +- **SubmissionId** The HLK submission ID for the driver package. +- **Version** The version of the driver package. + + +### Microsoft.Windows.Inventory.Core.InventoryDriverPackageRemove + +This event indicates that the InventoryDriverPackageRemove object is no longer present. + +This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedeviceinventorychange). + +The following fields are available: + +- **InventoryVersion** The version of the inventory file generating the events. + + +### Microsoft.Windows.Inventory.Core.InventoryDriverPackageStartSync + +This event indicates that a new set of InventoryDriverPackageAdd events will be sent. + +This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedeviceinventorychange). + +The following fields are available: + +- **InventoryVersion** The version of the inventory file generating the events. + + +### Microsoft.Windows.Inventory.Core.StartUtcJsonTrace + +This event collects traces of all other Core events, not used in typical customer scenarios. This event signals the beginning of the event download, and that tracing should begin. + + + +### Microsoft.Windows.Inventory.Core.StopUtcJsonTrace + +This event collects traces of all other Core events, not used in typical customer scenarios. This event signals the end of the event download, and that tracing should end. + + + +### Microsoft.Windows.Inventory.General.AppHealthStaticAdd + +This event sends details collected for a specific application on the source device. + +The following fields are available: + +- **AhaVersion** The binary version of the App Health Analyzer tool. +- **ApplicationErrors** The count of application errors from the event log. +- **Bitness** The architecture type of the application (16 Bit or 32 bit or 64 bit). +- **device_level** Various JRE/JAVA versions installed on a particular device. +- **ExtendedProperties** Attribute used for aggregating all other attributes under this event type. +- **Jar** Flag to determine if an app has a Java JAR file dependency. +- **Jre** Flag to determine if an app has JRE framework dependency. +- **Jre_version** JRE versions an app has declared framework dependency for. +- **Name** Name of the application. +- **NonDPIAware** Flag to determine if an app is non-DPI aware. +- **NumBinaries** Count of all binaries (.sys,.dll,.ini) from application install location. +- **RequiresAdmin** Flag to determine if an app requests admin privileges for execution. +- **RequiresAdminv2** Additional flag to determine if an app requests admin privileges for execution. +- **RequiresUIAccess** Flag to determine if an app is based on UI features for accessibility. +- **VB6** Flag to determine if an app is based on VB6 framework. +- **VB6v2** Additional flag to determine if an app is based on VB6 framework. +- **Version** Version of the application. +- **VersionCheck** Flag to determine if an app has a static dependency on OS version. +- **VersionCheckv2** Additional flag to determine if an app has a static dependency on OS version. + + +### Microsoft.Windows.Inventory.General.AppHealthStaticStartSync + +This event indicates the beginning of a series of AppHealthStaticAdd events. + +The following fields are available: + +- **AllowTelemetry** Indicates the presence of the 'allowtelemetry' command line argument. +- **CommandLineArgs** Command line arguments passed when launching the App Health Analyzer executable. +- **Enhanced** Indicates the presence of the 'enhanced' command line argument. +- **StartTime** UTC date and time at which this event was sent. + + +### Microsoft.Windows.Inventory.General.InventoryMiscellaneousOfficeAddInAdd + +Provides data on the installed Office Add-ins. + +This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedeviceinventorychange). + +The following fields are available: + +- **AddinCLSID** The class identifier key for the Microsoft Office add-in. +- **AddInCLSID** The class identifier key for the Microsoft Office add-in. +- **AddInId** The identifier for the Microsoft Office add-in. +- **AddinType** The type of the Microsoft Office add-in. +- **BinFileTimestamp** The timestamp of the Office add-in. +- **BinFileVersion** The version of the Microsoft Office add-in. +- **Description** Description of the Microsoft Office add-in. +- **FileId** The file identifier of the Microsoft Office add-in. +- **FileSize** The file size of the Microsoft Office add-in. +- **FriendlyName** The friendly name for the Microsoft Office add-in. +- **FullPath** The full path to the Microsoft Office add-in. +- **InventoryVersion** The version of the inventory binary generating the events. +- **LoadBehavior** Integer that describes the load behavior. +- **LoadTime** Load time for the Office add-in. +- **OfficeApplication** The Microsoft Office application associated with the add-in. +- **OfficeArchitecture** The architecture of the add-in. +- **OfficeVersion** The Microsoft Office version for this add-in. +- **OutlookCrashingAddin** Indicates whether crashes have been found for this add-in. +- **ProductCompany** The name of the company associated with the Office add-in. +- **ProductName** The product name associated with the Microsoft Office add-in. +- **ProductVersion** The version associated with the Office add-in. +- **ProgramId** The unique program identifier of the Microsoft Office add-in. +- **Provider** Name of the provider for this add-in. + + +### Microsoft.Windows.Inventory.General.InventoryMiscellaneousOfficeAddInRemove + +Indicates that this particular data object represented by the objectInstanceId is no longer present. + +This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedeviceinventorychange). + +The following fields are available: + +- **InventoryVersion** The version of the inventory binary generating the events. + + +### Microsoft.Windows.Inventory.General.InventoryMiscellaneousOfficeAddInStartSync + +This event indicates that a new sync is being generated for this object type. + +This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedeviceinventorychange). + +The following fields are available: + +- **InventoryVersion** The version of the inventory binary generating the events. + + +### Microsoft.Windows.Inventory.General.InventoryMiscellaneousOfficeIdentifiersAdd + +Provides data on the Office identifiers. + +This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedeviceinventorychange). + +The following fields are available: + +- **InventoryVersion** The version of the inventory binary generating the events. +- **OAudienceData** Sub-identifier for Microsoft Office release management, identifying the pilot group for a device +- **OAudienceId** Microsoft Office identifier for Microsoft Office release management, identifying the pilot group for a device +- **OMID** Identifier for the Office SQM Machine +- **OPlatform** Whether the installed Microsoft Office product is 32-bit or 64-bit +- **OTenantId** Unique GUID representing the Microsoft O365 Tenant +- **OVersion** Installed version of Microsoft Office. For example, 16.0.8602.1000 +- **OWowMID** Legacy Microsoft Office telemetry identifier (SQM Machine ID) for WoW systems (32-bit Microsoft Office on 64-bit Windows) + + +### Microsoft.Windows.Inventory.General.InventoryMiscellaneousOfficeIdentifiersStartSync + +Diagnostic event to indicate a new sync is being generated for this object type. + +This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedeviceinventorychange). + +The following fields are available: + +- **InventoryVersion** The version of the inventory binary generating the events. + + +### Microsoft.Windows.Inventory.General.InventoryMiscellaneousOfficeIESettingsAdd + +Provides data on Office-related Internet Explorer features. + +This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedeviceinventorychange). + +The following fields are available: + +- **InventoryVersion** The version of the inventory binary generating the events. +- **OIeFeatureAddon** Flag indicating which Microsoft Office products have this setting enabled. The FEATURE_ADDON_MANAGEMENT feature lets applications hosting the WebBrowser Control to respect add-on management selections made using the Add-on Manager feature of Internet Explorer. Add-ons disabled by the user or by administrative group policy will also be disabled in applications that enable this feature. +- **OIeMachineLockdown** Flag indicating which Microsoft Office products have this setting enabled. When the FEATURE_LOCALMACHINE_LOCKDOWN feature is enabled, Internet Explorer applies security restrictions on content loaded from the user's local machine, which helps prevent malicious behavior involving local files. +- **OIeMimeHandling** Flag indicating which Microsoft Office products have this setting enabled. When the FEATURE_MIME_HANDLING feature control is enabled, Internet Explorer handles MIME types more securely. Only applies to Windows Internet Explorer 6 for Windows XP Service Pack 2 (SP2) +- **OIeMimeSniffing** Flag indicating which Microsoft Office products have this setting enabled. Determines a file's type by examining its bit signature. Windows Internet Explorer uses this information to determine how to render the file. The FEATURE_MIME_SNIFFING feature, when enabled, allows to be set differently for each security zone by using the URLACTION_FEATURE_MIME_SNIFFING URL action flag +- **OIeNoAxInstall** Flag indicating which Microsoft Office products have this setting enabled. When a webpage attempts to load or install an ActiveX control that isn't already installed, the FEATURE_RESTRICT_ACTIVEXINSTALL feature blocks the request. When a webpage tries to load or install an ActiveX control that isn't already installed, the FEATURE_RESTRICT_ACTIVEXINSTALL feature blocks the request +- **OIeNoDownload** Flag indicating which Microsoft Office products have this setting enabled. The FEATURE_RESTRICT_FILEDOWNLOAD feature blocks file download requests that navigate to a resource, that display a file download dialog box, or that are not initiated explicitly by a user action (for example, a mouse click or key press). Only applies to Windows Internet Explorer 6 for Windows XP Service Pack 2 (SP2) +- **OIeObjectCaching** Flag indicating which Microsoft Office products have this setting enabled. When enabled, the FEATURE_OBJECT_CACHING feature prevents webpages from accessing or instantiating ActiveX controls cached from different domains or security contexts +- **OIePasswordDisable** Flag indicating which Microsoft Office products have this setting enabled. After Windows Internet Explorer 6 for Windows XP Service Pack 2 (SP2), Internet Explorer no longer allows usernames and passwords to be specified in URLs that use the HTTP or HTTPS protocols. URLs using other protocols, such as FTP, still allow usernames and passwords +- **OIeSafeBind** Flag indicating which Microsoft Office products have this setting enabled. The FEATURE_SAFE_BINDTOOBJECT feature performs additional safety checks when calling MonikerBindToObject to create and initialize Microsoft ActiveX controls. Specifically, prevent the control from being created if COMPAT_EVIL_DONT_LOAD is in the registry for the control +- **OIeSecurityBand** Flag indicating which Microsoft Office products have this setting enabled. The FEATURE_SECURITYBAND feature controls the display of the Internet Explorer Information bar. When enabled, the Information bar appears when file download or code installation is restricted +- **OIeUncSaveCheck** Flag indicating which Microsoft Office products have this setting enabled. The FEATURE_UNC_SAVEDFILECHECK feature enables the Mark of the Web (MOTW) for local files loaded from network locations that have been shared by using the Universal Naming Convention (UNC) +- **OIeValidateUrl** Flag indicating which Microsoft Office products have this setting enabled. When enabled, the FEATURE_VALIDATE_NAVIGATE_URL feature control prevents Windows Internet Explorer from navigating to a badly formed URL +- **OIeWebOcPopup** Flag indicating which Microsoft Office products have this setting enabled. The FEATURE_WEBOC_POPUPMANAGEMENT feature allows applications hosting the WebBrowser Control to receive the default Internet Explorer pop-up window management behavior +- **OIeWinRestrict** Flag indicating which Microsoft Office products have this setting enabled. When enabled, the FEATURE_WINDOW_RESTRICTIONS feature adds several restrictions to the size and behavior of popup windows +- **OIeZoneElevate** Flag indicating which Microsoft Office products have this setting enabled. When enabled, the FEATURE_ZONE_ELEVATION feature prevents pages in one zone from navigating to pages in a higher security zone unless the navigation is generated by the user + + +### Microsoft.Windows.Inventory.General.InventoryMiscellaneousOfficeIESettingsStartSync + +Diagnostic event to indicate a new sync is being generated for this object type. + +This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedeviceinventorychange). + +The following fields are available: + +- **InventoryVersion** The version of the inventory binary generating the events. + + +### Microsoft.Windows.Inventory.General.InventoryMiscellaneousOfficeInsightsAdd + +This event provides insight data on the installed Office products + +This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedeviceinventorychange). + +The following fields are available: + +- **InventoryVersion** The version of the inventory binary generating the events. +- **OfficeApplication** The name of the Office application. +- **OfficeArchitecture** The bitness of the Office application. +- **OfficeVersion** The version of the Office application. +- **Value** The insights collected about this entity. + + +### Microsoft.Windows.Inventory.General.InventoryMiscellaneousOfficeInsightsRemove + +Indicates that this particular data object represented by the objectInstanceId is no longer present. + +This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedeviceinventorychange). + +The following fields are available: + +- **InventoryVersion** The version of the inventory binary generating the events. + + +### Microsoft.Windows.Inventory.General.InventoryMiscellaneousOfficeInsightsStartSync + +This diagnostic event indicates that a new sync is being generated for this object type. + +This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedeviceinventorychange). + +The following fields are available: + +- **InventoryVersion** The version of the inventory binary generating the events. + + +### Microsoft.Windows.Inventory.General.InventoryMiscellaneousOfficeProductsAdd + +Describes Office Products installed. + +This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedeviceinventorychange). + +The following fields are available: + +- **InventoryVersion** The version of the inventory binary generating the events. +- **OC2rApps** A GUID the describes the Office Click-To-Run apps +- **OC2rSkus** Comma-delimited list (CSV) of Office Click-To-Run products installed on the device. For example, Office 2016 ProPlus +- **OMsiApps** Comma-delimited list (CSV) of Office MSI products installed on the device. For example, Microsoft Word +- **OProductCodes** A GUID that describes the Office MSI products + + +### Microsoft.Windows.Inventory.General.InventoryMiscellaneousOfficeProductsStartSync + +Diagnostic event to indicate a new sync is being generated for this object type. + +This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedeviceinventorychange). + +The following fields are available: + +- **InventoryVersion** The version of the inventory binary generating the events. + + +### Microsoft.Windows.Inventory.General.InventoryMiscellaneousOfficeSettingsAdd + +This event describes various Office settings + +This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedeviceinventorychange). + +The following fields are available: + +- **BrowserFlags** Browser flags for Office-related products +- **ExchangeProviderFlags** Provider policies for Office Exchange +- **InventoryVersion** The version of the inventory binary generating the events. +- **SharedComputerLicensing** Office shared computer licensing policies + + +### Microsoft.Windows.Inventory.General.InventoryMiscellaneousOfficeSettingsStartSync + +Indicates a new sync is being generated for this object type. + +This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedeviceinventorychange). + +The following fields are available: + +- **InventoryVersion** The version of the inventory binary generating the events. + + +### Microsoft.Windows.Inventory.General.InventoryMiscellaneousOfficeVBAAdd + +This event provides a summary rollup count of conditions encountered while performing a local scan of Office files, analyzing for known VBA programmability compatibility issues between legacy office version and ProPlus, and between 32 and 64-bit versions + +This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedeviceinventorychange). + +The following fields are available: + +- **Design** Count of files with design issues found. +- **Design_x64** Count of files with 64 bit design issues found. +- **DuplicateVBA** Count of files with duplicate VBA code. +- **HasVBA** Count of files with VBA code. +- **Inaccessible** Count of files that were inaccessible for scanning. +- **InventoryVersion** The version of the inventory binary generating the events. +- **Issues** Count of files with issues detected. +- **Issues_x64** Count of files with 64-bit issues detected. +- **IssuesNone** Count of files with no issues detected. +- **IssuesNone_x64** Count of files with no 64-bit issues detected. +- **Locked** Count of files that were locked, preventing scanning. +- **NoVBA** Count of files with no VBA inside. +- **Protected** Count of files that were password protected, preventing scanning. +- **RemLimited** Count of files that require limited remediation changes. +- **RemLimited_x64** Count of files that require limited remediation changes for 64-bit issues. +- **RemSignificant** Count of files that require significant remediation changes. +- **RemSignificant_x64** Count of files that require significant remediation changes for 64-bit issues. +- **Score** Overall compatibility score calculated for scanned content. +- **Score_x64** Overall 64-bit compatibility score calculated for scanned content. +- **Total** Total number of files scanned. +- **Validation** Count of files that require additional manual validation. +- **Validation_x64** Count of files that require additional manual validation for 64-bit issues. + + +### Microsoft.Windows.Inventory.General.InventoryMiscellaneousOfficeVBARemove + +Indicates that this particular data object represented by the objectInstanceId is no longer present. + +This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedeviceinventorychange). + +The following fields are available: + +- **InventoryVersion** The version of the inventory binary generating the events. + + +### Microsoft.Windows.Inventory.General.InventoryMiscellaneousOfficeVBARuleViolationsAdd + +This event provides data on Microsoft Office VBA rule violations, including a rollup count per violation type, giving an indication of remediation requirements for an organization. The event identifier is a unique GUID, associated with the validation rule + +This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedeviceinventorychange). + +The following fields are available: + +- **Count** Count of total Microsoft Office VBA rule violations +- **InventoryVersion** The version of the inventory binary generating the events. + + +### Microsoft.Windows.Inventory.General.InventoryMiscellaneousOfficeVBARuleViolationsRemove + +Indicates that this particular data object represented by the objectInstanceId is no longer present. + +This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedeviceinventorychange). + +The following fields are available: + +- **InventoryVersion** The version of the inventory binary generating the events. + + +### Microsoft.Windows.Inventory.General.InventoryMiscellaneousOfficeVBARuleViolationsStartSync + +This event indicates that a new sync is being generated for this object type. + +This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedeviceinventorychange). + +The following fields are available: + +- **InventoryVersion** The version of the inventory binary generating the events. + + +### Microsoft.Windows.Inventory.General.InventoryMiscellaneousOfficeVBAStartSync + +Diagnostic event to indicate a new sync is being generated for this object type. + +This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedeviceinventorychange). + +The following fields are available: + +- **InventoryVersion** The version of the inventory binary generating the events. + + +### Microsoft.Windows.Inventory.General.InventoryMiscellaneousUUPInfoAdd + +Provides data on Unified Update Platform (UUP) products and what version they are at. + +This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedeviceinventorychange). + +The following fields are available: + +- **Identifier** UUP identifier +- **LastActivatedVersion** Last activated version +- **PreviousVersion** Previous version +- **Source** UUP source +- **Version** UUP version + + +### Microsoft.Windows.Inventory.General.InventoryMiscellaneousUUPInfoRemove + +Indicates that this particular data object represented by the objectInstanceId is no longer present. + +This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedeviceinventorychange). + + + +### Microsoft.Windows.Inventory.General.InventoryMiscellaneousUUPInfoStartSync + +Diagnostic event to indicate a new sync is being generated for this object type. + +This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedeviceinventorychange). + + + +### Microsoft.Windows.Inventory.Indicators.Checksum + +This event summarizes the counts for the InventoryMiscellaneousUexIndicatorAdd events. + +The following fields are available: + +- **CensusId** A unique hardware identifier. +- **ChecksumDictionary** A count of each operating system indicator. +- **PCFP** Equivalent to the InventoryId field that is found in other core events. + + +### Microsoft.Windows.Inventory.Indicators.InventoryMiscellaneousUexIndicatorAdd + +These events represent the basic metadata about the OS indicators installed on the system which are used for keeping the device up to date. + +This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedeviceinventorychange). + +The following fields are available: + +- **IndicatorValue** The indicator value. +- **Value** Describes an operating system indicator that may be relevant for the device upgrade. + + +### Microsoft.Windows.Inventory.Indicators.InventoryMiscellaneousUexIndicatorRemove + +This event is a counterpart to InventoryMiscellaneousUexIndicatorAdd that indicates that the item has been removed. + +This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedeviceinventorychange). + + + +### Microsoft.Windows.Inventory.Indicators.InventoryMiscellaneousUexIndicatorStartSync + +This event indicates that a new set of InventoryMiscellaneousUexIndicatorAdd events will be sent. + +This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedeviceinventorychange). + + + +## Kernel events + +### IO + +This event indicates the number of bytes read from or read by the OS and written to or written by the OS upon system startup. + +The following fields are available: + +- **BytesRead** The total number of bytes read from or read by the OS upon system startup. +- **BytesWritten** The total number of bytes written to or written by the OS upon system startup. + + +### Microsoft.Windows.Kernel.BootEnvironment.OsLaunch + +OS information collected during Boot, used to evaluate the success of the upgrade process. + +The following fields are available: + +- **BootApplicationId** This field tells us what the OS Loader Application Identifier is. +- **BootAttemptCount** The number of consecutive times the boot manager has attempted to boot into this operating system. +- **BootSequence** The current Boot ID, used to correlate events related to a particular boot session. +- **BootStatusPolicy** Identifies the applicable Boot Status Policy. +- **BootType** Identifies the type of boot (e.g.: "Cold", "Hiber", "Resume"). +- **EventTimestamp** Seconds elapsed since an arbitrary time point. This can be used to identify the time difference in successive boot attempts being made. +- **Firmw!reResetReasonEmbeddedControllerAdditional** No content is currently available. +- **FirmwareResetReasonEmbeddedController** Reason for system reset provided by firmware. +- **FirmwareResetReasonEmbeddedControllerAdditional** Additional information on system reset reason provided by firmware if needed. +- **FirmwareResetReasonPch** Reason for system reset provided by firmware. +- **FirmwareResetReasonPchAdditional** Additional information on system reset reason provided by firmware if needed. +- **FirmwareResetReasonSupplied** Flag indicating that a reason for system reset was provided by firmware. +- **IO** Amount of data written to and read from the disk by the OS Loader during boot. See [IO](#io). +- **LastBootSucceeded** Flag indicating whether the last boot was successful. +- **LastShutdownSucceeded** Flag indicating whether the last shutdown was successful. +- **MaxAbove4GbFreeRange** This field describes the largest memory range available above 4Gb. +- **MaxBelow4GbFreeRange** This field describes the largest memory range available below 4Gb. +- **MeasuredLaunchPrepared** This field tells us if the OS launch was initiated using Measured/Secure Boot over DRTM (Dynamic Root of Trust for Measurement). +- **MeasuredLaunchResume** This field tells us if Dynamic Root of Trust for Measurement (DRTM) was used when resuming from hibernation. +- **MenuPolicy** Type of advanced options menu that should be shown to the user (Legacy, Standard, etc.). +- **RecoveryEnabled** Indicates whether recovery is enabled. +- **SecureLaunchPrepared** This field indicates if DRTM was prepared during boot. +- **TcbLaunch** Indicates whether the Trusted Computing Base was used during the boot flow. +- **UserInputTime** The amount of time the loader application spent waiting for user input. + + +## Miracast events + +### Microsoft.Windows.Cast.Miracast.MiracastSessionEnd + +This event sends data at the end of a Miracast session that helps determine RTSP related Miracast failures along with some statistics about the session + +The following fields are available: + +- **AudioChannelCount** The number of audio channels. +- **AudioSampleRate** The sample rate of audio in terms of samples per second. +- **AudioSubtype** The unique subtype identifier of the audio codec (encoding method) used for audio encoding. +- **AverageBitrate** The average video bitrate used during the Miracast session, in bits per second. +- **AverageDataRate** The average available bandwidth reported by the WiFi driver during the Miracast session, in bits per second. +- **AveragePacketSendTimeInMs** The average time required for the network to send a sample, in milliseconds. +- **ConnectorType** The type of connector used during the Miracast session. +- **EncodeAverageTimeMS** The average time to encode a frame of video, in milliseconds. +- **EncodeCount** The count of total frames encoded in the session. +- **EncodeMaxTimeMS** The maximum time to encode a frame, in milliseconds. +- **EncodeMinTimeMS** The minimum time to encode a frame, in milliseconds. +- **EncoderCreationTimeInMs** The time required to create the video encoder, in milliseconds. +- **ErrorSource** Identifies the component that encountered an error that caused a disconnect, if applicable. +- **FirstFrameTime** The time (tick count) when the first frame is sent. +- **FirstLatencyMode** The first latency mode. +- **FrameAverageTimeMS** Average time to process an entire frame, in milliseconds. +- **FrameCount** The total number of frames processed. +- **FrameMaxTimeMS** The maximum time required to process an entire frame, in milliseconds. +- **FrameMinTimeMS** The minimum time required to process an entire frame, in milliseconds. +- **Glitches** The number of frames that failed to be delivered on time. +- **HardwareCursorEnabled** Indicates if hardware cursor was enabled when the connection ended. +- **HDCPState** The state of HDCP (High-bandwidth Digital Content Protection) when the connection ended. +- **HighestBitrate** The highest video bitrate used during the Miracast session, in bits per second. +- **HighestDataRate** The highest available bandwidth reported by the WiFi driver, in bits per second. +- **LastLatencyMode** The last reported latency mode. +- **LogTimeReference** The reference time, in tick counts. +- **LowestBitrate** The lowest video bitrate used during the Miracast session, in bits per second. +- **LowestDataRate** The lowest video bitrate used during the Miracast session, in bits per second. +- **MediaErrorCode** The error code reported by the media session, if applicable. +- **MiracastEntry** The time (tick count) when the Miracast driver was first loaded. +- **MiracastM1** The time (tick count) when the M1 request was sent. +- **MiracastM2** The time (tick count) when the M2 request was sent. +- **MiracastM3** The time (tick count) when the M3 request was sent. +- **MiracastM4** The time (tick count) when the M4 request was sent. +- **MiracastM5** The time (tick count) when the M5 request was sent. +- **MiracastM6** The time (tick count) when the M6 request was sent. +- **MiracastM7** The time (tick count) when the M7 request was sent. +- **MiracastSessionState** The state of the Miracast session when the connection ended. +- **MiracastStreaming** The time (tick count) when the Miracast session first started processing frames. +- **ProfileCount** The count of profiles generated from the receiver M4 response. +- **ProfileCountAfterFiltering** The count of profiles after filtering based on available bandwidth and encoder capabilities. +- **RefreshRate** The refresh rate set on the remote display. +- **RotationSupported** Indicates if the Miracast receiver supports display rotation. +- **RTSPSessionId** The unique identifier of the RTSP session. This matches the RTSP session ID for the receiver for the same session. +- **SessionGuid** The unique identifier of to correlate various Miracast events from a session. +- **SinkHadEdid** Indicates if the Miracast receiver reported an EDID. +- **SupportMicrosoftColorSpaceConversion** Indicates whether the Microsoft color space conversion for extra color fidelity is supported by the receiver. +- **SupportsMicrosoftDiagnostics** Indicates whether the Miracast receiver supports the Microsoft Diagnostics Miracast extension. +- **SupportsMicrosoftFormatChange** Indicates whether the Miracast receiver supports the Microsoft Format Change Miracast extension. +- **SupportsMicrosoftLatencyManagement** Indicates whether the Miracast receiver supports the Microsoft Latency Management Miracast extension. +- **SupportsMicrosoftRTCP** Indicates whether the Miracast receiver supports the Microsoft RTCP Miracast extension. +- **SupportsMicrosoftVideoFormats** Indicates whether the Miracast receiver supports Microsoft video format for 3:2 resolution. +- **SupportsWiDi** Indicates whether Miracast receiver supports Intel WiDi extensions. +- **TeardownErrorCode** The error code reason for teardown provided by the receiver, if applicable. +- **TeardownErrorReason** The text string reason for teardown provided by the receiver, if applicable. +- **UIBCEndState** Indicates whether UIBC was enabled when the connection ended. +- **UIBCEverEnabled** Indicates whether UIBC was ever enabled. +- **UIBCStatus** The result code reported by the UIBC setup process. +- **VideoBitrate** The starting bitrate for the video encoder. +- **VideoCodecLevel** The encoding level used for encoding, specific to the video subtype. +- **VideoHeight** The height of encoded video frames. +- **VideoSubtype** The unique subtype identifier of the video codec (encoding method) used for video encoding. +- **VideoWidth** The width of encoded video frames. +- **WFD2Supported** Indicates if the Miracast receiver supports WFD2 protocol. + + +## OneDrive events + +### Microsoft.OneDrive.Sync.Setup.APIOperation + +This event includes basic data about install and uninstall OneDrive API operations. + +The following fields are available: + +- **APIName** The name of the API. +- **Duration** How long the operation took. +- **IsSuccess** Was the operation successful? +- **ResultCode** The result code. +- **ScenarioName** The name of the scenario. + + +### Microsoft.OneDrive.Sync.Setup.EndExperience + +This event includes a success or failure summary of the installation. + +The following fields are available: + +- **APIName** The name of the API. +- **HResult** HResult of the operation +- **IsSuccess** Whether the operation is successful or not +- **ScenarioName** The name of the scenario. + + +### Microsoft.OneDrive.Sync.Setup.OSUpgradeInstallationOperation + +This event is related to the OS version when the OS is upgraded with OneDrive installed. + +The following fields are available: + +- **CurrentOneDriveVersion** The current version of OneDrive. +- **CurrentOSBuildBranch** The current branch of the operating system. +- **CurrentOSBuildNumber** The current build number of the operating system. +- **CurrentOSVersion** The current version of the operating system. +- **HResult** The HResult of the operation. +- **SourceOSBuildBranch** The source branch of the operating system. +- **SourceOSBuildNumber** The source build number of the operating system. +- **SourceOSVersion** The source version of the operating system. + + +### Microsoft.OneDrive.Sync.Setup.RegisterStandaloneUpdaterAPIOperation + +This event is related to registering or unregistering the OneDrive update task. + +The following fields are available: + +- **APIName** The name of the API. +- **IsSuccess** Was the operation successful? +- **RegisterNewTaskResult** The HResult of the RegisterNewTask operation. +- **ScenarioName** The name of the scenario. +- **UnregisterOldTaskResult** The HResult of the UnregisterOldTask operation. + + +### Microsoft.OneDrive.Sync.Updater.ComponentInstallState + +This event includes basic data about the installation state of dependent OneDrive components. + +The following fields are available: + +- **ComponentName** The name of the dependent component. +- **isInstalled** Is the dependent component installed? + + +### Microsoft.OneDrive.Sync.Updater.OverlayIconStatus + +This event indicates if the OneDrive overlay icon is working correctly. 0 = healthy; 1 = can be fixed; 2 = broken + +The following fields are available: + +- **32bit** The status of the OneDrive overlay icon on a 32-bit operating system. +- **64bit** The status of the OneDrive overlay icon on a 64-bit operating system. + + +### Microsoft.OneDrive.Sync.Updater.UpdateOverallResult + +This event sends information describing the result of the update. + +The following fields are available: + +- **hr** The HResult of the operation. +- **IsLoggingEnabled** Indicates whether logging is enabled for the updater. +- **UpdaterVersion** The version of the updater. + + +### Microsoft.OneDrive.Sync.Updater.UpdateXmlDownloadHResult + +This event determines the status when downloading the OneDrive update configuration file. + +The following fields are available: + +- **hr** The HResult of the operation. + + +### Microsoft.OneDrive.Sync.Updater.WebConnectionStatus + +This event determines the error code that was returned when verifying Internet connectivity. + +The following fields are available: + +- **winInetError** The HResult of the operation. + + +## Privacy consent logging events + +### Microsoft.Windows.Shell.PrivacyConsentLogging.PrivacyConsentCompleted + +This event is used to determine whether the user successfully completed the privacy consent experience. + +The following fields are available: + +- **presentationVersion** Which display version of the privacy consent experience the user completed +- **privacyConsentState** The current state of the privacy consent experience +- **settingsVersion** Which setting version of the privacy consent experience the user completed +- **userOobeExitReason** The exit reason of the privacy consent experience + + +### Microsoft.Windows.Shell.PrivacyConsentLogging.PrivacyConsentStatus + +Event tells us effectiveness of new privacy experience. + +The following fields are available: + +- **isAdmin** whether the person who is logging in is an admin +- **isExistingUser** whether the account existed in a downlevel OS +- **isLaunching** Whether or not the privacy consent experience will be launched +- **isSilentElevation** whether the user has most restrictive UAC controls +- **privacyConsentState** whether the user has completed privacy experience +- **userRegionCode** The current user's region setting + + +### wilActivity + +This event provides a Windows Internal Library context used for Product and Service diagnostics. + +The following fields are available: + +- **-149ngContextMessage** No content is currently available. +- **3645entContextName** No content is currently available. +- **379rentContextName** No content is currently available. +- **532rentContextName** No content is currently available. +- **677rentContextName** No content is currently available. +- **8108entContextName** No content is currently available. +- **8251entContextName** No content is currently available. +- **902rentContextName** No content is currently available. +- **9567ngContextMessage** No content is currently available. +- **9717ngContextMessage** No content is currently available. +- **callContext** The function where the failure occurred. +- **currentContextId** The ID of the current call context where the failure occurred. +- **currentContextMessage** The message of the current call context where the failure occurred. +- **currentContextMessaon** No content is currently available. +- **currentContextName** The name of the current call context where the failure occurred. +- **failureCount** The number of failures for this failure ID. +- **failureId** The ID of the failure that occurred. +- **failureType** The type of the failure that occurred. +- **fileName** The file name where the failure occurred. +- **functige** No content is currently available. +- **function** The function where the failure occurred. +- **hresult** The HResult of the overall activity. +- **lineNumber** The line number where the failure occurred. +- **message** The message of the failure that occurred. +- **module** The module where the failure occurred. +- **ori1-0467ngContextMessage** No content is currently available. +- **ori1-1210ngContextMessage** No content is currently available. +- **ori1143-7ngContextMessage** No content is currently available. +- **ori1-1945ngContextMessage** No content is currently available. +- **ori13s090ngContextMessage** No content is currently available. +- **ori1-4671entContextName** No content is currently available. +- **ori1-5108ngContextMessage** No content is currently available. +- **ori1-5686ngContextMessage** No content is currently available. +- **ori1n:667ngContextMessage** No content is currently available. +- **ori1n8488ngContextMessage** No content is currently available. +- **ori1-s4o5ngContextMessage** No content is currently available. +- **ori808467ngContextMessage** No content is currently available. +- **originatingContextId** The ID of the originating call context that resulted in the failure. +- **originatingContextMessage** The message of the originating call context that resulted in the failure. +- **originatingContextName** The name of the originating call context that resulted in the failure. +- **threa0Id** No content is currently available. +- **threadId** The ID of the thread on which the activity is executing. + + +## Sediment events + +### Microsoft.Windows.Sediment.Info.DetailedState + +This event is sent when detailed state information is needed from an update trial run. + +The following fields are available: + +- **Data** Data relevant to the state, such as what percent of disk space the directory takes up. +- **Id** Identifies the trial being run, such as a disk related trial. +- **ReleaseVer** The version of the component. +- **State** The state of the reporting data from the trial, such as the top-level directory analysis. +- **Time** The time the event was fired. + + +### Microsoft.Windows.Sediment.Info.Error + +This event indicates an error in the updater payload. This information assists in keeping Windows up to date. + +The following fields are available: + +- **FailureType** The type of error encountered. +- **FileName** The code file in which the error occurred. +- **HResult** The failure error code. +- **LineNumber** The line number in the code file at which the error occurred. +- **ReleaseVer** The version information for the component in which the error occurred. +- **Time** The system time at which the error occurred. + + +### Microsoft.Windows.Sediment.Info.PhaseChange + +The event indicates progress made by the updater. This information assists in keeping Windows up to date. + +The following fields are available: + +- **NewPhase** The phase of progress made. +- **ReleaseVer** The version information for the component in which the change occurred. +- **Time** The system time at which the phase chance occurred. + + +## Setup events + +### SetupPlatformTel.SetupPlatformTelActivityEvent + +This event sends basic metadata about the SetupPlatform update installation process, to help keep Windows up to date. + +The following fields are available: + +- **FieldName** Retrieves the event name/data point. Examples: InstallStartTime, InstallEndtime, OverallResult etc. +- **GroupName** Retrieves the groupname the event belongs to. Example: Install Information, DU Information, Disk Space Information etc. +- **Value** Value associated with the corresponding event name. For example, time-related events will include the system time + + +### SetupPlatformTel.SetupPlatformTelActivityStarted + +This event sends basic metadata about the update installation process generated by SetupPlatform to help keep Windows up to date. + +The following fields are available: + +- **Name** The name of the dynamic update type. Example: GDR driver + + +### SetupPlatformTel.SetupPlatformTelActivityStopped + +This event sends basic metadata about the update installation process generated by SetupPlatform to help keep Windows up to date. + + + +### SetupPlatformTel.SetupPlatformTelEvent + +This service retrieves events generated by SetupPlatform, the engine that drives the various deployment scenarios. + +The following fields are available: + +- **Falue** No content is currently available. +- **FieldName** Retrieves the event name/data point. Examples: InstallStartTime, InstallEndtime, OverallResult etc. +- **GroupName** Retrieves the groupname the event belongs to. Example: Install Information, DU Information, Disk Space Information etc. +- **Value** Retrieves the value associated with the corresponding event name (Field Name). For example: For time related events this will include the system time. + + +## Software update events + +### SoftwareUpdateClientTelemetry.CheckForUpdates + +Scan process event on Windows Update client. See the EventScenario field for specifics (started/failed/succeeded). + +The following fields are available: + +- **AativityMatchingId** No content is currently available. +- **ActivityMatchingId** Contains a unique ID identifying a single CheckForUpdates session from initialization to completion. +- **ActivityMatcjingId** No content is currently available. +- **AllowCachedResul|s** No content is currently available. +- **AllowCachedResults** Indicates if the scan allowed using cached results. +- **AllowCachedRmsults** No content is currently available. +- **ApplicableUpdateInfo** Metadata for the updates which were detected as applicable +- **BiosFamily** The family of the BIOS (Basic Input Output System). +- **BiosName** The name of the device BIOS. +- **BiosReleaseDate** The release date of the device BIOS. +- **BiosSKUNumber** The sku number of the device BIOS. +- **BIOSVendor** The vendor of the BIOS. +- **BiosVersion** The version of the BIOS. +- **BranchReadinessLevel** The servicing branch configured on the device. +- **CachedEngineVersion** For self-initiated healing, the version of the SIH engine that is cached on the device. If the SIH engine does not exist, the value is null. +- **CallerApplicationName** The name provided by the caller who initiated API calls into the software distribution client. +- **CapabilityDetectoidGuid** The GUID for a hardware applicability detectoid that could not be evaluated. +- **CDNCountryCode** Two letter country abbreviation for the Content Distribution Network (CDN) location. +- **CDNId** The unique identifier of a specific device, used to identify how many devices are encountering success or a particular issue. +- **ClientVersion** The version number of the software distribution client. +- **CommonProps** A bitmask for future flags associated with the Windows Update client behavior. No data is currently reported in this field. Expected value for this field is 0. +- **Context** Gives context on where the error has occurred. Example: AutoEnable, GetSLSData, AddService, Misc, or Unknown +- **CurrentMobileOperator** The mobile operator the device is currently connected to. +- **DeferralPolicySources** Sources for any update deferral policies defined (GPO = 0x10, MDM = 0x100, Flight = 0x1000, UX = 0x10000). +- **DeferredUpdates** Update IDs which are currently being deferred until a later time +- **DeviceModel** What is the device model. +- **DriverError** The error code hit during a driver scan. This is 0 if no error was encountered. +- **DriverExclusionPolicy** Indicates if the policy for not including drivers with Windows Update is enabled. +- **DriverSyncPassPerformed** Were drivers scanned this time? +- **DriverSyncPasSPerformed** No content is currently available. +- **EventInstanceID** A globally unique identifier for event instance. +- **EventScenario** Indicates the purpose of sending this event - whether because the software distribution just started checking for content, or whether it was cancelled, succeeded, or failed. +- **ExtendedetadataICabUrl** No content is currently available. +- **ExtendedMetadataCabUrl** Hostname that is used to download an update. +- **ExtendedStatusCode** Secondary error code for certain scenarios where StatusCode wasn't specific enough. +- **FailedUpdateGuids** The GUIDs for the updates that failed to be evaluated during the scan. +- **FailedUpdatesCount** The number of updates that failed to be evaluated during the scan. +- **FeatureUpdateDeferral** The deferral period configured for feature OS updates on the device (in days). +- **FeatureUpdatePause** Indicates whether feature OS updates are paused on the device. +- **FeatureUpdatePausePerimd** No content is currently available. +- **FeatureUpdatePausePeriod** The pause duration configured for feature OS updates on the device (in days). +- **FlightBranch** The branch that a device is on if participating in flighting (pre-release builds). +- **FlightRing** The ring (speed of getting builds) that a device is on if participating in flighting (pre-release builds). +- **HomeMobileOperator** The mobile operator that the device was originally intended to work with. +- **IntentPFNs** Intended application-set metadata for atomic update scenarios. +- **IPVersion** Indicates whether the download took place over IPv4 or IPv6 +- **IsWUfBDualScanEnabled** Indicates if Windows Update for Business dual scan is enabled on the device. +- **IsWUfBEna`led** No content is currently available. +- **IsWUfBEnabled** Indicates if Windows Update for Business is enabled on the device. +- **IsWUfBFederatedScanDisabled** Indicates if Windows Update for Business federated scan is disabled on the device. +- **MetadataIntegrityMode** The mode of the update transport metadata integrity check. 0-Unknown, 1-Ignoe, 2-Audit, 3-Enforce +- **MSIError** The last error that was encountered during a scan for updates. +- **NetworkConneativityDetected** No content is currently available. +- **NetworkConnectivityDetected** Indicates the type of network connectivity that was detected. 0 - IPv4, 1 - IPv6 +- **NumberOfApplicableUpdates** The number of updates which were ultimately deemed applicable to the system after the detection process is complete +- **NumberOfApplicationsCategoryScanEvaluated** The number of categories (apps) for which an app update scan checked +- **NumberOfLoop** The number of round trips the scan required +- **NumberOfNewUpdatesFromServiceSync** The number of updates which were seen for the first time in this scan +- **NumberOfUpdatesEvaluated** The total number of updates which were evaluated as a part of the scan +- **NumFailedetadataISignatures** No content is currently available. +- **NumFailedMetadatabignatures** No content is currently available. +- **NumFailedMetadataSignatures** The number of metadata signatures checks which failed for new metadata synced down. +- **Online** Indicates if this was an online scan. +- **PausedUpdates** A list of UpdateIds which that currently being paused. +- **PauseFeatureUpdatesEndTime** If feature OS updates are paused on the device, this is the date and time for the end of the pause time window. +- **PauseFeatureUpdatesStartTime** If feature OS updates are paused on the device, this is the date and time for the beginning of the pause time window. +- **PauseQualityUpdatesEndTime** If quality OS updates are paused on the device, this is the date and time for the end of the pause time window. +- **PauseQualityUpdatesStartTime** If quality OS updates are paused on the device, this is the date and time for the beginning of the pause time window. +- **PhonePreviewEnabled** Indicates whether a phone was getting preview build, prior to flighting (pre-release builds) being introduced. +- **ProcessName** The process name of the caller who initiated API calls, in the event where CallerApplicationName was not provided. +- **QualityUpdateDeferral** The deferral period configured for quality OS updates on the device (in days). +- **QualityUpdatePause** Indicates whether quality OS updates are paused on the device. +- **QualityUpdatePausePeriod** The pause duration configured for quality OS updates on the device (in days). +- **RelatedCV** The previous Correlation Vector that was used before swapping with a new one +- **ScanDurationInSeconds** The number of seconds a scan took +- **ScanEnqueueTime** The number of seconds it took to initialize a scan +- **ScanProps** This is a 32-bit integer containing Boolean properties for a given Windows Update scan. The following bits are used; all remaining bits are reserved and set to zero. Bit 0 (0x1): IsInteractive - is set to 1 if the scan is requested by a user, or 0 if the scan is requested by Automatic Updates. Bit 1 (0x2): IsSeeker - is set to 1 if the Windows Update client's Seeker functionality is enabled. Seeker functionality is enabled on certain interactive scans, and results in the scans returning certain updates that are in the initial stages of release (not yet released for full adoption via Automatic Updates). +- **ServiaeUrl** No content is currently available. +- **ServiceGuid** An ID which represents which service the software distribution client is checking for content (Windows Update, Microsoft Store, etc.). +- **ServiceUrl** The environment URL a device is configured to scan with +- **ShippingMobileOperator** The mobile operator that a device shipped on. +- **StatusCode** Indicates the result of a CheckForUpdates event (success, cancellation, failure code HResult). +- **SyncType** Describes the type of scan the event was +- **SystemBIOSMajorRelease** Major version of the BIOS. +- **SystemBIOSMinorRelease** Minor version of the BIOS. +- **TargetMetadataVersion** For self-initiated healing, this is the target version of the SIH engine to download (if needed). If not, the value is null. +- **TotalNumetadataISignatures** No content is currently available. +- **TotalNumMetadatabignatures** No content is currently available. +- **TotalNumMetadataSignatures** The total number of metadata signatures checks done for new metadata that was synced down. +- **VelatedCV** No content is currently available. +- **WebServiceRetryMethods** Web service method requests that needed to be retried to complete operation. +- **WUDeviceID** The unique identifier of a specific device, used to identify how many devices are encountering success or a particular issue. + + +### SoftwareUpdateClientTelemetry.Commit + +This event tracks the commit process post the update installation when software update client is trying to update the device. + +The following fields are available: + +- **BiosFamily** Device family as defined in the system BIOS +- **BiosName** Name of the system BIOS +- **BiosReleaseDate** Release date of the system BIOS +- **BiosSKUNumber** Device SKU as defined in the system BIOS +- **BIOSVendor** Vendor of the system BIOS +- **BiosVersion** Version of the system BIOS +- **BundleId** Identifier associated with the specific content bundle; should not be all zeros if the bundleID was found. +- **BundleRevisionNumber** Identifies the revision number of the content bundle +- **CallerApplicationName** Name provided by the caller who initiated API calls into the software distribution client +- **ClientVersion** Version number of the software distribution client +- **DeploymentProviderMode** The mode of operation of the update deployment provider. +- **DeviceModel** Device model as defined in the system bios +- **EventInstanceID** A globally unique identifier for event instance +- **EventScenario** Indicates the purpose of the event - whether because scan started, succeded, failed, etc. +- **EventType** Possible values are "Child", "Bundle", "Relase" or "Driver". +- **FlightId** The specific id of the flight the device is getting +- **HandlerType** Indicates the kind of content (app, driver, windows patch, etc.) +- **RevisionNumber** Identifies the revision number of this specific piece of content +- **ServiceGuid** A unique identifier for the service that the software distribution client is installing content for (Windows Update, Microsoft Store, etc). +- **SystemBIOSMajorRelease** Major release version of the system bios +- **SystemBIOSMinorRelease** Minor release version of the system bios +- **UpdateId** Identifier associated with the specific piece of content +- **WUDeviceID** Unique device id controlled by the software distribution client + + +### SoftwareUpdateClientTelemetry.Download + +Download process event for target update on Windows Update client. See the EventScenario field for specifics (started/failed/succeeded). + +The following fields are available: + +- **ActiveDownloadTime** How long the download took, in seconds, excluding time where the update wasn't actively being downloaded. +- **AppXBlockHashFailures** Indicates the number of blocks that failed hash validation during download of the app payload. +- **AppXBlocKHashFailures** No content is currently available. +- **AppXBlockHashValidationFailureCount** A count of the number of blocks that have failed validation after being downloaded. +- **AppXDownloadScope** Indicates the scope of the download for application content. +- **AppXScope** Indicates the scope of the app download. +- **BiosFamily** The family of the BIOS (Basic Input Output System). +- **BiosName** The name of the device BIOS. +- **BiosReleaseDate** The release date of the device BIOS. +- **BiosSKUNumber** The sku number of the device BIOS. +- **BIOSVendor** The vendor of the BIOS. +- **BiosVersion** The version of the BIOS. +- **BundleBytesDownloaded** Number of bytes downloaded for the specific content bundle. +- **BundleId** Identifier associated with the specific content bundle. +- **BundleRepeatFailCount** Indicates whether this particular update bundle has previously failed. +- **BundleRepeatFailFlag** Indicates whether this particular update bundle previously failed to download. +- **BundleRevisionNumber** Identifies the revision number of the content bundle. +- **BundleRevisionumber** No content is currently available. +- **BytesDownloaded** Number of bytes that were downloaded for an individual piece of content (not the entire bundle). +- **CachedEngineVersion** The version of the “Self-Initiated Healing” (SIH) engine that is cached on the device, if applicable. +- **CallerApplicationName** The name provided by the application that initiated API calls into the software distribution client. +- **CallerApplicavionName** No content is currently available. +- **CbsDownloadMethod** Indicates whether the download was a full- or a partial-file download. +- **CbsMethod** The method used for downloading the update content related to the Component Based Servicing (CBS) technology. +- **CDNCoun|ryCode** No content is currently available. +- **CDNCountryCode** Two letter country abbreviation for the Content Distribution Network (CDN) location. +- **CDNId** ID which defines which CDN the software distribution client downloaded the content from. +- **ClientVersion** The version number of the software distribution client. +- **CommonProps** A bitmask for future flags associated with the Windows Update client behavior. +- **ConnectTime** Indicates the cumulative amount of time (in seconds) it took to establish the connection for all updates in an update bundle. +- **CurrentMobileOperator** The mobile operator the device is currently connected to. +- **DeviceModel** The model of the device. +- **DownloadPriority** Indicates whether a download happened at background, normal, or foreground priority. +- **DownloadProps** Information about the download operation properties in the form of a bitmask. +- **DownloadType** Differentiates the download type of “Self-Initiated Healing” (SIH) downloads between Metadata and Payload downloads. +- **EventInstanceID** A globally unique identifier for event instance. +- **EventScenario** Indicates the purpose for sending this event: whether because the software distribution just started downloading content; or whether it was cancelled, succeeded, or failed. +- **EventType** Identifies the type of the event (Child, Bundle, or Driver). +- **ExtendedStatusCode** Secondary error code for certain scenarios where StatusCode wasn't specific enough. +- **FeatureUpdatePause** Indicates whether feature OS updates are paused on the device. +- **FFightBuildNumber** No content is currently available. +- **FFightId** No content is currently available. +- **FlightBranch** The branch that a device is on if participating in flighting (pre-release builds). +- **FlightBuildNumber** If this download was for a flight (pre-release build), this indicates the build number of that flight. +- **FlightId** The specific ID of the flight (pre-release build) the device is getting. +- **FlightRing** The ring (speed of getting builds) that a device is on if participating in flighting (pre-release builds). +- **HandlerType** Indicates what kind of content is being downloaded (app, driver, windows patch, etc.). +- **HardwareId** If this download was for a driver targeted to a particular device model, this ID indicates the model of the device. +- **HomeMobileOperator** The mobile operator that the device was originally intended to work with. +- **HostName** The hostname URL the content is downloading from. +- **IPVersion** Indicates whether the download took place over IPv4 or IPv6. +- **IsDependentSet** Indicates whether a driver is a part of a larger System Hardware/Firmware Update +- **IsWUfBDualScanEnabled** Indicates if Windows Update for Business dual scan is enabled on the device. +- **IsWUfBEnabled** Indicates if Windows Update for Business is enabled on the device. +- **IsWUfBEnaBled** No content is currently available. +- **NetworkCost** A flag indicating the cost of the network (congested, fixed, variable, over data limit, roaming, etc.) used for downloading the update content. +- **NetworkCostBitMask** Indicates what kind of network the device is connected to (roaming, metered, over data cap, etc.) +- **NetworkRestrictionStatus** More general version of NetworkCostBitMask, specifying whether Windows considered the current network to be "metered." +- **PackageFullName** The package name of the content. +- **PhonePreviewEnabled** Indicates whether a phone was opted-in to getting preview builds, prior to flighting (pre-release builds) being introduced. +- **PostDnldTime** Time (in seconds) taken to signal download completion after the last job completed downloading the payload. +- **ProcessName** The process name of the application that initiated API calls, in the event where CallerApplicationName was not provided. +- **QualityUpdatePause** Indicates whether quality OS updates are paused on the device. +- **Reason** A 32-bit integer representing the reason the update is blocked from being downloaded in the background. +- **RegulationReason** The reason that the update is regulated +- **RegulationResult** The result code (HResult) of the last attempt to contact the regulation web service for download regulation of update content. +- **RegulitionResult** No content is currently available. +- **RelatedCV** The Correlation Vector that was used before the most recent change to a new Correlation Vector. +- **RepeatFailCount** Indicates whether this specific content has previously failed. +- **RepeatFailFlag** Indicates whether this specific content previously failed to download. +- **RevisionNumber** The revision number of the specified piece of content. +- **RevisionNUmber** No content is currently available. +- **Revisionumber** No content is currently available. +- **ServiceGuid** A unique identifier for the service that the software distribution client is installing content for (Windows Update, Microsoft Store, etc). +- **ServiceGUid** No content is currently available. +- **Setup360Phase** Identifies the active phase of the upgrade download if the current download is for an Operating System upgrade. +- **ShippingMobileOperator** The mobile operator linked to the device when the device shipped. +- **SizeCalcTime** Time (in seconds) taken to calculate the total download size of the payload. +- **SonnectTime** No content is currently available. +- **StatusCode** Indicates the result of a Download event (success, cancellation, failure code HResult). +- **SystemBIOSMajorRelease** Major version of the BIOS. +- **SystemBIOSMinorRelease** Minor version of the BIOS. +- **TargetGroupId** For drivers targeted to a specific device model, this ID indicates the distribution group of devices receiving that driver. +- **TargetingVersion** For drivers targeted to a specific device model, this is the version number of the drivers being distributed to the device. +- **TargetMetadataVersion** The version of the currently downloading (or most recently downloaded) package. +- **ThrottlingServiceHResult** Result code (success/failure) while contacting a web service to determine whether this device should download content yet. +- **TimeToEstablishConnection** Time (in milliseconds) it took to establish the connection prior to beginning downloaded. +- **TotalExpectedBytes** The total size (in Bytes) expected to be downloaded. +- **UpdateId** An identifier associated with the specific piece of content. +- **UpdateID** An identifier associated with the specific piece of content. +- **UpdateImportance** Indicates whether the content was marked as Important, Recommended, or Optional. +- **UsedDO** Indicates whether the download used the Delivery Optimization (DO) service. +- **UsedSystemVolume** Indicates whether the content was downloaded to the device's main system storage drive, or an alternate storage drive. +- **WUDeviceID** The unique identifier of a specific device, used to identify how many devices are encountering success or a particular issue. + + +### SoftwareUpdateClientTelemetry.DownloadCheckpoint + +This event provides a checkpoint between each of the Windows Update download phases for UUP content + +The following fields are available: + +- **CallerApplicationName** The name provided by the caller who initiated API calls into the software distribution client +- **ClientVersion** The version number of the software distribution client +- **EventScenario** Indicates the purpose of sending this event - whether because the software distribution just started checking for content, or whether it was cancelled, succeeded, or failed +- **EventType** Possible values are "Child", "Bundle", "Relase" or "Driver" +- **ExtendedStatusCode** Secondary error code for certain scenarios where StatusCode wasn't specific enough +- **FileId** A hash that uniquely identifies a file +- **FileName** Name of the downloaded file +- **FlightId** The unique identifier for each flight +- **RelatedCV** The previous Correlation Vector that was used before swapping with a new one +- **RevisionNumber** Unique revision number of Update +- **ServiceGuid** An ID which represents which service the software distribution client is checking for content (Windows Update, Microsoft Store, etc.) +- **StatusCode** Indicates the result of a CheckForUpdates event (success, cancellation, failure code HResult) +- **UpdateId** Unique Update ID +- **WUDeviceID** The unique identifier of a specific device, used to identify how many devices are encountering success or a particular issue + + +### SoftwareUpdateClientTelemetry.DownloadHeartbeat + +This event allows tracking of ongoing downloads and contains data to explain the current state of the download + +The following fields are available: + +- **BytesTotal** Total bytes to transfer for this content +- **BytesTransferred** Total bytes transferred for this content at the time of heartbeat +- **CallerApplicationName** Name provided by the caller who initiated API calls into the software distribution client +- **ClientVersion** The version number of the software distribution client +- **ConnectionStatus** Indicates the connectivity state of the device at the time of heartbeat +- **CurrentError** Last (transient) error encountered by the active download +- **DownloadFlags** Flags indicating if power state is ignored +- **DownloadState** Current state of the active download for this content (queued, suspended, or progressing) +- **EventType** Possible values are "Child", "Bundle", or "Driver" +- **FlightId** The unique identifier for each flight +- **IsNetworkMetered** Indicates whether Windows considered the current network to be ?metered" +- **MOAppDownloadLimit** Mobile operator cap on size of application downloads, if any +- **MOUpdateDownloadLimit** Mobile operator cap on size of operating system update downloads, if any +- **PowerState** Indicates the power state of the device at the time of heartbeart (DC, AC, Battery Saver, or Connected Standby) +- **RelatedCV** The previous correlation vector that was used by the client, before swapping with a new one +- **ResumeCount** Number of times this active download has resumed from a suspended state +- **RevisionNumber** Identifies the revision number of this specific piece of content +- **ServiceGuid** Identifier for the service to which the software distribution client is connecting (Windows Update, Microsoft Store, etc) +- **SuspendCount** Number of times this active download has entered a suspended state +- **SuspendReason** Last reason for why this active download entered a suspended state +- **UpdateId** Identifier associated with the specific piece of content +- **WUDeviceID** Unique device id controlled by the software distribution client + + +### SoftwareUpdateClientTelemetry.Install + +This event sends tracking data about the software distribution client installation of the content for that update, to help keep Windows up to date. + +The following fields are available: + +- **BiosFamily** The family of the BIOS (Basic Input Output System). +- **BiosName** The name of the device BIOS. +- **BiosReleaseDate** The release date of the device BIOS. +- **BiosSKUNumber** The sku number of the device BIOS. +- **BIOSVendor** The vendor of the BIOS. +- **BiosVersion** The version of the BIOS. +- **BundleId** Identifier associated with the specific content bundle; should not be all zeros if the bundleID was found. +- **BundleRepeatFailCount** Indicates whether this particular update bundle has previously failed. +- **BundleRepeatFailFlag** Indicates whether this particular update bundle previously failed to install. +- **BundleRevisionNumber** Identifies the revision number of the content bundle. +- **CachedEngineVersion** For self-initiated healing, the version of the SIH engine that is cached on the device. If the SIH engine does not exist, the value is null. +- **CallerApplicationName** The name provided by the caller who initiated API calls into the software distribution client. +- **ClientVersion** The version number of the software distribution client. +- **CommonProps** A bitmask for future flags associated with the Windows Update client behavior. No value is currently reported in this field. Expected value for this field is 0. +- **CSIErrorType** The stage of CBS installation where it failed. +- **CurrentMobileOperator** The mobile operator to which the device is currently connected. +- **DeploymentProviderMode** The mode of operation of the update deployment provider. +- **DeviceModel** The device model. +- **DriverPifgBack** No content is currently available. +- **DriverPingBack** Contains information about the previous driver and system state. +- **DriverRecoveryIds** The list of identifiers that could be used for uninstalling the drivers if a recovery is required. +- **EventInstanceID** A globally unique identifier for event instance. +- **EventScenario** Indicates the purpose of sending this event - whether because the software distribution just started installing content, or whether it was cancelled, succeeded, or failed. +- **EventType** Possible values are Child, Bundle, or Driver. +- **ExtendedErrorCode** The extended error code. +- **ExtendedStatusCode** Secondary error code for certain scenarios where StatusCode is not specific enough. +- **FeatureUpdatePause** Indicates whether feature OS updates are paused on the device. +- **FlightBranch** The branch that a device is on if participating in the Windows Insider Program. +- **FlightBuildNumber** If this installation was for a Windows Insider build, this is the build number of that build. +- **FlightId** The specific ID of the Windows Insider build the device is getting. +- **FlightRing** The ring that a device is on if participating in the Windows Insider Program. +- **HandlerType** Indicates what kind of content is being installed (for example, app, driver, Windows update). +- **HardwareId** If this install was for a driver targeted to a particular device model, this ID indicates the model of the device. +- **HomeMobileOperator** The mobile operator that the device was originally intended to work with. +- **InstallProps** A bitmask for future flags associated with the install operation. No value is currently reported in this field. Expected value for this field is 0. +- **IntentPFNs** Intended application-set metadata for atomic update scenarios. +- **IsDependentSet** Indicates whether the driver is part of a larger System Hardware/Firmware update. +- **IsFinalOutcomeEvent** Indicates whether this event signals the end of the update/upgrade process. +- **IsFirmware** Indicates whether this update is a firmware update. +- **IsSuccessFailurePostReboot** Indicates whether the update succeeded and then failed after a restart. +- **IsWUfBDualScanEnabled** Indicates whether Windows Update for Business dual scan is enabled on the device. +- **IsWUfBEnabled** Indicates whether Windows Update for Business is enabled on the device. +- **MergedUpdate** Indicates whether the OS update and a BSP update merged for installation. +- **MsiAction** The stage of MSI installation where it failed. +- **MsiProductCode** The unique identifier of the MSI installer. +- **PackageFullName** The package name of the content being installed. +- **PhonePreviewEnabled** Indicates whether a phone was getting preview build, prior to flighting being introduced. +- **ProcessName** The process name of the caller who initiated API calls, in the event that CallerApplicationName was not provided. +- **QualityUpdatePause** Indicates whether quality OS updates are paused on the device. +- **RelatedCV** The previous Correlation Vector that was used before swapping with a new one +- **RepeatFailCount** Indicates whether this specific piece of content has previously failed. +- **RepeatFailFlag** Indicates whether this specific piece of content previously failed to install. +- **RevisionNumber** The revision number of this specific piece of content. +- **ServiceGuid** An ID which represents which service the software distribution client is installing content for (Windows Update, Microsoft Store, etc.). +- **Setup360Phase** If the install is for an operating system upgrade, indicates which phase of the upgrade is underway. +- **ShippingMobileOperator** The mobile operator that a device shipped on. +- **StatusCode** Indicates the result of an installation event (success, cancellation, failure code HResult). +- **SystemBIOSMajorRelease** Major version of the BIOS. +- **SystemBIOSMinorRelease** Minor version of the BIOS. +- **TargetGroupId** For drivers targeted to a specific device model, this ID indicates the distribution group of devices receiving that driver. +- **TargetingVersion** For drivers targeted to a specific device model, this is the version number of the drivers being distributed to the device. +- **TransactionCode** The ID that represents a given MSI installation. +- **UpdateId** Unique update ID. +- **UpdateID** An identifier associated with the specific piece of content. +- **UpdateImportance** Indicates whether a piece of content was marked as Important, Recommended, or Optional. +- **UsedSystemVolume** Indicates whether the content was downloaded and then installed from the device's main system storage drive, or an alternate storage drive. +- **WUDeviceID** The unique identifier of a specific device, used to identify how many devices are encountering success or a particular issue. + + +### SoftwareUpdateClientTelemetry.Revert + +Revert event for target update on Windows Update Client. See EventScenario field for specifics (for example, Started/Failed/Succeeded). + +The following fields are available: + +- **BundleId** Identifier associated with the specific content bundle. Should not be all zeros if the BundleId was found. +- **BundleRepeatFailCount** Indicates whether this particular update bundle has previously failed. +- **BundleRevisionNumber** Identifies the revision number of the content bundle. +- **CallerApplicationName** Name of application making the Windows Update request. Used to identify context of request. +- **ClientVersion** Version number of the software distribution client. +- **CommonProps** A bitmask for future flags associated with the Windows Update client behavior. There is no value being reported in this field right now. Expected value for this field is 0. +- **CSIErrorType** Stage of CBS installation that failed. +- **DriverPingBack** Contains information about the previous driver and system state. +- **DriverRecoveryIds** The list of identifiers that could be used for uninstalling the drivers if a recovery is required. +- **EventInstanceID** A globally unique identifier for event instance. +- **EventScenario** Indicates the purpose of the event (scan started, succeeded, failed, etc.). +- **EventType** Event type (Child, Bundle, Release, or Driver). +- **ExtendedStatusCode** Secondary status code for certain scenarios where StatusCode is not specific enough. +- **FeatureUpdatePause** Indicates whether feature OS updates are paused on the device. +- **FlightBuildNumber** Indicates the build number of the flight. +- **FlightId** The specific ID of the flight the device is getting. +- **HandlerType** Indicates the kind of content (app, driver, windows patch, etc.). +- **HardwareId** If this download was for a driver targeted to a particular device model, this ID indicates the model of the device. +- **IsFinalOutcomeEvent** Indicates whether this event signals the end of the update/upgrade process. +- **IsFirmware** Indicates whether an update was a firmware update. +- **IsSuccessFailurePostReboot** Indicates whether an initial success was a failure after a reboot. +- **IsWUfBDualScanEnabled** Flag indicating whether WU-for-Business dual scan is enabled on the device. +- **IsWUfBEnabled** Flag indicating whether WU-for-Business is enabled on the device. +- **MergedUpdate** Indicates whether an OS update and a BSP update were merged for install. +- **ProcessName** Process name of the caller who initiated API calls into the software distribution client. +- **QualityUpdatePause** Indicates whether quality OS updates are paused on the device. +- **RelatedCV** The previous correlation vector that was used by the client before swapping with a new one. +- **RepeatFailCount** Indicates whether this specific piece of content has previously failed. +- **RevisionNumber** Identifies the revision number of this specific piece of content. +- **ServiceGuid** A unique identifier for the service that the software distribution client is installing content for (Windows Update, Microsoft Store, etc). +- **StatusCode** Result code of the event (success, cancellation, failure code HResult). +- **TargetGroupId** For drivers targeted to a specific device model, this ID indicates the distribution group of devices receiving that driver. +- **TargetingVersion** For drivers targeted to a specific device model, this is the version number of the drivers being distributed to the device. +- **UpdateId** The identifier associated with the specific piece of content. +- **UpdateImportance** Indicates the importance of a driver, and why it received that importance level (0-Unknown, 1-Optional, 2-Important-DNF, 3-Important-Generic, 4-Important-Other, 5-Recommended). +- **UsedSystemVolume** Indicates whether the device's main system storage drive or an alternate storage drive was used. +- **WUDeviceID** Unique device ID controlled by the software distribution client. + + +### SoftwareUpdateClientTelemetry.TaskRun + +Start event for Server Initiated Healing client. See EventScenario field for specifics (for example, started/completed). + +The following fields are available: + +- **CallerApplicationName** Name of application making the Windows Update request. Used to identify context of request. +- **ClientVersion** Version number of the software distribution client. +- **CmdLineArgs** Command line arguments passed in by the caller. +- **EventInstanceID** A globally unique identifier for the event instance. +- **EventScenario** Indicates the purpose of the event (scan started, succeeded, failed, etc.). +- **ServiceGuid** Identifier for the service to which the software distribution client is connecting (Windows Update, Microsoft Store, etc.). +- **StatusCode** Result code of the event (success, cancellation, failure code HResult). +- **WUDeviceID** Unique device ID controlled by the software distribution client. + + +### SoftwareUpdateClientTelemetry.Uninstall + +Uninstall event for target update on Windows Update Client. See EventScenario field for specifics (for example, Started/Failed/Succeeded). + +The following fields are available: + +- **BundleId** The identifier associated with the specific content bundle. This should not be all zeros if the bundleID was found. +- **BundleRepeatFailCount** Indicates whether this particular update bundle previously failed. +- **BundleRevisionNumber** Identifies the revision number of the content bundle. +- **CallerApplicationName** Name of the application making the Windows Update request. Used to identify context of request. +- **ClientVersion** Version number of the software distribution client. +- **CommonProps** A bitmask for future flags associated with the Windows Update client behavior. There is no value being reported in this field right now. Expected value for this field is 0. +- **DriverPingBack** Contains information about the previous driver and system state. +- **DriverRecoveryIds** The list of identifiers that could be used for uninstalling the drivers when a recovery is required. +- **EventInstanceID** A globally unique identifier for event instance. +- **EventScenario** Indicates the purpose of the event (a scan started, succeded, failed, etc.). +- **EventType** Indicates the event type. Possible values are "Child", "Bundle", "Release" or "Driver". +- **ExtendedStatusCode** Secondary status code for certain scenarios where StatusCode is not specific enough. +- **FeatureUpdatePause** Indicates whether feature OS updates are paused on the device. +- **FlightBuildNumber** Indicates the build number of the flight. +- **FlightId** The specific ID of the flight the device is getting. +- **HandlerType** Indicates the kind of content (app, driver, windows patch, etc.). +- **HardwareId** If the download was for a driver targeted to a particular device model, this ID indicates the model of the device. +- **IsFinalOutcomeEvent** Indicates whether this event signals the end of the update/upgrade process. +- **IsFirmware** Indicates whether an update was a firmware update. +- **IsSuccessFailurePostReboot** Indicates whether an initial success was then a failure after a reboot. +- **IsWUfBDualScanEnabled** Flag indicating whether WU-for-Business dual scan is enabled on the device. +- **IsWUfBEnabled** Flag indicating whether WU-for-Business is enabled on the device. +- **MergedUpdate** Indicates whether an OS update and a BSP update were merged for install. +- **ProcessName** Process name of the caller who initiated API calls into the software distribution client. +- **QualityUpdatePause** Indicates whether quality OS updates are paused on the device. +- **RelatedCV** The previous correlation vector that was used by the client before swapping with a new one. +- **RepeatFailCount** Indicates whether this specific piece of content previously failed. +- **RevisionNumber** Identifies the revision number of this specific piece of content. +- **ServiceGuid** A unique identifier for the service that the software distribution client is installing content for (Windows Update, Microsoft Store, etc). +- **StatusCode** Result code of the event (success, cancellation, failure code HResult). +- **TargetGroupId** For drivers targeted to a specific device model, this ID indicates the distribution group of devices receiving that driver. +- **TargetingVersion** For drivers targeted to a specific device model, this is the version number of the drivers being distributed to the device. +- **UpdateId** Identifier associated with the specific piece of content. +- **UpdateImportance** Indicates the importance of a driver and why it received that importance level (0-Unknown, 1-Optional, 2-Important-DNF, 3-Important-Generic, 4-Important-Other, 5-Recommended). +- **UsedSystemVolume** Indicates whether the device’s main system storage drive or an alternate storage drive was used. +- **WUDeviceID** Unique device ID controlled by the software distribution client. + + +### SoftwareUpdateClientTelemetry.UpdateDetected + +This event sends data about an AppX app that has been updated from the Microsoft Store, including what app needs an update and what version/architecture is required, in order to understand and address problems with apps getting required updates. + +The following fields are available: + +- **ApplicableUpdateInfo** Metadata for the updates which were detected as applicable. +- **CallerApplicationName** The name provided by the caller who initiated API calls into the software distribution client. +- **IntentPFNs** Intended application-set metadata for atomic update scenarios. +- **NumberOfApplicableUpdates** The number of updates ultimately deemed applicable to the system after the detection process is complete. +- **RelatedCV** The previous Correlation Vector that was used before swapping with a new one. +- **RelntedCV** No content is currently available. +- **ServiceGuid** An ID that represents which service the software distribution client is connecting to (Windows Update, Microsoft Store, etc.). +- **umberOfApplicableUpdates** No content is currently available. +- **WUDeviceID** The unique device ID controlled by the software distribution client. +- **xHDeviceID** No content is currently available. + + +### SoftwareUpdateClientTelemetry.UpdateMetadataIntegrity + +Ensures Windows Updates are secure and complete. Event helps to identify whether update content has been tampered with and protects against man-in-the-middle attack. + +The following fields are available: + +- **CallerApplicationName** Name of application making the Windows Update request. Used to identify context of request. +- **CallerLoglicationName** No content is currently available. +- **EndpointUrl** URL of the endpoint where client obtains update metadata. Used to identify test vs staging vs production environments. +- **EventSbenario** No content is currently available. +- **EventScenario** Indicates the purpose of the event - whether because scan started, succeded, failed, etc. +- **ExtendedStatusCode** Secondary status code for certain scenarios where StatusCode was not specific enough. +- **ExtendefStatusCode** No content is currently available. +- **imeZoScenario** No content is currently available. +- **LeafCertId** The integral ID from the FragmentSigning data for the certificate that failed. +- **ListOfSHA256OfIntermediateCerData** A semicolon delimited list of base64 encoding of hashes for the Base64CerData in the FragmentSigning data of an intermediate certificate. +- **MetadataIntegrityMode** Mode of update transport metadata integrity check. 0-Unknown, 1-Ignoe, 2-Audit, 3-Enforce +- **MetadataSignature** A base64-encoded string of the signature associated with the update metadata (specified by revision ID). +- **RawMode** The raw unparsed mode string from the SLS response. This field is null if not applicable. +- **RawValidityWindowInDays** The raw unparsed validity window string in days of the timestamp token. This field is null if not applicable. +- **RcwMode** No content is currently available. +- **RevisionId** The revision ID for a specific piece of content. +- **RevisionNumber** The revision number for a specific piece of content. +- **SedviceGuid** No content is currently available. +- **ServiceGuid** Identifies the service to which the software distribution client is connected, Example: Windows Update or Microsoft Store +- **ServiceGuidEndpointUrl** No content is currently available. +- **SHA256OfLeafCerData** A base64 encoding of the hash for the Base64CerData in the FragmentSigning data of the leaf certificate. +- **SHA256OfLeafCertPublicKey** A base64 encoding of the hash of the Base64CertData in the FragmentSigning data of the leaf certificate. +- **SHA256OfTimestampToken** An encoded string of the timestamp token. +- **SignatureAlgorithm** The hash algorithm for the metadata signature. +- **SLSPrograms** A test program a machine may be opted in. Examples include "Canary" and "Insider Fast". +- **StatusCode** Result code of the event (success, cancellation, failure code HResult) +- **TimestampTokenCertThumbprint** The thumbprint of the encoded timestamp token. +- **TimestampTokenId** The time this was created. It is encoded in a timestamp blob and will be zero if the token is malformed. +- **UpdateId** The update ID for a specific piece of content. +- **ValidityWindowInDays** The validity window that's in effect when verifying the timestamp. + + +## System Resource Usage Monitor events + +### Microsoft.Windows.Srum.Sdp.CpuUsage + +This event provides information on CPU usage. + +The following fields are available: + +- **UsageMax** The maximum of hourly average CPU usage. +- **UsageMean** The mean of hourly average CPU usage. +- **UsageMedian** The median of hourly average CPU usage. +- **UsageTwoHourMaxMean** The mean of the maximum of every two hour of hourly average CPU usage. +- **UsageTwoHourMedianMean** The mean of the median of every two hour of hourly average CPU usage. + + +### Microsoft.Windows.Srum.Sdp.NetworkUsage + +This event provides information on network usage. + +The following fields are available: + +- **AdapterGuid** The unique ID of the adapter. +- **BytesTotalMax** The maximum of the hourly average bytes total. +- **BytesTotalMean** The mean of the hourly average bytes total. +- **BytesTotalMedian** The median of the hourly average bytes total. +- **BytesTotalTwoHourMaxMean** The mean of the maximum of every two hours of hourly average bytes total. +- **BytesTotalTwoHourMedianMean** The mean of the median of every two hour of hourly average bytes total. +- **LinkSpeed** The adapter link speed. + + +## Update events + +### Update360Telemetry.Revert + +This event sends data relating to the Revert phase of updating Windows. + +The following fields are available: + +- **ErrorCode** The error code returned for the Revert phase. +- **FlightId** Unique ID for the flight (test instance version). +- **ObjectId** The unique value for each Update Agent mode. +- **RebootRequired** Indicates reboot is required. +- **RelatedCV** The correlation vector value generated from the latest USO (Update Service Orchestrator) scan. +- **Result** The HResult of the event. +- **RevertResult** The result code returned for the Revert operation. +- **ScenarioId** The ID of the update scenario. +- **SessionId** The ID of the update attempt. +- **UpdateId** The ID of the update. + + +### Update360Telemetry.UpdateAgentCommit + +This event collects information regarding the commit phase of the new Unified Update Platform (UUP) update scenario, which is leveraged by both Mobile and Desktop. + +The following fields are available: + +- **ErrorCode** The error code returned for the current install phase. +- **FlightId** Unique ID for each flight. +- **ObjectId** Unique value for each Update Agent mode. +- **RelatedCV** Correlation vector value generated from the latest USO scan. +- **Result** Outcome of the install phase of the update. +- **ScenarioId** Indicates the update scenario. +- **SessionId** Unique value for each update attempt. +- **UpdateId** Unique ID for each update. + + +### Update360Telemetry.UpdateAgentDownloadRequest + +This event sends data for the download request phase of updating Windows via the new Unified Update Platform (UUP) scenario. Applicable to PC and Mobile. + +The following fields are available: + +- **DeletedCorruptFiles** Boolean indicating whether corrupt payload was deleted. +- **DownloadRequests** Number of times a download was retried. +- **ErrorCode** The error code returned for the current download request phase. +- **ExtensionName** Indicates whether the payload is related to Operating System content or a plugin. +- **FlightId** Unique ID for each flight. +- **InternalFailureResult** Indicates a non-fatal error from a plugin. +- **ObjectId** Unique value for each Update Agent mode (same concept as InstanceId for Setup360). +- **PackageCategoriesSkipped** Indicates package categories that were skipped, if applicable. +- **PackageCountOptional** Number of optional packages requested. +- **PackageCountRequired** Number of required packages requested. +- **PackageCountTotal** Total number of packages needed. +- **PackageCountTotalCanonical** Total number of canonical packages. +- **PackageCountTotalDiff** Total number of diff packages. +- **PackageCountTotalExpress** Total number of express packages. +- **PackageCountTotalPSFX** The total number of PSFX packages. +- **PackageExpressType** Type of express package. +- **PackageSizeCanonical** Size of canonical packages in bytes. +- **PackageSizeDiff** Size of diff packages in bytes. +- **PackageSizeExpress** Size of express packages in bytes. +- **PackageSizePSFX** The size of PSFX packages, in bytes. +- **RangeRequestState** Indicates the range request type used. +- **RelatedCV** Correlation vector value generated from the latest USO scan. +- **Result** Outcome of the download request phase of update. +- **SandboxTaggedForReserves** The sandbox for reserves. +- **ScenarioId** Indicates the update scenario. +- **SessionId** Unique value for each attempt (same value for initialize, download, install commit phases). +- **UpdateId** Unique ID for each update. + + +### Update360Telemetry.UpdateAgentExpand + +This event collects information regarding the expansion phase of the new Unified Update Platform (UUP) update scenario, which is leveraged by both Mobile and Desktop. + +The following fields are available: + +- **ElapsedTickCount** Time taken for expand phase. +- **EndFreeSpace** Free space after expand phase. +- **EndSandboxSize** Sandbox size after expand phase. +- **ErrorCode** The error code returned for the current install phase. +- **FlightId** Unique ID for each flight. +- **ObjectId** Unique value for each Update Agent mode. +- **RelatedCV** Correlation vector value generated from the latest USO scan. +- **ScenarioId** Indicates the update scenario. +- **SessionId** Unique value for each update attempt. +- **StartFreeSpace** Free space before expand phase. +- **StartSandboxSize** Sandbox size after expand phase. +- **UpdateId** Unique ID for each update. + + +### Update360Telemetry.UpdateAgentFellBackToCanonical + +This event collects information when express could not be used and we fall back to canonical during the new Unified Update Platform (UUP) update scenario, which is leveraged by both Mobile and Desktop. + +The following fields are available: + +- **FlightId** Unique ID for each flight. +- **ObjectId** Unique value for each Update Agent mode. +- **PackageCount** Number of packages that feel back to canonical. +- **PackageList** PackageIds which fell back to canonical. +- **RelatedCV** Correlation vector value generated from the latest USO scan. +- **ScenarioId** Indicates the update scenario. +- **SessionId** Unique value for each update attempt. +- **UpdateId** Unique ID for each update. + + +### Update360Telemetry.UpdateAgentInitialize + +This event sends data for the initialize phase of updating Windows via the new Unified Update Platform (UUP) scenario, which is applicable to both PCs and Mobile. + +The following fields are available: + +- **ErrorCode** The error code returned for the current install phase. +- **essionData** No content is currently available. +- **FlightId** Unique ID for each flight. +- **FlightMetadata** Contains the FlightId and the build being flighted. +- **ObjectId** Unique value for each Update Agent mode. +- **RelatedCV** Correlation vector value generated from the latest USO scan. +- **Result** Outcome of the install phase of the update. +- **ScenarioId** Indicates the update scenario. +- **SessionData** String containing instructions to update agent for processing FODs and DUICs (Null for other scenarios). +- **SessionId** Unique value for each update attempt. +- **UpdateId** Unique ID for each update. + + +### Update360Telemetry.UpdateAgentInstall + +This event sends data for the install phase of updating Windows. + +The following fields are available: + +- **ErrorCode** The error code returned for the current install phase. +- **ExtensionName** Indicates whether the payload is related to Operating System content or a plugin. +- **FlightId** Unique value for each Update Agent mode (same concept as InstanceId for Setup360). +- **InternalFailureResult** Indicates a non-fatal error from a plugin. +- **ObjectId** Correlation vector value generated from the latest USO scan. +- **RelatedCV** Correlation vector value generated from the latest USO scan. +- **Result** The result for the current install phase. +- **ScenarioId** Indicates the update scenario. +- **SessionId** Unique value for each update attempt. +- **UpdateId** Unique ID for each update. + + +### Update360Telemetry.UpdateAgentMerge + +The UpdateAgentMerge event sends data on the merge phase when updating Windows. + +The following fields are available: + +- **ErrorCode** The error code returned for the current merge phase. +- **FlightId** Unique ID for each flight. +- **MergeId** The unique ID to join two update sessions being merged. +- **ObjectId** Unique value for each Update Agent mode. +- **RelatedCV** Related correlation vector value. +- **Result** Outcome of the merge phase of the update. +- **ScenarioId** Indicates the update scenario. +- **SessionId** Unique value for each attempt. +- **UpdateId** Unique ID for each update. + + +### Update360Telemetry.UpdateAgentMitigationResult + +This event sends data indicating the result of each update agent mitigation. + +The following fields are available: + +- **Applicable** Indicates whether the mitigation is applicable for the current update. +- **CommandCount** The number of command operations in the mitigation entry. +- **CustomCount** The number of custom operations in the mitigation entry. +- **FileCount** The number of file operations in the mitigation entry. +- **FlightId** Unique identifier for each flight. +- **Index** The mitigation index of this particular mitigation. +- **MitigationScenario** The update scenario in which the mitigation was executed. +- **Name** The friendly name of the mitigation. +- **ObjectId** Unique value for each Update Agent mode. +- **OperationIndex** The mitigation operation index (in the event of a failure). +- **OperationName** The friendly name of the mitigation operation (in the event of failure). +- **RegistryCount** The number of registry operations in the mitigation entry. +- **RelatedCV** The correlation vector value generated from the latest USO scan. +- **Result** The HResult of this operation. +- **ScenarioId** The update agent scenario ID. +- **SessionId** Unique value for each update attempt. +- **TimeDiff** The amount of time spent performing the mitigation (in 100-nanosecond increments). +- **UpdateId** Unique ID for each Update. + + +### Update360Telemetry.UpdateAgentMitigationSummary + +This event sends a summary of all the update agent mitigations available for an this update. + +The following fields are available: + +- **Applicable** The count of mitigations that were applicable to the system and scenario. +- **Failed** The count of mitigations that failed. +- **FlightId** Unique identifier for each flight. +- **Friled** No content is currently available. +- **MitigationScenario** The update scenario in which the mitigations were attempted. +- **ObjectId** The unique value for each Update Agent mode. +- **RelatedCV** The correlation vector value generated from the latest USO scan. +- **Result** The HResult of this operation. +- **ScenarioId** The update agent scenario ID. +- **SessionId** Unique value for each update attempt. +- **TimeDiff** The amount of time spent performing all mitigations (in 100-nanosecond increments). +- **Total** Total number of mitigations that were available. +- **UpdateId** Unique ID for each update. + + +### Update360Telemetry.UpdateAgentModeStart + +This event sends data for the start of each mode during the process of updating Windows via the new Unified Update Platform (UUP) scenario. Applicable to both PCs and Mobile. + +The following fields are available: + +- **FlightId** Unique ID for each flight. +- **Mode** Indicates the mode that has started. +- **ObjectId** Unique value for each Update Agent mode. +- **RelatedCV** Correlation vector value generated from the latest USO scan. +- **ScenarioId** Indicates the update scenario. +- **SessionId** Unique value for each update attempt. +- **UpdateId** Unique ID for each update. +- **Version** Version of update + + +### Update360Telemetry.UpdateAgentOneSettings + +This event collects information regarding the post reboot phase of the new UUP (Unified Update Platform) update scenario; which is leveraged by both Mobile and Desktop. + +The following fields are available: + +- **Count** The count of applicable OneSettings for the device. +- **FlightId** Unique ID for the flight (test instance version). +- **Obj%ctId** No content is currently available. +- **ObjectId** The unique value for each Update Agent mode. +- **Parameters** The set of name value pair parameters sent to OneSettings to determine if there are any applicable OneSettings. +- **RelatedCV** The correlation vector value generated from the latest USO (Update Service Orchestrator) scan. +- **Result** The HResult of the event. +- **ScenarioId** The ID of the update scenario. +- **SessionId** The ID of the update attempt. +- **UpdateId** The ID of the update. +- **Values** The values sent back to the device, if applicable. + + +### Update360Telemetry.UpdateAgentPostRebootResult + +This event collects information for both Mobile and Desktop regarding the post reboot phase of the new Unified Update Platform (UUP) update scenario. + +The following fields are available: + +- **ErrorCode** The error code returned for the current post reboot phase. +- **FlightId** The specific ID of the Windows Insider build the device is getting. +- **ObjectId** Unique value for each Update Agent mode. +- **PostRebootResult** Indicates the Hresult. +- **RelatedCV** Correlation vector value generated from the latest USO scan. +- **ScenarioId** The scenario ID. Example: MobileUpdate, DesktopLanguagePack, DesktopFeatureOnDemand, or DesktopDriverUpdate. +- **SessionId** Unique value for each update attempt. +- **UpdateId** Unique ID for each update. + + +### Update360Telemetry.UpdateAgentReboot + +This event sends information indicating that a request has been sent to suspend an update. + +The following fields are available: + +- **ErrorCode** The error code returned for the current reboot. +- **FlightId** Unique ID for the flight (test instance version). +- **ObjectId** The unique value for each Update Agent mode. +- **RelatedCV** The correlation vector value generated from the latest USO (Update Service Orchestrator) scan. +- **Result** The HResult of the event. +- **ScenarioId** The ID of the update scenario. +- **SessionId** The ID of the update attempt. +- **UpdateId** The ID of the update. + + +### Update360Telemetry.UpdateAgentSetupBoxLaunch + +The UpdateAgent_SetupBoxLaunch event sends data for the launching of the setup box when updating Windows via the new Unified Update Platform (UUP) scenario. This event is only applicable to PCs. + +The following fields are available: + +- **ContainsExpressPackage** Indicates whether the download package is express. +- **FlightId** Unique ID for each flight. +- **FreeSpace** Free space on OS partition. +- **InstallCount** Number of install attempts using the same sandbox. +- **ObjectId** Unique value for each Update Agent mode. +- **Quiet** Indicates whether setup is running in quiet mode. +- **RelatedCV** Correlation vector value generated from the latest USO scan. +- **SandboxSize** Size of the sandbox. +- **ScenarioId** Indicates the update scenario. +- **SessionId** Unique value for each update attempt. +- **SetupMode** Mode of setup to be launched. +- **UpdateId** Unique ID for each Update. +- **UserSession** Indicates whether install was invoked by user actions. + + +## Update notification events + +### Microsoft.Windows.UpdateNotificationPipeline.UNPCampaignManagerHeartbeat + +This event is sent at the start of the CampaignManager event and is intended to be used as a heartbeat. + +The following fields are available: + +- **CampaignConfigVersion** Configuration version for the current campaign. +- **CampaignID** Currently campaign that is running on Update Notification Pipeline (UNP). +- **ConfigCatalogVersion** Current catalog version of UNP. +- **ContentVersion** Content version for the current campaign on UNP. +- **CV** Correlation vector. +- **DetectorVersion** Most recently run detector version for the current campaign on UNP. +- **GlobalEventCounter** Client-side counter that indicates the event ordering sent by the user. +- **PackageVersion** Current UNP package version. + + +## Upgrade events + +### FacilitatorTelemetry.DCATDownload + +This event indicates whether devices received additional or critical supplemental content during an OS Upgrade, to help keep Windows up-to-date and secure. + +The following fields are available: + +- **DownloadSize** Download size of payload. +- **ElapsedTime** Time taken to download payload. +- **MediaFallbackUsed** Used to determine if we used Media CompDBs to figure out package requirements for the upgrade. +- **ResultCode** Result returned by the Facilitator DCAT call. +- **Scenario** Dynamic update scenario (Image DU, or Setup DU). +- **Type** Type of package that was downloaded. +- **UpdateId** The ID of the update that was downloaded. + + +### FacilitatorTelemetry.DUDownload + +This event returns data about the download of supplemental packages critical to upgrading a device to the next version of Windows. + +The following fields are available: + +- **DownloadRequestAttributes** The attributes sent for download. +- **PackageCategoriesFailed** Lists the categories of packages that failed to download. +- **PackageCategoriesSkipped** Lists the categories of package downloads that were skipped. +- **ResultCode** The result of the event execution. +- **Scenario** Identifies the active Download scenario. +- **Url** The URL the download request was sent to. +- **Version** Identifies the version of Facilitator used. + + +### FacilitatorTelemetry.InitializeDU + +This event determines whether devices received additional or critical supplemental content during an OS upgrade. + +The following fields are available: + +- **DCATUrl** The Delivery Catalog (DCAT) URL we send the request to. +- **DownloadRequestAttributes** The attributes we send to DCAT. +- **ResultCode** The result returned from the initiation of Facilitator with the URL/attributes. +- **Scenario** Dynamic Update scenario (Image DU, or Setup DU). +- **Url** The Delivery Catalog (DCAT) URL we send the request to. +- **Version** Version of Facilitator. + + +### Setup360Telemetry.Downlevel + +This event sends data indicating that the device has started the downlevel phase of the upgrade, to help keep Windows up-to-date and secure. + +The following fields are available: + +- **ClientId** If using Windows Update, this will be the Windows Update client ID that is passed to Setup. In Media setup, the default value is Media360, but it can be overwritten by the caller to a unique value. +- **FlightData** Unique value that identifies the flight. +- **HostOSBuildNumber** The build number of the downlevel OS. +- **HostOsSkuName** The operating system edition which is running Setup360 instance (downlevel OS). +- **InstanceId** A unique GUID that identifies each instance of setuphost.exe. +- **ReportId** In the Windows Update scenario, this is the updateID that is passed to Setup. In media setup, this is the GUID for the install.wim. +- **Setup360Extended** More detailed information about phase/action when the potential failure occurred. +- **Setup360Mode** The phase of Setup360 (for example, Predownload, Install, Finalize, Rollback). +- **Setup360Result** The result of Setup360 (HRESULT used to diagnose errors). +- **Setup360Scenario** The Setup360 flow type (for example, Boot, Media, Update, MCT). +- **SetupVersionBuildNumber** The build number of Setup360 (build number of the target OS). +- **State** Exit state of given Setup360 run. Example: succeeded, failed, blocked, cancelled. +- **TestId** An ID that uniquely identifies a group of events. +- **WuId** This is the Windows Update Client ID. In the Windows Update scenario, this is the same as the clientId. + + +### Setup360Telemetry.Finalize + +This event sends data indicating that the device has started the phase of finalizing the upgrade, to help keep Windows up-to-date and secure. + +The following fields are available: + +- **ClientId** With Windows Update, this will be the Windows Update client ID that is passed to Setup. In Media setup, default value is Media360, but can be overwritten by the caller to a unique value. +- **FlightData** Unique value that identifies the flight. +- **HostOSBuildNumber** The build number of the previous OS. +- **HostOsSkuName** The OS edition which is running Setup360 instance (previous OS). +- **InstanceId** A unique GUID that identifies each instance of setuphost.exe +- **ReportId** With Windows Update, this is the updateID that is passed to Setup. In media setup, this is the GUID for the install.wim. +- **Setup360Extended** More detailed information about the phase/action when the potential failure occurred. +- **Setup360Mode** The phase of Setup360. Example: Predownload, Install, Finalize, Rollback. +- **Setup360Result** The result of Setup360. This is an HRESULT error code that is used to diagnose errors. +- **Setup360Scenario** The Setup360 flow type. Example: Boot, Media, Update, MCT. +- **SetupVersionBuildNumber** The build number of Setup360 (build number of target OS). +- **State** The exit state of a Setup360 run. Example: succeeded, failed, blocked, cancelled. +- **TestId** ID that uniquely identifies a group of events. +- **WuId** This is the Windows Update Client ID. With Windows Update, this is the same as the clientId. + + +### Setup360Telemetry.OsUninstall + +This event sends data regarding OS updates and upgrades from Windows 7, Windows 8, and Windows 10. Specifically, it indicates the outcome of an OS uninstall. + +The following fields are available: + +- **ClientId** For Windows Update, this will be the Windows Update client ID that is passed to Setup. In Media setup, default value is Media360, but can be overwritten by the caller to a unique value. +- **FlightData** Unique value that identifies the flight. +- **HostOSBuildNumber** The build number of the previous OS. +- **HostOsSkuName** The OS edition which is running the Setup360 instance (previous OS). +- **InstanceId** A unique GUID that identifies each instance of setuphost.exe. +- **ReportId** For Windows Update, this will be the Windows Update client ID that is passed to Setup. In Media setup, this is the GUID for the install.wim. +- **Setup360Extended** Detailed information about the phase or action when the potential failure occurred. +- **Setup360Mode** The phase of Setup360. Example: Predownload, Install, Finalize, Rollback. +- **Setup360Result** The result of Setup360. This is an HRESULT error code that is used to diagnose errors. +- **Setup360Scenario** The Setup360 flow type. Example: Boot, Media, Update, MCT +- **SetupVersionBuildNumber** The build number of Setup360 (build number of target OS). +- **State** Exit state of a Setup360 run. Example: succeeded, failed, blocked, cancelled. +- **TestId** ID that uniquely identifies a group of events. +- **WuId** Windows Update client ID. + + +### Setup360Telemetry.PostRebootInstall + +This event sends data indicating that the device has invoked the post reboot install phase of the upgrade, to help keep Windows up-to-date. + +The following fields are available: + +- **ClientId** With Windows Update, this is the Windows Update client ID that is passed to Setup. In Media setup, the default value is Media360, but can be overwritten by the caller to a unique value. +- **FlightData** Unique value that identifies the flight. +- **HostOSBuildNumber** The build number of the previous OS. +- **HostOsSkuName** The OS edition which is running Setup360 instance (previous OS). +- **InstanceId** A unique GUID that identifies each instance of setuphost.exe. +- **ReportId** With Windows Update, this is the updateID that is passed to Setup. In media setup, this is the GUID for the install.wim. +- **Setup360Extended** Extension of result - more granular information about phase/action when the potential failure happened +- **Setup360Mode** The phase of Setup360. Example: Predownload, Install, Finalize, Rollback +- **Setup360Result** The result of Setup360. This is an HRESULT error code that's used to diagnose errors. +- **Setup360Scenario** The Setup360 flow type. Example: Boot, Media, Update, MCT +- **SetupVersionBuildNumber** The build number of Setup360 (build number of target OS). +- **State** The exit state of a Setup360 run. Example: succeeded, failed, blocked, cancelled +- **TestId** A string to uniquely identify a group of events. +- **WuId** This is the Windows Update Client ID. With Windows Update, this is the same as ClientId. + + +### Setup360Telemetry.PreDownloadQuiet + +This event sends data indicating that the device has invoked the predownload quiet phase of the upgrade, to help keep Windows up to date. + +The following fields are available: + +- **ClientId** Using Windows Update, this will be the Windows Update client ID that is passed to Setup. In Media setup, default value is Media360, but can be overwritten by the caller to a unique value. +- **FlightData** Unique value that identifies the flight. +- **HostOSBuildNumber** The build number of the previous OS. +- **HostOsSkuName** The OS edition which is running Setup360 instance (previous operating system). +- **InstanceId** A unique GUID that identifies each instance of setuphost.exe. +- **ReportId** Using Windows Update, this is the updateID that is passed to Setup. In media setup, this is the GUID for the install.wim. +- **Setup360Extended** Detailed information about the phase/action when the potential failure occurred. +- **Setup360Mode** The phase of Setup360. Example: Predownload, Install, Finalize, Rollback. +- **Setup360Result** The result of Setup360. This is an HRESULT error code that is used to diagnose errors. +- **Setup360Scenario** The Setup360 flow type. Example: Boot, Media, Update, MCT. +- **SetupVersionBuildNumber** The build number of Setup360 (build number of target OS). +- **State** The exit state of a Setup360 run. Example: succeeded, failed, blocked, canceled. +- **TestId** ID that uniquely identifies a group of events. +- **WuId** This is the Windows Update Client ID. Using Windows Update, this is the same as the clientId. + + +### Setup360Telemetry.PreDownloadUX + +This event sends data regarding OS Updates and Upgrades from Windows 7.X, Windows 8.X, Windows 10 and RS, to help keep Windows up-to-date and secure. Specifically, it indicates the outcome of the PredownloadUX portion of the update process. + +The following fields are available: + +- **ClientId** For Windows Update, this will be the Windows Update client ID that is passed to Setup. In Media setup, default value is Media360, but can be overwritten by the caller to a unique value. +- **FlightData** In the WU scenario, this will be the WU client ID that is passed to Setup. In Media setup, default value is Media360, but can be overwritten by the caller to a unique value. +- **HostOSBuildNumber** The build number of the previous operating system. +- **HostOsSkuName** The OS edition which is running the Setup360 instance (previous operating system). +- **InstanceId** Unique GUID that identifies each instance of setuphost.exe. +- **ReportId** For Windows Update, this will be the Windows Update client ID that is passed to Setup. In Media setup, this is the GUID for the install.wim. +- **Setup360Extended** Detailed information about the phase/action when the potential failure occurred. +- **Setup360Mode** The phase of Setup360. Example: Predownload, Install, Finalize, Rollback. +- **Setup360Result** The result of Setup360. This is an HRESULT error code that can be used to diagnose errors. +- **Setup360Scenario** The Setup360 flow type. Example: Boot, Media, Update, MCT. +- **SetupVersionBuildNumber** The build number of Setup360 (build number of the target OS). +- **State** The exit state of the Setup360 run. Example: succeeded, failed, blocked, cancelled. +- **TestId** ID that uniquely identifies a group of events. +- **WuId** Windows Update client ID. + + +### Setup360Telemetry.PreInstallQuiet + +This event sends data indicating that the device has invoked the preinstall quiet phase of the upgrade, to help keep Windows up-to-date. + +The following fields are available: + +- **ClientId** With Windows Update, this will be the Windows Update client ID that is passed to Setup. In Media setup, default value is Media360, but can be overwritten by the caller to a unique value. +- **FlightData** Unique value that identifies the flight. +- **HostOSBuildNumber** The build number of the previous OS. +- **HostOsSkuName** The OS edition which is running Setup360 instance (previous OS). +- **InstanceId** A unique GUID that identifies each instance of setuphost.exe +- **ReportId** With Windows Update, this is the updateID that is passed to Setup. In media setup, this is the GUID for the install.wim. +- **Setup360Extended** Detailed information about the phase/action when the potential failure occurred. +- **Setup360Mode** The phase of Setup360. Example: Predownload, Install, Finalize, Rollback. +- **Setup360Result** The result of Setup360. This is an HRESULT error code that can be used to diagnose errors. +- **Setup360Scenario** Setup360 flow type (Boot, Media, Update, MCT). +- **SetupVersionBuildNumber** The build number of Setup360 (build number of target OS). +- **State** The exit state of a Setup360 run. Example: succeeded, failed, blocked, cancelled. +- **TestId** A string to uniquely identify a group of events. +- **WuId** This is the Windows Update Client ID. With Windows Update, this is the same as the clientId. + + +### Setup360Telemetry.PreInstallUX + +This event sends data regarding OS updates and upgrades from Windows 7, Windows 8, and Windows 10, to help keep Windows up-to-date. Specifically, it indicates the outcome of the PreinstallUX portion of the update process. + +The following fields are available: + +- **ClientId** For Windows Update, this will be the Windows Update client ID that is passed to Setup. In Media setup, default value is Media360, but can be overwritten by the caller to a unique value. +- **FlightData** Unique value that identifies the flight. +- **HostOSBuildNumber** The build number of the previous OS. +- **HostOsSkuName** The OS edition which is running the Setup360 instance (previous OS). +- **InstanceId** A unique GUID that identifies each instance of setuphost.exe. +- **ReportId** For Windows Update, this will be the Windows Update client ID that is passed to Setup. In Media setup, this is the GUID for the install.wim. +- **Setup360Extended** Detailed information about the phase/action when the potential failure occurred. +- **Setup360Mode** The phase of Setup360. Example: Predownload, Install, Finalize, Rollback. +- **Setup360Result** The result of Setup360. This is an HRESULT error code that is used to diagnose errors. +- **Setup360Scenario** The Setup360 flow type, Example: Boot, Media, Update, MCT. +- **SetupVersionBuildNumber** The build number of Setup360 (build number of target OS). +- **State** The exit state of a Setup360 run. Example: succeeded, failed, blocked, cancelled. +- **TestId** A string to uniquely identify a group of events. +- **WuId** Windows Update client ID. + + +### Setup360Telemetry.Setup360 + +This event sends data about OS deployment scenarios, to help keep Windows up-to-date. + +The following fields are available: + +- **ClientId** Retrieves the upgrade ID. In the Windows Update scenario, this will be the Windows Update client ID. In Media setup, default value is Media360, but can be overwritten by the caller to a unique value. +- **FieldName** Retrieves the data point. +- **FlightData** Specifies a unique identifier for each group of Windows Insider builds. +- **InstanãeId** No content is currently available. +- **InstanceId** Retrieves a unique identifier for each instance of a setup session. +- **ReportId** Retrieves the report ID. +- **ScenarioId** Retrieves the deployment scenario. +- **value** No content is currently available. +- **Value** Retrieves the value associated with the corresponding FieldName. + + +### Setup360Telemetry.Setup360DynamicUpdate + +This event helps determine whether the device received supplemental content during an operating system upgrade, to help keep Windows up-to-date. + +The following fields are available: + +- **FlightData** Specifies a unique identifier for each group of Windows Insider builds. +- **InstanceId** Retrieves a unique identifier for each instance of a setup session. +- **Operation** Facilitator’s last known operation (scan, download, etc.). +- **ReportId** ID for tying together events stream side. +- **ResultCode** Result returned for the entire setup operation. +- **Scenario** Dynamic Update scenario (Image DU, or Setup DU). +- **ScenarioId** Identifies the update scenario. +- **TargetBranch** Branch of the target OS. +- **TargetBuild** Build of the target OS. + + +### Setup360Telemetry.Setup360MitigationResult + +This event sends data indicating the result of each setup mitigation. + +The following fields are available: + +- **Applicable** TRUE if the mitigation is applicable for the current update. +- **ClientId** In the Windows Update scenario, this is the client ID passed to Setup. In Media setup, default value is Media360, but can be overwritten by the caller to a unique value. +- **CommandCount** The number of command operations in the mitigation entry. +- **CustomCount** The number of custom operations in the mitigation entry. +- **FileCount** The number of file operations in the mitigation entry. +- **FlightData** The unique identifier for each flight (test release). +- **Index** The mitigation index of this particular mitigation. +- **InstanceId** The GUID (Globally Unique ID) that identifies each instance of SetupHost.EXE. +- **MitigationScenario** The update scenario in which the mitigation was executed. +- **Name** The friendly (descriptive) name of the mitigation. +- **OperationIndex** The mitigation operation index (in the event of a failure). +- **OperationName** The friendly (descriptive) name of the mitigation operation (in the event of failure). +- **RegistryCount** The number of registry operations in the mitigation entry. +- **ReportId** In the Windows Update scenario, the Update ID that is passed to Setup. In media setup, this is the GUID for the INSTALL.WIM. +- **Result** HResult of this operation. +- **ScenarioId** Setup360 flow type. +- **TimeDiff** The amount of time spent performing the mitigation (in 100-nanosecond increments). + + +### Setup360Telemetry.Setup360MitigationSummary + +This event sends a summary of all the setup mitigations available for this update. + +The following fields are available: + +- **Applicable** The count of mitigations that were applicable to the system and scenario. +- **ClientId** The Windows Update client ID passed to Setup. +- **Failed** The count of mitigations that failed. +- **FlightData** The unique identifier for each flight (test release). +- **InstanceId** The GUID (Globally Unique ID) that identifies each instance of SetupHost.EXE. +- **MitigationScenario** The update scenario in which the mitigations were attempted. +- **ReportId** In the Windows Update scenario, the Update ID that is passed to Setup. In media setup, this is the GUID for the INSTALL.WIM. +- **Result** HResult of this operation. +- **ScenarioId** Setup360 flow type. +- **TimeDiff** The amount of time spent performing the mitigation (in 100-nanosecond increments). +- **Total** The total number of mitigations that were available. + + +### Setup360Telemetry.Setup360OneSettings + +This event collects information regarding the post reboot phase of the new UUP (Unified Update Platform) update scenario; which is leveraged by both Mobile and Desktop. + +The following fields are available: + +- **ClientId** The Windows Update client ID passed to Setup. +- **Count** The count of applicable OneSettings for the device. +- **FlightData** The ID for the flight (test instance version). +- **InstanceId** The GUID (Globally-Unique ID) that identifies each instance of setuphost.exe. +- **Parameters** The set of name value pair parameters sent to OneSettings to determine if there are any applicable OneSettings. +- **ReportId** The Update ID passed to Setup. +- **Result** The HResult of the event error. +- **ScenarioId** The update scenario ID. +- **Values** Values sent back to the device, if applicable. + + +### Setup360Telemetry.UnexpectedEvent + +This event sends data indicating that the device has invoked the unexpected event phase of the upgrade, to help keep Windows up to date. + +The following fields are available: + +- **ClientId** With Windows Update, this will be the Windows Update client ID that is passed to Setup. In Media setup, default value is Media360, but can be overwritten by the caller to a unique value. +- **FlightData** Unique value that identifies the flight. +- **HostOSBuildNumber** The build number of the previous OS. +- **HostOsSkuName** The OS edition which is running Setup360 instance (previous OS). +- **InstanceId** A unique GUID that identifies each instance of setuphost.exe +- **o-Ste** No content is currently available. +- **ReportId** With Windows Update, this is the updateID that is passed to Setup. In media setup, this is the GUID for the install.wim. +- **Setup360Extended** Detailed information about the phase/action when the potential failure occurred. +- **Setup360Mode** The phase of Setup360. Example: Predownload, Install, Finalize, Rollback. +- **Setup360Result** The result of Setup360. This is an HRESULT error code that can be used used to diagnose errors. +- **Setup360Scenario** The Setup360 flow type. Example: Boot, Media, Update, MCT. +- **SetupVersionBuildNumber** The build number of Setup360 (build number of target OS). +- **State** The exit state of a Setup360 run. Example: succeeded, failed, blocked, cancelled. +- **TestId** A string to uniquely identify a group of events. +- **WuId** This is the Windows Update Client ID. With Windows Update, this is the same as the clientId. + + +## Windows as a Service diagnostic events + +### Microsoft.Windows.WaaSMedic.SummaryEvent + +Result of the WaaSMedic operation. + +The following fields are available: + +- **callerApplication** The name of the calling application. +- **capsuleCount** The number of Sediment Pack capsules. +- **capsuleFailureCount** The number of capsule failures. +- **detectionSummary** Result of each applicable detection that was run. +- **featureAssessmentImpact** WaaS Assessment impact for feature updates. +- **hrEngineBlockReason** Indicates the reason for stopping WaaSMedic. +- **hrEngineResult** Error code from the engine operation. +- **hrLastSandboxError** The last error sent by the WaaSMedic sandbox. +- **initSummary** Summary data of the initialization method. +- **insufficientSessions** Device not eligible for diagnostics. +- **isInteractiveMode** The user started a run of WaaSMedic. +- **isManaged** Device is managed for updates. +- **isWUConnected** Device is connected to Windows Update. +- **noMoreActions** No more applicable diagnostics. +- **pluginFailureCount** The number of plugins that have failed. +- **pluginsCount** The number of plugins. +- **qualityAssessmentImpact** WaaS Assessment impact for quality updates. +- **remediationSummary** Result of each operation performed on a device to fix an invalid state or configuration that's preventing the device from getting updates. For example, if Windows Update service is turned off, the fix is to turn the it back on. +- **usingBackupFeatureAssessment** Relying on backup feature assessment. +- **usingBackupQualityAssessment** Relying on backup quality assessment. +- **usingCachedFeatureAssessment** WaaS Medic run did not get OS build age from the network on the previous run. +- **usingCachedQualityAssessment** WaaS Medic run did not get OS revision age from the network on the previous run. +- **versionbtring** No content is currently available. +- **versionString** Version of the WaaSMedic engine. +- **waasMedicRunMode** Indicates whether this was a background regular run of the medic or whether it was triggered by a user launching Windows Update Troubleshooter. + + +## Windows Error Reporting events + +### Microsoft.Windows.WERVertical.OSCrash + +This event sends binary data from the collected dump file wheneveer a bug check occurs, to help keep Windows up to date. The is the OneCore version of this event. + +The following fields are available: + +- **BootId** Uint32 identifying the boot number for this device. +- **BugCheckCode** Uint64 "bugcheck code" that identifies a proximate cause of the bug check. +- **BugCheckPar%meter2** No content is currently available. +- **BugCheckParameter1** Uint64 parameter providing additional information. +- **BugCheckParameter2** Uint64 parameter providing additional information. +- **BugCheckParameter3** Uint64 parameter providing additional information. +- **BugCheckParameter4** Uint64 parameter providing additional information. +- **DumpFileAttributes** Codes that identify the type of data contained in the dump file +- **DumpFileSize** Size of the dump file +- **IsValidDumpFile** True if the dump file is valid for the debugger, false otherwise +- **ReportId** WER Report Id associated with this bug check (used for finding the corresponding report archive in Watson). + + +## Windows Error Reporting MTT events + +### Microsoft.Windows.WER.MTT.Denominator + +This event provides a denominator to calculate MTTF (mean-time-to-failure) for crashes and other errors, to help keep Windows up to date. + +The following fields are available: + +- **DPRange** Maximum mean value range. +- **DPValue** Randomized bit value (0 or 1) that can be reconstituted over a large population to estimate the mean. +- **Value** Standard UTC emitted DP value structure See [Value](#value). + + +### Value + +This event returns data about Mean Time to Failure (MTTF) for Windows devices. It is the primary means of estimating reliability problems in Basic Diagnostic reporting with very strong privacy guarantees. Since Basic Diagnostic reporting does not include system up-time, and since that information is important to ensuring the safe and stable operation of Windows, the data provided by this event provides that data in a manner which does not threaten a user’s privacy. + +The following fields are available: + +- **Algorithm** The algorithm used to preserve privacy. +- **DPRange** The upper bound of the range being measured. +- **DPValue** The randomized response returned by the client. +- **Epsilon** The level of privacy to be applied. +- **HistType** The histogram type if the algorithm is a histogram algorithm. +- **PertProb** The probability the entry will be Perturbed if the algorithm chosen is “heavy-hitters”. + + +## Windows Store events + +### Microsoft.Windows.Store.StoreActivating + +This event sends tracking data about when the Store app activation via protocol URI is in progress, to help keep Windows up to date. + + + +### Microsoft.Windows.StoreAgent.Telemetry.AbortedInstallation + +This event is sent when an installation or update is canceled by a user or the system and is used to help keep Windows Apps up to date and secure. + +The following fields are available: + +- **AggregatedPackageFullNames** The names of all packages to be downloaded and installed. +- **AggregatedPackageFullNcmes** No content is currently available. +- **AttemptNumber** Number of retry attempts before it was canceled. +- **BundleId** The Item Bundle ID. +- **Bundlele** No content is currently available. +- **CategoryId** The Item Category ID. +- **Categoryle** No content is currently available. +- **ClientAppId** The identity of the app that initiated this operation. +- **ClientApple** No content is currently available. +- **HResult** The result code of the last action performed before this operation. +- **IsBundle** Is this a bundle? +- **IsInteractive** Was this requested by a user? +- **IsMandatory** Was this a mandatory update? +- **IsRemediation** Was this a remediation install? +- **IsRestore** Is this automatically restoring a previously acquired product? +- **IsUpdate** Flag indicating if this is an update. +- **ParentBundleId** The product ID of the parent (if this product is part of a bundle). +- **ParentBundlele** No content is currently available. +- **PFN** The product family name of the product being installed. +- **Producele** No content is currently available. +- **ProductId** The identity of the package or packages being installed. +- **S{stemAttemptNumber** No content is currently available. +- **SystemAttemptNumber** The total number of automatic attempts at installation before it was canceled. +- **UserAttemptNumber** The total number of user attempts at installation before it was canceled. +- **WUContentId** The Windows Update content ID. + + +### Microsoft.Windows.StoreAgent.Telemetry.BeginGetInstalledContentIds + +This event is sent when an inventory of the apps installed is started to determine whether updates for those apps are available. It's used to help keep Windows up-to-date and secure. + + + +### Microsoft.Windows.StoreAgent.Telemetry.BeginUpdateMetadataPrepare + +This event is sent when the Store Agent cache is refreshed with any available package updates. It's used to help keep Windows up-to-date and secure. + + + +### Microsoft.Windows.StoreAgent.Telemetry.CancelInstallation + +This event is sent when an app update or installation is canceled while in interactive mode. This can be canceled by the user or the system. It's used to help keep Windows up-to-date and secure. + +The following fields are available: + +- **AggregatedPackageFullNames** The names of all package or packages to be downloaded and installed. +- **AttemptNumber** Total number of installation attempts. +- **BundleId** The identity of the Windows Insider build that is associated with this product. +- **CategoryId** The identity of the package or packages being installed. +- **ClientAppId** The identity of the app that initiated this operation. +- **IsBundle** Is this a bundle? +- **IsInteractive** Was this requested by a user? +- **IsMandatory** Is this a mandatory update? +- **IsRemediation** Is this repairing a previous installation? +- **IsRestore** Is this an automatic restore of a previously acquired product? +- **IsUpdate** Is this a product update? +- **ParentBundleId** The product ID of the parent (if this product is part of a bundle). +- **PFN** The name of all packages to be downloaded and installed. +- **PreviousHResult** The previous HResult code. +- **PreviousInstallState** Previous installation state before it was canceled. +- **ProductId** The name of the package or packages requested for installation. +- **RelatedCV** Correlation Vector of a previous performed action on this product. +- **SystemAttemptNumber** Total number of automatic attempts to install before it was canceled. +- **UserAttemptNumber** Total number of user attempts to install before it was canceled. +- **WUContentId** The Windows Update content ID. + + +### Microsoft.Windows.StoreAgent.Telemetry.CompleteInstallOperationRequest + +This event is sent at the end of app installations or updates to help keep Windows up-to-date and secure. + +The following fields are available: + +- **CatalogId** The Store Product ID of the app being installed. +- **HResult** HResult code of the action being performed. +- **IsBundle** Is this a bundle? +- **PackageFamilyName** The name of the package being installed. +- **ProductId** The Store Product ID of the product being installed. +- **SkuId** Specific edition of the item being installed. + + +### Microsoft.Windows.StoreAgent.Telemetry.EndAcquireLicense + +This event is sent after the license is acquired when a product is being installed. It's used to help keep Windows up-to-date and secure. + +The following fields are available: + +- **AggregatedPackageFullNaies** No content is currently available. +- **AggregatedpackageFullNames** No content is currently available. +- **AggregatedPackageFullNames** Includes a set of package full names for each app that is part of an atomic set. +- **AttemptNumber** The total number of attempts to acquire this product. +- **CategoryId** The identity of the package or packages being installed. +- **ClientAppId** The identity of the app that initiated this operation. +- **HResult** HResult code to show the result of the operation (success/failure). +- **IsBundle** Is this a bundle? +- **IsInteractive** Did the user initiate the installation? +- **IsMandatory** Is this a mandatory update? +- **IsRemediation** Is this repairing a previous installation? +- **IsRestore** Is this happening after a device restore? +- **IsUp`ate** No content is currently available. +- **IsUpdate** Is this an update? +- **ParentBuneleId** No content is currently available. +- **PFN** Product Family Name of the product being installed. +- **Produc|Id** No content is currently available. +- **productId** No content is currently available. +- **ProductId** The Store Product ID for the product being installed. +- **SystemAttemptNueber** No content is currently available. +- **SystemAttemptNumber** The number of attempts by the system to acquire this product. +- **UserAttemptNumber** The number of attempts by the user to acquire this product +- **UserCttemptNumber** No content is currently available. +- **WUContentId** The Windows Update content ID. + + +### Microsoft.Windows.StoreAgent.Telemetry.EndDownload + +This event is sent after an app is downloaded to help keep Windows up-to-date and secure. + +The following fields are available: + +- **AggregatedPackageFullLames** No content is currently available. +- **AggregatedPackageFullNaðes** No content is currently available. +- **AggregatedPackageFullNames** The name of all packages to be downloaded and installed. +- **AsUpdate** No content is currently available. +- **AttemptNumber** Number of retry attempts before it was canceled. +- **BundleId** The identity of the Windows Insider build associated with this product. +- **CategoryId** The identity of the package or packages being installed. +- **CategoryIf** No content is currently available. +- **ClientAppId** The identity of the app that initiated this operation. +- **DownloadSize** The total size of the download. +- **ExtendedHResult** Any extended HResult error codes. +- **HResult** The result code of the last action performed. +- **IsBundle** Is this a bundle? +- **IsInteractive** Is this initiated by the user? +- **IsMandatory** Is this a mandatory installation? +- **IsRemediation** Is this repairing a previous installation? +- **IsRestore** Is this a restore of a previously acquired product? +- **IsUpdate** Is this an update? +- **ParentBundleId** The parent bundle ID (if it's part of a bundle). +- **PFN** The Product Family Name of the app being download. +- **ProductId** The Store Product ID for the product being installed. +- **SystemAttemptNumber** The number of attempts by the system to download. +- **UserAttemptNum`er** No content is currently available. +- **UserAttemptNumber** The number of attempts by the user to download. +- **UserCttemptNumber** No content is currently available. +- **WUContentId** The Windows Update content ID. + + +### Microsoft.Windows.StoreAgent.Telemetry.EndFrameworkUpdate + +This event is sent when an app update requires an updated Framework package and the process starts to download it. It is used to help keep Windows up-to-date and secure. + +The following fields are available: + +- **HResult** The result code of the last action performed before this operation. + + +### Microsoft.Windows.StoreAgent.Telemetry.EndGetInstalledContentIds + +This event is sent after sending the inventory of the products installed to determine whether updates for those products are available. It's used to help keep Windows up-to-date and secure. + +The following fields are available: + +- **HResult** The result code of the last action performed before this operation. + + +### Microsoft.Windows.StoreAgent.Telemetry.EndInstall + +This event is sent after a product has been installed to help keep Windows up-to-date and secure. + +The following fields are available: + +- **__TlgCÖ__** No content is currently available. +- **AggregatedPackageFullNames** The names of all packages to be downloaded and installed. +- **AttemptNumber** The number of retry attempts before it was canceled. +- **BundleId** The identity of the build associated with this product. +- **CategoryId** The identity of the package or packages being installed. +- **ClientAppId** The identity of the app that initiated this operation. +- **ExtendedHResult** The extended HResult error code. +- **HResult** The result code of the last action performed. +- **IsBundle** Is this a bundle? +- **IsInteractive** Is this an interactive installation? +- **IsInteragtive** No content is currently available. +- **IsMandatory** Is this a mandatory installation? +- **IsRemediation** Is this repairing a previous installation? +- **IsRestore** Is this automatically restoring a previously acquired product? +- **IsRestorg** No content is currently available. +- **IsUpdate** Is this an update? +- **KsBundle** No content is currently available. +- **ParentBundleId** The product ID of the parent (if this product is part of a bundle). +- **PFN** Product Family Name of the product being installed. +- **ProductId** The Store Product ID for the product being installed. +- **SystemAttemptNumber** The total number of system attempts. +- **UserAttemptNumber** The total number of user attempts. +- **WUContentId** The Windows Update content ID. + + +### Microsoft.Windows.StoreAgent.Telemetry.EndScanForUpdates + +This event is sent after a scan for product updates to determine if there are packages to install. It's used to help keep Windows up-to-date and secure. + +The following fields are available: + +- **ClientAppId** The identity of the app that initiated this operation. +- **HResult** The result code of the last action performed. +- **IsApplicability** Is this request to only check if there are any applicable packages to install? +- **IsInteractive** Is this user requested? +- **IsOnline** Is the request doing an online check? + + +### Microsoft.Windows.StoreAgent.Telemetry.EndSearchUpdatePackages + +This event is sent after searching for update packages to install. It is used to help keep Windows up-to-date and secure. + +The following fields are available: + +- **AggregatedPackageFullNames** The names of all packages to be downloaded and installed. +- **AttemptNumber** The total number of retry attempts before it was canceled. +- **BundleId** The identity of the build associated with this product. +- **CategoryId** The identity of the package or packages being installed. +- **ClientAppId** The identity of the app that initiated this operation. +- **HResult** The result code of the last action performed. +- **IsBundle** Is this a bundle? +- **IsInteractive** Is this user requested? +- **IsMandatory** Is this a mandatory update? +- **IsRemediation** Is this repairing a previous installation? +- **IsRestore** Is this restoring previously acquired content? +- **IsUpdate** Is this an update? +- **ParentBundleId** The product ID of the parent (if this product is part of a bundle). +- **PFN** The name of the package or packages requested for install. +- **ProductId** The Store Product ID for the product being installed. +- **SystemAttemptNumber** The total number of system attempts. +- **UserAttemptNumber** The total number of user attempts. +- **WUContentId** The Windows Update content ID. + + +### Microsoft.Windows.StoreAgent.Telemetry.EndStageUserData + +This event is sent after restoring user data (if any) that needs to be restored following a product install. It is used to keep Windows up-to-date and secure. + +The following fields are available: + +- **AggregatedPackageFullNames** The name of all packages to be downloaded and installed. +- **AttemptNumber** The total number of retry attempts before it was canceled. +- **BundleId** The identity of the build associated with this product. +- **CategoryId** The identity of the package or packages being installed. +- **ClientAppId** The identity of the app that initiated this operation. +- **HResult** The result code of the last action performed. +- **IsBundle** Is this a bundle? +- **IsInteractive** Is this user requested? +- **IsMandatory** Is this a mandatory update? +- **IsRemediation** Is this repairing a previous installation? +- **IsRestore** Is this restoring previously acquired content? +- **IsUpdate** Is this an update? +- **ParentBundleId** The product ID of the parent (if this product is part of a bundle). +- **PFN** The name of the package or packages requested for install. +- **ProductId** The Store Product ID for the product being installed. +- **SystemAttemptNumber** The total number of system attempts. +- **UserAttemptNumber** The total number of system attempts. +- **WUContentId** The Windows Update content ID. + + +### Microsoft.Windows.StoreAgent.Telemetry.EndUpdateMetadataPrepare + +This event is sent after a scan for available app updates to help keep Windows up-to-date and secure. + +The following fields are available: + +- **HResult** The result code of the last action performed. + + +### Microsoft.Windows.StoreAgent.Telemetry.FulfillmentComplete + +This event is sent at the end of an app install or update to help keep Windows up-to-date and secure. + +The following fields are available: + +- **CatalogId** The name of the product catalog from which this app was chosen. +- **CatanogId** No content is currently available. +- **CatdlogId** No content is currently available. +- **FailedRetry** Indicates whether the installation or update retry was successful. +- **HResult** The HResult code of the operation. +- **JResult** No content is currently available. +- **PFN** The Package Family Name of the app that is being installed or updated. +- **Producele** No content is currently available. +- **ProductId** The product ID of the app that is being updated or installed. + + +### Microsoft.Windows.StoreAgent.Telemetry.FulfillmentInitiate + +This event is sent at the beginning of an app install or update to help keep Windows up-to-date and secure. + +The following fields are available: + +- **CatalogId** The name of the product catalog from which this app was chosen. +- **FulfillmentPluginId** The ID of the plugin needed to install the package type of the product. +- **PFN** The Package Family Name of the app that is being installed or updated. +- **PluginTelemetryData** Diagnostic information specific to the package-type plug-in. +- **ProductId** The product ID of the app that is being updated or installed. + + +### Microsoft.Windows.StoreAgent.Telemetry.InstallOperationRequest + +This event is sent when a product install or update is initiated, to help keep Windows up-to-date and secure. + +The following fields are available: + +- **BundleId** The identity of the build associated with this product. +- **CatalogId** If this product is from a private catalog, the Store Product ID for the product being installed. +- **ProductId** The Store Product ID for the product being installed. +- **SkuId** Specific edition ID being installed. +- **VolumePath** The disk path of the installation. + + +### Microsoft.Windows.StoreAgent.Telemetry.PauseInstallation + +This event is sent when a product install or update is paused (either by a user or the system), to help keep Windows up-to-date and secure. + +The following fields are available: + +- **AggregatedPackageFullNames** The names of all packages to be downloaded and installed. +- **AttemptNumber** The total number of retry attempts before it was canceled. +- **BundleId** The identity of the build associated with this product. +- **CategoryId** The identity of the package or packages being installed. +- **ClientAppId** The identity of the app that initiated this operation. +- **IsBundle** Is this a bundle? +- **IsInteractive** Is this user requested? +- **IsMandatory** Is this a mandatory update? +- **IsRemediation** Is this repairing a previous installation? +- **IsRestore** Is this restoring previously acquired content? +- **IsUpdate** Is this an update? +- **ParentBundleId** The product ID of the parent (if this product is part of a bundle). +- **PFN** The Product Full Name. +- **PreviousHResult** The result code of the last action performed before this operation. +- **PreviousInstallState** Previous state before the installation or update was paused. +- **ProductId** The Store Product ID for the product being installed. +- **RelatedCV** Correlation Vector of a previous performed action on this product. +- **SystemAttemptNumber** The total number of system attempts. +- **UserAttemptNumber** The total number of user attempts. +- **WUContentId** The Windows Update content ID. + + +### Microsoft.Windows.StoreAgent.Telemetry.ResumeInstallation + +This event is sent when a product install or update is resumed (either by a user or the system), to help keep Windows up-to-date and secure. + +The following fields are available: + +- **AggregatedPackageFullNames** The names of all packages to be downloaded and installed. +- **AttemptNumber** The number of retry attempts before it was canceled. +- **BundleId** The identity of the build associated with this product. +- **categoryId** No content is currently available. +- **CategoryId** The identity of the package or packages being installed. +- **ClientAppId** The identity of the app that initiated this operation. +- **HResult** The result code of the last action performed before this operation. +- **IsBundle** Is this a bundle? +- **IsInteractive** Is this user requested? +- **IsMandatory** Is this a mandatory update? +- **IsRemediation** Is this repairing a previous installation? +- **IsRestore** Is this restoring previously acquired content? +- **IsUpdate** Is this an update? +- **IsUserRetry** Did the user initiate the retry? +- **ParentBundleId** The product ID of the parent (if this product is part of a bundle). +- **PFN** The name of the package or packages requested for install. +- **PreviousHResult** The previous HResult error code. +- **PreviousInstallState** Previous state before the installation was paused. +- **ProductId** The Store Product ID for the product being installed. +- **RelatedCV** Correlation Vector for the original install before it was resumed. +- **ResumeClientId** The ID of the app that initiated the resume operation. +- **SystemAttemptNumber** The total number of system attempts. +- **UserAttemptNumber** The total number of user attempts. +- **WUContentId** The Windows Update content ID. + + +### Microsoft.Windows.StoreAgent.Telemetry.ResumeOperationRequest + +This event is sent when a product install or update is resumed by a user or on installation retries, to help keep Windows up-to-date and secure. + +The following fields are available: + +- **ProductId** The Store Product ID for the product being installed. + + +### Microsoft.Windows.StoreAgent.Telemetry.SearchForUpdateOperationRequest + +This event is sent when searching for update packages to install, to help keep Windows up-to-date and secure. + +The following fields are available: + +- **CatalogId** The Store Catalog ID for the product being installed. +- **ProductId** The Store Product ID for the product being installed. +- **SkuId** Specfic edition of the app being updated. + + +### Microsoft.Windows.StoreAgent.Telemetry.UpdateAppOperationRequest + +This event occurs when an update is requested for an app, to help keep Windows up-to-date and secure. + +The following fields are available: + +- **PFamN** The name of the app that is requested for update. + + +## Windows System Kit events + +### Microsoft.Windows.Kits.WSK.WskImageCreate + +This event sends simple Product and Service usage data when a user is using the Windows System Kit to create new OS “images”. The data includes the version of the Windows System Kit and the state of the event and is used to help investigate “image” creation failures. + +The following fields are available: + +- **Phase** The image creation phase. Values are “Start” or “End”. +- **WskVersion** The version of the Windows System Kit being used. + + +### Microsoft.Windows.Kits.WSK.WskImageCustomization + +This event sends simple Product and Service usage data when a user is using the Windows System Kit to create/modify configuration files allowing the customization of a new OS image with Apps or Drivers. The data includes the version of the Windows System Kit, the state of the event, the customization type (drivers or apps) and the mode (new or updating) and is used to help investigate configuration file creation failures. + +The following fields are available: + +- **CustomizationMode** Indicates the mode of the customization (new or updating). +- **CustomizationType** Indicates the type of customization (drivers or apps). +- **Mode** The mode of update to image configuration files. Values are “New” or “Update”. +- **Phase** The image creation phase. Values are “Start” or “End”. +- **Type** The type of update to image configuration files. Values are “Apps” or “Drivers”. +- **WskVersion** The version of the Windows System Kit being used. + + +### Microsoft.Windows.Kits.WSK.WskWorkspaceCreate + +This event sends simple Product and Service usage data when a user is using the Windows System Kit to create new workspace for generating OS “images”. The data includes the version of the Windows System Kit and the state of the event and is used to help investigate workspace creation failures. + +The following fields are available: + +- **Architecture** The OS architecture that the workspace will target. Values are one of: “AMD64”, “ARM64”, “x86”, or “ARM”. +- **OsEdition** The Operating System Edition that the workspace will target. +- **Phase** The image creation phase. Values are “Start” or “End”. +- **WorkspaceArchitecture** The operating system architecture that the workspace will target. +- **WorkspaceOsEdition** The operating system edition that the workspace will target. +- **WskVersion** The version of the Windows System Kit being used. + + +## Windows Update Delivery Optimization events + +### Microsoft.OSG.DU.DeliveryOptClient.DownloadCanceled + +This event describes when a download was canceled with Delivery Optimization. It's used to understand and address problems regarding downloads. + +The following fields are available: + +- **background** Is the download being done in the background? +- **bytesFromCacheServer** Bytes received from a cache host. +- **bytesFromCDN** The number of bytes received from a CDN source. +- **bytesFromGroupPeers** The number of bytes received from a peer in the same group. +- **bytesFromIntPeers** The number of bytes received from peers not in the same LAN or in the same group. +- **bytesFromLinkLocalPeers** The number of bytes received from local peers. +- **bytesFromLocalCache** Bytes copied over from local (on disk) cache. +- **bytesFromPeers** The number of bytes received from a peer in the same LAN. +- **cdnErrorCodes** A list of CDN connection errors since the last FailureCDNCommunication event. +- **cdnErrorCounts** The number of times each error in cdnErrorCodes was encountered. +- **cdnIp** The IP Address of the source CDN (Content Delivery Network). +- **cdnUrl** The URL of the source CDN (Content Delivery Network). +- **dataSourcesTotal** Bytes received per source type, accumulated for the whole session. +- **errorCode** The error code that was returned. +- **experimentId** When running a test, this is used to correlate events that are part of the same test. +- **fileID** The ID of the file being downloaded. +- **gCurMemoryStreamBytes** Current usage for memory streaming. +- **gMaxMemoryStreamBytes** Maximum usage for memory streaming. +- **isVpn** Indicates whether the device is connected to a VPN (Virtual Private Network). +- **jobID** Identifier for the Windows Update job. +- **predefinedCallerName** The name of the API Caller. +- **reasonCode** Reason the action or event occurred. +- **routeToCacheServer** The cache server setting, source, and value. +- **sessionID** The ID of the file download session. +- **updateID** The ID of the update being downloaded. +- **usedMemoryStream** TRUE if the download is using memory streaming for App downloads. + + +### Microsoft.OSG.DU.DeliveryOptClient.DownloadCompleted + +This event describes when a download has completed with Delivery Optimization. It's used to understand and address problems regarding downloads. + +The following fields are available: + +- **#dnErrorCounts** No content is currently available. +- **__TlgCVß_** No content is currently available. +- **|anConnectionCount** No content is currently available. +- **}plinkUsageBps** No content is currently available. +- **0redefinedCallerName** No content is currently available. +- **b6nConnectionCount** No content is currently available. +- **b6nErrorCodes** No content is currently available. +- **b6nErrorCounts** No content is currently available. +- **b6nIp** No content is currently available. +- **b6nUrl** No content is currently available. +- **b9tesFromPeers** No content is currently available. +- **background** Is the download a background download? +- **bytesFrkmIntPeers** No content is currently available. +- **bytesFromCacheSedver** No content is currently available. +- **bytesFromCacheServer** Bytes received from a cache host. +- **bytesFromCdN** No content is currently available. +- **bytesFromCDN** The number of bytes received from a CDN source. +- **bytesFromGpoupPeers** No content is currently available. +- **bytesFromGroupPeers** The number of bytes received from a peer in the same domain group. +- **bytesFromIntÐeers** No content is currently available. +- **bytesFromIntPeers** The number of bytes received from peers not in the same LAN or in the same domain group. +- **byTesFromIntPeers** No content is currently available. +- **bytesFromLinkLocalPeers** The number of bytes received from local peers. +- **bytesFromLocalCache** Bytes copied over from local (on disk) cache. +- **bytesFromPeers** The number of bytes received from a peer in the same LAN. +- **bytesRequested** The total number of bytes requested for download. +- **cacheSarverConnectionCount** No content is currently available. +- **cacheSedverConnectionCount** No content is currently available. +- **cacheServerConndctionCount** No content is currently available. +- **cacheServerConnectionCoujt** No content is currently available. +- **cacheServerConnectionCount** Number of connections made to cache hosts. +- **cdnConnectionCount** The total number of connections made to the CDN. +- **cdnErrorCodes** A list of CDN connection errors since the last FailureCDNCommunication event. +- **cdnErrorCounts** The number of times each error in cdnErrorCodes was encountered. +- **cdnIp** The IP address of the source CDN. +- **cdnSonnectionCount** No content is currently available. +- **cdnUrl** Url of the source Content Distribution Network (CDN). +- **dataSourcesTotal** Bytes received per source type, accumulated for the whole session. +- **dkwnloadModeSrc** No content is currently available. +- **doErrorCode** The Delivery Optimization error code that was returned. +- **dowflinkBps** No content is currently available. +- **downlinkBps** The maximum measured available download bandwidth (in bytes per second). +- **downlinkUsageBps** The download speed (in bytes per second). +- **downloadMode** The download mode used for this file download session. +- **doWnloadMode** No content is currently available. +- **downloadModeReason** Reason for the download. +- **downloadModeS2c** No content is currently available. +- **downloadModeSrc** Source of the DownloadMode setting (KvsProvider = 0, GeoProvider = 1, GeoVerProvider = 2, CpProvider = 3, DiscoveryProvider = 4, RegistryProvider = 5, GroupPolicyProvider = 6, MdmProvider = 7, SettingsProvider = 8, InvalidProviderType = 9). +- **downloadMofeSrc** No content is currently available. +- **experimentId** When running a test, this is used to correlate with other events that are part of the same test. +- **expiresAt** The time when the content will expire from the Delivery Optimization Cache. +- **fileID** The ID of the file being downloaded. +- **fileSize** The size of the file being downloaded. +- **gCurMemoryStreamBytes** Current usage for memory streaming. +- **gMaxMemoryStreamBytes** Maximum usage for memory streaming. +- **groupConjectionCount** No content is currently available. +- **groupConnectionCount** The total number of connections made to peers in the same group. +- **in4ernetConnectionCount** No content is currently available. +- **internetConnectionCnunt** No content is currently available. +- **internetConnectionCount** The total number of connections made to peers not in the same LAN or the same group. +- **internetConnectionCountdownlinkBps** No content is currently available. +- **isEjcrypted** No content is currently available. +- **isEncryptdd** No content is currently available. +- **isEncrypted** TRUE if the file is encrypted and will be decrypted after download. +- **isVpn** Is the device connected to a Virtual Private Network? +- **jobID** Identifier for the Windows Update job. +- **lanConnectionCo}nt** No content is currently available. +- **lanConnectionCount** The total number of connections made to peers in the same LAN. +- **linkLocalConnectionCount** The number of connections made to peers in the same Link-local network. +- **numPeers** The total number of peers used for this download. +- **numPeersLocal** The total number of local peers used for this download. +- **predefi.edCallerName** No content is currently available. +- **predefinedCallerName** The name of the API Caller. +- **predefinedCalleRName** No content is currently available. +- **rcdnIp** No content is currently available. +- **restrictedUpload** Is the upload restricted? +- **romteToCacheServer** No content is currently available. +- **roupeToCacheServer** No content is currently available. +- **routeTnCacheServer** No content is currently available. +- **routeToCacheSedver** No content is currently available. +- **routeToCacheServer** The cache server setting, source, and value. +- **sessionID** The ID of the download session. +- **totalTimeMs** Duration of the download (in seconds). +- **updateID** The ID of the update being downloaded. +- **uplinkBps** The maximum measured available upload bandwidth (in bytes per second). +- **uplinkUsageBps** The upload speed (in bytes per second). +- **uplinkUsegeBps** No content is currently available. +- **usedMemoryStream** TRUE if the download is using memory streaming for App downloads. + + +### Microsoft.OSG.DU.DeliveryOptClient.DownloadPaused + +This event represents a temporary suspension of a download with Delivery Optimization. It's used to understand and address problems regarding downloads. + +The following fields are available: + +- **AddinType** No content is currently available. +- **backgground** No content is currently available. +- **backgro}nd** No content is currently available. +- **backgrou|d** No content is currently available. +- **background** Is the download a background download? +- **BinFileTimestamp** No content is currently available. +- **BinFileVersion** No content is currently available. +- **c`nUrl** No content is currently available. +- **cdnUrl** The URL of the source CDN (Content Delivery Network). +- **errorBode** No content is currently available. +- **errorCode** The error code that was returned. +- **expebimentId** No content is currently available. +- **expebimentIderrorCode** No content is currently available. +- **experiientId** No content is currently available. +- **experimenpId** No content is currently available. +- **experimentId** When running a test, this is used to correlate with other events that are part of the same test. +- **fileID** The ID of the file being paused. +- **FileId** No content is currently available. +- **FileSize** No content is currently available. +- **isVp|** No content is currently available. +- **isVpn** Is the device connected to a Virtual Private Network? +- **jobID** Identifier for the Windows Update job. +- **ksVpn** No content is currently available. +- **LoadBehavior** No content is currently available. +- **LSID** No content is currently available. +- **OfficeArchitecture** No content is currently available. +- **OutlookCrashingAddin** No content is currently available. +- **predefinedCallerName** The name of the API Caller object. +- **ProductCompany** No content is currently available. +- **ProductName** No content is currently available. +- **ProductVersion** No content is currently available. +- **ProgramId** No content is currently available. +- **Provider** No content is currently available. +- **reasonCod%** No content is currently available. +- **reasonCode** The reason for pausing the download. +- **recsonCodesessiolID** No content is currently available. +- **routeToCacheSedver** No content is currently available. +- **routeToCacheServer** The cache server setting, source, and value. +- **sessionID** The ID of the download session. +- **updateID** The ID of the update being paused. +- **updateMD** No content is currently available. + + +### Microsoft.OSG.DU.DeliveryOptClient.DownloadStarted + +This event sends data describing the start of a new download to enable Delivery Optimization. It's used to understand and address problems regarding downloads. + +The following fields are available: + +- **b6nUrl** No content is currently available. +- **background** Indicates whether the download is happening in the background. +- **bacoground** No content is currently available. +- **bileSizeCaller** No content is currently available. +- **bytesRequested** Number of bytes requested for the download. +- **cdnUrl** The URL of the source Content Distribution Network (CDN). +- **costFlags** A set of flags representing network cost. +- **costFlaos** No content is currently available. +- **deviceProfile** Identifies the usage or form factor (such as Desktop, Xbox, or VM). +- **diceRoll** Random number used for determining if a client will use peering. +- **doClientVersion** The version of the Delivery Optimization client. +- **doErrorC/de** No content is currently available. +- **doErrorCode** The Delivery Optimization error code that was returned. +- **doErrorCoee** No content is currently available. +- **downloadMode** The download mode used for this file download session (CdnOnly = 0, Lan = 1, Group = 2, Internet = 3, Simple = 99, Bypass = 100). +- **downloadModeReason** Reason for the download. +- **downloadModeSrc** Source of the DownloadMode setting (KvsProvider = 0, GeoProvider = 1, GeoVerProvider = 2, CpProvider = 3, DiscoveryProvider = 4, RegistryProvider = 5, GroupPolicyProvider = 6, MdmProvider = 7, SettingsProvider = 8, InvalidProviderType = 9). +- **errorCode** The error code that was returned. +- **experimejtId** No content is currently available. +- **experimentId** ID used to correlate client/services calls that are part of the same test during A/B testing. +- **expeZone** No content is currently available. +- **faleID** No content is currently available. +- **fiheID** No content is currently available. +- **fileID** The ID of the file being downloaded. +- **filePat(** No content is currently available. +- **filePath** The path to where the downloaded file will be written. +- **fileSize** Total file size of the file that was downloaded. +- **fileSizeCaller** Value for total file size provided by our caller. +- **groqpID** No content is currently available. +- **groupID** ID for the group. +- **isEncrypted** Indicates whether the download is encrypted. +- **isFpn** No content is currently available. +- **isVpn** Indicates whether the device is connected to a Virtual Private Network. +- **jobID** The ID of the Windows Update job. +- **peerID** The ID for this delivery optimization client. +- **predefinedCall%rName** No content is currently available. +- **predefinedCallerName** Name of the API caller. +- **rimentId** No content is currently available. +- **routeToCacheSedver** No content is currently available. +- **routeToCacheServer** Cache server setting, source, and value. +- **sessionID** The ID for the file download session. +- **sessionIF** No content is currently available. +- **sessmonID** No content is currently available. +- **setConfigs** A JSON representation of the configurations that have been set, and their sources. +- **updateID** The ID of the update being downloaded. +- **updateYD** No content is currently available. +- **usedMemoryStream** Indicates whether the download used memory streaming. + + +### Microsoft.OSG.DU.DeliveryOptClient.FailureCdnCommunication + +This event represents a failure to download from a CDN with Delivery Optimization. It's used to understand and address problems regarding downloads. + +The following fields are available: + +- **cdnHeaders** The HTTP headers returned by the CDN. +- **cdnIp** The IP address of the CDN. +- **cdnUrl** The URL of the CDN. +- **eErrorCode** No content is currently available. +- **eErrorCunt** No content is currently available. +- **errorCode** The error code that was returned. +- **errorCount** The total number of times this error code was seen since the last FailureCdnCommunication event was encountered. +- **experimentId** When running a test, this is used to correlate with other events that are part of the same test. +- **fileID** The ID of the file being downloaded. +- **htppStatusCode** No content is currently available. +- **httpStatusCode** The HTTP status code returned by the CDN. +- **isHeadRequest** The type of HTTP request that was sent to the CDN. Example: HEAD or GET +- **peerTyp,** No content is currently available. +- **peerType** The type of peer (LAN, Group, Internet, CDN, Cache Host, etc.). +- **requestOffset** The byte offset within the file in the sent request. +- **requestSize** The size of the range requested from the CDN. +- **responseSize** The size of the range response received from the CDN. +- **sessionID** The ID of the download session. + + +### Microsoft.OSG.DU.DeliveryOptClient.JobError + +This event represents a Windows Update job error. It allows for investigation of top errors. + +The following fields are available: + +- **cdnIp** The IP Address of the source CDN (Content Delivery Network). +- **doErrorCode** Error code returned for delivery optimization. +- **errorCode** The error code returned. +- **experimentId** When running a test, this is used to correlate with other events that are part of the same test. +- **fileID** The ID of the file being downloaded. +- **jobID** The Windows Update job ID. +- **jobKD** No content is currently available. + + +## Windows Update events + +### Microsoft.Windows.Update.DeviceUpdateAgent.UpdateAgentAnalysisSummary + +This event collects information regarding the state of devices and drivers on the system following a reboot after the install phase of the new device manifest UUP (Unified Update Platform) update scenario which is used to install a device manifest describing a set of driver packages. + +The following fields are available: + +- **activated** Whether the entire device manifest update is considered activated and in use. +- **analysisErrorCount** The number of driver packages that could not be analyzed because errors occurred during analysis. +- **flightId** Unique ID for each flight. +- **missingDriverCount** The number of driver packages delivered by the device manifest that are missing from the system. +- **missingUpdateCount** The number of updates in the device manifest that are missing from the system. +- **objectId** Unique value for each diagnostics session. +- **publishedCount** The number of drivers packages delivered by the device manifest that are published and available to be used on devices. +- **relatedCV** Correlation vector value generated from the latest USO scan. +- **scenarioId** Indicates the update scenario. +- **sessionId** Unique value for each update session. +- **summary** A summary string that contains basic information about driver packages that are part of the device manifest and any devices on the system that those driver packages match. +- **summaryAppendError** A Boolean indicating if there was an error appending more information to the summary string. +- **truncatedDeviceCount** The number of devices missing from the summary string because there is not enough room in the string. +- **truncatedDriverCount** The number of driver packages missing from the summary string because there is not enough room in the string. +- **unpublishedCount** How many drivers packages that were delivered by the device manifest that are still unpublished and unavailable to be used on devices. +- **updateId** The unique ID for each update. + + +### Microsoft.Windows.Update.DeviceUpdateAgent.UpdateAgentCommit + +This event collects information regarding the final commit phase of the new device manifest UUP (Unified Update Platform) update scenario, which is used to install a device manifest describing a set of driver packages. + +The following fields are available: + +- **errorCode** The error code returned for the current session initialization. +- **flightId** The unique identifier for each flight. +- **objectId** The unique GUID for each diagnostics session. +- **relatedCV** A correlation vector value generated from the latest USO scan. +- **result** Outcome of the initialization of the session. +- **scenarioId** Identifies the Update scenario. +- **sessionId** The unique value for each update session. +- **updateId** The unique identifier for each Update. + + +### Microsoft.Windows.Update.DeviceUpdateAgent.UpdateAgentDownloadRequest + +This event collects information regarding the download request phase of the new device manifest UUP (Unified Update Platform) update scenario, which is used to install a device manifest describing a set of driver packages. + +The following fields are available: + +- **deletedCorruptFiles** Indicates if UpdateAgent found any corrupt payload files and whether the payload was deleted. +- **errorCode** The error code returned for the current session initialization. +- **flightId** The unique identifier for each flight. +- **objectId** Unique value for each Update Agent mode. +- **packageCountOptional** Number of optional packages requested. +- **packageCountRequired** Number of required packages requested. +- **packageCountTotal** Total number of packages needed. +- **packageCountTotalCanonical** Total number of canonical packages. +- **packageCountTotalDiff** Total number of diff packages. +- **packageCountTotalExpress** Total number of express packages. +- **packageSizeCanonical** Size of canonical packages in bytes. +- **packageSizeDiff** Size of diff packages in bytes. +- **packageSizeExpress** Size of express packages in bytes. +- **rangeRequestState** Represents the state of the download range request. +- **relatedCV** Correlation vector value generated from the latest USO scan. +- **result** Result of the download request phase of update. +- **scenarioId** The scenario ID. Example: MobileUpdate, DesktopLanguagePack, DesktopFeatureOnDemand, or DesktopDriverUpdate. +- **sessionId** Unique value for each Update Agent mode attempt. +- **updateId** Unique ID for each update. + + +### Microsoft.Windows.Update.DeviceUpdateAgent.UpdateAgentInitialize + +This event sends data for initializing a new update session for the new device manifest UUP (Unified Update Platform) update scenario, which is used to install a device manifest describing a set of driver packages. + +The following fields are available: + +- **errorCode** The error code returned for the current session initialization. +- **flightId** The unique identifier for each flight. +- **flightMetadata** Contains the FlightId and the build being flighted. +- **objectId** Unique value for each Update Agent mode. +- **relatedCV** Correlation vector value generated from the latest USO scan. +- **result** Result of the initialize phase of the update. 0 = Succeeded, 1 = Failed, 2 = Cancelled, 3 = Blocked, 4 = BlockCancelled. +- **scenarioId** The scenario ID. Example: MobileUpdate, DesktopLanguagePack, DesktopFeatureOnDemand, or DesktopDriverUpdate. +- **sessionData** Contains instructions to update agent for processing FODs and DUICs (Null for other scenarios). +- **sessionId** Unique value for each Update Agent mode attempt. +- **updateId** Unique ID for each update. + + +### Microsoft.Windows.Update.DeviceUpdateAgent.UpdateAgentInstall + +This event collects information regarding the install phase of the new device manifest UUP (Unified Update Platform) update scenario, which is used to install a device manifest describing a set of driver packages. + +The following fields are available: + +- **errorCode** The error code returned for the current install phase. +- **flightId** The unique identifier for each flight (pre-release builds). +- **objectId** The unique identifier for each diagnostics session. +- **relatedCV** Correlation vector value generated from the latest scan. +- **result** Outcome of the install phase of the update. +- **scenarioId** The scenario ID. Example: MobileUpdate, DesktopLanguagePack, DesktopFeatureOnDemand, or DesktopDriverUpdate +- **sessionId** The unique identifier for each update session. +- **updateId** The unique identifier for each Update. + + +### Microsoft.Windows.Update.DeviceUpdateAgent.UpdateAgentModeStart + +This event sends data for the start of each mode during the process of updating device manifest assets via the UUP (Unified Update Platform) update scenario, which is used to install a device manifest describing a set of driver packages. + +The following fields are available: + +- **flightId** The unique identifier for each flight (pre-release builds). +- **mode** Indicates the active Update Agent mode. +- **objectId** Unique value for each diagnostics session. +- **relatedCV** Correlation vector value generated from the latest scan. +- **scenarioId** The scenario ID. Example: MobileUpdate, DesktopLanguagePack, DesktopFeatureOnDemand, or DesktopDriverUpdate. +- **sessionId** The unique identifier for each update session. +- **updateId** The unique identifier for each Update. + + +### Microsoft.Windows.Update.NotificationUx.DialogNotificationToBeDisplayed + +This event indicates that a notification dialog box is about to be displayed to user. + +The following fields are available: + +- **AcceptAutoModeLimit** The maximum number of days for a device to automatically enter Auto Reboot mode. +- **AutoToAutoFailedLimit** The maximum number of days for Auto Reboot mode to fail before the RebootFailed dialog box is shown. +- **DaysSinceRebootRequired** Number of days since restart was required. +- **DeviceLocalTime** The local time on the device sending the event. +- **EngagedModeLimit** The number of days to switch between DTE dialog boxes. +- **EnterAutoModeLimit** The maximum number of days for a device to enter Auto Reboot mode. +- **ETag** OneSettings versioning value. +- **IsForcedEnabled** Indicates whether Forced Reboot mode is enabled for this device. +- **IsUltimateForcedEnabled** Indicates whether Ultimate Forced Reboot mode is enabled for this device. +- **NotificationUxState** Indicates which dialog box is shown. +- **NotificationUxStateString** Indicates which dialog box is shown. +- **RebootUxState** Indicates the state of the restart (Engaged, Auto, Forced, or UltimateForced). +- **RebootUxStateString** Indicates the state of the restart (Engaged, Auto, Forced, or UltimateForced). +- **RebootVersion** Version of DTE. +- **SkipToAutoModeLimit** The minimum length of time to pass in restart pending before a device can be put into auto mode. +- **UpdateId** The ID of the update that is pending restart to finish installation. +- **UpdateRevision** The revision of the update that is pending restart to finish installation. +- **UtcTime** The time the dialog box notification will be displayed, in Coordinated Universal Time. + + +### Microsoft.Windows.Update.NotificationUx.EnhancedEngagedRebootAcceptAutoDialog + +This event indicates that the Enhanced Engaged restart "accept automatically" dialog box was displayed. + +The following fields are available: + +- **DeviceLocalTime** The local time on the device sending the event. +- **ETag** OneSettings versioning value. +- **ExitCode** Indicates how users exited the dialog box. +- **RebootVersion** Version of DTE. +- **UpdateId** The ID of the update that is pending restart to finish installation. +- **UpdateRevision** The revision of the update that is pending restart to finish installation. +- **UserResponseString** The option that user chose on this dialog box. +- **UtcTime** The time that the dialog box was displayed, in Coordinated Universal Time. + + +### Microsoft.Windows.Update.NotificationUx.EnhancedEngagedRebootFirstReminderDialog + +This event indicates that the Enhanced Engaged restart "first reminder" dialog box was displayed.. + +The following fields are available: + +- **DeviceLocalTime** The local time on the device sending the event. +- **ETag** OneSettings versioning value. +- **ExitCode** Indicates how users exited the dialog box. +- **RebootVersion** Version of DTE. +- **UpdateId** The ID of the update that is pending restart to finish installation. +- **UpdateRevision** The revision of the update that is pending restart to finish installation. +- **UserResponseString** The option that user chose in this dialog box. +- **UtcTime** The time that the dialog box was displayed, in Coordinated Universal Time. + + +### Microsoft.Windows.Update.NotificationUx.EnhancedEngagedRebootRebootFailedDialog + +This event indicates that the Enhanced Engaged restart "restart failed" dialog box was displayed. + +The following fields are available: + +- **DeviceLocalTime** The local time of the device sending the event. +- **ETag** OneSettings versioning value. +- **ExitCode** Indicates how users exited the dialog box. +- **RebootVersion** Version of DTE. +- **UpdateId** The ID of the update that is pending restart to finish installation. +- **UpdateRevision** The revision of the update that is pending restart to finish installation. +- **UserResponseString** The option that the user chose in this dialog box. +- **UtcTime** The time that the dialog box was displayed, in Coordinated Universal Time. + + +### Microsoft.Windows.Update.NotificationUx.EnhancedEngagedRebootRebootImminentDialog + +This event indicates that the Enhanced Engaged restart "restart imminent" dialog box was displayed. + +The following fields are available: + +- **DeviceLocalTime** Time the dialog box was shown on the local device. +- **ETag** OneSettings versioning value. +- **ExitCode** Indicates how users exited the dialog box. +- **RebootVersion** Version of DTE. +- **UpdateId** The ID of the update that is pending restart to finish installation. +- **UpdateRevision** The revision of the update that is pending restart to finish installation. +- **UserResponseString** The option that user chose in this dialog box. +- **UtcTime** The time that dialog box was displayed, in Coordinated Universal Time. + + +### Microsoft.Windows.Update.NotificationUx.EnhancedEngagedRebootReminderDialog + +This event returns information relating to the Enhanced Engaged reboot reminder dialog that was displayed. + +The following fields are available: + +- **DeviceLocalTime** The time at which the reboot reminder dialog was shown (based on the local device time settings). +- **ETag** The OneSettings versioning value. +- **ExitCode** Indicates how users exited the reboot reminder dialog box. +- **RebootVersion** The version of the DTE (Direct-to-Engaged). +- **UpdateId** The ID of the update that is waiting for reboot to finish installation. +- **UpdateRevision** The revision of the update that is waiting for reboot to finish installation. +- **UserResponseString** The option chosen by the user on the reboot dialog box. +- **UtcTime** The time at which the reboot reminder dialog was shown (in UTC). + + +### Microsoft.Windows.Update.NotificationUx.EnhancedEngagedRebootReminderToast + +This event indicates that the Enhanced Engaged restart reminder pop-up banner was displayed. + +The following fields are available: + +- **DeviceLocalTime** The local time on the device sending the event. +- **ETag** OneSettings versioning value. +- **ExitCode** Indicates how users exited the pop-up banner. +- **RebootVersion** The version of the reboot logic. +- **UpdateId** The ID of the update that is pending restart to finish installation. +- **UpdateRevision** The revision of the update that is pending restart to finish installation. +- **UserResponseString** The option that the user chose in the pop-up banner. +- **UtcTime** The time that the pop-up banner was displayed, in Coordinated Universal Time. + + +### Microsoft.Windows.Update.NotificationUx.RebootScheduled + +Indicates when a reboot is scheduled by the system or a user for a security, quality, or feature update. + +The following fields are available: + +- **activeHoursApplicable** Indicates whether an Active Hours policy is present on the device. +- **IsEnhancedEngagedReboot** Indicates whether this is an Enhanced Engaged reboot. +- **rebootArgument** Argument for the reboot task. It also represents specific reboot related action. +- **rebootOutsideOfActiveHours** Indicates whether a restart is scheduled outside of active hours. +- **rebootScheduledByUser** Indicates whether the restart was scheduled by user (if not, it was scheduled automatically). +- **rebootState** The current state of the restart. +- **rebootUsingSmartScheduler** Indicates whether the reboot is scheduled by smart scheduler. +- **revisionNumber** Revision number of the update that is getting installed with this restart. +- **scheduledRebootTime** Time of the scheduled restart. +- **scheduledRebootTimeInUTC** Time of the scheduled restart in Coordinated Universal Time. +- **updateId** ID of the update that is getting installed with this restart. +- **wuDeviceid** Unique device ID used by Windows Update. + + +### Microsoft.Windows.Update.Orchestrator.ActivityRestrictedByActiveHoursPolicy + +This event indicates a policy is present that may restrict update activity to outside of active hours. + +The following fields are available: + +- **activeHoursEnd** The end of the active hours window. +- **activeHoursStart** The start of the active hours window. +- **wuDeviceid** Unique device ID used by Windows Update. + + +### Microsoft.Windows.Update.Orchestrator.BlockedByActiveHours + +This event indicates that update activity was blocked because it is within the active hours window. + +The following fields are available: + +- **activeHoursEnd** The end of the active hours window. +- **activeHoursStart** The start of the active hours window. +- **updatePhase** The current state of the update process. +- **wuDeviceid** Unique device ID used by Windows Update. + + +### Microsoft.Windows.Update.Orchestrator.BlockedByBatteryLevel + +This event indicates that Windows Update activity was blocked due to low battery level. + +The following fields are available: + +- **batteryLevel** The current battery charge capacity. +- **batteryLevelThreshold** The battery capacity threshold to stop update activity. +- **updatePhase** The current state of the update process. +- **wuDeviceid** Device ID. + + +### Microsoft.Windows.Update.Orchestrator.DeferRestart + +This event indicates that a restart required for installing updates was postponed. + +The following fields are available: + +- **displayNeededReason** List of reasons for needing display. +- **eventScenario** Indicates the purpose of the event (scan started, succeeded, failed, etc.). +- **filteredDeferReason** Applicable filtered reasons why reboot was postponed (such as user active, or low battery). +- **gameModeReason** Name of the executable that caused the game mode state check to start. +- **ignoredReason** List of reasons that were intentionally ignored. +- **IgnoreReasonsForRestart** List of reasons why restart was deferred. +- **revisionNumber** Update ID revision number. +- **systemNeededReason** List of reasons why system is needed. +- **updateId** Update ID. +- **updateScenarioType** Update session type. +- **wuDeviceid** Unique device ID used by Windows Update. + + +### Microsoft.Windows.Update.Orchestrator.Detection + +This event indicates that a scan for a Windows Update occurred. + +The following fields are available: + +- **deferReason** The reason why the device could not check for updates. +- **detectionBlockingPolicy** The Policy that blocked detection. +- **detectionBlockreason** The reason detection did not complete. +- **detectionRetryMode** Indicates whether we will try to scan again. +- **errorCode** The error code returned for the current process. +- **eventScenario** End-to-end update session ID, or indicates the purpose of sending this event - whether because the software distribution just started installing content, or whether it was cancelled, succeeded, or failed. +- **flightID** The unique identifier for the flight (Windows Insider pre-release build) should be delivered to the device, if applicable. +- **interactive** Indicates whether the user initiated the session. +- **networkStatus** Indicates if the device is connected to the internet. +- **revisionNumber** The Update revision number. +- **scanTriggerSource** The source of the triggered scan. +- **updateId** The unique identifier of the Update. +- **updateScenarioType** Identifies the type of update session being performed. +- **wuDeviceid** The unique device ID used by Windows Update. + + +### Microsoft.Windows.Update.Orchestrator.DisplayNeeded + +This event indicates the reboot was postponed due to needing a display. + +The following fields are available: + +- **displayNeededReason** Reason the display is needed. +- **eventScenario** Indicates the purpose of sending this event - whether because the software distribution just started checking for content, or whether it was cancelled, succeeded, or failed. +- **rebootOutsideOfActiveHours** Indicates whether the reboot was to occur outside of active hours. +- **revisionNumber** Revision number of the update. +- **updateId** Update ID. +- **updateScenarioType** The update session type. +- **uxRebootstate** Indicates the exact state of the user experience at the time the required reboot was initiated. +- **wuDeviceid** The unique identifier of a specific device, used to identify how many devices are encountering success or a particular issue + + +### Microsoft.Windows.Update.Orchestrator.Download + +This event sends launch data for a Windows Update download to help keep Windows up to date. + +The following fields are available: + +- **deferReason** Reason for download not completing. +- **e:4|SScenario** No content is currently available. +- **errorCode** An error code represented as a hexadecimal value. +- **eventScenario** End-to-end update session ID. +- **fdightID** No content is currently available. +- **flightID** The specific ID of the Windows Insider build the device is getting. +- **interactive** Indicates whether the session is user initiated. +- **interactiveelatedCVerrorCode** No content is currently available. +- **revisionNumber** Update revision number. +- **updateId** Update ID. +- **updateScenariotate** No content is currently available. +- **updateScenarioType** The update session type. +- **wuDeviceid** Unique device ID used by Windows Update. + + +### Microsoft.Windows.Update.Orchestrator.DTUCompletedWhenWuFlightPendingCommit + +This event indicates that DTU completed installation of the electronic software delivery (ESD), when Windows Update was already in Pending Commit phase of the feature update. + +The following fields are available: + +- **wuDeviceid** Device ID used by Windows Update. + + +### Microsoft.Windows.Update.Orchestrator.DTUEnabled + +This event indicates that Inbox DTU functionality was enabled. + +The following fields are available: + +- **wuDeviceid** Device ID used by Windows Update. + + +### Microsoft.Windows.Update.Orchestrator.DTUInitiated + +This event indicates that Inbox DTU functionality was intiated. + +The following fields are available: + +- **dtuErrorCode** Return code from creating the DTU Com Server. +- **isDtuApplicable** Determination of whether DTU is applicable to the machine it is running on. +- **wuDeviceid** Device ID used by Windows Update. + + +### Microsoft.Windows.Update.Orchestrator.EscalationRiskLevels + +This event is sent during update scan, download, or install, and indicates that the device is at risk of being out-of-date. + +The following fields are available: + +- **configVersion** The escalation configuration version on the device. +- **downloadElapsedTime** Indicates how long since the download is required on device. +- **downloadRiskLevel** At-risk level of download phase. +- **installElapsedTime** Indicates how long since the install is required on device. +- **installRiskLevel** The at-risk level of install phase. +- **isSediment** Assessment of whether is device is at risk. +- **scanElapsedTime** Indicates how long since the scan is required on device. +- **scanRiskLevel** At-risk level of the scan phase. +- **wuDeviceid** Device ID used by Windows Update. + + +### Microsoft.Windows.Update.Orchestrator.FailedToAddTimeTriggerToScanTask + +This event indicated that USO failed to add a trigger time to a task. + +The following fields are available: + +- **errorCode** The Windows Update error code. +- **wuDeviceid** The Windows Update device ID. + + +### Microsoft.Windows.Update.Orchestrator.FlightInapplicable + +This event indicates that the update is no longer applicable to this device. + +The following fields are available: + +- **EventPublishedTime** Time when this event was generated. +- **flightID** The specific ID of the Windows Insider build. +- **inapplicableReason** The reason why the update is inapplicable. +- **revisionNumber** Update revision number. +- **updateId** Unique Windows Update ID. +- **updateScenarioType** Update session type. +- **UpdateStatus** Last status of update. +- **UUPFallBackConfigured** Indicates whether UUP fallback is configured. +- **wuDeviceid** Unique Device ID. + + +### Microsoft.Windows.Update.Orchestrator.InitiatingReboot + +This event sends data about an Orchestrator requesting a reboot from power management to help keep Windows up to date. + +The following fields are available: + +- **EventPublishedTime** Time of the event. +- **flightID** Unique update ID +- **interactive** Indicates whether the reboot initiation stage of the update process was entered as a result of user action. +- **rebootOutsideOfActiveHours** Indicates whether the reboot was to occur outside of active hours. +- **revisionNumber** Revision number of the update. +- **updateId** Update ID. +- **updateScenarioType** The update session type. +- **uxRebootstate** Indicates the exact state of the user experience at the time the required reboot was initiated. +- **wuDeviceid** Unique device ID used by Windows Update. + + +### Microsoft.Windows.Update.Orchestrator.Install + +This event sends launch data for a Windows Update install to help keep Windows up to date. + +The following fields are available: + +- **batteryLevel** Current battery capacity in mWh or percentage left. +- **defeec-9-0S** No content is currently available. +- **deferReason** Reason for install not completing. +- **errorCode** The error code reppresented by a hexadecimal value. +- **eventScenario** End-to-end update session ID. +- **flightID** The ID of the Windows Insider build the device is getting. +- **flightUpdate** Indicates whether the update is a Windows Insider build. +- **ForcedRebootReminderSet** A boolean value that indicates if a forced reboot will happen for updates. +- **Ignorec-9-0SsFoec-start** No content is currently available. +- **IgnoreReasonsForRestart** The reason(s) a Postpone Restart command was ignored. +- **installCommitfailedtime** The time it took for a reboot to happen but the upgrade failed to progress. +- **installRebootinitiatetime** The time it took for a reboot to be attempted. +- **interactive** Identifies if session is user initiated. +- **minutesToCommit** The time it took to install updates. +- **rebootOutsideOfActiveHours** Indicates whether a reboot is scheduled outside of active hours. +- **revisionNumber** Update revision number. +- **updateId** Update ID. +- **updateMd** No content is currently available. +- **updateScenarioType** The update session type. +- **uxRebootstate** Indicates the exact state of the user experience at the time the required reboot was initiated to ensure the correct update process and experience is provided to keep Windows up to date. +- **wuDeviceid** Unique device ID used by Windows Update. + + +### Microsoft.Windows.Update.Orchestrator.LowUptimes + +This event is sent if a device is identified as not having sufficient uptime to reliably process updates in order to keep secure. + +The following fields are available: + +- **availableHistoryMinutes** The number of minutes available from the local machine activity history. +- **isLowUptimeMachine** Is the machine considered low uptime or not. +- **lowUptimeMinHours** Current setting for the minimum number of hours needed to not be considered low uptime. +- **lowUptimeQueryDays** Current setting for the number of recent days to check for uptime. +- **uptimeMinutes** Number of minutes of uptime measured. +- **wuDeviceid** Unique device ID for Windows Update. + + +### Microsoft.Windows.Update.Orchestrator.OneshotUpdateDetection + +This event returns data about scans initiated through settings UI, or background scans that are urgent; to help keep Windows up to date. + +The following fields are available: + +- **externalOneshotupdate** The last time a task-triggered scan was completed. +- **interactiveOneshotupdate** The last time an interactive scan was completed. +- **oldlastscanOneshotupdate** The last time a scan completed successfully. +- **wuDeviceid** The Windows Update Device GUID (Globally-Unique ID). + + +### Microsoft.Windows.Update.Orchestrator.PreShutdownStart + +This event is generated before the shutdown and commit operations. + +The following fields are available: + +- **wuDeviceid** The unique identifier of a specific device, used to identify how many devices are encountering success or a particular issue. + + +### Microsoft.Windows.Update.Orchestrator.RebootFailed + +This event sends information about whether an update required a reboot and reasons for failure, to help keep Windows up to date. + +The following fields are available: + +- **batteryLevel** Current battery capacity in mWh or percentage left. +- **deferReason** Reason for install not completing. +- **EventPublishedTime** The time that the reboot failure occurred. +- **flightID** Unique update ID. +- **rebootOutsideOfActiveHours** Indicates whether a reboot was scheduled outside of active hours. +- **RebootResults** Hex code indicating failure reason. Typically, we expect this to be a specific USO generated hex code. +- **revisionNumber** Update revision number. +- **updateId** Update ID. +- **updateScenarioType** The update session type. +- **uxRebootstate** Indicates the exact state of the user experience at the time the required reboot was initiated to ensure the correct update process and experience is provided to keep Windows up to date. +- **wuDeviceid** Unique device ID used by Windows Update. + + +### Microsoft.Windows.Update.Orchestrator.RefreshSettings + +This event sends basic data about the version of upgrade settings applied to the system to help keep Windows up to date. + +The following fields are available: + +- **errorCode** Hex code for the error message, to allow lookup of the specific error. +- **settingsDownloadTime** Timestamp of the last attempt to acquire settings. +- **settingsETag** Version identifier for the settings. +- **wuDeviceid** Unique device ID used by Windows Update. + + +### Microsoft.Windows.Update.Orchestrator.RestoreRebootTask + +This event sends data indicating that a reboot task is missing unexpectedly on a device and the task is restored because a reboot is still required, to help keep Windows up to date. + +The following fields are available: + +- **RebootTaskMissedTimeUTC** The time when the reboot task was scheduled to run, but did not. +- **RebootTaskNextTimeUTC** The time when the reboot task was rescheduled for. +- **RebootTaskRestoredTime** Time at which this reboot task was restored. +- **wuDeviceid** Device ID for the device on which the reboot is restored. + + +### Microsoft.Windows.Update.Orchestrator.ScanTriggered + +This event indicates that Update Orchestrator has started a scan operation. + +The following fields are available: + +- **errorCode** The error code returned for the current scan operation. +- **eventScenario** Indicates the purpose of sending this event. +- **interactive** Indicates whether the scan is interactive. +- **isDTUEnabled** Indicates whether DTU (internal abbreviation for Direct Feature Update) channel is enabled on the client system. +- **isScanPastSla** Indicates whether the SLA has elapsed for scanning. +- **isScanPastTriggerSla** Indicates whether the SLA has elapsed for triggering a scan. +- **minutesOverScanSla** Indicates how many minutes the scan exceeded the scan SLA. +- **minutesOverScanTriggerSla** Indicates how many minutes the scan exceeded the scan trigger SLA. +- **scanTriggerSource** Indicates what caused the scan. +- **updateScenarioType** The update session type. +- **wuDeviceid** Unique device ID used by Windows Update. + + +### Microsoft.Windows.Update.Orchestrator.StickUpdate + +This event is sent when the update service orchestrator (USO) indicates the update cannot be superseded by a newer update. + +The following fields are available: + +- **updateAd** No content is currently available. +- **updateId** Identifier associated with the specific piece of content. +- **wuDeviceid** Unique device ID controlled by the software distribution client. + + +### Microsoft.Windows.Update.Orchestrator.SystemNeeded + +This event sends data about why a device is unable to reboot, to help keep Windows up to date. + +The following fields are available: + +- **eventScenario** End-to-end update session ID. +- **rebootOutsideOfActiveHours** Indicates whether a reboot is scheduled outside of active hours. +- **revisionNumber** Update revision number. +- **systemNeededReason** List of apps or tasks that are preventing the system from restarting. +- **updateId** Update ID. +- **updateScenarioType** The update session type. +- **uxRebootstate** Indicates the exact state of the user experience at the time the required reboot was initiated to ensure the correct update process and experience is provided to keep Windows up to date. +- **wuDeviceid** Unique device ID used by Windows Update. + + +### Microsoft.Windows.Update.Orchestrator.TerminatedByActiveHours + +This event indicates that update activity was stopped due to active hours starting. + +The following fields are available: + +- **activeHoursEnd** The end of the active hours window. +- **activeHoursStart** The start of the active hours window. +- **updatePhase** The current state of the update process. +- **wuDeviceid** The device identifier. + + +### Microsoft.Windows.Update.Orchestrator.TerminatedByBatteryLevel + +This event is sent when update activity was stopped due to a low battery level. + +The following fields are available: + +- **batteryLevel** The current battery charge capacity. +- **batteryLevelThreshold** The battery capacity threshold to stop update activity. +- **updatePhase** The current state of the update process. +- **wuDeviceid** The device identifier. + + +### Microsoft.Windows.Update.Orchestrator.UnstickUpdate + +This event is sent when the update service orchestrator (USO) indicates that the update can be superseded by a newer update. + +The following fields are available: + +- **updateId** Identifier associated with the specific piece of content. +- **wuDeviceid** Unique device ID controlled by the software distribution client. + + +### Microsoft.Windows.Update.Orchestrator.UpdatePolicyCacheRefresh + +This event sends data on whether Update Management Policies were enabled on a device, to help keep Windows up to date. + +The following fields are available: + +- **configuredPoliciescount** Number of policies on the device. +- **policiesNamevaluesource** Policy name and source of policy (group policy, MDM or flight). +- **policyCacherefreshtime** Time when policy cache was refreshed. +- **updateInstalluxsetting** Indicates whether a user has set policies via a user experience option. +- **wuDeviceid** Unique device ID used by Windows Update. + + +### Microsoft.Windows.Update.Orchestrator.UpdateRebootRequired + +This event sends data about whether an update required a reboot to help keep Windows up to date. + +The following fields are available: + +- **flightID** The specific ID of the Windows Insider build the device is getting. +- **interactive** Indicates whether the reboot initiation stage of the update process was entered as a result of user action. +- **revisionNumber** Update revision number. +- **updateId** Update ID. +- **updateScenarioType** The update session type. +- **uxRebootstate** Indicates the exact state of the user experience at the time the required reboot was initiated to ensure the correct update process and experience is provided to keep Windows up to date. +- **wuDeviceid** Unique device ID used by Windows Update. + + +### Microsoft.Windows.Update.Orchestrator.updateSettingsFlushFailed + +This event sends information about an update that encountered problems and was not able to complete. + +The following fields are available: + +- **errorCode** The error code encountered. +- **wuDeviceid** The ID of the device in which the error occurred. + + +### Microsoft.Windows.Update.Orchestrator.UsoSession + +This event represents the state of the USO service at start and completion. + +The following fields are available: + +- **activeSessionid** A unique session GUID. +- **eventScenario** The state of the update action. +- **interactive** Is the USO session interactive? +- **lastErrorcode** The last error that was encountered. +- **lastErrorstate** The state of the update when the last error was encountered. +- **sessionType** A GUID that refers to the update session type. +- **updateScenarioType** A descriptive update session type. +- **wuDeviceid** The Windows Update device GUID. + + +### Microsoft.Windows.Update.Ux.MusNotification.EnhancedEngagedRebootUxState + +This event sends information about the configuration of Enhanced Direct-to-Engaged (eDTE), which includes values for the timing of how eDTE will progress through each phase of the reboot. + +The following fields are available: + +- **AcceptAutoModeLimit** The maximum number of days for a device to automatically enter Auto Reboot mode. +- **AutoToAutoFailedLimit** The maximum number of days for Auto Reboot mode to fail before a Reboot Failed dialog will be shown. +- **DeviceLocalTime** The date and time (based on the device date/time settings) the reboot mode changed. +- **EngagedModeLimit** The number of days to switch between DTE (Direct-to-Engaged) dialogs. +- **EnterAutoModeLimit** The maximum number of days a device can enter Auto Reboot mode. +- **ETag** The Entity Tag that represents the OneSettings version. +- **IsForcedEnabled** Identifies whether Forced Reboot mode is enabled for the device. +- **IsUltimateForcedEnabled** Identifies whether Ultimate Forced Reboot mode is enabled for the device. +- **OldestUpdateLocalTime** The date and time (based on the device date/time settings) this update’s reboot began pending. +- **RebootUxState** Identifies the reboot state: Engaged, Auto, Forced, UltimateForced. +- **RebootVersion** The version of the DTE (Direct-to-Engaged). +- **SkipToAutoModeLimit** The maximum number of days to switch to start while in Auto Reboot mode. +- **UpdateId** The ID of the update that is waiting for reboot to finish installation. +- **UpdateRevision** The revision of the update that is waiting for reboot to finish installation. + + +### Microsoft.Windows.Update.Ux.MusNotification.RebootNoLongerNeeded + +This event is sent when a security update has successfully completed. + +The following fields are available: + +- **UtcTime** The Coordinated Universal Time that the restart was no longer needed. + + +### Microsoft.Windows.Update.Ux.MusNotification.RebootScheduled + +This event sends basic information about scheduling an update-related reboot, to get security updates and to help keep Windows up-to-date. + +The following fields are available: + +- **activeHoursApplicable** Indicates whether Active Hours applies on this device. +- **IsEnhancedEngagedReboot** Indicates whether Enhanced reboot was enabled. +- **rebootArgument** Argument for the reboot task. It also represents specific reboot related action. +- **rebootOutsideOfActiveHours** True, if a reboot is scheduled outside of active hours. False, otherwise. +- **rebootScheduledByUser** True, if a reboot is scheduled by user. False, if a reboot is scheduled automatically. +- **rebootState** Current state of the reboot. +- **rebootUsingSmartScheduler** Indicates that the reboot is scheduled by SmartScheduler. +- **revisionNumber** Revision number of the OS. +- **scheduledRebootTime** Time scheduled for the reboot. +- **scheduledRebootTimeInUTC** Time scheduled for the reboot, in UTC. +- **updateId** Identifies which update is being scheduled. +- **wuDeviceid** The unique device ID used by Windows Update. + + +### Microsoft.Windows.Update.Ux.MusNotification.UxBrokerScheduledTask + +This event is sent when MUSE broker schedules a task. + +The following fields are available: + +- **TaskArgument** The arguments with which the task is scheduled. +- **TaskName** Name of the task. + + +### Microsoft.Windows.Update.Ux.MusUpdateSettings.RebootScheduled + +This event sends basic information for scheduling a device restart to install security updates. It's used to help keep Windows up to date. + +The following fields are available: + +- **activeHoursApplicable** Is the restart respecting Active Hours? +- **IsEnhancedEngagedReboot** TRUE if the reboot path is Enhanced Engaged. Otherwise, FALSE. +- **rebootArgument** The arguments that are passed to the OS for the restarted. +- **rebootOutsideOfActiveHours** Was the restart scheduled outside of Active Hours? +- **rebootScheduledByUser** Was the restart scheduled by the user? If the value is false, the restart was scheduled by the device. +- **rebootState** The state of the restart. +- **rebootUsingSmartScheduler** TRUE if the reboot should be performed by the Smart Scheduler. Otherwise, FALSE. +- **revisionNumber** The revision number of the OS being updated. +- **scheduledRebootTime** Time of the scheduled reboot +- **scheduledRebootTimeInUTC** Time of the scheduled restart, in Coordinated Universal Time. +- **updateId** The Windows Update device GUID. +- **wuDeviceid** The Windows Update device GUID. + + +## Windows Update mitigation events + +### Mitigation360Telemetry.MitigationCustom.CleanupSafeOsImages + +This event sends data specific to the CleanupSafeOsImages mitigation used for OS Updates. + +The following fields are available: + +- **ClientId** The client ID used by Windows Update. +- **FlightId** The ID of each Windows Insider build the device received. +- **InstanceId** A unique device ID that identifies each update instance. +- **MitigationScenario** The update scenario in which the mitigation was executed. +- **MountedImageCount** The number of mounted images. +- **MountedImageMatches** The number of mounted image matches. +- **MountedImagesFailed** The number of mounted images that could not be removed. +- **MountedImagesRemoved** The number of mounted images that were successfully removed. +- **MountedImagesSkipped** The number of mounted images that were not found. +- **RelatedCV** The correlation vector value generated from the latest USO scan. +- **Result** HResult of this operation. +- **ScenarioId** ID indicating the mitigation scenario. +- **ScenarioSupported** Indicates whether the scenario was supported. +- **SessionId** Unique value for each update attempt. +- **UpdateId** Unique ID for each Windows Update. +- **WuId** Unique ID for the Windows Update client. + + +### Mitigation360Telemetry.MitigationCustom.FixAppXReparsePoints + +This event sends data specific to the FixAppXReparsePoints mitigation used for OS updates. + +The following fields are available: + +- **ClientId** Unique identifier for each flight. +- **FlightId** Unique GUID that identifies each instances of setuphost.exe. +- **InstanceId** The update scenario in which the mitigation was executed. +- **MitigationScenario** Correlation vector value generated from the latest USO scan. +- **RelatedCV** Number of reparse points that are corrupted but we failed to fix them. +- **ReparsePointsFailed** Number of reparse points that were corrupted and were fixed by this mitigation. +- **ReparsePointsFixed** Number of reparse points that are not corrupted and no action is required. +- **ReparsePointsSkipped** HResult of this operation. +- **Result** ID indicating the mitigation scenario. +- **ScenarioId** Indicates whether the scenario was supported. +- **ScenarioSupported** Unique value for each update attempt. +- **SessionId** Unique ID for each Update. +- **UpdateId** Unique ID for the Windows Update client. +- **WuId** Unique ID for the Windows Update client. + + +### Mitigation360Telemetry.MitigationCustom.FixupEditionId + +This event sends data specific to the FixupEditionId mitigation used for OS updates. + +The following fields are available: + +- **ClientId** In the WU scenario, this will be the WU client ID that is passed to Setup. In Media setup, default value is Media360, but can be overwritten by the caller to a unique value. +- **EditionIdUpdated** Determine whether EditionId was changed. +- **FlightId** Unique identifier for each flight. +- **InstanceId** Unique GUID that identifies each instances of setuphost.exe. +- **MitigationScenario** The update scenario in which the mitigation was executed. +- **ProductEditionId** Expected EditionId value based on GetProductInfo. +- **ProductType** Value returned by GetProductInfo. +- **RegistryEditionId** EditionId value in the registry. +- **RelatedCV** Correlation vector value generated from the latest USO scan. +- **Result** HResult of this operation. +- **ScenarioId** ID indicating the mitigation scenario. +- **ScenarioSupported** Indicates whether the scenario was supported. +- **SessionId** Unique value for each update attempt. +- **UpdateId** Unique ID for each update. +- **WuId** Unique ID for the Windows Update client. + + +## Windows Update Reserve Manager events + +### Microsoft.Windows.UpdateReserveManager.CommitPendingHardReserveAdjustment + +This event is sent when the Update Reserve Manager commits a hard reserve adjustment that was pending. + +The following fields are available: + +- **FinalAdjustment** Final adjustment for the hard reserve following the addition or removal of optional content. +- **InitialAdjustment** Initial intended adjustment for the hard reserve following the addition/removal of optional content. + + +### Microsoft.Windows.UpdateReserveManager.FunctionReturnedError + +This event is sent when the Update Reserve Manager returns an error from one of its internal functions. + +The following fields are available: + +- **FailedExpression** The failed expression that was returned. +- **FailedFile** The binary file that contained the failed function. +- **FailedFunction** The name of the function that originated the failure. +- **FailedLine** The line number of the failure. +- **ReturnCode** The return code of the function. + + +### Microsoft.Windows.UpdateReserveManager.InitializeUpdateReserveManager + +This event returns data about the Update Reserve Manager, including whether it’s been initialized. + +The following fields are available: + +- **ClientId** The ID of the caller application. +- **Flags** The enumerated flags used to initialize the manager. +- **FlightId** The flight ID of the content the calling client is currently operating with. +- **Offline** Indicates whether or the reserve manager is called during offline operations. +- **PolicyPassed** Indicates whether the machine is able to use reserves. +- **ReturnCode** Return code of the operation. +- **Version** The version of the Update Reserve Manager. + + +### Microsoft.Windows.UpdateReserveManager.PrepareTIForReserveInitialization + +This event is sent when the Update Reserve Manager prepares the Trusted Installer to initialize reserves on the next boot. + +The following fields are available: + +- **Flags** The flags that are passed to the function to prepare the Trusted Installer for reserve initialization. + + +### Microsoft.Windows.UpdateReserveManager.RemovePendingHardReserveAdjustment + +This event is sent when the Update Reserve Manager removes a pending hard reserve adjustment. + + + +### Microsoft.Windows.UpdateReserveManager.UpdatePendingHardReserveAdjustment + +This event is sent when the Update Reserve Manager needs to adjust the size of the hard reserve after the option content is installed. + +The following fields are available: + +- **ChangeSize** The change in the hard reserve size based on the addition or removal of optional content. +- **Disposition** The parameter for the hard reserve adjustment function. +- **Flags** The flags passed to the hard reserve adjustment function. +- **PendingHardReserveAdjustment** The final change to the hard reserve size. +- **UpdateType** Indicates whether the change is an increase or decrease in the size of the hard reserve. + + +## Winlogon events + +### Microsoft.Windows.Security.Winlogon.SetupCompleteLogon + +This event signals the completion of the setup process. It happens only once during the first logon. + + + +## XBOX events + +### Microsoft.Xbox.XamTelemetry.AppActivationError + +This event indicates whether the system detected an activation error in the app. + +The following fields are available: + +- **ActivationUri** Activation URI (Uniform Resource Identifier) used in the attempt to activate the app. +- **AppId** The Xbox LIVE Title ID. +- **AppUserModelId** The AUMID (Application User Model ID) of the app to activate. +- **Result** The HResult error. +- **UserId** The Xbox LIVE User ID (XUID). + + +### Microsoft.Xbox.XamTelemetry.AppActivity + +This event is triggered whenever the current app state is changed by: launch, switch, terminate, snap, etc. + +The following fields are available: + +- **AppActionId** The ID of the application action. +- **AppCurrentVisibilityState** The ID of the current application visibility state. +- **AppId** The Xbox LIVE Title ID of the app. +- **AppPackageFullName** The full name of the application package. +- **AppPreviousVisibilityState** The ID of the previous application visibility state. +- **AppSessionId** The application session ID. +- **AppType** The type ID of the application (AppType_NotKnown, AppType_Era, AppType_Sra, AppType_Uwa). +- **BCACode** The BCA (Burst Cutting Area) mark code of the optical disc used to launch the application. +- **DurationMs** The amount of time (in milliseconds) since the last application state transition. +- **IsTrialLicense** This boolean value is TRUE if the application is on a trial license. +- **LicenseType** The type of licensed used to authorize the app (0 - Unknown, 1 - User, 2 - Subscription, 3 - Offline, 4 - Disc). +- **LicenseXuid** If the license type is 1 (User), this field contains the XUID (Xbox User ID) of the registered owner of the license. +- **ProductGuid** The Xbox product GUID (Globally-Unique ID) of the application. +- **UserId** The XUID (Xbox User ID) of the current user. + + + From b5c7241367bd26ec26531fd4b4ef12db09406e20 Mon Sep 17 00:00:00 2001 From: Brian Lich Date: Wed, 20 Mar 2019 13:28:09 -0700 Subject: [PATCH 081/724] new build 3/20/2019 1:28 PM --- .../basic-level-windows-diagnostic-events-and-fields-1903.md | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/windows/privacy/basic-level-windows-diagnostic-events-and-fields-1903.md b/windows/privacy/basic-level-windows-diagnostic-events-and-fields-1903.md index 03eb191a9a..4d3aa705fe 100644 --- a/windows/privacy/basic-level-windows-diagnostic-events-and-fields-1903.md +++ b/windows/privacy/basic-level-windows-diagnostic-events-and-fields-1903.md @@ -13,7 +13,7 @@ manager: dansimp ms.collection: M365-security-compliance ms.topic: article audience: ITPro -ms.date: 03/19/2019 +ms.date: 03/20/2019 --- From 13be4cc9c4be4531a6c87a10d60c03d49bd7fcd4 Mon Sep 17 00:00:00 2001 From: Brian Lich Date: Wed, 20 Mar 2019 13:28:16 -0700 Subject: [PATCH 082/724] new build 3/20/2019 1:28 PM --- ...ndows-diagnostic-events-and-fields-1703.md | 2 +- ...ndows-diagnostic-events-and-fields-1709.md | 2 +- ...ndows-diagnostic-events-and-fields-1803.md | 125 ++++++++++++++- ...ndows-diagnostic-events-and-fields-1809.md | 145 +++++++----------- 4 files changed, 184 insertions(+), 90 deletions(-) diff --git a/windows/privacy/basic-level-windows-diagnostic-events-and-fields-1703.md b/windows/privacy/basic-level-windows-diagnostic-events-and-fields-1703.md index 28d0314670..0f32a74a67 100644 --- a/windows/privacy/basic-level-windows-diagnostic-events-and-fields-1703.md +++ b/windows/privacy/basic-level-windows-diagnostic-events-and-fields-1703.md @@ -13,7 +13,7 @@ manager: dansimp ms.collection: M365-security-compliance ms.topic: article audience: ITPro -ms.date: 03/19/2019 +ms.date: 03/20/2019 --- diff --git a/windows/privacy/basic-level-windows-diagnostic-events-and-fields-1709.md b/windows/privacy/basic-level-windows-diagnostic-events-and-fields-1709.md index 16140deb3c..e7b0b0b20f 100644 --- a/windows/privacy/basic-level-windows-diagnostic-events-and-fields-1709.md +++ b/windows/privacy/basic-level-windows-diagnostic-events-and-fields-1709.md @@ -13,7 +13,7 @@ manager: dansimp ms.collection: M365-security-compliance ms.topic: article audience: ITPro -ms.date: 03/19/2019 +ms.date: 03/20/2019 --- diff --git a/windows/privacy/basic-level-windows-diagnostic-events-and-fields-1803.md b/windows/privacy/basic-level-windows-diagnostic-events-and-fields-1803.md index cf362ccc46..c3150d4aeb 100644 --- a/windows/privacy/basic-level-windows-diagnostic-events-and-fields-1803.md +++ b/windows/privacy/basic-level-windows-diagnostic-events-and-fields-1803.md @@ -13,7 +13,7 @@ manager: dansimp ms.collection: M365-security-compliance ms.topic: article audience: ITPro -ms.date: 03/19/2019 +ms.date: 03/20/2019 --- @@ -1582,6 +1582,50 @@ The following fields are available: - **SLICVersion** Returns OS type/version from SLIC table. +### Census.PrivacySettings + +This event provides information about the device level privacy settings and whether device-level access was granted to these capabilities. Not all settings are applicable to all devices. Each field records the consent state for the corresponding privacy setting. The consent state is encoded as a 16-bit signed integer, where the first 8 bits represents the effective consent value, and the last 8 bits represent the authority that set the value. The effective consent (first 8 bits) is one of the following values: -3 = unexpected consent value, -2 = value was not requested, -1 = an error occurred while attempting to retrieve the value, 0 = undefined, 1 = allow, 2 = deny, 3 = prompt. The consent authority (last 8 bits) is one of the following values: -3 = unexpected authority, -2 = value was not requested, -1 = an error occurred while attempting to retrieve the value, 0 = system, 1 = a higher authority (a gating setting, the system-wide setting, or a group policy), 2 = advertising ID group policy, 3 = advertising ID policy for child account, 4 = privacy setting provider doesn't know the actual consent authority, 5 = consent was not configured and a default set in code was used, 6 = system default, 7 = organization policy, 8 = OneSettings. + +The following fields are available: + +- **Activity** Current state of the activity history setting. +- **ActivityHistoryCloudSync** Current state of the activity history cloud sync setting. +- **ActivityHistoryCollection** Current state of the activity history collection setting. +- **AdvertisingId** Current state of the advertising ID setting. +- **AppDiagnostics** Current state of the app diagnostics setting. +- **Appointments** Current state of the calendar setting. +- **Bluetooth** Current state of the Bluetooth capability setting. +- **BluetoothSync** Current state of the Bluetooth sync capability setting. +- **BroadFileSystemAccess** Current state of the broad file system access setting. +- **CellularData** Current state of the cellular data capability setting. +- **Chat** Current state of the chat setting. +- **Contacts** Current state of the contacts setting. +- **DocumentsLibrary** Current state of the documents library setting. +- **Email** Current state of the email setting. +- **FindMyDevice** Current state of the "find my device" setting. +- **GazeInput** Current state of the gaze input setting. +- **HumanInterfaceDevice** Current state of the human interface device setting. +- **InkTypeImprovement** Current state of the improve inking and typing setting. +- **Location** Current state of the location setting. +- **LocationHistory** Current state of the location history setting. +- **Microphone** Current state of the microphone setting. +- **PhoneCall** Current state of the phone call setting. +- **PhoneCallHistory** Current state of the call history setting. +- **PicturesLibrary** Current state of the pictures library setting. +- **Radios** Current state of the radios setting. +- **SensorsCustom** Current state of the custom sensor setting. +- **SerialCommunication** Current state of the serial communication setting. +- **Sms** Current state of the text messaging setting. +- **SpeechPersonalization** Current state of the speech services setting. +- **USB** Current state of the USB setting. +- **UserAccountInformation** Current state of the account information setting. +- **UserDataTasks** Current state of the tasks setting. +- **UserNotificationListener** Current state of the notifications setting. +- **VideosLibrary** Current state of the videos library setting. +- **Webcam** Current state of the camera setting. +- **WiFiDirect** Current state of the Wi-Fi direct setting. + + ### Census.Processor Provides information on several important data points about Processor settings. @@ -1695,6 +1739,50 @@ The following fields are available: - **SpeechInputLanguages** The Speech Input languages installed on the device. +### Census.UserPrivacySettings + +This event provides information about the current users privacy settings and whether device-level access was granted to these capabilities. Not all settings are applicable to all devices. Each field records the consent state for the corresponding privacy setting. The consent state is encoded as a 16-bit signed integer, where the first 8 bits represents the effective consent value, and the last 8 bits represents the authority that set the value. The effective consent is one of the following values: -3 = unexpected consent value, -2 = value was not requested, -1 = an error occurred while attempting to retrieve the value, 0 = undefined, 1 = allow, 2 = deny, 3 = prompt. The consent authority is one of the following values: -3 = unexpected authority, -2 = value was not requested, -1 = an error occurred while attempting to retrieve the value, 0 = user, 1 = a higher authority (a gating setting, the system-wide setting, or a group policy), 2 = advertising ID group policy, 3 = advertising ID policy for child account, 4 = privacy setting provider doesn't know the actual consent authority, 5 = consent was not configured and a default set in code was used, 6 = system default, 7 = organization policy, 8 = OneSettings. + +The following fields are available: + +- **Activity** Current state of the activity history setting. +- **ActivityHistoryCloudSync** Current state of the activity history cloud sync setting. +- **ActivityHistoryCollection** Current state of the activity history collection setting. +- **AdvertisingId** Current state of the advertising ID setting. +- **AppDiagnostics** Current state of the app diagnostics setting. +- **Appointments** Current state of the calendar setting. +- **Bluetooth** Current state of the Bluetooth capability setting. +- **BluetoothSync** Current state of the Bluetooth sync capability setting. +- **BroadFileSystemAccess** Current state of the broad file system access setting. +- **CellularData** Current state of the cellular data capability setting. +- **Chat** Current state of the chat setting. +- **Contacts** Current state of the contacts setting. +- **DocumentsLibrary** Current state of the documents library setting. +- **Email** Current state of the email setting. +- **GazeInput** Current state of the gaze input setting. +- **HumanInterfaceDevice** Current state of the human interface device setting. +- **InkTypeImprovement** Current state of the improve inking and typing setting. +- **InkTypePersonalization** Current state of the inking and typing personalization setting. +- **Location** Current state of the location setting. +- **LocationHistory** Current state of the location history setting. +- **Microphone** Current state of the microphone setting. +- **PhoneCall** Current state of the phone call setting. +- **PhoneCallHistory** Current state of the call history setting. +- **PicturesLibrary** Current state of the pictures library setting. +- **Radios** Current state of the radios setting. +- **SensorsCustom** Current state of the custom sensor setting. +- **SerialCommunication** Current state of the serial communication setting. +- **Sms** Current state of the text messaging setting. +- **SpeechPersonalization** Current state of the speech services setting. +- **USB** Current state of the USB setting. +- **UserAccountInformation** Current state of the account information setting. +- **UserDataTasks** Current state of the tasks setting. +- **UserNotificationListener** Current state of the notifications setting. +- **VideosLibrary** Current state of the videos library setting. +- **Webcam** Current state of the camera setting. +- **WiFiDirect** Current state of the Wi-Fi direct setting. + + ### Census.VM This event sends data indicating whether virtualization is enabled on the device, and its various characteristics, to help keep Windows up to date. @@ -2027,6 +2115,41 @@ The following fields are available: - **transactionCanceled** Indicates whether the uninstall was cancelled. +### CbsServicingProvider.CbsSelectableUpdateChangeV2 + +This event reports the results of enabling or disabling optional Windows Content to keep Windows up to date. + +The following fields are available: + +- **applicableUpdateState** Indicates the highest applicable state of the optional content. +- **buildVersion** The build version of the package being installed. +- **clientId** The name of the application requesting the optional content change. +- **downloadSource** Indicates if optional content was obtained from Windows Update or a locally accessible file. +- **downloadtimeInSeconds** Indicates if optional content was obtained from Windows Update or a locally accessible file. +- **executionID** A unique ID used to identify events associated with a single servicing operation and not reused for future operations. +- **executionSequence** A counter that tracks the number of servicing operations attempted on the device. +- **firstMergedExecutionSequence** The value of a pervious executionSequence counter that is being merged with the current operation, if applicable. +- **firstMergedID** A unique ID of a pervious servicing operation that is being merged with this operation, if applicable. +- **hrDownloadResult** The return code of the download operation. +- **hrStatusUpdate** The return code of the servicing operation. +- **identityHash** A pseudonymized (hashed) identifier for the Windows Package that is being installed or uninstalled. +- **initiatedOffline** Indicates whether the operation was performed against an offline Windows image file or a running instance of Windows. +- **majorVersion** The major version of the package being installed. +- **minorVersion** The minor version of the package being installed. +- **packageArchitecture** The architecture of the package being installed. +- **packageLanguage** The language of the package being installed. +- **packageName** The name of the package being installed. +- **rebootRequired** Indicates whether a reboot is required to complete the operation. +- **revisionVersion** The revision number of the package being installed. +- **stackBuild** The build number of the servicing stack binary performing the installation. +- **stackMajorVersion** The major version number of the servicing stack binary performing the installation. +- **stackMinorVersion** The minor version number of the servicing stack binary performing the installation. +- **stackRevision** The revision number of the servicing stack binary performing the installation. +- **updateName** The name of the optional Windows Operation System feature being enabled or disabled. +- **updateStartState** A value indicating the state of the optional content before the operation started. +- **updateTargetState** A value indicating the desired state of the optional content. + + ## Deployment extensions ### DeploymentTelemetry.Deployment_End diff --git a/windows/privacy/basic-level-windows-diagnostic-events-and-fields-1809.md b/windows/privacy/basic-level-windows-diagnostic-events-and-fields-1809.md index 1daea9d4d6..680f731738 100644 --- a/windows/privacy/basic-level-windows-diagnostic-events-and-fields-1809.md +++ b/windows/privacy/basic-level-windows-diagnostic-events-and-fields-1809.md @@ -13,7 +13,7 @@ manager: dansimp ms.collection: M365-security-compliance ms.topic: article audience: ITPro -ms.date: 03/19/2019 +ms.date: 03/20/2019 --- @@ -502,6 +502,7 @@ The following fields are available: - **DecisionSystemBios_TH2** The count of the number of this particular object type present on this device. - **DecisionSystemProcessor_RS2** The count of the number of this particular object type present on this device. - **DecisionTest_RS1** An ID for the system, calculated by hashing hardware identifiers. +- **I4BD-B1CFi2vuW9de87ed73cb92d3ca4.amd64fre.rs5_2eu5umeZone** No content is currently available. - **InventoryApplicationFile** The count of the number of this particular object type present on this device. - **InventoryDeviceContainer** A count of device container objects in cache. - **InventoryDevicePnp** A count of device Plug and Play objects in cache. @@ -850,7 +851,6 @@ The following fields are available: - **DriverAvailableOnline** Is there a driver for this PNP device on Windows Update? - **DriverAvailableUplevel** Is there a driver on Windows Update or included with the operating system for this PNP device? - **DriverBlockOverridden** Is there is a driver block on the device that has been overridden? -- **DriverJlockOverridden** No content is currently available. - **NeedsDismissAction** Will the user would need to dismiss a warning during Setup for this device? - **NotRegressed** Does the device have a problem code on the source OS that is no better than the one it would have on the target OS? - **SdbDeviceBlockUpgrade** Is there an SDB block on the PNP device that blocks upgrade? @@ -2029,7 +2029,6 @@ The following fields are available: - **LocationHistory** Current state of the location history setting. - **LocationHistoryCloudSync** Current state of the location history cloud sync setting. - **LocationHistoryOnTimeline** Current state of the location history on timeline setting. -- **LocTîÿxV4ocationHistory** No content is currently available. - **Microphone** Current state of the microphone setting. - **PhoneCall** Current state of the phone call setting. - **PhoneCallHistory** Current state of the call history setting. @@ -2139,12 +2138,7 @@ This event sends data about the logical/physical display size, resolution and nu The following fields are available: -- **ÉnternalPrimaryDisplayLogicalDPIY** No content is currently available. -- **IîternalPrimaryDisplayResolutionVertical** No content is currently available. -- **InterjalPrimaryDisplayResolutionHorizontal** No content is currently available. -- **InternalPrimaðyDisplayPhysicalDPIX** No content is currently available. - **InternalPrimaryDisplayLogicalDPIX** Retrieves the logical DPI in the x-direction of the internal display. -- **InternalPrimaryDisplayLogicálDPIX** No content is currently available. - **InternalPrimaryDisplayLogicalDPIY** Retrieves the logical DPI in the y-direction of the internal display. - **InternalPrimaryDisplayPhysicalDPIX** Retrieves the physical DPI in the x-direction of the internal display. - **InternalPrimaryDisplayPhysicalDPIY** Retrieves the physical DPI in the y-direction of the internal display. @@ -2152,11 +2146,8 @@ The following fields are available: - **InternalPrimaryDisplayResolutionVertical** Retrieves the number of pixels in the vertical direction of the internal display. - **InternalPrimaryDisplaySizePhysicalH** Retrieves the physical horizontal length of the display in mm. Used for calculating the diagonal length in inches . - **InternalPrimaryDisplaySizePhysicalY** Retrieves the physical vertical length of the display in mm. Used for calculating the diagonal length in inches -- **InternalPrimaryDiwplayPhysicalDPIY** No content is currently available. - **NumberofExternalDisplays** Retrieves the number of external displays connected to the machine - **NumberofInternalDisplays** Retrieves the number of internal displays in a machine. -- **OumberofExternalDisplays** No content is currently available. -- **OumberofInternalDisplays** No content is currently available. - **VRAMDedicated** Retrieves the video RAM in MB. - **VRAMDedicatedSystem** Retrieves the amount of memory on the dedicated video card. - **VRAMSharedSystem** Retrieves the amount of RAM memory that the video card can use. @@ -2276,7 +2267,6 @@ The following fields are available: - **XboxConsolePreferredLanguage** Retrieves the preferred language selected by the user on Xbox console. - **XboxConsoleSerialNumber** Retrieves the serial number of the Xbox console. -- **XboxConsoleSerialOumber** No content is currently available. - **XboxLiveDeviceId** Retrieves the unique device ID of the console. - **XboxLiveSandboxId** Retrieves the developer sandbox ID if the device is internal to Microsoft. @@ -2460,6 +2450,7 @@ The following fields are available: - **inventoryId** Device ID used for Compatibility testing - **objectInstanceId** Object identity which is unique within the device scope. - **objectType** Indicates the object type that the event applies to. +- **objectType(objectInstanceId** No content is currently available. - **syncId** A string used to group StartSync, EndSync, Add, and Remove operations that belong together. This field is unique by Sync period and is used to disambiguate in situations where multiple agents perform overlapping inventories for the same object. @@ -2601,6 +2592,41 @@ The following fields are available: - **stageTimeSeconds** The time (in seconds) required to stage all files that are part of the update. +### CbsServicingProvider.CbsSelectableUpdateChangeV2 + +This event reports the results of enabling or disabling optional Windows Content to keep Windows up to date. + +The following fields are available: + +- **applicableUpdateState** Indicates the highest applicable state of the optional content. +- **buildVersion** The build version of the package being installed. +- **clientId** The name of the application requesting the optional content change. +- **downloadSource** Indicates if optional content was obtained from Windows Update or a locally accessible file. +- **downloadtimeInSeconds** The number of seconds required to complete the optional content download. +- **executionID** A unique ID used to identify events associated with a single servicing operation and not reused for future operations. +- **executionSequence** A counter that tracks the number of servicing operations attempted on the device. +- **firstMergedExecutionSequence** The value of a pervious executionSequence counter that is being merged with the current operation, if applicable. +- **firstMergedID** A unique ID of a pervious servicing operation that is being merged with this operation, if applicable. +- **hrDownloadResult** The return code of the download operation. +- **hrStatusUpdate** The return code of the servicing operation. +- **identityHash** A pseudonymized (hashed) identifier for the Windows Package that is being installed or uninstalled. +- **initiatedOffline** Indicates whether the operation was performed against an offline Windows image file or a running instance of Windows. +- **majorVersion** The major version of the package being installed. +- **minorVersion** The minor version of the package being installed. +- **packageArchitecture** The architecture of the package being installed. +- **packageLanguage** The language of the package being installed. +- **packageName** The name of the package being installed. +- **rebootRequired** Indicates whether a reboot is required to complete the operation. +- **revisionVersion** The revision number of the package being installed. +- **stackBuild** The build number of the servicing stack binary performing the installation. +- **stackMajorVersion** The major version number of the servicing stack binary performing the installation. +- **stackMinorVersion** The minor version number of the servicing stack binary performing the installation. +- **stackRevision** The revision number of the servicing stack binary performing the installation. +- **updateName** The name of the optional Windows Operation System feature being enabled or disabled. +- **updateStartState** A value indicating the state of the optional content before the operation started. +- **updateTargetState** A value indicating the desired state of the optional content. + + ## Deployment extensions ### DeploymentTelemetry.Deployment_End @@ -2683,12 +2709,14 @@ Fired by UTC at startup to signal what data we are allowed to collect. The following fields are available: +- **CanAddMsaToMsTelemetby** No content is currently available. - **CanAddMsaToMsTelemetry** True if we can add MSA PUID and CID to telemetry, false otherwise. - **CanCollectAnyTelemetry** True if we are allowed to collect partner telemetry, false otherwise. - **CanCollectCoreTelemetry** True if we can collect CORE/Basic telemetry, false otherwise. - **CanCollectHeartbeats** True if we can collect heartbeat telemetry, false otherwise. - **CanCollectOsTelemetry** True if we can collect diagnostic data telemetry, false otherwise. - **CanCollectWindowsAnalyticsEvents** True if we can collect Windows Analytics data, false otherwise. +- **CanCollectWintowsAnalyticsEvents** No content is currently available. - **CanPerformDiagnosticEscalations** True if we can perform diagnostic escalation collection, false otherwise. - **CanPerformTraceEscalations** True if we can perform trace escalation collection, false otherwise. - **CanReportScenarios** True if we can report scenario completions, false otherwise. @@ -2718,7 +2746,6 @@ This event sends data about the health and quality of the diagnostic data from t The following fields are available: - **AgentConnectionErrorsCount** Number of non-timeout errors associated with the host/agent channel. -- **AgentConnectionrrorCsCount** No content is currently available. - **CensusExitCode** The last exit code of the Census task. - **CensusStartTime** Time of last Census run. - **CensusTaskEnabled** True if Census is enabled, false otherwise. @@ -2732,9 +2759,7 @@ The following fields are available: - **DbDroppedFailureCount** Number of events dropped due to DB failures. - **DbDroppedFullCount** Number of events dropped due to DB fullness. - **DecodingDroppedCount** Number of events dropped due to decoding failures. -- **DecodthiDroppedCount** No content is currently available. - **EnteringCriticalOverflowDroppedCounter** Number of events dropped due to critical overflow mode being initiated. -- **EnterthiCriticalOverflowDroppedCounter** No content is currently available. - **EtwDroppedBufferCount** Number of buffers dropped in the UTC ETW session. - **EtwDroppedCount** Number of events dropped at ETW layer of telemetry client. - **EventsPersistedCount** Number of events that reached the PersistEvent stage. @@ -2749,26 +2774,17 @@ The following fields are available: - **HeartBeatSequenceNumber** The sequence number of this heartbeat. - **InvalidHttpCodeCount** Number of invalid HTTP codes received from contacting Vortex. - **LastAgentConnectionError** Last non-timeout error encountered in the host/agent channel. -- **LastAgentConnectionrrorC** No content is currently available. - **LastEventSizeOffender** Event name of last event which exceeded max event size. - **LastInvalidHttpCode** Last invalid HTTP code received from Vortex. -- **Max8ctiveAgentConnectionCount** No content is currently available. - **MaxActiveAgentConnectionCount** The maximum number of active agents during this heartbeat timeframe. - **MaxInUseScenarioCounter** Soft maximum number of scenarios loaded by UTC. -- **MaxInUseScenaryoCounter** No content is currently available. -- **omporessedBytesUploaded** No content is currently available. - **PreviousHeartBeatTime** Time of last heartbeat event (allows chaining of events). - **PrivacyBlockedCount** The number of events blocked due to privacy settings or tags. -- **RepeatedUploadFailqreDpopped** No content is currently available. - **RepeatedUploadFailureDropped** Number of events lost due to repeated upload failures for a single buffer. - **SettingsHttpAttempts** Number of attempts to contact OneSettings service. - **SettingsHttpFailures** The number of failures from contacting the OneSettings service. -- **SettthisHttpAttempts** No content is currently available. -- **SettthisHttpFailures** No content is currently available. - **ThrottledDroppedCount** Number of events dropped due to throttling of noisy providers. - **TopUploaderErrors** List of top errors received from the upload endpoint. -- **TopUploaderrrorCs** No content is currently available. -- **UphoaderErporCount** No content is currently available. - **UploaderDroppedCount** Number of events dropped at the uploader layer of telemetry client. - **UploaderErrorCount** Number of errors received from the upload endpoint. - **VortexFailuresTimeout** The number of timeout failures received from Vortex. @@ -2776,7 +2792,6 @@ The following fields are available: - **VortexHttpFailures4xx** Number of 400-499 error codes received from Vortex. - **VortexHttpFailures5xx** Number of 500-599 error codes received from Vortex. - **VortexHttpResponseFailures** Number of Vortex responses that are not 2XX or 400. -- **VortexHttpResponsesWirhDroppedEvents** No content is currently available. - **VortexHttpResponsesWithDroppedEvents** Number of Vortex responses containing at least 1 dropped event. @@ -2794,7 +2809,6 @@ The following fields are available: - **DbDroppedFailureCount** Number of events dropped due to database failures. - **DbDroppedFullCount** Number of events dropped due to database being full. - **EnteringCriticalOverflowDroppedCounter** Number of events dropped due to critical overflow mode being initiated. -- **Eve~tStoreResetCounter** No content is currently available. - **EventsPersistedCount** Number of events that reached the PersistEvent stage. - **EventStoreLifetimeResetCounter** Number of times the event store has been reset. - **EventStoreResetCounter** Number of times the event store has been reset during this heartbeat. @@ -3385,23 +3399,24 @@ The following fields are available: - **aiSeqId** The event sequence ID. - **bootId** The system boot ID. - **BrightnessVersionViaDDI** The version of the Display Brightness Interface. +- **BrightngssVersionViaDDI** No content is currently available. - **ComputePreemptionLevel** The maximum preemption level supported by GPU for compute payload. - **DedicatedSystemMemoryB** The amount of system memory dedicated for GPU use (in bytes). - **DedicatedVideoMemoryB** The amount of dedicated VRAM of the GPU (in bytes). -- **DedicatedVkdeoMemoryB** No content is currently available. - **DisplayAdapterLuid** The display adapter LUID. - **DriverDate** The date of the display driver. - **DriverRank** The rank of the display driver. - **DriverVersion** The display driver version. +- **DriverVgrsion** No content is currently available. - **DX10UMDFilePath** The file path to the location of the DirectX 10 Display User Mode Driver in the Driver Store. - **DX11UMDFilePath** The file path to the location of the DirectX 11 Display User Mode Driver in the Driver Store. - **DX12UMDFilePath** The file path to the location of the DirectX 12 Display User Mode Driver in the Driver Store. +- **DX9UMDFilePatè** No content is currently available. - **DX9UMDFilePath** The file path to the location of the DirectX 9 Display User Mode Driver in the Driver Store. - **GPUDeviceID** The GPU device ID. - **GPUPreemptionLevel** The maximum preemption level supported by GPU for graphics payload. - **GPURevisionID** The GPU revision ID. - **GPUVendorID** The GPU vendor ID. -- **GPUVgndorID** No content is currently available. - **InterfaceId** The GPU interface ID. - **IsDisplayDevice** Does the GPU have displaying capabilities? - **IsHwSchSupported** Indicates whether the adapter supports hardware scheduling. @@ -3415,22 +3430,23 @@ The following fields are available: - **IsPostAdapter** Is this GPU the POST GPU in the device? - **IsRemovable** TRUE if the adapter supports being disabled or removed. - **IsRenderDevice** Does the GPU have rendering capabilities? +- **IsRendgrDevice** No content is currently available. - **IsSoftwareDevice** Is this a software implementation of the GPU? - **KMDFilePath** The file path to the location of the Display Kernel Mode Driver in the Driver Store. - **MeasureEnabled** Is the device listening to MICROSOFT_KEYWORD_MEASURES? +- **MeasurgEnabled** No content is currently available. - **MsHybridDiscrete** Indicates whether the adapter is a discrete adapter in a hybrid configuration. -- **N}mVidPnSources** No content is currently available. - **NumVidPnSources** The number of supported display output sources. - **NumVidPnTargets** The number of supported display output targets. +- **NumVidPnTattets** No content is currently available. - **SharedSystemMemoryB** The amount of system memory shared by GPU and CPU (in bytes). - **SubSystemID** The subsystem ID. -- **SubVendopID** No content is currently available. - **SubVendorID** The GPU sub vendor ID. +- **TelemetpyEnabled** No content is currently available. - **TelemetryEnabled** Is the device listening to MICROSOFT_KEYWORD_TELEMETRY? - **TelInvEvntTrigger** What triggered this event to be logged? Example: 0 (GPU enumeration) or 1 (DxgKrnlTelemetry provider toggling) -- **TenemetryEnabled** No content is currently available. -- **TenInvEvntTrigger** No content is currently available. - **version** The event version. +- **verskon** No content is currently available. - **WDDMVersion** The Windows Display Driver Model version. @@ -3521,14 +3537,17 @@ The following fields are available: - **AppSessionGuid** GUID made up of process ID and is used as a correlation vector for process instances in the telemetry backend. - **AppTimeStamp** The date/time stamp of the app. - **AppVersion** The version of the app that has crashed. +- **DargetAsId** No content is currently available. - **ExceptionCode** The exception code returned by the process that has crashed. - **ExceptionOffset** The address where the exception had occurred. - **Flags** Flags indicating how reporting is done. For example, queue the report, do not offer JIT debugging, or do not terminate the process after reporting. - **FriendlyAppName** The description of the app that has crashed, if different from the AppName. Otherwise, the process name. - **IsFatal** True/False to indicate whether the crash resulted in process termination. +- **ModNa-e** No content is currently available. - **ModName** Exception module name (e.g. bar.dll). - **ModTimeStamp** The date/time stamp of the module. - **ModVersion** The version of the module that has crashed. +- **OodTimeStamp** No content is currently available. - **PackageFullName** Store application identity. - **PackageRelativeAppId** Store application identity. - **ProcessArchitecture** Architecture of the crashing process, as one of the PROCESSOR_ARCHITECTURE_* constants: 0: PROCESSOR_ARCHITECTURE_INTEL. 5: PROCESSOR_ARCHITECTURE_ARM. 9: PROCESSOR_ARCHITECTURE_AMD64. 12: PROCESSOR_ARCHITECTURE_ARM64. @@ -3620,7 +3639,6 @@ The following fields are available: - **InventoryMiscellaneousOfficeVBA** A count of office vba objects in cache - **InventoryMiscellaneousOfficeVBARuleViolations** A count of office vba rule violations objects in cache - **InventoryMiscellaneousUUPInfo** A count of uup info objects in cache -- **InventoryMiscnfo** No content is currently available. - **Metadata** A count of metadata objects in cache. - **Orphan** A count of orphan file objects in cache. - **Programs** A count of program objects in cache. @@ -3659,6 +3677,7 @@ The following fields are available: - **HiddenArp** Indicates whether a program hides itself from showing up in ARP. - **InstallDate** The date the application was installed (a best guess based on folder creation date heuristics). - **InstallDateArpLastModified** The date of the registry ARP key for a given application. Hints at install date but not always accurate. Passed as an array. Example: 4/11/2015 00:00:00 +- **InstallDateFromLbnkFile** No content is currently available. - **InstallDateFromLinkFile** The estimated date of install based on the links to the files. Passed as an array. - **InstallDateMsi** The install date if the application was installed via Microsoft Installer (MSI). Passed as an array. - **InventoryVersion** The version of the inventory file generating the events. @@ -3761,7 +3780,6 @@ The following fields are available: - **IsActive** Is the device connected, or has it been seen in the last 14 days? - **IsConnected** For a physically attached device, this value is the same as IsPresent. For wireless a device, this value represents a communication link. - **IsMachineContainer** Is the container the root device itself? -- **IsMAchineContainer** No content is currently available. - **IsNetworked** Is this a networked device? - **IsPaired** Does the device container require pairing? - **Manufacturer** The manufacturer name for the device container. @@ -3888,10 +3906,10 @@ The following fields are available: - **Description** The description of the device. - **DeviceInterfaceClasses** The device interfaces that this device implements. - **DeviceState** Identifies the current state of the parent (main) device. +- **DevicmState** No content is currently available. - **DriverId** The unique identifier for the installed driver. - **DriverName** The name of the driver image file. - **DriverPackageStrongName** The immediate parent directory name in the Directory field of InventoryDriverPackage. -- **DriveRPackageStrongNaMe** No content is currently available. - **DriverVerDate** The date associated with the driver installed on the device. - **DriverVerVersion** The version number of the driver installed on the device. - **Enumerator** Identifies the bus that enumerated the device. @@ -3911,6 +3929,7 @@ The following fields are available: - **Service** The name of the device service. - **STACKID** The list of hardware IDs for the stack. - **UpperClassFilters** The identifiers of the Upper Class filters installed for the device. +- **UpperFilers** No content is currently available. - **UpperFilters** The identifiers of the Upper filters installed for the device. @@ -3968,30 +3987,20 @@ This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedevic The following fields are available: -- **Dri6erCompany** No content is currently available. -- **Driv%rPackageStrongName** No content is currently available. -- **Drive2Name** No content is currently available. - **DriverCheckSum** The checksum of the driver file. -- **DriverCompa.y** No content is currently available. - **DriverCompany** The company name that developed the driver. - **DriverInBox** Is the driver included with the operating system? - **DriverIsKernelMode** Is it a kernel mode driver? - **DriverName** The file name of the driver. - **DriverPackageStrongName** The strong name of the driver package -- **DriverSign%d** No content is currently available. - **DriverSigned** The strong name of the driver package - **DriverTimeStamp** The low 32 bits of the time stamp of the driver file. - **DriverType** A bitfield of driver attributes: 1. define DRIVER_MAP_DRIVER_TYPE_PRINTER 0x0001. 2. define DRIVER_MAP_DRIVER_TYPE_KERNEL 0x0002. 3. define DRIVER_MAP_DRIVER_TYPE_USER 0x0004. 4. define DRIVER_MAP_DRIVER_IS_SIGNED 0x0008. 5. define DRIVER_MAP_DRIVER_IS_INBOX 0x0010. 6. define DRIVER_MAP_DRIVER_IS_WINQUAL 0x0040. 7. define DRIVER_MAP_DRIVER_IS_SELF_SIGNED 0x0020. 8. define DRIVER_MAP_DRIVER_IS_CI_SIGNED 0x0080. 9. define DRIVER_MAP_DRIVER_HAS_BOOT_SERVICE 0x0100. 10. define DRIVER_MAP_DRIVER_TYPE_I386 0x10000. 11. define DRIVER_MAP_DRIVER_TYPE_IA64 0x20000. 12. define DRIVER_MAP_DRIVER_TYPE_AMD64 0x40000. 13. define DRIVER_MAP_DRIVER_TYPE_ARM 0x100000. 14. define DRIVER_MAP_DRIVER_TYPE_THUMB 0x200000. 15. define DRIVER_MAP_DRIVER_TYPE_ARMNT 0x400000. 16. define DRIVER_MAP_DRIVER_IS_TIME_STAMPED 0x800000. - **DriverVersion** The version of the driver file. -- **DviverCompany** No content is currently available. -- **I.f** No content is currently available. -- **Imagesize** No content is currently available. - **ImageSize** The size of the driver file. - **Inf** The name of the INF file. -- **Invento2yVersion** No content is currently available. - **InventoryVersion** The version of the inventory file generating the events. - **Product** The product name that is included in the driver file. -- **ProductVersio~** No content is currently available. - **ProductVersion** The product version that is included in the driver file. - **Service** The name of the service that is installed for the device. - **WdfVersion** The Windows Driver Framework version. @@ -4503,7 +4512,6 @@ The following fields are available: - **BootStatusPolicy** Identifies the applicable Boot Status Policy. - **BootType** Identifies the type of boot (e.g.: "Cold", "Hiber", "Resume"). - **EventTimestamp** Seconds elapsed since an arbitrary time point. This can be used to identify the time difference in successive boot attempts being made. -- **Firmw!reResetReasonEmbeddedControllerAdditional** No content is currently available. - **FirmwareResetReasonEmbeddedController** Reason for system reset provided by firmware. - **FirmwareResetReasonEmbeddedControllerAdditional** Additional information on system reset reason provided by firmware if needed. - **FirmwareResetReasonPch** Reason for system reset provided by firmware. @@ -4736,47 +4744,22 @@ This event provides a Windows Internal Library context used for Product and Serv The following fields are available: -- **-149ngContextMessage** No content is currently available. -- **3645entContextName** No content is currently available. -- **379rentContextName** No content is currently available. -- **532rentContextName** No content is currently available. -- **677rentContextName** No content is currently available. -- **8108entContextName** No content is currently available. -- **8251entContextName** No content is currently available. -- **902rentContextName** No content is currently available. -- **9567ngContextMessage** No content is currently available. -- **9717ngContextMessage** No content is currently available. - **callContext** The function where the failure occurred. - **currentContextId** The ID of the current call context where the failure occurred. - **currentContextMessage** The message of the current call context where the failure occurred. -- **currentContextMessaon** No content is currently available. - **currentContextName** The name of the current call context where the failure occurred. - **failureCount** The number of failures for this failure ID. - **failureId** The ID of the failure that occurred. - **failureType** The type of the failure that occurred. - **fileName** The file name where the failure occurred. -- **functige** No content is currently available. - **function** The function where the failure occurred. - **hresult** The HResult of the overall activity. - **lineNumber** The line number where the failure occurred. - **message** The message of the failure that occurred. - **module** The module where the failure occurred. -- **ori1-0467ngContextMessage** No content is currently available. -- **ori1-1210ngContextMessage** No content is currently available. -- **ori1143-7ngContextMessage** No content is currently available. -- **ori1-1945ngContextMessage** No content is currently available. -- **ori13s090ngContextMessage** No content is currently available. -- **ori1-4671entContextName** No content is currently available. -- **ori1-5108ngContextMessage** No content is currently available. -- **ori1-5686ngContextMessage** No content is currently available. -- **ori1n:667ngContextMessage** No content is currently available. -- **ori1n8488ngContextMessage** No content is currently available. -- **ori1-s4o5ngContextMessage** No content is currently available. -- **ori808467ngContextMessage** No content is currently available. - **originatingContextId** The ID of the originating call context that resulted in the failure. - **originatingContextMessage** The message of the originating call context that resulted in the failure. - **originatingContextName** The name of the originating call context that resulted in the failure. -- **threa0Id** No content is currently available. - **threadId** The ID of the thread on which the activity is executing. @@ -4854,7 +4837,6 @@ This service retrieves events generated by SetupPlatform, the engine that drives The following fields are available: -- **Falue** No content is currently available. - **FieldName** Retrieves the event name/data point. Examples: InstallStartTime, InstallEndtime, OverallResult etc. - **GroupName** Retrieves the groupname the event belongs to. Example: Install Information, DU Information, Disk Space Information etc. - **Value** Retrieves the value associated with the corresponding event name (Field Name). For example: For time related events this will include the system time. @@ -4868,12 +4850,8 @@ Scan process event on Windows Update client. See the EventScenario field for spe The following fields are available: -- **AativityMatchingId** No content is currently available. - **ActivityMatchingId** Contains a unique ID identifying a single CheckForUpdates session from initialization to completion. -- **ActivityMatcjingId** No content is currently available. -- **AllowCachedResul|s** No content is currently available. - **AllowCachedResults** Indicates if the scan allowed using cached results. -- **AllowCachedRmsults** No content is currently available. - **ApplicableUpdateInfo** Metadata for the updates which were detected as applicable - **BiosFamily** The family of the BIOS (Basic Input Output System). - **BiosName** The name of the device BIOS. @@ -4897,17 +4875,14 @@ The following fields are available: - **DriverError** The error code hit during a driver scan. This is 0 if no error was encountered. - **DriverExclusionPolicy** Indicates if the policy for not including drivers with Windows Update is enabled. - **DriverSyncPassPerformed** Were drivers scanned this time? -- **DriverSyncPasSPerformed** No content is currently available. - **EventInstanceID** A globally unique identifier for event instance. - **EventScenario** Indicates the purpose of sending this event - whether because the software distribution just started checking for content, or whether it was cancelled, succeeded, or failed. -- **ExtendedetadataICabUrl** No content is currently available. - **ExtendedMetadataCabUrl** Hostname that is used to download an update. - **ExtendedStatusCode** Secondary error code for certain scenarios where StatusCode wasn't specific enough. - **FailedUpdateGuids** The GUIDs for the updates that failed to be evaluated during the scan. - **FailedUpdatesCount** The number of updates that failed to be evaluated during the scan. - **FeatureUpdateDeferral** The deferral period configured for feature OS updates on the device (in days). - **FeatureUpdatePause** Indicates whether feature OS updates are paused on the device. -- **FeatureUpdatePausePerimd** No content is currently available. - **FeatureUpdatePausePeriod** The pause duration configured for feature OS updates on the device (in days). - **FlightBranch** The branch that a device is on if participating in flighting (pre-release builds). - **FlightRing** The ring (speed of getting builds) that a device is on if participating in flighting (pre-release builds). @@ -4915,20 +4890,16 @@ The following fields are available: - **IntentPFNs** Intended application-set metadata for atomic update scenarios. - **IPVersion** Indicates whether the download took place over IPv4 or IPv6 - **IsWUfBDualScanEnabled** Indicates if Windows Update for Business dual scan is enabled on the device. -- **IsWUfBEna`led** No content is currently available. - **IsWUfBEnabled** Indicates if Windows Update for Business is enabled on the device. - **IsWUfBFederatedScanDisabled** Indicates if Windows Update for Business federated scan is disabled on the device. - **MetadataIntegrityMode** The mode of the update transport metadata integrity check. 0-Unknown, 1-Ignoe, 2-Audit, 3-Enforce - **MSIError** The last error that was encountered during a scan for updates. -- **NetworkConneativityDetected** No content is currently available. - **NetworkConnectivityDetected** Indicates the type of network connectivity that was detected. 0 - IPv4, 1 - IPv6 - **NumberOfApplicableUpdates** The number of updates which were ultimately deemed applicable to the system after the detection process is complete - **NumberOfApplicationsCategoryScanEvaluated** The number of categories (apps) for which an app update scan checked - **NumberOfLoop** The number of round trips the scan required - **NumberOfNewUpdatesFromServiceSync** The number of updates which were seen for the first time in this scan - **NumberOfUpdatesEvaluated** The total number of updates which were evaluated as a part of the scan -- **NumFailedetadataISignatures** No content is currently available. -- **NumFailedMetadatabignatures** No content is currently available. - **NumFailedMetadataSignatures** The number of metadata signatures checks which failed for new metadata synced down. - **Online** Indicates if this was an online scan. - **PausedUpdates** A list of UpdateIds which that currently being paused. @@ -4945,19 +4916,16 @@ The following fields are available: - **ScanDurationInSeconds** The number of seconds a scan took - **ScanEnqueueTime** The number of seconds it took to initialize a scan - **ScanProps** This is a 32-bit integer containing Boolean properties for a given Windows Update scan. The following bits are used; all remaining bits are reserved and set to zero. Bit 0 (0x1): IsInteractive - is set to 1 if the scan is requested by a user, or 0 if the scan is requested by Automatic Updates. Bit 1 (0x2): IsSeeker - is set to 1 if the Windows Update client's Seeker functionality is enabled. Seeker functionality is enabled on certain interactive scans, and results in the scans returning certain updates that are in the initial stages of release (not yet released for full adoption via Automatic Updates). -- **ServiaeUrl** No content is currently available. - **ServiceGuid** An ID which represents which service the software distribution client is checking for content (Windows Update, Microsoft Store, etc.). - **ServiceUrl** The environment URL a device is configured to scan with - **ShippingMobileOperator** The mobile operator that a device shipped on. - **StatusCode** Indicates the result of a CheckForUpdates event (success, cancellation, failure code HResult). +- **SyncTyp%** No content is currently available. - **SyncType** Describes the type of scan the event was - **SystemBIOSMajorRelease** Major version of the BIOS. - **SystemBIOSMinorRelease** Minor version of the BIOS. - **TargetMetadataVersion** For self-initiated healing, this is the target version of the SIH engine to download (if needed). If not, the value is null. -- **TotalNumetadataISignatures** No content is currently available. -- **TotalNumMetadatabignatures** No content is currently available. - **TotalNumMetadataSignatures** The total number of metadata signatures checks done for new metadata that was synced down. -- **VelatedCV** No content is currently available. - **WebServiceRetryMethods** Web service method requests that needed to be retried to complete operation. - **WUDeviceID** The unique identifier of a specific device, used to identify how many devices are encountering success or a particular issue. @@ -5202,6 +5170,7 @@ The following fields are available: - **PhonePreviewEnabled** Indicates whether a phone was getting preview build, prior to flighting being introduced. - **ProcessName** The process name of the caller who initiated API calls, in the event that CallerApplicationName was not provided. - **QualityUpdatePause** Indicates whether quality OS updates are paused on the device. +- **rApcessFailurePostReboot** No content is currently available. - **RelatedCV** The previous Correlation Vector that was used before swapping with a new one - **RepeatFailCount** Indicates whether this specific piece of content has previously failed. - **RepeatFailFlag** Indicates whether this specific piece of content previously failed to install. @@ -6661,6 +6630,7 @@ The following fields are available: - **b9tesFromPeers** No content is currently available. - **background** Is the download a background download? - **bytesFrkmIntPeers** No content is currently available. +- **bytesFroeIntPeers** No content is currently available. - **bytesFromCacheSedver** No content is currently available. - **bytesFromCacheServer** Bytes received from a cache host. - **bytesFromCdN** No content is currently available. @@ -6704,6 +6674,7 @@ The following fields are available: - **gCurMemoryStreamBytes** Current usage for memory streaming. - **gMaxMemoryStreamBytes** Maximum usage for memory streaming. - **groupConjectionCount** No content is currently available. +- **groupConnectaonCount** No content is currently available. - **groupConnectionCount** The total number of connections made to peers in the same group. - **in4ernetConnectionCount** No content is currently available. - **internetConnectionCnunt** No content is currently available. From 422a14b801f78e8ac4c3c49794b36685f0d4cc91 Mon Sep 17 00:00:00 2001 From: Brian Lich Date: Thu, 21 Mar 2019 08:18:42 -0700 Subject: [PATCH 083/724] new build 3/21/2019 8:18 AM --- .../basic-level-windows-diagnostic-events-and-fields-1903.md | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/windows/privacy/basic-level-windows-diagnostic-events-and-fields-1903.md b/windows/privacy/basic-level-windows-diagnostic-events-and-fields-1903.md index 4d3aa705fe..9e412991e5 100644 --- a/windows/privacy/basic-level-windows-diagnostic-events-and-fields-1903.md +++ b/windows/privacy/basic-level-windows-diagnostic-events-and-fields-1903.md @@ -13,7 +13,7 @@ manager: dansimp ms.collection: M365-security-compliance ms.topic: article audience: ITPro -ms.date: 03/20/2019 +ms.date: 03/21/2019 --- From 9f185a1abed0ba5e92b919925c6c5124b3eff260 Mon Sep 17 00:00:00 2001 From: Brian Lich Date: Thu, 21 Mar 2019 08:18:49 -0700 Subject: [PATCH 084/724] new build 3/21/2019 8:18 AM --- ...ndows-diagnostic-events-and-fields-1703.md | 2 +- ...ndows-diagnostic-events-and-fields-1709.md | 2 +- ...ndows-diagnostic-events-and-fields-1803.md | 2 +- ...ndows-diagnostic-events-and-fields-1809.md | 69 +------------------ 4 files changed, 4 insertions(+), 71 deletions(-) diff --git a/windows/privacy/basic-level-windows-diagnostic-events-and-fields-1703.md b/windows/privacy/basic-level-windows-diagnostic-events-and-fields-1703.md index 0f32a74a67..8bd5d541d3 100644 --- a/windows/privacy/basic-level-windows-diagnostic-events-and-fields-1703.md +++ b/windows/privacy/basic-level-windows-diagnostic-events-and-fields-1703.md @@ -13,7 +13,7 @@ manager: dansimp ms.collection: M365-security-compliance ms.topic: article audience: ITPro -ms.date: 03/20/2019 +ms.date: 03/21/2019 --- diff --git a/windows/privacy/basic-level-windows-diagnostic-events-and-fields-1709.md b/windows/privacy/basic-level-windows-diagnostic-events-and-fields-1709.md index e7b0b0b20f..d36fddc9a7 100644 --- a/windows/privacy/basic-level-windows-diagnostic-events-and-fields-1709.md +++ b/windows/privacy/basic-level-windows-diagnostic-events-and-fields-1709.md @@ -13,7 +13,7 @@ manager: dansimp ms.collection: M365-security-compliance ms.topic: article audience: ITPro -ms.date: 03/20/2019 +ms.date: 03/21/2019 --- diff --git a/windows/privacy/basic-level-windows-diagnostic-events-and-fields-1803.md b/windows/privacy/basic-level-windows-diagnostic-events-and-fields-1803.md index c3150d4aeb..cdb533230d 100644 --- a/windows/privacy/basic-level-windows-diagnostic-events-and-fields-1803.md +++ b/windows/privacy/basic-level-windows-diagnostic-events-and-fields-1803.md @@ -13,7 +13,7 @@ manager: dansimp ms.collection: M365-security-compliance ms.topic: article audience: ITPro -ms.date: 03/20/2019 +ms.date: 03/21/2019 --- diff --git a/windows/privacy/basic-level-windows-diagnostic-events-and-fields-1809.md b/windows/privacy/basic-level-windows-diagnostic-events-and-fields-1809.md index 680f731738..3f57313fe0 100644 --- a/windows/privacy/basic-level-windows-diagnostic-events-and-fields-1809.md +++ b/windows/privacy/basic-level-windows-diagnostic-events-and-fields-1809.md @@ -13,7 +13,7 @@ manager: dansimp ms.collection: M365-security-compliance ms.topic: article audience: ITPro -ms.date: 03/20/2019 +ms.date: 03/21/2019 --- @@ -4969,7 +4969,6 @@ The following fields are available: - **ActiveDownloadTime** How long the download took, in seconds, excluding time where the update wasn't actively being downloaded. - **AppXBlockHashFailures** Indicates the number of blocks that failed hash validation during download of the app payload. -- **AppXBlocKHashFailures** No content is currently available. - **AppXBlockHashValidationFailureCount** A count of the number of blocks that have failed validation after being downloaded. - **AppXDownloadScope** Indicates the scope of the download for application content. - **AppXScope** Indicates the scope of the app download. @@ -4984,14 +4983,11 @@ The following fields are available: - **BundleRepeatFailCount** Indicates whether this particular update bundle has previously failed. - **BundleRepeatFailFlag** Indicates whether this particular update bundle previously failed to download. - **BundleRevisionNumber** Identifies the revision number of the content bundle. -- **BundleRevisionumber** No content is currently available. - **BytesDownloaded** Number of bytes that were downloaded for an individual piece of content (not the entire bundle). - **CachedEngineVersion** The version of the “Self-Initiated Healing” (SIH) engine that is cached on the device, if applicable. - **CallerApplicationName** The name provided by the application that initiated API calls into the software distribution client. -- **CallerApplicavionName** No content is currently available. - **CbsDownloadMethod** Indicates whether the download was a full- or a partial-file download. - **CbsMethod** The method used for downloading the update content related to the Component Based Servicing (CBS) technology. -- **CDNCoun|ryCode** No content is currently available. - **CDNCountryCode** Two letter country abbreviation for the Content Distribution Network (CDN) location. - **CDNId** ID which defines which CDN the software distribution client downloaded the content from. - **ClientVersion** The version number of the software distribution client. @@ -5007,8 +5003,6 @@ The following fields are available: - **EventType** Identifies the type of the event (Child, Bundle, or Driver). - **ExtendedStatusCode** Secondary error code for certain scenarios where StatusCode wasn't specific enough. - **FeatureUpdatePause** Indicates whether feature OS updates are paused on the device. -- **FFightBuildNumber** No content is currently available. -- **FFightId** No content is currently available. - **FlightBranch** The branch that a device is on if participating in flighting (pre-release builds). - **FlightBuildNumber** If this download was for a flight (pre-release build), this indicates the build number of that flight. - **FlightId** The specific ID of the flight (pre-release build) the device is getting. @@ -5021,7 +5015,6 @@ The following fields are available: - **IsDependentSet** Indicates whether a driver is a part of a larger System Hardware/Firmware Update - **IsWUfBDualScanEnabled** Indicates if Windows Update for Business dual scan is enabled on the device. - **IsWUfBEnabled** Indicates if Windows Update for Business is enabled on the device. -- **IsWUfBEnaBled** No content is currently available. - **NetworkCost** A flag indicating the cost of the network (congested, fixed, variable, over data limit, roaming, etc.) used for downloading the update content. - **NetworkCostBitMask** Indicates what kind of network the device is connected to (roaming, metered, over data cap, etc.) - **NetworkRestrictionStatus** More general version of NetworkCostBitMask, specifying whether Windows considered the current network to be "metered." @@ -5033,19 +5026,14 @@ The following fields are available: - **Reason** A 32-bit integer representing the reason the update is blocked from being downloaded in the background. - **RegulationReason** The reason that the update is regulated - **RegulationResult** The result code (HResult) of the last attempt to contact the regulation web service for download regulation of update content. -- **RegulitionResult** No content is currently available. - **RelatedCV** The Correlation Vector that was used before the most recent change to a new Correlation Vector. - **RepeatFailCount** Indicates whether this specific content has previously failed. - **RepeatFailFlag** Indicates whether this specific content previously failed to download. - **RevisionNumber** The revision number of the specified piece of content. -- **RevisionNUmber** No content is currently available. -- **Revisionumber** No content is currently available. - **ServiceGuid** A unique identifier for the service that the software distribution client is installing content for (Windows Update, Microsoft Store, etc). -- **ServiceGUid** No content is currently available. - **Setup360Phase** Identifies the active phase of the upgrade download if the current download is for an Operating System upgrade. - **ShippingMobileOperator** The mobile operator linked to the device when the device shipped. - **SizeCalcTime** Time (in seconds) taken to calculate the total download size of the payload. -- **SonnectTime** No content is currently available. - **StatusCode** Indicates the result of a Download event (success, cancellation, failure code HResult). - **SystemBIOSMajorRelease** Major version of the BIOS. - **SystemBIOSMinorRelease** Minor version of the BIOS. @@ -5139,7 +5127,6 @@ The following fields are available: - **CurrentMobileOperator** The mobile operator to which the device is currently connected. - **DeploymentProviderMode** The mode of operation of the update deployment provider. - **DeviceModel** The device model. -- **DriverPifgBack** No content is currently available. - **DriverPingBack** Contains information about the previous driver and system state. - **DriverRecoveryIds** The list of identifiers that could be used for uninstalling the drivers if a recovery is required. - **EventInstanceID** A globally unique identifier for event instance. @@ -5170,7 +5157,6 @@ The following fields are available: - **PhonePreviewEnabled** Indicates whether a phone was getting preview build, prior to flighting being introduced. - **ProcessName** The process name of the caller who initiated API calls, in the event that CallerApplicationName was not provided. - **QualityUpdatePause** Indicates whether quality OS updates are paused on the device. -- **rApcessFailurePostReboot** No content is currently available. - **RelatedCV** The previous Correlation Vector that was used before swapping with a new one - **RepeatFailCount** Indicates whether this specific piece of content has previously failed. - **RepeatFailFlag** Indicates whether this specific piece of content previously failed to install. @@ -5307,11 +5293,8 @@ The following fields are available: - **IntentPFNs** Intended application-set metadata for atomic update scenarios. - **NumberOfApplicableUpdates** The number of updates ultimately deemed applicable to the system after the detection process is complete. - **RelatedCV** The previous Correlation Vector that was used before swapping with a new one. -- **RelntedCV** No content is currently available. - **ServiceGuid** An ID that represents which service the software distribution client is connecting to (Windows Update, Microsoft Store, etc.). -- **umberOfApplicableUpdates** No content is currently available. - **WUDeviceID** The unique device ID controlled by the software distribution client. -- **xHDeviceID** No content is currently available. ### SoftwareUpdateClientTelemetry.UpdateMetadataIntegrity @@ -5321,25 +5304,18 @@ Ensures Windows Updates are secure and complete. Event helps to identify whether The following fields are available: - **CallerApplicationName** Name of application making the Windows Update request. Used to identify context of request. -- **CallerLoglicationName** No content is currently available. - **EndpointUrl** URL of the endpoint where client obtains update metadata. Used to identify test vs staging vs production environments. -- **EventSbenario** No content is currently available. - **EventScenario** Indicates the purpose of the event - whether because scan started, succeded, failed, etc. - **ExtendedStatusCode** Secondary status code for certain scenarios where StatusCode was not specific enough. -- **ExtendefStatusCode** No content is currently available. -- **imeZoScenario** No content is currently available. - **LeafCertId** The integral ID from the FragmentSigning data for the certificate that failed. - **ListOfSHA256OfIntermediateCerData** A semicolon delimited list of base64 encoding of hashes for the Base64CerData in the FragmentSigning data of an intermediate certificate. - **MetadataIntegrityMode** Mode of update transport metadata integrity check. 0-Unknown, 1-Ignoe, 2-Audit, 3-Enforce - **MetadataSignature** A base64-encoded string of the signature associated with the update metadata (specified by revision ID). - **RawMode** The raw unparsed mode string from the SLS response. This field is null if not applicable. - **RawValidityWindowInDays** The raw unparsed validity window string in days of the timestamp token. This field is null if not applicable. -- **RcwMode** No content is currently available. - **RevisionId** The revision ID for a specific piece of content. - **RevisionNumber** The revision number for a specific piece of content. -- **SedviceGuid** No content is currently available. - **ServiceGuid** Identifies the service to which the software distribution client is connected, Example: Windows Update or Microsoft Store -- **ServiceGuidEndpointUrl** No content is currently available. - **SHA256OfLeafCerData** A base64 encoding of the hash for the Base64CerData in the FragmentSigning data of the leaf certificate. - **SHA256OfLeafCertPublicKey** A base64 encoding of the hash of the Base64CertData in the FragmentSigning data of the leaf certificate. - **SHA256OfTimestampToken** An encoded string of the timestamp token. @@ -5496,7 +5472,6 @@ This event sends data for the initialize phase of updating Windows via the new U The following fields are available: - **ErrorCode** The error code returned for the current install phase. -- **essionData** No content is currently available. - **FlightId** Unique ID for each flight. - **FlightMetadata** Contains the FlightId and the build being flighted. - **ObjectId** Unique value for each Update Agent mode. @@ -5578,7 +5553,6 @@ The following fields are available: - **Applicable** The count of mitigations that were applicable to the system and scenario. - **Failed** The count of mitigations that failed. - **FlightId** Unique identifier for each flight. -- **Friled** No content is currently available. - **MitigationScenario** The update scenario in which the mitigations were attempted. - **ObjectId** The unique value for each Update Agent mode. - **RelatedCV** The correlation vector value generated from the latest USO scan. @@ -5614,7 +5588,6 @@ The following fields are available: - **Count** The count of applicable OneSettings for the device. - **FlightId** Unique ID for the flight (test instance version). -- **Obj%ctId** No content is currently available. - **ObjectId** The unique value for each Update Agent mode. - **Parameters** The set of name value pair parameters sent to OneSettings to determine if there are any applicable OneSettings. - **RelatedCV** The correlation vector value generated from the latest USO (Update Service Orchestrator) scan. @@ -5927,11 +5900,9 @@ The following fields are available: - **ClientId** Retrieves the upgrade ID. In the Windows Update scenario, this will be the Windows Update client ID. In Media setup, default value is Media360, but can be overwritten by the caller to a unique value. - **FieldName** Retrieves the data point. - **FlightData** Specifies a unique identifier for each group of Windows Insider builds. -- **InstanãeId** No content is currently available. - **InstanceId** Retrieves a unique identifier for each instance of a setup session. - **ReportId** Retrieves the report ID. - **ScenarioId** Retrieves the deployment scenario. -- **value** No content is currently available. - **Value** Retrieves the value associated with the corresponding FieldName. @@ -6024,7 +5995,6 @@ The following fields are available: - **HostOSBuildNumber** The build number of the previous OS. - **HostOsSkuName** The OS edition which is running Setup360 instance (previous OS). - **InstanceId** A unique GUID that identifies each instance of setuphost.exe -- **o-Ste** No content is currently available. - **ReportId** With Windows Update, this is the updateID that is passed to Setup. In media setup, this is the GUID for the install.wim. - **Setup360Extended** Detailed information about the phase/action when the potential failure occurred. - **Setup360Mode** The phase of Setup360. Example: Predownload, Install, Finalize, Rollback. @@ -6066,7 +6036,6 @@ The following fields are available: - **usingBackupQualityAssessment** Relying on backup quality assessment. - **usingCachedFeatureAssessment** WaaS Medic run did not get OS build age from the network on the previous run. - **usingCachedQualityAssessment** WaaS Medic run did not get OS revision age from the network on the previous run. -- **versionbtring** No content is currently available. - **versionString** Version of the WaaSMedic engine. - **waasMedicRunMode** Indicates whether this was a background regular run of the medic or whether it was triggered by a user launching Windows Update Troubleshooter. @@ -6081,7 +6050,6 @@ The following fields are available: - **BootId** Uint32 identifying the boot number for this device. - **BugCheckCode** Uint64 "bugcheck code" that identifies a proximate cause of the bug check. -- **BugCheckPar%meter2** No content is currently available. - **BugCheckParameter1** Uint64 parameter providing additional information. - **BugCheckParameter2** Uint64 parameter providing additional information. - **BugCheckParameter3** Uint64 parameter providing additional information. @@ -6134,14 +6102,10 @@ This event is sent when an installation or update is canceled by a user or the s The following fields are available: - **AggregatedPackageFullNames** The names of all packages to be downloaded and installed. -- **AggregatedPackageFullNcmes** No content is currently available. - **AttemptNumber** Number of retry attempts before it was canceled. - **BundleId** The Item Bundle ID. -- **Bundlele** No content is currently available. - **CategoryId** The Item Category ID. -- **Categoryle** No content is currently available. - **ClientAppId** The identity of the app that initiated this operation. -- **ClientApple** No content is currently available. - **HResult** The result code of the last action performed before this operation. - **IsBundle** Is this a bundle? - **IsInteractive** Was this requested by a user? @@ -6150,11 +6114,8 @@ The following fields are available: - **IsRestore** Is this automatically restoring a previously acquired product? - **IsUpdate** Flag indicating if this is an update. - **ParentBundleId** The product ID of the parent (if this product is part of a bundle). -- **ParentBundlele** No content is currently available. - **PFN** The product family name of the product being installed. -- **Producele** No content is currently available. - **ProductId** The identity of the package or packages being installed. -- **S{stemAttemptNumber** No content is currently available. - **SystemAttemptNumber** The total number of automatic attempts at installation before it was canceled. - **UserAttemptNumber** The total number of user attempts at installation before it was canceled. - **WUContentId** The Windows Update content ID. @@ -6220,8 +6181,6 @@ This event is sent after the license is acquired when a product is being install The following fields are available: -- **AggregatedPackageFullNaies** No content is currently available. -- **AggregatedpackageFullNames** No content is currently available. - **AggregatedPackageFullNames** Includes a set of package full names for each app that is part of an atomic set. - **AttemptNumber** The total number of attempts to acquire this product. - **CategoryId** The identity of the package or packages being installed. @@ -6232,17 +6191,11 @@ The following fields are available: - **IsMandatory** Is this a mandatory update? - **IsRemediation** Is this repairing a previous installation? - **IsRestore** Is this happening after a device restore? -- **IsUp`ate** No content is currently available. - **IsUpdate** Is this an update? -- **ParentBuneleId** No content is currently available. - **PFN** Product Family Name of the product being installed. -- **Produc|Id** No content is currently available. -- **productId** No content is currently available. - **ProductId** The Store Product ID for the product being installed. -- **SystemAttemptNueber** No content is currently available. - **SystemAttemptNumber** The number of attempts by the system to acquire this product. - **UserAttemptNumber** The number of attempts by the user to acquire this product -- **UserCttemptNumber** No content is currently available. - **WUContentId** The Windows Update content ID. @@ -6252,14 +6205,10 @@ This event is sent after an app is downloaded to help keep Windows up-to-date an The following fields are available: -- **AggregatedPackageFullLames** No content is currently available. -- **AggregatedPackageFullNaðes** No content is currently available. - **AggregatedPackageFullNames** The name of all packages to be downloaded and installed. -- **AsUpdate** No content is currently available. - **AttemptNumber** Number of retry attempts before it was canceled. - **BundleId** The identity of the Windows Insider build associated with this product. - **CategoryId** The identity of the package or packages being installed. -- **CategoryIf** No content is currently available. - **ClientAppId** The identity of the app that initiated this operation. - **DownloadSize** The total size of the download. - **ExtendedHResult** Any extended HResult error codes. @@ -6274,9 +6223,7 @@ The following fields are available: - **PFN** The Product Family Name of the app being download. - **ProductId** The Store Product ID for the product being installed. - **SystemAttemptNumber** The number of attempts by the system to download. -- **UserAttemptNum`er** No content is currently available. - **UserAttemptNumber** The number of attempts by the user to download. -- **UserCttemptNumber** No content is currently available. - **WUContentId** The Windows Update content ID. @@ -6304,7 +6251,6 @@ This event is sent after a product has been installed to help keep Windows up-to The following fields are available: -- **__TlgCÖ__** No content is currently available. - **AggregatedPackageFullNames** The names of all packages to be downloaded and installed. - **AttemptNumber** The number of retry attempts before it was canceled. - **BundleId** The identity of the build associated with this product. @@ -6314,13 +6260,10 @@ The following fields are available: - **HResult** The result code of the last action performed. - **IsBundle** Is this a bundle? - **IsInteractive** Is this an interactive installation? -- **IsInteragtive** No content is currently available. - **IsMandatory** Is this a mandatory installation? - **IsRemediation** Is this repairing a previous installation? - **IsRestore** Is this automatically restoring a previously acquired product? -- **IsRestorg** No content is currently available. - **IsUpdate** Is this an update? -- **KsBundle** No content is currently available. - **ParentBundleId** The product ID of the parent (if this product is part of a bundle). - **PFN** Product Family Name of the product being installed. - **ProductId** The Store Product ID for the product being installed. @@ -6410,13 +6353,9 @@ This event is sent at the end of an app install or update to help keep Windows u The following fields are available: - **CatalogId** The name of the product catalog from which this app was chosen. -- **CatanogId** No content is currently available. -- **CatdlogId** No content is currently available. - **FailedRetry** Indicates whether the installation or update retry was successful. - **HResult** The HResult code of the operation. -- **JResult** No content is currently available. - **PFN** The Package Family Name of the app that is being installed or updated. -- **Producele** No content is currently available. - **ProductId** The product ID of the app that is being updated or installed. @@ -6483,7 +6422,6 @@ The following fields are available: - **AggregatedPackageFullNames** The names of all packages to be downloaded and installed. - **AttemptNumber** The number of retry attempts before it was canceled. - **BundleId** The identity of the build associated with this product. -- **categoryId** No content is currently available. - **CategoryId** The identity of the package or packages being installed. - **ClientAppId** The identity of the app that initiated this operation. - **HResult** The result code of the last action performed before this operation. @@ -6627,10 +6565,8 @@ The following fields are available: - **b6nErrorCounts** No content is currently available. - **b6nIp** No content is currently available. - **b6nUrl** No content is currently available. -- **b9tesFromPeers** No content is currently available. - **background** Is the download a background download? - **bytesFrkmIntPeers** No content is currently available. -- **bytesFroeIntPeers** No content is currently available. - **bytesFromCacheSedver** No content is currently available. - **bytesFromCacheServer** Bytes received from a cache host. - **bytesFromCdN** No content is currently available. @@ -6639,7 +6575,6 @@ The following fields are available: - **bytesFromGroupPeers** The number of bytes received from a peer in the same domain group. - **bytesFromIntÐeers** No content is currently available. - **bytesFromIntPeers** The number of bytes received from peers not in the same LAN or in the same domain group. -- **byTesFromIntPeers** No content is currently available. - **bytesFromLinkLocalPeers** The number of bytes received from local peers. - **bytesFromLocalCache** Bytes copied over from local (on disk) cache. - **bytesFromPeers** The number of bytes received from a peer in the same LAN. @@ -6664,7 +6599,6 @@ The following fields are available: - **downloadMode** The download mode used for this file download session. - **doWnloadMode** No content is currently available. - **downloadModeReason** Reason for the download. -- **downloadModeS2c** No content is currently available. - **downloadModeSrc** Source of the DownloadMode setting (KvsProvider = 0, GeoProvider = 1, GeoVerProvider = 2, CpProvider = 3, DiscoveryProvider = 4, RegistryProvider = 5, GroupPolicyProvider = 6, MdmProvider = 7, SettingsProvider = 8, InvalidProviderType = 9). - **downloadMofeSrc** No content is currently available. - **experimentId** When running a test, this is used to correlate with other events that are part of the same test. @@ -6674,7 +6608,6 @@ The following fields are available: - **gCurMemoryStreamBytes** Current usage for memory streaming. - **gMaxMemoryStreamBytes** Maximum usage for memory streaming. - **groupConjectionCount** No content is currently available. -- **groupConnectaonCount** No content is currently available. - **groupConnectionCount** The total number of connections made to peers in the same group. - **in4ernetConnectionCount** No content is currently available. - **internetConnectionCnunt** No content is currently available. From 4a1e467b9c738b367d8ae564e83a09573ad3fdb5 Mon Sep 17 00:00:00 2001 From: Liza Poggemeyer Date: Thu, 21 Mar 2019 18:00:44 +0000 Subject: [PATCH 085/724] Merged PR 14906: Reverting file --- windows/hub/release-information.md | 18 +++++++++++++----- 1 file changed, 13 insertions(+), 5 deletions(-) diff --git a/windows/hub/release-information.md b/windows/hub/release-information.md index 3b8c20d44c..0901e6fe8c 100644 --- a/windows/hub/release-information.md +++ b/windows/hub/release-information.md @@ -11,15 +11,23 @@ author: lizap ms.author: elizapo ms.localizationpriority: high --- -# Windows 10 release information +# Windows 10 - Release information -Feature updates for Windows 10 are released twice a year, targeting March and September, via the Semi-Annual Channel (SAC) and will be serviced with monthly quality updates for 18 months from the date of the release. We recommend that you begin deployment of each SAC release immediately to devices selected for early adoption and ramp up to full deployment at your discretion. This will enable you to gain access to new features, experiences, and integrated security as soon as possible. +>[!IMPORTANT] +> The URL for the release information page has changed - update your bookmark! -Starting with Windows 10, version 1809, feature updates for Windows 10 Enterprise and Education editions with a targeted release month of September will be serviced for 30 months from their release date. For information about servicing timelines, see the [Windows lifecycle fact sheet](https://support.microsoft.com/help/13853). +Microsoft has updated its servicing model. The Semi-Annual Channel (SAC) offers twice-per-year feature updates that release around March and September, with an 18-month servicing period for each release. Starting with Windows 10, version 1809, feature updates for Windows 10 Enterprise and Education editions with a targeted release month of September will be serviced for 30 months from their release date (more information can be found [here](https://www.microsoft.com/microsoft-365/blog/2018/09/06/helping-customers-shift-to-a-modern-desktop/)). ->[!NOTE] ->If you are not using Windows Update for Business today, the "Semi-Annual Channel (Targeted)" servicing option has no impact on when your devices will be updated. It merely reflects a milestone for the semi-annual release, the period of time during which Microsoft recommends that your IT team make the release available to specific, "targeted" devices for the purpose of validating and generating data in order to get to a broad deployment decision. For more information, see [this blog post](https://techcommunity.microsoft.com/t5/Windows-IT-Pro-Blog/Windows-Update-for-Business-and-the-retirement-of-SAC-T/ba-p/339523). +If you are not using Windows Update for Business today, “Semi-Annual Channel (Targeted)” (SAC-T) has no impact on your devices (more information can be found [here](https://techcommunity.microsoft.com/t5/Windows-IT-Pro-Blog/Windows-10-and-the-disappearing-SAC-T/ba-p/199747)), and we recommend you begin deployment of each Semi-Annual Channel release right away to devices selected for early adoption and ramp up to full deployment at your discretion. This will enable you to gain access to new features, experiences, and integrated security as soon as possible. + +If you are using Windows Update for Business today, refer to the table below to understand when your device will be updated, based on which deferral period you have configured, SAC -T or SAC. + +**Notice: November 13, 2018:** All editions of Windows 10 October 2018 Update, version 1809, for Windows client and server have resumed. Customers currently running Windows 10, version 1809, will receive build 17763.134 as part of our regularly scheduled Update Tuesday servicing in November. If you update to the Window 10, version 1809, feature update you will receive build 17763.107. On the next automatic scan for updates, you’ll be taken to the latest cumulative update (build 17763.134 or higher). + +November 13 marks the revised start of the servicing timeline for the Semi-Annual Channel ("Targeted") and Long-Term Servicing Channel (LTSC) release for Windows 10, version 1809, Windows Server 2019, and Windows Server, version 1809. +For information about the re-release and updates to the support lifecycle, refer to [John Cable's blog](https://blogs.windows.com/windowsexperience/2018/10/09/updated-version-of-windows-10-october-2018-update-released-to-windows-insiders/), [Windows 10 Update History](https://support.microsoft.com/help/4464619), and the [Windows lifecycle fact sheet](https://support.microsoft.com/help/13853). +
From f2d49c94b2df327f96968ee77900c0fd398786d3 Mon Sep 17 00:00:00 2001 From: =?UTF-8?q?Dani=20Halfin=20=F0=9F=93=AC=F0=9F=94=A8?= Date: Thu, 21 Mar 2019 21:16:35 +0000 Subject: [PATCH 086/724] Merged PR 14912: go live to fix PDF publishing --- .openpublishing.publish.config.json | 6 +- .../images/MDATP_10_ClientApps.png | Bin 0 -> 11136 bytes .../images/MDATP_11_Assignments.png | Bin 0 -> 64761 bytes .../images/MDATP_12_DeviceInstall.png | Bin 0 -> 25936 bytes .../images/MDATP_13_SystemPreferences.png | Bin 0 -> 43454 bytes .../MDATP_14_SystemPreferencesProfiles.png | Bin 0 -> 174065 bytes .../MDATP_15_ManagementProfileConfig.png | Bin 0 -> 47665 bytes .../images/MDATP_16_PreferenceDomain.png | Bin 0 -> 65217 bytes .../MDATP_17_approvedKernelExtensions.png | Bin 0 -> 43992 bytes .../MDATP_18_ConfigurationProfilesScope.png | Bin 0 -> 20024 bytes .../MDATP_19_MicrosoftDefenderWDAVPKG.png | Bin 0 -> 29543 bytes .../images/MDATP_1_RegisterApp.png | Bin 0 -> 72221 bytes .../MDATP_20_MicrosoftDefenderPackages.png | Bin 0 -> 36294 bytes .../images/MDATP_21_MDMProfile1.png | Bin 0 -> 87339 bytes .../images/MDATP_22_MDMProfileApproved.png | Bin 0 -> 87752 bytes .../images/MDATP_23_MDMStatus.png | Bin 0 -> 5299 bytes .../images/MDATP_24_StatusOnServer.png | Bin 0 -> 18674 bytes .../images/MDATP_25_StatusOnClient.png | Bin 0 -> 82274 bytes .../images/MDATP_26_Uninstall.png | Bin 0 -> 22356 bytes .../images/MDATP_27_UninstallScript.png | Bin 0 -> 25667 bytes .../images/MDATP_28_AppInstall.png | Bin 0 -> 181465 bytes .../images/MDATP_29_AppInstallLogin.png | Bin 0 -> 36706 bytes .../images/MDATP_2_IntuneAppUtil.png | Bin 0 -> 56149 bytes .../images/MDATP_30_SystemExtension.png | Bin 0 -> 424956 bytes .../MDATP_31_SecurityPrivacySettings.png | Bin 0 -> 96747 bytes .../images/MDATP_3_ConfirmDeviceMgmt.png | Bin 0 -> 101408 bytes .../images/MDATP_4_ManagementProfile.png | Bin 0 -> 49758 bytes .../images/MDATP_5_allDevices.png | Bin 0 -> 47578 bytes .../MDATP_6_SystemConfigurationProfiles.png | Bin 0 -> 37942 bytes .../images/MDATP_7_DeviceStatusBlade.png | Bin 0 -> 27232 bytes .../images/MDATP_8_IntuneAppInfo.png | Bin 0 -> 62416 bytes .../images/MDATP_9_IntunePkgInfo.png | Bin 0 -> 37053 bytes .../images/MDATP_Icon.png | Bin 0 -> 987 bytes .../images/MDATP_Icon_Bar.png | Bin 0 -> 5881 bytes .../microsoft-defender-atp-mac.md | 489 ++++++++++++++++++ 35 files changed, 494 insertions(+), 1 deletion(-) create mode 100644 windows/security/threat-protection/windows-defender-antivirus/images/MDATP_10_ClientApps.png create mode 100644 windows/security/threat-protection/windows-defender-antivirus/images/MDATP_11_Assignments.png create mode 100644 windows/security/threat-protection/windows-defender-antivirus/images/MDATP_12_DeviceInstall.png create mode 100644 windows/security/threat-protection/windows-defender-antivirus/images/MDATP_13_SystemPreferences.png create mode 100644 windows/security/threat-protection/windows-defender-antivirus/images/MDATP_14_SystemPreferencesProfiles.png create mode 100644 windows/security/threat-protection/windows-defender-antivirus/images/MDATP_15_ManagementProfileConfig.png create mode 100644 windows/security/threat-protection/windows-defender-antivirus/images/MDATP_16_PreferenceDomain.png create mode 100644 windows/security/threat-protection/windows-defender-antivirus/images/MDATP_17_approvedKernelExtensions.png create mode 100644 windows/security/threat-protection/windows-defender-antivirus/images/MDATP_18_ConfigurationProfilesScope.png create mode 100644 windows/security/threat-protection/windows-defender-antivirus/images/MDATP_19_MicrosoftDefenderWDAVPKG.png create mode 100644 windows/security/threat-protection/windows-defender-antivirus/images/MDATP_1_RegisterApp.png create mode 100644 windows/security/threat-protection/windows-defender-antivirus/images/MDATP_20_MicrosoftDefenderPackages.png create mode 100644 windows/security/threat-protection/windows-defender-antivirus/images/MDATP_21_MDMProfile1.png create mode 100644 windows/security/threat-protection/windows-defender-antivirus/images/MDATP_22_MDMProfileApproved.png create mode 100644 windows/security/threat-protection/windows-defender-antivirus/images/MDATP_23_MDMStatus.png create mode 100644 windows/security/threat-protection/windows-defender-antivirus/images/MDATP_24_StatusOnServer.png create mode 100644 windows/security/threat-protection/windows-defender-antivirus/images/MDATP_25_StatusOnClient.png create mode 100644 windows/security/threat-protection/windows-defender-antivirus/images/MDATP_26_Uninstall.png create mode 100644 windows/security/threat-protection/windows-defender-antivirus/images/MDATP_27_UninstallScript.png create mode 100644 windows/security/threat-protection/windows-defender-antivirus/images/MDATP_28_AppInstall.png create mode 100644 windows/security/threat-protection/windows-defender-antivirus/images/MDATP_29_AppInstallLogin.png create mode 100644 windows/security/threat-protection/windows-defender-antivirus/images/MDATP_2_IntuneAppUtil.png create mode 100644 windows/security/threat-protection/windows-defender-antivirus/images/MDATP_30_SystemExtension.png create mode 100644 windows/security/threat-protection/windows-defender-antivirus/images/MDATP_31_SecurityPrivacySettings.png create mode 100644 windows/security/threat-protection/windows-defender-antivirus/images/MDATP_3_ConfirmDeviceMgmt.png create mode 100644 windows/security/threat-protection/windows-defender-antivirus/images/MDATP_4_ManagementProfile.png create mode 100644 windows/security/threat-protection/windows-defender-antivirus/images/MDATP_5_allDevices.png create mode 100644 windows/security/threat-protection/windows-defender-antivirus/images/MDATP_6_SystemConfigurationProfiles.png create mode 100644 windows/security/threat-protection/windows-defender-antivirus/images/MDATP_7_DeviceStatusBlade.png create mode 100644 windows/security/threat-protection/windows-defender-antivirus/images/MDATP_8_IntuneAppInfo.png create mode 100644 windows/security/threat-protection/windows-defender-antivirus/images/MDATP_9_IntunePkgInfo.png create mode 100644 windows/security/threat-protection/windows-defender-antivirus/images/MDATP_Icon.png create mode 100644 windows/security/threat-protection/windows-defender-antivirus/images/MDATP_Icon_Bar.png create mode 100644 windows/security/threat-protection/windows-defender-antivirus/microsoft-defender-atp-mac.md diff --git a/.openpublishing.publish.config.json b/.openpublishing.publish.config.json index 294efd050c..70cc3d7d3b 100644 --- a/.openpublishing.publish.config.json +++ b/.openpublishing.publish.config.json @@ -551,7 +551,11 @@ ] }, "need_generate_pdf_url_template": true, - "targets": {}, + "targets": { + "Pdf": { + "template_folder": "_themes.pdf" + } + }, "need_generate_pdf": false, "need_generate_intellisense": false } \ No newline at end of file diff --git a/windows/security/threat-protection/windows-defender-antivirus/images/MDATP_10_ClientApps.png b/windows/security/threat-protection/windows-defender-antivirus/images/MDATP_10_ClientApps.png new file mode 100644 index 0000000000000000000000000000000000000000..40c268666ea59b9baebdb38587bfac95ebfdf5b9 GIT binary patch literal 11136 zcmc(F2QZx9+xG72y~XNX5LSs!bP^FYi5j8{(L?lJL-eSL7E%b&MO|H#=tQrJuq1l# z?~&jCo%w$=@AuApZ9X$B>)G=>=bZc8*L7dl9jT?EOoUI14}n04RPHN1fY*mb?hEK=Hs_8s4uM}>{Yf%$^^F3tD1?*q@t8B~lh#aeO2ZRF(0w5$h1xtJex$LWv-iQV@nrBJx9z#MeG z`A6)cLCUpeb}e*MFcAQO5M_(a9VW!|6ACmQYfK&;$gj0xnDFE6bqk zS1EP^@Fp&b#en(xm82VXeUayVIJktg^#g%bOG^mO*}?B>%WiUAJ3BkgEUC%i;nsrd z&wA5F{s=xjJ(c!3R7(?Jxp@^JSxIF*)<#9qU1hWM_^Z|#M9+xf{QdEqvadgzs)NHyq zoSsZ#wz9I~Z#s8*@?`3p-MEyV6UPmF-luiKNUAe=DR~7iqU+I)$eR#c{QONr%z7`1oLtdd}`lB--SffK}Kg z%R`vDWJ>#A&06by z^ibDKggkrsR05ka*!C*>$=&0nIJSk&`Yq$SmutUEni$_ESCp4ylQ2eG#F2wqsuH|jjED`tOL@jPkRXZ^~$-yiAQ0h~bID}O+5rhf~ z0~;ob*A1KZDvF~nH@&*N072+^wo&bMFKT>$|7GQ_gs*%1F{ftMOG6<+L9K6r)P}M? zhhJx>YP=7)lc1s=`{;+-60Yq1P3OP(XS@vzCXaWPP^cMkahJU^i_WRj>MC>Et{HS# z;{)qzi8#-|0@nTddTZ@6rlgZn>yhXLO z5;Nb_?=@Q}-ewL*$nA#U>essb`lyoVOgt;Pf1vKV0^(B6%}pc(npjrvc0>h5_79Mm z^6QsEL^bLkI%tw=Ni#<)HH<*1JMQ4_Z_5Px&~P03YW<3xZSWB@lvh#d?n+>*9irgW zkb6W(D{OPHK1#)Bw9N`~LxfHHErK*p=YHCyGOv}2{PIBeXU|rw#mG-^NFoN>Y<PcOCdER)oshFJp8L@p3#w-`eLoic>;jx>Xob1a5%>uc_;=HSAs6Cw_ z4Lj014@1D(f}Y9U0pq1O(>R9~#vo=AR*qIzmIQjf>8kgw&_K5A)^|LRnZ(HR5T%LF zmXU}3X?`aN!NhMzU4E9V`(FAEn(*yV9}r7OMpMqsnU~9M#OxZElaR|VH;EnfW}(V* z8qzP(q|yr@sM2J^74YYq0-9DERF3Up?`+nvjRvKP4UddS1QD;cWv=xH+0ox|M=<3< zNcli~ESn_RIyGJ2|HThjpm4}c$Z}|4zi!Bs%nDP z&I8$rQZtNTueYdYD2(vUFsOoo>(#|kJ&9?R7?XCb#YTcky*_Lf`#{&oDB6#1bNuke z_xy(+JSl@1ue0_|e}llp@d24LdytL0{v=|LyNuZLOiC*)%=mRwlGLSRk=O<{yS0APEE6-eT^QoZd4rSy+Q*M{A8Eg zuVk4cSp%nAeecE6N9xL)#0|}Ptuj=y<}4!UAKzWilnszcA(1xI#Gbivy@ic=^pIb$ zsxG|FERu!T?_WD&=&F5BTrSC>f~@@fBt`KEbQHCkXKN^4M0@3QeKT7qDeFQzKLM_W zzTQ{;mfv$-_rz(QRy-rx%ivEH^0_?<JK<-C6%Sfu~? zB92l^wWR5?Zj%}0O`A9+EBTT(OL?Ek+mDiFo=9epSV8Z`fy11D`v%MZFV14ZyJ50# zumFI-qAY`${(^1LP3LmCYqZ_?uQ8ZS!$3<%=ipDpKwZGMqd$`s1XO&XO#N=Z$Gqk& zn;nYu%UE|=Hi|*ti(`d)tSRCUE=tMuta_$hSHZUF`x3IYxmo73VZU&*bgPckD`a zMofEjqTBLHeoETC52I_W{j{V5Z3X%es{2 z75~|5#=k)jx*h-Dk+C>`&TH&qX+_%x;YuFUdZv&nU@~^Y$X;FtQ!Dtayz=#Mg#QO` z4Ox4wf5~gSJhh_+nBc9G)3wkxtP{(v*MPsy{L1+Ld?FTG3Z-%iak`QZfG;W42t%c45|(QQW(D1s&rZT} zb93X-{n|A!aI`)y;k}PuA1!QnfYctVJpZj6&}_eT(iUfTq^sP2KJH}ve$U1~muh&2 zQF?z+(PPew^Vw#tBvFd2bw7Rd!f2w>s~@K8zgHUuHA?Nqive9D-qNG$6D2;)LToq4 zBN#-#6U`|hlN06}WkM{2(8=wWq;pAv=(hmzF;B?%j@HG7Kb0?x#_^jKTy2h9+pR0) z?@C~ZCZuTn4hTTeX9Qf?epz*C&Um|~^5?|#?F-GC-{eJWSzUrJ)NiHCGwR1y|GBdT zaO>+C_N4vJoIF=MOURqMt5#5sHC_(2;nj?8`5P#H5eWasUu*8xx%~HhVr*hNfU2`=;&OT%5uY^*+C9~<9UZ-VC`F<`Q z%4V1FLbh&h*ThNTBY&t5yOl$fbg-{}Co`oRA_Mc=^)>jDu_6O9%$<8Y!h(*lo{Yhx zA{+Ml?|52`;soC$IKK~%Fx0S?35|yxVtl_F1s|eOAxXlLqE}{2N^tSy4zWn-hA|E; zwA*QDXe@TVkdY+4g=O^aT|+XX?D#@$amYy;0+MpeAp=oPl)ThEi`?&T{LH!+QL-s7Vh|tn&L;+cUWNq=puWv96KMTv7dJ#C-hrC( z-`<(f`;X)P6M<;6E ztdS<>G*|h2Wa724eGJL`cL<0yBZ0z0caeAED*o#Ws5fPj)SJo-2}$DA_$HddFP;;A z=*wI>Lr;A+8w|-o*WLtcV5~we8!D{@-##{1W|Bmewc!&psTJq9c88EHzF2;69=MzM zYT7^TXbweNGDm!MSXQ-4a+p=KK3cNG$m4*wDdnYR34z0?*EHsyA~GV%a;PDu7M!I7 z_RG}OA}(Z&OZzU3Fa?)cDYckY1t$rScvFKqv&ioSo$uVNz1pKs);;1iT`;XpR7Z=CO^HV%x$9luIK>-Un&fJNqa#7L$#1X*BxG>ieIZ^=Z&#o+Ka`~ z1r9!VRU4S&UUqBb23p$Ml@8OQUsFb-sQ4XcYRbyXD`a1Wr+ISpmRt1{6c$Q5!AxbG zkUQahoaDj{hf{Wwlar-n=jVF^9xkx7bwEWL9;lJx)!-$FOY6dwT9K`bwdRYA%FZ8~ z6L7ONn-$3~biaMz-O*XH=s2y4TD>}1gJtklcaACQk?!#axN+RK{S z%u=c>?|w_Us(X)KRgDU$K48Ts?1G6mtk{^oc_^#l{BB;%Q2S)_%pD7Mta49zufBc} zK0HTU{mt{>clPb5Bdk(NY`D!CXF*KkxxkDkp;=SCX#cNC=o1Is8DFq;bhLlw$FIy$5sC zFtT8SrwxuCO;lEYiZ1@Xdii}{=;}NNX%^K#I_BYQ$i7}59%E>*z}?-M`Yoi~&vKr^(LYbAg#^k`QO!&8ZJl=qNJQJLD78@bta)Sq-ot1_lNi z8nJpWA~Ms6dInW6CmB4GapTA5{f?f}s;2VAsO@blHB1b43&+KNW-QI=+PO==uVX;! zrBtejM`#z^N0%aAzAzKqd1K0*@ImO+Uci8BYoTl{i$xG}FXqZZWx9moY9$A`6|g@q z4{5Zxxw_Rqf>i{;hRrAnWNa|dpp+=WU;Ejsv!VK_UU(!R$6tbI%7UuYXx z4Q~s+TGYYBq!)LF7zPD#A7Hi!FGOqOIlNh};|fZ6IYgm$T7YPVw#KSscH;V^5f>r- z7eEzKBA(k4`9Y}B`+CKA+<2?6iZ{F=KjuGE_Rkydpsou0E-t4^F7*!wK6}|s?tATL zb1yiDgYfxjYHF^Z)JHLq1NSecGHW!liNX@MaiQ0p#A>-6Tcm=TEwQbcsC1x`)>E^W zz%KAro|zO3bLNCl8>Om9&llh4bBoD2)sT|G6W0u}L%Bd4`cs35 zQTBSC2Q}MI2~F2ZyI-9_m+0hWIn?s}Y-Yu}+#gOi-v478MD)w?A|>9}U~poB`mIrk zaYLO|54>cU4DBd(uw!ez+S)_>)x;b}d*860mHYto?b4(N-({a-KqfLd;GpYmwM^6E_k-u} z44+(`yKTHCDd^V`_TqcN_LSFL>1gC;9KAo#W6lmY_PCF2MZ^>-l2WS9gwpQE-+Ak2 zwr$D4oR{0J-tp{1BsO{JmcQ&DpfL#=D*u2*517gS%-A4~kQYcIa@^UTc>KD(V<+ZI zI&QZ@`FkI6pPZfA4N4Cgll{b31Lx_=0n`nPo$A>po7-8H=;w&3q0KAUcP5^W7)$wi zHV{Jv1-45aG1-2HG=i+{@){b%E~qb$^N=h3X5ACyO=gks+u|OtHhN~<-GZ1QPkRqz zR=iF1Kca{u)YA%@d4gw&?t0ItV+iN`*kqOW29jwm37f&-(fx8nety1wwIhSmTVYXA zI2@jmI^P~3a)^4x^aQqYOXkrxA7u!0gMX&2ZGf<(tQ!Ls$ywIVL zO7MY8E-VGBuAE#1wSG>?av5Ug;Q`xdFkbw0Z(TwB?+t-uJF&zCNutTl=q@Rqf4La^ zyZ6@D!`wTI`)ebL;e=~c*w_WeA*4?=k9vZUNMxMMDSD%Ney+lL;BaFa$odV~ETJ`{ z;J#U1(!aR_!*HTfe7!cGubx65Oa&?MOLE|lFuwc*xe3eoia#{^vI4=y%{^7+VEFVY zLm?Hv@l4GN3oEOeg$%IUJ8EfGJt;bR9=cwgkUg)Z7%_Vp8T0BxqEgj3CfQA$)`} zFNdr6a-Bvp%b9QBJ4}@3l$8w?zPiQB>j%U%z^j00m(XUzB<{?7>p9-rfsSZ)cRMD? z87Us)^SQ!TYtEy7{?(v#k3(>MdA|MW%KDJ9nduh616#U@Pty4iUyloQo|-j!QMr%L zu?nD{-7UQG4GTx_z05;!@$mF?ckgf$ zXZGI4RaDsJR)Iaj02mLJ2nq8i!Q zj&GZZ!tAoX#!v^We=u|kW=!%wV5r4={&ObZ?Uua(**M+kr90L4km(F>&B>na>`%j? znOlu#e1!cJ*nvUD^b#%)!$k}PN>*LpY^unvxGywAv0dLpFV6|lEm`!Jl6B06>8iyk znvrTWr!?FC%zSp69w)&DHnR~;mb*%^T7l*2vNyZWqys;fT*bleY*yb3ziF>}p0Z$8 zDV>Uj#A(6>CQe(Ie!xl$sprB?r3h_cKA-6E;y6#mXKxYE($VooQR|f$&z4(7>8;_4 z^$8G-JR>(Bvs_m&SM&~Pd1-zb7DS_Rk&>~pu0CoHHRd2AP%8P-k}!yAWI=pl@kcUGEiYZnbZ$## zn?Xw{UK+~qmQ=!>KJ4YssOp4C)rdKTjPeEk6P;pM8dVCG$s8Af`?8yFRg96N-T~3_ z^AY^}%WCV+<&k)EShG(JW>kHR5pTfG2zCI0uWizmbKah>L4guVcI=b!r{}i_x$cP zVYPeKy`NN5OY!29T>ghxVfAEl2l127zY~sAe_E=4e z8LFZ5$byI#7H794+!SW($4RoU6BD!gSQ7r*TzCKle^GrSaqG1$38A zy8H|cOmZkJ#FghIj3Asy*53G`Y3bHe(p+V-CIlqminBFi#`hu{H`ilGx*YP3SxBg2 zFCd$l{3GkUmF+We$+yD`$~*<)de5FHFq%`yk1oz;tWVurhRa*xvpcdXm8Lu1hSixq zpdOr!FCiG%VxzLEQCI8T3^%HIX#V(@OKA!Q4zaVL5kZ^1A)z8at#TaWx0u$o{`qeX zoh~LhwivA)K-KT$c7eRs-f>4G$TYiNdnN-^LAjuu<~?I(!yK zAesLg68{&1C+FHVqI&bc!D2s>RIl6&QHm<-qCMBo~*|2p14c>VwMmJ)yNmoIC; zG87RJF_xYLLeG0P;I^ZAg@uJPBwSZsG5G^Dt@Ax8Uj=$dVd37_YmZ(&?~YZ=+DP6j zLK;B;_drO@@!npL*G5^|>FVk>`Cp_U3|hHEfOW)p%~C7zIsjngIz4{$h#Wr*n7XE^ z$;sa;D+e_-Sr?iY8MLHck;;EMvw}8y^zIj5vsh|ye&225PZND64s;#+0!I zQBq!Pw~<))XFRvJ-$%XxCt-obzBv$T;&+g|YU|M8xw9yJG=m}gL^_qUAqWgzD*agE;jFr(Z()v0rAJ)qr+h^RTucf0V~bs24Ob?J`UOrMBV@B z&vjpSFQ}^e{3+}FGsvOjlyk=lu;6`X;LQ~3m1GH+wazv8pt=VJvZcIss~o1e2yAU_ zSAf3>41UmTFpwcp0lEfgm#fVd&PPl9u{b4jdj@k9U(^Zt9&anYB5rwXU~uyDvF4|b zAEW8SHa(io7&N05ag3@oQwuGzb$C{s?AMj#bML-|1uuXzx-@L9|qrKGe7uf%*5mv9TC9FSg@R1Lb1Y zB2F6a&sVVFF=`XWJW=bq3Y_XqVA;@h_{LsJUap$rhvjj;nOK7Pa;Haps! zMQv0{C*C!H6p=QDt;=&-gx)9pd#HhzB<`X7sI&GANUi{2)Zo7RL&`^UK2Bz4ER=HE z29Wyvd@d1@gG5c4=g*(#z_|GMI&gusHZutJCm+I009qcV2M6VvNLBt8F43Wu&_7^Z z7WOmqE;$GWg}ru{fBbkL^I$d$Ar4wFBFNZc=_Oz)pjU%Xys)qk)RmKOg{)JOl5X6% z5zQoJRe}ZXCAn{Bl-2&(I z5uD#x3JiW|DgXHKV{dQCR?_ofRsM(28*sSH@j{4i<#w{3aSlbo7ILqDp(O;>1V|X@ zC>RqZVR;kuuc9j05wJcBpr)#vU$KTo{4*OyP6EJfNtk2^Z*BidH6dn@Od4koMN9s* zjnFU3nZ?9X1G-JO7g~UJonKONL>r2x{pX)UVq~HJlz9JJ{?Z#Bf>?YOB_|F>gTS_Y z(rWsxr8EH*`UfCC-?`}5tuDyNto^$vEC%n%_d&`JB@MR>dN2swP*5Yj!Qz$&X&h8Q z_u=`N4gYHwlEop=N7MX8$kV&u1N2>b3$FZk%JfK#E4g2nl)QeR$@AY2tU8c@1Upp+z4_=#JOSgN1jG!IQc z@99bYZRI^4Uw_KvV!nS$I5vXtM(@@KV`8aSM;%gyvD4de1}1ujZWD!^zJ4Fz`9a+z z0}7LuJMt!puOH}9{f%qyc6H4BpxV9E?a>S{ssiOF6KZa3+=v$evd=eGp2{*vVQO$i zZVi}NAn)d~Npo{&-U3iMJUpDj_mmc7eFB25y5GgK^&V}tz#azYY;1gdb!CN^Nk;1C zO)KDd3Z(T^13mgBTFW;JB>`HWhCV1?M;GYxc>krcQdmU94aBj7Vs#ZOBfjay=>a`E zU=&}zbX&?hIBWp#*~EM8Q%6Tfoa`mF#i=NJC}|*0OkcX#5w3xpdUH~?>#}fW*QPkf zBcf)B^MKEbl(%J>L^^&#+%Q6(=jYGZuVEWN7zEtbfAZ)RTUuMkF-p^tL*LRpVd3E+ zF!^rQ7QQj{t+2S5xCC_Qm{##|amn3tdj8z&VTw-$m7oUdss}+g+c+dH=Hw(7%?j z1dct~%AAt8|M@XMZD$S8H*#fA@$9-HeFwoNm(srL?d{EV13zw-gJ2VE1Mr|Ga1{wh zu^Um>eM4KIEv>vwJWBw;d1DB&x!Doc8xVlaTC&EWN+C7BG- zXw1#ckm4ARWeV1w?OwD#((}dR#}pbzoEjNv2?@}vag%_Ul0_UQ-@xe0JlTsc0ausD zPZrN27XV~v>*%obJ%;}rA0K!tw0eym03@|8_Oh>}%vv$oJ=;HwgDef2$UxVg0By&z zScVu`M;w!ht}fh7F(Vy38#}>_4<_E6QUvnY$%~;w6Ne-RCPy967y%1`Cf&fbP=*tu zy|uN?Q#TW^0A*zmFoiIQ_V)KzeI-l|WS0gI3mT6~469=~cbq@x<>h_+sP)J16tSaEwT!_`9TSQ=@i?*i1CRK~OJP!KNmjWK+DNbX@vEUNV#^@b+Gc(kz z$GjhUkfnq#lytoIAdbFDFMf^93Fp|6H9w!-7{+>CHqCke=0yerJ9O4(tKqu)YATd; zQSxt&geG7CGN~zZVhOq~0FdXYr>CT*u8M$81w|SV->#1IIC?2d-&LkI*90fAt* z5n_X%?0hFU2Y+F?JXBYPlnyYjgMZ-KC}}D|AQf>WXe&JMZz3m+M=lTuc`N1*R;Od} z69@zydq-7C4`#l3?(xR7J$aif_43knrw-fw&O74X1&yrvKIQR z24C+54n7w@!n}#}Rpx`+mgV->tjjC#sG(fXf{8gOsi`$INR{`3uZnYsKMdjK4#vf9 zELxbXWVyvFw(;cp*WXXFSE~nlDy=(XS)8?=Wkthoh<*C7zS`@$HuP2{jGX1xzrNXD zN#Ni3A3t4Nn_ujgoHOMKrc@^60AH4(ldl`#el`woR2$8bb}=Bq{1EesN6X=7s?uSj zU`n5;!s=Pi4VHht!m0gP`pUND_0fO4=CQX@Li3M{5puk0ol==UOcw3`sQ-yy19Q

Qr;H@j`HsWi>?gkn z{PT5H@(J&2J9y>pK1aXYCG97gv`3AK|2*BCuUFk)>mf|QsbcB*Sz=P*{QjXz%(L^; z1G*ckbNSDgdy;qlYjM(+oo_A2@1{T7Tj|e~a99}6=KofmF8=(XuI}id--Qbwi8D;R zTxlb?sJR4|l1rYf1{m3Y?X)uH@Js&b0bUpf=SaNxUx98j>Y{=Gb!74Q> zbeXH>bK&hW&_lN4=eHy(YkX4PoRrzfyH6}9;o+jy?X^-^vZZj`ABjEC=sxSQ+D4J>AX`!pl`Jw@y`m)}J*SmKr4vNO(=gUY>PEeQdZA7GZHm{`&f?i19JX zcKHhQ(0N>-j8cc@i-mb$(yk%BHd5Gv)%WcyyxSo*1cTYh8!DCb3M6KYr61pGY3mG{ z&QCpjDQH+YWy3JYvTaRU>e20WwZm;C`;+r%`78Og4nFkhMj0FtNK$_B^$TX>JhRNg zzPPMv*_%#JO%)H@&(@#(a-XXlVnnr&2zj6MTD*Mm;`bc<5{~YLdvBP`{T?ryJ3pFp z99vEoeM)R>b#A%*5;g0!bH42km$^jmjh9(C3O>-wkg%U9uXeL{oOAinbXn!HCa0aB{aCVO=h0gl*vGpMX-gcp*F;b52{pL>dObcLYq>0n@P>Pw_xRPn zd~bmjh_-lP9vu65hAU6^Fr4@4kdR@KSEucKXF;+qg5T*DE%pnwj^19HW~`tbD((8H zd6t!49EVY%+F3lq9GeUn$5>D_y@Jdi8?kEZXq(S70voyC(H|5om3X-*<(cHXQ;nAF5E@Mo{&%mwe>RgurY2XtD z>T$O%Tm{X(yN=bM%Tka6I)9mjHgNz_)X1wAM=IelOvLLV@HZC0{H3K(mfjM zZJD9=xjVj(grT^{v;|4y@dZz5?apzPYFz@Fg&VI*lj5GeZ)%U*dlF!_Cv5op}qTc-?@uYnLBKzDP*uq$&5&Lc=1} z>YCgsRCr32=HYI7i*@SJEpb&+i`9#}Do?s2bkd_&$yvjN4V@m(dc$J&l?|2?9yLyE&@Un!l>-ew+UCXaNu|(4q4C5r zl^>^SiUPSmH+gd)nodiTFM&R#vPXzw`9Fw*wcGSF=Vu`ZwHlMsi3d zG;$k#9U=_FLui|}!Ys>ajv^CRv6)z*#Rnv@OBdMIe7B#q)pg7pN};^lRbER`LwN@2 z!xYrNP0CVHPLqb$9ST|=M-fYqLs7*G1`O-FkMP$-&a*nsUoCx(?DU7Rl?Ndb2lbfy zmiBR;6mD?^#Hhib^i?#w$S{cPd;^IatXUNxU(=@vXXg&bgDtHt^eO zmdn8BM_r>8}7U91@Qt%GLQ?q~)v zOhC=hf6l^IQGO zSkA)8B_5^@-b7oYfSy!I`AXc`Y>EkW>>|l%Z2~RaciL~c39T=V>-{C8#b7Hnb+}F! zzs5en_t|=#ok&IGk74n))C$8nvcpl;Tf6V5T~DSCV~5&rE>`8yPp$EYNL+c;%c=Cv zLWP_Z<$WjYl>9~(iDw&aP?&yKlYN`ZEscj;v|9V*BjfR`ZEs}fg6A?jJx1JQ@gX?A zWv^{gu-xyY4vHdu7t!+ml#he%M>DtYld9dwAy-Q1w)W$c7Da~4<7ef_Iwx2?sV4;9 zB|>lJ`k>R@&wVE}fHUh}s-WE2=GW?%zj~m;kK4k-SUtOlbG-v^;Ij9T9dQw{E|NMw z!@#{ai;B4JC1)+2FXYikmHN!;>T1Wi#$U>Iz#4J#r)$8w{4Q4gUOG7Z`nnp=)Bo-H zXzZ=u#Q``3vCPucd;ymzg$sg6jH`VdqAWo?Sz2h1xy0HPiQ{<` z%%3y%XzH+lmbIVhbz7Efn!td6nv_YtQEa-H&EpnJ4~ON4$MFjZE)aPMDDq9c4lVwA z`Y>f^Zt58W{z9y6Inh>HjexouoPxDOA;zfFUsc^%Xgw5pe9(!KRCtswH7agqj!A*& z?!^QURo3qd97VNv4SQD^Zk85%Pp$g{P~hl?-d8yEC6_d7q}ij&<{ zxZG1X+L;@Cjh#wn%8j0epHCNRW$-)=Ah8|zT*VvZz118qa#qI{QoplmKd(_uN#`sWdN|HEI1P?o7TP2qM^;V0 zY_;{<%baTp3blylJ z`#ev5KlX-a7ID!2z25R2nN49> zcw~?Y`IZ{@jrVVBQFCv97v_^ba%PQtOg?Wn_9xJfG%QrEh`cg5DZf+e(#&HU4NStqzC zxw$VwP*|8$NF=Roo#wVN$E^<&xfn0FCe_(^=zWa@Ea#hrU08Zbs%Il*X|CQc-)#;useUPk zYNKf&5@U9sakl&U*$P6i7sQ6nYiP)3EeGwfb(~y^mbmI3tXT!)Qs?_c3csoy*>K32 zrI35Mm&{sv4pZNVaHJN(xo$^8Q3EnNi1f$NQui~Q4irAIux-mspwIeAe(qRPbdmG5}I^_iF`*>82qWM7%{Jr~SqjnlX_%shz*Ch$n3OYn2=pAum6#%5}^SM%e< zv4`1qHWUbmI_Z6*3A*EdFZe*NFgLk3$bK!sTIB-xzy~y6-} z`8LSfK9-oMa}R1A0+&Z!m&&1O$|JL>9e+C=jwQQpJ*3i25_g{WabV-tC6g!zJe(=5k5?JBNnH ztrQC0d;O9o9R8eH2FIWr0~!MWGtm5(zp{bIA`4Pj5tTvsWXcZt9O$yf(;NSu_Xt|t zvq1sosxR4@s{B+^(yzP$Ic1ddbOj7XobP@Cg#wz=ai$!@37zY#4CY>T^X8VPkU;9! zLBhKPu9^#I2RuA;udPa-v%~fTqKSAu0v8ry<2Gev8H|kp(B)ma)rvx6PB|uYP9-g+ke1BRl8F zEUI6x7Oj7b>U`OXwQ826prP7AVPlIrX(3~yI60>i4<^9RyzFncL)btRWySL75|Hc^ zUqq-&(#YaA6WDQHOzz-_xwY$u;e789hH*kkJ&)ezM|DRXjv#4*sVL+{G!&?q?GtN4 zNpZ^8_oEbfy>Nx8E7@5cWN*MX_X{{arQs4}<5)fv)jnDDCA~-? za_H+uL2|Bm7Ud4AJw`^$dOMjziNZPs(I4Wxye&HfCkO>S$gqTJa<7sGbJQ%=Ld4(o zhxP>-kgAxN(ovL>hAo-VTyZv!Ydqwj**&>Snv)=(n7A5+v#4%@&z0Cb`|(S^y_8ga z4V^TN7>S%#T3r}w(!w%XDG?S(Ns2>2`XisqHOwwVw=fBd89yiFICk}ocOi0(0b*fH zy7v_ySYfHYYdyj#&9V|OWaW>(K6@nX&q;SJ>8j?!7o6TyT0R5eL{@$s%EODZ9Z5;a z0%A8)8LJlDiDETcY|G%!xdr<9T$u98U0(9SU$mchzE10`r3`OpwxO<};g|9T&TQj{ zGz1H?;|$CO^me@p7d35>QI)2&FE`s3w6 z1;3q!BYaXQLNg7^j^guesN!I{O%6z*TAoeQj&PsNiq0Ib?b@19+whfeC2l(!X=wx% z*KNcjOGxT1KzVtcAB?XnjdjE@Io2-INomU+{BW3l@l}FP^d_Bc@LDUkTQYeTs`Lvh zx5TAZx901hku8_z18rMDIik?5-x0-q^9s7lSCz?|jctyR^Nku9+ELXlP}F+gUops@ zLT-Pk)U3`(wP>*;W&`Byv6zF6aX&yc0XSP=?y*cuk*45x0q$g4BoF4vN4L=uKV5Md;)}+zfL%m~Ap_8`hSVSv} zBs7vY(0BiJGah}Laom~&wQX=$ByPs{kp`FM(90e2^L<_Imbj50XOlZjKbF#ONK)%TzTMix?VKrxlxj8?zvw4pg<=? z;N%W(cCakqDSn1iaT%1Evm~A;141&#ZR$B;6X7s@V!?#M>5!&z9@g5?T0z{3<hrH3K zPHkCK+oVmdkKVE5h&r3k{&K2Cqtm?d{s4s3^7oGqyxFb~;gIN}9M8x(*j++#TTy@> zIaETKo!h98xlS!ae#fnB#}%oGm2nCeQlBtTaxqSUbzsM5$7`p4k33rhaM<;0`B6iZ zLG^$FGb}ZgzNVv;hqdvuqz;6Jhj}N9yQwVHA2D}vSY50(1vdS7t9mZhW%q|KD$1fS zM=sM^29$hf7N?s!b-w4PBtrG^>F|q#vN^YD01O>CK1uO&5B-xGoxzDSVyS_e` z*R7!UgjzvF*Mxd1X^kOc*6;FM2*mQAw}vxYnv6l7W@xuwPG5liS2$h66bWPyg?#yt z@)y6$i|LnjB_BSl1BB4VBkEX^F6Slj9V-3mU9wsnd%*3#?x$*=C$7Rh?2eW04VkBqFw?0$)kkHtE<_1e%Vm-?=KK{gb`L(r^&F}M(D93JurlF=0hw8J< zQYu2WykTBj)d%s4T)~w2&E-5MM&GR3tNbo~`N#Loud2#dtbZip3+{^kbrV}DH$jmr zG7y&$WJR)2fyrA(UPh%`lV8<$o+>ZVWR_->D~I<@m~m0=r{_@Gf^mX7=wElHs|R~3 z*%MqA+9FhB800*~vz6O4@~D&vhb<=(1^B0GOk0gL|K}CHlZc-kZZXMu?gP4{(rwGw zg+*dLOQ>N#ak@A|%9+!FgZYnv7)edOJcskDa#@b*(-;sYFx1)M2FmNY2Rz%Fs>I|n zkduy^>6R`h2YpxAUI*kpCPrV|p01|IsoVa(@ugSLnkKkeD_kZbi=EC^mNp8K(6b;TIDAl+l&EugFnpj-u4B217N0(xAXirfE{gIAFsLOMSdif4Zp9)A@xmc zMA|w4-@)t&7Aw92>9_X*q{V7fP5yhOb=$@urTM%A@hhm0wpG_ znpW0WS}hezd0)i-yF`X!5SF#im^I%+4pmY|M(#DS16tdK!6Kb?*uj|L363D*aE;e8 zl!6WTU(*_rNxVspJ)1@iK%utZq$p$V;1~m8SYf#|q$w2k1XY;%GO%AzSQd8tfnhLZ zTVsiVNW6h-s4rb?74R*p|Yj zBV(0Ks}h*>d;vEcV==*wxkl(?-C_VSVO)|vSxU02qqw5{r1>B2a4u=Pi&L5QLZ9~A ztDEZL;vmSC@|t5-QcPYd!4W-tWwK5Pe|jblZh03i(^|ketLKN`u>t|NuLL)WSb@0*?N39ar_Yl) zRR>!$@rh3F&(YgDeL@X(MQ@`6AG!^hVr$MRVrvQ!ikno~pP2K4Ts-sr^~UFXOT?GO z1qvpK`}f#580k07=>$y)tyc%K;m7SlYnu`i!z^HmLe$QnCgt;$z`pw@*IC1hoe64N zRp&JvOay9U(#q-m0C^=Y;#k}ab4pvlB>V*CQ@|TKJ4P**{> zvdm`-kQUz}TiGk>f&%&?Sn_~HpTG^b{#f)%jJ#C{;o`p>%{KAI6uqvSYbGh zlUg8L0`-rkNIN(7Q4gCriu(zudEvFF4kij#S=&-ABFm+&gq_B-Z9IBYfAgX79p57v zL)^y!_@ftw@Kf4ILsMrw{Lom?QN+y-6Gz1nu)+{vVk-86!bLx39}@ggADQYl}yLb{-f(Nzn%L<@Uu1nQrJ3js~0pWaq@3OEbyVm(;*(e|&Xj|^hZ*r7Q9 z;;?T9(`X&9NWvo!tygTpG&xMt-W1oA*gU4p_uvzt;j9HhoyX1G-_n}~V|KZQKZt;$ zW2{Lo-0=|L*LH-nAP@@hEjW`|o%Jwrbsi7b&+shcH6L8g9yNyDi?r`rH%y)^&r`CH zvV)t3x8c?Q{`d(Rw;}7Ya=#77oF|sfFyfbpNk}7xy8te{J9&9n4UaMGWxG69H;qYL z9f$=If_&fKr1L2hVCJsc=_#PIb8fyYBheH?UR_DNbHxn54H12;6}-i^-BCm43j(C& z^=;W*c7K_U706CX&7Fld5e>J1%vAtA13!WoLhf)9DyG3TYr-5JEH!*@0UK&ILP=9K z^Y8^|I*cMMN361O6jrEGt|57GGeAxP@aB0MBLEe$E21ssE6tHzI5+scbohdciT@N~ zE|7~trbxumU45AT2GEUt*ESnaTA`8}k=Koc9@lmc*6P$X-$?RXQ$d1hb8z)7i<=8n zleZG_Sv}V{>i0w_W?v>G?KEHO$PP6Ma!d)&Qt*?PGwnKkNb6Vui0lyj`hx{B=tYCq z(c`m#`37VQ2^1Xho-3K^0^pLZlW>-fwd3{4o9ntm%$9@x zmT~Z{s%f1%z!m6%)+;|sF#jFiaT!f1AmL@<$!FN4$Yjl0mm-1SE?NrtW5jslVP)Rn zW}A3fm|_sRp>gh$cjuvdq)m0 zbB^TV(DCw+9)67HSU-!mGlE1^MQC2lK%|gREJOV=A^Y63^f&4s5D)W^iCFatyqCfQ z#1Jc!K0$jTLzeMrkc^ z?ww#%mX-ThErD$sbz~Xln1UKS-uo)y^s3@szzXQAJ0D*;esA>kS-)f>DkgYAC8T)i zBV$o0jjBL|HbPO{4dyIOqcMJF3RYkWunq4ketK8+`$9*U5)4ahT&YD{c!j}GgPo2?Bj`hvFJXpCKJw90Y!qE0t ztAfE@ya%JU<(;isWs7IjPcJk{4ecR(Ri|4=uzR1KIt5R(0*(l0I*+x6pDJR{>Mb7e zXK@|Igm;=zsm&&#UM?&67=Ix#t@uMMHddTY<7(88?HZWQ$2<)05$_2WsD86BhmHm0 zQ{7IZ7l5m-*jkdM56gMmjK$5_v9!c3I-G9k8yymIeECy?F?sIF?_I8DQy+OSbb{Hn z-J*^Ir9SsqOdJ$0amw4y+~$`&1~F(ol3CF(3bqS?L!1(R@3>sJQw#De;(cnB>}@l# zo)L1m@Yw}!5fX)ssuPvVYx$TlH+iDZiy7J6yMPhXV`(I^`}R6II>JE-Ecf?kb3{vN z&Lko%YMkZ)InfM*nnIkV7x;Drg`S@Vw&kcwG;JXIm6)~9fIoXK>j>+~UQa&Tee9jk zn_WlAnfpVf;8D_P|AQ;@PZA~)O9svw1a~IP8g=!~3=$h1u&>Ok(%N6$kAu|k4y$>u z7R5kS3+*0ke$nN)F{DUC_r~TDtESDkwtn*ytK zQ_JILs}zmw2%yGkIQVHI@&iQwYp~}Lv?|N@A|Ef0sd%0@|HFuNOUVSldiikHti(S~ z2=YMQWv0W7{W`!;zkCD^ge<9L6#X+fK5Y1w^~$)V?pzsbOh%SMFY)A2R&-aR9W(de zpmE90-ZKY5Rlig%ohgS%-sR{SHlj(f5~jX){ZvGPbR8f@RoNmV*FZ@F-uQ{vvJMvwU7Nh7BLO%g$Lmn8Y4>|g5m^9vak63_P z1`1zDaT>;$>MqFT_{}Mj`d$2-TP?S508j`u8*yazEknYA@f=t&8eZ3?z3jc?H8=g` zDM@5kC?uEzVpXgRK{F#kt?jnhCBU%s0QgePI0S^I@?6{_pJze?j|*TTn_ZL^7IoV+ zI;;Ubu6Pkm>OvriAmT+PAHIc0kTt4BG!k=)I7LX$_r3)d01cvpb!-M6S{0e0HMU z-3u}#NY{?=)3LHsHa4VIMD_jp*C#vk){~J(%8f#-fM>E%IAeJ60PtUa(lDgu#cI^C zPb@qlN)0mSIj^Lp>U%alw-OoP7}KR-+2jwDVL6vs*qQ+0Rm3CWwVhq=^r+p~#xreU zr8?(}`8p`i)ch-jwA{7{?+!Yf#z{Y*QJ6IA7&MyEtQGZ*g6PE?<|2A5Ocx?FXww(D zKxJ3wzSEHbX*RWD*FUu&ZA-m^RnLyP87&uK@BfL$k$mB}O}}MgXc1&1 ziM24%HD!(i?1oEGx9C9gp@xIIxP^?S0YScb*}ney>%fBJEROFNf9c^vz`$$6h4f$r zSMs^ZB(0RX-(R`PWvGd?Ua-7nNfp?gmi7`VoDyE#enmx?^>Y03)Z!F3hVpgGzuEzF zY_i!T?Kk#8MfmMl#xQ;*Em0$Rxr1jtN;;a`ICM9#aI>@!N%jqKNiSn z`PvmOPX;57r2FpQmA#lBOT_L6dQkL~UD^CE`a{419s@LNl^BK_MkwB;SUdj>3D0t( zS1j@tyZvc>v}kYi+AkX0c;+D0y+nnT!LdD%S!!$sb7Zz_7B}W;YHP02o5SV-JwsV; z)rvoXY>Jx#rxqH@tD?7$4dV(&YAWvnBUf80F*%aD4U=8V8p60*2nl)GY) zf8z+xN%QLcG=E-ttxZ1UL$C$Pgb5ILia-;c>_e|d+Y5DGvwZ~=rauYBJZF|BZ2K9GENZRL8T^IuQ`G6LF|6w$L&a&-n`RB7T&g-}7@W2(_iS z{yRoM&wtem`n8j|>T{agpzkI?M3U`S zoSS23A@6p=V-$yMxQD{? z*#ipsF>Q(+bDTkG#ctUENasq(b|D>uY32zDyuZ5#=PS3G5{da@A( zl9><1zY}+Vk{Wp1KiE0VGdT`MtpCqn$5bSf9YFNTiwgtDc?E@O;z6%&2N*j#Jvksm zRxy5pQNxBSKfWiibrfuiYybU43o(bN^?z-sj#mKw*JY4RF*AqH%=;O`1?o1rYT@rb zTQ5VBmIjZuWnmY^Q~dJ*Eoo=n+J=v}2=WfKX~qZSMk$dd z)5Fj-;zZi&K^i?6zaS|8U#^Aov((IM@@Xn+RPc@QwdNX~Ku$Yet*o_5q;8&-BAQ9O zq9qV^p(mWx8b+a>cr0oAm;xajALD>oHP(M#HRsSi>H1*%JGs9+chpxq{B~2}r>mbS zImO(@32}XH1Llnw%z-GC#i3PC{=@5J{Fqt6wX6T}4gaqT{Qv#>)jzY0n3i2FAb78W zp%(B+==!o{#(xJ>O1J)Nxrm=w7?})HS4#-VDxjadx3kbPqA z$3B6_{~f>biUrz#vf=IUFSaiLRrhx$zyAv_1Dr;nATsqi7^`#J65V+V=BM+3ikXD_ z!IMLZaex`FMHPkuN-o9zZ`tTcQ1Ub-f2o?`AA-WWrmd5#s4ES-K%Zb(OCi!G#o-&O z^I({u`bhjH=+XXeKMEVM`+-ERGn&CVWcSD2JP&}_ul1YKVnIwFzFx7xD19u z@G=thFL@*(&^3?~t2yDRF{I9Oz$33x}+?~W5N2CCaR%eX06I{O` zu8sEFeub@xrY#CqEGUyA!ZdIRxflCIB=my86@ZlkqBeTh!VgXy3IIA~O>66BT=?~7A=SRBU9*6*ft10tf{QRsBNd0a4Uy;tTn3$LVvd?ar zQ0hSlgpcHb?%xK%pilb;0vMQ21Ko%x(4qm74_<$=lKEjk_TY!Efk0#oD7yS#K8fX3 z=?3-mf+H9fN>#Rwjy6zXL-XcG(M*!$i{48K>eP&6Ktx51<#o6zQbt(`rbYiVV)m~G z;DZpe0u_JU)TKXUK2sAIt&;cw>;?ajrQuc8GHapEEBYVA@>sF^RVd`1EQ`*#&-p}u zdu8r%IB6rT#2M28cIlz_OOSs&JW}U=Z7s=Ir*_2S|PTr@gqB(!$t$j{#V! zR91Wa43MgHSJHr9Y}U1;^d*>>-uqkk0KxH$Xn6Y1O$051CvReI0&%>ta@QFsh5!fe zZ?*Cpw;)Er_zS3OtduvubH5#yijzAu3K<*#A~7DiG=tAZ0o=YXUMpj3TD1J#et?Us zDPhN~**)=~0t{Zzg=3X^G*rnZ;}(%P^zHd*;T3SbG`wVLTObxsrh5u5*nCVxa}}XU zVwJ?J9XekL!AGx+w;Gwyj4+Z7U~f2n5>!*p!-8_lp^oRRlyk8Cl_(Tk7kTmGX|RCE z1Bj4A!b<9ivZ!rON&hYx{#D&nEeb+~TEIgvR6NT@I6MbpVInh}f%o@PA66>ST0+N& zC*E*hGttRZ)OUbC)O(os0f}OWr?WLpb#CQhB4A~cR!|I9SGZ2B4G9I}ZMuFDt&XVM zo&U)MZ|QL}K$66a0zd?HNNj?}@^gIxO}_EzM@5xcQnnj+uF<#Y$I)UzWn>gwgYqSt znWh0SM|CY&B^uZeX3-Y98RwxM)GE^0@j-5f48mb9h=*4)nj&PQKV&J1)BVS#$_WhF z&(xqm57zYKF;#;CvI%EvYm48l8;}Ivnuwn!j=w7HQavbeqE`XQc!YYVG`8b+dG!38gbgFJW!#^gNKQL8o)kvWo8+_2y#F1* z{o|?5JK2i-Jv({a)Z(kR+JQDuE8N@>%M$hB=`y71#h~n7H0=%1*T41b zFKsc?khI)y6k(tS!3GlZQf`s3f_f1e!z4Kp*WC2gZoG8v^5W?EdwlD<%ZoF)8f<38 zTG@Q2A4qZ&-hhstr%o}gJ@1`Luts?eUKD$lr|4&0WyvjGM>C`vSJ(`)vfapIPKvi* z`-V^TJOE!UR+!F~5M3P7nM_aZWx4mnnzs}uYmG0MjarD2rF6m{z{DlCe~0|(=5)5@ zYyHRSr_p*BZxmB=Io75vgZegRVmACWZ=K-xpyM}c%J2MYL}P4XBCSP9A|kBwEpoU3U`Y)>QmwWyV#~U|V5O_LjJRJV z$U)H-*fwL0NZaSNg_H(K2E+u69dd@x{%vsY7b*t*%6ByMTG7Q$wu@4cEX7%%iBzg3 z^Ln}dAmAC`et7UQoEJON^{M(|FqTKP17{ltO4Pg3NrS4JR>HZ4iY(-Jj7TUJP{+U( zIY#6}1T)%3N0gowF7Vn>`ZGkCTjpsz4YPzg6&^6Y!+XhVem~z!&zH(T%?yu`?_Dso zUhnQHs!H7F)YYJNh*CyoDP3y}r!w4GiJ<8j6j|Pi1-`!}TFcXY)M=<9f3Dy0ukO zdR{EZT@AxQ^jKLbQc+mhhQ{2UM+K~1YHO;ohC!g~1FIZEErNv{VycxBAVaZaf6jExD+9_*^KTba04VM?EGd;?DSDZi>$ zUG|qAvC%s+BUj{If0|~40TGzHy@Nyh!|5I>ucK`>{X4I3hqwN1=GounwOtV4MhGVQ zeOx6MJQRlde*TT+9jGjTKgYvuPy(D?H9ULn9Uz>>+zT z%aun{XANcMC55#5wQ>18j5YKScK^csj)L@Ek|or)u$*dUS;{$3{H||1Hw&A4PgE}X z;!STbmK>J(II^f(RPJ%hd}GoxG3O!yk!s=V0id11@j?`s?*X2_05x|~higbVPGU%Q zyXGAW@@b468FZxz9!OJW4>^mK*;c$URUDHGS+X%klqIG~aU`-Q^B%!q$JDN}+MG7s z@afbEp%5a^rx~yz+PHu<*z)C{#vg0@l`;Eg>0Q{$QgH-g@~4 z@`535MSS7cQ%=^LIrNI8Yd)813&T;D!&Q5jH=7TLwqq%*tm1Yq+2W_vEvRyLHVV=# z7Dmy~H}?b86?EB(#yM3UXXUh!=}Ge}-ZMuhTDf+lOH;E^yzL~G(~2V&Pt%}~MK*yk zZlFsJAQ3RrxeZ#sIu4SW!Z&J8zXCjPe6LdlMUhVj%}3`FQ7h1t(@Z|5h(4C)a#nVo z*Tst?jFq|TwNQ%nQRj(^bJ~&t;1qrkn|v8_frq&lGw9Bj zk0GmMcIv^rC<7d;6EvynTk#X<`r^}c*gqD7v^gTLdAl+3=JxdMsp5PpM-8G);#}%$ zk9xnY>p>RZZbLGyY&Yuksu#aST)l=Z^Zo~~r_M6#V5mWaaJ*Ka#wDf7V+d_Wx2_vb z<+~@|okVP&sC%J2p4AWBVreQRXPj`*ERU2~<;VFCh2?mMzExJnu*zj9Kmw|5`YMPo z?WOvG%&XIGiJqRGJXOYbz{zJmcz*m!n|2&rp0EW$d(2lj~3khC%Z9qpPd(*Ov3ewdJFk( zd`zYzH&u`st35^N*QK9>?y>6*miZ|XtqV6gz1(Fg?k%TCzhoN7D;Oo_U2fCQk>36h z!FA^`x4b|9V(;lY)LqD~^pxZrK|#KcRkVuCe}fWnfJEpSHI!O^k$ z)dAx1gXIPFcZhklcS)&CzP`C@AY&`j7Am3dL$1ip<|-dsPb)d0`#7dc!hEY^emx*k zR&MJ|ho(iM z%^Uovz_pUq#xhRO(a6Vb9b%{&n~L=ZJb!T@A`VxF>afYGo})>8;(YG1|KiH~8BfU% zL2pt?1e#eWs(1Ncg;G;@u<&HCLvEkG%c_aY{8>|w=1ML5sxJZyc}p15EUyKFo!Tzr zXKCGHm8PLrV4*uAr(RU0QEgelJK`k~VSYj}N`u`GhNmWDgOF7M*@6qzpG5VKkzdLK zi}64ky|y>;QX8;ro^+Y4`j7uou#G;$Zr~eQ!ri=c?*(W6&TxSOHNPqaXsZ6xI@klQ zqOd53t3eNV%J{!r6_4KbuJ5S&z7?QE8$&^Rdn#Ksjp0gi+6&c_|0yZ^maf>0$M`_} zzrX3lvC!o*9IeX>biqNZVEh$w-tXwUchBN(ag+u^rp=mD|+T* zGmT-+uTwXdjW2sSk6ib@mT7xD&j>MyGrP&5dZ3fR0XWsS#TB5fvB1_qUB78vhJYc1MZ=h~Il*#hS z-Mn<Ofo6r>L9X)5Pd!Zcu8{=v?Am~p(Q}IvI;-xnDek`8S z)-)R{O&)VDaO*Dvo}`s)Yk7DegO`cUc@~`y#qQ<$Rz${)Oz6`n>&5-01O+WhK7R%y z&|OY%-O0N?2n54oK)gO>)SCm2!J7l|(8}|o>?+sw5vfAnW{6&vG+TSOW@L zM@cegsWxoQ&jU|7|LlB!bMX1%yL215I!=x{z1LaNRwpWh+SRURR)zv%K;yyea$gsM zA89Zg^dvXuxszdY34WYGDbvkb_ooaFaoG=2ElFz}$B{e%MNn;5GYjjm6Y+EjnsB@f zkj?i%RRqp(D*P|n$jyt|wr6n!A5ppk&N4n5{`BHY_d5QhyFcm?Km~Xie5Ey+s1Etlq{F)_)l*|TmN68Fsp`_m~^fmktS4Y0$yhCOv~b@r1@Rt`_A=ly}=?gqYITd&P%&m2=CaUKHesrx|7 zdF{%7dp;V+-0jA*mlNjuYF}|P^5;QjmJrVZ6nwtpC4Rq{ZXw0Xt%XcYq0+hM>tLib zM!?4V!cW-hq1)9A{&R!9&exYo?2m6D)U8yv1G z8@0xW6+Pb`(79I^V*rlV+V*ZNI?StEyluBoDmkOtv3RK1qRI!OoEcuxsSAAv$e#5* z?EZ2h66(Nvr$&>FgCjnu_U1u&_@@CVeADFUwT76l>DdzLJu}w27YxX8BgSLY$32SX zr{2p=$n=GTuBNJDvU!#~Vyx}eebu;Y9istQ`w-}Un~+|8O9JtEhrYZV7Cz-5HYLS` zwbAl%xz9*@33{Q8_u-d~Skng*Ggy=gKm*wZTfpKT==y{vK8_!0;F@rxhb`$M*h8Cr z6MVkyzl+jnX{0WK@M4b)G9t~rA=^r_NR338$Pk0Y6Hmp*Fyy*XlMnU z){hZ41@^NDa&3$Ev~3 zD6BG*`gq$Q%CUAnf>8KJD=w(S?oblDZ}I|F84YT->U6 zwGc)Gu$gfS(tlc5LE-HmYi3Hw?e&R;n>KhJPyl%zINR=y!GJ)b;@-H&0>hxRi=h28y1b0U}6w&5GEr7`V-U3j2@aGU8lQ%l}Sy}MA7ChZ*S%=%-5VfyCM z$4CsnM`y_Tryy4zUETB;4qMHxWXiAI+sJlEh+B5RWzYh35;SVpUj-uQJ3`m{*SDsU-$N96X|sRZxzP z3rlV4TJdc=Vp2k|ks^jp2%Mhh`{AdatISritSj!ap=#nb_$%Cmu#J-Hkp?lTml~OE zHe^BI?A$z0qWzVDb^Ae`XzfuYfedgS zfj*89BJ8b^L!jlVYGc1j{13CHUfqn+wP2L3*oYf^BYSaB5kmCfs(ho@rQJ_;29Pl! zLe{>ny*>Yjx3`X}YVG>|>D;t*x6%lbn~+9Y1tg>ul#piAZ0QzMKynj`MM(-she3mM zHMSWb`oxm#I zoPrAd@eehq&bT!OvswCxr6O9hDI8YD!4%UT&YZPk0a8NHoL>S2U{utrN2NssdMeiU zIC^e|XiNfI(9<`QN@U>qjlSF_X^>tK8by;Vkx_g5<-P4zk;HTB>G^LA+5#=THVr}O z9T1Y>kw@rTJWg$T!i- zbvRqEx2P4{SGmS`xv`8nAT2#Oc#5iij*kz%uJ-q@1HbAQPI6`&hQ*d=6MK`r9H#+9 zsXNX7ERaE!G&JPOvxxSV)<(6S+kUBN<&lMC9mwWLo~(l{YoQ38tOWDx!?nbjvBC(O z&5PCC74ZCrMD-+*91o3@D9pMO^Mh_i+7gMeonYa=KDNpcGk7RJ%Xj?kP+35|eY(m1 zN-wpAqI>Vc!b4o^yD{x)(9(Mp^|PX&(Bt2#egO;gc|1|Rp%~$3RU?BhdK*sZT)W%u zDyg@7r*aHdrjz6qp!&)tC74oja3Mz3^@9IGteU{c9F0WD_Tp*d2~3Iit|zw`N$#~1 zHD@0owFryFMuF%A?S&95F$|h!Eev^%453;|m99D%Cpsidm^JKzEtj(uga$v_g?ABN zI{)<}{dqcLFQ_%lH}#(>qr--!;sb`)`Tss~{9ZK)keaVeAKjj`~8x3k*T6_H+=PCC?HPSE4L`rX4cV!NcwB%=L>%e-1 zo6iSVL8TtQe=re>jh?M?4Out=XU13em#-rlE70lZTF|CjCW{`dB{}-sjMN%3OD(po zEL6i2UWhXkU$1a~hMg+H^hCa&x}nxd37^us&`1f{Z8E>=pQs2M&my^r zq`BQ(*R>dK$uH5tZyyf5vEYd(lQVVSWZ`GhRbDB3_3;d|!w&3Tv$jUE5u(v@;z?7X z@dJ=nv1>GYIUf5;9pY9>1dQN{=Dd8u2+}iD;_>&$js1^Iey=ZtFDDyXT{!Ht zLT8TZbpROvswhVA_gDFkL>cvFm2!KYQ0AX~@7R7YvELR_S!q<=fzi1_GQZ2Ktsp9O z-Z2)T!1`Mr!VUiXD{=d|E_|%*9C7`bW=A^vACNk^=9^*ikH?ttss8QfW7}rVG#`-Y z9){oLy18?f@+d$4L@nfJtgS(@SBoU1h|=^+-<~HoG^u9o8Q7b0peE{wBXA>PK?DG6 z(3swloVfmJHnQ2aC4#K{1Nxv}1E(NiCf@kb^x7x-s((yXR`g#d^3X*Pd%sWt4Jgfj zyjIe)BjOY}G0bOs!#TGcSHk4ox=V|0i9auX!&Uw8MyE{0Q=1~9X=MF^KC>C@U>j8G}TaMP> z8BT>)&CjT>?8||$J1PT}TtROknj=*=;(huF zXY$BQAB=HOEbOME?&~Oqu#|8*SCYy52FUC{h@nF!trS z{7%!rJ@!ohxmx__G?Qdtdl?JPGPweq{ak7?<>YkRb5bPQDPZsWB|)vyo^K@{_Bh31 z0{hnJraH~?{7Gx3h`9u98q;<+{5T7`x;RxD$8L(bPGPh)Hku$cfpLF-9cutfsr%qQ zTUOR9M25rt+5$!?U+d)1aa^M&u$M+2-z zyN6-L-f_E2%zs9ZAdufB>9vpz*zb0uxK0@V8Y>ljzkY9Eer53L&uAwSXsUP+)Eo9{IKYoHK9H25O?I^~#!m%88 zVh|+kBFGW5TJ*}VA!2`nRCnh7bb=v@D@HhGNg;7q=IUTTy_J5Y1;{}pc%lmP;lPny zv&YOJ>-IrI1nF|}HdcC{xlDp}8x+FN!yi|!9_VpX46{t>#gjWxE%1|>!#QfG*x?;} z1ELD2PI({nSW5oELFAOA|DAZ_$`UDD2L<{sE_qfo5&M{t0%&Os@@UDY#UCPzHfNOF zVnP~)U5qP{%f2}CND5ZG=x$CNt)54gnhWgi(k>6(`)~ji;x;Dnt8E$!5zHHnbIA`` z8d9+j+;82k`}KKvG?`ttWV$;w0%WAE1{3^Ot?~CZ%Z#c8>u&vMtW$EFt=juUn^X<; z{Cc@zh|)2zaawGScMeD3!Qd$qt;`rS3NxxJ|f7TbKGWAN2IFZb&ez ztk!>uJ4xW}-3O_4J`Ka-6bVr6KnsJUPxglVn0~K%_6!Y=KR2?Q!(wKlsk8%2z+%jH z2)o?M!AFK6-(;LL1@qL#C|cms&_~7WULqCe!#8PFiP^^me^pyyXVRJtaLb zyrxpk=tV%P`94ZHs3Jl$<}(p$Eo>5|>8>-ExK<6QY3q!Gk9wk8R9C5Q`pVyj+(q@2?{!XAh%uUM;#&*!^>=N6nsGnS<||-@Rsm=nVqRdSFz= z4XwlnA{ndF3CfKlTQXrLillo+Td{vzlfVe!N(Ra2)R03DAQCR>ZP@C4}mZxJO-GzTP&k_Qma0^5O)!jV3p) zaz#4;BDvPg%sa@j+5+dEP!=kUJ>( zaebNHL3C7+WuVND79Cwy$*T!W14qzSc5b@uAMH}pF}Tb+@U12tZ3I^Ew2{kCo%5Q8&5*MYz^^Zrb&{m4bd`5-4m(H6S-;?@^Ph`dRCZ&86Ofz zg@+MDLh}mB6d)^&T&ZGg^Z0n@(g;ZUkP-0yA{r!8B&f^S@|RjyPHiWURwriWKPl=v z_igvG{#cpy+n@UrOV6=OUq@-?ZL<1CeczuNrx#L# zDz3n!6uxlzthVv1SkeTaRczNCpHJn!?TPhn>@#Ai?D%OvK4*5dWF>#Vzs}0~1}ZtU z59~Ru?9D(lj&Ef5 z&z(I)h3dqJeAb^)iJOq++4k|SE1gywW@kc6pGWBJa);?V4MUh_pU{fbYty&h&1euF ztdedi;~hVbj+J@%fzpD*Ja((bPJxFboVjQ?ZpdlrP4XN7C=RFF$xa_|H9%#tuYqN- zZB*07-TT5ry1$UX!t~l4mqfk*EC$mw%=|dPLdA!7bDn5U)K3z`#^kwe`8+bqd@ z>^(x9=XDyna`dYVm6= z0C&W5T`uL8&!ns^#c`42snE>S4|VFZp;rY31@GTWA`_mWdhY1O-U9o3eBl7gT>u_| z)vG?f8jLf8GxLs^DIpKEY<2+(r}(K@|HlOO1k3R%7op{=LUIMc9BK>q^g`97?)g%j z*Er6nSRKprM$02s5Q-G-1?nrr})Q9#F0aUOtuwuC*9VQ$4-o=EP_fhKOgoE zGC{nfyq`Jc>7(11nP}@r=7;s)kWb;5yuWr$to@Ys*3|*JZ`20Md3mL_5gyOlTL0L9 z`Fb2C-B?PFYVWrB9Q0#!E`Gor&SMy`GSy)%9BpYLa0pT}bbR?m*Jfp^Uhe+PZbcbc zjOtBc9n&v`V`F2Wi%VO_-hLHOwC>#)frFCEuOMdi>&fJQ6_JDK>qVH}B6W=M^hnme znu5C34r>ouN4b4gy53jSd!#X3z!BC^X#8~i_P0QiJNbF?B33PU4x>CWkzI^?!HdX6AC*|#^u>S$*0E%g2{nP zsb~SUtuiHuIc@ppVV$>4kn;jPRp_R5@bEs8n4~1CN}23sl=})8Or44h_kEkW_|$5P zp2t634?Ll7{!JTZe24jVT`rU?hiUlDdr;zBR6(%nXk`Wf!K~)VJ<_0JfwNpsb)fZF z-1|naVxT9(35rgJ+blgDYsc^C<%bp>ZNRoWuZ!>wTvFAkErVv~4XhLkC|kZfdC+4j z>wmizhyPNK>2{wqq)?u(N zK#?_TdG3#k-{12k`5=@l*?i{U13M(v*l(qd_VSxQ1sPQ8FxKqB#z~RKd;BtwH>4jz zKBT^Bd12p$MYjY*mG=h;&pJsukA_OP1{>tbv~L>eR)QQNV>x(#Jmus)UqNmEds{7qaaItDIs(~0?rJPf2`|mia>WU-%vukA3b9-1Qm~cD4Y7See%L&YPig4DBuev?8nImeEt{ndWR<36;6~B3K*R;)M=^40&nU&paQNM^zw7`Fv#xRF9bzeum_Po1ERzu3iykq zK>x6C4?zM&!1!RLOU+EDGncY0k6R1BeMRpkc=5nLU20;;5t8EC{wB@S1SLz*k_>7h zo(WlE)R+0HTYz@q0Y=bx?9w6Jj)=G-5EV01eb$ia^EY4fMNsWl!y*cr2QBvFEaC#5`QJnmUz|d0?xV2 zf}!O^Qgc7&CD^C_QQ-k`a0)1sf^Hl6uNDBVaFg`q1znZ~jD0}xbt#!nwJ(GdaVyi} z^xWko;4IdWUKf=}=x=@E3WHqceyEohfZo?EFX%j*pv{aQE$n>V41V=JuJ)!tZ&Cht z1Lx}4-dWL+OLTp4IuzRS(pUXn)DA!e5AGGSk{^A4p!;(_=LB~D%OLp$u8+=?LF}KG zUuOaZK5}+qY{R~9N@nM_ZjPS$J@6q%MXm4o+^ZLtNRxM445`ez-HQx_sFM(imb?op zf2+YS;5SW%{?ZEKK_Eekuk*P&htt7rQgwNCHotdyb2m6#v~h1+hX{Qp!X$$K zAe;N94w)lc43q9Zxy;Yh-&pJ-z;K-bpIay7fRocMRLH=kj4}DePHK-z;sMr5-bBRD zo%|Z`^4PS2yigk}HN>gUI^1K5e{XXt-bA2q7`T%MCMSu1Og9Rg-X_5S!x9Prl)v+H zPWwOHiPv6BVg2lGeWuZA!H>z5tvxZ6{3dw;<<|2L+1}}P(j#l~_Io;lC;2}n5Au79yc7|yzQ$u&-&;5f^ikNQLmJRVopU}HF}?Ga|8*C}-2l(D zYz-Q`f=qA^Krf{W=HXAK75lg%FfU^gu3sXrR*z>KJh3Dt6s?K@*4M=cm>__afo-uA zF6F5|R>1~5{N<^rYj#oqA>tB0=3-K(`qrd!1CGm71y~1M+UcONk?FGxIF#nv%5>LR0nOO+lRh~i#l*BwT6Epdkm1ew zp>YnxiNQ+Un8P3{oCLUCa#?0;P=L1i`dS|t97OJR48Jd(lcT@M*~2jkuJ_9}&Ldoz zwh?k<4#&AbkCi&k$`(-6kPzHH~~CXpsAjRy9c3fjDRy%Y6Z%3W$?#|CreyF zZMe^8uu=o--FEgSaJ@EvtR44`k?Tuzoy-lA$elWL@YYbAE^IP3Bseb~qxLcaLkC2_ z51AWEpSN;ti4T)*?6~pj9Dk_|8GV>*41ck`pBA*9C{iqXl++^`ep>8Q{%>~_=;t%Z zE-26{4A_7BUI9u!>hKw>HMOzmOgn&m^APaz#>(xf1y%st==k#NsCKI8JpjUv0EoiT zfmb&u%#}t#Nd!2wYCxCn{M9@{(S|X$8B~)$V2*Lzd+wpB!up23u5BM4+0iKo{!{U_?yc565DhKI%>p#gu5;KR8llGV;D>fk0s0#8nd3<6`U7m{@9Tsx1H3b5#UZ2|sm6JK;1$VOqB z#vXeuPr0F61`79))}zvnsF-3fpjc2ZO`_1>HSD=S{6F6Y%J6=E06#CmN+sRE%)ZHpML<2#jq0Bq$)vjRYS(h(e!2tW1 zlH~~VKCIIr34qV7cjE5(9Up$gUzZ^EJCaPCCR4{bcI_Yc_(2j7=G7C&p>`lx>FBc= ztn-Yg0$Jra)EG)H^-%6~ey3M(b33luAGLdj@`~x!pJZNQTez2T8T3ge1=y~ohjcZ~ zWo`PNY^#46+xNEuMxNQ}CG&An|L;L154hO8(@z`TM&5W~^lf`sz$n73$*dD)(*sf6 z|L8lss9}vS8kk;T4{qTsU}+Js5PgN1{7)1mRJHA|3HO)+zi>eV_7177%|^7o z+k79?3D~OP7nkclooUbF#7dQ`ucj~92)wh8(A)e_cQl8Yb*hiJIxntT`{Swopx|f~ zNQAOZmgY9uKSgyil6Q172iB*{2Zv=kcDHBUfJ&t|7p7k10e!vta2(C_%Z{MB!I?+J zlq^%}*O)Z1GB;E@$i?QuqE6+3Gc54lspagX8Uwg%-g6vJIq@1so{8I^O2nPD5lO6< z^J{zW>2;>YX&=TZIj&j*L^T zsqf}<_hhm%Joc$t4h++se5xI%;N5|89^7LBI{vNqKGon3ZXWCgPF9iaeZ*%Zhy$1) zw64Ho%hkeoSzpgnv$iSl&M>c^9SfFvCR5n;jSLr$g=gfQ-=8BK=Xl|8WkEDG1~-*G z^7$&k80S!|522_=vkrAl=0nJh7n<Ts@_HL!cLi{1Y1y6MaiGey`tG-umm zj2NAuzMO-F+GaH{@kN*7Co6VxyO}aiX5I&mM_Ge?3-zs^dE2#@-C=f|nn0G&wHzPR zIr_?O=-yJ%wmY*sTk?XQp{JjO6&jUDUg|-p`Qz>Ze=X85-3q>l6ql0C3&wo4w{do? z)9+O1Ybwh&R}MnH+!ow`Zmld) zEUq7(7ESsttovt$7fECw$N0gWn3NngjO;rcuFq#M2lgRbIdwwkp1t?oV_ZHcN$EEh z6Py@8Vm}X&-$A{G-uv>P(a&p4_9S^stnu(P9Jh#}axQL3ZmSFyLPUb`i0HO8+N9w= z@p$j^*Hlp=9wv|Oj_<+of>Je9|<2WTy7<{diHC3jM+dEgCZ`;MDlwgqnxXOJ@W>t)8LQsht}i6dDDk^QZ;_%FcES z4L39bTk+fP@u&4B$&trE8m$BRe;S=Mdt_8k9+jcrpc|-{HjF$mAfaB<~4+6LPPSUZp#GOehs{g6F00ezb5E$a5h&WO<+2O<;zeJru$VK;eKe` zvX??y6PzgG-#+TW4Hkw()J=xMt|=qN1vlqO&xM8Gw!aq%SgGwV_|nRqt(y)TT0%t@ zi_EL;uMSAsx69TD>6y$FZzx-ySIX&>5wBK};ON|EJUD)lUsLp&FL1NLm)YH~j%!Bl zkFD#=Gx@pkoi$!+xyz-%QE(vm=F+AQZq!wD$(?V|22kV>S%q1P(T@!}FCLX8h0weq-st-RZaBCv?c9vm*gyw(oh^>K#po0o9*M5J14h~bMaJfrnz|CAjk zlzl@VK4V4X@*E9^61N-k*j_aP8ULKa$LPkQ^<}JpvrMuebkq0Fm|cmO&5umKJ2y!( zvh{!p&<4lyD0Zs*X^I5-3C2-EkK=5@N(d8#`}J(U4ch$~%`wTJ_Ti_19{WEKv7fKs zf^(hy3YxiqcW-!SjM^bJb%VGXq8xIozJVR{qF>c@c~0z8Ah{6fUuA^fbob2B&~}BY_@=LWAXPRN)7R8-O^C&0;S12b&%8j>IC?0!GYZ!U_wBM_rLz1 z1UxTRRcx{7bV1G?_d8}G(9@y=hmSspDw8^Z>s zZrxtbgl6rkdm#S&t$M2;^EV!ae(oPU{{$~+AQGf**nrg*#X^M{n}{lo9GVIE3{yuUygG0(f($4 z&V$TeQhoOv$x_g?4}-u-?(p&kjtH z5Qped(n<8!LfXV6jxscuK_Xpq1=C9_&D~$6FS9c#w@nN0x_y+~K046VYqjXcxkVT+ zM^>WM^SSvrSnnfFzPWru;RrNMeoKXa$FbbmHc|ekH#*zgPx+&Nk5e&ecQS3b?Kr_!zcm0f- z-jqW*YSpKmCCezRS>>@h80UhgM|iHVR#{0(q2uS78!K4z5Q$5ecaMZfG+e%ZliEq(x=uC4(3f=eqlom7K$1H?`5;CX3v{F zn9-CYTuEU^g?dMEF8 z7J^M-W+ZGoa`&X03mtqO7Mbz1B8vd21;nOl!2Sh&E-HL$uvI`3IRg-5;YN$BfTI;u z%DS`!y31>QzTfYdK|$oT^Av``qzz$u)mS=@mFLM#bwG&fk~=%*N2f_YMwMSb&`0Cg zv~j4KFFy$;n-%(VGfCavq7a3J$bfDbo-0A`2#wxHFjngc4*#kQQ7z`C#=L4vqH zcDyiW)~Hyvj1iz?Xu;kTq4)-AK#` zaSj)rP2P%oENNd9@tr+Sl{hllr<(;Gw;RT$n*=U9=m}`|zl_f$DaNew>1K&Yn@+|2%eSOkYJpT1&CQc!>A(n% zW+Kd$AkuaN9Xv*B?rn?sIpv^$!;q%E$FaVTbWd=?}&7;CCOn-DfT;(4u zWXKmxv1FgbWftG3a0xD;VZh)g$GJfklAU{CDzBkI*d(N#`4G2(cAuDD_*Tdc1LOR@ z04a`L{#8XBp}=$^rhw3PB8h|~jib1>jD|=ELrNe&p;$UYSU&cOEvsi63{3Y^rBr~# zD;1dY!lrE$tTp6ZyZDtW$T^`DSgm^Y{g01W0p#KM`;`lG zhbv+m#Hfh~Oel)1Oec+m;fwxtykaB@8WxgJXcsEH zj}DW&9SY;ShT_f4IQ3i7P`|l%ufYVpdyNJ1#@qmD&F9Sa)Qe1fNeI~ZQ^6oVA!Brv zrif;Fs}3|Korr)DtcER%O5{gqP;d)7k?tXb(P|@0*P=gb5R<8ReGIX{O}8Z-jO@tx zaY2^*GfHGIw@P%?zAlx=Ln_HtREw;F|(m`R6>1YDlV{!k9NL5i)UI_~JaC9hn@qQvcnGXBU zQ3T+fQ_hY9-i6LI5Dz^8ZBNZ@Ey2v?V-=1+W=H~IEo7?WU;@)pR-i1Ku%WQEB>zMk z1oSsblZ8#2pL{b+?*kSy3Bas9v~B>CQXVWT%>yW|ClJ(|0>Su`?ku@_YX*e@44?zg zQ~WK$2FD(K0*rZ#h`7}Iq+v(8cGe4_l+jQaWm24y*tMZ|UF8+?Uj#2;B=G?*gCx*z ze&NQzXN3WDe&$dVAnI=caOACLNBMeR6HVYaxwBKc1$;hHiN>1hw&&e+-92g;oj}x8`sbJTXUxk3=X%L=T#Z{lW(82wig29nHK3{c#xU z-1_G<0i0mx!!`b7PW=@Z|CVw8Lc#perIzIIk7>jo9KT;ZqJLYFf696O-(J|jEyPux zUwy$>G&w_Fvi^?+M%5Sp%5}5;>~;PBdLREez~Y>q2iECVv(CSf`%uG8{(S!bOw2o1 zGyWA@_8-ghpR^~`xA^q9EBExAvXkv;$Q zq8^#UaWU}26{RMg{C9pTz+1$ctePAFjE(yD^ z(ehP(N|l@5Xl9cj#ibK>GG$|hW_uLD(Jg3X`{!mF0#*IQ1Dhe9UGZuhPM);$ z_aM#(q#!UTxH*1w#Em*+_}cV|FG#MDp3iZ`9xZEQ#5!-6`sIlwJc3m1w5w!Lgp{Xn z)pdKN&0<&X;={vImB(KjIwM;>9`8O9x>Q42@L09H5KyZu>+hKY{V<-bB8ceeTq_(^14mxjYD9mm3~faz_bnlfNO z_Hx~o76XjUDS;j|hi86nU;FxIrKzTl(HtJoKrk(X0;Zf?-eAUWMr=iNl9M-i1H^3D z7V#sv{y5PKdW`PPlPFo0fTZ|3k4jfGWeMbVo6>YZrr^!Mt3G7HuxwYhs(zEkNVasp z@_hmt`mX2YUA18Aa_Ca`H${uAZ4f8|*L`>x3waZO|7WD6%f%CP`$vteg#Hg440 zUhI59YSQKBq}4ZUtI}qZ!o(^)%M##noD{f-h;`c3=7z3zakULl_9E(Ssnp3SO3Yfw ztzSDF#SuFA_MNSXyvP;=KBKc=qiO2GR=`a2VF%({V&Zt#heooq zUnBUX%)i#f=2H}@_#9kUf;iNLku}H4U=A}N-Cd(vMV?nqUzjVKRkxgfixEI&KrD`) z4oXqGFvzSo_VoOfnU!2Zk}zg%Xj3GN8O?V|Ey!HF-e982E|UU5%`ACw->>z<0gc66 zLV?sa75%^RzW}tZyH02!Vacq8eeFIr9e{>GDlXP}2RHf?HlBvJhA@kHsg^uu38Vr= z+8*^?&Li^o#;H10QFVjq2len3YCFFr%rq0a(YnotL?rtG!0fSKQQN<8SUsri?$(x4wi<1^AFJkrZZ0(RQ|bppx}*(RNkRQj z=}2*Rx`zszgwVDg416Rtd`{06r2JaWf%k~!zn>r5ygdxWbGzm2dW8S|ECPcsjB31p zXxLYLc<)Jwof^7YiKv1#Qw?v`mU!|;t%_+N$cTcH;?INGe?ELsgH61Fz3(Odf4`=q z7eIH^>NzK}{$D-n&$a7+g}VO#h<{8n_I<(VUMB(wo#;z2R<$<#9hllX(;RM%X0Smq zZ3BFl1{+V5J%K1J=`=3E%YgGS*f5t81Lm2UmWJFebp?GmKi!OfPJ{V9VyW=i*f0Lx zij%^Iy$1HdzAOX}{Ds~?dL2&>82smpI?|UpDs`?wN6X~n;RjJ3vVRcvoBDk`Wc?32^D$R7s)Q8q>eXHQIJkt!2Ht-0Q-j zgQaXEFRvPiKHz#5AGSQuZw0Z#0B&#lble66Zn<5nP>YDjj!;7yT1cyT+tvJ9*?{*c zu}lwW#)9$}Ejxlbif48Sm(5jzafje@mI2IuevB3z0-z>992M{oPXpEi)l&+}3f+$@ zMPop_?~-u1CX_vgWN?&9q-Ks^(aumJhs}PuzHR)zwBkP>5EdPy)Mut&Z>Pc1N#+B8 z|Ebjh%6Ad-hHm;P=*eFMlXx1{9HyBsda^-2}~$pVY1APvclcE>C`OG%aQ%~ zL#~?6!>X^qK?SsARJLnLa{)sL#}q515y4G{gUN)o_13aEo(l#kVH9EtGi23Ij}>F` z{)|r#Q>0_?hH}g@&Lq6XY9j5vxdNLWLKnL)gGSre*rFqrAe6zZEJ3!?%@QS$j7ZWE zkGR4|ZmXf%G>xt9mD*-~{H~{P`Yr$8D)+yNG~sdY!he08-#-SB_*$&Rmb5My)X!n! z10BPWfA1Sm5>|NDJm7cmg;I=zD8dg5rQ>XPaM0S?(Ve)rt@C3mg66XOuhKm1#To&K zK{ALAkV~MlkdXJWLYZ_|{n#LepT1qs8brb^Y1Se-jaI!SETpW{dN9E`-ML6ZZaq7x zhpp3ox*98OJ)0wkuwS?eLv-2Le8e8_4t8(!Ps`&|fGXhkLAod$NLa5eh;ziY@6s#&M0TzM; z=D!pvj-KTny}f01_}xs>&=xNFr(hUM{wYhm7ULdtxwUeTILf)AvNHe8tkxAvXDc_F z@WVZcIHiKktgG#JtLflv>mha+Dc`_MGsSrDN(ZDO1tuJEN?9+_w!Id85^xY9(361c zJJu33!Np)^Z_j(#f&&b}yF)(BEN2Ocft5M=Izs5SbDq+JIfyOv?LWPOs=!etDiCcpNGxM7aCkc`u)$Mg=Z z5El+6GSdAxA&XEntDY|a^ovX1Oap}pVfK9XT5-zP;U-qxET%ZL?x_V$Cdm=pl;#3u zIqNvCIfA12-*M7u_!GA@Pwb75&%)j&5x9#+J8;-ILIf2;^&~gcNdyx{qG2J7@ubRz zpKp!zPV1(@$REWiiPax)#NocYRKFy`Z`beX20hr#5A#BFS~7`P*TdvgdfAhX6aQ^CQPC&<8slHFzY zt=4|4F*CGA8_O35+O*P0EO4O>jh#vIL=zjcAy`PIO>Bo-R(+oRYDHqMYhN=aBn-Da zk}cIj$hoNj?N%#yH0IW5h}LZH3wFI|;U{YY>h4kfa9kYMrWNj6eb1P>XDs^5Pcewv zViKAg*t6V&HV*t6+j6sVgL&5o=;Rf-W^RxQSVo$k?opFB^`y&nt$z^VnxMvQHV*tO z!2@Q1E7VG3-Iy(lif|QPL2_$nwE`GSt51?GX7S7=Z$^urIa^jG$G<4`kK}U|RYw%h z&GbnQ-={Xe3k|cousbgBNOmlGV4FxdV3#MXP5>Zj`Gew&#I8{*aCsD-Hu;4Yc*$TP z8GF(TSai_s&ny8mO`$?Po2MuVp*kcZRTgpkWb~lfSGODDH zK2YbILR4F!#g`hZ(7ADgf`*@c3_~V&U>-*m7?($dk(Rgq%W{5~gtv)@Okmc$7$*>| zTj7`Z;LF$}U97;(nNi;Q!ajrB;VoU&6ST3Xc*8LF?=6w^7^XzBsxVEc(Z!>31#(UC zve+LOC2e}Nn-_(7HaRzlVSbwLQC zt@dQo^4xa=62Twb0UE zZg0wST4*=Lk>@_7u(t4G5R1fB;c0nNLl=-Nj~3M4o+V4B%S!UV)MZm)fb`EOAQVjJ zq;fdhRefwo@~kYXy@z_rsOmOdY#ffnFC}e|8(i}dRO~iT5BsmTe%2o0ENrso3nh)W zaWTDy3lA@t)>$Rv^dLghIkM*ZC~t%XQ;pQ~)?|R_Vu21WQ;2JyT96rNS3!+44mbwn z<3PXcbXRY@(IaX^$V>je1V}F7SxxwR}2wqV*=lsH^eywPkxz zq58#tF3eQO;c(C&zn+*;pAqOtDCGnt9fHXR_A=aSAA=~RXsKln`z9wh*f5x^FSWq4 zrlzj0FZbp?BZzmezKj0ov3A4Fk_L1rr5Z1_*%+v~f#|I?x8>!ul3>|~8khzC=T_Y! zOG*ec>xpbd%YjUqxcXA0jO@+-d1;S_*0u0NOT{*IT5d`hZ_w{&P~di&3?*$X9an8v zC(w8|y~-^i29rAekZS)vjTa?Wg)$u_Ot%|s9L?-7_I11$e0#d{ZcoWE)OxbIf|VN5 zjGT`yrO=m@}jn2L?NqhO; zSIO=o*+Wnb^DKjNN$$x7%5MZb*7 z{)q2lPW5)&Ih7of&GtWywx?Q`hzK&A8rwv7X-;g{a5KyVKOQjO@;xpjmYsMGZrq}4 z;&KVM^?*V&lQqeBI=?iJQM#AWct+SWiNV>5Mv89vzpHV&KZ+zKD)StdpLlJg)DTq= zib@owec$*@B6~K~Klq;8Nq<|-j+y$lY&x@c_I&TafD$%V`(r`RW1fInd({%QW&_av z*UjK%*cS#jV+d&BigW*p<2jBErJ+w%dvWh=?oe|4tybdIWASvxSy0#j+woo2W_ zr6|fE5xpzd^)d?74W4G4bwAX(`u^-XJRh_CbV^1|-S$IdyQ#^wOk#mAU_8(2fHl=W z@&3>ABh(U>xiHIJDt)^yGFwu<4YT&IBlE3k6lmNvI$nDd+Y^#pU$t#^yL-Ya=C~%woHbwjVy9If!M8Hv$|Mf*@tkklG ztNu29ZdV6_mF%r6&|si$?k_wOs9A zELsF^ey`WLtZ~5BK8$0X-}zv~A`3zvFub+DIfa~RlsA@@hrR)lY|F$ItL4T3dRlVj zmQq60(5(4f)%Zm&X8qz7TWI>r`;Lyv0TKyB!VU{R_LQi{zvbd*y!>8=_Kr1ZWR^pC z1+5-0AoXK#2j`pF4bot>(Et_v>G_v54wK8H6=h`z{>RDgQWst4VM=I%S6pXbTRk$f z!C@wWLX(HXW|BXQei~GZv_Zr}s?-loqE3O4Oifr9<=ZXrl6nezmAP@0eEYoW( zkj*H(;LJ;0{{{lHp=jwrP_U3A%`~2)9jMVz89(773o@{ahJddh+9Y83^kcULZ{AiI zjW^%*Dm1u5nTC`l1q8Em~2HM#UJ# z$e>?+ANa8*Yv%HG6RQRt)03r7_^wGAVd3kvFG%lVxDGQ-BRO$NrClaW!>wWD zow(Z+YolF-&GjvBwH|d=Za83&wh5peyWDaRffPWQ^l4bNLAJ(ebD11{tA(0X7_30`+$*?5 zTWKqdDV#m8kpoGxoa8PgL2artV1#y(?5T!-+q6M>59D|84+WXWcuw73G9jKne@^XNL?OX`#-j_W)R_Ov4_;i{ z?yYab;J_M)O2{xjQ$Kds5dYu*)_*^tfj;<~Z1O97Kp8G2!#z&N8fjpC+I>_f2L9zw zj^SeNPdpc&IYFxCl}%^^?gjK@pVbx9heW3yWBcpf`YUbMM3f|wvMHRi`A~-A^9f_C zd_53mS!gyR$~_8ZvhatWip%Hc4eI`%_TD@m>h}E`79m^8PK=_mg%-&^QKH0HvLst+ z8A`TdY%^Ix5eX^lSV|HSLY7HliZDWC&lqGMyD?_&bGoXlt}oa3`@HVo?{`1X{apRo zYkWTE=Uk5CIN!(nINlr1AK@R_^iq#SJAF_)J2rX19OSj>{*1)|Ch${MiiQsW)wfT! z=neT->3u+`%>{Q11vN^vO2;jKh;IT+?`M9y%@$4Llsz#@-%Znd%IyG>4M2ga@N6}c z4BHNGLz?%y&T-S2Uae!IKnaf9PO(rmrE3?msCf=@ga?>RKO9+-g_!MN5~L+!9w>dh zz}UL~p0WsR62k{;X3iS9G<(k=r249Z!&$Ct4QCMAx%ysUsL?Lw5%tLP>#p(=Y7kSk`aC?G|r;e3$zII~6 z>wnE3)m;aGP!$kmd?=F_4#dfc12twNLHNFJI$R?h-{z;Pw##!0@m5YGveHL_M`>Eu z9vE80+-^ws4&G~Z+(Bi2*EVi5&DVG{G~PKIa_kW?;%?Q2tsTHW!7V<1Zr(%Z10c|6 z^97GnR>clPyI(0JzSFGrxU&6T=8yp_;@q>;k_kk#(tcMJc1aeunQPtCK?dWgcRt)2 zON4lJ7fJBn3HW)7`89ifW|c7>=tRlel$T^IL>&Ua9f&Q8bT$f&*XA3+cmxAim7zA8 zPK-V)LqkJ=8RfHe(J4TiX@~V( zWY@`LH9_PwsJFwt?*yxXgQ?#XstaP_?$?}HnCNl`z+&4sfHxEauv5QsSs+uhK}vL znlQN)0kluPef*KT8~9U1b^u3o!sa-a&$(@ah$OuTwVs1wQcb5%4+{LeiT{SjtFS5L z)*D)+D(zR^GODV}qt4}I4b!A^q6<{sdRRYbKWj9)PCP4>j=Cv4QbOd|B}*7_h>l6T z#S3oF?kYe=e$o=&tZ40X6gXV{N|f1~LsZ1zkmx>IHebAm30ZT?bdv!Jg}vpuBBG_G z?a#EcFx=waVYR1s>zElNAgijH4wrOpA5P>G^qr1Kk-F?fn#LVIk|>V-$`GNmc^hu` zlL7cyaTtlq%U#Xe$ydd}f47GG)YkVK)HNXVQ2PNQHv*xl6@TQI&5O%Z+JnODeq{dO z7exp@^8U`-a*o&DDJH$SquLXil)n+5VSmYUBK5HRJohouu;(Ty-&?vJ zuYh1_G8eqWeE6lXs@K&{qc$kH&e`4lz{0E~sTLBomyZ2Pk7^}^TNl2OJssLRSav7E z@Mch;3Z^vr-HpAZeWzHN1(@8<>AH|4R8Odgh`!{nP)!c-!F>Wvwv!M?1(<6$V40>{ z&hJ&#qEr7W%EIL84#h5AL%d*jQ3F~gu#&rv7~|)bdKd)0ojXqUeP63Wh5w-5{w!UX z8*F_badbyMi{Y-9=RtzQ*?ibDE^*%%6N!x;du$NR7vd~dTr#)i7i0u;u_?G>b{b52 zj9(iV9AVqnRqTuvS9j$;mi9?U5{Q<5wY;QVv{g#VCdNeJRn@qG--*!R>R%DBA8j`8 zfEVF#(Se{8;5=xy zFiwwVaoL7EdhQft`%(SpAW^jYCXIXZt7PlXmizC`npS%s#Pn*iFibNXY_;X8u?Wyq z%jSY|eXuOH=eW6i7Om^gq!?VKcB6>c(S1=Mq)M7@8)Qkn7IlpYExYL!m9)IQm828G z^*Lw+LQ5!Q&{#amYnuY0^O(3L0X_K_OSnkJs>d$kN3H)pk;U|R>JE!&MZVTl6|Cj$ zZE%%rKCo6g<|ni0OvIwkwl~nGA^w{KoH=uRVb%O-E|sW%|99$(J{XOKts*Lp$d3AK zyT5-)5~EN-(37oP@Xx0Pb{c49YJ&OEMPLoz3hHGzZf=Yx>09hLD!TR_ z0A(a_$(^`XXQ0wb5?IfrA3Xx3N08iRo0_qIisAwRhn7#D6yZ2DD2#V&OjI5s4X|Bv z{dioWD$>&Zf;}in$*UwuKYkQ@bL8~5w604H6HuK7j6lbTe;rk-9DM^3D~bZLhUZk8 zm7O{Z(<3!VKyf$g1e#W$0VJM%d#<;OD7n}Hsu91HOVwywc8)UEv%lK@&5U4SlPk62ssuBFt_i0&gj0b$lsljMi zFVIF;1IiZV3!RtcK|%3V-+t{PubZIB3?Mu&p1zcH(5X`a0eTo5I{)r2P$GB(QrB$!$*#46`uh4K5J$l&yA8erQO;~$3|*MfhmSzKS`?JYNDgdOR14L7NvoRZ>Z828 zCTt}0ZD>J^XP7~?!v!Arxv~(DO+8aSQzxV9Ia&B7^>w7B3^+UgvR!C(8TVX)_XOoH z6IFrC*ho~w=n$h$PV1j9!QOa@?s&?EP{I?w}LGg~|2bxZ~ ztpfGfv`Cu42~ndV9Y1*T`9L%Sbchg;IrVy;0BRACKzVesvxu#Vyg=(rMl_qSWOsU| zYA+FAcG$hkso2_!5X-z-_{N?0UZ8DATA9+}P|F`F=?V#4|Af>g`4IR%-)eezypRI-dY$mtH z=>z?M8bHfIc?@|5h`$m6SGSs6HSm!!9&~Boj|LBiUj>AHITd^VTJto3tsxbe6&ZyF z!x@5}@O}p}Kl#w#VUwZYD-rng^GBwKZXVjrZ&-e7TRt~vpL9!Gu%7quYamp$G$dd= zDq~P_@>%nFqf0l|IC9^~-1hpPKYpa|VibC&fg#>;24&w&>;gBW%T3Ms;C%8nzTK|a z2G9_G;lslN)GpMDGlf^;yhVj~5vZZ${Bb6V8HG9!i(ghwS<2l~@7;NI%tP5f_+e5B z-`i#Fyu)`cu9D_Yw+aF|?|(5P>4yt|jI@b?@&ynjKet9#3HwYGwHpB0?8npG7(m$% zV0LbcWsI-zS+sGj;f2qDE-CiN2vH~n@Pm(RU8eDchkyozV+1X;9R1vGjBaWZ(BYZR zVV%;XC}IU}&{3IT!~~w+_9eMnVi<;-4+;pvX(@ zNPwCrP6MgV_%_~uwG6+-Z#G=;SDIQaTWgN~y0?Gmpa1DhK?*?uXq^DB5an($yf|Rr ze_Ztz%B`WUZLgf&O#_^fz2B3ZZ44TTVP=Bt!J=x{(sw?QUJQC%_4xuPpVz;$|8BQ; z6*7D%0XAS3W15j=cKNU(mFXPly8TXGK=J-zaUr2K{m{$Wt?(ewjU0?h3U|ZekiR-m z24_(?2(+?B_O0!wLDUoc?HKQ2j0Y*ac0~3r$&s|TBmQxvdnMezVQ25hK!kZ;{uHMwwd0tY@eaB(ey`sNnC(+$ z7)ZP!ctXV?(Bi~vJi0NGaYJG|sAt?Vr4^WhOnf_0xHa&SxHm#$Mm8_Y(^g+HX)t0<{o}-Z0N{XQ%11Kvf@c)0QimX~k<#JBW&5 zn~Y?xyjlo7d?X$4O`+;w)39G@bwKP~AoIWt+oA>xKkw3imhd*}Dz=V3U8(?XdRm=4V}Dy{^+$cX*+9kT z&BDuPGnkKXH3-_eC0>)WD#2xc4BXM{Kwo%5?Q$Cb+5@CjI)L;U?W)|-5q;=7W%8DD z4RI5c{q3}ja(D5pjKMQ4mw^@4eeeL#Kx#a~4@J96UE3g#dty7pRF@Fw&m9RG104TP zE>iCTorH@@AHo|n~LO$?y-81H_V{uH%j)B!4b$6p)G zinoB@Bso?*#h{{xX7HPgsELbl(XF(v7Y1mGc5f@CH=>^&GkEYWH?t9xuw32LkjAB<8(sF z_P>{q|CLCsmg_``Cp% z8Uh&E{DspaR1CTorv0D3_?V9}lX64WL=yf6zyLw0o0KDN{1$5nPD0Un}C7@w@xy^_*)`t!#qN9hu8 zWZe~Q&#C9;IsNx|v!Rav(7iYnBt!tqx%-*g!q6~grAwKC@_alqXNZve)~x7pdGAm{X9l5BB;o@8GXpsk=;t;DOw0_Z7=1g2Hp5oz}64+1%C3W#g^Z$m8Q z&YnyR5{D__FAr=$DslC-Ae&ff^fP*n!_PS%fExCu18?l#_n|d0YO0$96|?Cs=WKua!%)!@Kg|U? zi!@}4)|mEZ&`RTd9|_qkqK26ER8fBFb>0%KJbHhb&l=*$LAK%S$H=^RWl#}pnh)8x zpX;2(HC_fq{8_ZX@ZuDQvZUD-xZ#|$ZjCg{?RTF6ZRg?ErpdZp8;QCC>|273h|eAh zqIZZH#crBrp9W`ghFd{E;LI+$q<7!0B;V>PLD+REa`NoIv>*fB&|d;|`|an364)qE z>gOGGCQOaS4l0*mx*|Ffr6^I+Q@>j-F^L-0_*qV z1nv$Y5y|SWLVoQ?^{v!tE(pXefoWMgKzD9hOAiqh?}b0GHd>F%Ig$$tJbQA_4V8oBTqWKWyqW!7z^WW ztcKRA9}v_5^r@|Dt?I8|SOL1u^tv@&fL7EI!s%HRJ_qi?%{}}#Uwp=yO#w9B_Sd<+ zAE+4uY>D)tS$!>H{GVuUF=PB^y+eiFs=*(RfbuBlTv`e{OU5qtqc%uF+mknVQ3xWa zq1j{Ho*P#ec12?#F8#p)vm@QX#MVK<4?|H;P81Tp0OE7_7Ko?>O=tcMM{oxszJP+;K zd7cg>fk?|v#2zVJ$#(i}RT_ZU%Ix@=pY!b!7A0Bo+HT0r)YaWvDg2t+_`S@m^yYsz z$I4sab|&{+{F!Pj!U0oYt0MS1$*i|Uavs|m3iiFmt8d>Nk(7Jy_1CBRzT4e&=Wapx zMCy*5e2^Qz(zt-=P%B@&M|`5Kb!@j>Kt%0Yr{vd-O*n$~R|hWuO(6sCy$$1Kj9;qW z?V1xN@+81diJs%iTU#*U@DY(^|J~%<+(K^*+TWz)o?uT1S?s;wJ0La!@BVj-udz`` zcrVhU=T6K{JI`faiBX{#BQAOlr*>6Cy)KTI=UjwY#Q8M2#KSp*zJy}GGT+a%sMTb9W-~-!0l9dX9+uBRc18!YgNvM2TtO>QJyllqkE% zj8|1d$)9GKoLHoa%8$*8oi;Mn&p7I?tczz&}Yrk4} zr^gS>CGcS&?}qX}H2#E>R3eMt->u)Pk4uM*|~s zv;Y9{JvtOJK|6dU8*`za9Wpx820DW3Bt-yShc)~M0CU?vSctMI(1c@owG?=Mpm7gq zqyY}sm{#~2<`n>}rLGIL7HF^eiXO8l&SOl^4B75F(L@raExJCWdH$&2Wl>PM);gzg(`Sj-0v#q%%A~-}2Mi2Z7ExU`OOxm42+V_1!?LNJZEdyTSJPEQ|v%%520-E??fF=)#L9vw zx!cNA%)hoSZShCU_-&XIy4eSm*7{fr^q0(w$R+Yqpt9033xqenl4oB`%$?78arnU1 z?vlqhK-UeL8o_-K8}Ay74N9iRJq7T3FTXn7h8v1#_&`xIA0(*iwfJ}h&sN>A!BDKO zS)R=uEG>#1#GaO*zl*C868JE6miSz|;kTI^mdtAGU&C*Kjl_iImCsulENB|O(!;RA z%xy+l^xqFCNUiDJw)63w@D#AL9ab2I{v{} z6cvB&_I~jFP<&EPA;tqMcG)nQ6}0yN8HYnR~o!w=PUOrJz ze|tZ*Nqz{KUh`H+_!C-V^*n1=d=nPG^KEEs zQlH*!agla?u9#L6E77xC(egvr7z~`lK#`5!?vt+(8Ey;)qR=ad6UcyC_cYcGx5&Lk zPndshpCMd&;^CG%siQcfnYA{yr~lB@)aeI&a1ioU9vlILBkF#Z60Uu!z8IDma=YG* z(PPTQH> zHfH5wa%!rVGzH8``?);*`wI^TiY01fysfJ0^KOSLT+-=PozCSx?mK-YVz;nB?v2F= zf!(*{LnDqsfhlPREC%A}lNoBs+d66DE|NFyK*gqJ^IzsW|8Vrh;mSbj{Hq927Rus2 z8Oj_+c+%1ta7rwdG90$I)p- zz$dp=e~HoCF?}HT#U@8?>+SpR>mtxB=e7u{uG(3OvIM9fNfb_YqvwcUx#2hMN-p%u zE>HbFNN)oR%E2&H3WJP!u2qT4jtPaHXoHWaplopS+Oe7W&&$RuHU&Gs6-rBOt`fLp zfH5mekdY5t1)C*7BtdJoAPc-Mfr|us{L6^PsP%_f8=#4WYHE9;IFQ0DJv;YtL2d=V ztBn-c>y&mp&C@wyImUIm5E7{$$G9~jHmx0ovt>~cgjA92nkK9!?`%_oC-! ztuotlU3Zd`?=#UC0o`nnfZLDcL)^}0Eiz+OLuE%@!Rnl^YBqR zC(Xu!+KN5s46d*}b{@khJGA<<+4j|Qr-KYSTMrr@1Z@_Wwj)5vzN>7K?$`;A0wX!s ztsASpro748!f;7AGA&YVQVzmYP};ZaK?(oHvVu45l|k>etquQy34Nkp(i^qJA*4ov z6>n!!l_8xi6IIruFx?ToCAZ}vg+oaA1OBX%UEC>)yO=>|+}nyw9qnz*0bY}#=Upsc zG&kdDS5(lsG5EvglsH$GY68m*B#<1c1eLl$8Cw1fuOr1Ec(cuF$$a`-ZVl~8W8J>v zqp|UZUbe6dt&@q+eS7d(Ya%3d#?{+%!?!?$dc{LXH&1Dzc#tr9u@32+8 zY@^U|iv#`EbxK=LoImH>S|-%>uG7Ls<`Qza9UIyEv_)m~>!`}5#^LHzMBlJq@35aE zZqcRD+_df5Ev64raaY{=73LqMc$22&VrOBUx7{)-=k!p7W+I~Win`6_`*D`5MhQ_Q z<7}e{QR3G_qM}oSN)eg71XpF_$dvL&-N%xzEfuFlU?V+E`)sINpQKqYAhNMx0@;zn z(XM_{jQU2G!)9k^NodN{^U_dMRKX`PLRCd3hGNnKGKHWMqq>yNQ+ozu$ndsgY55|9 zjAVBw&Dn7Gh;|IAccB*VFu(0tvA3E{%%TQj8jUnmwwat>D&31oJg7ByfK|vN740wA zd_$RVZ^DdCC_OxTHGo@sa*)ut05-Z%o-QL#*;k28v`ZooK)7-sn&A)w5hpC65eq$ zfa%pyhM^ceMaBjvPR53-_~r9f&ikLo#l=O6LUSW8JGnwQ>W}X*7C~tcIy=+KvsaZL zxXlz$nebk3dQO?3T1b|%vQXA{po}l^79Bo&IT#RFr&8M zv_xMrV_HZEDmBY=CqIljk(s8reL{S+WoDraMtztWeK7-~Mq$&}!5&H`%NSq-9xL^F zt>T{cOoIx5I?q$K(h}{cjZZ6EDQtz&XL14q?IhCD;{vy8n(w!}< z;Q_(cl5n)1f}KI>c@vyKZM_IsvZrV-%evM+Woa9`NB{Px8-fYXwx*>R;hwWGa(v&) ztU}d@QrepED!hLFFB?Q((_TQ{Q!OPtJAg^xe!;O&;0E~}88MI)%56J+ElGsGQ^gTGF6d;b`{FFZ~)8CGkm$-rK} z{=`YcZ=C(R$>P|%=kMm{zx<Xm~DGcB;(VBN^P^&n5QPkC$LgA+2%hG*s zfWAZ=%q9^dI>WN^zC;?%UM&D&6?*yTyV<)sWyTh7OCi`&-b!dRkA`!w#S^1>6%y*# z`squy_~JffnQzXc@PHvfp7np_jGRrNjV1>Y!KklHnT1kkq1?G<0)!8MwOdqvsuF12 zB+O3`Dln8Wj7@J_@~2|j2h7J~6*JW3ID3&R6W&E07rnj?R+z4I&qxtA*GGAz5D;EP z!Vcz@B;(RkrTxt9cbrEDH|HgzCW_xD)6P}(-r$gcU?-{XhM_9~jrO9hE<%^z!#*)P zAJsI0pa!^8ByH;*CfZ23X`h61TD<1l%+H9okYZ*^miot+K1Y*Ed@Ej}9d7D+Ss7eC z#3wTM4b0gk#eC+n`>96q!)n-EYo>lq$S7l8<(w*J zRu$Wo+nH(WgY+u0dY=5bQhy-^7#M-zeQG=kSM9$S zv4I$(e|y1EMzv0lKn#(B*WukL*?Ev=?1->oQ%L6ZJx_ zD1J5pCdgi(cG?j4T=u(R^z?D(QPB39X2VRg72T7JL=EOCwb`V9l9XW7_v1z7)S9WW^0{d! znxAI0_p#d}fOEY6!)#PIu*MJEsTPg$nwpk@7G)?&PdTDsi%U8IT@Q4t!z%$njz%^2rPkTbie#d{ z>@HvDi3i!@4<%EKjaTg}yyi+J;UzodU#72h@|=k&X#a;5uh$%yIwMDS27g=gI<_xi zE@{elSOPg9!2?WVIr+EY@+i32+niE0S?_O&^j#0d)|d?1J8$rJHSz$jd*`e`^%2eL zm*3r6_k|O3HAwC}C!1 z25{kE$!hP1q2r~_2_oG`X~T0aLNDi_D9*?s`%Ckv1=L7n_bS<39%cZ?U+zQ9w4g>Q z2MjtK%PE(K379j>d7f_M&*|l3cxrWZbYPPJ0pqdkY(uF}5kBPcyG;XziuiGG!pPMD^9l8xqU_aSysHcvaqyd-CB&A zbWh11j>FDFwTv1u-gkS>TV*b@#N#EI$EZiUrqq*o6!NH+yYsD54{jo~xgphU>O)B- zB_yc{aoYT2=FA~&LuugAmJ!9`1o6>_69oqGVP?Lq#c?w2#lk3uvCeIB_)gmy$3-)% zGg&d*qreIjqeu-{b0`r(@OCR}>RpX9+Wc~=nCuD96v^|LkQGc||J7-Gb}{PrXz?sg z_GI_y$XZ1ZY6t{^OkTNhLX2DEu*PC3K6{=#gRblZ>-PMhP?1blW-NB1z){w?Q3_UH zhmNs zR-CYO{EU&DamvdkS?9033IsB~p&g5zMa^EOW>nm5J~amis(pSx+j)dg(vZb_WCA7$p$wV6jQcH77@k1cC^bzXhp z$v{|Ydm74dfp(6v(#IF-spFS*3~TdqmS~5HGLBm5pS7(ZceVr!Wo(zk*0;>eFXbv) z&b#b4Fu0mo1k1vn;RN4ko?_%8+}C>*_*O!55gq}RSoCn?lwgKYE*EYqTdWq z66{Kw+=|VeUxd3^mg;)B%=a2-WJkDZ0d(Bg4GDNF&gCNGJ=FJQoel)jJoLH=v?9r2 z{J?L%)R$3zV)yNZkKdPNrnj?R7$!N|;%%vn5pgykMa|5OHsvH*6-c)~yIKF9*I=@= z`y*&>T$epT9zaw@7u(7P)Yrz`h6j6biML?;eymWVoYH}dh>FG;<(g>} z_8bwJs5Q_?>*;u()ZRQ<;7OI3l7@}tDOvk))+YbH$;@ztjcKN`1Us)zBr-!7y1Y$+ zz?#!3$$#b2ee486dA9L7D)6zCvy}5Q{%8D{1^%#62dvN4n|fZ(DC&n-5`#W+zj`+TiL+tX6{xO4cQ$hR3Kznn}@^eFO^ z1Rnd>P%63r7j2dfSM21in}<<&Gr{WWmc93u zm`AKU%l_k$U3c8d`9$aYiw^3jr_S%kIuCZv*0aoCbiDqtvTSC-5(i>N)x2VJx$EeS?V zg=X#bl@wYC=lg322OZJFJDSux^#(< zK8xc-8nVTQg@subwVF3IHJy=ffdIVJi`Mh`17|K<`KC3HHYTuLD=J>woIxk@(C$1} z2zu(N>LTENT{UA|&WYHt2J%O1T=)MYMhrl-t3uPwGi`x+K|nBTxZajB6IVI+ z2pkT1Br(i(=?(vW>U4A356}>%$?(%Q8$OPB1H(OM`H7RJQ(uzZWU@f4yi?DfC*+p-ibNv*(b|Qcl%>@Ju z0kmckU=)+xrJhs0(GsxH?0J4P$iVc1&YdJjqlorm9;{3umM}pOBYap$Fv04@PUR;W zLdq$mvH2icvThV{W~1s_X$+bPcH&pSrbJ{h*W=wXKFPEZ6NfqjhSXXELGp}b?Bp`4 zT=Xm}cFSI|^*+`b7sEV%$>J%=U5@Z*p+%tvp=pw5R{04(3_~4$EIll&_t33srUZFT zT@>+hjVumr>w?Q>VKQOlIQfa56Regk{;AqkOw}or#bbcQn9?qb6Y6vl>&%{a7h}VB z+ycB*hj4#%N`==PT+^okepBQq6{q50;dszQgRm5>RMQslxMX3wi|Kkcy$qcdIqP|M zvRfGnmG^Y>@c5K`pSv^4?V_KaX|5qG3^^2-9XmS~<%X2K))|#nzS>a}lQ%EV+8(D- zA~t<;9gF`@K=my%_}>#Jj_ETkTz;)nZ_ZiC1#D%KJZib#mh>@BPEM|JsYV|8h0XTe zZ)vb^m!a!t8CGzjMO2x*Xzyud^xrb zo-kAkh$#=_9a%oAgnrVAiG!#iTm&5f*sC`Ym+{oY&C3^{`GwcThKGkITumWy;sk4g ztJge;EeNuN3c}{G>$w&FoljfM#~8!h%n6V1j9pb}J!eZT{fd0Sy`#)c*`kP(u>RYD z+vXGG=jXrh_^F@1$>vYT@SdnePms=p%t)uUiMHE3P3*3Vm`NoB%@k?KM(ETz6sbr# zYR`oG$jHaGbT-6f7M)jK4)xaZGOvWjaMvwk`5vojI7A>=)-lhs_W&n|Pb{bNU3x07 zg1N2Af{^LulerbGL~`^(h7u%e(Im3nQyt$6a;~luwsnCXL+^E3xg*T48dOHj+y~3k zHo2SAwR)Y$yW>$iONzL_bQQgnv>gk49J}4zR@xc5d^XzN-fdzzXI?S|G1F_GV%&IT zN|tlfuXa8cQ#_+I8rKr=m~!4w*#c5*>*`I2HLq*u?4_Ps34LrmII7pZasAzAGW4h* z6Qj`T9gVNDL|Z|Sl0$=!+$hT}P|}$^Tx03d7uyq#!%$z6InoCV4g%6F)+e)db8VjY zobj6P40xQ_*Za}?KG<$jqi1qgL!;wLjDFIMen%#}yf6bBi+`l7cP0F9M8^NvxBqAM z?KhIs|1X>@u*S0o9|Zs8+x-qsk~jWBz53nM{>Ci(?};D(6ZrJv9yoGVrf(@5wUP~8 zjH5J)u5?_Yq(fJ;4=K!4cdYkeL(*{M%C)@qzAJvW2oL%;;bTv*YPmB_6TJKTrD~t{G)UgBC2eE(qr~=H=Qih6` zvN$x^=_hCK_mv%5V2g(?f3a_ zi==J=!9PU9_W=wUQ(s>XdP~LJQc0QpxQ^pIra4RIQMmjA*nj`mEjY9+!WIvn19&UF zrS8K3^aS2NEANx-4HZ>Y8tHW``x{F@I1dMjD~=0`Ind>7AR=%2nB=DAHBB1JYv%?q z<5)J{sX2L_g#b7wGRIh%a_ywL1@O#8HdztF3hjIf!>N!x5yP!gi$9O`l!@O+gi*j1+x+eU0R$crl3|2)#>$78a=6a=xlrEL)55z<$M#R4|Q;< zNsE9*ZNi>-G`~j&HlSne=(FDjcZ%S;!tt0?y}uzJomJ;R7`!~?f9xlr^mli|#-rd# z&DMdg5;3Q1<^6_4t&p=_^F-84fpbjUZYj8&yu2-F8#Pk|fl426U$xF0aMU!}+za}8 zn#mH3B{=kQF4koVqqs6lEO9*TkU`yb-XpVmyCr2Mg-Y?E&e;k_o;1d_VwY8QJtq@W zQsP*aL0qXWD^Vy;_&~b<)G9TZZ}kJSxy*38IDu?AQYfzNwUQquWjkielPmA%qOG#- zTK*TO13t;Ylgp_+P$86TNd%R|Pg!(cZN!k@rsdWBX*i{xN^xE#V34kAGa=NuJW6X5bsjU<-b)z=joIYMGtLwub*KPqo}&Ku z53(757kLTfOTROwe-B~)2mRM&tV9{alD%1`Ba-eIr`n z@Xgl#-SXIL&PqVaV^bOo*4cgq;1^weOCCr?)pab|2M@-Ez9pY20&@XiJ%1-#{~m{o zo8sV?JRbib~kXZ@3QUo&|9pELmfY{Gvw;s1@B5Q3Zzq>5Uo?Q3;a^$(;2|Bh=L9L?3T G3;16EZ@~iq literal 0 HcmV?d00001 diff --git a/windows/security/threat-protection/windows-defender-antivirus/images/MDATP_12_DeviceInstall.png b/windows/security/threat-protection/windows-defender-antivirus/images/MDATP_12_DeviceInstall.png new file mode 100644 index 0000000000000000000000000000000000000000..2ed2c65ff85bcdc5ad6670adc0856dec33332234 GIT binary patch literal 25936 zcmce;cUY6#(>98_Er7`0D4^E zWhHqXDymZwR8+@w&m0HuO!jYI0{=VaqN8}9s<@Ml0$%)Obx-{s6%{^;cF*)Acuno3 zWZ*(Yb*}N~-(xL~1y87`o=hpr-_!FnUKsIqf?A{>?ykvA?>!C0=6?n%-74nZ)8!)xB|lwfu{KqPRSskRbDKmaZgde-TYm7y8YZ}p zu(hxLwj)J+b75G&q#G4L$0_SG+gsSJa=ZwR|IT^%lXIN~XF{_OCeIsjPqCS0?XRQD z5gtn@3XY7DxYC*(x0ItCeUf&!>#Pk&zHVlu_{(`H5}ebWV>xjmViBbq&6N%#82abC z8%92gVhhr19`q%uj`o8)q(k?yWL239bd!oC4HeW93vLBmD!;o_DtxOr{&)m>F}UA4 z-^YFMoR|}8>$%E>2o)>EX#qsNw7~ke{-z51;hpul{C?}&4-X^Rw%d41$R zw?&Pt2lKa!#}3c-$tVuXtQZ~2*_V^6w8p1@EJVUObvwC5ot1z18lbwHnfc(i%s##% zkx172#|icQ5qt-S4=?Qga|?NRU8cVv+qzb{KzC02dhV(&H>K8=(AIBDNPp;^HBy*+ z*Sv6IoXFmd4x9@2^3H$R|DKXnMbTYsBfY7ViBQjJ&x$-_pC3*=|vjH!D#&kaQ|?oFwybx*-iO+m@(p>HRt`)EM%*l(1*a2(n`)!Sal5G!nB@rh94l z=F$z{P4F`Ta;PcLipz zSlYj@DDTU*Cm;B2PbCgK&T0fT?Msk)vY3Cn7Uct@k z8S%CZQJ>Fp^60}ETAf&(t%LR^L_I2c#1v&#qk}C1lWh9Vvl`)vDu8g&kVH-|V{&pTB-sbPkP@ z-<8{)FIOostX%9?K@lb;-8oPHE1*F67WAVS@%$JYO8YWeZEgI{drqh^?7W8`T-gYhm9T&T8!s+!b zZX|vy->RZ8ekyFGw$u?C87B_2?EesRxawh8Q!-S2&hVAnY{0vMrZDCx4w;=#Z@9Wq zEOg5JbL7pdpS2a+eyXQWATQ-?sCwr^OB|3AXGZIU$a+PBKk+x&#paB#?4k}Q8ydbx zSQTAdR4Ov#N6OWV7dLr&$Uf!_5vnzNE7hj=e9h>SQd7~sQ~gKYm;9dXrXIK3_I9(l z<+l5m2m=@I%WgTn#xSH?J4*M3_1Dg5G(B>4@ZVji^ceHqtn=N~TX{E~&U)+dv)p{m zjN(AC!e?>47<(c#JKDTCT>Ji%0(Bgxr0Yy~wxaHE*G~aED6}_{rT~qa?=6gRwu?cO z_JvncdSA8Wr~lpd6TvgF+?%`*CO+5XlZp<6`KH#jVqQfV*a$kNgb!6_z4Y}8Fm;Dw@7IMCV$*}e{w`%-MV~uRP!d%kU>xMVOR6cepH?B`S$5^}`ErUSDcc->t zY7LQmrcge1nz^9@zOmCK9}n5e$uu7&X}pz73fSZh5C=b=e;-KCtDYIJ{bKxzQ=GFj zH0Z<^bgGlbwF!a1hKEJIOP{RCkY>bkJT9o7v#M1J7gj1td@O@GNjFNL4O?*i=&piw zrz3+VYPLi;SiJawd`id^6&uXLGzF#oS4P8o& z{wCtsYA}5ppJIuMVcsl86#5hQ(1w^PMlRc&G71igtLSU^>~xL6R+`IKV|Qf9FQ49~ zd*`IJ64IbV1>0eh!A7G`F5&LYM)mWwKP8?e(FfsB>$L2D<<_=@`zqTJ+%rG!>NIqw z2{kq_470bdg|_|tTvaeJP8X&5Y1Q{Viy^A@*B;!lUzu3KHJy5m4_dyESXvlHT0S_y zcgRs{KP1$*4j1&ra;95zle*q)X+_XHkzUV|t|4h=9{`v8FEQbur zXLG~@rbZ1S3%}g*`xB5NwJ=v;q81MC&tipYn1>&EhcNox*c}}&H)Kj|sro~kF;{J* zTpuw?H{yw1%L+M61t~glj)ikIXiE!suU(BZ+L10w8LnVMEiCg!gS_yUO~LG^jRs+U z`x9qqU$LyY+Vz`pA7zkCn@K&BDo#k}nvYGF_%Or{8dBfNyZw0mcJ6gwt#onwj49r6 zn{1)Oy?G6&ew_*;4}%r8fG94&%OTsFQTBu0GXxUEj>sq1_kz@hcO9sn#hhe~%QX)O z=~leso7itvZoS{on~Wmh3->eD1UBO1N;!NzQS0nU>r>j?q|-LsO|}wU+E@24!|T?q zTRxDooCv17egkoD4?-4Tm+jbx%Q@`SPmPsI}sNT z^In_DB5b{mJ($Uk;%j-C_GTfB0kwVtjTnD@O`4}KL8!KPg(%vmG4MD%PCq4G%W|O1 zc|JDi!P1rHP|$dd3r@>q3c4D>|6A^4OmgXSLtnH8tF1FIE{7aT@aDZ%bVp z&w?vY@d`t;E!Q_5g?n8S|u>TQ+B(JOr~Dlj?Dy^)CWXp9ApLPm)o?-}C8 z`k6SX#YF?F`fk}Nid2$^BG9Z^*)>;V8r?t3VOe_)Eipb4|#&XRclz6 z7B=t=_oR_s+OyPUx--LfBZ+ifBlS~zJMWDfrRo*PF&=MlaN=O&w_NN(8AnS^A2>J^ z6S-6h5@~qr0T?)cU4sA_ecL1-TN>IIi8Q!PP7|^SWv;t1OpE31b0hFu!+hRXaE)(? zY7nzs2a*@w(2<Gof`?XSeYsT^RAam~{i*z!c9; zcz&~|0!cpgH}5z88E8IqVK_?(x-<9l_kQVSz!|^1@Y3RYn8Z<9t+v5lTm?)*xh)t5 z4brao!5en3xf=E4c6#KrE{ewO37YHX?Kp+*Bw7cylZa$2Z-h zDQEv}Rg004F-m&n6P@_iQk$MU@FT8I{0>$#G*j>V{G24L-IuF7q7cTkPU*>yyhnK1 zf)OCLsPg|dSu)43--Sdqd;%yX!+Y@^42PKd@xu?)V%iSvI@;QA5)$+`C%!Jj$+;Vz zg;T$bdbfuQM&2TsLv^4~QNKOUDS*$au0#oPGvOh>jQ+)GJsfHZSIM;+N;Yy@5|R?QU))@@x4heBbn&NM0gZJc2x zET!_Rb30lg3|M+TIH~3zT|K=VA-q$RqKy0E*TE7Kxpj2i!B&eLOivH~{MI?JqV>D6AdnI) z%df9I7^<+xjyhH^RGg$`($m+s^(XcZd9WYj%}ZmK^?BRI_vr1H;{qUBHZ?U>K%uhR zljr50iH~|_OO~n6_2GJsY1ggIl2yHvf3m*vqp~NT>nG)^PJd47$$D^F%9fj(yMkN= zK9{nR>#;N{x!ZUD)46Y;vVR!C;{ZVp1%H14y*@1)$Pl zhw6oI9|C}j(95j7rl|xx0VrR+yuA92z3qWJ%CKoYdQ`+VCAa!nnCoGrm+Dt}cB9-;47(5bxOMYpzR?2NQ$DPA_{x&g_O%x7=<{sxb-EBSQ zv#S2fb2qw1`HgGfL2*4;eL=?RpUtc#)r*phb!>PH;17;!5H7AU|3ly4bL@mA$ab%; zCgqv+#nm4jJ@0om7FbVF_%008dT%}mKG$Rh9r^&m28_|L(gEi~bm=$p7+ktNSX^je zfuWU}cYka?Pqp(b?#ryB-zsa`yKRu1851VC>F1qB6mB2WZt|&Y{7^a@~9{0tRTp@d*>IrvxC(U zzm1%9WaRGi-W!UX6p%5;K$OeapSNPt9|DEIdcTRIrkue=EC|mVx8BeQ!b>xOk29Uq ziZmtWkEPyePJ z`}(wneRp$7zfK`Yq=sI0>-`IdV0uoN2gFCh49avGuWj(DP&GkdcVnR(91#a{qP-Qr zlDI|Nh2bY}?n&|B;pDbBUZSEn*plW5R$U9O)92XU?r#jAK6~-;6$t~pSjom;f#wf`GudTj&dc9EfMXfwTi9`5 z43dOd(`Q=$;wb`Y$6qgvwb7=gb+1`z<7L;`>+cY^A9C#w?f>|~go&^HB6j6*Ftx`O z*DQEk(-5DlnUSH?6lC*XT&RJ(09}u$C`pvA2!} z>k&x=@!a6AwyMQG+;9u0|DMg`?Ukvxn;bdiXA)p>g%A0@eIJi=5`W;XcIxcKzlq+X zvt;bt)+6YEWn%U*wPX?Hd^HJFnzWbmozl|pAi|ucW63e7-t+NF5^YbTdqxvt5^m3zVFLB?Rrf{u@U~($uwUhE!NRH zmV>(NjoiW31QT2M$(I5{HfoLDYJ!}+m&YdwY!axog2?(%qD@b8edzCGFA%)bg5mq@ zI&5FLK1*)*d$JFrFJfV={t(27B|Hc1*R3ed!o>ZmcR?rk;NRq^pL8`9)CAv}_lAR{ z0-&89E{K*H;r9v6!Tv&UbFdsyIf|Mat@S3(KK*-_o!4IH*wpZ|VS-J$bvIhCwj9KO zIZ|#I&FVO(G75FeZW`mP7|z@5sLn$@cl)DQq|Or1EGjM1z?E549U zHgEZ0{>oj)XOelLSHuhi0)Q~GD3}vlKU+9$p~QyP!WF*(iy?vyX83i;Z}cUAIlx0& zySn;M?~2(E!C!r-%iHY9I9Rii+fCYUh>eYpKiWIal?4;4IWo4N-Q(+lPK(41CEa<7K5c7;$4sC96jy4J$`3Zn?&qgGppR@e#Gcjxl+s&yAFcdoXk!fg^y?LS@-Z5 zi$c!FRg}Dxjnu>7JwCPbyTp|=DUWj(Z)Lj8^?@|b4p0M#^iuh;xpkIM1VYm3+g*G6 zvATVL|HeEg=!oC0oW=VGYb0@$wO+)sNV(5XXZVle%@uPU-%Z5>q_d?-8}#&V`tJkv zr;ZZ3hLr2fVCF@A-3%)@yQW1U^47g|bt z-~JeXNyn<=B8)1Y-JZ_qr|9-WoB(14^l0bMZ^uhe4lsjKgX}6I-?6ReNb)~+)Xf8r z1XetTb9-ahQ7R|r(DqL+>Fw7t85rQki-sKm9hTwsBT3eGhXA5HIm&;D?e`bed4|oQ zAnO9qXgk*{_>gEnya8gmQH|%*`QY5&pZOw!xL@?=Li{KGfMKd@C;u1E6!y)b0F`OV z?Ykbvg0qH%mUwT>CyCgQKv{vlpWp!6IY<~zVea=Ye_{cM8gN`Q;H;Stkx)W9jgfkq zBy_ubr>P)E;VpXof^E+8?mw+F5nb@<+6)FC(`}^CDA#|_y`6ZhBHZ}k9eyV4d z`RRBJzhT8$R;2huHh*sPHQPtbm*Zp^E$)xMZJ-pn^AR)p7sKV` zNE?Bh|Ltv5GX{OZDX3S78dQJlCI>4COxU)L4sO^{mz?UZFgPt8Itww&(GAd$Q0NiP z0M$uW42^7~2Qd%iv$j+bn`ryE(qC;xDr&Gl9XebZ4eb}O zJL@^M^%v{*2U=NjWngZT@)C76CUGXbY+(kbshC`K=TlcnCX=!L=L9Q_i?+iFYw41j6%~HYP9h~Y!59L8=pcd=BUqp<$E*uLB^w4q=0=+tWsXO4VxzMe z$^DU|Kj|kt_IC|W6K_22C}3|37qj|)EYEshdTOgt7laTSvKf?1F>)<2w%{|sfPeNc z`Au^al-%2^mLj&WM&aDQ+66$*bY~hXt`}2KP>`AVo&IX z&<4q@)Q9e&1fWv9zzRtLFqUE7lA7;9wx%cEYDpCYTmFNMHotCL%vrtazf?`}udbY| zx-Au@pT4W|m|x%m7Ime`Tn!J8BLNQL`#Z=l$E5wTg~#mgZh}JYGJ?97gWs7$3@NX0 zvs)#Z9dO*~GQ$i27idPw+`K+vZr~O!Q-}^G^lGDa3xa# zhMAjyyeE)tdP7*o)lERdT~;SgK3nm7nXYgsw6(QIG%jC|qky3U{pQ0GbOclai9gH1Yd#1++n=*nA{ECau2r%vg1IDF;zksG}dap z1-F*g@3-b*KxO#_hf z>RuDZ#u5iE^UcE{#8wX~R@D`AsQHgrKs$3^Vzv*ZAv6Cu8>(cm_keu>e35O2-wt5R zKY#@sDIh?CrehV8Pnm1xlIMtU=GfOxN-#z#Q{Z=6Ga7{;nUM5IBGZo>tyn>kO#THGCAUuS;?#SE*=p}Nbrw;_U zpcCKng)r#NHyom?bzklpaQr4sGjoxj;ZOsE!O7N`_V)Jdbya=W1M%*K>D*Wsq4nih z3q-2Y_C`?kV7Zmyts7^rgurTRFuPp(rbA8N6_E=dydbOHtnS?wEm$#C<~5hNjTEyp zXlhVmVtMr^Ve#u^g9xjtYU1;=351)6a~**SnF1FaF_i$FHZ{QUUl{+NpXJd^_ff7- zPiIqK_MTQq@}s7u12Oez)1NUF{`5Cww?6*IP}Xl=L9-05{z(^M@*wgu`~g#lYi3aE z_&BZyNQ)-`M*Vwrg-`>~DHI0YHE<_CNO*9q_;Z!lq1wxlx?E%u}cr}`x(w3r4>cclzZqhzh_iMCzqqs(6y3SlD1OX(e?|KRu-FSZm+MdfWlnKR)A{ zI|vEy4N&+ATYes>_HZN^pPtjvyk?Nu!Xe8*e>Q}1l^|yDeKIN|l;L-vJZljylj}&d z>`7sWXlc}e@tu|SlC%?pDPS2EbcS4vj~w8comLl|oRnPN$aE;GwLYw12(G(rJ#5;w z9hEzb#l)<59_@~?v9W@J0^!_W$wIIrdKG|*1<<76zi|UzUaq;U4)VPPN z&)Q2`&7c+*7DuFl&sHf3@UNqFzTP%Ah4z>*xx?))Cd-xS=unbh9p>8}mmZ2}Rq}B{ z7X?)aGfZ+Z&02k)b&K>wS`peD#p%enj`6{Z8C|@fJ49nmehFcTTAxaL3DtYwT&Rvu z6Kd10Yt9y`V1^VLqdR^XE*=dEm@$DNhL^d1m3A#}1>Milr4vX(K9r3DR~)GIn40tX z9CFnRPYP7#g+Kuzt)4FZuBJvBQSYiS?Vt74Kj3SFc)X1^>(ua4au+}z_vOYPsG*^P zoG(Kg2&zlke6ttAkRhj2VqvC4%bz@MIZS#A4|D=d74eV_ER-T;!3UalM{6N?u7^O` z3#HFD=Mbc8%@S7R##SHj9d1#=_S&EAP>q2MI}o7P9?uWbL{C1d7WGBN0@T?sZS5?` z5#5mSo`huqWRCt1kV+a$b|YBDHTW+uF+ofvm}qsCMbUXR2KGA2?F54Uz4pGpe$oBR zASnO_tQ+OR)SPv+2r6q=u!;oGwRDKI)gH6r?D)6yE2X7L+LIt~Mu7l7c zoq#i;%RF^K@3R8ZGlxI~tz*>tG~SY{1Ox>+#q1KNKBtJ60A?t@;&K9m_0QzXFj23S zN!6Y8wU0Czp}!9BH)reAX$*jPlFqYN4_O{JwY^fW@JMGc$iJlRzCzH=2@*#fO(E(cwoEHQ1y$3E zC=JX}*^i6M5O+++cuLk@L_q${bfDI?LUx{`Js{Up=IC#@Y~pq41qSRS4)LzLlvx(u zN7W4t_YdP-4dOStj{lgN0x0J5eQngj*LUSjxJP_2?g<^~(VW00j9wWyB%^Nu)4rF0 zSy^3`iLkr-UrDmSsz?Q#dM}?=lSb&c&`LS`5KA03z~Y1W?w-kaVa7sE-AbjHo3e-W z+aW*-PKH+ z->_~4WZYmojL~+} z4C_K(>zPVHkBgKJUQE$zwk%;RB|vW{ci|<9Af}Nf7wzw}q`1jGgJ1gbWQD@EZBw?I zD0{wvn#X;dru_!HhJ@;H-at_Mt`1{Ls7f{^Xj&-*^sfzuwhHlbPt-$7Yr1(-PKa^N zN1N$W)gmrwJZ*PTu#6;Hnk8Il*JB2K-sIc}#`5OIzTQ|GTRpt$>o`Ic#5~Db-o0)< zN2-0z1v1VCFSk_RnZ%nl(}p3=brq^h^Ky1_vOZh4l^B{eU!@?MQror&cu0K7vA_UF zp7we@9Lt%|(b*)1L9DZV*K`4QhbRe@QgwOB(|{m zwU%VQA4w+dDNo>eJ3wzION{?jt{$JQU;Q@7CgYk|7%0#~f~H3-q?ZmnaH-3DVQs^V zcWvqu;rvqV)?US*K5Hx3whd7W-t2p&>sG%tfRSWy>`Mua7%b7N2z{9F(}z+zOkK7Y z?($xvN|PhsZ2VH}a_URsUQWJ>#Y|I+<#`@4rJqcMn{1_RCU0yW00L`K1xRcJPE$Au z^Rt=y-ukp9vJ~+SbTnQy5x=N6Q1P;9K2+FoRJsd~0|JzC-ZwNeClUi|cZu}MUq0e7 zPRD_QXycMBrZRLRdwTm6<;#L_%(bW zBNAg%%cHFAB#OFH}vYy(G)9 zvzD*;D!pYRbtR?9jzFLZRU5PxS>Av;*~8`=giVg?gcdI(!c zrqnyQ+qD>VM*QKNdCZkm>Ne`@@Etq6%{N_v)W>FSwf{_E!&P=tN`RruS1qh=N$30N z>;(=%?}ywHhDs-&a4&8Q3o*u7Fv8;W3g%wlGUbUyja+GES3p(}@%te81Ob!OunAkWnZLSV};ii8+qe0Kp9?0TkaQbWVqp z#Oxbd^9VfQ#^$=6Jmowg(5Md04C%K1zU8o7u@e#GvWDbfh~*V3-_Jd;^^1{o9Su|I z=;nMA0>{_GOT!mZK!CJ6-zE684jHoi9LD*~UZ+msaTAscKVM@g@^$f@x$uXs5~C7n zlUSRc*8EiFisN;&Ap^j$jf|#N9h!lik@*WggH!kI9JUNJ$OqkV`SIc{*6jRB=eyXv zt+csRu<;eMqIMq(kl|5TXEZp5C1H)Y%$Rw2FBy044P^xy zN%5I9(86xacM1f-)NBNo8vhssS^_HGbRsE4nK zWs5v8OKFfum6h{dflnkGwNXoz&BB^#Y_Z1n2Ux)rbYC??A766X!z47N=W?oF9Yn<% zy6x^^p{pU>7TWZqR8u$?N6Tw-UPpZ}Nc*G@6`GA`)76ZMQW8ozCHYj=)Rm(#>DzR_ z%FBGRvtIX)#OpQTnqrRfNn$Py0#3OzkG4Y2bb0fQ9gz09O;A6PQ*-CLRp`6r#OJ}=m;Ho92 z6OcTcOB%O04R?4Z_zRwSWT`RMT`dnfs-!`^zSi&H%BYoRWQH!{w0g;$w>)c}aMoqf zET-yf;xf%tKUZ$;y6&ArC=Se7SS`)wRT)OuquPa(Z4fwAmX(VajJ2P=Fr;V<6*I7Fn z+8=dpucuk_KGx@unm{UA@Uc5UE$^t}?%I`Q-K2C4YP`-dIW|u}c<5*D-|rr;eg|5_ zF4Y}B!Jpam_9%|>oA~I$M@xi}ZKOWGJNI$3P;~>^ajIBhaOAAH-!h>8Y3l5cy{X&q z00%Y`Xk<)x*pxD)1yU~}RrHM5ZFJ$he3rWRxwF@M7b+vvlZ*$fBDM20S(h5}Dm%n^ z`=0z^8h%kpRK5RGHsxQGmo1Bj>{`(tb=%FFLT}8?4+45?)P2}qe{xLdFP0bo)v(b% zghPP{2C$)UU0w4eT4sTxBnReo{`~-do&c!h%SF0tyBIcDz9Ie|mDV zAg2ify50G+@tvR;MFF-6Y)i%Iyx4bu#St*7ssU}CLcdN75c%?`C1$#(S|BcEKL6Li zbfHHA!*hWDTAS(K{OZz`^&nUpChC8%2fDvN)3m@8-*yqJg91AWBLB|TL=+Z_<>v$1 z9RZ@2p57C7^$gjO1|4u$7lodD0F6dqy^1U33zUfao{ zw$3gtf)}t50f9Q8iPJBBDZqH9!W# z#0Pf*a;4~KhTS)Onc9C8u$LuRSg=FoR+_&(4NCxJG?39$dn^I9P!zjVh2vNqGq_VI zR6X^Mc9Y&#l2tmsv==BafdbWGmu`JJ-Mdo=>I{AvaL@XFU}&-KU}w%{f{Nw88rRXl z|1mr<85wfcUovB^Yd)NNZ}D$6sPw4ls6hdm50aql24#LXP&j&{Xy5v_#ZRQL>rJLhE=XM>gwu* z19PIILRf;VzN)G!pe204`5p0D?GXR!)ClO3BW5n*g15CO)CPLk{plB2M&C+!JgZsN1zp`2^yQ}K>uV*tf}zbd2Lw*pAW&Q7D91R|uER3OLurd6)wbeGZzs;N zVqW4cJ6MQ)Rc^MTo_R_ zfJxn>4yFqiq=CQ`2_d_L<+ArWAgzFhGNsG2KL-Olj}#xYJOQ0rcL|Kexle#_a&>oQ z0&28Ot|GRy7c-gpGiYXwmuoAOw4o;h_5StHd)Z$&gAQosm#W4aDurvCJDnejQH`7d zQV9fMK>dX`h!X3a*g5|lnSim{nc^SWQL;2+4om`%Ji#yo`yHpteR-qR3k&8SU;R@> zkN=!F5TV}eA$h*~jaH|^aDRk+hODnECr}~YYscFfrHI+j8@F3y+ir{{*XkV=g0G;W zUqPp}Ig%Y~I|z?{&DOSb~J_CD58Zr}T=c11`E zDR+ktu~|8(%5S15DFmjKcyHbe>0@oQV43CaPU{0U2NB{(8LOU%Mx$9B-hOz&2PC>j z3R;kvEk@2DH?2M={zFy<0vk3U1p&NT+>ufi=$ChZEJSfwr}q=kUG|oZkidX*2~buJ zS2~&ytluoM_m`MBHa!7nonCtRnL~}8ia#(Ckm1ehRX&3h?%wCMjP;*R^FZoVS@ez= z&zs{Ske#U#k{IAkzLRehMW|B9k{;qCt}%$7g-jOw4HD>x4HIoQ=gYemK_ydN;^!8C zU8(XX7vjC|xn=2VKM&?WSvLeySGCZwR+wJiBv?(&29Yz{gNDl-!B8pT`iD`2Mu(EIXR}fG)f$t@mb=)ZW!L77blvULT~pweweg2C8%J^@C#Z$nYf=JZnn$k}Hop zmv+JiPzjJhb7T3tWq%b|#>**Yfky?q@x?~fNbJ-jhNIrnN6fQ!{!}cga-u14ya5}{EaI|*C`O=lxAr?=8BSl_GGzD3>RP)#UhwD06sE=$q*GSFsvOI$qKdUtOrxomk!lP zU6GL?=UyqoYo6|Aq^idAY5z!<@pb^Z%c=GRUfggWh#dXGEr6)0IZ=OB(L@|8a%b^Q?BM_Z(sE?u~qdvp9S zg@ta~zaPkzdW~gM#ZXX$LCR%W${>$z1s6S*y-e<+#wXue0n~ zz=t;+7%H}b(28QDyriy@Uw=BNffms$o~Bp$il(3x)0?{w$~e)h8~!G-=Ds5?T{3{x zf*t%uR@NPPvqmgOyQBU$mc*!-@%P%X2MH-a*H{a{l4Je8J2+pUu0`x-41nz9{q6Z_ zM1J@s;fDzUS023FGO2SY0&ionDgK=DB|z(}RDX`8y+3yxG+Op3n*JE~qw#b@hj$7Q zb1%?h<|Bh#nFnh&U>ahL(v<8xtDrw1w@=Z;I3G>6lLkREh7mR~+o@<4qNq!NLS1ba z4YMm=KUTk`?^Z8s_VG-u?m2+nfDfq5MCc}g$fIKhvOCIyu-Oa6!fei>peS&pP`X7R zbx62af~CbB0s+qebMpM*bKBPkQ!KSj$e3F7otE{XX(tpHW^QajCyI&f=e|zlL-fy? zmk$&RL1VkkXKOqd=yBY*!`)T*HG#;N{}V`2Acng+i8$jh*`O6{tC>wIT$ycnGB3GD zOFpwc>UbSMU`Cdgp_HyiCpl0vS4QCS5kDpiXo*EVm~!(d7u#zauOsm>#bE(P+&;GR z*Nm+T)YYn)WSs<(1FLvR%Kf*ywcKI|0Nq#*N7=+9uTm}_jfH^Z72$lsPt}TgSe@Na zeSLtDZ^A;|pIt24dVhWpkP{So`6l4R4(!7NT$|_y$hWT4p(N6!qd5sM4pG>e9fP*X zEC>Jf?f+QOnxxTqZt0}xJQ#o58O!sW_+Httak`*NWzG?&Ut&Bf39UIv0?xb;eRW*9 z7t0Mq>D-dh0KFc0@oh4cR%NcFvHsD`jrtEVS1pC&HJ9}A1;vy^QV)%IaVLt!3qkcd zyMzae-k78SbiE#&$2$yEt9Y+fOU4S?G>xQ#uV#*PcpLM4s96H4nrE1M)1!VjjX{68 z3@|c5%rrk+vhBz@W5TbBS%K2KTt?qwY2v^i*C6J0ZxtS0%-{dWC1MdBr@>rJwexyj zU2#*j%9ccj1B3dt=Zy%yBdGl!;`QA)y^HGQbwKlTa->Ay(OWHvqcH%fWLXt>c_Aj@ z_E7Z+MsCA4nCUvo~fI-U~WUiZ$44Ar-RGM^#qOth&jX+#WrSP_&n zGWOGl3z>ac`niwVzA7`A90+LgmTJ8)k>StcEkVGzswBMUaFu5Lw$}{Ke}>i`0{CpS zT53}7hcxJ!c%#VC-AlSa3`qts(`U;GXt1YUe9^jIZkS4)T7%iNbubmQ`#nssH=$za zwByLJ0!80w{Si>i*tFT)Vu`L*pFN)~L)O`4({PlR0M1Pgjv1-;!1mR6trFU2jl5k~ zCY2Z7l4kEaj_wQ_{Np1$Hb!xC%+eH;3`eS*UI0Q+eJ^5B`K_2Bl%s0s+K%Sh5p(m@hcHC-BDKA$s}y*1t#Jmxjc z&d#==x1+2#vX&(#6LD`-Y zSRlu!=N#sy>dae%I-aNw;{-p0o;Uu>A5H_U{e=zNCRfqEh2&9NSLN`aTdq2;knFh2 zsZUO51%S%&3jv_~S`CA@ODe-HHk<*@4dvPO$BjZ8lPD2kEtrPv{8c}Y*7FYQLzx~_ z=drJ`E-qh7m-;Xrm2)mOGUs5_HtEFpyE9SwGtEYfZq4@OCw!b0HfghKlohlA=;=S% zw!U*%4MUuMlyJxBz33$rAe`%EY2D|9Y%@-oPq}5isulg17jZPds8ruOw>K+uzhgFV zmI!p&vI(HyI39Gr;aOy>XIEy5fRXqf#U@UlpA2~Hl(yd5uV5b4?WV4jUwwjr`?0kv zgDH{4j+e}#%=RW8%%I-O*tkET->?X&6&#rzNUM>(5Y8bpbZ8Y$uDu4tt@gv-j~A=h z+g04tWqlD?Y~?&@HW^nP2kW$A^+3Aq)_p#lqgRUM34;#WhZ^%g&LJEmF8qK3?Lyx0 zWna5KEBZJ*{jf?w@gmx_A1ifj_len>c!?o;`DN=0+0v809193)a_k6azDNG?s({MF zwBoQxStZ^c7Q#OmQBDlQ_V)JZTQE4>=6T<+_DNz$pzVuym^}HQU^>>kKG%dpAoWH< z9fMDtI{T&NRP7<9d>`P3hv63im~#Zf>T5uaULN&@DH9*8rPuVMTvnk5WTc(mrvR5> zr9_K86l+BzIpvIF4EBc(KVf{&<%^@)kJ9!6<>Ds9 zbeG>YW)=zMA6Crlz5U8MhGlQN%m3iZ1A2ptH~2~j%1e^_f@@$T_;BfPza9W^*ybfj z_Q+4J>^u>Mh1fB}zzDy@bfS9{2V_!1S2Eq*N{_ZRU8coqAut7p^Zj|s+)6RXEsB-nhU24oN5!OZ7bpfRcdXs< z4Z(Kko}B!+vb2X;C#P~X_MADC;&N9}&5itmgrCN&wIm+ky27V=q=@*NJ)LJ*g7!rR zuaNQU=d%a`DLX~$M}MKuk+e~k6R-{rOn!^d3dCQNux&$Jf%tm{PjA<(4%PTzpDfSGs3O)qMXj{_M%!} zd$NqXYpp8&Q|zY2Vb??PsuQQr_2z1lb}`vN`&u_zQPRH`A?WuGXdYeq9QtQ#+@xY* zowOzn=hYyvQL9HWq4{V zgBpAswQT4bWixU-@|*XyyTW^u>BuaVs_FWh95PwBOTurQ0Fqe$2a&O}b{p^jqt)&U z2=FhE=oj=K@e6v3D`&7H~YfWqwQsqBuz7DFUusNg$bu8y?lM+ofjV3#F?^HO$N+55o% ztD7s2hkD=psnm^1%SjzX?ujypLPFN+ILL0sFm@@sEaRZYkdSO8!!4x9Hj6Qgv2#*% zB1g8tNODTbk|mVE%>7K~Hud~@pXYhq=kTYBYfU;UP7k`)G72rGj%Gknv~Zu*e-LS<68c+|z$o{b>TxN0mS(T! ztI%`>$_6)&q>kNL-I`s{t@^w+gO?IEzt*uk$G-sE*6r>D2ljYkQm)!$@A`|8ZRvQZ z&zBqH-EYiJp_|wwn<56XKCok>sj}AV45z#72BIj}fx!6V=!jksJUsBw{!>&b=$<5qS!jk$GWr}$mJNUVpe!r1vTG?ebCPv1W zg%%biU3Z*-H`o8D@6{pGfEjd_i1OXxbU3842|6*WbH$MO!nvvk(xL9!f;GOM$uyJ< zKX_S4$5-V6DVaOc7BVWR_&UpsXmh${_2=e-D(a_W4Y$4N2)Wv7>@*8$YfwN@+7<~^ zUbe-({rw!GUPJ{J2y=r+fb{G5D^IT}vyjj)^+SLBG@dh#XCB&&=~F9(3J(B`ep7loT%oXc{1R|F=Xp*)}5ofxAboe zMr!bMAS1)jCIrdIY`pHOezJ3LhZ^q`Y-1j19b@V+1PSOZE5FO<&n2dpy2JT;nd=I3Ksu9KREUjLGco z6Cm$l+qkdz=ztdv_}@55#Vkr!fDo4Lo4>zng|7Wm;i>!LDWDcWk4{WXY}qY4;CLmo zANL!yOz+~B2J;P5TWcGiJHLbEQ1bGuzFI*mwRQrrUuMkH*IU0OBy9Sf($NqfIxqtE2hxZG&iYYq1!8m7WO`_&$F`m@u&aT>qtaLUqa@tZ~Kl+%O zfoax2h2kAY$UmymhO9U=tf8G^w6+{=2Lup5YN z-qUrVhAlkBP$p{I5Z7h8B2eMwX!6jr-e;CabKKSn-p!m5M0w23Am7hU9GG;NJneIL z;KeVw8`$mTRFik91{#_XnsJ(G$Eh|RfWETD=k$W7$5cYa#1D#@;eX)#Ivuc)Mt^61 zs_4;6XQ;qGLIO5nki%i_FcbID$IrjdjBq?Mb*#Xr{H0omAj3!DudQrat+Ys*V934J zj`^^0f#a`{C()q)4yQk}A7ugw?j?8Hedza`4Am0LKNcx)7T+_cE+;>wzN@l|s@?5a zyEd}7YbZl!y=PN%BTt`s>z2E-n+3K>x5j2rlGLqr3m1{fyopQOL9!B95g6X<6!wri zp0zeMY2}vt_Ymj0!;4xu>~`BxkUlGaiI;WW=op=$o;vH-wfhDG5?M;>MfPm@I%(^6 zX0>Bnec(*jUmLlorfXv`cJ9xXS_=0=-ON;vqh`Y>Pt~VGG1cJK*%*^@U^77n-9CBJ z{Xxe#)WDxU3}bj2YzUTAQ?oAd2V!=CoKF$G|JuAN$IAmobXL~pmrA5gh;YxUMnP5=ha%95<1?LWLrONEfT+na zz?$bH5H3e`aE0A|(XIEML38DoDxF&S2q@%`9O(aaZztv)x*L`UO+w>=6F#ZP61}N| zai{u9y%vqT6nmkhrB{RwU{eb^jUyPPcy9T7w1Im@1agz8^O zZ%s3#+3%aa6KYZCMS_Y*>|TZUFX zvB`1$@0%j;mmNx)dU81Fn6w%Ax%f2 zBEiQ5j|wWUnT{JkKwP3k4RAjQan-XJ6F5_i+S_xDAznb*C#~g*JFbxjZRSjZW8IOV z&#e!QNocV%v;2FTr4;lsd;lwoy796PeAn_*2cgC@1$pU*>enf&tE;m+_o*B zoyA_r1SUYzdQ149<{oCd+!NO)G`W|L?Pii1nB`RIA6#NNJ zmi240f6E)a4(QZ9k1yQ0sJ8_$PO34ZbEIr#4LdZA5$8$BW+>WK*uKI_BbKr)U4pD)P>D35=fGNDD?6dLeW7$JI+w67OP1iWxJ zM;&um3~9aYD*KI<_k@s&920D!_(vlWT8JkV0U(1|YkkH8CP=`Fzwb_1mq-E?! zUuAD=ufL-d_kE?Y4#JJ;!IXD_(=#EszI6d=PnW3YEq zksIl5#=>>8{y|*2j2#BWnJ>05KjvRb#k?$B+aY@`YNeA z;<(M0=z+$%aRE8`1K!SXkoVJ9Vl(7%a49w_o;1VHp9^!1*GDk(^TWIpK1 zQ^}PEx+6(nFde-wT>964$#>TMJKT9b+WT+t?f>_#$v^6j+-#N|89vQf(PgQQwmWW? zC+0aE8061GvM33mYuESbQJT|7b=LfEPqIXE4m!l1kNS!}cX`r?H8LKO#pNFFOY^&q zAK;nm@FwMk1Y8^8z7~xJqO@OpzF(%{cO30rVg7FGazm0tBvM<5jQx}(MxQ?X3Y1sv zZEbmr=iOdZ2a1K$ue?p*Kkpw+l*WrsZob58>@BDrk4gKao@rQvwLqaVGRu7j%MX)o zA3*i3=L32?M+k@T^ADGPf`O(mJ4waFmk|%;hj@4vVJTak)GNB|K z^E-*~-P3@MP*fG>9Nh9#k^7Bw@Ey-Y?vbrn7$T(EJOylJfD zg7mg@aCiaO?WG-0PwCR=S6h-8#H85UCy51pvo(kS=_F0Lkz*=_kIrI?fJ~;Mvi-#I zt*Srq#}pB{`QlP*d3|1ob^ixjmOIkERdFPoSo?O=oDq>ipq^3Ks_HwSeCgcNJY5Y9 z4biP>zyysQDXX~ddeOKUDRMBON+LA#DCKHI;Lti8eNzB1EYuvwyj@Y=En9bNvaF3k17`!qMC z+wDK9+G5?1vJ&g=2=Wgvh;c-35Q(MX6YY-1R7LI4nZ@=gnfjdtk4B2;uVW#LIR~Ffw}*vg=ca*7Jhk;HU$Mg@Be%ac$r~>c+eI=?T|^gq z0)H-iJh!U+Kv#M1-gPafEL~TB*)k-y^6R>Wz_H$=D4Ca;==0TTNyrkriGyn4<9Bw@)Mtk^6fSwGDfN~cmRQNs!thA&{P zkjHdsKBw~+26#1CFc}7=j-ZUcG-0C>*e8${pc zxr=|~Kz9Qo9Ui-6YPil;10bp&buNGYEqcS`oC5(KXy@$lazej-Ju2etU z3^iWm#ZiMXUoedU3<6Lm#uFm=8Vmz02aY(v$N*tu1+ZMe8%IfLrYjvRTfhJTS5Q!p zp#iohaCS?|Hjn{os{>U$8-1QC0N&rve)Qio^-Pz<82L zcvtZDQnD+5?1qFr4~`7OJg9O0%~KxA*8s03YyyhpGZ=`vz&Za6q@HlHaYtMy(vFAd zDb_=y24E>P_~*1#^!j44SnmURKk*L-(DQk=Mlw87U-X8}M@+ze2uz-^(07*92s#}* zJsJJFHCgzP6_2gcWI^@@2C5G{u+Y2?tz>acuP;=4=6$q zAtCwVAuIUJvtSj{U6|NPWR^M(0qcSwZ;NOE7$}#!I?mazS7~8o1=&#MHxA5w8WC9W zAz-`)dA{)_GO@7m?Z-~trm+mnRA$$BXD&4x?gqVD&g>%*QX32%>FB5plMYy(Cvuus z12KU|rmD$bp)a~be#-Tq)E<5dpXOxa-05ifBX?4^F|V0^Nf)9vwG9TnQ4lscuJm;& zw!0w}1{?X|@fwnLZsofdZ%Lcxe=Q*Bm@xk57p6ctF~14CYB-ZkJSqIlgRN3J^$@MA z)_QdDHGu)-gTf}wd--z-$`_oJxSGqKq{bKA7wwL5y8Rk6wB=mfZuzIpX|vxx${=5h zN}z6E4k0Ot{NVRN4ews1TW?CfUNETmb+jq13CP9edvAnViE&B$iexhEGCdx){h7iY zFrv~{Bb2;}lT8Z_m6gwS)7C3&ao|Ums%SwA&k3Aa86GV%Bn^ZAr6qak41)ni7<*2&bjB+4i?}DT_ury2b4Dd9h;EC}tG!{1~o_IP=G9C$sow zS#7|cO5ebvn9B8STQ?WJ4(-~1uH?Joz>_C>8jnOewl~#dUPMkgmtOL3!Qvf8W~Tk{ zM|31fX@N$mNH5yJEkU0tX<3mq&%PK7W7306TLWq%wk_*pxd_ku9RTI zihOLm%pzXR6cM*%KQ*$ZC?OYWfwkr#5tZtYczh5grALn1b(e`sL@sYH@4dw5QmU$= zup`S#>o~bhn42Hp?d5*@ObuXnE*g7=2X}O#DGOtDXK4uGwr4`kR!+Ws%NI)0HO@Ug zA^ZWYcc`HRUH0_OBE_CAr%itls!;r9i&E}g_rxFtmvoxGbMtRKu|f2!TDwI5_Jm3i zC0X@HrlTjS_=i9Y90NYzqKFo=@mxCdPwUiYLyWMGmL^=?CgM zvOH*<7V(6b{@HHDL3ogCtle|&{YA@2YGk;pqR6|$qjNv4G$6)$cRjQe#wH+3_6r{j zH@NNU`}?IDix}D&u-(eAFd|fGcl$uaZPmp1_4wA2o{J=Ec`uH?-k_GlI&(R^#(w-q z){;b~B#Au~=={XHKuI)|rqr0Q7V~Q(_Te%<&b;~gvl|CwJxG$zEm>{y_xs9lT(=x0 zdx{LI0Lc|{-KX45WUWT{)Krn@nZvPSy}ME#3t_^O+m=}NqDUJfzw3KuMblN_yev5o zHl43@i%%)|z>jjg4uO*Thqd+#BhPf3>MP%6abJ&gwiI#tN#cc?gax|)hfMt6;-PHwTGsb=yg7>YQAXvXPx#1ZP1_K>z@;j|==^1poj532;bRa{vGi!vFvd!vV){sAK>DsZ&WrK~#8N?R^D+ zT*s02UXr^@a!&3-W)Rr|%d)^?OBS;%u$Y-yvdCg)vScwcGqV=8%)7HNygRVWTH*gy zRlnKQ3alh@{>0gyo_^KU)$sb&*Htw$E4d{mIumWq1e*h8qMb{j6P-4qrIo6XVZxC> zU8p32`6#VCh?O`=B5z65_=ygbc1KETdKS7^wZ2yH6HwX{s08h>fKMgynRc2J9cGer zT8O5Sni3plh$T2oR#!=q7K_uE;52cDfPn}H(N>Z%qL#U5vJ#7gE7VvY7#lQRZYqchHAXTlz1bdrFP z#f**^$QT_u5GFgySc5}na>N)M(P%}<{AeQVI<7_$K{N>FJEHaWNDz8kq}~Beq~0E- zcSJxS9;H2ks&+6V^l0K7Zx4?rPI#O>9A&&cLL}oHVeyVIF2N)kl5zI1ID050iEx0R z9B&JabA-e?!eZ^gsKz>iW9=bvjv%3lK&w4CmN;l4BGw+HgP1KS#tu3VrOpwER-HW{ z)`4oEj${J3DF9W;;AmBUDjohhF2UD1+!AbdsJIOpEK1KRZX@N^5W+O8K8X<$SgjN7 zcBnE#MOqmZgbnb~MM`OPW@P3?MaRvVyC69w6Mdn0VQY~mw<{rGTtGOh-MfN2Y_J?@PJm7 zr22YC7@@@$4tP+NFc85=pv)i%1x^4Mf&>UBO6WZ}go-%OHZ+A01_&*ozyL9+8XRXM z%)}5v2pcg3A(YVgKtc;};s}P)Lz19E7yxp()dnOmBy2!SKs12?r~rpbogKC!*=Bbp z*cB33zmtFmROQIW(N3^QNV2jefxc=mfEaP0tSn3%=p_$ArockrK~74`%HFwa|3{@i zuKQ(!^qf3!U<4p9)__&tk&pmvI1>v@1PuiMz!ZQ(27!zQa{wyVa)F1%ngoMjg$ARE zb)9Sl6cqA+3gg6(XeWeNk|1w@xq#9W9vBk`^X+N0-f&`QvAYm&(m?6UCj5XWPL{MP>P?ISM z2+_fkkgZ@;7@aWy4*-Bx=rMZHsqfTTY#?y(0~l0d8PIspWG=*FIJtzbI{^u3Kidaq z6krA|HvtAt;DHbVn_#rV8bq^k00x90)rT?BJHjE!0H6}q!$78hP!aDWRIus;8*C+< zWJBTr4+m^TDBA~8dOaZost-;Gp~W5+>qHX_0;~ZD*orV{zcLOe0RzGVXk{YUbO0DZ zF-|Z608)C+!7)xKJ#Ydmfs%{>x-1Ykh>qtua=2mqFJ$i(r7 ztx(3nE=GWzBGz>%w+0g85N1frg(f@*Jj6s$M}`N3L_vjw6C7}y^agY3GUZB^Df|7p zA5zk@!Dl3pJ+VMikf6+hSO!OemCS++!oUzb5HL&-g9RYFA)b;rRDcBVKt2*w-&KMG zsIVW!CW7!_2SGN0B(FG9(uA21d@0#VKLab5+*q0M3GsDB1phu5E5V($T%=gU@pP|5AvE+$sUwogA4*- z5EgF>A>@$uYak&L0b2ohpb9z^st+dVJ!1pbfDDL@ErVtssC2MRumwZW#ixP{+YolE z$R?l!3<6?pL^FQKP!LGSp>k6&ARR>@K|YdlpO9fg6cVTvitEAv0fxJ9H3|AntsGZ? z13wB)qU&iH*~?d~`NN;z?A)b?Jt;NOA@+fRQD7*s^5(xulI7sAWK>!&+gQhmY$9sEoX63Bp(`l)Cvx8{orSP#^(C=O_Z+6rn|7hK6EDI8F96V?wHg9LB`d zxP%nQL*0Q2h6gD<2NkH=U?>0;6;!ax1h-1GAC>_~Ae$gGM++2VK=lC|Qhg38*mnX9 zBIBGOpyGlMw31DLHw8kX3-OnbW5`*GG$-p!sT6O-0spDUj08dp`AB3al(_((oFzaA z(So>4&~-RbF*cMiCanD|!+0QCuo3GZmx&0%1BDYrz+bY#To5)`48RDEb&9QERFH$j z1SvXsK{)A2=@}%f{hB00Lfj-&Stbccu-e$mN=$Mjr=@3PXJqCir)HpBxpw{9bw8wK z=H%qw&&;})l9rWdOBPgE;7zd|fT9yY=7KDPv=Su98i*6+G$W9JegiPjVw9&bmkZx*=4t*aa|D0u?YaHkgC7EMNbi6)V>*ShVEC>2n67H68FsNk4t&!qn+ACrp^UZ~q~? zBiZgur9lv2Fb2e2Ffi!&C!0WgGA7V+LIuYOh*b0gtz0wIB!#77D1!R`}PElKp@5>RA@QA*P3tz{}ydauMMwdyrY%YMLmPXGWgj5x^I zXpm({u#0mgHbF5>LNGR<`tZ2OP!NYAZwSB$fB-^B`@uxOKn8(*DiY?Hn=OMd5u>vm zfEaN!CyIb%NeT>$Y0#`~tM=VnwC&QOZRh5k>o#h2_14{pSj#Vd{l6bqtZqt74cA#J zR;}BJIL>$mu(VVka&q&%_@f`>R8(ed_}g!E2*MwKXE z-77dQP?zw#H%tBYPbI?jPUO&7r+<_Mo)rl8rsy*$004AwtPQRdG@eUfgFb^I0oV`< zHWW7C5fLx|5}iF%pLEGHtU;R|!zRuRGo_LT#e4)3I&0RfWm`V2-TZ=k$fkYg+$3Ni z42W9OnVp0x+W}=OP)ddX6qn&ae8CJuh2?F@$!VFZ*R21jMCp&qepTd#h@u<&Sv9ME+F2CKCg4RW7|P|-Ho5CH(u?u|)qA;V$o{Cn44TJ=O1jXD4sbQ?FHZ-NOe?Fea71BD zG9)DX1V+B`r}wJWY|yG**Jf=xH3KSIcdFB{CCq{&HLw5Bv9lMhN=(iTi#1oP)395g zAtqZoVvJ}bh26kFtSN~?4sx6T1By4G@r)CWv&lg!2q6d$dWyE$Tp$D|@JJv5_lZ7$ zVr*Db^P7F${ZAj1Z_v6^gO;5dwCMCz%g*(hf775%7jse`q6iMYDGq_&hs8VNtZ6+4 zO(i_ngydGsvBUg$)mPO{U8}T$*1`4v- zae@bhAX~E)r15Mh2rWXRDcqD^y;1w$zF8)a(B*`Q0Bizdol(}TGF2P=<}YRR&il6l z;wY|weUOs$+hs1)cNdfi31k`Aae{r&JS&{#h5e|Mw9JEtjv=tFT&;T5YBj1(du1Lv#=*YMiYe@==u~e(wxNEHR$ zx^5zK0aTDRU~Gu*geKzaZQ?#jgiRkn(I>MuiYo{n6kc0X?zjA==euP-H`uabtZ6!H zT8t$n#*!LkPKk`C4_;v?z%-G2M#v5W4Ol>6bv6n38|Mi~h${pSgaNV!0txY;6e`3H z5DW-EY*+vWvMOi=LJ*WQotO8pX^WPXKC21U>WK7$RoxiN#Wb@Wt za~CeFQ?FsIFB^92(I+GO{+|7Z8@KrSi|TdieAQ(A4_j<08RTWzl5CE&WvkaWYTCMb z?RwQ~ebu6M$DR8QC#UD&P)BInxqIJw4VsP~KP@RO*Orui%hRu8*IqU2H~y?@ty*;( zweQ^P>K(6?jC+Sqp08fJVeR@&w(dM=OU^J_ljDuHnqM}l*Pz+(aZ^&$@0o2Wa~CfE zvPr8-U(~KvtA5*#-OpdWZA;36#h@6P@IW8e!XUt;ki}qI!7dYh;XsZPN7BSWm63yZ znu2V2PzkBN!IA&-fA7v&xXPB21Je|PV21kA$62=Yyfz(sPWo=XEhP`OqB>B~mrwzK z8SLqIgQ5qHm{hNEn}#hq4jVHiJ|Qj6oFZRb@Yi|dHE~I{f(-@H1Qo`KxK$Kdkf8t` z5MzkNaKKiy?9l7IQlG~rq(vK&BJ@uAlr}sbP7#F)Mtj!5(>K2E(!WZ*R_(eBJayH3 z@aX9uSF7(87;8?s*Qxi&-oqv)Wk2aPY*MxQZQlIov)WDC*J|AE#AWXY0tS8P#2-D8 z6GeuCECy+R0iolVTSXM&K2eO}AA@)%$veXOzweZ7`b|H0P4YEgv^8tkr1@{WTXz4c zTM?Fw8-B5F&~j34@{Yto5_M;q@IaXi1?zo+%?<$p30m1i(3cDVkHeV~9;vHPv2x|A zun7PIp`r>(AVkV)H7i%ES*cRhHtjp!%YQ_WkcdKz1H(Y@z@=Sc3HltCK9D7Bz+$+( zCi!rdtBwRmN=Ue_YK=Odl&@6pt0r%~^Wpm+mj2|^%B4Rk-?l^7PbyS?``r&ql>M|q z#j0<<|Iv+Go{7%1^sM~ueFnYzLFp17SNN!8x%W$cQo8JC?|e{d@zOOZ8F^6CI`x~p zU#eW!9{scLJ-Xq3_rp@x0s7fB5mvy@#_NJo%Tqcxk zB^Vy0&150uq z;%rkAMcZ-Kbi~;)37LD3UHrxG-g&b`#V&nD)NkG8&mUB%-mq<@>Ww{d$Y(w&U9ncB zT1}JlpNyWeph26ifBf*%W*vIB=`!fd4c{iC7B4) zc=|vV$nhs8qHVGaQI?DjeMkSLL=}V(Veu&ti%raZvvifpU$zc6XN2lgfIc_nI6=kf z<0BmWz=Qfa!p?XQ?We$+K6p(cnz4ai0uPc&bReF-a{bn4pH;2`RD4kbW`V2(TqZUb zRjSn@s8p*_?$b(>CQZxA$wwD-m$1Q1(@7w~kkD)eVTQs66>Ja~h^AK1>^s4OLWrLN zm#Jp$`q2B&s#HI7{_>4GUUlm?`tb<+d|0YnoH-HRRK3P6N`Cxl_r3#jA3XVC%g*|Z zS~P9d{-&p|BQ<;V4_iJiU-`WfAMZMFEH(4qfT3ebep0b=wK}n;#I&sZp<^aN^=p3F z5W()TQx{5nToJAF7OzT7%|bx(X|>v=Kl!X-v$oFkTxA?k(sy~#ehR(`ArgpFCIL1V zju?1c{DThu3Qv6?Yp|x=4UYQ#pWnk_f9bl{sSDSRpTBYP?A1#*ywIAK_vD?Du8ROLF&++heZ9)D7;e)W2-tZDc4_ME*( zFT4HE+egmbiYLb=iNL@ZfD@(gKv`jczO3LMcd*^yZ{^shVw`aNO*X_9Zcg8_|J;B6 zp~T!3TM! z#?0JDJNF+2UA98y(-*EMIMSQ6Z1+*=3cdOb%g%o?efGi+%2X&_w$h1nSFc_7yyG3% zz3<@C<*K~(eyODNdjtkobU^?R7?48+CK(6DgOvQSEO}7$nJhttXp=R?Hz@Ki@0EGC zMET$S>Am0o@jaCP{rf-H{;Gw}keGJw$@?WLwC~mrW+Y69XuEOOKEuq;%=m=OPxr_xMT4a+RC3{Kk=fpF(Z^nnLrJ6oHaHiGtl=TR{=FmgW0w%Jh}C zBOw)WMenyuRs7vsrT^zICEoaR$=|;D(J$V3tJi?B2sy5Mh5q)B9}S;4$Lz>Ov>jrgSTC_QxKX>BKWXXNvh=NT7 z84B^8xJp3bE;v3J z`O00Of?z-@&cJ|uAdT0YD7F&ZN-&@**${$(W-FL>K*f`i(tLdbDpsmmrOFqK2bc>+ zg0dA1j4x_d24d>ev)PmFj#TJ30Dw$C^k9VWSKZ27P=rmb1Qnsp^ouFYt+G0ez!gGp zt0U2o3R_X5PW{qlD$JO*AT={DIU{@N%C#j+mxUt~8Wn3#$_xyRu2ZjZi8AGNjd$@{><{^cj?%^AK_E zx6@{q{L5_j8J%Pq000Ah^9=_Hkp`hcY=xKz;Dl(7w#imd*g&DS!HLkqoOZ8Ghu-g( zsSH>;vmZOM9y>A~IWwOaoH+=x_n*A-%QxO!x9w1@ErY&}hej`7&!IGl|ogHe=!>TSrZ|FfB8o=eN#cU0!`3n`WVXUOhjA}5d&LM z^5Y6qXUs{<%t=YjS-fIR$^PnD^tGm!NaFE zY}@<8);(Ky9oVt=$i}UEb^1hu#Yrm88n284XR#Gb(~qVY24pK@_-hUNnG;zIip7Bn z-@vHf{^9MpOV=c)KQJPqNK7>)rt0}S?2Md8Z&(f(LkxLP6iYzk1r_qks7M21YmP3&KA@F8da}{C z*J$NX8+^nSEjspmr*x%QYg)J=iGJlFzZ8tO>r81UFM0gxjklMs+oiW>h0+f|96C#S z$KJy#&}UF_Ktms*mLrR+wVVEwe3ixIRjBgaD2*DpGY@> z1bqj`5jJJ^j@VEjClN4MaR~;{T?#+MO3;T#P(g%b_)&82wmtaZTL$@@}n3VWE^4f0ZdZQrAR`n@NKNx9bKY-jcZiz7S6k_2Sx==Xo}l?5R| z$Jmg_I}#2LN+Ur5$SKmW2qttMX3>&z!G8t|aZY56ghv~35^ zy8ZT@eJ8HLwF-t|A^(R|JVfWDFC1dzi#)~&c}Gt5Q7lkFKMQw?%M`$$m@n!uDrU?{&CE?r zBU|xdnR0c$Y#bb}v!|p7g+$i;vQf!T%1@a#J3S{qI^Obm_1Yg-s8qJx=Of2YhC}rM zeX>-sdFu|DIrsGzM?Ik8%S=A5Ae7frU z&4@|ps}e&(-3HA7m5(b{DOIl0iPKjSlG07KlU99-b1QLSNo7e#noKOngH^vR`1-Z~pks z%mpiLNjbm_#OPPzCi;;qe7|?dR`f+&5vntPQM+-MzQfG+46`$1!qjvU||w+kqEu`(3={cj2br#oPWd=2V>}wO!94zxzw6SxeRj>MVEs zqC4~&{@cHls8YKbY=tfJaoK8QD-eN1no|#-yZwvbz1?-d7_T5b{oO^piYtH(ioDrz zqF)N~k70oa@vJD2AWOo(2xP#(aq=glK{x?6;9Nx~WY1Z#`L};5^V_#R=`nP2oFf+k z8WFl?ksc1G+;q9e(Xl-j4?!14$$`1=a^ zOqQ_0A51Y5-c*eer9QcR+tW#ZYe8rvgHTW^0sx>Y@Ic-a2OHqKYy~r6C_q^4DM6u8 z6+W-}=eIr_|LwH2jNIh(oOuhE{qfEBDpjk2CP#9*Ur_jGm23Rv?f1t_oR$KC)a=8@ z&Q!1S)rTd^zWY&`cR&0X-dCgMZM^+M5}oM=v%P-fmWV5Q_8x@5{lwWz6)IJKzhv3B z-Y@y~`=ww&%2urUzi+<3bmjN<)GUM5k(8b{Z1ki*zx&bqB|iD&)2e`k(UPP$J77t+ z?LPeZ7j@tM=;ObRam>wLla%x!6*)_23ZNf@P^eAFVOs$@BtFSI z%>2tgd;~+W`{>m$V;T$vT7wPAmpmd=v<7MF=i1Qj;oYhea~gukWcFD`7!@doS8J%@hSvg7i#TXtt!f-~j%9q;v< zw(r_|SZA;%*phX6%g()r)^FZ%`RXl1=LRe_H7g=Yzj52{>9ZEhn!9N4q2qds-R{h= zCZ#!(vuf0Bgc!PO?|x}n_if3UUVb6VR<2*VV%?z==ky8A?K=;y-L(C-ho2=e6-tZ+ z+zki^XT#>*hfbVNOv;SopGBc`q-OgEN3Y+wbJEl~lV{G~zWY#gJa#Kx0|N!n1OsxM z2o+FwXumjA6lAk~5F8JX>}iK6v6{9Dj$cx2D8fQ+6FbGi~;gsdJWY-hC9DIBN=;p!f8<5BNyx zkB~U{rdWa@K^B9*rr?tBz|jQ*L-|oL32EC8on86;&gDPsS-D}?iVeG0Y}mDI{f?Cz z_QWQnBfO5Wru&8&S8UodX3B!KTMq_CTTWc^T(fz9K$Jz7khx~-!Sy?i=`08&FnF?8 zh<^Eoy_04xzu_Mp9-jn5L7}s_NpVh~LbDG90QR8Bp%T>>ru=yw#o6j(C^8*r3el&m z+kR~M#)Cdl2^bC02$}+8lf1&r{5vRy0b2v1xeBOA2%(t*0fWTW%5I2TW#>d?UR~Zjf@^=(QvL0YER0tSJ&a{jqc=<_bj28M}%8{0tl$2qHqeVaB za5|DQ9I#GKf&@Am5tG{`d~#+mh|cS+?X1izD3#_lAFJ4yD(d?8d~D zgyc-X!;zAm=*%$i@1qb)kiSGM0=6PtZ$mZCnyR;D z#=|ZpX2#ny^og19jQ|M};6FKvHYCL)fS(nUkRGK^iZrF@64Jx??=FCuXiHjXtPQa@ z{kB}6q_bw|5;G$Ji8#`G#1im@&u?!D|5ax&}Ao?jtK&{Do2y&p% z8njZ=8AVxnRr=Pp3AISnL@`G9OsrawAiH7G*5jh0-C*lMr`a=u;K{)>@ z1+{{vUkXy`u%%>f+`8+H|9kVJGUaQ2+0fm~-wG5#gZYPp{P%kFV_5pVpv9^Eshyom ziVaZ0aYA4KAB;Ev43|)Alw=kpeqaD_@IV?*#sP}1tOv6E&;w{efI)m13U-``X5Wcv zDhVVQ1cVq0vMLl;P#I?+Cg2fcvN4B#3=2N=TmHU6{tT6V-vO72!)ws;qYt5h0RTXL z_aTrVpNh=_A%VW(hHL5A6?yDWJcpASRA;f&sulza+OI+75ziL?z&X;2Ti{!God>G6+C|#1+ai zfbe4!0UiN58!Q6_5>(~C#pAzFg}fi3#ZDd+N79HZ*cXE8Gflcq-|lI6kS0P1Yd-;o z#SmABFdG?)3T$>nDTut&GINsCGT>Yz-muwIU>{P_vyxLYZT2MSdO{-oqKQlmK>{$K zzak>zfWe{D{2d>(pMXKugTNq`fouhx{fZW)2W=qh!FV9FFcRpeeo|6j{^>aXE)cDN z1aSxw^ix^-lOqTHgw~#N)7@w0{G}VW?2e2zCMIRjuW0FyD{!0>0Qm2Xz`=RXe>j10 z%!rTa-#vhSGd3VVe~QiWr22#t!Vd|saUi`XjVAz*(NL}w|NM!-KtCNP?FS^}7foEH z@3!d!S!gYN&ka)mN%@i+sBp4dMXDdep*CpxQ#-T*2_^>sAb(*84gjD-RX%7Us4zlc z9MsRq$x{L<2n^t>pu!PBv?CmY5HKjtmXiD^{!A8eHvKt~`jVSCVH|0M5TfW8frJ*e z2J|(B`Y}0Iq5Y)m^pn`|ScKH-Z&T?njR+xR7U(NH0t1E4KmvaN1r=v_Ag*A80F5WN zien6a^o5Fx>Ch1>_|qrCfY<~ob%Yb*!+MC96=MSj*l?5Zz$PC(vG$`%Or`4z3FK%o z7?1@#T9ZgBsK~$Hfhs9F?1s2T7#12#Rr-euh(iKN{Cze#Ld0PJu&v-Q!wO0IhYNrZ z{`85=2mnLM&9;KPDf$M3QNdqjz)-OEla*j|!GBSNCMZ2{!sfzAe{V#8g-3s+%71SJ zivhIo-y6{%nnLN>t;&MYuq37sKY=X({b-#3a6&T(@R|f6^xIY9(BJ6sUmcM_pg%OF zKfRE@LjpW(ga`7A_`3+k1_1yajf4#}>5YUgHXRV4KgA}(L%0?KW&(VuZM zNGQfIQXozMfK>q)I6h%NiZiqvFo4HJr#@+aEdSXZzz~Cg0eroatptn%@Bkl-|J4Ep z14@8|LT#p_{Ri z1|fvtVT08Il^D^XAaKgyU8euzW8 zB>W(!NE?kad0dPErWHY%0YHWb9HLc8nQQ{NRU9*rSdtlrMNEg-2l0i7;F5qr#sO78 zf;65`0hdW^1wn#6D`-Fc(Kckjfhq$JWCz%KkWHY!&QpJk%FYrKWEo%<*h)|qg0Mk< zkp~MvkWhbi2Mh=yJ{7eRY#0MXkVix`n$(YE$yOlLMk~&HSO5S3j*$3QWD3Y}5)~Ih zIP^g+h148cP}S(9uPNwD4Aq7FB@RNE(0~CB83%+GHu}qKHV$kh1P^Q<005?`l|FXOMablY61Aj!zng2eU|6-dFqWmR21r;zUY%2s3^hbFL4;)B9>B(_o zY@n3^K;JM>R1KPe!8U<81PnG5)Ji3E9R#^d>@~^PcC7vKH+S+e6gSb|8;JlrQDiz4 zJlvc~DM?AGD4ofvNy+5rATuY8OQMshOhd`7X-UacLY_(@NYWv_l1bQ}%&jaSLrHdk zPXvV1AdhTkKI9c4%;Z#uGtKEtqcSPYMtsPp*^<){kbqVtLUsr{xtB975lkn9nFHF9 zhSo%s&eVjYbh{%3aW+Em1Sbe)I@7Gq6uTqCLi{weCfL(#5U{7)>}d&1BskKnlv63& zQ>p4qwb;|FTDI7!$wIBD(qAuuwxG17njLAdHfDP&=M*zI$o4eQ35oQF5N2DN2~CL@ zFvXmhMqO;FCNOPj)P%l7gF}3yJ(Y#g5lyJ3(AU^#LPu2TTW#VSAOI5wd7i?Mkg8`U z!f_Lq!ZBJwq!_I9SKWHf@l>Y8C#LBWQb5OB(@@4CCng)L>9MFzYfXtwNF~~u8e>g~v82UVK%~a<7Zm(8MM{hb1ef%sUTU;CCCZYfqwn}Y zb5$|vFEL_F=@Do$rbe15(>H*|H1q;9!juM11o1%&hh)MGDdEPH2xDqE<&2mAR2`T7R>_ylO_V)GiM(O9}<>&3==jG!I4lzA_y}Us9dwLPUrJtua5$;}hJwSWib@%jj_q^-j zdG`*Oo~Zgz)dL(N?s)j#cK7jc2XXg~ySKah-P;~Mw>`Y?c=+6L_d(MgPoG<0dV1e> zzkBPp_bqqtn|Hi#-1feH+xyy0FDh?&U%%yj^_KSyD!s0PbK46|S8sY&gvJ$Xo$&OJuykzk0*_5=)}#+D&iBgSd>Q+g_J%cwM@IzMklK=>}CV zUq|VQ^3rwBi`P(kU8E+A<4LVIy&-?;mgl9LUYHbXxXyE3z3p@51}*j4O&^++Rzkwa z*KT>zq+s6ixmC=cd0x2Yeg3M)`754huX>!j>Us8x$62D?FI@9P^~_}t z@K0a%Jbl&U6cO$afH0cQQAe-y*F3rEbrzf}o~JlN_{=5GQY=zf%%?i@W2j{C6-9;hC<e}hKSHI)A(Ur54xV>Ec+UM0TF<#3ICls1fpZ=QFA(#%f^i`_H-WJL9qMocsRsclMv5aaiEa{<9wY&$v@&`F-een#A^;MMwAj zr`_GgjGH=U+?1gs#&zx1yG@&pO`5c9)Tn8LhE2X|(6~W^CiUw#YVZ}xhR9!i)$ptO z4Zp0{pkBSN>eojp`KvF#Y*4rES9QPST(^Fm+VyMIu2-|xmo;jA$z@%XHEY$aRr|}D z$e?ReQ}r5kYSjF)Mvb~4s@DWvw?@r6%&c3zdL0OSQKR-3)$1Tv`=UlMeo+?0XEn+ZUA-)|RwuDa=vciR zN(fUX{->YUsQ5Vz0)l0TS&s4-ED`2Qf zG}LERYJOg&X60&is(ewqTD96$zo=c6e&Lxf%j0%FtzN2p)e_~ZeeiMR4?nK*{wGyF z__*o^pHwMTzFL_I)k}Z+MVU{lm#*+d=?c|Lmj9w;xoRcKRs9IUWvhJf3B)SD_i<$i ze^92%ho4l&IAtn)QL=nBjPtI_RUzGG6m{Bl)GmHz^K z4ESD|%Cv^E+yw;2|CpHXl&Sn~nab~#0Zn7RUHbEPN>_Qm42Gq7-^UbGq6>9|BwF7t zU75tnRDP>84;Vm<5_4@?#S|=yRH6y>-3omhm9C}_S|{9-S+tLL;9^xaVk## z#>s8slsQwU&9qo88R;2zhdlwwYPBR-aj}4FMeV7?O?ay+q)?y+f_Ow~37rdS(#V2^ zL|i0@!jl#iq2kpheJ1gw&yL6`A%Xi-dc{eFz@>0UMQMp|geAF!?}>zX1dS`{nJwbt zsV!1`zVOJ;ZV@M$RO8BOQIpj^CH~B$FL^F#d%>hkQc-kLA^4&-JTJXqi#Yu?&xMn) zs8ivNiqaC_$WyC*(Q|PdG;~aCY+O=u63Gx>x)n$u@y5`o(vioYL_8Xd2SQ_T6DFFEeUKT|KjH& z4I)!$QqaO9p@K=3v`oqsyq}qrOYmR1Ma;(-PftqB=WUTR5-FvumK)r5?cS4|lEfzg zrbI7AsX7hAT#aN}Mi(9x7OPpf)QK;gwPvnq^@5J{N-(Q-yg+fOu9_S-u!vlUBD%<= z+)4sULL<42D_VqIM_^pMpS)H#bV3aV*UrbL2Y z1)Z2pb-8j65oa1qsYnZ|&)XtbGs=Rx5KQ6q%ob6bTs1kmP{}M@h~kS9q!(psB>^R& zk=(`=tp%&qT3CiIa+QJ^B3&S%T6h$VlB$vs4qvoB8c%vW=ef8A1qUZ4CR%7c7K@oh zEM_w;kV#bJZ6z-FRH2uvsW4C2+676I7ZX`?-pb>Aa<8vqFjwHe@ zT;UR_fOvXR9-it{@D-F*O)72APAZ**Et85MRcK(DUwW&=H$^?nJPxy{;G{_w>V}eg zh%l8e*`nu6%4586i=+^i;&2CHVRT~Bpaok*6>21klG>sdJr}JLCz%2jYGICQC`5oH zF_v;oTF}nbBF{zjkU^csFlo`};$}1$aWSztu|$Xp${LR+Q(U@g z0!%UizFf>^lcH3qiKv?5;Vp8)R1|0Fpp}}8O8`W{+g0T|V1|;T(j*tWEha~=rEs{})sTw#-2P(BDxoQGTG6B9^ zp57uVa3Q{`DIVU>Zjq8JsEZ)W$VKW@5c$*=2}Lw9xKiY~FiT0u7D>AjP$ba>4P4UO zwMDP~T!>`;i=K-c94?ayBZFfGVYZ+!ae+EPm;69~x*-EpBr{g}rEq=iQ% z)6ys})sIU~7?-4_QQov5rdiBnGT=FQfY9#G#O^gf;3^_QOR`S z)vA76asnlMD&#Gb5{IrY+al@7Zz_nvH26LGhU&k|%W&mUIv)?QJyBCK(L|Q1k}ZfD%navH-meOd|0RGCs+m zCsEu%6G4TWX#ipipIPcnld6iE6mR0NJP8o-yh*8}Olm++FnF~{G#LremDp4f7E5tP zM`Fm_+>2_@os?KaXp^Gy;w_>{sp;uSxrI9OR5GauaI0!2;ziFzRh~a7kNWa0Dl(~B zAec-Pn$#ur*E|8M0k+i1FsKPz4yL^>iNN7eE&Z?#)pX&IWNvR+ft%!S3N#Y_UqzqMPQZA_nvnX?aCCx1& zfF>GB>mvPKbYWrX%K}33iznrFN<S#wIF01T)0QkNvZkiEkY_Pz>}gTlRmpe z)SY{h3|EUx3YN%gy@;Y-T&J3ne5#{NDqa4n=fbUj>vKUrt&8+`(S?Nz3lOW&q|Bm3 zB=KlA&_z}&OT*dRZ=&4C@E%IDgkOh<+rJ`FT ziAPWz)h1ljm{fJXAmPegaDC|(5sk9wq;4joIX*s4B=|+$R0q1yP7xKyFXoT{h9KIY zH=FflOT5{lH<@6UXf`xx!|+>mEO;T)pd_niqh98CqeXA9>J657*EkR(f)a!@NoG-9 z;uSX@Y@(4-_F&xNZf)#zNfI4*XvQBr0Je#uqDxkd3^9Tk`F28w0W- zlpahpaR-{q)j_>@6ueXeMu+}cWA*0PFi)M|`RKc+VgfG5Lvs>=(uh$>t#L%8aqI#TP?TSTO4B8nPV^m)%k#FQY5 za-A>I!fh^gL6=u~F4U?nB0>e~1(m{`Se8m@&F7E zpMJivL)|0{w_v>(RL}|Os7)~d-=8*9Mo-aK-aX?D4gSy5H?Sl?7D-FfH(N(Uz#JHGvOZ2UcnHTEhdw0zB=$Lz_ea@W@T5g}` z+3~(-Tl=XdQ9-w2dtGzn^#L~HpUrm1zziXsmXwV&VvKG4ZPcB(A}<*2j1;E z*sts0z^?7C)!Xl}9j+A5?phF14Bsi$v8_5?^teO8{m!N_7*IZ)FJ<&T>6~*SAOU!n zVQ2+(d1{MrgCFpD@msd_Fnv~(*nX-tevD$_B? z^`_CDom8$Ms3Q@sHYC}iXC}o3S6&*`pL#CBalLsyZs(zx?ON^ATf`$0A(C8x$E%fu zcAiuOiLGrB(V(OwjmRxB1}_3qs;+I3Ov>F=3(Lm3!EA5~v3L-sVqPn^|4kf#!}nGNeCJ$P9GiSn{cApeXsU_ z1YiI#cd>%s;VXpTvr8MNQQ(8c$An@g051dwCBQ7d<9EhB%tJ^rnZQ=%omE^ zEFnx6p@x!HS3B3AGpQy-gpyO2rx{9|Us@e6)xfe`lLoF+ArgG$n{e?csYWhbW#PK^ zLd{j;B~6+HCm~c{;o#~f?uV|1IQ@;ltF1298XDL`ti%BC&iy?*NhWOgbOC>efA=o# zP1oOCX3<+Q0y<(C8j5ccB$gQw7Cz`u^w5hLMUn7y9&{mn>amcxm?&-2p57wn(S6D! zq{NDgI`yDBj1uuE7Z%|yLSGi)fus~sB3MLwE*OOygxC)g8A}E3!aOVyjl|F zx=couLX&chdUBPy=);LgYNWo@EHu9<5l<$iYr#^ePAsac=fZ+&6p_K}MO!43k^pgd z0OoTd-m_Z-f+v+O1*>&~bpkJ%D>5RL)CiiTP*O8uh4?7nyOy5qQV~VKCXjsq9=I$Z z*kX+8Z|~h9;_?L@+%p~qGek$rl+4iEjVC+Zb8njqn{c~B?#*_&H{0i4|5{}RMh>9j z(J}uoUh%)?8oM)2B5I!ayIg5`u>T3K*RScy$I;(Av+hJBF{ync~p@o*dl6W zLYtJ>!j!AzLc<_GH7RJWkQU0MRN>KORMeRHyh&MRZ9d-9ZSbzl?Gj`5(CzzNI+P~qM({LBS=V*9zHwD4{6 z7Lhy)zTmlV$LCE-U6r^D!j#6Kve2aTE_g1|k#o^4QrBlD<;){-M_gUQNEfYSVXY%d zp0wx|6`52ewOTNxfhL70Rk>r~VYsT~Uie&CmZU{is(h8?M$l4qS}CoS>WYD3U9Hh^ zaS`r!UJ(^GpyK%9XuW|3pn-6~k`x^k?=T#0fS}@4P!R!C#97cSitn8U;RRxAEpgTv z=f?K+elgmr0+uMNdsijoe3uqZiki;^{R)o0NwTwk9Zbb#<+lSk(I5 z=K@s3Vhf_shzubrRSoUbq!_?sOvGIuORo-vJSawjD+`A`C|jQn;a4t3#l~@Ge(@wS zR%BeF@nqMc9#jD&DAFJg$`c+`EYdKus;RXh$04f z7Q__*iOYlP>)T<>g+7+J1nDSu$^#N3P8WU2JE-rgc~AomMg@n4(e6dj#;akZpbH4K zpG*l`qn>RSHrM1;z{DC^?)lG!Is67mEt;^_#5`sxnv`8A6x7Bqsj(T5$R$m9?LQXwoIxDN+=^mns_8qn0jhb#h@zHTrX;oQmqy*HK}4VPiXFp3%62H z&|P?{&NLO#QEqULu|{f%lr~B(ikg^GGSSgtLwfyaw4FX?Kvb{xk)h!*)oMg-N?d5D z7<1&M`I%Q6{b;mpKUO6o&^=lgOZ_9MI|huzK)l+x=(wByS6iO1F*N9<(RM)hE_a%) zzrNf+=+YLXjRz_wIw~wQWbmP=AwL#v54?~*?O0GuR0KT^zLlr8h*!spq$@Y0S8=#$z0XtH-|9=>a9 zl+j3C)T_{Vs6@v^g!q|{x47@sPJr>$C$oTrdxt#Fj=49R$DA4j!@`}lv8X~NU815) zG3K#n`}e-v_648Jb|LpEsB`brt%E~@=-kp)LK!=ws7N?bJFob6KW2OBC$kw{4wmGF1GCN*KtTdw}HN02f=7?37X=Kz%K2t)<5ofATBB% zeYqParl`PpvLg}UQ;!DpIg|Q)U|h;T;IZ_SzcH4!kT(W5^XwMU4ht7cmNu@)4RDoO zxIs%`(-uhwSrgysOP>pM;tC~g(kPjSlC;nWT%*@h^HP6pf&7x)dBGMvJ*liymDEU6 zlQau~R26!;CS^fIAjxpr3Z#))RK*)KRizz?m0FvW+6rwE3Gt*%@uaFF@p#DRY!Qh( zHK}TFgW-sX2**y)NYuuqsuIQT0s`tD4j|2#l-Rye`lx=0F;Yhl%tRNa`Jx7C$k^zJ=*8#1>wm6&*UL>iT=}Zg<;Hz3w3%^ww0EF~ zKFZ*_E$XTfs#GmhVw>Wl!Vg}(JMM63pF^?T4qK219M(-f5_HMKPp{LSqZ$iE!Bq__ zTLfCwndGZT@(Z`lv}!^NN+lvhsq;7dKcX z5}-zE4nrA6v`RvA7myksf)U{{akz$hdW2rT5_0uQ$er8ap`qciajyN4nUSa?v%A^x}h zZ(O~5>89^BpCE6bB`Q(}>B5szsp_s#xIjq@iipLQgoe2L1>f`wx#=6~#{Mo0Kju+9Gb3n&N3m#-Nwh;MyWrA#X|~_RMpUM6yLDxy@jA6hq>(q@RdZd5r!}#-DpWIHpED_F7Q>6! zN>&?8DqOmfYX&!14M^d|1ui@=E@9X!DyhaV;!+XH7iyznBBR2h;oC)r16^=HwBA$- z1)A%MDPy@Viokfla#UDEG(5Yo@JN#9AvB`Uq>7K1G%6le%Own1R8#~kAbFc4OCo4v zdATqlS1zd|UzLQUsEDwrh;Ud^9Bs5+t~QpJ@?~43P0A8Xs4675M!lG#7OE@4B`1Ws zXx+5uLdi7*6@|A*I#9_HBC58C-;{(cZB!F^xiBGDE{je|Y$BfbT!^4{;khPNEM}wN z%TrrK1@|o^p&D7N&}v8iBDSNXE%qHPgNP;XUI6W7AS-2g12AkPK$3nd{%qogJ( zxF-no;u=f?%P>tPv#GNP!*Za+yD+VWV*wck1zn$>6j?;kQ3x(*Qt8e#mCsB{?J_A5 zB*DVmi>iD!rWGO18yQ*+cj42(d zPE!%3UQ&@OQz6n#bp>5`QWjz{Zq>Rmhi*uEsJ4PhaShW}ix<_n2Q#VLGn0}i)n(HP zUecgyL=~EpC23L-;_08eMZ~0Tu2J~H&x30(*dp};Rd{>p^4u-@>z)g55mD+T6}d9? z;w>sXskCa{nDg8%k|v(?MbCxgK`T+d@D?%s(&s|8LU+oNG^q&j^v``R)R#L7MNDFd z3~Dr~8=M1Xpev;izET0C$c1`gd`@7Z9!xw*a+PK^1X2jU(8w1g3;>ckaz!qfRCQzq z6|PB9@}yMoq?ELaT#HOf6L2?Bipd;IDg!aAU{dKxh3cp-EX%8qMXC|c!Cp8;i)DR@Dy2*t(Jn0LbiwIHi*E|gcMUc(i77va+QMLD79uL zm?2dci_2#xl}t%VaaFDbFUrJK1;0s17@Syu-=GykHOQoRt4T$Snz@1HR9WZ+79IyE zykGoWR7Em3sf%2R8JaPjGi_Y0nj8=nlAgW5xRDkR)8kW4l1M-|Z0D5VT8i6t=r)2biS zps0#^A!)u1Zlpfcq=^@v6did|)lm&jH8nF!7M@fkUM*GCsGRuz=}JYRNqI^oD3gMC z>7?i=ld4&mB0jHHbCe*4khgGY(HgBaqNZqRakVjv1%B+g5Knv5T(Atv7e5zHJcP6|i#utO zN`{gMu&~A^i646|#3HWNKw=`uFKLu|VP4TKl7gASmnsuVsOT0^C#_Pz4JKO=is6HU zgM#=X1okN?2!g6bBbZbb?Mf`n#VtaT99^Wz)r%PX=9+6HX?tc;TCEUTcUO&CP$@Dg zb(RaUq>bvTpO6|u@vuy_UNs%BRzze4B1n={NR3CAIhmphO0BN0uF^H4)}p3Vi&m3z z8xrPWdAjgbo0W;@Z_(3}YD|=vf?I?no>Zys>O~BGb4_?Cq)lznb0(!Wxp1jOTs$7G z=%mc%E6cb_7N)m!SCcYZrYrhfgdj;N<-#wXlPS8O)avRg$yLEyYf)3u#SNB&)*VO< zBEqkrKo*t>1DPi^O^9f8;&!U5lCIQ97rZeF(|nNz;sny(Ji94 z@TDkNE%TqGJX|(k5kD&O*7twZokvp{`wI8B_y71(QhJ zq=~4ybRk08n4t=-g_~SeuCNSq>4F;d6{ZlXi3AJ3s1KJU%NZ|WxTIAjm>4W5OqYz% z)WS_#8x!(YeY6*|SVkl?E+V2x{Rbu1HN< zm{<6vWLy%8E6LT3lj@=dkhky4dOWk`Oj>3ESmod`ZVY2opZ z)EF*7S}hOdO0IMnzE|@XQt!OsZ~46LgVJZ4r?L zlgbt;hDdO)B3tz8&&9RSSAQ;&aHY`-O{$U_1BK#0yG7ch!hZgw%%=&oHkC;D>F44G z6A}>U4-UW7l?Eb`C3zH~czrZ zi;zq!3Z)X$TJTa==5SSLk`EWxk8_qhn4C{j(Ws!EaIcD}eeYAvo8 zbNKS2=R!i1xxcjI^$O3WV2e~w^%5qEfIzkt#N-;i)Bw^?<4Ygr5vQO~gufoxm5kRwXgshG%3D5cZ;|Oa|($I zQ}MZ?3awoPP!zPe!BG19`}z6%2lxf}BZ1Nq>V8^XWBY;2G&Y>;B*c^?sum2vB;Iu4 z(Nsw(ps<{}BC&vLT1hl1&p`#|f9|A(>PXTbWdKuB7F;P|5;ZI(ZBk8;-`pysniS2h zE{dmh(S|PAqC#UyqG71|;w{3P$K=FY^up)D9F6@-&&5?QGAS-nQhNHippW!o0oT1s zdj4~f(G>etpNm|O=r&xFB59Kr5`5kkQ7IgxAA2rJw4g)L=i+ww(BVCM_UzlcZ!f2P ze3c3@_w74yVBghq2ku-tbot99|h_Rv+9shD&@p?Fetk<68}4}DooT3JFhxM;sg#0!{iPkt;tc=V*ypai$N@oo+EZVmKB%OV-fXY;dsm+*55krBFPT>mvG zYAMC3IQ>JC+k=M>UXmX_evq4Y|MQVXw`RIuw2t|k^MAC`xwWJWqDa%rvsYmWw-qM`9)ZTGt|+AieI*g`P(w#p_T6Ixe2{iB$gbY|3w=DMiH48 zWepYgi&0UW|6!SI#eKY8{NnsoC!$}PWxn+8L0n7>ta+C=YQ(_)1m?Z zfT1WcK%brW2=3aEzR9Xn2*IBB++|Na4g zPMP++P|Ap? zb=&2PN!y%dhZzxn0~qvX(8so8XXO_-t57 z{{4Kr-HvghqNA({R$YwF)7ukgb5e2=e0r?J*U#76$6K%0!?+bu3v@qm>IBx@vPH{9 zix(X{ba2=1U86>i0>T?KXt00Z{<)WSP>`pWCo;Cq z;dICjU<8yVvk9Ank$rr8qNAf_|D{!)4rZjM_cCqMEWSnR7E208M5Kp~%^X9vE?@mc2 z?S$?gJ9cdG;>FM{sPf^XhugMo3!H?8hvMl%0FdbTO~(!$JDfXrE+Zqu*VlK!f(1Q$ z_iWm%X_qctK*RgW&dy%9Ze6D?otiXl(yVzioZ0Zr;$q_-KYk21edn&7J$v?qY5Mx> zulx7!fAq*vCC-7`}G|^aXk9Mk%QCHt$Vk_hY#Pqdw12URc+g~ZPlvPym|9N zLqeau5ul=BgN7LJ*3DZ07&v!*@Al}~1E`odVIou$)qZ{Z4Hz_F|Ni~s$B%E)xXIF` zOR-L1d&%M@Sb59VEwK+1CQi6@>lU<1r_(K5w6JBXmQ9;9#Y%eh?geuZr;odT|30kf z@R7r@n0D>jee=yXt5>Zy=ndE$sPEQoTd|+RM+}Fq;9gp^Y;or787u}}h7BLqx>f6T z?b~59SFcuGpj%tFZf(@K(Wp_QE?&4ec<^9sW50g=;L|#tPWtfU@uS3q#4TI4^yuCL zqcv~Q99svRV;j+g6crf-9}myy>vp*Nui?hvPV@5eFgOk};AFx41?YlS%!|hgbU}%W zY~Wv;1r-}NZ5%jgAf6g-5D7EBE>!5;n(GikL|gC4&@V}zQF*`mItKDZ26=9NMO5IZ zhKfUVdi3bAVZ#QTG*A?o4tIz0%GE248aBeAd+^}FjLZx$59~i6K#GWn!0Fq!Z(mfq zcI`TO^5jmPJ5{M#1^zwGKlu1C6zB+*YTTr8$4(ugXE^59u3h_O-7mrK+N~>e5q&}L z+_@9$JbCgYo-2TaXOAvaHg4R$eS197rp=qSXwd@B3^>b|Eyw97$D!*+1Qk$@8#iv? zI0OeaXUdc*=z{aiY&GAxa|cR{?idGFrGCBoz#dd&+_-TK8#TmS-FtNJ*s&vgFjxkh z+&Eb$eLD#|(-aB7Xwhuiv}w2n7!4>ltSin1Km~V)^$#9A2*AdqD_5+nSFfJj0%pN3 z0TnQbfDpR0@7SKYG^H*>h78Wm$w8Op%a_ZB5G-3X$ADNv&t5%`A3y%+$s-spfV1A0 z^)OnSwry~}U`a5)M~@ywUl@%(efz+T0eaD;eY^I!UjX&??K^12`PHdYC){$s{{6;` z9fPNXzQ8lgZ{gkh8?vBc)0RyG1`NRAh+_yw2}^aunNdWvaQ>@M(SMaaHS5RSrxV`U zzk<5If}ucu6;uG+I7HzoVaJi6Qt%On3>mU;(V~#x;QV|7YFKF4@ZrPpMCZ+&2ge3Z z4$dBI?%1(o;ZdA8d7^fm+Sqy=jZh1KWYeZizz+^W82xSAwxJ1Xy=ChbI8?9(H*em= zKH@pyc*ALj#{*{+VGIxz9u{`$)G0hsJYxjSa6+zMzmA8Eg<)0aFPsku2oNpDQ3^f7 z+FUn6n*&rdBwGRPmuI$b|NizJNK2+qpAMhx_MO`ZpD;DBap>To;NW0~!*TM|N$4na z7x4qIgcE(lh!I!-fTuU;p>r!&u7tiq9dQ7|Fh)d1%$YL>w~x3B$U)q-ckf<|2{paz z<0F_S9c|eX9x3cFd@$?@VjEJ&;lpu`6zb9fHV|hJx&TO6`HGb*BBLU)dpKesfIt@a zg-z(wr%%25^{_>uVWEir$BiFXy?S*(G&VN&z<~n*IqnNL0@Xx!02_1tuzmxc&e?Nk z<#4%r?JDLC2nxW#hX>?x!2aeeJG^7p4w=1AAGqPY@t9txtr)P{mXZDAsJP&t;|BTH zhYDn<0?ze4d-p)gv3<2`)vjB&E*{B<;lrU`m=ty#CLX#4Zv>A72QVB1xF37>>?NP) z(nV+$4pTfcxH>o&y*<4F9yzUXigfSR{hLnTT)1!nRZO>i$98NYwD8+0-$EFV4Soe? z9LPtGpaP@8Xh0s3K$osvFg3I)Gn1kkC;|EcX4kG=lK~}zrnsVUBX}4SCrwOBXNU5uyw5fTuWr!F=EWUEp9qOQ7`dOxAB$f9diiXbkQSM>T*K8y5>1 zF^o`IaWA3A{rmL?2c8%}fg}C@Q#JJdhn4p!b zR$jh(dEfqh05FcQDU+udOa{afn599(1~X>PIC}i(`Sa&tNNsi-9-M3I{P9(r!Jv!K@>}0f0S$9-KXU7GMxh9j7b?2NECy{|&Crg9q5pT+EKX zaHw$jL7?zm02Pg!k~4;5wNBkSuwX#zfc^t8qxd#h6^tPe1?&lEVGR~7S_BYcNjQ%O z4I0$DPj3)#CdZ5!6B9=_2-gk@jr#@EQN_IC^>yji1;PUc4#4^$562yd6%}WY4@^%_ zhdk1?tJmn0y~a(7bm`Tz7tDfm!R}#pStrhTc>maca8O;nW;HY$ng`GA0nYbApDAJU zM~@zjTSlycxDG}bkj9w}Od|R+Sxh)qFgWlA)WN*K<@@ft?~b25j-7lhwqo;EinehV zX=$m+$w|&6$LsnG3aE&#JIQ=AELYv@i&IAS!!>8pO7_?Pl71%mBfxkSRN%}=OiT<2 z41j5t2o)(ZIuemF&OhjfySqC$I9;%_cs5%$Z-GbgRsF930|ey~ESgNF)2C0vIi56W z5}pTIA&h_(9RUXD5Y9O`TBu^j)~{a=6@>dcd(Lcl#)v85PHf)18Sy>NRJdVig4-iX zpO&76iE!AjS-mDdKOb%@0z2T7Y{m8G+X`3`C^RB|tY^c<4L}i84H|%@!bbusu$c4b z&daAvX0v(O(q+(BKylONO(##B#CeSMz&7sPyAK{9hAn~$c!1ryb%P?pLE61%H*OGM z*s)^=d_`|>@1&$8xT8P?R9`-_Ll+<%+XCzrblG3fB{?}6U4V*#0|(+1fIK+BDo_C= zp!&lPKOoWo>R@lNW^e!`IC5AXP)#2jG--kjU%PHCHu=z@LpY=mn&XM!?yxh-DaqL9 zrAwFM+`%&7T){9#M1;Q}$0 zCvy*^yx%+Ct>xc~3fu!8!-0bbu<3Z}H*VbkNH9f0V#2iVreXVV>bQFlDxjUKR;_|M z0w>+OcSj5jor5q&h>3}T=7ofWKn$i}=dPV-Mfzdm58&Wb#*+XHpberTM-Css!P%xw zn;koMpo)Ze1FD9Y0R;52-Pi5l4-`Sg>Q$?sLPdw?qXLp}bpXhF_sBy4&gC{yx=;Z` zojZF@P=Vuo`}XZXJJtg|!yx$&@(~HZ`SH8!o0XOI`0?W+sDRlVIdUW>f+0n$0#0gb zs*jHkJQHXkXaos_iU9*MGBYp*GQ4@jD$)gU6uLlDU0q-q&;@5X)JwV)pkffA;@Ht+ zu%%Fa7!A22APP@m&Du3VK|vDsz`{wOh3<|Ne z7yisph4ZV}3XBG)2uci36dHqr2bOp6kipOc=*q60yX3&b!+<~Ct$Q~x@pQ2f9v&X( z{^-#o_&hkCF#>!_IM!pvjj8`teZUDSh{5sLpb&MxtlReMwh*w{Yzel6nX_h+ul031 zU~kpRRXuz4tXZojqFd+(MuURFA8?@pLjj+_BtQsN#(9b9p6fv!KXv@824A83^=sF~ zLn!>z@z{VUv;sB=XAl;n6}^1@d=d8GrVzj^ShxTd3;=-M?Afz7H8lmjpn?J$K}BwE zE@A`tkYJ7;Ga3sUGj|g+K)c!OGz#O`SRw9%0K?E#XgM1e`LpYS%)%f$;%mSU*HE*eGCW;i82I4iRC) z>Ox1aT)l!lY0|U_2Hd}Y|D=hNaHlO>w+spldhk+D=SQ=kV)K^Gh&F+0KVLuK9H#HJ zp#m8JHx&IwkSszcVi~NRj+1sKB<0E_UwH8P5q@20REcd-iOdPKOyq zEIl(F!5{d*&xDB+QqxoM{ID-@pO!6K2Bkqr*Rn;+R&84K>fH-Y1r!>6;l04G#h7?( zIOC(DqR<6qLC#JjoO5{CaJ~Hf{GmPYP$7)SK|TUcO-t?6xf7IZ$&w{NCUoxf$ z9y6@AtW7d#1fb9)bVp2yV;&Q^T9L8ZGiT0VIv7UyFmV4MK=+lA4tW4x;&L3NFeW(E z)$g4iJlM2x6BdsdO=c5jK{6N&&}>Lzqu{eq^fGV&P6UZn5E8(H$61aY!1%JZ=X4oV z&;{BoU0}PgPMDw>-^~C{5POJCgB=(#oOTQ+4sIWD7iNi!j6_pjULJP4NB16BKTwBt z0-u1HM163v7B5+h9mcj`QXF20Rbc&GYx{dL_6Hu+m-Xu5oWhbi;q}couM-uBo{_(t zVou5Ykx!y_-^hI9o7f*U6v(d_ZDV(ET;05N6aFa7F;pCm?2)5Ku&sDzxN~I83o)Eh zc&K=^I2+KBlm^=N_%YPw%9Sgy&WIV{!g_goIUMSPKNyqv`1rHu&f>6y%MP0kKJ+^z zGz6~H#ve9r+p!I;fS>pV(Yk1;Ec`B`!3fEmyqpW?FFu?7f$1|LY1-4preb`jMq=yHL& zfCI#O`*>qNaWvqT!O6?d3l0g!8W4bi50@3*rtBD6Q&Lkry*%;w;I;1BvkQ+h(Uu7J z9wVc>#ca8H?J68a98cJ~yMA|JiwZC7@5y1|VTTVNMkEH$8F}}v-LDfBzl0OjQunL2 zF{3s+1LN{C^ByN8Kk$sqJMEKwB``bOcrPXMp*`&Ze5aBF^pO0~P#gIbQGtv-V#Gbk z%gqyKTB_h9L71r+P)9~ZfXawXR-tNPRO$gkd|@Oqx*NGiNSjH9?(D%|>#dH?>b zMl6(G^Ixdahf%F`|It?0Wog3NQ|UAJBsZ99dACn|g<*!C%Wca~rj6g~EHlUeNW99& zvdFKFikD>ECk}ELbeQk9ZQ8=qz?q7`x5y(e&c#{sYqb@e1sEXy^XnMc4TTfJfbKur zf}?X|N2_p`m*m%i3Y;`B!SE~KYQvET2@63WTMUWf{G$Bh-&f@Pm8d}eMQe^R_|Nfx z3dw~zMdV+SUkfUb;hSb=Wg_r}zl&RbjrO-V|NQc+|AlIF5qIL^D55wQ=bt)5=iLIrV|{|6ki7$= zJdypW^bU;VYNStKn5S<@=h-1OMus#P{}0dOLOvT5v|x8kMw-Lvu-oj#sW|fV#q^q#n;+vt@Y2G48PfBMavH_UON zQDOek;s5X);U600=j-R|%kSb;oPN3#= z?VUz0Ek;Fg`gcfzididmyNz3Ue$b**LnxmdjJ)8)zy-$!EjT`S!LfmJ4|kiqt>cKL zQN^ezPX7i;L&YAq39Bv*S#)~n;!{HwpB}X6^uPrt2P`}>aQ^W@3yuw#f3(Y#?Hz{0 zgEAGPqB#BRlZJ}DZsXTn9=hoC;65`ip3`f!h>3PeBgrP z1Lq$bF!ylRZ@0A{_7kE4>$rChp?{vL=jNhnx7*#_-Sv8XW@e`1{zDR$k^h2(RUxIO zriO=y2LuG9q@)yHGZLy+tJTNHCnzZBuL6eb0FtUdonGEroL+CjZfmGmeQC(zv%{90 z8Mfps{HQ?-PEcq;PSmmfbB}cSc3Zoj1{GKV(&fvSH*DB&_wHTA&CPxA;6ZS3@VIf~ z&YnG+l#~P+)$lqJ^wnfC8I8uYv^2%i5>y`=KWo;k*|TTQojZ5gvSn-5tXZ;T321Pz z$k^D}#KgpH+qNxSxG+9G9`dRuCn)ZfD^~^%95`dfjEszoS6{Y=hsWyGtFK+VmY$wo zq!*^Z{;XWN^5)H(#U|(eJzzorVi?@D!oms6b?equ zty;Bv_wE=R!m5FrfIUoIty(pJ)3rY@8531$ddZB%=_Ls}R)C7(OUYIYUUGH_M;C(@ zpBlJ`P%&`s(eB^w=Cnr;6%ZmNEL&l8W9lz zF)ZL&>m(}#is)~+n>6wE_7;vbVGaBD?*}ZKHf{R-_ur!`ca7;_)37HP6MG`^Na!N> zjwYEA#z(akr&mk#)Z~-d@oTR!D$WjFdT#iVGlLeLqL_Qp$sq_W<{s_#?e?D{+QtJ$ zIc?fB9KCQjo8so;7aV7_%1!k1Ju2M~@zD z+O(;2=g#orARv?C7zQ{OEm{QYfdhWZlqneJn{U2ZzI-{<5y!KqrzadROby+IFtl^U ziWNP3_H5a*<%9_nE?&GS&{ESBLPh=h^>H*{OoPE7M+3xgJLmOD)bsXdi2$+S6vpSIK4{3UMW;eSa)Uk@^d4WogV>I zEIl)L@u?vTP7PUfVhBQuc}EBpKS5l9>2cuo=+WbcAAX36ikdWO()8)m&1N%n0;s^V z$5V$g$-fN_KOV5blg48Pa-KYS0tmHf(*^=?EtW1_3cYF9t{wa$s3!ViSoDITh(cVr zaAClJ0fLj0Cr{Epch`&lU2gd|>t#Jf62{rMaU+I3efl)iQJ7d8PGT$uYA63JHi8Y9 z9XNXkvH^ozw{8KbfDI;sA%YtQF{}!R1s|tAlo)uE(U2g9v}MZ{+#2oz_`h-E1{^bK zg~0>|#{t|+7%ton>=^Kmaj>?%d-o#rf<={oMg)ck1jd1VlZXiB7yAQ?AuuaWuafXM zfQs3Kitn!sU4DM#@{6OEUl_UU?6AcE#_6GpPYfj|>S))=+h6-DqawD<;amE&~@km!dy7_ zP0Z`*|P`s4NWoy5{5-WUr1s-Q0UE@H;X*(5jgqw z+ix)%1_3G{k9|0N_^=pNRN*>8?-9vhkeHYl7#8dpfQJo1!pi&h?TdSN`Ig1$M-w&* zsF<^Im)p1NuMLHvSbkyDiVLG)G?tu04?tpV05Fz~h3WNrKn^#8 zSQ%5pd4nEfBE%a2XV

p~v7OGQl7i3Q49w0tadR`t@+bfHxRStPK$hb^vIH54n5y z?xRPKPMkOqsF03WKQtbj=I-teK*FK|GXNy;1{zicP8v1@w}u14!@~pHg;vZWGZv?p zCu|g>VyD};8*YqPacSg=iz8QD7_s640t{sO`eM<^!Sj!GpR$8d@tVKe#@U8=0H-@n zMEDqR&2a$Zp+cDiB(N1w1^E5YMI^ujlI`2K4+sc=-t_C&52rE?d)BKwU!X?<>bE-IjEh%4sLpO4X^qoYy96wv0`vu7hj0bqQ6eSr#0 zjae`k6dJ&Q#smMbFgW93slb;hkZ9?7d2qvUUqIKnbLaZ^?+=p#8JJL*AlN=-A z5v#9^TzP5uiu1#kog2FR?2sjAhAcTfWa051Q+IZt-^{)?RN$FGIri`0FOdVzUHSJR zzftUecAWY=vCnO}uA&p}a$2{T$c2Y5~12RLq(;GMU)(9~ z7o)kt1|$rN1XSSO(H-`1=+L2a=FGv`5Va$000&z!YSbt|8WsRv7OW+<3p=xK-#%C& z(3l<80Cx?906ahirk3&HhGAz4Tc_gm@`T3$RLotqn@}-)1yFHm3nL?ZM~H<>&0R)`J3+Hjy8IB)>-zV>fIf5r(L zMW|T0$8GAyTccK99xM~ z54>$u@w}lrIN0ECK;ht0!)pgZ5GO$4;2Z-y&?mT9@DOl(q6-dS@whM)ymp+g&<|Ju z@u?t;?r=qbCB!O-K%_6-b5<7oekhPQ8!u89OaT;i?AYq370O#t}t3UZ(OuF#xmmnx%jOQmTs96SE2@*tylsA#4+F#SxN-fi%w{WE03yv$W)Spk>)doD5eTbs z41SHn2?0Dzz{3l-J36(n7d13IexD`g60kl%D5EEjeH-?gSto3PR2tNc=L714=_uje zgY}Q;+~JC0$Jc+lyI?gSuH&T zh1lhZ%b?bDnh$K#Gl({zBF@+i9RU}+v=j}C#450Os~UF{EpB@l3Y+S={NrSN4N^4_ zwGX~=*h_rW4B*lXrEzUg_#cu!D&6ATrw-H!Tq<#GgE)>h3RS$XNj3}i|HB>Ms>&-j zE{7xe3)K!;Ni?~9tQ!_VYVo8GG!VoJ zAXXUDL8yhhnKeHPKJ~xU zxV`<;N1K)}m}0~k0(uDFa4<~KGH~Mc_Yq5l+({HVdi7f7R}$nwnQKWRv08Gr(6U5S zz0Q`_iP2_)*e#3_R`%h7sW72BzeGZ;<28?=qi?mkU~;C8cYldAz%_rFO6FQUxr`{^ z_fPg=_k1*rpRV9=mME|k)v5bCRwg<-Slub+v(z~0wD!uBw)J$q>=Ou|7x{Hr_%c{{ z7YOhXQf=t2IS1;?MW#H^e39?-)tP(NaETB+;6cD&Kxc^VR*eN5H4ZB~HD{-+N-g34?Qu z;>e)T;Qh9WqFIx$R@%VyZ5duE*{KR z_ephou8H^P`MJiogVn84??eqr{#fvgVN>U*@Xh}JDoM`~72gP6>{{3rwOvZ`*mF%r zp{1U~gd9ngY5IYKt!dx+h%Qh%#f-`H-=)|s^&_~^CvU-bp>r@K)bozK8R^y{=>x%| zwVE+ws=u9j8o8uCewkBObCy9piNG-FdEAP>G%~4MaY2gZozNd@EPC1Xkv9(plP7ps zEoN0%&6vlgw&IH(Y2S;QX_U&Sh1*o8ycR?GP-BCZX8B3%W&Si+x6kUKtx`M z4_38C*9MOK7%qAXKN8=93US9zcdM}(E0jrWiv^Y*4KOcqId|YB2(6)vH)d97+c)PW zh}s2GjQk5$;EGGg|9`b{F}B{we6a62=eV1AyY}L?EE=^yCAOGRi@v=+s!2BW_5Znh z7QDr{``pLo|4&c^s*(4&jJcZUTTXGNxQVxE&$-*(-DXpTwuo9lMi8GSo%ql50$Yfk zqn6)wUu(Akfd>d7_huDjTg=z3r+CzC#r5RYr+%wBwsm$Tt6^xF^e^Q|h$Rk6T4%%7@dYo4Y6?ce*7e`6M?#22$_ zPiC$!W>stOxsxy9ElBaFi#xT339mhF4NC_Ga4Qf}fxpa}B?GZboX;|`UpgyX!aHur zPL=X4`!DL8YDnOrm4gF~Xja{4YGhvOPqh#`c3Jt$KE{Q7tR9!U!LDalcpASCg@a?p z8(fytn*FpEy}*-*;-qHIzPMZTZocwho3;rJqn*Ed9(ub~g1R)%<3|z3nLiNSrszt1 z3D#N&@kJ)Luee-gz7P@*ro}TB^5`EW+^Z%v^XotrdrJksII+_Ko|?DaegKCn?~%9j zNj{VcjydvOIMQ0#ly<2Y|5KHlChmVsF7K*o;2ZqCZ=(|y@3$8mx$rN{RY_IA#uGSs ztLUmu79G+&9eV3yKIU8MdIDn>b*M)HZ^~8GE#!4Fw7e2x{%^$}rCy`r_oL(y>xu=! zKDVLG{k}-8?o8>R($^ygVH1|8Na+>V79gTDw464(r%6c8yx5+eZVXR28<*Hx8E#L{ z?)1Y!Q1{kS3;VL7)a->^vbR3+9j1vdp)bKv@qVvgn3;vB=xcfKkI8MoKjmcSq^Xw~ zcnNxKR>Lx-v7tgGN9Q?hjAh4JZHOG%xOsQak@(l0oK-c#Vhy)`PDviOk2gpVtr8d$ z&kGNv0Fu64V{xzP+I?=nGpybRHNHp)z1Cb=6AsQE|2WD7Joe@?W?@4=XGhe(zsBgM zO?0|dG=+Z*abuU8ts+L>WUNCeV&~iAETP*z6qi-E6!;i(Yjuh=rqa*b5%uoR>pJmu zVnhu$wasRSPIAsyQUAr*Gny9fbkFZC?@_&VC@xskxj&LZJi^()SaIq##5v;V#a3lB3)qh>_Z<05ZPg3= z-eOZv!{SH9xvFKSeRq+wu|(mx%yn*F@n0p!BwW%x*9!j3cvf~FG2rCj7@_f@u_|ag z=_R-MX%;z3!P?Cg@A$7$Gjk5_8y7xAR;yFB@oCvhPXA}?eizz2d#_s29boo-gZDb< zW60>vN1csMtK7_Er`~65`u`|dZ-KVIv8KR!j2T^|Qu09X%iYpC0tUngi`){q%tzM9 zF8S_~hwfj`>tHSQ-ORgIKM`Zas1d$xhzeLciXo-7cA!n=veKE8Wz-sZ6Dle_kMCM$RP_5c-E>54JDTjPZZ1!vR1guJH@)SSl7vztyt3$eM4U1OKIxM|8) zncho#WLu5cqA0IO^y=R+`6eZGPeZXU6{Yp3tvwsr-v`MIF{QjNy?&l9V#)58!jHEAz9a*xrX~DniKGOI8 z2Joh_c8uRC*&xO{j*oWcQ$l4X_^tR9Z}|^hxw@0ZaC;PQrw@2MUYfk03wG$M3|4D-udPZ8n{u=w?H8X*XHYZrd-`ST zbf7s9f&Jj3G=qG3tiu=M5pdc6Oq$Vryz#Cske9;Dqs8J}MV{aPvWsJJSh_Rr#{9s` zz;oqITn>%#psNpbv}((s2cw?S!ZiF~b6?vigqJ#D@bM}Rbef{-!U$_E^75=|Lu`SD zQH!Z=Cw;AFEj18GSnW)YHH8wPP>x)_2Of&t*@JLX69tK z>0|JyjOLYqR@oXAk_~QiXT5v-qFg!6DIRse5Dr3KCo|6|Ka`S%& z-q{_UXKOMmQgW9#w;{^>T$*0!Oj<|NIeyH#fKEs)97!Wq=~{q}D!$7WVbr}>bE7^D z(Yt39!&8|*B^-OQ2JTQPmQ-h$Ilf1-_c_OlKS#j+H!1JVn0G3#x(uydx_cf!%)9zS zC@DsJ`3kBZ@s(5lFUs@lHUa0<#-R4tjm`Tf4%DVDi6>eHmqmjqg(EkuS1*B9o@-s% zbSSry{`vgd{?A7Jj0Is^>DXGxLsM6@0=bh4?8`^TMD?|_6V{JNjgD3 zrb^WP95{9k*71tP8~E#Ekg7xZh!fQLaRqO<_9STjsB3a`G5ya=b|H>5;n4BM^LPCu zu)|+0&s9HsJA#Cpy+C-VERu{ieSy6E;Rh?|$!i-n^eGFuL>H6fs!x5&uS8CdN;q*R z{RHovX(Xd;?LxHBinJmUA?Y~ZhDnnKlkVQ4w#O1GWhbrcgyth+QrI+ZJjpqxbDLw! zA(MU?Rn3)>N9dx1w^Kg~tK9$lh(9?FcjSnrD(U0#!RY8S_{%AWnG+00cfDGi-R%600K6D@nn^Fqkgr|!M& z{xcpE+ptgHTASf0A2lIn;%LZ#JG&bx*FbWx*BIYUy*f`B^u!B(!h%|GNmlfI{_TwE zurO)h_IMR}gtL6OfSRmx{vE|Vb>nDc|6Z4iOHXAoTM;2q~B#YNw zHjU(%ZRP?aehMvr?%o3gGVQ-xdK2L>R85kLS;|&9_Th#2$SpnzI0=q4M(6o4Jm+dV zQG4caZwFu6a5$oQ%ECaF?g9CdvZ(OYq(h#@VhbOhd%*L6G#uSmRfH<$jE!t<3*LMO z#lDsNx z{Y0EQN2_!P1m;!x&%*MKLrpC~8EIyJ7JlB({JFHj)snt)pF)K>xpW`UZs8%BSY zP1Y9AP7<3?c%zd4k$}We`?(QlhfBMSS1X^~g z=6?N&ZARxfox@nRFU!{xk=GxeFu#mA+te3$u=O*3V@RTy|Jv>?Z8go2_*4FxLyk1# z9Cv5wMajxbOdHaYVfHneW;8OsrijK_Vyo%Y{?A=-@0l-nY=xAI8+xf_4zfau9c3=a zl)7~Z`ybq3O^bD^=&fS0V76wZoS(vvs?w(laOdoc-8VX;r!`zJ*eN`Vi0nX@ZD)m% zKxP9q_y;{ME;T@{V>O^@oFM7w%~B|luNMIbC5kOGc2eed;W7eO88 zB)X(eAAR$HDIOyv*cbN%`yn|`Fv1e|qfg6}&lCF}fW=}`bQNcQpB~A{dWt6moxdmp z@oEcQzB^^&w3~RAY*vQkSmf&dTk*X_cq9PT33UDag1_tVr$jeahy~^)DhRHJ3WYdx zv1|C-;O{skvg^_A-(Z%swq~9a5%;JiT8yLK2QPR+6vutTJh4=E0^Id4J7bE(q_%P5 z9)Ub7CF6|PH6@OwEl7cJ?bXC42;^12%NKA~=68nnf3@8w*AGv{aXF-v{G{@DlkugB zsx#*jjccooNYhEDtjC;tOQZAKyw%mYV7`sjs*yBaCKQEtgPpQ!M|WPbqhzg8sB+alO-9@AL1c6#eiM^To*9RVk@_$Pybgx1p@hE% z(C1R+j#~LyvWw4S>T{}p!mg*6fwfSQ>cgfKCI{p0S*6Uy2^|vPq^b6lcV4zDB9SOq zI|fBEUncZt7>p48fH()P0!LCDRI;^!M$>R|MzI+n&sz>E%&tSNQ#hkjM zc1G(Dgx)bFJASu1?%n(TzJIm%RwgCZgxQo|kAa`!{Q7>`D!V#wQ^YBJLmJ><+jvFR#8y!m7cjj_D-+7zm)WSw=VBVa*2HKjI$=lZrhK})@ zM?Q*e>R#BqVJui*1mzb_? z3fk^p1w`&JVdL9p8#~=HZ2IPSJ;5Kaz->`k;Gc|yebkr^rRr!+PCgMKj*poAZE%7Q<{j#)1HPzQ_)bINEB$AIz0g>M* zrnF`kq$r>9T#*RI_D-t}qpuL6)_smf2H7yt&{NgF=Ki!TKCQqQ6KYn=`HG>Uw8f zyDr2Ty~SUA+n_oH*ECXb8>wJgRV(4^D|uQ~Qqd|Zhwa>TnDT+YEVaDXOJ9=t5`>=Ulor|5(c6%E#D#v#P4!?4RhKmOjie^Dx&ETf@ck zycl{Y6XI+$O2~OFcy)vN7A*cu37KoTx3#Yw4Y{#)mkIhCu=03KQ7+`XcyB6F&Nl%v zAhceVbZH*KXzHD~_E1`nnCuDb^RNVSr$UEKrmcn?t%=wsc1>%ZS7Z|jRZrvNy%Xcx z#}yEGaxVmw1&&cC`^5JTU+GY~w$W&mK|4ef!c)@UpMk24^F9%FA623}ujV#|d52R< z8;VkLi`G00(n3w?<$Bi{I9c z4V|}JBY0&7-ZDT|v0IM7e{30MD32gpF_aFrb&UagqZS(N2&w-lARf}KyM1^5T9lMwIhige7G=hDUI4#IV{eYt7@#?wZ}=ea9_0$ zkbwvF3Y@L=bJZSsbJ2y)KC?Zcav_RjPeS2X42v3^A zrYlCU`JAPRny<)0L@bvp`*Swt`h1C3iP-0onzBT(N+_A{uWa%iCJZNfquZDlo3CMW zCDiMW)@E1sj#?%;6C~idZ|HL)3mzya#)ZW=Oc|gLSRNSlO!kRks}qv)Lv%t9`FrW-L+82nqy|r7EwaW$EDHJ3x2MUVoBu(@1VJAQ z+s^HOV0>m8^X%|)a#WeE*@?Eu2e5|qloo`2rqLT;dw({YL!;CaDFgVldy24rPBxq> z#ph#Z^GaU=#`HU$ijw#$rcZxliAKV%2D6yc<+-MGaGqJW2_ z0zNEQFVZ36NDsWSteDa6=osRjKNJ<}F_t`6{ zbqdO+(j~C|S|g_1^!%Tbyn1{QNi-+Ii<&(sQg!>r^^G~|WA6QNi>gW$A!jrG`@Ceq zMY8d@Z-4rCW}Ty$#G@E1#AaZtq(Tc0ZrJ!!K)$(?%@bUsJ}?}r?P@4=%&faLFv#wxOWLkzZg6bl+of+2zhq3G@}oWX2+#=(e*^c)UvM_WF&&uc=`#eWqS$s zw7bC4H83pvuW|_7t?QJf?F~;qr@WNsB6&dL)BkJ|*MgOLsywzP{Tfo0@GmDQ8F2T0 z4brW}d_Q%cf5YVRRQP3z%ZoSqWJ1>@8J(B7?2FV-zwDK8L`3}U4UXYD+q>i-=X^zS zs?aTAZ;_B`tE41RzH+FRXH^&%?DYZjm?qu`m8 ztKP)5sxW+ndq1ak+w+#~Xy*Kv-{=XFQ+PzPB%3=)@b0Vh&A0)R5#@N#GenX|wgvJs zWJ3H<4)#TV5{O12?5U&aSt8Ut%-u8HBf9PBNpBu+BvGWEnEu~dbn4a(2EuVziB}a4 zh~e#np@**deRg8OHdy~u5UDaxyZ?cm`@}i-50V;JS11Kp$&ci^OO7(;-uscLFS)%b zG){YYBND-3%D84+^b^e)wvN@Xz6z!?%;ncICm~kTq}33W=4f0^;Sk~swR(!Z_&$Se z^@m8*2%3b0WBSz3`ej>&W6=2r8+mz6Jr)5fg^RogD*P0mm0vYZeE+65yBd_AuXZ4q z)$pafea5G9)vO`;n}Z{%b4!D$z4Tc)-PfUCQAY@G^XDZWwiK*|Fz{9ob%nO_sA5B> zoP95P)nAaNJ!lJywmqn8VNEo6_+V(ytRDP^!z%mO&m@H|JC@36N=#M%Q1O~|<&T;EBaO15Y%mm9t*!f`R~% zYx}SplfRCy-NA7dE7Q-!Q8`BLchJHwC^!HqmL?Ae%HHi_O{X?#

=)=4FDqUnEXYe zp4hBrG<;$HwJyV3T!G>VHfS$Xw?7d6>D70RsA>_mVbrO+xjMKHofIQu!pO0(W2+1h zt`_2&7B~KbZuv3a_!#d!XRxTbiXJf%;R&uPjjqr)xYw-QK|(xzmU6Jj9rtqLDu(nK z+H5->WO$=pf84Zx{TH!!u6LW4Txp=P<8QB$r6knj4R4*JiEY7V`gsS5Z8{p8C(~<5 zG4^*|_05Kl4RC3n=E;ok{6A99ytUZnpHz5&04vfQkQZp%Ufqm-fzc~OjXRT4N0eYF z6fvCsC*8uv@DTJfY3Y9%@#A~~YGTQGvsyXmArnTj{b+1?2jUcSHR8gw@wPYOmQeS7 zdb;n?GUQ`9dYU8iiJTmUS=iL$c2-kTGBN(wAUn--?njIyW({)oYqFqz-!a!bL+K7% z7Y{o<=fryl9jt?qkr54b_2IEG{mMKRi${rhSy_&aMt~^cLt2_H9+eud4#JE@tx@7$ znky<^l&fei0-NK-BPIf)T5;&I88GCBV@o@b!0f@uH(P|%(X%N;Pi<6GkmYYG0xtLe z5r&n>FC{fX78+?o4WSq`01E;-+d_xwl3>)OX_K>|pI=J`8T22n+1uM&%UZ4tq#m`1 zsGYQx`6U@%MX$?$zq=1RqjW#I$ZH;?Da*hkcNA4#5Q?6~VBX5JM}&t1xaA#!#vG9N zbMo*Ee@VA*3&nI@%K#82;9M8znO3c;2Q)RhV^h8A_Bk+OvDh5R{HGlD+MWP%^wPeE zG8TQ2sj2^9zTRjJfQB1PX4KA=>6Mt$ElKUwm6aCd=v5_5K2}JmO)!L`sb90|F%X%) zlTeb44zJ4S9?T12ZZf>A?97JMFj7y@7X!Ff3KQfp_d-`Ns-;Cjmvb9FX)oim zpMkJExwt?GbpvE)0*yc)Cd}srr>yMq(h_5ApMU7}@fyIo=Ew$1iHXg8nT~pGU|;}H z6961ZzCsv~VqO1R%y~}G_izyqB?DY+rEzn$LIgfg$o$~1%mDUYak3DEX&Q!HJF<$QYFRj2UO>EO~dH|ZU6`YU}AIA=jZ2Jg$)w-XTbb= zmln}56B!3RwLW3J)>TNj#2YJhYZ=lXS=^L#y|~H4rq+4PFvYH#Y|>y)37P=tJAh=A zr|BJxBmUwxRZK{B5l6*U2-JwsXO!}S)z~yIOa|QFdc)5pRsoP~zQ$aRrCc*x4ET1R zwI82!l9H37k>m^#6y+o~%Dx5;9!CBrL@bdSqu3I7<=RSPsN!);^GY7?AxTrX zP8~r3qF@364ySY(S6%k>UFOgGy#V2&;18qe%nLx3PHFl#T!$+wf<;bOCcM45=+E z6o%B~H>k}ADo^MH&_2p|C{L`>BK6b*nFlD&_iDQFM?lIMWW1o#5MVGsam*ptSXIDu z0OayzUleiJBaj1tjW#;|+66eeL=7mEWhUtE+JhHg<>=?v*DxxISnk7WT51f?5eoZf zV#rAyZqvH^+y}+pge&lUYDDLwzr6@97+_aP{8vu^9{7}* z%o%`5pYoIg14A6+YHeK%KRizF3EKfhy34Q&!nhMWt0gNWWSHc81*BGFd?MAs?iV1BXmFTby~c8|SH`A=zJWFhvN%6>#qzt} zt*CK#B5=s1-+fpbx{0f&V{&qzY5xMTcC0Lq2A6=}N|X`gsRqfY zE0VC3_an)m3sCSR|LWcPGEhMv<`w|H*AC3FY3y^@T9{*4)V7W{fDFB#ZPecKX$o}TfP#SAo*E>Iu z)=JRXD6s3m0Ooxq_$mkYik3<|oPq$y5@N7cX;@F;4D6HmXzCFH6`egm$iPOJLcgop zWI3duv_QZYPQyr|)Ih2?Az&94?{X-QNHxqhXXnoM2l`tOXcyQWZ+ajV$MZFglPTzX zRKeU(DJaipUPEj>`J4P{iCM~3wnA!SENl<#bK0txIy1oQu17{shoAh?aDD=+2dthA z+QSk~kx0%5X0b@<2?OJ8z@UtbLJxJqqDYx!Xl3amqgn$l93wY?-58++=-B|7WSbI; zJl+5_h$7VL(Foo&c)~JjZEdYKW;^*A3!#?<103jT$8-rF&k!*#uw9<^&0c;J@l2+W2kQZs4v! zphC#%kA4;w)7E!*C7>9Q^9PPGC4f@e52$Pt=Rq%lri@&@rcu@tK4D~wgbCKhBp*7@N6A~^DhV7f0_1qK0XAoaAa|-f=)rNmdk@HM z6{yt$ZCthb4SS+P!@!W}ZOJdvn}xMzfG;6Wh98q*nEm+i;Wm*3pbw@9p$q~zRmaFxTCIoJ zD^y%sEVp51eF1Q}P^QyZgsw8r9sl($EqEY7HlojvjH}9H16fPbLtB1~#*#B&nxG}s zO$r)`H_WdA@o5Ev2x%7@on`@H2i5}(QX1k96W;RJ41TI0P+LEbqUsF^5foM>ZxUut zKa8}5?op)mT!Tnj1_4b#?+=%yHtPCSCX4sL`3^QH|NE#kG+e0+*p4t*M)TK|nebM7nc`p+vg7ySs+^uJ8Bz z1Lhf?;m*1D?6daTYp)&gR$Un%hZ+Y20^z?>dHD_mLgNB~P~ljpz+YbFKvRGh6xVmk z@}SZ|+8y8xx|N)o90*hqhkFOX0N!IetLV9cKm;BCeo%UxetiUi9)G@iDfiyXcs~Qf zl&ohql*5JbFf*Oj)AI`J{jVlXo!vvnw>hs1>*~0LvbizzUuVd>M9IsO7A!7)di3-V z4pRvH@)isGvE^!Sab_mo$x1nM##NLm$$58ATcq`7rkMfy=)G6VohIVuUR&zqVB@$F zEifp$_TR7lKwUdKPVnAVi9x_jqs?x=Q?yP?lGkin$LpcYyLE%AAd?I_hdl%R$+}{; zTxIoiQJ2-u2og5+$9D_P6QiS*IeGqjn`%>17Xj@vTA_NSDW`)yCe?K{HML*uX#M~9 z;RVER6+F(TR_PaA%>JPVa+=H)-0RG z)8T4}i29A6tIiXWJ{!VZweFTzlFqqZmF{@&x#8jYAFJ@|tq+Ph|J}daHmne<$b4-! z$%(uS>SB4D;pA?7Wjpna*Tab4f(5wCUgQ17hlx^&#a*w5giCLkk}@ZI8;iGG`ns31 zbNWL*ZpiY!tjva-JbcYP(Sv7#eX})oG}P1|%8cQkHvVci;qc#+4TOyD?(J#5aJXEs zgN$A(L`yVb#Y@@lD5?xkPwN^O^jR)OSsUGJKV{+m5e9Cx9H5?;aQ}?#__sM>FH>Op zsZ$d|#lDY4wM|Pq&1RprHh8N|kbZj>^*Q9Kft(}Tn!DuClF5e)WK z^MT$jC*qbp)xvY-og4SQ(ZO?SLQGWboJ-@^d1lY|v!>I1DMqs|7w^}B$SFX1dnW#Z zGvIUqIk&joyxuU_$5v-_d53(HWda?k+T-$x2LGAEr#8_Y$uk`DQCj zkVnwR+a3mJbxn;XdV7Z~cV9BEGM;U_wy+Tt-RcWbPq>rl{r%O_+}s=oW)Asfk_VY- zb4v?7wym9Ao&C%ya49Ahcu%;sjcDb!3$6HQta8@F=kr4Pl-z+HrVIaKwLpPMb~;jM zkKU`m{4R0uO_meLHYAhhIs(#; z8@r!e{3|CpJ~Q)5uRJW_Ula@S*&0t(`wh(MY!$a&Zd~@6ST~(FT~Xb0?;!>-}y{H#awz0&X3ioFRA1(AZwnL+?(M?d~nEwa)aTvF~n`wLah^FSF@qHun6BZ8Q$qX$09G zeL$=KU7~uU$KrX`0k7Z5*6d&_^meTb`f%gh1ATl56BzWVp?kc$2R6TC4|zLL_Sm>n za-gH?*t9;A1niFA_QK^+a;cqO&ng9s)$8Hzrh}Zv@J}=LTD6un9V6~BsoSUHdURH& zxmpKPTfJ&)O(P>Z|6QULx1G_S7Z(?x8iin!kzh0$VS8D-w^-&z|3!DuyEm?5cR%+W zee>2LDI|FOd=@Mcnle*vZV^bC$1B3i$bHqWoyUgq_xBxsJ)6*lNWYm-HMvEuyAbIr zzlAIf|I1qoUdQ_5otosN@RE#>kT4U)X{{U0yrD9)OQDR}QSq%JgYT#lR7Fgdyt;p~#9*Wnda31w z8Nb!8bnr^$tdF<#?s_fGpw@l|POfjdu0}>PCo-ZRID1a=>XLwJ#qDIZ>%8jE1G#S- zh73yHG0DSz56jxWn1>c_y5lc#8G8=Aq0>=4tapAl7Bb`xzgWncgSOMxY@tWEB5|^C zAf4x`ZpR_iJGo$@m>;<|qIB#zuSRBvyJKi7R7#BDK3$PyqRi2hJ`uta1kn5Ysj}Al zllC~Mv7~ngMnY=fg^rp{*4bKPk~_Y=lX=qeQR`y>B_k*&^Z`fDwCIBnm+|QFT5#x5 ztJC#KPpD!P&4<#DWtW;UG59fdG`l(?#d@RVr(vOFOM=DMwUCS8&{+$7e0ThqP7`5^ zvfMftXc@aY$RlXGwV@-IzF}6G$;H9J0UeR@Ft5XO4}4jR|Lr9JCf}rM;n*B`Owln5 zQEyFkbf#(@=9u%~ak(|i#?~f~qc22`t|PgMSmm#7857AN?SDA%6+~kUgMHF3d48b7 za)h?ea_K*bmos-{8`zJVlI>X}PUGHF48#s(jnRG0frTTbUtNMvSHpjz49d3N zU($S_O~lm5UesYwzh$cCPP%a4n;b|NJNs^x*>Kcy>)3klL7NqT+|iJ^Cq1cuo%PJ& z_VM972Q zn`x8~%}}r`-l`nki2rg{>tkxoei?3-Iivljo@)-essP=oW{+fy!#Sr`I$`L8AM6io zN@T+P&=~%EWuPvVr@>yUez)%Tu8gg10D}~!GE5|lb1Jqed*x>`jZW!HZTrjxZ4<)A z-(?14X#Wy2;0AeBjBheOQ-4bHw5#(~<-QSP zCPTnAB}lVQBWJ|Lu*FYI z38P!Vz?NR&40pumQ5vKc?V?g4&&oU&eHnj zVBFzZQKJg8F4pL`N3nDgmtLMkBc~#c^Wl@(owNsR1yEi=j$d{&l@`EltR!-1Ndueq zr)SJQ@&T)X*({IX7ay|RKULUa)=eqP?-W~|=oM3?NpM*G*p#s^zUzjThExcF21^4$ zcVXBt%VbFj8(28xPIeD~p+RW=SqDa7dB)hd%;Q}Zq$AXG$)Cb?;SDbw#)?To7ihmb zUKsve()-h!H@Nu{!X25gh7*~`o4AgZa{UtWC{{35G=mI%ANgfn3fjy|IF6$!(!t3I zx)MUsY<#4xV-!+@DRuWNFE*H_9-SE-Tx{4-8He#{SJB#mt9=-NZGMUcpS=>1d1o|? zGHWKx6J4+ja+}2zZQyjN_3_SrCyRm)97<0XRQ_lFa|D(EO%R{3SyrxhTI#OM^{<=Y zsJagy9<+_B%=f3E>e4$|TIx4ji3y&x5|?GWy9X=IeR^AyaDi{@+ZdUtse8!*i=t<_ z14r18*FWrgXjdLLIXwM-E}VSZgt}Th_HRClm;Aa%^S$5loSX{IN~OMhk9UF9Cyd$A z?0p9MMoAb&!E4;;#!-t3-Zb>Vo=aTd_(7q_h^N*o9RrV&W$8+@1DS zc*-0#pAAY~8TM0W({_#tzJ2O{Bu^gAyDzv1Fq3GZ^hyd3Ee2ee_1|z%RKhd0+|o<{ zQb7K+SzfEyc*oXZz7*Uz=%FX!``e9W&8Il`$?Q$Z<-Yw7HclI09m6`UFo+f+X7@pg%(=3s0zBPY}nQIsVqTKt-S@yE5n-YemTfR(bh%kex zfSHnHc8?Edn9y@Ml7uhTdNg%G~i? z?y%NQ#ud+x_IbK?7Rk`X5J6cU(pb9D{_g_ubo{sd;pija?(RcHN`Yw@igjtjW@?3b zPs_!m0qA9CdGZxcBA$M(6T)X+LLCKSEh}tOmP;RSchVCld5Q(XeOOLf=?3Tv1-CxB z#_~`UZ_D-hmiD@OT;500CGdJcWGPyTkS87|#S50F zHHu24p;*Qo_%%<1g`?1!Y=L-;%HvYE6kx$F;}}~b2S@NLV9`jMbMNPTw88)_l6WfJ;dUK06}y^duc_NzKY9ndy}c5wzEv zX-j!?-m%4s(`day_?Zv@*r077lJgA*JHZ0%G zVMX}}!1DnNo22|M$oBDeDoY^w!DYpjW)S){sJu5L%fHpbh~y?yoGg6cDSJ<9w)UjWO|&Hpuxo3)@IC>G3~(i=z7}wnEq*ZDQ7s;yn9l^Cv|<+d zca116C5opJ%Q_g2b2-fUp;)#`Vf#iF!UftM-R`fCj9I9*8I!(0*XkTY*D6r&N)6io zhicdK@$6s$Y|EQCX(ZMyxcG@G!Y{{gli~GgfI;yk}wc{U`YM%JXNeyM#PBs^j69FL?w-^SL?`HkSnh_2+bNH-fu43)~DZ z{pM~ogwn4BgUV$d+s;)iRr-CmZ>HOp3n7hBnF2eu_{2WjIbm%YQl(0`%NK2EgwqEe z(JZPdZ*_DiLWxE38bI1T^uAo7&pjBkr3@9VWQRn)s|u$Ltet=gfGQv~Q^2yHvcWL+ z&zOb`-ThXE=b{`)ia|ZM!^C|;o6;iX{Rp>)=nDEWwXGy_I}ZhCTpRDsWvx4Bba&VG zsq9k6YNbflqYSP?NK*StmnHuz$h*e1ScygdE2H9TYu91Ql>LLcrS88Wihif-y`+77 zHD=2!_(A2YP{U*UsT&Pp!%O+OZwV5X0aGyP?n`0I#Z5k=O87IiCtLZwzVNr#`2hE(S4HVF~2tR4(3nT?rN{bw*;~5sg5Fe0>QM} zw&O=33<(`Y)Cc4eXp zC7I1~H1W~UQ0x&Vr-_~b$TpDy`}-c_xrAK1oFcA&Cm~IjYeh1xk#M%roijfg$P-kM zM1X8qp0}E$9Br~-4utsTa0jv=&J%lQ)0WvB@mbBa^KhTHz8C6?S|3;8+ zgisi_9kfjV`5&)T-kIzwq!1Kh{!G!%^d{(yt`NUYHaQ6Vx{ct8r{{XSGO8{Sp}suc z>8hpNC*9rQK=$>GWD_OHQ4_C~korhPQinGcWYVnw4qIjU3#YCoYN@w(;+G=SR*1Wo zf4oW<6yM`|ALIM)1N=!lYoOg66b-41_w%Tyt2x<%j*NKasnnEMzVY(9Yu-a{e#b0K ze9w>ZLpy-XruqmcqM74X^_h;9KK;Y8{R>NBKg5VEh|kSjmiTY`bo+AS`qwvK=+@Mq z5|21ddU$x`g57dt8IMQb@Iqk5K07~Oe8)==!|^_-nc}n8Bt?o{Hag=OQTwuy$}{2J z|E{UIsGW0EkUaPE7l+A zW7*`+s=PHXqvXlDxeo~hL@}8%rB;0l1>fP`eLUiRO^SHS)oD2$^_JI%tWk%L(r>r0 zU>Pm4Yc+CXJw{})jca&*K3X%TB8DJR4Aq?G5HbNPN@<>ccgd4Th}Ch23f0{br4!AG zGP8LSwTvAcw4L_+Tvt-aezyE3;JE$C$sc`v{qhXat9e)c91v>xLHBRxDI-syPN$hh zkp{his50TJV34BD%C@4)npz;VK~$F^(*(>@2^!L`wy4vQe$v^*7Q8sNDsfuHx>zzN zog|cw#d-bNN@Rh2rsU+$!IUs#7&d|T3O4h|jpnmSZhNJQhFp{6PVIBmVv+NrgkuMQ zE@!hNC#Y2O`jWWOj)UBnpZ~_xToJB#K%tUTp+syC9X~na@>8&D29hU`dI;v*;O5ym zdT&|$m9O`!hCY1wu=*Ue{`_gnVN0Hn=6JD;k24)~dNGzTB}l5pE8rIbI< zY!>zg^D_zzX84P45B`!_?nwuSFeRl0meW!TT?7%x91^3zM2gr}!aWmcbO9>s(P7>r z^OvS6d0FPAm`ZI{;&mNxjh=6su10;6qAL=Lo)A8>TR-Mr^3VGOl(b!&2_I9-@{ zXJniBsUQyijMav_D<@RQmdupfH#GG zZPO(_#8Knmgsnuc=97jK!gfkfulJGPDx zdSf{?c{IFfbT3A1Q1Go?or$r~1V7tgNa3hrzHURq5M*Q} zCyRa-EmTgBj~mUnzsNV0E%>qBk>;MED;F&3cH9Y&reTdX&T~yOA5?FUopa;^X0zzU zxYm;IkyJmc?o(%Msyr(ubU;4}kHG64PF{Zcfk>8Sk}xsigkT@-eEIpVBIO3Cyc~5U zmajh^#FCM@O8%DR6m=Git)mIhptEU2t{R{F+gXL5ftvGN%fz0_OY$RAVcUyt&*b_T zQT%%_FA=j5EWZ`Zyu!8SSwaOIpRBC{VgsR{0$H0$ITtlfT^#FWZWIp!zD8^-*MW*+ zHIN#z+4b8Sp!25MO1RnL^w`r%5G`vP8yjnDhXjR+(XJ6?;EZuR z(>)iFrT1ac#VJDTE?zn+5O|*PNltxQ4D`GFOm0h#@a2nRDp3#%Gc|%wePj`tFS}9Mn@V%KKBW@txSWU+Y2-$i*`equG=Qr6UmuC`igHaMWX_|KZ7OO2XsgpLi z_ela8tPMz);h3FmJtQa~)1$DIZS<5DYU*8)T9H=qqK)}iKX{EE)N8xl z$&$=l*;@nFM?apKlb@-_AJ*w8`8Vw#fmPnWWvpZp#D68w7M@@`K8mUC++-PIZCO|s&jABV+piwgk5Cx_?P+nCi z$@_oQA`KTKfD=8G54wnhnayi&d+7K$*1RDZZHYmw3T)J<6!oWy{g;}uH z6Bm|{!m5d3jVXkB6sTs(NE)tfHDB+teMxy64l@TJS*&rD#;G}|i;ycs?`vaZ2$)>ZF{l9`Za?7=gZHz!cx4qN23rfkz_=Bth3}K{FQlN zAFY(|Wr60d$}l0qm*Kxht^sAyhY{=r6ld|27^|e(ZQ8}FDSpeCsln3H>S%ePJ~$AE z!1Aapy|9h530`6Q#o@(>g;&Z?@N@WTs9chm2BBkN>-2RVR zHk5+$I!$&`m53Q)fv4hxIPIOWFDlqjp5|)W(5?x63LJc76?F`s_H5 z3(GMuYfO6m6DzM9o8(z`93%sg-F6p!Lyk-S0gPvWC%7*tOLOlZ;ancViph<)`tp|c zc~0R9P>DzeTEh6MT{@$~tY9`c8Yq1X-A8M2GV~2N3(&`V2Zs_Fr@8Av9iuI&F_#ko zJ1Q(YG?>uj(TiMcSdPv}PK(pTA#%UZ!VK1NCEyRkgn#gcDqy(JqZk$bx z#~)E#f#=)zL%)HdL@dQYRIySp6)bG$x|I0aPgMXcYciZ*(NTPUvSBW|5^t)uYp$cz zdmqA=7;QsWG%{Ub&QHqUe|hs2o7FtHEnS@{8m^!udO!ioVeiKPcl(`lgbJ#!&`AB{ zf&9%b@Siu$5sVh8#th+`R8)V|w^kM8@Y%e(IU9k1@WG9oB zzBp4`CGu!eRl$^=3VqNAKE2PHe0nVOaoELZ(b?coe@W3z0MRhSf^(O-p(8bWHfOfr@?9f)tUVaW<#Go(? zoFTCQh`ndb1$K4VM->enlcyceqb~6FSpPmv+vrv*&T|fwr^Jy{`l!4&BHYO$8$@Zx zj_=FH$BfAXAhtm~ka~B%YH|S{V5p06H+)@ z%s%mR2TC5Wot{_~LQO0MD}_2aMewLD7r8wppF%G4`PS*_C;O*gh?+5Mm6H{C3=x#k z52C~wBY|eGnCs>+G&3TT3MXVx`qrK_wlMADlXG|}ZrBGe z9%r;Q>MCX>R$=p$r*a+30+LuS)zgIWIl0t<=9G;j#}B!u!qvx*K;!q?eurU8X3qU^ z&3#)lS!U^>w+=t%V%_QHEyN8iB+UQ*V#+Obv2LR9xQD1pppouuGl~q&^bLOpGYSULM~J|Yk;-Q= zB2G1iCHoaI2-pnLp^kMB(a^%%@C6ebYUmH+!+Rkja z`ZE2+196y~x{iszPNy%xhLG|sw zdYU7?6J5my;0}ucI>!k0_OFrBTyn0WKmkMfr!cb>$`tH0&cx4VD|nG1LxD2RD<}P} zma=uR&L)McHFJ$LIVGqh?I1f&Y95Tb(K|WqMdUO)Gk) z+X>u}H9lGNlyWJxwkc^t$bBJ69Zt&c=Qaj%&lW!mP8jq{%b`2w}t7Uh=x%#lOq2 zb{o${eF1sF^pU|njC{rDlq=J!YlY_bvUu?ErnfH?rK*+Up2W;`dMSZ2qSfG@Ikcwa zNk3&7`5*{%JRQ=gdo2r#4bHOW;Cos_M5Q1guSMJT6R}hE5yO7|j4Q{&Qm`{U-0l-t z9amn-$rCWI#0u*W{ipHk9*w*i5?#Y9N5w+xll%&a?2)FYaXZFo#9=;REY}}i5Kj8O zGggr0jKEG=il@^e2BQ#OHEd-n+?dAyb3y=(CI5$;E&i@npj`wgdGznhgb><>r~*0Y z`p@97Cox)h8ehosx$&rWG2JN{gB1?}!3f5-%+&eCr4I}8G8fFnM0s>hEc;}`G^o81 z>xz#CHIvUMSNw0(uT?-ERHVQF<$Uxahzu@Dd9_0GTH*CPBT~ST%3{=vO(Qe<#R@lw zG~%dXi=NB3Ub#L-8$ZMkamOV9as=RQ`$m@t_?Obs(iT8lDfjK>p_+~qeu-V*KIhnk zUjl2Oxr&0ImK~E0`yAtxz!Jm5I&_INiDHj&GKVc!1VO*cj4o~n-F4I*o6c`0T{Ols zBqBn}O`xoIFbgteagtoL&r>HKD_E7RIs_E)ka*1euX5Sj!1+Rzfk)3(zv=#QBg4@B!oI<6A*?vSA*q;jZog1@~$KFj}f@M*}OSg zOt`{)lsmdd+bwjaJ!>bgU%%#a&x;yu%vb%sdg0U8*Jts9Y7@oHMxO;uCd}9xLR%;! z=!bRFm9oUtFxndH43k{B^4C4Gk4@&@XYog@D_e2H z`pjlurc)X};n>V68RrKx_53^lTZS6-|&wUxT z%;TYxp8L8+q*Zd!#vk+DBRF)RZi$IC&1&ek5qz~^*2%;=b$8~@am8dT%EOO|X=&{7 zUCWxl$`Qkcd$W_-Lm_T9n4t!;3;z1r)UE{jyM%bY~e0P#7}E1b8}CUuX5HG5=YG>XVS6LOMyY) z-u!KC6(zg&6e~dPA;S7Rjps`w*;$JRA3nM=*9hdm>@p)j2;;6%CCF=Ok<1qr7Pgb) zgF~ezh}-A-3BxDc?xwqR_^%g|ISU$s44df<1=XO~H6U zl;Uh4N4_dX{>s2|6r6Jdy+0WF?U=J`CxP9=HL^_X;Nu`8iD&-KgdmJAX4XiI4O4Ep z@01_10hQ|c3MrLbK*|)K@s||QzgP;_m3=%C2i0SIk%eqTE2O1nH#rP0qm;CAV!trp zMAGSAs}XHTyKt_WU{bYVuOjrpI;Kz3yl--VeAHdU&dpMe&0cg8;))f z-0_8YXJzQ+Wz*X(T+jK0!jdaUyqU4gzV= zO(7AAx1ex-!C}&D$UMO=qNq%1QdXxRd)y zlVU2ql2`~9u4`- znR0*5$oHAxU>W* z$lx(3Z>?l?aH>+=WXKk(JbJ46D_}6Dh@xM&#%yPCF-Q^DpVXD%nc@5(g^6DfD+;3j z0g#-Ti4&d?|1&-b;?IV!5;0;LL9*l%*1|itH+}(}>2-FzFA1^vONbC6WgkwS_;~}2 zMl;7HX$q!{`Jv-WQNoG}*{6Gf;7C$JN9vM(g=lvAe2!)(zbBp<8KmqdmF0M1-ru1x zPdZI;&^pwVCr^z7skVDZDE6O|jJrTB4U-YX*$gy*w>23tU-PwL3EtjpWkEN;TLqU| z->!vAN26f8^*ZUIa7mZ)74{*@;NdIyTnlIl7OC_zBP2j;+`W^Lm0n7Tmiq}dAMKaS zOtY$3%2}Ft%z|+epKmx3@tBLby28(23sMlbNl|}prhM4`E=y&vP@tX>SsGsCOh(qu z52k#Ek}m%zHU+RKeQu1TkD}~E+sPM@X^Q0IPErb%*ojl~1FC~;c0Ad{=u;vF4ic2N zjLa(lIa>?T5)`rxDyo-wiFoznW$Hg?N%HWA`j=@KI`Nn_|MdA^xZXQ$>w;~+i;Tp! zZfE-dgX#76Bv*zqsjb4=!X@+7yrN@u&5t=%hi&};I*uy`r)uRe1HJK{JI9#oQL~k@LhMFm>iOy9%P$6dR02`)7jrW&q^D&TD0TTb%i!ICIn;*YTP(ViPv|~ zu8Iw7LjA_;x1+u-wN&n&`FeZ4haHtA+J=8;_h6_CeWChhsdk=CHYM8z0gno;bU zPVj5kJEcx|opTGn-?N+lBV(YD^KNO=p*X-;=>fWyD$0ER@na4{qvluBXP_7JZ&6o? zs9r^ksl2AfW{OVS$37b)1Xn7n+fRa!hJFRh)8vpW2sc06nSV zUVAo~dHa5@X(`A~R(_883-JosYXPa3R`RN5K%0#*-_SnrQEDlBdI1fNMG`=GA@VT% ze3f_-W8U7azm4;qkYsyDmuT1F9$+tQ1={Ux5J0hc;>#4BaR69v8W6)5^6e)NLErzfZ<(mg?06-~Seejh0tgFhzf7Msl3b3fX-apD1Y)Zp;ayCF)kH zTKY*uYEaSW*tHunU*lA0|S|ACkQJUQ59#2BNy?(~zHxK$tT?F|HoyLb%Uqa+5%L6OlFNFkj zgd($fHbuI9$}Fx>Z?!RC`s}a^Yn*g5li1*^0)5G4x^UZ>t)-GiXZTnhdr&MqRlqpBfk8l_fvMY>iZ zA7jw7r57>;u~KSKvEn#XWU*1xrRh{~uQ}aW(RQGxW$p||y4eE8S5FTQ`X95m?BlUE zMX@(1&vz*=zKnswYlUOMB4o};DC@bm>IE1fTB={+c6i0<M5wIVtSNj>Og9_J9W@~~DXO**5_ zZ)X)_`s!WItv_<7fD6Viz*mrgNHGM=*;v@=FJ;hw@VXO(zoq_b@8E#pnoUkiXve08Dfs1OU0pM>D}Uo6tx?#1zA|Kbb0FGbR@Pnsyz)g4y_FKwRFU98mo*8A8;nsiQaClmj zRnqGGZmogjL*~t&Pw1u4pKHBTG$s#zXEY{`KIV)0Q-uQycgSQKlPnqw(VxPeYj$Y1 zY13^KG?(_SVTt~W7szCT#hZsI&z8rK`B@4hDH1%(TfdGsRU(pNd3%k?b39&^hv!d{ z({F}HT}X6H_-!u2Ty=&_%B@#|Z)6_oL47=;_H3{bDU>-XG5*}Vb3igi4MQ;-{&=o1 zA5Jb{rh(*OVBpZHgQ5(m(%*!&^!1W-=~!89;^O+>MhV2DncIdjYW(CneyZ4 zu;eTe$OcOpuW|Lqo7^mNzcZl9c>#@B2mIY8Eq-0+I|8Bq3g2bWtdQ6Rxchnc7BKcA z1^AeEnr!qRFGiFZm{^vRUp#TRp|4@YPixG| zadQ|{^enSXqtX4cLIf&&*{#vDc->ne67b?OR3jF?vQ{w#^}~y8nvSlRs`BV>ucAp= zb8k{Qv^6iw3Q$d?i&=A5=#Fi<>>zQxzbjV$@Nd`6o$k)J_wp}P`2HMN(>kTN+^J=y z`}Cw&9c6f~D3~nVt)~;_`|CGZ_Qov@WL)fone?YhZ&ldUp4aK683;q((Ob+ zd3{`=KTxWTTcJmiltYp@kXeT?F&B3!4f%D`)Q<1E4VZ`MFc?X|TjAYwDw0iXBj-li ztRS+;d9F{woVMV??vocJmYF_%1wBj0*yWqsG}6*YWL)n_BbBa2Tw_4Drl@h)T28rL z0iFB7x$*uVI~nRqVTbeUD~-mrBHT;|G3aPxg^0iS<}M+)!Jv}Kw8!wQ9ec{(`3A1V z@cq2IudL%U~P|q9DcrQ&|x{0858iTiKRd)lCE+g z`}j!ljrp4+@|cfWcXlJAjJ4ftx6QCAK+{t+$Wr}MBRslgL27qHAei0Zs6rbHPe6o^1TqB*29vmUV058}sI!xbBT&jN;m^E><2c z(|-Z8>PCsXj6od*rab1PMtm`ysbq~J=f$6&{1Wg%Yp}tt3bIu^Ky6ri=v-H$XC*=~ zlg8?pH5|W)Iw86pHnV#O{kB$LFGDC(C+^_1*KXz5J~bvMgtVto$P!Vl;n4 zjjMI~qzW=+DW_!`JwE|mhkpZi-^=?IjRQ4<;EYIL6aW{{%)VIejCMr@M9NO{BxxAi z2wDR7KjNTgMG_z{S**Njj29geZ9ySqTV~wX`lI3;@oeKd|1=6a2%E=-*mzRcFQBz= z-JYE~sC=f%N(<}X&<(J10&`93&$8ySJV=7*=ctgrBp$tLuUFTx$V{-3w7hMi@yL5` z&o>uvZlSCAyt5?BoelKgNCH(AJ+FYg-QP7j@Nwj|vO~MX)QzLb)%2}Hfx5Ml7@PFG zU$5&x=w5s!gT*J|mofe%-Tt)yVHfa)id8y-LHE-oSTJsrMz7v?r_Z4I+`xu=e-!_6rPZd&t%T@&ldOa<-gr@5%;^0W0?2>S4u z@<;l^$ZeJ?bSPlp>-rdVg_082ZE@rH*j}l>_dT#yUkmlyjRXTnZ}`QY1x=d1i26e@ z_v3tHzkr?VVCjHZk?__2Y_sd`7wJ7N+FlO4+ikso=J;z&14rPZXBkWp@@%VebP-ld;N{+hu8L<2|k|4 z-kG-*=~a8C9l%u1WrDi+j_Uu7l=BQ2e%kY)I_v z{US%!)6Dl-KBtw5j&G!G^bjX+%Dh^DnS|1+XX9iUO_FEl8*DP~uevn$rUX4m)8Ti) zuPz8%sxE`-(u^|}PN#2yd(+MI?LKvVHVKz*+Q@U#&&sSQ-HjDu(a^PoJ5KnT)VO(g zlsazv9Ti>V+kK!a)xTJ7Qd^Pukax!>tuNs;f~>fjct+nUxHkTiLgTmZMb&0pi=)5W z?(E1_F}?Tdi_Rz>eV2{1i?V*(O!2af?qr&u$)(XUjs;oi_+-GMZ8oWj!i)eTn0mq3 z+KJaclJE~h)g9|->}bFBZ6Iu3>OO$c#3-49ruJOCn;VoL*mgR}fc4Qj@GJ8+?(YaW z9MFBMD~qPO9V_RLiX75A-AvDq$vE(~;_=?7%6CW;pA@dUug~3B@!U&@HE`?BD@vXM zhM(;WjOzjvtZuh(C#kx5rwl9h^U9{&-8_nmoie0aXWT9#^A3$0+|>HM4VAnS^%%+1 zqS<^HH*~#?>|7(yI&b@X)2F{XSzG$cuEfsvcKy~J!-|{A9g$mPqFZIE*jIeBXL(;= zT2pfn?@5DB!KEhdNTDM}b0@rdtw>c+MlBq0=XE|J%Lx8AEcov{OWfQC6uS`J_(^xZ zWr`*PD=$;1zuFCy0ppQHXQaBV{?%mTiJ1OFlGGV%WJs!gmR0}pZ-E_jZt~)Aev{v`gomb1@b;XQ0Xj80J@0W4bs^+g>a!0IElCqU z@`Izex!<7`B~R402p1LZUTSy58N2=Ms1b#GoTk2%o%Y2y;jtxHY<#hI&ME-4)~jy3 z*woqOJkq_GkIpx#^Puw|dcJUNG1h9QSJ$$JDA?`SDf3$W+%2*6Ys#o0I;cEj@ssd1 zKCRLs%*cD=8!haA`>UPJ8ENu<1gwNz`~-G$MF63Y)^4&f-+FSE%5bf5zpjz`VZ4Uh zXv|~m%|%C?-ra1md*5U=z3b8M`idyxSOek~2UZ>_5p##plc=?B9v)FU?C{-=vNYTw z5APX)TnVETs6-uH$r}{ul~fa;(a9@;oU&I!EN<u_3eOG>lJMnT8G&ey^G_BV3Uvqjf;SE1;I28&b9;`cd8-+-$7 zMl$RkZgpvwUhSa?;WDSDiwPt|nOj}d!{zkV8_S2`W>dwe`^Im-`;wt`)f*Ls_`$eI z_%v19{mLkiJr=OA738eqs^oO35^&g??{yEB4#t)a4#v=k&x(sLJ$#}&3bv>}Ul_eG z5OH^$85cV$NYY|3&hXw{C0Zvb{ckg3KJ)ztFK*YkZi**SwyjLjezZ4k4pvrMAsQ3U zc@20Pz4UIp`(9`mef64OO-x8?zO^_jz8Q$!`|y-b!)yDO?}yT2Ctq8At<{RCwK$`6 z-|nv%oCY%YISs3KKarfkLfKRuz{Zpq5Z<>~c6X}`qg4?aaR$w+QWkxfD$2VgpSxOO}p<9-*R8yy9?))_Uzrq z*h`+O%M@_I|AW_7ZKKe`qD2!c>Jz^)OSZ&o^f>KHgk^w+)r7=AW|TkMlz?!a4jLja zR+D%GY{d@Zg}SzQ==`UCTjdL7IzRqC=H@)|0WA6)?g-qZ?`3)|UfO%7vy&wBy7+@@ zjP}-4Payvax6U0t3JhM%wr~$9eke-_AM87xZ%BEHIl0lT*}_t*TgKh;?{lr>Xi*41 z93AV;|1tH}VNpeG_b@pOJ#=>u-H4!ccXxM#bjQ#`cQ?}AAuxob(vk`YNU9*Bfa34) zyx;S_-#>G~MVvFU&%XEC>t1VZ$)K4V&-Jk0>d642D87lkGhyDz?z-n^aX`D!)uPYl@4)eG)mLNZA(uPTvew;=wHKE~eqf-~h5d;EP1?^zhEcHTbD+1+W4#--%^P<)0vGKD^QTwe(>@Fv93p+4~PAx8KhyJM)0@#Wmu4 z7xQhk?AJtL=Bqrsm%;77YIBHcMT)}=i_CCnR()()bIch&f zOtvzmS!o;uQz~2DvZit7m>u0DGwbHe>$2n(NCXxZLx!5fIgX?3Ra%y+%SeCL~a7nylnc_pdgT(En^tfm=a=LrAH zNSX4M<7ZT7g?*sc|K7dvfA3!G^92&+e}{&T>}hC7fNyaL|95^Iqqu4RsXU;EcS_rE z!OX+&j{f(*{LdYQ!1xkk_}+mw{AI|483tHa%>TRGD*opxgRuQ*cNt6Ev zxr@84VZ#`37$CUT$RjU_u_S+P6{nGTgav%OuP^rY_qx~(;$De30q*#JCV0;l6^tKA zVHFkO)h$4MfBLrd@sIlh@3x5d)aF=w%82`?n~{--{r~%Qd@y#b48Y$X-Ck~s;xz$$ z;Y6GmjgY+P^_bK57rFgWOF%pNe+zaqo*2yiqyAE|hoPb2bEey&mx#=rt*s=&jUUK* z7))ZLrTBPbbb)J|n|I%6WEt3#dfWlkEkcOU`uIMIAQ**Kl9n;#4KF{Wr{upSbmMGP zhMe^JCmbN&OaYzrfsOpzGga-Tii&-p%Ukm7l|zIv)+REVCjjg!<&yz1D`E;SArhr; zv-Qor3!rPh;Q=KgDSKU+Cr z=!%)(hcENdQoD@FR+~pF+%kd?eWL$g$@#v93~PH*H&4MS3>x(t*Ia}svu5?rPl%ICfKF_=d$aVm_ zEgz43qULXlg0B{%0^YxP;PNUK51k}2EKlP$?x^O)Lq#lB{r^UU9)_G|0ho*{D;Y<} zY~gJufIjgU$RV(7w?SXO1~Ntf4GeWq`x~3fw<>U%w#5S_Lwh+!3es=x+dWHxDo6>& z!@^ZP4pXu_CkW#JwiFvsyxQ-f7f%oN+6$TTfhaapLXrs zv8x&vysGp!6mSUvAiWx(){*+3ti^zt8#MEzyor@*_rEleSl^YDQ<>ny^H5~yQeYnE zKoOJg_!RLk?EdETL~mhX!HYb@X}mzt@qpOSo6;Nf_5^Wy$@B;e-Tyt>;(HL*9F-A( zPU0Fh3OGMM2P7d;%gf8abI@8*Q87IH7kFZ(C;`VJutKP(Y)UY7i|6BA5OD+g{i>nCK{0rpmai}X9d3NEd! z#ZJ)B(2$vVAv+O@qL*d-288d?wn}kDDMPCT!mgwTPw(9<_$bFP9jB%ubY~Zs8Y$0r z{}LIkibXvBVJi(pakc=OaK97H>HzjAVnV$lXYa{F|8It^49UVdSS%)KF&}Bid8HN^ z(E`kyYWN#zW>gL!uROndn4~AR{I= z1Dvu>1wd><#UbE7-xJZs^Qp)fi|7lJFpvn&hLb8hU)ffilK^Zl|667aFsKm|Hdj0S zue_7={{fQ$RBOd@8z^BEDXmIo5xD>R>a#Zq+~>TxH&cN8Zgp?z{kulV4$x*MzKffgnvkY7vI`{OxcEhX5Q_x z_SE0IP=a5;VRbSM(+<&oDh&7DoR46 zEzjVEz;Ap8+^;Av%5g12ujHeoA}Q0Je-+d71#Gd%OX=v{kv}vfuH=NUJ4R)9c)zy4 zeVfr2UlVv6sbik32K4-uUm5R|bFrb|QcULX#kdnsN*zNJ@PZ1*jE#Q2a&d8q)D3*Y zPOegIxan;0{|y%87fZ!14|L#F;`$7M?61s=yz zVZcF{Bp=ZQGGxsl$*Sh@NCGO()`2sq))MfKVk*A^5@4VZ0gi%|Q(s21B)}PP1r)+G zU9Aj_*WwpOhQuPGt038xGE*13)11?!+!w@Y^<%O#1&d3CKyoh z^GAoAHWRx1|cN3oXT zkz(EfVdv)L>{pBc7MyPp-;wzU0?@1`JAXfsFV7K7Awa;vXf0s4i?t;ddiii6SUtfs zrCwn?Y7yxp$B0{u#`w9Si~rvV;qPR^NV7hy_!=D!4^n)xl(g;mmw=ZS5&rniTtw7teDziY4QoajYp}c z=7qFvTU~EY&l@0nqo$??kQ!P5krk03P986`bJ1C3H|wA&mlP7pjA?Sb_%y)Z4YVV( z@jZ}Ekg&J5x1~iQL8A*m2u$h(JH-uB-BWY~u!h2Y(rFVS{b;cN0U;ECoe`C9;;CmZ zO?Qa6PFwp67%xovycm|5o*QBPTHe{gNkRb$i-<7Ns`-!OibjS@rA)`((3k2r8dQV| z5rjs*2c+D;fDar6^yK?Y2koK!ma3Uf)rH`ApmCw>NIS1aIgLe7XAoY1MI(7tYOVpv zi!4=T=!>$n+EM+T3w6<5yKWQ17PEe!!6=dH+B!_S5Nm?e3RHupxFID94${leDGEoV z0Iwug6pb)ICfBEERw)xxt|Mjb=O>&_+>QDHXrNOIJvR65=onh!i!$q+W|LV?=pwD6 zWCJ2$J1OqjYNtTpE?0_Dh_T0%kyw-{a}GF$0Fj*37eH!7&*Fh=QSq-_wcL2I%46tC zLGHkR@iB7lNzL@0=3V6W9$&E>CMwuEihiJP;cM3>_2GsnYVsEKJCuGV-Gk{2v5sGJ z*VTAY>&^ig$Rf;#KQY`r%4YV3HzYy9T_Lz4`P)`MPK;ljH}eeR9ksad5U>sfp8VF3_QL1cgL&} znjjd803r^qre3!MCx=pF%728-99=&FGaxx6lCK<-$GRKTXLTB@@$#=PA9C(1J2ZW* z$We~MrnHzW7^9`4de>z%Bxi zmbkjOAVoL<3hnDBb3UG0p%5lLwwm->IbC)8_T_gk09NYj>np|h$7LyDLZ3A2RWDQJ zkkoyFCqlDSqClGI0B0u#qTnj=doMTNf44M7*aA>-kH-V6Ay{GZH%+QRfW`Y(YmzC(_xo)%Cufa5!P*+;e`i~=;k zpTgLl+s_i;V2q0TAS+zid1JmSXF;xiLX2P0Sw`bmG@j#DW0y}{ewO~MywC9z|3W1O zeibq#QnY*QWj)QXqxggWtsWp+|E3K2`kDnxVusQ1&Adlf5Q6+7#wZZS!gBH8w#Y0z znawUPNS4&HW|N9_-{}=b)xsfO{)TN=2Dxo^!7ehf>yM0OcncB^2?dQs)j}+V6VkvK zGVu_NgiRP_lg%(SwN2Q;%|HG8m@!g^aW#X+-LK%^e=m+unw` zhxD6J0*$9Y%$qTtfQ1Q3sshpjfZV`q0GT|kWmc@&IE&H`PsUDQlS9Q*k#3v%40QMl z2q@cAU}Sl6Z#iiaM=KR0B9c_tArkS9-b?aiQDq*(KMf>wSNn(%FG}0{8-D=nz31?0 zZQNR8X`z^Ql~(w}QJ!i3r}M&JlV8Y+BaoG_<%a>N2OwS6Qgj3a>8h#ooy?3Ei5^CA zb4v?o85v;#;E@{)A)3$xDe^#K!z(mxUJuAGl=nb6H}b`~fykjC_P9H6sA2t*w8?88 z-Om>P78LT~JlIuOu|sg|8)ccQ$Fw^nx2Jb)f;W_$`IIj->%0!<-0)sw9O0SlOBH|&G3T<6Hs`#kbC_Mk84| zmsf*kZk4FeRVCJBk4pjsc{2-1D|GF`+Ug1UC!Q=Q^cz{GBJIwqu3;C7wN+hWn_0HF9P zd2vyX$1gxK;`>3}zhjH~A1r#`bT)>4u01Ua4Zi!`2xpzsehV-8wI*s#74TRnafafB z!~`I`iKkGAk1asNA^?wy#Qj`=C^P`Fw*n-+Wr8Pw&1-C@;K*3?Orao5q}9<3MY=Gd zQS5yH9=HPO1!CwV$YeTliAn%<5z?%dM9h?@<2Iph{ zv2rIh{_5Q`j9*5Umj3|QOHYwh(@OZXEr1ZVk$e4keE3$h;Bd{_)R-)_!SOm&Jna5B z_4YF+Y}ahWWexkiTEkw>r@#ea*YmUR-Hy8qjIVTp!8fY9wQjpTmjL{MQAP62YTlgt zK549y|kXpcZqDv$(RGWj_F)#2-K)-sU zzJVk|9#^nyEnq6~LdL2N%eFF&6b#xk%N3Afz!4MHN#b(_r^!gXlIz>{XJ|`cQU1dO zZ4wxc5fd_seJ-*wY+%WfKSR;f6D$jg*K86wzqI(`p|xg->Pb=ZqC)3=mP@rs)&g0Q znGYIN*dc!I()us?PLi+TeCbV?m;yKzm19+jbCNby{FN8R(qmF^Y}Kwu+HZ-`${Z6e zQnguvytwi`fBes@FQa_iLHpS8itPOY?yQ`}Yfh8^!*!GRG?{V9WWx`|2hSUp0JptpNQFVLZ2p|gw zI$QU^&JvY41P~W4{sY1pF4JBgQO#0QPqtc9Ox^x%n5dX#xN6{U{?fn?c$=U*>&ryVJ_9Tg|PAyvz8Px#M7c7(!RnMJsqK>YuiI zi{u@9r!m{KKu}6j64uV+sI(D1q+=7w+CWcc{u3QGT3D1-t^gQpdjd^|;v<%=uzcoq zVv~f%)a1eJxm@_Q)0kP>cvLeoRM^(wiJZ;f&~2+y$t!wak+cOvOskGy8Jlj7*K&pW zj0CP+B9>wZwFk%2*(HGz5;TWjh9uvsk)E&0@FM@tW*r4`smvLa5oI(CSgWCSETV<%}}IG zB-FxN<^`Cwxpj9=!w)JXv#(2oZu3SSOYiQ;gcWJgmkASC*vkCHFAC2+olZ|KHoAg7 z_gwyZd7WTZ^X6)O`(&`a=N*sH^Jyp42duNlhp$<4M@TfI3w|HWdtKI`fvNic>R*>G zI|(Hy4qN2`Y*Ca9IiD4PFMfP^j{)K~AGmpnFp)eyI*MXL;=lO_`0#@5Dm)Qd*eZj7 zQ1oPXzdky?a->8-*nO*uNJFfmuaDfLoa1D~QLYiiW6wfX7S#pFO87(@a>1`wflbOK zb@?gu2kxYB7x#53uo0z~zn2&4SxlkQM#(Gz?6&#;mf`|y%dLYkHQfRHB0-BUOdGbU zjl{9zvwim9T#v5a2PYZJ>;_>R6v#j*NjD`1+>fMl(7GaickGPaFbx!i~h zaN$r04gmB35W?rGR;rTN>~nKMS-^sGtFy)Vx8jVDJB)LR+8)k;gO>$5n7ufHK13C9 z;twr~ix+)3W`j8R-p{dY!5O_B+Ks9Om;|DAAKVQ*l^TRe43y?3ped8+x0P4mIyF4C z)EGKo^5!!(HZ<4?P?+!H_w%73$Ht^{JDD=17Z%Rm2P=`#(WU+6EZwzotxMP=yGj}3 z8hqOdl>dt;8CCWbY88=K#e67{T25kZ1G6rRh9I}K8KFsxi{t3m%Xg}H%rGQVrbKdG6c~{Y zGU6Phaa7{|DaEZPw6HLypA7h&YY`VqM|Zn^I8bWGXIT;IqBfJUff2+c?a_`BtW|iI zE7cG%@Emz;m_JabdLPwnYB&dr@x*JjgZ9jXji0@7PBRA>}PzN1}vp<3?< zEXeSV6#zWn=kQbW#Y)Crd@))nuplyG+Uh$7AM35P5(%c9tWg028VaXqT=LHfA6s@! zqFDoU^jfcWRv{V6MRCq?{WW_W*uIcF>9hfw;NkS#5S1-GT-1)fY3dj|SvdDbMq42x zfo-K=cMPohm#XtlrVa&-RgbdEKs1bEY6$a{SUjSLPlzCv&n;)8`>z(~%a;-9vPL>O zgy-iKxnox3U68oi4ig%{@axombTZ6w?A6f>oiU;CY=(F0 zpnC22Cb;Cq$oP3@P#B))=-I7FiN|QmI9XfBG)vxl$5#Vz)~top#KJ>;DxBct5~-s1 zo<9QZp~A=Y;p)1P(3{?bM_ib+kz5qPQstbxoLI^PeI%L{FEs~?TG@-gfSGRyC~scQ zfbqX*#xPYx5UmGU4E+zIXAgOoOrPuA`nv^FNO_#ltC7d!q{f!@qWRvB-j1pmfl=x^ z>+sYcp znWAU45QTz_+L#UO-8?58#8Mt4^)M-$R2eni+c}bcUgZsj6@!xe$FpzSj5GP88sN_q zvN>yOm=0f&W+fDghVpd_7NJ;07ZnuZ z;1g&*rlQ#ga`=U=4=P%=Vgjg{>rX|!K3!~j?!JL-V>d8GrYV|+brb4$6+c*;1_n&n zi94_#+N|5#+pn&!yir+9$V`8=SqB9L#gHQQ$WsZxR4+oshGYMRB$5*m$#(u4?#{>z zw^OV6aDH_GGL_ZdC!oY3wTM-7?3#i~jN@2;H^7-6GjYq7XT;1hZcJ-4!0*(XENoOL z90v|Jh~l2_jAgkkpH+U0?HDKeE>LD^01DujpqhW9fxj=(&t&9*?`S-JmD^xlXqD?R zElaKd+y2~R)U1#^>DE0c@gg#N_cN-hv7`l+#$N_Qdb?lu%^vuSW7d4%IrsUnNpT0~ zjtrbl}ai^18ORlKuAap;o&}A!^*|(uu!nNzCaJi~uZX63bXK`BhCXD3ve1s-AQGO_981 z3SU9W20`wb_3;_G?vc{5?i`A0-8|{Rwyce#(izqad6t;0jADW#K8cCU>9N*OyH9>S zmPEWv+^OuQEHz^Bs#xRoj2nO9yh!}q>D6;gx1cdog3i7K`M0Cfocyhyj(xHs_?^35 zZxmwI@Z@3`+N=LT;@*K;5E(83;Bf*J7z6w!LGca)6T#@IJ}|0=6LopW2CCR9NMn62 z;&uTSUw+TIJs<+aA+?%r?{o*be#mXkfJ?%C$gwcu+Pd**kV`ifTRcZ@H6z<_Y0w({ zW1BxV``MbBl673%Qk)=@Nl<%%t0Iri;~9oO^b#RdZYq|lT%+}cD`s8dN1&EO^J{2t z;k52vaaqXL7e#GasZdztszCueCV0N00h(?cn9W5lc*20QBHJ@xSaDSm!>BY7>? zQVT*x79ZkhTH#4)17X!Oal=EgW(6UFBR|k`qgWp<80*7vxh6wH6RT>1`)Z&dDUhIm zgH38&L&@ttyZY4jc9se8#(3v=5!n7+u!Kd41_t;QVcqp6W;j98nTU@Iljme8PJz57 zN>UIF?e!Y}>uuMrEpO0*+O9W2G-^wo6A@VsUa{_);Um zR5ZgwX^M`yqanu3f*lnj;e0I)Bqa)K}Ihq8S6W zrf103`KcS9z7_%jaDi$Dy8f;wq9dn5s?Nj%J1rZ8-ObQkMaVCEq;6C?pId`_OzsL= z?!eJkmaptmvv97E;Sk++^SI`n0M#rSJ_Dau0bq9Vhq{r>kbFLc!50wmv#_pmMz-o% z?gd&BBC;|e8#JubWcC(Zd9Z3`NGcx;lh8OA(BLx>+qb~i;uTIqYmOsl3A%nGTC7;+ z4{{ri!WD!X=F(uWCZ)&pra=(6ue>7V587CVXO;e!h%iTD`I^1dOW3P^+Z)hRDHNzjh{? z($QYu&o7ZxOoeiFgOlbBv?wqCoi?Ui)d&$Fd!ogK*Tpycjc5 zx9V#baOjl@E^NLB>$58g-q6om2av0=c22tZiP0S5lI|s@6TO0yBXjW;ZdoCPW3uQJ zm^2HT7O1Aua;Qu3%UB%}t2uN$XZDGmyL_<+iL(`g=^GdT-TOU&5<-fnk@`Cn_P~3{ ztLyox!~MZwO2mEpO>E-7J4ds73PWqtg1|!hOgE~cIBI2zm!6-7x*a=cr;cUt3hmhw zes49q4`Oa^I}; z%>6f!r1E29`Ci60yrJr_veN>i1|BuU2v7x`%0G5j!6)n*qOn5k3ra(&jhpaQxvW{e z=@m)jHuhTdo*`I*udj~Me}Bk`Cq!WV-Yh@~kIJ=d;^keQu2E=>S5uBrKWU_f{nYMi zhHT&>2%AVatmT8Xa@Q5HXO?BJyDH%m69hAplanMQBu5WA+S&x}b-+KpqDY zzen%(kE;qYJueH~kiIauz~6{59%r>tF=q#nuDc$DiLP*w{2e z-4HO-ul@hFLTLMMUl5KAnm>%fT)&3gYz@-({o7Y84Gl%aq^S=bjU|St&TpZLY4qK; z#D5Dqu|69`Uak5|Q1lu<80dRtgf9bWrfegTpP2w=7|3d3$iy0}>kK;qa>#(BK#Z@$ z4=os;L*5A751K=#Q*S*6tPvkCj;UBb`i@T&DgWN5YK=I26Ji{Xm+tgj4werP(zmAo zLkUp17$8LSje7nEI#|%3s5eDqik9?QQGE9gjW;n$*MpW9_y^zq5GiCxF~3kIRI1F_ zeYrjh%*YfOBLmhl%km6^{0WlW4#w`e)6*|;ujpZKX8&hSMwLQH%dC!G8*q&2hjq6V zLrgtX-26Q%=JtIDcX(bmlF6bBu9cSNrYZ{ReS$fUqa~{8hX`G}2Vea4MNVNl#5S01 zeiTY1`pwc~^X3}75MD2w-r~i1DP2EV#t~5O7D%qIW9pU7;{{`&w%u}_sk;H&TY;s? z9k}DiYnEL2-w#S0#=ilZ8@nqMl?Zdr$0-$U+x`-GsXaEtEL%Mm9e9mgvv6rYuXuuc z9y{sK72x>E8LworcHJd~RWQH)+c20z+E7eK`<4+r#eOY-!&s&gEP)p<+xnqV4_c#B zpO6`9ICIa%Orly{Z+~EYS808BV9f$uSJ5w!sFACf#y=kND`PnoxhZlz(E9I-MCtp3dg zww;^8l+A#Y9znijr8i*_i$+57r=#Qg0D-84!VT7u91$4EsxkJ>diC zAv=%bla_yDFx#sHZHf)@c^wneHtbS2g4v0QWKCfmq+mo~uRSgA<`}AAR3J_7rsw7# zUa=4xyRtfHOih}+o0(gho1V@Gl*VJV%>H;+nf9p$BiW;`3XkqpZv>=?(l=xFXQ9b# z*--E7lOa~ay46EXgW$=Y@_AC~`tJt$s36BWqjTlFXXcM>FO66_&~4X{O_Y2Ko-gS6 z!5Gu4Kz6`t?SO0s%x#6n&gW)$*MGV5#*P;S(Li{Di&c{@9a|T)Wpi|LC)w?sV&0>$385|`9B?xBocOx&I zaG0l(76M`bp+qsjnXq~T=BB0xinzjZ7hJ~vT{CZ?Rd86?Xr^y{wk8ZI-E!!7Ht(QX zVMfQ>Gr@n=H=vlDCvN3ULK(HS7qGSFz{z3PYd4rbLCf2ddgwao5;N{$J4`VlK#s$j zg_&+ff%lwRV_3R%#l`P0vCrtLONv3nJ7g_3$tEnJ}H zH90hpGz)XM@aO3$=AL{k-(|>??h0ubvx-hJIP|dFpll(nDi706AY$}+|AVIYxA>)@ z`EM}Xvk{sgb_TApvK)rJqjP47Mwlb#w5}IqJvmMU#sUO#*dSrED{x6xBl*=BLIt5Y z1z;FByr$ETz`!2O&N-GNas1VRg0Vu1P%5?a$$~5zzy`a@wsnS{VmS0=LhnXvM{&$?# ztcHA=bnrD;a4rSE?HYl=%P79})-le(@rtGMnX(w)erwhub5C>$V@w(T4Okm3XX?si z=7iBvBCj5=~chiUr>!?BDG=#UE zrC}&hMKgLitL}ReT%&cnN?=<-S?vm{S(#~ewl?IgW0)~@?7!8lp*avImswfI;VX#xev_6k}35e`BXw&W?G5{*`^277`2 zj_T?BT$E*>*EM}B*7cI}vW!{W6wbAojPc{|f?q|-Z8I=hNir^BE?ps6p#n!eXyv>! zn=njTCC%8{AtP!~N2$qZUHnnq;L|Q+?OVrnQr{9`>yjMbD%5~Wy51~ZFAKI-zWW2m zkv1;XFmfQu-Npuxs6McjJa9*>LWQk)T^OkK3v#A1DO)R8PwIM9IlKEAK<|uDVKW@C zN!G%wOf_ZYDGOXooJ34nG6eJ2{aLNzH&BD#qSHnj-yBS=kx43%zL-s@XV28@4)lgb z*U&L&JTDFxHmnhmqYsW8l>x^$60b|;Zsj#zZAmbs2og7f%hM%u)25lKAF0>M%9NQayf`l77jNIofWp!M;Ln|t)Eg3t)dX#t8TCC&Gk;ikR6;Xa|0zC#;p@&YCy8v}PN zhFdoKFX;Tc$Pe7Y&xn|B(c%jH zn@-(hMC-4kbVgj{Y_P2J2f(mr#gTk*b@#5*@&ac+LCpq=Vro#`+}slZLACmscS7al zTscU_CP|#!lLfgp%If?F&@xAUa&{4&JiG*dUR?ezB0OSPY&2F1e;ylePSLH+lz@#} zpPmC(2C${NXUt$7ktuzfMb714wBqj9cW?b}*M{1od)j;wvWQAFH^gcm!ZN1Qk>*qoFRR8=v6-)>XJzG=Blgsobw${FF3*~I?L zIZ)#d_{VfcEy07x_%y5wR)J-0^UF(~9Z#wH(z#u%VVoYympe~N$@=px2Z}tUr@nso zEG^ga-BC~Z0ud-YvAIH~`O^trNVGmWCEX~e#@Cergor1*`cc{%Oj&!7ieByDy*A#* zG^TbtpkGw4*Rbp&EFLpv=N~j=Q=nF}LZl~POfKk}!kWBd9}pr(h&iQdW)^C*oUpoj zvw8!sCa5|fBK&+n^nK(v3~eF}5jziXL=er78Al|<gL0u6lKp`8z5VV*3T0d7 zxtwewaiM|(yNcoiqguYaS)5oK^$MwqUNLu`*2(?T#%F`v(B-omXcsGv?SBdbo;6Dl z2!wE(1fY5Y1Fp4lVj`)wNeWM=${g_Osy15ZouZ)!PtDQ$a-#UzBely=uYScj+Qq!q zGNZIClQ^r0FH>qm={nJlHx5mf264y`Emv4d+SsC^1v<(tpP`svxsO-=(|#@WX7H6P@f2D)Ewuuw6>qdHoIOd} zNRcV(_lL$Sdn$wg|J%xv~a0ZYNLi* zP!BGJLasBbnz=$mbbw8$P@tG9a5*gc0$X8J6Yd&pqDdfq7N64kfCVnlMz=e z*ZVf7clV2ML+um4`qNYAQ)gu+1y4gRKk<**trau4paXS&t93#>>1r|286!MJXOcVoI ztKS5Q+1WV-mw4nV3hfhc)>sA3Y^6vWftrS2!^< zTcvrjN4jO5onY}~)ucq>^>{ckJ`G;Erj90F(*~(E8dw%boNC|`Aeeuq1*z>l#O~gO z9Miw0jhj{)+LESMbLZBl#Aew-iJEnKB?!6wHh-#r)}D7j?}iU3qC?r#^fEmU^9Io* z3^6gRhh0u&$R*yID80yHrb8o0PEL+hQB_$b4ajg70;{>SW^!b6aB#Hq^9$kHVqWoM zD$6I%9BWtITg^;q%TghjrQ^~OgC_QH#%$(awqAkJhsn1ZmNjoRAFWL48n&qFx*iav zQb0?Fq^Zg0fs^KA8?P1xmLbM?ju?yO{x3tusE;HX*>|=%)uW~Qb)0FC`&YyFA^ zJr_S|ZGJJFKs1eIzG5^K*-@u%iiMtw3pd~9!<(C%c{ShiiR$W(Yo9hXdoi3IZ+~8; zF(eN4#+91dnn~7)l{D5R=cQNGSm^X>jsjV&(flj`16E$DR?oxv1$lQ=HjJ4MI`CT_ zFlo_ikufr0nL_0G9r$-SZcXR_?Ydw})8b@uap1`+VRbkpQ|sIJ0c!CdD3YRsD)s<-LLN3gv0wwuA9bmu zKdy)f+Y3(qszho27+O>GVT;BOpX*krl;C4X)$;G99!8^f>3ICUAz|s4zpi*lp?ev= zN6)2M$Gx%X+-FSYI=ICnE9Es@EYQ&CC7)%{Jj4LrY&cbJ~$PLUSrQC)SMXvIWcH$O?0+~?J*|uk4jxWEOwJtymQ;RpOq+#JH3N=J^3j(soFqo1iHAP@ zdeEFXJMok)yG72NL)Q-pdeHW1!isK17PhyO6DjN(D&4HF^T(`*DWw*Kpx!_s_#|mY z3^&x9ic0eDCg-5%vht0K)SYzk>{!jK0Vm*u=e2g2ozrn#A2)`oyppoTb>JMTlB3OF zKr$nu2s`zOXqY#xyecS0?v~7^$DEi&NMglTEHj}+wpDz$ZLWai;t!8$O?{rpR_WHj z(9?1D6R%SC6mWE~X8{oZ>+13^k$ap_Xt77{_^E)AJ89nAgIkl`7gG6?F&ta2K7DY~ z#t+{NUHuNf91#*lc>t9ju0qR^t)yl^#Z5t7yXpjm$t3EX`HCBh-ZR}u4m`@kba&9B zT0Qo&<(t2zu`>8yU5uoEIzxjw6Tv({@K6AyhbD#=898F#Nr(?RX7AAPIxzlnvY`v) zl)m6y3cB!U1rAimC?b-xK)6fl+zLh8wA<(E6lC1XE&*X`Z=xD@JxCE=Y4fj>4u4Fb z+Q`lS%g{ZxRUveEe1GYUfr^H36Cp*^sbVOz)9vDfeFMCRl;ym~bAGwhQMG#K>}#VJ zP4yJXc%2TMYa2;9>o&0*mX$L^?7kwRs5;@zn+B|qT)pqY3Po#|qFcK@%@t5 z44A#DWV=j6)9Cw^EK4%Z54Qcd6?L?+L|KNk+WYS_a8u}9`WQH94%9u zW^-ylnB6adfy>m)!j2Skn6Tn?wba<(&C37Of~2%G-a}>m+%~x{xu+5W!-@?*l)60H z*Hf4nYl86;KV$?JEU}5+XX*+b#Jv^pMCjbx9cMG(Sd+BuN7G9)Dr+Va8BQh2IP0{E z8r5{6*+PNI9{%Q?rLJys4|*)9Y?I^~4H`D4QpLo)c*j+$MXxuxa-Svlh!*u>564t; zpSb;{2DOYffbdzHC8EE~W#CbO#}PA3mg#w%Ym|^oQiy}l)o&8=94n4!T_#0fHK@A@ zE-C{y zc#5N6atcGAsoZ2q74t#p_@(JBh?O$XvDOatQJ}XEJ2EALQQuO@Kq16^ipgXTwsQ+4 z(9ZYU_`t9iZ`=>=+6myIyU%|j|LVjIGd>Qj@e!wR^wk6g=G#%pb zj<7Cyt;Ys;ezvf%efm_Rli`h$J&zXotBFGDC>_^V#%71Q@+q51?K~?db9XX{0DUn? zEY4&D;Ts$h$jN0R#Iqs?2nIxNg`sH4uq1TWEXZd~ip46am0cU+r zY9=J0pEotBJEU(S!wmx`tIq3ICp2WC?}rt&`4GR%=YtBqh?6oZow-XNp|ra z#b@SU)uI@pzQM`viDJiK9;(FXws&s`LS6fp4}JUpyhvNx=UlrNJbV;#rkAHw$^k9g zMVZ-4*<3&0tt$v^p8N76pZcRr3a>ITTD-i={`2!iD-z1F&sTbt zhOyBG=>wBC0;b5y7)wUrA8|{Zdyy;sbnkmDE03ylD@M#;EeNAxSW}?*F{G>7bF7bo zQ%LIFVu5Ktr6Z>)ECRz8UYE(~R&wXoEBtX3=hiMBA4CM2ispx~uH-in)(psSWjOn) z4A;vr3O?HvPd0DT;_MP{+{QSBeood4?)-S1-5?~;ttvviL&$YNU? zZ)PSDHmY4@C5E!dVj=h}b@?dykX_@1U@Q}FQ>Jxm6M!>_#Xv+9U@Cn9f!*9fg@w#n zdPAQ94&jyTLI<06oGYcQ7pn|Sj1XR|x7f0SrqpVX`HXw+uUf!ZY#Y|MgGMbtA$*1h z8e{|Zpt2oerTxL{8lK3)aUunjh_;4~fvpo9`-H#Kw7q$VG3)WU(ErEPdxpdHeo@2G z8KaHf`(TD(lpvz_ZuHJ5(IR>f5xtIXv>?i8qt__WMz7I>M4|^FK}Znsd*}Z?AD-)a z&bM=&b3UE>-uK>X?Y)-lP8p#Sjsa9jqRSwpCWx&KijT(foSA_BsllY^^~|Ssp}1Dn z{M@_beB&7Bc4p+>pFt!zO3m8Vyrei=7Y4?qD+1`MO6TwTTza({^l&3<^*EgdwcEx5UW!qYz#CE3lU^S-~3;ayXLBu5S&qXA3L?kKUYbrHA26WD=HP{yyyL|bkVE% zWh!M;%-vYrN6miOtwpA1{(UQm7sTNlZ;aMct(Yk2*f=%i~dR6H}OX7 zpps55cUD6ot=+PLWM#%YWgT%9(w8rYr}_6E7}*!4K$_&Csba{=MM|C!4O3!rP|whP zCSpW06MaP*__mOIg#kTdk$Y*CXBA1bI7X^;!v(XwW;^{`fWHX8ua+)zCx}HP>2se$NBYaIz{of; zPhK9$Rra>;l|TOb?&t9+$RXJ_Wv|@NdlQG@0`_Vbk4=rm%;+{oN06sTvZ~}^p>jtA zEUGz^pI73;e~!i#5g>qa0A$R$oDE*9+8{n zdfc_hU$7wGlYL5|5WU*hil>V`4^e5ctTLUV19X_ztsVgYGkEv=Xp1s)&isO+#<-Vs zb};T9mwVQz@)5beq$N_h-?XU-X|H=(65nGP9T2Qm^$>>dm*B@rgo5$=h2rVMM_Bw^ z(Rna~*KSJSC_H=k2zcFR@a~<`kuH8h)amto?2|$+Y8%fFG&XwDjNQ!1z!>;hT9nvD zu~?um6jw#3lIH|cr-tv4k^TxX7GU%3)`GUAHz*>0mOU@Gnja?yVfBu}U8APpN?bG8 z|3!WeKDcZAzK|8^^v-mV%)6hrv7Z&GvI7-?QoG^_^p=edXl)K(27t)|ZL&BS@L%=h}Q%$O+BDC`$s(CxInT9#7 z9cTjqHk-Ljo5%$LG`q0j=tY{W$C7cKMS;5hRZpar3UL$QDV&AW=0B2!s7A=Kes@n; zAC6iOYM#B~>HB(GM;NiM`#J2TkrO2s*YY)A*z2^3hBhLz1ErSF&H)LZ?|r++6yaOx z4W!ZAVRTI5Ir5iW_2nvppvgS|b(T&AUIH$jj0=niq;WA3lM-0$?;V(v5?=DEZ{?`e zCQEng)Gm6Cf;^mzX_zC|*ALq#D>QHezE0?7s;^ErERswb?6#{vssBOqc z$)!|l3rXtofXqA!-k!xZ|+r@`r`Uif}3$e&%u#gdKihybJPta zpnoH)X{^PtE~~-Kc9kLuTia^P^Qdk+z01xraf>Fga|>uk;QqYZn#N(5_Usb&(f0W zPHBbhu_%mid%Khg>l+tLh5w9Y(elbkykSX}%n)`O$WqZ`&_mtQnvlk(LfA8p^az|? z*G!gXCRv(BPHMGHG8Kb!YMGy%n+v_ing+m>M5ap$a};v8>xHQu@D?}f_)TMXL!vUn z2aFicuCc+7ZWQ_-QFr#JXuPD>d;>is&wA@N%AYsTs&{I*ce5M9?Q&vlO2ujqYv-D= zGLG6-xew1EwwbPCt1WQpD5v;6j!gwv6$|M_or~R{Q4Tn27=jqg`-iWoBTI0|hpvv>uLpWez$-RZKN1YLO zUUkdcJAfS+Z4e~A+3y_aqX;A3Er=N*Ig_Ek#^~1LzrAt3NEMG8+m0LKy-3xhvqb0= zoy#lY$wUZtF6S8`Ael_!u0-J+ZNoM-m$an2WwCbCdnCJ%yYo@Gq%ju2kMMVoWa7-r zsm-mDx+UE^*7D!h$V_NNG-0E4R0*-~X-F#`vdb?-NDWehKbRC;EFZ{sBoS(bh*nAN zWAtQoRMTwV2*KShDp|JZxMucOtl2>*jb|;a#T-Q}Y!BnUBr@SU`MjMwrWRVMq{lDO zLWY2jE_mSern}3BmjE+sl=%l-eG-@OR^XkRXY~45p||SQAQP9cjRPuwe0nxBd753v z%1G!}9(`>*b*$4WF})M7N-6HGSic z78Qbu2#L@F)XS!h9k22oSKOb6v`fhMxLvxJS;B3t0!uLeAbQpD8p$RLPr4-WRzPRgOqHx;JI9#9Yh zrSO4H($KI1CBd1wNxYi4VNCr|fc;@L;aK*_pRqWvi!6XH z??}mswxsfan*U9BILg(fo4;!L%>zmTvD3*NvWkQq=wW6_xo#|onrnH5@z>wXRNGzH|(b@gZ*HPG~6 z*ig>49HMVU1qFq%nRkA1^Z9_6X5D>NVR{r*|Dwywv51QjI^NCgro~W<6Z~aRLH7oI zJ)JIEryF~8?(x1NV0NWD*R%L}`_gWnc4gdy-kq$nd$4e~T5cm{^)!K4hI!BD4-#=o zHD8QUp_U>qVgpw2l$f+jfoP$-NHJXD^qJl+MU8T)H*WbY={3WU=DYGfk^FAPPjwBqJ}+U7gTh6Ho~Wj9KY0lBdusBSP%8N?CsB z0Dtb(9^is^;E0)7Nzh2f-CGR~=N{8mR+g5juSqNuZ83`dkDFCS&vxkBH<#=Wcesvt z7z{S=tXY}yfhRN5!nkbJopie_Tq)lYZf_qk$Sus%qoLyd9|5#&lY)cAeveDW>`R?G zXkID(GImU*rSiTjoYv5%6ZUghFZg-MXR0%v(yztBjq=nsE+EV)hp5#)$w0p7@J$a+ z$#la#e}ljo!X zaVv>-Vwq4vs!Z=xxn1~~nB5OHV`1${`W*VBWtDVgn$^jeeSS!_*MyR#fzQK40Bz6Y zK}K&~+vSSK1_or4`h|V@=!z(gXsz;%okFHpU~(tqljSa@g>$AL1TqN~9Gv06V8m}d za~dHneLBZAu)i3)C@}{vf6EzS2mPvkIaLRuX_%=Eeuap}s|aN$C%=WWd?xF^)URlB zZ6Ssq{F?b?DQKffd#tE;WO z*R;R~9?4czWKJLZ`2A99WyQLIL09HZ_zcYNhf&o0!tCflm!9NeYq0%O9*C!oO@Bop4bLC+HZy-_7unCO-Mt#3JK zcpv`Q)q`3Ft+j+Kjc84$x_F# zY-)ks5&Kv>g=N^K*A|fmjAg!ZllZ>sNMDjRcObGP(}qe5Y>};1B4sre)H}{5OQaXm z7>0GG!qWfm~vIr0B_dZJ{IWq;uXZjR#F2T96Yk zg}?M{IVY#6ekLc!C06Js86M5Y@|v`H z)%t>qVEQ8sh9gi)yWfqR8s+o?&(N8zu3rBW20in=B%d@$qqUb0em?dENYYtG*pA$;-=rCj~3G<8`^P*x%ia^Z-p2}gqIUp9Qb_*C?RElLPS?j(GpG)?|N{MU8u!3d*evbsjyijU-D&D`Ey z-DvbQDh`nn?neYJ_;PR_wth>}x0cQ;?sa2D%KM+fg(FKXR*y@VZR5s|@B6Is|5h1Z zT(e6*pH0IDbLQVJy<<>60O^wJ__=W=z}T!Puk)-;ti|Q=r(- zNwi#y&%7$rs@_{gNB)770~4l`ip43%NoM-V0(v1UdZ7aPTGFljAw&Id)s+_L%3n)M zM9sLSFt;i(UX%O+{+TI|iz~U)`iPqBdiiHIt? z`cy{Qb7jVGMIF;TQ(u3FA8DQmuedTz73xTv6GyIIrw4`*;Nx+cgqs_rP1Y=RX;yn_ zGBRntiE)+;Q}xpp-{D8JylV|Zw}O?;rBsYZ-=$Jo;JBNO&+p~qY(0O)Pd8L()?$=` z=zojLm`(6s_71E5*`3Io`B{{zWx!crCkcD!qGoWOc(OAxgWp~fw0A;(mxJ7_|m4TePd}y#NvY_VCJ2GFk9kLMhf1gS8#rC*nT!O$1HJS`Z@co_BNR$O3R!MgYok%u{h=a#zT{6js1jg?z zyRd1dvJjo{{N>Tu+q6{1n-G31@K{O&b;*2C%pCeMY=nks*&jc^Kgx(nhn zw`DbgY_lVwIs8XL22I>#`)@Q4Z;$4qVv_&jGC>b)wAFJ@V9%sKT0t5O>+;uK2&(98)ON=B z{-gn;+taCl0JH8JjJ#zO%lKV*kaA;{n5IomgUIA6YVS}dAka1Rw$+wE^uwU27?v;& ztemNB>cYTi!#C5};lOY?Ud_O&fH9U4&SrAUdB zk(LHLZwne87H zbt7T5YrpKI+PU;_cuuCn!@OFNhg8yP{ZnGh$PjG)R4@x|k}gNn2gD06BxTu@_0$6^ z&jRt5`4F{6C(BMh%e4JO+sFCBRfDuPTdB~CQO29y6nrvuyjW-QSBdG90ifSg;sgU( zx)h^`w#j3bSk>q0xT?+Ge9SqbGMYt(OtaP$pAsq}l47VOvyn z=NO}j-7d(@jgL@yeM*(A{1lm_{b8b%kU@xAgG-N#>+3z666q(q!@<7-^5*Fu1dOb9 z0hf+GD#n{lx_>@_bfCL{zLxIQE?b*$@rioS`1Z|eyMN5w4qDM*&Rp?u6t}tvoMJPA z|8o3`l7*}lV9ZBm!rkC6F`M_ZRTm_-+I7+-O-DhJAu0|hR#S>1B;8fsU>w(+s+Q+;zQOGgS_E`=0Yh?R}T-N z3m4a?)#9V&g4MH#cZIGXKLZ2G<0)6kWo{tL&>fQYo+<%7GLp0BQl{noqMMzvT8&Rn zUms5~sQRmfOM67%w z!_pBs{b+nI^TVTrZ`NrK3id7IzYWbK8VZV~3d5>U%olMQsG&5nQ0lbaJ~H+hpLcn9 z*bsSz>%_$@Y8wuoTHq%Jbw6$GaCuzywLUj?M;2g&(!Qv3$2uTOjpc;6>OPfEix`7?vqSNCUzE7j&aHV_6_CkM2t3b0J#mX`)qF zRNs5-*zP)XitP?wUAinJ9HcX4o8|uw`7@I|v3A71W26ps+YT78=MbA90J~DVnZ=zP zXQp z*^xTGr6|$T*Vi{R6!HeNJ15vqGTBnaqk!}##VvjTzj_E$up_VM~rzjUC`AMdvpmVEFZudqGdIQ zuh~7snBoaz$<*?Lis+pFsCFq&eEVf{;*+#t4VKzJyQ<~CrBN>&2@eYAXhGxa`?pBf zVU2jCg)XHNQtrV-_pHd&wnxUK1oS9Wo<)WOhB`9a5&;5Shxe;NP*A$}$$&G3BZA?y z2f^ZYydKLnnH6VWC-^r0JB&p5-VlPNTC~LqdqvlDShHytaU$%<&S}u63&r1Kr;|LPeW1X$ctv92>R4JIc2{x~r;zv|Y*1wQLF_1ev z6wT9W5AOYPYW}I7rA|E|B%7?BVMvsVg~yB`MX6zx;)miEy9mH3E;PA3+{7xg0~a{# zorGxDrqqHxw7i6J~SVAAHL9qyoZ%(f-i+eA}W`gz|;&65{`0| zV<0Z3#Iu-EGuqCm;XtRn#;Jyei|AqCO2n(62ZU}lWN$p*---=*H~*(bbP(d^Du6wn ziw|BYai(g=L0Ihm6x^h3_vEA%2-vPYL4+Ij>Mz0GlK$JT)A{LlT)0+Pq3EbGnCSnC z@CO>8B*Kc;`g$Z)FbIEe;&pgLoR)Cb^nPgz7OUc&j@aEzPfQxhU{{a_=Mp|}BOS$c z#pB>bUV?1PXcaCv<)NhmzFx>8a-miPtR`waq(U9cHSkA%LH?@gth9M z|1+o45d@CX6C(m$7uKK9*`29HD1-3LIr8<%+(#6WY9QEDx2M9?&BO(kEenpKF} zrDo-bMSrXxNzLS|U#VyE06S8PkM|3V+@d?g=n0$W1H*`$fj;j(y9;8rJTeAP88D{& zOdV@M+I*w^qvqcxbXXN2JY2S^h>Px@R#vlVoRL!hJU>bY*Y?EE zFDolsz-;A#>nkeGX%)w)eEFw(Y2qo>AFYZk7ZMO8!|j7g zO#ep12i6hdFt)M#_J2cS+0168OVQCrLNycHzQCE2SZf@gq{34i%s0SeS25=(%r4pa zf}oCDzYv~Tl_8+3hAU~^CNFQJTVch+%JzQZZ)Gv{tBA4(zEv-Jq3G7=MR<|{`5h!r ztNAVbleZY*2#b_&L&kXa#Do|J2*E9EVUJG=ZO=okO@(#>qAKvO`Ge2+4e<01L0H0v z#&Mda+i^)Z_DO@H^tbz<0hMD5ofsB%qY9v>8F!4Fw`m-*uvwkG(-Zp4TFDY+Vza+$ z@sh$!!MWqB5v>>v>96DA=+>dXetc;t6bhUz^yEpg-50824J1<;yp~u3r(Z(M`<9GD zg`SSC%l4ss@6f7|DFLxlLiW5`WOMW#zAqE0O|5BeZcc7q9_r z-8RC*eY40UmO`?MP#9F>J0rKyme)3b8O7jKflqEpN8 zd$!j**K8eBobttUTa?^J06hdWzj+waK2VMAbtSkKXwV(&RJvu;7w3wEPmnF)GfnLJ zS(qb)iS2x<*AY@oWCHAbs@pZ#{ot5HEFm`haE3tQaanFuOtY_;;L?%Cd1xdCmGy*bzD_bezJcc%5eKB8eOlId8A3-? znk=`n2V>{qcbt#W z^3&tHL2_N8&Tg7LJ_+L2dvV#ueD9axjk1+%rh<}~%V3;l+ANpN4{Ew9 zB0UW!5r z`*&=*orOTqi=Zf_pMm%jIc^e$;7sOAK!y0bE~ay${e5-$k_C5{S1bVk-d8I9{d`}I za-Z*`WUluOq6YahsPSnhH+kZ0%Fnc1?30$EsB1K0z;q;EhAW$JFRRp+1wMs^gjzO` zdXdGN9WR>^>!Y-7o~@eO1g@CB>d<%C6B%_*LtRyR4-XHXO!xU<^gr6$!qFcGP(9{KOy*4? zT0Q_#BBJn-BX2i()^B{j$5C&vAmgd-%sb@7BQ#wt`E^*_+`-iiReH(sc}S#&V-qP8 zMgC3rUegN#Jd!GhvRpjefg||wdzP-Q#zkms-5v;$Ea;4Y_oNHKj9b-mgb&iU^3nxG z=~*v5Q>;9swJC1>3+lCuxK}YK^ES(B5&D#5Xo!Edvg8!@(JsD6|8c(j^Y7`n zaYO2TAK`9MjDM~MuYSpT_AfzQX>alZA-SDqBtQ3r+;I31f}Zq{lq9`16B#J?LyOE$vlt%)h@R#GTh1L0f~r)6)9O z%C4lIQ?bj*%S(1VGx?g^ixW#S+;Zyuqj&m6vF}}g=g+8}B|l%x?qJ|}R6*K5iNAkl ze|-He;ou#AYIi71wm$SPp_hv7NFfCM4*G{bo$`|H*%dqIk0;XblLU6oQ$=xw5QOK} z$mLd2K^bj;s(>{~HPs0_8|$0JFq?F#Bw(eKW00{&Yp(KeXHQ+SI|#MPrGgE95txoN zJYE0zL_vYRn6-#RPf|f4Ep{_-Nq_&B-83b|X2@>p-#^#bNHVe;=Qn^dC3=zzIQ}VIEWUpEmwree~x`OMv6YsO>MS%Yo+{y;tq!|4a_= zac%e`BiDDIXSbZ)bB;>ofT zW29u(TVA+-AN!K}BKUbvTlMv4l;NMT-Z0!4nxZRWdaR^@wdbAp@%j33Tg%hG2Vb7O z31ffv{AjbKck=VI#M;Lv^3pvjR093VM*bqD z4YL~>HXm0sY~Dzbg(H~AK7HDJB$FJQsxQfR6748bVCPpq@?{9Zt?=#f*&Vj5`$n}b zfLtQrmqOcq%N_a0QA4kVCg|c5in{aS{Cq)s_78 zFK=&O@Ahlts={RLYYk13~a*ZJH9`4fI>6sir%?j0IPlY*ZT@^Tw29Jvx( zt?-kc5N-d6h|@2&j}?8#Yiqk(S_&4nj}|g7c#U6W?MhgOpH<&Jy}JzblarQGkhXgT zp89aTwyc(^C?zW{ar%8l&ZUlm<-Om`?5v^Q+{}!e0U7f2Gx2}GwPQfV<{66epRj_a z*W2GHD05Bp6$||v8ya`50I2*|i-g#y$$*m`h4ExX27kHaJHY9C{L{P9y3^033SFapHOu>S?+j3y0AoH3p{Xh4XM3Vpa zkt6+lM)Uu93-{PeNfrCQ5B~o*&GG)9k4|(VxnqB8#}Mbmjzp)VJ`f5bBVv{860|LR zE$!YsMl*iT$nR9QW>r<<5Zf;9?$8w?s9<(yw)ERUtx=UE=J(BhLyr^ zzt{_sBA8m~}Hoo!a7WMnt{sxFrZ|u)Nm9fh}`frx~ z@eipbm2J)Av=ez>{ytgn4*1q+*BkuvOW*Ua{Xc&EAk5Q^w8!nc%d0DqqePP+YjdKe z;8j-Q0166<)6L$zd)&^pxWT0FS}E6ETe6>eRGSoZ8SlW($;`a)Rk!5De^XnK@T4m>F&W>j z2Mk~OJH59YKO@_;$G@-2{H#U`x=71*wtab!Ox?*e!gppY^~TTb2d=gACPx1GJH3or z&zg$*kZ$aCR^gKQ{G1%gF$`EU!2Dy+5S8(odsC4SZnkJ<2Ibs4D!pW$9CyA(|2uaYpWx|47n|4exUR#s zqQ9F$d`do=@F6BWc9eq1LLsD&<`4`TD+s!4ok`mt+whYwRyM0T+5GH%&Tyb z76oMiyf8f{&QFo;?jCh7ittVQsPUh-VYwZWxC^jWm+Z43)@A`5eng}K|O1uM1t<6Gxh zuE!VMr5=5qJQsiA6%}+_+N&z)W`F&qvG@DWX3Q4Cvvl|e7K_l)dXNTbv-67?sK%GJ zr|A_lba`C0GEMq6F#Ztv(4Zdl{nX#@TKhNw39i?7*M6xi^KEm-D?|Z)(!bdRX`T}F zdFkc|KKrWi*o)@$^Jq92PKEQqGy8YEL1K3GA^BN8L7N%P!DGfMYS!s*2jj7}i~p}?iJzjO@taE=^}5H)10!?0d8#%Do!1{UI)sA)A;&p2HY;E$U)&YjaUt86z0}3p3 zJdLiVJV?hHXPIBMRLOqOc5}7AxW$G>p36q+It`nVT=l^+TNg{)AUQ$_@1upesQDwO z_bdV@d~24NJmjkD@b#Cvt$(8Zz~ef@Y|xxId(FpxF2m0ggb3|#gzNu?&E5-xxvMen z)Aq!SrD>RDRn5(|DEzI=E#8^$!$ci26n#;G~Q(ajdW6qTE z2QyVEsm4W7J73zxCy={09JFsitmkrgm14fI-ZeerE_ZCPoR;OXN4w-ITRITN2*=)o zt8@WbPU7l>4D|k;fw}L=CVV^(q}`y*+@@xHC^Hm5B4y>sw0Pm^zH-1&lutd~?!+>q zU1?d}?F886lBlSPt1HaScCq4`!{m&=V9RveZbe^O@2N?VSdIAxe?gkJph>Z;e_J~f zqwB*P8iRXQ5)?9xh!j)6lT8)VxhMs2x6Z2zdP`|gCt$w@`M2ohp-}qM(@p6D5-7Au zvf`;5=UE3+wmQ)HTDjjGsg2o%=$T#68w!blw9L{_-Q{ATzS_mLA{hpm7!-L_r)e*4 z@sNZ(Ajxw46YRs>4f}((gEj3?@TKDE4+bK5jVIY8xF-+8A+?Og13VX3wpBv`rm=l{ zOky4dp600NZK%$IlWb2ohf&s&FYm6Yl!!7d`vQ5-D3QchJ-b(BBH{qu?{pQ+M}%RU z3$?=8a!mJh|Cy(=xwgrHrfVg|r56abHOHLnFCL2LwL1sasRmq5zK3PPNK6G6axDoQ zC08A5rrzI9ybpAf#K^g-MvQKi{*-(3P_R74|C;`9Gn4ZaqpE~OrPU-qE)vS-0sp0H z9!2a^5vS<~sto`u{XUvh^Ibtrz_0iWBbSa9rnTC{oXD`pFOVsoi56{bJA`{)bCwe? zP$sn|{5(R2X;18uv!KA?hQAuJ*_FjMa*_6|f7F5*cDcb5=ey&TB6r;*uP^x(hdjIDS@}45_ng|9kM6| zScsdEmSsnVtobO)^=U&jH}?2rGQ&P!R~+7w^bd?Qs=47{G38O3OlQAKE9;+Fc8D@@ zoj;n8q#CfOOanRh-89Zv2uvoR&hXV1ouTQNT&TtTJ)vDPlTh#f@!btvYo67VXrkYY z!Au+~JfY1g!axYNwYbb=F#==D$t*}3@@i7?(<#CR+ftHa(MeZ6C-GFDW_-JS^yJ|; zOhsC^&U15ck&l{EQ+^Uk-@x2iH0zsCIXTcJ1K1WWOSp#)8a~Qm`@+>=ZG6)D;^r<< zxm=^~h*0!)L_btjxOA5-Q&mg%ur~VPXyD)*yM3FUS~`mfepFk&o)mh(WwB<-boza) z-Hst7lNev8yYTkAQCS(^j8wNbW+e}K!h-iztE+a#=BIN#q>MZ_f$-J8S;a9{aRK&n(LQ+t4yBOz=C+gBmb%X~W{ zN-U`zl*&4hxdnpR!Kc*RY&5n+9=0I$@-D3-go`xl%!Okw_Qf(YljUnxYoix|5zhyc)1N&r0LRbUYo5d~s zxjTmkx0R zd&-3bANZ!skYv^bfq|DzF%x@a zBSK513*EI+B$ta_T7gDM0v4|bCE_|Sg7^ZG5joXm72B(t!^IvoF)jJg%sw9fc64ti zIwWZZ;3LL`$SJEXYt@@{$s573??sThM9J^2T&C&;*L>oDUNwp=YZqS_vC1>y84TSL zV4uu3k=9L4^f6h5B)O+h^(A>Ayn>kz-}>WgvT8q?;>D(H!}MdUeSm`*?F6 zbtT#bwdi~~ep1$p<*no7G8n01O<}HBO}vR=kUk?Rld){tVo^-KZqFEztInBeL7H6F za|wv{Q|02qd54EswZ#?Cj_2o0MeSeoS5TW==-|ZhvTbDxZA${|L$S?B23?32ytg3#y#dtIQK{NE zX}Ypu1;$GuRKXawIcH61(ww9#`4mqAy7>Xv&{OqBk4E=6Wn+;s3+Y&RCMnIG-L(hN z*3fGD;61tm%-De#(~GZQ#&Y{i7ES<;32oBq zctCi3WH?N&{IOmRkzt1T(>g&l4T=^HCn*c*7uL5y+hg^Rde?k&nj@G#s31tk&|_L{ zW>kl4dgL0#Rv2>+9>ge*Us(ud=ML)t%ZbIxcEnaAG&|0z3kpq&#&?ODvTOAZyAr@6{4jx{!&S$tQ-LhJ}Db^^=JcxH6rLw(sV2OR&0lR=wMwQdAi*&T`#R*EQ>vXX&YY*!*@hxr1kD`6f3_UcZeEZ67$=^%E*_Rm+ z2FfZ{|8_VVHQ@VxMx(pE^=Oa0_6hVJeW1>urAvICdiq4dZM$gL`h2vtz~U6$-8OW`!FI%ew(`b&Lhxx0UgGb=(q=1vRn#Ah5k_O%UD&fSN)5A1pk6 z#&UXFMNY7IB}I3FjLc+&A1gO!esNH{Jhsg0_0fge`s9%mk5 zHW1qqHrv)|kVhT#xL`mkliCD>RcMow4^~R`VNKEz=jAieKu(mPcEIh^<0I!BzJkMI zZ4224==9G*?8uLq=~lKo1qG-~mzrfIy{7Mc$jCaq1}>=($K?8lmlI6JNc|A&10olE zb7ins0dK&HKHAF<^vakX>esy|abLhEoRm+Q1E~mU(P%EywKe^o%t|v=BQKrDz*=c? z=C5pHz3fLe<(@`)D>w)qb0a)3(oC8mU9FR zHBXtfnVK2DAJTUmV(4XOAlW^O=PK-_a)%(C1+Dq>x=>Ps)XFa<9i+d^q^Guo5Fv>k zc3^GkEUsKUqh!6>13(nwl1^EWi$ZURN)OWo-V99WH98qdqK!{56x_+lk4<7UsfiV$ zTTr&=FZ&6|O0qcWy@xa=>g7q6MOet%(x14i%$PaTToq*@u~FgJV?%1axVz`$Y3%hl z6(xDawJ0f|PbKQ!?byx!D0$3dZz{9wAF*!rq3`wgqw2>^(fI%h>`Rl-+Xy}7m4yz)hdfO56Y~;R7T6_zPl!LHk zUZs`TQk-9J4pf{?@uB2up!?vIacQwGq0N*H za+8D6WH(`_GV@cw4`nMKp!}y0Ck*5LNF!NS6>NL?o1BFV@fEoSTUXkoiMGi5#bkXh z)q=DPadOLe@vF;vKI9dhu|Pp<{|=@CW4n^ELD&)~Ej7O7X{7dNeOyS&63$~l+6d3b znf;m73N*;TT}svB{m>@I9UQK^ZO7Pge3#QS(7m^#qPgPKm$fH)=bf1`Fl`Zgv-78Z#T zG`aB`+B3U~2@%W45;7;m_@f^YvCmZiskA=G=H-5Gi0W>6oj9-a&MHk; zPV1TMQFJX!M{$;+?GDFnV>Q@%<_%e;v?fP6=wKz;lQw`(phC-Y`c8y3w2yuT1~W8? zeGqHOM5Nw|WM%}Y0-0W!gFf>X>qM3(rOi*}!{Y3h3Q8_$dHBlFCYv9HD)+K!@@#b+ z^3#O&-cLFxg&W*M_4nO;OT1t2zxcJ77 zjt@UTFd*o-vg1TodZrZ49|52{aBm*Xh#YP=Hi}pt*%kH(s4{=no7^$~c5uC=|fQQ3P>99%o!`Wz93c_ZMH$Hj}ytU!|1D`Q%QKxFsdgEo<8GmVN}8 zEt@CH|1leApRCQ1+jp0Q4KhmH4Dt6=j@mYqMu=ny(~HtA<RNDxu%KuP|Q837qWX=U=_Dp>3#TcwXqXhI6d$Fzi?y8 zl1f?s%~S7{RjI#Jz{wO|%`?I_Lt%=*Qu)V+adRxM3ixWdPeG6KY3NknAEt{O*0S(u zgjV-db+u29&at@iYv!7^VGs-jrK3!W!Cah=AGD2Qt&>D+`RwzUYSa;7=rTDnlL5l3 z#LVh9Y_IAKlYd1bccu-nN?$DtZt$Nt$vo>t8;5<54ChO-yA-&&eJ*yLA$iF9tA(B1 z|A$0MO-6STji9v%i9HQW&#;8D@wj%|$xpRrL#vVR&}tmSKGn}aplUcC>?5Lx!?O-7 zJo5al-QMkgw=ii4gcU@Oif}(4%rE){{mqJnbBoAL0w z3FM4P6cGaL1)7xxK}3`<0<;-1OFI36R^=t4Ib{7H6$$41;S@}rdS8mK^?poIdzS8d z-TK|s$@US+S9Njjh(=?L9ys_YK*(xfdCq#K-YBQ3fbrINVue*_8m=jkXVq;bW2aI6~9aU z`Q2=b^#o~(smn4m2Q>q^%ktobbxY*bJ7GDqwq^#iHds~nBT6%4jhgz8+O%z|fA|sn z_;TbRr=lp1%-CjC<3gP4VB^tCY%9y+zl`RvJ&QLii(dncsuV!PuhKthd4KIME<3D< zNP^%hID)bqk9-W9s#tDDGhK@Y6Ys@xzprOzlnoA0c8gz94gN+b+4v4sXG@*mdLdt6 zqg~HC@5^U#mnjhJ(XR(`% z8i;E3&vNKaP}>x#{9a9Qj~Y@{b5eF7WL)Csg8JC(L}wBWyR;`_bW|jp7?8x@q9-TJ zR~75-Sz65Ko$6ntnUQ8Gksex&RKf0-E0#icvf7Ivf@T&bBgWvS7*o>sr0YC}$Rvz= zE)UIgZ5>O4|3h+9RI^o+iFI21@l^G|Q=NxL&*gRm?X;`nm%(lJHn8tETr_)G8!lB? zcN;TQJSL9o;-cbp(6OgM9Zzku=fAfq%2*uN5=~h3E4ErU#rD)RMi;+H2krjWL1>HV zzvV}B{AY&b((XpeGgq%(mEIktU#+NEs-LFBMJN9~Xn<&bt!{ds6uRz2?*et;jcb*X z3aHSt<7e49EE-XoZgRlv+TMJN>agjU5LDbt?fU!WV$&nfXa!IqIlOOrfrC}8Y4a>v z+7Ol6mN6Yk^u8VcA9ZgT73CMT4=V^tOLupNln4wZp`>&U0|-c|NTGQ|gR zaBfGyo{6Xlcx1J$V7%pfKXTvR0!BL`$NAab-M;8 z=0~XM57im#(RyZ+jCR|`Hh7>x)TtbN>V)w7yg zP5k_2?meh}i-L%p6MQr;2}aHOFmR$~FOwB1B9k5d_V|U`{-H?O*N%6u@<7#|EI&F2 zvoLu_n!Uu3UT#7rm0v%u8cjOD&>^rZUs(hX2wM2?@X)kQ>*E(tmHDAe>{)l)iEhJa z$+u(PJmK1M$Xr81gKJU?(%<{`LM0xw>;P_7d_mg$B}bFg5LKvhXnnG$N!Vtq^P!WJ zCz(Rf4*Z6i4E1SWnowkD@@i5S3pw}j(q-b|JG)IlQO$}?o{2xUWE9ofFUJ`ePyNOP zMqm{uIqVIOIa#lyDyTc2SppO0D*qc;GC$}mff>}GjT7|VWYWrx_siaob#D$5%KDIG z63dy=oX=}GJWq9`7oVN<7e@o{+1_Ro{5Z6#g+RO95Z^z=lCr_V=r8MwYYELFAo=K! zilUsYkh@<;W5uF$+I)he7JaE;B!FiwmHYkTdIo)UZ8Ot9DDr)U)a}f6G;iZt0*?$W zWE=m%x2MxT$D=9T{(=vopOUW4d%jjM8Qp9_iN) zb3~QxCG0t3(2dBU|Hf{{h&@zX=mMDbW^4C}(;h(k1f+KGfUGze}qW^6P>i z^o5m;OK*L$GX1ay`!U;lJ8Ft@#~w>|!)p9y_t?)^Eh9sNq!t%Ny)52(yPGYP!g%-5W*t;cZ6+=h54i0V4~+vs zuiB!tFVH;-&!gl-F9BaK_IqLLo~g_EORUU(W!7TL6bk|pGk_Q?Iw|SO4|GXe9Vhv= zHQDSUcBV`Eq9Q~yh(Xz%NBW!46HTTAeu_9pR)L%3mwBtNwG-gcFSOD|LzKB#G}k$_ z5El>{mgHBSo5R_ z-_U)=WqFK~6rS$SL++I1hC3xxylhVu%h<^(1UY-nN9x%7x8JwcFGtfMSGAct^DdPE zGM-f-`N70hw0dD1m+PxBwRGKC4|5Zril}dHT9IYFq@~Wzr;Q(l2vjo?lCeTFa2Z|$qCA) z%}c7vZUo6x6?F-kC_F%a6xvh{#f19B`h6mwg--eW#m8?jT8Cv!*2jrN^ab{E72BT+&Z5 zS9NJvTob2Ytf1WHNu1e!G#_E~#{o3e_ewjxF-xrzzh9hDptV(=y$2J0O+A-PNY)Jf zzJSm7bi&dHf=7UDy}%#yzA#n?%1_K%psL-;g5s~E^@~U)JW$N|9sZ9&UF=j`ax(_w z$RS5IrA_8Ob(17^cA~A?4=7pCgKq@h%fdH*RMo|ql$n{Fb#SPn?5CLo3KFFlI5wRO z^ts@w`1|tmW9a_aXvqd+AJG6~e|u!&GaC)-kJ5|%`u2I7mKK3`2i;3jD18zGxhV1X z4%|`wxvv~^Onq)Fl@kDc9e-(| z@8Qa#wpJd?7a^3BbQ+M)9P_e}*b^b5aUlVAHpxVLVZD!fjqapYOUC=f6bS4U89%=b zVtM_UKd@3!?M5y9p$aIpE*>qG?1NdvfB~5nm2q2@EF%A%TGI%l*f-Pk3107z&6@Rh zd?IQg(>n91wniXFoo5 zGUqbN`!R=di^%ZnhoCh2GeYv^)vW?^nEROaM!+4YGb|1x;7W}Uij`N6S_sL~P+|`o zuFB36WjQ?-S!RaLLIbAUESp`DBBy9m$WxVOpjic95`~~%z!E%H7KoFqNOfg=X#!WN zNEkz;Xec`(r8A^z7OjsV+6#r9!T*I43cRpGsBK700a@@wPS5g0nmwr)hbQE#4PR*~ zrhlYrzYC_dE)I%jf|AKVpCf}$fi#pkN4S$(`w!8)Q7ms9%ZjUOpp!OUd-lBD8?s{*S0ao9*-0-O7%Q70eG-7**t4ic~TiMm7h+FOqko@N@1^G z3%ymw|Mm=vJ{Kd8ze+A0${$(T`xf2k9XqOmNYdZXG39nL_fAvTmaK<&uLV8{>UWX?Cki!w`x2l0MqNSsBwievz zN96@_ZP)~$+YTA5`~e985(jjAuBto6Zsy{MOC58R+x9=W|)6@buh=$pH|d09vx^%>A=aX zwghd>xe992mYWWRDslcn7qHQjK}gL^T)j?O3N4H+d#E~9PTtO~Aj%P@P0U#ZPRLqC zI+^^Uhoq*Fo=B4(87O=-{_EWp^I1m#H=z3+$Fn>!hY!h`23mDRmV}(_W?UBKd6hFS z@t>gt(96>?4KU{!gjCz7>pUADL$gt=Ao%#xk=2~SPwX$L53z{tCQmHiTfK1oSVGFK zal0NAu_3t|RVm3hu>?zPL}~eV%?mAJ_YzTJR`6Hp{&Q+R#=+<~lN19V2@B~V zN#p};&wk*q1dh=CwnQse4|x%Z2<3}8^g=X^6catoTT$fTr*b4>LceC=P-S*3kS4?w zBdFkG`^7y`|E{aHk0_|z^0#UhB|lu*kRZ!aT2uX-65-!O8=?MT3H;Q2zwer0!);m+ zK7;WD)Y;z)A$Y%zRm?LnYY(em!fPC@?Y4J|KX#;8`RFV-r$2%Hi(km=9l7;2rltET zMkwV$v=1kh?-KXi-@*dA-YaxSWOtHOx>2P8eqHy){_N_XK+7VW+>zrem`UF4c;seH z;JYoM!E+f}_OdDHpxmUnZ08?+DH+Kg-M)?xY60zOqg4Fladvlr*Y(OJP#k%;YoN@I z!cWbQx>-4H9hmicGOI4Tqm+Zw@2k+Sj{JQ!qyLfeSy$%^ih|;A zT}20RUH$pT&y%holW(s>^&VF|ZN7w@T2!sBL3aAOmX&f5@l_;U?liwy-?Me=r){m3W}(M0*HOkwqn z<2zsa5{Yh1JFd+b8^0`SYAIK4_09)x*w%L_zbA#wi0PpJtJA+hP;M-;IHf>z785fh za(==iJldTG?(5OZpYpoIkuJ}4RF}&WD83mymq0Sdm45cCa-6%48#R z^K+hF{S~|3;!K@GAd3Cv!jU+xkLGR*4hist#XXla{? z67T%PptUcHnBsH{VNA3;0(F(K`KgmR`AM4A@3|O~vb;@XZxP!`iQ`L^JTI@y(_M1D zOup}ZmS=a+AblWS`HfOgFYX7P$o~i|c|dYnP*dM)`J!e=M)$*M9}VP^BmEnz+df)s z{n42^An0oUr^QUfU)kyD=~-G@YHfXDsXjkw2ct?(OEb6c;T{6)RFr~X@}DTPKP+ec z)rPx3cAa!}aZl_dSzVil^#7Y?^Z(I+{(ljA{{QEqFBBMQDJfqU{;y#5pK{f-&d+af zaFCd3Pc!pod~0h<>pu-F@E62w9UUE{%}0Tcr@$d#5fKrC0|NuX|EXPp$Zbhy92Xad zhH=~Sc=+^BGwfY^1WDLjHFHJ$A16s}<4~Bnw1!Mwg=VbUtV2O@c{%Bx!uj-e z*dN?yFzNf@CGS=#|F6zBt8G0Xu!SzKQkWgb=`zHg`x#VBW{NV2tT@eWfRxEef9U4m$E zd03irrEdQ3Y}K;qNdfr*rs<{>MP7kROJ8~!%5)e4+Gku?6HE^QPM=~v=Qzr^Y<%A4 z=ymA1xa)SJOiF4(P{r%qw`l2TR{O@0E z}5K>zL^_V?~!uhxg2qUm!pDe#gG7rL*H2{3If# zaeq7*G?#ca65R8gy)=WbPK>_&0@40mAUXnW7EtO11&J$@N`ZHp{#WyT zr>Q3h43>cHS}Dy3!hL=ll`Zu00BzYM8w`0%uSC3S6IX!e%|^A`e0y-ar2tA@y=N}$ z=$5>IGf7!y5k>0?3qj+E)6B!5$_?rVVNDNbWG2bR{4*N|7FEoX>hS+$=D$qq>=cpZ zj5^NP_Xq>WM}84n*_N!C8xL2EInFebWfMh$N#YqOXo8(I_xzY3Gk@9d)kyPEh+4GP z?-eUz?tX`qAVE^$#3uMwKty10cF1P7nKn?5Ao8D$4&mBz6EVjLQG<@^{WCkZ_H`OyR$sdJ>XNwyD=SS3J6O3=-HpL=c7MUt%|f! z<;?b=z@e1wM7-E0;Xo(KZRFvaCg}G`e$bi!{NLRF3<07YBN?G1)?fZJPPPNdL`u_X zJ((6n>&x^xckE*X^Z?vA`-4e)j#I912>wvfVP$i*M{W(i8nBxA_zoHkF{iiSm{K=z z`Yrpm)B0_bIFGzxYVez&U_acT;E7BETk*pGF;G!Xt{7mIk#xlBz2NyU?=P;slHqya zZWR*hmksVwIbR}05Aq>4`~XxOZjr_Uiw|O)KhYj`HOD~X4iwL4`dw6=a6l8Es^-!V z7m^6#bD%@a>r|AOwTf3DM7b^(?O8JfW8LcTXuf>q(f>>(KZhRD@1Km1*7lYUb`(3p z>xDK_wxWM|vVA+Z-QEiOxhFoct?M8fL?7sxt!oQ7!|< z7S8buiw4|5C?u{QFjn2M8m0S(Nv0psRY+YfXn-%EwYRz+^<*p2s*~-f)rIrZsN(!& z+#So#_9u9pG(T()-v1X=^4j~5Ktdft_Hwg_hKwY(A(|MqpGME;kqkW%2R7$BP_20& zZn=wfiODY$tNzFFRncJ6NI~c)3GJ0_ij3E&`&eoqQaC(l>&uF#`IX8^!H14$o{TIANsc|qGe*QRr8M(v5#DMY{e1|HR zjEPQibMAMNUPOkxzg&!(mb%|yydXSC@Qlm`cNGjZ!Fa}Z-h*#qSCd-qK4NsA1}Lwg zLY0~St*&e{b^GvaGcQy&^l9S$M7?~y>W(AWUU0VAq1Wb{u;=IfhH>H1_pqQ~fJpy0 z@y@`TFZbJCI$CbuA|2A;hj|{g&hkv#Un=>Ab}bT0kIJu6E2u`WM3z=7a< z%<`dDnUzd%`65g||?Gs${3pk>Fq~K-o%d*d2tCWj(R&=OPR5WRA z4yabfJ{-oMA^p71LO0w4FF~p^KO%JA_woKR;SknSqC`EAsCUs`n5i5T%CFkq{$Dvw z7La5;4M*?%rlt@H^$GNw*K7`DpftTEUVGk`q@KkEF$El%rtg!-vbK%wHwUx$^MOII272qWhIJ3!8W;_lB>gJR8*(b8Z*`}6@T z5X|j7vKEh0lLB-vVj8uGOz)fphUdK{dpYk4Cew3}megu?C(iB#hHc3-l74eA zrQ3W$+_AL_eiVy68~p4;2m#((b0Fwr5>^@J*i9Rr&(c*p?SuM?!Y2Atx)lG&0)@ar zZTE|=PR)d`W)BpSxK%K;eR7UC{hJcC{2hO~(^*wzXr-M}5j zp-tPCl&m|vS}P@tYlu|amlU3Mcd}gK6V}=gC|%43}3N$H%okohIm*g!RZ( zJ=d`^t;4!rIQeKw%jWyyIws1?0t40jbO!^bKamE`>ddHLU}+WY0{7;{Z(R!f(3@p1PP>&*hf^t?z~QFpt?-u7Fy zfqikwy3;MK;q2>AXp?>MfFo!lj&S@8k;JPsqIjk^>g?j;vM#%8Bh8nYn(9y$#LB_~ zSA#yKJ@QTDDl2tmU7O`=xS%g7Q-YHeOU> zcML%Z0U;qF=Oh}AbZ4u;(}U()2W)J>$?Ba8z;1w_FOezO#WPQe93)p{qf5#{eX3rM zNBKZ??}0$=>~&DL$wcL=)9yPJO@)$R@peXL711Tr8ETlYcpd4YA*EN&eBpLI+gou0 zQ{$2>jB@&wQ9t}b5!o`au-fRffG!NS_sD>#}0_s#NBsMPc*Y%56maSR7>#qrs*8+U6#RMfJ z#U+Gi_DANY*Z$}X`$_#TIWwTx796is@_4T5k1$LszM8!te-1bhtJ(YSA{m$_WLY`)}2 zdq+W|BSD4E`S=Bi$ZqdMN7`NX%05@6K9q32>?zQ!Shvc(Q_d6?D@x;#ww{_(bey4%wYA^pVOUkY<9`qy7HCvd z6k6I1JDfzXUR97G@9zA|E_4<&^A3bt&b-YW37*0P3_o&>q$Ee~o7rL$8Oky#M^jKz zQq$~_(}?m->==;kONdLlS^p9OEu?aTGzoLY;>^bg&BrteD}atP-zvsygbn(ms3Z)= z`QC&qN2hA3NFfX$_XeS$zjGzGg#~|ar0lnqIjCIu~iCQ@i7H$pJG3ZsevL^ z)*cw^PmkL1R_(JLtRu=Z@77o~sCwiLqG$Yvjh@W>Vh*oe*$?dlsm0&Wdm7X=DLzLy z-EN4qq;SJSgO?+hA?{kBgppThMfZH-#WQ&34B}irC(cZz^vKJ`dX}$4Rx1GGJBv>< zp$AY}SVvJ4v#^2BPt^>u1z$6l!_kxn*$t0|Tyz}O05T32>9^H8uqUD$1d3sm`>{9_ zT)$dcT5@tw17A|g=JDXH?6kJFCUP5gb#;|4eU8k3UpFh@dpY09C`B-DERj}i*Szmi zYd)6CO--H7$e6>_-ad(-83T$Ut7H&fo>VsHIJne5$#xBrcixCexLG(J^<0f0kV|)0 zBLm2hGd*d9B}=zuG^|$%Vm~C(A6V!3YW*mtJvay&o4;d8|(Me*C!j9Z+ z>lOp#PIA`tQ1l++b;pQ}&Di!Sno=+@eb>_zV%mvE*K+oU4|eEt*>DmZ6m-ydI@EAb zZ`*F{dSf>S%f6e__7S$5sr@=8-|eOP{_{fRr&E^hSD-W-Gy7!^5BSNihjIN5T3wBbUMop3wFPjny7?>EgNuV1sz^e8DW zEfd$)f2M9U?vUzHL>N5S`1Jk|(jn6gBEObbQyV^*Z&(z?Ak?_Mxe<0iiVBE3u3zhA zfw9-IB2zxD3vC1S+&WVOEMBKDrK}_FY`~wI% zo4V0kQ@VYZQ@-~=cm)>ibpY+%cQO{I&2(2gWTpG+1~;XM{q$OGohV5rx1{0ebffdE zW%mlBhR>SaeD(U7ngBTIlkZGIKa0-LKZy|tL}@0UL?EozJ;v(s3> zp#zn+bquXU+ey)H#KclrWfL(vzp*khnwy)an%{ALAJt(Bf0N!H$n$bi5-YQ8Lb-Bb z(2?g$bz2)f(}1oAr=pdWRqfP-E?CoR!DUeUvuBzb5*Z<~Fg^-@+!{4kh@{edIT^3d zCi@4NCj%-<+C%a^n&cfykhtJC3%7@(BZSOuk6l|kt{N^i1+OBK3td=PT!KFws-mVk zpsY4HI5aSr;(4lb#26ep8&mh(&bX%D%8!&NC^&df+t{||GDstZjVXLg*VFXSW2#}t z)AS!O^2WoKz8<5}!e-MvXJ{s4ki_{MtuAv)!B)6cW@vcF`W7t3XVp!sm>YPpg z{!8pez4~J>6HQmlh>G##*Lg6aJrMwjjdD2r*4JKTZbWttXB|Z7lll%$AIJJx&ulNo z3$8WuaMQ)Az5o>^5y24Cl9PboD%F8yNIEA-nxa_$Mf%wKDp*E(vIPse1r>oxRPGvV zj^NMr%z#8ilNS{+8vAiduyJrcjmPj$ozD?H0c141q!_!qyR$F|Dxq<~@w*nl2~saU zT+~qB7&#21Zc~-%~pm7Y_#?Rh&+g z$N=g$j>Sk!&X)w}e}AEZJKE1G=C>%H+;+%ON!SfT+gKN_hg@|4cgXuFDzfnv$TS!k z{sog$K1uY89>%CO9*cB8?H2z#)$1W`qvvVU&_Me+!K-B}7FtjDlQ3Ro(8bExYMHXc zL*D>l*^v14%vqf8Pw$AXkr)3eNtjO*RKSH3Cte-|xV&U7=c%kI1%`X7^TPe4?s z`pS>?5B)s%=~DF9>n(#4_nUQjk1MZk2Qsxq@7Ic6soiN1jzzVI8w-nFcakd5-W+#v z&mPpD;u`I=Jl?hxDD(nJz-9XptWic;iYg9?@)Ua$Y(3WLr&PZ_tDaK=HmTfQzqY>_bU`Tqbq6} z*GrH{pm~OZLU*w!M;({fQn{3?P6YH*uiOp|m6)iQxRbTxS-9FP%67Id zxE+27AmKz$w1>GS_)qf z5*H^Oo4z8)*NbZ2$7q?`-6p9Xck2b+CMiBE2`Q}Lbf1-pX;yHW`;MBV==7eZuS^N1 zYLEf|9$tY>i007?-BB!z=~x#m))%C>(6?1Ku9kLJdYQ+T*`#(R%r z{np!fF)XmwIjUcg(%;cr2pm_yWBqUvGM6=ht<~h|Ccf!mj2Uf_tEr$?2LG>1)rUq* zatoXRP)OVsDN6^1Xh*2ud8}0D&FyVfvy0AT*xR=Vr=3^{j(kNjv-()9o6t5k0GJIB zgF+i;w-=f``%6mwp}+(Rg=LN*lfx_)?lx-Xd~T`TkfS->dX^Dx?*;X#3510t=EoLy zsHk=`(`~6!ZMl`BsAy>4h$Y^`>d?fCo!vaFA&y5Q9ZPd^whq7OAf0NAtld_j&k>dz zn;W5^tM2U+Ddh1A;fnV2js6Pv-`h9nZ}MxW{rP`e3jU+idTEdi{Vl`BzC^|K_#yG) zjaRH8e6YL>kDY$z9as96f5dQ>*Yyss&oS1jMl4JvfY!_L=2({%^myB=@W^+*^?nTO zg#k(R!M?m%#XblGNgQ|k8%sp^5qlbZQ+uoul{}sL=96(_E8Uav;hDMTpw&h%Xi(fl zOHZrlgtz%O{h93vmVwt-z;ipyl;dEGC4nDrra(8NQEcQi7lWOo^*rv9$|BCfw~!ZX zG>O6O$$#qEQ^4;8(xd5D$g-kgdZM|_M(Xo1DU-+3k(%8eYUw}Own<&q%gt-msTG~v^ z${=hqLn9KPT!v=4#A*kN&Qs{(*j87%tPreIEbn{STTg`s1yXb?T)e?Syuo2y+Ef|| z0ZAV>yOW-+0eW#eH%PU!wZ|8qzgE@`UbRTcm+?GP2&?MP zKxiBMWP%+P74>t+0l(_Bku;+A4TXk%z`8tBhKBDepYv}$;^9%bYu=_m`ltFph=@L@ z-@Wd&La@)>D($LRN3|V~&yeUvcGd*5xU(A8j{pd&o|pGy1FB8 zLzHf0Uhm!|Jyc)CJlw9Z=J|5gQgCeK_l)^=t%bhpyG<+9u454t1pKKGhr~?*t^Gp1 zb9+$3+4?^gXkjljn7fWQL|vyPX?*ZT_QqYb*hf=9Er{PB1KYd{`(=AqPtp{|gtL>! zQpaATCTj!9_LQ~zPc9|oXhooS3Qr&uCtXZP{RH-~8Z1W2a*-^cYieryCFUhJKi~0M z>?OBoBgG`|=NAK$a5(?7{9kgMcq(HMH@9SoS(_4jroIXKii(PFw-@`Gnwqt5XW#PB z^o9OWMB3NP2PJ1z)mfB+lbr$r+P|G*UCw!54x9}DX~m+)g!Yt?_deiMUH641HqRqq zD{+s;p8MLL8+N!qyYB|!P!7Dw)x#3!vMCnC80)*bvaoV3vi)LddT0H(7UNeS8&H8& zay^YNzIW7dl?^XwcSH8f-5nv6Z6Sq1py||1>p^AQVbzEsB3_I%1GY+Tt{;BHmkjSo zbOcH(q_WPm+vTV!DVx^HGRAcnd#f?5n@|KOG2aL>#OIcXJU|j>!w#lp2&JO?4kLWEW0|9nWVW< zRnIO#^*mD!q3X=r?8eX?;@GgOOt5jLc`zJN+OJMMS?=w5=`dgK>}B>-fp``p z>DkA(qYDcQhM$|N^74XxKb6jRF>qZA%wm>^@Qt6HDcd5&O!lDU$Af7#bP%-8`h$9k z=S3f;xFtDU?Ayjl>#Du99t+;ACajGq(W3a3h`QJq?qyho6YuUJv`y;Ptmd&eLKQ$qH{4 zW)|b+EYNUG^|0;q6_Lt|y(z|dk$CZE{j9thWSobJG-A$$WP=ouNyAW;M1e5uz46w9 zIB!-wXDUhs#0DS{pu1C&TB^72u2cM>D04t8g$U|zp`NmoErOoQAOu$Q6{y;7m@7_O z+g1YQ(u5CZniT4DzWH`P3|07CWX5QEU+lXcw>C%Kzi~OJ|JH7tCj5DSf4izf*Pgkn z6m8>cZ>w(jxw@^BrR5OQ-G}sT@!~6>*L8IHMM>{mq|qIST#kf=-gpl35n?FSo1@b@D7NRWyA_#JViCfLR}5^M$aQLsQ6Y=ml6|LaNJHv z7~GvlDsN>OoXh$=SKfm)$g?ZhqszeCoDp@^yge>%we!|syYZ^}g&e2XE;dopchZ}` zmM;=)b{*SH$qyQk>S<7jX|mk8xK9Rpzc4aS@|>MzFhcRd+w1sGu{#-P*bl-7F$L-0 zwabAXuZO=<$A&TO^=qo#eOdwLoCW~Qa8M%lc2z<5qv*K>oKX0F4V;@J|gt9>U^nJPHHf`NvN9=(#0FEr*H!bu1c2VuoZ1N}X4mw|^ajoR+B){vC>yvU18u@qh3sy=h!_JOr_ zX1t2{8^x@T6Q~e3L-6glU$<9x8L~MIDk&}#I1hmkcC;dcYn+wwP9G^Ue6Qmm;*k3O z7fjd)s1DZZ>Z)xfRNwU~{ACjH@3Wr>VwSwzYKM8BS!&n$s;{T%lp+gt%YQ+x@e1d5 z$XfltH?I2^#@P!bM`9ZWc_!UK<~io5vW#(>uUJ*ne`cn&i^jnG{f%3$>JDyfz29+= zs0KwRIB^Bx|vIV4;~Iq2&u*fN*k9YZa(vZkpzy;eMHZVFf!KlgSgJarygJv zlS`2d{o?-67vyPbJvi)h@rvlViPv!_ukUrgVGRkd3iZ`d5^Lt&*cB<5;&G)v4o%jh z1WDGv*$YxL&W&Oj*U`G_uqCwdX{3V?Ml}f>cNDeb-8-FD@23en$o)3)xn2j~@90{a zb+(t&<}xlrCS-2_^PM2P!4p4vvdV`~1I%%vYt0IzjuB(P_8si>?t$xsXp6hIWtptqT-snGoo(7bOkGyfy#?i{{2GAJ1kkMwA54% zB{DJR6EhH<6h@udCCczP$j_ z+M<|}-Oshz_jM2Gtl4IfQ^d38Q3jnew!5*y!x=RJ1qOLY2wRfMKN(9PZ|C7&m# zQHdjk1VzOK#Q6mTgv142i;GJD9Y-nNc5Vc9Z3eS!23u{&TUp6lvIgY_1$EuZcinU; zjFu%H8fa>cX^wT~Ap_)t@~{Z1)$fjf*`yWH8GZcaV`v<-+li-ndwV&KP{<|LkI^rb3RPQ|*GRo(S(T>H_l#DDf zV3&x=u0Ih7O=rGWoV6NC2$K}Al_)|tGQ=4akLF@i;43)@jWW%x(bO%K(s%D8)b46* zI1suVU)FrHQ|5bb`|jZ+sYQ;QlSb!W?_~Pq<4qm=bqAr^7N9H0ylE z&wq0=n;q|I>n}14a1N!wKrP-e1L@LX7``pWBCsqbw_(S4WsPGLPS+rCbQtZ4wWqLY$^2_JNB~#mu)PZCP z35iZZ(mD-1FI#%V!TckH zPA48(;A>&=dsk}8+SbX=!t3{ya=f@5Cb4bA0CvP6Zp1K-+E6u1-fg%14J&$Z7rK0R za9$pZ73L1}Swiv!_?X>mx>g-LQ?pn+3{9zZ9dgzWq%*2@K`Q~vEWsK-MGNdc;i+{Qoi0KO)gMhg#(U$xD&tUg; zVk7(6N$#{7JHVE8Su*ZUkvY6-;ujnqg2zbP)u{ZS5@0S2l3M3pZ&* zwZm-Pr&aWWV}M+Y@rVzv{$cL$P6u%Hc>O9$#$D}&tY_p*WjOto$lyNEUOH=gGTcYu zFByG9(iGn7i|pP2);!@1aUYn4uH?G8i9JUmH~eL}-S@gw96qMvyPtcKuN%&fdM39+ z&Tnwa+t%N%sG}hMwB68S3IW^TrpD2HxaQmZXY{ht(u_B^m(*K3q9bF|W3$ugYKx$2 zr}K=2;@^-r`Pr^TVtg7v?cu-65(J?cH=gJNK# z@a1FpGJG^PlsIz*eSQ3B%gNTMzD#K0jrbhsFN44JSFmtuI=9cLirOPn_;VVaJHAvY zczRC*N%4x#$=icO+cD=hCg{|<%>u>zgNn^xO18NZiIGgRq>IBh$CvjjN*Y+uFNa8LL?{K>9Jt#k zSs^bv3ZW1EKSH4iAP|_k*qgvIzQ77DaK=n(BRe3=?tvcsJg6J^OpQM2dh+D)Oi4~! z%Z4`Ze7Ivfuk8JWZl=yT`93AZzHJ2c-T^H+`vU%=Lou|<&c?27<3_=g(%dLNf%nL*4uUsUQoqaPhB@*fv5ncsq&&gq?q$JNE<90)?EgiY3J$^X^ zQa%g2M&xeaknXXIPUZ<;=Hk^aOTa6y#>M69eTDeoPKyP7*Y92KSw1Rb48{u55x3Wp z8)hGyXl!a7A}FeETj?M}B}nv)ai@7?q`mIxw(-qx@Swm(EdoV7MgX!2K)0aU+3I8P zKqcTx?|YiI_zwZMJAR>#rH6RaVq$o@pM{l`9$Br0l|@QC7+_({Hk+U3Mr7XaSv}ru zf;6LI-N*tf$aAq2^_(?N4A;R|lBXEn=)IPD8Q4WFuZo+=E%i}yo9CGJUMi$e?Y|Km z^R}qIJ=$wytau(dbN~{Y{c7j%cw85``t5cn)BKxf)SwGh`n;=!<>K;om_0dpps2K2{^3BvGm@Iqr=;;jnExK=4IB|3?&Ru^Q6q{$~Jor@x=(}vU+fMNGck-=Nm-E#Kct^&IyIC4-zRNgGnD1 zM_Fw_p#x*46SnNlIuCw|RO_DWp8A06oxDb0N|QnPMgZjE=Cg-HSYIod?QO}#_*y&I zL0s%yJnSqToje@9WTXIgkA`yd)7EmK@EoF1y(3@at3_1p{2gOfa2L zj}vu2A|^@Gw3+p>n`4MT?p+jgKE^W2wR`x??&Q!*VTgo6`T1_7sVZ{K`* zZ1j4{y})sG(Sl1qcMWh(N)Dl}BnG8T6)w#lLH%+57zmB^l$@557LZAt;axA;ydA(r zOG`U_6le^)eY-{4y-qY>XPIcFrmR|+m_u5YmzJr}iirq};igIjCxZmR2N?;x)2t(l zQ-)0{S9j`xexMJY5_ZfaB(NF# zW&pj#efv++KhU(qANB?Urg7g>YtQs8xNEE}&rFhUx$2IFsiX;;Y53mGF8)L1p!lpW z=U>P;^ylNp+ZvmRF=Qo9Eyykl7s$KhCM@;tfir>oVV&~Q*KR&=S9g8)gYWHiU&dtu4GP zt=+sn`~cVN{+Uh(?SBY%7v!T;CFRW51gowo8V*Y(yKuZh`MCE+C5vM{R*=7n9j(+x zl>sI4+1g8WR3k)G{1nj+Q?W`hW}|AwyG9?I5^l+`=p1WV1P|$oqiqWGn55!+5EY9B zn-pWchlgj_Y|OrASl*&b{vt?Vko(uPf1Tzf1a)W*gv^|=i^RBcrzDPGTa2i%miY++fkkUtgGEZBSy&` z0L=Utn~xA!XMoukro{qUrKluv^4wKXYrx<8u%vXK{`+b(k_mOe^RP(~*|2cV!?bsB zVoW^A>K8J|TPCuy8vrD(ahhJaS0WN35}IC2mbtIVcvDk;CbRHKO7a77v5T`miol!Y z{-~$khh{)-`2wIki7O%RQXy1nRTxy9Eq2LqEV@h@Y;i#FW8zk5F0!qku za?y9erVAx9+0l{TKW4ux`O!Pm?CtDOZ;_Mv+`p=IYiu3f{b+dYM4GvLZ|r>^z+Is% zyU+68RR}WJ>@0^Ez>oW#lVjc<6cK>R4Q73V=d?f5R5L;G+PU0q5I9$JzTt9zvF5S$ z0rmN%v(v%MEd1l_1>i=gF*s>nHf(RCIn?tH2d~G#PcYyo(s0VqeRxq>-3H)k@K-7s z=c){i@vXlCshs;?pd<4E5o|IdN{vK;bv^9i<$Op8d=#EN`O=q~oII}6w%;?dGr;I? zf{(yDTX3L?vPx8>3LC$q0qnJw9m#h2UVKY7SH=SGht3tljRByew$TfWFd;WS)mGQ* zuLo}#aNLPLh?-VQjMwAs;&5^uV{dghmps>VjI^}O&p4zs+M=>`$KnBg#BcKc zu1ARHpYpBh3TW|&G$nmSrimmDde4Ro`9}?|RcGIETVLq>SKB2Lq zt&33)?dr!^hzRQ+wm7TvKK`wI-BZpRd@F{x2SR$n@*YiV zhFjYf9vISB(R^NP=C~cR`$)TI<@tiGbk)F_DQWVgp%cZm?XBv$NA+}&4fMd0S=o}w zL6Jp&5DqR59!>;}II_uhDkH#H0t+knux|6pfck7rf}AyWXz2y=d$!zs#KRrQNWIsD*Y zJC(y{$l96Hr6hE-E_AAtgl$2ZU*i9;^c6r+_utnKpy1LjAPq`)cXvxjH%lYk4I(97 zA|)jX(%rp)l!SD5NJ}@oAAbLr8D|(rhh_JEZ=8G1xuIz>vFP~q#IkI~$7@;Z`%DQg z>|Xw{{Uk(0;ELJMJAMI?rM2}gR7@4+X#DmcOdrkFPL*aQ+?^0!)_kpD6yVj#`!{=$ z!5W!av1>%N3dL?c&B3@=)i)AFQRcD>0?{9Q!z-uwl}D@T$diTW^EnPWB*|NI8QOwzH& zw2xII%>u%Pe1qNHHS~rpm^0HK3kx3}rvCNa_y(9l{yHXeM0mAPuE@mdsGTI0LC@Ww zsv{+1uU4ogT(yFzYUcI7z3W)8W30zaxJvB%;OVTrGhMmi29ZnQ+E<`}(Va7x9wf0X zNl1oOx!@Hi>8xigFYIr0cW3#N`d*Un^UW+e=iHGnEwMNkf_rd#JG-;3j*lQMq-M(% zG}`Q$HgcT^pHWYH?^ezS)b4soblq z+*7M0E^FILk0It|kBuN?sN-OJ>Pe3!%sDZ2NDA_;6t^Zl;!KSZm(!UX5M$zADK2{* z%cY{l(g;lFe)oa4@NtcJ%!&sA+~Rt9w0q{S+p*rXDIPQam}z$DJ^i?$;o{VXpKfH` zL~^NWogFJrf(7jeA#5%CVCF{r{v1WJ{$9m4?T1_ksuCZfk~WO6pwN)}b@Ip8EoQeD zA4B|C(t=o9IR4FUYj2-kr}&6o=S7CxA3Z*>LS-bWqT#dXw}9i3G{lxUV43P*$ywqf zL=G{FUq~?j2L9C8g>CXCPLlSkZ_c9;E^zcbq)fk=I}UrCHgJ?q0sWg=(%uptM`JZZG`+t0(?P;%FbF*lX9ox3V? zbfO|qrIo4X3LY5$S7K(O^@N@3u8i~xYQvSDv8`=I@o!qQf4eypzP)gBJKPg$aD41+ zjqNGeLlg;}SvsLCUD+c)$JKN{SQ!7~yz*g{-t%(swg;!DOO(lSVybODf&uY()ztT4 zW7x3yapdtj(4qPMf(Np9I6GY#xLqc^XxK{g#a*)daEDwBZU7f{_jBxhI1uz)cHTAw zhB~}&V7xbg^!erc|FDcn2 z8Ei&L*|W^e;NTjImwh}gLQ=73lF~mqwX={DEsaS0&!WBwKZ4N&-RgmbBW`1zaORiU z<}y88^ow1vrf8&;!GDm!)2qgp5zBWVr%1u$Q+Xi1kLpO-zLk%h?fS_h9bJKc{a3>E zJzJFFM!pBNc44imB7`!hK-gjgDhy$m&z2#citxFHyKG`a6`|H+jQK;z%dWO{(xW~{ zD#EX`gpVA8=Es);&vGG{nhyltxqP_2C!E@M{sD(v+&dYj1h*4^ugo7!qEPB=b?Vt> zT{siGU9G6h@d=^M-}}!dvml)9RATf=NgwiRC^+6qa=h$Yl$m@Fmmmmo@lo!Zpg@o$ zTt&rI?P{WdebH<+t6Y-~i6RGQ8zR3__7n&(_s=BDz|n7tp0KATUAM>-qz|D3xl)0T z9T$epp8K=SzRM4WzJeYH?q@r8wB}j&ovC+K{6ML?=L_r7aB^bUvK9Nrh32I15ey~O8u_IR)5l4EE7xLi$k0k0QDSp zg~#Qfqcr=1ei+Nm{YZ2)G~`V~2Cri?;bqe?4SGoft8RYOeFd>1nTJ^=(@=X_irc{ z!8eKll-Dc4SXt+>=5jiH2-W&!9H@k`gNRug*th+KAAOxgmUu^wBC+B&l>H)`liR7Y zB@R)-!V-8Aats3&DR31El*&TPa7OPEBGlNc`X}e-^<`Qcn?AfC`z99c^vr-;7?N6` z0CRt)q||9hL&*3|-G&+3_t}%GTv;{v{WLdZd{0PXdxl2$U9Hrpa(0$}!)2uzx;u43 zg=RPC8uH)uwqXjDG#6Z*edYs~O!7-#$Q;v#4UCjciwd$_o%$4NjFr7#-?E>tJNmo7 z&xJBL)l@U52})Ci>1uWszxUe2DkZI@C6?o2-ThlfpYhWAr77b(rS~-j_3hQCD}bo# zc`)anQ$47io>ZU=nTMI6V0z%G{5{%RXsr*XcW7TPTNA$F?P3-I+Vk<4%_l)qPr(9l z^H#boufxJ8!PG3%>46zp#yLHHsAZi7d#kk{Y)LKPWkejVtT9xPOlyIdLhFvqrDOq} zF)VLJ2&Zk(43jfye0)7goziSQShDnx%(mOa_NUjkz!npOO-0s7$!pZA6K3;R$>4i~ zc$yzF+fqtz489@C5m>(7q*yy+a=u60}-#5b` zNwL$%48vM>J+C$bzBSip57wfUTcvIjB+k-81=qwZqe6Z#Uds>SmT$^wr@f@JoSuEA zffr<+Kc~=PGxx4YC!j>+2ck=AL+OHmlr-F_aLv(~>DvrH>zjm;M6MdZ3&}Gm2KuDu zU~Ncfo7L{RJ$x@Nd;16|9srK`g^@AP-sHb!b?PmmKOZ6CvbVNupB; z{$eu<)*hW6(}T^QKP3i(v9i@J_gQ=%`xAHYKRaoX;O>bJ$P&>Eq3OtRZ{IsC$m_u1(H=>hSbt+;rZe-F zcgYWlNb4>k@5In_df5vQ^p@OC-;(sZjHGD&64@N9{z#?N%VGE3e;km-Wo(+t`@b zPI>E;>+3Ic6X+gQEv_wR+LjL6+SZD_H3aZYQ3b|!yspdc>Qj!aOOHY(m;c=Cs00eM zNBN!oksY~dmfPO|N>H1+&J#HiGQQ#L@P%V?XwS%GDN>>gUiGwW!QBK(jKB`3KT&8DoC5>Xu6ETHSb)c&PRu+5$xduOhh zV>38FL<>v%@CHU2kEBrJi3Ro8{xt+*WobpdqH?@pq9+iSbr%AeZ+Q-x*H5hId8G*b z zspY_e|A;V7Qc@2REEDD8;Ala8A#JhQzL#Z+?oeXM%~ft@h<6oMk1MpFpBRn@wA=e( zVDR;L3_{W~u8b&526ZJJduZqj2Rhy#9rXH{8yVILTno$T)-iA6qKBemmE)q7=(q(0*d6*w zlNsbvM>>a<6+b%2{&0PhpF?3$BJcg0iK?UxM+;<=--3F&INM(NcfJWg-)MI(C*pCE zlzm4vZ_fcZMeZ%?}~9CvxQebh{TGg;*4^Kf*8x%7B%FX%BLPXP3EKQn31 zj@iDxD{zs8PXC@iJ(svV)tLdxllvLM^5JqLjRY_}p(M^isv}Rs-@j(Tp9uSHrfq7f z#!ja7@4v^$WycY`3|Pl!uoK z@u|qoFd+WWS*Q9v@vn62JhMVNB;<_>-}tXJ9U7KRb=C%HO+YSfuAX_}n;BB8&m^B3 zdX>%cu{bJXjXv*qHk6XHM`aoxlVrbfHH>%(X!jPJdkycAB;|BGJ&m^?kbEx>mur1T zhBKS>H_b{cwU;|q4qI<84(Hpgj@mMtFYV^rf(ad(uBU*5m|Uvc^%$y9iC4tlTV8xt zH|EEw4M5eecim=*-6*~qnCU&69vw(v`y;z?Zs;8VYm5H%{MptCLd412u+4e&IC9n{ z*VO-*m1E-Y;vn^UZ6~;KoA`0h;#8ueqcO4Sk;89L^zM-;@9*5LV`u`@~Jf$uHNb$vw!Do+^lZ6+#x381r$Twl zTC2>WH!t03;(g5T-=yj3Ss7om_V&n|z%p(5m_QwYlGOz!#z5eEgivTv8B`x~=3rLsf zlWbv)fw5{&Utmwsua$2lKKeL9)$-aPs=* z$K2-DC`MLG@hWO9H}CZHt9`E5OodlKpr6wx$ly2byYxZsAq{mI6BIw-)v zto|QG1ZO`Lc3GWN2d)RhI5lGT_hgFKL6MWsM>(X;-}AmrQn`P0BP!Dk2|31iBk@(| z?(^3+ueS3S<@5n|8aFy`UuRzk&z>N3hlLm-I~8#&!#|v|zJaaEfNPhx?we@E4vm|y zcIF-1*JJ088V>5_qg2NFKex1AE$C7y6t30CT`zd-*>5CKdMj4Wx`Gv}VLPnrS5a;a z@X5HSH<1mKy+sMjx7zwen=jkzM@_a|XWy$2bl1gYKJ!~c`aY5Pn3x{!=Wb+w=d}M- zw9eNb?H}$4zI%w+4hrgIo-fIr2aJO@*fANK4DS5Mm9dcqZT+CC(0ru zOCuHU3;T8HNy3GrF*UWdV1lZ4Vtp+}@D|KyS-ae&-mlRigX-7bZ*7;bFJ{c*Hp}te zz`PmA@%xcr-u%z=Pxj{aI^!$sf-_@6>=z%G3YtXj{icK4cW)*l1G#QS9R-gbJL|@? zA;Ix%@7H0Cq}R>M_n44DGuUJlL!15sX+MBb;#&lah0*b#UwYw(%|~sZFnRL?LLh@W zRL;64i`iel!YipFnIlZ&qZVhnWMkiNyF+>O?%rIlVZ|A}?7NqZFguxW5PR5q|htaOuFC<|s@wd4?>A1QEYQ{}xb^MBGaW*>NGv zOJH-*z%EZ54WA+xZ;$lMR8kokay4xIJ-HSf!Y?7G(@$K64gF=M^*nt`8Ep0l9efVw zYS9qjVG^I_sP^mT%bM%1Y{%-CeCA03&vkED@CZG#=~S84GxxdYg12^ZgF4~>Wu+kM zj^Mvqsv`}_&VGkhP_@c{G7*EA2luSFn)3h-%wI`n-#`Cy%ZsS?VkkY8iD2emU&F|f z|1J9uATnW|UUs5fo1EsIQEyAH1#?rI|1FrCs$HkERulfH)2gI>0;elk$m$q9aE_YJ z>*f{9YP|%jnkds!v~Vw}9e;I$oJ2#l4}$HS`fQ>w2{HZW%#`J<39eRpNYHsl%KFX; zvmo`f0BuMB$3n^%g|}~C8CUnphWF|rtxNjL&1}dm|K3;uwYnY)d?1tnWc zOf2G5Auc{2Ym?v30oHD?pWM^qf>n-=D1%0F8&;@6V+<}d06n=~&dvncMkx6asLH}a zHVf}qQ_5{hK~MoAY{i2{zz=L7Z45lcj!+qv7y9kcw`ndUh#mBYXPB4=NQMKL>EXU8QEri3v$r=6w1HCl( zlF;aNJTmTpnqC3Jl>q&Wv%C0g3D=+R%ywUDbVM@rIo^I9rN4e@0g>7oh?+Fp(xap-{CI&^b>iUnn#6)P`*|p=CNCF!e6U- zIgUtAm^%3@CgZ#L=j&MF$idDqinlbhjgcK-Kz<68Eo^6uOck2n z?`J<|&^N`eik-7o_Jegnx`O4RD^fdMCH8F$mP$-*es9<|P54$p__mdP^(m#-Om}YO zpV0o*>ohQZxUt$6L3wW`i`*OQfu(eGz+}Y6AsQ%d`6END(AkHnk(3Y`Cj1qI zQ9;6_@=RRd-8yK7HgTUgV8tl#ljgpE#8R>N(cuPtrxv65v70v5AEF>O%c-bo^R^~~Y4x+; zwYzm|QiZM|-@CgGI=V3q1L)f8dV_g=RimB(2Q+q359x14T zqUSMhUysL2;n<272e0{83g}Rw@A!k_D`K8Q82fak`%q!o%{;G!&;uFKB>TG#Th6CG z`Ym`*XQo^8*8T75EhtEJo|j8_IrxqwOdcy@_{cnLd<)CVyX4m3)Gc}D)0ply#64{{ zUxx(QW6l~qI@sMk5E^YQ&zr&8`^!g{xa>c&_z`Q){d{to4vsqpGub@oqoykH6MD?g zC~LjAA$Dx4EG|HSaC(>PK#?U^h~wEv5Fx&x0n%{<1x1CjI1}U`kcv)|DxRX{FVQw5O_qG^ zY8l#HYF-Af{n>1lw|cDqB8q>VW3rvq4X*libk+6)?s6s5k53a%JLbAbZYVM!b4%3X zAfJ=VZP~-FgEo>>M069_wm{4r^zDO1CcDehbW;gX{{A>ViMZ{OX;|3nu06Id=sD;+ zi6e@MQAxeihC~z_CZzHepM8=Rvz(pVQ_Z-+aCk!hXB4KP)NWEC4D?#Zt9qOgn%7G5{SB`iWxj;t zI@5F4*c#NoKyhKJ|DlDl2LxFjtqm5MVoeQ|UcIEC8JZ`p$M+=TjT{G~)@%#4uU-c4 zEoMvF_oEF7ug>a$-~ZU)9L1kl8U|+@!0f}q(-nyVoG`xj*bnr)I(q7xRoM@xr|e2U z_Jn*IMnbto2}efOYuh}(!0;g5pRKaE)dY&zFQ9sb5j!q4m*)jmOlk{#U!Iyi4MbXp9aX4Um*;B!j0SeeY-{9@K#ABMnxrhIJ$nTH~dw8*sJ{TSC-*h zufnV_F;vKiNJY6sTz&%H(^qh+U3fy&-Q0NjDhtWKt5l7-p8Luw2WCpm^C4vO9#=;~ z8ZL5@5VwMz`V4xJ{dk?7&1?+)^%)Oz&j6Nb>=7l5cuGD5=w#qT)BPrEV8Y{hd7xqK z<1zVTP>I2d7lL|-37(83M+y0y5?$~6-EhBS_d4aEiQ|rDK5>~$?eXyC2}VV!lnPFC zbmV5RYy+jBkm7*Xx(6ZtyXx6KD?up3cR^Ipi&)PVvqpJ>DK>shrufYlX2!HpR?xUi zCmJq1$HLT1((F_sLejzNN$vlbF8Xj3zX%Q%h{u{(VKB~guHDj@qrMQXO$pH5eu2|5 z#+RxjBGd6-KRJE&pgcyd!!wc}l&UC%@Vy%ks%=Q4RMDArg1Zg z`tTpSIeN5T53urr{=at;(Q~cd_UoT_aYgyRp#a^(w~|P9`pK;SuckDX@6}DM`yS8! zpeE!xLjfd;)(sdjX}#U7RzSN zOeKrS=%y8%vfl%=xTd|zlAdgttc(yt*8}$uAK%-uyG*vxFW!4-m2z%0Sd4X@P8EqC zA^Oj~^-@_0X3i$|&&>Nf!U}rzUDr!P`#U8?#)HvZC0$QTce=WO%%~SLZWUG*5qMfVQ06Gga&glMutx)degY~VghAP3Zw zpAmxOwhi#$`KP?`*hp{(_KJ=Vbl7j72(Utrm{8?6M`5F{`aROn{^NdlxNM&$B-ohs zqf%o14|4kiBm>VC01F@V-HE-sWQ1OvjjL>@v89hD{gL=zqYO5czSmYQ32Znfy7Dsy z$J=g^yjl336jA=lkEl*vrq>31Lj2s^LIROLOE;o*v|cM+#h;I*WSg}3<%N)VRPcP7 zaQROCTLD5<*xWo%m7F~v<%0XNyE=~gv!}azp|~Cf%+dTsGgSz`!r*6R-FW5Dz4Q=- zq^fsvI-SC#XdcNb*OwIY*=u_4L~_3kUW&#%Gt>K*BTaCIC)wODU2<>V^Q;CnbpErk zo@y}=dZ7hMRG5H*)ssKmZis|+SK%&~(j-D#y>F%e@^*J!GTX=LG zWad5En-S&XT3`rxJ1a5W)by`n&CwUDHcZ;xwY0kW6l|zPV#4u`959fY8?Qc70kTx2 zvFwt^E$P>p^w(l(>-L&oFeo~T64*w+MNoMtGOfZkk&b&j&p2A}uqs)Yeh-b{wbP_C zKXjb@J?ri}oB6ljJ$m;H%Hu`=$sjdICI8CLCFJg9j)*15A>v~F&C11GrC!?1=>jp} zrS2P#(K07pmkKm$n3s$+Jj?%LRtP&R!2lQ1{Oq+n!}Y?ph-^?iSzjC%(oK%|i`geS zGj;SX)QJpwQJsAcW-%kN8+p@RbB{(^>-)woWhqKM-iUIb#OZ0m3XDyml7i^_jhC%ms4 z9#$y{X7t+pJ%UF4*HhJul84x0^rRY+Sdkbj%#A#BJ^-_f0oq0$hxthBgM~)3ZA?Gg z^?ZB%`h%rf-}yRHmcxZc;>)>cJNwxts}Tn-GzjB&PrMMN2XK`Y?WT@Ye?Iqxz!%zq z=)tBei~Zmke4!GY#$DzI5l>G?PtPN;J9--BsrH}tNpZ+k3tjy9^v9g+$E9n}1iY8edt`D^Szp&!YR4$HoW|uifMTK4eu@8$V%g% z8E?1U9*&Lm@7Xv!kfiqO-Ca0pAC5&@4DK?s|HFv*4T8AQml{vXnq)jjWJyg)iD)9% zhmaAMQf?B%Rw+m0Ok*&hN0*xzX~LfmEwQcfi&nzqred1k^QTo}or$FWp%{5C0B=+H z{Jq$(rS>XNun8})Nx$=4j%YZ9fNaiQtWnP4 zI~s=MbG9OXupOGIBTbnL_C8puwiw(3a=?M^I_z@8W{>{gZ2&;i(K}9Ur*x=8a%Uu? zU$QosI%h(nfpSGoe|3KvK=c#Yj1g`DDglV@^UHTzypP$Br-4gn`Mk?Ote=^Qf`Sqr zu0S?5&s$NS=Q>^1S~}IYSa2xfeG($^gz<1s8wGa702>_F&L$VisyiDhWRD~?$L5>4 zMc)hD5p)uM4gmq0^x9+{9;&i3A_$t)x8D?MkR66^pRK7KHjT^?BDcIN*0}LF)p69R zAsK|kX@uli#KiC?{}r+{G65k@FKd`Juw~hRn>^}Fx0SU9mv*KpnwrG!+0vpj-t1e6 zM%itKtpFDloL*Fp%5U)%Po{+jrYVt(CbV`w4sDLszrQcF>eJ0ndarbJ9y%=7`S^~O z|2Yh*%w2`Vj(#zEWOF}rX!7I7PPKg_Ii@@Egt;e>vmOx)G>U0ZDG7k%4Y7sY6!xJW znwz;6v5~m0zQU5f&E-e)KKdn}4OXI?h*utIE^nq-FzNhKEA)`wBaAk2!k~*giAmq? zrWwTGsd2JS89!-tf3H%V_ZkLd0yd|X=tVi25@W+a-su4U^$)WJ6~bu5T5tA z7OjW=z7uth3R{Q9b1h|Qou6M*QzsnsgDsE>CI=Xj*kaN})0EdZLL-mjs8OLZh>)(% zEvs$IDACfdqVvMs>>QjtLV`=_q~z)3wxn5fax;Hsb0w=Kladx&gGo`E1(Cy}mIuG9 z;LmfP_+6UH&sccV?3)G!!K8N!kfCA7HY^Lph{|DjFU3%g3wRp{^ZDPiE_1>v`BCWT zW?T+JhR)Gr(ux3=VX?kEul+7hfX36-$=b~{znq(Wl&Bppm&)cp%G(b$G&JN(n?y60 z7~?RkP1iz95EcEzTqt#{VcHq*q=X5x;dqtI_#q_dC_dFfy6EiZ1`J|i&zCH(6Fsz* z)=-0Z>~E1X9nGfKqE~%i1?|QA5Qg|WPBVp4q2#{?1ZbEgUbF6Vq%OjX{n=Kl?bys_ z&x4og=Jv~NuGw_8p5$B><1~k8? zQqo7j5PO01d5F$9eaLEngx}@+orQTNq0IZ-1=I`{4>(N$O>aWQjti|_fZr9!seR^q zqum|*)+0`VvMQHGXq~_X9i4G_s8FbsuWr8WKkPCOxN_-AIVJ0>S)}o2uRcAl`mKs7 ze)zKb(XA`U`o|w$cvn2wnf)b)*0lwYLdIQP?}N=yz~V?~)Fwb#SqI;W&&bvqaNBkr zV`5{B`BgT9BTN<<+Eh}oFMp8!NZ{n-tcJE>GZj+V^nNe?y33#()Ehs|rY-pw#ACPLs2g+8xkN(zV904o=O_1Vo=m8Oyv zbbe;nMn!xD)yg-2HLaAl7HFY|>dmOCv}F45%@lM<&A{%$|Dch>lCWa(?_YwGO+mw3 z*NPn77lgwbi3G~~eFxyOI645n`cGPldUDp@;%~eOd z@Uwk8!arM@SG}2JP!2 z^&PHf2X(Cfg-F8xnNsZw9YMNib+8&6LoP#F?@k6C<3kF?hn{RkoJq~;^wqaNde}%O ziYU)(8VE_iTtfEF3 zAP`#ySRimV7MX=sTN*L3eD^AztTM?+w%?o*P1W{pdId-yxbuh!<#{;^!>xjLiKc*S0<;9*6o5jz#S zTWC*MxGXYqR5pURV_eMlAXn=DGX1r~AeJa&_Qktl@m!jl_pm$g!E(I-jGdvH0r1&YZ(J zT&&WR@o+|=o&E9K2lQ2et0C7B;Q}81Kz`PTo9XuV$J?Th{21*QwdM3#J}j^BAmcw{ z|HdlAOx_P4$hEjKx3jmyH_q%-JTKdXn=kg48m%tN0E6dnw$|3ktKljtP@5#x`2cYG z@xnbWhr$u!^J9hL58rje#fJV&&^C)B#a_+AI4VA zrF$3=F-mD5Xy2aU3K~^!c3p02_pdFf9;YfFf0AF-_Z`$<6pYILu)omgza6_)?K`bp z(_Y_Pz|F;_)pqmqwNX)O8szw+;@;BB*v0FBiaFjw`on{Tq8f3?KT!Q(B>Q2}hfOT=F| zeBm#i3xg8R|D+y?kjTdsjQVMt!DC@50ME4Nev;Xg(leYFW&|lTr&$l@) zKeV+4tu02FnFR+2liprlp5d~l8_CZRJyZ`+p%-~j@8-N~j54-Mw8%yuLXG5_(i2&W zbb&bnclaXIqy`;2YpQ=AIOS&m)2IzA;9oERA86y*7AUCDC;QNv0L1k)Ap(>$AnWrZ zu&M~lUtw$qo4xo7(YsYF08qi7IP>ExF#A~7gpQD^+E;Sf%v*5uRxQ7)ZcEzEc6tL3_f)Vk<7}&!PdfdimCyalHz8hDgR$~in>RZjBUoxWkjb0Z~95Apz z-@qnYp((OvNyJ8o;MQYIp(hjKUWWc78b_|m%|y8qdkL%?3` zmMtP45KNQ_Y}ZIegie(J+SJN`&MmGQUje*bQveqL(1<#F;abpHM#mH8|nWW%NxL~F`?uU zsTqdh0c)j{OLcQvCY8-)ka=ezW*)yBNvi&5q;F6Ne)e?-5onM=vi%&VWPxWs8Zfe7j}y%jd@|fW0h<^`PpX%=O3#f859KJ>e=14Cr>>NBq~RxA z1jxGgEF6~1POdFnYe~Fca!GMI-q(`7 z20xO90`g3zzsZvI zi3kY^iHU8kGLfiK91UZMHk%DIrkk?DlDR_bSQ0`Ko+^DZ}0h1%+ssCvGHA)gJET|a4mJlp;%68V)F@Q3P!$5-6RoK%iKeliCE4z$DJ znsM7!oam(pcgR)bVP`djquGy4C_UmnEHR2OUp+rc5=^d4V4v}%*?VF)GjYzFcx?k) zGr~0d&1rd^`%PT*D*#u5UmMuZds@;m&70s~X^33z?e5O0eY=X%67+PKt@=?=uq`oQ zR5*I+bNM5M@8Y>cp_EmG$5d62&s>#T?T9vU=yS!I5!-lgn+t<>xs;K}x^7}IuMd37 zBJF+^LdQSx^6(?1B~;;mz;65*g+_^gBl1mjTwF>ZVdLdp6TJu@pO@}_%d&{>l z&y*Z=$=dQ#LRF~SvZ{bWJu4IK8qYSxXbS1h%8z(9rlpF5x!S?2W1ive=f`-HF|o10 zT$lG6+Kr5i%rX_zSM0jn=FhM?Yq`_tww|Yk)MxA9<)!01;8YbGi&-#czcW_qO_u!K z|D~FFMA5lZyo@9q-nFFGR)y#21q=@K7ZY0A{oDh9Fm*1W-B@EW0UfJLW0d~$&zm$V zXxQk}5gB!ePfE7YlO>$2vB8bvwTCZ6J3HXUX5XrxW>z$GjjJ<&#ha7q*6F;U6W(zm z*B1L16RHKQYyzo7sh+r98Z@SKt+#!$B5*hKr-L+FmlVzmyG9$K@ob2QD3@$b3s~q5 za0luNDz)(6sG7>jKgU!vwIVp3%kJ>PW?*X*HrB#^s3U$o`G=xDsayzU@! z6Dgn5hq?2@rpOiPn_&mVJ_KRicWwX84By~?u(9}}`G<_^Yh;?^C~vB^pXKi0aC;2y zxADcrp&;;|qjlt?=J29Ucv06STGBV8(iUp@~wS1G^h~=iqMSkWY|7EQNDd;?cZ6iptx-2bDqge912E zS5Vx^Nle&B9d8o=u!3U=^!~&SzhAx)*JrQhXbULc=E&}9h(?Jm8Z-VBACmcGo=&OD z%OO33Gzi8#ECn*GSa=VuOoclW4ajHy_$iS}9U~Iqq}{ z%VS0EUp0ZYd~$ptuh6eVtqdtf?PfZUPhhcSFj+b&_PH;9URGRvBaM@vLzVJH-FRbH zO921HU*+@K4Fl=nWGwttV=dL_T3z`OYHjW3ZYz*|u>Bprl6kI75eN*P!>`H-ojJdwLSsp3fjQyoeE}Uozus{8%HB`jhEzqS3M3(rddO{*9kOBb77- zs||&9n21UrM0@(9Lpo@y{jc4uQ;-_dx2|x|7>Xg<^jkHN-zQv)KBfQYS51y1V-Ae! zMbzN7CowG5a8Kv|K(P@^HTEGS^P0H-J!eT1rEZ`Qx%f3`L&HmQn6A^PVv{{JU&F|6 zM#HhW-B8ATRzvaIPLj)C(_N`&^-|p3osKBJRVxCJN$r@)BH zIDamlEgD<4``unRwh9n}~2hHnV z3VEn1Y$?%L7~_lViF@|T)Nc>p{KAR?@FPOl%?_ovJb}xCnfJv=d?t!Hx~D`$g3E4d z2oXBF$FLgYQxBA+|8_;=EBlM{FlP%vUe&A+ao4fGWz^qh5QlVx>RnowgmFB(i_^OROJC_G*z=| z+z8SA3MY6PDjc&0&i0}0447#K5lDnNMTwfvNKKnU5Iy8XLfysf63Per&9T$Ea~x#S z;<+YNH2V;(ki~d3O8qqZjopolg5P?5e&z|)aDQ{G6?iT^P2x`ba$d)kfHc9F@R>o3 z8K2CUrj0}XCsfTrM98#@m*QedQBdE1HnF)I)%wY-q~2hqp>NvQw2;Gq@{0YhJkH`D zSv2zU_%7?Ve`vS@ir$8tDm(It@UP_7gL~cN=~hJw#o}#WQ}td@Bz63_?cS*Nz-u_u z{;V!_e-q(EVeVVPHa%GPBGDcL%*7FI}3Y zOiU>~g}`^X(`=%P#j38j0l@?lj;c_@`W4~gou+?46=j@;g5GACR!^-mugG?y4B;Go z+D|t* zTq4C;s>y~Z?l+Il6Eivb51{2dxi+24o~%OUQr~bA$GGszqbLb!8$!>~zuM3ZBS92@LP{nu~XX+_L>}RYSfDKvZRvUXPek zaVA%(T3ke+yUdW7c^IJad`HU8Z3+0JDxkMx()0`083}vHU4gXH9J)`r!$nVUHz9ij-^Iih+K~kOQHD7R%J0}pHjk>@|T1I2@&72uDVpYun4B8IRpmv zi-xP9qUL3M41ub!)pCnIg_kl(S`i9}qEBYM6-^#0^Uy@oxDPCDM2t#RC*%7M=9 zMI)3wtI2ijNdKktxX!ZQ7gJQI8BP+$mg!QghVfqOPU*3a$ztg1dyVnAF@>g-Ah-U) z9p>yX*pynWGTi*V_RHiC?CX~d+XG=q`oOAT>0g;=D`VU?r3#%i=$g#5K-fxE9fVN9 zq?cJ9vpjpcfSR{)VS@4lphXQD{|ZrMk@Z6hR%5ONOu?7-5^!vKDHQ5=w1h1v?P|nT zKad&T2sCoaVQB1Q1zvSMCDX`|)|=hpKJ4U;#|>Ih@o6Wiw1J{*jwe%@+8>nW0f3e$ zxVs3z6{HfyIE}>H0=Eb6Ymcd28S`^4omz}91)aO|CeeA8!ryf6jm&`-1K9&22s4oT z&S|0G-)#P+er(cZReY^tsGkO(oNa+gI&vIQCAb(2+ zIo#O-eo#UdZi+vV?UXC|TfMWM_WFxWsJ&SomWArmJ;9`oOOb;tqsot9bC4f_YfLHE zj_&^p*A$_3it=LB%%|J!*JpHj+YCR_KcqWus=e3mC`5ZrNXAtu(riARrcNI-)>)9O z6sM~iq&wOgf}=T`eHdo6~+9}fc0e-L!4*`IevzuOcjJ4r28Ewkf__@EW>pFw&eRk9|G zyHlI=CiV5NO}C`*iCc>5NHRAXn$8c$;ci-S2Bw6<@AOGDUuIg6kgB|tu`J^&4Z{up zJ%IP0=J_6l9Kp`BPd-lNlGHWR`ZUF8Y%vH^^7mG_T_bcSBXg!C?C8-IuOg23QwzbF zP0hl_L*7Wv*0n-|@wAPxuR7F!O5Y_nPit}uF?^Pfjw@P5=hXlm5-?=-ObKj%fi<{( zO@7sZq8fRV1pB1S(^Ww(^&Q-OI<06CBai4$g8jvRxAw_*vp12o^(;{xFVRykfz3kn zqB2hSxEn`~VEAnNq>>rFTM&o(2nMM~0OfW4bmHLF7KD8wl0Q+9w+_{+@qf792Jp%w zvC7z2MZjjfWamFq&igzqSi{P2?{JI{>O30KV2s>J)5U)E$UDheZz84UYc=z_PPd?~ z$s>vsyI`=&BztjN5I}&vE{)t*p%9#l0zrB|!N;(jP?oKb+VM)FAV{YiIm-r_Mm$T_ zng8(RbRuQ8=qFE`k8#J0DMfuc47CF}%vjTuqqRPCxw-PWabry;3<>g9oDozT8O}|X zxP5yj`K9Wo)O$bu)G1qI3o|Y4l_i7x)Fh5;`cidmTqecnzQMnyJG{?teAlllE#*3( z8fW2_H1gL59-61LDBnBF))^l`kTi5o&G;3w&K4+rNVYU5!SUuvoA0}s7Q!@|xna0* z!qcDBHFNZF$D=k>Cp(x4Z%~eQJ*G=ZL(A@3$;aU`Cpoc)fL}?wFCN9QkD0lW>3Y10ch>kw|KTRBuHEEWe!nIhT z$dgx{4XErpzis2Oy9uOTYQ2-3bmk8^&-_rNL4h(RV9tWWhC0E+HTLVX6NBAgDUaLN zteP?19IG3;>}j>+h_5aT$ZzQ1s2h(xPr3TAw&Bhho35y=*~ejy>m2d+yL$KQDa!4t zk0KLo4f6>RivmiE9$FX-@;{+(84xBZ>Uk-;I;=khsbL|F+n$>fqeHqnG&F@V zepv&{D9GTrNlE&2Fkuw>g6Q)~DQxAj;UaM*cFq_* zaA{bYrIyYm7g#z3>F!>dr9n_yq!d`XJC&}b7Lb-&x&#Ci5S0)`z(kM`y$8R)d;hxr z!N)&#&z|$1dFP#ZX6AVcr%`P##j_76m3cqVo$E@kJy5H{SLVu{DGRk`3?Gd#6dm&0 zJ@BC4+BcC-)!?guh?qN>kQRsQAq0ao_&Rm$_<7Cxo(o}bH*SevWJzlYr_m18{!#HG za5FQYcrk8ql&AaHY_US1BUA@6A)p>aS?!cTKIhl)IR~X5o_#(NUnQgdDgH?ZFB6+V zJm-Q2__!MELZnt#;*QoUxi4Nws#;<&-xW%&RCt3Lx>M5PzFZoeoq{n0P75Q->v?0O z*R$+?2#a@=t0Zu>ZJq?br7 zbw;(wsMfHZT4XpLFgxWK)x01J$~p}$({(Ltz6*?IW^;Sw^BHcx&{OiyZ=pBrWp;8$ z_1+PU(SPrdv!s`|d{9E_9z%I3n47>N-j)F;^h>{Ikx$#>#&EVn^{KfDXo%l$Nb^V$ zPmK(*QpcC*+ag_{-bWuqf9X{k_PEg&$ z@meV^(~Cq>)#$DE3^^O6a#~ue2WU%UysDU*gu3du-wn3=8kXwrI?pZWr}s!9_;0@f z&5S(vc>&zwts+wbB&zv$#M^a)E+z){GoXXkL-P1Wjc+KHCF=h7F6277v-jbH!^V0w zEGvMlzpK^*cm%b-aVdi0R0ABtcH)QsUVjx}^r(9d6mt$ni8(Y9;3DK=R9V+8C~knK z$zPCkTLtV>SJXa9xTd9ak#f_0*Ji%3gRrd;>i*?(5gnPoVwinXSxMTyX(2B!{5nO2 zuRa${P`}!ELtF+Zar(ivObT*-E&@2%q`g9^AKd=z%Z~**|KH~UJkO6A53a|*}`K%JE3lACsfpT&+@h(0}p z(*(!3yimXnKK2MTkuXg&G*DQ!VuWOU5T(hriCWA4loMVi^yDp#t9qSD)-&c5K7BdD z0whQ6(_QqYK!q(H7jjmw^MTQtd4cGv47Xkjq2wfIUZs3n1wV(g6u#lZtm;zU2N_vr z^5m&dg8;}|H5ff!DJGLZ-0DTZyJ7cOz4rsNc=J`J($jQphe$t>k&#cUHo8U8@@vv; z$rHOcb>vqEN%M#b%86w0<|b^fS@BiI?5sGok*i(3gmk5RXth>}v#eI?-2iOImsk`{ z>QxJl98vi);o}tP!wQHy`fYnME0)(=;PDdOyCohr#-(5`$>&fRn7RYa5rJrZYkv(% zqN)0ClYNO|o!BCuwMjj11(Sj+WV`M6LF){3T3+{4_L7c6oz=DKM}IEwM$bq|gAr9| z{mZJ%GL&wgxsORo?!nNXe%|s*xBhW2k5=aQxu%L|0hV>)(7W+wxa`mS9l>O>v>io0T9}^SzXE45W zQ5BH^cVx!kr9P6!H~#R78@gtw>qZDtxBuY}vBhsiPkjfHu4&ruMY)$8(dWoW5@WNL zj#jH;8=;O9NQDgBg3o!OAjTQ-x-nXdi)z4&)q{hU@SK6n3Y z7my*perWV5f#n*Y)Z?u-vHkVQIRrwATdilEo3{kf+M~}e760Va zk9ORIv}g{^mtSvYMb*vImXz_u_gs1n`Dq2W6Pdyb0XZ?z7Nc$7wMKbg0m*w4hTh9% zWK8$ja}ae2a-oxtOS5ImFU-nBV$wW)o(7^V6CICec;2sCNKCxP(0481$sd!m+Ksea zRyir?6bZUKEcO+ig27dPijzHwbf)gs3pj<-95tE)jqC>g7v83R?ILr9;q;|GM#V;U z+i2AqPuOsOMVyHiQ;9x{`yiS9zK)c!lxMC`hrD|~U^FRHRtEK*OoV5;7F;GGS!vrA z!diy=KhiS@R`K_2A7#%r1a!V1ZzOk8YcTJGZB^Z+_O6Afs^*MCM3(cjnF`YMNX9YD zW}w3DK=If}mk(mOFJi=w9Sotza=~IEeFwS1>M35%F!iwQ=4Vyd!Ik;lu z5R@-n6Jn*7sg@8%NwxfaJ*7rpP(YHBM>$tG)T$5FFrg73bYdFht&nA9vcM;I3m-`@ z!MNk&Z%re$>OL!{;7%%^w|X6HL+p^>ICnX>AO{w&Bk{|BNh3pi+tnnmh1HUR3n|F$ zV3Rqq&gJ+NZ;9JoGy{cu9Xx-o3waZ!<&nxPHz>*!Z5?7Z)O0*Ss$lTenI#02^8z&f z89j%Xj7^!g#&>e#Ven+M>{~6cLzPHt6Js-sK-$G54e-{q$>sXlS5BJb5cfkgbDRcg zwOON{N(t@zcFfI)gfW&MXp_PGHURIa+`8>Bq@rAkH26KfdnDv9m`50(>XcRVPh}ja zEIU}{#}d>m7Xn2TYs>ScCV(aD#&`jBaP@#c-x8Gp==7awpA=t>kml+cz;95go#L$c z?tD`AeIg0B|BWaA&c#aEhAp42zCZin37^YPfEJ&-M=YCvJZW>>L`s9Yuqv+mn@ljp z!>TjmJ8d2hUpsj`e=0RW=&Lrd{ln?kSgki!^c~<2yc1sh@1Jx7(t30 zlAld7@^X+W6= zET_JBU{hK8bgi+>OgcLiohNlGSXKLHUXOlIpo_t{$p@MvaZ~s9b#uW%zD4`yN+Ue5 zQSls9#1@~7x1h$S#L;1Cw8%`X#8bCPVb?+% zNX(sTT+OU&<+*rzYs_CXkN!|A)>QktYx={+SV?cf3hmCMg%gS&GPxSBc8BOwTZTo@ zI1DI|Y-%C9T@)OgaR=ee;fF%E4&8_ykXBkpNmFEi^X8ArhYhqZU8rVMGU(F`DweQ<%cAFhKicR}q;Ta-A z$XSn4zXlyD)u*3^wTiT^iw&`C64aoGY6S57-JuAenDwfhT>a5f>P_0;pd~ZL9{Ekx zsztdn)1gw(ivdf=o-pn#2{33txT~V2s|63{ZkXVkj{qh(Y~pJ2{teyq4bM2H7Rbb| zb<#di-@>af62TKq+Tt{BcyZ&63FdHCh>OS8q)=i$sW_nm9Aj5O7lqjZ)!v6(ZhgWj zY(CtJzMmd8>p4IqQLWxR3X!~52j>7Mxcntc zr0r6NrZDx|4mUBJt1;^D^J6aI*-3R5^Qs!ccBjm*SRahe96CF%Xr_4V+7hSV%@M6pU#9Sc`@37v~oZMP?~`ezSE%cqvPI zPEsP~sl$RXe~}K4UYO2j=k$>=5uE`OMNuGp;OuFAmoz`-x6VZ?P8a0P0{fXEZn_w$ zDu1-z!jLwwAy86U;1LL3Uh?5ma6=-@70mg(%EiKO6Svl@a^uCs8(O@096l6mV-p}u z%e%>_*Gsx~?Dg^GhdhH%z zRKxypk4fZ0PGxdvvjL*bUw{dD$uF)^@wGEh(wp=`I`cFBMYs)BGz(JIq|Ia&o?{7I_g#;dm+n(t?Cq;((Krsn zzn@ap6CfKNzpfZP9EBZ;{9V`WI#~ufGeE6xvoNVD$3Zobo`@$)Q)B1_%&)wMh7z*S z%*w}$y1PcS-ZOtZE( z+@M2xTv~3JrmW7C+IU|=6mGh(>?*0w9jShA3yP8zuZclGnzi`wMz`vpq^%@;!m_GV z;p)>3RWm?iwthAD$_&;=14?58cYC~{l8yn|ZlA`4KfjDmekb(Tjo4^I;}Ovv+}~NU z83p%B+ym0iNPUj535hba9vVa?Nn&8~i;!p{ho~v-YazV?)o*J)uoELg8_M z$m2rSR<1&N3YVh^O~+DW5EmXjriYG7?UWZgB2{l{Snc$!`Ue%Q$Uhxfc44Os4x-7z z0yt(X=@}phIW|(1x?Gfj3k)*UKAP<=Bs^HoAI-ADX;+kDxPz&~w6b-isSs{{q+l+i zz`F-9FH`0x2b%v_1@t1x$3$*=wAN(DzSu?jA@1tkki+uF{^(nb`T|VRIAF)nS2+Sk zr++Yt3Gs=lVTgwHHhpJ(5}U^C^o~{ zIXq8$RL(4#rg5*|=^?waaok$ZCWogYyCWT)9QnnFDfZH6#0AiZN`tp*2k%B zWqwQB22#AoW+Qt0GC^0MC`EEKpiAvL1ISlh!$Y+I$+WFP4HuK*n~tmc(J_-UKuw-T z{MZvj4*>ihvub=?n_XNh&E=SU=u!6o4Y{pvmxidZLABwItJ*+AFOuunC9!ELuHnA( z#N;9SE0G#emB%qk=i6}#sWESc&lCHboPZb+(BcC#5QQ?`(?Ap8za9o)+Jo2p?`y@> zQ}59}dP?~DWTH&Sfi1TotE^(yCgqi51m2wZqHU|G!h`P3x5#~PsKs&Kz`fN8olVs6+S6^lyb zf;NC+%|0hu{sK6do;d#A%Xy&Dya^tQ`Ei&+U5#l6R5$|KsT(okBvZDrXI+{#NzAb+ z(T&PK^{Y!-WkwoMF>CLL3kI_KD|psQzn=&cJ>Px&O9UVe_`V9{8_gmg)k zaaj$%Al}=bl>g)>;bj=R?*Xq1oE#cn2s%O1$v2e66?M(tjZoBFImSh-xEXC{luxH~&%B zLAyAwCIEeO8rpKkXCpwCi%$G54zH6tF@;lCs@)MSeATEO`ANX35ccBxF~R6J-WXkr z*`62Aw#8{o%5s=q))IZsF4E8Hk&(0Xd@G`>@)Ybg3jO{)Q1HeygmLiH-U=p#CCjVX z4|&EuEj!Ll7D`t0Du_JRiw@-NC=}zEn$_1HwKQq5qUKZeHomBLrmYwkS2Uo}p4g{m zs9r4)D-%>}U(G}{+INvE%o-#K-&%Iw9}x%EC0U@}^1Fj4h)P|$gTv}0@>I5$TewfG z_?`X-n)YYL9KeD!b&s2ft0a8GY*oxJ^3O%JzuG|b(wW6)Sqhx>GVDk-lX0`|68gj) zM|*P*IN7d#>0G>>O6h^$3`j;%rfsg>1EzF>DezYoe5ee5H7NmJRMBz>()`DW)QjaO zg}Nn31uq>3#Rc+nv1!#KL2x+^{Y|zfsL>R_)lsaSHz1ljG!0_g@Zzt?Yly{9mPyH_L29t5 zn%Qr*yK2i7H(^UkW*UUjNE63eEgEd;g{tHN>(nGltOyofpcv>Y>D!x6E4@s`NTqQ7 z_Oq9Lb=IM=eFiNliIt2xMCcfQXLcRLHP^KQRnrryTe*oM8{j!}fCo~)0U3o>Y(%Z#`&2f z_Hxy5>h31{XMYyX9%odZHy{D)5^w}ezEVpro8{-x77Wm$sU+vpC!qDGo2ugGt4!|b z;yw@&%o!ov;5YAEs!w9J&@|YZBZ54smy7ABBNC=4xTmwuf|vT;TP`>8+U_$~R2l)5 zx=Fz|477(YUE{8ym7R;+(yO5}>BxpEmk0L1_Q14LOH5^26m&DoXGctV%e1U2X7Al83KO-Y_~YU*mTTz%fb5kh&Ze8irV(yy50npt^MgFl@vA zPTvn(_hk6{)U;uJZ{Ml7Ia;pRL45pR0~}^1Xa4Q+k9-DtlP3RW&U#h5s>nU-FY;~0N|c&Qm9Zw)9^B_Iovp(uNi(kDU5q+;Y{pH?%WIIGfVycEr~Hol ziiTAqO=vb*hT9mAtPc7ktMUDWfOav^_(}SK1(3>G=!Ejlf4a~u;u{xVXyk7fj!8}1 z1A~c3Q$k2d6V%*m5pneDkriCXdn9Q@iY(vKXrUb(XV32sN&bR%a-79bMON%0AKcTt zrV*bfqPha+g9`_8>FJw7C)6f{WD;bef@qMy6w*gkg!Q8cK}0~?QrqRiR7$ivews_A z(~YvySQ`WpO=dGpR$Q(Q2!*$sr7;{iXf>GQfS+q9wUET(Wrgu-&x0}Jf~E<~1RAWS zVm{M!r8+71)pBA3FK0Py!78kV>Dk%YO9TI&dfT2_VVu}ae@UlV|GjE(&B@5i^YdQ) z*c=ScJLawBuj=Ev*#L_ zv6BQ=(pmh1om@!3_T^|9ENIkyX~a>?F*>&EGd%-Y{PKtrI5%~CnWjMc3(3XtYb$7RIDfhT5#l6~d6<~OCH0MC-|n;%n(*Dt8fF0-aCzX% zp^hfmu-4l)&Zu;!_6X&}_HfqnrrgSq-pwZ-mdY#5+^kjU!qpO284e`N+00vP62Oiu zwQa?(u587lmc(AdPsVHu)}|~n*pvB&Y}7(0z}Vg%PUwr6?R`6Emt1{1bqvW|^D6C! zGE%ccn$^`@AoA4KS@6DT@n4OZt*}zlJ}>Yxk0;xKQa#~AzaJI5D54cFmZQDQf5ant zAtX=&joqgUG8<<7uJ@h5vVOc{uU2gtX1El?_dXf)C?!jm#>HETi-sOxhw*M6O^I1x z0f%l-A0b(EAVOB(F_$Muda5~NKILcUq~au0P4|+K%9)BkNSH0&RLoBzCMLhtb6z1P zLSH^GZEvl3KFE2WUHCHpO&c(ZFF*u=SRMiM1K5#Z5%ObzmG0vks8RmIQh^BPi_0zv zN`@YyWT?nX$tI0_%7XW0HoQrQo5v~xadGSWC|SLKnsFAtSu5nQ&yPEkDD*h8p`6bl zVI+3YQYZSVMkDZ$t96u==L~S#?&{j=$>=WecCZjUT1y-u2$HyLMT4Qnitta}+7n~GG+Nfc-jK^ zi$tG?$t3vIEJGw~M3C!KXoNF8{)*F5fHTVH*R3<}nh3%~QY|4j3(zQRMh@odJMq{mm~(dHGvO@%r{r>whq^KO4i2;m}8TCU2F@ z+X0b~V)Kx2LZYPwIn(SU;^OuA*%b`u0XnOtne*5O^!_8sXNlBbtd_uun!NRZ{JKg- zbNEm>rpEu253VBI#G#fDkPt0R-u&-Lq~sWx!QE-j1}Yj@9TQqssEQ3IIT5|Om)b-J zG~tL-=~q70O?I96nMVt$gLIY4H6?pU%0GA4YKhNA+5%6I9<_!H%bJzWV_@r)Ok}iT zaRxjrVKM&*=T9=VVc?vV^V&20-|MnLCIhjI1ozpvCXU!lGz1)axGLC881+E=;?DBAiT4Gab30pnd$PUNJj%K6nk{CH3RyqN? z!HJ(9F@AU=_$KhLc!cvBQPGzJ3kX7U82v>Su#lT)e6FF6EnqVs1vXI244_vHIFPkB zx-kCX$K+odJH?wxl<*Wm$k?oUoX57Y{>@O8H+b&&r&~_kTl(rdj++ZBzw%V6)rYHi z{Z447m&B%g@L@`ZZLj(McX{SATr&5YUuZ|W0>MdUQv47OJ5dpZOu~M}t*mr$3v%?- z#1fG2P4j!AZ&8YR;zs*@57`z7f5V7936>mbqvIwNSz?D#d+Kkjgneg-h$Na>U;q z(V4(k_eXwxc~TZsRCZ#p82lU=XsgSh`<|G9gp7%xzzvkvP6IiirsznPS(k9mrg%oc z1DDZN#(uDD zKaC^H54%u@wYnpIkQ9|NY=6SJ!2PlKhKwF>75M8sj6;Fr1u7Y*IM)10<}mQqJeHFr zmeY}7OB7J*%3Lz`5SsK$i+~V&;19>_`_q>yL*j@=$8eetD7fsWM_i4FoGo7MWK0zA zlaz-9gnjP|`~J}}(y5%`&mW%qVp2pEmiEIqwsWUs4xHEAz=e~naqgDzB75`%gfb%_ ze}lo_s07-YAg?&j5XXlsu9+Kr@qUA2Wb+tZH_K*Fg5;vkux+5b~$cy8*YdhK3 z>b~gSdRI}>sxJ`NBHsNVg8cZ-p98WAD7Dz5gv#tk%GbN|x74VCi;n9P-#5;|Xo5+} zS%TKd9|}$GOpdK3zFz;m0qOnXwpIRw@hs$0*hBY~ifXI0yI4SEcKMx%EeS*1XJ_|G0cl4Y5H3A%X`Ve;GTdf-rgk|+eTS768&1N}5B8 zIDM*utr!dnyx>Q!f7jK%v{!8*?@$lzA)I-8s{|Tf0W%AucxE&-?%1mQYgeC=Stj+r z)t-qN5Yk-zsc>nDT|z(Vwh4a3Dg##d<5h{>_URd_g$H=q zB)gzTEW*H-`0_Z2cI~InbI52tKbYJ+I+sUrtIGEWkL~;9ItLTxb8bEz8y2`tsSoaE zou^tjbsb;$q@c6ouZ-V$dS|}F5#Q3Gt-uKX=3~9y{yo6rGW!R!yLRtf6n$FjO0*Nh zHunpAH2z!tElBT94oXD4QbGyWW9{GV2iR@@(FdOegJg};hY{7b#mSb=a-G3LRzW=EHuWnH*OTJm7Aj!cSSn_{g zT2|Z#f9P-Jol$G4YtoCD8Awpaj}5)brIdT0Nl-Hn9vfQ>m3+;AV;R)4gkO5da^az! z!{R2xU#}MG1oU#&>E^%fO#{||wSp0QwS1NSMa7|{ngesPsJ+i zXBbH?j=e#NEx-oH0^_tAt7Bow6UL;N|qe&tvCkjR-s?blgjUUH=kS$fTtZ%&<7 zq3?Yb?@}l_4v(MFuU|W!vp$!)S3g|NE2mZPS;~^)(*43un1t6bb9@(&8nr7ewQ~*% z0>}^|?%aupU}KPo+b zD;@a%*;TJD0}paNn^&;+-7ouE5x#JjW->2_U+pW3JQvf8gBRQ z0fa}twzqMP6tk7DH{ZTZ$bJ0eiKD$e93Or3}LK{&WlCeSBkb(KOrkJqr7yf}isPA^=D zzs?Mjw`yTTx%xg(x9I4i11(rb0qVT&{!HBeS<1bZD}}-o+^Pm)Bs9Itt)r+TVzYzW zem)rWfGzp*XC|WyK?SGo_;zQqJ60n+u-`(X?FiB?fz_OiNYQdUYT>?k6Z2 zV-WB$*%SvdwDUdJCpbV2{K0=dqW@X8YKU0aNl}?ZFMWla9zosZq!-l_U zb$@MW^Rf@s_oP`JyQ&?FPI-A5d_)`5Jet$AqQKL z^4*62d*W$sC=8IB^ida?(3ov}hTXPe@1=JVZpv}q%&79wt6ryZp(=`j7Kd=XNW*YK z>$GsMm<48H+JLE2K%ayL{K3}IIsEpO$GW9+xe?LvSLow!ZG1FaMpH+jgQ5jWsBh9O z$CBC%3QBI@Hg%9<0qz^y$WHRX=WA2h)Dmw3oultR{Lhm;uxUVr^hfCwmAE*S^$54Y zd-r2Zr7Tq?VPoABT5sC;*Ap|tGyE)bR;;|7bxb8Id-93(o(*e&UmgMb_bIO^vVaA% zZ-9-Y1%K$u#$(w7PdXMZzRTno3fm1Q8OD7X^je8gA7!-owf)u6$^l1HMuPWF zWRdiL=MVov6?DEiW0iOOfIczV^65Uh>agzfbVswbS(J!uh~9ipv&*^Q`~9a6Mu&11 zX+N7eWl$-)C-aiuwqVqJ6JWR~yDFEkk<^0WJHz48G?;*#h=iAPaClHg|n>CJugiZciz0rx43=7Ca*muyZH zvX$+Q3(A|Bnro~CZhWO%n^l6c45d_!{}DAaj3)|}r>{0wV*5f^xm4&9W!+xzKJ{Yo zuC?rZcvJ1ICp!-kju!D~CCabOcnO-uq~<6$Lze;&&Y9!Qa5>cx-!x4HQ7n)YJG*32Se-Yi|gvfzUyHBIf6Pw1FGv*)Sv>OusqRd8TNn+_M$+tWOd1K?y0Yh z?Nl+iZXBB-uYcY;yHOVOG_-jz&hPLE(c&57$3+l>d5Zpf7C#)rH&~ z+go&G`S9VD6(JtM$)6-SKX+qZ(^DbVUZ_KBNugtK*i<1@lSVH}>wTAFn#9UfNaFu%O*Ld*UD5o(Gx5_a3e%u!R>Lm1Nw(Y^zW7=Gs)|ZVcU%|1!PP00jNjSN&z~gJph*^r^k>|>!{9JRr4TWUPob!>2 z+~>^}_iXs90D|^>(LD2uDsuTBukV&dos)36j)tzA3(u{25GAac46D6!*_myxuvdJ1 z^lFU!ICu7u=I`#z(E}>9NF!G}hi(UJ;(w9d-K2PZM8ImlbKR*Lt`^|~vs{B=PRr91 z;`GkYQ+wK!I``MD^$q>@!kmO2ldyE*<+FEmnTH$w6btq#}Ea-vh+hw zE1stKwy0Nz18WU-U8^-r$jsSwGF#XA!7N%_nKO(~os+q=xTQ;=V545@r5%9v6+f8c)Zo2JC> zD)Zrif7e^*rBA1CI7i-+&mDHZ?ku=5H-hgPHZ`ce=z*s9i3=ym1y34gl1us-u$I%g zIYr%~^%Od5Ox(1ByQJQR*+rIePk04=lwSEwaCjwSbbeH#Kp$zv8D7rc(KpCD*GM+p z_Zkjgl4hO+*f@KdK7|{4k#@kE`akzru4G%Vfr;Mrlh*lSDh`NVNWT_$l*25F(gfI# zec*8Fe-%If{rZdlIwjOV((sK`K;Zo5zi@h-);$~i;at`FIYs}+56GWPD$~#FaF+Qc|3)7wo zbmMlQ6pC;dY`yi?OsA;ICqG=BntqyLlYGNRu%zLzs!sn^+^8@4C-mLhzg`VIFfp79 zwm;k0&rcTzaxw;@2ETe`uU}V=11;Rcl~;054+^e-eoVIm0wUu?b{wC7Ho+RTvYW>v zzaZh5jrtT%b3yEj{9d8F5cT^??=Uc3x>KJ(&M7{hvi(GF-DU4<6ca?ROEg=~)P+`_ zvba=WSzIVvtbX?b^X&EVorFPFFrTnqpVb|mlp3aQ{5C749oXnryA@u;xRhj}GJ{-c ze4&>Xc?HcnXueOrr{OB9XY7$H%LZp`5(kAIi8ONw(E(hY_HDNy!B@wOyv048rUGThh{xqbG4huQ?iv+VN*B!hj-&{I(u1Fji1~F%6^Y6Zh%`aY-W44qaTK7Ig zBWcc-nT5?7#`g!OeeY8LwF=i%}s8XrxZc?tkgq_yPt3I*A&#Z%oMnlOzZ1B`G!L zjAfGLuRjeD_byYbsY_pJ4`b@5i%8mkS=|`+b9Wa^NWWlG5;DNS-N)QM9cd%}7X5-GPRHPh znoZcp9}|OvZve8UV2MVnl`*Sc`V7K|J5Lr#6WphE3B{5|b{mR6z54Vt*I*$p-4AGP&E?F~aH&Q%V*<$f1p=kn-sT@-8=!vopw6|#YRF`3V{^M<-I^4b2ZJjLr>lwct%>8-q=9| zY}Y#Pgq`!Dcb~nFrCVC7jzn}jV5$E*EMf_D5!BNuE(3RY%Cm9?T)8ZO$@o(*@_4Y= zu-IoyaxaH1z|KKh(h_$U8?HNc#*qI)v$TO)0F`g`O=@pXXvftm>8>Uz&W zn9Kol1jD1T&8bo0a&~H!Wwzt1yo^L2I;}eo6V{ro2gAu@L-J38w-j8<)zq-)Zy0=! zKx5ZM+fGARqp`= zV%oNPD1Fw_Msy-6XH%VQl2|NVDqX~Mb%yACjvv&)aJ6klSL!ceO2?b6L{CDYkz(;sc}t^7RF$d zfNgwV^U#(1#hzZu7IPrf9{+b9qocD-UKI3*M|~~fTzR1`!Vky8fMKx zmIt3$u8IEqLp5N)T!Gq*IPQ{W>kc;t?o)>7>UA$^W$b<8xzSqnX+cl0;c+_4l;WZy zr@Q?vawT7&PZ+wJ%j|pXY^Gc^zeR>Dk7wrfg;JlOz28NF;?N&bHTjS`+F2*mLlJmJ zljBXIQk-sU3I!n~Oc8JfqUPIZ_aK%#9beO>ClqF1ZVU*QsN|sv)?*Xf?`6(Ffa7yL zPW*rH3g`x2fnK=`x&J&`*7d%FxD}{RtaVo5bgP79Dt8iTGHg*(hyV9Sy4Ju(qqfM2H~O7;*|*akQ@0jyz{nrpgY~ReQLO1q9f9Y zRFO9Be3w2m7okb~tKb}c$cYG_=SdoMts_ zuxXBlX;miA4TihR*J}w&rC%3Q;`DsW1g-CXzY}$L3eLN{G1Jn1<_|KmR~$0 zZhhy+qJRz2AEbLHbQZ!q=3H*tZ7b*2N%SAo`yRMqbGq6!AEtyDomyKzDNX3ZFCH=p zr#vJDSzAYWRGh{cSucafPS%|?Y`e!CMQs^COY3 zfguFnwK=Pcv|@&bOA`in7(jbFjKhb-)ti4B`jwlHDd!@pCCJm1u1hTLBOOQ-B^r@^ zN(RbDJstP|>Ov?fQ3Bvp2Q61Z0ebRg0?;1vu0>^vLp*nZ!E#swwr6%ts79E)lS;H{ z=bc5z*VE3nvy--OvdrHwTAgp{P)n0J#V|S}tM&U>f6U#V&Hrsa{vILZ&{w;HTC~vB zLY3N(pkAobiij@-*`3F~!<9N-rrm8gea1GF%l(`41%sW)VDPe7v$5V$^)4)JY#%c+ zw#nHeGu?XH(KI;kqui-5-AWnMH1>P80V9FUiMNFD`<}iPI5D`@^LaMp>||}z;ja-w zKkp=7ZP3w@?jTEG4jj>j7HUGLLBVaYrUx?l`0K4&^Jk5_}TJ-F(0Mb2E{ zi#=@CD^J6_Ud(H!VH?fUyC)2+XG6vf2J$IOyp46j(`!=Ql|IRsIr4m#HIEsQ;Zlc~ zDS}boDXmIpRCIa+7hXtPu8cO@+|Mi?{!|!!0XWneSeP!8mddWVQ zmgVNv!-YDpk^=XQtQxIBqNZua**=$A3-48e_P2Q@RWHn>OqWYLHuF{snz=>M2{pw( z^eOsbbJVI&cQTGN2OTptT(foPHuH3Njg5@Hz8n5KPk(D*fcWZ4TU)!Hpa0`W&+OEb z19x7A)S8vXH-k!Ua<^_x1On)4P|)5+#4jUbV@!B(aBqL$LqEUI-<&y`0FXFe589eE zRs0@VY*5qDr^uT|{$IWs3jpP3yH`VK^f!3eWLab-qSazUSY5MkgL-ztrOUSE6$|3S z$%6wmUgr4J_kn#b?U390O-S>W=R=+uCRBxDT&ox-hgZw*Y~sG~LTWua^NlSTb=>aXzaJDttKYD;v$OO4`}d6vn{!`s9$Mr2oDJW8#B@0;$Gd_1V#P`CBF;8C zS8}fh2h&ea!(gOGDUObJ@7?|E`_;az+?77gMu6_exfpNxTxCuqWnyepd-DcZ_digG z50Qq#Jti4AQCtjh_?<}N)n#iUcy4*S{7zTNF_a!jv@M5l)z{4djG}rOZkSuR%jC!) z5P$bwz@W;>c51tZL~cwlR)-AUa(#Ur7l)tp%6obS6nq59PEAeKc`w0`T32Cm0dxf| z&t6|8haJBiG{K(zl9BNMGxR-Mf4jN4@n%R)dCW(qP%z=kgu2XQqgpeQw=Rul0{PC9 zkcR)~g(>3jY_;Koj)MNdU+{I$7b8G`5zLESD$3+^3A1v~%hulsoS z*ERLlLomN=2OWj-c}=A##-3q2nr)7mm)fkFEZbhW+axqBpu_q{+Es`vEj{ax@wL4e zH4YC*$J^Q*i9f;Nk3L^r5o>EFK5AiS8=b+V$bqRr)?;W7`sXR?o7j5^P@gX5|Dk3C z_w})9)U7uDVk6}d4#a}%DZbr)sZ~V_9y`cE$9q2AbCM ze+#Xg1u5?N|EmVp{(q{0IRCd)NT~83d`-}f^B+hV%gKPFyZ&bXlEwVLlI?8o0Qd|< zkCJ6mjM_~y`qcl{SLWz6ylG9skXBGf+xSAPBFs?)-bbFmYo~pR*22t z&RjIiq#|R1x9t^a^lMJaa(LY(n8;yH6MPy#_1!v~(u6v|vA|kl?tghj+`EjgRj67s zL0CI;3ho{H0x#iA{HF{)c!E2b@$9erYbtp9TdSS2^xrbpjG%m9YkghXuoq3t9_?^! za}@?7tuG>Pmo8W}t@U-!cGwF68$!bfW=c&&)TU|F+M=WJ=feMc=56sBh=F4kqaYn= z14qQp#((FznSV%MD!9O?zFlJrPEHboMrRS7&C)GR{DGh)q3>MXJEPKL-F&fQeL zZmVYr1%JNmRMB9a@|I$@&p8(>k73s13U7wbbpDXi5O1m^5wJ-+$g1oEnig8qy{M_{6R)BAx-WL^ZTl_mls@GOeY zAO6I69Q9Myst}2~=~GbR*3?@yRo3I&tq~x-OsX8QN}`cjXdzK2FhNn-^5w>K27=UC z)u)IF1e18&|EzxNMkFe%oG~`Bv5@^St;nK>>@}fpGg*;Zr%y<#w=aa(IERQL{iQ9EG#)WyK+a;*y8q>kc=vaJyvUyh z!N?kWFE&t>k$g8zy8Y3$i)vQ{=PpI>&f>oRLCX1zXJsd zoTDM1AJO`+J$g6-0Vf01OO?HHN_~~K3w?p}Lua^3;j*E_tM*yt3=Q`2fcMU}5CT!Z zZ~WxUJ(i-#=|^%S)88_A`cPbiJd={n^!gSOh49`IPLfDkE&5W7p7DRD#Z1Q*I3f64 zwQ~bF5>M-Qp@;*q{)A}NsB`UB3`etCQLj6;c6MI^Mp4{O{|Q3jtLBlWB9y-i2K>eO zR5r4u*;bDAm{gzl>?&&Y5qSfJJ56GFCA$vfaArSnI@u60;T6;#K{{D*<5a%T_4d3q z1?{yp6zM}&QU8azw~UIiZ{LM)MFpg!8zhGAZUm$UkQf-6p=0P~1f&H71Y~Fskgg$y z4(V>`ZfR*z!F}D&^I!YR-fO*I-u14RwdM;+>uNSoBPadfces9x#Z$TRN4|flTM10l{j)gSm zWvF}_pZ$B;o1Zb{ubl@c2!!6^-zA2+D>2?0>7`+JrX{>KJGpNE&jk7W%U5S|--T8X z>>rj#e>Vs$UOsw(-|N5pljF(b^7n3q?|fb=6ioR^Fynq!{=9y6ImmS#a}+Hl6U7>O ze_kL}R}JC4-EcCN#?FP?4le{Xq@6>V&UyID!1`qWR!__N=Cnwgr(|24rCHg$Gb z?^p=&yZ-@zJXPt=5&22@Cww3gU+CXwaFHdU3d4gTv4ZL?kE3QTrT!`gOZ{VIV9R88(9X zH*Qcq?+reCiW=HT0|E&;<{Al2KW~g^f58T+)VJgOk9**HoP^rN0ALW?XJ=m-1T~U7 z7fF9bkOaNHbKh~FxcsL+_@8;)m!xXWo0p9@kMMgfU`{8>I%~ZNKjMKrkJg`5iX$~0xtEg{Zn6Krfinu;*wr+pRPanm?nDu=)Wy;5eDF$_lWk)+v7>uWAb+{?*Oxy z1zs(iG5Db}9o*mG%q&0huIh;GDMMJ)RL_4u!Up&V0u_oKY>B664^#4vl#$(-KE^FK z_8Fl&psHe1)Fye-7C{%^d-+VTM|qgp_M zfO`8@!1IZ(=^#_kxPDHZ+J9Uz_y0A+_|F*fMepPP<}_HL(0`c!({7b}f%ESF1TXzR zq$~elz1fC4b|&aQ9s>YA4Jlv)`w-SF4S}7WNB=RN7rk*nC34hq<~Jajb63mzTVO^= z`aj2lwWaSy6Q#P48hn>(Rk(a|^B-sT@;&vlY0@WMlIwSxEU;`%Ox3{ud3NL`oznm0 zW$xww8^ZPfldJIm#`)kN`HoLT(oa(U4KrAlQ(wVkFJXCv{I*Apeeh~6bR1q)1dO7p z_(j5t9Nbk+ayuE!bCR?}eou&ztYe{VX{o>RF-UZ7)!?AdhlYPCpsd)7EJW?W3} z_1mo23EhfZpRIm6V;AiL{AOXWv&=QSUB-m-yB8mcbGTXODz(K*C=YeJTgp?o;ww!P z`nu3+&46~F)@}cg?SO`DL!_M%{6GxmCOvVxd?HemX!uZ!1txL3SjLtvk(GNc?l}9=08!^K`lS`F_L-A7-i{J z`h>k**INR`KX+%aewl-sk$#`LjahVbWVY-`u=21#uh}j~p`;ru#=uZN?@+@_eGqQzKYR>TuW=qBlylD~ZVfY$l!GD5 z2jpYp(Im%0VYKMh!rR8tO{DOWNB`T6%o$SQ4FgI%-P zcgt!rg3J5Qi#i^CN{qS_WM4cW)j0aPUZmW774a}%n|5yYkjblI?{d9H>#-SJttqZ$ z_uR+kcoSsnUQ&&#?vksS_?oTG5lCZSiy_%qcc4RyZWyVzD87cu;LCt%LQ6lIXgR({;jNJ=x9cx+v_~NJd#GO9mkLu*Hp4t zkyfjCTmy&}v^O7xUxzvQj%BG~)o@{q5$P!Mc*xOMw6#k1$1;;B#nS1dCG2x%prYMD z_5<6yN-DX+B7>t^XUSuFtP$*`6aSo3F`vnsmUd&TAABPOxC7T=#hd1l0RGksu#Sa3 zOAsy>I$W-EGHA+qp#G+6W$|5zTxZss2GpPMMpN&m>PQ_i;T?v-66OR&TTMbjfAu%_-2O=Rh7$(o|~Jqi@Y8cbfP|LMf@%=FTc$R zBr|#@E-5bE9{hLh@NoEM{Iq{=u5M!d6RwC)fcu(`b@j4u0LBR3OK;J@!WEXVu78r) z>pxi+5oyh4Nk8DH>Fij)owH#~hK z+yd$1fuNPt>u3p5CVc9+!ikC^iS~RxD>o9i#5gQfwVH&@9^6p1Bpa-@O$|}6wk;w; zCKV$q_U3zndp|}I_R;|1yXWlcxh=u~?phkg?Nn=%kgjc5%?CHM5?euvERZczR^AH* z3Q^WCmmQ>?nE8qk+4$SJy1M8=tEyHKUNg$8ONmK!AKEZGF6dW%RDSCl+^JW}qFaha z&mvybBW{~xD=VwXIZ3mGG+phR9sy*8bCgS?uG9M(YligFMrLEt$4^w!9J~qtSZq91 zSU#ZkA^2q@9{6OLGGqMfwQ|@dMf7`PXe|~(#1^4o&7)ucR@K8axFOSq0T{B>XZy?_ zTrFHgVld;X_d%7gkM^vKcW{qR94e*zl9a2W{4E!$x6KnYdJe*a3p8Fl0TKt6mi8be zoCc$=A_)t!>+i{x{uXAWks3!Zthl&{0f9?YDS>FFoL;0M*F6r`Ixt(BK)qP^e)DA}=Zd+ZDhqLgQz|FuOR)gufami*nyuTj>Z}}d zx@?;2idw3Fmwwj8#*W+X;0;6`A>{a$cXeitAmx=K_B`2y9Ky4;%aPa^mxNvgCwCat zct?i^KJy+gUb2C^aS;|vfua;Q0R?>ctYLoq*q&hrZc?-#ipr)YNWOv1u$HoIBue+R zy3^>qU0Auw!>Aq2vDxxgO{w+EZ(iw7xycuPlWj?soXA@elce7A=RkS#&)-{-0k_9^gi!)pS)_t z>@L!N!RKYUOL8FFL2J;2&~h1_z0$G;#~h@xicE>5-FXQ-_0phh4x&Jy8g(mT0$aNnBnEKBcqLw3>_?u=Vw5=xc*fZ(j(nTh`R4ix< z6L)1&-$8}DDL$>>ydQ1pBjcap*D+ZmP*9b5?$&^@c@FhQz!^YKy# z-J%WzF=hsg`>oZ3nc-B)c+Ry&3A`unQ}nT`(X!S|e|}*SyfE`c_o9}=RODuSypTTx?VEp zggpA%K8&UkD%Y0) zj<~El-kSJ|chZP_$CP`azQdc}toKY|s%*|iwE=g=HCkW2mJ7FFCehkp?yX;%W4+;I zkA)X#c76>1)Hi-T`CEL2uaVk6>jJcY!eG+}TJDeIS!UKO4!6SfLf=w$*p2%H4jf!t zD8z(3`o3_ojP;RE(tgCG8+q8$gU3|xQyii9qsZU&!<$!bJzuvkU$E>EejLjtxo0PM z%GJ&u!_mAAHyY;>E0W;)hI89G+T_4x^Rlz^@D0@P@!~g? zZ*eClv@YrZuzr$j;Py2zPv`WOEBRLThF_aZQB^`#a(!*h%-EQ~oTveReQ9-BT3mX} zT2Q`@y}XtL=@`R3e;ZzeLN^bUw|9C}n^gY}OSEhr`5CW~^%qZ0N=8G`GQuQJn@zY} z*iau1@uUu|vafoIVU^IEg*;Y^83>ImB)AVnqOA!u_xu7!POy`BRdPz6ZDM|!tPPn- z$Bml7Bq+*$c-tFXw`@o36n^VV$pb4ocyeNllNa9g8wu`SS~UavSoQyttTj!? z!2E)X>?a4#d-JCq(av~+qkeSY%Nm?O6^VRrlY~0AUZMmW zuZdN~#rJjvS-p2#pm_Zy(IVk~%~~j^RI3lE(ybI0G~#k5vZB%4SsGauz6*Kv{I#Pw zHS&JSTFQUSOMoK2?ew$l(|rxk_L2%xX0nTEO+_t^s#D+PuuW^JAii|y{dqLMHJwkp zykDBY0^AQ`HMI6U%<2%6w&y4?myYcEECDG>ZIn0Hy!)= zV0dZB2zEhl1&N*G0Oz&~zR}wA=l<+Te3sbFtwbUd-7=vxTDv!F`El`Iy5yYx!CoeR zhKY5(Dd*f|ZUd{95Gx~y{e_|q!oS$!iVcSe5T0y&K5%Y$2JZeeg%sF>5$`cG2~;2o zFq4P;ghWD5VPnwhv~urYjqfh+@9`X(c;Z9~ry@V_L5UGg*Ef!{i)=^2J-M3wGv{AO zaS2iwq>jt>2z}}osZO!wAm&BYO+E03;gRJ%6opf;6cnRqDZU%!>$M*GS`@Rgrk_^0| z6ya({Xko@9?2#1oYo(G|(5OUR(TYY>_yM41x4D$y{99_5ky~i3!dq4DO>C}4^p13#h;u28xgh@!j-QLhLn)olgLJjns zS7eY|Ml)A@ZlQ+w>e4xPB`mOI_Y^t-f#XyCr8ho=3vdK4VgK4=^KYh+k`il z9wv;?{r0j@rmIvfaJG5-`9nkDgX8RSxsitCyKp?^ZJf$Z9{lQgf_CHTr_o5ynf;#R z$E-E;F4RG-EJD6N=>@B*T%28O1t{k|C0DB)(yx`aH!SEgfsurxuiN7*iB(M=^LO5~ zbTlR=CRq_#Ir0OaEisRdoCe!k8*vEgXsFfZ>90Nex^KpBjDD8g|K{XOmzVPlOt`<8 z@pvl;7o+)99(Nx$qSs<=ST(8R5uqfY%l!$Y>K%47=@EdcvQ(5CB$BXG~wO&X+bV(7d-x2>Gjuc(lb_@86Tw&HtqzmGtn^dcj0}Y1a*pAhKDXj^W8_0 zUee=P2Zuca^`ddZCt>z1xl2674Lk*`tRO%@Olp!#e-<)+l=5TPA0mbFLi&?{fB+UJ z$qG9btR<{);_^|Fw+pxFqaUc8Y8Gjmj4U4h4yB=0DY&1rH>aQl#EAR5gS=4&lv&Re zxG6gK6zL|-;{%IZgS}IUdZnaeP^d^v}#`~ zsT&HI6a_O;#h#s<$aVAZ@H~1r`}2oJz{kt0o-&A-o)Dr7EEz1dB0WAib#ZphZzxFC zC2jS&w@_VMU2^e_Dg1T%u=^nQ#fTU(t0SzQgr|79Vj-3;_0Dw2=#8skT#+{URm*2# zkgg8==HuwqCQBr#{c%K<^9b#eZ1)aZ>?A8AXSsSJe}3Ihmo^~dBu^W3q}ppv(@%9a z!sb&}>9!KAuiQ_6iWjEa>gwYzYip=~ObJkj57*{XM}~2BhwZ?^LQu78FC#d%yKAqFOHd=F+%8qfq9nFqzQRGlD>}G1mqEUj4I(MTSrp^EpBgrSt!g>g3$J|{aVKA#hO;NcvJ|it&r~c4i z0MkD=h`muNXq=+z|B$y#tu?THZXeE0L?ldykNN(#hC-vCY3PWavnR#zwuy4##d)kSRLx)o4#>PO-+4$eV`NLahK&_ zoX@3LFa;Me;6lbH;GeA`Y@HCTg@l2 z>z9c8M~M9qi=SU{B3pKkZ0$`WodnJ=AgiP{#G3jg9L=?lOC5)E=y6d(*;OSHrJ-q~ zv5QHcxY-XvKaHywwoD~u>6xjK7Qzix_j>j8?Xjk5{~~lCGivC70?-_lyoUYU6RwCN zwytE{d7JT_04*`U9805y5i`m810U(*Zub{76Fstgwqq>_ua@@k9nhHEGaZ|RX)Mhq z+)l5F?peovSV(0p$g`+~B&&BieE}c$SPmt5eXDfpQeGeE2phan9}_hLd0ak z!x@AkM|;v@;_wfdR4C--=@6?!R}qSERpttVsg?GO#x;tsEg~5N7~u|`vu8I^$x|xc z%TeCG?Q^CB_U|!T1vBE6dNv2K0}O{^M4kIw2%;3kC@JtGRSVnMujZ)2F!DH|v}_sk zC(5%AMpjpDyzhk~TZLtrxCdC10wC6DU{e{`kXY;-wo0*irGLi9Y}oE49?Cv3gJ06=dCX9!KB?t7oX32`dL)XqrXYDokvVr*gi2$?iNM{v zzSU~xkRyX>7&$3$h*znXDB#bK=+Y~A{kkP*T(nM+-BhP6^r`95)j%2L4u>P-GI&?9 zgaQ{g(XSz$m-8_*7i-~jogy|?PaVb?Hj<;&)_YcZF@KK;%Z@i(kg}G%)*QPGeO8-i=;&3p75t!1 zZM+{AS(AeFzwjrueE4PL2HmP^| zg`hLDF5_x~hVZ;DFQ*?CQjQs20ZN7=##o$`=#qfEaJ*+>o9?T|l|CC##F)#XeS&hB zPc^+RqWpTZr~PYB_@=FJ6MVtv{MX_p?yXfD^ z4;DtQ&DdD_`tR+Ylt2aM<=+=kp=ts~x&;!Q`DI7cYxJ1XtGrr$f1OeA$@+DiwYZQY z-GxE&eHr;|mjocw39lTlcgu_Mu;s|@mp@po`2SJwGb4fQuF%{BBqtk$>J)j4Ce>blx(o#Ix~RyO#%H3b`eO7u6= ziXrbTTa4v1t9~*-dU@IzO;TJzUJqN>w<8=)kK0!f2{{HSk<8&UdHRT*HiIW!14MbVlT)3@7vMMvt zkTnN(SZ0K^5LH~C6*^$d$9cjxgBxaLg<;d!*l>H}Ge56?8PWD~s3;C`v-+2M$c)E) zX+>sDwyEj;7bi4w@{>n|5wjWC=BZ(g_e`}Y9u|Q6N{R5Eon8#6`r0v)qB8$6ZS>oW z|0B9*1!d9WZeq^2{e_XF6Cw)OPG5VH3|U}_dQ2%!kf%(>`oIt}s%!Lc%6fM^STy&1 z!TSAyw&)eIEP|kC1EwYO>Z}U)7?$st7E@%EpM&1!nZgHgIpF2J7BsfZxaMv`hN&EAyN3nwfvWkfMUG)xIIK`G>wR|3BtTvf80XuMzc>}!uh}2f{`0$^ zYT)=hLR?&sW#I59l#-rNW%Cj>_x-bQWXMTWuF5F{6S2E#=I^FM&C;j6O5++-ZJbZ|Hi{1IWCx2-7x+V~#`RrIe1W- zGOYFyr7DQ)cdJ~{P&-bzjU1f_h`PQpLU-ybKIELp`Z3RvhS`eMuubZEJ9#%!s7%;K_|B?aQwLpsuqiDPR#} zSJf5=?*(&{H3v8UVu8ELlY;j9OX)pWx=u5LkWF4GnwbJR315sWLh_2_nS;A)ufbJ` zV>r+v0kmIBzaAHB@60t^m4uYl{+71Wyu|Um{^Q_Fp{+%}BxfbvIO`5WXZyagj6oqQ z2R~!Zj0&?}wd`>sl?AH}c{h{B!jcS|s0J@}IsQ0g{>s(ppW%1mAW~jZH43nOLzePO zt-R!OKOR2~6MX#qQZMTn;>M!!)84fc$5!+o%?l6X%9E>WT9pNi)Y65?1qW+UO&(26 zHMKd!*Rn0Nd%8ll6bRSgw5kn&{!rgQA~Ma3qKxcm0ssY#sDZ{&fC+%x<$vj(!+k8EWIIX7pu!3 z8$T|7u+_E(yT8pCv>u6ho=tW0OE==4?TfkV;bethEs+*vI^9UXG$N$14#*y;v>?Rk z5+=`m3aMQ39xGfA3kxG%dXrG~5?8V6P}~udIuip<@9fH=2IX%~PC=|$toiu<%ISF}6hwdP zQ!-ejT9#z;w6i{W)o|7CBhfQrB9@AZkf=#M>-DY z!hNeu=}Th(oIc3voJfR5EAF9$=tEf-1+Ze3ce|(m`3nIPqc!GT@Yanrun}tK30;vE zexBv<&a239jfEqQjAPh>Tws$qJ*^(*0D8*M*~^HQmP|S7PELVd_GUf_s3}&>{?^)7 z?6t)$`PE5eJXL`-69fx{@$6A8y3i|h$Ao1Y$%0^N$9Pd;S<}tAXB7rfN3&A_Huc)4 z5U-m>(C_2VyUq}aqm)e}{}-gK_jH+6jCihvFJ8)WbaoV=Eq}jLT`)Q$ zwws$5Z4eQ$tbxj;mVZ)@Va|v&;~^!0!Hz*B;O?d?)ItB1uKX z7HkhrsqTCi^YJ2@*r6_pAhw35oqQIoUok5!lkX%dRbzz2v8Z9GHViX!AuGPrhJJx+ z3`xa)Voqd z@(eWBLvv!+<-+;sqCFX`B#9vHQ}DI1U>xaBe6C67@}TYuf5w@#X_*+7WOC{tCnvaz z0!r!EP47|-)v_{X=Ft%s&50{59XyA|1z*UI;^G*$zEa6&`^Wc<+A6!ODR6hy&C}aq zhL@obTicH)%@G%XyP@723OercqCyQ=jDF>KNV`{Lmg2&q54$^l+;feL3~xSmg5`zB zC0w6J%gEsWHM>xu6eJ*Kjj9}id3sG!(2GPWUvD~C`I*t@=qW4Pu)wC4CgHM{|E)0z zSzxCDyBXmSWv9X})dHu0Rk_aM=4?PF#OT;nKY$#MzB?Sd#KlWQz5QAM7v5w>$FiG4 z{Hi-3sI^tsO+R)}R>~3ANTfV(^&n@ija0>WcasNN^1%S-0S3cnt^oLc;&I5d@m&kW zR!Pa_P2cWU%_diGi)V@A6A~6Pzw#{7OUZZh@B#(2CeT}mEv(He&!1E&){TDs=i-9q zKzTrUfD2{N5Xn0w8(u?-unWC>)42H&jxz4Xe#Ck&wVY9kK;R{ zjrg}W6Zi={1PM&6#pm0}P)10F@FydMF>=tz0q!&6ffFq5N*!X|bR%Z%whyHFLpqF* zSXRy{zh)M;T1T6UZo@B7w&<3Flp{x>p$9hsaRgDnJO?kClcPfYi)b6FDX(pTuAGw9 zv3-ezi=QU%qo+M+C@o#Ol4(w&F=ym=lZu9ZwEehrrJx9}W*_q2JXM3LT~8YjAu}=e zje4`cT(3PSGWvHA){AVKF5&K_wK?Jkmcj+)0D}tFx9}GXl#W3946H;XVd9 z_h@-v)-xY@>>k=Gn`^D`uEc*Bjxdi4a_QdUa5Ut2>t6=io5)!abOo%MnV=dk9s=^B zGVEGku_cJ8^<204nwf>30i_8B>mQp_%fg0WH&i>i?{7ChUBXe>@se%%lvr!i!t$zg z=etOLO|8XPC@&)+1j(&%X|qi}Pig!voMBu!F& z{rLB;qW|3IR&cdBn|_0Dyw9yBLBjYZjJ0^Gr$B`(hc_j{y2Z;sePZYEnB72qWcNrz zJK07d2`>*IT=9|V=~8MOHDYDk?>h72ZkI6p!8^V zPwo1u9|4(Q?e%$KA6a@BiH{w|EWK#47~}FSv(mEA zh|7SwvgnJWio>u+JHz{=w=;s5oEUZDsi-Ick``@S7nS4XtAgz05x5tVy-R$(^Y{5z zt3Kgl3wQm)OTUITm6%$+QLQyC4Q62YT%EC=ZzPg{o_tw%NLOmTd)i;fKPbJaF*IDzNrr0 zmrdPDO0%WeVlEpxanGCa;#Hq9u8dfeZ}cCj|CmqA3t!wddU}hRsk^*Jdt>PXrVqym zEp&4i_tJKu>QGgMsBD+0Ngw{zuD zeN%s(-6QYiTmt{_tumxrUU}skXQsRhhI(TSy0xyOwuMZ5RZq>>);W296ISAq_sPs? zece=+Gp27txP*T8V)tz^Gpsi$R2?xzBx0e}{n?x}SNa)eggMs8-LY^WrAnG)yyQ%p zU>tM?$MZRMSV(pnxDOv-U?c-X*JLXP4-U=o-gAFXFP;w*RNHmK-@gb+amjT@dIz$D zz>{q~`Ry4eaFQrDUb+{`!>}&ATqYpbgog)<+U)tbEmJZKUIENcc&c@SC)Lw6A`*_#Z9M}9El zDic%r`;ftcU;4WRx%GBX0=|kcVLxWK--g*UC{aREt4OCXz?35;Vy5ofoed8aFSAY` zxJsV`ZItvBRaWFh1kK3a?&AAKBykd9N8(b=o6;hdi#oBBJ{g; ztfdr$JB8Z!&v}_k2A;MKp04dW-s`hT!sI~dNtA{9VKRQ(coDNz=Z`4O)=D;`$|*Jj z1`E6%Av>UV>4rVB)blu)(OV;du0Q+SFfS;mWgc9OyYmKRO%^#k_j>&>+W3y`p|bAT zIR5)uZvOZY-3{Mk>=_jx8^!Rv2nAJ0XFYem z!APv*4fo%)OO*LNZL@?Y8(UwjZ5II3noz)&3^eI3+C1W58MxT_grL9$Q)JKg+o8|h z{r!Mx25D5%{a~x{R3xB5^z~wi+{P1hP(dC^&4mkn7jDyHOsRzqL^t>>f1E3wAw7Tvn_M-U-OlVl4#Wh&bzjneKrcp+od5NO9@9Kk7O(S>0$~} z>V5Slg(bh&%u}s6@a?wb7?jSsZG&xV0d>ERsP=a08>Ykwsbnw`m^Gujo1dSD zhlih=Uy!>tPYP*s;h-g2Z)tJS|7NW{tOw(#A;mwjS&UgZ;lcX;hUE}Y4PfE9zWImQKqRo^Nay1@7hnQjo1^lNvqQPL-T&5D!X9 z%M$YG+MX+za!hIa4vUen7bhagzBwCdZRa5`GCxS3k&>~LWKu2tE{jtC4Piai?><0W zeUdt2Vy^0ff9GdVPgLEfa&TSA(IwrlBRN1*&dZ zMSoUJwtb|~WYB~?lGx^eoZGTH`ki|4X^s6S&<~E9^CsOygoJ|_VE?u%z+BMouNDHc zh~s;b-ASONt6_z0TJhN>Spdu-C3$Q~!D71!R@fgWnDWKW>#VGLmg4T6KZMxS{nSjX zeoe|KE~3bS#ImDX%U=O9pHStyMh%TQ*yHL&yU%)p3_M%Ouh;ZpO~`{vP}po*Gu5nq z!LTFPI8M@uJy>`X-iw|I&2d^9%4kp4H`rdHTH%?o5uV`8joSJVw9>&=HgaJA7t5&4 zCsE%8cer^4JR49eN;;yZMqvKlwR}`G>nNgD*u8kS`|z;#@BkA?A)^wm0hrHweSLR8 z`&v{)6b(ikko5jTgd9{8VwYbldCucP6DP@aT@t zC$6KIJzX!&*{UlQbhYvdl$F8VKzln6Dk&Y8o7Fo$k<3~g{kryzt4bduLdu77sDJCJ zA5_TfMMhbL(Ve9r6>lGL3N$}y@SDKXQWj{@saJtziSl*i*XTpM$12KZA)(;!Om+hmJEWyl0QRBK>w;oGl6L^#ImIp?N2si-q znnSzss~?munuNt2G{-aY!iD>bXV2Yj{Pd_AD$dcg0!YPfzVvS-2+qQ4+ZO8PO{E)- zok*vHQ=`$UVIBmxeD(IT)zInnLHs$v`&lnn;Z;Kow1IB+te3C!vblmTXJDy5~p8Y<5&1GI?8(V0?V?0=-rKOcFk`l8BE;C^l zIYgWAVD`lHZS8uLE|v&Wp-ouYI~qD#S^_*gh#ugg+cbYoQ3f%zfDUO+HqdBz{+tBo zK#wt7bJh_Ju&Sk~hEUhwQl8K95J>74KgBCaV{Z4q8`g+@`@iq*<91Hh*ppH6Cs$lS zZ;7O3)lFXO?2`|@&i`CyD`434-a5a=L?|N`6w?ATIJ6WnjR&bgS#(mYi-v>eONI&7KphBJg(;vvYv;0Lhntc~0IiPh2Oc6K zTPJ4U+a^;Y_rw1cglbR_!`S5#%fMZ(0+Pl&&`U{!gTls|(#f-YidPTn?>|?zuEs3MmgCLUg`tH^9LeScdo;d$X>mHh zM^dNLjl%Dzo>xb7sdYNl}Y%EYvIiv}p(QivAUHU0t-%>ipSivUpj2nLI-b$Ts!aNTh@YK{!*O zTmfEwB(bddQ$P3S=1xyFInue1<%I!E>1rAM9&gF8Cp9N7r_+!3<{nPhhBl|3GILRB z?BmSV#lB{PosX#F8g2cdx!}MG%~Bzo;GLd=%4C6fKpWiINDffuf z7SOD)m6#@?u^t7ji(+vEMJao$q;cHN;b(N!&fElnz5uz?YJdM{^i*ke@q~eo$Qfrd zUI7Z|<-RYPQ6hLeaMVR4xixz+*fR{I`@1_p6Y-TiUz*CQd$aU-z%~gFD^L^mr{4Tr z!KZ(he*9=5QCwQ62=kYhdFCnSOrUp5G5EIk+{~$MAn0{cd+jxfU%V_~oT}iH81mTN z_2$)T?bSm$*9+v|VxKk{ z6@F62``BzPKp5M%(ApE9FuiC}W299yV_A;oDkf%qOEI^!w6?w|E+Hlr6=Q0`T-$tM z!|WYEB`K+uWzIZ4p1f}tZO?^4U8RrK~J@y%1w;rdxYt>)t-U@QMP9+Qr6nv_dr<9ebZr0AaLt{o7riH8dE^YTP+$tVA!W<#|#=#0#enyf{b``aBoG{JA6h9ubfAxDanW zJW#=IZ{O0$`~}o7&XN_aeq#Eye4Oa{`jM3^j(O|ci-R&2re1F{%DOeB!i?lbUKR@I zgo-?zw}T5J=31&!)oesXZ+&m$eSNjYdA1I~{B#pE^vaqOmLE|#z%IXwE2$7KZJpRc zB>_Vh5s2IyopcXIL$D3U50qB}GBPCMY)-4_D5YhyQTcxJ%RGIoHQpyytSW6tcGFb{^9QqA5EYGfq{#~A@s0L<57yt^#T|o%_Dc`XOlPkZoi-J=fO3+-qjdsI%PCC2im!oI(7$rnx|0?KnZ7b8mtOC-x5c-25lAj7jdga?2~OAQn^Grz`< znQE+%fo=cXS|pRVXu4EM;VVeUsq5k$&ZLhzRc}7JbJ<6YsE~lr5hbM`A zKRPz{8(>E6>7gOm8ik<4$X$IW9SL2zLF@8TFX7~naL87vhm>~dH|rUEn#LI&sWE#= zvk9DMRqMR-*M4Oz?>THU7f;Vb=7EKvDPMi+KM~EH6z<%aE63-_iMwX?Ow-oQ@Lefm$=-g2swDrT$tl%*9;M_z1hz>?V=VNc~E`K&j%(a+5#L{_98twAmzHsi4sDgfRzD3J3RE zEyBr$A#8iR1&MkBkiqU+9k*H&5n~?G1>ZiksylLJ_cZOYt7M)H5Ot4pU zRW?8-F)aryK(H`6@RGFi_rKOLjcb@E?m_=7VBm+U^N||I`5F{-Irf^jU)er7w~sQU zx{%U8^j*z*BIi2D$pvkZ%;NC!APScp2warCnCWy;vEmFQDr! z9o!^kN6K8mfwd{faqaV%85i*_b$>!q4BSm3>V%g@+N?nL95yJ~L(`4^^jN>WTui=1 zBNgIrROjKK1%gfGB!^2cO^ufNb&d@-%ek-pYuJ6J^HL%@oYe&R)(Wd+^i8nN(D)$jV4m zK-8uNK^GMj6#!<_1r7lBoE68l68!=Qx%C~-Uo)nt9kw)>G>-0v-n3Swf^FvKd~XRf z1=B5=lf-0f>3n>KJ1EIQ!WE~d>{-$|aPlK5yZNLU{urwI0jM27kZ0a$IacE-f;R87D#P*20&ij+HeZh~_i~HK&j5vSIynwiU2By4v+i zCDZ~35#fYbPkrBGMkx&Wemd(__v!Dske&9`%IuSr9(%^3Cx*VgF)urZVn#0kD7#p! zIb_5UXPaN#-bez=TI zVl(QF^}FPF!6U=A0#i_~Z0;|$cPhAQ?(QBQS(>2n@$tF2c?RP<6CY=1yjpKBuQxn9 zVH62s~F* zxSE^M!EZg%$4NA`3Y4SBKcWP0qOAoy(nG@)trq_mZ(kYIX4i&^yK8XQLV-eo;x5ID z7pD|x@!|!7yO$OzE-kcpDK3EocS?)9Q``vzvJdb3eY<~lc6R^lOeV}^Le6>abDitl z$FA#n{TDjz!Wl=LcNzw@pC93Uc@kjS@qOOC+OeW@$s{#2{}1__LmO|sU-khn84a|m zMQMM0ANc-W5|zxTQY>8?Dq#*iXA~0zcB`8rB0U}(o*6QxWJX3mD^8G>;Ez+CeXse> z^Dxulm9k%xk)07tYIEYxPwALJFd!{z!uxP5l}UZ(k-a#`q>Aa$8#BGlrRKW#v$HWo zQ?J4=9Fec1Q1Pl%TCPTOE@FIA^+o2*{_3#g$M3ad5!^-yWoefF=rOMafvX>Zy}bH^ zGXZZ3&)2Uvm)dV{TLZSYxv&EQOf1aI78ihnM{-e#z^19lQ-wccm*VmrpYE$od zf8(I}@fMq5Ar`ym2T3f|S}bdTr%B7_!KWHezf2eq0QWhXJ5!(5o0rGNp^4eb&VVQ7 z4Qs34Ret9m5U?8Qa%RlP`M8At)Cq+UdU_Jly|)|qsWc+B;%P*{=7RbZW4nncBc$VE zj(2{LeYlv*ru&`8JQ)=R>b^rQSyX#*>4VPe5Y|_afTP3Sjke~?_VFXD>++2D3mmD0 z$ohUR9I5%guY)(CkYF2E)lDVky0+4@O$qVANCg(M*pkUC=g0X&)Y_wuMH?DK6~^E4_|2S;a(-=Xd8LdAUd%iE<3m zVx~8M8CYcE5e~{XjK6+Ve@+^Ps4m zcDJi{iZzJSuF$zMGSrOvMGY?MO})>osdVGi=$Azk{a+S2s5&Ph3&N)()wuS_Zm- zZ1jR8BD+J5N=s)tQM1bZJ(aYSxTLtaG_YZB>#)7Qo$z9}=sRt!-RhGMG7vSYc*6Nh z7fEizk{8W}+_=YrY9ZoV>6M;oA7&*r^Y#%Whap_MEMT0UrCfUJ}-|RSSGixiw%~NI>74P^=^^w^NIiR zch=O)?a0p!xxaF3i(EnMOX)qv|MZ+33s^3naO6&!j_o|wO%H=D%5=%wJ)^Yr≫u<$!Y{S#Ga$(J!Xo4`FZb5wz;fkq^(6hqs6TH6Wk#PO$ZNE_G zCc}xijD)n39}KC}qusY$Ywhbspzc5V9*ET+r9*@g>y+H zwHEa!s)R$%AE7-KAbrf1>L@a3JUh4fT8c3`{?FT|>SP`*Yx#sj7cpyTeP@A-f@b_e z8IStbvL@?xfSbxE>g-v(Ie8o_cCiK>6E8gBZ$*u(rZ9Fg)|(D|w%>rtj<=uMEIrHN z+Vy(!N&QQHAWoueqFR+Mi887Fn)A^R#>e)(YnQahQQPoMOqb!m)p5Z*q&mcn{5B|8 z!VCBpB-i6EVXZtqaqWsd_Lcs;ofd8}NG$a1yWG!@`i<&eQ_#Ka7*)_4=hZ@w{c-rx zb$stirT^~llQ^0kQFD6Xr`lKxml%bX)zjZ|o@3%y$hXlZw#>X;H8=@JQMSwtkCZtR z3y@d!T1>I4pKvrP598)7itsDv8T@QBpS0cb_$w*FzP_k#<~I?oG&|Feu6Raud`>ML zzmc5XdJwiy=JX^?HBe^~pf5wVDAV8~%P`hy8Kc`fGX`EykC|u1kEtPX{k-|U9`*%iYL2_AH+(T7$NdCQ#&hS0sMyJ~(~#&FiV5Y=;I}z}oFKpiC^@*epPF>31vn zj~q>y-(&X=k^f5ek#v_+{hy`o{&(6j-Q_qrOI}eAN-w?`3m*Vo-uM>kU((l=-%SZ-!E7#R-Kc1Ci({x~g@ohaIW@t=- z>2ez(K(ESUF|CJz=|NN=z=J6aTlw!O5NpJa)* ze~uS@exp`ol|S5;*tPmp3UghNM1V+k-VM-KE`$nV$O~$DfQL+mtKv}all*zAKM?EL4*tajV zW-|DOqHGpYj?_>AE6Vfc%z;CyQd-nVbSvowBahkEp(ph0BWyV=l7H&rSw$s3@{Er}T z=o@}M5Jp4T64E7~qjLwsBOs+6JBk5`$k=YaqlramM=9BEe z0MjA9#z@-blEt^c=I{D;yQaFD6fU$%P8vm_5u%Zhf0haJ2wF8c%c(}mX+bRit@94^ zd)~z!UcS`;As1c7=d@j5S+PXeD(VYLuG{v?R{9MwrU~ZtukxUr?2T;sZ=Jw-zXHC4 zEOkhYXbsRIUd*d7n7B13Gzd+xyAQ)xzhvbxTFU4h`W0>hnGqmXcN3$O0D3>-)~E*P z%*8Ncekx|*bC`?5mdLljHUeu{1 zEw#QXJ^nam%uBJ|ZpfXd zazoWt_aLfshIU1XF<74iBeACtNw70H_K80$cC1NHA`M%3I5e5)mz&ERswZ$g#NSjA|*VF-L{W<8~g zPe3bdt*I|U*)%vMx|%g9$O98N$kN}-H3@9HnyXLP|IA6Id>?Tu!Ma0%#O6M<3rtef z2Cu7{Hlh8hr3~u!i1e^c-?)-mFiNHIc+6dfr{S#3QHB~mu-9#YcTpe;p6@kcFCug# zlVy#^tb}G3s5`RDCLvUkaI}e?p*uDtg3RKcDKy!FL`}OzI7Sm%6-CJibx<5Lx;DXi zuA2h=VAyI{giVYtt^|>lyoWQ?kvR!H)Z&;xJfK$pcd{^Hj~+?6NfCv%=swz?(=C3C zCH<-`M`0Z$YInJ9vM9@fTt`s^*?JTOxKK!gP@2-B^IMo!Ab7?5l(bVlQm^MtuUMh> z<1UaGJu?B$TSX5r-*s$67L!_|BtdQeV^)eK5mw_1Gm)9|p|Q*tbC zR^ngq`Y2jm79)=k_gPl-d{jTu`y<1RzOK)u%d{Y&bJAP|dN!ghvr&$2_@Uo7xOqff{B)Gfb}3cE zsTM{p#mZohI=Gxk_0*rllWMK$xrg3}8!^2|_;SlQa4fVbB$Yh2X{IKwoRp_YS4ikY zD)8MlKj1)EGZ@cIT#YKJfHBRxwG77$#P0G67d^{jAjgx-k^Pi4CX-nsh?AK*Vd|AO z7PZ616zWfC(j$^cL&6hCK4@EUZIC44!K}-Lg<<9)?#E*gV`zYr!UT)=T6lJC-t0b3 zAd)$@?_wpj&Z(V=;P}2)O8&gdx+ZRq z`k*U_)=ZE8GVF{-***P~v=#F@q(E|qB8iWP=5yCo66dOW@w!P*Okt|yvnR*j&=dQ3 zpBL(vp_V&JMGor!WdY2VXW zjSOme>9Q27XzmZ%rEm^HU1F>D&Dp=NyGji-rFU>{BH{S_s#Y~h5=I`|av7vu2{3HJ zNg);7b`@5L|8W4jXknd6&+(}#?kDRFq0|!zJ<7jI+JOA3rY9ghiz4`@NPD5SCU)5^ zC9B?TqF{FCDQy&|4aT^3j)EiI5&p~3RxJ0=HY&X($>Q1#@G>;JEoo(X?^8PTUcB9= zb za~%a=MheO2Xy86sA%lq@+sHdiNS@m+`Pr=~*Tf+Z4bh(HrBi_^sbL*wPBa=aL~4Dn z``r>_j`3->*&o{_2(y|LF)q!Sg%IP+B_FP!pwjDtLsy37m*L(KULpjs+)$TTV$!Hc zV$zlb!yFWGn{l=cB`g`fespNdtnrC1e^glhmwqg4Cn%|ESw=$^8`a+lP@2YYNIi>Ae zIaBkWP57fngWO@Xg15!lQfCYpX}jjs*Zgt5H0^Swz|g8ZEx5=`$0XuKt{55$wTn<9 z!0cpx_2{c|iS?2yVSns%!Dcp6wh#)L=%Vj%k?2`MxIf3tQx$@2Kt}sXG@&_Yhlm!| zn%w(}Y021LL$-WS=@AjVIJywIIA-TCMtU5NtY1;Gpl&@ zbwaXq5uZ;40wg5!y9~Qr91q11)e_fdr13GvA-(uFK^zdrPx_!PUfQTBR&s2lmIlOna zIUZhH(JNCc=wYuSEQ%v{m?a|bZOP}N>Tt5%+4A$%+HfSGeIzu3GC)em$;nhj+axg_ zR8n9CBC*7a701@40$N4XCYc+mqh<%J&Bjln(~Oga49=oNmOh>fF+$yt_pszrA-k|H zjd^uELHd*FcJlxdG;Sc0m#+;HBfw*H_O{{g`*X_pbWMzFZ>c87YcKbE66F`1D}ZysMA z)Jx)hdP@k2w2l$PwIv@!qv+xU7q5Blp~)wYV~K!ewt+Fz0rPY8lA~RZ7^t z$cl4%B*y_#7a_1__t)M4P#Fs+OzdKT9bTulJRJ|&D;1+n{#ukASTGK3)iA6+n=nW~ zX&DyKB%qB#OYD0V(p${e$@~1oMm2ShEQ(ac1)$OdT3x!gauTfl;csD_!yT@n3@mgy zEHSObkdIWC>;%SqRVu?h(*ktn;LH&ZQ`V$-LJv#4NhW)D^Dijn+%Y_qE-EffO8$i0 zkprZZMQlwWOpn40%^SJN4!0jeIS9hTFN>`*KVAP02iv^s(zT|{PDz3jc~Erm{t}9` z8C1+!CKxyEo-pke`ZR`(y&kJh!WQxosN9dtQNhF_Z97E?ISejr)@g?p%rM46$sHcr z@TkIB#8TAbV#yuOB!QN2wozniVr73+m^t*i%$D*F${R(UT4Q@@j(V{&+(i@lUC^}* zk4BfW!Pbv-TTjprK15s_{hV|gCPn%x?4;}Xw1X|oFoED#D)#YE3Uwcu$37<8 z@Fz5lyrep!@Tj{YEc)k4CI^j}SQr7@T*G|3wBidOdPhQuB%f0y0@{|S_0j0a0Ia0z zKs)g>Cqf`2eJof5vg@FHo!YOXaZc;;6Js4#zV-o7aMMu(Z+VkGn$+3Jk1YtzhB{l zs-sydLETLYMfXXSbx9Nx>uCMm9j`&B#j%4PUhd#i!!Q#(cg}Tot6^VgjevPTQ=H)X z@obz`KvSnX%Srm`pc1_?=a#Cb$btgOWA6%9bY3MayLC^J$HwLx{k`$Wtxp8POi{$p z%{zBE-G&)3$nmfu_RxAm#TbLS$t-$#B_gYAn#P09iNa$m18-owDr9N2H!-R5VnVcK z2hC(rI4`a#k|k>6Dl@s^3^?R8zWD4#G&7jbZOG?(KR4-)>udJ4<)ZZEGU<9@Td4Tf z;I5;LpTL7Y>g*ss!g!w)Q)pw^ZGDbhRnD030J|0pfm8^1#>TMU$~>9j(H7k3Cb988 z^eLlKOk`l;daGhD^Lyqex1hPWkLR|W;&#P#|8V#Su^AjUJU~h%oS1WvHB75N zR!Cmk3-3-D4~slJ;qVo;6guy!SuM3elK2bvsx@ei1_)r!YZnlWF4yO1T32it<{eJj z*eX;JbPo{%2Q(lD`<%}oh^Ig*qr@F1)t~HTrzqVfkZE|0Q$Wq#v(DXLj~*U%L%JFs zl@^*`)E|=5KUU4Nj}{B^x7#Wu@d*t&xoM6-tzc!~@8ZnqRNJP0^1_`@m*upeVIH-$ zw>hGCxcbRH?Lil>F)O{P2qocG_O)YylOy}*xJh(iBIzGft85sOA3gTSri`ZkB#T5b zqJvFX)<;d1K1=9#leNd!Lc{*v&uSz?D5E|(!w(r=mHX_<%bt#!xFIrX;wnqc5tQuf zwkRz}nqRep>zPh9gVkmskJ1~dC~a*weYNaHBZ4(YWNsq2 zc7=L{SFwZ{o}=xW*ixP`SoNerOTxbqKHD}EDnZ%ZVLp;3mAMbf# zc3HGJxl{O(h(kiG)1xP~4Qkh^e8o0((kWWR-u5sTC;(YNKqQweM;V7(hPnbzR6)1EI z>6T#+DY15~_s2T-hum^sh7~FT3kfcPWo{JvVZ=Dos$Pj>bTg6-?>@<&r4afCmAt|r zQN{Ks?bEe}%F{EfGIWy_+yRpQOz;)Sa`PNQPj+`?^ua@Y05#^AA59} zM;&YUbP|)5wGJTh3Rqc#$Ya+`Dsfm0L-)YWWC&x@vE}=wl(+` zV+X}v#Jm&b4DIcTKByDG2%?P1ALTL<5xBQ#CllUw4N%my@Uh`2AJ0aQF%uh~^s97= z(}j;c(0Lf3*A2{_vp6E98t@p0&eqC9O5N?%1(KDdfHWL0j^Dsf5K{+w>)`D#o=++{aL2tl!Juof+D# zm+wfvRRM-CsX*=;d>Mww*;)D+54l{BT*+8==<}u-R2eVNF-1{>n74Y*-knM{;$ji9 z!Af0!B5u?pRf;y-N*#IM1Bu6@Yx; z)I35n|GOHY-)+Yl$;_4#;)x#j%iklU1rR^{d8mm`+deucpWwv-E6LH@?G=`@hG%Vt zi#&e#+ruxcK5pA*m$r33J5%-%sSd5*dQG%AG=l7wN6)*qSm!W`p`-duc#3C??!NZ! zdiB;>_#sc5KZ^L*eQ5{{D;+y;Vu`?NM0Q>U=9I2K65(0d7V6oN&4%E z{Ig#intTj^JbG8>K=Ld-HO%=gvd}5w!JWa`YVeZ=i7&~A8cEco(5gMe5Mf=3a=0++ zizmph2a6c|8_V0dmC@o!;YxfCdjg^I*TyZj*K60*%^2>Pg3RZ{t`ADuv2tWST%AGE z`D3M%Z)VVuYzKQa0(&yc({5I-H}PjCJcp6Liru0D`NnL!n(;h&Bi#-@b3|GbJX*zn z#w3}Q-*^HHy{?f*G%c2KZfhPyImGB;Inz#Cvz^Yl5BlDgv`yK-o;oO@d9S6JWMSPy z%AQVv{1he@&4Nx~4fX=kzh7PWUy4_x7*wgsO=KG42&A4Y4TapN2_P8%(VMTb?qtGy8m*K%zsmcN^>j26ANW<<_D+*=4vsH~HQdP!%92!4q zHC1VGG2QRxkJ&J_o>YU&9ctZi(_Z^GFut>Z7HI8|MiII6x)+A4W!(b2g5Gbn7)#no z;(-g}Gz9GSvi%%V`>#G}m!{%~DVq}Ty;UScY~DIz;hmB`IE=*T;6T=a2ofyxvnV!A zDtfqQM@tXq@5zlaOE)dAYbRI6xD%rbVlCXJ;>gNLJol(wfwPdzL`cBr%WCnjQ8B{I zs6)==#cL$HQxlPI#46BcS4Ld@(JmJ zuoHNJS-FYwP&AB11>M670~QaqAwlUS%vG?zhq7#h!bU#fKehJVk+~c)uElMLt5n-i z_M>}HbYCM^AZxI87l_7KxlHcr;|*qnC8I$$Jzv=?NV9q;+Nve6dd;E!Sp(#S z?eUY4X51i8w!+z_zy=uQQ|5s5S-$fFvKc+j`jaoo7raO`fv`$ME!Fdp+xWv*2-GB^ z3_$|sUc&I$F4UQBLSjnWSn*zLHki{t22a%3SNIEBKxNVSLYR3>B^?jKPsT0{uy{ZRjC@ zim2;pj*tgVr4)YeV|Tu1uUK?lKbK=HDHh*A_qKgn;bv1{xPwC*i(}+}R-goW;l;!Q z`l4_>jWvTYF5t)8ORtDw159F*(CN{Zc+RO`McS-p0||uyF!y;@OYOV{>%YQJ!7-`( z2dx}(WDRP9=LlgL@LBK5x@A&;R2wQ0DhHGk2X&fn;U0Aj1z6=Hjq6;GDFDi+EaDTz z4HL{DxVK?_XG>|O@rCRi5a`Ew#!y{4c69#L?38HPbVX8E(G*Zgohu*3PpS{yOs?`h z!VmTD1P;j#r@VBR567;KN8(lgL^d z`ld7%%=K{6;zuz64*X(Q(t$H|Ai>`?q0g_EzL~zb*2Hv;Q0hm0vLZ@sHW+af8}g=$ zG9^Yz<=P%YoJuSKt}kSO^GyNltbj$a{XUvQ1g$s3YeSV01oPxbki^zRYd{^4b2%oX z2(6Zb=wduQmM+3Mjkq;u2NC|HL61>6{feeWmZ2;YGR~90#q=1(VJ-Q*sg?y37Rks$ z{Ek%?uV@|Q;;g_!04z*#*??3Mq_9wTLDChr^w(e^J`fXqL5;;f+#A~!6vystBggDM z-}|nCF|0U5sfsj4F=WLggl5sp}DU2QE$?zm<4myuov`qm{uxkWfDwD)h z-=`h1)u-(RI4@&z)S|_6?J(?#<^Pe3Gj}zwEy~M8HD~IH;HR()|fg%7f`mcP?rp z*ME1X=l|bb+WvQ2*AM0VfACNV>Em!t*L*1IL9L&dW1rv6Ki&q^afJPE1-c2*cYnCt zG5}U6!fxQRY;Ox+`o4d6=b2qWY8kIh-2&$4^Wa>_jeP5N#sB<})Pc|Z)m`xA*gZ{J z4Kq&4@BjH9hc^GUhiSz7@6P`Jjdx6UE_&m7Mo$GGLc7ul94Z28*UiBC`+LSng>-&;$^NsI{<51zvG4^!y+BC}T~gYR>p zY;~?|b@Rn4F8kDM`DUuI{lEnXt>n^0m2c3zzTZi{@76(d{}Xhm00Js-_eCac0PtdJL0cYmzz zfM|TOLJU$LjiI2F{!v$wH|ViKH0R$o=il$4A@3l_q@(L3x9cdk zkQ5-)ZnuD$&kwPVlSDT^7@Z~ZW?F|ctbb4_3dz6zJl$zr=k!>=9mMH7ww_jp z5(ITo2X>h)ol-6Mu39eNR4(H=g!$dgB;UFVz9PO~A(pxB zA_ng$GTltd-c1q*U&De=sDn>ZANe639%vc>tl#-EW;-?b17N@YIu*T>**& z*?+r|l)6H@jT}U!cmjatdmIvxoddVvTgZ(u67TS$efhTixFrAPTYi|Ie4fm4D6w2K zvmr?ZL6ZQGrvu@DNzwya!8fJBH{saCSm9k2 zpSjTnEc>womrnLwo@VmqlVLTt)|9M*~j+xpRVCI@Q!N-2yM5 zs`qa2bT>FPa?L7m(-^!-9W+7RzDnqpsa>jD>tE+j9b<<6O8eiwqZ2Z2H{H1-ya~e1akQ| zFxMqG2aywd7o2GW4?HArza{{FAcJb;1q3_>M2JoHlnru>4>_iToX`ayV+S8^2j6dt zty&6<_Q_ld&CKK@2J#VyNB58Uj)CBpB4NST#JaWBcXQQuan;v&Wit-|x!+|!!at($ zn6xhYkA>~0a5FAQ08zB!%<#hxLM|%Z?lO?4R^V-4Fz~?`68`Y$+cy`D!MBY}$m_mp z*@~8@*Ib`;Yl(w)6d_jukgFjGVo3IWUH1NgHy&69QRUmd_ds0^;4KFkzhmqB?X)(h z?!+(;&VPMSjd38!P>bI66NkWFhrof1zyZmn6Qax!Vnio#=es2!&@exl)6`@+h%0<| z8XuMN7C>w{G59zfa$yF!c!=y#&`|(nueAez@R|~!mhrynj?4Npf&H=fY6~F52Ft$% zWoYg2=B~P5w*W-tDSPGlK)~R;>EOEu&|S431wl?9K~6)716Tg(i~#1b{=$$YCx@M~ z1rc#~z~jpXA8vyWqrp4T9S=PCP><#FuVV5XTxkPszHO!5S|O`|1n|RDFM|;BiU=$G zp|1w5(=A`?Aa`Xqi95l6OTl>dXR5*Hsx>*u!H9L?z2*SKKd}PnSb-c~ng%qk?CIk2 z-6BBNR#)kbZJQ53{5r`KB;r45?fjp%+9Vys4Zykt2%g6Z0YLB}%0M*C9{BJ6fk2NC zqep>2cZpgaw%c|^*Fpf@X78V<0Ud}a2+?tL+u;kjU33fDGn3u+l!@+O^_jG`{^#do z=CK>Iw+Vf7$JIgWC)b1kUCQ3~A+Ps34)^XCA-BE&67P-uhW{Z7fRg_JwOwAUA7iqL zfFN%n$Qb~J4^RPm31t~;^8yBXkJpka?1gXSCC9|l#RDR793tN$*O zfL?s4Da8BSZ!w zlC|z~@s)~THjg4rPwIL*DL1mhMcHZU#gK=yQvzka5Yk?(n%sSxoA>(=_W;~3E$8_2 zwz8nw>%D#Ho^Q)^&c16GF>5e6=rH>TeAW6-e|hK?U|{q((?Oo=tO|);-NYhqfx+Q{ zW0f;2mr=(1fF1=w03&huKf_-t6Fe0d)Q+zIR^Pw%d+5nG@G-4Z59T}^kj^jxU=gWV z8lPQ|Y*xH|o45Jw^AT_8Bg`s4ezlHA(b;@so~g}?d7r?BT{^x**&0wo#w^bu;8c_; z+!%i+ppO{68^23_$Lqjn?C`RZ$ZXD~A2&zK1zwfdt+hf#2z3aalX zI{J#n67$%z7`^qyeEU1W1UO95t!X_`bm8Q)q@_34-l5+-!%=IoaB$`Y_K2vqFrxUx z^&3d`qhQU$P}r+=_P+=We7OBEC_NyyV}d%QtL=X46%%q?_5SbJeb`;)=1Az{2QnF9 zLY^=o0UnzJaNcore|QAm27LE`4$yNfcmtjx#}1Fh4P|#W?J`fwTE1c!6EZhDJ$ODn zaM6C=l$+y2b|(0S3(NBR-p0JoY<+fBv0~4R^tz$v)7qq{Z3&1z>uW(!f(o1F*U7#t zW(G5%#o@EFwYKl2bYA3fhnOz&Ze|BnlwKs75Em?*m_`@{mDpX<>{hwOh7y<<_Q&6Q z7gJWuo=g4uYnhFo<%sr|N1W>??&AAbw{8992PL+pl;`F1f9BeYWW~Ls=MOQ~B5QWF zd=LY!Ad=ZrE;_~t=eAw#%XW_i2GMYtd(@Ceq6W2?Fk%{_%?EN^N%|)X`X^00lSQ6A z5lV0E7&@BEPXtqGLGjS)YeCJQGU{Xg1M|KhvHcYq`m7CIQSvr zZO%|p8EZ2S#hzTsjHvA{p}f=W=wq~b;sW!1dE-Vm-=X< z@f7MJz107tL~kCQ*VqAS1kJwJkWv~M@6$T8!BK7AoG0S7nbTw1-)RszpM|ql*p)oM z+A;_FuGjSCu=7WZ1k<@EfX&Tft|i9$3*U;1zAi^-Z&KncMe%Q%b!oTL z3gPx6ZK6fJKS%3-E%w=j=y^h3UF`yC#%?#rX1iuujxNG8K&I3r0KuT=u3|_J(2k zr|OwOhhcTXLW2(^@Y#Nyi-n3;>Un#G(9(&tG!ltoM?O;uQG zrR2psVVWV!9QI^l*64r?)!Ph*zF0pIvq3{c^`omBVr3VpEnciVs1rK{r-1d%>slR9 zYs+4I9A``sxBB;@ofcQq^jGulL`i$%YC;5xhLjs`SWAokCNY6E2N*v*)2%I?Hl28y zgKP35jhBKihv#lp_hKRL>(`f+Ln?PaUq1V0R3lY>hnx?<$A0!bFgU<|u6MDrZ}I)y z;#Y6>el&bOzSe$Q>U6CYG*fyq=B8GRFbrH09F~YCave1Va}%6}<&I$3twFx_5eb`| z9j6(ScAS3S-<+e`((eJ^=gZ%}|4b0Y7`;foLmoTOQ&7aMm&ASflN>g9bdLEmPxrI% zcXuUx>4{MpHTEI#<%S z$_fI$+@IC|s_DOxs@j{xfFDgrNH~zM!6;w@BgL~huhm7E8)fpPf5cO`Nsd*-(iB+FTb-&YsJFSQojz57*SG}7#Z97h-^P2=(+0{ zH0d2IXdT^i_LZo7e6=fD%x>1hXn+weZ* zQ5~MO%xHaz&2RCiFNRL*cu{_Q{;X2m)g2`$Vjm+N&XM^`DeJ^3hwAi(-Tp^Fpr}>; zp97&x{`U85VeKdaI{Ub+qF&!w zgyi4z_wAFUc+q_X>fyW;ctSbaeX6#@|dsxF4=a4XB4WlZ^VV*;;%rQdW zE%1lmW)xE}ViyU%IVru9?Kn9xHeS9(r0GLUt`>>oMGu;kTub@Q`yg+7PYWM2MWU)Nk6Y!l4NcQi^GntL zaKF&k$2)s!SGya3+fGSAc4BZtpQznBu`3begGT#-S#VdeC=|7H@z30hX`XRfs(DJ@ z$BcXfgRB=56&1VVzb{KfcV5uF|FtJM`8Hd>y#D(sbOZXkgx>Ilk*klXi%VLUwf%$* zZjutK?U3D%?rM?2%?ouV=D7vS@;-+jl7POUPj(_VtwuTN6fA1E0=ORc6+|IVOYkU< zl=b-I`Nk7kg7?J(c6IunN7ggM_eIc*us-d)f1}%zuy*X9t<}4B+3@>D!aK-?x2jf# zf9qE^Em4!7+FQlSuN_7f#@W-q%;(GZyk}q&I3O;pKWZl6lFrtf%;-n38V3gYOdz#+=acKv=UDZ77L;;qo`?r=Gr)| ztVGBNRc|G4i)cp6ppS#}hPQ}g9BjE%&++N-^jFs61?=kr&nHw%wR2mnyTTIb#13cc zxU?TZ%ycL7f|i3s0w$P{LaS4yUl(pqqpu+6_xfq2?LsbFziB+HTF$c6(_}4cgN|;F zz$OqkLVH8E;aFnrKR`aQk;P^zqoK&UuL5k zM||)+7yhN^&6{s=Iee7+ewRJT1yQ7+Ep0XN^fYdBhJPk_cwc7TA$B*>D&S@{utAVI?vQQ zO?x1CXNZ@BA^!78Jd==?i<9Z8eYorD)`3pP*=$p^z};D_7$bPSxOq?11##H- zrxjw>cy)Ub5S;nMb5(i_;<*m1UOMiKM+Uw-y*N`%R(m>FH@~OugXq9=OG`dUCVx6F-I<`iT%eq?q(8{iXsK z{=Rd5soF9*zD>#*R3v7s=Ay@~Yp;Fp({Q!%=J~s{=kF+AQ-1$``TM=u%R0&8k=)s>L1%CK zhFM`VkA@0PC+#}^(uu73jZrtRtv_b(oaTP;#{Y`@_;F2zdS2$7OLdIdRyY`7~@b;&409id=956n@JrKEK|AIhZ!_6>IhCU z8krW4Ea4F1N5JZhl79^4Ev&x)1q!A^$@J!KK3$eUm#R~ekRHziAiro0(d^P|puaPU z&e(mQz4P*^6A%<3sgJ(Fr(b2)D4Ak-mv=qJv5SxK7O_ek-1PT*`C;4HXa>MDlRB~% z^>6=-=1R(^t>f6-24CA;+-QyI+&TYpIue*~aa!yMuAIGF{BCheWpSXr|R? z3}SS2<2rH}|Z(4)Bshx-G&MtbI%ZzrjfcFXs#(rU9RKPd=y}td8)>HzOr%F6e|VXHNL2cn?Fc1~dud!LrvU%q)N zk7|BMs2dzzKrI!+!$Ymhj7l{s%hfB(waTN*{>qjAj%qpo8r9Y?B@w`6Sd2P)qTgPfH${-x9Fw~f|-9- z;|Wx5+q>K?tA)SJr~cYA%nTFijC+n@zh}Hs@j-v~#?XjIY2XbX@0RTVUn<2bX65ZE zuX!^D8O}T|3jUukn+Z-|wHwI=@&OyK=xgRvAR}Xt1tS1>-3@T%^I5cb%{RF8kwPNC zHy+3~4lA8N@ZbiGCuFIEt~c!G)M02#hgrR6ez&F2*msKnql1t1+zs~AzU96L7OeqR zd^8^~7b`x|F$SC!b1h$6AK_k4u!}q2-CTHX4QD-hJqYCX!FLza`Myj3r_moE`k9Bn z6+zUm;ee<$b&26S@gB8`riO;}`n+4RDW1bN%r~*BR?%_XuA9x3O!bdmnj0){dNoyy z=;`#NFrhuF;?vR4(5Ij-t8592DRmyVA_`TOemzoe$`Sebbj{1tSAM^FIyFbhxgdMq z+`#A~?W5=D(E!)23MN-h>~=a9pK5qJr{iQ=FD68=QGW4;fBz7u?4SDM$MfO?O{d?b zVpqL6GL-`#mlEm#%Bq{sX=WI0Bhp}`pRyZu5~UQ)!lToK*QY~Ys_G@y7qmQWl;V=M z`Zn4>B=D|TiiEM8Sl|AmOiKvQFj48BO`*(6m9&9PuP2pcW92cf+uPRXJZLpZnNKXt`lOfG&R4KF=!k-#l2;j+1iWN?vaU7V*5 zX@O?ywbd3`-6*Qj|E7&oLUg6{9DIAaQ?d>CsGqY}$Y_N%e=eG$%I=dE5oec~c}>t) zE&ZJ$=5Ey|6des;tO=It_?rQT@?3(#;&J3swMg_U49?Va_mzw}S{{!mtuAmt6QqZF z;Ny-K9#b9xQTWn}_fnr-Ra;@yi7MuWYM-CxyiN3auUJUlYh!CU$+n#zd@p-{lB}M_ z*?xC9k59#Sy_M~jw4QN7S`l%31uS8XZS%FAggQ7p2KELjmzsSylNQCLQl`E$v>G4G zw7%tX9s7O&Agc3#lfLm?>Bofi&$$5^ZnN-x$w{~14du8+V2;q2^)TUMko2i|S^xKJ zOg4BmlDa$kgF}u-6rynBi1e%E1xarl%%!ojLfn%S@P6@nF7Sf?b z1h>TmnXRzr+>O+&-d@GP3=kxzJ(QwZm3k z@2w(;fRuEJB1nhQ2ntA-#72yPh~(%FK?y-=>F(SZHFA`IfQ*tDF-jUneL!-AzxVs& zz~K)LoSnnFd!PHny$rrpf;q!LqoWN;p+_JvhOo>DR`ht5+(c&UcqV!x(|cQp5W}Dh z6f6`rabe@vju)ek9C@oC@m^}7kD-PDn=Nno1mjdXS;LePvi;WXYP`;VC5mLZ5utf-fhnGp!c)mXFeVU3}adUlSBECbB$fO4>OTL zv+ryBgxBgcEh$-p^h|p5SJb25Re-}D7j@_w8YY=pCV`&?4JsfiYP;-f{N=~g|D_jn zi76|0cNKmAdiF9#M8f&0Yo9ftq<%cCZ~IIORyzVQ{^xizbsDvM&b5Zk^5UK ze#iOk2Rs>1Y))%l(Vh@1uk-k7rWqC-B#{o$g3LJK&4wn01F7~MLc0{F)|F!852tQy z_1+MBT)(stw5Frf+V`}>t$H3`>>zj*;iP2`S`HAX|>#i6PI}x)++trPn*0Zbs zR`o~CTGUqj~*a2bi0&sbep*2=H}vw zyA#IjKWw7r_U;eKCcbfUbrso*vUH%s?Cp8Z#99On=XVw_L2y&)DY(3UhBSsAC0{qbuSeuFl@9h&L^RN)Jj*x>6(qWk0K?ut1 zj2>!S9FkN9XYrNwWKM7Mj}v2bIvi2$O0N9dqI6Bi3=&&Wc&{(G#ZX6>RRgjH&DHc$ zPDn%}!@_t;oH`Is^f3l4G_jpZI<)JCA5L_tbzQNRwbfj)GNBk)(LRL{YrLc0uQW3= zL$|gb^CZo7(dQ&wZ<&=j5T_mn+^QsPclMCIEfU+9Y3&G&Ev=GlYSGxNp^+omU}NeI z(5)_;wsnwV!Uv*ZfwHXLXmERn+^OB-?p84~3lrN5QTsE0xYt63x0^}qalr>97>TT! zI0-LU4!N!Rx180eOQCaiBF*YsDWv=K^-~rytZCZ-Z3uDl#@BH+Q08T%+!q=6^9X#- z<82jor&YI^AD>@P4>W`uXzTZmKGdRQdGRGF;H8Xg*)Zd0Hw4=CV z-@|9RZ3H}GRA!S+a^3I_Rar>QTt%d4s>~ED#5A;tQh-K)Q~TrN-Ok(HY~v!d4XX3p zL>;s+*I>meSpjGTZ18s5)2O3V^$}whABG*A=lD3CTe{MBb8w|Q)6wO_`*ACOL_bxO zJQI3>}OG=5N^%gahNbJ4Ap?y zX;|B7DEsQ`7%O`FDyG!d;LP5F@}R((h>>3-Qoxm;vG3~P*B*4SV%4K|p3O0mtu&M` zAnBSzG(7poh1H7|nOv{&O&V^jBo#;`aFP+gslX~shG^!E7c;xyNKdcpl42$!x6|~3 z$G}d|DO{$RVGdb1R_PtCEp@{s3lvbx`)6rslys}Xj9(5n0YiX5DJ;$@rK$*c)z9To zS0|?zTR9f4=RYo?E!O2*yXs#y9bw~+^)*mk<)9|45}i@x15>8e6DHzrqZ_at?*O%f z2eI<^uZ!z?J3jmYS7cmwNnWW?d5~EfA*rTjiN>LZ6x|Ud1fiR^RkiVgWD^CZ#ndXU zuV?r8uyRGqUt2_yttdA$dnjH1oChmgIu3;#tXg^wOFZP!z9kJ{DwI`E#OjgaQ|ddv#->D=JUFuoTZgpb>BdWdf&t~R=8tz)5MWiDOKLoUsAq4o+gfShTx z_TNpui)cKs0DisfFQWqCO6%;^#bnlmf@xdu1X})|S-a<1_X9}jFy!heGEZLeVqxbX zQ+y*4W;+6D3miQxzw%w$o2j+#jiR3@)BCiMVdv6uv7sdl7!(C!7@G1ctr=8VX{h_~ zc|R(-zRg5Mk-5xgu&$)2yqnUO)_zml5Mx1V-QzJ6qX0R{ua?I1RSD`~%MCLfpA+PJ z#|?#D4?mZ^0ZOFCPiQ4leQ@aQ+6Tn(Tb9}mzg>NH6^&WB%sK-JJ{4koKFa==<@jcK z9mLyWdy{)Lg?Zrpe3YGx;Fets^TcAI;j_)niUwkb25yIw2IklY8Axwa=aX6ISbz56 z3#iZq6e$B8&VUMK(VxuFDqw;xsyKko4&n4s=n{d;>hN#INNm53RMS$PKOA@B{ zEPX!88lB5xOs2fU?`zjKHcE?&=@=MJx4c}^j-5q|W}Rwgh9rUYzftXZpXf*-W5^hU zx(VUMoG{AN5c(yFv{E%|_U%&Y`H1wfYx0BH=z^4+ZA2wM^3nJrx@#8d-dV>z$53H4wgQ#DSUsE zuvMy)wK1CaZwlh7lPyi-_Zd8!_GRJ2HNRE8A(hqSt$KbTA$hWJnlE@fp4M{cV0TwL zVaiIy$kX%1w%VYQPr}yyvcc85M%8SU>s%$6s|z@ykk``YV3_qtQCCGQn6`@d)C55a ze)!lR)K5_V@CR3G;bY5hb4It;N=iz% z>|9#-4DDv!4zk$7oUg)XAPW$cVZDRF(k$){z!L?pw(9S_H3 z<8YE;Axxx1q{@f582bz5kPcflbtILsS!j(>R2jvp1}-JFL><4kfal;Ot_ ziE{05Nl0whn7zlk?_A;>d(^%HUxh9AAOI*?;X%NqZx#7ZT^4VKOXeNU!DQ}q3qU2fv0<;on{>>0hJ9- ze;Z2@=g>|QQzcm)&_;iO;BBwJk^`M8vchxq@(f2p{V8)kAuy4)!&8+sDCV`dEPH|a z+D-o>%eLU8a4$$B^4y1&S27TbD_i>L+PyluzlhrOyKaB_6z#b=A_1HFcsgr0Dt|Wb z+_XS~tUD!}xX+4_Rkf<6xot%frkIfWx=NXwQ}A&5drZs3qwcF9aMrMO^`j&D2sYvq z+_6z?A@cDHyl_kb_S1ZR^)J}SbZQwW*&ePbky4Twl{h&?7@8q^@vSzlS7kwk5SMMF zL$>ZGbYVVuP~K=VRJ5X>{#o?!suWowC(-g$s$Jn#SqUeiLb|nuzZzLkgD6p-Hkny? zTL=@LXaZ--IwBWzD4|&>MAxDL+*JUZl~p;y(25vwtdeK|`(lkGu^`DQ(A0Dab~Uis7hq~Q-^TZw}+ zSYk@+Rs0fTSj|S?v zXJY^G=u$KI3wN?3=~;8hD=MU@U!vScvLNZWw?Nr*Egt6(BNQR`)sf0aX>(7wr`$sL z62|rhwmmky|mTTT*fNU)if`hpY3$QQ(T~@%DsqwM7uyqp-(*TXW8H&pOY>V$ZbA z>VqFjH++~#EfKpiBMdiyd6L^>CQWD1hRqeFY}n^EA~kX5H9 zK>V55H@h+vb0_T7JV}+?{mJ+@{;- zWKA0@tAc?KcNE{8-@fh_DGUe*NYBd1$e^dEpV#5;e%R7XX58ck4I8kpHHf5f;e9Nd zT=ESU$@LvKq6<=KxvK%fX2RhNVYj7=papKtZ4J!92GdyeHtb|NnL~p(A1fZc=i_Hc zkftStIfRZHWR(=LP)>l?B`34kC@Fq^_4aGe@NU54;YOGW-q8xA_vOc#SjyF@_u?}c z*VDU46a`MozZpqoKi-(EXMlX?Pq#x3>reuF8-# zN-L2;Yi4PVHGO0$8@vC^zswFgoi(=bUkCWTe*o<>lK1N0`HgDvZ-Dmsmvw<{BdT!( zX;)EHQw)<70ws-Olf~8qNM)k;N(0L3AN+(#Jm=0;BECaQAyZj(G#@dU4Brhs-A$}& z3ytf(id&gKt!s-zcjq?JTEo6|RMa=sYA+c%I91fuW6k6;*=-?tB5Vz_ANRafgOX-{ zySTXEg{vK^eoKPvSqBj;7=fKZ0X#pZo}L>--wVPO!f}OB*)eS~*`Y2uxh0Wed{%#c zk$`QRu=}FvLb4AjY^jJ>t8L}gIgL1}%aKSO;6qREU~B77@@qa}7G}~JnfH!IIH$&l zhzMYHaa&s(P-+{8#H{;%Vx&!$-~O`oJ!XjsK=nGI;;(EnZS=i(vp;yZM6t30tR^X< za;T#EMXPz(wK%_1qa3M`Lqo-b@zIARlHFE1nH#D$LC#IXF2vm|c&yF?+6)N^T48-N z>o9Z&*c1wynB|k_i#fJ#N}Nh1(gV)>!Vz;JZT88Ey*P>Pdm!x_VPjDpMqV)z0#|`# z^s}P5v~hM|k?8%jae6_Ca~>A?i$|>#(?X*v}7~~iNU&y zu5JYMZihj;9+I3t;7OtQOUy`zM_B(f9n%TEB#X{u~DOr!Zy2>_rQsw@R~I z0)WQ+>S8SkgaF@W>%V3{28REMI(kdXn=|)EL#8!u*HT)NE*5Q86Hk^UIsT)NgSG|# zEj&rI+b%^8N;&7e+)L6D{>NH=;M0<$yEy~t|0EhXG7a(7j2|xknZ@h2hU8p_ z8pl%SzsS{_eej_ug;LPvUehz}bhlxN>DN`2^jx2O;(4vA{s&ZncGqp979v_06%_@C z!vz_l&!rRFZx6|mMSd&SC)5E4OKg2*1y5+~6lcEAEvA1@%^aUirtw;%@*^Xezi{8= z``Uc81D`O$6yFWGUuM8l=1A9=n;pzI8*;4XPPaZZ-DGD|EPzK$gr3fqBYxOa)Xna4 z%?CRfePxHebIV5!zfI6jN?lCQ$K~kbQVb_EEN4uOeuEO1Ko-9jjNWgR*LWGFoAK)m zgGy6bU@&0d9&>2Ydh}|B(B00{)X`r$Z3@A8ug4;7yoYVPW4R?xda>TzpayPwiC!Bl zcL~;p8w6U%g-4Zlt_ zlTpY_zrg~JVO*mbNWZE|aMJ|4xZllkea$8Sfnag`5#VABF;7EU0+`SC?N`oDZ*fXE9VQG}~WqtY?$y}Y315Vbt>&cm!nX9w|?m(t$|2LL6o zj!F3+C2%zG%(d;Xk6ffJp-XUxcb9L6@e2|t%3@ol2b@AvULod@nw(}@TI9d<0vLG0 zfF1qReI4qA^Ay$iEt2TojannB0FUd`Y&3k*NGGb{nVhPT|9z>g;pqn34cn69GEKeC zNw{>#^0K%*NZ+*3hZPn1k+{c`eRjPyw#76f>gc`4I`s-FrH|L=%_uJkRr}D|!NH?) z#P%-({Mym2J4bgB^D7n&Innn_S{4$}9A>U-;GI79t|0I>iR z0JgAFbmx6KMloR*uFT{K4WO_UWf`_@QX{mg!-e7^HDA*YTY-7Fx!2d%&GzC#ZhpMA zOPm`wHH8A(w3GAlL>3c2J-x#fbwtBa-47Foc#|ZJ*dN87=ZVs`-!D6*q7dH+Fc=)1 zv?-xBaI{frwHVD*i5ApVi)duY9-jobdaX|Lr@{4*iJAOLm&eT9f6qc%Sz zBGPCPFc@9Rx{ka&ZK%o<)z4hzr-H^2D$y2{B(kmB|;gxXDh)PSYy16!|qxaRo# z#L)rs@VL))a+KQc)AV2;V*0&cm1woG6(eyO13YqDC)Kv-1#gh|TLOudG+kYDTW=0n zMgEVCVWTviP*pOxx^AI*m!cfq^KG2he3n`B;6Hp$knpGc;^{Obxy;M{d)>`Bm#dHd z`Sm=IdU^a?`BBjESe?yaqw}24$46lrdL3DAnzvkRqBP}X!geWrbkVfL!Qxrk>r`us40(Hg^DNf_?LKiN1Q}4z zeDheVbN2bgs$O-A!_|^&$4Qn@mUWuE%V^JM(HT0WFNT&uC!q9`qd^fnK5ARK)8v!r zZZJUmQ%~=0ZSjhTMAom&NN9)t;1>`uouZZaup^Iw@RK^ZxJ>Pwh-(%(cQDdg9jtZ?AtFg#6=IyDj4Ad$ZaYRpbl0_o?%D|mEjjIYGf`DNq`#|+X)vc1Ji zshYWeM9FQpOxH|UQ5KWS9eLEzeevfHbUn?N64??27RBezGzqCz-VLwiE5y{L8l^}! zlpBJqzq+Rjqs-GFQxFrl$aiyB@0JS0h>gSFEcE4ZKxc0k8HqB*YquNwV%OIJ%MV32 zDI){ByQ@zj-ebXW$eBKTcBfrVR%r8~fH9vakVL zSff~2l1qS5m<;6LpbDZ-mZb~a+$#t8W|{QG^@F<0keY1W_(CpT#q_mqv1h=|yXbsReEYx8q-3;ObEus~)gQk$sp$u_7P(s@DuH>0FL-N>?Y1_*{FEP0YLv8$Zy%jz zH$sg0w7-XR3_}q+T{%=a2#^^+`SKpB_&m+j4VQ<2{lwbcQYi!#cQ7PaKQ9k z8*g_(?zBZj|CpMZqUqq{P?^Npi=WM6`p!MF34-bZTtdBeDL?FgB(Zw>*BHTq9L*d( zw4C8OX&G>uJatXo5^erppmU@Qt^T^eUb|^+j6Yj@>23m-orz2j)M7FvD-HQ;P~Qyw zBC<`!%C2DS-Lao){e#((pTYNEr_eQ&Crf13xu}HcgC-DF`#K2xFnn?o#6l);tg;?4 zt_f2{%{ftCwCP)NvP4~N%DnZ;f5qD_&Urc=M>NJkI<({HKDV=*s+m+^Gz}fcnvN|% zabp(0-{u*DbH5wsV}9ul{<5V4C}}2+fz?>_?bkW7?X!;L#CKks0M4kS5yytU&LeN> zF>(8zcfaj6H_D!JKWKdBkeJBd;Jq?;cKAk(I_=i?md?;0#hYwkh;MZVWO{HdcG{sh z$`KWy9_IKiAKm~mH7^zv8Yr)v%+OwTBfWWFrbrq84ABS%L6H$Xco;Wnbb$%juxMbr z`1?APeS8{##}X%rTwtzt$4*s4NRolR#Tbq(zS}dX>$Qe;QDN~LLyIb5Asqpc%|-p! zGxjDwuTuKnnMHQa?NbpGW$bYpy~T1ro)+!j9?hkITRIeRaQQgkti4zyXh_&K0%l&T{Q&aa-;NJV0#y{qF+L z_OhDn$BLij-7K~42d*?ob(o+(E~8!Vz8i+L`z*p6*t$x4StW;|sNgPKEC7m0dN&?+ zcnr^jU}-@po36|U@ts#JQhkzH!}g-tfBRo`TrAg1$oY!k{u^!s!8VY^clB{-f5g;x ztvk&UJFm{)pE^@1yu4Zb=GrFbJvimM+91P$18jD{m)%hM;Vx=)(PL2PsG8~8%&PqR z9jnQr#>P{1YOt9Z#z6PMYK1juQ-Nb#mNvYhp&|CF;YPji(edl_BCi;cxy3Af^L&i9 z-ZtuoK?~7-_U-t!m!(57G0F40ba~u^)gA}bA+hP7l&aret!rcW-AAh>3Vxp4{e z@wzH>7Amxz!i^y~#?Gb7{2Bfp#j^jhg~r%NG46>J#9@EvtD;GW#Vc7(3XactQBj#G zcotBJaLYhtxfCz#B;N!L&MU!gf|#S~OEC<-?PE);!tuvPn3(aX>?lk&1~arWetgwkZyvz?OoB^}DSZ3cL3`)Sgn1%gN`Cm#PBH zg=T<%`tfCa=1jGQM;oG9eRzJA(edXmGwZVNjwF&eCOI-LLyz&QafBRxt&(2rl^|B>dCSqE)9!w!!`a5Wh}s=<|^CE$;(*E!oSMq2-SQcCY3okOK?dQM<(?O3ey z-p5FI@`iYTt8!b(Mn7S~`|_LgHbgqk;jrq?izyocV~+kvt3W`a1(@ae7SCsTxgQVO z&n$dqZI1K;{_$J!mR@}QEGi7#ZDG6obNEN^>0=b2i6y}NP5{N&&xG{hu*VC{) zJ)fBj*GX2@!K51dU5#|5A`s||r^z(M%><>f@Il*E+(s&$JhPG>x~~e!$3EJBpw{bZ z7-n^?|D5t}kG`+vua(1#(1LfLCgp#-lAbm|oax&M^L?eqaK}>>kX0>D_1h%NZ#yB^Dg` z10;aa8ibgceBvf0zpIJI)Ay?2pWi<*7{oL$u&Gdkttmd#U&>Zma0)g}lsS>Zaa{bO zJLU= zR!Rc*HpH^DjV;g4WVF(%XB*`$x}#DogJL1XwY~G2^KB_W@iqI~Raw0sd_D#_K%cEk zEneA9Z1_0?uVruUnZoz~J+~Y|$NH~VfZWda$GbCM3RKC$ABT12V;!jin0RV{6v655 zPTE5J!otFRyr%j~k{4OSMZRor-8qNs1lW&k(I?F7-0=Fz5Al2tMOobJdb598xhMzx zPL=4(vfk0q!#-7hm$A(U07cC&$L=3~X2@?1#7Uzn7q)$%0l#xW7L`vV1zxBu+S6zbt9LM>&Hw{5kzD5oVZQ$Ip>ajj;!G=ujaOqw=+`Gx5`f_ zDJD<+wT1}UBU3}A=t;b$j=l!}-BiQ!0peKC=N?C4kGFNMV@AJIS;@BFCVi1Ulnpd; zX**zbW+b8KCM2#nBtPh#o3{8V<(K@Weh*g9pzeoccZ-YG2+|}(L5hhd7Yn+P7SnTM zQ)9$Gn-|8ZA9Y2&x*vUw4Q)h9l;q#KYn+n&T7A2ugapyM??#WsB0kq>9+FJ+cUjSf zJ0P$iP_K>-Pb>RtS3K6{ht*vr2eGTfd?cE`q`n@G)cN>!=QMyE2BZI?0#7us(bo?! zWzHrGkNsGu7NYPe43H!?U}FBCFAH6&Wl5~?ja+iPaPI6ymhu;Vk8v|pZ~XcC-<>gd z1$;ALPrl*2SJ)8o9CzIwr!a#kA52=Hal3ILCHgWdy&CgB>p4Iv1g^$PZ476f?E%x( znUvwjf7fS_CfClu?(kR8fZ2y4ou|MVVb33>HUidk4URYXhDW28Th`Z7q8P#X_W6(f zIfIfeW+>;1ldkm*R^no98FQM5FBl0*<|vq0;nK;B3_FVCRiyGrfSF2&3-N zsA&tneYBJ5)6&nsH^*gqwnGWRpW2o{wXo?bKvnyim&gXZt%w=Te*_VqzHwj0$kx@2 zlZJ{;;&5grCQO^v>6|qfjOIIm-1q6_$lmud$5tlF%0%00C!`5H1!F6X$q$-eTx}eq zHMwJK_H_*|pDTg?T7 zp(PxVb@@8L$(Tk67MWUat7TRsgTR{2>{Pi$;P2=wdvQuj{~=X_ICX7UbWSsK9H|v` zlrM3JZkuoDLe!!=8j-EcQB?PwiNe^GuR#iGAr%5z)0sH^YKL-zv{ZW!vdN4Kc;$R| z;d5|yNJwz4bNrgV+5&~DwVJVS^|9AP;O?>a>o6jkrPmOHPkG4BPrTIM&IMCn`#V?; z5#x96csGQ=qu%NH<`;_3yk&(~?+FO;JT2b2Z;v2gvOO;gpU>^AM%!9KIa&8 zNX_rDx+cYUG$5_={0Udjvy7aZT?Rcx;~(qS?bLlby+AZEaIaxn;pi9F0bnj1FVXVd zpZ9N5h-RyL6r2#;b2!|z)Nz#wyOFV4spK9kC=p4kN^keN2*vKCI?s3wLVevuh{8>W zczm|{^FFx`r#k0}n4hN&ibx&fi~FZlSFht=b$sYiJ&)P76o%Za8^j6xbUz)h2AX*t z{ahJ`2Tf~w9YG)05=Z9`R2Mf z!AkK^&KS73l++_KD?o+<0uhl&R_ntW>Zyr|hk9bNDv)6Y#PC~YpAQjx%zG!9;yND2 zhK|2;#VE2?Tz+M7b5d-+DD#zcNF)xI`IhoKN(r4Q-jWd&I-fjWncTLU9H*-D>ky^n zMiUus&+NeGodVC7;941SV~Nt?i8dzS`hKP4KVtaZ)fLhx>1nG9)dUySjUlJ z&Dxdb5cbb)@!1lKH43ut9x?s)@0MuqsFU=yX+;=r?x4Oz&X0YSUz=>%%ZZCCT}*`c zwMF4D8;z<(EfQ=_9Av4Nf~M_4_(m2R&lGs6(y(pzcf^43?ifVa`CyCmqwEVOJVdYi1g!aUFF~un&Zl@GG@-z zy+h45t<5Gs*vmV&fYQHO``5$jp9$n%vOhP~+!9?vJ7` zujlzPds^6Ugro1>n#f|8S8bixu4`$-SyaPi%AI7Suiext>tsx3S66Rp2Jwbc0sMhP z`%AUj-yFz2E&Z0iSog;T5w-#S_;><~Fn+W&`XrK^a<0|)pg%8Ic7F=8bh9>*5uJL= z3dJCD>3A_c*g5+$aG-9df6=~a_9-PQy`}Tx_MUIwl7Cu{l@#*>Thw8qmdN!nq6N|T zQ7-Ue+EUPhEb_attgtDMKd9lt zaJw58&Uq5B-$}On+Su}>dU}2)*l!}ykoW)Gl@}=>RQI2f{$(_`Pp*jBlSm?W?t(I(azzW&jb(a z-`U&$et)vIG5yS;z9tQht*DgX0iEz*S?f+tWi5Y;ivDJelawK7%9?-CIjyr*Q;BY` z>&1=jlVx>>P1(Ob@U5SlWA);ue=ysNn_tPCuggqKZRF2t8Mhnu^(td#1v!H-JU;Vv zYccc3+1M+r! z&e2&!T5d>6%5e(amjHCPtziw4`?)9+ugC*@KsUn+afaVu6_R@)H64lF9e2Z1;=M?% zO^cP~U8JUJrP+wFW;Vec@EUb!xB!@e;afFcON2@wtOo-Uqca4p@VnC{Ec1yNC#M4T z3sxt|qy>xdNxB{hKJH~)qvQrXSL7f)tih4AGG9H#G68Hfjw>SC4eR103M{7L*9eZ5 zOIX?;bUKtaS7@C}o2F5Bpr}}`;gX}J^Csv}#!s*Exr%K{rlVthPV*U(jInfYB_Cx6 zH*&8%-^&-6vlX^No!uzr3_D=gzAOT6|i>+wWgj9=aqVC@^pRTyfUBsCv2o_nx zM@Mr9g3!+3u}p8E5L1NrE)=Fi+PpSaZ1R+?wNi&on%7S6KYXTe{^#cUGXAnG;r_Sk zFG!Qx_qciozyW~3qJzUjh3hWlyMiu0uSu!H9;^(v6y>`xA~0yA73^hs9$0 z%W-j(2?CUs_wFXqxHQdaJnZbVf5^V_2K~6s6Azj?1`zY%`gKhG8pgmzFB+XUW5QBCXs0RkOJ@M1UhCs9 z@?Xh?kPLc1pw+tg-Qznrkjh>LJ!5evHkPd| z@|06Fip6=>J2jL<%ORkI zYD;IlCN92qT5rQ@Ho4%9N!8TxHZ?Hw@o}Lk1rkm~m)y$Y7G*SigztP46LWLpI6&9P z&{-k3y8HgMF0muKX%DBM?AFo6o-EYTl+T{t$tA{b-YQA#x5=aXca_omU#A~RG8e~l zh17)H_KAOOt(=d3K4Qgnv#Ksu?j*^|L#FZsm%5SM_A=#oxJK!%Hpr-$U)UfeS)J-l zbaV=LOw)63(-yM;(Y{)?@kH~O9)qZ;KQ(owrP-M*HVzf=${0ZzGh~-zY8fJ-c3$edvD0OZ|vH$LeC3e+VlEmn?hv zaAi4_k?oFkiV+`%)GUw594{&2PLbx?$?`r+Y)^aJnulN7q!7FJCHD;~rT+CyZ8 zzCC{N$#jhL6K%wnVRSF;w>N;t0_WWxHUH8^LD%HT?xCGEa4Sz(wa zXj&-Q~<{j;~O3gn9yf+sBkjN4HG`303IFjA@AIhKHcF0otU1eEU9%hfW@9eMZ3Rufa;fmL@%=F>oW!^LvNqhfnY4MOMgEBHYPub1Fa(uQ1=vDmk^zq3@&8N0*(I5i6F zx08_ELxSyeJ0!UgJY|DeI*xh@N|wTF8=ub7;X)TtJ4rK7x0BR)GsED9+Sf4Ns(qn~ z-2ovN0TEZK)AM@|y1>r97FN!R`p{r29hU-0L=As?zCn^D9K&l=MsHu-87-)(F*-aV zu#Lw@=$N>0igNN;WYGw9VjW=zyH3uoQkgNKXfIiIl*ZL9eTv4o;xNu3)<9Z@z&emV zOL+w_(3PlJW=l$(V(kx)Q|Pts^JBh}85wgcw0bcz5`;==D6QsOtR4bqi01Ha3`Su7 zzemX}7vq0xLY2PtkdcXVa|rA|+MS+}wg9hddnk%EBF{88DXCJ8L|@Z|KPWmM&Tq z;yz2v3iM}0@bsFdEJ(uAMg9w`3# zAx5rFB;gKUc;SXfc8l9#xKTpbPi&b#-Qq*-9z zKcNs16x>noep7aWwl1o+JzSazjJ?N^Q_H2?u&HzwxK@3D2-oMN{goj>O%Q><=(Z z;oLn2V&J543bbL6ZLDU>?id0lK;J-5RwJl?r#2@RQ$JZ;*tV7rdeK+p&WZ|XWp$S9 zFHcvdfO2L*U$Df+F~69cnM}#n*LOMerJ`(%xFpxH&_M__U{l9demU0JOhM}KLoyN@ z^Nz|EDFyik#^z&5kQoD$dB;63%7A-;bAl?pCoRMh7ZUQe*p_Uf;Qg#_`j(AEKG7Cw4L@_Mq%TpD7 zzvq#W|1Cp>nPh#lsc|f^kV>~z%ls9B_L1Zg-fD z+Qh=&UsE^k*z|*ig$LNjR0rv|`pu6*(u{<@P()7qCfU&y)Y`Lm$g&$GBcup|nt&dG z|II7DgQMSpjPoY;yrr{GawxrX^gwfIOKW%ujlAtMvv%g#+cr@31vm9Yw40-KIePBV z)?aUCXoW;oH#qO|tld|4mv~+?=hMx_>icSkYe4Iosx(Cbtk%POR=~!_&i}P>@|!C= zMJ-zIVdCzMPm->SWuBX#WLsB#9e?*l(gZDQJWlL9 z8MO1{q;mcCuSPdUdUP0X{QthEcxLaU(0qCxE%G3a83%YPZdR{Z7w=n@1LB{cMcetX z)Kc3)$0ZQEi~^j1qQBI76#^Zf`5Y^(T(-iS>Na|p=6|FhD#jHJKd6FZ_ zIkfE~=iFE`!R#a5t*iEPJ0@UWzgmjneLUJcJK}ywOnYvPK(4lQ{J<9L1HZ1jbTHyD z%(4eP2*l^<@mdUI5v=KA5uopGsCJJ!;`Xuz#dyVZ+LV;NrY0RRv6wOMOH6n7JRILQ zA{@P->(KT27%v`;1)GC(9LQ#brHsGlBw3hD&La9pDEJSt(PPicsTpd}1TwShOh-At zpNr#8q~$v+Y(6!J2jcjTxAXcxcy3J1J{AQ*Uqkm?wmi;Xx|B_1&CZln-lrUWLaMFL z%I`!jJs;#|;hv;i&uxcSeW)9(K{Z-G`!{fgNiprMpH7aI5C0{59^ zFLzrx{Qeu;%>8sY%y*#s&#AA?|Hs6!%wM;>k&Md$V^0Ok8n^wZloyOb{@ci=yicn- zO48Ta;+EfS_krg+h(Pah^NgCQ?8$1|1>MoWZuO$yzpye(|C55UTr}a)zps?B87J7? z)l07Qo-YNBE(>U<*}A5s;7h>k&dI_=r{>2` zQZ!5Gw#$mhalex5wKF(t`edYbP#UDG;U!z5^@kl@ygoioCvW*BBWi1EwI>7uF-{xU|9X6;#aEJdwi|y; z_4;Gc%Dvt#^B7K!h_T?X-olZTTw^}ZqxWmcX@=mbv4y>pi@SrGpLc3}w@-$l&<1B` zEK;b!c`uedXHS;hUtYmdTGfdN9W0;NG2?;RXI1MNX$)Qg}rs&LKzJlgJitp zGJPPREH30!S>l~Yn+o!>$#9RXFj<(T=pUl#%Mp7zJ{We6ZQ$K8Kuk$zSBS=0|k z*sWH$I6~-cj^wpFeL1#%BLMDG_+tLw;cj*5!%J+o9uOnfRJ#(BvfdB%EgSV)+b(nM z*lTQkrk#B}Q>6Fu`uHL6w^szJKel_U??0S+QV*nx{|8Ol&lUr>3L<}eLygErUnc3- zhh_6y6(-%Y62#p~;H;5WWvAknruY#xF{RHfU5P?XNRV0l;0lso%9rwKn!YQPdAkff zS_wxO6_@bPlT&(DT;?Q_n_@R8xrLn!19kY7v&I*TX!Wn-(z#-Fob8Ph#|sQ)yy3UY zY=0wtc0eiId@MQ!-VRay`7CZ40|BiV@A1o*Y7>?(-hvK?MM;kT{N{wb4+?@980dPa zmT1C^B>W{}IdpQMhA1tbeXFMc=J;7UNYAWpE^ZM&#t9$(;B>HM zZ|}6byW8z@r!IUZ)?U}x*jP_*)atR5=(~93bi;sIrYG&QPE}P^wk!tH*ck4JIudpuvy=Q-zjPVAD!8u!xD z*H%`{K#e!pIpJ(PI_l5;?6Vj7YD-1IqSKAPf0ddtfliM(!BK45?|Daf_*y}MmP=Z5 zfLmsWSZj^b=3XQi;S%0F9`(e(sK)E2JgNFr-yD>uxcKRI)_*hhi)`;_DQ&N~oBayn zu)H2+GqxqpW}ZLytdX9%;fcWeTHu-udq#OIF{>=UGSB2VH(0dw&b3*UT5Zvw!w% zzy1%ju}^H9uAS}-7yw0PGWTs@EPLJ`$ET+{(g+nn)l~>VJj|XoG$_3$7tt;D^72|~ z0sx&xx8dBj=9QMNTsTnR}YkzO! z^uhEq*r1^a)PeHeLqrVkyk+cy>icrm1E+*3l0uW?8|0}p$b8^{(Djn!mG1JDD_6!N z9ws<^FL~qUR>2*{lnlEb-t!5CvvjAl6}#Nh@YH54&djkt7p{7P*`u+vD(7HAy6Mw$ zNRN?`G-V}I(&7D^FNePcsf6`LwMn|mXu0J*%rDC+&bP7lYg-zkqenIn*7WC}e^_o) zJ)wD|7UU2}b@_W(^vRei>3Wy|nDpuWA0w$p5+njOZ9mmdA2j+UK+zx2woVQini}yN zC2@w0nQJRW|G~E8{!yI1zWH3We&|WdpLXudNp8Az1c`g>(OXxd1r^xs@%sGgUh5R~ z1EYn?V_@g<&s+Xl&%yS*#nD$X5?j7^$54)cu^0_~H)}WS&})9<1X-EvLZZ0%CEng~kU^f5V05kvd2-XCO-ccBP1t0Q) ziYg`HjpaQ@mo&J2vCGrOS^tvzjgK7?O>F#4fT^A>m;4jDVz%z_w%=RRnd4Ojv#*Yi zrx`3d7G1oWr2@uB5bwstM#m5nBY>`yv8-S7y2Wwt)pV|+8-6WBOQQO>d^H+oZ%QJf z{XpkImIB9lqVvLgPdT1b&b5BG{>@AHfMdm%SAXsrYFuZ+ppg^}Bm?gB{Ma+PZ#Dr2 z22`)~vS#P!6Q6u!ABF|wX~C+VD9}H8KVJFf&1=oaZLdi}ju{QTZq<5vhK!HMG&DaA z+}@BYG7aw;5I-wOoI!PjZ-(wmNp%ehKY@kRdfqbT^bi~J)sGPvrKGCi)1}%ZnX}q` zcy35Te!MsL`Xgml+ef<(ez`HZBR}rEf8(yzp;(j9fHJosi=^h53o7~g+~Khy%Uyvm zv({E+pO6CzvUA>Q`5XRb;t`4)r(Zt>AH8LmqoTjJZX zJ724_)Q-mGqx(*N6V9Yo-GLmi1^kIQ-5s`2+a&;pvI*5~wIibi9E1gjFBO9LXPyZ$ z_lLsC(`;>Rsk>JW(^p!0o0|Nu(=kh|hey-t-@W0Vs8hifRzug#N|IiMQxTSTi4wB2 z$_wx@!5E6w{fr1vOS91oc=0>$33T26(6?mucuXkkCh{xXBW=EDZqB-Tp1aJvAJuNo zyURMv9_^8|_Y)5D^Z98h@i*tn;0E5VW3IU|qF%AnX48eU;~?~@vigww;@T(2+Fy-H z@4SS6)zS1m*PbtRt;n^?DX@cyw$8r#^M@;InCd?*Xh6Y=eD$HNL4DCFlEJ@uSih`H z!9b0Xr9o)H1akQ=mG;o*Odyha)&bU-4hS()5|=a2ZrN--(?uGZnbFrIxIUY|YeRIt zu(FCzp=B1c&QyVTkkWjui@zQtcJS&6uEVTMaGArL+R4k4CdD;3|4~V9VZo!qa!H=x z#>K9UW>}NgEn{+#pHc-c8``GVL#RKqktf?4WCt@yE*Rd~U;EILU;83QzvGYk>Rri?n^EhZjdDLfx<=MtLK*Vld~kNX;`RCO9yiXSE5GiF zuMQMHE+Ti|zJEHJ_fJE}*qAf1^~cQzVJic<*A9PH=bAo*KyJLe{RyneRsefhZm@F# zDvMVeHjU?CmWBoS#bSCm`=c-iD=TZ6Y<@vO$fVSzO%A;=Ks8RaElkM-Ib@lCS+w(? z@gg-%{LR|uI5pEOHeq4>!7z*P#Mq|0#QIY6HF@1ySg54imC->pa_EPthgDK0;v+`J zwxVl4gu-Se?+@jX*pJ1@FE(0$m646#Q_3#Y-(}#8k`j{z;^iqx1C^DPZ`@>O7Z)G7 zTIT2F<>uH`O8c2SRjBcM*SNG$IPfHcGrzZZ&81lQmoG(za#vVjlGMSEXl{Du?|&y(rsfLND)?G-kWH(d~mSd9ADDncH6_UmR`I`Tf%u?mV;J6ty=N=5_`ZD zRbWfpPvQy>OPj(tp)r%APpN%?`JBL7NXaVM=r2D(H}0HBmN%lvhc-tj#16@H#2&Vmn!~E&+>k7 zH2(J4$KWpyVlRd}n_7B*5A9yuU(UE%KY6~<$l+SP(@*yI`=o|e?EF2j-`X1uFlNmK z;8YPdV|I1a0-tGBlqw#Z!;kHF{q$+Zha>XF`uY@G?2S0O!cf+X&sm0=w@_45r3i&k@>ySdEDP(6Nr9%G%U579x9PU|btrBj=C zC|}-xC)HJ3n}$WWNeZj$WM@~7j9)jFmRyDarQUk+s4u6H?>gsE5?e=@dej3YD6^|H zx>xL8UQFMPnB0F4*raZU6|47xBPd}05zn<}^WXkH+Iql~?DoK-^@+U0G!&7kthN@Y z#q_lC>VgNg%ExKdUt0_jCRyqh{x$_mA?*|4y?fQ4-h4}SOGzYFnezJ(9p~NL^_j_& znTnQIzq@xMKJE7pFskp)+5jod(rn}Q&AXp2KB~K~oPf=U^7seH%?~d>cOPuWRzzM9 zz%;hK2rAaz?(lZk#X0vK9*fVrK>h=;hDeO4l^hyaN5gNO870V49)l!cr)mQf_xp8h z;M0s=o+RFC6+a8!P|<&?xmq9!VRdX}waR(D(LvuS$4$=JX*@T#_yD-5xr^Oz zo;m0nh6cZkc^LIiVbT1X)@lUp1{n^_JG1D)G zS6{CbxAIA2djijYVp%OdGKLU;`>X}g__Wz?cHJ~PHIHNDv4fTy(`Vlojwm?fadmYy zAV=!zUQ||U)z2*cn*M=`cjLc&vNHem>-(>ok?&i0u*ZUDWJRRVqy`k7h!(8X*2Trl zSFwo=GP8fsR^!%Wce}T{TMhRzBWeotCd`3Oxmff?mDJc`dUcJw4am2H6 zacT2ODNC=l{u>v;zLy+dh=|HGwJP;BS5>vVzTpi?*8a*tS!tRqR>v~gZ~ll{j3BYO zdt4H&M$us&)+qIS+UXO@yB4?T!po@kJ)--}E@khCd_kmL#9O z-k2KZy#WL%|1?f_Vl~d%FNV)#`i{r)=bi6PlKrzdx&QqU-+jZ9-HX#7E5at{;QyWg zjO*j;yFYqtzVO8Ury+CxR`}9li%XCB9}fI`;K|CuXOPK#)%;xP4=f1-+YzP4d-8DL zj=4?09~@-P4axOLtNU2#mWh)|TOz1M{_crzF4cIunc0qpv5j`DjndnW26l}0K8@$M}Gc+fG}rm%=T=J8WzNYzj;M zb`)%|-?))gJ-^z%pcY;~yd1i?#ali2sWCz^bistXxtQ&i9!~k`$D7um)lHL$FJoeH zKO#q$;X$Dq@!fn8=sI3Pp*NU_ItF{M2M=D}0gms5&QXiilh>lR6LTk&w_kzX*weik zi(S?)u@_}~2e|FmH@iZnsLzW>1TiYl9G{Eq4&LWCje&+E@Vav7jB8Ui;XTy`^ZyC; zdOZHPP&`GIW)zpN@HMBD+;gHPRVQSsh&xpev-9xE;K%&WOV{BK4rZS|H}1;}SqfKw zfodWXB-l~G_e{1$*tjeA{`nvgsXax}|teFX(Ay0z)YGa>evR@vO4DJ-LkDTauHIt%{CHOrd{^+dU5LH?UM4=XaATJfy`0WszU8S&T=C4 z2Ekr~#kr&e^!T^x`Y$Mz`Uv#?LB9@T(lOOU@7L33-zRFLsMLR_RpeaM#0p>~)Bd3W zNMZJ>iYO#se*Le{-R;8M9nOi@ul=c1KNF~UBRaJE#f!Rvx{ZT6xQ;D8jAC-}jrQEC@~S1YP9+jcPLIHZZ6-n+EhNZ)^QW%_*T^;Rm;Wv9ESxH7 zdypqbnw%|!$E5hj zNb<%W7ikAA&3d%QE>if+(MJrn7pYc56@+_on5prNX@+2Oy3M3RSpKs){<%)t;@a*{5Kwk@Yl_D0n`b??ZUiho`EXSA5znH<-uad9;H@>BSK08WpD-kdw; z1`nym1Lf$0vVWgXetKj94*ZAbYsxK-{J2&Spzt-@fcFR_#!2@z?}NhQVCo6seu|1t ztitO1+cQ4$@;30-F}PuCVB+X);%;y9y2S--8U6|o|K;;E;7;zjNc(deZ&|0y3>b-X z?x<45Dnbh6)O zos#Otn(sxazb_g^&Fq(`^w0jxw1XDJ;QwBP{7Cu&!Uw z(lA27?qUfs{U=0= ziH*j3U}H-CbL(^O$!cs%MCcp$lYiTMR+If`uzv9}Y;&&Gq%e(d=k>;urU|8QbavG4 zHyjO^MREkT6taJss4z!q22fLDn5xcI7dQFcNd%e&5aAEe`Ic&l2*+WOA=CSG!SP4oU^KqrOr8?}yO>p6d$7Opp(p$omoJkd3Xms&IRS0wj24DK}Mdtr_a5?m7j<88V z^Tka}#x_=d;(wga0pu9*$Y&(WOyFOs-j5dY!=wyq*R-}?b(K_mbm-aWedmiTly`2LtEYqEcK z4j9(*$Q2CG0Nf0EL-FV3pDfVP{qG0y!(_;CWt<;P#=a(M5u?^?9iQI{Txeas-YXFh zN-Y@(p24F(YkV<>%QZ&1Ex=Xm?u4?zx!pO^`2RkIs}ycGX<(Tauw(!$jRZajL{pJ` zN&DZQdsP{@fNq;V;BA2va7r$c^GZ9kJLmK+&2D|tTy64yKjDk?!D~0!$O+{i&cO1K zQGM@y^mgw{&r#@6&(UyIZ}dM9dvgv}G48MB+Ye>&#f}OW($UemS#XMiZ)pU6N?-E= zI%hZ;;h0jWrlsGb`;QpH0tTxd(Aa|2G&S#uQZQQCo$LPLAfhTjC``0#Aex;LQ5B7g z`$sNE!_stNa{ODZgXOE{(8B5t(WCA@FM6|X!}9zQ~i!? zy|pBQFI<-W3&%+#Mas@w6=~xIyPuD3Ds{;8M%-EWTs*bT&dy?wXDYx)220YDvA}L+ zbN-pe&zJ26&9BqNV?v-5HMhY%2e*RQ!09lmhXPX+qQ%f3ZhWQ-Yy-F`Jc@{p28w7? z*39ACFaPcBm5zJSV&5BSJQo}FQOMLRZ*@SpxVSt;S{d~M9$_U|R6i6w{H>Bh)?Do; z1drO|=w;X7>&W@M&ueq4CbDk(BIWs|1NS{t6$?@(rhesJsyJ_GLKuPry02^q-!RnY zm6Ch(P6~;<>iC{1rcPp}ARKuY93tlPJ$W|pa1pw0#$wm6_WikedhH)rrLk{u zroIEl&=Y|4S4JIP4P0smN^YA!?{80*t2>`HJ$oGmmJ@!1%hCr7XoL6;BSf zTMNCVvUL^isgM?byTgejxY;<@msS8Rzr_hfr_L;+%)Gs?!01q-Fo7!7$9K83JD7Qg z4v>Fv1g&Wqzl-iKsH!7VTX*4r$c3%hG%+jT94kqJA$zq6j58Zi?tUHP_dEd^;zPP+ z>+1UD<41&(uF^r}uOdSSebdrqc?eIagb=CK>FIS7gH_keHSpN3wg znCplnzyc19EaWJ;do@{pB9c{J2+t!wzY7tV9$+GxR6Y3j>FT{dtH9+9l)beGJpDt3 zh~Lh}Iz$3ab^F!xpk?i^>+@BxqAMOlSnrAl1<*@vpc=nETuBET{Y!ub0j24!upz(Z zuNur-%p{yBvL~|O!1?MLc%rMP8f5E;FEXtT5@mrvBPIR({ZsBhos*=PKn6WKzx2CR z?-Ihkvxl4bvT*t|OPJi}|l?;1-|scY(jfVe%l4N#0SvxO=xVTfpg!wOnbp z&lOXB^+9nduS$+O!*=EqCUb~YyGs#imMj+z@1szmpm13d10~$nQd*l~hKXh?Wn)92 zO}yz`O!}QlJYjf5Q7Q?4xm?;0PQ;=DC&u+yHC0MhwX1c~F#5J}z2%Lkb|!aqZ!qsuKE$Khkd{kCp zNa~)Y_Gct)-sNiW3V{l|P=M}_CB^_*RJ?w05{_Di2^3+gN8siuDPL2%M+~iY*z4aG z%EbPCcXhc7oBy<=j;y_QXN&|4bQ5~ zc21C#^EKlC?x%L!GgX8Z0v=MP5}g5G1`&ALv7m&EDcZr=P!mGQOiOQtXNBeN=V3!h zGKA@ypsEcETwOGadNOYAx(E(!{3~=WU3E4Vs(%G-70Vvlto1iZO9>@iGTQ$&Pw<_P zumSsRY(I0bah{mxYHHdP&z?+Tv5lWeeR_Fqv4Ute_Ev~#I|E>3_;FIgOG%>H)W~L46#>{gSx3Zsm_-@$jrDtU^aMOFkpfd)J|uO+cUj{Vt85X z^seVTk&7TSI%F65BkcA#P$5%6(=&d?{Ix|-9+FG3>6K|)U8RIF=_l!_C;8Y{^;uTQ zB&U4i{A_?{h5H@)2$V80$M`6VSuq$a3#i^A=py#1*4TWRV(jGg#d`(o;vl-HdN)5y zhN}CS@H7Qhy;LPVbgOU~IJ-fuRPWydb6mo;prJc4Fv{PW62x=RBTHT6d=C1AY+LL; z;H3!QNPV;el&OIqJF{sqd!;cfxg(^Czdm;T1&lfw{?>RA2`f}v>E6HXFBWYn;M7iJ zymko>;c%UXTi(|UI&t?y*Y({~(VdEj>N+CWKbKPEhxw zrw3mZ+RFhug1;@*Y&MYe#t4%_YjrK@VH|?=1%#QK%peUvvBkvtHc4LTQJO#Idmt0ZUG^OG)m6tQB|%j>3GL-|G*dLg=@ zDgrBHost|V?GDQ1-WH; zLYHy~cV(Qk?%wYC_2S0ut~JmYuY@X9oKa@;Jh_2G4G#0gjicX;SaB3evH;4?YIoU=Wyw&OnU|mfKaeuTbGfSU~26q zSSELR-5G~DWnoU=1vSY<>wre(cgvB1*8-Fa3Aj_v???r@ByH3Ge`;?f)}*R%|ZkTz{z*}%wFow573D49{fi7-2mRoSX>W%v(DI~&V1 zOMThov)d$+Xci(RQoTq7WIl;H2~lEy zqO$FqW%tCZS!bs52|39jhLasTEap*o<=P-@a)pT{2?{A#=(c0Y&rw@`9p;}~v?M2s zzSl*5&qyDI;+!N;qp`e-q=1E4Cwh38V%3AwbaShxekO6;gxG4D&(xWn9B)3W%=mI3 z3;1?mkj*MYWghPc%!x~Y<{q4Hn#II5RQjtQH4{KVq>^3g4wJ<0_meT2mZ`8A6Fd2e z$Q5duBhY-@1oaAN-}t!5o&!0k8;KRjWKrJIW9K(j`w1PrcD83@94AH*q1y3u+`dUqRY9LkxfQ&DCD9JEYOU$J<0Oj(X5 zje9Q(cbo$p+1Sah$85siB`a=)x5)d+HMXn`!pu<2tA+(rwC<^EywBa#$KgYoq)I+q zziNvea=0mTa5p`e%#ozx1|$5;Dxd+&(5s*MG+R&(FBsKRIx|u7B|x-lD#LV{CkjNk zOxO=3GKE;YM0B@VlDs;_x(xa2tksTxzzf8r$7Iu~2J?U_!NWmrwSm{5JCRT&HEy6{ zc-RP&f<96(6DfwJSv%HWZ%?P;n>}6DNlh|oXSk7F#BLRfz%Kgo|AKQ0yIE&W=l%Z4 zPa9*Wjik50G$^0p6Exp({>9!$Zmp9#8Mp=+r~7dAP8MmQXX+yjhq_5>G3RjAj4I_r z-<~4f)j^*RA3k7_B}PiTR&@@0BPL1)NC=W6Db-w*{Vuge;Q%%dlcF-LAIibWm>_#f z2+5UsoblF*Q&$I;R^^MrVxmL{!ma(FuL&Duvo|f0b^o(E3QVYz6x}kF9-MMfL&$PO z%u3q*K0Kl4RvdqHbsIO#OZHq7_o*j>%>C-8P!>ee1*k;it!{0=>jVYnXLOt;ar`cj zx{*psMbZc;ew~m!EL8zq@FV2_vk85pgs0-&@21d)XW&7P1dFKgQXnbd!Bwlxxu++< ztW_yw|I2A4mXc1xPKm9T)U}fuHNx20hFGiqAd*(AaOl*1JqOCBwh-o2 z2NrRv=eb4Bh(Mf)Q4fSuk9t4=n}<5l^{l_#trMV_H}HW)7^{zKMTt2X&$L4QRrHy9 zEoOWWF}Ot3Jt)gWWB(PLXBN{GjmnxOq?$UkbYY}XR?16PU?+)kS_PDqgQ17QEg>dJXRN@Y(fExca|>y`2(H~)1%UY2{

AW4d!!-|)z83bl4B#`4` z#T(gljD;*=9zr%(t<%)cXEz-9P3Z*agq?KxpH|~w73|q`xzjQ*G?Okj?r+fB3QsHH z0#bIr41ziRJ%tvN+oHKy)U(jg}J^+yLq*0n-IwOzyNieH=PRa z`58K$n@o=OkVeLdn_=m-4K-N>AEsf%#@>t|3}(?!;CMz__dU|E$8s2P1ZBO$7(}#S z4{mIzKvmxPHG%dLzvd4RSm*@eG64n@JMbfd6fZ_@dQZ9z6gDQ_#0p_C z6pc9v0o^=tt|nkuMz48KTy7(JS39ScqI zFrC;YEU60?FUo{xx|@ZYV1=4!pl-LyB3TIcJ>VFtc!xjTK#RS~S_%Omi3w5>03^;*Sx@TzCn2gV@#8;IL;t z`Iya*H3<^f=znMu(2lyjBEV@S^sT!+)h@L=SWjfcu&8yI)E%YmuHdAr1E~q4h6t+j z9w!9hUS~rwRpyum>fV7I6P+EmAQdh~D~0&}#P8R_>N48*-t)eJEc|%V4tuI~W&hz0?2Ki)l}5cFd!`g5FT~-A}BJ;02ZukFP8U? z0ZzJZ>;|pWvQ95=mnjjK&VP4rO7D`=YJ&hDns%*QtfXiy7XZ8|(V%-lmq(m3wkYmo z?}9-C*pS$BNIB{H#_=SPnG)MI!7MfHp)aRG*d`k;H{-#E0jZZC;b1;|heu%-SZLi* z<+7rKod$>%Q-MqrspYb7A(wfhF&|4C2ul7lt?Zaa`gbI}{X3T?ROS1__#@>IeJ-Z{(VVWh= zNDl>d<0Rc>GGwjlRVZ~%Ns^@*W(Z}9v2H^$Q9!Io@8NP50tnirV(zolJxB?kJS7UG zugMCDlv(wMqB3&q_!OyoWP@nccRKE(oGwjLiSbYtRnGeMOuMi3wR_?ZGOmp1h0|1e zr)0fcj?rbOT>#6pWlGN} zkCnt)Y_`fu;qAz$Re<$8IU1u~^ry!C$%;nOfaz>Tl(qVj-Y2E$%X6kqx(46s1>i_^ zy}J+&M?=K1Ir^@UF+xzm%v0G=NF>c4vxOFlvU5%sFd$8ihjA0qkfsQ`HE2AZ4KRqot{er*_rK;nY zlEsRbCzhUOfKpPd^B8v4tVL)GWSR&tYQAkMVR!!pJHEIDWg|d~Q8v4tzcqf3#=z72 zm`CNvNU#pBhnZFq=HT!WR}O`i-=Df1Zdo#oHP;67BG$){nQ5eGHsa|b_x9(KY7d-?Hgq8k1o`m5Hzcv zaZ)Q-hF&I*W7Z|(wBNc}nugQ$g{SQ-gb8J*H>NS`a+!;3jq{sIOkWlXwn~GNnWlms zu4b9p!&eE-jMr;~^5$T)Ot{6-f>sKg8iSeW%*QSZxnqP$kEepVFh@FpanK4%jkdBq z5TdN)r)+yKHpC`g?2py?lcrGBpDVL9u2lKw(3ir%&jjoV!zwa89GSkE(Fy2t#4KrV z5)4^r5ix&I@afdsY>T@ynn+nlWv#OnR?=M^`PR_lXqLP$PF60BoE)Y8CxjYV&>#h8 zvf{TD=A^KObnURbg$-B?LYw%+Iaf`YNVDXsI>p2%RW_UZ&VJnieapYiXMNWI00np% z0M4qK!-qvkOyj0lEYxt`le}+qv=0ZXWva;0mB4`r1l>qId-aEA-l;e0N_!~q0u8qE zp&keL$W0RW_y2*On-GBqDr%h^t+YI%{FS-We_on@9psaL>L)BKeb9g z<14hK2~P_;h@4XSGyPPd0Grn@?wATE5nnVLe9hKl=)4N2=Poyl>tz2=h*vI6awwOV zNg$zuAwgEont?|^(J+~XTWG&B*`X*XhgolQmQUlIXO_jRnX|Orf;jtgx5GVVXf6e# zRP8yOy{||KZ|uoBN)WeFa79EFxsaDbt#qPD1Vw>~U{yIC+Z**}wY`K+WHsNq2#(eA zudWixjmi9G+gFP{p0)SZNV(l~f?*s7N3CX>Fw#J!WLJkD!{VVcZkf3fLfuf6Gy5=D zZ~1zTLJ-^fXcAvjTDmnNpZNp3nFo17k%HRX#{t74?fdcpTMM}NlO&B68D~s9e?YaV#1XNGT#IYW>p-#a z;F3SUyxf>dR3oH2O0GRP23B|=4?=kmgax%H%F4)97fBGXN}*S~4(Cj( z;4|N4MG9-9y;n`Ha}Q2tHAi;4&a@{&FP65dwdq3HZ?mIbgwOe$q6D=LvkeE}6I@bw zJ@$hbHMplxs?peYEghdE>4TRXmfwOjD_@kRkq5*OrfHBJzH%{D3piZ}wc${K(Ey`~ zvXEeDliO8k1K+JcR_)_~w#EkDHPLY~UC6vKf#zE}eL0gAC$k=Zj6Q#T)$Qv=PeXP0 z@m8T*cSRK^g$5@rvUO!rKVzr{^_dkp)RXwKU{-XOrqfk&%d`211eOP)FKc*+Ohr`n zh^I6$X&*1Mm|c$xVd9;dBF}Na(j)0v<`cH{Y{d%{AbqfcJfl3AVb$eKxZvoH&0S;m z$(@~tUt6JTxsl^V$U?v>g4=Y2rP$)A-kK~g zI~>mrG6#1(aF^QvgNn`fAzec_wWs3W81LSe{okAAP%Z=k1njKw(r;3d+e>Is-Y9;x zWe(oTM00~ol`S@yFgbZVp_BV64B#S0fTqZ@vMo7@5+!xj5Gw(uxwGYa{)VpB~ME^w>$f;eVM^vWs|GT^X#gjDLbo1*81ZaS4j~$oAuT&rGl4nbVHL~WeA?7 zw+4lVGS~86eJ}ARUc)i43kF_EaKyw9oST5eMz#PV{Rz-(AVn39Wx97ciNul0oEN=_ zilzGiwej|@M;_=*?RH*7;T--A-7NWX`GlqBH`(^xG=mG{sb|f9T4$fR{NyAHrN4ry zc$*W}osOAfIq}L&WY;twbQN02+PRilomy-n{YT`rKsnQ3_+Sj@mc4pTcGweLzNtrK zWMssa8Z5{YGw(ry8gcvR>MI;df#&_k?yyZ@$4(sE!Rhr0(3?b74OmO_&?KRQ(fOW0 z6$#W!?sO>sEshZKo2{!jIxX&FvS-vx@M6o;(;$K2DnT!0>qBvlpPD{1}3ouv>CYD>hqMp_E* z?~pe0lAl0`t)!q33OMtRk>4`1)DIQ_tEUQd0(U@w;mfnSRUc;Z7ho-qP0|j$=-)or zyY>=6vEGBFzZ0r5Pz>ZbmXO~K`;k>2(=oHW811r;+B#cC zlwJinwwa3}Cn%&y+)b}izJhSbXF57^oN!j@)DHxqJS32bP#d7@$;}a`Lt9;2zRcpd zBm1Zm-APkl`fGD(a-Duhn%YH`VHC(1?yR)Tt(y$JmSH zB*oNxSP4W6i9CFTepp5*U19!S#bmBmtV{hU=qWk)=5uwo7i?I~A-_ipaZn5j?aUthJaeO?`CZ@Xvd2vPMD0sT&Ep~%3t(7+#Ri3)> zkJ)gC#jODN7+W0)qjryi>Xi`uL^f9?=kA#1gE2$qc|l`(^u9c{#sQbKk%C4ajg;o9mx@Re-Pnatjy?WqXKLLMMI+ab^}aYufAM7y)o z6}4O?COs@ZLnA!Rq^GnNO0LZ`qB@YI-m%IQ0BGNIFvFCsL`!5MvekRSVmi->fj|jGp z_^5|N1T{M%!b1hxhfCmg>X}=cH3H-eZdQUMRdN9rs0^J1O5Jd4>pVAFh0Az{=Z{&m z4To$U#2mklnE2LI-Y-zA@{t#SpBO&$K}aIPGO5m-6$*aEcfd@nW4T7s#-SEEK5~Hs z3#F&k83EiN)cuf-)>5fHFV0I=X_?g!HEv#viS}=imMt`~bR)&LJ4snNr`n|9?DQduPaaA#VWdwN5l6<{Xj_#y-XigtYPKtVCQD$Ud(c$zR4h&*N=dkj#r(Q|*TGPOZWXA(OdvcyfE3 zEIYdh*Yo62{D?OV|LM34iF>MW5~jb#O}{l9c>?h)z&OL{p%FHu6Joi_gSJI4SVy`I zSb1AUg!IN$rynLMm?CMsZ|5YDe|%&`nj}~NxdpdZ)@o{R_Q-3ERp3e*XaSa+;QVJ{ zhz6EN0C)mRM%^ww;TaqMI>BZ9M|3yDp_2GpfvpTNJu0D}sMi}34J=Igvdebh*#=

nS9}BMGn; zxD9H^H}+g?o<732Q>^Lp2&ZXtA8BYqYeN@PeS6XiTF8J7Kedl4dp`p@RV3ZHJyjd6 z&cc+O;;>}SJ}&8Grhky*ik1~>nHbVU@DOSZGCz5a9-pBeit=NpCX~GATF<|d0JZwK zV3pyJxJ{zXEvmcm z$^)TS``NXYtJ=+$%_wR}bwA;+;+SadS4tXm*kdGaA_vQ4g%{_r^;%5gaD3SMQ!se<3&Y^^3!SXvI94GIC}`5>`Zp6m~>oK8%O~DY6}U{v*dOS z(Lrqz#R>$!XO5WQNLw>W-SZIaL*TSwr3j%m_BdeHBNdu_%?wu|rDo^>yG?-VEimA{ z=LyQcy!V7N0IY!c%V54qlBksg)C}lni6MGGrVt6FFWaCs0SLr7kijPO>v~wd+HK3M zXx#wovI2H|N{Q7DQG^*Dexr~7;jYuC$UYe?n1l|646O{}gf zs2{_fVHq|+fU-MdYIo0F6W7Ud1sEwVi%| zlpO31^T{}O27MdKaC;Yl95nLQP22bd*efuBfg$S{ME3xV@G($Re*wZF{x?TIDl}we zANn-KK;kCnvDwRV3XT<1QK*Jl?g;B7HsZNlVr-_u#R;v?q0Z|+)$HRwS1_T zi=*rZROb)O_w*M`+N||>3$8Xx*1+KjUH7YPgtWYI!_J=!W2@6O91jFQ^}dxz^$kFG zSDCa)trEcD5D)udDm|oZ!c>nk$J8d;ASE$yPD!D+w0B9ellRlardb9*y3fhxL*)xK zv#;(7VQo@r9^$i7B(3>F2RjUN<7Dy0KB#i2^ewSLky{PdeH{gL5Xq_L%HOc^An>m0 z;;7<+XnI@@M9D8dN6|iZ1iAy_)A;A*{-CQC(3tZ2ov!9u+e&7fsIidc~ z`6#1VRI8|PG$x0i4ws}uwsrRY(p&n7$d$CqT`Kh}${9>o1kr1B*(S}#03Y*^#SaF; z1z7QahL80|Qx|lP;ItUWK|)wcp`x~~tzPsyT!bR;^-74VD! z)Dz>FX}KC_GvLqPfYcF#uP+H-@nxzJx0l+ftyvlS%cFmHf$=f|R50Rl`~=X31Suh$ zL`%ds$*F1OpIPvt1#WW@-jynySLsHvYVg%1;v3ce<$TNpX3Q|Gx6mK%&!S@7)C!?Xn;$rUj# zh0K9;_OtI|IlOtMuS_4^SFsfW!r=lK;TS;U;unZIJ8T|Lor1??4gkOi=Kwc|D2+}yr`OV|Sp+3s{MCxf|V6I`fh zVnG4Wnq|P71PUMy2jA!~D8&Lb-_lW43Yk7Yc7Ey0@&2ZLvjYp%_faT0B)taxPyj|wtc*?(FqZ^ZDXdiZg#((8b#r_B0{DwuBGb|a z3g}+&AQPYdj9#F^1wVwce-9|NE_s5Zk~o)|z6e*S?$l z^WZx6hOS%7-UbhF+9$`@Z+x zbI#i;6PcweM11UxT{T~iaT>?p6|uSSbR~>#bZf}#oex~EpI>dl9}*~uNgDxZTtLDB zy`F10jFM51G*+|Zd29^5_uYEZp>-pOW~k?WNi4Z+fw^#sWquf)T`$hU-|9}CF+z2S zRVJI(;X;!!%hd-fbH>Pw%951UK6fkg7&}(5x>hF9;?zv!8l7F~fo$T)59DzdGb`{q zne21N!f=pS9JPi51Yj^Zj4Bm_s!UKzwm2YIE5AO422;)-IOP26q3*>8WT#K7IS+~Y zd8e9`b$A`1Hhzw+rnN@(>#lb9m29$ekSBUqLCrktXgDU1Fr=rZsvyDXff9lPx*BHk zQTIB7867U7k9g&ifl8cj*zOVM+YVtIO;Po0&=~S=IQ2egO9XnFK>|XMR3>b;;?~ye z3k|m43gC^Bt}{#ij=x(lb?-1G-`JQ)xICH^aut}a30vpXYZxI|-*7U)zB8v3GX zJW0Fq9cfwCp69~_6HL|s{V3ry!VE)xmk0!a%oA;uo7+glS)Kr&Newp#7jF!~g*d(% ziW&le4WXxRYW1v*E3+i`dKzhyk#E$XU?0RRFX0Qg&7i=l90Zlh^n70WVy`H_@Zi5I zP!KDZ4CU|R@^}^mRN~o{1`DGWASw_zat$PVmx7(`Xn~I5 z0Li)A%VWm77@iwAYU>D}r89yYu&PFO3-`gME-b7zZ$&ppCspn`rC~s>olOX5+ zGZakGZ-q(;p`jUzad8sIz^AtDpQ5$(mwoj+5>Z0^lly~+!{;HHhX7!ad|evC7(&)_ zg3scgANjlLe5QI1Ww{ULBbJ!)(}^Vy^wp^5Py41&kYZY2j(YA=NVG~B_4p~+hIMzM z#=eB5i@f2PMqy0YB d%)gGH90+mGByF zoEzQ0=bS&@_qyEI-ZR3?`mS}yC+@X_9;wLTVv%EAx^xLwL0($@(xodYmo8oYdi@H# z6DZnc5C6LCs4gdYsi=o?8D3m9mr$0tbg3i)`_%9nyvDSX*Kxdb39sqmpUZ8wxh9t` zRkkWfOK7_4ubp8y5o?!!3gK==olVu|Y}Qh3cy0b!7WEpR$QiTt?dX?|;f}{)kc)BT zX)xgsNJ>`jA$xUQ^1knlD|c@YNJ>jf5tWJTlaKI zP1b*XLH*bjzx6Ja6?Ht_;3vr48=o4MBPDq|qh5@na}~Ab^(Yzj3)Ocv@^v$OqB*rr zD3BrLoqnX&g1U!4yEl_qe}K_Iagi4s0H zm9ybLG=0uCa_^%?7 zSXY~!ub-%3V{FN~e)iM2mG&)gPn3={lh=U3d(PH+tduRrdF1$!Wfi-#-IG5RCq+8L zW>u$d&76sj>H>$R9qWaw86j+L6@LVmK2t{jHm}9Y(RHUe`jp+HQ!5DayBlSM0I!ov|Ic@i+#ylHuotmN-5&9HHQ84q8R%3ch6dCL8ryT06 zW|wwW-5d7|e37<~@H_Jnyq6>T=_l4b<+^eiw*8?OYritB498T?C-qK3oV&tP`M)@= z8V(pE1eK>`&!W$MK21UWc+r8GHn7V_RVt|SOX)nd(`Tg;Yb>Ux*dS@2617?QLo4#l zBVu%lfJVbSUQe`}!DB87*&oitOAO4eInF#Q&0jveKhi|9*-*sS>MY#-+o!@Hd{KMd zI>qVYY;33MGDY!JbbhW03tD%3hZ?x(+0Vw#Nz6^t2s^)+*f3TfcN_`uPP7!!5iLzq zxzA{g-0F%R(;b!}K{z-(|H9K`I_h)3Fs}OPl}r5)9>;4zPH z8WR&EQ(KC5Gf?WYUhwljBa(PFOd4DpL9j&<`gr6I^`n<>AeIid=lm0yEsHQEbD`mFba`2Q&m@WFZWU-4Sqr>MLw}q3bI(2O7LAY=Fpiaab@iKnPexIIx z_W$oUpw@Nnj_!y^NJzA9w+lEhf9N;Ht}IDcvLF4s_5&{X?4WA8sy;|DoB{3(G_*{T z`;}9L=9)v~_ehEC$v<-66bb5^ylhn!HtG=8ng(TXAg+Az`mOT1aBAKjosO{bpB5HxOS^QUbMw-(^Ej zT|IiH6UT^LqMuv z)kL1>@VKOk@9yc8nT2`PMo-xZSlI30kn;pa?Y7bQc<#(&>a;-#tFRt3D{z+5(;H9V zHplz5eQ?0I&iQ!$suIcm`dC~UC-(IX|0T&OuY(jrGugqntV;(|NjwV6Bb?cDam)t4 zNJ7J@>`Q~OWVIMGY%tzWq4@W6G*Mi6-q|S2ZFavHElrMm!JE|7Jvy$-Ke8huBa`3= ziv2EjCHI+T_YM5)r~yUk6z)m8%C?yJgUu-)#^)|akKIPxlJY+mEo%I#u$?Nm9%DmP zeSSXhK_=wZ9of*pz(9_lZr|cLjY%60HYP$utbcvZR*W-Jisvv~_@1!8_t3k^t?!#( zZswBgDBg;wNqb~h96N<6V|#y;qbx#}!(Yz7)N;6pY}Mh)(B8c{n?SZ^id)NMYS<(( ziMrCYeqNkeDSsDkzd6pAwcwwd#-8HdQ}=8n``_C)q1wC%4-U!DZRlWOA=To3{lcdg zr(;maY3Z9&gPmz0BPX4pU?O2$JcJ#u-iCdp5VZ}H`S#W~7B{rAlI|ovKH>)0w6K(xvT|5E6VUL8sG0dld?ulZyJYFbn?CN1mR-sph?@ zDg5@nN;u|9N;rk>ZN*+*UJ3E)mu1YW$Zp+|rKF*uG3lUI=%93wa-vgLm?TgQ-1ybx ze1ed!l?p&TUHj2<@r)^fzYKaW-aNBf9^}rp!uCh}(vi8AnNO&M|4Fa%c0$$oYZ3@+ zV&c$zGD&5IRI+bJogK=LrNx`xk|nhA1O*4rj?J`EfVoO_R{o4e z#9dk?LVgYs4AcCk_Y3ua$4h*3bjP(msB;?c!^@1sBhq?$l$nCj(&xrgzR{Q$X+x>g z^gT2;|AG3i3T`gse2tgKn9%^T`g4V?+{MoIC!J61CkR%lB(i0&Vap_q#J%@b8^V+& zRI~q9d=`^>R{uvSBA^L3fRBCt1KaR)lsS{&Bo4-MY!T>?khV6bn9Ib02={ z7}?xLmf9qCjpc_TZvKofj*C4l)Vx-tiM7ufeDBDGb2Q$b@jCu93dvMz+GXMUc?$L$ z%HDNeYFX99P)Y#;G5@?(J?X0nA|AYGjgVY|$Q2?;+)ERsri!;?p28{NYS9wCCI0ly zt?vec59^kEo?Ba(FROeWnUzB6&1VeZ5j0}0LAl%?(mQF(HPK5+Rvsm^i=7|d@#neR zoT`&I0{!LtCHdUkt?33dVJ5*Uw(@A^i*5Q|#^0Gb9aKc2m9iy09G0)*nz1T7gku=V zh38K}I!%fZWcKf|m(Z%9hMLDth$}4@6XWxlXsjgMapPy-9qkRs`;M6ABQ)Le6XN+gp57N{aAlM3WN-Z_00I7wHB0 zzyn&vYKeI4^CYqAzuJA@Ai(Xq^(-KkYT`GM(OWg=D`a)Z)pu(0535`@sU5=Y*G4!o zE}Pli8LM+##5<~Luk-iwEU-;`)Id$-pZp`2$2_jj3^e|g~7(b?S4tjU+sW^kyTkS8#8lU~kkN-d zDMAL-&fU2)R~7ctr2))z)z208*h0h(AdPn1n%BKQ#-GQM5 zE%&R*`pf@oa*;R;S&#WU=KY*ivnFEVt$sPGVHiCOD0CfhTNQCuT?+*a^xLaHU+d%E z>M+GMY?Eh>3*T=F@$<)PxJ-Y0b#kz2PViC$!cgZ83zQ^;mH!U(YNJpxZnMrTC2 zMyG05~l{(7w}wzQ*(D zhn=Z^S4C%2&lr7m;i7ZvSE1*z2Um`&6cIFnPPuuj--<^Hb@`+do2f?4mWad#d{cy6 zf<+wW<@@*S=URh`nxM)(Ew@r=f;J0(9w+ZEbX!iq*$NePckZ zjpvK&yq%pG5f|V%oJt6XyS|C;+3kd~`G5G_81Ok%exlz^jM#qYgw=ot$*=wPgX6It zKr&cdyNuURX5Je*7e#1y`M+QJ{{`u-$I3b7Sg%9kESYBq14T4VJ7icIuyt@191;G5&69i-CRkS*VL!_RQ{R=XVUFDz&idmbm*G z>h;pi&-A{Y6b2l|d#O16ya@aYHc3Qp z@W`U;-F-gd3tHDfl3TI zUuzhJ%U_as@l%FP=x!W!e;Mdx_)68qf6UWh6&ln}a{T@HZ3irXFg^eGLUZ`yU3%2} zs-lZ8Itq{kSo%Qe?`PLg4k0i8qeG17DL{BbmVZR_|CT3#L|m+32mj6EPx{vJ7k>%N zHGlQ*dVQGww2&B(e)zi(eU)@5d*uInq4n`G*?%wox5WQj$Ri7=u>N^}pE^zh`lsyw zURbmQ6Z4as)k4uthnuTs|g=y;S_2+ z!sm1#C~b}OjnDZ7?f70)1Yq$8N7-wg2w<5U4hIe#Zk3S{abAZV^wNwEYD~U;Lcm@`fGD@G0DkR z1zk9QkdrlTfN*3-jcumt?o*@yegXRjS{AE7Gn?O-y8w`5e=HcC@=V0-B%!XjtD9xPeZo642bdSz_9CE6<-J#@x8z zNy!!KR?wx;-!6Vna0DG|pG*}J`r}fhig=h=zC-VZ&tT`3i@dK+$HZg-BokJQ z0%o#|?~Yopm?GGMo=aqGWMl@o+4>jH>tqJ2-;k0#e8`FP3fHA?AC!}>ONu)WlylNc z{X3L-RRm*ztf<-nY%J#7`Pqqu@R8G#C#0!BPdjpcT`wL-mwOOpqVwiyz4w`WTR0Vb zsqqlx7TT37ff495V&3DoL~uVA$;rz0B=JSyJxZXpx~a8*?1-j^J-67MZ3(%Fd@)(+ zh>`N{vC}2Gwi^hSjr$+tRc~nA?z$`9LHaKW-11ldQCZAhBo*3QTzq^vcLkr`F$rY_ zU!4$1!eE5t%P2eHjMdx^c>`B0p!S0=x zz%Wt-9A(!Aa#XuM)1o0UXprJ|OaCwh1(;NTyO{@rvqZEqK`y%hO&d<+b8yH9F zNpceT)hvX~qQk=e80pox+P8+1K?|C!LVnbg4TXaZ!7vOD3;UwYCqB$)HS&z;2d!`3 zYV%aB2OpUj=%{iwjPF-LCwPYi@)7~Up!nHkp}?8(vB=09`xZb6p+*krZl_)pO-P)y zCHGc&YFi?%CR06e))qt4HO#B*5wyeDknwKv3==Bb{eLRG1eOGLS&IZVN8 zWf89<8DQK(2$jlZb}&z4iH6??(HcT)8C`oRi%Jy~_!3B0HlLn!BFciQ)YV?E=R^5# z4b3pA!iiO(=1c~8zF%c#W?tf}egv%+ngLV|LdGVSPx`f>=-ffZ`ub@NOF5nh6vD>y ze!rLAR5A-e)F~8&@08N7*$8PZB_3iF#hGY?spVZY~j)X{Dphx%>y<^o5FE|DP z5`9)Ez1z=YmJ+k_lX8@xU32@CH6U@%g#N3J$OtDbD9V?y@*-P9j*Cj?h0A zp|Pm=ZrCnDxk=`o#W?dsY~yJTW0M1Zk@?X#4do?hHkw{hdVWjs4b(LGH(6PCciyUs zooTXMw@4z*SXCmbJKa&-ell8xWVJNay+KTD8gb?fiv4V*>vo2#o^R~K2dsc9-hF{g zexP^j`>0e5gEG_Oe9b)BF!Iueq=HUNmI1gFX0Zd21+{Lw3nSm@iW6>gWJi9v!i{!x zDK+7>HN`{GMv37d*fdHQ3}39=8gk>m6=Oy)}aLn%CA(^V%nq>Cgj~ z%3x{vv!Da#8xisb0@9&^s4bMt5fsB6GiKfwgMnY}{#NHHbNpctJe051HEp@5#E?at zw_oG73#^_Y5i2SxO8b*OakWWDbeUQA(>hOqr>xXR8ZY{hho`%}arbr2Qf{{^nL;C1 zze|8M*<^Tms-PeVdV70-vgw}5Zk#$i((hRLH0vVUaI^N zPAhYVXj=pgdnJ1`Lq!|O{ih}`=0S4nmni|w^f^zt*aw~Dg~e4mIyyLI8(=UKRmcPy zB4+j1Uree>%fZDVQhdwOQY=sCp`mN{IAQ0x!=EL!Q?Pd4W}GH`Mq9|4Be)9vvUBh% z{&NwTeq_1DBtbmCeMW5yBZy8P+I8;BxK!CpzK*jcz2xT&9qR8Ap?*N=v;2P}fp&-H zo=M5w-=uI>f{<#haR%NU#dlWTFzx&_Zh9}_7y8b2D$(WFZ`*X>!qOV)kdu%_jFoM? zNUzPw+EQLx+LuR{(RbKC%0^J%|EMHA+>H--WG?#yv7@z#NtSDLbo6|Y_?H($Ou>H1%=kr}}=C5A6 z(Qo$okxhOY)P?>`IZ{v_;%uvMsfFWTfG$2l%f)VOs&Xm%lcG)7=aZ8Y#W#R?ra6&k zAinPy+c#_71q|0xiY3A@RDK&pXYE~~LS2UgsKmgA@$Oxd)5Go3pPr3bM{b_5Gt6cN z!`&2^P{U%rtfl;2){(?;Q)A-@Zf0cWjh~(iNwfEJi%7)Von*2vA?4idc`f?B*?H}B z04dsfU%H^(8MV8+*sGer)pF`yv*iBqaba=)9;Ic(!&}LBZUnzHv!l1Boh$sJXA&dXgF=TI+g>OdJN9mUkkDV;yqPU+t)HO5; z4Qlv6G7mX@ol-Myr<1E&!6wCRS@vm_)&QF$Pp9m|sggKS1QkW&bOzuj$XV@^W}bRF zrSGGwcdgLt74EBN1qvH9%tOId3V^C$9b1ca^$-A+EFCT=zD1r6Bo?Ek*=}ilgcs6= zVX~-~pfhxe`H-)W4<0$RI^xLMXI#!}PpY4J`ErCTHU|-2$fDt{uc6ciWxc(pLqNx4 z>)wSL;UH&w`uVzYiw2Z4IQg#Lsoy7CSCHR5hffJST5ABe{>V~rn4%88bzji1@v56J z4?J`0@mLwGJAzVR2S9e|WA7w$;%UG>3d)t~hw~kT%unn2Xbt9a($tkyRP-wyOd(OX z;cVY5BS9?6dw)@;@T+mOv8;$4>77**FrPjxE=(>3P&p?10DidSqlIHW}1 z)w7_nwsQx+@#eAUyM)jye%1gbJRw=~0>-E;fm9Zq$Y=Qzr{i=fGvbCM%bj6D=9yf)pdNT_n72L-50Ir&kkfI zv{R`XIE2Y^Yu%$noHOZ~3;Fa`r<`TRK^O&}Yz^ojp-Nn+Z+^lgYTM#G>ZGDv|2|F*uL!@duR*AKLk)8sbTPHZdOeulC# zy{c)V-RT$dDDmvv9R2j!$pN$TQlErBzQ%BhkUzKF1wl3cpp?+~q~VLLj5ovkdF~y* zqD)*&d}`XJ>lBG$$$vH`bk#cmwsTE@sg^Zj=%ZinO+`Y|HX6F0Sq&J9o-6U;)Yf|* z9>(kG*X5u1QY6{?ew+n86x_0RpXMXIGTf{N-Dy(&E+!XVloH?6JQ5Dg46^o)!)Q0S zxdV08h+V&C#FH(?QwjqS5f)~u+w8WtLfmnjljhx7_kQ({&I|9oA?=+UZSf*@7jn?s z+<;OhUfKuOW&+tX;pK{lT?nw2+oF%Q^;+Vb+_22F;oi#7XW|nGZKb!(<>*d7k&EG@ ztP7WbD9sX}OD&v*65x0#6^Njel(*U7iPOY<&L#9H3G|_i!zSJdgC0o3ZH6OY0oLf6 zKib`>>%75@;pqo8>VzfIcL1Y5Nte7PdGo(G2o7v7Ne93ZZNo+UEaXEG@bSo_%aTui zo}VQ`{sp}+MLzFg7`d&R#%ui);-G(7J^Nw0Pr=G)Sx#Q!4txBPU}vy|*}cBxW-0`q z`6VfToTx?q%L@DOnIjU3j|Qx`j9YQyCcfF_tUBRLTw~$DB@nB!Vd2cHAJs+2^9|WI z2l6Du@SrT>udtDD`hGP~Sx-sHNmCQ*C0JWB-a6S2i8T|P-g$S~JTVLyCEGF1Oh%WZ z6Be$4wPdtiy<3oH(i8ad8ag^?JzfxDJE}byt1t~D(Q}hSkXCR-WfE-+zZ!DuzR`e@L6uX` zM3ilZY4Rr_mwP$?gpn8;r-|WVzWwvFT#p0MQR^V>q`%L&z+wdmpm_pSr?+H84N!nqVGcrxF-n)fqC7gU2(cqvnd}<9 z$2K(4^jc0K9&Wf`1uN%wA|3!8e-^YpM}T+QW%=F{{yGQmW7 zPfBKC3`1u4)nKJU3n(DW&-r)04<>vTG-wo(D;dfQXsYo4qksu?du{`Fy8~U1r$h z&k|kL#&}7xB=SrOO$H2hUABqT4)SCa2pc;&Y@5>PxCzx|Nq8Lg=ET};`%vey7;3!F z60tAm=y^RJZ%GdtSt!$;hDtJPvc{$7+}A#@s+jX#m#Jm2Svt4_*VLt6GEo??+!uUU;d{YNf_N?B`i@_#$Lm?+`5DI<$VEgV>ac1`A*!V7`^ z4pBNTE&_XcPzX2z(R+Ke_&p`P$ZO89!2tI~K2;M>uKcJmbmgr0vaHFFhhL@^6}|Sqm%kOnRbOwq&g`** zU+%O1=jzZNrf3ZdX?INxG%d$#J-vNim-~QL-VgmY57YrUuA?PLmQ0bZZ9y3t`Hp1ZGu~Sax zv!FhrFK_21w6bFO(9zKWSi;EtVG1A*I$`x!%nu0Oq$zH$41H`43J?E)`Bq2qBlLL< zljaiZR=gkAU{pt`IjFVy45T737-1NNlH?w-g$xt9dP8q-L^_r^Xp>NkZ_3#JQ1IZO zkf(jSOdt_XBc^hL<<4hKv%qgn3|S0ir!b84C`?m`m-lC7x~AjH4K+E@EJ7uOIZ;Nt zgpljjd)H*-L^EA@-YV@$dxur*l+3V3ov!k1YN?Ty!`wp0gO#j%Dn5NUcjh7QYE9qU5blQ<=XxR_rGQ-tqVTK3NGyw&(LRZMK|74n*~ z!pd^&;Zbk&n0LbQR{DJxTcgvbjC(I0IV9nAWOp(STgR5VedN~&r&hHYymz!)Ro(-f zk`mZQ<+lx4Y1$^R&$kW^axz1y5DTtf#$>Ii-ld)-aBulp7MVg~2aF5-?k$0tQS ziHtigLfN|9TB@-{d{|jz?xFNBCn(Qd$bb@$1DobO_>K|0nCA+*QRdu4=rTBFIGT}e zXu+&I%u_)#S1Po=m{-(fjJDT{q^|FJFW2Pq3y8bA^2;=K;yMZ{JaESKfc5DGl_INF z`W{^ojC@r@*gdXHXITZ4bAgMXzsMe?IC=e2O6uN`S)HFXtkzL=fr^G>Q)YMHkY zv98k3#FNpDX^Tj>JhFmM$#R@R?#8}{jK0sXm%tYY0=5*C*Tt%^ua1m68;Bhw!-4}1 zwS{C(WhDPH(Aa*fHK=rS^GUqczlsgfhOH$fuV~o%ld`F?^sy)p2N3-2@R_clj=7;R zb7|ii1%V-Fy|Wazl3>(WoQ}CoT(5uU<;zP}9mAEvuey{)Nf(|rDX4^Y56KCJ(23!5 z-b5^h5vKq4r5Dw}uu8Z*&B*XcZ!_Z{RBwr`71X!fZ=cUWj#N5W-?nNuX{fZ zOCQd2mk6_Ju;H63Mm!lmk5iBkB5v+w8h78lx{pNzTID@Ffv=LZt(Lc{SKK>KWl*NJ zBPJTAJatj)Xs&;RDy2sUY0~bxEF0=p8^_(3+x&?w^nm48-(KgC#yX1LRIz!z%BBpn zG5?))NyFe?Y~h&Ic|%iROzDfT!t>6dyv3fe!#R|TX~SB^m}z~NT> zN)awlw)y%E=QfO}k~UrS!}g&66v&e!O3?F^;DBE7U1T-k3qTJe^S8baM7b^O@aHKJ z#-?@!d8RPD?moQoSXBHXH2g@!&UlWW=2M_%&@{n_h*WE zmmAT#nRU0-KK<}flX6PoA<=1xG)dIqFSiP@e7r!&fb#^Iwz%lqv{EfVu&*I$^bHh*j;%LRw|AP6)W_aL*6~3 z-PM%;UHBzuZQuE!bB6}PcKmAzC|NE|+mJ%GQ&q$_Z@wap5#*>eV`H~d;J_*Xva>Rn z$NIQndTsFw)X@t<2!!)Du+x%`;V^W2d!EHc3Srk9moXLXjJbp3puX~PFuiwm zRt0OLC+3OAvWs$3g-v5rJ-Jd_~Xb!)NTST`BUeRvwjT-Ic@xn=Hu2}xc} zOh9mxnhl?1#@CRCv(j#+5xn%s7tU{Q4>QWhV&%^?sP<1y8L&v1nA{!iczO8@Q+_0r zeOmAKuk(WnSqV2eh$5UQ*1?p^k~Upvvu!Mu-QinyK|xc4dlS_z80hGoi>n!{v@}+J zWj$`Wt9mU9j9321*({gcpR{41B*k&ucje8c{n7qZRy@zM{e1mt<-j*0iMrdgN82#Q zJEDBN+1GbHE)~ZKv9Uft*7_6nhF7=k9rx&$BGh`@d~g0}bE*CA{J9@Jg^GyziMAD} zan;-U83lz3L8W>76!)3C>dT0AD=NG^iqyE1P(Ro2ExEsNeZ9`$^LvFkB#s`R%;sag zjo*6L?!M|lOg(wzsT(5cZ@tPZieaKKdlwlqLWUj)vy4qmO(3Xuz3o8yS~s>-nsq0_ z@B!%HYk-UO?n0wAebNwtA!b>U&1GHbPsU$&oR2TlNH9JUO2KAOC+xOkg8m@$lnvB4 z+8HD6@bRCh$nQHzgYgyAFr2NL-+d>E1xn4Gnm}vFZaK7d` zwX)ch@-7ezWSqau#Jpa79L-NDcvyr;%NSwy*r(Sn?d5)SU{9#NK4qw+ zQ~PtDUT7Ad;`!=}Z7y}44u-$FWUau5AAFw-bb`3M`h=hgqqDT!5G@Z$B?}d z`<*F^4$GRz0k7Qj$*qydy?UDD66ao1)6adTSIN16#Y9|RuWl?h{;Vo>mH%X08PF*AYpoO0O+ zI5&(?Ws1&SBSUj^OT34u8fO{)0^EI=L)20$m5`Rcy6erlAhPS?%h_gO8-OjGF?JHr)ZGQdleBJM<^gpuM|2f%57<;k45wY1*(A+P)%Q+p8RaUfGh zKR+h~9B%<6DKIotuhaw+YrSBVl3!Yoj_$HwaZpeYDboSSA|L>$U^K4P&)dg++8nQp zQMiPDtn8TebYpG?j4Zjei)KecQUSwGvX_&A{y%%s_~hG1rR!K+|9P)XUaqnHODkHj zrN9xv%eg%UI>{Mu*ozA_^dh;m$I9s6S<7d>NSO}WgZRml#$hN~`1H%ajaR^TsB_&m zIzkq7d3u3j<}?Rr>C>9nFEH15I|NzqmiU;3dX$hU&#@e@go2_BgL(LVnvTzJ-BPg4z{BX;|R|lMbTJHhtK6l`R4rR&Bj^ zDgJS?A5vGSV$mIa0Y5#hKR*Uf=uhgMknWlp&~8QoKhF=mdi5$jJ)N|!u5Ny+9DQHx zr|jWx$1gZeB3xV!;1X$?kxQVnSE)d2qA>zdIVg`OL?zH^h52_)C>Fe*iWv=QGlrtXb*RH@t3l$iwqTmSS zi08=SC?=Is;sv|l{A1Bf+Ml{7`J0uL2G-zP;urROf**7!l zFvEn7!vJ!Vh37u%jHvlB+41g@fC3!wRh zs`U^++kydpzVG*DRE9$i_E3IfQOL_0s%IX6HDhd^cTY>|BL>z ze4H~8arc)@EeM5g9R8h^%gA^&o69V!a%;&E!(5+j1`~D4e6;TG$nH^eN@43(Efa)C zyfYd-Rz*!jlvOcBEYm?xst*GsFNjKkOt?c|g(-rs1A7?=e39cB4D~%I2EA};(H?4N z-Qg^#hEF|rIv8t=D!`G15fRcy;2Q-Kvj!s|-O4VKxMeg~?ap7Ph5l>P!X(nIzUn+K zeY>WcD(=_kQy*kV;eIzhDpRrGi{!bkgYNLz=_!sPJR(W^0&PrA)g(-IHhm}9aH^G$ z^Ai*H48)0p#D**sasRUfLlDepVw z$RnM&_{xA(G0())d9BV5yPx`=C;Lzn`0TVM#o4OUh^gwht^8)M8q0E@?a3jzbACR& zRbPK(&SJ@`?E1u6uMxjD+ARrwOy7O>noQO4cHd!|O9;Ye|99Ci^J|3jtjzdSv>4Tq zs2FqmD18O;4D@sVY#2?%HgSvumcvK^vmy{~*e;@59HQsmPEJv`WfJ*p!-XNu$?|Lf zWI%Tzx%UL>;Casb_!#_Nw7DD!!t$;R&wt{yefoQq#{9Ye=b zPmism2zHHg-JJN#tKRec8B_cfs68#aKVmnmVu`!;k;n8aJx`rd5(8HYzxv>foi?L- zrfxoOen30B$;63!(^mMSmqFrocXrEZo3!|jIhCtQ%AI{&uT50&QA1T3dxXBCk#*Wo zc}IhbXn9i8qD^hO?clh_(F2i$x=peknKu2wg!A0vd75IyaFwO!EQdQn`rq; z?iM!vVdp@!V{$DZD?=UI%(2_dzxxIf%{3Nni+fEY;P@oEmd+27v}-0ot|HkfLE z5u(T5-X1Jk*%N3|t1z8JaCE$PF&joj-JH5`m5%5FKn8So_$oOZJ`7VB@%fE>xH3j! ztKMfuFy$7IR`Hp2+nmtqp^m%KmGb#jAJW5Vmopk7nzytXuU<@@a#%D)6BZ1`Eb6qc}5-ir|XAd(E5UafV2IO%86UIv>zF4c;+Zw#Ce2ar7`Sc;7+yO7bsvFp?s({Eb_My>$M~~QKdild-$jy z_EUae`R{^La$(wSf=mf?A7)5mV4^WL_HOmeH^5VnY(RNi{yHYyw{KrTnD40lpJU=O zl6((UX1VsUJ_m2~@ahp|$#2Y^@uAeKcWRk7R6A@@9*mg_U3_^Nt6eHJ?}I2^#7%v6 zwZ_F_G%#!rqrOvbGvtuGBB2&l{-8COnYORzem~tLkN=#`vinm#-Ar$c6+yWD*|}J= zLYw>&r{0SDpSiS1=e$v?BI{cjRT}~qZDF2eG7F{=PWHrHMhHm=38{#+U~2K{mlsja z7yVR=;X%$+DaGRvL+1r}Mp*&ea7kBJSEvE)!`LKjV2oY_?Sg|aKW0C@4$6A!>-$`v zXLqtuA9byAOoJ$O)ZJFvhky1V2Z_+m*o1}kS>Bgw@>9k-o$n{nq|*C%^zFH0OkhiBUQjCJw}m8emy zG!iRp;sjP*`4u!3m?`48 zMX~CD>wgGdVy8`=oM@y?je+K{@%f1J;)SVlF(?5*4-XSFC?v!Kdhc5Nh1vneQV(2l z2up!m?#5`|nf@t&bOGwYO|TW0`V*>u$(evX$}Jb^Nm9L_nPd|F>&1ZfyKSM=^Ru+P z>qmPhC|4-%lqcphAS#lHx~$^9?eejX`2khcYhUp9(?n_^cFmESTgN%`70h|I?Bhos zE!*Xff47R%oV~;yNpACtng3+=j?(AmGi|S18pA05rOQJsSznB*W#pPs1&TO`VAsQe zuy`L&m(Kkmfxp|=8-I9sXx?kZ_lnEEi<^a|lgZ>QsNWpeK4-^Yh`>oW?O;r^Q&Y5u zQXGm&3iD<6^=tTJ&Y^dzr$YyCix@lq-Z>8>?J!|L(H^j^838U$26o?=0@eT* zbD0--L8<2S$v&g5-ZsprqTW6EIo3bz5fuehP!O&W0%A$XiE+F0L&@XS^F7e~E9LpM zzp9Lo>BEq32xu7D$q3j-2mSo|fbmnPbIu@d`nk2HUV5E^jzIO76?T zLH`Z!bk!fj>_suspL*Lo45%*512lu+6pUOMl(1AYWzL|4xm%FQA%*U%v|{{8dI9sw zB=|~+Jb4e_vVhR(bZEH&(HJE}eobiU7!r$=IKRLo96{at88TR&n z1`WeyO*9<;B)I9!Awx@Rh`CW*=~+xfMy<+=(%2c}+fTykQmwPgogNBVasOav<0xYn zX2%oBSA;$P^T{H*`Hah=f{IGdvv+n|(-OPRd~+eBqvH`m^J(d)0`w3cz~(q7!$E-F_wnDNMYQ~a6f zc|Z7rX2iG@yv;%VpA5wEF2Sl`AfKxh;?Degyu?|COvuiM$X%z^pJ8~BXK8}SV62)_ zA-IY48UA+_vTmcdKMHRaqT!U|lJn#O--Ww{^P*UW&wT^@giYFSpqmTBh?fN_FjBwqJqgTD>3AkO%C})e0>T&C}=H}PRj%jUOk4(W3%yi zRD!SnLBgH39Uu4B2T3Pio1&XhOQ>&#Z!6gIR}&g5z2HV%=Cj^+(!Hc-mABx3$f3}G z`tqV_BBh0M-$h6JG71ZOg0td!<;oRO(XF+qdYaMqpflrFqW@Om?|J{8_632m|1#hU zo3ZjRes>QEELco*G1=v--BS!5NKC&8fM@yDs^gS-BeUN@dfQRwr-q~$t^OdG0EG8$=vRXDbL~BNIt(?# zZ@gM#y2d_$XMZIIt^vg99;ib%_8zbrNGUD`ef8poN>f8_vwjDwF&4MP-Q+LH1xnf- z6PPUtuev*$zvCsC-)mAZO|;v#V~+kb@VfXaAVxNt!;Gp_X1uDNga~x*Sx1v_818V# z(Blu}+fn);W7N&mD;(dcN8;c}@yNdQdXybr0e@kYjp$*xVra)@e>a-RK_u_PaMO=} z_V1HC7Z<;T?t7D*Jh*|s=ldAW1`d^Y$Mr_m?rj`O{u?3-TIy1EKarX`&C%^9!BB`y zpI&0Z!YmrR99N|e*EL{%GfFg^S|ssu^OGoaL1|w@q94zwUozM$Wwp~8Nrl!>z5>V* zL@0_nb=0J6$}S2iPLS9#&tLuNfk_z#=!GC1T8I@Q{H>yd*YIQ_43U|^^@Z;rEmU4K z6NNqgoSnwR*2kwWFqONOUX)b*tpHohmM?~Q_2vSC5aBXerMV@0fo}?zTS26f0bRc} znd$qno7^?o8?8|QXB-V3E4li%I{$bAG90-OVQO4Cc^6CiY1zUTLYbi%-~QV>1Q4QI z^aBI2Sgp%x^gC%qF;!87+~FrjM@NT;@3pS{=z7ZLU36_fF*#|O%e&IY<~9LaK0avw zz66YM@#D!ZKaspIyx9dgIJSJx(4H4b@Urv(fu?657sEg*fcyzJe)a1--6{iApKu}7 zl?EkQ_?HCdsB|)~FM^V&z_gst0at}TI+=RXOw!AjKDZKa4C1xY|HImQhjab+{liH` zGLjJ`d!}S&h9aXxG*vP~MRq8=va%_Z6*5X@kx$B=p^{l-goG%o?ECT7_dL(*x_-ao zKJNSe-N$kMaUS2K&*%Mqjpy^Ro~PgQI)rNM9@$$X|6Pv4TjBf$I{sr1cuCskdQVU9 zwbM)22fAwd5?$UJI%OlK$eu#GR`imDDJTKqk*g1q-N!J{z_JzqC$b!9=XowD~!l} zm+GP1vL%Ha(nW!*S{k{_+DtbWX1?puu#j2agylxa{9wliZSFnip8J2_a`V_k9lPE8 zCuee+yM5d(T;LwoicubNZgDc&w?q0`BN<`Lf5k~^epSyb>+9$N$3kZ_saaIx5E~nt z))#Tybff;+4qB;iEY}s5R8O{^XAsXoeG(A@1=Dj#-8yA(<--YWEmu~rrnpzzNWJrz zwx|`PYm<5%tVOZCqU5GyyqDRGiF3iiDxF-sf0~+yKBkr*w=V&`K&gX;otm`j-n(Q9*koORAsX4tQctBlK z(L?PI{WgWHZPw@yy7EjZ+QO{O*FEQhRK#L@b=hQ;WOe7DetZ7jPvSe3-48<%mD#nj{?5tJ z@FU~!(m0Q{YFd#Q^cLA9>e`Y|Q>#YT;e5I0zTx(h@MYHbylI5=PbX9VbJ9Wb%ynsc z+6fB!ic=H{<~JIC9-i}gIn^M~O`;v)JFi-d_36)hH=Cz1O|XI}&cFQuHM0Basz>Y} z09Wcc_eBgE1Vg!e7PMbW^|STmeiSwuYwWC&H7fH$Ewyd*?Y`2%?y!cqO*0fu(aBH+ zI+M|P$R3E9t7r6+CM=rCV2e2Y zrMG2;}MA9tMl;rU~i0G+`-zOS65mlsZU6l{)ut>SU3?5iZ8YEeO!jc5F` zC0a>An;181+x6=sf7!iV7eaS}ZCZE>dO4|CcFMOh*BHAw$zSW{dKvOx zr!{+4q#8M&$fVG$Jy*A**Fc)hKP1H5mrHX zUV&)(IzXz%Qv``Na1k&@6F)~}m(v!r|8ulr3(I3fDyhC#xNx5TyXmpi1cXeBDf(`Ny# z8E*1gUyXwYQbO%Fim?AfM1)d(IB)qb=ltfj*%-ri1J}KRBid)r!lh=>^q@Lw4&goE z*<^3b2zC|QqT9ybWmocW!_%`=%IU;*y#GKs5}HA%*#PmyVl8w1y;;Uu+BG{oKTFew zPrT&Kn;E$ci0x$TpPvA*`o5P)=6wlL|145+<-qE%cdx4F&dnDc`*v~JRYRex_;Tdk zeR2yvnq~W5)wY=Rhkuhyd^6eQJhvJ=Z}P=-n5yZU0)NG$GG6C*0Ur(n$IlTx3+ssQ zj3Zzu^MQ-&4i?3H6fHG=-yH3rPJF4>d6ALPw%puYa3sim39xz?>4D4&A|ogw0p7Jo zy^x5MnC!eLfAUMNaV7FQEESC_ZUYP=|8ob1|X(Rp64H8hOO`F(M=NJsq>`%ud@ zU2g6Jw#%V=%=)M4KF@SQi2OABOoHXnk59F3_%H8^H+^&9r(5H1wGi!rY|_LvSdba3 zpXy>C8NRr0NJFja>pB0{@bt5DPJ?yf$ktO%=m5WY{l~dfInxXt9UpxtccBb|3#=W7 z!5TyI_ro~d$A0PXu;V7(W$#FsQ%QduklN82^|(Jvo#5o|hUB`7y_t#G@WE-@?_ZaH zf5|)5(X*F8y#_he-dw5 z|L#BE)tDFi@~Ee z8dv|geIGg+eXW;thdpHgdu}gq2(-~2zhCv<6EWD40$Z4d;wH|1%i>M~N`{nCEJN)Q z^<@pVzrC>RSPPcOx8CC5?gg{Sp$-c2Nb?__D`Sd2Ur4w)0Y08-rrjsY0?3$zPcMxZysJuEf0+77>@)aqj%@wcI}~{P zj#RajGxN^0+H{%h;djT&uP%&gEgE+hrmudIr=2$(TeNrlWbuO}v*+(?16T=OU%YWo zxOcW8HRVgD9iO1aGF)BgNF644lloGzuy2M-1KU~3o)|8Vo-r|9`dqsFu(Q1ZwCX;w z4E<6M_x0QMUnM2%+;Vvtr-$Z({{2LkUw+>6KV+?BUl0V>K$}ZswzT!9Rxs}J2CFuw znE%YrgKQC#l$^Q#A5N+CZRzh|mA+kZq_gOGd}?swgPbZx5AK)f@i;AQVR11BeIQ_^ z;oi8|Q3XO3h+ol*wgAQ?>JC4$+CcXU z__Baqo0RNhpHGHkjOQxbg|#c`nszkZO-56On}>32O@)txvcqp?>&1+IG};9BOexV5t@ z&euF5IOSJ_{S#7KxOxT>W$d`8*)zY&>MN?2Rr&CofJ+%2s0S#qXXlHqyHwq*>4w!A z7m~^JeXc=!acCi)BVZ7*LuNY9Jl+}aFLax?PYGMZqkt!~{qIX%l|HcO$@F7-bY&&k=>)dr7eW0o`udN{H4xE6W&`6oWTcq=Fq9v2s+hL-1CAlV#6czrvJ zA5C67t4H4{BZ3mS2axv<;N^t7PQO!U9fP3cJj#FSmAdxU**yiYii*!sR2~g4pd_1~ zo{mgDnx!M&bjlpCP79w6hg`!R3%~{WyZ40)yo#C949~0qu=IFj^Y*>(ZoUw|)DVTV zxgB@*7`t!NVedOeYG#5#x*|Rs(VI?qg%Si>`R8XpJ`&gFj7$aYJ$!uCyTe3m9^dfr zlrlB2_-QiITjE-v>#?|BP*6}&F@fwUJ`t_}iITaC!Mo&7uejVJBf%EduGsy`neN`b z&140)0m4Pjaa95yGTP?#vDJy2hXB;MR%?ttn%xKdkRa>8U%+;L&*H5XJ47@P0LPT2 z3@zmclwG@-Hs~pTymc^o_vx&dnspIx^AuzB4{NJsqm8_ZF_4RO3CbityK1HY`D1U%eSj(^Tg@ z`0kK&p%>TqWn|lVfnoHKZh zJX(42p--yP$sMV?6cNF7-q_sB0Z&9L09klCFA&Lr^Ogj!UyJZZI$+9H-7m$S!XkFF ze8tO1#&g9DlFCk=mK!Dm{W3B1gCnxeHB?uDls1|9^vn<3-FHYuB{u%&aN)I{1%SM2 zkEwt08(@PV-VaF`1`7HR?*##`im(e*hVEtk!D=ITb8BzuiAzez=$%M-=R0S+6n>>f zvDo09Omi-RqO?^zmX6Gyt*f6!Dt@T63q@ zjsQHC<+!4nBj-5szSPq*?zDk`c)p*EvE=2Js*aB6`eP7v4E3AC5dzebe+9eu`_7g- z3}Q+4NQ)?xkOWgN$D_!41xS%DeH@5~s??n@g)qX5aUO3H{d2x7=?MKdfQ+hhG6Dhn z3}|R+)ofseJw66L;yuTMB+caW8Y|Ad?tWwd&G=8$_R%EE%HM5~*ctXhS^2}{%a<~{ zIZyIdv0brpz5U>=>Amk<2w1m zBaWaTmD&n}?>mO4q`jwZmfGkDN7Y79$yF#aE!G?#_OEm+`{G4T3HhH&jXC|*kG%lr1nrJ5UqKe6~+a9sF45hE|_TPOZt!-fsH_pfX? zIL<1^w5ieh+iK@A9P z-e_ZaC|UD&mFa7`(5>9O+n5h$!N1xJVVHjgb`;YPXLagL9OB&hufu6-oD1)&vrFi# zH04#41tcBurO~SH`~|GBMMvBw);^Z>#$$N_?CfXZPe#7RqonD)hMBD|tUtFeWs|pP z>?%&HE9`NPo1Drx;x;zkbOUgbjqSX`O_K*qUat4Fv^M%k?EIRV?8o?w{=#*&)0;=+ z3O0l&?04YbU6K9mhSY}gq+AqJqcISjR}4$?8cg((e+L zR*`Z?EoYQI_q(ZuKmpQ96nYrzElplUDlGFJKoJJxVJ~aVx zE#Za61U+w=4Hkc@>-|H&f$bEGdVU#UO}oi@NLTIR*o;49RZhngczEWaj)A~$J|Kyz{x2(}jE*^PtUtRr$)HQ)2GZmToYd{w_gb0w=w)U+#AGm>{4crMGb?neEM zfX0l=4m0KzWR3xfRZXnAToDraH8B4HenRa{$pKi2t%kWf1#h3~7@9T^G<>s!MyI;4 zCEGyW-tao}&VvtR9n5j<4_y}%LR!%DC20unEU&!=6oR|?$NNXHaqg^Axo@=`79-O_ zaiRkU=Q-gY`jc$u+s*Ym#NcH&^SDgUmlks2M2THS=Dac0&-Ma!7HoP%#II`Y`Atw$78D=Y0x z&ug5+NgpP%l$M>sfFm5?T%yUH={g)CuGbyoZ>fYFRr!+QJJ(xKFLf_0?0B;3=26?` zq)Ze?gS(w!P)Z_A3qpN7L8{7Smdh@1ph z>bc>I6JJcyV(hb@WS5e6v4z}Qe<&^e@_rp&9E@ris9TfEy{5#}`c$8*cF^CfS-|}u z{v2_rhaBU{PCCXH+H)l6`g+GuGP+*Xps<53;@$%p?A=m$ZWJbxtZ}Q*uTyIT#EI&# z=IpPz9|Smh@t1_2Gsv#~&a=j=_CUg#&Tf3ZOX>Q@ioF zKZR1kR_XzbV>31gH8sgOUlig>eie1~zC}UNk!ayFv`S%~Z=Y{UPEH0?ahHKFLF(%L z%(0Wo>AKEVv^##qvcCTeb|@k?uoXc^j~+GBMMOq!zUy26gy@goXI*OXI*U-hQ%gaA z>YmIO%W#rgvRFT+vn+Jm)X03eqaUYE>K{jQYyd4D)eZypr&@IMPLziP*CWB=L32z; zD_BAq%jZ6Db?Yl#b5?vp`|A#lTV$Spu$gABM77uCxg~c2dt>*c23m(E9c!dbG#P)3 z>wleO(|F%@iv3Yt*VH`WL(LiAUFZNW;N1d%Rj> z9rnaVi*61}R;J^VxXyVi<;orD)}f0pD`nFJlXY{A4xEaUpVr>lgjA@{8Rg$u5P3nE zH5vCEbXq3whr`aFEX=t_Y6&k)`qfI*Hm@C zkI0SKXIoiVEEyT;2m>zxW)v+Ka(xgPy|??+?kE+6R6zZf7n{`r zm}u{J&z?Wpf@g(<{`i z$dIY@0)hoWtL`|oq7Uyu7Pz|^tLQ@*kwCFuYTcKVY)_cOcS>KAq}u4KrSsA1P5NJf z&y%r2Lxz=~Ke@#Byki~5;|6hq2JwH1L0ADJ`~vhI73ws#Juq4jMfy12^6X@9B7bKV zpZ|}dpx=`W?F*k-gdzTkDm^s#vn|`;{FCr*=aKhhU!gf}q(d7kjZ@C&E)gD<&lG2M z@*4T`YdxPjI<}L8^BkKh4#r*Oz7Q2s|IP&g@<5kP<(p|L(9_eqY@%inMM)h5Kx*q8 z_JXSEzRnBx(>GoW93@S?=|l=~yLron!eR0Xnltz7&QWL&&GXbx_PmmY6a$y=&P#j; zh%b9gAt+uPU5dF30P*RoQNixcbj5*kr9Er@ zgF4445W5YQyqk7wgefic(`^8#9^91r4N>+}g1k2ldnh5PY8?GgXrYpL#1HO%*amRI znLitm+qJkbmIKZYmy^{zh5Gy%3+f~#Xe+jV4jfs)@uNEi?`d6hAYM;nkat%l%DQ6C zU%8t?&%*`u5^3J4-!qIH9VIV|IP^2hkJGJZ z-M-zgJ9#++5Sm4R8~iN`z7%$kW!IF@4N6urDo;(S1Nr#)z?<0Ag>fZ+ys(o%b^`-< zpL?FMwBz2byWN4=TU-Wp!u@S=OF=%vFCYLf7DI6Mwy++?5vJMVR(#cWl0#2(-XyQO zAj%mx{;_G$@8o`@kYlTeSuwe5 zqeY_o^}#y&ynQ5B%NqyPoO5Te0ZBFHmb+A4`dMKep21v zBm!C0?XV&UhH4V%*EOq}0NlhE(TPjS@$%l5C9dS~$-kTL+Xw;JDKsq)>mYywsl zh|}kNJTsI?+qEmO{o(wR zF%fjzI<|Mj$M%}Kp4&g|A|jkElzmA=YdWv@f*sFCrO*qV6QlJ5L7OE9#jD;`^~~oS z)xwTD1v==7-FN!(s5U~ee62g?ZRDAGC7C|%T|Z_<>~@GdMjg4SEK@1wFmt8tN!|&p zCbQg#Lgex12foogwlpDURKbkE6;%(d^K*BqZjEnzIHR`GDDYK1;_WX<4u_E1q3i=L zKfP#0T_OgpK0VirYjz)|-1^La`NNcBKv9tMZ8DnlN~7xYqFAOorbM(76uR6xAH02L zK??nXtdJj}yk8+fOG(ynm7SJ33J}Ie*Ng#PsIz_wSF-oXVE7w>ufPCFUymE&AIcc4W5fceCH7>|lw& zv7-Kg)zLuPFzq?i_AV6_6)|t#8)q6-DA&9w&(w1Jl{7Y-vWqw$H&P51l0JUS*QL$g zH{4Dex@`V(vVTUw-dTtFTZO7FTY~ch^|Z?a1ksoG_Hvw(c-Z^W?v|Jt;&1BaqEkAvbqqp0sj7pZAXWM)k?i!gL zohV$B6jS*8La2rf(;RF^c59Z-h7Z~+j6FUu+})FHXVs6xM#Bk*va9-qIaw*Gdp*43 z6l84{Y}k=K?LCqs>k4i|8C1ZPFQq0CH&K}IUGc_toJ@W?RbNUupt^xsqUv$o3h(xS+{(0R+&c0t7{B$;$QAVCvoqnfev7i-+vi>

sG62-DeXMl_$EEoNo;Jl}q4oy7kPWn^XfqmUN!cmNI4obAN>-9JzGD&TPK=ZQ6=Jn4NNxoE#&z4 z`SUN&j|cX9O(*>6+z5Bu`i&hu;04<;FIsW z9T>}!1U;r`p6GTNP-KZ(#w5z0Rq_JJS3F3ami^Is?88>Jko30(l>mfCzPy&dS=DWV z7HmB0m7*y`7WQm|x0rhEnzyarcKS_T>_(Y~#q2?ccCZ}}d7)dkf9k@X@`c;f<}Zd{ zY#7fmW}-$aAni(a!u=n59mP}{M{ahpOPU>brlKlqPi=5h=gkfB&kC^Ov{Z^<>D^kvWEXXbX zBYpfZk@pby(w~TTl09Yz^N}fV>eSgrK^&-6#Trs&{s94?_b5+nSih}ZtDMP(>*L4P zo`6BFCu1D6+b?~7{9!h>=tGo!qpU1_#p)7~rBX&=-c}~_%11M5aQ2{y#bE1>)9^_VIVh6@(tiRXe zkj*~W2}U30=#q36er6U;jT*F_7RFb4`Zu|R#=ph!_No_p$D zUyv9IAKVmTN=XtWgyW#{`?awrW2ceh<51Hb?62$#%CdYZKEz&|=SOP6h-8QCi7DiI zYRh2472Nv{%WFXj52t7U>h=1q()izx;`y?Dgj5Wv7xvNTe{uh{#GHky=Yty}`E z;%1beA6vt?(r6KbRBz1jh@msI>ms{u7-4P|)z+#I74&7i|u^2vNj@@b;dZ8wD zwOM{FpIoTRMSI7sN5;jq#vL2{DurK;7m$|(h%<$qVb~E7!MbsaNKt~#aRbkr;5p@u zjR7F+f}7IsE1011dnMd0;C|F9^p6g_F{|HZo^l)Eya(oRzQvMrPZRklP=Y1Rfbron zOy6wWq@;7aWFxYb9l|O{Wq+If()yqtDvX%cYl}xa{w0QjCKJ)G!AHL$6_kRGouHG@ zp`Jn7-azwJV5MlG?!1Og6aR>5WX?{SfdNYoFiH67zkyC`aSsjh<(wJ~2`6-z-!X1; zbf0+{A%?q*<6aNd<^W1M4jJ1%G-J^FZohZ_5FtDG+VZ)K*9Vkqc;P=7-$=L*nN%H(9$Zo{^LQx zYvfwIom0AVDnE!Yg@Rxu{kWR_FOM_7l3pn|JO7O*9gq!6#EUTPP2Y)<{Xg;z)B_{` zHaUL>=0s?N#N(t4EY=(EfBxyn++RW)t)pR{$(_IH2dEIBp-2hAru;8Xc8~ZV| z?M~lYE&&yWw7<6IR^p4+M~a{sKM*=KB>oZFfooR$2U7o}u4rwH5UWN3igBC? z^h#u01T2X|tUmVxPPSkE%6bfzKDOY+{-byZFt@54S}C6!^@Hc`r$m>7R=`(BJ~ z!>6}8xALXj;0?iIxGD%Q9Gga3?2VV!pZ6>D_xJlRql84@6Z4+4eG_Uve+lNV$4J^9 zRv@{0Y=gE@7`zU=csl!nD=Iv*&v-?s_rBtIC`zT+t6Exr%e8uc$@Pp9nDy|+Ke$!g z-VCKP^nF8#q22xBhJ=P{*GsH+;YFp>Uy%84wp_AncVzz8#*-bfNumN}F3|RZITFg?KgjA1z29EFc(K+;{IN6W zkus zB&3V4KVgv)wkhQv%pvzZ&rJd9eju@=`3qq}jK?O@4{Yt(1@|QNp6B8X*I86zLkMOV zy{WHoFftM9d15w_P`X_6<+x=D=y*M%(?KU@x?Oy${dK7PgFt#q|yo^=b_zL znMqeNUhSvzEZe%M1j}-DO_Kk?<=)km-zFb#`?8d*3`>{(UD9idW1}rVkPxB$628D) zO?g^E$8|2zP*YRW&{V&~XcUuut663*B;F$yyACs`bY;1@eW))w_3Xk;EFL5^me+op{yGrrpT8&SrdayJIQ#iC0Q>$sMp5uWHi#(X0v5Ii+V>#4XDqIiY( zB)I&}?LpIZ+d}T&T?R~HchTf{a05$Am<&vV4Hlm#Y-4l&TC5YF`pA+|(1wLsk9S#yvm#yJ^GR5}=kP2`+=5x6%2=yW_E zW}sImQ!&VN%XJ!SR$T|E%(6b}%?bCNuf)%>m zT{o31Nm&7UDCFIQV!$*bT;O4N!M3H4<;iwDGXv}v9E%T0ine{q3T%8<^crK?m)6OT zO$iOJuT2He)VP<@a`XlcFEii%k`6~Ni=PwygnNdQ zG;i?Wzzq1f_5iOfHvN8lcYAn$@5)?JhCNWYFpEB)Z%nb@%qrF-C}!7%_A?2Z9B;BZ z1;EMYUjUsm8BL+04AW2Btr!E=p7*Xt#&Qa&>khVE*fB!s0t~{)_71s~E#G~rd7T;g z0i$uzhVS(>2Hze?ZQO(iwK}KZ;{n+zDU>YRrHb=i+lXLi2$<_m!It|hdKBjXq-T&< zU)jxei|0Bff)#e3e7lZ+2ufs0Dx2PjZk|{cFzY~c!eqP^E+!}kMq$X98w_ix@2lKo zgwV0+vHO?|;Q$7mXI4wV9CY%=rDh%~*N#nbwq-%ingJlaB%oDnEpI(SLS|Abhj*-G zaxTz@$ZZalEi!3yN)n)c#xf$uu)}IBGyv>gEz48V1WMce2Bj=pZG|PD<3=i7na$B` zBKCHqrzz*V(m&PvM7>UxF0|!T)%+>)T$Ijxc8}QYCdUhK2LX0$cRV27cg&>jEbtki zlB|1>^kAKJyalP&Ut>rf<;@=Q#&d?(Ih~L~5Y(3;#O_ON<>-!%2NhV>W3K(Pngf}W zSz~ph2otacI78u7PHstkxUZ?SGl0}O!#i4N>v;LFi{CnmQimI^=vhwQNWkc>(7K5?r{d4JIFDyU!SO;)~ zX|CUKr^x0R2~LI+4x5zEd>55{&3Nqi0>M^m>ba7tFjt(!NyT2P0>vj2^CJv3-jR^=^{<-Pb{>_uw$I_=X(q;qpoi^x2PRNwj#*obe2H6*6Bkc8u){#rwsA5y5=_G20$2&PA!IXzi z(Nn;{g1aKsTVEHE+q#yqNoNms5Si+wG{Z(MKY)IG-EN@%mVl{OYw|EO7t#ySxF>&~ z%l|&f;G4{81B-^c;Smw}rnR)R{DC1XDer?8srj-F?a%t%&nmMu2o9eJo2WMZ4p(`? z_3(w7QeXuGJEvWb@+KvW$j!o*E>R=ImNNeVh2jP#vM#%y8{xH;D4Py9GQY&!jZfcc)ztZ3I#wayBlOim+K; z${(N?$NOk ztK-So)X+ZVYeV~(>vF?y1Ha+qqUM8yW21WY<+n~%=b}l?wxP#$4~9J?t8H1)7J~

Xb~xL4Den<(UkUR@QL5{mC(K0w8bm*T1utM)c0u~w?(Zz% z8W#u3&?%lhTxk9JvT@JV>&1Zc2PkNTp2F-CoWIL&@h5*;w!^2eU(<8-wH#|-^)HKU zC;omG+dJt2^;R_aD$SawSdWViN?QRGReq#@H~Fh$=2*tYdN$2L)OoH~*%jUDRJ|Mi z1OyD;Odey=&<)teH^_tWZ|Y%nCbw?giZ#aY0yeuFXAIO8byM)M4|uM`ef9c;SzViz zmX|P0g;nmyUh0f)OxM%<0SWA@>nz5RQ5IPs|tJhR)>hWKGyC}B0^k&xM$F6ZxA9kK<@heOxrRMN$XFHbfR2g7SBI^ zhV0RJ>|l}CGrjM?^1^T-O^u#T070;>M?63{6F-25-TODlIED28?~m5)H24+)SI?^( zvriHedu0#nMp>1KRv1-;Rg{@fi*-TpQExNoon3lkb~h&{=l=Z!UgArHo9q;gfvY*` z7xg}0;itsM4(@Ju64{jf8X`WHOZYu(KHhiYybsn060$D7(r^T{Ff-RY|0IZUT!Vsm z?9}3FTu1-;o3priUN7SbiIo4e$1InWFuX7f!5|h(VxlpIa}BQVVq2T2h5xnyNBw_G zSb=%?pT+QRfwAZEY{x&Z{ohTdVWCwlUJ*bYOuS(_{ObyOFBE*l6r43?AJ2U)c>}+G zhxvW{HDatzJvqx(AQUcNYiLs976}I(AOtj{G&D3)7rKnVZLe{{4HUl8-xuKOC1zs$ z)d_Up3SaLeMm4!UMeF3rDBZg4qMU_DOqY@A6#S-$V`T4{>~3H%m_}$1O%-I2EW-I! z2pB`eg(;)G&$zRu7&_yQ#h*ur5Zs-JEC$Q#Oc2L~*3-X!xz0~L&Z`IjHTZD#v*{=7 zjpvt==u0CuB0)+VEkGW`qJO@pCkDn#*4$0Z!GtKP7<0M@86n&gGDml@;`g7}EF=M-8C=fN79~;Lxh{(Yk@! zX>cPVpHbMW?W(_lA(nUFzkiR&F2G^Lm@xEZ;lBK_r_Hq>J{blFo@+2?41fj~pe2w; z6!aMGZE$@vG_KuH-Qo01&eux#nG5b%|740dg1H<3;G&Wh!AyajU~=4%5}-6c$Y3@0 zdIl9&j9#!6()(4%aVj>&%Wo&(XB?&Gq5k^;ArwrZX+-vF!

h=0+gHRYUIHjePOk zWM36CN>f#b1?4A&Fd-{|ywAUmkw%-p0^r2=O8$&@EtMja06lQ_>d}-zGE5gKN85(r z5!D--<%o6_Lw~@hxdiR7Szp?Y&C9^*kRpEV1uJ3QJaPw_M@yX<)%fIkdV03W%c`Bl z4g#_q1%9Zv^B=*@j3*{8QP)?R&-y5gx$4$6Hd*@()t^c|l~PXO3c$<0%MhG-GP5O4 z)**wq!+=id#L0x$K?}`QtXcyH;(H|@4dqBJ;Q}VJaojEoD9u2y_;R|1l_^R?V?PSELxPd;%#RkvfK+>9R@eY z9JpE7xt`(?Rynk&UB5zdf5;C-{5cf+nE`W=7tc>tN-!nSMg~Au#q&F0Q|5u2zn#W$lR^<+RH9 zlxJEScCm`wnp2GL9S_IhzQduJ!&8bSr#k3&E;bagWN;R2_!Q_9F{jDKxNBaW?l`0V z(6(V3!PxG@qIS0VOp?Bwj!9Ue1H9F$m#f|Y0AgZeFL`+RQjIG0VD}}Cbq3KlTl=z) zYV;s+5xcwcT#KE#gp7W*mFAU}+ovRJn@@IlOA@0XP@xKZN5KAffOncHuy#nnR9hem zRf)3Wu6_%q^N)7IlM=R>qN2=-5D*Y&E9Qm0uJ-Kz`n59Eo2oUvABD56+!#qq-OD+W zyMRV$cPxQK62eQGmn%)FtkxLiu`lA*AF&5KuYKHNMGyuhRFw04m!@OphXu6k{Q*Q(gw;S#7>C_GfB;5K%+nOJ*X%HuBdY||Na76> zM#|_5t1f%QM=@gBxBg*<9Sy8wNn_|m89q~qcjMP!_YhW~6m=iPE3JaXuS;Q*8mpxt z$hDD$+nX5xm+;tpgr7~d;}N!EP-o+2jhSkm+^@vgs}mGe4^4o~95ax9#Y<{teq1-f zGp}a|$>dtebmN+GV0{SiuRqZim#y&|~sFEcyf~X$|NK94=uh z$pP6s5@t7pMrGDy^!8xz7@riCMzhsnV=&23_)Vyt%y&(Qo z?A5W~BUca=%<@X;G*pu4>!w%_o;=BT>^>%vi`jfpu=+5I+X=SC5XGO@+A~kow$1`H zA!gDz#ua&SPwtS4^~pW#h}602l4H1+1VTngFODXUHSUI{kAVIVQXzUYSN)U%Zpgno zKFJLAf~rY*ZLPZA6+LS;PleP;^NK($d0JPm=a;dq1G6JlAJishdObhXrtuxWff3pw zcOQuX&dr_Asi>)=7DNs%J&?TY6UeC{m^{LIga~MeGYcd9t)VrW+u(D!nc}Fo*GHWr zmuR3l0xizPvYYsuk;cg*tVZQtj&GybIxiq|-0;l;X2S#dlMFvrMy&8R)xN-Cbd3Ry zbeb2DNlEwzL~)XTR{h+#?csqZ3NJL?G6=_Xbe|ux*stMZ>>u2zE!>+jK|+p(@-n37D*kniMu*rHYiS&(4WgQdHb!ROke&{HsxW`=0YZk9)!?tPwJR$W%{=n+MDB8Mkz>=C|81)ua=zpu;QTP94c#>05wD-Jw_bwM>TkXC7Mk`VKjg3{4!I(@@G#ee)=E>6y}ejD|*zeWBQ^%sj-kUdd> zP3=Sr@N=|HIQu|a+YObAs4Kn8dH3(XAIG&=O4oS8VDkN=TmRH_Q_3CQN4fXx*@Ir< z-8;JAGYCEur{b)qsNQJgpu#_nH-uItf+p7P) z_+IM^h*svm4Rrla!XrQO3sDUHw~}59DdreA3zg&F@rA?;*jR-&r{z*vzBNVTW6uA- zEBXIze-QjTdklxiE6Z=7G9b7e2nqM|J+>pPE8{-YewGstqZG1LnNd);~Y*E=8Q}rbTRT4|+ zYvl*0ao|+r_#oVk=5Iu9P}7n;2C6owSDOmYJD}yABt@Jg8DzprPy*n@F^%uu-xhc4!VII88L(DO{y| zrN6vK7EsOt|0{&|8DH(IY7F|%x3inL=Ye=&qLG!Mp<(_!&T0fCQ>UNmxXf@066x#m%HY;DrKRBTk-;^wzA1r#80jj)xQqPEasr|@;@?S;m^QV|d z9I?6bb#bz^76qtEns)fxz^a}vNC_p3%FZRu@G)TOT9aWFS|>{48Kv}%U=;>R{C{sN z|Id5HuGJG%|MY^*)nzX%R<>thHnnzn*`ek#PSdD@+eD*_CY^4}mXE8}rx^L7kzu+P z5{d&1eQ04eF7WR^oN?l8_Kik`2(KR4?Lq1P5xTjyxA5QI#mifq#ZxU--cNzB)xVjn z1Qm{gL$Hpd-HQND`dz!MqZ|^WqN0eS;nQ;=v}d-LLIE1%r2Hr-c*J|H7Sj!LB3h?J zM1|tM4z`~FpT%AX>yu_``~V7myzqzd9DVI*TflFrarqeyAI!m$FppvyszkV}ZVP_H zu9vAa!a5_prAkDetVlKfT(41^!(OEWm4|i?*d)t;|M)MiksC%vM1Fd`iM-S3a|E2& z`QE;b=_u?l%u69C7;L8x3g8fw+h<9Rmr?DUe{qG0iAl<~uM9g8H{}d&>z4Os&}`v< zs5W=yU=1q4!ie(@;=_uJ4h_bI^QhoOv;lCn$!0%cO58KB)Ikmax~ zh@42Hu0|G@Zq#XI&yhCJHo5S_1h_+vYW2WW>BdZ5ZEZSuWvMHzNCXHz)qw-32kK}O zaRV8cmJ-m?eHa7-(uu!Sp7wN(vbrTZ!`m zj9{)hg2ciL1E;*#%snoXq=c9l!6{#U_m%l?I1TvYp+^uB4=6yW1DeUou$>+LtV|ic zx&5lM=oJGQb}~hK@#9U`py<797I1omBceO)*v>fchpFq2__`xja2%Dju{45)Q6Ij2o;ZJNSz`*AZ$g*-oMRv&+ppMlee(C9?K<7oS{oe$M|z{q2K zk_yF7=kF~Wt<$(ZQU=zEUO6J{?Vi3_KBTG9mkO`ATFuhC{LX=jdaHG}-UMVz42WLt zt8<%flD=K-fme(ABD3BusRH0c?lT6;J{iWn=b~82Bk9_~J`Uhz0;Vm$)|wG6ImlUe zI!2?vHqEc)g0A9*HJEPFpo4HVo#Wiwi36U`owuX=#ntW2;XLXCfE?uZi~H^+C4_}> z4)|$Bm~5h;I6-Dyc&C7qq#Y8n*SUo6*!CBwl3rvI7fq!y?FlrwCr;F-Vv$~Ik2(!p zzRH}cV(3^r08qW4z`$hjO|!8f02jR69yA~Uw@h<=aMNz9`qFC5aSWw_EU}<~Qo@vm z!3Sh+q}H_B@yJ`1GwV%}aCdUcmMxXc20BNMBulU{%axT^O=5`iK=l^xx<{s0e181Y zM^LO}{G&F24t$E*0LSgO4oVuec%(P>Gonftood~tQKcjF1xddAX#5t7?p+Ukn?p3fl}*}GrPdQ>hV$h+aw=jH8I z%_VR5I`OJg)c45B{26P_yhYQheoX)97ad*6i}t@aGw>VT%oqb@R8@+dd$Hr$d5ce2 zjK&^b#(^SJ`wp1BpNFD-$iu7e>(^VQ;8V1`!rVfP(Hx8iuWaEhL6xs|OGlAa(e0&7 z-ZPT+2DJlLE$*kAV#HKV3pMz8p$<#^`g&{u0de6}^WD;7Vs=mlVSCI2i?@rQ`pO$n zd#y8#u4$;qduo4!o^z?B9rBG|ZxEn3oPtM=L~Uhd?Orh7Wt?}pzi z*v0Ike-6G=vU3W}>OdcEHz*ylN@DEkw`AjX2A;#$SQC4V{XW~LcBmQaZ6YctHw9rISjp>;B zcmoA7N|E?RHyj-ukw+1xlNxWu(xps`{Sg)ih@1Pzl-<4^T0>e+#K^dlGB@Y;6n-Ox z6ri*3G%K<!Y+h^AQJM%60G-_vR_;MVRWo z;v&~R68y#Q_U%6B_p@j>^w>m=%5ZrL9`1bE!do<3qh z=>xM_jvxo_;lPLx)KSXX`iQ9AkOKT9xmS6Ukn=rV8Ab-uDeStBPAvE)DohyztOF`+^AHKuwu7I&z=Z9JCKP#v0 zF!Wr0@hsSVq9Vxew3bkqn^oMnHsB1I(T5DOlQKIM_sO%}7pU-!JisQ!y)Cp2%flEri>u;LPx`Ev$d4 zG6gvZYfnT7oqESTItD*F9>yUR0w)K6lx?PU=#bCsL-)X`M}+DPsKQ_K(3vR5e*?qP zux2BqV3f4hd?Bg?nHT64#W0+ll#Nm2YYmR{cM?(edzExJDWHJRuVFdTVmnvDu-33l z;$LIrqX0qiUw&;Ut3=KJ{I%evB>%^+T>uP;JaT-RHAW!t3=~+|i8;cq#ExFm&LyX+ zIKA%Min3%ax|Z`@!uD+p3Gk3bxSF-ZvrOu|$-4f&Zku{>6zHqii0=gRbY0wI9UNlNHpq z)Z27x3jf8h#KoJQfuXXU^+r{q6w3CCxQRVIJ%xZ(P&_+)@3Fsq&@Opqasyx{MKT1I z=yBo)Hp_rFTq~ylc>sQ+4UJ2bwqY+$(apV;ji1|oD**_}Lm7yfB2LNHp&8jk%Vx=F z9|>es+)j+j^(eY|?L@`Bb2rCp`~v<&Hb}#0=ensdfl?Lo*OLh5?zsQDF>}c&>Wj5`G&cq%w*L8CtRL*_1ru zLUgl$6^}W!$6`SeorTA1S+ix}&Z%^`oiQLwXs?}LQe zDq(j9h><)`W`T(=qy8?(_ww;=)Nyh7gPZLqh(J-dzAm8W`3E6*=@8c>6zDRbwef`T;C&`DemGyN`M78ywUq2EoRO!`ORa+}zc+f+Jc0l#>)}z!R>*Ay7 z_+@hWjzooNEudNuQyQ0c+Vxt%zcI{9Un31d*ge_|Q85?ddZOMHK9eq!bzIAMWY`_1 z;;{Z~@4g88G)2n&N$*i{FqOVq{An(o+jR#^E-HoeJ$WMpJ4lxmiif}6e)0pyK+&F{&gf;dYWmcQX? zCfAl6xk8DI*4=l{Zj05*L(8PKW!+(}@_TYfX+?qh5lI3qwK#brckB>uQT9^{V)?&G z6Pf5+T(J~^plj$3pXxxw0*Z)srK=1F-KV&0@)CgJ1!7gqW z(aSBoA7;_$wLUp@G_Dm63IBrZ#l=MlcOrFpa*NYQQ0Ca5$Fw%jDMw$;wUd3hla!PM zUVwIoq(8TH?BV*|!Xu>E3CyxBJZjL31f}9qtwooV!yOy_)0cdPfXcl~@G$4IXvWoe$9V4qdQXJ#=rQ&jnjR@|dGFM6l>||P8U;pZXt&3N zg_Z3d$7y_2${+pM57gtS7+R<_$4{+z@EA8tcbGms zT<*He!t|U2L)&fJCJ=Sov{9hMASCNz3oneVYSjA}t8T+jyz^x7r!ULyzcEV)>({;` zruzTHYNE)I-mir=Um#vTCl`88{bgGBV&vSiJt>UmKaO3`e+^eM^HEbbb(Q*MFRZSL zOn|`(x2ksbYh+X9K&sX(&n0l(Cx_a0uwFtV*jtNQk+XZ3%E7kOXPaVH@VK~B+s1N6 zOViMC9E3?<=>qnu7|imm@tRK<)+aa84~VuG@3>D>qj0BlWF?U|MQ-Uv?(A>&NwOpR z7WdaptK@W&%xM^XVYTsx(<=Rg4W=_CTvOg{ACOj^xotxjC*L!=_Q{>^b`@ps#4dK| zyLV=Ams&BsSQR(*n#q%vJ^Sk14@lfuFe>gEvG{^zEF&h zg&v5|2~E>1_kB!p)707ZHze`}d=-$9NZGGs6G3V(vU!|G$CqLVvLRgv9WtYOuZs#< zQ8(wY64IeCB7#edvV5F-Z@Iz8z1iB@+An~d0g?MS zBxcHeW82PsAC9>)`JJh}Lj-79H6{gt6y4>0hgP zU8MTnfpz^m1*b6I9B@(p*?zjUAb66MfME1=O zBIrr}Za!u`=$R|Mq3k2KxJk7+m)?kZ9ZimvN&BlNYTJRHOED0%ya?eG8ls^!Z95T%y^+rZoXbvMNq{=f4v4X&^hCx~V2}J8PJyxT; z`h!kj#-8sfA9#oGn_wo)grE|FZU86qv#9EX z609!@?#MutFcK1M{wrG3Fa~capdT=6U~sU6FqMIc{nsa{Q#@zYvd}-uSU(%JI^tHz zQE;td)@$e@BwLgpHun#&IMm9)`98VYSvGW(KMV`IK22;2S7bCDc@FD_#%3A$79?B; zc08TPgu{;Tl9jLBq#M@^wOvve>;dA)p81E(*byuzKx4CfC;wq1XZejA{Wn*_?T`t2 z-qFAjF-9fOLxKATb(bx}vz6M9NcD)*csRi6`vrV;xk!Ty{GaGw_g91u0RzuK)0lVpx5y*Z3=C0r7dflkSb?q6xRDDm?XWp7yybc)GR!s2ZQn51 z-#L8HX)W=1c|yH*xV~)%kEz@Ivp}>VETRRKKT4G&g0?T;gEPCKDp=y zCz(evyQQp3#=4S+#r?9*EF@}z%@US+9_1{fhx z{E}`iSV4(~(}kUh5Y%!}KaaC(Eo>Aqq=Xz=b%#8ksGwsly}abi8Z>>NM#!-(Qspih za|f=Ac%S0#mca9eHGeG=llgU%;^eoz-u_rc0faP*7=qX-s@|py(t73Zy>F%)k2IbU zc(1Gsmx($1ajt&WFB=w);CucMp$UcpQ8hAo47Zl2r)RbsU!3PO)W2kN+>@$7Z2a5i zAy$Q6B|=DH+qS_B-pfj}y|Mz&FsAX;ib6{ygfs~@?(7b+0Wt`e=!R-w4zMB$^98{r zA*bQ%ISoqUiR81+gn_a97`#&_Lsc~dB(*X|=8*d;9!{foqO8WYu3@p{A~p$^T6-P~<6=eZY)WEniQ-{oM$z|<8RaUN-heL}1z!j4kTvE)1C$gy40 z(zj<@9}c8pJ=t<&GjNyIjv6x>Jdv2gB9dfo4Y4jD<+U(R5{^v7Y%11b=7+~9W&aOW z)=+j9*I7YyBYRwIaVBXo^(ygW*v4^x5IDrmZ)t{kxL_D0(hlBT9&Mh+Rh+((Hj_1kKO_{YZ;b0!8GPp}Odx*l@)C6bSr zn?<~9Me)42RQxM4 z^W%2x>$sSR?%a`@Gqo-=C~*;nS9WeWzJdSZ^jPZ8_?ufbm;Js?|L;oVPiX_?wb>dF zd6EVcrghsx#TgkGpu^9bjLp9}Z!r?)9gt-xYwKTp^r839uFr_zxPP>lh{`wy+UBA*&ng zYDWSBimm$^E8U(H_1>gz_2xOug*5#Q~o-ADCX$WKHK6^Z$1}R#c zPMSYuFgSXg;5RS73GIaw*JHe2wHwfx2DQV4kn=6+y_Lq~3m{8H$lyUCQhXH_)V6pW zT0C*-!?Ss04rzx3xqFwFMIB{v@B1t&#dy~B=-$nn`vx8trTnDAB7rDGVnk28)0&T4 z(in4&{t>#n7kf)wpLIt0LkY)1t!~Eoa0HXPXy-Ce@WYjeOv0BTksWEEFWG?7V)&Up zP7`*=E;5eHdbq$nMy3D`#tt-xu%Hs(10uQ1`5Of}r#w2B4dm3e$cw%}lJTnTHC*og z9Fc7~d$P;lPPeVY#JE{(UGU6i|h1ZK6#>J=q>I4&7amUEHB zN8#7`o;c2H+9Dq8(d)$zFmY$63^05$aGl5-`=l_F28R*KU=VOg43QDgl9q2N?kFA_ z?gw+|hy_Kz2fa#4M*YJhAErgPQdV)!cD;!3Mbc*|-`>{0usAiXN)`~n2j-xanS`eL zJv==NrviRD33AEob!aEm^2}GZv_yU(n9_%0VrB!%%C!bD1Kp8lvXbki|}h zN5;_Bc`zdN=t=9%f4Q9q7k_f{-|Rp2Fd?&2HRJDXMWF-_h{fFcwlAWaW5_)B2sVNn478u14Cb`UPA0C>r*_9afQq*65K^NtIa#x63Jd*+ z*}0#@@#qaern=L+J(E22^@gld1W^z*#|HB)GsN?hLr=A$D5B~2nzV)uRSO}o?pJ{4 z92I@J_50*P5NaiXD&Z%i_%0^(5?rzouyPQ7Vy`+rj^VhZJztta*8@?sU?gbu;o3*H zrh?rv73fUM8Y260Y8!8kJN7{jsQ$W-4gmbka4z8sOre2t#3Eo7*T)cR%^qvfZ+?;S z5|j;PGB;$(w5Z>vQY8Oet;@k?YQ?XyO=>j8#;=P@VMgQk z9Iqw+sT)M{T$aMP@o!H|z|mfJef`haUO?A`WXlhtPf07;lLb8gpVyk0cFB}9a&4yw zHeU1SSR|q;Krmq#PLEQg!E7a0lC3b=I;TbVwN&}`4x%E8tbO^TtsWlsY1y{lD% zHZ|6d19i9i`ebzyB6~oByU(Tx}d# zCNz&&3H^Ym(ZL4zS(vk>wGge&Y6V|ds64ua9RgOwx2rVYoN)<0CEZVzEH(bds8 zwF6_#0)L{%I^R&bq^(DmV3_nT7fyf!6yZh11K-OGcs;4MdyeJGtx8Dr`VUGOXoPN|c$t z+$y7^velDlqLL{>B9oikT^s)%_`}O2)k^Ljv}u%$Tp<~9>QD!2LGt?46b8*51?#!F z4=nsJukvfn-ccrZj#^Cwi7~!93`JHEx5r~F<<&BlTXD*w~8$3zQs!YhFl3>5Aee1}JMm4?+ry}dQxDVV8_ z(I>UuhpqMH#-D1w`L7PT=KI=lQA%z2AC^3t;+BkXJ}ufOmP7SJum@x1 z&wF`Aq`kq@T&0sdjflaBxzdsnO~Y^Ww!Dn=-N(-_&o00+vD&{`OpRmfVEhKApjORY zT?a?qyc>`zkT~$l*spPQdcz?nM>#qPG9zR0>DN>~+B;Rv)otDhDRZ6LhfWuADG%s! zO|KF4v0zP&M6|HJqtBN-1v2j|lOJ{qp6D)|&`fUpvN>FlQPPrq}FS?$M8EsS-;CMlN`gO)&KR-VN-@uTRmzM`p8H?Sw^tlC* ztRL;x+ns~IHl|c%>g)zFAGVddKkA5+kWV!?ao|&7P#~iFaQF0_)$Lob{7glROq_*2iFx!A!Pd3 z8(IfUKPmqvMOmXg9N*HG&)MHkw5fV*_YxFMftlHrIdg$ydwBd=##C|_T*od0b=tP9 z$ExeDL~Nwh=KZpynppfe2O`0LuhDm;b>~0V)9^KTvOCc#P^o666h=3Dr_9SMS2@3N zQchtOgB+DOjR{094ElWfbeGQfh1nihnGg-K9>EQHpA*>aLPU%btAhE7N$t{)#FXN8 zslAYh5uCKTthZy)4T+2Xx~;8^>CDlvRMf;Hp#9ZkqmMzjOjN2sJv(KKgDQov8Vzk?hYP=&Q5m(@X@8~ z=;AVC6ghHLiV)sg6_l%XeVblyQ+WCk$DE-lwf*$m}xiNO6@~QiM@2)4O%Se#v&S5 z5+gdA)Ett|HYe}utos%FZnNJVi}rr6P|v+rKYW+@myGUti>9@R#S6?Y{yWZ*ZioQU_y6b1P}D#>&bi4?;gT6)hjdwhJ(U1a3T z862HrwT(n{h34+3<8$WXPoJ-CZk48^=Gwb8mytxeX`0ihCB%|txGnPimx1x32zIut Ut;xgrcq7t&RUMTKC3Bzu0XB?^O#lD@ literal 0 HcmV?d00001 diff --git a/windows/security/threat-protection/windows-defender-antivirus/images/MDATP_16_PreferenceDomain.png b/windows/security/threat-protection/windows-defender-antivirus/images/MDATP_16_PreferenceDomain.png new file mode 100644 index 0000000000000000000000000000000000000000..674bd944f4b7f65c17c42c0e659ac76e10673c7b GIT binary patch literal 65217 zcmeFZbyStx+cpY z-apPa#u?u@jIp<@wVw4n_ndcM_cig8k`O{hz(s(7fIt?0`$h%=0)`O+0@4xg0eFYr zpG*<_18F5A#0OE-hra<{K_%ucm4b`5fCK8EPDXOhTPufI;eud%M7ykXD2erZOIHbk95a{v zB*(nX2VYLse^|DhHJ&vTH(na)>gpyv;)5gh`s;t8SlvEQuqe=Ff4}_ey?P~P=v&f% z-dOf-SwR1JJ-EQZkd9U0*Y_XsY2YGBJpSi?(J-E}e|$Bw`Twl18e=3J_Vugo6m8&0 zE}S#zk;>Autl89NLBS4sw7*)jJo^6h*XloojG{_7a9UA56zAyA+~rQLIx^Y3a1wZ; zp#NGGPsK?vNY80uL0-pOmfox?`BQJhZAL*#*^}aY?2RovdJ1N=-DyAEI^% z4*sd89Ep|-mU`nK>7TxV9!1gYZj4q*RGGM@E5}q%u2UQtWFZWN|D~qGxYDj>%Kq({ z-tULqAtKq=2f;OL<`T+Id}b}%35rw&55aA_@va`g8h@NL+9JYL-Gor!#=su&JjT_< zmmPK?S(Q&{&ZrlBuDhVB-}J#DYP2HVL0f)&vd(*V!@EU)y&A}h6W*##Cs8C|VdU60 z%%No=Q3KWfYx!^v-pVTra(e^c{U&BY&tNN0f(dG(8m^qD{3hyoJs*;Cd1e90%(Lav z_Inb)#YHtQu~^w9iMuGwBUV<~>`yJ}zjdO?$S1Q)Qb?WAH*@9YE=R#+5LK;C5}Et3 zO36Us^|@ud>`bHQHGkbOR?_S6inOS5JH$GeKzVT}*kWD2hU*;N0~Y$;-d>wyq)Izf zN6vEhG=Y+l+%IUFm#lTSU*9J??KHf@CWEQmu|~M|^>0p#vvcK6&#)Pw8fkGx|5i(!S*_Fc4i+n%w#zm>fV0+$;5^9u&8%``(Y<6S%;rfAs zWoG*;@&>r6n3S1iCQhT#Qw~ErZ5QoFBveHkf>=r<$1egNvh3#}OW2^sNwlq|GB|qi z(g$#gEbs^}?iopAw~^thI+2-*evu6N?WeTf@+cCKET`&zw8;1d*z^)ffxURRCl7U0 zYLPqQ$rA}&mVArfrw=T}a=0~7&{u1l^{LKtJD-}RcJH|7rn6YKkvsGH4^0s=mU7Ha zeSE8C=?%>!M~tE^q$6Ws$&oqqiUaoKGQ5m(Jg}8HGmVgBDSWk)QWw+D&b6`5{7a#+ z*1pdiQ%q7auzO z(NCZ^E{d1Y9ijVv3)6NJ_*SgW{H2;Qo#c!!zIp1LRlr6O>5e@0M4;e(??w(O*R=l7 zMcq}7VZ$Qd_5CVhey!FcJ#GBHbcV}F1qODE1l;(NceBWXco|i5rJ|^!PiIAnUKVcg z!jDzV-*J3zeWh2ySaqsIPT>CTcSNcWt4~>w<9(lf&4+BiwpPsLsxZx-^NfT-?lX#f z4%3RYc=FNwWk#O+!h#&11iyrGUFVP2xcHT7j_Y+$Z*!9-YbG-MkIwupD0nJW(c0jR z`9;rucoL}GRla1!=n$nqz_f0rWQ>^q4jK6Pbnv;ogcQYNBFb&Nq%Vf!bKV zf|ZV1Y4^~lkzcW#L3Fz9n!by4(NdD7`V0jr{M4bCr$~B~ zG39=FA0Ekn;zz$!?a6;6*kR#ERUfJ5ux2PPY#Q?1nz;Hdhs?@quJQ3v`1a-O+VF_v zB4!JNS&QR#~M4~dWvSwD|v!Uk<{6p<8u3Yt=A^^9%IWL~6_WO6*6f+yod(aA z`42I_t-AQB@yToJ_6S-kVo6BJ9@BL~y2Qq%t5IwOc@8rC>L20o{aEGPcRO6Q#*frv1n4-)skuWT2S_qbSk&SL^L&y zy<}toJ%P6=D3PS2Wjn~r@&nq9$P1iAqahB))U1auNSk`U=YL@|Dr@GF6LjU(<4jsT zZ6t0+F_iAJVIw_GD@n`E z5Vh{c+YBVr?rT&9#i&J?1U8&#->~pfheP{xruPoA?#^EpBHCZs(H7!novL@)$0)xz zh+AOeB}RE~$ysiN`pSrYF5YhiiwHframh(c-sNh4E?^@jvn}}X23Az^IZ=Bsf_-GR zX5n+zhnIpqzD0U|ykDrbvw&%eiMqaDYkr};zj@v}Q;~)_(*ELQhfyA0-S2V$O}xO> zLL?^sD2_aF_*J8mGdf{^LM!t_N(=nYmUsP^QlqOD#_?aXW)#u|W_6&Roq4P(xOuI6 zmmcOyrBoRW4YIgiNc+VgvyrPL6yaoibtl5#RC|!m%|`dovzfpfD!rv5Clk8)pX$Vq zY>bMv((*Yg2J2H-M_)3D)|Iu0N_{S44r`_WmM6a}6WxZRO_*%Vdc5@$=wX?8Zna^C zj?Ui-dyBpgKK;E4zPBU)Uo3fmQEhH-7Zem!Oz*hA;~@;mE-n3FU_fDUjUN#a85!HF zw>M#vF;{n^>s=_NTiKqz%wJiMm6n?21M%hs(E82^8^x1;-A zq^B$a0fF09wVTt)=IGbb#doINp8PBEId3dbEys)0n~AB5 z$DLNXFe><_UqAk>Z#akC0!xdoMGNOeSRBd&$A)alGZtG8rUVQZ7xf~3^#l@X-yK^z65UEAP zaS!`48m;MygTMLgcP&Ir>pklB^l~&`(e1p2==AuwBehrWYQF_FJS?orY&MTi`YAE- z;??|JBZ8tgk_2Q(yVdRtn|ev7QDx)Z?bRU%@5G2L?B?dCmhyCTXk_F`8=iSab~fxk zX@IYzTkphER$gA-yzwH-aZ^@OvY*!NqPwW52&^H8=%BZ!XM3_-=!(AyIC4r|J3>T6 zM2_ZB=iU_|r~Okj3-&}!*NemPjXDm`3kLDuFD%ouLX1j;@mDYJ(*JS+0@Xaq}$babE9Md zQu>$N2#LQlz;dJx5ZY2P0y=~9mZy{4ovM8D`gGd7n?U|h@u;k#! z)XQ=~Vg1{~LKTCU;3YaW*EyWeE!5N!nBhi8M^A>6Zy8^_*ea}^8@gd?0BXq|u5mb8 zO}<_xw?vKbik*Y=9LwUwBrwAc68zV$jp~Yf$S!P-=HDCNoa>dT>DRX&3dt^~lc=uy zo^5SyuXB?_n~Nzv9aO!KEC~-(a|&zos>jVt=9bHUpK_iE%f+lJF90+ zz>*(zZJi`>yIckVpS;?s?$xtO8Ic5j5aN2AzP)X7k*T4h^W*mB%58z1iOI&y48>+y zdc8e_NHK(M{BWTeYF2YSygjW2_FqpKy?@HPckk{FY46bRy{M?D9G8MvD%^x5Kl%9` z+%fE(T_0!jG}s^f*xxUa3)N3>ySth%&d(1=Bk=U}ykDyaQ2>hU6yNWCeRQ~4qR>qF z&uczRuRmWN4ry8V|F$--dPeMoKlDtC{AbMX5cT~3zxvl+)iW{&;ugYamYolMnWW>^ z#^z_hX$vGtU+N#me)69`!+F`r<>lpsA+W_DA<#s3Z&*u6NW}H(>6$R(9eS*=fiIAS z!;_A!No7(=Ws1nBh(zYS#&C#0l>01H^E#4B-knN5?}2Q_MDtlwn4-|IM_TU=~Z);dh&Kof5`k3 z)&19&bHP&_z#~PHfRtg`f4_yCYxZ%$nti2H7A?WDZkFORUhcLn2h~%Ox1#82WQQf6 zoL{GlL~dIB67f#~JY=9y-z3M!x8(bavEic>kLQ1r7eT}5&ES>?kCDj~0fPSX%L{3j z{sc5rTU*<%y9COozA|_z%!kh)@nw(=z{M^o;L`ut5M17y8>qnsjpFa616r=Ggg6-0 zX}|9I@Q()+)z&tzSf-*EQwThUhIC*|`A0eb-m2(qvyv+!hu~+Fkx$1)MnqJq*wLurw6X;NF)0^In@%xp?>}up&33 z&Y4u7R!$s00~P*t8Q-76ZQ|xO!lo_R_qp+4_-CM3j;7}U-Tm6O-@mAnjGpyS`pKoj z_$RnpP?-L=*KjcHzqZD=Z_toCId|J;;o%7hG~)m7L{rJZQ=`EWv2hzkeHsGupL+c1 zD3P0oBgnROvx^ofZ$(HyF@Ya&N2LFB+0?fp(yCl}{{JCIrU+BUA9t6Zf0g}Q#v7Ny^0GO# zBK3bIwn}%vao3LR*~!Vu^0Myx_cnHROONtebttK*a0v*4W^8ftdiBax3Pnv-H8oM^ z6^3X>l9G}tDk@f2_3-^SEo(r&qXVU%^;=Mb8#E$yhhAP?fkIpx;p=o~XJ>2mXr96J zE{C|}7=?%=*)a|+rM#7} z!^_3Xwt?*H7Z<~*9(3N6Q_k!zlr0j#`=b5{YI zx>;XTqTA`Fo9Wp)JM+2vi>AA?yW3Gk&B>k9gM)+Q+v98iqvdnY#l*w};jz@J6_HlX zR+*}*sm+L765!%q9)!3#U!CrppWB1zoi}Q9vt#ad#dF(!cOKt#5#MyX)g-t|&T|28 z4+! z^-7aFQ@nvVG$;|=TtEL_YGvnk(43^{TynK`SA|z>?p9B`%X`@)mQmG5Io=u%AA5m8 z!6F{hH0N-dF5WJ#m!G5Mt1=!O=S?N7zPhQQOp&wTml?4Uc$+sKHK0ZEgnBsdcE-pGkKtT)&7E>c5{{aQ1 zJa#6g_vMq{a)HS6ja)P|G-WFtM!dYupa5I4t*gxI)OB1-v_n8d%%m1!Hl4CQULPb? z#>6 zt4PnvsLk!`IBQUY7CbSqciN6J-F(99+v1=f0Jvt#s-m|r{`75-ifTFKvDEz&B%*sH zYuDT?cr}ZLWE!YmzPw&Ubu*yDw!W8`=kADyoRsutm8I#z?rwL!;cU*Sp`k%)FfT3b zhd$304uad|aB@^cgnh#tC``?pZpI84(-xPPm&XcKRaI0n=2ffBW*eLojoCog_TBG^ zRD66q&&}~L$TUPZ>q2+8^LJM})79ywtjTt}GdOs7h!~`x_qeyud7g7mo^xNfbKmQ0 z=bUxitRzl{L(sw90J9^KOy-`QoxK4?`YF$~@14c|0&n&7&H2F+P{&co-Fb-H^%7C{ zj+PD%GJS=I$Ai(mO5<_v+w*tvy|&98pSQ+~TjZ5KvU76QzweIXxlHG|3}`w>wAW#X z9r=`Ds-Z#X=r!H7c6)p4cHQn)ke~1Ak2BZcbmn$Jd-o9Yba$46nc2rD2j=QdlShi2 zjBEh&mBZ#p?oxY5%k&F)C1Z~Up+ zxf{{$h2EKWoX_dzDf`;3zkkiJi zi_~x|qCgz#5;ZvmR8Q8Kvb`V0uGMSd)Z{O=R2IWNd~@8L3ZHkbB|5RguT@bWugzK- z%_9qVx7Ql@j>S?;FJ9uLr*EtZg|IQI;o{BEttd{vQJtx69e|F@O79jT#VB7E?Z%y| zN>H0{T2jBLEO9uys3^=11IRync2?&6qV$pXl>o(z0}T^f)8I~$`#~k%<9}PCOQO8G zwQ&3#>q%mZn+qM!+DU^EqK&XIn`Kj4oLH6}@F2U42Y8=a5K@t9&tK~Clbj~~Ea z>0)qnxVt$+L_o;U%pa`))Y za%)8oFDonCrLS9MI!$KQ-ri3B{CNrk=VZOZQKo40!0EwKdkn%ks8P$y%GlZ2Gv?hc zv)zo$&6AUo+Pv<&EC9Z=zP|0hyWoj|J`V1Rrq#S1ce_z!^{h&Ey`&5@`DpmzVX?)7 zNKibjO4lnRGO?vEV-amPCWofWq9*xYE##-GH?-i?tn4|vuHOXt(zcVTH(edi(xSN3 zue^D$-W@sJnNtE{5hBZzg78zW_9D0Ptr@S$p~2C+jWOA#Y3u9Vr2>G^xm`^*LuLQS z%2Mm!!LPAD>h#8wlxn)58nCE+McZbg+-ckXhz9fD=|R8d=W!lzz>S1MhbPMLJY^*28}b(RsS zrnK3(%V7j1+E!ApFT?fYgUQ=SBh#1MA1?vRrLR6Tin}^|!ET!*F5ZzVbTJk5>EFde zV;@ML8AHAyYsgje?b)st&364Gxj*I=;bJSIur?xR&1he|xVk>-2NCA({N5@Fxt%{D z-1n~+osvdIMj56cCG;h7%$l8n2uQ?fpE7kHH>S;-5|fg+9go+6F%9ltUmUTR&&^aA zh7TGP6c^tCsE8UfplaTDyvTIA3fVLjWMm!!JiI3ug|9(i+@464%O7QDU;yEXjGUas zY-VC)M3)X*E3c>sh3c|ZNkv6vU`(&P;cB-IWUi9X@NkkFBWh9a`(RjnyIFh-TJl4l zyS2OPqvShhYio3>wgAG`H2{mb9uEqE7H+7jy!;5n^U1GYKiZN3tD19IBbXTPdljfv z&+v?unVUO!GOE+dALr_FtJv4ar$WQcw7O|$Z%>E-sidYx`DIJE+s(KeH4RNs zL4j9GOwd=T!9|3E6qqOkQZ!B|<5X^uuA5fax+lZVcD9D2N8?0IM;EDqGnVjFTw+}q zCx!|e#XNJ-VbVVmEO$7accd+ol;*6CFInpPr?-Q@z;5iBab6dc4bB&mpSn(&^Kitd zDn-UBLUN#@S!K+V=%DqxS;Dzb6jbDwYS-fFlNs#FultR6u;G%Fy)F& zP#7_>lSph#bfcm{rJ|}EnBdw;O5)Y-DRi!Du~SWKHR5ooThKL0nlzH^$ep($b{ScB znj1Ur>FM=iz{l-9J^m4;z9s`JNR~0bt#1lTqaPewV9fsP->u2zR9@|Rn8;mn`cdJ# zqla9L*KX|0^X$7$QxR2s9TjNB7BK+M$_8$WjEsC(-q_YAC=G&y?e+w52rBK%ml0hC zs&aD2yLEe0CRG3^163Ic3X0iWy@P>)0RTP?@UXD#j@PB-#!j7%R(tO=XhvnFycr_e z$yB9rPVvhv=P1zelr%LF1@Fw%9D#sA;S8XtfybBLxmj6c6^RK6*PHpp%ZADwEe#0? z_{RanZ<|!Q8Pb4Fd;{tgyF!%-gxjAyd}V;4j#gIo`t zU_^X;03>^2AM!p#W=Co)E))X<@)%!l2ld_P-l;}iVw(Ky?#8T8vD^OWVCjM1af1GR z6msRO%6Ujy$y)DvmOHx`p)cY09$q5VV($Pi*_7*j=~Tvig^A`7x#STk>j?#=;-x?( z$fwE$;X%}i2It+VE~q+py4{`rDw>=!Q;i*yF%^;+Sf%Ag%jTD>>_G_?1f{fQ0e zQb*_P zxjkP3Z9~MT_scw2+pp?o&FHWJ+DXgy?ghkq@!9>;ef`u!Ux{VZ77OS$l`YieGB6)ghs^S&=)n3CH zVHV$onu5Y<3(;*!etx$uL&MGKG()Tu2oZG9rqc%pAFS;*M<~^sl)OQnwzIaDi%Kso zm44asRIl#K7i{&8y(?x`e3Xg8x2wDpE(dt+0tzE%I-jZFhO1NCS=aE*JI zzon%mEh;+t?nLv>#>%SvboFUPZ-4(Cz{3ZbU%fg?w40-k@69o1h;==Rp9dW%v3d10 z2>pM}V{#z6L4omC(kV~A>Cq`&ziilWTSc$W%g^Trv$Lm01w@7Y0s;c2rlwLH?CiI< zdv}dr?i^*~J%QFVCA4&%YON)Bck{kPlw z%Pe6QOVLf&?+p!em7>mZacymEkWo<5pl`Sx4t3`nT{?_GuF(2OLPC;rih8$?TH@y* zh{eXnwhx<6Hdq}Ifes*y#rA|dZkm|z&stua2Pz;}yzRLe6}sY{vqXyxoH;zYh2?W8 zThSHg$CImBGMskrc4%eFTtSXMQ@;kaN+Cgm;PCfqSeiX<$Ml?nxfRPR581jtWpdNj z_a}R94!U~>@s-E~7p+XmCTx`s{SSSuM6QlrAJ^@D?^PEnnkMM03n?#}lgQ08H8tGh zvS2V9-bE~_&svf7J2==&dk0i z;ilk3!Lnx5sQaawD+j+T6@A)z(g(vGpQTEY`RwzB_5U1xClTsabC?jr7eD zR4DV;z4J&&NGZXyW_RaHA*lGQ3nz{?H*;S;@VkyE$jTl8D>HF+RvY>93KN$hj zpe=wxbk5)1%;&?V<-3+5?7LZ5NV)dF-O;zW-LARakEzlMmD=9kcZXL=Y@~_Wa@an@ zs3_WSq{i8L%aLyN7vKBude5e7HJ!ic12d!E0SJQBMm!hR+^s#)h#faaOpL;(Dp}bg z{%rHq&MUl-lrqrJ)%8opP=^wdt=1p463hA2erS(PYSfNF<2Xy!6>f40nV+y(uC*CT ziqN>8Ya?lNO~zBy5IA*M$#Zh7&3dnOmx**zUPm%+b?GA(nw2$UC!5clEXKE(wd7YF z_QJ%L@hn9uNy1xk*_2uH%_%UbzVclCUGz`Z$Bw7_G0Ka=oTALts2s^B@TQaI-B4jIsjCZpbIvMvX(b!O&O3s&pR@87?J_Fd#9 zEq~?oPI`KJ_byh97+K)k{4|U2s9jh~7+DXV{IIO4pqhdq{1glY533^}{mymn%**-x zhntlX+KtxYQH#4xWa+77#1{?mPI?g6oH00+wz4F3xgm%HiZfqQUh zurD(LD%51%!rGM_=}Oc$nntSs%@jht{x2+%x=}N4FvF~5dIw;Y0y0#*1-ZGo7Z(n? z8vZI$GFB91G}R>x8MSEL(&~Glfe}vqEjG_=z5k+z) z$`tn-Sr=US?~!!`$WbkT>8NNAskkz=i`r1%FHqXcabUS-3+?-Zf0rxwMzScUZf)po zSXrM|+c<*Ukvg(r%_qhCQWpXjjB@^q72R$3tdK z(>M*k$I>nb_Xr4U($T!6_cKZX(~}&kf7i}`KY0A@373_~Gx;3%XW2yfBL6pI1Xxg1 z$aCEiUG?@~C50AG{a4We)`htV6W#4CGpl(5)sYVQYbf;#l}}5cdYxqSbE-q5F{@QQ zO@IRHpCRX=1p4rMJnp}}sqOtrzHXg}Q2q}`BL6GJ0X*b?|48J|iHFUO97wt!IMuXr#7YK|FI58dEI>kzh9j$MY>+_!(-x!j*zcwP?bwFI z25K3rr}B7Jk@_Jg$v@lzT1=R1XUYYfKe!{MCfH2k41kpK@1KTOj5EAp7^={IuRl2@-J>o{h>)H&(a#PSEzxuf%UV{ zUxFNVl{bsR5f6Gd8zBFAG2HbiHy@lIrl5GZJN{1*Llp_{=h}n+FtN*m@5kV1rvDJP zx8VMdyX4afZ1(P)8;Im~^UWWr`QVhfeoy;DZNB?^$hs%Mm}9Rtb{8Zk-)yhB>v=sY zbNpjVK1IT0`}>QAJ|Lz*cBhCSf)}9l_xJzINr(z4?V*()f3pLWg$gKG!7R~kdnO3| z6CW4(Bk#i{hrS-Mr>66zR@0||`S$9b6hHRhH@`rapfqhk&PxhiYA|Ob7Dsq@!%&!} z8qbilIajzYzrM6MqbfV={lKm@tcd1QKpd1Gem(z*%|Z;$;r%}hhOx&l5F`xKrKhCi z^!4o|Bs8jcY^-gCDY~Ms#V$UuCw3#=^UcqO@>mEYuU8$W9I4of(^~KbG#>%Dw%_|W zqrUAcJ@Im+`@dI$vD=mt*i$f8Wh+ccnQL38o+kZuvE59ljFyCTB{5mD%Xr56*@1}j zM#ijn*yE+;nmTU)YTyRaT61&(c7O59-v0XO34NTFyZ3G)jDa^tTQC++0h(S%VZT#@xhYDOZw;W520O}T7I z$gh++RBVoeT2>n>jN~Sq88+US%%wDYumcefyT1KCi%>wKfSxdPD<~O?myU)OwmaiQ zvGJ|7TYa_xGhkGw^2ex2=~MBT-nZRw_pECdE6&o2B67fJODKwsQM~|EYeg1RIp!0h zF9{ALsWVHlTkCjt%w+G!Yes;i5gugA{WFv?Ne6-PJ2{@tvTJX7->-p!OxPjF(hAdY z(u$aizPefW!*WC=QNw3X1m*rI+hj@pxn1j5tO6Y`x<%n7#3h}`URE`KJ~-WNp30JV zu50m$?<|m3MB-Wxif-r@MYkGDA{pMoJ`HwLDFdd0xQ`0RvfQb9SKi6#w$}0Up zGF0X%YcHU|CviAINm*b@@J3j6?UP)QInkUIafA8ymrR)$U(hri8JPPw;yPcNf;QGh zm$M|KmwJ!Yf^AqQUIb|0h1+z-B-(QCx_)$*K^fmbMrsm1zTOc?bJnHB zr_@h4zU9tIKV)94?~^>f!}v6-})=Nql6Gb_c1N|(s-;#CBN z+6CL&J|m^SgK1fZ8~UV;)0{gs*4#@THWZ*5np{x_P+UQ45h>`ytW@!0IJV z&kr=pLE=Dj54+6u?p?PAjTj&^2hVnBTlj}6CSc(t#3d#g?`-c8;hqR)m|Ij7mb=;R zo;3-P{S3sN+}pzN~d}jDDQ(AhVJy zUXpC5CNxQU2s}PXVWbQI8UP~4WA|CXks;Ty5(*3_>{qktel6bpG!BSrbBb4;?BICu zc@OnYyx$%nziyd#V`>3CFSU%*W0nID`li3$dpIjC87mV9hvM`ITlE_wTn_uYU*~}g zehR65=OSaNII{6dUq8A0{Z>`jP+4Em?rzdt(QZ;7O~!6;U(soB-^#=6*Zl4K?%lD6 z{Pp7PPeRoCH?~o)Pa29K)598rggYq=Pkc}%h&4wUOO8zPMucE|DMnzjGy1BAC94x9 zCT(bThFZ`-P<3c^pl{9{>vPTTef)`y8h0zBp|Jamt(;0sT-?US1_K?Pk(pWLC1$ar z*@1IrY;5et*47J3O80(1eIsClnI;m=jxwzJ?DB`drG$;{^7%_m zFU5ND*24f!W-%S@Q&uJ;#xvw#mh~wj z*4h|5JJ%0yAdM)ozjFl#a#{uk24Y|7qY$uXI5&a`@F4d2yf@sJ+15tj%*f2t z#E6HO3%{%j|2uV;7KHoLT4-UFDEASEy%rYA&X*=2csF$;_L2LE00S2n0TGeg#!zNz zDzVMl=T2QPpc0gk3Dd6$sq8v@!m0$NMx&^vhF>d12>4o=+1X$WMq__Ba(>R*7BC*_ z3&?%|zP7qcGbTj3ZFv)St$%gU?(W_@EPU{h6PQ&CY>T~WnUT`@Msw2XzGnWdkl zuNxf^wfHDEtEw?8i-wB}Dz_}p2V|`dm69>wgaL*5b`+2FRWK79`1Q8-?($k>a*K+B z{run?yA2&39ovYG;^O12YSgAag-nMmOPiHXf_ELAoU*gBGN5DScmVN)FfUH8ye2>2 zSWD~mOT@0mSuow5`~*1wXs5TvWj*zbo9gNi4FS+x7qT@nEREWikBZ0n z9B-bC$St+fNkckV!*X=7JQPGA8o(U(_FeH5W>62A^*)~<{v$;9t-({51m52LWx9de-SJw--vq5sA+ufxh{guDU z2oInh42|l#fl$Iqds+x??(hE9#?03-IDt{Iy#{n zySt}&N0T7|0WYYi*qu(dFOJr#O{ZbvF)%PT0oj#qq5*JK06 zvB0<`0gQ34L%>k}sE@}2##lM^^_&(9JPEO}?k!=w@9%+3xAT2sPU*%@ae0f})Ku-g zxdv<$7#qNImJ<{tLr8Bi`HF%-tM+9dFhL@(1;hTPZI;>p%o%2Zc}2PTc||7z>DStn zeu7*t@+n*tG-Om1)D8=BzEqUtWTcd^Hl=*}Z6>F?yyfqQp1iqBS=>@zQ(@HXZgt z)uEN6BRdHRzlZEPx~I3(tzhGvkdRA1dN}{@sMWJDvc0`M=K||?TAo}?_ps+NU&m%C za12l>M0f8XGCUjvl=zD(Y(GiEBX%%Zr9-2ue$&Q(!zuy03BrDC?d0*x-6|slWp`6_Ifz4kw%P z7)($xIbL2~U{bW4O2f@64>n@uwd#|;d?OD_3{4|HKflSzNtMXIm3XM5bejkQ&7slZ z0}okQZ4cR$+D6mvThWJ^mG%PMQkUuqXbEN0J6NY{8DDhJOB&NQOj*d}_m99uY z>5v<1i}64mw54yRygPpYg<(7)TCFGM_ryq~&+lS}6D>}MAaPft4? z{1CVhPJCb_DCjeOS8xyso9zXHyYTx8e?LD!FW9}LIh?UG4WvAOWU5G*@BkYSWQ_rD zC@6@_YBlhbndYZ*r|!?oKA*COM14cVfUW=RhlRvL%T#Q9Le*2KL0)t7y=G5X@I7mu zUOa4UY<&EP1?hV_c?CLt^kYD;0nB(K=J?O!W4xWfaj&kfRvv+jI151AAKWEPfeR7W z)SQX^!2dm==m=-hG4BPk_zZ?Z@8G6j)d8c;*Xjg3;j_8q&&IO=^F9Kl1>GkIB@4WtxFF!{C(Y33)TmE~O33D==RaR;$85;xfxD>DPL=JTwXlim%qh=8U-g$vixajL#c4P(Zy` zHfb_mtQnoHmRbkUOKb8XosR|-Fw(VL7P)yx2M6#tBUW)ne^kw50L9Gdd=&d&Wc)fKF5I$&9A?-wDbq| zYrA#P8}7$A_-T)VA#onJJ%BgkaX5q)2h0HdN);PlaQY51eUKuYtY636$OuhwQB_}` zTyF{Rm)81|=gaj`IX@TutQ3ur@B34OcZHs^T0I6E1lX|}m|Qm`OIfcY^j83*nl%wb z1yXHF>Sw)ueK5gHJ-xl+7lW02Pt=LyT0Q~162BPc2R1tb&duX_4ZD zsUctx)z>*vUD{7>eBv2@nkeos6K$p(0A;3j6)156+H^r8_i-&iQ#Pi%11aA=k{=*s zL`1Z1FQi0%_AImy|H2&F0^lWj`+7$iZO=(0L{n;0-MHdOuo{9qR5Z3OJ?Co@ZVd> z*YTnsrhSAFP&#B8N&mnnfL6g<75|&x%8VvV(6J8uDGMe*R>Z`_2BZGH7r)-p#Q>++ z;$vgs@e6R)9}ql5(csZoD{YDc+-e#Gu)&AVfFi*1rerE$vcc(r{e6q3;t_;@-0O`r$}& zLc;esR8r!^h%S$+VlX<7?#6hO~ZJojPEAQ>ECr3I*DJadN!w6$!wi^ zkf=Pejsr~Ju&^+20x2fulbD1=aIYSypFF1BMT+V6d0xFL|MJD&*_l(SVoD1mFE8)# z=m-RHJ$-$sOjID;6+JGt4UYkTV9)y@y2fT3Bftsx1j~A^u|WQi`N@` zTJRrrG0QO#tOqA1D2V?0GYbxobgZr4zoVN{s(8vy(DArj9xqyf91bF8)w$)z9n4cb z2L}gmSP+zfIY^Wi+px%koCzxyg8Tl?uC9&S5FY@|CJhQCfKjg%7A` zfV1EZg$7gavfOK2sUlx*&uj4jN*A*R6CokAwYAl@jtf9x02E~czDh=xWgt38kPxuc0QFDEJ?QKj_KfP&-!I8-M^ zisD^0)%Y~k6)>rIc_Hh=_zI^V3s%StC}1Uc^nxOfbzp1^W{JXg4Vw?td)I@rLhtCX zK{_-xHl|lsvYUJ*DIt-@EyD2X6)B9b5%yCfP(f>3-`w2b;NavuJqyroqdUT;1&rEI z35=N672?9e?odj!IXRvOIzFG_>!ke8EVWMWE{%>;!+OzTiO z#^!q4x@ApSc{ve}YhXE|!#PBC>bD0`7$+nwLc$%fgTW7ngG-@R$2`y&ef@()L_{o9 z(jJAwc+z>i|0b9I{O}lt7B->XOG^b121>j3ak_(iri9}Y6I%^mlFPrXmiK#!V3Nj- zlm?mr3te4kS=e&mL^@Jm8Nf-lR1^bqbD@waG-X^?pVEbhQ0cD`xN$11))@rS`jYr;S+bG~%VXhQQuitg;lncLiL4}QW4Cq^_t zyrb7e!c=up;wR1%b}^}^ml+YN1oWz&)b15N!EZQ#vpiv+j%#}hLAs6wHSY6D$|H7T zXUE%r_2I*Z*tA`hW{CUR&d&Iw0|e|~L~g4_=fR2p+8eN?OH1h);n@TO3DikQG!_{@ z`mZV(RH&CY?Dwp<>Cj>GsR(M6D7}n%0nejtz$(0e<|s{1iT*5vGKjOGx!YZ1zlay+ zc4TyPQQWKEY-j*W!o1$cn!{dt0F&?=eGVPzQY#+jE2t&N^rIt?-$54?`gMPwPD37k zCMPH7t6|8c5=m)@^jBmYTm*V(>xkG`KcoU}gN}FB&H1!~Bb_gK`FohjK=i?i68_Qp z)Y9s>s4sS*i2fo5Ibs3BVPsq!iy?++SsE4t(7&`?Aw;xf0ersrJdamE(*jBYCRsq| zjY8CY-k^nm$p+)S`Bd}1J9;CAD@sA$Sy;Z{)pvU&|4!K_?R%|2iSI&N-gJ58FV`F1k8Jg-bhz%7oqZR6JiAA1MkevGZ`U19$%j&fjnv^E< zDMX)~ygYHbjp|nk!dHH|Utb^@$(v?F2+|?oi%7i|@o4`P_{Db-9SdvPgju?-wzk9> zky()+rlUoBR_XQIZb(ztMsN;zn8Lvt+Bhej`a7GZf`T3$ww&hF=e%zVD^h*w9&r?6 z1#!<(HlgbXETt=+r1cmfLdGpT>RoxXE+R%I3rIP@^io-$a55H($3iB&YR)g-6jjA; z{u(4mA}1#Z)6IBxEm7Lh%e&8(UaLUZmE)O>s8pyR_IQ1F7ZZ_{2;%wsC&n4Bx&HhK z*an$_P|Na9a(=+v7eHgU|ENmDi~$!P|N9)$G_$FLlamu4--9ZRDa*to} zCj>Y+4#(@Cw>jUxiJ`CtHD_{I*s~_M@J5hd0b>%J3Gkq1uWIbPB|2-yd256|<-8Aa zlUVMC_mL5QFsB;dc$xayEYB)zo%K!|o~cc|J`!)$83hgz5jc+M^;lkf+8bS`wj=_i zDR-2{D--+e{>m#0zsFC3(mp1G=x3P>Qbn-Bs4bvy1EoQb61T%uOCw_}Kq2K#A3%s; zniTmUh5EMCmVOM4f{L3r0S(0RAi|g~o1C_VGxVtSFrFn_#8J*uw6E~FS#UY*#Iqho{Pm?VaA$tRr( zL>%mXvnj5kqTT62A#xP3#h}ofD1DdB4$eIw#kC}dN?hVQ23OIBCME)%gczlzVc`P? z{#VGHeL517mKC>&pg_1{!MowC5)uqq26t?@Yj-C~*HGW;vH*qjfmKhT3OOx=zPE%) zImm2>7Vt+9(ctJzX|o`4ZOiVgCJV$=UZxP?*g#1|h1{+;uN4w%BBhtO*aN*z z{cmol0SKFreqgjik;wI9rjVpva6Lxy*8apDjNjgZx&gFQ&QcuLq3^t=OFR)& zh(OfQZC*9%2=jHSEoH?I4viv3wea~`pw!~rC1!NRM|@b4e(CXW_BidiJ751i_(cgFxjNP7Q}c^Prot?jcC8MsP3as zJ35ZbOX!WwdVeMWTk*pOdNPH2KJAXxnCS&8vMhpku1y5KR@v}|9W@Tmy-;9jN)tHiJgv)3SoSp!T zFfb6w;Y(nS1^95KGn_n4haAcCS?4F+j)~`ZL4x$8ErtdLQf?inT2O(5ol)`}{v9ML zXmpuAFp?f;N7(46I{=XZxFe{~4j&okq7Eofa~(1)PPDz7*N~QWCqtZL^G2f5f}?0> zUtL=heJ~-(Y$r^UTyp%B-xn$jSa)|r&n%r zaBPD14~=CYxwYOX2{H1fPVZ=x)Zh}l*3c7d^YF32AkD!vQI3O%X;t=m0zs9~{%FK< z;f;VxLR!nMeolTPpM?3oCB>RFuXqFv>qCs2Z(Pg#wS}sGxm=zUA%QoNV>=oN>H=z? zhJ0ES%&3P@Dgq=K&K?224k6uiO!&fI`a@&qBP`y>DGVhdAP{&T;blU2m;k@4;_yik zr_!vJuI=*Dal-wBvJke=c*#ec*Dy@d9&9E?Mjqxl5JU@TVw6i^(dBT(Q^{^?oTAwRBB^1w_z}st|8$U>(e1rPdA*GzI?}B%7Z!%{c6LqM(dRYKFk+iqh^V3 zW#1{aATM4UK0*wByjz%2^T5{nou3xlvKUPxtu{_Kq&bm#Dba` zBuJ7sZeF2lJtDOl)Bx97K2ZAmPdXLQZ_%>8uM}5rI64Lg-!8yu0n!F=NFdB#P`&b@ ztjO4_=jw|hLm9Ixb}tt&hF~=b3Uf?{<%h`%QMsVf$9J=SU|jf&X&`ORoIsCP2+4tF zqLuu9phRh(zK&Ui)dM1FKC?L>p4MntQ$AO?3*W|imG)B*&|-E61>gTknPNOJemy}( zQ5DFc%jQB$e0FzZCfT#%8_o<1L&wfty0l-}U!BMtD85c5BtcHY{qb@C zc0!T!r0_El{bDZLnh&unJG*$?*jC09S_ua|n?`vVCy>27bCzX=#$UO1O4(+Rsb|N8 z|1aL&GOnuiYuH5zX^~D5X%M741eBC6rAt8&SagH5N=S#&-Jz6pgQO@eu@I1!P)h0y z_TK;J+3$1Cdp^DA_;KrRueIj9=RL`0N)_-WdP3d`2oGmvz`!0ERV9>+xCk64_Qv9B{ZyWnemI-#E?oZrD z$#UD-_g<|r_8#Jf{}gjPo1oo3LB2DGYlKh96q(j^Ql7pk_s4VMV?yMW2B-SEthN4B zOTYbwrgVGJRDFXmLcaUIpu?;upZNUeJ0bw^2|`J#Z3_+#dQME_4vWPf9W948&@%i0 z?V9FKihLVS&!?m+iWRK9E$fRM`JWLdnZ-2X9ZX?{8!{TQYtWLh2^VkpnlWvI=SiVZ zdd%bXw+9BVm4peLHh#t$9KGn9*v?gGk^OL{@tj9d4gdOrWp7)vNQ;MsnWyQi|CMOa zR@W935J-zoHq@Q3I|};KL67m*bzx(%If50V#74RDqfsUCE)V0U<+NnS;TfggGmCzO zY>zMeTNHdrz!dXHFwU>No%6cw3SZMFFgv1DTyAJ?ZH?9=Ddn<%NnY1JA53kEeN^-3 z78h+v`am1Q{k_+`lYG||Be3NZahUnFmKUc;VC&;f@%+}T>#Frr-(`PI2k23mnc~ga zH+6UZUTnC6oC}?&7WLRQburH$Tp(SO(l~E`C}N1^=ju%{--YvT8cSqHV2;?b%md~A z%&%_e`>|)C!!w@-ipkR}UjIs)532tSWPZWN-8*P)n zuMEB`!h)JNI|VKj&E?bgck<y1pQ_0n-rBUHA-~CM z+>-d`JW&qG@Wt|*+1qa?xaL11M29*h2JRWdkISB_@!0OFO5rKJzEfE0gk0ocHYM_j zNG|z)S|TZgZkeLV83)qO9n8K4Wj+Q^ObNP>R0dIh$X}per z&(413WydjGT2Z(yb3FY9|O6+$?Z5}*{pY${k&Fg=Gl>W~`?2R+lJKT74c**r^ z$SRoY+iwPj`<+=_)CB4R9dq*P<7JbF`r|X?&QWzkAv|=d-ipoN#GP0D-};t43A>8UyR=Bz9;RS<)OmP-!T`54dPyr zvoEG+=KR+8vWuD*Go7g#spk!XB=dGX%G9a zA5x3E*|+luuk5=X;`!C@#}VI@^t%Wwf76w}B$_`1d-ypt{%Tx&Lrsie>fhX)3CuY) z_FX;M(sz*w9bBk)ki;v^;n?HlZ8lzcX5XbZkgB=MiVl0Ynn*xue{IZ&=pP=HhiQ$! z)utpJ7TR(K*PI8fe8?%eeHUm)VPm@{8y+2~$(uIC9ZN!3lG#&tje^!*;)ZEOp8`{! zu2{7jo=-CehJ8eQXMPsH&=V)22qt!kcUS)-2PGr{>_%JdH?*lpu(Olthn+sA{m+8c zc)L3wl5apnO66!&?q)Z%u_t-p)hBLVbKd;ysz{lexc73t_-AS;C_`<6pk;RPu|ih$qeIOIpNsC_RvAsh?x;;3%-?d;3|( z(w5>A?aSSV$Jz31!iHbVGNk>Ear+nOj*8!^+|ybIYVdx7B<1w0Q;+$BKs!%iX^Z|GCY}b$aqn zgEegHYO~<6f8ETpT^GN*k4>-y3Hg{*-dg-X(MUnbbc!-9sfs*$*7tO-Ha! zTBdx?=VDU;;Oc*ulQi!19d(54zg$Z4T7b%EsTf6fnQ^djVv&2Do3OrmxS);glF>Y3 zC9R*zpO?#&=+(V=F-Dh^nhHzr;fA2gL8N!(nX|e_cA2-w|9C^kr|O$jKElBXGc9nM z@hG0zsdL3GpYGM#;muc@x8j44iV}jwjTELWPQy>{iT>BO78|?hyjkTBGUE2nrH+A* z&|*|=`NpqLEg7+8@cid`1FMo&V*fm?O0_U1Brl;oi!kSP-&=>+2k~<9*^5MjrCasw z=tLq9jGq=8>f+ll4)=vArQzX5tma^T`sr+bYmDDzXUf`XeUyYr2urv6L+AfP^d+kU zMZLj(_7`*{URT$3SU=h-k|<*Q=YeHP9*AAJYar&n6XnoegguLMiZXnR)7 zk8#(@L_%AA>gm*<<25RA&ilVN0yM2$;ERszVhP_r%Zyf^jAr5rV*>rsV4JDTgC}?~ zQ`U0ln^R5>wRRoc4Afcpl;dN9W_RdA96oMim3G$Ek11`A^7FM}-sxzrA$yWp-0-H2 zHE%-Tf4nL*zJ7pL1t3Pa`{em{;?UlUZw(r#>LSR$wH#OMMjtZt#w!li0sx?>Zl zi6HN0-qO@9H*7)de)+K1MR;(bAb1;jPFi*k!gyf6MFzg{+ zpk_U$y0u>Sl+%jWAB?YGc;DOFAG=Q5H6bWq4By(9({1YyUJ{^6DLgLc?Om43 z@%1&cO=m^;MlNlvqaWQa{6*r>7In*vKAiYjhB7g$q&>IY(2`>0YjHZf$y1MvtBI#H z2VJ32t?hi|fIyN~JJOMA8EqJ*o`#MNk2{%y-Q z+D&Eu_ir(uKhAb`Dtl0!)Mysd5eLU=;@>yW0}o)sqRc{mZdMl$EL)dx(qvMi6l?2e zqRy*`zOPjq6ZUCB9vWL#bdpW;yG{MKwPr|$5qw}xd3c#3sc zmg}wlf$)~r&{e%SKf6|A3taGDk^_Z1YmYq`@kh{>HQt*b6!mPU-lI2N-g0TBj~?jI zYTAvm@ClZBwQE#SkTL` zfJC{pw6v4cFW_oaQ$@xmCx!U*(m1qLTjz$Mq(DD;^(6gaFKoKMlNg9T~#+X?S=W zdbqH;#n5mJ&YlF1a@kcjSxy8!o|~*G9GHv+`_)*5`BGr z>l+)W*M9v1lIw7Lejbz~O!>LF=rpW{os85!e*A#W;%tINTPrI9%YU9k5r{TD<73Bu z#0kYIvZ{WKs$z`UR5?r?Qtkj1{I#!^7Pavc`|A0%9vekiA;*0iU&hcnD{3#gZi;t)70MI0k@AD~dq% z>C+#8CPuk6%!2pkWkkdSnKwOwdwqS1+$=zFq)PbI7ZqV!dwHEKbc8|)9Ud!LS=rBh zcD16^k>F<0l39+DXl257cnM%=-e+vXjH`Q~q74oXE&yXtkoDeX(cGNTqZidtL)jZ3 zy@j+UU#L{P98F8hFD|&l!7|QQut=ApH4sKWYvE3L9PNOMh+&Tf%t1M5`9O^>NMb`R zd8DGG1XmX7^wGOiX>xay*h!FqwXjIQWH^T08GI**hY>g~9;d6TYkt7xn)HAM_llvs z)8FT^mk9-UD$io4tXnRS3z;2qOU(A=Pu~k0z{`(T(&2l1my)R4R#8F8h_;EDnVyB` zY=9yYQfWLO7PoVT&m;fvj=5j8o2}nNXf{UcWD}-uUBoE5jJEx zAC&24kh=hwwq(c3#m(&ix?G?$p^%TYDlhyJ*?8dQ)Yg*8`)=^fO>xJM23+qF5_Htm zUWizw#mA4$&HZ$3*q&|3cOe{P6hhB16C!`fW5Y!b;39ow+wt$;zlAS`vCxx((bNhy ztqi{mGE>Vxe3+7&ibqZK_YY0`rH2OZ+QZeOps^pL@ht(LgiL9;!)>;M043G4zWiZq z(!@dsL$~5`bx;Wz8 z>Q_4yc)*Z@M4EVciM|aF4_{hd222&&aFP#9Iog79Vaef;a4@&p(0TE1kRa^gyaE2!V!VZ$Hxc7 zx$GGeE&#M4c?b_0G{-{zHmM0XFa$zTcW!pJbimcwnSqfJ3a5Y|sH&ISL)#4 zfDw4bgV-8XW4aMd(?lxGp&6hgY?(h9TQKL#k$Om2e^BXUpf&CSeX;8KDAtU5IMCly1C zs{*}%5A;0&#e>CLB9<XOzsgs4J#Y>CN-}7r2@J`%hkh0@YQ~ zo0sj6SwjDnQyRJU{}D|0e+J3>|NsB85%5gXKkxyUpr9ZxFOkr#5p*5W4Jx5qHn^7W zAQkL^{x{8d-v-gQxQl!J`r!!$B_%|+uMId&t_z5WU}Keo-?v^G9zH85LK&5p8C2+% zvbc$)`kP0jBKr`iL$HDXfhefJ372`Baypdq5>~Lkj4dFb5epd{eNUJRU1UB##$0I` z=h^$7-xB-=QA(-`;1xtv03yN5LPLXaGka(1gXNAf8)gAUl>gblz{62Ah@PN>1h%-r zHsEj6UOog?L4f#)z`K#0nwlE$d;=KA*mj^xCPZO(lgkU+np+m3{%u8L){+Na)j4xPl_OfH;C00+B`5tO} z82T?YBO^|3*5s|Zxw)7a!r2uKc`jLxZy^lt>lto0mckPjHQ^6R^o6i_vuc$jj+m(Q zRKv52G@iFxjMd`%TODcqT+MoQ`Qk8&#)p3X<4{!lc$&KKZ}%V8`k{&&o=hbwtd9+u zw#r~s#zS2IRfx^5YPZv2qwY}#Qdq51Cp+$5Tzt~IQQ8J9V<8xqB)o^9%sxFmeLD_y z(@8^96Sch~6yEg^j{x@sg;sRMGvx}?SiGDX>fUA?stTYUC;gZIx;x|%-9WXiuUkJi zR=;-A3YFc&4bgP2?;q?mLp#7_KGpm>`UMC;D@(hElvgnR=Z(6)Ud%N4+S1ap!?zAe z{Np14g8BJ!*kE|-?Zy0|h+j!SC%9w9qHHo{cj%K-?t)Nk#H02mbH`z>yzRfZZC0%} zYv+bEVQqa%jF#UT^ArU~PebE#>}wX@NHgE`@SyWeAR2u4p9fgIt&#eZr)TTB8rU_XqctLI)*04K2&}kRD<>& zMs05=F$d5K-dI$c3zluQaM*-yxVQ;&p#%D07r+lc;n>aLxA&(+{&a(@ zh1Gr&hx#O1`eBBm(0$W;=bT@8)0R%Vi}L(icVGMSu5ycRL*jLU>@r$r;{Vh8#=|x1SSNK1S~~xeLycgp`!$wco0jn>o|z z)#zX{A2+#P50BIU3kOGWA8q$EsWK9?-Q)-Kw?Y_ zijC<8EVV0R(%nzmkISpWy?c>bh~h5PclY+VG#)*A*&GlkrvZ*=Qj+?H2JL%_O1((p zyc_56dbkd%U2o75|2}W^*o*9y`_nz`7c-uP+)?}|C>Wg&162wMKr4dlOLovv06n@oQy{T29 zjxBzy)c6i($8;tEAzJ}S&@hmqAgeus=pVBfl?zMgzH(fKoK{DP z*$-1v-^hrFSEvE5N%c&JNMyY0W8~Sd!~aLq_u!M^yoL{(oE~-f^BfJzq!!L2oC-T_FRaV zlZ86cI*9dhI7wC#G?VW%NpPDAC?_!wkY+zKbMNF5;v1d)Dk{V$#wQjqkp@ki{!(!= z4`_@Bu|62!-FXMS)jxkdgWhVp2nCh9zAom}aD<=s?5TksP5Mmlh})XCq!H_;vK%SV ze5NiTzuMN`3RAqxr|MEfrfOQ0de8)DPIj9ZGf1)63cCtTUQraT;RBHVnZ5mC?ScQ+ zAJ{=E{A8Rqr%-q%>9uuq%=#^=^>V32v(nOT9{az0PF4-mhhop-=X0(*bL3s^IUl5| z$*71;O2S-Ry?sl}5)g4$8w3P!L??pJ>7UTDXIw3MfT@Ch0&7yN9v@!?y;e`G0xPOb z9{4U(<(hIx;Pje2vmnyf*B2EQE~KGh(m5UV4>7|lH@m+H2fFrl=~p5Y5wf#yuBeyY zR(m9r!2#Hn+|Bvkia=#iSv*zP@H(4^b^S2R+k_XtJv>p32e+m(om(49$&G_A1sL>` zUi9>lnfNLrLqjT6?a$%Nj2tto%#eFG$kb%{|WWGUh@hB2`S=g1{zI#TwKO`EtKgSQV(wW zpsV6r_u*!M>UVu|lH60S7!C#U1$ot2T&M-t7o(!ujsyR2g;7vZP>fJw@g=2SuL;o& z$1jZvy%;->%DUX=oHX)8+SfBgElkjSOsxuDSSJy9+hx%8Ih^0hR_nl(xJIn@q{c+JXMei>09QA+{+_FIb}XIFbS*ixBmfE#?q6C996$C%FuBCW%`o%x ziSdZ>e3_8Eg%v8((J}2+81=cYI-sEshfP#4UEWh?!iz^>do_Z(f!BoXL)HFdM9OIU z4`{EhNmFe8Ri$|Q)vVUFP#a0Gd=j|nugC;^ETm8n{cs8@ie(zUhV3jWfXkujB&gX_}Ivn?1AOuWz z+5^9L&R`I?ufSM1+Na}l@+`4NqvFc{Z3rmjmc>+AqjpmEDiim0{h{K2+FTC8S!mDB zdTaNP=G0&Lw@sS!(4YsmH?C>_ryQb6k3fw1GL&VyCh28xG^Va-m|h`yD}u)o_pID@ z->@ya9L6GXMe10wx7ZrQ@Jk20`iYFYu(Xu8eOdyMHTpNYO>4wU-Dmg=2El}z0Tr4t ze{Qu8|H=87q`@G0;gRt|{H9)}EpqaD&DT}v7viwUknAo$+mtrFGTSC@ z8-zo0`&xddf>hBn4tiQ1ArdPjbIva2OP^PQrXM&O%%OLQD3q} zvUd@;hkft+JJ&nC*#v9}7&t+MFJyMD5ePs7Q9rC8gzjquQRk(gV&?`RZ_=kXwHYeC ziRqCeAjPrI`sYa~pkLIGKvSi8p7lOx;6(~m%(X`uCfd4~^CmsZj)ipDl=U(gXNn6N z^Oudd@}nOHki?uJ-h$usOV3aP7iD9&KWU7A!us%}lj}9%QZ*JMOXzDcYXJ05hqK;} z8D?={99FIT-n#lqA(yNcByKaK6i03HFwaY{he)-1nMBJKR^&Hlv0Yb1MiES1PHsxS zM>&nvmQ{_J*T;uuIqp}(e7dN+rCZSrRo{6xa&UgbFt)7sGv1?9lD>k~o?t4dnd6=e zS{`JM{T{<^vedgz{hNwM$mNI1LSfzMUxtBszgswTwppi&-mIJOSS3H67U8pg;H2f1 zqMf*3f;U86m-4JqS=f*lw6)ib`^)TZ7ChhUieCyT!E7sp*@`a1DLmxNFd?y(Aj;pq z!X!DR{+%AWs>!jh9^MbJ+>B@6)`$mC!wtOE0wTH4D6}ecVe**1c?_@8H??aT(sqGw zUF#Sm>_yLhKaQ|^r0>-KoUWf@l-+K)yyR0m>QiUf^Cwb^vRM8Mt*=k$IVGJ|G*WKO%Y}poez)h zOr2Y5eah^lXDCO<>!LL3dO4YxghQ&{YG?dF5Jl^`59&4FD#oNaXg7zxj!AX)+|3j3 zeM?*n)Pswgk_B(1A8G{|R{ir(n1xTzX=hSj)dCS`XY!qvdTE8;kv2Ty$Tx4`+z{@4 zNS573c&FF)z7^(&f1V2S0(yIFsZm-m9;n}YhWy2~)SAdGoIKPp?O{W;h zRX*+#rYE_#!xf$AbT3njV8*<6KRzU&%w|oUq4GH&Wnkh%ueVrzc>J8pGCQNf)R9*Q z?Quu4A7&$68(=a+CfX39ASB#+6`$fad$5v^{$;L0eRyv>h3AjC1}bWx;jB2D%ZXo? zpcy%Tc%*{#%?B(KIx@wtuzn#wyQTf8kk_l1tLa?`*b_BIaT@Lm~9qENMoHeGf zZNEvifW0O%UZ#>E#4;fxYw52u$%WtHD+8$kUu$t@zBVh#V)=t+-l^`X8tlmrM{7lA zVR$C;^H#a{f^Vf*Dg+s(OBz6JW$g`*!~vlry{U zKB^>czgB+B{?6J8RwsGb>#t+A*Rvb#JE`e}7$xN4&_owMesHU0TLU8m_d-4E>~VUR zK=9tRHGgK~M_XkuA{3T$yGO8ZmvFR{5%!(q3)iZTw`atrw(Zu zIHk;O9rt||+6sFu?GY1J!SOMSV7^Fn{erTdp|JC;eCA$0R{$;nZ9qPLc@!5FOLU|K zWpET54?=c`Px~e3XcV`)Rd6^Pu7pz@TBp8z??zr6q%&UWB+#b7JPuxR*~;wJ{oF3I z{dut`G*q;5vL`qa3~?DeTH3Z&?l~Wd8yfNjO>9Qwtza9Bn;xf&?cx?NmGsHKXZIwa zD2rT!BJ@(~OUV_&K7nD!aLZAUf9JVYhF-Pvn=D_KUnqn;LUDc5Nc=CKCL2Q{Z;;1X zkwsZo(1!*P|7?g;H~3oWgVYjwr!p}Rf28rLz`8Hbk&wbrp8=Oc8lkw7bW5sInVGPk z>Z)>88|$-z4fLPEzxsYU8~bY2e=^4FXJ{GH;oNw^jw@}9WZ;hKH*g`O|?ef`RXc5QQMv7WiaK1fm?!|9kM@}X5F_pv%0vouQ5Ut5EePN zkQq*C$ju7$jTrHd_YqbgA)3J393Om6qhp&mCmlWO1ss6l7haLt))wysassOt&I&k#;V{N zDybUh*k{o@*<`qxH8rGxW0#9oW)MW%;l!x^7Z9OaqjPJxW0Lf9G`HOvSl78G`}r9p zsyrdjDn}PG5AA-5RZmIG6gTMh>gBQTWEelZ0RXuAPY?3@0es07-4O$88 z)C1P4UduUeZI@+w3n4gKrEEfp>wnKCUBne^nuQjVLbWQ5M?n<)GfF*J!*BOLxei~1 zHAq%1I$v0D9i2zUI9X%sO0rPjygAaHA4Pkh8@P@T!OPAzG@PYLZ62LySwgl4jd>s) z^RUAT;vTPi?Yw?%Cck`bjo*>H%z&ycnjpO10V^?L;-;jiBgeNNh<-yYGTOKqd6q=| z;*_#Ah_r|2*?A=VGK9crL-}i-E!XajG@Xcs6sZ(;`4R0)BfW1QmgBZLxtz&{m~y(% z@*$N~)6JmEk5^D54_T93jQr75O*j#}W%fz*nMTIV;JDr`)%zCqht8-%*AY{&9wQvA zq#2*BYSP>UK$wtZ*eD}P;4G7tOx9q-EU`!fo$aZK|(K@7mj5`v94SC0}Q;5 z)Qbg%$;8huNJ&InQ>?}wsNff6-c26HEXkqt{;V9QCq>+@P!+Qmbx+%td*I6#jWJhl zOC_P4jaDg^+mjOt!>0=sQ5b=VxMS_5UR?E&C{O9z--l=h&c3|2#Q9eSFoNW?WY~i8 z=C1e&wSu%(v!$Z)wC8CHa^vTkcFT_r_8dq}?GYxduWm}~br1gmy^;Wp>cgSKSp)jQ zQn%+5ANgKUFfQ}kNhHT5edDsL(d9d^m;Ch`6i36G26c{xNTv@}F8!?Y^bsbc<-PgD zXlaj;8;AFAYy9~oiI0gz@;<#9d~YyMTu(i0b}cP!H>E`v?PRsfq-s{R*uR#o_jc=1 z+DaR1Ra3MY{=A}%&*810s#kk(-?*w!6M0oTe}JcYq_O@8goTCp!Wrn;NOCDDxWgkOr?&9l^q33idwQM(bZFRa(a0~# z8Z(%YsH@}V+sOJ7FbA<;|MWZj8vib(P~^)Vzp&V#2;z!2M$W-u%sGQy=5F zQ|mZeW`LUi;z|%ZbI^Upe?!g3ZLFbRrzE*v=HRIpvW)HYzPw0d^?6iOU23SIWYggC zg|wntQHvjMMzy%|B>ig+qk%9T1KVX48@# z^xC-mkADlJQGXxo)1!wLFer}Ael5mRQh2D?u5muPZq!K|#S|2k`)_j~#20`GY|xU& z9clFvXzRME)>RN|=zI0-oiDxaUj_h6YAOumh- z2;6Gh-8olH3-f*?fMhK>dHIxIB(dM+cyAdFS2h=D`!EIO=WK(nknc1KcoBu(qf#Npu%{vB(TpV>UQlf|EMumiguKf6Mbu00z-Yht{ z#l;QDT-!{6XIO&wKTJJ&5&p@dsHEh%t?jiwV5V%MJm(LZY zrFiC*dZmu@M0&3rT#6GXArTsS<57r@?cKh1=v{`QY4zpq^mn}!q@H|2jE|U^y*y7& z*AD554kA@vDHK)^$9!4}Yrpdj3<>Z#Fr>A7;vJ06O-Y&g`t`C9?eFgoT*6$l4^=W0 zw0nnl6_u1OTkx?7Q`qj_1tEj8kIxz06m=jSoNY~c`T6(Zj;vnA11u;TPlb_*34j4K z{IozOR#sN9vD@0&b+dz|3PS>F2krks3*q)7n z=OrYJgG2X5LDSU$zlxBKyUj=6L7ILHb3gEJiV1OZFYM22jDG&i#m9#>W>;(6;@gy; zZ|Ujzr#%=4a{7cDARUF`)J-a?z#D+^yk(iF=BJE+8cDq9yU(nORe$NN6b&BY;I^0G z!uXj~VJD11?If&qKnS9ulj8a^PGQgu4<~;&5*ar>)D=dSEAgit1+vG19Jf?^H~wv~ zeN>Gk-fqp`XxXC}zQy1jB9(gIGjGPri4B!Bz-ehs-J|_m+VT z07n&c{)6zIxy2a(^P^)?93X;wcK$HAG;$d|zBdy*BK>OC@OMe%A6q z2D08sa5f^*lKur&soU8&D$n%)$~Z2#^hDB-5AjO^WM%*C8CJ~;F=z+-_ruB$9v(Zp zAuf^e*{@-v)8iwPqhCP12OHYny$BK_YF8|LmDy&W1^^Ezw5QgbZ#(@MNQQ2~IHeM} zwv@r}_G791wx!n7-R*2!s#84kJeUxMlKuJpEROyzlv=5U5ELyQ2mq&L*UG0DjkWMpJSMD+0vb@uZT`Cnf(qUA?{Pw^Wp`(PY0 z*Pk*Kd2zN%&st~jwfK-y-68i`c$2h(fv`PNbEi({y-F)QhE1}4Rc7y=IR-Gpd62Zvt z-N5=c4<3soMu_B3i;CFRw5C^j?YfKId?mxm11*ny0M~?eWH!~Z*Kv&Y`lrE31hdY@}Z1OjN=q8-`JFr(GH} zt_@A4rONw+0{}Uxs$T!|V7q{tWgj9dKz`^V!oz!=4o$8}WZzfU)@Ce)0-{;~lhvvq zL6)zrZK;^gbr6`R1rk0(Pf=n1aV2gCM+M-`y12@Hj-bFUnEWL8Uy@i8^NEluNX zTCNp223ui_;N@}gJ~d^NB_b1RYsDd=lDGB3Zc>ZZtktDePW)V4DD)aP2Z{!YYN%yi zDACz->evT?P{AepcR-mLmh*~aioX(ck~aSSpxdvZN<~uvv)Vb8GH7(sxTt3t%0*VC zWzqad7d5zcxR!b%Ns~pqu{qX^9Pe-sSqyvtNss=+yG9EPJS=YzWwID}ro0ADb<<;G z!Mp_J^=?sDEh!T;j2u{eq0fA2Wo5B5O2qxb+9yFeIIg&F<7zky%#{%Tz`uubBL}qL+ zmNXhjkUFoD+O;{EFt#E=PDbQi53f^h#MXV&wJ{GC+Q$nFtXg;WODh@LOPjqTl~q*A z#v3%|JQvC^GC6;&bM75JL-@FiF<54hZeihGr#B|VoMvhdaIwfFyQq$IQuzCF7vbR=7k}wIJxw#umTP-l!5Ee1;?|ZST z645QLueYDo{a(vYPZM>+e+t8fK7i@*`v$gaXOn%}2lF0$Z;I?wpjly)yuZwAIplr1 z+XHA}`{#fSS|J3=eCO&_eDhv^4M{k*v-BiBk(I^p)cWA>4a{5+liux#HUh2zm=Ae< zepLupkh%~TQ5h*^J6)x4IAK`5x(*tUIJ7$wwC~HPonUV82@-I zo<5KWYBvwUQ6@ivgRSm$=GJtz(x8lmt^@i3%(t-__6rAN0V!vuX$DK9c@p05BbbBK zH-)p9#Qg}9Pyf%eY?;me28HfwmyPkLjbij6t5jp0&%xoVAZl}O2sZfB+bXkFbuF;c zyzJ+E%NxP!#$7U0CSxCIApV}uH`Dk+Y(=ypEb*CvsG$D-XM*z}8zVhE?CP8xwDL#G z_X;t*MNDrz8Fkn8{qA@H6WxJ#(NJFbK+JaAj|nw}YSIY|LV|2BPB-4Yk9+&P|U ztPzzvDuD=%os`ju2|x+tjRcQ1>grA0Ue|v3^T>#XE_~gb9bQf|U1xWMw>hpX6`DjBP$&YoDGHO0I>bfK8(0V{->< z66@oiig3pdQ;mAtiq1EFS`&P^UH((&%o-7$h<3FcWBDv#!TV?-)Y$Kg|IQ)_F986m zH#jRB+l$*6|CYqP90ynfeYY#4d11$PcdK@u5*I@l4RDns&(;J{L?hItXeoQ|^JjwQtx-SeEXta%FtcdyjAMRT59kARW4tSP>a-L07S;n1 z_>1dT66K~ZkO2+`4)wD?5z1Bf%TO2V^xA{-4jdVByig`MAwX&NIdKgt9zb3m@4j-9 z5Z5~nct9p+-0)nJY`Lx^4yzL#jln>mt**rmg*r{h;VK~;Qmy8!uKB)1fWs1am*Ot! zxTNLYOMMw6@suMnh<@qAQOr|Z@A!KUT$wIui#ssN56E$?vaFnp3?$Sw$fePAN2r;p z@|5(itlVUSCLk1yi`B&<*<6#{ZFgbc8!R z_9Yaxqpbk-nhk1wl)A|#c^om|FU%ON!X8V#Hy~USGNMLcJY9a+DtBehtWKn7g?zKs zB5c>yJz3%_@{ytsle(?6kv z5qjw82In4R&6dgC%*aS3nC+B}%2D$lW-nOhC`t7ONNGnsZ~;j}DP%-(xvrkHQ&4%= z+!qQ<5P9ZKW+OT19I8j^7gHX!>~lLaUf}3GvbCBhxCR`B+pDXs9xs(rF=JZR+#ap# zo9_nc`|JzXyxvw!DWEIIP`6dkbyF(6F75l~&RWbZhUks^8)F$iQ`&;BjjK!Ru39bY z1}Xu)f2rmZLCfFSf04>n#&w@?#|N=JCvI?k;q{gI449GF`Gm7sZiK*?tJm-6H46DU z;(J6}x|e8D^N8dT61DOBdt6<%Bi}ExmAF;k?5~g+Auu=>6wP2n9z?Jjkuea8e*b=F z=1`CU0Dj^7GJM9}%P$8)PW=qI*c+)SsHs6?d(Y3W#gR3@3x(HjxsL>wqkUN(K{NX# z^mZM!lE=a36quxz9In7P#^N$mE|-FE8)aeQ01n`QktMAPgj02-xD=KTdi!s@*pN4f z&Nyt{b<%mF6WGr^2cc!3N2JqJ2!7grG2KUyn1fd1vv%tMwW#aEbM{9~A8+5Sy(-|) z6{6%VY_R?;8+9=teZ7>y#08)^3l{{oVT&(~uK!+McV-F(`4EI9mjc~|P}=sZA*{=F z&7GuIbuU_s0fLH4H6{C)u?W(t|!j2`+w3!{Zk$W(N z0xIT}7w}#)Azr_j3```+Fu)^a4?xG(C3jSIY0A(8d|RSw0n2FYEL@2FGeP+(<=CjJ zq2Rqcw+|%Ul@!^fMCsfGpD_yrD!yB3ktUg5f=z)ddeIpXxGUc+ZEZ^Jz znBzR`Nu!KI_xI;g5=)PBXlPVO?kEN+$h5%h;x>~9ggcz$zHis?tAj*8?S^0rr}qYl zl_Lo^k;GkxiGxpNFk-{~J6_I624IuNX+>5L)L*BLvkAOA?Z3!%v{mws#hYTGgEnn3 zCH$7cE7FG#>S{3*rT@IK-f4ku1tr$>Eu1om=j#$ZYJ`~^xy|e@1;tVi+hfXpCg{TCI(Aey31Ut$n zn>Hi-`PDkR4!3U0bf1u>*i#IGM291hHZqLn0fYy(LbLLiE>4;JX96+{$d|)To6sNt zv3*xcd=Fhq<_Vva%&7m3!t3+M4#9K% zw+>zOvzY|OxmVbI)hIsr*NF5G)4fBhS_vu+WS4%3UUt#RxV0?5gShpnx*u50=JT=K zkjN;P9X2n*bYaPgSGK}D^grdnRfz0Ruv4+@i(>TGZ!qlEWMtgKHzjh4B#e{e z!YA=4VO2pfsD@O*6{R~9@7Gh*gEq-Z`bw-fSVoVp+mBQy;XReottLT|l$|^Y3xN7t zZuIq)q?VEGHZNP~P~v%@ByJlpQWijJpm_PJI9NFDj-Uc40?EL64OH1oiGk$!oOqRf ztz52l*=xgZXhcK8%$H<5BLy2SzOEjw2526Ux5+9QxzL#AI7)QrJHIAk z<>tO|^Y$CVpKzX9qQ}HX#^UXpl4|<sjxC3igG^o1dIXaCB6Z9Jy?oa!by zA3kVGR~5XFdR2(PxpC?r_-9oM-Poe{D!xo}YBf>rkW8a&f^%y+!af3VzSucg^^A!0 z#x~`^dO$I}ydod0dKPXga&TppVJvtA6*nNa+j{r8%N`ivak?uI?7h9OR40-Y#OPC6 zUS2HaGV~IS>-Z=uju+cRS=W)j?jH*==q%f7iT93Hd-$=Ni|=a`*b8mBg>)>m^3yi! zE)m>|xqDq3j|{EuWm|2z@!?eTg>ifbriuR1n6B}sYWjNt<}=JqHg6XVb*RfHpSs{VNqrF}4j;Jv~Y)*a) zOrB>8A=zbyYRogs^6;O#2)M3a345E5i)I|ziYN3Uxs9Du`D*Sk4H0v-Nd)47@76TG zfrYu->yHokwIWTZ+4k!Gh`IfwPC14Nzze*bI%);t)j^1}vc8fKzOp=gLl*nM$Dg%r z(G3cVFLpbO&^_Q(ImGRkjWVgcK-{Gxg`dcG?^zc8Or42hUv=6d!M4t0Ib!LU%OpY| zw0;@LeK!mVGi2=)u|5n^6QG0GCYnO60r`}nZozBt=Go(u-f`x|I!qFbR`(lTiRasxI2(4-J7TCqYOto z45+U2K7PNsg}&tQo-PpkePn=ZLo<21GUm%$YpqKKUNX+Bm#dy<+7Vahq(j4k%SFhv zVs-r--#uVh<6){uLwl-9Q9xWa*$ZoEBO#A=eZbWO@09Ai&-|`A*2P$zJUkWjw8RTT zS~A6W{d?Yvv0Nb*P9dC z6Tha3dm$K0&xSD16$2TJVba1+QH*#8tgw(h+Z=SVV2x{O-~wF;Q;bJ$5H&4YE2P{% z24gS2ztEUNEOwqoV=GCYDBxH8(sHx48adAUVFBh)mG1_FpFVv= zEL@fNW8rI28jV$3A`*BNyIPd{`RURew(S#s!`@;ewU@#pKl`G{u*$7|+N@o(ukW&- zkgCJFa)W^;3C+d+C4Q>c5%jQ9b)4=TFZy5MnPfM^*lByIim~}6I{M^?8pX1s>oaD& zg0BkNQI1-%kri=CkDP;4vAhjhSI{rlwguLbI3r8{I$C$;I3pjp(9U5d$|K(ouVOp* zPe1i6FmaGS8h0rbAH89>5U|4A?vYE=KQlw!EKI1FQK3`gK9qj=L#w9A=(Wl zYXv9rpQSg3{NklxZ5uzyx%zfdEu;mG8!yy1$}l<%XVDutO2)^K8h5c!$}s{}Nl@NF zCby&ZA&i6QZ=l5O4Z9R@%U4}4YVRo%nE>4-2Zc&Vd2Z?6*s=2UD?1yyN93(v?3H%pyI|=4#9NiP9rsT#UpJNG=`;j2Q(j;9wam{a%>h)>L#~BRDDx(^86W7ON563mw?`mLIpd(X(+J zFI_~joCI2#Q^qI(LC`cU7PfxjjwIVE6xTzVymhc0N8zhd5Y8+k^=cw$@8x+A*W8)) z1&eI86@5ajm9Dpi_yMgu(J0*jjXm?yDDVKps?}$vzW8gKNm;7md+6x&mh4yt{^{uD z-W1*;g>fmUsyg{Mse85w-DU{&CiUh6U|{?@UrJZrOMR`duQ8Sk@~QfJi{h+ z$f~1-I}#N zj5rX$IsNcRH{X4A7odLv#&W8kGEa*ILN+oGK$Ev35(PZ_D6wVbyC`G+{(s?pb!Y)- zBN1@DzY+CdK>TqlH|8~%Kksyhx>2Im{-6fHm@@={PL=yD4I_l0%Srx=cU4uRL58C( zaHt?k)vnIYqZhq9PlG~FIfPn#U|;|k>6y>PyJ2&8u}=ZA7V9DiLBgxQl(FLN;}`uj zfOzr)(%#sp83|vvU4Msv(GETGr>bCVFku3|`-|&7acxWn+)vvmOecXi9t3?k|s5wM`ht?C*?=69#vH( zfvemmE)8a7c#vyq$0f1v8Mwq;mhAGAK3j0Xgp+l`?R8bc{pcs@EG(47*B**MdArhA z=w-_oLi;mX>RNU9npYJg#>LzQMRAiXOS(pQQ=Kp9NS+U>0IUp-_R}g?iK)oz*o*k{ z)Wzyz;U03ta?k%6FU)1+i09l*Pbt+YUZuZc|%g1YV*`#wze-`F@W{UW~76!|2@40PG~Nw zDoL6JoJRC4)rYopPMKD#^u96LUNd83G7vV!1Lg85Au*Awkw6)6E#OzQrhp z9kJows!kRSp1nmgFjpsSg<+li7_d>)3ybTdMH~+GY?emkCuM7IVy9gbYS+=V9p`FZ z>>}1aM7{9gz{SUZi+-LV^Xdx4fu-~RR$E#DI1u0tn5uOQ@kf^*LkScCXVC1e=~aIN z2bbZ!a4FtjVc8E24w^gDY?W0JcZZz4yBcN4-+nLykMjy<)ucJ6Ene%_J;A%$l-hH+ zNcNdo0I48@uQ+tyWos+xAIV}6kXr2?T=*}qLi+FH<+Mg&MFnEI2Ki1qv}r?Y@1V%` z`uW!L>6Xi94t81FB1Cd5CCDd=Q%qWlibI6wpS83Zu7aV0s9BdZT2*X8FHg70(<38E zPw~N`;`GQ`;cY_Rzl}y5tc@z0o0(cE4o3m8ZKUvUi53y7BbwIosv6akNl*<(BT|@CtL@=T+ z9;yjUhe^KA(phTmrJTYPppiRc@5TF~AmHnA@WUNLl^lRzujB=lpccRcX7RO#)+qA_ z83DT-yfc?ER^SNcFNP`T9LE#!E;v-4JsWQ8YXD~Q|IQG^xd_lA zM`F44u=={!AM5D$!V&whRoNymZgxT}(DYlktx~`V|8TTHPDIo<3<2#`(yv#qW5Qb` zVvsFu)qW(EJq?iWSEmY`rF^z4-yB2LY;*YvlTi!!+Q9E-@h?hx4 z2J;h(y{mWGnW9z^R;u5qkL+GphlW)nR<+KVV-BV(pz#$(aU=Xak1C_D^*ta`xNasw zh+&5_XIT43HJT~18@?S&xDn#_Uxi{xA|sQNXz1NCKEhEV9k98$=5M6BUr8vuoFl*N z=OW@8z2Bn=Nc=q3fh`K(J)IYpI0L8J30|c$rS}Z>NO~08r}ZV(k`;uWt;(TEubW{% zC|K(hl7;TUTtC8^!XHhwC)xho#&ahGWMG-LVfTq%7-6D5ylo;zDIobi+7yT-bLQK2 z#Q*>Bf1mfET97eUV|G)#IA~MrmG$t>yWnKHkH|>f(=M|x!WUbtD53Th@$@Hg>LDD< zgX>tFLMq8OD8eVnNZ;%*1<+yWdG=`Kn^0W?ejeIYC{FZ_YG_ynF(fl~I8x!c|$Dtc!}{jX{8QS^3p#4NY>G@ru7 z(W7Ygum`k9LZXb&^>rh5h{q0_YCq$`Ppc?2cR?K^MgY96K(U@@PLv@nlX5z+TtpEU#6cq=-C z1N$h1S?1-*`CW#eAW}&Os)vakqDH0MwMcoZJ}~ zu$+PdrzM>>cXKW?^jVtC*_FnkTQCdh>gma!m#-@67u)&9RI82rr_Aaf3DiqB0s?M; zj}rg!#e}RPKQ*<x}20`I0)J zOmUDL0{&6#Al71k3yuzY^24Ncbxlp0_)i{T;dQWNR2-I9Re{hMhksGT zuj#c$^3M%F>sD0EudP)%;minea&lrmZastc4j|SDfe{CsLSI9#tIsf{Z`UR$j!7#} z9C?8^atW3z)_Cr&TZrld@i*~sbpVG=1EmoCiKOjDwZJ{=6S|!FcL270esyLh7;6U) zw7g*VNz4R%cAiAM4Twc#^<2|POyvYcdI$@j$m!yOte{~05| z`Ygq#&1wtnUV4D$-s+awo3go<997`X0s7l!2&T9KDm_7^9K5qhP6naWNS&kP8>I2S z5Blk9oSk838GY3OzoNylYWa2HChSKTGNUYrOih%fZn;7Yj89g~q2r=2`CK}UW?H;n zyIKSLVw~O`qv5`P!}&4!+L**^l=P$hIO| z#DAP;MuG4H!!-m!8JeK(<>hATv95~7@bAlKyZ5h2F&Rjma9^=aF($(&M-!7`Q@>M@ zz{Gnc8DmSzsUa*UJEy9+(EX`z{m=3xsjgm?y)$|=U*5tcO#WJnL){y#&u^+%4s(DH zG_418b*5pgAMJo=@yE!i(tSdfD^#hcmseFdO`YuN0(rX*^-$Ffs4WaU>qGG3bph&{ z1?p@~d8_Zpmm;^BO|v{xk%p>w1T&pQ&dq(f&F}_JcSAt?vS=#QY|^PiiH6HTTCvrn z-R&3Rz@#=H_?0q(jQ`!5%;&s6sHOU^z2gXqL+k-#mJZtsRP}FB98SSBdByWevaaY% z`5ol4>bL9*(6=Ca5Qdh1x+ZGS(359^9$vf$Q~bqXelOw>#OC7X#e8% z8tevKWRtxh-wcUoV~l(1J!ch&JJ!7cE)XGv+UQaXvnD+Kz4Zp!SqO03OwJ!Nlrs~# zVm`v%$?!h=t$SoSt5E7YsPwh7m<*eRcm!lGX9eFm5q{*d7;5+YIpkr42q&`i_xh_V zRM@B2SQI#nN9GRP>^VUyMhQqi=9{e4e{B9~3??6;>Y_N@pPO5FO#jP#2H3RErajMR zI|HB(C&TFJV={ULt1W{FT@PD{CMMOGnXN$m9$sIXdT~)<+wgH{ig1Q2DJy^ECqi=r!{Bmz2 zO}gDO-=y86@^6uR45Zx#Q{5j-iIplK0Ibfatw@!C7B(%&ehWyLK+WF6yA-Oc*ra(>nbz^E^FSO zz~z-1p&f2$PX9Y=RT{bG+SU6AiWoBW;OF`Y=Jw_Wv=kD{?k|K-sH!wQ{1a>%IJhq? zYAE%dd*pFE!^&}5Mj=)eh*nK?`I>G<`^1$^NipGWjJ#a1hH$Z+24IQY#C8S2y0=y9 zpoGH**;Vs|AHK9+rO+uinoPyMRe5V2f+y3wQ%B&XkL%RU)nNA7+^CGvWH{L4t@TE> z-tk#KB9SU+37+bE8=WJ;OK+yWnih^61S*X9`;bgQ2mz3*)Ex;}2lx%i9SpT%{**n< zMDWW3(PY`lbK5DZm9`7pJPl^G;0TKKcC>f{(QbV_a{7aV;AO@(`{rvF! z_YWJ^Rf?4KirP&*z>(anV)MaaW7n^zbnr$cDzGooE zT0B(xdh7B%xC-JPHpH}iOoGEi@>DA~%?|=G4{N>HB-|(6VJ6Mc1aPE;UU%&d}_keC{ zF-#jXU;9pkm79LVb~f}Zz6r}o}6DsXXq1r%`a!#05P(Ql3w3HI(a-92}R6MX#;A)s+6>;=& zgDdjqa$PD5=K*-GXkn>IAn+UC2sl&Dgmx6FDfg$jO$7RLP%Awp1}zMiKarWUqj=UzK=VU7zrp}vr9R7BLw|0l=md4Bi_A}Yn7uCz{In@ik6RXyO= zH$vT`Sv;+wF8TQQxCz1J@1n>6GqUc2#7yzPGyxiR$2|<}53$cRI)=aa%e-A$xXUr5 z+W2}>A{U}O_gV#2+2|kB?JzdkI3fR_z%9zl`^_U>GF3_Cb2E=65n`^oaG^f0bT;>O z6h&aLz@WGz=QgMm7ExeOjS$|^euK^@o5-KCeIa1q*9ZiKkp&%Is9(&im~@FE@R$C* z8F_y4E!vVTvU^*QsxDC*M2U?8Sf*Deqm(&F-K9ANlVSyiQZyfQyO5c`Aas@`fG z-*62+T7QytxGYe=J3#O!B=vX(=;|3@>8kvk3g3}R9ID&K^ye|dQR_DWp|x@hq7)a6 z@(^l5iO9IInm)OmgTp1VvDzVATigs30lDN5A!<2}9HZ$TzRp30dIs z&PCC9BytwbqvAvP>%57I6sm(+X~v!&{{B5Tp~fb4i^Kk8NDjx&q$MmQwD$(yn*TH* zhK{}X95bU{AQSW35^g@L3Zmv%)x-flw2|S57|KB@Xq@^-BuYQQaVrjcKgQPod&eeG z%#J~c(wU+TDK`=iNa5MVH*EW6&mB}YbJuH(u z7!Q_YraXTie%hlk&=qP;Wf;N$!3o`{h_G(nhxXnIVWDOla)V*AXcj5V!I`jfwbquB zf+f7&S(p}oiSI{}F;6OgP1`_wU1?AQC80Pl07 z7Uv<5o|L5S#Q0~R^0?to&Mt=miho`dpl>TPx z)*Ypz;IV6NNcK zh-j>2@JtS7bKygZBBMsfs`e9;cEKrNIJO@CYk8+lrCH>ZeTuG`N-Fk=CKx^6fA3t$LeKm#}fNT0)1z}4&O>Waf>1NkXk z;PJ%9;$VWE4ZP9wQo30Hy{akXEXE??s7abhHjJk*d=h{EV;ve*1=8Z_p_*`xI4&5b zWpK4tDpL0E>%+mi;E9GshqCsW9JxpmLr<6B@?JSlxX7(t&HS;83^b>QTZxQ7XZvwDXf*aX{!JF?I2WRRCoh4M)}T@h9r*iTDMVJRM$Gx((a)y?hufzw-l_u&%< zsk82O-KyRQchWKkSgtcWSV_m408>A9brnaEFpFDe=?PhD3{_tJg_nrHHyA&VxqXjHB2g?#Uebo=nX_> zA_k8t3(KHz8Q0l@_2IQW-hhG1n+TOK?rgFs)fgh?kS`ld?Hnt{Xx8?}3{@)Q`~}<3 zJ)Z$-_Q$aAW|$(VM$N9lEMM%sQaMQhY~8%}>2(ufOzAH4@j^Y__ z;WXaI$Sca;$hT4%|NG&ZI$K~-d46o!lAI~SUsY#Zn~ND|$c(**y)5#TQ`fuGKtbc9 zgCRB|z9hy}WoUKxErRa&``vr%vwp){U}||>6#u$`5F+Y;I)D7-WkMlJ3keBnKT>>s z2e-o?1kq|i1Id*(u@Z43-*WxS*Zy+xD~)2XAEZ(QoDUKV`opPbR`H?{9i5)iJ!xv9 zI6~dC-~UV#hm7sn7{o&p9{u@~&trq$LjBG&QAeT|U<}cWBVkP@M+Hfn_2vV>ws_^N zB3EnLVyl^46J#;9W(66?h9CxO~hx+{z7WNBv*_q0GlChb#DDqdDF-bu3!y+TtRtS3n9@$ zZN#lAlu6ipmu#!<`uunbj?#aZt`N9%eV;D}>T1 zI}3w&51xc`r-1h?`%pT;0H4Dop4Ff_EHFbb$n*XLGl9^+99C@S-?zF*)yi%PBSkZ2 zVT@5ufy-e+)b9(Y-?%y%eWaD|S%h<2FO4ZTHY_rTPs^wX8@ZZ-z^bD#OX*Qh{ymf1 z=q&C23sszA&Li0I84d!pCCq;@?#O1#wsN#;LCs@`Zt|TTkjxSug)TsxfOC-yZE(iB zIHPjyXB2`D31a{p_FN1RiPl?An@9c3&%=>aEF(Cf+j{_A^2>}OFWzP|BwjN&ZppT? z5^lnhKt_^M($dk9{Zt-k?y{FHZP!8VzZ8Nt7=BdJ{BJlo(w?H3chJvZrbKM%PtqVw z3H-fg7OfwM9f2md&MEi6JWukUThvWNUSbn0D=D|=XlTA;&Ah!eE| zpEB(CFDPI0bIg2vvQCp8PWndl$Uq46WS*#@DNG-oFDi_J`Kqlkd<7kVk%=nR&=C28 z9}?`7xK0pe7+7MvgJ>ms0K?wcIQR5M9itSHG28}oh9SX6=z?ySz0u@|k|z+n$C%&7 zG$LoELsh{zaa~|T+}fBHSCVhIC)BKQyjZQb6VB&H|5s9WsX!~=Cj8S7%lRkqAhA(2 zm@L&ThXFS0WgEg#H`cyTF`#>YAKamr`eLHIG+Cp4VQ;;RtHYObeoNx1;b?2(kr<-wAZauOH2^Z; zwfoC7jht2+t$^(rbzmkx=vgpX-C+_AgSt+n9@k9%j@9H_flj3_^f#h>Jh^Qgrvw&u z&!Ylmg5s&4yL1UFi;GsSG0DHQE&?z%V%cvP<*bmx&oKx3QYNR^yeOVEE1D#?%{-)1 z2di7nseNKgx1tG)%51VaI#wY&9PfxVq`?X30VkkWF2+4HI|3sO8i$A2#O2}$3>Fq- zy0JM4kvTbrg7=XmB+#Qn08o*D$>f~PiYt%|OLCz4)FA@*p5Ojs6?7Ahas%##VMwncT75ep%h5DCox^02;3l7|&YZHhQhFjyJl1yvzwN6)H(W z5J>-x%??Jh#E_Qop^9TWHXcvC*o)C;y~QDOs-%%Vp=w;FK+C8t+Zmh=TcWh&1R>gY zzqupf>$B>{G5HAjk|5C(*@N&hVZp)#(SGQe0CCCqLxoEXn8g84PbUN7ZEltIlxod> z?KWyMRSn`H+#OQKHVYmM!GT9CrPtmFXT>s*L6^n4+t(3rz1p z1`*v?g?H(yg~+&?+OMIH*y4h&doHJhlVp`a74M!Jts)9O>q@6Dj{)wOc0+6iKtBsr z4#A+q`bQ?J*&J#{z2y&m85Fz`o9v>h&WBosgV<$spztiRh=415!n8 z|JGiek;rrVyF&xz*5U&#aXOr*Ielm6I;%NZPlDjMqUMSas3(zUDJwiYRy1z2m4X$+ z7JD6OX_yjQ1^>Oqv$BPpK(HRrZ3=eAIqI;S~E|)2OO@Mud8rM zlu}8X-qBL|KC%sInBTY(CQ@=^adq6Q0ZiLc#)ZnhW(TV-jduh)SwL|di_oAQvKP1L z2O0{#ZUvGQH;Ghca1q50RuX>bs*eydPVZ;N(kVfdT$v5%?IpbWNK=P$l7IbkS?gvm z2ork%%f<{3A&ejI5ez{2E)GUqDfga_#ICsE71J)o7Zmbk&Mg!LYnKNAF9xN`I*VCNI*p4A*nO+$% zXK4qX$%C}L8m{n*qbFQkrQw{NGPiIK1~eQH16jDGZ}x6(PHq3N_j=hz-spr1Vzn9P zqC#Z9RvFI?S#b~My)niaLH`@ptM3(7Rq%-8VsH#+KTeh)$H3z%nvF9tsXvo8=y^?`TG=9SBl8Tw?%?0UZ%|k2W}HHL@rWp~U}gZy z@P{(zZO8xasVi}=*+mrbmJSA0Ea#v4E)znW!h@>RJA7015f431x&L^+PJ zueo}aVnxX``SWn@=WIQz>(Jht-4YL;5IuV)Dv_MfXQ0zLjYwpbKyww@EHXR6PM}jb z)R2uyJCvQB!c=IczRPoiejn*>1ub+`o_1crnD$n?Ye&PNF>H6xcKbYro4Uj$@So^Yu z4V!T!a+oeA(FTMtXU&%DWcbF+kNZSmEtNf(VZ^|)NYjg%MWY;IAT;XML;5wXR0`e= z%Gogv|I&2x5KTizLVS#TjA%aaHieN6QAU(u?6AV#2I@@&ZY)`~d^+0P4nQxY+Ni*d zCnH&OwrZ1~z;UhO^Wz_V)kSVf4UE!PKOI4d1_1O;0W_p&d2Z5Q4g2v4T=ZuEllP~% z?Eug{z)%@V?(YADx&bQj7$AM&1%MB6-e{eDT1r0;AuelbniqTEwL4Fd0~kF3WrhJ; zt^OTMmVlS(^!6MM;UBDfe!lIY;ns+Li+2vJAAmo6#eV#_m#Sv639Zcln2zV`x}eF* zj4hc0cHji6GZi)2tOT2tkcfy8P~u!q9se8#z{yvq??M6s(PA10jaK80-4CMX{Th7h zTLMY{VUmtrn5n4DYyLS?fhiv#vXVNWCgG;1xa%c_Q-hF@(ALT6%b#2(Wsv<41ekNM zVHVx}`uWq}q~G5J2}-t*JuUJ?y`Y=%Pz|yqtEHs{EK;wkh=F--qsc}Mbgj&%^klIj z^Z@@p;P^qB6!@3M8t;b&J^eI&P?J7?c-_mt6`%!vV{!3S<#Ui1=o#sGI(2@)J>1^j z&cCdo-FZdxp9koFe>&g?^gqA)Ny7iT3I83a+yY{zxl-k=z`vjWn%02-ZPPBl#dq-- z)J{Dc44t&EVNkcg^*!;C2WZIwnO3(e9zGMF@*bpOr?cpFI(y`WODr&pP|X+_&>N!uH#MHz2jJDAmXcPU%QXhO$uP|I2#5v|RrqvCjJVq*K^Td#Vu)?q zA@NK64E5<~mS&_~&UG**6dITZA52h}Z(;8xv@-&TjC;j3IVp`UjDYeY*RYl^3o8Se z)-?JBtlVuO=w@R ziX)p^$V5aDJC;teSu7fyx!gfQw_vCkU7#&GK_2B<5|04NUEbG#A!tjDBXm!vT0Ju34dY25MQCUxk>nl1U(02j2?M+p}6*MCt)zg zk47~1E@;vt%QR#eKK15?a+x@m=XYSw{BG|U0?3(?FHM$B9LCl4_fFsW#VmhiPIS@h zNJET}#HWSy5o*F9<<$dPF;T$=7Gl*dI+)Jy%wr_Gd;0U=nF!(gsE;8s;>sDMM8MD0}ONzyFC_N79?zfst_pD`=`M*QV|nhyN^ggl~E9KiT? zLdyRQzza>Kio^hQUic#sV%*_XNihMA!CJE&n2)YfJDM6*{P$cor1INg_q>2!Acy;c z<>T4b#)gQ^6e)SKv%6wBzpy@V*pCW*pxFlBFi|HUeTh}5#@Go*Ppm`gRdheUfirl& zhxTp&1C=0VDm#kO4>l>%X{8=|bAmBXfXeB6yN<@49UJPT6{rMS;}CLUyWz5`QM#UJ*kW}hEkB*;QwxK=x^c(Mt6%*tXPbHL~kFal?Vr>7OTpL zPhdpUnZ<}JNCj~uDrFUn1pRcF2pAz~lX<1o-`{#|z(~%({~YPAAoTF^qLu|{XEH?P z7T8V4p1?*i65G3jEcMtBsES;;vCku>55CXDyE_|KBfDUQtM%yr{YD42c0Hlu+;9>V zZ9f6dF}mPXrynRL=z@K6=^zYWKbuSSN?DxmiW|@uZ(Xx5t^E%(-^iy+Fb45Twu{~) zB)+bqXw~8ziaWh>*MqDXdoOQuXyi^#sfHG98*m^A`kWQ?t9pD;Cv{&W`R>>K{NNzK z6~l_lf?w$CcQn0r&?wb_!sradnVKrE1^!t_uH&FLQ=m7U_Rk~hCqgm6qO{IL2?xI7 z{uEf?9hpj@tKO2$VBHvt*%SOSzU4rV_n#-I@E1n80&L~jO7?e-sb-^Z#6QBkTyLg! zJ)t=ian!RlzSfy^tv%xmmW|Z50am}kdhyXxJ*A$BB;@M?>jb6&lC^SkHRJ=} zq9Ps=Z3WQc;8@BH2)j|>2aiLD*emR${#t;Pa-D=LMj8|afp(nSuhvWnj_J@h;+n)N zJMU2h3VbM8bfl0Dfk-9QniA0<+93;J3_h~2{^0r>67(h5;`YAjPPdxnYTg6nN=P}Q zCXhfy@)+_m7MzUO#%N%-)$SSh>mIy|8KeW!@863)@oo_R0nF3s=_x*A{W73pPD|nO z5j6(qk=ob3yfXwJ%Q0r-Bc8bWdXzZ8CN) zNgBQX_~$0F=5t(Tc%rIV`e3>h_cXMA79d_~UK?kGHngkb*T<=Z#c=WZsf)Xmo5d5X zA0O7jHg}L??NOWYJ)Ns>hRJ_ik-DQZY?7c|A>XOwZ@=EgK&59S;@NsRr`reVH<-iS*CmNHhf2yF%y2`j|NmdJfa>_)e{I)&07^2XPwo4fj)5}AJ?&bVq;5ePa} zjYU2Q+6X4+wSEpRQeOu80M3<1+HsYIXJn>x zU1R9fDk03twCM$zl%yTj@X!JrFVYOoreemYL(?9Hbi6o~)OaE-*4W73thqmKU`?d( zg+kCf2m_Ua(psYn@X^Xlqw?5Yed2!G#v{>K5(agH5s7ompcDJ+K|^eyy}X5Sw4yEX zXAkcPY>64{x7JMai;AuH_QAZVgH+z&PDICgrwCT{d|96OVB>6TvN)STp*~M2Xgo=Z zPneSU)(lZp71SIz5ed7k{aAwQq*^3!Lo+lnKuVHa7;?17!CZupFKK_n^bsD%!qy+Z zRfQWKeUW3v8M5|0DH@%1MowEVi@OAri;d98l!N>9i+p{k(ZBfv0u zp%a)h$-c)^DZE#8`;lQU0{J@O2DXF>fT7Qhny&3VH5-r7O4D|O`<50*zay#MpSjf5uPkIm6fT8^BMX< z1az8da@v6uC?d{A%1~ra!f576#w1EzQ1gLxXGw^JCQ5t{l6|O!!%jQl8`JoW=B7Px zhvMa_mnqb7yQ8?x!x}9?4%x{x7Y=(YeIdqWNs4+PutKg$N7<@am}MELRAZLAYmb%P zU}Kc`0-V7BYwSB*Suujp;7`i0IR3n>5vAt25PMoOc`Apc8aq%CkdQ?dlck(wbO(>z z@DfpkM(d`C6hDl=uyQtSZwxjw?Ad8Ll#F3n9EB*(V1KR6a83VRLXWJ$cK4q|0Lzy+ zBsOTYyp9Wnp4y>c+D49{99PJ*x~ZA2=BBJcE`o+Nl))f9_sxK>?f>i>fe|z--Q#2Z z+K%vN5eUVyEWRoI4n(!D?T%7fLH?Bv<}F+*?vTPTE~}`{cLVz!10g1Oa5u$Q_mXQx zoy>9f)!Z|OLL^b~u;w>bp>d93lfLMDXr_XbR0|PIqC8M;g&hYKrr$waMseVC_Zg8+ z1|K$-VGh`s$Xcw@4D)MmMKId=sV}Gxqnst`@V${L}18|k7tKn1%^Scz$^G6gSI~)?WU%hQ{yFNPY8^lPn{IPSHYz| z7R+iKk>*P}@NpdaTZ5?7*}_k3Nk%?-R5I=X_`XioO^_Eg`a2%!tDw&m@*o_y>~_XC z9aMQ(%DE!*CCadm$-c!MI{41 z&q`akp*|F)wTD(BGj_jHI`RP!knhwQ;nR^63vU$6UVMN@wZH6j_7TJSI?!V=;gWEY z5QZJkvj0A{luM;`1B0!S1e|}pkFmhsTS7GN!?GPZx==b;L^=annu&ROGL4T^GxXEN zJDS#}-tLGN>3td0Q1C}VowT9R1LAJ6KFcB9a(6blWuWo(>jTM(pL$y>vFZIH-*vCNV%mR&R%l zap>PcK^&-1jRY%Ciy;F+EJFxHt&{unTMts}XNn$4?5HEp7m)qTb{l7i|5~+#5Pk`)Zt~ z5aPa#Bt`kAJD{!1=lM}E4SGmc?=3fRT*+v|5OszxuZJ>&tr{!z5}Biq*hIXz0Aovj~ zxFEtPiB4I!C#r&Vf{=JYJ@z!XV_8M&zY;Ve3e{v(HjvZ<;wpb>{@WHGaD~1)sv(m= zezYu$`CUaf##UJa0k5NKNp^fm{_9VMv$+!r$?2LOj@cdnZjq!SvBW|+l1?;jMy>$^ zg3XiiegBxjRCzR_T>uM1abMsBImH1^Gsq2E-J2_Iuty7lRw_RJI#1Dy{y8W(sz{>& z7a^gb_AGapahUPYrN~@RQwI7KE`&+a3d(a31UPP|#u9IiB*;){e_~wetR=IXmwo|F z#G|o56F{iA4|UYsK|HZwbg_IibK~~Py3iCxi7OScYKyRm>*|QfGeh-bO|6eV>|V#v zmm$QG_zDz;Wx9Jh&&n#Mux7nZ!jDG)NLwgP)8Tk-+gOgO0+)~dOA>#58RN9NhKEizxv%p_j==#}Y`O?D#haqOg{%vp1rzCq%Gnu7reSspsgleM4r4WFe9&=(!bh1H5PYmYk)Ymt3l$gb zHpMn*9G(ZysIVk#S{u*j5jae(^MQqOy4|^gi%=BD-b3*Pw10xMPqna?U|jG7j5lyR zs*4osj1;Zd%F0;MbYtx|F7&T~(5<%jA-IlUpt}Q7vUZdTW2|BLy=ue{m5ZV%y2=8f{iy*1l?99CQ2p?C9o!6&O@Fj?;3ZYb{ogUd3bgm+Q`m~RirW*iPh;^{5kKRkU%n)&Y9y6;*G7% z*nc*=#yr#q3wD8dnr52_<>tTmB0i zjhO0PoOw*un08JIW`mKPN$u0$Qvmh5{|NP=qmIUE6#Fzvt-sY$GMv@mg66*B3(Tg; zk5USdN-ryvqokm~$e(t;gS*4eJRvgm zc9`jriW2!8nQ@-X#(m6o5CAEC+8qqe5QsG4oQ++ER$%3Y8`+T=a4U)Kzw-`B(MSs% zhcA#zKuU*~p~?XZ%u!B{HKOf5c&8<)V+Da1sxe9AJd@nYlN=-1;E3b93Ux&wxpq&& zdGi~gea3jev5nl~AE(KS3XrG6A1sw_ADiMNJERElCqSvuON;8?VSfc|p5vU$4P$=| zmV&)Ev{aNiVIsWcq#UFL$3ZLp6)&$kLe<@@u^MT}FWnz~;N`TQ%842HNrM+Wk?xlw zq?>8bm_|(_HV}K)envzJ9jG6<5(@vZi|#!1>i9EFfkfda3iZ)|=ljEwWj`XSZ@`6s zs6-EuK+?t?jKk8mWSQ;m6{T^vKwK-Rl^`*&?;9gLKg^Fa42uM@%xQd%SGTu-Wt6W= zw}Tqdz#5aJI%qE%QZna!8cZ;UZ9?fG@dP9~5(?Ez2-k>lp z&u;9;I)?nc&;s#lrfvn2HA{~c<1ce0Nva!uZF6dCfTfv9mGr%tL9`-w;2rN$L~zuo zHL-EyF5@4jZH)qxF-9&?&em*av8XHeOaOc!kf|PXBdcAKPe8{m)40f5<6jkU!BWV~ zM{y}SA8{cQzAe4xmKc z+2s}aI#q3HU8McrmS1wUyZd#3(B?u)j}3}1@NNfzSYx(` zvZ3B_abG4zU=`+FGc=rQ3LV^h#7jB%vvF%0^sm({bvwDf+{~Wl;}9-QAx7MxXOd43 znF5F z#qN@FW7qL!haec2m6ZPjuE>)-L!)XyWED(p79>a5JJBj)ysgQp{=q}? zU1S||b~x@-+4PPSr+6{iA;7YBfbOoL7>f90G=)xH4n|}^&{eKZs(z`yj9Kkh1%*#h zsJ9K|lKN9 z|4xPQzZ=H7Cn`Z61`o{$^%N(BK$gj`m?F2nx(GSb$3uQRHi@HR7%GBu4EiwxO`-0( z5LssabB+G3T$bFx2%QT<2@JAnLE05mH$J2&#m99g&+6415%j3=S?Z*JzE6cvmw)b8`(5IRcMF zrCugGRu~t|v?Htw3(HKHk&?P`q_JhhTLJ;*CqjbFEXY2lXH1uR96J%gW~agPcE6Ff zS$bO@20+74yp!orzPeHSCZ4utw=Aph{dcZvBUepMis0}|a%i+bLq}iB+jCNNl-jW3 zud1k^jBD%+d6(BLM?_Bf^rqQ1S;HDb*yn5;z-BhMfh0~~_Z=H)`j-@2+nNgl@gdXJeX;Oml{NJrbN#i%nK~^@99}U8#V<}jB zVc*~KKJ9P+Q>jaS40&lctfv=iV7NQhE(mMK{elq!{vNqc<2!E!2R2){<9jbGIs!!} zi#$Ppt`6>Vl=4h6OW+xvr%4^-SLbL-ev+n>D{^C~08HDG^xRJ-U6po&af(jLsV%C% zj3IkWlO$ypg@pPA$5i6#&3D3e_;1PD8cm?P;c=#(*l*}~Or*RQ&st2R?yBWOQtgt` z7Av74ubww*7;8IT4eaz|8+0`0SnG;2FVBJUHyS@_)zYg&wGC3s#R(NS=S2|g#$1gP zaF-)pHeUnl9A9ymRtu1P{nirY_*3gGd?xqTb3!+=H#R8wO=Cn(&ON8F8#GDKHm;y} zW!`g(%X>1Xk~6|ymts1iB@M5uEF^gJLQh zC(984&fV0J$g=$xIi9igePWlZ%yEiGN4BNo*vId{7?LNZRbYp(v9TF$%)yo`k;WVM z`mOOkjV?8PU!5}5M}g=Q-Id1R1GgCzZK}Ulk}I%#5l011df~gMXZ!4^Uupduw;A`A ze?{qO$rqqPe@g_vCog5N!uO6u+ri>Rn35Vm##3-?| zqHrK*hAcU|lBhfU*MLpCV6=;Z&Q4aNXRc39S5`v@RsZ`KC3~uJU2gVqr`Oy3Dt@2nY%G5qZ?w|A*G2DrP0?I>f3ZBn%NpUW zd1HEbVKBf`+>y){um7m{DnEOrLwi1EHkn+l)q7Rrq>H0UFLkoCT4^gOv|jP>tMW5Z zmo@P5lyUP}<0s6h_L5c)ZQhPtH29#5*~l)pHoRQs*MCZ@aZc*uXl3OmgPx3~^K}yr zScZ7H?2nkbP9oD`_kGt2RGYIk<-6Q`Z}pQW-yq#5*y?8x{SsjJ z=#0J%wsYr5PV?Uw0U^H)Nd4At{qmL80S0MOG`U?B4QM%in_9`YpExl5$osC6$RSq4 z5Uhu`_fF7s_VDRX7ECK9#c%xJOgmCme9ama!`68^)p^2m>*vjngiNs)2%_KYYU1-* zbp$^T6t*rgaa{63n%klTd2Pji+zhqB{&Xm{cK5?aODoPn>z*&W_6@DYZJ#Xa9y#5v zNgH-tS)|YdMD`T9BV!sznDI;n%IVATC1p{oSy_wmtV(4QvA@EOHmVVHls~|Yvt4cu zqK~J1ZWOP~cAcK>_^$MlhOj!>x21QOMNUZ=TsfaasuLG_5FHE;osjSe_1R(v462hh zY}*Ma>G0pPA0<5Jq#Ad)boY%21h1p^K^YDE@U;dZLW#jhcmZ`0&q*$L~zBPq1|Cn6$`?V&ZEuRqN1V#8{2cV&QF#P0);=!4O@N}n=6iCE`HnlilgA^<88CC zSoEW|YW2Z=wLQh$%001TmW@*YtTVh(#Sp573L!dosBx(-hK?J4qbjH*S}(!Lll>C< zTcmI#(snm^nY~y(=sUOQvaR{kKnEqo^yY6$N+HI(N#~Qgt`EE~Qjkdh3R3$mt*>`8 zf!E^ZZpS-2zX2C9cq4S}nFbGL%k6JPLw<1nB4drGcC(v)CpUqoZTz80?KMlw8YO?J z2jbQb1RnfJeshxGQmTP>HBnqj3ON9|fDa!E2%vx>Gh+D=UIa}n?e;xMz!=OR8vQm5 zs~QF1z^?|^ISnmvX1^hJFhy8P#tr+2{F3Z*yKcO1mKtp+6jETRBJlWIxY74eu*O?> zg#G`zm!#KlH^M_RxAWM!Btn`bA9_iB+&Uo9yQ)&ua!bbH*XB4zKZOr!x`(T-HPop^+=}n~qpcGp=m&v7NWC#-jtmPvW9KHvw_5^q% zPZDuG9XjVuwRn@T7~eV6$t}6t9%m;q{IlFw6wWqgz?GxK683=L8?6$cW=4I+ zasxZx&=Hb&lFPSHKD=lQt)@82Nl8QX?te|>B^Vbpf4T_dWc3ypYG+dzMXRnBFU-y9 z%m*HBS*Xpd-C~7*kL!39^a(KF`rScSe3T(qFL?y7hl82}_&>OmiF(Y4X-VA~PUeT! zr1c6C2n^v4E>UmB5PR1GI#7@f(29Gn4Y90;fKCK%Ju<=jd`^No?mp4t|>};f^De)_w@OS63%AmGP811_Qxt!r-iCu4Dk3Z`N&SyqB@20RdT)*T=NQ zIVaghhg%&RRct(;ERc%#1Nx%BhJnXnM1Abyd>Ij5iE`hv_A-a#2~ed-2fnVd@mzKR~lxufFKUu-%N z5`IE>R+_uk(`sX?$#kK|2UAQD;7Fzia^}K^nFKV{^vI#+s0OiSQ3^qMgMoLCdXT%-4pTR7N`&i41r-D4YCE zaS=k=(_fiN?w+np1C*D2&w#(TLGMmBzGmVkk}PPq8{A7%Ypw{E@aJ<@7!HYrE(iz&7HIeG(Wq#xnI6ZjqsYo*F04R6z@vB9vr`{!lm#aoNxVG% z%f)rwRQqqSPC#k^A0eLwd?+*s)t{Gh7u}2NssRN6UiVM!AbqeNa1Qar&gF^UN(Sm-4p2EHChM;`q9hDFHxsyoEizKXBH#Tblqg@}%TA7uz75=m!jbq(jGbdD-i8JSkq=7m3eX8zB@k@V#~bK*JBu^0&kCpT=OhFX zdN!4%l4XMx-uW^@X8cut7T)dA1t8UJQ@j=B-TRJd9O0R%ok9tO2M9#k73x}8)k>x$ z5^a;xNg^)L5og>_tl;cOA(NW^t~ruZgs(s5c1e59cMJnKqx-go#Ri3>Rk zC)OalvzZxv*5^ync1048?8OUzvU43X4Mq>fQVkBfvg2C4eQl9}&&k({_(eP_wqTi9 zN*R89V3reqzM1{&W`&>UK_@k4{}Rf16Y*#i!C1QZ_-1zMx}ODl%_@lgy?yv?6w93n~?1bYKfE*JK%}{MQwXSyzG6nsNS2Gm06*bX2 zm|OngVZcM1{>!W!M#ZclYnd&}8L+h|?{s9G9=4UZmuz`?dRFP#1_VC!>BBxJG7r)y zK15DOd3m?QMbowk4?6IzJBD|lTCLq^|JY0WUPai9J9AWsOPwhI- zYe!#s&)6zI!Ad-oy+1iQdAH835jH_Gy#lFvnCkX74&w{{j0eqAi7uh2tcrS9V8?{U zD5Yj07NJUCynHsFY+)vaZVz8#Q<%E^klZ7luCDynIJR$r0f^}&AjURl%tq6pc7fwj zB3BL)BA{3_#Y)V_ldKkJa*xYKJl20FC?~#_{#C85={!|n$h$mo32R$fw`M)LTEu!k znb~T={y^UQ#ElQQtf?V>6U^tRgv)E$V$^V)aXmG8R~AiQt}mhDY)#EY8RwhoONYEs z7v)q!nV&YNZ4}NyPDo5lw)%ft9L)j7TXZU9(p2o}^nH)uv_1fKXx$!2dHxl!fq+)>;d;?n zUoS0H*TRfq&s@iNpgb50ZR!`-*Vm^TZ;+dm#XOhHanXOt{)ErlY}LCqxYnS40GMew za~L!gasQG+0;zt4b5TV4E5cj{tfUumFr&d$@AWa4km~J}w9dAep^rgqf z?C4%Z7Hjwm72~Ol)SM$7jOk#&OCL%j-cUipZ4OzAeUaXv->zDve5rp3VPSOKQ04EO zTNIE9 zXLn~b_Vq+kObnSt-PZ(oljo_Wgn7Nn@thczfc3rKtE^23eB+&$58g)#TrHM<^1JaLiP-c)b`~*LYPypI`INL4G$q_vE@=cs-JtYFFOG6`&^vnh6BUgY0ESYxJ z#nD<#8dc-`haAwRIr8B{O=e!#UDVJEscr?lt3r><_-?jqrGXDipL_j10M+|f!+b(T z!kC00cX@TVIQ;u3&ED?bptUyxz*lOt3H~G!5X#TXTM!H}BFUER>4Sk!zj3rm0?^*^ zo2I?fSLKgmCKlEz7H@bg-5lk=#n@ZUhteZ_!`?P#yo2N-y_PHa(>pQYNU{QT2Q7GPJ#8uo% z)o}6T3#p|qC?S$f*Q2pEGUCFgi?=8kSp~4OQ%3E|d@s$aYs3&#t-@feVHmi zh2S@7b+roLI*D)-Oj!rF8u!(2V!l^DpNN z&ERZgnLN^tH40s74wensA62J2)|a~9C0b~BzR*1W18w^C4@*gjKWoD*#-)YjPRb$u z1GGS`szorwg#KbjWP6+0XHjC(P23XT(&csdY-$_8_oZeXRmH}2%{)4`MsJeKS;dWS-S?|KqF8PXfv8v}x@UTC2FDbDT>^(#f#DOmm!yu~3{rxOK# zD(jAN^HPKOErK4_*Bg9e8VQFP(+_ts1a|98>t!QvVu45{`mC)7jChx>qn^EZQS^o* zDrw6M3DIoW_x(2aE*an>=AheEdOc|uGQGwyi3&3VF6GoBOG>BYaz;1hR0znck;~xu zgzJo2b*;H)tH;gIh-=K5>Sa6-Y!o)&V6pJ$Irh6XVJ9bF`>97!gIl46Anr*Qeq;(}ad);R9~; zmcf-=k0ShFbMimoq|72*U`G(XJgqGegZX0|T+cW0>`VU0k?5Rs~4H zg==OdXer&iMU9OuEC_j5Z4G3D_X&iz<@mvEU#N=3s!ljI`7c@a*zICfMZ^7Fy4XM zi^B(E7n5Zf`1}aHc+^r8+Hp7u#)6=~t8w1EmA2u%zo~iS^A!6!NEC8(chseyL?3Q6 z?yi5&HrBJV4R9gCitiJ{rmKt~%6&4K8C9@5fmeCI%(f(ud3-|QD&{1!(CZw5?J>n| z^~zV^Fj)GW4WEN%UN*x=l9%op-7P#_p{H#lSi?nP87@s&92+3+eSd46Ye#2dBRf>5 zKkLxI6fO68&72z_IWTU%K@hYKduH_}({qH}*B3_W@If*9xT?PM)CKX}|FEMo1l_;>#O@;{fuV=%iVNgtUf)eBn8Y$wTI%{cv}OxpPv z(F#;nRxr8M)4!*(<_A;-un|9)nXvj`)|B*|Ly||+d!4%Kqgca!ea?nFaWP5B+5FJI zC@KEGC@GqvK9BRiEMiZHK{<_%ZGd4_fyHD?;E&ho%3b-e+`Y6INrF?=9~USAN(L8r zPx8Ipcak5C&CDQ}F7@DDUd*i(;0|H_vwr4c0I^>-HpRcgMv94eHkTmH9)1Aq)Gun* zB{V?z=l1^q-R^v6C^vln59t28PX4)9qrXTJ{C{s6y{-NGT3|n0Q2*S$(Ff~4ufXUt p0{-tTclI~_5B&j$op0f%;lvtSI&`FDr5NziRMk^?tYjPY{{VH7DR%$> literal 0 HcmV?d00001 diff --git a/windows/security/threat-protection/windows-defender-antivirus/images/MDATP_17_approvedKernelExtensions.png b/windows/security/threat-protection/windows-defender-antivirus/images/MDATP_17_approvedKernelExtensions.png new file mode 100644 index 0000000000000000000000000000000000000000..f33c8959c0662b7b389164aac9c03b1cf17c497a GIT binary patch literal 43992 zcmd422UL^W);4NK0Rg3nl!yulsGvwMQL0K45Ks{iq)G3c#6pn{(nOjRDbjl<(tDRq zg7lt9C;>u}yTE<++2=cB-0_b)?tkyk7-C4?tarV0%{AAY&+|=BMwi;zGQe2GwPNC{X>=lLq30u%?=6i zCz|Xl;bIff%XwmTHx$(9>VC6%UqE?;(R?~~j{V%ZbKc&RSd@oN__RkP#w0;ER{iSz z21`QXv+$f+)cj5d-Cj;^LY6+Or2AGBjr3V|Z$h}S{T() z7LWX@!cGcVAM**7w3m-Pqd#xVtkjT4mDdV&GFGUOG-@4%dyJKeDftf9vi^$W8(Jd z9nWjuY#r9tws=;=M3hy`w~40~R3jt4T{iR*&bHK5x;k`GK#%4!b5hVtT5?rn$F~!v z-KPS0be!WKJ2k4sTI=@yOp}s?a$E22E$Mz|t(>_Patle^Tn=(Y?+muLzhQ3vjVW4V zyl`usK(r(CZE=MyhY7ex>NnCzCJIp4(i!DJ^sB zV_8VzOwste`tn`ffI}O~{&;o~*-9$7kNKfsF>;J^WKt@-?32yM;%JBw$)|^VdY-^V#)KsFC zV9#kY-pUI=PPtF*IXa5kE8j?)(8-d!c~fxgM8Ee9$<*1%ifsJTma;7U7lUZb-tQ=d zS=xv#&v|PpCY~qK^LrOsYZjk#Ewj+iO-smV(VW79=PM5^h> z#oAnpFq(lbpDR+jmAa-Ua7?Jr^$gB2g3<`UT&9Fu&VxhQQzwp1h91e5z%#>rQ8+<%*> zk4HRa=1|8GB#Xy$)V(ZhjC!MmKaSVp(=^KMpP7>?EHhm@&iK`en-@59-Zzm#W;A?D zGu@eV+CE==Qvz8jx4rfrZ5&g~bk=E;At+e2CNtB*a`|`2(N2wKf^3sC`;B)ltlu^CfCH@7(Gi7mReDEoX-QRD9%4oS6X*WfDPT##N7P2Z_dSKY_ z$M^x?2$|^LOF4^UiyE_RbVK)?F$jK-{Ifn*x+mwv-F@RN)R!jv>Fqx{j%PqS%_m$E zU~enMcm+d+iyf_!YR!zys+;2#s=YBOZC543-YM(}E>u$_XSjS#t3g}YoPsZYy8=x@ zn@VK2_**GI{yv`bXzq)MUwW8s{d8yO8c#K|57>oTGx}m$6XeK&`iT{(2!qL)?^;+# zj}@&vyjzSxQSkbB~>a!Emo z@ocz}R#rvPP|LT)xMXT_je4)_1^klK&+;8>N!XN_(Ksi1b6Khr3sx-pH7=H3r#h`m zeP#0@^^RqgzSQAqD*e%?;Axc&@Ru#BAa5^Ci4!BjB9Gg|L&(KGK2dkFb)B5@mRcXk zhqy3ZN(q(TB!)S_`B89gmY>ebPv%A~o)53bTg;GUbGnhSi%`a0ytzNqH>5-Gzta<9 zY^Ta08~v}FlvI(3pV1yY=r)&{6--{eE2ie}0)_ z3SLuFQ#DD7_3~wGh>Vho3Iijfu&}U4Yku-|F0PF7@)(Kp?cxCe0sH&==@}Wh3-Qk! zF1xqp>!~4fa&Fq62=Vv#fB*h{LqkIhpT4`?(R8Ixg>&>1bjqy>+xjFYJ-tL1mJ@s= zKlrYn)kN7eK~K$$`u@53vh$3@W9Z}*8W_72>D2^jzR)yHOPGN)J zlNN*#g%o>dLWudK{rqgL+{?_&vouIj27EsQJV@P$1f1yE{YB7{Z8%>adiSnjE{hON z9!a0r32*P{z=Hd(tgRhv=fk^IuGmMsow>GOl9H=^v{Be)??1nYgs`y@c}_9$J}AOr zrbxY{gI>~aYSNRJFD-qZXld=Zz;P~&w_g^>ID#?f^$R@3@0rC#NAHxw@#TJ0tXPuC zF|%D9oP?8;le>h_M_W~hCZL>8=)(z4a|;jtEbH6Cr;s5@*ugHGgdx?Il?_vok&z(| zu${ZRyPDZrqLqG!7Ve%p2%b3Bm4$yh-`dpVz3c&pL!)h6$oezjBCf;(QAvF3UGx-! zqz&KJZf|e@lazSV)Ej3xLizYGhvq>dH$U#?!wIV^E9M6i$f`~3eCK&)p=OJ{%CDGy}u23RomMHgnmt3PAAsZ)*|-0ZPvacykw}vk6WCu`RRp=d)L;vM+_wR zBGWNbDlAZ#XAkrKUwh@c;y1kQ>ToUsUyb19<=y11(k z<|;zBRsJ0Q$L%2^5ksoW%JP?~9+|Sbbd+3spOsL|#5nzk}i5 z3jqW4>y**Vb+3WtAt0ETn0Cl2e{IaRPI=*UN7;VB-n~McYU}9OUquitydG*FE$U53 z^b_3rgln1Ag!9hYbHuQ=wl--NO1w5eq6Q9RFcmM5gbob~%6VCdg&%~H3`UlfCrRdP z2VUc3&av{^+A&gTyhjs@W(M=JJ=onqknjjnw+(Do+jip2!LllRe*!_!!O_RJ#8*M@ z-79fg)jA;VtWU7W?>Q%kB7(U@MaN*bekg6R>mG%f!klL>kmdQaO=W}^p|%*{D*0E5 z4Y$AIAG$q$9Dq!sWn{!{_Ckw!-!?ThEib=W8TE5?Ss$O5db_&V5yfjT)$$rLYD~2s zmUpxvpIP6`MNf>_$(wtbm~d8MNIfhkk<`f0O-AAdgtXBXe(lz+TUzx}UV+t6IC1iE zgPFOxVI$4nJKZWQPvDdGl>Psur1{@|(|PT6Bw<~*ILk_CyF0xHRo0VO zMy2keqo8f!vAFs(IqmPCEv9c{+4#Z1K@AO!h=>RY6(yyh;Nak(AWBNgt(~1uOe`$d zZMJGbY|f~zj{8I$x$!+SIWr~Tasba?FCe`8yo>vM`gKj)2ClB7bV;rK{c2Qx($CIW zjh;Eis`k+TKd%qq*|$qYNN**q0#6KsKp?Hy)|QqV>@vwr(C#kco37OP^K$f>Kc75R zll$vMe<&Lv3i;!8fa(Q5^j)ZrL<;^@_vp!Eg7w&BDN}KEIy%j#YMs2_GgG3q!MASZ zFDV2O%}q?sAh_NR;xQ}r+uVhLgbFG8woAjGq|HBNC}8!J)a2;Bf>Q!`%)t|-_@)HF zBA582zAO4FEbiZsiaTC@+?G9XAbjX>KzcCzpI^}KOq`nT35ILE#J57P{Ir-el~K|^ zl2iU`IEbVeUQKs#pQX2}YqaO>nS8xk^?wa=INV)tIs!{7O2MgBdaAVd+P6p={=jgAsX{{E2%2yiF@~!Q$l@7m{7?|my-T(RptLsO2K4mn~gYz?v(mv7o=S1lV zo~iJ?>?*CMYjGdK`$n*R>i_d&#BO#Komyz)#)jQvOP#O(8ue&=SbD$yfu`s$PEUaE1P1nyIBpxaP?Cf6v1P+~^8|IpXEfOyc*vf7<4Z(09c5 z?0-JfyWszqhJhU*zUyc`hi~>YR-|>!{fw__DJx$W1qv0{OR8K_s`bW+_j5`yR;8H(5=q!(*{(yt2| zb~bWcYg^XAu}LM@RA=BOO3C0jLLM3g3v6I+CD5g~@m+>Z#{5R+i6~BC0;*y8ugpIF zYK@Od32?symSs!uXomt*6U^Y6E+z{@iPyAYg!z3deD5No79~}%k;Lt1mCJ2VlJ#J& z__Esg&el%u1Pp6_a57NJO>6%~`BGz-TVcwF#@C>Twi0tMulp9)5WSNqu%XH}7YUzy z&VA^K>X}DIHv5qRSTSQxK%PYU=-mCiCBy-25CJcZ!lF?`ufh=_w3wvGJ*CY>4$W2P_=A`! zs{R@BF_ZJK(G16Dmv4PA5FuL=XHv6kXDa_CK`I_j}y1$q#m>-qo_1wyF zzxva`P<~^F7Dp?fmjjI~F~_WLo>Ntj=dzrP-a$3S2ynk-j&Q{rZ0znTis@Gg{9|Kp z4FO;pVNa9ZfCa1G^#A6b!LC6O30-X(dcSt;T9_YfDR` ztFSVNsMqH2thh*0$^2;B(&(NAj!4M1a)C&>Me0`1Y5lG~4Tj*NmH@t;k#+}pq$gm@`>a_G99_ZpS`;OMjkq@ zKUB*=I))5Y?4S%}6LUK$-rBD`nBM{|SW3W;k+68>b1udF+ocmKFRK$wByC3Ru)rt4 ziuCF|BI4*L*r2zl&Wrokz22d|i$#BvOitpp%MwEGd|)(_;umpTn_MRyIFli@o(g)t z-8>%{5~7^85P5B0q{@!+bJ>+T=17Vn9V zfXsER5WDdV-Ceg1x*@O-#STZvP-$YnOLY}|ZE{UnYEO<{2pv2@P1+8P(-6Q;+MKhT zRIXM{#p@y^g|dq}_VLt7dCweP&HFZP9n@=`x_#ZYC;PPj7%3Rv3l=0=tNdQM z6Rp+inuYoLQX|{lhkMC=!Q1d%167!ss9H4- z!rj4gJoR90G9@Z5`&%`k=m|H$b4xfxEn0;za`t{KBML)HN&Fsc4)>`0KJ;?&Da zi_7+jwM)y)TMFwYiP;;}N&X@=vzVGJDCRS28i_6Qg@im{mR4w=f ziAzYRtLw$Yky7&EJMuB*U;Z4<;#FkwEj2nWFSq79v+__NPTYY{Oo#UmhoI_+$482* z{Sk26v}~6!U2piyGib==RWx&v&H4eqY1+RtiX|?3!e_Xqu=`JZCb}CRh;n$9LJVE0 zv(ouz5=Srip6>7f#s&9pZ4kSLK^1_*Rc7ze6lBScJH%iy4NN3RKUHTwRFJ*dV|1qA!T{6zpj%SXS5?{Z~8QV zlKeFfzWLEO2!MDOl#a^HQ->H|z3dTP_xAsow}0SQh|QfNC;_XN^~@y&WuXUuCFJM?mQT z)O&U?p!PL;6W50$y!EYIA7Sq{YO2-+kyF#4E-gLN*B7=YN$Gd#^40UTAJDT~mv(T~ zvmv^@Y?m&lrj=S;Suku_81=Byg>0SItKw_o`h(koalA+gqNpf*Uo&3Z<nXA(ul<41L8|CFAL0<4=y0xyC*8TPG9RTC@3jYbnttrY0o<&8^;xP zd$OIG)#H(Yl?D#r-Vt{dsb4-M8K@qBKfW_p=fF&R`}(t=AM%CF5ud~K43VhL+Y@d) zg7bE#b9q+9mp9c11bA{LX%Tp(7aBScC*X{pMSrd0DI{(x_Vs8pUZ;G9?`4(w^6&7` zl`mCwb;LR%jLieT|4_2FHqE7vFgdf2ac(w-=5L3<+uKGvy%yQ5#lx{{agv8V;{Gc-ODXh&3onws zXcW#q<)H__xjy`c{{dKENBxhge~9fv@8iTdn}(2P2ty#{GL|eWu_4tLVLS5BXmldm z#n_%abV$$b0r6F-&^hIq^&KzXn>Q>{PPvqK0EY0Ao0moYP>Gi9nmeeL-mINJh6Rl)|hLiB6h_plrsxw*Ll0+6Lt_4W1j&F);W_v7Q^8ylg& zOV3N6-QX@hTZKUgwCdJime(cW(}r)JSAI*V-l2<$EGu^@adG@KJ}wTvpz|o#3iB0z zme7IR04Z-fHD&NT-7sLk^d7sLRM}|HH(s0vyhm(7$J5ligwKOIgr*=y$|_(@kGBaK z>fgX>&UhX}+L)O=E4N0XYCSyM-D^^MX()*+L)pEFlA9r3KZk~Z=D^X&sEKOql7#E; zx0`bHxpOCNF{s+Tg|e&f6U1Gdot@nU7v6Utn~35Vzo?|7^s>s48*oU)DB?Nx_pMi# z>PS8DeNi5m8A8^e=@*?Bw+J=HIyH%`H9? zqT^s?+ksU-r2VcIEA7H~UU0b;OZ9m2o5jfY@^axd6!YqoG%YPHMZXshX0kFufkN~Q z8QD6^aw{)3_gJWvl@-f=FYlUc(4GmNs;c*y1S?U+GWYYbO$pCk{!rq#*9(!h4Do^5 zbnnHw0@^2c^IK)ZkD1M>FHzV#WA=O$%<{J zJ@M^bU6a)=nDA=~&gCwEqU z{#3DPZ=DxD=dNU2l+e9Naq^sf6`+&)0`^V8_^ zn>TN?^InS58E&r(u~d1fM2^*cKyL=wngj05d30!qo|g85`e3NbU~d4u(r8V*sK6sC zQHmZPfg*c0ZX-UI{jE1TnSvI>baZsyRi2s}8n1Idv-Nkz@J%Qk6dOasA|p%Q402l3 zStG?pBpxs3oa23+?T+8El5g+nai-w#rosI9vqSgKxNOwHHluU1sM%iZH$q79(TUHs z^xjRyXg~eLeJk5l?S&pTWi7#J>c@zkb@2|ruY3y-S)}X3#Z4VEe?src2dI14+kc^Q z+d4d7`4zw8KeKcYe^1L`GcTb-?p24DT&)IcAivNxa6?sDSq{Gb_*POo>)M2V$U^u>K9Er_%+HT)zi#=44Q3YpEf;sPnkxI;9CvaJ0s*0S7N?0j#t*sT zFw=C-g(I$TG+I_|rL0Uy=sHYXm<Ev(Ct;_iKX+S8s@23wb7~b4S>Xa{&>XQCb>ROBU*E*6VZLRKDk2 zk$BOKMa6UTln(^Uu@ZuoepgN7!o%yu9GsooBAwBb?IrCB%kkakaz9r_32>B~fe3DW z^F11m>B`D048#dWX$orR>ylve)Cd9+LL`s~i_uo%Y-z@H^oSprK*h)HbPQ2+4D?XG zo9?P0|M@8TT>UU8-#5MRQe0Nk&N0JmbZ)HJl)#v1SNHkzC8J1*22(>*b~9^hd9e)% z?C#89hH5U0Z7c9Xk#A?jOi#Y@T{%dsnIgWKpMo88D4t>mgaCgu$>lLo3hjvkvcBl|-v$p4h*}REdc2e($zk-?uJaqFc8UmH zO6uO?xZ*=Il=GsU*P&h3qD@}4zz%_o!#{tHPB;2dk9oZEmZ+i_Drs=M)65Slooj;k zs?f#Mg@IcS*8vAPS+QmN``3dPZn}tcj;;3DHu|&Te589RUBfAx-M6aH<>lpoRQ`Rh zQhcEvnwKEbxf+c7GTs-1QxLX)4LIGjw7ITW0kn&_bs1&-fRm%6H;+5bjMDO6aKgl8 z6Jz7`vEo+b(qa5*If_3l)vlzQBsWy?`{xL1|GGWGY&=(+mzHx+YEElxXpz9(;sF6R zNu}P%e?9r+xf+xd?YDTjj5AA|S z<$?T{FJA^!r)dNERuHFQCYMUQtuUipnf<6TC%Vpof7>%v{n}S*PyH&WkdQM7s&FXm zGYaGj9hTEb$E0RccT2TV7=IWZ`-D^xmYB%q3<;kNmPdc(RJ~#P0M#vI?{&$i5HQ=S zu<3+i0}~g@rpMTb;QK>RZ#yigmM7tT24xIMwL7EN36JEMB5>S z%mfWx`s!5|Ez@L;ta74;NR=>mR99DTh~l0P@K?*d9}}Id^>FFwcy+Pex;{TQ=;Qrr zEg*KFr>AdjM!9?hYJf`?<<+EEbv->)OE5EI%Fiul!oCykj=r;qrNm@L0Mor|*BVt~ z>7P}g6_TvzkWkNETWxK|RFP-5wa$#jRs_yGgc2s=v*1g8$>4yj7D$v)c}IvFnhTF8 z(l3_1W53{ETAlx51%t^TwdsV89;?_+HkF_5lS;nu&B2+|(Yo`j<>~d}Q_eRI4;8%L zVI)(H;20qI`ug6|DH~nK8qm?xk0s2!U5k#1c|E;T8VYnF&L{jv4M;vdK3g(Neh}Eh z$B*w0`aG;|)_7x0$kD46laxf3ou>-21&WNFz|&;8mwdcVJ68kdy6gs;{7yGuK9>Wi zE)am=Bn4zLS5(U%l6H4RTDrI~KnyaHr%Oh~^6NsOkWCr=Z{eU6JdJUgn&Z@PQ)n)< z*d9i$bZ*=9~-kxOn9D=*q2pD~x7cXwoeRGhOXa?b^W9O}!B_2@cm_N09G}=5iDf6r5+}qZAYVuodFXjN6!(BR;1 z7v`3qKO?2wxPd=@UK$f0m#=X+^tmt)P~Q6=74XN7Ec>Uv{l9y=-M)_y8yg!P9SxEW zjEJm_jg5kWAM~1(7|3G4p#mm`+W1sYL)m1D+GzESSt1j$V3&0Sx#`DO*hkASkXr)? z$%W?K$npeW?~7e9sL|2U>1l)frJ-!o-b5q0_P0e}w)6%%Yp^0)Egy-IXIPqXF$PsSG2sbhD)s_kct~B%dkBw9naG)3j z%7N9@)!Ny!H7Zk|3JdQvI=9W_*yAg&p)pwhf$SWp;C!_rDbJtxQAU}I*-rla`P4VH2b^H*)bxYV z#@x4VNxEU@z=5T+Gbp}~9OMuF4WxN{b5#S!7*4@$wvo6_V?qBybM41D;>4NFv|L+g-{ zh>6^yK_IB?rTst@_!VBGX@aF@llWCR%9v77F*@9&nJ&s_NxuGaElOZ<(@d32QJJ=7 zez_onuY*_i>_*wq{+xS#xcIp-6b8OcsV)+X!;2H|mu6)u`hWfUm8Fp}J~5Fip^gjB z1*Hebe`DvGTU%#CGM~A-i#cV!#pu;}?t#dj9(3tenBA@wz1e9?{)-nc(g;?iu#>kL zT{>~0r0^{zQQ4PmXKk$UV;4hjprx7QNu<5Gunmgk(xtD{o)I{6Ki7?!(;jR*eX53r zhSt`%eT1&M`M$F7R=8*{5Su?~(#BqFs2Q%(G9xMmI}mB1&N)e2Y}fx}Mdx&U)N;6u zl~t|%Jh{1r6J_~ZYhNLqr=z(i#TjHLdGMwU5p7DpVc2-iUbsAm`WWjHfSKhXz0051%3;x-E_i zp6X0BG^o?HL(2ladyPlwt)I(`n0)3}DbOv`}<+W`~5;v&)uTwq|JZts2N zvh&WhENy){Ha7VPKT+oWqem=NBkWdI8~%6iVXfxxqx4L= zS{ax!A9=lqMGHhTpPj7i!bwz-Yq7Z-cM}FKO4kVd+3nA?aoys#LN8Q#(t&My#&UUg zV|G`JaFRKQmP>__it3_04@2yoOdI)+Nz)-BhAJvl(Y{@35%y`pVcOzN@hbAZ7u0H# z;KaST_K5hi?;k>$g{>v*=i2&djHp;d?r#>bU1fez`M@{>PkC=~u68yokdcnA;IebZ z`33XsM)|qQkD;MS39TnOt|{0JzM_7Gc*-s#a}d=5wl*0xTZx9RZng8+zQ|Gl(?Hmb z5DTB5V^vPsg70MfsMP#W2Li`ioNCp~s-RP1wB&K3UBWc%Dsw<(Xt^_~abHKr^Hq)) ze#fmlgpI={@R!!fOp_|ry6o&gl#u1R4o2M#k%Q7xZK@4e+5& zEOwHQoMlrq_5t*%h||hbMMVm6n(B$Bz*^26vc{=CUh)UYg9N}56z~oTxrv{0<_ub@ zvoA?cZ|M=UY?_{)1~u64nwx3yQha(fmz?WS(Wjwh6r>zY5Ry2;qpl@y0%2isneA-L zd9h^vwVx~o0&|X&<{EztkaA1XwUvE=`QvtPZ!ec@(i$WutgLJoBsq3=cEoHv)xzu~ zG9Q2Dp=^yQOrqGJdUc#yKuW9+F&OZnN%QoS(i+ zH!yrliXaeR#dGPSa(GmA41)-AaVy+Dj#`zx`Z9^ryl(N%n$a>-CJll9s<$iepHujP z6NE-KzE|9p7MSKtzXC47;&XMfQ78mzt(}#8 zeQWP$LE`awfD}%E69>RaecgW4kO5I2Z~?$ih0`A{f{ncJ-pk7?=C*E8oDLO4s>`xa z7%|j6()Z4VP24#sSi#Lr)NfN6rKX|L*d+42h9;t{*rX|fOSR~o0hMF(8^fgjP6Eom zIXyjH{aqr^5ceu6869^3?L)RFGUF2yRg4$f{Ub7(0)2kFgpe0YSqd!CKuzw(UuMO| zj|;99#M+AGl+6QUaX}ZwXn{*T^HP|*e-rCN!8pnGHUkA)|E2Gl$i2|MEFcTeT0_H> z^Xu?8qR5O~E5=y%-lxvaLfwSLyNjEboQt+7Z9IL>vZDfeb#S0j$3AeinB06*F;2b} zwgF#N@D}z4jZLjSPD(iyMNam24{#Y2Mj&k{Nzb+6Kk(8%TSz07hepurWhheK{@6MZ zHSY4EEWG=UK-KwTov)npD&f~+^ONrg3i>cqFWAJ_Y`3JktZhE@{p}*CzZd_6D`(;c zziE}%glf#)7+m0#9Ad%>qy6KA)i_^7vT ziXMkt-I}fQ&S*xJ-?$n7GoJjDOTi^26(3bgpmtfDN7=+KHbKdD&c#Gv-LC6DpK5=U z5Q6VKeVx6jAso%;&~Tese1R8~FJFt!R!#MfJ%5RvL0+_~)kFElYUj@k1|X(bT>wAu zqi=0Qp~U(8n$+g2!T#!mTEy=6Sz&4F>zG$}_!XdT0;ZmZ_P`ufg{z>0YawKeS#Pls zO7~3}TfG6Yu1cqEQ#~W$^aWOIc{yt-3Ch3>K znWNk952FOhFf5hWHh5Ck?fSWL(rut>*k802&URd{mo2*^ zp;r;Hm?YunciXr{@`fSR(>kpCOO;p}jz|HS1<}QJn3#*$xsCe6+}fL_;A|DCrr?qb z!h_GJtATb~=fy;uYi-T>%I0mLcIt%bt+J9n?UoouR#n@4mI$5Wj&&7v`z5`P7N8#G zq0=r+>2bP+EQc`INPJQfOZrU*?YZ@xWPn-!9LNOPo(gQSmk>@L>opR0((EVv>4Z)` z6LAxJSxZuJO2u(4oo7i%_^~D_amT;aMgpdWT&RJv*BWgTz2_9ZMQtZ2I`Mj>IQC?*p>Ck^eco&I~I>#W}w&~yY7v-NxQNr+pM>OD=uir;H5lfg*ByNY?sSf%0}Wjdo=yu z+-K4}Q~{SX&*<7p@nL^S%Bps@Jo#(Rn|bsuumfs?FIEHBz8G~cPxA9ec>W|U#N(ES znbA&*a>lsUrs0e}vC40?b&CDddT(zQ{!BD-NZ6A=bnq2-7tGEn`_NH#+_v4<+2L*Z zfLCY5l>P2%uUnDy&BF+Mmi-h!NEanL!QB_!MsndQ-)q(S9$bCRLG%2fmt#_y^RCwD zd4aePl-24NLfjR3WepcQ*RV zoJ5sxwCQH_i+JfOQh$N*Rj>KgmSc=#X1gUmsXk01T)!j8n1}CL#3SwSJ(Aa7AV-@M z-<^Ajz)hlyNy|SH00ok@9J>$#^DPdY*k8PF17u^Bq>38e63E9q{FWQmgo;Zg0Yv6I zi~=c1IW(OC976E^HgM@ms6;< z2X-Ucdx5PIo0$RMnQ;9wPBUr58&n&8$i@~0J_2TJp{ifONJN?Armk&0O|2gZpXJrPz1x!gq(LV2X1)=ze z@WOL*D6CVrB$Tz{HH73Ns;c#I{@)z_TC3<1%-K1FRYkei@=+eImFW2I( zz1K=AzGOS3d7?3I!SW#DRx7$WgMP~WNy)S=7I67hVSL_)5X)J1pkaXWuHLC4-RQ&@ zys;Wt>U~t|-&{N;KLr)5=2;CbXeIV%;sXt|NcRI`aHKSzxl#J; z-*GZ&?*{XsXkwlfQTJf#Ws(9f<)7^exXNcw|K3lgMpDu^fxB$s`711yL&i^@Cuu-C(zR>F`u&^o0M9eGAYt8RPB(lF61;O~nib)TN|f~20qG?g zZJlp+ysN9r_9{q#U-d*pV7B*uJ^XxKV>|y7O()sk0+Bb=gZ+e(5=U&$LcMNJxgtKV z@9s|p+#3r&o6~s^X694iS-5g;2dJ$8$)8+vdV|&1?p2jD;;hz_iDejKcQ; zQ+9rSuQ(OAhrE2tc&P=LFhtV5%y}{>S}(CL4exadBX3 z%4THYjd4P?zQQvoKzbded$%x<=Iy?L0f2>d{#)?CokiV8h>Rqg3-`DQ$z25K#An(+ zjyiS5kzp)B6{m&*qHciu%r=4MGc!xe8UO?AZ7#O|8g`~tadzGTG+XAYs!(1)Rw4jq z0t5h&zg7*bmIdzIu>(>7$_I^yeP2${+qZ8E3J!_8o>vCY1K>J{GtCri?Hba)q6Ma3 zRo!=1rD)R~=7_)*T0>X?wju&bt32Im5ry=*n^T-hP>?sLCV{R6_jIzCNxDy7ycmy{ z^ftNPggq?VXruudNhIL2mWZ`@Zq$awnmsYz|HgK|*Z7P1at^EzJr!bqB^y(RN5|RJ zjTISFa0csLs|T*xcCSAel-sM!m*1>z zW1~R_oi~#1&|G}a$&u|_=VYph%`1S9Xj)oYK6vop*#v+U zwf$Q8kr_SPt0T1^M*8*uIy5R2meCFv>6O*hg!I7!utG)+j#E<|39sppi*^7XkMHrP z0f_qTTepJO-qp}_p8tEZwYTF8Ux&`3b#;*xsy~66A*f7`&*o8DoBRq9IDv(^d0R!t zwQJW73;wq_4eK3=J9i!!Xll}P$jHdZf;6;Yd@Sd)&t(9D?GTstikxIZIt4B%${Qd7B%iDinO2;dW2EU&HfV6;S%S`{& zNjLUr=D)L$?C;+rKB4P$QgTN+b&6<^3L&8T69yzE00%=)l=t#DQ~(YepRO|Kbr)8Uk{Io7(^je0BmbnvH(N5U&Ng&yAqM z`^*yuqSmv-zoP{yGB!T`Ua`xo-@jOQKgY&0v9Tq>2&ED#0T@*I_Ktp@E;)cw$0By~hbh=me}#e0!x?sx z|5@}u(9k~wN!aJ4+ac`^>74)q{ka(bc353NLPBC{a>3Ii3o``Nixl8ifQa~8Km>eq&E~gP zdX48E7KCDhDa$hn34o(Rzr4d39u-4H+PaBRo)H9qwOkG~dQ0F=dQ(%)>_~yTQdb=Z z(`P*xj0iZ=0(0KIV?cJ)EnF^|^nArbaG^n{T(O)3;5U*0mHP1(#?93+(wwNXA_?%P!qV-~5qH(#a7o%wIsA&(3k% z35Qi^0kad$UlDZ73=OY#C13N8eBln@{gPq|{FhgZC$xU>20vqPx$QhUK5p)3z@HhH z2*rHW1O`DPs}m6F4Q_VM;SQU#!(1I2G-V6E%Ad8i3cx-w0vJu}^~QYz>#nf8XSW%z zHuCffXqa1AyuLd}SY_C;KOya0C&ZDzmEf4PU{;Hu#nzN@adA~wRRLV$rJf!d@h)H~ zKEH6uV(En%S}U=kV5B&gdT962bJxW@&ACp!kH&|R#0yH%04)s&=)xx8Jl=(=06<7c zK!CQrF&n69oPPaycc`biY5)+A!lL;0s0qGK;H}drnb+22ga(q4kB`wGj zo@qaoa#)~re&{A6b4Z~PgrQ*>-u75Zm*2nY9Tt1~*_p%~;q<30YHX()!0rfT5tUv7 zK+M*jR+Xx+wP=1?+VzfD9tJaWA4|0gs|lfw1nK^nWWFt2E{E^!*0JxOTpt zv6gkB$u|ip_bs#a@zSl{l>`yH8KCwdM%mdGrT=vFz|OS;WOLVrE}oOOrK&%A-tYva zdBUhD!0hehm8jdx7%3fIJ;A-7epHg@`a)D$TtCtJE>Zi%R;633RNwyYu4`4%*g$j) zS%hiaG;)Ks%A-S1QBCi)+Hja%uIA&%m%T_LOn{Ckz4}U;^o*JQIis`s?Nz2ILH_3?# z8~Fr4*`eG;CkwTNj=z$+f2R9x^|upoNwp)}I98NAN`N^6n<>d|zwz632Gsb3zj_t<=PQcC%{@ZM-(6XOz85B@d zDqaUsZzkAzeZ|MEkGqnKusS@+%*=dsr~C3cb)Gh&j?1s-&5~9NHCG_Rro>%d#P`cU zKzWk_Xms+AlSHp>S)bT>Z%5G_p{PUNzG=zH$$8g6$CjtySIvN>0F4}OU9Q<*97EHw;Y5m``cRGWlBBE zi>vXX1wm-8_hmrTH7xtlIONZkc#31be3@T+G4LTsA@E2t=l(3-9k0a+Pmgz*|G_!?uy#==!K= zQU31}7x*rbuJV)5tm?V`i0ILG5)Glpuy_LnftW4@=DZKw9wyHE?!ZQKrx|*Atzon(gCKl0jviu38 z3Fz1C1~HpuNXJa4tl*j0PW!mH^MIhVV&b#+XdPz{;26gp^k|z$a3chE|}jB zQG0!buUiY0S^*S&N8;%ypPsKiWbs30oPgDZF>miv`KvT*kN9tS1_}g+hEA1PF{kn; z0VT};MctdnL;e46qn}nnR7lndg;LqFZ$*(klqDfcBwO~~q->=~gsdTCCu`P_ec#uy z@5|T?#+dV*e81oGJNG&F<8jXYxX%WdtR^Say_r>dfL1ccslU&RYlL&)sBg{ zQFnFz^F?PqwYRl_Opw5Q3il70j7Hyq4&MCir zNLhc(SHjs3=`ooIjTW8Ka~bR+0h~HLdSo&Kq;-;KrEc)6Wc4c$$GQ%?`taKq^KAsO zK1k$;O74%mm&9&WyD4}5DUs`w zKK-@k79%;n_PFl=e0@q$ZCFqb2nC!p<@@2JfSzm~8s3zmaFYaNNL z3h&h6MQ^QTn{Ksf8|!((^dDH8!mq|(<24adH+24j_CM`Q;-aET?dFuHyC|d2HH-u@ ziY~L!woEM#<~i2qbrN_#?g{)rr>y#M<79rd!fYAoadVqe;>7s)sx!Ac__E$!ixsk| zMm?n(Z1Vb8TUWQ=I-r_(Mp;KtOwbhlRV5Lr#jD>K|Jw|X#i8n1253UUGe~QqvF0-O3 z4(DFheCenk@}KJyjGj6t^l;$p$g>M3fp1(cW1yqrIX1Hn4FFo|+LJt>3&9K`a^1N8xhuqmr(k9@CPF&W^SB0q4|O(eXt|ppGZy zEOqPZ>P`;|4yo6%D!i;5&9$@FIO|Dq8vmx_Cf8}b3+O_(zLT1TO$KKfTNa_~67wkh zK(2Fj=Ss`St@nJxkfDZ?a$b-bBY6Da7)4m0{kjI=0E|eREN5C9aCy(|>k78xlTqiM zS2Dca6ES7;h7g>&d3fk)^1{u6IZXKIim?#bl>;RXOVR!6JSYhD35>7%fs>RNpEvfj z*svDb{Z`*&nN^3Wijv+MnNPlih8nk>G`N1^M;>a43~rbs@7$eK=s=e6TQ@u2s}5)~ zK;;3Q?N$eN-@L&rHZoFP)82pH^!f8#uQT+w$r3zmz9VLXc86A0#S+>~vZDPx&a&3J`moxssy%KShDZ5}H zc&V?WD#JN`==grTgn4Z~%9{Ci*5sz`&&*T3g%*Q`m=0N&kN34}!on`bQYn9>scVtlkZio~;4Gy&$aYL`PW_z@ym0-7+{J)sG}nml|}DIioaaC{R- zG+^9R&?Bfz5P^{|RKUOB?w0K#^jMSKcT1qSq-weH7r?vo|NlQcOSMP7a?VIhPsuCA zI4sg$q9aY;JWS0kSgJ~V!+vT;p>xkLDfVzeRz?1LS`;g3T;-44n!~EjXw&Cr+U-%p zrMfZq6<2g|6bPE1PlJ7Kd{baho6pX(e@E@C@o2DDlu9G(d%o5};{4&CKgKF!&(zIL z?<=X_m7{(~=0_D+>Avvz0wAFhm%&P^*wf9l|M&0lj*gtG8=01jp?t+RQ&1 zA*k&!oKBloBD@#%CMe~UEKwk>Z|@y8qvT?*A;Hw?#W)Ms8pzk>A;DsSlIDVJJzE{y zp_*l`nyNOc66a#x*ZtW>e@>&}c*!3F?Z-6(y9%21NuyrD%{FEhs?|+n!bx*fJcduZ z5<7qSs;jx;wYhGtJ3JP(Lq$#P+!l;Q+1vGo{_GRt|lW(T@Ps^%9(qq(n^cn*E8aZ9NSn3nH9DXAy`jN7O3U&)V41z&M2GR z_+Y0Lg`cC4M2OoBqc45UF3bP9zEnVDJ=XjrZ{^RIT|a47%AnZLhf;G$y>fh2;&FMj zcnj7<_d_YO9~_4ZO|4v5M_fGe5GBJDCy|{)vZaXsP_3nDEqMR}rp*OU9ohCc%~hSE zsh+j9dHaU#xuwndL2pZrY|o*%&%y0oxaL*C&bdg-dYvJ+(|+~BxG{VV zMzC^htGjRNOTo=Y$?k31s(U7evovEX-~AARh-R*|gip`$CM#8CbJU4bT*IaN6w$?U zb71#{>fF*Ozjp0@GDR|$l9FpPfRpI7pLl8zN$*C$b$w-J*NeABcDq?k}_7CZDgjumN|_4$@or9^u!TG13e(pT zM)W^wh>MpiwdT?IjtNkQKEf{{1gARq;>Uuf{BupMqjuuAf4ou|yL=qCG1Jq@x8A@R zDWw0)#k4QPumqe?cU{`Qg5N;M*VtGC&YxzOuMWd1I~0Ko5{yATju~1GKp?6h{knv_TuXwV}IPCC`&AI+R70uwqX}n!*pT>85`OL z6|jzcYOB8+>QHuD!t1sqDE+*Z-G+Ig&E`=(K#BrY+UTg>>h7lZa{y=F ziIK_+l|BHN3fh`-c?Ali-v0h!e=*(?!Jx%OK;pvp84Ax$QqFofR5C_co3EnLOqU|c zO%Nr&$AFC?SBD%Ue|O2|+lhUfKr`9?C$a&}eMw58Tt*Zu$JLkKaZSu+;w#lg~ ze#Co@Zf?}K%QuET?sMANQXkB2z7k!WlkZDDC^^2r^~@xwa6hw$q;lU3X`(!_{1KaC zb=F6s-h$G9+3tlg6^fltOvE?PZ+k)cs~wrS!eoy;C*C&Dikxl4ezN?c)Oer8&3z)- zBD5sF5?RX3zIy6v#sIiQ4J!}$2V+lmL24LbyJDeH?jh|K_;hbOoc_no@M^i6Z8TcH zJZ7i1NHj`E)Y1ywGgP_{k6(>j?Xm9CGR1u>8?C+4B#Lj?72Wb}r4^GkYXuK=9oc>s zViC!Bz)3kZGKzt!J3Z$fbgs@Fpe>*pyFdftoflv{*9K5+j9yZbUv40i_)FG}hWSx3 zsf;HD*KggjdiAQ~Iw{DUYq5(Eq-D*`>CY^zuBg(;KIT*D%V4-&pc)o5##OZ z8`aa*RoCW^dbvbjz3*=H(rl^fO!SMA(9p=Y5h7f-GbLTFHIio^s$q10>H7o^fql%f z|F0K>N%c3X=SQGw*-A7OfKHR9mfKhX@KBEK2$ae`ISQoIm1?h`wD3}e>s6(1a! zC9%UamxUtT?0fv1+EZaWm|JB1EABB*v(wd!bvCi4}S+zkk}7Sk6;>8V5C1lz`b@!VU<3jJVu zu;t@3DsZy^t)i%?(RW*^oahUGE9I)kW9Mhj#-XnPJ}!tk1o7wHlH!;*7b>PcQip|d zqnupEE7w7!3?xM+p;y1D!4Dv%#!Vl!y8O~C2KVSz<9FoF=z&+&P=|*oe}MyJ|Em ztN9kbo1XeJVwybYLy^-CO5U|+SnyBXv*wD;EtNP2r4{yDY+!$L)<6S>pq_BZ2c@`+ zTB2E`>~m_FZIWgi*k(hLw`W zI{EUvt~kzWa8NlX_1osqe&74W*1t~siG0F# zq&|1^8Z;e|2famH$lo+MtrKguO)~rsJ$0sIIPGJH( z??0zbO-;I)(LUcO@f|z7>R3?dv}xi!=W`3A%p}Z+&qj_seWHpKMpw~{p-0LvH+0@0 z_YHADQ9(Xvi8v_mcDJ9Ks2faUduFbbYI@6VaOwZN7QwGfMftUmV&Tb|FDm+Sbv@Ew z`m;w}%gXa;_^qv0o|Ml-P$x8epudk1US6bq3WdaR-KQFS`f;Gn2}{UG3zq8&+p&s?B49`9212@!%cVM_yq{%tt~CzCDpn_Om(A38ginC|W-mnFi zNT(a#=i*MU;#5%`rj{$%ZQN+k7VAC?V#?^ZcXoRFdS%~xy4=5-nv^M?(Jsj5PE+%i zyHQ%@n!Vr(SK+^D zQH)gCUs|M_rSwqKcDb)JzgZ9vaS&d@V`SIIF|(PZ8XXl$icQoc77;y0X@fKjZKyt# zytn`Knc<5_u6+bOxoBe1lcaw2$f6AkpHp$G^ls|=irsUzd@6V4dM^#{|N6Z;m=&>( z-8A?R7})u)A2s|o7PLY7CH7{9hHs>|1c3sB_tLdTNIGhE$N&08yR@eQ%v0;I9R95&DkiKQN5$c1ae@*H+J;9hmsZ`}M6_SoM3=EmF&g!naKyQ?nq+nPERxliTf7P{r) zI%OSrwmV(y5#VEpU)${5T0YLy=$2GDE$$$>VJpGAg8yyx9X&i_+SKT`ATf?HDPil= zI6F&aV=TzVR+lw`T^+T->}aI}>tAdw_|vCnnuDw#UD{L+ydOVv1wgRW4U^UH;16^p zo?{6XUXxQ(slPdvNnom5|8Dq|*sWlY`sc76;$R7eI|<<(Y*P%4wZ^FIcjET$#cd_z zmx*rGas@=`wRzHG?WY|k_nP4NN%(BJc$_CdE$vSQH-&haU;stJ1TwABO%tYj$lkQa zFrK_8epV4;K`;7^$n1NBQKJT8Invd`LwxT6+>0N-Kjb=6E^(vUo162bPYmAw1|*M$ z?vp6l{e?KDr02;l@?A&Xrt*C1!!J^<% z;e_*37StTA0TrH$0WdW6aj4qCfGexQi|QI~76)~TXQyDZU?)Y=PkF@^{ER-PW-g;X6+So0Y{`kB4>Q1Z0XIX&i=jwQn zT?bbFZ!3e8Fm3PaRaD$4gFr1{JsPq>xi;nP% z2X^>uHj56QB?;52zS_cz!LJ<08SgdhtIbz<>{dy%k5iw4N~;R&jK%CzNxy|zMO}l0CBaw6Kh7cMGuPl+#loPkxSmU;>`HI^$U^^F1Dg7 zZ75mW5~+FJJaTj|Kq$Bwvcc}Ehv2IYz@;N)jIzL_+HH3&eh=V%3{1;of(&cs&FG;NquK@6sewbtmO$W2>l%5iS?8Q7p zw?C;M^JhxXYNYrTYVL**O7ts_|aQ{gzG?! z%;`ptpOuHQ9&GfaszccYZ1smPzf;~!Mz+8`NcZPrdx_lRzjm#0kE0~$)#d|X z)kP{Anr=SkA)w~j+uM)##aA+m>Ij2v2aFG_^>}IC^`Sa&3-IDxQC?aJ6QPHTvA7Tt*&gU|Vv~41H?neuWbn9)oVQ|RD;p#$m zvmdZSED)u7fXd1qUzlkbV{%~7rLX;%@!J0P{kr6;38%eG@yxcE%5zApazuk|#I{iX zh7e|tl&0~vK+$B!srCSPxeizQ9;{)7mpW}Wmo4o>M9`dC?LB6<4q{`w7f(5zujI5N3P3EWM-8(gNKDE)L z3NQaxnqhl@{JeMU!kFayrTCI$y^`#Fi*E4JvA5sujPL$hXQk62#1&0if%{Ap z^NV6DoNFaoztofU+Fq<^{=E=-!Kpxoj~-$8XxWX>PX^@6wDTdcxRQ471%_Xeo|DrP ztg?tX32}$TmK{b>;eYcM;WQ`3#a7%s;w^Td+%R*?Rju-JW_#bE<9?{o+tEF|dhOuN z0(yljI})3`dH>Hsh0}pTG(qb?ED(^2y@E|(s@w|KY+0<(_Oy{RGt<8B)c(dQBPf=| zT76f>*DO z4d>d?e6fp@D0N+NHCQJ-iL&}!6}3Qub<$-Nai6w9cjpxHJDklT4>BlGiBSm8E|ylX z_gvmRQ+RgT?5A6M?9YwsDGRqNU#(yG%8kMl+0I?Mk8yd5>sEl`rpZa2pz#>w#k zxQ?H@Y!whPn2DL@#)E_=bZo`?sXP2nk+vJCRb6c%sJiS%Ck?s3?l~R@H2lq<$t4Lh z7>oQ$Iy=Sw<%=fE{{336mrHaU6zO|y*VK$z9q?NVc@{jtiHt#c81JA_egsbB$gt!+ z168?eSK)HqTcV4s9xBXt7y?eD+0y)Io)g#1^iBSPe9NINzEWb*j8yXv0V*%7EWt*| z+GA>&>numSjtnvpUF2lHI#fPfFjR?uy-=a#3oK95YAY(LIBF})CF2{Vx=q`6^yJKb zB>}X|%`dL2(fe??#E=j6~N_`8G%qS)0nR0}+Dr@aqT_|16{&)WyXK6mKnzpL5? zG-9&fL(Rdmrd`rn4<4^MY}zPyEg0OJ8cAX3^0wu4Nkr?UBRqG#I)fNK@@peMg&pEB zoWgfaF1RfhS0dC#^NzD2cN;n_hn+^sYkVQR`LWU-* z7f!2eglo~!(ayyT;IV!Uh4&KE?X2++jVVhCbj&YCjPy_U_wci709gk>xKDj%PJ$Ab4KoCI6|F5Env1q`h7 z*w^(lHPzHyhmYom&u9tL#jc<7Fmwh2Cp-xlLn{7%><9cG-Ci8j5CDAmo&zQnEDhK?o-K_+p&W(4q@%lAx&T=4ATi-wUR^CJ zyrZ;OY&+ETmQmzK2Yi2E;DxxNl9K92o6L!p7DZE2Q#-r7r7>6-5|59MXT~!JIT9b4 zCuAWm*D&`+y!*mU>*^@2!yYJX3TrJ`F8t*ZoqUXum6Zj%GP`Yln7?ygyT)Ty*a5v+ zqdJiCD6_kI)8RDV+rLJjp=eS~LZNLk5!xNb)PP-BTuiu`*wf!{=RX!67B*UJQ{!qR zdLC9-ED!QEN%x9(*o&yh%l~X!`6L@4rK)=VDj0NGDg3Uu3ViBn@D~wflrbKG+r>lT z*Z0n-Z4ico{sc=-Vz#P254(MMG_dJrsXx0PIKMs*jqm+ROM8C+UL@2l@tv-eFHV+c zWs%1f7Q&zl99p23J`eO#`_f1W9-j5fC%^FV@(ysr_6F_ee(H9G3?Jx|u`TSvCv|+@ zzbE0eFHtej*GFXj%*$hS7;|6&-wLn4LvUl^d5Ozopb@RF1%}^2JTM(@D!7TGU^%19x z5={RX6dycjXl%S&#p-liOj$_@Jn)!XiEsP8z!6AY`J~f_>4%V6IK;&n8SC2?#;g`> zs2{%Cx2IXI;pU$U_K*VU>zR_r=+)JrprDks#t?RkM*|NgJ@#B|=6wSpS*y)8&ohXC*_fO$2Z}r`DqZqy~gfe|0aEYw`i{Qv zdo3ThM$6Hj%i*U<`w8wOfCvpT+dYtz`vq2AN~f1SnVDkHA!fk!^dkJCz#IbC**k(@ z*~$_D_iBvf5q)m#=8h`_tLBq`zk5V^Cx{*XFB+u$ckEQ;UONCCA-^E8G&e~aGy~9s zf0X-sgCMk2O$2A54;ve=t!lyR@_+xAWcelyYsn~XO9-H(1WE@n8~n|>F!CeQ-2bzF zE&rXD^WXV)BX19GbaeEuAtzyH6pXG}BtaX_zkL^fkA_u%pP$DI!d&)?TP7wZ5e5$a zAj2mwe+_8?BlGtqHb2C~fn?sW_I*ME%fEg=+}E!zU@S&qb^uos#QZJsNl8BSRaJMn z#@|*$y9-_4jjLB@Ktm1)Bk*}XREQJYY+fA^-^3h{AZmaX*d|NSSDHi#a~=oz>dE|x z-vr~%mzI_VVxk`d1J@dZ0s~{gFGaU%Yb*cDL%y3gGk^UW1mzc`IY>PBxV2+T5HvKf zqlcf*0>Z3MG8X8Xa9A$V(bCGv%Nw$T=U3Iifx88OTlAvYX=#Rj9lgE$e0=Jvsy18m zok~#xx=<(7?gev4$kE}NjqHE!MADrViw#|t-C?7Lhx__02MSJ^p2t-aQ^N7{m$|5 zOo+FD=al>E=oM>twSZd=01?1;`(PT<-q=Wc>C!yxRLC<`adq7vAHTd46wcaFUS7WS zRtF*KNH&!MeiGr9qF#=b&g*X?9eoZLx>Lg7&datocF%!`1q?OKW;Q(YQs$zLKd3qytV1KJv&sPieUyerKsqz=d&hDXI$_njndR7pFYH$mMCxL{DG( zYT^x+?4QdsFiRZ0J5MhF9xSjP4mCVX-xpO{QE?6hj!Ph>F&+@yfn1-f0KvvkcEaip zJDjvmhqxAy8V!aF#KSu{3gV`yxQK}2OVtv?bg9@&!ckrTi*EQkNK2pKWt?q=i}I*Y z$9^A+J(C+So&)!Vjq2ysVo#iip=J5t=<5z39|D^<2hWXy&k~+OT2gXytf*6)1c^l$ zgi0MfJu5-jFYxFgF;tq|Y8Vg_RA1BLZ(9d(3R(TdgwoRCMR0|({nxG4##C9&=DL4J zpV08wU7G+w7>GY4d3bo#Fg&xM766|;HB0c0-4*2hXbCC`b?5EH#{?_8!TTPrq97Jf zR3!5uIPK8V<}yWtn`=A}H5-*LF9+ZUrKacRtj8*1=0V^B<~-`az}4~wSMjeGLQe8J z%6fiBg9E^4ZAKA$|921yT5hfIxj3>K#Hm13dG3G2H;+eG-sIRG7|`0v&b&7WWf1D4 z$mxneJ3npFa#cQgYk{X)n&bg*VBtoEt>17G_hTggX_6>-+Ba1Go=_H)KASgA4U*Zt zOMim_SRGLQ%XzFlt!k?021zcUVyK1$t)j1LIu z_2@l9xaStS-8IyS8t6LObG21RD5g(_{If)8d;S#<|Emw!zw7D$#vbhdli$AZ2!)`f zHQT+4!{I_V=NbK8SX+Y-w~+0q@;$u3%b?aeR1HDM&d$!rXbMctz6kx8YC>_?3keC$ zi@;~J-bi@!Cquq1N~n2mhl7gqjV&O*=YUoL1$jOj%q>H&T)6@|G3_(V*B?fF`SQF; zPhTGi(|#yjx3{*m7>UG7H*!>gDmmf{>jeL#5I)%Rity-9!*;~PLs0!EjkJSC#nvC- z)&Ej`*2Trdl;1%W9YFnVZEX$iQJ_?j)>4Ap9C!IByZDwM!Ptgr#Uu)Jz?|R}l~k6R zdJVb*-3>vMDFv9(K6>=XdmS#3sGuNdNUYNl=CI^6`P~lJ6i$=!9ULzWlu!gq5IZnqSF;IW?4}a~4ok69}M$8UtPcPH=Mo zvj(sB+b*$(6!GWTXK-Mx zm*#_)0K(D|`uE=yEVOt2>&kcRZwvB2{Z+!JhuPUFEGlv%VutZLBxeY=K-~ofeVV@X z1YC+<<|q34tEZ%1Jz!?;e@|Fnm%mSD(0f2eK|z^7&M&;x@AOcrU9n5la~l@PC1+;` z?H3djz-U0vj999NY+F~!SDNcwWX{Lxk%)NB>+rwF(;9_Ywv+6x2Ua zt*?C`Ds$i9N7!reb(nEAGV0K7QXTesR4 zB%(gTHAz@?d{FntL54AprIPo1EGBDKizz&6odeUG7iUmPQ1I)X_?iw z1MH2U?gj16-+k3A|LQUj)%LJF_QL_#K4l>nds4xTWAULajKQHa;63daI0LfokusMM z@=h=V*@Cg#u61dg3TDL@3lr~XNhHA=>_SOXLqkJzGwYN+;;w8r6k8jcn?aCPH>Txo zKws+sMqh*1y+ug<2nxl#pFbN0pdqV;c=I*yF=UzZM-lNm_FOXd&<$94P~b0~i`g9Y zFs8GSWH5yA)gCA56ux61f#SM#E1AgE$nOrL{IUR3scQX##M_@^zjrN(;Bvp&N<8e# zEM2sYqvUQ-?;0JgfXD@NghHZa8JHW_=-r2Kb58Z&Z#`k8MO{zN6N>YucWo|w6qCx7 z*w;6D33Bn^V1w}9Ok-t~;EyoiX?^}&T{v;Dw>dp1{15#*$QRR|?(WgE#TEUR?d{I1 zI-bf;sGwH+xKIV>0hMZ_rKa}z%a_{dTqLAkse4C_6a=~8@hCy-A*UB~zzzTc7~Hgg ze7hpb*AEDmwP2jUdHwnZEG$U4X}D5xi?0NIg84cmmI-uf_PdWCYY#U!H@{B96Rg>< zd^K_069FdnthVe%9Va%83keXvKk>hBRb^!*9_(0?l9C+HG8xrPLFL|J5D{bN@1tMl zYy;Oy8RZ9_5$63_(8YXCc>?4M07zoA{2Ut2^_bph68`Q9y*fUz+_&^A(GwjVLe&X? z6H~M44eZJ>rGZO13c2S#O>|hz8sJ|~4u>UYX5M6DO9scvN3fRU&&Uy0Lc1t2ptQF0 zaaZziH?h=fblJVu+;ew==+Ur*yl5OcY7$aJSeA1c_#39J)XtWGIS=of$EJN{U({mPJVJ0X*QP9QEWt`hhFG0Y7ETqlWhd7gzrd(`<7+!A0gT3B>mikJs+ zlow-5tjGTlh(MZsV;>z}B=Yd=qz)sj}n?29x{V(Z! zZV*T_|96W#`1Cq2ba!_0jE$tRg0c|AwV0QLa>VPXa(|147@7g~7eo#K67)JviBA(M zvcLRG2_VM;LlB#zhN6G5g`y1y3 zPUOF@xaw@`EEgIU22che+n+!B(7pQq>$-^)FRs-Uh}jvzpB!#mwc~NT1(eSCr;{avLu5AUl1&qX{p?q5}HOT!|~uk>RAb z#QG8DF14n9e?Jd+QcxzF?6qOb@62D=fQ%15+61@5&)}oJ^xNx1YisMp+KJ^b3X*pq zuKVISva&E>3D5%6j84k~UP@|e`udfo?MzGWn+P(yDGrd63Bfk*-@o;hL&UCzhL{$E z)d;krf#i)H@q9)C%;32)P;4^=b`r!W$X*hOoDQ~m4CN9_6N3ZNa4gOne_=fju#>sI^P zxo^%4@4Wr@hKPxlewXi`%0~d~u#E4^($#tR@RyN_wY^lD2asOc39$mok z_BOz$%^FlfU>1C+^6b18iOxqK>jAQ47+HY=2OP+}@}9|$R=GWEzs#rq%+Kmrqx*KR zX4%@|nxCY_Q2sl_t@O3S8-1xBH~xmo3l^xko3zjCn{zLoBz3BESPCoc@mq$ZN&l5k zAyJH$fgR8?cg1)CSJ1k0NI7?v zXU^P0Lg=oBTZQ`NeTkCx056(%c&EFhetB9{?4Age6X#$@$M39I@k+)D_5g>Mh$G{V zlR6j|c4<@8w!&?5Xvma1a~l8Z-^HffwMun!r^-kEv`KZ0jC>FucbQ(lkEg$4Z439{ zmHb(IWlfVGZL5u&^UHA>hbu(ff>_4t-@jkG#M3xu#-f#mDAZ9P=-$@Md_wJLhIDqm z6kafP<L>zj9Ne>Tcm3*mN6#;loQ zeAN>pYECaqsm!N{(Z1v9t|g-ESJ-en;CFk0cr6(YW@o$~8p0x|pH<4X3*_eTr<~yu zn{CX1N?Dr{k0dYK(TZ!R%}=4;)&8av$$hdlH4orzFybiL#l(%R)8>J++?M#p{rUn*)3(tc%tEXmPR<1yPEQX;s>5!-Tqg2z{ zC;92^C(F?U`@p8lrjW={&^Fc8M3#nYQ_X+f)AIGq=(i6Q6%H3U;>F40XyOVh$uFTm zK<=myA-@%w!>lH z%Gw`2_r~;(1NDwuR8DO^hkDY;^_{D z{2*IZEW-&sB>FHm>Ka_eJy^T8CRQrrFX#!)AkACR$UEt2jt{=1muB=#<<#bm^S_DvEWm(4lD ze!p*Jxpq1=%gYv2eW-crQk5_iWXLHy@-evbFqaY z3#qda%}c9%^7$Vd7vobema;F>(=X|}$k@|t3oGdT@1s7w&$yi#<;VSb?qMC#W=`S66!dIft^ymU435((*>rT=cuK zeoKDmE|fK&(09|qpN^d|xC^DHPA7$c(?#y*LgK^Od=_hS^y>RF+-K9DmD%vDERUSi zXl;Am7Mm%}TS%I~;QYizPD`og>;!`J#|J_kn&UK?amEMrJ%5cRs@0ne%X#sA3(QM* zk1=m*AI)_EYtaJ3W%G~TX;`tL};pol6RvqArNGe)S zlpvlLu343|Px6Tua#%?InDuUvyp?m8q%^2uU53?Z?a_v}?Zs)71#7>b>ZJe@|J732H6&e&`f3eXO<2~#$$+!$%u8~bh5e@s-CtyCiHm?t)~G>@3$>3BeEOeBuZFU}mh-C&W|e(c|Xd8faE9q!syN+CO0iwnOh z?dAeuX$%+^&143OFt9iRQ*;W2`cPR~8s#MPcWcayc#soe=T@6Gts;v{^OiX$D@(_b z3xvVy&uKeb+nlVv4*k04@?=FeQ!@B(f!st%MKC=o4chxz6OS16Sn!iR-P+KQqi%BQ zVis1_gjCfYkq(H8Ar(<`ZPP!Zl%*WX*8kZX!+hnf?f574JNgz2&ePwQ`){azh<4%S zT=KS!etXDjEpB*Xyw5L|)<+uaEfd<-X(*EW{5$il26*j`R5y%)KF|+FYfM|V z3iC$}*nSBQFD0pq4psTegl-&4t*Cs|Ed*g?s^|0I z*!#LDo>k*`YmcWkdmGOwh3+ipAg^~*#6M2gfVtkF=|)|{Lt56?*1v)*-rAr76IG4WV0sbll6UZ+QOAY$=-gs$9{VVJMHN9+{;vS z=ec=3kDQpc{Q-b9;_C33znhSbxSG=94cxQW*E@wB4)T)dVolq5b5zXD%yJ)www+n0 z%A>k*ZTN&t?ux8^4vUFlHjBlF+Moj#<;8L2jq|q(Y-i+?o5;-GAnf)5Y%@JB;8J+3 zEJ3IgfjkKAKTRr>;$2z!w4*CCSU) z^Pf0+e>_8}SxG+6n<}rndHHJt*QD`+7OiL2yPppYENONP?f8!AJ%~O}Zzg(h<1bPu z_s{{!yyj{0vsqNc`bk7Cux|&}B|i2t``>GH_WIFrhH;;Z=hn&pSZ)xu3N<+2UzHCX zyu~6gk)t|l;IcrJ>uJR47M8lFv1F9_%q#Pg=D`5hovq)#L@pbF(zC`FYol>9Jq%1t z63}ooa}1v8N*9>lO8a&%(@23(iEFeEJ2#Dq)qq z0IZmt4C1LibeFb7&Q)lhhx5%s@ajBqr~blk!Dt0ct>4K;0@25IJ%U6!o=bZpFr3WS zUxHH7PR}{nc%t7moIaxkbeC%=r;3ilJzjqP#~KBmbY8q5_z>{x005y*V$ID&)PqxlDas z`R}EN_Z<=$l~vjw^$MtGek-;$Hf|xIj}pzenVME;W^3E@1xS0#9d~`^uJ#JI>ye!e zvfbU7G4@owIt5HGJ0ZT!w2Yq;f|Whn*7g|k4y3GRHvW^WsJB1*_`X$46UWjqi+TKP%Ou^NMVC?SydY2)r+1MAaUI$qwO4(HtZR{T3;bX1YlNLfMBK*e|8SqHY=9MK$16pjON}%d%P!%FQx$I2>2Bk=z#V zFxeHIM?Lv=!gFNVZxV@jJP|Zq<0&O~^w=iqbW>W1h3&KVa@Y=DKdj$pzvm+i^AmJl z7r~?jOiFmAd*Tp_tfrH@ca1LlZuS@9?<9~ZNp8t779F2XJn)-R_7gG9y0WPs);p0B zCA^DYjm$HZ)IiHH^Kgg{;F$#E()K8BwrdrA=A9$^mG#4JeAi+4yf%l$aq9!F2FaD2 z)O~#7A;%GnJy2r3%2CD_Q|XClf6&}SK{{Bvi^^x8Ci0VE5^E}QqQjt@OFdn8Hj#%b zb$;5XG?@0#r|R3-L03xt$Dp>@Ulmib45j6%UMrl@B2gsFN zpMgaTxSdq$($r{7wBal`?XAnH`UDG@S-@<=z_pFKTIBrX)THOg^)!0CM{S{c_~(OJ zI+OS3_7cMnF84RN7)(VPTg;8?Z621@?6XfZ%5s}>x|-+&&PcX#YHx3L<{*X}BofJ5 zEeN&(gyXE3Du?61Pkb^x(T>!hvHrd$*|@bu=0-stqGku@tzKW5!cV2%=0Uvvpc3#BJfxY9iK9RtPQK+tedlo8LP;lBOmL5gA0UR2X0zLS$9YtpnHHy=FrCCFS2 zoo&L*l*w7D@Mk~e(?N90Ac;j{8^!r9Q2mlt_HXMkUUZrrRh) zy4`@ex%+>q?!2R#%+fG!859dfK|zGbC{jcb0TG3fxD-)Wjf#s(M`@M>MM$VYsUnIX zqBMzs1B?^8fCeFAI8uZJ4AMhHq$viv-|y>lXJhDeD}NeeSgpM z+(WR0YP%OqP#~`fKl$YWBGoZXNx-1QNDhQv|Iy>m5FY(dx?Eudy=(V5n=`cUgPAn3 z7hg-Lz!}MTiOYy3Ii#+A#K1Wp&rVhPG;MTv#o$E;aYIV#dqIly2YZV6u@p zU(wZL5+0+DIu&E05S*516BuPg%P&sLwZ1```dLMj zvz+VTz%XAUE5H4+h+LU!j@-YLUa;!z1np;{ytCgpVu@2z*}RBy$+10gT=A%&e4R3l z5#Vs4);#cQzsp$h*`AvZpJBhiq!63)a$bE1-oWS?99b_7ehTvFLG2{*=##BP*BF84 z+`iC<)jbM+*SRAi)4=5eqX6u*G)q4{E3O>{W>UpiyIh!TLBpnp#p3=sdjHFYInU~yn(P(G#lo0w&(dqZW*7HvdY=t}> z)M&90Owvr-6J*~Wj{iGk)BMv*$i)e}`}Z03uS7lXx;sTRroAOysNBJV^@=t!>mC%? zPelG}#h)6iLjHXI02UYe@Y%1rF}XeNf)~`-imH~DvUyVfShV3;U!Au>I?-i*0Xk%? zlx8-${0erc6_3gByqfuqL+iYk99x??z+AnHVsfa78ORM33oMLWyotVpBz`{44gqVB z+%5#xf1E;ZkH4b7Aa0k0EB@+sEr`l_VM)@CSg#^0=!-}%BFYGLy$z>gM^gN{A3B&> z8K<}lmJ-i1w)v5ay04{~A!q}F0Ai@ryH~R-jA9Pj`grq5JeHVejGdTr-6ZWNtGQb_e8$!u#)g|c`~xqReQx-oS}3rH-maVY0IdgRPc`C#;T(43TK@2%ts-vy z8|HCA*ous(lw97htb6^ejfQEUFKiv$a(3t~>>NVBkfvv%4g`xTp^uEHMw#F{hz#^x zu+}j?YeQ@B3pvZuEy`OaJdZZ`<4Rkr=U$|vO&_PT@A7|yl+B^CUsIlpR`8;h-ty=_ z-r{k^S1q-I_; zCwT(~%Zq=D5Lt>A`2jc;Ah}<1*A%AB`*OtU5O1)19HVT7<2s!IPa<%BE7a*zAT4Y; z{>qKt%{iNd;1!Y+ z6E(H8An$iFCR5hh&&#U_YA&Uvt?LvNjyUf=G96ozk8}m-dws+dGXkF+XsR3Bu&WX*4Nj+?K__j{b6XUl^=E$ zoc~}YCo4;upRi2*oDsbybFaLrf6cZuFuU%5>PQlfmT@Wu0M~HXy-b||h);nG-FONb zXA#$MI9?2Am2Gg!!B}t@-&n4$GoRO_ePLjzIn!Daqq`X92C4&OmW&J&r-`j1$UTN4 z*6z3;^gt?fyILV6gL^=0x&YcbQr09@IHl0(bgrMS$%&c{VxbQt*$ZMg2^Tw_0>=Mj zk(h_h&1L8sUcQV?J>aa6AX@RT88Fr$L?mz|&GrML3Xbol55ytA+u7S!T>Y%Iwc@a* zH>3h{L}Nt9V37|T^L^4DJ@SINT8Dzf00J2kY+_;}23gKIvs<7Pp^Ub-Z%)TVNPuln zBS0?=Fp)M%@-*}m4+3C559HI0?HJLt6~MmzaDao_mGEn{4kSY+B=v$41Ey1~9AYNt ze?Dp8`gP40@lcx3m2U>DkXZDp#PR0~Qu49t_XEDw#=+I08yGh1i^ZY_?~bvwak#Y8 zU~x(-NzBI%(61ClG~7vsBH4o$(LpAJM<%!f7ntT0u5Ov{PUI z){PtM&0Ia^YVaV$(VU+hB!doJ_f(kio;@*ZW1S-phtGNkv$9SC>-bnHi{|R;3i6xk zw2nKmy+5592j!528Y?SfY4-z@GtiRLpgIelBa;oW_EnHWt{8X9I^Tia++212x6=*| zr=-m1Asco2%YfOcY)?6LNi%x?-cy1=XIJd>&WM@?!(J(i(&Wv(N&4=2jx>DaiUb-W7V1>aEVIbUJ-?-h3BB)(G{Rk7 zNMK%mg+N#Q)_D9*UMZekuWAMiG@4uHrB_ZEy^6n6B%GHbW!!+u9!L5 z_Ixr>Fjj2e@#+c-;4wfHbHlct5ZtkL4B{ooEd7SNBvw4z=uHl^w?|hL7WM*>Up^c5 zY@=E!J})G}N@h1#`dU|OE1!kMG&lKN>TmYpz>#Qiv_}p)rs*-_q>zakl~MIyPp<@+ z$Z%mny||8wnvuB509_t6o1PFF8Y&TTl^EpNy}9)C9hz|*S9bVTxzY{;10JvpW8W+3 z80A>QT~bs%39VLI?oa97;70urNcEg@US|%8my}o-wT8N6X&R+@pSzH=;I$B-lnooME&%S)Q}9 zDhAsL1sw-p3mCJ);+WN`D8SYvUCKTc#3REGf+XWDCgEAQ3k#2HPDUi>_?ce0ZMDze zLUPAV+i))HMIh|Y zY~n%deW9NB_3m(H678LA+4X9s~ih+Kz$FQ%)XV2-(<#l0RM z9lk=6jB^|=-*vKa2zs_a$hh;J z;%OF^|BtN|F{i?mNn9v+%1I>%==4V&O3u|Y-x0bew!f*2+2_`e5XCkEP;!3mFiF-XOTHmdd&eaVdFZ;t7{?>xe?%IU~_^%|s zAS)ewec_sJj$a^vW>AceK|4(5egbT5QBCu|iK^9>{@=57|G~soBOE+BcFB?@KQEc1 uQ9CzKO^*ofV5z7jnZkD(?3K57NQLaX6L$;~RS%z8a?IkCd7i0L$UgyvwR9%{ literal 0 HcmV?d00001 diff --git a/windows/security/threat-protection/windows-defender-antivirus/images/MDATP_18_ConfigurationProfilesScope.png b/windows/security/threat-protection/windows-defender-antivirus/images/MDATP_18_ConfigurationProfilesScope.png new file mode 100644 index 0000000000000000000000000000000000000000..35b3fda24e5d77d4ff5398b578e51603908c64bb GIT binary patch literal 20024 zcmeIa2UJsA*Dj2QBdCZRMc@b`HbkXaC;|dDL_|QkBs4`@LXi?W1VvCmKt(!85eNw; z)C5Q)dz4wlB$N0w}Y}k8e@3rP$Ypyw;=b8J} zeO*o7eZu=VI5>E1R?!4OJ5C zDb_O;)j;LT*B4LUsafG)xiWrrMX6OOQ9;l0vG{zABxnLh{~OFMu*tte2ET(%vtVHJ zS<*lrYz76;!eBESZo~^VJ{lM97B&bLG??cdKEy}BZFQC6?E zr^jdD^Bbgn#-B%yi2ON%{F8&jde=UCjENo5E#D!~^GjXGD+b@`qgT`V`^n?1=BRfK zIo(mmwp#**=Fkq46TKc&%X4tEm7>Na`#-BS&@L1Ad&BHzME)eqmAa2Kd_}Nbr!oSC z5H^hH9|CynR$Yl_&$11Aod3g_KBU((>xwCMJGcIyr*F~u+EIryOh;IiZs#b-27pK*`X)w(BZGM1O?9B5!9;(OYRE+%W=wBbBlSXfxp5T7kOb^G@1&6}5J z33{P7rpR3zSasb#OGo44V>!pVy!915x2L9RrY?+9phv_-GWk6peA%>z@$QfMU0p)> z>OuA$?g@Pc*S>}+?+h&iMC9Y1t zeS47#=$F&0t#ooV7mtsJ%4AfZvY>1gd5WxeredtR@Jv;NCO0EI zsV#?0xb3;^cQ__K>22NE@|SlFE(6ew_?^y{0L@|lPzi6i{>+|473jdqE(^c$Y%4bqj%b+qZ+xA<-9P9Q47u#4Pu zw^G=xKd-xHA6~g?RU^iK?52>|{sWN?V-cn9B^jJ@nIRIgL*wSArtSE}$h+RGbPo&v zF_t>I?Rk<(3}XyYfP>rje)KRvc=$(e^@~6QVUwh&ukn|<4BjIXOwk87Q@ig4J+>W7 zf~p97A`$&J*}zi8uHA-9mDBF*3n6FiL`g}BP=oPX%Dl=4n~!+vkrgi-R$a3z_DJ|0 z1sg3d`P4yZu{5?YM7=ZfH%;p_Zc!0fSsh&SWKvO=`tQR1O|Q>IB%cCaza$AZ@EGx9cw)jzVx!6V4kmf)`%tF;vQ@}f1i zTmt3G!x?h3^==-Fk^J|bsqf0P&iW3gg}>YPST7uwdIxn~;dIxQp74@7R(K@o8Su@%M#=ZlSes^xD2>EvPegL!$kw0pq9}G{bDzcqKIPA!cTA ziKP;_qCx-m0tKwU`m@Ob5dyj~Hd+0`t&CI`XrbB~KGvdco%w^wyNWize~3$n;7h3{ zecCwhkF?Mmq)*Q?>kW{1eKKEMxEZ(^65fSa+V%oV14ps+hB~%~rhX7Lt+|LBknz!{ z2_jsEIJtzKoS5BS;JNZo%1zvov%gPj@LJ}4A|9(l((5<5=J_S9)|TfLD&%vt{9^1X=d5_`P@B7{nm)iFV zEBUAeZkMwK2j82>FNA(e`T4dG?zpBBm3^!_F59E{405VH(X2Ehxz~R^>h|&nqK(+k zRAbh%k%K?R2>a4kZ4RA74Os2Y9x>-h0=?zJ!}X%RY-U5t{VKv&?~dHXO^wBOYkoUD zX?9);Uci8j!DG}V(VQvBGp*W~xT&xxXH7$=8+5|x@UJII>K%QnY2azPe&GDY$_Mof zy=H4?EpwoC>=SM&l(_x?M00>N)Bo{6kSI=!yYPIyV zgB$~O-9+^cfVC#zvY6q{qCdNE<3F*^gLN}LKHlEmer0iSbwwib_3Oief>i-)9o5@O zw~LC3l$DiBu>5%D*|TRSrl*gJh!mf?S=5QhL~fHMMXd}B4h3*VWn^UZ_4RFRZ2bKB zaQhF?wm;51)Fy+)sCr{mHtnkK&_G(&Dw{O0>B3%ShEujOe&k{gMnb7uKVOIi9UQ6N zVpIk2_HVp3~YPvTd7_r=SLk?x}>Hy zBeoN}eL3xfCVu)ft-igW9(_!83f$*)UKV?f271MPmC3rZDYiW)cI3#Botr`+5Veijo4aQQrEsUQ zSFy#OIOHC1zddOM*;D=f{jz5qzutat`!O?9ZGGb7z~+p1XlSUyS#fdk>a}LqmQ)pc z(p@rgYavY_$C)zGr{X=cu}-O0^O;R&2fDPss@`O}^6cAp_!IpIRYvHNGIVfjzEL*h zvNE{Epv4s=WNxDUA7>~wBu!#)&hV*kgH$C zrtSG@G@8H@x_b2$9ZYvRq@^YpAc+t(Tu)Hm0%L;<92x zV#A~#dV6{XY|Pa!A0uo+kM8U93a_|mtitl(u2y0OF{nM7xpedrs;{DN5g5qEn01_Q`jpk z8Y|*$Q&ST;&y@R?v%gATe@Dyr@2kMFKmO{ANvM)Bt(sjJ$X@P5>5)1;G&E{i$ZdaH z#?D~bwSBwZ2u;k-cV$xXVCZh!u#}-{TeXM#JgBWwQwk6$bWKTPr%6vila%}xCw3Ye zt-jTh>M89kYgM&DsouixbnOkAhyqTY;2hpQH#bL39UGY2v&ITKEiT@h+(+aO(me>S z0+uB-bt_Oc6yoh?f{P3fU)N}3nH|oC*$#Ad8L{uzFEJ>kPQ974(tG#rwXv~Lt_#w2 zTbZG^v>qo~RQOyR9M~*KGwV{F^#})7OW*{_z%q-m8)eUCj?N%czn(SL3wk+h6|~JB zsQ>n@i$bC8TIPHi{@vHtSK&}P4yRjwb=6)_KGuK7H6)0GuY>L9M>qcy?(092-TYfF zMdpsgrt*_J+Iu?sdp^P7PA<+4Fkg%2!y5X(esrwFUV}Nu%geie|KidT!rL2+REMwQ z3yw6;s&3#My1R4U;wTdx@}84_|Hyoq;STTWpwZx35aja83cS?*UF5{?+0N}!!d)*j zwBvFA_>lIH#K2{NAKri9!1;T8`}d!H2)`L3_z4je>XeFBcc!&vYg7L5u}GowEh0aD z{P^|j*X11i5Pr)DBdDUO5A`hRA?O}#zF|7ikqxJTrr@24o|Dw&M-1HnoZsWe-wg04 z@n1?R5!gG}&XR}Ia=cS_oZ-sOY=3ZWV5E!%F>L2EGc*}=K|vwsPv$L{_~hK2n}ofJ zG-K+h$_H>1oS6+~y9H6#dk7_t!*Gj4)U@f8xk zI`)d1n#&}Voo`v$5%#D|-0hzi0jCzSYd(Jt4lBtQ{pc);bxXarbMas8*x9;V+qsSN z_e^gjvU-T1;CBWIdHb);aGegiu(fW_uTc(t0qg201y(YZ-noIm&ac!Q_ERr8%uBlB z8eeekLkWkrsGMJ||En7_i*&w{{B2a-;9z=G!GtuGpjh(v{_UKh66ifNz|o$|Ux`1V z4B?*q{oh+I0-7dJil@_PdHlfS|F|%_Zl*e@G?RDo{&;bZFzO%swc}?*NGHIN)bt7G z$>e|SMyK~0J^Zgm{o3uvoF@r@7BDpbX33i?SmK6@#=kV6((C{ED}TS;5_QyD@?ToT zz&El?vi^P)3@CW~0QSy~wg0*=jv`YH{a4%OTLhJ!{QFUGnk9)f?k%Z6@XS${_J6Z5 zG+7L>(%YuBnCo{gW)culEF~%WSX@-kbN|ALVoqNse zjq~5tWqMa%Af39>kmf|k?YE7ps{Cm!b5|}~5Vwwjrdoa6nO7?IbfrytI6yBf?gU`& z1YS}oMtNVOQ|p%L5}n;Mk=jTDh30Z+QM$h#y*w_-o}Lu8JU=y7UOxT=A@HF(>gAdf zv%ey9e!VV^+sv25XK}^j+~j7zz&~t3FYp{+^p-SH^!%jqWT7o|vF7@=`ZUVK!p8qr z6P7N~vCb7H34@%B&N|(PB#d`CYdG(o!4SLa;-W4sY zzDv$k^SQwHyq0Bg%5riS7tlPf^18*Y_$}AHll9*6HTzbT5P@aVz3BF>lBLrs*c!d6 zKDSk)zQMt756T2)O#_TWCTr;lR zycyoE++?Q~F!|JrUHu>2>;N&|6(ushyb9cbXXYg%l7-F<4NzC1EGj zefD8%%`or86fL+@C`QeqlKnNCKP}IsqT5B!b$jKlrqR^Y;M1oyQMv8ULj##^#TCf;p!m7HzG#Ngl^HFu{-nXT|I%TX?&)5w7Gk0qJiIRB|f9qQHn zoz(7&dC@Qb=?)M(LtHJ;q}WR@C9{B}a^Z^SY`{7|_#&|utqqLWu+FqNGs+jYjnv<) zSiylfs$Eoh0?vZ>yo{?#Qb)V|+@zodMTxF!6i~{TDo~Yh_4ZuqQYe{GOC;E>AdE-e zj&xwoAeeo%j(U^Bvoxw)_E!1ec>o&_aA{S+R*WL#wy+#+aoC=9+ylW zLQb&TUcq6L9La05Xa>@%e6!}`vzK&pp* zZwQEGm(7d5?82^`xC1EYgJpxgt6=v2eA_-0&J|JH-HfzcS*lun-M5eJSld$)klfqv zKQl8)`3^>P1J#Z+vpL=28uU{3Y~W-Tj5PCBk}nn$dy9!XT)*&vG6^8NM0?g8m#5*3 zS~sUR@r7R9CNsj>``A^B%8PzR+`@&3P?1R$5K3=`Qow_PNl6~ zY0eUFQ079jQ}Y>0>L47W{xo#EOQZ02b{5YUeNb!kF@N(Rk=E0-UPt#ck5-W3w#!uV21rfWq^fPSzWMEK5_bjwT1pT8|u z@n)+CZDVbH=bRZSm0oE})&WWW*|&;>^$*5!4%9#tYjJT+-PAelbUT9S6FSM(YY_N` z$jnEzzM>Yd`=q*z4SxZ?VQw;sj*>k?C#L$Y8chS!_p#Vti*o|(wY4v)=zKAvBMOn&5ONTg;VmRe9hEK zs2T0Cg*N%3kXS&mtR7v$zPPkHz92{BF6xI*JVc>`$h`y+3`d24HYP}&NSwiil z(?XAgRtZDzXH`{G#ocCWZrVtTg$}Z{pR}*aTWm}QT1?xHHkR!zgKa*o$aKd82eo`u zdAq&n<*T{uWUt$43rmY$UQ5&J?iwV8TxQOgf=-^%=87x)1XnOqg~M%}-uAs-SOs0BH1+?h zp%>}pTlDZw?^H3x{p=>59LAPoZK>)%gHjMr_)ND2Fg`X{}yo2clV}t{#!^g^X%6p|0QVgzV5X%k^d#EAsr{} zEJHhC+h2iSwzl_A#Q6HZpEOI{87Kexwa-Kr^WXPa6Big@&(aEr<=DbtvF8P!<_cy@ z{=YY>weY_kNd0FbIh@$v8p%s9o%${!T7cFECyZ^M5l zqvNO;wCdiWoc^QC)4%0r|2>}Td=uKw`bln4&c)K)t12v|za@0i?*MBxBlaf-0~Zz* zU0`u?%udBxI@Rs6&ftM!j{SKQtd{dE&|hJ+@aIQ=5R5F0J1;2Lk-9j7uYuM@T<mK~^Z78_+HbP?rxZ$7@siAE(+NHwElb6<4 z<&i1@Etb0d-mCAB+z-m`kRRN6^ym@Js(NN1F{^;&&FU|gsMIPrVnCwam)S?j?*-jQ4ae96<~3!6L1nEY*eRYs#=!?4O>os+>$m+8bDH zrz3eDT-&)iUsNRUhSjPRWDu21RPCcW8-Gz{i5Pxgc7ZLL%Ei4QT;9E zY1?lGOT#Hc_=7LhAcVD#dZ(%eyh`v`?U4Ew`i5uoOyxx((*U7ZuWc-N8nYp{E~X)I7%Sxw{uBERGl2)VHLmgE+j1RlU8nwlJ>f()Xb7 zQEieuyrH4N^O~*gD9(a}!C(mB6yV5WB~7WXYHMqur7q;}rdELn_Of%WOC)lxRwzkx zn8{>P$;M}76qKobeMdz_vEA`jK}Upy?4S1A>FViG5b~`VH(vy(rPW1*hbuVs6g>WM zDAL}}4mS2f>5m}rFiV1sL<`3sceP7uh|3n`SoF6j}F|fJ)?H^TwZq?wJPzQ8ALyCI3BqYauVTh-`ap+ zuN)=bH;1GqZaT5IJn*u~60$r}zxzFH<54QO@Bp*Ssu=R$#we=;2Km>!q@Sf>QjEVU;ofo2)rnWg$%OiSUUq53NYG9B# z2Vl@!8X9;!9$+Vqb~?G*4&HPkf`YT?ETQfUIkX|lX>7DH-l{5~9EH*xzRLt46k}qd ztqvTV{syqBRC%}hgxx#l7}N{S>hpJBzFX8$z@<2I6?ZUuYII=Qzqbv;oFe9sMLy>D zmnr&AKPM-j(G?RzE&=9}9c{T3UFC-W2@FxRz9a(|_}gO#pU32|31@wKF;(dgSATzS ze`mb*Ct#%64a4=(blTguZ}&CCVW3bb-Z_n;ax z)mwf^M$D?`4(D}peNz&h&0oAyIDh{9$&)AJq|7qanL6;MLk9AHB&isy`&(u|K8lq5 z3Zbo}@#vD3?P|UC)h)D>uRea3J(cnEZN9?MJ|gR$mKmPp8LVQQj7h5NjCYZSlE!=V z_HLaR9FGQ5>DH_64ovdpT=mrNDho!b@$se3G=)e9e;=RK!J3fHtf}|!-{syl<&r9#!tM*)mYwRv8$g*-9^n)~Qbkhl(8hc#!-dA!0OE zR=$VHfbt()7@qWT=Hv;nJbw6aaOlsrjGKV0*h;0OT;D`Hiv%oAy!D5oiNJ`TJ~@FQ zDlIL&GeGqm9nr+{^74ZR5AMw885V1x)HN-twD^6&i?FZ~X4A&}sCMXZX68v}NvKu1 zySTD4B%?RcY&df`yR@`4J^k7X$6E`o167ronO_cE>)G*j(=j4~5u<~zdaAK6`#_v4 zA?Yn;R>@$0KP7C0+45YH(Iy)}EI+>AXfM)1t_3irbY7U?Xs#&9vyv~jZP&W1u|3Pk zH0Mp&aLtz?A>n9kzgfyCbeni}ezp7?U>CR6(vstG{n<7q&R49r>-H2}_-nXqsS7nW zu-;$*)}Elgz2RZ|D6JKYmy5QeUtjPs-b+IX4=^(4&Y1xw2spFs$I~B_WMy5OljQSE zu#j^1QNVFXYrVKf2E+rgAzVPx6CoNf)2Ec}rNZ%06T_8bWMD$4ZsmKjGcjr^rCEjL zl{q-A?1Knq@zJ_1yklf8yQt83FZ;%{GyKQ5NhNV#4co0vt!x3j((bLdZ@4*lIKaZ< z_~c1JWhMPpc|#u+@0}wmY;J zj2xe8CXo(UJ|NiX1sWz-b4xw?+k(3%dA=du-$rK3gK0TBiDkFEkE5)Md>*=u;VSrZ zM_p5_E&In!j)JxwP`Nn5h}Zh!aiF2G6WUq#uK~2WNoHq#|7$`2pI83usq0{^2D$}F zxCjs>Y^Z=Z=+}jxOB?eY;5DTvta}4(PUOy2_dqdmPirz7lET{C0dDUGI5X?^Q#Z1Q`ck|;z6Tx~@myN@@JbBUv z0YgT(eHTFz;N?q8OI{<5@v_`pTpN*Efb{@V8YV9%x1W!Xmd-xhIWVBErq7Jr6bjAb1a4vTW{lj;S$tMro_0u*Id{(vQFL1l$3)Lqm1Z5>JW>Itxg?!m z-Et0EsZsvC`O-6nXdKBPEZthu+%;&g%L6eqjKTWfZk+!9{Uro)-g$TTT^H^M0`o%q zt6h@YZEg2w4JOqzoPtCh^AAK32ns6w8L?*d6W`yE{0cjHp6Yg$S!j21Rap0?GB~!k zMvVL5KC`De#$K(w!Cbz4S+?AqekF`oCH+?JJ+>Js13G$$IFn>$HMdjQIB zs~zB}mX(;$4oK?<)y_Ks0Reh?(Oyd^f_$bMQx~yK6lYGgzB;!RNFmVWjAu7#8@ssc zYioOB(ph?k4jtO~7%!8Zm33wBF^-__l4Jel9`)5kosLUz?GzL1NOL&A$%|$xB~_y zpWRyFc}`W;;w_|;tJ=Ev6>uk|F7%=jQTKPRBzGln_tPY&ZM?h6Du=?lg z2bcp@9xJb!o12wKf5b>oyUD34T?|bdo8fQm90kD+j%3)hr2q(sV;{xD#PIX;r|`}>p%g*V6QPeC(gS$9Z{8&GX|nBNG_-DUTdWulT~ZsG$5;S5r|sKyr8gVNfP%@ zmR{Z6sHCrGm#^dJAk3$lv20kjfw<|Y`smoFPf{YDCX-sb0d%oTT%{aA)$3=_>I~3Pngv%r&o|FpoxR@jFiKZos|I_h9u``fqOq zisri^=qvdVQx{0v!Qv`DyZI6^{D%&mmy~3>_40(VZ?OsAW{NX2ZwxD|$;#>tL*gau zb_MUgrJbh&w0f`mlC#9;8e%0O8_oe3L{V<;9a-h&?t2_6;);rtZs@4#c(EWW1>@oF zemE+2H6kLy-_OsG(uI z`WFMViQ-4{H?`QGpWX>7V&OmK2M^mC+CPl}3Xo?0BHLY*$}mU^;ov5E2BcDW12_~3 zv-Rxm8)PGgC9b`;=sM!2e$Pf)r9C5$7DDC;t{QE_MKWy9th(*`+zPpdA*_7BFP=-t z$;!GKu-caSvdEui* z#>Z)M%Rx6?TyTQ#!5Rbdkmt{T_r?&I)*yKDogaBM<{5NHzrN>T(gnbQpE~u`tYX?F z4}&Sea%YOb9Ua?Ce;4jr;UX&9HzQ^S`kxor>N|0bf9<8V-6W9v93GNOT3*gPzO?XS z>-U!*xak`p=ub{g-i-Va4Ke@_t0555?A3i7Qh)A3LmJbc+4=bqEj1Uz2P^oPmJ)cJ zGUKtYZ+TpEPR^O^C(>UaC3tuqE_LYBXO~VCtQoC+MZNZck9=WP)&AeLZ}wE$!~pF0<<; zIS%x$hYh{Lg`rIcJh;t1lI@3tV{){}kkyiXlD(3_uwHUlx2;NPS=ob9l;jj-Unh}w z)CoTMbfQDqba=Trm>!HRpJ97<`aF7+30aT(j2o>`b-j@TTaman?fWDyi2mATa%+?A z*CB@!>8>G)i{`{qW}dj8;dpSoq(m7Ffu{=^i|bdud}-n+OldxV4;+AgemH|7Kv*qNSj-pC+tJ{a*pOx4pwp?JU!2%;qxG;$@a?r zIX&&<%vjQp7ERakq zKraM^;Br$iPB84^q9-Zt3L0_>GQ9X;nkz?-+|kvQrQP$~Zx_g+T<`5m#4xRG7HA!= zFU~z-__n1{yHnw#_)|;wsMDCWRNFy^4#Up0I!cnXo@1EHG`Kh=Wx=e_Ar#CFyhj^hb&cd=_N zH06gGdzsZoxe~^fY{$M_+8bN|-SbNj?Nj~#RV-cEYNV>Brgq`NAM*o0>aQwZy?V5N zAdHja!3Cel&qIqr2KcI;@Q8@v;bGUlvWL}qeQUM_#aUP^_80V`3uL!RNlA++r1~d- znjBO0TXd;@tUn&EK&8<-J3H-Jit@@I)R7%snK zl$hR^uUQvR*)V!STs?R^+qv4`WA8Vj>zJX|VT`QedA-)n26+)Z{R=hAV z;f{`uq2Xc1)Kr(VlT%ZY=farI_+imcbFU^XE6<-j+qU1<*47lr2!b|=JNjtPSl|m& zbMpftC*F^@ron?m&8@7EjBaTJ!eaakzD^ZP8L-%BX=y3nZoFk_`N2gCJV?%dM4PjN zK&Q00goL7^BK#H*=gOh%a5!A|Z^BOmn%7q6Y%DaS=~>6pWwM|RKYp~QA8Yxj8SU=j zA&;6df7LB>8dj^@akI@mfYq<6Is$^K=1&ra+!Ou#czEPbCMg{+V@P2eK?vq|oEUd3 zUIwL7Xn#{NM}=}1g*(%gnwK|fpqHb{x4Z~z(;}}ol5Hq8ME(`h0f4U%!*#o?(g>V6 zyk(Lc36@XROYYfe=VG4{a?nc$;8kT-SLCo~C?ybl2^UvIP&tM9?%g5!E0-qASHI0@ z=9T)3d%E1rKMe6fTqe9$_nrT?xo@cAS`R_ca-|`^1}$irIutb85$RY%xkxm&_+nX} zqii~T*y2mzIDdZ6_b-Y6-H_fvh4ns-pbSZ~2kZoyt8p|$@e#;fY{ZxfPjT6H^l zakuHmxIeLB!d<2xO}Mdps17h#$EB>L8-|lSJ%Z1Yl7yvs1u1fBN~4m}N8^@Lt}|iB zpbrq?Rb%oQM97(vtpf)RC`(4nXey@jew1};cD3qg1UWFAfS-kZHCsbj z`Ox#ti7C>nnI#x>f0+Zx^)^k}fbXs^MJ?daykk4w^F;G0Y8y_sJuC`2%xJ&&!P#0Z zSrbhxD!QbuK0sK)zmJX0X1${4y;=|--%mt!;JBFnaFu%iZJmFlp%GfuQairTo6N6E zsp?vi|3nX#wGp+0$5eG8PC&ze&(eu0Lyj5nlpMR`JSi^2^m;&H@N;CgMJW;D4V+uvV7b zUgXKY-G`>iND%y5pR{)qJT50)U+CF&B2BQ_rZw2%Cdn(@%YM~QZnK!T$$nvi|9FcC z@sPW`Th&O)^_BQiFZtX!kA$8t8NBxQPp#j@`Rc^C-JMd?;7O|rMo54-q)pi&BvXWd z|FPL0_TW#v%HdkL^ic&Uh{vnSOEocnplg7)#pFqHnb-Q>0)x;a=5i=-Z6-@b@v*UM zV$M2|fl}Xo1`T=|HCl@|QsxnyjL4=)y^#udeh5 zLE6`3b*R|f+_tH7SrP2J^)H>)Ae$p_ZZ*d53@4bW$TC+*m0D*<;l4!9$!x?m2bQPkBMp*pH^{n*26h%E8p|ZUSp;@jUVQvhL%{P z^G1Lt9Y1JnY6_h;(az}eO(5P>v82s3{uo)hiGrcKGZri7A|oS#bW^x}$7yoI@Av9o9v>Z@4)?SsAkzk%`N+y&**2_2b76uZ69UGm|7_^QVGb?H+$J@h(Va zo6UBl*}&|R%V4cqN;!Sz49H&@9R3N^f**L%f*D15`N@n)2(>^deehKdIdy_`kRE2DR~wj$3t?*UV>A5rBwb(mDALKC;ToqZ~F%OB3vSp&Wax+h_1IUI~-FvKGKfjsP9$5eNW9Ysfq3>=^>h~G8waM+Iwr+Z%{6~}hbxOt+&Zspp_t>i$s>DC5Xv}erza*&W`yRVA4%1dSP6BkyVT7AQ%-E79JbSm^{=1 z73JW#(!Y8}F_=T0^{Y^@iTl3>-u%?jR0?gNt98G*6ETnWRvP(HQc&Jj+s})fk2`_$eprFQ~z~>h>8w!xq zxnFoJ55QxG0OrflB)EgehU}24(x595+&iQybca;s+aXm6;CoWXKotewfde4kUJp>) z-pb0!$pPx!mD>dX@gEx-1EB^WGyyxgs=14U^`j3p1tw!li*Dr~FBM7{u0A>F+m_o? zN1RIugekn8we_`-%jMw*@~~JkPYM#*A(!vK5#%*ygONFV_CdM3?cKZK{;79$b%WLy z(f+4`=NH>QYPO~*#l*z{Cr|*V;6TV))Pj*N<$YT>Lp!Vz5S6lI9--T>s-QMG_8 z^76*Azk@1?&a|61Z*CD30Ze)E;>EjDR2fN075`-?KtVin_w+1*cs0rS`TK)-85@5d zbPH|S&arW{nPh|=Wo@i2fI5bTdODrH)vlO5wY=;l?FDKRbpK#67@cp0OX*4%Kw={% zCRXt1x6h9h>d{0TZf13ExP>Hg>eMN~#r*X1*T|O*2?<#~|B)i3F%?`h3CN1wuKn3C z>?@RR>eS?9x$lDA_3KZOo>Xwl=@~i+#JDHobrJHYOY3!!A^;V1UXzrPssIXjz$gIv z$7_D%2QYq0N($H|sus{=QVD3~o}Qkep-0&p-@kvCG{yDYbslzhcIGeE>wf~k1ujI- zSab3UYal;S9`_(EAt9Ha@935EL}tHdT#K}*=HqX@iKMgU3h%Fy-Tr7zsj~SCTzj` zh$SX9ZslM1V;0B1e#1|-Y1a+|;D*o54|@hH6RgnGc{dZ2I6`AXL&=8H_NYse5!R-p ztiosROZ7HuTD=uO#}4xVlo3O2=${g%oCZ&=;Ty1K(gGm7?qm(I=NLNS*BK2<^Lfrv|Qh*5X_| zn~czYo}O|51NZ%L_Wbz{&i3agSk1>8L3IQu3F6}B4$)iGKp(w#*<{N=f)DZY(^}?dCEp4FiAEJNQc@+}S~qax!utCtxXZ^xMDj{7Zlcz#Ybt#_WpRQ2?d>=K6Qas? z_k|Ri%4w7Rd^^IbFZ!0hSsD8vG4hI|KYlG1gO>xvF8W7|^1>$A?%JPWy&c2-PhP)% z?J!vwUAFsv2ieaap5}IAftCZqHiATQitDw?IMEP)hVty#0>smE@$D&1&rD)VrWD9o zAfX@#$lYO9ITBpM!fpdaqw`yc2z5!(&U(fWe>1|%&26qKkS#1Cf`YV)pFBAPSV)2i z{M7mLcV9U6S?-zk8Mge4pJx0CA`Jt?cf-ElW@@hFJE*0}%E-7Zj5XIsiIu8VNp zweWkI!!XBK|JA!>;55`X7dsn}JHLT2*l?y51fjzkbnTa!uRs3jsqf9qc`KL91{T6%(uUN4(Mzj zEjGgPZnrhsH;*(_WP>$9CYui42JhoNX~fTURd86XUHx}3nm!s~@nhfLo}%MG z7X)vyH^TUHQh62GQmIu|rN|rzBcj6t@D+fsF*8g2tyKEnx*<)tefgfj67aP6{$61V zAU7DyTf<-a06Z!X69{)DB_t)m#-|Pg)X&rJFz{aP{XyMk%Vm8LMJ?oc`xv+`9SMgs z01kg)yCN57y5?;MTrwgksH)pw9C0h+$-R581^dAys`Q%Bs8Ngm%TnRPQ|D*CDi5AVgLdc01ytWA8>D!5&~rM007HRo;t-Rs+`3MYWJqib@C!D zNM4gqLB-0{6c{n4MU;n-DyALiyUUex=d?Pf+yNW}Rtqm1jsk1&RJ%I@0kU8Ddrx&T zP{2g(ASvx1fDZ*8GA(FbE5tAIiqEVyfO#wT0|;~Cuqe7alt%~%CT@Pnysk+9V2P^Q zT!xDB&nhp?{=8XvV^WG9W_fGzw~V-l_v>%3lSB205!-L%KSUbsL@onkZg_lEK z0n7}^l@hCM@2Cs47lj;+UE<`z=UtaLN^_Zg=)!tp!!he|u^vrz_(9HOTKc1`S~c>8 z4I}lc!?^v2&-q2}SyQ$h_H&zKRV$Dym2#91em)9yKr6rQV*$xpe~rHux#mIZuBKfE zOYed25>pR4x{)@^!Esqm&p@7`6s+`%-i`BphuLL);J+1afJjDBp)~sSY~Js?teOK!d8U5f$)qe_XfA+dNT&nZ_) zg1~ztM{}gT%Ewmt2&4H0luBd{66**^9G!7=<7bCXylY>viDPY}Y*n;7q_KNO`aJf4 znnw1Oe(FzXDKo+Ue*MIqI<86ICMZG zP{{Z3C~?bXEqdpO;B=qh#>x7LVP9`aQmGse1n=>y&lMFCi*S-}uR& z+LhZz7w;kM)XuG~7E4oNF3CBdsY5Zpt$YCLziR4cW{%_fHw_)b;t!a7@hs&0Xq2Xs zctf*4pHa-6^VOBS+Ku)3~t4k zUy=+tCnpOfd4Fx;kBbLz6Gf$Ly9WSJEyNo-{W6^=#1qtiymlPfpR( z0?NOtJ;-ynmnIvfaqPWg-X$kbLMt;I=QPu9e~P+t7_o?{QtTLrtmJb>K3rFrm}>Ui zbWW{Ec+7f8tJjG7Ktj7>j*YA75f^-bWNXIAnO38L$@wMWH3+>&#sn8UMnkS^yD^qS z%xy1NvC`{MdOJ6X0DH{_76ZyWW2zJ(1TR*Ry#E%codJ~Ff>4glfwb^ay=De@Cr0G~ z6}J;wNYdO7zSwdmi>&Lm<^Q~4lOO$eqmiN6Q-iB=zYJq`j~t7SyxRfPm**v+D_z-8 zAYX#J=!eE&ow_%Ony!vgYj@8DTSH07R$E!7S`_$jw{YT@) zjrC&7avgzwSJ|B0sW|5v@}T9fj%DWhS}w@_&6xUKt+{u|e{&t9`2Q>ZRC9na{??VV z4cdXT`+)8ySn=N+;(t%{{Qu&eK%iD12x5Sy15m_sEIpX3D;srzzabznTOI#gWZ?j-s%FB7r}*21d?GOhLtfZdQ8R` zQ@dZ*ZE8N(Lm-w?RlIjpQ5?bc4*?_otv*Urh?BA~$Km(T@O zvyK>sklfPUAelsu?>1eg;I>AOll%ANl?{3zT)k z6-VrII1P3>*3sD+n=Jq1DJM71ygajJb#)blp76f$g>&4JT9R^rT4EG%^Bv30W=vh6 z{{Y#tKq{gMs15`^g6eqrR={`()XU2V8)_cfq{fXJ5H)S zZD!A}Qu@A6Suk{N?gKo`7=RU_lV84k0g}SSU6SJ_R1*K5fFF<>Pk0fJ_q!SYp!Ho)y=s=osdwov`WvKjU>ZFj0ye{R&j6X2K)k7LN0=A0 zfMZu$UeLzs+>R>p$x#7;>|Wr)&!$R>%R&kFE~lvlu7h`46wnI9BFqaPg}M{)QofRw zpk&{?6QE5~w?xyEyLN%7dYrQx+{T9+%)QGO!RsuNvp`z4|Lmj}0?~Yd1**%L{gqI+ z-fDHF%-6?eS&==oaf0YP_zH*h*qEGg>$|S5t~}FxLP<$UX(1(OS!)Jza`IfD8cp zam(IpLD>q+{tD)WcQCKThGH<@k&$;%y@v6@@1oi!c+=N93L2drIA0FxT(g}`*gDDo z9a}w98EAs~a983;c5aY?Ozw|SPS%ephKPw3Lkt|SlmFKb8e>wgu7>yOsfGP^q#}lg zA2=@tBTruiU{EMl#1UuNiaH*YuF$#er%gP2JzYw5hYvE|z%1ZFG}Y>tIU8D{gXhyc z4X`GWsWcjnJ>2s8IY<@pM|$&#GCU4YU>}E5sLkM$upZS1QpITxwE4d@msJr8dPDE} zf8r)&H$GdRK8{s3)GWK%CylPUj?(eZKo58oE0bG2EB%d{-8|XYED>To>YGJeFvJcc zn5gr!oe!(gM=|MSuvpDYmMa{vJ60Alrdg;rs@>h|`7hCxsE^zSZ@Y%l#zR)g4NkAG zA}tVCoLcpM2ET1Tpx1$%8TJ3&Niy)Pl@a$59vCb%)5Hq<5x;&5G->ctR zy?fm(9xD-Lf)>|$W;eXF7qC~Ki-)fId|plQ7B9`>VX8%cBnihc?W>3iIR4xtVcO}_ zt+P$W8jT)#`cE#gkw#ZXT83o$AyMelqg%2k^iy}YMe|Lpr%}iLd~?LHm-ft1;VaR{ zVkH)d$Ym~YuIK6v!XSu=l+UYQANP2T_89Xi5?8Ch;@Ewyc_9BLaj8kDrJ})W^Y50j z$%1VPL%u}`=ZC>VqU0PFGvn3kG#OsGA$-5w_e4eSd+6m?1=Q#CW4FmJVmTFpkO>dn z9O{cRhy|suootvQ6yb-*krHW~c2w#u8|#gC|gk85OovYXons;Y79) z`S%$2+s^mzp&NJ^F2%tdJme5IZqAwMaRGL2B0-ZtR*)Q{g$;?^&=<`cw)xIk9U(Vs zQwMmgP^kJGH~5ymakjkPbwy@mx9d?LWBM8;CrPuY2-|>`v-QtaXBJ}-C1hM?BbEzv zDR;7I*tdK8)!k%e(L<7hzDr#0TBqnto1AUqq8M#YfS$;yRwii9UuB%*V zi#bSXBEi1tk?;fr7c7iTqtM|Hkb>n*|5o*{quuB)!Kd?)*gn7&!b>#$nx8r$g%PCb z9(41Hfik8s6fT+WV-N%4DO+yZH zCrt8T6x$x>N`Du%+aB3?*k0Ca6nR~0X{{3iBvhXU2dTwYPm`ZNFK7R16YGh+GkTPfP3>r?D3M-#zJ z-?+QZhi_qYTRCm7=KFk89N<9M?k=3*>ur<;r;f~i( zhbw3kgsem!k*HN@c393uYc$gIL^)~A6gF-aVssB`drU&Bm!H5kXjo*z99h0Aax%5- z$t!PIGnN^4G^utX=5Z(PL5lm0Hs856PbdXKJof)AeB28v8O92Rkf%m~TZZ&LNc*4Ne=|N9}7} z)L(*2=^A5*VNq9m#0@t;u78a{oKq4%u!@NCs@wdw`9!sr6+ieome`jsGd0Nwf_pAa zW<$kCa}jeflERG@75I{?5jt&8#tx9}&e%q}<%ve7_o<{vk^k?oNuLjfBWBzw_qKN8kjhZ3I-Ii)( zdhzcAhj083Jzx0SMir@PLoFEDFuZ(&sQBtnIxm{Vv8pCi#`Fkjwg) zZA^1R%k!RLuZW;_d*juk1JaqzZ(N%B9`hOKWFHr)g1HSjV0l=0aVIkSKGmntQncH*T}mSaD0jmK+}8mn4ioRZ73?olpUf{tW>I7%H|S}@l@>${VlNJ< zw|y>a*gP#an4lPv!9n3n)IqU?92Y6PSl(2_wB(U^AvZr~uI|L+fjG+d6hBSl^)SGA zGqGkK5hVnRHHFHX0r~`0->VKRrVe_e8nm;l@Ys^Zdu=*y^ww64DyXArmb!n%{e(Mo z(Bjqr*5kaGGb4cq)0@CR^c!RPDt^YTOg~q2BC)lcJT`lm3bp@c8Mbab(oZ9)u>Z`)-VvOU4gd7sf7Lzr{U=ecYxB ze|q;HtIDp%CFDbLLY%5cB;oTydLl_nQrde3^EhHseQSHwzOr-$AmiI7rftD1l(0o7dJ`2mti!s+JYZD%xl>SJ(?kgC)##7EQ!BYwT zWc)KI4z>$Husy@dPBeib$8V8JFcAEx4l|JnBM=bKrqmdcNB-g&;toc&0pz!SvPi?= zsXjyD8{b{A4+HWUV>xFcEW=u{_V8Fnk>fI<+lXgZU{meuuH}zj^JL~=~_Oi#y zwbig6WCoONja=#AkmTM)q8@YEczo|f&C4qfIvCtbKF~?MfIC?Io_LuJOqyvc|l9R|#z5LP_i=p(# zprHA$98@Hx3OFBg0snY;ON(=FOUH{!OIPab{9uHH+P&2`8Qag#&*v&lL>^B&TUuHk zZffs#x-H>}RZF$gl9F^+eOz}Af8QLcsi~P-TBfEi&w0bBBa(x~u4C-?{}zbc#fsc* z^R~`SOuRF6ML|VE`S|$E&CR*r)I3TZTEUAw-eo-Bxt}x#xx5MBp!xf7dTOiNM;|=*d`tQa>xhyL zRF{%Y)FAKseD8Y`?`xCNrgPa#Q}4%HJ9%u|82hLDtLLj$sOqWI=sY`ZCFw zRzztKpVs@rR&y(>G}jN#&NnTd4=rcmHjlTxBHKM!af4x>P7)yYz}g10Mr+BSwI58W z>O38^LJtI--#sts_fAYqjCx&Hnq+uhpFodKQa1%3*|J)nA6lhAhwNDWnXkHicMz&- zYbi-u?}lxXg2)(Q#hOnrff~CjvCo=1KQ9lypPrEs85~+8Lw-iwQif*{b{h`d-F4dr3j7~^z7uJESUTYs5O`W~WnyLZz8sfw7}(l4>m_AnX1?+st*WnA z*U?dO-hFMf?0KU#&l`Jp9h>pE$qHR(#Tb8leDwA8-AQ*pPFZ=}w()+@^f+B|vZMz6 z2q9X|l}q&9F+53R)sYM-c7AlwX$f#MAvs)V;`-J$oIi|Yf4g+zb<-7s1&x9bYm^ae zuXmr?EHwa?@fd?YP53umW?Wp{-w$0_N+@W@N8T(Nh-apin*Dowd#+pYs)(V-60I#Q z)}Zg69{osZrSzjht3)feJ)x{EYMPpIg4COH!#`q$agefi2THxJ3M)-UHE^NY9R8!U?VCmaBo7JgtI|BHu_o95wi9?}oa++Ji#9-sYf0 z(7f{Bh}xUTmD~N~?%pUA=nFlj?$xNQYCPjJCBSrSg}-ng&5@P8NwQ){Mtm>e#Kdnf z{_R&1gxKXgoAk-l%WHW8nukq8MUowFmC1KbPbp^FY`Z(m~b6=Dy$NH?YBc! zwZVdlhCJ+4Ld*YR`o#U8qcfnF`6i?3T54)#`qR2xHOWNzN*Oi1pIolqD~5=`k|!i4 zdPn>FUqSZ^OL;sn|JWm&SzFgIc%4AL%Iu}Hf^vpma}szl%W;~C9-x=mypOgW@ZXj| zBzF?Grs}mOTC~y7(C9lnJfxajHzw?#V@THgIFFtld)xlk?qs<+Kf`N&l=S_3W+odb?Z*Lke-mo+cB&6{+Y__*T$ zD%zK|DAQ31aCv^ZIhx_g1YwE=FGUgclb3-j@7B=0rNiu7-7ls z5dA>(ys7nmsNLAuXt$5KySpQO+Lc;_&(ayQYoJ~EqgK9q^Y!TH2=H^>B_l>`ZRH*Z zQg3*VUAXeKimB=89s@#J&&OrXf|v;*9pj|(6YuATOm9=Ni*IaV_7wgYjpV#Bu#1*J zP`7#N&v*=Z@Y~~x={(x3-${RHNB3HNhQp4Y*Ef>wueaNP7j63Wt1Ysly1E*O)!xS5 zq4HN_iP91tC4}2+2&5h#PN1zV;&*sD9^+m|hM>&TWRAQCf8#d5@ddz}eHqZb3=%JITbW-6kTByyQ9;M9bY4^W99XJV>hW2t)=Hk%*6o>5||dy0X$wkPh!?fk(kl}iI zdg{b6Jf6H!$+5ME*CK`QP0h^*5+xC~KC25KsgiANZLv0APUt*M>16W$j(E<0TXHi! zt%AH;YqMh9AS);5_bwXn(u(5E)4PQgXac={Ruap$4@=8M+6iC(>)N+mig*qZ&fm+v zKm%m}3zQk5LO`^Fl4e4{K#XSN;5eVmfc}M=akv2KRe+zrPl+D%0YmE5r}vCXzJ)&m zRLQ>M;^ASP4Zr2u^-_lE>%meI^dU*QddVGp=MT<#pImacUM%+Q0%>=^uO{{P&lld% z(L^0DNMqbek!a=jKQHN0O(r#8;aLM0^?0w)k`eR)c~s=N2^BI*o8eJWP(a`C_W4TZ zc`GjfiHU&$>_%`Ui%4EUXTK9pKVw? z$8lpemzo9Sp@#X^vYGQInT0^b?{^)6O;i5(0?D}K{(TXwI$(bcF%N~PO+<44U?iCc z46)#(|BDA9y^_7Ol0C=5w*)hhUY9_)+BJ#vBGJ^)NY2Q}aBmxe&CAQ9p{4DIc>XA= zAgmZ*C?r2nERJMmWo2byVWDadd(=%)6ocdFXE%)hrXsGQZp7_mt{{zu_g?w^P~HdZ z^~s6AqKX0YK8C^~N!;n)>FMbxVzvv}cPP4hhD#D~>Y~6c)m23m#(JKXo}QkLjyTPk zZ;(1=qg+pxg(m(|y`KdJo<{iR{=n(p7h@FP)QD){pT&qi7eJho7$VA9xq;_7<2k)Xlp0@Gtal_@9J1F1`KZ&e+%uo)eM;_~n)(Ko|MlN*pq*YFMR4f} z#L#ns`6%`>25^hLk;0>nC?;u%;A~6)77y*GmlX#dG@0>$^x5Ob_jexpY()QQPGE>A zGG+1!{7UA)&j;|8U`D@E*hePfmw#=#ZK=FDrin zx0F@Y6g6a)dh-P_o0z^QBp4O(Y=O$U4?XE?X=s}r6F2-_bS|jB8JWF|*pI2NYI18f zG4#>{W8~Z|m9|IygzcJ#H0zTJm-s@M?LsX?-sGwZGiFRMSLh;kj|;{k&!I z5Q&{rb)2`wH61=Y95}tu>Xp5@Q;I!5%BoE-80TyTHs|qNiqP!LNH`X11cSGT*BvYhIFHik!pBy^>`+KBrRj?Mf@&G0n#+v;n(} zBWLf4*CxT?a#3dPTssW!<*QRRJEA{d`8?c+c<;CnaRuO>bg&D2H9G6E+HMJTO z^H?$=E-9-iQb;<)dAa~n-xwPrEwOYK0`WwMc>dLz1DS#zB3FNXxTz`LNqh zDpW-kYvr9+s_NPE)A12yM#AF*tB#Pe`iuzQ`Ml2t_J@5h=-&m^Wd7god$L4FO`d$- ziIfA2KYur!o!zZ8Yt4%Y?iE>B9Gs*TJ)F!atuzUFIh!AEQBGyVb2nd@9kJ>#xQydHiR7t&yaXX9`c0rX`*+V5a6D~+;{fTm7?&ib>t&e@u;8&^m|kmPa8 zdHdYP)=VGybAhugYwdCmHOZ8=3-j%P4QA~ zZ@S1=*WBXKyQb&L(6A?x&3|n7Wxd;b$u8X)o9_iP3*X0_C!$nPLV-M0tr70 z*;A5BvHV_2BE-wb(Of3&j8}|eKgG+{Pdowba?qbq7-p)IaX;D2Etu=du+-0L3;Aix zYj!o<9A;{N;bnG&%4=4v<-8btZCzp*e`R5`)amW{tL|~a`FX2gRPkGW6$=Zq$k`<{ zL+DOLR7OGjtUlxM=AhO4YIkwbL#Df%6xxahy)$7Yx&OV}Hs0ZV+kesO3LTp`mvxsK z^?o!b<^TFs#r@E5YvcK90!j&2HL$cL@O+NF73rnol)Kl{o*f|K?dGjL4wBfFYIWJl zZ*?`Ww$7}{3@Dt^JlQ$|OF%TGPDU{7kpe<>sa<=5tT=1l@kb`mWo6u)ufrCAwGTzk5t%k$pJ&qI)ps{HK+`rLL6)9TkW1>B{qm|8|-CojBRN-KW-iEo&!MBb%yl+o0a z6x9MR%3CkDihwG0!M@;0G)@^;i3pBu9OhUN4q?yw>O>iXlA`0O16Uq2CoR8OcH2J4IXhI{cO~7ekCvEf=HSOwUW+UO$n?rV?0UQyXJBr%xJ5 zai3O5sasqhcAnir7|~)TZLb<0E_`wZ-MO___&J2Ttu}zR=i;b`g`?-rs1CiLckUon z(5k5l%Ns#(TYia5gcc^#`E>0yCN9>@FX-oknE~accWT8tvBVrm$$+1)OMY}tT_@6b zr%~;^fvO$?trH!)DR#0WFM1GGQXFjt=Onu$IezX12)1mNJtCn_Y-5Js7BL3Q_MJe$ zr^utQ>jr)A&iC|`dR>S}L;hR1QncS^O{VbRzMK6W4JeK`q~mAUUF`I%@QeK8^s(3e#Ph31W($GLYEWZeTUvR= zz8h7LMO1az=Hqd9CvvD9LL@FZ^CHBYNP{rh`g_BKisp(SKaWpTl!$Qj?ZZaF-rV!e z!OUj>_(&}INg?koY1C+rut>$##}^1`xIifF?RS1vf`5A7NmIz8g)3;@QqIEJa|=H- z){dqY)k$hSk0LOg^HeQuTPj*8%-CqQ(tISoIO6{(FkSkf*x!_#mU2Q+_t4Y3v*%!Y zTQap2dKOr8-A$N?w6f2_(lUyrT-k?Wt(+J<${f^CWjP~274(yaw#rg93q7=?i28xK z)y2;#NoHSz;NoWjR;(b$=aq@xoN6aji0bt)No>#8Pi+nn4KyGZBg*7-Nb|B#mtA|H zuH(&r52Fh}7_DkpbAP@+jPyPmkfI%69MKX!--D1scaT?}YfVPKPNSkmQcAbFxQWC} zE{|(|`qGK+c*I!u7(-|Q8AOfYY%QA|b9f^4z7JYyzJ=xnCR~rSC?PYj{;eI`@IhB3 z2W4->{!L3xzw1_h$nZFOg3Q6axjO2+qeFGG-vcuu9g8=Te%_wW9N#lRPk6~rK-dBT z;|`HKkY~<-G=!I8t@jZp*p#(NRfhPGh}fIAG-B1I*~GsA5oJ$q##%vsSUs+3aT##D z4_5#ma@5Eu*<9`>75+m&X)- zPvNVW&0&w_$!bnvR5yCkP``Q9A?4GVd9+b#x=-^~gyQZ&+IB)h0lqxd{6Vv5)z|^Q|`wC zxzi=>E2JoICtZL9ec-H_VXy!3RguMm9-?$`I9&gkXH5#K**q~8;cWPCA`{7w|#&sj{ z_JGGospa;BpX&SOY||K=8k}+w(jS)_FL;5os^_c}UH9nty{Tz~UaK9F`htM9mgVYJ z{{A(yLF@ed)U;iwz3E?b$CI$I8QvNtMQXHGciya_;=;n4JmW;Zjt7+!)!l>AQRyDi?l~_#BS!my1dK7jaV=Z;jG82NY zzghOXU9ue^j5PM&n_oX)fQRKs{fA#D^X70)7nec78 zji#_@PUGfOhct>iJf89{-z53nN~Msz_DeBZaa`~c*Ixe%5E)$+yWf_gzrep2C}i_e z`h55|pyPQ!0)0U@|6JSG{Aav>!7i1Re@*+ZYrg;3S`>~;+&@>j^ZsLqtCyiI0BAd4 zewg;{%oYZq$Z<{6Og#*!2e6>ayC1=nffoF zE+xYLD9A$%^b@)|43GhGMS@ANhT-K!~{`~nC85wAX z6sZdn5fSC*=NGHF1@8grkPAmpgo_Oapq7NZp^w!TGh!Ce@Y^fKDcr@SrL{vsTbXGe z$VpsZ6hxg!=pA&TE4*hi$w}H88s}@|c|k1qFJhmjc4ViV&dL#J?3y zuzlUeMsJB3yN`mZ3i-h4=;(NLeXX&8%i{9#ND+s* zaiA2|Y~08TOxky=9d1 z73!=@PD$BIoD6x-Y8q5x_Qt!;LW8+e(&6deQQo2J!zmj-h3t8MKnzD4Zk7TqXt7+H zGpfEG)bnu$2M34e;xz7%^O;J&?XlTPcoCb*H^Ghr&($t3j2t;y0A~tuU|hBGk(N>ferrq zl}bBR&^1O<%v^LglY&9|wLZdGfP5@*=t-3lGX>h8RXH@Pb2FWy+($w-RPz4U$rL#; z2BJ}ytE*&pT^!r~Z?N=NTG>@4)Wm8SV`SWXg{D+8vynG+v)-!MU|(>;~KV>DRObelv`z zKb>=~{GfCA=Ih&Bs*Gb7!$C;A6cOR@y5vNf5wU@LR2hd@uvLHf=BY6_whSxRX5B>^ zk*u8^azpC6s?zQrTJ`JoUkZMIYY~=R{Oc>cd;?!Zy^hQN_py7_!!zIgi7MX}$gIXQ zh7oafqlOrRn)NG64-rX!BMW0x6JQ$gEl)(Sg3R0&aT)IQ5`7w3r@vq3P#VLp97e2D zaHu)bg2H@*!^~muxIMB_(v{(;$p~X?aN19Nxr}z{=6!X-ysSXqY4iw#)VV1ycksES zUEfxkbIEm_E1(RyChpn7IxMLZnwaJ{G|XRz=<$klI^z_%IY=y;@oCO(_5Y&C>OeD$ zF^f$N4@d1WvR-UlnmS$R9a%#cU87)9dI2ilh!nyQx#mp99gEwUhGBKlxrME zp#l$-A0EqboX3838wK`&7i=W((HayF^Z3Jct2@yC%v#&MEXt$Pj|QmaMKGr{li4{Y zJ~lf)#iQZGVT)MuLBzLBGBHA#4Hjv%$|LKBLvdlq2RGi2qCrEh4cR&M?fL2f7z7oJ z{p^VCsShqho>&=8%S}^ntbH4C#6|jY48PcYkyEVbf0KjM_;rVFUySJUD_7h0IBkw- z;t7BFtT3T>>QMw)A)z`zV!4ig@6$sSB>yMY1_|(q=NJj8Xc9M8#Ve@^E-{HtpOO-m zh}lIX{JQt$c7ga(hB>U4Ns|pYdGz1K%0DIc^hnCzCLB_og<|L=p{fo}aLM_+tVG^S zUWZYIN7r#h1&3f4HUByHk7+t3y$NCtd_?;QT4Dt{Nk>BVLUi8&=7a*c~0;O}~cWOZX6b_>P1RCA)}@IX{-brv#(w^npLZ z=EnLgZEQ@G?k%W*5X(euB6XVZ4mnt*y;2%^@}ut7BuR)vmrjcK;F+FEzjFX86{HMb z&{ApucLM9&meJG|Ae>{L{YGlgK9T+TwwVMT3$R%-mxwzH{h0Zl0Uo{I={x16Z%%!= zAs?(*FovCU#4IWesJ+t(;|r+R9^SbX$J<}840uhv*$h8>Bm>#{n_V%=uH)!U!9&~Q zk?lBc$9@@N!ZfcWI}^lqoJvJxO)Y3vI%qebIWcx~X(8_5dzUW6^#qv_Hk zKvue|qC;O~19TU{kEi0X#3g(Hxok{GLIT~*j!bvkrx%uq_1k;AyZFu_D=TXnE-(;) zj5o$c)=p_u=lyB5xOREn{EM0zA19|c%{dzv*QN%g709OLZo6_+xY7F=TBus8aqovN zoRpd>@9_MJqJ{N^@buju8Xk`BL0v&0sjrPsNSF}dm-X#6C198sEKtsmqISz!IX?$q zkoE$l#IozodyQYVo}SIIsk{CkOcj}w5y@M?hasC7N4==(H0-zZ)AYJ8ni2)VQRlEbMxKJvb3SL1 zF?Zs4OQk>n=pxwo0hd@W>`RwMBd>03Y%D4Yi!u)h2ndMU#NcOSWL%h^FUsnSgwpkv z8}uShUrYN+0nx34mtlRK^}XG~sV1dDM7QUSQF6w0h-?HA;c@CV<}&;pomhqZi~ z@#Gnw8%0=t;k8k-Ft!vX*kG-DD@zf^Q~PjlrUOhY&KzTZxwufTQ{yp)lX%RAtj5P6 zQtk3DJ@o#CVh$~K8-bqe-?X%vtE#ZAhNrHKdXyd{4EUj>LT=br*=c}s$r$jC>s~mj zWk3MIi*aCA$bk```n%8z3b;WLCYhDC9%?-;fZsk|%YvnOxwwAu3xf9}Wk-O33efkL zGbdgy)a%~&d->2KA1RI_On@NWKRBr8(tTSknM~}KImtwoUs#CTFX|#DeEX?evf&#f zF2(>B&;eD;pI&5R!KhIKdM~LTLUF0%Dubn?PctI5v(CqhO=+CwD(R++eK(ULI1JdCD&&q|nV98&#&0g%K)pyXxnMfS#ph(|na+=2v|U z$X7`CY=0;{7zy9CZ2tOo((-T&EFmBTb9EToQzF&%hTD05{%LG%EPS_#Mf_{adD#^J zWW71vG9xNRH8I4g1w};?kpz5h_Q#8$!QM5CnG$v!u5-YW?cF(rdKduUD+mJwyow)u zjZIBWjgG%u-+#`t$&J8xhgHP3Bv237$h)u!^ec$znYx8yg!p zcXfR|!6uFP1t9e6*U`|ZAbux!KQuBDGiq|0YG`RWR9#t9!^6QLX8haE_UX$KMEaA^ z+)&%t*jPsgjCGXKReQUrMy39yvaYrD2nnZu51{V&85*jTAw0YT#NNcjMA!wqc4|bD z>-6uA&Ko_bd0Z|oAGqwn;ECzDMpH326SX z(CffkKi%Dt4*ZQdfOx?a6s6Zq?9X|Ahms!qq8SBx3gbOUXL$rk*2_(MDdy(pLlPhV zAk@<;Zf4{RZSh8+Fk(2X|;MS zQ8B-vtjO#ZFKNh*mZ$3d=q=p3AJeIxQ&W?`j46mrew_{oqWQExefp%T+Djydczkq3 zy_n5qe6+U*a@_w4z;s>=O zkooWcT32iw96Q)H!)9BtljCE_k~%?kDFO~oPW$V_xwx6+v$L~5e;6*~VHQ(?oV=It{~jq_U}2+3!tI9|Ysly_B`qs?5yHapbWD zc>|Z1TxN)ly{`ZpNaIxL`9*Ow2B$UYYeviRIfhuD|J?E*hGVj9PP|nnN~y`(+M0!) zK2urK&CSflCLixt*qtStJR0>bms?~IpZHpw_F2CRJuERR-3C>V_HNu#$8M5ZgK=c} zn|=~uQW6rHpt&9d!CGZFi*R?t3erUdys`>g6aYIUbJ4hEO379fc#H;MfL8 z1?`mxxzEa(>OE$_!`3 zgQz{pmpBZO3u(7_K;DRVnjf**&X^}Fwm;|JUOU{ zPAwLU(*FhQ@)7hoPw;l(qd!~M!eEM0u)~R~Y(G*9qMTTzVM9-G6QoF`N~a@s3qt@g zS_K~vM0+@{F@>rAj`-OBUUX(#4Vx-__U+;YlNU8L8KyS^0z$M9G3OZix`Bm-g^o_f z6m_g|!Me%0bX<*;j8fzzS}sKsgcRcTaR!?cWH*NCO!IYs z{&i@duDXr`Om3!t_wD6J91gSV>0(V8=Y-FcH55pUu!>-@>>gg+zY}7?i!r&Iw%@m$ zICyxBBU2+>9hrv@Wb1a`)5O_6pR!WZQwI^_g`mvveg1Ki!6B%@EKe8oz!KmEilwlO z>v~Pq+cF{QAIu8PNPtWMYoJGKDxyIEGzqIh;xUvCD;bfOVN||Tzo9+0mN`_yPa=M& zk_LYk#Nb5}DgS=mzh41c%T`Y;XmQ3GtyO@c$S8ReJCnZHHVCH%$#mQ(xYx0`f*WU_#kuDw@9~-luV|(Y9IP1^OaOpRTpr68X1uc zp|WrRO{Ad^5s&+7psQNP1pARrA8|dmOZ9`zIJvo83Ogkemv29cAW$}te-%L`RE&X*!MD#8!m;v_| zF;N9hWJxQE%?eVtPxBTlvW>YHOibUnF{|hX)cxvIuNCU$etc^uRT=*3a~*OUCj)^L zVXro=$5t7|feHR{OOy)5Wjl|PZE@S$0uObEG zA>3#ywvij@fo0rlQan$j+~eL2*1EsXK>q~qGX&y~8T&iMJY7B{$Qx->x7 z#PKsYA0z(sH5~VQ>L_-K?-cqIOuiCB6gd;ffBKgq3^?GDf&dIVkvew7yQbS}D8^S1 zD)N;)7K(+oi*zm%3#aA7V7$FQI{t zmIgy}0GI=8ac*cr0`9qZjJU7%?*P~#_$3GfJ_;7rojl&nyOg##ZFOUP^3gPd??X)~ zZwU=)KI3iv?EXkZr&~*W{faYeCoC-m^?h`I7sbSPUwX;AsHietwsE|Lm{`=KRr10% zn9uBV01l>~lZ$8{lsPQ>m0>@@)ly#WL+=ud{J2JZ z8O8hPnRqJE4b5RHyM(&E{rjA~k)Q-fc~poL|1i}grWMs2s6=9*d`>X=#vc(a`evAc z+wQEfh?P*0@s+P-&Uf`5!oBck!8#HD7J%{QX`Wxh3UK8%;mQ&>=pq0{=F!EEofcg`HL@U4kbSsD~p+1f0SI!f|NYDIwA$ zL8M-M!X#BPu3vlKnT({`@ut+**FQdbJl9G^0sqR+e_492{?3ovJh|Lb(i zoBq4E|7RxnKiVmfTmOM3HgC`)>0TUw0oZ7cSZ+}fmm1K$)xTFSrRIoF2%D;-_7>Q* zBzBn0M2&#h`=6Z*1*!}NsK%FVRDg|&9U}f;)ieuISXx^zH#)PrU{K7IwF7ElQo%!C zpy@on#_0l`@3ee1Y4N5$k_Bj}0h^(I^q!ucy1jcB8ykyVc6oSM6wf>Hx552}9X04fui0ZHPATOfSM)NulCmR&i!qyGO!(hn;S>a+jZ0YHY|95aB$H23f2!n zlck{%DBc0qGlY!b`k2_bwzj6`c+V~OMBmCPe1;kO!8Xk2^e5ctoW4L#ZEbBuMU1*p z;c3Fv%?-l#s0i>NtB%>Ft9PMMHa1&8+Xygk&Kug!Z?mYp){A{5$P6_AG5GiI>G}E& z;8D6R5I30FC>0Rsd-lyX@;>E6@t_^@VX5 zJXx|a%$K;KlllX6#!l0tY?!m{FGq;JXlsw;{v2EYWI|WcRPk z&i1Q~$OCpc0WHhEwdys`l9H0VrVy5>PWC8;HI=bQiNH3ra=h5apnV*Lt&QaDL!1R*>@jis+3$C+WNUlod)Rj$#)Y| zNL$+PE_QD2+s?LtZwqW{QuMOm1{|uV;ofI?f}Wbzh0 zfji;}XIQB8u?CBVA@G>p}UBED&^@Dxy!74t^x|*=$NlDQ0lu` zDVm0dOR=l?^BphJ1TD{@8)m)DvU>={ph%| zZ`4I9Z|#$0)$q$BS=D`k{yhKwGc~VH5&M!nF5~9k4&W2@V*cq?k^DN_`#YE$<`AWX zmH3+)?R1QSv7EJnok|v)K$y}pG2x|qt@aP1SDNH=+IeFUv65sFb*j-Ns7OjY#m}jxojeB6t(@uXzZ+k_YLX@1MhH(j1S| z+eTCxKar0$D&%#0UIZPx)E2)QgTrC|@Jh-(l-ux20P%cPK@H3Y{)4rRl!t_g>cegS zUp?Ky?BJFfjuKB{8O=Pohvp5?(}eq9dqfa%vNlXP$i_NKJejzXumv_Qld7F@E3llU zNWKrN6}j_H(m2`ZCrjaqv}_S8ZpUA^HFCPf&!^fK>#?gNqCaRvTb@`DFlgOEtOv)e z*?;%32Vf{YBy=*YvM~f0muZy?(!c7SV3pqZ@lB!jn@flHGNcRyiA4J#+F9l zFMF|F(;C{_we!3EGO+*D)(AnvcRR|%a5M{^r;f$z zKYDcJHx({@W18+4FkI-#?UO?eTx!Np>g z2REMDB7`0ejLCdMpqe|cDq==61WS`fj2nD06g|BRA*cB*0-~GLseXq;`b+ULZ}#3{ zbOvfQ-)g>afvY*Vni>FtoMY)$ zOvv5uWL=)+iClTFL?^XnNsjQ=*s^7ZAzYOczb5C-aP42G_|Xiefp#@mOd^G(W8ZNY zp~7LSc1nf3BN8Mz9kVVoMi!TrM!Lt=@3=|L*zp|@lYBMCE>ZCGtlNypW5B=Kz|-4y z*BEJpIg}F|RdbLnS;cZ%R@2kr?q&4~Eqtva)*Bp)#$GH^6ol|bO`K}+Jyie~530GKJrh(mgMX=^`8-9KWGalncSJa2h}>UyPMp0);~ zndxsivD3ZxeTBTL>xLN3u<%gd%QbcyvCT6@>1vAKii)Pb-)5#C>OOr>V{~h^yZoI@ z@#f^Tj>tWJ*)7e(6sR!7V((sguT1^q?yEVgo_m`jcJ)@w58Vl`PWemjZ?y5sSG1|3 ze7|O8GG`-k9dFdhJ}16ANIbpCDd6m!cOib~|r5XpC z!YUtgbD}L;iFZ(206$+0W*J@W$>9vRix@3Pht^U5*%$yn=uLC*BY!M6yevpcZ6>@ow2zmB&hNCDkDTzW$@s(2@lj7j% zGD>(gm@qY(S%5dsBPeM3%E(e?au3IXDU>aBr0RY+Q+1lCy_Q_LD_J_b5nby$QsBdO= zbvz;{_xJM0_ILr%4of|(tkzFXeCq3Nl9G~wXM9#+e!dLQQdCt3*L!0u0@kB|NPZzQ zmd*V8jYfT4ox%m65CTsZ9Ii#i!a~;HX6ELIW+)(NxB#}EtFfp7N})Z$S!BQo7Af1` zt+70{Ivk@dV#ui6jZb zrQ^c`ij)XQ=u$zw!;D!(_g`yLUXf6q6eU?$X=&+TGE2iZHGhA}_V5(w2p1IJ$+KR; zUuOC}oQ!6Q=K%qB?>%50FkR22sUWH6z9yw|&~+FW7Z++ex?7~A>_S>vT7AF0x5q(h z|GEXzWTLDufcv6B0D)d>j!EZ#3EuR`lH?gORD4~`%LUJyq5e* zOyu#iXV0{}usRi74uHA!+KEw5&yHq40%ZrlkIKmpg z|M4=uW)3Wf+OnDZ)(+Qu5$r$!KigmO2iA}2WqSeB)=*Xt=XFm|ns9ZtDv5^q?a{ZV zRsKESE+{BKcpZhOpHY{ zXH=Axl>uiPoNSW10)Vk;U|l7kZ(*R4Fb>!*@E?Nt?2sctaf=e8-A1yqGqhH>F!=83 z@^WG#{F)ZD_Y#C5YjdFi0a&PR-@dCbdG*%Pc~ZiMb%L`xQUY*{NtmYm-)mX>;_XeK z_|_e5s*N9brcuef!p+>M?p2OI2Id^F#^?l0=Tp@Qf#v7E#UnKG<;xFVo9ZWT8fkz7 z8r*!R8rN=9xI4IHaMzpbLEYf}hpPM+zN3Hkh^DSC3Ylxonc@FEg&J^7*1+^+WNgex zPfyRvY7R8n{M}urYcu#h1t5At&JN5(?lRlnuWYTYU6V5ob6m7y!3G>!98EMJ-~d09 zA}THYzO4;TR%pmzN-Zmbl0Txz>v~8a`sYKk?}UzF3Z3c%HH)-%9BG*E+i-@ zU$rCjI4f>uh(46B@$r0qN1V?o^Zo3R98Tn ztTAo#+8Sk;iNdMocxkFSq&=|D&pCKK6jOptbG!@|IADfs^jmILD4{kmBMFYP@Lc;b~I+OXVoOXUS$MfCm zH*Xjj7y#XOP3|OK@Ya9UAhSl}CU@;gH)hBhnt=h{U3iBf&vkzCgq+pF3;3(1a=>AL zSF=ooGBmP=b6Eq>Lw-CkjP#vQ%;Bzp=AAy!|D?lCmu52-{yZjY8viXXSfcj<2dOj! za7b{vU?ll1(HF_rc8`Fe)c+gR5CIvS+y66p5i6Jn{FOjiu(S--&NeqRoFB&g=aRFI z?U|paM+UjMxEO9FSJu>g@ZLro9x6Lte*N@zd*bB>zkOrBBzN3DUuu)AeSAP)6O8!L z4<b#XB_kk0A!)ea&z)tGkP=_s-Q2u9)iks1$eZGt`+pz_1_Rny` zV@QVDmQD(nv{<836fFr^n;~uY^|WLE$1nBbf_ZEX(~wy_OfP4-qX0IZG_VeOzW{T9 z*CTWDuKIdwT#-I&WrIzJzuS{ecKj(}qf8i=1fUL(aE{Uv4( zI=!qY(pL%0K+TuVTsy&MWYuO#35T0Yb7z$ukM$Er$0F5=@q7IYL_&VKDA#A{u32h{ zFJ9ykW`h&dP?^P#c!Vntr5P9ShNR8!NRjFr7_`S5;3?iHhCHnSVUG?|VOKUO_+maL z*_novNXR^^@Oaz=!7pLcsG@9QaUcx5myO-2QMenagmnTt*$YJ^vgs4$=^_Cm1<&5b z9jiLHEg@omH|)z8zM}35{9$jchCWKOVU!UTR#48vw~uD&_Xs$D&izi^F@BUcI#CpJ z@k%(v{l~^6qioD6eGSbv7Ee8`ACb?RkRGK^m-)TRwz zfZI~0H6Zx2+CH()KS^31!3oZbqhn*B@|@nn--$Y&o%#7~&Z&pA&p!|SN{EZBl#g6g z>4m@+2^rajN28JE)P1K%B;GIVJ!MZ0sI-^srjur-T}axK-HfYphWwL$B_wcH-DRo6 z4=A|0irX&UEW#Zq)X$ewC#$)|GKFI^=l?m6sh^cSr%S16Z?8|94|x9VR;)H2n8};vpx@Q?Dx$X z+1c4?YmLGe2@G?ZH0M@7X011;{&J-$_t4EproDjt=b#|ci*+X>TgK<3U5n@^=ni#u zWh{4Mg7rAOYA?jNqGpF$L0LH}iu+CN0hHO$b!hFoFtG<{?18!%P03_sS{qOV;qT0F ziMFG!dNw3l5uQvjMz42#rf`-%;VEM;RhNC-!)9E5l0@PxdP0<<9e`UkE8BU|prBet zfwe86*W{n&Wu_rtm+@V;!9f;(vm@0w*O)KMgzU{y zMgJ2)KD*2QCaiFcNcG`Kx&*~=9)pDZNv~Gc&(IW0zKk*%UQ{30Ma%M6?sGb%^>&D= z0@G_>K?=GjT-fVFwG{_u+cw-JZ^syikTo!{c9HJ}@j!i>INPAMNklN$NcS76qH~OE zkNQYrxOV)JT4sisPWEWZV*@Nxu*P$62`pLXe;;IPv-5tgV>cb?{u#cn=x8~j+kJjZ z%`{vV1 zy+6TKuZ}b-^6@|D;Va;OvZC%d*A%3Qv!k{#Dn(S}bFA`CYgRlG&Zlt+wN0zAGq${# zdf$Y1lOkQ9*T4IXO_G~eNG)Dxk?knSr@Pt+pLSihxszwzq}Yniwk|)3a(s;PB8@jH zqk#UNK{i@t&*qJ#?4R4?tJpu{}-~%weE7Wwm6k7 z#%K7LfY4tmD=tF0e){&AgAdGuw($EE}WsY&1p8`35wgOfaFtfU}VTee`j*=q37V{k|c>?~$*s zxPdVl95E~qkoeRNw_6+~uziVgb~;CJ?+M$MONVf$Mm)AHIXT^u`rAX=BjOa#8uxs( zjfG6;NR7ECTf!YDLS-5efhDXxmO`s18Sd$iB9f zR7}Ia7zvHRyE-~n6NH*_%?lM=Pel#=|1uTqA2T&!w}M}h*+=-zCK=s z^f1qqpQ@(W)KfHy3xzTXu!VmQeare8^T(1j-ZK|-h`>(Jnc7uvGyC`*JA|NEydLN7 z5|m0Cc#I=x@$mvYFDt5`kj<&Bc$h8Es4b_K^KJqYt8nY$*+QEM3rYTZ-)^A3;$CBs)zh zHx)$TK>c!U8w^V~QBT5pM2ohQ{Z!aUA#PNyK>|$LqU~d3&XnLQtmY__8zNVY;yVuY zSO*@q|2g)ROh0+1)G6l(@}i$xn*CxLDiY^eyy`VF8-cnE1U!b-PBKQp`gNv>Oe($H zzLY87mb~YDyLB_=yUp`dA)^gfs8$vGKEiMfPjT^HeNcM^U5I`6(?&6!d6x2b(#v0P z*Y0!2q;m$WGkA;S6jgX9;QE9vMv-qgf>uw%}E&2^)7SU8tw4 zO58&2Zp8=XHdQmU0&A9Cv{G%wYQ|XF?a%23SeH{)*E4g_DrLD3{2V%=!qfVWaw)Z( zhfM6Q2??SSH&0pLrMgpDe^MG*H^ySBks}OR#47!m=VEgUP!4O7in-=qp;Nk}eRn~* zWF{APt(|6W6E>wx8X8^(0$%$7BQ54%=GnL48U8aZUep`%3bG23333L_WK0>Fe^Z$D z!`mO$s4)dYFy8eLkB>M^;bt_{>WV&)+q@p3$NrRgOxcbMdLURJs+~(43&D^d?;R>~ z1#eJFrv>4mG_2Qe@V>8YZJoy{nE)qKI)kTux6Ku&eT;Q=H!M86Z^!!Do^!#VISe=g zc9q~hwvHxcPRDgz`qq*DDm`QnJI8VIC0ue{fJ*IfN7I1s>OtF7YVFq<^SIVvd(gS#Q@5$s5biS;=Jghv%M`8{ArZO5h|8(l ziDN6G>qp>wL@s$pNe^?VCVa*NYeC+Grp%>__+YwR%2-79$)3C@wnrx(zhnEsXs!!Is|Vm?3aFjVxEv!E+uqBJzEb_sO_9 zpWKJyYkyZiVnK@2Y=oLkw~WvJbCf-#&!AKTCdTUB#j8k#`)7yw?iJdD)emi;mqE!~ z6m*yp|L(Gpo{oiUcPIbV=m~s*44K6hKw-;IxG^9`w{{K=ww_L{u1;j;zM~=9d`6Tix%ruc)YL-C9h`yBIiRPE@bS_c zs+pR}#&|KnKJEFJPIMzRW}o8Thi&GIu2@IbrPm8X8wiz@BQJrsY-en~@1(QfFRwVj&RxymKg;fAlHhN@2U%&oS9jC^n?sKL zFTB6vU;e=VKR*T_G8og&pFgiNW|2do0F?$?Iqe-}=wGMlw!ml#eP|subMOc-1wpy% z;KWPK;QH+AcY;`}{!8EBf9YefLVzm-Odknr78RvXgGl9|q;X!}nGb|II-$(pDT zhD@eUyMwf_#r_|}j)eIT+fpHjF{2X`Cc;)=lt=dfI}UtBuDna7T9Vv-z?-wRy`63| zGc!}$U?zOqkB1nfZrVV9E|OYh!clJMo@WWLDbZ^MZ`H1}g7xVBV)yJ`f$;}v&V=}8 zItH>DB6DGzFm`@eBJkA@g=e_6!iS2}mr&&NYKJM(h8gYc?ZBtA7U({NIwyHN=E^gt z+*rb!{`RN!PthY%uj$gj@jC%=v8>WbB*@U1UvR;mAG01E%|Ej89J1MdfeLGGqBwkz zVd<`>ICX3oeQ&Iz)2%U*TPK=x0@4){;^J-H!#vkD3Pd;h=f%huqg*xsz@1HtXLgWM zzZsoqwJt3!4GdcRL9LyLh?C^P0@>%kK?CsKW5z+wZf*7P(b2UDq^JYA#z%dS4Agt{ zNL*I7(D6RJlH(OqS*ra+;eBaINe4UT-rimybBImP&e~sz2yl^SEAFQ&{QZSKyVCIIvR1cwjcWjT$if;&-w11L z;UTO!$LNs^PuMYlngA?d99fqXp%hx)F`v~bhOih*_HZNh27s<^-1IZn@07-c2(!M} zPg{ul(XAZE_U1Ugj0g59DTZ8zDoxxZp&%k)I9pVS7pRNi_Xpg5E=NIy;jsO42?>c- zo`pTn;0*&S{2Czn1oZ|Qq<<7P3BPY+K`(R){LT4iSN;zk^S8_M#V_eg$Z1M_dt_*+ zhFZkt?ZuX9&m}JiQi=J??taB!S>}^nRj_utzmzWx7rNO|PnTlsGh7aBR|?JJ@RyIXz2!-tUrLq;NU7zB4&gM*N%ewsT1w z)Tak${ncNxihK{Qn47TC8|iD>QcAKRe`InqTy&xHnV4E-LwEaGR#))C9HiUIBVP0( z6`SEhe@ggW*dA!>mc6hZTiFMkIp9(srk)}1kUzZ=>G8uNtuLSV7O?$+V@TFTVY1NF z(Yc2xng#XcAoICbUQ*`7ExodDCOsu(s{E$)`DhpS{)Yig0>S165ns(%@4GXyuswb2 zJEdGPV!`dG(Odj$GEVv2F9(j0X^q`)HDu}^k25~_>WI(C#1s=9J!ET7;F_4LY0iGh zt-zHU9=<*pn|k_MF&C$60=;!(8EW~iva;4cjW%Ece%Ow~|B)CXew&%yApm_B zZpK8$tHuR$`!oa{gIbmdG!Y1cGsWm6AEBPk*ZPl@nO<>J)zIS5wtpsd4AV28dVq;U)@!&4-%tcSv07TF#GkL?b!?KY71UVDuiBfpdTUccZ^PVH8h5F z@C}>L9tk&0Q&N>ZgsOJ^l9`r|2d3|z6PLO52vcH%6j-)R=9k$ge-c({He`w|Lw^}e&k`Wg5QuG&-wvvZsxu64YB^?b-P~u3K0Lu|iiPmersi6uQ57&K z7Rm|aLq#_!O|U&|;Cg&^4Oyq_ce-~x3fV=;vqJsoi>@lD(rF-C#EmL>6&~ICLieiG zPYI^t6mL}4f5K@KxQvhH{X!YW4)-}OU8#79O&fmPs1z$NWkeA@3XhdUeNPqZOtG|= zvgUdfh9Pk?q-dP3~$@G+5u$AD(4u5^)|30LY|D&RBJ_X>^Nq<3LS zfGpF*W-bSSK59a@^<73MXwW>DO>bRTRpLIoBH?$E6q_j?&n0z5_>cTf6&DVC z547n|3qohw%z8t2q?5VOszXfP%~kc>*Ict6>yU$+RJoTnDYoUIm7*>@r#Fsrof>UO zNq@h!*GbTjct66TS|X|xdo&o8ZtK?67tN%RYkfDbsqvP#Td9rK!a)8r$HCKE$eb#A zCu7SJ`qFB2&v;#U=f6p)|wzR~6$16#x5J2i~BjxohX zWF}FLi14q)$YKhP1Qvrzlx7;zD~^SP`L-frs7YPZ3>2@Qeu&Tgt4slAq{WksBbu5!QAV zsm-AWXKITTix#G`NL|XVCF;`J^02RBiexJ)oH27TnoPLg8GmT!O6ZX#seY3@d6FL6 z6>*n)`JcgejC?$OW{Q#bnper!S%v_|eqC>Cb_%?xrKV%-Cf{|p%=~1AgP9owBs21J zE>%Q&R_jCe>dtqPN&7}#6xNk53$hM^ZuDx;MhD{K#dPi5bdjt232;W?;o%wT;Z#f$ zcZ}povxj75WJJ1sl+w0+5VsJ%_pIH%VX=$5GHS79A0ccX9pnc~dY^qW29_#(Z-Xzm zU3h~hf~YfChLU+V14Xi0LhlfC`$5f(QY|Ol zR<|36sHsvzHc2P-PD&MZC^t#UYrpYHaS=2`*5t#VH|r#1;Ls-O@pT%9OI@V%u0you zbYi&Q5O;bL0e>CoY`5#B)l_Lefk|RXLqodtls%GxOQ`XnQAL=yv zkYt&^okr-+tvK-?2H@%L_OexgoX6l*d3k@QLbaxkxE>-{-91pr^;hT(j0tvxv6wZ{ zu>Ab|skF>oQ@Lx*q|>u!(uJ*$Lp7iJxVmw|_|o_BLlzmhh^)BzjqRzoJbWCd9t$qW zB>e7c+N_z(&_>LOvE$)7sZhnguu4j!S|TL)qN?no__ zit^p;eQ>l^6dO$KD$&k`9r6Blr*`69QxeX<^)tNj)n$U_fZD5v*+YadC3vo{jj#tB zMyZiQhf81hCa!MsXY(1yJhWS{O^dbD=?z>((J#|88>d@cg`9Gm>czZ$bk$O)^gJr4 zX@NoaEC#hNCecFOJKZcNdFTgGMe*KJ4;mGQ%Cw5yd~Vy5?w1AnH=`~mf)-1aG*;bD zSQ4Ab`?>Np(*D{NfJ8oXsrGcP7>o8VZRsEZ8r5UB=g4w+99o0)e`g&Nn#i z7?6Z=lDzs`!13O`e~t(m)0uj1aw)Em_CrYVL4%&|VFwHID9p}Vm$>kQuF&+!T&Wq# zR)CKWyrX8!{_@o+wF$7dgh-8*7#%f*v()bk{AL8MrhoHt#MDlZL+49M)FvZ)@$I^5 z1R$t%w02fn#7d%;=IW0>=V|~+T`QGjXH2_EpsSt*WZ6CBh;#vfePI7zLQemt4ds7V kS@M7VqI^Mr&i~%pH{pJYja|zQUXFJXa(%T(< zsc-*1c;}{}APrYNL4NRNAXrO%l!Ak+i$i}hLwvJQofY-n;NY+Z{=43#uws$H!MzrL zkd@N%Ha^ZlRw4LJHEbgN-v@;T;eA2qDkX(f=+$h)-D+)aX9#m4v!@)QpQztiXIevU z?#=P@Y{SvtN#m|p+nQeZ>8p;d=fJ!#W{0Q8$EV;uLEd&%_+V<3;95AvDU`P_QQr_^ z{xebjfAjx)Hu4uymhx^%#Uh$n!BO@7TWVwpUC&=JMXIOsXO{X}7?l-gP=l%2g3MNcwGQUOp>MfoN=yu_*`YEQXz7=VoI5w_1?Qz1|RH+Lh@d1((b14+LoT zOO2>S3UNc>*i>4I7mx*o2CMO@LOJx=>d$0E97bx~2vRt&9P~C2l%?S~s_Fay|3Jk%MqfV6p4Fdz>O1l@4&Ic(m@U)FCi^8ZQ=bsRtA8e!e9mWH+E^ljIQSe!7f` zgf8o&c?H%oS2CwzNdmN5qFf1jCXf4fg zi;x9-PkQ2Rax#w^Wz$g89w8?1U8tc6#8G7|H@TMRpuKtqMg4JhsGC`X_~%egKRZ2# zBsviXegH+M?~U};?)V_^SCiesE*{_Nx|{mr&4P(GblEA5<8!F?FeKK{N!0VWC!O0u zR;*+nKI@R;J0lIZ@pMx7u3Z7{#tyT96l%#HN7 zrFb9CvX}|uB1nPlB4hHO4T;f7i6~BY3rn`%+(mk7Z(UF_9X7a2VbvFvViD-0@wS$#109U4{h_Cf286&8o7SgxVv|(c_eWo1cM6qs(i+3$!>_x^aKiE4(V;6B zySV;vvbL0ANYtbcN&nt4tgCg<5-Y&?3HH3~Hh?+SeO(#W%vbpvhhO&guXmgc^-^H!okYPb@qf%QtST}WI0oa>z4<4H4zc%7) z)pJ%>P*6vRsX^PeeZv}tr~k%nQfoGLI9D-fL_);wb}lByQPb*tv3=j#G!zaH7IB$n zm;H@SB+(_2!~eh{wS}(#AFi@1PIXC6!Fc=}EiYn*NjQf&BlBI}ZEyDJq7%wW1rO8MS+UL}4SUWKtauEKwFL9g>(C>>m8}{6v0Pz08*@Gov1#?_!rwx`S^1 ze>Z%((#}*#d0^Yjznl`ST?Xh0v9n{wkO>lw?!;`o@9Fj`drYMZN5?b) zbvvzr2xxU#FE>COI7Z}c3t<_`t&vVva8zDk8nJy=muHKiBvA-{2taKRA#HzC}fk zF=XFm!*VRnc;rDQ0y+Xn0v+-KJwn1SI32ek*fZ>UwUQkcL%KAFp-G%`dp@v76U5#% z_^lea^A6=S4u0Vhtgif!Zo%R1_Zo||_#CcA(R&j)tRRsw_NtEa1vu}FG5@5*Zl0dF z{!!_(0sz8=ljPfL-`pvfIue=QhTi5a>=C|0B}FBb!U>gA10%3M2H`YGxBRxxD(k|p zm!>n$+zr;=Z-)LyfBJCq=d=G$U_mETy9fOeE{~@&JO7RJg@w&%3e;mcdb4-$GFqj--XvjjcuvUSv7OxrZX)(FcFmm@gm}cDVH2Qhq zu@&k!ASnDX)Ly^)UD{bEj^o=5h7B6p^j0S9XLjn`gYpWhHm8{FGA{`rkLS%ZJ#=M^ zls|ANw*Kju$E5OOt!lkngBll~nC8sN-M@6ho{sKLgoS|G%S2IL#(nn{EqcHBX&n6t z!CPby>PX>1jVWU>zo57ghuA&UTvnp>QPMESA_3;SAZ*Uu&9|SAF!?+l3$GG1Ti}5< zYf1xIT7pu$ZqK8?vMw{Vj7vdaTrdP#i|1)Py}KFu@47R6OBJb5!QJPqwEGc@5x<6E z-a&9i*!;ye%@dU!-ktH$J@5O6kjtIDxho>?tFCnzc8z!28nemt`Xl%mRrzK-Y7bI! z-@b4*ceQuikz5LwD-rO+2-mpf4E^tGR4M18HZVPS;&CyQkI|HJWY~uT!Qr~PaPFvd zL_7H*;1*`qRWA{E`QtH$`o$2RRm#qIURP}Y=lJ{}Q8#fT`b_(*Kt#=g8;;WA(mtYt zX}hf6CV4& z%wajPiHR=(tYW4Uno)j{tzouw+;xF|Hujb2Ynt?18(A;-pPoECkvookvK<5G6%8A8 z+(K%-JKU(V@Gi)?_d4`8Kgg9GMrER)@@xeNdnfN<0fjNr( z8Q&$_WY4-sX)t1Z2~ZKctX9{v6EeE)XszYQD*B~HwA_5W!NpxU$$zQs!TgLNM=#(T z1-f0f2trqL7$4=kwT&F53$Gfgy|lKBTAc%!mE~E)iFIydtA~H4uK5?VV!Hc{57VvV{vn5l@;CW!db7G-2M$GYel?8v-k6HALk$M=L23GQ^KiV{^65J zWljAM^J}%|b~uvS=x(+a7F+Ds5qC&DccNNQ5(5+XsS>@2G6l$&MPVLO948baIN0Zj z)V4Iqt3@=ge_X7}X)trJ*Hr8 zEIsYAqG?fY4iyx2{0?1P?q)x(xFvK{XpTeEKZ0cO=11Z!XWbDwf-pp$dAwHe-N4l} z7ee4GlB;ehr5!yN$_CX-Z|Z>{exPT7UV~xe_)~y~9C&Vau+PLf<@gm8S-YS`6 zU5fMOHY(tDbC1NFYALj&^)8a)=7oel>_Uvx9_L8+JC2T{fDZKcl|(Ep%WMSX{z`HE zlo4=7mikQ-dy(5@O`%_ig=gkYEY3UqAdq{S#NC?+e(*2JwHS^ zuad4&GJ53U{GsGmQl^_E?Dh10x*aRobfj3TiWq0fpN7`h$ucTS5CS0 zdh9+>lP>p=G%hQXCYbo#i@f(Tk?^rxtMHL{<_4FQO@%k ziyI~Hkh-0X9l{OE_g|Qeqs%)CB%%r-6V>wRRCc42=S<_0hHKCY2{zI4P252Kk!OXw z)wzx>h<0^5CkyQo?7n!Y^jeBkJv~?W_54uc+<_cjn`;@tv=x2 zUMO{+RPTHCsxgrv!W_BFrC#2RUs&+wIP!9N`Kt_*#?;K#^WL*(QB?m*z}h{u^Hre# zoP||ZsPz0wpsVJR$}3$Y{0WTz_>rVV`~FIE_Tkg-73SsO3bFwgqN{+k&A$e#KWL@s zB9RB>r;yU_@URVM9R0a{4yB*&Da-nNyDj~8B4NRl>)_yBBZXEEV!?Eg_jdM$x!Q|a1xPV!Scz{LZ^kLOP!C8`urvs8AG&n^{7d3*6o9JSTVX=!A12;*%y zQe^G&_ZUzlfx)RBPxS>Q1(4Ju*@7yH!B6r+f#F<0PP%FR(RT&ZQH`tMd0QB82j20s z5EPXzyddB}En#@Iq7dcI>@;}NFWs4l-ljh#B_l8H-0DJ{5iC6gYU#R%BB2}7hxIeW z=_KU?2E)y1ZK&2KsJc)^Q%p2c#j_=@6M}Vy=SXjRfA>}GZ5qtb3 z^7|eTLEv&bVdCw1#g;jY)H5_eiTe9bp-`71nxe`x#`5zO3&-idFv)qSh>!@ERFaI$ zF6lrCB0tn>Z_2xWi(^@YvMLd?@RQhppG{>Qs*+7iM^v@f#HJeqX{C4{GL`TiWU4K6 zXlsuZ`{H5)ahA2f(zen?Hp9|v0?bgry6YtVtrYvz+`b)XPBn-8+v_M&qr{jXdxO}B zkaeM^_r$9*usg60iXB}M!@F>{vGij_5oMS2*1!yz^O~2%IH5Sn9y*EX(jEszVljsGw_b6cX#Qc<@{DSjBH~N4cs8Wp8>UoDc zarQS_O^}RmwCmQBdKCrWN3-D)hEo^>1-kKWI?AA zICHW0^WCOi7~)xCrGP7cVN(@vWtERiAHsJqUG|)9#^#07zx5-ww69k&oOC8`p%r19 zTc7z9G5!p@P1_30awV7~^H3Nhu#^|liuE}w9z`8%v6bmN~@d>C0LIVqNx<=>*5aIwhPdG}al zlIEKJsAqU!DY?f7U%$~x>(}f6M$2<(*|((fy*h?Y0N=dj_hIP$SmGOMzE3*bYMvH4 zzs9<`b^$lI+zyqjVblnL4?Dat?8f^XRI1HdTsL?+tJqXOG2I&s1y}U3>Lt#pxU;!G zVglFR4>?Wvd-|^>yV+>QIPN}Hz-n7!Ugl7PVVs(kgb;j%RSEy-(n@R9x3uk3Lwr8q ze{U|Oa1hJ@{|B2=b-0arx|~CY{C0JoRT(jm8sm1-@JS=hAMD>2uxm}HX)6ueDOrie zhf+$Zv%&BSNDco+Af zN-J;^@Ud92i+D=^6L6Snb};0#)4*P$HVGZRBr}f86__H!^IFwvi=w)_J(2Y74j>l$ z!u4?bq5sqnxJh>LKb^mHLPbX>pJ`U_yK4)Lp7iO#B` zGLN4Q6KY?u$RolC8ksYw6_m^^lnc-D6ZRL{1qmI5^EH$xv;RWI98Yj?_nAgEPYz-t zF%8X5AD)2_A4cq>@I*jw;i~ujQOj9u(p^x~*3uguKs2HetJcYWW;?;*CgBtW4gQKk}{$tOG?i<9khm(c@)3ZOA)A*yYwLiN;$xm{9F zWkpG_J^dj@ZokIokai|kLwmNq{{E?YO)nTSLLoxlf@XhSG43W{1fjCO)zU@>M85Qk znV$Zau!M0e443=d-D4=#EsW*XZqzM(5i#-^3Fd8n!O~Bz^9uZMjy@l0G0?yc1V%bc z+vlOO`SXF7KXaL`d`L04Z1X`A1zDRJhVM3l*9~4a=RZRC1dnWirfbSh0gY;aU znw8k67p&b88b4r8|Mam84VA0Eq=)`okD*^v{njG-CoL<|VEm5(f-Rlw-}@Wfow!)b z7*^ImcYHA;quOhHyZgwVczH7vtSD)38!m&mtQZ>1QM&k(tTYLr7y@3Z3E-gmI2#LF z7u$tApws)WQvK_buRO$V1Mdd@6q;NzdryPb+fi9*|J32#1%u&EAt4v4KgL2au!(LC zw+>=ulv*9ng_X6}hBkax^Zu+^OR3ZjRknVorO)$oas!oqLY~K#msBKfzuOV7YBzo| zKz_K-A70d^rLcDKrE_r_fck}`1fArq(J}Z?Al%dZkS|xV9m``T+F;1TOjS@}uLVD? zVxUG#B6A0tSwZf2kptEMvn$4Fg#?c!3Iu#RnOV+z+;$A)RQ+y=XB9e@$Tbd-~jt(FbM z-}P>&({j-A;V4fk*0nc@5Ur}DdwWYulLNKv!bse9O&>z-=|k`9hQ6I~0zlQLLM74V zoTC;mu7!(Jx6Io^sm>iK+a+xTdniw>H&7v$@jIqaYi{IeP60Ww| z+GMwyMl^}(veG1ze{x(@_C{MQih{Q`YFX)V7@2Z@`_HSl4kZ8HP5_r7`{aZ`55)I2_mK^GVh&|;mcN)?ehs^yVaTfCwga^%W zHU-^+Z{0S(`z(~%ViSW42!d+OysHC9!MbKt5{wo8eTS1B{B5TZd9n~^X#IOU0jG-K zE*hUVzzCPGPi#hg@+nfUZQ@8@%;khdI zaK1waY+R@plqGVjhOsWqKLnx19Y5c<%B?4$38Ii5ai_AxBvxLavwlXM*=6r7PeHGH z=@CvntdGctAU~L1Kj66{N5}HxUKb9Lxtx``3e}K(2KxYZq@PpD7`R61jbHN#>6s-k zzlQzV7b47sn!Zv4O7>Pzg@oFuxwvpB9X}ECTt%b2B#I%TFFDAzKK}BxiitLfxNNom z@-h1#UyweUhL}%CjYIMea}~sxC|MYGlk;aM*mJ~EM6a(pI{NiciG=0Yxz3ntq{Tuw z>SsxtdW=~Y&v)5I%d+mP-TgcsQ+WdjWd`5yy;O=hyB<<8^P{_rF3jGn5#zx|FRRtYwHT`H7RMHCa`XC+F zeeZ$V5i%>@KfqQ3c1T)yr(-oQuZZ6r=+l{y57=cX31)OURAfJD`@zn}rh<`oFu)ce zj$eJs-CBD2Y2qtAl{5$=V^$tQ>PGsG<}xS}3%l=^_MTjs3%pU}O=S`59Nq>aF+U$F zLt(-cje?w_V^v--&YaqyEW~U|Y(_W~Q6_y6nrlZZ{a!ksOcAK4#%Lv=vpL|`!(Fz- zLxIdeTD1#)#5yzS?!5|Ey^iTi+h*B^4ew#dDSof!#_oIL2(qo*GrkLwT9wrsmqCv5 zBds8x)#C7vS;ZDn@=~Lf#4Fq${n;{E3I~2?E_G&#pGbnE1TlvFUw6eprpT6AF>33yx zZ`WiQ6ZFY~a(C@emeN-LnHZFoMDeQZ)wg_9(WU4?KtN8@E*R=iFqf?L{$x?qchjG& z$wOA|KN34OX|*e3IPh4Hg@j6~&NZkv1)I_j{>?c2&jN>p@O@mohR|0&{~7jG__|{= z#V?rl;J->Xf5k}N3iYx@VKGx>>UfQnCLbi$07Mi)yZzP?U>~w|MC5S{8xnrLCz=y} zpPWdwZ2gEHHDLri0>Wq(LzTT0&k6D}Cj=iE&qWn@Yc^)pTefc%rM)Z5J0x0P`kr-s?vt<)!^_wNjERm9VY zSVe*RGr3$W7i7l#!gox54eIk&v(n1`FQ;yPQ#%9!=gT2q`O6D||H`#$f=T(m7HZys z(s`UhM$CF-G4zddEKAq=`gTHv{`CdFSF4+pO*qrUtfh|2w^aF8MvG6hKugW1GH^BI z|JRbBnoC&z9cH%6)`W1K6|Qur5dgnjj-Hj5$juS+Vn`4OOcXy~g;fU#{x1e0@-jxl zt`{;?DGt&iSX2q!**Zje7QPztS`O|Yh@x zF0~m&l`bSF$EEI~F!xDQ>#%PcHB%3jY~>S#bn&bEM;IXmW$Ib(h6nRm28ws992C4I zl46m{;xx6j=+j7O=F`?4P_Mr+!fG>o*){xf%J&3+h5n!SW^?|S=|dP_yxh?-&|9sC zZvCo1$0{_*>7q69B`_Hn;#H50lhzLeijZk8oZ;Pr{=&Ikq8Q};@Ikog%Y08}JCTNx8Cx+N zIFx)LY%^De*3sb)AS5Y1b5XE`pYmP&n({|d{R-dx=?A>K4vGmzqRnlV?^zt1e7pg9 zA6d0+_eciW%md#HvwvZ=(D0o@&p`IHjS>I5RZu{ALedU4`nml49}A#m@BZG@W`^9F zYZ)4Ut+Al{(Cu&bv|M4lznuwou9Mrb;{KrDON~&85*&Khi_N?c6ojD zI0*#QAP@oW&*DzlqKFQ~Jy$uT?YpcG_=?nr*6sy;^@}_yjPF~O;T_)hEZ$K=@iTot z>Zx0hx0{5?wU>pOnH(F%6uU8dz$@f)DU`dTztm~*f+EWtv>DUXlKJocEhM2XEiHpk zbaybZFZxqEwmhO^@O;aM!ucm&Ru@acszD}G+roJwVEod_?A{++!&mM=kf}?vBXi_r zxLn~^i4a5$oS|UC=~?%U_j?=jA5`ME+rk@Mk6D&x$*r&*;-JL(skPKp$2`20qD@Zh z{M~xLZsw89r)_7d`=UCp0OX9Ks6%cxCZ0}#uuTzuf<{?lvP8GACi&3XRefuw$_}(= zzO6qMhkHg%0Wa~l9W3xi5Za$_-12{TU^L>%mE%61a##Zr&_FC-y&&M%-<-W9J*Q9o zYttF1ns7$sCtQvpMs_bI_>Cn&p6BShH3;7QEjy9`E0u6liGc>Oq0Q?zfWqZlUVV>k z(pJtv10uBiTKvmd{O-a(zQw350|)s`uOIE_Bq84g=o~q8QJ9vQ5B~*ZTqX|fezaB! z%`?)6H6dVnM>97i@)pQqjPOmWZ6Ij?x$XLfk-KtF&uwNELdE~`Q3ModxNrXL3baXP zTFXPuzd`*oX-R5wR$=FMa~1w1_O*1hjf3K(BIQp_DnDW4WOvKGpCwgy>nF_MAtG+M zKD{H8=bw_@>5Kxj2q)Grh34)ZGKn?t;HUTNr<>4fO~I(Ce|AgD}wkEWzpvzK`NE^LB#y+(#e@anlg4GLTh}zw%2Z z-S1-BM@}i;=W43xab*_A4gJl!bJ-gbRyqEQQBdc~Pv@kzglY0H=!1sOH9=CY?a2s#PX|#3=;4#2+d}#9ZWRBzfQeUG01jziw@zCtCQb&U9WY zSrsZ7>RSr@HA+AhvnyvO=eutrzJ3?8}0`d zXEK0ZcKMVRjnUlnZc{+O2t}BUr^I>6n>uWEjo( z-@D<{x0kIgdK=kyPiq*$XpWRpmEjdO&@Yp`@+zMchKGQG_{&BzE(7}zx*4R_Z*S>L zDbcFYJFFC1aXHGDVAi~?4OYSsnI;WWldoAPLpp;k_pa@PmPkzSt`% z1m=pAcN~{m^9kzJ^3DR1E$eq) z)SRC`UqVcNxL9}O^sS?#eeGO9yOz|&wYm&gvx}+&DqHYUTpBi`!iC*^9AQu8$6)J z3&)JAlM6^cuaq!jc5W<59xvc{>E>(}pYnJK5$RxrD!S(zTx$c806*(%X$~4~Lo?^H z*tTnZ#Llo@_^U?kg;Ofip~JzqG(UnTuem+T^Rc| z=MC9K#$EF|`jNYZBb7}^$HwT$=GhrGHlrGa0@*9l26FWNTlHp@(!RT%4cy(en#;UU zMuGKNkW;})uXB!>U~nQ~j*JzZvpX%E%-}XR$hvz>|l-FfTv3u4t1?*RnRk6-E^aZE&rD8X4J=v@E{woF8)-8q6%gXub#_fAHSIyPU z%i=2`k3+VxgQ-$jqTgd)`3!PP^;Vprp!4lDq%dkKYMAYrCA*7R*A-V*9o9|A7Yq|* zwt;3)L%WgRR7+rsO9PvG<9tSx%_wRqI;hjwS-|M(!_v3ro1UFwNSGFTpG zEqwvo(d?{1MkwH#`Sw&C!_CBi24(Y#=6}>s|EY`Ll+As#Z;iZ3hW?*s@Fu$rc8&S% zW{O^mC;NQ0evF*m)$0V_#eGMYAF6WN*zm*6QJu$8Ea&3@u@v~7D#vRWgjL53-mk=( zQ|~#?=$-EY%(2p_jr2%Ai`Q#TfI#Vqh-$c!G)S7$x3ZbqTCUc1p^f#H`+9sSQ}9{&`3<(!9aW%$ z>f=XHQED2|f~rNY>#DkOcuExE`iSO?Q@YjsWq4pMAz+ER6~?boFc27I&Tdou+_CNC z_=8;li17nYuzc}V!I);`FM$E0eD4dWEFL5UA&SYcox{N=q&woRqc5bTTR%9J=6u0j zi~bFNNXtc!F+H7dyc+eOi*RySKka;XOOPYtgssaaWcI+4MibMAQyC-8XXmus^iiAn z!X$qYZ7FAb=BAsuat(KDon+3a7#6tAKk|TtmOvzdlfnNPLIk;EKB*2!PKwZX{#~xu z>WFBilB;aO&(uZIuB#%s_M-omUdHjgp@cqlpPf%?E}p@;&VL$_-0hJf7W0Plz2SWZ z=xnYPFQOTEx+cTKSp#Mm%GRKpr{~m8m12)hVo0x;0q2Smg44g!K#$lNHph z73_UWfQ`e#@vfX5CrQ6I+eVuPI(f30ct5}j9Y?G68ty8U%+}X;2lrP*;o*563ltuV z0I4eyh)Ze#VpN{XrhKRI!Q!QPP@&&=-)~f8Zoi#w4wK%8r2jfBRymO;2Dzj7dY%L+ zBTj^@$k$MI>aF7YuZD(t&pQ4g>_@UJP#Ez}ndtfRgKj!sUKr->(;t@;*AmE_+5EA$ zJZD%N&0@9CYwwh}$9KhFL$mgZ_?0_ZmpEe;wYMwRxwfUh;C+`sp!I_MwcV2l^8_RVG-UwFVX{Y|m!q-()UY%nN7L|;}BGCs+ zEXmhv_h`Lrli9nQZXW+i;+2#jW!FNKAiBJ1Hz)7cV zg1)_!d$+?o5_#*AT6u#NvJ?>C1 z748jU;>8_fl`JLai+(zW*TAVx7OIw}qL@#@Ni>_7q8Jok4;PC`^fx%2eEEK7b+Z@< z=j;9<QrbV2 zY4xO-%-309OKxrZLgUgTcns=g*$h07!f7)6Zyr}g#PR$eYAtr#kfZNK7tX2M$4#>T z#W}Jc^-m6K&g!b!@cq0dlR|F^zUX#uKkg^WZK8WTR)=EJ+Ju- z0!5ukFAs9EN15P%Qo$E=GS{HpG`9%dPj(QHW)N_8xWn*n^`!=ir1Ha_79#P!TmEWZ z+-HWhw&$o9ZW1e3mvN~ z^~2T0DtI;Vg5fP?fk9NY!Sr~s&ew&m?J<0$GE4Ca`J!JEFKNP9_*u)GqDJk{N>T(v z6gFBHpt z3k~^2c1NQZWnLc2Gjhasl$)0&z=xBt^L6hLFe_jn=;8!vfC2rPeyG7GAgf@t4Rp{jTq0dDUxM;GWHzE9jle^lK#FnqW84 zeT~*5gO;3YPW>?@l*ey%=AX{DG!rg!y>OsoCZ(tNPcTB+@F+6}=6tj848ijzk5tE7C9mV)bYP{$A=WXnyYO*vmr*61p=HA2Aef{#8?27!TG=t<_XA*buKnbfaU)6?*GCN$hVBz35V@-cs;$ux1tvu49uY9#z5 zExnWHv40l{{1A(7$XY+%pktGyoTPeKr23j~JSbbY^nvK~>>$!o0Wz_s^-{gDza?l3*}=IEo^8{8N+vJdKNh0KzW}wHGka_44^hk zxQ6zOR^Kr5&H=3`Cfmo#>eEEBTFM&E&DnD&do2_t25e0qp&Ioe)rlj9ln>GvcFW53 z;mLxy2^$-bD0U0k1{D5ABebAZn%06okEivcm_+-v;>{w!{2%9KAonUXGHI{B%G1OF zBU4aWKAj4E4>JZ0`+n7ZqDhmjU7!+-I4mIw3yDSXW=5qCu-=Uyz*)NshK0KeZbA!TA4J1`czHO$jqNcBvQi^PbSQ5$X7C6SY-6{tf zWqJjC<)st&j}(79LR*=xR^hX|{W1RzK{y$uqvFpM8M^>unS5eb>PwOsxq-4fbe9@W z2q&8c-pG)sD6(M=&&ygLo~N3k^K)##M)6`ym4lF47+D>EJDv2b49+C!Do{TRIUf7p z9FSy8Hb!6Sg9@|w$PedyFH5WE!BH}!(aLfXKh6qb#)MMA+FG?~cxBVhk$BI3%Ypx@ z14%m(acFWW7}}rY{uxN*hvGD8oV!GQa~$~dmP_5l;GCyxH~-RmoH391vSb6uQw!$b zJc%CccgL!lCf>SwaKZ?|1zLO}EShpc%lWC1o6;SNmSq6dmnBFrG zm_5~A$``8G5}w60!^>OTWMZa+91=fFf;d|QKFQ{1PC~6>G;R-PfJiWBZ@`l@ove|T z9yOz@W{!)E6ytksij-(fnH{R(w|zZH6DzF-KL>y&fVf5f8Vw;(cgj2NCm&v_-h2>? z_K$Z~oS%bIq5}K6io#4P1%}ho+Rh(xc%3+^?LU8mv*JGQFdFNsnU>y3xwd)~aI}w^ z6fKJ7d`i!UaF6!Ru`|Y5UJ%y3lR92ayZ?%nUfA~$ksV|ZMM~13jp1x|CF{A8T*ffa z*W#*5pjn&0Ve#T~fqqo4BFj$ui|nMNjHc78yLa`sc84!6?s`;cb%{*Kf^PH-I-&`z z4))!QVQciH;U-GD)w1~@C{hid-o|8yw4U97?AvJrM$U34UVE*lax-d2%!lLLB6Da5 zzNl1I&R=N8?qvzeTP5W12pF7T3`*ChGxEj-^i_t@`Q!!-(VRlJut|<=kr%eDkh@TETp2or0!OV2Sz$uJS;?;cRJWMA$UWel&u5jruehe zMA0-gZ8Y^FD&IHt-~M-~2+2p~(lOqCN@K+r#!lpTGrKZYWhgV@{J=$`Ew9g-E^-^< zxO(v8S8l9qjdN-Q6Q_{gaeWHj1k2RQIFmxOox7m!R_s>9vx=%R=@_3Vp&GbpoHX;C z;9v9QczrNZLIbfQwUnB)YV*jUw6yz~8&TngSYIpLf}6Wx5(39{!ai{DP2U&rD$|{P zUnVA5t?d<(J;+%da@ZP_F6lFVwL3FMCqeaEdkCDBJmWdmCn#d8q@=@`G!F_+4JWc* z=<63%bFv%^MJ@!7fC)x@MnrH~YhA7w?H5}K7cR$KsM2$P1WsI5e|ee(4hJKg*ctW9 zGM+Cfb!xQ+0ejz>(+3+CEDha@9)*5SM_uwuzSK}2&0t1+i7)J9NLx^yz55CCcB}ay z?{pE^`is;^c&tbF!XwLuc$Ya^H0$qp6m1sNDEzQ6YS(zf_LxMc)&i;L@A;U|jrq3vXMXK3 znfQ=y&0W=nvnlz6@^>8X&R`S3+2o)m=>cY0v%B$>BxEkTC9UXDiWo`U$X9Peh@%)?xETFy5?k7G4i4OPIV z;rlbxw8z+$#W5i3xMNuT@jG+u1gLfJ9-j3Vh`$hKH{4%l1-VdK>$XNHXmDIREX$B= zJ5B~Nc1LU>w%s?{7nrm71sy#NZ`K|i9Zhl&geM2;%&#*xHjQt*y>zuckxfE&ObBS* zro!bj`r^SR-RzF|5(3O@AGcy!4G+Ae7E@|ne zJbXS%u1!AeM<1}G;K)E|&)dGh?AT`} z42h15OD$QH?a&T=X`wCb>F<$*!&~IHa<}vGSDZpC)k9s1e*i!?uuFad?uT?q4+T2Y zf5Zs7v%3Gh+2sSL^`Vj*aW8A6Z1duWCO{zSa^# zsEYgtq^Ut#nuT}v$Hr4cfR0@6VTSp#t>851T|&P|M^KHRSfIto{ST*)vV*B#D8jvA z;qzJrVPWZl$^6LMCOblfKfteb`C)ocAFwEaf!52X42jR(bXkMw72muP-=po*dnlsd z-(=l&9cc0s79_aZaDW8fZ=mjQfyca`_?%cy#X6v&I4oZwsF`h#Q>|T*95z(yEFd+B zyqsS|EyWmDMKLE{{9^zu!-dx(@Va`Il`e5`+%Jzo0)WzIenrNmTTurl!8Lk@g~@MI{N0~IRYIi zF98v=NTy3QB^BhWl!ouuaD3vj(58G^9}yzY6OVuD{%U}W(5(K(IrD@UJim|ZdFH}x zI{X;x@x>?v&t=9aF0RhQoKd=H`x-v*`O9sYVB(s37x5&oGwkgg zc+uOL`{oPVhcIIS^FK=7&$~@#exoKfZPCvBz3i(Wu7E$NUPzWA#c|9(IM6l*tS)}1 zDoJ#&A&t}PS`5DV(g_|dQ+pX#ROO}_?e8oC9-7=HKS6k2K$}+E6F1<|S1QrpJsH00to#=N&z^%OK zccjve;1>*PJ@acDEy4vh`CjG`Hja^6>OcS53zk?YP?x}e0=^|iehK^uw%#K+rb==8 zZeeh?ORejksrKQCn#yCCg%)ngvx%^MX#)w79)j=Q)qrZf`p>!6#oIs{MhRwMEA28Tm z2>1VD?yZ9&YlAh`ckdKYn^A!hP zrSBX=(ll?A&OAkbKL*yPD7HoWWZ5V&YazVLj!1EqW99}b*G>N|RnVROA(p;vb*N zxphDO*vS}~9j~SZs4vxK)z9RSZC-wEoLon~=^>R#3S(^_D7*K4h#cyuV0T!bA~?fR zw0A=sh>k2G#eQ;k=03jp%!KP(nZF|3*DZ-ziYnGf&?uSd>m&9&%YoPFtF87u$nHx` zNAdtJy@-@*{w>`f=TbUp+AE}=-A9)vzDmSQuA47D4LLbvuKFS2uoN@3O52Z?(p#k6 z`^V@y(^v&Lx;p(Zbh1hQb~^I|)AfdLI?cgw4@RXL_0CY_lOg;Kanu@u7z9z<+dqRs zWx|3ruQZJ^H!m<`b<9o9JB3D%RwO#&8Dd7xPwj(vev2#B}-1 zh(6<2Hr!(ch^*PlyM(HJ^RFY{=^xp=d{pnncY5a%;4MW%XC?L7xPH36yOHc{^0CkT zg;S2#EGHEfBlz)SAVyym`+Gq`yFQ&GPu5^5tOWSa4xAsU!m`(*68|rU&ayCtuszgw zYmxTxZ1rx1Dw6)2Z^mq{C+< zeBNg5BH{2DqmMdPBd|U3O}GXrGN4ZnFQJi)M;wTX-uT44uzox!Qf1TDZ?hK_wOd{b z9wmJc>O{EncGnY{3bvb!zSAh#@5str1D@vv%wH2wjh-Lu0#g{|93J??@ zi#*#7ubnTqITBbgDY|-xv&lv6+*-=%B5rfVVbMM>9X>ZiKb_7X#^!5pv>XhPw_60f>dl_LdRm8biy6PytGnB=7MEjO zd3`$fn=LYcw6MzLSZIsqBf+FTllA`gn&Vy{|9XqVY5mce-Q^W;?Oz%54Yjj$KO7^m z^)5#ezx5Yrbzk24(V`C|8=b+*#R}lj+h>M9Ygg2!JfKeKc6Oti&$20OP`e=Dpeg5~ zr)g#OiwUkDtz$~-pd_ioVV~)Gy9eQYwojegP4>>jTziY_F-etv+slMs^uCp@L>}NJ z8+p|aU0IBAdvNxhw(6|M4abtQ(oG>@eiTpr@n_aSezmJ zS-#J<&L+@=Mj$w2A;?u$= z=2W@(gZhC3;=Yco8D@KsYEXjwzBCW3f60T=*C2jYo! zfP$pkU>+J0MKI>YRRl<%;pIR6!$hpHlqjjBlvK{^Un!35S%HV(AoAacTFx!F`Dz(B zy?zy+V`4Apf*w3}3lQito_X!Id-L%|lSA=h98UL%!Rvy4Y}iPP57LdezQ$Ri-oHd` zH`TkU`}@6`9qu zee20)-D1r4xAgZ#h?zH9_0$FR_Outr*dGtc?J=fQD;CF)uJ=!@#UxZ4ytOG!}p zCn&t8xrOSN0rioDTE%GM8P&)gKChU=0~}Ffy9tR8!?;fvoWT#%L)RYKzkqLDIt@P z#6+}0z``iDRwx1$G#mYAOHmxPB&2 zh(?S%_xvhwRjlrvWs!FHyXW5eYCK^38U;fJc)EcAm)0vqrvEQDjC$y zm_bZj^IjMMsnWlv8Bqd2c&IV}lTY=0c|m@%$jlUZJF)9^I6Ip8e~C9`gYKCQ`KAk84x1F&EE_fru52YsmQp>VER7# z%s6~S^W>t7>8SxwQ4bvwZr#%^_6=^p*D8YPw9C06=K4soZiCwFWwm~(w6pNH3MNbd zk5SQu0_pVU-?b+iVDe#2AH|@;#7lFv?|cGs8^6@GY5N)3U}k=c8Vr@WXb3oc>hpO4 zgLi&mmfMBhct9+dXD?Cst7MV~Ba?8CED5mxAn)rPx%>+w2=0mf$1Y{VIB_m&PX+XpWYeKUS_%>Y z_OIa*K+w_&^Gik-cRwaRi9dm+j(b)Qi17nErq+$Fvkr{`igiLzO3P=TUBL=dF6?=_ zfkp1|3E^d7)LvP(fX)qvl*eZIuh=_BI2+Of%`sQvvfdweQWjL4rcrROKKpj{BA{RP z9!PO!u6eeCC1J*r8vQ-!`qFr zymULhkpZ8_ZAY`I=|h`ct;Ua^Dof~e7m&=3GWAz^jRd*F_~}FQUdNs zNm<65qHcYHUy+&DmWYKyyY)YmaoI$a$xe4*w|xx7rA$d26f8&@_dQk*YT=87^dmj@ zFM$Ya_l_yt+HxyA=w+uJwSyvCVi#N88=aDBT;oz)c8?FyczJnS+P%UJ*SA0D7XUZt zuIzia19%J{aloXDL8pP5`qajh+ap&kZEd}@R9{b)#y0S~>$zGhci!|erJHfyls2J^ zek&C4{7i_k6U#LWi$Dl=(m?(lq7A_Oo%^|c*1eNa3`3F~yWtR;AdI{nhQ<=&p6^0mApfRte#!sd z!^h@U5T4`0@MSs=Qn=t0({@%$L$B;hMF1sAO3?ISt{TYdxS_>sN!47@-m#HGZZ+7Z4lc4ZXV*689D#AktcRy$ z&L9qF@xU5OM~mML&!h+#(-g^NMxnz0!Fulq;0Z$1qB>?$v0cPf9s-(rNE3S{y#^`f|Cy%7fn8X>NNKRP{R1Kq7 znucWi4`S@E7j0hJjET#Vki>LKC21^eHTntP1+~G4qoN%xuT8k2chNp0A ztiaY2F@(y_y_60hlZE)m;B;`DnJ^9_*2{9}#f~48C@=T%aOIeHv4) z+i*_}aq^`1mY|4D(7<}z+%s8zOx#HfEEs@!@T47K8>)7C?q3)~Cx?Ri%WFokuP`Pi z4xnlv_XP-Br+zn$z-SOU&$a09!^9?x#1K_Tn9?d#`q)`68O|>t+D&&u%8s-!HdKG( zUvn@2LEjOoV}usq?nEFqc?Rk0$Jeidla3z#(vr<8i07tq-j4_L?iA>3vWd|6)E7#` z*mx3NK_Uk}CZ)q2lwBT4e)5A@oe}cBM5N|Go#thN!KbKR2O2mOhg!3+XL@=yZV}4l zaU-37lEpi$hFOD67Vm-s^C{c@RN(l^+iJn`3Gn4PPZ8mKys=PBJ)M$aVZWcxvy0ik zuy+gYEKWN&TIXxSEu;tpPbAlSdDOexH5{2znMIthpJ-+f3dNzSsTFXdJ4sp7_8TEj z9${{5AB-fQwD)gp1is#Xaa=NF;1TsH_el4qADCLg)9X6=LB4kFM^9BRA>3-cHHW>a zmlgJsOCrBM&5ZqmOzy4O@vjLn{#V?RI$DmmPMAj1`QhQ<=xOwy21SOuV@NEpfSr4L zPz~=Mu8u79(l_nbYm37;cJTKf&*nD>OO>r~8F96Fk5W&_uW~*3;*D7EO*P0lyEl}# z`eNr+aPRr4!}}5|yW7n*i)m{sAK>!z#x3}s{HTvWix5DE@L#(0{yPs}gI`8IJ+e_&XzFb(f zbS-v6=GeWMvJ)zcwFs=-t*OQ}h!7_}J0|9BAQC?N0skEy{o-u~d++h1o={(8J9;9h zC$=GR`bMb0dq@a0wuXLjsoT3p1Mwh=WE;@}8VOkfi?%TLpOB+*k|=Eh!0CY*qYL}J zMN?DLJi1VFkJQsDI!NUVj5SY?GN{5feFhdT8HW|#x)qbD#j=_qy)|LQkiQqKpJnOz zeZ8XLn<@A#y%R}oqA6c}-xDx;VO+zZsu7ZS@NQJAkQ1H;osOHny&NzIn(8gde_1A- zF4_|C5Ncd;S%Z3N!Tx7ia@`SETal+#^r98LND=Jb!R5K7CJ$*s#UAmAH5PTa@;-ip z<>pftJF{{@4W^4&*s*g)f6nm(9%4=N7rqWZqPpJ_xhd%QyGhXeQdNuaNy(SbECh7P z`fmD-|B+*Q*IF(-8SL~LZ)3RfAHsqCbS z!@XvhywKaC)}hjijt%E5V!lIjRdjzsRGwnU_CIP&Cbyrb-}gk#{ysMCVY3Orof_(U z;HNRMy(*9QY02jRJA%WkdwGdJ{oYhYrC&8n;l_;&lbj9W^SMMbk$_lIM9)Fpu=GWGoLAg${ z^&u|9fKMql7!7w;S4gYaEoyqvLsB>m0@}gaplDXih6APPC);P&YEsCiH5ee97HHB# zlM57*2+ttwhAb$x4Nf~pN zspA7>hg!=8ry$_iz5VmJ9AF_Yw!ZI6T%@=)VP(kfG-Zq5Daj=1GqD~p6+=z0G#h$s ztQgiNCOqd>jvI?>Xn1^KhlpT;KlH$F9dzdsYN%@pYrS@&LJv7iVcin77!8>GR=M>2 zq{YY&wSR7ZxQZ)VLOJ@ihu$%(_xcT2e?9AkDLBC*H{o$nGwO%k=!-1ADDT4Bb41^L zRvSNJq@7#l(F@Jb)@afPtt|THAAci2aAfh{7a4U8a^6IgQy(pUqFw z&+dR$HWA++3b_t~Obr|$#%BnO!%zI*R}Gkdfsa8_|M;OH$Mye|w}ax-YIl|>KlqxX23)40^}8um&Ot|rsO7`CxJ)jSae#%lgER#`j?dGDW49(3mU zVu4Y>J{zrrWXUe6w6Mk>CM+mdkuSf%7_4ZYpox+Q22uK){Dhdpa=@h0Y z;~IGJP=@3#HBboC7-xg)hU%>Dw7@)|uF_O{;Je}@LcNae`!_MK22b}~3xZa_wBa95 zFi++6mQ+`;dcr;9ba?}DMSL3_DTGcu^=XV8WWPwKHcnLR4Hux{KJ`s7`1!Rw+5Pn_ z-yUz$tHb?Gyftzt(wz0@L)I3!`oNFg4a(cVBCAs|%kP(4^@>NQQr1)snb`9K8moRc z-ej}3BN85$Itzd>Vd^tIK&p0nQ^X6+r9~WH3j{6S$eB2mz{{Fl&w*zkjRj-q@ac!x zT%B~S&bi{KIobLsoN9Uj`Sc{)r$fvO;&{A~wkT<)iiWEVDJfB2AAzo5)svi^@wtwQ z>TjOfc=|6_Izy;d`UC{`UmG4p`sjc-0EZS)+bm9y$ zN{`$^H{#_cC{L=MzM5yK|t|lSw-0*&MAwXB6aR5_MJ_aA>0%ec~6_lEJ_Y zmO|8u0-{=1aDPo@32jGX8To{&ZaE1B-r~%|=8EPH_WJsKo?DAL)MUIA?0372Mq$&Q z;nSC$jF>rE@2)Mo=K1rX`cxAQJ*mrcl?ps{stg}}cV~|lJ(w$4tr__IxfI8EKqS<* zi+mQPf)K&WOAuygae&)aNVwhqJM~AYv_x2x{>0h^vYZW!J?PO@&ECaHT+PV$SSWPY zh?jUYrzvATj^;``s-|qeffrWxj%X%{XIL-yk5R{};R|9m;Kf>V6}O}z2~S9Kq$#=; zphBqDGv-rJlT2UEcdCGIm*4GM;t3 zZ)^>wOeZHB7dSE^5SS0TfnoseP~VTDaTSqoPKzx`--uZtIp^IYD#9g^@!8tC$bnqZ zVD%c`VFT;u)2ge~I!9SX=d5n+N2=&4}(C5KyAulPpFGb@=x|w_7Nm;b*scZO%TQYgh$zl`$bz9y=jc26$GT%z6{?0_J zR7~c;RGdE=>MbBAF{diZbph9O%m(CjAEP3Bb0%J52!H7m9(R(7Yi}yDHV1#HResvn z;|3Q|cAO}%yI&5c|L`S{Qpczr!vC9v`)z*4y*JgrodyAu8Gd#=8M@1@MgMO&!8^sG z@(wk~J&^{N8sLq_%!}CrkedFdO&tJdWTOZc=rHW z9Zx|++ak8>i`J~iq5cN6ys9TX>GX7`_p}D>mvbsaZAQMox1-=veEeed|sV>iKV11w$gM@u8LC1BKTvS6iLglYWcI&lw&QMb1l%M zzlKMgist~I+Xl-39;ogECYj5p;3Ao=G`9c2JVqPJ>=HmzQFmM(+`cQsZ&yOu`~#o8 zL zt7>PZlkjUf6`l#o8Wrs?xJBfkz(C;+@g4iWPr^bkyC`Kt@ZntLD3KRem*8ZJnkJV3 zV50D!D=Y(z&~vbfF>Qmdp9#*?I^8wJOvWr-ZE>NyhX?58hf$$rQViFmjE-3 zy$4Kxo{Ekv!@hgpDGE$d%}z#J5%(a$Zc?$h#rQ-8t>pc`s=fHpy{5H}uLSG9pt};> zB$%OvA$&E^lKiQ(cnvageV^;Ct8`4AbvDz)WnRYuB(qhU3sHRVwQ;Of@j8DEQP348 zbqc-XM(+p`{*ukvV*VJ$4kmm+o)`-b3z2K~pi%)PHZusIgBJhv4AI#bl{-6^=qR;3 zzc`cD!!P+)>T5>HntsexFps>!hby=J!mRJ^txkGaiFIpHVNJ~L;3YO|&=XvI4=C{N zDa5y+c>iT85U#w=7gd)lJ$90caF=at8NP_X)4^k~OAt`FE6CAYAJx&K5=7Yb@rpnW zcs#NSn@Vhn?6%p;O)RQmF-<3-2R|nu%6bKffX_wUsPBUTX^IMV|f}{fOn~( z@K$=Ku`$$(N0MC}kAH=6Aj~Nvdz1R0_qp4i=@)JqK%#}=M~E~Og-p0mH!?Zq7#A-u z@ZLYX2}IWMi#;#+hXbdN_dllG|Ep%a|4!!rrw=!LjVArFKzW?OrBhfu%l zPi&z?EnayaOJ&@MTC0WLG0^XA#j`Dr6V8uoE{hE{T8|U1UZI5^P%TP39g^G6PsFC? z4X58z?s&}%)sUJOhAL+|g6!yl4V9+1@hZWR>maVu>hjtkr1sF1I{c8{7>g-++e$dY%B+ z`>MbBewdJ1C5lyfoK@=7fc12U7Ddy-TTVVM^43RJxVxC@%!91Wv-IsRiN|VvSK_%R zwNQx#=e_6eI=ZX`(wnl~8oVj38zv9kUwq6_Ln?f7z2C|8Y|U?XDumuiBrMx=omZ*$ zAdQ#`kW$%f;Sb~O9{*8w=eoK&$;~M#gfu7NJx(@yYDmEkZ_g_zLQ8#S`)XpLn?mo< zNZvLu5{Pn;o|wt&Dy;OIb&_moLXT9v%#>GBQ`=AvDqxXoMj|`Oj(GnB1N^F;`~`3* zjo{Wi1L96;fdqm)Xf`Ip=Ewe3+@t;Zo@o)>Y?VHmNi^Rde`T-~rfzB3A)exIViA;6 z?LWl_3xc=1R*bSo^3`%$li?~sC(>G2jDbK(p$u!Ob;95E+fO575qjLWhY$PerP)z* zc{z#Ai#d9uAC~{#fiVI!l|y>JA1o~!zG8YnA$9VcSLb9T*NaRpt{{gd{GJ(?2pr9v z4d!OvwW+y^JpssBKNEA!R0g#>1rUE?{gH`y#JJIfKv zj56)B8Jl%IOf(uc-wmL=*D$yF&I`W3bijKDz4u~?3i~7Q!ux1>#n5GVQ@942mI7m! zP02zM(Xkx5ySrK6%2^?vH zZu%3L+c)v;rb%oJ>PK*URyj^a;BHR3F5naP2P;A=rnZWYQ7J2>9N5@yI!Q?WF8D4v zwaFl&wc=<%O=$J2>cbM6-8ca>VTain-my%02)Wax9;Tbc0n^NK`@#r@FZS6edAW^3 zVRL0Sx3y+J*J;$vJ)Lo=W#<9glEiY2qh*B-yT>COdvfAQkyx=}x@4O_>I+z-l~APP z_jMHW_@V;(9`D85G{E7dwcWJ-(S7S9SaejFmj~g#80J)lbTL-o3B2rd<^{xJ8MoUF z&9)oEZ+;?|x38wG1oc(PDWhvI!w-t9!ZJwLO$Ie~gswi+IW?pAOs-wM#O-<;5-%yW z$lTMR7e|!#3D;zaG8RLt5qB`ZU>}2O1mb}&sjU`FlW1!S;Q>aPb~Hf*+Upo1$^@-7 zlRug&)&N#k%a2k!ZEfgrABiy5A(@@i` z5*3a5$#{Kh8*9-~yB6(nJJjxr?-V4V$-NN}v<}uq^s}g50CIV?yfHfG)HhcmR8N*w zknyrly~Mh*W62ApR#4maGfUv**@71)anBB1rDucPU4U*fshnsruh!oB4=t~Ti z&`e?0tNZ%{gg)#XB`SX=Q~E{FnXnP~I2q*=0TW=K1oW z)g~^-Au-8V{=3w&`VsYd9HY^ecar(nV>-ShHPkR8-?H49i68unUS}Lxyeb`_vv4i$ z_-O{K-(kCpy6DHLb(UUv-diK1@Js~D2+@0mDOrM^KVJ?$S52tx$KN(D zKdi0`hMvIAY5~TlxI>HMg|zuU5VTwNWyULs={MsiZu|xa-MHHDuT{s}yUNx0tH)To zX0h5o(^P|!?Tta!qK|l(c2OnT)BqhKX&avT^&~Jcs>BxWQtfLwImlRffd7TYC$9Ke za#?&aP(Yvw-pQ*3VNw;dSr?I-Ht132oO5|Lv#)Z-HbqC)8L)+UNjeVq?y{>xu7bSa zldd@d{q1G_Q^&YObH_j+f9DFjj!Ma&313Zl7B_4!H8wBO>=(!!u5hCtwK|`!=oO#a zjfOBKqDg=W3J%8ce}5NE3V;ZH7uM9e{GvQYwMtnS;2pa3U}KmSwkm7 zTi$LB^C}yi(VN|aC6|#rG9B9W`Jd`^wIsTXKWl()>wvMrNCPktGEIk zzJYR2iPr#L)7!DOW#DS!Rw;>YHxfP0ViPkaW_G&2w17N6^OTrify%KZKB(-w!~9&P zK>QiuRRUA5Xfu|_FZ(`!7i|ScJh$p(Ugq>Rn4s!Yj#_i(N;bw_z6~&QYR+iX1TS)Z z35>ObPKa@^Ct_5$0gsynsFhtCfRl!Y!qL}Jt+YQze`{+M8F@*#vac}N6z?z8WU9v1 zv;f9t@W;Sj_&gfAdm>XgR0Yl7M zk5ode*=P)PIs8`BcHu-jyEkQjLz*Pi7)fiK>;;$A_a&l32j8yr30df7J@qV>QI-29 z9;yO#h~^=TQj%(j=#-7IVdC2uYdJl3MyA{2<8+*Yf_(K9!xE}pJ9LR_dEX_+gB1KQgN)N$QP zX^;6f9X3_Cj6^_NUE;&czWe8{3;`Jb3C+0f2%fAW(|S9;(;7^mr6k(A!7>!dZJ)R@ z*Y-mwR{35B2Mn)fg6x+lf*sr)UQB%AZEP=xdd(G%%4CmLS(Of_=(4~s(h)`{Dzn&* zj=MRtG0qF4!?^8yTjwYx0Ta!$!0wk;nWLR)9^fi-`6`(Rx{tSz- zYQN$|y4A>WLP5AqpFLolQc2qWg6tgPTJ=Hu9ESZKbYSE;U^&<^85cV4pR7v8YCZ01WM}1=*XKaZi#XsnJ*u`fCWr$x?y2Ka1^LG*EFfj*n|+gM~O-W7+A{DKqd%9*08l@addR-N=tDl zYGP#`q(^Vn^)*0G54`d2h`iET)TjxKu|p&I{j^~6I(iih#j(Cgi>YgMnHWTXf^k0b z7Jend^5kwaVZvAQ9xq$LGjeG&cYDZ1z=%RL8k)d`aLR_F+@369@3h+*dQEW_OiPg*7a&RzHX5w4$MPaGsvb?q0-}ZU7V)LkyHL#-;BPm6u@jQ5C zxn4vtdw(|G{N3HY?+;N%2bM#C!U+dYjW-XX(pM@aA$bPU(8#G90r2>&8d{s&93|4F0$Prc>5$c{YEOpA6KWo_}nI6ORDc3Zh| z1IrZN4n0*KBuw=rW-`XI+jL&}2>+|fBw`@yicPqZ)|KeDXjpdUEVRryBJDqlKLBQe zsJl8)I=^?Eadb)}X+bZDo0LrAOC1Vs_V`H*JCSMK&AhnI*|zVs^~Me# z3RIVwaGuGhmoC+u@NRX18Eu{Iqqb>&2B}%hv5ckc3~!ZMK?X$eLJDVRo1Nu4*;9~- zi3#O@CF?>u$HFE?;cuQMF&7tkY9g1yk?k!Vk*tI|6Q{yDo|*(h3!PN6rXVfcNA@LY zRo?F?{wF%{EblJ@PYPGOM`>hXJ97U&%8I%^oR{e6PO+=F&#~40IPAesIT+1?1hIJa zHE1m@_*|d{S?#3T4rHjYSWaL)T41mi%fl3d1giK=5N|A#d>^e`K>0^ zdcbqK@ znoyrqqJZwgN=*b3WHEvUe?lgv#K*<`GnH}gnM>z`M;0siZ^2mw)I8Gt+C;^YT_)YS zVuj-PD#by~XiZ4n@qB(Cv6XTE>{`xwRHFNk)~kaB4p^l%Ic$w5Fft17%sckl?pVo6 z-1s;&Um*yuKQ1rDKDGAdGc@5tf2||0w>#st<0XEJxV)p3re=SyD3PDzRHQLvY7b#G zf)38NE%H&#Kn4rt7I?)w0!csKFD;jUd13eg7ZS~|eT=ZD&|7w_lF3tG@)9}QRrJgL3Jt;ugJSQb4! zw_9Tls>*Ks{)8A%L-+qi@TuFEdNUVirjwe&Wt3$$`j`+H9~qW1h;zvUvwOD{L7L6U z?ely64V$A9LroBQz>_6xx+v?)3#iDGY$L;^ zg*{FBN(*ZfXs?e=Pi0|xIz!_{Xm2AA^^B}ck808w9_%y1weK0Z#(RcL3YYpL zOAY&}O>l`)f-2=~0#3Psy*@JjB!g*p{L-)WM$9A$l5jv$u z75gmNuq=A7evEludit zv|O9$kl^)!{Q#d{-iKCga>3gnl&alJD&b6+#Ev)05abj@{G(d1sIrsT`UFCfY#cwO z-*LIA`V%7GD#|(YS+nP@PxU)A1egRiutFvzOo}cxPtVMU{_dKzsQZJ|itD5~p*1?3 zk3GfHki^=WcpG4~+})T-T(Rt@H#ovVU{VE^D2StFe3sb#soN%Zly;3Etj+Zcbqjs1 zyE2~jE;ETy0CF-gMHJ>ZAYnCDQ=4Vjs0rA42T&ot8tV}EzlTnn^f{w z(%C1djNrm-Pz}^DK4MwVV5o2)ZBaw{bj07{%1pACE#03&vIka?Leq7;LQ1=2Kjs`O z-ilirg^xOUf{s&i{Pj$@a#`qNyp7L8#7C(ULM~%0w#z7-Db*3JhqE#5uMKc(T~1xg zP9x(oGFUs`UiZzo`gWGJ5{SH%>H*>tYDMNcldH8df+J#d#x;C!7faY}xH;79{HB$S zdYy5wivuS%roAMHH(`dGy7MYLFMAa#t$pDQsnZT78!-YhI`Zzg2cw)UJw=ySuM&a8 zs$m7;>5T|eS{2FsYxwlBP{d>_b;9Fg~#!M75h8x#p;ewTVUKZiKxq1FE; zEv^Sg4k0a$6Ohy`{=73`)ouw%O1KV;a%I<>ULF|~hU{>0ZO-BGQ|}M3n=uHfG?RHf z!*vU`r%6^2GWxJD4uTjP0)I?OPmj#V$f#y83rG%?+FhfY15lF~Yb`NQtdo5q9f)X$ zmG1X@d1YTaU;Qx!+5(^V;Q;|`+X)%n`15Sv9tMY)x;&m)BQ84DR~j`ca{e6hc`Hhs zyEwK0s~x#;XCh=x1jgCJthdZ&5Ulg|x8C@o?ekT`&wekE-Crr56fcFyjK8*rX^-As z@!*jV#;+7L%`BE|S*6~5YUzGC$+T@7tsR-hVUUhf46QbERuLHtZKtbtnLBW}2pjlz zE8?MP25!Ge?1gde(WL^z5N?ad7lXC<7>B}Uv0Jy4=23e-7dS-c)X^^>@rhAQacr3 zT!)xC{^?@hzA3t#25?QQ*#*wzgL2%C%lgifg)|4=*()ipwZWYiKGd687@!na&Bu4x zGuH2cLroc1K8zwgS(*0=c!^7SE%a4~=p(u{Puu*?(aqw8w)Il7s)DFms5;F5{sv^| z?nbAVdaFpbpxYUp`plu)Dpb`(2t)Rt?LTUH4sB&GxFbcm)644WS$3hcZk%y>p74rnr(o0>@v5?x&- zaP|G&@+R&6`_uNX99*9QP|(&OJKl!Dlof@N}z9p?jlh3o!i6Hf@Qh@qUq6n^tX6Eh2chu` zM#cVak`(dklblq+En>SEjNUDN8h?auiaXq%R9q$2$Q@G@5wx1tWfD5!X0}G2dh@q1 z{`8D4*<{^d!zfbyM?B?!kn&p)!G>_&9~B#RlkHJ@0f&8R5yi}x9zeWPso0ckv5P(B z`IxC{jMH-kTz&c4!ml0T7UaV}C#_|~1RxB0PK&}QNNkijCNGERnKfEB`->}Ru$ri{lWKd;+Qv{RN5ZRjtl%ElXVw9 zvW+=;fGbCGB4nC`Mc~lxtgZ`}VP6+h4TLMY3~m$#Ur7ik0FsJq2~-YQnRSRyUu}NR zbEdbFguh0uRWSALDhF>Bq+dE`Bc#(m@iqrNcZ7ZLRQ(gsB;C@Q<1)GdtCLPSYyE`m z?)^^$=o5*va%<20x`0;Qkp9y1KI%n>b|3w+aDh+PziVifx~2@r=&8=Z6++YTMl2WCC#fgM zYp0?R72KFu9p>2-r)f1g%P})EEfsjee9qRXAhoRaT{Sn3_c--~KuWem`FTO_FPHBr zTbY57FoDS0MzeoxAj^)Ysm8poI~Fp*@NOcAxBkvOwV{xKd~ynRk259l;eZCS$ZFdK zrk2gg37|CH#+W^jUYMC5Vyzy124qtZtW~h3<|Xb-4c=s^v1Uv?L$5dskw02Z$?vL% zgI+2HD-JH}sc!2;YA+}Z)H+iRDe#(cba$XfU7A|V@?4vyD^0hEjgK%wGBIa^V=k12 z$J=zFe5xKcr>6$Sq%5TuTu5Y#T2=lzq@$}S;vEyoePp3}K8QBY#%zB~lhf@}+ zdFqW?gI!fKb~)m4fUw#CLAb_1-A1mxT^+2)@T95iGxg7qFcH?j`z0)4H*~%#%DDube^UO~EW=#!M*oj<3F>UJfv-`;1)U6dHAcBLlL#wdtq6Vlbrx) zDUC7=J6YMD5wG%3sdySJ>obU-K>8E8!Z=+Zy1|2Kq92IaXK6>Ul>uV1dwH?IKH{M} z%uibqE&l(8sSO2cqY4<3ivQohk;Y6wDV;!#C1PTggmRGt)8QWPLNyYtZ(>ELEM7!c zBcG&1eU!M=7(J4&Yt$iH(YUkL+y`J3rG9qE$9l!OXGgcLH@eP4Q%ns@nVk;rtH+Vsso(^ZbgEB>&?WO(JA+3pW9zh@sQfnv6QSa0tVy z-S4}m5Wh%V&JO0q=kT%r7)~Pp)F7`H&X=41MP=zGh@i_>c^3C}?hp5izvd-sNa^dF z0})udoM?lxTx>D|3r0~TqBF-~G>MV1$uEMpS|9hRX?7B4j@|Vde=q)myn4RzeTP;w zj8%Hv2DrpLM~jfxVt^TNXXj*l_+h5pHi6^AuDQGvqNthA@-RPB-h*Or*EU4JU|}^> z4>S^&&vY6SQt?_wun5EZ?b!)oZN<6FanxESmk!EdK!!p8ud`bGPo?qxE8a4sNwofn zMj~BE^6?jGIY=UZ#-Psw=fbZK7$0hXb(B4-{&}j_reDwdXBR1DCcDM8&mJfB;tUCB zlU{+{Klzc*?WGGTdUc<|TB{oFuZVBGy&r1y*+#(gRATXG$ID?`owj?W$B5`lVOO^e zjTTT7-r2jrX+w01pM0CbnH~xrA?iuFiNV?*+maNH@6z6Ig*urR>1R+B5wMV)p0o=i za;W3~#n?ASM;0~h4&qEWu`#i2PCT)#j;)R{v27<4+qRvKZQJJU_g(jXKkm9e?!U8E zpYA^E)ZSIQs-AkD_58yNZgLaE<_7}T_nXhtDBLx23>juMYCVHBeV|dnnjk(j!c6j} z3O|6Kh^&R}L%wsTM_l0`ea+1no0WZE^e87P)GV__y15GqT_f0h6u3_nf&4(AJZ zbV?02W8_w+ZWx<5zpGx(Wp1^Vv_I%Chs?=PVKzD<{0(?uHz1LODo6)luH z(_;~3S-9UNqcSmdp209IV|nmcvC9bT?3G76o+)Ne=`H4rX0Q0;lcV~^$G#frNW=9J zWVDf$?2U9-!E*#u5|XF>?~8h6Q*Y8|=~0z@t)zLEU)EF?);A_@t53VpX$cphGkJgm zIoIJv5WAz521A)=&+?J=^m!)279SsLL z_%J5eL|^{lcvy_A6meN&pN_b@K4>uYM6vt4{9eAcKE>0KUG6eacH5@G<(}gaowf8C zY)^-EeFIkpMx~h^@|pD-qQlSdogX5OvlYmW@=Z-2Ji)n96g+%tyd368=?1e<9AGTD0zQ*Lz7Q zK-6EJ^B(ByMPBnsI9=ulT`oXr2@n>ueb5H>6pLyF>dAMzIU-hMM9y94EVbMZz`l2n z0PZ9&`!v6N9~-*wv-M2anv{&ty`^b8N6b|^RYlgB<>?}doYz58bzxZ~*dca@;~tVE zeW`sd=b2#%&c#CFN0Yclt=IJO{mwJ>&zozB3o6gJ%%qui)qP~5!4S(K`a^0R4eLKRxyNFXT)~K&zY8y$O?47`PBVSeRH`0)71f(W4lDQOS1yu%*v-rgnf!y zaF5M=?c1GHYdDekFF&vY6M~EbJ`dr`r_))GnS^9RLaV}(mK~pU$8YyI>PwZNoF6XC zHfq_tjs0e+hQ-c`EQ&s`(voP`ej@!jO-jx@CpcBo=vZxGNRKaS-8G_%Pz zh^}of>!fbN9seH6(Ge9mFi8@C2VKnlm~4C~R_}uJ9$jqn`R37xlzl_Tm;@~C~G7!9^zi42l{RlF`j> z>?HA&k@`5bj|;RtdOkj7%>^*mN3n-6EPnAnv_&=WK6B@EOYY`$_7rgT#EpKt?=rCP zdFOlB?Pq&x_5vTsD-3o|g3s3ML#}{-WsLsBK0JEW_1CN#{}8`iKo9hoB||ap2iRBa z;5rLkgwS4FJ+b0Y8KzasVt|x7l*nsYxZz!%uWR#?K3kV|IZ$p}yWPvXdk;5EGGo~% zmbscqI;HvcY&b)%`9?|JhP+8+d{nzsWjnDF_|hICxw1i}{sUYnvxuy-?;hG-W^y*f$afjjSk0<8{8Z*Dg^66s64ka6_hQ_No?`S*>g2U7Ci#k^n8%Z<UHRXww^x9_bZK`w)N4hi zPQHT;xnRLqDGg`oX0FxX1pp?iWV4sX+8RwSRq_k0O_->tjan!IN* zeUpwkC(Z;*yFe{EtbOG5_N064LC6Obuk> z<2xPC-_Jl^6t{(|K7uqDXgL>ktwdy|KP++E8??Wh-BR6lb%42y(r)cxl<>MXg; zv~ggXz6&J9eq}Fjgr){&(ym47u%%Q5RZBP5VFGbS9PD%%@JB^D((GZZbCczDc4@ zk)sF1G^$7>MX-coHyuJku^I7buGw|Y@DY1P_)k<g`u6m^m3o4NtVFebt*k@pdbe^yCK zGY#gp-Z!5Atvy4YyP)WrE@^JBvXfvxtg!deagFR$TSnqi@AX0T{-LT!d-{WlKA=7i+R#$YsL0-Gj?dsN%yW}WgWUcjuD z7*XGT&~IUCAR~tfpRW!RKW!l(J-%WooA0#8epaC4A1QYvGmeEkuV!2igvtZKZQPkP zq$O?(VNFfCY|7kZrb1;xzXRA7mDtXDR~cQpra zA?Gw;)gM2b!_rpv+&??7fik+nhqG2J1u^`%x!D$7bFLhMVqq84+}cm%X_(%4+9AXs zC01!x%-{F)qc?Xt6J=gQvx562p+T(7_xbR9o40LvLd{UMi3GE|>_#Aa`L-5_8*=@3 z$`|@%xV|xMR-sqQ0LPkX?zE=#Af~USW7={{Y}NjB9#i*=zSawyBa`2=UFO(g+_>sJ zX-||Tkonv;{w_Z?8s^ptwNl5YFqQ+b6C`o-JjJwidTGCU7=+>^6IY(x54x@R%)}mrt>#O_t~GiI2KOPe7e(wIHq|XPdJ2-_UN(|Y;`wh z<#)!72cPqvg-r39s*6P>YxUm|b(8v>?o+-*GSwXAtG_*OGnK`^Ee=$gkefVKS$7g( z4=#>9t+nJNUa%1mHbw?k_-7hqTYRpQTZvmTJa~??{jhd?;v=sR1{h%jsl@NgVR>-f z==R7@0Sj~{p$%oZNQZ~-r@#ftj;7G(b7h;6beXf~#;O7BS{6&ysRdIe;zRRa4NEPE zYi6!lz%?!I;WMsA{LZh*P149oc#py43*8AaL5Q6N;JL;@dlO8ni9V0BUX8Mr+_D{# z3ol~cxXpuFM$GLyL;LVZ_nrGQwqflw@hO6fpRdDdmg=HI@7hx@$_`?gU*V024$npJ zF8H7pIqHIDxuqbbR1swikXWZ?#QpDD9JD{z#m#&9+ zxaSZ4YVa=Gc0w%bW^NUey67^HG9i7I>tW4{>RqnPZ|Zz=k}R2)ZgsZIt5s~|wsR9b znfl(Q+c@hLw4)CnlFdM~RQbo{XB_b%Ctm=%ze=C^zNx>e26)u3JC$mEYpI^$McE#; zk8W8fZpvj&>Va|PfA)ifhCfgR^EElzI zz^eBC7E|1%cGf z4jOka;dPC)`)su;9_I0MBM{;lgPekDMSRV$d29Ge!{pm#tIc!Z+~W;QHc>;+Pr}a5 zbEA5gcm1dR>&EC)cw2AiqU;{**+%&kZEuiD_8=ouY~A5#7RqLlVgVoJpg`n>YSlA# znI|Y9ZRE+i)6WjV*y$2Jj7u~b4+8pHfW~PBq)je(0LyS&q8Mre9XgCrwszqwx_gQ& z^=4|~popfXQN|sr=EIj~n8*Gfx|a{?E(&nFh0~ED*sk$FeQ7!S3#Fz}9Nx}2KG*TC z-ZPSROT$XRJo}%W!GFZV>TO0^xnqs_d+>#)s6!cTH0mdIZZQk*N_Js!vni*KwjaJi zFn z_1EN>TXRpNZhxIIlb?v&@1SxfV`E)+ZTe^R%z+9FsvjuhGYAsX6QLVF`>Zu^33Fwf zK2E3gkC>ezKJS1#`3XSb)tcJf>uXc4&HGtdE;M_6V#1AC{fbl$L2!ChL^A=KcGi7o ziQJt<#U;>JvTcj>_!49qb-Rs4SUaabMz?J4;i8{)g)ynP*Z$eCDIo|5tdTvi`BM$QI5}6XylkbNjQ@Dg z+FVqHgiE7;JNGpow~f3nGIB#?*mCTauJ+ERpV{ZLl||#hwDwH0+a2I~sy@{t7S&wV z?w(N_?y$w$kl)jAr|8O&xlkv-DI$88xBFQ^b4KHYV&iz&ywiAQ1x#tv3#zN+zkEVk zF;K@dh5gS0ov%f+>e}5MkEnB88VHTGapc|a&~?ruNal#&>SIelvd7r=bo^6Hfy+5q z1J;e(PPa7U`t`h;^P2Idb6YBu_2RU@l26OUR&ZL)MPCvP5~ zbu8@JyBghnMjR<$=??FD<&JXQn9?Cv$+*r{PSZQ8BHElzY`gMLPb7nDC0MhkRGDHw zK2qWUb^U1$TET=rCBo9Pl2kSTQ94R+0&SL94&R#Q^kfCmi+lbrFeVM!(*-h=;DI`7 z9%#((M2W3Jp&l@QL7eP!>UIO)e(rQQ>^|C|)c^Tn{zrYx5oMd+;Va_i&gs2c>R)58 zlcPSig~=s*O*ZjE#O|>TMk|%dz%*R0_)qr`-+wCIoZ@BfJC;r01Is?kT9YVkuck!V#m)4* z;f8W@R}YbY;7Vs{`-UfcNeb=7Dd73!J|koiXvLLIQNM7wtGd+gHRCYqvmp>}x5oLS zVww+Cr>O0Rsnw`;InpCdc7*%`t&BnIn;{eCXdHFouNGRp6!KYakK{r8`89BMF~kwU zhP^_s;u8bY^b6d%^+K%jG3g*r7lybLm@sy(vj;Pr?-_tl08PY$Yk5*}aAh=_1Tr!(zfS_Q^HvT+!(wzp4iNadD z8|9eRYU_61RFicEDz#JgRraax?q@<=bJTDOX))O|IxL{6F~y&)w|9j2J#6lbTo&2A zxj3G#rOtbPx}5PC+q`c!ZIA2&hDY$j#>chS*xFHq-oi8Z>fxJ8^n^S`X&r`R!2}CW zpZ*Y${~=m{35(6)6FQG`Pyt>0==0iK)_)XlXwj=&V4eDr4UVOJkn*l@V-u*%CPYs; z8em(!?Kxb6hVIm0$(_o45%a=s$dW*&lYbXrBIY}|4Rf^qQHYg~eU>zQ;$1TIEEB7C zaX)37T*`fy7o+>N1KLyUlz4oxc(0;Kv2!bUzA_w7{#fbTz)meLUtv~~z6Acs2Qz-( z-oJMXxZM)i5^V^4j9Oi+!o{BN@vyR;v8D_P*gO&Lj$A~VCANt?!|)*?=BQA7^ei#- zfFH@3mN2|U>qnKUr_5mf;@^fu^v+ZL7mKfY=gBq2oV1U-m+WcY`#aft!z*rBHR|5J z;=J*ma1VoUb$X;d`vnJm;Y@ljmPlGGTBK49#)T;xr%4iEP7Rl)=p4&)X1mC;zf7bi zW%9Rrh(12I0V8T9RcSQ`<6czWma07c&It@W7aI|X&2KK@Pg6DqBvb+$zjFmg!_tdxK->wZrUlhwOB|g6_rQ2(N=@)L98% zLeZmSR9KW_d5AW?Z1n>4_&NT88gP6#2luh_NfC8@Lf;1El{04l+Rc7P0B}vd=?-#B zX|N{L&3uC#n^(JeX5sSJGUHH7`z-F=-=Avc=#7u(neMQp$iExyAK)dl$`Y_(Y<0Tu zE4M$`RPnSwF_qqIChW4w2)3cs0d@A}ygJKnIE%hHq43Ck%zswuco2D{wSRJYa7+&P z*7+Dbp7nqk@!$t(6T;_em+ICF#Bq`?6swHuUW*^)aP4oC5uQh_J{Ae!Di;F*LDi0@ zLB!zmvb+sLKTwgu=5+WL9*<&fS63caUYiQTuhHXPdX9z=zUi-e{f9!Q0NSv-)j=oT zhrWH#N7)>TF<9K|$wWvm?C??&9jrz$;horZS$f#qS&r#3WgW}z$~v<;#!wDYeWYb5 zx=wEX-X;ZKhG^OUZLMA3+A=!Z8DB(0{D5H=h6_-;eQAZTTKv{W;c`&W&0SexciO3J zb94Xpdr*L{`zfr8f68>M8ZO`Zym)9x#Axh`)*Lkx>M1n)ct z@!<^;&zUaK+6dnZpg(3~2R(xQ`!gtexc1h45{ny0K=lWTjlD(k(^%(?f5Z1Q*4}6V zXF<(R+F$Bg;1Lg^-t>dl0tf*NcO>f*?<()a9Q22pOax29=so_MB7Sa*j+7@(V#_^O z*094v6H)<7V5Uz@YU02k!f)|t(RoI~1NQg+RIVpXnv)3akonBrTzmHRUt^FJmx?74 zH5-l94mV=XHi)QR8Oz>$GW_xRyGnXiAT2pV!b?!72V=b~W(3|ZJt$j#N5W{P{iaM3 z`cDR-D}qk6dKIcOe$ef}r~lg(AqZm|>*lB2@(Heizt(UGL}uj6_qI)DRlc66o(hz; z(rB1hFhjQv2*=XW%xayY2XEs6r#U%JZ=UgByOve~ zQH#STVjMeMs!5Qf=3I|RN_hSrIAnZLtv5R|K zsgTQo1w8xgY2K-@LUdQlehEhz;#A{-Q4Oe~%<=2MR6aXD>+pEE{7hWVTrOODx88dF6`$G3V!P3P z>0xWqDWJp8%xOYbH=lOIB~N&6FeyfTf+;-dj@!f`%R9qplnJ<*njU;B<>3 zuHiD+4Z>=g%~8%RB?=hK(u{{6!O5uDbcrnU2*7c9T#|4Y!)lc$)i43CF{rv0zOeTI^b3yZ;GKNDk|i2 z$TUotCfEsXNt0ZJ`bBdqRd(ap>8)ZlMcX|ElaUwEeLX3RJtdMx zotc0mv>V7(rJ~`0NEn+SUO6g4;#^D9z?77+^BJC_p!UH;BdKyK!=%Y+uSM4YM0kqY zPo?5(F4Lg6kai$NuvaE_u9zDV8vvVD!%nB+hR2jQ%d|Ox=UTTdxB|JjFw;qjY|1DZ?l#|W3sOE zQ%bvCu?5#U}Ov`nVwZuaPfltD04;1=Uu64_6^MAj*g<9E%Dhp+gu$XpX|B2te(lhQ>@Sc5S{1 zaE{9AR67XD3QZ9xOa|}a4Y~DnAj=5DH{SRSCpV{eyg1KhsuCfmFMhr`vF9=qK{Ak$ zH&o!wYfI$UNVQS)f5j z5vchM_S_XD!0e;SNi4LXHYL5T{pa(A-z8u-m>rfxA|$_k0J-yu*=iDa_9Wo6L*D;b zqVVrCXGh|9YWWKdDnh$N+2aL{I-A1~M0EBxOL!B`M`lheMhiNUWgbA|Df?Hp==NKN zzB<=U}ExZ z$+{0@@8q~Ybnwbt1~{Abjd8VR(XafL=b?yq>i9%;?d0+c`Def{b7k>WjiK)*7Q9~# zN`BZ0nm^!!?fGCchUd%_k=e)b_S>eaA*garihmESi)|3B)|HWy>bRd>yN@u~s^YJM zKu{Hdx?IOSdLQ|1l9ucgi^u-9DdL41P}#BN%V>%zCHIhhO<$oRrb9By%6OT@fLlTR zj5ZC8>c~%G7QnqwNWW9zXQnpB*NCJ;{3=IZpPAO4!0hH!EVOu z&Yd3p+NO|rRtJ{#lI&}n8HZa@(Hy?MyHu{j8FfDt^3=#xQP2Qe?$k=h*A5!YWXqi`5UD1KY2t=c6Ls#P~V}+N}(e~WJL6-K+uy$8M+kf4U8zP z4@smQ3qch)g9Z2Fu8U;qVF)g^(5H&HOqmZ7R~OypT2CxH6g+ONHXQDIZ~AQJ`*F`% zj;=1JyYFL5PJ^-}0bD_DpIe?d23p}0LvGo3VOJ(rY0h_rPmRA8HP}Dc{%d^Fp*JSE z1JEGYQ6qvlT+W{ywbB^02JP&Ov*^ z!yiq+NN5{m>Vv+mklhVMw0wDy@T0sgu95?w5nA&5$65v7$XVgVb0KI7E1T#=u)Frv zwSo8VcwIsxL^%Bpt5rwt@8_PtT=&Dvg*;&eE$hIB{55{9;XbQsAte-pIKXr7>>F2N zWukcY*C|RUC3RwPJvd^H104b}J?ps!*3=N)Z0dv(x|D^3S@T*a-a6>UMcceudyyX4T{RC*@>n8uozrjWCN0C#zrJMd z`bd7}angiUUXxwNno_b-DV{?5Ir#`jr zFs%7OSpkm4Ki^z*y#dqES%ezVe<6(Z#p)bx2D(b=_-HF-RBf37;5}_HS zF2DfkouvzdQx*Pxi>4rC&`j+^6wvYfhtYHv@%y2TR8J|_)#J5@paicIKh*6IWbRg} z(c8@qb8jE%oy`x1u*Pm4*#|(L6)4NkS>`lHl7~ZjlEOV7|MG;wY$ zlnvqm{z*;fsbC{R*KY%x4UsDJr_=cnr(f;Ni<8nuA zcM0P;;_ORI%-N5d+uYS9C_99S$w*F{@K!}=NI}z?UdJdv!2(Hv4r@rS`3=aMo#cq@ z@>otW#w#;pXCVyHV$%r|8AhR|MT87vBo&!+ynf8ap3->wBMw(NFwqPBS3zNKK^#K8 z?3(%`1r55G^uLR<3{@QTAXB~W1^d4H$@MZmOaIp5A+myh@W8c2RfAjT1%++UR*Ti! zQUvmYwQ|~?ATCQiip4!g1XI1iAl6)!dGt#pxBgNBn`^cJtY!sH+KozV3OlTTYE9q) z#mMMzg#U9w2gl#twT5m!R>WQ5r=fX;<+Y)jUx?eBAOUiAd+cOdYyOi5xf#co2PG_x zK%ZZ$Jd}tZIzB;~G95csjOXO}cP-Rq>4Urt(OVd|P=d=l^4|+ej8S0t-ozBqFXWi>|pd_6S z#`?D#a%7<kUMRJ0JVYG*>9rsG*6yftk1_yu?0-SxM}by8S_JR?qIfO16Gg$8%qh2h~Zv0J$9T zmep1ZSsKP_1%-cU2QD1{c=bQFNOQNrD>}P5&-MX#y;$%t|fIccxkmyO5 zO2x0xvB;;DJ_zlOZRzQiW6j|1{AWug|BWd^FDCxbutUB|L%e|eKfecfptX;%7BcS! z>T*hh>PDA$u}cbpu2v+IM%g`7F*`MzYJq6(Nw*!l^$(yaAzKt~G_#OW+M_PXYb@OE zhY8*|Az#rD{VNRydZk!hc1EuGPT=jWu+$#1&4}?@4M?3f>_W$|$p`T0-6zlGumnqP zMxZ^FB^8Zpo5d4A)KqAMPxo^-d4@&WjbH9k*I9c?(NimtSJRIKL67fHjz^ELImqpL zPD?IuucKhyOO^=PlUgbf%wl%|FlpvCLUbV;djF={Y>anEcD!7$t1qg>-dJ1l!{y=t zvL;+C@Z>|oDx-1qsE%xt_5wL38+BOImhRimvJ;j$*OXV04dZ4DI!`M$_w!Y ztr^XmGMz4)je}#?s0e=`Dkp9mbjT5l&MD)Y=}%9$h*AZd*VAzqv}>LB?oC&A9G)5 ztc7Msu)v4MSD%v6UugO&=x!HqN5zAU_esU(XL2U%^D$*{@Kpkyi~BB2B}mq7ptW!X zYS@;HIzW)wnr3gVlupgcM9{~h%La$v!qnCObl`m6) z>{O6SqX9|;?o+;`V<)TH^5>~K&j>EA^RZ3jC*h{v{FR<-a-?k}Hq_~Xu2p;a&F1VS z{@W{3AfDsvYk(Mr09_<>J#BC{+t;o{6M(fP z{~SS|r{@>I{o?lY`y$$jqz9J262!tVw~xbS7PGL8BOk_L1xJ_G_et z{DAFA5A#%!k5LUX)kPFK4`{>lPLea38==4rfW6736j;rOh|(dhp8U|_gZk;^sh5Eg z%~Vf{1y+24p6C$w@853yasjiYmsC6g;hAB0$#BO4t{`p7rN0er;W5dHP;w3g+t=7L zsQA$+=qE_Fay~{j+>{d@K`GTGdyjm=p1capr>urUbVRdi+iWZNLd4t6qJ^^7nm-tj zO)svYO0&swh{BD-4ZgU@(i_&dK!sNrQ7JpUPCiz&EbA{T+^U0p>AWm%NE z9c~yO>CM_PUE+2j;UZ)RD4ZMh zBL4c)J;ngD3|UV{450F2Q6iQ2xD~Zi|MjrGYwBaL3T4Hq9^k(x&@R~uAxc$s3I9t> zEXMIcXb&Q-ad2(ushN_~g7qpQY6wLU8fSI{Md*07+TZ}fbqb(<@ zuW}6y6(Xht;}1~@E;r#Wn?+lx>W({DO!*IN6SR037%qg*{32%(h%p_KNvAfEK74&s zYIyb1;FW(FDoJ~1n~38mA7y1O`{w-p^7Q;n$`d^{y?QE+g7JZgTXeQr`y+I$NkU2R zq8(N}xys7$z0GNCM7l?k3W48AkBZ5oLcmUsPoNW_j{TyyGxB!(_l=pp2ye?v;n{Lr zB=U7i*=0tK1ro$?gjIjJ$=ux`fSKVg0L3h3RTBD>`y= zMie5DI{q5$?_Hat-);9N^J1Bazb!cNG2^kJ){o@9_6^ATi_v)yo8LR*W#Pb948rY~ zvWmF7qn5@3oE+c{PYF^EWgZLyr<&0stdtTXR=0kn`Zx=H!CoXW(`FVH2O58}$Wc35 zs+Y;v2qEQDi1kH{S8ZEshS*|X_B2xIRiMnwqAKKNV5CV2TnE~QEju@~xfvLi3uxKO zAMn?1;k^1BI#?{tI}LR9W>%9diWk(1NzeRxlbR8hDYT}Z@6W$OQ*NsB+s*d2O3sRG zfJu?tyIB9)*d@T%7lVd7JX7ZQMqWFJ691fOxL9LtPWK9f@86 zh)F6jLu20T-iC(t1<1Rw6I7>BqvqdhO{~Z!q19aX7Fn^mei(@s zo?gK!_9(_1Qw@ybo^KXt(Zn&Be9AzW+Y_bQy6R2PF}M1{61FWIT$BZm4b>X2z|Awp zCg@q0B?L>Ii$u-E_|4bJSLp(kD=x!&@@ALYp(Zuemw8B;=+G+@@g-7~V8ghFUBpXJ zSv9ff=y!Ix?7ea;$kz8v59)r{%g1)P*T0~LM|b_Uv(!??+^Z2dQP{E41^glfZA}j5nKaN!GL^*U6WM=}_mXb;dYUS{h2D1Vw zJF|FE@9_oC0YAe>_|3Mj*(r&AgEX<9ImhYjwctYho#`#sWit$YJH&Xz8O&;_ zS3YDudd41Xy6RV>On<9P<5usYuJA2%hNc-{K2&4iZ#u4ZVXftVUI~?n!f?DKbMO)* zHmOq}tCtyZPj5c=Exc^W=7ED*@$Od%__eziXL5k;5_ha6P)kQF#0Q5eOU9o3R3~vT zk6TqF(B_7vNRoeI%4|-Z{bIVJZG;IAu!}U(oROWFkt#<`mliZLr{o-25@6KK(U7vC zR1NY>=b)srcG zQI_atT0n(=IZ;^mp_$%NHCXQD=i>HrnN1#Ux+u9z+pRmj}p+V7n~r>(5UdCp<>Fa4Dl=Vlrxw4-5U1; zyH25s+1+91P2Vz)3_GhS$*FH?ABl;r9sw$vgLbVoM$>G`a0ayxJt@>_*ssxd+$HWn zk-qL-p(n)58oJBK_z}d{IG&L+{T@iSCl}Nhg$tV=)jlZeR`2jb*?IjKYYxZKEHX-G zHm=c~J}>ZRNlC2ve>)#C`m2S|E`bd}P4rKKmbKLR1g7Eldjk=Id~%(UQPmh0PqM3l z3BL0=3KxB0(VN{Y4}S&%9b;wUZz3Jt=u+t^WWFGwvDqehhuc(N$LgeCy`z3TWuZnM zm@#HaWdKG_`$c0&#o|-ztIs&_D;WwxqVIs)qlxj(X4w7kU!=BOHM?&Xw!s-#{(I?E zWj4=47DwgJ?>{>}1;Yhf_AzD}zljZ9V~`XCXTtrFY)m1r;rA+v6LIsl!CZR<3PF0r zZ4UE-MMw(fE1wh!7Z;P%)EyLqP9Ep00Y2sYc3Be~L4{u}3sC)56M|j-tpSsdW~CVD zU1Tp9xu9M$!qzm5G$%np?Iv_JZhQK+#_=BIQnu_IDfvCYGg?$;tLpCQa5!F2-1ZRy zI4#PiLx6&562??Dmj+y-wywlE@aP!bNwFGl{y#`Ktua_DwXTGLsStn;m&N409eJX43eoOUdSUFx?H+(Dsx^WXhIAKQ`F- zM)x!?=|2fb-g#fR&bLc!ef*_5_zWN{!MXp%p(#k-1;jpdA>nj}M3i|9Ox%TGKRrKP zJbN6l{qMQ(r=%WQ=5(UZf(O+o2?Ho30Qe-P~9Xgu5ES=(yRdPE(o~?mTH_~akw>hO+g~# zgtPGU1aCp^?@5ig!yh&{ysTg%=Xy&*dKvp5<@s*gQR4pl$|xcGcKDNfEpMJpcjeyo_wR#~;!Nh;tm=MWCw=cP;w&^k%_=gNpAuJ;b2TKp7se5A(xV zSs=*#msI1%ofZctaVIwWEvdlVlHN?NK%m|20@-gZEe;_ee4m$P z)`h+`#{9^i81M{R38S(ufo7#(Z{Rc$kJel-m*@;ch3|{E#9Ve}xrQ_p# zNPebkcKVmH8=ZodjHRskskzyVoJbMUDs}cwDhp252Ix9_eAw?gQ^T1}^j+do!8v@J zAm%~1yrxKpcrjGsGU36Ex{H`jr6+`Ivqh4|k04CJLOILgGs_b_RC`A%r1ZvmL7sty z)W$##g{(8}?n3kEgFA^8aT|Z2>2uz4#vZ?src9XiC>MLBr58l(H!hNNm=*jLVHR}O z){PqJm$LyJE{kZd~o({+eB*4X>K))OW-c z-B@wC=N9$J2XPC3Kqr)o9B`a<3HXmMyKj&Y-{HMR>e10I;~3%Mk61VrUH5J-5=d!& zF5f{p2w*bY5FhKHcs$cr|EFPcX39LMWmYTr$s>f@_5y1&kpmJv6WXlG#nVNVD)bpB z2t+YCxUDp#HoI%tz7Eti%ECyGzD-mO-~i0l!$@6QOTtm;evwbf0TMMlm%XKqADq6C zv@iFyRXnpLNnWw9Z8Tp2APKDH2{U9GIb`+dHgq?oz1gOKvc@m0B(ti&2L5K+n^ZDb z`sx`DF}KA$z#wOx>(7?un*y0Hw*?Pu<6a_vkHe<KV|*pn?RgjR!1j z25FdqAIR8if3!TpQvu>kUPO>j?V@%d+2+(5wb^7(iV!2L$X)2 z#R5S{_jHXc^?t-f6OqdV^6$ghK2cW1gD{0KfAwBpZaO8?Kx?DXAlHv_I!}JOdcFoXJ^!|G|r-R*D^7DlKgDkI2if3wpThFUYo@9fo(N7wYSv?M? z`Bcj`r3q{ivo1aKojJcJq+Xusf}yv?)2eVhw$^AF!WUh}_E27|kEV349fIP7fXDFi zdpLAnVN=czN7y2IuG=C%iorQ54rkX+&)y&-YE&pj{aZ2LalTMx=;DrYP|+zDsH_TO6^_;Vk1x(?bs;t&yK zD>-{lgCkT>>e0&%I?w~0EzmQd#&jkIJz3ZDldF#IGY1L6bn0EfDQx;=WfmtJ%jk|5 z(8rCI`fUxzXRb0wZ-L4kQp;rg-c$ElvE-?)=O>pE!YE(Uk6YUWZ-#`@WZ_P<>#PYT z?%2meA2`{)^8S?hR*qjV6v;8;YC>sGjlz`w% zZNqOg*a`{?OBz;J%a0rbV?3BOx6K0-)P9#CTCeOx)a=Xs-GWz_&s$#iI|L4ol)BnK z-%S4>#W+3eDyaP$WpBPITH|E{k0Cw4wDx25+lNr|LOIM!*wgL5`6*SF&ziSjbzU1H zUW!!y>^FwW54G@zyrUUDc5h1^Zamx+O-`>E4paS#O6!GW5SDR5plzc0`!jCkHhh=7 z?i=RuV?lL7*9Stp7k3}u@vArPwIeZDN@8|dGcffIP>Lj9?B2-`ZDtCfx=78JWHOV?gEej@w8pC%$0vTu0JV^q)p>Siim%U&U)V z>QbjY@dCOXPfpn@2NCNqp||(f;TfK8$MKe98V#(==<|WFp$!)#F#Jl==VyUNeSS1uigMC)5%ScM?(1Wt|0ca0yPG{5 zxTpRm(F$p}xEW;18>mf+M5s4D#^XnYvd%~{c!x`HaN-l2)&Dy{968q$i0;kLe}x3o zlQdQcdG~NeWwuz4m{#xDm!I+7wT_9P)Z+cR-WAic-3u8N$9yZ-^y7)ZpcjIERNS$y z=5+5T-dJXM?nV4EFa9Vc{GZ!mEt36NG4Obh86w`#g`{X7~5<#^Cp4FR}WOtIsPSd}e0B zafcd;@J9*)mup&{l>{Z=kOddP5iViyEAW|^G+Yf^k2oB^2#0IT+0%(WDm`|m>IH^s z!Tyo3P&C?dZ#USuBvx#()(a3BEtK<}1*5m9yl)X2sOYvse?~MG_+E}OrIj8&@f|<9 zqljaFX`C?*6{J2Ys7B9WywTS8F!2*xcEdAw23||N0?`l2msRQ7#(=DRw~ z{RC$?(k4-!n2BRf-A-ZEzxD(^>bsZ>WK++E-;IGhz$&S?I2!>fIt*0;)(MrJvjvbu znB=rE8L((&>?S~JH8#T4Q6a|zhO(HAJ!FLaN#XuYZV#+f0I@SB6Up<}5}ljYXL?Ol zc{*BmmiRt}X{eY`zq0fo-*@TX=Mj7=NT|ZQ#-tuNTmehW$MxBnda3EcLZ|QujrhWO`kktYmL@)EGwE>A;d*n zXfscZ61EF@W?HfzGqdXgaXtvr?VN|=#ah1y$c;48h!+0VQ1%Al87XuY@*Qy;{W4IV z+wguP12gbcAOu9m33-i57L8*f;{pnhX67`TS)NG9bWV6J zqYnm#qxO@NB1+5Uc^d!On!KC+#6QvX62c*nEt=89FT(1Yl3$-qwIAW;Cv#&*&Lzm* zcax}570iJ(k9$+(!FNw@?eV)XE$`fP+_`#L{0dxybMj>*a6+m9sR7EJVwpai5*54Q zd8QYLYso~^J;NP{v4iie(a(a%JHvZG{XHM>-WXkrMeL)~BD~V%AKVK#AVc(uom6UP z&(bwo>9NzjVC^@>JSkh7ES!b@&vIi}5Q8|DXO4kvu#)DFy~DgHRWI&1nd=27 zXqsf#Q;sB5>)58v8JQ==_b4xdp1OvaljYh1P0fOjkdr6*79+hYe_a9-GoKHYo-Anl zkou&xd3cIc!)ePvSVe*}6Q1T1X&+(2(NH#dM3)VShBCOa(Fc(XeQy+yaHO(T^s^$W zzT-wM@&IaKQ^}aX#bK)#z^;V$Bo7L9c6IoX=x;in9sb<`TzJe&-CV@H63$b&b+wSY z0@S&!w)aq-&PhFc+D9Wv->sLh?!e2;)2|H(6doGPNsk?4BAAwQL((l>8{rE5>HIF#*bm#cRY9TbW?VWX&KY9%-lJiSj8EsSC3yTRv39xT}_(Euu!682!)IjZOv5h zyE1e}o9~ndl;8IX4;7k_&`Lx_RrX!+&eUKkUQKH*&qJq3!FNIaVmjmE6cgdMn0(sg zt#}QIGiOGc5Z_}F-#VKopSoSE+&rqGe7`aY1J^{4995%h3XfMm*flCEZE>f0sSAm9 z|Gc=t4lMsdC&_c!-yDf4xM`RxwY;$Mtly&ecRJ0aDRlj#(udWu zi=Dg#t6Ch1w6^8h_AYUWxQ4ZzXD?jZlG=M=uJi!}4X4D%Dpk|?HIB{W_|Ci!O*SuS z*m8cQ{*O4k#fzn9EAjh7FcI@hzSSfZMwVx~@^E|8`x9TE&4L71Wl%?iC9iFRH%(i9 zhr`I4^QZ;Nm>rf4G23TCB)WU=`yzv1iU_d4+tW(x0sxB;oWUV}y2%%4 z#ks@F!(3XC7_Ym-T)@Q*Rj6ktInHY|c|A55*Fn!bLvhB&k!lVKZAS|)h4rT?u{CRabK}mv*cnWnq*abs zG9!*J%JaGhccAbkE`wz$o71iqsg*pFw7%Ap|SxuxHg3O>!N6N^i$!JIowuxNr~zIm@O&T%!HetktsdfaEo=TE}9 zuQ{p0orB;-d*cO9d%Yz9-@T`9yla{M;Mdu+ei8VV?iSYL<{FqiwABw&fdqW_d%6GE zu*)QH!!e5E;5qsOY=PGj0oPF7SA6O4#e|^$BM58qVN$sS^I*n{?N{m(iO{O*8Iw1e zanNvB2JXZ8=yNH0YqOiFwVxw$28zOJ(PzdEr$yPKx5oHr{Qf&;@AoM9rLcY8sx}Wh zlcX)v;y+e65owr|Nde(v)=9%_6c3xJ{k`3Wn2AHPP#vTa2{ z3YA%pOZRoW4>bx{;3mr3?R2|)tgrl-+;EPb7U^6PF%^)X(XUA`gHd`^-zQ`XtIY9w ziYTm{a$Me3IN~bF@z_e|xNxHfa+h1L3u$R{gnMr~?oBQ}*lAFtgDWO*FaNP!sYnjD zuPE+rxudfOSHl|JG7B=`8!C}plT~PLsGM~L-e#0cHG3pNo`+GwbxZi#V;2dg0U?XiVjl*5DU>SDC4=Z<+2RxNNQR1mN{iw~p zv}uWj*E%^cJ=p2hV|FVC2eN$I!dM)+d7zF(#FTX{$Y#4!aFWFPxa94OI|`g$&=gVL zvIE(z4~zMa)@+AFv-VM>?Wc9Cy_-LnDNCM%)aH2N65V{&g(=5kR~tr8ydw$|;CVI_ z4B;#Uxz&PW)WUnl_i;_a3Yk39`n~agC3eUuy#)LAoxcd=`|asBxJOsfQ2E@DB4D3K zRai9+`S2TJS#8%YoTw$={v4_W*7KKbB&+<8ITp_HR5jZ+upR;aeVk5w4*@rmpRCVh zmRknCVQ6{4xgXvCp}g2Sz{F_O>dwj};eEZ2f!=|HEF#Z@20j_|#luU**nm>4e6{ zQh05?X@{Lq;e3n{gRsef;&jdC)%UvFjbHbSM8R=Xs)#t?#XTNA^0E%6)+;xu13Gmj z>~6L5AMbS7X5j3$94Trvk*IIBk zC(|<;AmXVu`x;MLrmV3WL|0cC)Gwea^3K?6!-D8|nTVUXXBw=NHRr_L1JZgMy$)s^d1&PP!? z#jtsS@}sJU`)*orSa-kxsr}_r%-D4i({=yPl>vP3h`kZ@G*%uaeqsL`*!fd`crdGC zgAMdpI+?V`ywqeqrezI85y*S4d^m$S-CY+)M<!eaI$zUVwA!NVy}5|9|C7yoaEt{XQlln%BS8q|0yaK$m21>0{|!C%dLm6jnR? z?sK{{AWCO&JHsfyhU89{E5RuOg8ozMd z{qtbX=-s!*OtiM{yYF~A5VRSE{s5ZQ6Io}ma0?Edp@l?lJ_v}IUW@Mx%+Eg}I<<5w zfzIUaA%zjCTjLXlUNJCE&(AZ8lKk^N0x;eu2Mw(Cs!y>iBM|>GOXYmJ{q+t!<*59$ zQj+(^t98bIDVge6=2CmzQf~;qeYNNxuUEl8-*}8u50B6LUnHV>58t097DCT@@8r#o z*1JfN7wQwf+)i<`zgC^MB0ZAx>ka?!kC1^2Z8p_i_lb*bk>cNLxG4S&cbF)X2yLG3 zhh2o!{1xn+bn`+*P~@Kg50e@S@kUCndul`UVDyOe9$*5uK0qyZVcVeSOvf+tXnS4W z@jN~Kc4jvTR2ZW={4RIg>=nJ~X}-E@n5ev;YUBJD*d>wvj%Q4D^Eo#g=UiZz4zviC z&60Svob{^q?A~V2@on#)^cHsZ6Ept!vTcgzbCS}^2;JT72ag5}n4W@b=^w=hMx2~J z582C#Dd>M9!Tg&-ZE~JyB@(yGJs#-U>VQE&0O{~siUWN47&4BG3v~Ui$=UJksdjHV zn?4Csps@-pl+E}v>NSM-3R%a+0Y-HF`XnM2B^-0}(!xmfE7bKY!_3&%03HFMZx~A0 zvCsS~>5x0Dfy@o7IjUVCzOsrFGH@Iog;jDo>g;|^@?W0_=^z7o%udrrZn^>}aa_pQ z4IWB}BqqkZ;}gwj=I?_;;N{DT&2Ly3QdU+>@dOGiTU!#-QQTO5!4Qd9f-~2Oj8L%z zD+4oig6(N#MPp+{mE;V+VHx6`%xDkg@6}Ac znnB7HLTutM0C}%*=un8|p+S^$ajC9aK`t>5eR^qgnInr;+i8ier(@+N8sjmJxDBLR zoNJa8mysHw@YQ&je73oqar+YI1;E0iYdvr4FmwAT*&7RV4jDM)2K8A6We}w`#;iBA z#SRy20g=f>S~s`8t;2x2kkClc%Wd^!E{gO5$P%9~bk*4R^msS}V^0&O(Ab^p5Bnnq zt5K8Paev;$g~VsAnRkpxHh}&hy3La`M3`pwK!Vv8QR_tkgF5)k_>2wtbPj)xJrbAG z4Zbl(MydYS+*$=XAjv<*x-`}vc;|OimvGZ7f>lmn`TfHYSNZ|E#!RVPabQ%U{8AUy z8Z5gFQ%}zEZa3tyiz4*gtUgBBRX?)dwDRAtWZaU;grx;%8lQXz-k zwO8WGawPJ(_-1nNi|v_^+-eG{ETVsfH)wRW7St^t*+6!qs6dmz5I2CmJs5r< z(bxi|Kn&txJyG&Gg7s&mH3xmVRL_z+*?f?%zI@b3f6$4ZP8vg7N1S)H?CSaHaLjh0 zPx##ILhynwcPuN_`In+$tieV#4a;w?@n`CJ&iX!HjmBB5B+$-o%FPo+V^yXhh#a#7> zyXnV<6Im-mdL~BTDlyT}#<5{8uHMC%Oq{5TiQWPdNm4d0qS(f%N0}Al8S=+OABoDK zuZwe&a!3u{q_J4{X`SbV7sGoDvnPXI4(%g6SH~4DP|v*2Q%ZM4u=~=L#2f%{f8*?A zN1MUgf)w>q8LTRY>^t;Lgp`H2SY=8B+fcBRp3C1h>mVm>FFv}V>&Bh6!hw-Ob3*dN zp90h4vL_!F^UQJSuLU9#Hr4;wU66{}AQ6GipjB5zj)^>wo_V^RE6U=S?p2IuS3ei; zml1%dy2?uy)+CdapHm)BtYLf|`B2!(!U}mnENd+W3*gmExKxwleKr5zpZ945EV5=&Sv>gWm|Mt%K%a zc3k@nk*{`n(N{yKINOmuXg?I(@hV4ee!z^Bi~7}2L09^=^o{cTHQ?Ts>^33W-_)kF z=J;&G%7^_$BI167Jd?*X$jR_f#Jga?i8PRzip-xJ?#=`cFGPyPIVr>1 zZNATs0Qidhqtr~+B_j5^*>xjv=JQFXXW$j5b|xG6vrV$E)5NRAkWXB`byA>{!F0g3 zM8{&HAfhl3Y|&!4@2*9=`iqTfXC~6YU~Q}be7F4^9r0EWG zeyyz05(HTZl|~|we4E@F=)P&D+@u|1+3~O_Lm~fK|GbQ-%55j^xJ3zPh6&iwp~lNyFJzcNjaOzR~`bY=+!0V& zqVQV!WyZ_UD!KXJ(lUbFqOHB$nv--f+5NK~+iS|&mmTc(a5BxD?#HP%6WOUBp7-u; z?v_vO(SmDkvfc!;(|XgtJe>Fq%oSpGB8;i%m%?tpF19VTyP*x?zt53%YHW}HJR@T* zly+`>WsX%KhwK-GDoqR3?O^-ZB2dkwj@XZlooNRO>MZr>mO_RaL>F-)BSGd86=DXb zB5<-GrCtUZ;))iVDGy_Zmmdp_am)h5Yh^HP(~bJ)@pg4KZ(=CUw6gH2biH=)L^o z6?0?Rvj`ajk^hF4!=}DX>ov2%Gf8w#EQ(O5|c{Xm^VD>f|Th9%6 z^DAGi4akj5CY&AOZd@4)MW5e?W3Di*JUDBRC{wMtpz(4E$Fh^N;iU^w%?nJd+%=Yv zL0ckG;tg(z8@OA}bZNqtG3nVzqD@)VT^>wqKu+l?LZHD6s=H2a3rxSCGq-x(RGu>! zjs|=rSqk0!bpwLc+rpw}HMPMPNo6)AEMoPg=u@@^@$J_)CnfW0aTuPpmVyA35l}*n zi8(h7eqJGFOf0;O5Qw30|CU&gB`Ik+(80b!{&!<+9O((caLk;UGgocbNM7+_7f9+R z*@{L@%r2b%Qzh}R&B&?!8|`?$sboju@91^#$go(XbfNeWe^RclM$5T}d~$Fn1v15e z24SNXm2X@knzi#%BZbK@3!q8Py~E-K+luSTpV@W=#L_SHG;L;8r6Db|Ea(C|S>X6U zc4pnolb~*h$q}0hASNxv;VJTs`>&{qO^h}NPR~u$nP61MXdmjGri<;BFwXCG>Tc?Y)@+20bMFWY?~Yt$Z%6iZ#dU5@|8z~&ehD>tf3@ym@})E(>*Ss06P zPd=lyXHyZZNPpO+^9G30WAm~KIV9)p>+Fo|dCROl-BXE;{IfA zU9R%D-5n5D>bCfI5_M2iG$^>R&@&y?P7B@}*>oy5w)O99L>hx=>XB0WE1$~`P*3pH zv`GVdD$?9!0XE~6St4RRxGIeWfuYbKdC8B!Qib%QD1tw>ox?3jUA%IQRE z{5l!h%5a_}h%PR62VI^lPB3~i@v>99pZXbt`}E;D4{@Vw`<9uJ>>o7Cih*}$*m1(O-dD3I`{%25&g*;OsgS)M%B(6Zuh@L= zT{5q7ipxGXAV>>>oM$E>%P?(F}hqAjc?{IX=1Y$1n_uAVx2J|N;hix6lh?x_Vt<__D_w+ z*_7X5u;$*f-JSFmN*R@}X#Em33a)nc1<2S?kb+N>_|Xmy*icjIFckw{&`#ruVELy5 zT4UA1=u#W;0uzv?6a*{C>G&#iC#7mv<0S_qI!2=~-H9df z7_|a2aKF1IC0IM$t*=H0%TvR0h<`4tZ%IP8#F{&N@0jCYxsjh{MRvW-J6KEP=gCPr z1|aFr{`mN%S=ya|{$>k)eoGVOexYC=d*S4XW{O~BU!@`RKQai+*;VmX|G<&~G8Zg~ zmQ#vj9`@k63;HGLUli5xlEuyiemo7Py zUcx;CU+5y%Tz4{8E^u)lm4~iA;&-Ngg0>|v3o^^2t$d`CixVi{3KLXoGUn~}?)W;) zi>^;ivq9h6kh>CIwPphk+Sin$O-a<5<$%5WUD|FrURYATy>umKN%mJwm9hZle+(c>QkxE?<%d9V+~>ur%@Y_zDe{@af5obm z$g@JiaOZv#U;fx_jH-HkWLTSFI(>JtObp-`g$ZVFgK1~3P4e;Pp0Vk-Tm}wYSn>!T zt*?CR6XkRxw)NO0L(@0xYEsU#r9H3J!7=%p!PGzE{EPw;RC(M{TZr{fJ)cLk_TBU& z@}8219uHGoAM%r}6SR&>0m=5-KfD@9CoUgZ*84ynkw^yeF%5<%DzEq@mQYj4;M_-3 zxTHF1dyA8TUAUH(-hUHY7wE?uKR_}BJX;%hf6E?E1zlFd)0Ivn!9TRzVfprCIy%(c zoOR)wujkj%rp^lO*EwY+VsX>z!C-cIO4j9tBQ=SzdeOkPgQMVkTb&`W{;L#IHQN%s$9I zDrj#|kPq<{T4chHtR#vLl{x}H-wh}av3)C_s=EowGl-&Z3KRYdxj6ii>j>~pstN13 z1>H;ffqgqm>0s*@!WaKo;{TU>Fk1!T19sL?tX@R%6qQ8-c~oO^IDA8ND%U~40z}0Z z@}q6?9d8t2Uy1K?Q=q)T?516D;7Wf0*;;Zy55bW5PS#;~l%~0Y-WtJ0pEIt-B9@gn zsk6d7KZ4|_)4q2QT5%Ej^_vDlkUl=@pU2reMXkq)H$**-mCTFA{8ksuQvAQ1X&(-UA4tp zUINWDEYp>D|3gw(V!d~^=Oju>2XqS*j)s)4UU*W0*;waeg3H(f%tZnGf+d`G;l6?P z*ED$Ity7k!cJDSDU<`OOHD4Y{e6*rpN9xNZTdBS!@`mBIw1c! zRPVy9>yH$iLUh;Ts_Q2u>E-+uo+It5MRKo@=e4q#*0RDN>V)iU>Kk?O$(D9Ws571E zJhRi@1=G-IfGJOLc-I>=5O*b1)?cnL(X@@=to zP>VL1G*S|HXj~2Y{-hJu{`OqB)JQ#pn>p0auwNC_nMDNk5>VZtan2Vxl#|0*8lu)| zKJ?9sik+y#=eXza;`U1HC;0apCskA!2MH_Vr_Z1LLLQ~f$X$pwG058WbON)Y&|aX0 zkkk7jG}-vDb#?jSQKHOV@{Jk@0o;P}T@_;br5jBFUJQNjLV7!#1iVPFe@N zzcW}Z|3ZNav$He8UhMxWsMvzG&m}$w3GR%7dm&-IIJ*=L*ZbbYkEjMA9^u76$E>x0n!nIn*1MPROU&y$&D0h1+`?bNU9ZrC$@@ zKU|nF-!0>`Kj$Qe;pXf-URozN*yG$;r=tgtQM4Y`8idW9vlJc!MiqG$y*Sx7Uz z85%!SV~3WFq-Gx}O0d0;zz|D$6&cHGe-7W=VVw0rO&~MLg@&Q2HmNc`zuJQ8{~g#f zzx?4 B|$OwNk?n2Y@RA{m7oj5Z{&Y0fLJ#P8KEljo7#tNpgzL=JofaRiQ>TQj=U z?w*f+$%;}U2FI-|_x7(5$|X>D&uN84i;COZur$}G&ID$(q+2e|U#OCS(&@JO^cMqP z$%o_I>(S@1zK>b8Kmn`NL(js_rcqZ)bOUe2-6XX>+;NSw&Nc0u_K7DETeNu1PM}3Q zvxiD@`v(fLrv^VUBRI>$Uim2VH1ubnGcS|VxPZ{`VX`2~BKP*Z16)E^;*GE#mZNY< z0Vn&%5~LCN_P(WyH>(u}BOXu{GhPvqQc?)}66e;g-=sqXm{f_Ce41;OLoL24^`&LiCq&o7)9` zhZ6D2#z3pK&UIX}a5O)<*DPEQ)Rlj!h4OCN%s~y0ei3PL!`%%uLMA#G_9cf0s}rH+ zW+T5nEkroL5&%w)gNX1Q4VUuO0C&N2wKV`cmL&-jIf{4cEZMS(;dN8Yi`aXUc7myd zyu2|6AUz-L5NT>D&P45kd|-P$!uN+Y!*0%OX2XzkjkvZFb<4ycy4EzOA<#5@QXGuS zZi2G5FYm7=t;1JJ!eou~n4?y)nt(nGojg&F2CPXhzSy8r zt5j`#Y3PTYZp!Kzq~<-pMg0@tJD;`q`ZG^ETz2?pQWkZbz0DwyrTp`gr~*#~$0%-& zqAf!{xkw)G5M{zD_#oM}@cP*fdQ;8V3*dO+5n8GhJGZk!Q9zzs8UUO6N1({qT8Z0+l>Zk4B)x;Q0 zs|*O9DdleeBMX|}mIK}h?>KPhDM8ikD*g+PWpX<7NlX(${1waPrCde>0`a_TEg{~o zV|ddhL;eje@O3uAE#3#JmIE6zDV-^Nd$q-_v`dhhoUDlKr03c1NVf-uI%ccSapX(y zmNne4JY#J#C28z!WqF^8#+?F#^U41dW8t7(GMk~8N>I_H27tz*n4IrC@ z$?aroTrCt%maGa_g&4a3F%d?#b%zf|R##9zgZ3!hk04ciEzZI8YtVLKrvaJ$9b`ns zR>rMG1D1wEtWENH?^)55Ss=GG#Oh<241%+o(}cMI?=mnWZ30ggjiMOXt=fZkaZGJJ z_n$LBEHKT+^?MIyA`MSSIkGL>z-J?S8+PZY;u71TthEmGufik5X_?f8aBj!(VcI*`>`fY84B{ka3EevTUJ!gj$dkSMA#9YRlcb z`>Q*d8{0t0CE0rW3goUq#`X0-)(58fBk#Hi^EyqYI(N%rY4rhi10iVw%`(vf?-*#0 z8}mcW7AcF$?ATsB4FNXlZ5I>vS5m^MLs%icc_p*JYO`DhZD`EJzZ)aU7GGq|N{8B) zDxGwtI>Lb7{|7Xt}!YBdGdepqpX^sDdvn;_TB=>nrcqI27BzD`omTJ+2hwnpoVHamU{ z4w{G2jd8-_Y;%Ew#IcCfR@LvvnoV7q=3fo0^>8XcGeOqtm&sVuDFq{_BYZBfGWbs{ z_$`N1dnC_9(Beg&k5BLAa*0$h6&&W9Dey~=qQ>597VHE6!}6<=t7Wj*S*A~a(r^&W z(~aj2?~8MAmE=^}^^{T$Qdoy13Oe}x%cYah&HON!{qpRjFV-Kgg1N2Ae{Z1i`DVpE z-2N#_Ez)l|vVYTabZ#1s{QHRvsz05xxNkgCMB)H?-tj?DmiQnR1;NJy2u(fOo99R5 zD|5uLT4qE`^l(IfYLov#msNZHi#rHSoiIN^jn8Uz_+6X%thr~2^CIFhJKdw2Kr@!bql5r3;#h_=0k%wwqxydlmze`-mm`W#H)?w+S_w%F7R)RUopk|Y(3GH1_w2ZvD$#iJJqytK;}Dr zO#axU_2KM)ShkasvYgU9x|y-IUk^0-a9{hlK)WqqQD$qC@!lbYnCjRqYQ<7tnF+F_GiW?= z*N4J=Nu=gFrG{#-)(;Hfk+VlUKLUeueKerB_{Y#^1LMm>jRpTkqR-wJSG6pnMIskt zPr#Rn9A9R+@i0<oR9$J5Ut8MVhb4^k6h|6@^psse~xVtx_{%Y_{v(~$M%(gC)F&o#`(%g zmb7PdBeD8eBqivu&JADPk^XB1^(3@rHjNOL( z{o2N(bc@*|Oh#_cEch;tg;loA&PO+-F9bu1kd_GgKg$=D+y|j=6q$#mlv115?WA_z z_Hk06Z73`0j)Lwy#Hv}zd1S)zycmoqEim~8+o{dP!^J%fseFhNhr%Ju4^Ja3qUWZ*eWU8azp}| z&q3G&k>dNXmH8wodXC?s+QM65%KKvM;X^D;!us2p75Y|YZlCvi( z$y#*Rsa9fMCh3;|Dh8xfR4h;j?t?IxUs;!O4HXmFo*wK{_-8KW{_q8_;+cs}Rzec0S{y2{ zuhV~O*IBC#US6y+lILh^i(kPKFlunlze~9xO)4TXq+(Vaf4C$GRt~+!xwPqs&WjRI z9Ow`wH+|y)L}fK^oW3O9`ovLRvY`oJz$ zcT}=dJXQ(A`}!H{%rHJq`fr5&cMa@wGw_rN2;$6BTM-hlHjZi7CwJoAGU2$45rFIG z%2o5c*o@v|LyZa7DG5?jF0xR^P?owIn7vWww6rWjPNphMr*T{pM>jpw zdC++5WhzyCXZSjasc;XyqEc2)v*rd5t~1E7=x=s$xZ5SDJs+f5 zP>H^=5-R?@yn?ijfNuj%c64&=(Y!5>t4X8;AD8GR>r-JnQVQ44cxjgWuavUYxSjrN zFaYsK_5-nitXLRxomfCUw1n$km%&RP@^A+2k@kBT>n;4MFYQ26or}M36RO<_ zRl#%#pIxl3w&62AS#upQCu(9Mx&H6HNwhr|;LDf-Q)6uAb(>Iu_{(@24-r(J zS`RrDRthgXEL~tTnyhpY-D1!&7g(142O{c9NZjKf-&QWzuMA{q$2tZ_|BV!n{Skg{ zd+A|a^KDkxuizy~W^8xT<*g@HN>xt_bV2?>Qo5sBtTSO#A`$Bzn*-cIM6IPR9tQzD zfc^RPJ4`yH1;YUU^gb6=A=`2p%yg2VdkGcZ`24_-+hEF&*TdVi`TH=S~f zgn16G8a-Lbe}9@b1xi8canekA}URsVVWY{4bVm1VKdyeU)NUFNsF*d2hgSRLI}ezTyjr$U<$3{dL`ok%IFRcLG$^lS zkhRih%Znho)zPk20YPA2@ASk@4Dqnt8sC~xT>AnI6REFaI=UZi)*sO zgnD_|B>EPlqnPn0QYY)lqOqisDM^!A&dsWyN;jj%J)+ZKzJh3Ib!9AO?WI)49Y zRwKP!KyWZ+&)2=W!|CP`j3x<}&Z1E?B*8KJwRqP3tvA7>>*qfBM@!Pm)3r}}wrCG< z;+y4Gm2ZNs&IEWnoyA2W-xoQY3)jVuzA*f8*f>4(n~0WJiPZ)muZ$z?;a^1Um>SIw zQF12o;0Ui$*10FH+|h9tf4!?p5B{Xb@Bkyakv#Lgvxx_dPm4|HbuJ^i#*Vx&f1q12 z&(F+>7g3Ii0M@y!?{~=0hv?TR>FvX+-jz2ha#^G>-Zm)JV=LO$LhVc9lQd(4vlJXR zRXhCBjz>3#OMsZ{BFy>dw%b#xFQ1sZnirlf%YB#k(`VXM2uSL@ay9rI>g+&h(e(m< z>#9mpxvS8bvO0HA2CZ8F4L#NwK9AzOH%J+ciQS3Z-@%FU8E~EW&ER1t172@T0IJpN z39$_mF$XUts%DC}W$omI)&#c^iv(ZwyPD&_p(0*y zuTkh^u0eF3JI;OZNPn$!xX#$3nQT%q72Ts=1!+H}tWanF4XGmv z>IC+v!C8yVL1pE;zv>pB#nkE0h5$c;P3H`3goeJ!_V4@~Nw7i%zRIj;4ch>!WyqVs z%FApzG(X#o)U9=d#n?@Q6B{>LRv_tO-U2gp)2sGV;fi#a+@Yp$#*l~FMVM@m{C(CU zyZcTxQtj8tMgtv{l5@nY36sy`JbznDE$>&fz;4Rf_!d3 zkc-3o=VBjFcwwj~laB|n3IsdvF*j^SB}9T<_g4l-vqTG;HliwxPQelXOy}4@K1p83 zEyuk=<*nfY>UuarS!ABjxRu5&*?Y>kKz=3958#p?FuMAQbJ$r2sw}$Q&Fv8i;AZ>l zbVBw3XJGZG#~lbUV)?@&>5RDgG8bpGRmnude7%7_aQ=lFoPr|}#G@q>Ndpu%#qV1v zfl*-744L4aK0tu#-Y@(p8O}#%=u*N`c0!;9{f*>ZE8bdVE|IE)G-dCRvg)5l22?T^ ze#4E}S^8~;n?@9S9X)@2R254i@LyeL7Zj{G4W2Ge|FwPBXmUv^3@>C*EON&}mBPCI zP+OqK#1M?CM=VGNz!-3hHZN7aN3YZq@D%5ZW9 zk>CP^4ycb2eX{bsR`VS2KfFr#K8KUOG~92xcsiGZ>&DJ}SV`Scc&fHPG8#y1L6m#w zOx)q6E-M}qpbGljf-^y*Cv}pFFxgstfJ_}Wz*bR_uqs#Avo^-kXY@yVb_L2gv@9w8 zZ-@j9iE3>v$NrWa%-Lftd>#FMgqLLZ8)Fo_1jwA;Ofwdz{5^Y&@?2(R7Q*M9uj_$y zvx|DqF(Z)F^7liSVIl~`lbH; zwra$-qp4LSpF2*m#vKN@kdVh2aFx1Xbyinl&6<6N9*$SE*rOVxko7Jh2!Dm3j%fFVTvH_YHx zoLwbDy~}Lcx{aO}wISFl)BE{F6*+Xw&wGG;hciid*%9lFq9`fL`Um)Wtc|Sb6^+|H zn$<#X&N?o_PZ@3dj3&@E?dL_{4?cg>of(3aeuW8=q(M=3ta|rYw(o374VJdJu|^WA zC_xcP+su#oiQO(VzrSa&~JsW>M z^_d6NV*bGTjyp`jV-ac??my1{cYxhAhQ4r;KImn*{J;eVra$IF>!e#tHUy^QRKJ#M zkKNiT;9U^lHcmUB;?SrYV?v}zdk9P(M(e$w3qlreamDA){7c8xnD2`K+cT*n&8$}9@I8iQ%_c594bR5li|U2y$R0W@o2UGwGw>>$dt=T1=lea;&Ov7R7T7>1>V;76! zfBm+Oz)OIgO;w*-_9ovWP2Vz%^R}*lXPCsAlAbu@9Y>T`lX+N}1gsVS z<|l=6IiWT0uIPGHe*r)wmxi?*SVbdR@so7jgGag2vX2r2l58KJXbR(QJyTrlk-lW5 zeK>`JvvSttPMzdIGi^gpwKCARa08uEN%lZme`zr@xsB-=n1QHEx3`@5cxpgjo z7El*~k3N~>;&>+Klkx4lvBxSTNru(9WaqMC$GoQj#W*v8e=9y`n!CEc3NHN_MoKxq zr!@`dfXCTFnDKaP4a{o(CR2OjAeX1AZWXdgcPLHfl~M*oW0uJBOKvH<=9mUQ#GVoJ zYNKKWy3=;x2R0Gj(!ckm7^k+j4BQl*?Q8#|U}LmeV`F>hC89BVEeU4_xMEJ>{E)1^`<@Cx|YfibkrmY&KS)iWFL1D1 z7u$|2qz7Mf)For#n9%aVOd^N!=Pt5Sl1;IkQ zAx-^cTU}GlG5#p8V5^i~F2t@j9lx~{Z&AE;caW>>MCgMLkNk17z0uT{9jQN!9tvE= z!brq3Wxh3?r0pU=q8twXpxFyNL(}h<&wg+E0<(_JkhSq@G=0_;CA|LkCEj%Lk5(Mh zlT8m=&Prwzw*WGq%VPo1Z$nyn55`(kpFxG_|1@{*(NK459PfQya~ncKE)@xRXUa9X z4^r{Eyb2k@M8-AbGVU^BLPk_0$|Z_&*NAZ)cOs!^#@!f9Th56Eir^5Z73E!s#l)g2_`Kshs|S+}+aq zk9zgL@Id}9ocDjg_x-makk;KbzT=hN1hDc$WUP}?AWOI&2(Eo}U4etG$@T@uaSx<5 z7f1mht)q}&eP+=6h5*!REQNUD$BPY=6{tcmi|(%*Cs_SK|2t_|Pu6hIbl@0!84bWf z6(a}kvKmxb7JG3lJpYWU46A{UWwHO=hpl^m*|n$kga=AMsw++Qg8$Yk4BLmNL%5+| zScsN`?73;IZGLD;-PmNiauOr4K!I4#)<9qCe1rF!S$g%rov;sW|AGYu%(vNN`4^UX{u1SQpWO(#^37) zl7#TU-=Fl0XJNL}mS7cFXcokuDB`+ewv|Tu0{vOOMCFIg; zi1L7oX3$-bzHxLvsA%1+#xVzxz&+NYp`KU#Ng#$7a+%Ngw=q8q`VLvj9BQ;+?ApUg z>Qrn$^5mB%WeUhqP!Bi?U(eA=j@d4@VJt z$D>IQ77BV*d^-yn!rZY@tDU`W8~Ro2eXgSWz#v*QyQ8THvD%>S_sUl{g5yFW?x|+* zVY_mt*4C(qD(VdEDLzybZkg?}s})H*;n_dg5|5?$&ok_o#+!K0ce*j!Jh$}$QeE+V zG31H2GD~AkK>4K8GgLF6zp=cd+jgBR`N`ykg(`yFL}V>7!h_)sb=IY?w3d^9 z?N}5rg*52fwRXMRj$HZk3qz41b944SmzWO{O(La*p1T(MX-F%cYWwoBC}56w@aX_~ z7EW+s7mz;Pm1s0>^+IPEQwC^7qNxW)#cz+E-Ffa%@ATV;+2RfCHN& zXE(%eB2 z3-Q$Hti9O$@d5wkUb%@FCeH&@&B<{GQcu5jIAq;?6p25b(*=`3rk?hJua6Z0XV%`n z@oDtTO~gelAM#GShKpoV)GM?4LQf05bsPnv>Xr#svEHF8v9 z^>IH(77fa62{9${B4goWAxKTe9YtU1$d^m5Jcr=2 zaIQm}p=$H|YTtXTVtLivwCl@EZ}=Yb5dPNFj82b|(o68})~F0?vPO`;Vnj4@9!K=f z;4N~rP-Yom(%g=5%|!2ePG}kDkrYm-cU{D{IdYMh47<7VoWUflz)5XIFFY1?+KIf- zp1~rfcf3@$+LnTmQ_;D%>uVW~{q@u%SA*Xr^itUR8U)wAUTwiR%(kQ#h}G|kN>G=v zA{s_pn;K1aZ4`FDI)1>lUq(7E`$P^D3lGvB>{HBsrkozap=zTGmNSg8pp%Cea-K

k-vsq>9GOKLg4MVUd7KMtZTNdYh))KC7P&fc zSm5c|;Ui#=7@9;1%!t!PfT4#1nxJ{=5pL)rxjC;lq}4~pj&k0Yo+47 z=6=zL&UN%_a^aukcF2tk%Bd8#EeOqcQ8%A`2mzTi;qlsGC>myDpP$`XzX(N04?O|P zcmybi$1k+|=~G`XE&3^V6j(OiSdY)!JIl&+rc%ykg96ezcaqP7pMgacABomv*Q0si z7HhSVskv1 zlJjY_A26P1j!xVg*w9WLD%09aEe?%>A9a`tZZ_2&YD9b2-wQrGO3xEaH}TxY2h zBG=GKt%VexcTH{k`p00ptoqmBW0WXsIzkmsOE(|zd$uQQr~kfQgsT))7^uMjtiv5; zKWtVxoAotyS3ra$A^^KJ>u>AIuYc5!)S*@)Z0@=(ClzIw?Q2%Evi zeQS?&T%PZM9;ec4KpcUIpZO^gB6T6!cMFVhoA2iRatz(_yz^`fC}6CSAW9l2)=GpG(85&C((SSEddl3ne5I(v#Z! zzu1dAwKkJY*<$nj^uQP=Q<~){GLf}NGreerP*xxxGnxD9q#emN?#_EA-aBP4B(Syl;taqyjF?=+d7*^+!8}_T?4c2}Jf-#J#@mVvo1TVF zgdl#CubAdcw=p*VXQnnm2~)r@#3zv}GHsAfqjPtj-yn^325JU9=LT+8*y@}uhyyiV zSkExMvT45NM*Uqwx_Ln}CL!drLU}H+V`0N$Izd%F*`GY|hZ-W_VGYHoKm&pcT~>LS zI=7)zG_+4B=ImQkTTGoTAp~qroDcH8B5(?Ia=IyRl;+I4Z_c=J|C$5Zi0n>`hZ{jJ z_G7n7BtyfbiUqu@E*%ofMEI`_+&KD&!^XH<*!KODr8j$b;tDI4EiH(q9bOzVss61x zOgiso33>8`wgR>0X)p}RKWR7?s)A1Z13wfU1+ti7&6ou3H?{ zmofjCT6LP-+nKDO6)r*nGgFc&7H`qAZrh{l8U7m|&OdeOtC*eLR^6GWIaF83xd(08 zvZn}K8UDO~BsnwsoRE4=BLPYTjC1>1jwLA>P=?t)YXtyH>q~Eggp}%6x-rPrc0%U@zV!b{z{jT=Dt zgvUdFrsl)!=4T&v_~wpTD}qWMn?Jf9b_td0OLwO4oi9!?=~0=JjLPbGIQ%HV0Jf8;P}b$7`C6X`WxtAmYALn3s|tr$GS{1^sS;>(C1rw z4(REx|1PxE*4aeWvpA>g|LKJg(l(s)xW|i_pYn%w>sHRcB(@N%0WOHN-T9e9jak}T zoMplM8Ngq5P4gYEsX|)wO*0KD9-X^_2f1*(5NqCxbt?IQWa;7`*L3~g)AZz;xuFa4AD>7K&j0`b literal 0 HcmV?d00001 diff --git a/windows/security/threat-protection/windows-defender-antivirus/images/MDATP_20_MicrosoftDefenderPackages.png b/windows/security/threat-protection/windows-defender-antivirus/images/MDATP_20_MicrosoftDefenderPackages.png new file mode 100644 index 0000000000000000000000000000000000000000..2ce5ef24b817c250c271cfd354bcad3712174978 GIT binary patch literal 36294 zcmc$`byQVf+b*mkAT8Y>qJYxfAT1y%f^>IxY)a_{=@yWVO>L0aba%(5MS9cSXQ996 zeV^z3#y7_K<2&aY17YvA)|~5}bKdtguREq8it4=n+ESqeqX| zpFIJtyt-LN2L3#DRF)EbR5nDm1$=pGDk3NH=ut%!+KoOU@EyhOy}IM0N0{vo{~mYS z78pHx6rm|CE~4V5vkMJ!eKqU8HhbTZu|OW7Zay?yHL+&~=~q{xFM1>M3o{5$B1Fud zE(Wh*tJlV*im{;|q#N)A_0zj7^ge#P#`8tcK2-Km$jL#ThwXaeDIXusyVh6Hn+4bW ziM@pTpmh*4ZaR1NOLpDM${;M^8#^bb6I{_}RQ}IJdkF02c0T6IyGQ-``ix3*IUaao zMDrDJ6S!m*q4t3$w)XwsyR#%O4YY=ypXB`S>J%-q%rWVS=juBpA~r``U;dfQFBE2f+S-rf}b zV`ntCY>U?xUZuiux)l7T6Qy^2puQ;Yv2AJKozhO}&!eqb#C_I3qn(YvSkhr;VqB6g z@QqJ9bZcE(Gv!?)Kdg(8?YE1XLu`CQR&=gMS`JG`XkR7OegtYx+YOjjPJC1-?X{ru!LA${{yg0>Ah(<2^J7&Cos48m-3EhF@#j zXHAEWF|$(b<4lW#q-?W_b)ORoHP~#IR38rc=5f^#|Jzqmgvam+$YqEM~*fwV- zohH}xWjMDN+P#jXKbQzg_Apq_5q@*pbU;Nd=y+jDT@@u|^gTz5Q8KYQdx|~^wE=l> za?mf|*65{&V7<}p^h9D}B0ngI-y@KKFtPE|&O1x6h`AS7E4$2!gvXr`K{hh@X#G1J zqLJRt8I~?W`XlsAP%O4~mEL4y-W7JiWak+6B+p*vCtj&1|iF`A$cbeiPj>9@Fcp#@r6T9`h{anW->8*fUo44b1f+b^9e zX-tPP*~P-pCeOdUWqpELgcC$0^?|m&>uD%niYzO25k^jJ`pzYG z>292QVW2B1SOfC(emUffBn+c2QTOxs0*pP7Y&nBf&)#}?vfx*p`?-wqxDnMiM}22* zm>wg`JozoIepFbVDWNB!S&f{vhmzjBm0x=ef8)lZKWc464^M+K6>NvffaBS;42`Ua zwWtTOe@d!^R*8#zvIt7aNXI(X@>U)61w$i;%?IA>`{o1$c3Dkl)PvWH=&W`YI{FT} zC3xaMYFz%a2DVna>dm+knBAF6Ag?10Ne_Gap_k<-GpOdi5>&}|O2rz5KTs3HJNfd3 zpw?o$A^T6d8Our;EL?1wa&v6$jOPDQ|C*Me1+s7IFicB2;~C3~p6&J4h?yNkm6tzK z9_xaw}kdQD@sVhfo@RQPv z$7yTpFIYxLBh8!U=V6nh^NY2kpg6VaX&8D1-9m`}kI-CgFXj0O&QOx-37fe6C*072 zfX>c@$UFVm*?$c_{C=0ym*2ma-|6*Q!A96+nIL0~X2kJZen8b*Xeb&|bQT1H6PT-~ zH*7cj=ZB|V3N1tRfp4NE_L2!{aQ7OH1Sir*LY}OovKl`Am4Mn-B~!l@p|;(NXX1 z-OVEI9c2H3rXCWjFepJnVx~IzcztI47yfEq)8|JN;E*JF4rlp6^9H>SmsXhs6Fr>T z?9k1B`A%IOx6P@B-^F~VN{(Y!e`aBXCLp6uT~H@<3HgVh>k{=#lgnX%g3 zKlm)9`+p30{~O2eYNxfewLg9O#FW?%g6rGcR}>bSySdGPZpbF$5)(B`RpUmnjU@~X za|TT`b#xLE=wB|3j)HD_Y0Z|Vrq)w^4ZOXZ%F4>Jvh?-!TQw#AVt6J1evwg8_hX4o zD%#q+f@hB?Zx;5w&*8IG2eXTBqc$WlwmV&P>z%g3gglQ^mp**>;7^;tq@n2ky9c}a zauV!qTssGaWO{zf$cXIA&VIRnX!@n!=X6rdcK+ufe3so7|DTrSRo#seI z$tx(xG6#HkYJ0oJ>{IvSM~CKhFD))EuJF}p)N-Sj94`ZBIHyMzxHk0f4tc-g0}|xq zJk3DH`+=0l#ldmXEqr(A+I+o`mq%0h)Y{rw_Zl`$A>>IHR6Y%co{?xl$WS*^6BEyY zQE>_gXo1#9zpuJB9jAA7N%B~gCMRsEo{aoz6uwwS(5;gHs}xhS2~k{&jqb<$cYFID zAkf;#mQ&MV7imaH$o1LoM-!5c?(XKR?czQ=uo?KVmhgJvrTI3^~ zo}Ln^^Cw2f$DejGd$S4(F8phI)djX!V8w59nZ2YJZqZk-b0}{M8X8Ew)fP}I%ggQH zGpxJ2FNQ=Pykdf-qrB4qQmVSM18!zggRGGXEH~z&xn)6B z)tbDR)hwA!&>T`BQ%y^a?v9V72#c}^{2OTO$P4ukxasqnSBzJAutBMdrv`s>Y{D5nffrs#f&y>H*XF?(&v z{?~X^Yx;HiYXi~*L1&9lkOt|(!ouzCz7HkMb;Hta*<&x^)86{i}>6C0JD#M=By!)L6)|tT692r`xkNhKKIwy*x1z6)MM|2N}qwXbak0I`2qt2 z^+vpemxHsa%ii1D+r`Dj!vnTr_qkLRFHN4d@9QovL71_F z0}kie21{Q-3tdh)YB<}U56t=}_=i(yXlMshdKMNk44f3ECMI^9M=v-xQRXmM$lfYZ zv-HvBJjn@Xd;9mpLyNW2{QP{SjMP-W;*9ik2@KQ%yr77oUp1^xDRLS9=kul~_%mh| z6Fi?aG?Wu7ltQFtEMKIr)IHXC@+JqZ#V-7bB(bqd--A4H#Kv(-ZJ;{lnTUK(n{Jd>Cobjf; zR1`zs&ZvS@KD4cG_{bY73HzB5qyib+CQ0Rc{U|Cx|*RA$o& zFUMdvOBKNCKHTs;$@Dxzd6=$$^#go*J5B8DQ*A$WtUc`}j{bN8m5x2s7`PZ1Ku72KcY)aI?+VUyB9>>5vDlvQ*q?|bDFKoIWBdC{+h^jsI0C1I z`onqkhNakusK8nY}t=|892Ya8cwb6eG z40PTsaakM@&bA#0bc;^}T==3S$xXfn=6Vp_=HbGh!8MEjdF;QZbi0<$2NLt|vfL8< z)9PO{U$B&YGb#D+6LhK>*9`0VcZs~ij?_s1UGNE8r8^7if1mU#Mv`S+YpWf2lx(lU zdwQASH~XX<)=s~_g$9oG<&h7~GAjjH<`oq-7vwc$7cLn%Ze=&HZ=6cyo0?c^AfXmF zgj&>J1<_9J&2bwPT972AWJsLM(q=lHL}VF)z~=JoM{U1;9V9(CWc;erd_3%a%LxuH zb$J@~QjBMXawiL4=v;CtE1FAPKag7QlQS0YLwNIQ*(yT~LPG*2DBWf z3&uIC3^)|kS^v({CQbI^>&dPPl>UHnDdC&J3d+0nO)PIOyeM$9^DiBhtF|@`ua&u% zdmX0hYT4dn2Di5>^v$l+G%Ehda zB)AxFNj#j6zj9VSftfjOuw;ClJ6v0wA(%qDq3E>HQz(;4G|RD{J?*JmSgi|?3x`KA zGDRxzv2;T6J1tL~d9>|kosFFZNlDyqN2m5;x(hj7@~{1~s+*99tt|AzbR|t5^aao( zju)dXHx{c^rkPKr#BVnva!kc2C%Bw=w8sOCok8;AHy5?EzdoW)ZCX~qBGVd9Iat-Q z<2g$^@gw+StD3Wi3TKxa+-b{x!fj z?;f1GNDG`PxeA!P4ux{b%_ySO5<1aNufIDOkD2rMP#({1C}ZuiadcEwlQAlLe%x@i za6k2!E0KNZS4xBAfa(U#)!sY22C79h(oRWz%5qZgWY;mSfHyC*L#H;w@|ibXFxRzN z>+9Shqm_X=zkMB1#1ARIz!L6~)m^JfqXzy_=Evbk>uRL*78*X6t#$3DwnKx1#b$<< z=eFlsHwOpt$+LCeLc5kIQPAqnPF4-o?oT5ODaoN4b2CcgBQ^WKA=8U|hhgVK-@V5y znw!mwYS`DNCdRz_zTVIj0&2iymCZ&Px~4uQVnR?L*$ z*-zGHXYH?k_umZH2x>1(b@le90%s#EoFma1$Oe7j64y^z8C|U;1suRH%bk?DD*Cje zuIBES(i(D`eqX;}qrrX<*1jm-+Db0@Mu7g6T*!w%KgZS+5;NK8JzLC~Z2(^Jf{X&r z=*-U4o)SmPY=3g9`g@|mu}}>oTB&YpY^BahD4@3)QJM^sBL*D1vTQM=mS3xzY5r>SeNv~z4xHj*p(&bM7}EnU72lqA#dJSS2;afh#N_OfX9K_= zZ76xr6%bGQFgzd>Jap3uGG#xa52GiM515Buzp~bxE{xp`&|D@K~Osp~Tw4 zLq6NVvLikSk>w>|V?eO0Q(DwrEK{Xzw^blZOL6u~j3JvP>-z(!z(l)UOWwR}NlS-c zj>*phzzQuiua4>Yv2>*ad?aqqO5YO(>`Sqg8*kXIz1rYjVGzwmpvHZVj#O4*NW?2^ zFoRJs4fV^LDS@qGZxuAhDhe4@7Q{$(GqQN@fkfMsZMzaUog-VWWjI*D*fb1pz*!Yu zEI0PpH?s#xa(gB3Fjo{pWh@&qf2dNT$nKJ6yc@zLpoNK>PK5YG3>JwE*<~Mi9ylU? z(w;GO6K@n%B_odQYjm5RN+%=XY!}i2X_Q15g!D0LA$`eMvhTD#r%&iYTCn82tuTHkUW7wT~OV9IXW* z;u3VX$Gr{rJB9)Pia@=-+)#ILvUVyMFL#@?qpEcYhd07sx$wj7^`+(1)S6KiNrw5k zaEDKuWToAj%Cj%hJggjytjzVDU1xGctsKm?ZF`^s94(>;9Qv88w(f?Rjur%`$f6&= z9g(bD#Ngk3=o*}gVMU`6B~3GHO)>O|_A_s*_Zohnhz}c;4HHR{u64NlKmb(!J^h$O zyKQG1Mmug8qjyRY{b*dt7ywQ&X-ZF)951YloRl-dJ>fT{QIUcC+8@ue$9xX&W-E(m zhO5KM`|ZZ+0w$B))wWZ$ z#sv?{(_7ff4Yx$Le0~wyRkbO=EzI5Q+XrZf_DA+j%PM{`O1!5_gHn%Y~PrFO6UatM;S8%oHTj6BDhO6kWW6B82pcR<5SLot&phe{Tlo;?&5c@$N=@XX=}x+D%E*{55rxyh^su@IxX>M#E5>fSS9G47ktNu##W<^5 zdx2HM4506^8nPmO89iFBEbV?ZI(LXqQ$=nr%K;hL6+dk3?*Zb^pTEv-caW@z+mGd@ zsx2%=G?l}N>Z+ThvbWXC`SbOyS(&d?xzBR|82|oTYmP5?Pa9#iGPXkf)WXQAV>zkb zb|yS-8K9nQuDEX#1ikEC{M8uN8H={WbvYz;D=vB-HM8V$ zrP`YpIo$Je6>{&VB5;z@Pt=NO zvlrCu)@0A*w&0XO`Z!ocPp6;USF;1lY7hH3KIXG-G6m@Wpmt92>pWHeCNl&>Q^yab zJZym!sZIie1p!O-S3e4xPT4b` zBC^x(wOjz4_HaHfisCXbQnytX1B*{q`Bw25gDceP52-E;A+ckG;FfkZWh{T1)z@BU zCIo>2P@8>nF%d4}0{jrDB+VwB!c&KLZA4iOORpNJ+<#3nA&TdMXDqkSoT&F(96SCY z6UBcPg*s>5^-TBbpeG)Nbe=wfgRkIu0hjxokfFI(Gi|Sq!&qeIcDoykVlJ_r6T!v? zuhfDz*)MsGzqd9F8X!%LyB}Xl?|W0Cs@7_}h)cNNqLWI?`0bOXsgJ7n5O$@&pXjF zs_9(EnKP=XZ=S%S7XDC%SBstc$>$XV1OhUe;Rq=(Z$m=(ZTC|r2_UJ02!^p-=L-io zj3s+lJak#vSqeCodt~2Akfdm$sfJE~+zOJ{%2~Ni!}#qmy~XdsEp<0=-Ntd-ae6~M z#@w{9!IvOVoCaVY6O}sRtZdt?C4EKNS%my)>M$1`21s=c8a4em7n_YU);Hx`?U-IG zUHjj1@UHc2hgl+18m|0n=dT5`2HitFh~`^i6sxiFX;yFy>9<9D;r%u(XEo<3Dno7r zCMN3!Y?c)SC2HKvs{Z7@Z@L=|d}Mb(uZl7PLZnl#%%}%gCLe%wlu6s=XyioFHI1`3Pf`t{*mqno)l7EN2GpDBAIrPUy#ZFeJE%t?G= z#EG^c?LWSb(?-sNYf#`nPkDdVp$YO+@^9xrnb79e?>aeH>~jOHXp1 z7VHbM*@649FZyg>jULyA^^uyGZp@!uy(cO$wRdj^3-P!LY|3jJntI#s&Vj_1lk)RS ztGSc)bY?7nI!;fVnb<_I+r=I;JgTcyvr#csiToA;%@i1m)1Tz?C|UwFc0z@6rSv%gx@3FK9P zm_MgWxL&QkH2+oC8mBMa-OI{;jS4j)MXQ1m4ao%eNhwk#=Ck@AWtsq9N88q+_$YH2 zRicM~FgX9Z_xl7rl4^WA;mh{=$Vg(`0gfs9K}3f zlb@X(L~|lkf3tn-Xa>JCTOG9vn+zNo_fN}gc14Q7_PQTgTfDYSdamc(RypeH!x%{>m;<)I6clIoB>o@1Q>8bdJ&Dsf;!b=Wz_H#N2Ngi?hf%19m z+jJ%;U6rM)aH+U-`SV#EIHwgKJkft>sW0$NqPwhR1NOI8rD*2QGcrS@p)RLUg{0uD zRczwZT``-7yo}o?G&K@>w9mYzvBQSS+2A1VlPM2^0L{40J9)cU<)m5h78}m91 z9CfunD%J7+Ha93UAJ9^td%J{3H5w4m8JJME__!7{710PJTN~@^@@?G&kLBg$xNFZp zP1MZ5_eg2E;;MABF{cMEei(X8f#`!nnHU(7OUt&1&ucRZn?8=SmlJX|h($1zISp6^ z?Xqj8+wH>KSt}Me`OO_$9~H*bW*lGTyeHx!R48V;g2yUE{qPH8J~`3T z8~j5}b|aDCYNXSV9>Or9#I^Gn4BYtQZ#KuZsg*eY#Hk(v4JWyw51zL!5hGoppyQT~ zjs9flXlb}rl9{{Le*5pY)794&JA1vM{}rh^c^&o8;6Gwc(GS6j{|Gvfusv|%|A>@{ zNj^}ee+9Q5OwgjoOwap2gJ2lM7&CukXa9Pz;4u5k{|JL|e&#s%A91k2ki9YBeG~s9 zQd(}A({S>i!k!!x{hx}n{lCNp|2Kku1*AZjPvwDBB1#f3IQ?%#`9{?an$v07pvJYm zslf+U%=qNY%uH(k=LoDUY%7e|K-!8w>{@CxKtl8xD{8wTfo%wo8ktqs zahH5X71(Z61Cj-L>>0vIVqT~AkG3|p8vCae8c;LS;rk~si-Px1Q-dJ-P%-mL@!=Bs zvxkbB=ywlAG^{WFRNOp4{Qs|kRj-b)2M$z%T-YAQPeA2=f%T{K=Zit{8BBBRzzRP> zxc^&_&)o*4TLZRe@cp0U3l80l9ylyi_60a(YWZ}OqT>U7XlQ6wXQu?vxX0z)-_cr4 z>a?6^FL(Re844*Cd#K&n#bo1d{=6VCBW!U>fh+2Q@pt|@Rd*p%3YLRT zYHAAd@;WtA>Dmhhc?(A@tNI=u9*$=o_V$+G#^Q0~VJ1&tKE#*K08yj_dXL^&{4C>4R6YR?LK(lI*DSCRS1; z1`B4f&k7DEPCvxDOD!pygHdK7|J@CYU$9XvPmnPGqw-j2XutURo-he#1aCT1O#6yI z+y%KB1+*Y+A?Wn_^~)kRd;3|<(_UKH{^1vI6b1)`-xq3I6 z0Qt6mpE!fOHF>Pv&aHd}!%*2i@kCK@HN-WAmX?;0;8_65@$Uwcct{w$p;{?U0t?g2!*1OqgBCT?RrG|#9hO4;I=2r7YB%}e7a=^T?jDVPE@(63Q z;dX-w+$Zr9r$X|@*dRu=bZ609i!%~LZ9@(*!*FT}4Ol)wjoujG{;kw8&ktomX^ax9 zyw2*u;Qia-O4t3x#>PguYeV#lldbUp#B*ya0Cmt?0F6JB#~O||-|yU-bKS#?3J;af z5Yp6~W)WaxW7`%YBcb?$6cmVz6a*+O39_vS<80j+W2owERgwHvqu z1sQ{eGXyQItp%O8RU93wCamxtw2GAoFyp^k-`yo8XEIF>E_v$iN1-q9e){@esY4#dQJ6}fPyr`rj(y1MoPdgjxa!io59OQQN ztaqN*mzaPXkOq*M^R=Q}d{9ud-1OyYJ%1}%f=AIK*4pFjW`GzP00wXemjNBW+}vCs zKOGl`SLYki9upI@w`a4YDYV>Ks#-j+oPARblw5eq%!Ar{Npe=~3=E!7g@>@!n;|PX zW>F&@PI)9{W=cI7!yase08@R_@n@=|u!kWQb!_Awm#BAsOz;KQ??0*=iyM%=>l^ZG zi%GY);M;qfa9A1?$!@HC)PcVn02_emw$RBwyZaoVSE%25xL1(^m8`3G2g3R)=21^D zl?ox#V@Q~H@5}(xsRr!$!3x&kKcIn-fLa33!qO5Y4$fC3dwY8k5fMNSocW;lLxD`J ztgPKpl+7Ne+iU%a!0460Rnrg%B)E+`r?Jb7DRF0|J;;KC<6U)Lo@6!~;Wj%v`~FgM zRNKKpxj%r0Lz%)+#Mq)sv(oq0si4lH1 zRB6t30^^_{Cx_ath#DGF_d%ghnpo-Wjg5_*>}*t2R7D*vt%ri1we-~EyAFnucTh1gG0eo+bv3O+X%6*7i)cF!fX;GEfog@ty*Nh;YuaSF?l-R}Ys z%x`bq&fvuBq99(N()AbNUki0Q@9Esi7%I!iA7!Q7pS@nUUApUJ_VK!cU(PqSb>$IU zY~`)1;*pS~l9HrulakavLaQL9IgnClE~K=qiM9DV9j73> zAa%o!YO)|jYi%)WYcCHEB$ZFvvcRr7iwVe>$?Hf1R7`Mlb2Br8ArO2Q)rHpixj9li zyr;t$8|0*Pf#fJICo>6t|0}4?Kac#U_yxwoTZqiD&v9K|>vam6;Dzi2Fnp{>` zSX@%{W%&mc-rKju{q#kPH@kDTjhCwC>JL1|h<~OxRSfUr$B*1L^S-9>Vs+_;f@fDF zSz_glfGPvlxV^W{DGADgVxpj!o11UlF~D|yCFR!DUG6P3WMyT+cIE-Is~P%>aCJP| zA2k8zX5(y}!jRFszN8Vyq#iK6pFc_pepZ(k{PtiY^HZO-L$w&F zqVm+!d$$eIdpBd&uz-m`zACcEu5QS|WBdENO%@UW&`Sp3=_J{p6WECwDzG-{F@tkE z0CKF-%C}S6DlM)6Q{e-2IXo~hU*{;LZ3`4Ze4I`d(buQ4s-A`4MN(hDii+MILWmT- zszy#v?RSXDV_nEb}wgQDA!J$wj3np|#7Ex1E+WHq0lam2w zCsoiV?zq^3q2 z|MlckvtkZnJWv(s76nw_{NaYdk5Rru7m1OOktYQyz84qMzj|fV$$SU!=F0Xz{5E)H z*V)I%$Ik8`S2pqG%a;dkcQ==3XD+tk&qd$A1GYDRqUY^%mgS9&a3{W%s$CcU{Y)DF z=mms7B)Ad%q0GEz&mZ_>@a{oS|EH+H-V*%yq2+TNx<9f%+!cNQ{eg@UJ^#yRzW!fr z5UO@SBd&yJEZ}}mP59zT#-j&Hf7mxMARwU>*DC%my8jW+_}wT#`g{1)b#%@WIKCgv zR+%m$U;tG(^fj~^X5crWY~RBzz=VW^0MkGc02Xz{Ylzg1A|)*?POR}>oq>RZl$<;r z*pM(Nkdcvd!7n0!dK_qX1}m`S0tjw9hXt1G92^{+oUg4}(CQz#H%wBL38tgd4-5`s zU}5Eq+0^#)yh~tbWu>w`sGodOP5M>D#KffWF&2GfiJWpDO)Ltcwi)DRT0vG;*3;9| z!NEaPR8&KQL^2xkA~`e^b=NV!1rL^v9j&9SO|JZwp1$3o5mM|Y*ot!yyhTDnGBs{I zULuHi_I&s|y!1&w@}l4A7ib&ISz&Lzg;GLEX*4wTUet43Q8VI*FEhQ=kE8r4LkFnQ z*u>OSRz}8&SwO&&laq6Gb#-xdqq??sJegvmhrOiFtCsg1AF(<8JN6q(Fh4(kYD!8YGRc4m`w#-e zR4S>yx_V;G!9A*Xdqn3!Ux?>)RwKxae^v(uA`y)&F6wB%FVR<1BkU^|GW)(rotr$h zWOlpP(eac|RZVSY8)6(Dosd9-yRtiFD5X|D&GXb!A?V!pvrnUbjv(B`$458;z+%5j zCvn+c@#dM7#{oD47RZp1 z2h`e&l}AKO+}qRhUQSLTBk36v@&-cBQ^eTbr=}k@HN#?`#>MbTwy*)a4(odd2R2c+ z$9m7vU+0U_@DpdC?#2Z2Y=-#KiPnTnGvcB;1r0&%(DU2$)%3&>s!Tpq(LC zQFE8n|M>A#(?1^zO!g|AN!f1$;NDMQtHd4U-|$^1Xia#;X?UtcW!yed|A0gG6*mJA z4GdXxT)s4!f5*{#zN>1;&RXaKxG5fVIm{Vm;nd`aTVK&x-AqjKv}h%n2f|8Nf(1H( zV-#i~aV(e)U5$M@h6qYsy`=U1Xkxps2!aW5xkNny_K{0ULCD$r^c29ob3gU@{|iBKaB8}*nN$j~~r1Tlf4(a9kq3YcYR zHhMu~s}4eAaclZAIr)AJ?D-=0VGXJe3doNLGez46zH~i1ql8 zl9?HG?wzJo!dl5C{idBjuVER1B@9(sidZ-G{z`<|S}Hu`WSO~hrPXvbB-STJN*$e! zAe)O!QYsCjukxKh+d|uU%lDRk1H16TG=e^}6!?%j!Z7ZX?;uZkUp#il=)tSxOBWx5pMN3=ZuV7AP}J48+zf&r}%^ zZ;-`7s=hL>a;Czj(FuzCpT`4;%f^U zzGB}rU(mUg?l?=M!oNykTmVSH_a?$_{DfWt?C-vWvh=2Kur@wpY z{sDE_*o!cDHiqH|JB;~KuRbM(Bp#{7oq>!!1MvqHd5kZYX|)pn_o?E3JHSIQ|NinY~}wfBYl)g7mSiH%lH1of$46VZPA7 ztJ5RQBF0rO4qDp$7RO$)@4jM<_AmXV;-+izVOe_E)$DEadescW3*;8OpPvx~GrfCQ zmSuK5nR4aEaYK5==B}O|3}TsYFt%@T>c18FuGX8qM`Y))6%w>GKLsMm`q6)lX^W*B z!a-9ZEh8xIdy8rm?F_SoBbgkYTu<~CawvvWdIUU!Jsm+}jG;Pv&MuRC0ZPV;$cmt(5*`J45D|f24$|NV5u$bON)|MauFsdP21>vk!hJU}p;Bl5IpDW7x~-m_ zRYXLD+lHmBZB$5z(tga?hwFq8ZeceWfuW%x6C)!$0)k(q+M3`#2ghfN8LU5NEd7@a zvvYE=zj}3qC!s~{*$bAilJ^~0xKVeTxyc6d(!F^j;##-%u7Pak35OUn??kqBo^eFX zAq5um6UC8)l>)^U1_!#;i$9CvjAu%H&%_*vG+wCi)IcrwH2`p0j56_uGYbn5*pFcC zNGosX7#Razi{dFz21>L&l5NRx5^;q;%1}+lO#Uvw$(eiliO!G%4{tM|pb>{f$m(U6 z6lvXywZCTzNd?3@s%aT=ZBCs7Ag5@ixMlTk8W<#P0{B^_Q)Vfu>mJ) zW^|lH3Mwmc@>z+|vD}U?wrR@ZIJJ4*N@Dm26@XS=UeI zZvT)|Yq0*~#~&CMGuB?lqV~=aEmj@UAd9^j)T5pt&F5&Jt08;Rc$t;l`0-aMA@n!K zXH8~fM62S@e7@Xjji&wDboF&Du<^%1?O8Skt%YAbnNUw*YmbtsUgcrp*PCdlk`nJ9 zmWw|^v?iudFHir4jdb z75nG-V1N5ZX2Ngw2?1|H!@~6Km+PZh1h_G)Dk}j`Y=mNgl{w>Mc({87S>5{*&!o7+ zSJ~g+F~fC$qewMqNKzOkfM2JgQ2pVH{fKfJZeM}8VG`GmFH9OzoLpRiAC~7v7P#pV z9lBVQCs_q89R=4@q*SD zbp00xQ$$ahos%3&NT9Ez)nCYa0KA|=Qk<3lEvr!WW~52dGcccu0pEu&Y$oFGRYM2G zp9NXO0^3w1+}8#AjY_ghD+%wTtgbZ9e;Qs9bn&@cZ5Qa(;&x;A9E!=8{G}7E@;ARC zZidbx;Dpf>XBfkA=QED`gRr^a0vicC#um`B2+S-9u^=uiZgG_pTekX_>@&{#t*I7n zP2auGKjWr{EIRXtUB|g1_7!_N&f^;mNWL=I?HZ}hv;O?xCO1J{ly1{0h+LqOTJw@f zh99j<$xn|d4YP2MtuXG(hAPQ9l;a&~+boSo@993_*R66}OVbNwARD3-_gDfX*Q2Va zM%K%f1&5r^EVYnrtgSh_y1F_$8=IIEU6*?$r=+wwmU7NNa;XE(phf5yS^rg2z$=_Z zwbTN?_SP3ngw{UG=%}cu7~NQ!twnNJjW}QC-MO#D`~@UtB$SZw07vt00_N{4|7K?X z<*Geh3hn9{Fu^$ax|WrAxJdt*l%`}Bg! zvIQ&WZCInCp$W)ay?wbrT}?qLj`bgx@M2tt-n@IT_VzQt~||SW_6s! zpkf!3M&XY~I{{Zd8WvY`oe9l46qk2Ln^=VWO{}`-2&U_xvmaQaCTz4lLat8Q@ zNFt)ipZM6Age^z}$#JzMz#*mJ)-;z7S`g~p+pS+q1Jk$t%E!}*B+Zo*7jLU)F1AIx zml&OH+YS6S%C|__bDOJaeICUM65rn$t>wtg)4x39JCQsAO0w%NB{uCnnHn8TheyiI zkH#XBbQ@jQX>BtFD9_y7td#44s*2_3@y%Du^U(Zcg6p^`opX!`avm=rW-~6mqvGt< zefN=D2ei{+D^&kHKFQYA16-*#>DtoTd^Z*1s7A36A|rJj!|J+jVPt*1*jmxPVbl8} zCQ5lwH4$A@X(F<>;0(rLlT}M&6r}!Ht0Obx+&9{}{55E|I*C!5lD}#(6@1yMJno}Z z2HX8Xs*_%Lc_e=4v!`%Boa64ps(Ebu*;-+f9_{r0cb|8+7cu{qm~5YrC8#xU4}TP9 zNfw#B%hF)Gk4DTrwC zVQFn0R2R;9rza#tVgGxcF~|~T;7BF_I<`@fw3k?o@0s!OI{vI9y>J2-b(9kJyp-xL zTgRUkiX0Y^dZkyxC;1_k=u-SZ8$Ec$*4u}Q@6FP760i5+UMoBIbx@b0&t6}9)@Vp_ z9b&w&gcARY9M}$^Wu_oFBj!GO=nN~TX zxom`YuBTP=9sE4+fF%9C>FmtyKCH`(EdTiwE8^)04R0}gFzTyhHx27)Tbr_p_Zo5# zI6P?}Xh=K*y)H;t0zKHHuCGiJQ9`N7;iri+XDY!%SSsr87-5$AlW@A5Q_u0~by$;W z@r8zMUuJNz>R0HV{2lunSDG7I(ArWx)NR^F*Wy;{d~#=AFW=E{>6+^7%Jo{b&9+;& zAvGypms5a`ih%3Jr7dbn;BLKJqdCmhJeztjdyJ+N6_!0ucC>>v z+@7Alq1wWobG_Wtfh^VbfC5W<7JJQM zWF2i!E#2Hb!PEuqh>uLt;>MExe3O=~qv3oS(d5cfU63uU*3A15ow|8;f6@~;Qv|J< zgZrs>7w_Fkug2a(xsQu)d41*xu6^iiF+!j=QP;6e1I;7@*B%Nm-IE_Tx;10MnZ@_a zxP{%zL(T|IireeY-F~gDt>vy6pL1>nbY^_1;1)ua>0>yY5N;riXF9u5(i%#oM2rZR z8?x9Nc@BaCYcxX23Ye*urK#{+_M@VSPZkZ17Q=_nDyFdvtMn6tBx#MF8iOf8l6!lk z30Uf)Tn(1``u5)XD3!2uV)ytYL_f3qJUR=``047V!|U(xHj?RTp=zan8`d|dOA=Dh zuc1@PrX|nYM0b53jq7E!^j;sX=yP4Y!g%N&pqwjhwplmpo;`x!`iwiweu2l7Jv_cPM$;QlV3))&;YLBNN37;0sUGyzcsP znzC4dcyD20at@(Qvnz{}*@Twj)Wxx@0ypGzh?(IGGxFAE>2<~Q*u_CzPuo#fQe2yE zlaDIgS#$b@B&NL&&Dd62%HW$K5e!wQTW<&RPxKC(qeUwo9ljY=|V15(>@WwhJggQr2X*?8PLP*AIw-k3czriM> zdQ|7*#MR`e;LY9_S*4ImP5YULO<1^1Sg?|c%N9&qqzs~7QadBrt~(XE%e~j|y!Em4 zIO>KH>u&X5S%BsmM%m+MlyeA-bF>%5$6)qF*OHv)P56#d$z~red-*g)MnP)N|bg@)r zO4PTKLe4%nstnU=NIYp>p?3*F^DBrUFWWL577{_=Xb%TYOR1)Q7sw3E!SIIbm?`~sJGG#D*`au0o6x&vew=0%$9**Sm3z(gPT^tU>)n)N zu#ZJaX7S;617@l=H=KZzy@7?l`B`RZagfOd!IUFub(y+lcZ(+IE3>5dYt#62=*>a5 zEk%?Zqkn7{Ls7(j&v*vM6g#1qdD_O&Q@N*LI zE!*l?q62kPlE?aR*w9UFN)>oZ3!?1R1MZr$bTZuITCr}bgEF5;4)9+yr#BoGloeW< z_ujh8XtRfA*U))a9|n{hQrJQ?8idg-8Y@n}oEaJ#E+UAr@bYds@j;Py41t7?kBGs=H3wW#)f@32$s(EzGYZ}TDTJjlnPYsfuDbd zZRxVX<~?fhVV0FtKw6KyEZKi&que4*7k6n20eZ6^V z(g?;+OV0gEBun4!fX-ZeaO6iki1}gIGS}{`Zj!G-QnGPniaM_Ne-LH*Y}6_SFMEi-K$Ht!o_Np)A9ND zr|Zo3>*>vxVzK60+$0i8%vBdvY|KX1AgF|6RNMM*PL@PYZ~>=A?$L1SyDZvs5(89?*41Z{rBw^8B^2E zgx<}B*VU-kO}gg^p4a}@+f#JG3+CIEcJ!N)jrn}1K-IMKgF(IP-M3!XLBFq#Tju^8 z-*&Fdw%TMuIm{i{*{jVOxj1WaapPadt5rYy$f?#6*hS6w(u$-(Iy5Vsd=}bybYw3t zKNNtBC!a2unwZEXB*c6SikzpvmxNr8Xi3+l$t9%TyeTX#MLoD1KB(QYIf9 z;fek0(lRm~XBuTXAOVnW0J6}6g3YCi6&~G zdGTV}l5@B<-S?%moScB&>fBf^xjv83SZ{zNK9Wo*(xj%QrYu2-G#(~_ zxWI}SD+XhKramBs8*qK3izpIBCM0p$pU7;aIrFEij49lbGg*!Ba3CQeA&c_x+eZo) z3i@QE3fv}n7GEZT33y!~haZQ+n{XhewQ)c=V}&>o3Js?}eZqHGAt;yFMe7e!Db;v7 zjbQBiCObR(K>GVjt*)7eX63zs`+hJ_LeG;#y&J#utMeA0O3z)H+ds_BR|qW^{a%-U zTF(4BmM*fD+IbOY!)xJ$eJ&wZueTbZud89Z#R3EZey%d9G))nURiwm z_5IyIf`ZU90$k7I#cPC$DJ6w$P$!?7T`UwSMq1=OoV3!V5?AUP={GN58CdSZUgciN zot>KlKkJTUG&K>&vjhOaKTAeI5PES*iH^2*J0ht0!ok5+NSfLH*^paUm@^B<9Q*$L z-Me?J&bqp(y~e%^^=_w3IY^^e2ic$OXbt#6@CkNTKC(O? zLI73lfX5?vz0aw{a!GrgH?EE-n5a8J38@7iNpiX_mMpR2(rnMNb>TszP-Pfco9A7E?bx-tL3|Q z`QybZuj~_L+8d5kiDWTxaRX@(<25%x72bqqV)+y1PjlcwA|ahd4tws!Plqq&h=S~X zw29g0Y_L2Lo0=LS?OkOTEDe%ulGwI^8E?NhMLH;IPaHkxRiROJ?O+DwPfJ9h>Fp|- zn2M>EtHTzYwzpxhKp(-YQlYEe;@guQAupt^i`14Ir_1Jp7UJtmA>JGG+kr6fd;w`v*@o0RK*|6sMN zE8yYRtoy>Ba2zac?Oi6-_9YGV2@%@m=&Ssq6gMS9fzFmzIW z#W3aXrJPUt=uy2{NAZGF<1cXjAkcHUP~`X+R?Dh(h zrYIJ=?sCr_<)EsA>S~_HU`9CMcsXaV$U1Wnkne?7;5r}OnS>l?d5fwRois$!7vsFs zLZ{O*(YA>Ywb2J$#*e5g2yUn*;!D>P#ka!Y)sqk))9~Wo9~8RUhu#`2c^%_#+cZXS z*ze4FVP9-;Irx>R*mj9h=1uHypxDV;>d0F1&jS_9DIc%f-eRNI<&eNQ9&Y?&grHUi zAy2IMnE00`gvaMk#A#aACKh9WM=0L z4@$DpZRL)E)fnHe)EYD~Ik{M8mz|mUa08^daIKc*m*?VyRhvd=GLd;H)&x#6k~Op_ zGD=8EJLxQlGQuN4wtgcsKVLF%Y!Z5z1sUu50fwy{0;8wFqV*39G?d+4eroAEpY8iS zDkUZ5*DrIMRzGVci-w83*F^DMS6BS}T#kU8#KFadcgc9nuz{{>ZAQ&7@kN`u=tn5> zsGy3osvDXrVZ%?v!I38<)yK1TRlnX4iN%DM$Scm2-FLmFIPiaID8|fz$N_Q)FU5;z zrQH31q@@=w-GgHj@dyp(;{Yh9oc>-r9OF7FH+!`=s_)8IatsO=4(lvfCu7_^$2DV1 zx0}h^HZEqj?_BmyTW&Y~&;|Kj4zaJe2JD=Ezcx{`(r_Zn^6SWpj+XI&6DUP75q|9eq{Dt(IXxj2j6@S z7oYq-R9n4YY))x}N$gT~MQN8u(R^8nkHoZ_u5EQSs|Las$ths|<1)!*g~~R7$*ZdE z)#c@-17As*1)w6`PhlGMMwK0or;A0$AP>jszqG@_{)*jxCx0pSQZx>R+Xg0a_w8}- zXD3%}LVFlzCh(AH;1P>UO0c71Y^wF5eJSwgDj*}R*@r=+y-F9D!~nY^X9Y{0N8!h_ zx^b{(Lc3j&kxuB8O>iH5(YQCZ_%7)v1i4}golKCJlr*6OIPjQ%pP4~opiC4pfUcFz z<6XR{YbYq7J%2!kPeS6ro4WrU5a8n7@|3jH)TmBTGRnWWI_nHV^7HaSGruW1?ajw9 zUx0c(r~$-iH8eC(P*UbH&&mKdFEn&i+h8hLdHJji5*?qIm$+eZl{oMH%84J<(>(mT znfKP}sW-d+v7$F#++46yS8Sz`a*N^3?EDA{L`OosBq3z0ZdGJoHuHJMD(KqRY0mOW zt(1px`9#~HAt5oYDTL(jcsO2tmIY*|eK`df{eDtgU@#G&rb6diUj{uotOx9>jo62c zjg1FljXF%bXmHrJcVS#D+Aca?Hb?i6dh-{VPZPp+;9UUsnuYePq%?c(!1O%N(W^Ad z6>k5ecj@u4^G=sTo6JkQAxrfi%Im91o|y9+Cbb$FePFQI88WZOdCc)q9f8roK&dxW zmr1XgLRa?3$2M~E0)^p$(2xi`zP*&B_($SOjdINSFwfhs!2!NxFxO*x_cy@3NnSn@ zADf&0Y#HDra(lqP1H^-~WH1E!)!GJmq9P*T1FzP4pWzFtwwnOh^pcU05l~K;nB*;q zFX)Sdx+iuV0Oo=hBLwI=kP4?bh_(v>zox1RyG-VS;wRg?A$?kI?c_oD{$Nh9_X8@@ zs&usPdoER@x43(Jk*_}CKkZ^r} z4si(_7e!AEbcW$o5;==$rIp|{TSlYT&{9&ueKs=xBrov9nTOm!>($fu&_?ZYdMP85 z@@koc5wyQiC4IM=mhED1xcTZgy2p0Z(Dioux?r+d(DeP*#W31V24sVjr2ks|Bz+|m(YLTu|9+1oQZ9Ab)X^m*> ztLiX5)G&4Lsjf|<#xoQb&UmHPM zN*|65tQ>-kV^TLwtA>d&QJK0$jRnZ z#bs6{sQ)saF@a3CQm!k1nia4TN)vrVi0V0zC^?$q% zmk)KdcYkkdoRU>Qf^jo%tG#{whtk;NpAVP@xi`d__5W(l|5xqdpGG+WOTarJ$$yk9 z%9rIp=DpAP@J2H7UZHYuBSh|x51IuSr#}C^#JKx;P=Eo0tsHX=4z5;lPNC34+%oc*dW~mnbXnc~-k)PrR z(3OOF%+48-fF?d(8k8A;0w+noi3Ua{rjED2k>q9REQQbSEQ!#QV#eC~>2%>tZL;IN za|H?00wv>Ij*~EM|4|+RO0QlMe$#DhCZ(hTF`wN~3Db_9)ym2bVuV$v5seJY)LBNZcH91)4l9mmvp{x_*6=9j{5cMm1KMi%A)LwY8!0@% z_0x3R*fC-96cWWmkXj)mT`GZHcJxO3r9`lFIjWngrt0^PIwRqj%M}0;t_PyxuL9Qw z+m2bLRcHY4l>x3itQ4pYY=vkh%)1PORH#Kkky;VW1@YKI){J-QyHn8KysMDRL z+S_Pl8R&LS=lg4k7k%o*s3I%gb9(85t~)sv@R^hiZV1|3t6~$nLm1)IjKAjFSAmm= zMmlx}LH5k*>Z_FP>l}J>^f1dBxkBWD20np=g!H!jto5sQiV{u{v*#z;3lp%}LGl7& zw)$>SWcddy%w1w|bQxGkz?g-fG{&G(Av+A9!B{bw%6>D-!Yl%`b^1C-;t9yph6zlO zdj@Z4=`3*H+!#C+I@>%Y+f{17cSpM8!T-#TI@KysM~p{6ClPR8Yv|npmr1waw*i2xY|`6N zx`>CC4QtsXlGQ=EC%UQjFV;)|9J^x}gQCdI`LNe{qtl|>DGZ&y*rJc2XedP>>OI7> z?acqY6>zVabORUNZac0K&^(&nk%`z&NJgddyI#GxV};(egIlJaCkNWu|?Vpb*n5H^D>NFO8<_NqeB6i4?{_UF>Nir7UjL0(_d~xg-5^@5DplT~XgHIE~9M z17G%#Qxs`#L&KnM%k@UDwv{Gl4Idyd1~JS+zfJ(!qm*Yf2qUXEc&3=+m z>AoksLjKbB?z`3L&UZ71u@lmPDl}Ly_bi1r?NxmS!Obh+ogzPFm<~Kx9OQ<1biM*V z=mvzr{ft4~JkYOwkRTztSD#6YOljcbhN-hC2QCOtv>VJ)*-_$Br0qNt#m{A|*OVMai$V+R zU~{od>L7JOncjSQ4J^T;JdeuDVK*PsVdrzTUKd~WO7f;4w{%IFtPL4IG$7Xu zzhB>oGU;}ZxkU*KFf+EtS}?3=?Ure&`N6Yn_V4{Jh2ZGo>FHasR-eprD%RkWObpUL z((cppIn{(CyhN)eY%Zo;qYAnMNTE;TfU2|Qe9)$|i^|w^J=pV4mrcv@>1{>U&E@Is zI_y*k8+P63G-}7Ub8Ic@Ht`wb3)>wK5m)lT+C8pOS>P|YEV2apPf z7V`031_&~U@oy`qz=0Z2%y4jUKw5M-t@PMMjO31NJ2Bzd=wUrH>;wgLT?Yq;!Qo*y zpl~VZ?Ja^{!{I^NHRAQ3mMh!g zML4%plKD`WwYBwPiL}(Q(l9a=_^XQ{>U3J3xw!Lu)kwX}L&D2Ob3%y$W8W&k}9_Os2Nno(Msj z-{Xj^to`~xo@pR-H5yg@5=d$oKyVpcTU!H?0y*lB#DZ=o1BR8sFbNY-d$6%7KQkRi zM@2n8J=IWCYdanq9)4$RtW#&3nVZ{bU7P*cJ`o;Yy-Xl`YJZQFMwKhu>Kh$^X-$12^;qxzpL_iRxjkH|1PpP;N`PFyDj7g6Lh?ayW3~x>%pF? zqNU~Xdr{!G4?O<%$jAstU4t_rFto)BY|P8s*c{D1KRF$GcaAl*q=H}%A zElIYCrR5Gd8|X(W$xBO%Na;pM45kUVjbKsgziE5YS0m&$5(tsm-&XL=q%dkX@?9Y>1&S$sFVRwiQ zNHf|x+ZSA;1X{--FjpLS4YYE-7KnyMz9p;k#Zh57Z1O}q3MO$5I;SA~$oBUl3@~Ju zFcqo&9|Nf_h;a0ZvqiALa1}-B*J)p4$N;Z0v!x68FtpHuUrJ>+kDZ zLl)Ix!fPt;H1w(7-P(#x0)>XCsHm0^$nfxRP*9Kz^Z9u8r(gd5kH_^XG~boNB-}WV zy*njQXHn45RuvZJIA z-gMeuRnp%WHTH8Fav89*vjfr`;t~>R+;$W+G~I7y5YJQo6|k5aVeo(c{Bdm5b>m3F zICS|}T>O{j=x==Z-{i%ee5-C|c6@&FJ6Az*(2Mbj@4r)$01{xBI?|EUuu*z5(>fB& zloQ{%VQIbFiX{fS7Uk@YD;q>Mscy8eAS$xhqNcWL7|AnnlCQ0CGH`P^29dl`2NwuIKtdWuMeA{P8AU279u=XmrCmn-wbK(|Q(RJ_bWLpt(%W)q1y5UH5Co}X zXnPB61CIHBJJtB@?s4-qLKG>Vl9F0>DH+$>a(~^0Mw=FJ$-z|8Y+z&=#46bvF@fu9 zi(_3bOs1bobmBGA$;H?@gR?4!Uq^PW^%4vNyQEY{v~*W@`f-b%X&#u#TYsqTj`j~{ z)ZI{v6H{VuHhWbXKWI;IvDfG{dj46-rs-?awv;ao17HRofhUV;;UHsx>EB8ISiC$;-87v*H!5d%F52_E2ES0Vqv-R zY#R2|{}BeQE$BAe&z|9N0oYS&xJLwaXJf$)-4-$5?WSEEJ4t)i1VdBe2u9#Sv~gqc z?RdX<3O-1Z%71hyt8Qo5@5E0eMb@$UCQW6bfVonPHLKwQwARU93(zAJx?Z5k(ei z5jK-@*5DnuK=Fqv1(!`qA7eg85E=*nl%l^IbItpiws1ly!6L}2g~IwcJ)$oY^Vv>n zIV|uzGBh&a=hx|!F;eTg;(W3v;U@=auqWbF@5$$DP2Oldk^Soaf|ZIxbPzFf3|R4a zyD-BCVaLbyI_T6dUhUh(vy_yep@LI7RcONW zR$v!y963s)mCu^CV4fdIeq|mleZ^hs2|s$bW@^90iey2fy$rarueh$OgadGnukPH9 z(_;BJd!g}G@w0A~zmoa}4p#Z+j~d=zbP_qGlGe$7D+r7`PIQK0<*$cOGf#9 z(&Vb>bPy;&04oGWNz_QY3ZaUdBC3-8Y#N1Pi!J+?qd zS>l7=Os5e|yXT9sDf3sOl}Hm0ly}JwvX4;*l^3&MU61@knc8r}kRqELXgFS~(D8DT z(x9(eSN98_Pak|l3Za|rO6+L2i_L%{_4X87B{Cu$(;DUCi}6wCaep{zns3ZHNda4# z_kCB9R7}x!ybbGUcD&BhX%2v?lqqQm=(QB&eE7`m@1S1$Jd6d6IER=0?auxns6q<9 zKdPI5k_mkfLKdG~qxAQAhEvfA30Xssx^(1*TZrC{&(D%i4S~lYfE7Wv93tE!}V^E9XwGx!|`RaI9=>Rq== zwP*TXOEqvb5xmWyEitWAkENrg62v*1EWy%#j*QnyYcmQtJwk1#%Flh*J2?1B$;l>A zeRjR1(n6}%7TcD#U+j?-WDa-}c;FS|+(ElW;rqGHc0w4*2IhL%jmW7K zrz?t8Rn*yczKvFsIhV#LUU-83Qm@db{>z8MEuy6Luim)He?S{vAvSFs6UCU(r9TnV z3(r8Q9D*b!Xh^qX(wDULb z!RhAM>%#lc)Pl20`*{=hJ@YZ%AMR~H#d}(Q`1i^gS8nQ;oOw9 zbi-Z&=CabbHO60c?oRmMpkVMTPEB_Z(h<0^wgD0?V$HRCle>+pBp$mQ+U*ivP4CLf zs2;Zv;gUXVL4M}Gxj$Ox|6<*>yNhPM#uCvZJ}kiggzyIcC!87Xv&4*R3JXN5s+QSc zyX9G;WbMuohGSHej^(~Y6bb@Oa8pm1HIK!F?V939XEa!Rz_@pZ!#{;gz~!k-1iO41 zuZpU2VEs3Us3xQQOK@_ir6M7_u;H&cH1X2rXYVbid4wQKrP-h zOhABbdnLO&Yx9#PyQqL=R*`?2M0cxiww;bUg~*tbvpu6A`J3vHkO+;T#=II*4g#$i zfQE?s5V3SymUq8=`S9luIg>;7>#J&(BdGHdhkve#vFVDE#&3p_Cu3^#1ig@QF9q7r zSAqXRDh_t$JjAvlhVM-sBXwf^4FaqJa`(1=Imr#n$<8jDY!fBN#{@+Ar>nywKQSpU zb=0uXhTl03HYX0sJ9rbG5|_ej?!YX(!%^aHr3)vqSOt^7Ge+)4$rt1_h>@0!AU6Dg z#lqKQDQfiRSqj&;Z=CGaM@Og$acUW;xS9~H2u_Um(KzI)OC$adE77M>t7TK**48%e zC<342d_Tay2sfxCJ{lZk7`c!MkNW)lbFPg(ezLdeFM`i`tZWu>Fo_xf7JA6Os;W&H zvLg~0+7d{wCDX*x(KCss;XiZ9%Gmb(@F{NG{xs*a))$)eNqz;m;#Rh>7fK;Ns~Vl2 zzZ8JWc5pnV2zBMBjCC=0$!)?{44KG$pr$@?f{J2(`ppT4ULib61C1WDoh=JKhj!}& z&HWk@bVH3oJcUz0BFaf&(!oT*rFVdrH%E0tl|fKIW@aKU$o~4*RE5mM-hVxS?c*gc zr&amNALFNL-ov7gN_SIx2n2~DF`k%M9MJyC^l*?PA?(;{dtx|IAchFR9|v<5;_$US)AGGWYF&;T{<3eWp^J zQ$kLvB!O*}L+StR@DQ1#j6e^8&O{1I#ZY9SJ0HhqENNi9VI*=9C}5~S(fz$K0!X~I4zm|0zOa?*A4aelheRQ z;b+u49P&t6Myt^*^YuBX!$mN~qQ9-|YIyba!&*n=2qBtsA4Wpn4u=Q`HpwDJT4p_pfyrsCXmMDK#_?wkK zYfstx`Y_3M#dCV0M)%JJS3sxPWM5bFn!c}jjtT2 zKA-}9YjQV=`B-z0TEbqL`c!ckJ;RNwq@lkXN9adO3-gZfS9I@RV@JJL_Ia@~I;y$b z8(KWF5h6N+fLM-D-HR>m(R{y!%^8=kIFCD+AX1}Hza@U5x-?CE%&sjMQgD@pxCrHN zLv1sSk5g+kkkR928J9vNiBFfH;$M>3J#HP5vd|8k)S|E&|I{^*ofone$L`z+f`_a> zRV!l`&5L*qbtlJTX;*9Lr+8GS-~_`yrNVG(f6MA~ZXGs2q`|Lf%qN2bBSiIrn$qfA zKivZU_ypa6DJ8mfR9$sa|7nV;{?dqMO0leuC8!=(JT>;k_##f^P#zX*lcqgK4`;#k zP#%vH4@ti&XHAtqzX%?-ztaQzy%{NLFR7KAL$BmlA5FR;H{27~{}b$7td$35-X5>p z%}N%YEvcFP`9|Iq)7+4VA+D58dB4G&EVx~Zv|*XI)VW^!5&%2n{et2p>t9%1nKo#v z>JIV6NDHH+)@o?1+>^Oz)$N}wEaIlvp3Lgo>gJ9G9{RhV5}QnWERkp`8P=J=W?dPj zH7KpdsY_s?)!Bgk;`#SWq#o>Y93M*Q4ufRN*gYyWD=#F8cKCX$EUXk)3Dj`^zoU$~ zcjbfXKU;gmhFfW?|FjP&XgaTo0eFXZAErLS0&9s#YUPJPE}2n@k9p^6^HZm65CDLC ze|0e4mLFlH_@w!@XeD{?Hh>$m{V=k)(s&uxzyA9k0sch2fW^;%cfzMlilC|Vf18T9 zTkQjyqcqNR|3xDZB5?czZ@>Rv@b*p1 z*a*mZG1+*2q9adG;o*b!gq)rCM^rr(05>0_utR!#t}#ukTdW$HrULE6Q{F4 zvjt$+0M30*N)vYRG+?FU>6|_xBxIWdX5Sger7!{Py2bp8eWJ0X{85JGe-Kv zgrxZ>fz_VM^>(uqOy1ppG9h2@jz-wkHGhW-5Q_eHN}T?8Jr2lbRxj`@Oe}n#ovajh zI6X3?U04R)GX7Kdeh!x2RlukAY=Pghl@ez%9NJs1Ggo%@SCdmhIi;1;DI~fAXj9=e z?@=>NG!&LD=E_xo1uDwicfO3`CAD@4xoA#NaXxM6VdDLwc)RNWeH%1HYom=X4L(R! zM>*|NTvq8XBK&5%Ka<~bivAQv%xPV-CDL33 zZu%i39#z}(uFz1({xNyx1P5xB_VM7UxBnHm%S-V9H_LSdCtgpJ7>DF?-%i!TD2!>1 zficrWrGF_4QpawbI|l)o7Swx`2+?-4s+lH}6rURBSgd!u-K>0uPAb3}p&(7Ov>F{5%w0{Z1+cEqDT7QPt;@=(`*`6R1p(%zF9i+e}RIJO{}b~4%Bh+ ztkp?Xyw(zn*1vbkpk|&&YlRJmsh?Bds_D|0^gg6p!OTwOBlD--0>>^1^`T#EKc9oN zOhjcu*T!VyDOrt!J^3@@EakxVPp=pyS_3oi;J;ywC=;3iU1p>(8Zm#kWKRB$gNh8% zWS!HJPci0H437m1^_O-fNP8clB$km--Ltev(-Ibkb#zGj`SM@gFG^KPm?dj znI&Dv;VQ-x;=FgJdPt3-UEKZxIOqZ_>`%*Q=C}~wp_GT5WE+`sn>+W>C>SmG07ktT zdLvR$X{xS2Q$>y$$|*{1s9g?e?{fn>BZObF94hFHzxD$OmO9*+~3t|Xz7N^R{$eMu6A-<3U3lH zci3d4lU)N{I>+0f?@q?=YWP9+4eU#1gX_U6EiHQJtGuv~>!YpX&^~5H&+Xl%UoTE2 z?jM63VV8ttE40!2C9UNUB+N}c$ijTqb?3FJeaS%X4#&x#p@qvWK8$4T**id>9rbs4 zf15sWwI6V&+Ocr3^3#NTKYQW+4kC=%XPdC1QQpQaEhX5%1u_SGOoT~IdYe9v07F2B zkvM1m*GfuKL}UmMO**Pra&@(MQYw2SgThhh;~d8JuKBuN8Gsjy% z;tbScNS~@VZtqMx_wB?VS@(E*Cjn%DXLh8}lzX#GiwR0?7y%Gr;xXaS{Y~p`Nz3 z_r;rX%Q!36b%4bqjOT}`wv_WQIhYVJbN)(1Qd0AX3{zZPQO@JByynVdySR>|34%!roNCO`)SdzQC zR20r~_1>j8Nx$grHs>q_L;@T5#qs5m2VA?lW65>bU8}Uw7|>`p-u4wc0`=wGVbz_078H~B=|MxS8N>Hf57wK7x#4|U@i`> zcTEDf7jwy5NnL%StG>L4Tg-m2vXUYfLK220xZUEUhQPADVRw(T1s*j;&8GVD8^k)| zvd@b*!skhtB_g#|R#=XVd^9#@-*SqV8U}FPv|UZr<*nV`)iPCe%vKJ%XTk?bc(f>u zYHWKcPu{>`0;2A7-F3%;yc*AHkHt#jg48>gjc?xgi;%aLXthH9Ljge}0b=l9r=<7< zC{<#)ykQbIIPnt=ecooL)7uWFt4V1L^mJ?rrO4Wtcp9geg|M;xMvqcK`wG&Me^BGaPhN7ynHj~ZI1%Ye3gOCHH5VeVFm-7H# zHvx7_={Isw5n(|t91)E#k-Pjyg@244N>9jY@E8(Gx`l_#u+mw$Ucj@`&5Ct@!%2(- z3!H{J_gg1TFqcD}DWH4VB2G+j@#dR?l-@cG5&4>)stzx!x#&X=R>lhotB{69zWfh= zo{|bgN=r#6$l4xy7gj1Ws#xP_mNLK44VCGyM1Rv;=mCtWc_f*QeIK$S;ywZShvJ0* zHGM7?G)Dz!`9bijSTU!CNa2XVQhWrJDGqi6_7~v?48>4ZLH`2wX9ndJGC*i2(@(F+ zWG|!<4~jB~24nu;j8XPn@*qu>(hTxHlZ#G5%*-r()O79G;_ZpDievN`+fTCK=fb3? zXVRJ4=>(KRy0Ppe^#-x6I{2Vk!AI9oU<+%r;fs zP-+GmkTor-DSOCl#NR*tw5pBFcPC!G+3WdcFr!-imm*vhBk6)~9|xBA3*I&IySVP~ zC9UIOXHum-U)rP1F!B&pF|Bbst$=G-=qP?7O71U=5s$hPFMI|N0k!mNOq230uc@52(7JM6`Y} z+XWHqDPLI@E#=cC`2H~=?yMx?S?N#kbty<+an{>1mGJeZ6$hSt_jY;7N%PdONn4w5 znMA3eq^PjW?pB^JRt%MKJlOn^y6nKy!=TTvRd*;Y6r&8*Yl+0AP#nc#yJH#Xi&?QB z6NS!C?uEhIPE?4|QX0fn+Olu&?Mh1iLgos5B$0qBhTSYV1FfqHAK0lxI+bWUH~37e z-}{BP>YH{B7P6#_y}yF5l{hN@$MC2xSQpaR0RY6XroxG4@B3O1mpnq&aWjfnPZ{D; zI~L0z0ETHET+ar@nu)SX+j>aZ1cI5Ibyw8D^*LUT_b#j_;SepF&7` z&L4vRG#+2lR9NekBx)b6{_Ai*)3GPbDjS_xYmA8P*7}Y-)kIuxZE24w%*!v~+A5qm zO*G?HoRkzbBD<*>`_xX+fpipgaDQi+@yU;pX_DsprZ0qo_{Tj2#|7A#$~UB=cy0kg zOeJXRdy5L`*q^M&3y2k$)?JjV6ex~)Kwax@dCx&Ql8d14L6Q}$O6QM(z22EI(ufI9 zelOwcE%-lxJ}S-xj^MOwoD`(BkBKtf!=>KNj83RPlmhIYpAjATe(2PpeICkb_(mx~ zI_EAI=~Q6w%#xUX;kye8hUK#qsz6^7ADNFaU^CnzoNwu75{a0E7#SA^A-Cy3PbW$d z6A*{6{pTJ#h1E2Y5K&W*|< zqgeF3XIy#ySMjg}55KA(&rwf9y9S_^B~@`<4D$IhI5ar3G$Lz_pXt{c$r}iPy;q&1 z+k{z>axy(&4xdas$}IUhM<}KFhPYu@@=#Ff81voT1nPKxG3|@=sCIbyAY2@^?IlvEI*77x zjA6tgv$QXoRV@97zL+tLB7bzWKXIOz*lymcX+R!_nAxLq>@;)!vX$?6OG#gg3sP@A zLN5iLF-b-+CSr+8xuLqj9Q77LbNB|HjlHJI>uRsmZ9w(MkQ*M5mXei!BbO-iLsLe= z^aSKx*C$Wp>lIPMkh1A?qshC{S>DDd7^#Hyy|Xn_B@B-C2BfA)KX!ZhaVMi(D*qDq z{6BIyTIT79F*|{A4nQz1YR}PwTmE|Yq-az%ms73!u@zMxuUmu%?aN|CXd4u3IEGUJ zQ=UL}A*>E0b)fib%UCxW%Y|x|JA?=D|x;xbuZxwaj8_NyK4YI4<0<=c36rMtq zq~KNR(&I`j*%f*Cz2xLYrC!q)4j0}dsMZtUh|{|3aD3F(8?sEkOtUYT`Z=DGbLbb4 zr#7YbU&9}g3R%~*8-lqk6@xh_Jxj)~1 zKKX5s8G7lW!g#;~yvy=r0k1I{nQP!#VL4`zQvOk~3-$+t1;L z*mI~hV%yaGaJbZaop_g29kdJ>_BR_pD+juBiD~%ZkrLO;BB+ASq(Z9<`og1$U4vOp zd?pp|r6QAT8L(BnfWW^cp{`v1I_10vad=zf3a)VCVqtIbAtUY+6DtE3yFGHFNI6Z# zuA2f6(e==UDc~dfb6{YIfcR!$iE_wlUpYo**1|R(jR-1%!HcA zGk>wB!R}5PM>j#tg7BD{&t+J!*jSYnZGE+EqNEiQ)hL7Q5_!ysYJ^eYWV}+cQ@^)1mrA{_8;d6fhVZ<=2eRpTH zOYgXm=7JoQkPxAc=bCss&#BwZA6Q0fhiQre9F2l8n~is2C|iQJQP`A4&r8iDNRFh0 z5+cn=po9`|+!t^3M#BFJl(xGH%L+RJGmH$C`}PYi+yBfG6|eD;q+u_qPCScAiwVd_ zZ){jKrT@kG*hm^xLNra2%~NJJjJU2routS!?u!r;$BJi%uvc=I0h)^|T< zVpuED&Ac&4*C}IX`N{cPH0jiRT*I>$7AJ0A>nByB_tKdMXC>-*?(LGbe+>-T*KxbS zjjeL&qhDLMICXDUpYi~uv$nV0T~y0aXt6DljHRI1QZ8=EAt5RNufY=@`I)Ukq5eFW z!eDlLxccux0Er2XMYF~RH|;sz8roX9)6+z_)(34a%SvyNiZh8z%l8w0&#ecS&rx*);I8q?hM|h=#D1R zh%BX=zn|wdXs;6hN)~A1o#>u8@gq-k=RfNuL~{Zk9!>!5#OUv(MTq=2~;^2xUd-=jf#9aBy(XWo0B(;ouMn;NTFDo*{rwu-`o$g8$&1 zRi(w?s>aFx{efgI`d$bq|A+ z2V@Vz#qZVF&K>(u?}_I18sBkY@9VX;Wr}ONm4?s#r0y0gnfB8jeD0B*ZHJxO;oNGMjK2Yhtq$~G{sNj&cC7ENlu~SIH*qnuTN-6uF)~xly26A?d z5rtGXyJ_OOpSHJiE}5@#cdaQ(#c!E+4zPum{g$r;EYJViOivY`v?(omlh~6_`6pC= zU#FP0pUJColS!Vp#aipnG@Tq9nVMW4o{Xv|L=$cplfNz%ytMK5OFfFYC5n7o^5ip@ zpYn4#zfmuHZm|@-gxq&4eT=!1EWEwoyUxNf{rj;5HruzG6GgiI!_ei?lOKb;+rh$u z?ziOC_}`%|r;Wizzo&eUIIqxps^lQA?TbX@Mve{~S5@@K9eFCh5l3u)H)tVewf*5q zA#&<@U;j8AmtQ?1HLpv!s)9FBmiSjsO;=iSiDPY0J-a{imx}oKIo4t3?3Kmfq(&YMd%JlLF6Iit9AqAGc=3#c(E1}uEiFO8mX--O|JV6=R%*pc^HIW^ zl{~KM^9ZfqZ8|h2sWgx;rOK3Ct)R;>BODTV&a)j)O00Ic&wOMy>v1w6pn-CLMR=(H@urch-1LauEhX4Z{}}I9f3;zv z*lnopkSHO&t^J3tyi}jdvOQfx);iY1_rv9R%_2>0&oc8&HrOv&{p9>UQC0%0^w5_2 zqB89Ry)*mFcF5@qIpJ3FOP;hvD`{7X!=?F#isgE~a_&6$zNND|rQO1Yd-IU1M?FuE zRVh9XBHYV}b%d~d?5@?}UyFMiCS%3ZBxDTP`;F7LV{_m5k9h=b1$)fyZ0ejRPanTG z-+Wta%`$Q}bQUTXrtt45&062j_7onF?ci_y>gpzPd{U&;^wrf#P|d|zI()OL%m$bJ`&ra7*KE(6 zo~Fvx{;Eai?zNtMu)UhV zBd))FVOsHex%CHO1iQb*$ir%i)~Atadr8iZmLqo$nmZ*+kx5L|Uw)aHn)dhg88mq; z_8i~0RHE)zE;X9nm0EqJKRe*DJ56abbGKU`9vf=+XXoZ;;^%m!0-luk{@<@t{dGM2 z^Og4BuuVk9;eq{?NLO#-s-=&W(@Mu?)hnLoc2>Gp%pnPQi3J>CAWVWgaw{OJj9Sazd|jf#?&m7V*QY=EBo-)B@Z+fYxA3|l-{*d(Q;d0kfl z%auKEEq|WXym&l{eD#T0lol^SB9FOvryw|KC-?&sn)`y?5dDW=%clgZ)JCPW^mGJK z5<^2nyml)K{tIPGCC&6lHEMy6Q9|)D;L@@6hKFo&)FO5Fhv3F7IjVA^K(K zjXR^BO++h;^|aXoe9Xu$Vf;? zinI=1M@dIDZ!B|jb5r+Wo}F9DD>^1dlg9!j zLV|kII&OS`wl}*urM~ZMd{o@M=(Iz~^y5X+!;soF-TT#4#!MT@@0NE7MF-!LEK%(y zgq_Tbw@;%)R}PLf<7>`V+IKfj5FzOj0|(SzSu*V0f=C|S5EfMf&U%#El9;@_JOgQB zpQ&2X@S~D&gMou##%JoXcs@du6@5Ub|I6|BH~FJ-1aor+veW5yo&WK=xcc9Qj1ulec^(jw+5NuIxVyA zb%j_MCUsjt?8e4MT3Q+^HYLRGzG)*J9Rnl#UPVPnP>{^{85$Zq#X%sF{wFiDz5RXb z5ChePpd=$^QR@Yz5x7WTt!@;lu;&4cqoqp`I8FK?v$yO59lQR7L{IasLN4QB9 z0`W4JO9aFeWbQw?cT;=Zizu47J(apI5gYe1Mf5xc%)g4Sp%hD#k((x-HrlpL=Qm(A zkJvixWeBBx7YRY;I_*6Dh_zZHludw7R=m&fP!<{0nw)U5v88`n>?xR+XFT|-C^9Ye z;J`vmFgwz+KJ953p_@Q~mY%-s{M$j`sM9%uW8fyk)x9iPn!!n+_0e+M%F2qx%i(s3LCYG`n20-?jsxjyO5yQw->k%IzOac# z&ylg$gTCs@v})f)zSU6HI#I2A#`)9VOlqb|V@{gjxVj`sFvUl1y`ff_Mz&^Qv8 zyyrtQ@$vCpU0s%zmSqn7Zu(M8e#7JA{b^*pc8uj9G)jC3@yWbAsvU+b||ytd83+Yi1ZOFEV^j8156FG29` z=7Gr@pW$3S-Tx$JHvN+j#8OUC(FpF5l)*Y&ZAr6FBE7)O-)TH(%2=(NLg9g&aO(cJ}@{0n6$<3p~Wm6WQXKz2cOBB8bJ!xBB~}q zug1z-xiy6#R`PBa-i4l8=fxefP zp|7BzcSSBjRxw6aAvz*J&{#R(1RfC-Sz*PTiM9#HL3=?hktE2AgYigsTjjkY(n+-(Mx|G+8&j6ZOL8Zh64zD#Gu*ssvI*W?8JBJXV+!!$tSq1NH6d5YWc?QbB%|W- zn~9n*^*<;i#Hzc0)mx8n+Tt|7h0A>V(C?YQaJt<1xtN+La?Pr=Zb^m9E2YDIk4cINoz!jgE}(#;7}s%6YJ^u<(u= z7#NI?kNa#`d)f( zh)@)=_-YK=yl4%0q<&Z%k2mXgIBa%r_Jr};EPS(=%=`O$pIxW+(?|-drluy6-Bn(U z=8dDD?q0s>9KXr?ZH9B%wA!aLyW&rA0~_{u`1s^mkn%6-tu(6GO2Z_{k^*oTn2`;9 z>2I7hRjY;3zO>7itTWcwh6QtM8#kVY3%f(-Mqmri^jb+Mc1XO|B_~!1;de?xK&7@mHU0vPFtL1|8i0%?R#|{3^;Gj(Or>dlelRz)ibb;X) zJ&7g5;ZgD4*mQGwVJL7BI*Jm?`>KnEC zL{W>N6V_{zwIk1O9$a2uS10JO0oRr-=sw=v9Z2plytW1vG`J~^evW5BuaNcTLz^fw9e@rUlfliBnZENr#hLC`3H%e z_u&irdrf|SFCU+j zq?A-&uSEk?>up%KaaBg2u6v99UxW6Zb?A+{zf;wpY3BxLlW&Ie?Zgm6NBEx%G72AI zW*+F2ZsmUO8`xx%)=Na)7N^}v-8q&n`Bb*QH#cu+PRbI>yZq;9Hp*=Qndn2k1&8OwC*&x-{*$xCx-k99 zh=h=k3bS$I_pio;Czn~qY0AfkhAh|HeebT%_kV*tRY5+tJOVYIS*=+9w{^Wuj$XskedRS^m8_ z<>gQ!LqtS`pxa3rpCk44vIC|fnv$Z|{mri(1_p-h<%TIQtyuHp#k&2Dr@IdSiy?+= zzgx?m(C7YtcZs)NN6pU|F5nSYTG#JvB@M>#xYuJ=f2QEf(j$ zFOMhj%1<1N9KAeR>Xtc}*fbkUlJM~HPRLh27oVe6= z=PQ>?HvPMr%hgyiYDycZ7tm^nKT|HAr zM~A$RvL}(jL{Ji?w9e4nyx4!|t^MwB@=64&POZc*{Ol&;vtLB)1`zi%Js)DfP_@5& zPm|}HhgE?Lwzh|lVp2b_pi*Otlvt4DT@=Ohxjb@mwOj1rv!9!2oo_#Vqs&Ah!XhtG z!ek?d+&E6Gxi7niueLmx85*kFRFvHc_Vun|{*L{X?mlspFLutJeXsj*Lg5OUHEB;f zKJV?7Yxn(OJ>g_&@=|I}{c@@=!SpaQEiHf`i?FO*vYLWTv|d5>YNwPXWO{09g8>5rBNT1y#X4p( ztyLHA3^V5^ZWE9Y=7*D+ZF(pe7v$c*FZ}3bZfyBkJ~iH{p~sxpeyu8K>_{5+VLx8)D77k|Bv|u!T<3&UvOJM#6Q*{Pg1~`tLQ_i<4{T6D;5bbwS|ybv ztX_;RoJ-EA<>hCMlZU)%cn`nlPNs90Hij>f2$GDzSNgDp_IvAse|}T7Z(>}Vqy&OACZ)5o%a=e#z6x)BWNyR zv^Un%6U1a%7VkB#uN;>Rjc;9GwyuypDOmlL_-AeLFzy8zg=J2`%?;lNZ(bot$l)U? zDRdWE)z5tAphEF06!YLCpZ3!znwjzO`p0dChoF)HA#Zw@19BsCe>Hz99rejyxLPcD zW5P_Zo7}JmuI~@^+KSDs&6oTMELXWXBc&pFv7N+@FGf||Ip^eO_@dRT2_xo7nR^5L41UiY7mlN z_F_Nt4I-cOc{g%3r+k?_F*+J<+a zRyFBaqVjg>6Ss$U0~8s|`vWfes$0~^$jPZTkU=FGmly#Daq;HnruXp4oIG`Crc@0L zdxaxNLYW{HGdmcGXli#P^_TTZMJ$CNks_&p3!}Z+9Y87^U;bi};Dxm7$>zaSq5Lm2Z5fP==Df1k zTY4V7V+{fxEy$2BJhE>bCq~AH5TOp5P3$S_6*_gbwYAVNh9CHUxBI_1J34lqGo?xj z-%K?-o6pgn*8ON^U>G}kj*Z>;{kz>#J<~|6_{yZb73Lf z-y7Mvzfd9Xmkf46^HusI4ezp4VfDUuZUUTKTx7yNH;)f@vULfT>38U(3-y+2S4Xp! ziEd4d;m?5i>=wS|w%D_;9=BVozKZ_saRW1wAz*?SYkd_yTf=2={ClxWu2KDt)!>J= z^eA%dw5t--$&WLFt5Z#({!FQsxv#J9Xv4Digf(|_(=Y@pT8CPc1eWABAuVAh5o5t{oZ7`V}nS?&A@ zLjG1Jo!>IWOkfR zmV_FgSW8>`MeZ~D9=LlrjU2{d2YrHOMhOkotQ}bRU_%NMXlaCgiJU5|?7-q$+fgmA z&sRHQJB%L!wmXF?#2+8bsVkkd`&lTjSSi_}lpr6f4ccH%72sbw3Wz8P3~ZC=2BQc%$2G! zEYUjElz}uB#u41CR;;+`l**#BwYQg&mL{{!asx_ciV$3znz3TjQ$@JHzqZ*ZRL^*!`z75B9CH-uB0vvH*VvFbJYHT0In3 zprfJnNFKC{0?Swy|+QhP4rCG9-|JTi(hdyq*J+%tmUY$HD}Y5qfJ@>c|^95D^<|e%%{^ zze0(-Hd7cS-o^BW>`1VEs?Vjg+9pz)(aXEfGuUizG#wFc^8r4;P(D>mzH>UBM%viK z1WodWi5eX?#x{bc)koMH_=#A|*cLy|@A0pBXU0g1MZM_=5t|W~idGkX+dDDCIm?Hq zZ4+))X`RjwpAh&N}BZ+GqL7DP;NKu-r!c5kZ8XtIR&@|)AmFVD=rvEU+ zE`O~Zg^)~;5LaRZ@KH%iOQ&q*iigcCnH)N)YrT8wO^Sm*{`O~sY|Q*{Gonuqv{SFd zLpN@A$r#g7DAD=Ju43~@b{+IM6Mp`d;UZ{ z8^FcoHE|r(JvHA#cn2{2YgjOL2wEBzUVru{YQ`|`F*}`p84`MeTF+OQj`0p8Z?=y@ zg9Hh;M=A&$rD}ehz$84`xG?jH^AKDc5b2_rdm~0t*^e0xvAYxTsy?@Jq~vf0z2!$g z;^O3Vad*O|jFX~Wpi8XRZ2p7>(GYT^jCjY#)ZJgAl25OgH8=}DwoxV~E*>GfBDD?8 zv0WjeYxZCgSAO+Hdvkvx+dP#s0E^hB!|ws)w$V0aSs0Sv7b=nV4~=#b6yaYk+Pto) zLmfvHIZ#niedst)j3Popkj;KZRW!PbdU-@@BSKEwgpABj4k*x;_3Nn2%ythRi!;tT z%HUsvP9c-qnkYub(|b4W_wV1I8SF^MMn|Wnr@yq3(9SeF@1x<A9n$PF0<47Ifdl2^NHX%>KHFr_<0{T&xtEai%EhqlP*+K_Mu}A_frHAFD7el1GQpN;Hm z)gMt7tew4LfcW-?ri$h)x*2mw0*RKGnAq+F_Hl(ju16&g!yTsA_f0ssx2+4zer8jd z-r(1K0sw{l%a<>%&dy-0L@FA>t&oENt*ETzmk1=XNY@y1+VTn>waC88PD>li*k1}O z3}C=H8cpZgF)=^%d#8>}K!Qt2O4NS)3C#8z=})5Jp$aR`Mhrpw-uE{gQ8+p2{Lb|5 z8xlGz#1`Fw@asCPosC`;a^*Q;#W56uwL62oBwM{RDjSvn-LU8@DJkueG0D=LE;VeA zf9BczrX>8gcWy4l2dBq=pu%GIBX&$Ld?gr0GKa5*WiEuTC3`lCO<|K#X^$heBHF3nwlDs(qsOQ z`sge=O&t@rUd0t;$SP+|RBQ{$cwVK&q=ct+jxwTQSOPj5j&3QJNA$32c^@~ z0Z6h4xMv6;xW34Sg>uc@$C3uWa?n+*QJ*PP=cU z6#2K_mIF5;PzkN`KAfTpwec}qG&OsstJ|z9NwaeHZSYwbAHf_s&90{3Py$^qk6UF$ z#fuxT9W(xytKV(OUJXx9sS!_JQH8!`m5r5%i4XQ-p zK(_3#J#-ta2<5H1Dhv3ZsL|RrZ*W3V z+4KcI4dQ6t0T!dxw%>(Pwm+7C}K74g125dFbWYlv-X$XP{-7q>VV zPXqcuMgS$!Qovx<`L1_S@0%g~V{do2SUmm<^Z>l?+Hfn$@rZ_-)Fl^;?AMP$S#&Ar zP-8;KYV-^%GaZDit9#Jy1*R_5MZ9UY_iLL$=-}rs$Nh1o+e<%Ai=T;ILD`rG zS__pQG{a&Vy{;lwYK2xNl(cHKMa6J=dxF^3E_Gd&ixgve*0Vi)E-r0Oi}#O3gg%~^ z&dyDrV%vpdRc__aNtR<4vS ztcv9~i!Tle4w4(f-X$<^RmEhVOH3Ulehju}<6ynp%Qn zdAp-#UpR#xF`xJkp~n1`U#jsj+WW2U=S63s&&irHX4q#8%PK2Djg37xHH>e2syHtG=^4lkas+#7zMR0!pcB(rU88z@>w!Zw6h9-Cg`-A~` z2$dz+-Z|Qc$mIER#a4yceYettYi3IE@SD9<$Xn=OhA#hoW;Bm2*HT04lkau#q)B(9 zU2M~l);$-4iKwI~ako$^!_xOQ``;R&ry`uTPf(+~M$}@FR_7MQ`t6?%AERJD$q1&0 zi5a*Pj_0di`x!%MwPV8H@>fW{k$kO>vN@f+&$_L<Io0`JQQPFS+ibIc}u6mI@@v2W-rVlw|OHp+Q zhk#KW<877O5HEx`57{l*xhO#M_hLD2{Sbp?azv?*)4U3x$^=v!B>EzUx@tDeU(#C0 zb|vCjUOk;S;PT;fe`)4lyq= zEPKoTH@s()m_77d5U0k_u{V4YHz-U}A)T_u(>gfO8I&RmiQp>j!@PIe6519H3(0Dm z2J$pEcal&mD$7OwZd28TzZ9GB`<+EUzrm)KRcJ(;Okk2i_Y5V@*Kh)G=%Jit_ZT7e zA*=+D8toCrqD;vN-&4>#q^Zrd0VZ;ivkgw^cDk%}G?K8d69dJxDRUAlNpz-==nnyj zAV5Kd?zT7&oJ65TW4^jE3?fB1=(?N#6TbpMU$L$(KvVXHzJ7Um(OZ zvB5L|>-NwIjvXEy4Zb2~HyAxN)*;{ft=g`#?CF`TuC~aCHqg=C6x85S&m|mE_8Th$~&&``_8v?cIw9LfhTR{)GMMnWPP6UN1O=97Fci5%s z)SZ~GT8^rN!@(EBRr7GR4`G_7b6k)u`p-waV&aQ3+t#js+3EBv_X{Xq*TKH^!+QJF zq#W&Te8BugN=k}}a5kcV=8B;4GQnpm-(pV zgG>R8*_nyyKD^HHxRCUP{-aGI-al4#+(D6QeC<3*+4?M)TNgaC4p{pK~X(7jn+!(X=QtG|(pdU4{fA09im{ z=RwuSjx&I5eY!9TKe$h*4_CF@Os-D#N%ZyiBPdC-5VU17r*bQ+($sdYi8_u4iHq@M zAwUy87f%Wr^DdZ&4w$E`R=(EyGl1|})YLtqudJYjnQ9r3Meh6KU$x%W4v)O~vQnSu z2ip+6HgMFI)0n*R z2GaYZxxVNdLjAUE_P{*(#aT;5W>ND)+F2h3rqc{o|SC&o(B!s(66c7rh zc7A97?whZU+X{I=3ZZ9|c<8___^7F=sA=YBVCGk4Q~U5;XnbsRd^B2N6ynO^9bvi` z{I!N96HRb?pHlG~tf};l@+Q5zyZc95Te*&|F0%)9N)(QoBYvC zNl+-(+&$1OI0R*9Q|UWkfjvb1WkF}41LSD2(a{k9#~)iFwlW>WJHQV~7?0*EKjcJf z{(gT5iUtP<2N+>>%8b1P!Y^j`5Txu@yp|=1*~M9}V^K~1_fVykuWzp+m zs?3{j&6@}5GyP0B_&!e5HYb^GWn7Kac;mbE#jcTZ7@4p1>POHQ=livhlHxguf6(gc zLb79LueJiL2s%2tF;y_$tD-=(W|zZ+*w~2%>-l#jFfIJfUWQX7B&478Fr=muww!s8 zJj&VBYf|xwmE{lnsvL>?plZozx+<8V-dB@tN#AgKX4vK4IOwSSZ zcQOByx%vLlk(bI-ehzyQFnjU(+L}SRUSK`cKvj2lKe$U#QSsYX7JeZ4Yat|c+Ai}S zw7WY1KFe^XcyB2^3j6XZXbuHa?^MJv*`}6oRr^KIJW9+00nZ$**%Y+E(i zjP)M%J8z#u5fBkSGi{|0zC=!w$*goru$ulEGOQ9dEPqRB;J~9nLRYy&mUN_*o_m4| zG^`iNYt1Xqo@4zu^6#0V@!8yLI`rORI8_YDyGeTg-IzCJU}qI=`ns&f$ZEf`a5}@NCh@+4*pCf#hzx=tMS) zCDUfYmL)nHyO&*%vhMhD>|-?&DiX??^6~z47c(twZ%>c-^$yd^m+waKfowFs#3}-3 z&~50vpMTx(JgN&yEH1=8NdIAS?ASPbqA>1vY7qO~>a#f^E9OTm5k5X`R3!!_s5%Tu z@888T>V$+2G>k8ALTzf>3{Ad%t1+w(`JENO;O>5HMMOmO`1p7dqzu0IKQi8ge^LD$ zx}buc|L@v=pV7(QEuDeUBIr#nuC8{~{(biEwh2`RZAS+O+NYhL5rLc568z7{K(ojE z`gQsCK5~m&ke8SL%<$h`C6?Qe{m+^Y=+qx!5;W8*rg7h?<&!nl|9yNOT@MFC zXEyhcQ&5PGj>ZHmKXC-J3`+-)H3Nm%T8pdvhg7=P^z@`Dm_J@=cGi1U$Zk1z4=hrx*NlgQlcPZdmOHup@*c8w zcQjkRvP?mR2uv}`2CIpPe9Ts7GDy0xif^X`BI&LkWk|`VegjT z|M4D3UQPQV!EHVi&&;Tkdl;a3eWGp11V33>_s7*8DZAbgQ-Ibp9j1axFvdr9b@kWjAEiN&Y?Rf2>v3-9541=1m+9A3?xM z7~f6*i7^h`Jt>J6+=P(*Ki^qmCW3;j>~Nx@q5|Z#K%n>z4<=E>Oas1?O#i>%K~Q>! zXA`{K;q&(bu;QQ^`2t0`uP+TXH6Z8sZgn?g*F5nw=+OSTo64*vuE!P^9UbzUz$_rZ z^9EwgtB9@bZD%JZ0{vtz$l}5RoRaR^Yngwm{kN6~35^f^Fr*izW@fi{cZdooX4Id< z_J0Gz_6CBVi!cTtQjGq2VIYd2lsEkH|6P=a(|z-1O(GDbBItUt!ge+{<1;eKcH07x zpc2X8%l|^VL4yTCGKfa9ftDAT0tDS7#84NJgu{b_8#f_OWAt#J(U9*SMX7nX?6Y|K zp^1s&So`cWG(m}F=;6!~|GmW(1R^Tg*PZBfp?(G{@V?mD*npXBMBuixwo(asfyTXu zK{3n0(Gl(W^VyiTXrK)KbH1LPkdSxUQ84pl_D>O#LN4Gk*xyh8=8f{C(qbPIzX#0F z!Ql<=Eg)I}Zr)x2)GJ&wrrK-TvS|#5R%N#aEL>b_rkpgN%0!a0pwKE#TxTnbNKV}<1BJJ} zQuEOn`U0*_PD@RWCW?w!#h;~ARaF5;Gpn-jOwck+*8FHFcNAm*ppe@>IvQ4Ss;#S= zou(f=1TljSWhAGfQj%7G3z<{h7i4Bex2{n(jU3iesQsS|reRcSsH*~#=xC`vU0aC# zWPA&Tl|YBw@KCJO6$Ngp8vhm(ROm*)_wen3tPT`)Z^Bwz?*L7tZbZt<#f5>1S&&j% z%A_Z0W?{jI3=mNxpn^fBk)(x-%g^5~dY?I0{n7v6=c|LTh`Gkx#K2-e1Jl#emXPZj z{P5u5dew3%>w~>zEFes>GI;jYw;Xi(lq`*?`NyQ2RSr&;co&% zih@%@PfmLA2h2D&F{jcH%;DZjG~`Ri2ELD;o0!0URF3rlwaEsEvBC}DNRgGou&Gd> zgS6TSW<_bzR8&-NUQ<&CI>Ntwqa!61S|!p(06AT(Lw#mKTz)_b3G^sIXn_}hJ7}k_ zPLSgaN>(RUWMJdWHX|k@XAgkMjj}~dP36ML`5OZWAz{v9r^*{+w z&$S+BJS9{6TB7&A!AyvyWPdp{{TrsPto#k^fHo@PJMs-QRZ+t@FFJB~a*$|73CMdS zlwY&3*Z?QH1pSl8!OvXavWc?r&zJ-SGx_sw0f;ps#^Pw1f&O>&{K;{`kMiEu?3f>|qIOTB}mGuzg3>J}@&QgA;PWFX!rkfQP^xP*$#0ZDwwsI8kr{ z+z%*fLm3oajsw7T5MM9GW`>FbGHA{%^B1K6aO5l`28g{6#JCH4B@i9zNyx~`O%IU| zeqI3>`@BQAk6@ZlrWdW#W=S1K%23$lAkJ%_iJN;CHk;er+zdE7G_#aQH#ax!tU)J!dXY~0W)}$jTymWPC~eH8(`A^VjQUPXStX;f&b)|g9J52%4!0{*(%Nd{G-glk;IA#G)N`goBv=v zX~Bir2HIzuX#B{nM3;Ds=uJnNv5=HP;y%pikcGm4T(*W1F-bgTRFVv@c4D{5-+vGO z`b?oDV*V{l%M}zSbdo7oa4J!?>D#X)OwLdH1VZNEJvzJer!702iGDU>t#|JNZsA3G z=_01{;iR9BE7N)r*2FRYv2I=WD|gymH1qR4n7_p zr(tJ6$KzFX5Xy5^_K5!8UKVf~0ptx_g zb!7z-{WklV4$vEY$3baxIi9lx;-85+EYU#kRRHe)NeB#pl)Q-I4c;bvV6OD-Y|D(h z0H9F7q)0+i(sFlLc5iR*g&GiivbW!C{hkmpM1EB!ZCoZaohO zBv%&oS%l-c-rfSKFQiEY+F@7}Q1@bO1iVs%$BWbsg|7k{f`$bEM*}T`A+zb@uUP;4 zQ+xk>ZoHGJ!vJ{1;p?Z;cTQFT&q?2=@jL&UN1GTM|C4Db{wfW105$@;AP$E(tWWBM zlK-P@#SQiY?c7FZc&-TAPEUwgT5CDhP4kW$r z_UnrD!d^hG|Iz<}`|lSr-ZN0U0dEN;`@ep1iK<`_v23hqaM#+ex1YD)Vaes^1E#=k zr76B72a5@m>{3+7B?7i6!xB7A%>`(?l;CGTtp|4gb2uF~_l{h5@Am+ee*s119Z+6@lY2pmP2b0r1*WYKzNmlmenP^c?mzuizOq1ibI>zPM?r!1Z_#R-(ID$q2Rrt}j zJS{bq_{EE7i{PM&^D74xhfN2S7mo)FLR+&#@Xvu%{+$sbC2kdCzlt(mVn7{0I|)5; zHT*n0fBL_W`7qzf2QuhJg@@;uE)5IMbD#Im#oY#eugN7X0iJv1b%=)6ECwSg=?FYZcKllA7PgxvV>G1D> zhYCMjP6LK>Q(eQ8fPi48&Ri*`%s?)TLF3_XVP-pscH8;JrGu#?5Tu(_*nffC#6SOO%Emm?5I_k$_QZU1|k}rr}CdZ z(TZ<55k@de=)IDGg4j|4U5RV}GRP8uuH|fgRDVy(kxWC8z*Z7EnX%m*(Fr%UL5ohBDaf)FlFzWM;5(d2F0FMyy%yg!5iPa}Nmvc+Lj47AAq_VZH!!$B@M1?hWx`KsUl>EZf_L;)!3z9Epj zwOMfJ4aWr%Z#sPz2%(M*IBs$DPz;LS-OWv$GXTdMXrUm_u$~~qd@Fy{B~Z*R;zRm` zNhSOPXm%q_E?FNG`(Z9%fQ-25$gdp5Q`!U)s1s-g4>QQor#bJDnrs$p`<9mhURea- zg$7?azZJ-n!C(05)Tm+r@)FP1_yg!NW9;&C7M!&hba!$xW*JTJ64HA(Wijzk<#Pp? zwdpyZiDvQpOf!4?4wC__Xcdj1iX=Blyd;WPwR?|Q6xX6AVQ5~E?} zcdp3O--)9T_o{dx4NO49>#_oJWj#(HTh^lhS&SZkG(*sx?N#JWujy>{M-fgE3LY>$ z!KqPIQv>`M_7g`iC{=rh{cf z0n9J@hKA5CZq8cIK{$^FWrM{1<{v}T6KVv#H8??hh-EG9h@hmPsN9G!0NRM6GMXw1 zl$%BKY~SBwyhmXfNjXwdVI<1&x6t?iAbv70l*e`qN4*4R4n>;lD8@Oq{MzNYXby@mr6 zG(jxzmw=c;v+Ho?1^NPEH3JepUf%h1medXr-i_ZT{)Ot5IzGnd93b@l+b7upoO!j`oQd}C>t#YN zBq!f}1ya4`vPhjI;?x?4fh(e*RD|`mFE9VB>N2?>yq@>&-j$J+WtMie8ZFiu#?NF4 zJhFyXVdC0?=DB7G$e&5!Fbvk7&qkdO;~;;=9d1HClEai=aIeE0D(Cct*RwWR#c)h^ z4{&bX9O<@+aIUG6pILC?r1Kr)&aa~+XN-yg^(eAd?*O2L#m_3dFx7iQl^d$Bxitqb zs0m(>Y4yxTleh1pC>|c3tA~eel4o>m@7IBWu}c%=E``8eCiv6}5}yN{-EXFq6T&fk z8T7ZF9eYY*xzZB=!ca@jsn>eBMc&|Ko;Z|2&T@8Ta z-@kw3sEmXxo1#)|UT8hin6v(;ug$0MHE#5Nf+^2dt=@ilA6igosw;LrB9~yD@?+?M z`NasS9*Ef-EZoIai^GeibMn`deHOr`ifg{AwaTZL=W~~{AmG;EIg*`^jzNq;XKx~6 zyMRT63=fjJh~H%|v;#>DD^GEt3WD_v-y9pw+7EUS2s2A8*-FRIF>%UhbIC?DoA)~F zZ-$hD)F1#jU5?a=Y2$j)g+6sf`>-BtS&3 zR~K6^U3%+P7KD^!r+EDB&wMeDe=*+&JCTgziy3BH5*`UjuBbhMl)^H{b~UOS01OIs zZiC}x^?HhAx$Xx%AsO%Ara2{ULI8Y8qtwTy_wGHq>mPEHnVA_R^&O?IJU2dw4~CPi z0**+=gq{y9#~0@9AN85GSHMF=Pfl*_*4}SG+RjY7n8(sI(+&$!nPUpo!$|a!A%JhZ(;F zhKW1Qt-_WB^1$&&;GuOS`Q@T_;xjf6e?4T~&Z@oOcqR$MmG-Zc=1`TrMOw z9D%qxfsqM^{^cJ?7#R}9;m9XQR1Sm#uA!6>98_qXvjwkSF;$gEn$TSru_w*^?Vih zTnMn#dW{9kF61!w+yKTBg_yek+10?XM?rA9_^P_+3%aDiAoT(%BO!vVpCF5(kp}VHG}{@qq2G_jUM}Zw(+IS#<$P0Q7@ne+K&oC7?7FO zVh%;Wn2CUc)(f__FPp$&=30Wm@0o^_h5kIHAlPG5IDZ~S9zb=Ic3+N?g&Cq)^p8AD za9`xv30tBVZK#nq&FA?4VA&Iey5P8&2W5 zckjn?aq*k}ervTzcaKTv@ePKs3=xbok5xEp2&F{e=RKNhQD|x}08k)-S;35&0eW{V zG1yiaI2SNx(?ybL8o-?A%bT9$w*xIA&z=dtl&gq`rh?fQAztwXe-c8%B0}e?8mt@9 zUpd+i67|^n7HM6{>YOIpHD_>Jh;lII5v<-O0G~*0PFBUz*MEe5&MoATG(TQ6MjXjk zM;4#{S-Q24;CF+aZAh2bF1Ve@2;G2LzJz;*c&$wrfrPA(kWh{-@Bls?Gmo+|Ge<;; z7Y*HprPXt2)2}i7WJ1AhE7!W7up6uxKutP7IX*V|@bP0ep1=;Zv8+5$*|H*RY)cCr zWf_eTYRU26A1-Ou{nE&AE-*nm=!aYP z31j((e11sZf_@t{PxY@R#3Ya*#jV@1%pzi7o`ly_?lP$lnJOJ2ROQ%f!ge?l`6`$= zn)<&atKn(Tg=J7WJ&%kW%2is@T^t>lfSVPJqZ z#AjnX`UM;`UAh`3Y5xnakLXI+>}^Kyus6rY-%>SaM2hQNioI8hAPSMsl5!z=j!**+ zBOM%*fDo>jJOV5ePAZf$UbqE{_Ee}1D>m96@L7L!njjEG;|EmW9PEw3gy5|`->7_R z6+SNKGc!9gm`bD3}pbW z3JHaIfji5^{Fcu}rx~d`GBO^zEF9MlK5{yaSoGWsEM;N_a|??$CWl~a@YHq%n z#E$pN`2A@Ah3(TYa>u`U12b3V34rc^mZIXA;|sv1UqS9~MVPq%;` zhLRu5R8%BXfl9#uK#6F>&$nqK0AJI7Q&V-Giz#eOh6~gH!b;lUYEO?>8qQaE%%6#zHygfa0K+_A5 z&i-#>s@$@AzdeVV9hf^^`vJ=neljhd6lDWk1ra{}`siyyer!@=CfQm%c`i;)Q!}$b zNPd8&2E6mN$xvy)Me}Kr1Hpj+-?8@N$B3LYl6^-IYeW5BTwE;k1yZmNAodqHzk_)I z!5k&Xeb`BtTV~Si?}hgkf(opR;Ouo8FKf$(;u-rYp6}|vga{Q9&RGyRporC*k)=lI z>A*D%lh*Hb(cXt?3TLwX-Y3CfL=C-ZV4$K=uqLa9u2UAB81+>(l05%6qij?*P7$Om zKS3!Drw=5@B=z(*)l190B++9DK%$ocONaY;0Jgzoh-7G37_ESrxI=%&uhx%6G-o2- zzo)=gnpIRoI3;D>9uCtDgc2;D?zAd_!WmR*;F$?72J9{?BSZdjIoe=MkqR$x#0$6| zUn&|J95i?>LvXS>e7Au0Z`9_Oc_0O%Bz%1An7LJaMTE!mze2Vfqu>mFr5NL#>)l2GYw`*b*aC}eTpodnTU?5l;xZ-;s9B#q8f=!2G zn>+^X6Vwt&2Kg~HHLMC>Wpy=1q~B&i>lr=nAq3+EE7l?msF<0n=kfd6ByYOQwj8f! z!+S6!BFTU@6kKIrJKt;5b}9M+HkTI4Qxf~LO{L#Kr0v0t1jdk#RQjDL*c2|N{5*nc zlP?wmcl_LVArCF@Yiatyi}nKprmL-YLSp)&z3O);UNPJ`QvbkN#45)A%R$vrbp2Z9 zH;b`miH1$+xfmjt1BBih)II^RmWBWrIAQO0YgivhOu`T^pw%#=l1xP@6JW!^ zeEn>VQuPV?&lW0QcORe2vAhc`r(j4G-9BF{f_mnJCG6%2V<|LP`GU=GIF!R* z0riN|Z%$TN9BjUfD+7=bNq~L?tpn`g&~5}1Vhun8{co^tV32?ZzP<*;eT0sB7CqWC z=vnQptwWxmF?!%>*TIbK8MbBi@iD%b2pbV@4TFSJ>W2?v$j&S@<#KHfI0CoFN)v&G zw})DNJ?*MdNk&!{Olj}H%ca9KQ71Tu4lB+wGWEkML6^PbUH^rsdI#VJ8>;xQA0ds8 zux@kbnN4c*2?)e*NHfZFHomcrTQFjJRmer=!I1lHsjLUkcCR?oM8iZ!gDe zWO&PXY??*Vhn>k}7t9||^uDLuEBmnQzFJq++gS3Yf7VO;P%d++s8ot{<8h`_sgNbN z#!5GT%zX)^z^Z3TGp0Q&>F8poo={E#XbuR2a%4P!XmBL^{ro2@=PoKB%5jwQvz0yI>3XkZsk2*8HY#DvQp+1R znV2L0=M5oc%$I;g>Xvy3FR7*4yrKOW`AbVJWO&h+y9<8ss>}rrxwwXqXQc5H=ncfZVoQBf8jBDvVr^YZ07CH%*bCR?`Ss`mf|cv zk$h|#@v<0Azw!LI0Xwl<{nqjD+v|G_uWoZ~1l~C>Ei2y&ZM-*AXSnjUFqZy~6RvpW z${gpP5pDUm6wP0O%3j0>pj3K+FAwarJiGka->Q4iX=)@9466xX>&4`OddF26ShbED z%0zJ~BceB^x~Y_P;Y;M)m+_3QTdN5qh%zx=0d#brM-$Qhci$1`HorXEZ?+b`Tw#5U z?C9m zptwIm+<~nzsM^Y00-Kqx=F(iw%bG?yejdf!+eoYBlwN-TIHus>0_Ub0mA=bWI%m9N zac*IgIGxd>4!~dMt0xM%I6+Z^m!fI(TvXg<%~;~mn>V4q8{D)Ra6WERN^%Ns;>b82 zJMJyL#L%-XD(PBY4z-DFp0j)-DV!PnIIl zGo{`$Zw3;~D9l#gm_pocvv|BMQxi+E_k!Ksx!u%Bs#RF2h;^@R33oZ^c4kz8J*}M* z|1fpqJ`zT$kMUvC+$*z&H#7=IyH3iLeGBKHu(W#nvd2Mc-PX}NTkC>?-m6zpEM~nM z2YJFsyB>nF8kflCjOu60v&M!7nG0;=LY3910DZ*tw5+%|6=z{^Rh0lqD4%gZwNx4$ln$<=Dr;Z4Qc)|jwP6o;dhIdtKmL>+Rlqrk=@l!HJ^k$Kjh|78GStFk3ib- zK+Vo6TOU0`d+W2l0`jFM<{U2KNTvo`NqP5xZ%Hj-?Lo3>{<0RAU5q;33SzDfzt31W zuD`iCT`%D0vy|_RFajx2*<;iuxfw)>>@<0{+><<%8GSbiZ@>=qv$v4o+^W;W}g6JE#yyYZcE3LeaB>S@^>O4 zlecd(ziv+{Bha4L+Ltw^kY9Ld>f##L+8U&y5|WZK2Gs`|7^EiWQF!DyrRU@iXo5p{ zaunqOs8wuYR3tMqTyg8#FgpJ(SBO!yu>CMcZ=0_?0aHAJCxF{gNlB?b<~mt!dfFS$=btqZ zmp->bWySFxA3V`-q=L==-S{0+-ADX1Vm^9PhEtkujI9)=hsekq^Ag4ypCiKSP1-3K zvFtMv^7He-i68_r93Ucq0r~PR_^xTdLOXU7=Hb2mD|HXCz~-3V2O6S^FLkD4ws9VeN@iC}ZVWj(w zVFDo8&!0bCDI({E(|LvMtgX@0LyRCMCEw&KvaZht+b%eNgcb0>XK39) zcRV=CzzZYm?ai6B%s}tkzuA)>IrTI4nFspTb;Sz~kN!8V=iZgwdOUf>EEa| zZTL*>{tqSyD7&t&?{4#gdKA98km)? zFf!&OCx>KP(ax#UpOIWV_bx25Mc#yncwsIiIW!uiA~7q2H1V-#33zEQ|7acx6{kLi81d!XO7U&;Pz{>q;@=t>SK=qB$_xmssYc9=6hd+2g`vyH1tsJJH zg%T95Us_k^rK*ZyUszOh70qB_3{{k$;q}{~t2w6Hi9E1hw;U)T*RTNGr|0=8SJLvz zib3*=p$^KJukkyyiiKMGr^!-0`}ho_qV=0^Nxd%pTs7KHvM%N%NH@mC9=px~gXf|f z?BzWxYnACF$L+N1qp}5M*68iiQU%?}+I?g#jd5sF3+dJz*YcP9VxBwh)QWzi7NmO4 z>$!^Szcz7e!-w)Ke*(hxlTnV-{deI}nzN&2C8d-E-eUT0rf@bjhS}~_UZh0MFY=#H{O4} zl~KrRWJLMk!OOU~-#If)WosGGizX$JF;0$`r+8g<@r#b0b>f3XfVQ2|nb1-0?G5NH zGfKCjexfFuw`v5rB+T+_ps~9sVr3Lp5v7EDzb-Cd@zC$71J1jy_QtW%ooK2(OV!-`aPCNYG zXNt@!N+%`t*#YLgzl1D)>kDa($K}@FlOHf&WM#bU-;V0RhrYp29uAkXQwrf`Q(pq? zTu(BGV4h#6&Vlq7PeL1|8b^8;S|0Tk{cvl*r}{fYRCwdZ(}Y`LvR;H+L5fR;x+;G^ zE?W?=cl;mF&^o8e_J4m>7!yt}*GzWQyvrOfo7mFqeT^)#4#J8E+p!nfqa<(UU5O%3i( zEaVq(jcUx}vtaYQO@z6c`^E(Mo8}0JUUl@@QI#7d*hYCr;wjC>`jfTTmT$@AI8Gwmt&Ud3Ch^79@arK@W|@7j`C>eiDO#U%ggsqec-J&CW>PIA8~ zwPEDKV!p#MFPHt41Z`}5N=D+Wm4Qmce`qUgtmxOs;8a;T=^o4VU!5O`w++TxwOXSL zpj1c^Z&Z&7XMx`s?8N#^L_@dHbo7Qj6S)mi5Dvju{w+ zwx{bn+Qa`?7g&>npC`j`UQ1*E<}859B!Vsia>$z>eX%suC%?Tgjm#F;P6XR#r*BPM zk<}Q8R~=bsj8`;VlmXWNR&aI}@Gv@CydEM6i=RAs((u{M2#|@6Q)()zdE)vNLP&8Y zxP}B7wy*F!egbH@i0Vwe7z+`Q2$<@@fj0HyN0>dM0?317V+mKThBcPnGL1GUZG0A$e@Q{xJ{PF;L(uGXXa(a{qrVORChfPo3?c&9K0))teADVA*7`OqTyTzo}45^ zVk7OAhAO|N**s2Mw`06j{-)vOUN-1VscahzalYxHA7EzuuF%lU;;XPHVWWt!cqZ0r z?~59EiLbl^jD#=Ihlculib;^{%g@EO1dxaCV44{&G(1hH`?0~ zk#%RLUA^(E+rK0)x+kGnkbfoH?ZBox?KIJANwp<2uzKCHLe`V|1=DKow(YZ_pPLKc z%VsiiFwQ$_c=UD@Kl>~!aIF!GwZG>WRBBp2n15_(4N0k*`|PmGFm4H}qBNx#ddoZ0 zb+LMa=h%d+01;E$*wTiG0#JsjqUkDiokLPm(gR$NFvJ1@3^jygtsf*teW_Q0@{BAC zRa?qc+#O1w&+&TX@pp^q`#VfRQQb(5pE$WVq|A(0u3*T!k(TCKIMUGJ^Daa@1~7WR zN8bI*N6_{-Pe;|8;WxKg_&uVvwBW-ri`aC&v;BgG?c4tKD`C4nh9W4L)^>J= z*x<|r#aKHR5ZxHL`#~GddJj$ai<+Kh;uE@@e(Lpgl@sIG8H`uFE5gB2GAr*n)dZ5} zDKh3O{>WiA{Ss4O_V?}V`>I(Oo}U4ow$fzMAb5yY58(Co)Vr`EU`~TKq~S9j+^hd1_BThfe%?bZB)p1T_Iqt6<@u21-eH>FbL=YK5OHTY2*4#+e>Na zF*aj#zM=8T<&;%GP;5!%_sYd5p=Y-<0{eb!+8i<~V4R(+si~4MN-J}K=SRg9yYV-S zA3*cRyiP6a^6U^q$>$N^?x-Qi3OQ3|nSHc_j$XrrhUE@IPcd;oy7ccr#zIF(9#}RV z!Nf>sRp_s-jzx^2Ma5lP*{!Cg_Wc#;KKIZpz%8PWnUIvRsyPc9Zdz5l5K zXXrnWb62~Og9CTKE_YxBVrWROjj~n*xCW5ugz`f=3b^Z$AcjE{0VIN8-!Q_r!U$Hz z1w8ruQe0+z<=MsUo9fP^yLLN4gnu4p2P$1Ggw-NHVA_~pULI?SwTBHonX277@w#MC zQNjJYBgB*|9If{mY|UI;6V)&LcRlyl43OA(9$sG09rD@11*?qf3rUG`e!HCOKr%oc z4VnqGq5y0`OtBp;1rT6NH5zg{c##N|si+t{oOZqnU>w{D=%?W*VXHbi^8IWj`7qtP z=WYS5SjYMod9$(Kl+Bv|`jFlsQ`6Gyot-bZ=hs0}4={YQ@1MmgNRRQ}I@!6r*a1HB zE;w&8S+U~`)dA&`2Ys;WHO00!fPr)U>>Ic_of23T82Te<*3~gH{Yu^+R)z6Om(-;o z`KH@T&QoV=Q}?7?y0K19cSbJ7{UFUN%8Fv3`tAoDUo7*OeEb^)jH^uHW-S57(8bfg zjEuy!!<>*=^MV}=t{wf+Z{K_%;>Ri}l!rTIcZ18#*4G9v4v(Zr2n__Y78^Qx*^=?? z88xz(Tzc4urYDZ*~(|UcLC%^lTi4LuWoYdqLQ; z;@XYbAhPTxKD12szD)Q2J5+v0PNAOC^>ncL+Dotdx0#YNw2|_e?FE8vSD*1+b2z;lcr0gxV7j=~6#r21!{SXh=YgbyNvz4@i+{Jz9)yJzEh%DLu3T{(gS|qNfFvsKPZ>jpfpD#Le9ugl33ThywM4hYQWr3^ZUM*g>aauPz8~{fE%$orByp0Of0PJd_nP z5yU1v3uIdeOV`Bm^7T+`!i+u$`q!n7!^V-3lN%#>Y-ewet+6#pxKYR?CiVe1R*&oJ zRB|fKAoGWV<^fn%P{HptWq6N9lTYIH`9?z#M)aTn`^WD{eKD94A3wkl3aV8}5t8|G zP}>EajOD@09|l1N_pPje)2&aClw^G<*9@EmN(!Y2k>CBlq~-#~YOIU4e%#vmNz%Ca zL$>!K&nV}T%ID;M7{6l6@0R@+r=Nq3By8VYaCNP;zSz3FA9Kn>e~95S*YE*2Dh7tl zsVV7!(78=`Yd7{~UFQ*?a8RZ^x-R!uClx({WIgD^Hju{p?|fGCiUZFNJAILKTz6DMYppl zIB}B)s4DF$U+jO`Rq)bW1yj(#z!q`y9+tca-n^so<;CS+mrHo@dC!hlUc%dMZwQ@R^b-6A$m5Yn7VqPh8=A<2A0gT=axPw2oe%Z?y`=HjxQs9jqNZGA zh6IiAYRA;$OWlu`->|ZSv}(@3-TPLeP@m_zJax6KW{O7-Z*d{%U5!3`-U_1QfGf<$ zNvt>QcgsbS`=qGGXh*iL{HnAt2@dC@q@uDbxeUvPd<1Ea)j0n?YT8m;MHA&-eFI~f z|EaZXjvPy9vbWz_&cdDrIt_G3r?EmUWl+lCbYu{Jhz9-yPO`|UD$p#1 z;T${|G(!pt$c}vQ{@v^JC;c+j>OfC~=d#yDPvSIfLicUiYGb8Y?RO7z z3yv@+fclGb{JxDrD08i`8v!w4k-vN2?9)%|FNQwq)m%OeU5eC7VBwJt^c-7NyQI9V z5B$wSKFQK87mzx??-n|C13zJh$4^p6yTSR<&i1O=Gz(6(aZFTHec-vjre@SfA%BVH zFl0E3!RTM`Rzr%k&tWxU4CWk&mOk8U@CXSBLBF^_??IMJa;Z(vDe(#qgG%=D^JT~W zex&2O!=3AEpEN&;EAFV5%to^oXm5UusvVDtbQJmIT>5yfWeMye8>eskgbu250;KL( z`hT0pFHL&+GV(qm8czw@1Rs?hEcp;@7;eD?$qd=pkj)2wQhf8ca0XmMIK+(70i8V| zVK)vL#7kQLNc#2%x3vz9JSpOB0;LE%NBo4QZ2!`Et#j%r7?RAjyuE2U$OBP3))HlE zTztjz8Z?q)BPhGb&fMEewtms|`2w{7u>U)cIX=4k5g<#kyJl|-ee`xn0vj4VrGSVg9A(;8i|dX@3v|8iK$L7wU(n_O}7qGNJ<8vGg3oL$zcG z=QCZq%l{jytA4C_vXF#?$;wNOqhrv2xVw~ZU9zb#=aAGP)}8@13@%Sou*h^3vd5L% z+*}?jU%-Nr4Fq{vtqOQg0dQaqNF~32QBxD2V(;YCcPsGW!?Lj1heM$O3`q#0svA({WKm2|eFCZaK@}4uYldE&IlVkpddLhAhBbuIcXq--c z$XYG8RG_P~dF#wkNaEN4zVbRLGflL0w^@Vx3J65Mfd&G)U+5N4<};`&!wJnw*=Edcu444a2Vgw zVWg&>_~dfGUsGFqsfpj>vvI)(6+j<>o4#!fo?T(+w7@M zfL=e(5V3{XbWr?#4v6CVay(9es%tZ-GVhH^Ok@FC3&xPz^H1iW(FK04?Bm|Y^7aM% zAtPtx^3KlN?Z|o@cwpprq6mb+uWCY<>q?WzviZ}q?`uOQ^9=ve$7c?!vypClqJtma=_BYBM@W8&?n=hBCy^ghUq8NrZA?vkK zJZf*CuC5Lk$bIr$om;m+Gj8R(_`2mo7@st4P7ynD8Avve`eDisKzjo>v1}y0>r*_t zW1y_8406QeM{! z^oN}$)Vatj8Rx=FBV+CR{YS^|eknEuZ3f)-ZreiEX}zrYHT&~==IP;>_DM^erV?Z* zKKYf&nhP@*4lZuxtl!=$kWC9|8NDDKID_6v-vB^Uh$k^dpBaX8yZ7-##RPOQNE=|l zi&3u(6g2*zm4N}c=Ho}mIj<320!2R=gIlVcMaL&**bW)uj-#+*K#bf7+J>d^9!@%2 z9f-m1VU%#9+DeN43IGN*m)6c)>-}??BJiq}-~Y~~vb-dDC1bembpL82^o`J^XH9FY zudk!XO=zy5^g8;%|F0oj2aaYiLxe*{CKF|M$tR+2J^y=;$X3#|kI1?$6x)d^qmAGC zV~f@;sv~g!fdXh8rYmTL2XYm%U%w_18HEOAvf3iM+-OebN~c!mu}wp>!hCl0lM1ws zPUb6cMH2oEw+hox1-R;h7(|z7is|CaPeC2X5_I-Q35<&HU%17uxDlqMQKnbZ)6*4n zEVQ&=){E-k`XJX5(5l(?`>9h!L6qfPxUIqdrGv~)j^e0J7oa-mgoC0Myn8*xR~)WRz6^2?d~qbQYiydnW^C^ngM+!eFniH=^Mn)~tMc zdqF;Z4Lai9Vs;+FlIc|8uSouU48pt3Ik+OgPon>W9WnJfyow+o-|>T@^%qVgQMm81+f~FQd734;I&PI zfca_OPluvvjmr+NS63A#&xM*6na|MZef4bk3a;_;;wht2r?gR&t@Z{E9>6B zKUvLosaNBoh+~jS;Elca#bn|ADX5l9xk3DfMn9&@q0U6m!S3r}!$5LHJ30YI;v88o zKI=r9eBJ{K=7scKDh?u@4B?RL(pRyFJ_Fei(QQADWRi>(~!jk-$3JFWrCsxuz6glXuXgxHr?(%>Ud^aw!w)K zcS;wI4x#e975*7&0%js!cP-H?vf$na{vy$)U&qNw*l=tQ9|oh?w(Gal?f&*W5LJnU zb^%7@(cd600^Ed9$VTA9Ep%idR4wUyIe(#;f_g|@*eXysEwezSCOR4;4Y`y0p!y;1 zW1AXrRsK8okFUN{m6oGI?(W*4#vDK?kYtV#L$V80!U&krjA#uDZhdC$rj#&M1p#Y6 z^9SNf5#2@Wze4?7Ca%m5sX ztONXt(AjzHOk+E$I1;KNLbI{MH{iNYn~43xs`x7_9fk$RaH9@!r|0`Tw3i+2B}4(& zLtoS;(!Zf}&^y0nQt}F`sDxiD|M%g~0w=@7`c_714$5Du-EU7s@R*|w zF5+7YDM=^<_-{Nv#C)PyPZ=b6ZOsV7z+7`DeZ`mM=T-9wEHrTe(rBoP#K}lG~4g-{f0(8Z+}R^awW^#R4cp^6qj~ zF^>+@vZd(Ryzu|%2HbUfsXupdu3Fg*67kWxM|aMWV?8?0cH&T>T*C1*POHxAofL|rLCURhy$P=52;!ZusojuHu5t4INv`*E}5%_qTL^KQ_ z+Qff6PsQb!5;8AvaLXz549^yv(5wSQ2pYit3TZWC=fT$}B25~GZ-!%(EFwR`icWFb z%Oj3K#&7YP4M}-_LJcnhrzMG169T60Dk!kqVHk2I0m3g$=qD_Ipi!Y6M~irPw~cHp z^gKA99iIzZZ|W^Gt|7AnsHK@5DPYZ-U_Q`AkW8!txrs*TwLlgg%wrSu4jFDr1hden zcdp_qc|Xy;{Nc>+bn?EaD>H?^tRu`;u`*W0!Q^&BL*t!QOp|bAGEC_*t_YLh?nIU$ z85?t;l2Bgnyb8KX@^F)#pXjbRimQ3zMc`TsS+sIykhT{N59QI1VB@t6f2O9YYMKMp zmveZ-EP(qq`P4J0sOc=%(EF_aN~^@!*Qxru;baQ#$`CY&;`8HIb5wk&rMqfxb>sH~ zKeBo7p=yOy2uAgm{~~C&s#bhxx#F=7s$1g%nPDwzB8TLTd&-iTo?os6Q{#2!$RS>> zuMnyBI}z7#qpVW|Y`04JIUREMfA9kQQI=y;w-CL_@+Ee2K<6Dm*-LT{F5J(T@9%J$ z_xA=~@py7hym{H=v;Fo^P-^g5{wapwr5k##hKYC->o<^7J8QZ1%^WRa^whq8-=26) zQxy(Va6GB=1Xj{@W9yo7iMrtuaT*wOp@rcI%mtoSofw7*_s7dg^`)YBA$PE3OmIvW ze!dbeMS`+vz>QZrc=5_+>W@O{4U!m3 zH0FM~u%lgjXw+!M>$8`SX3J?ukw#D0_7p6{D42lA#*9i{#G)U+yA0P1iDjLQRS9iy zGw_mkNR<$B?QAKOWMqgns#S_K=r=Sl+TQEacHlZ|g8pt|aFC=jDuHi?y&b2i4Bzh)XJ4C{s8R2+M4oiuR4M{(_`)z_DQ3mi5rgTI*6T z--)JE3@^U;fPrIGtjfY2B4hpX17ex>u2sH(Hf^NV~2> zIIM$lGfZP#%HGoqD_5HE4U6wfok7uf<;s{NVnbvxGoeVl6&Z(3@>4&*a*-?Hw&)Ks z)k?k=F!Rn9H$&rW^3!2O9EHHV4Iv78lfLpr2+S-~ZJe}AmoETb~ z+d`UGt#NKcZ=K-!Rqz3>;%#JS4w~LZ18vIpLJh(?`L)!j%A|xetKiaKbAGCbu{-yl zy%xRO+#eUplP@4FOm_VNh4lI`MZ6Ue79%q=Xa?~9ppE6&)XAq>ZNlTAB%Bc34Dlei zhoC2FL!(CsHb(rw@i!R4&WwlL4R|yk9EtS!(Q4oqsLtUpp?zw)p>dm>2Ybc<*-5Z0 zh+#xeUZN^rLDcRrsQ3*}Ov`8r6tHu{LXOfAb)_-yBH}TPG3>ZOL+gxwx^>XVy4hdV@Ah>FKEULiCu%Uh+hLwtYjrf5^MgSU zJw3A8@qEbA)zJ8)icE|Z75`RRUsk~@ui%G8Odjq!W6=1*;_@{8G>E(L?2vdb$Y<&# z_xm)dywCY@$w1JI`>99F*PvqGXPIulnyOu`3;cy`$v$PnsW9Q48%>`L&DbB(OAHp{ zx0V)dl!NGrZ|3p8>1Bja@O}U$EebucpIEAn3Ufgp?;Rh`d~rSgDp~VVL#(sFfCt(Q1&*Eap4!59-JS} zjY*gomrw{MB8ABPUFs^LE zU_{qTtPmR`{1?nT!dQ!Bmf19PjTqP^*e;b5BX13JjsS#;&aaJrvhj)sPwUyE>p3NI zNR2KR-k8anoD70qx0asp7`*CzZCQ49jBKfmpoZYCAv8Fa*8IWGyG(g?X>pNNY;E%B zkzA*GG9b>nB^cXwyP4LzfD6QO5lEC>z+EqV2pjZaR-WgSU;M(m;g0U8FQz^Cd>DE< ztVpap5leBH&_!&!lM<~vW1)LfaUaIa>8mIrr!#o>3gn_lbbV2~XWFtNuTkJR00uQY zqM{TD1|^|#IZXQ3sf(_ft-?VInGtWi%aQ}Qm-*yAOfu@e>EI?R9uZdF zPr=#uW+QuCJq$kUZPA+ch9Wx%>-`E|LF&=_o)AE=y6oONtSGhzHmC}h!}_e6NO4Ff z@`#$~`fNYF5I87Nq<_D46t5O_o?WlVvM+p?k}eV^Ua89_r=1lWYcYu3q(QQol)2zp zBUvvC*)G+?In+H{=tMV5r}UQ08Yz@6s^gT8Q@D(+~Q3G(Y)# z`GW;z)n$+t$z`(D>DvOH3xS1_U$1cWTr6{F9sdTU{Js?E-JYY^y0|~Of}iNVy-d5- zGGr*gi>|Ex5Ta4?O0&cr}j|NRC-w#Koed`xV71K=a# zi~j&~7F_2-_PECm515ByiJLZX5vD!hAx`q&Rkz9?g9-ae2W6e>hv5Qt zqWQF%__}ah@5A5UG1U;bFysUi;ZfU(KJ8xsK)#!e8}NjW-9)9GGF*8v;F4i4yykBk zqb!9f|4tH)bXj)6uuxs;7<6#b9imZ~uh$h( z|;fAj-!V_d^d_u~^Pu-cNk?>sjHK6^{GYGtTGKfr^km7jm1tWOO;ae`xc@ zV=oU9YaQiDUNRUx`J!2mxk&FU4y-CfL@L-=7eYr*y=mv*K*5HTE6%iY?rX5^79m$L z=`r3W0;nzD_2x~26>5fLZgBV87Gn<+Q~9w4jHO7f-XDuixnJyjt3aLb)q;F9pfOiav8+ zvBudliU@Fh0%=9zeirvyX$MoTY7pgo@31;Cj5G})h9Vw(S7Y3zeh1>Mw#*|$W0iNd9rKjuSK%qo?OP)ZVu5`+f|M2;^IP6dY+f06L%QgS2c(W z5oYH`@8dMGh&E5-SJg$|R9DCqr`f+A$206Y`Yv6|C`HX;Rb2p|%bi!vj~jQGEO>*}|3&SQauhFa;9#l`xsu_@I8+&5YUZZ=3>F1*_O-he%% z6jA;HBe%YkhlJj_&aSi!P<|!F0C0 zuwdbwWXl>qU%(fUZ9>ZvqFLGJs>?#f!J33WsPy%9_w)pqcjDhfS-}cEqJP4eK?1hC zvB3vdJd6HI*Tc^TjW}Jw|DP)RPipE-RO~JNzf2$)1dr#u3oAJP%YCE1Mc>_j` zX=!tZ%@JV1;ZoH%pEyD0chbM#z~l{ro5mF4sv(m^M~6uJ4-;HkPnAcc1ZFKz99yY{ zk8x{q`rD&^@CrYu^0D~tG(=7Qd)CV2sEPJfC2`NkU2buV*r;=&-IbL74H ziKCXbc5Hln+Sgmgmj6DU!Waq?Sy53#nu)!|in!?LWL)>c-53A!QBqxp;kSkhVy9br zG$ExJOW?^3_z55Yd;jiT8_LHHPqcyvzMBbrDS+HZ9Y{~egqjp+Q~vSR474ebd^h3^ zS%60Hf*`aV(w6_fe+0Co^zA2?_UfEvCY6%_Ttl~3`=;VGxLx4c_?1Jx8<>YdqWn)( zok6<_E;jagh=vAQ&HMML@E{n>tE#H%;L=XFLo6Icw@G*@#U_D}$Ylb$*zvdeG*nb& zXFw>Dl<)GT*i3a)FEIUuYyM)&#c5*;Wb=wmZY)<~tN>_WAX5Q943tX&Pk8=WgC?mL z!t(EKL#PhS3zN{RfRxnGK2#2Z;{eG=!tC3-19n1?@ygbEu8#sT`v#PQU`K`D$-~3L z2o1{@bp<(~?0|_hd2d}AKp9y+!$q8^Fu=fEO)>kvR8&B%cVS^62;PV$leoM0p^JdI z%o8XZ7qs`NcTvV@0t>#aO$C;qJ?eS$o?H7C-UcYSEf(+tphd)3S%Y=vQP++;jg<_5 zAQEm)SAZ@R2`O%bqk+B!O%L4a^W_jC+`iB~x}z?K5`Bm+?) z&~88z@(_RnaHnxl`l28v#k^}P(4NCQY|^@c?+)htp4r)FKx%{hCm}9w{O;{QSOjTB z(4YTj8^N=qlV3PbWKsGFm%++6zJ0p`UTYm4ogUm=xc(21ha7FnzTq!egyC8=YDK%A zB;X0iUuw7H<)H$Xq3hNJRYo(Iqxo9%^Mgf!)8dRrT#bRdT!Bsmxeu{syKeAf_zf8W z$92h5d)*V2vpv&L^uKkaFlLk`tQ3e|c+}4z zy+wEogkAY88PNgrz-VXzpj3+12wnJb z5G!IU|+%t zK;7O`VAGStW>lhMz>i_vrU0vzy%~5a6z$SnoeGq+(MB5u0UlnNQE5VJtI|3&pAaap z3-~q&$&4oj?|pm&Pa1M$rgkV8L`TRWh0qXrfX`s#G*#(PL#G65wqZ@bmG-h=SYqAzTl< zpOTZ)1j4L?7OG#cY zKQo(TWrc>3L%7kMIFIus$7KXC-zEnvA?jl;Lx8b5%a*HB`91 zAk?Ug{*BZ-nmAHyU&=>mZ_EBB?CO*1O}O(T3#qYvauC9UJ;M31>HmD z%^iQr8zJ0GYipars^JKnfWfgd9(S;enuMv-x39VgQy_`Dt?)xna2r- zRvU!!N$0`}+vC5VlWb37jN}L#aSZzJ!vB%cC(U5UanaERK@>at4LW4$4c~O-@g`s2 z^0|2HR~Dfcnt~Z8(Z_Te2^E>YPa=UpOH0e3RhLmjS@iJ3!os9Xx`HJ@m%yI!Q1?xM z$k@{`e$Isb`#|J?Vikz+GQ`R^pr;k&z_qw@F3Z1kz5tp&U?uPey4BLN++E++bf3T*^@XL+pT&m!eGU(b zvp>9m#eetSJqFx$5^>j?1iWw&*xIL0pO&AAX$YllYrM-Y?^G|q%BtO`w32qtcxe_n zjhnBpywl4+zhozTPB0r06J-yCDDa`Lmqh)=)9>=Y;>Q!~Z*RsKJMcKY~;S zO+wM_fV|PafXO=f%ad85vJoBsI0(m$1qpdzO@> zZIlTklu~{toqxWO?WC1ACkIEs_r-(Do#0%wx3@okz72AKn>L*(&XmS4)YP>6cQ*2y zwJbXC#_CL^Ky)|s^`XX4CjVuq5QYZp*Ps92H01ZE&yIEqXYc5=EC?BU-+ZIN?(_US zkstm^FrP7w(LdaO@}6Jeg@4kKGALHPVI-_FmQHzYzL~oOK|v=xi(q;}>4;FfrKY07 z>`B{hys0-X`~K#(B5YSzS5I|W;MHR09h%IxhFsJZOZ;qXV0|!Ok3<2i|BxLoYGxl- zRkP$9ICZlk#%($A{V|atkB)}_XQ|tWfCBd*UBT4E$F}#1R+t2T zo^O2!CW@u5t}bR}vj|hAqPLqgHCNG*$8^}p8et!SC4|2>u8a3Lk#W6Fmaqs}-S1~= zY)seV@G|VTa>vxwZR;#*4O90PjnorHC5asKoP2y0A0H4}FGWY6U5t~w?y}iylhR0aU32mtU?jlAz>bxN~}P(&MM$QGfp?-JYHB z6hRt-vn)|gqJs6``>^I>b%8Mk<)Ph%CyRJKT@5)%w&qkt1XcWKLrK^41Ue0FLQhtyv6Jb z2(+MHVBD7%{E>3&(#ItJN3fqODJN2vS9cV*ZaohAHDI==M|3jb)RdEseTi8*7}6y$ zHU;N!92Z%(IxuDb0IqK0!%$ETpI09+`f^B{w1uhR!CKyh85A!zMBpUmDQ@g2*s*u7 zzD+<=U&$(VI*yEZSAizS9T}3c}e|rZ-gt=xyag z!DHi(XKoSApcc@S=Zd&m}3>-^}%duS|{rB?a zlCG!VTaZZN6{Dk?__UHsE(+Z6p@y(99C|(t)@jF0h3iYc5TaQ}UK0wtj?a|IEfARV6c5DS`n6P^ljDG# zHI|82S4~b1{S^gB=%6;pr8C%${eea>I2w~sdNff>DmagII>4#WewD(HRUuZVl&4gRoXe-*J$lj&uIow^Hko zq}0^Xduq`n23|>VamyIhG5vraRr$xJMn}o4`L^pMB_>jwfwQmusYeUcbA)sE!wd_t zz2UKrvNrGHsG?lM!5!VQ_g$_;+IdB#-TId2q=TV6D`WV#VNL0C@xA9#Q`d=YWM$ub zcbGm$U;ROxjP{b~X7&-)!v)N_>-{eT6u#Pw|)VWX1<%<7|*) zvkEJQk5-6kPCb=&Cb!H!Yp*N6WFYa?GAU$SDN z@t<8eG&&ogtQMKilli#tEhJT)nLM9;gxihCEzqXmc*GUyR)WSAa&I395J?+ z?1(;+lM4a#tWeKH)9bQ}?@vRU$Jq|-wjA1-#5lP!DWkE!!cqvDC>MrLXGYE*2P-$^r6pvmC5QdwC!OMUOM^=3cw>PSh0VS9BL zI%2j@$@H+#+xpjjjt0J_|AynG3(=KCx)I!OBrPk8?n9)#@dbt6ka1H?T#tSFWIimG zF%x4kxx;pG<52KA+d}{4>sPx}z4%OM|6HDj`h#cMxq@ynuuVBeirFZ9fZcq* zOvfp_B5z+srlfH47TB&V*jfmLRNiyqMok$PsG_o?q38eR)hhw(CO*1RLKitSTQuct zXCbQi7VU!J&o^up=P|n3tQ|YkGl`^@dO-AvF^EM}LQo!};5g~K%=Ew>(p5E7YJ{E_ z$uhiyQ!x>dF5Ih@kXXZYMX?D`)@;&yD>2x8Oo*OR-mYMR`PA8IsDj zct&|=5P>0hQb3XQYNU-6{qq55)cJ_&PhJ!jDVCz*{DNrF94e9KuMhNx~z6 z%!2&NdLGdd|INbuJv$8zX=3OdwY0QIN=33U^zLr#6ol*#Cnwb^>yd=3!Gdr1P;ibUK!q+HzbAV-xo7RMnapCo3#*T(ZPLDKi zK*x)0TeeB=n_AC|@oeN+fMl}R*z!Ena$U#h4?x(c4sF0k)OWh^NP&ppY$RljjjFln z$hzP{Wbp-!sd7ge#pESj#zv}#eddUCjhv5qcCl7rH{l1X7>7>3UW}NY`+2YmgwAD1 zhH{lfBqZq`Yhn$jsWNRE!~g;;Cg={ZQF!DlvU^rB*RIah^yd9iV(aI8sBPDxC_J&%=2h7ubuOxZ^-9R(Qb?+=abBXcrrHBqY!;S)z<~ykcKH-%57> z*aw<0)&@A#Y=ICigREn1{Op~5<3^a}P|WjZYsin2yyF5A3?WGyf++RWx)QWQDbvEY zM0DA2n@xWMQrv!zCd&jcF$HP$vx_CXTLfs#)7{O(OHrZojv~)7uchA#!S@ERYLPxg zaYE#E;d#T_F*sZ>oQ3`Oj!TU3+$UXSXIXQp)}fngWXhS7CiM9V3m2PpV$*E0B2}oO z0P5X3a98%ybS(-`qj4P_rD!YYItpm*E`>zd3^s|9z42eB(xpjD5S=MhOoD`r?(6)u zB}p=y)#tc-%waVfe@{K>YyaP&5USK;+lHbxUP*5>w4r31PlB9h6TjvDb1u(czU1ej zD2%riW{GgpNz&=w;4;9PAPvm|^9-n+ZLky+z2?q;vPkeLBac3xP2{~QDt?>Rjdze1 za?cd1F`vD$OsPh`H!N<|>sJLhuQq^PpdULxY zL50(1a=!{64c)}#o;Y!E)IWqzptuwSKo>CoE%br97wzBkW0ngVm>x8+F zA9>FgZFVO+z;j=%mEkI&uI4R#A&|4ofI?tu1|}Or!JHb+JJw90e05X*#q>sNMFO>k zjmtv`>62D}X()Df7Y5hGmp{@}oW?jF#`H|3RipR!iOb8U2HDjxQ?Z^)IF3AMS>SOW z3)^{_+U~jXzebk!t+M2S?XlZJUCJUg+IFB;TgCS6`?PhYWs(;5F_#dVShUH=T8#+LZ5*#>Lz@?0U*eJyy85GhTXZ&UqbnkC8po7k ztiT9lM~vP@Xd{3Pf*VHY_bx`yBX-s32psnOX^7<6X5MW%@63x2ukUZWqO|Mq`TdQ2 zU%qfJZ^3u~J~w3P^fE$>0O`#41^n236ZJ*5N}ZQ1wZ-hV^^G19E|`{^9m-Wd!Qxz` zV`vsWH(1(>zV*_%#Kg-K8s+lG@$kRQ^pIIBZ4eUbRY~F7V!|vgBXby2+<@pT8_@&b z=CLE0aZNpVN$QZ%lO5GgFI@&OJ$c)sU$l-)0mGZO=@t{;g#T|6OdZB*mvFd%jP3cr zz*$wBemWWoqxb-{;wpE$$QCID7KMf;NQ%la9=046W3OdWpGiNvRq9O} z?Y13)sz;-F0Y8iTxVRLKtL3Y7+iPs^KxV)bfIlM2zV!dg{@2oEtv=B!;`8}8en%8*qym`GE z!^!)Sf}iIlVobi2dxap62E$U|DY6RH))(OI5zd!i&LuM3JE-)O|9}VBE6&N}k98iw z_$R7#{u9m{oYaOXIXN!~0?J`nsC1KUEUZN)%2U&1*-f)Xrf$9|4(o$l{U(d*Urc^I zxvDB{3_07ww5~N-$;v&VJ96aB1BW_^-~<12qDO9AqtI8_wk^&Xws-SUvwIX;=W~wd z(ua__NWBwQVk=E}YeRmdfY+91ph#_oEK@3}KuttWLt`(OaJTYh8SVku%y$zLdSbPy z({1!;*9nXUkbuv&(^K1pD=aGRu-%nacD}MqH>&mqlY5Y#l$cmC=gARFAONjaJf~7e zK;aNH{E`_H0hzA-rxys957#inZbB9e6FvxW><^x<-xHrW7rFj$HkwO>l(+NDg?;Mk z_kny@Ja0@k_=#DYtr`-F+)d%3E@IktT?1Y?L9(gdxX?!z&goZ8z;;yCsYKBoFHwb` zi>oa;CH|di%ezE!NDUh(N}ZvaAZ9mWUm(XvptjO}n?3UchzQ3U%fB(h zr3$IfyN(%+_?6l3w23;ro3~(bCp*nxWZ^x3uaL+s5Faodpc|dYa1AWEQJ6qMQ&Vny zA?vBg!9(eb#$0+MYkwKY1@C&u-?}-zvDy6v|2nf{E**tlB}pQK*=fVnv3EA}#JCI@ z=r`DG(=w3@7RU5l)Q(!;SDtLUE;Ywyw9PBF^j*2xSJk!a(dFin1^x0t9kIy+H4EBF z{NgU&G;-*(9#HV%&e8s_h)p2Xwi{8PmCJV#UFyx>N3Qb#DU^w#%B#pG8NF}#bt4Gy zncTU5V>|(MPGyGp?EZs55U8l?e<2e8_s)>j(<7F7{7?Eo~gkcJI9uPCa`{YjrD%t;m)w}`k5-p>rU!4q3encA9 zo2$xkuRekUTirWu3_KuV723Re_6vGFD+Xyl! zl@2O;(dH%Ww|@hC9gZWJh15^)mzGZBz+e$nb6e)v7VkQo`UIeZ(u$8j-Co?M9#<^U zm4ok3%PfXu34vs`Q~_0X9-jCqneFi70|2s!HWI*};>UP2%nctdL5|00XyoCkZT-8R zx_;%+1@o;Yj+yF$%0mzz^wdo=7o0v7D`?`8rW6CYlgXeMDxwCsPyuTV`&9?cNTDd7 zz5;U68D36>mHl_i&Q=o0;XlZ^&F09h+_Lt4a3l~7d|Q7SwWN7%>~0d3DjJ%^ro&Uh zmLpsQ9d=Gqie|P~&hq!Io_+<*UbtnBVp#mWWa7aOzwBP4v?DwqVCJ#9JduhxwCBOe zYR5QP@nEWckGlx{5RBY9pQYpQWBaGdHEsE0oK{p4c%W*^tDaAGOge2~nH`S}?~bZoN`+-u`rAV4)A1#K&~ z*b(!DhA4U9{$-j=Vw)2alBk3o5wrOP6?$tJV7JdSs*|z3B$&Zp;#Ovi*PcCoDf(YK z;M|$;JU|A=QJbCI+8hETV*8JoV%)Sp-PvX2IGAy{TU;zQq=c^8qQfyK3{qhTY>9bh zP4^>_Vd_#ph@78DGlR@;0k4dqfdSg&OeE_$YWr{&Vtk(uXH4UIOB$mazNXe_=#wpU zO6EIf2d_}-h2ZeUaB)g%>RZ^p90+_my2^sf~z~v z1=KEB5@u#*ozq3(X$3nhEG!Hed>{-`@G!RE#VwtGS54xb>tN(@!XOTnZY^B#kzfevQPBHqNnkOv8)H@pKz8D zS_6&o=P*8r-e}o;Cz+b(Dr88GaY;>ZB9~#X#dEAq*_xsqL zOBl#@G`gY@>X}oFEpvtEJimXmAxQ<=aK6i;kd+Ls0+%sE`AnGP_ zXA3wMn8lK{DCSprf?kaA!pe87_5vU(pavhl>_mP3$1MZjcaZnJ~0Yq9wt!SF3;h?%FvI#QN(9mf*>wdn9 z>JE%B@&n=g2?S5!X2O0IYK;g%%8=3ru(mZ^VBIJJTz<*>KAJ54Lk zn+xL=4%My(pfu2lFxB7$Ao!{nc74x?x-(zJ+bED%El^6i;4pgTOg+}AQ}Ku31{Y%n zZ@H?t2xZ9-(MRS^_E6Je)OdQ;VX(Pbw~j1LaTsAzFKur_ZVce*3caG+2DS`&ezZhi z6|Io|O2#A}kWGImnRmWFqP1&tC4(^23(^ zaz;e&t01%3nI&7erSTwQ79b+q8{Sd+NXI%cHp0jVL|$mA*w=ypppf3MTJs7%!qlCT z)JhN{FSfAxgE5nc*?8^>jnih?3WZ=UM5kqE^C)}(tiSZ_Tf4jdPY{nd(T;1RVX|DN z+Zy2t|MkU1P+zS^uOe8RzQ^n_xrC!|{ebkrY}vj}w_F(oKtf$}=*fl4 zED3M8ZFx_+UV}FGu5$#dW-mB9Rvw)%Uhv*&nrO75Y6Sqn??4N%D=&{5+$jYzg=XT9M|l*4pIvt> zG(j?Mft*6A0p3WCpB`+&mRc?+?l9%N#_L!$aE7YZrr3~q0=?KgrKQ=|_rF1xVMwI^ zWswY}h3r1`(EffflOI1aQ$|n=Q&$ZD8|mHtiwNxkk;-^3v>TcP6bMwfiL=G43yy?1 zSHky!hGCyPIlp5J6SkxEg}i>HXp#U7k8tmZ-ZvE1Grgbt>i4yue|ZK#PF5hYIx(b) zRwdlX&)&mB>i#^{B)QdS%Zr$9%)KglJ(G2Pgnd^Xgqo$|JmPqtgr&jE?6Z%*y#BgT zTxmQKdOBoH>%-N*PC*X8_p^rBo%=M*pID;MmBoM5Czy}WH|f%elNUv^!V_bMuwjAQ zFRgFaB{-a0=yGz*-qmw&ngdmO^ZVDwKF-d5ihVbbSBSOQ5e5zbVrshL)n>M0XB&_3dAo95X>ial!g{kqTiyc@mNgTgok*@_T8yAQikfAvc@PeB&uwlbIgn>Bb z!l>n>;6_&jsh&K|Gi^W>v&S~gofvOTNR#<&OgCc#5zPXJWhQVAg1>!A9@l$U6<<_n z$?57gJ%=za$@(IzKn9vSvG&hZ;lU6E+D!UnAz(`Ljhd(eUe3VObiCW`9DSW&J+o2bII6*KNBve zX5{t;q2;2UPSpu9#aNu_7@CF)Hk%VKU0Tk==!edqp<9@(D96cgQSA0Gw{0~RzRj7= z4JjeR>zJ5Cmd}hRTpaa^w<4OP9fLUi(zdO%9a=iHOx76{>#B%7`v#sS6G{gkYj@dQ zwRg#6dlPG7UMVD7#5phXxelsVk==!X9qWD=bHw={RZ7;_2aSjO;KEgFDCW>)Nyc{C z_t{?Ecc1%VjDIHf5#EU2-lS^9ZeL03&OwCwzVs@5lJfT_+1c6Qxoe9EjT`Af0tj#r z3j|Sk%jPzP2Eh$MN6ET4CYbOWrm>&Vfx#XJtt}KOElBf3`6IKGJIk!q*S zVry@Zs}hH-g=sAKRY@F2OiU8%ylGEEA0a>Zhr8%12NM_ivwO%^mcg4O^Zc!=mxi z-FCz0yKR+xt~>Piz27`x7Z4z*S-I{0-52ScB(`kf`uU@bvmqUFuHa>rgq4u2)FC=~ z|GqkdEA^_mWg;j+gp6JnFO^d4g>Q?CKXg}r?Z=)$W*@m&bgMdEUY)NQGDC=Gq&VRf z6!0rlac_06oGnE|u;%xBD(xnp<#@f4ztp^2JZ1COZECbV4QMlRNSHQCvz)n7BYjP+ZfCXtVZXsPNH0~5b}WFK8Sd}*;}6Pf+< z>PnXw71;G#9G5=Lr=pFWDYdHzf$oa$nt-v;v71mkQ(mmaY#Tb*V9$&yCo$jG+vc4* zlMN~&p~8ugzGsWRWMBJ`QivKPGVv-=-J(4pWnVRl;dRseXa+caD_rPJTvgZEB>Zx^ zH~)541D_O~H`9}dSJ-5XM-iJg+0qhpq-1r5a?UP+_=mBovJU&&L#fON8DV9CWqxz6jeQnD4mn9IaPv zU+s#Q|9wXA-pqDZ*jupF#D}iGbQ(PYe^XaQ>Pe` zBirHR$&(==D@nY{Rc}$s6kPoE%I^|pevcmEWOZoUO%~RFX|yZywW>xqpn~LmgoClH z>vJ6920@VSs`hY{IW4hE&Qg?<)RDiV9)q=Jefc@7MOE?PTGBEy z4E~n;X1=l>X$(aXpWcgn$=g+Cy4cm#iIRpXd|Ic&lx~se9)f-(XJ6GAO*TiJLpAed z;CRF<(cSLn*sR?sX_Ba1D&Gm~7Z3k*jhJhy1fUql*?ou8j@+b!Wk5%Oll!~rOKR;r zGoNDFce}}-6%DSS{shFCFlg-fL|8(FPwvd}viDoHjK+TgRO9)?srP%xulWH<1zcJX zU@$#BF%i}Ku7dTRVRW{~a#BxcU@eLNf*;idgXoEs?D|ax&W<62{N(!DD$x_fc7!g0 z+47CZWpvT}jvagGH%7tE3qYgX>T=)fE0>d$Z@ynA%#2eA*{$UdWfyRbe(Z94|+CI)~M()tM_kf3?IX?iiE5@l#L<> zIk#V{B8|A1&-C}Z5powQp6vBrba8Xd!k?$QcB6`i2%VmMx4~xnW^CY6)0{|A;oFwg zIO<|!V_iAok0KohXb{so-vJ70D*v|YATf4`b28VN{j8~h#SRo<^rC>_-h#Of&|I*W zKNri(t0~v+!onUnC9{a>hPy{Emxt9-E5!yIY8A?ohFRmcUP6+Bty%3;s2h_;E+9U< z3wcIWydz<^rHhgN)T4+(3~ilRa{Nlx2!w7l(#4*v@eDeL%W{zgx#)q)q9R(6vglGH zvKxvn*U&^O;r;G}4mE{8PXSFRkdG3YkA{VQRU$ehP-CZ#zUy|lY;q2I7Z)>?X=VQ$ zY^A<*EA>XSu_MZ7W;_<|3w=pgV`89|Q#idLv|UIunDb5eC!uuzH3OgG16o0gCAV*X zLr#)>v@lL@GBcAia1tB{orV|=fu1V5R#i^66dbq^S%ghfV8oS)6}ghmjDEset$4TI z^gZ~+1pYF9p-*F%N=w>WiNiNgw#+N*$KGz*S|u;FewLvw&Q+H)jc-K)Eb$J?t#8pGJ3ey7 zjK8KBQ1yj2^lk{J9W<|@fTd*2qsxMNuo+ybGk90?R&~C4cnQhqvl+2kv?Bagz5$8`yJla?naD#Xd87Z&`-Z_dq~v^hetp`vu!+ zO!>n4TX|0&{OtQbVfjb9DqUX0t#HEv->qjOK3@W90h?k>&qH?U$Gmu;qlZJ_*Z8Cn zLqeaa_(c0%9xG}gCFSET>}N;}@1TpLnj5L>8q+?bm&V&+4gOj> zt*q$wnbQDSY(`jq^do}iR4R~79}LWx(dnN?ntL5fw_~_;Yt&|{)5>b6NE~iOeq+s8 zqfXVXF$>!Rvt~L5C+TTUV*kr);(kMvGnBG%s1Tx zIO}XmjM>C2aD-yEf^lzCd>cai1r^W5_m@qxrEWz&EtKt$OLBq8xO=L{eXL{1qw=hg zQ)++Pjv)+?eLJWEXFB6hnJp|xK`$D+8rK2Nr~=pUx@Hjz zKjA@d?8ls3y_>X2lIqq`1j zs44~%mupqM;W~NMoh3Ums)(pa8n}AwFP-&~^I%~VCP{5sjAdb8b2&==JzS$u-bmA# z%`mcOi&P&{tkOD{NE@e+5(V_9a`0P@P$h{MP zvB)c)5sG*m_w4GP+bmgR($Q+d2Nd>|Fa_y;(QSkI0M3PHDcu#EU_%PM$AXNK{-gYhl-jQ!OxzE+>QFq8tiLNTpvl!si zSvqelU=X|1=-WNFIglOHrKrf!&(o9i?qre*EuN$YQ1Vg&qyW6j98Q!tlgl$|0^Pozb=Bj71{PWc;2-11tr5S$HWd{O_Ghl*G{W0s7`P%ePA^Rv z*dnC}#KQ`T?-Fj{jpYS2N}-A=*O*x#4O5eSKh_WWZ#vx zyo{r*aLmtKWigsVw0Yrq2Zwp)jJ}AAF?Xr40L{!=|0{Gz3C}k5W^=Z7QtNc%4(``7 z!Ac>98!#v11a87fo}=--Gk*=bu{2ZdlCr+SbZ=WOS%1R4`}a$)wdusySD|QdPYmRn z(G_L|N>Y>c(THuX5a(Nm!s9ha^;={sG!66L+*NM1Q9QC2G?_pti!}PcF{jO(lhQst z9Fz3C#vFV$r;rb6@dfEhJ5$a~48CjxiYpRS7G&R#9?X-2>hR41FI>;alEM4n=9i$~ zGQ1b#vx=qFE~!$j&r6d$$zLD--YC!R`d%UzQPGP`epZSu({S1CLM1&o)&=L*N1hb06G`unK} zY6|U}^HcOD(a)Ny$%9tM;)Dj=e@sX<7xHY_kYWKVmY zi_0?HgZwQ>o^>cH3vT(F>pwpeuzRF~Lv43}CuM&D#Y}advPe1#b72-1nm|uup+mhO z5sU}?@bb%#%)5hXbf(8YG1^C)8ZcE#tf3mnR*x^Kf5T{C8sAsACb${*()|nw_Osf$ zdx0B*@Z`<6>@UhYX`LK4ilcp&C1cBQTKOhzX#_j;msC(l5Ed1VLp0s=ujLqG)_5Wp z0fI7DIXQ!qyy<9+m_R-(v7O2+MFO4~NVxFFCuoFRFE%($G})5sv~?KPZ}yI+(T*MU zQBbJKrbz_NAoQv(N5RXeFq=v{W=+isPT^l2T=iaQQJ@hOKR42pMJK5KEcUv0%n}>( z8MUS9u z=mN$XNj>eMg4ki{CALqI$~2rWm} z=hSU;V0|Pt)c)nD{bL);ndPQFePX%z0=+}je*Ufo`O$uXzBB4iKJFvEDEy_@J~1^# zy|dAiQBr>?B|f#Dm(9F^R1a%Ec)99l){=&vD(f{i+Y9_1VKK&g9PNoTayzpXS`N80n^YLlr^U{F4z88&@7qP!&~aZ%c6l=WYbR| ztVd^E?&L^`L$#!<-Ywc%gyaw6-8#0~C#qB@|FRB>TyWMKT6Z%sF($c?#lL&huh~&W zDDW0aJ|wra%(vmaE8yM19zy-}V(5N03O3&3F(u$?pP^*h7&FBa)J#jtNtbMm<|<6` zla(zR^Q(1U-!_*juC4X)eZQ^2G6x^0>kv8x=-1)N_cM8orNxGcwLt5gWa+P^^W#eM zCff=sPrXgq`by+EhI#XPpVV_*0qdGl*4xNhyk(u4@B2`o3QWk~MCoa~VQWrLJX^*3 z*UF*=pY?=)m@gf+kI5eHqhlVQP=0oy*Zz#eqgW58L4S%|JrPCHn5aZTyy44_Z%0g%E-(K+Q&xy2)cUt^_Wg<(ePo{h~V%?MM#kdiAbdKVpBoX81mmq=tY za}=h_fzzK14#u^x3k`hRlcXGe#2XVXg!WcIfI4QQ0d8R(r?0WJZf8oO(%gv#B1DBx zz^#E~jYcRMVc*-|+-Y9<2t4@c?d??E3_ltEMr)-rBHsR3zWixoA^-#OzP^9q*d6uu zxOO0yQi|olE%dDMt~QYTMo}iBW{=FeX%{Al31kdD&tb2is3%+}{?;T@6*%sin{T?& z0-#sQRM&A+_Xq-Z=AJj0pPwfjvGe=cqGMw>Y!6*QdsoOz_&~iJ0YOLmODH$}4Ki10 zr~*Our@_U=y5w^FCnNlSLC*Gh0)VDTl(H5~EebvKT^aukK>vHLDe_YE+(l~<>He}; zn7WFHYJ4n~jJ-zr@+R9`op`}}xEu{EbjD_~MglktNOpO)(ve`lD z#g@G$J?ZJ3>ambIuI%*hwY|@$98vptiD!A#l241ef1oN-AfjdkSPLrbga&7%DkR&` zv8Gg#*+j?)_!w^owiO(Bc1Wc>6zj*7o5Y(p_ z9UTo3RxbMB;NWq(+jhe`+lXNz@jJ*-k*X}w7rp6L4+Om6LjB_Hv!h50k%yq!{KT!- zap7Xb@z(bCV)Lt0>vVpUy+O5#?#Zi`mWkUT%&;c`T#I3c^!YPiLI<1jtCqj$QdKz&E$AE?FnAZtOnIm$m&i_m6X0anU1nK$bn3B4s|}lM zA*y8LHgG?$0|pIdNPo;l<_5A>y7$7NNJ0p-2$Kl4I)WkVp?E-uMS@ggbIp;ff0WhT z*2-!C<#YA7Uq5dA;!{6uL0iqy5KU9)4C7_cJhhUGh_GkY8UK)<7e#8=(0L6De9Ip73VS`h|QlQ8C~T zhW<#7-Qv1wj^&`yK~cV0?l-X`kJ2gmyKtHyCr!Ih7a=Hc3T6Cv!UYALFMAzR!~aG+ zJIfp2FCqpsoLCawvSkZqrWnsR_B||Y(R-WvS*#}kvPIQ^rxZiTl% zZ05+A%DY*vIr6Z<#i$mhhw^8Y9#N(-FSP=oGH|KR4t;7gT82lv{#6G|g(R0gPxtCs z2Y;PQXkqsP=tFT48OKi0W1yUk0t0C^Q?b%ZH7ZqE+lnC+$d;6(xotipRF{V_wcRPF zPySvW3DuzxPI88)5K0DPozn$43MgJ^DA~a4}osU zBJ^?9Q{wvxd+vL zZDfLPqYk70%D0AJ@St(s6yHhrZvg6{F{RF$$4>D2emni_*`vS&b4#vHS!l-zva{dx zdcHa2Tx=+vN7ZxIpIWXpv3&Kp}i=ZRp*Z5W4aJ<;q{V$$Be@>OBcC5nt z#ZCLEckiAd|3OM7q!!rWeRhLD4)VyCkUvbZl`Zg`i^=305=@}(%eL!*`YR&*e1}1AVw0Q(e%+&I78&$(;=4` z4QZQW2!=hbGtd3A8iS?*O)uwe{X%s(Mw`SPBBiRzJBI!afmsGlB3~s@76n&}+|sp; zgYmcL17jEPJZ7#H7Zsrqjw$B|ZGFQJVk1aKqN1YAoX+eUm8CtTYu?9;)i(x-5xQR# zX_BP&(rK0DC*VKyy+vF*g?^2~MUV?%)#buP)zj8?8OeOqM{SCV-8WKnMRvOHp`0b} zyz;`-&CRXYFqwu$Al|A)+<6~bi3*iui+gL_&FGTrR_INndDgM-xH#e+n*t4t$leYf zCUhSr;dxyMvaQFPb&P3mg)=2PgflML|g+g{~~)G!>JSXbpFF z#9zc35wSpLAiSU!$P3e&;Py~~bCv+!F_};tF|c0fZd>fTW`VCV&hOV2W*J9X*a=Mu|DDv`{ z@}zXw+DcjjX8#HN|$%gw!5j_U9&to0DkdV(zvc`-W(Q^bS8y=HEtase0~G^|D4hFbKLw z)eTcgua~i*yBYbgr8;e!2ZJeH`^6oftt};I@{q85yRnQ!3=NzZRxpU~05*SZ%8Bys zET*9mDJ&1zM;~eSM8G-xjACfrUS>5{xtFCG(0XpC<5tVYOFGnf_8{o$3XZjW+%D|- z`-gS;Kfb7;jr2N>3AH2oP~K5yq1qVvxZwShaU&GvA~n7Fv& zQ;dK;Sy&#~%}^6b$e@6ho&%II{9|>5M_5>*Z?%-OO6D#tMw2{FcQF5O3|t|RRmlfN zlTH;qZ{6JOW0$6!yA*1hhjJaq=GJ9vG+%H6^tJ2J3A-38qe#aCgb8>fJ?H8X#5=Uj zVhv*YC zva>;haq3X4U@-_!%L&Y8iug}Uc+$J1lVgZBIHIPMzWoL5s$wA3A<-p2Kk22WDuLX; zs<@xf1~uDBDD{Ms7DS{mAg*s1Y5Y+vsM)E6W{<9wrBvW$g%Z?|P5US)C}6a4_{Xu< zyC)Y!$FnoH(?(OSs+oJaD_-j*#8Hr_n*b3+e-eFVyK*aP&2Jb&NYk6!j5kbLF*TiI zVJ9Z6d%tj3Md0~keze>1){8X7z~T4pIhJYII6W7)^*XL;lo=ZHXvlwbR|_`@w*?QX z+40u8gH2xtoH~9Q=aB`Uhgv`#_8h<}lpMM-2)Mt1KR!FGE+yZbzUL0zad@W%tr*a- zrqnHydH%FXC@|}5U2@_knIKFNWy0|$(GkIRGWMnu9M`RDJ$9WqaU!HGZ75UPTKIy; z+8H^Ntjdb0B_r+xCB2QwnRLNW~l*YnRivAk< z{?3(seU@&r4^JpLt@}@1(D}kx-oi3>bkuq9v(C9ut1Dd?@iw}H@E3doZ(Eq^$!&Di zRXDUJmf{AxFieKCweMT;wiq|(jMT~Z2%m;|h*p9ih-V}DoncImPnWE@@piMt%-QO~ zx|I!q4?$0gwJIRZw59W{iN^I&%&B2I&ToB)p(!V!mqZk7!#6JGYy*?PJdCwSA04!h zukO~=dDjrVG-NEO&fOKwP#Qd@PR6pn1jbAd#%KgJ9!W`SYi2iXsG%F^;y9XOpxkjt zmbNagqpvj;M>VAg(P7m-l)lNv6KJ9Y%t~VWgf0AT)FxPa7F_RpT&5>>lk7f*)c7Z9 z1lhTF9RS5Z;kl;zu~{l!Ipo#Vu5H3ZgSsP6Q=QWXXtBGzLIsBDo2j3)ImC@tz3(fG z@)sW5?`a!hr;bz%d3c{TiYf(zp{IaAyUuNj3vT(w_q2I2v--bI>12zk&O6kT?{Pqp zn8%W0tq((?vYE{_*ly`kn&f9o6BUkN>u_t4kxxMRXTrCilMHzA30dnrWv+d-$O`?b z_RXy1+!X1$R4Z+Etb&hUO)CPXeuZ=BCi6}YP^8)0i(u3SQWh}Qgx(I32Mn5<=a@_9 z5FDG_wH|f~wP`@opxYBCwG@ShaDR%!nPp=tgT_NkGsC-abUdM!9ui4>KVQ&hhl*!^ zl{0w-%YDPcp2sP^M1*LQ=6Ng8yYQ9pxL8MaEaogsp@(IQLcv?Pj~TK6W3kGOJF{|8 zDHvVWK9?nJ?T$vh#CA|oHiK{i0$VksEQliOdk#rlE2aH(6B`9SZs?g0MhmYZj2!zo z^3?Q{V?*dFT47IS1XCD7YI^dwr@m@FS^$UWXJ>lWd7<88dXVOoq>_im9jlj6*b>lpJ4XH;aQu&uideS~2igjOKG zoAP;rSgx1U4#pb#Z4EeaBFj3kBc3FgND7Fo5D<=@}xD?5-kxFoFgRM+O?nCuV1VIKk=AlDveh zso52Kq+4vG|BR?k$smFjqLZ!;2KU4LmRY^oBWB3vI_(RV`xxW92rIxlckZZo53|1B z&Z8Mzn?PTx?;z|39XrLJx|+_LYE-q8&mkv3FV&sxG}Cws|KaD?lN;jS0>HEo8l+}+ zgaN6juo=&WXr={%weNS;V8Zo;lrR()Wg6-+uL^i_u;nE4Yp<_RITX2EW>DNoo78_l+mG+glpezQ`;4 z#oRLVX}MgGY7c=v5h{Xj`Sp(Jqdx_kbI{SPz}ay8glnynl&@u!dD}tt!&r8Fj^=!G zc}sgcEdx6rAA@bPBUMq0AziT2klfa|?S%)&td_%l()lh7m+@@Xv2ypIqIcyeK?<;? zHTr-E>#0@;mT4(?e-4{w3r2@Upl5&N<*g@7M?0l_~`~pmpYZ9lCG{kgFNu-j)NR1@if-0q$6^!rH^>swRbY1eKHj zbmqp)^~WNqFyIlV*~|`_Nn}Ic<65fpY80lzO{f5fM)}YVzCJ-WesfQ`m-#afK?mk^ z!C|XVqEfSCT?Hp|G_!~zc8*ry4C@1KE3bMwDMCQO(g58&BbFx;G~V%_0uaCaBqk5R z9k$`}HiIukIxxb__-df{L+TwiR@Hjz!zyui-(B1wKnYN){rqc3bJ~GcmvC+su9#rM z3msJsXAIm1KCFIb{P$cY@Cc5K@AIEO6T#8uQOA@JnG^E|j+Pa(f8$uTX~K;gzPN3| z=E{ig^T)I0lb(Q^L2kSPh^sTRpt3Q-=abTbY+uelNf-XAbW_ANt&s1VTS5ZPw%H}gD#3Rfs0)^vXM#`)4(YdvRY=a3MM`Z9?${5c^;^C**YK& zh%0@1b~W>Rov=Ug^~Up;e|(tg43`gp&l~6#2wG1rj`-C(^Td8X6d6!(0*I5~ zipMtDPd~m93)E04yJ1(JHcpHB0Yyc{b-b}IYfbuwhU2~vEv0ICP^(Vq&k!^|4Z>zZ z!*1fiWpC&IeXqZfL#1uzA_NNQ4hkysZ+tL^zcfv9+qP|4k`jZz39T7-@drj81S$Vb zZp7_&zMAhK9>m|Dzu2%ZFOB8z?#J(cT=}>dy&soGgj7YQ7Plj7$AcEXeqB2Pq~o83 z;KCyj@cDMvAV>@Kd+r~XQ^Vtz2>AEw#_xaphiq&5?veCl0&)5D1lcybn>iIcUK%i~ z6__&aj-?ZC?Vmfra^X#KjWC-#@=VJPZ1XziGa>h6&C^6xD{rz0QAo z%wYvW{MT>azAY@=?ZNu7Xv3g>7!q?{9v&WEUe8OS%5hEmpMYMnpLk3PVFYX1>D@<-*USn!;0ZltM63=+sh>- z!t0(f;I6{9vaZifh7#SvOC@RPPKH&r-#766!xa4~{YXGi%U;xYlnU>S&CI@h{>;e8 zm|^9p^Y41ZBqK71X+UYbN3F12Ix|OeldKO01_G_(`hEYOpLcQ88w0{ZD%XDf&&pN= zY@Hk*UzOEB@n`)vr_38*Sv$I8sR*#)#^K{B7ef8};jVmHjQ&gEZ1efSzyI0)c?$O5 zpT9o{kn7=t2lG?4Sy+WUMvb{R!4LfBcjXqN<;ClBpDAH$PSE|k`w5Qp|AvX*yl9n0 zLWtIDvhzO(e8P95&wGT7&&y;gPOA4EJmiDFeD zc(yjI=b7Ax67kb5yFb3De0bVBF)!dok5eBl%WRtE%k_e~aWS2zX_po_)F$3+`MSPf zVtlBu#intFXOonm+Gq;TRx9(1K-{v;^3WwUjDo3(`Efm3`n7>>I+9ds-D#N zVx_<#ol6>Gaj9pmuXOFOo@$jo+RUlyT03&0F^jF;G`7GsuOo=@;K$&@pF%FO&VJgb z>R0AHWGa^76f&%7B64_J+NFCHKO4T@X)djvy>R>Mx;|ZdkuYB0x3j0dW&R~6D40AT zq8%68=`MG$<;uth_AFCb#%ojW;JHI)^Sb#?b|m&P`VW9ZltAibd7EliP6#y z1f-=qq#3a>(!uCZ5$PC=EYcx=*7d3HAe0APS?i5$k&0)JfF73~)U3UZsbPBL?w-OJBRz+$r7Go4(Z}qCZp5xUw=LT>sbv!FtsC z5N5$YS96-pa;3q>hA{WBA8K-$k#iU;BW~f3%b>g;kE4KVXB@q#vFNa>F^97-m?^FZ zUkr+YKO%Re72p*XiXXzYpZ|&lo+)&I{vKaE_1Z=n*u4wXjLCq)4s@6R!};mM>%AUs zl3&!o1YfY9!h)^_2%GV|--#b{TV^L&EHPhJ&whX#i8Y#ZM1r)Y!a*($>QT*K?1~q9FHu{l3lL+PV!EuH<%-#-bzSo!@V3mPGf8f}A_v#2xfU z*!zcL-rwTd6bfwJL2F6v*iIUa2;NmGT`o}aUd(bHDc zLRqzr&X;0h%etm)vVm)c#rCD-3q*%+tnd?Z9?fi;UhAWe>1Wzcmk-ovTyR>Qy877y z;BU(vpJ7=_YN{~J%wHhCp3?{^y_mpjx{(RHpQnai5%%<LO zsv3{;%JFAc98oN#c6FCbJx%NO1;2BNyBSfj-kI1rp9`S*f9igK6T{`_ZXHnh{i>D3 zxp}U9xSM>v{1DE{_H1@O>hSabm?|!)g%0ky3)gulEC8E?fh1gdI0v6n-fQwkwK85` z4Gj%I&U#J-8zoCZ>+|~P0(sV-Ekv-9zX8PMpMf8zxmy&e3b4%MThsfKsva;lD7Z++ zcN2yYtWb0HTZQo%n>0dL@rhH*2M4I#vG?_S7f?4Zz?HfErYc6YwH3NEVbiW$M;{uz zXSu*7sD4|ctUB%N8yLfaDa3DCxoQ7VCYj{n!)!wDRr0IfsllbT`gJyyI+pf_CNO(* zaD5I0W8%IHTPefM!WjoAYsLnFfP3$wH^7ZeDIkFVC@mN-&aT{e_d+URboK%U>>{*k zF`>F2A3rFz@jDfVd6h_L(Ui7Wt^f`T726)@)xtp2Cy%!D90n}au?SX9?dj7mBQ_Iv z7gCg?UkS39hS*#B@VwtG822m>2NjA z`VDyBG4J#RsexjJskncM{OlK}S4mAX`oKGr;>EI|tfrFw6XveA8ysQK;$I-FUtYnb zuaZ&6rj`(9HamHJpZ?HDz?_5Eq-0Rg+QxssCaGxr1R1f{@AuSU%7P`7j7MoH+PjA% zFPO_{Z=P2(lV-$X(A>vC($pwvXI_i`IpXI?^UQ0FxduV)?4#`+D7Y&QF{55<6<>P4 zw}iu{UY&EoS*^wlxTjOD@Q|0M+;fONl>HM*lTzHYd-24Epi*z0wXJ|fwe7d`01t19 zsqG1&cXulkDbPL=yBix?LQY)>Gjk$(=6OGIC?PD2?q>A$oquZ;D=fem1MpQRG5+y? z9XJmxB>{MK75rb+0L6UoOU&!hdG}v{-vr2L?C|=5*95x9_az;eFt>P>$D| zis|DgdEa3X$DySl_KSYIa)(P@Z|q}mdsu(&!!MB?&c1O|+b_UJJ5`QjnTerUz1H8^ zXQSlS1gd7pp$~^lcG&{u9uqX>J_o@kW;JM^apE+2jk50I{Q#n?pnuXrj&TwLlU1hP zTZC-~X7xGMhKyeng)`vA$eG6nWv^a2lvZrQjTeYXX~Cre>~hfDkP9OQ8NMN7SU*U! ze{^XoYxm-UXs(^n54S5-iTR;Yj$4ay^WO5dJirgBR93S8<+0XBhtdYkHKp@yYfc%L z5}z9?!DwX?zVe#hHiw5*n`dVL&pb)*>fK$z8MyC@;>U7vkrfI;U^L!|?qMy193@p% z+Q=soTG3QeR)|h7kM|_?ynUZX*y1#@&T|nvR%Gb#lb5f}S50~_Yqvg=PJ#^QK7r38 zpgWq+>P=H@Tq9j<4H-1L;y58N7MFD9netgyLfO2U>p=H^(4*wxn5hN+!GO4q`|RS8 zCuj(-W=6@{I)B1^%E&^>+>71e)-o}t(bSs_0d;q5v5+|}$_SZn(Mh}od8}8mh75Kp ztrr$fqZ6=YUbm%x&c-v7qE6ioS+e<*Y1^6gbZL_-y!v!Yu>F{2UqzNqCZR_`CtnHr zi6tprb84z1>ZcN%;>&+pF7ocyL?6=baAHH43E+|sNIQUS#&}fmhgg8)Bui>o1_o>$ zot>;KEH8BRxvIZ30b8D*C$Am?lk|_&UgH_1OG^Nhp8?3i)bekBGo^uo&Mz+P zrn2#i)C*A?)KOaFv*g!cMsu^;g-BhE0$ITWO7bYp&GUF8l}KG}13_D)R`wQd;p$RK zN>w*cW1$IB$|yIX_*wKiRkrT2Y!b`adDXTY&)V(syXFJAPl-zeZKp!6-z#*w9ZnC% zeAAs6CribB0r^ep^?n_fbx6#Oy|GVyD!v_b`n4stn@4X}ZRbUn^PkZewa_ggti?#`~WVrDfK^OzS2I2rd?($lH*t1@T16=me(QNGt1=u2ROn zeuDH8bFK{CM%&0h5}Z!cHWwjvc6tTknSl#Z+qqvMF-tH`lQzNojvzuakRB$3npl(k5F*&{v;&*bv*Woh!NxFRON8_SO;4f#3z#0Snmy9D?GfhXTT{M{45+XWXip#|wOn0z?xrs5X-?+(;^jk4`H zVSOvVUxy~pSK(c3b-9t#=)j+JhwT%T^TSn(OjV9t(V3SoFLtFRAzUL8YDE^^A9rRm zr8<5;XcNGLE3Visf~MUcM8QguZtSVphx)C9bWnI#Y`|H`b4ipoVmY9yGoXc9H{hMw zY!9>hTV|Wd>4&w>s8m?()6F4meJ#`$dVj2iCTR__{&x7@Tx|nTaGO+t4%Q9G9F>Kd z-PMSVr!1s0zqvKOf$J7!zWO$)Z{FjGG7zKn+8QS~aMGJing*(P?>^!Jv^>#mJ6;Tm zKQK@%;P!|ytyDPD?h|Q&(p@+2K7lqFi}q!;F`e7ku(}KDW7T%u#+HC?guXG>9no25Sdh#h=>0Q$7Tl?dvgVY8=3e{`ZoKHgM=2)0 z`CCSnmT~Vgi~*B0XryA z%O00)l9;zOYZm+m29)9%bs0?$bKRruEt@_!c`x4qFM|BG!Xm;l%!b zJl6#vETZ(s7G1fl%y7N8<8D0X) z558b3fYf0CT0Tp7-EU}+Cid{TjLcsE?Hw0%gG9G<-SQjW#4h+vczKzm(9cH8_$1ZV z8zC!pSy>d8x|B_eGpCe3$%+-J+0_Khr?DueO;HU&8iY8tKD3loqo{9><~EKu4;wag)dCDYZDVT#?L z!lOzNn73csE#KeI_*rgzs9$s=LtfF-X{M*w8^;QxwDiz#Dt9DO@U#Zoa0_L$-dEp_ z4%o&D)k>JCQ8!HJ*96vi5i))|c6eHRjXJsoy4j!R8)qau!JqPs{`k252{v)N<6N8y z|H6)K(U_N8G2dH`F@|~ErN0T2;Wo196Yz&xK=z)q!nutZDqxBCyC}Rr+oi#Y3!Ha@ zpawLZh*6+Jt($_?(FQ2Yvhw|81$V2V2IfH(vPTVaYU-aFm)e6umG^t}}cbTWFG(RvJHKvyfH*TbM ziL$p0_~dzCGDxo1ZCN!>QtxyRQ{F5JRq|ren_|{G$-CPjK=8n|P>HL0zJ5;1V%pQl zv<~-4;lAaF?L9oVpp$(6A7B4H5bOetyF9Necb_~su-Xcb?r-LBmqQLr+$jHJdz z-Xh3Rr6#a{Hs(O|<2qti zrNzi-Tf&*^`+B7)gJA`XT`#Zsz16wBx#`B1gO+y2A@#&NHMGT1y{5c;n*7lz;{Zj| ze3M~|(YxQ3bBDeV#5_9Bk?AVu?yB#~6YE)?l5Yt!bvp-*K6UJRTf=xQc6PK(eGO3aoqF{CGo~HKb3Q0F#RUF#XOF$NaT_^$YbsL}|U>lSR)s_?_ILO`Z1`*C$80ORH>oqkN%{ z8%~Zh8-4vR<)>kqCh3nkU)a9Yb zZ+aDRw34GI86Neo9sjcihlp{d0>KbZNWYwq0=ZTIV*h+(RRnnon8hEcWAIA^ju8=ro_7n2btcDu?}RScqZn%fn#tR^R)6H>|4h`Oqy%z5RP5w_V<&e@g0Y zRrr*b_17#oSM5L{nqo^R(~Lr5;|7LD8iBU(b6F^1KgWo(0Hrsv2$#9ZC5B2PDvjlE zwqBD6?NDXaetTX`X&lL)*{EX9<2clGG2zg_8xcs#o%)gPe3Ouge9TmRU4Y91U0Qg3 z?3yco&mk;()?LG6PIYV&X|VL@W0_(@d{!-GR9q@t98z)hcdONelx(xND}wUJuBBu! zHPKijB!V6NiYAfGxRP1W);N`9YZQHRDQj($FK#IA8vCf&_u^PE!jgxXj0z;4#h$HF z!ea`byBM+9a-I2@wI{0bxx~tW=l!7A)*X*lO_zN+Isvwf@!a|2>XM3bUWA8bQz?G? zD=&-z?Y%GaoO;I~L7*u5Iu9#{bkr*dAq5(bYnR?vGRhPuTxCR9lv(g2wdn|;go+K2 z-SQ#(e96N#M2hRocH}+u%{!Hmp3Judh6 zlWjG@AAl*}KiK{-1H_2_ewy!uQ3Z-_2;V(TZnE1&WE7#YGBU3T4K)>$Jpe|u@G$c1 zH;>N@gA$W5fB;8=m~%g9C5bQ??U?GBxXfwha@v$v_}1|7uGv!2vgOFd3oKf-atyT% zI`U5lEMVS!y+}OxW%8c2{kZI0Lku@Ky5!47RJO&c=1>=cQlc_%g1OC_4HwkCs@Bzo zzKJEa-l}aBrh-soIzUCs=XFX-z@#XH;;3C&wO@CsTnoC$did8b*jp_HIu%Ryd$n@bzJAEVVNZKA}sT zdO0JujiWfJRNr5&G+EhN!$(A}`s5S%^zVIHsfRH0W}#j|TaCu;GXK4j7`M)Zbf2F?np66! z`3e8e^`z(ltUmHWX+8WrK#YzfIWb(3&Y`dv0l+5y_y_ff|C(La1H|3Ex6huk(5r|S zdEx#UQ`z#dBtb_FEg}Vr(+$U8m5`L${AR!IjMPv_;{r1u#nXryq+R1?7n*slsg_7j zabh~MNy(f~pP4IhlOAl6En%X6`({5B3;Y^+?|4&aNk7`Utb!%jbt$M`xgfvVrbAz^ za6Uy>DLmv4Ia*obB|E#}x8X8@b)4UwjgxdI1555tk#?`#V>QmIZ98F-svJR{2F5@T z^fc2m_9z2&Q_;XTudHNFbRE<*%_4ndVm~qqBOmmJ-3>m-*EXQo5jy!m*aHl^4+eq_SjTeTL ziiKYr_q^$?AQik# zgjOSW(4H4l=lfE4f?V81c^QIT>d}tz#RvQWDUyGYd2cJt3WeDr=7?k)=~YT@NiL>)LRw%A!Ui9^NFueynmNJ!V-Wc2Y5Z7-vBE`O6hC#qrK!H$m;}i zpxHg{zgB=oZwxU1D>^2@Fy$h;R{h&IT=QG+dO+&_S8UCrp68tZ`Xv8|VE<3z%)j3d z5N-0)wORGlWBx~fd(H_k4ghTU?Z3l_05$bUMf>OezrEgH?fEvNN4f=>BSZe?*f7wM zIbW`;k1OHcKk)m3w+8Ui(Mm*=RONLm+NPg2x8>=`e#D;|4?3E?b#|TdDx5s ztFWoXFpz8Ot8A*T_Dq$P2WJ{$UU85K zIuuM<>7Lw;bbP+#ugRt}3TQgA^wrU%Szf)7hJYF0_5LYLOJe&-?&xU8ofWNx$e_f4ml5+7FtAK#Jc#nN76+WHzb9#0*XE zZu*_hc~`OzO*uuAVz+0!ho7g`)$d>|J43fTX^+C2_BuD&Zzw8&Z|PgfzS{e=4V9A) zn7T%*OCq3cz{k=ytTw7!o4S8LIXWu*34XP)cs~6!X{F0}$aDx+u3nj*z6;KOxa(&= z?amf57~5u$UV*$M!B)4T%(x{zSVmz7pA>;1arKINLHi5$6taK+(m4s?A)&UvNuxC1 zcSNaNv!Gr{9Irx)Y+UkkR6=cK;Hk+rm>YaLs&e+7g>u@C>Pu8HNgYK9w1n>jvdowuC(W;~ z5g5!@&H>@w8M?lHF;AEJhooFxqTVs|gO_mUK6TY{w{woT8fwc%#w`ui85%AQQW!K! zvA;Uc#^N$gG0SBYq1pTncm#Iv6Jvyu>-~f1;bJQ;F@tXwgLi9GPq2ko2q?HD_uxqQ z>E=w`l#V=4m-$x{$7FRnCI_R6tC}_=m!P@b*g3&^77O9d*135a|2V4>YjW~xiQBG0 zBdoat-!8S0tZJa9MVRk>DmoW$-F+(JM+Rd>c@Gr2(cLV${;5C--1m`nr+4`%L!x1N z^}gC9*ZYJVu7_z#Z=H>qqFC>F{U(X+2)${Py*be=J)3roO_gu;YUt0jZ8I@$-Zy)a z6pXwRVXOqx;emdC$7Nw4>QNypQ=s5@W&0n*R6ANBdx4rywU4iArev=bq5<8kpE6!kZ)arw#h=1IKQaCVR_?N9 z4=yXiN$B@|v#U9Jn9`#*D8B2^t%w^Z!&J7PF}LThDHN_RwFA1t9J0o3Lg|FQIH~B_ zeAtok{xu*VpaVN;Wgb;E{sJ`+j4LvG@4Xd+AiNhi`VzAJo+2A)QY7e)&6rJhrCC+{ zcS{2HKF&#lsUCB+AE*7`tRl+eMt>Wb+G)MG4sLa-!(ok^w#%pmGD%o!zS?#gJQW`p zU9wOAiPBLMbLtAY4sTmvA6g%)!LF58kW>UG(y{`F=UyK~=%_GX##r24>xj}jR;EgQ3H=7C`qdWQW+{ASlw*In=NXLFlQn)Zt-TR&XI!R;sg0~# zhB~)p&5=TQ&wgnbaHhW}K?CEU!D;$`lp=7(e490s++d;l%uvRRLo7?P8*faK{x3lU zLApcCD8h-BZhoDk{WNVMVBV&qEXTBVu!(+sJXO@}&1EgElz~pZrdQyxvhw!0KJw+) zC-SKlC%;U*zqti(XGKE_9N)a1$xK_zt*QRGVBl zpNf?}ubRgF8rxYV*+|>K9&!C#-y+W|J~`QG?(P0EZ~N{Qy;rt%(BKCj>~)0q8P^=D zfKD20-KOMfxPkx;0YeLyV_LK$z1ZLmw9%G*BdNgXTg3=4C*zW~wxl#*i9(`PuD`&{ zoF!j#kz>6Cr?P5%2|Rx|wq(k@y;r63qi6)ICfDXAVxc(gsU+6wAF=Btx=T~_!Z9WZ z!Q8V2DdBym^?EbcxaeOaXCQ`5n2`Q48?CrvU3K#gAVS1ew@y_{4$83=8!q?Xj@W{q zlgz2?-GN2M^VvqJ7UDe$gKqY#3;9O&7ZgoX^Ke*I4UjvioX8XnrnkK@7j@w|psom^ zxjCRrp{mksuEApeL$$=uqjVlJ*9FE~oon1C>we)y>;29hP~Qek$R~B;~H(t zvE!>>%I{b|P=1?n=VCUXIOLDPuq792JtHv}DIHK5>K6bH&h#^ek8buQGb?8-9AtuR z=Ii}~(a?wF+R1Gjg4<#!nx+(m0;UZqB1+MRmAi}lu2^bw@7VBO2tv?F4%2}qY)PzH zAD&|gP$aC=H>VWj2cFGDRFSMq3ZsRbni-krgj$UtjDhzLY9bvvSz@ufWFJdxNm^Kg zPD)TOcxM$ha2dKyi@zU3%ISnG*8AiAF_^MD-YX%Lq@Zy@+x|la6GhGJQhz?MYD{#h zf>AZg0X3zutAWAntA(To+0rNDpxQg2KYAHek=DE|`>4#d?wh+MA3JrX2VLJNN$Fgk%88egOyX+qq0MMK8>4yFG#qRRyg022Efp`Yxh@m z9@6^R=Ml5nOCF|`GixP%AM*cKTpmYhG2_Z+B2EH>^{gqbZFYFN8}zWscUE@Q0ALC8 zpBooEXQ$yWVf=GHK2@eO2u{pMbsi53FcSF*tUq!4lj1WsJbsBYpulSI~0Sgsp;F)?d$BQ(EhB6rkx@D z&AVkDC@c1(KR8(SW0^;J@%{yw`}`Zb%I1TnW;!|5Nktj2IMckT_%(VYX*%t*85&oT ztdG+lZ~aQHC8OtWGw?f)vuFz!=QA*%m*E3vMe7VaZt`f>;O5l+V&by?IBN9GE?)aU zD^fXT>ORRqW|21_o%*$H$&G8a+J87Z)q~lIp?#X$d^4jLH8az-vbWWefl1T4&{9xk zI(({vA7v7pDk48Zu6!yJO2%%p7^OOzRFu}E_L546L_Rnx((yo4_#F;CHGlj}Ml=zn zRy;8JI*F=E-z9gt!9PMOkPgWlm%)S%m+91ChYAbvL!}hBO>1jyzbY0QWzyPn0!KhF z{?y!|)NzdzRFmHd=D%mq)%9A=KwEUYslYeNWAv@Joan`gbw3rA|7Y?)MSLh9iKpv+ zr#29x5w2WGn&VQ(k<$JsEyTk@fCa(LCEI^=;YYhROTBrI_Yw6otMjtlRF6H=M%RJ) zHm$ryD`OvngAmPT-Et@?nm6dAVp`CU>`u*S!OU;0bin<%6xlkQ^!r>u4K}D+yg!xe zhqGy+6;WL0RuS{TTF1m}&kz`Wly}q<)FVGwrzyU=(wOn4(bqEJ8jH8vdwbA8n7NTz zCCB~?jshiL#2^pKZM#qwjrW8(^O`Fl zQ?A>-r!HH7IP&SmM0nR-ch42(Ngf%i-Q@^+4Np(+$veH@B`B#_o(C~hDnxKx9P=Wx z@}aBl{f|sEljB80Os0(){NVP)MLMkia2hUshmA=K)I_Ks!jaD z^9FrsbmS*O6hDU&4nApc6B24X`OZvx8@Tim()B-SiZ+#H2{e0ZZaM*MlZ1@H?!2;? z)u{10|0BN&V?g?AqN*Av3b^Gh8Opq_;kRENMalZD_@hy~E)N^Fa8$&Mm`JqEeKO#V zv0xgfqz6pL(2{5U2A2?8}~c z)KYtLG^!XL0~sb)tAMPSuMcv@Bo*(hHs3}WbtZ|05zvbIvZ3d{zih0rE;LG~o?ieo z4aJ`H=V$O?{i^BMFlET%L*nKaLa6)njWiudT3Ln_;wa@)kKzxEC*1$;$vBktHy>Iy zrnf$PZ{PsxseqXTAC-z?MIB{26#30v_|z8k0!4qns~xgxQqC6lAs#S{XfzfhKwylsVS3JNXWp&KvnkG3m zXD2lVybpY7^?3GJwnbCWxJkN=EK0$^D4Vi!6yP35O6UW zaDk)!t=q%g=EE!Q5z)as@ym`&=T9p(=kppJCn!aT-rxB{VsQ)beJf%*1i%o@xW)Pp zcwxw?vNr2B1N*TWi>Aqwpz95O`L^Pp28s+)D%?ABTCZLu=HhN0C9JAyqaRC#|oRUcM#axk+xn z9Nv#7>saYzOQ{F|Yg(EWoe6mlV!`|iYi_Cwytbc$!VQZ%el4lQ7At8Mn)9K?Q@LDxHNkl}g~H;p zLYu(-+Y^)Fz4kSMDF0wHzI8MI9Uch}*y1;tR1rtR7p|Af+6p?&H#7W zccMm2&1!74O#ALcV4^1ZKI&Tgc@q*Pe3q#}vnH*78;d=$<-2w+j?P(!q0Md4B+@E;aTkr- zE)}I`VCojF<8>97YDgyTPR4_|F^y?um%`Kwy*GgB2>hCFo+VihxfPGVM`;HFSNAFh*ECbS61^HR19qOzkESTAH#Ktee%qt^_2u$+WLT;oJ)__ zWvtBSZm~F@&k?nnH2meB7Z|UoL4rpHx0{WvWTt+n!*PmiQTeiP)#SbsC6V8?frhz7 z|29n63BM~-p-n#vpvH7I2cAzv%SkgU?k;PkN0k_AWnuaikEKM1fv;+3E~eI?Tdg)3$YaDjRvbHESaY;n?3BT45?d|lT#Zm;lzh{|XZxXc?f9vB zGQ)!weyuF3C@oyW$;$|ml6aMxc}1^vM?g6=P{XWdR(z7Xi>+OHCSs1v-;{WN(Yh_6 zUZ|PbyuNj&k-L5miqhLb4^dQ-yw#OW%yfXneRLaFA!gJOv4C`eogMH#*>u9H!2N6& z{rS)hD7iFlzj^mv)cEW|#%dC5qVew#bNFLw`&HhNOwEWTl5{f1}3 zx$Vk7G(_B#AnLc~@5E;!hl(s?$px^~(1!yKyrkyza!Tnf52@gnn6}d_U+$XkLC^!H zLxedAHxmbFI`^xPmhQSr%^bkTmbxF(WNPgk_-+a7?8e;n+bT&e829p8e|yt31`Y2k z?nF+*$m)tLF+YlNVz3WqvlxE)t7n=3BV#qNvA^NGqjDDGGWU}LYN5m4D}cl*Pzr``0xB7##sy=ljgha39@P%>Rbou)0q7z2pekfeHMTH&@BBdXVZa zJug`7YdBVjsrl|Y4d%R3_Qw@n5W$ADZ>|`fi}KPK=no?W_7q&Z#xzALebxd<2NBsalGZdw6O1`7$7S5k7qL3ufs^)!jKyEmTFw5Ct64 zWi-9``r%c7NGxGq#~VeF^cN&t-X|SpcVq*%9!|4{PXKMQ+eW9ocdZ+S1B>2@- z1it;FRT8$p1h8nH-uXMAjReWTYobhwiua*c>ZNLbP9*J@XW0ECt#_8yoWCrjFwVGK zRCGdKzC`Wc!oH)Eop$VIx)0CLu^iXk7BkVxip}+dgk!>c8wmq34T1y|nilX9x5a#a z>&5%B4Kl&NMJzDbio1(XMxoDf%J@!Ce?)=Q=}qB)6)bdIG2_mtOuZsz#a0 z2Ri=z0$K~bX?9!wmX)9Iz*mQwHfAEYD9VLk!smi-WA((HfaF?_nsz};T}fNgzUA!Z zy3TFfsM5CZSmD5)Bf+$qMcTgv>fA3P>ig3wmn$=0DL1}`L+9fMxbJ+}1bEHd`$I+9 zZ9qI}to)Yg`t{~2na?~rgyCItrIF|Jj-b;%XQREPWdDpQ*Qd_kY%#@^SCBCcfc~qs z_&9j|mJcMMjrCNajp=EDaMQlFZowvyg%JLa(2*r7H z+xIiE(CJ>bbbuk@>AvM^oy`^n96K;6E^_;vwXj>?wDY)f@s? zgYV42Q%{%VqZYz$f#p)0hfHwqTDRE?RZG%b@B0uUO{BFg?% z%l5E|K!dEFKk_mD@QF3T5@jaxhxeL_J?aOW%%Ti70~I!?=u;N4?%d1M*8iZ7=n*iu zf9ZWz#W=^SuPOC_gl^(9v$LKmJ86i7dK;subik{b3z+GAOUABZnbO~eUzo+l_sHLe zGx)^YmLZLl^g3!Y8@%F|QPxOOd3oq2VzJGd(aSXCwz!B5sLCLfaU!7W9lO`Ed2!-Dkit0ze-XBxeQ0P>h$F=09B#{1qdFIsXBHDX>T6WmZ5*jAR zd0^@PZ)DEyF$dA{a|;10Z4ysDO+C6yV;5k8h!w&&RVtt>FI#T61!%4d;)(qg)WJw9 z;B^DSF8*b4$`KW9WMz*MSl(T(nszs0DEtYo5Glh`@}L`(YqpB}8gL=bnNRN~~E%rlVdEYe!= zbwTQCHg=+yOTYY${Z5&Zp|a1ZtKl_H?OY5dCpXqkAi{L1a;A|_rE}uYKbljY6Cm*D z@_pa(fIN|a3~c-D1O8-b7C@!wR0MII7im79)jP`*DS0*)~T%Gd9oO0K9X)l=WyKoKbDS&`ITZ9vEX>amCpj zcDzOBiv=Dc#b?#@P6UrXDWX$IRT`Ze;VU@dlzv@Vh`V2gVOL(T?%iF+Vv{<6=^xOX+9V1DgJB`8s|JN-H%qoc zXBn02u|BNW|<@T5W)7g+cHf^-`RjED!Hd2j(~k_C{*sS>E`cdIfDtXr9~S~;e-}MU{-5-*oCGDU zN^wszprkU``2EVd#U%6BD4a-c>&z5)rh$GPJHK9$RG@EI0aRSZ-C=+nRc(wBa_JL5 z+qZfzz&y_g`zKH5)-#+P7mg54V}L)E-DOWn6X#Jp7X@@6PsOWbg8(}U+P&SPTLT|& zZie*2t5GUY+kLLK*2b{?wDN$($q zz}+%w;zPrA`s%3g2Jp}zrvNI$50?-qf2%apz$SYNDdsZz7VR4)erG%|^`^QCc047qkQ3d$5PRiVA zxl6N7c9dng_P6^p4_aSFDy$^yUy>kO4=b_nUoa*aaC09l-fy+bJm`#tWc&oG{oi1; zeN?U(K00v(OhO5~4;rK6K6_6Y=1VQ0n)l^{_7?U&$$a*V!_y>cBfv-Fa>MMB!N0&Y zhEI%C19Rod*6Kt>fhm3Rx<%O}Km72L=FyvtRgdKoZeikNZ*a|OysmA_72 zew}~<{;-~G>v4%G83~sdGkmJLIA_O^?eI`-2Q)R!jw`6 zC6Pyz-0W(}6jaFfJJ5d4VIb2PTQLIjU`=JG0YMhE(c4^c8TwcFpP7BVgQQ=WfjNPcrs)5ZqKb!ZuG9f@``fXF!5Vq(<*ii8daf~>ulEV!A ze9Ikqi|gLR>n=HX(Ex}rm$l8`ZO+yk(vx^%y=hOr1FDM9sJNk~f_~=j{HC3tFcz3M z(Hyei>mF(&>zKB(e8?etkHzz4s&setf}&l-X8^A+HkLdbvN*;jEdh+P z(95*`G{dI-YK8^r9oJ=mGUoYScqLv^Y!1`(OYMHJOB>ds#%;^fFW3>xDbXJ52G#dO zX_0{2@&UgBwIC~vpy|MXnIN!0oWo&~8l`CHJzd)=`qg1u-2Q2%-c!H}0ra%@Hs9j| za`vC1YHzGrP?mcN2wa`9IdAxdnF$5b0!DMIgi>rOiFs@;Gc+5#v1txlD+zN)X)Uu( z-rx1XX%)P4%Vh}Dx)M8-x1T)$Kl=ey>aO%>zEl)30aZEgdszAA3xo~6I}i9{ItTA1 zX(^qIHed~ek70%M%4XOnGLUHdyc3l6eNChiRqN~6R`9Ku^c*o$N*+};&=XTh-$;ZR zRbp+x-nV(t^$$M%H7Z)iI8Ob})`$ARCpft0`O6x)Ky6BHZsb%}VlMcum@C24X)nQz zmRLaTp-+@Nj9)AF`pN@T3V+KGOScl$pG02;Y$_f9Y%(^gWX?llOI}{AvVzO0$+1Bv zrR090gTUBvLgOI_oK`_K)=mecKoZ)2GD=R?p;k{f0X)hf-guoDTvX8JMZ<)j>INOKCAp zD`5&V+Ku;5{EFPCSK~I>pi2Q?S)uMF@eAT&q1Yds_8K&~m5-Q#*GroTEk>q|V zr*4|duVLlunNFG~PwhAQ=)8Z@9pt_08>fE8V?LcZF^5W|^q-QTOt>iI___4NeaV#oXX9ED?b_0eOgTR&B{U7t6eLyy9>PQBJ<;y0k zh^Wc6zIn1c)9Cqm4LDF@U3SK!cyMO~A~weh{~5Cx9!*!QcflP4nXuyIta4x2I>49u zqI|OYVbaO@1-G8!hF|PO@9#^Lfgd6QCvVmbePtTC1H+6-JjHIAyHxVWuF&idjK-@%|#%fd>|9yxBQyz2PV#eKA3WDS1d4lkf}er}x3C zF|zHi#WDKQD|o~*p+JG&eHRZv3IONMx*!iBw3E?U-KOCMxN#4svrbvE${EDivADwty=rJ0?pVsr`NhhH*#d-tGQEs;gp{#soXq|8%7))}#q1jUtw~KHc?=(B z=@UBe4j8*0XI25u*r><}`b%&!0KVAY<)M~igEi>m#Kjr+ z)e(W*rz$Ke6G2Mvujjj?#32>PXT0?NB`K4bGcqZ`sL=a9SFUIqd+u}QG zpO{geDh~+Bi1N~ulWCnA;CwUH6!P{onJ&c^N1Z_^kgI6tB5J9yL#J+mY0$`sC{L-9 z{~unzl-TQ2@pZ#5vZX*^=G&N@Ty0#m=l%GZS$ANKUIAIJ6~vyhcFRu#a7CaPXgnwW z?*1z|1E9vznKz4HU_4WXGxdyW1^RT$hO`}cQY3~8V+6GLtrCc}v9)mJ9r!Fak!lN82*~Z-7(*7K_eT)W1JmyGWj4* z3kpW$$OV7BZHBo<>Q~e#1r>X+Nx-y^-7VC2a~qA5^n~@HkIh z%;16Vr$iyr;h^coXCzk%R$NK3t(Cw>#XnnP;>58$8Ekmzxu8^_cD zZ=*${%+NZ>4(yN9%zE|`rK<@$tFvK!N`4NY$?~N^b4L;C;4k;14Eppo>z_&5JxZiX ze4;n=L@PUeWC8K}^%b89GaXvW4-coJe4Wxv2jz0C^cE#-d663O$Exoea`_4|;5a&U zx^H+0c!iS+6fS#{Iy$#BZIfgIXBdtq)`@;+0(UYMwOUg7YB_Vy$M@YVuA`?1zNxjH zSvB_rOLAsB73@J<2QI%nXg9-iizUD5K07YCdq<@pn(MOfz!yh}!w)HKb`xQC+44S1 zbQxEHzDbi)a%5h;@Af<%HkazrC>S#CRkzXfrVriVFT7@i$ zGOe3Edlz3dFxBP5)+yh<#kCgGZ^bdwezaDjztolw6$mD!-y5|2gQu z2q`n7Cb|F8_WU-RUd=p#`oy&RbR)z~&Pgs&M$E0^?OUqAkre%nP|N%GCy!kAw?!+A zE5eD3YvTh4t6NnzXg4W8a%lkiLlgb6v1h9v{zgecmDuy6-zA6{Qad(I9kfQtm`$-z zp)l1(3R#)QQqVS{Pf8%kkx8*Nw>i4JGKG|iPMdKLkEc`-k5y0JUd=&Cj8p+{xWt_(ULauCCBqiRD)*);7OYpi_InqC;>yV@#DG z5r*G3O2J?%wbXgt5%(xJG&<$0O736-+ zXsqq^F^zDg%Dpv`PekJdjoKE=e3hdrWzvhH2ew8GP-r?0q$eY0?m3pec=3KNlr&N1 zc*~RFam5K^Bs=SWExAx@6Y&hA5_Xhneeugfm`hzb;Wb@WL{TdGZthdlQt>Ba`R7eo z3ChqhIbowg)f{3%Bl%|7rGiAuhqH+i8G0$CZ0DvF>$>yNn>K49t{h_Kl{^TmeGXFS zoM_3SW&fRmn9>YW=?~7U<)9-Vff~qQO9#MGQ6Tc;$-8OMxCoCfb1lEU@RJU8WnsXu zOztoaN7gJHPdYggwgL|;_eCJ-S=Cc5y9kdM=u@ZuPyk0qM*^*kmHPtod_efd`<>Pe zEXfA9kj7|^PMcw+)Y1w1RW{_W2+;%dK8z9c+1q~0n@#T*V(j|CWxruiPUK=o@5!{( z3FJGElU!RlM zZHYmK&W&&oql|2SKgB(mI>8iLdZ|I&mu(=$)mX&Tx@lWQq^Dw3MPBF6O4%Sg?>M?t z_@$D|sm)Xk4Yx(Af#WBVBraEMRD-5Ho(-f~8_+!I6e+OS#t%|LihGOvLC5evUmi02 z=FBBID&q6rpgmtF7@)|1^^n$93n;2YmAz16EBzTqFI4Q9M#P(NT@f$%uu=Y5W1ZC5r;K8m50Vzat)3IF6J< z9iO%CK8`Wq?h*nz* zS~ON{xAHGw4lR_G9U8KH!JeE6Afh=O#Ngmkyk-LdHo zkuH&DlhV=+N_U5VfOH9LIyQ}z(y64BoWaNUef(Y5iR<_u0-JBltXZ?>UiZglY_jiO zh^1{P3)8yD>`8;uc5r2y5OHMD>AsfOHcEzecz~#A(=+?nTH;Z35Z-+c#E&?^SXyXG z{xg=0q8qoFf!Ge54Ddo32HUd^?)NvMTA3?c4s*q@IhMgR-t^cnGqT{C5^6OTO;@2r zx(Y<$jrx;0DQl^J%q!9iVF?>EA@0?-YLPZ*6@xdfutSk!eJFyEHAbh$(XUgV$x1t} ztMw{rSHZIdS;9Obi`tBugv#&bK4J+7fwwy1=au2nO9t@4Ep|40$9JlK`U<~folD*) zS3^P%2i1M8AG>Ec0}UvfVXBdQ7q2i{MXj$Sn)cQx)Iz9^1@85O6uqxz z*EC;&I^p{mL+Gp4d(KAJ?HzdtP~>rU0?K3u$yXYbibp`l8cW-ug@N|%aW2|JL+XoT zY2&q`s!_Gt*+_FHvmt7|kBQ9l<7?#)6erdOW^!$(V;@xYMAQS(n5byAp1mA$K8uvr z1N!x-g(B24j+Ki|b~#}_spBo_{`nSk(g)ugK=;mPF=>hMNXMIN`-FwZ2V+#%hZ@Ue zz_nx!1G8W#p-7u*Up3>ZOdV>fV4oYhVKoX&8^VO|ar>hj`oBmgc_# zjP;!{eAYf$xMj~iw|#0|BT{-=Uj0EH{|qQ^&{7C`(Ir=8{YdQS+S-!1L?0hICw`W? z)xJG!!0S-5y8uBWEgsHL8_>*2*0@AV$s5o0_g@R_OHfLF0@{RJwm)(U3LM4~apN?;D%192b<6WIsJrD7S8k!@nYFAzo8La+BW323ZFx7J{5jTn ziib^2ZV+aDi4%BLszi|Ol9jU)OdvPX99f!S28lw!Vp4M7qD%A?VT>fFA z%_{cs8mpZ77k9q!3$~Jn^40@9L>aR!TC~*LF>I@3m;QqA;McS7Yg9IrO?4xp<3pm0 zWYtvc9S`ohT$B~5krf>FnKi+=Ce(AI^gl@qXGqr@pOT41&sDdbBFQmdq9%Q#eQ!We zl*D3`q*kEjnH`baJN6k`v+sbDl4$+S-{pr^W)pd@k}^1iHwYUsf^Bg++}UB&8q#&y zYb4=GvAz@1n+ARTQa)Na5}&1{m~%_0Y1m+FwErllHhk&cUuRAjqwLRjiN{0W(Jtj% z?>x!g)%AO|>zWvnm0#mf2VSgVh+VPTzMSHV5V;I8p5aXDk&cD4rl4<4Bgn1p={2$s zA%FO3SsJZ;5Ln%2Hr1gEgEvNgT@ns0V7C3?+MPFdNiG^yskNPB+!xsnc_3N0mJ>=uaa=>%2_lj1^RCIgZ=} z(7^G0S^u3O!49hAkez4a>K6sfcC1Faem4Zi-1Z)pQ)fC`#q!;IXVq);GEYV9g$Od^ zX_Y`J+H8&J;%yUdLg-(`@rd}GTI9A$(DEexa<202b#8mHtgsgd^vUssa5z)_zA^;` zhMdibr@He;At*Rt%H4~07%}~~Yk{E0DjOe8Lo=p5fTV?UL!ULsM;~N}c0?yfOZB`A zfjLh}Zi=41?QCUX>Hc5W{{L=yp@snWPhj}=$Hi_~mWBjc-PsCk&HhVX{^xka*A0-q z|8@)ePs_|L5q=+7A_)Aa0mN^gq5ft7!`Z93(OD;*&t$Q!hwVn;mc#MqB+B&R_7_AC z>6s}~zHSfMz3D83fK{;JleDS54ybSE7!(cz$5vkTr19@>Mc4Ovjl+Ic-e9^AZ&{3# zXH|+UeWKWT2D~{oCFRS=gU>hqI(7m-?AiKLsMK;^McCIEu_c6ML(n(-DW&s^7&KJS z&NMFkI7M>-Wm>cYh%ckUpW**HF4rrul2>W;H>^s*TWZd>P(XUHQ&@F+(w4RK=)Nj4 zI2a6xc7B;ti%^=7Q!Xa%^18@}L=io^K)L*zk&1bSAbccq=fi7n;ZAekD&{q+-HcXZ z89#0Ls=XK3rjL2sJd<4mE!Uw-^!9WkG7R)O!aijI;zIp*y1c0WeNQyvF*O_BN*NQt z!sxT5N<%Q6x_$y32~FNZ*R&LB;A0YrQ9N!j~gMuhJH(|3L;UPmQal(Ea8&eu+$sa>>bi z{Id1Tb)TN6Vt`{;m70ugVHq^SD1*147UleyM4mi;jWHa{EYOCV*Yuq~?(A6(0>bB? zeK`@ObgHTePPkpt#Z9LQi-*{#si7sc6Vur z8Zx0ITnej<3ijQVy7D;8^p5NCL%PM^FE3pDcV~dCkqQ|Pd(t{KnOrw|@ffdW8Dlc9 z;dT?OUq0;lmVx{8&7}&9Zi%t*7O47dbzg#W6Iar;O^2Msd{p;V+*L57RK#vL3@qzxtu>++q`5q_2j@#6Y7oR)2M}$G^ReONyPFDFF7xptucQ zD6lD@E(GTcW&t$F{E9NlHq+s8Yvgv;Q~D>n4L&4Kqth{h!cE+)uW7EY8s-`!xhm9k z_MF6DEz#@ucco3tp)x#IH;&F92&bf;2#x1sN?WD3r{Fb9VZIVld|#$OC&v~ydQuox7mt1iJ3ORXkKlpSV^-fzz)vtXK!h{Gq( zNHI)kWh7V(b-8Uz_?&SgQ^u5M!Kqk^%SDHHzc9xZG?wFN_x<)*YH(R_^sQIt{eS%v z<0-TcC#u4KeK1>_i;N*y(H)8_DTGXpVp7_$j8&KGR;Lw^Oj>2Nc<(ycU98EcK*6HX z=m2MdNN!#bndV27I?k62a_yn3bWk{+GtByaupHH19cGo&ikWw1I3O-rB9DDqNy6Tr zlE#wnb12cu& zN4S`4r7)p;tATxv+mE>|GDtW@mzwkM1z0IF_^NDegqX^J29tuFH#5bzw*`vuf5?`g zh7}_KJaxFNDg;=z=iOGQFM1TyW9ZOHgACv1P+Kvm{sbKz;YFIn`;;4lY8J!e)D6u+ z6aL*7vraC*{C6j{fa4Hn3<83BcwLT!&a6Gg5Z#E81fH8p;fRkZ1T-E(-5Dz7`!5^$ z9ONeKsT|j}7Cib(r$Gx7rKh1vc|qf{tZvQATH6If7JYxFVs2uI?3X$6=-%;py-6ty zko0V*{2F6vK#1(Z6G{5BZ@|MVJ&nn2zkq&2!+P^xi2BR8uuv6RNNIeb?W53{wAEq} zm91~#rp~rZsBUY_RMJtmi`D;ljWEI*$)q&UJg8GsQ3My6C_%!HO$8%NaSSArYAbQo zP#c|Wjw>l1o8l|`9eh@a`X^jBjn2^7W>mo$P;47(t%-_G_7eqK2jCu8sh>+Gh^46a zmdxobn!%*TC1UH@<~^HbhSgMktnLD|)oY6@uN zNv(}BV<@TJvHAg1(P^mwZ580SeSTj3vLMjM!gpUJF~!*m{i{ZKR2th@^Oz(pHRG8{ z^~+n`@MoLJ_yNt$WLCR_#lFcM)3LZ}8+4bQBw3_U6W$etw`or^>Gmmsgh)BZ?H~q1 zkh(iH|0PAbZlWOIeO`Wxx5WD}I{NO|{eP9JubwKNVAr!=(#k7BXyex8fX8z!EcI z=j%DWz(v#Xj5uq?=3`M3^pHTW3M9_YyE^n2%(ujv43Ie?kBjrToI-}k7AUlOD0<35 zUgr3K_Gaa`p&b^C806`nB~E@;AwSCJprO)+wpV1fiO8;KpIXkH^7%dakkLNUXUg&5 z-|2QVeP@B~hU73vqb=yM!ui0~RYe}bI^$o*7XP1J$p3dF+5b+e0-t2mx)rw|0+;2h z;_tcH?}QZqSuyXnBbNbuqYdG*PfuEE+^I#_L&AMMC?jp(MHcakx$nzg1h*~D`VEH* zz;N%6J|}os4jm=vrYWBXhXAkBLMsHj zqh}|-=JTm>wJg>^yfQWFYzvokzA5x~scBYFZ1YScS7=jIVynM?8x_G7{`kmq<*(i= z@hp`jP(9VrYOoFRIn{5AP`gC$FR2A7iKy#Vg&ogWX(cQ}S}BwI*{dW2PZ*lPM9K-n z>HAsz7B3+2NDK(+_lPuW^RvE|!X*`7ad5b8XUvV}bC(%1qSC8NTJR|8lGd;;sm-3I zp0$s$oz;vYC}%N@`$p4$nhvymWjP&eWu&}PJeCZpbulKiMU2x4vrME6>?(V6j7X^Q zCq$wrtHDFt*Q2pYN=bTkeXi+dpvTmJw!yk~Z<0}N$}SaX3f5W3!{pni^{ zw#rBqmJlP%7T$PF@3I(@NK7-Pw#YHGcerLtU@euFO1 zGsq?8*8bEhK&TU=-N*I6q(S_|=rb^I9rLM}9@sZ``Ok!VzZb`fsQooX$nq2mQR3a`5(!i|fbM zSA|Qha7gBM!ZSW7#Lt<*529jJ8mzKEIWnm#T9gbTLcR2>^ou@8zty8uYqC&B{qx z*;T_26}!;2pR(JlR=gHZbckH{d{g`9n}jt(`?={x-0q!#xqZQ;QpQz0@-uXM7n;Xx zF@&k(SUkLNoJ$v1c&L#TQEf+CYh07^JjgMFv8~xhyiGBvA{02>61jk+&T$MYL8TLu z0%Dka9AB7YN&iDliQS_N$RF$$D5RqkiGjxN*Q0+o&F?Cu&leL&8^;q0Fmvq~(gkL3 zFhgZ?^dMNVn7PiooQD~Lmy)q@KMMl_sthHC)PXJ4H`>X?Ysc@eiFS+UMLZ3rWc#Qf z=iw#Y19Y`{670~D!S@j7y=-i3vn4+^9`@Hov*ALXQ4eB#`ir9*L6mxpNkq0iDp{^w zo>Y!8q!+t5Sz#~lOCSuTEF6537Rta)uIDjr*e~TA;d7=`VMwdrA1>Ctw)x28MwHhs z38p4vIz;WZ+v$4IPVwU)Q{sq6SNEIt#aBs<*0>@aEu&UzvDJ_7-&QsrlcO}FK}(n% zH?%B{Lg_3CPO4D{R+=iHQm z(QTaQx}q&SPq?;Ur! zIwySD4Dgr?4Dsj~2GnunlXiepcPF*8clir;BBT9&GU(ah(?{hEO-TTb{2u#iJ%1F%~~47VAP$Kj=V>_UBrqdxCi1omj~BoHa|8+vSu zcx>^y4I~13E{+Lx1w0L1_vj5u$3KxeYBvPy*855S&mr|#R4GjiKci$C2#^)uHWJhE zJNtbZWwtW!e7p)^_*2hDlL0w$px+h0OrS?TtRMga0(n$B9 z;O&s;*Q4{CmeTaVhXxzl1&9#6)Q@-N@m4x-hm+;6SKfp1(q!(jG+lBw%yB9WJ!71Zh{p5mRt!h+bYju_UtMqy@^5Yt14i{nGwB+k?lg*9q=boSbhzrBP7{Go7aW!|L;?{X>-3JW+T?NWF?d3awDy+27hp`2>k zZlbU6JMLIX3ux9@4WzG2cEDM>e!ei1$=HVWh?+WuD{-GS;6lBK0kprQ4l}5aW#GGr zAq;g6XJ}O#K=fK7a#zxPuc>tFs=B*DryKCSul68SDY~z(sPtY*t+{4(d>;1E)Ran4 zh#c%;J`fC5GU%#;3T2iMU`@xxuMID7CGtZk9yK@=(^*d?$|uh*Hjl{_w_IkMjS@AM zR>;t&JQ1?U;5bJ|#!GJ;XVW+p0A?BegQ@C`N=Weoaq?U?`9^I8sfWL=<83GL5b{_J zvia{it+H!$QXy8(Lw%=4Rqg9+4&Q#^{Z2)F^_m{D)ehLJA8KQzs@hVz@He- z*_Ae~S;*%bW<{%+w3H$ltu3d|P zdV3d+f0sq<7x|2 zJ-;Ip4Z6`^o#}m$u$#-NgzlU{GONMa(V~#`f>eVk;d%e0&9M+3KM{2!agpnuMk)_u zCb2n}ytG77mvsKTCiF8YPw}gzDPXmEwBfR?2g){!o+1Y`l5Y5v=3dQ0o=Tt}RlMuC zbedtgPPajh#UR`3dZNV>*rKcUNDawkU=W(GyU11;GUBrWZ)ULLw++2&P4@k(3QS`{ zVWyJur4#ul_81acA6mLu@2lfCL-#_qvhVR8g#{~~F#9qF_eEbXRUQUCZ!2YLb8u@T z&)07Yl^VW4Rh5n|-s6{82<9^7_DHJ}rss-WN@hCR``6U;Wvcntew{>w)H>GAebTvH%(Kawl3UM2`FG}=Ph~sM(A#}oKsqou z#}oY()Go|`*#$m0@c)Q-2E>f5_UtZLAnxfcfMXb_etv^AtX3awdDXkFy?g@73;z&Z zhJoOo_LyS{b#H1_R^fOc*+KI=S|!h7GA_Beqy&D{avCQab(Q^=IRK_OVZIpuDRsZJM~ z*%vZ}`T(hY#Jkk=@zI%I*Tu7bHB~7A30f8wG})B_TV~F|WN7*ey_#Vjle#^JkIcN? zJif8zwvzKv22^;22oWor?0S8Ubvj43RU_phv>i8fc0Ej~^O{FWslw?___j40b5WUD zBbA1;!I2+v8SR>ujg5M*Q18!G;kBaOURbj0M94dgw0O}uN(tn-)rdpq%hSDZeAdNJ z4qYL}zcd8|1OP?vyBRbrGP1>bgE3m$b{`OMx3;W=QbmH#nV!p37#=wYuRDE@8Ce?; zT3i&8j=HdQJ>qp3-)QvS)B3t2Zv`xHYOHETR=R|=DplVeEkk3GeXc%@oa_)P&#=Dv z9D6nEBou;nnI@!2u{iB@x>sn;>-KA8f%}LM;N5@lW1GT?u`c|bScUX&9@C`MzSsy$ zf1FVG3X=KRt3^OkQZgtwIGAm4NzvW?r~SFdmp0#}x#gXQC@5V|$`OOlH99-RD4&Wy z5zImVdG_5H7XK~=30;h1`#ALIwS)u=P9S$~_zriIYB|;4Kli7vqJ^JF`~G+QtdiUu zG2r6{UgEtphJ%GB3uZ6U=RXj<-nc*iEK!5EOD?2zX>{X$S3YAsdgxs&?bT?s2?6c$ zfQgdTcg%q+yX6^q{;R=_2tlHo2rkaBHVzZA$u8;eLE-478GbK9`3yXzO~O>nTcQs@ z!^AfLMZ;KN288qLD}FF2Z<#-l)R1u6lb5$RAMhXN8ca}Kz6RFY5r0c@sysBzC^+uJ zfI1#-)oZfcvS)((Bt(SAO@e+|#{q7ETdUGAG9uy% zWjo>b9}y;Y-W&l;IRIDsAnZxW#>PfYz6<~(9UUDjD=R80DujpQh9TOAA8o@LY|k_< z+t&fHkQaKGmzkM)Fzo;z{_(9BKzZGErkELzqy6(@VAiG z73YIR!ONP=huDVz@LK6x0xtxg>1Ewk2+8zm$uekkeza(jn~d*`d;HoZKZb~bT3l6} z5|Fz;d0)DEc{L|${eC8`qAyKMo<4n=Ee)=3Jw+AppBg=nPjq(x;YZ}vpjs2=3cw*7 z-N^ii{s0=bCRz!pA@#2o#O{{WfA=QM$jAT|%*tdo=ZqqhfJqQEQ*}#fVjHYS8Kf5w z_yU{>=Z;Uq58Q(z+wDeA#Irf3GQl(F^%mKUZ_~|a{Z3>0rWSAy2I-(;Nx$h!1na2} z)}3#DT>}_WXILOc61De}auRyrLXrIibO6z)+8KC^|L$H2K6mxwJ-@sZ5AX@+C5#XjrS%U8$Q1T{MSbkj zoLsndk5eK8kk`{_Ag^;FqR-_x0RNcVW@O(_99H3-@fzzsz zMHfvb9DGO6{d>EDnG(9Q^+KZypbZl}d-VmpyrpKSNxAz7fUpkL8CCKvw+IZ85L`~W z&HEi69`h;(H@fVg5wP7MDLiT)^r9V*#J5nURr$EqI}3qc4tp#?%O5n%`j{hltMNOh*WW*0uK4g2$In z4pW_;Yc5i{x~b zLubUpk5-ExB0SXZk~}OxFp`Ci6ejNh{xhd>=Y5+M!PlfV0SP!J0x^Z{?d`|KD_!<& zwiY~hXTtt7p$5&GVq!3k*TM6C^i~->ZE)S%1DSV*-iC($I6WPHH{cpm7>N?x-D3{0 zO=vh-R`3FVv+Y7+gkhSm(ko{C#_oYBbS~v5fQX1F`e-zCUJ`cKT%DeRqC@vrU_wH| z>q~jyuJDS#NnnWVVk1%@A8Cb7WG)xEY!o8$@#BE2k<8w+&VSa9C6*X~wSDLg0o*f# zK$166PsXsYv4x)%lOWtdeTa&BeX(KMnp_Aaq=$TeLMLDS6e9|O3p`;!5dZli$j6`k z2@DP*xH75cCK+Neh5Xga7r)mVsZg-wLyydrl}8Jm{O+iCEG)DDWHR8#iYYK2i$4+e z@jBVo*u*CpxScMv{qPNuyF}d9rhr{`@z{KIYXHQdKT&cXF$@a}3&Ho|nBvbej zBz=jD)4(6=Nl4nkT-eb-x}{4Mk9wI(6fEgKht%mJrhJtK|#SvkO6|F5a7rjihG2QpVlu>)6(|#^mNLC zlxy_zTTQLEl*pm;$+nvwUL*_y+UUH66?f?&Dyq~D04dj3R~%He0B;Han}Evqdl5rx zbg{ez4gm0^=Z~+FVAIWk9r#H12!LjnmzTj9P2+WXpyYV-%ljuD5Bt11IRCaAdI;@Y z7ZL(V8;M^*8th@zEJzGf0AmHju#TLvU5?wZc{GGYOicXb$^OQM+xg)dSSmp1CF676 z1lM1vlzw=8e0*|(`sfirPMu#MVSDvo#ug$HI?bXrc*Qt~P=WQjJgD-4tl9F3((hIL zmm#?n1jL);&9UptvuruAmjCnw`GNBVMqH&Y!TQFB)jm7p9vHR=rBZmJVXNrU&jxLNXWJU@8@@XIJNpbssCz)Mda{BsT0NxhRdQTRD30qukb%8=* zNNfN19UBYv0-7qT{-+OMxjo=fIB0a90?nxz-QB%XX7x+cC{T#XWJZbQ)^gUT(47o9c8^!bf^VA+w?K8TAaRTBKpqfur8npos zHW|eiT`<0V@`!IT5c!UTm$jHddg^XZcJTlIFJ)-m} x9b`cu7X*Xb5u_^skh|38djkT__4W15&ABmSW+<2c)gACpR#Hi#LhObA{{nZo-zZqAt0k6fLCA$dQZTA@UChy;&A0d zztNap z`us_-o43XJq5h(I*?ajSD={&Phrslp`C`fYpKmW_ybrLRu!Li9iiy3BRFnE*6pliO z6oKH2b5plqsosSKe{_M_O=&y$a@x+eeA#DeiR`lMY{YyXC#TN6e%JHBS8?E=!tn0s zcdXT)3p9 z*BdZL=nv5k(vbIrV$zI!e0?f8w^4S*A5P-2np#!6b!j&WlFEx zf>3>ZeY>wbV^8BrsYHC3>^VpanIaQXWq)z@=tjs!CSZ@V{O<1~#>c01?M{1T9dUhj z6rzBgAiJx##`Z_c!(l4MlLgGj}%^L4kqU!rtfCXMYOo=ouMH zZngP@MMNmy9-f~|lYS1w`Vt-$<$d-$Ieu3-Pna4j5lg<{E@?m`wZ$wLIwClCcyrLI z{?4XnjJAm6-K};ZZh_#?mO zJIquRWqA=15kfPF&n>#8Sh&_kLlmY*Ab0hha9@oo!2)Eb>y?ic-NbMaURzrmLH@GR zz!>`_JSK)gdWAtcl@$#QZKd={X3D_h$Kbg}#>SR#?ljfPs}eHAQqSN|p3oLPr=nAY zQ;43Zi=#c+*c~sKfj%$hjA0EA_i*FX$UMzkM!N3R8M3#)G+y!_zr49Q*)iSQhU$5+ ze=8|rtN_n4BG?|5nmXN|`XZ+63W?3<_VQ@4(LE*wtk?~BBwH`tdu<>@5-M@ba2aGXD5_j3G#u;iOCSUF}Q~SxvzV^_1-C2;^+nd`HFNTLF zwz?{omsc9LgxH7v1jCb%@S2ZlZ+aqUq&GM2Fn1+xLV{mfz!bmD&o3;BaNX(SDyto$ zeL`NRoeNs}rq^M{U<7%-84H(fVxeWE)r*RQd3vC!Jsn%wY5G&^ApVKd}8mPi+#WcyGh3{umu;_A*;W?re z;f&0iT(^f}$au-g$$jsyEML5+U{uLY+l2Mn_vNIe^$x`2*hj-oQ)FV>?b-G3q9^|t z53M$h#D)2`;5aULcxu0NJu7)`w`0{03!;!94dL7Hg9ZI^sZ zlOf}U$H%{GSit0onCklu!>I1+?v|F66#8&I;q$P8OZtkNILvL)Qn!|Q8+q(S+-*}| zIe9+O4+dg*vb`;*h2HZ&6|MP7yE>nJCVD3~AY3OUFUkp}ewjcN`0W&Kxl%Eu9i(6g z#Tb7OoQKKlS!rzWEIi+|y#G5_q>$>tAk^K}waM|ZNV=o$^~4Q|%?jafulrm6*!VpW z@AK&M%A?~=1$+X0{Axo;5_vl{ce}E(^3C~Q-S0M&S^TaRLs|TeOHJ?oOnnk~7a5`} z((%$I6W3mxK25ya%uB(;VSfctbJIfCwQWwSUv!(ZZ zp5agm87&D43L3WhE)EUtA8+=bpP!4~of3TIa#yf1b-`T!WpC${1la1louo4fm)1Iaxw{vSzS+Kl9i znRZ8OSDV3-pT9+OIKXUR{fZ=!eyDg>Sy>saa3Dz2?Gif@`t@x^b^o8iOy2eNbvima zKd_AVDQx1i`f@@iBR5fmGmH_8GtP*9l&Iu<6y+BXsQ#sGAfjN;1sT^Jfn-LV=d6k& z6}z7t8XH;dNHCV22a}SIZzoX6=+!Hu z*Ky98(v&W}yuD|#hr1T7Ik&fyA%4YtNs0}s=Yug^%3fa%6tA zOn9(aN)aEvT>u3--_yCHF#WAt_Wd(as{U2;o51@$*(`Fw_j>_|s7wJnEVxhGW;o;7 zLr9Ol&DL0|)1C0s&={|_hiGbQf>x&Jk>Wb_l2Beb-ZjA9I;b?7$6WrWiF7w33yTdH z)kH>>?sVe6ZgY|tyNM7b@l^9qo03CbSH}$PG5qF9VTYBKuFuMImH53HGx;w^mPMUr zBR^w*y0=;sXwY>JW^S-l8CUsz{s)_4O{W%<^yPWpx=Lw!4K)YTWnNF$$_a&G)&mrl z=h3IKspgQR(x6In#`vyr&vxF?PgtGiaBd+C=hlgJy%uu>o|l(*L6%YuUJic-Vj#%R zkLQCYy&mk|#^*#d*Es`|9H6Y`9GStd8~i=_m48tvs3s8eO)wNDHAp!Sft}6o8Y-eT zD){7CZ?|cjmAb&d+^KS*Ex-?s%Pn_TC)@EfD2etdoSHK4BUpnmEi$dfFOSxBf7rpi zVCAZkQ?D=AdtwLY3JI~(9?-D9%2pUOU!VV-FH(3m^)!3kGjz+jz4w&8zLdGArzdRt zK2IX7T&pV3vz_h|6teoRUjI0yG>+8`SR#M4PG1RTV(_MaeHbFiXb&OH`r4ZECjqHT zalON*wD@sD(DV|;bnyuW6-}CF_G@jiyB}^Zo!4kWj83w;*u^q2i!}uCc8$->Q(b0q zoj6M3;1zU#x-s*jMez8?-R#YBi!%{qKmF9DP#ckzWyL-iog^nf5>4NQK=Ko`sq`g_ zj4F>KlkB#w!A!=j&gZKkC5;WP+q9*f?4cAnDXt{CtO)j877574#(5C?KA1!%b1t$$ zWyIbTcZ*yi;hR$T7l|BaviqYQwWH4)-d0Ti6}+FSmpi=1!VwZi3<}zu;6XwbJ$#4b zl6G`D!3&%AQ@kq5ho!I-@@4qWTsE|ml^h>!KV0qT1)(}HB2X3kDktIT#NyoDo(#9% z9!JTgtHrx#dYETo7oZIY6=D$3wmMr(ImJ3-D0g65)YpW;1}Uno$025cf7*5z6fok$Kgs4Dvpb( zj;^k&;mXwWx8-IIM#=*u;nC4%F!U!+)>&_}`8(JvX>z>c5+#CAuylUdk&MUQ4zO$A zem40t^^H&9Pofn;dJ&QZVF>q$(xBXjZ9XBPEJ^HmWmrPFj~a&@y^VIud?z$Qv46Zo zrN)+|nlCt<<6YJJE7}HUYBn=dgLnH2vu$kw_EQKDvL}Z#Ri+UspeH3c?TpY&ncj*_ zCgbBPXYsYo2|2Gx?qd%XnWda?ns%S=FJ@jfIWCLje~yX4Qt7qBC6mhJi*NTd+cd~M z#3F-MmdC@>cwC<{|Fyg-(NdPocER@+r7%khXB1lP_nx#I&Nhc_jdA?Y3kO{oPYn&v zj#>kgE_Dx7n|0P9^Q*)Q!+)A_RGv~m01les!Ae`uM2=Kc4zFYULb<)m!4gc^3*ye( zyc!HGayWgJIdfScmslAfflzLU!*Q3Fdn$y9?o@{*IKPuT*a|9u(p7^=q{J0r7zXon zf60C2s+P!RY9I5tlu4N%W`Y4gBv?}Ksh#If4-C0Mp-!lln1$C6$N&LoqDOVWx zVIE1|h;3uci6W+(nTlUe-hqm8IYLI#b00f6bQ9x-M8u~aAOcP+P(s6Ss0=_82}URI zz^5MmrdwD4!9$VJZdIbraoOT(H9Z!$`%_53V7Bm0d&rX{2}wb}dm#ev`5*SI+*!)+ zoYuRsoiI|kdXTXu_uGgL zB(*o_5+<7l-))|f5tDtdWQiA-T0ju8c-;jgZHd8FF3l0s<5_SxOBIBzs1xRMW2O03#ri?Y~y1W>_QJldS zUHnP1W#)CV`|jr4SSjNsNATg->0VlPSl)eIYzWmAJFMlggQzbXh-a1`sSlm1i<}9U zkUd?xeFNRU<%KWNML|-N-5NC2gr_jQKkEA{R)z$9g+FVq=P@Wp1q;$J%8iB;q&y`z zKjpQbn*b97;1gF_VXqXIiy0PwX*kQqn1vsP39D?G2bc$SJ%!bZ+H$_&59@~qEf=OLWCvizohgl&JifK%HB&#I(XSQa0Bu|2q zUXwIB(zC16NX~Y=7>lv`9QV@qYV(<5)K2#sGbNMFI2@U9XUPuG`9BhK2EHYXvFg>w zBnQDxwK7O% zfHs}fVg7l9PJwtDuVLe-KP<|kvcHU4fb)K3XD9rN3(r}Ua*ah^UOm_PKqWUpIB}Vk z-ph0a3vuy4rMaZUFyC6(@^Y(w&$Ae^qQaKRiH_3`#gwH(W>$&JMV1xQp9DfCKT|mE zA!%A<*}^(F9x@xL{yq$EOjHECRh%sT12Il;&zy1MupWPryf*ZK(y7qq6?KT&u>(QH zDX#rmO0FX@ensh+S)jcfQns6Oc=S*j9*S&j1YT<1FxqZ3Gp`&Nl8Ce8^A{3!TD z_L8bREuDr&v5bj9Z8qT19wbb5^r71c%1_-=$W)|Zn9ULlQkm5PiQU%g6 z;t3uJrunqvtZZonPY`Y45(_oHYI>jV8E4M+2B8wz0SdLy%c^SjXQ^3GB{-Oy%kA%6 zGJiLga&*T~6%~1uj#lDGF#vgL2nmt_wo_%sKU@_OP%qZDj?d2ijukzDN+X6NW(A7I zhuzRFD&-M6(C=_E97ZoMi#M6vQ?Kn{e{6TnbzZqxo=qVv=1dHm$+rGXFO;ve`12ij zAWG6sMT`9ya{h#nl=k=%aBFys4A5$EPPS1}6T0qhmcD_F(Lix^S@v3`^zIYltRHFQ8jhW`=HpPj}n*UkQ9~=5j zIIeLaO}cCrtHSsU0F0>lI-_#7)+1Wx&|KEsf`4{e@^uGg&Dcg^9ndgaR`#tk^@~#Re zr?*TrahuyF6Z3@lBXz5aph3kKkXmxDZ+n_dy^_q7SL6 zs!q^4jz6OBsg~&swH-YBxhhlC0{bZl0ODPL}-TsC72`*oHb@ukjpAP&<%O=91V3-T+jdcBH*%wCiDL zPb+$?(D6Cs%-=NzQM-e=40j>2SnT>@q-xNA<8>yIgK}XejB(H?lMv5y-_vVQe-K*P z#vWlu#%LL1qrMvSN4AVc=)3K-!^*FKPOp7zp-}40_4N*$&ULN;^kIlmd}3y*5G#ru zBKPffj-N%U5EC{pt3ub@cUw=4KKV@Ciq(!Vu)%&Rq_VRbZ5)731nNClBoaTKJY&aY z5X{JBC{yDJ(s66~pyt$-F5W4;hL5L6jdXWD@7UV|SP!}+{$B>_f)_j3u~9M~$$_2; zW68k#8}Cht4*E^>W?bT1`C_I%u}rArk|HjIjG^-S{P*OO58Lrv{QT(+g9MP#*a9Fv z3`u9!)A4G!r8Q&e1E+oz|@9638r#NW)s^O8X8I; ztaU}{efU8##%(!d^oAUnc0fh+t}{YUQd78`kSl}JBp3;mO4xUc+w?#`*8pDdy|De_ zwMG;X?89}MZ`jajcA}3?&-;TVxy7GdlV7R0?2B^}6Ag`WTVd1pF;rVmcec;edyBGP zls&}z6e#u$C#wm=M(I^bmr*O?u0u*PH4OCckL$S25qu5SReaaY5S?F9JB-O~W%($h zx~Un>n<*JcT2do^;>}58CTGCW6x(uF7LiU7!h9Y;=}ODw3h!c~oF&Wl#(2*%N>6m( zhX}nk0!uEbKwAuDipD{xz!XyG9*s$PHH42;-OSm>Hpt$bs82$koi&rw*CB_@M#4oieqVQi)K_3WLGXl@+7x`<@uGI;U0ftwXTwM<7#V*i~ZaNdsjT0?wjqW=X@h zI5;?#L#_v=s;n%%1b>KjYq@XuatTQXXg<|5iVX|^sGS~c1qPqM^W5SCgHM$jmocup z#gn-~X6+F9QAqWX;t&*G$>lghIg_t*>=!{h5Z}^$RkDRvUjwGLF~0-!n%>V!;qh0C z5M@!Pm0y5fZ?O5v=MIt=*#Zg3{E9JNMw{y-y6q$s$x>=XhmW8Cn^u(xD1T3gSdFmE z>&p$Ae*ywbACU*yaXn5nAa1h#`hkIG1X=Zu)f|>w$+WRfZO#gTWvhTQ!4OrL|0!fJ%S$t7CR^O^}UT$ny z6vyh>tsp4mlMkXCJL!97#M|1P4)P#GWA-PF`>dRffQ-OI6WBp30;~#! zz4T`2G@S)Xte6Xih5ZO4Uo@U?5vxotlnAZ4?=N_Qb}yt=GZ6uG7FA0E#Ai-&rGQEE zi3RB&ta-&&0BRiPYGFVbF>yaw0%nb!yhI*aAdskX-v`1mPL-;M!Q`3+mPMG;;074h z3Ut%`>XuOs6u?sFD(Z%q=fk2@1^k(^R|x z)zn@;7e^|A+vZC1Kn4^Lc1lD`_KZm*(*@09)qTTi=TLPxgXhCylc#*iM`mH~;?v*B zW6icMf2Ll5mlyKXfBnSrb#N%<=SD_7_FLJ0chdHqzcrgV)oC?~@a6!pmh-{kr^~l` ztApRyz%n}98)y}`6S!HPJNT0-MFZJ^yFgS`TXGf0R9`maxTz-*=&<#hO5+X>hb?RdM&|eL-yidnK0&v9 z_j>}pRjk2@)q>d-r$;<9Ffb5M3rScof8^R|+~gWi50ZYZU+#<+G`b&rj8n?uix=d3$7WOE2qvXGAy}y3mr@Uj~yqU}((GuxDTbTrG zv1}vcZhl9awRqGvlWZWVD9>6HS5ZE8B>XD5)rf1*+^mFIhPmNJVM0!k|tN8EMrlTroJK`EC9$i*emZJ4@%`&4=aV&K;wH@Y!p+Q!aH>{?6Tw4`}txy0py?W>f zQwGsn0TL-bAk>}f--Wtmed!~@yVto=IuHfw*c6a=%Upq9 zxb2xCL+$yaKx>QGQd?J79orViJmCZs{S9){>vzOsFgbzZkWIQHLWNbkN*?(l>7XPP zM2qmIdC4@c{9#@CEc_@mZ6uxmdo}-CLHB*Lf$wqSP5nP=6A3+^EoTiyWGTnkDbRW{^-cVquuu;ve7!-#$%fYh)(cad# zh7X+Uchlt;tsb!H`T3q@(U-dCac$Gf)7vcve+hi2w{CL&k~-x(|AKAZr^;O2H;oRj zqqJ|V|4IG8KZZ(;>*~0oh$NHZnoS&sLfDoibKFXh&!R~)*BL!bgUP9$&KM0gGgrod z_xh{Hot&%WVjn$$8HZJst6oOp!WM(b@9)YVbzb;Ka6VsY_N{%W*P#2$#-=`fC4t6; zvFhhVa?1EhB`t`NYo1Z>cphhrl%0VlG>!JXNnwUjswCd0359#2_vv2)uO!>JYBn2E zGlnN0TKKDm>#RV2&Jf^?5}AC=Q#uG? z#>k+>O>lc?8E(EQtyn6Bm8vD1E=9)I#p0AKpB$}*+2`BYTzkiRX`)1%@`u7#Pe4%E z!+M!SfnEkYlS~5s&X7FXFS5;ivs)X&xgd)6O?)_rjvN@ z9L`6?J?mgrDZpx{d?nioOeE)6Mgh9(4NP&8uW;>>tb-z7w#n7~Z%;P=c^YC~&LQCG z>b3gb{R%(?#tE=l0HPQlEs(*ZyE;3Zur;m9avmL=d(^UWl|Fv_m}5-5bnv94&`aeD zBZ+8BOJQMgD{5(ZvX1QI&xL6io~;mVuLQdwXVxAkcFon*Rb$G|3)(PCRXmN}@36?d z*cO6vp1C9k+?_>Wr3327fYC%Se#`maC*XM9*4AdF{*#C$2hzZWTFoNKI8%ZtHvBj@ z7cDgU;LjN-bwXn9f zRRDmS>-|Lgb1tYm8n&pgn{h6)s z=ziE5{RHJKf%56ocXBr2P*S@oG%4Wa~H$8i5`WZGisH4lb7cc=KbAtvm3o zBjPgxK-z)ZUW+qbJcTpZUR1PI^s7<`AwZ8QuFwI~NMj$qBnj&mO3MP`dj6v_zOGdm zxwVqxj=x8d-N%1pIMqa&{YG{eKzG)!RaCmms?0e_+1&GyhE&K!n!^OoV zKVCWrWN?l#X=#p9a%E&6fFb9?xx^BJQ`}S0dhZ2b4=O6^04zj zXan{(QNjD|A&PyTRvbi)wPY6|At5FLdvWbTjA)G|L>^1;7xf<9Dd_LnzV@DG$kVDx zLHGW4cwZQdh?7G67{x6L|C8m2H01&3)J8B=V*zl0i}^Znv{Ji-Ez@3H>Wd4mnG;vG&OZzygTgO zLeP%->>fym-7syViPLOiMoWJb!zK^BuQlXIkAodLIW#$`0n#xggbZw~YODoi(Td4- zB7xks5zJlk#c7=U<}BTOoA_$Q4H$Cq5)C1xq3(K0FgoIryAavtF-+@NunV(kjeEky zA`@P6sd&6BRz?{q29C6^#U68?VTg}f>0|7P3U6s?33wh~l>QTgI#{{Cy9tFJomM>l zHZtD~dCm<~nBke@*Z+i}RI9g^n!QWs=pBXs4Nhqr`^awZ?fEGDo0cL4Vm}#K=CCr$ zf37&|0(@ABFzgRRl$4ak|6Wzh%4!D?O5liZ59b#Y_`Ut_#eruCbmIHyZzcbExBQfl z_xZr=toC=gf3Ckt@frG`58gnl-31W%e>eVX1Y-K%#1_K3guws*Pz&qolKS8Kh5YVs z0Zjkj`{3;5?_5*6v;RqfMJ6C$Cp$f+zCcnX01B|C`v2az)A;Wg@r(ca8iUOL-^?WB z-*@HBfzTGXSOVP$gprZ)zpuL+S&bjGJ~+_-X9Sqi|NrmaWd7&rT_hcB2tt_T#eSv5 z&zhKNfLBFGqLEh+dtcgPfK7~s1~%H6dXi7z?)JgK1Auj4yOW)8*#f}VTgI)aO1QZm zSRdmE$0@WOms9yL@7PLW`zwcGx)wG*o*3xS{FUh{xG{o^*TKorOth#VKi^@g$rCJR zaP4(7aQmC4{(LH@@87+9dG7iP*y})>2r0U~{!`J-b!Z8DX`inxwAt!;0?}4Ijz~%( zw4fFt1VOXAq^+T=tL>Z|QNQwkZlYivXx~VOovfD~2(urqj?E<{J72WkCL|8iR-@XR zB*T>K)sk*Q(C>i6mSvj=#_HIaX6}^bNkT$`L2HP<0q5hW!Ggg@JdR$HIHvPGu*M_| z<7kcw-NHEn_&dNJqZ0Ni1Vg>6YOh8p#k^qlMM+Lh4(a^YuU|leLq$T$m9Zj-NRR-m1$On4>52_~%y<|Nctdo=cD*?K^sEdm>13 zxxUR*dsrx{x`4kmpOf6yJ|RXn70ofy*s6AJ+wm3`M_|@#n3>UHFEM+4jQr0KwJS;6 zw}){}LOko3r@!yM@T!Yw(Qk0s1br2N13{n5Ly(C3;Nuf*dJxpw`T*2%S~|Lzy9-HQ znbEnqjFi2_#*2Y;?(FRBHDUg+s48Glf>Er2f(*`M&_eGi7^%(_2h#MU+gJaNQ0tuJ zJHnf{Rs=D?nwSN+{|K`d-Mmfc_V(7G*~@&RmjuKp&@iI%s~)mBIzg2Iq83n@=Yf!9 zjTqzX>Cq8QN95DzP`eqY;|)1yyosLfZjiir2|CLH z2)QhE;AZy8O4V8e9oN{{I6)i+(g@~AvZC+zW{QI#!! zvvMK97_=TB+<-@42h&lc4#aZt%-$e=(1XD|B%{QU46ZQ|_3HQnpA&eJv{At9^j=m$ zNzMYx9z13}%pFus`AfrGB`vf$`ULusRj|HHiS5SGFcFiDg$12f0NxW_Tv*`1@yy%? z!~-m-B3c_UbIDA=`@*2{y<9M;X(yTh$i-^i-`@j$`7nkhI?Zy zU!JTFLlTDtLl0A{k* zlQ0kvsIr^o>f_W%!;pxkG&Z%ueg7Rm5uo^~Glw-bH>;AXsHpq^c{~nE9$8Jz-}y|^ zS%1UB(I)yjI)dyo+L(dVW2{RUL%@u6_tWd_3y6Gzv}hghcohygfXM#^q@D7cQj3R@ zp8eBq2px{~Gnp9uY9r*gf$6Y35(Av3eEFS_#Kc55J^_IYygX;H9G+lfFV$Ga-fmG; zkU{M{KtAK%4dfaM<>d*8#j+yuKZm=Lywugz?VnVwMc4T0w2I&>@mEYt>`kY6z54;> zZ@T7{Bp~h1%+L4BSo0*`h7-<%3JCId$?j=8d~@`l))r2-hq-eBEN5B)4-3HbX0=?p z9@IuM6IW2aU>aDTpfd-@_ z?IkPQ`$gj`2l1Ya2%SV`Sy@>x2?0R|^9*_fX1)*S?c~?DVM-i4gk8s;f2P<@-u4F2 zoS&RXe2Zgz&#yX`n2;cu$rPp^N_-PPJUvsi0YXSoEO|;m@QQ!D;op!sx9d}DuQrX- z=N&iZ@MWWpo(*iFu#2}eR=6IM)DDC6Lzi2U$^D>E;S}y7&d0QW>L;!V&{9abW~YK zk$rkCKIxHrfB%+>N8%HkOvG>n1qH>>6EIK33+)ft~>tV=*5_@GRrRN*6!n`l` zlMkT6p2wZHVyl1<#Zm}%qnP$ZY!7`ZV0f$4J6RMD^q&dw0HECd+U_meVE=b%-%dil z6wI`WXM!ROgrQR4Pv~fC+s{@bi#=|hYFe2hikSfbocJX#=s$ro1K8wzubw6Z?yrzX zKbwz_k3YU~2b8}vj#vbrfPjF4oZN}ahTrqp%)_I8R|xSqI5^lTW%F6KzcCgj=7!`) zc?|mwJ6!6yXtMNW#;EY{Ty{}W(I3_*5c>Hng=h6ygqyp&4c-?HKWji>#?vseb7bUo zlMPs(Nz$-d?(cjIZ$Sf3@(G(CnNdp;qF(;K3xZ~TAy9Z)ahxMYgIQ&F+fhzz7!$D^ zq}SrdbE8zuEx^Uq`QowU;9XToY>l6B6-#ux{TNi@Dp7#CzS~llHP*$KTTN0_8JN*w zcxD`@kx95&5zN$+(dkMZAEWQU4p!S$kk2nRxe+=OL)N53<=w=*h zMo{BCV{8%={`8Jx8=+_mAI4>K#$HKAiy37~_A=pSF_8Et|B_XT;>Y=JmK^5B-1%m; zHBXIBro6qc)~GG81yF?jMeo^abI|nw&3xz)y&tWyRJr1^di{E&$@Ap;bhpN0ko3ii z7yJs~!ym!U%Qu-x3k)Da2=qa~@IekisXv9yeQ(B?ypo!o-2oKfM?eOC3j&L=RHDkX z<8~)ogCI3YUA3A}uvcp}dO62<`S-h-TT zHwuXKJ#QVemDAGF>IlVZ9n&KeI|o*TCK z025xbOsh>Y89%Kq6Kc<*@r95dHdQE>7`>X5LM@@zzx;52QDxdgipqL;adEKN$g9LK z+FP$sC#gX zfT=$ei%gbYU>Nx9Adg!3_M6Ukkms_Ws|8lTP@Q924rtV88!!T9Gq7vHJ9~yde|FjI z1F*wFI8Gw4qN1XyRDvxH*T96l(m!3)=hBJm6_^Mw&~!`H8RaD$n9`?#ko)>${7sPc zXg=~#@L%J|Ekmv1bq5Cri-x8TH}CJR&#axm)hqNGXd@zzX~5{qmjh<8!Je-KMwq}* zOb-Q%)Qp@PV6n%5V(lw4h61Sb8o-4rApX5ORs=G5Lus6dc{Gf3Z)z-*PD*^O)Im@@ zjtpB>0W>(ahZQ|HHy(cekb?fS~8h<*^JkU!7VWfoXCHahp2@ zQotHUir*B{OY4cxc<25}aWtQxd3=THft&8hA1MSi8{gY2U;X}C@tE9IWON2Q$ikil z%w{^5Iog*5Dj>Ja)j1BUmNIzTCkO$w%llT|bO)j2;Uwol55%>YS!n>)EF!ri;gZQL zt#aEP1H@^A$#x91fJ`21wR}l*FG(-3HnFKhSS>mRzdNnAgRxTNU0;Mz|jAAW)WeA4Y8?=r`ajXdd^T4s4DA-?@uJOjY8Lrw)O z@-4rb;jbMM6QZB4RrTHJ*kX|ey+0v zw+Er+|s5f!!DdHO2wnbf*q3-uq2IVZ43jNQoUOASK#Ne5OG$ zWnsojnX9!NrmUHF7IY#qcUc2&mmCOo6xpctD#FqT`lqAB>YWo~#__RIq-Rll%?-n3znb`!gtF z`#{S9>!Xl!Ed=Zuy4ZX(i56S+-&E9>PWC_D53-}8`VpmIZ*TAJ8aN+IeS4YG%oupj zTi^kE#cC`xc_tRrV}E%AjufnRgqcFEB&F@ek-2QfLH_{vqLh9)1zy)ic|^~Qs+Vyz z5;I$p!QFtn4ZJPa!`p4M1H~r9@eV9rFx!t?YkLL|9kY;{4dJ|p`-6v+idxs$iEp~8 zgl1?8HC0usDS*~&?|;_$&Juw(b-FvQou!pt{|$5!dD`XzEWmWjGys{hUa05Xl6eN` zM7-6tYbvlo+L=d-fn#bm0ZHNX`suPMe;eB}oXH#ew0Gi=7oaWUH*(}JZQlI!`nx!AqO>F#>9z(5PiI4k&LN@f#FxtC8Hc{l!LA z_*!d_7a1t>JlRTSR)>Vmnc3UxgSGG2diMi-)_|7Uz#I?2TPaBNnC@aLL~6PwgSM&kaS42#N`@O@%G{XH2K63h^s6)ayH!NQRYnoHj>#XBsaGB}v_{ZL!K*+H0O(cQ_Y#DzGH84efy5&u9R(dF2E;|qax#94 zh8NV2u3%Y3MMb-*ve_FO0$zPk>AT{rW~zZ-_QD`qv$_gw4G^hPi*KSTX3~y-6fPRh z7mLeknW?Ga^72T3iWPVcJ{e$eO})OlB6;^bhxm(<{JzN)BwFnLmba}AynP16Mtlv} z-)W9~o#5WNCm}8X?fYxX>_K$h+)e=yVOj;qMS|k`;=u7s&m|%fA)iSn+WUxO00-iA zTJFwue@JP9xqMKzUn6WX0}6Lac?xz7bQGlq3jeq4bsj>*XPgWsN2RXLPHKZOL%lE| z`my$lF$np`%#ZIJ0Fc+BW&~hhqB;buMNDNMpQblo{_`-3e6CxHOE!shb#*~Oi0;fZ zK~vilm{fG_^-cw(@1C)r()GIMKSBbM?-7KarsySYI4Nwp(k6Cxdm!e)Wuxvqp3_Lq zV>JR`i=CYvkR*g{CYYLnJAuOf6Ku%iBF8vUck3w#Q7D*36Z*8lXNEp)+VuEquhZRq zWi6*5;^ofNh}zb`$5aEVhFs62POX*m<)QIDL`QsnV_p^T)08Yf@l0|G3b|RZH9-ev z${EK2#A8P~8^jOW9RRl2eP+-7w3sP9v30J~ZIgx(=X(U%ua1rmAYJUMlC&`#ZT3r! z`yCFk0aWzN*}1A%V`O$V{iv^x0}Z}-Sq(=nH9+6>ryY=ILeq_c^p$z4QBY7&Q4_7w zX?qWTSt>FzWRAI@g>d&G0Y`M+-`^jw*Kzd>uahmMc7mXRAMs}d(vRRTj=uA=-E6gm zJ;J^u(S7T~-2rGbNh;OhD_}h;mnd;t4B*<+HYcE;Dntj5y+(Qidt<<22f$zQxKyS; zKGQ?%{hwB_tZ5Cz%Oo=S@a!`L-hDBv38prhg3vZ@E|aLB@`J>95O=_>J{)%^K{Uo$ z-X>5_Dm1>P_{e3+1CO5F&<V19j2-qc1QSJi}1DCf24D7*bfdH}3T zV%NV0b>M||^#)jgiVV#1DH|2gRWc#@%?2oFm^9ZH%j@fFQx&>BbjUdD7WIrE&LP(X zH@lhq7m%z(g92$Rb#}T;JJ-*kr#JPnJL!HT6FgV-xaL-trQle2_i`@OW)Cfs6l>Nx&u0WL~!ynX>`wEw~>z1vw%g z=4817=x68W!D+2ztM+lSE;T;Hb_BJ*=A_kv9p2vF3Y@yyc82M^l<&{>+t3r4=+E7_q+s8QfXLBIx2sy-y zHyQkNv#v7f0*&&nHHmtbm4+I(;`8Yv0{Z3VXF87WqWSrCKvr+um7pTRpAkT`07@6j zEShaHc?%HqmTF8vLd-j~qiaC*0!Z_%5_;{WoGi+~Q9=5L`c!q6x8;f$G*KoDnVq_J z3GLR19ISxk0a?}wYOhI1UP&m9<>jKNIqrIK})4*d&b~JLE5@oKfEzkGvnphX0 zF3x0;57)VZASO>U5TD4<04gk!%)*oS1bo>hz~oce_33rAS?~m;SgD%rswsId56B)F+COX}HWlQUFb93*KR>O#98o-@na(`QAojg3}he0QRjW z*Yql4FuDjdW~I#qs-RCo7~DOsxCjI_IW{2a^Qb8~ny4xO{z5Wi9`Z{Z zpcpaeRn+`0bqNS(y~L+NBV=Xi4#12{M6CqZtI%&uVKOUh3HiO#1uEpu5KzQZL8Y8` zqFAqt02(upl=^7^YnP)xCKqrE-=Yxp&C-&@_)0h@!_NfaEjB}>qM|~eBkEOWs!B3$ z04)p%+tD4sfV=vtv@oZ*CFEDP3l=tBEM;?e)Svkh92_$?-5=zaL}m!{EAUUAwdr^` zm4Y1wI6mi7Y;Zcs6Pz?n_y)wF`hE}(ts)sH00-;H5zO)dK2Ceh5w$s9a{ji0OD&xg zv5qrrBgTz3P!`?2x}xHR#vz}S0$MzhAhiA@0#a5Xi6kxo>aG=iKoC=?Y@P!eZlfAr zgyaCwX2&rDb)@a{4Z}(EFnDPZn+rCRRH(PmF|Ft8o!7I4y?YgTj8lKf^o2Zm#uP9n zYdm5Egn_X}AeG?}(b3X+AZ%S7_r}vDDFz^^i*x72RZ8_2VdY>0K`Nm!yoy=A?Qwy7 z0WnyF`&`6-?>lU6PC$s2_5AAO{_c8}h!0~Z0H5ZS6|P7yim@nQrLZrlw-)kj9Qs6_ zY&`AR@5v7I*O36|*4a*DtA5t5u>iHJGKf)C_3hpsdCe3gDI6cbsjxE8$QWp8+oz{5 z0OQ}01+p8XVw(S3aHJP-OU8VW$9x|K5)&5}exk(0A^jesMh2zG1}pi;(0DNS(hAy~ zwgf@``J*TRZ%KyX7kNl2Ty6bea2kd50T}r^}2iv17CJu)X9Hqsuo~gAaPzHM>h!PT) z4W^5lul4Tw>!)vQ_@+OI6vUO5?XR~o9fz`o=Ygh17`B;cToegL3kwheptA6(OWT{& zSN#Ok(3Boipc@Jb1SswKZl@oA@_iUcd+aNP>Hs#m0x9bTAX%_?Ew7F@Pf2+n)9-)V zx_8jHB&#gi#7U0$Z|#5>a~cJ$5d`Q-#{(>ahI84CzU1eFbHR+G_yRBe?tM<9EYzPl zfJtK~1!^)OkTM>vOCS6>x8sS@xRn)4PEIXkgtmlOw(r*Cq0^vxba!@gU;xy6n)8;M z9zst)a)pSBz0mBPYDdpyc64;a>fMWlFRiMS!NaUxjJXwDA}Q=^=Y8dJK6iRHZAeEY zi}^#6hEE=7k@j|Wk6gxXh9mK1(KJL^ukk%wyE||MFpGiC0V<9}XzvdInH?Puh}d+D zRMTFA-aTfmuBA2ec$Dd8zcJ&bEijZ4rf7KqU0GwDx&*4hqgfB=86UwUjW8&o?tt5) zqpx-XZ$Hrw&?&nDH><=?pD2JgLugW}l%)Zf!2-w%d!ea^U_1p>ORB`j$A^m|M*LqV zbPF7uAz)NN5%vkcpcasdBC;RJg-=lj6vHh5d%OtHkIq$#D_9l>Z{z@d%WpBc1;O>92Uo8i>J~qB7$CbD7HmDLc9gNAi#=O4^ankjAol%K2>CC%Qk+g>r>6N&f@hx0LAn zjE@7}aVSl~vn|v0?;U-G z6%W# ziA{!I*VdTaS}r(o%D>E1w8~Zs$FfME-OhH%9WdH!HnYnG0z*D&N#f=Lqir6BM+CGg zQZ-UWATyDYbZ*~s<9xy@YpeGZ!A>GIb6vV63v^2M{t}Hrf0c!4@7S8;+hihSRzLo% zwkGp;iD~HCBuxEg;t3YkD7|`Qx!A4u;K&PpDs3t{D+=;wGzL0S_d<6I`vZ+OGg~uD zTYi7^^1A5G)4g9BeNef4R~W@V0|Wr83Zzn7Pp>U#L7`+l^I6#{zeMORZZN*TP}k6? zhUoDLzY>U1cer>BFfrO8BJk#`eZ4VoCP$O?MdnM5v|@{=tC@c{GqorND{MPrEW*2AjueSsbEJO`Zz$&9TR8!mk!HqKuq)piI2 zsy_6r3V4+FsP|+O$=<`BQ^E2K!wzJz_kgq@bReoa%RP#p<#mmxZ7ywL;h85A)os`N zxf6-b6SQM0X(_b%d*+QgQ6i6A`sh8=$*^i>ZtmHgB4rEfhl1BkCvYPf?{s&QO)4d)5N+L`ZCyIfPe8q$8`24~#fIJM?l$?x^6XXaH>P20FR zZ`q}Q{`JSVjsH%~ehr;=@js}zIg>8tA43_yF1yFOtG8eMrKO@wJhSkb)l+HtG4X5P zzYvI&9gnc3!k^EFgs!WPkBxEa-v0*l1Bg@#Q<#ilC(003V(<`s)V6sutgs^U3XsIj z>1<;1^`#?mL|pMU+Ra|i7?r4=E*3Wy+p=3w7; zn<0{91LF`tKtMvGXKO3NDDAx>n0v%(5(7A$fuf_wt*WT76>dMPfyND(qOS3WB5>xf zG0tO4Emn5Ded`0lrZtrAVIP^Ywj#KfTH{J5L$y*sy>oP2jyOty1E38y;(HYNPz`tZRLi5v>*0pcai?^GDY@c1; zXZp*sLij^LAm>%B$zhF+F|J>q6K7sh9kRWU{4L+Ky+Pv#@0S&xJF8*|z`STv=0}OV za-d?P6|bUYnT`CU=)x|?a6-6zgYU|X{)%(Wq}khxmFO1th&c^-jATE@(d zkonw@;)W_XA%A-M>qhBS)p@$9=b8F>PM(yasyLq8lV0GM!t{WwhgtH%8R`V#Ii3Cd zcclt2)-o8MvZD#daH}tA)e4HI5~jaV^zCq-P_KM+DwWy!-jh+L);V=gDv9e~7M> zahWDAS#Qnc5DZHqBXxPsGwmEk>E6Yyu<&V`iGlqo7CLHhMfJe(UMe?%1wN(q^j>HH zh`e4LxpuaaMyR*YBu?#P$BuQ~JW408uy6ePk(c}1z&-hq1a&qy^TYF8^<|Wx85#I{=$U|FNefNfKxebJFdU@{-?^#qRdg*b$8=8 z4Y#i9J#q~ZK6ZY3tf5G=Z`^PP!`+U+-?gi8rl%UW_6O8PU6EUSIA3suHIc3UB?z`tsK629AyIyjQ+HnNF8J;_b=%*ZS?f zKWzkxYQ>LQjn_ZyZ#c5C&gnH3ekp3vR?cG7iRq zl)-6KGqiRxttJzI>X+%y+?xvnA748SJ%aLKFXR*L>BCJyqCv}UNW1CH{d%QoeS-&c zC$Sl`q4xujN(?eNtU}Mq8cL8dvvYVX#1qY{DA6>bC?~qGUSRxvJ;y3FTKSXssX;iJ(Zmh45HYb~&Z_wxfg~mBOw@mWef5XntkL7e`tkzu{ ze_8CG?nr+7@b4eOWWRrEz8d^mHGA~@snw#1$!njamk%EK`JMmIhn`82pqvx?+7>#F z?B*Q5;6Jw*lF_)lZ`RW7^w%3XjT!ErhpN&wA9vsT_UXOLQ%P6y=hZ8Vmh0{hrjNhq zpH(&N`1H=j@}(YP4s<|p zH~OF!sj-tqRv$(X4y$jwO}&k+t$ecAjhi>aInW}nZLGEC8{Cu28eQ)qLaO8=PE5*F zH~G66?lN$bGCyid;8%{SA%mJJ{Y7P)f9E+D7hM7C4QwG$De_R%*DaX%`u;$pEG4wd z`kbDj>;gtTN_K%u7#DK)a=J~$hKBBtfBg8dSa8_hFQ-%eQrEq7I@70o_PwMw_x&64 za%In(2S?9)uYbCelJ3j@Q`%vusqWjGj=B=XUj+$Pye5k?Llqm-S9d6~^%0&`9r*b5 z^Y9TmMxN8^?gu=dbf=dJXN6lI;r(*KyOH*A)wj1tgAN$~)xW@*>Ha|BQKtWu6=juk zK7WH|70w@^vbuV3?qOH+#n{JX%0r#gtM95_G_d#%-s=49m^n&wMY1;D@hsq)`I$O` zXW`sq!uZpRfC`Up)Yl8N@IKHP>b`^elCJWEO0+&(Etn#E+o+nZ77lXdG~n26PlF%f zF`!8B9v4t5)qNM|^Qcq%nn}2??6u#%fmRctK|ydRM{^wZ(zba#Mn<_i; zj4@_6L&xwO{qdXmG{sCD91&+B)J>2Kq52?;=1b^uTxhtCfah&Z<=oJ)&`X9|YHDO} zp7Z0JpW=~E9cI3>ta`YD5bip_HrhoYAKq@#Z75R`Z^irPGxM`SnR8!XSZy4jK4bd4 zu(@2*MZS_?bCLb_UH$s8mpjkYuB^m}yyw<=dg?5F^^#ZRpV&~_eOKO$vpqd3CjV{B z;6S`pQS`9MZ}&UoANIY^t@n&vb3&P~x^T#6XyZY=ar~KI-upfqjuS?==I5VC@?R4P z?R~%Q>o{@!gYdgT@3k*qSUx@b^Y&`)hQFl35BrZkj|`5Me6C|KRqi5Sp9b{I~V{vY&e>V^wop}yTCl!r2S~;w>ex#Njn;> zLM+shmjLHmLc7n+!lJ>$v)OrFHv#d&^o7s#=Ihh1N>>(I{pGNX-l4!Y(DlS;{MY_Kzk5F;gCbi_CS5ME94j>UpRmmM z^YgpEBx%pcPv4EMJ&rqe#1t>TUKp+5Tn$-Xcq=8Bq@9)|s9j^YFVlU0ecf-yw4WJ| zXA%<$B5vi8Pe0PHT~xnao5F7Sdf>_N%pI!!J7_YPYKJ9$jt+i3ct_!rKJC2?QK|R} zu6uusMk=16GG9DK<%Yf~`C+Igb|vHu$>QdEVOiVBc9H!0puJOyXhuPoh#B{VF~^EM zFle-R^A?x=zP4mSk$If}iLJ1ZQ1GA}>n9{T2%AK6A36N(Z3ii749_vWTR!KRNOneL z)HhE|C{7yx4D=ue?jd}D-fa}Ryo!p7-;7*_DbYWE`~VXrB66!kLDx+n3`HnL!S!nd z9m7wE7%oq>QO!O6eN?Z7;}c1{s<*(H-%#Vj+`~NLW%;g^RA&S@3n};a>ZF}B>g+A& zIaqjwkUweoBD!M{Ha&e*f1j!)O;uPhm--L>pH z{mc88{P&Y8M)js`Z@Pbui_BgXr609hy1EVJ(B~UIw!-pzVF7UjXkqlpojl6L=)+%x z?@50G>vCynY1rO0=gE&DG~IsEt)cf6{BB%h;O-Y;Wo3OqyKC3nonDhZ!K+sT z`tw@ze5&Q`D*3j*>fCoQ``{pj_RF*Mc^J9}<`ni?bwMI7e1K0D{WQ0*0GFrL7}_&e zjkd^$2o>X*oAN3$_u4KWb`yAGt)-{yw-NTV<02n_q^lFtO0oj0gau!W;VK4vU*R_B zYHduovSVS!FLNu<5AHxXo5_rLub98vDAT3<rIl=V&ElNb(owzD_>pFM3Y1 zt8Hiys~Z~83ob7E0=Ff*lCeUGY5@Hs7B1&u>bJ z5vPRVUWlATaA<*AY>8!F-P07ha8NlqOuOurF9v6 zb_<(I*F$g}{sA8T=>_01#IT%etMm(EOp)0FH+U@7?QD~Oa|ws7h(~mlU7OTqR+mvr z%fFF5+_%pA)c3i+&jzpAjKNcijWc5!R(CFlHyB)VTdQ+x{pEJ8-nbyqzv_`Ctq8?S z>Z|N?n^Tsojo0jtp0|j3c2^Xp1Ba2Es)?FA_jZ?mHSPYCd2ifxW;}1}&zrZI55Dgc zo4sWGW!FUQopGj1v1d1G{Kx<7*zHqdg!=AvuS&91cc36JbM1EGsWjd%MN=d97seyL zeW_|0-0Sz|z@p_rg%t+P-Lo0M_bM-qRUauX9!6Hk+C%*`9kS;AzQe18=3AMWyqsit zfEM-c5}{OTa(+?z+hMGz*)RYuBi*XneLNzD@9-RxSjWgF%jS+<98OoZcYSHv`ctEu zH!2iuUV4tiI%J0&wH3IKI~<|=`5vCzw2X^eConvz!xV!}=Db&IJ?4J+*udUh16sxG z8p4~iYRWoHQ9?{}wc=~K5%H@3jGLvupjBJ**-kcf;21L#(@h12W~y1VGVgw^3cKq? z(%1>oJ(S@eLBl#nufl|5M11!S8xRI^d`sNhzM;Ur12iN))b> z?i!h67E4uay5;xQM32K#WRHMq^}zQhHfJ*%uDtjuxL8(VRrCC*RYWy{K;QM%jD5%p z+{>E0KINVsI$dFPul|b87cIYx-yhLK7D~lzt&pTgs>^rOzK?47^Xt>AYe5&&(|`fV zbC;~fY&0-Vd;DD7ba@#_9l)L#Yj#!~Se#3y!!;pGS@Z%qYN% zIm>*_O@Mp+!=1EiZ;Db8=s6o6aaPHupKsM=MCBLWh|B5Xcb{6$KX&!X!}AFxyf58WuiY6S-PzB;(~=}{w%a_4@3=G2zIo;7 zsyCh1=Os;H0^3yuNgA7J=MnA7Xf^3IH7)+cmk9#5?*TM@NPi`Gr+~E_FQGl<=g*(3 zI_f`|l0V`dqOZx-dqrK6t;8`sJNx|N3@jWcR7azl1{ep?;$K}~FqAeH^ovRolmD+l z@d$ULbp7?ugzWmp! z(>Th^$rA_OM6@TCqjxQo0{(j@jFJJ!(U4EdQ?59JjmVm9ncVS~l z>L}H37Kwxhb^vzj`+aHJZ>{HED;sa!UZ{FC_A!M0wYNTbP(Rzv!(-qhxd#=uyD{+Z zu}5u-@HsGt@x-O7pQYYdS+VwMk7AG7ZmG^G8mi#L^i$4xP)I0>=_w(x>lSiO&!VJ8 zWJBwJDh+Oy6LIygMG)0FAfjLkL>7pY`biM*Re1GyrGgs3s@qj&Oq)Va@cJF;e)A?t zgh$>BNr?JhUdxtDW}SdMI1jpuTiwZ?S*i*bS?OK`w;=LxiF(z22s}7F>w4s)6}AA% z3#y*|B6mFzjaiMZhlhpbmO)>pVx|TK8ChxMc0_)V_GNQX1gnPeoooxg{-=Mh0oWcH z)-Rx*lwQqtdvw^Z1%*pHt?l#DB~@ph5BKfkQaGKR*PZ?rn(` zktOJ8+!}>i=kJf(e-~aA4B<&@t3f*C4aj>3yNY02;dR>S;pK6&xOxEzz__aV9(jP# zuL2vdY@Xlx!#(x{)=8;-ZYs)7jN}q$s%bb?%?GuqG*>t^xcp87NdU>YnB35C)Zk{} zSxIX*x6ca;S_S~)p~2!;%GQU5p06>0_MK6h)Bd9^P5C>kMr$t>T1=x!j!Vt+l4xLY zo3b!yp2sms0AmI{NI%cPhg_IS{_(Ln<+m_7V4^SIxwLv33XHB+{_3uFLa6V9VCvm_6UB_@GXMUbM}U() z=ki3|ll?AkD#s)lO(-18D=KzUQSqleh%1er@uci(^#YM{80;WCBDJM>AP^$_Oi{WD zs=-iVAP2jeEhB$y+XlQRQjqQVvsnHTtXBQWsS=O+;D{95VYMaJ&W4d`Sb zmN++!+;`2ZTi>5FdM2t)1g!O)5|Jaz4BV0*iC`8J7!jR;NGd@^%kGIufsq_jbr~LL zr66A12@x<@uEV9zBU!=1UxqF@pUUO2{LQ+$Uoa?XPn6pecieu*b?s!u8%<)l9${Xk z5>bv=J9wrx^x#=*w1#(+LZmC)-5i0Z8=^QM)bvDj9=tRP_~dCLu`5sTIzj6IWx0x! zV0>zo$8rokxdNLmndw?okM!mLTTs4CxE)5{bI)Z6Q1b%G=qq5ze}BLHTVzrYUw_F2 zGH*QWvNPjq;F};|>~TSPgCENxOND$_Tqtu_d$l~LpJrpG#SJc?%_Yg0ISRJ~%jy1Lpy_1c&LhmyelM8%8qb8{l$ zItKqC7@-P+zXjHS*-f7`?C;xzOJCl64uqWK&!3G6VkExR)o-tTCa#{U_w^jP#e3~X zmRdNY(AFobzYt7QhDNaL@BV(sD)4MC*_Ael5uGG)?OPCs-ObkeJ2tV^zR&HeY{Q>~ zXu^lXT;;(m93Afk{Iup@|0d9J=4uI)#8bw*zi{Y|uXRb4sEZGx?YcS5E%j&TahPK@ zH8uSl_hEukh*y@(%qNPx;rDFO-#X9q8r;>;mY zimzU5QovXpEL29qW%C5D-t>_P|MoGcuLUyFhZ$ppM|wj$tw4-}>r1O5l3$(C12=9& z1oWK$*Z!7*UKJ*}nr!mM5pu5o{OV^e2{&)5;@zVl;n*9A{hK2&N!$MBSL|zZ;2G}4 z#lVhnqHAg%WBCi~L8JdhF_d>@B>_+k!uK1Jc3dS5VQ`IjaaQi{zOJvYd-!Z@TPyrc znKTyrntz1wV zH-X}fs}{gEG(Pj&KKp%f?8&K@_fUsCFJ3fe*pvnEM`V$iSCNK73<3gqw0YZfjvGXm zorT$v=!iSVY5wQSF$vE|6A6jAQ^=)xSQO~%g2Y9wyvlh5r5p{g2xfS zGHYlA{{0#8D%tw@d{@6t1`X^{?^5i~Yid&Z=Y#!2{?2ef^G@{1LWO7OMf>k3h6^Wq zh6Be2*q?X3kP@{|w8DtK85|xK78ViFA`?ZQs*7@^Qyh1DRLwakCTnm9ql(vPG%KzkpN9Z*hB@!T1J zA09UkBcnROJn&F56Zr_kp^bsYU?|bh{j}Yx zME_khJ_jOdZCkbQW(>voq(ehOHZlIDM(5HIyECuoM$0tOw(;={|CA#`|NNyvMqb`P zXs-|lX8U(L_HClYbjjO1xLP5CzFG+XvamnAgn$10iO%@npMlZ2<#GPRdHk9#p2|gV zs_id`&ScT28qb`V)C-6$gdN=rZ>$R2`R)H1(t#r>D^2{fXj1YC50v5Bq5QYv>zSkt z{vThn$RmAcd=lz^*=cg7*Lkw|d;fqKr-*`EEiJxLj$h8<;2?B#Y;NZF5!%|@8Ix!8 zh2w*qotMrur9)!AXMywA1%4TIkU=UsFDi%ARS%dIrhJBI54%bHbfWeZj0}tHE-!i9 zxt0$gI{;4S`>g!@{9aUp3@j||@$F6JpK+gs`$<;A%}-(`qltew5|}Ws+_-+;nE!gD zmZ;F6{dvw*l`TEi0mbNqgdyakP{y=xohhYfgc7)i%l2(^vo$(PqG;g~_7V1lnpp2z zgt_u7%f@RBI3jb+yigH<0{i*-vH!YYeGTfPq(RZkIN)3%krk1ZeI@t%o`*Z$DgJS< z*FkJP?L~243ByOodrmB80|T=MSv1mfMiXd1G%(B zbm5|L=oP+oLj-RT+KcEMe70%P%jJ-j=7xGfM(eh>X%ds1oH5R88KPdAnDL1h%C&p< zZca|!qD%!pY5Bix{t6gziI)hV=_vcl;&5zh{n@BmVd)c#&3QInEeO=|^io^Ca{Nkd zHmr08D46<8?7_^=5REj1I^k8S+&FK{qZ|t-#a$?0T>P}O!r)TQo0^=AWp!a>C9eBl z>T%CGZ+_U@BLP0XJYye1fVa{vJS#BFX(x^u!p7Vj>*GEXrqF~A@Yy3X)R!?b$Zp#W zFZf%`O1E#{PDRX12k||ZY<2A^gj#~3i-PK_0e`-|C7zNdX&|bPUS2X=%N3~ozA&(T z!-g}uHS=84b&_;gb~L8Y&_GaT3jG24F1`RSL$oF15PSjbOg>lYCijY0xq^|S(6ms)0K%8k2DR+V%)#L#S)$z*<#trz%qm~*65JvN`5nXV z+kIbIfzGNAAF=&5uN4dlm^V&;JkXF+01XOPLccqc$PFDcucYG zh;DvtFIix?x-U@pe=CsSm4$|VrjNc^>q$Zz|6JoaC=^(jOI*iG*( z6-713h-^uD$YS?%c~`j8j%DHqNBz+M%9Sg=zOl4)VKFgzve}%Wv2lpVdb?K(ry4Z@FBq2K5s9end5{G!T^>=Dqg*j|9Z7J2D%&k+M``~okA z<8w!_LFTc(-RZ}!9%cv6$|gJ@^3+Ilmm>o17W%WckH#(U7pC}%9cVHN^ben-+#$Aw zVt3mbaLG!SG7sRQ?`(DY_c`|chut3Lu)&x!#@Zx*Cyl`d~%KBFe}^H5ZPXd`-{ zI3wR-b3Y}cWRDq!=)aoXOlpsT*qLhaDfJ#qTw1(PU+i_8TgQkb<3xj?ISbd zGHg5&H$?jn-Xa|nBwos+cFQRcYPixvevy$~;uqYd&akr30g9ehyngD9hPGBq<}i@4P~ zz{Alli&<}vk+7HE2Q1sxu@subn`scK7#<_oD>$b(F>%}Fhf_sS#AvxZw~!izwQ1UI zaWrq{;Q!fsL@G(WZ4a9Uq2`aFsKBrQP^7k< z;1~9oS!+{GFO^?>O~}jrq_{;5z3#cbdvcxvoU-Ba#Qgz896|WdpBc4H!S*y5BNOMh zG+c&6_(@S!LoC7u5mAL4!oUc>>Mi7kbC#%hmu3Ud$T`S(F774<_MTsdm27dygw9A+ z$F~@*U}gdic-KvuxbrcPxytCk8lu6imWGx88a7Hj7x2gnozMU}6IzKN?15)LNXKm5 zB=2loaH4wHQ+EqKxy|LeFTGa7*&YUBn6b8p)LJX%M{()wxM}ssM64nSKRRsmc}0+f zZJ~F>^KUpEMj8VZ_3x;zQ%S`LN+w6zkd8E z^);@7?bkE`4S3APi7F>1sR)|fX<@B<0mts_c49gfOme~tM=Bbi(nBn#7f+*6nK`s5 z{W=eF%Zj}TL6-$&otT)su-I`VIEofMerzakIC7AftFX`Qkzo$S-kbXk$s-%;J5+;^ zTUeH}{cBWC$8Ure?>1tp|?@9YU18v$-&*wKK^+%{VQtB9AB#-wgGQVD0fm8qR8 zmQXvdVvC?HvM4Hf_LKTZZh=>rpL#S6$Jmd4q;fiib4~p`S!`iW6JFMxuiqB@cP(&> zuGQen{m0>$@Em{E`RcsS8cn2tk(uxQXrg8qA$8*HHt!iI0HC@l>JWD>>er$uJW_ZK zHhe8AUDm8_h%fZ5n+4B(;B`t^*hRluV;99E&3{2K=m9~hx+r7riP13Zk|LB|;f6a- zt7ktTcnUBIjxsYcdI2jKR8N!KT|t23_%4glrSn;-WljUx01XEWM2yhH5ZvE|8BKDL zSv}H7>-|DN$E1IE@8o&(1TC%$a^nxV{BpvArq)TeQ%p*sQk-kf>w`Fp7Pz9&3!zMB zqp+tL-dt`i6!^F5YHECDz|XB!jSTK7Y!XA-)Q6v8MZ&WHtDGxDNW`lQ&=-$41~x7( znUr&|REFOQH?VG1k6@Pf|6ar;;5pS6Zr`0~9gsqSl4V)p5RJX?WY4`l7dV2P5`6c3 zLr^-$S}sC|aTq2XYN)y2DJr&_Oh`+cWHH#^QpuKMGe}M?4jAUJo6UQoqSy1>Hho9Y z&71#eu(v%)IB#sJ6l+sp+rJ>z()=fe>MSnTXtuj5z%g}{ZMz{&MtsSoglHG#*s1K& zM4P?AVQ`rud84+bW|9oAJ+bR4*)f($?=OU|BlMVe4=U_4QcA7Z2+ zJHntY6aQYtcEJ!b;}gfVvwU#wXZa!EA&N@V`7%zI8VN3YGrT0JRUm&{QZ{6)VI)@I zt!F(BpCWNPk8@#>QZ!qewWge%HU|tp*tq199iAuAxy$Y3+(k>P9uM^LAX@uf10w*( zi_u_u8(lHG&@Xa6ZX7-LYnY0uS_#RvFe#=8b6aom1rQAiA8YPL1)vU!og}+^4A*HS z<9xNZ%)$jlbnV8ozs|#?aVStYeV4SH>trHa&KHnyP~Jo4@CNW|6yc(16$4W0{_k)U zt70$7);kGSMy?;y5%VLnqMpIK?|PH9;PO4PFuCVdd?9!4oT|3(YfY8o_H3>+Ym!SI zI6{O&5;%-Xx%_tAsEQR%V3Z@DK;yS}=iWsNwIs_IDz}F7F00TlRwhuK_yMK6ygK6m zt9Yo}fJps3wq_!5E#Urz=w=y*=&N8TD_ziO%wHi|!!)Wv%ls}0{Iiqk5gr6K75%Pv zq`dL>vahUC+%8)1j@X?+Zh7o1at3%qVX$qh7EV-zyJ3msp;Y|)7V02LLxu*Kcs+`6 zPHO`|lh21wuuBAcM>DX=c}$|M8_ClqIuPvM?57BT<)$)qq$dlHPatsjUX!NaVf26+ zdCm2p!hvAS&)K9UN#;(4z0&>6cE?Pd^{xswf$L$hqZXb$CFw&1gJiluXBm-KIhu6r zj>V_2fZZ>Bw~kXSKM|+J(?S|v ze^+>$4?mr*;H*cg&>jkr9v;b*V8V#-*DPE``GHwwvnHl~r%KVxVIxxNct~~`82ArA zH#|KxKdr|Ni~^M8VAMgZgduuqLB5jq`cYd+H5i5;b)) zKly6^!SgfXG${nF!#-rEq9cXt7SC1LuGeUkN5*HLkUn;O-;m0h-q){R&-se|MXgB6 z4303B5k5h@v`AXDcSAa3c5i3$2l}gACd>M@y}Q-u0a(R&cVFPx8z}YPX6l{6BmIzY zyy~tFYk*Ws%zNFWzaQK7?^$Bf$@k)8s91!N+zB_Gn-Bxi{|o&7e};DsVAQFus1O8p z^JTmBIQXQYzQ)=T(aiq?3F%l)&dvDlHhNHKRF%13zkSdYF*{#P0js zeQMK8^#29gB*e3pY8^tJ86cVVtzSxJijWUuw&@LgZn&vbvv`Y!z1(R)z}9M0>;HTk zugJExHUt{n5U-v7@L>RRB|5uqeu+bGGempU;%~oC@x>U3oA>4dFSb+c>E;r&>zR1W zLRrVW)79(+*PCr~ZorwIJN$mRmvj-n8D?D`o!CHDRrz#vm;EkT*154Sf*+E^Yh6lg zTBL_U^?;n(bf4w}k|OOyR|ChJdpnOudnd$Y=_Lus>r@nIX|x8g_~nOvk2M}`y1va% zwBz^N_vF&XIf>_%N!guv>S%IgwYT!*XY15l|4pBfT^Jx2 zJdMVYfMfu@RA~%>L~k@^9|VrcsZrwj6R#dboAd}dbpkh9K0ZSy35YN4ugi`E4_I1> zymCKAc2;pSz8fL3dPuT>0|6zUL-ATYQdMR`aoi9C0ywa4jsmlanhO>vI$aeZjkktj z_Ya7uV)Keyq+J#Of`9}NO^r#qFVK+XTmihE*9+yS78URcSqE^H=|*KX>NC?oqgM%R zpX-r^aTaQMZzP~pLm>4osRA*S3%Y3W@SC3E4Qdd*itjYJR4ky@WlM)K<#mCvBgX$# zEBBg4@XQtPj{za;4otLt;Cbni8)96(Augp&;Y5++n>TOJvF$xs#3qb^v_s(p`r%>p zZl**w4M!!~cAIE5Ys{G-q9(R50AU#_;#wuQ*z82onE$Ct3Gw?%*>XsWx;y(Zk*z!w zP>(3hzDPMB2GcaEJB)ZT@MYPNEAov)rVMuKNZ?j|!SzFMRqVB_|AD74y!^I=_nvZ? zrWnLDp)17rvQwzfeA!B0h3L9f49#|$>PAzV*S`EFnT9zK(-iy{aTsv#(?3$O$Jo(g zE;PjgBvNpXjhZ?%G7erC$(fp0zke4Q@9Eh&uXLRS+JX?hG(z;V&c>3gBg`QNXkPC; za=!kX?wor9+$a5nN48}7)a*>3L@)(aVFx%+4Owqkh`Zepx>4+?YVPU~{15D~qU zet<&;*7A<~JI>AI)Z!Gg=3l)o#MrlF?Z3(MO>ArX-&-pWu7FY2=kxLQenDiIiZROoW)38|N#mzLO4@!AqX zcklGc$`IG`4m}d-*1ktVBBo;n9|(tBT7@Wm&ZCo$IiizWuq_NWE9nn#5nRpCWdi5N z{1$RLPKD4dZkSEx5YAcVkJQl92FA|YLl;PkHELHG4Dq-+iJ&=SO$MGCosfV4=}mT7 zr`WQ;bJ33b#$#6>W@5?hX_FI`Ef2K~bAmb(CI5%$io#+8s*I`FkO;yqa7%2@SIaRgZ zG%)G=-m7`cE{rWwmp+=XP`Q(}kt?35bQ%D*hsy<;C@y8`57QVq?LDwNF~nFj!p$O< z1r}4@Bg#>r1tX#d9M;Zv+-+XuvcKst>E?=5srY9ye2_0|x_{*d{{yfY(6I80!*CKT zLt1{UdY}pbGGvl-0P92=(s?;v8w>Os+KRzr`qq zP14OjYn#>Y#58o~KapX)yRwQvH4lfEUAWRp@z|P*j*7~pF z`so0sThRiIj*V4(m+6@C9uP^iM-jkEN~U`#&Yx#|?D^Drr+$pyVk|PctR@2@79_Os z-rd%$L-9V|PTL>HAE#M)3W(?u5^b`--a!eR5(c>hARU)lf4Lv$2%CD5sJP@h@m|ki z#+Fk^=G55cR$g5#fhDl>-i%`(c*DymPQ#$*l+#4h9r~415Y}#5A#HdXGh(dd=F|Yn zG`j@C>-2yL=J)jVMSqt?E)k&XK^L7AY-p%=7WnjAG!bZH|L8j{i+Tr%TXuj!@k+lG4%A-BMu+HWs>X46&_0nC5JDldhP=E^NtRg9d?|h^huZ7 zZd^M1Y?Q`{iCX18l8UAvAOME#oGO`k+)k5{@)M9-PH8(z0fC3HLBDf*iup#>#%6xK z%GNi|(_?U3MJ6JP-Oi&b_D&Cfq$0gGKqfpdTMXr$|2Se?oaT}4LN&=o_ehO`v7iAg z9>&D%Mwkin-(wpsN`JPlCKjdlZd1F?<6g+qBI+b!US~!|MzZvYeZC7*UlN$-JmOlp zF!BERb75)ea#;4kT^yVsM%zeNv+cFLwlplI&FY5JOCd)mQ2r_mQeImBv=2mW>A&28 zcGqrwYsWOhWPoF|ygkIt+Y@Pyfs`!b-n<$8xO0_RInx@7dpE)E@kS=N!2c~!s zkdFG5lmt;q_h#Ig5T@i*T8xRv<0m-E;i{@C;g=Y0JmRoGv&EQ?xQ)t2=x?xc4~V?7 z&RvY&cNuvJ!_U*Rv$Kc4ef_Fb|Bp-xlx*fLkP%Et|Cs|^5D}D{V;{!-?QXYjNPF+y zgFQn-7jYy4k?_8JIWG>C#E{Ub zba>}BQsN9s6c4~khtqhE?8CHEc(+U|gX9mN_Zv{Cc-$!c@ed4UYZaz;{XUTfc zn7nroMXCFx&!d;17A|<6+LWD#E2;FAQ;8Xdr;5241t%^(bSaXZX@1|SN}cK~q|R?< zB*v~KW}S_82TLk327!U85@}V=kao<`Et(+;{H_o9jms;KfxN&}PvUd<282=dT!Nm|1Qf9?ndotC@>0N{kU zpHQQ)THqWZj?lb*h`%7&EnTDj1FF^%BKAwUd3nEl{v7?X%(b5_WMc3SFWg{48`i;nWix=Ia2A#VZ z&qg7$a42S!Zej@Xe|E0n>J1D*Xn28MyhE^$mQmt{+W$Uq(CO#0{|6o;Dyt+7|Noh0 z-fHXU=zy=@I8;ZKac(I$M4OF?DWPvkAdG1_e44bbJ;;@xv*IuxpVF49WL0Qz@Jzr| zS9jdXf!p&yfXJ3PdM=9X?m9{siJE$?q4p2Zw)iMQ5&?Bu)fK3mFA%x%`id?mc$QvRM4BH^^~pge3Wq5T0Ed=CwzR6s{_V?`bml}H93cBCu!X1{B)66C3CZZHpn<*id!++h{+mapk+jkk zhS1CUZEW*Bq~MVb!gQ6O>7@Me+YUQt=Sdl{zPLM4uz5a^x8@8Sx|V zF>Sk3+6!In6T#ksj!eQi}78C+J42LAzpb<@goC{Xc4oyxTij9HvGAJ()*9J|Oh>R?;?2 zlf%%be$XzT6(|Z@c#bh7>W`1I#WBw*vKIc)N&s>gr?L*n-f3#EZlz#Z#7ems=8$t@ zfm}0nH)S8rWW=L3B1c4Ue2fa{a(Wf=Oa? zaaZH#=&a}kjf;DqUj9r3=h;m0occW#kgjPc8=vQ8$N@utvhWP&5EV$zi-VAoQBW_APS5$#Qa8$n2jtPc{s}szEt|Hv2|5CHYO=mv3#a> zdz|LwiJi4CAMi@sg_T(i|L<1+8FubB5rctB6QI!N&u+H17l9{sc53aCdW8SSPxcW6 z0dSffy!@Wra}(m;;a03~s(v{&APRlO*T3U^_@F0r9m>FSf+Z)3%HbF>sPOO|gETV* zB9W8G_Upp?6VGv}fQzGJ2O)@AI6JOfa$1|HNx1e~ZcH4Q^imw%=y1N#g9wNt+ee@S zZ$r~|8ILda!ZG`{=4O(@bFm}1E8+QH6kd#Z(ny5DzQDntP0*!h7!`X+Y4#TKG64Yr zHfq@o95WVTgHN-Z=&oi;+ebi*dUkv5fkAERvy=UZwe2P79r&ud%w3HbZTUagz8KxP z&V%ju#(t0hE>Uh$oB9ui@H z4atvYNLrH~ofSA;99}fB9<$k+cuszgu&it%&xdEd`8Z2$8>BxxHNrY?e!wDbrev^Y zw~s9Ue>6l_)kGk-mR`=m&T`_f62#ZPm2fj;t#U7FEGTN z9W<0U=_GM9HT<^t$D$0xSD+2&KM7YhHGdkjO0@W9?mXE*9;Ua7?-htZpCVrPg27R? ztKO@pL#h5U;AZUIqN3GnQA(V>U-T%`&j6q(A2`i1hXDP-_eJJ1o27Jp=YhAIYHg&R zLp#BRxqVE$i;{~!&8>pK&rWHKm8G6GxEahoAhH?jjwK7R>Lzg~gkcpEQ7SZV?8kFu zPkINCH`@dY#}yb<*xK5z&=sk)Y@uoc>li@;36>;^OP(>*R<#{s?=AFr3u8}+H+rIG z4`ajQJoSo5OXH-?v#dsMe;Vg0rT`BK_Rg2rb5A;y?=!$RV!O=)+tCH*kQiz;^OQ3`x2x1yy_Q+4be0Hm%F1;LQ7j*=ZLn4Alz?hs~ z!LM0MY}_2u93Nu8(5ut z(39(-L&)rqQteJYpa>Q6X{|0Oxivk)cXJ7pAu1DMGe^ni+^Od(X^%68cf4BJb1QO0 zy@#DT_;~Ryk4r#LTf*gBx4gpU4RXg@88K~_aue-y0;J?k?KWF$(n!5&;eTQ)77r> zNHWO{%K1SnQ04Q*(mW-#OS}+JfJ55yMH>yoYd8-9E66ookIR#m^G;Pr5%{TccuLD( zEzLvPr2YB&YcD<-7sc>$7pk4|;}0{Csw0M&N{9j_)d$TxF~CJBdF(SJr*0|j5rawL zezVh#aqGu60i`?QbSaorADNX2_|R(T9>R2~e>m^Cmd-}dvr`2|?L^0d9vbG$BXv&s$8dkW_9+Qzugs(*~q#A4OvRn1!=3Kmx!j&Ns!_Cchb zOnO<1xG>#XdW)qFI|&qc#ja3Xt?tEUufm3cj-2NKR@IzR`^<><+S1I zX-7d~Gi44^Tidu~mi5#lciIeaYW%*=!54S+)qq*3ad);3s(WiN&{K+RpM??4;Jwy; zQL>iRUx(S_o;Z?yggl;RRLIE2Qaq@s0U({weRN;(Hpg_RUj0+4pZ$y==X{dj9aL?K z*u<^!z9{lHJ?L2W0~;bwTWot2b+}ZYg5^}D>a&CCcL*N@irx*X%-EtIMZc%+J<}?! z5as>mTm=EBMI=S%+s^CFSpgPmm&s4tFYg+Q;$giZ4cM83hv&sIG>-iuZKUJ{fbf#_ zq_^)3L}%tqHDdP7knE(md?nD&yM5+A3eD5&|(vI3u;3 zs7ktf$6YIxX5Hx@TH=goko8QqZLJfp>9nwg^!)>fdl7z#*04-KBs`teo9nY`8YT16 z>GMqF<;{jHu3b?CPv$b!ah+rdx8)FFGU0lnAS0jCG(rEcx-;dzw_yss?8S)-VyrRC zN~quL+C9}*UorEzd3pVV^ZdKp$fPAm81yF}Su3vge_31%Cos^X6N>(s^0pJ|t4PA; z&!4z0?k=O&%$*Qiutt#zeA6u6Pic>a?QRQ~lin6O($i*YgK+qCweA(w6}e+Ts9r-rXroDp=V`Ma94=0lySjmzOaUi^XPGuLE^=#@=r_4=k0iuH;Oz}sjhod{ zCtNE|de!2lOJ{%{Q?cnPhxVC1szj>f-Hw?L79wn)E9=R45BfdS?`47Nds8N#a8-@| zIg)Gpjt{bJI~gonx_`7SpV3s3hwjWv4dvuWeJFJO;HSEuysNM=b8HbEkN?l zSpK;j-(HmPI>e8Qgy&KgaUoE!t!!9iIfog}P{-$IafR>ItTdCiRW7GkDBh6^|AYdV zo>|)QfxfHl*#+(~bL-7J9$cgsWCFkJHFhI?b0La&OMp!}jXLy7IOFwyv2OzD8r-|0 zKIpvd6iHtOWX`l2B64L-rx_44#op04#?T!qmmiPB@TPxL`g6%x%*@jD!7GXGFm9Fc(;nZQ6s~7-h~I1C%K<(^ey^7!dK2 z-p3}8J_$~M|6xF`R*#{8TJ(2G$6LF&_wv4#-i`d|kixDfOFL-TnwV{_RP@a{NPIAp z4$;az0-3Jfp}=F7tGa1l4Ty4luGeTmvgus-zuUUF_(Olma`pxTYm8jj9&198hie68 zT+rE*e7Le{Q%A0uHDpRT-ODTq>J+hkwELJCuXCL{Yqs+z1ZWHojTt^ka29p{Fh9Su z{JL2^?%{6BhE@Rx>tjUnZe~2je;ma5f|+hyuk%aHfY+{pC;)n~DirdgmImJImTR4;_rS{uhvj-0yLup%RSK8!4NJ** z=Xb5b0*oozji8($d{s0*ghL zbO|URjdYiE3Q`ghXR@F7efIv3|M_q}oG}=D&;@I8-}jvJx_)&Ho#t@nJvyOJp{onk zq~hFpy8J<|rf$$n%=HR5mGm*estjEMx{iGK4q9MWDFw*gKzYvAL!Tlpc(m9oJ_Si| zR>rLq+|{oFm`Fx&tiw3=6#;+vS<)7#37F@oujUH2X3K`4Ql`+dkg8GLp191VmloHC zlfVtNJGjxG*z5?KgoI=F&<}%^E-A_Rs7Z=+4Ru^iK&C+9MacZkFt=h6!8M~rSHQrx z44VM<7i`erf;(Y?@n#VK)tCgr(iphzhHQqyt-mPuc^5wDgDLnNNO8lnf|(jNf_Y_= zeiX*Npx!d`HJ=~U81(rE3w)6Amb?&+a&d7ny;?QFKG)9C{yCHr>-|&#-*jK;*uTin z)ojA35={UE*I|DS`W8;|3FMH2Luh2uZW+xR(Xx}d>Dwrtrrc0DNJBkQG38B@)MQfL zi03ty40}n(t@MK7QSH}`{w@_2mWOBN$yA{j64o(zA^Bb_`q70v;OssTtR*s2ED>^78NGoQ$0 zJ~5HBvSKWC1x5p)m;Z#CD>vIfssX$^Ln`*n-n5x_9y(z9X%&(1FJPisl;d+)oCRnU zKmtHe;>ds*X&;6*8p!$q73Bkp1B^a}{!SuSvwdL4c8_O357%BuaX6DV1jB$pDfFFy_s z)gH|V72u3!{<->_Goc0y0SqYvij&ksSfU~opThmpoQxbA(ZfIu@2u}r=;-K>`(2I* zYJ@mNa@p!2iOPVRg_m@V|42x#T`4IC@M&MRgH$>LSw9AVHXKdH1J^Q$W32>RJZONo z>cNHwzHY(%+Nds~T#RzCJIplP#D3CwD4PIR`v3v$jQS^lI9j{AsusX*08K{09^ex} zh?F}}X76N>4j>WpS`0nUmR5JNhE8Uu1J9)=BUtboW=&$BKp;l4h{ z$?0i=KU9yA03H(psGecqWMF;NybD$$XdUm4WBq;*6m~8@K}LQUy#&@TU|Qf1t|S(% zhiNQF=8E9Pl0mGVr7q7leh97wZ}1$YrUtOq-Pjadt@M0H;G=EkTxJ+6fH_d-KsW6I zn|lZ7>!8PZf!c-1$r>Qb05D#O#|U{*!%#{?eTj_(TL=iaF9C|fEilqp!X0eIG*`iC zY0nk*h40pdfjr)rmZ{nQzw#3`(XQd)pG7&oTpgJS;$TP)cz{xd5j#<|X`IlgX>=_t zEmIvThEXm0z%CACA*KhGU%{+7Wen0z@R@OnGtB=03%()}jBjpc0Ml#k zdxkim@&@ya7Z5~GZ+h(FcI<%iXy_IMdIOQ~@N@S$9&yw;Wkb{ZVG>VhG%)g5`~h?T zkVgRPaUVFWHW?k6RQOJAz+@WYZPZkp>S@sDeVB z!Ui==2Owh9z$b3-LxM|&T#@SA%E~=hf~?NvJD@@>>C3_u-Ep|b<+dA59mOKicTn+5Elqim}F><;ow8j2!MT}LOD+i7|42~Nm7q9r64~5 znYr~X5Irfxa`erUV(}@N1T9FlEkW$@HJh)jd?%CDW;@;=m{8ZcUmBA3oh?Nb|_}`V4q`)cNmhs z{&mbY*-OVapc)6OjC zUq*0v9-118P9)YbD!rkA^N*A7?{i!POi6BXqG4uc=H>mJ5f0!f5N8^Np@O=W@%h%} z=JFV*)Lg8a*e^!`S*0_B!rCpU%D4gQ4|t;VYg3asdb(`h>hgrd6aLh0;26Yd765dG znS}(vlB;=u11%+;l75_7vF|_d#R{*z!A+SK&xq!_OK=yr^r0QDj-X2Nc zKo~hWkgvs_zXxaXR`N1>?c^+%k7|fr^XQc* z7a%h~f}>!=Fn{+dx0p4o&hDQl{Dc= zVBn6kthzJe{}M+I3{!;&!8)1G?a9xoqk&x3+FQcPK|vIYSY zVPLafgB1HPLk-kO!>GF80S2U*QaTsnqfT_7!>a*9-(l`x9&v3kz$vs5igJm8G;dP^ zo7EFc-GBr9cmhW)K3(J&7(Yp8LF3^l-B8WWkBS$d{h*AP^&@<54EjcJ$-d@R@9*q9 zWUtf7r}U}3IiZ21MS#b!^+9$GgMJxJX44}uodpALX@K!-k_!kAm^GN!k%KuD9I2YZ zNDF{pjbK%QGy_0ufFj`bosfCMx$YUi3KS6!vvpu8yIL!0FMt|-f2u6id%FMAi<1+> zd^*rUJgjH{?i3zT>gwrn!yf>};)n7~c~r1eijhA;C?9H<9}@K!nXwZ{dwb9tF-7CD zg(_Y-qDJ!`>jN1l9*%k@DzSyViHB)2_2RQZnRkwkP3}L5tI>Do0Ed9~s#Jn8$t`~9 z`Cpdl12VUzYCwqk;JeL2hdj1E`1>jvs7AV^pN!(RZ;L;%DbKte?-_RSZ}Y&>n{ zdfNSv?1FiUY`6<}cac)iy>&m6Ma9@(Zfo6~iQ~j7jT@OllZSMA(L+KZKC00vhBie!M;RdyVs4UP4$%jNdJUzLNo2UUk3xrshGlbYl&Po6B5SQc{mq7cX zuau5H!GN0~xFE(rEEMGWNCS$&opkdg4=N$mptB6ZQyGI;20KI0tD)9e<|WY2HDNW+ zU>xNhX%8U>#sYxb+K~`=lr;W+({uAzE0l=v4wQt1OsZy}y#uhn=>izBwx^Af_Ls~E z@M>^Ss6R4TX!r2~D%&_-P-i;SM1WInPE~qwaZ#oY@;oF=gH(|7cP-LP-dFIraSP(g zuz_ca_cyc)T%uD@?EuGoeYmY?Es=LpQfV_OI;B)VDm+oR#}903pw4@f`$GOE!31n9 zY)8D+{`dW@5-GrFPMq>MpeG(zGBGn=Me^ji(!demmxMtL1jIRDh6N1d-+==Qlx900 z9zC{7)0Z>LmteK_+Gs#9_0-<%&1Rt)FED3Qt%Sko81dk|?6%sm$A1k9 zJJBj*+une6TO4U%h?09ENe!klf!!sRgin#0itJ#b2+KkANOh!+^2Lid*Xdo?-voq& zd>}b!AQk6%F>stximMN>r#!>Mqcu#x^o%B_Lbjm6=G(-l5M$lQSJM9UMie|dLo4f# zQYbuars+elnc!;9N&AxhpsBX3j>q%I2FAB*P!eor>ggu|aw)yu8VHa;9k!(i*}Ua5 zTLw!DSR#jh8e>aFJ;P%P#hvSsV6p@Uiz@{-+$aki$GCOj_SkACrUhn(&CUgjJ`i$M zw0e>Dg`{1MZl|9TnHz&Y&RRev14ilO)lMoVeW5=WZ&{T5mz}jl#0k__V8*;zWf6#t8M&F=w7ao-) zqH>b#c!d|M>sSspgVyHe>L=93;K^N&FjWCWdDgk2eFm5u`(Wo0T9S)e0LNn$fOi1! zlCPR_1(>0Mi%6Y7fdA-#>jmD40_bzW+6NwEk%J8v7Vh#3uth$Metn2O0Ea`Y3C;%L z+b@{lIz*})ivdDBw+_I$+)vSom(qbB`zlbL+qDBo!5F^*Ui&#+#F~VJ8mfd9kgm=H zmrsiy2$#Y`C0xbhCuEEx9;R4uvKK&W; zzL&DrxmL9XZp@H1Sl{*L69qMmR$?SOvxr4R0YvAVE`A)$6xWH>sRgMPDyUbb?|JPO zo2mh6obJmO-u{NXPXdStK^d%={t`pk0@TVtkQx~9>DuI#jD~`3i@4h8EzL~Oj3#@+|Vc?4Zh(d{4EC~{LVe|71^hcjH~LDv^` z9RDinv5AB~B(1>-h1TGQV&2@-bf8zpuy|-9iF=q{4ucfNsK*43*qfP?kan=g%uWR$ zqJjB!Id866mY*JiR17PumXz;}O=@x9fGT)A4QQ1g43@%$ggvXQKgvO=1^VjmH;D8- z4L}Zf7MTYa=PNKzcNS!ylJa!feWeFHxXpo{Nczx|D79sK6KFQb^~V{CGD&3zGhiq) zg>Q3jQ2u=bE}u+OmrCH7YK_a9X*JAI7FV~|Q1Sa`!PAgaFjCC8KH!Nd@(+YGqrS-; z?;9F(Er?fyL1f2k1MJLr8+pmP*Fc-LH49qQArH8rVMzu*0T~%oZBto5`;Wg})_0^T zU?ABlM4(&uC||VL{>6724+kB*vyAGHGMXfih>YS4A^_^&$J<+*x6guBM`X)&t&_bc zyuY8sK*~m!F~@FPEhN&SZ}XWIe;L|2@gIU05?L~bZ!)=A^ zgGf&&&G{q8sR##ODJRML*I?LLy1`Di|F^aI;r_r1Q4HB!JyuEgjD>mQ{Ufqq3Qow) z%>}Z@7jr{zqZtRJL;u@tCaN-mp%!L^M1m0~PXDW=i{qG=P+3grX@@aJB>Y#q=hw#T zbg|d^kXUr|#2x{p!vM=rl0J>mGN7cK*R~+P@j(*P(68UWQ#umP{r`^GIi9h_ZHxmd z21%9rcp%V&!4boo{qEaulFP9kva|k`4Mgv+g2w9(t&##v1Ob^p-~&F|+BiBIVf$j= ze`^hYh~_zYM!p$42|P8pDbbTyU{o`BOYbpy8AZi*Fk-c+h(W`}Me5;&^OTHWXbA|B z0j>ss`ZZtre*RC8PyzG65m{ zvHI{C{3^z+;MBty~K0YMBHHUzI1aU?5EA{M}O`tEd8GgZXMp(Ol}QEsQ-OY zK+YW&D(adP$TC~q`keQ0cg3UVh{2%)jJ?7F0s>4-{b9)zQU80f0X_y+IhcP-e(s!4 zTmr6L&WmCkV_sU?4WPybva@c>^)LSkP6B~N6JTvNk)WV1rZ?jgKKu!ff+RLj27xsQ z0}G2!^?zcR?mX>*m=m}^PR`CY8XyVag?MOTL$9VFOa9JS>a({#U;!UL z9dx@Lek-$AfBk($FZb)iTT@|8Y|%asZ^7+Y2;e{>K?)I&A_fAUffG-rFZEsK-#27g zHgBvD)Wsl_DL4o`wYPDKDtMdO|A&$9|4sF}6Y6RW9*u_-COL=r!x2aPrjCL0Yqx=k zBBrljnLsY+;oY(Hz#%`*sle)W;Mn6raFwj1i zC4fsvGpt3f*eX+GG`Zxy+?brfg;Nd+3JK zb4c&PNP1+3lTtaHYLa%+7ReS!MPp4&)qL-T=w6Ewr;`$AK%8vGo5K4KKPG%jfV=Qk zv1ocNHAzO)M#i6U296cp{H6uqFWpuC@q8BW&Hs;o{wzKrD@);nJVf+^=_~V+o=|EU z8u4Grtdu0Flt3Dd8x3z%roU;X6Sm%sn30sHPp(Q(FEmk2N0lvLfgdVnCEx&{J$?lq z6hsgG_`BtOI$Tz5<+E?{+TQOLwZ@rE7KWq6u41BeE*k6Yk27=w^v2KIedlb|B3h+S zK1=rNH85C~Rd{qp682k`Cr<0q-LEB?lnQMw-_9hLPJB(0Z%Ei&0e)2qp}Q92+L?-l zBK>y|9AS$DAMZrV5&7k2K_XjLiGOx=pD4$vCTehK3z)3|^9rab^78UXBch|*0Gt4- zGHlBJEX>aXQ&Y*2-|_hpmIK}*A|l>4%O}>ozuNc1_b@12+wU1RYP33Su`Zjb-=nM0 z&c4|wiKpoRL$7^=Jg)aC+_)IEDS$AQ+a~5QQ$jPazpM1%y8q`qKt>@j8)VD#MSFgU_=So&RIN)wEbROTwqgYAG{jm|d zZQ5%m)A0J@n&RGb32wgE>LaCVEb?Dn_pWJBnUsVekn+80r$9?!?j`s)y-ImVD$6Hxb23oiMWQe=TNqQ}l64Z!40NKAJ zrx1he<7Bhf_>PmTbZpV*+p3X%Qr%kilA{lB#iazPD8+VXo=wT?s;$uhvqnMLK}}i= z;*`mJj&u4IS4C*-`!mmhp_y;;4AAtuEjQJOg{2t-ug~m8Jk}%2e6rSf+;jp0yT7X8 zdHD%Q=!*RB8LjVNGn-|!eAe+eZz5*n<7K5|=%dr)CfnYPUo!Ro!Gw1+C|i$zldmFy zNPaR*t-SQSfy33N-x{|0;u5FSdA+r%YCQvq&_cW2C45A7_z5LW_g~?8Gzl$dKX^Qr zLd>LMQ*Ou;>%5G{FZ-FKV;Cw7Qz4Er<6rV*dzIR+*alusNT7C!(UeWTHz-$7O}y`D zyN@X|k^R#+w!Pxwd*qRG;nO+vv8_=@<(Z1Q#Mck}+kcsS=ikn90pH3gVF9R&sMOTV zqI6GDBOX2es%)Hn)aKc5u{-@UYUpEuixI_Z5PH|5%2&o-TG~oN^UiI%Qn8&we^FU9 zxJUn!%GV{i%22rKLv}0eQw7x8@VWz zW1h1uxFy{p_w$gb+m$;(f6Ob3QaK+;%#~ywjH)Q6=dlM<lJuc-y<9cIO(5uYkphLjre|7sWOazZ@FH_GSJ|$i!*_6o^qr&+G~d3lHb(S(unmG@rx| zc-=C*ex49?WON`2DVPKd(nFe{VOxa3B_B=T^_y-meryhOLV!BNk$$QuU;->4KW3H4 z_GyOZ)g|70+L~o&R~WU6rB)d;%)0T4;Bl}qYa}L@g&ReNe_t{dbDn&zlNV9EMsG7o zkX$y<5r9#eu6%Plm1J3J`sbfuCT(P0)-wdG1$Bh z3mJCPep#*_og}MB}PyxNtCl|Q$n%vXaFYM1>*b8VRoD+wiB!da8Q%TE9W|6$G@>)h!xt1x_t;Awu zVVUVM9cn^|*D6lZn_l+oaq|I_uhfv%gGCG}nf^j}m`OpN-1Rj^vxU$wY^^9Nu~v_FZ zN!Ck5p*8^ug~)rLA2S&62B=}<&uNZ#-GkrEL?v#sJD*HdaXu&QQ)@Oh8$)T zG49E+|88C!-ZwrPe?d|1eY*iK=`7(&NS2Q6dW~OKQkVaUgF~xab)jJpbJ1WvEn~qlz zU^7ViRJ1z?gj+9dW?u7qWX#u&$YmbVg@F)6W=Ea+`wxrlY7JI&`#hS+nEMxEFgi5+ z#0tS;wgszMbfT}6$QTnx%VoF7lKor|ui3H=f%n?)-4dFfQ;N{^zDc#4k2v`$EVI3_ z^W_u{wF>o&p6p?>nM1YWgnBAwDOmb_#d)5*w+LOy^HrlSii0IHNzY%rfW{EZGazVv zPqAmFPZ1l9^1H$(V2sUH4vm2ox)PP^7EMr;FmV^l#vgqea~^beyF&G4in5s}E{AG< z0(nAz*-l(M{Z9M}r3ZvQB4~6HvJCa~_9A}_;%FZo9R>0Z8XyftN5FpMALarEzKLi4 z+H?U*yn|#_6ApDIp5z{MP=e*j&23p%0n0WZ5y2M*1DO*DO~szex;iqQE==fbj<6e* z;I(EV;YpmbDQ^2y(uMX?dS1Pq>speA3&WthyY$29UQm_5Aq_G{!D?}e{VI`wkU_&a z3_jmgJzd%*Z5@4ztNV%i4+iXOIM{(g*lbQU#|lCj4W%Ya8GMw8`-w-R?N+e|jv!gG zKWCYUAtB|(Q~PH>pZiyy#n#E@V8KKQLs9V@4xyWMIPd<(Xi4{O1@Uo1_gE-|GnfL^lbIMkvvn~L)DgH4h9zLa zH1xXi<|zTE~_jhX!YciWE>+?h6WLn+Cnu)27Gvo1VMFG45!hs=$-w)>$doqp4k z=B@-P$2zq1gvivuU{kf6U%0~fIOoK>S`a0SRGj4{+7tWrl7^qk3-89RFLEL~DQj@^NF$T!%fzf(-@9^H=!GJ17}M@1-{vjb;=&tu)6ZvSlH{-8OFS6sac8mXec zWUW~&K{Qs=rYJ)>JYO5zqprVb<%za>PAo2XHkewvA~Mga6nX1N>=t*%Ahe}A@u0w$DspfDx zN7)o?u8Y|LW`b|5rP(w!$+ydME)&sH@M@1pTokg!Y0I9RLfQ#^**bci=^%8Dzqc!# zyV+d=`7qhm$eV*0-CicnaO{H3^OkC$JR~+xB_%x3jR3{}m1CUL7BO$IY#LT$?)bRI z%ttHE`Zv|ptg8=5)fcgwCK$O+|iQ zo)4?};=_~`E(T(nT#ua7kXJ7Fjw0G(*1=u*isNNOr5i=`XbQHEItWg?oODfV8AD~0=m=99>z#Zdw5KO)~LvL!p z|AD!nuy8F75G|cKckkYLvbX|azxV3pWZ(<}zS=J^ zC%r@?{YQh}?TX6BtEx(#@~&;eY;KXra4$UUuPbZ>ULhb*$t7z5;IE)Y#Eol@b&P}Aw~zxncQ2?ot<7$1OVxT*Kx&g-{nCOP5M@3X8VLL4Ao zyOm*cnrgfro?4t7f+AQpCCX-SYw#9|K z8D%rGCeP9bw2gfPdtSX(m(BTA@cd|b5bOwZg75O%DC%U9g5!A2+m%N?=7&%EcY#7z zH$bxrdp-*jlHXMsk>MsYn8I2_^yT7c3WWlc&?mzAIYKm#@ARN|Mc`kk|@KPf1=`ENlnPc`E{wb#tQbcsI$hB zf^E4BzYJS#+P=KAG9w9Y{=+@SY8h+ZHLb2czgB^qS{!Av~;cb@Uyj?0+N{s6Y%;9$|g_Rq}v-wkAN zMI7okM&q4tXm6O5_`Z_8ii%M~`j~G`{0@tZcmj zKE|oSz;YF7R^3wfpV&*D@x1j%GLaGPhk0~d`1%`QWm6;Od}xm%W*EM$e&i|_MNH$% zM4wp?bK}kLjU3RBZJ17%&ZIOPEgV}P!lDer``Km%ZLH@_=lU3j(CJ&+q-M}^k&vtp zIu%5>Ru8?8XVQg^*!&K#fI|qVZQo7ph47a6AeXFj=!r%VBlCehd)!fdir9IYbQYa?qId_hCY`;&mN@5fTjJ=1QG||ECMGEiaXmVtWYCzI zPVzm3a$Eb8Hkly1*Ll9V4MrxcsNnJNkAVDh@dC17c^)2*7E(b&7#T62R(p|xZuq0X zUHWz#o?WD_v32vSfx1GQ9=qpJi;X#&Wc60|R*7?o`cL4$D?Q9F_S_)nNF~(vsCnjF z&oUw^Cr`3lCm!<;YKl~s{FRqVmHX>$ORV#xwoVl%f3Z+qII-HFtBFrJrjnd*!cd!w zxpUOasr=lCiwjsLE8E7)xQDe47cu4vR)tz?7>jl}Z4(gzIe4Y3o!Kt!IIXIx3e0Qd zxZ-FMe|`S}Y_!K1kuE{ph`3^uQQLs;27&l-c@L@&kf95K;LQhd`vS3I7NFYE$%H&7 zFKv85%?&_OULXuR1+_Y90P7o5kS+4k{8FwU>vbThu;fjLU*03ot@d=>pKI}3F$&1< zx~Sf)+y^>nNb3pwm3;ld;d6kzD9sLebp|A0O;f)2+x`J5|M;R%sw?HTV>zX6qgv7T zAB<<^bziL@0Xbtxw=NtCTtmU#@{_w*^#^VyN^~>Uuj}O!o>Hx z()dke<#~^}#Aa^L1P6gn_jY*7d3i7gnqy&MH7SRBiR|mOnYB-hWF$o&g;ITx$A8Jn zdg*FTeImkePI4WcsazNFVUao`Vf1B2S4qSz9Oe3zN5klR%;jqP-1EBQhMJgfg0TGK z3t9P6EDC>@(ZtXnEcbuVgrGLJ^b-q>pR{(DFuujzA~V%C3}9q_yT9_2q|>@xy!O|A zCc0A+nR$8CA*z;(eU`;s=a`4%dGR{p*CAVl{dLEkJj6bjt<4mf=S@NBo_E~$VGXsy zv9?gUpLwhhgqhs%`8K8PKXe5ujb+&CX&nTxWXs@)v0*0{!r~!?c`q8>GZF~~Y_^aT zX_s@dVw`B}rgPWdWmAwIVp%#rHuj80Uefurh2)p#*46@-)I>!t_`6HN- zT5f~oaDIN;uf^EJq=r+aLOfd|l4txGWBK^|x5I3)r-GhYzSrt>bp3~Ivbm9SV{Osq z1791hzU+?CJi@&_$}wBHqtEmp*x!C*UlULtUXA#lN6p#A#hBm2^2yKe#IS~MjpTRV z_{i3NEbIaHBrGJ61jurpKevkFHMg+X5~3qL#(u;ZEipbZfsMQJX|`K7HZroS(cRg( zruxS&+D>NUWc%a2OBA<_=N0R(y(NCmRZ&-_JFkq2^nL9bxUcJfHEb4Bu_GE;G*Vh2 zX#MSM^Mx+N=kOJD_|0~{G+vE;sBWX^RTi8i|MlXI#9P(YXJ^K#IT5jZ>8Zlo(%W0b z#U$z>23}LiFYxiiY_pCQ^JImBD1<7jjEV@n@AMH3;JdX!w063fy!k8bd1;KN%a57Q zxY`)E&WL=j%fEjwM9K9+*`sAUmb&6`Clk!Oxq+r{ zaz6;TQW0op(CGW7lsdW7_;#w^cJGU5y)Ujgv9rqdXs36U1w2qwQmV(+#`VO8C5%ETNT zBIK^$+bveh_=*CupAnbq?LBoJt=>0ioYMFwU8VS?O^X}J(vx@ef8q0Wx|wj*Z(O0# zpU$)TT(DI+K?$M1vHScYlNbKk&V5eJwX#^x#SXu1=xQSBaX=C@LmN=@(-4!Y0PLbFBFUG(X zq2EVqXwA=C+duQga&+H3rP!bs>>c2h@5@Qy`&6A?$kt6hXif86-Rx!_7G)J$l-0JCkZJ6kWvs;=?}& z@v1-b>cVKv*B88lgQ?e^NippOwXZ#@20K{(ThHNkz2JQWEn>Phe*IE;F|93s5 z`90Fjgu}M=?++8Pt*RhxUY6&jFALwObku+Hy-;lPw#K<%Gm^y<@9>o@s4+h=XuSTZ z7hNT>UWQJ{_WDQfb@=JZ)Bj$CZamhr_YM{9H~P@qt!ROFh82coiXXYm$Mhsl@|{;0 zjf{9KKejxxLoq?c14U8WBa1D4x2a!@uuetZ}Vn24EwS3C7lHM{o?7um|l+lfVp6)RD>{U%6-?% zt&)sb&HrZPmuyO(#7`*(_zhQy-+-j zGPFM@&a;dsa23;UezzKDL?7O&fb5E5Lol#%jF3ZTjqu4ocUA4fPBBT1oSO<9&S?`w$UHuQ(i+lHykos3t*bUQ?iIz%}X zG26u6zHTSAP?aNprEo;$uqc+(`i4LE-&Za`EM39*!qAls=54N1nDwie<#RbFZn1qVW->pNllHIm&!**E!xFH&Q!aE3D7n>}XX@ z$_m%}6wTLZkPB7fCPs0x-QF|{c&lIMjA6&m_iB*|z>erLE}jX{h#NfBWbi(Z&I}7& zR$OTge0-kCcfCf}Y|9~FM|=|&Uf=DPm4`{5V)=N-je@~@qp(7NQG0u9Z&thhop5P5 zyV^Dho=W`8=G|kP34&(ZSj_g~WLS76+E?d6ULQ_8@M|yUM~n^^E8Z>_4$tUt{m5GU z933Ozs=jo8+fR18hKT=uA2Xa88ELN$BJXpIOQQ7la-~VqVXpG~lN|=7VXrr|d>ie7 zdy9xZ9HL;C1kF3+_@EYq(RsIqR7i1FFx;k|mXvOt37WPXrYY!NvQV8uCx}HZV`OAw zOktFL{fud_?T?#&maH6^Q#8(Ja`S=0i=3T57n?Cl+xD!*hkL4q{L=XLS-`Mz#fB@HX;I>P$@mcu)4fy;JXI)Ox$bc;@=b> ze(qjaWP9F;1?#Iy$Bs2WeHlC7-zB}ig0tPa?mM&pt0%u%_fqt^f6{7qg=n?0`=>sU}s!_D5%K8D=yQcAop8 zm=9EURTU4PIg-G>-orwNrNY?%4`%UsChffNNz3lA-T-0iFPDo-fI#utB`m!A5w(*w z(ys7N_hEvHnw`LWjX|)JsX zIR(0{LA=aHl$kx)d!kiUC?*9RF%N#QoOdY{Rp`2AGpQ-R_7e+BmceG2%3k4B@D<-% zR6;(L+RB|DY|NV2^&~s_z0vs}+Hu%D&#(dBf7lkR$98P%q{{wsVl`i#86HA0Yk0A| z^YfVzwQq9-O!0BJv*yJ!x`Do}ip`d21Rn;I6n2)3dRVZI)LJ`(Vf5lSxg)HsOG)fX{p$-dMWA8UN` z#d#c}Qj4ieJ{)N>Dwn&R{sKp3T4!ExRk~>=f!m^N;|~Bd1a{m0(9qOjovGKIs!_m zYB%vnKrCcK*${&$&t+xQ|D0HDCDyRQ)YAFsnf5n%zf!34I)Pkw`)9j#CP6pc9k`qC3Povx8 z%cH6sTR&g#JvqULi(6=dxVn{iRQ-WRh$%bkt!I!(El&P7#Znw;>9XNp$Ze*ndTka- z=?FD!cXl#OF2Fj87C5n^9A5v@66fXhmJB<*d@MhbE5>A2hTk1wD3I8!Po|3t;>H=7@t;)V4?#F-|H49B%X5l5{e zg;8A}lax7-qqOah#OXAgcyz-3BiFCbF_CKdz3F;hDYB?dh2<*9CH>dYa4kz!fsFu# znR13Hks%ZJu#$7^!D6p0xD>qlm zK^K6~MI-2@1~O$v>W|^X8WpmZL>R&QpS&eE{g46}^J3vv_>%Xc$^z#*@x*+hH~JEo zL@@^&C`RLjTNQar0_RloDdW~tA0=>y!+yUV7ZdVCH%(;pUc~`0cC%G_#tTW!G87su zYYHU|l7C7t1%DBrS9eYK1;tiNhSn9oDd3zqjkE{{F^xi?g| z&t>}@Os$F#jHX~U@GqNp9zs6*raac%%Bm`Mwo_p=u|bUge%JYU#z->Xg7~+ipp-%m z(*S>dj%Kf7aUY}W{SLjG%+qhLoE2_V6`E!y`5aW+0XT0`5cE!q3|q8y)Lu}aOwH0t zOaGO`BRMz$TS2;Dlj4}F&9c};Yh#Tx$8lpP*c+15is=;!ok|3vCzDwKyTob3dcFhI z+uQgfc{zc#G5Q5r$` zQr)Zcl<)M-0sz&Zru3r{Q$x-4wHRtk!|gJiPIn02co{HyMJW}GQLPCHW4Q>=-wM*w z6Q9(Wkk_ZVeW=ocdMXHL17WC4glyQt_z6OP;`D~n#5pq?V9DZ)E_S3$TnF~|#y;C0 z_XOkM@D)lm2X>ypT;nEPbzo>XT2`0ao!YlztPF^3k=+8oKyL7^0-Iq7G+g2hw_&#W zQ-egvnEM_CLpwt+IRPr)TTdmIlE>pNbNB;WU31F%FUtb-<&IRE-XEoLT~ewx7WS%a z^P@qgKRi^%A87>(9OkQ>U}W~cV`=&!z$YttC5F7GncWImc_+N-!tui5pNbwq zw08wNFm!NjOEh)2)~w1G7D0l6IBcXK^i06HNpdM9rSf{0d(P_v<9<03)=UZ3WESEt zl(B-=Y65Kry6{S&-J{FcI+VSMYBY?Xq4c+&9L4)f)tU4MHj|R6Qu9HttL!{B{pOuT zUR#Nv`JJU!P|i5K(EOF#E6FbzugduR_S=zWq(B4LrbM)W%|5T&EmAZuf9sx=OYFWM zk}i$S)Ku)QA$PMUn=Dq{?iyXa0~rcIRPOLHD#)!}w{W z^KQ2UzeUz37vS8dv*(h38rA#@2zBw1@7QS^|?sgz=$*E{( z1${=CW^#HgB5e$}g?NB@v;ZVpy8*$5Ewu{ff}Ge>J!P}^rvwkbw9bmD4uvgnPz0S= zu4T?IPBE|T1-`%-<3E{M#s`XJ&cBiq!<6WRaRjo1yY1yki z;JC6r`t#1Y`+35joB7F7vI@JvH=+tE6Qw+kzSiY~U&9rTvpm9NA4g+k%1IRKM?184 zZ4+K9D|aEV_1uio)Kz6gkaK)B?99s25B|}#m8@o2g|f=h@y!Pb3VQnTK)1oNtlT95AD; zlj~AVdom3(g6&2OYk8;YtrBf9p89{+I|+W8-;358Q6ovBD}~Wps+%3;3`}b`Bja|3 zUToQlXdOfOP{2*d5&N=e>bm_b!A)djvPvuyB-&`mc7?4jS{XlgbmvV_#VyjVV_IQc zN495KLbtW17?Ic7deR83Us7J7r-fQ(_0R`Ws8Le-YFCL$M+fG`F&?e{U=wtHzg7KH{C;qJzok^YK8=D>m_8lZ`(?02$z;CDgC=h@kQKg5u?5{K8!CR0d1veI zz1DY|U%PgcL7iXsiYP*pSg5kK-Pk=+t;o7A9H4$6DUvK2-@|>p(PXz>_&K^j$7+7^ zinS`|f!Gu#dEqNnwav?ZNWOY?DWeU;#ZNvI(MD2s9mPQLDciEzM|F7MUh)^746I_Qi_?6jN;@| z$E?%@IR+*4x_NY;ML&+stVcnO#A&bslT~EcpySEOwOiw=6>JOE(dx|+zZmM@6IG;! z;+Y(k)`ykzI>2y4O{(;ve1E}i<@rY`v+|%X!4xd3oWwBM_=1ENGBVm1%Yfi)HYJpm zO?UnzP!sC1y*qo7Jcd`;^sh3=^2|3Dw<#)bM++UYLIB4(j{!5sLU%BtZhuhCb-rq_p zraPdB{fM@jf+Mos?TB)}M)1o>b%H-aI-7H-H^YCI!Tz<9kYk77GZoFQyX#JHB*{`s zaOL$|$&E|dl)Bfs>`x}NF=12z`P>B|aQB14{g)>K(5z%vry!$#>6bZI-Wrc#rbnWhoRHQ}B>TJ@|8Yu4=JgNU z7s=_h_2);yExrc4`6d&iWS(cv-#hc$&jf?_1`NEwDVxN)h_|c>PqNxZ6z^1Vo>w?_ zG1g@|A1{X*uhuo7xV>_GmPw4)5Q7d zb{*aj;F4C^4IBmr=#eFd?r(K?-{zmcWeH-^DC3hMwLl%&l9{`*F;0ElNmme=c`%h)=`UAVqeJ3$ z-^gQs^)Gbvt@Kq+@-1=+XiL)n!WF6x6UnJasYt@eETy7JQfH=DRLnw0iTjw1e|KWo zq2lSLf(FA(sEToWBPs@IuAWDMQr@u7Z;f_Filo0!?sZBgsaic zXIH$V2b%4MeMae6wUJ>V_AeZU5^&O2`n-1ZB#`8tOe_lS6lxvgyW6B&B$a_nB3>NT z;$eKZ$A@PtaED3>NDixUlRb_Fg|JZArrT06VbZ8n#I#bF zBo#*)3XspDv&5>`51OPP{Ws4jp zO^ojhUiR;q+Hut;{>oDNkOga(Ax>T8$J}0vPq&vfi{crCwv=DZ%*JVdzRm?7zTjVT^IS(~<4VljR#LI<#Lp<4H%M zMc8*;%G6uZG4q0ap&x&OlO=;+kB)w4dt@^t8j_?j z2mP5J&;0*T_SIoc$MK&kDk_3V3ep_{Dlob?x&{NJrMpXpfJ%3FkJ=caFpx$-ItL5{ z2~lb^QUap)_4m6wz2Dt)_uRic+n$Z@C*JQ@y$J>>o;Ccs673A|8|I4;8DL^K^XR&^ z_Aw>e9$e?DP>ksvn~{BjtuQz48M7?0n*DK|Z{e2dAX7}>!8FnztH6IG8`f^uX0lM^JdHI-=u$!UyDph`#>%AyKP3+`|h)C z8Mz(Grma6D>LNh*G!7w3lPxDCjP;V9UnN5SCkJBrV2yR7Uhv)|Ku6`BeKoeL_yy5^ zcfg*KW;1wpsl*aU{qyl$sQ0s+OvdW~(QNVH^GXDk;|LJE4Bxxv1h6BqF5kQDb%C*) zPUMFnALjmp`T*YYXQb>j#~R`5Kfk6I^mjKu2)A%1|K}_J8YwD&Y9t*LRTFy>K>_4O z)Bf(dR`)--6ZKBZqbI@RBe#n77IZV@eN0RiV|)$^35EJTR(v=VXU39!{CU_v02D#1 zv0^+w9T%PKq#+&t=+T>lO+*_SOnbi%`k3%Ua?0Qv`4<^k{RV~Rt=h~PN2O{2y$#P8 ziq<4=#VnT!7sH!C8HOKt^ zX)fkbi(i#FKT_kiPB8oW`&?kwEwL7-WM83MzB-;%t1mU%+}0jw>^jGChccrY=OMM# zmjD@Ctc4f{aui-!+BpR1*Z<_$ra8*46wSp1#HXLh9_q`+Sr6;#Cg@?3)lul z2hA>F;%x=OGM~`!W6IwbF}ac>|MAayAzyQSciz->$>#j0KqEZ2D7_|K3XaYT*of=+ z{Xi9^=TvIPS?_U3{r%hkp;5ah3!t^j`f8(@#kx8;e4XdGwy;I5rq)bU6vB~sSzB&z z@iZ){>DoVQ>du`w*8^vuwNWOJv+&IeGebYd5+_~+<2EQu8>+)c=K+r z-CSu&(1E;6V1;@6R905)@8<`)7Gi;A9?yg9Z<0PKki^o^oSz*o!3DUF>g>)}dGm7A z?&nJhwvC)})SkZiKJrp-tV1#PNJ)IA*1)c9TB`thi{xxy-W=Y|uhY#OS&)Tdw6i}9 z*gMX74^#drOaHxXGwmsaC4q5^Q!6f$BC?rj#V7rpN{6#D&$lS|nFH~Ot@W0HSBQ%s519x&&kfyJV1XzQ3 z-du+=Y|Ed|6hC_MIyH5uxG(jZbS4^=_=uKG+-S9JNy9-+F)}Ll`(jvZcY&11%!X7N z>HWl^3%_1Xq4ww)B^CQ`?-dm-kTyr?86#CM@EaXjQ61UkQbbo__L-KG86Dk^-Ml8b z{0aY;b_1hFC-lPiPrhC+N*t3md8|l}{gD7|rJj@2Ro|N??%*-5Cx@s--B63ILqkVC ziRNXi5(Aq}H{g9Kf-}<)O@I1(}J>&Ku@5BSQ#N2(q+IE=AMH1ihLn$7r^nx{;qAI$DYn7=Y0O?Pp;-sCAzK>9JS;iS^ z<^zHxDw0(jphY^0HfemOk7njENC}BRZDAF^ii@deW^q*LQ){L{dMYT$ZLb()iH03{ ztUNf59#&auV*LyUy4a=wMiA}~VE6F+xns&4@yfJ|_8l)cRBJRFT}Xd$;JI;Y z8K%N-W~(_@(%?*~ksTvVkQipvt}|6FkWmBbEb#Qi{Zgp)@)M_C<&9}D`+j7ogYKh& z^_^=>4c3=!(^1IY$WJj1h*rh*Cp%3SQL1Sn@ka{*2n$_++%T!r^xb`(+z*diZO9wk z*7FW4JWl727(u>83%&TZprKg+i8JYh_-?aYYGzSnk>_m@5GKVVwIM*u?YEmw-wG+M zIRA9J;sc@eJ|uKVbAioqd4V!YH>c8sfTqVRkmD7&Tulp;jMTfwNnr_|d8pH?XVjZC zSE54HTGHxjL+RP7VnNyb1mrZvlYyWCNYDyLE92sXDiH5eG+g__N-l zm&+Na`H1^8t(z}S99L{ACN{WUvOQ_u2g zC{PhE*{*O{pnsI8t1v2p*Ieb1nc_8yKwZ%mmcY#qiO{}LKwGla38lRr8`?g9`pk{yRB-eoM!mp0I~i~fCP2msAq4r{QJT_rwA*W`B6N)An` z((TpQSq|=H5$oqaUQ?fJM^J@RZJ_UqABJsB}c9!B%$=q znVooap@lQo6nX!-X(A^@VP+mM{O^W&$xFg}|1L|Wy11$ca^r762W`;;F}sesu|s35o+>XC);!$dPw?~jqNXQ zvi zDfQmG`SqP2W+LRKAT^l2GezBCkM8bztF{zh8idro-DFuGose;HqN`=QS90^-r2JsF z5~{=dR6D1Er7RbevR&dH1!(Z4g6;~E2J^lNG72+;Mh(;&yFp8U)7?ixajChA$+~oK z&@2$wbSVDhzEs<)GR3QK-)1$iVxRBkU6!rWy%8OqyQZ}#2MUpyl4;^=CyS{se&}u5 zs7X|;^5S+rdoEj2n28z`JqcO4@Em_kq2;|>mXf@(`uKYY*@+`oCoP?0S&@V?6ku)x zYVJxZ(RZ|^%(qfrmeNTvkd!>X>u~^-DYQ!!P^AbH7#8dKgDW}8mp;uOG4iHJql1c^ zk_UYw#@mF>lQRMh)642ZTbEZON(h>|YST7%rF7*HxuBSzABywm-kWo>A;k^{IHNQ4 zxlxXLSAiMUYdl}GM@Q0#b9CYX@aD){7*025KANlGpqVR=&_`EGdQ)&jr^7fkCx#8q zS#fSxjw1CBIsydB$EakelQfJg$lJw1@fA0{DrRmimN80$Uk^|R92-~|P*z7b$9>`V z{3Wj%-0u!;Y|NH41h0RsVjKAz?s>5c*KAF?1!BX2m$p7?~0z#3gEd zy@}Of(#$dUp7QU>5)JJS4fIpTT$J}!x;?|x2H%k%e-=3}>3H=_VR|{0`i;Zp{NcmNm2pfmwsL4#u0G?-oH5U%q~_qYrO8X2|o#MJ27 zuJeYJ1+7%nca6Tj^O76pGS9U=)ZM!=`qKKk!~QlH{>1f~WWw6@U~bh(DXsi0>Y)t8 z!}{kufrL8elqNO_(x22^!t8||w<4YX5CB*0C#QF&iUXc~$K9J)*~hM24~ekS_1(F; z0PR-7Ix-}t5U8a<)NXTiS$X|z@lz50;<(NakYBUK@7;aV)Y4Hg)L~Ab7((cN3lFSK@wkoy8*|?jXu5yEiigURHr4@3@M#oS0(1oOQ*JyAaLNCey3C}au zx!^JByu9M(Q$*=3fQgS3)r2N7T7mTlafvxT0fGxzkZF4!l?`l*0GxC?n*uXXz)-Zh6krt zr(dFRIx+_>sUI}t0$cNz#PceLLEuE?&{KP=i_l2e(flw}zT0AaWVXu+B{93)pX1-pQ|Q8_@1D z$FZPn+X_?jo?c!d<(hUj<6Q<)CNXEWRS93oqokX0(zr6CV;@_NYhU;yRTSWt5zlpf z@mD*FmKm+YPGT|;dJ+>H%27pzDk?(zhiXso>os+CxM;l+Zu-{M`5QtEAi&a+207HW z>P-O^>6y1raMcxb|BryunFh`I9YM^r19u&h#9`qv$lM-TLQj6oQiSLJlfc4gserAUPmPx7QeR zd*Y{<%bRzdZ6KE?^8H=(c{W?V-zRK{mwYO3X}yu74e-bY46-V&^Uja9(u2zR=Dc^r zO(8B)c!sf&&#^xuPoh9gi6FUtCRF2>oCev_mBjl1ZGtJ8dzy|DSV2w0(+!fLRhjDN+n3x&_-WVfeuc8OZMfKn_~Fz=(!zCsHv<>qZV z-AcM0pAp0wk_*kHJO)7Xu=(K-IB+bm9ObH>pW|Bzod?sL0I?qBh!H9jOk4WugDHvb zdrPiW-et^5Pmjh@qe_HA&Yd(;;jO~MA_9Xdc9-v)h#JUX-D|eUlhvt)JaG{vi^)>j zs&=FL^q>~k`I09L5=ur_U=wEiCJ6I(Sd*A%7mT*X5ocy&tv!vp2XlYh9MoN*D~!Qs zSXz?>oM34;S^FR%WmBs)pCd18y+km;lx(H-OgH|a!F1NXiAs~hX|9_Kbqzj*^Azj` zq}M*)6V;m3iXX*TKa9IK1I8sMryAxk6>s*aU4D7pOog(v^Z~QoeN}l>E^p73m0o?5 zgn2Sguwd;+uZH5J%Gjv*ckx(N{%2rTbv^XfVW+rM-dazg#?^IguFD@u4+NJ5=P1DC z0&aJoZdce($-_ML0`BQJl&e!hRAo!1&WMiOVLvP(2H7PSu$)bi*Y5_TFYz>20a=(% z9Sgh1jf!$D`(%>iDx>ZPR-H6e{bbIry%A;(&UgA?k!^Tvej`i-}b?K zXOXWdpr*A+j(b+gyP@rrtS!eS0lOR;#SaAn{yTE)%0Y%XRv6JOI8OZrwh%r=pphLd9p=iyYnBafpF4JV zRG}_5hYNnZaLM4KfH`E@;xSOcI4TuC)lO#trUJQ=$IXuGP#P(+(!MV&oqe3_Ac)tm z*|0at-`2hwylQN@t`K2@c(_3~IK=n)J4S^tLfL3^`#N=zVb5AsKX8!29>0C-&f{`} z+9fFb&B<}Gin!lBtM4)T97UmgbDKX}Xlo~0g%bs;TM|KpJn@4 z`5<-lgP&(EpC;VK zs)#jW6tdEcf1|(zm|!ekc&?e~$O_>*yEhM5apf{FttfcWC348grc-vJc|L5Y`Wq0~&+=KgWjzCE&N5a`_32YxK&hQdJuk$O9vv*EKIIgf z4R8w^AL?FvZ<(kBG{eR#_MO>`F;jhWE5X@DHL|{2kiJpn0JSb~?(OiDd&OO9tJ6f~Ai*mM*d!EFm3=iwO z17DJ}neZk=w2>P+|CVdizfWvXY*cHaR&|d7A!yd{CRf~aIA3i>GFrqg{|VoZAc&&dbk4WLrYUmCEfFNcZn8V8 zBqh{*=t;S{f-kuRRED}T?J1*2k}3Ks#e{%hLulw70ua!ZmRKe<-`DuY6+hZh16(Hq z!{c!-OG&5K>G?)V9j9WGd3Kaza+{A4EsNUu<3mD{U$!kPqnKUJOEZzXMI%~Sh$7*M zGSE~S%NFl4pe|Ou8j zXHFS7Dax*TD_aNbTS~Vwf2L^qTudn3pi&4kkeX(rs-8;D0VOIHA0O`>aUdp@n&DZf zG>P{-ch>a<;oyC)(41*ODCKtETZ2Wl!s}MwlK!>+`1hmTFOBbpu*c zlq)!v-19Gj^itwTsB7gyoZGN?X(Xh*qTp-I%e>rJX~mdRp35YF)$i*o<}Ho5&cOj4 z;~U<}T5K)CH9mRA!~B}TNO_Xo@6kO7COn;!b?x}!=A5wi*?H;ev>+hQ>U|fbQnnN* z?a7E-6#d5d8)8G)roCd7r znLfR@>YW9r@M#6sbrl^WaZ0kPQ0qfy%7L;{g)~5U>T{ZJQR+YbX)!MVP|P?I7C+uw zn$%_7V;`^O^I|z79V%g?q#_}Qe0xAtz5z{4V1V+)Zj-*b8N4sM&`i8g6q_$4qAGhs zRzjhuc0}u#Vj{Wyo$BR*6_225DaDA(vX@Tsz|Y6(b6{aCMQ=zW5Nmx%g{+d83W-ov z^;zMn0>;f7F-ocr1ifOA)vn_oj#{IeoJ2_?zr;|dH(T2{r4n=UFHLg1BiJd_(Sdyw zrlf(01vN%*9Aw^O&~cENpHQ9w%}E|#m3pUpCr~D>!j_+TXJnw017-|?6bWnJV5QR* zER!y@jcu)V{}G|^i~lbY9sUlw*qY`f5(!Yk_H%=&zdNu0X0VqD#ugPL^>t4kvMI%t z`Zss6>(vBVqt6oCgSv30Fpn8&PChvq(!ZEb_a`oSpn(Dyve8_-bMHr+N=j02w)f7( z$Hw)WSg%$|iODImXN@+egd3=hZyaCOCrxFp{QLGtLVc;J>XXKEn+z?%g!VkdGQgc$ z2cTc5mfO8-UzEm&))>mRj=XgjC60rb{`vkE&NSWWK{HuFFaG`Ge~=wzKzhLMx6XkC z|CyWe|L}GI#*d%cb03`mzJ%aE`I7$y7ylN2aP129YKz~ID1d4-Gx3XspK1OjM>4Oy zHmmiOfk@T07JhqJL~UMa##=t7^ZJM?F#PQF-%q+O7SR3!aF$`VkOh~cF)P2!ygv%h zB81yi{LXmPNV|VtbpExg+<22KrS-Gwt^JmYTj*t|z+KtZrL~3tZLU%vJ#UOjD~yD; zOxoWR4bLp|-7cbNJ^|BAt@4)5i=>-s<@dAm{;{!+YuEd>H9PDEg~FIK?9biC%zXCW z(uwJhWER)e?#C38Fs2mu4VYc7WZvHV@LKZfM2$JOOz_84DLCu3HU}Brm@abi)m(qi z&AXIAdevsUgd}N1RH(PNK%8ZT|3E_5mc8ae-JF{Ib1Ds$DEOJ_24h&*0hn6Mq85HU z#};bREZ^uK`PC*=7Xl!;Qw~fSHILf@YTWve={sN??H|#lH)A^s;O2*)=*_V3;j@9G zX9bhhRaJ&uQUrzai2{)qMJ$!Mw>P?# z!T>a34jM~?4!m4Bnyp=uT@5x;Lp3;)Lw1}6RT7b8HsDif$5Uyav*>0oC88p7veif|;u$x#o>OY*$`iMF9bSEWaUYPx4H!d# z$5_#bN-4kFQY4>V#l)kpcSwbJ{3F8}`O;=5*l0LUU{H?&Cp9&HV>2|tq(L55$#N$x zQNkBrV$H@fn3~e}68YF60aosc5wmSo;r8mfd#LfZwo-q+Z-GIfgU%+%tQD(gW$);; zH9*Q4q;#x$W8`}vpGh1CJZa4wXZ0gYh5JgGX-yJ;6tdLt){JVCLK`HBIdBzdd4Y$~ zRy{3#o_j&SJzn`$(^Gd)4&z+TZ>CT9XfE!`75z#TupI2YrCx{JIJcNh1vlqRWK1e| z*t|)TFG1W3pS`LYC2TxEa@VeUznHx<(WB8EFs>Chhw$*)@l%au5U_y7kM_&!qq%`( z1f$~;;28yLbFyLC^4d~jODrB=9!1fLruHHf6Rcb;?*Jt7e^1wl;wJqQ80EcLX5Q9t zJu9i@6pJXRz}5Rh8sg*AffDBW?5j>d3SgAJVgk7+C_)ODSA;}Nt+@!zdGqP`!xi+w zDO3nsdVqoS#iNpUbulmPOK~|OJjX@Sesa~%*ee1)V5UB)d=jAREouWZZ| zrxvO&ffBPfYD(#oLiOCV#TCnOxLq{buT2o~45Ly9dUE5+zlUUrMp!hF-#wsi%N5d# zF94hniE_+5`;t}V{0;)f4JkzF{rpm)c?5h$;=b1$Ee$_U_3H8)I~YEMb-dHm%JA^0 zsP}i7{A$C)qz$OkgZMb8`EX;E)SC37Tv8G$T5e4iDdKoez!fufPLet>;Q0G0fH209 z5kKUfsZ4PZA3vI1aWLYo_Ykbw+nqL60u)~Ok3B=4Y0o7ce{lJnSIYlX9I@Uy5t^lj z8-naro$789>q)n#!s@0c&?!LwYh`JVxjW~5OiPAM5S)6|iOi$xp8H5~_wQw^%hZn& z{AeCjYNOb*{e}PNFvI*la*~m|AVtVBG%@*)6wnY=Vf6M{o4-@C&hBRc^h}v)kLu(m z0!RZo$pe}yuS*QnDwOjLv4|*3rWCCysPBM(t0li2XdMciN6n zlNerMJZg}5kBlMx z%zPOGRkVwQbrl?;eS3LZ)zaWy#j^&Tb?dEtw9xAxUQkLnO%zfoLFG=7A3=B~n-jV2 zm4EkM;i$Rxq-_O64fh6eBp95O4N}OHM%Sx!1fb*d6N#v>q*Jkm7#=S6o@dAsFE8MX z7qfev`xwG+s(3Jx0M>DEaO`uf_pB!&Dj&Hx#ij2!{$%snZX7rtgr1TC3)%Dh5wPiv zIt*__WO{lI2VejTX4Pk|@{tm3&4@8B?jglpP9mamxyq0TA9%J{SyqMsF6o=+8l9Lg z0=x`_1=VyHujcaB`(SHCb7{#H`jutbK(RJb=}aqc{1%+|U4*gk z@zR~YYxJjBV(`mFj`p`(PF%>;xc-iZzlmBNtQB1U`;z~=i}g>X^S?_&%79@lfI;^E z+Y|f07-okHLa1~)0?Ki2HHv4;*spD)gA-y+=`P`C693dnZ^9T#fk3VDQf$oPBMXkn z3%~Eqg>!FJ6c--fwz&QC{=n}C9zH)qotL0M$pA!+>Dm7B|M&4;G1Zr6VZM}S>Aa_=FWId4qGhutLjt!!RWkpe#o@KNIh zS;6r%0>3(b1HvqAd_pW~_*u)prG=cGWYQKWdJqRLBI|mG;L_Ek;AY>>TfrEXVT2|x zP7z*yfZCzSJ_^5(;J$gBb!FKELPB3uS{rH-^C!Wrrd|BJ>^`Earb2k@_%yIITp&^N zZBMp5w!1!6ocaC?;zSH3U^a2OYY6+cAQ5;L4cImrC8yrI;_K{u+}~;jCW_F6FUp$V z!PyZUr#-&h&Wdj=yEcZ8z^Auq72w~Z=Vr7n&bA_Nfgg8Oeb|%z9!T#vdanKofSbI6 zjpItlQ(zzb11Gcyb0yR)#KBEfPd9XUL zYBlrp4QjAY1kCYj83%?-YU4>W^}lI&#!@&jMD{6~Dp0x3bLUs_(G&L=Cl(`brQDah zm6s{Yw-%t2CsD4eqrvmrn(45+>z~T^LjZH1CcxIQWMj083}PSWW%DS-rKO<-5w*xH>Y+SW5}?D`IqyOx z(}~MBI0yjZ`%?PV5>yGvr;F_-lO|OdQhgc7Ul|rdXa+(j%=Tur0?b=e>(*IwPpG)L z9jB9q3{aJi1_ka_;f^0Fn*eEF+e4E~h7tlkUlQNxhK0qLU4m&ifxyC4eqM1uU26Wq zR?qK3&@Qt%36+TNh~|h;*3oQUS`ei#N$sQI0llNmV)Kr4Uj5?7fI_DhNRH@Q2pJqN zPC(8m|I|s99?M5BCDT_lN;vl4dObA`CeH2$l1fIz5qbgiFY-^$3(^A#BP(!_+3#JQ zhDQ&Tur6s@81Z#l#pG;)LGy|W-- ziRUlON`;9zW4KmjyWV>@(SdaI-IE9+HY;ZUb2!GCXeoK86`;s#t?Wb-f$YN45@Z{p zb>2;HioyBdx8IL-15O6=0|x@!Ul?oE+jFB<-t^d$-;hubECj-XDulsNPbcb|x4*FG z)XTrSZ_dt^95G_dbti*#m3L@*$0i0e4u-a3>}M4TBQnRYF&ryjoRffSf!&sgd>}LX zkv#bK&A*2WfQfb0L~Aa56oBADRT@hk6`c(XQnj7S(}vpF0gG#JkOle*qE~el)fGe; zthCTt%20*}l!^yWY2P}`=_r9WD<3WE>!$K^M#O46;Ke!8kI*nf3x>{Q^0LS-c1VQg z=B}xA5fFEDP$AEL^p5--%Zhy$!(~wu9w&d`ykG9@l7| zmoQR(o96S8q4{1O&rp7q;o`d^knScYv8&JxWv5@6m8B~OxdK$}{SjkbRLPV)(;M(E z!!ho*xz$~j(QE=5orQocLR*&#{TMdqZ&c)83C$_==I#55A#p9mH}5H_&jvH`p@Vao zzZ62$l0ac5LN?ZsgRbs!$eiW}6}yYNSnQ_jwFJ zlZpc^ua6jSE_!)F#@elKdadV}Ve`D_ehbB+M8&rnUpNmQ%GLg6GOS7Ru3_gfC|)kL zt#ZKX_{IY`!>0^g311z@w@8SZ%@YZ1TSm}6sUiztyX@6?dRKm_RYlN7hPt#z-Ea5y zX?8897^!Utq=Vkip0HsSpQsPV_Yiq`3+^oem#BlDK31pJQqQowXnVmNFwDyjvJWBI zl#6uq@Vj!|R$;0@R3moeRln13xj&vhG|BnMLsoWrQe>f_5ADXGoZ>AF+BFCA;aW#x zi@lN%c`i@OWczh?RWV@IuXM5kUPb6)k1`F?MFM<-nyl}G*QeBRIgFl404=IwCNq4a zPObfFl@(yPw3S1fW(;VvY}MGT?FCA|rj+ul;JRZKcrOT{?a^e98hA-5_Y{1l zipZ_gRKdNs0+tD;#Ni8Rz14f#rzWX2>J#o~wUC@aQT)Qi29jFfJst>rsu_^kKUe5)y`%h?;4j2X-nYc`?XYXGp(7>4=o0 zEwKE@kiZ(Z7~{8_QuL&Sj#C^X*>$phXnd5g3WPWA*D1A_OE|Y+%GUx(NVeXD94805QFIxv z;r9+#E%4c&M%T8hm_e$Xi8n?uKRRPNr(qmARxkvFahMY^w{!CvFE#P@#g>1b1@;_} zBG5ZxbA#H5%(Xp56A+4xyvGjQ)PU5br?%^|H+j_IP1}2>Q1@2eLch9&K`2GUo=4hm zap&gR{Fd8i$jjmF(<<><60Lwdgm&C!$Gt^GcZ7V?20<4HqB(MTCZ8V8i)?l(7*QuA zCX;yXKc37H@jNl1(1ZI-pit+QTxq0~PXyu+5F@_1KQ6c#x9PbO{_6w1eD)CkBC;b< zBs>nqZrp%6eRUtIRJ<2Oe(CNV^597;mDvG(yNFXq22GJAgffUZ&4WJO-+<&-NI z5CHm(6Tguo6q269T0VxjSOB>Q=95(mnBRAiJSa}tv(h~;NLqknHGJt?2D7|21n1d# zRM%GqtJ?tPd9E*`*8kXO=M(!wVQSs795cJDlGJui+!u?-3_u`?xbK^lwHZtJI>Sdj z`SE^@a@WU?XB)GCqi9FQUVVL)@CK=_UGf8*E0b}(((buxrp?SH1(3~no7h*_jqfdQ zHZX;yCEu2c+(0D2gR@@DX;d_5Gcs^1vc`F$DHmGXqANc9nmJRx)FyV z$RIY0i710KulW~;JJ&Lhz6~i;^kvL`bGH0X|FK6+@2T>_hw6{2$`pdjM!*cAt+CnC zPoz9l$VTE)a0zLr|gi|VDLxU={Fpt$Yk-kR0TFCnAmY!`PE7fn|y zo4$wE;3Z6WtMVn&q}x4vodKK7_N)QFF=~{M`;g`F+S1>6(x|iQB12&MF3>K+aSM~> zOZfe}xN9;rT1Pw20@ve%&XW7G9_;_0#QC9S;q_5xazIqmgYb76K@VKy#s7<*9|-sU zN6-Jau=y`JM=$+;3hqArCNUF4?V29U_s@m(c0BIr#@xb$*ZXc(nD*PCGgUwbHbw~8 z9APUyDO`mSHbh01mOu^0v!6RqmY;&s_(KMfg3~U^gUm7dx1)GO!96|S>bOM=^7fN} zB(#=!t;?Z*nyWW#r*YBI`a!=oKdR&kAHUW*I*p)CWyE?D>~L*V0J{a2aa21mQ)E~@ua)9tR=)TILpUsvwu=H*rS!I96_ zIVYYt+Q|S5_|Y>VSLR=Pzmoz^a)xVaEq-~_*7^WWiS(1x_6HGvT@-gn=@|tcicrf? z0@4X}0!p{VXTC29&Ufjdvl>8R9!{=PocH0tV7dzs)K#|atQOlro|nkPsgdHfhW{af zxjavsuQvd>DF_^BsDqT=QLX^l6^+Qxq#dC2!e9oSfhXTS0+~i6bdK;#BOp9PL8<>d z4yO{_Esz!bfZkWncaN`p^zmZpzr3uvT+zN4hjuEOYcQ4kL=%Y1r1a^oy=OoR|GGY= z;kGp41Q!&FYIb(K1t~|p<};gsiPB0My1G{J);;aulV>3a zPe<|XMjP{wrY5%D9C-cH^)wZ?8>1tosrLyPhm``ax4q2p47TNe))3?tR3y-KzhE;y z@zlHVAo=;X%l5UdaenZNGvL(hTJM+3!911f%($NOFi~;TtQ|8&zpVI~Wh9qw zNFroJyNv5(vi!(x)Qu$cC4S+Elgf*c*zi(Rgu|v0n@$5*v8+Fg>`8{0 zxvsJ7^^%aoNXu5ZMk#QZj9&BfKX?Q3p!(jX0dU9r%A^6o0R!(4R@kR|i&^eezg;;=+CV1FfEp z-WnC?LfH&A<%kd?lb}S_ay>z)B|~4RZ)BA1SfB!i(qLr$Ql#7V()YHzPg zEwvyz?*4OeQ*7dR#oUtIkxaBg_v0ynVH%9}NB3rDEhk{Jm8J9V)La%hjNfO(8Al$Z z90k%Y0B*J@?n#@1tB&goz?JTdRRov_gDPA?zm>N<0+7l6G5vcxTh89W<7l2}tQ9?) z$SY#C3E`;KQ~=UB??~QLK+t)4>e(X!h5H|K8Yqpm4@ty4^&Z%bE|MzSbUexlaLb*W zm-|JMaCP7P^qBO`sfg6I5TW|#x8r1RNLJv61P;y;Hl6{rf#p|8vWqy9 z60PS;vT7f9N0hTqt85rNj}-4CjpCw>Rc~Fp zLE9?p!)ebQc)k7YHe@5J9^{Y`9Z5kiKCoPjtJSOZlL4fI*^g<6OF^zlE)xBUBdb3l z;-FD7DPA?cXX;f(Emwb05>a)M4G&~`JGaUYiMTLJwc&a-glLS0HGydZ#To)YQUA?@ z1>g#zf3C%SKg}ra)$z%0&?)Xi@1q%gegWzDPb{K=YuIIx=i**E5GYf|vME7%jqJ#jpKjVf$*Ea1Jvx_mbV)1wGE*HKu#z2i5h9GLz3yQUQ8Ak7+SuP2K zbaaT`!sk`mWKTRRrTwnj6mKsZGiQK*%fY%B0;j??9G7*l_2qN*5xy3|_DI^t;Atl= z^bA$o#n!9Ca3qQ#!g>hg`TcH~*Ia8oa_PF^*5@aVqc5AQ#l3Yt`^sXuh`^f4vUNk} zjf=F(d;FqNQ@3<@WP+C$^hUA)m@dhsZDa0%1hl888@KW+q}E6S+MElFE%4o~ZgAGk z5{RAp^^doVo68%9L4MY5Yy=?QS{n%J2{ zM&dlF3JewPUiAAwqdC%}Ho)u6Msf06r1DbYEgxTexZnJHmw!I;AO^T5dY3holCT#$0w?KAwTQT=+(0iqQ_}s-NzH$seLF0#82N>zV!9B-y?Ui{VocDX*?sgS zU|RuZJgnwIRx4ogbQeh==1Z@2EF2MAjC>YGON>fGM^+n&wiI3_G0Bg+=x%k|jPU)j zoy27W(ODFAeloOgU*FcqWQoowddehm@tus%e2T;sY~?_s1@5-}TGKHIOcijgo^LXy z;E~f<#;HtI5bmV{jasBrI!o5;&PZRgDQPaUikl*km$@zC#HcFmn=Q4LU!Lb>TEkBn zbp9}qJbGc2&=s;1Ak#;61+R;(q>LN+&|$iON*nL5-X&Wn(UWUT za1D||web`eJ6mQqwwmrTRbzl=&fqV9zb@?`eedx@>*#g}y|k*)8ce0?GqOgpAEL(2 z^JdXwNp3R71dj(==^%M>HTqp{xx2sT05P!VqmCy&j7qy zj)`s%ec#IaS>{};UgBmNfXGd3e@fw;vhSeKBfN(l24potDqF$Y&q zwh|8~haVX=u%|e!qfQtn+BrQalUibP?BT~c3-NMgT;YJ$=Y~03)R_}=lZ^!NX6}Az zOy?|QccF$qA}UH(rJY$eCS$zxsXf;wi^S=;9f8dk|A{3X62}Rlyi6p>rIfjiXV-C0 z+UE%j?o;Ny35=#lDEx$gyOb1v6m^V3rJIT|Qh4!jw z=2h32DZH#ms*AakFuu2>X0jtHhjXlW<%I$L%(Lk|x%W?De@(9AX7 z1=8r06#EyfS~)jKit>X-uMvxE&ZXS6RZI|!pTOgJR+8JPRM2|klLhzmKl_aj55>;z zlX(YuZg55W@{x_QIZmfh+n)~{eGfCKHTjgLM-VZgO^zwc%=?b4S<2?Ty0;h-Jl=>c z;V$#rv+m>Xhw_=+75pfW;8D2$efoA(>J%Z;nK@%Tts)J*`f;FElYsUcjZBo{BmL^4 z-BuSupHu!GNw4&qRy?ru@}Cw#sYVb3dfzl1xs=f?&Y&~zWX+^P81n87=nTt!rUbfj zvnIHUQBT+iB^p`oHuDDo8mcq8m~HEo@sMAbzKh?yAzIaice z&my_w4tFGE15#2PM9VS7(t+Wilw`mb2qgUS8F5_PEwspo$Gugvvx%DCQN93v&m_-{ zxDQ2!tu5JK8u!BP+<{8?Ds)X%HX-y)A0!yn-+WqbJ4VgEW3fIc`MtcW%V8hoDf~3w zZfvCcdFh7j8=AV+P;NvsVH~<>H-jHdFX7=cK;`1FOiu!2f&SD1-(?6N`;jDi!M<}` z*>tXh%oYl(Me3`?(P;IA>vz3(#D(2L*x2u*fYH{}IDSz4FXy*@6R)Ql*s=lSXO8$d zr-qUPPy+oWy%-rPLN4i0HN)&|M)DL+?wGPYL|KJ`uLNqGYt2yc%#->49b<2RRgHu zHs`uoUWS7%b<|zwvUAtp zA)&^06K-51;X=#uzKs8*ALeZ zv=byP^v!wyhzz zQC1^4+(P|?DYx!CVeZ7&*@ssf5zmh5f*chE;lw%k4_Ao0f!}NNM~oV^w$iWXWZ#AM zG61-}YhzJH$0+fU&*N`N$wGUomym9KiFZ5cTTV)RzS`SySzU7U%k!DNN#RN)`dDhl z+FV>^EFfl|38Xmi8Ob|kg4{}(dG}mN|RUW+DTrC2E(!az|Vgb zl@zx;N5sz+=6f_wHd!x@G5|9S!tH3aY7RAIFg{5%Hd>3!+xSv7np>K)MnYFo&%{26 zY!nS#=XcPJdWx_y&U?88%nLi-fT#lg-1AZTz~9ouJkO>pDx;=_X(fhaKbw|N zIhx8PIYse#i7DkMU}e^CO`TElbHk5bllQ-MKgt%GyUzSUm=PXEbq@1RlkkON3+$4C zF)A#=ms|?2pQDn2>;g)7m@mB)f6=QGP2lR7%y~aCRH^Y0^i?DResuhBK(bIH3S&F} zis3r0h`iZ-)~&ET$TY$vxoWOROE0BtZL+LdJa6q77U^F$fI>(zf`uXGKmrcPwJf0V zjX;!HAc|hPTqCW5CJ!U|atfi*YfoMau&niXS>E<{L~|=?F{WlncFH+y5!mLBf7DKhc; zbvl;AesXjn)!r9GoS(+e+w48Vjq>cW7LD7UHw7Z`bKXCijN~=w?!moQ5DMP>s#qUz zqF!mHz?)UkIK)1rZMZ?Pz$WSu9dxeV78IwZ3ElH{ujDA+>te$O1%G7pySJ)+tD4PajEsez64v9LH$=> znMmLihP_F#MP>@kA$QxPRrHKA6XO$=mhN)#tem!U>(4e8&R28i{3G3FY;kzI%dq-+ zSVXU_Szyan(O~WX944*3KvmajycU=Ob`kG*#v|+qBnJRaY>~n%Lam`)ADCKBlW|g^ zfnv!;%f%`=z+4Q-B}|zfm@n2BdB2#wqy*}fjd$9EL~BoJjv8A7t1XaU8Dp;&w$xGp zA}52jDGELH{=($K!IAPXjhpZ?ta+J2SqPiBEHtCvahs3KaU5JgJYHiSv*ywt*RWRt zuB&zEdY>v4wH5*s3v2-LI}uR9Y>RCyb+bx}cT9#(cW_sZ#FhWEydoD>!z&%Q($h(gdK=d+l!E9f24t7;} z7d?a4r-zpQPKvW^r*C$t@+B~Ac=Ob@W_Uv>0akDoqhF>caYT-=vU{4gc3O||Vp~}#r}3w{Y)Q znZ}VCB^5{Waf#`PrnjK!kT2QOC%%$!%X(*azFLO`IjO=3dixc<9DQj(H~0=!y;KMl z_x{i`G@f$fCUNl_VFwF%^4=nE3FC|SbOQrV-13ylWbX5WiHWMRr%E9V&_j@Gb@GVD zeHw0N79>e4;pTX!@kQR#w&0q?3GU$8w=`+wzMoM!M@RpyvA2w>vWvQgl?LhV20`gK zbf+Q$q9O7LOPT~2;ai{e%{+>d}F-h)jx;9;hgK* zd+oXAoNHfur4($WPTH>WwIxb<|>@+YB-;#9HT1c{?E@_sqZ+xIT4nVhAibiAayas*N&Jrmls zaQFez(rT!T`#KJr*Y54MX7#NiF0AC75HXp@XjCI7Dy^mL48&Y;(({OIM_l?ynLb|Y zf?>^Fo!~a#wzI+aYUgWGz0GXE*LsP-*dp?ETc`>X`DG@T?6a{y|C6w=Y0YC$UeTSLR0Htv?kf_}!qV zrvH)D7DquQ^TJI**p!HOX*6odVgYuwclT~kcPWv>sVSpQaNa}fv!H_Da(`Jpns>ht2f|YbD`@%Ax`iyRwIpgm* zuTN55t!q40tNdITDzDLID&O)&G_Yx2f2KDTsk)ih7SGK&vAD!*P!}IVO8R(T^ZJ#r zG9DuD?uDNFw2wR5Gke4;#YL~2yy+-CybHZ8X=t=~JG*b|h~1u*@C>i=&{9#gF;q-T z6QD4p#(QF4f!Vthf_-~D^`7@j&YKNil)VJWmv1i6PgSYlD#{Pcich`$+F7}0VJ^bk zD!HlTs8{*Mkf2Rej{C>>qq5X}Ii&-{bmZ67)nN>rws9i7yj9_aCygr6(R-UldpGy8 z-zzFqbO8Q#5^qe2_qSWYlr!5%KTZEaKcM^ zEG%64{>PtY{QpXXR@=L|)`PcBMzvg5um1??k@L#T&K=DdPfqUA(^rf+t9{Yea>kXd zb=de|VT_;Y)Z%o`tWI#IZ>Q3{PPQ72e?%^2c8f9Bq%Zb`M!dIcC;lgMiCEE79HZ&y_XYAnEgdh53shPYp z(D3M}9DT~?SoY1~8~b;k!P4X7ziLXS_(_A@+(%0e2CsJKRE)g(Mf7+5UYL8G((C1L zB$=KvT4ShRH;C~6rnVthz-OGNrgP8TzxcljPmBX}tq@>BWtDZ5{v?168qiqr|M{4w z!>qEXQP};5_5W{r@xM0s-Dr57)c81y(p|lPR6ToG1UcT4(3w-B|2+29Bm-mD}no8J|sP zUbHooHC-1FaDv)-c3BI7FpV7_A76=x=_zIr7q7VU_Ad0)GM2^TUhr_=Ul}l}a*K+K z`y6_zpD7mhmL{K~t_vyVwE6WtU6r{RzwU?sM(2it%idDYuZ_vc@o_It&*8Uv#W&J~ zphvE(_kMxJLHtcu*WK;8CR1S){@XxVKI2+xPR`b`V^It&tgpq!Om*?bryGGWgwz6= zHbZ&$KifBK<#Ft5v51Lz%+&h9QL$pV3Z=y{NMShy%gpZeAjM2cp(TAQpP>_se2x3Y3lceD;YV$83}&q{G}4~i zM?cqeyNkc}b#~%ix-?m8ap|`GFccn$m}DRS82&NxcHnsdk(2e#-roIccivmV2!iQa zzi9O3z6?2&`oLU`=dI1ni{sba+(a6Wf3AtS%r^%H2A;&BwJ0oRDMj?Ylpw2);YnD4 z*D<@yiNnLgD$$f#7shH_7O-S9q&yst_E*)(>ePaQf}rWu*eAc^Un#uz?-t(5g;&@_ zjLmZe>tUCu`Y)UE%Rh*w;_tO12w7ZQwCGBqVG~nOP>_|CRd@KcKHd~Tq{d+S8Ye;iBEP)Le4lxtD<&allYBmVS#8O5h|mX!fe038*dD|6uX8^D;DXjJ8&1 zqLTZis7c9lZ}!KJC#v<9jKqm>K~0Elua+lpppuA!gwL<_s4F72!#Jv8O#?0>*8LYI zhCe&p_av$kVMnVh)c6LWW0f(EeK1wJeVaTf7p}2D=U{Wn z1t-RRqRa+`PY^t-=&>t}&(i)yEuPVuKv{mgKmPS?Mn*>QtoAh+_tn+aw|CzwN``-a z{Z(5sC!{os8YVj~Hde(G3g;79kJr8yT$-T2?A;tm5+F|4cHuw&=g>V4mF}D{*cDcVRjz*Z1mzUs8XdJx}&%=3E{aW8c{<;$( zkIipV9-GXZtT)mnDH2HtkZ^q}XJ5=aNUsYrDMb*5eWQLBLY#i>8E1n^KU4QBnQFsI zR~)rY6qYJqKU%Yb)5R$l4-exiH*P*xx7%FZD+BN>RjFm~OWcFbp*#p}77KD}WPcu9 zmjdCexj@$9qWL`>!ya|wlp$D>&_vgaj1)cB+0|93N`5~~94{`I)l``1cBOhEYdGS) zaozO5K#5sf+)CN@WW+;xkC?1?y7@QfKE}t#3krq4zFVN(K<%oO>&!YU2#ukd_=ZP& zd(T(u!PZQhrK&0x>vL{hOMnmvN?F%MoF})xc>jcUbq~q7Gj09-{Uf7n8}0kuP%$YH zZyH~2(-5F3gr2dWA$F?q6B}3S=eW7K`?;-$Ago>7oo(?bu7v7FRVj_mW)q8xu$epd zy^?X}AI9MpF#f9@N-cwLiMN+m11Znsp}dtL4D`y1wY6?n3U5eANUXD=Yf(|ro_?jwj4^;S@9|hVv3b@YL{@dnXt@h{U}^p37)Kvi?(HHxJl$i-*h!d( z3**7T^%OCy2)AhlNw+}D2CM`PUtiyIu>bl#x{-~oV(NowQ%nhEV4NH)D;jnqsfi+L zP>mVE#>SRdouyeo^28yMBv5RBb851mlfA;Sht_`nme?;=HEiq%nDDth815G$HfSXR zcq!OrxQr=c6N{^>m43(WW>jc%BK-`$;iQ$7l{B|-;_XM?P`u>ax`vT(MMV4s12mSj zj;OhwwGfIBg(dSVM6>Klv&;5uL+dmw6UDk+*Y2Jk6%280dwU*sqRwc9!WU*!Ypzf> zLjUJkEkD;rBM=)?)l@>|UVD}c&bJBFJ~_=WE|VwfJjW&Dq<$5_|IB@3;^+GKP-KVi zUk_^mKr#GU9m1A*JHUkQdq_JcY}NbDuyPj~;~uP!hu~B^iNWdU=geU-xhH^YA zzL=(1LlXm(VX65wHmZ|LBtc@cwxN%buH3=1@vo}#ns1JRuOuQOYO^{iU4&;-s@+*G zCAHD-m^lP%Woqu0;mW9$J5II6GsPF-yoh{iZfQwdz1v=_$%RiS7XG{*nzd>hm^t$? zGhdi6Uso*0vkOX0H6vNMtNjM^66Ne(jn`iPU9a-WxpL}}piXKK`KzlR(sZ&_X?$Gb zuH1P8ePIa|JV)N#*;rp^R^qw?sHr_$?lhx_3@2i8lt$I}a}HxpU^F;D@ST1?>%S|) zU;BW#@;v=WC?ON1%&AyZMV6o$+5dDIyAdQ{_x0TqimOK`)T}TM2E!q=;_G`UvGDzS z*ekjq$a(J`eDR(h!#~LePzcACcX@NWaDI6?qFB$+-kD#i&bbigf%J<|?M@FiN#sZK zj;D|@8x8uOFUQ9D;_>PE_VlI-qSHWsc2fV4#(E=XK{gV@ZLZ7G7X)`MvWnV|37838 zVy5@QlAYbIsYL7_LE}h3$8b$01DjhUtwD*F320l zY@fgc0KTw(0<@s1&eS9%Bn&@Gm+_%IA6k|H@Pzi;?@wW-2YVD5*D*rmwhM0IzFav= zaH@9Sh{@unp9CI|$fic?!&2JMImUZ*lbq3tj1b!FCh2hJm{|`E7wW2^!|Q?0F5u6lGgz8OFMBGAiI~3 zPt&vh{MS}0IJLil`bb;#(z`WPV710E*jZVXKU%)I9<1f*>3QRo^!UA!P;%l8AUi8l z0|Ag~FCYafZ{=Rkl16Qwx923p$Hi3; ze{#_VE|aDT8>M}A`dbG}xv6M)`1Tkn4_*Yll>0j%k*%|u04N!%oYu?Ui3Ksa_N2_;0dwL%%K(jB;>rWVx8gS*NAJNx@Q5bfjLJ-z3UzKxo3(QN4H# z35V;7I}65Ts*zAcmJ}q%7y0>Cii&6kjGbYY8A29#Hy^?gvC=kh-|sX7`2Q1Gy3F;` zH(yEPItXp{*?z0oDXu#`nmPMDvyvQJLg4m;O)XA2U?xwKZUwVy?zKv^<3!mtZp`}z zHJ&cXSMIzJbDGXpBRY}t+@6KJI6LVM)PE&L&f5&PXauM#Y}`8KZ*ECFIK<()bbS!o zcwa=va$EaKkX}|I4&`#ZsO-?OuzKi|s?-%zOJ7ZllMh@a%HyNpd3QR{1Kc1})2qavgVzFd)S-(K}CFl`DiKwBho zAWRNo2TbVlbiJsqp`m01l+X@;so_bcOX~v5g(J2m{v8QGoYl<4f$LnnrCmeCv$H0P zm^xA}^BAO|Ds#LA@vK60#7tWn+bYBm$V$GdM@Waj7jpYC%)Q^An3$+KLnIZX z*zh)-kfG|FS)x2KEUm2A8Xz0gA><;th^WVMu01nhZ+-tDBRHBS{Rn8?z;}NAQjGL+ zQ#~%0+S=vrv>{jrIf3FRMKQvQb8~ail)S+unrT8UZEctP9&4+!2j@`o8Ak3h$GI5G z_+q{eG$vp(fG(oYft`>^*5000*t>wx5E~PLwnH;t;d|(6w#U}b23&`ZFSzdmS&pSS zhDl04p;^?(RJF%|GDs%WchO&shma#8NFgZPfnT&{8aX;TnwT)-3l;y|K3-d1E{BYn zZCfD43XJ~SShT8=Xe?(-$?>lZIx$Cj19U`;(yz@ayOX1AJ_s~=5o_Wa0-8Awn&koN zTE$Du#I}(ii8hpMVlCT7FJVv##%i8yZV86;bwB@GsAA95pn6*(&NJQSl+>B>h#11k~|GyHJVzjxpq#?|Xp*3|{1OFn*c=WU9|CFBPB zWHqEj_%uk44mY+1yZ?_EIDfK&1a&3;$&(2n|F>?D@)>Cq^q@O5mj9mq;scNq<=8>m zDG>12<9@zsv#u@Wl_gJ?j?t)UN{ErBwXc{|k&TUw|NHdkysoUQ|Giz5Y|zx3_e>Giexok&!V21h~kk`WJe}cMz*y zdrODM$JzNM7=D;A@Q}DHrtQ|Lm%9GSdkTrKUdaMkfNb>{vL)y{&@RxeT(CCyOmJ-+@1d-`rVijv`Ch&{Ds4P2$ng4SV}{ zw>nApecnOBJ7>csF+JPc+n1>LsQK3{Qsw>{0=!TVnAMe)1oYwpTYkqThr8cFdqIj7 zl3ln@XYAeDb*SLz$VZPh(_VpA616r5QJk-pA?vkkZf>5lBk$lFvJfpLDM{--zqJ+5 zhcS~Tjz^W_Lawf^E)U)+g5c@Xr>v~3nRWtnhW0BLV&v_Qj*eK_16XuEeE1+hO;+1&bgK1p%g9hZ&-vfFEi(^7~}352UNC z^X!FCtkOY%3VYfn4QCur{Qbt4i%#80F(S1FUI>Z=5<-#Y73fS4h}}{rEIO82%yN7Ut&6OJz1gnJ%h$V85t5Ay){kua~FCR8qV_jxHNP zlz>=_^L@^5OgJ)GW&`Y5STVmp2Jl_`R#_96Zdq<)Ehh>80Yi8Bvy>F9t)R7gpZ7{& zT0jpftEnj=nN=Ga8dSx-{q*!k0Wao+p&#ETTcC&Cot?o%a2M}@&cM7S-h$I*@sFO4 zKALq6gQw3V0XV6U#Lcr_+^YijpH48}H6_Pts zc&lB%UpM=FRZ41-SZL+alP^FH+34%o60(4+Hr9W@1=EhePEZwTJ6c2#7Cb*I%x8}? zGuIRmdss~)Y&k2RU3LL;4QxK}OLo?Qhj6n&D@jO6wY9a; zO^}n4J`8QbH9>?UdNSnBmNNpvuQUYJ)YO~@>1*XE2wNrQyYCG!xf>{~=`jIR-slzA zI?c%XsxHD>`pzrRX$CG1cuw8-y}p3-yPkYyjw_OZFlg@g{*ab4a|KC`Ie0D!S1Q^g zN!WTba(WSSu5Y0#}pb>RpjCo9P-a zcXxMT%kIED`|(l>fPA11A$ky}@RTCjM5Q^)k7+#i%X8l?$Ye0G|N>v?~_eEyy|nJl{D6V%fdj)*k}cppG= zU$N#aC@Z-0jghyb2`ox5t4_E**o)|gdHMNt$VgpK(2&n*krhh-GtXbVz^e?B#>B#+ zowMqD_1M)_v1EtFDD2}$;g{Xp>`F+4?{Jf3#w=qh@5-Q$RL0HIX<#m?Wr}*%H;q&L$=xR;Ucjz!YrlXYfDHbOZPg!(`P= zqVEiI9!BelZjSxF*G=?Smu_+#@%Io~g|`a_A@iZ3q4f_bNuBOKuk-Zwrd86es5kg* zk9#-?eo9~@(TP}p@c-?tj(;mKvi|WbC9v4t?d|&SR=v$=wLNPv zDmm&T6=9~AnS#iHDJSP^>g(&bW{wW#YRsu>3wm|{0`y!vcMl%{DOnhUc2mXEbq3O3DO?`C5J`|y_~;vksw#HRz+WNvtzItAKU zHOITM4^K}H;p)4QIp{k(J7kw{mX(*6fBb0otwPYey&`phqdQ%SiZV<{$q%qK#26z~ zNgu#B+*MLSVvdd};$UOa1EjpyMCiK+P-&(@t)U4f*{ZSH#>3tKMd89h#|K;4d0-}N z(+#@;x>yq%o{fcR8XM2R3dvT_y`CIQMAPT4*pO*m;5ltQ1Z56THn#Ve@rJ-y61fc> zue5VO!eI!>UHLER>ITl*QSBxrBsd>z8mafKkAGYnd27WpgS8#_?j4VzO+`Y?mPNCe zd(gLUh6}8r6f~`Y(PRT3(k?&1LLs(>@*z*t=m)>^I{w9bt1Ez9He1efXCCt?u;%9k zRy$g5uvymPVONMajv6m9yI;C@AI7c^|qn6GIjUjREM^ z8cE)CQvX-d^iXzm+=R*qr{)W{+4_sVb@vr%maxA^403jT6@&gR=MC+{C<;=BckkqZ7YB#ZH&axFtvg|M-7o1)eHW z)`JeG=_E}a>CC-reO_kN)Crsj<$vHC6mSz6n5CIQ@KHTCHGg@9ayg_YI)xI-)sYR#{>LE*f4Z zpb+GHN6~P5Dw=36qao6AT!75BHN0#UmLd4@QC6t|qL4C-_o5S1Q>`UtCo6mo_*~2E z1>kBjE*d9;I{RqvONW}rL|xcH8O2zq5C})c7yrJj_3GYHU_cVu5a)?YMuz~R{&`#4 z?(EeR_~Mx-#p?{UH-c=o1 zraV;Gz}YGfJNjqj{AvphP*$)Vg4Cqr*5$KT8=IM# znVL$i9&d3>C(nBE;ze!AKZo*#ANmIgbFj02t8hVY1aDocU~oAwR@(oB+DLA((4=S8 zI9t=$(@wB{dUkd;c#xC)PgACF(^|XP8&OeFAY#Iaa9Mc#_r1!#g8bNzOGcsg_uVwE z%-m40)ipO~w?$h$L{qhZlBV7Gsm!b-R1~dgt)FqM(8(wEzLM$sXA)=lo%6t7kPobF zO~c236nwL}rA5Z?X!vP=xsJ&M(70S_hhPdnyhfdf)uDVSiZC+qWM!D#P4@^#__2H{ z#)#11);|~B)JsyBPoVIuRG{VRT3TW*AxB&Y)d>JgcksDkl3+MX)=~8fZSk>Ybw-ct zRG59b0`}^R1 zXrD{7a;G}*Ufd2+rYuc3&pFI(^7h!r{du4(<+PAcM-%qmxAy&j@tg6_UI6?i>YUu% zmgZ)8zi!HXx(@|l_fm4-GKc(EQc?n>9`c1Q`~XG3PhV5iEtw^NhupY!?eJHjq_wW6 zCn_Uf6M~Xa)RtWKUa&tjX!;Yr_%UiC7M7MTC|1OXWq~-rFx~&$(?@4JQ!Arr!j{4; zOw7ZU7!!l9@%oJGjNGA=hewE?HyHhU(Cc!WADKY)g`$muv%@03kCp!&LgWIdzMHYyGoaNf}EDt07|}r!M$n1 zZ2;mUBcFh3qeiEuzJM=*Q~2OZ6$z}}Tc7R6K?<^!eizsyPR!C|%0-wqVn79p{-*?# z9~M_usELU$7=5H~{WlhQ`_sX2NlGFg%;>vtu880%F;P&lL=B~(2G7#d8AwTYH{xqU z5el9F+;CY~YJ%Zj7Z&*h1e|x~Ti*7(0|o#>kT?(AEU1Dt;a~tCZU`b~=rUbmd42AF zOqk;e5pjuLl&-q_eZu8Wc`AJKjjwyF=prVZZ7j0DgW zCjMzgLEo+&Xwf@#5;f}V*I*OhQw4g1wZEgDW4_ZAU~IqMyA|Y2{slxDm_%*Z8Y`Eni_jga9hfx1n2uWDj%|TGAO)0C5mAiwy(7j5Oj{84DB3AaO6=yw64II+L{E$($R_**Ip ziaX4OfJR5h$N%S3s~+P(J}{S;mv?p+kn}JcAia&NxCd@UMMVW1EDOc$#%th|nHq>U zi+`5qqIPJU13O6u?0k&xw-uZRV=NYs68t#y zPy4`s2oBQ)hbr%%SN@0Zz>j!DL{@+B7(NdDzmNOBeru+t?`4L6KM)Qs{FgDwBf+*f zUGTEZ;|Tn78R3UA4{AIWvNg3b3_ky18m6gQ9o^kEperDioU!rB#4fL%-%_}#Y#VI$ z0)blxBYoz%yLfF0&Q&(~^DFAs7r^zIm@>fqIB6>+I~IN=?RWU&4ky3sc^-l5u7~Q2 zacU(fHjt9>^b)&FA60!Gh%fjY-`$5LK{D6UrI*J4V1Bt}+5dt6=JE*BY0b%0hTeX$ z4$q&jNJV4cqf^(^{PKA1F7PuDQ(&=B(9#|;Ra<#H5NUnXJN9bwZeJa}+tCBV{i(46 zsq*akJ%2}|_-cwMrUj+-_wA|3#1b(!v)8d1cBq5ThfN!FqmFcEF9IB=A}c7uGVGQD zR+lYrE0^tT{d_x+*s6v48F^KVl?`%<*+ckmW(Fss7O zhh58u!dRjif*;1qPBruQ9i%Ir7NWk; zX|0S{`}V0Wcq8a1voHFqdc2n^jXunOls-58DdO=y_57Vj+7YxNQp5C%`q=@KKYmYC z9oXo;*IKjvVsLkD;I-|+Qjrm|(#_$=U}>IG1gGd_tu(}VcaBzSyYE>H)PBIBg6l-e z`W=bw9ixZ z!G9}-ssY?GxPK_(KFK4`>D<0YR9sLe43h zNmIY>TWnO(dVszD40^QpditovGEcFCu9Q9UtLfe_A>HLqlj4=X!>?^1Za9{kKAaR? zxc{DU(sd*?<*KTvv1AR6KP8bvskL)0r|0 z-+0<$OV#L99DENA(<>;&9KS_IKRu7`@|G2xel}l1GyZRw)J&gWbR2)^!S8N0iAaNd zwkh-x+;JJpSs5S)QqHsWU{>yI0qumHfWFP$U_9MS1+d!r`Sa)Ap48(XNp*E{?A-O; sz(1iX3Dqaq#h9I)ZS#g5@#~BT+ttp}p$SQI0sdW6xv5;FXcGMY0bJ6)`2YX_ literal 0 HcmV?d00001 diff --git a/windows/security/threat-protection/windows-defender-antivirus/images/MDATP_23_MDMStatus.png b/windows/security/threat-protection/windows-defender-antivirus/images/MDATP_23_MDMStatus.png new file mode 100644 index 0000000000000000000000000000000000000000..b531be1c10c9308aa83c49bf1abc291c8cfe25ef GIT binary patch literal 5299 zcmb`LXFS{QyT_w7o07yHwPIH7QJV%aicqVyt5#K&gc`M_h`nc{>Zho-w5Y98#4c*p ziWM}~DuNod{^{#=9-If~Jox|5d2oO4@qKVz_qwjn`%W-N7%*Pqz61aO7>x||EGYFp zrKHkdpnOxP?kP|zDt`+D9YFQ)m32yo+7o690|08$fF~|Alsp{+jvz|{4(Q1$x0 zasvQZ4UP0*R>4lciVkkG^)vULdf&bU5{MC?&qQmnQLPoE-(|}G^4R(l9Gvmtro#H#jxhMk|uAtwxc6jyU7JsR%@5oG=REFlo%|-ypha< zR@XZGn*;S25D28KsHk}T`tZ<@YISVv`nneu)5;ne8d`=?Q&U@L3lW;s>-ezruArdc z+cyshjqpEv^Q}RtK}w3++KUqt`23=spzzZ_IWQY*Ysx>PxZY_3qGI8}{eXZEA3x5I zf5YSPSz=~d5hvfXrwZP}PkK^#aEAd$JMO*p@BNlLX^^Nq;%KQsnfPoI(ls#fI#4tR z?bRU_C4KE$DWozA3WeI)*WMo{tcyUAekNd+%V)h3o zN4sonZ2Vebe$S7byV++yh6aU)f3(~W$;`~;(+FP5o+{ojz|y44etx|*TW^e|B}>^i z_?fQ0sjfyC87;HB(XVxUxT|;fnuJ6rKMRYct*xq}VgQ-gJ@ic301jtlVp7YAFi8?j zZE0;~*miCYlf$$Yy>t4Qn3Ocw-yd?kUo~+K85Nb$a~dU$6elGmrSYmaw0L&^7(n3} zR9#$Lu9ODzX@wbLVwo>eHJMZMF0w4jy4N>db5YM{Pk!>`NyDT0ON&?5QoUVD>gsma z2J;-=>)tdr?%@4iS6dqeA{`%Wf%vts1qBpazj)OHw-49HD?}Q(czCXfi@y-UHa9m5 z2??ptklWfcUN4g%sr1auUhy6x2AMTnq$Ca*d3kxx>yGGezkg1-y1MdfN0^{ry?d8t zI`~NV+z5g2@K20n7+tBftf2Nrt9N-=T?Q4{nlFE?vL78C-L!q`lq(dmHjv{p*TBZk zj?%x#cn7P3>;(LPU7_MfI$m&+mEx?)RWY){?kvLBwzvKAUCT;R^m}@H*JDzH6Yc3h ze8QDW+)wCJ0&2pK1LNpQC*p5qGQzNGWHOmDH9Ffb>py;E24cqbywOcaR9q9p*T<*q zApCe=j`yznNO6Q$_3;t3yV(4+1c6s zjTv2cwR=D^lBmINXPc_Bd`ZpaLv?kk^S!h~8uLgzjgT_YxbZIQ7cXivOG`@uLqE-+ zO>BS!YfLS5M1(4}@Kqwas`RY_Kf`JEF!zV79hg5aaZ!WicHBrT23WwlD#yzOa9qke z?V>+g3XHrXBh|pplT1kN_%gBZG1M6sA=TJ)mu{yYNDP~kl>z73dqW2yp8X8Bs3kI~ z8E!vfKZWF3t$vEWC>cUow8^huiNc?|(pUaSv*&Xf)mZ_6^8Cs~9l=QxBnp*Defvip zRp2J!>SJnTkK|AxF%e9H6)^SZo9qu4sgErs3jZ4CojO73`KhE|5R~S;-nDY$)$7;) z^u1Nh@da{8iJE&x(7jk{b@#z5AU&ns%n%87?!9R*)c6I z%~qr>o{MwCg1-jDm4;QlTv<`ks~jk%yE4rnpWX^Fpxn*NCNVTpgSW2B%6>BEy11K| zn)=Q7wnY4$uh90mdq-4*{^FLx!mZ~{%jN0b%xua|XM94~9it!FXqFoG{`#=ln+qa* zdgzW5Rd7-l+j&k{c=sSI}*Lj4~bb(hFB z3G1`*X%F}&ntyc<-ZHDtncX;<`v*W@TOeErmWglT#)8h_zXM zvssO^sBh1`d>l{fNV*FCz84mhdN?_?>tvs|{E5pLW!SY!?@50C;qhl&h_8m?aZ^n! zBE{3Oz#0=2aLNUNkOvpLb)LMgnh>q=hgw+&$z>a>47j9UF5h%zp4 z5(l7|4w;#_n$4<~Gp#E3`@!PbMe42cZ#J}+4i<6#55r!6cSBlPu}XQmx&85!Ia3Iq zT}X)U(BKcN`Ri!`P=Oirm~+85XiLsR_Vo9@Z~4x>9zwzGWn73^uZTKI2r<~*UAC9n zB+FY>LRkU_0%D=Prdm6+d&F*&z=iYN!eIg_8QpRI{5LRlgf5^FlirJGQ@gtHK#@t?PEMXvc}piI zvt>CY6&ben$#KB5QV=Aj&Z)G!IaaK@AdWA;9 z$WwDc7ogJO#?Q*VPbPwtQOiUTE;N_0O*oGBy<0JuNyIvx{i$6~7nM%X>Y956V(|XF zRMRz{Qt|M9$Lje`8I1bc77?&4Tw^Tf#!nN35u$*kRXLUr!i*{NmZ zgm-oj`Gg59ydo#M+A~SXU*}^yS2^>?1n6{JEt3epBS9zfNw0p*i41+JUTkU}bBN(G z!X;<!N@Vy_HU{+?Z8(5AJ;(}pO_!M^4qJ6rvM z^RX}?v7-QcSe_AuaU~5qPuIEwS!3j3ylGsQd7`eMg*^ivGE0;D?$4)%>LUV?%_o;k zGwzd{NY!#Mf@#UzDrQ&ZbVwjo&Y6j-L0ml-G2^(t&b5*i+3zSVPRu6S6~tm#jsiC@ zN*@0d+U9qINxJD-93bc7^Z^>GcNLA=0z^PYULMF=M8qB2{j@7{%u=PyR1fHORrr(& zA_fuTC9(VU^*^H3Z2(l_;X97l3!fHHLyl^ThcF)C*@ z30@^vK)9nL8oXof{6``Jp+J<*^$ZSGcOI{BM`X zU9tgw(m99ofQl6;gMU(F4+ zG4AT>Vq|2Ll9Jk5_~`HO(?Wij!Y36QS#9DcXf&Flm6yBXK~+^%Dr+=_YOiW)kO2XE z;}vFz$t63#w!ws4iguY#DNRU75Houoc5*m+^_@Z$7xDD;6as;$s;c@fwzGjaSdl1W zjW^J*sKxeh+~Jw`=Xemm+QQ>X9_9Aak-?#%A;gSW$gM*KdHKIIG`zXFNkNCDY>xXs zIAi1E7n}V_gLyKr27zJs?)|y{kvkmJ{swLg2P-Qze~r$&G6)C=^!E1d+NFr`u`vsc zzLem=zy_IAgA6q_nhF;6}b!^}B0TmiQ3& z#z*rM1wrx1pCZy!Y2U=$!8x`D)>vJ=dbOyiNaOd}=`m$(JUu)XaFN=Ynnj*vN~IJ( z>(bZO*1WvD<{Er>xVf3nDGk{ZiNVGd?V!Ki`${(c#!w!8XICn;d^MN~31IoX^_ zGju<>`OAg*Xi;58jEdtfFt6fMw|O=l3E{AG#DdH`9Pwz5LG4PLW8YL)~RJC9r4}jL*^k zFNJWjX=hr$bng+ES6E@i;FCjSi?N|$)Mc0{w+kH# zc1#5!os{sx8X6jM3peO?FPuU=gUFZ<>?XiAPYDX4=%JpKbt62WpD`|V;*yN&N3-?b z4g%6QZ{Fktz@ph+%D2Wy9qg@Jl8(MSD1stXTo?rsws_iIgSYT-3nS$anP70{P6O#>2 zJcqFm`WH{3L7I~7pf<*)N@LORUb*mR46wmm9rx(f@!8+FF=;=R7DSjp1%H0+ZVA(G(OC z>{zN~@Cl46%`_dWd~d(0=+xrYW zm}%^6F~dsZe#nBm`sBpHTv27fafkh=h30#7G*tsjNl~y&R#}Yw-ghs&C2N13RW3_{ zw-fylZ6(cAlAtssy1&y_R!Sv}Mv8A4#wCGM?91+t1#{?KQ4?XevbMhErm*dC!Xd6m zi6%2^dZr6B;+Wndt=cWB?9#UK^0+WSWN4^52Zk=h7Wz+W+s`PB@$;pwb>B>|cYe8O z2?or=#npe8+6KL|g*!)N_!Cz0047hQ;Fc-g47nT9^jU3&qQ(z}obxh-#IyH4Db^|y zlewfT0diP2A_$}M&=D6=B)8r2nby9A<~dP>n*Y%}rY;F%@Rx`RP!?+>Qr$W4ZTfl- zjIJ#IO4}v{k}Z7X;S1_;E%)G23I&PMYd+b#|M20)mlEB#)PnI-_}W{|t*tzJf;mBr z)WjFM=+!1!16BiN--VYPGjK`Opy(GZErlofxgzn9?DY&8EAXmL)V9Fz5f2N?O10=! z^+w@47BgY%bS&Bc*J>R>p*sCQm>VqY$F?c7+x)>0*dQ$EqM~o^ z?;8&3RD=3k8yl=Q@n-*A029ybgt`W;p#2z5I~R~#IKA*le29%6T9_8g*-jht0EXa8kZF(4&EP>Q%FB1od0fhTH8C|c&a{<9 z-#G?eDJ?Cvx3@1tVd`@+Nh;P1p@v#31fnL9?oq`CMb!~d1LtqJtpTr@?^W; zC9p-_s7V(#7B`f?pHlVRD~oG1=6p|A(rF!(8vUM#OQk9*nV1!7w~_y=-*(czzCQOp zZNp^6)L9qL(3+5GB#0MrV{!MjOUN1PK{s zn9+@1h8dkOhPx%_{J)d`{q9}&es_Iq-Mtp`8gJQqKmB=r&l~bcO_AXk>oFP{8V02Y z_cdu~Xp!J}=8uEmw;rDt27DZF(^R}mQ{2uz2mUy0E2k<)LsJ?_zhglQ{yzHTfq@$h z4P)c}&w&<~yvH;&4}z8M%V~R?l7{Ep&djBdq0|dPf{W8lLP95ba;!dgweVPOhb+I6 z_Vi|__K_k=p=yy(UqScUbT&KBFN~P_x6oi4f?lc1se`XBpRi-OOR0~CT~5ck#RkYr z7HFT!rcIxsgoIrbf=iX(D!;Y(z3v-tll%UJX=pyZo<8;S;Mob`_@4(fuRhis{(1E0 zVGQ@LuP)dL9Qb+khn(Bdp9gpTNL2atzq|JbjmH-k3SCwzD=Ur!|2j`0Ura0>QRS6f z8!O}0{d&ulWyZPggx9Q^DvBoo#c_UXN~c1#;kiX7ve;)Vu5DG+q{lO%W@Dk!>ZmHG z*-iS`HH0~3`Ea1^OxKT?V0AOP7UY>2JXz9*Fae=wL`x~DAFE`q8Qg{4qlRPZD=02D zEZTQd1P=+$G~Zdv zGC)2s6yAvm$Io(lcg$r$T23uosmW{%Bn9B}=haO;>Y9v3NiCGg4nfB_f;8vd!g$e^@PZcv5BVXheDY`IfrM zh++%kGzE3xEA^{?9K>B{BcL9iI%r`_pN__E9jnX_qS54|? zr1~U2PcyzEhfedA^3NU=7fE|nlu(~XAJ^yU*RK+Hs^1oDj$Gv}=uX(lAcDm)Ci~^RXJZ@**r|I^HSQ*6`rx5ox-fU9 z-Au@R4|-9vr&lDrci%T3vFTmE{9^h<+B-ovQhzaJ<9K+_!#GkM@=2Sus-3!mBTpj1Uu0&CIt#pi)#LB?YO2(peyjouvR+_9T|9@?`HmG_>Cn@4w2=PlbS;{C0%hmX~Ym0ccM3rQzy_?xO42~Nk zR|S}aeQtN~X$3-FDpuib-y)pIr~9LiMY_=US7w8Ot&s) zO*)<$HmT*h-0!vV9D4f8`FuG{3+qYYZ_nMBJb2*lz27MOBbCVJxb-8>I-b(!)7dBk zL4S0(uH6@#^r7YcQ1iO0Dxo?_1ySa>Ib4^LOt}p=ZtLuv#2sIhX&>~TEQX7e${Wdg( z=Tw1165^d}Fd0!<5iAn_rgc%4@<`fn6BB%BetykvGP|}TWpUa`>a3G~NU97Y^y;>q zo#0OauDeHd5~x|fskqsPhf5g^Tg}rALLDLev_w}0r0vvlr8Cj@_Lpl{hLcp(O#Ggb z0(3o0%8?l>$Rfo<>PF)E&R;iEeLmLuG9UvVT~gK&SyxY;ktdXWwATNzU8Qo?1?4|S zUftMWgdFxOxr@*=On8Acv{i*@sPM5N%EB>$)WooIRV3V8UbXv0AevaS2 zh(uPBl-!}suHb>^U?OYn2vpRjy2^Xhsc{x3Qdu|{C?s=X!rLE4w;myD?0v>dd}+?E)1argERcFj z&0eSRGk<)AX{|bUJ|&=q*)Q+QK)d!QPQ%jtjNI3~yld+$`ajwAoN?D~kE5H)s52pe zxW2Z|74y{(!-Gd#n;_ed!X~AD23h)bL7VE9Cg% z+?8Sog7)7Am1Skmo!6|XcPMp_1gSqvF!j#W-GIx|Pi^cL!K+P6+dUyY5^b7ZcQN#*;+ zdR9P_og603=SX`_Y;BnYs(Q|M`E6)%h;cr?G4#}66ASc|Z;WYPl#7!<7eB(eayWYS zER>u>&wAQxwms-&RZ-340QEX%YpJOPLgL_oXY&($Jb)l3ZUpqIH%q$VE$uAu3$^Kj zNYsr2hn}xhJeF=swQ)-h15uFWd8QGpqqD`wii?Fc_oV^x35(TbbHRg#@!h>?;tYJx zzunV&@y0kM z!L{ehcJFWnOfv7&@tMUG2E(0`*=RO6Y7e2WIe;GyFtK`@G5Q2vcv4QDEeT3i5>}@a zX^DlG+6rWCdUZ{%n_$EiAH}qNj6F8^EQfN8F*x?8{Wkv|T3PdWG}%_*Cxg%gm8Uxj zg#0-3%SeBEBIN$J3BPpk@1y^%G4C|~&lZ1P)lbX1h2q~r^O z__(+@DrM903UA4ivCkP98Q?L8jxY*~i5VRT@A_fp^+6P3sGtx;SgiWv=OfJDFd%9! zi-~PEGRbN`kLFP~MF&8qzkiV3U5>1B9v&DOai+b^*^w;aHWIi;oob6G)VSI97MleA zXym%0p1SaTwdpNOV&e;1`ctP)kqKzDRZBz~b-^}Xz@+TkFApcE?^&V>aef}Xv(jeY zog*S5(ti$32;5$qgQd? z<$SH&WS>+iFEUu&LluFO7eDvN?Hl;#?mT+8AS2_V_)g-Lt?sm4Z8I}?zA!1| zG|!6$NAmP3lv<+j9BOlfGIb-c=IK-`k9w-O+2pTfo%1~e5ePX)>MLz*e(S4!{aoEy zQ42-ImU7z;Px8bmn|xj+xjNXbxDCtY7znQD`z&Z)P>@lTvT{c{7B)Q;!XWMySdPDIKA zTA^y~FI~Dckqgdxe@U@tag$QzLfCz4wsVn(r$y5q0>NEwzYUc!Gcrn&w;8O22-&u; z`J(>juM1~%+`a{K1$eI$aTEb2E*U2Who`%Y?Uj&0SV4g_r@E!(xFQ!+*y8iynH$4r zn3?Ur!vod}=6m72Jv~`DIcll5w|ddL6(aHO?(R;6dXp(3A)&#+L6OFVg@t|gto0;~ z$D94!uuoDa!NdH9cg9)JUpqSV2D-Xj=djsndpk3tyVOmBS-rncU*=V?3tBl3x4I$& zvJP?u?zrB)d$&&=<#0-M_PYg`<<5m)qOnw5S5tGD6?jn_UQc|t=)$Qc7W1;+OCPCo z>}+SU6OBLDC;amFZhiq?R2Bes1Zxpb=j;B~48% z8t_AVn(SVCiqz&J0qwm!&XeZ9G8W7=Jv~kLmlJ=S#|2e$ACUB{fboxcv%PIF^}Wex z^^JvoEta{(go%${Nfg#3M|v1ox|Vlv#>`Dib3 zd*1XCH@662z@V6zo_A4EteTpd_awKm2?GO$)b5_1o*#*pC>Y`*_*(Oxva-ViB_)Py z*YYobi!yJ7+dDfu+uL^)XyhDq3bRE0b@@L}Ig$d>sgMjPCqC=EPo zTj@Uz6s=k91neCg92_0H^%)8Xn~BZu=!5_Td;jq`Fh`r7EJ4ml#XYbhL{$}^9R#8i zX$sk&^3Nfk#R}*Ab%+&=qDxdcQ|G(h+G?P&?pU`!;eTIcEA||NyQil^bz)7tR(WI@;UMEi7oOgS~ZgE4So> zFz|xM{Wh$4!o%Y>qY0k(iPgwW&{I}7f&AOAX zhb9n!$r>6e#OmIaPnkaZ_oDy$#Fj=k+v!8wJ3izk`>q+9XvN1;R=%wc^{gce_DTDs z#;54%8}*tS-D7L7H2DINSN?5CCSuP;wq$+^8bsQaR2E;57DDF~rx&42vRnQvs@64Q zOGoCY87Z)-vGI;qUgZ95?DNdFq?FWPEvL-MCf*qEAU%Q|!x5_wqIYf7o)Z>(uXJAt ztuFevWhol4{>ay(7am>r)iHzvzuVy;GslD}iddqWPO@TC{#?m?&Hg4}cWC%OdA$rf zs*dvX^n~T+=jYed7`Qt4MpUreN%~xwB67onp!*vQv#f;p^BkzlK@n&(yu>Fmm0{O5 zyU{W{S-5$A9j2aHs4Bk`AdBH2`TB zQf8NU_N54~&!#KEr|cHen5bfi4A|!W_f6qQve%Dpp{X4!QBeCA3n;B&xIu{VLE;83 zpGVxmy(_141KYg3<$tn@`PUQw`aRe8uyH_&u8$#Dqo>R!0gI= z0ak9`NM8_y$fUjgD#D_auY?4@N{X*=-uuuOuN7z^#~>#l;>GbZ~5~EQZ`6{UgP7I;qJL8^#Uew35l%{lppUzmM=d) zzv{z>JwJd>+ur_Em4{Rxq$K|)7D_+&NPe&W-n-`62*c+LRUTdDix_Tty~VAC!NtY_ z<%c?|)WsHz8EWgv6Y*0h4P9NlRXhSA%nv-U&8>s0+JV3si~G{LX=Gqvu*ASA8?d`m zqbqZ6?X|Q?hJA%L7HYIEfK7VfvPqma3|%i`^Tk&3W*0p(WZ2Y`TSaQNr>1FTd7j#=mSF zcIx*tq`fGba}M5H>pIcg*Vp$N&Tm#Af0DvP+MO2XM8`s6;(vX$1nPEh~Q+ zGhl;&dlwTGg>6H)7!!W#HM;ssfa9}j_yTw^+)YhQMwL$XPELsFC_uyETCa`-!Aqi| z8(%_B^Nwy(xTJj%c3m03V|VE*Nw2%TM1O6A6b0r9H$%%vOQRgsM2*z=Iyeo)+ z;Msx<3=F;uc*ra)d}!1% z@)=~dgq4814LtseGKu+gK#PKeX5> zt6D8)ahJTF&91qBP*n>6ClYzCD_tOZx3;yR7wIKavO~Xi65Ql=; zEid7iW7McV%ce{G_arg(#e~$<5vUBRd^#$wI4vNgx@h~op<9R)=KJ?#5Z(0TYgN4S z@$r#XEx>7)CMUD=6crbnmOTc0o3UEY#CcmE>27ajWu>Z$f$0>aO8eovHSH@0RIWTs zc(Tw}dZ75^KMf%;z+jh>op(ao%bL-Z3H~J#OUB;@Y6JOCl+J_rs*d~yy}Lb+-lL%R zf&+g9HwH8D!SeEc0PgAT?uHCF_7-DOrEAmEEkL-d7|H38qciqF$W~NDWbTR~HL=_o z$HXrF@jWs(qU#G@`x3FrR?pW(pmcHKyD|G1(^1E)jFG)}C2@a_$Gd{>yGDW1n#LsA zVz@FYP*10nfvo`%mge(XuSHmxXt;uBS|l?$MD(@HQ3!il2MbWBm!v@)4KASw7RlU% zh5{*5g9#Ss79rhc)XZCp?OjIdKs>4pc`Og2&i3|p#-#EMwm}Kunby`;5Ukq=Kf&%6 z{byT3-ZSX>pwZ>SC)>Hl#3v=hdkAefE^wlh?W<-9(@{A&Ie_!s19`JHr%zFCMTmX@5v+h& zeIaI`+uzp`!;P;$vA-D=X};k$120~@0J7J=dSyS20CZ>{oFdsh0`eLl935axtVAMx zm&cpLTt>7V9228Y{~$5jwgdAVeMJ>}*6+uX1u)s7Z$0CIRH9u!{F_67E!kl7+T3#{ zJ2{h#pQ2WK%G<|-mKLY)FATXw*yNv?YwuNJV`G!u+gUZLa*mCQ+uf)_14CP3FJeO; zsv)L{yN+k8#3xInNw_Ik^=KIw*ar%Gg4_n{?ZDj~pet`j#Yg98JJNl7B8k?C*@ zH*kGQo~&~^a+RvR1P%|WO2yY+aL&<9sdYcS!HxeIr$sd!+u8BwcM!&KYwGJ)gUA+G z`aD@D855sK#5Jc{qY14|2rhE%$MS@$tE+T2*n~{%2Ui5^T@D6tni!1Z;zG5dQC)0K&dCs3dZ*6V8uc1MB;WPj? ztEsu!VF0j5;6}eKNc4y)Zw&!1VaHd2N4cq^dA;b30j;-6X^AQVrgh?0&0!2|qIMTN^a2<91Swso zi$bebrSu}gl$eHBX*yShtW+$9IPZ?y#Ov}on3ZBYY;NdqqN zeF!nQQhn-+J& zoST^Yq$+^>2|Rphp9!HW8dzTkBfI<;jV6S`E>>jAntIG?X|4*Q6p?<>neVsI4O{vl zsKV=biCc%nb~e@#(97Q5-mN$KuuHP;OF#tO>UfEke>j1MTm;@XI0*VwA+GHNphZ83 zYW#aN_qXfcgBy-%r~xcJe{e-9fd%7SWhj5I#+;xq`Ct zHtS!R0^m`H~L8$L#Ql)vez*T0<7BE-!E)>*u{=uTLXKDJ_9YXxw&?yo;q6+)KnSnnCo~TWLE%`k_2C<;8{a~cn@y~iscW3AV<c(N|PNnQ-&O^3{^DN&(jIt^9=rOgons>n9 z5`q%HX`!>5s;e%I_U3bTeMH+|MR?v6ycnG#~GqORhVaLgbY}C^&8X0 z#O!BeLW|_&dt5rw@?OzFWw`$7On~D#eU<-?WD6`qH}T)6@-TZp_4P9*{kW~8{hJN{ zH503z-v0jnk@cmJtGXA!_TOby`bXRZ6`I1OI6bX=2?Mm#cx#xwu;_D^iFBsj=UNBp&3~e&tU; z{VVtRCSiq02WlI?kKBp5|5q@^e{U-F0){(WH8rcHV^P{WG1_dXYm6y^w4jY{w)1c8 zc8Y9aV;}4{Fd6*#K2lQ%S_BcDmbduO{CMgtY!6ou0hn7jPhh#Le5KVeu=l!-ezg9F z61k-GTE6SWo!%&pi_x63 zx!^+uzR%xTG+0hgVH>%_aLjTzKH(u;GwZ8^*CtCU$KzOStrQ_7!fo zC>yFyrM^Uo+>|_ym*XG4VdbvbosWV35a*$i;~7qNgm}_O27C5>B!-S-m6@jl9%r5V zLRBp+_S`rUyivRs=1)3z4Gw39bhvH^c<43`erw9#;U1U&s9G$I_jKB5Og{V#a0AOP4EGfTKROw7K<-U#HD1SuGizz3l4|+2bVQmehHED|ngS zT^=iij3oN^3c9uR-HIo{Eh|QKaYUUp8kM-T6G$_joD<(UWVh$>5fC!W#4QJ?6L|$YfP52zDdfNL@SE^V?ps{^z`y@^w^)yMf z|4A7eJnJM-+G^0b7CrcoALC8j86k!)#EGI2O|f=-%-Zze5PyS6&bV&li4NfEs>8_ zn3uMBK1{7GO)u@&98I|j`7RS%{}A3VCMN>0Vv_jX+t%_HO0Oek>t39iX}>ToIGeiU zqx<|=9~I4!6uL0fNj;}0sB=m3?R7(xUhK>89wWO`9y9REc8^#D_Ga2%!!|`sUy?V8 z@?RuWHVvD8%IN*YV%S3PX+4qCIw39XBR!){j+@K|wM$qGhE?LCDUZv5$BKor!k4cm zCc)4b!?K;^w+D_Jxn$nzv36c4OEFV3%6>VZY2rw{`JvLh9Cl`Nug3$fj^ujO49#NG z5%Dy6{1V7;z66O>2-6U;JCZ|5Y|Wunh;ER~^SG%{7j{zWi}s)5L)p1)K_zaMeFtVa z5&dLIce%yBaR@3U;p|2aPf$AW+PYA=Lv5ax&ONlQ=lU9&+>TM|`*^?Z#MUC5Wgf?A zRK_zqbQ<=854*bT169%w`o#&6)B@`NE4Kt3eRR<`rW7xlbkQalDN{ znQ3?R?|q#^-mQ2incZIgG{+B`(U|MUaE*LvI1g4jf051I?3@1H_a-9`RSzja5ea_B zou1eNQLf5E-3~C98K-L3#ZuH;N-4xVi>>e_GPmtq>Ai<7_D`yN_eq;U$+_b6NGzLx ziPYjR^`Bt!icS@ed|@fh_GS7M4i~uN>pGrktAZ!HZM-urW>)R1`2@X1oVwWQS$8A1 z2-|PbTBnNqWFyOduwnWX)P}6wV9|S+oY++S6%qzT*a{5e67KQ9=MD#MDMZN#Ni7fZ zzz*W`S2UqnQtSmqg<-E4l)uoQw3Q(imZ;8#?KJ+N%@r7#3!p!6Jlxl%DdI?=h935v zg*5Bw?{wb)z!Oo0)|`?d*T#D4OZ+4tReSjb=Z|`fZJ*>^|Owj`@o>rTG{Cka!aAT65@rSs@Hl!&Fk>4 zn(pT6`Nz!VURAX7C?vi>Gq&_9fJ|IjP=y^$gvz>cZoU zBE(e@!}F(AEstb+s6oeNu;CZIhR1v2)X*ajhBxP#3j5Yx`bN~rYz#9;c#vsn6p%nT z{gC^jxj-X^G8TQ6a+*Zr&Nx!i0PHI2J@k1mRYd=|(aQ>S|D{(OTux$(*|UY|Zo$pL zDaJ^8DVFLszNd?R(^wbxKrm*Ex(-Zsany%On4OyoIBv*LviUW;h|)fL{C(>A z9}JgDt+b9*5W^XyA_~GJrJ9Wf2jUBdZJEyVmhqUAE-?DN1=4f2Xry2hcl1td(6p7F zXv09x%xU!-ZgJ#_P+)bvm@gw6U1g(P_6}s%vZSz7Xa}a2-E}Og&`QbQR;@@@C7V9T zMc0*iju(1Vp1h9D5Ey*Y=_4b%koZvhLTyzp^+uI*pZlQAdhV6p+QE*ld`5(j^&+lf zdJCAN^3{VRgA6T~z9R!r!DoOCMB-v8?~#3k)|-WF2;CVM{$_u>vZahPb{dKl;UGPqr}S4p*H(txnRz z4^{ca7ak>va}`l}!Zw(o-rL_7zAXA@v=^Hr;CWdBwC&A=?%N`^7_&vTFu&>(uCmh( z9b-}~XA{TTU(QsRZ!km6-&CMhIF(aS%OhMxMPKsFtb|SNpY%Lq(4BG?+d~HTre_ho z2VP(TeWnLcgwYNn%T9))4p z!+(Rc34`?Ho8_JzX6rNR8=M>7yD76oe}&A)=67SJO?>0tIP2o9bvqWN>#DEHT*83)ZUa!&*J5iL_p{XW$eMkT;rJ2|topUX)TU_jy~yDAtQk zB$l$}U-WTAWmQ9vLK~2KSIs-2cpZBrT^So7Az!FAQoZ`>BJ(4`+(c3~vXUg^H@C49 zpDl_j=sS~!cyxJCU~3yziZ?7y8UD&%Uq#_ zP8G#aLn_GgT*@UilWLCS!rtj9Q-On|`{t*K4=rSOTwVedp$=3;E1#oBc(f^W(lk#;pQ&7ct%6Dbfw=H>+L5dxmA6W;X3Alry9+i@W!W>h8I9`Y)gmJR~XK z{;kDFA>J1Fqo#z*#O=7G0=i2HL6&uESj}ftzJkV@m@gXy{ zlo3=eA=PG5J(5`#)oD^QxYtV5p^~k% zG*hQ%Z&t~f7|p)22vkv7U{deXBKy+U7Uma25^DW(FK)($qvE??n|yh2!wo;mmZXv_ zA*B;1`d&>>RC7@IrLL)e5d?`YJNr&H%P=O|$hn&n>Jw`R+-n z6={X%PW0@~_pw4q->#Q#(C5AuY%Pc>xitLB`FUNfe62GHv^S#| zw*OK9)9m7a*y6#d+1POi?j(fZ-Z?)|q*!#f^9PrjafJ|EG9|`i!Xetc`urMIb%xfD z+(_p^?rbVC#c_ESRnIKRZ|<$WPN5%S3CDKJe@yu!`Ka01*vO=^&vgAvgjBR>{5ccI z{3S1kv%$@FJENisYip)7Lv*O8UhX>ZhQxtztM0DuD^UTxp%_k=m`Fuf!m%SqkaPAj zs2logi;Ty`T;R9-*~IbB#C%nbtPj?P&CM=}3HvNiWGuudgV9w8^m+!NHxx^eH&^dt zI%4AOcJ$ep%`Bf6&AFhwM%?aLn<}qU*n;%&Q z-jfA+h~r+`WST#xF^@be_%dK#R+dWd=}M_2c+2BVK10|NumX^%a^*bN6Zc4a&Tb9C{4<+SdkSwCj! z5feSK*sl0uJ18eCIldu#F;lRj%;rIo3V`cJV(ICX9bY!SOs~$6LFY;C!(uzVK=J({ z$o(@=C7@_RT1pCap}$-YZc3{tUxZS5Li4F}#rw8;>TQrD#1{02iT9`5BbA^l z==y+fO=ZJrcG^FWfuhINt5^SEykAsSb_-xRp4_0P8BO8i1`Yp?68k)6^nuca)r9Xi)VY zG|k*LIk?t{FERpfjhBZsCeARLuXRzsZ?DgTvh4}aK`k>g^y6<)_ktPM;WhWmNoJ7z zRs$XPCp34sOi;ca&0*(3RkLBNy**bwjoe?}GP6n>e53;y0PUl*pOuIpY3h&}nILDgQwQ5V2){QUfG&MWYIoasoLzkQ0`vr8KklA&v} z8d_T2i6V}m*!4n=Yig1O*CTqk_wq5Qp@Eof69xcLD!v;&L2$CY?iMs5;iCnl$x%n#h zIz>uK-B{JAd@*SCiK2r|X{&4-zt-4bJh|Jp4Wif|`*u?CX8$jqfnxI6aF1fO#8m>nMS;7tz5Ao24|-5}5`{ z{%!F$JR~fm-%i(nqIS48ns*b_Dgk&#tqG*~cLF%xq#&c-ynWkU2-0Er-CCU~y&}Wx z@+NGyidmia$%KWn$ z@sUn8%#x3*G{?h^-*cfao!4ZwALUntO0j#2xvw?14rt}8So^%NxY!dm>o(KA{Ko|a z0S*xW2m*M8KNy3t@1s&vom(PIaV{+p5w#|@o*Xj%`ijpZt_`Qo8BQg+)OV%F$H(U$ z^gKhT^U?CE;myp{7jt1wzm*lGox$cFp6gtJm|d zUMn~@@*e$dP5^JFp^@HUxL(BI+3Uw9CnxuO19?C+{!F~i+1RzQnp~Np!X&>YOs81< znuql;aN_ar1pTO6t5sM)-P=&ihdzdxNMm1rvhH@F$Bbu69sJg7>k5^smV!?ylXalw z3}fuI;bU4O$y}Y1TyPNPvXSCbV!2syB~tx#yJ;X9J3P}*8*3CXWK_mqUkEGBojw)* zp^~_k!{toyeur|J!OazPfVMyrsxJ$FlnCA~h!sugp&Bu{fesZx+s3W$EX=HEs`uwa zlo(Ji&u^HTYdq^x)1wOy4`&l~s)kZ3i_-x%-6Q0q;X~;Rfc)6VGxXVB%Xg;H7R#?A zUZXfT1K?F_EFS`W#>SEdIW@AYESrw$n0@>9?Ie)=14K`i z=z`Q9cK6_%dA+ob+-2AUolp6fi;AUO$6pQ03 zhq=H3hX9rDla7W-ku?Bv2cUn#nr?&Dt`o}>Eh3ty9iA7J6!-MP&EU$Ww8BUD>r!ZY z;00I!$r+Tsd~Ji;2lIqmY2CRoo-iWkNq9k%nCW9l*kGm=$0W?f9rR z+hO;FYlL$13{qVH=1}qU7c_KY~{Em z|DT2dMX&Kq3NTq28B={!m{f$J?19Nk~f3)#$mtyqC#dt*K5?FCAM z!kTReD=B*FCiL1|8xwyHM)J7F9y<CAo_tKqwk$7W(O#P1x647Xg6vbVw~BQROLp!L)PT zO+RW4pmh9VouuP%O;+ynv{2An%2vC)^L9KDG~@B{7CC$s$kUeez}b7{eh^=@lomA= zautiW>l}8$aEmt1EA_M5C+nWdwHqZBx*s2MgND?@&wIlQ~TWU3&`#&R_t2y0 zn_rxVs?!Z;0Tcw_GGO`I6Zs+|h!0WUB(sI77*OB3DvE-%l+?614IpRr;yUFHxv00>+O-{I*u60BQ}cUwYBW zCrm3XIJ`H>!5*UY?4;tRq1*KLkiL;z6qT}wu6oNgfe5OOJUByx*nNWmhA>Gw+`YNr z@t1;YvF=<0C)?KCo#=uE!)Ogp7}5nQi0P3&_R7$=m;`sfdfchpjin614NnEwH;(~!GX-sIUuaa$Do=HfI?`I;ixJ(1&?uejs@3lqI1!r=is5s0KwvSa~5_ltU2jXm@Q@T$fuie2Ry65lZ zYu7djfq~QC&u^BO0&^s(?|wdW@Fs;fSp(FWf6D5e`AD!(EiIwIU4I;N`;XM(oS|S( zb!+$I19|~Yof4vu6O9JCKyQ=opu^mzTA6h|H&niQ^(rgtGD$;?O%C9W%dFe9vjNOx zxE{LCE3D^1`+kjxu&`a2rb+3b7m1JuC#cVLw<2E`Rj*-8hSewP+THBeqoSZ9^Cf(t4d7MmVNDKZO3m=HrfW_6S_FXtrTwc3s zTm?O#pIynj-e4QS)d-^LsR&6LCmqT@^oFC<-8~-%}9Ex!{wQPYoJxo zLBnzV-5rV|AxY&TK7-gRCAp~vAkV!I7p_5diaZV2OLKJ4UFS?*6pU0h0N`4`Wu9_x zb}m)(<@A%$PX{Q_!(PlqK7jSH^{FQk&YgSy)XgpT;fIXO?~LrENr2@vMcBO;@OHle zbL8~Xd)pykW5^3T8R53Zeg6YSn^BRI^BW6kMMD)Beuib5pX0bhi%o=D;O{z*{cDWrsXD z3GY~%MBGG^tIRYi1d08g*DVZtH;va|0h`_2y3NbY)2G%QSHOEH`j6WdOZ#n^Dtydw z71j#0BJrM|iiJo1L3=LszfB211_FWdxtr23(LI7F|w7Cudz&z;JEF?bE%HPG& zQmY67ev}Q!dcm`8kq`#~oi!NQa~scZ0CjA)19%@LW6Smt&Go!$}d^x zj2|C9`v=WPeyT%ORj=`>(zCc9pmi6thdN}zltJ5r3qeK)220b)hnZRV!t6PKyWTnJ z>t*tIaj2%dW>ZVGcqQ@CVgW^ZCa?tHfprE8LUmzH9}Sxy=xJ*|Cg^rA?_;L>$)X~r zilO8dcmKI(*n(|RpKFBfTz<{{ctJ_B`(yi5A)D_dqRN|H9Lo+wT!9{vZ6ESyY@9s8 zXL-KM8rN$U2qEao1nh{b$A_K4RWS5#$u~%?h;{AeNH=UqQzC2~9ScCa5x_{o;wmQQ zU=#qymq~+HR_+5!LG;w|{rheIA0@?oUH}1Y(MYG$1>RNwjEk(_hEuq%g5FHum`f!$}Q;Q!a#jS&Gc+Sa-dvl2c zDcGIdn5Z#?#bR}f46Oqn=sPJ5xf}~~m*%*H;*vTkfw?Ft>W7Y+3mD4^P#u>!cgfTh zwVcp&bJ7ulX{FyW{`x6jv^YP%i}5VGv!fQ;^XR?ysGQ6|bU zPR`gs%*Yi5CTVA#;=y%hf2H++H@Uz|PPBSc^O7paL(4yUM)zMv;I3t4R0{&qu(0F9 zD{~_*yE|JTsls4G<2w})diV(+yzpC~!GI(dKrghladf>G9IPCyIWAS#OoI1QfH#52 z_%FMv^h8F3TZO60%gY0Wk|G1$2G-`*ty|uBrZ<|_)>D8by?2hC+)w-T(50SczXo%h z7jip@PU>a?cf&k@{7PAkaySI8^KL2WE|L8&d&eYh5p}+LHDrkWBXtz`!ygify;a~y z^lwaxThcI$gG25RzMs?LQ_@BPMMhxw}>#PuE|E7akRu`t$rHK9#>-lyeBY zbYwpT$D7{+^;7n3Z|wQ*g_|3$IBs}~Umd*{=DgVa`R@nN{NHxn{|is{A8+INF9N`x e%q{Hf9mqNmrS4j>fCp5eQIc1?Uwqg6#s2^m^6<0( literal 0 HcmV?d00001 diff --git a/windows/security/threat-protection/windows-defender-antivirus/images/MDATP_25_StatusOnClient.png b/windows/security/threat-protection/windows-defender-antivirus/images/MDATP_25_StatusOnClient.png new file mode 100644 index 0000000000000000000000000000000000000000..e31a329e3b2796d0e0a62fc5c6ccfb0139b1594e GIT binary patch literal 82274 zcmY&<1yoht8Z96pUDDkl-QC?S-6<$3-CatTlprC3N_Tfj91srO-6bK&Tm1jK_uaR~ zkRgYC)?Rz9FXlJDxnnfcu5$f3O42U#wwZ9*Y%aBz3$^58IH8 zbze1KpDYS8XdJ~lS*_@jL$Fz;l3$A#sbyk>}2D=3NYTi7^IO7vX0S-db+SdtU9uoxXGI7t@Fkw&9LpqgtPXCP-xCNL@ z^LYZx+jVWBOY7tX3k8YJ8;%b{$r5but=t6ic0bhCnr+?G4OZR?NBvw7bQ=30ImLgS zRa*QCv)9}41Z_Mb8(}Fq&J_Jy3|gSX&dd$(`4wBs;{VLWBbEmbj}}F{@%=^dOZk`X zi1L3VBZ=z}C-_W0b+n%u*3^0LO{zB=LEQEzIk{M-=FukL;tSp`dPKeD$UcxiZ-|*1 zAng8mDSy$fo&7s^rWSKRXY5YFL?uN`JNq)LP&iw`T*(S|si1`?YbNtErbEdddnw=c z1RZ4__ue}%lIyH_g?w4BWA5UDp<21-u+GiMws$ckSt@iBmDkgV^i#wiRo;9;CBb;B z`fVl7%J9KdoA?r92|gWCk@GfuHr8x3wfX%R-)289+4`=AEz&ym!f36TxODH}7e(8Z zg^A!@C4Btx>!_kpH2%cj2d{aQD%5-CG`wvkzRpm;YpQiC`V;<+^Xkgtb8A+_!STM5 zcauIV`_76MF_~M2g`E)b)g&EdRvB!Msv8=!kMU308@-@Y4?tHnk zAB>Qjy_XC!BwjAwa7=$ey-vy_=GuSzi$6=L=-7O}?(4hvlf~2dbRlAG_#9(bZkio^ zBvHk%%^bSB45Hj;&JMLUOE?TJGT9 z?OmZ75h%h*XWgAT$Gpc}4{}tg4?do_D^5raNef=26RW9NguMScDY4g${%4olR*X2y zD`vV6ccyd*jgaiFm~O2M-a10TdZT^nqy2!#hmwa9TpEXX?fnn!hL%J2{>paNfi2c# zf73I)bC2$hGMD2Gc^v6WoP28n?`WnLZR#1g{U}V*(;rG3h&bA=V3vqZ=A<%AUwxo; zT=e?-UG5v_$0Qz|+1C8AFZ+jIm&cQHr71d}t2@)sU1um%jW&BL_AKQij^30#qK&;l z8nx$lky{7}FMZ^(movf$Q28UtJ@4M{i1zWGHC2s( z7l}~0-}a;x^w6|_;B>AnYMhTqOx`O#b7A0yP^{rZVZ%x-Kgs>>ea=GA4e#rw659n5SF=NtI3i>UWgeP~<9 z(Ayq?MpE&hUic+Ww{9s&e5OFqbT0xa4FfBosLxs^6RKcBUXgIWim8C-c_C*C!TXQ3 zF4IK_&0$8(R+EemNksaYK26?>wZ$nr60JxVW{C1Ws&$1Jais`G1?bPJDN=IYN!Vu7RUAZ%6?^K>?;)znDH8AzpN1J>=;G(EPs8p1s^V9KC$>r*wfHNo zvzT?j+2GQPE~GulExl~Wla!;qmRILzaRJr_&So-4g97^y7tOmUDmff?KGMk4yH>-S zEol-JMaqGfxYqq6#gneVJ#t>VY+L^8i?ADqk;d~|&bqtj`xyP34e-78L$vgcL4wu1 z=M6oLrTs&+Ijo=G>b(DxXHdo?;q_Aa=&rZpX9a#)5Yzx?-u)ZuF8jN2F}tIroe5T2 zRN(+$17*1(j{#?$Q}ZE4*s|ZoO1+Yw!)LjcJCBd)%_P?q;;t*N+X~)N2)kOEgsM zGr=)nivdDpxiz6*i1Pc8RHE-qV@?gHbk z$s3~xg89C;iJ2K2<8}#x-^35e*rEAt<|kh;1xy8wyu}V&e}{%`ARs}oCi2GxOgtti zKBy5O@0?Kv*y_K68!*TiVNerxUh=U&kEiSDA0y#(l}+-*_2Q?fZ$Fx_v5h*+F%J6O z?(>prZLOxXL+pW9mF(8<{-aOeR8J$;Q{G3|_D=V)j^Sw^-Q(EgRm&e}-Dez?$A3I; z`M|(VCbx1qNpbF~mp<4a1Tht>UQDA={&+96>+I&H7UvT2BZ9;~$8@cqp$k-PUqVE*=Ok-qdW$0&yFREsJXq zYos8cAQ(8>{bK(i^9$j>aOB^wb;@>Xdw5*_aBz?niq~(q_|tWIdJ2USl4?`(a3y(oKxQUC8B(wMnC zX40dh2X}Yv(Th{Lir;GlD!+Un)BdU_KL&vW2sj*RXlZHrvO`o7lC{W-SU)<&Mn_Lr zXxrNh#58K)4DE(TL?9p_+#YOQ&lF-QeO4j5_WvP;f{ccShK`=rUCcg5=T&z1`)C0c z7S`~u7yBL!Z)AA50!b|*6BupEF8Ck-1Bh02If=Si5j`= z47oVTu3dE-s|AVo$pt)FI4?*^@7cbtstiG}%NXO9Wlzo-HzYg5x2C1&=;(^?lgB>E z%WSr^=`usRm50}pbge6>rS0BgU`)2a(oWsYEGX7(wB`MHLymKJ2HRJ~5dnQ=a>$O7jR&%FB3X!9jqi~X~<&*+#GVnwe_ z229gaOMadC(M8zP5i{}f@(KwNe;)`h(=9D3x+JHiCzEHSH{sS&Qkn}_k55P#5MOTf z!9`*{K+;Kufmlo>5@m;mH4%K^*R_=Ku65bZiLm8yewANLjZMx7(V@bur1kbw z#EUMA$l1(Inc-|}v?kNw)wtRmO7X7{O5h@_5cWELE@tacker;XB{mE#db~UMak8?@ z6yVk!RZ?7BRVD8|dZ>otH197gAVa8xEQyCUvoVlh1AlgTs@<-zO~b^5Z2Sr3x9G{2 z*xp_lCwSw+cS8!2l9GqbpBxl(5_ESorPRPd@gU}8=>2nIG!{-(`zPH+F9TvNVF{Jv ze!k$WRwEbjhIzBWS!ZKiL>*?gU#0lw?h20LY)iy;9;=VuZcJo)sK~mM>EGZk1;5@!E6VgU>qp5i3K3 zgWeXjK7YO}1sZrOf@9LdP*yNf$zrw?veKS7GH-RA}IvO240RK7e>=>bji^a>NXNR9J|?Ib-cPW@L3yy7(%aY9mI&4tNzBj3Cu#fr@Tk}1 z55MbUla9a#uhFEZgCLKXv|@-~@+-EXM|5N&pZ>(p+vLpT5avw^r_~Zp_o-Oh7nL)f z1t#3?^7ORP`>e3M{GeDl!{6V3eSID6w5WKdR9#uwYHKixZ{BiP2YYIdfv{YtPYt;p}{wz#=1zh`KSuJQKom zd#4_~P?DJ65V=^1(zHkHyCBZPLX8=*J0JSIQwXh#-B%LvkV68uXGtX1m6Dyv2J3>Y z-vm7Tv5ya-J8ea)sVH@q0ja(Kg~(2J@PBfwU<$g%oHH*>B>#A ztl@oxRB*=Iu8RtuU^^$%-F>0O>*T9$`SxfQxBK>}&&BpPqlRN>m6gETTeMfo-!jZ` zDZ6kW_}V40XnE~S3JI!~k>`b25Z^!H2IMh00)oxj8H4+E)a5z}uOT9CrM>xwwmT+=<$B2h7gIIq-UW-Bo--B(hQhNZw&5uj$luqY|9z* zS&qh}qc{?+frkf=XtV!q_5D?pCk-Zb6-SQ8Fr_b&u%EB*>pfG3JbhAK7Z(>PsZc1v z?MJ}`o(u_J4GpaK))hr{#&AA9L_!cks}!veY)qOK4D5rD(uCqKOMdQar{7K6hO;6D ze7EOlAuB6prpU^~bj8NB(D0=&C!T{8riz)KD9kFTat0e2@9WgEvb{`Bt8^9vx8H{b z@e7WsY;W5BQI|~d!6Pn3MsTS7c%`7=A|n%> zZM0ixQ^mSa#Alzm+-@Q_PEOS3D|Rw}>o8SnqO)ml5&H zX4%YlBT;&0VxqUd+-JGQ+4a0#tM1(g*30D7}+2E3y4_WGW zp$hEH*EtgEsqC|N+^-)WAMfuE>$@;9(J3Eu_0!88)mct*(^YnVhCA^;g-;P$giE z%Z;v9BqSvIi35#_DfGEQ?+QuTx_a-f4id;k4LMwUqp^)YW@WjS;U(4BQypa97BUvq zsqbmyUkrW~4!FA<%N6!In(v!iT+B)9@%5WBNbePyM8#*>U1&JT6ZO+))-F{uskO&8 z9q#T9y#c?RX>@2-DMe_o;HU_Bvd0-j7J|X|W}e4wQ^9lo6ju&eSilr3R@4`fxy=$ra;cy@%Q1}^q{Yrs;Wt& z%UUEl$@<2I!D*xWJ@Ioo16p=!mNyd_XIfb}Kdcku$J_j_Jx`WJea@{jV|%QO*r-uqXC#;TEA{u%GOc;CVTQTLucw_OT*uZ zi2Qf^sngA>yI-oPcG!1ucEG7uV*Qx1@XSp)iY;zQ_YEvqzlclAGpnc&_EOjSxmW{X0< zgtW2nyvkcx|o|9+5;!Z4|_L^ud%y~z=D_wH4INmR|` z=o%hoPS8^>q!J-|8z#AbhJeomeok_dI{GDP-$`C>} z^roscfmAS5v|Re2&D`JM&Vq-d+Yw7ki%sq! zI!**V80yNV{rIsk*|lj;Nx$R`8cgnYvjRXAyn_~0QnZ?C_h(9;} zdf)v`D|YGCBm?nEyDN`?%(bAV=cKRqE(D}YcC#6p6t(mE7;Xz8H0sLpU}lBrOT)38 zK5jYu%t*XZmmM~IuYacVAtb68ke_vkTo*+?kE z2K!P}zO$I5WB=L8Fst=wimk7D3tt1$@t2HwB7G$VHMNq`$;rt?qL!eqG@OxP%Jue7 z;Wk)xG;W5gSlz6Gjhv$1BMb>s%w-h@v*i7I^l=2IHn%OM8N|)rkCGrhHs%ZtD!6rB zR}isb!`@DZr7m*u@|x5;5sf5VRQud1;3Fh^q=m{@GKJvDu2uL4xO+H%_*_^R zy@`L8%5tU@p~QkyW!UeW{Tz3wy0*T48v?aNxuyjPNrA z7CzEb;L=s;YHDh!E~l%K_niJetcs_n!LhGrGpOYZPDz?7_2(uKahIs)i&g9Z@3oXw z&lT#!$bzZYtc;0&F_xZY7t+oDb}`zF23F#9wd>h@!kH;dYKJ@t4rjh!Cr3HymXm`aXQ_#WxG}TPjwY zup8;=j7Xdmv?VCrMHz#ylwzsdTHV*n++AIhFqhnaM6irrULDMqDI8>)8gpr&5jeR0 zAl5|KI_;$v8Y$LC>RokVvM4et@Qr@4wakZ2w~CrYyshb&17Tn*Ngjwg68`=C<@glr z#On7?`D;B<`GW3&dtOfxSe1?AAlZT1hpMntb zGf(snC;(E!WC38ZvT$B$C*zm){3=brZn{`$@$5T5>ne6-zCe>^4{WDy zso{fii=Ie}La#&UWP`Jr9T7QQYW%pW@siW!QT`c?c5k=3r8(dOm&Lr6DeA8zG7Y&L``{DhB;z zfY&VD3F(6IjKT?QUz;0ydNpTga@!8JyeWxn72s0Aw?uY`W776@I-h-bX$wuARbUyD znA%Kd&A&cOvM3B1hi7%Y+$~5-`MWh$^MQ;ey8%VS!po?`YxHYkbf;swCjLsXa2iM( z$;VeX(9Kaz%^)2}n|rhVZC?b6qNi+F#R5En_F#GTz*i}c_^W}efoDcB&naUzlU>(x zGQ^S*zXnSXsmif3xMobQwEDP%Xr9hyGF*v6lTuVXXi!u{{WY=drzoly9TE5YFxYgT zX76b_uF_T=DkyC(7rr{>-!PsgYx%`OVUd289{_D}A7v(hfIzOPk!yls8|qexaIPwc zlP~IrKY;knQpR+F$&e5imj+s-W8NDE)85H*lkDP8>G_Fh_xOl$3%uadhmvzV6QAI>*@$@i*jXD_bKORIC*w%GmkgJBgU`m9F|d zl3|GN2{}W#qa%4YndDv|bSCBgcJcaqe+z}L3O004LkZDGCJeH2>ejbt*AGl#PzNz& z?1QR4!#XS_fVPKuw)OGh2s9byDRp(caint#3(|ZCvp>{TRCu_#ts<<*tA3@XCnk1o z^}i=^KwIb&_4|Ff|0@orB-y6bX^x8={UZSd#W;$cPnar;Q>(yC-k}EeaZXey&tcA= z>yzP<}_xq9c1jAc!gO3ri&vKL6d4pJv;(vVQzU`7{sHEq)6G4HZq=EWyV zUSg!aa2jT6k(?f^F9Sj0Juz<~1o*dx@LK(w1w?pw7i9LC@>dDiiReV+-vOa<_@}A( zA0!EdfBu?P`|h&OGAzYK_Osl3xMb*1l}3nzG3sWxRVPxVLg3vVgS)$XcZD1uIZLIW z`}Qg2Mxnw?jh(t@cqTWF$H{UoZ~wCo@59ClCi7XdC1s6xre3c1ty?YjO|NtnOBb;dO>ZQD zjZJmkr$kWvv75E$q$$ekG+PfP17r-*@qBS}6Gyn@~9(oo*&*fyjkdnK_Rq&C*+jFob5MWJ+LU@wCcxFCmwUE)hF!4 zhZ(jsUq3yWW0gxHw@SacyK@a|@_(;M*-h`4aMtvrVIDx_A1Z|ITXc>_ChL7RtXi?@<#lyg6FsdskyoE(L z7#%N)t|~p{mnx&tUa$F!NmXXbd`iJ5ejln%r#u{61oe`hDuHCH&J|Iwr<^a=2g7uv|yM zI@1-OAsrVx>`d_8{tIR7^`ttxMrFdg0UH+6*33GjIeWeX8|)y!A*2f_fBZEz+$(C< z?r*?>Y8(2OX{YROX{LS~jaw?$H$|HceO6OF7r^R;eq;Ev;$8n+-=IO_W zgTQ50c8c&KVUTtTth9I~7;f?&#p1oRKO(tJg=6n3ArtoGm`8N7Oo=S$Y+c=|5&^Mi zATyp^^rO#a{A8zom58;dd0Bi$qNJ>EeCEMHhMf}%+VhV*yk)uv@!w56R*(pElCM?Z z1v<-2+wvYRwXJ8#VKF|0STs{S_co9WX^?*Q7Ai+xes`#X{IK#4U0C}PzDmVFpGDq2IE2#NpB|@+-#dWq0wNFLNagtH$QeBl ziOys7-c{Un9sZ?QDH2QE@{4Q*%zFsO>n@7KS1n03gP~EYn$wsNXKDFN*dZFe7;k}) zxA^%yVH})r=OP!EA4@-SPk@glJ7F>LNfPRtharGSv$eAm z#c$aXZxLFK{fN)?b};Ez{M5gEozHG`137iEUBoc zaUwH2waLT>6U_PgfcfTkax3k39R*Vz?#b#0&#(7VmOsmD^~kMF*&;SJA;2Rc*)oa1 zoTFfzHetP85uV%5Cn6XT@6gd5P~5pXE&3zoZL>s>7x?|}^xDCnfe|DVLtF)4)*5>0 zu&Qj2WL}2+DJmf*>WWf&iVALO*xd29(nUIS9m(}sHZi$$9<-N{#t=TWvleUwWhl$41u;d^Y1j;^p=LVQ6^A8a}MjCu=?4 zk(eE9`p^C|K{`4w9P{ibV!O*=)NfeV9qf)hCCWMn%^_8Omc3}czYmGxuqyHeT&ew> z?_X}Cst<+2E*h|!^BcHvrG=`}TB)lMhS4(#+I7*tT_c84v49M)1-P|=Z>DX&Lk*LF zM)^pV4MWqjKwo{b(h)S4BX~ZXk7Lj6wKorPq|2jBbs8O~AKGsc%bYZs(TMEq1>pK6 zs@e7CU2y)4J@1YeoBHAio++a7+D1)=2_R%=5~sf(rT5uNd6}MA)kkUE+x0iKql1EK z@PL;Z9r|udX%KpL#%d&bvS@HU;6dMZ<(zrBBNmW%eR%75z=v(pf<#t#etmU?i8g&s ztW2;+aCtGNaIim48Y|XetSPT{zT|SdN8iBAZX6UZZpyNG2@`ZO@;5|s`r8&S&YOOj zVRr6GQK#b06b@XA%$Tjg*FCMtc^Jz5#=S5WK^LK_(Mfbfb>=NTXc*)onHgScn}zs> z7^7JH}T{ui$?${3A&Cs8Nq>ceo2{1HaEfB~SGs@bYjnCS1PPz&{-{Ic@ zAn$tfvL%oS%MI|qnGc7xB;|902D=M^SbSduK!ifVq{Xp)o-1H)O*j)+oD`yU*Y@{O z4p!5nlVqb&yL!V^1rYPt*ZW}aFQ?QiI6Z%flscWYcpf#sT@vD(X%yBv??eayg~_ zOpS6l`(q^U?8$Nn1#;TOleOqOw$yGTOi{|lkO`1<_bi2Z!rjj8&J-u5c zm_96W!4j6Es5e+I^LaJpIaj6&f+cy~6RF9^$JgF2#w0C9Oepq`$e$Q?y{Q%HgWYZRu8(&FQJHo)4?)ESZ?l@bmLi>L1m7VI=QPP&NQGGIz1DizC4qtp6vaGW3&>LryS=0BHOyd*tU_{Y+?*`(WJ zVdhqqjt&nw^b|%?m{`aiU|41ZGy1nvIe;a4JpK)+g7#K^_Vn~bJdpJH4Wlnk-4sXD z86+zsgVn!UlXqrJi7kwj8H1fU~oGyg9 zPK2ACJ#fX~F)mRv!?~sJc^l?`^t)Wf_jQ5p=C49iI^xcna5HRMYJ#LDJI?4{k!Ayl;w?5v<(`EdCOKy}5fM>py=5Ot4!-@({jIw%O3?+!$OjbuembkahjZND zqH|^6=jS!^<*!ic^4;vDiy%1U!;sqPVD0HC& z*6*R-_lxISBXjCC2$r1E&=(`bGz9c_D2R4eL`x0{JrD7YEp~xx zlq=J5Ow?M#dMUHaXHoLhw%{yT+kN0B%d(qK62^fl4Dn8nhXg9S|x~q5MarFX+-g@I>*J44j0J;9N(_O zOi82!hFJ9@eK(=-o?l*>on`0H$YAkG>J*`NuLah?}3s}_5{{7V_G6xMpI79Uv0HlS zM{hQtqAe|@lvJ7hns&JteSxUrAB!WD@@q4dRN`AFhq%5O<1l^toPDn1I%J4P#1$Kl zOR~fJU5bs)IUR>Ku6;FQy$+EH4}GppryvgrDyKSS82Fj(Aarqg`gw z+H_uw9-*-=;aaj#|Hi1=dI&I3;pqb0O@M@3Z1G}m;Z2TllrFOSJp?CM75>x)V$?&k$!ww9ycSYo0o9nm@P`-ZzZocjaUzj<3D{DLYv`oI41;rb>KXzJy_3VSp6CgLWN^hyt-ZDYE7lcv zJw7fDFn@C$L64ySq4&+O4m216h4W1Ad}pn>iPOzar5X0$zShjlOamo3*<)+LVBrQi z8G}Pqhd5{R4S(W?I**850Y%~HNrH1*RjzGXWSS$>JXzB(-6JC-9MR52BHM+4LISwinGTgqBa{;@W`Va`!)Y%q5lmk`+)bvA6pOu?8CmR;h=_;?d2%=%fi!kU%2KIm zxR;~dyPyM2)^c4!Z=y1H;tns!bb^1L=9}FbVG!wR)uMJY`B@%03jkhD&PW5kBHGB7 zP*oPHH=H(K2dk_GI_Z!0-^+Z@`M|GH-x?Wag7p@%MLu66^cb`8)FnC zZ@1$ed?TeC#m&zFW~}1ky+^GCHt+qQ9{RY}wzjP_-c;42Tm5(BvhQm-L_~71Vbtqv z|IsIqSX^31m2mIgzIIMS$mO1VqwQgf$Nnh0b-4Qi=IT{5R=G@%ebU`Es-nN3;(K(qgP~xHgDx-UnxQInGw1B2orpHg9 z5NTt{dGYqe_@LI%7L5QIpO2qkP0^{f65?K#7Q>sIb49I^0+g5}qg%QF^dDKOiZqbw zHhIN12%19zP)tCC(=y3^0!7dkivdGUU2%%4><3ao>U<(FulhfF8gRQIz`YEOj3~DN zdBDG8ShBf6HB|NRZ`#u?JPkK3Y-MF-b#-;A&J-~3KSN6mVuAaZ@=E>5=l>akWrF|~ zE-o$oFmCEL_>UHfi2-j8v_QZKefxK^r}@&3+4s78dO#C~`v2WTLq;b2IRE^8TwGj2 zLeLk`lKW?*)_6Roo`5Nyi#}i5tj0BJG z$$Fp0)_3ZG1d0x?lRVGj|6G?E<^g>|E=NlLT`dw`ReinQ|IEbX^xvDNc!*1Us{GHT zdv#j>y)2c%0klg@{=L)F%_t*O|FbPVTG)Pme;OMFz+ITKr_cX=2pl{?zuy(-aY}+Q zb!RtcR&`SUK8!{Z5J;8(2!FXnJ0l0i>(^hY8GsvrarJUdscG+QV}O9ocz3#N3J`TK z1pm1uo*N$MGkm#IYSdCwQc-F3JTgq8mhF!xdM4;l_3t_&w21jc{ckklG_<&IpdK6j z=#|K-xk9>a?*BX<^C+{WjZJZ-A`=6V6)qPiXGqR;Y4bl{jnD=g?S>2Wc({9KQ4(~& zLGkOWu2ol2X=%Ba+P_z5+{UQBDAef$kKnNfq04lb{-Rl|ltz8O-iJzEw?I)|i@D>O|slY>rc~W{9+w+ z^SNcA_SzB$HX5KGqDn z>f>L##xu9r0af}V5b&5Q2r$LLXC_j00Sc(_^XI1vY|^@)rYjEp_R3P**H}Fp{-&=Wr~V4fdOB>{@22pp~Io7tJpf>a~-}{`?nW6CdS6bCMLj_aR>=Bb8<$P z{QK#zmgtK^Y5%ot1S5mW7 zFHVsB*I7~O-0n8ZaKhIy0DE*b2?C+0E2Ox6i=4@kmdAVEE zhakn`?c2bE8CL%b5c)(#L^AO}y6Q}S`#L67Ed0ekVF}L(58tV9as(9HEuO47uzVpb ziSiN>olg?U7e3l5Drmu>+SA`xG|;Mk{5S!L6%>nsn}gW%5>`NZ^zphuh9|RM+C)Vc zq#$6aY9GB(QBj+Jmn>-xoBijh?mD3!htR6)iwqA32M6E_hz6TnA|n1^^(1^wFky|> zFLni&*%%q0XY||n`uh6&x56fLCV_Bu`+|juNs*cem3k|mS4}}7QK8qKIF|Z7emQ|O zTDc}~+jg=NNLy{dTELFd2TNI6S@m>xZ?fsg2s1^k*-pezz0c0h&dQq0;s!*tijq=n zt3_y*lamvCwgM?Owxp~zPwQ}U76t}JNnNc5b=vtWwCaBk6OP5TgaR#ld12fHvP-9& z4zz)2*_o8ZXl>odLXq+tx5>o^^_%Rkfq#!e@he9Gi%Ui8ECMP#JQ; z-hliDq>A%W^A*r#xa58QOtV#CSQmTl+MgQMLe~Z03IU6LC%nc6U_gtsVHlw@#Dh;D z2B7oLu(XIZji?CgBS6mD>M%ubJ~=mct13>UGaUCn#~v!xNgqOsO=jBeFBmRKSRc$G zL3BR{ObwR)&Id&2L21(q5J;f&^IF(-!CaxL01YB!NB64Y*v1n|0#kx{$-$8r7{WE7 zZ)sWhU91g08&uSt>}(Ery3gb)F${wFIHKX2&@eC%UB8>OAVRv-6VqEm3t>T`Y<1g0 zvFJbQ40%?YQfZD0n>^VKx{M&pOgiC6xLt+@g2rP?#Mdn4Vg7BwV*jN7cvyFw>fYYo z)5g2m!?--->tcKklgu7Kqp<;kN<21v4_4yH%1TgAB>FTV9$p>bqJRhpM-dLnNJkej zNd+1g3kCRZCtGYr(ltM{OXU(;o<1jj7WSzeaNkeyTB&L4-~e^q+s_Xd2%{prJ1Ng9 zre!tb1=cb%2`7d}M&dYrQpQC^Az4WBaA^_W0J2e#f`Y=)@c{I>Avgkuz~ObCIB1`Y zlFU651&b%JqSd9h)<@5rD;^}~FU?<3Q6WKh+WqsVst_q?l}1k}f};jq8PK}B9T6TQ z;eQLNlCXTh1wPkNbfA{QvMpp}re^=_xjjl`b;1aRX9kf0r@i1e$VAMR#BY~dk?$1P z2cHU91_p*(#`h)3e0{XQ@CBaFKwp25gkA`v8JW+($Y=`Hb`lgNeA4ey z75PO)MYC8-Sh={8)#&Kyo12>)b6RjV-b+0V8jBFtegt?dtqK!-#tgYn%j+hy5 z2&@Xo0xxfQlITIvWZZA&ErsUj;=)1H^pdj{y&5*yp4-XVTOA)4SK0&!_QM?zX=yFa zAqXWYg&AR0+Jq^bzN>tos~|Bq$Z4A39mzO352Z@C%J zHBY?`Q+><0#_Kc_k%ta2D}fQw7ru z1z7c)3`JKLrQ$R?Lg9(ylF@lzYXWA##GsN%Q1BLL$FPzW>=noI^778k&TivX^B2Xp z%8OE;0%QPlb#?Xr6A0G(hKNpVeNWI89)(5(0Vnm;q8J~Ev9z=_Y52R_^Zm8neFkbvi*{ziv}o|bPu0C9}0tmw>^edqQ9 z!onB!mBu|iJ>Y3A=y5g~_}UtRhF>Y}iGtV&DJ}f;iE{OsM43jxlg0@BF|!NUefyu| zmXnUhzXKFOAorE_*4P8oVcP0_MiF>p0j;z+&v;p3K^c5}w+gFQnbhhoWFF5aMW|;nnyD2+}lwh}|wY>uXYowo;((0sV`UBlbN&7t}pjuapqbT}&3rS|kBk zmeo{Dlke4Q5LuK{8DTFa6hNR!&yTn`KL?+Y@kqDcyCVz+s{$R$`89acQbrR9nnQCW za`0IVEBR;MwtB;cUmeb+7*7jWbccg_A*CN6tw09Z>0)I9mslP^mSyDA$ceD>Bk`QFBWVeFiWtO> zhpSn$9%;}XLkAejObkf!filNJ?EqwEU=KhZ+{w8*?X?o{s@}-}F7jPADqjJhKT!Cx zK7LeEk&%&!!XW$dT{aFM)Uv&#BHoq2(r6EsS{m*hkr-)c!dO-U|FHTXp%F@;9hZWg zIn<`c20&AiBe``qxbV@-AMbNz~5EFnIiAB6m3C#Sd%*ctw{JqcC`vB?Z^!BZo zRXsWqsvH3m&fEC>V#RHT$oCB!iQQ_QagZ-=3M3Kj!bf8=q{0tj#< zmC4H1w*N_1DaoDo@)bGnYaJlo1HE9qQZ=#-iq27l>{HyO=65f@&ZaVHM+2BeBIriz zk4Rf*KWPbU?4@3XeyzPG2m_3;oganXechA=zzB$_Q6r|l0^$a6(5)ceKLTe5?C|!+ z#%DS$tvd6L4(r96cQWtKhw1TvU)Q9e0*D+X;8k7)!pIcB zi0AJ#JUIBtUnDEv^zVtBmYcabrEPQ)WM7Zj`pMEAkR8G1{|5DkB=`A|6L=JZENB(* zF05yot_}XT=fa+c3W|zJPfG(@*bKAFl3GA_1P2ELk|K@8Ah{LDYf|%Hh`X#xfa7?I z*1(uSYp5B_S|kY`^M^(O+!@di@$&QYI|&1D!FuJ^0F;TrWTE|=-;*IoI$Z-LAdX~4 z;!nZ)#?_MCGBBkhiLtR^co&M!qZdojr-%Hrm6>k0O|TqWAh751JLh?B^Z})4Nh+HO zaSpR)p$s@VP=vm|=QF8{X*rz$2@ntl7!+bEzv)#!Y7iT=-|d&{mg^0A z7ywnaI+903a!LxQ&;73UW!s7|P|f58g2boF3k1?^ z7d3z$OP832hQjlUO2ibEKV#mO7xnfIB#>+7{>aZ?!}LJSgwc?L%+3-_4Fz*Q$hZL% zsRvK_wA({We0=q;8~rPLkCJI1Acu*~zb9aS4jS~ePtFsIS8moJrl$k&ljBXcb369( zSDiAgtNmXfI2eQf7T)Dg(9RAf(YWFjffu!yUVSHx2$lz(^3+4bCwu zy6#?g#bD*`UMrc)vRZ4LZ9Nc@;!%O^t~FL!eg0girL83rblZ1hlwuGb0et>uxy{d^ z1^~Tna}e3UI#Z7;sjM7-0mB8*p!(TDwM`sn>^JZ(6c7#t1_sW*D?M_JkZCeH=Y+se-=INPk)Ghr9)6Rk& zZ5EWXTlwF6EJy|2HZK7B0XcT9hUHO$eZI|)fBNdzE3-6UPJG>874E_NAD`%k2|&A1 zZ5^C_#Z!WaGDAknW;1JkK|+=bG6@B43bpUU!%5KNVa>RAGVUj5jlhPAL%=&>2nD(;q+-q=|GZqi1abg@AH z98o&hfb$;meHV0tKv4=rSFD3iFR@Oki}N}_tnY8m4jZ6Vk|H3r^4)(|JXvlln_pZs zW|IY|H4G8G+o_AwAn{2rt6vLZRhMWg@|{LSmFs962C2XV2nyhoEvyZmO75bcy*(~~ zN8-P?%84+3qPGMs=Bl;PD&q`TRqbW1mifOLwYgh&a}CEXw)C=E(VC`fHULZp;Uh@^tjqJR>2?(=@{ zz2Ef@$2e!`#=X}1&H2nH=6a`8W(H3_1P)~2qu~oI{+NGV3!EOe^Chy_b915;8;=Cz zt^>h+jz8{D?dxnhd@XNpMzyyK-K_t1$icE8_UDG@_&OUYg?JM+uK~YR6Llc=-7C;Pb3s-`UUXd;zdlY61_#afX`|K!1%@Gp}mSxjidJf#CHjhZE}_h$Lxz{OQ)T~y`qs2c=yH8?dzxwH(N-2)2_1i*kDXHRla zfT_7j@*9x#R91mNo5HVZho9Ka)S@{*Ue~sn?0&uXCh)+?;QIB|wIS@k$8px-8DNr# z)Wo1*z#)%Nn=pofB7VE-Cfsy1aq&W%oFEFL2gw+C=Ti-B`aWq41x4VU`4)lovi^#H z$7*Rd%4Ni)q%jW51u?|*Oiax5^s`l_T%2l*X~dQK{irTXgN*R46$|JaI95Gb07Iq@ zCEdq$u%w`M&#T_O=joYuUBp7Hp&EKXY`~iLI<(Cm%|7t)yx=-wvWy;#cYH7`yQv&p zXO+2>o+#kXMbIYhcXYJB(%%yIZgg)P(+uz+O!fyrcHITE09ca2*v!qvg~I;-z5tmo zU+z5W;VlgI(?qUmr~duDbL)-Y7Wi1g^`P)c0`njJ1ME9sQUhjWdD%gL^w`VY{c6zR zI@I-(Q>tWg)T5ib>en z!4NJnUC+J4z64CAfL&%<({cFnI^j(Y)brh8Dz8VobuczDl;B!qeNESJbaV{2Es(hv z-_q1Hf+ZAbcqo?76&4nz>JHsJ8pyqNT+c}cd9t2KD^ZZp7%AS6$fc7^F-hN?flecW zOFTL@_8nCL!!A5j5t`BPpeevi1@LG3@d{NFHTFZpr&0n6GApH9aBpfM+3I}%KG{K! z)}hrBNXNiXl9A}@oyw+u8{Poe<2V8XT_045ikQRm8WyDxR5!C{|s6u9*Nsh^jtRm^ER0Qx}^3UB8TG zHFQ9DbqP(0oN{wzU_qwb`w`$~z5wh3M%yZ5ViS_aWYZ zfMbBajet$zvh2-NQzP*X(h|w0q}dJZG$-p}qG|<$951hygc)uiP~GBv(7tdBZp%4V zJo8OzM8{IsYiv3sJo)U20g%w;LeIoeedtO{hQ_yMW`Zc7$X&d=*y!miZM$N8dn-U0 zpm+b?FfoC1{`Kkkem^;69%FrB!g0BGFZm~y#AddiSupab$Lt5HN968{z-w@LK3~dW8AUs5ak9t+7gwok5m5{$qPfkqgDl7Sh zSDtR!%t2UJ%M z+IXV%kqZUmBlQMCV=-~RoUB7zFCwdUZw?yVSzkHmP&b{ZlXJd~GS_wy6yDyE(Pyg{WR8E|rzoF@^2%OrjbIpG!4i+b1%~UXsj0He!Y%I57tBBqPGGX5TJK$XkF@}<1d~Jr zT>|M=y_Td92rKlRuX%Y7f6yH78n?=8$NqzK$T_fQAx7U(eZwDl_JoH7MBY-*@wgEi^(KR zdqqY#JjD1QfL~d;cpFNvrH-gozf^4VV(7~$i76X4Tg6;&jx*h8ExwP>R099*PdNuv z;@rggd%gaqUht1`g@1Q~uYO^;`-fX&HltRT^`~=dGI`OvopDjoxVWVH@6#iKyV1%) z#WZK!en!ZQe9A;trGGp4VA}A7J5+JJ{~%Z1)7P()h307a;+zsf4UCe5FdhsU|Ag5N zMy^tPP4X=U8MLt#TG@P~b6f}t=!*-OSKxn*f|w_qMvcv3#Xww#0=#`i>b6ORL4HYi zc-4EIG~)W|Peq38l!e^g4;fim$@n<>W{i>n38lp*Gs`u(eRv8zzQ(Mah+P82q_rie z9w~HG4tqK~(2+B8RU1aZyk+!ExhUp3!ha(Bj3BddlORMAU_if!#8SHtHbt2Nt>ASA z1^+rsOsFU5xU2Zv!&~1Ei}?8OL2mp|oQ)X~c5w#hCkGNdz);FlwZDk(WKqGQUrt8!A;k$9E4O109yV~U&ZJq8rRrbWQ zwLaxvUqbOY%=O!2Dj1iQ#lgdwSfmxodC}9O>K$hjX{c^AJUpCN43NQr1!Q|;@-4m> z8Ve252x^07udm8@iO5)+MOXHAX-^d5J;`Qo2}A_$KJ3=Zs*ZVF?<=qpKyxu7jKTQp zrEO;^!&NPNp! z%H-hI)6ttf54qphJY=VPHS^ilyW=34-j1%Y`q(yWwy=_Og#c5J$%yK$TH4O^9bxTO0Y&acV+> z6%6Ts8+3>J$>kyp8CWplcYEcbFDQnbAaZbZGK^ougR>se9)EuQii*>5xO+FzgPoYs zk=S|{S~XN)7@gIfR~#L`7Z&;s@s?u=v+@COIu#{JudTi7@7c%y_07Z4-d@at{`t2+ zY0NddgVL?z=I)Nah#VZGGWPG~4H9BzVj?;yR0tqb7`OHO0{nS{Zx%HLg=&5oM{#GC zH*|VXAI*7DF0QUTi8)2wDCD0E#J8E@VM1bqCfLC+i4hidDO~@qhrIy5^65!y?XuN^ zfExa-bdSlMvqu*DHO>E)FvGu%*9Y9x^4erYl)ScYGv&w>Rs6hSd)pdSvzg2l$>-Va ztSso#gj7H(kajBhe(Z|+&SuNXs#qEukZG;_;V%xElJ_Nnm7BKk?iJaw)AU^hYzox7 zM|9^=v26!C^9l~{CuIw8&WF4wP-41E)ctP$#LNxc!M|hkcBDg|MjDDk!#U(FPQgk6 z69sv5_cMC~Kgeb}OxFM=`%h~W!9q~*IIx3C%OA%u4z%3Y2FLy;*HM5kPe?fp0|QS$ zkcuA?06Rm3p(Oy;r zYb(FF_%R4t;E}Snv~)-(@Q#gMe<}BKXSp}Zf%+RO)qKYTJ`1ud1bn)|291St7p4;5 zil-0(G~@Z_+;igLgQ(~a+#w)3$3Ib@0CuX19;+YmW8S??p?m4)^4HpS?Q+|IhhciF z`RlfGwaVJ6cP75r?};Q^-x{v9yRipk@N1DhtIFmu`&EtNXi^eZTx(1%mEh|h!L{cH z_?e|Z+$=dtUds?LTTdf#6BApgaf1j=7)@ZM$Om9RTr_6NE z)jW6a(z?1}X6pR)&%a$Z-Vgnigy&x5Vn40ku8Vyd3I1HOGu>Ge(En7~&>4NS4P&qh z5Y&&~y^~^cgLdYss>=RHUBXP71o|+Mj2@QB@WA8Z;Vg@>urSle&|1T#4yGT$EkNi|kl-P>xUeUBRU`Da zNyME{Jkb$63V)b(IeOuVj*kvRZ20*20I0HwG&eOhg;GO7)y9s<;b(C1@E}aXGy^pp zx5gJ@H$kx9XbM`4dP5b1S?CpMCEYLyo)DvI`gcYPu&ocEtqJW1HSmA7*iob|ir;cD;JLUpeaHvWyHnl|n`zdNFdGyA_`+;Y~a zO#k*{?dNZ=*4Rv$!KZV|vaZ38{BG>wp&#p4>Jf%{cwcX|J%91sZ=%Jw{Mj=$t4*03 z4|p*vFoiH=CaIi^isW%+z&7wGFwmg}Fk~1wUt|ffdwKk|m#(L09G&QFPl7iF`}|xZ zGKyt;C+zrHEq~~b|2kImc_@#JV`6UwJijA1`${>t86597Ucqs7D2k6K*nHxekRKWC zz$7FjY-uVwQJdBz9XYQi0#UgeG#{ym9Q&DI6@)_Ic1#VDCm{hu2V0y8hKKbCZj0 z=2jn>h&glRpiU4n-Wqt@TVdIJMDnGrC_^%1cFgeV_kSq#9rMI~utm1ic*(d!_BR(r3)Z4Nip${Mu+a zhk888d#DCXuE=X>NQv?TH_-hEa}WWzG3Pw|!HnfD&JXkdZ*qcm7UrbM^tMGFDcoaS1d#QxkH3Io@#`O_E!&%3Q_>~&mkV4ah4%vdZw<_mk+Is2R#yLdk$4!hd*V)r z$YCwW!Pae5nULM?jx^eSMcc*RylE5Yu3LZBAUH<9! zip6Cdkw%5GYD`##D;x&T%FB7Q7}j)6+cC$OE-+Tpb2p)Azzi%^FtLA>G>_CxT;2dCaaDPI{q2%A%-Q#D2rTy&eU&(yo`+z?sK5c(2K6i z#XUlqIx}8~W zmX}9h>XWFxy|Y7j#hLn>II)Z)?J%y~MvCFLV=|fcxi?J#=S<3m-?W4cKTMSS7}3te@W-a{IjGo!{wlA_>5O!cem>d722~y`KhZwR@s-*6D#;L(o^(Q|8-Ehyyu&f zlkYO`zF437ca??R#g#c(V^C}RMDX*-YHkuN<)tdCfyD_QGfA7NpUivrjphJs<)BWGSU5g3UT0v;} zXmtIV$(E8X2*z(I+~|!Yu3nAPS*F!Qeg2$t?~2=#F6O+*dze0`?cwe(NTQa;#@@&X zLy9r@2MrI@tkDqyCB{8S`qL2*V4BY{;1AGZ%J@imVpFKKxH^}op% zcdR}>l@4JtCMlpj;GR-Ab!!X1pzXY)fPAJ;?HT;EK{)u{cak)y^=e{=c#w)aAds`Qua6Xn5C}A7w2U&5EK+10}MqF4^o3vBF~<39IY!#iqr=sg2c z%Sr9*>ESj=CA3uH`9E3e`wF(8df4~&ZE_vv*hOq14e*AKisWnODg^d%bxVHhhBQHs& zpv}wVwz_Y8czdmy`ft1wxNxVodC7*7 zQ+Y>m#w{gndx^Dun)t6<+56EpS=%JZWmb=V>X#xmTb)tv>@uZ6pVf+vms4fqwTz(eYXTK}m}h|}_>neZ-%YNFzHerLe3gG6lA9(_Pg8T2##+sg3$%<>llib%-$g5V_m9xx!Xh$t$h-eA`TPq-!y>*uTBM zFEf3S>Qo#OZZa=32rj)Fq8dJPt>62HRQO35_ZP8Wf*YnJCI83yS_hAp#b1?}Pyf~4 z%<}S$*R?n21mPPzgjEwjFv)@=89=Nm#jF8%8d>AMZ*2{~gkEM`DC+}))qe~iP`5Zw zZMuSKpLTe!U?r$Q2nM5l0(Z)9XP)-?;jiCHZm!wXGL7G()Wca%4M^+cV4=mmw6~ll zu}^?j68Hn>c82qxPR$bhARsm6pp7>CMs5|$`d~FIyu567VPks+U`-VEN{mlognIzu z2xpi2@*xaFC?q@?5z>+Z)&HU!S5EV)Os^Yc%IlZJ%?lJ)Ad z{x3T61@J?U!0kFMrHxyhj=$KU=GnZi~r@eeB;tmFJkhM|o$H!A_ zFzANCW%bIY1M4e=u7sxO_+p0GO`yCh0L{E1-?_h3=5nH2tKbfCk3ukQA|yhPyhP;W zD!%Ik{aBxuZB|&n#d2_Nz+(Xe!1?*PBfIw#WDj*6*Vk*RJ=6}|^_xHy>Ed}}D$%q< zo1>x*JK8iAC>({Zwzif(37*su4$^6oF%jE0GvG~40(+*PjidPzq$vJZZJK^`f{8`c z*3i)YW0#CM@9EQ4a6bUW1nlQLXcTFf3@q|~1pMjE1gw$I)*sHmC{Y5YsaxEcS?ixd zB_Dibz3mJ{uVI1o+l`;ZGAv5I++rv&NV>SWp)C=%?t)-{2!=;a9h*OHg_nx;#RnTW6X%GKzo$V1+B3tIu+I#;v*<6 zeWO7DTy9t|w7#VVPK*o=;&~Dg6TdjqqB&>gAK&$!ar!gg4l>sL0I!fA(?Tw;^)8ycJO8pN0Oh0?}75NBDFtRpkQY z3b0NMfbK1Z#iN&n5emko2fMztwg{Ujobs(ruvC&{<>2 z3i}T5Vz`1g5vt==Nl692%?YD(uawcZoRpFg8rgfHx2&x*c+D<9vLhB9KB%3mus;M* zK4>BOD^DjVFc98>3!s zK>S-aa^}81ssY^{JZ!R{wZ4GSAMp1#I*<5tmuS*q9Sy=P4elgd)vc1@QR3zIgas~j zMMuDm#p#Drz1MnMBoHFV;0M0$@si>YExZry9UbWdlau1??5ZZQx41DnH53J2xbeGCy`S<61Km^>?m~e53dDQXhELg zKTnyS9_}qTI)669Sg-QRzj04x4LcpR*URERK;N!^;0Fc2C3wSl9FNYAzXH$y^gY^J z2lkZ3zbkQU1oY>B7BYe(v~4o#4DuzoPyQ@;2|PIgGex0f%lgJv(0)(Ew*Aos0p#fX zF3y6;$;o?!q@>WYFdZG;yi)mBq5t;)&IP|66cX#awyAz>>z9|}q* z{6WxIt*orXtN(vL6ql_4<^j-ReV|Z49AIhcQbF+IY-rB@;?iwIAotlbn7L;6W1u|Q z{SBl3k!kYg;#kD~v|d}_{Qp(xU^H%lRv!B3*sjyNcXav}3(Jz7-OYL%x#0Ep-wX?U z|GHw9V~PFm7logByY0n`wG*E;14BcA!OGxU2=FCYlk$6?#_{iX=Y@jx7rhvR|EnsL zMn~g7#D94Ud@zMyW6E4Ww~37v|0MW7wk>dAU2nL-4~2c}{C{HwXfdrk1mM?y@uU9) z<^TMHF!|x$LVxt(|4AqkwW2-T8wKd!1q5h4(YoV*zPkU^N1#B;vb@m0qkjgvcL;nv za%_af=h<;`popTQiPaNAyu5fl;a*bI`NnWDveMJj!FPJLJ1_w;yt}UjX_Z4&J)gIL zTrVb84+JmNz)!a5zew>DtSwN~f5F-O{To-(f&PQVyVp<#CpF&0@x2ZDRgs!X{yl(0 zK#rZAT~sus_dlcBUlSCR%jo3xhd=3Jew9p-v=YI$(u=XkQwtGylMxmk8yMgLr#r(3 zr*}pCmEq3RAAbM(^bvXP;#u94nfX%WLW>8VZ* z{E7nNlol|lBtLmF_2V(I_@Y!n!sIIzfkt^qCon$PdBgssqoP0&TTva%Im^CgW>g0b z=HA}>kNSD>@_&G*%&I~A7F?380Ae8)M#hBfL5aJjUZp^7L32!{rplnE{xCKce6%^a zh_>lM2`l$6?VeHpP|$Yg(}=gwqb5LAI_;oCgA@3f(p?KM(adM^*%cRW|9kzWIiVN= zz7N250b=J`C#-aXgSfLadI(luupe}Fb@`v~UR!{ZqIhS9fBrLMnPFxE%`_rm_WpM( zsD(d2)y{%`$Dg)QKJa*Pl~Fe2q+yKs`5wsY9Z@>IzK763L3n=#2AK8r87Q*gn4k!Q ziTfC`msq7!j}bqGR zO^)ylL18JWi(c$b-s`oXhrud((DQ#zl=j0CO+JG>2PY>9w=ssNxh!H3jR5j>T&VfgFAGo`DIsA5UkfVLZY;67+5?JExbc;48!*)kN>zyXP?sdN!lIuPN3q zy}Mh))cxp0ow~X@gl|$Tnp|95fQ*WZjirj!CwK;W$k4Db(@AXgbLQ2si&OWCCkz!k zAiI*h?#yJz{FELW{9DfN`4r%9I3CJS4)o(mGaS6vqtpd6RA!zVB$PU`va-Uzt9&%e zfP~lyPC2+m(Aqd@j*4JeH5{}`@gsHBCo%{!uxV!vN?C##p$cbpc`Sbu}AioXpYVaj+99KZZF3paC}mPMO}%`PV|E z>{Rnrc3tvy*jgq7AcVz`@OQ#v26zgK05UrzT~Hh~1mRYvljA4gEB6$E<=<=uGQEt9 zCDF=I0%C@FNk8PlXM%?%N$G0(kq;PRK%k^@zIV?Sa3XjX(u)o#+sk6o@B;*rQ^0s! z15`LjvaYU$%As$-{$0YC4#@;3Yb$<@SQ1BXc73g>;o*d&td9+n#8OnO(vp(c3V=3e z8yqz<;DPjlr`wMX5+!|EB*epjOGjkGGbG4BPZ-k&;0c97UlE(1l*|EM#YMZ z7F<*nrS?d;{{=G76obt6C)ri;J(<8j?SH;H04Uc3p~N|s*UZ4+{&!$`^cMfJZbJgD zma`=-g84u={5Z*wW?=d5EV{z$)l-f6{rYCOvnmo@f4c95&hMItqM{$5y>i!GxKT6p zUiQono+*d!$Agt%h<>%hkqo9JML)nv7bGhMFolZ4cJxkZgNZi}?-ufWhYJEmwhEv} zqSg2}p9B`ldw5s%a&Y(@@4bEdHtze`7v70706XpeJ_|NbLYpDyXwxT76Zs3?Kj5sq zNoJT$PY6kk68RvXCP)}4O2KQN*09e+teT?T*px#U>gIs6C4?G7Fs&BS0UM%YG!Re# zL62uw!oJ4TPIM9VhQCmsQhJL1#K4Z%l!YG;iI_`5^y3cpKHzr74GaqE6@nG;C5#Aa zP4$N^Wm+)Pwup&xJOyGqe44hhYpJEqT~@O$|AgtMYx4nNOb*okbY7Xs^m; z9-ljB1}~t|0&F>;@I>zy^S6H+Obp~E{rI!gC-H%2o0BDKQTw04o6mx9z<5U|$VqZ9 zT2;}<=g6c9!GF>Rlj}Z~UGIZqSQiQtA{2^ah+|`g(=uSSeW|@ERw$3cF^!3hUhIB! z?0&Vaq42AWsc8Zg50EJP&@9Yh-+jM;3(Wb8eYySeB(-HUo*BnxB~6^E9$VRIC1KabV& zbwnZ-$CVN=xD^DBEJ9$Ue0V{kf(j3-l)#*3Sv zx0Er9lC#Jo`5W>0BYMRhs7bL$b^d2J#1_|e%-#y<&Yk$4@_Rp+DCuIGrKF`rAVURa z69?W9j#uNrrUquLj7E?+Q|dmmwYBxhKUB+pr^xaGRC9TGc`Qt*g7?5@nr8-v!nEaO zNF}MjroPcQztYmu!w$1bqaw(}piP&jS#bxD2-t?a8^4tqk<9RS<(ZUP<-mRR;X5-` zYLDW%Ngknh63dv(w0(X2_Vy&_K0)W2**i~esyn6H?DJ51@@32bSlI6}X*M&a!39@y zfFk$8em}o~DKw54lU;ZCi6cgW2ZXy4zzKsv41)F36(>%9P31w~fB-S`3K9db_m2YO ze6z{~6XOdAQ*AxG^X&DnEe(3^!ls>4OM#a#e@>9=XZlv@ctg-QM*mw1F7_YONRkvC zMEp|duMbySo(!7I9DfZn&QG#)ap8{dZt73%4xu@5rsjiNIj;Or^D?S-3*VH*v54* z;egq#7Ytho2^}F@86o!nvLS1BaWKTjfd{Xn_?xmvW8`E2{G%i~KW<^hv`2;V#n zErDQSog&^34B*~W0vrK1b_YU0;1Y6i&mfrYg|iqcE=EXV-Q+^J1w>^lc)Ueq%w_+9 zBbVfg%vfLFDpZMOb<1yG??}KxT4Z<CP4yIlkNB0!rF164wI>J; zzPvr2wGR{VV$p&$`_=siu_?ML!|EiV*i0~BV_{|q&55M>xp5E~2FmB`N0pmNxgw;v6bwxEaN?&Hk;i4=N5<`qeux7A<)e-&gXq33v?9ZG)}xz*Zp zV|Co82S_(;69Q~zxGDX|KbyJ&(aRS@COrFqUnxT`-vf2J`D#Y1nwu)E^Yd%2L70$~ zb%7o&4|*};f^m_tH~vM2idKrkFk~s37rH*$w@y#Oe-by^Kz?v|xGIqLww^ZI%+`M) zgMQ^%)qG&OByYQ_X1?{zl_z%KX?DRZ*}Q#x*AYgRE^$qXc>|n+d%Rc= z^hn$X)r33EcAZLyuw+&Ug3f%8#e+;mQCa(&>CzpkKosj>NlG@uH-*wd>^^2GsipXfTapAP_eAIH_@;d*pt_v)Pn@bMAc&|G;!F z7x@PDawBb2I6qxh#5SDVamn$DEK&_R^QeXsR2$UTgF3()cK})nbL6=0o)7FgngzD6 zf0S-eQ6xT8f9j5to2Jm4mQln?{?xzd>g08hB9o{-Dv&GGv42kZ1(zid#mKCCTJfCT zQlwRB{^8^Jms~mSU}lE4+Q%fR8T)eiN`H;8I~niT{tA--G}=3XKI&{8`gZ;Fl{$ne6z0utA0TP!Jiab8Mc|M5Z6sF= ztXdjRr0;)(m^6U42cQGM9YRU7jsq9ak7<3q0$~Q1P-1+*`(T0!=-6vLw}D7KjE>@h zy#+0=UuU~WQR%z{k{R+m|Bkk}RD#L89rnUSw2U)Aop7LD=>rC^H!|<0p0kJ3@d2ry zwlBOWCi3wxvD{{KH9BJh=SJKN?$&|Xe5)fScI3e8Offy>{@i5Cabq@ zPU>p!(CWtF?;+vmq>2G`N~aqy@q9JEY zfFGGf*I|1>BMF#Q*+~flWriaYBt4z&1Xy(mVnyO)S^s2aiM7ViiCQ*)i52;%&lM0^-;kF7DUvcK_Q| z5dO7?!DLb5@EpN8h{J~Dsm;Rca$8c zjTHcC-CjJEG<>>fJ{SK zP-R~8H64fa4uTOIp9G8^G?c85$LAQM(EJ92q4g;Homs8tE=M=(@;&@$bOr{0f{9s zqdr?TFUxcOJSLt_FM!`rYpI>H3BhH?be^Gu<&wL?Delq0C80TGEijj-(jY5EYkuwP zu+R;b^EpE zw-0~fIX39KC^cXKdwMoNZ@+xMxlRh$fzE$`7>D~_hKFOEg@Vz!DJ+Pcex{?py+)8Y_i!3o9XNHiL{`89Y4UJ4!*{nlmS7=GMifDe(2-?z` z(CBc@HwQms*HPTjpX38jSV@@KZ8RrtDk^A%4r|4lGeN@X0@3g@QR{Lq`&xh8!P1f) zC~wRvj?7YYtaScHmoMF`|E^IE&O;)8N8k_r$+T1U;Vng@I=0qjq5|c|;*{I*VBLw3 z<4T&1b6cnOFZLWlT3FUGhNl z@@jVvv+WX;w~xh2SETPiEY`{S`-lsCr$k45v3*>qU))On_;*_EmX?-)U)lojx^jz- zAXS4dHf00JlPbtHd>z)PKzMX=%Jnk}#3cAHeP<@A+Y_(v-gGPM6@a8S{Pc!?QAZiztK27`Uf%moPtDR5ERAY`*T>}r za_|+a{=q+ri!-@!CEsQuPIMiKghoN%rV}f+&giTQ`#v#mLAfvr3Bf97k!=VAJu3n; z0%gN`SZIBS8G~DPeuUe6&Hc4y`B_e1g|SYcEGs^*x+tS=onS>Wf-JStvXcPsiBzC) z5(y!!Gi;1yFs#E#!QXcp)HUW#ki*Bt1!k~!ZjKRKWSq7#<|Q{{Ov58g<--eOziGT) z-qJXj2GFxlpr+`+Iahw@_8}#qn{ zEZ=B%G0_M{Heg&mRL7cKfV+2!Ad~NH9w8uMk|N;5#3dLlaYer`C=X$A)cjGoKdk?1 znkFzy5yjj7y7ETOh|buqs-qZpcW?~AX&G2ITZ3v3s;2_@B;aaCNCQs3BJ1s-sfp96 zzR)fWjGHQ`@`PD<@%x49anT!zq?Q-3kpf)I&wLpcpe6wGV`^V8KG|o+J`1BMP*qU+jytqM zvD()Kc`z!Qe>q&~o$Ae)y5WhL`WZB!IXut+$cST3*VM{C*42RHgKALF6e~u*(F z>B?1Qb_7M(R^YcW?RdlZ??fK-dV5+>F*wBiDBx`+aS^mmBtd`X92~a7ufSd?VeC{n zf=D0s4IodwB_-w?CV^FMBnij*hRa(bHIkH^97DoRUWdbK^mrm$BnPA`SQyG5;Upe> zIEx)bnM@g+c2jL8(XhXvWSjb%rt8tn@nmmZHivHeXzN(-W0YN}& z(Oa$P*FtS1<0iwq2ouF+R>CnQ`haWaY{V=Ow5a13`wk}E)bDiMSa%tuNL~<(3Y7F? zFf|Yg{e@bu%7Jo`C%`xdGHYg3#93V65Ld4-03-zrGQ0?hj+h}Vi4vvoPeViaec?H( zLaUAv1bCk*JtHx0^Yv&;GLU)`376a;!RqkF&uRrs4I!teqQ6jw*CXj6HrXR4(cmpe zingy>A+}pqU~7&9ctjot>S{&8CO~M%w@v4eL=j`_uPLzg340iw`$U)xL3mUZjkO*u zteBE<(`GOB36Ex%dm4RAdy;8-4T4OrQvx}2m!OThe|UOLVM~^{AgfNptZ5&%&Am4Y zCZWkB5Ewa(O(5-F8QN_0&C@$oW_A(yDwQoRhGB-TA49wf3JUgr(oIbjxwqv?IGaqw zp8w+R(Zkwv$ZWxRgfDXt4Fg4yJK>AvpFc;5oNd*AdX9&S#3pTX4|?w#{8*AX{TGLW zuYg)`o^N@RO_Wa~6RO@<IqmqWV7v|@iF!G$diLOMx<-vSsV`uIt+QaTx(y7x>4dZ*P@QivCtcFIX zkyUXBO8h%wZgXqVwqR+Z7Y{+XeN*yfl;*>II5@!0p)+GJ99Q8AVkvA&2l(teP@Cx7 z?LdBBu^>g^^tudHfNf}PcB5H6=W3ngqd%T{g9mGV)hU4|RQD-7`>Lp9*o)vDMN-(h z?_KH8?@D`-ELM-!zvf@h4N)aXLpn_Yg_NDPf1`1l!3rc3R)YgM48-zKLtx_o<6~4z ztN86Cs{X#^o+8aYt)pu_^lB>CaYQAtmgzg4POPt*TU8h^%4f3_K(`3zns{zUm-(Io zKn0P^b8r5_1I%U&-d%}o$ehC3vkZpbT?0%EO@)rK)HLQi9b&6OgZpqTNK+M2$YpH# z_6CT)G5k}rDOkzomK=z5VOhmlXz|eC7!zi}dB+%{3om{n6Qk(dTDuv3g?AD{x6lM? z z_vB8~%g0wnKLMJgZXL}evB+n68=<0K;~3%;G(3S$5G9k=DUt4lVsNG|FiuO!il(HI zh1Cx4HAJuN3*8?^92yY4wXjUXQ&nt1FC{?t5;Y8=4j}=`13b@29k;Q(h=bf)@RYsS zQw-mZ-l}kzh9&^gvv5)*do0Lo5@aWe1W}?4cxk5P^mE;=AJ1U?c?g@4U?W9Uyd5_m zU-L1VKoe+%q4p@U8CZ)MGDWp(hfZe5ZAm|5W|2O&jH$xiB#Z!$0&cv5_QdH@dKgxv zlWH0*pLz3n6XKPExL_hn>TD>{5owr&7|l*E(b={zwRnO&n(%z-{}=R;Vn2vnVL*s@cagL%$P zu0V5UIg6S8e(d^TGIJ7wgbry?OZ(&;saq-Q!6@ywt1gE3q*;?GOotEUqRJRsq}8OB ztxwti5OM?CFCz*kphe zsDC=fQX@}>m1CRfIx_R42pH3a=+ZzI;>{3uy4ugBy$;xYm;rLDL5&HD48Ty#IGU^W z=qkLOb)sI7#k*cNwMRD>RP&nnyqxAe$)w;}#DQ)3F;|7E<8&qGqM+TxhYzIRNBScv z!`+ZItNkFa#SL>M!<&^dV}7$!-De-`AMJk(F?0?N63!I+Mb=n?=*XV;Kj8&X)w(m6 zez-~Mbh5FMQVu7`o$S8Wqn(A^WaZX$b$P!{gkv8LQ+O|ngo_R+ed2n;2)$U_{bN}p z-^m%cPuLWTxa04Mi)e%_lB5nT#@G!kfK9;U@=mj1XaV~Ut%x;x-LbHPllK&W7hXnw zv@ZwkQd8yN>OzFH=_=oLuBLW#p6d+ywfIG3w-acEzQi7i_dNVjw;QUf1zwMqtHHe$ zx=}L&yKEbWNu-_i_t-IHY7xC4>H}9ZD#9884gFKKIesuU3&AwKNq9;cNpX}4fjN5@ zwtdypbYv6}3)RQi4j{%ff7E^o)p0+WNp)3ihaBq|(;DFw^fD!!CY8=44i@mMaxO*8 z4cVJK1j5CVe9_f*QoSM@qe0yR6k(S+Z{o;^N6{Xd!U);dkVrqQr4D=sD*>AEq9dvz zdDLh#+F|=_QgPi4rk*CpDl1lajvbp&>&?ng^|6&DN&|!6*noQ;#K*MQ?dzHnT2Y7; z!Z*)9gmd9$zygudEUqJq|7`$ycqE12#kw`GX#rK~0!}5xKZ-kQT27^FJE#%#JCZ7| z3Df*ZAHwd(k7)=+8idSu9f%uuY} z>#D2t)8QT!j=l+orBZ_ti1UFbjW1{mUL7d|$3;y=5#`)7x!M}UO=trSGP+*W!OWUh z3BafL-bX8Yu-?MBSTW(ZLrY_KJ6#ZEUzC>JX&S*@Ej?Im(&~uF59AW&{m4~;t)W?# zot@q3H>_L7$$*8|mpcnSD-c|P02;XPP0Tsk{c>d}R!kdbFqJLrVD;Mlbc~w*yJ$x= zY=wf64pXB2ZUYtGN-3-+`VFSE3=;d4*|IU{^apfK!Hd6hq@+lk2~HdDX6r|>o2Fs0 zzbKlrx+4d&W?L0*#ua57_lF(prPN_){}(8v7|b*}rv{A)34~ES+!;x8@WxB*0dEHy zGHl1Ggg6qQ#=-AFZYd!4F^@PHM!-izY_L@b8V&4<>G@`5r^=MbM|s?Pg1FD^_F2`~ zTIg9}6W%(H1x&IX*D8C|Y{c3&3HnFpr|Dl%@3;_cO232;QTUlwqbAfzwJ~v5uP0SU zZ#mVGQX=+l_0vIf$}Z<4-nv=-*LZw_GUHUkCkd3nrCpOdpyq#=yM-j)DM8NA^I zT}*@QX-yb9j??-hus`$l8KeRbEe^er9@CXD0Y=0ne<+7{DIggW2g&dn%^C~f^_Gft z%P?p)Hm~IO%9^FSxR5n4JCRfWvY-d)qav|0|SDzr5WNFDP1q`W6n_o6W~zw#iN3t+nO1}k zJDy~`aZID71DtoB;?fd>*hqw1+Po{0VmMsT+hj4w-}GH)9G8I|#>|9(R;nNaTZdFU z2Pb_CQ9F>FQ}ELDCEesBnt&7rM_$Ui22qs$1*Nd2Ixj>=TMq=3&L|8~TnU@&hFpv| zJ~&8cxh?t)3N5S=S>CA!6$S!@bP^|^2hPFTN=LWk0j3^%j2M{QDqe$X6DvXKh(W)u zPLkz#XJ3G%ej-~<7(s`DG4y^S3GL!YqRP9AW$?^#syasb32u*Wv-NG(VqzodaQ4x> znuIb{ED{1@yTNBN3bL{k_crM|FI}u8`4%WdwP04|w&TbrE372w^CX#w-5{$*`0#!*WNtf{Yq! zV4x}xW^eze=#bxy9(%~i_3i-IlMj73x35YJ^p9ogMtuK$*-*sbIta_$^W4J&S*>}K z0)Gq$H>s@Uubh6z?62FuuJg%&+*uvtieWN3x5ip*z{=W0ol5D5>B#gxrL81HxBe){ zDNwwgsDLO5k)kM@gea!v0!xcw&vGLyUdP1W-vFA(f!LE}!UQOD(Z)jSCtrmev!JNt z=jX53H{`TO!T!%*`*#Gglm$Rz#geG9`yUSiFsZZkw$8?|4s8a?3kx_j#xYQ()H2Ky zZH2H*9?PX66ISwNchcaN^1{oqUo-(QSS?~(FG-A>3X9Lxz1O-`xcZXjUP5*KO z^*juqZ|QM&IgFBt{c-hn9qKRmjPhV-moY=%$OuthLt~>HEGEXIq*R4Wl&2Nyh66vx z6#~2vId~5Q?6l5v)rl<;(p!Gjarz2U$l#dmJhEZ+TS@5@{5QQV|Fa#+Yb&&9~7VM6$gYs@AiW;+_z1vLYm=kH)3X`=II zf8U#^@&Md5JmKFfv`)5O-?KnF%4x4xQ(nA}IUm|}Tt)bu{yUF`)qsk90BgkOQN|(` zTh!oY;5{v~LEqj;L)ivE>j%PW959r@Za7QWRtI2v1rNRa6BYlxmz`=fK*pm0VtWqw z+^|uafiJTj7r?~O;v)0^L)CYOW8J@hXJizzXW4s?lD!ET5s|%DL`Gx_*&zy<*wJxW852;h*Bdv0VKl_>$lLhZ zWp48p7FI^g<^(!6tfmQW?C+IS&bc z!n-QfW*T)-7Zq}E12E2SCnX_qgO$v!(dALZ=evek3N>1uNEIkp@PQZOjl}lpWtlZ!&<$Hb(LW;FSgnX!A{4?0G3*4S%|Us(K^B z+%w?GlhD_)Jl}4J zaW$}G=#$uujg3L9kQgRxvMP1o=h@6uE{Jfb%EC@{%toLAy}G;{K13MA*3`U_kwJxq z7e2DR?~dK^|0TN96BqnYf)?IHo`hC?c&#YHM8rD@mg$J$YsSWEtVAaEHQ3}upKp4O* zWT^^`rq)IE7${(m_zYEYlQRaSbBH%+zAzkSAZu>5Xp4c|xoK)w!SYfNl{JJy`T3gMjN1B@EjEZlU4{#>oPt z4sANf7xVXTK`*jqHn8=lrr6Ts5p;$txDq9zSbq6y{vnc#t(Ibv@;zS%`?eC=YC<1s zCPU`{N{c$zQ$os3pk_cK z=YZ;iMZ>W{tp_q0Ab@Di*J|z8NAr^8hb{TACbHLUqUOjLE7t0Ui`9g+j;fcQ5Lk*P zBG}n$h=7U|qe=^cHSk}0jyCCrhiu@Xc?OD_22?hvXaqnos=568t(5q7b4yDAXSFF8 zJLb?0ocORXB`9e~O#^TU!Qzy16+KzPx343?bCGzXQ%~$jBKbD)ot@t0~%1A*R zYO#r3^&h6QAcfOz^nMdgkMf|E!uhs_BYZy)OV!x_;pbZKh=6r3oKGkcpR;)YLj`l` z*+ZoOb3n%t%8X`pp`sbP@c+SWsLZS*92ix;%Nz8$AH{ja%|c-f*=56P2DO(+CNl+? zMp`f_!81B+fFlkj)B||I{zEWpubM!mT~h;ZV~TKSPn489Kc(@{gGtDTSz0~$MIglh zmUKqfko9aLzQCX?Y|Ib(!~$?kOXM{zyf$7>{V*32FAV&EV}v-o+%~ zk4260tj;Zd8~EHnL7)WVWC!RceGykDAdnTp+5Q%X&Z!VZ>9+in(!y_8 zL;DRQ6=;c1%sjk-Gk_8S_`s_K4LyiQmot0$^7^Nr$U~N5gPIS=_0H801%f9K1wMHl z9l@B^z}h)XcoSdeY6`Exx1F3$s7F9EngQPiba3LeAf29`&NdE0k!DrCF6N?~2HG)f zTzvSN!n#~w%6AR8?+SUdZNylcwmN{%3l- znT-E}EGz5cYNwB;s?S}6J6Io>>V$WT#tOAgq02WXdPx|~?#07w$?N?#7~Jdk$e-ckl5+( zzsvEoNd4jiT#{^ayRocaZ&D&Xh7Bm&ZSGKukv9*Q7}uLg>COt zgICpSef4G}KwQbwbopUu5LWB|yMhDivM=&k#(|@tY*Y*3<1VKK{v_JI_bvBiu;p6C z`ywWUK*t1yKhU6$LGJAa6GM%nEZt(*t0bT;Ob25-9RLkhPBS7K=hm%O3A6i5{A_I4 zjdY@1U&NcEN)}UY3bxSi_d0ZDHpBP_opgDW5j^A&`=ukn)pw;g`Dsb2zrd*$_dM*r z*3JVtE!<#eUBJDC?wZUwGdNNk&d+j3G}dB}Euh+YhSo$gA(YPpP?c7p4>BRj>e?Ni zgMIWMbxm-7CSY$jh)mDSjV4EcsRcp_!nQ0vuo?mlL-$S|?SvT+y65~54fQDep~7Z; zAU^4O0+>v)6`Ilhce?H(ux$q;UD(%gSSTs?ytUz~fGXJ*+3e7V$B)inh27x=O-VfRxxx@HpFmfqYx3|}akoWi;l z_J6(s$U`Au75OEwGF%$DT{YCLdtD5%GZE0Ql^cPD5(zo-QaaBMdiYj=+)3dAI`*;- zxH|UUqAxvq=;XyH1T^zK=oUeER&56!#CIi)@EIcfECu)W7|SXu+VmfHLT~wrc-+eX z5$%mMr=Vv;NzAxEJc4lxLJ?^t$heFf>)~gD9VF@u+?hW!2`}Ew&gz#PA5i25BDdIEykq!t&AYJ0^U+OlcC__lh0=wHmOx# z0#_?gb-%0T@G~lWY#i|8G$Do5w`T4(dmc^uzq+x}C;A4f6Z-c<=6=vl-S_ zE}X2$^$kIrCd~xMf+h&WYM}Fi%QB{}J@B5GS?Q%sv{4|Z>s?PEWDJ44G|_k~EjBc0 zh1?Dwt`HH>ykN>wytXoUytjDsYj6t~Prinq70IuQgjrpl4hAJl9PAM_5iIsswsv;P zWaPWRw2{hzk%_uKBR7vqcFH6)yui4N6T2pnHb&m4$K*n>jaDGf z1Z5DdeI7OJekb!;S>MzY)lw^m`ETHnhOvCu1^JFGcHA0yKGJ=G#&VW@UjGE=pv`?Y>qI&vc_^B|a_r zeVdpJ5)(`cB%-)YUpBDoy!yR00p7bD@Pw=OHoZ-o1#>4d9SA+NV-7a`cEDB%90A4w z+zh=;SI9oP8;fKp0ish-P0ND!$aGx7MMktcl})CCQoN8MDv&lC;Q8nCyE#D507 zV++FjR$F~reB^<#@f zvD3o|UoK3T1OBP(%WUOM4^YuVh>;Y0M+=&a+BdA?$I6ABa(V!zXz2h!#eAs?kA z?D*l;uH3Mn2ujR?*%EYl*?@h(jWq$8Ily5A$R=~mR5`YqXsF4c58q24g&lsPE zl_>X83$db^dC#W67bzBP0lCT$(#2WEG(tvP*`I-tU*njhmjFoka@Tx`NnBlIU>?pc zZQf?O75@(+7ByhMvi?On(d)^pgAZ_Z@P_3Ze}mH@DElr69#%EbM(onR$c5$pt>k?j z7|6<=oxN3!t!g0KIw%xoDH(bz8bwwpdyi(`h8JNp^X8;q$heW{USZi9LoA;l%0ndd zCARpgjTSH2t2I%;n|IK}(UIrb$29>Hq91qcS~P3w>MqXDWvGZ1ZGkH%*vZ@v4Z4ub zbYWH1L$(4DT3Y|shWh$>#=X@HlBWngdsGRC9ZH>P2izI`oi02Fe8_i7g9wO6BO>w zuOe`WpRCR`HN7rId?UW%znDiu{SZk)&inF%+1^#W0%Hyex>i8b=mT!+1s*^SZ#vqJCyDr7dxMw;Ai77r zH5SKo7 zut^j|?Hqu~tA08uRV^9#erl+096nd_d z*t@3tL3qd{5%m}qGr34)$+zWt8P*H0>Ch&8w%Ezs!0P5tV)mJwYv)8$z@dH0!^er1 z0cj6lzvMyegdU46@Cw$BnRc}A9{)xPMqyOoL13Y4H>YxPwT3!Ft&%?nYk@EVK3b3r zqO4WEV4x^d0%G@K2b6^zCLDrjfeMAT(W%@^ZBQD)ab3PGID>maUEcrqjyV1GsOaJV z^M5{%>j}|CNiX>n2`^za(~(CESo1(&HY;3;6Ou;noCDuZ7BaxvE@1&vmIpcrAsNE# z+}yX1=CQVuY@ubGCq!)%)zj0ft*)MbiiU~`sd%B5jJQmpF2T(vsJG7K5v4Y9!NWIr z=nMLP{fepw%*=OdDi>Tp!5ALDh))4ujt3MB&~XTuH2Z@(6ZgGSAI0jJ67kgr`frDNcZEDN{3Mv4#d{YT0+|IY5NGUt!zaWFen^NJR=W7% zRa@l(8y%x}F^DRwRfeVH-zraterq$zi2nMOgLi3V1rys8eR-!a5w%*`<86Bo9XVk{ z7~_ZgQY1E(FJ9bEXf_&E^yWrt4yT=!Oxb`&4X7KHq`HQ@F%Pll@g@GVg4UtU&JK=`Ge4RV6$!MA-;R+W`pH}#Tuw0 z_r9_Pl9L+HQYa}H`-|@SNBKwPR`Ukw29t*goF75x z3+gImp=j=yjhO4?zshGhsBcxz4(e2e&EsDG5xtBS4@6`=8uUBF^3Ln>JFdUVn>9sM z@BH=Tk*N^aJCKlD0ul3PdzP$P^)0S-TqYjdeQqh<-iXZ0F)DF>#?G5|WPccGOAhxS zkt^0HP;~*Zx})Q~`q3_n`x%W->_MFnYt8xU?d1^TYiIuxzoZ~Gd-k9ZaQJ##2uM?6 zVxo|Uh?SpDPWE8|*ighecjQVQ)f-yIPnE<4#JUshuw>6f`LT3~EBhvT{!_NNsM$u8 zhD4VbWm%Eq8P*Twc?cU)N^JHzEAqF+GD-AWa>uTFkp0is@9yq~F61xEH$R*F|9<%v z=D2Rj!`&Am3-&U@ab!GcVgnv)F5BMP=MmtDNx7{xiv zRX^F6c=imN!Ci8x#AyQF7oG=nRNtnE@I&l|NOp7mwOCp# z2_i5xV??GE?UoG&VZO@J5k-_wag<>%p1ty}49we(_+-i4x$3vZ;ypr<`q%Zg%7xz* zefS~PSMe3K(Ln1e`t(mp#4Z;l{R9#!YE49lO%3JFt4C`;#-CF5HQm1R>hjURZd0vZ(0;66<4p831S=|XJpMWw8{LK3 z!klJw^y5Fj-uL~Zqu`Xvh^i-Fnsd*yHf35fHRIx%bAcoz2rZ`{;u`4wDaVCi{Kk-usb&%>E2o)^z%8dZ~J-SCpfhC?9;OX2Ab$QZ&l+Vv8KPRz>ouE z>1++kCQsE6nhR6~ye1>Xo(x-WWwSItP~U+D5CF#ceo$^NwS5PYO^as69f(hb6uu0Y zHdByxOyF7v|$6WLxTXd8V^ zZHcAdye`MD34VQ=K8pI?z^Hh2^yaF@y*U^6INE$MJ&Moov`RX5T-MKRUx|Z{S?}a3 zk9t8eGWvC6PGENbiyg$A1cAIrFzyTiS$h0}_kmL90U5^@A;OgMrm&k{@x@qD@p}UW z(lyH8_Ctm{yT%O+zE^$s37_=x3$1t0{RQ{w=xsoM2q9`Wu1FsF`?EC^L3(Hz+x`1m zb-uSDEscHn;MoiT%S+5hj4Toufe^phRs(kk3~x96o3j8{0;@DP;2y!e1Oe&rY8>zF zfnVJqAXd_>AHKsr0B#ddcOpk2WabzEG{{^^=rINf|17W!$Di+Y4aUr$R(mmg61}oM z(J>*yJUqCnUY)N~zt@oFEzaq=nHJ)!p}ys(banK+GhTKNVLTT)lBSMo=3D%b=eXBY z!(>D_orS4WA@26#*@l1j8fooA?FufU>z9<+K}mJY9n9HP2F?Qy*T=uM*gmkDWg8YQ zS{x;BTFq;5PbZ-wG0Zk(eg0vXUocfE`}Gm_Or3-TmLMb{&DFmV5EC=F@`yy{6sxuF znz5UknN@E5=a7iBIXKSYJ@&k`8Eg)K?e;ccL4FOibpEz50uK^)3_f(wIz-@;{M}ex zoq%BvxR5uL;9h>^=4NRPi9J=Y6bA(AK6GN2{E+HXQm9o-NlJLRJ3F(`+kb6+l8!iJ zw}0z9|HY77>4YZl;d5{I2=m3G7-LL(pLx>6*Xs%KpC0dchDeIPVpv8TMV-EMJ;W_r z`xm!!1n<|=F>w_{?s|t{UROG9SdqXAUib3SLAK&W3G191k8qWBnDf za?idsTtbBTQg`f$zv}mpDRhirCJAK_23=iW?7*-4r_@-|ADiMj?API;t4PluT6zej z0nJW1X>BfdCWIM#qrr0f$K~SV_K475PHfa%X#%;>YNoWL;eYVe)l_ z&Z#k`0^THPS9@`pk88_L*w*)WFufj6_4Q_<^GVvuim6lAN%hvsemZgT*QhmD^7s~_ zRDz)4;acN#!|?VHVw}h9v>!95=ljIJSpAIcwz^-|gpyQub1qC??#+zm4LlTL{GtD9 zKwxv6qiWgzw`Tl z!beVaXL3Kw7GI&sQd^rng+YQ+&|Vid6p&zDXhr;=Y#PNI%p@mh!W74Qa`XW#knRa+ z>_ks*IWGT=#71A#YOZ8nZ6{d>pT@R zJ^i-rYD1oscC6YL$;ffjxU7@7%&e>+RCADSA9n21iI#1DG zEc@emYXg4RSKr}dmKO5~b@S{R$4TZYXt zRt7E7M@xoNjDH2PAkLUildlgXYF5!8LzRdH*d^yPK&^Uul01e#$2{&jn5h2&ufoXyRY!ZC`*SZE#&at4 zrK7~oMTJpUoh$@qAF?!A#ec>>7zy`kaZfX9O8xzEx#0)L_ILd^i207CQDXtC=gcuD zJXZ{PG~w!szZ=5Eb}q8F_Pw;el&y*1r6Emz;_dCNs2JMRB&pBwpI^NMaDnoW_MzU0 z=*waFumMr1t`^!_cjs`oUw>Wkc}=5i?bT)5%b7Ydpn8HEDExU#l~)4bvpKA^#_mF;)@%1C*^d&p?{xn%jBBK(*3R~tI5E$1loyXuSDy1c z-jmsQ)K!u_?U!=RdUl2p@@U%7A>nlKEaGO@Vub6+$733ChR@u!7pzQe*9oHo?^dt< zOC}>Hs^#v5B&9ySv{xjy{dQmW-p=Cb{C~{PvJXp+0?Gk`SxYs4I_*K>F$!4Bvy{~}S)_B{n)x9e`+;2y{T^Sw_KCRO&tD^HkV{6F#_vlTFH)6|kl-;) z#+c53*eQH&)%x&cTlcvG&`p$8ROI}tUxKFM3trzE$c3=6u|dXYgU=tLv;6NLDKW8$ zP6ChdYgbpfG-y3?Jj0*HJ8Gzzm<&P<0bnROCEit3z$Y>%S$-~q%!VlQ;DT?BM!l}M z@kes}T%@9(wLxc|z)OU0(Wm`%hT+-tl;8~bM7`V%#qcgs` zY6DSX09tx_d5zo@B4yb>fR#W*Wc|w*UJ#`ztP~cOv{nFZUDYblshGoJ4(E!FY=qyp zE3NQPE90^w;Z3*(CuV_$%d(Snuid83`Q3JY7l=uw^_TplE!Ej2bRa~R=JhhF5Ij3O zYjAZ~ch5Rz4e4H;sQXh@^|B-R$Le=BNV&(Y48xs-Oj4!0AiROvhD z&^G|dfX7~0RW$(P*ucP}WW}X+IOVBAzTWTEz;Rwvp-9Mj=t6#yk;la+Oc47mZK8PT z^JEAKuBrcV5^)xmr^@&JQCc;%+kx6^(*8=z-hW_hn4;vffkFjBUb$>YV%}IZ zyKQc64(h!oAPK<&WoM$iZG2pZg76ET!y?O7urS-6vZ|{1oBizJ+{((*N1T%8Lys%h z9K8SUH#IsQH(XB>>=?c4D|YGGms&K{Fp-d~Si3sGU5+&Ot#!Ly2X?$w6%~+&O@GI*vj(}xTAZKf1rBO^P*COQlIdgh2*HL_ zo*`yweDsQy2QNl?uUFVb9Kx^7PRqX%42eLFE5On~4j8nO(Ruca)L|abPh&|iIQiGE z02pGwg}M3PotCq6zdrp8Up{~th;98U{+MIit0Oj z6Fdu#kGlYVN{Wez`Rx2+*Ni2C`g#CN#r22(M4n5zQ~b)6!=8N9n_eGYg*fOE!?5nz zVEW&mhuUR4H@0I^%dLB%?CW^NOKbb-Qzm|JgE^|KtQ=(li%94+N5;n7K+pkxZg5^s zW575Msa*zNFfyP8u(JcTz>$KVt#&p zbJN~V-lQ$WsR$$~`+&P6*=?|eOzAEWNr>w1R@B#@f#FqR3G#jiE5T4A$1v0AbPwbhR*=M7@8X z8w_yi@zK%I;o&rF!a#)NzBv)#9Gf&U76t_w(rDn#NfR zdhJy)b@J%)Ku2WdrMsX1pU7D+W9;ysS@Fv{vLl=rWKC&eO6;E)eKOC7nSHODuqoo~ zo9@}W(D;2@O%In*mAo|U!gc3*mwh$fUD+bqxMtyY68%@;a1Np6eU861^`(;kDC8Y6 zS-z;&rGxsrq-E2w0nh*E)Snv z+uLF5Dtof9Eexpl4D2D`BW=9g?*+gP+#pOqM+`*`7Yj=&vAakuI|!00{r#Ka6hWZ% zEr;{-XWr?5j!6wKeFZWr1vU8Uvpe5%UNpa*P2Rcc3awl}sCa*KY3Jbjx=Df5?|aqH zce$4*`G=oxJG%d<4Y{G6S57U3uid*gYgv?*!t~5H9uj7puerMgNNUHJ^pfA3R>|^HGzOSq2?RmRblt!&* ziG5w>D8a(Lym89&Xy*KJ1>5lzTZggSb^mFkLhrWg)xJ^PcX!F8v;f>t;j5Gcn>bpm zw|~s9)sub4Sk5aNF|P>;KYeubf)oM3Z>aPj{1>?k1+szJ5`C;9{TXajKWc!r9k5?r;7@%^qw`j?_>S1h2H-;!|oWwFR>W&Ok z=sty*nuUS{)=&ehhp>{R!JDE{Rx*ffea{0KW*PvSNgo^!zuHVnUhct zp%q=Vz??rEDb9D!m%mrmA9U?eBu`Us9`x_jEx$~_bwBa+*`a(kXnU3FEWn?7{n^ot zyXsH4=v9@k>;k-i4BnZll4t+hZuB8kYt0+U0+{cSO}1T{sasu=#)m|WIcr)+)&?{EIAGxQSL=&nMPTnG_RoSuceN-{s0z4QKRD)-=y z!gj5(Wxqp2O9zdf2xW{PzmVVL!cON-li&H*MNAE2&hGP(_P((^mz6&&-amTDs*u}}F^WeOK4!Q3-jThpevA6rX|=@B zSCac)7v+zGWEUOk*ShIf{XsbTb7FYKu0Pl8e0Jj2k`NL_r%#{!KaXe@)nT3J$acUm zpv4$&eH1;>?Z=E0;Ka!NVdyo!J{?F<=Q?@+NuKI)$K?Hm=Blp1Th~GoXlO5f zuzN*J1%45ni%(B_vv%Hgt-o{i+M-r|F8+F|QJCzwEaE8D_|9W5cQXtl%Qx#Se2B}a zk~{0%{hDJOWAtx6{{u=9(Q@w-h$?V79=J=>m>-*l=zTm0>P*Wx=s;Z`|@kJTu z)cJH^o9`LdvzdZMS}(Z3SvC>JZ3R_x=_%z4(`X#ym?T!SKj2C;`Qza$xuc7hQ}A$& zlzQMy>!cFf;d~@0(ioTPckV9{`0sWV{kcnr?K>hxb>k+_Nj+T!H%-TRc6|A-j{O}@ z^hz7`-Hd*xWC^Fm1{-WQJtC2GV*mdhPJrN1_<8jOcawk9^sjzO3Hu48MKai5fN$># z(tsZ<=&uj+BpVRd7un4rG``*2Ea~2@8Y+s?)E+wxC*2T*TcZwSi>zpgb3eomqFhyQ zUhe1RVg%1iNc`lG$UPv|k2s!H_d`J;X$!aGV!wV|i`MvtBgLhtU%c6#RCK9cpz(A| z_~Qc9A%@p8EIza4JERjUDLC9xuVyI{X5D)q_WN;3z5FD!w0+!7)kO2L=d`W*5F4{e z-0x`NyrPCirN4-mVPs#cWNIvg2+#Xs!_=1L?Y@rCN~Y?_RwKheT^v7Wxa2c8>x8Zo zqMqjCTG3!*L0mCcO&4G`74x(7nknuzsTc4+e6bgn zf@|&ab)Yvh{9J5ZRe=HBIMr+Rs{mpJMd zH_BQ<*U{ROOMU*j`@Q4uR9`1C)}}Vk;gRIx+KOp5%mkU%$>N5KbcS$APwiUs<)hJ! zBRirK4Kp({6&3Inch%C0Kexh_#t*8(KVp*Rd)DQnYtqIJ*<{ap*C74?`o$y57lgssXHs@az*iV#KY0Y zSKsf2DMm_YoG2rrS$-awYt)v0<9s9hBi)|ZkwMolEisIjOCHZvf}${_Br98Qw2E_`o&M#MD_b|o~cCRsq8Wc+poE&?w3 zkYr$&?D|^ra<|QW&L_da`NP)L9SNz#iBs@4hcINKLq!Nzv574 ztAvg}eUoP4K`+8yE@YUHKkOE!&i_LA@zy8L97L|1FhZQYVQgLWIN;`NZ1Ai`Fw5Ip z3Ofyse5~53`Uc(6B)s`)^=T)bhLdu_KsSORaJonAxDJ*?_ z{r5z-^2j4iaLt%pr66ACjQ!IW0^6p0ACFs>A}McwYt)T78XE1Ji(>OV*JjVF_r2cu zZu1mI2N*rf%;?>7KQUsxr6qq`I$i&UXm0ShxB12IT%BDwBEK)r)Afp{zRz8E9t|Fr z5)D5k6wr+G_0Cx}Qg{4n_+4W?W|F%+*{D7_hL~z?eO<4rbgXpJ@Lb8kbBpIlaSZ?w zUvZTaO1(>u0xjw{SC31_GgXP5q5p?qQ%T=T-Nyij;NvVjRH=j{1MMjuw0|Y44E)y) zPQ!kc-@i`2_RI?ysl!bjdDFd_u(vMasy0qnvF`r)w5ho2Qh&~=UyQ>SMG zsl(zdHZHEu;cDy;9{7F4ZXeB^d{5;!Ii8HaP9~s0%t}sYu9-$mCUe<2e9LcG&Z)O^ z;O1^xDDm5%-c2UhpZMqCjr=Ox%g>g6j2_>FGi4nhI8*=T=@c8nX{&tm{QHBjlO&Fq)7P5qoX_76+;fhKZj~(xxRC(+i*x4Y&70?xjmr5dQd0g+O^A`B%bSBimzUl?b*oG1F0vY! zt-NC%MQu}4qP)CiWo1u94Xnb$!*!K_s(Sih^JsP+nM{C-Yk6*a;mEnqoQh&YB>VNd z621{prmEGQ4ca}GsW-OxfgpHENJ=Vrjok^l0vHw_{LDm{L3-C948?%tIT&N2&`L=7 z!ZZym75x%(;6_0T(IZNsY)j8uBJ40Tv(Cjo4NpnAYxfOw*r2iED!>_Ra6N?ukj*#< z{n*~XUz~o%bA9XiD8#N=fuKQ7&Z-08b6BrE78=1zzg#X@6Y^@$7F4aaVSXz;Um zt)#j`Dg__>1GC^AaLQS14+A$iofxAi50y3l4_- z*J}&##AO(!INzigtt<8Qng9?6s0etxm|j5J6toK*v5h$<>9x>5oYPw0mg;1R{ucGG z<2FM7@Ns{2h`~PknUivXBRD$?vxUfdsxlsD*#LU=wC>h3KapL~Yd%(1)~vhLZ`M!r zp#X#G?jj3O^7bPB4ATF^Omck8_;a`hMMm1WMh0_=d;oC=9lL?EzmPJn(hAEPt<3Fn zKOM50;W-br^bf1hg7Xbaa@73(rMAiw(7HZ};?!;cdsr~-?~J6#I!|%dq8T=HEvRLs zf{MO1S`fEx$6nybuzIjD)hd?#?)=shtfQ4-CjDFS6)?8*G@hdBZ>&(J*~pW zHCeV;9gF9BAJmq~xD7(p3XVZ30O41AZtJ59gdo(?_|Zj<^m!;@peiiPjq{saLpV#i-_>>MdI+A;g;L6SedFh_)xjC=q4@RmOTN8aBXfr zqf3_~G{Rm$1(MsaP||`Dc)fALtEx@_K?cJU)d|{|c@-#%78!R(8R_ZYW+=KYji10n zHfZ!t((SO}FCtdN#^LUC0)by=FpiwikrYbpQ&Ll31%s{y{_~xynWSkWG~ah+d|(-!k6j1oWyXC?tT?$>>#|ns zJujh-0Ia6~2>-puDbEO&-%LXO)Y*WL!BiP2_t173qh0ZJ&mA!;C5WkdhHBpw&N*fnt@z^j#HyLBm|Q( z;5_KvyG8m_q7E~5&;+PHew?-PC&Ts-Z86w4HogCgZlQAO8tL5)5IYK?Fg;DuyyLMd z(ti&WFTNjm#aGjTIq~;?C6Yss68c5+0KE4`STPdpm6JzLGt=@hNOI-1zQKl3mw0S` z8s-eXIvX{(r9ij*Wp>H(dT?BqTJiJsQHVlpUoa zh7;|u92?I(sYR%OyrLt~s^V*s%etaYb5b16mBqQ)Sy`nb#l*$W!o=W`W=p1< z0=-@6FAJ+|@+ZXMCT)UyB!2YozhODwk|yAzHzUx9w~l%LdtM>?D^WQ&hMxE`ee8Vu zp!tm)dUv)#EHjq9YdEuzn^Emag~cl<^I*;H$a*17z*-GH#xcQKS*w3&8{dB-wU)4U zr}x{`bU|GK<$&(bw$@hQRY!j=Q&qKTB{TN^LcLVRELp7DZn%zs2AlyG-L~W{1ue%< zf!%lTs>U@!4VB?(Nu~;L)r+Etd9KrWCzR{~3;WjyO&V@WLc&(MR!MF7dK)(7`>^kU zYN3gV(F;L-XXc6Bo%Sq}8Z;!jl{N$pEZ!z1F!VtXF5lW{T)>NwTwIJc!M8}!)OzlE z55Bp;VR54*$!MI>)_5rmT33dE3haZ5w7-&CDQNROzQo2fb6T?~R83;!r+~~CUh*7O zD08{8tbe+?9yNSX@Xt7X7E#yCz^hS@_YX1WiFuTCG~ zcoVQ4$$Uyn1BWqr$Z>Wn2DX408VRihwXkzGu+X4XGpuG}#UHm|(l~LI$hdm{8)2s0 zU&~8}6eQH0h1wMPn16(YPV7kYD*nE7Nn=T>SgLqSIBWJ#QSDmg!=_WzHoLqeVA#xj za5j_+C1ZWAM8x+}$htr%3gc*X2<;@(Guvq=rki{S|0v;wE~R06*}59nJ6E+Y4a7)h zi>G={UUs$$AOw&>u>L%Yx)x}GZh#mpv){ePXC?<{)do-FQ`Y99$T_CQAXvk~twHF& zhTb5EOTi!X!$m_2&0XV2iml1`@hR5~L{kn?>^&Y!yqX>-mrgv$6+cbcLfOhN4$2?MYwnTH1Y?WDmyG zQ)S_Ga?LnDZ4x>BXU05f(Y^zi2%(Yav|6TWE_N>|3dR;Bw<3)`Oe0O{Gx2kD#Y6AI z3jWdp{WvLA(Nx5tsXp-@@)1cYy!=|9;J@`s1-EjJ$*7Yqe z+Ap3%DEBRy-S14x{uSa3pfS-mI&-yB5qt%G0K1Kb>|2U`=|o2K{W#txhbh6gB5q$H z5&?vXhm-N2KD`rMlU$XRGlm28O(u!_PB8vUKAhHFNIe1w_@|u;&yeK6h5b|DQz}nN zDXr4j?Zff@OQW3a|Bfi~Q50o|ps6o(2Dp^>Gp?aK{+9{qJfMal5mZ>Htb$TGO}Q>N z8b>rX!jmya%55+KzW8_L3$U-$Wvl6rzHkwLjn`?R`~2=!mMS?;R>3gEz4kp@2eSk_ z_!vKDVWoIJQs4OnfCiFP@9g|-G8iMGu+$r%%?om&!e&fAjc<-sDMs`zXT{V&vd0i}t~cLmYs`9yMZawZ-)98+>H zFfy|R7YZu%ww$@%Lv{P~IG?yOEFM8FnHp$xJ;74#nvDp9#z%GNE8NiPR1uu z5;n-54w*^B{a2w6A^fFfYD)h>lmhrFzq0)vVQZ=buLGP=^z#yT192@34!hq)NuDmM zE%mJr2;{67w3qW|qu_1>Yv^+CGv^;41qpD+=rB+ho=wU<7|a04N51SRg@a~#I9hJp zIadAkmwP(al)&A4>i{{xZ{kWAah5kmncu{z@v>B>LQTa@!BC|O%DC-62dPfwn`P@a zF)%RD(eY;}coe|v-nVlZ8b0#q@ZUj7YL5y-e+KE}b#!$Rxpg<|R`7pd;phM0tc(Br z?hxuvcvSJBy6Zipt#VfUyt2H6!(s2)-%G^7Yz9rA5)GmoA_3aqLVuD3#)(jDePNu` zCEzmw=seKXZ$aIq5xh<4zZMe4ER3j2io0*8)Z&kIl4EUEMhG5*A=^#5S^=uC&>$lc zO3D z_l4I~kO?)DBhe8p1yyXSv-6!Z)~$T%wL)Etn`_yaX}_5-{XcKa&9Y->4ajR~TR}i8 zR;TRQXq1tB8Z-dvOg%6k`W?kOl?=lm0p6mZ4h`6Y>-iOs?0mev~!6o*(Jnsml!zD!;8a@ZfQR~R4Od6zf-jDPUV zgEzq{ETaz8cEI{oQ+KviK&my^Sx(Q+G&ob609Z}$8k@6_~i1-*9t}Kt{~s&EBKQC2^JzgB$?B3LK9NK^1rzaO5$Y7TVw zQI_04%bbznmz+n$G9iax&F;b{&~65NmY*hopGWwyI%M{Ma+%hbW2R-87i}^^Xi?$t z29vq(Di&%`cx(uY=3KW_I_+IJu93uRqNLJXO2WZcVV`S_*Z71dmtN;uf+_0DW+pH?mmN9%!Oo;LQd^;pf!qj|ta zE?pVP!N2IrtdotoN_6y($K^wRyO1sCpyU0RTTY*V-87<5s)|GZ2NI^o&YM+CiprUa z;<5jLNa(|45XDo@UkjQ3^BB8p3f&lzXH+0YJZ9qWlKMLbl^@ryXUivu(6a(O%$}fuW&~kI(ZHE!$CC z!>l9~nHh?XV&>pJ_F%gaZ{;VyETmTqP{o$!{z3!1+-9J3c*4M54*o^Y1oLd|93FfzgN6$vt zxw-Lro<`pY6JgBcHy{{|qn?zhddkEZr98Z}sHuGDKPm4z`usfLS=r;8)n+|-JlG8c z_wK2F=hJdca#qa7E1dl4D|9d9>D2w8T@@?F4>&oTzlMhilWRPW3VpNF-hBq6TUwF) zNQih9m+G?Xay>GQeB$ymk7|sL``46N`Xxf<_=tpU64B zvYO=fO})IG&WB`rbUiL9}+R=RgJ@ZVDGvB4p3R`@@xy>~p;eftMoR!H{V zJ0!D&vQK+&O2f*CY)K)qN3yc_9tk1QGzzKAhNe=Xl!}I{@w~rXS6A2lJg?`!-~G>h z-<8vOe$UT1j`uqJ!?l80AM^WjxO@UPYW#zya7l{ES3#5b=lI8glYZawST0XgnzpvK z-i9~pf-fUUZO0A})feCo=X~@zb^RI6F>!KiU2FW1g`Dt*lZFz8mX=K15xDcL1PnO# za1o2)1TQY-5vpHGFz|Wp^GM2%Wd!WDgJ__& zx7rdL+?ah2jfpN&E!v$&WToL;PoE6h=>wtu0~MTGOjr@dt8+N^(a64Ob+D&U?My3rH*<|~n zex*)U0RgB0`T@s% z+e3Zq>`tAU-y6;L4YR|2rW$fO{d^F{bYx{=YuM7$uC6ZlIoREb(pME#I(ToFW7{I6 zV>L>Pg^4LTFfJjX@e%$gVAIetdumL+XVy`_tbJy9*m}7bN~WN zW)*pF{rvvDj^Tk^&4?I$3-_tt{WdWX5fMd2me&RFu5bFJ zc+nRjHh`91)^`5vW55>$q&Y1$)uzWO7>my-g)E0n{-@+wkZBmP=hU(B0AolbahCANZ z*3n6kZCZZ{>jK|kC7F}97_FZW7Wl)*SiJYKcsb*MjY2ATZnBb_S6EPR&1pjegD+r; z%}Uizk7L#**!bj)Gv*@{sov0lD^DPn2^ny~a5h7C1%$YAtMV{1y)a(Hp`WP?1?Qpp zad$AMi8nyGI_OG58sAiV0^uH&vPD}lauoxpLSd&(K2jcRZoa#!7T*?(uMG6``@E|jlA@)3e_W2mGlxu ztqQK#);R=xk3C1HI97v?3-Q_hxg1*ReI2UGcz+N14QEW>0Ir@9)Mc-=h%sD z>+4N+E8}iDzcW+F(;CZ^iL9frq(uG5r#FZssWgRlFp=^l9KQ*BTKpS#@a{xH;?BxY zXf~2LbB>y)orTYi5mu8*{}sH&hR^HJd_Fr1 z8vsVv6HwV0hC|edLhSOl55~0m={WTeLlmu2e-^^4n0!gCs&9x9YfmaP;L|OXpyhBw zZMh#~2p!5)W0x$OklD9wvMb1CmUx(3>VjCJ5*M~W z9$AH{_I*hysRAWm?&!TguL@G`EaT6T@Ws%xA|v~EI>hi-$LnwL{vk)-1?ZxQEGa25 zQLwe8#UEBM>J1M@#!;SuwEKw@W8l?mWS3cAj{F{T{CGe%)(6(2v1Bfs(Qy)vLU9}3 zEO_}!sgT!i9LKYlJsQ^-q<{3=`|CD@X&IgFbC2Ux8(Oxk7&gI@SZPXH+bJ14^lgXl zG`J*Un3*FVq|zAfH4O`TVqAON>gx`ga?*`#Rx6K<8;Pix9NE1k#yFg#=c?Oi{CNIz z*{~)eB+*`WW!*PeoseL7rCN?kniRD~QnDVj5Ns{OH*dP<8YYUi@;|eMSEd*v7YcM$ zLo3>8l+S_cN1tcWQ>1|Lm;li9bak2RQN|kT3MthHL z`u0{#j%7}h%&JYX6Biioqh~WVyHy=TAVKXPaK~(M3SkvuF-G)v?1f#QLxuko6nfE= zcl-K?$QwZBoVdJj?h?MUz}Z3M)CXkG=rNs?65WR*8Q-YyqwW>FT1E-5NhF)K``l-~ z+M7QqkS*!;^dY>AL9`3j4h~_+?OGXohi+@jfje|@E^J~vMqB)!Y9hg}+7u~hMRLwD z;ek4|)gg=1Y=zF}L@}%F?L!>5BDM}3V*cg0zWmE8Dufa5>5XxM+r1yae<1IAZSILc zmFCfuO4JYT98VT-Z(*s!E?tn7)fe~UbJS1!^Uv|tIas@!j$E)66xO>?5ab{Q_Mm~x;p1B z#4jx1tr5vGj}u%9+}+#+w}6ilK92ZKg|!P&wYbN8z?gu3Lw|BTZQ0x|F9fhU(qoij zdSkD)VobCmTt8TnShNZ$4ljmIAppw}TgZExf&wZZt%&U^WF$U0w(ROIl1|Pvp`lz65fpH^L82ffp4puH@ULfmbBPt?6%EG#rwjdF8$AYoFQT)iCyiSUMb z6lyglEAf2(0;l(0-V;H|%7tTukB?6>dHZ_j-mO!+PC6wXbOO8&1np~5!qCkRcmBH= z5_0SxgzJP6;)NBXvMB5-5O0PKE*yNMUYuu5KbN`$CH_1pt+16ZtE<>$omi|G5W|aU z05JIxp>nQ}mHa7{8TY6WXL?#%h`+xB9$&dm0)}AkdCwv{lXe9ngMk5E6yZFmcV|K@ z9UKO4R;xc1qc(RHpPrqWx!QeZF$bkFL0bQ+o<~Ukm`LoY{wc-bx7i}k;u{zmdTQG| z#aXRi8iFku>9IWjoY2sB)g*cTPtpD7_>S4<)K%NQSxe%-rya>5)N$?+RL+kc!ITLe ztew1O7-DERQE&;F`=(WFM{&9fP=b|J=KQ(cauI)?%T)(A4-dG)FQMl~c>=$RD?UCR zi@_xQ&y<#<3GwlWMm_MCY&2Fj&RoJ6jJ5piRSe~NgRv88u!Y@(9t19lP1dx? z$@B7CEDa0dInUzwTDNZ9f+N8W!s={z<2^5K+ZOj5?B6NGTc+Uu5Es{5+`oT6wgPhn zzeZ$}6~zpP$bXKG87v}bOG;Ejydxto898_GZS}T!_xK`mhOYVJGqwdb=rj!m1O!MQ zlb(13s}@OL|H!-`05C%a8XDkHbk7F*MLbZn&70T=2$W(4QLJ0XLS^Fx?jJoEyn;@c zRCfHnE+3@lb7(J`+E=A=D9#tUI;bJzwI9 zBT+gFQ)&tdx>1-Tfb-tHdlu`sV?-(}`uRTuWoy?dx?8m(Xgb2wlRk!xlM{2@2k>wazVoMd2`hVY$r2wbNi&;U5S4d4`&<-BHU+-xND{_(YLRW)jF29Pnov6a{T>q zlX zXLfcN$tLzbi2w6=viXYk!!&_Y+{DmuER!xNJsmN_RGHH~{RO2>xWrl-%}rp1`?ig0C!Z1lZgMv~xoQHo4@ zL_*`#jr#Un0KMG{xTacH-rNrY&228*>6ELQExVWBbvt4}d-`d<3(2HK!s7(rs&j01 z=!aQDddndgtM~cgQl3m!j+L})u$hOarJqLuP^>NHf`4>9f^|&D6Z3I?)(@d_!jQj! z#p$i|LVBeT(&C<}Tf!*@`6uR^^I;wreYstGH~?-q*W8Yvk_6M{6J+qe)o@mEaoT5u zy?!~|m#l>1bp2_|p85HC>~@m=(&nmKxPu{i*q8RwV$UA_l=rOKxGgVd+=Iw7)B&q}J5N3u`7UQ#HG& z$f?8Iwn5(yUEt{Ou+h)f_W;W$*jJ+$M@B}V`bFbKv`$?GrKP3AA{XNRbAMQBZYL0Q z96-=|Rrq6U3A-v9#`u(!6eE};IkAIKHRgv%i9z7vWg$RLgsz2#Ds55@jWMpLTNpAO zdMDxlj;n!*n;VJpDN2ivFYYpJz`=DBvnO}C6tXH2oe(2q+4gyTc-oDrs&LZd-JC|% z-?T(rGsyX`PlX;8)k0^j`snF)x|H5~dDncbBmMpTfuUl@S8TebS%?$@g~K1*icEer z0w`nAS-5OLxrfN>x?oLqCVezl9VsIL?01mQ+K(!ZS1sJ;CsoCg9fTjhaVWjD7d@e> zK|4R$V}GR}#W*8oN9%rUD%K5FrDIn&qeDICIVK!Bgj2tN+(cE;w?B~y-Mu}79|R8e z*fL_9qNAfhYvyk~z#iErqsU%a0AmNx7#kbb=~(;LXF=4y&nk=xsmZUW3+NXr7eC6x zdAqLmy#EZ@xno9J*2s&96%`W|ZO2#K*qH8@6>VJRD8(~XxcyM`D*3jBcvrMCk0&Oq z`BpxC0s-s-v*!bxZUaY9*4(RMTu4=7(z;i@X-?*?e@nG{s=}Y#J@fEQk(3ec!6$J8P+w620Yg{^KL`}3F3b=c8Vo%M1vHJ%H zi}Fl(L0`4{&I*-{cNcMz@F*q@W=?UDG@?CnvE(GG(SnLM_bl{t4POG%G~@m?&12|mKlLSC1}T@ zKGlhu%tOtw&2w~(3d)};?75Zn><=G4oWh}irh1mHytSia>ar<2KfgMXc5&EDION1w z&Nu+_F*i2uBSS_jTU)pfgpiehB8#-X>o53lxDb=Y3^*E>Jye(4em2Zuze z_gVATh1%ph3_RTJ#jBorYH6*VUnSjg`SDahY`v_MlyG7ANBX>-Z>+L1d&CY@BuH6e z0Vs9$f4h5EU(0uD&lbo zJK5orA1VxvQF*`6LDQwe!pz)7i9Ob3++jl)9{3|$N1#1UNpX#HbG&191Er84XBuSK zSH>C9Iq>ln!=zkXd{b@UrX#(nru_93{_cwWe!T|q2ZDLq z{?Y9a;R=NaSNL$zG)6_}7uWFkzdwQxhWi`ZZ341{6X5X2f{uBV&i|mhpe7#UF{*|y z*MVzL`scNw!DdV)J|zCV2wqc9=U2CN;U66WL1_H?slZv(%>VurjQ`M>(g@+D5C6@2 z5dSFiauv%6%`evD%K15oig+yo}8PBZ(s}m6x z9%S%oxlwHX104n$3oJRaNw#m~HMZdKcphh0D0j3@cA=}(TgDC4u#-O z33)DVj%5hnZ;PB%wuHQV2J@iLfdfPpx14g;Q(Dr20Os-ho; zepYhc6S(uq+FB26zfcoA@C~zD53szhC)Nfck<}u<-=HxJIe1C`{>p$zry9xD(G@K{)~Q!=C7!rh=WI}fZB(9l3# zU{H{4q=AtU=7{V7*of~7>dy0qFTAj1{kHtt8YX)SCw+TwzFAm6s88tInX)oLVon{C zBw}nZ@G`_GGV%w=2zh>mv&Ivc0brW@oQ@@jlhqxMptkn)6BnIANJ%Sk0WKS$ z9W^^QD!`1*OEhi)ywvZn>Or|~-GS>^{f{+&ZS%Y?rPG+ug7<{% zDY&fbG7$sJW>@+Fy__>!7v>wGf%s}@Z(fKP?enh;uhyO9mrmaP6F1^q1{m)7hv7zr z4jiN6$uG=oZf=b8ou%`r&_s+q21EFdJ)^}Tav}fMNr6TBj7l#RzJ*SNZ-4@8+I#u& zz<}7cZ5+iIfF#6Z(B9dp7cnVm!yup?j^zYKGFFOUER>W^>9n8No;&V9?fEWuZzLBh z>+;f!&TtVD&men42LTN&KO39vFIqysbyf>m2`YWxn}>1Chq3%RPMq7ONdsU~K%!0B z%cFs_+>jHA&J#Hy%wWg9=ASxMV>VM#D}*k}$JGqfB{Xvj4@!=mmDpfg;jj{xv;!4Z zSdLWk1}L7=+zSt$Km1Yr{^UI2_mlX0DcBJiG!&J@q4fWAl>KuN{mtioye3+rl`JtI%IcTR&IY=$E*vBe(pG7oKnPkPy?SP0 z^Y&jKWlydWB5~s5m=?Q+{C<5 zQ9qlSq+K`TpHjc1NSQ_I0e)5c_cr3X(0h){6PF_X1jX~`+FuT>>|;6kd!eQ=e|&iQq!CKV#}dRKX9krZ3^@Sdzx= zit7>9s9#SWzi9%c;(507n>!-#^D~ZRrdTMGp~M6I`#xnI@U34Y9@K3zkM4ly@txKL z{CCxJaH8hb)emdMf1Hb?dxA=ii$kfs%AVeM5qee|efcJvc*@UP@4OPzBF|^oV)uX} zHaGoWv|`x=yBHil_PC=$yJ%Ky01?**9_DOY8(zd1S2S{Ova+&Pjprd-A1T=S8eK?m z*|0^ZMDl*__l-XzxnfVE6p{q^Nin=(^MNlP7zP$C=pJh^$&7IuOG=!BV2=^n1{`2=NY%vJPJJ_t-WX8keDp z1N`i1cwA?%t z22N0)M6xh!t`N&vyO6XzIuz!Nh;J;QyQt*DcWwVB&6x=G(WQ^Kwqxvz8^>0XEQnU% zv^Md3>6#6RP^e3Iq+Rs|H0#-=aUF~YetRuf2}_b3+FDq5HqUzybA_%&fE|q$*bG;f z!tV+eMa078Ztg;(F;5k}{Xx zsDryJ@ z+yLBcj?0a(rSqyVqtOoxREa%)ib#@JFZ2xQ#JoXPYYR&WvVsGKs~b0Nh-6USxO+GE z8xg$z33uOl5}=vp3(sT^J`HqwhAA>gpj3I;>LWNg++%d=1& zFRL9}EBDO2@FsxOG4ZCD#tB#OYy=-(V^%yo7u4R;a&p0P?b7GZ_MbGjikswJaTIM! zIp}gOnDVu34_y)T1seiFLu*{p1vF|HS7S?r(z*4=Rg4}P-AVXybw>T$l1^;WiD!XC z?*R`A1X!SuZTZESFBz;OW3yv8`Ngo-(mdJS(?+1-@QpmQ=rIbdGg$xf@^f3_`ER?b z%Wb-6Q7OR2rYkT#Jw5KV>Ji)i8UjVY%&d29C1aM_eyev(919ayl?j5G<{|_PLQk1K zEx+TkT!bjx7Qhc$nYl?64=5$PPC$oyH3Z)|bbenRy^FlwtwWODduhkoFv!56&iD(v zsur~GPUF9@>k{7&i_5Q(Iz~B8 z-XBSiU-No?+lA4ZLyr%y6S3);Gk}c4%P%ZU`FRJbo6sjwKVdHZa%>YcYj+&0O{tSr z<64Qio_+nQ=MmtJ%XoY<(8x-cFuI^55^erAzmfv-$=QpaAG;n6xjT799Tlp<mSN>81Gw{)IRKvP-f5}V&7kIDlxC|P(n&^|O7cU1rVf~>EmZo&!_UuL1#@5S zG0V7MM5ywsod$Gi@Zg9%R6lLH%yt)_^$tiDl+vL~Pqo_h;%q70(F!`n(V7%&q4}#^ zQ`8HmG)l(nHhSs&i_e~EYq&-`W%tULgYUEma@oO`iJtpPjipmK;OG9pwg8y}T(uU4 zK3+J0!SsNv-;~@Z45fxnCD_+=r7gow+KXCOCZKY{>bhg(bM(x|GlJhf%>M)(NuG0c{(_pi+HCpJks&CYjmPVm4~RELSz3;P zOCQtE=6+ou?@AS6ki%)J%4 zOaLwYjd8qqn^bWxc%b1Bzi(XLp4Gpl|6?fU}{0{PqjV|R{tLsG3n-Jm0 zqNSLe4TotNrXfs0ECgnoX_h(!n)xc-g@{sMVuDr@x&SwNNZ&s{K9cSe>#M!}pw?3c z28LIsY|P_fqt(ps-yOEI5X!PDe#aS#qQ4NPTIs&viH2lKkSZvktOMXAneg=2!^NrFYO_<)jt=Huid_~O~r#6(R#iR4?DF7OF-OK*tW8d}SD8J4~a zee-azaZ>$&$YYnSM`%4=O`L#*PVx)wWttnpCGQh7zGO~kmi zO9}AtrHO>TzLWOybwgSCurp)nSGFO85zumVQXLf&7Gj}X^mI8~y`EOKMd?M$Lf_+e z*E5_NGajLc*Sks4PBTEd$;HI2OS@+mj88!HmgJ|svThb0+}sVq8#<;#NA;nmU4%ZB=#QK z8fY#Ep##ziNW(ZNEa@M7>!%r&)&2|N3uWl@cEcoa?ARLg4OkKLKbvG_WuaShk9C%* zeM}-3UQT2ZSrSF|QK;7>wr>3zj;X1OQl|m560@ruYXJc258B7*nyoA+#*tZ;H4INt z&sJeJ(WxB^hiM{p`fOA0UapVb?7SO?_*GGd4o1NSEmZ=*d?QsZNt5$x;R~((OgFeK z$y&K>o@CehrpByS@}+`V4iMDR^TgPkNpY%}k>ID0^4yd8YLYT^&HU6m$l}MA06D&W ze6etY>V?U@Dz`@C{(}; zk&Et)IrbXf9y);y@1`0#tP6H4oK16F(8$2NNA>Am8_OP?ZSM4PXO;{^9oh}U27WUI z;?1TK)H5f)g)s-PG6?Pq8ieoyQjpj!p(?bfvO#W9glQ`Xm4=NlmkkS@YBaB|OL5uZ zx%R#TD zbUaF_Qj$awJ|NXKhw~?C6(vFTVX#B| zKU>7zSDPcT9@pQEkr6jY?5p13paA4C!`mmw%dhOe##WfOLJRk}*iJC|C4>6yGS#LO zJ3_{=Kg#%s+zfFT++%-Y)-o8hI2Rx(D#NPP?emmTh6&sDN#&i)&E*KcE<}rTSAYB( zxUvX|PqyyGyLu~-A%BKh4a$)5+x^dx_ldBlo-S_r65V}}A7#VqX7;6a3DTY`;x<9- z8$@qIDdn(jRAiDu(fYt3SbmyCI^n4+rFCoeB#KEpwoz>Bt>D}a5TmvuiGSZYQO^m1 zpI`Lpk{s9WY`pMx}d=2{g zV`*K3zyWRd);C!BUdyfUEPku1VP#=)%&9^dMOM(ELmqF(^69pn?rW{%$??eM>H>EU zb*-EOoqQ!12gh~W(E}^(Nsei30c>J=sS10bAJUP|-#x+{*W1|A{;cuG68XWZYbR;~ zXkAHs=vTBf6i4YcL`eMiN;$YOYfAji`fu_624SuoDIjNfdbQT*DNxVGZqt?w$mLAk z&E)9Fo%sFo&+qT#$=^oV-U4fw^qMot=<3GA;@Hs6db)CsYR^aATg^1RzKPaVT69_B z-5Xyrq~O%VHBVFB{|-d1)mm+ZyA>XTN%Cc6lk7(X`(el1wKMtc$*fL)%WwsC^-F-l zND-_pXsQ5s^D6mp9$<-U_kD1xp=A4^69=H5w%oKMewFdo&^IJ3WwHExKHmQUz#uXo zrA!{=utOh|w0bgaSVS*4C7kB~xS_CJV0`ZHcPErM?;<~MUoD^9=5`Bp+_}r&7g3+I ze`kK05zOj(wR%cm4V=#fmSrJ{Odj=@zv!$TlcaBb8K004q+8&KHmW~W(Sw&1NBoR8C2MSH(wG^=B%ooJakSC=fuxNZIR!@tEq9qP3EUq$unD0Felwd zS^Z49q5q(_w^U@G?PQ-4f-THum>r(u#iweYBf_TPnHFAyTjfK zCxM6b;b3FKoXo)8tI>}#pB5L@@xSskG}mmY6XjFTT&JcNVc@}g&i6q)WrN1yzH!v2 zJ+P@y_sS&UU|W20S%dGOt83pe_T1_teU@r!tAxz>o*GMYVqXBBv09fzOk9BX^~f(* z(Zk61!Riz%%ydD82)bVZ+Jm7CkMJ@>G2 zADP)#x*%WFdyl+Zy9-*>?D|03-W%8c$f?j3MT$RsHEqXLrf%NTd*daC6KllRA?v|? z{ckr@isgputz-#$i@i>@l+TsRgc-gGmtuHsIDekNrXL^m98a%IpRkl%kqiOr^ZWaL zXy(_gMB~Sfh83u7vqiZ!Ay3%YL8%ocP9&rNh$37K7hE#4vYp$8w;A#KzM*wXAWGnvVJMTc~!0fNm+Y zB;x*~{QvK-{l$5B!7xi;cu@Xsz=sutt_+4Q^xwMw!hBnPx21rmw60!UGkwBKGlCFM zE#}GDd`PQ%#gp*A9xy{WVeAmZ>iRwW!o2eLVpmkqsSOp zqx~1^VaIook(1IA62Fvwt~>IC070W^Lv;~xmS2OFjSYRBH_)GIag`qIp=r!eB}@kp zEwYH4+ymTxWA2JoSpY6(gu~wX6ypDmxcjCddW|}H0+}2*vVh`$r98)Gd2-i1fE9Dk zW7LT>RY=t83Qvi0g7f*uMl&yVwIVAc10Wb17uV2jAiLaVK6mJO*mx6V($do0hbA&h zVpbU++fahYg_VOSON2yv3+|wTL&NKV`K{F@8F}i1*HK~`tLX^egKWwjNS8PCYc)U< zfRw#oUbc~xWdp;B{triIE~|?km(J?b;|%cpcKsdezsu3_{=Iwt374)E=C8rLQbekZ ze@a{TS>XUspBBqI>&ivpeE8SeQj&hp^$S8yce4KxV3#m>3KiHTqds zxlChm5fqg7Ksf?|ri`&Lq%)fy4I))z+l_5WI6Aa-Bx7knQx85ftMD$4v>IaoZoHbX z1<zB;v|*dOCjeiA^65#I=$FZpryg5~NsLcS3=N42@ocb90t7`kJgC{l zYB${65wRK!V8_adWG}a03ncL|-tqzGM~>Zluh8R~T;3 z`G<0~wY12cQ1C}9yudh0(Vdb}F(u7iWkH``pV}?a+C#l($cy2+j-W1xSDO|cZ(#ke8nrO4GZ zgTc(Y9v;8!*GnaoOsYuyF=jJFV#_~vHZiDb4VQs^M!aph&bKQ6QI6i#l#5J*D*ZBF zr-W{ed&oGl&~7X)$Tf;uD?N-N50~K!DEJ}w3WN?j$4m$l=&+Ao&7s9MnA3@!FAVWnuUZJm<@cJZzM@S-I5TzlSEW6jnJ5*C;9y5{sd|l zpc2{P)BUsd=H+u~kn}4-`*3#b#Qfu4h~G#c6tUp+zQXQn?Pp_YfMa8$NuK7B!mS57 zL87@ZynwEmnH+|DGwgDtht}C|(M#Ar{t1;JWYg$~wQN5iDh0B1T+EgFJI7fVnN|-& zJ-WQ6r^w*0?~_Y>Nmr@mPh*C-rF`U9k7XtfDV=TOyjC=WpAdrdY1QJS ztG`ceatmiHG(|DSL8~{ySXaey4vYGY)4YuJoG^~jHB#F?_9^O%kc`Z&`}gyCN`0$h zpES@!eu;%zYjv^I;F>0+eE=kq6U}C=uV%&(y3!(1xDX_t{~8{HThf{9Lg;hKzT&AO9j4cE(IuK-R} zw|OE-op4!I-P80}G5Q>++VLX!i#3?IsW-x_6(Yoe#<9NkI#fbBJxgZZ24+%CHH?qG z05)0s%GFz5xGE@Hl5`|LKlM2TviaJ8gt=7$MJuoP^ykYN+a-Pmm}fet~Oysko3QSz@GmXz)1PVYRsR_7zCvy9RtksGH;~D~kaZmZML|Afl+J0T; ziId*dnd+-rPBa$QY+n#@W1#v{OZD}3$^QK@s#bBYgd`+ln710?%jcm@v}7tgPr+qS z+v6XH7O~BA11ti#-wm5@_>fHMuc219;61V6+|4|o@z)#0;Bq_}*6Px3r}euv4`o|f z+yb3txy2-#|KM1~08ntQtvOup`nxTJ<4bmjdjScb^(dsd;@Cx*Q^iO{Hl-Z4B$&Wi z+C(TS3kc0b-sC6ua%Ddxb~4L{obTulYLag0F(wEuk~A<8Sm>R zA@P&+$cCY%WO?xcF^9l}rbhTt;&v-T`k70?J@;jqG}bAOiGO`8ezk}Q7YpawaoUuE z(}ls;<9)^LBsJ1{ZP|m-Wuu$jo}T-PPE=4YSUDqpkIM_~h{-;F1;!)F#lg>5bn6+4 z_i4lJW>h%Z25slr@z$G`ozQaJtD%q~owiZwceQgHF3-fo%&L?8931)^lDwshSq-{Z z_tA=3p9nW!JZuqFbgawM%PT3@q)3^`d>S*c5+oJ@%hs()DH%4g#P=oQb2d7$Og8M8 zDh2Lc2=ju8=}4}?)nKE{)>I|acN<8sQQAkNdwEH!(^9zkgrq_i6CXt)shgfh^ECD2 zQE&_1y6rVHIF2YH7lph*%vb$5 z)>UR_K+dJSzSc6b=E_Wq%tEDT{O;}pK&sz7lVLTET+mUmd3T&aJr5CU1#(3zBekY^ zyl3NRYD$z^%YU*msmX!g2U$X#xU7O1>RQKaEKxuEjh3x#tB^4|6ZvH(L3Es^fQdx2bu}uiN}7aIF_0Pf6U}8UAya{av;33Q=H^ z?ASiI?cdM*1@m2%IsC3jQQIVDs|!mxOt;9Kvgt5>dNpuzV;NTs(8&6PO;?nJ2fPi6 z^m68oGE1IX{PHDCsg7nN^Em^LoY`*aiEQ)eNmE@}Z$dp7<1+MgH*LX0&mq5&xWGk(4%F3%TC`VDDWj#l>$*}SC1%XByYg(MK?dZAg4k5 z28nyaRFf@GNQ$uG^9O6SktAQ2CPIO;i z3@GP+kc=0{L*`P>o>io+P*)+5M6;O{=Zg3y?*}uczsoMb!!A7@>U+R za5?l&PKdAYmr6N#W&QAC+1PNhFD~)S0vCh*RnBGe^29w0>(@_~9;^R+Ym{t7Ufj%P zy2@qa6yYgL>F`2dOwxCelQCEx2t(3dnzKa2RVh${ABgxrhCUj9aaf8`3_X5SXDRY* zTaI&XU8?_VNmUBG5lyGY{9RF_a+aF|DUOd~f=XGl0Q| zYSr6!UOX^#9=Q2L)WPELJN4H3YTqm*Y2%MeH2=t?Z_(Ki?^C5%lfof;Eo}KSrL*1! z+CJ>c35e_^1t`OFSmyPn5XUf5%g!X>|U!<)&qS8dQf z=@ifNes|pw?}x7g3$r)yo_p1tM8wDFMv3E&2qBrSdY6DLS*8!Cof}WmT@6DQ6N109 zKWnNX;p?(z>df9J)6)gM<3l5wA`aB5B3AWQVlPiOtjS8gN*10zKb&o0KU=eJbe?f* z>65@&Q`J9xnlOwTujc3TGcux2Fmlt3EDKR-ma;4*9+gg%7LN^$+>YV#8$APPGm>PjSE$3$Hj{m!_U%X z?K=WXA0Y3iJKYE!1TGKDW*`%)Dk@CxUQadFmKe&JgE}Hnsp{Liz31Sy7(BL?9IhFd z=q}OositzuYyb2ie;|1B=e&88c9IS4%EqFg&8av0`gFdBzo85wPGb)hg_+A5e$6H2kOkJYH0#F_gtd2~IZi$t zyJxkObVvHsAkLIVb7dxbn?(2WuHgAh3^&tay)2aRSSNrwtGhQ@!%5pKY|R6w>BBw=ER8&rBWvcZ2BuQ)ycgFLU6yFTho=t=2fv$cj2kuKEs~y)AI9ZQO|3q3A^~E=D z7+H589=N8N`tIR*MP|MIWKm^rCzg|8H6>vN>D%C#Q&ra8aCnPs8?83xXl^VCTbo9p z&MRIBW6(ZEQASqXp7a-)S6TSqTQ-=@_aJ=A*L#y`1+XHjf8y@PO zF*P8k($TMH6%E6R?8;TpW{ozs(BYl}jSozszIN;2rs-(sf}8Zr(J?WD6gQgQ?4;!E34_$h9Gyc zvID7<%=M)Y{8WAecZ3vtSwT>>Z4HwpYm=6=;k5kjb3xgIu?9Ii`l<2_XKR0a=Svo5 zNV<1?cxYbiwpDe#3?}1T>7(Ay+WaBN=7kXXKwu)-*Lnf6TVk~hNwf=Y;>UkDDJfTV zmeL6Kek=FKx0gKxMhY7+rmak?N{|sE8`ioH`xtPYYQ-<*EH4M!*~^@!x71;l?3}Hh zXRl#oD%e_Fxw^;dq_*j@T4fnozfZIA?C5qD3w24S>?@iPHnzrFvv%_u#D%K0$AmXj z*a$t;a*CN);WH334yB%Vo7k4--FRzk?+NHjrDMo8E}U(>>R4SsUX_*Ry-7KvwBf_- z-Sy4g5)l>N1Lmp;x9qnm9KNTyiHUD~*wE0R%WAyKXywy`)O=5t&zA{ttN->SrF<5n!gjuiV=K5|E<)!N zv42fVdpj@U3Rm+w1*ydd&uVZm>)&B9ipK{su8xPAkY7`kmL9ot$1Z}shZW^2v{WCo z*tNpA|0iK$sm=KW8$0{U+1VC}1BPOVBC%*ZkI3;}mfw{8FIn^i>5s>qNS^t>_{;J) za`Jf^(p}R(Sb)hH*zdL6Ox=4q`QJWFG@D|;dEU*=^Dm8bj8{PL$jZ+{D^*oha1u>E zc<|TW&Cu8rAS*=ke@n#G7*3@_8aMy*COcpCDP}wN9G6qGFJD${Uyb7Zr08sd?1nK! z{t`jY^9cgD$1$f#2Qq3zoX18noeiI^`qv>GE*@-5B2lc2+`45a`NdjWyB9tkMFj<$ zWJhft_<0@nbbK#O%gwb%9}U%Ay`GYwU>Uv|+|71WdM*gz_*jc9@Yy4w%L_V>F3ZSB zNR0A8x=o7)1OkIQ5x!>#^8w;_CKSte5ir8><10V)()J-=JDnGdc_ZstQJ@f0Q(L!f zLmc&eK{a&akP+1rQ_Kj-+oPUsLGiveUML13gYdcA{3u(}8pvjd2dmCY1g1h7;0rC1 zQ|`gL^bpf4P4{2iZ2k*ep3fiM4A0^g$Df!Qg2{->pFY`{7tUb{8zTclIsz>&x)E6# zadGbp+3vS&GCK^M0aWI;BNi5n-B-w}0;QBQ8p~V&RRS@T%3x(52GBUZlHMb+5e{Ih zb@NUIT0&|>nkS5~R?4~is>vtyr=nkv-*ys{k}|r_Z(H$_Q%J`V+HxsAAM_Nq-tFk@7H|(stcT}9&o;*wo!vm6uxF$vn1h7TYG?zp=_FgX$fXZdEisi zgF@Z|&DGV_Sy>Yo4u3@7`T}V=y{9)pC;rtZOXzPhVcDdlo=6J8h)8K+7+92P1?4#z zlKXa&gZ?$3`fgZp=8PZa>D^#V4nkLK)%8NfGKXsU3Z$$OB(*!jm#tWuUO<@c#0@XE zyyA)(dtl!)ok#`9XG$u&SSgWA4W1`6G0wt}-O)%;acTP=WH}C3mb|xMJrO50Mk}3= zGCl(Jr-k4RZm!9~;5_zCO&^q|2X)7^Xl0u}uP^UKGc%BXQdBIaD8-<)G5iB0*@Q{4 zvvWVsE)<*0#eGUY^o{3f4>y`IF6T{o6oMJ}sM$_@pRxW6j#h=Rh>VKcmBMlWE$LGo ziX*d_FdO$G-hBqm`$7hD+p{-sQrTLmG8Tby^H!VKX2)3jvkv!LLi5PP5t(`7@Kg3w zYAyo;git$GT6(*Bs874*TPm%^wrWyQZ_MENL{_8O`S~F#Njff<{!izAzCc+pdvynh0NQPckl2 zI}(Z(9vg>G!HqhhZVy;ZRGdels&c(4qeWy_{S#?bb>jzEBn{}^Y8!#;gQ6DT zXW%h&R#w)N(dxne{ubux@Y`5O6diBwfzZg`e@U^Je7lwtg7^oIHMNMJOymJr+#1$; zGY-jTOx$;PWlkSrvfC0IYn)}~(eU}gnzh>L%de$vLjnSv-#EwvS4{P>6tHsGpfc}!*GqqWJ>W7>e0ZQo({W8c1i_o57Ot?qqblP^ofqtgkpqw43=9jl4D9SHg&ge^#k znQFX?>{UoPPM;Xx4Jzdze5F{-FEN$zc73oGqvpQ{YdF6F)%dZ3y4@Gn9eDroW96oM zx;X&M15V((Jel}JkXC|>HWLtDW@ZdS{R=AJ@cl>RQvnVf4h!?A3D#1h5a#2lY|KfX zvCTH8(z|~5F2~Tm3(ND;f+#oK>3ywMSH8S=Z3uu^wc)CxO{(#zgj-^7w72zITK#na zlI=-nk&pKYXtWn*1a7|NZn*i3PEo*SBW^Qhuhhu@& zn8)zyZG(RLdZ{Fz%bX3w$W#ab7cc+@k-1g)h8i*fRpVhlgnj-2=w`yVsqSN)1vx-E z@&Qh)z7J#;~AubwpPtZCdTm&ar^55ZXEDuclDj0`$2ye~C>|MddIc zB_bsm|Am71)y=|! zxW#s!(be9mh(0)>Vo;~mrbM+aShXlFWnumRbZhEVIxJmI2M@|*MU!q>RqAxq^K&V$ zDr!9FFEBp0FH-EI^}2^lQ`=$kIo)@vom}JFv4Dyyd~Z#SHhHw3>);>om5M`UfW*6e zZX(j=QFrF(M+l^mj8C`+{6I7R&cLgW=Bd_L(VdlcUJ%M6>YrVplmDTi-Mr<5%NDbr z9){l|Z___NLqJS~d5z`|xty;oRw~!JJJ6ny;^S}a+^-=90jO_iX=wp}nAFNsEZm^q z!`zeudBei?^UsX`@B9 zsxD)!{qKiLvtEA7?^Vzbhwk0MA#YFN8{7clA?4pEG?pTT{T zB)alZvW;97Paq ztn&<&>PL zPm(Q4;za%$3Iv63+_;hbDr$c;n07p;G-3_EKj*L_BO`;cNP-J|d@{BkY!6+<{?3nL} z=`qG>$Kx8kZ}C$ouhq5Q^5?9KxHy$>?})_O349NPOVq8nxL8q9Q8IxoYseotpWihR z814iXiPYR|g;nMLXI0hcK&&7h`x)4$*p3|!Z`@dKD10$n3ASPdVQJFp&yL=hx!KuR zzt-`9?t}z=cyt>22ZiLlTMIZOn%85)EE~%v5mekW#>P(bPV}qw6%g(cV1gLau zqV8?{(;F!8`GfAt#V~tzWuI#pkg|^WMXd)xr|dywF6q>HtTGWz@Rz!&gC-TnkCPwI zsp*@T_y|5>;kgCQ6rV~X)|`@(6P5u&nuU|sM-Z_kA#l@*{N}@bk4((W?nEi?#xnZv zSGi9SkDQL4{#xLq$2mA04fLy)_i8?U{+vZXz+8Aeb>wkT>?A=4I^oxR^SmAB&TWjd zO}Dm?ut{Z6>F*u*Fd&&X3Qo3*bnxI?+|QHtbVwrJeKC9rQ`zAqkv=oKZZi3*_T9;5 zLFzNiDBtf061GcX(_ljv<>bV17OO`flb**Gqn$VMl{>HW`^~93ZG>f;luf+?kVZOR zelvxEz21AC(BLzx(kf+6MVYy|*Oeklus>&dDcR*wcOz1gIe(3GN*;?I8$5iGFUjLx z-;z0{=v~n)ft{{b@^4OD4b=x58=L+v2?NQFwcV)$J>Jz5wGzRO?W{(d4rlvXDOXRH z4%Cw#9Ukzk?+%v87yi#dL7YcK`jOTjNRAjY{y$n1MiZ8Qm+b%TUlQy~xAE1YzrDu) zCtV~=UjOgr6v0lnx=UVtnBK#MU-X|i)S=LK^zZ}!S8;RUeZ*TgkBHB^Pn=pZhFQ=g z8V<9E7at}+Ec(Y_hF7~I%Nz0PEnlUlH7fdFL#E11O>|kJrk5QOI$b|l*xr%!z0NuN zTJB)}?O0>EEl^iT9p2n&9HM?>Q=_+~B{9RR*Z4}}bbs#+vL8Eq$*N7KPncD~{hbQs zZmwC^k?YFS{b#=HL~zv#vO884JL=2IG`H8%!D4PPdD(l7P5P0%o}CZ2!FBBHT;6HD zpOF=!X)N2Cni_9I*$vGDb6wrtZFb&<-9nqrub1A7>kb}9;v>jLJMc}L-G3^xf9)%K zzR~Z@t0GcyTe+5dq&pw3)Kr_I`vFx2UZ_Wk`b-XlAJ5*WbRZt)$liI0=czB2(XkM< zm2b|MAZi+#8LF2~6PMlVggSKfI=;7Qd7%&w8v(bAfSbLcALpGRjYHyEc;W7lkg2ay z$758U&&+5=w8M;-Y6>sO<-TKX3Q}tb9F%u`w6fa6`94fss<5;2__ro1_n!-EQa0a6{rLYBb?xy` zrfpbZbI9iOS!G*_oYGeMifogTMv}oqE1y%Tq)cfYnk6aG2{}|`2{Fv#E95Zc&|t}- zgHuwHNm$Jg)u1xWyVnd~pPzq*-@Nbpyzlee?{i=GbzOJKC67^msTwKzM}J+Cv6qK- zfG~fANcX?}>t4;Rith3~f4fNNORBxvLn-%OC|WPzbFDdUR9280(4`)Rpbo+o^y$tc zg{fe0i9da~>OA5~vK3RmpgYtndU5|yoBqco|rf(7ra~am53yTc{3<{qLPNp8p$gnB;FDL z;V#C;+EFM-m;c>t{wh>gt>XEgCfsI6GvSX2ImXfbtIH$IZL&amb!2^7X-9OnEgIM}dELa5l^W1{ zV2nFr%RIi*ufr}TTSa{PBTRlsH9*pCXehUDO28qm7?KwGO0kxWYui0suNPG{?A=?z z&nx9h6Q$~=OVEM9h?coi%&UV|{oJ}x%p%A@>n@yrN^B*D%!y>A8Pn!_l$Gxm7nf3- zqw60ikUMgq*>(vZuaxM#0Tjtc&@#UZ?`X!+R$VkwvtI#ZMvR4RrTf<;W0Rwpk>0;c z?jYrz<*8HC5S^BWH=nP6Fi{+xX&W{(>@m?D@h_4Bw`3ov8UWcnx7mcs-Q-QX`Eh0V*J=3tT>qHDrK# zwWjfbMwA!8eSpJ>mWGB#ZB>x-fBKW*?v~$R zsDv!`k#Nt=$oEMFjwz69u)x-VxYk?jC4s4E5xRXhRELzary~Lo)=-5$EGQq-fXGtO z;Kjv6hGY#jvZvyt-OBN#{rf6TB({}W3q0dTv$mVY{gl@WB_({7if*mo(xc_y6SOC$kP06Sl z`(aFtjg2r)I5H@t8huYo^|GX8PBu1k0t!ElTd`m`b{B>Pv?1Ad4o$^dhW9>Hn3FD!pmG{Ha> zT|k7S0j)g&bJNuj`_N^}w$3yp58dh&>J$h4F={zC163TluO%d8a$AZ44FL`8195vqWS zn##itc}K8u7~`=)63tMS>*z*EOS$lN$Jr9PuSE-4Y-a*T4tdc)!#`qqa8=(eR(#h4 z_>8EGjnS4kyah|(CHrH0?XlvurPftjCqL|sqjVxrqD6-5hLUGYdyMimoMf)FQo{_c zk*^PUd=&}lYc-m|wFGzt--0yZz@iK}KmqXaW0jTZG82z9qJGSt;;pQcuV|N>$*xqT z1^?t&1sns#0>%(b)vE55q+_Qnj`jC5^l__hbaZ&AeovqWF)}n16Az=8+%8&kQ&Y`6 z?C>AmG5fHyluHQ5h*nY_MZ1(SB=%Ur0p5awi6Fg5LE%YDOPB9ES>7)qOFK9}7s{`i zkPRaQ93-WtYe^)xmHEETKfX3@xu_{iShqQFcHm*o1x`g(gmAP+o(*y5j= zK7Roe(baYsV@WsyaS;tM;f`^7CXzp^devl6E+yt)zz)7 ztEhYQ%`1i-yte;{M$O~wEFx17LPAf-w{ijV=8}9a^Z@|aLD-}jO;(x9Q zY1IYvF8+J1o!36LTkqU|zW5BR=FS~JO|5~oy8Ps?-!@H!rbTlPORA4qWLo6k<~AEh zVCYm^yRW4^6p35Kj_VH3=)O*AKpL2iTy|BptU0SW({=SlLr(qWP zb+g{4gnXWRrzyHeNA{0qqqz3J>jeF; zfvZ-N2M>BT2?A!XrKMjm#%7sTp6;Ox*K3jD82TZUGAikQ zza@l3?;RGTpCZx!9u~Y!&vThQIa!Cf5I_<1$J%CQQwX4hrj~@mq{bVY0}}YL-cGT+ IW8oS84-B!Cwg3PC literal 0 HcmV?d00001 diff --git a/windows/security/threat-protection/windows-defender-antivirus/images/MDATP_26_Uninstall.png b/windows/security/threat-protection/windows-defender-antivirus/images/MDATP_26_Uninstall.png new file mode 100644 index 0000000000000000000000000000000000000000..aa0d5c7caf671bb8d1ece4ad8a56c34427c5e530 GIT binary patch literal 22356 zcmd42cT`kgw=F0tN|3BbMg#-|iYyrvN`hoiKqzv~p^#jll9eE_$gu#CEU}1^k(_go zOp%2m78HH>ecyfe_89Mt?ta~OjQ)c`?NhtXK4{&>=*NeG#i6<1u-@F@p`l|W@Lz6 zcA)${9eZjo#;pbo6wGx-Cj1;n2bdpAZ$0SJKc#c9waG8@n{BDdE3WEvZFO5n{CUyR ztZerAw3)Z6^R7>jbNt~^k54c5a%PTKq)FIL5^mPjw4&IEc1vxpHNh|$#(HOz?>qO# z=2$^roqM^B^>xyRkiUB5Y}1E`uRjrHJ?2CS*95WCHl`|7??_$rZ6AewjGNXVoZR{8 zO0zr@T0@ypaM#pyu_pq8A+NBPRi^oxT(-v!sm&C%z!if92TIoRJe$sDtwe-a^jMX-yr^!~4g+5BkZ;J-)mDc1* z*h3PL*jdrs;V5Prm;j7?GEj6c&I^s*#`N-G+Bqu{ie}UN@4KfqmsxZ*HDaRN>_*Ac zt`FC<(OPVB+76co4bnx3e&@X&(ZSo@st@%scXP7iPm4*YDF zdOJ~ES|Gt5>4q|^XVO^sx&7VXnZ7S^f%0xa^T5)}Hn2<$QVznQ9qeXN17-jj)K!`d zw(QoEKpM_8Mp)X7Gfx*+ykUpWUGEI;E76`zt<09MyT4e9&eMvk*_C{;m6j`EZI!O% znQPBYVOe6Pl=BMA7+FX3(akh~a;CYyAecIw1G zO>uX(R5zL$O3I7PPr_Tt8|R;tKI)lB6tO)f6r22(Frc67_s9!0`YB!V4-_Y{Eb8|euhE*Sl7b*r8EVQ9Wu1AoeW->BR3%YT;gB4!mlH)6eY-uALmSQhDf zp2K1UHU^r{CYE6#`o16r7`wjN)a{}uRw^e%I8EYFFFN9O(8N=`hlxS?~Edg~WfhVN5y-a~sQx|f|DnYZ;H zr_Xtn47z>HU;viq{>ePXV^1=1?C90NA8)>Bj8S4w!;Gp2uhx1>DCbm+rnA#|*2{Rg zJ;{fOk@XJ94DnBf;|rvPIQg6dy7RDJ)leLSnrm3gy_Im8?iKVesNi&mpSJx}udH3| zBUp|%)gfgWq}9>Niafk%*pwRgkP?@{9^VW6GIo9GSJp~O&AueGnzp%7Yge+w<+w2H zhjypzQw<%aV<+yUh&UT2mhiBx`J40{-E*E^t=hb%22Ps!mFEplC<4NUvb9pgf^PI~LF6FSj za9Z>zVcrjG|24a@pnJAgbdNSp2eXq#*H$4N4VTmYwY~=ZyD2+OV`K7a;@vV~qh~4` zdq%T!G>3hm@AqGPpMUkc`NmUyHAlK^m>_<&dmTo!CYcplAupHUmV#B4^(3peq-B!y zHW@5vsD+CYkk}-hiFF00O8ba3(0J+LV4at-)kPBV!RS2XC+zgop5Lv`O-Ku~%5Sp3 zX}&HkE3rAnBBr%*%1@MlDI`|k42KdchW0Hvjs~?)+f*J_vu)d~fovRYW-A?>W(yiJ zO7S$vZ(MjyI+Oq0wamu;-J>^LX7xWyr;>ohjTtA=KKLdMbJ++@E;e1YbsLQCW!svE} zmxV*5C3mt2?jC6!)Qwiugd^-+VYEQ`es>X1QzI4Q1O)3)*>vj~A6X4IA8r;qiNJ?U679OFLcfUk zJI&IUabZo1^3$g5>Y?b-DJNE(l#{A3&Ry7@p5on&skUcZjQnh&B%Yt84VM3gg5qK) z2;Sx-ILCi~OJBT}Hu>$Bx1pMK0mJb<`TH2O*kVthRO zjC?@SP5hdhsoglAM4AU>AXSIv3%NCL7jW_i-@DCx;4R-PNk3jH`j+v=O*HEqKw`#% zYU`*4k#{|t#7D-eecKiQ2h_T;_Ue8~O;yJBM1U_f760}kr}KGjs1D{io=Z|ooKhgE zOdQ1;IRMUHYk9}Sr%{zz$jZNwegrPJ^`apu&Fkj%-Bs9y^kH^Bt4|*zx97WfW z8|fJML!*lk_%pS1<=bT-CP69mknHB1A7;0>xL9$UEu$}yFQBvI>tnWKPNrM~kNFR! z4Tn8ljHg(}HF4)Zzxst2FSiOyDTO10wDMKcq~;^8?{?hAVo#f;JxY!iHFu{gHhPV) zu5OP22)n38`1?@CwmY2$vhf0z3GC{VIh3tE^%S!=7(6UtjG*?=I;Y zN0fcoo}hKCHMuB#rqta&V#bYC1K8ev=^vx$#r9v-W#HhCR znY39vd!Qt6ItNt~6No1QRzdrp>{Dr<4Rx6(%&G5>#|pHhug?d8=~G4=_2Jx1#9rOD zM7{Ys`IDe_IUW$-_oQKlHT~_RB_bly&V54G<*Sq*K_T7>lZY8igB4mC^{8Q13-E-RgBlC$TGt;0<83%*DFf-&H~Eoc&YF)+rX z>4+Zfe_Uu}^5RlL5edfQ`-t`fF$Eg<>{emJa9tusf0Y>2C?}{U+Kq5~;IW1^JRc|9scT`93i@S*lxpJLtv&EVSW($>=c4 zkDI$g-@c!{&*1s-QKFztjMcLno8KD2AXlf#%@(mIHDSS&>mo$Xpe46fvOp_a45AT< zOe$mWqcLKJ>xR2q^b({$&;HS}6u{2t7ir3o-LXYLmaUZC ze>_b409}GKp4aNFUQW7KBB4`W9ex>K1kDUGdm+o8_+g~@Q5?ZALGtw&Eb(c%K7ezTt7cg1mNwVqb} zTG(G6dO3FV%WABf_2hkBkg*c2^u=%#CAZ$&b4@e0UO3P7u9H74E0y@g)ZZZH-l|DM z{ar1OoNFllP;2t#5{dtlfSPunJHk884xgem9sctABp&eAcN8*K$*Cm01qX*ynOgCzMc08{v&uK; zPdnA!$GW?_t0r~M@;j%gDg6g*A}#3=zrV-VfKYnt14QqBo&M#qk@OwaJ5kbD&&9Qv zO_Ihbwj)dF9@YsBV1H=nT|9@Ac6Z|h9`ag|_GkEGy@*LysjeN21Jo5*(gds`8y$pf zMi5;LKH+h9M)OoE)KYe}PV4H#e3;oyTLbaK6R~$07;S+!&`n?Y>%TFO2JF>^8mGma zD5(qNAgmgTtp`Z0S$l z`(14tv8|~;J7tICF};y7T8nu_Kph!ydkjm_(TGdkad@{Bh~mA@60NbksFBY6efE3tjFm&uf#9GQx`HF94d zs!3Vs$uaWAvuKjrIKNok37!$e(vlwmGiB`=d=p?XPCG-p$4 z`dahbTTR7cF4Qm7O0T8B!miF+L>pnP*-5tsepY~pF_hC(EPY{f zIE~3wf_ol=Ww2*wD^Zg5wcQ9^KA0kFJa8x0*E8o{VfYHqS1FT!{m3KuuK9vYJzg+c z@p%CP9*wq5!0uLf5I;?T4q;bg)!03gqi=o`|8|6C#BShSlU6II%9xE1dk*)_JI2t& zyh-M0%xgSEiG8s983+Yzp-GDS?~!&jXU?a^o!^!}dor8(hOt-l#xj5r_4H@X8$Ak- z-pnkm%Cx>Rrf2!*!Qv~GfJYbq5J&3f<~C%CfB(N+ZuB50EKYZ3zcuskd(7mbofds+ zo~el-p7i{WYl7H?`VTM1rOp21p=U;Z0KJI+M~AnIKJb6ur}8`SQSHXGM2f7tpZ?F+ z|4Wzumml4pG@mYv%~gBuMzU_Zm(Dj_o9k~lah?v=f+T(RE_;Z4JQ%IFHe90UosvWx zmfCH;<_#ED+wFf+(97A6l)P`*r|+^Pli~ReGBfOA0uVW0C-?L!EjJeKsL;<>&beTh zgB|YAsHXjnBkm4AREVOJ{_RV`XosJhKbUGa=XbD!958Y#7@kDz<`0%E)?I_4b|ekY zM|3n5eKf>)7k%>2BRC5Ebc9hgaDTsR`>VM}vr}HU+#X8aJK)(ip8iA;581rR&^4M7 z6jXc8dxK)}YWiUR(oLjv@#?&dr{U1i$7cf*WpDyR>{ZR~pO5YY6$<1|oED#M9B8T7 z(q~QPrg+f%nXf80XI@H3S~8GTyD!pXA{&JqxYfu*6N(pAN;wE$$R!jrn@6T}-&3vg zZDW`-{OM@LUWHUPsO5;VxX6Y`H5xpnwwwy&a z8qzERyP6L z?)z9CQk3@1oG-a-`)pbhPKZoPh?weKeU3=9n0wz_ja{^ZT7jky0aj6XSH!cZV67Ns zr}5;Mq@+6*+s2J%4SWwmjh+XO82FH2x0%6?TUC8@SP{HQ6kUZ|0TCXk~&_o?KhObw)Gf|NfiBnqy@RX@jwh2f^Lti_- zgx~t13(3{%JJXQ>#86GISpYfCCwfK9k{loV$`-7V$C$Fum!GoNY##=v?H$!u&?KG( z_$O7HUZn>Wdi=R&Oi$s5q9&q11~bV0L>1r8nEs|GT9o#+Zm5+GI}ew_MGV^9aqP97 zdwR1o(-=T@em%9Aqu|arOsQ?9jF8b%5(f!YrJAZd>w|Rhj||i*P3-*QWZ=u^S=jkn z?Ps^)Qw(d=jv+Qd-SXXsyi&!4+%CFYq3+bV@>3+)+{n~>1DqJ4U2W@cz> zcCGd$1x;rvU#GAQIw3AEX$c2XC2OvoN6m69rGy=^b^RF1qL~&$)*<6K9XXTx0OvlB zmF)uN`f_7(eZUBrw%g^N?fY{V-NMYqo->qxM3hU%fxU$Pz1h)>*u!BTMlVz`$-1xS zL89WRpXb?tw8ZIGpA0`(YxuC!*!8l9+TCVWGN)(K4{I_-bd= zY&{yO=$hq*S;+DC_1l^qog9G+urEc$4GPixU4N>Y+uj~edm@Fo@QoqeRhrymS%bdE z@1a7ZH60((o-bvaH5VWs_3|{=KNM$X<4USAr4_#Q%Dv;l;L(i_q{vCE$Zu=LeGTry5AhOMoJpAFcQz4kdd z#+_SrKa;a+MGLXm&rI|57w1npVo8|+Qd`s+5%k)}W1?;p*8CsSKELp0{ZWB~=#P`O zYDk3*BlmXAUQN?>4ZS(r&Xk8+Z%JFVRUbbl_Dp8kM4(Lagwe6uWrJ%`?n2Z(`}k^_ zXlJ&qOKqkWE`>d7|LuPAZo5DrkjegMh(k*BhYPo+Xf#-fc6vE-aRRo#k(L4f_V#;> znF#dqY%hO8$g!rWpW6YQChEj0y0RMvE#B|uqws&RGZ+%}qCc_b^N9!Bpg^yd757yO z4`Z5`5A{2rs6uJ0_II9^JHDX%cC>FqmCG7R8zxcX-#rpCoiBF0dVq+t;_?Z^&8Ftk zG5m_+YS$-fnsuGw55Bio8;I7U<6>SyymYDz{?ouihGoTZ7W(iC@Ozswx&Ze}`&Tf3 zu#uf;-wN)y;DxuCNWV5@#m^b?F=0XrohISW4BdEE>ErWvh92EP9Fdyn0I>w0dqQVR zNTOUbm@OcqSUp$SfF!8;w}-_Sqe ziGQ6gcs*HmaouW-P>5o1df((na{pX7zt}|fP`O8Czo5gvc7OMr5Vu0v{)dkPNFzLg zh9gJr%TsunRb-lVg-bqYu01nVPmF}MbYLkSvYgSV1KBG)*N%0ZZt`eFczImzp)#&d zu1^>x4i7Sn8aG-V&!}Yx6&zPV_)SJ2+jhuRU9GQG&HB=dT!Z?R!Oug;>m*JO#V^%A zVv~lEkw-jlrS@!XMIXHpKSjH9d0`fk64g;))IG-377xB1@-8Z7>r1xdS z=6DyHmWJ)#N)ic5o2G;^T|iJSCkFN*L9Dke+Fn3GzL#~b(Q^$}9(>popt2r6KU;*L zZ*n*$eGhsy<9qn9OWa5>QbeJc2R*E(C>EG|=b-VFf=!LWgMnJqY!Ew8j8|xmnZAC# z!`q8&|LnDg`hSmq7Y^uL3_yNPSI6RVV0Ie!*J%~4cywRi`+)k+7wd%SkL}eKYC_N4 zUk!`Uj}3s|e5n%Sxg9V)G3ge`;FQkiA-cP-^4>UMgXjHGn~|ipG?W8&RdMQN zE@}aq;E=`RzBx5EM{O$!Pt>8`;IW^Dt|DEI!on%PVjP>Y0CVem3@7hqjYSbg4<;z> z=#=fagdk@zH3^x5Y*UD*tJ*w5SuBNP+SX8jvH5J;^h zn@<24H+<^kNnm->aLW_qcs0dRXXLd#swurx30^wmiIMcLTk-f%s+PzHT{r|hId*e^ zZO`w|4L8W6*M#lzkUsvSl>;xaPi;1zZ;T3uOx8M_v<^U8&)c~4L87iZ?UmEL*4HZ( zrI}&9=&tamA5`W)pNS0w(uW7!lYbnOny(}bNo541?cm|O4j0}!>Fes}ilLbWc zp%@^Krr9eITcITv<~p;>wP#Nmrt2`Ig+5PLEexs_fs!2#Ro5yvS9KvJq`trm8vs-cM@oZ4`OF=X2M9PO_x7lYk z7eE9WXs7xk{EL~|!N$uy4}Yo4`^~;?6QAFSHf}vag{@DN$7+9Lxs-9nihGo_AySzc z{k_&R4ATNad;3|Rj1R-RtQc^u>2#V$mU*J464&tCnu}XIW-6JH!aH@d(8eH*+uOko zn5*EWF!PJ$etMX+5!_X6W(eCxZ&AaUC4HE*`X)($0JclHCRHi>phtJ1awU_y8^FBu zlEWu}-fp4DNXHkEb4RJi90iCU)Y2b5OnDp)43IqTzpoty3v5gEu{MVsO%uzqlyTQb z1%9=xe^8fNiioj%bN|q1Ut#(!UCr#E8zNU?i$TnLIVWm!rplrnP%czc?WHqVtC|2t zK-xXK>ZtKsQ>un4YIvo;SI0@rx%LR}(HkCv3(pU26Z072@#<7xLw+v?GT-y92&(}% zLscM#ReQ`1kQ5&8j-D?|lXTN@)skk74MbZF82pJ&$*|tU)lWIAJ?a#o4o$HjYa`>@!y?Z=iWJK^!OJO5EAb8vH9P9P^90s zeD?8gZUhhrk~fWiW#^Rf|BWC2uf{VBP)5`Grx|3Du`4j)O6G1Gw}c6Yk*;70&D!EIQ{>+k$VdLU7nYqGJ8^F*sLObb<}2CvHp8& z5)98{kv`{1A`J)vgedu_nw=S+O(0|ps0XnBPK%slwI#w zx=1vtPBE9DPB8cBAS;C_>2NPH@W@A#{7MPVS*oP9gzaOj#Z91J*dDV7wmI0Ad3&zBqLd^;35E1F`?xKiJHN91hDf3JD7Km6nZ{#EQC2TND9pr+?R+9AXW~E&A2=id*okpc5K;<{@*# z^J7dT!$!@{}rx*kwCt}h3#Spr#? zw*XCz6VTQsG5gKUUPtQ)j{CFK4w#9WrVjwI*rS!FJY8-UQY9YhScl3hh3(pLbNge& zDdTLi=Ec@=0NiENyuaxJ;+W0#+Cy$QuLRRNo{i;8trS9pzk4Mzh+v@ckW=K@`<&JLEON&+^UvD?j9R0h^&AXQXxlr2L& zFX-eFhp;~@TB!$W6W-0K4kF9$d!P)$F`WRYee7A6v>$p{{%uN13Wxv2Xa@FjL;89> z#mTV2Gg_;)xMtxZ>iR5d(!hg$@W&>PZrLB;J1nO88dK_bTv(`Goc&k~TsdFwp`+~A zI?9>+kZX@l!t;Q{|Lo2SuZAl3kZ*ylqiWKyMc8T5od(Ukjyn^;RAhLqC;6AWY+3x> zGQN0?JrxNSsIVG5fwaAo_tilg36eeIyw9o$5D6J2y~o@{{9u^b zMQn)w*?q$!x(@HhH&&%8gWT4yaby)E4aFw_Ch)P#`ADvkHIQwsv~%@@kT7D`c>ERZ zZJnH)Y;C;(&C!O*9T0dwN5*lpl3MgVIq@3HHOBc00tjXEP~ff1THGFN*V<42WV}A> z@;PzChDjQ7jG7`5IXNqP_4_ww{(FCGYwP=n0yP}3>LHNzTVEf-o5Q8ZPJXjx&nBF|>uA zjJ0NqxVo5Ze)fS+Y=dPcicwlsye*pPWN+TC$Fs_;i@4;;E`K<# zsAdLze6vaUz5#g#!K)B=X~th!vLSwdzZ#L+Z3@{>@kYtFTg%)d{ZrKF{!8XfQi3() zAhPsrW(UE73m}L{{NhhQX=T1)9^Ud<#H82c{BH2fT>(U@S5rUT2_)k8XKMz3h$2s; zqfOpsC*!#e)g#*{v#xm}qEDXh;H^B*q--2N8ByYSAK4;8Fk#(eCQA?@s5e~16{xptZ@>6><#_` zsEdDS7tiFPKd#a5iu|;j1c_&Q%GdqjB~EO@FjnO#j-#cI3)JSF+lXG^65I&UbLFY2 zqR_qS`t-{0;7_(syI<|E$KW&w%FPs(F}pnraas9(V~-p0m;BnX;qQ$KYa@@dqU~(K z!_1GtPD`o3AgO^djUM_m;Wi)JVEBBr0hWJcnm z4EtE`_}GM3>X^uvpB-x%00Wf-&D$mQtx&}%RK3!(_9v#dT=8FR z{AmdQ)a^n4>r?+({n?wP3=BU#HKjXz71${oLaY&bd*T|qe@(v5PVowFvr?b^eT^f1 z1R!HXNuKCh{?e;;W(xYoJJO#du(6Nb+uwOy*RTRCanXXlbV*vLPq*LE=jn3a7qUdA3`0vaaP=fRa)ii&r02)Us)=FnVR6P@$TK! zP~7+ezr)y!%Bm_2AyO|8ljOl>Kj&K6N)rsjZlv?+v;SGS`>vi{11c}Y&>O|N9F5vv zY`zYWzGT`J2J|)m%PxQ2rgG5L%N9rsB#|6K!|V@wRZ&v1H)B_7G5y{bsK^*_&bw7& zZ*deDC*XH^c4PVc6+o9AlpLCyvlqJx_;(cfeP=i%#Dv&xla36+pWS9gBrzmD&2etzxd(uELZ=_Ha02kEx z3Z+e|-XG<3U7tj43%q&-K#Fe)?t9{6YyZXucc+*nn4x}?YS))#Gx8~}uUQR}V=kSa zYCI*A4PO|%sh%!*@!x@=a^cY5CID>HVQkD$8aO7Z_t;nM1Yn*9|NnZlk_5<409edA zHDB#aS12~h579HXg^)h-it)wyUpT&=1sA%_+?Mh5=-ghF7 zW7Tw(X|n3m19c`!2<5VsWXFTsJpazV#EZ^zLn4}*{D68I^GJkW68{EyRDc}Gy*Ksp zgm?ZXQx%g2Da3joyiR^Gk}J>w4dW&>V?Czh-K=RkF6ITQ41jwgHmr5nDg)jFH4GPV z?*p*X7qF)&- zb<#Smjw6g0p2bTsLxpTd^O1M6bDh%|rXI_zW`U9Bo#E6h54w|-xB{o|_&j`qM?FDI zxx$qkPA57-BiTwmfHyIbNUS)2J0&`3sEz#{7-3fUT5^t9JoudYYJ_n>9d6gLhC(ukQyg_pgYGcaEch5{lxdre;7L9Ha_^B0nm*Sj ziqjv&w5dB6X38Gq_NThm@*+-!X~)_^Ym<5^>@y9wD3P~)hw!$Hk+Y6LKVuEqwDS^s z-28nVUJas6)h>jlMKQaM(yeMYYoHS6djyS8Pfr#ZvlWQ1cb&F}s$4@RAZ~Q@!Q(f0 z!z2$TATo4JpFMdGKa$I(e&b!vG$YwDQTS|&17b6w6SfXBwHBIVeOmA#iwDe5M`NLO zD{D4RGFXl}`(Cu=x}L`RaYe?Jy|=?KSbBahQ0_s`9u&_p5P7%Cq%HV7CRvaMgr@9M zbTt`35;A!QwE%nFT!d2HdeHYte|Qv%H;(#`tIPpGF?G8XwA9^N08T?g1Jqjbi5(JX zR98%&KeRRncfKC&4S)39O>qEX`ZPsVWOV2gX@%AA{5azU@uXrNmw$xpd=C zSZWPBWy_F!0A98oKx8>>(sqv8Sv(B^m9%kMcqer`>u}^ps1G#wq7TDfZiZ11!3&rJ zH?8j3fyzIUcha*xfT~*hBK|NfJP2m0svoM+Q{Nt`<(PBrd<_!I9c zwq8ebw7hfseB*P0I<;LmLvegqs`XD@ysJ;@I2wZktn6pF1O?#}1;O-OA?cZP5v+lm z_us@R0d*_p`v+9RHOkqL+m!yh1$3>UvYCo{rI(T=ZoZY)7Ri+9-nV2^aNF*EnJaXd zi<4x`w8tT2XfO@@JD={4x1qG zMaqa9L(y`EHepg)K#gGbHOD*>L4yJ+&`7gcZYm}M*}u4k0jXa0zZyMH23WBij#1JA zr8qD8Yhf{|mikRRIaB#P;}U%~EYeh$_7g@+xR{0+>9_j^_H#|Oq>;tuXSDZ|&?v$B zucBHQxvdYrMu`1Sj?vJT`*-!Hqzp!EeFQH1;}}NGn8#muX54E_jbn#bR#&Sg^0xSe z6*e_V*)%FwLGiy%dGv;?*`C@B2pZG=Ob&^LX@RhI3Q0}VC!DoJKX!5IJ1}UeldMml z>tBiMhw5l;$J?Axaw&MLSpTND>+qEF$&-!nTGA7T354M-eJi6WO_Q&&R@A!#l|nlc zkRJxmnn_~4PdS>(l4$9iMPSXxw5&a>U!SX&NmJQdSgCKsC^Ms9Kh*oR4wNw}e!qk8ZT~et zDM*zl@iy(3-IvsB2OJSf>MPHUGmx`Hlp4N44k?c-Ga)gL2Uv%PS^Poen7(u{f#ET_ zdP9}J_ZNGThra4ay1tTU;k2c(dP;Ouci}G7XZ=fFQqy=D#6@%kZ|CW+OrhY>N;&(B zqqL;~<59irs-8+^X3xh?UH+CP5vU*{D|0AY&=C9($b`y*Rlp6&K@y{aDYG?BHC05D zL-T|=BxXs^0()$FgHa*eS$WYXqhWO+K3FZEUgV>TvK8boT=p?clC?3k9D~2F%t~`iYU+)F2FY2c-wu}MJMQ~9eVz&^h+Fi zNAdcjkyAUN#Sy#LUl*H*$8G(W;m^(Zvfs&;(OrMK~&rBtgY zs6L?)bNG^g7W{j^w2u$WZv4ePPPVkcOz_JqI9jmZm9>>6Fvn^}k)rPI(!0*v2-?^d zklC)tig2-y9ew}okV2h3u{ljS|DE?jW54gF^w+yixSmr*P<_UM4MGQvEse1)5aNto6yd-JxCrU;0G|awNu*F4&@lV1?@q z1}MogK9z>4*O(#Zs|^=aag+%b9N(r`3f7Tv+l!EK zri7R%tqbC4H6|+AbBQgdESBHfRZt-cDkFFR-!!g zJ1b%);Xu?_`B7!-c|h@T3*}a1W++nlaZ^H9Dl(1laRlZ$KWV6c!oR0PW>fbn-~?Sv zxBz>}t^+Culf$+gR|i=mck2%H+~J$#!Q;TWxspfq8(1T&#?9ONOWwUoQs$FC{?GKUCMik!E37c z)6=qjFV6Ph(7rr)O){Ghgr7{_%1~Ad1&Vet`r-_GqIX>xD_0wHr55I@7y-U5+09z? zVcl{-%?+Ppw%9lUX66R(<^tD5&YNro)+7_z(#ygObK;V&wR33Z=l+Z$!ewenIL1VJ z0%Nmxwga3DiDBL7(GACU7jg_Eh5E?5-}Ca5M8yJo65n_r2uI6t<(Z(#q(6epXOt=2 zYksPHiFAv4wuy)^W1?5=55=r=1}7UC>3Qby0ZZ^k<8&37NEhfh z66z(Vq_o*wxIHCl^Wg(FE^+esL{DaFrC~J%4as$T>5^>XU-fBcHUojVKEaF4Cf27U z%%^ji(Mav@A3T!BU$E5v?2k^cPR>$F8oj%{4DZChdLSA8ozGNov^&Y#cR&1f4nS5Sz79lq7uT{ZdoCa=UwL(#5FupOQwV}MP{X8!53T6)8z zpVB?x6Ik)BmEo(GqOj&^!A9oBOPRCJqqo<&ODC*(#qQ-)-4-6ni2GY{s{A7jNNJXK zM_7l8*WcEoLa35v)gJKidw{FNo7GSg3p=26lHlh(thwvY2U(YGGbNDVhp&)`F?M(; zQ*9H{(@22A7$};4ia>alk{`G(G zHluXq15%9gKk{!@!y)xpK?a|FDQ=Bj6zXXB)tJfa}EXm2%f<2awylZ zE0eCxj7C`-Xjr`DGI-qfVbqx9nboTY$=H0^mpT2ch}saFGD-tnJ*u?Hfk5}9ZtB>& z4TVv;FGdh~Bsi2oy$)i!=(&H~+%>Mh)YJRhSJ6D1`8M6Yy@y( z%c%yB;Ub{5J&Yo$h;t4oR$aP|+cCI?nNX`G@d7!<=+smq8+d4LCC8?2L(D=^ES3DrYC69&17Fh3w$S6-BTH#OXoH^f~QAVdf?8GoQB z5-Abrb{G65B(IJ00{zo9Pseh!ONh6dxglPbSx!hxaHf_?R8mm5h|FpPpX+Y)8o6LU zh1l)!gP5#!HWKg)QrkTVi;QH>LWaS==K6j)~k+c<-usHn@;>Q0kfs4eR&`1Vh`FASy7L>7Isr z8hhaD@l-J1e1!b22AvuviMpWJR{i)pQ8erhp;Uimboc!bIpOV9^w6AwtBy|dY0x16 zE}v=tk})u#zlXZL)FbfiosHU#VJH2|5EpW*yn@3!=3NtuDNgNQ`pTkjBBDu%BeLEz z=Z7q{x`%mv=;f{%`q~5}EVYGkzo{EEBk738oj+C(g40I_K0T_4RA*Z0^)fbgh=Rm@V)Io`TQ;sxmvqrU_}DNV zGl}em!v&>caZrFk9vQE=iAP)b!@s1yJvPeIa6CIp3A*8suau;HCU$%UoZ@e7z=1L& zZ(D*xDM_uf8iNOALL~s`WF9lXn*D$@sO^`^xKqNGi*) zMy`S9Q(ADi_m=Gqiwq>~Ke89a8vKm*(Tp{@L{}l9>$~Cwk2|HjI?K@^lqW487}IF& z=Ri6+c-1imehLfuqdTDW@cHK_K15fy?o5Z`O4s%v|J?b^ZQsmY&@CJ0ia%`%a2F^2 zNCN9TFozNmb1x za6C;C3Y>6{f5{6_)Q8qBDlth)-a)oV1f%gZcL^Vl<%W`uj*dK<%cQ%I@@sv(Qc-=< zXOK?QV;*&(>)w~OBH1htmLaA-j$A+PKHd{Z6mfaF`#s6e&-d~0W5T6ZE#Pp| z@u$Wthy8k7Il3Z$s%98zUy$t57qj~!pkbw&-a?SOO`;quDsb9z8#B?p@M3asZ;VZn z+yQ98kj~w{;%^29?Aa?@`~)#2YZlK70a4ZCnkcqiMhGAyP*9Rin{%G zMH&`(p(j*Bs~wT24EXGt)_qswNMy;sGw}$$a7icWS#XYX8aJ#;VA52Wu9C z7x(!ibdx?6(QKK2R$Yg6IPW>+g;ZkVUfXb>HduiJW|BZ)eER)cl2Yw#?FKuv?LB%m z5;0%%sYV~3s_W70QND5~se2FeH1I{l(7RyOeX9e*?_NzfDOK@VGeyio52tDzC1R~J zD`z7y4^Z!1Z8l{$*>)KqPoFXtO@6v_zwC~J7f}~M$gPL``C;@j@ii&Y3ZfAIhuO%< z#Ak15g%7J~PX|4_y*OEr(Ir@^~6%6{VB^;Po4 zriqVv#AoqmJ&FLn?9P7uHQP-SI2nv^rLO0>lB=v;q2-Cdjq5R+TV!Cc+aaLH?b@YG zI%%U{6K5Mi7^})q8KUeiw2NPCJLA19o(W*Ft$y~W<@Ow3VQ?Uv*_9STb3uBJ3aF!J z-mN}9bSE&@JaEsM5zHBmur_H6)18)hpwFL=pSaZlF*O?|TfB@EvX-~CWea-bUX?_hC`F`FM;Wmf!&$H>}mi;HBpZsiy^@<^z z3H+|-kSrv3x|IFnm3#?tgis!S5{wD*od!G)8&a;J=US1i6-jD)UHIj5F%|cM7*19=vK`xE3U8)J_41#Ep@dC$BXlA*rHJ`7)|-0N zW{#ZgK1GpxeHSAj$(fpX3!b}^ct%F zW~vwyZml7X`DLHM|Agn`ur;z#e@<9mw=~>E+?FcYEkPU~2H$@elSi;<4lk@o^lqEWxK{EN$MDyR*OCZZu(ccOF0nvIr z#|-dmYS7KCslajD6{iQ1C7^5n8)hy>9iRuX`JZ#ZxBuNYUdi_63@K^u|Ew97-JF$;OVX3*fQT_;9C9oL+a%Wrfl79`690JJp^c-S}cEp=h z*vAU`3D#nBAus6c#tkqsaY;W{$uTlvSLE>F`bD4pQHac^?@MUo%u1h1UeeOAVFHa4 zehyph8#=$@y}Suu;1d7no!w}kk3pB$6}{S3R>a~-j$@h0Awt@jG)V>rY<<)aGC-+j z;Xok~lg&mWE8l5MvIxX=+bl=)nCN?s0t(oF4z=ooO&>0P7< z7!U~vkrt$gN(&_+GzEtuMOx_6BO(F;f+Q$S2t^Gr2nbRnbQ$T0FeC(!UX&_`G(%Il z2WRH4d)J!#FmLxUS?eS@E8qFffA8Nuo1e*;{~R)>``JtXkNAt5o)$~Kj=@T8&OSG2D>;bc(Gx#7#rM)NDs@|gl620yFu@;GD zANwTD;id3wdy|Tq&ggKFpYHw`7janu13hwi9 zVp!no`Fqx4&S!%8GzO%Kj~7T5TbiVySV_Hx_IQ8D)zCt}^Nz0P^usxJlqLnCo@p}i zFm@XyEnHm1c$-{2%xvp?%JTIQb1VoU6lk<>MsE&r>Z;O@n7%W?zJtb|H-mMxp1=z{ zM@TCR%*BVz>Izn4XkIfA9@a9p2+$^Z2pmpkpDbJ@$}5+^p7HH@V^k$e5|rZEM1N-x zs7SqLG1(>)Xkp~wx)d;+tOMoBM_GufdS_lpI}ox-Y^;R5B>5T*BT1qTNom-&`p*BTAXP)|*t0f2Np&vXRcRDKP76^T-P7x9ca{4C-TFJP4Ri@r>ui2Cy_{ zz3xLIKhc@{E4JR4nT?5#4^z(MyuL^DbE}Jj;Imr+yc_*AOkW5bv&h>s$9_}hmTXRV zQD>7{p~vZ2?JqYHjqK~0W+y-o?p&_Ueo%;-g2CRb zVxH*wMCJik7zF3OkV58jP?1!b_d>SVaNqv%;SJ!* zCrbBdPmDBvvImyGF#(jYfeDeYPvVs{i61B*Qa`eG{(#Z!z`G_ZUL8Nzb@@xj=OsQ= z#lxiAOc^PKQ*E7}6WL}*jK`#>pi5L#$f>|W8h&tPx7l!-VNzl-nv1!nBBG&Sh*tPL zPQRt`MHj5ZXZG!$W^qO6|P+F4~^4|G4V+j<`Biq$t{k zzi->=z7DOW35(Hiyas%44Zo#%6%pF5aZn#Z9~~GiJ{DdNYXvX0jiks=P~QPUTK|f|52_ z;>B1Cu|4udFg4;x9}&Bx$gOsbtXg7n(CF!I6=zqbD$k-+77fDA$+r4hg4n>C<(lG1 zdzDF71?WB?rRn-S{9u+fkm1P*PCWI4Dzy+CA5O&;T+ka#uD5OE5xPy5sWa9Gzh9I( zt=E|(3WqIkemSnWJfHvRebpI?6#I)Ih&%FI65^A!@OIQHZIff>b)K!f4JM~nn3b|- z%*T-yGR|_UYl0?Qr?L&&P7RrU$&<`Ayz(ZBVT7)rDehLR?lD#ZwVgA3WW3L?;PlHY ztdt2a1YZeW1Z|5C3f+06jV8hPb;`}KIR%WRtJIBXQvUthtV9xEv74!4BD$_n@X}07Iz-P`czd}w@*&fB> zc9iEeGDZ&PNw`)DhQU~31qrEqXNgv7{Gb(&sFU?(vP|-o!9tvFl!d5oaZg@_sqy^g zAZfz7a28W59APqDqV5MBEYUK|bMvAXlY1lj%G0n;EqVM1$aI^E4}KOz)s|({S{_S{ zt`!+76vF%Jv56qtdlsBVQq)b}T)VKqE0UPByAWEct!ZJY3o4~=le&}9;x<=b{!x)hyV| zTATj$n4}Pgq0DnGv{-+lCwK6Uw(?|11&(X>gA3=WGFjG|pU~xbRzLAxhGUcvVXiZfR9`m@T`HbUNl??+63#LXO#n^`WY1lmtH<9F12L#q(l%fkO~^N38|Y)?yH)GeMQab0C-7qk?D)6@wQk-d}zU` zL?cVaAaZGq71Q79CVyorpqn0J|5G{Q8lp1L&ZT{k$k0z4#Lvg%G(NgomdJ& z(mk((?yljr@+PT?i+Ad!FN=Bw}u!o)5UvL_@GkxxWSeC}vSrpb+2pq@3F3xXCk!Jk zUiMFUnSBN#(9C`rkOW`o^D&bv?cEdioUzIEk|mRS5yrJNx6qBd3fIgbGEi$YgvXj; z{;gCVkdFQpRKxWCb9S=$`ATu@2ZeMVcF3|CD>n z;dZD$_{Lv8g&YE<$E3y`63^fngC^* z3XVWahS$5pV;SZjt?P}m;iWm>p3cvR8}9(p7Lb0*$Lb46q+p<*L)opD`7l$`jK&Xu zG4b!CdrEV>XZ-ovKo+pBTaL}~a*7vl93;v- zfy=d=sgfl~?l(AVWZb}zs8{(BEagD(Xw|!0tLFj-33zIOEwRpu+}H%lzr~F& z&p9st>>-@{9p3ci*vqfMB1;EHi8NJU8>sP}>{)KFGK`3LEpBJ z@e++6S<@(cK-8S%GhU-`mqETd94fuclW=f0#=$_9jdt!=*Fg;qOM@l?XgJo$E{7*8`*PWx^HU!q0?%*^&k9*yG7EY)7q1 za`ndz&;B?p2fzQJ1z~HxR3`oPn6TCjO#;uvz}4O4xb((Yp-L4;*R7JQ4TLFJlH{VR zE}?QB!!6|k1X=fP&83IIK(ROAX@_PP3ZOA{Orm27@ zV)(j$E-c_dM~5T0k6K;KGEtlSB<^e+xj%P%9JgMzt;=K~(_kUjO?Z)+>m!|yXO55VXJ`Ak%$Qd~^ zdvPh5f@T$R>5K;xu`EmbzE+uM?(nTyz@{0)D-m=r>Z#s!uybE=l>MS*YrP#Ll!ws5 z26SY3bi-9eMmSx*Zrg?Rg|xY_orIiDpC4ZI!v{BBU`$G>MSRPf<6`3?i`UpNs&mxf zzI-h^Htg(p(M*+~qazQDp_7Yh;wBk+bf0!kiTS55qLZEbOLT5}d+fxD(6{7EsJ{G@ zx78~;W_Z)YIhVU-SxGuw`58YmanY;re)yBp(gOiI zS~PeigQzK>FZ7(8tTjjctm&{JL&W<2MM#e z$&sTM-$Pnmg)GfBY&_SZx}j?C;dEs6>{9aTD{Cz;c;>1I5f5Cr*_%si+pJ+6V2WAw zY}}S+qO@`k_j3pR22!h~H75}IUo>&6f4?W$ZlE%KN0RAec0XPsM-z^3xSQ5Fb{CO54~G3yPJEg{aV&VHq;OYm+&^LWu3@NLB&7bO$;r>g5J z9+BDsc-yLV(&~)z)6qjptfIg06wDEd9ICcp%WpEZFco3kT#oNSxzCoYn(lsS?P)+P zetM{>{sElQabYY}!K;!zqKLHwwf zR78!*KLRiqGr*_S^^^BdV~b|eWBy%|NPMI6#BbGs5H%*fEy-69_G*W>=E|lvxvOC` zVryN2rn}PvNeEP%9^7!8nO5yiujA9FVi*v8qd#OcB!tbp)`^bG`ORO6 zbp$*;nfSvEbdA45M)29?SP)ojsxyg5*tj$}wqwI#kp+tlw6A{7?6&fH%|B(D?M}Q>tu%hlg-=bu}j^r+|O}^r#{*xvNX0c_o64 zH@j3xTU&sQjg5QfQ8$B;b}u3VdUW#yTGA2~?f(6WMn+CfRY^%nS$Sl5_$gAQRs_dU zi(d-qtU?nV8Cq=3kc!T!459&b10sx5sO@Bk3=6xztZ&!W(AZzqL5I2NCV4zL-<#5S zmmP*bjUvdb)o@ZK?hc7p&Cbbz)!WO)rh7xg8^9%Ww=gClDY;TRmQG1UmCZ&?-QW5k zqc8R66wHhW4=>OG#bbZM_4w^felZ;GunEZeq+K66q7Lpr#}y?vw*7lbPA> z#hfnUHckahhqydp>-d~@-ULDwVF@PT;n7n4+?f3Wr)-3W2ln4JbvPf;Z?=K4ce!7r zP7Z(fhT69LLHJ^q+xz7eCkKb;)7{z|G_(X6^xYBewU=GSiUDnScz8Z1h(30ZA?%e0 zYsdS}H{SBv+Ni0PgN)6Z81vt5nA@%m{tUq^en_y*{JRYAH!fbAu0_T9lVtv|iU<#H zeR{l`n3#YGd(ZvSq74WHLZH%BgfF@t9v+;mBxK(NfMqPY*ZpQs6OttQYDfO?&o&UZQ1gcY5!Ci@WLsie>W696T~=1+TVgN_{6v#W z*0`)B8iI1c>sc)={7#nIHg!P(0Uwb>7Q?qRuLPPr+arGZ_CSkmEiM=m6PjI)y*IxEK5v)1a7 z_#AGsRr7b*-+bre;!^R@C5pK_`k1`ac`Z{_-eK>SATvNc|F|dTlbn{;dXmF-Mn^+4 zUuhVGb`os)vMH?Mnoje}xUd&_!tz3sb{znH@?|m5xhuJa~F%hu~$+L95#>w;Z z^Bl>@Ure3uNGZGtU{tr2qN(tIMMkU-dU;CbC5Bc8A9->bD<>#?S@ei6Q$qnxliev& zEPy#qO2V}oA~%u#;x=eH7yUz8B=TqJ$#e=vjBCx<*qDngGg8q>ZzvAy#{RxV(SlvV zCQBY^4E3gwClNT0{BO)|4g}KvBzi34g~nWF$V~735H@FYbAmsR!Z2`hD%+$;ii;Bo zc@w@2{JpseA!ByiAL;LxgbE$J#4wBu&G79eQ~`K;g?Hb4+;*3C?71@(PY+B8R|=}+ zpPQWw!>&b=k_EK{O@?J_yF!Z*$9HI252LTKaB!&4Zf?eW z1i84rw^7Tb_Y^~dgzm|rBH8BunRWGagGN=9Es2EJyx-EsTG`vlx^x1jq@iCuJqgby z%Bki3`(9W*?>4sn_t^~nx3^PFO4?+TZ0A3b+1HkPr`J z8!G%UA@if{Wz^X4FwEBY^>xDuK?Noz=DZ`*M~iX%u%L00_`CGd=udUmNK zbupsIQ4psK^7DP|jCKlzVdK9!)V!<7d83oZU=a78UPmI^DDEZp24kt|ge56;I_*Dd zz@4CLh@Yuh z=YCw{xQU8hnw+o@+?CYAyM_A3MoeGshM=;eDp_!LdyOeDG@dc=r=Fkp$*WNb zc3)30S)__KoU}$%T?CyA&*}fs4VTa@7+6k!pd3v=7phHZXolGV76EE#a+bJmC%3xR z;x@4f%z`A|$4x{iyahg?`^(xA-EEA+#vWH3DF?>1+~?0Qk2Ea*c@P-)kRX6UJ6U9% zA3v*hJpEsS@K#1AZq~eFF?3)(w+=rD@P1VMhf+La#}vtxv9_!Lmg4;Ue0lQ1Ab``q zPfb`8J3T=Od?T#`-LXh(4FAKN+j(O99YR)`h`@Rz+dmYCu{Dk4+yVpSo8`7?|KIcA z;JEO7^DkFn?|T5&KtpR@|JBuT#Hq{L@_z(25So3z!u>B@7f>3XtMGrxZ{_=cKlLw> z)6F^mKOWJ%X|_cjN%+w)To{nrQ_~eu{)j^aswkvuZ!n47X(3Yxa>&l@i&31_P%^9x z=W&`i0`1I5YGcM4JEbk;F@lU46VkKd@0`yUKUwhhYsdZ&^tvo9GK3)_Sh_3VARikZ zy?i~7Qp{`DN4MWhMTM?4mzp;Er)gGjY4;lc)hK0F4z4+ zLSb|Dg8a_h6kknD^4fgGI*tamh7G3QEFJ0+wcLlM33gv91dEKV96SF=n011-qBnO_ ze`=YcrsHqy+7q**H?38ecn4nJpntWP)BLBQ10+bR@NtftuJv|crU&-mJ|#(aqHc+K z8$d#&JJnT|3d8t01=>Co&6*W$Ja!0@Z~V&8!{XtbWss4usD0M&K--(2OFC z4%YtSx8`_Xi{W6S1=C`NO5SW(UG3kEcKDu!!zHjSg4I;aLR?sU2_?Mc*38TDxcjaH32^H_Bf`kn2%C|KykK6N~wjTx#j!6W){&>47PbE#oYs*(2sC5vu z^Sr}LtQFBs@!A^ynUXcJhr!5HGR9cEnhLU2a(j5KC8<33T$f-kTWuHJ-aVwnADOcVV5;UtlqyXL}Q zf3EvXQlfu*JDscMLc1Yx!Qf|mC|sHKs2baB-MPk*q2+G#D}_{4*fOpV%)m3>>PoUZ zB4WILrWYdiD!ZZeV>>GNm(50w)^{@!D8-Achzwfjz2ccIqin38HLC}5_MyU8IhrTU zw&KPYK4-l@{R=AOWMoRroV*U0oztF9*CD}!MJ?I;6=*ki@ZX{Q_7@dvLRFh5GpGCc zRmI;0`r+2@Pv)C50IQt*gEH3@al1_H@OzS9QGLmN_i%*U=j-{3oSc3Ziy2Yp04Puy z7d@r9QvP~mo3kWXu?>A2k!v3OhGTdpsTGf=j>6T-HwFgBBKp$&lwa zzuD|n4yC%>NNnmwFPF55D-(Sj>W&#AieO#wE+{Z%3rQaLs<-8kHFtSJ$|mJ__wsF# zvR{@POUDyw`Abs_uZ-alfloBeu0kc%bKkjw8=aEk!JN@CszJhb-^W%zS?=R%*%;NX zp@LND#R4HPWnB1a3UCQ?^_N+&37-ne3-r3o5~38TO{;9}C`c((WtmU+0!Mg5Y!mxS5OoXE1sWKzg*Mp`N z(#_{FAOveGW~jLqY&m#+Z#a56@kcZIjIXP5IgAG8kaY*zMs`R;QAEgD*e`#rr)T6O zM)1hQGF0dyUcc_LW)O3#<8geFGr*yJp1Zbk)yBWHIFS;kb3R&7;C*?sXX%n-EBFJh zMQGWpEw@T=*ZVa-seijWpZ)X(zddw2LiF+DY>FnI(CX$@r)&mdq~Z%3$%pgUSn7MI z?B~zk0;4~Dm)@${if4L14U*3FY(4ziauMQ7i&Ib4RC4M%9!-;cMJ%9WjYZLhquA0- zjXX!L$6TAKzsyOg(Aez>;z3buJ=k#DInFf{|DrZS7XJaIe454-n_GYDWXt~bZva!d zXlU9Bm$}X0w6|@`?)r6owB)CjQN}-U z@aEvF-Y10>@As7hcrT29y5HMI;c$?aTU@N}>Mc#%d6bW*vc~PM7rQ?Xq1E4%2f(!osWiV@@{0(l0gWX2zS=pl ze5%4x9nRx{c$7r3dR4WE#vo&dA1!C-^h1ZoiD&-D^icYveywgQveGvQE?!vw0FU&< zo-z*sjV|&ieii83<|h`kcZqK{!Mq-2Z7!3QzBHv)^yQU$x&WL>OA?n9j0oAJzi;X0QB&cYtv zsknrN%Vm47^)@7hSuilO(BHG;)hq%obN=n3o^p^A%;=l#aUr9t<>n5WoK@^+uZ$8Z ziwMrauy>rG=O%$`h55z8!@;Ya{gw9SW4~eSsa>>y>#c;^=kH-a$T30`R6)wzP7req z-6=r%Wbw|K4}}YEX>TEK5U&@Pnu1Q|(qr46rHQXERrt!l`*BA7_0sfYl-GnR?*Gta^Eg%{wRqZDsf2Y*HK!uy?a zvj1@9t3ppvX=Vp-(nO)$-m10fZxULkQA%#-fa{@_+eW5eiuM?s*tih(q-DD0k@)=j zI=YSa2GyQ1!Q;@&-}xLBd8~f|^p4nfG9qmEVgC0+;%^qxu$K0$vNv9=FHWr%jtAyn z7W#MNG_8j)d!;PiO}xFJF-_ngX&{_iW`!xvLLJ@kb$aQ)9L|*fG{@qD#Iv(LHA#M8 zQv2votA*7cy0>9vmZRq8YlLe3fYFMrK5a|XTSJMTArL9ha?ED0p^u5yX+hG>`ocqP zWAC!0Ek;te^bL!>w{eQtOfw7b_6x~M-E+pW+DsW^(Zu1#mNt|XO^1*1g;N#SQf`>;QVu`EktB-}BXj$(=WP|dPrubo z`B^OjfsKvH`lE3&qkjW0%1PYU;GSN0hlq~^z4#@iqu)NGHL6-mui0ZNN(Qu$glBL-}lnWE$f zYfCdvetjLdIdh~caQ8hL;tH(sl*Oy?40zb!ujP)L-M*E)v6DC%A97FcnEHN`d)>Mt ze}@MXEFsEA#l9{g$4D@w+NH65x$XPPFhE7RJr(sQwcyd04@$Sl;5_DB0yoT6atXW@ zn+eA2mHJh|18NUuPq$rrx0(C;ISgzV5`HftMVZgcsitmXAz}_8#jCfwJg2S~hbdvN zxukU>_z6ONPxq-7jyIEr>xBfP6SRv@Jr<5D&+0qv4}Qs*%#2$}4Km!^cjReHmKzw2 z5mhjS9HiYJg^P77()n#vEk-!hPnHV~i8GboqAd|M6zjMpvG3!G>b3*{anacF$J%fn z2!6PcxCB}RV}djR8wG{vMOo{|By{nZkdm_Q4Nqt(7v174h=rf+>7~CIkUWV>#!+?} z=&?v?HdfIF{5F}&&o2AvOy==#o8r8ML~hHR!6*Wg#tY0a4%;SlxQ2VRu(%&@Cvff) zHpQ{XbBMc()yW3C@nlDBd3H%MbXUJcW0Scf9-aC3#G6GT-9Tf=D>kf38R=fJCJ2)o zo@HQ)mDMSv;z`x!F}uG;i_|x+USg&yr~$pNMJ}kXY}FmXJMQY~QF65hMZou$EHOtQ znZnS+9IC2?rmAJ{YvbY*D~z@I^{B;StJIZ@VUMyW^zMKDq?;=B8N>4JFdjcbyx&e+ z*4yC?ea|AOYwcK@{sP%LfRqt!WOR28+6mnx>CFFl7>dZP@U+T3MmCL6kQl*SNe0|# z@F$;5oPNROqtF*WJd8KMR=ER^neZQ<1Y3`LYQvUK?}6d_U-<5S-$v7OJr1@E8e1Kr zElo~MO*XwD^RZ*9|Fv(bn+n=@XwGf|vDe?{tax{vHCT#xR1n|6gDbH<5I?Pd9lE%y z%)>^#kRhV>JcjanVv~EEyDDS3VKdn^yzVufWrEUny>k&~jjkU!fHnxdJ zVFDF+^*ly3-cpCrlE_Q6d07NXxKvW^%M|s=uuz`m1#SjRQH?{p-(@Khg}}DS3xWW5 z;venzPQK^n0`4Uno9y)HnF6rDRZFJ;@f0`lm=Ga)f|6fOGq(B%XI)RH~( ztC82Kc%1Ysuddge1o4ybsz!W#nAhHIDgm1=TmI30%_xQCF!tcV9^)BVM)uRb^pg0T z)A`Q4_0rSZ@~Wm$aHsnGYbl2QywHiLwP~CAHQ|QEQAF{ zu@SJg2Nl2rRk|041p9#yH|#PD<>PPnBfUWOapj?IbX7l9AY;kgS{p9O++5q#+?x8f zn4Q+E(vfE?V|>Q8|LqLZI-c~))UA}a@HEtrS+s?ncH)q+^6n7qErhzWAx&1(Ms9f} zLp#LabW9}(*1ujvMR&r~bb`dp#w`$E z7)J?sv+99n@uedeyqx+&W#m$&g1UpnQ+O>r>42z73-hdg8sYo)ldSLv>RC-B??ipW zVzxjlC1)D03}d|Goibpp?J<};ah%dhttgnWifU5>W@QPmrNq-a?~X9-_w(D`sK`8# zAbVH-k7p#Zj$)_b55Fl&Kwzo#TlbYcrGh1%_}JBaI^9HJlzCt|HUX?;N@CQdP!=Fo0_Dn9m(dh zEw*izztRFrNDx^V36sV+vGf7K1BP(3?xE{6C>RS-Rg?4dcBkc*hU#_xZ|fQH3_*|Y z>iS)$=TrNV61b89?BB5?nL-=_Zv)2$7I(sg?bw{!Y3j+yE2u-{9@kH3!XSZ6A?kz8 z6-S{ya6GMb6JJwzE)G@2zw+J&9d2Tt&7lRq*CnX}efSNz{cW}J(A)D)lGSvD?}z@j zP~Oy;4_BjWJGmhy&wI|Qkn)`$xW?0k6J<9m_3=4S)3x_sxIB%z#VFU3sYjfX;{j|C z51VypH~;TuCY@kph+fEP!^YitFlOQ+%qq!D-`K;>>QziGDhU7+Jfm(Eq0b@8Gfwyy zZX)=L9Q+s5B*D$n1mAww_wR>cHhPXI-v7au@K!o@-`ztA{sU(DJ=67HP?WJ_PPXP{ zv+X}97TeJ7cd`0wm$m=kWKI(Go4~;P5zk}mhCUO{h_@2)?`X)+cT2(m!T%3oR{w37 z>%WJm-C|g9t8-%<)TOMj=RBvPnX%LbZLfx(n?ooUlO4bO^Uag<&5tjn$;ru`n^z>B zOIYGuEFQVF$f%#QvD32)2TTfap!3P|F1Z>YM}#Krw;y*>9?NTXuK&B1K02&T$HG5AbRXwe!hsb2rdWca$&|Z#dTa_}b8uNS z!6FKVJw0S=s|!epKW7}%(f{cHl;pL(u0M}@Q~~*Z`K`lhVmNH+?hWB`{nPsS@M|EO z5=Z^Ft0uL!7mZ}_wtAWX*2b8gn*439+djyls<1CcbwWpH?Z{E4(UMz1ajH76Ry#qk z*&`*p(3-p|l`Unq*PgMZcFV@xTv{6ZQQOWzx+KbD6(w0M3JlR80Gpcb5L3k+od+-e zslB@HHNxT+a_Z-n>L%ZmET@t%oo=Y74O!%R7K6DqgD%sN>?c`sGb@b#zCOM*SwC)$ zHqru2=W;&?4A)8HnWvJxtKb)h>2r0W$2V1STGG&ZoBehjAe&cLHef$wrGW#kR<=H#HcqB7K{Zh_Em; zZ(O=Ie7myRGD9OHMk)O z9eYLqd)-EMC3JV5ZIbC_Wc4Bdp<39z2ysO+E!LO2$#)kQ)A+BL_(x8oqoeot_gh+8 zE-#&PIiMOLi@ar_kVS%Rx+94$FQIE;FVURq)JR(y>xYhx^^SG)Wg(XNHKB3DtBVRh zNajWP*#uCUM#GmH8>md=hJEw~b0`23BX9~>f+b`usly4~s4px50c?7o9T`~9pfCmkJKllw(+_n&(= zG=_mzVFj?6HpAR1i|#<E$%D7KX|BV5 zsSu^;tg<85`yi?LQ*7yuY8`-tC~7QGmSW3|4Kwwh4%Ap|K^W6Si&^_J($c1?Jgq$U zhr_3vCwfl<`R!evXQ+|C|Md3u_H1YD>Y~y1QNZgKtH{mD>Tr5G^ud_nL`zw@HW~ZF z>9=J9tlBWZ_>NE=Tt)?0ex&l9XhfY^67hQ0G~||cPrh>1=isuw_a&nUR}Z6)0Cu~&G+~skwGRdyF~O24BmSSGbN&E=T6$x=ioW}5lKmh{A0b* zF4BwPsdvBgz}NG^&c_RhiMsQXiwLgub+z?1UDhLvWilg-mWH60R{jh2s-6XM(?3(p zGphn%46$FdcY46Mf)aAVC?3}#uI7<1xD<+v8*4i4_1AjmMIT=QXzjB>I=DqZ#Kpx6 zWYb=J>Qr)>;hq^Ef7S#P9Hy5qUuGJMh`jiLqGSj!uc6_7wms6(@u6g9abhBC_N5w0 zZb1Q%)V~_~hDO927ZdXh{W`oa!-vtaQyx(3L?&&K#FLW~KzMVrvqRprv6g?;r{1x+ zX375dR#DCQ=RcApKFQJXQ{(e5UAeh9bL7{?l~mW%H0OSqB!t2k!YD_T#!hh>yEJUK zJ&M-G2TJ6OO1TEkejH*Y)md4>61O%4sFy8Z=i$LMx;Q(7^F>5JsF4EMLmYNSYinu- zs4$?##dPv`FB)M_0ZV?hr$&s06=0<)@^QHmOFl{hE2gT~pwa7&E5>P|$4KQYoX;5H zAM-1-j&Ua6u|YvaS!=YsLTta@U1`6$8JsemVy`N(+=n?%UUbJQF19Qwwxla5o_kJv z7g9n%38Di7ewq}^1MRR*y1KgXwp&xd!NH;J@Hh$ewY81)IF&7>rJwi3-Q3(hHk+E7 zD$G{3G&kR!Lcse=?jc_QscUL1DSnyy^5qMTJv8BapUKwp1!}m{1uAy@%ujXDpWwk@ zsUo+V!1(|$een>O9uqTmJ!aA#P(d2GfgA?a7t>`b^pod`1+sq77gj{^;utU5SC+;M zL4_o^xV!d^^0Pn%(@Qy!?4d5(ANJUiG(g-AIBpI3ZGHlNL$_|Kj2&mswdb+#g!(3im zlvPyVe2a*P=ET>I|^`x)3F$@fCDsvZSd=BU#wY?R-~ZdS_?HP#vb6gx3+N1d)U!<6y4B zuyNf+^5@?oY>C){c4kRgh9|iqh&L2foe!VEJJUiZa84b)%*(JEvcRhy76RId+kFs+Mlb- z!l<4DnEzERovxtteDg&;;*6wx^RsKp6)u^nn)(!mf)SId)O_=tpZ_Pcjtv{9I9FCV zqkihfr)w%`EO790Wm*3ErpfqlF{0h{DH*5{tV-odX$^y*?QC7FH_WXG-7k9Bv|m9M zeuqeCS5sQoMiTKjZBBXNAO=Y~k{LI5U(nEz*EguB%1zbaJWs-QZ8blL)9Yb2{6kMeV*Q8S5d#l%YG*|XD?Ona#8Pe2`rk9_UB76DZ-ri4Y-&>&aeg0a>-efPR z`C;{XeK&n`&LV}ujKr1u@;q-H@vS*ugw7F^q;DJa6oghlPsjSky34RyX#VRXH3`w1 z7EHrhJ|KNj=y}#{c%vf)~tf0|lLKhjqkWZ2i8$da+{m_H0M9br2^ud*3kd>iuXXUY%oAX?y zZ*!K^O)y_g@PXL13!8b85v9rCMUtpTS|C9L| zA%L{oS?2SzAT9?}ZS@BD!PML8j}tb!O9S)EQw8koa^rtuTXDW0q1_c?qIMawPqe`> zJY9=fIPcA0zdU^eQYCsTMrO&Y&v9N;GUu~h0E%$`=#PHA_H_4jateNGtgb$Ld{`HH z+!X5Frej=jGAy4YrSIUkBJjeEzT6J#kMf-3Qd_+_SJL@95)0zC(T+W1(K4E6R`{+r%FnL4Vw}cGXZ3%9wstK3aG%a;QDkOLnS@# z0c?YfL1u~o+EsOX)qW~9!ld}rF=zE`O2E*TbGDsNmuru@?N=UawQ9V_tF2d(KIfA2 zT6uZRfNt~Bu^v|l@z`%Imz8$yH|5K=Tk2P|`|$9*$3|+mr^hIAvrsWtJs$V}QFGE@ zrS(=t4}@|1D`|N3apN#MIm7E~-;M=R%tLfw%l$9}v5>jkti_qRync-fn(U1pjhvuq zozvx=oG-Ak|NT<;ke}pjMzw5eETm?k#W~?lw-w?-i?QDnrI!PPjTCoSd^2ikqs13lH8{er0EvGj|{hjjJ?qkQAY@q8BIjot~~?n z%W!3S@ocXRg>2&IK_^IEHf6-pv~f+`=UVrn#HY;3QnOi2^M?5e(tcaEc5C{q?VGxH zwYqmR6_n3v)R%b*9P`+nzaA*W{CPfAAP403Ull_V8oZ1??*r#)8mV@kUVB0J6wP74 z`Az+T(BvL@pe9Q+?|040Mrx9y5YrA}hCE+aK1ZhcqUh=7(W% zgMb%YF+!h-wrI82G{~%WZkmh6CGTXX{VRM?hE-a!k7lDx=WoeOdr8vBb&cFpkfEs-jOSlGYUJ74FtRwz zcl|w7h4{X7{O|Wy9}vkSzSi9DZpziHHd?x9dB!+%k|J!6rCuylyZDGImQ3rV4(!gC zz|NJ{Da?Fc7Sg-8XpZ`sR#Ku{%^J7XD~+q7+Wu+N?iaGUr+jEQ=6h2F$Zpd0^1X<4 zoK7U5%drKc>HJ>MjHff7%J~o1Lia&WyQ8r>4Y+#3>5{%*OJ(iemixTmIDP6Aqc{jYn;)t(Gr zS=?Io_i<7fu2KOS$@^uy+AlPpKHqTroYi|j%=r)@JvIAW`S_GS+uO+b@V#!>7~|-G zdGe~K2Y4+PcB`XtNVwCggO-$~u(nmvLZ0XADF<$3RRqL9{(flYgV9b%+CWRR58RIO zjMI*%CwA^p&gha0)O@c^D-V}bO-ipf(}G2gQ#pWe^i_?ydG+)(*ZJj}Vv|Bu%eOU% zmaItgVJ5CKXg^vFLEmoE+hB_%4W~)V`b+R%l5u=sPlZ)}6$?o}TU7U6Uw?bejdL#d zIQVo^(thi6pVofn@-$lftml&))*2qYw!OX*1+p3OgpQ8G*!SxSZsJa^VsTv<$m>^` zPLIc`iAJEX9{gdIwRhxag2xAl0rZ8In)_eu)ae;yXZ45ac5h{lpdHe<@avf9y#s!8 z<^IirI}gCtEk#$2VZ`x=%*W4-9?bJsUE;1gIoD(Qg1#^+nJ07Q3iR9GlsDy;iVW#dM}>_@W^FXk zbke{ay=aH1txhb!P0w(TJ~0!IV@PrRqLyogtzSGIs6>&+6ibxhVWl-5WS-dAsUi$O zFr$o1|5^5{SoF~NsYF}AYqGSeSOrb^9g_uB!+xD+6NIHw_ej9m=-wEjOqVh?NH4!8 z9QAkhA0evE>rYN)G0-N~3`uf)|4VDz|@@~hakM0%`)@#VUM4wb&c=);;%&9*N*A=1=!g{5b^1#X@yjU zNlevnFFG&;36n~3#KtH>@VF^pT%fDA7Un@?>3kK1`MpWAi^tPW!8}Y_0~3irwS7qd zcDj4FHz2+^zGjbyikF@@GiaZ26IE)-tqEN9?5_JpmZ;^@gef&%JQ>|kxgIe*t>ch% z`W)CkjQtx&ZJvdXRVF}4ugWxC&`3bp4^~<02Rn%SraN0?D3V=7=&q;>{AQ@BYYm_$ z4~N1=&jk|B&NsyG%Meco?UT8_3k=!kjt=DdQEt>LA9yyJ=u%I?~x_ z3gPSc58q*?{K7rs^+<*oWa3MQSPFAb8@e}fC0U&KOYT!_ZDB`2Qr3Z4we`Lvz85M} z{wIc75-KzXg~@RtdHwmFCnxlP<=PiSMb3Vw@UhSW2JlNnI0+^AQFm2O@k7PQz2s9I zN8y(=;OM}$7AI;B{@=IZnx|m|uRrNy(!_t(R%SABbCP+;>Xw8wRu}I#Js_ePL$+qj zyuaj^whZmGWI$i>w1+0rl~_2{uQ?&e_^Dll^BlfP2%Wfww(8w*2`@=F=Mw4vm;9-P zZuV}=2pl+d{2J6==``ZQL&3=fXXeFtI$!gr6j<^t-nQ+>ZA)zQdNo`6+hn%(9X zKW4q@v3Gn?_Xix@<%JcL7}&~-a7Gy1#evujmKZB*;)<|o6^~8rHY&-s@(0n&Ug#dd zhjJ}7t$jxseY?_EQGaZ)z^qck#f`P1`*#T6SwulIp-6*QDZx^-bj*@6&NhPT zZLfgnRM+Dn{6Z55MoY<|yGitn0*Zob*UP@+*Pe0lsyZl55$JT4KN8%Dz!NYd@*P3L zW5*)WmWY3eE>K6K@&Z)pB8-3`@;j^sonp|$=ZDsJVOaO0D|d|6?}D9~?`Kmk@tlk) z*3817#R$GVNML~rDunj0tUW#B7+8|t7;mww6&NHNoAMvee>$jr@m;>VB3&eU1t(^j0vqw>9+^x}jY5zqiVN}Eq0RBIbzhB?T0nB@6*3<;@(M4;D zJjXzZ9bHMkt+eIKOgC%gAJJ~|FC_TyA`W<%cBKYs7rAiptcU1}Vb*6aWjQ3Of1UKZ z!HfGgy>7{t1uXkWxWezIeH zik_3K<3&lOyY4gU@tH2NN^Ac0AteP>Z!dNBuLeP0Dm0|&nSN>tKS=9?|NJ2dVMIs- ze09*#nWFM=-%NX3C0>c&{-V3Jz>q;0!WU%s4Yyk=%I9 zw8O%NT>kc7xNe|XL?l0{fkjIHetZ!&r+{B}o#lMI%?|cwe?rc$HgeEY{i;IfY7ztC z@eOI>vkX2H;xLdK%J{Pf>whJEfKxFim%w>VKP8H%C;}Urv^C9<`Z;wnV)RCdV26ym z9i5X0sE2;HM_*oC)E)6_NLU{tDnB))oE`Q`T7b$IA9tr9w}#O6y)&I9Tg~98@DfJL z9#5(t89{#dAoCotDS~2G4B8IzUDu7m@rzY4LVOkTSHXkVh3lwYR$uMMaTy_T27`gE zdNrkoT7-hn`LcoK zbt%F6VXx&ksv>ko7>|m*;{hDK!jKOSL1+3WC^t!(Zrpy_ARP zW-`QEVbYKDvy`dxzGM0+q%NZTj;3~(UO7hoe{e6_a-G~|<$gATFy)Zh_dd1gbry*0*L5EB zXDl~oFo!|%H_|#Rb>@rtoHE3EU!5prP3Ae5+{lecawQ}QL!-$7FNHoQ662QN#i;qk zcf*BlOkjPE57oUNG{Ujj6H2he79{$j#D?mxSw0|nB5N46)1cVfO@}}}_D4(po{y%N z4rfC{m4N+-@H6*|T6wEfdD^QX5nXZmvaId$zBs>*>b3xB7{+PSW9}Z z-()Gj>#|}&X!Q7KmNYb1{|cV9Ew z`0P;vbf7TlFqJ>Ns7j8k_*NIh5f!qU@#8^3X#l zyln!%PFT+405R%^3d$6H!mxZ4#szOq2Y=Ot&z8fOt&Z^r91+qZB!zv8B5A0s+4RRs z9vFY&>inZ&`!if4k+vVDZ;Kk4#JT}*9Xv?O>4Z8{djU+!e)Cx^0G<9VaH#i>W_EUT zwrs!8cj~h*SeXp39lee9{;T{z>BBSH44A?Hrxvr}&GfmIxwWc}cymK>(HtjeGr~G8 zUC?9J)(K0=N$(Tqh*x#B1GHnGgZrwct<1;Bstb4@$@J|OC_(ec5GdKOPV>rVLvtJG zgG|(2x~s3Qu6jd0b@=%Qy&)E~-#wYwxn0j9M?@nQNxZy7yFzEq23~+du8Qe$Ek=9% zCv>pF$|Xp(VDINb(lCDMtL3GVab#`6(Lvv+<+Nm4q838kh51c1X7XQ83L+pK1)I9p zN3G}{e8nF{u*Az0i48!mv)pDbGM~qW`B~$?4tT+F(SL0VZ)JK;SRJj@lLQF5-)~i7 z7DQ$!37*M3u?3izd7hjoIEuMkeJDxzb#L*J3E58cu4BSC7dU=l4ZN!*R2iwLmzD%f;A)S*U0H!E z)95K8dDy z;TU?^6f6-jO)rNq^iX}d?-=J-e^=x3Cgb%dDO$6aUEN>k9JP&%3V}R7c@UMd-ti|j zeZ5cI#5kF3pmtcV&FX^>Hen=$s=TZqf1UrUyEBi6@_qNXC0mM$>}w)4wouuJ>}!;L zUz6pl#%}DAHCq})g^}!AMp*_ChOvx&9fUz;iL#4xOTXXw_nh<3d7b00Xa1OZJ@@_G z&vjq-^?6?(7`*T6H+{4E5yWB;vs{snug!4Lg?3}0`0Qf7@2Jg8@l$~#y?XN2zL`nm zpk!nKz8}538WejY54;pLz4Gi|v>n+R*Ph@eJHTMCy$P;)uzo~Jk;r!2>;BZxl!bvA zA0e4c!=Kw#frsGFDI1=!yvE@?JWx6HCF=}XSf_k3vS5NFoTM12>9lj$P>n}4ox)W< zN#!%r2a^`{<&wLi~O=OpJ z=KIivYH=YwXiInI0xmivzQ{PxkHWpB#^{}B$rpoYajH%(%w@jG+ccVhoX}GA^`civ zCcG9kZF~jZg5yIpt^BcFhp~*0z?&U35#mF2&FWZf2Ov}mrb1?ae7d7X?BR|TX&eh% zTMIK1${Fns^$%sI)s}uFpc{8bXxb||{*lHC-4Hn<1K82s8R+3K0n_BXzbA_2?MSkw6!ivfMGD z!vt2(7i`b&%pspA&^tQ)=iN5_?41cb?0oPhcw6PMhN-Q7XW`%j{a#Er3tQFNWXNnw zq}GoIZ$fH)IjeriQ4)W_^wM(5o!Erb!?O*wMEQ2cPGJXbcgyCV5@RtIY|Mfa(STb? zDedi%W3Q3|G`jCW8@-`bFMsN0VhPPySurdb@{ufeO5Vd_wOO&j6ypgfM?(YQBqz!|t3 zN2{QrtKq(0(F`(z&|4|6`+_06{qHz~e|4_O9f12KULS`Oy;$B|%v5-MvOwCO5TG8; z25rJK&cr5eMnX1#K%y*}P_?9z+R`0OZIy~S$Kfv;YCJiRm}OFV*oDjrF1Bx$eo9RE zBI)(H%Z3c0#VAzMPpysrO6R@k#KJQA;r!Gyf%eqHHK(r8Z_#$*g6IIu8l>#&ncd-? zjdX2IMI=Q2Ne|O1uyUHn=AE!NI@_mJ71)W)e8ZpuWZQoaN#XE|b;H3eh2!zQnJB$1 zSxXCp3BYe4w4RNuqmSc2fnt3cPINbo#q013t+h88%tKQeV!vx;ydVtK$XGyEke^|p zo*gY|%b-t-=j=q-tFctg)G(9mUq1IQy3kl9tbgOw=yDyKXY`ykU{l==NkU)6qAcqU z)bb3@5b<18lgkz5BWf&qfP-2*5hi=k$<~Y4Y%RGfBChuAxHXHo_|8~-fVQ3v)BBbw z(Z=}qSFwzocqPx+8z>A+FC8+|YsH9d+S%MWTF^UM5wZH+Z~c3BYxH=(=R@%3AZ_qQ z|D-~YuT<0C$RtQ6m%|fg;Cl-76ce{K3}~3@KQKzjiBlgvyiSbKU&<>|BrPFN!gnpE z40xMD9?{p2IISkxiAop2kFHdw@q}B$Skq}>#*muOit!eV5k znrtAwf$>bXVCGBnE6CjBDlI8tdBwj!@U-$U!a9(ig&{dLtLADi@g}lEcMb15yVVqY z&*dbGkUS{Z zvLkf8#y=brS?MDl4-AUO#cB==h^M67%X7*+d2Z882k5He!^azG zByM6ZM~6+ncl6|c&y8)|`>|xb0wn~P$V*9?T3TA(zdtlOy7TL+CT+=A2?>e&W@ggh zPZIU%7W$2>|G>b&4LP}0U}5F*y_y$7(Y8*Zz{L56sb-wCoXp#MCwo9r%+&H8EAwSi zzeFj^A^=ZL;s>bi_LqP9_aI=3yqAz>r*JkoTkI#QJ>Z65AeRDt%`=4 z8XutdZES1+lL+H-D>UHOR#r-6YI57#+l8$f#zsbr^z|QqA1SS^HI(CR)YQ?|K0{8P z5Fa?-H_RV9amigC`!4@MuDu;Ng5Q1pIzvZ8CxW1HYc|QLsIGMp7}E)J^a6Mt}E*ro)4o-A1;f&dK#BYRZ;P{s$-P#Ii2%vg()JPVr#I z-=Ii$-W^MZ2S za!z;Q&%W%ihdthEI;uqAh=FiHP&n8-;0Ik~em_g!gcH;fUf=Dp@%n7g42EH7 zVG+2qX1ViJHTyOUFjhr498Sh}Ep*M%(J_ja6HxTs7!1*oqFoyd%Hocr?nIZDiSVqGO`LVjKyHqA1~Mfzf;AywEw_J!XER*N?t%k}QVgQ?fI8wRY@; zr(VW>kvpJalMB}D60OVTsjH_jLpAH#mKp)tj*F8m>o_DLe6Cq&(@DkAVQgo8hQd)_ zfHJLRcXyY7P2-&$Nr8)D-;%>?VT9P~j&!CRB+`C^k{`VEs0jx|qI5gZ(QxwhG!Y$} zXR;CqVwI0!>+Gv1Z-r-Xh(N;2#-p%}4XRYR9@xj6x6~ts@}noQq|W4M#9UzyXyZG{ zwyuxM0=KjNCbLJ_ki8>wk46H>?TQKuiEo4%>}-caamB{v;rUhms}rc$*t2aml%4x_ z2v>ONQvyFvzZ&5g86FJ>xw`j%-daSLO|9(9GJuMDeXVMG`(6vXS++Jk_@LMFqhDd` zfRvQvz5DlJy-Tt$_x3I0<6{vQZ-x=Tq zWpCXAh+>WJx|J6N<}JE9kKctF^~!V&eG-*Mv74m>D=QF#N1eSY{E3N)O*re9IhFCD zCDL46MCAqoA9~WBV+jLCm!~`@!P@A&f|awa3Y3{NH*MtB)X|aiT@9y6Rs{iX0b{KxG^GLlYl#U7E476p2;-%oUSU3)Su&-eGR4)en- zF0Zh=d|wd_svQ<}0TXn8C#z!bfIYjd!^ z8A46Ld`;?XEeUaTrRbl_m2{vMSQl_xPW%9nAg~FpNrMyDm_A*S#jj-fsTnr&vt4T9ZUg(yRb_CM|}Dctrf4pfyNEALL#Z^PcMF3{bwbj-KsRg>>t?kZcl?h_V@NU7ekct)J*ekAZ#;%G0J&{x0GIygFucsD>(X?KUo^ z^Kj)W2|>02>3RDMM4qbl_oqXCP)1~*zYwS7=_>QhR^nsOl9i@edor>k*+uK^<{Z5R zjcLl(3tHt$wt6TjnTHg2t$$=yOoolTb9`-1sDF{T#l2B3is&RjaQLo~x#}HtwNG7o zo?tKIqcpL_Lr$}(@9Hl4?PdMIQ>|5fM^TYXy_ptKg=5UDQacwZM}kgKozJdN zZiXrP@>oiV%P>Cg$Z~vN{EkzLVee89fz zVG*`0nt}mKU-@a#4bdcWzvuPKvH9V`dFcbH%sqh23zdt1YJA`2BIS1@S{J&&mf1Rw z64sYyIAitlZ5n&+crfSM!Cef7)v=)L*}vyzB?Ir$^T_q4jHpAC@>UXF>UQ z?Z9t^MvDSM$wob69okqlAIGAt5?g{XGqTFaw2toIq>cm9QAMLbc|l9HJ`ZI5D=Vh6 zCk>xtVPTL!!jhVbP*dq>F)5jS(#mf`7h%IM>F=f8hY6s+#KKM&wRZb0rniz&!qwSL zQADD7SA7a_*uxXfo&9wI`xV)WGoKgeyE$w9d~`W-O4m zAHgZ-Ly~4`0i{bZND_`PiOt7g^bX;%?;2> z3#)RK%$823ig`@eMP%?tMXD85n_yw9)h|R2tY1u$N4qH2kC6m(3p1PrG)b}KXF*!! z57ZeA6>QHxYgf~?%Idw62SyD~3*Htpw%UF2lAJZO3Qm@$EtcS;@{0)Jw=dEVD13!S zGkqSAJT9|kdH6L0di!h(jEOAcTGw(Mi61ReE*qF0A$;=Mmic>y{@i~tNXgLgqT2WbqR_7u;Yev=&hGqA|;3mCj#Rmv#acC%sj}@(Uv)b1_7pL zr`kw2e5EVGNTz^vnjeElAKOSFNbN(P2WHan2+6>EADoADY@yA5?yQN9(ACwG3{cOf zr4qZ$I733JpDuSnqLNc1%F|g5Lgta5A6B&IhFBYuvunm>X zD!&wj@?|u#Z)T0%zj$4K5jek2bh!!T2%3CeoR;Dd6>Q5&>Y{u` z5^Zf}9WWthTX$E|LAEkTGMJCd;J_priRyhd%njH1s)?Dn{e_dp2sG zJd6oa;wCD#K46hE0P0JRgTBSu{kn{Beecc$p(q_rxDT)VN22>eZGFv&OJ(X;a1`qx z$o!b_evuYIe0|DZL{RwNSI7j<_n`g;Hb*UEkpM@hrL(3RFRkxd%#1;V=I7{ITX@)e zsp4txU%kqAU`=(Gc80sY%>b$%AqE(ACK+kiuie+^1C)d%Axr{Q&7E0Z>Y>cKLV0I( z3T1ARaCjL)(fZ_<^Id(z>(=*?Ydqx9%M}g&RVRh zqtXigsh&Pkbod4fA>%gLU^Q}V7#WhZc`ACklkh^K2p$7QdqK5_0*q#5s|T?0l?pFX z575rnB1}BdaZx|~`ooxguqR&y09+=N`fS0cbB-yq!u(f+j9X!|ob29u=+aH7=mUsttNg@To%Q3d+ zcp+-c*GbPsHkuS-tdk4b3%7sF^^58?2qf!^jeS<5qz)&TyiU$|m6V>Enx*uwbgNIY zZ1iJ-mg<%TP`t{Cb*1guxab5vmT@dJ?~;gCYU>@m7h;_=*a$15K`}W^S z9CN&vh2!C$*8ntNX7>EQx_Z83GCis=G&UsokNZ04NB2J8&``AplIb(Q&m<4DOufxRm;CA zVb^AN2^-3E6h}|T>cPrkQ+&^sH%61ibza5|OWC zFLjrN`SRf4Eg}Y|rG?0+kvy(_J=c@q>xPovwR@3-%Z6W>O`+>m?we=N#%U$b*_+~q z2cx!aza%DKM?&DlUO%bh`Y);yXSVvNDcRjl5Jt_T(BJL^VR_N(ad-fXHq{LEY5hFBI+QHVB;_?u|KswHdH2`hYSR>gJG&*wI0cuCMydj9Z(=JO zP(3NnGez3Dz!MO^@gBZU?$zTga^qhi%Hx9<*2z6+-cGkXzX#Zo=g>V*NxsALUQO;M zST*`keqKpS28xsWA()ltpGW^bJyf~hz}ha1g9*Q&snw@kRsXMHtZ`P@v0q@|;NIzD zWiemK_*k+sg{yd!H$=1aImI0V`}uc9*s#W;v(j$9%N&fO{*vwp@hW#q>(t~mS67A) zIXZTyS*VtY?x4Bze_!qVFMOlZ6Y^oALmD16A${N+V16pSZeGAfxg|6z*1OsTI4x4? zcw9f7>OW^xE=64ry?=i;fAD6FM00TR^Z!!B!HVl0h19c?#d5xSz7GEJ2a$$~u5y`@ HP56HRWCP<} literal 0 HcmV?d00001 diff --git a/windows/security/threat-protection/windows-defender-antivirus/images/MDATP_28_AppInstall.png b/windows/security/threat-protection/windows-defender-antivirus/images/MDATP_28_AppInstall.png new file mode 100644 index 0000000000000000000000000000000000000000..84c4fc4f59b73e5c8c2719155a4b742daecd8ded GIT binary patch literal 181465 zcmXtfbyU-D*f-tX&8ShM#t1=?W-vfPIwVGnl2i~-7@fj4MkC$bAR^r$3~5wAP+CPm z1o8LI=Xsy|oSmKT&i=aZ`?{`AeUnU#^=PTMs0auMX!W7mW&{KzsRRT>rW8c@U#hiV z%j3TYgUs|a2^!~k4)6~o9vVg(1OzQFssA{W;-4w~p*BGT1a!myK7`|stKkF$|5fN~ zYdj2fJia9_;9Uu+O4<4FgXGhvna%J|segRJj$0acGvO~qrm%2QgHmBh@K<4jhvi}h zEb`)C3dFzgj2I$4cj*YYN`mIL&-Ekc4rqdvm|~zv!0-N!<;KIqMMBzAjp%{Du5I1k zOU4~_UMttntd?xPUmrESy*{k7>-0JJ_U!=>U07J?>+35eC1qq}l$Mr8TPuq^6s_}f zUwRf67N+yi+UQ4AqDH9jxix1dYSU?WF!E3EJ%J*yWX;jhQ5NXbQk_+kX%-f1){i(@ z@4%p|XdVBppH+dTYh^Fhp8xtluXeo}B-7V?Ucqj~#P;T4x2LHo2NhNFa5H?e7Kubv zz^r5(dc7u5s8N^|GZnVcvDIf5=jLrKy_gs$;xpRX7d$%EF>O`v(BpDKMR{b|*xp=Z zVhvq2vF|G>FZWrhO~!R7?710*ggEe?tc6C1VR=sV)5}pp2j@UdiH=OS$KS*RX2J4# zLq(jhi*yk)AGbvgtgv`ErR(Imr;2>hA@7np{B9QKgJ029t0;iJ-&Vxona z=e?Lvuy20(A6XN|QQgl!cE^M}>PEc`tH#l9n9MNhKgF7#LKanvrc>R5@(~1-)ehbQ zP^n4K1x~g_I0-(kj}WMWDY~_O&h3|q^}$}gy!fK%I(gxHuo%_y_ObUP{-mzmz*VJR zzh3_O)rN_B^9YoG)B2g|TY``xJ)NK19ognMhQ@U;O|Jwc5^hIEKHRJ@!<42c)yd^f zujMGM;K$2B;a%WKkdMSLE0D#dk~6l=6Mv2=w{m5GG6T`>-i>k|xlmn7rt9m~!zt1I zT6h&zjV)6~c6vzGI!an(51IYwdDvp5QId9PZ7tPTGCpp8{ukyKy4vo!5?yQ4)6?E` zF7u(c7c2i=jo**2YwA0jT5hoGGGf%#c7f^dcC0wIE%_sGC(L%& zpdVMV8CXL?O>Smwr_T4fP*5W*id>i&%M@jv+^nx$^|ZiZu+vdU8mj?_w3MZ^WsW%f zFautt%A(An1d1PsENTN+XEdR1+Y-@G0t5!A;Dud?l@(6oVeQ8OLUVb^hdp(54^Boiiera$ zP5mlQuLUczv$I!tMvGfq$J4t$K1&f9Y7P22*X4l~k&o+nBA(pw?+@84Hz4kWU)C6T zg`Bh0MKb-%@%#OqVL#nXq*hkmw)$VhUtCB@O%@eJhq`dwb5=<8AGL&HS^1ALoV>L*{%~+yabiwf#i*}^5@j6;p-}#i#Wq`o0#3V) zqgT18#f`&9p?)3N(AutU|4WBJzb*r%P`2kH4q;`$aEio+Ft&8-47r3n72dC%k*2e5 zIoABo`o(=WTdDW`Jr6t%tK&w_JB?~=TELH##N2FO+T>EBCd==|oUeN~<q*?Dp3mn#wJFgye+)XMuX zZ^1S64U0r+a-?LG`-x^|Trx3OC!GT(#YKuZk~s3qg^%@nLxQ1XFQctNgYuGSfDc*H z!EiFtD^FJzR1Dr@wkecliXPD{Gs>GZoD3Bl4!1*gU07*9E|)*&4>eYud8ma5P+$!$urr$`WvF<_^zx zaIAwV>0biUKvJb~@xoZgEPch4n4r8uI>xAnpTCeUEiD}_ zHxR#5j`<)i)%N~h59fC}_zeCXxY74-(GlFKy6jjv7f4r9@~IXRcl@+jkT^=l^h4k~ zh>u@T-J1xJyo|4*! zZ~{SVbT}LI4eV%7Tpk{_t-NcV=*#WQ#8rTb}VE!JANEiLhW_;8z4G{`q9k1WnJuD=jY2xk%k*xVHt z$mGdvil4}LxHFM2M+I`vWFaD#W`Ho*pIiFf%Buf-YToGJ6%r;%7J))3eRQ*3MF3Bcz2Ect%q zwb5mfBJY_E!cJGNqXY3fcqvayN7vce3GU7X&4CMz<+ZQG74YTSL~OFjH8p*>+~~c3 zI5ied=GqcnRHWhDHezC!+n@(rwEp0!Q50(E2Z=DKbh9|1b_(LZlr09s1;yMZBeE+! zEHowVVKZLp_AYfx$ABwS1jim@1gPA%+`@h&{<#`M`RbmFA8dU6e`%TQjE@5)j(-j! z%(rq3bA!XnySkLvQbK}*gF`|p%xX$XO7LU4mnDc9qM)dVoprD2GS7kv2NtmBE459E z? zTlTxq)Ty@g$u!Ds$akNz$n;kk@4sDe`;j^uI=Z3(KixruinoSu?{-XB-d^HIA_0x7 zU%e7>k}sY9jHii{p`{yhfqOmqs7d9p!U zH<2hN3ZfF4&_nhpGswLC10JCevAvTRC`PiKupN6Mt%8T=Cl3x!PJ9svXZ5Hl!x7aB zJ%9~(UG|ymlNJc$_yj6iw=F$}wR+_T&N-~<< z1r{2jyB2&ZVFI(2bC_9@cd~wmMw7=j8S0Lj=&!78t|Xr!8Vc;De6CqWDx{)g1%Gz) zM1(kU?%XvW6B2Y{ipb2)14hg zXbk731dDT>FmLeVYy*?*{IiT#9l%^OghGSayM64i(|4nfeP=JkDcQNCzrWvtG$(g` zV?zLfod976iej~CX=%eg3%E{TrR>CNOG`Chly?+R)TQ3VkAoMV)0FIc-<18UQas(l zGc)Z1#5?UfsV#U0m6{R$`p3T+a#Q5kRO9Q|@1hk1YkecXfyiJx62(dVL})QWh3Lv@ zweZK5^j`NnNF~jkrc$he|Mvij52pTz!~85QqrBB#IT{$`sd5Kccj=W|ydunm#v!fd zG^sg&0_{gid?GTjm7fCND;2_tX8E4d$R#m=bBxRMM=WPg74MX-+kEM~*n?wfpcK`U zI>F*2ZZKNsk!~FW^RkERfgdoMa5Q7F?W&jVq=*yn#58^Zaqoixk6)(K0CNWYAk#!` zd=e&a+EN5HP1t^B6frAZry*dL7hHT^Za6g282x(V<;H?$}NldF$EVE{FcpOYM5%Touu&hjz2r= zU~C&^7#IP(E9~S`8CZ=BjE|3h^6R%gek$B*(GW4P6B}D;^YZe}&dvhZ@&WuNY0;Wh zYrWA*I~+;cmjt)0Bw>rxPTRfkwkYm&Nk4bxTciCcLsjtCY zDYrmB!6>S>vGH^-`_Yq1PA|D0T64uab?Z0R*H~$Xsi@yy@*f+2INaOY>v#kM_^zE@ z7&TBK9PWhgw{RPyf44`U@Dwj zhDt%Z0j^XM$v|V=t@_HdC3*fBLJnS{;X8K+#hEF4 zEOuJ|XYe9PHAB04iOj10edUAapHczXq^CG2@QsGRbq9T$wXWnyYiymgliViNL`ICD zE_J+@Zqyn!9S$vD_M5ES4w96z~Evr6B~j zlHYm8m%R{zP5vEV$DmNcck1VknQlHQ_A3(vQL@Zy#CN+YeuZ-ymPBBwD&6Y5DC z+>_(gK|VQmYLxCGUw*Ni)!;8bb$_mM4g)ZQ_YO8M{r*cEx>j&<*-kV;RYtqas zlb6pAT2!x|K$#?h=vAol<1%!$Kc7zDfL*a{w!}+5%aWRIXy71)?js`CYkgfCTiLR} zyx}&0^jkP@c^4qalaWbC238nPWg>bd=;GPlP1dGb54Hxs{;{F{UuXZO zOAUksV|+V|*s4^dw7m$2F(dXQWq)?;2N1#i)`7b3nE+z5(u~y0#0yvNEs!%Lx)ie_ zPIm^MyR_Sq;5KVi3kmp6f0+sn-B4z4&#*R<85>@af4;jdwiVRg)rF25Aq&Uo3OL`f zBn{|e;2~}8oBrF3dfT6xYms=>*r$J3Kt3K9QB=k9}IK{l0<~KiHq;;K&3G1rXw}!CGWhV6^Cs-?>{kc z#gKipwX@@7qTS`lXfY=`DAC)>u%G7=AqZ^WZs_`0>fFrP6WGI}O7THKL1Fg1OYtAE zxK+=xNCTsnQJ&u4e0|?_hQLYQ^#+3WehLJH?X-x>@xb=K*^9|Jz94fM z&_9$ww7RX4Sry4oj`4u$SxG%A8JqbT+JOB_TcOQWblTsNt@&gGnX$`{UO;w?T0@BB`y zUI*t%Qdb?k$5v*FjHUilX8JNpRXWDrZc#IdLFSFgV!&<*X{lzCLmW;hntlWx8 zhu1eZ9unhtdGS8hnIm;%o}_&3HJsv!3wpME(8oR6Q4{ORlTV2&uJOMsKr6&5qOO{1 zRZ&qvz)ehd+0r6s;xUO5p?PL4_NpZ@74zV_0+wyYUI!uOAYO8O{(CPunW~n9gTsl! zEm4RX(_!;zP5~-(Z#JrVJKQZ*}qIcF(8VsAIs4#A~5x$|ao22)>zD?4D z{@xJca^CepgfeA`h~6$<>g&sOkFETPID?nnUChDqOQOkn1>|BNg(|~Yj2IWWl{{Ho~RAZ>{eS&d0 zSpnQs+m%J%j!NGr&z?p$fdnA=D@&#K4>dlUT`OjWPx{zEoZ( zMA3OL@4*Vn6tSeMU=8^J#RgkRh2lW#3XQ3D28X449p_8}tEbb;Nld~O%hJy58DnpF zzKu{!iHX%_B>Jn)8$NydQ$TEdE7^WG4I4k2EJ$dKJC;XaVqTOj^_Ci17As^?>}?76 z_~79$IqD41P+L3oQQh0uSAjY}tPam#`}#IPph3Rlg#Zv0V%v~Q&?qQKex4L8H^;)l zVnURtgH-wy5fmD_3ZikF2Xqj_OqgRDW-X(w2}@5+QI6L#7G`T`zlvO9@JzlyXQ_5}nLIb3;H(FfDd!UpkLIe$Ji^okf@}bdv6Yzn4 z+0EB~aNtF4ZEwI294>y0FS`9nm}mpF=Fw@JOyW61?0o!Al0fdgMTUgM-Jb&7C(M6T zLV#^vXRLbP4L_=*dt|VeHM%j9l$X7EbE#_(uHDL_Hz@T)51ZTv^6o-1?dm*aZLjo% z=v?7$f>5=FZN6X(IlBhHSwfwn>QNH(?sKFOa?MNKpw%lW#v;l3F3QKurAr?<%@hYo zAy1N$IdDKap;JhLo^@jQWGUnJ9TK%f$^2fXM9(!Ca<1 zYWTMe!APs8uZJb8lP|jU@ulx7ddFFlmk3C~})a*i@c*jTzc&1YK zO6*stN@wm{ii}ZG|7gA!OR7wAI#XyYBqX$Xg`R|88FR6~Ta}*(Zf>oqP?rbXjQa}a zwq~hgSedAVL^7g!@%-sapfO`V9Y7DehLsOHCZAwY;(oprpKDl?MH=cuSt)1;n z3uvv66&r9lrJnB!%Dl#l_~V*s5X#hYEDFWcOQbsaPsF>lB1DkF4347PJ3lTfMsBu9 zt{@&)QkKx-WhXp(yD|}!(**c^3Z(%qlHg(&kG1|BEWo`$YjtmZmc5H^-FL2jkz|0- zA2;*)vN0-XMMA`&84eC94f3R$#Ei7sIJbd{BL8E zh)FSMzXBbr3tS)|T@cmPE@9LyZO=%=bO;l&_Smn#xh<~0tTMDRVEc9Ysxn))#;|aA zq?Ftgs*h~$GE6(P92LEn_~wo4n&UkT8@-dv@EyP`H~N{w&w4=vtOMO!RVK3hWue>< ziXT3@z=ys^J{j=|(ZtRsB)>VTIOzm-C|06ht4Y&6pES&f|NeL){k{hFAO6>>m(s$ZwTAa8tx-jp$+luW&CMCx znC+DAfcN|RVwCDNYXW%2E9~khg)x+(d4|z?(rUu8hG440a}B`W)s?d6_?(L{yOv;L zckqE3nSKo9818KEHUN^Ajz6a%dh_oRz$`2jK(>9AjRMO!te^Lh@3)C3!F%fpBQCf1 z{>fhI58g3UV^is?cC+hG5*jWR#?Pz6H%&zsac8z%?TSSi2dzIa{&_RCZqJm4-9d{s zJ3|O@v%_!Y+efP7A1I8lpU=iH$b`Flp7aOXt;DX1A&Sj+FIP& zzsv#b8GibtE?Va$3i+M*hzvE{JKQv6rK9R6D#|EfNyf%3bo#yeeRBi6X_L!pZSPwM zOf;d;+3xP9`Jd)bgLC30lwqxtDgqN>xTDmJiss>ju z1PmSmkg0Zbb;;mO?~B8w+uPg6Z!XvX+6Y+=e;uM#AG`})?;?6Lmc}h9DY-3(lkFbV zX@~#V8O5{y)LckbX0kgbD=RKzET@1Rp)I!NMaV9Gr+$<#M_9G4+&MH>9>G@-Ul?iA z=1!XrP+^c}OBuxaoE#ky<9c7eUZeVJs&-Ot2ATde@vlFq%|CNc;}OiT{KVnyXVlSN zWw#-JQkZ*5NBQA8cf4rCsZUSsJIBju=9fQ4prDQxy|=tBO%)oRNthT2?RA+4XF*8B zbwHZ+mJ4SR0`2sa@s9Q&OWuFQ53RvEJqTJbli^I;~%hGsA01YdLB#pnndDR>nAUSA2eS%KYu6N8GHz!!6yk}G|)4<61dT+_1ZZy!w z6#OXG;VY$^QU!Tx+^X9!Dk_hMms8p1E6EnzL3pBk(FO&Ga-^01=pk=vU_w#`uEln{ zl=x6hjZEMiWtpdNwiK&1iDfQarE<`kYAhH^hNU<0F4#!Tqgl1HI+{;GX-+y7KJ)06;$ zGv^3d&9*gpj(WUtZLAe#9vOKLGX!LsAwjT^mPx zIJ?#R1zEMp4`roWvW`>3@$v;VyL36#PB9~c4x)WTf(Un92$4(!sRKwT^jZum-s|Y@ zyw_}PX48_Xi*o=_`)ZXZj0`AV(eAoNRopu!N)x3n*E>ngRef^o#Ev(ICK91qT_#)h zx=#Nn1$}8$d-BwEHkIX)(ny{yYSy=AxzkY3W0~*i@$pnh@SY3OL(^0LHnaT{?+xiF z+}t|~4IBYTg`P4#aQOIuS$6s`f%BpRa`8UMe1A%sLv_; zw+L9{i#n$mpOJUtl;cm%WbbMk1hVK zri^=_1Pd{0kI{%s2dcO5hyvcDVFk+R5@!hgLt@f0WMcVVlO18-1P@IhC*GMS-fs8Pj+3Hk7Kt~nnfR%@)>e*a1^g%v1~XKTWgAZ zj?C4Oj8SDokT=1$$@ioGFb|gCEfzTW)%8dHiSmbLf!#^Uv{Aw}aoB_oS?xs$-{L># z6aiCk4q<8-)wr>=LD`eb4}7Wcz6#D|pC=htJbM5Co;bd^eYvN;Ub?e>?FTS=6*@D) z{POxY!#3o12jura+1(#v{5$;ESMBlhs51w>U%wfCkCmzHU&EG@y{=6P{PS)M6MeHd z6bc`zXp6%r`4+&ov(u6e`V*P5Vju##P){h)BP=YpZ|G?KQ9sJN1(Q?EBxeaFN zOs{pJ4+Jj1aMY!@A`^w=XqnkIxH?i6kPKXFAreiG>mT)K)|z08e~eT_w74=F%U?Dd zWM%rGBM9HhNOEpNGUlSsk?#7rwTIMm@0Jdn(6|}HoJ*wzELXvU{W{bJ;0R|lT zmk8lt_AOFk@(_bNy)4O=NWt7<%yV(=R&NB6`yiZ)E!419R&nu_WAh_72GyQmOW7Gd z>9h{yo0L=F5C1y5_%XnbeImb)r@J4rI(^oVzXsm$lOtcNJq_NZyHRa~$&qJrydY{K z{Y4>4xozgN-i~1!OPx zL_EE`@~9B|vy()RE9stbthKw2)4{gtC74`k+IAZRae8gdNfxk-uB0o&j#Xe={$~6H z5M%Ya!Pu_&Uku|pP**Ki-|it%xdKFVtNoHLQp!kKO6bw{%Zs+y#ooQ3KQZ7s_eIai zOpH-kh0^Fn6>cVy{plytAL{|jHmzQ;J;HsWSK%oP$Ux*w{$%!M+!K~inm0t!U~8s` zR?fDD+sKXJei$;~VU&eChQir@Ugy2^D>%dqyiXOwxg=eI7(x1?D&%tdSwy?V_QmMs z(l1CK-N<4Igx^cQ7x*-pVQ~vBYl97l5ze3!Z-8naPy%TJX?-Zs_lIU=>Z8EH@?vg6 zKBOAFo6?YJxwWDgWB9PwMkcAdMs`~IN*D@acEcD7Jn1`zPHLs<`kjT=8ip;%8a%1U zG=p`n?*&+z7`=L$rRYyY5@54bT2A6DPsx?Z71Efx?pDJqW)yfMDf$vl5c{XGiQ7O9dZlZ5{1ME zJ2N&RxeQj_G_o_MxjG<{pAH-%Yq1XfKLxDgOt+m=BH~SVl9_MMt}3D{=GZ68@{cn? zH(L)hWVFD)1AJrTv^qAi_5HEBt@Y)>uVrk`kK%-f6Lr$KqU|u1?N)mM+6VfCB`xJ@ zHp!;19iCT7*Ss|neQV>9u}ST%pAch+0pQ z<<0=H2A))iH6O)4b+!LONx?ZNI`>h*gjy@O-$Gf>FO+y<}P1WJf&ZZ$odgkVR zJtAxGv3|ZszTWSGpG-AX^bpjJlJ9veGHIO+FB6s@#H3$_FV7>dkKW{eKejov^C-(L z2>r8jbo8L0=2sKjZ?DAp#5b6%X+J{uz@CO4(DcOkxd!NpYKjZfqaY+lD*sv9hO{w0 z9?t2*D$C7<8t0YD{lUk$QOhPIm$Gk}FSz(PnxcW$r@|sRLOt(pF!?km>cZ`$j_)() zpwu>13GfMd`qU)dI=LwgPFRGbl);6kG%T(gl>0^$STATV8r{uO8l9NGUb+b3=!`a_ z)Bq?^x`TwdzVf{|QY|el zKHNXfAiCzmG5rf5If%dBc#R9KZfkS$liJF1rCmv~yrUh62a3GBXU2IEY9neRGHvWumSp9IYVTKXl_PBzi@^sHt~$j#K*HpryW+!_s2oV>V1%R%ZS3Yk_EQoCv6y0EV0XnR*_B?JbaVh$N85HHXJP)fF?H z>4pfQ49)~^L2{iJjg}R~AH7t25@?zzY@V@r=2mI!DBs5CpYi46J$W+fV_d}uY2=3u zPmo6UR$;rg;I^^j|HazyqPD5JZLYelvxSkKmg@s87?ZKL?>FDV zTfiiDAj=vcd7E4o(>{qt^s2P96TH-SERm5kNVX^|$s?^*ltq7Jf%p}EHlrGET>>8hrOef>-u^BL zpjOn+niKP@&@~rV4l}>op|94M!(@hgrIn$yOp<}ivo3+rqgBn8q0#Db5Jb%KQ0@E* z$x}+tNp#wJU&f+vwl*9u$E1GEBQGbl0m+RHS*hG1d#V5J0G?-3hXu&GGs21kP8tDB z4281!36THWxTaf&rvC!8!e)bH>Z|Kds~;cNJWf`cO1Lujx3vqmeEzOia)tTm!AJsA zl7@1FXy~R~5eJqMGAbYR%R%9kG6WTIf*)3OgXfC{!J$=UVm zmSC^R>lygBYDmt9_ayNTbWN5;k6YPFbt;tHo)s3_OGm?+9{+M~>9>G&PhvH+RR)o> zC5YA^r1<#x>E;DKf%3m=T}C9sQYyo8(ex8T%wk?1vy?AF)0;d4cpt%gbedho!>pyh z3Q`k(lmtNWn7)0~-z#n0_xqYr(Hz`j)v!y=8M=ELY1evd7aq;OFIM%_>QsvtJXitS z*|@&xWTu=n`fZRi+rOp^o5!$aCmNSgmfXQ{V;<{FeNHiOQ%M6(|E(u0oD#z43ds=i z?F2BffmJnw#6DqN{|6GNfwd1K7^f^FX>sbFZ$Z|%T>H|Uz}50*(LUh`VJCMuE}!qj z$TfRXZcj2}awx|roARZ|w%oRu-DnZ?@iE~l3yx*mIxtmCyH-f>{+$nX{Ff#)t_QWt z!+KmGlEJnu3#~ipCd?-#dsK*cGd5>5v28vx8lv)o!!TvdQhZPZm>PedfI(`CiGn^G@kCXC6tGK)R$}u+aArzQt%C-mHSQg0@hliu(p}!hoASsdn&y*Dz5_zTmD+V za{}KfFiao02udeIfOCPKC9g8)voY{Iim!Gt5xl}m(&ir5Aq<5)=x;$2RT`LV3c`}L z`V}mpNSB697X1(I(F5Tep_U#Jar4Rr_*oi&fbH*Y`}Y#HL5{m22mLkGcLC6h4H}~g zq6rc!I9bxtrn@=}s{6tzDlr-hNYjlCA_)cXuNqd)#V(rV&uDJ?Lj|b<4J>6*fQ-+O zoik7=Q+7-4R&JTbEklYAc)#>($e|(B@at@OduSlKzW}JA)|CUGU1c+@A4FVN=-Cbx z9Xd{wKWgfyA3I&`+SyZDzE-Sy=o13gHo|G=`3l4=^zHO$D68D~*JN#DC zV(@Gds{M9vzvwy5bP2r_9~rT{4Iy4a9Pajs86 z6^n>_mf=>7t#1J9?@$t;v!bjOsNJl4o4p%e?@Dsyl~1Ze9VONwnohrkXWUl)!RN~y zv^-d|C6ao49KJ+q1&fm-H6BZoBOwdha<$)uTcF(qI?k=Ks4gyxRpTHdYg`Uu)Uxr^ zC|~j7*RKasqV-~_v32s|hHSb+6*`(NQ%UzA5SF6Vw)UV0@Iv)iv=cGuj`173cDIR{ zPu+=K)WiyLa*ToPX+LjEFyu_9O*Xx{m?js#Xyc!sz@|Q@)6OxNq&j7yVK&ILh+``u z{iQ583E9D_^a#IYmg2v|;+Z*4A(A2$2R~lqJ#%$KHhstGBK;W!I!r%O2}KiS#n>UE zuze#UO=!}=kjG|^~6(^eQx}-+F9kSbJ!GczJh>BS2pssT1Uj!7=4~ z68I|apl+E6(BtgkAum14eM<+|g&huq8qOGm^5NtnE|VnHyWFB?6eJ>T>4OD1WVxX; z7r1DG{NOT8_KS3vnW@L!`rIU0RWr45b%f;$(8CYyDY+28lg;nS7dGn;D0SiBrBIR-$h|R{(9(qRWR4NH+`h z9^EWEu0|L8>gGQSddEJT%}YVXgKPWTHvJ^%=^pqU;BYUteH#Om+ux%UI{DNaB1yjY zVAc3p(i4JHbM1bzGwN8;y@J|TtCE62<_?_aC|JV?jcqAh3P^LBUePuWLgEFMJ-pX z44)$-KoR9ciFo3NV^&H(W6xuo|l1`ROBD7NsqiRVNh#zIe1&h8yRVf8J^AN@LvDk?4W6&+4+tJs&q!U1TeyjicTO|B<&^bezwB+&{UNHNCfa9g$Ku z+-K;ut=>J%%&2=c%j1`?8F1$p=fZ@)L`*zWM9BHJ-xmvXzWB z@fq=^$yru&86S>==41`J0rksJ?hi%s!D_~C9 zzzB&3HBe#8F(j8gFsZ3lJKb6DfK;V8i{+x97xC zUzv0+t^AwTbpG3j4(0Dn(b94Vr^nU9c@uvnD~HUkY=&C^{N#^GR}$@BCO!)Y@~zt* z=@;h-;7WQuQ;5qI+%a@rbi8L~uH#^?peoBD`(T>Y+D8)RalJU%C>|a$kW1v;((pv( z&e1Dq>LgEa_-VjLH&NDb6{&iB;+PjerT66^;VHoP%}lw)!w#zQgDx#DI}`&R;6C=& zBZD3to*pG#{5q#O-(TTnPGbBzPAq`*B68pHAeZho%p=XfE{W2xcJ1c#(7fq+zV5p3 zHb|I{+TfrN<=@H1psce|AHK{Y2M#T72alw5gSFdZXNhm|4W2xfGRP)cYn0L(b=O>! z?=33Ir!>>VjR2vU(|%u@)Qvb>XU))LmcocI)gqU~T$cK~k075l#+7u2r;{|gk1KT_ z)mq-JJWcQ}_|ivkqR&RwVYzU1wJ>%NxScCCtjDjwesPYS%@M!MmKoN-voTH(NusZK%NYPVPB}ctcZgRs~5MWK@>vXgbua5|uy5js5N_ ze0ggq8Qn020CU2$?+?l}DNFwo3YRxN!@tC<;Jv7%Q^TL4Q=9Dw^GA<9eY`@8lCJac zeq8E5o;VdMZE9Vs4>O)?U(sge!#xr2Gu&Jo92~6a@ZVl-pZwS@@zu1wKt4G=j|yGC zZgd`5bXq+AMam=m;qcq5VLsZW~lu zVbMP%Qz9fJj}R!IOt?xo5vjmzC446ixEpd&yVoH6qxPgm)AB-G@As{oH7wElkSEVo zF)}4}BJ}=28#v7!x-9dpit_1N?ODz|yLi$sg#VMU|BQgkBm+Kt51zj=au1E2e-^j6 z`x-zc9Jvk+1;j##c$hTvNbTIvcZU%XrNvD2(6RnHXD4}990e6L_+kGCA{*f{I}5D2 zlaRK6(Ie5I4EJtU*rcS#m}@MhA~n-0xZS##3gPuVgn>}rfhn6FE!Ji;khAnIdE%72 zSzK-M@u0Z*0X^|5I!$G~LMA_8pSER2x+?lf&0U&YJ|Rz?(+0(R9`?jDnnE<+UTb05ufq_RqB^tH-RvErHdi{AWbWPp`%re;idS~$? z%lN3)y0ngzqNr>KTcbfES7Tx1et(zBMpxs2YdI=MLOOKm?JvRgGBF!13Ba_wL4Hri>>3$NkFJm`w3#MHt z@TJVU1m&(BfPstBx;8S1-|frT_pJ)S3b0iZE^cP2`jd>j{AF~8;rH-)!e}Q9R#J+> zVf7uR=ED~n+5)`8GsnE&Dgw{qN_+j4V=qbD!MGWHcZy@c%uyD)nAp(DBHLCB-y{0r zCj!akOrf_!w2b(lhYN5F+d`T!TWZpRpF&9vLD79qSYuzz8?pvsT@<1blg}vxeP^v* z)w55YvWm$jwn~%KV@!k=fLg_yGjP3fAWMVAKKD$(+iod~=@q^68^JuQqPq5>4#D4W ziUdBQSG2hA#@#@cLe;1&~KC669s>kQ2u(Yoq+T5efrh+~#q5$!gzli%=Z$|B!s z;X2t=>iB2fsJZhh=2>}Y(9uuP%XG9vEMA~!BDPE=OPxu5C!a<}hTxteg4TWW^D=-a z9eD6z9v;INz;) zPPe(;EPYc7jM&?W!p^*$r1r_*<4*NjNe~uEn-&Zk#fiR?o65cwNy9mGJ_gYiUHFo{ zdlrS{|n_T>8+RKsV3+J4x{zW17eX`qx>e)@`B)p_7oZVvspJ zpQ*+)Mi6OBff@@<>ehkskI)W}>=?8Sg&+o@FB5?q6lC0fly0Q-kf{|7mQ^1M@25_{ zZ$$@Sfk!-)ybKewwY5gQqzf|+z_tgJ|$_Murh7az3 z7`81DTLk!GA&L1a#(boKEhm=pVr-8G{uO=G94St@{&D~BFX_Ch*6YzZDQ>kh*?6z0 zK#HgS1Cx#Ymqd3Y#M@5Hd)HntOm*lGl!3LHmezTe9n@MK$2;=1$d(#=N0Vz3?+tr> z#aq?2`1eP0^UnE32sF9fk?kMy^j({1o%Y*XT3T>8oK6Z`R#q0FkF|0LCqGnc5~Rr|qkR52yyjk(ZOl|h_`nF&Q{t9`$BE_vH?+ZR#oqIy@s;%&{`K5H`Kl@5R`f?3$ z(qXmI*!1iySLA4#ixziy^qQONGXqyiMMGD^y^ZxE#1RV~6HJ9X{WZFCCh#{$!*=V} zFzZ}nRcXyW{&FJnBaKz{aL6q(o14j4gW;BYll*H&#IwV9yRE+OE{_eg1Z)e+U z&v`!2c|Y&ynSO`yZC5O6%z#{^`XiJ|V0lxLt;LG9l@dIaK}d<^@M&3{vztJ~g} z=Y-TQaT#Nqo~qg;J%w1zgrOif+~PLfU<^0YX6DTBnSJ^nr)tPhPt3ZO0sl{P;T9Xx zx@JU8fFAVnu0SLXGGk8JBoWDzG9glY$1PQy%5_%vU);GI;#P*U?!9%7Rc3w^2U^#R ztJvH-+UF|~bZ0(5MAmzw-E&o-m0X0n*Ey9hNCY-1J<0s0scF`?KFE)7;-RpsKUrj# z8@YcPz~fJ)pr}Zhf>S1biZ_q2@yEP!7C-^2Jty(g)#EIJLvt{8FCTvSVBkE5xJ_-~ zRu^niV6v=?rO3ULIc35{Lyh?TJZkT20Aj$@Ja}CQrggPs>t-eU?A0F6Ns6spNL>pq zvDJGK_KX&$&Z43s9t(AK>`bVGgTu3D&sJjRM&T`Y=-+BvLXyy+B&mVqKo6GEo{$U6 z0at)IqlXaMXQ~*JXZ-T|;^JcSsVVx&Al0{%lytL%(s2`Tng9`WzDuz)JA=8BRZf3T zs&qjh60@#fW013RffJcsP}Mgirw0)B`s>{(2#~K*TUSWq#vZrUvdwYAH8OZIp@>qQdkEW3%5kBa_YB<%$l zd^nd(dV1`i?WvQ?>Nz{J^A2}u(;Rle5{dtg5{n8Ip}^^0irU~qeMdm5V`5?gh4R0b z3_zd_cU*c~5qW}Ei8S{K7OxlhdKVoeRT-G&x)FsMMF$55|MVJuW^JNEkp$4>Hz#5N ze_|IciJ!}_SsPo6vhX(9_iIeKJU`XUl@Wza&c`07(Tdi-+ru=Z<^V(>$0b}Jwzg*I zr!0T_-RDP@2nY~O2xto!`EFBXhhM`^X14OcIy4XEOL=-J7SV;1l=~9MIT)sWqC-k< z^702U>7r~o*xK^4MXNI9R4?Alr$!;tN9=q4K7>AS0tE~As?y=-p7e#vab-AgT^pQ-2oaZk|e zqD5xFpN>>6Zz!TRc!0CIaNL8Oxwq7!CV!>LYu!ru>m0oEmWHjRX9zW9qI|QlNag3L zBhw4)1DA#Ui(Z~|pcL0vl@^&<{UxC)409M5banfo7i~%VMc8`s+JP+{?b78fO zjj5E0C@kcDpFezWn*HF%`*6_RQynrgSuHp<*7!_!X@>VvzHvi1~u=_dOd#f z2t|@XFGa8R#n`8Egn}7Jpfs;Nf18i_q4s>t4wdC{@SHG?fQDO{U6M4LFWQU8d64W2 z0qF0-r8@uV=k1hmqB+HQv-69Utde#wt4HDZQ0q{BFN}N;EwkP@*_J-Tu|E-}pSR1o z#GJv({5b@cSYmNSNYKlU06MQ=R5g49 zPEc~9@I3N9Me}6HjHFmZBrcbsavg?U`fnjA{I3TG8C##F02-QS9dxCX*KORAg%d~m zF(n~*gLWpH0(y8-_g)?zQuLs$o@NjpHEkr_id8^FlVk%^&SN&n&+d3L&HR4Dw3*feyx|K&0m6Azlb+Tnq z3>eiDYj?~EWa(&Ja>@M1*z3pvCs7+KqZpq3HuL>YGt)lNp9rpgaQQ3|$hcFPfHze3 zln3Px>N`%oFlvI3X&2RD9LBO?wyYXl6Alyh1lU84D7A)7LN}El1t3m#MDC+{4=m!* zXOm91FN?HrOsM9nEWl1p64d>sHz3k^-}oXpJ%-WHlu?J$+M8^0N^np(Pke2+7j`h~ z7#^>->9he(Xt@PEp_nf|T!EBn6vnvxhA}dsFWGwrsU5M*xkuI;i~!a?8WE*6vYZ(! zeN56fpp6_GQB|*~W|Na4oSSGVd2)qvo?op~M9Gui@*XRxFn;63WI`^%bB84AL>mJj zxT{@!rHZBbVQBx$zNGzpb&s9hFddI%9N^%N|24t=E+f=-A*2y}_`f!O2|~;1%f0*I zSpovgJn*35lMrON^DQ~LJtqNYkQnM=d#GQ;-?3S3fr`7d1=@P+1~Adijb`qZ#E4fW z2*LE--Q7K$Z7eM(hvr;)gqsue5?O-Q3N;x-=*6CisxsKgi}d|(*t{RVyNT60oS+pucEdPC21R_J8|H znStbOc|VVI3F{;36EwKOw3NTv+ywTLo4?*YkelER4uhuxl9u~G{X;^e_r`AG@@5tF z0iH~o0z_8yi)!FBU*NSxmiDvumFWx5t5xfzF9gb7xP5u(oJ?&DE!79;z@+FRJG1z; z`wyYNEH18*T~WPaX`1Z1`-^J2PezR5 z@1#r}LCawsIOWj_K6n``y0~)$osGh>YLuX5DY1g?`0*_nTIZb0>|4982Ew0f|4o{Q znn^UF(&$Oq5MyFChD4NeJo>~vgf0oJsZ>X1prC*lK?Q^gme5^Fu%4S#p=$$<9wC?H zOEYtXVNUIgM#<2y+h&a&q|>lmd)EvsNt?>ZK7^}ja1m@s4ee8%XGVjyB3c!$8+N)p zinqn$z@PvB2*O6hoN1IL`zT^xc~pjpct;M^Y~K%$i#^1;&qW}xWVjN^Yn3|bHk*#!b8w|$(7Q>`&ZCEn~YPLVx*JpcMkR^IMftV4z)8D`Czp8 z>{zdy1Eq#qT3H3nEXgzukHYWUiK+Cg`n*$FnUWh?pNzV|v_eq@*h+(7t<@VbW^ky6 z{3V&gjHP7fkvZg*@SBtE1n{K4wx8Wjda~Rb_aNo2Wq=*VeNx58&+nX)u=~+fM1vvm z&qNySHc;@A$*9cQ`GB`4B3oh-5^ylrB{)H=l?sn9g8G?bO*1^&EbVL3YsoAA=`$L! zEVX19i3u^i{6mQ!B09?5NkgOFT)=GU>!k!Kr(%UG_o4%dS!hO3aI&3C(TFON9GHLb z+Vdn~xl=L$KNm5!0lj-3uZVbSxBpJ)nu>LFSKZMVJ87PUk41N>bja=aGj+3_vT&}h zp1N&?P9NsN%+`|1B7@qA2)xLHv0VuiS3Mp{@&zj!=6o;SmzGFp$wDH^Ec@F2yHarg zzKvqd$0@Q#pD`M!xjba6xOYLjx{B?H9i0RFxz5}fC*H2}OFVxePH^&_Qv447ITlBC zc+x}HEj-sQn0A!>+C*xj%vR$tR>6(EgKn8|nLmbJPMc)|dm!Ft!$!z7{|kH!#7!xI z7Auv8LqIyyFU*NTtMr@nSObEMDT&Ww#EO^away4H$Ww#~qYL$OIQky{%ZQ_NoX!0;^h`+T7WGWm9M2TB%eAC`2v&4*_f%UR072G07js~u+GoILMFJ*|H5lS%fxz^ zS|c6@C0pi(Eh&cg^6{pQ{#z4V>KL8p`CP?k8A>ryL`Y{q8%s`X4t=b3_`aqV6C=xI zOJYl%VQct9z%#cCp(^XXDW^wag>Uw{VoW*~vAOn)i;{!bZrZQb=Fu7@wtb%dxXmi@ zuAzXDiO!o#<|L2_Rb))Ifm`LPjkJ)9wFH|Jj<~J{8@e1)Gyt4dag+Rj3E=0-)v@Md zD;>%#2!Vps7?25X#9KVdREzA&pDf`invz(~Bei_#f#-p4J^r>J>+VB4W8-1?xbGO% zQc`*(iC3@~+uF{k+SaKsRH78|ks;H)Klnq*!55jcxkXBOyss-;do;KR{v$}7&hhIz99Vg` zZ4XY)q5Z=zZ1yG~G~v7~Sv@Uul*(RB3TDkH=u!Rgc05p~#W!1ji2%7s80OE0mp^0;QaY z89V8I?cU-gV(LIb`;IqW3h$L%5-?>rg@l?AAMYs}Dt=8*Fbne(CYZHnBQ;UBC*8+@ zUh*q~9gL-D#;G;pzKAL+D9pvqCV%dmb%A2Mz(p@QBp&bOEEzgFdhSqyIqBU`;M{sQ zl~)N;ICf~^p1jMx78vy|7)y)2I9-}m!HDULaWmSM)53P1{aM%s@xwUitkhm(rv4)9 zoi|731Y5>kWq?TRy9z+?!NHDXpQ$w6qERbCydlm`-_N8RJ8;t&Cl#YB84I1~0=D9n zf@e&ipsnbk3grZi*%ASuVgm~<3luI$4s!Ph<{kGU$$j>~m@?yIqvC-N0f0_mfHFtG zH4jH>(hZ$FNV=SYZLn`IWUqUPCBinCUTW`M^^q^>+t8#3;U${touxNA~d|! zyw(u^?VrbnFyf#Eyc9e?DSToW*zZcL9fyEt8IaRPwq6*k(Ne#X3G}M5IFlCld8Rza z`Fo?+GrtNy62}|*p+Ud{u@*S$YdcNiKGM$B0k`e32eUt4Ri?;YoT_pq@&+>^MQ)5L z)pF=5Y}%tJ=Ck2-F;Zy8Pu7yA{0=iB1X?=Lji5on@Aye&Q1{VVp+dEI z>+Kk;LcUGT@u^5a5(?U&+GC3Jd82I~YFx*09GQiQgr0(v2)=mYU-KgaI7dD@yor$R zW$m0RlcSpM6AoZ4`jj}&ac%vBBQ)(G^ca{GU6hdTHJOqf)EJVeA7O_j1@4Je6#u<-FtHH0!UK6$EC9%kb~C*1p*0A6V= zbKbI(Vqt$oj@I9>aT#Gr=yI6pG)m|KOfcr9?6~P^Fj7$20@kkbgI$+bCBh|iG+~Uv zl-g@-8Kb2kcqXD$s&7bsjnlh9sn@}dg=U)5C15-#BzTR#Q%#QB8h(A>V=X zG@ZPTx3Ac^*tSM|O9^&~8WRNv>MpA*qVyrU?cT?B9}ul->^nH z{~TXoL5--J9ju<3Y}#7vI+|^pSbeluXM^#4B!lYo5FlN*LU>xs{OQ>48{dvyrN)#X>h5pMd}4r@UQ4WlB(DyH??QJt&(R zc(85b!jzRN9Y?5WI987n#uF((8m$uyr73Fs1t$mV0n87nlnS5a-Cje2K`UF$@o=3h zwAw>FsOvi@#rfwV@ibK`GL1@ zye&{pxP-oA1Fb_%@ni0gmzi^{o(!9xl)r+fKD`5BfePe zvA#xVTSmz7L3cgF%WWbri9ZT@(Fw4l1;ex%|^R3HWUmU>dTA1 z@iL(MI&QgzM;0)7ARfdfHn0-YuAd-v5c>I@p(OYjqCfev#QfgF!=s~6%1)DtE}=_) zhRw&5Mr4&7T>{0+jwXw7mvi6nvYb}Tmw`zDn6*MFUxryM#5d}%2BX|V$#BPUt;#bvbC-9u+w|OQvXr5SP^~3lWTj_%NvqJa zhckW-%!GKD)*&M!qkQR9O^9K#c*Y+W>!6DfEB)L16@czPjyq8UIqZ=%SSv!`@|Fql zIjmzKE!Ml%*Fx7;L)LLw0iv#6Z_jrkWXP00gEt@x+AoIgO617kG)|~?|A3ibW)3M~ zG(6_?#xNlt#{04^O~B447o%{{$GD$dCsG{$O3HxFy4xOb!93TQ{w$~cwub$-EQ%RfoPa>ihU9s>y5z4b((W4nRMJ}#F;UQaqpV>z=~?~ zMRrr3IezcZzVf-kNf*MMjP>mm9R&YpjU}Y>;K@}gic}B* zb~bW~8>_3DNeeZ6X#azyLVM=)@-?XM_MFSpv){nVFyLp7>%Fa9#(8mCg*kuf2lX>!?;iG0r7 zevrBsJ4#v*Dy3p=nU7HVa#V#53BiJ{UP*_PcHj0@{~E5ILw48Tu5Ly6NW8CI8a-th zbY&nlWMp%xS4qb8YoJJ(2%#1IBx8^&72={>F-o^^10Y6|k4%MB zZ~WwZpN>5$G^T_pF@Pj~amnFFoYRWdM{RJtInS8>kllBi*x_o*=fSn4sP^X8mH0=- z9i2{tXdJiM7~#(s|J8n20sHw82!pJpOQNaM`P2r)SjMh}Fr#hQ{G<$H%{@0HOlyC` z>B#xU!KcQ9E1HtQpU?EqtMHQ7cRHB_WaU!nSj3oy#&=WD=E z#Mx1#cmpZs>xj7t5#lL>+EJxZNnH&cC19M{U9wYaG0 zMiS`WYBWO4YiIc59qn97RPG;1f;BbbvtI*s{uE!ckm2}+Whg|;141cpi_7@P>n^pYu z*8sp@Xt8Tns_i{Fn*0j+f{e5~Xz<`BAlL)``c)79XQZa)feqU1@LG)_GAY}YFMSQ1 z$tEIwx?%3zdoDdtdYSBScqBz38{kLg+T_+N<+eb1UwpBQ z3J>VU;6csz^@CulTPs3L!EsW(LxM}7Rw0IIZW0ow>5Iw79Vuj|!N4MZ$GW)$s`-@! zsPo?`Zrj-hGl8|qeQ8UC)YR0M>s#Gk>n(QLXZTfI9< zkwQeo5TjM&Ht^ALsJdfBoPm8miE*PvWIELw9mt@F;iI3h52%r1R9Ovi&mB6OqtXAsR_NDB*Z9q zA@B^RYPs&47W(#BJ;`~=iOwy6Q^Y3kTv|4!HU`IcS)&LX5hsP9l(eGa3yLxwd~x?S z|3eN2ih^t2k>18>Gq&sZ<9_XR$t@_Tyu46KPyGQ7hmVe` zUCY`N_dsp4UuME4Tave_du0*1^7)f&|ARA@%7MC0j$Ob+Vp8}0P?39yr;LM0OvHPU z5BPrVxA_;yUEg466a8&yZ7sW>aw#E#{@~6<UaanvBu-jl+av6yvWZRJmpW)0d9r?UFfQt;k~- z+fXNk06Kk-T1r>>o4ty5ukZ{2lw`kpzVI|`M_4?%y*MaFDs(1(VuFK1eE0^fC%RM) zH~}$5Fc_^bIc3r&<;mHl80R}bDXYFznS&_^5@YIJTJb1t#c(%aVi%Ud8OoBZVvAP6E5@wsR2EyY* zn=z!Mz%UdKF7r$3f%K))B|S?ew6QwPus0U--cz(Y)3+eDo0@ zM-NT@V{6;Y{)7Cj(%r^~Z0;^#5w93@ReIh3uC?G7`dKr+4CCcB{mL;8lENh*h1l|3 zf`aym<50~0hDz){f`V3$Q??}Xl7UATJU}lm8_9#KC9isj$EzmVxhfvVkg(}ylnpv&&LcNJsMr4Jx_^h)(SznYg`4I3OVye3(JR@JUcc!L%nL4;edCIvtwQvxFj!EE+vwenm*$xf&z3wobCzSUp8?X6Jhj* z^~^#B1@GrGslGso-z9^2lAfHsK>4@OUj?~tim>Gilh=v63mpd)u@4k|IlC1p4nI9a*Ey~qeeLCi99zH0HL^i?HZC3P2397SKAx@@tZX#G~Z9n zX-a)#aHhtDW?@4C?vh}%R57r-IbzKEMydqpp1ud#dNpMV!b zJ75RCDM@~jUB?^=FPBUva?V|8&CR;-3z`- z)so0gt}z?MpZz_3FC8T)@?j)}us)6$RFftaf6gu7#AurISf(&n``6LAYUxKx2_4cp z%oN8$<5)f?-myyZs!=C9?BRlVyI7h;rq19=j}Hy1=Lvgd0xQpjLks)96cDF6y7a;- ztT@>2BTJ{5(e@*UIeIbIyGP-rR$u-W#k^>BfDI?+bAJmX4 z!m5D@&W+p*NYBD-#!kb`Yg$#p3^tV}(evrXG^ExEC0c*yiGN+6)xMMbGL;EW7@O%l z91m#3X$RL+tKD|*E36+ugDBqUew@dG@&q8_QZoCkVf0_)qXdxbLQJBFpj__ILQaXp zm91_~N+QPo+2mQ)o9Sgn*t@!S>_OFN_9R>T(-GFKd8mVGKCqkPJ)KbK1MZL z4-~P>iV_F>h&eQ*eczEiMWpH*Wp!}m+&?RXh^|bmwZ$JG{mM?%#i{vX3*LQuuIY$J zYA7&JI^R2vn1xJ}2Ru+}W>hw_>H~YlJOk&)=4IS|f<-c_eZW#L->R&y>I*qtdCI8+ zPsFabL${|AtjEn~H}SUiHg#>rGe+tU`75h8znzNa>ZGUJZ0m~bj*q(#ncjAhJ>8tk zTX`2}TvOFqr4luGjTCobt%ukONwutJye#kJR+i)P+b(nI;N`=US&xQx7fd-Qoi|v@ z%pc$_gxm^051xebe>B)^NEnso!`F&irE`<|%?74UvDcdLNE^@${LJf6?u!`#_6kPr!5!?AG)0IG>Bh(i*Xvv<2>e=?2j7gpdp0PAWN1mYJf5GIr7fiEK83 zTPy@%`y&OG4k}H<|cjFk;(h;mN(_D#Kg?+9s)^Wwu(+47ye_v0?>Xu zma1so$$w3tc~V=fGrwJSLhzvD+1nLPD*uHA2V-;u@e2qDhF+(xDYkS$i=kZZ6ZYuO z2ssWWVzvyqgyMiq^obw4Vy6Y_GzAZ(6E>>3ljyXL%w>z&CO_9g70>x**UuGLB~N6x zRK2$N2anN__Gud_GMv?*0FQy)XIY~5X10Sv%^l5E{Z*Z$hD`vwB7XVPfT!0nF^9ix z+;4B&#t!M-oe$eCm6FSAd0rRu-68kgq2EG+XREVhnod}vsX`e@4(09+zRwDJ#_bu0 zWepeq-mqnQNjCzb9Q20wc{6hn;7!>VYFJ;58vazeeXgU6kW#{SP_1#`8m^Mo-M4LU z%S}a+&IE$iBMxm#*97yhUZPnFh2ZCX@y4XXl(+B-GQA99r!$^2HOme!jYUJXXn)cd{DG6u7n|A3o8iezrg}XQgc1-$^6b3Xp=Mp!P>uZJ%oscL2a>ObnzFDAU z8tu7mA-L88*B^7L(ry=M2fM3H1SDH6>JdqqFV|?+5<*tSK`Od720D@ObLZ!s=2*hn zHp&M?fzD3}=`NIKc6iR+B8!e-$Ws+=|Z5rs%zvj*}x# zcTr)uZkD_<2(Xu{evEuC;)#j&r>|QZwUDO;s}EzJ{#QX{v= zKHm#OVV6FSI`)RDotCSU4E2J3G-agfsWCyomcA}x%97%j;bU{E$=Xt@Zks_|0z0Jn4#c$jccVoo*JNaV-6|DB)BS65d|2lao9 z>cbz;6F&Z&v7hWO1X!cUeJp{_cNU5lvMsYJe7(JWP)S?D_$W=2wpnx4Tq)xxLIaKr z_*Mion?ilBm}P;+ZGle;O8^;mo`n(YdO0IS-o z+kNc~9c4k#Tpi(8YmC-AV%U%Gv6Q|!6}is@+|3oGTy2DCRWbBm6&kR#L+CFq-~%N! zc5zO{ZrSiSCmO=rYx}3^kO6^=ly76u74VzfHp*c1OX*G~M>9+awFWE{_9AfQU?_Z-|u)Qqj2Ql04WJEOO)x|)+#8*#3$9;>2A6Y)b{ znx>~(h^W+cUhb2T&608**@-exwc5WhJpVlclE6!{Uv$(oB92@tGB$47T|U(`!!ky%sPJ>#>1!B#(pp{hwyeiw`cd+FG3f6 zb2VU`DVh~57Hr&_Y1$I>Qf&I9;Ppw->mpd9#pLDoK&ABR3SQ-OP?paO^s3ax!A)VH z(+U3gq2A0hGdnnTcEpri)>g6#gLhoSh*x2dI}J~gD9&ILg1N&%&|;9g$3RYMs)iA0 z>VSjZ5V%^Zc~f5NkHtuG;a$*9sW+vX&u(mh6XpE~j9MiWORHU4eSE0VLBkt!OX%!^ zm!2G3Xi_Marzth8)+vn_4Sm&VL8-4&#C4W!Q3{B@mUT2^TXhL%{3tPb(!bqJ97Ng5 zHFd5Sm~-u}ZswtU*DJ>LFaqLK+_B=<=t$8d(ZcKt5WK5(LQ@@@$C3>&9?8_yY9gqF zkq2e*EyqD@ZEY>|kK_*9iw4yw{H?+h9dqqMz^!HM;SeQf=R5X$+BUQ8aP5s7O{?&` zSnQZz7y6L~CFcKhTl03smw^`)CZgJ@hZEFNSFVFuQ(M!H7@G4`6dCT6`A?>+BtXv! zc{L?v9cZ-3>1ed{&E54VsVl`?ObLp}mEQOWVDpe^htfcMcnL$X1M<|Wn@&><5LCmUWF#J?W}K1;zZD<|c3}n+Bhr#O8``5Ebh%(Bkt}BomTL=!5hE+j+S~ zqrY)+`w~$3udu<~C`=iq&OPPWW%xnfr3AK|m>a}Xy7g|c{!$yw`94KV!C}c~mX*yc zcK3H-VT`Ie$rF&7rY7F?)iL(7w26miOcuTi z&zncE6VEN;2q3}ZAL8^PZT{4jSX9A118CIR?9IKw*sLYfiSA zycx4(1e=Zp;Kw;&nmpJhgumJVOzzW}z6itIFkjj-CedZ`xJfKla%c&=*LnG*X+xFs zkTvw3PeC#GiD*@JiNKfeoh_(VqH@lJd}+kp#f=k+{^P49!y<~bi8Irp7)?ewzfJ+V zdmx|Z3X@#&pORDVpwXQUA_f6NoJcY%tzGXdz>z~97Ov+H59rQXQtJ1|6}Fms&qE?z z^In%&I(&36TemQy1=P9gGUFFTlo>4zCkS)1wBMuBur+j%FNI;w(?Pt|Ek%?MGg(*i zc3YE;#v#r0G}1EcmB-RYN6NulM}$i^%-hbr)!}9Voy=`pv^2VcQEA|q2U#KD_9QeV z@L+$WqMa{%}oQF_6IwTfMDdon6?9ypaY!J0Mm-1f*y$>bc&F=Xv)TGn&0YN zb2a?jtxe=q-+2n(x>(fq$EWQvahLl(f4yj`rmUnSZ=F0TD9ukrm_q2$u_6SsXjMd1 zk9c3fZA7g89#dM;rI~BL!uNfI8VjjSealMg2KFJ#%D)_4-+#a-+^Rjxwo)Q2x!@HO>un-w@KR^Qm|v} z)ZdB^@9zx&D(z0rdHQZy$myrc>%V2m@NC$;UCwj=hoMz zz?T!!9!Uk6RX(i~F+!xfV2KMI!^ej5mO68Rjk*0LB)zv9yc-}w?{hCV8u0_Qaa>gG zlz5J=-`S|`&g{9};PTj*8(;@zpg5C_^%y*v^3D+@ikfA@JzD#2y|TT!iW|4&P}qK&M`5!Ab@z5Z_h zog<&41un8>cd>7%IY8Y;va-3eTaB#+g$HQRT3d3arQ}*L!Cr>a(sj7#tw=&2pID3g zGa&px{tFhi=SZ<^`3DY{b%S`q!2o8x36#FwVC$$i7LZJbn-oNmMl~UUgN+rMATGPD z-oDCKy;#ac3}QqkU@B8|wd4PW2tdVH7&)r4{v!;Wii>?fSkVC)UCxh(QDXYKe(Y1+ z6SnaTS2hOwO)PBM6-|044fVZkKu4iJ{kyvU{;xpj46Sq=bHEYj&9b)R`{UZFDKxhO z^0Ai7L8(w&bv3>k)=hKQS|!G$skNcivDK}b7$qYACz(&)|!XQTbIk zuZeW4^_irJ+*639rKED-yDgu0{c(-R?0grl){(l9go-8pXNkSeq#3rqm54w3?c9-k z=<_c&t4&8(laq2|Mfq4O&nQqZlLj~v0otx^0l2ET_6CtJE#~w4!Z(TMS?4)KJ~hxf zfjxK*>>Hi12UT9FG31g{-%zHu>_pfkx=@EP+2G(Mizr%X2>DV#?u~&FlbNDpYi%vD zl!0E~|L&?sIgQSLBW%m*xt)bGj^-hdq9Ytc$uIoIm4v$6SVB?n^U^*ly4>err7CAr zdX^C|4-vF&lYW*@w5+E}kwAl9l)QU%^@4RcML-T){sohPS7P__Kld{ltAUK9^vV0W zdT5eHdc}4sbrVa(kIm78+trItYt2o94jg*W2Z`lSvv2rDY)x1caAZginZD|t9w!q84J(Sh)B|@7|72?Z+ zOL@K`bhqHl)uG+q5}Z-4sA^_rdiLImN2(GH<`;P8OM4R`#aEZ5pT{N z&>ZYyi$~p=f6S(ILggN1jT&&8osb`7p0Un-n+pz`JP%Jk~zRqkGi< zDNKG|%%#n`{~;!++|I<@(bTrO#PSicrNzVX>87pYuA_)wZ3t1_YRH<@I7GL_ukSZ5^;ytYa(G^T*@ICFfke=@$D!P+;YQ{w@wrS_V zmgFQI>77y>!F6V)h5nQ=7MH3b92IG;L}ODqNe*Ip2ju?T%Vua2?y5|o=#|PVcj!o{ zD(8%vl%3VS_$Kbw=5@XFl#Ax{5WcYzg|`KwsG>Wgnk~sFg1=riol-9Id3H(#DhM4d zQc9eMQ`lP3MsQhL{AIb}iHxcj4eg-5IZ+EBu?)NKdurnZ&G9C7=_vSG8CtV`s@~ds zeq?$XW3TEM$+KSU_<3*#bA!3R{T3KFV_h$if7$(iP`WxchAq0d|MT|B}r?e_@8-Eq~dq`R$bs< z!q!J+NqW0_KOK1eV<@T2##s-}o=?9=;d8rvFc3PSrZoBG+=rKVQcJYP0qXufO8wj>?+wMN*P<Fxd2 z*%g(2kJ3qnpPIO4ZJ`4Rnip((xUbfyckTHC&bJ|HcReWbGX;KLYnfiK9`a+bj)YGh zlZH56Hzm~bGjJd4bvgT7hAR#Vb!ov^V9HBS*%3XPJgDp@S1?iSj;XTD3p1anNou$WyD6O13O`c!3UcvwZI zIOE$mASK<#O32zbun5vHcyExiva=!=$MEkWukW9W+Xvx?-&DS9dwt)7&l>eNrH-g9 zJmO2vf=J}a&*KGbHIM;rn{rqSVbI)&o6G(+q@qdbFa#4g)TKI*%{% zTQ}N+ea#NXpFV@=7t4onoOh~%#6Zy`TOge+v}_9k+18KYD7zL z{#0(7*k<6pC{NW4B-J49^u=Xo%5mdN6@2Ev0%VUwc4}DZSz5K&O7k~6S|nr(aeE1@ zH@5=S@45PE#zJV_yv5PM6|rhUNt4ien!7J;&M);dtwdt)5F&lx%hdk+4{l(-9eMB z^1847^;9g)C{L$eexqijQ3QOTi({KM<;*eJfq^H|^Uw6P6}6Xj_rTTz5@KLL7(nQ0 zZ-yG^T2te9_St>-Mw$nBaeV8Tti|afX?%YlqW#YxT!}(#67(P;mNp|cw;_~^RrHUI zIVK4Sg{AjBlc1)-mOQv`=bl|!S^@%5G&nHB0Bz6e%F4>xS|<>y(7OLLB*emkdiJqJ zQKP`-4BXhnWIw$z^)~hPHZa|!;r(<=?s+O;`I^5z#K~Mp|A95~vcb;p?dJ|&$MD+* zO(P|Tn>$omc~oZmQ9o_I(tqe%T1VTz2YP~z_FaMdRe5PdsWid@w${dd9sytU^iqit zxk8Quo?qY=dWdHD6dFD;Yb9zk6mc#=sE26DZnqyrQv*>vUa+Ym*V#28_mo{U*oCx6 zPTy}czcp9R2BJggV&DDZIX_TEtGUlKZMfP8lkr->M1=4bzEUd7*1Yzre{t_PlC1=m zR`cW#ul=pjQS@k4w;=I)D?|ro;FW5RG*^dh;0jtcTKAY@QxH=QRtS?ETvq$I@PBD& z+A0JA5ww8>MJm7SK|%JT$%*w!LW{V!1LWqX59Dbf*?1Qa!mSXIR@I)wkq4Wx)X|Vu zb)t1@Q0f{rb<6tHgIKeW?bFwd%}C^HB(k|Ld<;NR8b9@%tgWQK%>n$aj=Pg2?gFi8 zmdqckuqx)g$+(hP4;v4PMs~9O-PelK(<&1 zp0G?amJQ=vS-yAgSbG1cn+7M%?IkJ+EV2H=#M)0vdAiDZ;A=d&%oxYg%~sPZCf1MW zr4MgjJYTAcJvM%L=;V0>1(1eFO|mJTSV!+XjgL=@(igdUQGOq$&9k^i%0KqTFj+=rv&Qz0yR$qXkZ=!=_P4K`Ji^0wA8r#w zTdWt+=vyFY`%Lja;6oh0@+W!a9Q*sEGBq_YHQ~-wOXq5P5f}n7^b2k%fY$Nt+qXS> zSr<7{@WuE4XDs=!4E69JD952&ehZqas|+yT=}}Q(fNE)L1L=%wEp7J3Ha0pOzs$RU zN0@nRvbT0$ZnqR;^J{0KM4xv?aH5}P~0ollT^h`CIC6 z9!mrmRR9Ub@5AfD9Hz}-Apb|&ij?I3+arpHU&np}f6R6W{@H}K^%Kv>&iI=Hgq*=1!DlQkE~dW)F3szw zA$zy_w?5$&{coRa<}Jwn{#%oz4lsfOq!a`S*7PHGc#viKAoCNXJo|QV%w?SVK&`*0 z0qqTJyS>u?&79=Z$v)>lQ!2kLN6k6=fMBLvSv0#t`umamvAfK+ko3#0^SXb5lFm11rH9J}OI(DeTV369wQCH(#;7y-@0D3I$Cie}nwjv={EBVq-kV2NF}^}~`>gz&(If8{VIIdpa2jc`1P zv-JA>nKQP*Y&b19Hy3bgfVc>-gYNzKeEiuLosYcb?r|B3-dql+yeYIpAEK`$t{qOl z2zn|{Q;P1E`X{(piCD|Q6>Oa{o2?h#=ivpR7U%1d3V$&P`>nkEcBE0%LD+ow3Cr@s zE5P%X|3}-al*7CW3$*N1dfC|){3|1(8cD&5yW)B=A<6dftH*~a%;~R^aVv_9ie?J0 zxH#=T%>(gw4jw$7iK1+uTOcc`3*3F|?{vb3OBcX(`lbzb@nlmNa)E$9fhA^!T__+p zHl|E@;hZ~|koC*I`C}#BP9dxODvz&#|EkzKKfzpiWuNjXeiG%^Q~~Q*VDtt=y5e6K zOqS}T$TLwK4UrFM@Pue2Sz8P(dcv2Bi>%>?SNfvozoxK5XfFF?2s}5Mmgb!H?Nb$b zN0U>`kLS!>MW@rEO+VA^>$tCP_V~iJSNay&ZnpPIByMF-?OHvugX%Y&|zkGoUJp>gZ30rc~6W7r}KGJF{8^RHQZzC6|bNKWU|&ra%4-FMcUE@ zB_%1ze%E0~c<(TjSX%h+kjHLu5v|X)Q5iXh_hzcOop-(FP+P@5u)^J&Dlac7!NCD) zLb_VIuZ^h6Sa?c+*CG-(u)b|P>3w40vBT^soL%ZjB=JE?3K^fQ=5Kt1xz{L&?Z7XS zo1HzU1F%u6vthZE{RLmO@^^N2w1E5S#gu_Bh;^PnbDOjk%i_ZO4CrluSCkigJgxrK>RlOj$G zYn$i;tgCWrKDM}YSkmLK?+z2E@+X$Lx#Rui@S~RI{Uev34^6I9@UEsL%oeqq(W4JO zw+qhMZjKl5`Py^%0k2qDojbM!@ecEp(?_me7$0rdj(;EUgFcvO0^hHLc=gwV;m6O+5(Txgm2+QKy4NARkl&O_OwbZweDYKgiO_S>*W1GA*HreUXFFrKw# z&Uaq4!Pm3og4K3X;@;tGymhkjjV(trq<->P%udP&ez&xy{MGiks{&ZD`TFR5)v9mG z^+{p>>(L%*4hRrn2@@C?XE6L{AgycAvO^1y*5yCQ&*eQB0luVN|GhyiV zISWpIl{DE*Ryu>AupN~S?sT7&v`u=kAEHOiXOa9P-&{UyWu1tJcK+RgWZX0@!49{e z@Ecy=8^zsM<8 zv^eh=a7`p7r#HqYKXRVZGiTZqFyYhv3eF|;w4bqoX=eQ=5s;$2SyGtu?Y8d@LLd53 zQbH+CnWze+5VAP+ZQT-2B84wCttJLP)0!e}E^`qUWz5J>W>w&x;8LciMvip~LkjrA z0ob;w)W@8dG0>A5Ti>k(5*4?*>c5K;7m0N$5?Uy6 zboa}dYAV6=vaM$=`!IrY7nj$`#qm?Ud@VEu4Y_Kyys$ynLFkS0MVp`bQKD}z`sxJy z^zb&uR_h+>P~wwySQdAl0R3pW`g;8o7?kpIa&~o0jOICYnq6vxLXxS4K%x^_S8!;Y@PJcLqH_ty9^zA`K-<{Ry-Z0Em@|yo97)kQ3D8K)yxf?w9PZM-yn>`PM=$ZUi8l;n_i3XLDYY&D2pb8%U=GrC7+`L@ohU!nSti56n=+sH@jjm+Vxp7f zE!rX9$Coi;r~R&NcME@&MN5H;+WXlmPu5Jx^zeFxz*qj@gRN7EDO1E_3NqrdPwok|#9<#kVZX65P5c%SEwamY2|H{$YCWi( z<7vBhxZDmTQKlauG}@@jfAc5@k1NbL2h!Win&q}SCPPqwDWpkJq-4oFhD36?UD$jo z{0?NuWkSF1NOj;prCSM?B6y?2qR2T6++_*3pi`Yaee?mxNZN;Tr-nevTbSH%k@%nS2g#eoz0D};wFH(4 zCsx|hGWa7XVlsrm3~S$ z=fh3rkI{X$+v8r-Y?TQKE-eV44jJ12;^5>2r9?Y_y7(YTMlc;VST>!|A{*S>xX9|! zN_@@iVQk${n>O94NTMh)(X-V_6&ab_~6=9$hPNXK8letqn$ zY09~3=DJr}_pmJo)vmQlHEmc4e$om%utinBT5zQsX6%q55J&3~zunHW3i4%(k_sS3 z(93c0HVYfT5)PH5akctM^~VYd>s}jQ>_%X&?t8yRSM~ct#viE?7 zaK_&3>t8s+TnVsTNtdV}VdYv?!Of8N2kL-djC|wr*SpikG2S2#wrX#Fx^a}EocKPi){7e;p zic&j|81IhaZ(h-SK!#UC&-t;e?i*1Pb^raC*Z*u93=LgkOA`n1-)Ypl0)v`5p@{}U zisG`ihg<&v+rg^e8yNX71O?|_WwP?@q3c3Nx=wHD_dwpHqog!4#OoL`DT%Cds}M-7 zRg_N`sS=r3-FWeSEG3{yGQ+CBor@zD*E4a9uq4==<$EO9Z0ancmJwhieqdu_g)cAD zAL1+f-AG1S*<|onqzx8+0wp7SIZB4Wdn=FxxX&i2xZmX?jfN7o*QzPcxL>cxgwQ2< zZ8lVk_$Is*Zb?<=NaeX*sWqkZbcL~^O5Y8M?m=NAjVgojZa3zO#X{Se&U8!7=Xu5B zI5pfY@vfB?tWzwsxLG98%ATI0SqT-CmG#4=D>HV&Yus_1zEjQ3E^--ALK&6MGFCk> zMwJH+SpU&19n9LZqiFmy8Ez76Mt;Kp_x*j{!-cOz{R$K}1$LKn3Xj#h%Wh18^%crJ z6yzPJI@PLRDJe_Bc#~FbI-N1Ob?rLPuW#oA?Br}3cUZn2fY2fIaJ^REdi&{6im4Z; zqoHj(H$qu>gVb-Ot_{Y$+@aue)N)1ZI&UvY)f>UvO5x!5l#EB$?XY2s)^X@LsWdj{ zho8$Ir34as-^)yB=-LNKQ3bYh@IKEq;lE%o);~$mEq|3^mjh>J85sLp1fQI@BuIn zSSf4N7|B`kO&Wmg5;BEs{#LecmWS53!0US0<(%(jRW`SN^H-W2P5Oid|G$z{m+14k zbQbvqtWk#vFWG!IekYw{P%BnwS`a^Fj%v6+9aNCy-@e}~Yl@b}7e9ad?L5o#aAnL- z_8Vzwr~GJwp9$^@*Cp?(;-akZIOCUH6kjYDT(sr8Bzb=uk?dG9ym%*p`UeC^uhRim zI+tl9L*WaDL>c)!-w}yBtH#?<#%RNGa&GOHI0HQl4;=(P?QywK6_FjL5j^eBo^q_9 zuUx7uNs5cIk91Qx)_Hk3WgQQAVG_KuC^-O=hR%LGA?|Lntd+^dCgc<*cMC zP%5ESCIlx6^-*7^(hpN_Z?hYf2`JVbZUFL?JLxbBBxx+N?=5YU`MYz-0Z)U(Y+btJu4Z>wNi`_@y zyP_D@bf|!b%M@TRhL2vrOj2RB6Dd9_sFSo0E+zevv*; zR~89%QJQiL>5G7mDqX;B)E2Vw-ox(pZ++=_Z$}SCy&F#!jdyK@OApf+bsp?2b4yi6 z*8g=YSlD2Cq3GF-PfkugoTjwhAG)^TI5%IfM$|31%*FVeGq&Rv3`|dCdr0lnt`N)q@{BiMhKOj0)2EjC?j~20H;9%$J>e>xnwO)z;Futhh zqh&-Xh|O}SPn9;cBX#R#sjP~r4nz(q%@2{8W_0l{1>Knldq*2ciMyS`dDi<>rMdUu zM~?HD`7BBFF~?*&IM)K3yNE1YyUC?AionD~VQw389THBlJ#FIo`_QlQ8G~|G4&VH% z?6%`h9Q8+jGrV{FPGe6@iU`w?V;1bX@O}dSy9?fyb7DoeNL|u?3)BF6E=k@;4dAdJ z(`z}H+}+&?f3wOBf}pNh7G=7u$H_@MsVfbfpN;xHoI&qb2vj6)n22057FNdI((FH) z>ag55Zg>zVr|WCRN1N#xG#z2?{o4D>PZ`T;T!D2aTYW@ik82)DmKadY85dE?c(#n( zy<;zcP8eUOau5XKD(|_K=}N|{Ka?4u`k3I!ppI=z&-N%@*ptVU+^H#3>h_)OhT&$) zKR2bQN`g(up356sei@bqrekO3By`TWOR}h=u}a@kffDRK(AGt>my=A}5%;qasIc)q zB5%u$E&OXiPiX}lfmtzQT{@4++o;>tt`uPI30?&rBw>gDa16XmcMRHeE=Ey|_n?ec zwaRp^CJOUXv*xv}=j6rAa;!{K5T)Eq0IR6VcPYG+Bq0)vkfIu4>w57JHMqZVq2HtR z@9)CGqUPTg8`aGnoZ##h!|R*Rclz}%^~XaU;iKoJ@RI9Qm1>F0;mx~fo945SsJg60 zhr1XZTj5&RBArXA8~vXJDdaMG@sNf?yWb5;5J5o=pkItzf8=&BZ&8oD(k&x5FNH*) z8IfpeYAQsxOsykams1X+9IXdK#0puF__2&-#xav09sQ%qDr}B`%zDn1TV3GK{!9nx z2L5Zv5w|LMXJcX#Qfxu+9iyxro3shkoEDGj24u0@fzXpC(K!lEabl(iz)US4@65!R zXSoOWCPd(nKvrc3c2#_D{{o%eUyo-4e`a~?vR?)@zntFCv1tfWe1i6rnVSJe&uQp+ zU%Rn79*xusdb}}d&*SlFqVP{vRwgPt$a6H^9ZyC3&0{gRjPh$pzwk8e^QCnxODZ0t z0KHc;ky_93-39*jKPk*Rp#niq?@(l)Zkd4d_<}d~5|qx1pl_nP9Sc#0!koMeu<)!n zxw!84&7q0|COOG{nWC=2E++P`e?hpy(&M@(iOXRM&%T0^!aXn; zcl2%Im}DheP6b5T(T?n%R$JaeRqP2RCGsflxKJ0+LbkO-vHN(MG{E$m)1&PSCP)C4 z)|XCTeG*VajcvoC)Jk7@Hf7b`7^z0CMj?08INeQQS1j*ReMkY2B^dmi}`WFL093uCA#E~*8YTW zHBn6&nV_uYa+X}*&7YsTEpVR@#}Wy(a=K@bW(%a#2GB;Af$HKb@}?FL&t&xlTbVe= z1Fy*Sx@p2i(_Uc2VW3pYv8~YUqO1dT)p{>UIV#js*zHtXaI~GDylw1dKV!_Yq7+T+ z8!(qC{lc@H%Lp2)lRi3g5;s{su79s?An~!5Lfxwo_j7uy!5bW7*VEi90TJ8HSZ4_EqiPNq?lq0!mpQ{R4E&(purXeIom9NApQ}g8uN-zzGq%&8-@@J#^t%Aek`SvomO>K8gh&wvZ zaU5CkQ>$t-ed(U1P9Go7=6S$H0*Kh4wBip{!xHPYR99E;)=S9o1$e}~DA5d29o@Xm zE;Dl;w63I&)-$qq`BM`|%O!b-A!yL-3lVMqFxsD|1R_*9Ik98y{K>y4;|NDJckfgC zr-zc4Q;DcLU5y}|?Ci+S$Ef>a8TslQ`Wj1j>5lq$m#&KvmlQX4ScWV{;~_GBbu>%2 zlK=|r!6Cakziez)W$reAT_)^%Hm=gDb_?Hir6GtfuEGO;QgrwgmesyKo)b$^+_0kV z;B=2wY=?$@qUVns^_E{xPE6QKt?Vt=jz4@qE;;t*e4pHN>fwHna}4)f6-OsnJine< z()W6pBG*4&NRN5AW;VDTY>I(@ym=3mhq}pLc|$E)&H|mMyx=zm@IA)1o5>$rbbb{5 z8>c1plR~e+bIg`z&ls9#N2IRUU^Oa@EVZ=fbeQO(JXqMY-sgWn{8?s&-eC8m{g8U8 zt28QprHf^m7?>Qx(DoQwm7mW|Ns%XxkI3>z}1G#|m9EpTyJCSy0kK8&ZQypTBQCc))`Bw;uf zt@)VeLb&D$XS}gOGFMqbGn;h>p${i9D>8OCvLc|=XfUoMcU^EM|7jY76TjTJS5{J7 zjO`irA#M{BdW{@9*ux`{roYc+iA2dD%f~lnlyhRD+vLLi_2tA{x+_y%agnI~*e7T> zUl+Wu76d9>02{N@Z9dMDR`4ShnS7qDLKyw?<0Ofkj{Q@x*{p0E8y_6^haT_uMn7@U z){IhPB4ek0zDRfhAw6E8aS{#k1Y1ID!3OouBhcO^s-*sn83N5)vCxX}K?4WnQoUHw zV-3tfgu2=``Qw?bTW2}ybFl`zGwuw2T|qH1ur%deb*?d%<*DDAiF_3{ zBmm<1cz96;bzEB7SXfACdTA*}=B=(S?(}l^vcfu!v5x1de@Jhu>vnnwElYU;d;AV# zv`9rE^lRDP-Zm{#O>L|RL?>>ObvWnj>{MSWXq9okSPBxAf6RX z%Jy)+F}UP~LKZdYwN~v1X&&c2OTkcP;NjAEWdHImEM2o_rE3s*{W#ld*(J55`SMLY zT)bks)03xdw?8K1rU!nOk_}hc@-gaATDs#Eq`uTp$-22|)QKr=xtV^o<#RAe0zGN+ zy^DC_b6xO0BD?2vzbL9bqtGk+$x(o2Dyu51>)z~@x6ul;4{lNWfV$7_ZGC_p-`ttA z2?OO0!&5)x7`npS$-36}Z{H&MBRNQ-2+|yK{p+d0HMQ^af2WB)e(c5;@&g(5x|@EO z$~aelYh-jqcQm%{r!@_A>P! zmVr3vIR6dm$Kq}>P*SqfeL#!-M(%={A9zj%nkCuax|Jr_q}`>lLIp5T)vrIuPuP)q zVs?BHp^x&mj>k7bGgPS9C-*dYX7*SWMNzgE%*RnOsuSh}W$STR&}bCiR8@>=-=^{@ zs8GEw3<-^@k(QvIC;EjjY7YZF9nofJ` z-LomB>rgXr*1>k#tgx23#e;=mewYpnU z-mBLNvZ@3?m>m-eMGp1Byjy(Bxk|a z%}+{9W#3Ce8qIy`XB>#YcNrnmLz`o*K14HhpzlZnY0GYn!mzhHI!A}z?oO|xKG9h1s{8T+}e$4 zR=co7u2NW0vwaL7UHKBQx@Q~i>e}PMCU+)FT1(g$x<{&kksbUereFXoih(L787Hiq*@!MIwPE~Y76N1)VK<9<_ribPQ& zImPR95;4fr6e-jQ0<{XjI0&)ovIZ}g9uAfy@neIf>;J@}=d*Ki21F~1oxB9+8?U;3 zjY0Ii0l<0NN5Qr`J3}*1=rRT1i?mD6JJE|gVnsg4x2}Jgc;AjnFilsgFr*i0CU(6X zpli^+0=ht;z&z*=(ZuP^L$+FVkyS0q^5DP=PMMCd^}U<>l?sM(E_2oTH4WQ(j+;|J~))Rh0oL&TiuF)nOR5^FP&giX?3uEn6 zdx0@ne0+e#Xbp-PhUNZ4%hjS{YOS10K43=K+W(k4?w9Ofwv`unkBiO)K#%UPBrPIb zcfieW6G+Rbq~TnEJhk?_`SdrZ7GLNyzEmUTCJ_K^1e&^R;Z={ebJ1iqgZ0F0#msCBN1<@BOW&ImU!zb~Wd+WK`SqdckU%wnLjH*@V20!bYkYkNa%+9*NOQ-aFx>;@RAK=b&M0Aa7U*RWX z#o6^+`7sMl=S%Y*|CSbg=a=SPt_}2#Vepf?2w!bI)ht)ycUWDbMSGy>@1-A|8Qcjk ziY{qah)5Z=96DHzmBC+;82|I9BWmq>Ed~>HIX3%#omJ>0V;uw44n>g4nB(+eQ?Skd z>Ar1{d4@fP7YfB&MtU?t2R*wA8LDSb`q8ihr##)1qzwLf!Y-yzt*%7?1O84@Z9ceN zAU^JTrzl(EW^Jp1_wk8bgclbRh#!J_|f_{{jI8dvL-3caRUu5W~m08R!B#z6g?Yx+WKQTTp zRdGM|@~<2sLC>GCML^|H_?G|C$!IkuW-NGe?-iz5ck=6CCJhIcb#+ca#DMb4*w?|i?1 zflN+boSRBg;ttF*RulUJASSUaRhDrEuNYB^7=*Z)AnCIF@>K;ZT5aL>s2YVJu{|H2 zFW>1|o|+`%{WB!(W z!^zoIur#c^?Rnj4XxtaL_-&^_q{P*dV9Rw%7kc&p87&QOTT_!M&@$UO9pdUeK@5Y1 zba~1qfi#T+x8up`nw90|Y`t(6v*g>Qg5R*c2fxTNmbky(fgg7h zz#pO+pU+TXg)V*`p#tBNREq{!q-y`nTu*LFsJq_pLvi#^Dj?sDy^nzixNr;N@jyjAA8c zw;W%Kf$G0|Cp|$(h}>u2nC@;@qwTkm=}QR^_D4Xw7XGpSVaxZy+%96R^V$=DUZ@k@l;ymQ+qobW zhc_NK3*Q{J!F}+l*ImHlav14w@S_Ie4_+E2QW^GWc*SV(9mpyZo*NeemNQ84DWm0cPG7w>x)M{mTQm zPnVIeGpr)J{;W<8YQM)E19fxNa#mB}qfud6MoKXaw?iVFqIoLq|I+ScCNMkh4T~1u zT8`$%JPW0w!wSJKNM5Nn-)gduHj(A`p4AVkSwDHkH6LsK)a2wClBUjk|N3LCwwkq? zrfvPFc-il##EiN$$wojso6AViYT{IzpR3&T<)7vpEG0Q_i6roj0l6Bkd+IBb8*i zcaC2GQyZq`)$WL=9e`Wsy#U}o_l>0bi+U|L+iMsg+K26erEGAMulvub1&Np%yTR4C00ZfjB07O}X7YlI|QV~#(>E~kw# zEVJSFTMB33ZSA6c0FZ{bsYuRa(If#~Tc0j&{UQcqBce^ei^-!7{GuNbVT71inUPo& z0yt)qh-#26D=0>YDl12qr%!9x;@8KXa1at@WqV`wzBe^7lI^vND={&JX3wG$tUwyj z9Mv^kMAJ?NfCO`S=Y*N=j(_jrKsY;h2ewtzpInDR82Gl+mF>T(1 zMOvq*oAiBGu&qlDvL1}`xT=o4FNM?#VpKAc{WMXLv z%&c`Ao!DEOltNL1jwzz4MkWE3pxJIk`Y9+<8^BmGnb$yBM@m#PBA1O?o^cISkT}Sz z;VX@LU?_>ukiw~p!lZRWy3M^uRB`81`kvfQa*q)Z-7gJ5K;`4|qkjLFN!~B{ZD`HC z-?*35EEs~Hw;Xxf4kmLm)smpDe)+p?)NE}BA2fJ4MX-YB?fWv_R>M@FFbMYcB>-bk zrcwpQknr(}9=XgP8b=Fb(B^64KP?)Q!lXHG0MJ5yg7TM*pU?I0{Dq!J4olldvu6t1 zD{$m(jON=1w_6JM%Vrc1rR8WRj-3n3U46?VqEZBPBO%qtmw=|qFCSn{A?d;(h`Tvx zy@1yc$ref6aacR5#dBuzpNFlMVX6D#fF`qK>ZeYvm#Ln&jK(?v8Nx9PFuV@?gU1^B zO+zipVlkvTltJ?{%w0E+Vz2;cVIVTPtzW+Z5{xAp<-M+L092*t@#6iy4=Nc8;7np^ z$v{rz#ia{Rw`s(#!=3+9C@)EtQ47>M!h>!X0Rfdp)MdFq53m#@sWy;^Rm4uvC{GqG zP%SV|#m|QLg^UnHTgg_y(~YCW5{BQOfqOP$I+%={m$*ac3K770;VPfEx9#pRQCfn| z`lN_*G=0C@S~&nxKQ%d*+&)gyr_7L?Vxn$xLCnBdR-05f&>}ItYR9<2$Eu7CR^u`V zD1?zizX~a6;xR;FnWGaW3xr_g&%B{xjm#8~wWv*0fWR{H?6n2b(Z?w?DXhUs8F72T zDi0JH(zsxAU%pZG3zYs{24wM#iw7(fv$CW7Ofbd+e-x6be_1bgty2FIbT(6fEnN?c z!?1ubQ8^bESNG$Rk`lm_x%gqzi|XpgV?9A;QwYw+{Hh1WD?lDS2)o#RAf6eRK~F0voB|%OQ@#V zQXcHx8H#0SS(QmnF4?Mj;4k{Ut!A#DX*5BWgmKTxwVEZiS5d$-?3rQKB*UWZ`Zy>C z2D93<`II?9e=RU9x$^iem$igKdg}vm$0?ptP#*KnU65P?Dz~HhBKlf6J>m|6EiZr3 zCXuaM<=LC9Y=ZIB1nZ;p$K>SM0Ahdj>ecldFr7>R#og~DPW!gw0x-QPRs`d}NgZ2e zyb-b>Nqa!f(BdNNvMu@fvl*}y5p(GbGz9vg{GN22Ey@828w(JMY`U&5=WJzcz#t!e zhdp}|)e;X6&+4O~1#L9d!wleBs8A6PwaVQU2=RdL3_c-w$}cbt0aA&SMU?p!kf2zy z@Igv3e#(4?F8)M03vZ4t{%-cne+2GxQ*(&>-wpI!5wE>~?;D)SN4I@HPxd)EI7Wol zaNn&O8!?D4KDKZgeldlJlzx9fAjj)LR(8_>=TX_nXl2Gc+Z&|%Rk1j?t&z-i^dTGI zBZ%M`BsKzAWc5Udhvty9g!HlWtd@D^1u)kl>`*k`Lnqgje0=>0*n;Z%(bXXNQ%JqI z7du`nYdZY0H%*sjw8VQ7OP0i!26#+2

IBW*?n7@{Oc2Y`ckMFds1tZ;lbhg1=qm zkX=Ee8WfW@wzLZN@buK;ds$sw{Y>InmgMJ1VFdLa@uGVPZYejCb4J&Tfa3=RRQeUv z6{}RDN1aV5xrg;@(Rbh+f;Pwpw9~-n!mie3fBMhF#04nl#AxrAUsxfTc3?{;de6ip z3fU#fu7hvPEZ*>Q2oV^|+Kr8Cii);CWNY3jOb6_q5~f1RpNk+s&gi;NV z)j2%0`MlzfSUNars}HBiE*7dG9nR1+MKcV;9oMAFq0C}PmyA%(>oAi{8_8|3gwS(m z$VND5D?`bM!;ydFnTKJ{EbO^?5z zgZ6i-x*B(XWPhnjQFE#Lj`iaP=Oq4N?R_8K|9oTW40H!Ovi@US`${PbgnDcaL%IV0 z%p2|NZ;Zdw71q#dEg`{NFx^lu-avjzWyNB@YQWhC=|60I{ur^4f_PnY{QKf2c1X=r zPEhGWK7Ra_!0zWo8o96p&iXYM_;f^R?2jzj)~k>0`(po|X1QhD{seIHjuRDvKMNcp zd{~D6bI!rG?${SiuFYm{#2ev^?+ZU4_jGSDw|}%TKr4!CN}`M9#mD?Ke6M_;F_`{e z>F&E30th%kU|*ujYJyJhB?vf%6ocRcHa3bR1NH*=r->inr|InM459VFYIp2PN2Cw% zn!;409ls*>-CNQA^wJ%2>a33RBxLq&nq7a9jRJ85z87zAFpP z;GDmvb4A_KVuRzBj=#%yp({-Xf!t&3@nh8ijq^Rmxd4KwKm)&ORtBZ?bMmqf#eFF?k8D3Ce7~vh=?-=g{a>L)zIt51M^ePbCm_R+ zo{Br#nKEg}uXg_TUTx_ezgU&9(a0_!eE{Is1Cb&SuiI~*r5qirLaJesz|Be5=-uoY z2v0{!8Pe|Kb>l21qk^+tQH9&0mY1Q7X_rKDp1=RlI^i0~SIJSU%E$zWuWG8P8QbQ8 z=kWf+hh(r>rrU7pk4cNP{@+I;5xo7&CUi@o8MmPkSD&^dVrJzTQb5e+IZseFHg@sP59sNXN$=Iw6HD6pN6vsfDHw|^ z0VdslJ@nJq+H4C~20V?qO_9q+zvo&e?{;+g#AB72?>sm$stQuyDDu6CeY5qh#p?9d z5BnLvAr5%cU#ZgaIE+}*;FlehHbfmS%uV}~=FP~oUTuehCtp%l7VSW_bp!NVQ+V_| z0HN!@pBvEd!i~LBb}2ZHA}zlmZfPWt*5+79f32p$m+)y@rR>RT(#T7(N^#eV62=sp z!zM?zR*PSz*0p&rGM`dP*^TU>GJsvXq3%zl<4z*nM8s4mLxs}XLJ0ym`7^B4{*dD# zmcKwTjz~K-{ES*&r_v-W1i0@0=LEnc&u}e)kLGPcRTF|~4EA$$Y0GcMBrq+Do%j|L z!dy2!(lI?XqM47}m{0cVKFYPwh<=p2oEDT-_9=l+(^ME6lnS{vZx%n46*}=Tj6z2+ zizvDG3uy99V!KMI+be1DO}%NudD3w5g8~J(^JgGw!#OkKw64{{kOcd*%ykUQ|2vQ1 z(_mPVRsz4_yQ4Nx1dT#L+R+@zMa%&~DeHB!kplCY^|CYws5W^zqo-e4vs#-e4xLRE z{bYXMoq3YC6iru?cXpgIM=-Z&f1NHa*Oo4Pn>iFG>gjXo(G@jEMMiK5DNy@1ON%Y7 z2~gVy5g*^{oA4WASS?s63BnHDV6S2mx+_<5no#Ox3dQu`C4= zfO&?*78}2%OYoiR|K8NgC&N$j!3h3yy%y+pUMRm)P#CC81;@+@@GKD3U%fp~)fDaL zZ1A~%6nHI6zG(BQJ1{;nk+|{LuTPnao>4!m=?Ldt7w}@&c({n0J!&3z-k)nQUfO|o z&MovE{cO6sXxzHpix?NzJ8CdJM=FCO#?XVjZPZJd3rC&vaub<{!iSk zp|kLzk0P$MUBV~O1q>#_S#Ts|%_pa)r$IRbDE5LYw*D?n=Z5W(T(YF`8GVimgi*JwL_V^y^ z)cHMAZ!lDwF~{W0l6S5t@~HY_wsOd;YX8n({QB@}-jRTnAj(`#RrOC^jKpicXMT=H zU>wy7x>#UY09q_oeWyRKY6t5d5S_$y_ss`g-8ZuB%b=NGvqF2a{rs)J;|1VRqF`$l zKt}ZYS8_sVJC!RylY{4ujCATijG&4b-2B#%mt3h{2QxOrctdLphqu`-U>6j;m_*s` zo0QY2O^3f9SZ=fNv1_(sldq(yh&<UN#s{}M3D zJmcBv)k`<{+S(c*k6<10>XVO50?6%QJwavlPBsWVhVlsbt?Rxjabs;u*U3&A6giwTVx(XmNHLUN8jp7QqjQ_7R%E z!0_7S&lUzy{HV}cB(K*BPBv`c+!A$1m;p?QGs?XWK4;**?FMHbmU-m0wGu+dg2U{4 z;o!2uSCohkPw%$-a*U1RhbBeY>46a!(gtzciDx5r0}|WF`@5 zlN(nbGo|NBvuIwepO|v0^4%MA+{2UKdRS@Cz>VoQp|gST((z#57F zyL}1s&AQf$(xr#XI_j4rPlduuGje0$@1rkc`yLkUKdou) zwwouq@Z$--#)`_y(=|HyHKlomlqDl0wp}G^>}&t8-L3k&(&LHV+_u^ zhr=eFI-3pLtzEl4wLq1js2#*)mu2J4ou8e{QhF6W%^&_=dD2dcV+08Y#O}J%BdPgB zjdK0r{P$1Xl25X5!m^~R zLOJ)qokZn9hV^ocw1Zi@j?G3b*mhg`gHncha&q;?khYHckPMgv_wgSd9f5^%6$+v{ zX0a*2hTW_jIic6@9T8m=EijCGM0r{zZc>0sM( zA=D22ZLqmEZ!l8{$dpH7@Ph3bY@K(lg&ekmeGL@c^Q`x;1Dmc9v1ti#7%~KYI&>m- zOIS0Vh_4t%0ueFM3O1h78YtH@FeKdIcCw0izaT>Sp$4Uje9UpA9vJcX_O#e5hG8tc zKNCNnHXW;yj)%@cv;puv=*fU5z4jGYGV{r=1#Yn|7t({yo{m%sYyKC$$o4lmTK8_Q z`4I{oiJJixeea72vkn#JVU5<)$A_Y3sT_x42G^bB6qEHT!hf^1A=p3A%IfbkEp0yf zHe>)W&}QDL%1#yj7YZZ6`cwkW<{{;G#KxuF8^fU-#TcPgtfyuS!=RLP0h?W8R^K-0 z0M<{LY4w-7M=uHW>MR@XWo0##dRa(6iU4yEQ67347h}iz^fZUSdmEg3j=Fxm&akk% zou&KXr7>>YEXScrMRCwvpL5{Nk;ntQO9asUY@1JHc`(gqX=d01HF~W(Q_aQ-mC}#7 z8nScEpVr2f*61ClnZJdXB>{ z2uV?S*gEMWrfk|UC07B_djoJr+Vu(vKLyVJibdkR2Z_1&Ou#KK7Oeh!9cN1xy2AKD zOG()wW%3x!l;R`Sw@+U7@fEj#0rn2RKpd2biIT!)7e`H(!t#n&h2zDYMTb7eDF(jB zA=w_sMF!2AcfQ^`9dKAO(0Se*jNnI`G_)vRNT{+W8q1r ztc)a;4-_-#?=o2KV4m*sJ_n?PHh_HjfL%5aWCxg*3B5qbSZ700-zVQeC}kkFW&!&0 zi=-|}O<6dISZJ*M3A0^i!rl=7=(?W+|8)l58FLxO{X)a^crnSJCuIe}&-fu@9e%h3 z6K$5!39`l)UXMk`A@kbPS)!t%>g-(D1&HN6g5(RxFMr41JpP5*>vcD`L`z5KTIemQ zo9_#TnIrg(7s7iW5Mc`0Keno=um8HRL?RzxPQQZSLt^+iu?t>7@2a48D)1dBw{~^^ z__O}|I{4*MefqDYKUpVe+1&!eswVey;65T!5GZsXPuPtP7k4tu2#_EzJ&fg&kt3=@0$uky)2f1Vf(?sRy6JU|LTVU!uKi zf7$tu_-|#?yQUi`bjw@l>Lh?z(L}er@8nEqEA41cWXcUHzIA4lZi{RQ{Z~gb`hIcG z5VLbw#P{L;#f)rLzEXye{lRRFTT8vY9X$@`Ajw8m>s!*p7kffAGW1-nlH|h-jMr#` zMyS!Esy}swPJ|*F8XA70Oo!pf^XPus{=7Mq3Q%a{G9Il;ll|$6H?}O#(6;yYaYy1J z*qU7&R+K7T{6y*_pP}|<2s>ifm}o7vc-DQXE^+2!6!*US-SBr73a#&G3vPz-N~)e)Pt<_`JaVqqpq&jr}c$W(?Bf%`*np&Rs0vp0ijv9$=4D)M*>Zg9wFoOwr!n-U(kBgNa2IH)nZynE-lkxBIUcSK6&yA%TSncv;0V z^jR>7%VRV=A7{&s+6BbmLY`jkf*tN+4vwe!l!3wFD3)H2^09ONbYa26v|<8!BJ=pU zLkp#}EiBlw`F?fqlaU;fD#m_+6#Rbr!RkX8=b0nM>$;BM=D#4aE|%Jpy*frf2J44)M7+1$wLTg->Tq(th zGRiYaexCHL1FWwQqMts`Ve6ioOLymBC-THpBR~!PSY{MY8^`M+$zrzD>TTISmLtRd zlGdnV?zfr^IXO8CS5(q@@WbsMZ>LtSR*RO~4zhgMKG=%f?T=%u@P9qCs>S?WdNj|! z>>RsHxHW|K6LAZ~a-8Xw@_sG;AVz6Dj5VuWtd>BU{?Shl(3_l~)tjW4l(SN9ksfYs z^}UnLHWa{*ydij2xm^(!n*s}ZMf-JssjUs!@~5$tj?;@Wd4LI`jd%T2pT`<`9x1Sj zgH2fZ!ck2Vw<3g=F}%4t1$}H@pGZqKh8E8}jqb~zmg%?U`r>&a@%~NM&*neOGf^_& z3Q%W(0&yD*xEMc3rp;Ca3cTCd98SkuHrMIqs2r1h#1MXAkW1L0nR@cGU;Zx};ChSr zLxLaqpT{`GRZ~@vzs1LqSW8I%e_XwFSk!IQHA;7POXo|9+=J1P?Q4T%Ze;kQp&SqVKDw)lwe`Em5Il|z!<_w` zZE!n1`cs$c-)Fr%AoHB<`j-9V_$Xz)T$MD#$EfrA3=(1sX73%EtwT>N658GbI8kVz z5S0iS7PlYQ9&u&*T*m*(b0%5RfB1(t^#Z|%0@eF3YicAIM?Zh&(R4O1QM{Sq-DFPl zoTnlAeM~m$X6NZX=NWQyc#KDP>0rb2x{#yo}DaV$)aCV>=u(UBslWSV03$5FUL!rY=qvmR;eNNTM)7?#EBtp0jz^izU*O1Yj!RFV`JK# z2Y&8MCvlgSxtytz<#V?v_sB0esZnNRyRvlkeoJlWR!Hsl^uzhi4}PJ(B>Y&JGF2lk zmL^}(@7mRIy6jf~By_Kn2~Gqer;Vh}7ImNsk5F$t0&=eZ_ma!bVs{jU%V1bDABSPQ z|2^x+Wb1c(R}t<-|9}GlBU#qS0&faoolCbWLqn26u^6%_#u6n%TJ zvPeF(K3~pFHtSb45zkY>{(7_eG$JA*>HPK4{OFq0^3nRJdt;e>nhK6RM6O>0jp?|z zQB&!R-rn9U93C8N0)FqTZSM+KWhAdXpv&RRx$=QEhoL?z`L_PqU*hnGpt?`Tx`~|( z_z^yOXQ!m3^oH-s=GB($ClQ!|A1ls~qjUcwt!q>8&}MSM@41h5pI6p|7VHDO?B^aY zSdJ*Fy{?^-bM6QYTgrBPXMVirc_mrX$86@GwOd=8b(-7w6KG1e3Um=p>5uEOra~QCYFltsX4qiX@KXU>272p zf$lxO;#D>@gnr3HUM2Iy_ZeMGC9m;gKl0Hov2ZX+&EE65$=-6XhWc>(Q==oj0RGex z;NaYYD1;^I!&7mD@s>eg8A2*1D?^8BFylJ;_?^B4`oJ!Ptx+m?7FP;ZItffhSwHB0 zkZE?U90qpn&fM*mI(Z9%V{SyGy&<#uJ7BR4bprRdyy)raC+KrWwJl^B=$Y&?4|ip{{w+_3k%Q)JUH~T%CWU zf@uv~pHcBl5EGTrfv`n^tvK+cQm$oT`&@FGMoIX>e|-!*Uux`GGsCs`vYUz)422ks z`VXqkk`i93lHVY9EkqGhiZX6EIry)zH4<^a{b@F%W{zC^7EW-JZ|{)k>p?TDh=z6q zkc11xrReW?XkCI-5Qzs*d(j*{3qL4oV&;dj?r&k%yl14R;;h^-3Wv1;R{ zQWht^tlxV+>)-t@{Sw2G_2YO0g9~ggDq@gvN@py$6bnhqi}Gpp>iQB0Z?jA#-igu4 ziY-JS*2c!hV({34uL{#A=q0pJKU(7QAC`T)b>j*u{7ktiBG!Sk-)}6Y)JRy_kgwRt zoJG4V=CO6?uLp;HVlJsA7Q)hnS*!d-i3a&VOu8tQBJ1g#;*gaRoOtqb@pY+0L>BaK zT?8C|cQLS#m6jBiQIL5g*kF7|ca^xF@AuwTyC3K{cTFPrP}X13<&8wLzo!c1HGYJB_rsz6KX6-# z_x$(HQt#~IC*Un#*sGcN=t73X^-8=~<1j=gsJ&4>0@Z<+sQEmL&rDo4v=7&cGCBuB zw6n7l$1(+B;HW^)EH=*)b?QkCaWbe^n$g;IcO$t_<=I`5cYzF#xV`I;`qD=$o{GJv zr(fvzcd(NS39Q#Lnux!WS0Zy=4DI~;ImFtj|C$wPiaA+BreR7X=}z2LWg&dKGcf1!~dOv8F7ih?Xk&2 zMIZpzi(U;VnkvX9Rd0Y*Dt2wCr{cjVhJ-`rk>mBm@FQc=2P>pM(! z_-?^4jIxay2?!KUKv3VWZ+WYpY9v_vkXQG9Rw}f{P4}DhellkWtZ&pzJMs8)a*rrC66}&Q zAK_%Ho~Ap2M|XEOfrsZL#bma4?98+^5>GI0+c{lDSh;I#24K*BcE|l=hW-<$YOPzS zJ>vpow~P?WIs=1)l)(LH66$MBH+9TMxosUWT|UmD z$4^mkyW;JZ1zo<(jK_MiT(|aFaVR2u?ZFjZ-BCQLwmz^q@=@1~92_3f_xG(@bW9ur zctS^tN=nkG6Zp+c2x-UQTWK3aCl68H8!qS5=H$aq$c~LwEv2AK>#4&xeF;K8t`%Ih z5v;o^=Qh^YLK3gedX)4G^MFFU5}86Y2NIa3Yy>shdCl!`nc-6qg#200HOcPY-JaJU zUkP&{;T1`HrF{za1ensL`+C~&#J3~y`8+#f5Z7PsK?B&BD2;B9i|_WN3lOj&q2#b3 zd72hZP)N;zM1Ni`m+0fm@T0m;J6T(twDY)@on(cJDHmVsVw4?#2R?Qi28{62Si)X5 zXM_q^AV60Zk-0jQ@Q`Wy$B(xPUp@M5J`-+DKW5xi7`z%~4N@X^eKWDum z`x$572E3X7$|%1}d9CaB`gpOMgXKfz!tQGV838yNJ1&a2zba5VBlYQ~bwwEvK%`E6GbKmC>$1>;G;;~gYo}c2Z;`*0) zr})lIpq3D%MNjQJ?KVtWI_57q@)>8}S=RQu7B`11401kx=9ACJ(ed*YYXyF>yNq7ro}I0WC5l-XZzA`M!qL4lxx^ z7l)J-NV|aQ+wV(y+x7JXgx-gWcf^koUi{M0N)jgy%KFYnW@Ma}-NkEN9s}Js#5X@4 zVpy1&`v*wR%%3VVI1ayr#3gvRQnAvTLqkG^yfIpb5SGylh=iobZ?sDuF`YEsUy+_p zE0&M7m6cf%wVrlR5N?fupV!zYAfT_;wIK%s@aM$&Fpj53XafKYw!5b%*pNAZyMt)J znPH%|)W$d2{p0iN3$N}~O@iGwzIic=j*LlVr;898BX~3DPu0o12DWA!sL{t@Tix`( ztZYdCY0e8M@giwQ0`5P+7yteFZp|q-X^sX zUU^GO;}ZT8u1)=Rdg(h|5%|~`fA^03ml^mT(>0_XPJhbz4=@ZH)u78hIIqto_bE1A z&>pY+Z;4nWoY!Bpk`RK>Zt19|6_MIKwktydS`Bda@ke4cy>!vy> zN7zjZ-Aj^;?e!f+RlUR||4z34nfKb}e!E&}Nm;kIbb;?jj*VC3d5vI1)nDld^;+2N zZ(CBFgk%!22kCF{CiB*}BqJy+Ghz#kqcT!)*6QUUiddy4w{e~wl7Ak{eThb{nKB>f zExFI=18W%~wPnm#mY1zlq%-MquGrh#A3i)+ieeGIc=2Mwt?wV65mAirUB)k49kz3D za4<2U$ttoI<_zQW&-+76`DRZ-i&bc;V8__8Q#_MAEgg9>-q{VDt?y13>{|sPV;izQL;%)9{26;C}K||X)31f z%F!cJCjX>KkRJ%8qrX7~^xD4>l&Q<7UeM6cfT6NXm&NCF@_q4r`f-Ewzn}PYJtr5~ z2I!RNl?l%;PWuguN4l9pejK^ z9;1$mqSYaywhw=?=#(isG9MbHh0@zlaP6oYKPEdzf+^t-lA(3QLjaph6*?JuO~!qK zH~0YbX50{l?%Ev^j`HqRaCN{_@6Q~nfR4P%$JufQ2QQndrX7rDyBLbHug&$IHx&@x zggra;()Gferjycn!qMO7eb1NbAT{ioW0*Zy4eRifEAIUG#Ef3aw4r?;p+)c;TXh|% zoZ|K;N$Gk`R+)X>Kn9YG8(So6u!t`b?>lV8dvu%$;@CrG$RY)RkLSnY2Ff9CY~yPIaHY*%D&! zylJb{6-gpu>FMX!=YSVVCH%tuJgZ8`NZ+W;NR`r$-ZD?~Xm2xmB$=_(^(_aNz49hh z;l;j-?h}jPh3Q{ud6V$H6JBUs2Bx$KB|&Z@L724NJ(qt`ba;dxNJmM^+z~kqsHfLo zu|#PuCJ8n(Y?BI`OU)I>)H`3J!s`8ThX^p7sljI)J#rmlITi=K1wb(u*aL6u3>HF1Elf zp%`9=fnA&dX|m>N5_CoIe9Q3-{UT+kNEE5+0hSh_COTU(-BuNO zTE07Cvm2Vo64`-ixSY4viMQeJC6QVtvg9&khGK6nWg&n~7OFip%xLN&!$_&DA`554 zxow@d1sB#L`Ff)@r4yCLW(a@cUwI=!@rBl@%3_T2Ca{JxM&D6`pJ10Ejb6fhUSJzs z6R+9KsdNV9@#6G7CG5jbFFZ6-!=%hK4) z)MY*DJI95a+OPNb_xCtePJlUYXd85-2bmi$Tq>b3NSD%BZ+NF>7FBBzh zQKpMhohPAZC*!P=Cn;maU~7~7yIy>#Jd#m(JT=>(cD6T_e=d9#b^j~X;A42?XFI*a zSt9->k4{uYM2?StE?uu?HHaf~RI{f0O85t5kT_9>1r??UC%(VKhsB;&&s&+yco~>C@cO zP16m}JTHmFEj9*-SmCnVgX7wlkNnHU@@0pIZWAcYzG`~~+NmChFG#49*4y@5FlO@K;86-T}f{N^v{=npQ~4-R1p%#e*!K!-Lc9ftedhw z{4S+H*U`TwaV2Ht4e+I8Z2_C63TG!-8T%n;hC>Ks&g^si^DA`OO%9)>I%^x2nU>3b zB`PJX52mFJM$fq{U0gKI+Q&@t|0sR9_VGgc%@?+nH+ys_(-W-MH-n4^&GjEUQ55t1 z#ITpz-#QcREo8Q7zuDLBeA8MtFfh>8mdn3;he<#G;ltZlmt`&x0mQ{A)bbLY5j{q# zIrn#$Z)T~pQOU&SD-Ha+rA}ijOG>_;Is67O^7burjDw^lnVr%`tdzuym)9*}y@T*M zF>_s~|FCV9^&&;DXrzuV(ByRBEjMOY8t{Grq>Okpa z=yra%W-vZQ;lWWx>w)^Kxsz!9Npd|wc=0)#>E>n@9JzP-^GtretkzFcUPU-Ez+EHh zZ(VygZocekU097JPnFNi%-n3Lt(8`cY>&f_Lu&S}4vBetr>+w2jU zngR@IO<$jv)LgyRR+S=|vecZ^O~r5&pCK^3ad$I3u|m;rIN{CEP>Gvp)>pKX-@EJc z98Q}SE5_FmRTREz6iF^rw2s$DORR$`7|q3Ut@z%$kooE#!eu|mLD6%=bY=c7X+Fbd zf zJhSS1?dp@nc87m}&!(f6V+Fs?x1N&UEcIFT+efAR)dM-hCW+4Ck_4CmbtfvhGDK13 zYn{ZxD7R?6<;T3n`u}|%@78$oQk#>}HJuNBiHS&aXqoSf zMj(SSVf#zjDEfEo1cr{oIg!sr7%4c;4rjLN|NhVGYespEH@`k{(&V5)ZZ}Pjti!^J zh{>Z*b(U95O~;)FJ9@#z_4t8!VuTF!1Oi43psk7`);8VVWV1wzT-~^Mt?xb6LjXmTDIxyAL`7kx*BewuQ|8y1- z)>PqBA)lTr>9{#6Y;uj=d5 z=Hx5{T{jGpD?&{QkYWM?TIn^OiubmQ3JYz(Q&9kh36N+Xsf0+{G;g);f3!*#$}Mr(eemB5yvS~A2VaN)CRh#`sCUeCy4>c~QuZ>Zd0dm<# z*kKE2^@1W(@YM`q_-5G8o%>R4UJiRLlR6PO>KrTaqQF&7LRFjiytU;CQ-nUe1r)^@ z85yu(dnX`3`TkL(R}DNQ+{a=qJE~E4Z9p- zYeUn3CZh2@$}BP_bVHJm8E-113YwF=ev9sXm1!{?8ZD=Z+?JNVFk0~)zuZ{#M9qgs-(RFwX~ol? z`wZ{_H06`iQ;!0o&hZ>48I8yJ)gqIFx$XqvJdfX5Em z-|GI8%V2i-@`wE&bL3TY?s^C;op=;Q=>7Y^yFeK?bz@*=V{>PstZ{L5h3wq|L&iwD zyLa!xu#r0g4{dgCPD@PJpN2({3qb_mD(dEa!R|w%kZm~lvaL;qsuq@zzHPiKhgT40 zhY%dkYb1N^TG{_T7LWfPi-kJJOl@GBUhhEh%huLSjRMo+%*?1?A7dJU-)!-mg$wK? zMH)Mgq!?bW9b%>rHDWQzsv!`tgM-}(y{%IaWO zSI962w^(-YD*|6#M|NTZTmu&cC#p=(8NeUL!v4DQZ+sKi@ka}=UH~};jUXlR@bFBs z49fzBdwO%GcBw=odc&><$bD5Xf;n^slEs{FBBkCwx*hWsC_`Jlm= z$_WmZiP)4_txxc>ly>`5s$+r+ND&jV1m zZNYUJ%{WmuJf8u^maINA+jtu8S_(~)Rp~?n52Yrbbaf5uf^WDzcks{1e#4&spNei^ z@WAT7nof*edYWF}bZdT9&OV&dp1nstVYvX4Q&2#`mvT?NC54FAF674rAons44-c1SFW&w%JvSFJ z{z%0Ie`!O%Oq5+7FH2TdmRA%*e!@Hd@nde8C}t1#QX-D+T}+@@>*Y)Ntvy z;4l$f$x_!&zu-QB7q)2oNEJT}i7}KWH|fgE&d!GSRLZ(Gq6;VhHIOovmX>lxuNd-D zk1kfKJ7L3rzrFbC?vEqb^3<}2jo3%iQ4VY+#0E?A!^4~4`>CKv)U2zkYxDwz&q<-u zFI?zbPb}qPQM>uop)BN0aC8bI`l=_QpR=@hgT)IhSq=fd`XW?ZsEH3Ba{OOzKpro? zltNWYF5;@@Tvlc#o*=5>_FVJs7@zPd6uyAz?r73YRUHMC*Vwbq; zT46pD6T8H?X&CdN{KcqyZqEzCSb$tDE>F-rT4ynxV^hN z491=XXkjoNyD9&SV(iL1A66mI08fzr?y9~z zlc=mTm5!bsC1fDC3CjEp9?g?+*_^DPbkLP>C&1oQK|4z$t~DmmWM4s2CZ)x;rg#&U zkuwT6LiGtFnFI%3acBQ;YM-!LRHta*QrH+}?)`IAN5|q&Sc97>$!i|0O0na7WmVP6vX)Xr&T2pPHCTjP)goL%TDyO0^vKi5 ze)UReR2Xx2b5aOzxVt-YkHCYZLfT0$mE*$QE$buFv&g^d++d`0b6ba!DrMin)inp( zK$yErJ;cNHcYk~W)zHkY&Iaon(75xPCf zm^^%sdCTfvApBgN@Ftu(V9Sb0`^SKs`j9`!B-50m>dg>Mp>72)P9ApP zICTSvB}YfcRbr0gKi^3&Y|;k>HPVo|ki8qgnIF9ko$!Pl9w{pb3Q(7l21A{xzhTIh zP5@HXOo;|z(4DM8ovgNJd+YGCI>35(91@+kuNe&;RYrusW1cd2;O$##yh2c{BJ}2D zNXl?c)92tEmVO{6ZMhB!kyvgd2vD2Z7`TFxGZN=iLzsWQ_26zIn zda4x;8g3iZaoH(2CAe&s44A{5No1ShN+vQ!KORmFv?yHT-0x;JOovi0K)e8iV}ZyVShbr#BsUvVz^L;5%hR# z?4%4~SKI(JproMeLm(jqg@o#8U`etAuH}h_%yq}Bak}h91$;h{pG}+TG9y85t+QD=OCB>hhAMiYQvHB9(Cir~B`u5Al`h~Cv%iYBG4tlRD716(X!ctRmG-Pd;bJW@q4 z!o1=&lFo>L*8}w$|0NZ>Yz%w+tpiwab8J|xXFy)?{;a&Uo|TfAn7Dc$LbyfswyLaO zX3NLL#^QVOV%lxLZEt@D1JU6FCf)4f;&Zj6{J^8leEO6rD6xA3d&NXR#r}T%akKq(PkWzUInLT(}}E#Q`AUHO=9Tc~`Et(lN4v;JTkVoOSNV z;1O0P8Ah98usg$0b-`nD6?7@DnOZ(USFwvywBO44XHq!0xwvqbo6lL@IeK3s7tt;%yP}? z|Hcj*qJ(id43d(PDO|e*9_l6PQUW(&Xa?G!(RLnyDh^~n&g5asIybjkiODNOE5H(Z zAm|PELqmtqu%(9FGBPw2pgc9@)yn=HH+%E_6P>@AB_IPpK$b2-yP!8NF=?@U9pb#MTz#Xdh8gQa^RDWF%F)2#;%}PgC>$RY0V`DSc z;{7EI?gU`4x_5RG#DzNPmyLwWMBKQ$Y1!G?ab<{#3Y#?fmoUT!=-if;d!C+%^YG{|wUMW&FQAYtPJn}Vkx0el7+)(+&&kQj)wS|h2oEwR$Zvn^YTN3WQ{s}~lC-`- z0>KmfBGF=o4XwC%Y^g<$M-RY+Ja6D+a<7VTi&Dk0O502?eJ%qDf|CQ%TeEUlzvG?s>~a!RAbBThMFbynD#%zuEID7juDzKF*d@Y6g6p7E}JI$@^mie_H|7XG}ftBI({S3ABMs=ROMezSIs3=QEK z)1FhM!s=*i1F=vis%4`8Sh?aq+VHU=8Edts7RPfonkgV8AWR4j?s$_QWPuWL&N=iE+dCTjZlG#L`5e<2rbO8A=~F8M8vLjh4WKR-EAu8!Eybq^j`PnkTa@kVjk~0Jm!39@$!C4)61?7{;kYO(I z^%H-$!jF6J`H;$s@V+d*r$;lTUB{7Kk(}{^`dT|Ps9ftZpUoN8ZjtsDELPC7>w+N5 zJs$wBGg`qG%LJ394E-YPz6Z-ID~bIt9{6Yv$CxqIVKaOjMtggm0cJ)gIZjL_wL zbcR6j!A!l{q>WnMe-ObUp6&j0{(ifRN_A2a$+ZI`M$0(@w?lCXtW3`#_65pOlJXHd zMi_3?K|50jL?W>=1#9Eh0vg7IlX+5rB5{ttl00rI=YjUHXEBz2M z=6*24XL#4<+x!Pp*jKiO(MTk+d+2O^T(~Nt?DrN5t8xCkci3z;c&rL7SWc=JslV7IolrJhp*N;NSXuXzb! zA%$s%b#!ZD-Q^ftqGjVu2VjjXD~;Hd?jmk%&(skD`!se@2V8Tsgw?VBJ-$eNqvYyO zpFfAexYEeFQ?dkL%sP$TjD<h_$IijgU`_Vdmj&Q`ko9e-!(&P~rS$shawQ$j zF?~OIjM($re6YYE?9{$o;x2jGBvcpt&7eknB8LA>=tcHnTMlTi2ZPnolWZ{r9#s95 zKA+y3PPzy!W!>0@*Sg2U=&mc*lqKrCWypy6BP@B95DW)Ex<9FQy8FMys^`KJbxhn( zVv-1TcW4eM3%pTah}6r$P$zkQZV% zdEw#x+tb(9uv(ifcpy#XMpF`X)JGegF+@qZbg01%ZKbxU>7h!9eB^-}B?}@CfO~}_ zGhYckhENaYI?IHI4;KI%4kze|V&Yoj<6B&Y89YgTh~9uR*zo5Y%$Td;8`zi8mZDXftK`wC|4+VPIs z=4s{S0t3CSFwz5VdkFTDrYRS{?sz8t&mzM>!Vk3Ze)yxE-yek>Ydc-O`2{u1D^a$m z{NOUOgrc#`=biGBjF#q&IGjc^d+YGtCPQy#I175k{;c<|?WM05vIopuKFg#Ny~~R@ z`ktog?lwk-t;<|3QWk?n;B^-CNce)xrI7p&yMpIs%Og=G4-YS)l#ad)pR-dbg`X9Le&3pJYiMgzTl;!;FlA~asf#+oXH&ZKX16aT_3G8h(~3-s{*3>r zzTZkHNIf8M;+(7t*%1CebtmZ=$k23*28)0%O=l^+fNq45hK2^L1w`vED%Qq4x$WtR z_E$moj`xxatd!{_ccp{x(P9Lg1iTXa%1@#PaUhoV1Mt%*(xpXK0z=RldZ>Pc@0|Cx z!8ZgUVip((AsY>j5*^;J!<>nNm8L^F3XAz)gY5b~LCL{TCPlw-=WfB513IQ#$WCCB zcoOc-L%dLm$_5ka4(Bt0%bIv{3{#<*!!Hb+6qwD&X6l@M9hda!SPO{t>KLPisAnn7 zefg;G%`RVBv8d7F?pHwI<%CBs)&hC=)Dt^!vMSi_>Z`aP1Q1Ua$qT;`}_K8`MRAuIy%k@P>~s+!pW#8 zDst%IOfN2cNj`b_0~3a$tU@cE&%lQPV;f-TUAIaUyGn3C$-diLlVa8L7+w1=>1;e~ z5ZsuGLeWwBM!N7)tnoTMPNwUw`mVtdF(?Axm3AKfDkk?+r1~zwHESIkN&60}asm%H zW!VnI9!P(fz+KVh^PQWL{Hgy5lx~H>F+EoA{w#1@#l+jFnCadb$)!2!syN(?Sgq(=KuYz@hhbe z-HC7m=V#PgX&N4Bf0|_rP4%Y7mQ`Z~7btV&HY!R)f5YR(##Hw7_O6N00eW|XSX%9+ zgJ%F6T?zMNrcjU_zXXiZ3}vKH9%&^%`=2P4)u^EQrgMWWQAkf=X;sxQuxf#d5W#pk zBZD9-D{C#}*0iD1OR94WPN3cK@5G$~d5!mDNa8jV8h18wrP&ZIAX{jd$$Q{ge0DZ6 zH6@*_X6;SruZraZJa76wfhdMfKJyxk@p#rQRXeMfyozE#`XTxdRcR-!~0!bu0_m3Xacf{myNIH7p9H(Xp|Vqzk!KY#v=$81F+*6q1FBD(km zoMJojK%2FLJvJmH!~jGU>@+3Jt5bnxroMfQBJosm)|s?Ga$eB2u- z$-oBnEvT>Ht-i_)P7J`9W|A2HnWHjVD|F@(aYJSv|C21sJEUi!d}lHUziR|1b1!jRQ6 zmKiFOhAHiQF!Bme|FQT8u&G-)=^C(swj!pJM5&i=h7-`RMXN>fZ%~R(mh9ehU|1%& z&@ERF6zkx5<$w)LVc{HZs~kO7=S&*wpIFXGM~8PVlV_uXnT~^8)L3z;zyed5wyWT! zh~@rZ7oeP%Cu%zRl=pT%?w1z%zrQr)7?Bq0 zBY>P?9tBvduWM(}5%`NAOL~7v--2>A&PJ4WuR8fRP&EWsfYiv=B_qzvZ~-*H)Soyl zTCtStr+-mcP>@d31`WvvVnz=xo6)yP(@G0)&5@12eGB@S=z`EQ0nE!C)e1!~>BM23 z)NEa+diQ6Y&zZ1~%R|#B2t0Z`T+wr^%r_z%Z;ZezehCT30IUs9Xr5SONI1I~Fqv6d zjBI8H54RWC1BBv-iD2D9Vcz8O1YXNn||9SjnkN-LH%-oY;Rj5d+ zVo>K$QfX`a=R94ZXM0}7B#S4YX%DW;5*ITgm?eNS(g-?KObn4g?Whjp-pd!ZOSZJn zR?9g52A3#+bV@6k zS9bZ`kNLK&_FdA4e-ikUIcE3M0I(ZV5iWIQf}V8x@`<5Ff#REWGYr&PTPWwaJu=`! z0PsMwJvcsgb8}lE{r;|C#{cS4_jv|@x3as>xb6u%nVC(%iw?vL^kL8gb$I0hp)dUd zYyZvZ>UTiqz?Y-HEX%s@JOkLcS_O%0eA=E)N(pRCw0{hZQ9_ z?_M)!Wso=y0<@kRsLu+Dioroa6_u6W-d()JD{;mdo#izPGTXiUcNK&1>l$7{ptVNz zt)euCG1MlL`VMn;N6DHWFmugr*@&H*xo=Dygd4rCVA&$$8>~xoog7|EVVBze7WVs|Nj- z$a$%M%r>kyeY9iz%X(*f9&!Nm(x=`8`1%GxD4-w<$#-DsprL|q9Uvq&g(_x6@b zSE2Sb6)`Tb(%^mj?j3yuQ!g&E4t|#Rwl}CeMnz-walW8wb5-1cUa|bd1v9XB6U6w| zPO`D#p`nSDMsLwS8}E7@q>0|;ldAoG0ir7?*;Rd+0BH(*My=r*gv9S3U#R)54#6v^ zZ~v7*5PNeEj3|)#VV_=IRQ3h8I5l2>b{VcU*8@u3khW`hco@;l zH)nukB6;v=<7=W&IKY+xUZS%RBI5_y;xFEu=@$eZ8a%l6|NSxJ;;7j9x21Z1rY9#) z2{gJP;G!&e?wb&63HQfLmH*z&Ba>?1iQ>6ZJ^+NS5ldoEDhhf>Xy^&`eGWO_W$oA7 z;zS+;TF)Rzq#DFZa1SH1=B8mNxndWjQ$}?kw#{{mbB%oNz((EP^37>B87Cqeg?rEV z;R=L{c$1KW$0K8^QIKiDu7$JqBqvzh$c;kY$sR8SX!y8QTn4K_JV2R>+kk_EwU^M| zzO}Ul3H>%@+PExw@)=4&4PD*1UpM%sf%zs^3)x4+ko*)96vQ*xRcXOp5&@cmeGE8J zVq%6?npOtW3CW=qGraF83wQ|yxzX0!SS3*$=up{ z22_Lg*ROG&je9@sCPBs3H7!k4q1<($EDu#xxETI3&Cr0CqJLn31862N9SaqG&l^HYO(Ra=3D>0m=v9+TF7sj5-o%SlkKo@u}sh;`;@a;8TmYcUUvI4v?7z zIo}d@A3S;lky#$dQ1A<|IfPwe_6^$GFc%T2g19+dspq<>KxspRo}7DH{?(}sv*@Hg&&fCa0tp>)%)U>o; zpd+u13^|el*QddU85qh90lSC^hoSdMMc?2c>(eN5O_2mzt@AMs*4o-cr_q;~mljNf zD$1%;_)^JVD8LJ4^Z$OK`Y;2TXP~AelTz`F7F;llyC|Ws6#&@)`q^Yjg@6+cRmiL9 zb5C($1KRH&TMqX3>qyAb(!PSWfQ#n<)*B={-zU6uc*kH=ItS?>klYp{s_fjH2!c!p zMNbQDpR1B!_ufjKB*)SkL~ zJbmZ_Fy@`T`@neDm{*lW0QyPgm7U~f3o)q$UeZYRL-qkFflj)CBF4IqUDhuV+-Na9}}g7 zBp9kJNVdDQ%|zGav(y9MfPKvej!E||ko(xKfUhQprmC(n!KDiuR9blgK4{AeI=Cxp z0%&qfi{XCAs$yZ*+#74V;$jQ#4`i@#f~-SBD-0w7j*1p*;ZCUUB_}lD9T3M$6}nh( z-B3&{(Wm_o^dt5!>9RxkCv;MWpyGncqZ^5Y;2VPBk>DeEH@? zN#uKfYq31}?< z#!(fg-$_n|-~}~5qvCOy2T{QpSZaD^KGm^+`#i)oGblsJbItM#hM@L39&waSN#E_n z394aa`IxO*%oNAp63WGK06&mk5u;9^$Nsy{;3hr?woU(0uI$S%DOPrwCrZ*PxwkUfA%NTaNT=l*e3p2#H0il_=0=>ZXA3s!Lbk{((<=PQ`HxbID z*~b>@l`@cuiu_EBjZ2=4z`JCCaN!@*L%8AxELqpy!9@$wzS3yVDwJi_0tL;$_vYs( zV93MP4AaC~v!44kaTGKSCv%H`hdt`sx~9i*JQAiFKc0V1y{7h{P>eg|coS;6!G00W8iF7ts!tPX1YvBPd(nz`$b=TSVDr z@q(CxNZ+WAtVmkFKkq_TJI^G!5zH;Gtl8i%;a~_#T4op?EunRLDCgmJzPi>nxS8@Dc5XJ*8<<;HeMTnK?o#(6Ty!i078T~K;-IzVFZ+~gn{F4)idygJH!jeRky>=+L7pPZ~x~T5tBn4^#CPD3Dy)bgRC3h2j80m9hyV!JU zO|l?>K=tVF;}Z>*RZ;lux!QH{PM%>P{>IuLfnxwjnAc{l&d~_lD-T#|LQdf8IywV( z=1Ojx^iScQIM&af!2H)^YYis4J;}0m@^^Xew7y}x;%uJv#wqUj7nsU@M5lLjdUPYI zx?mmIA)D9`ellq+iL~wvdj!;o~d@VA@0Pgp$U=>Wd*;57G-^wfct^k_yV$PK)kF+y3KR%bT~q#pja zrtT*KUKFCt&c?=={Q!BQGa~2Pjm?qOnz6M*>xI95e$PJR|HFc;pYvxSUw@5T!we&@ zGObz^q%mWhtI9DPDy#b4p5dPNK&F|6#Z`IFc(>QL98!$0DGwwt$cq5=Ag0g)=;Via zKGH}F6G*Xn?^qgC*ry^^4_-cg&}ZduTXOx;*5^0b6LN)U&An{P{yi_y|D$8I&o|vu~xY?}4~Kl#W6hWZoM`M8#nMw>&>$MnaFVy=36dXNIp`~Y>k^|1cjYFoaRw+7D?kF#bc zD7)5!>Hq0_eIwbHxl}Y=j5vTDn-eR?pXrv&P!f$Z6?9>sA5jgWBC3Utdk`85I3a@tkDU| zz3-e-G}FUq3B%phs1kk>l0Xe8AssMe*yCz1W zbTn@Of0%7_Yj_;CLCt;pW=&UTb}l2%S$GPu0*=4OJjBby&Y!R`PE_9ZsvX-oj|a?T z)Z4Pv*ubdkI0XG2QMBS^7v?-hZ=gWQOW}j}iM+*9#&%0!8A2Vq!m1M3We3Q-@FC_{ zQ2Fl+i(f|yQwj4^Y(DI%ID&Ws;i2u=Bk2-a)2kvJJqpV^&s-aej!i%{| zCF}h9RK@MLruu6pfn{M?ljH`i#|xoTHG6j7Q4=T`G4uS^ z4)CnQX-a^oy%ZUBa#g} z3UxRp>jh|x$#F145>aBuT4+Ua_&Z)B%+`0~xUgCwT?kx#y(WQ*k_@M|aNvG0I&$Ya zmj$#;z_T4(KhbC5x2uX@fahe~)pvx$ zOs;1WNMzMUvz}U-nruTgiKzA4=z5_|wb!u#9xubH(G1;cf+PP4 z)fM6^FJwA5E;Y$m)G!}+MQwPkQ9Jd8;N$X?IX!i&wvDo{gNOAoi9gRo_E5K7I=B=b zzMb|ZxVvS{dysPS3ZdGiSO!hy=dG3U764J618Ju^c|qR%f-B2QyXeJJsiO?fhB|D= z2JJAJB;E+jVb=XV@qnren6p4Z`7k)>4+?7Fw87o3*gZ#DFa>&weW0(Ad=BBq^W?6t zrLi3djutw6{krNc6P zg-0nl>Dc4*Fns8xx1_aZQ%gmDiw6M>6#c)pzh;z2JWNDd$F;i0c7vr2wqCtqO}%h_ z_v>W6VVUZ5zy>pq;sQt;at_ns-G{3viNNU>hR5k_2wps6MSdH!K@*HQPnJ=)x|hY8E}3xx%m6sWo*8BQ!vsKHR^ND z?GrXh-Myf=wqH_Xd1~`MtD@uBWgbRy@ulx=1I`GxAc$b5($7tZW4MYgB{6XiAe z&Ey#e2yWc%CPGjMs^|)P>$p6MI#1FN8Jc;ZKN-a2RaJm5r=#co1aq#!%fI4^E!17Q z2j~+M(AY8Wg6S^15b)%vLZm;|8NNwS=3*Cnyq-z2_)4;Xf>OfRtezuPz2?!zJlgWC z5+O9f`Fgb;rNLDprV2Ek^GnWNO?-3UE13RpNk1W&W(H3AYEvtt#&=F}Crk9Q^$ z3oUS%gg_W0fR(V1g030Ju$s-#)#f$8LD}I7-uvYQd}t+91z=jrn)0WWJk8Bfm-WeW*r7a{%x2cMFGsgVBn`tp2D z+YBG3lNhKU%)S+|?W<7PBfFvUTv%E(fm?sNk&`3LIjZ>*CX4**ZGeiYi{&=`fe+w#QnmSyFMLagHc6#FR(03=F;XFD#T{Tl&rP`^nDxv;>nhnYcby z&qc4SF1eS6R&2a4<)jKe6?*BHM&g|8rP@Q7ofC{KkIOREzX{9?r#hB-c7QMtP{bWk zHaga0G2`$%{M{Kuz|_w-=dkSB^Le{hg23sp)8@!Jb#Y7T?r4l$q8NU_`q@A>O;>=N zA@=v@``Xz;Zw_#YT8;BI-%1x9wE znIR8I^F@u;Cl#zN*k|eKSAW3z;w!u=>9-|$8Y&YZ6}>nQbHOr)$9lZwV%Z$A%CZy` z6zlKX5*a0VzH_M)PP&3pL_AO$ro-2Hw>dek-Y}kdc?(x@7}(hJu+wZ zeX2Qw$`r*!5RC>B2h7DQCA4wh1S0Pw6bn?xDK9bqd}?V_3GHaIuRBpbZRy$dGh+Od zb`XfK^}7>MH&2!5@otu8Ix)9*J{0rv;kDUDRyjrxfmy&pd^|6zt0w1F3r&Je_KO%# z;tqv-s^kH9)?hiBy0qsOz{@=UW60nwyzZ^Bn)S0{Tih7Yw>$^MUty>UEtTzHMEu~T z`iBqI)UyP=TSpq@q(gs?;RhTG2H#Il1GZFeso-Ct<&~VuBlKi44qA=OhwO0j;oz%u zXf{oO>4cjb7Um;ST$Xfl3n_-q)LFXhgO~hWS6E9wjTJ~AYY4!A#PCaED(&8Jtdg$T z{7EF%r0Sg=1ck+e1f$}>bF^NJ@{Y8J0Ym^~MzcI6!yY0PNE zT|Ot0A@x|~6Z#BtqJ*>~s8bZ5teeR9veKC0SGw~rtH$*m?pGq98QoTKL)#3b*+`jh0MOHa7|08xJ=XaIyhyKg1R)n8hun?6&Z56GmO`psqeO2&wTK;pzwohF1&nTWd zzm}lp&gxNhJvABI8swD#Z^CV%*OLv2P4@fkB7)qb>!1tkQE@4*7|Pv(tT&f;!U*0k z1A)Fd{xuDl?pQC}4~HT5gAnJE6Ikg?i4h-3cWC4Q=$d33!<+DG8}ztba6X!GQe8^B zB^t(zx1tl}0%n!0ERQpkE#3*i&ga<;E_fjesfpZ=@MP^1_!d#j_j`7c7XpIAi^^l1 z)yKu|?+1_eHdPMM6W7jwFCG^&=SD#doqWF7!qjvSMoHBG7sP9BiQ-Md`S|$S zQ<0h_{SN@`0e_q3b#D6a$OA?-2@MUBR%Ql?6VM~y3l?2~p+FsjoAOG;;oa8V-2*)ga=D34nACyI*GYUSPR3Zr7?y~Mn({MA&yPIAb z_^X#J^(wTv?%kD8&k+-vjt^*iQJWPSpt7FEv5Z&E!CYop6^5lGp-rEtj^l43o;G*o zZbn?vW%0W(0$_XEF8WNyxM>T9f9>E0%cC78IZF%1?OTiyo9-tJEhAg=`v-S;*v`SI zhGLIUBjbmiKSCmg61?P#&;(#6)hJxQCSuu z8*`n}balO^W5*=Y?LrA;oOVy-T z6-fo0)Q3F1W8kFIVtGm_JM^?5S!#a@kN65Me*LbJ{Hs+nUfD$b@3f+YAzwVrCJgU$ zQLqgu$3*47ld|CPa#4*5Hc9mKbI5^B#`O&{Cp#xw+om~CR)xG!)u9JYxft+XyuGwg zWE9pOhRYk>euic!Q!14qJx{XiMAEq3N4??uT z&dmB;`tyB#eV{|g=^uUf4iJRWg7WhzwJ^;13L_IBz1zBg6GDt2L!4e|O^tZbIrKOU z!i5G9!-uEdCG*7<8RF`eF#cPLS(TLA)Cd=qH8BOopR7tDp#g|l=$b3oB}y<}(Yp+H zfYeivP;6w$&-$X!!tf{~ap{ly2N{tc5BU#ha8r3r{`?zP+~zH$-`MJtiUx0)9{<31 zEq5bSLE!=(|4uM8hoP-_88rtTVK`5LgPR)`wK;T_K$`hJ-Nx?Mt00`Um!i!4lkZGt z+~u+Mk*L&~-vCgM?2Y5?&#^KeR!$G;xl-k1uzJ03>gRHMFE$G{tY-bI540c7#=#Kvii$Z();L%<|scT zU)HXR1NeayJ47{!-TVN9Kc;M+IDV%Wak$YgkFHOWfiEX-|1lCeUbA~jr_$IG>j*<6x= z^3!7fS<(vXpxMqA<77#5=eiWDf=IDQ9WKh=YD{d?0ki4ufDFCd%?E!m$!wZKFXL#= zta#enKjY6_f$n`uFt62cNs9>Rr-+CXOayiydcK)g4y`HPhY>PqD&e7{Af_V1bT|z? zv{&{VnZWd9;uBh`61VguOZFfKBnK;fLvj{aZ;FAl#J#;-T9&##yx7VC7ZD{ftwPR- zc)L+DM)Ej+g`#{2a@h$W5A^r@!U!vo-9Y`w;r$U9M8aZ>-VXzsJx>!4iptB!5hLa@ z%dNJUjykW_DD}f%bTBVMj)C8kAZMoOi^*+pNnU_Bx(q7I7)!Lss~lE~5Z|>tF`H{& zzJ0r5la|EwdGy4~JCLOL`%VW!k{+XyWjd;WWq3Ar@xryIfFQp=ef2`hscUy_K9p2m z63;TOf)WVq@_9iFeCf}RH>9Pm5r!97Kd-L-0#)B-!1OW6ZgWMXb&4!HTgY#vv2L&* zBqS5aqTYK*VVz`#48yeRKfx<+?o_Yt&fLbwZO6Fd)HHMHtiT*TJSTfr@*}zm50q&n z2rUK5-X}Bhd2!2f_=PxpihONPOgPzU3zKT`LQZF_2f*X%@kWneJ`dwbf2Mq0YAO>p zi|dA=6(R%JlIVujrKP2?!yph3P%#U`hUcu{y+>YPxed>*KPG&JvS9Z`g_*1B~zDkJbKYLM^a( z=ARhclPpyHmFFkSC{I~yEAo)~a64OgT|CF?;>u$u?3$>@VCQDS1`m#%RfxxVjay& zVEI97#W(}(055UNrzdV+T>t2-T(JdBp@Tp_7#k0XI2q=*dG=C=g%)+3|2%*gqATWw zgk4%CPE1BuB_*Z4Gqv0DcafO~yK)TmSqROKnH{S8yxz7?*brltc`>ows{@MT_Oz(k z{0DkUcU({s>6>8d)k5RMqn=pJ6ehyM$G7k9;eiTo@Tf0;a3vxt%EZ)k(<~nB4J6C% zd6fI6i0Cwf%S%Igz5fGDLkB+7H)wsXpSxF)vZa26;^G|U^i&g_e^UNjLg5oqyv+_# z`&$i=3ea@@sp`?ljNXmFcgugg6Bk$Bo@$AFIOY7|d~lP5+-^$elk{ydW^2BCbk<5% zH+OfAKge3A@%;Ji{itFOz1YDe>%-tQQeNN#(shh);*8(yd6K&7%f}bSiC{p{3N)@Y zzR~-;{Zg9bMX7E(mY7gXKx=GW$&}15hU`EXX~gp1W3!ty)BqM_&c=E#3<;A{Oossr z?JXemRy#{oBN=G*(m%GP=ogAZuULXJSi#oNt?mDLf zW(6biD=F8Wlao(4uYC-~v^+33U*s6!vB-jJWd?P?j?b6%2;HDJ_o_MTS`ud}?NAKl zeLz}v2HjCaM4elH?0o7oasq48I4y+)yPY~3^iV?=h^>SZpkkt9X6BO1L%LN%Q$v0x z-)01qQgg0p7WDgZAwHg$^7|G^oaIH4@BoJEIIp$i{0GqxZwzZLkDr~o`ZM0}gE#wT zpw-A76`}8q=tAA#6BskOVU6+ujq71)b+S3t(wh_vH`R>l&x!nTlP|=C$z@uc<$c;F zAc`N2U(Cz7>MJUr(Pt8Mgkh=L=Ubg!v(TM!6&JcW$tXqIdMLp1DUcPkHZUie|F#9X@5tbFVxt2+hqE!sLHX4A}^7idpVEls; z!B(sek(>i0FTW3+ksJo>1d~d=`!Iq(Yb^r^ScOM$aGiP)CG4jI#@1E8Fp4hiY5mDe zMOL8=B+Foq#of*@&H|{ErD$ePH&CY)x0E*Cwdf*Ks8RQ~bVc4(G~{jH_}Ka4&<4U` zvqfMmD^l4x+?MlizgrWPY4qoLtKOYrHTP%# zS0f^#+0?<`$Clood6|*=-2+dGx`Jvt|0|D>%sE?I9M|~o@lhrPe1Q>+wzf7*Q%F`R zuxME?qwnR=Fd*1uGHuf>r>=svdP`c784jSMt3W6KDhDM|PaS#4KcCVu5EPIl>iM~k z%0RdYjb4XjB2;+1w}1o-!g#L|oE0S3#b_w8 zLO96gS60l_mx0Pnz|7?-Lk;bw{5<|yYpeR9Lq*U8LM>KwrOWOrsK7cCJ50P`1agRz z6U?QsUIq`0V)_e4VZ>uqu34~3NtCA`kRQ~(fA@~hCTDex_K@63#oqWR)z zk`NFOmH+)!q%5$#qZ4I&Z1gO_FnLDc$k;wn6`TU2EVph?*Op)&0tX-8=lOXGF(Civ zFgm`2ebh$cE1;;RHJF)PK`$}fmsL_a3lc*PW~bSUc2khz!3*p$$XwfFZ{JWHX?pnZ zy4D5R{&whfG&K<^JJB0gvA|%N20xCvRvuKaT9GhtVK`p zfSiyA3?o93up>bzDeqb(lEdgxYo;E|=wASsB{4oePO@PEEgg!#@dtJO{r^Ntu*7@e zRHbwR+Nk_{lK&Q%0!Xm1;4?lfcVn#!#iLIDDOcB;i2!%O1AUr@nVp&I)r_&e`Oc{? zN8#zdZ}4Sk;t~*G@*>9p7f3xkDs8u?x>t!JZbo{C21YLkys2c`4Lm?rd zot)r1z~96ReW59c(~Q73Aufl4oCS7t+^8=@W|Y&>(W!k_-~~m2;}I|Vpjbavr6Gj> zF8rBr&PqWGzBc@KG;)@=08MK8^hj|bTCNM&v~nsM&x%}yA_2b9i+3oV`L^YL{muF=$T?dwhP@*#;M-)|t2X90ZBO}|MAHk?;^QgX8 z#CiI@)f=T-6^MrP=5`~t_yx$pAQK%*u{ir>{2w6j+f5|tbO??d|2_@S5*qppmIDjN zn%I}7ZV42LxiXulXl*<8dXqUQm4KG~sKQ)$DubN|nC-{aC4Ija6#UOi1X~(`6`K0* zXa$O{o8j!19|dT3xy}FcQElr{k2&<>%k-49SAus2SPIjUzkIFf~_bb4-jnKI^D%bk#$-LTM zk=}mQqh<*j>zbt24VEE>t%m1s`ZM?oFYt6faKG&Pz~u_Vp_t@8qRwN)xHmI+~+l(^o*wL}Ep)n5ZygKxx zgiuj_?IH5p{R92vxZjnP2n0ou%yB2k!XFTec}d4vh(@UQy;DJ)_Z-pxwJ-SlN&b;o z?vJ*eaeDPd$>E^z3+Rbem_~AEHbg;Kp&EcH{$IA0?ajJvh z7yQ+mIAH{IW3&J|EIaRAzaUZmK+~WxncG_EE0yHmYT~$tWV7(U67-gHc&7rDJn|1gr#B4 zqAIanOfL-!P80t7nT{f`9nrgCpumEGBnT{&!LSV+reGxW0cx#g?W!#VzH=b=!k#}Pbk_2g1uQ38@us#Q*p32vT4DE?fiy)qhT(lY>Y`W(a;<-Np}~irCm7rB|RjL!UnX>61E;mM&cQ3Bw== z%C*ZlUwCT3ohE(YpqEe?L*@-Tdp2Xgbnc@8@AA2KfF_d5cV(KHXW?Ige@&X#?c6^g zM;UW-+cQ+wR>+Czj~yGcG#?ro@{loJb9Q#-rp}X=mIg{4d9WVsoq9*3fwi?Ys9*zq z`YR@Z0Xo62uT{yn zi6M>8N?zytxtHV`xeI%#iCrF$`^N$-LL(!|1o2|0#L4m0nVvP|9vs%;QvKY84D#9R z^uVaD@iD79mjLfCsj}6q?a}A`K#@e|0ZlUGxh-xhH=t>U@9*tGxrihYx8sxzLZVQb z2JmhrSm|%}8u0M)vmh-cUDEG-Amqci|Th81F0U^GW$QqeHJBe|8}&GgBKV zHlr8@l>zSRbxBQ-iPqbv5}6=*lB_pYQQIFOL$7aGV6^Ev$-y8;SN92-6>JcLGL3Rr zPX*2sO5NYTe%*6xV~e05PTpHvj88})dHQ{Ajf~Q#GE$t*fSw~iA4uyn`3p-+^fvQyQo^m8Z4k8ZiCy~+77lv?H=ed)% z`pLE3;q!O*#arN-ypGItVjv99s~?H8TrKbcdmbd>#HhU)�Mr1A9zl&T($3jv<+hHFy#Dd= zth=8}r;Sl|pgg>;cIE?Av2i*_bhNdB&>V1}(&!jnZ#FnMIDdXtdqv+@^zS9;HK2P% zO~lxY-=o68m6YWoOa%PVbceB+iig0FkQuU}K6G9_PrAB|nVC?>UMekH9+s>orvgPV zGp85j!Kv3&*49eA=HFnmuEy6qN7?BKTu4)ywofE7{p%YwrKZwmWV_ST5kLPqy>tkY~VM@sH8ERcH$`zuk z32~I?ht+|ptk%+NBK^a8TPEh#q6A7|EgdlE7Et?Ddjvla-R;a!U7~I!i*sk~rp9_R zlO}B3l}$}eTU+PS(HBEPLLk)Qoarl6Y}5PmCV|k_SV&KpNP_h(lmkOUQCN*W;y4+1 z5$No>Z@tR909M6ZXE8o09+7F;+2ZI+W*Yg0IXU`Sj`^jfBVnMcvs9;xRcp74Th^5o$!ONfkmQ9~ z&K1e5E$F6utar*5yl56F?OeftMkvA}LUlnH`7qNWy;3hypVp39QsvEO3EIRb=5eWP zA#FpcfAV9m8<`LH?1Ic5I0M-X#wDURLso@(79Dt#up@JjN+El~!6tiK{Vu-7TlB}q zGUVn}?aW`tbGVW54bGyhq5~RMgpkR!o@#!VZ&)(~Hq(_%swb_w*V&Oy{36KCPDrn~ z$W~yiF|QUDCk7!bVYI-gHMN>Q%#MMfDvqX(tnQf?OMe4~qh83o`oBgHsFs)X^tc_$ z-~)B~3P(M?*z$6LZ&Y+^(_mm^CJ&GggfS#l4;3{vKvZeUNrt>_SQ`y8YHY7~v?pK~!8N<4;7x68bxk`G_=)Oz1P*aOz&k~$S7(HW@TYPy_6C-gjLo*F7&de; zEMvb+l|Az2%>}^0AV$IsMF|%k2GJRSc*SIa;Q05dLZI_HR03BfC^ZqaYkc2WsiC1H z4!AV>c^&`_ckK~2`xdYs1XKb!0@BGLd{O4YDCBB8Y!k%dwglfN{W0RSXgWqZ+F8=k zI!^}(Q}b4a-1M*SqNaI|8Oi@rc6D^t%?mx93KalXnj!-2CY$57fpg2f=H^r_bQZT1 z0=cNYw7cq`I3JjCqB-7xSDxY;kPQemH7SXSdLpq*Gl?i9Hdz^E3yc-+UU5n)7f`lw zG2^;8zlg@hU8JPF>s;>zo0A+9zb}I!q6|2AE|BCOjl-$n?~u5v|R`Utueko4QW z0hiWWY7!E(Y!t)Rfx1~tsrE;V%*FLg0UZ<73R|EZps0uU9%x>4OicZZQ~iqomweJ| zir(D-*lXhAn=kktCnM#iY<)9!!6mX-A9H~|I6wV=>NcnxQ0QHXx)9pyWPG0* zKx7AIEwz6016g_uWlPJ;4?$d5xikIvQimSz5&X$QGq9ZK25~qb2n%_|#i?2}ufSPo z*r5&tjOwn$$D0&AWT|D;O$tg6K%zk z&b)8u#88e&ly&yasS!g71ZU!xcMok)S&z;F^&Wu}b#4yi^q}6z$r**WyT{RS934!J z98pq>*54WF?M+AruG7M|Z%2R-v6iVE-E$sv)IK-%KnaM?@Nu@*fQ;o1_NYUmV%;f| zW}I-vs`wP{Qzj-$SpD;=Un6zKyan9EV*8q=`<9!Mb7dNROO-W4u*ylmECkGDTW-YD zjktVK8S5)6<8L{m+T8Gqg*jZo)s%0ArUmDE*VN5)QqK$IV^|0yE6KO!3`+MTmDa}0 zJ-B0zfu$S11@0Xn;LhLsX7e<8=@&h}3b($g!TvNGM`EnySx(dT>-g?OR1 z8Jlnwg=S~y?7)tJ^jtZQp_7$?;S0J(76lyC2;kocW=yN#(+0K)lU}0eyl11MK>(wH zyR;93g@r}l+Ew9c4%I5C;(^WW4d!wYv_;Ljw02Sb{rwZ$Bqv882}5l3q#}ykL$_#O zy!iX%qbSb-xKwM%Em~5M#a9Jk70J+n*yr>)YP-gQ>k?1R;3XG5q5+GNNhbbJu2^7K zfc^$bA+SpKQJZ5E6(N7eO&QPA8eca>#{D@WAfR^dn{I}BaiX6AA%-!hl~<2ryaGxG1R{cz&e&ZHgX**Ooc2{&jb=zYs_BBkvsAye~ zcgYB|Mh(aL-<-VAC-n`TqOSTcaWUAvDPAO*Q!c0y=kc^?9#ef`Lwu zn>#2Jz_`xWQ(U3L9#{|Py)3m4wDk132B*^l! zpAF#2J0HA(uJGokWXj0QYkS@54bNv}V5H{(8Y)7F4u)ams6K?F@8uH}FtLdC_&68gm$Y zMvXz=5oRXNapM1%o<-h*>X~)m^^eO7#X{o-0aJOq=f29LWd5aPfh8ojgzxm(5Zf<& zm(7gZFOmD>`T~^y9gqa<8zNze+)*ze^}h#gx;dSiajPT*^=zGO?g8zMArbJl@%`}& z%@+XBwB$CdNA$cd6W!2=c?3qbg{N=Z&4WVBv*@J=2?9Eu30nx`j)ySII_Z~dM=A;l zk>A#r=S*AtDJUfCkzDNnMdaVADlfSYNL8hp=WjPQDvbfDS=K-?+8{QBgHEEPZ*yrp zA%EemV_4V*th=vG>V%Tht=`KRTx{AVCG`)Xn3QJF_+UtVJK<}h=S&p?S+Tvrv{{r9 z1msij_3uN!vO@>~!`maT;^bO31~{Cy{8!guf+}C|p@K3|r$T_tgsY997jZO|H5sg| z$`pOm;k^OP;gYX00olmvHEmNAtEN@1;y1L%hHq(mULE>TAC^_mYQ1iYjlliTIV zr~U!+vgJLq`8^wyc=8h8va!P&hhih3rhuu5 z=g$_iqL0C`pN=GBDq)BM5AI+eQ8FB?>-7!_(gF(>2xe~IjrGHoVYg>&2;?Cj^7P`- zs4}y$BTG{N*-M7N&psE~bj*G+%>h7aoN`32LGjDr=kSmPf%yupqQ;xNlQM3!&|Kw$ zosDIQBIJdnEc@&iK6K26EpL^_(qrC zB>_^U+K~;gS&<=Cutri^ItVoP+V>D%qWr+!oNJu;Y>>L*kfWYaj-Ji!;kiRx5hHyg791TFqVn_$eW?xVMK_nv z8|4t~EBz>zxeht7i@TNP@e~b3r=b@LqBIm3^Vo)@i|kYFI^1%NM{*354ez~g7f#>E zpu&}n(gG}8=o~xdwRaUQQX(Ydg%zQ$NwpK-G^kQ#Xi?z3%<89g`DC$GY?d*FII$;q z>e<`bc7<4(row`L^+C^`Q$2K$Pqiv1c!4?7x7q9R*D z-bq{HO!0#uCZPr#}$tkdBf%p!> ztGuHYL<#8TUDB%Sgbhl|w|jr)i`hJ?GeUrOFJxh;#kkCMYV6;posfdiR+_H!id)P!8%%K%WUX-{|wLy`Lf*e|a|niPL1eWkGg zk9SEbUOe?XJ+0g>%o>YSUSDb^JdqdkfiElQg*49%3S401Q?=ap4uzCXB_tyvLa~(J z=jX}dj9%8`4Ps4$+Z}L)QuqtW3}B(GuXudbND*);lKDgr$xvg3$sYa@7ZT=7{EI9c-H*gbOnjFU};fNS=lsbZqi8GobK}~@Z#io;f)N#FB z^?}FP=#YHMmecP`hpo+_V6Fs;>K*8F*9yoB17JrE!RU)QX(b1xm()=Jj~@es0ph)U zJzIMBq{5uh6PKYeC45aMLu@r*9>nu5ESqaGqXz^I}DA)+$vRmQ+8)%bKQt~1o+rt@9 zJ%g1yfzfS2yBmu=I4}zGClPsyEp_G}?t6;DJdgY?Ovx!6VMG1-nJ#i@_}Yx1!^0z3 zqb16=A+er**OGrh*wyhZj6Z$44=y8_UMn=3iAQ^OBw4*&>IlLRxG88Qxf}o$ z3QBGQIJsVVLWZbB0?6NRe6~zVQ0|)>b#-sWR@FF31=W*Wr~X5G2nkizd_fwTtdznP zVk3IgKxpsfgy;5wL9WvyCMXmH+OV>)SjY<2ys`~H)PyA{6<46MAepr(^k{4_N&89E z!wX#x3sfWRz+=oQQji){Sdq|~fTu`SN5@65sd>4TeR(f|hF#{ zhoa}r$%|P?>@C22#?*&1itmoK!btOGAP@#^#qk5;j@$5bp>f=VSfm;gm#_wHSk44E z@;snfJqu_|IR6)g55c6BLLe}4h=E~@JthrIaL|%=PEJk$6^pKev^T+X;7lAX!Sf`n z$I$xTDS`t>{qrkKb_NFV>w|S5;utQm6c@M+Nv5S^x##5tlBvuLh(NWGh#${O^3&oDL^H2AtLXx|^iU0OM*OgQuES z0KV-KH=`q*|Nh|wiiw^c*w!J?d4a^FB|o-Hik7sgt^M=8j#f%ytgKkwdX)farRj`M zvT|c_5F8uPyn*8fXjEU_cR!q~56gT9Xi7ag0VB?h0LB3V7h48Z#tV0P@=8*PDM^55 z`LaJzK+z{P5$_A}IG3#+!L1vOaNtZ-E+jqa3BFwF$6f-@m6jLljj&#ngb5-5Q{8cH z#PHR4SJv&`+HNv8u)(a0Ww9(m;RvfLP>)AtDh%!7|c1 z+r+<}gTR@;l`EvvREKuBdc4BD$a)e(6~_LfqJe$>#-~4e89r;D-hlrwAsx!C>(R9Fs)f9)>0KUc(?F-G=l#oE->DioS&bK;a^a zwi|E|0Ux2(3*SF%?x~F?PLN8D+I^ z5Svd&;JNRFz>NjnJOE}TtRmExGfR^g!IFx8`R2PPFAyw1z^e;dMYBz)78+==Cx1ml z?e)JlDict5D*`av&$*7U%2fM*($r};67D$H8dF|0I6Zi@ z`q+=pUgjMog^IiRqjhx{&26{+kC{@BB=X|)H(~vHH>XMb+x^dJ{plT+QGeQZ8k8-A zN@FhNC6ZSsHi4>#_p`GH^zNF@gl{IgH}ba%nV-+#&w^Hfu0~DZ6!u zgG2PmOg5BQ;*zY3v87v?&~tW~{DfA_-d-xsS!eR|s337tH(#o}HB=a~_M%8A(s;+- z4agu)w%muo6Z%cY@`$)nj!kBb;TA{#p%YohtTr`rkW2euy;VFF=7O-RsKH#e85>*I#7Q+dmyooT4^$uCvws5$oH zryD7s)O5C78=`WlCs>6)>KKwP8$4NVQQN}xcUxqPF2$F8u0yv>Ng~$*+zHxkiY6t& zkQ}z(ZI?iiazC*X{9K+NlBHar&>w!&4!vK;rQhN77-51!CLQ5y=95PzzhGtyKA+(D z%lBQuz7_7SBzU)hp9W7QG}!q*wV-750S%Keq|_vFW5~9?o%J)^&70&IJ)BZ>o% ze50TNqNsfUtJFlQe1X&Vm-~?}ty&ITLVnt9?-m76BJ63mFeSYB&m{%QDLrxDiJS47 zf*P#gGVNHq3ai;d^*}VRqNiiGZv1W?^CM&LjlfDIyi}FC>oZxtH@2usjd4wyfLDXW zS<712_5>D7>*E~3$w(JgKfUq>&Gyv`FMs66=c_`2aykTK6B91t2`ZtiRg(SSFmpD< z-?Q@ByWedY2ns)jo`xu%;0=zI!b`XnFoC}F^$0IbO>$^UBg?vP6gsYP;7 z+wxoZ=;xUx6Re(%A6b!e$TzV zsN)g=KhVSYcp90d6g>%u7)E^sk0g!=J2y;sG|T88b*Pu^8}69Jug^@qOr^0032f&bi4k)a{I6K*nrW zxDBn`PtXRMt2g=WP3vCphh}@=@RTZLI0Q^ipIje6_LQFo^(4|6oSr@njnSRL*Y{4m z1INlc3v8=-cHJH)n*$5TiVJvEgGsA0l6i)qqz>F$Yyv%r5=Q2gG;~;;Qck)pHHryM zuqlebC&JJA+CAKhbvf} zr$C|$RoFZDw2&=JB_CE4AAv!_ci?P5c}XTJmXrw6=b*k+R_LFFqk$_9^R(%4$d2p? z2bmM?FM~N7gP}=*f-nfSasUuEM7;0*q@n_KN8#C}xU)kaV7Ly5-WF^Y6wiRLt%ITa zvUlbZ7(U^El78VgrtBpNSAakPzebIq(Qnv5NSk08bk!?R=Pz2=@tcPxRd>z z@7#0Gx%YYQ{&(*!vesL3&M|%iw1N=J3Xw)rK(pkc^A7nd5ks}8hS-1~fI%&2heJON zjTN;&y*PMyw}l@WLO;5Ay=F)%Um-qDtWa@nguO&%W_8F3 zUKZ7{=F4j0GX`;|A|a(QZ-n$8?0dCaOn3A%tHgUn*35c>;OND$2 zor?YG7>(|fwZ!P@2+A_y)Rg^Jup2v)(5pQ-cJLY{7yeHclE6o zN@jsFWwyG**1B!1S~xgZ1!RL8a=W}oZ<-EBC1u9eaq|L{6GvRoajI5{-es`$_dKhK zGaJmSVh*mYPE?b;$iv7}r7v&!&cY^m4XDsQpwuGamzt@h&=P2hV*Z`SV8=xHRVZtn z12$EPb{U5)CgRcB&x5pxX;H%0EATl3L4T&j{|d@jaAl?sK@XC++G9&!*joARnifX_ zTrA&77GtW=BV5)$3h8#y#jq@tsO;D+J{F8{_?%U)X<51O((ipl{Q#BHhlM4;^=WZk zu-s{P7K*ev1{Z8J6Ps0dGE4-7EuwjQ)I2>^jF~~Axp2d38TVD zWCPuEj`u?_3S4zCF!Aw=vSUbtKLHC&meoZ=K&fxt1xGjy!Tf|xokenh#5OT{m0083 zijxlxDUP*Le6(A*l|`$EJK;_{dIL!km)uT83tNnv4P!yl2HO%pUKJDZWhW6uqDGEO zL^FGP!E5Y)v{Wi9bpKqYb6&#M`)8``p8EAC;IqV~l>&@<7N~#%zRG{Ub8R{TjsTUI z8zf7KMBnp<4iDrWt8cu;@JhO)gvxDrzT&&6{E*;%i3}B)EDhvsG{{pZqa3=2Vg%E-tm(Y|4cPe9H>nqe_7!XkRGe71oqQ z+1Ud}K~Mhr>1L2;4wXune?y$S79CCRi^WU=H_U5%ill?UeIu3e%Xc@(MtL0VG4lw5 zCEtbq#uUO4jIyFcXIdRh5aaGZ5UHZRt+eOW_v4d?lsA3avZtF`_6R48>9mC>5 z5{xWt4l#TjIm#oo;TR}{`H?+OjzU5~5mpNbl$EPSl9>yt7OTut&9;NK-vSbcmd`>4 z3Y$;v8_0=J`JKJ?b;TO+Y*nKXVWCccqi0)%iTF@Q3gs;5iOvf6pWSM4M@p_ItMOgkJYN?-d*W zC}c__;Yl3Ky%`|X809B;OLMTD;*ma#V!=jN*QKD78s9z1qv4O}B%`3E-P_)t1J4sh z87ve{BZ!5YT`L8i5DdJS9(w8bG)j4EakWU@Ds4-}6-V78l3=rC-`pe41)LSFE%cxZ*81x1(WRZmgsdUwg@bTaz)TuvlhjZYm2$ zs>Np9K&1-0Ad2OSUZj_7#mE(j_M&3X~K66 zjW=H=Mw(LYwT+F{fL>O{7_dsfX21=;=AS{`1c~P7pfCiL2!v#!yuRnqnTVdc^`rR{ z?5=NXhYe_WmQGVlj4VgVn~>7{k=ct-hVlG+%mZ zNyQ*@I0$G3Jq;OVwJ8b&fC{sCXJSGEy{MveE2Iv*$*0eYQSXqGsfIKy3!nIl)yWGiV=l)6tD?Oc@U=QLGqXQw8Vy5A=V z;JQ`-bYEUe{5^5+G8wU|=W`O4DqVH_VJ&$}LA?Pn?!p-P5l{9&WHcj64U^HA)7J9J z_|}-AIv83wf}9=w>h6r{I{#jTJg^AE9(L4o`1$vB#x{V21kURLK_LnpSG<}4X3vS8-i8NEg%qJ&Qj2w?VvzMx5S`p5#(P&nbV5*n~=+r_4cLzliz&&+Te zR^AX8ms4f+jRFeUm?~HsrXD%F{+BZj#SosxARUt1l?Id>jt{+%yIgj`2t(Ou&bEI$ zMOof`A#)ID_9Cl?I{rkBw>TY>ku)a8wZE%MH7Qb(gO6E+k6<@yl{gNG?yl|Pn^pDp z4(|N&B9*J`C$*GiP}Fmwz}xx$GQ5LEsBAH247i+vriv9RD!Ukc@4{0e3EDp<7unmu z9=4#&#pIG=s;9`kXk_Fpuq3UEAGjecXELg={j!ry-m#6MJB-PKFFv8YDn=-|HGtkE zLz!5#h~ORRKo^cDl0vu^AxZ?lOkcQ=`zI|?y`)#4+i%P=1g>yxf~@;`qpx(8Uq^Hu zSwZp@d=_a%HVhcJeIoTU;xjbRY{dSj!}B2Fs`fE-EE~wta-$?)bHT<3a2B_yqM3#! zv~@u=J^c~ej-69WAnRtU7@*>OStM&o@?~Yr=ot7%&K*~75xL6XN$GBun^((7Po{c z>~5e>KlpY?;?Jr*N*cx%AItH|^lpsV&rWL2H(cL)BW{-{x3kAQm5MRcVAAXqOB5&+ za%>~QR8;WD)TGnOB#%zqjMpM$h&drrR)F{@LJd#-+wwg5E(znYox+TooO}Lh`gRnd zN-DoqFcliY*)XRn223eh2|%0iuTybXCy)+z9wQmqE&%RXDk4BL2M8rD-bcH6GuXyX z31t(*)x`w^6O%rW#34K$wlNfVYQP!;aqnbQ?v8S}dpkT>0)?b15FbNGObbK)H^}Sa0om0I6Scki zvko%EppcbIB-fsJ5Q0p*21B<-LZv1k18sB=F)tr9Oz;jp_ntiZZT^57jm&^CiZvKi zx@4e@{HBj#?~b;pP2(=0&j_9{j4D*4&5)Bj6a`C31pj}?$NI5{-T@Tn^9T%>ZsJj6 zyy*KdG7LfQjPWeyfpqDVqswWx2}wFvV5&t|K91~sLxpVG8CDYbff}qFpxAezdM607 z1a|6#7tq&h%}Ppww$tm7=a6m%PitaQ(ykNO(J(#4NZ>Wq%mCm-MFsEUdFa0O_1*z` zxT2yW1{Mb+Zm9Jl3_4ecl(|EcxZSA&Nn)KEpwPwYya9SF7`mX$&fjE>Oac+`(C9UH zn8R`Yv*h|J;%~ zHKC}vlkFv1lMwnRi~t0FzhCpSgy1$iF~5_Q^HA(E6KU+YzNdmaxifLn7w)S)w3gL6 zvNqtX_;YbIGw<)uApY(5wwlgrmGwq|k@smrZEf=S`11Mug0h5rIHn&Rec%jDlYJcY z%V%UWlme0;KyYiZ=zpv&n(J-YfGphzRVBpz2G(A`P`9V|p|nL+`to2D@Wp|pAhc>V z{k?ULp|M1ih}2pjBZppaPwMx8DXKONpCHT&ud!7^45*XHgzQByarupT5>F9%3o^5C z6vS!?O99#U34CuV0X7i!i(Sc0M`r<pp9>!XumzS2T z^#(vdP!*DVZB}Ja%L{>e>^hnQCm(2GP$*==L?IluLFG8;V)w!p7ey8`|;EAy+Z34%ogGMB5Soa=$iTU>q;eE zdbjo6#5YnG9mP6iOn@~z%cOqOuaPO5m2&ufe~B{M`FYL0qp<2--)UsKh=>5A^FS0= za93AVjqvj)z&69eusEH^xDMU8b_`v=>TbfoC|E%z0s8jAJes%%XsH35nm3OveP?i9 zDLE_MhbDhSFjQG8b<(X){5FQ;}TT_$&_nIIS2=E2u zXN~R~L{wCbpmB*ufDg{b1XTVv*h#g509>)==jUfb3lh&YkT8SK5(Z)C;Kk?T1?no$ zXW>u1PtF!=T-o`q5HxA=_@Q!6(+fL0>Ihx=D3C<+NwKhmsZ@=D8BWv$5~2WPht|;U z14ZLg506l5axOyxLPDgFY2g(Ad+yPP;5tEpA3~^(BB)l8c{J(!DD~#-$z45ucn4Nv&7*) z7wTeG0fa5PL-#`|iFPtuz*gne-=s0LgkXa9#Y}*c$#50$QWks#i6OwFU{GGjR%s8i zcKCAgQTtzh1^dR*$_mDO#&T2D7m&)cwC=VWYVJ$Z9$ttN2Y{6FoH6zaC&ieq_YZBC)MVIR``jPHZZ;`fJhIF z=Npu=e7BT>=PIc?{_cKPHDi}|^3sAko zFb4cjIuQa4f}o!;T#b;0k<$rqnt*uDZV4NL0v%h65d(Dq$rNPLui$m2PZYodj8bF- zNh~h#H@2rLvXKx>Z=b@`p@3|=2rCiEI0U@mK~`W>&>-8)Qxm|W7A5!v^0h^3RSVhC zBy4PYIX6rCX@#e)!tvT=c|12pOM0-bLrdn8|CN&f-z+puz}W&GNKHaAGW2)u+tXTf z>Y_1EK{vA?|1LP``1sig(hCaZ#KU2~pzEv_5Om5!!A;EtyRwTrI;4Mrxv~V>VcE*f|>5Z}P!VTew}~7mO%8}z9j)Z%u7PqKfiv(x0=ny$^6EA?}}Nwj%Ld3c25zWY&3ip0l~o?u&IDg zBH?@d3&8BN(5Wm>GG8|T>??K%sR}UOLoAThqLBA_eF5Aj96aBkeLXs`r=~p!WLdoN zzOxva1>o&oLy4Y;poxo#i(5+^5Z zo+b>rUD%kIY@pL>{^BsjR}eRl-{Kp5z@W0gJO?7;(Z<+KC1P1QK77m^x}`HaeFlQs zcty(s)+IQ1i)}$*DQg0wEYX)`;X%dkki!|s7cs)ytvk?juyH{2^RU_bPRQ!!CP%zN zKc%2u{Qax~LgeV{h_<1jI4PtP*rnvRZmEjawOS}}%aA|k52!yoJBzy|qLIZgm@VxO z1N>x4Lc)9FW;;W^#G$SCTce2}T`I5^bO&&CSmH=3EP(2LL+;UVh8YtasXgldA@}{K zS)W`I%t2j1zb^X&GvrgNAU%IC>Z9xQ79r$D7Y&R>41o=J0f8|j@TF`oYDWMk>XQgj z*5S<1r!LI5dAV88lYg4T4RL%}I2y#1%iXM1Q0qg+&by{{ z2bS_6hRJK|GlPWDnQcN4W|=IOnHg`Oo+!g|Mx9c)5&SDH;FvM+6v|vQUcYeu$LRxM zC!oF9GV|X+MFil&!nj@^Fy3yh-4ravhCleYzE?`2tATW)lvZ`djiv>wYFTz~qI zKlj@z7}~uZ5#*jk;T)WpN+vqqScRj?Ad!F4pG)`N(5ia`S8XUUAwoe2nn_dSb<|S6 zuU>aN2Qb>xbI>@3+9xL_m?Uy?b90M}e`;_y&`dr7UZOS8QIOUB>5i{!AyOk_dbi;B z|0nIv>g@Wby`O6KD^w|jz`eIcMKxOw3I37fZ)wKsbMfyH5fjrB2Zu&7r%%DTJPA+p zQ5e1ScFV*;zSGL`GKm?x7q6gT(gS6M7Vwv7nx@OlLL1vKKM(%N&p&dCjEGn~ht22j zWH|9}#~7XG2bf6-Yeibi>6MsR4fK2`y>{gPljBuuwE<7a>h8^{E|Nb~9ox z7`V8FMPkxmB7=kX)$h<6f{0v}-4qkEM)!!bJ|Zpepu7+OsJF+=J=A{t2N_Y`DW**Wb=>u@d@%MN2sKD8m+Y@Hwg>kM1@oj_EEf1tl%PmrLf1G9vda4wmT+0k2VEp&L z{(S*-hIPdn*}cHR>~EIhATU9D;fz4~T}9las3o>8wrI6t#5CnW!a{V3e$acXMXzeJc+3d!K+` zu)Mqs{ogMOoiYtUdEg2`P|$fY80xB_nKl&25DmNV6q8`HXNKto}graX& z^|CoALZGHezu1Kgxz?Rf!3-IJMzp1fyrDi>1(gnT#{z4y3X)}=ukb8)mfFZ4BQz~J(1i`L+>!Cl?y@{D}- z^2OMIjIOM@zuDiYh}obqwyy*1+k8hFeGo&6{CzEO)b4u&MJ{-C0-mY(QbF6C{ts z3Qzfg!NIp|1ZbiO2AAR04Kl_j4Tk}lnvuOOmdY|*0Zh;2K-5V&T4{on@BsCxHjOVD zvl~0Q3lC-k6FK@*y!VuLj2u4`W!Ms)P7| zEVILIn2x59xz-R*yIQ%*#Z_EM;ePa;Jj1UP?0mP5l!y#$T&Gmf5jM-^5$i~&O@{bx zoIwu9AjmhQH~=Ij;nvz3IStKwa|2m^t{F4Rj{AtcJ6*5RP5|bS@WVRj7Jl~oP8Wt$ zBgQdY(~9!(B>yK-7tEK(duUaw2PXsK#D2IBYMK(?y!fmA!B#BTAY0?|5}(HhG&WllslXOE4wivH&B))_xC=nxf7LOvNj(nK30hj8 zP>@r(O^x;A!&GtO+H{|#hY6{Pv&S_ZxQF&*jpopyaJ-6u4XdUw=(-_8m&r;*E9S-| zay3QQM!~6sqP0#uxpRDc46Y@XhGb2G(Pd?-6@nBnwu;&0`bsEOy>vkmMv_Ju?Ul8v zj3fkvLr4At|moTZP_~WhV+PQ5P#*l8(MOsq~Z*G_o zTV<@@Gl-%D?AIEMYXyTFY}`UaLMX1tttb13|I|Ge_{Q_)qx)eE-78D2UmvGfZE;P# zR;Q#dPo<7V)3879)gLUk5sOfcUN)Ui^&Z+&P21OHo?ZN~88A*xzUaxhQcnJS#$;E{>Nc{%60}$tuNee71B@{rntsG)OZ<<@gsSC|ayULkgl^eto1}ym| zqt<}sI`%Bndwn|c(L%lPF3|;!+i5mR zvV4h$krQfW(M*hTK}`jnHzW~g`VsW+feZ#3LMND0zQmyny7~@ZHnjVmVjqx@n$6t_ z%Y6O%)(18G#@OpwI^a412|y$rT!LXG1Ol)k7iyxX_7yGn#w_$mEsHnP<@#9G>#yy`^}_G>T#6S>HG277W-XPJ`%ny&=l%p%#VG-J z8Dhc9(0(R_&3eOhFfGg@O(>@Z+zh2LXy0W-W9FbSNj@ilU5}6+41Ap@_?m@6uA%pa zaJSeKZv_SP^`IkvREsgxNEt5pu*xgr(Z9%~=tGQ6T`e6AK91R2}kw5@n9&Zv5>f^yl8*<%U)5b7FJs zZ*g8w002>lp8V;{*VWKX2SN+vxhN`xhDX$cCK7C^cAm8^VL5l~qPvw8@GS?g~d9VjR^7GvCC-nu?Pin9GS*Voy)7}N?$g@%WQ z@O_wuRSt0Etf0@t)PbXqk7=(a%ZMZK$`dNc@rRXv_@m2ndid~tK;|=`o5B|6B`b?8 zH!?Lf1)droMY zNbE6&WZL?s=*obKz5Q$f3F__D3KClfKZ_?Zw-FzXlxaV0^vszbvSqmPZ5{cb7fh`` zukERZoT3)Bv7Clz9sf(nL;Ec4gK*mBRlVA?-+PDMH-A?`h+mow{^C2_EhhMLLTwGoFvYo|smPso-%W50E zEY%3TeKPbh%Ane>Q8)jLaBAVHzvH}N{@r<$7M>qIPn@Q*p2`JY+SPC6@`SenB zf2^>qCXEa|%jeN_)rXxLPwL}Ci%D8-kJWT(5qVQXDz`zw-@ZR1=C9aRy?!M3-&4ba zieu7B3_u&{G%PSkiF%WDN2&AkU?Kf}0U;jc+Lg4=8q#e=S7D1a)`EChB5>Cv-@pvK zfq4fraM(vSKxVyp>Bln5!>;DO`Z=42yZ7sv2kLD|gCq6Iew2A~6#dwG(`a+)i@mlj~_F^4WCJP`QvU14uKg~90{Y)RUs5?F`e|DL1e>B{B zSTK)x*EQv?N~DaW1byDm?FlKA^w+AW=%^VX-tuB05LNUyQOH|SJYr&e1Q90tesoZ( z5y^o0c3!)=v1+&-CnCiAAe=B?XD$*U#waIZ^ftIQP|KD)Gse=A3G+Q44+BTHiWsTZ zTdd)Tll9LfnG~_jJMTZj|G3&)Aw?x^TB)Rydl05NmFJqj`iD9)y>v0pPSkp}0`tbda zJIv32l7snf?J)!GgX5!?s~D#9O@o%k)6LSy^CW}U_Ko>#`^yg>UKW`^*psf%QT6)n zG4;UjcM=2{QGV5A7L&|;^M?1+b~X4X;``0PrIH-%YZH-CoSkv?_d|>8XIBlkuBuaO znv726a*irDut_+-*m}5$;6vkq;|3pWRw8#ng^Rw&zBc_7!n(gY`~5kazq%|;GmCtu znOM3I!J5@@{4>h`S1|4QqW0JPSu5W()`~#ur0)UKHqyq2y)@v2E$C$acMb zHShwvcAFZQxOP?eUpNVDkc681?A+;==HkLhZ(7fb5~bd|gcgQRDC!^N&C9)s?WiAu z=ayEBRoVj^1|!pVJiNX#)2_rk6Fc+IT8ZJ7TpuHjQkge3Pbl_D%dNH^jonmLT)p`9 zX3nXbys4>iPFm}e#D3%_lc*bV{c!lEiuVMq{d)8mFmHkUyG zjjO`%8I|a$eAmkIN_*DKrC6?>eE3<(wX?eL+QQrY-bU^BJD18|j|O?}3A7w3@W_3T zkdHdX<`Cz5(0$djN5yl}`>VEREeQey{O|D*J z@(a8e`sqSm_j&Ez=y!(d%7kB8cxqFG+68zXrcx64GD=8f^1SPD!pY!JaCzV!I>?V) z=0?xR(SUo#P%0Yj-P`Ii<2Og>lvm6p_#20ipHk$evFxqsgnRn0-zBLpS2Dh_<(|S_E_ZK-se*Sq>-x_y*0<{L|()R+5?kk+cZt;mN2a?CQ$Dhj-c*QE=&X!;-Ek3wpAF zq9t-U4>HxI)}*oazs+BgnJ(^3mR7aiy8GhP{jV%0#WWaZUfH%EfYSX0T3Be$$cs>! zBQBw^@eXMl8XD^ATDiL1yMmUoqLgt^jj2l;8lXJem=(Ni=ie{*_hD_!wq(kizE!D8?(- zxt8-4UXvFlcOF2vHduqk11e94-iX1X6z8kni`5CRG>lf;1#^toqCG0BTWOEGft{FYc2PSJu#s2Uuz z-54&&nZAz)f0v$oU2hU;=1^!#j2{{U@Am%c zGPj*C=|6P@e};0&+uA=G`@P^Tv{9elUD92Sn-JqL9lA%M$%R^0QY<(!eY%EFzbAEX&*;V%@j+cva-)its2W!fAw(?l> zyGIh%6pzri?ylyE8(vFTS>{@1`cogJXMBgYe^z}f*;F(2`T3fM zR>$RP?&tRJSSn)s%YAZ#)QfeRSUnHAndQcczuzj>7$Wgb4&DyqH<*SOU^ZL2kt!2Y z-$1%~M2BXHTB<+Dg=lh{#5EZe^}%#q7)TY$*>9GJVHtUL`h?w8nBu1Q*H@KlkE2mg z3Wcj$SxCLK>0eV2b9}Jl(B&7d5--*50&1Ot-baqI-+C)tg0qt<(+S@{{?cQqD3RQx z(M_po{ahP}T;f%xorqGEUuTyxR8oS(HdkuitcmtcMb9ae3UU;+1RQn5NEW_!4L{qO z$kn5L?4^tQR{2q3G_%)m$3kXs0TPkya2$6I?ffNN*?->bSuj4kyp9E#U|VEmV7*jW zGla?I=fAT~0DwJgZn+_#CUv*Xww>c|km>?!3DNQ*xZA9M8Lj4^9yN(`Jq`V-^z6-u z0}d8e9uAe=MI8E}P?$^hQTT^oyE*qU_2wVsTmu{kXleLg`v$i&Y&kxHRreY@k~*_; z9WDl9TaIp0bxF3u(>To4I|t~Gb*^SCLvQEiUps7#ZDY^c@cnXZQl{Xo@ES%Lo6FDl zyU0N>zG>za1|q4(r&Fe0fL5sNzd-%oxKsbF0S&_BhlRTX1vN=MJv{D@@(HCr7pYRr zkndpg?Z6cQ!>*a+aCh}IVOsu*?imU9Fm3k@izUzx|LSahyu-obNkck^oMJ-?Kh=2LLNUdS zTP-K6ul0_6_+LCYR3F0pUt#8c4#yVOdiEbCd4<*IP5&ev z;Szi4x_(d6ao%i1WbDsIpt+tr79-v9`Xcm0YU~|0(b2o5y0^RKSxXV2kNsciKKtOq zk2YQS{?GCF_dC+Q;`aSK@0Y$l{yy&`==EiCGZKAAYG%Y^jyLz@eClbv!b2$qjrnhP zYx|;XCDtBRtf=i5KXIJcwZ`TC9>d+7B6?sr@P4p6LcHXYw|DpBiqF4x=KLE-TRz?M z@&3D+ft4DU;=Zi!d45dOp`)q_|Cer-?(pBq#z^y+e$Mi(caPT3*S4*MCU~oq_YPe5 zdRdZx2gexW{z!-+_fI}L&eOKWeJ}ZAZgy-sk5m?U#_8O1=PA~VEscMM_ObMXfeNG^ z(podY+=bi|=4UML@5iw}pU+GTfAm#LkJ6H_Rg5K(0O5zmP}$C_B{c5fhzVRX4P^( zN5T!5Iv+%Ky}aSRGsm<8{?*URiK=#AUhzW|o)=9y+T2p$&D(TyYgD>j@MPp^KG5c& zgoFLjW3V)E%#%?C6f82CaFq$LUxNvjT_mrwBNUo$-?}wW7^(OII3%YURN%9a#o(_6 z@oN(vzHZu$*aL`|qqDd=?vWN<2g`Dl+^Dgww|;Vg>znH6vunRjbl9vs%5;KLAl>q3%U; zmREkK0V>b+)f^UkhEwY92*^DcbW4elb%yCO~1jK^9;;T8dJ$vqjFF0D03=~k~t*m8_z$dn{oeM z5LA>#PntSby>@KB`Zue7Fsm+G*i5S4LOH%`N4zmkx+U-Yh#1>*1OF|_URgzxqwnS9 zyY9i=r2#prY45}1^Olb!BZ=b-+$Q^~d>6kvn&O0wejtk`JDyJTHl-Oj#r+f;KAQhR z)6(2nqI|1yuzcx^SbeP}^^@dZk`}qAd|mGN=yzE5gzc9~ojA{l)LH#Ma@Lex?BJ3f z4YF%+J6`QYR=-?L5j~qcA1ThM%YUga`Kc_kE&5Ka-=B$0b6<;wr~3QBPgR}0cur@| zo->;D$9_Sum+dwTyk94?XZ-z^;|u%V@ykzt(;wIkw{H%LOr>0Ts$J5ul1f!IxOXjv zd0#~NtBkU&C#F6ed7iJch+WFnlDGV{_QY!mo7elnSv;$)lG4V}e7`BT^p$AuLMMST zu{UEPizqrW-tIlDc4Ync1gP;SAtqe-xXL>327fymk)z+RM^0eQZ5nY{?yOwi{Pi}e z@5I80mczv(^IH$iKCMIyVU5kkH8)Mts5&bieSDhr9*`26m|Wka76r(@s6iEz3=OS7D9U=*Jc;vO+v_?;NhIw^%Q~{gsPO!fogSEUNwGSUc?Z^)Sma9TF z^|>D@Y#drzC`RBxyYo`O5KBN9-jB2w>xv~#e760`rR9y0ufvS>T+n~=J<_IaC|pt* zb&+7gok)iOV2_e^B`S0WP6T9+(JJQty1JOZdc%d7D~_kVTlhHy9Z;C>4uKf+@r>RX z5^FNNA30zjRb4^J3b!0qOqI^?zs%3lLw3G7 z+5gEC+;^pGr4%`dLSZy5*HMAd>80)UYTtC8e(eleaDQrtIJ2c)6Wb{k#)ozV_y7s*u0dD6+QNtBEAlx(7zzT$=K0?7tSpOlfc#-gc86ZS=l;xfjDbjbKDL zzb|cYdvtl~G7vYvtIB6-634}M51ZE1F!9l&`CIeuGri~dP10#XvClSoo>y!pPR>of zXnXz9`h$Kc?V7`u#AlH~_si0mh8VMY5hL53r}&dnHD%kYh|no@o?jA=5U)vf9u9?t zhhfk6dHgB8h*O;D@4%&}T-|F<`NZA0vAK^X_}6hMAUft5|61xscbu@E`VS+?=LUzF z7am!;xVDFHM1M%f*HYf+W@X|oZThbNjpNp*$xxA|>c*dY<@a?(UG4R(RYe3IrPO|@ zj@@D<|J*dofcRup_dt4dTv^$v4KX4RL1w2TZ* z`kwFw?=L4k_~Czb!S(bq-?GRjF|5GS%Y?m*0r5a$AC+E;oUt_IEadlQzAH2`s8gs% zt|rNTzBGPE>)4~l7Tovib`>T_GLECn&x2I;-n(IZE0T*edocP-^0ZL6*sk}g+abjO9hjNEBrFKTobmEYBtmWnTnsgEKHLT=Nc@~_BGm;z} zDiy!6)#i2neA-8Q8Hcdn_Lop0j4171vBn6)+IinHR(O2xq4Go1CuJL7IN(Hc+K({b zk^V6`Q^Qz~Kxmq}K3<#UQy)#udX_l({V8>N?((-S4rB4!Hhx`CI&1$7V~V7Knc-k+ zs~5|!XB&&pn+$5mX-Xal*Z&Y`USCCYQ^+}a4cQ;Q-NhHtqt~iAudT@|uDcantzxV= zwU5&G_K(@ux{TbQ;E~FZ_WA~2Rg7BUvc;RuYd=Ja3@?NuxY@hw|CkSae4@P=#W^sl zIx8@6xBQLfvmUi2T#e9AagJ9B@`2g@?=JY1%P%q2_$J-E$Q{hH2P!rjoHhD*rM^5o zL&!bsah6*g|MHIBBq#2fD8;`|OAVq6j&2WO8oO?R^#2F=7EhA%l zzH8!>iq+7yEJA-m<){~k#ejfr;Ss+X)sQBg+qROmC>y#sT65C{X0R!+An3}nLzOpZ@yf6 z%$&4eAWkuR-Guy_^c$Q4IdwR{`;b;_vNz4+2JuzKVn2zM?2B0cR+M;s*siiuj7Qv> zT|~L(I@OY-KY!Rdm$;Uiw$W1J@7w(&!?`8(Y_HH(JWlvMwsV80)naxLIhn3gqUXu0 zp!ZN0Tz!aP6UsdxAPGqD{fqQ|bh^ix^5 z{^A!+2P3vB9K!!WH5cPHz>F{ScaHkXAm63;uX>ldt)xiBnMJ8-9V%{OY6gt+KrF zpML{%|47e8Dn1@z0%2l(<+4FO*5peO{dNDHg^4>W(taXGU+Y%xAyy?Zze0(iq#C=b z%q7yW@P_E$FPyi}xx**vSu7?Zl``luiOOT2#tZQj0@(?hzw%P^B`Hq`9K4}7O!uL{ zE6&bRG{ESYK*=_9p|QjW5A;q96I;-2NGG~Mjl!?W z>>C(78d8nWs8%;NPQLH?rCH4%cZ+DU=mm3cPSNP$*6u))xw0|!R3oF2RpN9#zc=jg z?2#zCX9=x;$SMDeU3$kPZjft@7e_AM0wk{1Qh=+a`J^ZUbf3M60>qqiLN0^XsoP!J zclc(zPO}5?@bL7d(}o`AV0D1Fj`!m-k>2mOub%)#KBvE@=eocz_T}g#rDUEU?2nhb z6lpn8XTn{n_Z#{O+?|OqHHK1(wEi_bPv~YR#2L97*bpxb4``6i8PA;7WM6zaT}ZZ~ zev?}C_HFg{%1WrGHmNhSx7srqN+w)Bk<{n;Rq9xk{ibAPZ*+IwNIuNZ z_{Bp$PnC43da7x^`Mj-WyWI3g22VEs>Tx6kEATZu z{CLA?Wz;&IdbXPb+eCA-n97B)xFsmZZ|=S_@`QGnLHP^4XtYgb0F~q7-XG$lj?EJ` zTHMr7Q(MMs6-Xj6DDS_ij|leT6&no7C>UpPn^t*K8+iKh*1L1FVZOhSK*b03IvaHq zO<$3Cc;qG(-|-x??ya(Sw0K6f4uq10uR(o2_i&u$Zr8|+>U)j`#VYKbMVIJcDh16L zRzWVVXmO%Fv=_R9T(-TImn&~%#o4<*z5Of8LMSHe>hR5Ze+2DRRd0LXF|OAOctJyy zW0-=So!uzkK;z|wq=4SHS6d1EyOEpt9`8Pcq3z~Py1p%@E=~I^>(sNKu{t!=xLUuv zxjJ;eYHorLue+Mu5fvdtx!-+Y%W^mugTdz5&}TPEw1_II)SAh90$JKi>Z6D}WwYU7K#k&x53R`rhEjbPWh^Gc+u(Hprul718%ZGIy7*Ub>>QFp2l&!CZj_ZQ1q#apm^|^8mppSs%q&HzC|^C) z+m{}yW+hLN>U*0)I`p3HY)YFud%`{~t+}c3XA5Wl<%jC?=MOwbeqSwV_3u95<@HgU zH)VFrPbAk*tr}1*9hg}$kE-*<>tX4a{?N3IHuO79KSjD`&dp@=Y7fg;dyvrFq?ksw z)O>!ckGYWdeMt_7r$Hz}%tQP5`H+CqfZpj;;^>;eu*PG!0_!FdtslxTJ9%Z9y{*g4 zxT;ZmSSN|qW9v1mtY~IvG$?c76XD6_5l(*Cf9Sh&m~P9OkvmnkQj^A7;jMTOXeCj1 zdT8~)$6=?)j;fVV?`TGKPb!Aj|B>ZJsZ;+2QO1Kr%|*`O;ohu7GD^zgn;7RGCUt^SWP_JVvlhW(BQrDUeF>l9nVtCB zaD}G*~Gd}_kMHyQ|uw~D*kPDe|K~FW~r9)}L-wp}37*1FB z8Ta+|Oo$j6v{Y^giA}0~Q#TfWpaZ`x|Cat%$zzQQ+d4kkuJXFaiC&A1Pzln+=U-_k04AUM8Q0;AcpD=z$_xd`xAYTgSdnI zEZPzapZ5E{WlO0L&;xHiMFSKufCnS(aK*riuaJ*IYo_8>tdI--{fUES7!E|CS}MPR8MtS3~GICb*G;fpByd_)Bqx)gI)kbo0{L>7b)%-< zn>A-lN1YPZZ;TZ&BDR$z8`AIY!WbGJHMPL1grq}DuO@*jSB$y1)CFhiP;Vk4qU2PZ zo7WRjnTBE<-2Yq{m_c+n&oN>?dn=;^6<`vx!1o+#$N``S_6&#?{6kO@pmQCm?I2W* zfQcQ*XRXuE0|Ej7h1||Ag!3^nDk?t<{4xuVjw#xx5A)5yZOKfM?{^p-`+}2$gO6WC z=F#7_yl5Y+DOZlY$b6UY!p+*nBvDJk@e4Js$-&@!y^?EQa#Xr!uC31lx7O99DC z0$@Y#vapa42qTIm-~f{O#_yved&Qh4tlrJ7EpP{b*YrAQ)qO+T%gc*_1Gxb#QB_oc z0uTtKN?cu8(K9ho`}&GvqFVgLstW|Z^r9=;n@19M5S|cbUl09)1=t{-@c#0!7+7;5 z>dBE<8Rh#3d{}4jsbOb?!8Lt=R*na&ksyQ~KX=4{4iT>D=*W?q68RzgUFBOaw$Va2 z)tI0X>~0X0LM)w71EhXfNqR)g7It|bpS8oU4`gEs0H|46>Rf;SE)HN*ib^gZEM-?_ zqyw;%+^DALohq#sfRUwWawh_F=`MrVCaa1Z9oQ2va1jbtR(U`yW(F=pE6;ebH~+FF z8~hb-{`18)tizMS#ZGzbvZwQQVrp7i5so_3SF#^?KakCQxQ}S+ro^_{GD#Km{f+~5tDme4ML^>(0~}bmG(G*bDGn|d)|R|HD_Ht4>!p9jP%GOA zQDD|qR#0~dBSx8m+bo2rAmt0Z7O@3{jr2aE6X0kOCA+KyqbXC2X0#QUPcx+b{b0-S zr@wr8b3nIOLh(6Mj74l^Ts~d=EBf5mFah=;+8ME!tw)TpaE!}#SO!1?h(ed3Vm+;3 zzr?RHg`63Y8M#jBXO~jj*m##2F}K7gL|3~~a`TD!9C3r7%U`!!i&+7=?8*bZy%e>H z3KfJ}=z)vXHit=4yS+CAsBpLjqM0-vnw$GizNqusm#6F(ti-wFT-Z;zjV8wdn>C1U z*;2)$wxGBrNf`20X6^!V_S*+%*8X{r-hLtel5q!{n30F!2i(}IAsNJ&dK2yD7x(4xv+oO8c>?~F5!G5Vh!?^^F#&+~hT zfVnRbKq`4bEih35+v%eK9&)pX1wcE{*K}i`qvx=;zW&Y)L@pp7-jU}9txL2oVGvj? zz>qy4N+}Kb9DtM`qx*bQ3gCl2J)CMdXeI`qQCt8})L+Ha&;^kbP9teX#uh^c5R)kf z5Tbw_#i-8i{2>9k7RtK%$61TktHIUML}}l0^EaTni;7B083JKA z1c!{5GbXj61n6GS>_6v3f&wWMv_k@1lmDHb{`n4Um%eiO zfrfr^V)tOF4%EyUZ>GhbNeGcY85hgx$*t?Kd8QBe9JoRt7R#O7%TFtYMo30pzVqtu zr}w~A4896|=3+E{)L*B8;b}620^3pXTV8k+=x_WeI3rA+KYNB*Gc4bR;%5(DYT$zx zvwr45|BeKmb@w)kGkR(kF<1P2;QNrvNtf~K69rbUa4%=*W;)b*m@FQeC+zeiLd&!$ zKgeBN)PzDK@2EU!dU_i~9Bpq)>vi`q(Dz8ogg~~p64MwlhES0@7(tMeZ%kxlT3lRG zTwGL2N=ym~II2moE5M2RkqXM0>`r=TqIE!n%3C8zUtW~{X5Vj?l2AFWPAw-V$Duo2 zYlOD%cAPK%UtCnXyOXUDT?(jQ;GkIgmPLj3^7qL-<~@nXi`ddYn>Z5n;x&bVn*L`q zNA&3$acUPXN6bw#M39C922TZ&Mz5{jCo7Hi^hkTe^2gG5+N8crGhUrQAU@|ubz6Z%#_;%< zn2zVYe`Kh`GAKP^l%tREn;qyWnFIuMeTKej$}+R^KhfCBM(?0cq&IjkVUx|W{Kj1TKW7!sKRl@<){Ctg*n7?&Fvzyu za!NT7QDJp}M0gZuTqNh~7+85ItlTh`voKeSs#w0w%wG%BnyWWS$2mNsxSttP)k;H!u(md}HHsXaG{Ld%aqT zw^9+y$?O^jWip*iO(NI3AH84AvX>$~e?jHbn7*4F8EM2xR6H)}&V!7oP*hjXA&IU0 z*0}+Kb`pxq%gf)ppvQXlkpLYC7IGJ7DdnPIchuSD^mN>n)TS2I;7ux^gQyIS zvT~}*x#y^;_`)KGIChRXbs#Efak(-{tr8CwnHU&VE{s+|1!J@s6{3>km#&##R0NBc zHo5u^7Is{lujkd&)Uuy3l9T(C8{xe1M;Uf-A~%uKEfYK2{qfvLeRW0ZXH-;M_$tSl ztE=lpl$)#zA0$hj=x1!KKe=L*XC#9uN+{>K_h}WU8vFbAYM$^Y+hrfz9PKK6sx6`9 zulIF@WzrL0)7cclW!Mhk91pG0cUBUxy^{BlN}}w7Em1%Tumlxt%}}0*!sjFvcBr5U z7|Jj%B{fx5TzqP^3?1Eqg0&)t`~n3LhhHF6959qUF~YcR+czu;>qLImrf5mr$lujc z^qzdz8ygjN<|GOO$om4pU6H3>MaR_Dr$Ue_LtnoOJW+LuK97!zhCq@!Zb2SOU~_f4a-|$NVxxkNsY+pcpucjZpGZqme;Yj9Zlz>4+@EC*T$J_4PtRJlj;z z{QUgwVM5lgJW^6#~_YL^d)ny`PiO0%ZvIZ0m1#L;SzY&$C(NuC< zWQCvJ`K&&Y3QeewLr;2=*zD z{Qu|4l9F7iSPd@tK)=+@2EC9XB4t9{hgVaZbN%$q)Fd-cCDehmSN&w@l(1>D1Wv}{ zmf63W^s#L{_HQ~Nv8}U3QJtppXt;}rU+vFJI7{PU8TQ){qD#gsO)V|09_$Db-ppy= z?*(hoRAHi%(nPe76{Jkce!jn}L#WQUPkEpI?#ATF}JbZuVlnXDgjRU63Lyf1rz&J81mC@YH%vkq= zpf~TyMDrnhii*t( z*!&a7wf%L6k<`1pMhT$mv5ZUBy1k)nJ@`aKmbdvB%+6}OOmHDc`>(t(Q(G*!Fg-nT zyvp9kOAF!`nN&sWw!7lKYG~Hd5XjQr@&`^(BQcC{{CV@#Mld5lr~vZcF495Jx4eDX zW)JR>JkQ@jqe!9yf?%y%UOceO% z_(fN!lr^Sms4d7C7!jeNpA0qE@DxO&hnRMM$Zb!>M{&Mq8fgCwg&x=ZuI94<^3@qov7*zZ-%yFCZ#^2#_P;mEdOh@VzUm zgaM5WxD`JBe?H+)nHi=_gii8)4{dU?)ns=}E$;W^DZ_@ewbr>10R` zl>B-G37PiVI5vvp2Pto+P34q0;*o0RRW|N_KHF^*K0>!$qfmms&EHwSfQQRJ_>N-W z@+0x#>E5C-K%SN`x6YHYe8Laul&gK+)wg_TuOgZ8xh8BH=eWirxa zsUt;hWBakaZ+=xnQFCQ|WJ8$m^w7MMKt|cAVQ@aYq;h^tMR#Tj;dqo0!43biq2a<= zZBf%Y+Y>%@SM}<7@m{JyIqdU=0(*bu`NW>U^z5YDwhpIhMGybx+uT;(Q2M78SJ45p z!Qlh@KF)EY^gLOnYfAx?CNuGZ_KlL)*m8&d)AvYmj(B3+e+b;}>te>k(%CdU#bLC$DuK`6c2&rgk)alWv-1UPi5iOBrarsN5H#sW{+m~3 z8tgqVNO*ql%~i~s^XQeA-rRWXJVmIqH8z3^_k;DQ99)I!YHI=KAvGfv?uQa16H2NT z78K+P@&#M~??LY)9uK#L4RD4hC(i(I1f$lOnRnFXL>5Y>gN{qrdxdE=oS)LZE%vy4k-5FigsSngRME?d$xtE<@4}uA&pf z`gmYUiaN-?f>Byr{8FC#oG5!gZAD%Pp}@?HCW{c7ZxqhI1PVoUzcCZrg5MfX#&P2p z+;(JFoN!QdZ>^Ga++}U%uCbGj3;6izh3tfD{%yHirs*gVC5$&1c#_l3eF3xA8Iz>G zy{CJO?L5vph&_(5LUitwnWFDBNZEkhv5AmHeME9L4~DfSm!@>@74=XnG7Od%*F0&CQaGgD>ZQu~wO8zf zcdxA+EOF=dOvj&pmP8FBb_49+ z^AiBc2dS+C;H_wHr+D{HM4*5FKNX264V-aLmu4x$y6+Bvz7Ob93UPlla8Gx3^q5ZU zToOdJJG~k=x0RYm;dOjiuxIDw6p--L5mY@WULFGH#Kpw{cQ^?SK$&>@LuTQB%V|w+ z4}yw{irn|>%#T*Pk$gX{P2LSY@5RmW!j%`aR7r%7*9Y~WgyA5gjj<(C-VR*?(>Rea1we8M6-yu9qw#`MwJ%X7_`*UZ2VSQF%V4F5o zD&t8R{`rTd)4UrnbI)?7pCy>O zNac2rXiRA0+*GCZCc)yfwVa^8zrh+m9MtA_udioXF}eLfipH_?RO;N_vm{E*(on_f zMf=eu^&aE)m_$M`K|EFbc_Dn|VZ^+ppQ3NgTW)f!J?Q=3T4Bc0In zvyc3Q$g!nOvFW96%!hb-KHs7ltAubxO%oEtnBBE#RMw>Y?ynk-9P|5Aub+aH)|94?NlmE+1;U>)eAMvy`AW@s9OwMu;Y^|TKXqF~(2}xRzDuBKZ2qrxb(?4*=_`H_ zvKB?-uk8twDkIG>GV~02+tOL*36KTx`ZaLjM<*xu-jascJ31a89xe^c#IHE8$B(fl=_Do*rp=NfiyDkG2ka+4QfV0DzqHg=f`7Wm+-dWgq#c0L1nBF%OSLS|rT7WjnZ@IeR$6kRERy+FO^ zx?i^e!glZbI0lE>K(2=)$Rk>v`EK<9l^>votTb1E&{fo9Ai%w8C%ao*S~7}NF4+ge zO9SUA(+7u>`#}?!mq@)sMtTt$5)rWg0@14TrKgvH_X9|4WexUN6d2LPMuOv>oyNhn zRnF`G1-#gZRpoNRn{ZaXQ&0&l6oxLI;*+i4_GkYUR=StkI2?SUEN53l=WS$qdFvQb zN))evDa$N>x?92i&ah*>-w99h82&ilVpIFI?)^nuRLz9ijjhL>&JO+ho1!&L29X`L zUl?GOzaW4hNHS7a=V-54@A-V$B|VersKY`QeLtL|B0YUrbaa+0*yHt{{UG;X?bcEL zu)a(}kaprPvz_-s19oe}1x5RD+8QWrCN&y1LdLFRbyNjg<>J}#o+;;n-OoWCtniX8 zudlPZ^Qm75A1JlneRo`kw??7=_ipRD&PoWX82p5Hjr8T}eNzg@a`vt%`BgN0`AjDz zY%+w;&9ES7{`TayQJ4>JWXkV}4W^~6UJW09Q%%MZwA0+f$1Sv--0Tve%aQRf^Bfgu zhIZ?5QG~L&nu*xFLIlHL(S0A@sN()FG9@`mw2;Pc(PIX0GfDrI> zIrTjTDumHDmKnrAsQJ~?#ue(R(NwpS)vwk_Dt!OeZY-`Rh`+Gq*lnPClN#4Q>P3_s z+~=ttcm6-8(xX-5JsE=+QOUf^OQ^laQUsjfXU3JFow{3^-q$0cG zdtEp)Zy*?NJ4(1+8ZHobu5L@FWNWwWRTgJnd;I>Z$K#Hf1ra=!QCxSNQPo*jKv(2I zRHm(->v?r}9*xZG!GDesjcm4GOjlTQla3DS`RI0G#qBpBEXtp`C=XD$72!vcJ-+M|*SV4jGtr$Tm7!=G()LrN1=IS`}pj{Af zyR0MGp3GLLp~q4X%!YtF5T>w%k4gR!k}o-cBPUliG5&B#xRpuO z7xZ_sYC<1C1`Y&nPew^X*f}FQ-)aLL5w9_1X1{)iSsk$uR%RRv2N0)n>8h41MCm># z;NagRQ|j0OlkfuRk#7&q2UT_uxTJl$LUvCO*w@qZZvF%QgO-0(UTq}K^#%Nwf%p;% z`gp4HNDooH*>3)2cSD_cRjMB>f{F2R+^WuHfW3Js+w%fb!TpO7BwwFS+CHM!?iGalzP)(!s{60RX?FHHqnrM`n|KWkdkc@1?mtwMX2AL9vhde5 z9{2zvrj*60aPRC@sJMvs;!~zsM^kLgzpCo0h-E&aC^chnsduhdQ4`PDx7jtO z-2VGMLg;QaA`L&w^3SSK6|Ad0(S%;#QI5)~pbTRlF%a{UC1@P=PdLn;Lj~#c55!jW zwbk^8C#$aP+r7f;;A zMuyunTCUv&RMUx6qm66Fh0Ws)F9@mPg!40hCCfKh{ymptC5MKhqC3ayVA*kRbc0(9 z@F*!C^cJ+ErPQ;O(7ViNT<;!LEQIyC92P=t4ia6;?ttjyo~O=!_N?GvQCwQuid|`; z;pu{m4BaJJLl4yjuM;GsGW_M~n-zQ_%Ws z`XC?()R5)1W|egr*?;C456iExQ zuMb7nTebm=?i+vtkxoGU$c+X%-BULqI2=>5RKLG-_YsJrB)0+m;I8H?DyO zX)uw^Mp6_)L^{>v&Rq!5ea)Z~5)lzeD4X0#zrUfO?zVW;n_%hSz}|3ub#?bIP`Gg` zCs~!im%+GfePA@FEy>Oz=1pAq&DUv#8b0+ZMT-G z`5ckzk4Po6EqEuC)@0!Rshq0*FrI7;$4GJ=&V@O4c7hpFdI^85wxSuvGzW@bt+93M z{>6Irz#D6$4iw&FjPbRYnk+>U(;U10%hI()8CAR}BMH_0WSz`6S>nXn>AI@l7t2Ya zU9=%OZh5vHAyd}U4A4^U^FCh1K;gF>d3yS$*ESrXey5W%P5Jyh?XrvETt%n|5ee13 zp}RxTBTg|-eVy;NToaL|~RoUZ`#ZN|{0nZ)z<1aXcQ#@)3)@k*+a_+uoc;Vx<{n}`y)#5}ef7K5gv2$wmb8#s zH%U&e8q4(ZK6wCzWxV;Wh%ohQ_ZF!y}YMy-)9u0BApvFc189xx&34l#tJ)w3YdLBvHcXnO;q`=o zS?~v-)C9A+50I5iBlfl)5L-Bw1B^!%NeKyg;_fOrH~TIv*ZSkn95|Ef7_#o=3r{Wa8|#q6cq64gduy7;^SP_~Nm?B=yMY z@242Ry(M}{92JmI4Dc!F4}QmsWC!uL*oLunY56aTlK_`d?wv4LG6HysDSfU=0i`Cu z;Ik0jfV|7*!%kvZO-qJl7a$*YSjo5rF}EwVpI20cSb5-DQ|nNkH0{~Di_EBa^*AWS z)zo2~^oTt0czrH7o=-~m{3W9;N`oE%SADM~v=*y4>AWGkl7#~2@v{1|QYx|5aOs^9 z5D=F(gnFE$u#Jy24y21DtvdMQlT%JNf(JchEmm*CYhp(KtOHZt*JoA{)jzqvub(cV zX^#qBTWd+(HaSY43@Ug@6nRKPM1Azn3oiDFdAFB{aVMOc7qz^A`LN$caHpNPG%?|z zUV(!a#0w(gy;5?~195Lb?K?{pA8@xk>qtB*V0`~b$gx|}RclRK9_qOvyn!n$&;o~* z9Mc>S0>xzqx$kIy4KH!fFxIyP1;*dBw1kPHM`7^}1V0lR<60W<7PhV7(^Bpl3SRH4 z$Hl4c&!s^LwLGP3JsVgdrXVg)r3w_fSDyh>DIk5WRK9h0_bt)BOi;;J?Z=>1MSBw{siS-NgG zz-YoV>OAo_SZcU~6v0wTe;;TyoSs9#KwM9~pSR5Pve)uew?*A**3Hyi5>Gyn`kNB6 zkLFoKYLY-nS|&X>E;txLehA znct+5;xDCn5+dBqO^9E8x>>Ngn*(k%QnI}e#_-imi!fj}eo_N+JPfAU-J?{_HN4p=z?BDc zB;Thoad8eT>&>OmDg6Ax!WlRe$JqC>EIvC}r8P#vNdGVsY#u>S1kf%mS#R6RV)t=_ zwM$rVaHhSiEUJ@3NUp&1m-xJVqfhM>!^Npt?PcTCw=(->@qX(U9R-UGe?40sB0y&& zi^{2{kAcah@UZdlBxuG2`E^q;F`+?8guOh#QsQ}DI(HBe4<{QI8pcTu@f^Cv!(^g_ zTmozB8DEw3G{A6fj)54wcJiXAYQxs=D9p9rC@MgPxg8a%;^n^wbQ`dTQip==ez06* z7={(uztLyk$kh}^1ilZxgSreb){kcYy%I0IDHs4v@*Ge9#nfS1@vt1Qr{!>cbc4+N zm5T*bjQj5Ex)!3?^Ii-z{Kmu(t11`Lt_m*>`j!ES5&Hsuv)4igTCbBQuEJgZoJNQJ zsfv4h2TX<}RJpo4Ja@h@&&IkMn2`{WX5P2z)b-Oe)2q)-zIU^F|4yuNzq#}bG>aC# z)6Yt-E$>+C3?uKX;!*;4+KBHmynT0Q4%X&Z^lzX!XHFGyXK60uqfu>KdQ!nVe3K`6 zcb~TE*0RCvXC%Sj$EoE_Yzs}vrDD<+7;M;bMO8E9U?pE2qpk>>TW!yWMAe6b9-Tw@ z_YoeQtb>+RyKCwCzvjFrjdU}a$<60Et^Edtm9;r0J^M)up#%5x$-J9X5|IXo;h~Y+ zEElwdgi{kI8&W||Uy8U17d*t5#7Bi2>G|Fl!+*v*Q<2A1c)Jx z{BVjTJtIL6$$E5o;@_Ef#_C>9v6m4+3xbY!@+?7TO(7Y6a(I}Zm-j*L_VyM8p4Qkc zg!ixuS*~_3Y2up226+I}F~H#iO(bYY9C@Fa6b7df{{K#c#saxXtinDwOT4_4YXQD5 zfD4eRV^&F6QwQoWA{q|lgNlO>wo>XR>KlEDjzANBFxL>jrXSUr@+b6oIfO;u386;f ze;MAr13YZrz|%=r1SDOk+1ntA`Ks68uI*D7JI5S|Y?c#iWoNw?0^yvpu6+UAv-ZA$ zfq_w+Ig7w{vHvA1r>6xp3SdwXz$=;m2>;0VVq@S=Fkywz{pLdR>)bd2t;W?nNy0iU-EPZrxNrhHW`QII2z=1yx-D z0jFkMO<+&yEI{MA4NdyjbLN_5^Z3{TW2|~u*z7ESS_y}fk*(k2@YRd$w|^$X{WJYZ zQ|F{6$f#d8H;*gRJUzMzt~h8(l}Raf!2RO9MuRpX%UIi6#Zy|rQB`}JpKS^TWt(GO zMaw)<0XMU`_qC=L^_O7wa93G$5+t7O?b6yB9{7gCMA7!DosZJSj~NOUc^CsM58gSz zF#0h(0H%#m)8Uy(1NZJ!$wrco{+i2r;3PGlYVXI)A+~GS{)GVpXY;Mw{&stMSCyWi zU{?>{yl$zdQ`pj4Ey>AQVyEU_Rs_*2e;eWZ-~YfRdOUnzgtA{H8vdmahG#L@4-XWs zhXLI_dlay?mV32?A1_5jqbz9Ze53-08cM;;g1*LsV%@GeiR1j+c-1e?V}P5Hu+3L( zDK_5UOx)5r4vVjJ>ELv6K3AL>6#m;TfbbQXj}(@rpT#VxN|zUGXgrBU;0=C_nPZFQ zD3-rnr=^iN4@#d}WxV_j>u1jJC}4)}rFMDZ$WiF`y&9tG4=%5M`t%+QjljI96&pCu z?`^GHz2mJ0dnUDYCxZSAw0N|VL#^70wx+wd zBJ3B=$N6^f#(#X6U$*uz{+xeBOKrA^GjZcxx*9r9uP`DM$Q_?NV;ISKM#Z|KE(9XC zKnf&<5|CodhQvmsVr$#65`ZggZDm7U9k?)KooW?S`tUnQNOS_}976J$5-a;T4w&!+U(uRPI1U;?1T55%WM)(BnTw4>~^2hZfrnq}$|xFcqtDMmHB}2+GTszgR3!Cgb%n-?G27Hhp3eOeE|j zz{~jyXrAD3+=VQB*{|2<2QE%dV0mmL>Aa!2zrT+~o%0KBY(x za*XD*f-^ys4WgnrV>Q*JbHLAQP<5bE%ArIP6&{hpM?_!-l?V~tYZ5bEmyH_>i`PpeLb@f$E4Hge+TXz z%kF)qxCwkt+uY5EXtI#K5Fv7R>CQ2ik$((vU?=W0V^iaKu@ngB;^ifL1tY+xsN8d! z(5nGBGbf`o`H_T!pPckYcv;uLhIp{D((dU$bqU6t9w12#fpG}vX}$P*U$AaXX&PP5;`4kU56hDAK^@?ab$jWbend;LX^sa;_Ac88Wgf>_HGbTMh@QWKf$tx( z$X;*&v-v_&db1sE$sS|rfrq{RtKkh`&cz9{k#x|xuY#QZI1YepW6 zNY0LR!2{$cZul+Q==iZSSCYBk51Jzz4u70c?up*M(kWeN=1_Oh=cT>}rD>MG;nTU& z-XY4af@QP0bGcj6GpT92uJx8hEp_FIM4hQfmH9}$dHsCv8wapH<2LAa{b~eJtiRNR zcD*1j^tv>f2PPBDZ=m%6@8ilQ@S*SVP5ZfkFUAsBK@T1I)eL?U}XpwDfE*E&jFkUS{VX-mXyU=l^eD-nOH35Cb6ibysca7fIy;> zo;L>C2l=Gx6#zqdaFo^InbL_r;8RMA=~^7sv9Q03zlA!UPiT|TvNeWw$F3l&zp?$x zXtz<@@+RLiH+*P8bLO(yWo@)q8jKka1E=n$DXQYtp|&?fBBx&SJ5~(Q$TQ)q@H=cycMBjA8XMAXB|c5e6)help(GJygJ0P=8T zjI>CN+XK)5wZe@3cUFSbYevoAdTFEx-;d6#vlnjVDf_`OD4@2-|=ybxM#eS(x;`X3`T#pBpy&4R9a@Ik{@B_(Fyd6Lh z@4(VGAqk;CR}uW4O;l;7pL=0+-8`|G!EJK|#=mjqZCY zB{Aw-tCG3^*J#4B>gqGlQ{7GtdPxwM0Qyt7j8FqCCr2ObY*lqK?s>ex+?K+fR%KKj2i#WP4zBH)Twhj{E)w(<rI0<=T%$mEJE{@nPy%Y7N zzJ$M;Wvi6B)vNu9dR#mjX5H3mo1X8vH9%3@T%6^;8dorrTK@hNbNA~5j#>HhO%y!OtJ=j^_bGZF zzR_5OD&x2Yziy|yA{O53vc>7+-~20{tr^!?%zGFz=Mtmknp z=*laII)#Z{=NeB;?N@%4J7OsSD}uz`S}EviFU&J22TQ?RpO?!(klJ!mXog$s^7{ zS2$(3Zv8o6lH=;`P7$1k^1d%kFnRxHsq-hosVw>4)-QjBvtewHR}8-d@&*mR)tm)$ zq35bLvJVk&%O746aL@*TG@za*^gJ&6vmgbWov2U$B;NQdkt3@qh)8yY6fqWX{1?9PMgtG zv|82ATqQ(V!#^tVUcYu2v22S=P6nvC{26UG38YrScpV1^2V)2JwAV%V8udW1Kgq)l zc}iUYBy6n04o}IzmJ0uS&xS|>fKetgIwrEpH6Haaury!1L;6#d)niX(Ec5`Ii{w;4 zE1$XT~_@R9!*#@xuUII`E-;2){rvzb}f#IXt=pc2`f%!&~%rgcZl&WE^9F29W z@5oKkXrB!Ced=Fq#9wR+<7fPC<&xkUI4Mr8&Nb^yOWJC%>a;Bl??Ft*X^l4v^hN6FxRpUr!t#!X!2}YcP2U_6*d1{W55eg~LPW|FY7_`AE#aZn@VEWUo z$&gMKaqiHCjT!^S#D?ZgF!_kr8EJzi*>Ksiy{Pg>hVO1GV{L1#ab8q-)y(KcWKC5) zP6kZD;_@;LXYF|RTG~0tv_K&nL-bL_YA}aFZu@*TW4O<9rJQ~5N6y*4c;I&N0*)w8 zQyWp2U8&iS$8u7!aGg)oTFS`^AzOg@^oMJ`8_S~D9g>Yr6_0``I3uiCkxW7yVzaTW zKtyd_n$%d>c`X%PGE{iWaszXS~w_pC#2kR5-gOPrEsj+885j4EEA^rcJ^}gfV-Qmy;)p z>ZfMME1Bx)w7frQ*lnk|l#aRcFdG8vUwM$| zTPTA@$!zUsisKgnAfqe=v=q)t{OpmxY;vRFAS>>>43jE?G-!o++&etI3>#D9RE-n4 z3_%ZNWZnPb2aVvxCNyC=9qs~byJ-pH1h2e6jU32LnBJJuz@tE5&MPk(c=T}-fBJrL z>Vtqe3O+lg3Vp5Sw`i4Ct=tm*{v~bgA0wQuD@V4L%kL0<#m&tn>L4%5Gdq^y2TDrq zPn?8*;S3?iDG8`X6hxwvF9qv@>ohRu{r&xm4O;Xme5#)0qHg=_;rrVto(^IlVJV&KJ4K?Ug!NXvKbIai1*Ec+Jif z01@zAE<$*?gFWhX8p7=&;S!7lf1>Wi7B|1jX?m3-3e71i8vpg>IPGG+>5v-RXlKa; z*Y;IEE0&FS6cnJ`{t(_^%Vu=J+b^k-;8|VVxwufWVxVKb2MbjI$Jh_I%Xt(iD&ut- z3HAZ>0-rXNrlEWZ)|rpfYg7zAh`-!~ihc-IXF{WReXn{?C>-k(`OfRC&7t>UcM; z4Go_HgYBqSj)S(3f;9(PRw_yOQRB$8LZx=Txz~p|a5n;?hL~}eOKMIE4S3+w$TRAp zRx?z}cMYe}CdFSQtu%v!L^+5!)6B@a5pI@*gh;FnRJ8pa7S}DXsnWH6;cyMmSmAeWr;T_vbv~a0(=WPqanoT*_KY0fl_8S zIu_)J0@0sjF=jb$P|;|>=H>w=fKtGp|9Du<=9ep{ETS~roiY&1Hk(VGuKh_M%J_@K zW1mh|^nyz3cY#-@(LT@jid#1c*lZS_*)UMFFP*TBS+3Zpn<+;my7)ZNHem1nwC z+4y6!shscqR5bYg;YS76l&?4EnkkFXuA^O52$o)l4>0uJLCm4UeIGj1v{e!2v=Lslb#OCyQl!nMKJAy`dt#W)^@`4aK z6>xmOyn1e4I>ND7VTwSGPtLKJo72T*bd;}nw2fUxkmN=8x$d*EBR#!vrL?x59%;>U zW`+m0e$UW1hL@r{r&4kdA`NDIRUniwZvgfC<39>^GuBRnEc{$oH!y4`yBGi(qf#c|InT>JB0jBuLSvt<< zr($dA8hP|e?RjxF$ERz9#AbS?qjZv@3n%`=qcR06X%0WfSSR2gTh06 z?%9X@;~ypyJvp*~{o-!`HOP@o{0`HahP9W!!~}-*G9c`O!{K1g2(XbJ)}SiAq~Rs; ze*)-a089#(CbCgqfSC9UjNAg}{_xi#)JkP6CVyU%)L;-e`pB6NlrKT|Gu8%%7QUyu z%>M=Hm|6_6Kt}gDu5!QgzKVtAhoB2qN+-DmbQadj*oQ1iZ#>zEMR_6mw1lUGWsf)o zsIi(~M|J+tit{r<0+^2^JwwVwTHo*A6B=-EaO!+Cxl)o=zG`a>nhSPS35Ovp_H8Y; zpu2XK2$j;l(QJ-5YcQWd1GXQq+dZD1a%|kFTtQ=k7tD;!kB(%_Y4bNkOe8nB?R}kw zP3MrQB1Y#NXJ_Y0<4n^kTlP~=@!ni@U5?cRB~=+;y-b-5F?HGm3jf`|423b5ZR7*w zsTRuVBU{Mny!QaH5uG&SHVw4(?m|1eeDkHGOj~`D0)fbbOsN@%7am=NhnFam?f_d{Okw2yP@A6l9NGHywotD2<~iePX^mAiN7Rx4wT_w zRw06{dH#>igcH4ubJkVM_FixovBCME`v zRq(HT5R<7Kra6&Kq;aZmXfSc}gH=lklaA3ny!YQJ0YvGF>i<%^>mJ4CdWKPk35~G6 z8V#g*;DtE*CBIVPs(IUcHGxc7Fg|vh&6Q?fSD#;4mZNe%I)crIa^|OkpU6_MS7fnS z;T0iY)^_nQthy1Q1QEYnwzEIPiotr_iR@QGeEbBkssE^F#Ph`3Z}YS0VSc$~L0Q^i z4m5PTf0jVx>|x5)m77``0dNe5*UIhn(oY9elJeL;>Ze##nS)_d_vYo%aw*}>X|xD_ zD9hWw_HzTXdXTyuW27Q29lR9MqAnu%EK+q~ALNN%|M=R6 zr^J5ej)}DTB3`J_W`+X{(y|B)_82s9{n_> z9TcbS+?%pEPQF+GIsrknzFSY^(0~ClBElS#k;>2L(f@twA&VhM(swspdZLxnm^^lM zMt+p10I>33a*ttx6p>)niQ>I`?d^9YNePLOuf131>G^i$1sGOrFUJ`o)g*#ijUE;E zq9zf&Qwvq=MApn^!&SNO6%|rb3N6$zt@yy!nP_Tt%NQ-nwhi+_kRElzu+b%jP8ErJ z$4PyPS4RP)YDj^=@_z&nmF>5&oJ$OTKV=@Ejy-6&VtYl}HWm<~IoKLJTEby( zh{b_%=IW6&AoxTg-ws~T6JT1Z_(sRXh`Fc=J(W5bGlyyA^n&%w33?U^3QAT4Nh)&} zu$GI7{Zw$D3@JCpug=NNR$}DhdVRZMzbnqBPl%SSLlVgcjw>}bA_<^a_sUl=HvjZV zOj7c=M-c>LvR-Ico&+cfOD+j2^NM&Ip^E>P%Omy@NXc@{1^?nV&jUkwxR1TcF$d|g zJK(DdLbC8rPfz_OkdrXO=c|HpLpr%3uiYe9Y>qRP!_OS!(K{?Bo;-K5xiqBW)}0e&V&`i zJ~MK$se{u*cW%3RQ0n28#QQ_QfE$9P=o?W`j_;c_Pbv^*m5w|W!Zk|jY?LS$O2FK8 z-NydDOm=O&7}X5mT@G+hS<|F)PFs`g(OJv>2O)Y7ot7H`+c`La!9~*l_%(pRoay@C z=c_7sJS_^xv4~Sw4>%k8C{ri&!Fvk-g^EJGMH$gMv7Jwl!qQT6)-5|#)fnU*LglPs zz=V-+rk6dRl12-~i&fNIt2_YSOP)CGHRFx6Ur2segrAUpVsQ|l{?G!sU1(X@yOCy! zANHP;gy$T+wiiRvy1gqlO&;iiwp~5#z|elp8#^$=li0H?R+H zG^<2vOZlfUBRNZOoh;-AnbCe0WVVL4J)zpFJsoP}{Y~6M@L#fsO@iwl9aN0V?I(*z)Bm7S z>*joapBAeBSaFgheitP%BOk}P*#KjEIriHhx&z&AFgp3}BNDAhy(U~_Y#|i`-sq}| zpeId~Va?}yBLvFQ^t`I$FHnhszw$wzBE^wsua}jv?&!DGwG#Ivg0~C!py5XARk<)M zoXwBT|4xCo{NWU-{{>ydOG-)oW^bSZCntxVguhPPUkR6XXA~cNxd&6@jAG`%J&Dm_ z_WJWgr@JdA?`P!4o3R6Cc68L7VGCG-+DL8vl%*i8rv{k|jOz2}&(b3n$K6q{iHM{L z=W!(VrUd$<{Dq9epPh|jl`kYKwNXKbN1PL?X}n1$D~lhcKH%Ds8Q}#Zv_R*YJ%wX@A&q?a5=zs=q^@RJ~5_23y+Ws)di*OFYqp+E|opyu9l4r0Hv4aouVh zC<+#3`LE^J8_+wMw7tt9Mh+|3V4`K%8MJ*=&{ zvp=Eu_LPm~5QbH5U%x7U-qaP3lg42J`^|?Q^mKPWy6f^vJp1=C^e|0D7yn~#b6K}a zuJclRwV9%99}0_BL}vPFFugdaEyu;x;UxZ1+b-zJsVjd(xw;Y{k68cv)fWlhzGlOW z!%Zn`S7zyE~=#Q_k!S;3$d3KQ{xLM5JCITnPar6q6^NbVYm7-7_igmo?*tt`N^ zASo58HOz3Csi|C~X8AuP*&_7_Q`h8bt!_>ppXy(8T<(1EwjST;E5C=LSmlUPv&$`< zQIUeJ>^}sCrs6Dt$L{Ov?+>t3SeQ~lc|ipTg;-cwfGo!mqc;>sg@iiCzNRJ3zLM;SZ;9J5)jqbN;W&%JI7xZ@zR*@r+NmJg&K*td^+fLmGN z6zf!VL+!hU>e?>nN}f&c9?naMn~pf`3keoA%(k@KNd(b7p6Q}QzUtB;jJwN&zRf)x zX1bG8*7YjKH2Op=%T<)R9t*7-$!Df#+CGF!VJ0fio!cWPhh@8hZHzz|X~w6g-`v_t zNlB6RnS@&}lKSTso_X*Jhvt?-`hlz!&=x>sIcQM;<_0#`*0`6rUp0@PJA_VtaJ{-Z zUOWkt#8a)WT?{vyfm=1sQ3f3`bx^RiHe9}PIO5>A?c@&S?x|o*DSp%SwWuh+x+ey= zou7-jIT<$|b$Xh2@Lp~%N(Yhs-YGXab?KeY#&I|4*4ByJ30P%I3kwqq3kMSuO9uyC z&@j;Mi@%y^o%4O8`Oep`iroWFk0$O%WnR0Mm|az0SoROS9)8}RdOccN$2pJ)>%~Rb z$4D6%%mDSh-SDE1DJXpV`V|I2U3UDwE0=sXdp0;oo%;6u`?hhfNN?s4ZMOM$?^x;S zyG?TQ^7=k3ExFW#Xq-u$&{y}auOOIq3+goRz`m3)Wz$g}dwlWC{UkyF#>a~mlQ#ac zTi#U~ZRtmy$i{~i;lYX=!ML(uT#GlO@HR?yAV7q%&G~L?YFo{l_~deD=hw^RI4uG) zT7(aqlY_mDPsQQVGAbTE>=g!r2@)K~%Sc@Ukb)tp+#ru(o`SP05Le&}lA*ZoJ2Z2v zq$0DFQ9ut>$4vmpzU0By>KmZOkt{s?pUFX@NFbQzl7>^kI~8J9lqxS3MZuV)HSZyfQ)ecw^(ktc`aUPHQ0XGTJj>fgjrqj=1SGT*+u-Qj`D{C;H z#-kUfa1hnQ&FelGD+>th-B9O(>#H`>%WtOh3aE;K4-UPdt}YQs=g?1xiXWK= z5*#NMh(F7E&dBaI9!Nm%5#9QfQUf05VnwlbRFy8?K2A=rfU^e)S7=7#{&7rq|5LRO zZ^eQ#a&o3W8wC**fptft^K<6!_eSW_B2=>IeF3*pXar%bb?kB$613j{wQq#Cc{)Lo z3o9WZafI3rZ0h-Ln}u~)XCDNGxeI4NED(Z=F}*`FsEb0<3RcRb(Ifkk<7Y8?dY?Xj z1_^O_Xkf9MNNOn02`(-y94Fm$B!$HFb+^y3X#|Vaw?R8XPfYc^EijQZ#(Q1ke#yna zh`^tv(#G{z3J3_?IU*y|*3^V!NpcA}Z8bJAaRm>2U1uQ004M-ciE2||bE_5+a~;Ug z{?BipdH?Jdj4q#OaOwcrJSb?HC563#W4aO!E1^g_h~O*!;$~nexcL@z zO~Tm$r!rVLdL|~2xjAarhJ5(i`plU#fCRDt*uu}q!7&V5QpnD8FqeUy-GHnm(RGxk zC#tkGe5}H#;yes$fDmLSGj;`lKv9Dhx+Uutc}Yo0p?Kpl^8VvVY%?QEfrVx3SU8ch z*}M>Fzx|fU61Rujk6De=F0~BC!V}o!4;j2Zxn3y$0geOMuz^)&u{Fp_+-~(6EdeTM z&Y(xa9xi8XUM~@0VTF^gc9qAxF?kC9ZqqgJQpl0+*49&aOxju4Koa@XJe}{Mnm4+3 zv#_S71|<8!@amf=LCF zQAu_;{Lcgia%H=T@ejRv^$J*2O=mzj6C$|jecrgd8DG-MO&UvnjoGf6?Cp&y&^~^= zWNok4~V*gvQpSc4`>4~`OzO%b9mhtnFlrCX>fyyWo{rYZar~1HSUzy;=S6px+ z)A$Y6*4A7QmoHxyuYsm)v3>;J*$aG$%Q5D$#W3N{SYH|muQf0z2zG%PE;`agzFj;J zWGbE9ffb8qR_>Vr-tOD|dp1A3Q~{Y%$jN9DUp#<`T3SWjY93sduz}KfmUY8*s`DWLocOTNYsbL zta)WOH=pwIdfSK7J`!tL> zdsZel3grhXrKQU+@4p-yqm$6n)pZ$y>*7>UP-pCsguuD^c{p#raIG)LrWvn5xSR3; z;nM8G-ZAzP-iQ}~N~YsY4xO29^}Fr?`}(cwSOh>S1)?F$6B8b#}=Zx3+btAhP60c*B+4xLvD-u;_9M3T9n! zo<_wLqlTmwX3kZbSXyQZC7)CplDj9ofz6aKjE1QPs#^3qA{0a~9zx+Di77;_Nzm zlk5xH`MJ}0hrWfAngvTI!3mRZI`u*lV*5oBKsx{4^ADWT(X-u*ZV^_`_+?~djvdD_3JlKTy#L4_?PV1x6GF95OV+DjN3X~ zYC6t_&PChQB|4)jDo;>}XJUL(NQ1}1(!$wm($kCCHV_ksYf&#f2s(+w0xT)$NG<_c zD~xSVqbqiCaY+Id0{q*`!=zTfH@mt8xB4^@Hk%J~VRg5`ecx>D9$uEy^AY?O&$&|~V=IrU#$Dmw#Bp2{F zw4vhQ2=QsFO2=r4(nYDl6!e^@F5zYs7k2x=)$yQY4T35L1u2887qq|g?-D&ZH!8e! zazh%T@q7XTr`oPU^+Nlns60@d`gaK~q!9@<x%uLL_zy^l0;%SO+Vf__0WkR=vhBa%?GdjOUDO7xFI<13j`uD+P8a;N zF#Hn4ZCrZZ0Rc4?9rQ>bp1Xxxm(Hk}2lg=_W9HG6@Xfze%p*+*u@7QfAo*EbURDGz zr||Ib*A+l6C(YMFH-OaeH30x0M09NLoNH`v4^>r-IG4-*8^V%A!-V_y zr}lRcz_LGaf|@dNAJLGCj4jnBEG(>EGRmKUfkE?3=Ehi&dY70HITagR=2UbUUoW)& zhKyNI@Qu3TD`*UpincXc)U+8PHfWvm$1|?4kNf-W8eOimx3@!wTbWco6cuqkLqd}G z8kE`TwGtRuS@rI1mk@zd3oG~zj7j{jnFc-LmE@UK|3r&aSIS6sjf#o_L%QV10<{NI z*PLkf@Qo`(?xms7q@O?{ku7a2!vCq(|NFIr&cAkT>E163G-}M2Bo$|nVBY!iWk##k ze*!4Qs~Z~zIy$Pz*t;Kdppp2>x7!rKT0K8Is~MrS%d@JVQZlXwBv8;$R(2<&Vn0Sy z`a=-`g-EwsZFQ$eC9QECd7Vo=FozFzRc-s-=wz|1Yn}GE{FtmYDiWZV6f zdwMlE0CN8&$qjGrmk9rFt#x=|adB}WDd9=9XAbJDzym_hOi)npoH_|&i7sB5YUDwq z)8_^T^h-x||UL=ibIf)ijOAp;Xh^UTD3A321J;Wrm3I=7BL@U1%nILPY z8lf&rCH%OH?itSLq;1d+EJA71v>U4`M0EXMJDK`pj0WNk6eX5*w$cGF6l)W9UEMrr zJL7RY`LGhyhmvg}8%xk&L?J0%s=n=f4uFg$k_Ok~Akq-WJY@QYD*cR{ygaFC2z_8S z^07B3bqQb~m71HY%i=^;t^DQvsDy^)15tQ_R7v6nfI<>T6f0~cIJsUMY1*mE_=H=PJT&zZKU@H2y zzEtG}C?%ufGHK)(rR_nuFN=Dn96;y)83UkWLe37(3&#<6#PeY)m0O;qac{29U`!rG zt<+Uc5`3GA8m5gosFfPo3{i_q@y=1(7Q{jIPqDKi(gmPs?S;g^yW^17FI0XG^$3Or z`ihmCB}2fd^7QmfQg6%1r)Eyr!!+qQ$L(9`5SWP-@kvq*Xx~*GCc? zd9KIy&qOu&JUN;R^?5w?A#%dtqeqXRJ!!%v3UFFU-f1?wQnD7yu+wQWuhe&^zBu(8 z+Wd#B#XrtTEa{ve8kzRBSnoX^A0MyoG{W_)XKXBu?YBL`C8m9siW?a!$Qgl3A5j5H zd58LJycNl$7v|;+3KVnhdhu=mCqPt2CiA-)7fw6f(%v38=J&vFd#P8+SY)Yp@Z(Yb zhp@w4Z7S)_c*wYudK=RNt5j+dn@y-nF(j(KHi1-H-rJ_&KP4pH5Z`bxkQ>X48syaG zEy5dm7f5;19E~TRIY$ph6>_(DlGI4?-rfda`u`GxaFm;LUnv{_i#U>#mBmyK*v~nd z+^7LgY{ZY{=j}}A0a5BYm2zZU$4|Y5WMPi!6ycWFOB86(wFTt_F7`lXWtq@TU+y-T z9X=_djy}rG8!k%)1qHf2lHRqZTpBUUCKKR08E8JcFzXFOvg-f-q>8c|m$)Y2fpsDNx(Z<)pTa!P}S~ZA-ki61D zdP0c=_MzaEKuc?EWp$hf;4ZWuu?21tXD{6q+6J&BNQ=`Qyr#f3XV>6F79)d7)QpGw z>m0j#W#V)B$I!P=)z~=E1Sbrop#!E1U@>4xbDSC~@sd0Hj(|DAs0?SiCSgh#`gOS* zl-{@=H37qXIoBTK?EyB$lvFm(zwT1|{eY#D?mx56f8T%n{4|=PQ(2RMj*ukvpK@JS zkC%bi0OJf=$8P2TQ(>~su5bEgpzG<=r*(7?m*^dO9dryq^-((i8KoV}s!DJ)5;s?# zHcA3~#FlKGc*G9^$heWyaYUty+NS%Zk(3MII{`(hkQL`Sz&y$&BDPGV_IM#TA4U+) zEgu~08m!!l*a6OBPZO>M3SbxG2^dM7n8sj&E4OH; zoZbl;+6gYK`Bh!Py*zuzvf(NMovq4gCvkIg^K&5~L;3P)uaJw62L_(ue;m7yyA74F zL7{ROu%DOI*cx3mHM>D0P~Ho~vE?<-K!iNP@&0&&juhkzQqG+eZaDD&c*`OU0=NmL?mFy)YehfL^;aqy-t?cNK#hv_KAlv5vHsa@cQ8aOUq8OHW! ze4zv{meM^OqSi{`T&kVe`3>>JoM-wo)NR?UE}5B`+B6;0kbwY*+ac@}xphc_qa9k< z4adMw!hZiX9`Ekearke{2)Y0X$Qj z827`E%)D;et*IKtWC(dibh&wA4Z}^DIR9Hn`AfG>RQ_0>kpw@RHX}mB)oV{L|789V z{v>!z)FAgx`C3%p7ZPco$=c~A_p3EE@8C8*2a}&vNMydWPiAwolsx1gd1x#FHuJOR z&sX>QjGWb-!jmiXZ&R5+@O++1F2qQ&W>K#0*TiVaK+G(TI8#$%OG#Qx046B7e_m^i1?+~bVwg1Jq8L?p=*iDWKujn6Mar6XYf#;(S3sFB1Q zVYvUb$Ga!>pFe)gmJ2Ka`Tx6j?@sitET6F_8`2`IXWQZM_XLJ=nssc===!0}k&6#3 z_4d^qwyvzJ*|8^7*I*bjG8i#qj;Sr&CkW?6kBAK1(9JDqYHF51o7#pPi_Xl)m0)a5 zas1fTRb2u(IXuewfA*iO2ocqYS!idGEHxq{AQT_tU*bQO?7G|t)Iw+hK@A1!BHaK=UH??GGdVc|iO|0hB@&7X zG)Ap2XZL>YVjDkz+||FfzTE#G$P@gW!M9e4nRn3p{WlT>@UgA8cXd2)E2RG$z*$^e zEcBS^9<&^P3g!O|^MJzn!S0$Pj$5`rW&D3i!2X7!9t`0&-M`*0eRb|X5T!@KfNnqs z`QO-;Y618{{8xxrLc)aC5AmPB@Ruw-sV=$yE6jm0)PMWi|G)Ure_~l2X>}Qbe9ipb z`h0U9u{pYLb0pF0NZGCtoeT>L=3K4e(;C7@1x;|;og-^tctXiL==7*>&;pkk2x^fb zx8a9HxFk$iP>VX|K!9cp_8NAn0kJdn+o0Pnui*4x%r zS63G})Up!3qWm(O#>OLXHc9)HJFLbcjR-n1Yk5i?Xdr0mDHm4_PlT* zHE7Y)!(5ff$H&+{VFA|tcdG3Y=g)aGZ*nqab-g}~nvjy6HHZndhcQ})c}s_+TiD_0 z5t-71erBDSKH{9d(>69aHa2psMLzi}5Deh{`!`-^ML0JmS`opyzSn?YSj3V`{dlAn zSB_lSkL&sJq(mudjNKp&{d^d;!GwlyzA5-HVs`Ukol;vm)vw~`=BxMm{KDuo2+-Y) z>e%-eabe`qC{CMtk#)XmI69 z+QOo9t(BDsjYzNyBN?0g7kDZu4P7F9c?YbuARz{x;u%mh0bq!D=lmzg2IFG9qAH1; zKMMqsk01QQ9%0Yt5BL(BnK0nH4X)zPhDKFhAc0 zdA^E@in=gER25>NDf#-@*-EhP^R~!fYHt=pRsrv07YW@1>ym%jfu+9TrA8DWaI_IX zb5b0HLMr8v7y6LOC=Fw58uXB2E6tS#G<;3D%z9%y2_#rE1rr1kI8>B{gyL^{Lq-Hi9~XJ^ z_)#SDuhQl}t@}#rwF%j-z+CaQjH?-G2HcC=l~e`}T#k&Ss)o!T)a(>53%GGgOP_(# zx)Mb;30a^r_`A3IJUOHTG8oSE6yBM{D`dYpcmLIB54FmeI0Z-{{5`1M;QoW7Wb=>? z)E?SEiCRAb8z+wi)CH6+!T+$brbYoQ_`re}bhi+ASg5#Rk=FgYe-_X7PyVxbep{1@ ze%H$$w|42A7XV!F`26Z?tE)MZ?)zx8`;WW=hp7iq8O|;+ZDnpmh`oWRh%KX~l;o0< z8Z&JdcluwUyn84Nk9kmFAlM0VKNhIm2YJ=8Gv3C=DIHE9H#ZN<`sYJas?kbQlLCbA z*pHp|0s&8O*FOF+35N9gd%m>`)!o(k~Y}xD1&niT?IqPMZ?npy$}q{}%vZa_HJf zeA%>74x)~mn;S4o@cu$^a1?^!5LnKY?d{A0`t<+$IDQMdOe@8i-*^*==4fp?iwhpp zoELKbu{_l0$65Vs4h}K=1>sATlRm|u?~ZQn$Bf_fFov6vI>eOYcbhXAX6*l>?nY^! z&1jj>v2E8OK4Jg+&9-nI2&i$#Fz-T^{=8UHVn!a_Ga@{j!w_j9E%=3vlVb0CsohyH zcLA}L8%q-rJl({L-1XOEq?Lyi;%~+MG=%vHGw;vUzRy?J+M0zIR8lB|ez#{P6cZR* zZEd)}#Is2=L4QNPXX`V8qI(Ih&i+g@7(a?6NL>k%5`H|gOJg^H{9sn6{Gqb&x@Jv8 zH8z=G+(HK;3XaLef)-{6#)O1~V*OLmhE9ruUg)5LH(1KZj!g^-kH<${xe|xJw)>9s z9VXySAlU;DA8OsZm}cr`m0lan48C4@li21K=Y>0Qty_S`WM(Z0DOW7RWIN-y|H@(*xq;aISKOS@B2G@ zug}sU8b>_3`2nYmF)U)tjLYN0ES-|f861oS0vWzNQyR-*=j%Uj(Olotv)!Y;!a(ig zRjJVhOtPh=YKg{N6wbrN!eTBX!~J%0MkXmSVa!TrUTrKXQ7?1bvxmsjeCLk+i2=#x zrX+Wda!w0dyvNNS#mP_r-|(Pp&F}hyr3Tj+kF!Z5=>Xki*{?fntqm23#qeW8W>i&4 zQKqis~G~~0M`K%j+WD;}k zY$n>VUcQbS>lpsu*Go5Jxknpbv$Vo7c6Fm|-G-+Rx3gtgV5cmjG5Lx31!$ z0PhhJy-kx@lMvF84;()RI=aXL5>5p%JDZ`%`u4Rt&8Y}B-W32uD$>v|dH~{q+bIEc zWVnWSq6$?{Dzn@C?2L_#Jv_=0aiWkGa3Z?M+Ep++1m*Wrqoc&JvF&NkkYg{1V|8-~ zN1ER?$UTRTj8N-t@9fl{XrF{I2r6z<=}ol`>p+Wk>sOXZ!BG3oodMalXQzP0luFk> z)CK*ppS9#&KED;;9X*uf$iy_x%85qF_r;3Oi+lZdf(zvpo5~(c5uQ)HbhWv7!O2Oq z+lbP-ixc{9q`Hdup{s82v!bsu{Wx&~D;OSyl*X7Bg0wXHGYyRILS&p&&8O1vTa?LFnE+zsN5@gbe#$M=rrLY@ma z7Gy)DKH=;v8j#!hQ1isP%pgws6(6QG~1U4nis<9Gr+D{M>Yo9)WWddTH z`KZI2*RPEwU9djAf1X=CefP=657W&ttn(}v*=La#Sa9VQk&~Y)Zp@eUJ@4hI|vsz}xNZHQ>xyTKakAX)vT!19fd}mQ}Iamo0%? z_x;-rK!b7H(1`^JMLD3+zh!p?npN~mNlT=Yme!TWR(s$gC#b?9E4nP4o5$rb_wHRg z5F3}ciXtAH> z?uzwHXJ85bJeT#fF5iZR45Q@*1Qybal&3*sC0M@b$=0wclA4VZyRW8tG$=Fp!wYs+ zRy$kU_%0C4rpDOO{h~3G*8J|mV!7LKOglC8J3fy#cwVzy{N2xiKK(Yl)LGe}PknoC zW~Sq`GBo|6Ei;@iFC{CRr8C^$4`fwoDXC`A^P7=_AzDz?l(@0Ed6qi@4A=o77oRg@ z@CJ4KaS+Xq$3qQDdR%mGmqFo?m%cJ@Jf6LVZqTKtobpBM11>7NBZ+K0*nMT*&!#41 z-$FUGu&~fO+W+|R&6ooc7Jol3jW2|qRxC&Gg*Qr{3V(Qnyh`8*zVkVCo;5(qAb521 zSRS6s3bJWVa%*85=)zP zcf;m7`|(u=1lO-$FANnGua-&wl{5_wsjxMTkDdNdTCVW@{F;%1E#Zw(p8wtc(?8zK zue6g+Bot^8Ez8TxO-+)J!N<`F01K4IR{xy-l9a~)0)#`?$BZD1u`w`YWM@A*N)bm9=JP$i}2 zIpI{a@Hka<@=^yX_##a&wTiIt)g6`Nz^rdV&%OH%`T)8&-#&RFG{J-EOfgQqba9a> zH~jpS#YC@z(zJkudM1?3qzz6>OG`(W zmYG?8v84?*Wgx`f-f)o>*6u%t^cz?-7((Ab_x7>Dek<7%;d-A2gL6NefAn=EZT@(n zq{?@6y(q++3r}_rK6&95GLtxYvwPBC^qBl^*hZ9*&LH;&Gv^lDj`be8NwKla(%$1h z!&?l8u`;-k;LJjE2MW5Jev_L~Q53q>FAtJ!UIE%`5{nci#?>3JtzTPfQtYPVDd9J_ zc~m`TnYorPv)Tfgi+yllU{*OgV-F?e_STl~R0ElwNj$kVUB6C$R-I?O8aKA+Hj*v& zpmFk(aj$dd&jYvA{pGzdKyQJ51hfnwqydTO*;Dyuxes!DgC0X;jQ$&7tWojqYUDpc z?8*`B$mAqp!u>^S#g`ACeeQDx^*%2TSM=Im;3;oEEdDZtNxt0E(I2Dhuk^wd5{L0# zcJKpdq@`7j$qDS^x|yR8d>sf15T`;z6^3L$gOkD+EH!3f6jXdaZrD6Aukpj9R34JY z`gmhM$uRr5>5e#H6r>Pqd;b9)1V2!UN#VeA^YV5N4;zK`G4k2L(W2H?sXZdhV`j6@ zx_hoaru4ueO!Gs@eKMUMT8W29cI)Lpe|5g4&scb24FfG#AZ%%CYy0^@hQf)s{7M|S zx@SRYF=KOca>%fm>*ewcHe~&!LHM1r#atEXV$b0_BTYemdS|HZMEQm(%}~x{ft>p@ zYbPy349jhPgnCu)O5@nnQm&cY>#m6#7y;z8J4&QEV;7;Vz!_lgpV9VW2Lls`7sIaO zW4I$U)^LyfOObhZ3BTi>7EfAWXO17KI=EXpLLj*U+~emVz)6ro0Y!&1MB2^zLRU}B z?sX~)VL>SY-rO#p!59_k<7^TY_}0vf8)wg2KVGNC_b;7@caRsk@oviFvNT5v`)QG< z(J(fKqr_#;AXa38JVp{u@0Lez-ZR zThrYO&tqb;cQ?6ZNC=HOri(>UNlBDk!ulX)XYF^J3l8jVbqp%?v|VVZo=*(`+`4T> z6NU=`6{lt1+vrZD*9khCRd3#^%g8M8&aDF;7%Gw2g+4I>;APOMQ=tA#)ebWu0L>QU zW|mjk1_d3e&P<7@*6Qu1IDD+dyFnRF;wj#rmCEHejm`Kkp|`N9fLJt;VR%0J1q3Xt zEVvzty4S^`aT6$+Op8lPuN@btjvYI;RdElsZz;4ms@j9y@S(?Pn$$4{n!S}8Gezam zq4s4o#eM*1^9MY9s9oA<{6uDDl}P2;KQJ%=wfOKO)hSX!g4W<&c}5E#wut5D185xP zHxAX!EmXv?dK|& z>mO<-f|6^hYip~kO>vaEga&jC9`JqZ!nzqOH+Hus?@E89$FJ~rK3f$=S9d1k@zi2~ z?_W~AS+zfxQn|cunyRJOONIn(H>aZAy}GOJ2w|F)wLzNVJ3S!k>qzL2O}L^RS`Vl$ zRVFLD{K33sR5c0r6uo|387VPT zgb*cIcvd;6TMxrB7|>EUKkB0JHo|-Y`BVd5zb(jVkrbTbPcRnBMQdkkP5Yh&?Yd_O-QA_<;=gsTv>q|m7?&XEBB&?02dsEyGA z>;eCf>i64rCU33(2_XspwF=QXL>t(Bx<7XxE!zRQN+mwO58hUth}4#u|LYG`;8$$; za58t`7b(eSNLm44{;b8jA`A&7Err@iMg1aRWjUV5$qf9TKhkoy#{Ql@rj)oj*>-lt z!jADC4EOwgMgRG5C;0s4YQ>Hd8k#028O^Tdj6Wl|c>78C$ge$mUjuQL8S!&Gm?W%_ z+EP#PD*&yEUm}_j&W2v3!cD%IzKnDKa)WLAQOl>e`MS?J7Ye+ou8rriP7x+Yb&m;n zRZN;YJCP0{z@dj~wBo=i%o$%@Y$b++_1s;QxG=ZT;7A zlY~j<>yKsq!XM2Z>uj0zoNs-Sb2mUD;7-@_H>OXyJ_d)GeA?zeo9fxv`h-@v7mjIk zMId~EenLTe_*m3IuvU)>j0(#PQV;*v3%GLhDqjBZ-z)POllu*@ib;PN**x{0JjNg0 zcb2@f^`NF6VWby^F0R=$da_)vX2)OVr zZhdri)5s|PW@%1iJ!!O*#rK&a^BJ9W(8h%gZ>>3D5gSLNf4$h^er{~i&spj}n`H;| z9A#E2)RMkr%YGYdSvDQ(Q3zqlEqE_}{$+e;tMC2$t*^}dvc`b*qyiH6%5cR1ZH?}B zYMc{Dp29dK5LzohJ0KdHtj{^L`?AXIt{UkrGx=p7QB2aAw2Mdf3wgV_O}mNK%9!l# z7fN!wR44S~9byG?lOdKrCvV>gM$9S2zYk0W{tIXb5bXvB=XVF>SUNbb-G0xjq>y?i zK&tNB-M&xpnICiNY+KF}-yC{+Fb4cN0#}Hwd-m+ zn7uzt7e=YUcusm;Y^+m30nEF?BqdaxRwgDL_bASjn98yN^Aj))2UJX;Cy5?C>On^< z-Sp)3!>h2)hV-41z0^n~uLEAavm0hn0KRO<=mN%a!_~54N7?_6HE#cQ+m#hJ=|#M7 zWBLsf{|CF!_8bFAzpbm-(d5DJ^{w8S@JR^O-QC?_O?o9JhOP^nsF(^G=P_7w)X(+a{gd zH$U^Y-;rt1|0PC)pr1I%>MtSotql9-+THE}88{UI4(qOC?@ ze$;PCRcMNY%t2*t4|-@kaYpKKKB7nlLXwaK3z z_jwK4hu?At&BIltI}F-4_O~97XcCsM>JYQ`4*ra^%xe&nEC`mjy*koP@EU~T&L&U4 z$?^=vZ7wt`V@fgWv=~+?4}GA;cI3x@9OtjW3v%SaU{abyF;^aa_gPKfbMzjq-V@c} zB5`n*G-Ww;HOKTya^*GP8SfmDY*LL-m#gg5Wz4^JEoYvJ0=lqQ8)iH}S{|hNNbOYR zux$X@yeNB3>$XwAY(!E#9};=%y(#~*BXCBLEGthvG`+kq%0BYJnF=LcjZs4#)DwE3 zBpIByh1Te(C{qAH(*+)A)c$?@KB6N#oP@DZFxs!#7jt7568^_WH6v`+wx!{V?dCl` zb=)uzu2&ojCdj<-usv1R_h~IN*2eR@A*xPSU!P4WWF0!jsn<8@!kH8Iu(`q^0F*6? zG>!{3A*Uq|qnj{gr=*MaJj5Ls%zXH+1v`e=K&&CeV$~7URrw(#f*p(jbSk)L#*>E7 zic$;n1P6nI=xG2CV6>&NbtO{t zcsNcQF*H|oxD+Ju0c8wZ>k|Oviw>h8druMbCc4(?_?}X-Oa^v~2TffOzjt;rB%8r? z3h^Es7#}QlaH{T`MN65A^!dWIC+q>Tem5VstTTx|pZ;~28i=^2<>-VsZ;t4P`)6KDORKW83DMRj5iz{IO+k~^)KuNY z#s0$A-`$Q&m!ftMz@(BvygDlJjCWATRk!P0na7pegPnp_9k;Jm&*rx#9{Z`AL$Md? zi>K{94!G#nmK$x^2JMC3XW5+{&LsBjw3#szaaZ;GkNU+qz93GXkM8wSJ!xiV_ikY! zhSP7VfeVPJRaI1r`>3dL04jsS6#L>4*p|4!`3366z&mK_WAydAwV}QRaWi>vJtRSJ z8Z+5~8D3o2B@F5q^ex^3@Rkk^j-Y$4`yE0L+)#j4W~HR4vI28<;9yl6xjAfy!jq># zVcin4U4Lcy`Apu$+C?|vX8tlyOAWJ-vrWato%Ubpc!)QRTC*4bHwg;vH91#?S+ z!U{Xq9v;7@y_ju-boT)hl3D`@Vye4Rzd42C7+F}V*1NcABN%slXfssh z57r9^_yAnUFFQM@^5!Vvo}LkBXM|2Zh*C|poLVr92l1@v6Y00eq$`hYEbValE(??3 zRZcnPP(7lz?BK}qhH+(Gmp#1?aU%-5Y6J@@QGa)6Iqd4D@8FKu{KS*o%J=ov<=x-%oV<5*N;elOCxe?g7E`oRcAgr;>2=OtBBzoB?Yc(N zt7ot}sOsqA#t3|B3i@3a8q~?W3w=dI#tWc}3St3#SUicqW^g_?B%84?rHEHlH5?~1 z#ha*bC>V+II2hZp@AF-7%UF*K>-#*S*3t%kJHe#04imC)vuDc$JH2nb^TnJzpYy@x zjhz?(bl{?c=m^6tkMar&Ujl4aX>ZXl9P_rlLJ;$20C z5KTv8`ul>3NuZaMDxYv<`#lp$D%)?IZQBg4{E5;`yU4V9df!*0%t~A`j zcGi24+S~8LxH7{u$GDjo<6Eg!F0}*l-gMSCi0X!7=E_$>S8ANz0~wR2Q*{`jsjH_4 znt>#F!{?2dj7D>OS9Mu@J=b4AfR&Y%i%ZE`&X0f(Dv@ud-YbM>ZPXamMWZMyTVYwlib6pxkHg^_%-DpYzXozpB#84M#ynI{}jX}XxdxzTE zhVYo~Tdf$D!gs_8A9(HJZjA($oN)b0kySd&J!d@O%y-2cfc%7(f-}FVxfvuB4l^^W zCOi~7ZR>>Vd5qbY*22^Y6W)3c-#z%GV+$`IoC4?(uk=7N{PA4SSF%;W`V9}kVHp84o>`eypphNHATff-5p#_s_!r=>e91+&BKd-fgXJf^(?H8wWp z=jVq|0JLk|dxJwdV|7$_fuGOd3C}`mv`^pLCR8e zZR_d#<>ikY7nYo!+$?vB6PI99Oiwr_{*Bw50E~wQ z_o&=}j{;;jcx2*Wj}L+dc^olu5J4fn@B2t0W%w5uB7=aC_59|ld`BSQ?;S#LcW>2q zT>6yoLA~(EJX6?&IL1|+IpGGGu%2ySKa91nqPqTkfPG07zy^WQJ_QBVW2?l=JR%|@ zfR-!j6KL{&cuzll+Qm0EH5FU0I((8p##-c}f!m=!e=QT^nvdYe*5>2IF`*{<{9};O zgAT*Tj~^fT42+D>Mgu(}Mmkv0_xq;^i(n3=7cau@wC+r`dT^ zuM0aN7#SHIIBMK*Jx=1x0lO_TTh@5_u>nl_1Z#PWGwv+%AIKwWQ@bm%ei1s6q@Km~ zq#V;Cc*qZDo%e_#0Uz6nHT5gE&#M`q3tkf1mQm?*ioN)oZQCpQc9+IW|;^SxE{aTB|hJ5L#&@A|v>&N@KXGSqR)AlARfvsr(0d z4jD+!pSoJsf10+9@P4Db*kGbIP`kakIhfldl)cIOAO9c|fpN`gx$);+xGMHnI|q1S z+g-*P&zrhH#2u}m%EKSAT`A$a;uHkGq` zZWztk1ai-=@&>gdj&15sB}+IQpTC%TO;o*y5J@Aw(FCKtHJ*fQ{M{3<{ByilFsR)R zLeFj<9`*{(jozrTUlK9F8>G@IHOCi^s+*oXWDsvnC&taESIm&W!Z;Zm?AV`0#zyw{ zGc~?oe<}0lk;o>Ip(TMDxApf1>mKr{ELbrU5oVl1olQN$oygTZd+cFC9De)-TQ**T z8QJqRB7?6^sBgHNcg62dxOfq?c{m(>=Z*#OZYuYvdJgWP*y!M9hWT~YLzT9<`gRld zB^uklEwM@}bNpk``y{aeEPwW=B5k?Y(W8cjxDTIgp<92cw9_#|WrRm!S$Qc}ilOoe zraplir}}ikq);7G9Ht(R)>_*5UbeFGT=v2EKOXEgpK@B8A9{twAUUx-`R2^woUU`E z!%JE+;_B4Xr*v_eQ1`MqFdb?B4^um{p7P0uCa$yeWzS@o-LXk z#c&(cs-{(qJg!K1SFZG(*3s(EziQ1>DBsG9Ew-^DIE5+nY+$;oA2pc!SXYXROt4y( z^(3-HVzV4)-8;j0E_N#p6ScvNb$P6?+Gx6=z)Z48s1h1c)o0nUZu5Ey$W3bTyY4qD1^{RB?3~{s& z)?#9!{uIA~P)5(ghgYJaH1AP@bD5T=CUCw;&;g4xlpH+_~*K6zvbF=KaM$?qkP`Qj&Y9GdePW>( z!p0T{3JoqEw6s1y6qMayb1bi{I?UI{NHMV*)hfM&o!2KK7qFTW`~qL}QCZrN)zs9~ z9emp}*t>V3HFSaBpv<&$Y&Iyz-hT)$Dk{2qY2z!;8~wPbBU~Th&*AZ!XkN)>n_5)Y-xz9^y?GdwQbfSt&QvnFUgHdU|@^ z=7%}WT)%#l!W*&Ja1!oiXd%uqGN+*P?~0~TgO6T#c*6$8 zwiItuZ)2PzKb}T=Z&oSQ4U5iw^huv&#rJZ`HaCmki0kX4I@%?pC@HC^s3<3g@Z(u* zeet5;#S35r!JHRR`JPCnQJ$oOh?UmOm2fdFp7m+4s*Oqu~=8!{&|>mG?c2f7Gab8>XC4S!DQ8l=byX`D{H> zs&7`UwX1`xuC5L$O-P^n=7OREvm)*^5yj*Xpt!dv?F zeGnLhOn3l4%C*}V(?vBSMn?HYtEgJLxWFTtsa3{4L$8H6NQH+ z8|&*JIKz_-U#bH!D4M`2XbS_fRZ&ra{pv}xZ}I-vn>)}HoSL3C!RQ$nY<&D!loaFV z!Xg4lQmv1CTGH+)TsHnqHs-UsfYDxvlLBNa9Nu2L?(=Ya8a+4=vm=k=VCq>lD^cP2 z+AVGv?y|+;icso`l~44@L|1z!7$d zK#WPp7N)iX^y)8r(c~ZfdSZ)50Wmh@`mjaNrq+Ny_4xhGs?n>AzGNYmQ@3c|`9Rk{ zff;U>E7fO?7Pf`YFo{l`Q=~C1U&(n%d=a*yNPVB?XO0)Rq~_&jfT>5|sg4WR76){Xtr)7#7C z3-gf79X2CgXka77N}*U;=Yr&4%ST1VZc>n6ij33<4wkh9f_dP5jpfr+0r=Xz3APrIjLxYqw zl0&B=-JOGU=g=UHfTVy(cefx)OAGp3-=F&aoJLFR{-yiBAkqs$DdutoJ?;1;VS;&H$c%v3?`p|w9na}Myk#AYs-xNOs;Nl- zxV|{qxn6IDkyOz(7|XcZ+S*FejByVnWo6NZ;_Rs{0;y40a4=9!e`s#LyuO~9ot2j8 zG)0E0Rp;h*0>M)n#t$YvDeLgB@8=T|h-DJNkpp-ZWc1-U#M(?uU{*pOP4Bz#r&m3m zJzWR@iUptH2$bfbu_5~J$i@DeC|4-%!gE&bA$p^E^ZC+DIGk!<<-KPR<-%ur>dpHs zT#|(es#NMxRY_A1N{UhAtCU@M-L-L3!Mdm5UDkXg~4dagu_Mw>N{1S_2rL z;_Vvjb3X+A6{zGhklrV@2O2;#gG%kqR+EtcWO7c9A7~;3s)aNqZGHWyt2ywpJw3(y zxwx=U^JJzwcFm6axzel806qf;&)#=8<84=98!|D2Gp5GwB-WdOA#6Y_{ilotU*uDj z1W!!y>WVGZN^l;le)Utibah_G5RO({N+#e}I$V zS#Drmap82Ket8QR*|Bh#EjMAUsiUjw@pD_*I#r>lnQSiC8eY=Gew7o4-5}~dR-&w<>jRW{tB~q1xUDn zhu5PdXssyizds=}mpHYM79&%D<}EN&*VLRsEp3cv!g^Y|>BA**tvcy-pV=#=Ao5g` zpSX2P@gZa;=#G(%?Z0FuvR__$++EDe3O65gUv{llFOd6Rl+$X{;zR68ax?yrPnT?( z|LGdE_4KUFZ{eY3@~7OJlj6(KQ)vN-_btqK18A3qKu?1tmXvUrZcR1tV2~bKGXz96 zV0}}S;BZNgCe?`}V(s1ieGu0M1_$#QnV;K*#Q{r;HOm?iJ8Wm*%t>5P(a=Cf&j<}J zV~p1W2{q4=+|O;0J2;aNIk*JEOpvcdk7%7oBch{&dDTJNDBwQ2@c(AjmX@Is?=U>t znp^Y%)}IzK4YW0elP7)@BS?nYivA3h5@CQ7C#ImZ&KxSfUmUrA`)I`V|GR~u4J%r$i~_q0MO3)PM#MQ8@IbJ&{~7Y8=IOo>wkuw;CaQ-y@{qW5rG%F z-k?Ya3`%g@t*=N~h7CwQrMsnRLlM276fVwex~hZzL28+vM39$S6TCr!FKQKv2h69= zzqfuYr?~NJd2)H-m7e$0_;icR#_tu)2OEPN!4J5;ibP=m^hyq?eP$fN0ES2)IvlYF zi(EnkX~XB#aG5TH3PGM)K5g>|0iv)jE*gFGm)Tj0E}CRX(r_+8VPT+!XAC#c*9Wa7 zeOT{tF;zi!KtV*b2Dn*&tS(kR8WcJkB0ACEDG>qz+h})m2Fgxrh#WoMm_~P?S7mJC3C78;7>%|e6&1Uf|T8Gi@4f#xq} zOc{S1`k*96jes}6l-J~K>R)q5@xZ3%>%h(~Ek6E^X-}kDGw4q@LBkAmi$h`k`->ky z(O>zDjCiCLib)81@uuO)Q4mf8Pmvjc|kNbkXYsfm{$~ig~?vf>3}c z#grlvju#tpxD7wGe8 z7MusZB-FDwy!m8EU7k_>QRM#tS6ZxGUn0|>fnCk^&~ImtUu~8Y7+rl;9{9M}i?rXLO-6Fvb;d6Jo1v7~u=&vvnb?-*4E16P3 zD9~eId}3lTM+D_2L1SbUfmgaFfZYOAe1*9#ZDKgZ@Q-ZB|GkRv&U?K)sN!PZ`=9Io zr8+-7JslrczbU$8_DIia?>BU1YgQgqlrPBhUb@?n#4_AQ4kK8SLh2@Rj-PWmte20A zeSG9JlJ-whT#C)#3J~MU0!t>pL#GRcCu!2#{9)d(k^t_Jh~-XJ=+YLqgj3 z%=G|%1ils^l&bJ|99rq}?@bdrbQg%*!$ll6MsBQWUel;mI780*reG+Z36iubHTBud*Wp%NCEzaU=3*ur3n>+kMeqYdgkWldtbb* zAT0Qcj&^pv#$l_+e9@eaR*&7_@%1TVGsK_1BVX(Ci0GH4w()VPHi*B6U8i`4tj%`) zC!L6?c!X%l%goK{en-6d{J%?ohgjmDV-$-v0@v54-lzHV^(}Hz6)kX(BkEDk7RL6R?Mc3FPx#BzEB1lgaXhK#yfD}gv4)U+WG zh||K=?f#DQpAGF|gA{hX#fL)LoM8$JKZ_2<$LR zgdovaXXA%HPl^VitT);-{pCanidJ>P#9B@ff)@jL2gk#VCkR0=04?jWiOU5%gD)jP zd&k02)7r%aG)}^kGlQ2clK=CJ^=l7Zp}a!c0yTSP+T*AO!@A~8+DzFS($3YC|Gr%B zl^~m!YH;bLA!BsBzNqJC(SdLfKDoneGKwnE>MBjcaS16H^R@11VKg%gBa7Gl3(=Og z?}*}$bFttPfJ-hWBy>-;=PpQ-(X|SYGpnnsv$L~6im|Yejzk7Fe9QajJn+?preoST z16HY;r#2=rUuU;3?m+vjx5EURj)R2r5Be~3oXx@I(yvbk-+V8IC2CAeYuj|GpN@t1 z<9n%||Jn`u-$BThC3?jVw|x@Mjr3c$M4mVLr+RpM(@48k0e;U{Y3VU02W3-mM|U>M zU`bFwObot(<8~XBe}p<~P;{l!S~0B7D%@gN8w3$mInV12x@V&p3@n#;G(@6;aJ7Vb>^f=RXl?j`<7 zSYaajX;8`|#?WNDl|w$o zWCnnRQk1_(K$iz`iDX)U!pp#@`)V!ezUZ7$k>u``$H&g!$SJ?(u2}efh+d$u|A_Mo z-G;zARiiXG6fHuAi9AY{Dd9N-FvPP43H-XX9jM1~{`G4K8D3pkdG6E)WY!=jshs}C z1I$GM`s3ol-$`5T=i{_L&^&YO#huN5F|j5Ocs0`T~4dKqu@gBr-kHj znaeRT1=06L~|m0GYx8E9WOmz=)7Dn@bLo%aOkU`O$aPl z?2T8@lO655={qR5IUM*Wc&%XRy2|xMJjYYc5J{&ef5n|mzc7~2E#T^n?iV6K z8}^ybJojAX_3l43WjxO$r zBSrZv5B+wdqp9AvX9x%Gs-V+uiGpRJt-Q7rg8vc54Wuw$5T%|sE3w+I@*(O`*jSr5 zM7GE$lG*-32BQq3sX@5+m^IhA9XK2*^R{6j!+Um9GuEE_olEIL?_pZ@#@fS6&yeQ_ zsqfyM7F$i+8NmwXA9{ssM7O#(S3^g(oA2!PAuQ0wu5z?sB zi*tI1x%qp^tMN=qcdi3_D{Rqtm_DCWyXK=LWY0+e6ip5!YoJ*M3B`mm!m&{{FKhwQe`z_?fKzBELo4kW<1>^_h6Ld z#0H@k+kQ`^S_1o^S$sy!xYqtI4p8(88z7zFL=9oSoa-_;WuV=k==*bn|J$fDYSx$a| zF)rEJN8UyshL?`|bu;ED#uN(6Bw~^yahBWKFtL44Yx~LY$K=1O94QggtX$tgCsss# zA(W!ewyO?VJh|KZiU+^-$|SQ(5YsbD%|plwJqgkEiPU}XF z^n{uQ3&dLMgC;7Se}7NxtBP%3`$E95%*bT+z8of7vJ(LK?JW1T!}3f;hMBL=P_EXC zt#Pc0p_&KW1YQjG#*D+XUeAgfTK_q7LB}Vc^wU0MHPLJjIijcHHG06wif>Zb(UH@) zx{ufQ5KW*!2iHGUUBBS@Xi25yP)Vh_iM8f*t`)QhOS(r8545(Chr+aCJRx|)yg69F zj^)WSF9?f$4!AEp+#DRc@8FQRl@;wrNnnFOgGHNrJA>wgQ$9#@E@Q-dq8(5bUd#tq zo^NE}Nj4<1>3F5uJU^9MnXr@{ihxp zi==$O11+gLZVS$+_>O0_x6ajMwZg|+t=%`jUtVX?m;E07w34wqId4l{uEy`X zyJKQyg$?^#kYX_N^n{dQHJCKMwks*Lx3gR8-B7BktYpNL=~NEG>myc!7nmR)QQdVd zL7LJiSoU!uocO}2&g!jLhihAyL#M`ukXX_f^)1Z)dFpUJfj7NJr~GfA1>@FE5KzL6 z+d+VA3h>wf9^7naOIj_IQ!gor4tU41bC-KC?#juC+b{VpOxE|ce+U>huQG%EJQ-yL zahRyI_-${lmv9)C^n)1ciK4=!P2zrpHh;Qq4-35YUc||6Q})6d>fV1sd1GNxpB_(Q zqXm@9fpg`1-Brb!qH*HwqTlP^*R#uhH-;Bpf0}+|(ZBhUy1ay;X#?Qtwu_nD%g6xa*YD`$KGOpEIPOyWC z2!f7dTu1rYuwTb1U%r-zUJi>5&x~v~5@SUFs38y~c+5e9fAdf||HWt;-l8hUSgmih zvwY4_`%d~3?~=l_3=xHT4g<$u`vq7r>!lU5eKXlEeW}sQ5#n8ALosv`jr=@_19m!r zJ+b*i6ybkXrnaylr8l*4OpQV0TqrD5Yb9N>s4vmS42@8{xmk$Rs4uQxA^!o$A#YlPMvVnFxuZYt^Fq`(1M^K`IPMbp^fUA;r@{k{W^m5JA%7j zxGF=g%*Ilc4>eU%IPO4)aFqjPGXgp^<>CO~l(fV|Lqnrd1TgZcGnSKtx4LQ+$jPIl zdshiM-uUYO^0?9EH4XmLSz0nD>bEYcobhDx^{Au$zW6>Oqt(5Tp7{4w{Zvm5JV?zH zZDLTp0s)z^%^u04dPCPWR@3=#`9ZwWGq3m zqa_eFl&rf6XQ{E**VQS);Q<|{R0CMsX3ao%^8US~PA|(v?GpYq$1=lR*Id?19BE&2 zY_{Fk-y(m_2rKIFeNYyY)d<0Z4#A4r>$r0-Ae`+575jGuroaG{Op&{ z-grMtgnAh3ZvOUo-Zu!o~@raFb{q4M{#~F=}nh49?aU0qxB(P!f=NfaUGx zMi7&1#fpC&M#lH`!}?cy-^6ObiTzgs6H{kvTM;~X#CYS(L#6E5Q`{f^hcHRv4}7Qk zyd}-z%6aGMAL+BGxzFYw$PI5_zJC3BjRXvh1^od)S>kkWZub2A8Qy(oebB&XY)n6d zZ%Px`mYGQdP)r{UFAdY(*;(n9JbkO-xw`k&p!#>U3PTr2qf+t-e$+!_ke zrO$`;hU+F^K_5SUd>LNlm7a?XWmMt#D83uyXN8?YIuiPv;d#k0_8MLvpBfdPbmdTV zQBvCa-d^eB{HKSD zee3heD2l2y{d*tP7_XoSY|_Oq#3xrbYkiyCr{Y=IYDpiC$v@0NLf1=pv`gSDWeed{2kBxUFW88IiOX2lumS;1!q>Fb(X@d^#*2q_kT!Eo5s1ljKSG!r_j*Zj;d+q z><9h1!FBQ8>StH$(dM+4o3bBSe#yT5&I8NVf(jFBgy6{sI!{<8YI4`fWtK;WO+(cFw9ospFVYHEFQJWCm-AT$%N zgCQ$ez>$+efyKbL$B?5Vu67U(pM(?q@L{7Vc%a|vLu46B0*^((JVKup0Z1iWOmTm zSd~$~6+HgMG~X``LSLJ}S!rXeGeS=@ish=S8kqkTARhxfGu>;z0e9Ndf-C8Z=(AM1 zW&S=!V^OvpyM^5z2z>qXJM4h)JOZ3%p9`<}di`6%Q>-3SBo=>Q5F+}wffhY z*O972&A)l(h7fz|PU&ISDV9*~>&phI{WW)P;TvC|W_?c#cEPi2xTd(64Y~PN6dx8w z4RMIWR$SPOdrdEvtVD^F|I)Kr?@`DqD+PfTe{riVy}g1~npXQhr=QIujuvM{3}bkf z7=8&iz1^*%IMesqxMvo5xwdkiQ}vwmNVwf_A6vhv1n^4D)iuhsr|a$%LQj&D9Y zk0TESqu(YZDaqjGaD^W`QF7VSzByQ-r=(d~VLM(u`X-p4kUDpH6po`KK=@v!vAGRG zMh1qf*4EeFZ`WO2swl1Of7IZ9w%p#{)5A=}2UsCc$L|dRReunzocLtiokTA)Kxcy` zQ!(&h_#{W!kC0u8C?Q5u1{DB5KZ$e2%`Y!7&@C`qPt%}GR?)Me0vk`I_P^lymM5oH z^W4wZu(2Rj6m$GTqGxR4H6X^^&^e^?_UR@IKUBR< z^!-)p!{u-=b8au+hfgFWjLkI5V^eZCTP=2rRfj*B?XvKWY20}_+h17CV?pH+`&H9z#5Hqjb5O_(N}K zEAlHU-91aY<72?(m#Wn>?30{ZgR=|?w~v3qMlOEmddA_2to{+pVqreKMV;uZru^Y_ z;~Z@6a=(yl>~W-D%=4NznB6_2)+jv%H-jWXxBMkP)hX!LIZaCefk)pf1LS`#E%PNu zH8(dmS640eiNuLTMXVS02lI1FO@2!8K9e99Pz<1yqOJmQCaG-|k%T8=ja*I$-*N78*!HVbRNm3|MV|TK;Q-4*Q=A}eRRe!}c{(}18g-yPxz-hARHE`v85EGU@2P>7x{#2t7ABr667K9B zoB&L_F`t8K-dJN`AUd8Z8n~uz10Ko)qobokL#Ibaok{TOPOC0{Dlja!dSw=~_ZC|U zvMvjQiQ*H8M+e1r7JuWuyca-&MgzPZPIry~O8}-CgCBH$-Zx6L#@XW94F1V~WC?<< zf`Wp;H(_)6&1%RckZ3je101})ZMpQ(sT*wZjiFPFWb|+){)Op+PempV3tc($Z=bu_ zuyhWEh6#?%MvIP{IC_chm7G2Lf~BqgezQ4W78(H-*Y@blsj-2Kc_<(Z|7@I(Odc-$ zKK(x_U4YB%N0R;nCNHgkEa(qkx$l)Tg+G+<2|zZgr~8d7quMp7eM*JDzamq(yo*;} zP^~FvTov7>OYWN|x`!UhPDV_j$owRCO2)uGyiJ|jw^I1jMR_i1A^eAX0=te4bG2#P zvl|8FIW1n2w*`+jT;RP|$bp|<&6lGrh*Ji8o+bwyvdiA9qnr`xWYuLG~V8QaRR%U$yBUk;hS+Wu;^I3Yfuit`c=NL<3pIhk@ zb&nyrP0rRel;g)IYL!pz+Xj7Ufw=r%g7iV;GtFILweM5<8%z4%7Yz3bpSY<}2$e)- ziA2#Pg`5w1>&sTfFpX*_+cFRPG7Q%xZZ9a-+Oy6R_6ogb&*!98KlgE-!I0ecQ7`6V z3!xlso|PQ*F^$dQ{uRLeLp+k79YQ~ST^DXc--+OtzMAmDBAdZ99G%B?(fV&J2<YOx?ryku#xhg0VDvKWykzSHoa`lrhyf_^m1t#m6-c7hL-U zPj(Iu{Xh+O_r>zvKLKEDZ1+beDeJ1F*;-VWxBSzQnsMtb9j{RQ$%1or>HPSu+@VI- zJtWgO@;BXA1HZVOEkvtVT%mz+?87~dUQv}+yabiK!|tu5J8*r_HL@`TMlfM*x&cXy zB|n_H)Fljcmefk1*?g8FbdfB0PAYW%PWa-TP|u7o?%q_$xuGnO>6AN>!lr7BHw$t`cv5Kmj>Yh|@QpB|m>uc8#MWy4>7|WBEwSWm?==Y8IE)HY*SI~iu?1p? z8vf_TNGvVDK|d=8lGN0D%Kcr^=olD);#rY`V*uu}Io`>aiJ5ub47+%WoBpAVr6tx# zXZ1PMD~^5?@kaj1kE<2M^N5f}uc7#Fnv<}e^;+{e-@;6uabNM+6zPIboQT34cmkVF zo<3jO25Ougng}LbuOYZ?fI{3PQ{0*!0a_-s6YJkYMiUg80`Bj0DNwxo&5O#`K&|lR z+dJ`TL}sZ?eIhVq9VtWi()vhy->$N*Q(f!Z+{?X^M=tMn9^k(qpEC=N-dT`$rIY`; zPnMc!h2nI39`NOJB#p(9Fy{+vLV-jIAyZ_u8G#-C6PZv>IgLRIho?{92lahAB#jK0uNGyHZLGQ6t&kpgg4u*rvC&ARt*?#Op3`m&Q zz64!(G%LxyjW2*u2BoTnuL2j^53zb|*7CcHrswDH-Eu2J{O-A!knr6_M|&b$qOPcj z8>)Lk_DUSDIqhqF;ASDRk9E!?`wS|dK0i4W8p@b!FP>*}1f_&1S4d6(PWsr41)rUd z7m!2?cD$gsjGcYpyuM@T8pi}3>`MMCf?b7Rwn?DRC0-7*I}|IUUs6ieeV7(1l|fsq zSTFXIZFBNgOoPGE(6!jD^qG1+R?9-uH7=Q}Yrl-k(T8(&jQYgY;m2QrZxkS%N?L}+ zesKT28uczRtiPl(sVdJXE1l^%-_UWsp(*i4wVdlTpCz^AcFufIq-l+!ZB@*iW<7%L zJmGcQ<8)E`+B35UIs>CA=0Gdkr`SPs5!r06UZt1cN`~HOc5a-|nqM_WN_oj96x0s9 zRNpG(bkZOf;)tXr`$Xxy%ju#`F7i0?v)aq8+)nbyTzi#TDKFBu2?h0IlG=9~T#=;0 zk+?K0cVm&>UP#q1Uj7paR|0k*Mp0!{I?uk>=-I)_U(qR<9;;|+ zUfvOsZM^RuKkN6Hx3rl@?g`L4QI=p6`bxt(&T>-uHX9C@ryZD+9GJBZdZrJgr|G1p zvoW*|Fp?ZF3aJWTI7XN`rYY*QD87k!p_=CUCPG>#!Ayr|`k9vLj_oc(iNoSw&B>ibfv2BcUKWtsWvPs+(%4>y=fud?iv< z_KJd)v#R&r0g63vGohY(xb5?O+M>JX8&cS$#0uF#HJy_2R1K?SsAr6s#)2p+E->7+#!WD!g*OXU}FPCoygT?CxakH})nUFz5Av z+@OGf8oaYTIwJvLXs&!BEV0Rf#zdd&9HwSE>st7~^g=>`lu(U7T|-1|+ImthT@@D} z-vWu{CQSRA9AGlwyhg;QsMW)w#!kAp81_+kZ+tV3B@s5K66iF%C-IQ8RO9z8qLw4b zIgH{Vko;cNGip`9i7H=;tH7cxo-&LY*JNRyNZH%(RP3G&3zpgX~$A!(^6#^>1?*f&Vk0mcU2mHuR>s(J6VEg z#s>hpG5HKX3>vgX8s?g3eTvmpib?x4LaCD?SfZFE9Fgigqw{_01p$w1w;pAgB5mt? zCWTV!XVWha%Bq}RBz-6u%uF)>R`$qM{hi=rMT4)bDz&eyUMAEv4@jmTvU9kRk}tS# z%{P8sX!t5p|8;)4Xa#=kRn7TOZ@LsF7+7*K$DX7RoPmQM78?5PhZ|V@AjR_PYQk$q zA{>IYSG!-joH(RnYVdaDx3pZ>Ox3h7re^N!*tXS}2A6^GgEm2MvfB$POX^w$*)XpM zXqpq;g}3mDcMwg$H1KnB4gqOC9O92!ukA{kpH0HS1G8jFtj@kQeXg_v$)#i8{TU+Nd>+dH}|J4i-C^Yk4< zY#q~F!97rIaaE-n8Z2$a>-)N3xN(2?dui~Omgg%|HO;)U4ob=D4X%5iPMqp^Q&#TR z5?8F~>_$$n`})k;B`LlsvQw2-g&qoQr921eZU^|F2&QA5GQvXB}o$owZRt9SEdC) zHLRot?UCJfFGO@WQ=_2KQk&lc5>f^^gO=G$O#(H@m^Y9qL4td`x=dfcP6jA-83=+2 z@$uK)5_D!|WyifCp;Plt>c?MbyDz`L&W`*cxkW`RTtUNyU@z>D%VX0iO;n~Lo9yEZ zd9qF3shS!V;Aa8UFT2;`f@UwIHCo_J=Ih;L+uZ?x&2ZN~3Vz)#20 zuKhKF_}w~W6fNK8iFA@f(DcDAh)D*H@fc)Jd@NLa)T$pfttjYh7$!ORs0lV}w^=^_ROHK7H5|@QBc^uxX*aX|S?m!K`M+wq~TYqpz-drl4b`oRGe2 zzInoMcjR6MHV1fp$s7!m4hCIxw9?9Jd(%Ah(#qSWWVP{BT}dc}A|h$--i?h(Bb-1N zuV4?~|Gq0b0HQw?5OoG;0F(m)5J0KG`||-_s8*LOKj1P21;ah`ILSAWJt6(Zfi$V0 zX;DTKAD1LTM%U7KlqpBN{^CER&zcup zc(e-~BI>6+qBUC+HGT+bZU*oMGU8Qs+sD^6bUo6*D$BKZz=#*n5dHPJ$Id~fr%Vh> z{tH~yTcIsh{5!~Ou}pmUjh4n-Yx-PEM!ZU9ymDt;bGy81x|%v>TB`>O;=<`4y71G9 z@n?&fe;a?XKW?}`uJtvq3M_f^qrprvizkuyb>5~$)lbQ4;K5yq$iZlIi2)ozeJ#qx z$;Ghv3l_IGZJYcNHylqwistn zJPu1O=7`3JdoTEfq2&w2*)UJi(yC%*`T&boQ00k-en$w=fMUE8AsC3khWM51*cyrg z4PIT73<%1IxVU~}C&$AQy6+8ra{C3>nCp7HZ!_&WNNHOOU9w@C!=6G=UHW%VUsfb3 zrJpWV)h2`RmRl>UU+9(6f2 zFZeX~xi-%v5`@{bhuXG%8!*Y5RmF8R&uH2?MP#oa>`mb)G07aQMIGIdL^5$Oo~9tq;H$Hx9E`k6TMfgM~0fN zM;oq(q1P(Ueklq3QWm(9nk$C*6zknQ%(!8r=GhflSrc3N#zD)R4^ zZI@LzC8o5(6$}?n>|CWrXOme@&j@KKPsAnSp_u6aYJ?Yp`wDdTmf+b8jIuE`MO)`R z#XyEC#)4G_RU^fO*@9UNqY=(rzS2tdHM=9|$gGEH5UOj2Gh|p}8sPPGtsvAmYKqg# zCwLg09UB_tsR!67z-YL+)t8q)POQfWK!Jw7bvt0_?t1$(k>J`{I|jzw(HkK8+Zt3c z=9{{{mO{rEzsvUj@H}QEdu2^xf7{9S4k=;xuSIqOi+nlKa5>Z{nu$2hK%C{k5GNUk zw}Oih!Ral5yKikzs2xuN%Es-eG4U)ax~%Z3?&{kf(K1(k#h-<2w&SwF$b+mU*TYl! zUAAYw3C!$C%xnoP>knAnq8QtAuK@Ck#M+O7n} z7zM?wV4SVQ*Z;=K`G}RX;+d1JH+lextAadrZ}758YAu^ERNoDqP`A#Zc%AnViZF31 zL7^zn4&Lt`9?HFoXeLTH-PmB-kihEszBU17BRu8e(t4BxeZ#@+Ps#bguJQv<#W=2yd_bNB8OFiRFjP}o4Q&Ty%7 zj=25;zb=m;!Md?+iPi6|V|3iJbb^b&i7cvO-p$YWr&&rM^=*$c?9Q|NQT$g*&#q$x zE_36B*jfH;OU!?lSlLt5uvh+Qj@iT35kdaPdC2i3sM}QbfcZ~Ea@d36)IUybpB&rf zt@5WG+lC$Uhv}IgaQQwk7x6W(JP$M5N88*-qm1pEPxtB9^Ojq<3Dds~gZN-m=h?IL z%&e|~bG#g8nq~E-Qb#8S^`TGtu2#9rgJeN+86%qtc{&JPfCXcx*fRjPaiGKyrW1W5 zqwN)z5ffc113gf(0UGy5Nj4@X{(l37#nR#;?%jN!NR!LKys&_9`Y|EO_0xSb*8(+t z00c|Q)PX2x`i|&+=R1fN=u^F86|p_Jh5*5)zC-TLad=#u74ken)brFD$U+`I0}2t~ z*3HUlVPg~dXU~aT;59XtzysDTcPs6^{Y@6uv>zNSvQm0NRo`C{{4JkTq9XYe19R_6 zjv*OLjEJDKznwlZn|#DrfRWg`a{1QT8#q+nm0snT(|Z7~Q09NtYnA_r!t>em36VwZ zC%>|Y0ZJI#d&>LbHvMwHA1G7$2`+~^5A~ydC+?%Yus0`5T`~XF1D9OWl)Lk?d2?MR zgTC*fFglz10)1@L-DuoEHWBoGk(+*zHM;<2uHOZfgmQY`*x+cV`(UN}{K{akGxCWM z7sFp!cBiXHE3D})Ww>^E;r{(-fKti`v$@~W+8Rglp;Qkr$OR^(vRIp}H6K1iHn)H| z37}sKx%pHa7bJ&yHbmJ#R!#KNR86c0hZeORnuC`lpfWH1`kA5@Ky@RPX)kR2 z%k<35m^JZ3v9fCR{^s-S&?4AR1TZiMXBYHrC{1LCot?SgZ~^@qsMP}8K|xM_Nl0LY zaBV_(@F~O6DT>1{9#8(Hcx=ATvS41-bgPtBWu{bZT1i6%4z%-k!8#^9z3(`BL|B|S zrq+ZJs0Qqzrn}Eaw-;}A7I;pas>m9*1!h$+?TTaY`l-bp>bIL{C&t%Xc2MaWP+Pr{ zS&s#C!(pMH#s@bGakR`bsgA`u%lluTJ^aKWb5mI9WJa#P+gPX zm~G-y>PbL>1O{PN%$aZ>(bJ54K&T2(grBzcYccP3_0(VHC?M^aQfJj1N8}R zbiW*ZgE`c2cc?3O!BqPrpS}2GrBkDSTBCpIvkne+1Fud4IR^4h9M0HxvHmYj2Qs)YGAXs z^Cn4lCjpu{A~zD<EJC#1R=%Xc4XYe1d@BZO#LE2)c4_ z2+*GBRVK%k{zVpww!Xe}2ji2ILH_^?{}#y!CytNWNLVdm)c*?G6XK6I=ABOEDn7i2 zP`hiQQVP;K9~lrRRLd(XKSiKJ6GKgb!5vFwO$`xpdw2KksYp82D7rvKW@c~B9Y2wF zqtQ{Z%w;)xF1tOPemp8(!@&4cAJx-cDpaj@S28?-NFa#H^0E5~$L2}j!4uo9f7FhX zU(&SHk80ViUy{}`5il~d#E{nn6FZOPvr{rh6=F`-K9>vbZP*TxjH0}+hR)N%Kww0K z^#q5T&qEy@4R=F<8=ml4D$h!-R`%^&KBpTR0hU$ID-GU{h0*@mT#tK_wGyHtYwmI~ z6ZSk}k2-Oxt>Sc3As1%G&kopwOIa3my+G!2sIL_=#Cw2sR-zPLAm(1$mYDl4F}All zx%Rl)jU%>oK|4iAh(89T9H6+)a3EuV1J^e;p5^`r6{|(1r>6rY6_E4)-l)67$B5vj z*EMiFj1cB*AV1|6e94^JUs{$nZ)FS3>ErihapIyUbhyTmE@+P!tCF$i#m|N%BBn>% zc0QDpunP&zfB6yxniqBT^t$&6bT(a!QO}w#JSiG&uurLYCpwsB^Ke!#3fvWWXZ7Kk zYC*L81V6%(n;LZ={3|-V9gm%Mbt@_%LIHu#%sNt zt7UO}NfWsq3H6pGZ)Cw|yb?g*sPn3?Az3`&kTw0&s@-5!uVL}|v4N|b|In-9UYj40}fFr$h@V>cOke`2gaWMm!{5%7*-g(oMo=%0T znJxX$=bpxQuzc(mVPHiEs-Gtj4{UX5sRJ@hgFZ9aXKUz8c8s@L>#e@p<@+0f+sHD< zA9c@~=h;q}#E9CFZLr|#C&gDRl(Bd#(|u$LNeZdr=+@pMevCXKgR=+QE7LV{%HA_% z3i(DQ;~)#8eQJI$3eKEtvHqo2O?N&rvt+rJ(@vJEr7Tic3s%L>q)kQ{XRsfsrxjN1 z4$HTmQfDv!p33h|Iv6SZN|v@|g0_8$wmm=ANE6n5K%TT-S9>HRdl}7X2ZKE0!cBXJ z8FLSvEjZx8{%>Y`H0k}qQ-NQPA1{B|sCo@GR~{Z>`XF`>kQ3p&!^lSPEtsdCU}g;O zl9`FgoqyGFz?=srau1(ehdyfR3#7kKnI&Cbs@O1ZIhJ&tQfb%N8sa$v(er7rws=7J zG4!{kVDs9uA`~_5tp{}MdV1;A)lU=aAGkzgx6ed-eSi7F{*Ps>MhY7%t=CwJaY11? z+)RGL_Ro4;)%accx3$_Nvm){zG!x6GrU~uNx$G((4&rreLD8)5b0^oqc!3;1(;_sK zZ*h72-egAZbnKXY2HMvOYta0O6_jv{nHj&oZ=acIrkN|}1Ve@UqY$L)dKO#hoHS*P zFi|d2Y5Z-X5U@j`m2hV5qMGV>GB|f=d2Kiu4rPTBq@FV2fapkyJsX0W+)ABvlAH_GC!`e-^uX`hmQm&b!9Pdb6~3E7Yjni1Bk78_!odt!tJ} z&p4?t;QFDB?nu$aK&DqlRPPxGGZKSG!ljD~86Rxq-cuj5mg|)N)w3S!pVt_6%avL9 z$>;&p9LNKdRa8zS58i`OF0irrv9VmBo0C1^;SVy^azd!XscC3L)h4Vx@w+kjyLqP) zjJQs@JtTe{qBb=bj}r4zSz`!F3&no?JHJ-q+nFpurHK%C#U*$`>`&zr5qJL1q#R+{ zpFZ}my%^tGh_&ukTWHUIGRYS8`Ac=8j2@F6lgb=ReP@3*gi)JqhUFD|{w=J^VzA-s z@(-XFcxSmNLoJ}!unj!992uv0K!=0cz6~@zDT!>Vt=y6Ia>HNT9<8eru|7J!{(Q&j zd(9x=wgBaBOA^^eu%?MeNZ3Q+q`+t=sD8sC!edomi&H78fx?*_l;)4*#&>QE=SQ&H z;WI-@(na0yUCoJ!TD0D>4?>bPVHF%bI%KA*_sKiWG5dIOE>n5&q@!(H^WB!mDQ#Mr z+{M&CR1KWbu~R8bc{&ckjQ3#1OP0nDxB0f)bvX&*PhFv?hhe+tYnB9HqErDT>^*qFQ^opBOZLu3#lGZk?wmV_d5I+sboS}8qNy$#f z_uNv%QzzjXM1RMP*zpNk+x#_s2^a&NaKL}3;RIpj7RjE)B=wMR{Bw_6q*G-k%Ve$% zM0V@LBP82AbWlF#kpU{!Ajp%Whd+zu7MM)G(kPFdatqyjfe+JEH&}@#=OnLE5BnK9 zLp#jza>l#L2m3&-Pn?aE+UAmL!f?cmBTIZILSBWC=(&&KPOTjBF*rdiKd+y+{5 zPu|FKxx=267mz0MmQH9c#>M zN5#wnVtJPsjBLwi(7JzGTYy+z4E&-Na~UlbJ97dLh&=d}t{PNmVQG1Nb;SesqMh@) zNkCkThdMjHb$z2<$M>NY|4d^veQOf7`%aPZ-7}Xhc(_jL>q<=I z=@}V4f)W?zne*SG4Rk`Q9!ot-A{MsT5vOlyIFXMRicOUz!SS?bmm>ehLR4k02d%J5~% zaOtjQUxw_-IuBkec2hHM$yxf=ae74!n|Aj13*tCH%h8ZMN5+r11D~+YQvZ44M7dA_ zwNs#kuFwgtkV65NGquL2wzK?Vb6RVck<0B7UJFCXaC(lhl$#fcQx&m=2E4~TA}Y13 zM!5bS+LD>MIp*I7=j9#OjP&%ttF?~CcDX&dA#h(=R(5?J97JN_B-P5K02j& znTTbUaVke zRlY7&{L~l0bv@)^1b;tKbjyEt2LIgv`b#KtW`%@9i-dm*r{OqZO=+B=nheMDPU6od zHESzEYTFt-ArU-y#F7YH7=3mxbznyoT|+U@+=A_Ix0#(CRw~6e9^OwOo=PezT`tDXl}``3 z-`YO=Z5dcf<}c`qAFiw!t3Za50BU*z6*}a(?T-rSL;2KrV~JGKL;b)lciIn?*JGCh zdj;SnO@!`t=97Y8rLw(!*NcWx);|I2)|h%2wbmL7+3DD2dZs3 z(Uii;x7XL#D#wefLFn-ENgOBYh=Rku9*&D0?SYGnhHq;hc*FKdJm)NlvDg)s2|gc0 zy|1x9m34HLvv-&5Hx+0$6Y$Ab<*(9FscjX}S|%tsh+o``rA_p!4hs_O!Zl~Zap8it z_k|^3Nku}`_>+t&A_Q=Z|WvvbK<1oq5gCaQL0Cc6S#_>zK-L+z?rp7TiS4gN%)MelAc-`0;=&MjjE7YXIyQG`sop?}!i!=M&bNr{`mdTRP)66B7Vx0GMhY zNMoqGqH(1h?Ci=aD%QBFSgfBu4kWlDREA`Vc7)PjO2ed-{am-`!vFD*yvu_ED2Hk!7Y%$Uh+0`XNX!r&SLZ2iO~q37FPn@}7GW0$0(zOoE8MFb{d0iyO+r zlWtBHl+ZDYkF8@Yh{Iz^p*%;X-0geI)t`|^V&aN)1kaE|yh|v~E#yuAE~-pgO^2?c204bvyHt_ zH;iZutD&Z6k@Sl68)LN2 z#!^8GGkUrsW~S}a%&os{#-;rMrAt<2b1v{X+lD#YDnvos5VrT!>$Qb9du6OnNfz@1 zU+we~9WA`t=!*vobamh8=tu|p*a4Iwu8|}{$-uF^;Tg$;EW_5!3~B%6ee%O{seKVZ zhKRs-wEZ{eKlfm9IiA{jZi1{m7y@Zb0{>n~shSE>O4e}(xmd!TR0EatBl}Zy7_SeR z!_|k{z`#eD9Cv3AwofcnGzj+OE;q#9%`KUKH_)-H?8BLEabxb=;$cH(dgNqD%J3#E zJkdC0H(|#4`FU=yJ!{@=z+BLJ`kC|g zFkC{KVVKjE4djGXDI;UJ;s?;*sL`yt9#5Jo!+1~ez)v6fwON0G#b`~dpqWuw5M+EU z=2wAEz7=F6xq*-3>A@VC0u-C^Qy4)Vjj`Dw2T%AAHEfQI!Je4bOuwK+pPpr&UX{lX zp(?NVqeEIMAhT7#y(V0IhNxx<_{ZWkq$@!0*bU|?hlI3aHKBFwms5e4o8d0(Pm3~c z8F&4Pet+-V{Vw-K3~kT=ZE!J+bpdT)!CTS5#QOJR5zUHnx)H-{E6$&F_R8P0caD5s zx@{g0uyQmf8nf6O`lGH}RH+~?q7Q6_62dGD31}=QrkIP_i_2GWLY*nt!7i%a9}eVt zSh3>yz+R_5$(CqiDFyI)f@-yl5iy=)IML(Q{C8neZns<5>B zx|*6`6u`q!<;}+t<`P1M?f&^A)6=Ko;-dO9Z@*x09UU7LNlVTzikUh`Pl1NfB+~VI z6GFvmpb>Y0zOF-p<2ADszsUe2V?AxV%xG(LT78U@k@I&<4oIPl?ysh)#eLtRo$(hGHeUrlJffbbVmw1Zn-7YQWps#Vw2z0FHSlG} zz2hmJ#Gd@F5Ge-HXA`T%rB)`O_Ua)d( zi8$1RU6cyi$vkVCz!AgzWPg?e)}Enxd}vC1S8>x`aaukxQ=V}eURat9XQ_hcsZBUq z528h&>h;*1Eq+JM{EmwGtNmxMGah-p&REy@WjBq_l@%3ZkIrXSo`Tve6{X@8N4_Oj z*-(L8JoxoLOlGrD+b*Y-5rTZzBmkxe$vA`LpgPSwTW~2UQd8AdQz>w2go>wGUd{o* zf+eg#r7(>F7}wid{)a5U`9+ctrU@m(X3Yg=L`9>=5i3B?uwxsIM`22#73lrs1-t6g zbR|arF(v?pp{)NY7KQ30TD+&qZi+(`$eU{^y%?_dREjO8W!x=~)Cn>Xcp?8;J+Bv@ z9Y$#qf6AqLZo*FSoBL}hI9;or`0jDuA9I4D$=UN}Azr+547_Pt8X7dmL7E`T`F;gW z;-Xie^{Ddxs`7s8{)QSIKY0iUSiw>3k;-Z0zm?_DdcAmX2fp#sv$O1+oW8X1m6s=X ztJHU^wno?uI>DPv)2Jz)JArJ{e}f z#cDVp47=i6QTc#m(;mS)L!G14wwsOm*1zm_H^glhG7b(Lx6R*~(S6DoZQ!e>5?)P1 z&~`5}EPGsUqVUxz)$cYD=Kb!n_#Sli6mVTbhi3%csBOP^wwX8tZU{LL1ucxhJqit@9XY*|13wE5~6L=_+GBA>>*_3x^> z++it~Ya_j9-ef>Uk7HrKN8Ol5UB6?~>Z*CxxlZ!Db@Hx!^0iaiym6zVQRM4@G{t~M zeU(TTtBP`-lM2z33ZAW2(cKEc+c?O&p*YjnJQpEHWG<<_0o50|O;9>-(^Vo{_ zn%P^_uF{pe&}P8G1LvQ=dX~Ew{wYT(7!K}66jW562RJ)cuXypZ zmSQ;VoGc2IkIy1o>b_+OA*{Od;+LvP-q%7Nsr&xq`wNT@P+#O!DT60F>Dk%6tg3A3 zXh_9k)tnbpnv4_P#RA;aKHa_=0W*w5*=cDnvE}RIX^Dc*UTjsB00{5;Mu1@$d^NhE zx%qx^`IhoG$QC28K6%BAd-G@H{$|8+p&^Jj%=<>W?P_vM{9GuL$X8EQ_3&~e;4WkN zhB2k10=O01&RY(^$+SxEtINd1#7trSlpNqHSlHP^@n8X3=+JOo?1O!f8_ilKH$a-d^<7g2glO^x6^|7A=DAihqJ{nkwgszg97{BCe(?2 zYM7*M=EIc=yFCIUj}*am`OYb)wPB~uVflqA&$TI?<0<*IGtc8;X#_`q5yL@D(T4>x z0|y#^Tfu&4ruiPdGO2*~IzPEy(i4_9f1`2MM%4iVff*!|X2#u+1Qe+#n z0_ld)*@T-!3oVssp9W+d6k|LLPnO4DfOQeja1Pl%E=3zA^#Zl_!&W)Wxdx~7`h7`YGVT@?{xtggcH3fmuy) zU6KNWvelS>scLjbQk8QP78Jvch-fBNsURWjEheT^ll5)r08Ug7=MnNAv2aK!u1M!U zU9ep2Vof~uQ582~N_(P+bYeHU-?|f##pXH6%VJF6aB|WBrjF~5r~ZLR>sDge!}B1C zconRCUVgg+<>2Jl7@iTbLzo-Li`|i%xmNK%PPCn_Frlz|`vbE~=sax&k$iwNB zlA0=opn1b3c2)Ebh)lS@h`*0`9qSCB3=(%o@q*f?^vJXlw>v5(4zdM!BDZJtZLuUs z`dzY4ovU^i6sXKQW94aS(iLa@ZWH;u5Li0-5qmXnbtZ zr>b@*1ix+!WL8NE1Ag$~POu`QPjJn0QBBw_ z6$`P`#jTw=bE@80mCTUnw#%D!%E5 zT3#4vg*6bMW&xe=gi7rJE|@>0Buowb2d^W^LH|8#CQp`cA1VF*DsDJP6g1WahEk!S ztQeZ)DKA5Tw~@^V5gLW%HYI-j9&Wd zWtwoc#6X^5A>^OW|HOs+%+8j?{UtTH-oPPM>3=zB zWNI7mS37_Z56{GFE{EWY!W{baDq5IX=a?F zXCkM>!l%R{SSf<1zvkUHW?i>ti(Tw#Y~bZ)XMQrhl&~vokomZwWk1mak=L`BOVFmb;(7;mDc5;-vAK3%wV{&(ieCD4GziuzWr5~F*PEw>I8)V0Q=HQ{LM1RUO*?6<(3Qodv<0@e^VAOo}QLwV{NUY zuivFKk*$L{N%#9T2@VCSepq|E%8D_Xmc0&&CM~OSo@&I~Q<>!_#+w%MWO1V0+(#<+ zr+|K~c&SSf;RUw4xJbGD_g&!E*nvjD;gWT1 z7sFS%sKkBIVO=F%aDW4^T;JIEdwUSD?8^!~qz{LQIt*Ald#Idyx8*K)I|hs$E}oke zJ=D?FFF=SgK!%3_hv9`!%QgxUV8l0@_0Kbp)>KO$Pt5Azv#i^Qn6cINHxl4mASqS*Q1SElZKKu-rUrb38Je5Lx`fk0BLLq*6rQr_2R! z>LYFG-=@yVuge}!=<=$4Eg>68Lv@s&Q))SfIP=zzy(@}jtv_N-?SCtu4vLX=)skD| zYO{c9KchT*37g$*QB}L;M91+oAET`67g>(;X}0u=ZRJ0jo)3P1uFyg&-@5eCw}$`N z^y^8bFzYy<9%cS~V&LFowL)ElQ#seamkOl3pdeU*?7=gZ3Fh=iVps zwJy@fr8LYXy2q1r{&YHd+#r$x{uQ+*-vahO$xy6So6{Voe|{F_o#n?;Ip>2Ru?r9O z`D=MSCnv6d!3oBDNSc4RA=u)9Q5Y|2IvuV!OWUoX`3aJI(yw0>52|v5jt4WhHH;^Z zE?Cql`UDX1qbw&oI&v+`Dl5a`X-bTr)iG${wjJqQ7*(7hXh1ZnlWG}`8<*cHqa5xS zQcCp2cu-K30?GY};%eQk>31v`lFml7(al=(L2GnV#&8f=(D?uTV${*$Gz6Fl0r%$t z@#BgT$}rgF&6Wf;AfQl!b)L7ae~k9u*zE^Gh5SoSeph zoqq0kf942^6cQC>WpKF!kWo^`I%jTymDBx^#GRb6F%9MYfOhNqHkNvPn`tnwU`lz_ zimR1ed-Q8@?AiA0lIQPX!5z4B#`k?T8(ZcvLEMqQbx*mY=l3FK_o4+(8SGqpUkvd# zo4Gwn5EvgQsQoG*3(ZX7gUuvxc~*-#g*NE6OGe)-6^tk)a`u1vxTY+}xGUE8#enI{ zA~-^pWoZ9 z-EOFglwaDzZxg7%t5$5zP5qpzYuqpazUm_+D0nm2b~E_Rc3M?={SY4?-&oaZB)dnq z^Ko$l=q@;=THd{TXRLZy;pl&o5rKS&XR!Y?;6lpXoj(@9d)qF0ICJgIn+^Q;B<|KF zI1Il>B!(SC_dEKolY`on!~ZlhTNP-##NNZv?>)Q!U3oXq z*M~;E>UlSPe`R#gb}tUEC@JZmoFtqoQZL!gxd^Q)g~xt$kC|s)XJK^di}}T1Qw^W) zyX%h4zKE?L@$(SvwrkBbj5J@YQ-UN8)G=tF}Y8{nr7De1t{qkaKaj ze^s}C@r*O5BR~bgbpFyPh+VXt>7Z43m#RN+Lv)+2zxFz6XdaQIzc$hQ{#OQNyCAI{y)pbs}142+kWKB6!rV7xwL=-w~3ee|1h z!Wx(S&g>PfDr`(e4VLHcJ7txtUc7D{in3y?gEHSiJI3`0HKN7%pTM_xIr*&c_@)l` zl@QlA((q#8lE^#NrdGe5u70vr0%+KL^2sOGjpOoZxE6y9n)-zV#jNjg|ll<9U1tMCFZNzg18J1K_xxQ%6M*i0Dt zO$|{`j#w? z;EmCERgI02g2?*4kv&Id^dyMOh=OgN_G9|MKW2p85JCLC$1huTw+``?hgRgdmVF_d zPu^3wc;qtuigD&rTPCibrEJcNTiDwWw%Lmt^XPG4E|^}me3yh?4teZQ$B4lc#)wYq zFa=6^F()u4Xzhu29h%vzm-n_l&9XU7uQ*@x9yw2c|0%gSPP3__qqp&fL;x~dgOMQX zLdEVvwF$BR8fK1=Riq48%tC$gCrm+=0!@(uEsD|yGuO)9&)j-E*~ci^O)l9@Kg&fW z*J$%Tu?FuR1hE`u3tCProuS1vEv#%$SCZw)lnc54n-iP_m!8ceScXka z7d`z%RXVJaRExBcSpC#iVNOX^b-HLHO990{a+!lby{q+tkelV8JB!eH%@6!{ldQsz2x zwmNba7ZQ%TgOQpY&f49<`klf0KLcK)X>OGw@uEIci2>B~PQ1Fm-DG}a>;A@;5eBL0 zoym1G(dE^tdifl6y#{Y1TXm@2>sYsM5$zuI`!~gnfQ;Ds5^2EIqU!h$wSWW#22hy(|H79#1U~=)`b5=ciX+yO?~+~4()n1lPgtEN4%kS< z(;FLwkc9-(Zch6JYZ$SO2tzBLyw?h)wOtz}G&wY#?*hYl6oj^ayQ%FXn{J&0zUgg| z`RzfsqyuqK7^=xM4Ki^;zq})_bV@4@D{YL|Y%rFm=E{Kh1vSKKn=D|TM8<0h#wQ8m zqzan)eyX)|rEwX^yu!4<#`W4|W=vL06Ib`K z{z)dmBM-3S;W{^ZN8`l19j@>h=zI3|DA8X<_nWJKnT&8BibrI9;59(7S?7rvxAt3s zrpWlZQHlat+^}yW=m*%MdHnY*y~-PH@kd>e}we*dDMSH4K|@z|9o+$ z7phgLALHr!$YcF!T&IzjTj14JnBpEYfm1wfcwJtE(%Jz4X8L2v?)Q2}{EqbaLngYA1BwUbY?6%X4#* zu0aHn^TJfLHjjwHy>%HA^CbIbyNDWa!(N&i3wGYzh;|Zsvc1|IvpT*M;*}G=Kg?m` z{B)LObC_Onl3sF>X@8gvn(9)QoDzDMT>bUr3ZfqS`~koGUW@N@ZtzYwFk?v?jEvR9 zU8M8l)e?-&PZAk-kX*4t>N#`bLcEqQ>9Q887L+IRI%B)@1MULX09d~OTZ;BcE!_;w3tu2Be8IHi`z5fP*3RC+VYA2x=k$~F z%>~h~L7nSoEexY4AmvA2QxoOHD}&+Zjnc#14)j4%VEon;bVl|#Xw7I&{32jLVfkjCG>uCsqYJF$j(9YW0FK-lIG$y@dL=2zpnbmi28%m zY}v?q+Q?YsgX4IHOTEB3)yG=je5)+ddX1g>NVvt4mc^oa;c`-u0U?tC9)kf9Q$ili zT>{N&0@t0o+)(IL@yXARTj}(}d?9`_BwlqKdtFiO9)q{bC0L&Iqq_om)AubU%pI%= zVb))PK1ND94ccA%#MKsrTwgS=y?SY-hk0}3v`Awo<1{qlEwu6jPhef&c%f-)tNd{Q zqs|i!-prADU4*xf&#L9bcrm<0gLMM!GzdDkh6m^z2zeK|z}@d@|0U0G#i6o(ZEm*Z zA_3ZyxAXO+-Gl&ISUD}ln$3FxKwih-y)Ir>OD>?YdX)Jj6Zg~o)m4*Q&a4RUn=L-g zLAN1!*&moc8B5oRMpsm;@Zr_?77Eob`R#2N5k3RDOA4SL!}PDDrxK zKhVB)9CVKVmXs*-ym(b|a4>kY#BzAyw*B`&fKXo!fhz}IUj)BR!;5m1I*{8F{sSM6 z{SN=e!1hIe9pLg$n^GK7e@CvOH%JF&(F+bvH@PD6%w8aEY~bKP_1^VOnKnXj*__py zDW+SX#dAG~$GCv>20$L$Uy7B-?ylfLq0oO3a}TGgupqCYOfr_YtoPlDx_JcwAG|Bx z8L^7CWoBS>X=ZS6SwJ{kkj&Aw@#@00tTXZyK5|Je;7Z2&b$28@eikQrCP8k@*us1v z$mjQvJ8llq%;~SC-Tt;^BXoc_O7<&a+A`Fh${HThes8?5z-6hZf!-w`b{WL^~v$C9=X*uWz30qGW#s}kE@f3jh*8X-`4W3uI z!7?p0kq96Ezt}>s^~o4ci)1Bcp7mt#s)#w=QUmuykTY>bOa3_SG&cPXdWiX?0Vp@a z1}PdYaS8~lL=b)S(-C7PWl!F3i5e*R+ExAV&;8-hFjK*K-|^xj`)QfLy}#p9aFApM zc*honJSNiWn`#`-Hx^%8E$t7tM#D6(uszf1{)CC{l+s<6vh6ep-bK+|WpZu47d$G3 ztVYpnO8N}-;3O!~V^i)*NfbZzZ(}(P4jXlWOJ|mcSD^%`QeHSHuUw-nwPDkbz;*N1 zKM*HFukJhp@%*P~jnlN5ZDvGLR^v{kH(?Cr6&3py@_X}0uNLQNY&Ol)!36L8n+gI9 z=0K%lgdCKk!(L^tDrCFWYC zqBs*HAEnOa5A%ikjpF-Ph;14uB6njYoEb{}xOQ8m<`2m!$MJsZphfInCw}9re0UwY z)P~u76m0pN&qErD0Rw`2^ul^^j0VyP%-;8S?IU97cG%HiwVY#%U1fw$BB|f~btd|f ztAT#41Ja6z^GI%RWGz=wTte_&CbbJ=Y|fzPOB$O7#M0?z+zL7j=^7IIo7DaY-58WI z%H>*LG*}TW>%0jM%G%z4p~eputMwu4&(A+r^AvqlF9M0Z*yOD4G=3o(4RI&KvJh+q zeuJ>fUs)57YE+fybxg73nD#=jnw_6MquR#2Aq>%WJ}3K$4yQE-#&D){2kj|J1Rgpp zb#ZT?X)(n3meR01;S^~eB0F?Rs>s@Z_(b< z7bS#&6$JPi1@HCB&y;>ePJDH>F9W0?&zmjIo*|X(TEmQ-l733NQ3%&`&G~4y;i2s>O&b5KLIfQZ5 z<^tV2uxI;tB=R$ya{iRWu^6t#-NikQ=adUq6BCg{4E5I{F(~)A9fCJ6(ESiyrNEx@ zXF^zX6>wLvvBmrs>i~EoS-c-O5TRzDcdhx7hCl}`Y{mv2rV~}=J4)7SYSyomEN*lO zT5C`p`6eq0W;(xZ53A+fpDm!gnAbNRPj;(k+T~zucG)jQII`kDe4VW7j>R?m#R!KI zV{1_UR}(WFrT$`>hOkd5s2vt!T$+P*xT*kSeOyg%Tu+3$)Y4~JA_7fx^ zE;Q3?^2tA#havy#M}Qgi@i5l2S?m?r-?t1m`G4;Mxy5>B(W>Cci zNg~9|jHt?n3OSbxMYgDXV_eY^d@9Kqwj8v3%d>|>#AfS7Xl?qZe_?2wM`|aR2qgDU zb0;wv67;=EVtm7xkm9SE=>&Tg@RH2MkjO<1-$O0I6ZYtzXwl~p!kjUUAs?qAo_dk4 z50x|Abb(h>gl^xsG-ZFW z`5e5sySx<3m&4%OZ#?PY^gjZFK~Dek=4D!*-p*%b5q}=VjI*2J;3PYI7@lRaab;YW z=_v6b$bs<&cZn+@xE_PYE2xKPdicgQ5Y~)9HOyi62v(4d`Tz{G2UKnj4jfEOV6n>g z5cn6u0AAW8-e7}(7%7WaQVd+&2*Z!3Q#$4XFP1Fbb83y*K(BG;M+37xLU5LtEdJ^INZBMYM3vufvnG0gdMh>4ufzX`ix# z24YAvUjzPk&h4JnMZ{*`w(na$SHdTo;BiY#KW1xlTt_?JOR*VsOoMg7Ulj$5`JdI~ z+-3j)+QV2h;JQ9QkpY|j{E*z%`PgM`Trdd;OdsL zs2%sczLUHTdffaHp(ehQ_wlUP^ca#k3)<-gyiG>s21s1XBhtiPBRnmf;iZe~QR0e+tWez)OUCb0;E?TF?XBA1s*o|>7iGJ)R` zDlii(B40bYLX2#q+Ylc;l|OjbuDop7Q|lIrck<~BDOAt3{iq(edVFU)e8pJl!V zqJ@XE;Nn?_Ko*SH)7{PGAg&p0W1*^PBjqX5pfSupi-~5tD4|!y(SEfZ_c&Y3hbS9W zpzAQ2!WBQv9jvNCdURrhk;2Z-&U9!51xbAJMoIzR_FhOCg}98#c7^u65e z{pJa%Fy8Y{M;4oggn!O8=K3f_B@xy5vPw4pdsc=tu@{oX#M$jG~(#m9CFS9E#tkl)ZS#TApVfy#A}1l)IBEjI_8_x zEMUWvbkimCz|bm`Z>>;jq*ZCcA)v>og+Ets(Atx6-t&SDq0o9Q?MYdaSVpaJL~-%% zKR&8Qrn5=7c#bP%a?=y{3G;DMLv%vO^Mvj%`5}YMrWb}!#(3#0S*CmXxoXMR06ujh z<30S#d$?`>g#P~c@P1B z6(O-IpYZ+i-JfNL<<{FhA{zd1*c`y@fWte$X_TEBUHrCR#s57+wP+h-xGthfuGrYw z*;zp$s-R#UY=eHb-Ojg#Cd|&wfwV7vC{)z*FpzPo^(5;+P)O)=VIdvjb2h3~`*9Ty za%+Ru*P5E6$-B#(d(zS{luvM7kgI12>*~P*r;c*r!{7}D!JorxdqESJH%1iSkPUiC zptr5UyP?>|j(ga(0~(a_FQtGxqzbcMG{0GoW*$cmaEuH$AwA!vO>j^Bq`%YxdYaM+ z@~oZuJgdySH{e}P`B*eq(T^`LB5P_2*>FpP8iiOh7=-oo<5wosk{ogHpwUyRZH0W? z63HKSm(C&VdGmqM?2gc;Q^t8g#(Bt#tx&!R^;;t28$7051EM~|cGk5J#jiN0U+dxLM{tcVlL!s+cGHNOBX%57iI}Zlr!X=%-r=z` zMKVtDmsh#UZ%{=1`hw`T zO}H4$pNY;VIhN$*&~`5o+x$+mDVn5&>t~3I^0z5Q63VuZpYp43ofAgD+0_ccAl`r- zLcij%1^#)i?w~->pTeEQWKhUoEZ>&*F!pq-=e>@jyDb#`Q%Lu>j^`ws^}3brB#!O2 zj^{dvZYxOix)pj-!PZyEcj;YtF0$5SSFY6uNm?_{GEb-VG7(ixF z-k6`s0-H@rU%Mx*la_OJ3rhlOaYkB)$@t~OfS~fVU>d4e!6*e;r~=vP5SINe*cVF4 zr#E8ygI^Lz&{YCKjfG=C>LEM?6w472?Y%o24~9$d3p(n}`w%(eYO$#Hd0CxtaS!6{ zP99b`+@RbvrqYZ`y{-r*=f|2DkSNzlPoy;4Wru# zW4i>M4r@vXRB}kz`Gc;qfOL*qB@H zF>r8z8Q^tiC?*if+)MjB!9YjP#U26zDr*-x-w+fKdj_`T*7GuUXlSS=UDNkt@%|x) z#8zE))(ieW9;bl#O)AF}_$tZvC>BnJ3sgK&Haz9QGv&mKWg`xv#Yg}FawrYl(_@(r zrxuV2?FxsSQko9Kztzph zN;@yyG$=wOQk-NGoYYdBP*5BgaP0B3V|5tC;@{2`wiSOW`bS#1}Oi^*Itr9%Z;elPdMhxcYfsm{%q}V zJ=!{9o8fvesFzJATfo35`5~pL?3KFZeI*@mpOAn811bVn@(8@_p%(f@`*|gB<`e^p z838r_$LHtyns=&uk8Mp)o@LKbPK2_$y1KQswT6aZa}D^_0< z{4G|FM*TW0Ow7=*kj}1-*OwQ()b#YD{e1{X$U-uVl#~=Fas7$O3G<{AYB|A>s9U&9 zv!s(Ps&|KO*dmNl8b-!LR8$r^div<7C^!U!si~>zg63`lZrYTDzv+pTgc=5##{`3j z=yG>=cW+NsU0qyEMM1lM(P*Df;Ev*Ev z`z1RE$Mo3Pwy?s7`AOE?#Bd7V_!bxLl^*Vym#tOv#%f7bIDzd4msjBKs{C`@O z_;1c>X=&B}YlHqkLON)txETR4Dv9QF@(9rz+{I?j{e3{1WrfFnmVR3kNM*lw#8=IM!{GDi;n&tmn9!_RfmJCDU-{Ozq%=G@7dh_ZyxcK<8 z|Npy${9a4z>$*1oGr-4ViR3D>|Mg`j7$xJ)?QN3Ie>pg>F!T64)&JjW)e8N4Lrl}y z4LAVwnzd5@@@}{NzaNh2VvvaVX#Q2Sh(6(8F7xXD`*lg$f1~Jz`Iw)krk;rK`TA9? zQpz+;7LPNpJ;_J#(^@d#D-EFk23>`h4 zjm>?F|MZXL!ov|gH?MA6qY~f{y&B?p*;!c?xWC`^K(USU1=K2@Tm<*>Fcviy365lK ziAJD;zBd7UqhEz&J=XuNX;+s!wkFrcMwdpHTj0+fTohcCOmx&FoO1eG(Rq#!fP!3i zKI1%xz^$~p`rNW{nqjL zyu4lXuW1>`P2os{Jg$dwp+#$LyghAK&kVwSGcz;YRUaQ8FV)1b?ngNC3yX`9C-(OC zY^KxRe%nJ>A_N6}PvyA+>G? z{E6-1%)k2lKW8;$Nh+fzCW4BJHuwPKoV=WU1wTrfyBjN8YYT5q{~R8+eovLDvDUQC z%GSlNGpMPsrK$NrN5eQdO+O*@%>|g>UE#cU*Wz*RyZ_sh^ACcL<)bZbD|q|i(NRka zi_@lFaJ%84pdjrgi&z|%!TI@yii$`=Uca}e2Gh~bj*iWi5?E!!Hiymp&$pw;-~Pm$ z4z9E5>FIkQdBE-Vxakt&UPVjmX(yccM&-dp=Ah+AM zZ@$}s&<0*7l*q{OU3n^pZ1nW-_C~DE68YZr%==4AON6}N<#M>@S64II@L;uDY?k-O zlc%Sq>hDaar5`~YJ;goo(;4-7fK$}-?l3ewJb9cCFg)Bqpua|o_6RZYNGYhuP*GX^ zg`PoX$5oTnS^HhKl>A5ka5NvwD4Bk%$Fy z$iZ|(IKUm&>P>rTc4dz393A7qfByU_E-p^?nU>lS9~YM=;QP||@rUUteIhY2u~;JZ z??%5;tG`Ywfl&j2@Eur&( zc3TMY5YxWGIVZfYnn`x7``EhTf|Sc*I$|2nFVQb7z>S0b;8`L75HrsLuI-_u_m@Af z>%Tv~AJ35%QYs3*-vcLrjj5^W9NIh_3^cPimA zpNeY&u)@Xy0-1WB$Y^OJc%20Wgm6eHot_NIa`P+<#pp?T6 z#Nvy%HHUYgpP*%$PA#Q&XAIyt*ouEceJ&&wzn0;2`d?&AEMN--}6u5lSLf2W@P@bD0wN{&Pz0NR<0k1uB~jX=)#<)r-e;iA~~ zR@`^{=xDU!?)fNx)D;YmXBc;;WRCOB$iiae8z2G|hue7?j*Uobp2U4PBy-jCNYrEWeL9O{_2&K_ zLymg;>a0RbV0-5L$c#MBg* z6@8G0)w_B#1Gs2n@kgh~KbHWM7LhF@;h^A9+sv*~Mu~ZOy?*arhany}e^v}f@rq3^ zoPw>Amd$j2OidLO?=PYz1z%TdHGn~h6=tHmjj}e=@a;!+H+(11d$`=3h?U4?OKTh$CN_GP`(xz>3E)1C$8LqfMB$7{ZXSD_QgOH` zA-m;u#;_5b1*7DF?@VNQoe)6)y~;~q?oowHm3#Yr9`)ByC5z41lvS9Uo15K5eROp6 zttoQJIJ>pRgH89}rPw|esl)ig6h_J1W=Z}U>>j^`=g|xr^Jgh;u`F)O_762zexgRB zgf>^GX=dxvSDv}TMVX?hf)APS`35t3J>_({J)c9yvmI^D8aTN-_ne=e>|J7R<6{t^ zCTAoi>Z@sJuei0ODoKPES=pY}njc}8o10-{VSGQj5j}S*q?|L<(7=-W)#hl36KGp! z(8HC^|8_mJ;VNfqYa86^(YJ#gmvfFD6uH&o-K1IQm(}!W^>p4ei{{$i(a}J;txDv5 ze++svAju4W53$#Dx0b+Z3%g#|(vrG4Q?{!XLHIHVb`Oo+r0;&d3fh(wESuwL4BZ~g zPdhSrTHo*qJl}`7&Q-jGM@UREz}gHw4={fO5+SamDOw5my?Jbu@gfY87#kaN#cQeH zLSMtx?~uxW>AN0;S7PQbGLC?75MA6S$)6&XL)=uo11>YalhSk?4$dOX=D4_px%KsI zgO8hd|2bOMK?oJe7(!G``XJMz+5B)Z9v&<_yor<|#pV~_F*{s6Xshb`H!+KW@|ej1p`Tc#B`}@;|4@i;Y~a(ft$Bsx<4OJdN;n9+itF zb|@U~R9L9H5q5bgpcpMOLM;e^8?>+iU7SESksNE27^+bqOwG0z4zXp1M7KG&7Somw z-8NJ>vY6G*U?@=H63nE>!b`_Nl~o*@^o|HioW&o*m-QV9%^|7!g1B5S&16ESC0_;; zT8uYj{A(ByIxZyzV=AgpdV@BGfPlbHKu5(uIWajqKQ-I^&*`^ViDDJotlAchWe$rY z%hV%HWb;1^swL2?o|B-<;%vk5gTV#Z21%+8g z+A6!wpBt4bZ51so@(kL~l(Z+Ap`pKhnBP^4lhX>4=6E3B78~-{lt<%PWW3lRzMxzn9fOw$`%Ry*z3#GPDSx#t-4J26alLB=eM7J-_E)-_mm zNpjj8R?xN>!i9<$b0DDs$V?s=i2%M`=RzQ-BC3=rX%yOak7%czlk21pXYF1gK$C52xdn9AxVw(7dq?=2ebV zDKRDj83K1vm_oF}VG&7I2I*OVVNjr22E#vMSr##7x>zRP4xubkF&al0?34(R0YA#) zmjdeCZ#&5H6rn(BB>@_2in~A^UQAB_(3{TV?=sbufF_4`z|nfb>W`&qOW2)e4#c z0uqE3EQhw0Tf`*}D*eIbr2=h392a8!{nLo|*c-FZm$^U0pHGsPH;8K%-*6zoM$njN zafH7CWqB>Imm-08G@idJ_Q>3{2dI8c?Syd@Awm0N1;rKoxma&oUtdSJxjrnY=*~}J zW#==~e>h(g^)*ligD1l&ON0q)f`miG#T{QNgs=lWb?V>!W7MN%r3HT>EO?xlMFTA} zf5}NNe9cMJD1pQb)4t4_-Wtt4o-?l8F>`q_veAedn zl-I1YX8)D;^C7IvcGz4Uwjy&2)c9z#n;=)ehHyqFm&bI^W9D{Adz}sYJcntGyDN|H z%;wB(V0Q^u7TU5()sjImSJ+N(qgL+$9w}C4Y@Dgm*3QO3Ro_v4h5f7LAt|*sCFSrY zIh9Gc`vTgQ%L9(?kB*Ma%y7yz(mAqnM+3Lx$dxRrV+a<3H?Y?xZ);hU{pA(1Ww?J)~tCLlQy`r=o6$ z9R(Stw7$N+r)P6*4R_E)rm!i_tACE`WJt1opaTbbOju?(F!$MPON)>OnKJ_QWVl|w zos_YVR4%*#jv?@tM1x1YLhTD9_<*!mNKFD3ovW0km$el7Qeq$pY>*16Z(^|XE+$2I zXFW#%}A=qHt0;-(JsG(G#It~H7Dn{zTspShm7zo(q zme$hIArt9N;1Uv;QV>l8fiq}xAZ&uWxFw46ERcLDWhzVe+?Eq{H86q*fZN&Gk;6+4 zXzNA;Y^?4lgs736>eQrxHqz{0yPzF2e^wKA1yGq>c)V+o+#tf;#ql~p2u&oHMAJb{Y0B1uv;slmic&BV`E-rB2Nyll|36$Apb5=xGglfYUsd2!`*M1*MNy0i*< z&;Myu)H0J}%}Pj}JmKS|=H%xmr}{cTO|pOQ>CVPmj{Y@{I#+Kd$KCY~2_`N^c6zF& z#@0&Ry0-O4&XwPG!OY-I*=WFy}geV1W{6>95duvE;5yg6Z z8%ZQ_D_Do7OlRcmCD1v>lmQeP9^V)CA;1?)U5Ti%Z%b$od;+d%)Kpe>b|G5Ex)ceA z1Tk|sR=Iav-2n?8o}R)Ha;R~@#~h6Kr&t*>mOGS&_D!L4P1BBHgmkT7O(~FygRCY| zcx+%Bqo{T+e%9z_dd9&p6N2yP&EhHNw@~4P);q;q!ax=<^OfIrd)|%hqy(ULnx4Xt zYr)gO8^mrFK7NSBezvA}kR>>DNHZs!{7GmE49kPv4R z(Bhyrz}LN}G3c(so3UbnxgCb9!iaN?z=FRUH8~ZT%txvL5XiSeGE7G5rTeB398pUn z2wcaisVFFz@u!+lkf)+>xBv9}3mM9>Ug0lVY1u}uhoH{y&I-%IMMo{NHcrr0E$i6t z{Yg9R9N7rktK2J)~NLMvMPq)Cv z+Vd`IM=(>!AIF%!QTqfHDoI^twzR~7lFQy^9Zh$Zyx>|9MrgcW9_&HxSV5WdXO&@B z)hNT^SF`n8+cuMd6_WED4R21CovDizy+F#5SfutZmva+dX9~-%vXT;%I3XTp+7ubz zLdvk;&JFgfd<0NKgM(svF8gDsNK13{bX5 zLQI+HCQY548|Ki;FhWi9I;h(RL}yyDu(0HqHs)y=cc8FDF*31MaiI#yB?iR)oGgZu ze@&}Ewruzgfi;EpO$=zkgzXUu8Y9vH(}!aaW?-J2vr?D~8*yqJ>48P363Ue$d~go9 zG#BTmnXo0Ytb2L%vJal7fhIko)mIz1P!ou3De*qCRHV~l~ zOB63bf|jpjnXSeUxVCASBh*Y&I7y5&`Q_Q-Vd{w=+2MZiYZx@>F))!4sDlJDQ;*?P z1>k=Pkthy4c1F7xpu#%Nr4l1$7w%)B;n__!5>KGi$Z_AkJ($EXgXyN;FF;2~@QB{S zj{icObhW!1#5Y%&oCX*jHBElZkrzgC#1@EFW^212iv~nw$bF}TMrDzRTnEgG$R>oP zG*1;R+-ju0=(y_2`DIi5$L6FxTvw8e$J5E@b1!(m^<*t?g zH6eDQ0uirB%?h>)o}o~+kaG2CUp5|s_?nz=@_W$kNdzK7lT$AnfHJpCCnj_ij2Ni> z%0X`B08dO2+!)Bo90OVr@Cd)voiL3UymxP)DbNY_Hwja4T74BFAB^hI2Mzrfs7Ds@ zYdl@Nq5&{IpkVzrTtFFs!QNHz=KUC(s?tHK3i_3?W1>$GZ_eD+d`z zx)Z|7Zi%_=Yy~qp_PjeB&D+|eEj#B;#LWTEKx$yN1JwKjKbg5otC8km*~kTg_Jm>q zCdt;8)hqoaqH*Dh4)mm8qQ6vlgVL=HOX!J`1E z=J!q`2ZE&9dRe5E$M?N!Yg(?*8+;T-s5>KAiVPgypUw{an5RkoJOf z5wjCCK%`CY$f06jboTe9`u6+1pyCcETs%BHn0caBPf<_=jNoWPH~jCie;2SjtpN`! zTzFN0Tcj(c=+hqY=U7L3O^y897Aze_GIt>Mw#j9o!g+MBn7bY_0at&?4$k6mCZUVi zh0%AH3>zv$I8jFl;R z^GQAcx<);;Z-BOC&$!cVmRBQ$(~qyFMP)jH4kEl?p2m!$nqd72y9A9vi@+ zz^$O5(A{qbO_lGSS~^Ovk+5b;=Xknou3{x9UnTf!rJm;av}}}y(oG4ND-9K#5bCd=lli^KN7%E`NnJ!;p<~Po7T9= z0Abl&_%2_-lo+VBp}>A1xSNJBgNcMEj_+@e!^Q=G;E~A%jfz3iM7X-gf-c&%>LS_*vHR9AWU)&}7inwe9C$q!Vj(l=34WR6wn#9oKhg`#9)VWo2n!oY)Ot7b}%eA23x0qs?g zBPFo#QEg6?DbTNMRbmP-f~FKQMqF~JqcB(sZ*+K*-BM$itYJvzW@b)SM%yrKSE&Om zhxy_qwt8qL{VKOoS2Se3%D9hOU$&&ZgdaT20=U3Y*zQveNPHUrKv&Ezq^TRmPR+4Y zz$MoK^F@0g$8iSt(KLWxP8d*FSQryzP~b8$RyBi`5U+`GBXF&Nr$D5KOHNAIgATL6 zB=O_w{Cp||#6aiNCub{&q$;8Zr;{qA(tQqo+)&O=(-dgA4p-Pzd5*jGS7N4iYS zyfjUJ9Tcu8C8p--xu&1Yzb7+0<@R{X>wOZXXrv`(=VD{wV6L8f3r+uLWymxcMxKtY zb59qY59o*SI9L01lZZIWc$&c^6bJGQcGjt-Zhf2((xDo`gl(wwTrdb{xS5{0QKQ?QC7&82<@ zfXg82$9Z6&WC|?-U*A;2jgTAa3GiUwJ|u{|8sPtlrjUZ0xkj7m$$_YuUE6|@u3lzw z5GFR_4IPr-wSRz(^I`hNAf;|16IC3&j`>+XcMKtt98}c!GGfaSI}Ll{IS)Jj3<=rI z@zN=X%M-i%N({=)X$iNX=jIwGG&+@i7C}(p-y4|i%CnOu4{<;HJMgLkeA1POfZJss z9GNd5Ery6cYw>b=KH%e01Eq8fHgNN9R**@+(|acrn+WL7ILh;OxI3Kw?K-ve{D)zW z4Ei|VF;ts3j)o*k(?zv!b&wb}mqiqWG<;byE_2Y2~0|hhS<9U59eN)YA zQqIZsV|v*klia8s`?+AxS2Dsz=+g(hZ7Su-Z$p;BxFISks(3F+hVIM;FRRk_?DjT# z=Otk7c(S+f(%?h7!dl-w#=WTi$Cx0^#_-Sz69o?yEdyJ5eRWY~VFhJh_gB6w1=f9A z*V#ZQF-gg*-+jaj?yjzrV`C(Dj1O$`6B84ILqqcN^4JVI?EW8brlWB{d?1l_O;}{N ze5hwRDeEn0u>QC`Dr+RGbEGk9A|@y3M@Vx(ea0P8uds2V_^{v%@efT64b=CX9*;Fn zF1oL@Yz*XW1?|nPH#XMaR6Xoud{k`A+umv-0gnNpjI^}Uii(P|vQJB z&-z7tL;~B9lA7M-87Kxh(nZ(hnox%jr(CFzH1VFoDyz)V+9*Hk;ePNOO_mjskTh>sXPAWkUz`92l<(kKJf zV+_1YLL4lt?4+dJ^h`}PEgf~eO%$SZJOb1zAM=0ULK|~qTN`#CS>>FGR9yH{7cjupSS0SXXZti1pYu>k=@FOHUj>|Gwoj<1E9Z`XAR4$tfqoSn7#MPDaQ>&qPJqx}x_qJ|t(ur*Hc@Vs-zmXd&mV z=>9w?Ws0wao{Q`&B?n>0{7Uj)0;FAZLzjUTCOYO0F>Ydteu|!EX31Jw#O5KjKjNum zX@OW**5&T@J(!$qSLHTZW-h5YCkW7-6Y;cEP@l1%!d^l7m!NTv^{$|tKn^N)(@9cI zP*ut)Tuf?Tva1V-crt6=m;7KdKR7&iE~LDvc!s3p_LR{JatIwRhYAy?q%1$Bm;MWS zY;a%Jq+x_ej6Oq1n(t%nA7VR;%kHW+)jow&zOn1<;uF*YD6Jwd*=nCsrs`KQ#AQ?3 z{}C~ag;wMI&+_#}l+Tc)i49xAiMZU)+@azp9nTfoQE48KA(RxQZ%;Z&@o8cqqh|F9LRSAsn#kJzu@9nm-$(&QVOcQp#iqNayXb|+`J^{s3n<7)52zz# zZ{gp9$;nMrZ{cJc@8DFMZcUO{MNN|ClR{E3d@26}Q+UG@Q&Us>`aXN+le&WvB5;~R zP)NH#7-)rLO@M8I_+Za>J~(;}qj84SNh)1T0y-q;aP;+(zWm3*>|Pq1IXGOFza9bp z;BJB*)JfRb*tp(Bi<0g3fRQh_z%{`~vAMvbVjjFE^ z<#)nygvX|(-t(}GA+42kqoI_Vh)U;=#lqgdco5)XaBOg}XuY{a<~h9%Xef}StDLa0 zrMrc50UI>kd^6osflqFf*PnLVv~*UoGcg^> z7?t>&+2}ZEt5`V8x%f%xrD7G?*)?&y08t|$nN1+so+f{ zu&ga;gL+(V^kdqtnBa6`2GT@0qYQE~>C4p{eYeq8E!6lMNNW-LbyaX@o7O zhpu2kr&@ZaVpEJC|D7Vc5A(4)D(gyVsCwrOO3A&lxt)r+enQ!{m9$)II@@zPZndRj zr5$6XrB6PxH=(U6obsjRtrN1k2Q{)A3AJug>AV{rHuU_xsdRiTn3tXVg$(YCX@(0L z?KbrKEtuHr(Yd;C3T^xOHZyIudBoQELH}dMXKNa zY<_aiQUduYKl@_|h6>v+3b*6UI6uwqyh=~tQ%Akne?8i|6Ba&vNZ~()(wVi=`Q*|0 z^zzshQkf+3m?YBq+{6O-t&PK*x3e+6&L;elF1-6Cde|C1rL1zTc`?wm9@J+C|5C)@ zq2WFEMSafl;$w0Bt*rG~(cv+>@To89-%N;dDt!+m^AWuWus zAJ^r8z4^4stCMt|ZT-h!ah#K0F0YQ+w_(0laUHUG-&B74i~6cwY7sFHY^2u4hrG@b zQG=MYarCbtEIL{}cl8CZ1H4Wlag}B>KW`dq1MlmN)`AXu(x&y`UK{w2N`~vn)_x`o zZrGRZX@85Z&#A9{))#(JY0dOHw|4aX*W>py&>IjPwFYn!?L&+aQ-J}n&>ObDruwD;5Q!*yvVpojF^RACTl z{;Rm&`XE+ID1#lm?i^NUJ%gK{?r~6S!m~Z;-7l2XZEms(k=}){>7_9Fl`y&GFok6( z|4PIUEqr!^1OC==Pmk1Zvo3p<(Z~WSmVZPpDn3$Ks7wEY(>4S;)n%iSeAvE7{?zW# zws|v&9G7jOe${u!o%i!J>H0m@TEO(J1o^cXR0Ikz{f5uUS&9;bEKaQxY;m@rStD%N z3Wc{&{WE|`=S|S|;j??q-79!>>6k5=Z1zjk_blQAcBa#*H>uGM)N)JgyyyC#z5dUU znsCVc+VzhEHcjPKc3$dY+W)YxXR_j%3CRIsy$K|7Or7 z$R=Jo2KB4CR;*3qnXcbks!Nk5J^^&A9$x9~hZrHB?(@vvNczPtd39@qcqPoHJGD%l zR5T!5r}J#^;TrPgNGE6OtjtDVL~lDeKd&Hp8wGi} zQoc(x+pSDd4}(gz01f|#O5_dOFf>t3n^)n_UPJL_`PBb##K?6CPTNSwu;s2lU-@O_ zy;2CgJAT%FeoIfh08oCg{arH1d7?J(nJXU`W)UJObwUmb6Py=Ky1^-mojPEBHV>b- zouAcbz4?i?FEduRdCEr*&Ut6pETBJOL(L;YQzJt$IaSO>jLqc$r4(J#9pQO1{MQ~^ zm(cWzeEP>m6eSuAM-_jw?yRPY{9)-X%1oy(;J5jhS&OvQhy z@L(^%**)!Q*LBtWP%!(=AHFCA`$BkQYT37Cixe`lZjHBWt!5u$#v1;ql4Dzz5~YK$ z1>kBB_E;Muv=O zWjb3O!{77e;H|PG8h=l8rri7x6B9EvJ$2k4+Tibw4n4p5yQe%eUa8lcQ@z)_uI=o% zkDpoBQTT=5;;&#qN91Rj=NNjATAAm4nP;{{M->>&19WD6NPW1>#jt%6W?|PkqQMl~ z-h9n=1*Gq5hqwf&$?7<{nZ(KJ1tsT2tLK9e_Z$8DG5sa?B>KA&8|aF8O$^&j4*^WSz$~15)L(MoYGhuzIgBi-`jUR7oEUhWI))?G)$Y>ZWRk5#`}C9>WHsj~W*Ci|Eqw?_eb6y;2uR3v;HjCGVfZAhb3 z(lk`^v^7ppi7dZeCK)Oz85;|SzGeI+iFd>2dUTSubDiv@h8wW&kolASpE~F!IkOdz z9eSS})>C0?1oB&76zp$uw|04Jh8?MX&Fy--W<6Yp`7ShT2RECt`LRuT$jW=d9xEX=dxK65AhPBH?7@N}JouY707Be{|NC zlnInK^L^$0%}IBeG^*x9NmnVCn#*&YLe$KC#O;-5wfkcn?WK1I7GO}A_^6N^!k3sIAc zk+M-TY?E{%$ttrs?$Z-9bo8ptViW(#FOLOXEfhCT^>|I1Q8D@S?3c=>n~$AEl*Q|{ zK1-LJ9SlZZy8SU<{ST5E#Y8$zlZ$Yp7Tn|}{55PPvajwnD1$P+E+)#CYtelb8J+JQ zU}VN0BBf#Er=unqBgPqG#_6LbXzyd=cwN`B_kGB7DLuWsLnKCyuq;wE%F@+KQ#H!4 zQj6%hQ#p3VPb_D3R(9}Ue%U;jQ4YtHI1CZdVH&CL8+ zvMnDBBQO6HTm?l%COW!7j1?dU@9U60Ki>mXN`Z82QW9DixeEjk=Ec#mwyyZl7TL`! z(rqar8K9qex^PLxzD43o^*&ycx#Pqmgfgi| zL;c;YM^z%-ZbAD(HUIaLWm}cWRK=`sC!I&5@|WmzIlmtTT271NHH}=t4E0om^om-V zq9bd1DsqRMy(RA!Efw|K-A;?LT`(hGqaA))&g$lW<38E7IdhqxpJpTDU@LECt!w0A zXIVZ8qL&*mxQI%t|Frf7!UYVR_124JzON7Bl9K-EIZA?5R8-{Td$qi&C_n1z+?||& zkQ;PV(dboN)@Q zBG;j((?{F9{5MYDmCsV8k0FW{PGdu8=!z(a9TIRwUrL70Ob@&ciVr7=^&j7Uj9(1h zE?yZ5wCr@Z848I+X_{5vVdm>Y$JhSu^&N^M%yz%pbadJHbyEE&({(~!dZyFc5}kgX zUo!4;)!*r8AQ)O+(E}p16a(WxLoFOY&70?bz^A370#^R}&v$c^=;-L*zK@%dM4o12 z38diANaw%%KB0+ywogvhR##zEK~6y&e$1v`CJ?ko;wRFcM;Hw!m|DSz#eovK{`grT zU0zUb3Tf1SB*9V>JjT+mv@}j>M01(}D@JvkF>5LbuZLJlX#0JluS4}_l|@yp%j*xF z-Q>RL=sr%Ai;GKjO-*i24jeo@@8NH|4stPUFg}-3&wK&jhpXT58qOD+U2Ov-D+)i` zp9j2$_U4Nv?d|M5&gSCB#>RjISLWUr5P1$27DCl&blBt}CMG83#(;HVl9QHlqjuBT zJ)5NeG5a)L;4_kXjOqCHeYpV}9$8S;Y5&>g%s?}D%b|lywVftHc+bV9KsV>Kx$=`SPNyq_`EfoTnT?q3q*>g?(18HltiB}*6q`?B6* z3pBu_)eD(R(J?W_)6c*(7WCFjtjD1uK!y5VR!I926o7p{R#-*FMEL&K?B|msLKp?Y zS=4*1riM}=AkGd@SGL(^V!a9Xp}VHJZO~9t6Qk1Hp?eOK`;q`_6=WU-A`tBzOuey~ z;FA?`a%vSmVaCds7%Weud{(2|<_E;=LrB6n3BFU&=yiMCgdySsqm#z4<*n!~a8$!4 z2m_H#te*PGRfPKpkboq3443mk9>Fc`aMpFx9t}@ioaB5oYilDb3qydMjO9#DWH_LV z9k6cD<5ftxyJ@sN2!k>Mju%A~`Z<^qBIYjg{3z?wB`X^tyBmj8$?PX^waw-ko?q8| zzP8PL+&Ni~_4ugE6mQ$Zn#fiBXJWL*phVGuVi4oqchcM}*vZUXTZ@>_!NJ0HVQFCkuyGraIXv%3?GiK1AkR>(sFhEF ztE=@YK1_LlZH|!|LS2?~cMEh=1QPPFoDc>^nkOUwW!=qeZL3z_^a{B(HCIC6v1@f& zDh>Pm9J_Cz9;GyaAvQ<({vSV(@_lY2+uAr&2?+@$;|QMjlNEuW*%NTf(dsW{>U(nm zy3W`6{AlQ?s6?@%I&=8iFmdwn}Lk9u^KsHv}o%gaGdn0p!Gf^csOG-+_qp_xQc^_-qwg&O0Lw$kKRPyh*Y!*}5oL8aP2K~?I z)CzOha^X+YnQY;VI5VfqRYOBV&O}^XTyh!AJIk7ee{oz`7%}q~G68QOA1M)w7s>{d z^45VKvJO}3;$U=KUcLCwvHl=PcpOLs+1v`%^4_Q2=$yqH1~Rgujt*{SW+z}A&tw|I z*;*5I&~!xoh#3Ftd6V2c5aShizgM-ufis!hr_!A9n6NDUJSND7Is88 zYxYwdr(Lo3F7E}G8(rM3JBzKYB$MPKk?EAat=XSQX@C?8} z8Q~2et4jTW!|9Ndo4X0zC@Vz2fHBn*D3LDg?(BeGP*GEpi!-D8fWnd?>~>)x4Cc)( z0w*ljXVfJLtH)wFymzu#-jT`g{VO{kl=HVUc4EsKSu?{9M_YoxWIb5i1=xAu|;kl?d zs|3$192}wTq|-g#j|P2yggTPoMk?ndfjBt=zC1@>@bK`5$*l;#3n+n#4r@Qq@5Jmx zO-)TyXex0tjBN-6!)mpgpd7i4B5&Z7phGPVVUe^jn$3U|f zmAFoTlY@D_7EqZ8d3t>e{IEA3Jj3~_Zs7gnXcPw zE_a-#iap<^pL5S@fu@WiN+M#q@nrViVbg9HUN>oX#j+!=(x9%|tfUe4uK13_ubr10 zV``J`OkBiGT?D6YYolxHv%F*@ysVeauc^Le)U6l%0T$=SE9uAu;qTM za99DO`g(c=+|B}_CPqTX!Ex=9Mn-bCpl`#l*e}}|$eDwMN)(dTb|UmNh~e%-x6a^A z{gD84f^Ww3T)9LnlLJ_3fotk?nEHJWzia`-R#4?e5KwT%NUY$E z@ULonG>GfHz~F@?U|4Qo1nd_l1jK+rl+^lq=BHdzr_)g?lm69)5wiu}M662J=Uej# z%oZV|qM{-r#h9!0ws^UA9P7a7OvHVxSAsSmBTqUpEAWaSZ|-NLvYJykPwsfNs3;gK zGjMLx@(Tb6xpV?)gQdzawwNlQ44{>ll{IBJM)I|BbhLEHWE2z>%$non0q8``7K@=v z2umL0iVhi<<<1+21QrlOF$B(8i*$!7p$d@gSF^efzo`yPO(DEXNX~;xgx40c5Wq(? z;DANbybLPxiCHOYyz~IYn{RpEm)wUCj}dPfHg=702${GA3_W}gtEN(f@Dm8hL$dVM zK=}kehU?s|Dvf|h>HEI*LD%EZtftn3n&0R*2d&9c_xYr+@eTG~47e+m6!)TIuxMmx zBCJTH)_4a393^$ho*_%7X{#Ffw0D^@b7%~JC zRGL3P_I(a_1N2Y7Tg2SQ`zxt0(nkV`n<#;(8Ax_?96~^90pAn$PtgP;$_UKPljSOG z70`EOQbtCkuYAtC5ak{SCVEz|&LhBch0ANmP>K5rYR27%GbBw35Q)P-gqV>F1Eo@o zcRJXCQ`g@6xaAEDd_g6?ME~ZT_IW$WWPA;b-7l0SjM!@q!yn&)B03OpP<*;BbgJWq=JKR*!AgZ~B^#U8`SbHoJsgw4u1 zY<6NcSlioQtU~lsl@!CWSy&CCD2cUaXTfljLfQm2vn9mo1of(9KEmai-ZqSos}9gO zp`lW~82`y+9Eqcak_8F>VWg)9bw9k1LP7c_1r}`1u;sCbh{sBB7$|P+fQyPA1bJhP z4>xgt%Tw4wfPo-FQwuzP0xp-5%DUSpQK4Tj2|f6{uZq{8^Jv+;dw$mXFJ`vY8RE?Q zob(*Z7H2WVI`rOud}~9_V)7O0zmaz#_buo%!1H}y_;H5a5!ZWJSyF|)RU^Pg*6(qC zI6e83xWVn_;VwF+rSI6m_aW%n`UpMF@_S}Z#_OMnx|Q0^dTmhZE_pppN9`8Bp&-mE zcLElHZ}S(;+2zsc`Bjbu-a_@3O2^}_*sX+LzjyhBk^|47kULgrmG?d5)u*s0vLa&-R;4Gv`q&lAsPgAYwU!NkADiB728zJ z5LBU{q+h(s!7TlMWWrdSER<%1syFoS=v%=S7a-k2{U%K#Xn<9!hy6s0bMlkq&LG~0 z;9ms>E@iDuhunGh`Mo=-yrCj{ ziF&v-r7<(iF+P8RyJa@&2g#Zv2sFchsSy_IP!Y@h8^z@~Y^fI$rwsJq!0Fwjy@+wc zFeF8CjKr}P{sc-+Vqc#|#GF};K2T+Uv33GaL?;vG_E7}31`$~g+-qnC(gl-~dF~}h z)c5URWDkaUw4ZUF#SCmQ@=;u&M)@F+yw$vSVaS7xAppfFhoz*KvW?ZrLg<(M3vVvd zBT-!MJQ|({nb>bvUg4nfmcKjvjGtPf$!iU8*4+FkemPCL#kwhXoL13tq-KY?4own< zc@SlK0LGy#GS!%!c+hyDG znXDe0GX->f@3W>OMZ;UC-gDoX$(7;BM;WE#gMK4k?3KIPbgs_EwyqzP^$7cr(E~~- z5S9jolo8>;_^=ULomRU{u7Jf&KqNXT;S=ghK-jiS+|e9d41&6|OE_hrl)@ztFQX7) zVrB|?`ej?EoZov5`YQ-xHkTK=51l5WiSH}-`rzU2t8oxDMN~1P+6=!BwCA_K+r#!( z>I2ns1z~k&f$0-QDylH52+&UPfFM3*8#>^Bc|eg8_SC7tngpKLTm!f!qM}4B3UM_39B!(``&V{mqJ6Z=23 zy;WG%QP=J*f|N8!hjfc{cS$!$D;?6^(xG%oH!NDZ8)#nyWJuSM44UkMzs ztn)vv=D9>7iZ_^L-i(;BdTIf2D$Us@>OD=drf5CHu70)8JESdgLU=w8<>@0NHBJJy z$L7wJD2T>< ziG^SP>;w%7JtB(VXJB&ePfBloZ^S!mB!mG3QukHRd36NBD5?>99y+?6huiZQwl0{y zVk!Fx6gq?^=heeiczzyQCsfCpacnncr560#}CTk z`L2}4g-Vv`bEW-V{O+Ta90+_rFMt##QT~+VJD@upgue&Sg-^dloL&;=@>=9k2T?+M zhG$|p;NZjm>B)caF9nazrZZFfviXhrS5=i)d^*)8NPmWS32pM&^5yAz1dlM^lgCF3 zob>~PCb=OZ-V6;*4}#Rx*w|O2&u~@#v8m32Qusi(<<4Xg zIweI7rS>{Q>gj|W%Nlt)T4G+~pBKC+2mw;E{4?hMdLY*FEkrEr1FggCh_X zfb@;cs236E<)x$@qNsgfLx81;qXp=gBW_ipqu54zncCv(MNMT(wp2mw<%M_P!(?5V zOI`5WuvBoaVZd^%&Plv7i)_yOv~6Ejj2tKSCMxLf_hzY#*LfBC_%4?ZUXj}?rEa7u zUxcSzXA_nXTr(~&t`QN1j9kvb>dMcgk7<=0>iB%F(tn#8%PrI`xGCK`UU>n3$)o$k zL!x!m$N5Hg&)99uZZX{~EDymz-jQbE6HdG%UNTqcCx2~~U}!x_WH@_+e) zR?W%Di6^#(D*sQH05fxBIofB3h#c-&E*?sSU*smiOLz82KBl0Bi5H-0A^& z%k*8YmVyRD|1DPI@QXD!Zfkt?20oae?0i z@<8R%4{!YKS*WEGzoe3A0jv{_-ooJmRD`e3)(xVeb6DWvZ>pHp5SjCEfJ3!so znF+zMzwM-z@`nu5BwiK0cpl*~lI<9BXv#+^3Hy*&)=jnJ}Pw5O<3FFOf^ws^iJ(DZ3M;Ek#yeK_Ga3the+lfC8565 zUPXiK2qodD1IhBLK-ts5&*qvQtMm|@zbMszFXu+uT9h)}gpVCII~~3SZfQz0l}GE$ zQ7{zNU)3wV(?l~z%lP@R-u01oQuyBcC_peYiZ7#M$9sT;yh_mNDF57}#pxY5HEc$k zZ-PRksSEyQ@Y|W$V3T0O;&nP_+-yd@Xu=l3x4+!epdq%O;ri3cLJl>cIqaX%R zK|;J_w}g=k^%{OGJ&%>Gb1i|LK1h+#C*=sQN5HZ57aAAniATKd-;inyBC$nr;d|+k z20Dc&3gn7ej1kqB&!gUX_Gra%8sI1^KjR8-Dcd?98YC>6b(8kCvA4-EwsCvq4kyG2=8 zgZ8dZ<65})>5bvE5{+*`)B@A2Bxf}qM~7ZZ<+a^0;U<*cbUpCTxKdsB+LDJed-ue?BRwUG9T`?aCZkEW zX|Bim4aT!~hYQ!K#0xIHCbOT{m!uWk$XMr`rkpEJs~%~7EB&3H%Mf&%-wenbdX+Y5 z{++ozlDSNw{4h#8OTgCJ?O%RdQ(NFKdTA}YXGYP_xL0Th-xVHV13#Gr#N7w;onmid zXYJuD_6on-`RAL03fMwNq77CunzcnMQL{B}0zcZ<4R=A*#NpF4QR3G2sEb;Jz?tdO zGJZ=!jp@<26UTn~`$TGcO`(@=q2)iv`dBN_{&nG z$>G(~e*LjdyYJ+gOIrPr;7^<9E}Q!%(s|#L{-{7{R}z8N`=6)FdCeV;+`RQG7dKtT zv}mN`J@gSn_I85DCu*wj*n(fQXuHlxo@wFg0)gYFH@Pw)+y?`bKW}CDIyBLXBTgr zp_AOOCsAGJfJ``i^4IXog0%xdo%d!T$$tIe$2yPwh)bebo27Q&`w_v=Xj0A^9t%(J z(KSll>%*05x955v1Xp67#>dW_jEGudK?~1=#=6MFCHimiSD{g4+=9M~i`{39Se0}W z)z;6SlfNaaPEPRb4#hV@tJZEgx^-0SgX@D^$!c8B)E@i7s;&Y_Zne@)zlb>NefAaG zG`4wuj#z$T7W)Umi{_(79WP?nTWN|7$)=FyW6$6Ev&!(>pEn6s&oxr7$#ZjdzoBBO z)#Y-loRRyBPLnUTPPOszQ(I^>F&D4d7c<*0X8s>O&d+PlWmQ+Zi3liuT*&-c&ueSy z^k*W1@BW&M$8qOmEw2wjA&P|DfY-L(c*WOCy6A5sAak8ncwa+-Q>Q~x*L~C$14+qh z4G)5*3xUNgnRM@co4TvD4hMWu(O~yU5N5Lo^r9npa*6F`^9amk#P>&0Y?LSX7pEAt zHVdQj6WY}dIr8T}i=@si;HLGlXjggfrbaT(+UeE#u1BB}X_YPfG+Q?#)v{Y`HJv^3 z35_CU74-enJ=ndKKP}@G*Hp)h74Ydm$lYWzN`If*cCHFg&>j)SG9RU*C}>0F72FP% z%pJSgcsR;(b02(f@AN^rHurwKO$Te&!J}trfaoc%aran;pLAGoBJa<`uvOY}zfAdK zr_OH}PBhpOV&GCJAwkf}B2{1K_@VCRX+Iq4wS=H2z)(EsU|-OajeP&)&==@he&;-1 zU71{A(BM5hUpZT*U#K_BtX(CWrCF}sEIXjxq!^o2msVf4)N1pXWV2sytJ`3@u!owa zRiWMC`Piqx?}iz6AY^Yp+9iJP98v8vy1ayd=5>EZNp)uY4%~0y$6{bdN(F^3+>tt1 zKjXJtu{h|Gj{JT0?gB;~<`qcok-q6d!(fHo=0N+Kt49XK%Ss;37qJj$_tL#7-9##{ z3Rngu)G6Bg28Iu=k3$E`3=N0az80%zl9OhmhP6h+&74Hs6*>*R!y%FR(?nclTg|?Y z)f%OEK5gD>s?^N7Ri3|6FBxa)B}->)KDK;b4*}JUqxm-LXa9`*>ti8z`;{E=dvuaz zx1Ezr@lYH2xmeQI9N%QM(AdF6TXmQ`d+6{+L9{yiTi!LbCQVDiHPK4lLb3c&#QtF%` z>Zm&ZyL2pFPOSG~RJO%%dP0ywtU{PwZKhy%*iA zf5euDC)E~wDs6I_EnE6&dfvxk?!#(!0g0yhp2qJrGb@K%u77#Cby@26MZ3dmJISZT z?avQBkNK$q#$><8C$HlQ-IlvaC80a3neA_Q@9^)tc9!@X4p(ZdADgGGwaOQpP1g$} z_mjNatbVum_=A2 zt$3&^ht*=}Iy?&g`^`zEBE=Lo*FQg^X%s(JyN@T8>uxiBG;CDQF4Y3y7!(tnf?xaJy_9^@_a%RyS-r&HL>Al$22LCvRr;F z0}pK`-&6*Y@?_|fj#m=;)z9b^s_{u2F7(ql#c97k+mEycJ8h46fFv6Mo%Ep|?Sbq% z5I%M+!5_A1(qDShkGldHexCt_I1KXkJs=~1g`X>%a~e%|0PM5o5MsgiNiSy8jNEbkyw%l^T1MM;+Jj)Q6gQd}*N8nry?Rp`!lX?HrxByKIM* zC>i@Mh3L4Nr~3YH*P$0zWu}nLJSb6}jZ2e75^;a-4hqMnVOW(V6!z`DIsM1yyT~)q zh%UU*t#K<{5t3Hbtc!&!^yqwcwpr@!^C&AT`#;}1`uBsw!xjZO5e*jwOAk{AOYP5} zRSbMZZEbyR4TNS77F*MasZIAQn$z@xXyx=e*f&i~H%&~;sA-ENq$PtxLg48Uaq*U( z!;4lwk=g}gkXYc8l9Cb-5EKM9hKGmCD9Q|sjCC)I%Z~OfL~nmYc7qG{UGZr?L3&noJ!s)I5UQx{eb)N ziSVW<$ejSVl#a+RTB=^ZXJcnqdzw4Ee<1tgzyB)e#p0_VGv}cGsf9$Hv&pXnpeh;_ z8A*){;FUYRKkxqr>KE})IsxgJ(67-PL+9V-=JeQD_Oulz@QW|Kz9LzO5d`$Ve?lQ+SR)dbmzS-R z(EmVp&7Hyuzb6W5%&(|Wd^P|mM`sp5-z!L3RQk&8|C9r3n{sQsmXxu~cAoiy8~R-= zfT7IdWMn30=JN7#p#Q)T;^06jlAv$iXC@lKf{&g3{N{8WfR=c9c?BXK`ue1} zxf>quuZs!_!qdIN02NWETI<2%gZ+lhxHv;xyc4ue8LYzV>5E-Z7C#2<_AcYyf5JJ3ec!bTlcgV*1yz z0rHN50#iT`V`;mHY3oAEf1$_rkMiGvu)B*MG5 zP#%E-UtGb~qTeW zT^*2>J0-J9VWT%-8N!Ge44WJ`q1~5&Z`DhwMHoQ@gY$Za%vlQZH8v_G+qffR@3r%R zme@aExHK)Rfkzm8Y-ax%ut5FQNO$lS1E6D-%;#bpRGHZJ_xH8KG)gri2|2Am?LCMI zxT9j2Ev&2}A|sdT ztdq;j59jNw=~MY!_5jKc6f(hat?*THnB9CN+u$M~7yw~=LecXQ8bfIT@`4Vz&jA2a z(oS+AkpB03QEzMFlW_3xD)pMq?ELN*o*zb^v#Zm%Y_R-1|LyGDfU-KJe@_UiasPL* zsiJS7%lK^)Fg|4ndbz5qV&&V}***XJ#zIIyAP7oQplpJQjy^gxL`f&1C&|bs=zg*a zDn$130!N^QXdB5?=>C9x@0-;sVEustuP>;dhoBHt0}A5SmKmEvoOmZ7W&Icc@|YcH z`ony4NlkUc54M@z3uE7oBoTwf8e~JC%QyMa>A-_vx7z8y&|nv8vc^w$nc=o9D)*@w z6V&}l1^EC9mj-m{gYwzlN{4XLn%h4jwqOTOQMtF;CP?*?Du0HDJ@k1bUNiguD?R|6 zT`k{}E(H5`Z0{|`-m%~8%y^-XuX`#U0huQ*DyRf>Gv!#*ld*#NyLp$ zpsVY5H+ZxGoHkp(*&PtdPIws@kPC34TzZFf#ArOPx?i(A0GLv~o4P-r#m0VR#}iPa zSwp{H&zWbrxVqvx^nsRLdWxtn*0Ul&`ZJ;Uw8N?s@alsw5US)!LE}23rzp!QS?J{C zq=$h0>I;To999vDFaxMf=C>j!Dj4|QnmRUqE>Kp!0~IGp9%v`<`$)Pm(5jBu;T!@M zPZ+v*CxJTM9w}Z?1BiVQZy4Wd&Ljrb0Ld7^JL(pyWZwcjn7{|2K1Ltt1LfKv@k1=a*} zri)*K29Mi*Peov78>y5Y=2N3!gkol2--8yQhxlGgl=K^jqK z&~SFX0LBpvcN*-?w^Kbr=U<7y5lkX17$4Kv@qbP$68NhJ*RX{_bdP5Nu40 z0D$2YhX==YHakStyQq6E<#MZalpddSn`&eiKh+BuUC5P_DkqVVnaTA&)_)=36BS3h zPj5l8z+kSW;^Fy06T?Fhqk(0S-=3Xbg|e8E_$V9^Z`Z>ZU8+ykqWS>t#+rx4DUazCjNf z9v_dzB!3TCdVV^7&Mo7ht#=0u%oLb>OttQpag^;WqSlgV?BA0b8ymx<)#F#g$-@l4 zIXw4MM!zLTNvBgr6!-Ogf;K>7##9kYxZ}Ok`*h_C0FrF-QbAMX>><(f;Py8B&qmxV zC@jpy2G)yh6?x8-pFhIGk#w*K36WE(a{&`OX0`{c79co|rgFZ94~ot4{Sie>5s2sV z^%tT88ynk~FJH!>C)8imz~<$PRTYbYT*+@^Sl{gy>QP@47mzDNoyV}~Na9Hd1TjSm zUf~yA}ABOxi7!`RDl;RrBAiu)4yKg8Va)9~Q+F?G%WsqcDce7(3Rvzu`P`Px0` zhyX|E{a?i>7dS~!1)2yBVb$-)iiQxfy?EM&_XQgSL(1LDOD*CVGV*-y_Z*Gf`wotx z7b6S?ZKaHwVhje6VWNMk>YV_V)BC@E_YHn|XyPKP1Am5wu+99gTUNq-p`3twCBHjt zWNA3@gn>m0FFr3UtZUZ%q($zptT~_1I>6PrE`e^xws7L^=y(Q72*FAA@-**q2&d$S z8yk7#}ruPd&A%M(qE->sK4Q{^zn3_ zUF=TsDqkPWor4HFH^GWWBq1>5bBahP@=udbpR%)O0h%G!@A1wB9Uc9~2RKqJh#v3m z?tGtax5eb@fs@f7YbW|gr@XlRkHk@~I5(W%7D(5khJJ0B}!7jOE9h$-< z!t@Ti3qz1vTv`IwvhX;}(%A5%2k?noZb||8g6mvE^^`#r>|$eEQ$32)*I%dN?vd=@eTJcW9tQ!(FF*yl6F|;H=|NhE$+8=fz0O+Ec zS65d?-%%n?0@4(ZkYYS)l0F4}482(eB}4(hT?gQnZSWu!QIaCX#lV>bZpkD15a0y- z+=XI-3l-8D%?~8r5OLe$Nb;P3FTVpZ5Cc7cJ^$5QCyyita237b1i0C6n79E*1U&X{ zyKu$dl2t0x5F1xnNb2IKTZQ+syik=pqU}ul(0?#j18%VCwVqI?!Au^9e~gu_-Mb6p zo|L!L1|Y1MZe=J3=fOV3Wjz!kTl1v=oOk`ctKA z{of(J{p20ngZf8~YAR0}9WL-USltQCmw}tW!Gw5?m($bCc$iPs<<`S9r5{UZ+idndd2)}JdHxPl4p*Fg$3Q9gox{X$2yk1i;E91)qzvx z>3C;6Pl5}ay?$FM=9%7SGWZYRsxVdlgKpz-&-!$;9z99lLpAjla&~?F`(Noy8L?y2=OW02+1FN$Q;7c3HeJPm89Sp^-27E$5I867(hH(vYy$jtXE(QP8;mymuL`L> zXA;a)943GrnnyO2%%Y^I*vGT&3@kuFFd@IV8`FOO{rfTM0m^OnIHPI}-zGli9m1vq zXf&fpWJLVL@%P^WECLZLbDcC0OPDw;I@%DN`lvn(q8Tu+=mg`%J8E-z(c%ZF4uErM2O}J7`hO1Q=eHcNGy&e9bx(tv z`f&=r%1abX&Z6X^^`i1^eLa2_3z*PN-Afo4az0O+DvlbN;O5OBg^{woO8=wCOXAPo zFogw^h<1mtR9Q2>uz+e9kDonm0g)OX7XEW+0;7z&L&o>DK6l5AGIvGM72@gy3Pksq z!X-&Jce2d8q@9@*7_32*8NjKn&fo}lq0Q&)c@U(VwD;xV=V{cnFyi>tmT0*5V~;}i zj#n+vp>v5&@+`wsnwly>*5w7V7I1(P3#TT1T=)wI2M1EO9bZId5T8frgl-y{+8<1S4Q`ZuJM9JH)Xd>ug3i z;JMOwb-hYt)B<_i;tCxjl&CY*U2(Mz~i9=(ajTR&_~{XB%)n z#`22ExDkBbZC&t({^!^E)ROKvhUorOA3W=Z^x_3aO_~&wX187WC74;A${(q@6AV{{ zzRAnv;C(s^m$;jbhHBb5mgw3VHY_Sae|2`C-S&KrZ}wzwf~|JLc0(=^?6k`RjM|{HOczE(___-Er0>#|#{?IuzrFkdkV2h_;b#!x@g9 z{UOD-iMc{a!_>t|6K}OBdA3JBtQNaiNdkUMUhOZsZd{FpQhn4|*GMH_yseYxXDazL zuIp?rr`n3Y$xmwOnE2Qv%{^MCX!kLcF4ob$Zs+RYM(d}V6qGMzs=@t{UxSdmF#VG( z`R@!r+|*2eBgneDxOJ*~o2~lV6I##qb;|4O^p|E1i|Z5~#3LCZr51`m(4_dzg_Ha) z%~BoX@Ua_YTd>NZjuNdqV}BQZ|7yizz$haLN1baQ@o~9x;-AEGdz-HAQ2{!5e2@tw zwTccE^vx*2*Z9=aP-}9xJe6K;eRq9l@M*Gexa0Qtx!v=!1ln#g8owJD(eU^>5P^!0*EYCISc8__)p@l9I3Ty;taE z0U8$M&6=7s*X=68EX;FlUSJP}8#03z&Fy>umz}P*Ht2ZxsH^Mbbo%cXa8m3U~HiFWQb+*A!4g33s;NzmjVTKYcL4a%#s2IuxB$@6&~RN|48irb zS-eKMUG+NS?^YJgUe8-ISWyj)x(xx{2arD)ghWJwf`a35AfVvl=Ke<0&~0NWBP!|- z5Yjc{Gc$#wdtX6}0|X1u_4DY2kc|u=G|4Q6fZ#B0?ji#EeE@DhIvSlcg82WuIZM;c z<70HZ9d@c_5_?vOR;%d};GoXkpLKp~4p>v*%iv&TU2BIxc0k&=!DP_-BYk7TVR5ZTqNso3@D!2?8J5C{aw zV4t%BC4qIDY6z@$Uafw!GyRh2+*C0HV(;vn|EB67j#|#Xv9&e59l+p!8vR0cM3f#$ z=M5Z%su93wI{5hk^fCdB=TZ6c<}-5@IK`z6{T^N5TtI&ifMMLdEKl+WN#hns^QCH` zS+4mgX`!59;p7kC(XUp@60&Q*-2#6axMVM0@#!@?TmJdMinF$1p5=o}My5ogbJhuq z4vxYbmw(ceSnTZVhK7cUiFYXBwxObOQs40%K-zEw6Qub4<-W~IJISCF`r9smkcuP| z&P=;K-=?IUYH~lNNaryfOn?I51JQ+Uz#X0AmD=+JEc`z}>;c{#U|&YiZVS1|Nh0dIXOE^<+dX|g@Xqf*Q+Az;-A&Md={{&U8t%TpmQOI z+IbwXk3-3P-S=n8dojRdfvN3JqS-yXkI>c!buj&A8)b24sf9a7$=I0k8oI0mE`boB5nYoUvu=Duk#YZ zR8Un_1-8`8_OeJcsbCNm4=*oNCc9fC5_wBMVZi}fAntp}p0Y=$*8pOS1h(rCx^|#| zwzL-W7H2~r0uWxv?G&GtT8lPc4`F}F%4ni`a5CEdj{z3x_COVcR-N{Z~ zw4MG<;0yje&fdHgdlQZr@-Z}Cs7eux zX>fIQRZ+o=%OirotQ1jmNH9Mgt~@D#kA3o?DB&OZI+)`1q68w&W!U^0U8ArP~qnSZYD@3(m0o`Ieq z3NB!g%SJMZ{7!E6L>L&hxM9#m@L~$Fq>{NGhi_I0@Z9Tm%|}!yQz*1nzG31b#!1x}O z6^&`k8kw6gzShy+*&l}gYL}WUYt!u*t3&4l^X;aH1=1I^K=Fha!d4{h*A(wqSU`8B zhya++G}0}81XUd9&7WIaTS18JP(~9^L3ar*&Kt0NV<^Ca)&1(!hciM9BKipv8#_=8 zdK^Ph?Z6)l3I`TpR{|hysf7|`ebxrRg<;^n77Ub)Nq)yVzh_^H9I!3a=CY|5)#9VT z<8eMfn-vrqx^Azojw24$SCrCuV9M2Gv%k`b{aevYAREIH!4dltw6%r;`^5_Q#VqO= z68E49pWovpIMwSNH)Vl46dZD(QqaE#?lOnOFe-9#QNwI;a1pH$jzc@9Tn_%SN=X+! zDE#cLB>2x)t|N8 zd~|9`eNhDK#GlTj^DB%5gEB8Sc+x2Xy5d0|`6rzhJ6J@{o=9uWdXXlfOK1s|fNcX5 zvLv^65F2PgTJHDcO+mExt!n3_M~C9;Tc6P^;)u~YTckQ2pP>#}%xuK#3v}ofUIJVA z+skwGJcTSFePvhaFzhxUAmxaIGw;)(ev4}kHsqD$z`y`dccm=Bj(NjI4@zGFjdHTG zJhSo7d!Vrhbb6$(07m+|MzcgeSI!9=w?fY-Uwq$mNM5M zEc@^JTYepslasT%8;F0|bu2+Hfu+|}WCnu3+pk3Gr4|7FgcgZ9Xs7_V zqtWh^nK`A2r2wMyqze?-Yj|zy*}`LJ4rTa{h*>+gmztjbmBMiO-h5$wvsco*-C(Rt zp`m+;%@=DMEot)^rG@zFKbl~X9z*SFO>PJFEWOl_6xw-W?&f^Kbh=_)?0Z`fg389@pKYc-Y3h@q#TJFT{G8In9x>}%_VM& zTU(U?*2y9n1X-?PZcUGIBWQBW3IRIyE|dBy8zU}b+X}${H_Y|0u2BaWOInReJRCae z)s{c~XEI*lrmIWK=lYH^1)Cb8NYk1^oP9?weWd?M+vJX1X4*M( z1_moyf34uIkV4mtUtL2Zj-iwnX#ko=G0}VdEZM7Qr(uOY5`t0+E{V|G&Mw}U+Z9I2 zY-XK)$*&kxNn|DUNP@ZyN&mi|A+ll||P zLH_^!Wj>ogvxomcuW}jRS6A1gAtL_I8w1nV!2NiBd71csrm?Ycvx5)_JV+o4CwG|r z|NIGrDN3w9aB9@CJsw~W^%_-~+!gE-g0JJlA}*-IGBPj>4h=Ousgg_m{!m(S6lGXa zQd+{mP%1ZA`g+I;S+?}GTxrwbMUAYHO2nX*>`*CVg3FTwG(isPy@t^Y)&(&lI5fbq zPeDNeG%+!8@usJ^&amEW&{2c*Njy0% z&e6L0>2oslcsLdZEV(k|My+D?c|(}gv@|4HFv})fk%57sSHN5NQ|`aBy?9a7Nv2fV zOpE(J%{KM=3wrl6yjSH;hx1$MU($Ls3cUbJzKY_?=KLTrJ%!5#JF0HDy8Q@4)lj>b zDc6_x7#aE`wWH6?&4H0_o12@SxsNU)dE*!v?@z$e5RQ}y2Q{ably#>D7p1Nh?k1HR z&e!{X7Pq?ZE_`&_pJ6F8x$~e(b2XLxq9emJrd4k<$)tfD-N4N2QeNBIEOnc|e*~lw zv48h5pd~#vc6?$Y*L=lSE>q-Z%w>u&-Ite}Mv=P=?JGf#uE)^a zYv*k8qIw97h;aNast z*SaWn6{R|L1y(HuE-fW4y9}dcp}7E}SSPjWF~g#d%Z(kS7XwJsR5c?hE3&vHO2ZnH zWmD|sZ?0+9q6=i3W;c~~$2g;@%3^t!WQzd>H_PZbR6t!`yF{o)#m_@kut#<`I3!+? z?pB{*DLRR1Dva2QFPP}z^ZfAiB=dqanXQ+Xot%oLf>vEGc%Y$Ax*It_t_n?`?`Kd7 z2|a;)1O!M2Y-PJnEto(P14Y&wk@TF=X2EP~OiavPlZHxayTdP!s}Rq)l)F6az39aJ zW(VW`Tg_B=`AC$5w%jVD=`x`r0=tqu^)=Ut-t`N}U9bEvg(3>^+`QZi01|7% z=1w>2qm^y}U?wOiK|=>tfoX4qe9ji2QdXptbp*T~!!XE3_4aGspx>Jn7tHH}VMann z2k6KSALiYLa+j&k!Hd61?rB7;*ZBop<&EWWj$9R{aHcHeVL9@mAwnD)(fbK}b$6~$ z2z`5_HtMXetV%y!;?*;d@@q{_6I+X^>W9s$b6An&au|Qt&?FyZ;E}WrAyFqNQ!(#$ zs0;6C&R3kQn5ZwVWr(aVmc)+9F>pasV>ocGue5_?+UwPAwKkWiOfFWS_D^~Hz{9BV zN|dk^S!lLE@aMV9gI=9lG#+2jSuN{{ZaDwJO9{y(`*7HNp@8;{)49X5bEH0(4f==* z697Qpk)j+pX5utD}?JuG;Xm(F$}YfDpf|tZd4B ziF7Ou7#3RF6qsfDD|YMZd~RUCCa}uI7AKrsYd0n|E|YTaBP@N%#&J1|h{-_-M#_+? zqb^hu`ii(MRT4HE{wltG%u`p37Ajkee;yIqynA;mJ=Jr?NH)7#Zr7YT7UaEQa`E{x z3|2YcNK{J=NoZNPj1Rk<-g<04*m{}2tQv758+#Fbu9QP1okO$3?L%F+cD!L8iZGp; z4@Jz5gua`C3du9duW1!&=RS0Xs5N-4BL};LiD0Yb(A3n-0SWSwE-#I#Xh!vI4eMFM zvDP-}%L-cy6pRJ}Ap-)bF7@vM`DRl*UrQ;`_A+Ks4I_ORl;e?&%$Dbr6gW}A@zIQ= zl1ip&<(j@hCeJjp;5GeNF9Sw|-q1VD>WDqC0%%EBAcC>P21K0!C`BM@pP8R;uBeDg z2W5xvpd_(8Jj_f(Qwa2Dbr41V85odJRCIN7>i|-VBq#z+&M5<(L8=sloQ=)Rx!Bza zB4B&~sP2LCacHQtfkEcYE2l4C4nU(4_?B!=Hn_-ZH?G#PYBwT>?IB`|_WOtVu?R8P ziCPhb%`(=w+5UVTwHkKK5Cd18wmA)-UahvnIM1kzOsO2NqlTtpg@>s$mJ;C_)ic_( z;y*9nR4CC+{6Mg5|EYpcFs=O$GQVCdbWpzRF8UZ8**!#w22qr@8r*ZqbrEr)5XnqD;k&ZwDgDXjKI?YA;-_w%w#T?s7+?E@HHi6K zNqr+jbS+7{q2Q=N-CC|^^Q%nA)_k#R6XS@Ti^eE#aX&g5d#%g6y*K8GRb=N{d(i^f z-miZ-lU%ACU#nL-YWg|LkJm@BFVeHBvVL?JP5k9)o!oql`=8A~eWW7?1z=oED%mYH z*R9j)NWcSMh?}FMQ42ZJ_DIG((7o<2_e1x*fuIVs$ifj2DuWt#Ba|%t8aL({NCk?S z0&}yo*B~QGsIRRBZTo%zPXd)zb?w?XZRR;Z^n6NG0|EzNfWf$HeK;EeCy;)fm4>S; z*X>dv_30dErHy7=oi48?I{!%zk`PI?67Ra9;*2_{CHlR^Cykc(!l%7*g~}> z98UzP*U=@*%cVM=I@k$06-^}t*;lDElrrbR<%CadCHKMlEjkM`6`ZG&D1zDZ_68X` zCGE>4Dy4OAA_-^RFL~6avjt1k)>0?<$~D5UzWumk)G;E--EGsSPA6zKR3KscRQ^-y z9st5`WjnG`i(MP7>su^CNR(d&yKGPIn%;4m+KAWGIUQ(Z5o-mN)afS|&(OTFen(w` z9g+B6a`nsit?cAGozgAubj@&`D+qDklnuk-EsyEchp9~*7t1!+G$OuyvLlWaE`8~w1;KNsJu`Wpjs`Fl4UCjuuh}60Sj! zR?Ego=+v*v{wZ1&o0;6(!@6M*pIOC{Igqo`PQ!?P4gK~t@fi89PabW332TH z8Y?6vzAZRnhX3+qW*>7ftsMAd^*@$Rp$w?_xv19M)H2YiVMc$IA4WFEbfsJ37``&1=q8NmDDxFv{^}#7?YKe^;R@x{8Cy&CNft>OLYptXDZf1Hp3W( zkm@iddIC=@^<#cLqH6nJJj2_BSxR-Q6%NUiIJsJ<0}j}02>j8lSzL#V*Rd44Qpc~MXfZ^LS=1Xw@zL%6RVA^2hfzl*&Y-L47 zg+ML_0@bKU+&Tr7j1_qO7rlv+fvI&4z2@E;z zLO`lzK+<+fMwX` z2_|C>cmq%7s%&~t6jN;Z)vTl-;zjVi9MawZZVCE#jT*%gn#`{V8fr`ld=}^~%YO^Q zCgq9VTw_NuPX7s<-a)oOI9AI*oU*?XCWY+QiM#yO4cAeGvox45+v|`!R_f4?NM~|Z zzb#@MM+YO4zU|f4e@;c0kC92#Z;Xr7`7Trv5FCy&7UEhL;vV2ne4;6<06XR5R_tl3 z)#fJgMlIX>zWOQm?pI`q!*85vs)Vj{$s*2ag@^^_!+Dvll1n^JPOWJeg4CxLb+z)T z$uj&@tM64-$wd*!YrLr{(i&dx82hjzIF03Fkf%B1T=a6TbiQ3le7(bFzogwNfe36~ zzwCSZF7~UJkfzC)!U|`=e$=R~TKn+~UgPs@T`z#$KqEwE2R9wDlPc$3)t89#do{K% z$7S^N7J=ao#7|GaVFcz}I0Mrpuyp0@0I>x~0x{rM) z)+`_>c)$DJe1tePPYTHPvd>SCurFUaIytqFzf-BDYT25rD@o?2M;^ES9a-Df^Voom z`G-h%+Q+R#51S)VK_@rT-%G>X7^g4YN%pcEe)^n9{hT-f|42Rm%;r{;TLF-ci}4&_ z^IIpyZ&?|MBR?r`i?yDq{FO^n?3FJmBQHu z$dwm;mV?8FpKTkm`Q73N7CX(hddXW}0?dIb5f_X4kaHo2IMXoIjl|r>P%tK%F%45O zF%;_^gR8+(?!2Q6J$2_^mCEHF?q!Tm$ry1iG4nV|4?%4-a)j@fR!BWk54M6trmEke z$7Rz;g=r1cqw!x~yb|?;2t(uLI9^RhT=n8w#ZcGg7s`0i=tQ1h)ScAQl#1;(|CAyy z)5|F=Q1Cz*oVb|Fv0#|A{$Ul1uWy$mo==nlmd5Zef#Dbpc&tq{;zU(cdNuPCzEsCG1IJgY4o+NS#QYbf$Drx@jUx@M$aq(tUoU#)@X zR->)Hv|XsQ9(CGY(avIK%5V~6P-N!=qRYrH2E#UiIw{^Mb1f^v3dWVBg-}Z|Cmd#^ z5zTfyUH}xRn07p@lF2bkgx44osM-th(w(aOqVn|CEUL|O)%LQ7QT@Yu=MuxvC&?Fs zgta`YDP@gr{nC#YI@3=3I9*OkRN}Xp@Gf(OlX0*Hgg8gPQ1?KX2$9rDacvLWD(2it z_ngAiXgPcH?F{>C_Lt!=UM`}MeJuL7yP}Rrrx9ncn+d9>&PbA}YM6w_>YKXpJKmde z+4`h|OxkdkF?@GAtB`?;DFZu=ri9$YA)^>xQSs| zD%&7Gc)44*w>?vfm*lK1rwDjaI5 z!|WQNo}+4sLXmK^MT`~a_#~5Qp?b0NDV^b=G<89)62p0j-seNRBmM#f@U9p`AI}|9 z2jQ7R?=lxOqEtMYJ&YpnPN(+>W+D_nhL-$JD-q_@Qfg2YiYD|?cVZP?bCV=@g)H-C zPa*x8QWU80Gy?O?c{f?vwAg!eB5Cg{Amec{U#M|;5Ax_s)Y>u#v6=xX~zuUPp*ZaQ;o^7ALwTz|ZE-+?6 z?N1T`BKg2U-PPs43j5eUJY3KXsxZ)zydcVeW>g_49-z)3sdon4zRcRy65f5mNfJ_0 zLU%iP|Ms!T$g-g591{MSr6oaNS3WTXvO5rqaLDn2YncKIs9lr^1j4=o1wfLar>FmS zEC;M55ZC)gHRkYvG9QzattyRFJg$;V{mPT2$b3n5XWj^RXL+S^4YgbE*0bGVT&-X$ zrTtoyxTd|e#Jx~W22uFv8S=fRtJD}`n-*DPqC$hRhda&kX^SPSM5QFpLuF1*>k2Mw z8?osi7Q??KJVWMM7SRY0W^s;!%ZR;f>M&de)qtcMt4zJp`Q2h?=U%1rXj9MMnc79Z z-jPuK<3;e<2Aws%dK5Msj z4MjTn<}S0_iFMh8`?)@!^R{v}Q)x9J0QU+6Y(PQ@Y?;A&;YNuMxK9Ti&hCeGv%sLS z4lD`MYRKzQpcvGbwv!VY_5oOSgMu&$EjUua*z%XmEgc%Il*}F$#ao7q zwRFAMvH{i8N(@@e(PP)cyW<)R_=~Kvx4Z}NS_;v_3=8&kQh6EndXJ-hZ^HYXP`S+G(RUPngf_tU5QzTcFbyk?s z6MTn>>X+Zr)E5Lfnl$zTg;J$8OSqco$Kh3m43ou%J^e^^%f%dL(zU2vZg}mq199)| z4mAaUa?)jCg3pVSp-h`(xh+nr$(~Jr_^Elh#k}uh&eO&(~ z=CUS{?-k9`pNA9+wM?0b4pvUVF%TvQ4}QL(%l$0DT|}F}IFz$F_^4*Bfo}iuBMtOi zEt1fxh5K1<;j0n~f`3raoSD&7k?2$b)1^sB4mUR?5ygJSWo0Qv<6zp`+uZ~_f+TMT zrm&Y17m-sr0niX_QEp!Z0=0U1dHEt(lU%@LLV%y2C{WDNmP|~}_WXGH4f6oxahqZo zcBnSGVnU!*?0kpekWx>}Xxe+L$haBcCSH~{SIR1W0PPV&AOd4a~AQ_qJcgVGdGR{WDN zaGf_h4&9#v5a|U39|GDZD<0gJis`KQSJ{i{296@{vw9|y>@hpZJFReY^6#v_1(FWmY#TVZ@-PwIL%Z zL!yhVy;78g;$7OvErRo#gx}QM-xuvOOX+f7dup{#MC#Z*EWqOFEB{vZ+|Sp2&8Lbb zm)A0J)%9yHfJ{=oBj8%E)*-Bpna+1GtNm4L zT5FbYd(O+JUiqw?j86H@t77m`|N2`U^}H~P%HP{0U}`N^dt#n&<9!g^y^4(gUn}{R zznQx^GPTqrUc3A2{?A+ZbwmGi)W<8;A6HfUXzKy&Q+aqOI9v>Vv!0nn6}Zmg;>C+Q zckb+owHLq7d$(SF$Fr%Wx&MzhR&D&IFSBU6M)->v#&+i4lMns$v;1D26nJD;hxSYU z?ydjL<8K!yM;BiIFRcZh31I*E^QX-DK#`~CkJXuG_rSQ>;IV9e=C8j>PnoTRPJfwSyybt)qM5m+d$%m|0++5Gz;$m& zjvQ%dXjrjA!|z4b-Tf1OaJvDQ2Yr$h6FWAcxTt8=s=V&_tX04}L|310z4rBH$zSvM ztbdQS-{wEh{9nD!$Nut{=(}I-)3g8o*1p;?_j-)->(x_BrvY2WA15>Z)zH!D>F#ch z{`=?8pTB==>vsw;KarA=@zDT|eJ`8edfUO*H#E_6>&o=EH<)|*butWREi|09ZtBbD zv(qxed=|e1w5-~Z)NfPR7w02d0x!fzKPAv%|Jsz8=BWST$}{l+XvPHycCBQ%0R4H zJ#^yY#Xw+W0D()m0(2^GwLy_pZ4^v2A*K9P$b>)TqM%DcRCX~aXG=@}Z-6a-E$3Cv zjs~qJ1cBJbiM?xc8~*fw&UbfO#BH$2w$dm7YLIwBN_M)qj8Kp|#F|HW3;&ci)z;Lm z*3$ke3Dz%E&Y_%M@Gi#5smab6WQ5ZrzQiZ*9wq`0xPA9**?G|YK)~gJ@9(nsRY+7XwFDw{83O;lql{j#^zH&mDQoAi8q>dVOte zw3{iY+2SLOx7)T3cAy*na)^kuW*jb^jCKB)nA9nu_Flwftod&da-~Uwi82 zaQ?Kpqku)n)rpqjwny(XJjrK>noz;K!WnqhHE_wu?;pUOA;A6{aB$_neakCHaqV3p QvJ61r>FVdQ&MBb@09a#z8vp&2TeqDPCjZA=5j6#uua3o}N>x_Pe3DAG|Y8 zK_sUVy9b&t@YjB}KK@R4w_7+~cz;#6%l%dNAP+iM`{_6S>X9Y^Yd=XEY(&Q*iat2>w9*=-vCLH$rWtqa}CA!2*&U_3;*v?e4@` zeD;Ns&G1pxgyR`Dwl+JE(?62(1672hkJZV{tpr@iSk9sJ1W;{6JM9({0`8L^N%DjZ zd;OR@&5Q}%>_2UFtVrgW{LnAiNHP0Xz)Sf=YT9hRQHpRl6YE{)pj1H3QTLVPEnJ^f zv>Y@NZnebzkVi?=zq$s-`5UeQzCcz4XWPv9#>kr`W~q&6eXoU$zN%665u+pw0pY>`th zDz9NnD`wNCD^$2*TMjMe9yqn_Wu!UsYTGiU9Fm;Wlep3#`pd79jQzs4C_pUSD_N`nDy zgN=q<#@LN!#(0u`_Gc}WsC&DXPH}&te~@8c>*GfbXYRegry`&TAnKKTL|fI9!BJ8h`WoP^I=*J$g{Wgw z68dxMnHEM1w?^sOwjXwF#>9Wnv~)8mz*B5rd43U5C+V`6ndzTF;5l764hz!mobbDl zk$@;S{>Z4*d}7q;uh#*VjNL0>AGnSf3nx#LS2Wld+jOR{^Th*Q>7xSEa+9l(1LpaQ z=H2gWnu~CkRy2RujAm}Rx}>~11Z???!63jcbP@0cs~ zxSQiM8{P?D5y65dg;h2b)1zFjnpozkbGr(ifARIKc;!*OUFU!hdM~wbs)3(?A31YC2O14H~|q3%LnUwut0lN6+&ncLBfT7dg^TXVo8|9yKS%|PlE$|(I- zR)5MZhZ$nDCiris+31nilKOBeZf!C-;C_aZ7vM%>r3->l*Gt~PbdOmLc9sOEssJZ4 zt#)qpFF%t@!Ek6<-=XPA-Wqtig_0_4d+9@I4M9~{S(^sev|Q=3F>xD|rF9$kud+*w z3ud`Exm8g{-tQR+z1aQGZV28Wz!p|_To*-R2Sa)|KGMHaBNxr1@gb;dK2ZV+mX4$D zZtBoe4ib!d)1{m$F+x?m+}775gbrNm46-{YTT!7)C2A0-Cl+T=+HX4c(e}Ol&T4q> zPHaP~Q_H8z`DlPJ8wxX`yz1w5r*J`D%hM@be)UP@%BY`FeSYWQ6a~Ifys^0?99=<~ z!TGp7?$A`tDDaOJ73%UBctNV56pb2?PBI5w{c}#wkf5NgMd~6>GcKd+1^+JNR_J~; zN3bRj_}MsvT+~{`9jpncC|h5XUwRvvnZL^6X#cq^4okP#UpxQ6GbCqmnSatFYWk1> z1jik9J{65cg8CXcM_{fXk9CCj8HdsheB zzG?7%%H7VmI?DKM0fBN~ktN{>C4UL-%9ws1PE>qLS2b_n1D+%SqZG3Tz(wIXf9uYg zPj#sJ`zXO0_(&f4c9YkHl9}H1l)L-xg>Ft>M1hrW--B+}{}`~e0gz46e^+q233OGg zg6Q*-wm+u)0#B(oSh;;*?cJ%a0cCBg)s`Z!@;^=s-`78E&aOLJB$mo5v17VG^T|LL zN46*f)3s~Hl!G^70xoR@O)So~XQ$U%o|PQVj3kdI1Z>U1yOrl?+kT3b*4@MFn!YQp z1>I+H!A8og->4cxy8@6gy?(KkG}>Z}T2UNX2%wR&GmRQpq;ORdvL`$3S6dQt_glI( zn@!}#li!*S4(OoukDOOnlu&As?qORq51KWfF|Xft6lFl^st<#J&5bBMQSR<@X!#> z$`dYNu^mP9cIq(-hs$iIWY)c2vq*jWixFCdWqpCR6UgyF-)OApgZ^^br=Q9DDYpYr zdW@N7II5W+h-=VCHrPR2$3dRA1-2K*;1=6=@>|?G$8+Z4BZf3R!)TA2YLfKn?oNFO zzhTO`m2SxXss((V0Mrt8st&pXxU}zXv#y+@X2Yk4oa+h=4I`L0f9)4&5qCe;Re`G` z-YQ^2T1`jeO$kz>vEub`527+~|E3MCly~4kzv~~R06QP4@WoKS)e%bi#T47haMPo2 zszR5>%j6p?A|<$YzP%k^QeDH+-qrX|4KMI>@5_*9aF!|<{5nS+-KwlOW<%3Qs3hhg zh(b;d5bHlKxfWc>u(93q|L9zkr~d{ZK0Qb3f3f|1-x{YupXszTs}Y^I^>?4o_4Au6 zvkg%p`Q0~l0Y+$v&Of=c)+=N(=e4TQEwJ1IqqwN6Jy?9#CGz4#vbI^ugd=|ly+1?A zM*_~1(-@|OSh;`4uHPD(x3xMfKFUAX02|i#EXb|F81pxO3o;9`$-Ybt@5u3gJV-X5 z$wNG`Gg-tX?ym+v1Sd6H?HTQ7GB%Swr8e(zVdOx=Fb9qpxy13+&nGU!X-$N){IT;d zokjT3V*W&>8)9*X`X@t;IU`}qKH8Zr@N#nGy-a*$hnMJtKsi4I9@l~uu{2*f6OyB~ z_P6W#%E_^v`Q&XYbv@o7-fnl*v;~eSa}O$@stp|LmNIg&)>&l5G?CQHj!5ci_Ej-) zR?5%S-0tl11IX^xCkGkaTn#!A6&M3OZBr!2i9tTs-6ibF;DQr+6<4yP>6)^U8~Q`* zcUA(i4_r*F;h?^OLWNqiQO5krGe@%B00+6BTreTxT1{#^i0F zkIiL8J|fjYb2bx0L5Y?7Y-?Zx7K4P9vMJ5Tl8OyQ)QPJP5=`BrE$ulm@=rSZ;(g>M z7`cpBa;O-(Nz2O^xyY#Z`&G+b!TlgKfrCx7L?MhnBxfptj;{VPnO+>VI37-hl0J}b zyD$erhVXkPT(J<(SpU=gJ3^8NC*!Rx(9rrk}Mw4~wx(wVMsXXLZ@(n18 zDCcabn@W)C{9K2|PVcX4+f@jdj&_?(^9N;A*o;NZ*}E+x4-iMb__uRP9~ICf zUA6wS&tzZwy$gS$>cM<<>nAO=CL-~X)EqL;-pGyYm2DZ!orm(9aG7#ZFj{Xw%3>`} z?q)h(Zj}dajsTkQ4E>dWDKdovOG%1^mI(7vMW{lU3Xz`}U~SoF53HNk_QQ1HK6YY% zQnE9#1`bM@guc;YpRS%7UW(lH@&(3M$_tR}u{Jj@u~A5MlzouM5{~7gGKs9%>;v3= zG-6{`IJA^a53JZY?b7;Cct^^#4)P%|cEtWd{>_h9pgv_20=kZl49}@E2@b#UCvErFhye+n`IL@67+Ilz zI_E~GGDfuIwhvoxGbh1^y7(Sc)TkJRod>H-G#>3g4Yl zxv^O3T_l_Kn3bB=?ia?ocI`Wj)r8G4jqGi;>S6)Ni#_Wm#ZCF-uJqQLXD5BF`R@-> zA%KbMQc+xQo9!sP<&qRoo}hYC?N`XLu3y z$bGpHrkZJmD73Ps8Flal^VcPn8_XI7_w5oR$ca8$Z;XVhz>mS{JQcLJa|dwh8KJ`? zqM_#5@LjIiyl4Cz9kv0RpNiDb>~PV=4^YxX0L+RI@-!j8Y?f8JWSgF}F5g{2gNHOudAM_NcfOhP4-;FwUBbXhuclmG%<{_fi zxnMX+GuMUaLHgTJrNnXA8*BhJxC zvo~1kQJ^(L;i0@3bDi3KpIyQ`wh|(W3&}BMOzNO2=^fqdMi6>N;QbNha=g?YU#4g8 zgf``reom%?AVhw7vl3c0f4NB;9BB4Zp(xd$3C1Q7RIlUK zOQ!rChZu?EguY{jT{y)6>0{sFMv=}4+`dLhl@-$Oh$~uQ(cJnlx+S1#0@zXW(kihn zSHiB{tpEjd#|#Wv5-x6qF6BgR#;SR0ZgJMDs_>jF&4#>|mk_owT#07uL0sMaAfK76 zvAYw!(!7woT{}Ng0fsyPmQQWx1ZesFD3tf4`3>=k{wZA|3w_eAq_YELd#K4|Er4sg z?U>X48E$R*Uda1PduF7?0-srJQA!%jCLQRLmFJuf*-a*+W=>ic1oA<$c%DeL-*9bv zxf;vPiS(1gu1TQRo<#Q1(J4i}sJXr2C$Kf9HblCzN2)X^#w*D79VJ>fGvZNMd#^ZN z7JHP5mPSrDs4Ajwh-%?dlhv~Ib$0@D+veSU0@lf+mo6LWz>i^S< zW3r9^vSJeZA*R^M!g2)%1O6(#+}(CyR%uf-$KyIW zF4MLOty)Q1^}nj#+WKBQ^Q-v3dwbt6Y5l7GdbD^zHx8B4z(a&7;q>nnQXx@F3m36gcW@e$+ zb9ErB_OUVQlv?I&Nnsv^JHduV?D=uWSnk02ouX|fDME>;o^{inTFrXS~ zcG!WRk4NQoZz7_-u|Uv|-lJM>E^A9@pX-`=S6_-P8P356&=@h1g|-Q$i7C{;%a(bY zGlZsC&xo4XpGLmQ@eyzOiB^t(@)0-UQknrGSQ1bb;Bo%3*Y9dV2-8Ksu42MynIZnR z61hin_Uog9Y8QVe+E*oJ1^!p&eEuT@zx2kOd-fIRk<*GBHe~1fEXYF8Ca$-IeL#V% z)RkT%RVmyw;GwVAUQw&cFM^dLhQ(8%&dzUM5~9N{iVpOz&B!Ho6~}sdR7rFV+n{RJ zu2Za6hn19NvSr8LyzHXsG`WdxWw~n9N+))u#ldCLWj5EFBulmr$LEOPWEiW@a-N@qh=YwDriio;FGDI<>f6e&Sr0nYwvbRkWd)*|0#-W&rIz zpLtSa&s&)^Q(E9%1kl#4mDU@&5Zx=&MimEt{~3fwXlBUgu=zIXcaqcbs}5M&JpHaL z!>`=K`eyQDLaI&h48K8O>5p{KV^#|rXq2fFsx=x8G?Hzn8d&Nhd%IUXrxQ}WFvv%< z#yuo+!upRqeJnKY_8 zlsbTJodh`W+X>S5#1C%dvoU*!-)r=Wc=~anqZ;0n3fGzRlrg?xHJ=bks`yI%Urk+a zYtL6+ccDcV)o|Z*>t#W7R&xVVuHP5tZB(D;t~Rg5&Q5h)9u~U<3F1$hk};csc&1 zqL1ux^5WJ~!cNfQ_p&)LI##75Fk0aaH?g%w=r*bhs0 z*?snPL$&@%{rSwvlCzuj(@&P(%P);~|C|BmPjisom0sGsX=yT(^2Mogsojlja52>u zq(2U`@zIjKZTYEjN4mS>BXbV24d(!Xv}f;s$*NydOo zxRY%AazE$Lu;0Qsdi#b=eLx|@i8g}9wy0!CvO2AdrxEKf(c(Md3UPK6u=OfPj9@>O zx0?*7of%dNLs3z&LUDN0z)v1yb${NeM664R@At3id+sh>VQX(MWGL6|jn7^OzcFvA zk8|3z!ll&>{_wW^>4WkEAlkabLvpL5U9}(gS}z5-FP(EEWZH9krubYSkelh6g^)BSK5ioHVR}2c>63KGv{-v0jpL?mVwAb=_Ex24 zUO-fI8gup-+f?nCThF%rY3}y_vXO=;euQNW^@qK&3y z{9zvDqsIB$DK>CuIjjKYHv-|5|6@W6(K( z%Q^D%=V)GntK*DJiI2B#^l1C5rRg0iFsok=h5CPU5xOD740hRM=_e`G@U-|7oZk^f?|nav7f!N%qQA#kczc-vu86HmHTea5{nI>SWEkQpG!_R`UH&P0`N4@)8HNe}V%+ z0NIshbL12KWe4mXfUl1$4LXcy2-Z|q&VA5wYv11s?#21!5HpW*9)&tS1R^}xf8n+7 z*FjnMv#ro&8K1!@td&LZyOPmZUepSKkfVKK^GlA2JOduw42roK@Vfy_2Hgp(uM?Gx zdlwJ@KbK8$&kbH~BaMORRYhqr`@8#VxF@1L&XABc%is7X8f?N(%tLKnv&nB8DY8Dj z+f~=1WdAyx8Sk+U4f>?hzOm-kbTAS0W;%T0H)K@ahS&jR+qMgXR5#w#dQTTGwN>P& zQybYmCz}H;tm|YKNrp+X_JI!PTK3j6I+I&P7ZmJiZiVidp7C%fIPGHZrSUvnFmXGfP&E?rj)x912 zgN)W5qBn+|CSoR3S4F6K`$ae@+nr#>grP~!#F;$X`Ai&gXyb0a>_2ICnS%uN%avz} z^nGOS`#@XEZdn#jbS3eL9q;3Bh55Empzias2>0=VhKy^g_=aA+{*Tw%<~rqpZUZb zPLfMeTCvZC&A7H&g=mYjt)ZJ4uPU;(<%YDuoiqQqyYLw%!70;5uGqu3YYf>0+m36- zgl9fJ7-Q8r1+(e3cNaVV;|ailQ8!z&c2Y>49~==rmS80%!#eRlyp?A6vOI*c(th)g zud;#y#H(U6%YaRX-35&63Z-p)JblR>LFlFJcup^yq>Y!a|6K4{Sav;G*h+=}dBp!^ z1_Sa2?C(tY>>v30w4TXTK3n~wF7v`nenb58C*66vhlgF&P!qAR5g>%^9C;M?3z@ES zv#mY-#wXL(bNj<&q=h1fDDlL+b;Y4q} z_R`IlA6Y-IH&U(yYGpuu5^@Gv^R*N7Q$W>Fs{i&8~U?*gswapkkg7i*fXHjMWq6JGbptrZg z-5z@k`e?7~^^cvFo|-M3h@CZgv3NWyL#Fz{eV|>KvIHAapp>~cuK2Sfbq*4mI8OhQ z<rZ%M zVrT4AabXiHV8RVu!S~Z<^@TV+8CkQ$eGzm7UF(GanIK<C*yL&*UgWexSyww&JkQ5X zMQ!z4qF?n77(<>$T|Dt(5#{AI_`9%``SI15RT!_nMcrc=Nl-@|((?>=>IqILSh&1zU_vI?RdiCZ1*0}#KyIBefL zTzy8DohJT+%#$z6mR2ubniZg%8vMrg>&7Q{HXJ9GR*(}6xmy@ySGTK5-oCVJ_xDJ0 zPF}c)$>0YW?7HT39Pfa}muBvk&h9=ZHr$dyd-;boy_4$(qnf&wRkn$)faGljqHInu z7>7}ire!=XBvFqK$2waUa%g3QQ3bkO(hxG%V;(GbnYc6U9q$i}F1Yptnlr+Q91wpz zVB_k$BJOv1;_SQr1Qc}9w)TC5*rg5E?`=oPVxrdf-5dX*YbXT@CN6LGc`=Rd+7d6o;H7!2qVT%)=$+l6rsFeH7XyWDmE_$xTjLWqyzWJ#l!Ah^v6^e!mmlauHA>;ew|gtz zjzavOSIms$wKUJDHIEh|OfY*xj0V*g&dG~fbSpP!1jc9${=F$L4KQB&x2a=xZ!$ay zOp0dx-0&Q~^!j0U*GZcr$K#?_8Rd@yVM5iR0X*jydL;fChF$OAgFiXsg+;SR(0w&1CN`JL$Y@#Zc+MKZfy+1$eX!qXR4G-mc z4+tU%%;6@?;n;!>Rj+#b*Ee09YP!u~g|_2I7!mJu5>MK^-i$S}%9y%3C)fyU;P5cz za4cpsebsf|pF;O|h3x!5dU5khdLMJh{r8R297Q+0_$%Z)9s}P z0%zwEon5XK*7{13dk4Gtp%#c(?Z3>eO>#X7@|+YaT^3J7nvL!&BD3?ekIRnVa{UX1 zG+lx0C)jDHn0}F$K*yt+xPI&^&piqB-BIK`N>ZY zQt}Qep-d49$O{A3z$-W$w-2|>kV>A|zfMVf^a!GAF2}4(VL}L)%r9Y+2?BUnNPqkk zL$B=rKTz>J69&Z5I}ps1Ymg%>-{1bkB#%s)20k0VEI-D=b?P5r@^lqe@W<1T!%QUy zd5Gx+O#N;i%lC6CEFmff9Ke39sZjE2saQ?QqUUB$IE3MTm?eVq-`6dCg>lXF5v=`c z>zw2V!aQlad7hIEm#`i_(DZuo=psT?WsOoY%O@rjIKgi7KA6_j}OT=^Rh^RnX&!t zvi-3TKXb4bSIr3FqGm#Qjnd4r3E?i+%{Ia=bXEAZ;*wkYcE@q~Th2zcfjX2zjXMh! zZna}x76#M|$bWT+2|-C?gZ7Web2B|rH6p|Q;`+mA}=(BcDI9@^2LpaX);Avj^w_h_)IZ5g2b^h8iR=$=L_cIecQs3ffrxU%` z+(q}9#PdJH#{}WyaoG~AZa|{~_mR>22MkA*l4NE8zZ>G$>-eTESpLxG`yotH!^b@! z!J>SfNlX&IXpTKGu&G(C3W#uRVp>uGdYBK`v@((Fo8$7Xgt5V!;TxEmMM>lF*yAi` z0RQ$_J`^7SbyvR=?cr~BlXDc{5csMlF|@N*)@WDE*{hl=^HK4A?}LHgXmmDasp^NW zy;E83k3g0kCkzM4iF<}IHxVmFfj9B^t*m7vZuUII&bIkyBzEP26IJ)GXd>-SSJ>wI zV(TN?HfNov$Q02<&_o{S?-=2f=4hxa0p8;VyHej)uTPXi8zPR?16ju1|C^v zCdl`5Ndy?zxYEWg3K!e`y@leP_4-j_0#~{sXNc{w>^t(314O;u zy%`Po1lLbcJ6(K3p!s9E57q476qAN9O!7v)d5oK9OjGtrhFbH+Cu%m5btoJUzxiadC zYcVwFQ9gxjxQE!X`#(d{36rqyN3~Hj5&$74o=UzqH$wBRJCY1{*Ox}9!y_&ddNhp= zXGNF3g!2 zqI6Xe-0?^!k>};$O!nF_p%^!Db7MYNoGdUuqCJ2Q;%{Cwx~Mk2b`9`!$^+VUW65^bY16)YNc(V<#BQrmFxtsG6fA+F*3yoU*V=Dm0G)^2PW+^Ru-eXM=EVuwu} z$zFOApyis8>A>I!!sUXst~V>_RkrslDxokky|gA)-fU%|53A7t#$N9Wc+eg`MEvYV zQ#SWZnrN&uaaN7`-DDGch?&J_FPZ>|gExm(Y$;@3TB`BBj62+2t0UQPXN(B)w8h== z_BZRCp^mD)>>=kO^keo{V+0D>(D5=mRNBvHyUYJol z-Nqpo!sxLd+TLoWgv$dmE-`lqj>!_E5aah&cP@|*NZKIZ3S;9S_AQod0po;aXE1i5^gmbbG* sJm}81(@F6gwi_kaQ-hLv{nVg&) z@%FAT&Mj%%Qd9vQ-LSMx$`Zn*OM4X_S8C2}`k{N+=Z0motdDv5GWQ{mS@Ra9_CPSahfTt_rg|Q_KAO{?%`!^Q}xG{XZpBMOg$SU^b<7cQHmu;L1nO(?GGf&PuI6*A8lzhjJ>SY!Gpm7lhk5U3=dW`t~b#f zm>!t!fX#zgtaM%?n|#$HlL4Aj6Qy@^wgGmImx4&ryV*>KZI65J z%XGRie9h+j3s=o>y!;nOsfP$m#;(Wp;fEyMIy_N8Bg(e3&!O4v_Lso8_3#W)GHd9< zrm_)phvQ&?j|o6Bc|4uHMn-eu#-J9q6J--^qaz8llrhaSi!K9SNfP@Ha!}xBW?R%p zd}IB24Q|5~Tg;fx>eI|}mnC)48S;<aj`>+D}do*6u16mNl>Iq#2ZYf!i=L zCUfzZTZm$bdY6}Cm7(8Wu4v@6@jPK=qAd2dLwt}td?=vgA>|&0KpKW(fvqizH<*xw z7>8dv?N&>M3`M?!7{$_ApQ`V>*7k>PWO_=xm6wAW21{BISW6mW1f|UR7HGj@jmrh=NaON<}qgy}CDIa4x#liyX zX1e`IWm1`lh2Xq>O4X<6Z~W5j zJ=E(oJ}G%-+?X02Q;ORlHs9henY@*7N=&5y-{)B558{Opr*FlZw&2nBV@~bt!$7p| zL4=voA5*$H?e<5xc6$=u4~S+rVdoH?`4@68H3H|VCFVF2_#lE4>h5GA73oYh5hc&b z{dO%6RF-PLy5>V6X|q4)OCqYUs&Vu!2R1Kb`O`GAm8QU=J^8g6qf60@MwiiiK zVE8+W_K8WUsX5{dnypvqeo&IZu7X`!kFv4vZT5ZS*~(`hQ}ser^y)@N#zqm36#gY$ zmWsWqc@TbMdOGF8&Wcq4Ac%zxR3&-$B)TSt!_jb;XswGYfC~`i$YbB!*NiLMS8UOL z{yV0j-~Lwlqw!30H(Sp5(%GkY;`q@>vRphqe}NV1dMeXXfRn^Wb5}%Ps;*b`dLhF8 zGoRiD1JQxE;LopS@+1i%^<@+FkSuJyyJ|;Ji@L)QNk(c1l*UipY@DYW+vRzhCKHbdVD~(GAxRfnrrs!qm5K`LY>w}fPW_CZ|PqmP2 zU+?(PRHpkf>6*v3V@S@?5z`k7zD;rtqAwf2whF)(o47eJ7%VfcGHVsbBBjncuRlL{ z50Pc}U*nH?+C}SMWA$ey{T`VAV?}Q`{%q>D3ii=tL;X53n{7y4?DQ|XbC9nKUtop# zE7eP)PCkK`QszGV@wAEU=id8QtucNglhm}m=y%a|m1j<(kOMBs!g3I%p9J&}^UF5- zKlJW@t)d!)E|DBbNhwjOs4zRmH1e4Bw-F2&%|s@C?~ubICi_Y`j~jSP>g8KW8sWdE zD;AdZE>pHrV4{DD&n!f=*4k-?g7Hr3O@Xl7b^V6o-|Xfsn@G*kn#& zqu&&b>AVw@=$WLG&%SA~*%V3Z#*B6(fYSf7e^hHa_KEF42Fd0-=v{hY`);07i9@91 ze^{Uy21UR6cN1>5QZaCtVM*DHi#R}LY5tQ)=IqDxb`h_#&tcpsnNkcq<{l zJ8oqGhoO$H=a%Pk$4l*i)AeEW!y!Z5!qz*f0hD2VO7BVLD`iw{SKVbFO|OhYqIhD4 zOHT*KzA2^F?@Jdi%Tun;u#IaEpOjfxCS=Zr+-7x-eB{TRq4n80NWKA2=Ah+vcT%j3 z5H~05nX-c2w!A>faG~PztEoXf?`Bem8rfEk(=KB?MyXD9hU^sAG1xfEGgt)1U6l#a zv@ypNg)(0h=_UD&+c8xIxnHKh_Eo0*5P$vBCko|}HJ~@M-*0B$OdNN}*BtqAG2_Dc z^*LUx?R&4=+m-MgY`w|dG2x}Am{Mm#1wC9TtU_oTr|WyW=#$2zwXHcW#!!o)clVCP z%WBPM7LH6Vm}gEU>>{N^qcUbiuoxv$IR8gAO(8xa*GD;+SIe^S(J63_hbtd@3KO@z zlJ~STo=7V0B*r$d44g&~g4Q}BC#kIh@`i<0mZbA&;!RE_t-k*hzZAYCQql>@Lbc!1 zv9G&pPd)~^BY4XrqAW-?3IxO4by_cJE;%P3a^oF8pb_TC;e6lIW#m0KJ;TkPyj^gF z88s#s^$Ng|*nfB`qU;J|r<^bpF=j$;`_T$C0$y-3bdO(~D5t zqWQ#3Kict|lJU`#ziFO?Q;-6Ct7MwLR;m+Ft1Jw(-?tp;Jj&@fEX&T^K4*d52ck9X zB4a^rdRYd96tKV2SE0Ur8ICu5mDuAJ9|lDWu3L?sEX&|98+JrKFqnQ3R;0p>>kONr zo6m4K-jYQhcU(Ma;UX{sB~`87<7=^R0xVEV$66CnqIxnP6wsZY z|5~L2_Qhqh`ozn>Tvno(scVh)Wkd4FT6!bxV04wuJ;1zR`wUNcO`(*_=UU&wo^qcv z8u>@1I0k~E%*MYjRN(yPG9h;bv=HmZ9&&tG5H6Bk>`~$?3BXE+^`GdPy`I;5r9~)SOvcErkl=QqVqFUBb|VX&Gy?4jYN?D1l|>d z5==7G4Kg_kSDK#Pt5&#^PWNbGXjF|caF-F=^cqg&ra6Cv=*!uWd1=~4=NO15zIyX<=OMvH$g0hZ%{j2SYOA!W( zwo!ia`c@NkhneA(*yG$Iyd82GAEPwso&c)+2S-Y;+F&hXjE|k)K01l6l!RBXABoM2 zO_#;0%m^cqmi+}c7NZp-*;%gG!hrto$6*6#uvAf!4pU(F; zoPi-VubKCqR?+r#mcwyT5MurEeaAF__=iagMioy4rpVHBKrv%UhR~|EB9Y-wa~yWX zIW(^1S`nSBqfvK~3(w)~Hp9WQom+=f{Gj%Sk9h*N&{lww1p&w{-9q8To@;J-A|{0e zrFSd?)u*br0?&koPCK;$>RvsTGU2(a#w#X|hNJTmiV5XiC$b|*X2W_=$FrrgEvv5k zGtF8{*~uH=PHE;Maxg38EnJ4C>H)I9wkE9;?#8!7`k9D=fQHW1uXgz%$hjhkGC9`{(J7 zplZ6$7Ql6FW9^Q13lSnZTzv?s|kgO#l^i0j8T5J2fp z-+6hL_8&)EzV#Kj`tT(z#tv(GUv%rB*>%+BA~GchX)ZY*-7o7-*b^igO8l;2WOEVO zY^8SY$({sH5Zz_8)@At^%Tpb;kRcu@n+Y6>@s9*Kor>Z&gg$tajb*(%%Y*AE?>u|Y z^(;>49luMbh$33R(nzaI{uRhy#O;2>kBW8eKq^})nHAs&@l1L-@e6I+sId^EZopqNqd zNXKNK-!*9&zLc1loFE}3Z^6YgeoOCL!g~ajkdhSu7$Fq26zQnC8whe3e|rWXuAc=R zwo{}jIvl89^Uv@vGFg3i?2b8(z#dlPkQVY`Z8yL*iYXJmrNYU_xU~X%^}ZF2D5p>b zM0%`Hqzb2A(y(x1+Hz(ahof({MAzNma~~HH(IvGI1_lUK-#FhbEDjN(%XN`@Z|##j zTN-DK2UYWwL-7iinr97gqaNfytmOwPcE&Ui!w=NZBzbp*4Y)ewdxtn zV$k82-1)lfD9iT;O!$02uT+Gx&acOfy(MuZTo_+U>5^crxhzA?mwW84W7TB1Rylje zJO3Vf0vKJ7rfYDcJ5ra#eldwgRpFZ(0X zeKg_;IJD`;RJ9ya;Czk#80MikOKF6KA*IbT%DUFv!b#dAXT7$NjU-F>Uzv=aih&PE zH&?O~%TvvtI{&}G{eL-o@ZY0a|DSiY(aa=tiT2JpUrQprtxm8&IDR8eu7e$i=4lOc z2qB`p66Cy5G<07lj9|*8G^*dxd0lVMi3NRx2~k;CuI!&p#jBS}jO0G;sNtPy2)&^s zwDM|6BR(Yrl6+agL>z>zRWJqfuvGu?8%wj>1INbNd0nU#!2v(&)y+b^12=EGRJ4xb zBZv6F>Y4xzn;P}o`j6jSvf#Qv_RK9)%XF|1h_)J@@{Kb$$%>RKoZ2?_8gdY-_v0FV z_t(q{S;^Cb036ZMP5uOBVNyq?S1h|oAY1QPUBLFCwm*sbjCkSG_NBBQV@x9sLbjEdsV$-dIs{q2OQ~O;EjH@-i(t>mYJOTH z=pjXl1Wi$Nc;_KmAL7jM!HF;GsH;5M0~__xv#!j{hEnKw0^H^U6bV@ve%bQE;5U9Z zddXHwqRhG|&8$+=mzG0ImfAMRm-r8_Ze|ZPB#ZB#{Q7N%pLMR~C`CbU!BB}rOjpw! zJ;KS-g# z1m+Si{cq0E8-vfU@#kNJ5wp(x2a#)rRo5hL#|(Zq{+8`CTa>uUb#QFy*B%e^I8??> z4pLVgPN=?WE_5$?HeJ2`-WQd-$ece9wvCW?K27YT=kWR^t%M2>_~54#-{JF5;e1zs zmnYV_SiZ6f*3V>ry^JkFI34Uskk;@izdce(ZyzQQ;+h}mgY|TZ2fjsq^Am6E4Otj(V33nWHPv3j z=fdQllwDH$eV)IY?1l|+@X7$pHOir7g{>1y6E`hej&L|49;-&PHyHXo-p#kNfx7(7 zoH%u};2{eWb?WNB@2Yo|nv~Dg)m9AWogHr+G2zdg+w4r{q#`%50In98cQv*JwxO3H z>ZVR^InErY5jU8*QtR(mMY{cSdkf<*Jz#@#?iD7efrdIkFjT^8^bO&94*vXIocG&F$Bv_Arih z_))*dhBE2uj`efc$4eiqYH1(6k$cpkTn^dvIJjzIPjM{o>_C`=3;aQ^zChQfx;Upy zNzaX{pt8GJYTkEbChmCo+6MGO^z4Vfa!Q z;-@)bTzjKH3KT1}{187@P#S>p)D=clf=kH0rd!#QC`C@;IRsLT zuRaZlQNhs8Z4J<(GiO6%FzwNs&duOvq;NqCIKZfQUR6fD+5+|YA%q+~`1R{|Sy1>R>UM6nhnq{C*e3kdjrn*KK70It??YL z2*II}PE=ByqQs68Gz!m}WF>dAI%8g%8yZn$No#TCKNtUUpe=;G&u<|%)t_~h1 z_}Djxi~hEf>GE4OLc^0ct1xkqt*>VSQ39+3AvMcUgl+KTRK7T_sy=ZbB45~uo6g&z z%(DVq{b_VtG`}->nPnhjT91~mKQqXYuSC-fvdDwzQG|=K$YjBodPVVRVy=6^65&G; zOSC7L>jIJh1c%>wxX?2>%D)aK?Dqlx6C2h6v+L6dR5uM$=>W1-98}y+{J>P&6mruU z3Z02s7&QD+Zt7%he!q%urf|jB35JCkC+LljL=4xmjyJiycLxp~Ci|ce?=v5$)}OB# zJycI*Plh@}ZRex5i!;LuK=X0fnsAH`%VstvTCJNiMZDaaYIc8iPcmWsH3u}i|A>>{ z6T{*8?~BW=mUcX3Y43H$6(+})tU1p<3{9HPJjHRV^oGPxxVCFlC(I`jK8p*W*ztmkmtD(CGYfb2+Q5+~888LmUbgcU-(&{7v~0A1 z*D0qLpat2tvUbdPl=o^qDY&i^{&>|HbUU6kM5`#b$mISo^OuIVW9f?{Do*2mk*N1lfrq7?uq zL_)P08FaAN)+{)=^%HylsVf9-u;fdjlYk-(N;ME4ZUfraU89Yb6G`;v8 zQKw{f$u6;a^OsV&Ge#cliacx24SFc*E?T09%_;ZF!!Jt)an?5}@^57j7ZwbpYns+C zjq&CTP>Rw4xVp8h2Jg(1qQxV$++i7wXO*W$Ucw48Q(QgsQ(plTino7&2<&&ev`uXr zt$w?}@9X=e&xiYm8L7l=sSJ~+je_%HDPn=279`s^grat68HAX8#`bBX@9^dTZ7d?t zG5TQG-N_icwe)d?j}Epno9%vg{1VelMfY%G+^&-C2|DkOjSg&3-e;oPDV2njs5}wx z_$nQFOpp33JGG@jG|%tu(IcF<{#kdVIE-q4bxhg1-)_q#wnQ3obVW@{`xBBxTxh|< zwJ0!|Pj-Y&_GcEC^miM+!;ID*prs65hjH7R{IXNkZKQ&4_1V2Nu7SBg~O;XQZ@|T+nG|XiI9e zR?s_K{aGq!Wa!^*&q5my=|KDctjU$?yup|hrs#IH1ADfzxh|@hT<}g+p<4|B9zxUN zj(+2{JbXuoa5^;p+Wz<*j?j%wTe+nJq}pKrCv=uWDBkN@vo|ZR{*Ngt+GuADrD)o4 zT@|fuTCEL!6XOF>SPRK%q1BruBw1^EJwD)!*xCOEEi2!6}{ zYpLF-5rXQ1wzT4G7l(imuF`ZRTZT>}hYgkx+!EDzvKxermOy zMV&WHt0+o{UMTnd3YKr8?Us;>^|c_VS^9g!J~9qb)9cBkPY z#F4p&=loqe2`|u(Ieyy8DSe)V4vpdke}^P+JIBkdJr>FM+9F@lpU^?WR!jRfpgi*K zh*f4_UrfoEWwxyeF{3N)9<9$YAF+w&ZeQwD+fTOf*ehHhU;$4PmvM#hpWYX_*tEKg z!I^blcf;g*W&MD8|mRHvGl(}Rx z#k|nFZJRqSllgPF=PQ);d%i12!Qg8u(nTU z#aUsMEZ8xpv~;JZb0M{D4vu>jj62`>x=F+}ZHBUsr8@G%fcZ;MO3*B>mCg%9Cz0#! zy(51hsx0gD?~_{V^L9xSya|;r>1*Lr6 zzhgkUnF=3#e{{miA`r)cJ=M{($-I8ZsrU^yHN@7LB7ZWPbf=|QXEaIf%=NT{Ml^dq zCBW=D+ysX*8J|3!eVHaU(CW0-_li%{N%bE5McRa=G<3y!4P(PC_b0IgP}s1iEVJ;- z!RlQy+M7&I9bQ(9m~b<7Dx|y_R%FYPK{okJHp&(3Ga+Nzn|p?c5>-t;h;ocjvG>!~ zVM~m!RN(H0CV)%sG{2#}<~?LP{vO|L%gB!aKjLlzi&B*%VUK;>Rx>gkDeAA&@jM!Q z0(T~R3u|E2?`5TC?gA5V=k1pHHgjPkOsY5Iy@&Osi0Mvo&ijs?Wd*cV%2RIFS4+iW z?|g~jtz`VM!y^=U$Nyah@_(ol1Cydz?yBzms3s&jAFO$oJzIy)@EmN`t@Uo&uYt@t zk32V-wqzvzcsXWf3LW5JwTY!)dGs5Gv$WfuOb%JchqkA5)EDn>hOf;tn}-~E&NlU& zfpjWxci(qpf@LIl^{$_xN-&=6MfrM}rJCb+TKhcZM@-cW#{sFwM%(sdsJFTwtu6cL z5!hLI85qCtI8=M-hQEyM60*)aZ^fqAy)%PK*rWoahzB_B-w>obQ!&(eZXKSvdnxtG?{;XEXqojIp;>OlaKjW zpvNW2jRAi|S{uCmP6_k?vellf39utLeC$L|>!TlVm9NZRcaYl4@btH%mVcrh(0Y0;xb{(ReoSzWK=B z!BYF+fyt%blD3sbulc`@*gcy9b<2M4c}Zf0YfRYY{2RAH%AkB zG%WC%$+a-Y(V(~f^sQ65m#_r%#ng6VjM@9WAy)sHhP7=(95aNFec}l0FQg<)hFIEo zg)J1l_U$_ApdYeTX1UU$Z_*Hi(G0#TJWi1GlqQHoFM)n79~UEh`umJ*xwKb|Sn4#@ zc;i9V$YuCmzV(ha^;eaxW-?o5XJlI1)rFzCEIuTwRnWE4JY8l_e#g~!k}pduJzjo$ zL*Gg4Ir5;R{_at|^`ZuEBOdOVvryJbIi{G-l9%RnVWqdCgICp8#~j>3A7!v3;_Oqk z6sD;h?;-v?&hI*+F?>t9rtWARz@_b(sPm|W0^RP4AR;~V0BL`N5YMaxDWIlFL7yCK z6G9iffD@Cd3Cr`R_Z?6kvj6flYwf zYcjs{&GPR%K)AuR%BAj}Gc8L12Wjn*u=zH(386_oMfYQoV*MCNQGQqCm2n$#*-OSMbd$`mWZqdf z0YR3FGvsi4X&Qtu=VLLF{Zjs7e}B86f|RV#8;vZob>FP^!$%tt*uY z6M$EwwrR*qv4Woz-38F5p^9-UiDtNMD_sTnC9XjBPVEW=w#P`Ngg$Z>t_)~rK7zfN z&W=smFei$*-}Ag`Zk)g>FkrsL286Wc&zpR{!L4IFSS+klIr-dBneNdA&-jsdb4p}j zj(bk36E=^;H%_i?G)wGkgA*<#^EoYi>hwFIAI5@gXTMysY@+(uK31|xwt6E%m4~BX zAGJAZZGt-==USlqXzTR&iOT(?ei;{U(*wE#HK^F0G^#`+~j ze;5JasrX|^fZa6Dx_0@gw;BsJ9ZsV6^me4dqa^WnZt7>a2SvJ-3w4noEz|u?{9e9f z*V2$($%4`AJkSNgs}oBbrLOdS&Ia7l?+PLi6EmO<_ddkCc6z+xlY``WINoiyn}|wWf-%eEB$k$#ljOuI z8A&s%9ceQ*Ti?P5h)ZYewbmxB%%S0`B|<5XUfBdkT&@RYb9@!ggFSKKgEFhHlQb;Z zL+R#m@77J-3mGZy5Zd%5ERq&QLTIl*LAcGeAGBS8PUh;FECNk4P=DTMsaiQvH*{|5 z=n?Fh@y3~1*ZplWy-6@WW}2KRmKYpUlH7V&D+IpgdCPUF?eZobm(UwLdz)~tBFW@X z4ce+ZT9C&zl<#1m<*y?!sah#m2_tq()OIVce&s+IiR&qHE4W%sq@^re`u*o{>T?Y? zAGrQu>hfZ+m=dbpTI5*B-dCH(x_#rpWdgLa6<)T#jb!L96bMG~$GD$g)olY4)LvI>q{ft1UZ~md{PlNN6eud zf?KxUMgx}q`pbh#j};pKrMvVb(&3yuCXt2iWW?!-q^@1)%ssy7K%YatG=p24HCN@8 zWyl|4!eK-N4EVK1;`?%!9)d4vTT|JPIgm*`Z7Ok@C|J9HBIUnF4tZ~cwM*!14ATS7vw zpK`ZH)33aa%FJ&qi$oT_a>YNA9S1I{_1Fq1(8=PdmYQ6h zt{(g*J!_On*8dj8gD7GY?C|GdgqTN8DO4t*nAWtpIfO@_vNC;V`ga)O-CSBMtul`= zp91f9gDotgv8iGK)PSTxSk>eMA_B>*Y!sO7JEn&m*e|$pOALm&7EY49ZHI3xTrjdF zV?6>dFY<&5^!Hq}UP| zn7M8*_xdh=cPv&dvzJ|~Aw$MK1h`M#m^IekzQ#Eh;@aF#0I3%8Sy)+5cBt6v=+De!f1gulSonnhV#kC$5jOv} zduKo1v}Zx?Jsqw{xmOL>-vtWS4pk$sVdm~g`{On_}I zdu3|J01X{x4hKVy%?z4*-zqPs%ah zYNeS@pqBxe^e5vx;Oi_R)n3~yWp3WE^opHR=d`wOD4VwKk;-r0%CjCnb^g_WP;z6Q z5By7*nV!{^FP8EPgR!UDUC)tE^=!2FaWf#9q{s%3&?zHl?m6#X@%TXGdIxE>B*CbA z1J)dcDt_Sax)R5C{3@PY;N09f`v{+`f!X>o`&DH|Adc75bv|Ngk;RUyav;-@Z=`%SNUh(?21$TTw;sIj|z`Pk_Wj#kU3 zKIz&h?fnzq0Y2v0bV^IDL5B6irsKWeO1`e&oNE<|9?2Cb!LDwbxtr0CKP}TE5eGke zE$N-^8?EpBY%~7;YuBhj^``8elK4S}rT*-Y{>_QPr9EAIgW4X_)_*fEbl6^nOMEs+YaGQh3(p8w zD%Q5`rIx=3l}np^l}yJD<)S;wJ_en4Ef{^eUcP^RT|-=*OC#gLD*KrX8DVWnXp}E zgoZtHm}96+nM2h)_@1>;Rq1Ktd&~o0iLaH<)Tm|hy&d$Q1z4?4jvJR zF#$=vG1Zf=e4nJ+Swr^mgh6!!x*{=OLWCEbaa5}o6t^{X#Mvm$9cTRQn73hd(@YNe z%qA!)2V?|A6E5OH^=d$kr(!x7FoRWuH|pTYzBk@I8>LK?juE}|CwB8JMRiJ$P|U_= zvkS`Cw^)g_w{AYmAv$?=2^LPd9OmYq!nZK=GM8D%acnze?bNOY3zB&@zV>gI0M|(T z`2m^5P_&M4y`7nq73zIWOgY)Y9H9=YpoI)SdIJi5OD=l5<_hPKUa1Wl-rM&}DP8U3 zUwR_fGAlw?uG+_P`J>fe0(lV$>91Cw*_@(l%*Oh}8yvGz*;&;vKD((>bHre7-PgCH z`qT$T1|+ZiEL;RT|N4_<*~Tr!Ar2hIIiP>q&zXzAex zxrcIT51FPTA0YDd`x}uP^5Hz8X@TDjwqir}s!C6-bw;Ht=agCFC5wfu;~FkX6QQI` zKqPLpw1=zcVbtubIbmB-A*j!Do3E4g9_5|z+i-yWL|O3oKT1(E$&=RYd76Xyqtc9r@Z->;cshR)8$4Qfno z1ivmqSh#Dp%qynioyc+8Jc;R!2|O7E_RTd;@k-bkF$g03lPA}R{OkSRL68PFq@jE# z91I;4Vi+P?0|$EWGqpJt4ZhFp!=ox9ZQ6Sdcj#Zf0Gzm4u(bC6N!=QxsG3+ZU`=3+*lP>D5VW|*(F z8q`Lcu^NMP#z&_e%4^YJL> zx{G(~K~g;6C0x+G;rr816)vW%mI#U9m{e24i}k;Q(=rj^>Tw43a&vJyU}Fh7CRq<_9MP)}lrYlR4TqOj*H+o#>n32d2TCO`O8HY+3BU-1fRk5O-~l z+uD!LytbbW1g1Bi=3_G|4?*louIpAQH`i8d8jT4n_qfok2-laQzxwVRMjJZa3`C7b zZMyn0DXo`&zO?+2wKr9^{}KMRj0mr9kkr^;&^cqi@==FMu;6Co7r(;-1pPkUG2T|f zqR!9hAM~|2-+811v!8wnE4)q%`f!SJdQd{`aF-q&E`ZNQsDmUYRmM@Fm8 z2hN9(BQ_{r_m&EZpjWtzlp&*b%8*p);@}6ujdzEtWnpaa4>VLMWmiU_s@7~sJ<2*R z4|EP>6`eiwNHaBjx%q?gp1jUeM0~O*Gc_~YT;8oQ_So%<)(9R~>$sMI0klM}=LXkx zir8YfC>xjRikTXfw7r= z-BrD*c(Z+=B!g7-23DgMs4~(u`!u%rPWUWlKupJUU$zU(9Y16KNMdNO-gH;6ySc=_ zxQh=m;O{uzM_~m*P5?8*oi&$D6_H%{_~Z4C=d{mAkFDHfi=YsW7j=Y8pAafWp}dzl zyXl=&t;1n4x9Be_7RJT6!;cNYKA0>lNRzlW#VXodG zObgPv5Nxz=KS-lipetZDl~5uLR-`qp_>dbVeGAsc*=|ahU5Jl1RH;~IH%s5MliV^* z3w>&jaHBfB+_-U776JBY^h9aEn`^7i4OGHRr5idrgO%?*vUuc&)P~fssiJkNqBp>w z64b%5j?QQJoz!{xia~@^=rA@Pw|>HE2;)N0?oAhHil&A6RA3r?D?m~NOm%$ju||{V zwLSmxJuMu$c~#&1TS3p$&gM)boq*Mco$C*TzsQ3QUUHb9?0Q{(!^o8`+;hUJVajXi zb&tN!YW4mFOkP1yA1I&Mi{q=nSYt~M`VqYG=GV%X5kbu)b^Sr9_p>J{PkbpIZW$+% zKa`03#=OIyvq40bcPS4$mMZdM1u&R=OE;0?ekrp>OyEXWajR%spdOy8i<~N&U(t=CKY7VF8dE^;eNrW)GgJ%F_Wknr<6jX1QZ@T6<(HN{!tjdP zwL?YAKk6cRX;>YgVTsjuC&bnjkk@?l(Q`T9^-Vwxf-)0I*8#Q51s33seEd&o9})da z?H_oR<>JD(t{efr!|eYMIX_H1)0M9lj0Bh7Bp0l74$!mC+|4UkqwPxtQokx*D*%{p zht`b0kei%cbsP7>wq55K+hC&unynSz#*pxqjS*W4ZaR2_Z8|g9$s};%wXbjhqhYH)R!y zkEP(YF6hC7{*--i4S4VT=-*zS!IffT1oys;uEN3KkoB7CBDDjPV)GyY1ZAC+y5qaO zD))B7|Cx^hEo>}sQi=OUxXDEyjT}14JPC~Q092--)VpjCS~JSx3yg@7fQ{lt)tE6@ zVDqNQ?-`|7ZqJ2ANUNv=a2-l_fP?s>wVL&-2U+S7O_I)L zfNwgnTjXYzTzk;_ro|&#WUKF)fVtd{Z|@5WyzK#>h>0Qh2(GkvL|qU_dZV_un+_m@4b3b} z-;P__CArz2k*>KSJ(swT5Hzo^2o{;`H17ba!i>hyz#U*T*F>e z=6+|2Wb|d-P?iPhY+lw3XXALZkz1U7tZ=ct3*@5*j#&*&-JcyQKk3iY>OhI+8MOIg zW}yHH)=EF^L~V;f6gdOb!=PTp)eeabZh&ffm5{ov!j-6XMGxdyw#r$&A4O?x9xOTO z4=$f1Rp<>5jm{|Q1?az)VXqk7E2vsfHY0uI7w#Nq6P_}w<^G}#dlB@0fu2&6w3ZQzR|SfTB>wS}TF#Q=NA|=gO|!v&f}|HuF~REXX>wCH;l!ZE~XeMYl}bIU>ldFhUZk zSkk>f`Aj`Cpp4_L6f4$JH`KM(`q)U1Hz1Hc6UJw2rEBZ=JoNnxjYrj^z)vf#FD875 zG1wDOfQPP*Y`WW=XP?5?dz0G0lD@7meZKle5$mswK46yWhLg-xwbug8PxcftT2X%0 z>{|N%B}@6sS!HutG`)s|pEeB6BRpqf)h07u>FM6^ibdb5O+u)VV}ZFxR;rQn$vg1p?CsHg1GA zz$$KWplg$FOgquIW)m>ZjbU;b0BU>z1eAoJd-bsc5-8E^I=GY8Ah9o7YGmv;G^KUr zS1~U7$KBiq!Xc9_(qgfE_3sffu!ehY^e(MS zla)~N$8B@K{bM;hvx; zu?g%O-#?RK6P78GOluiL%Z`S^(QnoBr9PxEYF*$Do!k)Fo~Kid8#kWGCG?Y`Uhtp; zRn0iKUHKBU9kWzE2hzP6ZcoO2zA5xzZOCzfG3q{)Cvo;~a+f}GNu@69Cq|k~RU>i? zRFn_8oVRTS_YdZzRNe5w7kFw?ZhTE8=?Oy=mEYHB`=08P+_ZgYjK%_!fkSAgHwSpK zq5N_-es*>yF7+mc>hs{6Qy>w$BOz7RaW+Y|eSx2{3~Y^2>y_SBNad%4)gIa|VlpWk zL!jw$vU9yKoVra0>si?C7Ymg%eHb7So{4VhCx7<6_#-$nT z)N%+-A*RZ7b#=lu7SP%fu&+_&wiLc~zF=qEph8 z!(Bq<8~(078RfdU8^Yk_d%8nsHy5Q#ndTf6Vc6QeC8gZ8+Fa}Obz5cZ?@*meECTi! zlCq;OgF$8(j@3k_&1;e;q0p7tmzceB-~Jt`ne=t<7sdME+X8%P>KcI-R5SCBG{$z0 zbDErk&)mGoIqsI;lSl@r{WHJ)HSrCtDM4&0d)Oc>G@>c3qVObmNi2{osll^tLzVqt z%ix5O2wpO^lm}}64Sx5R-Im`iHpJ#QZxLzxyJfY-pBpsQ)&f6iizAV9KRau(|6^6IvGkvy3T4J9?djPRms&i-%XW!svB6L9iC5P`(~;fZzqwW*R8`Maw(c_7eV1wClRxe5=smn5 z1fyw?%?8A9z&W)rx(Ma@7DJ)my(aY(m^BD6xA~4bmFu=z#^}^W&z+^nH+l^PHJ)sa zb>m_sZt_uti!964<{N5ILK8#&^j5i(^#xK(*Sf8mHfW$LOIC!X`T=54c^Ur7W*k>j zDI#hnM8Xu7%u`K@dgZ}2b{zV%Ia@<3mJQLxjBg~Bt!EY(o?6p{=)C*Nd_qJ@1XgNv zpNWGxV^?tb=F*C;_MTi(-K)m|GI*X8;57AwxJsfQ8OJ9r0qbLWAANaGiHgmqYx0gS%9@%hCyTwRo2V4Ut+iCCrur2Tax7DsfRfXM=4{^2Ol z&I8lWBQBa`QI2+j7@Gvkg`8$HE(!SPB5Aa<{5@i19dm7mEb00NdBfS{jcTZM$vbM> zD_bg`s7{Lb(@__hF;6)*GYej22!PwiEbR6VR0f!S)`KZ&6=2^RZGAs!k~-zwQI+bG z(#U|hma1>Po~>())*@{0s1fOW-;+Fx$JI>p*Bt|`2mw|_JL(kCxv=CNW0ET|#@rlj zyZi9$AfZHkcr!bbed{vV_`reojtPf_YNCG}h5k$ZRsq}}_nmwxxb9}*i#YC~o5KiIR2wVQl<22cU`;y94Hg8#zo z)H4sjv{Wrjv&_kiWQ|IpC*;^g%}n8IMPJW|&>e}Or(?0CYrj-D-v(nbKC)gjG!}Ji zE>WJBNhusSE8&>1cG>!psh;%CkHzK361 zAt7NY6O03%kmZ#y%cY?MZ1;W^rAHv0oCIlOf^3sc{ z{};t+)m+_My}b5z3M$NT+CcBC0&JR1eYZ{KzcQJ4u6@E)vrxaLN=zQMQ!r;UI$s-fN!VNlK8V?%M0Dw!HpuM#{EEHc z?@51r>E>`;Zy6-bxVlHzJqBNqr_wc;gRHM;a9wgfWwaB0xXvE0fCS~$xY<3pFi&+U ze3N;+#f~p#{GPTc-4{K8*#NkC(t<2$ODTnxMK>a|f%=qG!5$~OmUF z*#2hI@YB=F021TOERtc1e7T;mK4Rz-7motmpWr$68DX8YJ7EcFvXsY&!}8|K?_;uY$QBu~)XN}(EOBkE z^YO8r*Q*Iq9hZ>9mQqOrX71&K$>c(WQMBa2@FVHUmZ<@LeT!PY-N2bO3T~#kSsGAS zt#>8@Ax@#|O8e$$w$|{Z)8GvTyRvsU7$f%4o0O<;pFY9ao&$~sho72swinY%J1dwd zp~{wJhntDiclyYn!fnB6t}L=*6ZQTpu8gl>tAb8{NJP|KqmF$c;bzH*eb+nT!6Es+n;^n zdhet77#|-{m-?G4=cMyk?#;a#wMIiLzbr{F&zI9`w5Jvd5*)K0iw)Cdj}$5X{w-C~aW0{Qe@9E|~>yw&e-z6%*vl5|dlX9TDkxJ`YGdL^%POXke# zo2%oNE|D%7uQLTGy~F`m25lHLCQp-d+0|^icK4g7xkV=1y0Y`47@7-7Q)9Cw7`%c@ zLG8_2r@Yf3s%-9Cx-c*Rh++dDr{QVy7t>6|H1-0bPDLe{+wX}lp)RFO)LKxT|I!=( z>TPT_wX@NYIAE}HW6_e)P7^FnyuK9GAvwticBC24L1!@nxrc<=n00H>Bvd^bmGhpE zv{5h)!>l(;IY;JitN4W7W^E2J zlRq$yXzH&Rz`HxwUrgG-ZfaEU3Ha<;3KiVsHRVw=v*?>h72n@`Irsj9;)P4qX8|UG zE)xMz4SH?m6&9gm8=|#Hg_G_l^BKd@aSvsM?5!z0bqZ){!cn zQb#U}k5GPL7xh!5d-M|UYp`q&iHn$+NW*5k&kA9V2V6FW5nV$iCHHgOCBsJi=IYJr z!ED&vsO$2}HA^o{j)aX|0cu}es8N(7P!M~bg_&f-elxrHn2)j#_iBo%WA0)vwUQ(W zimEf-{|;t~GE77qaACiwNzLE^vVVZh&jnE;)iXjNTqWIF0#?O4mUtg23eP!^dswmn zI^F_4UCso2Laii>sDE_2hzs}zQ9PivOpgo6jAs03orhY~DZlR`+QoNk_`59@G4ja~ z=(})N%*FxFtxW2$?Yr;kSNl_%*Y?#XO{TK z`vst9=y&(($l+=C>xQZTs%JlPo1Y#RB>*P+Thc=_Kxn-? zv@7T(06*CN6-~Dz8IRZ<9Ta%JWB2fX(u(QO?-DM31jY#1n3CW(8A-ioe^m;lT>-Wy z;M<9n`BVCI89ibt4S1iz-2dD&BNcyrartui>ciMZ_={zk*p&JiS_fOE~ID(}EEVn3!?B_#A*Z+(K7}u|R@c%Io7MD?_;LEeh z2Z3@2KP3DwlOzH?Xq2@b3UfaiGhKdSmPlE-?TL7-6_A4HLSG5GUA&BlsVJ!zR}9o8 z4jI}V*PU?A1KL08Rs(!@)>F4d$|#j!VK{1Mhw?a$>4f-++7D^FhUWHw!`goaE|=M) z7;54AgrGmj7bbDfoE;nM$Y^J<@@yJxz?izMJ5G?=cVz57TO6vZC7x4p6MN8fuSaTp z%a_uXvdil}ij=jNpA27X=BW*>%Dh^o)&j(Q|4eMcL{lN&r!HzSc=UYN+a^heERTEI zcdbOrH_A64D-9Y{cd<*MI`c|}JJ#>u&QxXrRJ{w^3fDMFzmKvv@jo}i9Q8yv1NG8> z-@&d`c|``pFCHha#iRLk@qR((Jr=l@YW3{Mx^l7`iP`1 z3Fw5vlZvdXPSr#F)x#Gr*o(Ntbn#0h z+Xj`GLlm@NnzK;WYTfMOh54au6czP>S_W)k2CvSK7jK$7kt)9rw=$At^B+@eI50vA$1o z5>_&0ZaB{S2JrEYkn`~A;X8>4iJc20DHRh)x$z&tGYlV_b&U}As_+X|BYGU?b-9NX z$&{W)Rkx+(49(-ck~~kXMN_+1f~_(2wTgiv;;(H1U+>7c2&|!bot6bqFl^R;1utF2 z+jm(H2tju7__LcDT!uWPysrs+PMGVF(0PeaCL4^zP2PnAf$euU2+p4a1E=j442Jw~ zKeiX=7lpF_*Cs;ogw0D=wFnQ&xD!bV@)qaZk`ub>Fg?u&{;|>%KF;fQ^1?l0$xSZZ z5{1rTsFMqe5?1LAAt4fEo}NvR%6F312qX9znK%lKnyp4>n|p@B_8x~BB74>mZaJ=@ z!3ylVpYG(eN9(;X(uqZbXb{q!^STL3AT;N$JE8EYI5_hpg_%4oSlXWU{g-3rf990N zfJA#1jT;ZSl#y5Vfi&TIoUib z%BjwqyNWkDSHeDzA?2@GjnFnaB!{U6`yWnqikw<2c!y(s-9DBw_CF2~!iXHdfe8J1 zdF%@njvxLayN*E(^V-WyLAaajMhNTVP~Fd-#d(?m^|yOIE<-pZRTP{Un!ou*uZh{_ z)1q5HRE>RdwMq~B`6*P<`Xhz$>v=v%Z*sEV_5EHKQSH4CAC-ibM0v9(A>3rSg> zk6Z)Jz#2sntE4+fhz7xQO76*r82oxlYW-RQ;d^_u2=c|Q7tfRZU@=z8*XF2_ zuQ{f?7H8LYqowF@m6?7_uNXfE?zU zl6j7wSG@uw&1YReL3S!iZh$TP4_Yw)tg0(mET=E33>k6nvhBa`z8( z^_1KwDB?=Z=Xn_rZPRVno|uI{%YBk+IVKm2!QImQ@iLWu)&;5p|Z9pf6c&+ zy2^L{U;Ix_F-%VOy0ZV|OEZ9;4!QB3MmrK%AM*bVL^fa*_c2e@zO)9GvBCnu@a_FerKrf|@ zV#PsF{jGpiW4DZVeLA_kt(Zs2$;q}A(@N?t3{ZoBPm^!xeSc-gH+uDswEZz-K>(4+ z9pN#vgf7;)vg$gam=#bwi|sHQss#NMRVOTnF~-RA${-d@p}NFQ)#Z;h0Z~fD`ql!!Y8o6avT(d&b7kgL%CCgY~6ls@3o<4O4nU7xu*w<|ZHw zToQYI$zpa}L?!*s&r?31ZbVvzsbCLDrEh5Fy1*g+%a9!aMGwvO47t^nMZ{}XjoG?c z%lsy#P(X|AdxQptzE8DzTuAY3)MpK!#9_7z{=)t?74_Fv6G~F+nB*p4pqA~mt@VTX&>JNI zm^X;pl0xKWbk0jjKzo$5k%KQQIJfAAUvX6eho1R15)*xTR2Cz1%iCXYL+n6rXmPq2 z1yCj2k;jeyiHaqXnk3~tH73w#fr0{mA_mW2|M>-Y&)41biHPITJf)HbQIX@L!I_}b zpDK!$vZ-bh$H&ppbW}H6C(fvsb*X{4l-M06jo4tts>?LmOh28z)x?d6=3}CNUOIaQFc1c@?$dY< z__hBYk=bt>Hyeg6q+gV{6u#1G=@z-U3KRPB@}DiNDh?|dscumMD+ef6eGhO?1LDUD zf;L0ww3jlS1dUM(d;QMwKZIhYF3SvYCU2ubqmMEerYGO(>E~7ler~_|FCKTeohT@H zDRN9oWN##?t8$CD@LJPrnr02Sd5`CKQ4EB;eh2)&q4aQ|ck!=|PGtq!*;YmtiVc98 zYGz7@@81)}yN!((1I+(ZkGiEG{?sC#*c-iDIDDz2uMZ%Pt3S_b ze!~Dwwi(`?!KTTSV*vg)G}$&8F3Ob*&eJUA$BqM(k!X1v$0#;=d8O`}(QO~9LdE$w=r6mGWquxB@| z;snO?75&9NFaup}UNogSFo0ag;=O0ztbKMIIWo-uC!;zpV(SX@Q|lgo{AL}*Uj@?^ zGb7)0c6cz&tpBt^uK4w*$=(dZL5Z6S5`oL4Z@2yVdTWA=g-Sxi>Zey7$pA zxn1j%-bd-mPe{L6F6n-^NatW*aZ6KuPWnaOipqex`(Cno3gg)?HkP9FeuMW5lhdJ!Cno%4yn_d|03(Z8r4)a22VKmxzr{5BE}Q)eD=6SuIdEviXU5 z#J%MH!ycM)$)CZ_-cnQy=3#TFLpEoaqVELC5nxZUmr91HG6SE_F}m_}Bj%E}K91^{ zlwC!(OIRA_F{G4j=vf z!X>OgEGk!${X)$9JM=JnZ4o)pOAP zgLh1Vq2(3jV)2tL3w7bGIu?nh?W~$PVla!*L!r0}y4h*8{Hbvrw9Ip*EbTUuEE+p) zU()6v=4S4#$i~Vj(xh8>P5~R zYYfrRNnI_1cTOk}<;`Xr{=VVeHBdBw@W!pEzfm>H(R3DtPLj?NQhE(PCNU;p6rt?>K?$}Wp z%!;*X^&xz`1O8DI@p9oOOJ3wO@-#+Hv>QcFe}b;uXz|$@kn!oTdF6*>_hgstwom43 z7xlfzT9{cGO?A#)1if;WzN`jj2vT{xD!o_s{_~qXCo*ZxTIi)C;JQv(9OM{Rx=NP5 zk=3gvS0^5CuRv9Jq0n*9A}*mL#N2|uy1vIPJuy4M$i`RG6|}x}1X0j6FI1TU`)))U zE)SlynIF3yh-|KW-?6Zv78?F@GItIyxE61jFc=;pDdH|a2WoD65q$lu>wUzz3yks?oR)X33(>4#avCS-3HThss4_RC z7!gf+Up#%AGCpSA@oHyW3KHsQ2461f*udp9ln(3JxwT*qh}-mIJx0W-(nCueqb~2E zV(Tzmd;O)YG|}DH#Ne`^{j|c!j1)hm(5nB7w)YHcD((J%byQFh&;g`GKt(}83B3z8 zM5K#=bd+8~gwR4sR1j2}^b&gSy_aMFA@tr`q(-_BS^`PVW@et>Z{|7w>pCyaIj_8~ zNcP_M&f06Od+oJ8-=#~tFddDk<=wB-Q#mB^>{l7Ej%gCtklCt;x&Y5{$?L#Zje5mD z_g3njj`Y4=lZsqp?dx!rq{tfPi@aJ8s%gk-ds@hz9k66@V1%rmF1RuGSXlW%QgLCs z@<{Q>_)mm>l%XBkU=_c#5!m^&4PHl_(|9mdG$q23q=Vl|-|?QVsVunk?$E-|Y8}RU zl>vDE$6K$XOJbR(F+XAzuSIkKXQgU1LU`zD;le^(dcrOjvqEB>i{y4Y zL&u~(<>C)%V74i$%EKvzUe-~Mq3iGaKa13Q= z%9_qM4p@xCCb;WmR3AhtYs|+h4TpA=F0638CCL%bXosji=r&oiaC6}2SYFBxSZxT} z=}zFTGWH~^@>Ug?yn@r>NoVnb_kgh%lhVLP-fx8YJl+Wfja_vdKs6nI5?4*;XpX&( zHu;v;lZ+lRfW9_djqYGHQ!o<(34xKh6T6|o^3ZhHgo9>t&zmp8(iGkcXg>7}^+?B^*mx$h_T|(x^p}F^}BkII#U5?7Rw1TVQhLFo{4UZg!U9B=q{vf z$pmL?>#4Qf+N3US+P?Sk9)qfwd(Ys{6mv55NVbkI%svheP2`*7mbmC#uRIf~esouum(R#>*O=ZX;HkpCZZ%kZO>HCoS108b zc4JMX0SFtcIK$O(Gb_p1xP9hfjz3}y%St^picB##Sv8UcF+;k~#8JOE&ivT+c5wuH zo8^m>6v7ShA-VKB`j)Y%>Vg{^WT@$#S4fo1rod4xFJchw zUP11m4VUplLK@6(KvSF3*1h@n%)bXt$)1>EVm_JY)%fx<;g$A~5(MwpyqG8|D4U-Jx_pR3)A|E7AE{6d$!lc z?ogio!^)b3{?t`OlcM0Fa zI5l1E2WLcV={O`*JKEIPg$c&eP}7i7^!aCx!C zT9U-^%7IdO&;-@i)bIP;a`|e6C!8$0;tlee<}8k6AI7E1qVMSedY~gpq3h7#_$_A= zQLLLualB2!T*}``Ea(c@aqB60WI9W#VPEe47XpZopgFueDby zQm45dL@I$uvV|usv@H3Y94PXMf>oP&gJ+Pe5^r40S5+SltoT=jf&Y!eV2-~{4bWJ; zA=rXo03&(=A8ICV;LMA8`^i08DCZ9@^L`M6Dm#1z70z!W z0*Lpeq@l_5@b3%4ZV%dyD4vGo2$-m-!hhcdQ=#q)T-PowWX@fMmF0h`dvyhS?_%q= zB|AgQF0TToZh6kxrIm&>k2)jdqpqc~*VT2cm&|?>iakeCZ&EJT;yMcJENypqCkl!T zcarcb=IVSAnXRudFP?e>d^CSa0bvy}@~ZE>KfS>d&iP=&!c4#ziecm&;M4=a!$kF+6x_ zE|#+;pq;&6YnqICz-`z^tLVc;598qo-Ci4@kPW+T5nhJHaqqdlTwGP?NIxq1OM(QL zk?d|Oom&DOEuXq%#j8QM`Q>n19hMCy7%Mh@;mlFfF1gX^P!_++-e2;_-bUlC(B8pi zQShV?G%a}Y$cVcO%_91kdUe_CIsgbbp8G*;KX!QPoxMHM70;YS<&aoE7qN?}6(IOu z8Zy*bhUD?-9Qmph3A0%nVgl@9UC^~#X;rg_!sGQ%R}QADx@V?JraL5d_RQB2=v(r| zb|p|}9f&IQR{q1Is}lkU3@~m{rKU1*Z2Z8N(7ms+U}(`dE6}%~-225dVu8}1);uU! zqF^f0YaX}VWp`1PnpZa*oUg%01N-PHhJI9IQ3j7gaYwLqf9W+o5wQG|Q^iSA`@{$B zc($7pUhEu^je)tnjEgoTs=aNGq|uIxWT76+e#NN-B2kdFDxz`a91kZ{DQWBHLo%y( zWvQIuv4rLJ6q58Mi06>A+q!xk+ER=AC5oZXne_COQr#TC3R?K#PJV?ufqJzZ4vgUK z%bcB+TO03H>utDS@7dyTEa+?$z<0aX_Rb)pgO=LfUB|`*hi85DR@`xWfag>GqK{?FDdM(vR!ONi1={CQ6b8v%P#1zTt-3W5&7>uajChaZC ze%_Nx*CWWrewjd>7+r6!be;Ec+O*(u8me9&W{x1`Y`P1jA2KB{1@kI}t_WK?G>Ys= z&B(YLMHlDSg}xCAR2WTY+$8s=Cnc|5W9M3S7vjrPa$Fy&r9KZPZ`{OQz*|}&00s$* zd2)TpI~Q{yTGqw3Rr3k&QUNco`kl9g(t_EV>%P}#fodSYUq^v0+@Tt7rVgD8BOvED zKd=*+KWmT%-87FN(_dj$iSs3HCIaZ(tMOxnjAb@uaBGmOde@=1iOo? z?Q-_1q(IOY%nvZFP^9o^opddFa9!@D|3QJ5z(%;p_iS+IyNWBzvK`(qIa6)2-R!Hp zRU^mmYvW-`)q-`Bs63g3#sXE$YHG&x1<4&6g{|AtZZ9jLt}0Xh@zPovgL-*M)i7TL zEhHTBl3-c0zM}`*USFE3gsD(>d-7z81KmcF$LeMm5>I}fbfjZ;LZHbJsCOV%&yc6~ z#?QFMy>`X%c&;th$jursBgjqi`LN@_uBgm{a6{n9_a~P}lg@PuwNW z3aZr2Q>VIxhS*Qa#M*#o>^bU4Y-ftm4c?yi+J2Q}*OD8wxSGlI=$a3nfbMy?nY10U z_2jR&;2|>mOSfaNBxB}Nr($&g2%sLf0IUWm1IG#RSU*J3FMci9%DbZhwQBxb^YVRq zFd01>)vcj(>eL@{!hm4PjY(6-;-pSLxaU!x5u{cYZs%$!-HmnTVUj5NtBQT?oWx=@ z_3@2DJZL$S8@tBqqYCx#Or9fr0d5;H8_WzcZ9jlyITB{vS#@ag%0tm2us}Mhq5~Q|EM7UN5bC~dO!mh{CbGhL*9~KsTH39XxrRXiEr||-{q`!*lQy#mT?O9 zmu}aeI!l*9?XhGwRVstc7l|@}bH*R>rO8j4*4Osv)D6GOk8?EM2zlLr(GFR^^_32% z_sJIN)eOirUls(Wpq8&Srrej={w?%Ga>-@9*=+xla2V+*GEO#5+Shhom!JIBR(@lq zb5$^l9FiRp(B!B15Ns2u-tY$xaOCrxRRBv+J5~vIYIA`hi(v}rCv=_@YFuDbeSLQK zW7W^^baKFP{rcYk`T(~|+(9a^8V%o-Y(fuk>Z_;!>(pFVeq*XJ^|h53?0CnVg*9uw znZjD3$Y=87%E>Vp4B5KnHEEpL8g?qvWn($W@QyAOKoH^oc0G+|xSMO33aq4`zAt+# zSk3aSe5F1;vJ7a54Sa9Xe>KtLgA#DO%Q6lpDm;SybdzaJ;9n=7JP!Di@^sGgk)g}{ zIj)mWewKVX>3jU|H3LEW=Q+s07gmpxyO7#)_0K+%|5^{wEA#gPn0)YOh=YSMi@sZn zA*KRs>{$0yeX&o%1yR!LqLped(<3RS=ppw-U$FSnfe-O8J~_EpLDX@fedNKg zJmH1K)XZ=QxxJ#%R=z5PcJ);q2DAIYn~zn(A5CbA$$Eigwwx5(C(eFaj~^Hg%~GGO z^|3gbF@o~G4ycg_WZF_DK7+^xnWHB8*3Rb>$&C${!uzmn!K?fx?>5ECRZbO2aWx|e*ooLlRE4Y?bl z=;~@4=z%~7XWe8Q6Wa9H*gm?=Wy+Zqs`v&%=Bija!>XGRI^SlwX)UN|8;y2RaTJfz zy2Fv3g=Pf68pHXn38>z}#}w}Z(3-z|V4FgMIlH2dP83kLQ1gi>eA0F83m(-g>EOk- z*?0RdTW~UT$y3CrZKnPDfOK+Vy-IDi7JNSPscK{X_b#KwhGR70!=%F+GCvSs`ST;Y z>DjKn&Bq`|l7RSF$Fgyz4y(xl6n0}*uwc%g=Oz3~$dus{cNTO_g>@5eIjQf%Kv0=_ zRVnRgo?&rDD|fX%OK#|R!Nv0RFpcpRqX9ufXPJ9!X0iB4NWEA-UrkLY+EQl5J+HW{ zPXZ#Od*9aA*=5q^n*9_@k7Y!4k&2evv}w~dr(~?7(x%ZbmJzij)&x34ty4YOGtyl1 zdobQEi|di>pl85_+nfoz3}$j?gl4>0MfVXg4-HI6LrPt@r*=vWT3jaI-fJn{$0Kq= zi;1rLld^7JdE0?U^>)b^^+Rm_?jB@&O@5Yb!(On}^_5*x^$RWT$~~V!g~EktH^<8A zCOtQbHL1F)Cku@@e#cqJ9kY*C#-lDm<9SHagu!fcmi7`zK>+cUl^T z=)c)(3qp+`Gg@NmEnf9NQ(v50`UGba-&Ou5!P>_N zwbx6S{eG}EIEs{M_>7wknWRXTS!T`=(FG6qL?H}#r7W)dD=jh>s}Z~KVMfT{5}zf1 zW#w%y1q~m!feGbNBiT7!dVUNUUS&bLE&1#yUL_7bEeDNCBUS8?r8aEy zwGDAA01G2zDgt8K;xW9hv{qAbpcWor8hQdQ$Z(}=Ap;zgznx|7RkHA~OX~Kbsph1h z;0F%D6ayJBOfp;3Nvk^}zww7v%e>44or9+TmxU-}yPzr$@^TEP(YWDJ8G>SUPo!iq>nPMI`_0iisEGS#kUT%x28ophQB;t@h{KDI3+9XZ!;N;ny5kHO$_L&8SZt`{kvQ@C&(Iv| zyaWw7IgSx=>|bGZY2I_~P;nNr@s;2P$z4{QMC#z$>}&&GLa5dm3%dBnSw@NO12}~A zBb>n}n7DRm^sXX@VSuWS-Qc*q?P__Ds>y8a@Nl%nvE4lT$ZopsOLePzT??)oUv|de zd38RQcU>ckO{vP0FNbih1Xx;aq^*~T>08A;+qEO7Nv5`rAf;*dNARAnfbArMFw=nb zVA&Q1Wxxw^^KNZK)S=Fa{T%gzxlejFKb*vEy8-Se9j%=vpFaj_yEF;2GH#{ifF&y3 z$s)uFKui+#?M@Q136|IRgI|11+4%V5PJWp?xO`JQ{}JSEE7uIs@pmq#hKutz!9F zNB78yFN)f2EK)I~66etIQ>hA)iF~|1)9MG(>tNO~sJo^*^D?P@t0jZ$k>^-|$#Kby zRya7>q;|qUGn(oRS;LVBGoGp0dn3GWDbsi6z4xN_WD|rIWKf1 z%_#{DIlH7j8%+{^35UO7>dCALdC^1Ay~{CGh1O_Em$AUsu1tTO>MvM7X56XXD}=y) zM>cPnN$jdQCs|CgcZb<*h!eeF(xA=GKd}rasff}+(|D(2`}8?gQ}5vT76Mdkmt{%M zD7IU%REmrIUFls@x!vr0v60*?Z$2-lU1p=$2e(}ZiT)c!^(A`5BOlwAb>se<4RO$-a!&Nk4mn+ zdVuV)mDW>B#LC9}Pq_KQdRX8&>vzqS{fTFW1WCyrCSU3)8mrWRyV~i&y;0i#EM+R# zr>Kz>Yb|)uRhrS$WC}*MQ5(Hwj{F0*^q%y*nlLFY9z9_nKu*tu$_IznjY|&}cdQpt z|8)wX*x*$}xpX0eM~iEJvze9aF6EokHfOZ~}B=7I06MjZnUtcZ4$Cy%XPBDA_u16SBlUBi`_~+{Tc28C!dj7fED9XuDU9*UarVA3qsgL{ zwT~!@NLI@l;a`#;ijsZdln?n{aJd4Q`Bb`a?z}{GPpEb#`FbIgS+c!v*Ed-SMse~O zh(RbEK?+HAHJM%N$raQVQ*9kzi)P}i`jq1F)$3?;sDx}+q zl2Kpf8unv75ab0Je+Xlnp1>;95K|@ZI+vB8n%E!%wCPdzag-@5ZNe611``n~PkK%v zW2gtq1XFT8QXHhf2bjCdpHXNB;OTcO7JjR(xy{P7)%;WNxhv?>eUuVQ_W0r_)aSe) za-{8`2WuB8uq<5NwC%oNn+`k+VPY~7Jcd}sbK0++Ap<;^C2phs!jJp$0J31JEstIT zlff8I$|oE*>^hcn?3?<)=f>;G(zgjm=$C33@nFk)+IkA1p-X49!Kk8DrkI1XgnJHp z=tP~yc|ch%4iVIK(5XV`UYuK5u%A0F=ybF|Y6u~O)Lu2_Pb4fa z#Jlm4Uw0Q06cB+}Ql z&B@IXu$)HZE91O|w1x$Qjw|sGzu=*4#W<%#BTl19Kts#)I1oADO%XsY7031g6(T8z z-TA7Y<8%)LyMb|LX8t9~-*ua^_`J3+u|Q|T>GYR>6W5Qc6_e4xT+(<%Ql0#HliM+T ze~d3;?@?X}gRPMQRj5c?Gh0YIdPJVv^7bRmqxdk_%c* zTwWR5I7ND%?PUI~H$5m^PQ>*hX(mD$WD*!5l{qNK(H9Yvhc3ts)lx~OnTzvop!}RM zqf}z{#}>iVB}@W6>Q86g3K_V|O5|M<%zIW#m;Q3fm0L9&6C^e;B|%bha(K~=Av=h9o`@+Y=3a59X#jSkXkI+jY4Ta7 z@M`RXgICijNixaT3xlVmOe32SyNe@T!?Lk@T4)65*qLVnv6d1l0+-AR9iHS$7hZmq zKPcxi@d(Lhp0uAFjB}B%D!h;I$TBuTF?=_p1R}S=om=K@Bp7nDuLDOiL<&e#0x^ey z%9M!nr>=q;YwpV|-Na=~1{(AzmW;bFQyB!!a>E151i{aToIecO-P6v_t(UT5&VZt? zulAWkBn(Lwlk(@+zM1?YAD5%*QW~o0pX3w~x;_ytD`ND%6JPH|fcRL8Fk^8U_gTjN z*ODj=4$0Qr*R~Z?ZID*@PrX&Juqh2*e6y&3k3GGaDPg??>Bq^(xwr@7ifO5|F0XfeyuPZ1rC zM2#M!ffZDTpuTB5AO*Hukb8|a>Ie&oDc zdxwv8``2$($s%g;(VmfZwLja)SD@kh#+cHh>+7L6sd)@e9+4P9h4a-AhZi`h5ZW+P z=4b~gP#4T85`Oe@B3mYeG<_K0ACIu-=z6U@!wXCr49NxJpZ}WpzBdF=uj}w_Pd`aU z;YM{$w`0$d`$wxPpt~Lc9K zX-duW0kTD|*>k0$)0gX8igbl{(C{?8-^f<2x7~YHedYY1r0L~7yi0@_oXor7D@3)od%`-JddVFQ01jj# zR~AUs5H^uj5sd0<0Dr2N6fG#a?k-AEgJ^y|x-YfN9Av4kHIsK(rEd9JGiD!tHS`T3 zHjlzEdo$l+N1%CRJ0%$+k@=|B>h6&L60s@Z@99<`w@%WCf_D9o^S9JlX6 z^)V^ys;18@Z_Qa^JX{^(Bb0qs7gyuHSCX0f2qh+Q@_}9SZQ8BD_~$ALECBLMl{0?F z#>TyjSKu~GGvAhr7nYk7!HOw(!s^4^t5Y}$|GlH4ns++m{@RsZ%*(i{Q2~HqHy{RX zLD<(6v9SP~ob11zSO8XCTitG_O)NEdB}T#_7of-VOiF7CR6O+_@-P7T8ZkRL8LmJ| zSKwDL#ULISnnVDF_<_KwG;P71^Qpwa@hqAfex$KiG((cXXap%6IT_nIPrx0ckfOrr zuA~!R*^W7mp^E(d&A+Rngs-+hWO>n9gBoII-Z!r z+kX|j^JA1Os1zLaXa|JZ23f{Z(90Og7pLLQ?QSlq6zJQU3S{yqHXG$=<0&9(wI~O}umQn2bigTTy6NI3gRpMv{7I zO~W(6KG$&_erknV-q%eHNa5bU5>?018A$E2z~gmzSc2rT_Y3ULHO%t-sGmlfNU`ep zhps}_PEqCoQi zHJx56eSA2%e%y}{#*E4Dhqzh_5nz8@BXoa?64#DEl{AnfV+RbhVhf@PO=D8{J~5eZ z@*?(2$Vg<$XxF-Q&RA!+4EtDXZ`c{JxZq~9G=yK%`ek#W0MKSc>$Ry+EkNr*)$i|( zPbazcD0rP_91?`Qk8v`vcmwnV?}viXTJPM&qfTE~e%2eQmdax-6wHf4(a!k$wwops z0EjaTsp@NsS2o29(=hGvT(SySyp$!wpT2ZknV}khbHtwi>rFzkPU)L&NJzKo`beo% zw?jd`68gADyOcPH$}{rNo)q!9vbmG1u?3BsZd)mJ3{9?V^z8u_Di|5JAQrgFA)lwT)avgi!)XT8LbT6bBe)XNdr?iyNi=w_HSm@ zwW3_f`aPxXexLkrsSbIfnVr5m>Eh=U?B)0(zn1+jYJ>L@*Jzf_Z))geyPbZk@5Od4 z$8bFW+H!n~ZG_`|xLeJ$Cm^f<@xgd+|Ws?^)1Up{HKw`7*Z0y;ED{vy^wt_eFgYi@Np@oIS# z37#T+{re}&n=bJ~sTDe#GeZ*46#H4;?+*TXeXUlR-B>?8Q2b~Gg{B8m(b=QVi~|rM zQ#~-^L`4@)XkuRn)aX&p>DWCvdBt&c=Y>SH7MF73WV5eK+d`(qkJ<4k5!{>IOOYaO z`?%4cI?Dw@2t_$aS%V9IGB9!KOe-oBJ1Rw*n{yYVi!fM%1etBPONr8GFL95S&z@Zd zuq8{iBxa|1H(H1aOHe77f+*ka_^SoBUSFT?@=;itWA9Vg_e}bp&$0?Gv3k8*4`z!x zcSp>G$grD5?%rrWpWguoK0C9k)m1m(EQoT8u}wqVXWo00>cRPZbxokizBGhouWJ`M zUcJIG7gGo*Q@Ot}Iq%8`7~e3iX_tOUo<55L2rcK*xybjlxmxoHo;5=Z{N+XU;h<=M zzy!6hlTg=2!A+ZGKaKh~b*r%N(52ps1Rv3xp9-B&xuPNitJZbqjr zWwutXvCb8zB%?M{7p9k>WWaa37zb?k3WfJSi8vkCyfIEM19~hbN_VEF**-GbX*yqM|((ECvrzS$4jo4eSmtP`IBuAVHKy zR8e@3tXlC93B`wTT*k#UeEj9_mNA#x-1F8^H2c*)(y)edt$JWBBCC$=O!gK>n>%H_ z^kJKgrD|+8uWuZO%zfNhE=ylqLg$`}F=g%$ZmyjmDkCSvJjW){SH9i*rA=Bpsb0qM zb>HE!kW&x*TeLoZY-nnp=Za@NoIR&gQcAMZ8PIE8OAB=-N@g;S%yOlBB)VLjoXk1) zpxNjHerE*}ud==EDOs!f%c~Cos-iHBXx;PMS??5R%6sKj7nY3Gyp&+l9c*U8f4>3M zR|H*c)K^AlFF;>~)2r7!vY);rkyVLGdxp;0ROCCY+soEwxs$t?+fI&d?wO`rEnKP;we@wEXW?J%SLB{3{WULE0Q#Wnwbl$t?DG66-@U6i zIcjwdqD4Fh4IA0P@?Qv@V%lF*@JOhVyrYrdPUrhYhWP|W0w#V5P8UTwiA7ZPnvKQ{ z@_xixpI+wvE5Isvy^st)f1~1g{BX)m7v@h*>)#5RT>J--7UEFem^JP&omjEbH?Me| zUoX}RU!=Er>u`D*^!HcoJ8`Fhtnyq~t>MJG0G3qtE5PXh;g8fF6BpV+Z-sJ?Yf9O+ zB!;Y(cvWyBHy2Wa33h?*Zv#|VeZggZl5k#C9!T$uRS^R>|Mjl$pZyNWQ$R}mm`@`q zLI2O~+CTsA&ta~ArH22%mXQA+`Wyb!pmBmL-u(ywlK>20>v9f#4lqa z37k`6dRXUuK&$X=%SSIxRlDLMm9*!;b@Uf-?)yZoK;<2>cZB zYu&SS6du7fxQog+s}`V@vj!;}E0cOlar9FcpE1 z*>MU+thlQtKq-TYaC{7g*ObZ`h3Lduo;E85@Fu`ncQt5f2tLG7#^L2nFB~gjM5Xlr zvxnN$8kcG0!4M1IiXNVc&_(>Z4_5%W%l)GdDVKhkI0B_z{xvVVe!U zh@sqDx_>eLfrLe@a3rWD^-(yD*5o)pcaS`+GHfRT3^ zxT+H^P}<&p@%V_VzU;F%ro)1R=W#2>a`u$th61=iW0a_|A|g}&-p$y$VH~^IHhKRk zaiY(JsCC4|#5M-Dix7sJ94Cf}V3$qBA>jFV&%?RxL<>Vl9Z3*Z#=%-+sTKtUoFn(@ zu8PK$$8>479ZO#>8yLBE0GP3c<3YQC(DowA%jNon1>3C8K`)|(FIm}iUVIy2srK@k zxUdPr=l3UZeJ$aP1p0S2{^BxfQOLJKqU7|2SUC~$OMqc9G)rir|&iX9+M+(-HzsFdsW)*2H{BD$sxUF5GUCfBwD=i-w<@qV`>{w` z(d5x^AiNr?j=2lDA}W2dpOf0&tbXW_dtoLtA#@W60?|fE=TlpCVqAW4s@gMPsEu2J zq|mt|Ds{g%i7&*0uH{Hc_xLO=C~JhC5bT$XT4Vxx4BAM-JEaG z1{zs(+Ef>LJatN&egw;misv@|?0sX^Jnx^qXZ_;)x>TDgJBMf>AC04gM1J(!@W_rG zRsDNgMl{+Cc+Xlab}CDrFYd9n0+{fcEC(oQ?zYPN#yJQ9)+lrIn{AWkho+~0oPT8b z(&RDx@#R-0EXp^)L^!GLag=27N-KBh&oMsGs|D(;+=Xl%&z)zP6COJP4@e8=8WAm6 z41z;_Ds_{0^0}hQLt|}Tw)Cv;yh@ErBe9t_@PcsYY(?rYc6>Sw@(i79A9p8sI3MPF z*JE$aZ+oKIgSfG@vZ2L3s;Oir>7Uv#4>`D$^<)2Tmn6XC6-780Am2Bg@%{4t%E!)( z2EQG@>p2bl;g2t6WwWx>)#moo9T5jOI7b`Zn`V9~B6q<6<^DW>@z;#Q+hs2>gF~#KU342SppsNU9^gQAO?pjw zY!Aax4#K~kiUhH#o(;PEig)RDB;VObOFCh@9cBzBr`|gQ1JQo(od}>r%n|b}?ITUo zs2I&8AEvg8=Q-dk7l06BcJF;t1BiwY@P|f%a~!^ zT*lRL$w}Z2^r3TEeQh^EF>B8vs@&9Voq4|@PI0Wh)_PAep)xE5KX`KO458B=%a-%} z#9^7A2DlL-vDFoZwJEI--6eqyaTjv2bUXF#J5`MMaLTrZgp}IMKJB)Tv0dF@2Ehv7 zq|W6#p{pB%4Gl39qD{L-L$JXGvB>IGbUk~jg-J8@HxmJx^}{6hnWbnL41{7kPFj-N zeq-ydw-8!5-AhYRy#Hb0KBQ15VZ(R8n31Efj^1sDt$X`I!C!|P!a(_#5ta-3?8gq$ zm#l<2Vzz9ywTFBM&zGCcd;X0>hi9z;^f1L6a4*GbcRp?A= z@@SDwAJCks+bq+>(&^;DMiYTp^DOr8YDrS-DJjYZRum9tG6i&(0 z1j4_NQ=8e?nQg;vkk@ov|IE-eH}KKq_KR-hWBu)giSw!u$)D}YUMBTv(o-RK$gG~Z zXrs&Mq0u&4n72_?vY<_!GgBpoKzNy|EDcuo*>__|@OGtY#Cj^0uY4h=5PIatyzg&U z{k$f2yg;}ESm;q!^QEkxK~)w?F4Sye`vs{n89xk2t*>*e?dvxud7-rC%qECDJ z_i>|vhQ(GIwGvyhjAaa&jyAGhHe0On-NPYSUb8tL{!>SWAWOTFRO77{{A-N}{dkdt>)Q%#2b1ifg z)wP&G&V;ZKi;`n+o*By6gP?o$4k@}S{!nSMS5#Ix2}T|-D1g=-a31s}b4G_bCs%f2 z(pGS;jYtXeQDR5tn9{&F6X=X6*53p>&V^;D_ZwS_AgjdB`xFWf7d403x5WNY0aJiI zGnCM9~C-PyQ*+nNOKI*ew#fjGt5# zTf1)Am;W$Kjh^-~69^bfj~>;7CtrNdQ6YGwqp3OaDEva6%jN!zD2$qkC~E~DO7-Ew z*xh=E#-2__w`^6-67=8;!uvBlIuOvnX)R`r%yY2YvG=edZ1t z<^i0rmQd(8f#_`5$;y;e@f(kXl|Ko-moHL9k_S|c{_!B35sIZ!9@qD5RXE0IOFv4# zcVEt~?2F-7PNoR%6lsx1pE{u(;sS+YfT%KwwIoC9^eI}tgJCdS;tJA)|BS6~f`lkD zolS$c?46_8!E=Sl?JACrJ(Al&7oJUay}eD-nHE`>Lq?PkT2!O1YTOE5PB?S<=vhxy znKgq=(O^m=&6xJvTfT(>F|!*;$~~24-8@MID6wIxb0_3rin(JW;59t$yZw{9k=Z!O z4*cy@`4?8n(#y~9qaYg^YXRLb$Ru0Z=j+0NlcCc-ZLT=)W4`Gloy?SIWN#ewx0fke z!_M>$w(%p78NYdL))JXzkGB;+URBRco%mJ#~sP;BjdJKQ&$<58PU~ddY zRUQrY`jjNkxS^7t_)WbI`g#`F3`Jth+RiKbtq-?tQNKbxS6 zmnT=sJOGd_so1#F3C1@^m46K(8o19ZV#$=S<%8RhHN#&Xve}j^-1y4MyIr;iD@|40 ze(;sXl+AJPdR%{(J=L=>Yg8GeP_=Pbp?`Zw0^B&u-5_yuf-v8mHXaw{naE33l?Bg{ zJcvm~&L~x+VxMQ`!IS;kQMjp|{WR6Pf#<*qL!u)G=i#b`P4d8Yt52yd`9yf`^l6?xX06@L6JuBdkvY6Vl{s#3KqEAM>X*jLsyHYLBxa&F-8 z%~lg&!(-%V`}OmEu?7=PziuC(VxJS6H82+*kf$|rz)~6L!lQ?M6;o~p?(5HAhW#hj zo@Q4KqrbLvPNeb~{xnY)jZ~q6_D!tH#>|o;OMLz+9UG!$yw#9Y)W+?P`ww z&}|<)vhq3%P6d4Jt}{6!m}L{@wW|LI*df-H=ti`%-iztmCn~~v41AMxp0)X0tqa&= zHTFiN;kjkKXhfYH+8eg!MTiGdZcqEXC7>^pnkxEKS3RwhyzK3k&Z&T~VvPV7JIv7? zi4D2+KiS>2lqL(cdq(em+{x?&lNruD(`EkgwB3+(O|1HI*OO@XI%xlb^Zsli5otEl z03W5lH9{xLCa&_P3jXXx2cym8$F$)xg>Mb5BhKGH_=`A7u+2R*w>vU)DQI|Y3?o(s9BmM68GJ0NG6^Zt@MbbHQv0rWX-ZT{K zr~KlcVU!4#>0=eM#P~o}xEa(9MaZx6WueiL)$?3K4=NSb8jf51rwcbrvW zI%*wA;9?Ept(_Oj_Q~uiugh^8A!`^PmN=2U$0?bkaAhzLS)OjTWws0<47c`X?CPuH zetTfHJl?;+HbodOeR80?cw27&brHza6aozkHreGdjpninNu5Q#Te?=#F}x8CMoX!2 z|LcAiG%+h*7a3CnHbV~tuKI;!tOs4CZPxE&y_y09g7p|7-G^lDQ6G2KHU^0V*+~em zPp#1T|NXfdn*36lY?*zZlC8~59NUwxNM$M>;aTls1`3=NPSW?wVx-l5G^n+7fvGUT zJ3UHGpW>-XU=ih+I(`v4qa$-h_kW(cM`wd{401a_gz(`M;t!|Gk$UNDw>rBX8gwmx zR1rPO`7`3_x6Gn_(jbA=aRk$ojn_+3|RGrN1AY*TMEaA z3!!2R|EFyS;6hP-UAw<1KJh;G@=D%WO981H*8}^y7*{AQmYa_>dCi2b2tC$}i#%D! z*(g0A^h;aJ_LhA~NX$HfsEZUgd8?Eka1V+YUA=SRzjsj|ny&G`{mq(4y&-zu_rgQT z|K2H`rGdpZKzfWiRhOUi(bHVY%D^CT?c$+rs)8sol@w~=2Fg?e`Y59DlP*;S`*k%| zBcm!*kb56m_nX_h#OT^RsThA zR=*NKmhfp;b+ZzBBI=sRrrLK+WK-DfS$~VTkFfcjj4H6zd7ik)DP5bk| zt)0Dp<@HT7Qf431kCxt+s?VSAW|Cqs^T;<%=Nq@=zIxvJHs#xq-ZksiZ+G2(@h*!S z_$C72?$U?ALq>P0+^*RwZN~5m$xfD7U@O)QcpD}tTp+4|(b%H~Tmu3Ehe4Ohf!Y|L z@l^&Md1&tuG;GLVPy_Awf<}D79)R>@Ks*|0%<1^Yf0d=-FPx#1ZP1_K>z@;j|==^1poj532;bRa{vGi!vFvd!vV){sAK>D|D{PpK~#8N?7ato zT~*coeUaW0I%)J!LQNy|4x&gER1^_WP(+cU0xHdhg7n^d?=7THZ|T$12&C7^q!Ccm zf4=AUtbOjxB$H(DukY*keV%*nK5MV_taA3bx$K91?wMS9{oL}p`Q`QV%hWc^FRPzd z-Y`!s0{VHFP+G19S=xxHtZptYb@SAgHOw!mm%N~)eu2QHlIs_g;v&tw(#E-EwZh9Z zU&=C>92~()?InsJ_Xae9QNYp$TaBSxx3IKsUMY@%WtEqdII0Ce0koLrmDVZ|aSV_( z_65b-RcGD8V!_lBVWBh%rM6g(V5FR{E|KdLLGi7u2NQU8wcCpt&}*+%yRZ<96FIo# zqSlU*RZ=Yl$h}BP3AGD~rLh&50TPO87lyC)qKK2h)I~{BBb~jtc0PdG1#*;uh0b}s|qWXC$e)uY8tu#?BSwKpeOioH_ z*I%ck5r;BVty8cUs!p!d!U8+0tMY)=NuFP*q;e$G{6bwC)uS_2{R$grK}p`_MP35R zT`^Hs(-!EgCDhCZqX<5!f|`XTH4KrIkyI|UN~-e;Sk#FuU*tlR=;bK6Fan~%5kbmo zloUWo^Qbd(RI76-P=z(~?JL=#RHTru)&&SD!2F_W2;k1e0&| ze4Maxqsx%h z7`o#Z7L1=qC}hB-8^2%#!JSmH;z*{*xrO6WE;Qa<#{3b2Ntt5GoiZeoR92szl?kAv zQD+|6s&!IM1TaCysa-G}t9Dh3iKOFD8tek3A4j#)3@53o1=Fgkc>*AybUGXfj-D=< zqz5^lqy(8q7a?30XdH%1mamgihEiA0A6_%JU@X4GQMGa*sgWo{h<$;O)Je4ote6t$ z3OsHu7787rJ8?3?DlejlkpdAJFFUGyeWw`Lx#xCy$%?!I^N!P_r9zUPuYol1s`A5y(Yk>#ssY87YL7)6kb z5c*+GIz$4dxr%Q=AKir`Klsbws#)h>d0W?BU(DsY<#OBQHrZplp2zKW@aek`IHTLX zC+D`@Czsnkm)o}Uu19|5{9iu%?znLuepXoBOoXv>ozb~SL6)J4??gkTQ9Eufr#5De z@(v#}7p1*qay_!D9!0=Q?a;Av2qg_B1u_IX3JTR+5chRB4*?oy6RFtsR0qjadb za#Y6Ry5=!cKN~yk@8hTaecW`l|4=*5GW*oe3TqY(tDaxk_^|?(HY^?g(ci0Oo%Rp8 z)J*&P*lB+oIpxz4`Up9xQ#-rTjY?IK)K#f+D~+^?%B7KYto~cGDE6Y7X6*%ai;Aij z71cIL9#OMoc+HX#b&H4BE-9#4GOTvVh+1Unhe0+tK^imI(ZWmn;L%QsFlPt=wXsVk9WfzOln46wl?NsTgmN6Iu8rMvIaF}^z z5Gs)t+C-=_iY4MyCI+R}V3|Z$;6+d%lcl=((u)F#$q)phB}aA9ODPP30AeY^0Du?4 zk*tRi8DpjCkZ6@A(4rg&$RJHH6vUha7|g1EVVT%SqfFt8sZ<)vrd9Be@GY{V1kK=! zqYRXatl2q9O?b?s%$LMuq!h=14uuzaB?qUHNxW;mX7&keNB9z)Cjbiz%>bn-Rd5F( zX%ZWv(y0OM>%QNdzT@?1^m9bxhJl@WR?A#g}7&uDDY} z5*%52Q7pkAD(JI#5MfiouALZl$R!a|v(p~3(tsV3RV z$eBiDcYPuNv_n@EN)y>gDl7GPmkiiR#ipDBo`aW@YW6I-TAIYinEFS{9*$s4Kh%X1 zjKJM`hzDNkienH{ltWzwOHKPE}bYB{hLQa%aoJw8k z&8#HU&X>|w01oKjK_nDJk#R9VC51AONrR(^P$YE_WC;RjqObT624fDg8-!X zlHn)J=?z#goD)n$LPB;rLP8kKnl$^DFZ={@;%KHZ9s#xXjdRiYDyadXjNLN6BCc7| z2xSa;$wjry{(}a1d;~VqrvuetWJvAPw3S@25eg1&6OJhb7yytNG2sZFrG^L*!6~GH z7fDVW$p8l-U>;^lrLW(m~HH(uF9A?GY$!bUVgD{%V zgGq(?L|_Oq3GeK{*vTcf5G2HfrShl^QUQRj*p$LbW8N4%O$;g=BW46-YRP=&bxY(ZU^7AByL=lWbvt@nu+tiMBVv9Ci<{ozyZjH{TmLfkJU6>ShHGK)ZyPdXaX zI0O?&wK~&+ar$yzG}vP=)zCTTlC2< ztzS}9->j>nDL6q!F}wxUOW7P5nKBWXVqh{MLs!O_ zDzpI1sa!U^WsK(Zvu}Cuy<6^k_mB6#cgq9s-1^{qe}3S-KR)ozpYDJ6w#SA%{ospF zKKRPh_rLP^1Ft+8ySfj({KNwy~;<#1?RY!>Ga_TBGOa(w9zH`d;~r7Y8>8R$9MQ zl>`P>HfCON{W7uNmxoT!NmVp_Og*Ibsg0iVz6C|rH&0o^GM!ZUgyrQv)3OQ63u>C2 zR29xq5Sa>Vo5`N2k=O!sNIaylc1d~TvJusb%%D`BPek(Q*+aw}AUURI+QoTHRNy(Z zWY6R|_7$nHO9*yXk;S!(ulU^)xefQoZMyd^eNR8|m~ZdW=ZxH@d*wFR{fe8OaAEUA zir%kMKoc{V4>6qrhLZ}0&qz-hlBE~%6CO@AifT(5mQ_vsw77nWeP`(^S55k)V&W$i zlRl|bJNeVfi7O-sqkqnryjM;_DU)PfcSknIGh53NndU*>OubydKyk}TG{L5%QBt}B zREb&D&lRmoYgUbkUzK}lD6Lk-T9&)zW>!hApC>L991H=>0?S^-vNFh0&@+~g>?o>` z@iC~E90Nuh3t0#dDib8PUcAB)Vj$U^4Tb|_A#%WsgdIfz!9D5}8LA+RT9*;BD3h60 zC^IG|S*(Cvf|DwjX8B-5B*e19SMy_%BCt{f=Sk5--hw;9NdkbC;7|)3AsEmqQUJ4K zVj~$(n=eiRdDGqyNc(zCDFpjc8)01@p)}zR0Pztt@27QAdx`BZcjpug)(oDqlb7R2 z6LEwmLIOw#Opp*I^%53w#8n6w97a_+2>eG#wVEZ{#8^3kO)kJYFfzhDU@`*7dK3bB z^Qa&;@HEw&wXg`vAdbN-2RW?f$}o*Ev1_U=lZwf*n_@Ysg5zH8q(Zta#upwEsToOR zM^-57>1ukK_fi40I11yWd1B^qNNi1dswFSWN(hPVn4Ac#E_(a2Gb5*Lwd}%ZdX1nd zKEZJ`hY^~N~$(WMHjuOxWvtsTZzTrqB&39StF-LMz z&8L&2b2*X72Jy)fi(@IQ3yWM}tWhYeYFTzugkTN`C|yS4Jo18s$V(>Ck5rN~+EKzn zd_|>5Dz8+q063Znkkoq3<5iw8HkmwlAuBNE5|)($nO2n}+k_@5-4!{pMsp*A2M>hQ zF=cmB>v17S%I;{;8z`0|J6$Tk0M3+*&HD+Sw7?F;(omNTR+T=tUlk$nn235{@;+-+2 z_09J_U$kMDez~po&24>PZtMMW+a8$Pa^D?$ov1mJ{soB)czKFy#my*{9Zg!Y!z9jt zEWMbj$eQEmurAYWi5(u;h|o-M8aD zC%!PKR+K5eZqmLX?32D=(#(RsGF>SaevIg~#o=q~BH} zDyI#a@JaRE4>TXP}%Ze3I>W+Ivm?G#vEx@se;7m8SFdivb^HD_OZQ*NU@*59`8 z&wu}vG$Y2FW~5c7SR9jVUS}ENA-!6s79D!8V#b3nmudbte5~f&`uC#$$S!{1rP3c? z|Bx7|uATn9Gr1oX$tFTGdZ(c=*mIhYug8uRhU8eFHSTTQU9WKR)~C#|Haq znxrYz_=Td=uNF+wRbw2y2s3>2T{U_vTim7XJExl^L_?@l*XR|R0)en<|G>1cZ#QO-D$w@fBWclzq;oqm)?BA z`PYBv{Of;y)$PCk-NW7Y_}bIEZ-4J@UGLq!+r7JWyH7&4-@kkJ-)*(=GmpPLtftxY z2@a#Aq$4khlu=5~I%pN^NF=2T_Ymh{9ZB?N_x@+>IpFNQ4n1d|L%+7~k>A|+h;Qt9 z$T{lvIOvq??s&DRrWs!|u?Q9124OUe2tBlcfDUVun3cQHB8XEd&e*vnb&F5>`pZ{f;j$sMg~Tt@1ljGCC7jDimmrJW}_|#cj@)TOMdx)DuFbDoLAPk^vd5o zwbOxL*{s_kU3#7Loy%`4s+DztdCOc850^A&*!TsHy)pX0qrbJ+p=a+o;GCX^e0A?b z&-wDVu6_8Gio)8(N+;_0QL|>^e9UkmY?*s ztM=%B_BSs5eQ}-W;>Y_P_09c`I(Pr0&(nUuG2hznsBi6mlw}EOkN)QVM}O-;$w#V- zsmDR5=`uwkcJrlJH}g(XFI5G#^U4*)%zmHMs#%c9%Cs6LKrUz!3@28r>LiOziM@z2 zp{bzDF49#FDH3r)FPIpP^j>8O4Wvs9q|9U~VMNlz5WE1D2Z#bGkyuJ1T5uBW;w>;Y z>rJJkZ=7GI>3E)WnJ>XZf{a;)PyuFU5C3rrGbNF(xT8;96FJSlW6df<7S}b&WQxK< zlgSu_Bu|Y@ih>1&CX;Cufi;;jO}L#AUpv~}jKX0H#kE>|Sv6`29-$(pX5OCh6IRrV zy9z;yU7$(npi+u#FUvTR3*v{8L=Y8c)Gl|^o7hoiEqg?RHW;QFym-ZY-Q-Ffph+Yl zc!f#Vd@oYjMYX|C)S61^Oj9&Rc2%-USt1q@E>fCw(JBsP!>c-h3?(EAJgh)*pc80V zi_^rNlAHxS%Rb>4cl0S5R?V9=jI2ZfR!cw$a>vE-ofM@sLTWB`3UN$v9LibXT8dARLAt=u5;JO+qXY$vy96ECj@1i_HRTPZ zV6YC&(VI9C3Se2ut4}^(a}q*@uept5nh!XsWfsATHSJcl(%3!X(}kIs>Zk^pATz;U z%;E$yi?AlZjw7W_77{F!s>&wt3TQ{~nLew5EJ~V8a@XuUFplpsLIWwnkybN!7Py8x zxMumOW^pQeX}*rHO$x4R&G$l zv{18o0@^A*0|T)ODNH%sszR>?L95JI1PD6hbYL8oybuzyn=rs1f@tA2exbc&Wv)*& z*pA~Uo#ZUO=Jx~)q?KOCQv56_#D?-*3`u<>pGlPEp}1QHBVmDJ(v50^$w*dt8JW@4 zzd(+TCQX<|1TkZ}Z(bBgWd83%N&VvQUU_?N+XHeN?zTzS{u_1cpWA5HuKS&Q(l>tg zmGiDS@YwTno%hRaxa*g{^^5We%T!4#@{n5bAF5T?%StHO^(EQ#%J2zW?Q!(hyB)P1 zgzC6$_dagBp2u$5{oo6)x}CKtMp)l1&2N-Ux#pJVPW;-HoAo&KsMCH_Mxq5nRXNOx zktB;F2d9D$jNz`oAv!OZfHB+=M=`PvZdlQ9^B)LeOo{Rf!#od4tJ{f=a1B+wL zs{hu7!>fnJnw5e$8euh+j~fe}!u%@fm0eTSswtmdc-0-b4R_Wl-1SV+s40KZ+*iD% zpr)y`ap}k@pN#$Ruj8lvZ5+42{e9GwPs=7QE2>!pv8h=!Zt7p39$2gSSuVHLm(Tr$ zVoL8NGRLP9s1&CLvoig_1altu(cf>p=k*PD=$p%Re*CS`g*8pX$HQ_D`SL}%+}4|P z8<5Lw+vmg!(vPHvA{Q8wrZqnu8TyBS5`=0hr`Sg<7#jlK*uyL0Gn{+!kw@J_b zCtWz^gTH99UNLFKRX0DK`@+soC^CExdK1MI)-AgK#nN1^>*Pf%e{=Vn7ykUti+^$7 z#n;^X!>jLA`|Y3Jdi#^ZYi6$e`5&HCE=?t$A6$3dWw%~@^}QEe3qZnmuDs*vcgMY6 zG&Psoe9VV`hg-RQi4VPx@f`R2TyX<#zZoQq4{_5oy{PeaR_x)ln*ZtHBeqG+ULh&mm ze0;%`cj)47+w=IZ|KN9f9sV_4snfr6T~WQeoW^eW=d*-c7mncipf{|1lqYraHY4M75&muN8i<#V$wYa=Tpe z>j#SKmg>Ar6}%AS^8zfsB&BH*ye{8*%_^u4H`=KywpPXBl}^D6O>=bN23E|{sr4N2 zRmCr=Uc?y6OP|u}MH-Es{lA*a?euo(v|(cw2>I9}Q#IKF42BKH-xwQ$NdX+|&D>xlO!pwpVWBy^_3%WVh@+lQOr} z(9sL@F^E+uF+DRkN@6`t+{si*T#K{w&4=!$O7N;Q6O&LSW|gfe!JWJ+rB-Z8JgP#} zCEY7H-`2FE1#!yX9GDR^ma4okWmw!0C_U?1!q634vr-WtLe48w%X(D3NSa#KtRN>5 zmK_$v9&`vIB$@=}kgr1-3{er^SWrwxTTMbFnD&@H1r^TS*DTNSxw5?00gU%2{HhluoA=pe5+v!j^6wYtGfnsYE0t6bAwzy2qYxRGrw{W zSd#!^iBfV~p!8T_8pzy$M{uU{PD(Vx5-o8w$cZTjcmR}&QUL7{P^~8JDiw_>ihMOA z_q}uKI!kioRzqb>p}g)SBpNCKY&j*hqv8`Yl4`C@aG0A~ig%GvkpN?A=_&}RRUZ5y zvN(>;)C5Lx;vTxBffCSbgK62r1NA#LlM>+@(a^hDeb%c#X zElIIzT5rN*Uob*?*~&3PFF`esR5N4Wl_$Nai0O?hkz9l$NyVC=F&Z%P3XParU@m5XU8yMLCjV6o4#B<68|Kr%h6wqsC3LgFqy#jDVUf zDk-dk!cx)%)=b*$4i_-STTXF=Cus!amtz`CQ!n!wDaR^K#yTPb0`x}QOql3WOi(g) zY0YYE(mX!zC{3bOA|yUvX;KS@M0f?i%BPc(XtF|qh~QA*Nu-!4;aX6slr#WQj3)G| zEtEuN#F%79Oa$%XQPmItVL%#>pi(tiS6D0Uo>&$DWf|j}7{@NCoc!^(e)7lMrad?A z+JDm?2j{jqV8^{rxc|kH;)doIhtxhdsCH1*jQ7f??S1$;yZ1li?XnNEA6z-9m#s{D z6qb@8R8AC0%O@>A>wDLC+UU65Y3V$JH~x|@H$ z=s4|fADJbusSe%lle9XDkBA_A&-FG-2yXwVX&GS|{%&a^6# zE3u}=_&2748 z|1W+ox4}-&yjLw|RW)%r9PbO=?|Z(aa?;0-zcEIW&hsw&W5vW3rH#ve`R5l!sD5+b zo0XGSJU6f=*LnYA&%UgF_R62!@JMds-D_vBy#0xxxm>5By5_>V=C?~f6m!1%PtR9O z{Fv12&`7bJ;@W02t1dG>Ub*#dN9Q)%Gq>fwxlX-kH`zmkdGMGy_rFjo?%n(N^T$m6 zn?@kF{w}#K1lWhRbFbV6yJ(jGZs|w4+!kY|{BFpx>!nColVU2D_;y*tGCr}R#Q_*t zIZC6cbLoU-MYYr;eiCJfzeP#>{AtwO;p3Yi5*zKd=OJf{OYD2(xr#GHACGYhUK%<< z<1gm(e$^~7ipy?%B$wOqs^2|XIb}uJ#E*wpH|>1jSM&iZZCEmFEc9FR{%-q!i97uo zmzUKq>vzKUa$D^4z>B3LASbg~wql>7Q@Ho}QboStirXqDeOge{TvWH@$+yRDwa2l# zn(tN2ko!45{2f0dx7ps8UjL|XqBCKGQ02K( z5?I9wM-d6`*|W(%#Bv+35Lnd_M*K=KzxIRQ<~H8rvDZiG63F_#BN(IN7d`goXc3;T z{owcdwr>GnP8`+cqHkMO_r6s zw#r^2Fcbid5!;b9xz~v)g(LLCFkHkOL%tVghkFgRG;!bd0^jRzL&NJ7Z00>ShM==G?y*5vXG!xxSb zvIWhmA!ecwcoBzEOErHDYgVm!j;7`)CE)IrD5qvY#$1s^SW{B*jYwg~d<42iib4oU z5RZ?h$lP0)WQxZHs(`7sDctP{NfX;Cq0XSGtndVq%AG`x9 zyj-?v26&aEF09Wt6KaO-q>5lKz`>y4Cz%HR5T{RAm{^p-f>;KNWh?!68rr6?=;?|} zIBC=jp$aPtO2Xr->9Q-KOEgU~#7R7fCqh<$XV`KV8Q@Hb2EgD*=YRqT20$`h;={)j zcA+NpQL2O65vv7H_a);cSukz|WajObwK$5=OjPxl29R3US99n93&5^9 z4ydU%MIxZ|Pq~N?L=M6904t8n@*%X`DQ8Ax9+GZc)LF-wYEI)Hn|VEl(;oOf!XS$lx>WW$)q?+hodm?F<6tAXaKMW^W@nTfYHD`C?G9T;h1Fk z#>oN>enm6`gcraqCuJqMG_y}$nsYNbBq?DRZb6!d!06=e2w;@d&&kk~otDL-g>RL9xc#2TZP2yvrri$Ss7t?1x(#@% z^n=$&OzM8nmp17-V3V%>x7qWUyPh6Ca`LBd6@Q?4wphe)T|2l9WYUx-1$3Rx<)r$@ z@>a=*Jr4NNv1k4C*t0I{wCfSu>~ZWCyBxl8m%iV*{MNGir4Y-p^Gh2Riw11ewcj?o zAHC%+M|9rxs4aFr^tA8(x?36D&`2p3EPP-f-@>V0U*9)G!D;%40s5jkIfyFOpozV{cl>#fV0>$Kll-@D-*nAMiGGgsdF z=%9fWGxcqjQb463Fwr`xsT8axkuLEWu^L_Lfn^`gtCKd}GLX{nI8UYeXV5ao-*H zA}Xn6SPctD@rVfOiDy)BtDa3JU|g(uBWf2t@#fg|wmInZ3$81hxLjAQsCMx!j|>(I zdgzr(ee#El;`eDHtGo9*OVeL)~H+xyZFv0N8~oz{mct* zET6F4vs_NJ;GyuT!x$73`6fB8ZTeutaQ> zSB_>--2P_Jq(+HGL_@uaQsoZ5MZ~WLltXfeq zVR?mG%icehTs|R$PtZ@mS~1}hp1Q#^Dqv75An4OTjX>N1SUH=ASg@AGS-d}z2X6q* z)~U>?czng6$~n1Mq$;nAA5EEGWq0@SODeb7@2uvQHk#N7Sqtr9uam~y$?H_`sC46> zsE(-=%K7Q$J<}xLObFo#eQ+~=3dIT-6o{28(IkGYWK2-0`UU0Lv;M%qMnVQAI;1j0 zHWU_aV2ULs2DJc;yV((7X(FIm6Zmi;R0B8fL8}NZ>p~vc=cOU&4Y^EpAXmsjdO?YK ze-JRbfx#-r*fohaU9m5f8&6krcQguaK44fZg;_=~FeJoO%9TK7BDFA(78Z+|gek3| zOCsj$SaF1A_++JopLiKZj%sD4b#0oyE2Ei=Nf%a^o58E+CHvsMgDT?70Ml}$pi8z`E z6Q?DqTEko|%EXk+$6#ervasX409b)hd?!uiX@*TA!A#*2$AjU>OSzO(Fc&XJ$*=+z z>yV`so1$j8hrnKG(cD_TVgf<5%o##M5Jx};AV=y1W0T{%$V^~G#YjvhAqg4OC}AR+ z_ya8fMTj6iU&x8{vPLL_)ymOG$zaf%$#7Enq&4PLk;Uh0Mg*NOsaQ~?nY6&fVYV$9 z6QP0~xrHYftX5$)9XCK$s)8`Ya+awe5x~o8ei9KvNJ$eTau6_CQqAD)2%9n^3b5D$ z5rk1XwG31c5&~wSvfzZ$1R4!hK~$Wb+wkZ*X#%%Oijt%*CJOUnkqUr&IF2GP%fykf z(hO2yX8$52v5rJxkrei242jHhq=9<5W|E4fXtpg(iU6hY0~<`nd{S%%+**d2 zs7+ulA{@^Tt8kGmduS*IWZYthi!1cG5F{|^S%q;fEjIxIh(z4!H)6b~(Lzo5;1B8a zHI;XSjHM`GINBNn#sS3#1g3@LXt#@y5RBkFs*pi|%Mndh_oVfAM?5 z=&EU0-mjc_*eMrp+T)PUyB&SP*RI&-@N+ilcJNNUzfv{nW1m!7gCe+@*bpZ*-STRc z@8x6V%1Y=K%Rci5aW~-a79G}Y;qg6}^xbMWzq9&uyw|K2h->xRrexUo!D2^dXevfC zcqfVnNNC0nxSM8^U;O&d?t8JMa`K9?AAUCS zgHK0I`E=COzmECvvu6g@TyWLxU)bhAk&`ce2>iMRm>k7?6}|Q&JT`3UP_J zMNmmcLllRMnk_aWn)LXaqs6SAd2f7a{o+>(Cgrx=`&YNURNA;i)fP7_x#_M~#cEz0 zT>oCxjLmmC?E62vOS3>tri*Hu?|q>}9Pi0@#ys<0wOG(W$9#M9oetfh*GW?st^DDy z?$3Q;*TUK+6(&kU0h+~XFrj>N3u_iV_)?iB)-yg{x#K=3h*@pYwcm!CKyR?ijd#CZ zJ#*zTr(c@ea-U7R4k)Z$)Hr+PN6S{uT()xJ{FURU{o{~Rez2ZSeCz$s`u+`Xm$7Cw zb@9q>`=7kQcD?x=j%DS_^ohlyVO}zdE;j+f?%bMdNhz0i%Rbzt$I0iP|A!y^;MSl2 z?139^di=&4pS=9?yH7glXZs#>(cD*`ZFuVOh9@7df0DN0smDT|@YIuqxBTJNwBxRVG%(Sj#fq;ul20ue<=o?R-2v0=6(;WUO#p(-UuxS#R5ePXF$& zOBNDI%p;FiB2RK|;k0E052=ibOM^9EMV?7IKSeUAICK9lc@{iZl^JKt{yj2D`qQV^s8J~0mB3)K%zsE z;azHlF`uzM;$x*qC4Uv&65Vq(Ok9Bwtr+KITf`LYXgwN9jyaP%3Fwn5|Mq%^=|e%<_YMk(5?h z$OX$v=VGvC_6TAu27}SGl>%T#20*l+Mih{Bbrw2PO?Jhp%%eyu$4IK_zPT1m3|UsM z<2jKlbihnQt5B{aBP~=Lti$zWNflP}PMxodr1(fm0df!C;=)8%A|1iah=`_HU)hrz{4BLSy%A?E^2cDk-7F_4;hu&l^sKt8D=bMBhUQW({0;!Y^sNe$~z zKn+oVaZK?^jcmN>naGu65;>^dFd@BY6T2q6Y7@~iZ9pk7n1BTxf=Gxq*kq+}yFb6b7E|8@ZANmCAu+<|2 z@1hL>7XX|N)X0tzM;wO7pqrnF6GC$AWiVtWf+P;+^)7}bFpkONB}Bj^i&Dm74tmp` zNIGt=lHy2wb)iyN;d^i)CpDpR0dOk1riHSCNhWFFQPINsP=Xm_E2(i&F3I{piaDHp z(T$sQ8?dqF$~*Smtj8heTy*2O8UHxzdpG2^+HaHY2XESKfUKK#A0X1T-nIv9umdbB zw^`3~e{yqa!xCyxa8Ux%IjQe3qZ5HJ?|EITZzt3@Rm3%nn zgTK62F&!6GHGaY1QL~Rc{Zf&)KRo!3rf8ai^g7~envqvcSwV2lZmv!_c#gV>fhbG* zkri}EJJ!UnsAovyirSn1(99Do_FB@nb3r`8;-32#9m@TIi+O@YHO~h0_zdOuD&`Wp z;!qkTCFT$fUB;%D^6C0;5-p!pWov#fFL)FSWy&tS2_E!@vm2+c`bCeuF)Eka z`k8mel{GGVYxH8KF93 z=0Moe-GE(ZEMK`}uM;=et}hIHtNl(q_va0BR$lR2ZUEb;OTUeF?7vOVV><74UXMRLGO)O=86L$rum`2_ zGSU2y;W?r=mIc$;zFqd=t~;H4&pof-@~7voz2>1yesuefestT7H$8dZy>IN>=Lbb+ zo&45mUwZ4*FTHiz$!gy`)$M6tdiV4%KXyd_7oHnDeEgyzJja~d{Ge*VvPdxpUI(S| zjfkw(unsd=gD}bu*hsW0*1ODYs+%5vbIf|%^gi{w*OfOelfJZW@wK2tJD(aZ zlBwWj4ZdA-y&kWOm{eN7^uFgcj60nE-RsLHF0W|#_`Rx`J0I|s&buG=TES$U8f#@< zCm(TxY<%Ew5Ynl)H$`3c+`S6#9PgL0VMZHGO)wSNN$KhM=cC`3_d`+$x z7XA0@elhSZ_qpK8JI8$RS#j-RvA%+uMF$>pz6jyVLnrE!eAf4G+N}GbkG-bPVb`zy z@OR}CKUM*Sb&HQZ>#|LI40!ylapGVxggc+V>36GyO}EQXIy#inT9awRyV_`08GVeO-gEi>3Gk6vnsJ z(T&?BL)ho=b93ADKIW_|^lz8zAX%=KNl^e6=bOfgcj9Aso*62RjSj_$%|)IxPgVTyuREK-3f zjKSCJ-x|Z39DzIKI6G%Cw_zzsp`Z#XK-23;N(vJd0{RX>1Sc{^K@2vom9+($oOIn@(_f_jD-}WBdO!W?`njE z7AjQSgXdX(P$rNh#T_~kjwU%qvb*>!sT_qw8L}qUZmrj3TKKqUkKiyLl?Sm&(VT*^ zNkl;O)a;~oRBIkZ4Otw6V^;*%hShmZ@It`kq%t|F$q(*H5ci8II{?QN%|pY^Sx3^0 z^LSVAd5RBASR$3<3YDGNEqkz#hpYh3tqgr;s6bj0b2oJsx36g5Y z?{jeh#yF!K=Sm5AP_#scSord7e!lif81-?&S^ zFKlZGJpLQ<0}+R}!lH{9_`_x-=9Idu7iWjEgQ`WLo2XwO5wdfVfJ_@BY`i+NUf^`fG> z=35^heEprTRZd#5_o3%JJ#gInBWG^k^H@!2xG0+4DjH-4mIw)PeCQDCSFkDgi3$+o zihBH`sX+}Z_?^|EU3n547{qfCT{N~R@GUIvl;x^@t%XwTi_X{o4F1l4*zeM9B#;CLV$&HU5 ze(DbfjWSiEY~S+dRVlS8uexO6t}|E`0AK z{@p9@$mMo=ZN$V;lRrK4!W%SJ@0Lv;HRZ1&B-Jy;OP|PnVdwi_Diu#-F~>AXC6!ND zan41*$!)yHEswmfe97+^A+a~)l7Yq=BP^_d2M8F zgI#vm=Oj@GzU9U(IOzEEx9)lDn}r{U>chT9&KW)Rv+egjDYxxGV?Kgeu_6S|(dVQI z`nT2oN1Xbj8}EMo+CRVa<6l3#*P&m_ePNdYr~I&}wz;HXnV8kaJ0ARA<;-43oZD&V zBji3}{GzvtKg?~p-^pM9xfqK+pWF>tw?v!L7n$>b zkxU!UZ3hD{8a1b+Vab`_yD_(M&nMp=S1^82o{1rhnl+-j`I)!J=Qi8t%=+^uKs+G%v(rVEp^7__9 zC&5u8B)Cb}XGu(ZqCRIEv`Fq%Uvcp^gFjAwxwU^TSCvfws4DRD5WwM-nfa3LJk zg(`%A>_p+H$t7dLQ{5fVNeP?PW3YA}U*VWc?z2TFh0T5h<)o%1Mf@-qjPbz8MKRL& z)HH$CwJ>XP@E{CCV*y99$rxlniCB-q3hlAUNuf6-Y85=GUL=k|Z3~7w zsq{|d-*>625g-=?L&2Gs3t**OEK><#ZHksen$SCu9rG~AKy+Dd(wv?+!eoF%il{av z6*59Oou~NlE>(*=TtZz4gV+m&X>LtGVycx)Wb|~QBDTg~GvFNx^^@Adx5@ z)+ZO@zBugU}l(>zPs+*FUt0+_mjzH3o3F{HSmmQ2+mYy6c zR?HNw&=d%~iJTdc7j_uW6r4St-A7n<0VvN*DJ@Kepvk=}&wP>L09d_@0}W$&P22;3 zc6+6yax}k^tVxyT#~bX}N5m<&%>kNNzg_;(7CjEtjA5g$2XES~znImg-45QAc7XVm zI2CgDgE#7S@J2iIz4n&pOX@U7U#LmH5;--ML;;bsw0_C&A9{QHy-(0AR^Ldv&{zKM ziG#m%(bjt$ef7=H-1}n5uWo(eiFd~oi*=Zd?0e+b`33wo2j2HwF$7pwN2eBiNj0an zDO&R=NRHAC(G`JiL4M#=Vl2?Dd4n52uD|*B&HT=)C%?0*oIZHMC*$t%vjLCaQ_M;^ zhE_N8014PsJ}f(nMZus<+k(YqNf!)<>adnoHgQ?i#1$Ib5#tw*{NR)OUMN2PYgh0? zquh4)KnNFKb*XWJ%-F>u!HJxAlQ94yk{?YStFJ9P!;N zZ!2qDK4SE|qWZ=6K3gb0^VsX7imDg!V7jsM$|fv7_tKj;>v4#f;Z66xDeITcyQcH5 zM;v&<`K7hZVsvs;Qq89ye6b{#>o#Ng$}YXWxc>HibdCP>$oma*S6+D49cNwqn{zMu z!#S7y{N}riqqnhm=2+lb#;9h~d5|5v|v!#k{5Z83Gx%DoOd zCzspdffvgPYZpOpV3HzN{Ju*RYk1HYksR?Whz;@(*75kq^-k&3ZMHgUuf5Le+4Gw{ zdwy$=J-)dI!Z-Ka^IJRZ^WDdCxjVm*yK_DEJJg1p%iX*AXx%v)JG>C=+>CA;@KW8b6C8#(Edg1SXKt8lcY(94Qg^o!*h zF_5_>4NKv`TlCs|=Of=P`>1gIB9*OK{;^-Ze4{P{UL4w>@5!NJEMw-4nerDg-fsJS zY4ns&VKv;L$0Cvl-hD5WY`9}T9)g$K!F%`3x*c-rg}*Ky$Fp8|HsJSf(lvdf;DbLt zG*Bmd^`BlC_tD=j`o&$j+}1A-pY(Q#uJU$2x$fbjdOsV`OJV-$lv`me107?s4$h8WUXtXgNGn|5094TEA@1L%%MD^Lp{r z5n~pJM>!eELIk&WC$pt^V>y&R@d-+X|7u75&Zdh{0 zcdtMF!W+)~-t}jGPwfq7eD9_+F1+!q@7-|v_ip;?g*Tq@{Tt5y?u}pm*0r}iK1^R+ ztVh9!<_=WwQNG^~`s4z9^I=K~-GV_4j>oL4)i}VZcyeG+EZ-|Q$9DsYFZoFo*{yxC z#59*@SHN?mp2^DcZv8-fU#hp>7Ul~{J7 zCeem;x1l)_e1p6Aq@jzuNu6`$lX?}%Ug8^qnM9FP?s@j2JusFncv&gHifMpcpkzUE zf@_)QC~~4kuosaW!ITSMlEM?Tn{GL&y5JQMI^iI4MDH~#97T^cGX_9X3tkQ~7cxJA z8Zp%t7|LYwU>-sQg19xCBB|n7-!^H4k}P+8m6X*gBU4LZ<{kn^B8T$QmgrDgu;MhO zcg>P3UFjl7~vFM>;O(u|peK2KLvHo2e;ei8;s$u$DULnZ<&4DQxAf+(Dm z0**K)IT9QSN1GyP{MyHn6F%KHIAR=&SE4}D%bf^t5~`J~P}+$M+YzHM8G{kQks_M( zMw%UQ#KF_^7{>Rrpl-qJ|2vv7cskjf2HLJKS(6kDc zg|bUOO{0%H`|?u$q^~)fxB>hMW~CXJX`W_viynHlyi2bWd6swGB7GQ2Sukn(^J9az z*!l2ndLASGwnMKI->H~ZT-V&|@UJPRlCHl)pG|uVxZ|mzA}zs}@|=ouG3^-veTo$% zcvo6hV%-UT!f1?{JIKtcv(M{>Uqf7Rg)OQQB(hN?j=0Ig0tg% zH49(D^R>UQ^TV%Ij{Wd&Cw=3peUCi1cGk+P|M+a@U5|RRaEhu8+M}fRzgQM)R$Y3X zz%x0vIp~N}fArKlV_zEF`0}s`FAiyJn7#5>B6XYXx#13dMVKomuGqQHsp5E>bkRp^ zKyIsjd4dJMv)Xb>)5`si{^k*d~UU@C+lzD`FRXyy33bufO}X8}E7j`rBW5 zZg7J>v2iaSUJXkRKlPH_#(Nxp_LZl8=T~1o|JpB~ca3=RwtF0N{MncP{(*Nyu$Atd zi+}s`KR!2n+(NTHJ{!-xQ@wGQgLB&+^vdu_Vj8Au+>vtJCNB?^I4%A!fo!nZpQh|MR7}PWzqngWtVVHsj^t6JHxX>7CMPEWwSPuYjd> zOU}ILHyiKR|HYw=MKz1I-tFk!`l4kb_LLq86%6N-BJR)NGMe9>KD~u6rH&wWr^!76BIX zm)FzpjPG^Cxw#E@-=puDm6Jae4~L)lF@q5Y0y8Qe5n*cQhw_mWO2h4TQVvwo^sqko zRZ-p2@<#q9vTxFxQ{J#l*~=y@FK_r*SDdFTHcDP5xx9hDsw|T<;(O+SFvFlm{>#5E z!-7J^LYcx2@o%n(Z=|g(-?4-hf8h#>g(=4a*6SDe2UPP!jkw1TrV$iK?Y#0@5h}VY zYOyfILX+4+5HL|A31TnluEIpRU~8;RL4oF%Ym(}F|Gd(b{#KQOK&$Lxm?#8XNPI>n zX%aOuCKJrNVs*>>3a%wRG{(0D>MYD;@P+f3!m-E$9;(J2gSbRM9`2|4w|@}DdX(!d zt!;vF;fP6WB*>BiLStZP5`qrJ0uk#x(hDh#O%SId1lF32# zsx=H>2Xqz{CP2M8i2#}w>lA95AU^Fp@TGWu2E`jdZGm(g=?gTH zn)Om4cphRA6%xns9g3ek30AXE^LtF1j7k{alxlE27N97i0gi7H61hY?U`>&W+x8^W ziZl5CRjbSB>0;S8MW74u&>m+kvcZCnVv1crbu`g8lTlLX1+z(PP*Z1__*IfZ`2^L) zL{gOU4HE-G*94D5tOb!Y9F;|ti;859!x371Av_UTLxiIVTjpz~#5|sE;$W`9)h4ne zlbL`VDH|punO{|bhaLG2H;t893d>fm#6)PJ84JrJq#%f9^9-r<5nOX13LCHTC=6f0 zoK(BHlQpUbSePgyZmWx=XuKR`(?SS_DV9vgBu#kbLKsIymPD zSEL1JBnauGL?&{^h&0`Y7$_-J0Tb(Bq90DG2*X?n<*_oBWFiPmYVNy3uc@$zqUP3$ z0Dz3*7!WzRn2Jd6n**UJ5Fs*>6hab7ap9!IaBw7r3WiWYW2kna35@R&G#I)#)~6qI zD>#z$(NYXI0aB-!fUAWji4T|s2^JL2L`4Ez$nL;+7={EDrWtv5Yo9d3#+hSK;avH` z$CLv1h@f=x!V!j$egdS)IzcKL{jlZ@cGhfflWqr#8=v-_Yja!gzgf3K;7;8R-n?7l zRGW1*zv||nU3KrjNsj@WcOAgryjp)}{x)v)LXxT;@3D9l)#`(!$!L$>r~LTW4^~cC z?laYw@S;H@XNuHy+U6pdzn|;0k5VX?_?yVpdRrg(*xREjC#|4b zGdGxwPLR98L_Z=0L<=rQ(qKXSeo1)olfjKE>i)n}*B2h!b4kCg3M$jzv*M}i$L-nN zf9sN=HPg1pJak8WcHNx76lvwVagQLrGHOow=|1SP?Xyp+TPEtcGH=WDs#4#%H! z#p?x=M}6>V#pI7GC#)Ft;a>-hob`ii?#t!6eD!-bl+`bhW00ssDijm?#669$DMb@G zG@)`aJdJ?08Vf3^5N0)!X9K=lUBE)$$LC-5=Ui^bhhC~^oVW7HcgKkTeB;tTh)rn< zc=fF>~YX3<7WK*2iM%wdDkP~E}N#$9yNH%{=iG=sq5SAeZq#@_1RFDewzbw8||6fboX4Y z`>wrD9XsuB2OWD}F4yA+zr4R;?#eSSye_xpzM6k;tdEf9`djUH#)UWdZonSWZWo44D{E0NhS6p87v!51U_0y88E-$*u!j(TQzVfG~KfB_!3(kG%m4czwP2xy# z?;i{bfdb6#;7idRGHQM>DE=m|^qTsQ@lS)yVWd~J!^by0`POJLt24fHU1@`u)!dTW z#W&pjTJ8(G{Qkao$|o-8X^k^h9(Bg0xs7&vZP=vBDW87*2fvr~>47z4Kl-e^ereUD zPe*_7m*M)(9J@g75IiLv!(Z0!f8zJJ(`+-}ezx%*qQvWMa}a;FJJ;>}pWIS8@skJP zx|?sXeLr1U-%7AZmvxgKhkRk%K2N+cwsP_cv1{!^#_7NHi+*#@o4QOF|KjdZAN+Or z==l{BKECO`H*@RleBsaUEUjNIMlpCaltyGg%;7%-0iJ$O8CQ~d?o#0x7mDI~e zD#;I-pu)lNgQ!t+N@^A>PGL>@!B}yFh}Oqt4a-U=EG@5xM?tI9ZIJR~eVuABE9yTE zepOyC{c?pBSz@Wm>rU^Fid+6%hBTG&9CkDe2rNq_nFR81_C&Y%y;;@loaqp^{E7CI zLuPoux>*xXV=uEN=u`aoiq)jxQ8KaIG#Bn>^*a?3(LK&tgt2PeH>(NQ5^)C5h@tiIB%9j^u*jLdafv!lc&j;s8!c zOzzO5NV_EZ6nJ6aX|dcye5eIUGs?v2Ypx$0DY%xB!i8WdzKc&hfg&-9fq;bY;EO(^ zXIcEBx~4)$P-J`wYoz1EAG5Mxmxzh4mybZQ-o=^;VWB7nu<#WDp&yCk5l4FH6HhW^ z&5A7SR4b+@cgT{vn&OAAiBRw~!g{$30FQPsy^)F9REer3OJZoUiVr&}@G|a)}1#3cYCgYP5Ub3#5swJ1K=2x0z(>2c##{5TkND+U-S2CQ3+RVooqNo;X zwP5d4Q+kSG>p^2KPPub85dp@ixvrd=Qs zz&K5+B^M_JYZ8;Jokvp1AT>D%j>PWZiVWQ%2(%-04BqlQYuy5qMCUQ=-Ufx znc2shmB3C49V*tG*p+xEI6OyT)#?NhoGb7i4Pw@s+BqqB(E#++&(ES1FwrfNQZ1F^ zD~*^&j11HThLcY!cPEOHsMg%TrV(O^@JW*dy5gmfkVIFqq-ITyjEQ3448oXSiGIL> zNeaUeqrem^MQ{mC*`o~kn!gE5B2C<#3oG1%+T;m^C<1};s!$fH#-1gi9QPtju(rl+-CtysUZne=p{AtkYG^mYR8Mw;1^Q? zC@{l8X(DG@#ca}NCn2a#l!_xfBuhh~UFf^GiksQUqD@Z@|o&1g7O@OJP;65#ymx;w`X8QY4dFpPd|2Rl|7X zU{vnfpjA$)3B4jqGlmnmZHrSz0Zu5P9 zdE1M{4NDYO0TX>ouzd$M;;?ckAJm(+5oy zv$~%(tK)kv;dfT!hg3J4r)hjdlL!(IcGo-}%BsA+6VK#l?g-7lgJ}6)LE-rk6kSbb zmWb_)o%$CMo)P||z+yrE3^!GNu;PXHYASiop~)EKIgTllB1!Cx+d zMv}`WerNT_tChK2?#Z{u6p~2)Oqz~6`-)tylkYL>eE4aX6f*t`H7w=zOHRM=dQEe4 z8|;!3xjEw8fmO5o*n@fH6P6ux-1*)1J*gyq12(?t^`a^3Z+DQ0nI_6t{O0lU#-*C# z4^By&gIUd5v9fEglX$ZH#=G;I6SW)eo?CyH+nyTw(vSwt`v;tIQO%5h{OGy|a=9%< zCje})M{X0budZMJ!EfHHm@YCfcIs#P#^W4KpG2iR0_HZ{6R08LCO~%~FvCXAQ6(ZX z=DG{sDf{r*Z-2e&x?h(4>YDOjU8A<_SJ$?ZuPOVb_G`<2jixj-zrMQSx@+J1!G*89 zQZ#)0BBcoa=BHLTDHO{qS0-2HS97G75RWSqVCYB)-cZ9-)sRth3jG9&+_ndv{@v>| z{}vz9rGG$#XY;-HKJ=VdhEII2V#bxff0EzcY`*s^1(S+v7rj?8JGWks9rixq@i#|{ zvpxKJMW8}0H?0w9) z$4~!9=>#50q7UttzIDw{u76luNdNX<9Wi-_y-rY~-`@ZBb3^K%czx7kuaA1@)$+HC zrVbgqfag_o9gy2>uUj4)Qe40IsduY4-r?Ylx*q(>@Jafb5?2v(&>4w4`7Z^R=C;`9 z+dsXvq;8oQ*HAGHNDHqFm+|$D4LSX zZ69k^{^=K#Z1AXAYKQoV6woTg9BnQ^QmB+D69Bl)JP4R?1!Mt-RVK>w`jQ0yTx!(Z z^2X)wmd`xn!t3`Ma88$AU)uZ7v(LET`nSubi}oCP$`5k6?T$G8(jx9Pov&O9821E1 zr6>ui<3ASc?5rIr=`8*#v3AJJOr;w+@h@BLaZE0^%>hS$Q(t1EKlq#P;ncoUF1L%W zBY!|Sx3k-9ml9#;tlfABKZ=WoWRTPxi4?42aZli^^lU)(nKG%Qf&4s7cxo`?@?C-> z=j7l~5Fu{lgA|!!nQpDPf>`OTF4BPLk!T2$oSwP4g#0(;!;GYU zjU6T+!FXU07^kz6q=vD)rfIkIn(UG^qYaKM7Y9KmpoRRJl{7)6!o;3#=c67gP3^q5 zL?9Q7S4s-)abZvkS@Df%?uINLBIe_+SdjHN%AF-3FEokrS?LsJAmJV?#TuxKG!ZA# zAqQ`fM!u>>|hN+%T<{t#Zw*9i!@ z!pan%$_);aeUX(E0^kQfr!Ih7e(avFoHFpp?TzLB(VoiaN7g>~c>$&0#aLl@19n(u&uFx1!9ooQSQYc*uQG)l%r@dM*Nz>ec zRWo`Ya~?kh*>WF0mOw%#chYWIf|P1E+w0h`URGAW#H(}WY#ua)CBBG<6X{#!{gJbF z?R}~yWc=@^YJFubditHQop(EO(;kPM`MvAKH12)2p!04=Z0J9zwZ*Q7ZPNV^k*nNR z`=5XLpWiB;sxJ!Ih=OZQtl;7yzU`26fu(qr$;(!fHBijjb^2rH4fYc(nh)y+kLsJP zS>5wM^C9W)Srv;})$rsAXcCkuTBfbRZ3sx}lvkWe7#NptvnKB_2jZkQ_?r@GTJK!uT_I3R2;=4t89Dp$H%Do@ z#wqhxYxOU2;X|*KU;U?N`NOaLTU#hvf_2=&g6c(2ygB+8H$Qv#b45c&&1Pl8am4+^ z%`~>ER;k4zN@|AwP`c~;j@05P{ zR*CkhFAZ%hYg~Hibq{aYrN7w4s1HATyYwSX=--yL^uuW1D4be8VX11!<#rtP!C!PP zk(9M5NYtF5I&z0-kb6fE6k85vvzOZ(21UF}MYVkL2X>E9KF?xL{kZGBL#)4uHbN1E$#)$gAvs%-m9oVuK2P%o#t?37+-+n<^$Q8$M>itHURWQT*WA`~3_F2+~mVqF8rIKj;$4A)WWM z809jwS81F{iU8kGQdXQ+-<7MReyIj+VA)KKnB-w&77XP}vgv@Mznxoe*Q3t(NonI! zT`ZQT;4^rsB^~QmtQx^5AvrKEuUVx>5o)iR{Ari{P8OBwchYyuCwx45>SwGXZoH@H zE6=Xj%&tL&w|pylwMD@{KyI>qnIH$iI3nWo3O5DZQKfH9HRNmU756Ek-SOVU`C za(rCWn(zc(DZHBGF6DVm36oi3>!b!lcuXpE)+wOe&4QwS&R5h(GA=~Z)WN^1a#A9I z7mLvRKH@_T^MB}j#nk%bo{vf0riK8);#&JmMELfpNM6(N%9ta**mr4-dzG$UR zL3)9eOVk2K&55a>)5k@4f+Tl2(uGvm*8)|sl!TxOw<3!c5}*4+h)+^`g)Fk9P$`A* zl1ZAVjx@nN@+r)GoD`+WzvefHH;d%hv%@M6hFIiobc7Ie``(bzC%pY=$r0- z^=E&4=9)h}^NT+|cl95ix%yAfT>Zyq)&BgJXRf&!`4{X@{pz-t^v$440~J&>1y>3s zRZNzQQhBl#H!Obmejm* zx!(4@_Zsk3&Bed*qu=MY-cPf`pWgIn<>VFSX)GT>dx**U*a#Rx;#9HL6s;?XGo3fM z{^Pno{$bIf{LV_uYDDGqczb3l`SUMq+xytFE-Rb# zvC2>i?! z%Wrz@XTN*u^4~sj#qXZD@;6UP`0;fQJ@NKfeuy=4PI>*(C*K+W-Jjoe_^FqC{gRs> zc)7f!4q8G|SIz?lN6yh_{*@7v^zZJz7fKbDL`osTLsf7jeHiX}rtqrYJ^gm+G!31; z&!2vGym-`W1ye+929KHhe#MN7uDS2AH%4=dBlr8kE5x9@BqfgI1uGVj5MXrB7;c&K z@2|w8AY<`lb~(bwpc%eHPZ}`3r7$gd`ReH75v)x5s=2kH7rA1(jk*{g4UHuP8j;n|<-JM#}xKKJA6AJr!f#%SVXn&g$M^yjS-!AmSF z{gJD9?uEedK#NdPQm&$opI3=5!H(+Zmp5|DUo1LFfM3pa zc*L@xK;}_F!(dHvf%XK(j%v9%P$rWob;}z;N=QVD+XcneXbpg*sr3zqR(jC}($(lS ztGJ_&yt1+;27Q9A%;zbBno@IjpYdc-%hMgW+Ylw3r%e2TTM#91^P39BU9#r!a4Nhc zJJiDBMl&KiDlD?gh7_SE3v+tkxEPKmQ6z*kyIHKpMdZRC_ySf6vA}Ha^g|7zB5qM_q;D%1y8(%;x+MgsI+(` zLGwHSa!;@VRZc*BArh_)8E%>Badartn7Fe}CrB0pU_P3oM}?FGtt!>LGo6$;0NJ58 zmd)-Q#CXMFxFSX9;}le_xSwc@SAL|4-Ek0f7Tk1aW)h@`pP#8;fU z@QUI(rv7j$G-M%yCXpT=#U!bAUH#-p3b*h>5~&Q9n_wMc7w*~$bAZK(5}@>IQV=OLYHOR~NC@ODSz_B%>Lp}wNw31VBMblg}x@IXjsw$GE0+a|w;R+*8k*3}1rbMw$ zWd>3U_uwqdJf+dZTBoc@wg3cSoeG(|=^`4n@mL7oRj6({FP9-azg{!{p+bJg6~i*# zBM>Y_Sy0+V6JpJ(qxeWFIipgL1Tc^m?$$#OjLMTQMbg?4FZdx5lB4lV?nUGj-!8a2 zDd~u2MilG_I;2GYZ5w&z=<;xMe4;t2ro2u{Kun^hLOQAGjpqFXPsGfjsEWaHozMw^ zaRCz?EZsO4gePvBvk-WY^QF=#~9+!9mJ4toE zUfwaiakZMV)0!h`aC|QK@_$K*Am1!0Feb7(m#j9xltEZ^txsrSE_AH$PailE22&dEZ>8 zUO&G6;fe{%sgPeFdN#k9eV zE5_e-fAb+b@b|3xZ&fU2is>A{8TGQ1kiQtYiJND*&{dvT2X3A|w=G zT18U+IP#KT-ugVhklCWw@n5@Q|k_S|1F!dqPKY`M^C8lH$3`drAj>3v3utY|7{(=^f{Tz|Pn#DXX(YYu-mBC_~ z;&=&biDJ^$E-tQLDp~&?^Snr3;HC9T%Nm!LG%PI`-{hps`xPgxEScx%q>5`)`2zpa z3HB0JFEODRK3=(araWE$>8+C5#r!V@Qyq;!kSSOKIlbLYl90^$ot3U(w` zqwYvC#%#%G^la`4)ah3_i|LRCN6}o8i5B!sc##nPSg`33OF#oh%~tlpn&zX={7Eji z%~5CkgggC45uC^-HWK7$Zlk=c6q(GxaEOlys-w$SQoCftxP_QT&MK~6Tv*#&Si88S zy1AfcadAy^QO)9_nr2-W=}Xkru+!yA71u2)s^-xe@+F|-i$^7Yf8bOpfNntqJEwzjaRYI1a}H6H~yK= zz^Q1>&FT^cLLwn#0Kv7?6;B{$-Z7AV;svvL7OYIJa18e4Hr*vit3-Kf#IL8|Lei(@ zric@qN=jIYGrzsuaM&O=L77le zgUS=kGzM6#&IP>z<3u2lHJ!zjrA7}mm0(^ML0EeMuXLJuo7kvrxwkNqLPf|TNAPAi z%+w7ajs&ISL=2NVp~4C$G2vlN33lOMXCX(mntTi6Xz0CxME*6_?jvks8lI0theX#ikxE+E_ufKf>>?2` znev>9$f*p9&tzCoB!$~VQo2mjQ^1Ar1cS*U!7M1Hj`}sd&Y!p(y*L(eAPi~^76&kQ zipTvquQ`vDkUj8DsxFW22n|We?gb)>6ecvW00kj|TEMknFYq5HbvhRSEg`k3k(0uj zB3)EM{N%z;J=SZ&t)#3YnM)W0h0p|-II=3Kf+*lz08wFpp=v39_>wfTSXLYSClM8O z6^9l_5wO6RPUf-LNiA8AbOphFZEYhOXSK$_T?dYMFl zhfz2YNyjb_>u_-XpD`&k(}MXBgqY*>U*5$}y*sYYap!Nd*RjWa^(TLPbl@r9zGmYc z`+xD=t6mu~X~P}+)X#d6ih)Hy zFd`A>NK(zhjT}<{am}A^TYSj&O~>rMc)<1}s`yL6;~sdl`H<}w9=rSEgSRUhUOTk9 z*}O&W>33GpB*jsX2pF;-=KwVlz^#NPD>k+Kq; znKzEyZAb*Oh*NKkt09BLIxj9 zCR@(Zv|fouvBqURR_*vgz0hQ|EkaQ<>BJBaA}Pd7-2f+!32oh^ndRCdi?_r)&$RiH6gejR*kp~k2vHK^9d#s z)fx!{3}qx@=rlb%9xlI~i$u21^k~ip48) zArUIE5fL`HQ#s6p-%XV?Lb3Q;RmlauWI{ztw-#lQMDqtiJ~Fd|r!f8Ukxnt!8*Wtj_!Kct6DWJxKb(0^Hr)gd`*Iv%ap!2+x^1%}{I zc>r;UZw(y7+=&(wGkai#ady<8mZXwJx_JD0gvwlCI1r?W1LfeBJh>=1vY5d90*{zN zWw-D#t=9zIj!MU5T>(V^Qnfw>+K_9TxDSv}!En^JNy^mLsU-)05SXN9J|vX}!jO0i ziKIbk213`j8m3hyl42zzoWX#Yj;qw*W17uNFt>@Mw5%x+DiJWM3RV+D1sRr-C=)ek zh>(FXT#6Ib542m?bsmK^9Do!ic4)0OHRdp^K~O zvIfv>kZNN}?IDG30d`UnH5mZA5ZKI(m^f;dZ@hekBxyL3-C!#<{gn)JldQp17M7KK z`5aa(B7X|_La35&VRbyQke#Gx+Biz%t_Xl{cym(GDoy1{?P|G~PcTi~tgNl$8nv^AFG|*!;MX{1ed?w?f78e%r zAQd`mCk+?3F5AkMq!G3y1y7a8G&DQO~6YDFeVs#b#|E`J`j{ zqrm1Q{_DV|G$ai!AsCEEgn@wqnKHsIFhwYGIX=Z_6^`}u0Hx7qz<*JfbYqgQNr>k6 zjs}Imk?f>kif;hLQyX;}mK;&aWF>!KS9m2&RLXiDSE!_!BSDydH3PKn1KtQ^YuH_VhR%uraO$C)7%|7$+CB3(3_|1(&M53w}4y&3m^IIn`J7AN> z>wht9Jb$7`;2}C4m=6&&rw{iaJYqg%*De^Xx}<}Q!9x-_k}`2Oprn3rS>tkD0wY<5 z(&XNb`If~f$#WR*-5D< zn2#_#okBBp*FzToEQmT?t#iR!qUBuhVi1C*I5nZ{#ZR6ngJPmQ#Z(J5LL&ipC>HBc zb9|1XQhr8-xR8?a=XYI9xL7c^aWuGxxznihGc5&SMTH@S)xZxynkC{G6>8ouuz7`f zkt4XaAYfu6c7&XGKwvmng;xvZU{!~huqG?Hj}b@cqB)6LID-Z1B&k}Swx`{C!bS>Y zSW|KY0C`9P1WbgA)gA{SEY{I;--nN7oQh?oaPeZ4-J^wdK&U9&>`DjE@$ykT zCs2_Uht((e55C;I$N7ravCuT<{n6Y9IFMB@D2MR4h1IF3Ra&<4npIiDeCQVZ$BauHsbQ`crr=bfF6LLFI>Mj?e~nuT9}dQZG!wLwJ}T0iknh0|PPh5*acvrH3ITilUQ} zqe%-S%8qR)lZjaoD^y;Dfm$RN(SQh5Qj>_50fJEsj&3PNcwA`nGz>OE84jzYaD#Mr zU&5#7YJ_8+LAi}$qF_@IGOC_>kq7_fs}w=Id5dd+3z_X`ik~l)#~zAxxLR2wc*yRu zsAXb9D4qxp*Wz#NioL`wi$!%_@X2x^7;j>Rrm$uni9!ZLWY)5LqhJs`!<>{hMSz5; zY}f?^4;R+}k$~!8EvlU-N|PJ`Fs(;cQgtJOLs6JQIjML8<3OC?8$s<7!;un46GBWH z5b5lk~p3kMnYT zpF-vc&p~5HX(DN4SN+s1FVRk{B7yPXL4i#Sn+Y>V(-@MHS1e*7EychwERcn1ebgqGsL+wsW=XA=(%HFE z=4lWxD$&lQpPC(k;7p^@n>B%f!$i$aVd}Dw1t^DgH{G2m&LH}MV^m^N=hXa2Ot9c) zk(511j+7xNK1>V>;iP^TpvNa!l@x*j_kcX$=pHXK%AXjlCK#Z49A=Y z4nrdTx~`IXb;~4#RxXee(+0}O%cL_hB_$O9^PXx2;9NjLMTpOD!&o9C2wf+&tXZ;? z`jP99C^JbO379C5rtH8%<~~3;m`_l8#++gTuLxcu3rDDhV|w;aIi)aB`a6ea*JUWB2mMCN`O&k3Y_In78qR{yCL>sVSoaal#< zvWf{yi|d>9kFKn7S^1=8WjqFuXNy-%TwXC@S#j+mxhtu73$1w?Nm&+yS~zL!5Fw{X zj}7Ep#9OMHhSn_~QnzeK{ZjsJmBxAe!Xfp`276c6N_;hIC%9Llh$D@E6BQ}QMQSGf zCQG4oQfs(r5J&DF6fL1zmzVIcBi~tPya13EBKW2|tmZ$2^&N3MdtCtZ#Ahe9iH&KA zqY3HkUV|DtcLb?*7Wg_5tN>pHv@A!5@(p;35XGAaMd~0zVrA%+MFluAU^5($&@Gcg zP5l9gGNt$gPeIIZLTSE47D!P_7nBKVBs@yjCc%V30^AQdktNQzMdoSj@HEE3F~=sR z5lA#9GiaO?cd?g9Ev46s$Q$IxzK{?_)70OT!)sPp$s55%667dAq%blTqtJWB$;=1x zVDdJ{zuk(3CXg^0iiDgE_WL_{X!Q2(SnHSt?5Kr)v9x6x;UgUw#;0WVVg(-!J ziY}-=tHE%B`6#K#(ojDrVyGXv4mTqmE~YnTI8YiG7u{?bit{oB%96%knzG!ov+5Os zqs1B&iKG-Q98w86lpJJi&?p`W80%euPbNP$kT{CZ!`WH0nj6bj?9dzkRV&B_G$|IK zN*m%{L0QF`U@RzU#R|-+%&e@39YK4%y>(R7UGz6fiF8XhLw8C@=TO4X;1B`=0|TNA zUDAToP*Nf=gLH=sDT;*T(1Rc#C|wfLcb@0D>wSOgz3Z-Z|GNLNhME2S?9cw5v*Vnz zkKrq8lPJ6)h&=!>`Cd`IoKu^E_wAv#Z$qj4TLF@{diNjTQX*g7F?tykn9R2ELJLjp7mqJ6gxQGWml*s|=^RjJmjszo8k+yCOr7O6RF6Suv zQ-XXF-KUABkpYIb{)VlD${A!2(uX>Q{p&71z9Xn#VFqZSpED31Qvqd1lcNgzpmAJd z8b?Syep(UjD7gM?j7o2y0%^)K@!WUJBf?R-L1!F!&Aq&g(y(@u*B31NfY?BRM!t%A z>QJ!Vm!tNNFJy?u@CA9da(h%|52u?`9a%kDt`=fdrNIZ8irPRZNik8>%eeuqGKam$z zv5rzhS}bA^pnhS2h$Z`s_VxOMHX=Bij(U!VGPol@#64y-qH(4Ao=5F2kw^UEyy+|* zSN33^WH|*GS0;#D{m2!qRix#;)KAx6zQgIU^;!%!npsfqqd?1{eIE(x0aJy6n3=EPaQ-B9R8M735HmllpsZTtGVY#1__}*wlF%%jWpoz=yzCZ+e zWxhs?3=BhMZY!=C}FG!u*VU*eZC<1u}6R}ajz1v}w+DdTJx2Obv38_x@e zj>bkQDdh1V`49adNB}xzfu%^zu-8U30MxkpCPPPjJ3kE47-m?va(}ee$F9@V%la98 zjhxFkfhg? z{rBeO5Y2*3hh_>)^ooQ-&=CA2wLSi*`Fmwf4%BGJV2uW?h5mGHpEO_)N$s|xqLWW{ z24Msi_V*Ms^V+*zQnwqT4YLi;B!V9Dp|NGFH)M&fYXmb5N;1UEJPI#k!W1gbz9{3R z&PcU)mLM-s+>S3uSc@ShrEl;SOs6hK9`^e}A+K@JI4FODA{hx*Nve<_UqMrmpnKMU zWVu|!3|3lyuH+x|p3w@7B@(2zpzw{FbGE&>q(-pD3;rXCMRxvspa}Eu^c3LZskzWg; zDe=_B_K$3O>CE>qwE(;7x&CWjw^5u~xji=wy(XEFr)!k1f|I0cL~{7_la3K6pLM{{ z_Q`9QZ&ug35`??P(IO*<$kLU86wO(c#VW?bUs07E$-^(2Ue{U4=h4QAFdS^wr`szB z8VFgWI-YUgYC%3rdfuy|3j{S`gjzCk%;D}HvAA$yemD}epOFnfW~|BfcZ($<3hC#lh zcNZ*41(K-oyy;|wpai2rm*57XK{@7zoEil_L1iLE^N-*hcJU*%>DX@d=G}=L-DE_( zld>;-Z46pwP1tAkDmncGVS+$@QJ4!Hb&FJttt2)u*z4Pp`I;-{`Xy5`={<%u{taH5 zd(_Wp?2e$Xn9WY=1*i=o|NZnV(bikn%fN?XqRD@~D|)zI${0o&kLDesbAw}8a-Kp@ zc%SQFbfQ^sJrlm`2&C!9sErcJ2yvd~Ja)GP#adV?MXOmmBe<%KX!C`^(00&cFEO7q zpO*mM(hT^LJ)O?sFHjaBKv#e_@L85KcCbQ{L@s7Ko(Qqf=R|(Uhhtl*Oo#}MI-Wr& zer%GwY2msj;^Q|8Lb2?-(&mYlBgaBz^hq2PW`Ej!^~uT5Da(eiY`3Hf|F{pGPL}V3Erme=Hm8} zaF1ov4o76ATqkpOjMQR&Z1X$01DgHaN(EkCmHqU|ZpC}7$fJ5Xrc_zc$CSH0u1G$hasvF5wnUo6_tRS7v*KOD@<8ToYY_CuC-Y{bJSxZCmeIW5qLVR~WO-8j(Y_;uglVUQtP? zLafUbPEzfcSjNT8=k#D=k2|1i@!Nu(44p}mk`3L$3}oGv*OboTLnonOj& zGu*eWvAbOlN53U!v2&sf`$hQ*)Gu!10cvjZr8RCxfqR;@Mk%|pgt{`wD)2gF>o~-B zO+*Z>H!Ie_^K-?|`$4=30Ok*m)1fATCOlIVfjjSU&x}k}5m$9$?~L&j ztFd{aMr8=8sEo6mB*_51p#5YahhHwAlnCLaim6AlSU&mb(EAePN2<&>tRY6grI}in zQ6gT;^~|@W!#&bfEbzhXrWXAWsjiis`A=p<&Whzvs+CNlD$*)Df@S6$h{KlWrjSQ* z=C%Eg(`f?6N5Bi}o=WJ`gmsHihjSrNp{$X&E7;u8VU1Rf)ZVizE1X76djFA7@4j(j z&eTN&&v9>L6o&8q`V*4!v~0vG@BH5cK1N(xc@KAd zMbqB5wgR>31#AJlY(O53UjlCzxA{UUpzNko=8wWBpTh=7r_4EZw>GT1++)%}mJgFn zTm(xE63eL9d5I(}JQ-cB#6_4HeCzQt)O0d=zT)eY+gm^CUI5;6{@wNkFsh`}AyG}y z{aoIL9_979Q&?m5V_AuB;)1yZMRJB1B58N_>bWb^oXm**=K*mM#t*yAL26M&R;*gRIh_UK(?+gfyg|b6^@L#mAhp zlR`(3PPebrCtLOQ*#)i7FhCu;;SBjf6S+_OBB)8D@28JB%GIiX|3`J``sgr@s@UqN z&`@f(#l^hcasS5aIpLzT$PULobB~;A`P6QkQ}>v#(rwcXJQH5=txrALwYm#c>>*&> z!dQgyQJG^c6>rCIp!sY2y0j#?qSXF+iRZkhMU?VWY!7vFl{X4}$Si<4FeK3gui3@79I8yXJ%?Xc-?Svgm$yDiq3p3d zn)lQ<`&qqv}9`&-l+!ZHU;eTE6?FEgxiBb**u{Tpu z=tOlk>o(tapg^*!tDH0n2Qlfca)iEyn06yL>8^3QnRz?pQ)DP7jDV&>IgNU>{N?WA z#C(zKG#0`(N7y}1-}O&i2EAo_`PmUuEKx%uS;iK@rwc|sBSD&<&a}ww; z2||zr3&U5YG)6D78`eMN48J~b-&S#~XQlmmi3rtRfeVc5*%X3h@intc{ash9_d@Qz zxxRSw7DTAxf1jax{SyP*9q)i2%KSAON8l&f9so|+eR~-l(ZI$ubH1_I+RXD}k)V}+ znk|lCNo~Gr3`532^yX)C_`vt`rwcdY45ZKRk`m*NZ*vk4a?tjf@q7xEVTb+Y#RP9M zh9}(s_33_vllzpNCY6}xZ`&e7=Uvvp94Rp{3xf8$SnP#o%u4zKmaM(vl@h%LyQFXf z_E7cW_43+raD@YBwJk^>DwNG6GUT;oXc2h5oQQBR(O~5uf_=X0i-@I@yL~2UisL)} z3N*FW-k-7CN1u{K(tmc*IZ7~VY|-t%6mz7p7w9?0BBF zOsqhhcUo)ty9OCsaD6X@ua}E;_tUVZSuTYP;{9T02s(I~&M?r6(*$n{@5UZa);IV2 z@sh+YG{sspGyP44OO?10C!ztyw8}`mj+8D5$>}v0!*Oc)ar)#4{E^5c@IV@3iZUie2z35tA{Ki5 zT5p>(Hb6yKw**)hDHSB%eZ}M!!S}QhQKCe>S@vd}uBwXj{E?YjuiJBgxXrGB`n~eE zzYmeN?bboRn|J}E_fM>sZVX?`sPG`oaM!!0%Cdzus-mWBNPkI-`WAltZe;OMnlsal z!4NG_aeq7asl{3`XRIdE&$RCv@c7{&Io(m{YsDID$ zSp`4-`IHg(K*H&r|4pKgL=H}Fx-S|JX+j==>{9!yBrC%H^*a1Rl(c1ISuMAF&rXGg ztNG{)0$K^u#EQm)z}7?m%zN+$mcvT#1W}(?lwf7e_du1x%JwA48^PXQbM#bffOW)g zvqU~!;!2y#D5ZBoX~$z9NZ3B%gp&G1=yaq-#S|2?4X#=EQSM^;!oIGE>PHlzbgfeCNxUIbQ%4XeNd=3B=7 zJ5JL_#Dc71dUxyXirD;jI`B1qkWuOHeGED1xT)=%;O5T>Up$z7yqBVUfA{0>NbeAi z1!xgZ@NS6td06Up!@=ZI$mH4l`CIRP1lNuteE;voKmrE?|AS@x?A?Fg^)o7AlC zf$)KoO_)gDP0GEVJ74+z0I$@Wltqu8pQv-Z1?L|>Q3oH~2Ts#`-kzz-Nl&(1`Mx-) zt*2Q2YzYIuL-qY6#ZiDri=DK3p`r!4h)NStEn*?m%mj%}Y z9{=xu64=h<{jRWGBK&i@7x%yGUdeTwEa~hSceVI*kml6{C=vzzUS8Z4!OdkGQD5Aj z4%uP9@5RQP8+@`{HlS{IF2SC$j=v$M=D4X(j4t-iCd@b)%5&^$+h1EB6Abkk3I$eX=QSrkq8}hRD;#|jZ%PST^DUu%+FVaURiv- zb`@kUV<}M-hWa5BL z75i}Q(zs!5%{;)4-T3cDmtlogvmzD#yyVGi0ZR{seeOhO_FnX6gIU{m!uR>!{uHfh#I6yMeH9c~+y^5*`4t3biNv7873=&!@WtJS~Ff0jke}I<9Id6=#$L7%f{chkaFdP>gvPu zcS?yg*gb{-6H9RxJG>m1c?5Zho5st$_c{X5gUw;$t_xmDGnxcAoUgRg2841l#*{nXoD6u~87p7< zZ7;ihV-Hh;9n4ke{uoofgl(t1c^}5_acM_^+y2M+=F{$U-Jh}h0s6zYc6)yHCxrnT zngTX##ea<9ng@|C3V~IHge$ztf`~0~q|DckgbJv91);(WLNZ-{)`0CE-pE@!|AP+R zPwAfweiEU-rPC`^LntkI3tC>{rp+8@FUfL#)iXKt-e%_OBos;$bo?QTGOID0mrTT^ zUr|BOeyrNq?>pa`9z8wT>~MW}&qF=xRjU7p>H074%^PiTe|JI z3Aj2q`yU@v?A=}8G@&kEw=JLhdCykcG`WoyD1Y%=ICnu#CxkEWSMslxv>6^9uifl zvnpC_kGG+%v~56C_72VBHqgV_ZVy$hqE(z4&C?bE{$8!9wXNL(U8#cJ?e8>RQhC^2 z!HQ2?#}LaP-S}Bey5Z|*W=T?&7OIudj1NY$63p`?+>&ub#TMv)A2gTk*HUvz)z2ph z*Y}KQrQjo1kDpBe4$BoKq_@sfn-D>dtL3!3F=VFbtChhjN@_b54=>Z2OH(MzUkGsS z1=z(-6O<$)nvyOvdA1axOf-e4Z;{OH$3t149pjOL)aRn=T|dtTjXJ<_un_! zY?b&bW?JKR8n>xxq$}E{C!IuruC`ND?LSC<@Cl<;!~RnYSkEin+}6TgG7msmHrI?d zivsd2GUDEAdJX_uFp7a-%rhhRGXCA zCT&XuoqJ_)`?M;ON806h$11uP$}9rn#dt?WR0t)C#5iW`4A4YeMgWZx+T14l4j^s| zz-SW&faO;jz3{S8@H9?*F|$L1YiX3%e@xGva28MW>ixeWbFJ98PqBLAwB*Pr9NYh- zs)0}2esg+WhmYN0kcBv*eV-M~Hix{I^8>yBY-#Bh+oMc(^5TMfgE^Mm|K!sV_x$3* zTek;{$_*9cPs3&UnvIy%kL~Q2q_nDdjhwt7`E(nVn$zKEf`8O0`h(J={*~g8b4~y0 z7$}{TT4k9(-2f~+^z0UMA~LK(z%}oe^Ll9Lf&xzLMJw#K<`lJNg>@DY0*fpq65Kj0 zGnig1d^yea8W_4Wq!pMx;*oI7U+TX%r~P8{75lA?mw6bB#OrVZ_t7jE!k#_`4~R!i-T^l z8ZV43{|tRBM3Z4Aj$w8@04zliiAXWpj&V3eF+Niud*xd_4~VBQF+j)I>w?$gJ~ z7=)1J*KXg2y~e5H8+{r?O09LJ8KXAwpN>@&>A`HBVv!hwJl3E(-vmn_q-I0nC* zahE>ml6XRYlxlRi;+5UD>!*BZYrMO{HVHUzq`nn-pxg`DbOjr{I;`p+f?WDG>w;WW zfNt3K#=VyJ)qI?#L-mHz=XRM0-N@tRnW@u3o)3ufGiJm|Tk-S~44X#_N6^6uA^?#} z0wUE*CT<&6-i(rbiQ*%!KSO@2ldpE*xuVv`RodB9H}cQqS;&Be^?D5{J2X#EL;>Gy z>kK-{J{WNtsJuV_7S(o05kdof$=}p0t@X8JSh$awCeg*im&8keY$Pe$^^LLhG*nva zZ3ZuMuuV^Yx|N((C!pPEfXpqL%U4Zf|1YdTFpBBM2PKy4&h)&DG?gOM&uk9Fc@6Px z%nN7TqkjGkq{A<=-TF`~s0ouDPLzFO3r(o+m;CJezD55&fP*HDLCF#ayUfzso?&AS zeI^;F$y(aLJt3Ol;+tuh=-n6dHGYJDDpvP?t-&)Lq8JBJW6P=3QZ_tqo8iqE?Il>K z-+yHF99O-=-&S)ef$qCx`^ODhn+IuIYigv6h#Kq3F!3$Oe@rd#lPS7FHRIR~(Ufrf zt3m}Wz2K}bSmPf?j}NZ&(=!<|mcc!kcCnfcVq<4w?Z)Q!)n!EzL(lNT))A#Pt_c$S z1~Mm&;YmDocUg6r6b?C-35Wo?9+5y&L-)|<912@~rT836(=BvFJ+=kaWgNO80E=H4 zewH{+w)gfCI#LybjeLO8kTEZM@aQH?U5;m$UZy1!PiH+W14$X41SHZ9;q zWRUc=aJ_m{K!Fzib>Z3J?%T)A{8>+mlL7jG@0X76DRxj| z@J6m}>>HC~r&RWzNaK%|vvR=C4*vjK9HY7?G3=$xnp;uGrGFpFgf1@0Fi(633R~XM zK>5Ql)Cr>dA7^H{L$PmiYl=O?@*a8m!y-ENyA9`? zz?(`+*9|co+^wN#`HB%q1I#UzQv+QvG)Voaeq}&kOCtvP*+I}Np*6+=(?UiKqJd|L zYATxh!7IBEbZ!VE42F$+xrUV3{U3q<00S0*=mU+HkE6b1n)^6!P6jr8i`caa zQ(P4BaK!Y8Av~qE;>zf@9UJ(VY>8=JwHRTZ1_X?1PV;&Eb;Mr}2+>>@HK=S$KEYBw zXz2~vqjtn#hguj>p>y+WEORWmlgH%8jDiPjyl&`Qs)mh>uRzxn8}v*(5mS=vB;*?@ zjTxv*^&IwkqKe;04TgZaC1CiBgqVH)V;KrBqjGtO=7UyXS~b6Pz_@UY1g9JN+1gYX z%Ri%PlMr4Bis9hhjoB2B|3uN&X0;fhnG_T)nN^hW_5Ag#ehzxSzx=wTH_6#Y?buBG zjNiO?DkS)e-bVtG!gcqBzUXiq5!=ChAai8B+cJ$Mk_aXX^vM_YiO5V8MQe%86v7lhxO4ZOuZ%dwtgN4)f#jsDXXoBxIyEF z@Bz)8f0j~0{UlqBA+8D8w#~U*nZ!@`eqU@}#tN~dM|{?ODBUlKZ{5rp#)_e!PNvv2 z6W=HuuWwt3So*zd&t8+L^FBsvq;yQ^QyhrZi^A5_YUJQuye zVWy4WoZ`H72t{hKoDsMqp^_iT6Iyn<#kT&j%0j}moeIipRb3T_UUYqQkHS>ZMJROc zbaE6!MjKC{ZgTY)>-wo|j3WWu{C9=}SWVb^#1dxj?CK1xJ?wDGMeX)JW8wwOsXh1R zc&DDdl?M<-VPwfo%Whd61hIs7y`4GPnsVEe4ZAc1aHZP;={xb8b(FYjzKZ&!eD&|j zc$H3~%F@`Y#w}>#IWMvxe3te>TjsL-PePz>-3?+^tL5YgR38%iULHV=WYa_jNa-Xw zzppNZfui9cpSCKBNg-eZ|GloW_(7J}Ier zHrHLCB2yt5#h>T2vt633cDe5Cxz^mzU0dlhHujpjSIWtFW$!+~ev-ZO^j{7(Y->qVf<7YkAXy!`{~J2n zM=>$KQ^XMU;}C0XoMdUlOy4|IkD*%qpB(Tbm%ZnF!Sz_W^dKLX1^$Gw^5EOqlf0sT zFN>KA1;6p)_xL~5|D8bmK0qI0bfuZu|LGG+NG&u0kNRL!`#<(Q^&qiqv+`QSh~M-B zgT2`~B7yhalh0uG3|;?I`43^pO*RlfRzUF7zXKcX!|6gm6P^(X-+yJ`xu=T+QYyr4 z7PX7z^4R0r%)wrB!4DsYBCG#D*bBWS{URvIqG8p2ui1n3!|2M2D9ysNc`_zVZI+IZ zV?9%u@F@{n*P2V~wL)&x&bvv$im=do^X4hLf)4H?oPWmnvo;ZNe3W^HS&9`@!J@#= zlG(sPqC{z|;Uk%QJqQ#X7%ft{Fy`Hnk9Z_C!ly7m_SD9(8vDBd+of=v!H4 zuKTvF8N=8SqNDrahKrRTyajx)O+jda`jtMS%)IMS_Lc8%ZlbWOUwOxcweD$5Jy>MidxS^?PJt z)<0qXwzLOiX#f!>2`Is`u*bVMs5_TSRX9EI@2~hDXw>m~$d?Vu5H5&LEJwyiNr62v zptup|Q!ZQH3WO{;r=I&i1TAEfmB0+9)PMAs9gehs$A$PUy?kxVoKnTFO=02BeUt*3 z9LVNPj()|)$_=+I{>s^L4}&ES6AoG=v%@AU+07e%Aap$>fS+u?<_g8BTPo*&{wBpZ ze~0EizMaL6b903)Kl#8l71GzxTjqlH^+VU%pae26B`x2xlLB+JkfzoYd^&NS=E{4eYxC$Ng_;W0^Tw`+PR9 zrEua9ZISYyhu3@a`y>bw`0j=!ENSP|qLI!5w(IL~b@*~VV&X#%LQg;S=gAhw7Gqic z0Pd3$(~n0BT%=2i74}RfP`%E+Onc&{UtA>Z7HFyxj9y~pj4-A70Em#t0F7=n_tZq& zsXh4&Q~%uHnqUHWQ$syBtaiDZ_UCILuWH*ej`ff2EH&Jn2^g`H5%6>vf2IMUxx8sb zKcJ4MHn%ygdHsD(+o!6O^P!_A$g>^RGBjS(Htq|SQo_TQ_MnvCr%+?hCn?onYU#k0xL-eBF9bUKSF zt2m&Z-w;*y1iH0W?&4m--pf$rdp$-wp4zNeCktFyUG%Y#{+BKsm-;}EzP>>Y-ws!; zQv$aK<8d9CGmLJ%%mNK)!%ApBJyXDD7^#{DpdJqs>+EhLkaNiqAx;=!LW<-bxoM~7 z?RO3^Gfc!avK}A`RRT7#uic%(i0l3C3YE9B?pHbs;>YlMc-U38aBYcl)~=%7ul`lN z$)YJ%nX^i~dT+=7uQA~iL8T5htoMm=z@=tbCg*s6+oLOQ5-LB0oumVn(cuXC=vRKw zM&0thNyZ@V1umRcK50DJ*wzgr^t3Oi7{dpfPDP}O_J5|B0IHUh#mr`tAZ%kSfwcNc zLEj&{RX&t_^N`9ApdDKuhmeQxFmVp(KZqF?IIsaJVUq0W!9Feo0gC{Ofvn@~R;*)3GE+dya*P3pUkZ1X5D0Fiapk^ma>lV}lJijjfv=0?qh& zXIPStaHv#%!y25GfXT<**<2bw6a|H1L@E?L*}36Qu~R91L7@RFL5Hisxt%3hC#m<=THLQ8J?)bYwfo;INh$}5btz~5qUC}WS;!^lhs&;_-CfaJcf{t89xBx zJ93?m;j()i zt$l5J>C^snPKKkHj56t=53el;rYC)~5SEoWbh-UH=he`R=6-tAS$ugvSLU8QLrWE< z>DyE9I}}0X43+j5M1b3#CY^B=z-YF)OFkO3v`j`RHAVWUX%)rXf=)h1d z(9foX`6-2iHR=N5>qs@wN})SkPkpv(RJ4ZR2SE-4x^185c>fGhnr`b>Id8{oMH~so zvQu^ZooGm{Wo{cfQ&2(eiYhP2>rmG;U%WfIOLq|5($aM6THd+de7c9tyjlK02Wk!G zZ4r79r9_FcvKy{pjI4dmH1U+`RTlcGVJr3;tOPv9;gkqujLiWy7BVS1M`25}|2+OK zCj$B0(CL^lxPrFKA}%3r)Z}xg&0upCc{2rN^vPM^onDt-hUUhlAZ#^q+oq@%m1dj_Nuh1 z>+@W{vgaZI+7MfN!v*mr+K3pl(wDD+%h*gUk5Nq?9Kwb;%sTdW*04=vB{P@5RDUlz zD;_px;YLxq!mIIzM+9HWjJUD96O0^ram20+t->Q(Z)ky3o;tlj_)ZXhEl((oRxX!2 z%w=E)#ab%2|K5-N$g@XvVm z6nko(LCf!Md8fo4V5F(V@qmwC+oQTP$Sy2ljq_#Zwpf=erD;Awro4R6zPT6w!PA)S zUKnw+C~n$olU#$pzc*%A4rMvDdK9lGv#5Oi>IW);l5N;fstT{byh{&tNww(Z|3ZC4k-uf33}BP6}8f3Xm4!ibgjB#T4SML&1vRN zA)G~QIr9G?;7w}BiDie_whsF6Z_$;$N0!X>pBJ9bg(H`(y}$!7btZSa`B@magk{A7 z_aB^4p9Fb#d}s47lb_hJ4tjG)S$sf!NiUBzj7Y%%wZ9Y9-cPE#HJ_~KZik1376Pue z6|Iod@^i`P)Ni5Iy&qD2g&I^A{}7#_&j7p=br7uLwRi~U)8#mR(E*f}tcKQ-a-$+f zVMAeh?`58G7`NCIHY;cZGo_tP7cxK9Bbba7dM8T_;20(8Ymb)lkeK@VZPo%#*r#)T zTvCcrDQ}{y(xgElRuQ1TkA>52dgK=2~@hA zG7D5;?{=d4BRBomQ2@ctW8i01S?`|@W({dIPNZRR8O_;TAW!lYY;Jf>#cLRskTHP$ zB+)*Y|5HdGwi;Z~Glm@rvmePB?K0`b4PQz0c6I&@swHLK@*?tduSU*AH8@%`mymh* zLOH<85S%unyyuE8bu;k-R2PV%ozkkd^J#2+%}{=?qk0e3thUHU9+SMk(eIU@G6y4m zY40rBMQ<2q9hM-0{Wsu~5>ddP5`34syMj8p4!=!QGn!LN)yz#Eh>a}xtVs^@Y7K7x z)%nYiv+Xx3ZSk&*73EcICNh2Z#6gg)TWsEm zo5H+Ls5<$tnd3KA|5mAt1SPke*h(-xJ>}}FZ{2|t9B_W$Nc#tTOPC-2eDMw(7yS;! zcCm@q;+WF{&Y^c-M7*k>?CP9frgDu!;wT9+Z%y!5LBp9aQA1RoO#i0==CJch*9;p< zEXasxa(tS}7;PJ;S0fua2Lm5#W=b$|8?#USGo2mXZhmfm`CH5jlBXKcjq}POECJLr z0~_*~-u(OCNY|#!cxEygCctDL(CH?x+Y01V;#Tx8BL=cyD)y(WeH6By@>DDxnSwan zZJnM#0kG-vRv3C>`>*D?0BrgqG zPQoV2O2K}9&TPXLaYQzIs5%3CY=JShz^|c2RZFqC?;o>Z*P`YgX$=h|J8{MSQ;KoV z-|vS8U@Tc0VgBky8PnL};H^@f0bhUX{!WS6o4uD{27*%_iz>uqYP1~N-cvQui`^Ai zgF!x*z8utDNk$9!{9m}(km1WL@DH{+m=0@5=Z#v=$9g;?5SvxI7$I}obFVw>F1Y<> zwvsgL)3LUlUo^s`r;2r10!t-D5Qp9o35}fWgt}!vl|SG7nd=W;m&e?LIZ`9M0upY` zdbaO=_ka*v*yoZe5(8=Fpxfncrpc$-HBF@3y|zoQQoR=uK}PmhJ-1o#b<3Hr^!LWz zDTlm!mU97J{_ZhVwjkb#Ef1K~zN34B5=)eO`D+(zrIFmy^Ie;!XU13VwwX@#VKb)V zCCodbb#hubO$e0pDNQlH?uW!U-b)Ur zPc0KppgfHRIpz3uE<}Q>Y20yPnjB6VY$=`a$59&%#D!1WUmGWJFc(Ha{Y*+dkJB zed&d8hknTWm7n5BE{=w2P|y7*(sS-aks^b z9nKq<)jH`bEB!}qAHC3Ju9(CumdDwGX>K`=>LI)1rzb(KDWJdgmsIWi|0o^o(x}oG zgF<4~GaQ4wG(K2+mrMx>MpA?!0Wbq}pvPU#69)SVU>-K;n1BKyrlK9x;r)^;t$?s) zNsll&5H`G&FVXK7fWMu_23Ebt^D)NQs|h}wQUUKc{#X>TA`gp8=lVOqWDSfEp6f&& zoq>`1S7rIlf)!@15#VXez3sQQho+}f;XP|ZwUqXjgV zf-T20&*SV)#{cN3meM-X2WD^>Q~WZV)qQKivTDUz^I^0eYq70*2uKm{`XFp3DP^Qc z^|85&=^yUV-@nH5RYT4Sa;2Y%*f#5#me{J#sc6j(aA{>@ofVW>O4;9a`r^OkjX+k!09q)IHJs=6N$cld2Td50Ny0RLjwhso562sqrhe*@0aUjY*#FhwQt)zpLh&`}$G(vW5Wa zJn&{iNQ*|d)F`ZLLJQ=HWxp9EhI4z+y^ZW8KA?nkT|aywyQwnvb~Q4E$2wA;=8d=e zrW?vK&p$pP=S-wxWVZibE)SNg2h}EjXDR5fM&m`COvYa_oKPdOj80Ayh3n+E5ZH6W zvq9HCxHBeGRW9Afb{Fg)ev9|TqX6dQU*ZNA>UnKfZg`2rF8fDLT2o{E^ir%<4bL`t z_-JVeH9r^^(!4m4U~v(InUQgb6qk9LLX${mez9GbB&Bh?rc_1Qe%W+0{@RKcPh|&c z(Z`gKh8~l95)RwfOiTj!&+!YWmV2W=b$;FH!^L*9nBr1+3Jn1VPPPah3_2yx@luEy zQ@Ap<1P@INZ#XDx?M{B{UG6QFm5LMKEGBi7k;CpjH4&Cc?q1p6-tNBMFgwwf3mNl@ zhPwMC%!Y&4Hfpt_;V8|ySnR}_bErNlNmldZ_8eRJoL!`l!1jyIrx>E%=~)xzJrRtf zbZQW-^Y-03gn5vcnD!v2FhkZD2^S6bsU3$<@OR4R8iDwfgnyXpNbk#hoid7FPk><$ z{U?2zpa}ERJmJcu<}_>j*vwqAtIfcrJGqS6sSGrZEEtv&Z1^^TqrV+- zYL!?P_VV{=*G9G~IA|lQ$!%O^^ZoLlU*mUM8>(G9wMtc$l@!YB6Tg1_N>y>GiDZK9;}zyHnfKUD^0zzd(Vx zO(dI^+9jD|$%7+I2C`lr@FVOz42u6F;_+hdIU&V*`RA)>!pT+bfQhREgW%tL0lF#7 z7n3rhZ_TLUo2Y1j3u_Z3nXiS8KBsD_4*f^gfJSJ?;G_$Fv*CduN*_8&|W zKO7<29hwXyovknat5(FZ|DY4=Ogt++pN;1Ae^`sIP`zHI>^aV=E4UhcDa*AkZZTRQ zxe-md-}$HZ@>21m-;2{vPfuQMHphw{ulp|BW@3KQvPIQ2;101$Dc?-27Tfm4P+?a; z)tZ^!8R6aRz7;vaX>N9U&N2|#@cZs&qiL#g3Qt-hPtayQ^K0SBFRI~QfaY6U1$Q5x z1k1;H(>9c;t(sc=N@Y!YMp7GD7d+W14h;FA7EFPRU(myE%{EP!R15H6MXdoSPf1-sVZPyqH*ChD{O@z&hc^;*wRDmzPtg6R`7wz$>&X z!r12e8y7d@DN;kzv31jmpQ1%F5zV~8LwOj9_h*tJ4Ry{5Yj1sKFS2N6OwpvUImkMs@z*wcWjbq@tbJf2UxP)zEmzH0do zKN>cv<$t^mly)2I+{m`8yAJW%a~2_E%`ug9o~-zF)AegU={Wq(}fT zvmqf^5j)X7%Ad@z7pa8bSM*^-ED>ww0>eQe~nCzSllhJsd)X>W^nKu7W~lp z7oBvOTK8c-9J_3!rF-&gzvDpVc#!AuqtzJk@FT#@@2mBU$G0U2@ppjLzduuywg9Il zp<4zHif8lA$Vc1dr3YQV-(e%PXOp06bEtk|-(ICAB5vqxgehPNHiyiySM*u_e$Djz z2dlDx*+Xl;<>tdu@X&L>(G-@IYpzx zy&X*a5*5z&=jm_x{6@y3O&&H$lwdOJmyqZ{NP+4-8fC<3r{r3p{>0#h8syawUE(&u zeP1zl#IjSTSepJ0+fVH-I>}ybaq1buBmM2dSyG8y?nvN)*z0#l3;}*pL~+=pfS`$9 zwzHOc@}GdNf%iGDN^%ehIM>?5;vCW@d7Fp36~2}{7vi(b$_73NQ*?;yq6nuCB&lfM|w(KfsySY=j@#m`^!B8 z0gdA+rVTK`$SH!(J_TYnUGlPH243}18cWCLBxlp|3_J@XTIxAwj2zFGY3j|*R(s<@ zigoAIr1GMo1AV9-C;$1NRubR*?x9Yn8S(HpAR#E}EyBc{KNC&Bc}npU_R6KRmZ(=u zUn;+!&iggqy^!d^emyy91w$Fb-~ix>$P6E&^)=~Uk`C~dMk6Z^38bLsl*T>jkUEKu zwO|xXfuMhD`0CRte!|P6|Kyq59x#e;BNK4<+YPj6tiAcDiqoS5Sms=l-R!`p)wv4M}d<|eG(v*IuJRYm^CU*A0YcB@GxXRUT%bdL~v1yBtLtW=3 z2}NUF=P?OMWm{$EDaNyIrV_kUgZ=yVa>q{2r+q-x)s5(D^G9PfnY#Kx+~3FF121<4 z$I^-B>wbg;c>lO9y89C`TM1U;=V#!hqUu>IWmg583K$ltlm?$}2er2gFdmxae=xiK zzA^54Q{9=w{d6FO&8O>hc3ZZJLq+Q*(wu%WzR{Qjxf)q?^({x#%4nt}?CLCE4*C@p zk$Sciu%NI2M)_%%kE`BYSNU{{saQYh3BRf9zTW;bt}^gAf+0D2C;Dv}DWaa;c3L5x zf@6ERD_TFFBjK2qJ!sTU6^bcxUCGxvEW0Oei zizL~;bhNbYMSlC6lOBG##UFcdlJC>K(CBJ#$}EfBQj2fzk^V{fNF8KIya*lQ#$7P` z*~m2c^^=pI=^@QKCOVD9RxcJ+r$@#%gp`hivh{*bMbd>zVqyp~V~w!dqY=K?Jal`e zX0Aj#DO=R8Shsz-#dB`9#;)|2&-e04rGpbOLBUBIu|ZlVhrTMUIu_Pi{KQ+rkc?s{ zTmH|)k7Uhzfe_o6ES_H+o7bJ>dWBRV(^7;9@u;0#8yaY!FH(Wb;0u(@8!Cr z2YzN58HrY>!@0vxbx|aI(Fw_JyJtqteIM`_IW?S|RJ^=+dGAk79ah(Rw3^1>0?L5N zQ$)g!`6nWe_0VWDWXC0ityi0Du`o4vjNyC7H>N901Oiuq@D^yCwv7%Ruam;x8Oz~L z@f3o0vjw>ma(eboVkkz5V)zpu(>{v{N5mxjo3(gX2f8+>RmdPk&o_C+93qR52gzGQ zRq8^&*#vDeVG08=$I+e{+*b;RiNV|)_J%@V=mRNV#Ki)~4kE`HFHMRhV!WJD0{pv8 z@46^AbqA988QhfWFUb8W4W4>o@e>yk0zP&Zm^2CWo$CEF_n7qZNnnMQpD^QP_G;X~ z+Wwn=-CyzZxZA;jCt0~Wp8q{|_I(8&n+PN?5b@uK5q=@F;4OSn$mku?DLw!v{)oxr zd1aO(fd(%fVBxD+sJx43<`Sq$k%F9<$bfGr?0Pn zs9x)IxOCaGopFx#gr1oSsp{t~Oso|G$X=^lyM^6y=9}-vY_-X<*S+*&Ie{o)p`paQ9xJLzFr|&|4oti*Hy@~|@~svd3&`a1 zs9$0PQuP*coOqQbu9!Sl84VGzf?EWo_ag||oern4Etg)WkRd}B{f8q{ITk%29Hd1mKq|bq|qOvS(2#>6;fql&^A);R2FX>*HQ?nM%Do;} zR&9{%Rx#GG3GFiQK3VAy@PnHy`9i0+A!aFHvyN=wPVd93S+E1C%7>@o!AfXxzqFdF z!IvmB9v-U`(weL?3R7{ZHJwdO-jYsXJsxj32g_3Ng%LHGA-a}uTBk~BqT(8NthLXG zQf5FLF8+WEwHqC4tTM#DJ@b0uGRC5jJ&Q%q2=@i52`0`f*`n}JJ*NRwDx-D|LRe;* zLoHUablE+Ds=}~#@>Ko}OaD%eK0K8ee2VIi{vwM)nFjVEjsheJkFYd5wn+oz6XCY4 zKi{W%h;1i{@vlpxFmAQBlO;)sxgE9Q^^H+f%flD86!$7f8j^(@e8b*Od6Nt{={PASGqRaM%#D7e*lqa zu2e2xtuhQC_C$gF+ekXq(us`h#k-9K&J~m4_{djp zP$zVhCg*XvozYMU_aeRcW-Jdc`pJ`b&s89%bD;OXWoU|g zmE^tFI)e#r@4RJ@Dyb4iC`55FZ>&Q$RX&pUiC^J3ZdgOA~KifRq*nSQ~E>y0D z6U_Vh6ZIVzR&*E2n<>4|L7q=N+lTYD`?JNW%dMWW>D;d8y$mCNjEirJ@eQ0a(_e`k zA)%Ilb7?kLV^&wT7>J4=n&I3Pgx2?`o7eMB_vt1{Z7@38K>*QB)3`JE)%I`-yk?7A z1c-;+E+^{N1Fqm3PQEI6Q%IF)P8$}klnI|YpU;apKk~u}vU+W&Im>a* zWMtC@BAMlk?=ZtTtoIIUu-{*kR9NmZ=lZB9xp=BuND-@^loU4hN+S4WF} z*j@IQCu5&+`#bO2@zTPJr4$T~mwGFx$Yx$(hZKPGOijT_le8TEh3IN5!vHGob2P__ zE^=~Ex-OQI7a$||mpRwI;fP2;4?fT01Y5|bgq<2+;N;7p$j2&-mDs_ZWJo+u+=R9z zBMng@Lf+KDz^FVuO`KBXMI1GQ$3*uyeDLVTSGk;#7&`}yg4)?Z2v;F#Xz++8{AEj~ z!dtS4mty52TC6s z;KeMDEg?a|TFJtEc1f66u4y%wD_*Kz`x8*V8#LayuFp@|>a`YGHhX-T&pCZje2*8^ zP0mL(ma~W?ICWNwE;lD*&93L#uA7rd)y7MWuIFKY+Ungl2MgqLPF~cwp5rvn|H

Kk@*0Lk=)Hi)nCDr6e1k% z9DR`%@&7Gd^8_YMpB>D!F%9jmtD?>$%D|mPkXjGT^k(trXG))tlRGPBvVPZN7C;9iAT4aiQadA zGoadyH=DRRln_Ym*Xb(|{ci74%56VrReHdpI!P2kLTjPU$ESa8aG+llYWL=;WYd8d z$?Mh2+KYyl`s7k$>Ho^JD=@-*s^qk;?QtQ?(|tk^(6>*3i?J~mE%_nYO^6UfKtpr1 zc{#0ySUGssJzt1mkgwrZ$(I85 zo9UVbu5&apTVz>raqR{><=!K$8z#5?DQOY^eQ71dX*od<8VHoXpCDT`SSEPoqACie zebilPU#F7I^x(0-`W;IpOTz6I{MO@gZ<5P-uf}mdK{Sfw9hXDB(NF@Y3cF-YkP3`b z`fn8sBy+{}uS{XKH@6tntMHV&L$QapN0KxEBJA$&7L6h%J1&|mZgSWUHFuh=%A3JG zV5a0YpV;Y@CdldK|I!~~K9}$v%C<*OBjOov_n5}(IaRLVe0;=1NyX@UkfVFSFFHj*-o8C5|w8@t)}=Dt;6R4_Jxk@IDyD$?}`U)#LFUSfBN@Pe1G*-7XQ4 z&j0=$-=8dx5^l2FlmM&^+t)dd?i_0e+EVn%mvoGIV%;vLctn6;MfVe=Hf+f5IO4aM5#raZ=I zgTdJ7R2O|cR^h7zVT7O_MUO=2yQ*9)yg-Uf;mCL;5w@>ytdsC$V+^k2X0KfYJDwObi`79{n}*iP7djXytV<7sXlgvnDQ?{MA=b_k#<^Oxj>NShQ^MyCf2a z!&+HhBk!4Deo*97plyQUV8_HgJApgrLh0Z!DDnh3;9{kv(5X&NVluJ9VSBW}E52HV zpcp}e9uuEK4c{Ax{F37@e7!*(EoF2K`6hO0eJ3y5@rkx*W{{`Rm?ehvyEt*z((qN! zRlu;?+s`lZFu&&rF^@3Onysvc`|{pje2J&Ewq9;U;d7WO*O|`r@>{2hB;mBXXt`b@ zWVa%sEh86=Y(DMXZ*n#v;ne*89ewl2&(E@aj}wj3Dav%J#C%@Je_nXqb!(C}=~F&}U8@SR z*UjlVIBFtk-#*_0j@0&v_=9eHDyKauHRdNS{{$xUkP^{Jo7?d`My*DV=39f*QrMMp zyR`caqR`h1!ixZ-vzw0ASuaZ_GA`EJE?x=ujCTS#C^7zhR1bXL_XMTp@s&n(U-6NQ zwoIKiuL9l56)>!agTH^kp;-7Otx<9hKxL&=T9ZQ(m!rfqqt>b4ryr#O9f;jtZ7VOD zY}Y~21d3e2$I)t&C~Y2h$D@S?P%%9`*6mLpFSS&=U78=P)Gd2;#X7H30^SPLvlud1 zEpFH8%#KAz)1W3IHM<$xyw093)3f6EkV&BTq;~IXveNGJ>TtfU>#w0G?ws$e0%m%5 zt|_PsK+Jh^INKN?WVaUE=VoE1-Wm9t&vBybCzn*NUVAn*tdZgU^rcv()HbleZ*Y)E zp8;b;P%@F>uy9ZUu?Ti76Jh1FOB;=d!=^VJe}>Z3Mva!5-erB5y%OW>CC@f_05ou0 zB!k!8_$*hv0H$(o__TYSXEfWjD-cCAf*_ze!N$(1g)o9%N-Ue_)2BDijW!*fk?*)z zzJ?|jxq`x*nVDJcMfO9ty$c|18Xfn^uvH2H{sY-%uGvgdMP;fdEb#fLv#H-gSGEgoJ1$(T9T)_bKq+BxL81i1ya3PWJTrpUYJMlFOkZjq}1Hvl1t5f`|!D z??iCeH_Cwfdc7~ACn(qf;(WY7%wj4B!qZR`KqPr$~kTk zyMOcfydG}aeI9EqCOgmwA1)eP*Y64y^PkTWRRNQCziX1QmQTYwe0;9czv7+cgL_g? zsO@<PxHn>j7p?F;TfG3Qq4#QfKr5Vu%5&SibYSwR z`)u$+P*smw;U#PIq$f;EeIeO`k$7K!ZJ1(X9@ZU%>5#RMi4V(f#2{juLu;T|_yT)k zbo~@B_OaQwa`E5yrqiyBlF6|*&anI zrRwXw5zBI2XdsANw4L7VTQ{Flj(oLld%Uu+ZkDeW84ipfY&qpBV=q!I_sO8Sws}3B z+9}Sek$7>M6T~6ZdN)|iYCgf?wT4GaN5p75wSLU7x>gv4!iVU6w_6T$iV~IDyXQNd z=i;6A7Z19=_eh6B)%kz4pN58d-k>hjXF;QDguwZ9Iexsp={h=EBt?FQ?E^NH|3{u8 z>C`#dRBoS6aaY$hVlD^jJ$@w`$Ned@8FKS`t-g+`zVQpXK8qM>&3mP-DRbF-w$557f?zU(=MhVrL$E}kr ze_hCB8r;eejm+%qTUwC;)L?_zTUt8HH``gN7npjpiS%0IAWn#KxY5ucVpIEB?^W=s zg;GV4B*ZP4j_2;Kb_Jb$SZH+p*p|5hppnPjLE+Yp)x>~ z4~;MF~&9@h!o7a z@-5`kn8h!JTO#)H<9X2kXo*2pjZ2`+M;}Ex621*R3Q3nSl&w}WoNV`xt+H=M`N5z# zXNfHsxtcq!NJxS0|FcRmmlEmC41*c0WG+AR;F~lvI<;(xV@cBx399(ewB!_qay3bz zpwR1{tew+rK-@-KcF2vjW`1OVGxy8&9mP`5-iJVLHUN8i1;pK>#TKe%i@Ku)d=49a z028g2w=(KsobRu`HdF0Sl)69MoT3o&m1z~L*xH^(q_E@5i(4dfy^@#xVa4K5#2=BRmNegtG-W2OHwMxtk4zZ%&jp@}w zqXHd?!&69X~+eqjvf7ygLPu@jhQ)oIV%~`e;S>%mFLIaXd+^w7B8nghbeuTVeRzk`R2TJ8yz)u z`=8*pr^|mfuE){$U0Z*2PEcx=J@5PYo)E-AX9$tE$82b%5u!w7QK{T=bJejm@!E`R~sHS+9rFJ{$&hLldLt zv#2&eZ52O2Xq|P^x!v#1=%BdRSylStpYN4bR34Yyp-dQjILCv-I005QiA_S&R!j9s ziHSM@*}Op`mWvWx>y23Ni(2&$&FC+XYQ5c>r&0VlvDs!LhsziD;u~}Xm<^V1hIF3J z2B=JK?{(#RmvEUmhC#|}vtIV1l1mT~lb5Eqi`(T^>HPMe4D02rE}##b zd?euWy>Fdor=z={DxFU*Vq}Qk{CS!o%$H9&u1cEzq? zThI62kJeHv@rgQRTKQM*$1PEV_^f(fUQa0?HEqyLqbGLKWE1=-fW#aU>^%Ue2N=sr zl|yyuN;Q|0Lp1DUc2Q4WJHwa6A2`&dMno!UZ^SyPyzP!+`JQh#0mC+3tbw)(Sz|RH z&y~!Vp)M|qU-&?UHF@7@Gcc7VNbYO=N=>sD0ubc#uRTf@YS{wT>l)J)0bd)-EJw#L;pGN|?+Q6=q|JDoPon#N>dGw=|41jdT!ZP(ZnFczW8?|}gxFcY8@J|))!OzzDKzl!-^ zR-XIA?5ERkd-Y};blAXRW@dXLFshg2>o(%LIP@gV*&7}HOfXax z+D(A>2#_>9`WfAslp8yE`b%hIbnNF4g@BoZc*Muji33l=*+Viy>eLa2=*De8$h(&* zDdcC0(bSt({x9qEQlfL3ibmi?u+XcB1bY~CFn6YqzU*VagKV{KT?6zXK&DX9P!h*YQUDC_eZ z`S=f2WLeHk?{M99(s?~YW41=KKC@dbWC|nz&rI8M$Nf!Z@c9LjXD%tc7jG*Fr%}Yb z-EV!IKwc*ojap-gBB{r3ayG!2D$$NmuQ86;qt-f6#6BE3)TldNxLqfCx*4F#$Q;yf z{&7!+;&lO4uYotYPAFBsI-0aN%@%&RjD7V69cB9l1S7|TnMzP9!y|1BtW&{xbKvoH zD=I2jFEn=)(xQ{o)Mw9clxMbna=$`mi(Hn`G>ES^IVL7T07?Tg=}RC*XDjB*fT#P0 zdu6(CV+%5BtMlk>N9(IW`MO>-i<`lFMyl=H; ze<=-Q;jE;n^%gB{g^!2)g3z8$`uH+e`jVRvek8u1FfiHQ(W%gtnw6*iWjTAcE=^K> z!vf_(lEHYF?~kHh3JyiK2$N25 z+@3(bBM_Bo|C}X#p~^+WlloEQgBXEroL>#5q@%Ge4kUp5a$H_I;6?YRcle8NvE!Dc zBDxA{3^Y1+m~W5hF<*VBs}^F45%IVo>qj8cr*w>re9<>Ms5mx6q0DiC<0H4e(IrF5 zHF)#jDc?OV>7R=s$|<(*A>oKa!$lMCtHy1!Ax&i%o;x859jmoag=#m;0Uqe~9Cx9? zzHg$=I;(1L8T{OXK*9cYk3mJ{0Sz&Vh&MSlO&KUfm-|zT4emiA!cFeSR%@x8m-~}Y zUYiwQ#dAR#PUgA)E6aB{*#rm#X{()#$km{id~RjU0I(~mINwNOK!7E}YOZFt#_TT| z3D*TM=j7$*uZzA4Ewf$kV>e%TO=5C$(a`g}v_?q=5HRZTGceAqp3g16rYiXYl6@KO zc7m7`tR%&EB13!LJg%^A7y*TO#3D~_+F_m4>(#K&xA*!oBV$ajxlA(RB9+F*I?*lU zXEjob-sfJO7O;5RE(JkR;j*7N@5w~? zQKNGm4B@%d@$?xGoAAWnORStMKrs6tG5HE+0KAo`l+FeD@e+MBmU@2iih!jc>ho27 zrGZ9`=`5fKnGCXs@251B15w_w86V65A%3-Qu)eany+rL7QNDt(esh($?W>#J*!1*3 z@=HSNW=CKyx;@{XF4QRh@;3EaNimDnB9KI*fYIw=H3)o_R0^->edIep{%;G!M005L zA~Rr2X60_=xdW6(r5UfW;y@!@SvO1*?RfKZxtnZtaxMy(+ZiS zlHDVh*T!Uta#&cY!PkM>;_Z=){G zUf9@$xMS>KKdwdB;IwtI`+Oe6$L(VUo$|^8WutL<;xfP+lm}IJO&K9V&SkR$K%MJj+#?7HuHrYziYnsYJj~u zS33Nnhk#sRqFQ>4fm*2JrO`? zCWW%MiAEhwnopSesuz6u3wOC6h1W4S=yCCDJB_yDDDG}X(m(&@CVS{Wk0j1?k9!e~ z;F|QTVQ+X+lk>55v#BkxaVgurm-HLU5#jN;*qJI#nZ9%^8|v*_X~kCF1f2zDO8-+)XZt+lHwESM(c*1VNW`&<1nO-L)o zQQTTBpW-x$B{D5ZP+a=0S~pFwVshwD{&kqEGlI9Xl~EGrY~q+F%uH1v6xvZ-UC-ib zO$==zk0)Yw`$V(|)o&d6aqxWlD;_tfn;x-JNTv)_y%}5&O08y_N)Z$#mGjdM6Jw91 z%jZmQK$XgkouHO!ii89x6v?DDzCk5wzb`S^j `Ao$3@kB&eJn&_qNW|WaVbC!! zi4d}zv$$W;d!W}?O%~}ax5{SlO!l2QdVCv6XWc)nTTW*(fb*Ksh05tjr+&x+9*i3z zfz7K81U?&i-@LrM)i;N~@jsqKGK{t9`mB9z|MtTBc4#OFjU#eCDi+S?nXf|64$mLiE7Z`R~lXl zb0K*nyR)2WG|eSpcktS5-*w2|#1v+Gc3>lr4J2`g7b(D)Ng0YBfjFse7?R3KHY0X$ zTn%l^_4e@`1CF-5G_}3d^t4@yy_gb7w=OOSjd_S+(eGA{JVmDTX%7DGXo9!HV-|Vj zCSdx5zpIU4#!ILdiYB&bQIww-wM(>Ej*xoN2oTMHts{BF8~opT7D~M6PNF8h_;Vv> zEAt{y<($3xZ=eHF#45jkx7}6GYfXK+8C)V+zy;r}29ac^6MQh$1*``p*vRG+1*dN_ z@z}v0)qG1OL&QT6F!|&9?y_s_Yo|W~DD?U`t&(Wzx)Bok-$YWh*q$5P+1a_N&jDJ^ z_F$)y(|&uR}|(~U_-o?g-vpMnE2U5 zaD3K9CoRfb0zYoX^hg313x~PV%fU`sYt@0_fz>*a=3COt3zk+fN-ztMdxKuPdz=}w>>}IQwOz^21Zs~D3lMqw$+t? z7*6`Qz1ZqW!sixVa%1Zb&8FB|!G`b!-hfPWKlEw)5{D z8?qU^kK2jQ&8~m9Pzc#9L2&?#nLiHmGdu$|gl0DBR2>dRPtRrfBvWI9rM>H9Gepry zfO{18Qy5{#t%f+(;>#xPgn=5h?3jNR{HwiUxuptknRgLwuXoi5v-qWF0PqEh-BPpd z-@ah(MoL1-)xmf`v_1EcJgx6k8ca)G;B~t=K>55b;EgyV>41@y)1~5OY0;gdrlRW3 zg?x`4%|FawQwBD{b1b_Dpry9w72coDJEK`}CIwpF zE6%s$5bjW$AWA6v_2sm-`@=>Ec(+zuXfiyVJb4?u@Vi>qp{<`0DQgSLKr>w> z7g=a>juPQ)*%5s#ov*XAw?Abw?|i2J(W9K!=m_-UfR%#Zh30cLz`{50Y}qF;V!Xa~ zGlMDrB}v8I7q#wdDiLY$`a(eu@-U^qIrdAHvn)8)*dMQ$RvPwklZLXZl6t7}-rlv# z&(S4_nsS=|igSTw;~HO9nZsK?(?a5)z{My067&D)GcT?uLd3oSs`!3JMCqa8j&NoSYIH z_Gj>;iOhNni~UrI39wgl+;p)QH`lsN(t0!#^Er9^{xJq9->(w|dUa)5NJ!U}y0i_g zZ3R1rb;VOf%Iyso!*%b zi&gh)jdHQ5uh5C4f*XVchvpGJtN~t!nmiCwto+{?KYaKXJhXa_akr^6ZI8wrnMNtp z=tFAyR|qFobHj1m+VJ4OU9B`}6cx9*@eg8pIc*u4Wz6?vGF-@rP%O8U{CzV+^K96c z`>(YH6kfdZGhTf_{!NW7+}y6n@=3kWGmD`{=rv6t2gEUQg2pf$LYAwfV10tJcLHKv zeENSMJvz@lMCtf<%#!95(efh8o0>)#^8No=;YM6{2kDysS=sEKJX5Ed(5oJFQ(y41 zs4>hhFo`S^nT$BeVb36&A}0sjL+{0yqSeDz zVZ$I}YYFDSz}if&c19Gs7r_Wy3DB`~O~6swn3RM=b=O@0L!8=!gI z)<%c1nSUJe;oLt~{_EVYuT!~STJA1UiMfO4zS(Nkk79m7qEe;>o*6A3&$|hrVFJQl z1&MFQe5wqHbLHtg>{b;yzpQRK0i}z<`9Mm{?PAke@cKUFx9d)jos-j*D2eApq5bwi zEG4KU@HQ9XXcXnrPzhMzA14YG_8Z*VGwn{*mn2urQ>6)7p z#E?y&84Z1MI`~%FJ?lOY17R=I>AU4+U_jy9zdl@cUcZaz2aaJ{xCkeyO<~&3w{!4 zBu(aucL7iH`E#B5M5D4rbH2@y0X&KDuxD>w)bz3aWbg)qkpbpNI1Z~wv6EVPmINtS}n%yBJwUa0zivK+I+t0 zginG#l)&h|IjIWPP)ETIh2#az0L{(J<6n~J8&E4g?aF!!(&V*a54KeU(H6fs+IS>2 zL^jBvFUt8~boGz-(_cdC*2`_a=LV5Wg84dYAY(3pw1oz!#t4%5A8&X+pTK#XN3d5_ z*-J=BSca5oce!6a0POs9vCY@^fXLi-H%M2G{EjP*@~MH?#QNHx8E!El@C37gFhP0` zFl1(qZcLp>dN@47<7-75t?0fOTDSLW7bEC;zjtC{-VVw8{zfd2Z~p5V1f!lLstOfo zxB0d9>TQHz7_JG_o+%8O(dqzV*X!Ne+P{_9PkKP6nyFxoiYILY2u8o)eEDzRm<(J( zJQNU^>3)cu%H&hVUVuPRZ42{OVo#d|kz$FXi*RV<-;9dZo!#q8Ya4%1?EdK(E%$^u zpatD;{tOeLO~&df|8LpDD}^ZgOLPf(KBXl~`LDWFdI~)I-s^i!%wQtOpSE(uy9vAc zcp@+{e^Id0=al%a^@4S7i0c@ge@KHYRNDyI%~w#;e{gS8Rfor8qaU=qrX?n-0t@yURo8{gFcw@0->87D0v!cnOpScu#_ZRr6wO&=5jM0`^ zl0_D(<=lXY+LZW5zjS&uNyOiy5wB2{cv#8^=${P_>L-1PCuq;rS7+yc(`l`MQF{cg~dW^1V|G^9J*p%4HO)Z%g; zS@;K%a7j{mJ>7s8;v}{agv=Rmq@A-~SIsuk?2>&>Gnf^AX%8@wD&zh&3<J;BU<|R|y}<~j@1>fgM)9UP z+ygNg*b)_6%vp)>Y&3zZVfy(bh%b}-zKi5}Jz{#9zunwLxu>@^g4P+>$fm6ql$78E zsIPaD2Vq5;9FC6`pRb?qpBc59Z+5HmJ>bVK(0Sdm)5}F&z60o!l$>z2bDA@p!Zux? z@{SI8?bFi4KiS6Faavx5{y`?FIH2xotg31>$po!#HCBsmb2Wu(=V!bMW$~JSh6g$t zknH8@an;}Vz{^%;ju`guM8#n~A^F!;k{XCa0mN*^3n>ZF+Z|zs_@CQ}8i|b8 z$IER%+Xg%D5XjA@?$ZXvQzsIy8NN&BSJY|}BwrcLAt zfS;sPxQm({@&Vbp@ZZxASi*jNRsw}-VWd^*icDv8zc1&APK-3xvgQuqq`WHQ?dF9u z;^4pJ61K>)lhY)2BWzoSzT&CR#!Xl}?x-EV$L9Jd-ZLv<0G;h1h-~@b5)exe8ey49 zv94{on%lAC;Wgj7f?X@*R%tIjbbzE`8uA-Q?fn;8Ck2<-6|WF&T^&QC;)T`~4AFot zK4JK8iO|JvS=uL>%$4zkIL*FK=<#^UiBK(QLuBX<&`|L4@wfk^^=;qRVm_fa+HKOd zRh!S)fY20d6Y&f)(gN7|Lr^a2thQ=^@z;mUu%G$_Apgz_zk4PA^ie2T??YuVXgL$f z_I>b(`zjXd{1jiTs!Q46ioqz|AbIif9<$1~{CDe)krna=h2TWrLL!X5I^ny0p5{T3 z?elqJt#G*NE$o9q4YIS!7`Uk_NeWb)!Ex^Av08aBC+W{SwD_wd-Nft9lO#0eXSU&z z>Q9(im9Y#JgMM&e$ZzT6@?4{%uvTZ&+n^Zn&bhk{_t`@X(Pl*dcg_w5#c5kRA=&D_ z8uW+<@4hGRK*qz;B=4F5Kd)z zzIiR*A{ra;Etqx_KxsS<8`8aEpabBuPA)%P)qxHQRJ;!`cO?f07PJ@`v|FvZmlc85 zs-D0~B?5R!tqk-&-9hCh#BibAc71&~->2xc3lYp8Q_8!76%7Cdt!m+!6A&{2;ZpSw(2rRPxFcmWRR)WDCxm1C`b9c92etj^u-akhEgAdiRRO44? zGP~Kh;r2)_XfDttdj#rLFQIidoPmTp^yY+dS6Eqv2r9<>%B9mq{;<7b%qr&Ztud2} ztKXXV<|p?`45!_fZjxA5-EO!8c+l7KJoOWnWB36v+TT$8(AM3kQn2tlI5NManHnQV zC}}IOWwFR+P#7wm$B6WjCi||G*&9bN#mw1Z(A9R`=~5P;sekWC8qy(S3&lPT+m)`k zS3X}+s1`Oc9M+Vea%_p^Q6e|Ef!L`uQEVkN#+o6q|5cTieerYP2NR{#|~lSc4;UwA*zNt1zWfl({f|0_L1tGKN=o9 zPmiD#P~r{xjr1m{gc@5R2ijymo|lfH@iyM9YZ7bfgfS!eWS~*SPObnFvl!a!T>X2ELX_2LLBe>649kz#kYEV{pG*X71D%I8(M*Cux@su% zX^*kbhrn20Tx8ry)P29COkPs~I1|QdA-fZ{PTKPwyY`y}Pg^BQ8gTK`r`gr371u&V#_9noma1Ovt`ywxC9${9>m;7%1p?h7t z)sbf$Hqx)&E$o^m^FI?8_l2yle`Kg+HJ8mEzt9Q!?TN7ez8{WZ1q{~9_~U~f5w#=; zZLCs+ye|Z#TXPv1D=#lE0b*@aL)U1%9Q6e5FYjL8Ei?lK_1pygRl{iX&)nXX01^t0 zb8K7^DKRmA1l!CTn86|-;a%=7x-Z%DPXHs@O10T%I75P@vc8 zwAJwCLAaZRcEU@TD&}#OEQ(5sl#10af#Lal8|w1xhn5bc;Wm)|y>3qAJNu(qEvC8$ zNk9C`0iAK6qd{nPJ?AzU9;|012XNE(4-Iv_4WjxUmB|x`wMY(6_Y;L;+qbF7W4AX# zV_IvoS7ixvvDx-*UoJ3yHc3u1rhz`19rb+BPu75uhzE57Qokag^})oPgKK<%XY0FO zMw3upY~#`Zaj5(UcZW1M=>I(&(1Q9#H>1tLcyR1nomw^q_qk!pU|^mv#DxTuHt8zX z1pu)m14urA#$4mQOKh+UjD`|3INfpH2!{P6jn0*8$qhyUU@~`h^pZbj%L+49%xJ8zZ=5 z&_}oh~JOB0PbjG z7J=$VKnJ{sTSVe+#Oa$b&M|Z$?4Buj621yRKKxnyyH!kqY8kx~9~MdYJ66Fg0>K6L zA#g6f-#K(krWm8EP;?rEF$pJZo^N|1hfNJPq@BT?4oV2dxTuoDqdnbG&mm3}NF^$G zTv-@ZHrCld-!qF5O5sqa{-1$f$U=z7N_fx#mbz%%#(V@`>E#}0AH6Dn*eUk z0L>VH_So)D^CQ<_5pbhCgC;NP z@0kL&wbswPUc#9l;7d&N65vH2KvH(tpL%?1Y5E~^f(1O)1}bX@AYB5Yioht#wJVw_ zJQH)`BrdM^zfFV3Mh~UTNX(cn5k3bFMNki*`Ph<)8aOr5q#h4R7WuT{yFTnxPV2b0 znAa8+B)MN4j1>uo?S3@Qe)z%m)%+j7rdqz#EF2aPhLaucdR|%w46)uV8w6d{aBqI< zAx5^=K?G-Yqml>^Wx&-KKg^Z7em7Vm{_GV1@9khCgk+$|+NwBRWe0?f;^f$B)) zlap9YGm=pkBI2^ckm^D9PRxrpvp;j>lbBny#P@2`Ut9Fm0Vd3+Rxf4fz6A(~#{WFH zAoBw^AUjH#A34aC``7dzfQF{<_Y``h+Z1&|J5sCtTZ*fg7}#`$r~286{S=Wqo0g$f z_u1VaxW1iL<`m>c;^NmFVB(8#yBncVK_+5i-gjESqAx*w`Ezz79xz==@OR0ZZ6y$2 zYcuyrnd1n*+Roj9*yZ9beFRN6N5EVI8s;P5z`% z{lHT>9a_fSAEL-xjEOmgM#jYAUKf%I0-rZwvpU-9290w@WP z-%U0zY~PR-tXO~5kFS9o>B4a5TH#cqr_$_EpAdHprZ5fKT8Ez{~+NYO*9 z95mZsogkzfyb;=wF4U~(-!|B!mk0M(bPagzj_3KkLH*ZA*zN<`Xow#=-W;R7W8QcK z@SWRq^!xkIym4@MfQ$6DyP~&v8BnbhU6z{L8+LlXMxqtVVJEl>u^YnN(&BjWt>;{| z)4MmUoKT-%mtU7AL5|@YJ$r7hOIHl7I|ofyqIUL9F5J(e2hr*Kele2O2t@_blNe4B zh2PeIZzSF5@Jd)p)#SnXlQ7C@eX)l5qVGh*N<9kSoa`GPT3k<6S^0Rfd8O2agh zl8BiN?x%U%EW|R77_RN7uzE($I5PrU)+@w`xk*H7fYrm)MUv78`9@psPb6Ocj8V5eFvO9dF zLu-ZL5UEPLb2Mf>!5GC_Hx|#}aykqzt;V^nbwKUAH10hqipWD-2c5VNgL}hPm@Qgo zsqiMd>fyfu70*)KZ@~Qo#W=MWTd$T%g>!37e7ls%`HcMk+{BvOcG zvd#M$jqd^76Zn%dx$QPi@`hBg{N*3V(9ZmvK2zH=P_ouuiEy@|{qqZyZo)_91}1? zVE&VF`qG^ELA}d2$98exr4PM1wIivw@4T&XB<=`jbwgI#U)UTtme(-*zA)u4B4hrf z{6;XIvOsB(YYVtq`xuU|Do+I z!>SI}zEQfQyPHLKr*wmWiu9sey1S*N8$=ofX%MALq)Vhry1V0ydq3}UcD(1~xh_5^ zto2_rvu5tO=bm3=zv2OWdDCqJO)c~;+s68r*j%-;)2a#T>RIgi6%2q*%3LRF%CbP@ zHm3qalzWnB*4Yu)ThcWsCZw1(-)UJ!^~faDf)J{|aT$)fZW+p_tQVyq$in;`+&*XZO2^Q%2SSBdm}O9U zMufjf=?tfNpux$f^=F|vG%D{N*Q9MD{>>OuQs>f*|JI1^LC|iX*=*|{Z&CTj5d8hX z=P9pDOpju84WBWjK2M$)uOMKTpbo&%7-#z~toc3LMo z!MaDGBS+2+YdJiVYVlPsdt&u!(Z&(rAr~j}be&NeI;|F2bJ#FY8m8m7Ce_9)r7y42 z^;UdwjduWV*DwH=$ajYz%VByzdC%vq|4KMjw_rwT^h3Mb4zBG-PIBuu>vSW0*vbM0qBmfOJQ)O?O6o-`hyM2PU<4G0 zPAy-#!dsF41SA^+LL&ClZ9QHo5n-D~`85zvC#AIFaOv zK$S;d%ULlGep{`H-O1#`i(#%xe>C-K*51Uq&b>!I)CgiMHtK&C5;wgQzQjDGYEnBn z3o?AUj*L;~(xDo_6bMzd;XER4Uf&Md;7o+aKEw~sqtk7r&&sTrHLMzJ07!ac zihkzd6F|Zu<<`m|E}Lp!X+t22()+z5m%u!QF!rqFrBEnC?;ry|@h}g{*6kSLYlh2S zRC%7}PWf6NrE^Qt{tU&X^72n!QRd0k@$GwUE4}&<_0}xj3}rK?pW{KDxSGS7q0UIu z3(Roh3N0+noL|6oN?00GNPe#oZfhnI4RKP+ zj3SsVAHy%HdbB?f>0sA$B%63tWaGgoX6eS_Ly%Z5QWuHH=>EOIx=$_sG=J{?HkHy4 z`JW#Q+RDePTld{4-ELH$c9uTt&(TvNt%3r8c8vF}gea?+L#}B1O(>9acT_ULa^Nuf z>II~TKEpeOwE0B^?u4f)i+wYq8KJYTNr%nJ`kz+YH&(xDku~OOn^B0yhlu84fUN_; zo+Yl6K>;2~MV4OyqmLxWsTAd${KRLeZHzuwubjcffD2c01l8>>-LL3=P-0h8*Z&mN zQ_gioF`jVBc5HCnr}yFj&qy7sER^e>5ufI}HBUz2IT~fh^OF(D4oxK+1>VRH_}K}o zMPFmqm{U6@v1ng9K+oebn5LC zQFeXRRQfdlDQ0`KWncGNYim2?T^9<8`mWv(gO=juzL0+UD`twZq>!l8DT^;oQA2_g zEEn5->bCI{tX>F*x&B(Gmi0?7qSg9!lsZ$@KWVctt5F&?`=h3z3^-~1W-*}clvYZe zfMsXSKuhi#Px{8TR`%OIH^%e)<9J5BmI}R$dE+s&BM3Lbg%<%@_R@U@ASe0Thcl(r zT6?W6Vr4y#sDdQv0&9pJ$UIk5Cv@4EGbWVi>MnqEl_8b__utimfw+B(8~G`^1AGs-}# zK|?EDw+>u>)oV;BcIV2=LgI!5SpJU1Fk35oCxH1Q*%c@Ip!|_%c+HxfQfrV~H>|Cc zTlkC;jm})C+>Se4k!H5;kG-K*v74j{8bn(wy}65lXIT*(a^Z|Ki#UUeF?6?SpEHUO zaev4WRe9l9JdI9McJquqyj9f~^D*yAUNK%!#W-0RM#WYcmRwqyCg`L<7e)LEmHcC> zp$}P+Io_Cg`TBYyX167=?a;o#0R8Ky90pvCbP_epJ#a!2VODc2AV!Whq80I`DM(%N zBxLHt^)56&8QFcSg-RXfrA)4RthZ~*KK|Svn$vH|#t$l%HWq1#XujTyV2_9cP#wt~ zf9{ICZoQL|gxUfITDp9DEu}PN7@7)_4w@Y0Z_!kSWQ&sWagv7W48jG^vVKmLxze=6 z*Jcs7%Z?~ll1OWu5$U1%W?tTadj}m}e6nA` zq0r>vBIC8BeG5!~pE7V5!>ne)IVtfp{>!?y1|g-1Q%k;nO^s%w{g*ef z*30Tbpd0~PT8se`;>GR`Ht?q}?{CwobAI(!a_7POaDM0B#t2Do8pBgY%#T+w7T~jV zZRz&KBas}5?BQZ}ZNw1dEflMPW~^?)R$2#`(T{T$g_ zr>2qDnyfoxLnc)Pr_G$Se(J1XZdpCYP>%E|?2qP@X6)F$4Xi>I0V$H>Bv7;jU? zl`J9#h|x*?wYiJam{Nw`H4^F+rlBNRvcFuB3pYv%QM6=DPQl~r`;Lsuj$M#6F^lwR zNPhN)WRE}{aAEroPpd)ZuIgbnhK$qNTkMwXp=2Q=L%Aw!eXiTvV^lDq)QT&v)o;q? z4$;E=XJ^MUhuJk_i|S|dm!#lwyW|*C^$NM9IJuykhe^tBcM7h0iD@gFq|#lY{{$@! zI@A-QczMUD>_8}7qhfz;JHA%k_eafNTT~?Y=VJ^0^bE(KwbEy*!{Di~k5}E63CaqU zPa?NUSvwWHC@)$8N3I7MI2QxUU1Cd|vP}HU+Qrzn!L+scLQD|A1{xUnD-4l67=uUMwn1 zD|@B22hVK_jpUDfS9?bHT9GEEW-2o>zK-W_`^-gPRqqd|m@SgC@^Y<&$BfrNtho@_ zc2UB>QQqX9hJ)n<&mjo<2IweDvXIL*FKg;@nfLg$#45Q_+Zo;RbtZMJ%!SDV_esI#g8cHBR$|e%Tn;OfvV`!%UD0C5csjf| z{pmZE$%R7`GOOt8rVu$RrQGBT@{b>JIbqG$s5vL=o-y((e6+7FGGY`(o)Z>QxEQJE zqe+?aP8=|#6%hQ&kVFl`8NGXN|7((iP978N2AM^$M6H}W8c@q9>%tIRO#(I$r`4CF zP5)2_san=?%WJusyUKv1duuUwMEH~EW`~9V^Uob1fzb#GEtAh2jL$i5w+B=r0=wE2 zt>SUs;F2K^D?{p>6Y>m&%7ts2X*O}?+(tCTFWjz>etuWG8b2{E?fUxduJMNkwp69xrho^uIsB&6`g1=8|_!ZWbY)Y*b;eN^Iyvh z`F|`M8Pyg);4xj-IKjOs0;BWh5Lffv2qQlk!3efl6auZ||9xb!~e;XU0r~13iCW^heQAihHVZwRci3`?3cu$`cOy*FZl#j=1 z(PsZ>DxjOunw>hCMl4D+skiol44_MM$mqV|!wQc^)LWV62olwUsEe*8vk@ zZSZ_r&XU!Cmcc~}=Krfd*RQFVu}{z#+>MHWmf$c3*d;zx`pjAM^nY9fw=H}t1y^!N zyH7FCwZgnQ-{aqUdzQM!@8$|~rKl;p+=91Mp0~BQZK69+^bGPF7u8!rgq2Bl!q3dc zaCT^<5z|f3jo~>MNz8yFk#&4qsgZ2j43 zrd2$a4j;v$D;-`Xt|&_>bCfTUp)@(udMhQH1_m(6Kt)#&Dc4lFdPx?wE29tTHp@J= z1}=h=se(~EY!DxI4mFX1=T#85IQxXCuB0O$av*p#O^Y_W6W$rPw(>&l$($wWO81OJ z|C(biU^bo;Bb8&%VLk*2-)oU8kxZeEttY1*|DDn&gcrOTBe5Gru*xGBwF-*~`f7u1aCTNEtrA_UQvkY%MXDsXA4wmKz=}%}cV9tfXsFPvceHhK zS4Z&Q=VBXAb<=|DoLb9>72LTga|V*pkui0qr*Q(A7*$+Vo*1{)K@+&JNxf$aQ#mou zjB6*+{`BR)R7IW6W|AVFoRNek$8u{+T1}yZU-U#<^X4dse#F-Z>8>v9>UFDCnjXS7 zkj~DkpvS^U>AO#UuGL?Q=wLg-5cD;V+5|MhJ-8UWnyaKHxD5inilEhJXnX(DwXXJc zx(!gR$*on+CvHPGgCTPg{%PM=AWQ^$V9=kThW6V#Ml~3;!lu}TJJ&vmpBEv0tOUaP z)5{~mLmH8aSs+bKxgm1~G5zWkrRp{4zz{xb`G1dzNPg_*w(qW7y*K%tBokuF3fF#_ z)4x7YN#o2t9yjl98$7R$ng`)cPbapz9lO&@R}PM#pX#i!WTEQZ3_6Yl2qvm#@cwE% zeLAq+MEKKqtX&q-Fb84%xFjqc8F_>|xor7@S)uJ=0u9(kp9#N4{R6Tvw2y8Dh4alK zbhjGGBP=9hFGUSOXniS~Puf{Jnunx}Q;x%0k44Tzi=jC#2NRu7Z;=%8aTp$c8hA>i zIW@<;)RM`F(==>RjG-@%V4oh*hXT?@f~AHeRW&LU|Ls1 zu&*-2K&wzVs+vO#5#(G#UGK;BHty(KNdF5ZEsl`)#7o>X#U{?3;twaJt0^cd4zfi^ zH==FS(E1tBm`LawbskOsni>W^n=ICU-2Y==T0b)zTzw0ow+Z$DA}Xma-iPm;m^uPB zLX=rCI55Kc;b?kXnv=ciEdT7(6DAe2Ii1qmsGKhB(`dbd0if7D4x|wIV`B-Gce7%G zM|MEz_=WB6j8d@`oTF>p%GQ32usmbxxK&9yF{G)e1@DMVoz%pP18248T@q=RJ*YG^ z@F+DW6-)l3>y^gPF_cFN2`y8`R7%O=G)}=3HQNdop{q#R41_){rC_}7_090$fJBDV zj-a?^P62(D-5?3(+rV7~a~5ee2UG%aQpl!j4#q>jooZoLMy!LyllE9z>IlY1_ZomPhJ zVmwwJ_%EQ;A#_yK+0hsMxu?($E_diRSRXMpYZUL6I$IFa$%+&I@uZFCTI8(BPSV@A zm3O8-F85rQ1$!7Y-y=H4^+QxhF`gW#m?5G+<0cgOmc$Gq0UND~_jBx{&r%^PwDdAq z6?AQ4+pL)w30YIfTKab z`l*kevf(Qv!Wvn#qHXh8)#(j+8+uYllp`Ggk}Rm{%hp0Me42QlLNrShvd*gRV*qNi z7zVU>>qfh{Gy1UvM?&YAo9tf~nBrvr!yWa3avapYUuln1 z>qaH+pW`y=ZkZihEKPgU9Xy6~Ew*>mo}GpW)uKtgx#9`mBX?Eym+j8$9NOnBPkD7K zSv;6f!cF7E&rXG38ka#Y%zrT?HK7os01fgu35AB>hD=wBVN<0jW)6-{F z9s3mV<5GRyD0=qFqTJ$9*)_*96_=p6KmcfzekAk4MVkf4Q15_J(8L)-Yu$I1X_TOr zHxmo7-Mt0)tLj%)N>GQzi?0Aw`|D(|ySS#tkQ1aKa(IhiIP2${p>u z@TT|sFNRvLzjC^`S-w2xIcT3%h(2ne6eD>b>lW{<62@W5OXnS^gwC0W-_k<;&-UKq z;y}*YcNC&=jL0jK#gBRPXNaQ;YCt_d)Qf^YafJIL1DXil&pQ=Ua2L=pq8l<>bmRYA zYk|Rzcx3{4x*u1Q2R5B=`sWIb5od6cdo3A^A;L;r{oS)@kY7rV{c2TR75Q=R3nms; zIeR;Nj%9Fh_OdNGO0eC^`A5IU}m5v#mGtJ@qCi^~k zWJSWG*VkUDu^Ex0^wefb=Jidg;+D-IpiJn2?Sq6zYOO*Oeb72+GL&$+j=9`Uac!-p zSCxfTbcw9+_zQfxj#6b)Z&a&nO;SWqO0Eum7I{^3~pkb zJU3fmW;@T<4BOG=^bVt0f7Ib$#L_*zOGMEDgqljIue3Pde3i8|qG$!-*JYYXUOKWj zCbXbAuM#9QYC&VIwY^5PEdOW=aI&$Dl6Foky7&M1hqn<$rR}dnt$EnBuXr!T->Sq?bY;H`JkOXb_F zLCLKm(`^}a7*9R^I3pNYnL>8>-8@-0tnit}f7{rzjF9zWH`wQ=?fw~PDMZ#UVG5}p zEiE!mlHtMy+yQL<8ox8GW3Y-dr4Iua65|G=+9QRmk_pp#*3fGpae?2REXf-v-IHoa zOBz~aEn$N~tXBZ$aJ#HJo-?@c62c}1K>G9L6*`8gp%2*3HR(*+6WCnSxHWNgt8I?}nX39i2Wq?D56R5~`8U?h9i7Tc)Q8U;I|nwVl4Nskeg=q)!60m7Gn~CuzOcDep$oqx5vnEc|yS0H#j1UxN#Wa~jz?Rd@K9JRZg~EFy4c*XS|(J-{n8vVPwW|6>igyD1yE&tyT~! zn=m1#Iz0fe0=#+Yr!x#6c~sV+CFivI`QRR=ujY*wnX~5WC0uU?WH)sy(+*`j_OCDN z&{ol5kNE64YdOiw@s21$A)3lvxze06J~)*CY);34R-CSw%dO5F-a-D>iL+6%yJ$n~ z+gJQf4&FB{vR{(bUC(`LC*-r>Nvw2UiY(d84CvA#Z#{!Cu;-CsYztwa6)U0_p|3@3 zD^8MkvWza`lL=Q^q$Y}kd?U*49OK?OdeR(?U5BGUa`^}um!ehNp@rB1>A~)(XGsI- zx!21k(6Q9y6!F5c-*T`2=bcCu_0u6mmIPfSaNzTR^n;L=RY=80h~{CKD5#65S{*ds znL-B5(!&PW5(6_QV(fz>l%B$=nEl2f73ss~q>U3Q_&lg1M0{Uo5JJ>jJkhgcnNdB_ zTG4mp>Opc9_qB|rRd%<9h8T>t?3F1mu?Xbh;ki~U>JFD8nGL3Sj)~fiSE&iBRTOy+ zCyZ0gPtZ^>Z;um_wiEgZt(6(#R%UpkeGFf{&X~dgQ@}LLoy$#CZ?(+vhv9Q%m4eL zfBrszwU_ntzrOiF`*!1~{gtH2df?;f2Tg746cg2)N8f}4{@V|aw=X*sOddrw|NZHc zRg9vnfp-s0%YJui=+akNv_F-NQ#id6Z*5emKCds`%HApR=MOPXZRg>OP|tVCv2Q(P)4aD!^(2I*90Z)-yj} zGEzPF&PmO^SXm8SSXcnCbi{rjZkJCbZhIacL!=QT*ZcG<3{Q;AryBcd@}%7?nrjyJ zp}7;bn_RE)Qm$M@~e0UCF* zM6K25(iWij>Nbb<>g~tt-i!k6{WYZ^ezd30sDijgmqgzi+Ht5V?=k+X4?BR<^5Y`= zH-Ptl2liP0cUQSW-fJ^aX7-Hn6wjRj(x|Z6yIEtY)f12tgn`zyROj)p-%tu+A6e=y zfS}8SCbawYo}T>q5qLXWI{NUXgvae{dN}p7HV_PVTklUa12k=sx4S)2czC$D61UrQ z)(OCQudOoQ+FP?L#~BL1g4fnP3V=k_VTj<9g560G3=ohb1F5WcSli1$h!Tjp7nPJq z1l$taSx*CnS^&Wssi2dORa92L-JEwEAf)Mlesi-~y7$(pNkpYnh$Rp9HK?|hGBKg4 zh&-Ew1`hQ1XK=eBMbDHCz%9jOwlDHp07rVL zLiK#b_k0^xT!2X@4XW1JivH-tb$A8f$TugYR79M5VgX&(z%}qq1ms1QnE&nhU+0&m z7kx}dy8pH)-r%a=FskQRPnF>eL_H(oG~fT(56HO#Bhv3h&>{N;U(dvyiCg~|p-|K;RwhVs^*mZ`sKuBRa#`=c*!$i2XWaimRh_4#EeljgUfy3)z`nbx4<2WQn`UDU@hGcka_<~KHO2YJUw77zq8|2 z-M{ZW12DX**WahpD)r$WjuaK&6(yId9!|H;Cl#vzTZyvQ=Dxr*p>|_1fr3GMswV(( z)ks76VrPD9BOTg@Mm^WG95@e@Ish`1?8+!po8aK!6B8VFQ`t&;{95Yke+@9#9zxyxn^t6!}N; zz49g?I0DuQR;^gT>GfK1Oh#yN#2wIv$D$JU%fIdba$G?4M@!TBVsQD3LGuKd+dv2` zUkkKs>OtWuSRvuua0j5z+fV+)MaZV|JFRp8h^GnW*I{7q1aSZP0CtRwMR9+({1mXh zoe0RwY=GX#Kv<#k8C;&9AN;xz(=fSRDzdzq}bc?YE6qP<_ zymOS58n9-fYppqAGI|aGa?{}b?praJH@y0N=k3NX$y)pdn(1SVf z;{~~u#YNMHQq|m$flt5^4lp&OKcr`0^=^qB0tuB;5M@0Nmtcu8-r1akopku?$sZt= zIXqy?&dU1L56mC1n)jdQKOcBsCfgqG)c?4?&-hpJu-*$NNxDZYCOSsMbEn1O;G1M} zTGl1-VK|tnfzNvJ{H`9bQb6$6sr5qTqw+u31oJXEDOuua?W~Na!|$cmOBg05rtAH) zQ4JYP%Ao-?2uuK2PRjvT?6&mXG6*E^X}4mk+5pHLEDvrV#yuIPiE7pt->mI|;R*wT z^Tp`<+?TiC!4@N*`v_}nap3?>c>$Py;@oek_kMqVf6y_$+<6Fk#!D z4(|#IX!m2)D?gTJIySIC!mCLKb1_L?|@yV(KiYXtYl<{jcx8i$K@zkFU_vC z`{O@YGbjtxD6FxFO~oAV?G>sWHgV%G$(a8;)c1XrktqHbrvrD4~rcS`*g`VJ_KKY;0CIg}HO zVzXnT85KaWx)3|?3E<&l(%Bl13iHJ@{POji9QLN)v3#ztf22Bpp|;`p!(;?3C#B`o zcsd~%CdXT#wPHP%A49|`p9+f&WK_AWkMjXa@vjWT^T!K?1--Ae(vCl_I(o06k0*oB zr`z8kC^g!TPm~1HBJ73Qu1~XHc?PUR3Q>rUL_NOW0;NT@g%4yZaeT zgNuMtPaxA?X^<)I>+$sX0Ej~41r{-efU0;Ibov;2R~BG3lF{t8GvWNF@9kpW01Np| z6JG5?i@R%A4=TWAM(YYmxq_t*!rjB=02=QPN_L&E`Cy%rJzt7^=zUut(mP<>j?`x# ziu5-Q0>z2u=H_+=cklnoVNicemJNJTN{0LuqjTL-HwrLnI$Zp#aSO6JKsOT92o(Zq z!C*y#EdaPjb1)TX^v!r`1GkU|fZBH6luuYWf;`A~t%`bB{Azt=k(!qm--Sfb|7O`Q zJgZu>P#!SQS+r!LE*zFUHDM`5{Frvx;>{kwJ^*%3@AGR-UbPG^lm0Q9OHM6fq!V@< zNv2HTTvnR1kQ0GHs-8U%$be;huC2S+qBd@cX45I0oU8B`#rN|rhru(;*NrnW%s)Z1K76kBI8~&Np7I>K7st@?sD%Au#00! z#nC=$3>8ZJ;MFd?*9MS6me-$*0|!SAnqK~AwoOm|qC1r!nknZfox>3A0n8Syq?a0W zA0sk(J=H-r1q48Z*1KsK1eG0@+r*tZB=Nb*N(?M6R!l%bsv)hKC5GC+(6aE4D00oA zuS-C|ByG_E*lVh|q_4Drh7VAS2$Yxa+k*N5`<`_GSAS0|VG6h&_ge@*-YYntf*d1H z*cakQ_|DA4!~}e)^0CCuz~~SkwaiF9p7`eR?g&`A-NtaX!ED}9wJCHswmm@hFPfl_ zX}QUZ!-v4t%3O22V5k7t<2Bh&~cl)~P>LWmQp#JTh0MlDF zu!Zt1@M{zEyK3<~Md*C>fWuO=wYB|zd4P6BP=I|KH~VyZ2EDR8l#`2&Wz&7Sot%EF z4RO9&N!BOSrGi|=?bbOlqdg~_bY{2TQ`nE^b)8UFrkAGcncWO zYhwPF$#rU3d^47>O5@BLuZb0r#Fehq+aAd?7% z1dCGSdNl#dw|(*s;8i2xrF9k_flDfwh`xtnFYYx?p)E`t4vU|FH@$v=ElecS?(OA) zC^$Eq5sjo9{7_EMXOgoq!IKH*2I1%Gw)JX%(h4XY`2$m)GO6$09L=kXJrt>m;2*6*A8|3x z5KP9q#sld7^H{3fh5GC9m-{QWWQdw{CVq;lHOLUNlZB8=pTNxFw;nS-OB?>+|45>Y zXbh4$^M1gzsx)etdwkmg=*)h1i%pvC_m}!8&N{m8&-|@G`Ujla=39NQfVoV8Pv?Cl zL{_d|(DexG`D3-^V%9hJ-GbYRlk6?WDbx&|Sxy}w`4fp&3F5*wPPN_dFYJ1a)(d6M zRZFeFaN|7-vc)gpVgkrzuZlWQAJYTxUBEhgAK{O1-`S1KF0_{aw7XZ;=&(FjE!DlB zV?THY7DJ&6c#h$0I}QR)D%n6a0ju^sI586w*0+ZT&bS61?U(j)}=b&Z&Y7uNti{E`Y zSw%mCZQ!r;ko#Sl916;7jFA&yj7Nca1wt+KUgnM zhB1Tuu7Xl=`^laW4ijUH(f4W`Te903{V38O!hPphW`+Fy z=^ueP3S8wBFjf3PIRu>jh2-a-BfL|F@kuZlTRH7bhXO%jbg9F|cB0pE_h8Sw0}-iG zuTfc575zgVZynF_)5-%-EdYjX7r^*J=41FNYARCgpK5>(_E050+ZiuZ0M;JJn8aSU zLpFEX^pP;8564%~*zN1H7u^cz3iaULRPPH_!1d}NXS?iTFX_tG2LZ>q*bF8vy(ZhZ z79d!^JN6O&Q#pmG2X)tI;2lW=xw3|}&(-eVGz)xzPsy$yB&pQVq&bGD@btL?VU@p^ z=>}_@s^#zjdgPa~X_!6)kOczOpod?dwV&=k#HM9s**=YH&+J_>WD`J~0OzYU)3@np z28fC-0V?!!?^}dXR6cOHpy0C}8#g-yH4}oK*AF|TouSC>H+|qPy=K$v8wh~VQjc7u z3$m4f5A(afHlAMlUr{~o_|@BN<5McgnDiR`GEHV+pv|TLJ`GOqp+JqtKZ=x&rPs0O#|z3os_#!Z z$#3dLpMzq`%qDyGn<}F?mJJ{!3z7_In@eWz1ZTT3DX3NHe0N~qOiRiMnM3Cwc!3`O z{QkVVb1f8P6wp0K!o-!;KqV|h+|6oHGr`@mxARROKS_NI4*-r9O!F|3_dsF;(;K)N z@qlRGu=hI;)QhT~KQ-7JRR|A^gQHj7ha5QyVhhC1X9Ozh4)MPXBY_mbPOLZy*tlzd z0*_gWv-{S^$!au|mvZAFsDG2}?apkZ2CCf|bqY}oVxg7$o3pW*9;1}%PrbdpGtBeQ zlq%g>U7gkX^ZJ4MqIG)w%$X`^dMn$1PGyMC^)}6J0V*COzfC$0ffS4bP!i%aYzzCg z2PVaevH!*?!7B|AC&tJil3mUZeHUe&1znFE=Ey$v83Rt;AKS(3R&=;YzP6Zs(=`)- z?--ZGNAF7^8ra3FXY!Y{#8^;6cNklMKWPsta6l-3Iy-ub>MHSVIs_yj5x;9L+sadi zM$=k-8F(tTm1hmmbV0~}wQ+5BD)2d8!sNR|3ogx9Xym0&(_sgXd!vDJ&cA>s=G6R$ zfXki0P-N==IAeI`=S!k(HwOh3BskwbA$PSsonAq;v|erw<(`2Z@d<-6^gmJuq23*+ zWLZVq)9M{(+kL_Q^Qn`-|J>(5#p;Q)*6~Y0%2WD;%3+m5uYSwF{yYrMEsN{M;C5G5 z)QVNx3}khgs@kO>4X2o(u~vp>R#Sre00pUMb_J@_1u(0G0v{3Ap4eZVmzoplA(~fXXhRv}op|zSM1nhvKISP_(85-fJzLs5DEZRez7tT))5} zLO}ga^*yp}w$G0F9u<(irki;WuLanE*>%Wdr3w4EKb1?3R8=*DvU&u~*$ z(Wg%1BV|aEM52&!NfT06a2x%JytklE)Z zc}8ytGn+Di8=CHcOfw!ZhN^HUR`*1&X2}nUMxNl4W4ssZM8Ic2%1TbhO5h+!=15jI zWR`Hh$!8pe3cKB&c21^a<-!>X`;oc{OP9`2iMwt@qQt_O$LDxtaZ!l6{@O0HQnZp& zZ&{Ol!6^Abc2a4q8AaG4pF4E_b}|~ z_g*&}h{A8eEzlT=`>xJqK4Xx#qC*fz8EUB8s`7XFD2sr!^4V$z%G;57Hu45vheBS} zxHt)RgLUa$tJlFoFYdYg7Kfx;3lmpr#$yZL7G0KP5i04i@dy-dR3iTwkqSqCyMfCI zkM9J-@o!Fpws=ana=35OI`uqhg?y?eC0jTq=^W`^ECjp4ZgTjMZ^n614hP@W+JwnL z+^<=GbLt~#DU}h?Wbvg}Eq$dmxBo`^krmc84qDzd6xDHXUs=V{ zEmLyTZ*k}}X)$UFZ8l3vz(_#E(&zO}cjWkufLv`Xr+aV&7YpatgcLGKCWPqbYwASP ztRKDjnE4bBmWJ6qqFjk7wUeK#4j8# z3y_A$#D~KIM)ZqhaXK9@Rb#)NhgeQ$i(A3%%i#32U6GGvx6ULxw^722qjDW<(3aS= z#GGpHh;O~sqGgDM7}E@$@Wx43$>C53u=Aq zVfog;(u%trfSfFa&{Gq|3?X`(w)owYrx408u_ulP{bBC*+kpqOgpz)etaY;mQ^6!C zP=WSC+@2e z)v_ho2sLhh@)Y<`=u7h(Wu?|V@u!B z=;viequjPL+pF9`eDq!;*D?C>t1QEY-)tHeMs>pPBwP~)BX@3x z6_Zv#{J?eZGFQL-XaVVAGkEtZTfd6RtI+#m332%Cn5RRl=hl?3AdY|7k!b0Xuj}5= zCX@E&493zqN29_3SF%>YCREvBlCT@W*N#)@=dk5+Pu}czqi@Fp13tq()59wG4PZZx*qjY#p_U`A=`raRm)B8bq9sTvOQ>>lUiYn~CD2N&Z>K|WZ}Ijf!|Px*u$aq@=(PkFXOUKg7WVGQ#Acxi3V zZKDdu2PLUubx%7pEa3atsDwOjI!*?WV-1%Ahj6ip70l8wv0?n5xK-{7sT%5^teMg$ zEOH8^{-j}1V(DG3UT?@SR$N=JDJ$TmVUe|)ZeJ6~n8RUEHrXG~6c;%UN{~05cb}-3 zkcybxDB!(8M^-!K^X~2c$r^_XsUk0yFgcCZOnwuaSLhK4l5%9pV>yw4l6_rD(v02`;%8&Evwn*bcp|@rEgZVAJ{J4u+Aa! zc(k%Mk|;t}!xhc3)XV%)XTKRnpwDWBiI4aSV7ROv=bF!cGv4m}tQT1NgkL`J1}^3x?rpLg2s(~`^PaNTskVN&4=3B? zG$>v2Dr`72(Q8q!C#()vnP%6ibr?^=h)D~Awwv!nFsKNy>3(zGsg2vF5kYD-o95Kz z&{ICH-N;VkSgtp}k+-!DvHVlJv8SXW$f1wq{Ge4AZNk@?hK3qJYdi=OVFS;v#bMYt zwQaawya!59?e;%!Ee6SH;7)lkaZU0D1v#LN&NruVtZBg#9`*NsQdtGrp*P$pLj$j~ zXUHn&>VbL6ul-`=I@_}>{-W2P1%i#G+bxGn_&<-!a7OrzIeL)d6($(N*-?|S4akO+ z#7-p84!vc!{O&TD^*VdnG_U&00s_wcE`PS9@pR>4t;d1oLVRU^K?|#4N1Ra4 zlf_(KiYgUUN@sE^eYpyrzpQO{-8i?xFGwvc{?)I(Qh={}hAu>xTV`^-Y$kLSkyb?YxS>pZ?Cx2 zBS@pRokM?h!rb6UzfJ8MZtlar%`(G??24H+Qu8S;Iu z9d0pg`7kCD*!|`ZI}DG1O1&3E+zcunJGb?(hgUA@#uZJG2+Iw7PT7FN*(@EUKpH!0Tg`tf>?y zL{hS8|Ij( zx;l0|h6c*k!nm^3i^9ex)tPY?6RQ}_b$teymO_Se)OtAbmHF7&C66IY)rNyIii5s= z>*pTGn+qoUBkF%VJo2jR{#@r${74ju+ToKxRoyyKGKA2(6S#j!Sa@sda;5ZBoRRS= zFK5D6*_LXoekx#caw#`j;$qPzKjo^VB!G*5Q?#d+6h$0!6 z%+QeAd8k#e7V@Y%84s)f_P*PBx8(sT3nicZ<(K!ko>(91e6JT4={7C%sYU{RAA5ht z-8`Zce{OajvY782a~Z3jz@1i)d_N=S+sC=YYogiLBj*d@m=$&2$@{5trEcjsw8T7k zsjm0Uvnxp)kMJn79zpCPIc-0)KI4`dyuc7?AP3EIXNhF+YD6zl*sgaebNh`Y%_U zlEnkxUWPR2KKpISX_VY*PGNKMEhl`>m9Qe5*>36Eez;vNVdYP~Y6u?JSPMUWR#}nF z_*})!D@$n`pJV*hT1fKYXPmHc!Y_CM{?lt1voV6}Y_kciZmrfbBRmSTgMynuY30yn zW~+@K!mI)t6*G!(?P&Fh^)CJ+198ot1ve^YQ=aL?1w6A^)Yf>stwbbiT(4Zt`fg&k z)c4k#%5hYo-P@|OBo{H;lh6T{!JEg~YIQmnQ9t?ets2WhmO-QuDGr~JIVU&u?V-jC z7Hkr{aq6n^Gz!FQSoIJdaOWYG(Fh^wMN@%xpz+m&yj2RHPkuH|_V$H|<4GKhYivxE zfzzl0pU|P=QWLKQRErc9{bnlYlCkvYh0^>7HrzT+MA9*i^E)jMsfBd3xdzU+S8eC9 z57d7qc`lCzX4*vyt>4IxABxvR`oLTkj`q)_*EB`ems*eJ!TVkk9?i;xSdLQeUPbns z6Iz&S*^ri&rgyIRb{P9!5gsl22Bn}Dho*jfpeE{6n9o-FF(gjQ<%?x*LD4^i@G>XY zFeh0*CszgnP*u-NM>=&7#J91p7Yr0E2T~!NqlqUQHe>J9yiJT!J~%#nyua_xZ)q{z z!HTkGpur?DE<5+qJe1PH`^z?{pLS-b5}RiHnwo^bZUgWhAV(PEhRez}Ko{r+iPT zd-PD$mw3^VY8irP;TU{cECJT3)sVaUB>BWjopL!=8KnMER*rrw6jB}|8{+61=HJ}j z!o8gQiZip3DN_mcc&`G@dCEHbi;z(B*CSBzb1lua9<&gSG0#!7-lH3D;@c|*5tDg}AUIlR`wRTV#x zt-|xb@J>@?qDzYJ3={e1CW?Nf=@fBcObH5Z!Y?TDp+mupJVgEJgs@b=e64Oxtaes^ z?JmDxA>P$n#mj>#*2?vwPJ~D`Dp?k*7!l#6{`H)MeI<^lU3jP4)&tMJVn;trAN~L? zw)AWmY$(x!v#5c*7`q;c8d9?P%r`oZ5H{wEj3`JUibIzkg94>Z(aqi$W|n-MQc{|% z4E1Nd4a$nEE;fn6G8Mv2-6hE5t5J!feCvxI^M!{APV`dbsRn_nXcUX^be@%=i!q4x z891Czk)%?ERuke#xHly*%|DE=0I5GtVU@e&`x1|Vew&&Y?lioIPP`ZyQtdll@1D7u<&hTLUy3 zHm2r_uT#^1CgVY6n7jx*{)B5BO+`3(LB_etQxt*uJN{ zzs6TB@0LxJ%^(ke`_z^ae@yye!rN4NONrSKQtU?Ho}DxIR+;7Y3++(5sI@Z7VeuQu z;$9<%Sa?b@o95`*->qhHT4nHf zBOr&AB8;JYMD=%t%_MZ22i&B((U*{+k=+I1&%r~Ptt`IN1LR|>NTYepw7!=tOs<<9&TmIr z8k%vc_?yq-rjrOO1`X>au|7q#n7Tn}qOlWeW zgWXP#fpz)WXK>*?n4gl))vO}8&cUHJ#x}20ZEq%#AV2v0vYt7xx8y#x;C1#h*_+Qz z_>re?9EYLbD?7%uFZUV=E9TjpMbS#T+_Rs3oUN{Onr!Tf%clq@^9;H4Z>h7M9Puy9 zk8R91QeMKEOREjk*BigAho66mRsBM=x|`|O_z0iE&+lVIh_sQ~8p^VN`cvFE=Muj` z5s(nnPA*d(il%54n2WGo+G|sk&FQbSs*6x4sEd<5N(i2HWJtUk$242VgfKk7Fu4;k zzildfb+JRz`~4EX)QWteVJrVae#bZ3^9YebzTIvV_M|LOV<_R$l4>s7-O1C^S>E!5 za*9zGnYRuzssq7K=Or8Mhg5$i);mS*5fg>kd>LKgceQm&#^f8(aGELX(bv*L;yJ7X zgW~8C=p1sh{k~(@`#IgS-tT6&$VUc+bFvRm#iXS&ed(V+DFy_i#Fpjf!-((s$w^-lTmX&yIKe}v}1_Co*t_XnIJjaA1?*3VVt5fw1;$(dQOv0|BXe{*YQ zV69OFpGuB%;}C0&KhkkC!w^IM9{_+rf4^X&OaT>@A!j;p%#+0Z#|{)rbaODq&nE(o zr7?=BG%7EMr^u`V3SfZ?mWZnq(nNv1vZyHbDuu~bth_}76&GQfurEjU?{mm7K^fMA z=O%^-WnM%qWdBmbkvkfW+}>dL&ITiPfFRZzfx058KF-i1cB03js@@0`OX#WL*=_{S zaP>#(kElT`gtp^Es59;kmRMwnXF0^Ppd1P2IoJ~tu^7|IQohuXYgZ zXI>QyWVC=dWV4n)-a3qcnfTzNaLP|sabmMl$uwML1B({In8KGIyak@`lVv5rWJu0R zl@&-cWE>I!D2H}{>VWJ~5kNajN5j_|v7@GL3UfeZRde_bXb@aeWkH2FOsbi%#2T@q zHsU)G!OfS!>pGFE#3iLKOk7xI$5LoP5P|WD+);bPb_F*V+yy6Wy_TKpS&JA();(fv zd0(}LTP{53LfV8i8P3PAl0Ea>Wz{Xv*le{InwY8`!{bhEVfEOPukG)}o+2(C_rfA; zQ${7%Nq`Ig*aFeu$c<*D#F(5gy~w-gP!UMFUx<3-a0^TaQ2@S)8YJv!#F*s$?DUnD0B}KB#R3d5S+O)5n*u$QgfYubRx+bdVkI|CC|$__KT>rL+%df|NloC3 z(r#?Bsxr+GFjQ+}Q3NKn7@dUD2z6SEF<^GKR9V$}3@EwH*wnV;Qrk~RMfK8tTylGU zPnFtrk}FHPPfqPIDGen}OVp5mPwsh9VK@hpWKl>>m_9GFgCfvxa4+YQreT@lsd4El8C}= zToQ|`@t7x=q)uSQF+%4Fh?auB^MvFs6H~jPzCx`vIkn5AWK>q*QE_#joWg=?a%#^> zsXZsBT4nVvXnK0z>8!8bS8??LXyz`ftXOM-pP4>j=I+6)sdf*VjVfyw>Z_r1c3WjN zWDZ62tg=*S4NJ@zK6ekQtdHjG9x*3l#N0i@=VW}8xEqX>SfdtZsl-BMwP*Cgy)3R4 zW=>qJvTAWAXd-A)=Hz8rlb2;qSx%a|EDOZ?YK1SKR*1w;1Fb-xHEjiH)~eiDD?zA> zvQbB&BAN?ALA9EF;+h<*qf~35tb&+5+m%&WGvTh93Xu_NCirDpvsY#(uF3{--rD^6 z>+(@(!F}H9+@;;DiDwSBivhpHmUr;-N3;_MMWCwuBdS-Mb6H6(ItiC{2 zS+RGe7Z?ICc~w?vMagMJskv5=-Afp}5K{ zMp?CM?*R~)y;;S3vWoX+9z=-+9*h-H{8A|MfbU6GWo4n_%05U!p{1gWHBZ*T>`du% zSdV4ps1{;5bTAtx)LjG{4?0Xy#TY181S{gu9lluyb6BS#n#c+~Q;r;nXpg~OqDx`RLpXEgX#|%*|XnACO2YIp8R-* zlRGD@Tsl7L3nf-fJM7Qh?R%;Qqxj`gqtOsiXd&PZ@J&W1^GhwI;N5Ae;Bj97D;n=q z=T{zrH8Hz=lAW!2g9)q(aNeaOdKN7_87qjs)B+64#aa>Wtj%~hRvltr*H~qRGk0Bn zRe}R9zjCpoJkQW{=hsL28ieQUI>TXg#TYf16&z8wuxL@qq>{jP&G@?Tk`=_ToUm#G zMqm&XU9hrF!12A-aDD+rp1Ftt&-f}=7+l|y!KA4Y45f;bq?$rvwzWqj*BXgXJL{@8 zgGnWgxiFndxQMT%X3T^X;psw+YAU+ZS9;wz$g&e=Cfx;Qi(POreW3`EcOgB%uE^0= z($QwfM}0ds9Raz;qqsf@NKy)Hy19VxSYo>Y!0upwSq@<%PIUl$ z$3q1d?w~zI+74G)5x}W30!(-yxks#)=}x^;aPKUL$}kbZc%JLy(baRvKPJ$789mI9ewcS`y z63U@=V^tLCdnXk|$sJTCp@L!$0QnSDS?y6)>5D7?K>D5vmDSEp6OuaVyDS7jg@y>I z(7>Q9w93lr!){YlAEKa|n%0}&R;8lvJvF`8l=OF|vaEV{T6(|f{LbpVnY-SfwX5IE zT_~>l&)(%|*6x9`R87sv0D(cRMNJ|KstnNJL|V~{w*oBVqq%$dE!LdfEUsK-mBBBs z=I&vAHGl8O1(~B4WU;tfxM$3w%yEmdCM?P1H&-gF#xDe)IcW)Mt;{K`ud=41zGCl) z71T-;Li`qMCX1-t87p&UuE?2=x(fx;s@&PD@)B2PC$g-{U$8E3{<^$*>+!w_O zHzi8sH(EKfQ6{ZnSv8vxGEq~3_|4S{21I2w3*z!@M1u>8E7oRmM>G^{;Q6%}>$E)7 zY0w}AGA`1WSE`Hh7H)uOl~wMd4XC5|U6!gWlwPQg@|S})nVNl zg$iofdRJuy1S>*0QRNwHE!0=2tTv&tVoe2Fv$bH&mV(t=RaR}uU$?bj{brJVZMA-L zK5D9s+X^O?-_|5mQ^`eJQ;W7*S%qSW-(R6z zQGMcS9`LMu{1-=7eW{*NB@^hwNcG@dg@fR-9$;k^5%;qqqPqpBFTXmY7ib>}A=X0l zvYM)Bd$LVQUv??7k)MpfD5Chy6*Zvb^rBQzN_tW9E{F#}sp?bG52WckD-}y9oE)=z z@1fm$4($T%JxFrjS%GJ*wQFyY`UAUAO{uJ6O{L0e55KcIn86B4gwiFmn7>WOU!P-9 zz*uL6vQl6-zQh^2?~KL#V7!XgNMaxtXYcNGyReNx9jF$yiYYk#!Ln`%()o zIRK!yFTSh*gPvcPxnhiwa}J|Iv#KmF`v{0(_01J(Dl3+9L*G{U3d+8lGNth(ls5$h z#{!ctdm@B#CEOcRmaL=^6De}Mo}&LwiTXfUU>Kg2`3)7ys-k>XRH%-8kVVz(a77V6Av9zC+l@W^pnow48KCUb= z7w}enfsA2=LogG`QNBv!MMZ zo2zrE*Dt>{f|VyWt4wgf!m&@a0n3t<2K>#mq=r1Tz!qH8|299pR!%MXgrl$y+jH)0OR2DNqFe6r33?ebb z&Vrn|tg2*^8uM3}QUGg=gPq83vmuXnng$rt;}+mJ+TuH2F?Cb?F31Y1oj5V`xU4uh z(c+}bHQ@xfGB~eu>A>T#E0bl!;g!+Ir!*W%Bw#p{b4f?1)E$+K6F<+#SZ5rmN3ne3 z(HzVu{#F=5)s+>PIw+06u!u@l;bA2QMF3Dj=n3Vu-VN?=%BVdN391`9l z1B0{sXa#2++>4NaS?x5OUYHV6LxW-oqE!e8j_E-I5hm7qV21C+956!!p$RdEqcGs@ zuo~nq(J{Ww!EQm*W|f6#DC9Uv&OvuKoGyrlMWY@XE*k41X5^ex5Wn_tDsiW}1uZzg z{Nen$6sVeXQ_$mSVN%X*CvQqIxk}p8+8?oofeTkychQu-3VodfECpe8;We6xa8q1B?JN>$?^tznZgNCAPCx}YBlAH@(VR7TT2-IR z$~p5b$+xHB`NrXU2X7hvG9JI|9fkUbJbLiOGZsbr@+Kt(t|tSYly?D$+EMiqDXhd z4q*h~7+e}DnH9ob?_|#TolF_%Dklt>5T89bg?Z>06O66BQlhb=l*~MSdLrpR% ztvd*ssp-&n7@yWsQ{s11tlX4~Gv{413rnda{?^~PG?h|Fk;Z}w)zrAOHvIM}4MmZP ztF#U%=U7~&f?-iNktWqh)bpFGNh$3nq`}d?uxd9hwZjDd0wGGNPLt9w!_F+pk~>aJ z=`snkO=E2~DaFKY`aQ;O{K750$23eHHC1}=X}jK;wyXElUA?BEph`z&1$t*%THhJF z-<`gzFUzXk{bua$r~0b@>b&Wzb7rp2o4q=JHouQTK~=C|Jt!X~*4%aWjZ<#o+PpdZ zCBVGIRk^eH>w;idXrV%zt*UG`BCO0!WQv?w5Lcr5A`DiRQs~#@&PA!VE>B8XSzpo0 z`f5!+k}lkskAiB+hJwZDHx`KaYko^uFBL3dy+m5Nf#QlS1uH?D3zlyzShk^H1xh31 zHyP!j-13E1-cpoLtfTUmehiFivyT}ECD!uIdCNB!tWa^qnrds|8q`!^wiT}1Ubq(h zw!#ft3fEKIw{hFP4ciJf+Lu&G`!^*OeVkOZDQUlc32^_G?fi>R{HlsyQWb%=@%I1^ zfVL*{D=F4gs7BJ+li5{FQpp4*`lPhtq;yeQF^Zq0UBK}71D!G*VB(>n5~SK}rq5D*N{&)8VDheFR#3Z8I2EO2 z6zgj!N2w~D()cwLzlloQO)DxWmQs5Urn7KTS*3z1BlA#3=3&y_!x>p36i#~%WMs0Y z0`V9B_M)0P2+GJll)=L3U{=;){>mS}YeLa-n3WQh!LQ-jFW{-yuj*y{-`Nv`3I~kVRM88J*y)qkL2YZCFOu&{R76pDu>u32u0La^rZ$BQBEFWGE@#KB^FC` z6yARE?`Uowv*d&Fj^^haH4Kz_c}EId`4mn0`5@FV$3y{xQU`Qg40`BsWVhnSkyR_52Z2YmV+0J&+~yKRD3FR!`M|3P{n4U=qeX?sK>IyYRCx42;qe2A zi2~q&3n)5q-~cHQMdC}tRIX6DpCyE^RaCA-dNO59WW<*eSvW~N&foWQzlC^oA8ybv z%0(0N;vOyRaX9X0xq=#ljFcjjB4myhA2?nt7m#=aVefg5m#6}XLH3I&R&^A@kPyw7 zAfOT*J9yxP4;Tb@F-;WjTtGzPu6ajFN{WDB227ZwR5e8= z0v1`7^%Blx4ae{lW#0?28c~T=f3!|-38}0o#-R29Kqo~U)Of-p(`a;Rqfx0mI|h`H zS|1vn;BhLgKN=#>c0e{9LlfdK7c!1cYs|l`!~-Hvc!)m=nlv8ZMjs0d5>*C6@kLlnB#6 zkTfoZX*63+$ssv0EW)T%mH`lPl4c2n(>y9Jh6Smj;1QoRGDQUgm%463YQ0gZtX_Dq zhLT%j^#IEZ)G!peEO10>7P{DF#2k}~;tesayn&a2b>gRzbAuO&_e+=+6|}1G1CJZW z+(u)n_FanAcnAW9^9RF1NH=RU#C_Er#oK|V!I(7aSs|#HQ3_0kl?-YvRxF$h@02UA zHAg60I+Y@-KXseT!W-n5Jkao)Lo>0$(JgbSEx0sV3Pg|w1Q7wD!D>UK$qJQGX#m&9 z6R3@FGa2D`Uvopx$ACRc9Wr_t_?wwFRS=#cK1iC+7=W4DwuX0vHDT#aB=EdV1&2HT z2tdz_-8k{`qICq{m~f$zbA}QaJa2rnU`qBL#Cr{I7XAr>${SW$di&$u)EIA1zPad& zH=`a@g~A(_4?nA*CSy~Zj7e=WI<+bP22@(pv8kwqnvF)!_gb^DC|Xdxq_!A~qAQJm z_lbY6DXlpPn$(u)$EG%gi@;z=7KD2Kbt#lUfVCQ%&hNwk8%IL9g0c#;1s)idG%UlA zF3tFs<5=dQqOS&ZYsI1aqW&JaTUplp!u&dPsR8}Z>(%Mc;2esqh zcS2>A)^P$#k@Q~Ecd4>U>ozsL>*Vwj`PC$EToD{KJp@#{#13m8Ro$0&ZnYz0dODwCYcJ-OQyYGw)6jXg@?&=2y zWz~$`@6X71e`dx9voi+F+A|O|8`ad_4-@wcows+$+`WV6?ioC1&!9Pb2hQ0$0Cm(H zh~TOGP<7Xbi5VZx-TUEO;4^_|eKilXXZU>7Q7EgjM$FF|IWG$}Rl>rok@GW0Eyy0T zD0}SU9Q0$BWP-*n$pMX7l09|_s;tb3OR`a1OLdlemB4-}Tsttwn*B8!3Wwo|o?)m~Nu|V_I z7N8`XvnGGuy1Y3okWf%L4JZ-Cm8vXMR^aDIKX(-pNnDq|U_-(D^#v-`SfttC$bxmw z+WdLQyDkrah3oSdtJyqq17H1vM2)sr@Rh z3Q$LF*s*^-imUDWP+YB-xM|1!kCXPHh}y(bs%TU4fz3&xod>og6>Ux0zZtZXWfiI^ zeJ=!JjkH4|s;Q)12b0o8U_!JLecHj~G%%=<4kimjB?}lUuFxMeO4&_H-d)V%3Z)JU zFax8fD7}?itltm>Fo-ILNTyV2XYS%vxe2MFjv|UE;ysvFh^d%B2If$VX@Ez8#P6Dn z_8v;#duZ3*!@Dz4I~DT_C|VEgX4Q0reddwfnMYAd?anIB;CD)>iwGQBody^7(nkP))(azx7mbEDr>I9=|g3q>2cnx(k&Oc~|^^IYu7Q@{Xd) zg2qZC%Od_5DgRi$Q6BoE5KUhQcj}K?;RL)@O-53JvGT^0IGUf>zaMnc)jX((JOzb{ z=>tA22Fe5bP8>izQ^XUwdhlS3H?pFL#l`{TEkq9<<aq-au#m7lSP#!PF;ht7tpgiVG;sd2%CqU3s zgPAMfLGq{;P<~MK;A2JVg=8%uJt9Cn3jIMks2=-^4Kd2q8}0vHI43k4pg zgVZBCdIUl6LzY(hna1cP9P1nFWads|I=7)-!f~)6 zj`%v|+aF--pK4HTLlddNsPqP-)2%Qd3`a4X+enO~10O0A9MJ&a0kM%p#B7Wr3WquI zEU`ETlsaU9X*?#q(U^4LiR63`7AL}V=!Jn7Ppc@FTpZLts*xy;VY()x(@;b;9)qds z$Ve}KTZOyejc9JTM^hpN^AeoKo?(&BtmxB#6Bt@dIKziG!~?;f`F;V^F5im2$De26)lPh z6OP@evRGo_j6OQGHme0FVM?zHF!%(NQmLqRP(NS?LG@6TarZfSB&v%OzmE8T;l@Fz z0a&?>|c*L|7M!-5Fk&BA}ciaN2I7UWB5W@O9(n8q-28PSaM~GHL zgOVDR5Mq&4$C@54ngF~2zyt^YQ9p*IuT4WY$UD`|a*|;5 z&f*Qy%BM~bn0q@gxZa_d1D>LEP7geuG3F(JccjR8kVtxa@;T>wmQzIuhj#=tcz1xn zxW}FV{`mqQd%SntTT*Wsz2BkKzXky&rSVw!;yvXmr52+>X)Retv6N~#HmxQ9frr$V z<4|Lyw?OSNVVCL+DpA|C9-EGO1Lal=0Kkk(Z$93TBx=A*G#AuPET2ZBg5r%dW097Q zjLk-+H66u*t?9V5=HrkQzMKXMGkMue(gRU(I4hKSt;VOf9-q!HtXNQ`wF8YuZLH$ENZTpL&?rnMQr3rRanNbfKawN@%=0xBy~ z=Lsl{c6Fb!tLHQnMJSLIVSH)_gqlb^s1r-6T`;k@nwZvg(k{55@auuu>dPq9PN)Du z?@YsuVCK6}P+|UH_`83orfA)T`vTKv8Vah64`%J{H#4K(EYP0!X6*s<{;a+IXYU!9 zxOY%u=AhY`1LtH8Ow1fOckhrnStz0g&B+`L4VbxEgA!3_We%E~IUsS*02Eh=nS-Gr zWuZqsHgsOruz7nwnwR;}0+d+bv(SG8nwK?vLDukv=ra>gP%X+H&A)b)J!(2o06dDT z*=q}Ctja?H1}1TB0qUH&>+|QWXFuNm?RQbjgQT;@UiYuSJ-G zuvh(-$MTFCgeqLH9yJ?+K;)NK@I@$#KYwlh!VQIsHWn;GzaEsoXk+2h&4o)g?*lDk zX;iTC7TM#iLz>I!HTUYuJ)nOLb0@RGr=stHW$L37%=>j zs&Ev+U-RRy{2kbW5^LuHR8}accBB<=OF@qkMKw?Q!5wJ_ccA9keTan0CsJ0S zdO73>W!3J(NxKiHq#sI2FHW&CZ1(}wFsN#*pi0d+WP~C|8k*3j?1py{ zdGx!pj-ZIzlXWyB3;aRjQB&>a_fDvkj_u7x5ykJIP%mY%E;@uF3dGupn#263Cin%E zYNxCtd&Oku9?b!fIhLJs6qK2FI1{y#{#A*byrVh!$56}|p`gmmM{VPX6_k}pqTKvr z*#)HB(xke`)jWU|6do-oJkFj<6gjA!q!+Bv6-CDj3P3Eb3iln)FFaZZWWjMz0ZJoA zI0_{kQ9kiIB`cFqAQhrgqT{{-iTdt{r5FG55=tGbmqvUImI3tN1>u<|M6lLPA65joPw#iNIaQS)U&<< zz{ofp9go+B4 zIu49d4MdSOiPuX+a7H+A>d*n|u?Wn9AXdPzC_-2;Fkxkw>#$E}i)Kh>NAJB3A36mB z6J?4b3u3eV|FQQU%#CG7zAviJcJG~$+IM-^-uvpVYE!<7-h1!8_as07g!ce#(Ufhq zG#bsE^FGG={c`~)au;1a^*66Q<1;Q4e*7y;mN{qcj;pO*3+cm zCiy45$Kr5HVkhQc%mqBD5beY<;>m$*CUr;bv~`llU?!2jGjfk)Q7EyNpx5xsDY6Jq zZLT7c#j}5KY16;z->MPOi&Jp zoQ~0e0jMa%WKx?&^IGyp`bf&C#fYFZDFG3OXA6*q?25oBfgG!n9cr@Vj~wx3O}g;% z?WI?4kq9pS>2_h|HkW*qGU9(*Sv&r2Y@rw6L2fIjWa>gv%TjMID^(@hjb(!zx|CjP z7dMw#&r3KI5QrhHO}g9lOE>6R{@2?I`$tU*xoH+VWI5Or3TQy6_!d)_q|SuZnJ6;T zEg6R_v+;i+MJBAMhWwsHoG#_-w3ajwpaK#otTtlop+#!5u2*a0F$1M+0YWC{&n%8- z{*_*vQEr;W9SAep;SirgV^y~~2aa@^u0LV4TWN5@kmWzpdt;duG9!Xf8%GRvcx>dR z3YD0)uy{72;M$t*;4OwP={Le~NMh^M^Lz(IDCiy-?GCYX{=anQ`kivWAoLRFU)>b; zB>YjgUSZLBy6iF26o1qfG!YLf!us_%3G($2V%Kk$`xRs0oyAw~sO#lh%Lu;+FWp(P ze}m93g(1`8%eV32;WXU3vGB_6Wm#@7*>^%9BAHj=6OjX$vZ;KJa8OSZZ zcGv1=q8fz~+PNUG91DQWv>1zNqY6`~TD5%o?&4|bO90RLyGs{=oO`Pm?yo{S7fV*& zE`w55-z{5tw{i_2`Jj9in);w(?c++%r#0SBYrP*;uD(;YcBOO$A_A6d`=UEyf={Q2 zk8)?}+&vYzE~q@Uc;^0!u*$xE@bn##)wu^N7auV1BJ6bj{?bL0%ZQbj;3B5JQYxcX zr83v@d3fyp;suqnmWh0&Wa*OXX=1Rq%7C$D*pIb+DEt#veS}o5eN?gfVa4i4RjhyY z|fP*!LX}!>sXL)#9*!$i)vQan!MlEuYcR^@U2FFK z2v9Yx|JW?i%YiLESI)ZG;=j=XYr$8(+pU2+?SVUO>vuZftH8ZZ|GkdD{SJS5Pq4f@ zSl+Wy-n~)Ly;0oOROS2y~%T^={M-glk=e3W(|luELF6y0TSYxL#xx5n}ZN zNWt1Z?5?^c0i_JC=yk0GJ3*ujgc=7z4Z<_ntkBhDMx<#t)HPaDETa*8 zL|-O25TSo6(mxSJ2BstZQ&C+`MFyrKgQoOPNCBwE#8mOod5M5(E{UI`$Yd!6Zp|(mS*;|eml89}wDLJ7D?n?0kv26i9XqsxGk~N5 zlxSxaMiL9Xpq&Eqh=1m>7m8X1?sC0O7ibBh3Km3*aVvDhwVYU7OEY%CMN>&i2)DTA zE)$D_uGFF@wdhSjN&wZeC$mcHO)Yz{WLDO*9*<#_Hv>eidea_H*6Y#bsy7KctpQp- zTIpVY#v4d`{D79k>m-no-4u~k00qeku1vfeS&Razjm-K6SVdPF?g|8ubs;GJU^G+a=MX~P>1Z?s#S1; zBPEGb48}xLCQiXkNPzDAUx9tt3;(&4vSeQL<`0EubI-eFqj2 zBWaY@V?j*R3oluh6{!-59Y<3viG~eG5 zW$C_oy4Hq}=rgq}=+0k314(A|JP5_DdXlg_b(3i2$|Bh(X zi6BmN>GPKz#g3SyVGFgp;4NJDIqwpwjgJSlK8Pqyah3!mZ{ zG7*Pn4!4*7)kUzm)T??F(cmj%w!)b!rq)&*$V3Rb#)=kn$T~?aNpTE;L@$oz1Qm8r zZVd>W086NTqD7)CLs{qsHe~aTBE%0u0?jUPlCJG&h|ARfh4q72!WB(a5SxyGEKCv1 z!dQn5#an3$GjK8m__4LgQ(aJ5f$MB*27Aj2>--HcZ1HkqV38yhQ*@;J;!a*?sOfan zkgA*&(7Mc@P};I{V2I-o9y5Z=Qs5cgFBelQ6s}lr@nO&d00J3_x!{`DPPMQSGwP5< z%Z^XnlLN+Z-*s~f&cu{xRf2Pkm0iz+-3vvw^|-YaR#kW;v>5HkbbC(RgK7iqQWje? z&ys%Etcv^Ez2(>LE(?=xN%T73T|vvMblq8c_1@B}q9z=8IQ3-G+7JLnUGm3b1tq`< zWC9^X3-?z530MVia!>>giC$nTL{y_P6nX)fZ20k|&?-z*+AEsu_EbKOG za~!4Bf=sWe@U{5*-6aWAs1?y^tc4O&*}QMwXKkuzow_aN5%%0$(aPC{icTt0UAn(~ z@jjd*xdgG4F27y2`hNN9`&Hiet2`e9CzZ5baZ9!5^I8wc@p+9GGPzQ+eBu5IK?>3C zFQ2|oyL9dW2()s!1VCE7T(WY$Wa->}y+e5R&LS`dM_pi|63_^rrArSaI6HxnK)d$= zq>9ydD^}sR3-{$z|9D zyq{EhJ`iqcJD*~&_R3z1!`i1cYgV>`wdDLMUDcj1YrIz*)&Zoe22@uYboq_7R~vla z0#1!yUDmDxT32BwC*YR(xPi!bjWSxx5LdhsTwPb?%J%~_)m)I9h-k`hB`lxXX5X#W z!0ooc?RMYo4*%Wuje8v%@YUURe@WLyS=UBIFK{Kqs_X`$Le(l*1uJ1H@l^=os_I1# z))+DYS9*VM5F9e;kJR@^AS;!j04i0kRIq}SU@(xWfLJO+aT#hDl#j^D92`LvdL6S3 zhMR{)Q!rJ>XryB-(modL7>l-!M%qBB(P%e}G!dii0*c0>R*3?KL`~@MRrg3lRV=fc zgnML<;R9dwPN1015JD+}C<`_Nz4|64gEMgfm6X_!$>4Nscse#R6&sq?|y$d|A&r3YS?dUZ25|5tM@{7->C_^&p^8APY@-Bv~K|kzGn=U7uXa9*YkN zSbM_g*eRgb`2V}W-kB`L|JXb>MC3sw?=Qy~nz{bb_%c1^;7lNaHxl2@VMMLf8M-@?XU%B9rquIq7e7r<|03G#>BQ$v;{U zcMG`t8iMY`4YyYl3w9eT=qkQyXv%RMdO2iSRL1`a3-%XV}5G9umLM#h(qNGr* z{#9G4+pXn79*L)Aq7Dzx=`w#S@)(V%S6wc%JQkI4%)a=t{yE%|KVuJDhAqjalaG=- z%kzq1(2{;jtgU3BoclP9 zW&v=HRg<(ft;g*4_8`ii?g*&J*Co1Bbglg9&WgCg+)SLle2m97uMIRR)0RzaxXNzF zvlLnu05VxE%lT`_o#j6wjv08(S)T2)2oT>=FeZd#(^YFgh8FjKfc& zFJYt(P={==L?|89@lo4jCgIM~y3>9k+Mq4W4!__~P^^T-blmzox;rc$vB-9YI-m47M$rIcT-& zUD0EF$1d%_d2YFU<&J7if4Z#_E&@%#MX%pmew8j^k_5^^Kq)}Q=_07R(ly+Iyp9pL zy0=6N;kI~8DV-&m*hh@WZtc}G;xGV%0mEnKtzGgptZ&jh_J*KkTOQ-KbP^$`if9dS~m2>x& z&plW@S0ceK{Q=CgaVyh37rd)Y^wt-j8blkM+-L*1;91 zFEvRxZJB zChwLjKD_i+$;x|WYj6>|J{E<&T(iGZ&Tti!J^_%bJ?~epK~RNHUIB6s7C|!fw@X(D zB|xfNgWphWc^(9If|o!k3A|M6{i1IDv)XklOsV&?YVXH_t2M@c0y~)zR{V_NHj4d1 zR$mClJUFAU*{f_>SmiUIDqz(&1wj`t@)}LaVo2t@-sAi?m||0878;zw?_ZQN+v_z_EMz}^WAsB+cnztypEt9|2kd+=_D;Ob7h zpSH9sSk@b=K!B*8V3q1rVUZPjf3Q;apmhniYWhNTpwVC$Kr)Fm3`XnwqefYghW==6 zU#OZ0A}cYNkO_7&=O$z*f@q*omfiy#im2Cong&Cy!_k(}SleiWG!^fkjDtNxvk7EiD%K-Rf|sOpjz>Eu5Kt=GgQ$u{OP4t?d_2-SF0vvBF)@m= zBp7Ayor0j^1Jm)r>BPW{CK{PdjLs!S<`Uwl*~GZDV{=Gyd_Fm`kepadPA(>=7Lt?b z4yf#MW&uWW)TDMs$Yd}6K}}1k=_O&+^gIM*aAo4iYIYG3O^K`woQ$2)^Q)P;l?<(w zp#)lDEm~tFV;9ivlZP#}uRzlZ;^yXfr|^ z*1Lal4(7wgPO3*CvCU|ah%}_2yeLBsNNYwRntJ1&fUpM-_-mLy7}UFSHo*A}bO#5yegS zPMy+UOW?@Zl-ns$6M>LvDPw#24%y*~%aS#ayz{1I@HcTFnX^34l0OnnyIisO@+1h! zw^GSFN@2+q71Ovv|EBKpNU_$kxJC170WaOLtRZ#)9B~cjXoLPx5zG zTxzH|wr18=h+~Un_$xST7VA}d>f&fp(o-{P7sOPy%I;Xntrbp2iM82nzgoQ8!plmj zS6{llD!U>eD622s!Dtq30Z$^^S#gpI=zwaKBSqW+5})(rpg34S&bBO4a*6oAz!f?} zfso`TKOTeAkT7$R#iaMT~!wT3MJ@!kpxQ#7W& z3Hu2lfIXtU#QEF9Lj<=+an~Ky)9B(zHKX84C&Mihb-PEXcq{E*tdimCN0j-FV%n;N3W%$$!05*BBB44gCe z!jtLZ>o>8mYX$t%P2CiEx)pLGRCiJ+J+y_{IWhQ053??B!A08sD|c32zrPA2y?Rd% zA(yY*7E`@;-+n>vs1o)1gVi_htpX|zfnK{KaC-f|I0}V0uiYa8qgK!rN|qI9=e65n zp4aa!y>U-0BtW{idb(s)EOdYQ)P3+~1%68OGl1K5Cn-YExuR-v*hWkMr3M>GP=SZV9ynsq|GS8gI+@_tw)9(zY+ zG3aQ`bivrWm7e!2JnyJfr7GE{HISS4!wN6GS4se|wYN(33gTPkEAZF{6`qf)Ra1hU zU@F%683IJrdcLY#|FX{eRlN@`5+mu7#jJx{%nm-O7**x{2yS#`D_6Oy@qTFx`9(cJ zz^e7HYCK=odcLT!cLKF>-_?2@#n*M~`tVh~&t3?W2)F9NCm%p{tpW1+{jhi4=i~m*| zN)Wlz5xCbGfUoX%hDy4ECB32Y-VhKa0jP|usz9k;rx&0Lsq72Z4ggn?x`Al@AV3wZ z8$?vI0gy8bY1R;#xGp(*n*prUOVi8T*Ln}&r_0xBSi%b{4~kbGK3B3!nO#oEUc z9pmvX;0KOUfe6A$Ks%DD*(_(7O6{F@;lk+LP@`pfE zDo>>*7gN&<=}EoLC$Tye1f{q8RFX1$LYZAo&n~6y(tt`v<0}XX;?f7GXr<4sq~{jX zb4w{?X2E?p$_Q$euFTvjO2$|VrZQ)BCDkh;Qt4@7Ed?wIpTHpxB$iq-vVxA5yx3tU z0TRYVS8+1jf}`euEB9ugf-sy>5Epo+Xv?da<<%^*#BfF#O4-M#GHag9nlHVgSNpPS z>)ADZ5rwK%(9x=Wwo26}zh3sU_xDhQPY#)^9wo~1tn07z%3=b5t#4!k0S8ez$O_@o zm6Zfk0io2!M&2K!SJ49Sl^pb46iy7N3SY0M&sos|PT{v=KNk?fT`y~S7H9MkQ!J+)%3P&5~&OT7qi zwS~yDNK>+$Br68Sw%{?lB&;CHFv*dXCMxQVugn2w2Uo^a`s9^{yH=iY_o=FaMO}%+ z4vHfjM7>2lK`4FhNPrZNZ6;NTa&&}Jpeak2Ey;G|LmEw1ZM7`MI*77STDgsN!|~in z8ROweR?S#Kk*^zB71D9D6fT|aS|ov3HHjIWBAvw;S-~@)LN>FD=P@}59tcG?kHRH! zWZcc9x3OeR@OQ18e@z{<1U$A#GKef1^$&9$3tj(($S3u}NB-#-y(i^lwBxyc(_64; zQ@@@1R}MuXj$6F!C$`L)yJMGLyalf7qzFpg%>stS!`#-bOj1VcEijeyp@oDUrWP*^ zu8uLxls{OmZ;7DgqojIVDp^#X=THg9a={ORt>zW_^j zSN<Ez5=SDO3 z?#iF;(c+`s;Rfkxlw0Quf$?kziug^==-P!l8FwtU=9ghhEgJ~bLGe8Nk;mySVHHQC znA9K;i`;Zj?on}f$~|wg7ZrOjcnstt(aGDh?G%9%%%<}x%u?800jPMo3~byTXQ}Q! z-bT^ww#R_mWOvO--kwI?V%wArw1w%??v9=%TR_2RY%hQJ3+UX;&O}5uO6MrF3<$@K z;^DX7N4BQ9_@#3bIRtv+!7BXo>OFDMYxmYfM~HR3c7OG?yXt-Ou9)i02WzM9t$`?9 z3Wx4PGR9i>S6{K=uiszOZxc^!p{}*^#@*F7>{skHAnJh#>a-QCh;aJBnqnFbsg|WT z;;=K9(8vG`qdeuzTqPQEN>!#pk?M5G%DEEng%ZIJa_)iWe2Mpr+yq^CzNyu&y?##< zG0T~fwM%%G07#w-C7yGo9)_PQ@c>b09>7}ovxb%PrK|ALh5M_Q%GTa0_gpMnyHw_R z8+0l6yj9`3Qnq$kC8M?XE4?37uLD#c=-odrOoj51_=i?CoG*cdMsd_PO@S{P{NFVN zmG`%9{L~)0-W2${-v42>mzeLCE5f@BsrG(T@B60F|7D%;>pK7Ebw1?lI-l?cN)hMy zKB-|+I0|_4B21?@4^>C&>HeFgjpb>8V~Gr70#*GYkN#V zSP_wx)UG#geABq`1#ngC`vQBN@3T7J$JKgQP;gaeuLagZeI77RaHYDI@2fiBH}!sE zvVM`3#;!AqL6lE;S?B+{!S_wAZKoE8^{?uTxElT6G^$mdiU=&M9?IgZfGa9i%mn=QdxNNeyXqpUk^!8`52`!H3v z+WXzXvR-|vN;RuKhgjk2zL1JndJiyE(HpM7sLx#KBUm*9k($0xJ#aM;sU3>c4MiIZ zlohTS2-oz}Mub~~F~F%A8ICm#N5QJrkyz`n_^Nd@j|>Y7aUOhG%) zRAP8GIW#S0Xf}yHJewGvNl6E;W@wWm^RQN;cQV#Jkw7{o;++$*E?ue^)hDJBdZF|~ zWs?AgKzYB(ektNKt4+}>BfSGti9t=5Am;FVVss%1HBBw1rB$8d@d2ywQSV~fDp3L|p_CIWs#eJkIDugR*s;U3-V79C39go)GU!XM{0XiW)3b}I z`6Ye239_19)$m`7D=TG$UJ^h{IcOMMQC0y&3R?h{i^aPZR_Q!#eK5DRwl2UWaMohq2ucUS1OKv9!l zUubTka+ba9R}iqOSe3F;l|Bk3WYQN!Yy|Td1BEV?sw5HMDyOfVh{9BQh0n@Of)nT{ z5^^Ob11;kmDWFRjI&zmqUb13T4D8WBE(;PdAryLHxD<&w*kyDZDP9Vqib^5KZzW=Q z20p1^wG)r;IJ*HDx~R!b5sN`eR=KiQ^?)mANBC4IUO6z6hU>T*m{>sB zojAR4-^El#zWT!}q6l)SRjc6$VE&|h&N6=edp!0v*Y(o9)tBzAy<%O6jCa>wCS|{k zgT#_rde@Z4Ti46CT`&G35K?E9SMIGrFE8I)p?yVZoW?Rx!Lg`i7E(rAm2{6up-WSv zBRJS7@^yinQgb)f4V1im*Yoln&#U)5ipJXRd0xHm(Y(&n1w?24cjRdiJTJ*-?N9eS zf4aZ+(*3oU?NSQS?s?p1u@Fj;Ev#l?8QRyX>|~|)@svNKY*Kl?s!=)_W;r1QWVO;? zQe-o-Wt-)XcRYV&tkwy`tg&C#^C#KayOt`pxeL0i{qeSh2>3YRE*Q@!CZptk&qKfy zK15ji*L$mf)J@U$-MxEBJ~-NTz*j&Vy@obs*OsV(Gee7#z zO0|H~@K2fdLfQKHQd;lX5-I2K1fq!S=Dn{~u_HpAD-%#%D)+us;k{CU;<;S5{#M00 zuym=^d%kr2ER&XcE|qyNmwDbQUwf}=9l`VcO5evdz7J}A?^b!Sd|0*qarOFVf*=1U zHR}4f28$FfKdtqDQ5*QCKJabR#J8y{7#18g5u zdq1u9y-$Q1?>CK%3VzMlhK;Wq0tlmSw1sc9f)GgXTGPgt^?}c8{g4k(^hvEIB@T%7 z2?$i<`>@IfS$$fo6#{!K_(PUj zpVj(4t5w13<60k(rv27HS^iIn18&u>f5I&K{MGvB&{Tu}s|G*&MXnO9G4M@;T9XZ? zbFB$;sTb6QA-|?=&}OeT1?AIVKDrFBysHfx?3Y9146ii>pgt3o{tztRHwQ#ets7Fr zRN|-~T7n$Zjdsp$<5qj{R(psp4iE*gw*kX-J-1W-bhuy$v{+$ zG!U*Hh*S33COI&JPuh?SFf%qQ=xM@gBErt4#^#gb z3u33KmCVd?c6KE@yGjdnsGVKSOs{08ml0D|vT~C{c81=Std*6J?EGqWZY?{%mO~1c z>QxY0E@zkJHUlzgNS0C4E6^8{LRo?_y%V@h%nT4^MXC&=7EDlB&%$zcaV@*Jl2hwJ zw>p(rNIt;Q%6e|ams_Tll0`>W{kb(?20>Z%!uDPiTY$^MMVC&niV5 z!A(S%R45!d$@zdHI4UI3H%x>!o%n@Axs9+aDk2-N^$8Vq*_x^SK(+=mcnP8 z)Y_$MC2&+YBIYTu3J@YJDO`dm`aTATB?6@sbTgi~1X|Q?$D^{ViwI`7>JS1I?1D6i z2*-_5IYx~T2fA)4NWl+PX_KGSgbN* zV~?T5<>{@-D|_)WpL>Y>#(pf$;rKEV$$Hm=p7ns&7x4HuPDo(Q?_X29vF1bkYren?#Xu~>>}@MHOZY)y(`M(=oR966*BW;z>2zJnWi35jeN|*-(4v*Qm{^n+8~=Ev-1Qc6S*wVs}l;;E=UE?7~0VS9MR-g|I3j=wuY!U{c%k>J06szkJW#IOiib-B}#$G2l{e zPIt8+dqVJh4bmD^XcD5^M#M;Zobc!IDCmkQyGla>7(E8BJ@ATl zc;4)J)}_^pv>3x7J)d0a$y}3+CDLmDBI87Iu=@Hd4CI=}F-Mz1r=t+B{L{FL{ zx;LPp63?m9bvOjBxKQCcTec1hnSfFv4Y2BzAV**$3rfL3f)4F~Rj10lZ+lqU6+a}e3F8XDe@HFC_Wr@w%muOXo`7DWI0pjIg0~QX7fJq zoCmAQ)`6=_73&vE(S7XV9K-Ju)>dvr?f~makSNT4y4ZKqc zJ|X^#;w$gv3V>w&qiQkIXSIIXuYjD!;K#N8cPd3zpVe)A0UOkBd|totNv+?=O4RXL z?Z&6|!mY0x9a9Cbw}gLaGcb@YrV>IlZ+z1fgeX2>4dvbsK$Lnv0P{s1%oF?$3_2j^D{{L%3^@QE2rTr4O-K86BdoIVMg0b=6>inB_y80n z=&D)&tTq5FvEc7SAfcPB!Jk?}KQsq_Y75?M4gJ^xlK?PUq$4XUzA`Xl@!vK(jtUC2nqe)&NNcrb5f=~@WWlT-!I?`OuHrzDdimJE zjc=eeJ4tZ#I%lF5pb~C5&~miN3IE^};K~%e5ZJzPvn>cm-RTISAh)c&*&e(NS#^Z& zc0}m9*B!ZU!r6jY6@5`je*~!%Wkst5RDhPSsMpJczu?8vey5V^3 zV6=WH);O%LCa`KG-ZmERm`rs}Bs(Y4?Gwq4$t3t>lIRdhrEq8)jnmaNmF%8L_5(s- z)l3=|>KFf{hs@X~V`^|FIXIU9rNlzBnUQ%UH8_{<7k$Y`Eo@dOOr-{}Gh`MeJqSC^ z8kNnZMi)|}^Fk>i49}-WrKHB@Qj-grnU&lO)U=j23Icob^Q*Z9lX(xAl$%}23Aa|W z(dN8Q*JeoUGWRRgi`ih=f-C4<5D0~e%+t-`SLyim1s(3 zD7}3rpz?3PJb9}%;Q;o)Q35BQz0qgXlt+9h`f5G_l|w8Od+Sd$wPkPRNeJ#ZEV5k z*i*epf)nI;h~`QrBw1qB_k1299u^_^&bn?>0j%Z+!$L7EUtP(!9;QKtob2l zlFf4RZp(rnPRw*E$Kv+r>~6EiyWY(2yUSzcSlo?3n1v}$Ms|wnyMIvLMxLj)j8p_5 zX(Ra)0y*Y^9PWvZlmaT<6d;l0sh%Lk(nMVK1e z!tS_V+!1cHo<-JXQk_J63`XC;Hwg~XROjC zPLnQhVu)cI1SK)_(k1qDC6eMweCGfs+H&z81J9Lt&sFFWl)9ig6|l5^q1<<=T>h8K z*DsbEXqC$IOo`TZ&K69-%a#7ODt+%%`aY`le_kK>u*UyxrSFrPz}HQoPwM>dRQukk z^1WRtd9QjM%NO;~0_lF}T60K+rl#O0wE+=VjqG1EZopTc)^2=Q>;I@m^aW)R_Vc<8 z2nUMzzAbdUH4IsO*Bbl=NPst*gI_gleAy`d>n7a%kkvaC>#PS(L%wbRr9$7gFfjB} zXZV&<|1cSUX-}-OFIGJmujr3e^u_LWh7BGJFYEn?qd^go;7SE3DC@gs(b~6WrxzcV1XvbC=;es(c%W)lVl5O4 z@@;c~C5fzvaH3{)tvT>R^Ttm)gaT0g)UI;;?vt=Z(jOmb)jzRC=OObDZKR?HD9Eo#kKsBXLHHBwcy#5#TBDe zkCKmx{6$R#fA~t5j-wV3kBF;SUlL7WnRnkUv6g|X=Iv`F=+!q>z)p1OCB3xcsQKlB zCl0144)~;2FZkIzerqZ*9l!Di4nazwkvEVBcxdf?Ja@Udu2yyv=m@*>krXg2kn;pg z0nczKhz0SR=SJR7D1F_zu*&Dp`~7(Vl}b#)B-#!48lK+VbC)2Hu}}nL$_I?B0->xg zn1!#*L3XDQq40X1j1Hn`3*R{r47*Dy0xG?~XWy_F*)$O>xi$nlsU8J8ZAT*8&LU$( z-*;Dd4Nt8&2R)J4i6O>0#TwB+7b^|@N-thIf|8_+VNUeE=rUvB((Hw3?y~6fLjSd* zSNPoJNpY|C9ZzQ#2Tm$jIYl3HDvF~WM7pzxuXd1B0%|Ha7`+HftX|}ZXop_CT4t?F zyA5^Jbu89f6lXDq!dR!f)__XzBPse6r4ZJJsHh@xGm8_egcOo^qXpL@ZfY`nhhZ|h z6u+43Lj_Lk@&ybyi_?Fj9ABRFads@kUz}f^U0&&&4Sd(I{LzEyPfDjgEt~$Wl$!i= zed>Qh{@FmM9EG_<<$}V5nU6<>nbz_}!Lf`wt>m}>2mw1)W8DiN#%nNu(^_-Bs=~cJ;q;Vvg zNBDD2va;^J>XDLN5bx;7kf)7CT9cpy{v_oUOX$j5;yL56q=~Jy?H<#n5sl zq6_f`aHZ3G;Qb?GOI)wHl|TZ;OBg`T>j;;B0#p>ib*(edPT2WCL1HaY0iH$_f4X}d ziZ1DFke1$p{Q(PDXLh#$5eN$|@e#q6s)-7orvH&W()(cjk0L7(i}qgf>)rio2rJYR z!a84)r;Ds!$7UMKp*`>s;ZN+v-6q~caYwW?W2V2fM z2gph*;T%eQghEje-KOJv>YfUo1U-|l@(aS<#9~ICPu;->Dn`LkhD?A54?y7=0Hpvb zSO^P`fquX2!F%n2k0E-z1#hAzaOe#p%Lj}pjxF)NQL1_Af^gozXbPyKAaI)a%^Vb; zOXuJ_QwBcy-Yf%M{O8L2YD*z2=*5qq2x-cEhE;HmgiF`!E{QeA>PA?1warxh^0;K{U)ovi4K?RM$&+369I3e&|bNFgg$X$L| z7x<`7m7i}KRbPT|er%82XpjET8vd>&^jSmjquRh{^}(;2fb1lR}-(y}lAr*(mk ztNpe?9U8m%tWj?y;$W}v$rEUVqpmTj=q~hKbLiVvS+ap%0lHA6j-RWWM<`AU?Tsc@ymD4EciIn!n%6noJI<$DrAY>J<9TZvBkLZ2B z=Fw!!XsTr_)jF1J8A~>gC0j@JreEh|s(U&kfvl!82yi8t%=AuYdS^3zb8360W$cqA2c6)$O4uu z%J4#VY%x2rECHWp4WDM$Hs@A0XIJtw%lVn59QHXZ9-+~KcT<2QnkvZh`WCXZE(OFo zDT|)1#Wg{fJl8iD*EScu`K9$dEubZ!LSHwFgD%4@lT3lN46&rE7nBlu$-a_VT+Jeo zRiRhTChj9r_9-d7vuFCUy|$+}0L4_`P#!eW8+rwff}otT=@ndUI#?2DS-A;bD)#2& zX_rMG)6MPzLRP*2D5Z})t*a`f!W0s)SN=9ORGvB(_ktfv&~(G6E%$aG)C6DoRHQ;<>_=Xb>palQQv=n#W3l3lS-Jgyme#f z%8x^|Z{Hkx>;Kns;~y-)mbYy&7ryT=?^~PmZVV2Lq?6k$*c}mz*A`MQ$m)3SPL3_d zg3+A-t?E?P3ahL&zIt&1YFqDAWzo473#HVahSmINX z3bY6w{IBZLhqI_mNk6%!a(4j?Y3@DpQPO22kb8J4J(VuS&u}XUD3v70EBAfm*00h! z&w^Nd6hhtiiE7+%2GS}GWijeyVXuKSBppQlNWF7dxsis$;Pr9O!!(i)V}+PrU+_}?gDtY4WiitUI{oPaHcW!qlv zDVu+py*wbMV1UJN`I2q_C6>otiYWCmM?{2DA1w~J{Rzepv;Z*TkU!nUli_}|XcWqy z?nzz(NEDNMM6X5(liV!apb{(!A|Lgxzod0aFft0!0<;nqKm-AvGioKQ*~UtDK}y9x zc)lWM+ciFlBYzgdB4vEw$IV7*RSL@`KIYFs5np%5P7nV=OqRie#Hk+dhz;6JcTzZ8 z8$u90R1f^z3p-o)6uHOA9troz=@#fF5>|JL2S64Z&O;?1EP9eL^4lS2;xH*slsJc8 zaTHx(k6@{QH@fM_8-gMqzfC+FgtFft*-h7jM{u~v(8!)5n}zmGxTq9H@}DaAV{x!_ zx)j}is?2{HV~Ot+RD+cI%~RXKa)!$?|0y`C%zs7@%dPnSVTVl(N+V_=fvm}qQ?T0n~~Hku6XM9UP+b+ICFxzY*v z6u43uxKtUqSYD7zRU4NoHsGZT6#)ci*(;!_0CJ@w@OEYJ?aIJgl^S@l!Utu&R~7iE zCh!T^Qy2WSF8Fyv@arb9C;C-$=#zTCRiyx@$kmqc7fqor8bjYUhks~`+#>VtjNa;s z-)N5kJm0rRzG(@6-YAE!o5Py(b^){S|VS!gy4`*>*T|{ zpVe#ZH%-t&_*z@^s)C4B;2-$yT3h)0w#ePCcv)|}tUq2ckgOU^)Q_ebhLg>ssrHF% z^LVCiC|NZSuN+9=@SrDVa20#do2ckdR1cB&CrkR`w>qOgwnY%Oz%s74$G|)&%V011 zQ+v3i2R0C-mG{R>@drrSBljSyUf?PLQCx2ev!v^-wCs0-J%Wp0HwM3M4t}Ax_<~MMPICDP*_zr6jQ-!IMFncY!y?b+Qw5Ilj(M3 zJl!#o>72}TO@USUp4l95)iagtoym63q;qK#+6j+)@eihAtiA(Xe5DUW$+F_huljSIKxQqFU(;9Z z36_ciDP?`4CTMCC?t;Dyt5kR5(!LB`W7mB-pAUR04)hyt1+qRLt-d_neHVq_@4l4J zeRRsc_uTkuLtoRkxv^0YzeMzf1NH!yAkzlyB<}KqQUxC=0UR8FDIm^U`VK&bgIMm{ zDG=4f^Z_cM%U=B3qJ_ai;mu%ldn3Ay5)E&L!v$)Jniy_vN_X!8(pC6c2#Et2#FenD zisin`L7;Lh7+qaUx_X_RfrVaL=`TuKj(JdQU>v;JvP;SFkl%9T)<$6;MsJ6ulFu zcL(|ENNn5dTM#C zZe$&xdi%!UJ2!{lxjFP(xn=T?I&%Aj?&N>vaMJ$28g;_q?VH1wei$g}S(#i73=NMY z6FIj>_lBN?!z`8o-L6mW(K$ODLbwEqT)Vk>kl#Gm+B`(^oBK}Lk_9`L>cvN%hFjPg-TeujqX$5>PRWjLP!;&hKy7XJ7PMpG02?$qcC2sMYMyU;P0vp(IXXk*X%?nTpB59RN+!vF6ef7Jg@*=SPXb%KdqF7*J& zXg5VhdnB|e^LgFoa(7CXCIX&PrjuPOcfSQVu%l8Uh>HLr9suatW>JyKSXNqCi54VneyfX->FgwcyqQQ0O4FH51g;uxB!q;Y@nPo>VQnn3p@-?DmTto1uj%= zKs5p_flvV25fqjB&XxGifk5Si3Y>mWFrF?Z&&c z!7Ei8?2F!u)xeeZr8-p=oArsoWZ8JD%Ku(X@PpdWdp7Xh8u1m%2eqP_&l*DT4}|k& z6M291UT5NVSM0mi@YR;cwbsaw9WeyuYD*N3x&^Ux$M5$hZgj=~fSY9Ao#HDTz?E-X zp|Z$VP2sN_LtiRv=%f0LPhqOY@Yl_uuLJ|IMC_ZE2$c1CL+Imr$SUw9Sk)X6-gLx% z60OBRxUU*R-!+GCw#ROCM1N?HlyoN=hSQBB$;Q!i%UHT~BGWvEl7XyR#!|JARev0~ zsv1g`^`$@vkyTHkYB1F>nrs+JRSYIs^X;zq&Cb|Q9dHyh5(8`uvyLpA1i9N4yWbNl?MuKCH()dK{JuT<4eJ+4hQKYT2Ijfi1or5}I6BqD1f|jI ztvWi^|5ID+r#6ihi?(uH(eJfi1w;`_!Cm4dVH=lMTS8wqaYsVXnia}I@Rb#{L|KB~ z7M&PVD}HPA$5z!3e{2={5)?n2#I~iZG zaUKK79gJPEdz^y=9~BHakdoenDto;W&Z>GSQ9GQdLx$oUIJX9@YMg-K zuBjZbg!Im3B{PzqnY3tXA=f{j@1Lg?K@H4h`sZ@kd#0hOJk&G{DS=z_Ie@BfF4xD9 zc>pW}Q_(d%4_tAXa{^P*1)dGf<;E5^#}`CU6N|_uSVfCIjx23X8dJ@$Z!N5EFCm6W z@Q(wer8TQQ0Y6^&N6NB%P_|e60;eK7ZLb7&JR5tffn7ta-L=53$G5i@+*>Ocao&N) z481mOAeYqcI&wcjkDbPrtr-G~;I~DLr?u8&K(s_HJZ|AsMI>_(O34lPfXFPqLUx)DpaoY z`X892QBt6?G;N_UW#6Li4`R&tH|$SQ$b&|TrmNhpeg%fM4%K%wW%{U?Lk=nSc_gN@Pmw9C;^?zv z-1p7Vv5B#z)ye_yl^^@xzA^C5&HvlTje(2b_uXq>8ea(v3=KykDR%<8v+fM-d{iw= zZMrV)%g)Lv7#&|B$8fcod*~!@93{b+-{0Ok+{_}5ZS*C%ILks1m zB+V)-2~JerA^*llwE|Zo(o0Y{=wI$x0E&jVw3y(ATSi1mPvIPv$K~s+N5TECsFY+v zI?Kv6+#;|ArNXKz$jI`rll7M2ti)Gi72jasK>$2ZHjGiFCqF!?sg-uKaaFEREG(y? z;9PPnmMd$K#p&3Q?MsykR;WeVer-}_S1$*JF`&%8RK*{<$o}p0j2TSCDq0w$bgCvW zi7He?5MsH3svYTlJZ%l6u|2+42HxnXMKTVA+&zMkY(_%iV-ASo3wlcfDmQ5sTa|S= z#TjYgBHd`5wJ-R}z{9r2{jwv~aTN}hBbBpS=E4Ul?nUQ-odYBSr&_piv>crsqqE>? z&lpH!hpclh1~&#q*NxyV=(*K9a_UmA8*6ujE}keBpnHm9F*QZupAT?$c5$*6v;Ibz z*2X{$FPxsbAfh)pI*ZRQ3r2o5Fyer}c&yCf7E0jta*-He-zf9FS*C%f%8`vzC2$MW zBvI|C49o~#t_ohM+;|ItD5?T)SBEZFgAF%G#PeKb@O)+PT=@nt zcGd+^X$#77FZgX38ll5Kf%6a%{8O=U!3o%g9fYe2N-F&4#BUog()scYfcWQ#~ z(M4MWCea(vHrWmvtlYQ+WmRlks_&qwv459@>P*91PYQqqTY!4K+! zp9rhMUo?fkXbeGC;LVLrCEq1INeJpkAx-QDKtf6s=mK)?b;ry4Q|0}sdp!v*@2YB% zywe@O(J2PI-X2qdrA39Ws~}cm@N-pi!e2E-m;&emtG;iKU4xz4qF=UzzibSC-4wn0UbdmC`*?1=xx1Zn0U~etQtr) z45yk$(hWoD@_xY>cvjlSmXjO{Za2H*Z1z@H?8mk+XTlM2P+UToT(V|p=bF{ouD9s& zdvuYN==3_htzoDPa6&jwZIjJ*#PG!JI)v67;q;8GBKB@1m!K390@$p)rn1#{0@27d zLfM&Lcl&A=D2motRTry@-tHDzam%2olHO!#Uy2qeDrK`h$x_h~y$LJ`JH6W-LjWhJ z3Axu3mxaTTQ9OoXV3sh6m-Qve`V-{?I(C(nL|B1yglSV4K8dB(n>Y~Fl!;G?2z8^ z%efXA5S{^GI4~9r%MZ`zN9RRQ$iy;|cQR=*zLcL@-J17+H`^eS$Oi=aM**U&T~)hl zOohG+O05O{mAaBe`jrDXSE1g9^i^0R>i_t5JR%HfLLpJeG{fyp`RI{=Q6f?7ryFTKjmF{#?~^%KoZVa?bt=@RIu=mc2%(FICrH z>CNej`wFf8P_IW{-BZWnU8L)k}l2SPd$>hQ6Ni_|x=yihsS= z3qkn}tNivid4K&!dwqT|37|5*QdLT1r7y9-&AuB@iV>H6r-joqI3V^t>58m@_9v?J zSEn4C*;lCRLs?=lC;CK|)AfB7_Lr#&7Jb)6E)dQ-doY}XtRj(oSl^s(f7n-&gRjCe z>QDEo4d)`UO?|bxzVRZ5kxNypBKF6rVnool0@CWc1nnCFRsPas4+PKIWj|*j+&Eh4@+(5p?O+ zqnNS_GKFC-NIbfkzzCt4kCy6CErMO-DQ>jCd}Vl}f%?n8Kw5M=flovc^tXef_7{X{ z4X%Vw#{&7#3ikB3u-qRScF_oBf7n--7S=)33#0@c6N!A1WoQ-$et9eaB%bh?#TQZ* z{!XzW0bl@ArP2x|J+Y&zR}rgDVuSHsfwg{R*K3e)9>Y zb*CJQ>;1LE`R{seG%pS>`FaP2!oj3y)=mtC9l1-}pdF(f5iJ%6SH}uQu&O{-23LUA z=H~w9=HX^e^(ZI6)ef?Kh_bzP1Yd3E54I5N-IT)%=RYX_vy@c-f^PYxa!rh+gC!fv zBZUn(a7mVlkXgEn*3wOKWlN@MRW~q@(50onN>y<-EP0h)(sXARpE$7;SqZLRSuDA! zOVAxM6*$D;N;68=YK>K1RYuDY6E`odp#piWyDW%}RpMKw2(N-1q7I2FA-08A?!ynF z2)D4;9&E7v*Gmx>c|%lbv#?HyGU<&s%Qw)8z{-jCnoev(+hG~lAAl<&2b>j|sY^Eq zCA!e0EF);k(7d<-Q8GS|k6Yf$iXfzcTQI&rAcwIGEG%A&++Y^X4iPb3 z>4w;hR$^Ny3^ZrA9;9sJ)iMRgPH?vvxv{l!DfGG}*>qYwJ{%7I>`?_MTZsZ%WOd@jn_#rybXIg0G3D#SckY!>0DwyDz)IB6_ERUQD1-YnfXRTi{IQ3DkOqZE0{ zBA>wN@(oEv;B=|~G;o5Hi-OKqh0axmE>s3DR)sE9ht5|@&Q+iXuT%x!s}8+a6M7e^ z4!u(ozETywR2jNd6}rr2Rp_1S5V(cFBv%l#(|e(U2tni`+@*kqUKP+6@FNC;%?OUb zGk}m-2&SqIUb5lHMJ)-63)4bbPR>^c&sP!0F5$6is4NJ2G0Wweu$%gFRrpE`k+mv_ zh{eBO$eW&P=rzSNzb+riQ^0&FcAZp0=d;vKtq$&qf^<$Zisa(fYzGWiUJdtZfCbR96 z`Oc|L^t#bZPOOzBPxZpjb>_xGZp>m^1&q7P&b?cx*!u`!X%K}?e4@~n}UOqz0b~yy|+hy z(4iTKI(BlksSa7Lw?@TR?XZ@B3i+YShHxxaxq`1G(m5QJ0rlddEGlG)rsSa47Y(TF z+^qe{ihDOY;ZlxN`t2@psTQeqCfqua^8R$GC@Wbupt}rDmiFtCTlt_*!0d3#;S+EL zm;q5B8ApUgRj)qn8X;8qK$0V>9E7Y=HR9M*!&tg$G~GU)>6*^lErWiu2$yh_W2*l7 z%>j66aeGLzIlQI(vNb4WlXiF^KVpJ1Jf9n-cPT%x zC^r*$%%E!_KfVG}ZBMRjO|5PgMf%Lj*6iB$qGx;AD^ij`M**=Aq-3y!MdI0bSWtka zjfbumYBGIamr#}yMs4gOj=QWiB=bRE23i}tD*=Sd?NybkwpQ1-mc836-mPVy;A&ZK z1{U51)Yn~zqwGu7RirxpD^;piE!ZCd)*rT7O)eDvjIaG6VEao`_FAC*fhjL=m0r^q zqZh^4$>T|T*7bL#BtoXbpP5=)m#q6GYwJn-TfOiVG?kJFwCHkwQA+S*l6Hz8C@Nr5 z@w?Pjuo6VMzbNI~NIONsD1)eCkdzDM$7e$U3xAMmBYpg5sRUQ{73wNm89vz;SJ>yQ z%o1{+vy$#wNiZy*a47G@$V%UA5th*eg3?!9=%ZPP{h=z66^a8b!4(h%l^K{BmK6Tp z6s!dZ0U^ap6UQ?Gn1bRQ%*WgcfFw&%UicT~g@cRW>@2{Hg=NI-4+I}OIJ*m2U_T~0 zjsQv(fXYdsz{NnJS9mKHah0wDQ^`k_E|5t)V$>to-&;RA>HoD9jX#f`YiNV>z}Xe-Imp z5CWi-WrxBE@?B++rNW8V%QoI9Cy7*2OFsHWnR-c}%~P52YvouZg_Kvxs3q$%y4=@v zrLzUaMR=_=D2vrMm<5p$CNUppQ7*1%$3q|)7lc*-@OoJgd4skzsDL)y#-hk#;w)~# zOkwlVmTN3_;#mHzfUn~Jfc=IPvz(J5xX$E_az()SW`(Ac&?T{6`Cw#JNYg33CP=Wr z5-4Rs=;gIidRdP<3aw2ihF&fQ`N%HLu>~{S9PZn}mIa}sS4(7k1>M~U5s{76T!;&+ zAfhR`nXxSNdTEIL%F~d>b-6W2h~|QDH_`EQ(d>L|lrflf*)p_WL_RF3#EjabM1>l& z+flfirB)H#C_N-vyzYp*WpaUgpebA&*|~#ugFva^sq*0I%FyYG&}ozkiH%|bgte83{WfqTteh(pTozsG zx8M|GD?;c%6fMsKKJqLNo&`~maca2Wh2N_Uzgru|fv&gkR2$JUfGd^A!k22o7hu0~G1Y~t zFx1Ct>5^y`fGT`RG$mnDBP&7RyR{)AGZC|}ivm*#pD@afKwPXJ`Jg`hetk&q`-#LN z@6|Abc`F)z;MHo^|Jm<%}Bm>G*dmCtscrjAeFEaixu&sP?P#`oSYfd@ zk7w&fa+O0Fz_NTGQ=(Zwz6_D8hO)%D)s+eTPm4pfZ%==!9gBwd{zjIMyEjo+%u{!EC@AOw|RE#&37WIec!! z?VjX4kgrFuBt``S`(b7dBx{JJQxa}jTLvZ#Wa$O2@YLx!VW4r88&aZC5Uk>Gwq*mU ziUA&#bmd^$9aIA{mf;NBK&dH_mC9CPU`h8(zIPt%*&1Bj8d};KUEUg5-Zr4xM#fgQ zCfBwmSGUKPw?>!p!;AT$#VrvRptT5w!B<;D3;99W^COG-QHgzM3W2hm8=wWM=`ybm zQ!Ojt)XrgqAb;^y!i!v z(VxB~a8chYcoM5JvrEajrPSpr3|i4 zinz!DlCa9;*n)p?xKq?RAG*vf9S9=MS;{dlnPiNtT&r)e&^H0v_XL7ih*OGyR4h{2 zU+gub@s)v-v6I!TO!;S$`;8?U%|Rv(a!kZ3?$SQ5l~?6T*yEhVKSkzIsAJ1XDew<& zR+4gssbj@h$l@3M-K2Vnu|P`l#CT$$lfsO8#W9wnw>X4Wg)Eb;Sa>rQ&c)bQG_Q9Z zV=4!k;2kEOSupOLZ`M zfhF-0h-Gx--ZM0DOhuO<%7K&3i$$aKw}1;>Sac~LaT-_!bR}{sdgf3@S% z4?S0Y?7sYC&q=vbknW4uyU%{xiCp}?+bq4u4wvi_#e6!D3)j0XnvBlDiS+OB=_1aB zYcG6`r#lwxXTE9wu4cM>daZA8cyZAai)K?P?T(e3Na0S=zBoEp!7CtTp?-w`SB0{b zy$85uum6dxwhkOY?e086(D!y9Bks~!j`d?HkQH*Og2Yt$E14o`BH5v(lEQ;GD?>QE zPM16ZFr0%kZhaRmuk3zF#)A5n*L)`E~9D>JrY1-<64sm%zmDb-d$ zfXV*cZzaExb`Krh211{CYVk zvhij`NGMf+D2dq>(}FNNIO<|z3~Qna#l(TJb~3gSvxsnTC}BFfLMn@KSsr?oOGA#= zNcwFE=O7HziHUqzwor#nfh+hE*@jqgY~wX9HCOS7T+v369U!^2iL8hzD6(UDRl#K^ z6wXc*hX@tgV?lKIp;sR0a0EqKj|zG^c@42G*umPR1#$4hL^`OD?xqDXpRg>(x}39s zM{s4lTEUVOkb7Za%}uMdW!O$FzBtM(g;SL?t-%sT$Vc!~JahMm+D6-KD#NEM^w{&e0Bh;E2vy2uK%_*M5fnZyCdM-$nIeR3c*qHsb5-FpRbiM) zl_$NEzuOc$MT^@MX(bA&yO0TAJs<~^=Whb)8^QR4KeuYeITtatlkEjs6O&; zZ3L!zzcz}(0CvRK&)A8{Ih zr%ku9k{%&I^pSPPbOM5o;ey0k}DD1jks!z`HPecBlPv`O+wWAuxb*wvQAwf4l- z*63GF(Qn%lKX#>V^rUX}q;7Ym?)Qp7NS7;ya+QO*sv(d`z)(4qD*(+vGQS&0-|R|~ z^pmFFGP!FBdi7|oej?W}o^2S*BQ+zr^1q(1e#>GobCNV;JaE-Q z%09EzGrQe6y~!nZxC?()&PHG=*q~Hcm8}@c)C}jq2A0icf9gow06%)cgG}{cj;`vV zOl5zzYEbY-Sf*p@+L3(2Xs%J!uw4B}wsj)cIlaX)=&c{iW2_kgFSBeM@PpjS2Gh5? z6F-Pl;Ws1!M={q;=ITi@9ip0EcLI#$1lZ#bP-qu!@gF&13CEJ;WYDj5#M~Q|-?znq z(rfy%4V@$)YSfhY5w`-2iN_p{vVhy&$=lr1-sG*`#NGb%eWWjWUsWjwMYNgH{w#D< z(w}h_8GE6o45(QOFJU)m#3<&JsD_D~fv5wjtPU3GPnHj*;p%FgSQ<2K9L;iQ99R2v zu5%I+&UQ{_J3%bfud-b;n|*VegG<}Pi#x;M)AEjy)z;XGXli_IdwOkmW^E4&nu4!Z zwnrA_GrqhtwzM<6usyiQz)k!|m$rtNq>LTQ;^z3m*64!lV{qESmg-ciTT=kl3Rtx} zwYodw*`D$4%zAfc*LLUDc9y(*%l?PU205$3q&+W~6g*gkj{JKo8xL3fG9oL1y%j9R zPAec5p1}i0R_mdI_3!~4g@dChwN4-_-|n(|dyrnR$|_nerbmjaiS6jC1%3GyeSctf z$pc4aW|orE3yJCZ_|$xCaxOYKE18&$jL(E8X2NP`B~x?Z>AA?|$h25}sRff-&Nh`DG+*B7JcsvShMg_J!r}qO}V}yOYJ$=+bI*Wi5s*uSO+n)|xD> zMXW2bx)w!NBv{lQTb5;Um$9Nz7VIX(2|J4u=eg#QIDe;`#I234dE;x|n8zFUt|N(c z#Fy~;5evxy{Kv~<|9{X=h(BqPa+iKT@+(ifELfPA%RnHB+i~wne|PyC z2?SDz-?s%hx-v{Lp#! zo7OjFRF`u@$LG{nx|GlNU1zVhafz|$P!Kod^7W1@*E`SQ^QH4S4pj&!`KINSPa8hG z-B;T?)7d{bF){1&MIsT~pgTi5)nn1V!Uc(h(~)o{63N7)LfLdme<2#I%0pK6T@+Tc zI^5KoetP}S;gbU@+Wm)5AMQPIh~H5#t7>8B z^@{K-WkNDlS{xv0*&3^jXgiuzNCPQhsR+Lc!l@0ZBt>r}1DQxCUz}G1#U!AV?U60$ zlpq`ntCbiB+Om%)(pXJY8Ro3mra-7vOLZ}gvUCWA8~Q>N%|%eFJ-Th0=u9|vVAb4+ z#(He_LO>Q~poMNX*Y=JW_`Tsy)pUDE@X@iq%2*Dzk}kUu1#r>>tY_HHLH{nGxoluL z_MmQVd6;LO$M`IqQ>B;az$)}J)%smHTTK@azxk`8B{`+KmKC*xPljPt!L!w2AnKf6 z!z)BnKsc&8dZ9Xoa!zmkg)dY`FIGn`R7YqpNw|z&sgAx=n|QxA_I@3l6Z@z!W)LMb z;_`#~_=k;xqK}%QA2-B42AP`TA2;KZ__!(lQDXu+f}lQZjDDc%R`kO$+ zmM|%Lxf+QXK}A^em73_4+V~|%%rH!DHL937t|O*Vq6qLKW~oPDLh#R)YGn9fgD%-G z9Q9dC4EFoDF3QF~X^MW?8vojsihR?a__i&1y)*S~d*Ykc__YqOCv~ScbE`XbS8w!X z$_F#0q{~CO+Od4ogrsgPC$iE@bg7%T^<^FmWFHJ(Uhhbt{M4PMz21@hsVj9ybf>Os9f=>hpaPBk zu{+5ub)$us{krD1d*^q6sP37qu9>a&nXR_zt&SNP`xbV(X1CG1=eN6Nw^&c5AjdI- zu!?n74dto^bASZMajPdydq>5bH0W46nr9b{FMZn`OP5Xt z2eyoG0zYZLDJ--Kdi zF)3%r9l19kzA~WVSeyXT=@PvPXhc0=UA@*dVB(&K{tURq9Y^FdpkiIcP`XUT%uG2r zIs|)XIB+1del&|Tjb}NrHdPVx9W&fJa8zY0?ix(hJI zVr6GyZEwbNFz?x)_wLQDKb&5BIKHwowz501vOB)GJBlptjW2DFErMa&qXM%nDbUyA zmh8k?qKi#t1*_dz@7{uUZ^{2~Wn&+La*U)pQeYpf zGUNWT1j^bsOp?X3A>G^x?Bv-vSPvbp2M_7;Y;d{n4T-os0XZW8mDR5_gvj>xpxz0z zHwpDwtTq3R`@q$TUIolqc`7x#l$c(KPRxYHr#Hr?1LISHQHg(a$~QK(K04{dOFKU4 z8=vw|O#5l+9i3VqpYl!4_$9Nx$yx8@%=+YxL&dmC!=K^zc z{+W6I%$$F29tpe1oN26ic2E^Vx?23J=@)=Jja!bK&xYWlJ~ zgDYl4cfH4Q?C*4qdU5G2$MRy9U-t%AR?tHTvz+k%m7Ey(D@*ZGif1*lwu(+DXAJ4m zEFMo7Ikq2P7LCV4oQ^}pbi$f2(TWRoEGMT9dT6x^6Hiewqh~ef@q|3<%oXx@!|N!k zA+M8_pm!~dtg{k=c!KMzA^8`@dP81s#On=t*X1cA3YX6AF$cD@uGZ_Jbq?mEwxD=4 zB!N;eu zv|JvKbxOgfaH&y+Nqtc)BSVutgF|)Qqo3XFIr~+^rEi-rf7g6T(o~e@%ilI%xY~5_ zo2Jk2c9*wJmbFcOa;x*=w@nwWHkz~Cu6);g@hX<4k8XC9wN6&FO?`Q<=fby*7p^v3 zHV0aSQMkSLV|!`yL}mNb)sj9N)xZ=s>93}~{B6_OFB?9**;&y(+C4ZlG&Hun zy}uA2r^@|xn_agJ`l5kAY$FhZVyo-Ii*rg z6_avORT&Ftfl*ROks%Q4f&omoOXbaB@@Z93;G6>0Xhw#Rd8@GCvT#*MNVo||*Ktg9 zGqEIF^(AvqKv9$CiZBJr=?W!9am1 zs9=-gqZ!HXSs{sjKq}Ut|J-h&%~ytFnpY6H%Rq$X2i- zf~FvpXhfXD5xr8XclJ2F*DIs1<6jwpXI|A}aMo$y_8Pi&?PhoP#TG2qjl5BY6lb*A z!6)SPvWS+ATj9inQd)^ygWclORjknMT1L}t!Nt2^ld_VC<|-b$oeZbJju@z0%uTV` zbwr?%7NdvCtQI~;rT6h6A4QKYauM5D~1GV-Rj3|iYF?RGdR-dUdB$eTRgm60=5 z5^f*uxthqis)&FJtSS$kt>9^w&uJcbd@7{#kT}XZZRiC`on;7mbrk!#N<}ygr z2Xo~^d8B4^vw3o>b8e@7X1jS}vwC=|awuOqXxVum#FA4QJ-S&vlCK!dRgG@ek8U?rjGpwZ-qhXxbm?IBZXZ4=U=N^z z2X6PNyz`(Ra@*{g+wNc38(Q2OTG|^}*oAF+kXayVyKjDPaOvT|;$Akw^zF{QK z3A9aZwoYxeOo`>X=XSxW_Sv0IWNsVE>YLwb$9XJYGn^|K)TDQN(>HqHMp4j@Y`j~S zfDoHi*{VCOWA91-)T6E+I_(l4MwzFEbftgnO6wjOYkl9D0zt2}C9by%q8LT5B6R6s zjmOeI_Gm1|TfOj`)gk-R+=cr<(I7CKy+4pv-O16^fL`R|j!RU$Qi%`agTB=L{>=RW zMyW`pcR`JyO1Vd3FugQbI;hGOh(#9=4t-S&=cd+s(jwz4dsD0M&;Fe6VBYs|*0(q3+n-r~IJvev z;h@V^t`_%3mPKXY))%qKBUo9lyDd zzNa5&HudBW7B`~sqig48|B>eY^S>o-lES14`fK~IrO^Ar>(}Cbjurbk*>BVQTKTW# zq}y+X{NvC6s`vQvH};c1|2XjErT$ykj#JG@d&2U`lg1WBoVApRI|WuSOzgYr`3{@=TR-P%LMwm1Tln_HX%Q#vzAW5~Z-pxyf;jH&h-LH4sLY!#hXhD*QpxM(piWfGpcTrQHJFbs zPgTa=tb(kd7f6gP%O5t7r=5@SL(K7#?8L8%!6bqWwl9JTTPt=FLJ$OytBMxcNxWpQ z^D#>l;&LacbtSfp84JY(%N5Mr_zPVcmCWei9b%-gY? z2C;O`Y>L@A8QYzL@C@jNx_e>!)%$yz5jwJ`nqEEC08&j9Ift<(dIn6gGL${`5LeW0 zz3x7Og_hq7eg(j)Gc^WdRg8*&Ovst)*qJI-sAPoJs-qWckQmSTb9dbc6@c3u3PdXdQ$(4|Iz^htBl$SSGI5_ls-p^d*+2jSq5{Gcx7=;b3JQ2c$M zi?&W6q#^Y%SOOA5|F|*vaU+C=4zMM^ZcTmDlKQ4K`E5t)i`JB?SS^XK+LCmA+8F-? zfq$A33<1oT`lBWyh=Noivjsp?K$j+J61EZfec-A-M%M?bm_>l4&zfVOG{)ei&zllo zwI;8&C$F|8uC}MXZc74$O!R4E;*;jsXD#usSqZ)EEG+pAG}V#d61m<<=1nf1y55x` zLH`b>>IQ5wRu>ZC(BA7OMb1}`Y*meJRSj>|jOLrBgb=_Lq)|V%**LLPKQ1^Sfvy?J z*NtyCO>Q?%ZdL1bxO~HCzHMq7_GlazT;WqWvPs%q(x1Iga^IUO1GoBf_f$g3-0scX z0jqk*<8u#4?gz3}Bb&7&nMg=o{3p+#0`@>5Q$5!`8Rvz{* z>;hB+ix2zecZZfAj$m9>@9^?|@4{}&^j5<}zJ4@UJ)Ex`$yN@F0PDut!glTOCYS-j zF&BJjOa(XQs#(C;CL4sNfGc>Cy|k(zw$m~JQ*Aa+Z8c47p~F<2v%4MB+wIfa98SmF zPS*^8w*yGDO>Qwu<#4`i2ujSdk)OI!H@W~SfJe1Kum^S$_UO!2m%GuE`U&agOdui^ z(-7{6idXF-E>-q=GK|6kb^=$|xuIRDA9_^ry9tSPss2Vx;ya(8x|4RP6IQ{hA5qQf zZXaN*GNXX1KU>}}q!df*9FPnkioK*ieP0-sMk(pfz+*sfiCzaSIOtPYgCa3Q);uUx zJqA!g+Il6DM@48lmG7S2?wK*M8e{j2__Jqz8^r3H+ZkBg9+=-AT-qK2kVIBH!z&L* zmPJt0YkM=0kM9r)n)C0^ucJSl_CB2Q>`i(1raZg&j4$tvEbWXg?~VdgtGkoSyAw;h z6RUedFMw)QB7a)%-t785kOoRE`1cq52Qb?#Oyz~Fz&6mkNf-@{d( zzBv%S0;twD^gV$Rm@2Tj64+Yt>$@vvR#MZ8F|RL{&g6G?b`K8^pFe;8Z-4#k-~aya z{~zSve=YxLIU&FQ{QmR%&;P%E>=*X$|MB;~|L1@F{eS+C|M(yO`OoElTKk{>DNp32 z@mP*8i#~GujnA?CrP4Xzx?Gd&z?OyJUrOm-pOWju~;e^%?Pfn zY^ASI-#pkYl9ek}K~}KSzKP?gW98uBx%dj%eYU^%><{FT$l2N$8R2>5nq-Gjazye- zWt`P0)?%?_ROzYGYtl`ZdXk1J9S0RoRRb_8ELc(-d83;2UFoutZ&NVBJcxRok5XY- z-Y}dXGj{%@%T{e5LAP{Yr5@~25Xd=5ccH9xit0rb(bLsj#*jBi+##i^=;@jlo?H?H zf@0ZR;(WF?s+HS%WEX~6m+8kt*kEC6RfyTEwQPi5T}okI=Of^;IJOd7Fqp)W1T8jJ zJ~kXdhmpV)++LTP^{RzE6z7d94pRfgQ7E=kQ(|ur-^FoQ!cp72vT%~}d2x5deu6Qr z#5ok=TPxJDdGT?h3Xz@I5IZOfQkdGdT#P`APvNfFBDHtLaSM~kZUJ>5+O^gui}SZG zckHakPF{y#XDH#)ZQ0#H#W5iWmlAh>b;5e^7^|*o_*sviK~eExMyg{x{O(@MQXM;2 z8?$E~rm`vQiQ*wC{5rs0Re+X$YaChOe6}Wb0hH2koMZeRK~@*!Bjfqn*rl4-mHIgC zrP|o#+QeJ+@we;aw3q83tJqt0aro+8y#bi~uqp9=WAc5G6)=TCkiw(>eu=Z4<55Ak8sV)i9Ua)uY>G z!Y-}RXUiz0|4}8%7*fl3>n*Qp5E!2+Z|Zk8&c-IKel!- zy1GBO{BUq-e{}V5n09S{%!Bb@WaVIF?Vx{YuYFF7Y#i6}TEM^Y?Yc2oi;RD(VN~n6 zH;{cW1pnl#hVl*Lnxbxes|Ka#*tx8#OOQUypWe0HlhO=Qg?ipwBEDPyXlWJ`zgNcm76 zidJ!QFo%Lv+9fAbI*@}oAu9l^R4@Kz?+@lmhjPFbl{`TJ$?H4uYdi^zyJH+{^LLX5KfnL{cli0w{{+ka<8Oca+b_TT z^61e~E|-hP((!mco7vSTtn5Qp#~+bC`CE=`2cw+ z2gr&Bbsx2wZXaQ-ZSTvP5%1Pat z3ajE4qYy`>r`Q=i4~1tNJDx^O_VA0Tc*x_rtc}ar9tK+IOBOSpt%;wnOPsHb>zAb{ zved*Cp(=JBxT=d^s1;W6n`LAbzf_yJRG+v~C%FVuHN-FLQi%0VL*jCM{EFBq@oq!n zU1+K?`EhgV<7TxVHl^Ng&})Go0!vU$Tl&-1^yiY)r!A>ZT2cTNNcKTv>XWAQCoL*` zAzy$x9qG^7QeSsuzU|6h?aY4NmI9)_>&jm1%3klz{@9)UNs_|?GJVmS`l>bkHPW8G zPOjXWeK44>o7irf*{vMOlTY6t$d?Rn-s#WZ?#tck%_2W`Wp0v@59G4z@RD0j0bce5||Q%~-CR|flc9U0LbT-O2AWq;_--RQ|N`;Fe*-TvHtld|Eh%F*qr zk?r!4E%efn&C+4$BL840S2DDTQZl$%Jqk7LwoLD|%t+d2c3Y-En!WzThu!mgZL>SA z(@>M7Wm;~aSKYW6tYvDqbp{C88(ujaTG{Vg-0zuxNLJlGwF9vu8*Xhg z4;v?Ut4FuWM}$}e!OdQ)+ijoRX`9}u9^Wn<+A1I3tQ#vt24f(r{sofngR!+kXlj&p z?O@z^x`j-v}g^aA&2~3L^X`w7=svsiC-NuRCnlU18G7Hgc zy6wslHUf}v)SKL5K>Aj1PPeZ&>o7@$yFNH7e|I2vAAvuSq5OkE-8fi_`+{OHtOojXyh6@54KO9|oIJRcW8d&vkO7H0%Ecp+Yg*t~z8wbl9N5~RT@X%2g#(U)hmDVfy0Hsp=fI3Xfa5r!{y-7a^MJML41Y%a1nAtmjY8A z`^&hfm-miVHjY+8(A1-~@R29-$Qym^2|w~g9yI%(r`;cD4b)jF*S;j6{0r}4VE;v zCJJS}4y4s26t)I?0-dhY)d?cMQ3LPMa?Uu5a1aMeXLues3XCEjbE8X_+;^=|x5EHN z17#Q85f&d+^LTO?!s!W&<-o=*6h6{j1e=t5&0H4HdRc(5s!p(ku2nHnt>(hvTwVN3 zo%lzWMpmjmVR5*nhd*)7Vv3aN5`;3)f{qgB>rMEjfST%)@D-l+TN4+LF;FPwetiUB z3^C|}vJzm`#actD`sC&M} z)bw$4`jcj0DfvZP=Bv)!mmPpm<|@3@nfbVV^W7zGzQ<*^&98Jp);x zKvrM2rNJtkzv;+a>&{;5&VAdNxz+{JkPw4RA|fo`b?2`4WPj+&f8UiyxjT@r9^G!6 z+Us9<*t77EES&70WVC5ww_#!%>ZqUCtsUL29fL{s>L<6$hqvwxY!Z#^{7xVF_a*># zr*9Lv(UXO*NV~6h=76j3Ix|1^lDOl%c~iM~j)4$V$b5R6&tsEA%&${LF`D= zv7Oa}!R3RV`CahO2}>n@_rk-D*_}q!yLODMwzX`1@(Q1aO;fuKdO2{ra&!xPz1s&b zvOZS-Eyi%FR!_h1m5hGqezt+K%_FsYK84sVY@R-2p#CsV<5 zGNdP=VtBh8AROEh=?xl&4R2KpZk9>c`=T{t+Xh!Vb(5U%cIyO8CGZwmO>YCGoJ{}x zL!NMM1Y|Y5yfm@TKb&4am|X|P_Gi((DpG+}*ysI60;-KiK$L(g^k^k~v>JT0 z8hEr4d<19-t{}JIkrenXbhH$bZqv!WvT?Y!@t7fNp-1Zx(G)1P9(`ghWc38x@`iz^ zBVXvTKm2GT_5^{fgjmtXfykqEJQ*8&z`Ygk&axM* z%FiyR)_lo)e)HMWr@v#>??1o){QmR*fFI!M(W6J3n_G!^CY9XUv@c$NK~@i+?jJlq z-2eGt|L5P36_<$Ve}4SvFOMI|@(2BMd$n>wQpWS7gLR2>_V4k^3+-R%$sJv*^t4w0 zVDEBGj4JW~T6NLWwPdvRT9*=Bl^2u;S0%_$NqKS8i&Y{MwMuqz6J>Gf%2~>Zl`CT` zJP>?R;jQz3FSskFM=w(3}!E_S!80e46<+%eZhlPOS(*oZ=<7x0ORUGTIt!UoIe{a8M}RoQ0)oRSG5A zft`c_g}vA))s7t4h{WQj-0OBiri2A?%%;O(I+0Z+cB|(YqKKUYISF@ehA75bIuPu% zhDIVH)wN!&j=xHr3ItrSl9xU`m3Xr%p=dQklbhg5JmU&t1hMxOYw!^=;f6EzQwCiu z>=gICN^9UWXa#b$>XJoZ8K>7C5B4q=JzXnKBR&rd4mwO5tEw9CQVYxGUzp&puI~i`SmSMbiwmxyXPEcekF`5#XCC=3G@bDNX&NZaY^5m;3 zCCWNe4_tvv@e6gybMDfL!E;_ZgiyG=3zTJJZeK5BxLG9NajK5j{U-j;!pzUs(+ z)1CXKEB|Fj?yL6Pwa(mit3-X(CXV{NJ@aXM3at7XplZ*2-I@EkGy6qH=5sFF(%*LF zuJz=<@6O+ZbNaTxs%zc(Tm75&2e-(Wf9lTv(388_zjbF|>vrGfPraL@$Ymp2P2-?~ zUS=Cw-X~>;Hyn6$k+09~wN39?1wdIos8c(!0|``(k)UsbK&8Xm4~93b&;(qmsC9pM z^JX7w5YaI&={POP_r0Ob(vfYZV+hXohc;EY8k6PTAgMMv{bmUPhc?T}mB&?F0tS>K z&+N6&JOnUEkwKllrH3M`nY}i3?X(E7SmbWU%$_P&Q@hHoXLkFR_Qyn4k0!k$9F+0( zM?dgIZY|IxJXXeRJ@HUMZnp7KAQ^gSB)9>I7+%Lg2C!_-do z_-@_gcEi*z=*ThFOl|>JFcnN#JGqMkWYx)x3;VR4^LrgOwKig?2D90|Sl&VZl4zlS z=>R@toxMx@;9vcO>R>hFTR72Q;q7_+j__K0rROXjrvEt53l>h#K?kk9&crLr`iA$}&Np_5w(U^TtBU8;@4~ zk5;7|E(MMj{D%v|B+=AT;4zj(|B+fO0SSP#5IAD&jQ?QTcQEHaoaYh@QvnJG7)f;G zji`mJ)$G*^!UkU(rf2lP?ksw?=2x?`OR;Dy z{q*T0a*;w-^83&4KfnL{{`24b=Wl=e+u`A1CX-1da=Gk7_h+mitHQ^t4xYJ!m7^(x zC<#DSWGZxtkri2^(m~^>+SvK}*oAshN%F|Vxq4c%!=(QGzCMY=IkHBHoGq_aa*4&2 zVor-&5=xX+x={+Qq*fAFeMU(+IkB>2a(7yCR$vCB*Z`2QY}h5%%B?M+4Kcf`R5*(Q zYM`=q=!MMNz4cd{Ac-d%W>Pl`qEy}%sb$xZSd+)c34TL3H zh6`dXZtM=Cu!7PXPz?*SB9$$J#SoC>o{gxBQGx;On)PEzh?nd@tn!n1LtC~5a8_EU zwg!P1{8(@+4T;Tc0YngiIB>#^OXqB%v|0!UhOq*XR><1eY^^hz9SGsTHAKr3XlbVk z>m~)&OsC5Mo+%(7yCWJWquIF^BBjC*!zyTv<*7O(NuH`sy2a~YYm=PYsoErV9UzZK zZR$<6NmfGdnc9@|*Fbk)G?8}gj#uPUOHAF4)5Rb*3wMp%t-Gm#0x)iI(nc9!@{|Hd z+;l^3EdUUzOPZ*>=l}r!^hrcPRPjjTre~EQkWxK%Jfl1SdfM^fX;;BY>*vXrKwL7S zGh7oX2o}(*KE^MLxuwq4rcf+M>U=};LW8ySX~9)P>Jofam%Q8nL8Xx^W<=g@Ouf^T zdAl+FZe!~G=JbcnnU9;(A2(({Y)*gLp8dQ%`&k?8l>M?Z|0S1gP*(0**XEDFlJOFx zbhRt@ZP(_vUHLECvY!gZ(%=?|^?8SiS5VfsUD@w@H*XGX-WuHgp?C9oSB~Mg`nJe= zL9Czp04+=;>oP2!`NoOdFEjwxjO(b zv0FR7S8kax5vs;_%7?ehM|MhwHy(Gfb#E|FLXYSD zq3zrKaG+L2`d&Ut9KD!_XYil<%WnJ%VANDSTivAWC&G&kYhCsNb1E_$x zAT-uI<9`BTIa(W0{pyev(%TObFYUL?Kxo_b<2!_Hn%?2)I_LMh;Vz=B3MpZ*=IK2s zt`5K(-{rV!$9Ag5b}Ghps>gN!+Nx1*)(*FzWCZ?E{fc`E{g#hzm5ptILuK}EqzShV zO3$kv)t`r^xUG6)5RMvzmbdN>g7hXs!e-rf)x-+XAoJ?cUDfMGZPJmg>Jb2Gr*>Q) zW~-ZI3tP1lJfA8?@d!C_g+8(Uhz9EY&q+ZzKm}&EPV2SFZoMz60xahSl)7r(z~VlK z$*qK(M^+ApR}Z;y0P47x+jls*E<8pb)8*0h`r(`(g3_CQ%NtKtH=e9)JYL;65?lpM zQ2dWqTvrgdQr&4e$TRS0$^T?&Zyp+wWQejE35rxuax?G}+<+SqDr0cRYU75EMT+5iTkdCX@{4FO| zt1O&k+Q115aDp4N)1@F5A0NHP#hM$)p_Q7SVTf{ivU4qo1RbWbP%J|;Dk(3{TM#bm zk_>cfP;ln}T?lf-GhAx5&cPN?Sg`Y~bEg5KBsmQi0sIi;u-R%=hX4TMBF)Z`GL}P7 z%?cxMW&6cnAD6Nqf*+l&F_N52!Aw#I=$2$mC9(5C+@!J_FKJDE=<`o*H1aJBm0fI0@hb&7&;%q|-*j5}O=*fh9 z(r4XVJP!nCNFy|*hwXfw9((Duwi12?)WS%OU=nRw?1Zs4)v4ZTPQTTNWRQ28Gl14xO{w>q(;qZvKWxc- z1X;CYKWfQ*+LrmOE&EAZ_M^58?Psm^U{FFUedb!1h!>dJrJk-gfLzt+8Zt!ERs`mt{dvihMr|6?yqWrZV#_ix@FfT_rv zcODFHSB`-q;+F1(!>)zH&bj^e`F$>tj=BA|dE{a9?8CO%gO2(A)|q{Hpk;QyX?m|| z`eEbrL9M+j2yV5`KwtZv^N<6H`@^=m{f@Z6+QEo!BcK*(p=; zYP)1~=icDit*iQ0oY!{B=Pr=2IevdF-SP*1*=vb^)4MU9Vo&&`<4#7 z=Jz{hfk0+|*f6zMHwmBYchB$lEFAVN9*nNSQBP+AkLQC=<~E)JCzI=sr&UmTGUaQZJ7oL*{p4FPJ3iW zFdhV`_})jO9>DL>=sI&9P5B?OY^V>q8wc3D$RoCc&)~`t*x5R}$B8vh?SfC-DQ-mf z!a)ygwsHu4jd~vqt{!zR2w5T3HtrfL!OiX|Yv7#gC-;QPg5jO=(QVzV(d~-S?Q#HY ze5b;=3$_8ns>XIpN4L3mFx4I1L}<#`X?PprLg01?O~`E#^irQ;GZ8Aswkx5yvEAws zmh^dx5V)N+z?{u9@aL}JQ>8ovBfSuy-XLX>;3$`dsj66Z@r=RPb9+6DKqfeP zFtBjYw{XzCpnBaPWVL)WymkbRN(_uA5#Nzs+FTb<39-P}^+&V5qeX{F!N;q?Co7>R zhC@$1;ioHM=@{2GAfjjMk!Ne_eY_fevL1ycdTKFmU^~h7$37UeMkhL%<_0$`E z<_kafN1pj&PyO+y>#?Vv=u;0Z&SACQh$1kH`Aeh-oSp__PeZBa;pFph>UqQ@ocuYM zc#3Sqp9YZx==IDWeT>MGcot6m985k#--ta8M4w3F;x3<6z4WeN1m(yVIrK-4yy1hj z;NG%-XUV%Yy^sh56MK8RfBW0t3i-(IKfnL{{`33KfBzrI>Mwu!%kJ)8GMPyxH}&0s z#hTUr!Ska7VHHe;JUaU2>65=aee&0*PyWqXDGsroJ^d@~A1>A=F4QK^)7BeGktyn9 zB#FzUgY~J461^Mgj`lZ(4$D7ctMl^KaD7&;vI$GTEBTtRGL zVetZt!hvYNr&P7mE`(K9iUC>*xMkD1V-ca*Trz?*j51(Qv8XUsld7bqAcfx3a0n>H zylM@HjI0!#2u5faxfHW$c?xAUB1L|~ct#tvQ?d%4V#?q4A|nc7cqU}B`)D@>)KRM~ zh@Dbr>VP87M3;b&L^^KjvSn~+X{}kO$B?v!a9rkdwmy9Zu_1_Pr(Ofq+aNbaX)I^U zomE%z9C*_xg)N-H0{mOWNzp`NJhT~R(UZ`ixez@YBBBgX#3M}{hgB%p&(@^Q*QJG3 zVy83^g&0<)^eeza%ddb?3h0u>Dp#T@;EKyjKvz@dLSyDqW9CXz=8AwS{dN;Hm3fO6 ztb($dGVeB}-)YH0S*lq9SFM?k+p-_GW~G?^No(ed_S`pJFcNgM_2a4jRB4vhdl%j`_p3xr5f( z{jT}LPQx$+FaUA}mX8LP9}TTN8u2_HT9J&bJ|0?r)VKJkZ|P{*^B7J5OW+Fl4Y&fy z8mAuCPCO)Qzc;k?U}&d&c&BP~uWI~Z-6YfPx6B;0&K=-cKeb;sv0rcOA*@Ro=+ zzw)SO@d$PT9thaCtg!G~_oCKcJGoz`XuB=ba0_Hb8V&qBn+ral4?cygKqF8`Ocem1 zp3ZJOoeMsj3q1p(W;UMTv$*kWL7vZM!K%Qssld}o-(xUlZ2jq!|LM#IkVX)VrFUA+ z&lW?^=kX6bSqwj0iV*7QY|sf2o=*Coj{BaDuRj@Cdo-|&JnmiO&>jtQ2@Y|Riw7M5 zz|sM$)rqaD#s$SOoz4Dq%==Vp_CJC5v>4;G6An*C*B%e9KJM3RjfdR9POy#Jv~REzCj|SHs;WOfSG=k^KHK(u%9s9*Q)i1h%~tzh09h@~^HnRr+;24C$}jB#Hi zm80+s+zWT<-qnsj!#p9xi#ty)!kNz)a_au2c-_X+4a)V z0O!1T*t_(oZ~4#_Fh^D&jTp7UqGM|Sl^AZ|oVZ z59h@5K>Ybe^w~!A`36e-c_4w2P!f#z5Y``gt_UW9_%nZ8EfPvTi)Q~E&-^)(`8k&T zb1d`cXzJ%k+9dTe#1%?B3&xG31X|C+NyO~Q=MKOmgo-{1#-Esur@rVSpl`W2^g&h| zdnS`RBEU>b)4P}$`vELBp9y~425oJL*x zv`8s^mM-k*wbIYlWzN=S&eUZz#4ho%o#HIJ`SS>+&oySw0YY}EqazfT^%;c{adFO$ zj$nJ)F`jG4oNr(h({cA{g=ci(AQ2;hMp^iZ>GS{~_PAm}XP`4$gfzIt@*pcN&oywF zzSx*Kj}W9mykx^wvoZyvHi&+)F{?rrG}WBFj8dPbz0#OPF4w28G-Tds&b-x}g{kyu ztLE(cU{y=*y%sns_epE+qn6Ak?fFmI@*m2Q`Me|lRY(3?uu62a{Zs$Wje(sTD1F;E z`geZp-+`LG>)HCYAe-MH-CK~=wLZhDUNCI)=D^Oa!5wRN?+)(V8{EA!xLZ2BTQT;K zT)A{~_x|uMNiYd+)67A~JbCt^@=-*}QRn-+%-1ly3^b}k%|i}x-*>RAGi9`~;t z^{yO2IKYz2?8|R?Y9XFB}3_P16SrQ?j(p9kQfuQe+jZL?g1y!F6IS)uxtMvrw>X zWbfV}x&BV=_#VXAzjQR}c>>!&K@bt_1Pe_Co^UxA`We9jEP+6?!RL;wz$#!#7K4^4 zzYq&BL*yBNqn<8`#GcP?Kx@xe!p~Qt&zGammm)teN1rW4VR`}gC zv)3_y(4{gd4{G5V1}S+kpsB%?L-17`yZUHo6})^j=7E#-WR81}bbkXv))`l#3_Mu~ zK3U@ahMz76pRNXD_g4Xb|M~sr_n-d<{`~y&^L%bI7R^FdJKK=eW3cK-Us>_z zCy)Q?Dpbb=1yCK!v!@cL|KSoS1woPa)fz|DrD!kLr>>Cv)g&+1B(La_UI;3Ep# z6maWOed-eVCB~YBQ5NZ={VP7KVz?rs@?(M4MP;QBMdCaW8Z4KsO^MS~9}r9E9W7Gl z0wJj8U`CY=-EHa8ZltbIH8KU(YdD5WNSx>|9F4_w)<(`TybmAHYL9X4Y}qKLGRM&F~L*F`_^_He8qB)~Tw(W)YE$*5lmLXCX8domgA;bWP@zVHsvnX=X4{Cj%+17$(c({ z5_~Qar%@|c7nUY%fr*GLvJ#sSBnv)a0kJOP(~z@Xo1Ix8E3;p2%DvT)xl*5jrrvJO zz15Vv(wO0Q>aC{imF67W^>$O{z1IButzcF5gVx-~t@%&eXtVIuXC3*^+Vfv_M zs=i&AN?3)`w+mDKVD+eL-NLGCy*uB+SH0U;d$+#n-ekzP-CNgsHm~<=U+>xZv2XkK z(B9qQz1xGkw+43Z4FORP%ST9F59+3m$Ym?X9+r;mRgCY|Pd{v%Kj=^e19m#>T71;C zc-SL3B13JRQ&QWrbTqW0#B{`?jGT606%06XctAc1gb1$uD&`16RK1bR>2REo&t33XwV^MHbJ+Y6}PaQVs#lMH-^bOO8P5MCBVapr~5J7d!AA)&pvqxPE zLOWL2wRqIY3auQ`qgU+6q#rSa%-)sb%Ey$cGZ1DN@jMw_f5K8BB{&BhGE9255d3)_ zvI=PNT6usjQPX_r*?j2vY=~uRcR0)ipDqQTFNdD1mxMd=%o7t(Erp&fhkss+{OpM# zzpN#GUX4C4)VqR=axVlvXBMW`TYT$JM|FUY!KYD=ux(m3G*z^Q!OoS(gSJ$_Ne4&} z)yHUAt%ieDQ{qD{3D6?iq+ifzz(&|7!)uR5J&%b$07Q8nk9wa%l_-QA0Nz%`TFh&e zE=ZVVz++EX641q6=I$Hu>LpC>NZlmZ17dMg1icM2wA?1$ATA+c9GpO0mE#YqASD?O zTscdWg^WpzpiZFF1`^g_?=cjP}&tmfPPmRC-{QmR%&;PA{_$B?zU;doSZbriy`{H%g ztPb{{9v(cmf)!Zx7l5k3SI_?T^Yedy_VnMMKa<#-fv}eJKfKkLeXB7epaP#v&`ANW z)TLZ4>oOUqQ>+UTlTw?+c)s3Mu1F=_i&B}(CIHnXb9Mp6QDma3S?Mz;1x8YdfPpIJ zKscnZDp{z=U^InAxw2AT#|id27EDrj&#>^;mcx|>(qdtfl3<~Zp_(C?rT*%*#9bDL z99$}(`J0>G7L(YeoRw;uzxAHhM|S`W)s)O4=u&Vk&v|BqRr1tC%Jt=75#TNnS|OCy z=5`7Z*Lv$uWIMXpY zI?9~`W*Tzm8m$#OL0JG#4mvsux1h_-+2vr!B!Pd<>M}?C^I%dv45PWun2+@ed(0<$ zfmzh6fzTJ8z?efdEFv*o5`igzB29`BpNoyTOHJ8JK$mz)OeH!JAZfUyF?X>cd#PEY z#AYxa>l8<2(JwaSbxBvF;|z+EFN{}g|tVoiq$%f`j;OMtvnf8ebT*jh=ojjQtzHU zo%TPQ@;#gMJtLJL5gR<2@IAKo=)@`@#8T+_O5~Td$e&juzbqMekfbic7#q*0{LjX{ zPgNdSeN5y*y%BfRJa<$#1?e4JiaaZi2-vsssC|xfpHM=z8jH|0f6%#fG@z7Pm6>txGgdek`gtMr=Y{Z}=flqz zLO+8*(>^dm6tpOCdd{*J!#~d>z?D_5P!_|_g-`Kc)}pY}&ufW4dlJ8RVt-zV{~4xQ zP5itP|7A7)izoTZTI^@N83>z&pDi#&m>I=a#D|nrakA56Nn;)W>8WOnKylCQU{!tM zpk_9}Gc9Hztg4#hKxk@a<7c{1ru-_ejf0B@X&eHgn5u&bw7@4q;W_Oq96MmF7ZF$0 z1zAl8o=>a;RKS?ZjND3yw_Ut?*tT%gG<(=EbI>$<)G*CmH~?w7mybB}&V@rBn5J1! z2jCI=7_do=BRO+=?<6$ z))Kr4uyv_dM)fAD*j`WR!cpt|Q5(6(JnC9H;_t0_)7Ta z_3+QZICvvaiDrPDUt+0WVwqn=IJsZqV3p)Ai2`DwU^ku$jP*^@D{4=!yc0>F1HulW^imFn$z>9Quo7H8~&7=C=OruYV;6DI_ER zeSZG__rL$!zx~_EZ;Jn${ru;D{-?V{;nF#{zaomi`*CjnNJlOv&c|JN{`hQ607NCVi z11*lqR%x-By(Q?1U8+{q3AZjbf*%48NJ)@GE~~nSN;*)JYb_}khZNvSM5GV2sBWOQ zxl{r=ueZO<&G3Un`CM&AWfr(X=wffC2~NZS3?XAyJxa)-T97O@(73{o07fb@g9(?a z7g>2tx@tSdPL9Ni{zU{bp3x_T3^0lTW!EQvRHoDGb1FS)_QDj7c}!sl(4uJOlSVAE z#icQ=Lj5Uea{3D5l;y17=uTjKlG7&Pp=n`Btseop> zMqO&&WJY@rFngtC6S>rs7eO^aQ=4zMYznI+o9{F`ee<2B{JW4<+va<1|8MsG`^&QH zy7L72m&{tTW`61JnbkcrWxA?VMI%ZeDS`w6q<2VoAmP0wNO+`)4DZrJqzjYbz4!6F zf8isZ37-bukT9gA`F!_z8Aw5*1X8RXRZrfv*InnHd;GmGbAMv*vv2UuqR_p?!3Ro0 zhswf-%0h>VgO8R+o;(qKvNHPAiO4gjqAym*Upkw3=}dyev!|lZosPbEI`;hO*fXai zPk~q`qR+^v6@7uss@RKXVy~Qu{rY_TS7+ldR>hw?6?w5b_R<;PD*F04>9WO*@|r7Z znki^NVZ8<|jVP%Cs`BRPissphmf17wH`~w~5BtsA8zv1s9XxAEX3IRcbR5Q~)Q)R&%;z?nK*cY12$0ioR+5 zuwrQwQ=UEDF@LVZ#@{DI5$X)37;5uy3Zx+c?Jz>2)X-9^G8wkuszvmrOfZbObd9Hb zCNkaQ>F$Yiws)|2Ssxxcw;ZCBx6HE6kSebS zG!DIhC=@#j5Vq0COnJ);$XY7nAqy^(QIVMzWngTYDu&G(r^(O1IK_iIUO&SV0n+j= zPJzc_HbbeL)KNeXMH!U`v2wQ(`O1{Rs<1)+sLZjbIa%DyJ0OB8YfhFnA$rPXjD$q< zR7KNNr5^gs$#!T{e;TNgLm*R@O|QCb2IgetkqbR@_5E`f`xct|=UM=&5uTCGVyaP? zYO!-T)iIiaueyg82gg$*0F^H@2D%_VqnF_Fcpx+3S9;vPJm$}GcQUv<3ETLylm6w& zz_Q1`JYm=)=RJQ0^im_nOC)qjvs?l~uH~;KGfq<>T3c58T>3Mh6m8Nk)$LM!seq%Y zpyl|po&Xgy%3*A}E6FwMN2t4%(7?ugOQYU}Vb9#~#N6QcO#kpy&ydKft;b*6Gz?i~ zvzdR)82`o(sHUl@>Aw5!tEi~BdiCn%%a`GwmtTJQ;fEjY?d|1~GLw^&hYlUe&(BXJ z5*IF9xZ{pHcI?=(bLY+j2M#>>95;@CQwP7+bUNkp2CgToL|pOKAuDIF zGFe$%SW7LfBcK##Xv$r>#CLWp60|@FF|wN2bIhZ(aumDl+8KgUoanuIkkYmC#}rPQ z#GWIbJyyj6N#|rQWTiIM4tG_I9EDI57wtOk-JR#nS)Y!X7oTi35-7`Ds+1tp5^@@( zqT&abaEmi_jmlI~80Ks~azr#AKQP7u7>Kyc0%O(~+Ehh~DboPP8O^v07?4m!&bm~N zE|qVXry)6k6I>bUs-&>T7>vesY1@RX1rr;CYXlB-1#}hxDq;PSa3k3gS4K>g8;PcA zC9RfbM==|o%803eI%`nnZJM%cxsGxTY8WJFA-5pzYzb;z*S?W032qsRfJ~Y-lCvhc zTQ)XlV>DpXIfq6$8fnK``g1ZY0=ki2TP6T5T5*@z;aw%OvQnd9|SM{6ZV>ZXs>PQAk{Y7&Q)Gp+nONnX8F_7X;GLxl|h z3GmMbrm>yrS_A?GT@;Xq8-2~u9q4riqU#0)7wZS*`{%4cO~X)7x@#icGLnY%+dY8_3rj-=Y4ve7hDCg>VbQ&fSwSir_1s#8WI=^4+U$2ZXzK&7tJplSPPn!(r@ zmKukR%781a=aPFU)tw6`+UCHRg2t)JR@jNjYLTnE=Fj)=bOcvtyCmd8Q$QwgRo`>DEuQP1uWFw?0o=ChDU>w9SK9x^ zyHsMhRStT!&gl{sYM3r?wx%WxQl=-k_oDpzxGO_blkgs)B8)_i-cLFHDYL9e6eo~# zG}StT(0+xJ=IPunJIQnf=@tl+mt^)t=iEt9s(ls|WVCv#J7%jpg_P&Igqm<^!@zvg z;5-=IF|s6x8eQxhUFsT5b&V}`jitH~h!?UNS?V84kH|;`oEWJ1mp#E{Z46Ru84C0E(wB=2W`%`1S#gWPR;R)@w>Kjh< z4kvmBV(s1j+QuQDFPP1yw*cdRpaX)s?Y7&VefHUGHVa(M&(H7Kv*)|t{ccrN6Dw3&oy) z{`uM2Sx0Lxyzl~zoH}*tz4zXu7@2`UVE_L8_uhMNBoeWK+&FF=H;#XcM~5`UHY&4CiK(s^M^-KkS;;D80iZpKS|%deq9g4Lu>zjGc2>ez%Vlc2 zhziI*(6)|AR1a%mH&SR*v60a(7fq`VcrzM{i06=PJ|Q)IW)g-FQ>Wi%cNiv!)Ltj(`mF!K~? z@~w9pB>C#s$Vz9*I4hQIQZmq@JfI?`LIf?gR-A=N@DFfhtYt`J{&*rQ#2K2zQ39vq z!ELe~$<}m@qm(eJA>q=>cj#rs5bBD!b{23;mM*wxXPz0699bbUI*F9TOHh`qOlo%5 zahN9v2puR2-BA?UQ()Goyuj|`!QFx-P|YXG5;EB>qbwTPQ-}mj04g!nZl%?N5-?Rk za9<%3+FuYvps53ekd=hXI|@Pvi-HG>gD}-SrIAA=;fKp3k5xt=KM{TG1c@-`N6JN3 zk5@*XJ{fzaD*mFZRf%V-Vo#lnK6xVc+{x$*)p1zs*B2nJ#4BeLoL{?;c;mv<>lc#9 zTQyUM>t_zvO@k$G*CdYA%jQ#Xak{t>-E_99W1+fxzOsF;tQEeREo+;tY@0vXj!M07 zzIy>h{Cp4k`l5E`NW>~GT%|V3Jhxh`i}84y5Y)WzT^SL@dLCmgd2w zw&8T+P^Nxh$;>7+t9H(IFH}K0wA{T2>X3$iPIaJv&*eAFn6+w(ksk%F>ZaeWoni_{ zYBhc?kJY1~&sMb0p6r-A-MLWJy?7D~Xa~}0e4(Zf-dn2aTVl-TyBDF3i~Xsl!F0o* zMtHGbck4+Eq#A~VE-j;JKm};&naK8gmb=EYZ6hKaIWdmPm#=Ls-8q`+8q0Q#X8;ooL3(7fQd63^0114`bWdhG$Fn_?%iQI%Yb?_}p6!~*_L4u5 z>7eD2ERDBAVh|T3hK$m9mcjH)s5~8Yj%Re~p~^CxM$4cqSXgT)d#-1(3ZQD8<58Bk z%@w!I9B-U~SWbx<^t@PA7V2Ej0*{QvhrR%+Q`#WMQ&>FJxlj%=K^k2Pw8rXj<}q<8 z?&_GUFvbR|fj2=H??$(vnqmm=KpkV~7Q9u{SLZx^A*bk~LurNq)>d~ep0-D9cX`d` zAV4}rNRvtXv;b`DEIZr$1v=uD6XStEYJ_|`f&kA#&h)4%3zTR243$^tq**WBd~>AN zHglqb_eArhj8Ic1O*O)6d{#k3WM&x)zMCg-n8x)j)VP7)93oN`qLUEFT?3uJs#QnY6Q?%)&F=lD+ni( z$vphb!3OD^e5JbhSu91li)vCL*D$3sFz0FKO^2(FJ$2{~j5+RxPEFJM% zVG>r?6}D+QE08ggagN|h;u5y&j4}9?X>?@8xCI@_nb3x3`?%hLj%>iXD-3hg#6)bv zQf{)j4O({B^~)`a>5{o?*14syfpH1&n5$k64rwHCJK&TTxShl?IA@ECASh5uu5_G9 z?>HWE;A9Dj3R{&O`J}~8pqGe9m(~;vM#=op&V0L75aLY!&OGJp5DVpcR2O-n-31}A zM~svo+MOTTR}_YP?kI}fRUEyyGh1h_$aUytg1EFe?DVw1){`gW&zz1wUzK?2O!B3(CTHR=R>z;KLJ}`k zCx3lz>do5ex9ew+w`!-~teJYdc3L!5KYOHp2FY)jD{7iAX`U--nkjCcEoqvo0G~R* zB(!8H<)=FrPqZ&ov`YJ|>Lw?30qI3!hCR}p(VL-^bG?fcuIZI(PQ^N53Hp7yiSzK1 zp_J0i!?O9bjtZq3`qK^lqL+*P>GNtCNLx7DxqxPWs$=1F*TN|Q)k0O*!U>R|b?#&v z+V*@|v&bs1ZU(Y?2b!v%ImTS-X5|N1Hj*H=4O7X_IU#NCPrWEJHgzKGC8z(O6PS;z_&q8PQn zD(#*cU+$h*?w`yK`d5d8t0TeHLElQ>M>JKwt~UX@Fv+mI&jL{_zVD9vkdaZp5E*S9E>SMF_DI^VZ=p>Ki5 z!6k1?eSezQpq|&M-|T^dsYV{tAa9PmB3p*itQ#l`(*l{DBQn|bjAXiaK;#c;lOB}Y zNdXN&^sWK)FNv0s{`w!O^7-r( zN@WH{GXoRZ!HMk9M0Q|2JBX0>WQV-VL%!^QCq3ZF3{Ip+eLx5R14OO)!fXD>N+7c4 z53l*6tAXe`2o#L0lf$Jik`r%e4d|K-ExSw)=^&Tn3xvd1LZelGWIY&L55?ERiSF zH=u)@*Is*V|Ni}*ot^9J>*eL;4?OU|Pk!=~=bwLmYHA9yy8r(BA9>`Fv9U4IMMXtF z`q7Ufk%)60ymI9VB=*;T{nyVv`z&Dg{`>F8VzJj>fBoKj?=2`OICSVxUS1x>I2IQd zAA0DayYIdmD&vx-o_p@Oy?ggIH#a+D*Nx-GapU;6c^FwO`Fw%V5l2?D<_c(Jr4Lvw zn@MVYX<;qBw2@AWqmWE`6S1@<(wpCbmv)JEjHV2z_T(E59oGh`uj51mR5CGnT``@H zfmoBf^@UTrYjv%>XP?4M15s3W#N`3TR5xFVUB|2!$O^1F4%+}K-d$2&l@K@?S-FU9 z*9ri5uCPU8)3zMtlXI;k@MCrr2PcR=RpfBOj4E|%D4ArOpJJoFAt-Ik{a3ZfAOz9ZB4N9I$J`W%DCjyrQ;S#3bce<7RMrICX$uO)uMOio8vmyf@sIup%Kz_q+48SpOx$S z9p)wPJJy7|Ad|?-qW0OunXCp03*DyOO}dq9(*R7<7uQ*tt<^BH)j7|9+c61X2FdIY z0tv1V<0v0+1y*g#69oZ3x2vQ~Mmt0-A?3qSpph6Uv_0R7fkq?@u>dm@C4@;6nqCLtlAOMq%$5o8tF zj}%1?ltk_<3Ex>3xu-1pU|HnB@(48b$ce~fCu5JEjBmfShcb2VKCb>h2}*2~0wnM$U9Df+%Ri_5B&6sdP=Bm%)eod=ds9`d+Mrd{v3R;;QNtk7 zDM7y%O|>%M`HHr=%C?2l=7r<+vw5}h1B4Qf)Xy@UII-|0>;`01#rq$ucUFNq-D0EZGq*j>SB?NV>>|( zRpEj1IG`q$3&0R#^w`VLld9`U*Yez9=0QDudI5wWA93l35$RZ}6V%kaWJWXW1f*Hp zbn|GsNrpa_T0*TRtph+y#jKWnG}|qJT&}t&c5X#DvmGrjc5Btv%RAkq#H0E&2)}I!Wr9pCdRAf z#qQyiHt?1iQ+CT5;LzUonr>O!>NQPqolsfWmgyb`nXIV|HzHG;Q4?KqYkCt=BC!!xv5hby?%IsRH=~J5(WIy>GPN3u zuSKI9;mEo_#z;hW5EKbtc*F4+#3ehM!@n?$m-YCUJ=%h`H0oI#@hkvW17kCN!^!sE za9z{r|Da^$j;gAv0|ySAK7D#+Wd-1Q>#et*eDcYspMJWxw|9AY`IcL50llWDr?c6t zBdcIAxaIqoOeSx=^;S>{Wcv8ykB5hc_wCzPSXekdK29T#KmPdA(h?{|;kVy@d&iC) zXV0FcRw|X+wQCo5!{M;Id*irq+&KPi9@mkTqOMzDz{TmQlr~w-W)>D#mX>mkf0@iC z;;@Q;4qbw?(&kX-7N@% zK(bJgC{&K?i}Q|r?i#RJv#^{@OgVECv=hFwICM{0`(?Uh-!ihFeYT-ot(#ej+k`|RL zZ-J&zzUN^WH0%@Yf-AFEq%QQCCXK3XiHn1oW;kRdYowHJ7=W@ewSB0nO4RkGE=tdq zCJnAMjTo_v$`%B-w2oxaPyvq?sn;1ZVx)nwvrcjE2B_vMTjwCCidF_N$CzbLXosfe zOIzkjnrDlefPwkSHrQ#NsU5AGIflsQCSa%p#(={PIsPG#;d#dieQBsbHY*h9F3V(` zP~VWL_&Kb~Hjic*q>)v|Xv%O!YW>=vZ*9oGI_zH`_OA{5R|k9oBq$3O5)lDBMiCt_ z761CuK-)o5sSBp^I%n=m`r2zaT*u`y&|r_PBLM{%m?Umf%_ zfHg1!_G@6>#zZNqH7wJOwquQ^y2fF@Rp1JWV;DU~R$w7hgNsB6y(zHaG|MPpHs`uF zEpK_7{P!F}%NW(g;w+u+T0GmeWMG_ubs=GU?kOHCm!K3R43^~3Xc$V7p^xQaU_G$k z#4t_Gm-5Y&pMaI?g^Fbo`j&X&V6xc0z_FE@~jMd1xUjNQDa`t zD`N=k6x4YlAk&Q}yy^+AA(P=XFK0L;vhE43S^nx|cy%JUI_491jlx~NRa$UJhS2`d zO?Qo^nBd?fSd~?q-t4eX zX`OvpH|!Blmaa)m1XdWBFKlKafJy}AOi2Q&U<6qMsDjZAActE3jCtj)`i;bN3)~WM ztp%d%p~yNVVJ*j0fK!Zf5`tQbP3ba9+Jr;|nu4iRU?WCaMy>Ve6ar1H8%?c8lE4^L zW(+nZR13#tM)R9#%h8m&Hk*~BEF_0pkyVd^WMn4-ieoW0sohpXV>5%JGyTKK&i-ga z^O)_k`ty_3#zxc&CqfuEY1 znrEMVHa|b#=kwik(@o^SKQK~paq;zJ#d&US?vY0x0nGaQ`ys3I=g(6BzIylFcaI%A zwtM&P*49=^vNG-M?OguqSHB|N)z$UWpZ>JGy!?j2>c(;7_&0v!$jWQ`tOChcR1qwu zk}2C~m3Gl7%r+%)K*ia?l@o9)o7xmv>C;tto;{)_ZIs%3RGxnOoSUEg04Mg?1}YM} zkB#p>HnBI)yHDPOkkX`Wpqg~lq{6~8@7{bhweR?(NbHzxzJjc*WmUacCb933|U7f6j9JXYlq!6>zUjXcPJ!=LIrL+EQdf?PE-aA7UEid#eOZXUy9ITKuaND=Gmu+u zyVN`SFqgh1rH~bB6L`~RDvNAEkJhaAWf?JQ0F1NS@V^(%Efyitxa4xvtjN#Q9JTwv$B|e;xR*-0A+5s{ZtkW!Yn^|<|TMc zMkj4^Qg{jRlI@!kFYPLb07BdI}9)lz~|ByG!E- zOTt;)UqV~m;9bnQ@ zW&3=7dw@K{*0NVvMAQAqstv*D>=)|7+Q6vVR*S|Xt{A1wHr{OjEX@5 zEyK&rqsx?OK}IueBPgcJT@y0DKr)R~l(i}aQ$ah71RS!BG~%MlHqdSnpn|f1sFUrB zT$ULY0)&x1A^^#aR)15xAxr+*FdedinQ|Eh@ zYGh=~TofTNl5{I<1Mg{^%iv=3$g){oghsvKibuYA5YCW)eJs2_i4q^#n2fBA1=j}y zYjW80uJu7#Bs{B~W6MAz$kaNTKGP~l?-KCLqZBm(&pgMG6#beNF3Ym8 zI1r#PX)@b04m(NUMr255XJ1+!@vMz_*M=v7rPbldRd{B=yUg8z2_*(?zu5q5D@uW; zR>%AXQU29&_!A=Xo7~kFaZW+8N`Li#%1=dVU~AdS-YXevVCLAeWMu$12uJ%W}H6Rpawjovjbxcn=;w{ zF-DsiF>D(PEKh_q>~Y`ncwj|1M-CnNmC4BI7a$2T$QYwtGaJ#RNbHi0R%WY6Y?HHm z0%Mjosoud@Q`>~k|F0#hEf#VKq0+|2n#Cn|$MW)WCX)eg=I7^UW@eJf zWFnD>$K#y2OsCV7$xf#bgY&adydmoy0r zaWM%OIZ^_OzNV>T*XqhPrCNLQJqPlA`^|D?=w*a<)VuqL`a*Ue0q11P+I1usV313t z<^CrNm8@i(ZMT)8|49`2-Gv7fj~#PHtqEv~Ofk|?c*&wx7@wE{3a-demW#jVa0O1Y zx)QicXT$cAv0S6Dh^=OweC)8N0v-muo?Zz zxiM#SGDFbqwttE7sHBS|;b_MNd`zzuPR>lui zBp$6yJXV=_>QwTD>ZzB{O}~70`d8=W>Gw|kTygUf%JIpL)QR?`(iSjj?ycInS8HZo ztCTR(7UN0W+OTrL7A`8|Gd)KlAE^nYZd@kJiuS zHO!038s^C_XkMV@bA6ebeivq0si)JxH?_Yv{&VmG8sZ*VcvO%?Js}ICg z-U{_Cl(k8eZeA#CoG)%!JlVNKE#@ec>IEPnC_&V@zI080roPWCX@g85Q`-+v87(k! zWJFWwm_SxK$2G9F@hp7BEJ*jD_xo0vX^&@Zz`rpR+!%{&c%mELn8Xv=90>}O%+cv>Qbh0BwIg}Z5#q`mOI8*Y=uEMR-Sd%np2C>c6$_c5O!s1EN|^VrrOMO zwSB4Deu3q=o^*A0>TH*U_W|q#LC^Q3xm!0NPfo$}kgSodBdm!qxN8#8Rq0E3m^LHG`ecYf5O+LZMyXE)1rBws#t9gNz*lA@I86nF!}T#|Xp-2ZfogdFo^vvLAKK{b?&#V>^u zRN-<%bd-RdL_tmx)0dOem*c?I%;m(?WiI1Wmt)g_7G$*%cNQKBMOwGpN%!>U;F zGR>ODpvFUMxxyxKWo|~T3?rdyMi`8<_-4hDAek4@4D+Qzu*7f zd+%+LRWusq61akkMn^~g`mg``>8GCtoJb!$c#v98KKUd~J@CK-KmF-XAAImZXpb%^ zPcO7qR#wKDmVq(ybK|&i+&FF=|0a(uvKk%ng+o)2)l_nEi>z{ffZA1M<|*4=wVb&u zF`#mk#rZq(+&k{!yuZMEfb(&%%6rfy^1XKy_z*}5rrMWJu^dE!Pu$&?XQn5set?q4 zeL}K)-@ZH_msVH>48VY^uSGE}6dpsw1tST!j(d%-Y$KLgrHrg(l>()5wk*+(EL0B0 zghmEh%FOfZ*7sYz+m4%Y$(;J+pXQ*#j8{&CQh5@Yk01xT+y*Qi0j_dfB(eh1%wQ#w zQLsTU!^}s5H(K^=%QFu~0fxss42@XK0Z(j03%2d*8U-1sSo`ws69t*$oEw8GUQ1Zu zc%>DHf<$f#PE=k-D&sDzPN%o#ybV3JOUg2@&Ds*4Te<5RRGZd_TFa%CIIJ@A8`Q=# z-}d7cgu}JZUCx@Rj8raOxquK}Qh*9!n2Dn2Z9g8^c3d(2v=0igSQPTg+uAN=CMLK@ zA}76^BOeIFd3#}ayVB8Jh44~%8#J{=Rz#iVem<1Xk6?R-Bl3X zSwJJoBuxRB$_ae6zcjuVvMP-oD2+i@cb6rRJImsCK~@!shbxm0ok-rtWpNBxIwukilaHNBJaIblY;_W*daY*e&APdx7Z;8#rR3p>Y&@!BJ4g~5> zo$pOw0EBu{=Xz5$ed+pvOv6C-LT{$J3tR-ZWYId^DRW#|+k9yoXW6gHTIb8#7s)@{ zlQxsr(rNgLH2fg*OQvo>oS+C9L)nW%%d)MFhyxjn2001&$h^atdpxU9grf6JiU|?; z3QTghdOd3Z66`b*+?WV$Ohh)ukxM#=t362UrfIFZ89g+C7;Iz3JNCOg)P;Krz-N3#37J zg3R$18gcm4J1J;nz=O!-+OT(R(7QV5SwndA!=6>cs*TAIkh$RrZ%hU@CITCtAY8F- zRwhfpFyZw{GC6Y@MAjw)YZUWRMa4F}w7{x{*2V)4tJWt1qBU~7@JVbl5D_K?ji$oz z20#U(OkIjW1<5N&EO9vkw@h7*PF=PFu*xM6g(?B6Q#ZD0wk$hG1ZgtD$h5T%3(>om zfrZxOQpg}}*ameQ2sxrVZFZtAIjZ6_6B%8oeW)W!;u2|kv`#ldu}h4B!8rFk2qy;l zOkIM4V5AVWEP#ZtN5&}I@8l#7-Wcs@c9-CsxOhpnsp!llPzs1jOmC8zkey1+GHWrL zAsiA;3Zisox!_ELHwCMRZwNLIKmYuzFTecT-~aya|L*Vp_HY08@9p^HlTS0*3B9zp zw*y*x_UxgN+S*zg`PZ=MjpN2~yxtz`B$ZBQz%6ASF`hckYpi!akj(kfOc<UU z%@)CS;G21q_goy$G)0Z2Tq~F^VH|LL_#aE{w|L zSSZ^UAeTcjBd#5Cle2!!*2FD(r&Dg(V4S^+0T_S@Z$xE=K%zb~b~#cq(6aHXWuj@7dG8QthK}B zb`x^U1JJfk$-1RDgzgKxx9d|;eg%g(9+1zTk(G&AsN}O3l3B@YN@JD| zQ3h9#l95$GbejdDaLB|h2uZZ1S9>1qFA?P|0 zf2=b8;qdr>7n$kKI)YrzK>blEm+$ zdU@D3z`?fD!A*Z zQ;8=}!eG;MgaBnhn!b>D`P|HFH8XG2&VppWJU9K)*(uJyJUb18flmc3iy+p^=cXK4 zy?TD;^$Rm^*U#oP%pYxBI9xw_ym6tZd8xQ{v8p@OJhIZ|Ssx5+j0QJHe49hQ&3?~1 zDtM=7rE3y`TJ04!fLqI*nd9U@c&clOV&?(2e)u8l zj4&4mAuAwcrBzm`6&Ym4NWge6ZaYYzEl4Vx1GKhA3{&RhGpW@NW#mV8M-1A2=%em8?~sHAt-Azut?`!i1tt zKvo8IS)dD~foJ;t8$BM_b=6@~{Xkk|IJ#0lAl4Et4k{s5G$>*WEn_QkvmDN{q_#gw zX1e;JW#G!3{nEN*O`tdy1SA7@$CrC1R{JJl$dx`bz72ZCbwfOB@0$Gj0_$Tw$&hz_ z#IrUER(aP(fgf-vD5i1*B0wT7blLPpE(v2In*fYIj%@m3n~;elwC)$%YzCv3{0fZ# zLza-Z|5GcA4h-?NE5D~)zx;FfgOMxh3Sodi#HU+pVw(fXI6Nzd3VmwA7 zUb<}la+hUg63oa9C5xGvq`khDofO6Z1zfg=1PK`sf`Gd6g`^xj@fMhcub1v%Zm@XQ!iTH+%3CA z7^D_QWCdt#M2)E&T+yj|oRKvwIjj7LGin*X>6XzKgHevsib)7xg<>m#aM~YEP5Kun z5YOD;NTRi4QV}dN-}ZY}K$PrGtE=D>ShcjY1X%$d?{U2UJ{$$ufKs1)@(C#Q`4?Y& z`NbE%``z#0D9)rm1EfCr+|XN7GW6+lJW#JmJKyYh-)!I=UR+YXPJ(;%EPvEwKVqaY2p9|NUmL}wY4AS-A} zpC{J-qTAmYN91iN^de_`d!8a*+^!IOV2{dZkCV(qO78%};3%~Wjc9w42H5;fUmHESEv+dAKRc-%T7Uzo?r{DQtz-B3{Of2s~y z2`LTXa$C+2gETT7Zjob%6_EWZFZWTYYc7KF{o9@=%G#c3{5ECyI8ZQ}xk%>6&LiQBLz_T6ss=Lc>?NJ%Ewp#@Z*h*r1 z%BTWaMfVoR_Y_68ar4LJ5U_Ivn26gMe@;8z|zzsCzB7B$M3I* zA3BjdR4M8Glvo<2SGRFz6TergKV0(D+EH~Y&A^DmvBeX?o_ z47;yl>i!A=)q~}+hbrPU2u-Qh=_$bM+3Klh&rCm4HT}x@*>^6^M1&+mzU4a{_?zxRKGeu3)FGL>4_z7!$hQpv00si*3@qkauJ>%LMT0{CXvegVOgBf5I$RXFnakEE_>fA2Fnl?v)Rb3F#_%i6# zG`dQ^wTi=`jxO|zQmD)DASh;JJD^mhdt$W%s+^Q*iy1L^3P6}(QpbdXq4&Zn-c^=m zIJhwq+8hB#StuWD1j){O@^Z%&2;OaAy}xCJ_r7{CM*fXC%f^l~tE znadCWki2Y;d}iB$sS=yYk6jK^Qq^@=)uRSrkxd!Cf-)HaGvtS?7)S#NKvs$As{j?C z5{0Rzuf*Yv>8oTSWX9l-By6(@LP*?TsBSHYvZ4S9O&O3Rj4_gz8KDS7rlidP&=r$c zULbZk5VeY~us8~wxJ*Z4A;usYxg4{>m`TbEO1iupodHFzXe8E!6WEDMXFD>>l13Pk z6-d5+a=^1Lpfcbpk@NJsss?8Op3T?{Q--oMK?Xo0B1UUj+p#o$o0=h$deoY$n004e zTfgcNz7jZXMube4W3#L(2q&^i&R&_GzLEstX5?+C`A%ISQ&uv@qj@>Ll7Y*SRXDyH zj6zmR-r&-te__HiKRA+X>GJ$hWCiog&(Bj>C?%MB|08FT`ps{?_~MJ-neW)g`+G!p6U=^h^&{rIB~Kl%8R>a!RA z^5)yW|Fd1+{r>lU^{ZECe|dTNTapzcfq7nj`Q>ffwvCL8xNT99NaUBl{3YPz_xovw z9NMg?r~rxpupj;CMn`{Trh<|B`ug_o-~Y@r&$#L|3ts_j_uqd%ga&$%30$2% zefn?y=5HQ)=%Lx!SuWiGZX7p`8^^!dV~eatMsxeD99hX`HNOm5EiJBRQtRoo1+I|6 z>M~fBg{+nZRLJVeRe1w$e{&Go@y^ihcZPTC>=L89-yTBt93I+xcy!N^q1}gvcfCC* zd1q)Ra(HORTZ22^9^7e}I}Z<&ju>Gx} z?QackdvkCbi8qJ0ze(oc_BV!zhNrK;9Vq#T!GnyxvcODhTvR|kIfs%}x8(cVJ)uWLv&=!S8v;@~Z>^{XQ{$k#L%iZKAmYlAdM z3lt#DFn<1e|Ialkjrr#q5(8s+6zISC4Yl*LH-K#-PksT|2Dm z&@FDjbn%)dc=N0MKYM+MS#bB~Zw=G$EpH9$?(0lp_?EXve)0Cm&yhDrZh3PAZv2I? zP>8kjI1=1h1W@_)iQWP~A`_OGt#-)Vq&O413&U==)vkij&Z4j^PCAEWYs#mLvrxr$ z6arvjXSt$`Rlg<$Uz@GA7rN8 zm24$_T{rPwDV&1)KjMtPsyv0E@oahGxgH>>0e)<<(W5Yrr)j;XuVaZ-B!Ok zKmA(m?BV*^{Km!7)`iLrh$RJPppHXI1E}B-f`4r=ur>^7_||%TYkgiBVY)plGQt2< z6DwWg+0Id@1LSaSX4=AJvDa5@gU|}Z(xey+j$5)FW6+3pIw^3uwrL3xY(tT@6+s99 znCx0gWE)4E#Rl%m)b(eoI>D-i6AEy*bhbyqHq50EsKyziByO`)Gw8wy%^4C->vV86p6wc4ws?Jr zB3lgl*GBy72sG6nSnu|(_IL$dGVW=8WN6YfZJadA#922ppk>=8GOc6Uh1D>;Tqh4n z9z;rUIQr5TEL5Y#=SVjW%TbU~8S-g_qDMxhU04Y7)xNCuQD&Oy7_;z$-W7!54g1%} z{Trh&vv+mOzdjb&81rq62G>VLQ0wEt_3`lfM0jH&wCUj-Sx4l>7Xg7}j0(aeiOWJD z@siFm1VuOf4pc~x!!4L9vI*G8>?8eN=n_s`2}MC2k&OK4NPt-JOTMU?j}n_c#m9rk zE`@|-VlyF`RhO%qv5FwaoYv&GHYH2~8)Tx97$8~uFp`PVX1NkCi36>ejYsShOl$=8 zai{fMI<5faa?(p)f|q~_h(b_7j=9OnXKzYwd$u=85}_%L4eC(i7GcjJ)sRH$<~nS^bW&dqvC?K5)u6RL5G;}<8bmgVSZ&qbNniN0r* za0!{qNEmC`<}QW1&^cmez^x5eUyFG1k|RCQqslAfU_@Wd0;^Vn(Pe));|r$2s&Vh^ z=;YMkNUXKX_E~*9vVv05=``H(@y8!SP|gzd)t6sNzWCzv&p-d{lTSYU-~$>;EiKK? z%*3M6fZy-)dV_&LA{I-hQt!R{?x&x8^4s71=97;vgMqCcXs7R)}ym8z(ZXEx{kFUwfB3LBi^V3sH(^KjBx$NS?%HqOmdg;38 z>WX8LbN_QdMLOpV_@gJ!<^#dT>Y1ipZ&|n&ivr|=ky+^CQk33fO zy=(H_$8>p3s=xR68H9>TKc=(NPLy-z`;zMKsw6p-l>Fcc2BVzsT1f^*+QjafC}DNK zmPZ+ndXZ4~QHkABFEo`KfL*#qG#zzu*7Zw1Lt>`a?n>zNySZ6NG^0nWzWZnu=kGmA z6-}A(yIYL*dyhzRm)6(!pU5@t+W+2TXPx}uamimkdG;@#aOrbDc;fsIo;de?$@w2X zUGvw^HU8-34gm7jx5s2R%kx<*^`JgHb&agHD>_9$9(o1966hss6^ON~K;M0Wf_4{& zca^xcz9uzp9a!;F~owZ`aMz z{yTMmmNsI&UORL2;#>h_)xLO2ks;DG1A>sQ$(3H;x{Oo?2?O$2Tki{O^!eA^mZTo< zdaq}#XL1d+fUo3e=hdx_3E;s+TriisF$ib5Nyy}K6nDX#?zCa4cXHL5(iWzEpBnG+ z$-pA2G3P_`*;@s)kouwJGd-!39g1U7-2-oA>IYq<3bC2&U}FL&phZ4@bULi9N{|L3 zRFnNmc;oP+!Tjzn^rg@CW~;hV)e5kYqJ0-PuYM57ad@_J(e^Sii08SQKgOyosRXZ|;F-?~ci;gbW z4+{KXDq&Th23gxDA3w;7wWZU3dGT%Zdsr)A70}YoH@9g@(b!pD+f>%=S)+`i6e@`P z+C*@3JOEj(jRe@BMA~TDs%bEm%z-b9He{t4!CLoQ3%rElC zi>WEK;H*8g7QbqiAG1)&^rU?F!Q`^_NRIM@GNW0VOe3qW1tN-@@d|V?D%-jRZ^$Lj zZRj$?6xbu9*|l`i3_IGe1bQJ;+Vo`=)vSS>fM?5OmlJJ&vh|6vda{@~kPA}L+#1cF z5TLrEmJ?UVj5u?g=#lo#$RRas^f-xWvkH_=rr=R}a-~KI_1e`!DON)y$#!-<_C?1Q=OizoS+P zCN%@(P#{{)GJc^yhA<2+YivApp{}XRtv*`dOqu8fHLfnK z7gvB5Y)GUB)XoJJ$hBZ%x73arCqLJk8vKW62A~!gp3+vBE;JqMkw&g{q3*8bU+ail zTxx`>Wrh1RQ=8zmgo@<`V~t$9bO|-?D%#nEmMM1aDYzjeY6g{GH3WB?e!n@pMp#`+CSQOVn zR)lTyRSdY&S+*ub&VJ%01*MPyYFBA&XK`$2zD!lRCDw}VE{WP%wRRR-h>N1g9@j`o zeHG#>ujQ|vwr^d`q{TG&I4D!x-cgws+xYXYU+uq)Is+J3&(e{*3{E$|Gx)oB%E4U7vzIZ1j58dnVSp zg;i_4x+VWN6na1cr0Mdkw#$8P6+VF$+Q$@kK@g=V5#}amksF4Cay1+cq1Im-k8F;F zz!LRhU9b1})O!z%cTQYaCXmhFhyJ z6_>&@kVdAhl@_SU{OIcXGv{QyQnOXvOVx@rs0a{s7V^Q|@Tet+Mh9AM2N(R)I=%*6 zi4wJ$N^udpJ*$1TTwoPYYM8XzGHULB41n=lbPC$9?oo7mMgm#216Sj#FdJ#soTZ}| zXSS*xSgsqApQIcDhq4T{VL011s*oWAzI7;$GY>_MjtU14M6s|ko%Nf65lrpRMaYmP zZ7d+Kzmb4G(lrv2v)>qS71@{wZ<0S5zT}Hu@`f*YLYpMO8#(Nm06FA9K?YGqR*5SC z8H*g-Tp=?wB}YN$%LhV)6IW!UieCvQmEatKtfu6NCqT-%{HZCQELRYenV8ga$Nj%@LG4{?1}nn3v#J zUw--f-~EnsA|C(ny?3L@+5HbZ{{Q|j|Ls5g=YMzKy>~Y>T%4Pmv+#g91JsS<#&P4g zar|k=H^?d$l{es2GCen)+h_F+vRcl{LIqjDSF0;mNs~an!@prSXDO)M^40_sG55E%oKGW6jR0TFONS^7Pn7q#U7}L+kP$C z$DXW8zI1N-wOT>ii|1yZJtMMu>U8pn(+SRW1j4;)q1)evsV>f0yo$w=)+MC0b@6o9 z(z)JDZU6E`MVOGT52*Bd#Wwu`Sz!7n*L%#qBs-M{ZGHuv-nK2tEYqoNNUJ@QiVz4p zQLGR8@~?v&vc^Co3PUH2ADS``Lv2YK4{ShFp2%gyAH9NN>W`7$oD6SHMlPZ8gIfcE zwJz^!n}T7iH4H8TBp3R{Jm%mhc7m_k#vE4Bg#z)>7dbKqiCe@!EhDQyl;C6_bAf60 z$p)p%L6M|=5i4EQBeH_8&i2afkS-`(+eZQ}5}QFgGy|(<)sf>yhmJ0KhYd!iJmZ`kP-(dk1v8Y3pc(GSw@fRe!lFJaEPqIshKR&hq}7WS ze2W;Z@!X|VcWJd_O;Jk*G?(ebrf;S*&4LvGAk8i(-%A&VP+{U@B;p&9#A-Oc5{RS& zp_DhY6priBdf)Qh4s~y`o@-KWV@6hq_*@dQN~Gqd{vcUNt_7}eaD{y5^WXmVhTM=pQ9gI)&%e}veqV*+ zbB7K${mqN5zj$Y4`!TR8xHAt?1dA=iQX)UNy-@Kg6o>tI1ld&(27BNl=h_DanFpYt z$iWrh1Y8NFL{N%jp?ndSy9->!_5fWL*@AWy-$KQ-&uU*ud{0Sy7ldYa_ZBOPx`hOc z9fYjP1X>46k=R}3v3n|#_f{kUs)O2y6}_W0exM|Npfs_!SOeIvuV5*tAcgO#NZem3 zvy#HE13V|E4pq(^Ix(%yS29(JspJ!=vo>NqU6p+P%*;#Y=U%CqeYJM(_1f82Yvx}* zKl|iqZPtR#9zT_Q<_wrL{n+WLL*+@}>Y>UQXW;EY5UVtHs4Q{lMC_rH$;VGkJzbrA zP9XtjUOYeh{8>e?cG2q`oYwwy|Yo7pAgbg4>k7rr&@mx3xv*gIHPqKod zuP_PJ^{sV#SG(XbiySx<+8hgQj4B?+`e=C58$z+Z?3bo~6-6^V^=>#x;z|g`-86et z|KXraWNqVXK!rtg&=x6R!^~4_a;Vc*C3Vr`UF-L1s4}3LkkbWmneC`aK6ncLezqrl zwnuT^Dp>!LC_E6UP!tpI5S{gZDYnTqdcJ<2am7PcJP$p~ide^WB1 zMW-&uXRaoZ*~?SzgHb}POYzxDQ*)QUrm0y;QUYaNN`PB45SRPL6kvA6SjC_Pq=}0s z1ysybd}zyMu>`Gv5-N~0Juw)gN6OeZZM4W{Fe&dop_B|+6x%QsGNY47iF|R9iF${f zAlTg9Yqz!_DlEiOG3P+20*q%`?T4quY_XXuiCHGjnt+{`ZCBfd1(XN0)*^|Oa6B7` zqyph3Ul6jIpYY8Lk0(01C;k3V=3DQxT3lQl8ykD?z4ySUmF4BBWb(@|zSu%0C%^gZ zGYZem&PKwJS8#fI`qNK8b+;7O!W;sTtCudvlhd!f_Re2?|EBN$_?933;Cn~jc{>zh zFqs<$s~g9Scdt?5sMs{7u=p7(Dtf=(2o4Tj>4c!Rr-vT zHcjm;47-?qyA?b=Du+NI3al!X6QGIUYFA<0J_H<-SZE3`Y^N+#hFDa0rma$kTbxyK zFH8klnaN9LtKzt*sVs3vdGgM3k(EVYk0NA3TzA=KssqKbeO7)?aYPXX8B9^sg=?qS zon^6mZJ*TxCm^x7>{k`Z`^%^9uSi;mi{wKUiYRDdFp{7bto3Bo)U#)2Uo@Y<=g*p< z>GaGKr=|~`qzZ7Qtyz?Lrh58uAWiOn$wMcERfnt*;ObCC;(@X#&DwXg$c)2d&s0x6 zTRrofd;*hCpGv-T#==+B&AwGT^JbkQVJO&o<3ed$sEL5m{}@!A}9l*ILI{8-~~PwWy($HWYn}65cKbTk8;Am`|YXw(2*He*>@w;SN*Ze6VXc}q0N5( zdb{o2f{tXNvfvGL)a4a#bWX1KL2+_y+obSdKn9!<|Hi0&@Rzy@HDOk)#u3?$fUEO; z%u#4mqb*F#dineSV3Ru8i7c`jie}N1s_FuM1e|r+j+Hs99a-sfeJl}VmA=pmbXk;+ zG2vyqoE}*pnYLu$8d*8lmxWhPcZphQ^Hit4?_ANoP}aUs-o8}XC6?1Sj{DP$M=pXg zm+6~S7i^bT1-A-ZQpW071g(}JVAY$c{IE> z8d@I@Z%pdDQj}TuMZhOH2MWLdEercDOPB0y>-H^RGWC7oTp7Jon+mONBiC*&*^aJ3 zpbacXTr#6UI9Ek1$;&ZAroFKL8Gw;rbpx&L5Tusc%s*{*ephC(k zJ$*Gfb=7QEwnb`6!6#S~@QE{B(_KJ@EQ?E#v>jH)s5xVr1bkH)Kud$vz<^clVS|Ef zoQ?x64Z=+;SR$8}2`M>eOJ}6gel5hIl&kWM9BMgnmnPaO7M{Aq&(I2!P|QOT;c10^ zk6CQMXmT~2$cAF+U?lAeEqa3slfK#Eu|#{9$m-ifumGz#(&_Z%pfH#gC$BpC9a^%R$8yIn96`N1Q6&rAV zE=N}GOTpKZl`~Q~tlBz%2etUdapU;c9FDIz{`U93o0?mCvAFT4FE;<;?J@hZaPEUw z_HCJ@ni&c-Dsjjpqt@<{ z=&mA5msmt~ZaJSo?Z|R2g0Wq40*ve}jmq{_6x&-A+gD%Q{j{UDavuO2&g)=kHpP6~#tO5_drH~c#$U7HphgHMuv8Khs zmc`Px#nRTrvi9`p?sRoe`dt6=g@NU>{h2ep+GW%)YU`K_9d6$aRxCl0Ot%~YWwX-9paSw(lL;#TU&$>Etn$PV!zxrs6vWwgW3%tY zfvedoFjaKs-3T)ME~+ObM}wE(g!akhwlT0uE_Pj>)xn^4XN?3wH8k?gNh#lIb`oX_ zZ%%|aWr~SxqO6aEHefB#uHU=SJGoBX4(+^JX&TMKKXpvGH{EETz&hWP75{WC8DA}( z?n$5QS~_9hBL;ZR^cs)#WorAJfCsgc^Og+-C*zo{c=lBXh#o&i*dz;%&)j6Kk zH^eM*SpObpm~Kp}l)ctR#A zeSCQ=qz{EDf}($I)V{4eYH!PM(7vhVUmFYao@j(#_c32HWK9M|Q;c>Zw2pX!B-AWz zYP7;aKue$f)t7(uf#6F)`+Ak|MxwOrS_)BUXF1(n(dUM9WFl7KC4`!USTovjWY(%H z(=%6-;1dE+nFnA@?tfSG=K#)AR}~~31hV~L;FFAFNwd)@cA`G6B^#X?l3{}=+ioGtZLL!OfVARM;W-F1^&{({^YvS8`13Iz_27_0x zUIn67ve~Ib;-e2g1eO3QXOFsizctUJo67`d}7dRLh?ZrxKZ^Os5N z9xzF^teA_CVKfyzSR$snv)rO+lp)c(%2g48+zys1^PaNUePxQ1@#u-f!{RGNAbiL* zbu#(H>8aVVA)VM3!HlshlqnKWe&s;UL)z!%K)v)=Sp_roO zqdmhF9g~nomR?%Nm;1b{Ihu0ji`XS^j59fxCL#)hAq$2Sda2`7p9lgBig$;m4vY;k zD!;&hQPIsnj6;xeVrO1IG>zL7znWVtWKHpleXRTvA+di7xeZr2A~HZy?~sr7N4dLh49XWl!Dg~SR~zGOfE#xV+YKZWxrY1~sqf z6xc>WUoM8MVpD6;9@c64UH}?EPV9QN5A{s@4n#Be=NVD@ZbO4-@W_pdvE6z z{D<%V_}_o`ul~z_{`bd^9h;n-Oy6(?ym8z(ZXAE6BS%)+XXVIBu>r3mtFLWVoMp30 zUCw3|X&rIaDn$FNOeMZ?+&KO`$M3%Ud@`2$@lzLm_S&F6@vN^2>zl&*q*Y#E`|;p* zZMX``A@F#>eJR+*Qs1pO=@#El`=fIEtacVgcGyR&B=!Yih|6(Q4xGeV5zfdS>YAx) zr*>pX#7nYViL%sGQDhH{R2tg@m|69`#bPILP9=qQ>U3WbaFuiaGZ+)I?RKHtsZtc% zT^QLXLm5;Sy`w|~b$3}(4umCCj3|sdh*cUrSeoGO9V$cGf?kv-?kSV8>!5adiL3-; zWzhqrYUeuufFrEeOwAZh*+e1&dcp% z`g9f4)H%M=Ii7)_+Qt;jLz}xs^jR={ziVWuOe><#a4`#gkE?wm+c~k^Wx{L2touAG z1GF%qMu4t9Acmf-C8L~+mcjVu7k zVxY$y)NLvx;5ELItt??-(5aH6EXDm(jx1WvSJ1wHWug#&f;6hAj2nQF&*jL>rHEV* zb122FYXvkaT2p~3)yj#uiz>o1${?`+Zg%D=RBgQ&X#JYtYn(@4vq|H9_ZH8t}8*rv9QKe^)n$&UY@ufxB7 z0DoEw|NSOT%Z{v^H()$Amxw#E%3M!YTV|`}w8B?7gOwvIXSupTRyU46=kfcmzKkub z{p6`LH@`Nx^O$$%ahOVGEBjcm-^j{78GJmjJuk59c-Txyxyb3TkbR=$;lpzB1m-$21q;FRRx35rWvWC@&+u9>yiS9>`pR0?JkY)ELJpjnW0Kz zdxco~g0O1IeiadJSxiDMxw|LVxM+$r3}y-C>@SYr0Vb6v?dBMIr%orIJehc=I{EUsnU~K_zjA)&?ThpIP1;XY+AdvR+k0$RRdr9=wg9D0 zAe}PKpzBkntbL)RZ4nFry3Y0~#zSp?y50r;9$Ky&%GC8|&-Z4|^rX-9WdMvS!wj0b z(3fr*U2$a9?NPk%9(|owQ3OR+7Ryd1EWZpdsK}_r-UynXm?|=Db}D%>Dd?Hoe-cFb zOI{URB`*15GDeMsOwl**HFRZ)Q9xfqio;QYD^KjQ_%_opztZ+#SCAHg% zbWy7S>}1IS#9HvG%tzX_C0rTut&MosMt$r0nlNdF#W%Z< z*^6Z6vabo}BDTBCpc#?mnW@-=idg8eP$Dpu>}jj?tM4ES^K7%+NY=(FYawqJFv%h} zC{$y{qNk_;XP~PEL>#4JrUT*{1IdgqWrfQPzISrDe_~lqA<c_KdHfmxyRbdz_qcDQHZkm=jLqTPQ0N2}S9U zaf#Q`*opU3-yOEXkd;}?#7oXlW)>>SgI>lwH0}WDdd{IQXR4B@HM1j$h0IFk_CXm0 zs+N;2MiP1@H>3IySqoE}0xDUn+~wC~Mayd3YEi&73y;NSF6m>zg2`)SmDn_Iz-%Cz z3Wn2uk=48}FgrSt==lb+Nb5Q151PgsB_`2^|Wfm7!{t2?mxF8l^la=5q zd&6dR-{^9dUhQ53#jryEPdE&dwx)#3_c!`e_(!KcR@&g zfCUkdNwFv_d(;biFojrJ7-Hj2Ye8eWoPVToC;T#P~6zO~y-VWiC=kW1H8Sn=G8ARqY( z?k`R3Esg9ejqS52g2325gDz*zcV&Yi8c4oh@iuK&L;^os#>R z!c?T7g>!xB>b^8YBu?l`S9YYz+82vjQt&`g>wIy`5*q*6zO+JF^rp`BrfLQn^nMlG)W&&y6lg^Lh?QHM&%+X$Et+NSln$u zOY}7fM`;I_kZB^iF^)vEm1rWY;1***S7bxB3x%XpYz8$Ip~?nT0JhQKCUnv5g%4Lz z`s)WWiV8Tg+BCeX2p0Wv@MAG6I~L2@mRP8Q=EdWU^T!((NEEfqm&)IdHB`E=d7+>Q zvVy^u~y>*!c$v zoD{%AxV6$O!xS_HQ?0-u0GQ#5Y;JXf@UV+~sE5@!r2JMDR=7g3mVHv$d<7N$k#iR! z>(Cmw((hRv@<2!HgC2ccSV7zMq2bjbx$~{cqYnwLjs`c#F~gCSfu?*iB|%d>T-l~P zYn_t-m14xVjIA^>LL04SG`L(3MCrTF+4I`2ma5Tw<%-E=oe)cL?G3c_6fO>?n?^Ft z`X-nl6T<8qmqm;A&7ikTk5Dna5BpY!CRfLN!m6?G+C*f1A_82k*)Fd&+l6I&u@utX zc?Qa&<&6PaITIGR1F{SCqs7VOqkjA1@2zB5b#4(Q{&=xF-*?=gSp@1J*(l%qWmz@o5tIC$- zD(ZvC8kk`iwE#u#T7&wD<$Ax4tYprj+1TtAnduZE@UnnvY9o$Jug8+>79KDgjHN@7 zj712X_XcK1CLyaye<1kn$qMyretv#tX6C~WKZKq#>9o)5g|Z;4&p!Qher^teA^}`| z_2n0ESHSOIr_So?`|rLh`_<@Z&>#5lgAX99u?f#pzkKt5|L$Mk^jCj*wz|5%zdxBw z{;_1mU{K3)7vK7z7jWXA=?m3A91eGMbO2YZ%)r0^BmYAxBaNUJa!`Q6w0!>jdB5NP zEtm8kA5^5Zy1KfFiHTg+f1iUDV2;4>w^?&WwYa$0+}sRW=d!LlMn*;k2M1{|cm0nJ z&=eq_o`$ujIHyu63d2|E;zL72p-_kdxuXC7cd-8Pc)Yv2n`e>B`ak^ON8Qxa#INa3 zdvE#4M59sOd|r}V*0(t53!dbq;bk6$ldxw2kmd!thUI? zMX)fk(mpHa3h2(+e?(SFXKs+yjpNUHKvv<|)gL`keerZSAu%8&qoxuPt_zvDL~bgk!mbM! z?OpzgWa>*DFDVEz)ZF;?Z4XNc5o?Rh6{`l5pL17!I-h4Vi;6x8FAME zMSfS*!8^;M_Wfeg2@-dg#UH59-YUrIsjB4j3RyAzvc;=-t#0<6`njWx^Z6|cl^shc z^wqMN$kXpkZ~FW|7CGB5i_=N%_DPwU#m;T=RV!AlMG9Q7T~%`YQw+Uy{h*Xxi$$J2 z*Oyhi^1jTO9_KHoaDt5^%dO*Cl)joLA3V3`iPiE_5lZ1 z`nv1PRS+vYeI+vUZg~1C8Y;@G^w*@@b9DujQefaO3ZfuyKwwF{6uG46;XdrvMgaAEbbH%uV_P;9u|+! zzSqoiwO+=^y>G?z(tPAz+;mX6FGOYXcM$UYp!v}fpn*BW5$Q-9nv$qT(*8t z5j!sQrI;gAKHuZ^?}@T%nTtt{5hgQj;_VvEwkQ(ga?5C@Wh~P+&Uv|gEMt4gRv5XQ z11Hx;{Hx<(GpvPVWV5t|#0UXe5?D*o2o)G(&1L>y`p_KvocxHfR|LiJdlN ztx|YHw^z!<_{ywXmjzu)%gqn0vS5G?&uCfU4P~lQqj51(|GVvHQ2%8m(4w_Rk z7Q1@o%I|;oyS3FEopVs7Zy$$qn>S;#U7I#<_Ga6*vDr2^xA~+~ZMJQ@%{I4spWpjO zGiREqne+Vd-1irs>*CB?f|v9KvV=f)$5S9zj34#CyB3I%WvU=}YW$}g(=zYC5k;mH zgh_(hLg-7*qrmm$`Hiw=&e(?l-J z$j<&JDs~M>6Y>On9st0U_)gKk|3WB$_(p`UW$oh#@5`5>9x?JjzY#|F^HsN#dAfre zCXM?q@a;Y10ClRitnA3Z;q^r{T&Md#@N9o1=I@UI{c8P=sLd|lS9k8)7q=pEXurR) z-}JqYso)D+zIIcyj;!D|~#CWILdpyuQA6aQL$u zDe4M{C@t;mHoVL6kh?fHqW~F1jzRL+p1qsfJpe)E<>w!d-+j9N>*eJom=|x5&2Xha z%+Y98j~HI^w@wSmI5Agk{@%=@-r1bt(`Zj>5#6NDW`OQyM5`ZgGbGCMeaK8)7>y^X zc{#4^Sc{K!_`bUmMk|%?0iRMFfb&k|CFQtuy?wE}J=wcGSxA~74hS2vjIoL^vISPz+@U;1$%mADI#l*Ca2rEABBHThYDb_rOs7E$ zqqtpZk#iBsXD{y4-x={`yZ%D00aiv*gI|r7)*iycC=fWSIv5*z7=N}yx^*=5L)Fbl z1ZLfg#L^gUxz>Ly)fyO?*6?BkKx(vN83W1jvM9kcwcoy49;t)6SC2kpCLZa|ao-h* zeVPG!$jH;JnhFcR3Mn=}SXj+mvN4a-2X=+E`8T;WX2FhNcD036cXYaK63^r8aTY{U zKd{TS*lTa3Jgf$-wHB?zuNq6eGD`zS4|>7<*Ls|3a<@srH_ClX4=F6~JDXjDo7nyinvahHSg2WVJYM)lT3Y_B2b%p}adg@_(_5u4Q4*M8jD6d;}$Q~IO|5}V}dmCfc}1!?vrxV z7WLc!Nh`QcGVcjG@^iK+8@bcU6pu%`k24#M`S=geAMN2bzS9D2J zBm!kaUm0tL^oRlcM(_`CWTcL#I}k05yWVFe9YvC?a#sM|$uUv@lSKKo#$ttVtJiG& zIO?=>=!r1_;`4Xw#3PDHwxU?`tT3vHqKCj5^kp4QT7U7+IUZJ|dfzgtLqRVb6So4g z?l@*W+NO(l^fHKe)B!N#$VlatkYmc}i8b4nt+EDhqwYV<@zu8WPVz0hG*M$KMIlFO z8ExAgZmbAVs_@LJYAqAi{VtilAspWg)^@d~?uvwECO53ZLZ~X}9_%sFT+GwI@V*F(+Z%cO20# znyN;~J~C5wqbqc@~&4r>eH#fI#W~Omr!Ihp-TcJyKBsGd2nE!b_bva zIlcMkem?J~S5{OIYV8v=QfREi>8262fW9Y;B#wb8((lpY*E?(^nIGfFr}T9BbPt;N zo!!nHdH#X2>8AFZbuJuX*MV>7zUTb0lh|e<$$Uye+~TuDWGbTGwBi0G9$I2`^dAkH z$5^UUc-!9b?SaFaQ~!o@_}I>{-dYcpE{xU;i|Ib1qhqwczP{&9sKMKbMmsihxW>`m zNb)vL4M|tO31EE?{JH$Lt6SxNlfUa`ni?}?o`jH?x@N)oz3I$WT}Lo5KLyj`kFzEK zDExQ(f2v7K+?MaNm!~fx2d#2`Dg|L$^pM{Q5u( zDNNyTMv);#ZNl?vD&E7eKUyyOI4#r5tUjX>jul@egerwt;`y-G%ZRPn*L5=)`dA=h zBi&qV9_#;r*b34*B((H|^BvKKm9aX-bvsu^SjGKx{xy5eDx*~P%k8FdEq!|)WCDU> z;uVPk{{Ie}i%Ka?)owgFw=(ko5^?1f z{YVx`HQB%X8qFVo70#to^R4P%43^roR(g!Kxhyt%+#6O-=hO2_HLv$Z>$j`CRA62+ z`uCCQ;v25vsNP$eRa|Vu8rim5!boY`XmkSpR&L`8rYLUOR4&ij!A25NY}2 zb(_R~XWFbZu{38>PU6cmCEM=rqvoN!aTsB~nYW4fOp9b8-+3r9zz^10p1ms_q&b0nD9S^Gy=WCZ; zAMcnn^3$K#gTRK+QJfqc`G5U@=_X)>={U^wDJdzzLz5x)uu3?7e0U%RZnmi!`j8#X zvcY%vfXH!{v|)O2Q34eU9WiwJSrHNvp;dx{k&*H4^^F-*09;fQyjc((6&2;kZR_&# zB2;g>OdD6$5>s1Q84cME7f|=q) zCWVUOMg}alRx-fdW5!2FHqHWycGSQOg6Q~{u@iyoe$0lesRT7&UjdbXjso=)E-o&? zyJ=BQPR{!JdgNaV=K7xrrhWE?6M=2fx`qZ0j7V1WmtDxOc-v{rnnsUFjMNV z@n3@pcn?5>0<#nr4kBlk<+(-Bma@k%VF|(8^ksclqmR)O?D~y|X9UJ8nx27yPQoaw zScsq40)f@zc{Q%RRY5Zt{FdF|u9Xx0qyF3|A|p$Yt!(&CPj5xw$Q% ztO4HjfckVttG+!ZdC^lzOO#q)Uw@J%(OheUh|e7W8XksO2AigO1|d(afQF4w6!HWo z*1hEZ1zCnjUfw=e=e>UyEVDGlCLB4h&vH{*vapy%x*Y>xR=pL80C{cFxw!juDM*ua z($?+&{ahE~uGgFB>Gd0+pX+v8<89B!@BUgBdG3|Wcgw#P=iRu5*bM04Q)?zP+7RE` z?u{y^tN(4wlc_s;NLwmM;}HgdyE6#+@R!e+xem}_wNSe$G7>FvW}#{c3%l9#e<r#um5bUtS zuW5NayIQ3N-ujT3<}2tZh|N-_ua&;wuTH-sZmGRV%-9t@l^GSlC?H;Gmfk{Y=`R~9nE6A3pV%Tu>m%Hx6&yO zQJFnPbq^-xm~gie3xw86oGQqX+W|WlDkhgyJJ;VAo)J+<3O2~Ico{d8rs%V;2|>-- zuyXDN1+Jo#gfMueIs-~jCiP;GSpihVD0$9?6o2YI6SUNZ;P<0rrSDc|J4ri0Jr9bs zv|2MYi88K1fc5)m5^D4h7$@n3mjcA^YdJLCoM;zVGpu&a<_6g%?T-f&UB{#dnokI) zT;)yMXzDwXSNx_%6AaieG{pyl233u|E{IvWVNA1)r7FbxZIGnrsF-5!J5S*1qu~kj z#Es_kokqagr3cFLsKR8AbD0gemb=&r7=CHO+L{{eQ}xTNr!CP@MG(>Y8vczZYZZf{ z+CKqWI8fPXr5uZ0G_MW}yvBqv##3vE06Am|h8ll+Tk`9nLAX63G|?6< zP2GRzhj}$sAQ|S_sF=X(Lw)Iv?@^O!*kjH;L15eWa`2H&Eo-eZR{bGSu+5rg%RPL4|6%|p(`3nUn1%paq za;g#yAAsy;?g>W=xIF7vCLaX>7+1Cz^3@N3y^)!h7mpaR`8=Zj2n9t>e&v zJqSHTO-)VvFia88|9V#MNYFTqb)4u#%;0Pc-Dz zOlATb_dsIIuLr}UDJL$p0S=#;g06xg2ckHTrqNJl$2%yq2U21CeOvD+maqA_b-kKgGpO~h6xVNy=~@rQmq$lOJxvu?NXQw8zfFavhi5Z^cUwNLO|kLtAB5EF zj%?W=wTf*kQ-`gs(7~&6#ay$pDeJ@LT=mCe!_E(IS{vN&ZA9dinfoLHPA8=`t{Z-y zroho*2OJ&QI@@*9_#iCS=`Mz?rnc#(N}+;f4VV5f6N)RDFt?$&y|VRYQ{(3B|A)n+PpC@V`y`x#Vbp4U`7ZfuEs z?!YwduoM`>hJ3|92sJ0XhBfiAFvk>N+KYl&JF>4pSrTuYIve`scO5Th-xXNF+BAJ=^6!D9xRXuZoUD@R(*XDSY|2asyi=!UUoUB1>?$g1{F?H z?)39c+cGjOD_*n?*zB~Ydb8f?!YTH?rdDSCmCIX2WTE)ele836k1dp;gK&AyIx2TV zezh`*aL8rjwvBWth+`0(RwQ)f{=K_6v@hmnJ9%;qtY+g- z zwJ5FlBKP%A7}*m&EF>4Ia^g+9b3^+)cf&kKiZ#CcoFO0b_r&weaa3Bt*PDC~ujMW_ zLQVYZnwT)s=Y_g}$?gTQfZJ75%hYd>Szt}v%3Ru--By~03eBJ}&D;!O+~WkX%y!$~ zeUyviX#->R%y^iJfz~z$@1=4D=?G7hC51n2e{f*yz*_}f-$NwHMuT;cE|NmV!~#f~ zX^nMSdcTq-2lf7vj%u5Hn+mG0wC65JVpGs_VM(cDaH1=@B(#+%{Z=RqU2BC8styfk z(l6l(ENdP-=6){nA<6=(tQ3V8|0^af?k~O}c4*F;^6yx|UuFsU;HCV0 ztBXV}NnTb~cBX(LQHnmbkeA(UU|kq#91FP!7brnGI5;?1J(iFvh4IzH^zqKsS;mpT ztw4B%mK_jmX0`HpT$si&;u3t%dMhM4YPM`J4Z@`DDck1v&W|`Q`aFkfK@XORN$Y8Q zsQI2DNC8h{2(2C;YTQDLhRH^`3XmQlFolWWrSg$-drjg6B*qw*fC}SpUS_5d1iuzB zZO$y#-9QC+`{+e3^ILMy9MZU`^meRLPn0~T2L+juvU0CV$&Xn(J39`MzZ@dcX%U-r zgXDAQnv>37xjyxv1l<0yTg&GRLpkf=Va|pBIbc0k?p7FFs_<8JkM5SyQ(A~EA(CVg zKnOT|VgX=!u%4siiN>Vxw`Ms7S_hN#Gd@N}WHr;Xv&y_VC7d|1O98UPpQnP-552*K zaxO0HvOicDVX>p5qmQXP*7TVIVBVd&P_HuRnhic9^|C|^$p}&aU8@*8h_M0a8}AMd zd7JSR14NgdH`5S)r$He-?SL9hLO;v)4poZ=eo60A*i9pxaLFl^A{BjlZNpG6363$7 z7mH!~^tP4}U_1-lioUUO93jB{8J5|qZ;bkXVoNEqa&e6kq^!b~Wb|DmJx{J1;}M^%-7WUH^D~1= z|5Z!UVoPty^S`i`-L&W4v=(J7SJr$Lj(zv{Y&I57B*EN@FF@?Ka*_+p%uRw_qD^fc zrX_hH0A~X!U)=Zm^U5D3ujt0uk@Y|}rY;t`iP^Eh%0DxzuNgu0Xc;wnT^6wYY@OO9 z2vu<~8q?lA#J;Z!Emonwmqt5ed^FBn8p!I=`bjHM@JV{NlbPvC6y^x*>BIuh&{{sh zNLaFwYStnSunUFfidCXkdyAgF{9z0&mUeiWa6OPM6ZQ_gvvlFE<=rzdDa*mxCv3IE zllzwOP0#LQ7PbUU<(_dg1?H0*w3IPDF{I5WwqsixAFvCtau7(~eO%3bJhf>GUuz=o zM89k{9o)=WV=;tzmJOdLrkiuCrss{=&`s6r5|R_8ZB8}eQvAaOLQVK~{d#aEXz)3x z|%l_`6|GMBP6WKFhPBpA+O(fqK_nUW+eFJl4Gg7V# z9;A(*tqWNf_HV2x5Ie(~vX=L3$%YF@llYb;9$q~ma(mQN6J*95G^nwYI+DN^s$3XGvAwrFpuo9}}R zIU)F_eL2OIiFRTIQ7S~|&-c;x_l72!9(v@mVU8LRP7GIfR;go>-OL~uW#arSEe+S6 zayPrIte~3lF9~AK6udzAdPSAL`&c&em|^623<0)UQdGG9;-z_w$ zQ271~6Ii~!zc7}LInuuoPW(~x{ol&RKVTLA;cRnbV}%a+^^E11Ha0d9uj{9c zLh9omGPvCginI>N#V0-TdC<;qB>QClNArW`ZoW9Q z12Bw;B*Y(q*@_eYUA-rD2x@<=0+oQG=*%yrX@{;i_q!){i%D*H9*uD#jv%-g@>6f4 zJ8vwmEhrzjtfiMT0;1<_AM!85flhE`mEa8=2C>iOoB7KJ4 zAWB#%c4z8I&*>R2UVijhe$K`0o|M$oufiq3yPBdonoFzlmqTZ!{`9ey`zHCp#Zk0J z%;TtA|IRR?M3C)qimd)TAj2a}2w<>GNG+AbnG@jFj4N<=b-hXhXN+T&ZR7T}p072b z$vOM8K%84fDWRaE5(5Gzzm1pXV0X_q%VbWYvMVl!?R!TNahy!6n^naOS>F8}X9S|_ zFyOG63lGibtMKF})~DR`$`xec-y590w!fl<6o>0(38MS?v=c5DxD;IC$>B(?VieEd>kdM|bbl!@upxpzhq>d_|by#B2D`B(%-y z!tLta?p)*0&SiuEY`Di&FAYc@vfJk5VoQJv^?PTrll(93`QM-%s5T@kp5{{Sh8oJ| zCR$7TaI#hOAJ~B|^J?{N(dESJqA#9?8jvDJiYR-*6AhxaB&0OWh!-U|^QKIFwqV7X zA_?M611Oo$$FIma((JG(sr~PT!$bo;e6pe*XX0fQudKfaXFpLens=-ZI;}@xePfeb zK>JM)rhL$unkIp&eaDh}DXlj4Xd7uA>t1QSlA6G_X=W+JCwV ztrtogY<%yX_R7B^{4whJc@q6rh|lB?)nG4zW&q^jXz?2>7{e3#6f0R2SEyJM7NbHg zLt0p~c*@A`Nz^<(%1$}7O}Pe|p=?!=kSSlfNXMtjX|>?@X9n}Ih=^t+y`SA(v!@g8 zKbV_hOMgi!8wUXB1x7ADbKg!Dw?96|u2UjvkL1zrP_@Fm7F6yCEIAjs9%Ql4g2 z`J@{-I#J&aVOC|`)1!&HncrC*Y8~n#hJ#-#5a;?vs@eF7Wbtl9lQNxONIaXu8p_#_ zsgJ45yw1;1$(Frgp3x+Q|0P7amp-$0n-&M2GT1#!QmdHiH$IucYjaG5sz+oJi0qlk zY$zW@%}QEPmy6G8pcVlSlK{_7%tv@aHj_QG&-RA$60^vkZsKJ8mnXu`YfDGgwz*H1i?omFxWd z5cPJjWtFGM*!ytQx8b$M-FVP*Uu6pfwuH(Ow@iBHr}VfQXDg3mZutJBOxhM4xCAU! zy-%jFi{r`DY6YAN81@Ja>b^=#P~_T35vPbvaYsdJD!;Cq3qQ!}=t2ey_i# z7S%Pfe(5}JzD{?&PHla#eB8GI?dBiHVImy1N_Jc1jqD?t!{tG(;ev5gy~WY4Cpvr^kY;!$U@4 zqu0lf7;urSXJKUgtumT0vJE^0&=(Xo2<9GaeYjPlNKf$|1gX?-v0egC+rb=A6TDz! zBEam5FENP(UCk=2FRxzS)s>f6ugL#{7}58u4Rh0Qlu;Mrhj*_l>#j@e( z(G)W25(UB2!M^=Nz8v6GbSp*Pjo?4N9pv|}^NV*M4q)kka4gY)`ErE_tEfK1@PXzA!XLN2#;x&|I z#{=cImH>vGWCC<8SlU`iF|2%C@lOp<=J-e#;~sBt{d&)Z6r`hYIFL=2K%+M8(=_j@ zMqvOB4|~>1BXXtc@@xULkcQHcAp%Bck*1@Yf!3ZP;L#f$E|6I%Cq~y2CrQ&W+?yFa z`U~(*rn2KYT&dq*o=x=yEPo4dWk+Y3%jj4bmHv&bmt>hFw9oLZcRyLUyH%dH@vr7)-H4EVt;YF+|%@7-9kPqhl=)Q0#i6vasB zk}}B`c;U>7S9#)x=L7D1G{OQar%#%LP(X2E-(zLiX@NYq?FbS205cewn9BQ^%k0##NW@SVB=ir$j zn$|(7u(z?`_kF)D=Xj466Y^LLmK=Q?>>i1}Y2&$wW~H>sYS`{baXy3;us2aYUF1r# z-R=VYRf)y5?bI$$TA|Ah)_|sd5s}7eKPOIw<*&dR`qe|3EHAmB&BBAsplHK|b-w$# z%XxXC%23dD<=)IH9kBpfwU8sM-V_d}{O!@$83G&JYRI%@GBIcSMW{8ge^>=ASm&x`|+6KN%zMdp|2Ph~PZ=5f7i1h%gDZH1kTN z7Fmg$2Gc-IvH0|kDIzXk##cXus4Yni<`3iUROvYJphm@{G{e{i6l2c{n-mz@Qh;*g z6H;R|;Kbwd)q@Yd9;r~ERw9=*BUk!r*T$vf$x0q4{=DDs4=Y%-g@^;Cl-Q8z8Vh7= zq6|SYJz0xl;Hpa}NvNx&@3JYcY*rlK1EiBI-Eh#ZijC4pg{}IvEq5!7*7Lu56HI?Z zt%AFJPhsJseFNY7h0z=E)Ty}J3!pOsmd%6XzrRG(zlQyn_z4$L#PKGxk~E-<+r$1h z@yGY$@#Fa8xgPLHpJiIB7LTPf`vMC_N7fv&3rvGg7N|f?Bd1OqVc9_283$4>$Ev6( zDh~{VL=-}wC&0(wss4*|;0#OxK5o*xej9My`&_hyb9f)#n}&vYoGpJP2%n}EdX>Kw z-FGt$4T^q<1V_IN8{2Pn5@F||=W;ti35nnrQ=~}UiO49Y!?lS2jq{>KyWOL9C(_E{ zauAY`)e8%c`Zq0#R)E7^qpLJWWF&&fZoUXfTZo&VcyrhLlc*~;E^ZbnA+r+rlR8vg zHY7>)7|Kk!Lc1cDTT*VtAV?+&Sx8BBxo~-{Z+OSR^Dsw54)9azw@T|Yygc2aB@nJG zL03;bc9H&yn7J>p_@NM|S?Y`MSi7@? zYL8a_+nC}GA)jO=rP4NW2X+FsQJ#U>jPw5CVSQMN=^noz0SvOIwc^%)by*oiE?M3Z zM7BHHH6Z>gB$AjUXO-I23=20`z?KmC#rX7XILe}jVTgj3g~h_oYvKs&cet()FBa^b1J$>W2=hfR#Xjub#dk9-l4j7h5oo>dq>MeZap2 zu>S*doPOR99QGWKqmj^k95dLhZQ?Jxds?pX^#K;CGj6s&dV+x_eDQJT+;9f5qUvk6 z{J^BYE&lZZ3&tH6PYYX!J8&cPJqNXEZv$Q()*TDZ9Vg6Pd3;zh0=5_n?r{&^gJC>> zT(SC}euWJZ4hq}@wuo*DTDL4}<~Flwd^=2PR~ue}3e&KRJAIVWvaMoU!@aB`yrf=o zcP8osD24}7etPe;;5H(NoUAo@#Ku7BDsJ|Qh-!zAsvx+ScS{YU zvxehFu~<%RRZ|V$7sU2rDZW>SITJqG7oQy==*0GLSAOK8c8xpLZy=B-w7}fVt+C9V z9v`;Bsx!}_G0pAr+wUYci&F01{e1ox#KLp`7hDX71#0OowPb$X@5x&cC4#=c?O&=^ zt=Oz6FAGm_MqVI)O-Rk8*O_&;excuPcl_hC^Yc;UM~xhzMJuknTk8>$ODW%>g2#B? zg>KnJ;rPE6`%l)y#F#(aqVPv`4oBAxAmFy6aG3ANr&oauK6Z2Jf(8Ux}h}aLS$s9@?*x0wHVqn0!h3_wn z1dxTX9JKw2bsfCK^Mk*H9o(nWi4Yjk;D1{{n-p;vcc)SCYBf-D$V>JG?n4@+J@5^& zvj$uCNEMk`miq#OZ`X1&ZnY&E(~66%nv;ymi;TbHSs5yMi&v_Lx^9R39#gIpdG#)8 zrEHb0!=@XwTw_5xG|O#BhY|DxxfQIgujGK+9ax61Q)k<}M&Yt2!YO`oHg-5 zJH$tVdR0%Tx;@HNTdTaS0PYt!+BB~Lzq*~?F{EDf>D?r|gL z3p{CQ6EX^>i7rc)QIc~!;OT+=W#vcB3JdauZ;_@iUPJuH!VYlwS0&*;@i+6(9aj6% zHO$BJh|sPtMm%BFe~kJK_@rVgXi_secn;_RNpsan^*}QRQ~Vorf`l7}vm395j9BC-x%J19lL*E5>iC-~?5sR5} z}>8G2C}4l zIGUUKD82mH`?&Fc>)P;{5=h20xfaVd79!xKIw2h;)Z62I?SnrdLR_rYYuohvi_%c} z=g%MD+&Wa1G!P3HJ@wuR#kE9)@cd88NMvPgZNXZFUaoVuBPwE>$Ibk_*lDMsUS5pao;zxBYA2z|Ojern*fDH+6s#8%vG5jz$e3Waa}uLA@u z8AIY}Bn3Yg&an9{jRC2R*dWv&Gf*9h1NT9jax5{oUpj07EmVu+2qWp>#}mm%(HeW- zC@bG$LNH87m^+fv^e30!5G)W7-PZYPb1a?#Y!ls{-xMRX1WH=&m1pQyd8o)3n44~n zvGy}yC1cH59SLGt(TPcrF47{Jf?C*dJtJF++Ujpy`$1L-BS{Fb1w%#Cb8HIP#ndEt zaBzm$Y)$4rvWiP2hoF&DTiaRZ&4@g6@^Mc#J+^%Bq@>LeSCueI%vAZk!+LZewXS!s z4?x<>$iV)BkmM2zi$Y+}I#6DzmXcr6uwb0_{XR-TP*+uTjJ81B5wed-!;SHXCtS>v z8%A_*1y(e?>hPsyWsz9e2lBZWvmbB2yn>#pzItlTbd3MEA`rZXvZd{a!3d~z*L!*A zJ`vTa|8vhCI0mM5#&n*v?I$4mCeH}D5OXaYoYI1VK!hYf#EaGw^o^gQHQ3)Wv$!NQ zL%eny)^N9-3^^bVVh-|3h%uK4dU$Nika`%Y&(a0^y*yZ{zvFdf%Nu|~@9`P4D4#+^84 z*~!(pjdra5u-U;Q*JH`)a`NY;{3Ot=yCGxPiu;)tRFCU;fMY?D$vQsy^P?Ink5tm* zEn&I3svZN9>c+P=fy-41Jl!SPBt*Bd!H@ub_){?(`|6A2^8||$lcFK6-rnm&MUF1& zQ&YG*;>IQ`XY-JKxl>sT9oEwW&Pz|}8*Jd)b0BnRAYT-e2UgP6CBq%r?@MOX4IPZu zCe=fqQIW?Km`fG}K~)^T2DUpXucOG(D;1ie;lJ2BLkeQUUcbrz&6h8`sLdQI4CxDE z`uzR5YYBAW`WP!7);P;Hq>r~aRcdmh$!hc>y1d9Bb&0Am#fZv(@#^ONY?F77?@JTZ z<%13G(EF87p074f38J^nrnkxEor$Xc9xQdre<^G(@*PIQwa>jFjy_S5rk#77_Hw`97UA56rQbIFCK-&?^f0=rXE zWT-Oixu2LsRc_9l3w4gBXMbBo)%PRgl4dI5m%;g(!Gl(e{LPo|93*DHC0-CHG)5L7 z6H6!)6_sCHt4=*BFKJeo(ZU7_F&?%ZGUMqZ79-bDl2@)j+a3}|2h>89@>!q=mEsSBkf^(bWboV*qxgr8 z3kS=SsEK>ztj1hn#}~Ogg2F8+c;*HuGWeD_JqqCavuaND%HFgOn1gg!)kxyaip$PhU*rLa zx5ZxaSdI+ckfRq|0=Uo2hm8Jlu0_c`EhX<>A?9mvhihRtt6{jSk~nMPT1Z5_fY*@7 zB$|jqmgu)64xc10Zy0XP2-HurW;3=w%j~%)zcdN9v9sh*ZVu#1q|m(B`f}$ZXgH&u zJojf!z&6DbX{ni4veeL0+8E;*y0W(W%`gKZ_ztXp5llM@_5+*}X;M-{cq~3g*-=qL zS@kz=3&S|Klr+yX6`#*mOvf?U!h-cF&-w!pcM;8YIGmO^mnks&5yjL+W>P{ zRfZn$JS9e|M@?!dDhB9B&q{Z)$LH(J(FJ=5I>aCjVA*|H_keJ@AX43f(ZhA(a`SEAIM@8iUelHg2lz&=TCrh}*cWMvT~@2$5@)#mM#+MQz{-sh7voT5OJg98qlO z>*Yi7g`BJP7ovI=a9 z!0|lQ{7Eg(5|dUc1ZgfzJ(Vcg$Jh6>yw}AdlAn0$TiPVb@o*vqDKq>ztB0hws?jx3 zXe<0(IBM9*u(jv%mv-}d8EWNv_T%Rj8`EMU^_Se#2d&H%8FZ+9#3OP|%e4g$!T;mC zeh%Swy~TcSx$6s$^7|(;S5a>OG zONw-caK?PI$`t9#h6Di}^)CgcSV~2|iVPggGY!?+p6!A4?RcJdui`fZk(VG{mWe>YkGV-d|ufn0T=q4 zpK5oZb2A3&l3VScB`cZ5nyT}Hz<$2eFE63}Hiv&@vSWd^-NRt$5ntm-yEmd7NnqPa z;&ESNq=z-8!xClOVw6{zPlNr*(}1axN#S(L&1}hUTOug>6=iyD^HH4=BPO0IE3~O` zgn$Y+iRX#gZL+V5QDRD%F9Hc^w9OfcP+a+KSx+;qo=zqhp83MdXRbrz#}AqHdThD* zLu2&4Eoc*dopt_oE~e$cEuOEF63n*Yp_yfGKAkLqeSpI{$DWw1pD~ntLiIKCVt+A2 zC4H_o%@*CS8-bV2C4_F2qLZT*<_C(GQc0E5h78JUsOj`l*>_pLymUCufItLZ*h)*T zAE>lcw*)f(Xf2pigI!~OXTfCz1^h0NjBu;AdDlHW%Z$rBiNm)%`8mW$Nq3x4W1lB5 zC+I=|-mS(l{R4JuZ4c#?OKX(F=DKFo6aX%-*18p?eLR=s=@4o+ntC^uIg{#!1nZ*? zQiM%Oidun)G>9zn*qoHno*YansZ8uN+IK<>QbgP!e+>Y+~R! zObOP`4zRu+ZVqJ>F#+76MbsYf8daTPN2`TK#5WBJc`0S2XJPi=lX&kLAmb|TWuS1B zc{#_jl$fkV_E8uRaX$f^K6Z|iIS#qv=>|VicmB`6P^scXtI4l16Z=62s+7a2-jv1q z&$79S4sUeYoU)O;^yY4CX}svtlOZPimhFTwSWtm6TON^9pa8K2`O;(`n81n&>zvG7 zzsDR8j(RqX@ssnWO#q}!-1OSvvGukO-xVaNRrR;=KGx&?uHfT7{(W!i{cOr6o*0nW zu;s{5VIovmD3>d;YUXBXe>SQ59Bq@Cvpc(6X-;OG>gB5>EQ4cG_uDYjncrQ|&M;G! zI&BGpd3lry!miNKsZ@^9-pOfXlniACod;WLCn=5gbyCHCFHOXZVGm)qAntR9+v%dP z?We_Z{qlr%dyB|0b*OqW9_$Q64XBgo=cPtFheuG9Z4-|F5fFkwoQxI#`44$P?KG4PmTSm;p@A^5R+rYkI7$6@*(m zI;p{M2;~#5=0Kt7((_OFEMJ^wSs?72o$$w<4#g6O*p1Isz7wft1n=JoYKRAI^2M~S ztXeZ@yM@Blkk7yGn?*8yi1Dkq-j?6@ z=&!arr>ERu4b{JI;d(byU-cJUCBsuF5UKN@lvB*mpoWor|LlEdcoZp`NP{Mx%Y)%t z$NZu#YAdSZZ1cJ|iHhy$U?~R@#PPuwS->-pw3e~8ln2>FIatfvFH%~|>O^T~C;0m4 zV5Bt`csaYsDhnVNgvGD`6TF}i#uwXM8kSw**j=FCO>w^x4L!MAt26Uu_ss8} zj|989Qlo4AB$f3Z3J+W01QOP2UPa=I6=B!`Q~Ybb=1CQ+<*y$zRbY13AG@jo?>GM= z>72vk`o1n6+fJj#b{ea(ZQFLz*tXLoO~Z+8+qTWdnHcYUfA9bE%yZ|?J^Svn&R(B2 z%j>RO%t7OFM4Qmx%H2K@a?X>cfO&2`#!{t-)nOkkRYt7|8fo5R&=VKv{5IZaknL`e zhyDZQXvvg*2!M4^PB2M)HBfi10_*c<91y}0djH1WZihGb&?$U!{cML%7S z%M`Y>{!m(~xx!K@j7h)v7sCd-LRBzvp$LiDWb*ZLLeV5w2E zmYs}OYA$Wkg?d(}zmC?wCIGAk{-0$K#_#b3!0^yg%KczB25py(1Ne`7u zYMZL{tuoOq^v8OQ-m(W*`>mx`_gI&C$-J+iyIhA&LFghrJT!+mp)xssq3I@tp7Upx zAW})&QY{z-AZN5rl6ePR>Q_L!8b4lEY7ouf9b&E+89NWqQErI$9RpxuDb#V7rT+Cm z<4;ReBaHP>*WXHX(8(&uN~6+L?T$22&5QJDzlbZt!0;aG5Q#R2Hf8_JOeV#Qm5(r` zUMyuuc2yp#v>;VGHy08wRv0a$<5su36XW+YVRL1xz8fLG1z0s=1!;#N1{qDC$nyQJ zDPwTJkPP!lqQ?M4>{1m7dVZ1peUQ42zq}K-)kuP3_%% zPKFwLFWV3OBNB{dx(14=>?Rl@Bk=x=-*8VnEe8!;n7BJhjtZ4Tu+x5n)7y&tD2*kI z8C+JQ6Do{|i0BE#5h3#2ygeZKdYz(uaWI0>|-QiLM_yjbN z)2NM~OJ7i*>2wBCqZ3Uk&lH%Yj;)CSVux%yVl~k9Rdxe?-<}MJ-aps(a#nO5bc9fb z+O02Fr_4Cx0|G*T=~I|o_KiF3OWqU9Q8_Jgo9%1v6P#Aq{NsKXD5xA~C_@JPEsmZQ zJptk`DA%ap*>(NSuTidd7i&UWemSh22Qkxb7Yp*7YNB?0S1Y;{r0mJU2H8;PCvh*JWmNy9|Sl&00W(|lFV}0AJ-;l41$x$x-p2BJ6+K|Dc5uC{3~vg$Zs@;4-XNYX@4oC5 zZ$7*F4F4hWd!Sih`|k^%(#A)SJC#e?1Sc$q=5Y&qpRSSbWn2`Vd#kCM*do%l)zLnV z*Nxss3^1>VuW(2#bDUN%M#W9tR#iEhHFHq6G-K3LdsLL-kJ-1I>C*3ci4f_IQo|2= zwqRzD(2}D5Sl{4jtD$e}`Q>8R!i(`|#Z9q%VfxSjY8{hr14C_XmUsevpF*=j%jor1g|H0cWA&W&ta zB60*~v{}sMr#0zwco=YjBu_5VPp@WojtzxChp|VksNEPMnjpy4`~KF*v#8?;BNGZu z=RtKsRmEPJgYzu)wGxr@oV8*cD;O1;8Ssz#bIU}1oqKYPkFp2t7)Z(815Gin9 zJBTXsnXjrbuV6?6F^Wl8s-BS?KNB9{ELB`$%pEHeS5#p4VT9wN&X*{-Ddb(I`Ahu; zJpZ8VIllQ>;eAZFamb@_u!UXN{+2OXeu(SG5ErLNxhX-m>4meStetI4dy%Tj4D657 zMas)Fvq8*XyclmC$u}(_egIKFz(CRV;@szA-KU#=z_)DJ9veco${_{wbE#_SuC=ne z@y|ZF1*LG}rg)2WMs1ax^OAE~LFygB^eemxw}hkiVVBEvxecv$_gK@Cf#iZBSB3@a zIjji;^SAZyO(&>5 ziO7YPaP|6Y<&3>_%8eiz|6ax}#HNf_=Q^3t-b!It9vB-|nBqK{(1vhu^`6;bS6 zFPr)#Cy)9{u9A6hh98Q8|psl+w9J>seI9mPCvCqJ*z7q?}9# zuUgF}!=|@fs>%fXUCyyb&jWE36`1Xh`B^_ulaR;@oUJU|mU>779#pzY*D(N7dcOJ}ozV8m*rwD#{JQz~p8;PSWK} zg%9lc3ZnW&57e8~tzlA+iY6{b3_K)-&a2eHwbgIfm0DV2rT|V1b-(gI-?IbWVFPaF zWtnmAUJO6(G8(8YFFoGQR7)c*m+mXZq+bj#>B^sTe{P#Hq{(RBZ{}oW1%bc%cEf*o z_QsP4Ip}GzY8?-mB$;>IeRT?R6DPQKayZ<-h-9X{JXIcU1ZHakn6>Z>^@T<%r{&V( zTEI(}NDu`xxl+C~0cFq$PC#bt>x_T`Rt~>QhfKRApjT!q5{qv(8FiW#41) zH9Wly*^@+tA_>JCk)fwxiD26IAvbBdin}$5kmaP#r zB=$Vk?PZm;7IL{axwJQ6dt{bSOKjd2njirs#@JI_NF^6A3-aWlXLN+ugsP~D>k`;G zWR(#!Xz^UAr8(-G`8F*@@UsQr@&jkf=;DxA;0xfdiK-umFx_H_0>@1Km6f4$bm@#0 zJF8yfoQB?;rFqUjE8rFiRL-e+&n@}S-Pt}=wEcUNRGD)CPg8eY&3d?%j#%BP4){}L z9LarnGFVmL6ht+@!B7G^1?8o~p;C%^Bwtk{e6a3GFE3RJ3p3O9@}E&8N`J&Vw(O4$ zhkm;nJ{=CnE9@~iGR?{Uo0Bs%X0w=yk(0fr!>V4)(_A4?ovCi=8=$x^d`)rohnEWF zkt+T{o|qCymGD@6{;FzHaICDA=|C9nfNzn~xA@xEC@9ZPGer(KMklQHRj^Txh0`qE zQ@$(&fE*bWLsBeEktqrQCRv!0Mf)kY3Rvwdhj0m1=JUTnb)t-tgsYt8FH79C8v=P} zbrv0!=c}fwGc~Wn4Ij z>;ZdH+3P_MDOBzq&A8OAXf= zKTyB60-jsGj&}%oe4iILfAg=LU!Db-7trNTh4=5#HI(mrqNewXR|W3~uw1(%-^mJU z>B5&ay*sAh2!HD;qtirXG04+a{}iA%)_D1Cp)r)ADt=(!3%Il96!A7{O4RPs1yv`M z0APjT>;6kmXTSzmzQgBL#Rpe4{`i{{HK-DV!gwQB#Ep|dK!T`7mtL^2UNZwJ*Q z&@Q*E&?n2O;=)2^Q8$bj_|kWI&V!fXFI;6$d?yorps~VerO~vg*r|s3+G3#hS4o}1 zURe?d7S}lCePIDC`HN8)o%~ZvvrmfYjLy@}b*F3KsW5k&#KH5+Dd(;F^0yCCbkkPF z=n~44qK8*N^T^k(;Lgm`^YzY=pH==f?i(cPHR8KT{#RdDcf`{hNd-KAJM#?POGvCl3sd5f9od8WSDvx?*V|3~S+r=oQ*fM0&xit%gAe+xJ$dJE4!G>%Rem5kjPbYTbI9G)ZtThmNB+Au_RDQ1?#%e zuUZD1Y1n!x%S3!tP3>gaVZ;FLfB2kh`IHy%cNTCq08-+1hQIdzSh(qxUn&xZqzl)< zEC3->fFFR@&#~9OvG5@2Q<-}f=NGdGAD6#(BW}hYV4H-FXx%41_G#NB3JJ~&k)GOLZ^BLY+}(}YE-uIkzD;7OOL}RVLS>Y< zGtTK(DN9(Q7VZ>dVj-eF4Whb@pt6z}HEi7uY(wO-PlSo7H25hyZD#UW0{iRlJT$lW z=vD>1JE%`?j;T9uDuU?~?_m(Og_929u{J;dP8d4DAYc-975z;~2BY-0R7y*E`hGS; zkR?18g6MjA&hYZpKXvLsZ&=Rax;Fz^0l=={-W za#q;hkvL~tp4)qH6FyIuT%vW)g)>#JApv)aHDAjuyz4r~dPPn&9D9S2n6?S#<|_Svo84RoF64T53e z_8y6gXU9=Ff6PWNa1oOF`tYT4?OtG>9|@yZcjn7&Y@6udD2+f z+RzhPKYqQ{IO*!xe7e5nuig0QWm@^@_>Fq?$lo|}AJdfw`{YHuec)qP^E4-LCHd&3 zwq6mRa0L|9KJeR1yiO|&0=oABfd!iJFq%YRSZbYslMs=sf}#@oUavo!dJY2a9tVL;n@X$C1*^rVo#ngx^R&covhkR?)T= zQg$|IrzJLXR=i&|-{i%gZa0r!E#Fix*Ahze=`K3Y_>x*%y24GBsf-iwz;JPfs+FTw z3E}8SmLpbIAy-!+R#%`pl%d)=AlTa?Ut0|!Wr`Z<3qTYgkEppXx!GDN>UtUSJxZc_ zNT9ljp|}k%)(NOA5U=gv3oK$*TqmHHc*ZJ#7Ola4Q`c>Ko|nGizE(iJHOm@jvK5K^ zV|*!0)tRxb&u9{HeQCtynewl7wj_L4^I`opR?X@C(Rf}J(fGwb0zb@TpR`rC4pO$# z$ExSX9_Pde4(%z{I8&`i6hy$zVUtH*4@O=w+`H0ft5pn<2;v_l5+1B%X|81nFQp0l zKjTjerdRi>PmPx{wB#+#93{OJ`IzGVS*yoy%}w?KNLLrp*40S#cF?pu8EU&ZTVWCa zSX!zV0hf^h_EiD;`e0nu73$U>tjD5Y5eH_!$DmfHPq_#n8#~025g;2&8S86Az3mJw zq003NKfKGxU26G!TKQaB=`}X0ewU~?zJr`ig9#6V+~-()^A%8P=W)`CX>ueAkt7#! zD~}@tFc`=o?`TsO&d937-W91*? zDBr454&U%?Hx3j1k`Dr>kt$NZc@)9oo4g%H3j8o3mychkW{giAN+Qmc(*2!v8?~58 zZth-ERh_z&R@cUk;<>yxE$5}8pr}CUxqLRo-L(dK1o78sYM*jUX;_vn@Z?3HIB5s2@Ob+h6eWSg4AuXiPm>?xqEGFo`MYOFN zG}U=}eSq(pgr-qvWuH#s6dDMjE2_byq->8<>CPdpSeQ`!H2XP~+YHqN~`VcaH?P%r4dK0orY}joX(G2U1$RJTFRf=)djdZ7d;0iy0|K@IzEg2b6=|iym#9(ULC!>Ps24M9JB3XHBf!uu*ttJHDRg^t7Hv`<{>^-s;H1b0gt=DinqB~u>K+fZoe>$ zMxbHB@lyHWMon1}voeuD2$z!b+Ml$AQ~FF+r>*kt3xlf;6h6%-K(hv_pCxeCQxnzy zE3M#K^t*feOH*IYa#?cDXrcj8=h0F@jv-O!Wm5s)3i5~3!EC}Z>QGthV}k(Q{GLLg*=^j@Z#SMO&wQ`%RUg|pl)JX)w_F}Ci9*Xq zRTmG$mrf)$_rwlQgbuDmcDJ*$pB5{hI8Xj;j8}dXOQF9MQ)Ek{1mY;DU%Jj0yE?|= z1U4?HnwQt5H*Be!*=azx-uVrJIu)asf^j8~(-SFs_^mGtVb6?rITsnGOIeM%#w%cS=+hpStt?YTM>~TI7Xryr$6LPW1MV<{x zDaRDuVdGPV=cBf?+ivK)6A`QUm1fM5{&?^r=;)H)8m`M)ys*8xZF=y@`4zjkeqnzB zY+N+4JlHKun4EQT zvZCPTmhpBnqKOp#vicK1G0R1GN`&wbUuHU!SmQXj!zBmo?TrjjI+QFnu`&{)Rm*Vu zOP1VNtXk{Iy&95NAWXt5xm4%5DoIvzls4^OJhdZ)L0B6KBO!W9xI9u&S1ZH8@r}5? zjDsJCm^c9`L0n>(3`f??jGu#-xJk>@w0X5vfY%~MhuXwLv;R!m`<*AC3@2Ws=F45d74ZFB{BIXMuvu?vLG3N5OR ziURRqu&Luo^64;J&4Pmhw=4)6w2Wk?qoTYRz9B&w>bC54aBaQr&XCAaVmkH!ah?j< z2kWhJa>HVsi4#Uh?KG(y`o*2-DwfWl-ZVcaIR4I9anJ>PUYO*@lH6QEG?QC^Hsu;P z$q@vjGojZvxsrugiv}QjWS}MCB5^Efvyv%MjXlZF=+c{W#(4`P{9p5onD$;38hXpECUSaXj!= z?QJG>mUFJ~>(sXaD90UBKxpb-dow;GAtf zw;fed+vDwk-YX6^iIDFUW<<63{%%X2FzQi6wckD*J_n5eFS}u6r?URay!3?L+o7>e z8w$QC_1&o^<$bA16sIt?jMR#N|KWz>vi}KyoQvQ4Ih-2B@A|B8=hxjRvSK2N-^rM0 zYQP(Se8=y6G)|GI4VYEfBJk@W-7+D$4Y*dwC8YT)WqRk<_j0S^+`sdDRe+i3ZLYk% z!?3a|=0W6gi8L%wOYf=o{58Kv$(u5o2_vc&1`4y?O?i~dO<*9xbptoUP8UhB@lNkKQ-g%;O(qB(U6mqza}So{_rv- zKjWwZ|6(akkWFH^^E_&+rT%rAEs?f--dJ*mTl3@ned!g}fJdS|z&%%nndEH^blqLP z|F+fX1a4$LW(-w7d~TLrBbGVdO^`oqeB9*kO>J{X3>I!ib=+kvmBlSd3^#7@C~JNQ zzUvGy8`%1~bk)B%<=WTS+4@=QB3c8Nn=@KKuZ6awqbf!-gSG8$56h7fzsn69-j?f& z&E_6g`jPBueb{ynlG9D^KdupiSNyX>&U|dY_*zIidtC3kr>EZdI4>_(TO&;0!UZlb zJOk*eHny5QG%vD=?C$~YQ`4Mjqh*WX>NO6Ix?N4c;;N}+4SRck^lSV1?TyWce^f{9 zrORAGbtn;Bg5Aw$bxp_#)k8tRgiehF>f00M<;Ac4rEp0Dd#{J4aLE-8{&$;?0XoC4 zvg*6RSBdlFJcFHwNthqVQm1B0qx@Y3S;`uvIXVWbi|_k5X$DHt$ghYw*#_(Lck}5M z^ApeZzvu7{wsEveK2^t4?p~5UWgkh%R6Kd+076e@^Ex*us}o>Tq$~b*cN< z;9F(>2LczTj6H7fhuf* zI|<-IgKb2OcU+mCM@O;y;)bMjYw~Or8gddM9 zT;-;st^ukSO0sWKl22YciLQ&^+}c!wj7Txm70Y&&_oP@c=;5o#Fc*7j5uobxgxBo_ z8@@T|^FN@^oB;rRK|y&}4j0ed*8O{M&>?4P<$82K8;#@#7q2^k%LID~1usScqB#O>1@_IPlce6fzLVS>bMDb8ZrHaKC55*F+&l>4q;- z?*lv+jX*&kaiu$&XuNy9sIg?rQm@dM`x*R+xZWTf*x?iq5I}>)HvQvIVMs{Gioq{N zB-oEsr%*M1;G$}W=XFUNh&=m#6Cq^gCPuK>0sx#9L=Xqps|4SSj*j|0Z9T;~`W}G3 zx96f7MCw|H=J6K&n%mC*d?@9R#B2w+?$R|8d+i1}f<|{2+d-_uxiJ>~T1l!zidhmo zyg;*W;`dr@$Y#=Vze{>UPh{|mWm<+plHtzgs z`c<6r)1eai94BaUcTjvr_uV*s;@&t_wVJCOeEy8*f;<;%2@=#xd^}3)6ZXI9BS_Ol zcKV@8-@ThQM@W%sBMs;e&{?^g%5&Q5xzEcalA6schvWwlqIk8Gp|P}@@{oz|O&{!> z6$rPR@e9)EOCP@V9y+)nq)A>>BV&rd=rbD2XDL+c=3LPP`(HA_XP38ykC?_gLo0_yQ&SvGq~$ z{=a>UrPsEFm(DD=u_7E*fD@Uz+8B406jq5W_54YE17P2-oMXbegd>M>#)9V@sgw>| zT~IT7D$Vl#WL{btdOnpGr&NtDsU%J z`PDTOX5=-C@TIAb*|7mCu{z0W23&RD(`IrMWF*EWf4OhxdDl!^awpThhCxobsqhVs z&P<%Db_y6Ob7Y=vMowB5wS`G{DBLA$yA8S=O}=0(3?v`Rw0qu5r{U=@6K8s&SF_wp zL>(R_%Pjto!J!US)Ib?eKHF4EPI`}0#eQi!NM0#DJXrv|6e%eF=5{ynaL(qN0hr33Aowna8@h2o~PCHc%^8V5E&Yl_Mxl=koG+QsvXH*;U8K ze?Ct4^%*BD;6K5#&(f8t(Wt;l#PrvXMv!}3sVfQ9-ub99dG_0&KA^5b2JKSvH|&oh zLu07Z;hZSssd=WleT#PYwSeJtw{f@vHdroINa-*`44KRw03Elx5AcB*qNp4{IG2}~ zuXcKR3JQ$9yjD%>xCv2eR$`L1-+!@A$}kuj36)aCk|7sL4bYVL?z_-}ABItNJaTsYfo zwkPOpujey^a-n09#j&Id`t@|V;R*667p82ZuPxZxk@susO)w;p_aa%aZ3p@*(KIM9 zWhJMvOwh9n8*&(7S>uUgm(w8z{id5!MAXbPz&b_8x&;lyn4^(y`}z4zrZDO@XYx{# zC(=ROyZwBD7*)R?RS9Dx5%T}dBM~!+=9OEC$mnm(Kr3C)%iV+YM@*pM4*K%$snXC~DTXknpvLAAJn{itDN$&&%A?RDHxU3p058FVW$ zAMAwx4HaW}4qz9k(J4};kcWI^jSafBasTptJ&ej~TRSLK$m15^`gOcG)=+u^LKK|G zHI(l7eoSsSc7IOmIwo%Wy-huBdtZEb?tJccc~X3we|QD}`+ixx0-1Nd=1UD3bNt)n zUU$o-5s@mS5ZhI=aHN>z(rj>B$S5aDP`3?vgPcQ#~&puWbO^_-(zVswy+2v&C|M{ zEf5u(pGEE1Vj}%qT*Pu;sn&m6x2-WIus|dFi?G3Iw|cW5!z{voN-J~9W?w*>tKf>T z6ZpdawCM_ZUIQIjaKg>M(TwnG{g1~*gMZiP^?YM&r`6^2gAnrLZWUHIpT_(1Rr zp9#0T_HoTJzYAn@BlbQ-e@1m+UFs)%yxMx3WS=p@PIg09aeljO!94B;O=N*yG4HP{ zJ^m~Do_+dlV$!Cj2QvYmu9ZVPct~kB_V$#D!g7{ej@xoKaR6?T7Q4+>W$sK4SS$3F zS;Wj6*vYo19m~<|>}(@#EfLp#c0h2&T%ZvCPoL1IQ(6laveobi$F?J!eSes+QwVRf z2TNK``Zz~q)4e}cN{X$3to{qPXy(A0f{zmK3qk`kO@Jc}uI`f_&oGpgyq{?dH^ zZ0|5|0Re%sDFzY@FtD!&X|bPbf0>wyuTzcKMQ18|_3zHV`F%aM^dJMxGnIm+Srp56 zU$#0t2l%Z~aN}ZQSx!@pU`hjNrv`-yVyAW6U*yU=hH(3J-^Qy*sa{*$3y1m&M1T;#@fB z*!f`c7sdN(Xa^|h|3-?iWH`kwHKF@Msux;#L+VV+RIGnX>Tdo(Yng|K%>>^_GdXSn ztk)d+yC$aBZB*cInKnU;Yf-F%@8a&$UMbiqsIF#R^6)D6;{JhE@wx=0n-1A|Kjxa$ zv7nm>Xh}30_scm3H9ZZsWdXf=j}*Q^Zr?MJVZI9y zHUt?_?JB-?r3mg6jpRDDnZ!p$noq85u^&IdG6!kbr8I0{R-mWHCB&^6!+Yc`@d{eh zq4BvC0vxT%Dk{h|$g#*fAvY!AZll^;!<<%j{aFJ-lq7rYA^xmcnL-Da_2R>o!0VFu zKO3)$qu%n`9oCHylSfj-Q-9Z}yLsT~yZz4u%i??(0;>Ikn2MtWK9UK&qI&HwZ9F1)IvlebV7T(_0u@C?!g=u zSfUC%ph-UCnLt(IDZ<;&5sBD;BWo82>kjSnLY=|$`SAw<NeoS{F%B;`E#4J21HIHeJmihf)0JOQZ$f<-j+h1+oC3X)YIO_SdG6DGJ_*8)|t(f|~{IL`X7OA!Vw1Z%;!K{<&zh{@0hFV!{IOK6_ zVNGu!7l6YAj_+$T{^3RMY{&*Ol6W#Qcs>+oME7y3%Yv_2bd~5D;QFFzcp*9x2*xF_ zF-ffbNF{`l@5B2;Qk7&g@pY{U^sw$f8W2`1iH$YJTqn<;-!}qXRg2qPZm}k1KBmjP zJlfqfSm~|Q&;B)z|NcO5ZI7nI2?5yEX=#<&#eBy@s(-4>V12_4#6|((N)bd0&^&25 zOF%g!4!I1ZoaikZQxK+%1(IgFc7bUFf{3k0V3~MEEfAH$;G1@NdFr55qORr)-CH8# zrog?uy6SW4WNO)BZnbKS57d(AEF>pp1966v&{t*?O|7g8JVM6<1Sf z0HFnb(BEZ5*;(;f$1IQq zs6339?j83_j~@Kk3;=~SQ#sV=^*f3s>itC+MytZe7A5$OTKnCh^^lg7f^t(2O?1H% z>3I(|K+1ivHBB}5jjseF590%KVjt5PWdZUdbb7Of6*3*}>EpSI7C!~g=mXPF08aSTHxh3Evhr|tY zWZ?*XUhKEn6c-E9)u_@DhuupT`n*l3i_jv0w8}o0BOYM5gw>1YZ-`F}p9_UBCMJb7 znI&K<_ySD@lVcUElnueaWTQ(mszM;Ij!g#rF(LJ_g5DpI>us5Z`Dg6A2cJ5DDbgOh z#)53|jp8?tuscH5 zFFA3hJuVYQy$H>??eid`7nZs@1S3>rWh=d96l1;6Fp7R)HR%qh9>rG+0HD@#j1 zbuz2fjGJfqvQAj$K@OBTGLQ=a{|6Kc!O9#i9UB=au~6V5=95kI6s0p&D+wApZg3CE zKXrj@X--Zbhj#14rZ~4z9CH%tRl)P-WIC4*Fa&3U*KPh_4KXk~Fsr%TMWdt~&_`xO z@C2GG)O3VQXFCJtY?O!6Ae=K7c$`mXlXCfu|?#1vGn7etQV;6 zpgcC8;R>Iwwqy(MBydP+3pl6A9w>&zu~{E-J-4Iq3W)UsAJLF&mY88()D_^zqg2nZ z#*MAqvYs)r#RidD#rs_&Yw1OW`?as4HZ4gxABZf%@CTUfhKF$k8AHLa(3rquu|1q7Y2p}5LOpnHI>T8$se*ptE*CosJ%OZ}w|h z#bB{SoyQV2o`3=qxddErJ(AB<6+CH2M` zjz&dSq2XUq!Upfo4x+vO6z8-=QP1$O5^id{JIltAf+xUd98)!u$JHX-y873uL`zU41gz87y6v%5gn#*vkfLow`)aHV2;SS@X&XkwOl>Z|W6hFOS z_);59m)`0@xG{P+3^yEj$|p!!Ux`7X)(xv zd0N-SNXM0RYe8y4TNsSjz|C^9uz>L-N$Kd68V=ru?m~H_qV3K7G*R+GtYbim#zP0+ z7x~+sVd$UL8_$xeY9i)^tGxBp^X0b~E08T=u$S_ja!tR}*AXzzFFp2)n+VR#(!xvCU7*u8u-M>Lp792e{(EFB!q{vpS z6q_Gx$Uiv$&SoRFL=5Z?Ixzswz| z)OXN+>f_>GbP&p-3K62o1$4OozXum}EdcoC_L25U!U8lj&DQf11`~sNS=K$T`G(^bqUnFv5yxXj z=OPbLFDo7bEpn{sUP^1Y@6tS2)g2uKj=KV6yCcNEVk3W7a15der#PVtq|uR+lMgPp zB4(Hni=xFzL`@VhapSPhN*6XB-Fnp$O2A%=<58noVty1tmCn(KO7!f;^@Helsb>ho zL>kfyG(ieVOnZEi$1rgq1+8E643Q9QJ%nyj80>Sv?9W7OFbn-EE+|0!Hq!%)3+$MEWSe386| z2p^;D1o*f#gqW!I59m{k@vJO3OH1CfG@PbwU;@L?$k_u5r}QQdaJHm$a@6f$q9M=) zgeM1=qznJlB9{8ambwzL@XSq=yv9b+mx9`Z1-4Y_fyw3e1i!O3niZ5 zxHA@t@gEQ<{P925Q7p`9z_u*kE3Y~)5l}N<*=@wCFUW`rC@E1; zOjDSV%MVi}%ID={cRi+m{i-N0``^R*H+qNpbVLoI=QnI$duNnzkvPBDq-5jIT@g8n zNQqU+OmT~>)5G&nyiO2Jyr1o_Fd6&4{=Rs-#HJjB)bAFXB|0rAQU+FH>Du?c^LM;*;dd9kFp3DtUQ_GDYMLXR57o>=2=J*aug~KibrvwDop79 zwLwmB87JlfA!KEA5s}5W0g}%|xU@3#6eHDD(Y(Z@X6|A}Hm$rV3w+w_KRh}k{m^xQ zwGYr~Lf&bLffPJL@G6#nBtOib(8N@*C%&B*6#R8Ej3K1oFuLDgBOGVR_5_zmskuX4 z;B(#i5cGn<6&5;F`V{;edP5GGGZnE&s+~5+zQQR0%c>w&M?6xWOLoy~y;3 z6ZKaTCyo0LP|g~hu;&^MM!9cq;^Q_?vMh3nJmVMDNT7vMj5hr&u8}MNEa>DSbCX6J~!k9(7BvNEDq6 zkx)^{_z!*+Uv`vQA#%+l4zn^R86N&QFA2px?^kY=;FkY6-tp)6JXFcPs8qb$IFv;u zOZ0Kyp^(#V?|<79F_9`H{OmTUr2 zu*z``TCXosbmp{%g`VSm$nYK74er{Q8WL7M%vc0*&6Ssz*B_KF{toJ=`r%_!wP=h6 zelqr>@mOHR1P7Jqj}ljhuOT!9!%x)wQyTpv{G$#WfjZtieVrRnI43)Ozc|(<=nwkLn{l)?^sk~RAdyXl~q+?)w7a+tE;P- z{%V1mP61+6KkDXiFto<8fSHkl+w^oCV+gOnSrTNZ3?LB5LIR~E&Y&P1m5fZl$(^gv zFG;wxzK(FVPv=09O(7hbh8~8A#q?b$5X{-j>lq}NlfewZn8CTiV*(JH0-4=CJyRs> zL5DqPst|^QX54rsd3nT@f7AI>=5%Jj&%=&rSeeoLG3GEr<{ML4_T8X3X?};Q!Vt+w z^nj(irq$-Sc*8^r9evOPn09Sg@HU%lam~Qcnqn@ja9daqpgKa^N|I7%`S2iyMIDtQ zjZZ^o_gNp%$XsP=ocU7W!_b7xKtd_DaSx60C?0bwf_FRQmPlUTk(#h>YsP9e>yKy- z8p|R)nPC4zo?^z=NJ^wK7MpK>37cm57v~$b;_q+a^MZaTGhyfCz!uVrjcmgea$r{J)o`QuL z4&Gyd!#?czmThVg8@sqq%@BW7sD z48=4=%MzK=rTj*=%q8p5CASy3G;Q@;?|$DsGw{|L0*wEOb?UyH+$0TTv&JM;pDBrv zy>-b^7c_lnt@TGC`E!q|(JI3H*0(LF5X<_rqc0twy?I!Ps<0qrb}Ybb>@MNN>KH=la7 z^5B-c#U|*GCw;=);c+QK^MAiOpJ;lda(l@OBx{Fh*C_{NWu_ra;jHzT?XhX8_>c8N zYe@vkQY-uhiM5xPmv(%l&o=!62uqG;(0p&Si^k4n9X^r z!Z~Fxp#EhN!A0F%L*2L9$W!55h_a80{yVcHoomP*XF}}eGp=yCrpZ|U4*s;|($Vhy zr7~#md|M3rtMZ?IOxDtW=UojxqCLn`lg@XC(vK(7K>J?iLtKV#;ohZ9Slk|ZFLm&G zKfM5&9d1K>gPIq4`MZ%$MrXE;SNg*~|80H3_!p|gT3CKx z8ZDzo*#H4qQZgPSJi2!iAxfL6&ZaG=m|mZiC34luLJx!u#!h2f$O8G3*kHN1T}jrgZqs1AUP>_kCChP;flnd4#j_>A%wZK5zYk`hzGzNfFyvQX%j~-Hi>&! z{r8`5*Aw~nFaLxYOd8fe%_n~0>0Kc4ekMq;I~Yj_SRU2{iGV#VELqr~ZMt2~-T$$4 zl?_pKU7K!ckVazY96~yV4u_nfySq_Bq`SL&=q>>P>5?u<1?iR&LDBbkKQABn0ej9~ zd#$S$;7*?mv=tH%V4AJ#J90yX|HBBmMkQKt#A!p6MG!&OLIzXnnVvb-kRS3=0gzrC zeZD?(+0^&Q40?nd*%?7(ns4cv{y7pPv^X+~RdUo>Opsl_%-fTi4ug(xeoqEgq3<$k zFi?gf$;H{i8&9P#q`+W64fZ?e@9^;O(a{mGgKPbTNrpzyIBvXG!sH^l-g7fz3I#EM zcSA=(W+W~>pS{dWvCBA8YM>%qC?!NmR*MEd>eZ0z`(J^5@{9u@G^Etc^$A^Y zErIlJV6ad6#=(z#8zvLt1G($#>w}b-Uz5a8dDv_S;iF#tI zG>U_{6G;1z&N4u?VxGvsWC0`_UsPf+_b9WXO{U927oIu9rDvfZDF1 z)OfGCELU8>(uHzUsc}vgab>=R8s|j6sbbb@LFoU-|yO=erLrJ1_6kp_i1| z+&-Qn)3J4FaxPaIxcWHo@r{&MOEN&q&>3ai9U>=0=`Ff*K=+$rcev!hg=Wi8B_y_h z4;E}|?e6aKWN~JF^7#AX*OQf%mFs&Wkqnt^vXbBuM5sXtT2N`>nZ1l|WK`6=Vx&$e zhB6gSfWLoaWTd?zogFY;Q9)2^l5?`Nw{>e|thmVIe)lF$OsFJ{g?-=NezCk04lHPv ztw=Snh-rgx8_E*%qmVYI9W>F8u5N5NwHrgAaMUmW7S42ZAVxz)NM!lZUJDv=_Rr6)XYo^YikK8Z36h#)ws0(;dWO*&C;m^ zKdhE*ydq&0(}pe4LXJwVLBZl#QQH-9_{T zhMz4(oM=KKI~0|acAU{j+VJy2dy6q!!s&*g`63LJfDTANKwy|sH~ickI2LzSKh$LS zTrkJAppraey$sPbys5~uO%`EpeD#KAlKBjmLs^t6IqG`gs0w`qf_jEaE%mTRf)}Q# z6=xrb51C+0QMS4N-=~2bmqYdfwaZ`QuL`H1GkO=}wTR!fb+xXgh83nQW}18Xf3xu? zi%_9sLI_#tUN;ohuz}h!_<|re+N?QWFgo7!6f=f#U$t0SKsc2)v=d4C_~IhcTPrlE3ZHB~DNsX$z{Mk$l8@~tSxMxl{Zi~f+)#pS zVpy@FJe@s>ZG?oaOtL*X|747Ec}7>4XhY%hJC%Zd^uF+dWX1Fsk=Fp}A*flP6TaU? z4&=VQ|A^QHo=lqg7kbE)$5#L0wTKXx@U3_zzMKqy`}SyqX3Q4Y%+yqqM&#|w@ETsU zf0fRRim=tDm9l8|(gSl}37!@Mp|Z`$nX$3;%pn;$o3M0k$d-ihP!t(wRl-g}mZ#Qo zss$Do?RE?oM@|I(m1iz zhA32fDf3UY|Axy>uBHt(Q$$WiGG~V@c(4wM8s9uDV>|3sUT@0Vc4HpB3D|!(1j&d} z+=z|Fw<|EnO^`~3B%CD;h^1iBnX#$75d|Vk*x%J;N9nNJBIscghnzE2AFYLad~FSH zYPJ8hc3mjBXbd}S-~D^@CyScDkzznhUH6)(N?@M3>MZ|`p~w~vM4{k_64Q^%@iC%W zh}c(X*5r$NVMw7y$&%?}@>>ISL*MEsN@xDt&z~Z~gf9Jk=5Gll7?gD@xf^)Q;Xq4N z<*e{CuMN@z77{|2EzO*^4buT;3faRZ7k_^$N{aNr#?WqW5?hd2Q?Y`2=&$+7@o}t% zVw&dvO2sF%4P0}AbUgFF$Y*+&Cm)~xUiod-4yHFkEFNpJkuJVltx;|GS5tTev3^hP zYcmr^z`Kk?ilvDXtV^2%8MV}*84oa-C*fi-*t;pmle4Si z*2Vo+oe{us0t*ZZj_ObEl=C88Ax%)+XNBbt+LaTILKu|BBh7Q{;MeH5P%UV5f9Ub$ zWfT#^)MLm5;WI)`tPln+;5FQimN1Tn&q;`gV8t*Rzu?_FOnCW4CV17-&lco{s_h}m zX7TV3rbV@_;ogMI+1y=Mz#6Bqaa^x z$J&V&UYp!>oef_+yc>pu=rX4#DBfJX;m_f!8G|41cGdkUfL$!#hcIJ?>@pyPTrSoeY%!(u_YF4SI@y2q5a4afZ^GC;;5+{Qy5Z-yjk z3>yVcfouv#)eFe0gdoFl@BaV+)NvzVaq(XO&__s9{OlVV69frj({3n=$Ui}Q=K7u* z9EQh$-i)5K0sjaflY;RIceKU2ze+Vo8m~DaL?dIdRkQ}Lwc6~UmIjBMb5|BkB{1l za%SReaJ@RotOs-+&K}PGXKBthXH%M7lOX*r#<`RvY^Yv-l~GFO7&>}QXK1Ijo0*|P zD|rs@v{=VVqj2~C zGZdU_R#3oRRFErX#8b%qdn;s9+9!t_+OEtX_9S5V1*ld1e(cx!45ZW#zbMz zI}30&IGfUX(%VAb02?ua_;`{Z1zC9M)|`P6>>ZO-o{HWdZoday+K*xB;KfU1-FN6W zCZ^k%M0~iMpBl}(zv1wTVw02dKsi$k{Is{sLI%|%%bE$}m$i{yw8irF&5J!B*tjH~ zQ;31E%dvwEMTPSCY{~;A`w5C0*KG`7_U3LZ(oQg7L7` zD_F1}qAN%%Tf|)8?}sk#JDE(~1Zf7(7H)5yf%bCvhIt$&EKo2FJ;Y_b1+bPhO!y)n zC)-N8KeoFef9>M_LQW2lz3{KQ!1lum0Lpky4rO96wXjl&J{L+A)|sWRZzjYV35AP~ zJf4q+L>_7B8}aMcT?1abtoVF9PW>*>n%R%mR?QS(dw~r1p;2N=EdG--D6;T@X1Y8gzZHP{-+l(Cd!^t70IC4Zzh{k9VgpJk?68K1wf3nr(~Dd z;wTpyTUZQGL$T1py^*hIo*5JWZmbjNtD-88%38)h;IHMDvQ1ndm z5ZUwv_EXsFfqY>Q#X}!YkwC1ePg8N#yQ2I=n(G`mvsqHho5cGS!bxF0`889-lL~b$ z<=UgR0;wluCoNi4o1yW(p|5@or0WhYEi0W%eio5pEnDoo=9YRr0ovDxT~K|_5?NO2 za!il*EW?&N3^Zvw)^XO%B4kM_XPc)wP%=<0p926mPw(kNSlOiKaZ$g>t;8_8M zRlfE`%Z3TfVOqK}88EZTF?vB2aYcL-eC`&{bC(m!f7ekjR03%}3qo7Z4<0DIzK975 zMy|Vy44v#=PW*5xvM8jtp|w$9%@ik@b4(5F{&v9b~tj8AAzj}M1Jm6Tk> zD9NIt#>U3Z{UsyE@d%85|3RwVaD6>tNW%*)Tr~Yv zpke)av>2S$uOIJpQ=F^@@H)*{6bLFT9ecQeJ5F+A-5?06U_Jo4K6FyxQR(XM)bzmS zvNwTd>Hf#bd*l#8VH0)5u*Z~)!4Hq0;oCsZSrf?meQzRduu=8qD-HPG@#(7)2Lx=@ zw;CHFNR>$EvfAdS@m5Yl?NmnXm!{I8y`5Z#Yg*}Yj(3wpCO?J-<>&7>G(xAcv++5J|3^miF~ zk*ZbSRdauKMA@t(XdG96OcbLY{x=Xu-$k3EDMbrB5IZH>`~YFfsT8w{<<7Cs-Srz8 z9Ro3JQ|qzwHQ@AG?V6fgP*dL+aM2LKYsM*HkNo814v7k>FV z5+ZNLu56;CqhVxJq+0*BzP`76QYPTn3o1jyM^={2GfbW=rB8U?-gu=QWnRU#0aYLD zC~h7fx!%5I>g^rsl^ilD2zz>Bk}^x~2;J<}II z?`XSaccE2vvHPs4H)b9s29rEFqd2>uI=P@bQ0@`~;=W6_5&>h#PT!aLFNH)t*g1tM zeWstr3FUFWowRQR`sRJMxHlN1Yv}?qFja)WVnpjAMr%#qGyRc6%!_ZE8FD4b8cc*(KZS1J8Pxn`Le?JVr@)(p z$@D#n8UHu%kcIPcnoG5Y>R^BL2l52N;mCfhbAg^VshoU5LL)PHv5&tRQi(_fv5@sp z(6r{}=UZQ!nY>Oyyz7_Zv!|!@AdV;I_i9VT-T$7np{tD-WlgX_!y&qN6u(-Kf~~i7 zoamMBK4yF|9L}le*=^C zdu|oFcdzDzcqmowB6KEuv5RUDU_*UBBtMwFZv1Jw`-elaRF6~Qw`5;ab$#}=_bv9_ z&%K}~2i2Sho*XK$i`WmF9_egF0k`_me_+vHG-F0KF^$}t; zWx6cYs?yElcxV+VLs!055+{cvBKDJl9DhOSf)b@il5lXjv7_}c**DBo12wSiw^UL` zi$-<_mPwFKwH*jMjEVW6!*(gw>FzEeDRDh@V(;uM1^|E#4pvf9=G9rm#l@);Mt}XX zFk=b}6TXufJ!np9bu7-}0-cUW%SlIv1%0T4^HRo*hzeTMQ+utQn??;ewL_F>li$zG zl=Ss64h)m~r!{zHJhx%m{>QAq%%iL!rsNgs9drnh8w%ua%i z7u?&MIX{n`H+`P{oqb<;yw%BjSk%@dF>zHX(k1)k4r5JG|L2xTZ-DRR>BWf(3yCv2 z{)gJGW+n=}tV&g$EcyyT;R71#JPNwzXZQ=5Htz0$)~k-K-E+>Z0i$Cqip!w8=sd`W zX-TPr@>UXjUYBPCYgKXOi^s3Kf0K}WXYQhP+*u{&7@5Ol=?s>j9sK}wNjby*LNr-6O}fk)gk0iET>2ED7U(14E3a$X!= zKLFr=_V3gFH@^sT{F`Ib;K&cv8Q(emST&^v@jr$d6HQ@%%v}k#47p~++A_qh+FTQA za{Jr-MT(L2bM%O0P3miPX<1JZh;P80tY;+6%=d8BSovym!-#E;pT0znwSvcyT*rHN z)RakX3#Y6I@0zKq9^PW@7uoo!C^?#ZLt3mbVjNhxI}7PdB!p61B%kHD$9P(vk+kq- zfljH8jfxHDBnFd%+JT1LfG%4)4u(!huoyTIZ_ilCelS)sJts9w<@=mN|F@B{OAeU zAVnn|oPY_f*ss)=CocsGAi z>7R7wD*L3=jGT&Q=}SjsUaZc~iwg?UC9wi-qeQ&%!yV;;6bnqQaj+Oa*z)p}HpIZf zmoa6t$6@2(mH0|e_tkdDkeu9*iOEyDk`Z9tOBmfvOHuy4#C}KT$(2b#+y2`3nd}r~ zfbDJ0;`m{lsaey<*WOd#*vQq=?OGq!*3u~C8cX~_WUPPe)dgJykw0jP2xBeNbcoUv z>Qv5D{ndKh&T1XAYt50Eas=mGb;`-U1Cvj)q&;{$a^&Sq*lCcrR#xCtR^Hex72)v| zMB2Q{m{EUKkPB}+IrHv%{5K|(ZI0}}!6tn6|KGcmx-Cdwz2Qs2-y67F&sAhHryqB6 zexaMkW<{`%nEQ0JH;D#M!bWq&u*B_Q z`PJiik>#-HDyKrt>Pj|_19(X*{;T29RcC0NSEy0XCWdgnOJbvlL5P zm}VwYu1iy-GBKayvHWLhsrnw%nzG>YgabyRjMDi!=w54gc$t`xjtw>?LZXgCwQGfo zl1Zh|7Y4@3K$bPBy3yqABzG`P?cpG5sT3o_N+Gq-d;(SIIlod_P`Ym7+DEep<9oSU zX0JK%!q$*$AGgAXu}rsGA|ePYp3!j9A$A9WON_Ky=7zpyrbJebmTs zLXk5;B#tq}c^5c$ohFljHuGtyS)&Z#ExTE7@C@SyAg(MgZo~fC#ZUOoa zo~*2PY_k?aml*j_n_QK{fDcNKzee@Va$}~N$+uiDkE(=h-!`BK2DLt*8q{j`+-G%C8|;BwrtX6!6^CY()+qu`FdSJUd% zRB49=JJVIR1kmcs6RP~|@Be^1t3auDd=!IPd*{N3-{*en`aSA>{0%aqIp}>DrFMS% z@nJeDMt|}g=ke{8vPees=|?IF(KL-Bu7d;BheaKQ?B$%}7Jp?S0UyU2Z^xQI#drTv zNdFVWe7mP>VrS5!LBIYE%$xjCe6{cIlu#_-*WJh|u__JW@EkL0Vt2>yHDq$jxjDxd zl&g9=UtgN*d@O2y!?i0_E4kei#X`d{PS!TLAA6EDcI#wyk?rrKCf)dA{Rc3FGjyzI zP=L`cFf=rioW?)t6ifwbhqN>5kwS7HYgo>z^Mw%RT!N@;NQgNQH)E>9l<3E!uSHk5PM0^ONYBqz!P&h+8B=D~Sg6r0fyU;|Yl=*PmwoOW_Wfs@R+o1`wK@JL!G36=Wci1_bD^F;y#H=}rxcb!O?es(n(+=Os)op^g9*Ms|gNtW^9;_&vV>tP%L!O;3>3fgVskZ%=ZIw=Sk`0bc2f8=>A;1$?qny-sm*}K~f9Q=}r9j(U+KLDl&Vu%jzG1X%2rR znu{r6P}9*-V&soWy}G)p&wEWP6^Pg1c`#MI!{9X3Ec}t+izf>O9=-SqMx|vGR>U9x z1AchDeD*b>L&g02PV&1h=f=x8Vka|-0V#~1k1 zeJEw<)x2_i*VgEpRG{6lugN>P2<)1rb23?lcP`GRZ&;|7n0&>7Ad_&OQ$=+|L5J-av4(UL*a&hSgJNLgK zk$+^P9=!)TXDxA8m&!QoVcBJ+u*WEVQ@6qTcLZhjWXNqnJhDHbgmsX23as9W*U2~x zbUVg`jzlx)<1%W+JYo@oh!{l%=~Pk=MpWKVqLJN^H$9|rWIi0jDjpdc!?-bMF}3M| z99pJ+jwhm(@{0n~ADF}9U9(mulG~6i>wPLC?vqR3!vJ$2$z>X>MC3}nA53b5(V zbhX&$1-!?GG$~rs$2vBFhv9ymNH)w|;}?NftM<>c&NWdNcd6C1|Sydkn4Z+2G2; zrk37@@w>X_54B^C?NLKSzSL9Hl$1_RrxUigl^U~m-uLxE4qF}E0jEwIEUW@?_!j1kG=krX@x&r^~CP^iZu$&7welF`9qKmU- z-9?a2arl&GiyLrERX4&(mzB7VHoYIxSqx)cJq!VP$$w41u2w`SA;;6Wsw|y8c56*J z3_y$k>4MT~%3O__;_LhEzTC(^CD?ZcUHpKQE|1%~HR_xs*P!d0)ZHgafXsbaT^M_0 zHgkkzsKx%x9D5PQNCkIR1zj^JlBSCVZl#R%1|IGeI_K2O$Xq6jIF%?_ZP&GV`*7AK>M$<`A zk)M;HnWhUZYNBe)ICq(kCRYg2bHdIj2ZS8+As#p&LECDM<#W~Rx$iaG8$P@!t9B+) z8O>4~i0^5hfW3m=;^t$V&wDH1$aIlvf6NuvgVjQvR4>6R%7F_`&jN;MlM|943>JHy6%2_wl8 zRIzxh%uI!aHa1$9kieZMd@dH)Ie&cH!fcRa94pUQrwO-ln>APSdR+}<8Wf(KoJf0? zceS^Fth8e;m|;wweIAPECH(7=+D(2i%O1gI5*y(ySg~c+O{}@?W?M*;}oql*`tQK0`8I1 zHPkz|9d_K?s!Lp^ETec9#`M+Sz9sdKsqXDX<>ubHjgaC9NbKkkz84hoR%cmswgf^0 zPOmV2Bi|;wL-c+j8Eu|jk)Xb1QoqTYg6+BAFf?7~kR?Ay8Q9Fn zaYDP^bEGs*_GhQ9bNp}w{yL*co&!M9BO`DoRhVVaPhzkH_hyFtJCy zK)FZdg?yz{OP0av15xbxmQv7QoNi1I1-b&Z&C?*sZAv+4QR-)sZ~Ax2y8v$c7)EYU z`-~vp^vEwquTO4US$t~P)BMddt{)k+M$;JY)(ih6WMXzBf@lzaSwU5xGu&yZyRest zXB)a@ine{?6>Hs^A4lx4Fy(UiewcTiFfq&f$b)~Pk=GQS0SVVUl!AEOo)`OK&Uq#=1XSlj3dlyOntI>{7ej|tbJH|Oooj5?g79GZ9-h^MCu5ZVp^ z*Q}~z_7$++FMfXM|9H!;dUBd)>VLfaBN1vL1QhQMK~CEd&x?x-aZfbcj3|R=czE<; z-dt1(eOHgvuU>IW|9vO}G(-QE)BieKoOS!sh3wSBM?sp^AxNKjyXrgPbBa~M0xT3L6&@5ps$Yq6WP z$Y#jHllS=hr!2SQLFCR4wSZP~UitU=`>!41G^d~4HoKg7@zPAHDl6$BY`i>)cuAi> zw+p}YrI%VFj2T|-R#a33R8=ub^nTv}(ly{9=egNizqdfEl}(+u5k9n`|8?Kne2*H~ z2kar3+m;yMAu^Ms5MhuZkdp%l?{xj}>4XI8vzM2afOJOzfs-WkBAzUbEY-@7mS+V; zk$ z&Fb-Q7BM5~Z?ZCo&el3#+)kwdd5MY?5ibUReKupK_)ohauDGvC%3%ZPGiS(m9Hxeur!wLYLRQmCmNGq z-HGj%@OTmxx!Y5f>{$3%rFB_25k^FNOF~Z)Q9JfL*ZC+)V9i~(SE{mzlpRG*s`TsF zu5v%OM(v(Ms)TCj;V{e;`_xdAX}5EbG;V^o(OeUFn;|xIhhHz^9Q%|QhYxjgYM@~Z zukbmK()@{_SwDrGO2Y=dNWW?-S!l+-x0lYQ9El?&0Zj@NO;+h0Y(ofHaTug;q?XQ< z)7Z9RuP9<`#j1;>*(dk(E`RwgzhoUhYSctqA}HPSD2>ODIQbB044D5MOA(~8&zf-W z_*DN6s`kB?%d}?i4`{lZfGuvoKvBmF{CN6s*}SF7;e_N<9WGvdLL&tol@XN3sX)Pi(7 z_#9d0ueoGI#ewo`J>J?s0KEgP9NTe!^{Tqj5)VI~PE5ZtCu2d==rc_m2wEhn)`vj6 z_4baZWui&+c}*a5Xb$gv%S20y8X}YZYQOIBhvLlckFjdc$6J7TEg9J94X}WFh<)?) zbHZO*`79LBYbs3tQF?WKVdn;OEm>1a4212r;iq;|cS_Y+g8thox=;Y*hB<5d5 z#Hfm``1oXzw~Ret#p@*^;iF_&I#2QI%ZA%WFUuc$r*>w4zYh^e|2f*V=W?LF7iAqp zeg`I=DKF*Y^rO~%8(`9ltS_chC?*b*0w@5UG*!F3O1N3d<##TbF5}GeOM!^_RXe1I z3&K~%-%;g1S%su{PI_CLcaFJpf*FTz!ak7RGmKsfoL_>1^XSvEf&Gm~E!!Qje6Ll@ zu9uOGW34pYm_)og#D9@PUF2eOLim$5V zFJDRMRTP#GTP4oAeMIm4<~t5q>@47SzP}J(*>Iz!D4ctz0)IOkT0Q|=zlFj1GqYdG_AU*cvv=yJOhty!?9ofPPY%3x))Y0k zw!NnMYV>Ya?)}0gLQEiH=z~7k5URTuPz=#==GN`Luw2+@&!p*<;+$mcly>igPC;xAHgsNwE zvAYy|8i$%Dw1$hHq$B4m29S1vuhj2~8=nBEDaS@fS#Tm4^UE9Es+yZy5ek3o-Q3jF zE>p^;X=x?XR1~zL+4TLqyea`@A z4Hl%4+MHWi88P+vadyhKlQ>&3zrGT4@JH%XaggounkaDL1Vu!qI>L|}he~JiE&d*# zoUCHEFp+=%x2Sqwi(S@g=o{k0zN)*m*ZDV92Ac~kwhE)Ia7{E~ahB`QAnT-lW* zxFFQ4+U8h9Fwx|mr)Y^$j65Wb3td0cy&gT-K(;qJ!Q5b6ZdrZCHk5d2h1O}S z)6Yy!$IWO=St$!q8&LP*^ZKIQ`T6@hf>(IYM5B~8nV1Swv}U76#4SU-AGlZgDP$|T zt=loi&QG2j9260(e4L40r6GzEQ1ukE;>mg}Ydi5eZ^+hpI@W)%s!J6$i#?W3t^MP9 zS}Og6D(j;Nv&!CVL8)0Eeq-KTQB2Ze)o)QNaY{XB2xY||(mEH$*y@Z4F(MCjc@}R^ z^?r`!Y8S|znq;4VIGbOB-3(6&^qqg++wP87~FI5lpO>!Gy>jCkoCSuVv=-J{1KT#~4(2i4&rQ!&xg`<>pzv6SU~ zpp)RZ|2^<-LiK5R@?o!T+>9*-3Z8i|OlC{9?zC=2cNV_0t5XEH@UXRPAzdKZNCr_3$tm#%BgUb8@M5fG2mVe{#S%ZBgeYV*6p zncVY@`{b{!hub?t2}(&FXB)3|anDxUoxZNri+`@)kPrIx!{meS^4Y3ZtIGz@weDs| zLR;P<5H4`}<*ohhD6P|q^OrVz84ZrZkIc>;y+wBI=sdbB?X&( zPA{hO-e0ciczxeak^FG)_O-+7{vzydY+Y>qm-zZGvGvE?ybn%4=(pM&e!(3tHv{&R zw;D_WUOKO~_)bUOoxZ2 zX45Ng%W8f*U}aoA;Arnm=|vxAqHS<)u;m@wq4_$NA!d<)CY9(lx+~J?Lq_C-c?dic z?}(jQc)u_lZwk$?>;Q%u4}|Wdj;dJ?pN+f$oPV7ej4WWq{aTD`WkTE-r17|ETp7_H z0)%*LheCv!;s%=GylU$XP>RgaLm>-3xwGM-pN^Cj{yA>|_A$pt@4UPQ@Mvm`UkeW4 z_bZ~U=B`re*Vh^MzX~zQ;tuT%g-Hkqq|F{$z^ipt>8!EMUxmIw-$Q;rHF@qUUH}~@ zJ9FYM)zWr0cke{B2e{h@S}zHU9ZDo{d=NGK9x-`%szjH^*!B+fv z*)(rhVRU%!^7F&|6ZdL+0`#K*4@>a`Svve~gikIuyFQeZbX8V1zIXdR$B?}Mr#e4Ac5}OAEbE%18^+gO-EwPQ zfMv z-&^VjU z;U)3ryFP%G=;(Z&XPQ1;aW#3m?iO+q9$*0Q@D_*NnT`XgvCglTufkEQ^+k%HnXQ0f zn`vdw666FZ{%73s3*(LkO=y8p;GElvNcF@J^v-td%5PGpY^2*z zi>EihD(I5QqtED^$h(GkyX$@pIG$a`CCRh<;I%sFwZtbGe+8A71I=Ij6K`B*Pf0C@9b1wTOf0wClfY%9Z+g# zC4Tz+{X@w7S1%QYqFM4d^rvq;oaoj*U@+ILcD25?OgS6xgLZUN`t0Y){Ts)6hG3S9 zKb0CqDI5=hbPgu(%_hM&<#KMiR&jLh}3w=db~xU3j|Uc+;e$QoM@ z)G`p_tpH~%i}LPWXV<6`>+EyrwPD||)do#FagrUpT8OCO)zLZ8gQNq2*^f^HSNy+Z z{<`Zanc0oW=zTVSS7h^M)q>JzeY6J}FuogGg9#6DmPpm8oXj~>XL#L{T*OHRt!94L z?^tLsu@Q{8c}tz#+df&xgXK5g&t<%cb6-xv3U&X*U`1+@(eHVYCF01Bx<}eDs7z$> zuEMn^aND|Tnitq`XG^8W`|bsWt9iaLaaF^8-J%+lLJ>L2>={WU8%||&X#5Q)CJUKB zLZRtX8h|$iHTKU8rIL=DDq$;SXGqk4gAQPzhr>O>m|lcw%GSQn-NT0KuRD9NtSWLO zJ;yaUU8sQr-3hurZC&z1M(H0RH5o*3PEMo!9tah1##_|OcX*n7s&X>yPtJ;^0a;o8 zS>k#*?ENL2l#MbZohx08wGzL(KRJh2`n56AWF}WukP7D7z;@90p$T0M8l1J!b4f`# zK!C+Glz63;<+CJif!oQ-h^)c5r=bwq^@h||s9=JI*V;BNr_1v~mtR_Ms#=f~C6Q+`4X<90KRLckS*do&5dx+nm2*>SJP=mCF+v1grzLWswooB=_fiIC#_ z+ALARVe%5q@ymO&0|C&=O{zeVmiZtM)@zjIa7c!Hz+aoQ0X!wBy;c?cUxP4P|7nu- zMfFp;0z&{No*{5j|B~2a^?DyFe!qlsWTd)jHFHK=p^oHg~u^r>t=Qa+inPICn`BD*41Nan2Knrkt z3b_t6VBp&0&>(8}6Xy&A6LR~AhxgW;>2(sCiU+0Ux*s6h_+mmr|I){}=BC)CdiGvq zZ}90_J3GfeOeQ?U=9yrpfBf@!dTZHSoj!-&V48@`#t=+FLqkJBQLGbAI~oy(8TSA< z=i*rL#NtN2*(`K$qEA^xSk`z1?aN$dJE$e<{)19PLqQXRnAYmHcL0JvP^WGyPIIvWw&sIh zQeN9x64}F~L=B*b$*xWH689GUV4Zbp9<7_jVluJLy)t4|_;?+mSC{dLRU2p6 z*e-*hbdgFH(nayAyOgbu)@3g-eKDEt{{8^oyBBTD!k6*u z$!@rgPyb{5DLt_5my(iUh@G}eFrsdUbEeK(Dv#6BuTEb2pc!J&_3x{w=N+o+#BnF0 zgMW3#$4HwfcP74&iyt z0kwYztAK&~@M*G+Tuzv0ZCDjy$wlR{D%s)DI7W8ow=4VAS|mAU3?~;pUB0*<_(#6^ zO^aqeC;36RL3NSdgc8^7d(KJ3;>g0L-l|H%Q#%SNk1d=cMHPXSzQu_#s9RE6Vo9e4 z=7h3O9bdl3sWM_CZCT@@Y-Miz+oWitQmq?0L}4fxJ)3C(Z!=w+ydJj(hYxN#$4`;&p)oH|!9LoXLDyIkFdvFU>|36;5xy@2O<|%Ti#+b~r(wF;!LbpVu$2 zWB?LrK*?(6J3b0}vHH&e>DF&?=bt}s?hd9=S7LgwZpl~GaIzIj`&7ubX8~u8Fp#ZX zYOKfc(ivGiX~d}YJ}J#18?aGRQyYs7;R~6^$sr5q-g2b}h&Fn9`aC7K#z$jD{%(&3 zH4F@lsnq#-E$G@l=L81P@)iCNSb6|299OMFqke-RI+!Y5W@W%LVcm z2xHVSEa4#%2K75C9{QEf$>(x$Cddg)R~F# zNaW)lWG>^y^susHy&6PXOL3af>4LkxRQY5p$N5^0dfNI6G6E6VWT~scpzki7^sP(T z?T5%H(KfAXxT%~|zqSN8RkwrcruEgID1F$iwfVh@TL5d}bCn&i40f-;Jq}FJfWGU6`B`cp`yV-{U297B9v;?T@XYs@1cowuh5l zizn0l-;BEg|LH#74wTmQjRp}-;b=l``#mBEEy_I6%bQvput_4AQnGprrwiQqvOW#u zmWMOV@9gdE0TDOybnXPj%v1^R$nw1`Yq%|E1Vq-*fKGQ{2?&H3*FXdz1IKOy=6sBk zFyQt-fsa*xJV#S zLyf6gOBr?I)=;vere6Lm`FxsD&1Qj#5*HQZ*W{g*&v(?rW*b4Fs*lA*D2#GY87}`R zEC#?qqMv=5r56-9Cla1%q~Xi+Yk5;{pYkl^p=iQ78F>`l1bsF>DQWjTdOJB1NZpE@ z)YW1!8ISYr#7KaR?4mRJZCpUAmM-8)By6h7?(g4}TV3l9cvL&RrhCB|w}Bj&j!uRX zkvhR_6rKpAh67$Tf}kS6@HzFu`Fl6&4EB#MZ^7KSF$=iO9jyP>TiA!OD2Myt0H-VM zL@oFcmmD#8Y#H<6c`^Nz z?L$$3tHb70vHlUOI_Uy>G@uK;MNb$D2GtKDMkgfLx)`Ta_qJT$%T@{=rKBtd!#&bW zMY+q5K>-Z3{0y)1uDVH4CKkmT7?~oThqq-<+vc#Ysy{F8`xzw~`4peN#*Rk8mGY8< z7k9Xr^B|mG)koAL-aR;@s+1Q^GMVtFaBmq;I}g@o;+3Wuyy*K7s3iZ_shQkmgaIW& z4@=*4A_S3)C%C+OMc6O_8A9rkkJMQ~@hYqa>FqC|L<|4G*&H`d8RKpn;c@8et`7LY zepE9WtrpYI^|E=pjd($jQ!hJ1ON^ktI+mlsaopIX(18Dams9JoWi!Rt*V+EsSdPBU zpOSWP0Fc9p==n-tI5%6jdO|$009?9S=abH>ejMA3B{gGifFPl$^pUB!YyO?E`E1Zc1>nO~I`t^Vg{JRE^%hq!Y(SnkyNG*>?mR3jtP1fIWvF&k#{kSc>@6+6Nx5W-a18NtNIJcBCHPh)NY zR@dcMeJ*>8)oK{C9)}`~)mlTtj$>d3mW+tCKeCWeH*dv$%aC0SnWKIcORy>+EfvP#zdYl5rpXSvE`0; zmv@c4>AS^mz(p&00DP^;`#2$duqykiY^4kX>`soNn@H(?xox_5C)1Dg6!=lt`w>nh zvBdV=FT(n-N3DcYibgCcDJe_D27e~7*kc)5juxQs>?C}$fU^zjo<()cmnO5RBgBHt z-$IhZjrnuO-6!90YsOiF*euF{hV<$$Yf&J?EL-bM@OXO*j^8?X_fAz4a@pD48MBXU zQ>xR6Z--Jd)Xuh-n$CxMjGmUCsGN}z%)@6vt~U^MAixO(FUZIo*+|f_&Wfp4E{d#m z1_r$_o~VmoKm_|`Or7AMPy=G5V900|%vWj%@ML(uehq|`lz9`)O)QvykRiYkC39II zr>oF$_oN`gc)>ywucjWP`u(H3ZTfh)EVe)b2Td2pO^!kWQgQ5oJt#kEtcj2^*ib99 zKhLdCB?H(>4hhZ}RJYZVsr|C}j#fXL>@;y=b~=$PT@|rsb*ld6|42H=fV$uJ0cX3V zW!trCwQSpqCoS8y&Bf(qtYsUE%geTXI{(l2_kYp5y*RDsJoo+FxGubCzamkY62al; z#I@J@F-n{p3>>QIGY@N}}C^BM&Y{R^e~ zp_}&%iVu?X3Oqk=^JFNF^o~mwo~Q^P(XwD!?E~3sR&D?OWfbqo*$oBPJ$Z zg#T*>Wx4}=cQ1C>qWXbF-iMqa(jqB1wroAh2xY?s08Ok$_<`(zY?2m1$`D%Yhhe@4 z)fgjKJg5przcTE@oHHR^6HH2I!EtOSDU*(p2}0Ri%-~FVVc3Q<9#OHiMNm5jl_e`z zt~x_G)GlS!OTYuWU6rkej*iZ`lEH%pZD;vWHM3K# z9VsgwN>k+lQgZy@eu!cs^f&M8M)#$|2MKB$1wHm@1t5LV9_1 zS|JfMzOXzYyIlsaxIwixf|@KTOja=QFB>40fQP!x$ev7IVY@Am>N}5sr~2)(xImDp zXDZ?h^PAGcMY}3(ROYAdF4e$`MS-b~)xNwO?GcynQUI5}Hy}`?fvr3XNJtsulf-ar_=5Jk1BfY|qh7*%JPk@vA&)l9TD{Uxt zEVc?r{Z}Havj1K?1?){!5fY(q(<3*c5jFV2^;tBA^7}-r-4-E-2-U$|eU{-XoSL`^C9|7%9s#Ny){Vr*f?|X$U=r(x zWS=Z+dq*?1h8wUndw4^lIQ$2_3?-W-Sr0zhMpjj8Xn(mSfwrXU5KthNV~bX{OS&Hl zg9h;rX?iz@qnSvdeo4h?$Q9?Zg9k1yS*qUS9RWSSfM@o!^;&3}*W;ooI|CqU8fuco2e zW5|<=06zdvZ9jnasQXWyK?gopI|QfFA=lQr&sA5Ip&aIaP7tVYJ7>TJq68cQt`q{< zF*CxvhtU$bqu`%I55NX;W_0M>jv(f*HR{TV&#Y3UaoDfxycq}P zG7>QR0D4awK+=YHMNU+6nPC0x2R=2ftEsUV$#4NJXUslK0sXGF!+i6g5_}olT=hKr zK!9=z=oS(Oh1wr*NZYoKcN$*(d($nn8BG6i7NViNB6J`=O4@`>h0TN`kwZ(oFhNBy zTJEFjjraxkf@pH0hi=A7%(Rd1cqW-Lg(;`27mQKZj*WGX$+ewXGXEP@dX5F>;UxfM z@6iT4Skv1gbO47f+-^W4E&SAu;f-n zz+ODEwz^s`(;C@~#LufxqN?1{-p)kYh*n}##;z#+V~#eyk8<)=!BRWu&p4ST3;v33 z`n|tD4-+JF*aZ1kF_ubWErVpfKGc4S0Qrnc5HU))6U+;;E@KJ4>i`^AbAshfdM3@Z zs1qI$V<*KRjj8rrMjG7RW)qi!sxAKZ}Z^+%r zZfM|~%$Uv8N2QQ2K_Q}vMy-S~kl-d8INw{@gtxmU34aDYNseW$`e<_f7zp?)xT&J* z(s|_{hXq({3Rx$gCqIv^A86W%Mhln=)clC4BAPTf_!;y{IuS`L$}^d3)z974X6ssR zf{jf%RyJ-2fq@RCP99ARxGVmT-06!8{y_~;kw*%^D+TA9Jq7u5Bd~}Vq6iqIp9fRQ zQNCJQnII-@VOpk7SvqzWjsAXsCdr&e;h-FZi% z4&mCCHneYAp=iLOSsx0BjmQ)9?2m1+Uqcw8LNljuqVs%^-(ROd(kIO9d7J17li9Xn zEXVV@1f&Q4=f9Tv?Ksio#;4w6GO=)@ra%ld)TG-C;Uw6FwLDYF30Yde>P2GjCFUUP z(?g6K2`!wm6SQUj?X<{rP~##}u5}3SsCY4n&IHF-^j-i^k4HmnoO6uP(-Qzf-KXcEd_ry^*HLEZrzcZ=1rblGZm;|AOSK zfJUB7Z#P zcBP5tD$8w(-xv-KD5sn`BN0kXz<8&5bs15r1I~@Y5x^2f5J$4(7fOae%{I9J;27PILrx;b%EKyOd&A_&M#`x%UU&v~0` zzIHqS)kyz~w!p;Id}%(@E^mVg)wC4S8$zJQw+p=4Md>JB#q*Jqd95;p6|8S535LE><+9@J;Hn?j2;d*8>?#b~(^n^rjFwlz4jXq7(E!o|l z1Q>ckCLW&(BK7hBguo*c%8-CJWxXzcW&VFOW_AFCxU4il0RNLPow*+PVp&iRO$F-J6xsEW-;!4)LQi1a|QU+IO&VSQ$=!CCTkD<$|xdmq*aG2k+)Z9}S{sGX~Y z^3_#V@Pltm!P0_XxV~uzX){qidX33OGg4;#EcH8m@sC`tyg7!p>j6 z@Eq&k08nLoQ}U0)vhNNdkV0q#aelTUDSP{K%z!J{BCX%+E~qd7T?#uyAq(f5+WU+I zCZz=HNk0mO{wC!8@$qt#U5qs>SXxcCHIWeJOo0m@=3$K2c2QKbzF-S)>dYOBEX{=D zyk8WcUz@h5$%uH^T3fdQcz?A&TKXe|gcKx+8aMoi_=Dgm17dHl*$MU@mJ(E#aQnL) zZB>k#ejUx=a#LdE&||U4Lf5ESe3=VsfQR`s%-0<(ktL)$@?R_}X&-dA>v=M4QR2i@ zMcw?NO%mmTkRblxLE;X+UxK_Hij2_wq=?8Iga9-x{%jdC@340+0iyj&zeB+|#(BaU zgfBo>B654$3n5S*I2NBVYNQY@ol!Ut5>Scv9c7*6Uq7A0t02={;AdHxJW$8}d~)rJvu#3$KSpalH0H&am;0wA;n1b2 zt@E9ukb{{E-Z~vHo_hj#so1w6pq?D+Im~{%7F6*Q&X)&JB2ZH-no3wHYs5k!S&c#B zx1Gy)2SoG5dojZGGqTe}gSX6)3ZcKiaYFs#kJ3`wV1e6P;Ud)kBnf;hBp#a(1Ek`$ zjSXd*NJ5ez7liy-Gu1KbAZ0bP5S$37G3{10>}k$a{3WhnLY*RyWfk@;>6=aNYHyZ7 zG7pB&vB}jQ^2>BkL}dg#b2Bd9SQ^K4#1}9c0z;AFuuQ(c2@T<`O-h_tK5_5XXfuQR ze{=nFX7SD)qwUwIr2PwjvH`$LQQ=)K>)=wJ(Aha#(_!`)ISXi5^gQJ#qWjKf7r0{Z zp(d2?NGzv%qSOPK&k{tJ~~$9wh%y{ z>{sC=C?d=^TOU?!kr!=poZkL3a>?NHUPn05kL%q4hw1nU8fJjj!Tt;x5rZU%-T8Gu z3K&@-H&eyF0p2C5s1>LfAOmXMNLy@8CmY~_qnZq4l#}Hm1rxMLP-b?Fd$Yr2qaMuw zCKw2r2;79&#l$aPzA#|<7k%FCw=p-TZbqS_fFLVKzScPUSCy4T_)k_8XX81uzQL*Y zbp^c=fM6TW*M7T(@_Suvxi5W1B=~_+4mW7mwk&~YYUYIV(-kq2WDZ5i2{G(hRCsKj zHw*brx*vJfEFvm7iA0vgr;szLpw9o?_71~75`(l~lTLTva3}3z_s8EV9qPC|Nl!Nt z@u=U7!B6o<(Sn%p#%l&OF~+vknRwASI2hK+dgfG=R2 zK_A6XN`PXZ3!Qw&$`W&pNQX21YqT$+_N#|WyOoB?#P~MMYN+kzAw_Ni0-n- zq*NG2?cK&ioN)Ak^MuXj8vv59H;Lg=gZ56alTi#X)mF60fQk(nn>6x)&&K;k5G1Zq zqsD{D*y)D^9fVfzE5Xq!;jH5WmlNYM&q8 zS$LF)-$f*0Rzvxg*_OG(?Ns53cxDLvM)92i6pMK8-ib=U4Q?wmO9Hs2r3HU+c6~jL zkZc%jlq@YG9wPxRQvy#jsr9zX7|i4xSh_am6e&*ZZ<^(Vt*wS?Z|Aly&vAM1-I30v zG(!_wcCNxn0R(W@lvi{rhqmM|IU_#zz(bWHPX=KxE%G^f8Ijl8C z&q+i;?~5q%1U;pulT&=zN&o{3Jy4alI}lIICww;};Y8mF2Ab~k%}A(8eW|(_E1`3R zxS_{q+|xn>gxKNpn}BjSzU*4)4%zpLEQnza`-$eafDnR4|5_X>H9X%g{+KRq_3jlQ zgQA>0<_0thlIMGib7Git`S?=*kLK0AT(x;99qEHlfWWf20b9wJT}A4 zqbWn2hW0H!Kzh;oJtb(0gBe)7{Iv7XR}FKlt1HqZj}tkaolcwc|Mr9{am~gfZiaHTf zsIW4^r4Sg=|NXUy3TxWp`(So{Q`(mikM>)%_|JInK>b&Du?8ay!GLOb`QRmVp1lVjDE8U9qkR;1+ zhT-GkX#b0)!3NyqAyIxnM34qoAc{w3%9S8xE0dRL|^>`wHmHI!sWAsmW z$*cbW?z6;?W}~plUp6StUV-FHtan5^x)_SA7#T*a{{<)|G{UQmegQ|*=LcmuH&HCo ze~Yx7fvXkvxnp>XMAbnZHHu*? zY`8N@6Ko?xh28N_8IO+mHuB_#KQ;^HeK^Kkio&tkU#@qnvNFX?+nlU`oe0CiY}Sv; zNM1Q({`gqlvNT_B|6mUjv8t~2Fdk8R=q4M$b`!v9X~V3K11cxPJsmPPXmU=n;b$vY zebbw~L_KF*v-=qCX~f#b(+0do8Q239Ee>B3lc0H^AHOI-9bdO>RuU!`9n|^aB_-Mm zO!Vwv#006iaf(tBlT606{mF>`R5&_Mm1P(bhkUEdo(WJGU2qXbn=F8auqNCdBV#?x zU7hVHF##JKlMCi<#8LwbA$AB_a%Ri~@Ft5Lt1iJxqK``ghrf-Ve^A{ACZ-JVfiP05 z>a}n3L6<95<{RxyOCZG>nCq|9336E|<00S!28XRAbYlW|0Ul!SiX7Q~IXySJfn2e!ismeM}AOg=u_B@|%zCYAK z4(b4Jv$+Ed;E};-dK>6b4-dRu3IwmI2p^Dz3-Hk61s}EXIB|dWd%C(`GKK(ll`AWe zSG~`9mdQAC*kFm;e7~D95SQGQ#GN$5^jA?tmSMyl4nk=fN7xUHtVS zf1+t88Hxm&9r}X-8=et0vL~z~L>OpmWVPbX4pS~>ANolY2T?2)kQ@jzxlk>Hc2&P| zY2BbGYQe089~d=fU5%0npT*|xMJbfC#`hK_2-6dz7AXCi^%w9ADpbS(r8UV0{@@_I zjVSv#Ui2@3J?dsMrmETHY?-qRrKUdHoOKpMdAZpJHy7?_H1mw~CbAItwQ@ z1QNzarEkvB6wrt}M9UOPstoukMV}{8UL^0!%IJQI+)i>o#aDb>jqbad1RgaA>|#G= zh8eGiff6{f4A8@0AtagyWD4Xz;nihTWP@u)sw`q>rk)$ibP&RMSNSF%WS6kjcQy zR0TF9$(}f3V>vAlxbi9{_NwdZtg<;^i$Fk)3ibVT8%K1LIZF$`tx6TI=yqnwrqR=v zb7dbJUbLENKd-=o9t0t>I9jI^el}QPa(n*B zg{Wu>C}=!Bc8?Cus8KPPr*4c3ic z;{nsEhK7m$M%p@}ekIF|tRVG(Hl@f4<;DU=7{l~TLpLuY@kD!9*Vb0LDuJyje%W_m z1t*Lc>p?8F(0<9#6@8ZG5j6_ha1^ASM514W^5=u4JMgH&CQX4Pzxxdh4#F8+1HOS- zkx5grk)m&-|HXuG1rBL@d;8!2Jl6hGO4DqM1Ixe*KrEBNwQG?M2O?pK6i?P<%pb1t zu%B1bNXUGu?Ln^f=tTW`LZZwVk+85PT>ljg%oK}eXJ;J)U)P>WfYOPKGhTtH9(Hde zRBAnzr!%T3>wEbtj=}f&==xyaD!)~-#5O~=pN78YzoIzt`Qa?XA=pj2EJ>z>1SBc4 zq)f4d&YzS9s%I2Et>KlCcFpRMR%VeOsd>r;On&MASFP+_|IeD;9;7TZDZ34a0MEVU zQl(vEM#642?%yD)avj&&&(N;PL7zRzpRsMZ!|5GGPpQ-T;bIWSgej+ZT6fn9IPA&2 z=ckJ`p^?SGF-WRxnS`qRcufQ+L+vI$3xM0Jk`N3~)0ADYH(EYtItPgUSED0RZ;OHcd$k7GG#wUgv`J{RaCf0<(YqK~$UAOHI&h5zj|T5g5#+F!r{A-ut=jcJ9GQ+2j|k2Dzc| z0h*Ym9LKXP`!LGcpeHP7W%i$H7T29qKeRRI;jxp1e&ch)TFWM+bC{3ciq&$V*mbOn zk19ApjcSMs+$t%TzJ(;U8dvL+MN!%TF~JP27QuySKS-zutpigs&u_nU^UENi!y*59 zj6q1p5w)lA!CEP!&c?GL_*N>IADEohM)IJ?onbQ7Uf+WH?I@0aVI9VsIaw`jAHMZU$I^)}PN#&NsVm8${mOf4}cS?ujAbo+oz5l*mged_TGb zPe3kv-gj-geZYyAfoFfgGWzA^iIDTn_bFgl<8JuWF;^WEhmG@$y8hZr2;D|&g4Dvv>?Bw(1D{Q7 zuSniPtpK4<)SsT$f0sCqsPtmo$`QA!?|{J_$Ju3f?YATO8N6w=_?iUfmoO$mBs%A4 zA(9C3C@eUr#;~kebo62Pl&izQ_d|});#!2Hv-EKxF@$l~Vc%6Tnu+jun#8$3ovr?g zts&HyRbiH_xcj(EDbC(`1+$9^DX~pr%ZZRFipSW2c0lKO0h+Io8ZS}?91Yey^6qTd zH)g%8zt=;Uj|9nj8vwgR96_aiTC&j}4y~`RwhlI)8L}?)_F)9En|8 zDwh^s%4}8Dmp`N^2hy%H9DtkFFyxO~?8Yn)ZhE&wbh0Uy%?ESUaL6$~I%gDNZ>wv` zM4GB{5QabrN`BF+rfELQ)mtWETpIsjN@f47LworKjB9Bj9F! z5>kN0P>hI~MBm}lMwdY7V#kj~(*tw`ov}DkoaX-)7l+YIe>RC`ZAhhT)GUfrneCYXy%s;C$9LgmFoyG~wi^u^%UHnLQwLH+l;MA-^!p;jJo5Jgz5>6u>#V8Qr&xpcr=In< z!1q_kcF#)(>q{Pn=4=UD!Bt+`2wfVVeOB2nvKyoz9#^L_w$V|10&qRu%q}CpyHI8 zjB^op;}UL~3&{)V6w0*iHpE$Oh{ zs%9ir{2CSq7uD6(br$@TorKNp_wrq(;+wtw7oR(8qrj#Q3i|r`fS@_tQZ~;xu*^1i z+9t|n`9pBoz_zH!7x4k0{H$05etjIdN32A*LI1gY{t$|YiIW}!TdKwsLtY_uiB%kG zDE_yqt{WxT&f1zEke2eX+bPiCXi{eEGi925A1#hiI4Z#>3*8d}-biaL_Qi=nl}2Zl zQKW4fC%+HRNx$u9jRr+xofE3%mh=alyjX*yLyD?C!wF&R4_0` z?XBo@(W3xBaAC#`(oQVvWG{mt>H$fM)}eDORytzau$US8o71H_nTYG~F75&B0j5RN z1)uwqzls6)$wOw|2iaDtw(q@{E~2Cq8Q4c5Zh4CQnCn&0%h(JKn{ z^1}4?o0?7r@C5F|d)2Sq8Y;520xmiyV-Suws=zowi4`4alD$#gBCs>?euG@V%q$ND zvLxg#Ej}VnO&=Ogcl$2+9@BMeq1EZHs29d94ts-XG9Q~}koXGvN`A%%U1aMDoTEwr zd0Qx}1s}$xCB6wJfEj4btH){8<1*LcuMDK5NYZ#fs-=<`W_crp#Wc^)3RWmpje|>( z5q(#PAd}m^Br~HoAbZ4_ER-bn8lq6D|F-NT5RmW%+!fy70&Ks}n>dV8!Lz6@mPzWY z_qQfDu!|wE#RK-6!m9yb75Tek*S{|&uc>wat~cMCAa9=UV+HU3AWM)-^0)0J$kygp zg_jY?!;8q1Clk0Ba=se)6uJ3?2$@)V--g`W2VRK;o?n7bMIe{&&w=kf;J&~Yf{?f*>`ycn^{FrciOCivqRUJxzE((9_ zPuS7{(j`Ffv@a=`CgHPUghicexkaIKb3!48R1S1sf+8q`taB;Yg5LE5J*@SV4Jy%!sFYvsLz;|X0<-~4cn5KFR z5oJ;|#++o9I>)@^iyf~~T)rPNBz^xfBEMy%SFnDGJWqg%RPjd(lvL8hqE7>F4V6wb zreGP4ub1Fk$W>S1HMv9D-82O32{|VJcZCSKXb%*B`Mva>8tD5^navTuVy{7Zfjf|uL0c`DJ@ucl;Ll|u%6R+gn5gC zG=sE75m47IPxoO%y!*;o<=WFEFH_v+)tMAWpy7N!Dc?{zX(#MYRo;zKk#7vVwSWe6 zsCM!~`Laqt_&E;Nt=upi?IA4ZPI^d@Gj^-w7A;pM)Cmd=dw3?=Jk8iH$psG@l%MGB zOzAUabC|-}JDPxm6zfmpZq7{P^K_CflML61J%^ae!&8_f1v_0uXQ}|E+7eVf@T(>T zpf8h%px)ZBqq?_I?rrYa zwj#glpKJkFmn;(G_V!1I?#tJAh|1sJ|9pF3{!36=KskM&ZYMWj zezsiY3uw~)6>@zt;pnx#eFGMOy!IITKhxqKa8ymq{b4~PM&LjtT5Q1v9ly$wEuSlB zNAXAvKevpv9$HBn-lX(cSu_EAkpbo0%R6Yl+KYu%CJ${;U)n>0*?w8Ui%GqF(35&K zPZoyPQH$4F?TLL8+<#1Y;j1O5$KhnDHZCf8Gd{lj>=&!Z0^M6O8}}MW^g}4{Wxk*! zX|qz~w5O~+UP~3SB|wv}qHz-z1;V;L8di88>i@81g~IHY)qaOsDoIVs6*Ijw%C3wf zi%&BYj}#!9qS-0)wzDEF=a-Pe^$|ZL(j}$i!-0XMfDH*_`MN`ydD)oShs#a;Y{nyT zMs(CZ>T{d41A2Vk(veabH)vM>$dd0ZYS*OTuEF@SmX{;FRZ0sqt}l~N^kK3Rh#+6Xb6$p715i!d5coX0wPYN=L0UZB@pT>9xI?fRce;6&Y1RHIQRMM~TDjwT)R}MH?ULCaO#J>l9msL3z?Q+1 zopL|K-*D$YI4?Or8zgvWF7ryWDDjU*UfrhcgOvAQ#-I^-V|9vr+evfeho76|X; zwWa4nrxw`a==-XObk^|;Ym;%8E^Euz;V(TLvjo!5En;hP&M5smp!G`HI+&9ssPsG3 zpopDKFzkjRG7F>jJQQ-spd_Yo9b*b1;PB1;$%+AW-ktJp=?CBmVGTztclb6#lL^;Z!fE5OCYz? zeBfJh$oP0&=TpQ8hVZ`6(b3@T<9Ndp?t?ks^o~6;cc1HjVHMOD zRO??zRMg4v%)HpzPg|QD1;4#5JmOaq6E5E^^}PMfkz>(YHQG_znY9#O7ARmm5pK59 zGB7@L=6_@BviiG|Q1OL1(3fKdT@_iQGOsG?g~@~_Oe2t;AAb>qN4z{lkw5iIOM*!5 zDT9k`WQ?PNZ;3D5QOhjW;N@2o8+X0U(e5#f^3JSCK39O8g-e>NdypYeGAv%>Z`;kWhSv#|OFJIY94;YncQ? zrYoZpMORM`7!+u1Yy?)+S}dkfCeWyWpzvOBvC+r)*eP@}X`tMGl<%DRh2tUyQKjRi z&l#8OqsX@Dx{VIbO>ZkRvfoiNa%*II$IW)bXV9A#WYkg+KrrzslJ|LTL?NxhnvRf+;1|70M_7CU?WLs_QEg?Nij|r`tNp*m^+-&O zDfY~%fQ`NS#Vq+aOH zaYuUybD-D+01a5A?*o9-HuCA`7 zH55db=jeT@Ih;?c(8ESF@VLq9UHNKo_jp+x_F}DCm*_7lcz|6QP+J1v(N91UjcyLIRexCN-GcbtYx&A-#y@s_djBc&r~Tm? z)xqnapSYmIYuq(cF;95=z^b-$d;6BH%i?WiDbM4<-Rdj<{$#AGiq7B z^Vs>JQtRb<)rH`FXXQx#r{_J?a_37aje;JNlcvMXtGnma0^!S-a^;?vSyVca>?9*` zXFVkvjl4Emg^YkgmPW48pY`qCWu=uHr{7Rozf;%LsMT#Wp}>96h(-|6Jbpe}Daa?XXTnu;I4zWSc1lyL*hGU5lQN~ z4K0(~w)Af9vFSN!gqSF@Q^GuAsnRY zR~d&_3%`UQZhwA>WWKk8K1p+PdW>sHp>@F*K zV%fx3?@%pZ3^J{c`f;2! z1Gp>IZ*=V|O{eo1!IA;RJLCp5m^U0_EMV4@G02)lHF-vWHbno159Go;pXneH3 z5nJz8Qk~wQ8RzpkbJL?|%3mF0zm=60$Z<|*Y?-j{aaws@*3Clcl8D=J$tzp;$)DJ| z90Vn$){9`lNg_C>aeMm7iM>_@9fKaQg1`0CS;1$3Z|Fl=gr~l+2m!zOgLl}sjY2O0^S(! z&Z$ka7-(wb*WNqOJR8eufF-`TTXIUK_pXz7>ib)eRWcs+;8TcH=*Y^ECtvt_t!ykk zg5I+~X_2a@YO0o`y}^B$M3)-)#h70REB+&>6nHsz*S3d$78I28S8%R8?~vp<*d%9B z=kUu2pf%Gckcyz$JkbiAk&lf=8{2FWXTgEe^7i)D*2e!0`(VZ!Gf3488k^&=e|C#v zWWo7Nr7Fa*;W!>ugBSSmk^m%r9ROP1`aXfir+Cjwlet%L#R8rKd61ADJ0zeXAWRqB zogysj>Jn#N{(DjR=zyztZ(eW@o-Tl#xge4UUWanCcidJhIEq}(t+93PJWSAUxc|M! zRLpr9EvZZl*2?_qI;}_WkLP898AJGF(jSwUZzrkYm4wGb<(G>4jRUpHx_tp|K+ofK z&*tm$=4H*(NzcP)kKfqzXTHlsGWmW(m4}-?+j}GI-N$W$`F`x&bte<--9Lmj9Z=Qb zzfZMT&;9^PqK@1B;lR!M{J-}x1pLc($){_BwMs)ngWL5$@#ot-=a^@VdP5K$9o?Vr ze2L-?dN@?|3kUoAHM$KUKOBB(APu_Me*4zny4rofRhi6KB~S&?ZX%-_PxR)nU1V8( z*feX^7zGltbY`8!#l?47O9X5i@63rIS5r9fpc&NF9rUt@&3rO{4JbMN-B-H?7&<>@ z*Y(o>VdVH-WTxn$I^;`{iKi|k+axytjEN}`fo=m8nYMb^KY@NKO(wu zWCK>mOB62(CGVpZiy6ib<_Ek(ii01fJ2SGg^)xjH4X4G~6z`SP>Gl>uh8vbdzwMQz zF<<4CI{4QK@!KdNf3|JFM- zEbQWuTkGCs1Q2m`ASAkR$_ztE>?5Y8H;y47cE9aR579o@mJ12JcM|{Ud0U*QYqQ!x z$29hw-{sqQzjNmk30UEM%=eyEqK_|dx+7=*3|i1bBnepUMoc8~o*8@H!4S6C>np!- z-C{&(kj{UK^p}PN)S0Ji__?3e`jR!B=8s%7Y>pw4`}R4P8wYL-A`0v0@+|i_J8cQt zi79TEl$0Fi`(6NzoX+F2?`&OnbHJ<$6y$8BNiW?iElE>*$I8M&DTfF7d!$nXFRkI* z02SuEr!d6? z5kw#SG$o3hDT@7WIvWw~l-HRoEHm7DTGxXSI~@7_BffEo%jyq8Aq>$~fCM}#A?DZi zk$p$@vr8=8co!9NUop2PDLtj^kL=&LAtJoI?m!U@(EmQsuBuQT6Wo9w%57xu+#xyD zC!I=4(3ygJ4hddDoQ}4WhoRN&;=vb%#$QDZIW4(Y#k(B}N~c?oP3Xa~Z)7Lra0OKE)Z67*yHRUS`ltTPQ(?OuK`!wy4<> z;y8SB|C*!cpQ<()qoccNNokUMzFI0?@T$+&W%_MW=`}W=r#RE51dk-`ZUcPh8+L*$ z;~NmRY;KKm&oJlq8M@h5n?ypCRQnV^Mb^5bBH(iv0c7ThxU-b1+Q6-oG0aVu$J^hVk8@L=$^|_8v$3`9 zw(9~*c^nTh<|^%X6}W#y?y_7lgkKa#zx7BclX}l&`C|%u4?@!er;J=6f!}&EDpdKO zD@5a+<0i2qSSzN|sn}!fcKIu>8Q38ah?tKhBl&(+bp)t?pL7t4u?%p39UUKU6Y2f> z_7|ORUDO>(Y<;LWY#1hcFOX#L8rnxy7xiubEF}qzXgB! z;qEtJU{xLTV*C>}Eto$Aqh_3uY+Rx;ih9#zFO5fFryT8Cs+8?1lhxn>*m96plM6;# zuf0|KF==680i3Rh(NT(o62RCy^um0cL`OMDBhybCayBOW`GdrU9HsE~XDy3RocxT8 zhrLvl5M~#Gl%LqCDYAuwGAxf0_Bpqv(p{1Gd zF$EqtUd9&nZKHWvk`x*%TE&c8sYKkC04*WuLncyrLJGW0J4Lrp3KB0BY2F^xGft%F z58y7`0mlE*&)Mbr(wfPh)#1m7S;HuV)M;!C=8}uV6@O$8^|G_}s!6k)Ujb_dJx@Ea zfN%GSHnTu{&VuIy8MU=l3K^`uhi@nqbH{3vONY3F=kh$seaoPqQG|@nXyPeG#DZ{o zQhG0NNA`6!m^jib_r&Vs`~s=PWg1DNqYFwYc1Ji`(`J;eE@V(vUqoDfr)@>eIxm``_BOp=YCsJ*o<<|->HOe{^4oR+j{$95<`UVkA|0j_;u?%=e2 zvcybMKG!jmMru)Uu%@O)xjfYk*m2?}NTs7qLy|so%#fru&JL6dc4NS^;lkDsjHXUz z1)h6mxvpsqBZQWtVj5@y((KH91BtUy1^d}fi(ko@9XQJtDA7^XG#(B#nmNCZ$n8+* zVJkY1>3(XVqlzj`P^|j0;YfII;74h`Y}0vHbF$$WeXEq>8=qRBAi||_5${+*UgyZ9 z;@2}%GuL*p*hH+d*$7pUA?-Vv}j;OWT5HPUv9K zH=ujc1(A-wve1Y^MYu_jx70YhCB1Nb&%F|ChV= z_RkI@`Q50Rrluwv^3{yhudY+P&5Ckz$l=NOUckU;l**y-^&oCzofH+^T)!KM z3be&5;0OZ|F|I{euP!=oUOTI=wHuU)i9BLnU4{P{$Q}1W6JA zskT*te}+-etz1S~86g@}V{xWUFc7J7bJWq8#96Jaa16VAcxgGg);3bE6*;fY!hT$w zpL2F}&1&1#)r}n7br_2M28wYp%`Gk7UG~AEG8{9cNIymJ<6vud#+a&mEU_^#lhgI3 ze%-ZKcGCtKvscQy$PHG5!W&LWYR={L9zJ>gh%Pz_{l6Vl#nSc{yB#+#jRCs zZab;~>%a#edB^XyaEHlT%@U>V7V?=iM)I>4sImp2yp)_GVv0`=-wWaATPi(%v{N{(+lQuyMZ03}zUz;DJsOf3$dOFMVj>L{ z;gh~dn9uV5ztwn9{loBNe{*g7)r~u7m55SvlMxEhID}!ywZm>Fzo&BsF$lmHqL^s} z7&orA256|u_gO5h`@cN%C471Pob~N)nc4Jbv2;P;lk*{|$C*GRsqe=2NS^NzrxmGN zS_JbidtQ${%JK`}E5-=HD-eV2riAjp%X;Tm(twxIfj`TKN!Pw)9G1WR6Lem6I>_$} zI!GHPAS;mJ?-z+uf_&ARbdBN*3J=xRxZh;rGuXbyY#SLH7o?@#-Oa0*``xOVd@*n2 zb`gGmGKXnM2P#zc5d}UcjN(w3il+6F)uwXUFdV`~Wz)j1XlMgZ!wv||)}L+I5}uIh z`&5LV!xT*L9{A!0X<58jY;tno^psjNL$JvOiE#>P;LLK&(_GD6T)0SNr5K>%?J%#3O#@n`hy`uOIl0ubG!u)clDlLsL43%6&J&gCa zMAi*%K}=9WY#~<59UvbE;p0`;*3w}&LK$v)?V>9)!hX@x(<9n^UHD8(3*Sh~z8vil zF-X|^Bp2ydq}N#1cg)^z!-HV^gzT$dcA-H?q6tAI^( zPl3cb1B1)u1-XRWNJ`sfy^==DvK}60`^U~ndpmw)Qaba(I?1iqUe)Q>J`)v+pi`8H zcK9l)8~BG&D8U%d_uv=;JZUrV&l_;XU`y*R_s=Q9xCC`JB{r>_i) z>WlWKyBh?Ap}V`gTN>#`TIueFp&Mz0QDJBSX&6EpgHRel5kWve;%@H$zV8PgzbKEM zv(MUV{c6ciU*_NSEwE;hpc;(SL^(#K>?k} z^(x*es$k3H$Y368pA4Pl}BMjD*#u z)vmf#ZfbZUpaN5b6ILiYh;&CycpYQLZ*PvD7-{q*Y%w?JKJ<@aVZ7LGS?Wecr14~= z74nT5!f6tQ6jd(=o|F>l3fS-~1pNXE^GF2GDk#$7&F|E$PH#0-D5j&A`d~1;)m$d0 zj@6?xg4b+$*AxaKd)k_o#>OfYhPTJPyHYAROJ%$-sSj+Jo~tjITe5JC(K{IK`8#_% ztGf>})TnjD!$dtV?T_BUd|hlpm#`_*B~PjhB746#kn&1zUE*fYhTj=f^9@Aqe8Bp*Rce8S|?Ni=_y}KV1rB*^d5;msiM%?}5oo_sG9Az4AsBVpedG(&C zb|t9}gp^AM3$h9h$+EKkpu~&K1M`kOM9Bo?M~>iRCgLCJ9xsL~Gn_JIN~5&Sdyzyd zBgno!Fv{lKu8v+0VSyZk#NcWT=k_kPC>NY|)g0pN26rdeQ*`pv!85gQW(y&mRaAr> z@w=BaI<4z3(15dgsM>}d6BWI|97Z!xugFgA)1?%WjTR8BqWEnsZT>WH{lyxBgIJzG zb0&!D~Ma$|JTwIV~9NHcEEtLgf!%6^01$0s*a2F$4fGy#)wBHC#f2ECDm zxe6yTqd|16+cC8jT5S@Uox-w4co7+p1XexPEn=s%N$8bg9o|Ue^v>v7+S5&z@-8c}Zf*|9v+48B8E+ivM=#6_El(ew8*z%4!9AzRyx!GHsMb;T7lX0`|?6Kp@ z&$nwS(^?Ov%wW#c)Kqhk4}M=8t+P>T%T2a*j-tHfrx@$ zl}eNzgglziEOJ4OwF$dZ(bODt+t-!^gJ*{L-A(m<(53*J_4A*FT51&`yN?0pczR%( zDf4e-ai%Y0yQ}r>ZVV~=P-kWowT}ePcH7#7?N5VFOYOf8V_SuT?vj5Hn~jF>800JP zIigoWiPPmG@4`?tqSKO;pbfYJ$*M2jbZy}nzVt{i|5|Do!I0>ZZuBlQX3&;d@w|vv z9{oEs4H15{(w>`-jk!$^x1Y|Udxk_v6l_-iM_H)35{o9Q^Tk zk5%pMcN%l?q3Fwu9FhfyEUM~)MCjo_!$^(v4*MhJrEB1bnwgk@Mr=;R3vIHy5BA|w z@-hn+us;eP3{zb1P8F}2V3~lrle`B#dvSqzs!yBWuBN-DWER`cT+l(&QQP7TJ-9(a zh$}YFz|62!S#Y4h4iz+FO3@rQa9*(Mg%Z5T?TvsKs8K%+3Q#ooYsPJ1WMpb(wLUku zvJ?lUe%`ZOZtTI8;L&4qWWM?CeE*Zgg(^xP)b_D(EkZN=#nT*e(gs+uG!^?-J}npr zy#x62U#WzuPoiC72xNEU!dVl9e=aTXnM^O$IsO_Lu4X5!kuLQktFx!KGu}hsrJ5!3 z3l?(6!P1lgh{K>Gk8YG59Cx1figZ(LYm?Ldnu!B`S@&FA(6}YPIf__LmJV7oypv?+ zu=H|mMVvWnAv=kmO7PdGY)1~ZKeEKX5j=ixS+oH72r+*hoZCE4+(E$AhUYd`LMy=n zTCc6~g{?~4B!ZHhlN=gRd=KeNw)&b0)G1AL?EGX>^#PsaC8b*f0 zdUej*`VlvAIdz&UOpjR@OF5E!{1}PtHS6N^J=_fUs3D~4F=&QC$x7$l%)yL;5Cxn8 z~~*d`9UCbb9}#cpUdU-|C~Z zmN+V%Iu`$vy{g;uJ6~XbO+4hLU9G}znV8Kw;PSf`f$T*Ls#;m#hQU6q&(fEFkApuZ zDUBUYP`&K+I?|gFg-cg08LH6}682ju$tvnOG zF{;xZoU0eGOVG$+wJVSVV<*@_TdClR%&#FDK(&DPB!P>5h{eg!fw60^*kdGn3>JC# zs-7RZJ%Qu*{{HS?B|1$`Iee!`U*oFcu9ic*Ut}Z$}=A9fG`ObB9C$sLEWfYFm791 zz&0qF6KfJ)NNy*Zpombfra}C=!BC2%)i~hh?995MT&J9KiN~{|hQJ}rtJ)0~ef2CN zLKZQ220CwS$WUz%1)nvyNYy$6QAl))8g&B$4@TdBN*nniF&au~R$ZHrud7&ACJHk% za~54EuDLI68OktGVt#b4b?|OpZ?AOu2h7J|L^wlA=M!b`e3*`gKO=DmXLQ9sO181E z(4=MniJ;mVYMe>TrQ$W(VF~!lar{k9O+}qHVJD+!XU|bMM2Qgw?kQ28#W7=vzo_EQ zh>ehy#XMJpC$$&n)zY|HGvuH_7aXGI8v-!_tOkK~@$V$dz4}~s^}SKwS#9Q1#KM-e zqN3kK^>fwO;Nm5OKnCx88sx|hO|@$yd_>Mf8D^2}O+-cq6iG735n-APGrH z@4^=>Z1Zc(>rB7-7gvaX2t%&|`T+rt zPKLBF5MxedyRJE{J!aFWuot3SWU$m3&#ny;P(P#Xc;TB@l(Ua+i8Ez(iS`FQQ<{#J zdKD}4GC7KPmfgwOnSL*T9$$h)u~Ox`ln6peZ&ua9{=3aDPo&%j z;xh@dmJgB@qVVGcMucV#2Nu<0;)sftf^91z6FX=SFr^FF z+D*)OzcaVZC%e;?N+7ux6PqCsdCxTa_3v*XHTrCj;Dag&QLD*Mp=jUh9%w>WGxAS4Q=M z(pbF@@EB#IcFB~M>w@{8{n>qWT8$zT`zKbBx94s2I_dG@pbfSoTJ)0kRc1iPAZIlD zEG)9g9D21|;4qgX)fQE&Ya>J;&;?*S6QT^~L~7^h!ogw1Ent-=>2!!}owR-H&%~6j zERPErAOs3iBn~a>cls$XssXZ+vt;c-;Ic>kIyWV)qgB8gFHgluM(;sCxuszHd%9fa z(U2XHA8zzlu%7<2+b;*_CO$}L!97gaV@z_&m4w+)L;@XFBli&Ry;8E}}S+Zrae3Av&X zEl4?@-29nUGEcLn$6N^8N@i0}8Ispon@U%%{=gwEtWxAgaSaV%Rp7^_8rD+<2nX{B z*B|WJ127Tk7Ja};Q3nsirq0++LzVc;yt1IT&;kQ{xw!i{o(B1b61=**f%T;>ZxB2E zgy7hK-*0PBCAHlZK1%lwOWI4N_^NL$VPz7x2_?T&Q-ug!-=ZQX*vR|50ltWIAha3{fbn%muEm4A>DAUxD=@db-ka+}Swj%hI z7#!>ice0D?JBduG#lD%2eaMdpn7@<`@>4z`l+a^pEqB#|E2ddE`{%&EhcL~H6C?Uy zKMIMpgJT5NhB$^|vBnc?kN4JC*6|xD2^jUb<${nQIrHrHOaF&f_f~&`y$sgf0sK-csWQLLEPvT;*ae(oR z9mzD_tShx0RVbXw+`yUMJuQMaxp@z}vcU?h#^P6QAWI&`o}+`rJx|g`b0%ch;!ktI zZ%tURFTo+R8_eRHcNJc!ahF~SNry49qE{O-kS5@=kd=@aD7x#=bx%GOW({t6hfELf zXtD%LSEAEVy&uGhT2Jz=)TyN&5$+~a=B;GI)bmsH@kquq$DLaZaN(>*mzab;D(+|8 zI+IqKFIhv?W)dxf$PVP;@Rn7p5u7W++p9-$uR;=1SQ%s$eMk1&g_n zbcznLtJq3n-OF>Vn$qX_H?WGkEmagJYo|8;iX7bNRb3Nq;uarMKZ}zksfwQC`OfkX z-(Rh7rz`GOhS;nN{lC=w%aqt{L{)q0GuJ}NDRvmPD|dZ^s#+GhG5^qFnAYb9qLV%_qBmViVj0^Eb<0&pVH&#hcIR#!Npqp2BY1kH}6uKq$$%VG<6|> zE?^1vl?vBM6ue;PpJ$h--69Fs!SyM~TIPoejt;NM-QWD73-d+i;`c_oxzQR%>9Ny0Rl|Llb{UN{wO-hglskD< z600Y=GJAChU7cb{Uw^ND&Mu=OdD&fN3Ak#B;({|keIUIjNze9YN)_K6ssFt}gwTQH z7FpI9o=GLC7;5vS5uL`Dx+xjHq{`+~*`;80PYDF07fA)O66$I0eD9i;BfTC+y$_{B z<`Dlyp&>gq50dSord8F>b2M}Y!A>LeYr3z_w1;aQ{SAV~FN03#I{zfS`(a#N+10h; z<^4kZMz{W_d3&(5r>u<&!yIbDzuR@>X3jZOBM$h28F@N^--vfs-rlPZve)(Un*FD2 z<3Sv8D^_Xz#10;XXEE=KsKmZORChX3--`ipiR%2%I;!}wpr!jTfMP&vRYtgH+oqUN z6a>tOxu{#^ghWWKtgY!8@vxcJ#RW*Z=vt$UOS`kLGC1($T1Caia`5O`nY0sM*Tu3k zU!dhz*ixN9sW53zNZB<6$Vu$iI^x+$<`G(xvD44lGmFT&ZNC%g)R}7KcNpM38Sd<+ z3X-;xR!HN8u~3*!6UPmv|K|UU zN-hvDpbcfnWE&lr%~4TF8m>WR)(;dM{Z(JQrV;rOTb%S5zZ91B@jJFQ))<+qWlF>d{K|Lqb}r^e0jO4 zfur{xpk}`6rC7P?s&(pCEWT-`H*2FDADprQg6;B(z??yPsW>@RF&oSIvH2V>SpqWC zA5NAUzW03QC;jEW?ksxtllQ;&AGc8dm6QE*H}10L_ZQd2I_S?}^~@@zyQCHI5^}Zt zEB_0*>owGjsJfXE1tb1tbqK9w#7<>>y13(-EM{grOxUUn{ujCaXZQU?=FH=&RJ z_Q+&J9DXTUFWX^_|H5jShaXCsz7HchsEAmRBb0u|m zK{-V5!&Jjd5iq(cyPrDF8%bA=*r`)}YC{yHH8)Zd(jsF&bAng%E04Lm{3MQMOA6zl z-({p5tISOyStt>7R!<=@^ zWt_`bve4v-fofuAN{fWBqKxmvs;mwru0d(f+JfG-KwRxsQVh@NGj(xq(2y6pxo`%o*byLaYkjU7nB@E7?T%^PA6IvFI@au zS0AOOxc>~uWNnICeT`^rC;#;8Z=hS(Apu6{38E+RIfq)h@!_ASpnxkIo;qh%^L!k0 zHmoZUW1+%OKi$EqUqr8CsCh}Q2pR-4<_K04BfrTU(zlmH*M6%iVZ{Rr{VHQrOVwH9 znQkZo9t?XlBV+@#jM^+_qdW113`C?9i!3=bi#VwA3u%;PS`ae_?K(wnZM`IH^kkbM z2`2)`;On|!@lADW?E=d>@J0XTkMzx*XXzYIg|yscQTis$J{?{V7%mD(R^5IkLZ_Ag zUgMiECdtgs#PFznW)M5kN9-R0shx!@Lr;Rlon-cMD-lK${)`axI*)AoLFaTfDS81f zm))`1=~?43AA1077knvkqW^=H8rM#16t!y3Pv@6bHVqrsv7&*Z(xg)e$NCt7pju>^J?h9&mA>k6 z-SMu4Hpx`|nbp_3p@$C42E;?%1w%f`sxPm#)wDIqq7LVV>_drj@@sxO4zirq z&bzv&OtxVhW?>bLr4|C-fF>HlZm8ybL!QLoqO6>kf2B)VE1TvI_KV8)?)Z-sBY7HW zOzo_3+)47nlN#hn6VN7M%4B_`!=#F9zhwJ48a!-61{x3;+Qr!| z!nD6qGW4ElW`*#6)8#1ia}nSL_tc{fn@^YsBs?o($Bz8xKKCJW+Hs9ZTGAF%2}dDQ9JNfc4Qt#->jF@Hc&P)bVV6;NSRTZUfCk{rQu_G z?oa)R`&MeCfyj=t$bKEYR{N#>b4VI_+-PiYT(fAQO>=FtRx=M4sC>y|$#*OYW6bmX zbY=(UQ;8Zu30Q@=HM3@dUKu%fUHkFlV>k)`StLs|irI+zB! zt%by*Ax@KAF&RdJ4!_9WNuEy#+ty)PQcoZx8|)FPogyV7rRsBWMpJGIIy2= zsO~xXU+*GrriuMa3u`8nI12}3)9`g1F#;47Q3{$HgZZgvnYCzP!KxyEQEa6>6iv)7 zl(%1D$}v#epQ1qpotPBzNhX_F%m=B~5XL`)(A2ZYIOMs>($vWDY?C)7AnhqBI1{ED zj#TD@k6;QY>NR-Y`l7ns1@`(*H{e2*Zar~Sv1`CGC1zn1e6GOQ9WSWQbf|dUhMFD= zMau!uFfpUR9J&Rn9Ea-H+Oo_l*hQ9G z6Dh`p#Uwed%B#o$)|hF;m^Q%u5v%*f^BZa4y35%gzG;F>``lT? z@h8@mEZ-s2(X49Rj#>?#+fx-e!P(xcy^?`tuD88#pH0Pb8fT>KQ$9;>+T4nI`u_&M z&d%|}Lxv`c9y(kj1n1h?+TN`yeCsnM&Uu1}kz3?9UeNOHn!A*p1A4xd;X%hg#2y9` zXL-9eV*F=i0w;4hV2d!c>1I4!6V{dDgFKEXYLjP96hd_vM%r6f5(;-pRMimVZN%SS8rj zQJ!maOU-3($n5pS-7pu83m?12^M5Y_l@PB-yhF>=)Ofb%Ga&bAER9;IeQ&yG_+X({ zt7V#qkWA|m=vg{#2T{_3oSpqKR4z`#x>CLQ{PogK%9i64LL*@cRPqBQV( zD$p@ZqDT1O7X7h9N(&+x+}Ps`^c^8eL<>3-cTyoTi}_%S@oP7CywsiuQ+>l+bRtD7 zj)*!MZAV4Bym)QRDrJxcO=x3N0Tn6edlKxs<0>M>bqVS!9iA=Qj>H)U6Ca(;(G9y% z#-M7TAtkP_QN`td%HK3+@+99aJ$rv=M?cW7k{Lx#d5^Pzy;V4#_a!4E*W^_{u)dWV z+7v@m8tN`Wx(l?01O=1ii`5OQKPt207B4Y#O=`GJByn#DLrBvRRwVGM!4Icd=sX&c zzRBH`tGcdPkK9O8CZ)9e1^38`}{G+P2zBhW@A|Ct} zRrl+^0fC<5f8+OSe?I&36_=Kozw;g5zYUkF#&$g@;0|^S(hhRpc`_7v1xIKi8oNHr zDw`m8N-Y2>LdbH*@|@mlGIRVvV?JK0LwpW6O4GG(&)i?_IUqT@INhBpvIHutuz3~A zmUqo_Uwy~vfDV$0EuT~syOk3cwN;4P#F%R;+qg0NUcX!NS>0(0-0xhCMCH=A_C}1E zqJM$p{F{#$^P7Vy7H-u12!o+Ij*pnyL~%Ms4TS1<@g>Bg(01BtW;QWQDO4tGCr9TE zvtHBJ7Uw`kOf>VEpCsKVSqC4I}H)6m-SqaFG$yS-UoJ)e>Rgz>;TA$ID%3w~U zNKrNFPbz#Mt#Q6gyTm=wjRHEz^!h|mgT|+|-CdfF6l%If!%>nDA_R-3R?!4jNagzt z+GQw73Io?K6uBr;!P?KT`Zl)LntgFGuKw@x0;+wJ^iI@Gn$sU~kZh6|U8a+4)k}h+ z96^&6Gnzv#vdgK%SRq-XfnAvqH`gJIGRh#BS4Cax&%wx}QR`}~sf%1V?uur(YV8;w z5{l8-RQ#sobmLg9TzD&M@j~k6ESylrb4S5Jt)cUuZglR2N$>MX>wgu`x==S7j4mX7 zrmYXzjNONE;47$IE5|i5f8`DcZI|iC)1-HDMVbU1pyi%?34jKxrz(PM-06Si08**@P64}Ae(K`mIdlT(0?2O z@+9p@%4w492KH*YF)Dx13lt+k5xmy2TEeEpXlP5GA5bD1{@x(**=J?=u=m=~ ztJM$B=RPiME;RRaJl|>e9ahaF2pp|<$k*Q&{K-3I{%c&y`N;(8mZVegE~nV|@I_ z#rcX7Bi}E}fk!VkJ`*RFcO2Vot2I2jQN*t9N_c;c_^+0G z4Nyqc&SeI|fyHIy`?tGI1S;XzfJO^yG zQZ-C$j?FjcLrubI8bGd?IF9|%P}=m*;6ZdsZnNenbIXfY59cf%mvW|9#N+Pfio4C0 zT#JS@u;i}eQ4V)!bC9K%O8_e$wb$nZv2I3=)r=^fY>}s7JKmp~A9X%g?LGeA&}Es&uSlw!3VZ5>1_*v>3nJFN!GwCxwz2~ zCJu)fR7Dt;a?U4oAOw6#hluv^8sB53%O@Xd8Eu(AA)RR)Jc==fuq#S44?V4MhEqh3 z?DO)v*%}BB9mQpd*DJI78jcZ~`Xn3i5~mye+R7z?TNEM5GngjpIsR7q>QF%9mpZ9* zufualpk#=I!a*p|Z7R4G05Rh8V)n&RGTiH{V-8$UBa1>y*60DYQT2)#4eF#Qo1uxA zH8%~2Iu^ZRk`hzv9f^@yhEJ8R1}Dore*z*2Lac7H*qAMAJn%$uZOYi4@hG-|K`H98 zMqV79m4@D3;mFlccj9b3D=+5mYjj4(`{kxqzKWnv^qA%Fzu*d`myGxZC|ah+hTrZ- zWd4!{NFsOs!&-B7bq_pOYr5-74Cu*}-V6+-Z3TKQiOb)k{%vaW46z5!7Fp;z9_5e7!X3_nIK3o3R@w1LS7O%`@i=wu z6D{$Se&(&S3X34+vG_{Fo-t6&#o=kWn9=Hf2;FuVn@VF^ai6{vKQXNh8cU{NRPFuX zK%f=yIsGJ1L)+16RXR|&_R9h8$=qw#f6zS9PZ%FN)j}5yfgt>9`h8->oedDguw{y0 zE)ipv!9O9h9fe25G_9*;d=1|@xfZACx*ks2UiPinj_mx`@bvDF?b`Po-Y}PoDrXnh za5<`1Sx1x*aSEXWkR|w_9}mbSe&@MG96P>sPd)(NKtTi!93nChUG4iGzY6a@e>_?{ z5$v9PrExpcSj$rP9>44A7={vU9ZbkicDPLjTd2T%(qonaYxvXUyZu0H!HNqDgTP(R zYYt~-V{-xI)ifC}cc7!AJ8JYav=^{^&IVpp?xUn^4f-5OT7vz9)>x%#HJLvxGMTif7b_Q%POs&8kMU z{L7XW=)=?8VoXu3KAjwxj^qe&b}0c!k*3hS5Ee&C!bo-)PSd zYn+CN&T)hLtHkPvo>k)e?p0|2H;*L*s-EO|8<+EpmA=uz;jqZO$qlBug@tHg628$axiu={SMBgOida#*|C^qB%|u^roIF?t=Tn_KmtE_bi`RRkZc>wzmnY&fL!0p}msJ9?t=t5{ z74`1%|JrR@jtQUZY<|;X9$Iwi6eA-y#x<8HV=Um>3Q+6pa9JkByZEldxgBT%O`^pN zfbM3IZE~6OX%w?jOfb23uD-H%abc^M-Up^%xTD)RMXQW+>C~?MolC9V3#6vzRwzGt zYP`A$QOl@`q7kH$BW}V=b90G;Dj~ntf-jRW76>n>K#Co>Y1LgV-^3}$Hwfwik%-Y`#fq%3uY?m&WRD9EM)p@>kAw|y6*ls0imqF!r=C_NpW zK0tP}Y8U$Kmj!|adq%#zGJw$8-Q8`IcXK-cf4T#xXWj8z9!7P*7LQ-&I=W?v0h$OT zEZbpv957+=$&#{0JiV!QWx}YaM>R zj7!1I&{GSLDPSfc3)(vU^T%bjT<6zF7zpnw55M>Va`=COa6ivy&qkR40n?Y)y93sS zG(VFkPm**>b8?g@9Cauh6B+*whfXfc)F0`ZuuDlBz4!C-cx+Sn?N9t z#z5KuOK}pGvXBGB9-_FTE>7QlHmv+h(F7em%h%P?On2iX>yjFd_Oe+weu_8L5^<2`_($E7qG4i~&w0o@P@j!q2p?ua7%~ zm?LWX-gq59{`u_qJk;S_xXIZyOQN?BPcsG&vGbPG~5#VIX}S?;K=Y05%VsqVd(MhZ4VmhKr684Lm!+yOVil z&p0?Z#MXRJZHHs^4Gm9$mQT^1)ttEU-MeD>Eh$=pp-tYK=9~}Cs1u;%Fd3pQBVy1t ztMueFr3cCEVg+k!-|!5DODI_XSMG!kQ0adB~% zZN5!>U_sA5yuACCnM_IT1_x`D8()k3g+(W`#=AHZuJr_6IZBDiAF*)cD6O{l$Ca>gN}`^lkhYF`^Eb8E|fBYHDB*p`Y(?g^C_ zb2MYS-R)TP`}Fm)ThIAl9qKNYHBDN#m$p8)8)NumneiR5P&G-f&VRs67WD6^v&Dz% zD-i-fJ`L-K%T3-rN1_>cFVcG57VD7tmCf4S$)U+vSy?{Y>0*j}EoRRqvRMkl3!ggU z>Z8*TK|=0t|7sLf=~c+yf)Q+VB^Ks9Q>qbj`u2DsVJ(&XLEWAsd(wgqZWuHt>!Pqt}5w}kTS6ca=JcRZ!_%RnqP+@v31qu%f@7z|beDR>%S4$`}yK3(6=l;gED zdro?OYtWOLA0T`C%u$7cn^xKt$WUggR8oT=L1DIRel7#EWm12^LMsTfghUY=F@_xr zgjJ~w(-HIp(pLJ|T6l!>kGy+Ne)SxmKFLPcTg>E;==Rny>Dt>X%*y-rP2`N;)_dUX zomul3XDlp%s0j#1i-cLWsJ}Mbp{l`&;Z?Au=<5G_XCtMV)CEvzbaz4-4@M`vC$YxO zRs5#SlaYdxN#z!mB;)fgtwv-a);iN4Yp=fVSAQ6c(ljp&`oCd_Ei9Md}0hd0De)TdD|}eE__KeXmR$ zpf_alWygA1<=F~{Gl(fRqX0i4@w6s4FHP{)NHWMOun9jW_e?#)GLQD5at7HCiY8 z{=S1~^S=Ls%FE5xvm6bYBBnC?3j!Gx!iD-Xk-qx}$6@9D9*z=96H?BGsmm)P+h_3l z@(>(e6blBf-`H5MUcW}ytk-Yw3*T9+@-3Z2_m@#20w7HJU{pg%;)L z;v%#XOck$8H48%0J9;&6vk_Bm&G zYWX)F7R)5jNRRR6{BJrF$3DV#90xYv*$?{j9kJdUMzXr8qgc?u@i@j7NTebP$s9a+ zk&(3I;?r0^nsGfHHW(;;Q{!^*T>A#BsM9ONG^3~b)$b0E3Ep6TMz8t;P$xcHKH@KF zh5!ZG91Mb&fQb%=zz*g7;sV&*Q-S-nTrN^}kB)U6c(?6%=F}~Q$v$oZSX&IpU9Q;v z5XxRgJqiwxrz!c6z(|FK#*cj5y-&Zu_61D(Ta<7V6Hvn9mJ#WfmEyeMMd&en1Yx-l z$8+Gc1qwJqcon2ZzL-pwk1w+)N=e%g^n)27`gzEiDJ$%urhZNf<&bzm+cE1rv5xW~SE0<*Eh z{^P@nF{%r4ijL!_VrQbZ{^5O}Hlttwrm(QEx8`$PKKlE2BO&0;&T3TOT&{Ctd zVlt~0Z54KPt1%>*Bf+)S=d`Bj5?!6i_K8L1_Vk|bSeOx(ipYpDR_|ar@anQa;5hs+ z)iKenCyhZV)rJq5#7gqN0I%Ke^+!-A@Gg`g!~)SsdEiQkmQRb!97o*;)my3!Ni-Y! zCO>N#+&#ARY3!Y=>9=BbLvi3?(34Ef%+wuprDDY)#`$+ViRjPC#P)ldZ zTznS!WF-U!6tGkRRgo0_4zP`KH@}rMbpzJO@h~=dv+xw`n@r#4n@Vy>8^0_K{2I)5 zrlMyD7Bs_|PLAxuEmoq>NukR?Gc{{aPNPA+wlTkryhH5a=4SU2>>Hw(%$8}Ip4L_k z_4RGZMVs5Ynw*{8S7k_1tE;b1bd?SSJt-x8g;$6q84qf#4~_{c#u}kz&iLRwY+XYIHcc~geNfMc zb1?E_0x^YPzK+Wh$ztvFCvVHSOiDw<)Ff%VVz19FS}`Dov)Z5}&;HSh8L32ia5a2m zrXB$N$X5W;f(>*0Gt_M_WeHI-@leknE-`g=hTe{j0O0-H$jLJH^7;icZ?)yYkc;26 z1MTE5a89Yd#$|12-gX8QWjuTg<|nQtnPZv6$!!k=9ZhPg$5DWuQta$5PJ7#k553;% zT)A;U1e-oWvkyN>?bwO~CWuIJc{HK-L`9ocdSI#4kCK97C-k*q>*vrRpCE~goysYLO|Y^ zrC~&hY&Jn{^@mPmfsTki$9VSEtG8oVg!P8RH&68M^1h@+{dU+dVmy62yY-lLXqyiN z(7L~laJTCKbA2Y3vNN1SH>q?Bn!T}^y_UiD-d6orHutnvPy)K<>klJ5fK|RFbIgN6 zPadrEU=ErizKoN-+97p){L!r07I|*;WKmBpTx-g!Q^=}YlVJ^A{Dm6}D{J=9!zxd} zKKI{Vtb)y)u~sP216!l18l@_eVUrPQ>dJ^o=hjcl?V_UBPkEiC&zS%jj}pz>|Fsny zyW5GBxBa%2Pw#nQWl5(XZz>1A(F6bh(3$D8k0|2WfN>Kb0A&i(S1{bXyu8Bs&+c&F zK?7^tTnA|zyZF>*#P-!>9M?R57l{#liL5nRO1F24JSsZ3r|Eq2!cbdx+YLXw%KyMM z2S!EJZw&`OZlTkoCx`q%SX2~zU2nlsjP{R>#!cDT*&DdsXoAst=oUpqMMzkI(S`uy z_V@^6bPfy@Q$f*yx3(5|?C$Ku4R3;-Nn`dcKvYOlAfCOQIZtFR@l5m-Nb*pwGtEaW zELQry67=^E@BbjU42e;CWMY|>cgh9NegQ={%-8s+WiCaW!!d`hplC8(zcliHeMJoH zCL&TrB|a<9mRxPbKH7}QaT%$}Ou2dJLm5}0=62o|7c%FcGWna&zp(nZI8$MFudD28 zE0yWpxGZ3Ca$&s4&=R^DQZ@bZrvwHSIj>);N zUq#bkXKbHVcW2R>I*}Q`9d|1p_9Ldu;;W&wy0mOCo>5hlOlrwy7W;%l-hllQn zlz5Yj|BmoDxLb>FoS7(6J=eOR_^s(}WCWfoerv1w&?)UL9qWYAE z1m&c{e|1>G4~Li>-$S^?%kcpB8f)J7dBfH5YgY62wl;p|_Y=|&@8zwj4{qj#p0Y`Q z7`FNHC$YTTr5}W-jdISTahN6t{VvOu2u|Cd<_AZw-u7d%_csr1ei;q>`}T$UDO1zl zo^$aU)@Hy1?e=H!iEl=z z44ER4=U?-~6~8H)xKf!jqWr&q-jS5D$$|py0e6UghzSBGR11+(ZI^5YKpM;iU4R-; zq%MI6nJ+3T98{(Y0^x8eQeK70?xNi3_V;s9<@S?tht-O{1=nalZY%SGExJv+aJNNq zDZN_G?EL5N0Xt;7;o13BvV(()kHG&L995~r!atUlmW)m6%tMM?t0q-JUEuMMz8T;= zH+*@Q5&zR_lei8%*(7j#P)Much14XutNXbZ-dL2<2-~{-<9H7}DJhHjE)|kRP#YN! zL;9JKLGTPcA@Lj=#3cquA5A-|JY)`_AV)rZ>JS`kq!jyY7w4egvGyy*+0{ET6Lecn z-}Op;LRxa1^DVT7IGB%;@#jBJf;7QIv&rxA`k7^N6jvdRolgl(hiC1Hd+RY8juEn{eOD@R=I>#H zAYtq952lx+Ta?81b5XTNY!=I|Hn+sM&@%!VmUXoX6w~KoPcwIs&FzGq2L#YuBt7&x zWJf!WEcbp-o<22wdbA)1$04*c#&q2M8;BVzv#Fn1$I;x#MskpVP7*z-1)iKnv}knUGqf>{kUyeYp#LYzCj0?eBTzWs%eC7;7q;sOyRta}e8ucMwPQ z@D4PJEi4K##%B#4u9WxHj}J^FizCJ_T|GTtbX$RFZ~Kgg1C%%q4$!=7O=aaPIDF9S zuQ=^tra88Ga9>%pd?3Tzl<#*+6Za;~oaImbtt9n`$=&B4_v-`5dRr+pFh=y~PHt^&+43W@QOzeh$bCkM z;VJuE=c*ffa$O`{L%ftgqqX$jcr6emzB)_8B+01doVecpqy#dDgrc>o*VZV^htK;iydA(=Fos~7axs?HM;P`0l*Esp`k)XYb9 zX#DLB);T8X;VStl9d4f|`Clonz|_vl`CZ*$&eC>o%L8xJE49!+WAFTDUN~25BgDB} zPKbdO@H|8&B2vCT)ce0zgA*)WUR4Fb`wk%Ft5tL%b507sB zBJHDuV0&<>+q9xJ1c<`z6>%|Q)6+8!4-*dEO&zLjB1!b`RDDYBPzTFoZ92oAJ(V>l z#`&wJcuRZ!>f{P1Scs@IwG}>K*;N-Ykt&kP*Qj?>CiJ2pKW)9lUoT+4^yf6KaobK{ z@}Eo&4xZLLla&X|dSYRwW@t!}s0lRGyK2W497SQ|_lgW=EMc{Qua`Q=!)h;Hi{59T zlY~C?eBx#|GBq#!WAq~>F+|%bMLrgr+mo>9^(6G;7*qHl)GM2}`rmi`XqS-EH^<+< zBlVUP7l+B(SXw@+)A06w8*c_uUsnJ$CpFx<_URKy{UT3Q>9h6@4-Yps4u8?!S~b_zWmA2xaCmhII&YW^3wHajg6DS#@?ng zlj~frw>#2x;_GXUqt5Qf$MAre%~2Moj_efs|8Ba)hK2?#c*>|f3=W_3BkLOKpvN%% zyf$R|`P? z?VMxpJ+iX*j!MX}LN;eOI5r_d9D9dkE60jZgnn=LeSd$~<+}PyTt1)ke!s@!`Fu`- z>%#Eg4XyLn@AT$ttns}>Y*Fb`JhOdC#riJ&HEGLKVErSPqXqhg)ZC@io=x z`uft+(jXV&u@&ySO0yMp0=VOeHJG=Vp`T(8j`bW)CM@D?;0a?tF@*KAA4F?B4dnzP zizAW0xg}rE3aN1>SJ?+~a*C&SGxYiKz-EF%KmJW53nrs-~~+xlWciDnDwp&k0Em zQ9Vw*Ub=A=ggj?38S)t3QWs6v2yy$ewf2H*k!{g|TMgVg^4VAB2D_icjZH_pIFJ6* z59JGSmhmBd(|JwqPIg-BLrxC4{@nwqRUYv{Pbd%ZPq_rk5rdSZ+>J#?2Sh!=#jqfS zGGr7HLjfd}3h7Z15H^@d~zAV28;g7FFFPXRhg*7(#V? zaRnn0W>;tqM?0Fj#uR9Geu;(5{94E4LMmohhN>zQK0I$%)3|=$X8NTcJ`wLP@%FzP zx}1j|OpLX@TQk*zaxTaF>-jp4r^9`}{l_=LA9?U4w?iKa^I*Ux8#F!ld3Z>@Ir9Ef zQYBhf*fhU9x~>gs8dIhM&t66zO8U^X0DXVaPXKMcE-J4u0RiHr9zsW2pR*@~WamuFwuP{kZ%g9JhP0dVAeVd*A zE+w*0Lt{W&Q%F^>VYS(1uV6+U|I z)*A^^{)M<4Rx?^>>2rH~d7|#kM3w)d^Q@AOuz6*I&B$j=0$YWM(TBl9C#BvL@>xC8 z0uIoz z^|8p7r12M}^V_AC+NSb3q~3H$E476e*`*cRrX6T|DI}Rm+r8d>agl1Job4n`|IB3hlCHoTYFH?qa)-I1(ueux{B~L*3p3(7}!)# zyVW(}@v#I#iE)rdNL0lLlZPZl)*P`O7Fdrq3v)FKX(r2)sDffc4JS&EXkHLsKC%1f z%+1Vs(^eqZlC89FV!=`U@5gkmL1I7XGLH zU<3Fw>N1&uSLf5ay)>6p`u${Y-2Tzk!1gz{(C|d{gp#H+J~*P_6N9|#c$uyWhi510 zMGg;OK{FrvcMELzp1g90)Qg!mBsE_T{`s)%mEKjh&}dbb8+@9^AE}P*`drN?wv8oQ z_nDX*3NA(nIp6f)bElM`3wL`$@dBW1L957jxz`WwP%dktczg`;HJ?yzZ58?LyMyxH z2&}4>TJKPgK!3k5p})q?4rv=jI&C*SvpqCW-ZO~m5h^2yVY^o^8+?aMu3R2pTbW#0 znObB0@+)Cemcr+%?17rmq14sGAw3tiTd=T{aExiHL9IYzpe{3x^3vi9ZlRMV)!rDIBB+H`A*-w4KrSChB=_=;Jp=y*73|p7!dNE{zLb zx3(WIwqO64kLhjv>Y_b_>gzA>>%k25Pl;CC=WV->sl4A@c|XoZ_mP&a%|k02bKMYg zs}OU~5G&7+hq@uj<@r66hKBuBtz`|Z4MnYAN)qcvDOV9V(l95ZM*#sg%2x+R>HM|Aen)U4(#LA$%T(n(6im~Ox5E3QNrE4vv6v=H45kAgWP!e`2v z@d-hY;RTH2b8hAc)T;+JF?U*<20NBLWF|#3cDHN1zvXy!G}kAFY%iU1akWkLrC+Zn zE>f#$o96yJu6ccJ(&T?{-kZvds+6&@v2-yDb2xnR+qcB^r`(ZOSElq0zwB9m0keDY z+Nuw?KX*x5fGPyoU7rHalCz$m z|9WYb8KbFoG&muv*>{IMt@y66c7;XSbc67tY@2{5%L$v^kjz9#=4*_^HH3rwkV7#>o(Y zR{BpOyfT$>udE&HtL`-SWa_W<*EZIA$KNXbg4BP?t)i4_5yRSuhcyUQbmnOId+KZH z>OZTxGrvX<^I=PCqUoDch780&a2*nUx|z)l1&u`oT_vX8PBG0j9elWgQ8V2|T$wZY z60BJJ0j*dXH#3@ZZ9=oJLNRj_wc9f@mz!mpOX~)0DqOns5mUw%J8mDHv~3ExrpC$j z&-L18%$ASC@JcPDW&Z+^4O-#q9EN-*dXKceQA>hK=ZWwqY9m?B*RT7&x1N2C=G~TA zz3Z2K{O<4Pt-ZbCpb!4*J(+ho{!XqeuRZV-`BkV4YJD)C{Y7PRRbJ-q-QU$i_l3m7 zK66o#>*?!*yOEiNWgd(;!4e@46nypd=@~yE(vl?7fT{t9UwSjxic%Ya>+%8%M49!CF zpP5>h*_j#g3rjI};K%^TNU;iCF`1c*SgWd?CCZ`lwi8~*bF_J~F+JI}n zQ02}2t(r05;=%E@|)M0k}D_0tqji3)E8AdyMF*VIkvL$HJhW7rUVUzqD4h< zBBGRKn_YZ9b)&H<5*KkbA5b4g1##F8nBKPDQ`n*?>SrpvPLVBuZ(v<{JNn)f(eyh3 z%df0s8iFGk}U2aEf_0swU)Bdbv@? zo)u&3>EG!dTePejA<`|Fp71=|+Rwg99`hx~&1F#3X;9E@P{gUkzu{!`vZ*<>%B94l zNQsl^uq`i*xd4Ac7Oln{MMFwj$LLzYURnXosw*rvg$OsP{S03hMD3@-1Jp4sb`#(B zpl@!J5igqt)RyAA^?6Y#LTRA=m?QDW}R*>>F#WWb3=G50Qw9#BFCK6j}556@~ za^YG>=7$%e3ON|USR{+@k-!-9yc#=ZP&+Wk(mHf-t8bgd=?7qBHXO$O#S%K5!tB9( zNtB`N6=P$~%TJ4r&n5YBrhCU`YzjexI5AWFUkoDAe+zx;VD9}z2*D-oc9J{vRKf4` zW8Q&07({}hOF%U86-9P(@@?x*ss(Znve%*?es;Lv8rLFeMP&fs`WtvKQM2#^BXCA~ z-fLM+V21|YWWSDh4?x`IhMgT%+YfY*U%Z|sV)A4G$gdj#dClq7!vo$-R|Ep_=+P$- zs|@7mtinG1felM}Q4E2bRi8Waz;}MH0LP{wrlsX{(!?Fa=xqWe!d>Ta0e>}_Tjqv8 zlP2`F6(C{pdSLS$VAK7oYIZBT~~wK)KdLUs6DmjRY%D0 zC?Rsw%wRrw#0%-$zblrQGz2tkUzH9}1cEc-{7wITac$_Iq!co<5MNnFiEzb;#G+h% zq)!Ws)r@QcVydxUjdWMh1}36Q_g0bHc)}Xq`I3$>c-U?Etz~G)5WY;#o@QGeKg0A`NOIwfSHK!9?_~AYubkc9=f( zhp=&ilxjsgTiBJ?<4bDMlO}e*r^b&qeOjHHE1Cuo`a2g2HV;~xo+xWl%F{Q-KH*|4 zK6xFw$`L_HuN$eSImjqk906VO6)N#+E*uz;$xz?Y2d{kDT@rdc4f#@A&9e`r0%Cuu zAI5x&dem0k!E^&GCh@*buCA_Ll2URU?}bf&?$<8ow)t12i%oA#2pxv~Z7Q^XDz}uo z8|J?jduQ?z-T&32Zz|&-mH6dg4&M20EH8R`% zwSQ;x|N361#yuU9S$+k4hiz7A>0Ug=rznW(TMnU0 zb7>eB-JP9}LHxJ}0IH%S!Jh8sAQ;Msm>PpM?*iO-&f^okfhn^Q za0osidtIgh+)<^9`+IwPO`%ZeQW~gFm~H`$q3_aYe%y7MI1h+Uk>+;WztG9At9|Jg zTmg@8XJ4roC3w4{_1M`s2qW+HpmeF1W+a5BZol+P40grwY?Fri-X{dVH4h{0umpt* zlXdSXgJ5@<_!Xndh3cC9j*bpuWWh{_b*(ncRL`Oy6Ff1PjL<}%>ozfKjhK~|WvpG> zQrk57GU^5^V*HOfx`hJr?YW7I(!*afWJ67nlRg2tK1by)zlH zELmwqHc2sW~7?U!(eqwbcP zHf~BJwr10WX;Gw)3yLCgjvKQuqDL}o$iI8CaDQ6pX&3UWKt0T=u`RE|!Z7~?u&5?J zc?~n}m_rESNZpyNSc)`}PwFhi`GJZFvaM!Dj2vdZTv2%uN{mFt(i+S@B1lC$6Fsd~ ziDXg-5k$GL*PJi*X0JsacI%iu>e;56kfPk!i1J}b68!RmidsfCo5%C@pw8PnUsq`4 zO|4cvo!@A?@Hq6Tl?s+$EAl$^M@jC>OUsn82hnpp}#(y{Vsa!J0OOe)#lgR++WKnEEAL=V{T zo2t42VrZCkn$!1-)mW+at@d-LvY)D&nvlos!JiY`e@t;(s`k(%vOj_AT%|Di;D7rb ziC??y`OYp|uZozw2@n^Vatx+T7ZLDi=k?uh;W;0blHO#crKevoKHt=*H*nr7 zwEUwR7WU6Q^w+y{$Lv7eX;4oi;gOFTqGNnIsBbCim=?$_e|~d|DM3X<^$?ueKzm6G z>KjLgylrgtAiAt9N%G$oGf+1urE)Rd@aWS0qrO0RES$xV`9hg<+3sf=7z7pglPE2I zQOUw4Bsjlx?J#)FXUAaTq_1YAZv>8MLb16Q#tBsugeDqeHa^t)TKKfIl?+;#3^bk5{C`jlb7j8xp0pO%u|#7u;MKDyL#hF}b{w0b^Q_tYBvAT)lFp z7;2~Z(7-OQ3~Fe~x#EanfFLMn4^ZX&1_fqL<-Ug=nF_|Z#Bn}DI19Ei&SSNfXsFAE z#$JL+Ep#k7U%PSGUDk4255ZOL(#cgf6}Lg;Dbpz@f!UO`3XU$kk|xp8w95W;_1W_$ zveL4=OWC*=W92zQOI|8D1G=U1==&;*i84PGbwm>K?ul%PfEp&ks(~omMb=h#86A3owt2UozvE) z^KlNVRi?KEZ4)95rYP_fI(#`xAV@h*;*<-@ML_<(qsz9~!Z4zYNW4&QHk#|O!&FnEv z_R_62fKaw~fR&T#@%So0gF=CKRbD4p$8%lhvkx z42opER#e%2M+%hBgAvb>=-+dGpVGXR+sw!e_)VP#CB9L!HZb=NB2^dE|EMR{Jo*qF z2VxR-JHM>yzIZ%)-?;Lg)TcBHSH%1BYN;>d73eHiyTMT}2dCm@IxHI2#*VJJW(YI+ zUV)>X9KR^EW%aYLNIKPmg6in4Tj&?TeDNgPPe;rNEq}V&b$j_D9>4Pv1h)x|MbHbx=QWjZjz??>m`(KsP(@XpttyR6Rs(q~^kjs7_fSm|-8{&j5? zOnnO^FS5cI`3qV?OcF!87)$5QEf#6+RS z>yU}vD6q*f$JEtLKC7R)E13qL{BX42BKAOLHD{_MO#JsJDeB&9(#HRrKqN;^G7m8#- z1a$--*0-t$AZv8|5LQ-zPx;460{(0t#56cKIGkf0=ZfC_^|6OJz+2ofaDqO|v9KLzitHpMMd?g5s?F4zAsvdXP zQ+4wW0LK5?16$?49NPE5bvSliK=e+YNodc#XL_( z)ESJ|z$cHPE*~apTiKi2;4O!j(d8HKDcRN1nC%HYa?;ViJH`W_{qWYU-m$nFq$jgZM$n#9HI z1dnIPJ&%42-FKK5hZk%yl1PQClr}bG5h zE17UyhmJiY#MTjx%Y2y@(D?iCu`iU5ou=&FBTKAnHLK(tDz_HI4*|RWNh>cZiRqrI)_++ zM=B~8AJ>2e^5L_Umj}N9?R5S5@Iw%Sf;17Je#t4-b;$y-Atc@FAb%>KJ0OIq9ReW0 zn=iPo$b-Hv;zr}+U4bEhiZi5$7}vZ=skT<126^#(ZKAxt&tcJprS;PH_r=Az@9Jrd zc5-iQZ55Y;NpZUcyAg7nmIXrkgyd`D-r%w+Jyq8K~aXAzs$_6{C6?a z+*I=vgz0;CZ&ud35M;y4zIQK$z7``zRwv3KQmup;OJ%n_w5X057uJbtLb}W>hY+ip zsi0?i;fO@5-A6h9@io!xB2)4=GFopnZlH=sQkhL})(WTST~`-*Q-pXt+E;jW#%>8( zkcmuwMYCnVt)iD`kAQ~R+ewx}vrOC?PO=O`U&~#d?4+p?!X|nNEVeuKvz8 z#XeQ|W9jU}D`)uFIh=P}9^+KW=VBclL|!_sufzTBj-9oo!bg zTwzsXOYhvb&Z@?!!fJ}C{Or=P>94ZU+ML^PRqCnr-7FktVk-Wv{@BpS#?Bk|Ndyk;mc-m***2C-s8hWe?jJ z1%iw1DgZH!#o96{ZA>7hM9y(9K#wUa!9m;7cDm(Ws+B`S!ph3}krKEO*z|_matjSp z;Jq46Nk)O4BSX}=EXc{pNpTzu`|Cj{St~gG3}=N!E5~$II1fN)R9sZ_6-*G?jt1Pn z1^?1)&)D1B`}a5O-%i-c=P;~EeWL#4c>F^Z5|V%WYL6cp$+!Zyn5wPaUQ&y&ugo@D-eRPgbuPZtCsY*I%@wqj1G1Y?Ca*Y4u5*jH5H zq+Q|OgZF;*gNE|tj>8~%jerP(2P3Fo^3`|N?L6L7Hm2d+3JI5 z9pvkwNj(Pr<1TNw`dRDG`Ln~jmxteK$;B@v%Ln_P+k?IY^me*NCpoLit1G01a7Qy> zr3*e;wL{-+0$RWv<{V6Jn-_CB^SWusr^2LIysJ)K!rWQ#lA4}p2XIDmULRPNM=aT>zBUY+dTbD90M>2`EjS1^-E7G%PMt1Hio zwZS&DeuB@NkABI&=i^pPQ!wKRc}+C@HXMO*+$?k5EOR2FJ)cj?{Pftwdize288C#S zt8pj{PAz77-k;B#Zt?LwwDW=(1c737Rb!RPT<+(`3lD)1(OHX>Zku9sg;ka# z5zK+F?Jt>!ZvmKgdT-}Q&yq@IROR2%`+sUz&n*#;mJLeaIMV=7g{o)k7Cs39OS7-4 zGG*R#5L?sK*NG!JCc#Doe+_gnA5kOlp^0){5!BF_ zMHB-wfk6)3AO|A}O?CLDI_n^lXFkHsO6|;lQuWw11z+p-0@03c=bx&8F`p^r9(yQnhypWCTgqzGg0!)xVKsgUZV4dan6tU>T;4a;* zJXTSQM&AWA6&~$WKP|6Llyjxu;`7-m_Tl8C=L~$GU?Z>f7Iq6)kpIXErjICRnR4>; zeWYKj$tgo`Fy}LfJ6_w4O~X<8Y z*2-g!m~Vl4vpT1d+IYS$6u*Eq0hb!Ms?F6^D2=kd{VZ9-3%xA?bY?+tb{wVO`V?_% z16*#PTe3RZ1d7#RYfY$_*ihe4eGlQBX!V6Ygp)kYf`^1CkdTl~OiqHZn-f#(UaA-+ zPyqfpchwdbAD)>Zq>zTo=4jpEon&fQst7w3LMh*1BB8YAi8r^;%twt|GAb?{DRPS$BWOlJPhj}-C3iARTC5&Z4<5)j+9MpxPjyQ*|Y9X$9%V! zm6vYvi8<nlzq>rSVc zm;2%*&@*>1vv?V3s&gM|y$7}3gLNIk@edpdbEatK%~TWnE7tofwhUgxVB9WZ_O`Yt z4igJz2Caii%UfF-a4kio+81#}Rn;}EEd{#nFj+YvPBWOM86+{0P%_BwP(L@JPpjY9 zOq7vpb}=>c^+QC-ZK1t=O6C(&T4rM%K`y+Y{WSOb1sLc`ye`aQ3qB+Z686baS|`qWx$6 z>%vJ`a_mK5hJZ~iL!o-NeA$4E=AT z_(5W|%kX+iJ+^Blvptl1>v z;nbA*RMQ1@LD%+TNWE>U|D6f0S9=cWe}AD@Sb{ltiI13$Z)s0YI6J6qJ-&*g4_3!H zYM>l7pzarOdW0FhJ~{BE|FJybux8I!6TWp7#<`vZLw;*RKN~8e#IZiM6YL}oC+cVK z*&>9}i@#BClHg<#`Y>)o7+ph{A;whKEUp~KnFlT3A;;Bh2)G+O1>0{mE0`T`?jW&b z&={eea|0vV+@~nmY|tN!4ufF20s7kitKrnS_1)dw0k;bF>^@h7yAPSwJ~vy>+KiQwO{|qo^a&XB3D}PQ zu-2)h4K%nd1JKvcF941rl{asTl#Ao*)Qn z!-BMY-W3Q2IXo+0!ko+uk_E|oz{>7%I?tkUh2+@Lr?8nXF+%!nXd>2elMDmpB#S^c%vdE$$V^dJixM12MUj>h|LC^t zB4B`gCqrB|I^DC|kGRZf^{0-14#>W?7MAiIH#UQQMImXY(nNWZn{(0q|i*6MeN6| zvtkLT^?o$5zkIu=-VgGnndU(EUW`vpj1T8=nW<+;>3}UX#NZnIwb@4)vbwor+Gt|j zXqkxfKA3Doj?Kc&4n$gfL|QnmnFPKw4&=*+rP%x0-A6!KQXw{||O1qc$ooDVdy@sJijEa0J+P z93J{s(qztpEkkYSX<(&uVH%bVZ&k|&$Zn)ET>e#&-_xseU3_nF0j;0w-=3;xH#RVFqFqlK2&n=Zd&~mg!#N}Yv1X6blX+DiKnnvnQC&T74 zVPl!P(*FQ8e%tU}VgdB92h9jV{@C_Pg{HwnfyHT-`2r-~Kcq^$DRsKcGOLdq1uep+i`Q z|M*S$_avFr!to=Q9(gfn1!SCc-Xh6vowQdj z@%`v|o=qGOC{we6*>ba+xHBSL6&Okq>MnK8z#0-b^et51#7wD3J!E=uAuZJ+pVd)v zc(RUkpE<9iP1fS7VR0`(W&&i5IP=-YunYl=*w~opA!8_JbbnFk3lS`@Wv%+Ze10EV zQdDGc+4#Sl>|50ysI2Vtv-(GHpj0a+#S?%0_(3E_Vw29JdtFU{8coa=Y@bc$s>v|I z_?g|C3U=W6@l!sqJs<=LJuo(Fx`*-f(HhI*_?%^mPzu#hdblwYJVY?vA)HK3#C(HM zwAL!;ODQi(5vi8?LP?)+$#Hf3`9nB`I4s9YId+4rCSjwQ6ulIC z-NeSv$;RR8(}`i&e{!YpW7dSL+t$)`096o}BBNNx-Y?!lUirg~J zTsD6@g_o=MQO2Fe`hB z(W7;hruTEHz1><-9j@jHEb?vQT@@ zR_JH1VFXCo7V4R&a}YYexuL4QsA_6*820sx*^-V4%r5cz0{ZKO{(3Yj(AhMkRx})4 z&j21?dO7;ZkRq?*#MhTmsH}UZiD~ysKal^}m=c(n-`w%LNcrycg2+t3J{&odPxJfY zjpOpR9!2qjFM?NMQ^%jdK7e>?DXFXeg}c-O2}}FiZyO9}W9#Z(ySWj@5;wkl8F~2P zp~}`))K)^pxE3qoKqG``U&npzo<%Yy2Mf18%n4BvY+BB0UUhb5idBE03_hVPD z4z3z)58<=Yzx$`H`rq$63{G1%OQSV9Lah9qVx{CMtL0--hVzYdjv6YVjssvyPS4Gp zB-KJ(TX?Im3RPrSy$7fcKG^dTxUUPo1C=8bo>1sdg-GYd5V!lGt9W!1-g*38L<2`Q zKjxl1PG}xii7snZanqK1o-TQqDwA5h$lk2Z-b~1963PmMX173a-_#x4Ypd%gClJfv z1BTf`HKnyuYQkTOoD%2S($1b-3SITAV<17uq`QAy<#IfvuOa8gM67)b45uON{kdp- zLFUv3S_#G9zcTq0V#bw#yYyr-jyEc+kS&k6SBVgbo8q70%69}5}LT@pigYR##GFcvce`@%Q;)VYsNNqDq9z1h!D9>)e zZWgX|zZuJZDUto&z9G#vD9yGuIBV4`Wsb(Qyyp_O|91tHu3QlOu!)(apK>O)W=^hd zYQhggS_?!P4U&<8w{%8Q122fz;)RMo@YWXGDW^%)lccaHhEdxsl2(nIU$&*Nu$$Po zh50$a{OkFp zVYLHGfm;JfF!u{ji%q$nuKwJYH~#Bki5z>m;TLex?5y2>l^a9qr?{h!nui|*MxB0J z$h#}PaOu*Y!l;L)hIQ!4i#7!MkyMU}Z>)+Cx7l!&!qg?c7NJ_Eai+u@H~BdxaK2^x z{76q|XR!iNauVk+JSqJJXHGjVUNV1y!;75V1V(1i!1E@W%IK;9-(awa&ON*vB!TXV ztzGqWR#q0!918t#aUbCDJD&EN3qUxb4&*Tw37xMle_H)KyIQc7(o_FZxM<~*t?3#3 zbiAvOFRDH7gAr!9e zi|M@c3afK+UI2k|_c%sqbmZSY7INo-P|mw?aj}Ui?ulKs*o`slns&9qOCC)2q@C=y z)uRXqMFiw1A4ah#)s;U{H{7(;V{Bq8VhcmJnkAc#rWuST>wQDbQ%9rnP>HDo(Sxdk z1YC_eq~JG75tYj`tk;Pog|Ba6`?Iz;vvOY%2VbfGLEmYv6EZoSLvM2g-7-YF?+A|X zoIy6`pe7d#CrZCvc>X+H`p`h~fYe}BvjvIU-YdbWJKQz2bKfra`8{J2=wgy;v85A0 z$*zzDt0=5(>y;l~S$Emnmk+t{?4URywBEf%zOq$T<_q%=_jZ;mKhg7W`kLc*bf|^@ z@HKV=L&#N<;uE6Fy7PPJ75(|*aFh}gg+UTTvDnl##N_W2S?7is*4L!Q*KRmpQeS34 zNImpw_7S|Lr3DM3H=wLEb3WhamWS^Bj!Cxw-AIa^*Tp3B-7ut2JK^Dl3m1To9UjkY za`7*vKINyb7rUo?nmq11sy*5~UOcq1S1(`r>>uLL`c;EtpXGpEQ~g@&&kox2aRIQ% zQ}*KNY&cwwj*l-Foanr_s`{cxJKeJhIEi`n69@$)-3s&iMQ}5-Q?U963!sal=^Gc* zv!8o;dkfMjFHPT764~0fehiNL_CJRWZwwh9_Nd>#1Z1--zQ7ivlDUK#%YG=Gw`s)V z2s{CRsq{^tOir6oigmI%mpuIAkC8vl&8l50FRp8hr|06AU*nU#T+(pau7S-V;4-)y z)&k>tpaQnFXn~p%nH0;HWC$16DxdR$Yj$dShFN2L2s0i>I`Nxi0zs-j;V{XA8QfRz z(tU)ZC5+}3*OxoX-N_R^*h(1eCq5Gps-^*rK^+0N9*f=EoICPS2&grq@G(;cqXQE+ zm~0>kS}#$vr5MOOS|C~(Xp>}Qb?MBs{`bg|K21T4=tE z%Ps6NbQp*p%tFJREBPdcIrMTT^Sr(-D7xr`P!6+k?8jU@IlcwU|EWllH@ZWrq`!6v zQ{a{~`s6?Z`dZSB!>W{r&E;Y}t78mA2Q>$U;B07AoE%*BGCg8gTG?p~Jft4OOQNtV z4u}L46_a@iM)x3|)=T%V@iA~DeDt7M!WVNKF4U8-Y;W6T-P;lG(?xbXiJe~7dhiSE zscRuSRJMGSO($>Bf5Lo_1yTIkxxoMi;RGU+!Y8lU0Z9sm)=FWgmJJH1;Z8hnH@E(K6j{Hw%JcmGo2gMeC0)csI`rfZt!M+cnAlES?Ipim?*44qUzML2&Iu@m>qD0` zK945edP264nv?{LIhK19;+Psn-?nc=YO*c)pj70i= zi4FZ06Qjck&{c@Oz=BIlRIh>pCm4?vanlxX(KfKKL{yL|!HI9+FrN~G=NF6xAvvhP z_t09re7RoB-@E$(iU(4(3(#8h9nBqmJFi+i3!Z=`!Y#_nwg&6`)@J0ro#pn3O*ESd z6h3oD^a{%KW_7XKdMXx~)umslbp%WOFoEG1no7bPVq?4h?(d0)AP-+ZE?d~$8k2*A zSfnM=Z+Lynoq?|DLf|an!2;ZHV&{C6@++2AAN89g3K&SYe~A@mEH*ze;etPv0pD)F ziWfCrGnPuhP0dg5_<4&Afe)Z~zAko=;gnuTSw9PvN_#2x(H<^urjHC)2Xem(EO@Sd00?f{$r3wP%9 z%#x#>VSlPrkNEx;W}{BN{t61(%a#pXp??;WCP40ha^iCL>t?VE%mL8=Y3iN=Y`w-x z!zx@M#P#Pxm&*Q@$^+?}r& z!(g3)QLiP&S;-LOM%705nAzv`yb?yt2X2%{F~~WN7O4T4^$DGZe9IMa zEY(XkG5hBenq1TLzE$7mckkY1%4OsP-{-pI#LY-WYuC4f$H;BGFQR*7Mb$esZ5OAac)NK$w6@! z*Ud>Gyt>n|K(UimQ;^k@U!Sk$b{XaJ8I`|ZJx*UePFtf$gG3`(V-S~P;A|>WmsQ}H zOU7ky%1cu>#L6*m$}#jpN6E+}cIT#)+;4$R=;Iz3wO5T6FQC;!j9c2^ZicA$h#3nCE@FWK^$!16=gRedp(QB?=| z8D!AY+UN9$tdeosP=cV|sJ!kq8A96l)aH0=)dlU({3o1S?`GugKAxGvOp)1Ko3ScA zr047ws|YVU*xKs$6Mh&N)0qgtfO1yS7 zFp}iLyr8kh8^B-#?;rdF8&YzwgoFe~mIB~Y1h(L28RIsef!3?>yLj#kx{sEZ_-@|( z09OCDRj$)`uq}G(LFY*Yc&GbDz@l(%{G5jZ)IXS_^l&v9)i^RumxJVhF@M@`l7oqI z#IiesGEou+aQNElsuc#TCak5C*Ry540TdX8d@@P*0e~v!#*=uaEx@Ic_crW;ZRf(} zV~vD*5Yg#%i?Jq8d?nKH^7I1OsNEu?SJJIIDicODrf1w7G-E|lu_6O??bMa1HPqFA zYUoLh0LMP32!KJQaQ~*s9DZf{aJt7Dq-lVN@P|*HbXRgYE`BBt2HZiS{I(292FH31 zuzLeMqC2ot31g<#*mIP-!8b ze8NgbcJ`}NX#KGKIbQ%Q6#IT@^d&Jt^80I`J%mbab@e6DkMY(lJ!Y(L5`Gpr*xRRY zF1G`l%sqn8^I-sag(I;-!1;l_m(C#f`4ir^B){kqN(C#X`g&MXm3BGoo;fE+F0d?{ zdcRHKW??p5I%2+Eq-;-W+tB?o&N{UNkHue(N+k z@Icy9eJoB;lXi5DcGSd!%b`Y?urE4z7?RMpD>gtYB1R=5Mpq7fg%eG{)hSPXv5x0+ z>s{qU?N!m7)}w2pa#B@7N(v}Thy*M#HYd7SGVm&0T1l(%2=#M-9H?X;{|tP_=`oSx zvXjC_=60aKN52QPbVu1kx0?Fijn~1D%@u?>lT{+9l&6|j+2F^s5Rtu1pXE=G*X1D$ zZ_b=!Hg!;!NEoCq9z#rz{+dKRnkS)S_|wsSEj;3fC3oF*wpR>Fa6)h0n;E~Eyw>-) z?3q^*-*#PQuZ#t0X4g4^R=C)&xO41V70+Zh}_`h9^%!Y=O(y*rYTZq}t9%a88d+kws(p|=Vzk`^&p^)i6$olf?39h`X)6)>_ zMxfw7Wkk~VFc82L2d)ah#=MSy#q_AE%5rpcRQzj|0igIi0o48K+FgbXQ}i!jrJKkh zy9fT+2A&B9U>MnSXXqXav;2C|+rbC_g0bGNh3A0^Z^BM^dx1M{mF36&%sW*+S4hs$ zZ$ZUGkEMA)-WVFBS{?1JKE8IxzW?<1ytW=7Xt?`-^@INlQj`$R4B0KwgJ$5DJy0HBFjGRdf1ZPW>A+^FPc5}vdh@#lFUKS8xd zLY2=MuBTUcb)BJ_;D5zO``#{jS1jGe#)j4PT;b88E^blw>6;kf6`47>v=7j;``@#@ zdlH|nCj&tV-IIcQUulQWeY~HO?`q2|k`sObnLHTDkMJfz41$5oNKamPu6d{R9g|Xt zBI_xG$*87e@`q%9fMtA)mXwIG{Wx5d`d(?&6k+BAvE_5Wpe`b8WPS6|V`^&Z+T+=9 zGOc?O9a?n8C6oT<%ulWF{bKZ#=hdu?iy(-n{U(t;gZ<+Z+ON;AAY&K%=eB!1pCbW`W!|k%qA```OD_egDYMS`On+w)QjdRZ4Sl%ZdB5! zO;}Vi?%&`j?NJYt6}S0;*^oWNnSy&1!iXmdI{rv=M<~LHJ8;x{gM-DNKZdZs5gTn3 zrpv@y41)CU#50(Ng_*ZSOKF>Kh^3jVijeKZ>-g=8Jren`N30op<;%RSRf=z9^(MwFEo}HV6(8YeeUQu6o z>%$ps*wC@!PIphNn8L{6<@aLDulEo4Eg4TbgkG3MmIwFprCXZV@BwPqXZvd-Ak#Bs ztQ%5OQ%wQvb>-BMn6W%CFpzO}W%?s^okaQ}P~*w(d|N@0y^&e{L0N_dIiHij3^?%M8+yt(d+4>}F1usP-IdH&L z7HoH|&M72u5^9`rElomrt-yoHE1u?Ir#>Gk^Ps}QE4~TG0K~LzB8}$0d^gv3#%Y12 zUPoVtOEu5`V>j^WE9>Kl;~=Avcn-wM#r~F%SENlkQh$=V^O25Mz4A-)*5A3eQm<)d zN)!WsQVs5lJ~tma$q}gem?Pwrif)p1?6MBiCP7MnURt?OIzncUDPj3sLS6$IgLMob z1b}OQFynR<@xkw}-l_BjpR~I2I`2X71tqUw89I!9K!b8gVV^NxpM*VHC54>l|8aGm z(Qt*`+t*u&I(qL$i3o`nHQMN9hS4K~=q*Tef+*3AE+qQQXrl$uqm2}8NVE_ndJqIr z{wL4#to5$-e#j?_4>{-D_ukju*YDDU+?+B3Y+R0vbQN5WX$UAs5RT*W7D=6I!vJIT z!xVrXOcyB9?$V9Etrj%SrMb9$Y_<**-MN|HfaRtIqwk15)&^inMvM;~xIF_b!`ya3 z_&`pRhNr?hKQE+xKX{0f`vascOP)cNsYcT<>HA1Ab%|6mN3Y$VP%<}~QE9LLcyI~_ zr~3?Ax<3s8W7$n4Pqoe{+iJZvXaL#rAe}kKOIkNPB$!6?4Ot4RnuSm@v4s?d!MgiB4$u za?~x^gy$HIhpTN+zRTa>vxms``*F$dnSNIPG6Mkh8f&>0yCK7Rzf8O)`EY|-(9mJ+ z21pl4bvM;p`#VT}@rwmforAn+_7bx7&ktK_f{E~A(NX!`Bu+HTfGWJynlyAS2ah&( zL?+R~wfNoJsK|o{0VEO&5k4L&I_a7Y60RIram>%A0YFVX-_npd85w+IYxP=rD9j$_ z2y85cb{J4>$M$n%`4frO|C(1hLrF!7zIu_;E&00!9T1pp&_lp6rD^6y+! zBXT(+rd1|To#H)`h^Jp4<_0h;lw^N^mFJX$Sh)e#w}9tF8XHa3@yfh63URwnPeeh1 z?J2P`urDDt31n{pH^_qqa+32ghpQM;vPoZ%c*zMLk`YD0vw90su9ZTCCP#?o_O;0w>ww?l#NwgWOFTnL| zppxv}jaFM8pj9oWGD)A>EMF5Oec}hXCB0OR;5jl|%v)zYkw1FVt%9QFpcGxH5*>g>c3gQq_gG_YQS zJ4sJF5})UlvZg2W-2&XUOeV^mHFmpD^VN(?z&*Fq}D4XKqjaSG&lZh z3B8z`$jN$xgwa~9!L!rh>ErSuuicE^1b8O}*e7idWapf@y&{FbGWHKk4&W2N{=Tq0 z`EJ?u*~jEu<re$i4teNKQ6aX@sP zYxZvW5YkqsL0MJH%sQdxG`;naW)&)bSj<%`&Hh?$4fdpX6>~7jx1hbm>%RZmxOk@- zVFPGwUmA*wIeecU)yyUK*K;LQ@cz?~a7V$_X*MG#xe<8j*4vfc11cnTxSH@YmT1?;9?*G4HQy;-X{RG>jjLelAhv zVFg6V*;@dCqo9D@fTqC}fWhQ_VjTw7uNQz*+^74@1vlCStkq`DZZ#a={-(~(n?h2v z2y}+=ec>PFX20wPd9puV>%Vb}gp7cUzXUKxK9wi^DgAYYoPm!N6F@Cs5T-`D@0jj; zi`o}(e5vc~N3lW?Ts^LFVrk(enVCeH4;Reo*>foV1*QBxJRG55D5c8#TdpnN*7Gk= zauVnnDMlUBZ%f?j*x+|Jlv9^a(g}N*85>J7B)wk#<*D?TtrUx-+S=D9*XQ?5)?+Cd ztH&rsiU??8N_#0Q`PR#CC!PSP_2=$tH))7YOdP0H2zG!XetiqLs)mVWe3q24Ww?a| zEsC(1df){tkfWxqk5(ZCFc%M3n!G|8b2Q&aMYrL@$5y>u;i z(FYiJsu@F%kkTNX`094o!Hl2xx$EM0;efRMpi~-}K==Q?)Zriz^eivB<(NlMo)`Ux zkt@K=_V=XiZ!>EZ$g#x8QS~Bt87$Huf2&zg^({39oPcT8n(4K0-lcTr>V=xsoa@8H zwm71;%C>+xPm1w)8w3_bk=cVV%&R)z5^qBgQCB$#6sa zbR+pjqTS7H^${Es@ zUYj{GW`&ohc-e83ZOxj85GOsFjW>$Z_RaP$C@U41dNj_IdsNftg@0YWjT>>-M&u}Fu)$3 zbnZd3M`IZO2T1?=7$Mf+s$a-TOERV}N|h<`ISa@kr*Llcot~ZUX>2vRIpe-L}XZuYo zEk(;kvmM-Nraqy8Da|PC#Db*8W01cAEpWuge+Dq0fnt!#Zj*vWKx7(0l4H%ITt+sf z_z)<7g&E_@2gnQf*;(^bAYze_flPD1eK|r)M6XE{&6E%8AJ^7k{I0>NH{h9L*oGY)xSGUM?}?{ z2pPZt{XAm>QkN;yrROHboya?v^-#@}Eg~JXNO%hv^XrwUyg9gxxCY=ZnpC}lrOAE< z0TU){Y;4N2g8B$4WKNFLtc-@55@6t>VH8k!g<&lchTp!*h+s1TxYv1Q1{e)$4YOtW zmzW0w08a3~L(crc9loJ>zpGUe`2D*9gW}1azc4i~YNF7z3|s;D`KY~THCqDAH{{@M zZx1zL`oEu-fMRo5;w{x-Lbs2HG1D(*=QGC?8O9Vdk3OTn7yX0llA5c-@>}k2SwiJ- zqpp%nA^0b*_$cW8ukHhohsYiHx|`+rxcR~to9`Q99$PiO$7A|YAtjJ-$_DLlJG(AI zE3^t(bpy&i+%a4YXzl8kE`OtXNHJGV$gui;RRVaQ#VcT3-MqwNTW?Q9T~mKulS_d2 zL6d2E9sWe!{R;&dMQ96I#d-YtGEKIkrUYycq(dh zPK{T`yM^7g52owR^aN;kGdb{&c1LzH>QNfi=5AUmI z0kBknEWZJ~r?I&WfdHT_C0x~eL7v|vcV=b=@bZTN3gin6ZfuN=)dU9!q(Jac<}o0- zB#P0-1^}cAR63}P)PwQ^uldWrlA}pPBPrA(YB5f9Y>$U|2XcrOZ@pb6%A?x3!SsCp8zIk2xTNjs!_q$39&9pQbAss z4W8#LpEIX!eTLTlA-n5KQa$|#ta083%{cy1h1cBu@vSP;l2Dy#-4fXBxdV#P-u2>m zWXC~(YW=vPNiRY(%dL6-}mQ>BtKW9JA65)S9m7U`ThIAyTvHfpiFbpjX7c*|P z)-4bf<&O|C*y=5FWsU|12M3<*E>+eeZ6~kig>!c=zkX|*nCeJ7VDl{ z-uoK$?d$!G9d?p7>(G0ruVgx>`6J zEcy6op2b0HCh{wT#dSn-qQuOAG57;L<{>MY4X1txK-T~iRLQ%FoQFVV_vk2Lh3F2! z-CpEQ<9KZ>F{`Dm-yq;?3rMp>3*~!DmQ%$_TLC+?g4q79SHt{!!9+{4j zC5!?PPN!krRub{*X>j8{`3lF--4>RXvM)^bfN{oB%^9egh1;WI03lOhpO}L#pG5Bj z7$PKVm%-uim;wvJznJcB?hwL((wp&Z?|zVXjZ*;FvRl%W@0?<3+BjF+b zePH6K)2F}B{ZZqQQIR}-c^`8a;23*MSp9NGnyy9$^tzU}=(LTn@z#nc17W)8H9&_l zt`%dIyaq1uNnTlDyhsgDspr@L%##F7rKwf~M0T=#zgIB)L6f;5)vXk55G!#nnAED{ ziP-3*e0t&7dd%DETY6u2gQAkS*QAz{&g}t0!}51va-_p@NBZ&YxgrLJ2*9eIB~WG2 z)ZPxKk=M_;D7ec8`nzs|4P#nA+(MhysN2W zZ!s|CmyjHwvV&iIUw>Y5(3uTHB%g1b{ay+OHf-Xw*J(oX!rYxk_b5bJ3j78TesZ84W#E&l>8tb?d z{yvw6;#iocwqEDFDvdTvhteYW5%>j0Q#I!u0w!@Le-s2(_crKgg~_DPh%UoEzW>;d ztJjo$C}bIZMG-qDlbs|MR#B#IIOmq#-={^ac}{4+g)y@stk|drVhbphW6W@|j%ceJ zByX0{<>x<;_Q1{!|ARXqqfhYHYX?>IUTLaX8_5@VYB6*a1sL$_0er4y=HsdpTc)e0 zzh4xo?oKam|9)0rV`Ju^W#;f~x%v}{f%A64{M_oyO~`&`*@{LM8=u@tCN@#KhEe z0*K;BVoynW8A8Jv2C&Q`dK`w;JszI!z58vXOU%W^EljeQ(9Amy3_qTqynJJP2;>iz z0a8gDW&hjH1#&m0)knz`j?~Ipvd$VF4v3O| zdl)atGNS^7d2`CF{+~g?@rn!np~&0qA3?k z`%raGOBO{{emiJHy#Aerel*RS*F@G5IV=ug8FQJc>r22F1;|Se%2I&H8xdg=4a=#n z!NI{(K1S<40w5VC{s#(O_oh=jl~eDL*a1+N{1e7DG@xg-6Pz;SEQtmTBQ!gFDsc>F zz~+ol?81iYkGlf>Y6PKc+Tk0<5v}EKDE}$hn!x|9`Wi9$&2dZWimTc5i;J+gsgrIp z$k&h~%9@d^0!?pfDxz2cYI3>q+z}B0HuXF(@hF6&XM%%>{)hCN>wL8=kSb5?878u7 zt+f7Kj0}*R@)EIT%ecgS;rx^Kjo|0hb4!Z(&h~_izQHc>OT7Ga4AM@;T1X#S z7dwO!hQEf?a78&0j8FC)&{h)F#nuq{1@~GNe&3=Q3jdxWw_MFM)%2D@p{rP5-RCyvhtTbMtQX-rF#%+e`+}hYu z#8*hFwOaus3)$#WaZO{B1x-HB1NnloYyH$qK3kSbSQRxPv<6Q#jTkRfO2&TCKG7Z+ zRf)u~SYca+CA>`aZ9Yu059ZJNF6PX5qdV5Y-2BaB0v@3s@c9%&fBO@;9YWjiE1025dBa~mT1 zS7tO!yhp45?E9kM#z}wOD5koMPj&KTGtZ$;s2d|s^}`&@uZ&|xB#+sIv!tSYanFS#A*eMV<}?k^0#~C4J-?? zq`3OZ(7AQA`P82EpQuP1Yim<#SqB^G&2(9h zCynrCb=IrXXC_ZNO!&9eG^$zS%${_}oQoZdMt>8gAIY&fkJjnXqDV3PLw%_S3mK_? zW%j&KOx&(x`WL|E-TbBk#kb(g)Pxl^w6ADcDygP^7+@zoV7djEqcoz2-}wwggas9( zbC0se(xKWinHd3wPeb=B6+IAm=Fmq=b!>$YX0FH9{v+6(^k?g)V_On`3p_=vT25j^ zHB((z^?p^_ew&F|ZtXAKA(NmQRq4g%T&~yt6}P^b)5eMMRDvx&dsiv0zYLMI8qLK_ zlgAt@f_zC~_~iVgtmDP;X}y;1TgDAk#=+|5!4Z$zb_hJTz%p9;A12K7gWEwEGi^NA zfwdQ=pWb}t+R5-!tQ9JKH*)U0L=jqnxmF<7vuqeXl@t*q&Se1%S?kREQo?pWQ}*_6l6M4)PSEj*Ms zkD=t2qPiE)Imhu+lKSTUotj#nu@XU-&3{6&(FB; zC(v#TfW82N_f4WJI>}?P>ZXIq|pW99Kq%vofXfRDS3?$_a}r4OS9B{Xx!Mjmf+Z(2@yGcO@2utP=hM=7Se)^5{=r00{vu&l=4 zM>nY_+K8vz^@blj5gzG%{EhW6C5~V5UjK2~6Vwy2=iXEF`z861u~Hpd`c=5L%$rKa z>E_^HODGh$ZN4^`xH7l)=}+EX1wXoxlD6Bvb)!kScdU+yN0U6_F~A%7@i-f_QpJF!dXQa_u z6CUN&Rmx;E0;x5x@rv%+Ev}kdFG6}!c>db(cpljS^b34ajYfP{6=~LPQVfOBPZiDN zTU_E+Gwi3gynKv(ZZL&y?PS|1pNmNu!sfENaUD4ploS>=B>367QsEYB=XB^bpSa)Q zL#Y;PAtMz!i7{Bn!Isad$0jYwJ89(bs(&Y!k%)nF)BHzf{j$*~Ya0{9{G{`` zB)2vpr>plr>3Wn6I3K>)*)>fjK++GF^WW1}1hW@xRF~vox=mTxnTmnM!vz342{Z~n z07nxaLY8&a@89|J@?yO|*_ju9c6srdZeW{U2zU=>c{7E@?LWN(9VeT<-Kyso7wqyx z@}XZM1O;5}fa9tFIIb#YFfLwVaFiD@cVnHhlU?A4?z{6XE3rDZb-|1XBsrWknE62v zi&hXaHh5bT=3MJPf_k&-*uF!iZ1FXs9QE5O&^5@gDr^XNa;R-w&2Y3?vB%tHA8Z#LDBiB+_IM&x@QyM|$=mGPHL?Pn zhs#Z`w>ZnX*K|nw;HuDG3?}y;1Ge0(qCS5YpTkHS8=#g-y6nm#flm1`O$Z1XHgRaXFnw`%|04U zXtb#byKMVTST~sw=*V7oUTnX(<(BJ#g+_isk(M&Vn0Wx{RhgPFdgpx25eT&<1&n@@ zldSH16wGw9YLx2dllES4(V)AROnxf2QqcbR>wp&+M{opXjRmR`eTRv9ZjsxAcWv|K zSx4r{Odi_~W!t?Z4-cxgdvVm)n;z9&eA6=t=Ei}sWS2~;d>KLd0aa)LGTUdJtEsJ0 zp&q&L$yPb-mkR~_TrJTvhvxx6SeWAbb$?)4v$>@OnCB0((*Aquh_!l#r8DADuot&< zc{es(819Cd?6iL-epok?zp*~vlYo)6bshl=u#JwSiM+f22?!J$Q$WLQAi3O+t^K}W z53AGhTN1+^tDlaC7q{2%^eugScJ=Y>s`l)4u@-%vyQSMxANW|ee*^Ro zd3II*1^P?Tem38H9x0w|;a?6hGLsVx*uq+Xpq7mmd_Y0=%b|Gz{0+rWka_FcA5<`z z17^4TUH~*U_uLLDG4epj&(({7^U(KZTDtHmI(?9TIgZEZoPSj9h8mKhIYA-tF;&$r z>V-dQz|ve?yG`UGPzNTWI3B)?WG4>vRE zmeiaTYamF@IT7O}*ZpI1E*^Mo=*Tu~SM_l#&HH zlM92HU;G)##aO3Qpblp=LAyHW`KF_Lm@P%)>7cQPV0e`oCw`j7+|4*bv$<3ZHqI(3 z9Sy}2H%v2#Hw}R$8o@TrL)`U&+S^5@b;orNvXmw^jH(TzzJE|L0XzRb`EntKK4mm& zyqYZwBB)e;&220#rbO_ZGV(33!i$*Y5k-z00B32kBk0vp4Y+QO4H3s+mlLaUNM&<0A+6zHHD*03@TE*%8NbE${P2}&t;`8cM+FKy}HV*NpbzR)$4sP zd``{9UI5{N3bo}URKYhhk@mGjfGKTWnLBN8w?%8tZr3!LXME(FZEg@@`%D0od!7H7 zsych%`P7P}BGG6McTc-I`MJ$`z+Rfzgf+NpWpYcg^OBSQKPM@hLh>OOqGA@qiw1Jq z3}H?vEjWe2FR~B+s|(@41GB@1g!a|lYR!>c{8rvgkD(@Z;XnX~tUAnJl43`c;uko3 zF)9>S@F%y8Q^G@m0uF8Fu5}-SkpY&Ioepn4bjRKTnSvQ|mPzt4Q#S6Ny7^*U%5Baz zt;#y5faWip;!T6NL4s1&OSIp}kZPmFN|M|&hLl%t!zyrDvd=P^&mKVgeWPRV=lRBG zzDk#XCMq2JPI4HX9l0ZmYGrPklNN-ojrGjE>By_0djxt|rvY;!Hi;y9`}GTX^0;M%wq@qE^O`Vn!qKYT6uzn?@Xk#azE_8jZKCEs|3E^6*2qYwGF+4^!{kCxZ zX(@l3S~Pk~7s;FBSMFY_l+{9}I0|F4nnmDez!kc>$;+Gx6>Zm}hjUSeQMFMybA+rg z1Sm<6==B5XH$~bKl!<;c;!4a_pW*7TkbBGR+OUf_ZL=B+S!S=)2SrkCN|Ov55P6$U ziHz1EwelGb)It2S}*7KGVi(@Mq|T+;a@=43oCYLb8&7z`&ga1=!BwD16eIATU2I z*t-77m}|_sK5W<%-Bj$6+Bw7X$J3&d@ZS3Qy`O)lhcW$1Nt&Jd1Aig>e<6jmIM*1P zo6u%Xw6|&{GiI#}>feeo2c|2_s9q+?_i{m?yFo1ZYZg#GBO~Y_*trI5{csx)jnO-e z?ym2K=)HUswT`u&G5u?Xcb_r3lvtq%syU;x1rqeX5c{#Hf%g1}EygY6*J;M6pmdm| zBNG1mS3h1k2FQ$OT9i~n;^ssA4nfPX<8UzO%}eNrNR)b|y3r{lr?xqT>NWvIctr^= zAAL7Y(JA#!n`W(HpCeAAbdC@R^)xQ`VtKSJAB~RK$du2lBDCBp&He(!8;GyL$}G<5 zjR=uJSV|M>%V+~hWqwWFH1ROeX>#?IwW*vs~~`Oj@BfxDN9T%xM}PxVYz2mjyIcuNEL zN}dqHy^d9?-%__ejRbqn2VQ25q!U$wbOni{q%mAsRi z2A4~Q_9o2?fV|S7IR|X$Ppd61R0$zjwgKRw?K{r-2 z+8dCSWwc`ec$`|@EqM!TBm|T~DS^@A&Xgv%tlZouxd-Zl$fyJo?UK4%VUKZNctq*5 zvyl8>nMKiN>?P-au8Ow^s-GN2U?*3!IVn))AL<8;95aL1D-a$$ZBO4v8{C()rOc*% z$cE7B|8c^Ezyo?pv&PFSH%NIjk*O`n!Eb&Nb3&-i;0}cV8+D=A-))Jj>=t;@z6L?W z=fs3xsYZA{NBoYO33!enn_v@Gq!P^riY`I1AD zYzJFpvd&>MF7X?!Eth1ib!Wh@g5prvuZ7OD-j$0G{givU{ZAOyd7f_9KiS&e^c@{v zulGIG$Gn8tCptQE#{W$hHh0&tiD4Pl)fLVQce}x?``;$0XccIJ zFqudUaEy%Iyjv@efcuSO4->)zbHcrH9$oseAX?VTeM0ShZR~wrO&~mwc=m_!8om9WT=}{%l7@``7hjYvpcXhY<#EuR|U8UXH4^ z{uRkKkDnRhZQ$5_NL~Ez<lf1v zwJ1gG9p!!v7Xm?Dn%apE4J(>&W&i~)P!y$v-GfI%6Ye@4SY|=3|EDC1FfVbdlEEca zzce38TRFppItjTvutgk3Pw%c%z;{Pz_arFxq*8ap+=h0cHiUn2DdAi-o~rR^?=hIm zOu$w)VJ}%@^($8fbQI9RidmOSpmJ?ikuy(`GPU;JNW&=ni9EnBndTu%oo#nIPDhG- zT{8k&mBKtigSktwqN(~GC^9?kIzIH>ioK6~MXKd!0n!SUP#$v_4({~phlC9&fvpI2F zbO9{;nHZhXJ#}@lD4bQp)`r)fZcFt#hWTRmzSGkNyAz?xZ80nS+*G{7uSXULAtR3S zJ2RE%(Nykc+{BF8yPkSQ|d)1c7M_dC5z9hx>*x+R?ePMNtOjHT$t!lNE2KB=W-R%%Yr&P zSB$NnYhx#WViGEQw{8iG*NyzkVo>_;1svhDvg-#Mh3t|oShs#pcf-?*djsF+N6KME zc!R$W?qE|6%@wD9_7dv$duj3qv5+HlP3_rO^x+Qy(C#owF%@7*q~j@XH!bCV`vM>T zV&}MpvveSolF>?DAL}82zQb|XH;)0@S8XT606k!l4z>7dl{O1JusqCTe~}MP*f-=@ z>{+NSp)HPai?m{4CH7vn$^3QZs{~J?qZfl_S`Au8R*6;cZex&lpE@l3qht(EFVgDT zV>jinRVCv7H0zkjEYbvzihbOx^QUwsHt}#ih`;-p^QHZ=X)v{#Gh>~cyDx^-{|kyhfh?6 zReg*Nan=P3_Jxa-f3-TxYAnFD2Ed04oXofEWZ}DCn|>;dpvuagv&g;4t-a#Men+i< z|M%oWfG2-4>TdJ(aKI3qYCX%@Qa2WaQChK$v}GgvaNzmz_b=c(7Nyvcpo)h2ze5T7 zH@rJDf#2~Bv|`36PAi~4Vdm->1Gz--F;I2QX0-+gH9?NmAc13?Vp*?#l!wh*a#d!|^cij4oerB@C?T}Kt>&ggCQAE)UjB8ygzOUU zh=_~o&tPLNe_|#P>rdLrvhaP+RcYV{xp^^a*$-qUmgcsOLonVYlB|tn{ejY;>PJ{m zp{JH%>v!RHcjLJVAANSO7&Ri@7^}YlH!MBpPR`zu`h=ez@O*prrzIFz#Gm@?Drw&l zF?+QNY9Vq|V`+B5vSeJ}TgMPjU70m;-9-nVNk+SLs;>ElUa0VNXw5A&OuYJcUbCGI zCJCb#JA-Kj(I%oKwlw_WZ}@II`(OS|2W9?Oep0R9Kao#HfV|VXnjB{rb}P^~^Jh7m z>ONxYJ_mU!ugv)_w49X(>!${LyzO8ZIiD#dGfZv8rPvJuU6DR!ngQJ`gyI~f($NUN!CDEK23Mj22e*n2LM%Bk zs8wK6tJfQg&%&OW1x3c72XdRqLyHbUj(pSMj9UdqRT0Vb_+t;*pGPPqaU^1jZ2u6$Y@wcQ`SXMI`hF9<(wTO2z z5tr&mL7wWtt$jT7YqG4JYTk4S;AdW$iCf%v{|d47cyT@r)iDmWF%Crsq2k>$ASMuE zq<>Orb~F`{0Hrq|`-g!jC?Ro$&a)+lV=U;m;5#4!sIuV6hH(}WB8pgl@fLXgnYCY<`>WB59OK!48U}cIzhQA7-gIRXY{X_GG(SgGl z4lEZ36WmK-bFpB1KIiAW{l+&q>w-B`e9Z|``y{s|3QCT%NljXz8bN7hK&!sgrPoH8 zp3(W52WMC}fLq^>IWs!GVaH^mJ+IM$LhgeC!s1(YiDYeWwFiQRGf@UHWg@c}HI=#@8G&{}$y>fgI1*ta|^Ubt5 z)*XRZ>3gSW!nVLAl*}8MG|}G`3}I2ort5SN!nxIoy|5rc25V-8T>Bg#%}Ro{y(+!W zbo&`GXx!*|d+Abk8rlPFViY=!w=nVeUXWI`WU+vdY>~hFOZBMl!`DBm7b5`B`hM8j z$isp7RPKA;IOLRwVe#Fd@9z&7MGRl5gyWjUbzX8l`wGfU;lA@DzR)M)JdVXx%IZmZ zY4eAz_=WPfSNvp5?o8#%hNQ=aT8269FXq>7C~44xcMi{izFKy!xY5lIM&k8hKU`J8 z#{3AgrYY=-R$)66UwiTAI(TiLIN+*+;^SIek+68lXL2}Si1D(+1K5TXh1Id@)$sMW z@Beh`{~R2hh~uRTyWc?;7)2-h@DCj)d0qp4z;Nv#)rE18RxO=SY-zdr9zS&)3}M5c431$vu4qBE1&chG9nfpErcoZF*O-Z%q>0Zq{4Y z+=3k^L?5><>4y3Q+#ul}nWlbBSu*03y+dqqL&XhaM&BI|O;1ZV8?JF7Ri;Xpl|NR8 z`2T>sJU&k13KFF-t_u5{Wbxk9oV;Rx+u(gEPyR@qs(0x897*H;J#!u!i(NIQ3*m#7 z7yCc%LV4E9y)VTr<_InPcmG5gzl}P4Y%s}JP=DTt+aDp1k%O@5L+1uB`z`t%HDJ$! zh}mCYIB%jqx}@VL%2WyA$0x_ajCxlZzwga&o^)u?>+@R7AwJb&%%!KYZKinZtlQ_} z-)+TTxYwm<>l!}aH|`QcW1RX>a)udzCgrhDEZw1;GB_!H=4$ zdhR<9zkf;0s_VEq_wea>Hrec!RcZh1QnJmkKrwKm;UV4Zm``_C#GmdgXdvnFkBhm= zcU$KR*0!1vhT+_GJ@U$j)s^;J!YwGYG~DiEZ7PB9I%!=;XXJyo-zE2R`G*z64NyLX zmIm#2BQ(Fwzqya&>{!eXzsmh&gLCHgm)pArzh?InQk5<#F}s>fRowPx7FUB+pNd`% zT{;L+^Qf-fab@D0c$|H9B5>LJnd>#jnIS*~+&*^4XgnRetUy%cCwaJh{Eu4R&in5E zQ*(gpmef3~YSru-osJ~MSm$~H-EK&74y{3E42f~ul$a^c)NAkpauA+RxgrsOQ`zUbs+Lq7Wfp!$yqM^dl6Qjvq z+vSLyqpAL|UbCtvS=%L@dE$}4;Jx{?`pD~CF$#m=c*SZ(o?a@DUejdkssH4-rlm&3 zd%h#Yrep0v4#vDCQs^70FgBz1OG)~vvKM0&taqPo(j%6_n~hFr4F2>94ahKYYRo(d zqb5d-o|a32zNWaE8YyptaFvsx!|gag6L&&*%mLI^VbVU;DBOt?EpoCS2zD{`~$fn>#b`Y1+he5QzS~=lLZ{ z*p(!_s4IbU z9@V8UFvfX%{t6M7PWiur>1Vu};N+cK$($0&oKijt)->=Ip88#7`>AK|S_P`Q1?pcbeVc|pPD0UI1+wHn z61wZ?&V9n(R(b0#Y0zO}Y|*N4Oe3vnnP2>W113#CKNn2m8;`d{CPy-;1hc@hP! z^PObef+B=&z#@QtYn25!VqNY}&vAGnfjbVnmDqf&RUijb7wcs(3L00JXh?EF-6@U` zL{zk{1SS}&I(KW-LRv=nk89qYe zcE8aTQ78~YF18&R(p2*H>N(U6J9#tAOtyjx;VcamWuVp0B(sX3=-vzXKELWppojrF!43t%A_Y8l0&!9-zdHRbV zW0hf{KOP!uP$UD&W>9U*2%+c zUpY*v`6+aaW4Bh2<~GvifI%Yru^A)UA|3f-T$}rVFg1 zy{BP%O}drtlYEh~5-V+x{TB#C0)o89H=p=>D0A?B%Yh~PUFVMdF;)>32K&QcFg?9Q zzj}m8Q8P8w^^m;VL!DW-{cq|CwqhSnQz?%49xMVlRbUW z^kleF-|$W#JT(7~>!J7^4d~OkfhQq=%^29FCt}^`{cZMmQw;#d5%&BnKwiywxS&{-(2X*U)bJCaO_BbmsmQ_J<}Y z;}KHwE7WTkW!*%G>M&Y3=xAMt|8z0r{gs@;RxXgG@R3%IRlX$HhHy6#(s}+EsX2lg z0-;TBz*1fz1gzGXu`;0yuzIW7hO^AnC>b)=9lyAB4ww^Gqt@hXx)1CZ(t@h6%me=2 zvKob{^;WjfcAJr-dqIziQ6T0gAwBUuOmt)jUG`{u{U660(yCnlT)qtYaPa?U^2K^?*0uEN(kwDMBH-DEs2swqTZ(u82H3XzST=w zUDzT(X~Spcc2nc&mi9&A$muRt7kok2{+5>j?p_uZV!7sfEWb1uvU3G?ULFv^DZ zS&|$5=s7(vEYnWoz8|!3v|U#cu^VW@NFw(Tm#sHd1>iAL3T4?uR)Dh^NIen>3tUG6 zNA)P+yj0*4EClF90@^7B^3J%OLH#sj_D_o$vyzD5j)hfc8b`SY69Wzk;UxH6p318VN)v54@n&Sv(txyycolmUysS$W6l} zU=}GWqtnbYv7#u*Rn||6npt0eV^i5s9KT~i!6~R{qRJ(D?q
o>57UeiaFUq=ZHuZ&;;ZMn6|p7sGBx~0atuige| zrh2SW{>kC|O7pf$ngG5FrrMRvaYhfML$#8NYEj;*u=!VZvw_%FaZ4ksKu{hp`jduv zGf=%WzQ;*UP}vwX;F#Ls9JM5cuV&czTI+WLK*diIIAQ>BLYL!_+vace7^i-_#! z@@Vj`AZMBkWwot?>%1i{GnOv5=y`t`tYlh2TwMY_Yo@o4=0xa0xG-BDK1d(4QT1C| z4^TwdDdQXzg&Qb<30qGa88EplN_kyCsD`}DW;(N0(dY=3m#RU01Pi?vIsqe$9j|Lp zd99{|a%av>C7u_*zgteP(G0GLUUWM$_3VR;HBBScidZ7mcFCBqhar*L*zak69vkuQ_ahYeAj$v<=5`-3?E#-tTUjf!Wix0i*x~%JTi2PezA#S<*HFCLkMc_pfHhA}|Qt(Q@ ztNqghoJSqkZI>OOpcbyd*HW5S8RaSGW8%};1A&HI(z;!^r-KhIXlHw7y31EyE`ct0 z`k8_GsPxD4Ta)Wp-F=SWUrN5%Wvd8vb-lzzZy+4t`pPx7JFWEd>z1&?Q4yba2Seq0 zSpXtUK!a}8uZR7;Bajo}^`&8@W!7HPQc6^Gd;(xGP87Cze${w8iuewloSu%|I|X9z zB7seQfL!)i<3U*h;35a87Exx7ApiNENYxBJ8W*C3!-HWSpT&;j&yiOFP$+0^A2|DC zq>hh|MGY1g7qhY6iyeU3@SpqV#Z4}LkX)ZJ@2ZD|1r!-WQG{7bzSXT3sA(zSO7st0 zR;(1v5Ix7ByLoE-O8E>R$C%9n$tPuB+-!jy6Z-~7Lh2>}#`F(Y0|Z!WWp-w9aj~u-nc)t=7X-{0vUl%JYU3m&Bp$q|v@LLJ z`Z`XLXl!%WdqJ1wfI`r*R4hA$nT3V%@apfcdfWCxfZRdE9<6ByjeTZsZ5?vDzXGg- zPce5CV?|?{pQvP&bPM4D?}l5W)wp^MIL^8jW?@W`63_S|OyhOBy#oYYYmw+cC(xhp z&!CL9tgnpkWe`Z!Fp%{}*Va~q*3d?r7VW*cD!l8(FU&?n36zRm07B&Fr(%8Q>N~MD z+nN*?Y7~pFa&w2r)0qWbFr!)QnY3NeA;sP`%!;uTvRMW$pI@ce8^r>-MDfToZR0ly z<`qDmb~+x2eUo!~pCIz;X^e{cytcFJ4{3KFAbId$b$IjPoUYvXA=@^*$pwg=3k6O_ zp&~Pw+8 z;l7;g`>MiMxL5N-$DUp3Y$htMouMWOJ0lRsAFZD-la6S9mrQdTGj8Tp?>k5(<4J~1 zs|hg6gv?C+_eGZlUv!VgthOTm1+1}&R-Uh|ls_6cWP2@IXqTF(H`|&R+PnC=%NUyL zXn=QdFOeFrMsLAkl%gst?$7G?WRG*(pWSpjbN$lF>!8PM#`XP+$6M=%d5g*lG$IHs zeq!aeiUDsj24K_&;Lx zCz3pv;5BWz@Lb<1phGGmD)RL|o=;?fq&C@Jc#FUI7He%dVkEpd*$BAEKeX)D{hE@~ zexQ|^M80{%+uPIY@QHFmxh5Cw@R-_g@Vh4a&L*U<=}ObLZ(}x&WhmZYh@u#WpJG8E zu4n0n&+<9&c%f)Cz6)HJ=#(-AkRe$-9)rylJ9NsOkKemQbNQKh`=(D^>3vlngP!X^ zYun@IGbrE=dJ1~Jf4&X+(Y13$ck#W)Z`1!@&%u&$+0R3Tq>p60f!N5u-Y$J2e0yGd zf4bRhZQ?0^+fb-()TxHxGICQ;4Lj=Adc4tP{tRwj5mBnY$fqW2>Z(wpBy0#7@MTb@ zBJ&gTCzUce_dtLGbLL`76r+uBD&@>mY)72;C4y)IaRqp&9oc*Fc=3Sl?HK0IKEH^X zwcHiB?NeU3Hkkq9hVwY{!nRNMeXFG_1P@ zC!FmVTu>jmrjHIy=2sMLS zg+VLqq0)z+2w7_Y%NQ9Le-h!SOouD=q5Nlgclq~blICEwfbJ4-rc%~s z@Si5#8V=#@$7X`MfWURkd@IWf%tEx?Q$@*oy!pFB$;>Up{qz!ve91eeJ9g~hXG95A z@H2H;aaD#NVifm0HxcuR>YI`NL3)j~0V0TI2xz1cHK!$DsGmJ!jv5aWP* z@U-{d5&7NI^f*9K7PYC7%s57&5zF}9mOzC=9mkOh&RR%2LA03Uox+5@Giac$U)ZdE zYCbcD;}>y)C#Guyq6xvaP|)f==VeI%ZD;=- zHU5nTvsQ-D8nVCeLQcXgyadn!1oaZBEHUoaPXMc+MwF49sq_OjKXisg9i(iU(;q-Z;~@Hd^oc{zP+-x$UK80G)I0n!{5)v zLb`l-A#X#l^YqCAevdOtX(q&CL^aIkt5!0eaOVHW55KE{{P5MH#TkhIchNq_96z$m z7q3?0lk_onacQyt2_U@O1D~F|sz6L=dCZW>x|o zETHdJGqsE;)^O-GxklSw>Fd?RED4&U)fSH@bNeMJlQqCabKU#ePp9;ao~ZJ}Y`a95 zRvM2@5X*N`Bh_udF_bP??&NX8mfut=S64+*GT$ns)+cY+Afz?7?x4oK7E{KSjmSgS zOdP3$ovTGtf+_Sa&XdqEnsAnmdc{QTBhdR3^CsNH;a20w>b!@M`n7J!O=arg_-aas zs_jy|*6Z@&al6#PN{EyQ+(!*(TK|&kC)%@qok7is6BCMR9_Sb@?W!|E22glD;?w?W z`!iJAV?J#c+zv$=J)EKRbEIhMT~6wc9hYYku#6DR!VfB*d4M#bTUnk?eqV8;@(NPf z2+8Sw8tP}Nt0qNi`&v6yx;ILr@^j<(3T&6@>c2AIMDyLm~A6f>!}W0umeyyqcNXm|PVT zv!e4n$vSTCXC^g+*B%EY>ECk&3GmPYzFKfX>(kI9;YLZQ4w(hNBr!D^eAd*36{6Bf z&=K|u<$(j4l2U<;h!tGVcmC#A6`;YoVv@=uitor$)2j#|6)sgXJ*7>FMf5w>|>$XCkb>oZ}^rk?c(Zr6lC?F|f~(^AjzOrYEOi!#nu41hVyB z&trXL0q39n0KODgJB1j^afw$f^%;VeC|Q8%QL4Qr!8Q*^Na#Hsck;q=E>|m(lfDWj zX$&V!~gcWu#D8R8Ya&Tbj ze2W*Xx=St&16{h}(6;`CI4qAP*#g|34r<~xKdR(YP;t2tdi}yn-W~pc!!YoTneGc{ z9`C@8+MWi%MJg_ThPi1vNz@avIpYo(p>_ey3#5 z4rNKo6ZXRvyrFVoZo|cusQCRdzxQ*@gs9HK_M#*scaLDMY8zqt<5H`2ty|Nmqjnnewi8>q)}n|wMPZAAxyeKb-=vNup>YT( z03L9@!gq681!O?tIFIlP#qy{`j!UY8B0kb=mlISOt1Q854e>-R#@Y#VeKR3OfhNl0 zQ05FK4u_2}i&^*Kh2@`1;v`606;FjJ4NxVRRa*6xc`e1$bD#k%k>>GtdwXg?zyt%l z3PWt8DSg5Lw=&u`bB_=$50f);m4z0Ql$;w?@iBC$y4?WNbj}&?kUrxW6Q;u5UU=$R zQaug{Z9N?0h!C{lAkN482erNU+Xo~ki07+L*l;OfN*Ch~Ym;+*&{h6{eRRw{Rwbf1 z_6ZA#)a3z6z2pXd`G_eJPr5~%pM^5J%uhpV5YUf>{OzY2cJAZz!t2m;-|%^JiXKB{ z2aKwI*KhY;8~&S)LC#_I5dI=vft7^7Yc8|F01RP6i2CBa=##ZUA^q|SX$)<)hDpoi zqxF5o^NQzT5YN9SYlazu{TKwnLL=dT3eiW~mBW^$P1mDx7x0zlPkie#yWg-AiB9Ty zzy7a!x&0PmJX5e%mm0{x``rKGp=X8Oi+pk;@N7RVAj*@JPgh<4(6a-=l?3|{Jr8dy zJzfHqCLg6xSW<)`)TS_n6O#sFHiI6*0EGu1!K?(cknge$jXLc&Z4dEC0(1jFehrx}~2j$-xF5zH! zC<)4-c!eI!IPs%>i;kdU*MxjFsHOD@5 z7y-D`e1%3w2|qY*#*yX3yrepU0I;G$R5;kG!XPRyF@nhq)=`{bkTEt+VyaY%(;7yM zlp8H@E;AXa0-wzo6}O-)32CzLYSG|;N(L>dfKCX$IX@Z{`(lV9`AkGZFfAfFRY_9x zmxCLMhA&l<$e{G|QA!aWp+X?|MPlM0t`F}JqBZ9Eqt#*lQ`P*cZ!0vk0eb07VbL5e^iZ8XFiGn443#f2Sz4<`VcO z4D}HSik1`hR(e{^ozB7f{B*73V)cDpgnevGOvbHy{^w3^^7>+acl0^q=N%Z2;6ier zT`ar7DQJuBw1y&UhJOPH{humGJEowa0vVn`ukatR@Jx=>fqbizl3VWiej|nEa~00AK2`#eJRu zi>i;hRn8mr5+xB!)AddBzgNrt@&@^%_)7c|NPY}^s1tNzPBeQ+^Z|)9x_A&>S}Uj! zG)pU^InDMOwzZk1H5UcLDn1(~s^JA$I9=(qkFOxfgOp)Kvr;LZCh?^buVid+mfrY1 zsK}C~#7|@0z)4*hlm*B2{!$wq8hm7c=d)G48*_G=Gd!>Wa|0 zZup4(>;w^^V6LAya4m=x%u%__zRUta4y%#8@jNlVeB39dq61{Zy*;Om2DjtIV*?D5 zm8vnj=MQVpC%cIcg=k&ZYu-mSKzkwZ30tIp+uotc1_ zP-^3_tufW-{8NgRTe{;uWk_;tqdF%ys%i0bxyg4f&7sRPT_>ezv8^q33pub#Ci#0( zzJQL7PLcKoh=KvT#&5tvWDk7s=2mgvzidDAoVI|cF2F6U6XS&7uZk*6fs08vl^h1n zCuV)NRsK87PV^RdBMMA+2=`9_naM#+LG(J%BHb3#23u3~n{b6;4JOG0_GK`7%XtIv z^~IPy&yj!h5T7~@w>hVH*E{5bf8YZs5X0AGJtgzD49~`Ce~uk$oG}sDfdLKf(w5uE zJzzotW23CuzWHdmdf`7D({#WrPK^H8+#}+_R_5=nxmz< zJWfkwJF0-fWD46x2~gp6SqQiA%US{<2`^XvR4p$8g`lvmXssw;13y|?XO4j>PmboK z=btgv`{Nw@@$kTWzXKWl;_N91t4VJT-^(4w;$T^^`^waEU zvBv%NP0EQp%i8S1B?g?dDEkTAEO+U|)=<;g`sg_13z#CIho_jh-0fGD2Amry-jlgZCM{^b*~2i?4( zs!mK%$O{oalV$&?dR{xkmn!5i%&PZG6oqK-y|oU)?gBX zskjn0#B9EfC({!ta~3b8$Z;JgCCyPbBdUct_aYs?YsJuSD%|?U98MWr?QL|yEXnyl znf!EGkPBnd8`(6fKl*ySSB0LvM1nVTM6AkZIdE9)Pv>ndZt7*`>?QB*d_0rPE(h1ZE4XuOK(iTLjVKUHvRe-KB>v47S$(%eePsj-uX(t*yXaymQv1U=%A^Mykdxvx#9AgO|eEJ_lHU-ttj;?mgIYe;Et#&SdHzAb)v^?ECZ( zfhtQi06|>H>B}|FQ$^KpH}vchrlxlTSw2vFaO8&f3o0! zQaMvf>!UN_4;U_2<6ZN=xQ2}qV>}c)P!IWoNNsVP z*}LHt?7-XdNKoAZ6FAMLOoxNaY#Jt`_`%mEI&Ajha!&Q77Xuz1-iA0LB7!0DPIDa8 zjAKAScnj5pHQjLEUrMJCzj_4p34Jh)#6#?4KN5;d;OZ&l2zW46K*A7Z*QMk~01H6f zZ8aoP{Pe|n)4wsYSzs?069`fl}yhMnG)}U{)>sOH{*F2>8fpLC`V&}6iY~<8y3^@X_k;(^$I5*bo0E2i!AaGAL84#M5Ec5&k=R9) z%DKGE6|1-T>%m#ofPce~$O>M+E-|_XQ>Xw$Z_Lax?u5#ua4M*upddTP*fO8!?b!}s zauwjbS|k$P8~n68z7JLSf_Z$14E?$vtmXbjdQR;le3;^|{o#IW2E>?YvA`?mK>%&u z_di6Uo52sfA1><=L*Iv2;nIa2M`oI{0DXAaN$gxie20>gL~r>%t&GtOsERs+xg++= zx6`acHS%_JyFzX5WTHWq5_Y9;#xltv=Ge1#0tf?=Q^n)RlYv8#Xw4~JxMQPY5Y`%~ z^9mYsg~%85(FNQBIjR-18gHer*NLJ21Y5L9{wGs<2aDJ58w;h*Lo$iz8flSEslH_0 z&2gEs&k_2Ue1Cmo8{x>dbfIcPFlT$Z(UVnu<5Dsnv-wuy_x@XEn*W@ z)oxXVN%82#yQ!Q@`>PgNQIiK+zbG|M_tO(ey?+B!LA^q-LNEMB4FhNv5q>Spf3z(e zV%GUf6%N%=enML!852L=Tr=$&^kel{E#TN6Bei@*7t<@4bzX2$$d{HIr(iB1kk)Qo zD>jw+A@7u`sySXN(!$SJozWxa~+KfyovC+ zy@{`r3!O8nMZ#z48GREE4yAOS*)rlTQ4KhViG+_;I`4ETi-7SaOlHvt%Ki=ntk z_N)3r@rNBc6+%(lbAa_vG*Mgsd8xT#m?qa%By8t+VvpFi^LmI>+0|jE(usw|=(_c! z)UI$id!&?4krD(tJdi8xjYFjxqVo@ZMsM#Rg7saC!!@ot3o1Q-$Uc`VqZthU3 zXu5E+uY^88h+Kk0jZV(YyLojphZnoub7CAM!Ww>+amcu{E) zb28}eDedm|2R%^bV_DUZxuAbtn*~pWwgaeQW8h8w*s5Frq4hA0^nds}YBOuIHBW>{ z!s|#PU7Q$370f$3i>&FNJt~ z7_G7J?XeIOge(Dm|LYZNQ;YyPkzFXB>0_xP^8<&mn41H-qwB-FFb2&edGu)*8isU+ zJNKogDG|lb(~Nfl9}9?Kuu+LP!vjkVKm}-JW#|W1RHzf+G}}jjIRD)q$tM^a zw#X-5cjP^epeLfR8+?E(yTV=s>e6jY5&*;sY=P;c7?v?B$5v#kIrffSKr?BLAvYX? zk4BkC?ARVsS%`CSZOVj=_LzxCK4;7;MgZmn8 zUvfW(WMvS36T3@L5%E5wXeos0=ZX>02qiN;@0Z|CptSO@fIX9m%v$WHgd)tKcY8OB zbcyk)^Q7|#I5q~IN%&pE6X7##Q5LL_6VtpX;ML%$M{vTlIJ((7q6{YQ|Hs%z9%^R>}Q=p?+l z_4j=%o`m+mIxsm&7xd5;4DC&hRvI)_>8s4Q=2kmJRi6_J#$e4Rn_Abw5r zs9nwn0k2Bq@7g2TyP5!@v*1)mWqB1lj-0Ivqh$LV^{O+p=d)ZM@9b}+e|K3Ld_iui zeVJEewFRvk^>l!Gf_Km_uKhYQJhoZmz257*aL*J*QE&PF(!5aAvK?lOc$)KI*`CHa zCn!4G^j_NU{mv~=sn@YP6%@$=^0cp5ROWC2H_v;15Lagfnotwn6Pf3$JkuVK3>0s7 zv-{+0C(hxdaNS^}L&60!oL_b3_Lh6HCXADN_`v6!y)WZqV)9>5HIeb|+iX`zTHZV> z!`gBxe)1bn70ruYI@+sa^d-FG4x&S_%M-0U8_nqWZenAnu3^x0^mFTF(h%}@|6Nej zl`_=Cb~K#y_Wh~f%@$UXY&_vxyJ4{Z{Gv+8Z}n}rLg%|)WO-VAHS)iqy*mbT|S))enei+$UAXTFzMR(QZOJ& z<3DCJ%qj59Kzso#4jxy#*&;>76tyMwMkv$)3fpe12Az?KNy0>`Lu$@4rD%ph0Rt^0 zYg$9J#fJO zC3M3>s|AAAZw@GzHdCO}=o@dd=S`Gd0xTD%Q4UcwPvk~xz`bX)b&7cg^d9jy3WLwR zz;(rK1}cdFXv+lbM0?D3H`tn^?ZsgzKIJ?HijD~X9mauR>PlagM`CFq`KZIqK%N-> z^@qUXDqs}@Kc57FMZPV%g6I{cHKFO_-IZo!Gs6)$zY1$L-7e=T=T6d3}!it%28)-7TgrsprwVV$nU}# z#RJOmB%CBEaK&p7hgG}EKh!4GlA#sga++n>P*8G*Yjch6%kLxNQ>iLg5B{`n6o0e7 zsPu|3V`jgFn+b;>CpR5wwDuCmvGqt7eZe>D9c2> zvcN)LX`r&$`irOeH*YgRrhwuk@GUgYt{Uw{>+HE=uQL}%t$Gzq2~F2OC{ut5&yIn%Wg=zH>6`=v0i1)NJuec<pudn_V>_?xq#{9ZE+tWN$hpZ?@2X!;GX{*O_MtC zwV4zHhcIh5>2!eEtAxnAe3GNG1H>??C=G{WSveT4U;$I?+<5E{JV-R`cS7nPR8ano z2bsdpem-RrK*}tB++;Yg340fqw+p*d>~v+iwbW*+fzJsO$_Oq+PX<$hpA>FXsWtbL4*OAfr$iT)m*RsJA_ zsPy|oIrghfJJFD^&PQTeQX+Zl5~sOBN$vU8Bu7O zg%=t&_WwnT>s}__c|Gc?xEqAne{YtJDO;hN?2p|37`P7mkHiU`)=EsBNIds$_Ya(p z6*P{$$cVR6%17g!t=*BWp`~%yis}C7%Ty@ZE$DhRl`dm#!AI+VU#WJ_;PCob@aB(T z7}C}}kqIGJ?SeLg{!U#O_g8-Fi6W}S82RVO=3{@Ef^@a32Eo>So(eD@VgK-z2(#px zd^ozP)MGJboDT_7X=#PgdBE(S=x~qjxapOEY`+;~bJPn9CS)OBs?i-!*`jq@zy(VQ2^;)DNr>7Dggmfvey??X z^7NIGIut)3cGkQ>*Vy-9& zp}6%}e%T#9$H`QJc)YvCaJ$YsxZK1KSa-*nK~aQ^eO$*ux0)!cL4JPs+LlND;1fi_ z8}?pG{oU|=sSFYCW}V1$389|9A|31yg7jQlw99kuJE=$C-H^7s3ViB)!4bzcNnB}Z z>4(}+7LS8f6^)Iqz(drX`|9e@2Uwo|gI?%>miqvEpbo#^X1hOVap}WU!gFxom84$iU?RHpT{CEiBsR@rwdG zZ{uuoQA!oK$3wN$ziZ!8RHd*$Y0!?83n=0Jae1X)D^|yx;TjuqB~tfdVx{XBE9NCU zh^T|AG<7p!r_yE)uU_@b{_(MdiG(t8E>_3E_2)z|bAtrs6aJV&UcI_hI5o|zr-Bpp z$L3^*c!5&d_u7-^&?baP>Pe4&0@g+#!ZrRn9V+z~gNN|3+>dyJS0W!|`2)TyELMOI zfHMt|J#-a_<2u|HZ9QS?re4C2Oy@OT5&R3st`+-+7t=L7Y%+VS+7bHGX7&S4io$9D zQZ}2_zc2QDVDO3FyFrHblI%IE5wMNlMz>$GEOBZJ#v zH5zoSB^@s}P|L*k`rn+{&Xv_|G+K^^NFLZl|LF0$T0D+wQe|k2d42Vy7h(2}q^qmz zK$v=;4cAr7pi#eOKhCNt6NJJocGKy6ImHlBx2HlM`)sxd;AkkmJT6I7!wK83<(2(! z^q>KlB|zlrX?s1^Q>S*S(NVy0({;8(c&bTov#D%4DjB}2F~L+zdRK}?cOgq-E=gxe ze|lNX{_qW#myUkX!u82(U=9U@+lcDdYp=8qnzURinWo=gl#m2AlsiUM3dg%-h5G`g+-jCc$guccj;7Xo=nxPw-JK7OwRBS4=AB` zo`bp~>RoVndRLVrRT__Ju$Bc#GU}ThoFtTw*^k3WFi3P;1kp+FtJqU-C=1g9+h;dt z)OlEF0;}5Vsj8g0GJj&xM>6cHRqCBSzE4vQKKIzM8dJ#WquoQH-`&^Lb+|^M6AsDv zQJ>6860u37#Fx()GS$%Dt1V`OQi`PZ%dba2B zK;O~NL@&{&%a}y!NFz@oXL!T`QE*6Q1wNv&^U_xPHOYDVWg-sb)wJA<}c`D#W%4Pid|{ z^Q?PF?6&hN_FthX2d*Rh*h$b$~53fWR8?jNt zV&y^+I^SdMgij(jYqrlTx8AlW@J-XUIN*f^p4U|3hcxH=cgCPG}nsEr!PYU3=&BLZ6H0{2c25tHgQ!P&u2| zVY9!l`b78o`Y}o*Pw@Fb$GGES0AVyPPt0*h_G9o0Yu9!RyN9Ak3wmT~4!f|-*4`^bssyXXrlbXfDIENll zcZOSJZR`t-CR|I#wE#$0qY*;BrCq>ye5oRobF;^u+Nen>cp094w^Xgdh?$hieETuA z8bXxDq{*G5{}bC2=3BT=$|k!qW!rGdRk`uifmutCsv3?V&BrA=9wa9Bawi_5a6KEpPL(bC+mwm<82yr&LYDtHk@hYpUPi7zA%l&MIj0hILxG~KTzCC z+BWTjMURuYCPe-vhE0E7(F`&UE?8Gva44{`GT!6x!K<+_HZYWXqRQxhbS|KPriU%0 zI$o8uM2#P$44_l!<;F`=wf}%63a_?(m%dbfabN(TqA1!jyT8b0D^=A>QjCxr@=lOw zjRwL|s*$f4;tFGT{}7e$oH3qb-4q;Qdx{39geO)TuiRLlzgEnRr=Qp#&*P{6`tLjbDl~&O7L&HX z^|a$79w(zNpIBD|@lsW*$^oDP!G{o=}hU>pLL|0bo?GbaBSa8Q;b4|uN}^~kH$&| zE6&Ttua133tYdaV*QB_@{SJDKR+CRdvO;82s;b(k2ntFL4i284JVl;#nGend(Lg!| zgJCokJ0a@Hk2ck8a&C#fwghA}rK+28izLj4`8*;%o6v&1+sDA|{F1%O_{x%&<~$i2 z4-JjE0?8;)lfsx~P&t7y;4LIp&VLMg0zs*sc2!GDi-&3a<41{>%*-t7GhQAZ$Bphx zR?_)}=MqeE(kvd%J#V#y-(Kpf6jq2FM6#U?_4NrRmnQm`Q&jVrDsw{tR*Fc) zretsO;kQ{lUwtO;A z9r(jE#^hhvNmM;i1KKFgo+=ft5Zj1DA( zvvLFMC4C1OEi0%1s5}uUr^`=eX}-7`6*a*u!jOc&2f#TFo7TU|e{?T=1qr zV&=!{Vi6D8>ulJT6?d1$Jyk*_Pt?i_eQf0pNLRx#CJCnyi|Zmv95PRsZkCL?0Ro(cRI2&q;~8$SLqJBe1$GLYp-Mj{5mnlDnYA@XcrW{)}&;e zn2OzpR6eaj(^P>tyf%b)*KVJyzhTbIzJ0IbwAyI3^JRgUH}*%p?NIA+)9=Z?$CEDB z?wf7!A8Q;qg2#@B$i3V6wbaCIa%hnP8jok0< zVDD%N+Wb9_eG;-gcAM4EuMuXQQy`F*(J;%1W55Y8hqc(u6k31wdDSanDK9FmxmGuB zf~$gfOAShvy+K7dgyS#q)VypAol-{sTK+WGTwwNohTHG&MjfuS3fII=-D-Mz@}|bd z8-S$oFssPMvE7LaGcyI2=dLr-1be@Kb5WYSbb%OqLwhJ&4{F8k3W~jgKQtI_KTSWy ziSEnK{|QV&{-9A(HHS}J5i}o%=$_e{a)+mLispg#_MqLdMDUllz-ITe?;+!4$U#O@ z3wA(u8W-#o>dZOmR;229zl}THn`YZNy4Vp3im>)~BQY;EKFtR+B!ofvsHpUuAKk&V z^?Nq26SytL3!RUF>&mRTOKHA;VOfB7DPqmBowx;jy?Qqhil-{N7KFmXr|CfsMKoZ zaRNU)Wgizx546&LN>#oAJel(-iz_7O+2IlwlrkY<*VORWB{YjP z+;D#I+oXLzDVD8!zwm2qJ4xfV?|1^G4q$W)vG8s_PCu%GuCgDeJ)-7|e? z0Om}aO}~w3UeMDmFbtFtkbfL4Q{kWm{Zp}7SHDG{GYv>hMDNfk5tvXt-WYecS69ER zuvc;UI+Szx{${rxvPoqH(2)LtbbIBS6+;Z-}zI^I@>u*9pipFu0 z3ic>81(lkpF#dl>2r8Jc+5vLt6sYQ8_3n*=BTGL#r5c%`W9+jBejcFXm$Oq0uqe>0 zdT{5~;FE?HJI#?zECjMJrA52c4I>IrPoJS-b|!X0e*x{!cku|K4Dq8ysYcZ5edTY^ zh;-2$vf*!BH>k%18$hd)eH^Ym(2MQKRAHHp}-0T7oPZTI;0{{B;E*%QLD#v2o z>5S*^3JkpjMCU!`lhZdqTf6OG{}x@&=IiEXU}G52c@T4NS1FN>$|09<`_GNz4`eXw z#OhT695-z-Z7o5!KYr&%ekg|bDCuE>rx@#z! z=nC2C7>nv%bs6`|*Rk173naJW>V252(#6(rV57;}FlO+3Se@r!Vw8xugw@K|TTIVq z?E6XnW`0M5dk^WlT~fH#xz2xtZ+S<}c@Mc{&D%Q$g;qF`tWNh+dKKHOBH|=m;hJ*_ zVG2F^mTzNzzIeuxTq(ZJjDz3!dpk69kOV_0|3G0e3LtgMko zAOZ?nro_?bAwgenQgw_A+#kwqQsn4^dAXnCgC5M^zh_=0mYzfQ4FjwX>DCl!*${-` z+x?<=xxx>L5;LR+%i!B(2GqO((}WE0({%weteD6F+F>pZYUqQ$1;#! zb{@C>*hlcq&f>ys-UnG|Rz^n3phhM(w&y=hQ=h@915y}V#^KY>pCuT>6M{hcQ&b?h zskzyGquXabvvvnTE*C3n$VS~dGJaw%4~oTH`7L7EDjasyj79!I8WERO0tTrx`mU(` za=qY5yE#aOJGL3HwL+Lb7t+@0HiX&}J%TLyk^OB4hkz1SCwc*;fGcnVvlOcGIIIpM za>~zMY$+9lbo1U2&9eHEH4}po0f_%!X^KD76ssv^0RQw%L;0^^dJ@s(C}#x=U$L@p z-+*$*L9)N;*_FF8lKPomWN6^hd~G}idpwyWBaMcJzX)TD!%yu9YZ|?^I4U#n4ncyR z3-cqXsDVt>xXhB;Hpqu(Jm8L|BFB>orfEB^wR1dP??m-CcK|bWW)JW%Qp_cdeWcsD z0y*5-OjP7kb<$fQOkwr^a^l9wASW&dkX0Ypv`-AY>V22wk2d^ApCpzF-c2QPQdaGx z4&Z1d<{X}lul`!g`t<$Cl?#!g5bWa2Q~LcCrM zV@$`4)vY{hi-s+KU|Ah^>`&N0TdveCZ(*bH{Dvl=exfNQo~WDJU$m4Po<6Tu<;f6h z@Cd9wcKg`=NwkdcniD_6Ck)Zu8JBR1AtRcBIra;R6)mMHyw&XT1z2!<$h09;pviU(}9 ze{vp}{>s+ne}g9(g?2wg{={xEHVrb}8~$Heyf)qbJ^tH#9-dR}y_r>X>izrcp1k|t z0C4P{Z6TcY{yRBx>VEojF(v%4PyKH#=#PkC08$p1f!l)>*tXD6UQ-&T)l z6VB<-pj!@gw++Gt_u!iZEe(#2M^ItBGCdt!2wRvBA9yx^P(M%d!mt~ZlqQhxcbuWz<0 zR*4a=c=7?Xe$4L|kBs(cJb76PqedwvT2Bt2MIfkKR%ehCGjMmx$1PMc@m#TdP`Y%2 z6Yr39K?sa~l?>5xcR36K0Rk>$O!V9faHP+QF-ev|qn4ki8~ZYPlqwR@z55PYG#|#% z-W5|~l9C1<)wHP#c$6w=#@o<9^JhS@bG@bEbv1=apv>)X-je8qZ-rK4Ab9l|I3XW{ zdlfM@{Vyh`gf2d^#@%t<^-qBWRtAQJ#3pA}e<~gGET_K|tZnbTLqDQjW2oPjuyXOG zK~^>9mqgD4y(n~LrPVQevr?>2<6=yQuhuv%hNB)nd}}UnI&gcHVzyT!z0Qz0!EP-V z2=ebmi*wGuX!_uLJd!y|$oDa)b4xkk+;P8+-+#(r|NVB!P*M-XMp=i3sbMk+O|ge2 zQ}X@hjz@-et><4ZGSr1w5)niMGEp4czx$_R#sr?&jBKR;Z_)R^c0VMGx7K^TXi-(3 zd;0(I_|Vh68x;cd_MZMsn5uZ}TPX9j(Ix3@CYfyNLpGUo7nZdb=Z(#dD-#wfSwom* zK|{=9^xp=2HP{CkWt!+b@zI#mdA_2FM=&6N834 z*C35;;qsws1J33r{*zqP&oq7CSyQ?{G;O;@lDHbsY7+u^JifJQW#z$dR6itZ(K$1u zoJZy}IwR&EVi6pMM3YeJnW*#7ByIc4`%&!ShT#aKbMU#WB6&qb6p_4JQ?)^kXGy59 z2p3CvBQRdtTg;yNGx-g#9$XdfS@fv$#9Cgp$X0aeX9Ywli>nxEkEZ3q1cMM(G#w_K zpU90#G>|mDErupRCitte)Kuni?V4b$a!5by6=jfV#ZhqzTo%uCg|ecpc? zwW`2nwZ(pK!jf5sMGbv0r2R7>e8jSKUh?)mvQW4K@E%6jpGL(f^xH@HK7bn80rzFR^u(zM0;5av=fC7QK(D-5_hJlKsa#Oht}b3HS*_6>zlw!N@j71rec=x2)Jh5Q4Ynqw{hz&A|K>|D~*lY2K!)%h1(w|5O85U8R-Y@2c# z=>B{uBcgo7n0!?mK2xza$pSDNiG*Bc;9X*W`}XD?cZlRRJMu8SL8F9UX;(QOrHo*o zd^rYJLLPSNZaf-r8TV(x-lJh~WfH-(<>PC(@g;k5%=PnsiBm7fApOoVq;G7jLU&e7 z$LyQ>OC!%c@A-Br=oL(6Ckfp4p4YdG~f*^-sky8RUW6*r)~7fl58>5Pw2+SG!u=7!B`#oX~blW z$?hbdfr>r*6u@AJo%~3qFzQ1kPtHI~_cMecgxMyhio`!O<$=+8>=zCS3BJ=HlNC*p zoeL5Jwt8r~DUJ6yYuesIR{Y&Y3MAQtO(v0t5*Kb^EGAi8!L$tN{E}wDL4tpPEH?a7 zkONY{@RbGi6(`c$aRIy#dk?N7FKYPJzbIhTkEnp;2hv*G$O&9 zb{vnv13SAPE!G&wqwzgf5!+)7ABnhLrHQdgF-t#-WzSedxORgAdFPoeXPYZ{>03Z+ z2*>|_Y@KCPlwter>FyFlTDnu|uAzn+7#gHeT0y$IVdxmTQ=~*136Vw=Q9@d!K|tc% z{Lg#VdCyws3!em)HP8KA_rCW2?dez$UW{EzRG8*pY)#~F8#Q3CQ}GzfMOLFv$l1AeAE_9aZZW}8WxG+UH$b!+OHfZl z9ICT7IL|6GFF#270nJZ|SH-QAvdV9D2wc3XQ4*CeD;T|9xe|h+KHOtvN{vfxOMes_ zhSMC^`MGvDxEIK@Xs*J`#D&7VtJxRoq{k!Z1ZkuSyRk-cM zQimv7tL#`K18Vc3cym;_>I@}+$*~L4WQreRpecKEcEq2nM>XMFyW3gPClQV;{_#p{>BF!GV&_)t}6PM6|$U3vz?KAeH!Uw83hH>ua9k25(%7y z%&$PH_>MO0)0KrnVQ$?h1L8rUbwy~uL0?R1LsQd_QXA$VM6g4r1RKKsDDMb$n9LXV7FxalWQ|#l(M(s{y4Rhke?&45zq!6k z)J76z3~yLJoc@y_6aE(5Durxe!C+>*-ob*=%ASBhOh)&SpR6oL3);2sxUE&$PIGs6 zx3I%MeqBem|9d3-pJ77X-^gY^H_$Zs^FDtQ0~b|`gzlO&eD`BL(H0E**hMk&?2|Gf zZzLh_aAG~H)(h5(b3HHB$oe-Qewe@bRpae#Bw0%6+Kk8X;d5Y1%};{!FPrgw>OM*g z(qVOa&QBO4!c}Qa5A@~AGs~{btIiCR>Y<@}VTNIPekX-3FK3p>H(&(ja?nb&RDJp5 z4W}}G>Rrqtv`=Q3RcI|=`FGtayrFnmdXlH}%#^okMI!=69LB7YHv=|qiupoRZf6xp zMpP!t@pY|!DJ|Cvu4*Fw;f1xTGId_T97;=6gLOe7EmAG!5DB)+!;F9@UpF8kzBY-j z@UJeXRZ|@J6xEJD%3`ls71gU6soJfvphabRrvHXYx-4!Xidh2!pNyU|KaO!@UAE#~ z*AQtTYdIdq#5@`_vJrz`CxxVdg5H*bH!E*Sl$f~Ry#5-8u$(k)^8I=osgZ>yj-SP6 z+N#u9uCew=p)lzD68Ls6wu3LXSH{N|ShI-eglxZ*Kd|(iakDC2xjtXl;HMFH-T)Yj zhI|ctF2~VnFrmVcj4d?(!Y<()H*X*9k@BjT|xVr!+ z7F69L6#%5FzN1h>XzP(g_ko%}3PvnFG7u$xOcb=#HfTtf*`(D~W_1?kmG&2V zQ9L%`d>G}iohf%!+|)!e#O#HW1BbL_G>qX*+jQ@|f<%|oK(=t_@r-8&(Z3}X3EB;b z!i)Fy+w)wzV)tg=Yhno;gKpxILYfwvvi}I5W}wi+A-zt5{A6+en`i5}T=9)#>_6X5 z{>s@R)6J=R+>M0@yglY&LS8$q7s}4$RyozB%gapou+K@({zmoECI<;{|I#`Vj#X)OdJ<3Vmq;a4_Emiq(sLvG*jiZU~P0yf$^5lK$H*;cE@Y4x-k4{@FT9x7RcOCu(s)1YZ-#qZhKe^z4e>(e- zk2dPoZ#afK%0lcE{OQhB;s=L2?Y(z@4){A(OXB-$m=xEzlwo(*px5uHT#-I_Z+G}3 zvZMUu0k1`q?-5#@MXUE3b154>6@QNSc6`CRSFeL@!39Fs4Ej$51qm&wk-6MRr%%SF zI|a-E`?AxcWIzsTYildn{vP!2PgP+E6=irG^bGn*_ZEuB#NEo^4a32^o*pOpBDW=g z>$eTKNxC<>e$c;Xuj}P)BPZj25G)-*6rL!5dJp0#YVng1Ekxo-pEQzs?)rbEZdK@ncts!8uM zKSia>g&|u7L&q{7?+jhII6HIT2r(Vb>BzFC46A!ie5ypuPdTlEyBL z>#jQC%dT4`bhRC36;Rix`-ll#L0G-&UnqJ{Q^aU&RaJ7F641y#8QlvfmchXa_a;?D zkF)?9gh9CKPHu=G-Dq;^Oqnp#qjl(u8l`REj*r4>S&xq0f^dci&Wz@?kw0}^ej1~k zPAQ5CW8zkcW<#NUTaAp-+MWkmIM(3a&&(7+l9g=t4Yq5`*c}&|h4^E#6{fzF(J`s`U&m7qE z8$Lc;w5)u$!_^4CpV&kNZXRQ4sE*LL$$J<-Mj7XID+LGe(<(Ccyj&tN>-MUe zd<;z`7ufnZ4pD?f{GL%U_yvrUs(l$$ujC;-^UKqz)GSQ=eq$8NCw z_Ji|+Yku}Y=J${mbZCr58_szwt~?YnTY*uPI|l6$`i;x}9_-LzwNj~N<5HXPr)P~? z<;yKx3%}CH^=;G#=u0<=9bXXdOnd_1%D(mC?ugh_gq7iY zd zDQM=GX0>zErj%0H_EUIHCXcDuNjyJF-X;EnPjeq`4tdCAT|=8brxD9sUX0f^UTz29 z7_IL4^!}rp7ulHANQn=v#pk>DbP#m&YbE9%;j!thK0PIxuetA9?|1U0t0j{c8+D z-~KSns+y{;oz0z?s$!0P?*|W=oH_Ow%|f+f2e4&|18>0`A>+M60wLgf>dg0NA(!D2 zX<4#VGF`ePG`;hr3flDPUMj6g0||F@biZN6#fXTZ$2#lXK;xc|XaQSJO~RM?V0)7M zP&CdN=~AH|2%i2p{=K>eCM6HBmI+tC(0v7-N5TU^;%eM+kxu!CIMRfh zcPAwe%4BEoaaA?2#78ZSC~pc|IZmhP5*I=`At#P=*lBC0xC!c!p2K{gmewizpb{Ga-}5GyMLs-CifRGB z-rHJ~X`wKYoLzZ3zK&J2hog>YYYC*ALZ7`^K4HI^2~@`{OQj7|3tkUZhg!4)M3wC* zNsK`{<=gVDQ!LiKb29DdX=RXR+NPABkqAIeJAc^ky=lMuASJ(v36rP88S-7`7t*#2 zR2GdQX3%DR`D`rZLZk?_T-ku&*m{-vuVF1Ll{i!+CAOc3uERcZ6+8Cwa_*AgNx{U< z-LKwT?t<{ENsMP7X5UY|s`>{Oxl9gSHel(3aja4NuFv=41xR^{&;+nP6fM@-Y49dq zwZ^bs1QfW+nwq#GtX|2zu^j>T1Pb%|(%p+*$70I=90xrBt90{ZzT?h%_6H%H?u%#D zm0Zt_d#YsZvRBKjPs>t~5jhtq*&5d3wX10J)OYDDC#XW9w}1n5g>SUasoa3)Oqz#)v(T28B0u5yFbv>zCuy+7*;bYW=Yf> z{~5Es_j^G5$|;cr_A{ZT_AzO%{yMdw`VJX;z6w_~j~6FFxb9EC1&vn(aq(jp|JupZCK%8q9Nb zZ&riv{b^b}U)K(CaK~!cisj+E6?DTpRQ;QCpI+sE-G?Rks9+{|JlXV-?`|+M_@XlS zYUKXw^_g3+|Kj_w@L>&O%w)k93AMYrXu!^`q zrhxsdtP!Y>QY2!dp+>@;Gux+F=I!8?bCv17eu%S=R?0D(hTsp#In~Z&O9cqF;VG{td~Ranh2E{^0$2AWFVC<09RGJRL7h1TARrk;=tj= z5abCyy7HV| z0*)`LlszM2aSc84DaUdjnb!2{0j}Kx$MQ%ir>FW4>&l#r^8MW~xbUjIxfJb3BQ#1(G1Q3cd_TJk!-T_^ z)@q&o9nb}k=WU{0wm$ive-F3$3ha`R?469l}$n`;}AUy62?QoZ1X3L;+ZO=p1u;X(+3L77%9cZ}x(AH zg%UShqq|1ER}1%({w$Ls-^C#2y&}Nse1jJ-fUafk9g6~_0<(Z>U_9y}*?%bH{iXNj zAGkrR+}#Xk5p^DYHnk5vVueqN9v3A?Gxuaa`HL@gQf~HI#OFt4QD9r($T{#oq=eoi z2e0xj6~gfT{`oe7BlN23;~_fa2jh36%7?xS$B98w=!0`5gLC4)OrBKk zwzlp^>x2h>l|-5&nw3}kdxUY}1O$tPfEgdO9_-T=T(Gm;BdHU#8Y1$B0_)j_3Kk8+ zt6!Ptm4mpN|445fQ_2S4vIi~{wpzv$U8>CJyo^P+gDM0{HrYsAOOY)7pM*>;NXX>b zE+CAX?C;u2MWf^LN5-YTQWla^f})$->piHeR#Ow7S;;6UeA7-hWVdDg$kVWo)jZDl zZg=Qmhq2O*M?@Ml#V8eFlv&erEE-JdxXBfTN+~o(mdVWhK82P3&o%_3(WLlTMUJyy zz^8141~QKQYGGf-D8=-mez7>S>^G`FwJN-DCp34$S)U=O27^Dxip*`CCt0uMQCU)i zXeVom>cx>rr@mI<X3 zfSQUuH_6N?-ms>XY=jCi%-6CoNmH+HyMP?!dhc0Ix2EMfY*N^v4j(4br*huJ%i7}R z9-Z$MpDsBZ+fV-Xe$N2G&Sy{XeR*7$8Ed<;n3)NjzOZX-T{U&A}pZ{NOM z{`xY@Ox2ny0zdLObztXyGuG{+qV;tl3+Sm*?rg?dhV%h7!_9Q1o3b2H#{^ z-t4*Eogdup7u{Z3@-YY=7pv0eu^5Y5Qby-#$dBtr9ZxK*Sx$nDGFYP7{%ZTv1FFGV zIX=BOlp_gKcmoWRK%-s;msF7O>-m`^>FMb?{p?hq?vJK!PAv7`8=HtA&@8AmA|F{( zUHuwtre4lS9IBF;^Vuv1$5W^F(0>9pvwG4i>0^-q2b|=PF}DQ9OD@6vUOvYh5Z9Zl z(3<;p*dw_01dAxmJ6~RKZVkj_Sw7sr5eJi*y|x@X_mS5BfdCHS`t|uv^LN?&k9SQE z#0Qze=?h*9jDD$KQ>B0xa%KvwUN`9jbYoT?&do@}E9o;kTd{VpY-z}7) zPx%y1J5ftWDXIj?HTkGnPg!veiC-dg{8RPHvE{xT)qXS4G(i2GZ29@m>f~*etL`Ns`FYchZ89S+&yB z&j`zSrZb4c_DFw`qNGW%vW^rj?^UJI_I8~;MhxQ^V+QDDK0Zy7)OqB{BowOE@VL;# zp#<>gJceuYXSn=ZA-LF}#i=QO1uMY3 z{U`R~zX6aXCqq5iP~6uAvx``fi_2rvzwdK z3(*enV=Yq=zqZ-9`%rb6eQH z`|$XqkwxH{ThP5gS{Z!%FZd!l_%`^xQ~mD>~9yN`{*yit6&YX{cVcSM0V zbFw#cjkmW4cbk@XXF!p8f7bSGCFr04{>C9#+=p*CwRy5A%s!B5^6>8itx?sYfO}^b z#d=XfU5{edyLW&fB9XG-Y)5jo9((kgom3)JoSXoQMv{etWkr#?LWwzaV4V90&XufO z_G7-R_?1Z=SzX~{Y1aRwM4y4!Mdq0E_uD@sdqf{|5t6kNUab>Z<}^<&C?~3Mw?C^K z|H_MhXu5&kU-21q9xsEsvI-rs{EE`osp}!w2F>dPivXQ>Tuj`f4nUT2{P_>5_P-#q2p0XxXC2hX_^(@VQZ!UKLFOQi1nr6)T_WF_``1t7gTK?BJTN7ac_G>xPUZ0;| zdu@pQxo{&gI~`7d3$MIBc+XxKuy;l4+6@w6mUrjvcNfWb7wy4+Yb|dejC%}smqmB` z2lDlnH*>w$9}n&hqjgJ1fGNNnm>Acw8G=Nx!C`kxUl|kKf||o8eV$i!e0+Peah9dP}G76 zK0bWekZ+sh=z*L@W!Okh(Z5}Jn=u)^G<5@Ku?605Q&>gHHSaDl+HKL9#;m#gtBl+( z!>e20VCb>AC4bGz;MW>suS`3mhr85xvAbZ_rn#p|9F%FRh?6bDB*|M!r*cSoJmuj7 zCJToIOn41AsRk{?0u572yZU+y$kgT|ehb&cOw(s}ZI0EQ?}o^D-+pjs#aN1A(Z(6) zLY6y@8yBOst8vq>6W}yv%)#~W8eqRo9sQ}BGV=$>ED(yYCA4BTZuo#Rh!>4_zk|bY zhEEyHY(15S+1>@XenDZ^g16v8l}Xl_mme6x_%hNB>pF(BQ+ z|CC#88+BW>Ok-jDf#+H{hAm#(GT><6|3LO`J)T(hYV?oK_m_VN7j<$ZUaXgmkps;# zXu76o3c zVVkx;mr)(v`-c;L@#5!&;)lP{WjEz9dz}R6*9cGTvmfGyIbQIc^8d2>f3oBb2Z_6cC)WFMod1Z?ul&%xCA>*~I-T5iXqsP3HaLa^KnO zf*c7usie>v(?d|_Ls#-@eAsI-tH?+)kQvg&zg33pP71p=@x}n7>jN)5e0ICSrsaqj z8(J+VR|P4^Tc^6^jE=!*Sl?{(t!AxxP#sr4W24ckWQ|~?N~W+wz**U}FCgdGXu9Uk z{SXBTzhO$pUDcKb>E^@sZBM5k55+;*Q7+K6g?8ec>XQ9$Hv{N8I^K<2WjTVqVk*B`VDyzT~&_{~>d zZ@>Nlo!!mVyD`k%Y%4l-@s1#1{s~YwZ-IH1iq`_oCJ+?40IPjxfLX@f##PSsU8`!3 zgv3v;%@N@fFOHZEudRvD=+TY(_8$Q^iHj?~KNEd^1a8kw$*`JHb%t>IKL4z#-sqWb zmQlsCX%VfFDeMq%waX6l9FeeF zZknewYLOOp%lX2duPV7udV!bahh&k6=hA>B2&B~?-1=%g3!8a)ou6aBtT%0G^10~t zl-*p1>p2)$HmYCxU`(|ayjG-!1Yrg{(cKbLbaDLGnF1T*!iB$(hWR6>Uv~_7bxioz zJ;H`x>KH_NIx}~^O%036T#x!Jl+I&pXe?3l{DW&Bn-KwTFYd58j~}<>)(?!B&3Ri& ziqD>LG^ZBr0nP1; zSt%ZS+`mP*y@tjQzx)(1%u$}9(6oy`!s+44B>6Lw5gDHfWsQCd76mwk7?UB~&zv;+ z5xlT^Sgo_I10%g)9uqg<^2e%F=2NAgkHdK`;=VtVPYN)$xsjp(G>R8rTV4Xq&F%de zl@-e)R)NTW2EN5dmy#$8yZ88_i5tVt+)$)T^jw0ejehPeSu`N0w@l`o#o| zu*}8k4Y7=`8!%+wch$(ad~R5<6~!@{6rF+S1qKFMTd&D+&*F&w^?MJdR}P&Ohm6>j z@81)*B8o0xwPyf?l(48HrP!lYMUR--`wpj}Sc>H90TK^rr#V$%Ieowvf<4DbO<;17 z^F&MtHR!SHW1ZGNxw*M@bvz=Tw^6KQxC#j)D>~5S7h<$$O2v!hZYfZ_ud{etP2XMr z`bs%o4?UV^cFmzAu=DUZN}l<0qPg?`B#l_P&&pSyEnwr(sY0ZqHKbeY!G$Ayggab( zVQqN{n3z8gM75;>&CpA={H?yJd83!Nm_#X?j@c{p@e$|r7O|2Eji+dMRcM@V#ha#R z47NDtspK8Xrs%{siGI}%)K~#;kQ^mrtV!j1&G~H(!thkZtwuhu{XuRG?BA8UXoKxr zVfb1|}}jcvyE3>hAC}3S?EQF=diW{?B25A3{N0&UAW4YW^3c) z`EEF1aAe}&{W*uE^v}6#^H_r{9}febz6(sdn5UDn#sD8a8S(sqfohZcS(vF{I=8jw zu*WejkI(Gy&sbkYWjHIyM&>$bTG9{=AgqkQRkJ3>Z==_xum|v@6J=(MS;g>?rZHp!dk6wU&$5p z+5){NR|EL`b!MGpFMhJKfK*+)#|r-nY0T>O_fXf?`(T4*Fdg4IESiO2A7FUz530a_ z=cEnjbGX>J55=>atp~A0%w1!9L8;;HT;&`(`iW-zB(~uGzs-NxL=<$Wg8POsYx*T_ zy8Sah&)AE-pE8g2aGtmkEQZGPU=p~#`y=+@p*b{~I{B_P!XyFd#&tux`HlIP`+dUB zjX`7CdEarGd5#s`vz<#?A9MZniz5E1ZbSoV+j4M<@7I?g${&zRh|KJt0TJF7~rb!Er zc)TBRy<*@ydc=7~SBqn7RQ)|<;e&YX`c>xohtGO%>fnZ7z(Hs(YUBIfv_3P2Qu0lm zS!|?4w9X4OgKUhaG(_%cH=&%W9V4U>6(ag$ojlh>H-eU!2C#ftR{y(eX{`Z+F+Xtz zM4d;tUM!a?1RkQM0O`Q%RFJ`iVvlkPjl5O880YI?ZF+o5O#s7{6iU)K%s z%5CrHjq;YHt6*2t7nB<#I?;ZvGn7UWJHp!@j;dyFy(3HmvI>ZS;}X zKazN>k&+_ePtj4cT`de_7c5Qe%MN%)V|2eIktC^dl))+m>YD^*XhlJw^t2>e9 z?51qA4|)lDanDq)G=9a`4yTjcw=TdaTMEuMBUmEn!wCQDaX?EXDCKzr%|x{NXE`!d zl&VMky<#}?|B*!?n~`lR$yl+$Kc-Wuw|3Bb_ah-kSPT@LIiKwTUbN584}|?zhm~Im zpSt5e4biNCP!Z%ANi6uofJ1QbwMCSQF6frG(0>pcn=>;XO zoFtZV6!JmOnJie_gMi)E3wMCPY=DDnNlsJ}k;dKDlU{2R=Y|S#U`1x%3-W`oNC-Wj zURuiSp?i!zXjszty+Rs&aLTAS@&6SgzN^FENSL(u_7TD9c+eWU!L4B=vTmSr;nVAv z^~!`VA_+g)&`&SJlG5$CeUY`FXTGn-jTMTBygWl#ywjP4k3BTta3WrRvI@amU!%%h zhppn}rj^1`5WOQ0cOolz)>Byw&9r*Ji(N3!wGKL#DGT@0tJT5FAAb}p8PW)&kgq@0=ff zKYK-@LDi@^*#WP^sVMkOFcjM_*BC(YWh>q!K)2y()A+tlR~T-V?AG~+bpMx54e;L& zo&*l+%Ml~X%boOOnd_ZFBa5Kj;Rlw`{nwkV!N|F+P^QY#_eiteyVrxs?Xudz7`zgP zw2=GLUFPQZ9N1AFlxJBicfS^fV2uwYciAg%mo7gM5kaQO01KnA!=y;wryULqKGQaW z1&6UT*5K=(3?ON@I6JElAVSSNQ6Tvjd_On|shmX)h#D8;^)ztQ|C4j06*VYD<2VM5 zvJ6k%Q4*uuz)+dGyb}fv`C@_c=t9k9*T3K;A>q9<4N_O(%Tn~j<%%${Yc=rw7v$u` z`6lvt>eZFsUdYug7CYYar&PQqr{mm>6NS>W1!-YbkH1tKX{_o|`0UAX zD!no0Q9|O3hoO!ZEobtX*W?}ECtWQm>9pHHB5fN0Cx@=vipbWg>L)ms)b3V`YY12k zKTSHE$=3rY`D*`M_%l-NX+8qa~AB;fw%;oz{^7o0YD4$_5=vqRRd z0x`&k;)k;#k=gzPB&o#(!06T$#wh{vfX&ZF(qt81U0-;V6c?oD8(ic>080HXUy1mH zia@O94k4M)FX+h2Z*wJMdjN!MQwE)jm6Hc=Yw2o7$+)RwCs>)G*fz5-PjTNQkwkDpDh2rx_|3<8=aOF!UoSSQn#lK(9+&pu1wo2+PaXc_ z0nPd^ezc53`PiOS^FL^_$s4Yb%jAzEVR#K{F8h0A6Bc7+PH`$CTNZ zEK1}-T5M2|JfLr%yf#aF?jGjQ7F5x~eyYw3Z%T7SGpM2P)l4HPnJ`isdlbOs97mN` z;(P?rHXT!-QqJpIsJF^)d7difL24+%fwjCzK?QY4gyF!)wxe)S`^FKfC=;Iz`J(tX z6bBc??7k`l!i@p;k=w-Spn+^L(z4!B*^U7zWNEE$Suy(&>MK`$s|Xt>KnApOx&B2p z@Q9XOJ7qTujbJDFd-3e)L8m6{I#s1o2@Y?uJzDOx42u0J&h9+yTaHZx>6v-05)T(uL{3cr?QLc`wBrmVZ`hL66zX~Igc_;V&gdg7* z2GOO%L1IN5N3or{std;t;I>GEp-g6A+RC7(RUm=Tw8{ppd^E&|id&9Al%vw8f?NW- zQ_K~PcnW%}9FjiJLM{O(P|)vm=e{xz@!&l<@5z0uC@^Tv98^==?VhO3uYtsw-$tq` z4mKsd|8GHWZv*4j*R!*s48hk&fTw`^9BI`543H0GyLiR`twd&>L|A&0<3T-90uy;! z3cG>5P)_#a`Shs8g@s~f*~32c6qIp6L?`e$?ee|H!%pu*pGV~>rpS%mQuTZobF6j7 z@%IC*TN$(~4C3sIj;n@Aixet>DWrj`kII@NXXRiu?#%rZ>6fj`ICyVkTy_*%llvG) z$<2syI*Ex-g@V;5AX>QqCd2S5Is8OBJVCj#a%C{wU4Z>n&^lm|g+8IU0wnn)!4lm2 zFbIi8G}P3*z zjn*il8Trc>0^cBLO=kzb&Y}`|%MUx?k{)I2NS7W8AIV^uDk))J!m-wKAk#zjqy6zr zW#;8PiRUw=9aa@=Br9cL!{WHwUwh(>dhq+O{1um`ejyyk;FKf{|~1l{!%b9!D`?xi~sn-7-?BMhn}X z;-0();E4IqB_XQTczYoXO|q*9g;=>*?}y*d=6ZR9AOE+dBl(R6EdDe75+4No!|fQcQCtS`u4iZC zNkUEIq>xSpn??m9D6Y-f)4@P(cs*GQ**IBUT5TOH(l3-FUFZB3zWJ|L+WuPRE$#HT zxgB*;Uws?#@5S1N;_2nn8RoC95O8uoazx0;t}Bdt@P2RC8skQw z|LIfn4B>*+2vjR*!f~{mDr#C{J@5qsnL5CbfCc4@t{fuc&*TkjQ8RoVN0|%wVym{B z<7B)-KKO9m1`;EKlC}B$Au>*Laa7)BU#2e=G4Zt({9nB|J_vNhBVPO!f(yoT4e5Qu zwClBLZ?T{@q?fPr3#=JuoyXu8N5gestS%^MKE#!j*M~LhqH3`|3N6FmPL@O$FpR5o z4W6KjK{Yaazx~@)?)GtM)3F2XdpuTZyMo?*M|(A8W!76avVqrr_87SQSuS?v$7Rn} z)#J~N#^>a7)Q)ezK{zdOAGR$xFXRnPKgOyFcQBt;n+^ds<-($(WRvi&yJ#<(BD?c+R->QN6&FZOm05h|5D`xn z-Y%KF2l|fS#suY{R21z6&&w#r=5x^IQgzm~g@O_?$14g#$h|a15xw_;r-V|fMA^h?>vKH@vFHr#AfpJ^hX9sf z3UA*KYvowg`m#Yz%vF%{#xErhDz=^zFH=aY@K%eGQL@D50n)>FOf~m-1`Yrhq4l(X z2*#JyZ=-RKK$;Tm5wio%`FEd{^0xVOdFwJZokC6W7~Een01Pep>Nn%VM*}al z7;nbPT3XT`>T$eK{ZyWKA5x`M`^!GS?*}sa2`mbn?oSJJ=wd3=v%e0Ph1qgsS(I~A z!$%_`G`Z~Y$rBX%dAStjMdE^x#|fMsqw5>v8^l_3j1?0*}O=e*t}^Skc0Kw*H5!@(@90&K4UYOW@~25#t!1B0sMX zrjg{r#a8&~&FRIGqp61{7gMxGEgK}|aY$aIZ7(#f#~9cA3`;1!LMyLAHGo}4(Cj%6a-x=XbAuBKAC%hMR$d-B+Xx0O^L3w_$QCP6q@^Ve0g0p z>eVq+`W*eL1th&hi_>4GUN3ExTxFI-W$J0Dc9xsxG^W%$iYD!2IZTwvv^+j1R`Sph z53^}eAkPr?jjNUP#@kLfb@Zov6`VY`vQ3cR5_$DJ=&co43{(e(IB!CDjhz-Z)Ia-? zEgY9u+aiPw_tnPx*|}|57j2-b=cpgN^18foZNw9s^P|3ushC~cKJ&3i@6$oGWffeI zNK-z?4pUhgSB`u>mHyMv(^=zuOBYfyUbxW)Iif6&F_eQVksXt^=+zn?>J^JerGvB< z33WMRHpKF553ZYz*SsSa+t^0>Dyzz%#UHAsX_es8Y&;M{mEDE-r3crwmgh09HPCjB zB_w!htMLkVTmqrb^CoYB8S$yWefqM)YIzMiUyrYOyy`*4I+5Tv4h=&Ev)c&aZ0~Tx z+lc3A1RuW3fPz0g+n19jO{+RWpj(FJlcnozN-1Trm&+P)_teOlW)_i-|7_Bow*S>l zr8N5WwS%ws1xl}(A?8M0n*8we36vXqkHo=z=k++CfRCAW`!>V$bWL?vUQ0O5mI1tT zNj0(sMQrD@V~Hbsl?*6faGU@XBV}#?{NaTV=OA56Xvm9x{r>u947-3DPr*nfM}@x| z;BbLnL+CxCl_w?*-n36v0))#etwZ#(+3q*i;O45UH-_Dk`_zM(C6ZxMNf8q_CaR0z z4q4&$r3p3h8g!+ZgU*;z+#IOG1tF{~jYB7;51+qV&Q>nc4^1jr=8D4*;=|eX;Hk$L zYgV6AYcACco`|_UPS?Y(r}Zl4Yz!8u-VeGMyPkfkd}#IUzO+|(xBR{?YECCd2y-aR zcvX-~{kE*6w2G`%lYbYJ0a;R2rS=zut+_P0OjNh0Elw3gw2i}@=VXx-P1qQE9GA&7 z!ckWOg42_s>G!X2&`c~+wA^!4sifJJQKI{oM#hyU2}}XiU<$V=UrHehZOwv@VlbLs zMTep&?UJa3#+e6QZl=)Ah0K_>yV8j=;TmIxkjgZf z{0jmr92q~hDj_&KNn|>)*Czeidm$1;9|gaSK^yU$`{o8m0-lu!QG#IJn6Z(eA!??C zq6uV5UqXu|pN7beG}_fx2s-p6=>Vj+)c!x|Em`;iJ)Z|1@7W{X6I;WJ7Vgdbg|Q{5 zYoLa_`I~GrH)q~A-XVr>L4j?7#NOO$T&SU#+xQ+i!u;D`^rGc8eX}F(Zy`3G-)Yn( zh7bLUSiWo@4jKi1M*hZXz3^MWLxdWl7kpiu+t8Zt`f1ouMqT7yQ_kg2W@Mw`7&7)` z#8c~toN(rM)c)@eJ7a7d+=X)_k&VZiADTgYlY2+cMmxhe&2xUdCZRZ7$0nVwg-o9u zsKNnuUvMe(Lyrw)P|Z*iQ0=#DQ#tvvZDY4gZOr29JsOlfdurby)y0^{EtK#ODaNRw z$bxlNxb$F7L{`H)mkLBF56o&Fl*>ZqvJ1%?yJ ze4YCF?lfstTvcfiJJK@+?dTa!?xQ6p=as}KKRUpp`QHEU9(R|Jax#M~eIf&0WIKA? z0f-+?2SEvo0*=*i-QA&ciNJv0i>u> zNF3$AyXiW#w<4*FpA{dGPfjDb?g9SZ@}(tcRc4G4pZRrzbv3s?tauyJotVC z+{DFc^vTiV$mR6qHFr52gTkokXi-s7lg3cn*nvRmldx%Xct}Ujhpqv4swW@7C6w4D|mPC7d2QE)2s(X^*I{#J3 zE2I{rN)!kVp@xa-py_I!@W(VG#M3WZ>MVvNy#lqwAoc=)>E&P(RlwFBks~*pEjyiM zL03MA>g24=PY8PPVCj^X)8FRPO|jx{i&f z$<|#gIXhqXp@KaTbsvV}VkNN?quX2dLSGxuCAT3Ldu`9eZ7;JVC5`K`Rv8Sm3V8)* zB1NGLO{|s@29?Bz$_U?6umlcklpy!4aP`eTKPC1`=Dr!6XAWzaea%Q9|NnVF{e3)- zy3pTg&ogkpv`6^2aCeW?UbENO_H(uKrCBcW)Ea8NushCKO>#DMsDEGkff z`UvljvfocmSo9!q*7O9u=2yrwxcRt4Fsr(*xP*4$Ge>=&*WfU4syf z>rwK=tp&L)Ya92*&t71=7vZ37}n{r8`tRYW4`k8n{Ug4P3;TxnV)h_dj z3=&#ltNf9%)}}eJ5T$mU&anClmZ+tze>}m&}=~=6UETri@L8)f_2K{ z#%AI6V&O)4bJ}-Eo=&k>+fQCmiMi3ZOub{@r+!3hL(W%H@5+vYFYgO4!-C7$YnvF{G`R zmX!sOMRdJY{FfGrOQGx5Y8~Ex_m?*SxqKof! z$r(r7%EYpASeY~s20`|U@N(M7@q{3Mf2ylX;%O#X{{WBxik8SiKYuc?#6c1b&DfC! z0i!lFnww^p1S`@4jcYpLemH5ddqrB5PxCOtUJ5xp5Q*=^DW0<3AC67q-Gw9dncM$y zbhu!_D(e;slL*N^cydim<5#-?Vbd(*ZtPCul6SnAD+r*+q09bHQ9W>$u8IzS8w2Tw zk}>D0*sf=+`#(2($Pqufxq>aU1bX?*pbxm}k}00FW#*ZFYl@^YZL22MV70_t?PTNg<@gkO3p}usP*)XXf)7_EuH3GoGQ>2j;I2w2bnO%-L$WYP%vyaM%TG>T6cq^S)MP;{ilT(76x%D5gl&5k z^JT|N0(A2n1y{`Wn7lp#ksrv{;TbF}ERJ#W#qppul0oaCefYDVM;BSW*LK->hQz!l z+?JQ)o!f;Ub-O}FsJZZ-a12uxa~?AyBmZ`9OP7|GGGhPPIeRXJ-oMO?=PE zoOGK=fAXcr35`_grY9o<-fqDWihvZ$2dq%{^vh?PvsO;iN&Sbl$Uwi)$Hh=r{J$w; zG}IZxC+mOT+!YBtP^OcM`8USe*SD&~NMa==g+HB&dWgQNiEypw$QV_b zFB5-_O~48d)Y=&w-{%&D2t7k{G^2|6vc~>wD!JlUqBLLQbTW^N-pTD|OyhJ(J}{&$ z>0-a`Lq5IXUdQg!$+GAO`+9y-!+g>Msi0h6CEb1;-bkEZJ<`}p^*q$9}yz}%vieG%4T zwxlY1HDmWNb0(;MF&QvCxjgNQp4NoH zu-34*XlFSdyu5wVMV4wT=kkJzvK``YQdFnJW~YwuZK~?TsJjrZ(7CQRlH#1h)kjtE zBeUw3;yFRVw7*g)|A8#qm#ZFh@#g5*BcghTuHu9I@_^?Yo4`(#>?6WtsVo4Ot7Vo5 zYxrZQfZ6B84k{4c8BJD%$Q|Npl)3CAXToMW#LviIg3 zj!nnRE)vS#dmNkWan7-2W;@~-rR-4%A%u99l77$L@6Y%0d%gej7cM-`eO~Xko1$u( zcHyFdMSTq2q!^0xDm|Sh*Q&$aQu_zat=;UYzkjB^rS@aB$B%O#Sl$7X#;A1wE!?V_ z1_AdFo1*$N%__ysxhiQhdaV*Kyo~n;M6DhrUOjeAJv~nW4a94ww{uZj66lrc3`(q6UT8TMSao*4YS8?#;?hi9`+^z)rH6e<2M`+LWIsv z@z#ln-m#M5emLJU#eF(EG+W8$wOpr3X>Qq1HzK@I`GG%&A`zb$VroI-wV7dDl5HN6=dcle8VO-rRlL&lnrR1Wx%fK2A zEG_W-o+sFqo?L9wo@8jj@~mAZhySA$ein>6{_`MvrZ__kijXbZZ!@}BmL{A%;QoG* z_=M8h_11}h?312KmzHyE+YMqkf11=nJ7k0`<+TF23L8{qAm=^u2cxu{eY#%*A8`{n z>7a)h!9ReHe4x4l`(%rVLzd51SHDGI@59N3z8+Q>YQ>R=g}sv^H?2L?y8!Rn*vHkg zrst8kvX-D8OY=!+;2EBYAh_ZCiB-Jq423 zBK@Z7X>x{c{rvue?ASN@`TPBhY6ir|$T;h__Uf-36N@ifM7CL})P1FPGi2%~PfUm2g5y;8K?zsMv)>u$oD#dTsdhDSn{ z{k5r0UhNy{nmYXeXM!7ceYX1u!rvJZ@00K$qrsz9N!3$XmI@gC0O@0e@WLa|;5(PdrBpHK4Trr=}xU^AJA_kLA3g=Q}m{?=N08uUCup*)(= zzHM-x<|yYk<@YxpD}%IialfW+b`{(I1plE@cldfp6{y-X`z1B+_f*jHKhrn1r3zdb zM=x|Pno#GjsdNcb2*`_XWMBo1_U?a_#Gh?a%V}VjB+73cDC#PUzx+P+W!mw!{hbY_ zxhvosIQ$8DJmAnIt=n(s_x(@Jfkx2EAmR^&DSHXI!HbaXq)iA@{nYpT&}YiCq2fP1 z>>p2}r~X)&r6nB=qNRU*uaVYOeq*LeAdv8qtKU%IoBQiOd!VK{9*BWR>y8sJXiYJI zWr+LOd=y12Jb1Amtl3X`3p-KQaxd0g6)H3Tmj7efC zmT=w87`tv9&kY;eF_e|HNHUq>uSHFYJ|dU279J>S5a2=|B&*KH5};BKW(vx3t<%B} zlJENTzOU7o*5?m157$k7y}+(?hG)h~0s4iN)#|xtdK6px3L7kL4dvo>gS6VQ*bkUz z3=+YF{i3uTb!R!U;NhEvKMYA1*y)6=O$ZpG0|oT?q>3<>KQKJD+Uh-J)ccWRmj2EG zx5zf*k_pu$Z6`wrwC@8l7nZ;FE{84EEm|D&sT$sH&2;rVasqDQjcKj|%PqUQ-jb$X z5%tD4T=%Fbl#YzF5OK&MI3FzgYf?Q~C#y~^pC-xO9Q2ZNDs0@VF-^|Of2F4;9)V)e z)i-MOre?|6_E|)DzM#(PKDB7F^0V);KmeTgl{!HdEnW~n8`CwQnqnNdN|T$oYT%97@p0SI^Qn9RGnfK!2mt z9{%?$C~{6XAwFJg;D^i2>cyOuL4VsUDM1u)yZ#jrvDLQSxD#|(i5jfUV(0p)Df+VV z*|`-3@IzIu+T$X$4ljGi@BbLSl@5#|0jXF||92o7T6;%>#{D;wfSC5(Nyo#7e*!sO zBO>m{kW%*07O3Ulkr_eSAY7C9^Vl&XYY!wRaS|`A7hkomtvxWH=@uYe&lxTAZ1Gwj z3{q;D;aojPo(|oHKk?3&Z=ywRkQp;?P15=E|NLFuV6Gqs)ibpEl(QP6CCcvag36}* z9{Ej*&EHK$c%R>Q@ple1g986(Nd=r;OE_|y7rK&{nH2Fr@{wgYUfu+iPRj4CK*w^C zlX zZ^IS}z(ry@?@VC|L=VZ0K+0#)cg-&Fk|mQwM26!YY=0kNfplYkY0WirIzCn}EB!%N zlFe^@)=-I=C=z?!7zD)lb4TH84kWa^bLr-8Tv_s}jS$0O=%E_#I)%(-VIfP?nbG(7 zxlKt)$%@bXoZ)`D&!YaXRI54t$6B)u$22XNe^>VM$Iqh!wWXaz_t5DsEaUnfnU7!( z&pl{L*O-QId7oGdV#{m)@x*F_t;dqtx4V-QA#wWbZAEl3AVa9ZDU!kuxh!?3 zxG=-`&E&ICocrl$8hwr zFRsd_v&V5Y5QWoV96 zuztu##5#F#{|ujO%s97l{i&?rTf%!-XflX>Zsf-uLTaYhuKB6nK3T6IZXv{Igj;#h zkT62)VUnkG6U;WrPj$)-_%!^%j=XqB8Bs;rbN?YqQ9ibr^<1D|F`gPMakF|e%x_ov z|EFulEKDHrH}VP8(#Nm5xB3Ki`rm)L5uM$XvkED`*D=bmwySq^{TI zYpoPdAG5daSuV(*#Zqls+HLAJP# z$x!ek5eLq+Vny9tOdSQ=vtgHJO$_*ZJxip$$^=TJ4Db62W>qPk?@8-MRgQI&Vn0^Q zRFLaAfu|-9rA{n{oz}8)$BdT$gYbM)N@|;(!gh4YURuxkmw(Zh|;(RW2Vs zbCgyo1q)C#hq?yjW6tS5JleIjkArodg!iqzO=-YulnYjt5;bLnT_J`+ao-(TZqgFZoZzey=terE_oV9(oM!>h|u_r)Sp>S8YXy2vhC-B3Mz=iyP+Z zbNLkgQ@bjAoM$|w!y|)Xy|q#tN>wxE9Iz@ziQdj>+XSm*7OE29;r+SL(^Rw6XdkiM zHh$X%ho5WHKDUp6cv}PQOEcQ~zoBak2who|UMz^+FI{!B^0yl?_f}7_K zA)TSXk?0m$u8SMNzwi3^YD|L*K}?qPHMyIdOX1UY+X%N1l<^~oN>#MHjXzo4=U4+xD`o*q1VJ?7SkRwVDNdm^;V&{6mVeR|p=6XaQgIDT{W6mB5ePU)Smu$0KHO za!fiE7`qhdHN(Iid9CJ7R*D^0J?Qi)UrH2W?nU-w*ayuyQTprTQ)G%-JbqnxMuv9V z@d@T_QAghK1tKh5p-@q1VD%f~;3hSp#sAjm+4@)jg`7|ekRn+amad@gpKArUT z3uOg+;~7g`MtHwxtWNn$`q(GKAHQod{#H=e4AmtY{dEs7$>Qz!+l3#63&|p_W7!d% z|N4L2o&@_9m^6BL9)G)~D5$M$5&X5|{UDZObuazsRP)IX`ZdBN`-;b6xnx~pX41#4PWy@PHz5g@Mh)X7iCrPXNv?S~9IG)v?7+aO-y)Q$p($$WDB%$Qv zW7An4J@-ZS1PU)diwFNO;J9(=GYP8`>YSodttw5e!?Sp)2Udf<3_J|!fKYNn&iXlp zl0RLN`SZ87u|b*e6;UA5Ev~DR5sxD{Qr`J%aX}QH<_QGsrLJNxv>D zGNbQA>MP(~2p9l|MQ*C_QFUM0ugCL87kf6!SBzEzb6Nbd3hhSeaA#?qruU*JM5NIQ zyOb*8>9kdGlIGn`DGciYTOFI43KC{C!qN{k8<+GAizW~BUG%r%S$Z?p?f4&+q8Ftk zCAR{5!d31lrg;{KacE6mC0>%J>Hdcn@qZ-2~jxZkrSOCn{mhHZDy!-EI zpe&^3`M<;h7&iim18P*w0MG~)E81ON7NppmGZM~Ktgl|(n2kBk+nNI3=GixbH{oW_rvWz#=I<dddx9S!HyU0Qa88^5_*{xu3hX%Wzne8YWnhNiqG>HpT0rOXpD{0 zhz-Y$dIH7;983WN^+mDl4p-jwxJaOOZ3nNp2q>@SE~)*{Z$5H)B2rt0ms9VVxJLB@ zY#xtcE;uLhph}>Uaze_3EeG&Phs#VW?g|MAx1hwy^g*G7TB-)?mWh6c=f4Gi{;OKwRCg1z{pwjnGAp-Qx8)ZTIKxyn>U+ zHIb_oH>-3axU9n1^}_Dt_g~!TSKX1fJ`bbjgb3xvN8@>m>X;%>MDRGNY(B=tYT+;2 zQplZZz5p4X@$qK}WLZIEgD!c;PKXj~iW=-jwOkvvfT}sap^qC3=g9jETy5PfzgGEY z>sG{%dmpci-Q5L~ryQS(vA?VQCZue-vikDjcT(mcJI$|)HL#y`3y%lHa?71I0$y`` zH9H^p-k-7c*K|D7yuVHHYlh&Vef7XpkUiiVq{9&e@Z8GKI|Zn7!HtEfOR-8+;`~3~ z^%^h4bC-huNfOia`t@t)4Wo_Aq^pgHQ>innGL<_fi`Yv44XX}-z)AU zb+g-QEZhGl(rLk4B8$2va4soarZmGXuwwERGlmOos37I4Eife+5XFUh8jd1>x2BC+ z(RJy^5yJA&`}2147R2c59MFq4xB?xrHN=(KH>#G0u7<*nB|VpP1pC2BZ^S%lu3>%) zA{&;*Xwtf3;mz|jB|D*Q6XMsf09hx7w;q!*-0OHm>DXYgN6V_bJyyBQG%*#cx*PaR zgomq-MYJ+5d%|bZ`kmN|Cnj81RQ_i4(@v#*PT&L+4afFd(O+1F0+TH z072$v^*n~RYdCLXXX5U?D4|I3(sr%V(*A6AQMriKz)Dt4HE~#WftaP;FGoGcxXGr^Ui(#R#+^p$5A?7OQTul3DK% zNZm1)Ru37}B&z2nsBK%?Q@H4lrW$cn)xc?-xYDnq_9)e%&)@7H&uM+U-n;9_!30g& zj=ulYK}g2qJ}~m>*~vCAeHMZ={b5z+`8(6=AmeH2ocfZ74X}1t(i1G*IST=>YCz2Y z=_1^H15kSNuncwj^`h_3L1?~nYI-_wioQ@n25aq$;6VJbKesXa1qr&zW`Aoe+Vx_d z($U}{P}Ra{Zx}_|+Q#S%Xkc5%t@Q}#Q{N!lB~z#M(tsZTWGk$L7zeGeCLUApw{2C+ zH{qdOq(Bl(Wg?lC^w?8NNhxT$ap75^xr+gO5oSaQqyWD{6Yo;e`VotTx794s4Fc!^ z^7cF_=#$kB!7+7NW?|~ssoz`X5!K6gz?X5;W&W-29lgFMDWf+0I(|*f44CJ<#zPlv zU}u`H-SUS!=j=T$k&$RdlO)5s?(|HBsL~skuEF(PNH9sN*e<5|uG2*VC9fGMLEqc7 zM)J(9!u*vKXY+CnfB!2lhPLPd2G?OT4d=qkI(9q?5zlVAx7m#h6n1(OPE~?j0rg`c zAn=ft<)%l3>Zo-9A7cM$yi}xa)Uk)AlHmmoPPdF&DSh~O@9wbWKP#8%>!G&6F``|Q zWqz@x>u~~2^QC@)ZYw^4GX$1K>E4uvyEr+V_mBwxhDyMO3NvnMXyg>CcHKEOtv$*) z*|!}p=u7lYYXY2Y*4lE2koDBAn<5W5BxB2eZ#&%uI8?`E@HtK$6tbw4L@sIyR2f;H zf+(Ine250r812++1{{Frz5M{C0?$c=RJ};OEMUn9z^S>T zlK|*1&K~rd;|bn_`g?#y9`M!r>-#rnfU1i;J5AM$>Kq_bJVeZ7hqp#WL*pe&HeTy$ z`WaZkUmci4tS&7jI9%quxQNDM!*a`+o?u3Q#&0;~vge%eBtWv)*``x)UjlUwl354#HI3%_HR?YM~|eDm)O6d z(CGhOw#$EBwyR24@5?YDiM`q7Ym4;FTwXpmh@*EHSF3bx5w&2unQLeEN~CO?)JP7t zg#weSD*Hl?UV0(6jAA0#&3LUrJqPJj%VRAIKhxdZpfKFkvntuX)k5)E$Q`sh;NKv~ z=L=SZdVL4kDq|V_TCrB%-SI>GKBUYDjibz9}&2s zw~0wpPcr8?7z7#d-b5y=%CawfspV?{3CS{wu5H&U!&~`r|5VGPnSm&4j?a_*^L8O= zy*w%}7URX@+G);+dhXLnhoO52vfWk4)cjmwl8_Z_t9XWNctBomh7K!h&lq+><=D1cqw_z3!xSS-fD=+-*9+pE0!N)GEf^EY&r{^{+-3#xsEK7 z(fTB#MTtk37I9$UNYI4`cJQYsE_f|ZB&G*#R)irVaCr|&+`6$H+!@qe>l2Dx*EvhPbnwfcLtu^UkUELg-%=~LaM^tA z_-Z0mwLYUA*6^&b!ps zbYrMU>xM!vFCZ6(v)*Q~_}!0~`b-Z5%5bBwurSfKpLLWGS4vDy2R}Y#{MB!FCXWPX z>6Vw5?}z_d`#1nZ&^axFs39OA!4pO$Wn?sE@d({WjLV5TcsRFFP_z@3lqnpj?yLjX ze7fcWt*n?tW7uWL;2ePyz?pZG<^~+_Rj5edq^KMc1h$*=q@K(fHq^w? z9GZcf!nAon$gyJo%ar5IIpF6PBc|m#?hkljNqIBh05ijzF+r8vR3v7NBqStw%p@95 zu4w@CndFqpz8qu4gPUJp?;3skyQ5&9$`h^P&|aROA6xi~XI|TRGD?I2XR1yLE%d(C za9`r@$!jAotJc)?0sArq4PwoPH>W?I629PK-ZOkAtD+ajN;yrz~Icde?5#@a?Vk0Ilv+>_iX`}gz@89buqQA!j9 zR@>aB(=Zo#R&xxFID&DVrS)8n9LA2rn^P2$F4936+ahLzf=8GprfQ`l3zDfJ8fT+9b5Z*a33ARahZPkL$u zV`IOf?p!C4$7QYUO#8ICtBC|F^qO_9Xj^s8@ZW$}mHk<*kza19!{UcPiTtVgcc?)= zbJ?Oc{$pbw%OP&vIq_EE-TCTH3kWSX3{g@Ych|4G z7&zTOAU;y#-%e1|c}w}JAqVtq_<_?qxO?g4jNkKb-(LK=22Ki(g8NuRX@dYSrGG9j zE0pGB3tqQG3E>?8D6jHXEd3$|J{lycWJQ3Qn1Af-SOZU^&|ZJd%wZ zgs>d1Qe-lv-I-CYGCe3?1cOR{jdo#5&ey5j)5Rze!Q%9RTGhnV+^SrJ8@0)Q_KVaN zi7gHFp@bn{vJJUqaPNbJl1jbq#G8>N1repD;~8ot&2b7Pt>DDbjX%{1tfaUlL{y1o zsgpkrX7dF!`lf3~DxcBH>pO722oX;8=ytK?Y+}QVVDZnoxZ8=aHpE6(kD`5Yr;5<( z5vnmI-9K^^y==HZz?rqA`EId2@tOLTn0I`sW$he)3Px3U!mBE}K8@yFLFi$>XqRze zO9wZ4P8c6!vvEZuPL|I`wnKDW&AYp%oOy==G|r=?)3KAOI;v$-xns;+7At_3LV(JM zn#P=J+z4SI{z;xK$*C-*VghcsyqQBIu3FE^zVh!?MJ*`~=YVMWE{WXj+pc-CL!JROQzcEL-d+k)tyYK7oPdk(JsJZtL zoJn5h>FetNKuUdMDKG!EXC^gI^G*s2^0qD?-!+WhM%h8DpU^ralmhRcG(=k z!Tyfd5wPbqic_y3^*-UY7w!T%sLam3nWB-Ko~( z-Qj0T!2$=Kq5rJ7$3$?kta6tw25B0IJWV0HANGII5DG-Ywi%R~H!Kr511R>4-(Ek= z4uSQ(I)nRpFTRLuc8i&`1IGC8;#y)`)n%<5XlntIL4m~3r_jWwk*~}0lkMlx_up`T?~?!C~VslS?SSprX5POjTZ^iAIewg<$m$F`PHujl>t5b8A4geQ=ik_oXKzP1g)|yAqD?J&h3fnIYAs7)*O#+srznoYls+^n^kM_++uA| zh}u4VrsSKhLtLXBDHdl-fo5>U;&`1ve2k!Wn*~^feyi z^KuYLXQQI+gMfF5MtLG_p;eSmIE{!|uYkkz$@lndZ>72F#lyEK0Y#Em3?bpP^T6fp z6#zRZb7qX*+VW@K=gG)x2UH_?)8z@S%LNd`Ii`tng#C8@!^Eecz9D82HF7&5r$`=^ z7bZE#PWYSv>q5r!3*JqmTS=mE*Tx+I`* z!1nbP5yAY^yTe$b<`dhvT ze8l5wgW&$?=xBpwve(^>$MjEPIC~f;P&GBg8|k;%I=DlQ@h*Zz{N2ykb=7+PrKZ*koU0SUP+lh$g(&AT_ZK=M;| zLv80wP1j7jk#Av!-!m0OJh)HEY7%PAPeGpU|u0+ZXt>G$7` zLYF!9D4Y6T=ERmN61WvN&vQ!Li-L$BRhJO;QsM%kmR~RwfVxCm--@S9ue@buPc*Jh zD}RuxG3o1YCO1p~{+>S%qQ*M`rhw^%gKg~u@WCj zE`b<5mQ&#{P@`&4kvp{JWc`}BwkkWMGjiY>ti)u!dsp$!@I>Wk+^Q=H){7&@} z>|&`{stFv6c#p*pR5%k%{JzEs1(YrC+(JgErb>p|LYxvX0+4Ohh)OC!9clkI*Y;3p zvO}_4+p+YM7&F0J3uYZ2LzJKB`|JKbEH7oy# z>NNhmp+PvbuBdZM0!(q0wI2GVv92UA`NS$Cuc{u_@*Xf^oy;H&N~U{m2G|_Q9g*t% z-Vwat^UvzT%T4_I!GI@n2iLqH8KMF$Age7*7j$~X66U;QpIhvyP2Rauck zbAHx(@S2aE$e^>a^G?29Ah|qlChG01(l^8I6Tksh{_Cr6s%pJ^=fiV9ciTDG*ffN_ zEjdNFI{w}O^MwIHzUQjKG?8)B+-7mf13=UI|L3V{37|h>b80&@N}0hG%JIvz$S0d3K(e6IAwk*{Loy?MUS7^v%Yf^rDSZ5z%J%7 zyoh>m1pdPq+JGb?PS1;Kbx4B_2RZ^IiYaW+@LNoIwJR<9zR>NapXz@BHx7x=Xe?(C zMN)YF;M)_~Rpm@1(Ps25tZW>lYpyV%A@{-1dhgkhmtIi=U*qj|Xx_16Lypg5oPML+ zlP3DMbJwunD=NT#%fQ^P=9=H_Aq4N@9+oEaiB;p@57^dOH4fi0z9wFN=u1@LiPbk9|`uj5A7DLXN@wrU3$GYw5lzEzRXU^1mX)h1@u5d~av{26#j(adx>cG;^&f~a`s z@_xy{6Y_jLCXcY4p2NTM9s>=IYL23shpOq?T#(3QMrQC}cqDyfb!L>AE^v33D%sW1 z@%H6_Dlq2WkGuc>I+ee`Bj6KjKEwt`6q3u!Bar$Pkjz^vJ zt0~Y-s0%!zZPNs#P9L|Qd;0~r#!bILwB};*e5_O7?IC}Azf@~~(JIWy`|qMXK?t9Rg^Tg)O(YX}039m1 zH+20-QcexlwC#5H=^0PGAn9RIb+B5SOC3=UI5|w!U-!sh$i$3*l=7jPzB-&2V7bCQ zQ^$#~7~oKEE?6axKfeWj&8(?raot#Hub0lX^F%iItloj3X89QO&9YS-Pc3OJl?LFv z0K7{AN{*{+8HI@9udTVg^pi336zHH&3N2oj1%Om&9MsF$$p^eC;NH1{ z^b6WuRlf3#sCbkA}BuAp&5dESTER(xGT+ zhQmP7UQ>6P3Et2yv4~FEr$Iep4O94Wq(_T24)qX^hJ1;mpB16b${G8wnqc|Azhqvu zr?oVGq_AeI@r-J&uqY94n z3F9Y9U(#HkC53bO#7a}3YtwcfOZL~uv@Vn^yHPm$G}m@n(b@8u`-g;bVknGZgn)YG zLSY$wG4z#7hSfM7D9lj(A|3Vg$*APp8YKof(h)bu=Q;h>{B5%!8+IoKzNOL%x@h@)?2914jO6bzRhvuY3|16Z1V zV)^9xldNuNDN552dJ=u!T4set1+pD^w|j%&yJPs}s`E#^tw%)xlF-H&jJM^)!9jG% z!VyE;;W>*kfWu(UaSeFG+y6YXB%ozFZq0_6T}+;%+U`SX_@;(Cq9O094gaJV!lDn7 z3Bb~si}b`RUVV8YV?d;t;nVMDn(M2-*_UAg>MCG1F#xzvIM7~dBsL`hYpBT^!1~L4 zEuyq$aV27L<6(0Qz)4A8wIhSL&DTB(Ms&WVGx%UW@*?to;fwgIv9>*<{sCXx-j50^ zU(47prc-}(rvB(!jb1yhC~cY$^JB;0u8^cDKM>psKGp8POUBVlEaU;VyZkSM#9Cd& z(H90#FaZzq`d0z zezhocdgRI>L^kF7V0IC;kU^td9~F|R+v^`jZnPYE81(Q0-;B$m$CjPYoW?H7)^+#G zh{tydM>RW+`3u(48#?=ogt3O7{zQqDjwDVOlq!IUy?(<=4&Lq5~c4J714KlP90R23JVL>id)OFfGV=h z+U391BrT<1h87>%dpJDY^ZmG(<5CD}t?(eo__D8-q~BKine8~iT1f>**)k?0cY;Ka z!tBi6Om~LiJ%qrAeGyXe12XNWfkcdKu;R5#8%dBHu~4 zn#^AWp50{^OVdmaeaA&4l+vt=dnd~bY6jsT@rLrbBPqGjc@r_;m4!tD0iO`OT|>=+!y*gk=qh6 zA7Z?z1NiTVt?)V_xAaiEP{2u`_sF1KG}OY?G23S@N2E6=UXYtbe8JqclXExE{+|1H z!4zP~a}f8Pz(tu0pgR$_vHzt!xd30Zzm%saKzSa2VK3efHvC6X;8*GUXD6b(_!C}X zrI_eRJH&{tA}H zb6tL(C&>{1I~F73s>cU$uC5dmW8XCzHm1$xrbWuw=_UCPhxTNfzvge)NzS(epCci@ z-JggzasT-{|6Oo0{A->m23LO7;c3*>9OPa3US-Ag#ZmCgMRym~f;VhCWP|BVoO!$C zgjX+_9kwpz?4Yf>LEn2k)u_0&Q2#Ls40&3Ms%S`dd_@3z_4l#sziHr;;nxPsgMHHl z$C6!hRwAcPL0BdRsSNs$#{I7Yx-K zFy^h|Tq@hxA&?kNvH?|Eq_#Wj0+OO9>ki z$Zws5XG#pq+QQ04-0H?&@w^Nrs^{~SG9-rUfgk@&bBL&LR2no;f)u6;b-o-i9b-;n zeEmQxY~6n>#h45%Mh^H;82B#h$tTk(>?9^NQ?l9a8oZr_w^mAz&jIxSz{3AUQic8p zQ7M`!z9s5uv#|S+)2J)Mq;pNGw5dTQBXglXqL}y96k9Ph-=pDqZ_98ih6fhf2o!T6 zSWD1=&WEw6NRHP6d5Vyg0)Th-NIsJygd#UO*Se`h_{?6C5uG|dU19C2X$LPDl~l$W zPk4zquq5eCI$2Mk3|wrJn37>HR(2Lt`Q^}VlT(V2M1w4(;i<*AkRF%C;3hnPi$ECQ zj*a@a=sdaX*wb?pcwDHz_NoKXLmnLr3?&uUQDO>&I#EGQ%i%SxR}fL2Y-~MX6Fwt6#pA^dFi0ivMB7$vr`cE9Q%`cY3nGG1h0l#X1Xk76@8M_b&zL3~(&Prg zdz>(i$C$)y*7EOFcTX;!UZv5CcB17|&+b7`fB-oRA z!ilR?M)8Ju?Q@pW?e*s624?axb4Kti-96-6%e0x;?y*3AgZ5?FAyKTlmTEmA<2lIY z*-P4S|J(dr^o0OjvOsF5xA~x-4znRjgza2#?Fb`!(|f%=UCP)0gM!^B=(DZ;(|7=T z4Q{Q8zSD-gMUqzGpP;Ht9Tc~ncVO6Go6eIR1a&U;Hg0ODe~s03ps|I9xo z(G6<-4@LuwU#yb;Te+x-yi#V&!BFhQype4@x#&u*S@X$JPM=hJb5ZYv46*+{?*4ny zTY}hbCSE$uf0e9`a?4Os(KUM{$4vszSgCz+tOK_)L7Hf7{ch`%gU3pTCh zd%oO{WxTI5rLKZgofkGhA$abj$_TkZO!Y@@l4V7}YEj4J?*#(TI5}+)u_$7%!iJ~D z+u}p?^nEG`lsTHIQhJCJ0Ns3;9HZ4?Dy#XL893*7e1QO$y3=g#afs_wbg*ItR|a$K z7#^{T9@m3bBXYZdWU1(^tZG99E)(jJFErFvpr0*h@{1MylVCg&7isR}3)DQ0l6$`3 zkZ;NZ>UaEi#i{VDvZ66P6rggEmpA&`c2QY`_$$c~!64HRA);pubZ24(cd|w*hpd;+ zot%N-0bJ9d$NrTYjbRUauN!#}jBRV*$jWY)vfT21N!odj_ulW;6=3OP*^aM4zcRrG z!~sElXL1q9^IpB1q&Aal{@iEuAS?a1t`gu6TtE2>CCqh(yw8wZ$&7w1<^*YcYH<8^ z!f1-3jkeQ-^rI&Sk{=muJ&JidW;ix(C%z#8Qk(v8k{w@8hFkJhDp4MFwZVtS zlf1^C^=CC#vLudi#6PIB6Z_q0CkGFqnrocWl|D7 zC5K~yoNE@+6b?|K$ULZ{@^eBlR$3V_m9A7g7uu=fWAnO=P|SkAt^mb|P44$-FPA;s zWr!Mv9f9q6cH`ZAf9VVFgBg+zpzHvUP3XU>ZR|_9a!0l2gRa5XWvs!jBBJt3%&FT&6h!HXqhM0p&aZg~0$m`ICHQ=4Av{|y`q@B-73Xe3kEuR-y z1S8Gf|LN7BwbDZ7+6vz;my*?=1nyGjovlnsnJu3G*_8A^-K(d953eGWS}o?xs@Iur zzoGw)`$QbBbx4^{$^cIr#}#45&|xE%t?h=Sdf27FYC~J|XphTyM5AS&iM&paj@5(A z#8GW4)kUc&==RDRi`YcDd*5aVwBiI@pP7ey$n;Y3Wj34?5iruR2eLUK$GPKtyo}51 z-tOa41XbOArKyuigRLPZQ#;VwmPxZ^p{N-CB$MDU-yG$oqugDnk#Xpom%V{FH-3Z8 z-dAzHCivzA$)Uf?vkF>%5)ez_z|j3$dvO?b5`@;%u8)xzMdfz;GIrT8!YcsvdtLk` zcf>A#3E<2B)*aU8;Qz*Kg+u^-Ha)-nJ`bOMZ7DQ{~#no4tKq) z@W`KGvt!P=ei;^*W*i9&$MbCcrkX4~V>IdWJgh8h`(TN)W*#5%nX2-nKkg9p1~#6o z59~TT?JRXTZFtKe(d*o(>dVE&-BK=o+F&3+%cy9#V*I4Z0KTv)zf_vT@6cq|CuqeB z8OZu?eV1ol`R^`94@Ug$%+*Nr_YMBiSpAb##)5$O&d|y=g0oTy}aQmEXok1TkF@M;k>+&ivG0Q8) zf*k`EYj zrtIZFY`D;BR@zw$j3z`F9-mwMZiK?lD1WIt`iw*1LZSi*_Ot7dX=b_z@~fN3IbO9A z2Kdz!$FK{a_^E$M;>;~6c}WD>sGzVWcA?fpk2*gRvSCfl8)I>@#%O1nICiXyJK$qA zoFclFn4?mL>gf0c99DU`3Jqo1lPQYL-kE6Qus)$(-EEndW{pz$CR*L+6dOUrYWE8D zgmP=_TEA2S?aS!UTmdc91vXQg8CpFy6kkb4iME>dZCgj%m$b0W;308Oex*FyuIx9g zT@ch0vBcT%gK|w$XkHqooavrVp+s9yD>;62R*Y9hK*PRAB-a~k#h_?OWy#jsE{&4)!L!b7*rc%S;%jKq^e~w7Pf~CWE zXM;k|?fpydeH1(5v!E#Ecp8Z!$9psZt6`@`WqTJ(|LI)uX6#-CK>QatR`|^HDe>;T zBK?}5|3$V$o__h?f{^N4L;Par^FNtkBYQ7`6Wp%nd@6pVn+ED|4M-QPgY@0wFmyet z?@sy7XA#3?6Kj=mTOI-OcI=rR#@mC&(-t=_2}Sf|nwKQRQK7mO`hL}`lv2Vm3*`jW z+`CR381q6pc4B!?9BUp$&9L=Tc@nY(p@&=|1M>;^+zld@a==kY+{a#x$K36-Sacs( zraU(TDYKfMRG-NM2Qp&_O)PMu_s-u?oi68gJM%s$*J+q{#6|#vH7kF}g$Pzl0uDCo z_0-+2s0vVy;kSyO(Ft^~vj~9)qwRuP4cwHHTaAl*#-b8L=yK?b`^Vk7T8D+dk=&gc zyYDO*iJGH!1j#9Kp|7>wX^P$su_d_j}XS>S~pKVk4_!;0ACDdR*Y8liN?CXM8E5g62;<(5TIRS)K`Vwi%H_xns4$~WYf=bBbtMLfrwkGW-7NeKjH%N z^>b-5265w{%l^GV%d|$tl+Tb7E>g$2DOJtN2U(UzASQW{r5g4=$ctFDV_j3V+~#EgK&#-e zT%_+jnMv)u*jdoZx!>40Q%|(P96%%pn(U;~GN%QiAiLco!gfUPVS9BLJ8|avl~};M z*omav>Z30VYK<%}?C+M@D~lB_d}>FJ2WL%?*{wWE`*qqd$3N98XVBi0mVTsd>szG^ zIi3m>Kiv0{5J0k-7r-C=U_FByEkYmN#Ghd_7lQJ$>}j{QsJzokre& z_5Ox!;G#De?_(Bn`D+%FknuaEG}un!PxqoHOP!#6%4~YByq@HYMbKdVxLCd6V z_9^_iwZXk*S`6J%L^+q^c8(r0~P5YATb@7Y_?@ zs=6o6yoZFx4J`=J>e4af`ULN;A>XT$Kj%-WP4y+Vno%v{C@->C?lh2u27|0?f&tP8 zvC@9g{UHmQLlsx+LCu-dDBAU0$zauK3P8|^n{w}^X;0vC=-YUV5K@`Qc(k>WF@+9K zlv4{dYoWxo{V&W9>`VUrNyx%bXg!)lEe_lsgk+v+)yB+;ZY?jGx`YY!OP8#JjB?y~ z>3dAUOuB3XdvY>I?rRGeYh)4S8P_-Exi%7?A-syCSWKBrSUYN7in)wN# zNg}1(YBFOMZZI_0dt`@?bg$fwsS*G;B`JIdq=_mIrwRrpQNU2R8vW1Xg}mx#X9t1? zuXy-d+-028`M|sZlFrA)byf!y8Zaq(6Ln)^V0YqD)wjGO+=*ucHq4u*yI{KKO5sS3 z7n2{ls~I&~rfN20fVoJ(0Z6}$JcBr4l--i4wRqb*wX`URg1wH6FX@LdTPIFyo3FU$ zAkgCSBRr7*%USLc-g-i~LLgg74|UVEww0RQpUDnY_#RP4(wb`5^v{P3ONZN&rQz*5 zE{spE(l`g_zCbQWl5y^#1JI{~nJkewWBzf7thE3C$JAQ|L>0DQyb1ymA|ee6NHY>r zA{`>qIRit3beD8X2na|^hx80BC0z=GbazNgcXM98?>p!G@4WDe*?YgwyPmavYn05Z zlil60uIglF$^jl!C0=F;qePBH$t`M4Z(U3+u@7yTnnjK*_1$8_bB8RdeS?v!tN-7j z@%jJUw4#w;jNB)a!G1Xt!nqhFA7Uf{i(amN?_tJV2Z@;@PX88R>=>;s@{Qdi7DFj} zL6Jx&G@H)wYieN(9lWBmGpddaUY_4^loK04f79Fj@U1vYy8{6R525dRB>l$%p*5I1 zhH~97v65+DY+=lP9^~eaj=gM*9brWbzdGMTwvsV(sjwe>37H*KYOTJ~MnnmhL7!#4 zpLG2uvWn3+GOKb6k9hul67d%w5}v@HK(M>1zWyk=(ZfZb--`->;2c_|#b{t} zb(gy0On@}kMQ@(Z_-N?N1vUlmBNb_W&Df)kd@eOYO)%j9UK|_=I)D17EAbo}jTQW5{KQ)Fn7WKz~v;TvW- zg~Jplg+K0$6F6@%xSX2)q(XE*nys>gpmYjZk7tP#)pID0EwJ9Jy<`1`^R+Tx-ZLPE zl|gc!@F5Q~{)`Fxl332rQ^EjCjdV7x1?qBGXs>L7oXommrQ{VBP&;a87#Lsf8$Sf= z;;jIsy=k%9hdL1*o#6|bKX{71XwXFuDQgNfyB3`XIu9;!cMSh@D`K{FCguD5+9m0r zW==&D0xldJ@FXP`fIWE%^B9`k_`O+ zXBj-{F48PQYK`;dbg>eoVZSrIDrZ|0Z5Q{e-ERBO#TCkhc=uL^)ovJz=KeHj z&{+1xM-#(PLnbIy2y?g%4qpl#uxt_<2?pdDV<&W65&!*078kRSaA1A^{GQgJW9eIJ zzD_u`SZ>3~D3w-$Be4f!1n8zov-xI^Ss}1Oh(VYXM0xY68F6mwXIgt=HgT9UPYGtG zmu^=8#5`ZnVBNyM_{Qk_^u#iul3$8W=W#_JO4F`i5{9szj6V^Y=5;x!gZ_PU@GtFa zyaBOUm7nSyTEW;Ni|l8^8ru6+UUAGFF*I6!34u6Ts4xzS z@aZI`C+wyA$=18><@iM0hpbpV-3@Q0V9UH7q2*TA;{y8@uj*TydR`!2`+v(z>RC}X z&vVlRcVq`X-A6G8zi2aI`eda_DC8XCAd$u`*1uuqT%4^J*rV=BYf3zM# zv@b}t4-WERUdK`YS2;>V!tAUm%Y%dr%i-sA!#C>*21bJ2)bkq(rq|s%AZZw_daj&D z^e67>X|9--D!&@O0#tH%bX}f702(3R8#JldAC$iq5DSe7D0vg3Zxi(0cqc;>5s2i< zdGig$_6stBjV$`ovn3KAlQ%#lLz}<|!7-%tta#DHt_tPNEh}PrA-k-fWN#ixZ%j*~ zGXjy3S6%8*O2xv_|0oWlt;Eg5k)vW`b;dy1+&BuV|0V5+u?*0ZT0v${aP+Z;eX5X< zpRvP}mZMX7W&9{4oX~{d`Y8Cl3AR7+OTZSWDW8PSERduS$5pk$HUD;%syZEx;I&*) z#4I~e=H``8!p#Yh0pIb;isI>=&>~<_IV9Nkb z#R=<`Z78=Rx!rP)tgh{VEWEp@=tWbZBytXQ!u69SG3qUGZPAVUQxr3U8LDhOiJY4N z`VtxD6rSZHZFO>IisDJ2k)|ka%DzdGXKW|Yz1sCdoUg6968km{ULv%oeGVI;92p0H zAWXv7sBXK_oYLzrE2US)hjtm{mmlp{NjDR2zS{$N3n(Uz|JeXDK%7P|#%Q&>5M3zJ z*`;vnM;$d-gwx*px^r(69_U~Y0;QGu50T{4&V{!u{3?;Ae!V~sHYDa_Tv2#lu4!+MjCuA`$P*DE&Cwcn8fhzoL2VLb=Q{}dwW4N0RMv{bQ|o+Xn|b0^ZNSqx$wO`V!> zEL>09%C`fkFpD0(dX+cEAx#e&jR_50D%B(~UkluhyuPD~@vtQJaC375FF!N8Ic-(5 z0hrXdap$>zSjHVV3q&MGzRvlV-BnB zD>H0wcdo;)@yK!2^-h&-A6)_n^qIo9zcLOI{K*A)zk9R384!zg!pM{9EytAA+suwb zdeaH)pC2pCgjCRTg0BvnUisT9nWhQZgJ|PMl5J*v zQkv93bp0TdJ;lIivDVYtn1L1vnAJ8aD@bpZ-V0j5z+#L@eINm6Z!JC^sab)IGd^0? zm~w>JxQA*oIGyK2KT=L2%QRbeRc zkA|(66@7{GAw*-$E#|5x(awW>q`~@n7xP22+uZ;A1K+KoqLCe@RarKF$WMavt_I0t z7$N#zA+PhSVf(3~(T{Qtvar!BaOArLAa)h&a`9jT<%Rm9lsvd$=_SWo{!ygPhP~?g z{OII-c`T!na{fhqXtC&Hh2HK9M4_eq&tDqp@}0Teti^v|Pn}MFI66cZ+|#lZFMSi` zqW_9kK34@59V3uaUR$eAt@Lf_hwfMTAi{(R_!N4U;~BoQ%oQX)DqdRMV9DRyfzuj4 zr1yrCnE?}GP{<~RnamoV=;Di=Y`Gtw+?e|=u|mY%_&ziiD{m;M%FDH2f-=tCZ?;vn zlm=F(@kgh^7%^(a6GrVK`M#T0tZFKORI|cFV;KrxnuTd2QmEc) zyAFDCCF@zznxOkCL0=$2S0q{c75KMeC~_o*L7T8e7VUvr(#iOA#lH@&gn9FRbj4>) z68bIc$CbUOLB=tLHT~;H6vZV}wG2D2bb>(c>~1?t3UX_6Vz$icWH^+PS>DFEbQo3@ zVZZ-IYsya}r?j*wDJky)We+`M7-Pj<#SaUvw?Vv5oZftNeSQ7ke}DHIqdCFja3_t1 ztJ(Ncou4=HJ>%_!9QxHaj}wdMy;+hzmNu}5>Zz{|i7HebTt{yH(Px1-bU>ZD7gl<# zeamiEsFCyDi&H^%B9|e#A2_c6mb~0FUa{vt1ibi9 zlMke7+)Vfus>PgBUN;R>&#uUA9Wl9J#7-)E@Ws87cq--lvp_yvM;L|UpWBxq442|~E?F6?EKBsy*3$=aY4?-4l7%_R>`kl#-BTCTd~$ou?fu>bVS3sI2|s2jE+d6a zIQIO$m+$o{XC`d_>R^BC;8o-*iw<9mu1JiwfIz*m@pw%1q)Fp|BgsJynv^Vni=oGeWvfjOx1-h-%u%bPt>5#2R0uqV+E));{_i8K|crB z$*qz)7vOAy<<8eBALhNiFSf;ggU{Pv73l3+kf}S>2W( zYgo#N_&I3_K285sXYAhnHxgYkHz2_O+!-t1E1Ioo9p>wdsD__^_&SOdO@cm0tBekn zFwb6Ail6xkm55=|J;>=v#~udsK?UevZYP!at`5^xnSHjyLAJxiB=>S4lw#xoN+FZ( zeoCq6`G(lnW{?7iJq|!T^n5jW^<#O;+Q^1{!$zkk)F*j?@CEH zJ#Mo8;}=}>pSpW~`7agCf6Og%El@`08)XOC!>+qx~j}XAb|C= zzW%n=WiBVCXXQoo`~N&(L*a*X`=n7m>+wz+>|S=gZRZG?dU1+)_r{^RN4UPs+C`%@BYSLpRxi`ynkvB1fqd1xrQ5yHy zC>!ER!XPgGFS3y39jR~073B&bQ5{`HKe-8cduX3x1bsg`YF6RZu;*bH4}7CiEBF2j z2@S+$&3YfD417c*jpeSaU<%H`bUJ@c<=E_( z)d5Oj6%{@298qrZx&krUvcUr1;bhiT3OYvb?-^maV<%P3Mb9(e+{0B^DiEH3*5!JJ zQ@j(vj~7?ycMgL?q2{Nn^;bc2e)nC)_4h`V2gpb&4@gx1IfPWz^5%Tfer}Jjbm)J4`ZVq+c?U zpiEX9;fDb2HXEWZ{wo5#PW%rwi7PBV{@)blFSH%8UzCN>P|hY{viS|UKFqi(Ry-XB zT=6beo3r7i*0v0Gj2H%`pUbidx`i>W*;HNM{N;JS6`tj>-gL{_JL1>kC~BaK#Tl%qmK6pkl9D6_j<^=@< zCqycySCtMW(po|R^3ETUbjKI*W-{wyOi{#`z2ie*&xJ$TM#|mxk5r58}rj|DyKh8 zqUYUqcgTn99aq4GSbyxjF1bhiLk)2xfJ<;Z3@YWnO5&d%BsP12uF+@i%hA-=>(VUZ z^+ls@!a@26cZuWiXz6EO64*b}L@u-fNoAQ`v>&<_iSAvcxPL;lA!tWmv+<& zv$6)fTly{WMGhaE1P=~W@Ygd8>kN6UvPS}tYQ-v&o|KXYjD~#WMuP!P5?i`-uhhC& z@w2)sAie5zjy)xcG1I_$`x) z%dC-Q68q5J0pr&R(_dEpg7h$^_8J%8&rY)o#;7a>y?dh+Cdz0fWA{YyAF_?#(}^&H zqBw$(@8YXuzp;&T!psS*dsLgg@PK(#x1NsqExO}Hx810(4T7GhRv7qX!}9LauBIr?d{E_=$`*$p_{Y6amx86wPmAP zefPs~S3Y7Cz<%t$tX>zRx`2Es_c-1JU2Io?7C{~{fctZtSVL#OuHPG<%TQzd$s;+L z#<#fj&PDYl)Gs7mJ@&Lt=0|yttG4v9#NiEh5y0jf4_mZ)kG)I%m*>}lLv50Epd_PD z^!Cb}2el)|(P&&V9VM_?001h|i6eFxe@o|IGH zC^HEx$U2^ud-qzKLwsEhcY9s(^7QjSoNa~xK+Z~-C@v1%KP{Tmx(*|eyHTtNYd$;o zBvo`bUHrj-n=f)IkY~pM=U2o zn4z0iPNH{(-Su+)&)@e50xq)gNYtZ$T3El@`dV_BgopT)Ab|J&Rvt4wO(rEe5~7JYIpc93GbEvc z_nh&gu^}^JGYPprWS-51hQT6AlK$l@A@fRlL2V}|)IZr+3TBDVgO)&F1})lDO!1dz z5MtQ>44ptE*W%TOP-2UFE*BlgaEd zME;=k8^AGS<;*Ly*6EV{hRTCO<~dDUBrLNt&y=uq`P$XlKQyW>!7MVh{t_WbH8F6p zVUxhVZ2=R4zKnPG3nE5SN$&@YP#; zku+sfu*^_SMnUs)4(ooi)O zG@z$;%|U>bV(r391k-CHH__+jFav8-QS{n*=WtzfL3cv4$o0_Ls?hO>8V_3N9T@=vLuP(W*sWW8 z-nXK6-xFkFCD=3W^YHNOA@BNkc1DY9=1|9D88q#tKjNGu6JEjt!v3&a5E#3Gyzn5e zXfU94WQ$0};#yl+)PcZmGYFy2dmZ)~xL?Ql>fDG_P<&}ToAe}UI*Bvrf1U3BY*1j^5+$+L~ z$obinsoqB@k><7PouE?D#>;<7&nC8va$|3K9$Tg#%(Q{Tmc7-qoxVoJ5FfaABG;QFto5&>a0q?q zcv$d$DssGn)c6(gw+FD$Al4dd9u6-Im__Aits9z-NRfG1u`)@0WzW07)`T!>TzqWX zVzQ?i{+2%%kX%6rnLX`gIdz6;OaO-~0YP^v|RKCkcE*#^Az z2N8W+A}L@PuoHsoR7j}2%ME5&h|n4oaR-Gg&7g0@|22TV?Sgi5<_iH?zOBIY>lF@P zun`#rP`y7GD}}mkdd9CG@9C4_>aH{b&t~x4E_AeF7<|F zn2f~*t_(aFzcLqF{lRpF1@JAJ$!O>I@TT4@f0Z07(Zy8}I$QYkBdSGo{WKGxwbC$u z+CMeNBL3R*K+BEbrwN-7Q5TL_Q7kdql=n$xhDpJC0KooU^mD{R>yW=SrBT|}`ct~y_1*wNW89$*4YcGmFU59=(Md%J!`TX-E$qtMn3uqFf7q47>pV2* zX@(yEB8xb3oW*+uduo1mVe;^R`sAW|_ZrNEzeSs9jE_g!NU5j1wNH1>6Hjg~Ts@Wa zt1msRPUI6wi<+mV31<(7c2Admo7T!z-ql|AL~*2^#pOs*Gd&v99wQ$b&(J%Y(8aB( zzDYPe_I(B4U;EV)Hc!?T6?Tdj1x+dbufJf<9I%vCx>141i{EXE%@atkLAF+Y<0_Cb z|LyAj7w#&w7P`_WHY_ZVNI+Lfq$9I9n=KxpDn1e^S*_i*a!y7$N8mN!70jOCx0ocQ=zW7Z_p= zE;Se;m=H@+x>sd#98?f5$Zn5|>a9wL13ZgZMKzpz|kdvpOJ*d*lDyqcYPdkckZ2FG}xcd*+X%?;@W5c`f@* zmh2^#NvOZvXd+abNcIew8pic90Z~=GC6KmN_lRD3AStAlPxfeW#)C5G4#s5S&~0gC zv{ZyBL3@tR$*}KuUrYHKK#2Nwl6kG>z)c06c;AhxF&}}z9i@J___FK1E_DQz4K~I@ z&U@(K)7}REI+`zfZDDXv0T*gvZM~JY>&2u{`26N=ZR%Y#f5&_iw07Qe1Nu#^CcZfC z{LM+tT?0{Y*g@djyDEU0OEb*;l`btXucg-v8f!fk)pgJC}p(Aa10Q9Dd zoOde)h?)OfNBWJu`b|~oacqg7#c(^_d_4_Vww*PB^}QK<#!}MGuK$W_o`ZXx4z7F2 zKBzl-@^|@3=HGNM@8ZS$1B)rNFFC1}TQ`3XPNSi|Tb)s}O?$c07$uROS0Ckn3;nde zdRjl7eNd*AjT<6bdpYr&#E;=@6ZbKj&QBj#XV}QaE^_L+an#f3P4}(%?6jRS zLv1z3vrW-W8x~ob4}LzEwGKfxgzD~SjuE4mR2U2Gr*iAr|2llWZ>n-6V}OX^hPvd- z-F(q3dEeSy#PQt%rM}aLs5Ul{FAj}iP~E@@DmiMve}uQD+?o~*_oagFKYk2(rTN8dQim*5=x>d1>E$oz8@k+I>qLC$z*kmGju_Fae30|lG!{K!ctvE}$ z&Lk}&HNA@|h;Vy6vrYC{4a!gqW4S3cy?C?gk*t(4Tvb;`$*@fWm}g zXXWQv+IKrr3BIqJ>U}b~u9P`$CUTerPQ8cUfUpIWtQ_8{9Ez};C(=~@gn9iEh611& z5y)A3?Ba=A9L%Z(8&jzgp8(vBYD!c~ou2Rw(62atuD_s=p0R!1^`M>8ai<*so6Ers zJS$}5-92=h5QjP)&U-&Hd+MlyANU2EUNqm>=EYN7uLo%@i&YmGj zsaM`x<-hUYEEC)axvQ3I;#CBocr5vNcv9V0li1kUh8lm$XX5g$Dglbj%`0%*lvLKN zv7JTHy^{)dBp(H`-XktWTiiznHA+B`Y+sPg>HxBsLxPC6%JMD^Lcf`Rp459^)b?rh zn~TAq@0%OZ*9YOzG&OY3P3!BS(NNcz=dRS}pW}vi*LL;KZhp=#>N>8^K9|FoAJw$sIgm%jtpS11QaCzqnEu{&xoXb@*e!Q_upW@-EI zGgQh;H$n`J1{(HpHB4>o2A<~}lY|VO*<0_EO0b9NfJG;jNx_q1tME&Q@gUKITs&Fg zm0>%@Y&n+K>qcE@2*%ZCPY=UtjT2}d@(?19un*M*Bvwk4>qt>J8k6{)9e?LPJ03C3 zv2?gGOsilMyj-A{VZ;ghi({smiUTTg1SO@p=uxzY*7t>?M)<*y7Hy5d6UZ!W<*Z$G ztH#X%qwA9jt+kkA6+~Jmv~LL~$qOvLHg7srDy_ER zgbaQO0yrjcKE&&?m+bJYds*!5#Oq=}7^pDqO}6v;ODSaTOmvWOy=A8I`;si@C|kLh#ZB2m`256FO#pII<*hm^9-1 z?+oW586fWA{ooT2xTq@ij(Bo+8T?UN?}t;1ZGhb%9i)LcrV4;=8V7;zjYO{MpmFDf zB^Dr+D#Fae#`S%L|ET$v2e@!zD>$s(@kHd<>)vYrJR$8>40+~4rjC71qoMEp(bu=R z1kOxUYYA-8D&uQAjl15vmw=mjC%;5Oj4lh6yf;(kuNeCizY9Il5|d>UyClJ{_gyT*G8vjRp>*9X zV82>??5XHwd1}#fnuCkme6c;Z+9l!S?0-?Wc6wE7u~>P!llO#X@3RK)O;kReIXu_n zufCVt;_PcS9V|H8i2&ldTh_DeOsQM;_1(f~uU<+|5RNU%5-{XA5F6k0XDae8E~WqC zKLSjgT}$~_2>(XtAGfxaQJB70y=eI`Y07bjK@r^b%YEzemS#QN?#M=NQREbRs@<<4E79?ZVO{M8wIX5!Jr%hxUz7E&uI)sP?8q zEl4a8B8){8(b3yvPhPQ!kC^mm#lc1e1O>nN@mN-dA~ZqzgUQB|nXq{2SmlI3Vptzr z(aCbEq!CUEz1h?VAEI2-g#SgvX)q*HOJgGLJ=)bSxl>88f1C!%`e<4gVwOj4s~8uc?L}e^Bf(WFQcmu!eYgwbaG7EE4NTQ5=G?@@P?LPz}P6! z5iZz%-6(`kyQa&Ercdz!RV|8dnlo_PMf80Cz=@2q&vmdF^`F zSF|=es*R~;)@Ay9EhB0w5aj~^nE^`XqUKVm1y%QXC~*w^Kpmks$rPb+5MNYeuH27I zjn+2+&BUx!mEGv6t)&$ya$)ZGAaLQOa)_x##=E%Z43@FIrk|F?aO1eWNl@gnZ^$RM z0Me`;ux~%U(W1xlECn{WNy85f1AQ86GhK{dw9C*^ZOW>#PHy~92eFt0OnR!wDa-0Dwen{Bc0@C=4^lO z(1#apfgBRG&<)987VZ3$f~=Klh$h%EEbh9q@LvNrhfxev=65B|&nt2bw<+?erAXVu zPS=a4_3!82j>UF?dz~HEuH14XOM5IU|I^NWO$UBeDjZVGw$2-Spjc9U_S3`(kr0!s zqka&Ufc2e$8FxxWp5f^&JwK?y4b$y1(;1A^Wqx0;OnOnluo`SMDxwu0hxNb*#pYAl ztzmnTs2x-)FY7_43?tupaV!OCw@g^54b$W;S=fw%RKx^W8WWwx|L$yol7Hcn_+{Y| zB%3Dw)YJ<18(WiVW$BMewYdd$+oQNK!HBAoAqowP_)2EAn+~7cZg~M zyv*UlIF!Yh4u(7ZcTtn&{RD6&{kYiwg(zs;aUH5*^1%O}k&mNwe!#~L!{(i@_ zPXo&Ya7giT(Dh06-@UOs3isuB}5vyWL}j9Z)HP-)I$u58Q)$b9eOA&CHfo6>yytQ2(Te z*-hm#VQBw84M|4Hp}cXU)E&kL8oe*>R%^McGSpH-8%Oyf$1DR69}c$ji`AZ>d!g@e zOqm{!mioj`=gRS%wXzjtZDo72>;60fB-ha{=f4rJC1Cdm-G8}k7UoNc&$zp&yfUO0 zOFR{M90~Eb!@DZK2?X-d;YhmIfs7B+7S{-v%->HJnqMu2bCkpqhwZ*@+K;#sg@t_k zc70Ck-7RNS-_^Pwn&R(MxgV*YwUIU{XGnG_pwIDlJiD3f_X+ms<<3q0eKZGp0Dv03 zSp6^gHuEaYnD~69-fre{u>QnrGkw+`w*Y;u;D_`IDGAdoozIDg$M{bB^NCr8e&by} zr`_#F+!C(4gcU---L)9T)3M`=0P%PVRhl4F70D+_G6SY+Y4M0Y@ zq3=I+eU|z;28q6H#K|Bc`||~F#X+Zw<-FgVTVF;O#!#>*{6PtoLm6uQG4VzFJKwSa zYAz4S+?~%LRUD)mV5*_~MXqejAcuzvF`)`I!--3FGF#QHSe8Lka_2J2Us@L<>MO*P zhWrH%=xC^;EsfrGL^ArTN>SNQxr}!1l{F*udV@U*H;zvC2x3N_a|uc^exYA0B4{T_ zmJQ1@CQhhzpff*xsG4FphZ+qMGHtbKe2ou8Cy|SrK+-V3vSINh{>$}2Sy0bTIXa-T zGowYxr|v+JmV_;(LT7YLSta|46)YPQu?__i?EH)7w`a1n!|!+M2H~uTT$s^_78h&v z%X06C?SP7eFIzE5fyNUnL;i;!wGtw(<=duSm|k<-<7YgTV~xw(b8 z+t;{byK|TrGm+*mf5}ms0Q< z*QR?-ef!sUz3>yBDhI3JKV+p2dtyloFPg;wX$xG`%6HMBC1EB>j7AwUr8K}*XE~s# zkB`Q2pL2j^{0{8R<;eflr%IrU_uwT@&VGWOmDS%qr=&P1EdB?Ys?TwP?s0yO+(*EI z26mb*Z9m7gazEd}OhiWGb!0ovmI|-8efO8>mP`@i>PqmGy0j*b!t4Rt^enJz518(0 zA5EXB)3j{^wh~+_pWDm%ThJ_m+Fp?;K<-|Nvim-UUpqEIu6lf%ZFjMDCk_WQwr{$0 zap}*n1}@fhJw+W!8N!op{we}bO9F>m&0*Kc)lR(d@QQH#YS5_f<-r_g6j>F1o%iYF zBhNqjFV%hO)+TqAg5W(lz3UK&JchIfH5oK9>1^RrG>RW| zJ};+B63*f(e61Rs82mjiOdk3y5$+B~Fov58FBCbA_FBh`!H=nDFiuPwsm}3vH(C3K zXB(ukiS$~w$BC5QE2bvZgiSC0vhjL`+uW~Y)6C0bqrJhLUE)S>BCPSJ$Thx>cdTxT zLYnL7lsxW45z6wL;@=CT#ZVv0NQ_pz%F=St7=b_b`EOq=bSFn(mUPF3hmo zk!6UVp+Z1TcKPiq8GmD(_P|!6V3W?lAUFI!pY-H@yNJW$nBT_|XwrXNV*e&f@c{9o z9@hoRVfXiYSH8n|iLMvpx#q#>+wOG#ioE>c4QF3pUuo$Oa5@tKBgqgN?yS${w*8Y$ zuCoWGnfEp%laY4|j}on_Fh{a`>zi9!NN&te7Ut$+jltpOfl&fM4e0|L89o;lM7Fw* z7&Zo_saJlZYploo93aw4u10WTE)*3O%Jlymmfm&|EC3*BQXQvW-b@Ms__Z=nJ0nof z&cQBE;79)~H5#QD&E7q+p{c1007x&F3i<1}km@GX_wb`a+?&3S^|M-}EJQe9Af@s4 zxA}=CK=lpFV2j$p$~OzX7j@ZAtypX>n)Tb?-=8VNt3re?P%%qzA~<^9zWos$9o=#F z*X`}?FH{SI^*Vpg&iGFQX~o9AD|nVXLweDuAZCCk8jXK=Rc0?QeA)nrfYb)DzoSO#CoDk z{1U^zVv}2nR0=E_H}P%`w#T=;ca=_k_D+PU8`6r6MOseybSug-hEGtY&kFL_onAyXW;EIL*W1C}Zf$UX3stXKOs6ybKJ{6$o%EhpGP(S_Dom&5 zneyFJ)a5k&bmoGIjYILLLN)ckxX)!9?bclRp6`wM?&I<6ouD<+5G0@Nj3yJL2_MuP zjZouOU!9AoT^*N84N7+%hAnhp9X#F&fuQW92b<%2wuo2zr&mE6|T8rTs9J;B4hV7Q5(9 zMo1{pj3`MN7Nc$!xvPCR1W<40RwK6dewliAr*f2-qW^MgGM6}A+E&exXv%e+uP|qO3)i89 zEZ_3F%=3mUGOWZ~Suye8ukLx+9ml6M7@gR{kEwuBWD!Bwz~RSz*w8Mc{}CuE)^P9X1wgQx1uxfWp!f0&50;V$O|n&kWl=dbHO)(j_s$aw@fj`TG>LMOn+(gg3~tJep)4wG!6M9b7oKe@tGM@TJ}2i#}Sn) zyor_dj8OyTtI8GM*nzXV`4Am5Gw9c?bzMU9NEOA%Ja^Fr{0mcTcdEx`;odjCCARE_ zlSP&7Qk|Ro2Z`x}`lNjqa=Mw-V~)P8mS?{G+t+|w6gztR({i_Y{>N!!%?^0*PMdbe z8h0DvT-H_$;c0W8;m)UhDJM;r360W14X3fE?^mC_-tiu9dOq)6sZP_lMj|evd(cN| z6{J2E6rO@#tA{DWahpNC)9AQu6cazZA)i0&^(1?cIc~+V?x=ZAdBg*@`s9GB_;V(3EKE|bmXu}#sSk@t~Y`aY%1GFea={oT!M*o zq!5yz)X3}FU(6Wu!+=IEo$`*~cL_$Z(Je?7il|98-|^o#Df=g<57@(sQGfv76&78< ztHGN$)Kg--0_}A-_(-qy{422$Bij#5Spz6tx5nHuOUY>*Uv0Qm$2}-Lwzv$E72tDv z@!}+ao6*Tu{2T{c1vuWMU=<|c4Q;F@Wkwq06$w$|a7-C{IksLcQ&PD&#ib(&_a{2C zRr>*7a5>=w;X-oR(czpRIKWQeh0sB164LxiLh( z0tU`pJc;YnDr6|F%=CWu;)$@$7B7zR=<~CcW}T{2UtK1HL-uc2!S@YpquDs= zrpIYpRd#C)cc)9|FI}o%Z(Y~?%gyOibX3npR~if|9WFR|BsTwGa_-0J?Z@*u2uTX^ zj0zMJf+Odki!MrN_1gz6P%uhCad&F^fKB|$M+Z=Av`=s@pLs2bKjH;$f55FHvHkYw z>abt`r!&hu5s#0#ct1K78CmTC3S#&P$gFDWmwm2H+&nxv&{P4qu46X?xTePW>HPp+ z1@G;gSj8b+!7N716HqO;ET?}lv?g*|cc?yNFQWIcZ;|x)4|o6G+7;L-E>g~){aWo! z`Mb|w50u#}(3#0=ovCp@?C#E8c$n1h6`V&#D0Y^3v(d5#?D4=pcL6NP35s{Lad7?o z>?)O(wjQUF<}zh5^q5Sp1f=SeXwI^P1d{bQe+OnWL<5p8J6K9e zRRB{iNE^m$7(>Z$h&?1R;AX_E_|iQ~*Fx;+v@|516*$xH2lQ67X44A0W}3Ut2h>Mj z7m~nDI$S&7HwX}<{fmNKycnIc&lTkx$I=OU;P|tBwCVF32`j?G8i53Yfz2rO3%b>N z@sdlFjbJZ2FK^hRmK{zK2m4>0_}|tN~R`*sM);KGhANkc=5LA z$9a#!oKb9kZ8xqO`9I-bm>Ldg-*Unpoh-?w5gBdpY8?NOWnyM{h3rVkWyF%rQs|Oh zm&!(mglrka3pZQKPa@UdE)Z8Y)RL&L$k|}TXd-~%BVk&YV-MV>Z&^BqYOCa5eJfF} zbRCUZLJU%PZzTD1B`J5|;H5wjmBwrdE%6;AQyT9DjTVxNqlrsD{KwWFxA(d~KQ7;? zrCCZ}baDC*haoV3l+W?ny*S^t^Zj@1p@G!&H~s#RNKVggQRF+%Vfy)WmuzRH$M{Fw z+tVt~d7oIZzFSy9`-$&vd-^!9jC3jMResI|C%x169N$L6-CKv1IZ8_3N=?0SUbsJ2 zmh$?^w4Lvr+bjLF0V^3T1pw2 zvixb1*7u2P%b%AU`1-HVkYLL6f+zR8U##UNy3RvU16KP|+otnXCEttTV@z^RSIh@X zxw1i^pJy5T(FDI=0B_Ghbd*=%<*zz~Mk%-we-~%{*Ms$AA{S#JtW{a@lQqkOa(+Pe z$CXi)ApOw}Zdg9AZL%31A1W`iuAhRJnZD+;OKtbUq_1UUB`7LMe#r-qPb{|Bc#a+6 z!DQo4E^UsWtC%I9+zG{jyBopnjK)&B>Sz#e=iWEL2In()Sl-dy$%3?RdvCs8qj zqOQo12DVqPlX*gpmxWh$BwlKW_Ys%+Nx*26`d*V2x5&|Pohm7u$I`SpMIJQ>vqZk? z2n|X$=BI)@4t*@?FepM6J$CVec%i7*uKM$C*b<|X!}s44>+CjrWdAy?q1N`F4Q0zv z7D%u(B`PJx|4@aaggH?H)VC&jDGZQ|VdD;$;??}$H%^sj9#6I|cn0o85rr$SgnC@-? zDe2KtD&3u9qsx&7Aten0!VsiG8YDLw6zLWaL{drw6s3`Fcy7MG=RMx%zx}~Bj(zU9 zuJbyhvE#>gGrzI?^R>+TjfEfIxDU44310o`FdAAFtN1rvX>r3{cRnS2T6MY7gl}^# zA5wP`V%>6LQ}r{w%DBA!0;YB2|6?(vEqM1P=*QxX$JCoCy4TMn46c9_Kdo;|nB)`UV4{#uEV48Nss24*8+hjFs$>SmDDztzL{Q<3 z%ixJsT7KGJ4A{jbza1PJB|I+B!i(HSm4~X>KW$4HgsF5Pft%* zRS7Y?IfqVI9UdQx;put-0ROEsX4M28%fm>t-`E)O579S(5qb_Hc|Oi>+cF(JxD8SH z^N3ge+m(v?;x8qJ%cUi@Ux6T16cGLiX5M@W1TY5!A!kpH-M^EcA@V12S;`l0F2nFy zmfFridSm;h)vkR43GMJN$101DLKFmEK0X_@Q-esm8f{&ngZM`~-|&RA6nby*%PbKQ z5exwrz1@W+}rzfJ;3ZdiA!JZ-gZUV829dK>{A!-r7>8COfJz{ zf;SA+r=0I;Q_yPZtewJX@%)qQ$8JL~(l*yA?zUL%Ll$$GO|fZ3HYD){B6}O`wC89R+lg$qD4*r57F^MT7+V zUTEL!C;zw^g`8ZUppLI^s)A5F1P3<(Ba1gDZ;!88;R4y0r@MF8ZDelV+R=JqnC)>i zUmee5k{<@FVUa8a0J{%C-YXI8X1N3%iH1ODo>Z+iK*yb!n5e;&=`jOhDsf@an%C#f zH@B1Ccv1uYR1CbiPnY{&8c`&=u)o?XB6h!Ny$9%TYWuinsct4pY*Q5W= zoDGL>u7{F8n5yxlD-)h5X6-kr4Io=oO5FvDRtx^6mfjAIjnY8`mC~4H9SGEIP=kHw ze3M{;c>SokhkAZp7ufnF$(#KvCH1Ydjiv8ji4wGvrc(8-_?^Pm>fl?kr3aU}Gm%Kg zH0Itq$BH8B}AB~B6I!DS{0eLYMub}JPECsZpU;2T zb`vvYmk$YUe|XaxvLAVncDa#|WqrL17i!(c5BRyUUe|W>7INHr)hy2(a^uFR7Gj9L zEHcJSl-CBs9Iri~sG>==YSA*-1ez9Z``=$a;%qReSNem zQxjINK%DTn4@tX)1*afuQ=rGd(DisO!*T<{B72UBZBDUh_CQIFw;#58+dXVF5jZQ& zWs_-l-p|R&slgY&MViB@JEuSzG>%`V=R2L#;PuS5j>}cyWjaz3eVIL+9uQnf7F>smbf>Kkqidheq8d4mrc0sa2#yE zLD~0Dwg*zG*dhLxVCqz|ODN@pK>P+mfY(2r|IPormZYDWnHfkPUvmKc@Rl$LXgITX z7~J?!mH4kr>i$k1%L(w4cS5|r-#S4%yBa@oPE{WUmCX2xKM^JG&}1BCoKdl+nTADO z64HIBm%*~+T4=9r67_3^fda8X0@v6MS8%j2SkP<0g;?1|qsCb)kJb3wY7AP%XsQiD zc;%$ffA)c?!PMU50xxfB8HpTJo>la*Nplq2OEVljt)OdP zpHv>2pTdAn`QkkU@3N}R$Iv_ z%*L5|K&55+)F2znl8-5UpJ)cdIOZc^j2zlPOLQt)x+-Bds>oAgz7duHRomx}uEDvB zSLSMwp~buTfY#XbuE}dPM|M=P{f8kStqx-PsrRfNP{6gw=UM^RonraRi1PA_FZhiu zEldvGAU5WG_m_xg0CZhj<9+u~m>Ie~M}Fm&n0I4Y)0O+Kqi8jibUc ziFeD-7dcOV8pUV_e+RDvu69Njuje7K_L<+gd4gYWRw6@aPzmt=s+*F*4Nyw_y^kpg z)T?A`P(XI1j_oWf)J_sJm#bgC@rqNf@woU5Kf$zJrE1uTbo+;m)2PNMcpfdtbw{86$K$ zWf)tZqgUHB=9o ze;B2FFL%)J=Ws?ytYFg=-Q08H?HX*jA)yPc#;Vf#Q$Ju%P5UadQ2rSXk5-r0gABfl z`?R|%eX0D9jHU`Qnoc)4B2jlSJNus!Lp%93!?Xe-irgm`Y+E1lzBoX%P1vGIq!o?D z?DYF`8Dk*ECYHR;1{MwW+&WW~6<98UVMfW-GXi0y!`ykZbo@tyI!cPd<;)TnN~!S_ z3tZ**Ory#}%g988c@?IF8MrAwKEyfJvQ4$;k2GmtQ4=*uo!qbJHdnWcgLJ@{0nI#2 z4KdxUg<43m(T+jYsCDDh!z%o`p3Hg^c}ei*ho>;k42|>Qnj?#(IU&{k2Uze)n)X5* z4t{ZhM}xl=Vz_la{eHn8RsD{mY|ET2S?8E(P}|{acs?6sbt>n$I98NEmr92VRS{Y| zCe!-<56+*oH^{d{1X?~O%ll)Oop>NM-2hPU`{d;0;$kqsJi0{;y6%t4^eE$(8Js8H zq8>I_P>f@syCQZsm(0SAC>$&E5m2lTjj-1B0`!Fam*b2&+Sv9DAcACfS%TY{Cu6}L^gvu*w3;(~xBU81+Uld_b+hK1y z5aXVHoiwrmiu0=1_x^e)czOAD6Y{*NSOS5>R-<_6dGtp2N%O~#=~=g!%-swGbgs0p zs{c6j+*{k$%G&BPNO_SnLu92I20J=D*;KIoCL#JehviuBE#8MWxF6m|`e49!X3$cZ z#P2&Ro_aM?+|#`?HfV$xCvo6B8+ULTV%AUTw=HllmNj*OCx%#DQMpw}VEl!)aHQt` zvm}S!ODo=R#|k&vELmAyK3&i#ER@lS&T)l)GGoO`))337p1V_^i|f**RgaG1Z^Rjj z!>oT`@EpYcmCM>9m3>0B{DmPe(%$9RwnhUw>dWn}vQNZlsEj!31n(8y{O0XjvU z3~C{nT{(+BKCvwrfd#sNyjEqxw*d4aV=TWy--w1)Tc4g?3R{<%uLF}mPs(cGp=AV85=N`QY%f?bq*ayri%fP+9 zxx+)S5U{AQv9Z4qB)9_xCI_OhE~iwT9pVNn`uteOu!m}8+wu!{D5B$qnwGFOl%Fp|+`^r{82H^`q1609V=*xK&5W z-lLSLt*(BncIx_qe71N3K%zX~Zkg?Oq|=f>NPA{LJK)G9m^Q=Z$X{|S{5@9^z^mp_ z4=rlGjWN;!g0P|6Gm|=dC62R4ESoel#2&*>2saNXUQeFpFF6N%%UYs7IF7z`L z3aK^r;C;?76*|>5v!GzPaS|~i`ESrBEFJpBmKyE4A7k|pU%Lg)V4|cZ zvr$)@kUBMO-OJ?nSQakxH0rnwy?(`xgk;;{)l0SV>?mMc@~>Mp6f%HxBiwaftVuB0 ze*6R!f52+bLV=78rNQY5PDR(c@EiaPG<^|j*#hcoER0(%kTMp)&i!y>gLojz2AhfRDb%zsIc-U%S{fT^b*L0kee&px1)a_fr0NjmSxz_TZQ;-H85wZ zs?J8iXu_TR04Rg*JO~>53ivAkIo|_$?pe20jAGG4zsX4b<=W3I7k$FPl#4}TC%=KJ zpwL*&6KEw0vyToBMU?sp={!{rJ-p2d$}7y`f?)cLNZ(fPt{FIsNv9lVA4d18z1fXOhza)m)4 z#`^&}fI}c+8dGfZYj?`_z@u&Q_J)iVE$gNqvnlTplS>g2T15DQmwlSQt3spk z{?iY5{3F*y1n=W)1r_Txb?m}TM=ppo-Qih&??w7%ZD+P77R5pv$^_OnNEQ8|ygkru zcH=Fmb*Ih;|MQ;@(?N#z5(4ebv?+rHrMhcsQMkaRpdnZ?K1g9&kxDb;fYOFNh^UMB zk6G1ZS|vKjKJb1M*w;~{r?^AYRQc%XktIYm(_%|RB+1Hk1IS@5iNP9011;L|6q*VX z6C*RC)D!u=zwLnn_y9Znfc3Q7{_{F1Gsk_PTt8sLuY2 zdgN{yH!3U)a{$R|^ZzVlHk499jmrdg`j_It4S;W}|4{$-o&3>O&CTY`c}FL^Gp2~b zFMU)K0;E@iAx-)%=6w}%Ref_LfAjYSr?wqTb82q~J=D=kH-4aXEPDZzo&QncEi0~e zZ>~DZG5)U6s&v^>3@=eE^f^T*jbup~V-*I1dU#`F1KDR!ad)dL=4M~`rdz|7unb%0 zRssVMOCoBkYydjkst@eQ@h*X0?k^C~mE&dHhPO)t0Vlk_zrW#^cNLahgga%?_U7iV zvNf#>!U6p5F*fWXMgP(|GNWPjWFpJ&^`mmc(jJ17c27w%c9uqs%2gt7F}yLcD8Q9$ zUX(*L+V$Y|W8B<|w^MMiz;8tTNp*>|$o?tw6r7Um^-+unIgW;I^Mq7b_uigIe@~~^ zcgsifw>}~cOr;HP{i)4 z45kXqQLT=dnzd%CYxjumS&h+4TokTcy=~R`3qoBwnLLCG7OLO&|K%J{={-ob`hYRz zZmDB3WNt#MYz&=2--l9K6JaPNq#`DP$@Q(59pXGs=g}6;7t>5d-qnwdC^R);o0@p#P(29Sa&xQvF1`PvVfDa6MS zxLR>ekwudQCUf{vR(Bc^59rhnhTs8Vl}$J_?G>4yq&@B+inBjKc(y{5ad2V5xG%(# zzp3G>nyvI$wbmM2TR1ho_^TIZa^wdK)cXId{+|q8Bl_qSNAXmi+$`bC6DR?j0FwO& zt0~6c#z1DZUK25TMLY4!YMQVOunkDZ#!Kh~cQOfaVgYyPA&__6zz7eq7_tH8rNAf% zD1h?$D%I-YCDK>fFTTD6jFOjN4jKfcTE&TgQv>CvjZz^TF?zN=*LZbxMQ`oL z-U1Y8Xc#KHTLbXqcROx^`}_SEWG43j-H(dHUW1XJLhsh%Ba}$Zb4-=q@aOZ7Hz3x2 zOr4x!ryp1=F-Yc!ZGi#O>xBpdUg)D%UtwPioo3*+;PvV+I4grre!x$5zt7B^0<`7e zRv8I5|A^}W$=2h!Cx0+}pRcs{?}4JtEfW#b5TJWa?*8v>WXTPPwd`bA{+hP~gNKPR zU8x`M`J(anmR^xtgRb^XLjBTUNeOq4$f4PobBYhhibm`Z3L4ng&nob#eTkd$X2AOx z?g;RG^b{rU zy-?7MIW|@O*D7$!kbnOarUYA+GvnoYQWj+^XeK2g#jj&xhsr5<%f&^C4P6;=d(O$u zfcGjUh|kDGv8v)n0Y9%vy*jYy0$D411+Kztw5V`**)gO*KG7gw8>L6998H$7G`_Akn=@+_UH+;?<$TFl8~g!In8=1C21DG^XlPt_Q@VdVn6YE%Y(=4w3bE z3sD2-&!um46;GcPPs{b13t`sfR|`mRRiu7!(8NmH|1!Bw`r&C$#xPz)IgQ5%(RK+J?2FAf4QbLD7{=pHg$i}R3VE181PD;~DS)LSe+e$$+kvw_3znim zC@%sYK&cW_5aIc?Pz5ECa_=3ESSHCZ_HWK)O)DFq02)x2^BiD*Enw9QRmN3{GG?It zg}^x4@8E2fOYh`sxZF5T5fSl{c#bvM5Q3{W3HQRNGEk3en|?RH9fg(y=-R9J1yiji zwW<_qlOuV`cZHTx77!y+qkTZ}_GIGw8A1YV4)=ED@q7}mP_4f9@ zwR#LesOSz6T|m#OT;>HF&xK}rpbi*0n0ZVxyFj0*b1qfSr1Z}EKaCe>$f70!S%I^6 zBp>x!G|%o-H{d~@iS1R7^Gy){o#a&RdT$-Zn<*rXqu595pn3U|$b~}2n7Dxxr^eil z%cDW*+dI?Fxv6pV$l|!8Fv4VUjjzf#JrqUC@R>VDs7iGrjA7%1uwPAHiCboB|xr-&onN-E#H zLNu)XkcR{X1?8O$JB5~whFl-qwpdo6Ap&MEV4BS8@DEHi^nOGi_S5W0D&yL?eOjg4 zHt)IBsK`cq9{?Jau0Vv@m-Aqo^v8vxvJz`qcPOhjZ-aw(288szrtf6kee3va3@w}c zf_pz+C0M|kA)Z#fsNZ&mfq*_hNp+y&5p)BV7#JXatb%$)*%ms)9Fxrdi?7D@Iom^? zFI9!9!TT|1*D8&|ay&kz?!~|%!^GqtB!}M>)5I*$Hu_}+e>-nC=!k^tNlo1CGOv01 zYYTw2zsh%36G_MbKmWI>I~C&^vC^Fhji$OQ)rAdRf=^JAei}-!P0i;96-{a+up~rq z{y&q@AHeOgQLVp@RY1Hub1?ARbzx*KO|o9gl|fwu5!eF6*1-lZwLydl&yVG7WbEuLj5 z4TPG!L(eD~&ygAPpspg7Na5zZ<>itW@69W#%5Gn$-GVw1d`QJ42^h`s&0O?Va7GDHNeodzB0f?6eN!4Xvu&driJY}%MeTHcTN z5I`-ma;?f2XG(0epgNGUC;L2PJMWHD5{~X=RI8_&(&{FHKSUI#Njtgif8kW9(Mq0r z_|YI4uj0tQQmj`rU!A};N9zeD{~nPkl&jC%m7mR}vWOFiNbFpG6(}szeRD{&Pb{_Csc3I66>DMcT2&iC43spgmtvkX;v46G~r3A zmcLCDmQ#Q6x6;lBxvQ#uHBl4%kc7~r<>fNqQIOz&()?ax?{V$svp^bll$F*7HP+En zh5vj80O0+uPTovcPjCML0}D&=@vKui@CiB|J>ke2aji>YbBMx(O)UeFtoIj_ApRvx zL?5ijBnNF<5t4vTxb=InuKw8Acm!BaK!*_G51?dVKxCj)-^l0&UEbLnQB4};JgNBq zAEQd$JHd<-+4+XLp6@bg&wX{gAC+Fn+z(n53~GNCbba>{NA{++loc^3^oYTKzQ*^KA&BgwF0a(n3@d%pziV<7`Nlqxr6MrJtrw%QiFtyQu+7+aWPegS>5B5!lh8JJ z`5}SJlxVoOFS4bK8^7XC=+m5}X=!nT^*fD?{msryip#V((7eo*u~6L1P+dWrjlV;O!#$F5RIpK)5&^P zHzGH&F*ClhFut=my*fL)K0CFYwSBz1K{kAh`{Js=(uViv9dYw3wI`j<#3^%FebWlH zcYCSC`IS`=b0E2h|L2`Fk@jwlxfmPh7SxEHP1AAnY($dK+{A?zKNO1kfCu5Ha4(*9 zlRS4Iw!ze>h}%4a3uPDFW+XJ!o7X_F(W6JAr5jaMXh($ zFhv-d@&}_1JVVCjYYo_te9JIi0~4taAEia|Fdj{bxt$bjE@jgvONFikE7GV7W-6yQ zesHx<`nb+tOQycwL=UU@-7x2HB}1~i>57KI3c(llJ~)*>0}#<4VDy>fr@ZC=8G3$y z5Ki4xQC&ZdkPsK2{PE-2|8h?UEwseVBqSyMWmwvA11V3%|Ao!eKE}5p%0O1*{UqDy zG=GQInLsDg77h|&q7s@%Hl&7LMOwR>fFtxHFbJ8MvKWE>caHv-cwKD^X|zOAb9K{}Dm#e1HfWr_1MIPEEu3o5;WX(M zfvZ3)J@8xTIZocfY8-!;ArUIHm_wY)7<16i?tQoU+nMSH!Ofe|#So0oiRiPoHOn7< z`it7^ssj-;?9~ZyjXhWar23<|mDP5ex$ki{`?78ksmwQ#IJFDcUD;NA0)PGR2;W0x zH^px3-`TPOJ`Rg<-{MYg_92tvieIxI++P~rnmt$7(}Tfa-rnA#_d`zGFDqVMp5w?_ zaZzDg?!{K}hN0J1;o;w+OMXY1&O)B#BnNyzmy;q{{Tw9j*XHK1?RE`Mk?xc967ozN z^dKVNO{T*0g+1@Ks_66~R1GnOt0|?ethH^-siRfBIF%YES}J)hFN&ua#=g6*thlbo zj6?hj{^5#S#N~vj7Tl-|ASe6M6~vHJLirG%J(EMMp-DLp>()n`b++}f4LGr_n6pn) zH%X%@X@0H!Xz?|vGb+|ft@s%^#07bSOJpW$S=)uwHQiKVZVw;Sx+9i>Ufd))6*3De z$rt8^l$2W*Sm(}_f%ie;cu3sL|J@@TgK7QvK?9HhkleD$=iLGTmx&T{n^uH1*l=bCThwq+^?< z36fDxQc=<6lCL`-H2A*ASe(-SAi!CtWjJ#D@AB&s^UEDWI~JYBvHSJ2_giL((eLIr zGH2KFW?3@knKR}YGZf>+z7bDGjLuu5L68yRqbZ^JeL@gY7`Bz zY{t0HE(m?QASjP~ng^s+1qyCm%{4?#9K=(&b8lk$;F?HkjZ>T-r@zkLR~lA>m$BqSncvVo@t zwPtqj2e=^7q%a*A1rypm$#)Q0X@UXrS@l(6yM6o`To98AXb^6}iL^qU|Gq0~On&K3 zwqABqrrZ_b5`WO2=YJNi;$M(I5|Y{AX!4(av{&e~a@KkHC2TOY9VL9hZ9}SKxRGVH zooB|BVZEDWxtX`fOk+2qD2Ks``GBeCV2MksZp?+{pR&8Ebj1E8w>jDHHVI)zmmOO& zfyCHbEDBEG8@yXj+ca2y8pLPb4~sn@s) zE%W32dZt`AI22;ti4mzPcLeX`MOXJC1t{juXeBN7F3{hk{aG-g91oLFqXWpcN1bp6 zY0*G?iZ9=YM=p5C0(Q__MOb@qg2{fbAP1`6cfv_dGq3Ht$ByFhWzW~x zw=Kf*+s&8gi~WN|i12xs2^{XvV{_~&cU2eS|IF64GQ>5=)*R<&)+{sU!5H10x(Ldc zT36H1 zs{xk%5eCXRIU6IgBhSxjYVw__W?wA2tj-vxYDOCe+RdKu20o(_V5lIZKzQ}VY(;@iYMKfEp_M=OIFCq0GC)n%RA$`YXIF*(DU?Z-VrMGfG zd}3fGTmx0AyB|1KuzYhu&c{B?1va4N#-;slSxl}m z%C%DYO)7$=2!gK9&mRuBIy(MYYztt6NSZ3z@)Nk@9)?SLT07#}wJ!A}Vxxi&eQZ1P zG++vRsp#7WSrEDS3uADDFL{b$7Hwq9ujPB+iPbARKm*~uZ1}gB$0|MdL`P=#o!?@> zk?Kuqx@yegnF(0^{3aa` z9C82Sty$pFzO}V=b#VgRA7UTq!Lu5ySZ6`5*J*rae2{O`ouc*F}f%qHoK z&SI#2PHJbxf^mV;t<>s>H~<`<&U- z@!{QN5*m_1p7)r|^6@liX6>KXzZEnONBcWUH9O>+?`B&6rGPxN4s<>NH7t%GtC3aBDy0Mro)17|U@?~U7TisBMjWz<}{BRamC&YKXoDfTX`oR`wZ@SlR+ zI+i`9L7R?Vf)pFk(+`EVp&)!2W>>(ig@`=lc)7l+{x(kr(@fUy^xxvug$5gH-gk%X z2iPG%fZ{Zod$)Vwq10>9e4V`Lt2FK3Ey8?~Slu%QS!iNJ$X52wXRSMOrP=p!Q z0XjyCAU2dPltU@sdr#6XA*sfJuue%ENi+Zg|M(sfCYyYw_1~?j(Q2a#1KCz|8ZoZU zFH(O7;vN=ChaDCy6{l+;vZzF{PsUx<80rRAIO%K(WS6N0e`2W&B2?W~ADB}a^sPUG zOTQJdj!Cy4BaSrGti_3`c4upw*`Ug-rwT{g)5CZ-9=090MhzK#wF0LZ+&&{b9T=v77d?TH4xA|bAiYw_Ln@$t!(c}azhDO_hn0z-}v z{lbdG4YaXU0NkPa@J=Wi_^e)or)P>={=e&n9qb-Gn03O`;G@0!zL@aeM1ISL$Ct^6 zeV@yT_3zW?`dIo;6V?^Z(4yMl@PHB+e#!TMQrHEbdtNk)Xq%|YmqOlF75TP2-xfE# z7zGV$Qrr^rnY-EZcPwY_n9bZ(D|CQA>ZyNJbWp~QX0&>rZW%YcjaBBHPSCCQHNsh> zg7Pqi|V<5Ttj8u2G@XSyHGPu0v_o%07*wdmPv!_7~ z#pUf;9Ql`-3BFPJ@T~Bfr%XM-?WLL&*F^NW_eqv*i5t=dtoe1O28>r^LBxarjW?bC61sH)G zkD-jO^GOO@blgVlL*yO#xyI@sVI~+n;tHfgrvh`hRMhUYJn7xE`E%;}xpIA>XBdd1 zCB-Uza3J=_G2O4Pf2AbLQL0cV4JOA)cW^2JCMG2Z5Zq;!O$n^=-c zCI2ffiX-KIgF9&*Rmpu5>gLSN{S@Z%{{BflJ&PlbnS-$0ptXNm+hO>C>%PNiDm(~o z6JE~CvNUXdLz3@Ms1u7D@d4z*2WH5j-)f4!(5skJ;Hr7$+-J0O@q zXS0puG7W`rn#W3TCe!wz@>fj`9$i68OiXEbD0uQ_-``KJ&vVBGguyQfgh+er=XUkJ zcoM%))te+#M+mCQF#GKON{7+#8}#Dg+$6NHdC=ez;wVzu=sxq(!*0X5N2o!KDbhPG zV35WJ;r}PbzfWjcd>;cf(DnAIu`RoGU|$OEAxCVoX*$=it_q9~*&i<{JVEWnLZi~o z%|TRE!ed?18DLvONEw&ou0fG*>XiCPC2o(8*LaJ_|GP-$rvz#_!l5J^NADOLe3C$= z`*XjsvOXm>{6P-GSnbM&xlop`JDH^1gaibwn*3@}sLi#pA_jF3ufTfX$4B0A`$HFR zIH^8$I3M|WshdAJFfageue!Ut!F2{MsHZhpu+?TP&r_l($S~A;x9wiW3tQS2EHN{7 zr#ky5v1FTA99h5q@YuwPbtpwJmi}7rEAgcm1kqV_K&BY1#?s+_hb$g zU~G9V@jdN5yEohT{)W6A&pK%{3wTX&=Sz4?a4TyHr(nN@2zD4bLzL|BE!a4F%FjDp z4pd-=l=hLd9+M5sjY_BZMx;T=(1+ndiZIy;s4@htf*|IAh#48K6vGe$g}Te)1mBwL zh9Kq5B{i{Fh6L1ff}g3xaee&z1P2pTwM!#3k$js&{KrZ6Sj{>kRAaHA->jE~22MG@ z#lnnYxJ(*^HfiHkv28P?Bf1-7tvERQd(F*TpED2&aAwu;8fw!d*$P@C8vo++GQ3$J zFh1l!r#Jl3s-aWT)K8AN?T6tI>rF2Z9ccaXIH0EA&2ww!6E0B ztT$`g!6X-ac7M`aVk~Fh%YV3;cH2vh9c15DHG4qe(6I24zFTN9qUjB@gPh`lb2Dxw(l(M^bpsqBALG&;BoN{rb& z*z`F_0jqgwlU?z#6j0nYya8oU4N?gnr1r&(TyDqvMHeB`ZqXgBU^t^huk%!A$2 zRVNLyOgiv9%$CztxQuYyrP`Uij>B4sG^-NF-XknY#{l}uF}sNr*R^yh>}f6)Za=>` zMQSI1?N_7{ZWTsVG@3>JWzv%m_HGKC3AE}2*_k=GmJW{|DHj;%yX~f;;G)xu9U(W1 zxjX#bVbU_{h--ffnt*>n%^ui!+{6yB=Vw+{@S_|`HcP!-=R2ANqf}H8<@3YCB*9%l z9T)I#ITljYUw<-p1Rksv`;M<>@l-8Xwg(>^3(BZ^UYrn-^K&Qu`t_?+Kd;}ni_5Cn zYaPI9TSSqu*}1uL-W!u=2Y)?Q4-O7KgJ$pLK4*LP`1p8lFOHq)N4}P5Uq&93r{a5&DL0$Emdcm@Xj8TT8y<0;ZDSja zUxGqG5;aK3$qzaVp!W2_b^iQ|l)#OZ0d=YiOZbPAGKhQz%cw5mIg%#dpYR;Hu|`_jQ{rtcC6aU%}obZ1+;q zFNPV*5U)~qIor#zPKXk{FF|9B(KIEo*~|ufq1MYQ3n~0k}gl?`!b!};7fD70&&@F=R#c!+Ph1oD!NW#Xkff&izfvsye$U0bnW*vux>ZJA{w6*6 zEZu`3IPm&M$Gd+EGjkRp*Y1ErrEhU#bCWmy^WsHb@y*Go;cDJFymF4w^#E5aQ^!y1 z=BVTPd&ocX>n{1L(i?H1j;g91x2wvI$dQm!@|yyawVzilAtyZ7y?Li!Le7M5i7lOd zMVIO~Ypme!5A&|Og)gzpudjdJT-O79=Jjx*oDQ zgM_S+U$H;EJ_xxUO}tr_zkGdj3Jjxe-vtT0y8Rb0?x@zkDlsE+Q^L19pf!n`IkDEQg zZ~K5#)?p2U9ZQ77|6K1*4katCs31CFb@+6QO~4ZZpQLUV+~M4NQPhJd7$)aL)EDTd zg308+C(V{?USmf|GAv#_Yj1+q(y+rY&Yip_6E$#TB_pbs?)r(v#LJ|PI6jI1?f@WY zr1S6E#@|1G6g-w{Uz3Z91=6`$wGJS$u(42V@m9554fi54hqBtrLW#^2|8LjK_1~>x zpED)WhbQwAqPmI3fRjg~h2#cvLl$1H-!b}((}#y+bEMP0k&9zf>7!rmtzYRwT(?oI z@HgDa@dI9OcPWb}84l%GIPZr?WAg!ggw`Ct#w7<{FH*MFXdk0w>lky3OiV(Bp!ULv zGgz($Z2BE??_FxcwcTkFnRv-GPp`-L(GOmx*JKR3H7ea-riez(ZRE~wyzAz+Vt4_S z5~XD-i6~{ws?3PzjmO2%ImNUtjt+8EWl2?Ab$s=Sn*H=?u)O?Bx^P~H`|{=4ffMjDdvUxqXk4n7{VW>SOiWB#Mn*)MfPa&fd24fbmz7~{dv_PG{?@m*`~4Q@=cgvH zZ8x`eN?Pmdi%_xZ7dp>}923X0oy5w$9!6Sn&e1$5mMy^KCe!@wdOk-ebwBae-tocT z6b;+p{*^mS5wlEx+zSi{k{{@-vkh;xhBu4;coEQ+fo)Gm*oy?y2yE=rtB!cQbN}$Y z+&sw6*;?MorSMJj-;=H4x7QzYe_rec42{Un#^+vJf7%O}nxB6Jvc+!whsiI)$NqBK5R@&R!m0y!#La%@4T_)Qm$)Eha zW?sU-Z4j4VBD=q-027`<8;#jFa|$#}>r zAIyB<$Q;>rO7jh>t2>f+a}dIkKQ%cS@ulY|1lYByld{HVllT7UmtmrR<#rDEjGL!Y z$o^2}hO^H%r>u`%<8>EE+XXuwP5t;0_m{2>|9Pb45oSbItG;CnxkJHQgvT9u=H9m) zORrxLSV4%%bJslHvVHCmIA1FA(+kz)(Jyr4&Ux@^@q7ya!r#1K=2TBAc>+4v4$i}6*+kGTfc%D@fMckLqsyWA3ZJrC?xOy zu3I;?H8rv{^t&r%Hq`H!dBD6Hp1sI?@wN`M3qms6t%m^cI`|rsy2XWTCac?MYo7Bx zGWj{_%GxIB8i%EtVDZCzmuA5AMMAzt6f>vDROcm`(an}#HG#b-+xMqOu!;TQiI*H_y1@)!f{_>4lx%c++%6T=l24WVjlVMwF>&*WXkhRME| z!V^JF;d{Zf@~=gsFRbFqCCI?IRqls+p&_P3Gp-)|Texrk2@R zd3iwJnVH#T@CNg2 zFdlJ7EVCYj-qWzx!>|iiAe8BMK_D_F)_DI=rbNAd@cH)&54Vomq*o}Ru}o%Mq(LXb zAeWIyqrbO-*pGxz(h-k)2zP~u>J`TrF9oW-0JC0A=i(nm;N82A9tQ89Hr;=4tqmou0G&2)#n~7mQQxzq8x?669>90P7AT;~z=_7<`}E^E z8!s77khhl?pgB{w{D>dz4m&ka;FA;28d>qLNw3CKl9j{ys}gV-+o{_lPXS8PXQzVh zt24dXOnK2y`f0;mW*0C^x<4;p2EII{6G|tRm{HNr#{d2b)$P4v8oe{HtL5=F;?b-5 z=sbn0tGShybLvQactoBWWfe~M+bV(#FLQ!6RJXQ3Nl7gI7&W!D;ua+cqBE(X{zdKY zMlpGLdD)HC{K9KPdy9MMIdV&LU?&{e#h;G$i=28#@tBqgEutQlLJOu}9ei}Vm}ME| z7;uW@RE|ir>Hn@lCW>ZCFEe~q*eH%!3;|uYqxYZZ#|zm0nNw$<*8%*MjtL)a;ekCA zmgkZ0EQec#qBO%yj8U@pH?Jm`I8wm6H(HSIWR74qp%NwOYbkm;!@){fTAC3g<%8}=x zXt1E!NI4)_^4;verC))hXyb138jA>O8ahFR^iC0OUU6GQp{^_5$_Ac4fKB>^_N)b# zA4W%r#d9!Yr4phy-gj>PMhv9Y>irv~wcBrQ))e>lmc8GIskV_Z$9X_=c5SEwya=D% zrB*SUCG=!_uhL(26c5>4DkL#0GvJ%HiJ`}t(5@A#F0kG*S7i!KwiOYfr8S~i4ezdV zGHALK^H|1}=$z$-DXY7^6mz=l3O2St7xvradxu1H?GM&FF+5<6k)~tN5G~}WRc6bo z6#2~|Xw$;olWO`Tyf$;q)yK!*G3tz{NJ`D)&F^#^dv?2QdEaHMdvuPN8Ds+~-us;T z^nM!(_X$Ny!%{vGIHpms)8}jFr;}JcIP6Qh^JZcuBk9|pN-NiM{}{^j%(PP&4Z+9b zCgS|Q7z)(KbP5y-Ra8$MjcbnKSR*S+`8FU(u4qhJL?m>UU7pa!EWAA)V6QA>CclBGTO<2#D|F@Bi+no!Ob4*?sOg_c>Rc!Rt{V z%LTFel?NxETCwh_(W`kEgJP5TWTR}T+lk|+wS}vT?FZ>o(icF%|)DffnhdeE6$@|ib-6(nRxCS`d z(;-|sT-xF%V06TaX6aftfXTvw0rQJ4u+&9N8w)mqsF}wi9n}<7^ywc^EZPVRYiznr zsNuenuSSzvzFD2qVq`+to6PEuT5k&WujH2ouFpn41A`JCf9I+Y@{=zdfe)nK6SB#DMAN5!6}F(G9dsnygfP87|Y2m9V0KUF;5kSOLYda0AwY98zaUe~@ zF#vE#`1nq=1cY@Q#nQAl1aRquFmG`DEIY9_hC2aeF!MH6f#M%J^`+Vl?u0ej)bex9nvv%U6dUyC^}W=P*4Fr?x^JC_b?9=;`!01QG&S;hRoavKun8dNd1Q4QoAQ`q z446Ga7~@C0Si>=}H{{{DG{pOC;yUnUBu<+BMim}=Cvhbz>Rno5ra@t5jl~`W0wKOS z2&ONnRbtH5HG#>BF-eipFEF64&CAgd?^@c6u$Gfh1_#v-l(Q23A~tiocnoDJr49vu`4wUlH1LacHVmK#>?7&>S_wrHRj9K! zqp(c+LKvQqNBu$d1?VTVP868(9UbM!0%KyFs*8|-MLoc7`I4}LXiI`^m*7CUxV(`| z3&VCn@94_=h=3cyK8aLi=$#|tFY?W4Vq1=n&-3U=7#myEFr`K6yt?#P(wn@Fd3h=H zFGbpYZAM-eT*Gy$Bl4FR@P>t_r;Zb1<_!SF?t6u&GiV8Q#_8}(jDhvNO<=^dny%jk zOWz8L5kW5I^x3>d!DfrBdmDnuX%Z~adFLy(}cR8#$7s|Qn_CW%=(~_ z5TvE3an7^wwU{-cN(;EGz3qM>gd{UZn6Umr?qEXddo@hL*%_={zKE>b^-;CT35uPo;>4SHf{Y_PUn)_ zrs?pYteo!7=NwlR;p6s)0`n`c{dxKGoeEL;iXR%bey?mrt`RbCyV`EoSKR8XZ5kXB zD;43u&OJ)KHHLbE*#)%EM&mlX-QQbUf3!4;v`U4sITA6Whti1aq9}t6@U2g8Xg(i@ z3PfASj`guJECQ-u@dCDWp%%$7wuFUs!HV_wV1wCL$WL^v$h>Zo_OpV}URa2FP+3~9 z)TH+`8{d+UxbdqHMMZf-pYiI5jF8Kyo_8mwv>xI-L2f2B5e_slFxt4m1+4-`um{be z0b(7{NccG6ewC^P&zmQ)sr3aWC@WyrE!MqrXTS7@it8S)jK;qHr7rAIZ{}v?my+!% zjmmM^WwOQXollG|uTv-0+C6V!`rKZxe2FlDkgfrp$0=R}onI;!0up_kBDUGqqL%B?Tp@mjB7BD1vuJ&@F-NUyuqnzKU zS^AoB3$X~0P#3e*tDmlv1*n6yS;Pj%ZV^Ie-Zu1tJ8wlR+i8-I(a`II_|b)it4&~H zG5DND9SFKC{sA`x6`e~u;{V;1$CYW7&M%R=(<(_TsFQoun7K6SH2>+~7J9)yMi7&< zteLq4GX?xguAhEPUEg_giXLTp&bj=4cULt01K!}h`mUzYd!4s!ZZdGGWXXGTc5EhTZO#-A-K?gU9GpHRF3h>k-_QK&E`q5S2czU|p6-s+g%~d83bSl~6m< z93+m<7+CpWjkw@`jIXe!HK zg7La(9pp&BD`kA6Z0c-3fbmt0k#JFFpDnbqXGO4N>5u^?#$!4{AO;9G)bLUYs7K`2 zp+|||c-WEHqe_*DSvgcM#Oj4GFi8h7=!FS;Q5z5%4y&qHva454s+qQKG3e)tgFu;kO}`>oK5b@;xlu!9|&YUy2lo%7t{_P2ukh~ zjbtpxQ54f*)C1{8HpNlUbP+UH8g!Wre3CS{xn=QPm|aO%E&&JvTU#hKwu@AbP`Uc8 zAzphCU>|kmG9hg{3ZNHz-`$$?f?56IT>??ctlwVL`=~&9ZuL56n3nk3D_~ehPN0CVHC0UlyySbq3g2Tdy@%7h?8uKZA;99-Hgbx`Ngs0pqA4H^CayYt4Y zQa4l`U8}E8vU9HQ9yr#hT5oEB7_TmccyG?PXX&1dbJ01_X&)xz8w10`bl;UX4ePI3 z7KJ(&Rp3o=C_H3oKZ%|_iN4hs>r|)3p^|u@er9eLbauwi`pIzDEzJWUK?oQhR5y4c z&_l(Ys3l1*7bI|W1A%9=>8O_+ij+U^PQ_rF1~g?OLrvl8AzH8CUyia?4z}dN;I&9j z_&kvrA{r1dQoA72Qbgs5IbH+uQ^igKokpEE@=fni7ETYi`vXo^HF$cVeMx- z3u~FhaxHpC{JNPPRb{txzBC&3d%Bs+=x4YASrB-qA& zEJn`K>%lv;{NleVl-u{%4d72F$nPCFT%X+ct}t-X(szm#w$lgYcr zTcF7b$mY1PC%yDT`LK`iGq}LucZZ z1_MJvhv2~xMbW@M_Jq+WB^c>kB5CzHj}gYSSQwNRYT98|KNbpAj)FuJDBzLQ5q}|~ z#(&uA#9)V0tGcOvio9(YbYO-uvdvK%usjF0akG1S`>Z&pj9T_@awS2EBd=W5Q_3Cm zdq^E|M!>j2o-)-U)SElbhc7V#Xfbj=(W#43Gw*YUTTV@(>J(OM^nBRYe{ta2zw z$%Wct6PgsQNQ$6V^-8T1H1ypE#CoE)VthK>y5c?MfKC%zJ1Y4CqNv^H$bhE55A;>0 z8vm&^U;d+8=yf}3>!SiHr`FCo9c#|Ff}h86A2>uPTAxZkZaMv2u=0cD+!^W~O8dJN zc@P|0oMTDX9^@LG7ecg0mL4tnPy+VSZ}{BT00L4J*Dn=djWM@=jj#)@dzh=OUA zC#@|dt|6rjk0H1ZL9$_{M7@OYGKPzJvs`!&-)Qeo@cH4H9Bw5IT)xPk(oi<`_~4?r z1dMrbJp;qZGeoN+*PCVb8Q9&L`|!MsyJfJEi0`fzDiwFb3QZoj+fiK0wn1=bLnTM0 z?c{5(a6P(Vy+Wq%W=!8DwwsE-l<{u03>K)f?kF<_83wPIw!G4?zkt{>d?@;=c>dlR z>&1(Hs!knUM1$F@ova05mb#O=cjMFN)~(wG3e|hBbT*iR!U`M0u3H{rO&_&xaP9ZBE2IVti z$q9_wEwA`0^nDgTQU(aoj2om#+)oCCxyMLD)cXm?CZyF*!YmWlgoFI_wFlAk5s?Y+ zSa!fC$+nqD;(>)TD|-b*A@*rL<~waNtb@v+6qho7LY~S*rNJHL#rtrA;zu!Tvx)|&aqEIv{i@l zM&1;n^=Sv)C(&{9uOBeSR>zy%{ZcCA%%{ICgBz#JvI%!32T!Ffeq}s}*(x;llJYc5 z&21XB&}pb03Tf_*Ks|_$JGGh+3%Q?W$HqVJ;6>1*06JzG03&%sxk8W0PaBojbu4NH zaqRR!4#3;K)tBIJh!-hl-Rk$OpX+;IJ*>rSsO&Oq^c=xuo*IZ%Ed;DTVcoe+^EWAk zKNV@j^>}Q#jqB3t(`uIeQ@&nBi6HxU`v?gN71rqh5MSINJkcumzazCyO+`rw@YF;m zVbGt@1l$pDc9IU&Ly~kaw5xH4SLeL)ir_i;;H3piz;Mj4Cn}33W2J7r0Mugza`)|^ z4x&$7NaFH2$O!ClIR<6O3pE=@@~&f#p45#h+~`UROxWUXjUUiSTd5VZz_J8qo)Ttu zI}ctI|Fab2Kl~%ao`3ob9R(BoEs|l(nO^Gsw9v3n)jXq$0(bkR{B!WpkL2vuu>GgU zq0`S@CS*dDFveUQl`hf@J+cgcZm#R{kKS%3HcfwzDgxiL-c5hNnHYJG7ekMwEv2nM zi^ho2BBp24B=(CLti%mv(~A~rq)-q`zQFp@*HgeBGT!GIno2Q=B+Q5qiKQK)6{5}q z#EKP2zR=_5m4p_fs3z)DlYJc!icZuJ!*r%2@<|NwimHoRLl@VkB@(LY%P2OVl|d=e zvC2a-L)=7Zz+f%BKS5ETrQGmFqgIk4`r-mu^8#JjeuL-6n9aDdtUgiv6|`y*s_r=9 zcSBQ5LHGE5n$K5QQa-1a-$b0M&x`6&x2}`^Xg*^Wmui#!mbsaNwQlFL4(8ZNsNUhW zv#fY%MaP`J&Ba0aA3lYGHim+#E6DqzC$KN=QD>Mm3dk;f8#Yr>p9S41jdI0TG5~LqeV$iw;bYmIvI|0N?Tn4+0v>b`o zjFV=bBpXMaq{YR#qMN^Ht;T?D^0jSfuu6m0zK>6-`+kn0^9w&-#t(o0{@sbK*zd|$ z_1}e=hra`CF+Wi5p*Lt#>C2Jo`}TcdAw`k#l8f#y((G~FPvWJL^^!I3%ZE3*H-fD# zDG&njH}AGi*XY3`?`Q#LOycDqIcvXP5|H?af}i;Iays>o&n2$z(@MyI zqFiT1PlrL4##xwzQ{Rh3yf~J)VI<=3Gikfje8ntg)f%o!5r)Jr42z+i40~e#1e8;d zz0{{A;^*=4z=Ll<=EY_FN35<-`TH)e8*mF8Y?+}w!Ra4oZH_f}eLr$A?;bhdQl@$G zdG3y0?0lOoOQCDvl(jO#`c!7)X5wA-@k;CO{87)u>de~1%*5Wz#L&eA00r;O2zRoj z#b{y*1uN)_6>qkkCWijl{QVJp=B<&9)OsDujTjzp#J<3^$)Fl(i(=p-Z`y9D~mbKWVs$F{=fN^5D?YUTPasUIe}>F?k(^PRZ1=|Ml^PYQ1iL1%>~6U4Tt&)Lc}w4z|{ zL+SPVa=#)}59y*3Rr9w7mb{vRnX8|A69?}vU+{UrQhIew9c{`xZYS{#4Y^dd=QO=D zGW&~A3o3;L<2Apyd?s7txAJdm5Zh*+;cr@?lx)J?(N;ZUoo|o6$x#okNyzYe>;3x( zvT@W_tBY8Z6XgNi!Iw4_j{>5BaxGG?F%uxDf<}&j_R}}?(q-C_!H8B^M5O7Ca`SGr zhP07rVC#!2F_R^GXe((W|7EUYTbRr<#YYL=mv&n(zQ!A-H|^-^#9?4+ypD*0IfOTv zbRC_Y4$cExCMCHrw$syDwSKk-pp9Iv6&Q=h52idyS>{1u7Y9hC6P68!$7QFOp{V!h z(xtuK-hXaNMW^iKA+9eTP!;uhhLFpGEq`ygj=`cf2hI#S+q{}e3 zATUZ*|Er{JeRfFSl&`V``RkajfrQcC2(}XU!D`KWC_)B32lEdKuZo8C|tw=V(<>~zP-LhbcFYD z1=SjO(O#<*=|3rr)?U(PtiHt4W}|OBLF1o{Od*X~;ha{k5NSf=%te|{f`{|OciCZnZze2C`peR{xwde@!5$+m z!xtT+A zfplJ5UK&!3R8=8&%u#jonY<&fxPym@FWQMRJGmzD3YsNWUjRlE*KC6tZwnhlC4I+) zW-(K-x*)WGdz~TGPvEl3IlAwa0PuFbKawlzgWBp%?~8P&UwyXT$u4}e!k!?4?D7K% zvJLS+#XY)$<>3g6b4HgXA1(&|^Mf)W+& zru{Y!^kfV^2;woy7L=X}>@&pk9sKwk)qrIxFpbQVb-;1q+xKWMvb}&3>iV=6fR2@Jf=YF{xMfPs?Yb}bp znNCo_tThKGHxEk~4=DAQZhr`aB3~$C)Gwz*3DJ=iBGgft6Ol~P{Wa;@8FR5Uw_4RO z<+C=bhC{YDuz&V4Ytx6Gzp1m6SKluZsFIsoT8ulrLorSr0KM|)+O_DvGngsSKRer2 z{i?->WBo;|@5lSGKeH9_J(|=Nbl+6s6+21Ob;;8GxrHBXti9bFfqMC{uraZ^apL{= z<_PcJ#?su=-qzFI$1~^N24xpS7J`aV)SQ4iD%XTLK(0$qNNm0k5Yeyvg?^n#xC0G_ zrNl~7}DgITTy-|(9w3HN4wvm zw-)exuRoAHEbS7w)Q0K_%RuYBiyi!B06b1B{Oc8x*mnLzLZ+HKLN@h-XIDHv0!~% zEk?bsDdEd#2w9$B^*H@G#!@MVq{FaIAKPkT3Odp}S6myW!zgB!VDe-(I* zR=+Bv999OZQ?>E8MSqX)D9sBmM-l~WKtcKuO64@f1ZN*N7>s>E=qKdJ9vH0fH}0fChL+X4%VaS`Sp5v3@|vgkLjFFa)&=I@t5@Au%e6Gmald z6Z#XG45h4vr{0NKrg+Zstu4AqopPpP z-l=rnzce}TST+4syx6#ZtKxieKs{i@(L`!F0X$G2KG@sa+u2nDluvaP;*FQ|)!5ir zGzq7efn6W%n)lQFY!VZ$K>Z+K*&6u%(5rVsiw-P{IR=*8yb1YC{W!)6yx7_6UWo`S zy>g9w4V}SM@6(%|V-q)yQcW#+CGqrT+rv$I;SKGtFf)WbE#d^lZZQKIRIVH>Q||!{ z=AAS>)11&1;$nle2sd|+uLc~AS-H7PC)!0vLexj0#U+=OTfI4%ncHK21st~CKRyp#^y<7K`#Zp5m7A<7q2rf+6CQmB^0OKLnK`vm>#L18lM`TSk%lwqjnq+!S zgi`-0-)1^7el#lG#?eug1{zwX1Jh1OV5;nlGAgRcq0ZpW=QW3!IbP_VJQiEklB3^zDVPx@6sikHv2OJq$ zl{%$a>lAo!(0~Mk-q z>C+jBn%~*tzD6dm*>C5Rb?Am7ihNuTl8J6B1*dpU749t_;*spZ)2z|yCNp<_$}y=KLs<| zt#Y`@)RU}Y58NvbsGD6{+i~Fb*3Uqm91`=(t|?zEta7%+QZHLn)7fO^ZH3zYiH#MN z#Gb*V+DFiaXvuk5NNF>F98jUj>3)gd6^UJ@@6+1U)ulYp)XqvsvYi^?-n+=2-a3H! z_}h>dkWIKp2n#u6|npZBmy7k zto!k_VWTW3(2v@;0NwRcqT`uQ{PNFpLyTbJNJPa%F|JQo`aWY#W-J4sx<65%MSvDo z2&)oVd*IP#8>GQAlO&GLSE#e76Env9MnZpo%$_K_@!gD7gT5c=L(Bb{F#o1 zCaFva$wtUq8R}42sS%nE+W}XZBv>f;SIm5j3;e1Qp`t-#(#Na&Fd;RTi zU&n{tnF)o21#|(#YV3(_@+^I-G<~X!@1z+&3Q7YSddh)uBzrdWbhGG3{-B`=BynNu zY-SFJAixIw{UI;SH`-oE3J5z~*&nn;FcnC|WFEk5`_;o6*>mwtr?gm8i+8z?e6t0< zL830uDK={$4z=&|d86dxYb(_RcOh7ch_!}h=Zr4g&+e-Jh1)&p?e!(yw4u%RLZ8K2 zCW#!IK<3q+YbkaP*v+JWdRQ|BC>-g%`?IlSK1voE*UNm@mn`yD36vT8CLb!O5=cC1 zsJ832y8VgW(jL1dllBwuUbD2)2UDfkH^#?B7MkQ%UPbe3TP^8*I4;YP^OVlbXojf~ z6)$;dDp=6DUh$%3kayl<8x?Y!@P__abbP^n34YD@(6q2l&{+aBmCPk6Fsi^Zqi+A$ z;pjm)gT$WwKLKvhcsz@YA2Oju>uOn^~4 zOecOZ6}3yG zdt@e(xN!Tk&bJ1m@AIAd&g1SMSwGoo{W-&XAlxB6zr-q>-W>DWLPN&o^F)5ycI5AY z8EbUx+2ro{Nh~MBj4`-Bv4G@gxH(QFIT<Bk~XA@#p6fhx0n#vW(c6T>YN88M~N>o^68_ zy4dzN*alz2n~}7!r>b$Mq8PLqUchS!xLHxOPjS@IZ%+|b7n@EuEx=Wx9XA=I@9>fp zwS7PdkeaqFshEM9mI90hj(q>Q&@w<^#|M_^Ts9`OkxNVtlrN@%kAoAC?mI@S3kR zT{pjs_?p5qW7mmY)(#HJ8Z0yQeD@efEx-c?qcLw@x(!XTBL<|xBc%)?r%YrW8ug7& z%c}2y_@^2=-GXc41HXS%SZ7OKpW&BV&81MgUz%d_j}(`C#bSopOY6i^ZAH9a%B~VJ zjU#VWL#w3D%gb*w^n<3FYpdAdd?5A@;z(7$xatgSYdd*O9578tZ0Ip-$9~SAU<($~ z!0LNR%S(Te9zBsq^_)G+)#+|xY)glLZyeC;CZjfw7AjyT4CtGeT5PbVoFqTr6x%kl zF0*Y29q~w%iws*a8*u}1dL4?j)0A%!GfAhWAM%#|oGaidesw!8JiCCHFW`c<`~ua zeS&y8;!AfMG<dKfGQ9bCe*4-T4KAOI&Hg6YzUGXds7~Cq@%M8zHHVwJq;(*+B!pSM z3EyuH-)li7X$d2?)>>drz@Tmv%ag8bYJKH;dV9gEIx|JB8pRwvVq-172q89bab`-%~nPY=G^GDNFh|7tDqqC}zbQ~qiumixfd z%U!K!B+0x+R#m;j@g;9)d2s5lFO#3pedf4T3i8)ss`fQiw=1hb>OQ6U>zT%uA_g|> z^Pf14)j|u~r+%ywaecy{SXw?nHfU-Ii;4B8^CAd4S#2X$Dto8Mf57?;g`h z-tLTCMr@JE;9jp&y-dM-OZv3@k$>|k>Oh6uhc*a*D>~4Td+R-eT6el6kNlhQmz+r$ z)9+^l3P10)Ah;~Wiaw35M+da|>~}wR5%n?ma3Y2A0ivFmjqU+)QeID#K(4k;T^v*r zEbdB=pGXr9j~0UcZc17{we7HK7N#~M$ZJ)QV%OLfA6XO1{ArlE7b#k8T>>_3+zCw zq|SQyPDk$#fDwK<=x4Y{up`!k=$%ra4_{RM%p=~KTLItzS| zjsZ7I5nu}OhG2{pewI+;Axre&*D}WjU46_`X01U3xpbo;g95mJ@l-$w*Aoa^JSrqa zPO-u%s<)ei9{LmPyQ2&P--L2bO|Qb+sQ)r#{w>FrG98C(fZ?FJ-J_esZ@|iIYUt~p z`0@R}?xDjN0vv!kThj?H=)8kool7ZR2V0o#xDOwqi?X_B5>0@e?)iQx0)c4zXfQp z^(cFVk?L));U5=$B2T>2_n&nDty?Iq@8H_v%v@&g?vJTxTnWSds%jjirjm(`(()9W zW8rqz&%kh_f8LNrcRQpS*;`n1tIrnsh3NDkkVH0(hamn5mZ$pSFS+@oGliSw z)5s2R*$;x_NRN`I!&FA&$n}&Gx0EA;RU4Hm?wM8chUQ@;^#ZyCBza(v2_HM*Z8EA6 zStOeZ`vOb5uKITAE64ySzru)r4}ITDw4D{|dC$EZ39nxN2rEyT&y#j!K6mNpn)PTMMcpd{>fvF@9G;GTJ$dn*fRjjDPv^p;7kEEEh&SaTo{Eln zf38_}28o((L-ebsazupq_=sa=>PWhIbN?PI2$MLxTfbxo8OB(`$QZM17>;|1{J07J zcKF)nB6cPqS5lP8*_-w*=N*US(?LN`%CctM*ay^0!fMScH9Q;V>FyfJEv1O*%80u? zfACW2L)pL`Sv<49>zZlx6Kcrx?$0>PsQZ!~S&+a$Jc@Jbn$MZQNPdqa2#6*lt=5SF z+@77|Ft8b*G&8$&49G%5x26K#B33Vx4myTrRVm_KLk1#1z{j@SW=^paI)E3bAnbQk zDEZD6o6J91bXU$yEPD1ht_B-@uK2f5j+K%_@h3+ftZ=S)oNLNShPv>GWWgriCZrpc$(I+E2~>ZXr# z_DOyNC>P1>FH5?(BrOoz4_XN2LwVJU8rp~DwigSpQO2>?`@m%YLFj-bWAIK-1#&14 z;_-(Syjry4mbE=bjuabKZLcX3@NAv1Xkx72jB6Fzw8JHf73EUT8B!~7N!F5wq^vKd zstTqZ##&T;*rd&ty8Ls)kqceOJsAyaIQ?MSIK9+*(Afj2UiJP6{Ck31$_n!zq6OIS z^?jDjH%|hR6|N{vT7Y+iC4xfj-X4ODc{g6G@mdi8TSN(Z8b@ACmK8ziCXxyd zQGTF-x0PVQktF(CMCTk3k8%ElBPhQXw>sf^47x!$aQxbHW$0f}7li;)y#(@8*Vc_O z%oFRLCb8uw?Aj|f9`M3wNg|Cy{ z6-)+knAWOefa95{OWHa{BcF`CkkYEBb4w}t_YR&tXD+sn6Sdxzhd6_BAJe`<-|yM9 zJBj6@`3+{Rw<-60Ji7VeiMDTR@56(gA72w!qivPox6QpNn0U!}o0;nyWR&cqxwECB zLx0nCzuMU@Yt2r80VPU6<|sW^K25qXxcsN$A=x9tr3Dv$yG zQdpffP3)vk%iz6a8rzxhsZeLXz8Unm^|EsoM@&;XrDT4Cbw=>V6kPTT^l)6RS*OgX zz(fDgF#NT$WEJPeR7eL|_bX6q0X6Yr#5h3;8@@*L&$+FZme8YPzd;DjC~=)Wt^nA`g3XVE|rEB&#hjt~w68VuiVGa7VwI=Q;uq@gq9PFfBR4?AJ!)#v2oOid~KY8c?g zAsH3KbXvz)0%6;&?DzZ>p_YKplv*VVJ2%=P&;j9)V)S;DJ>Lw#5^;`H-+&a5@ z6{-lTb-gxJy7+3R?`WW?tkVCl(ZuK+3;eW@DuPp=LDk`CbwBqfKk~63Mj4|dilj^P zGTq-F?rq@;%)c?yo#dH@FOhX8tKy~|V%Y6t*zKrvS1FCxMB5wv06*t}8`lC~tqn!8 z+lPJhz;C~nw>a>ZXuXh;icpji-`QB3`bfRT8-l)0plkjn2s~rS9qxN_I0KToYN=Qc zBy?Ek3(OEZu(ehpkED|qbG{M5w?IC56qUhFxBn)HZHxQjQ>{T@F^Y$pPaoIjy(|SU zwHZc~1&nr;Cg5~6Gym9u=X36A14(&CAE@Y54|z7)lc}bnwhz&lbxy$owX9$a)WyRG z!r}#x)ZGX2_@#7;9A*s?#%-@cMQel}Pa`0mAHjyXBYH zD|Gg@jRu^%-zt2>RSC#ZvM$f$WItAZJ6Bv>d{nrZLW=DNlU{p#30_HHialnTZ^vXc z2p>D$)uId+!N2&z;M2E8T-OrLU^_oY>>N~?f%L1nc9LjLt6fan$Y;U~r==O?@{rq@ zk?a7=i|2M|Mm9$4WFC>*K-{i5=)Zej_=X3FBfZQOPE0zKj~G5T7%;n(tDz<)@l+Q3 z()30lAlVDqIY( zupanE~wqi{cSy+0kC3~a@yBO&R@4B(&$9byiSP>nPc9fezYsN zKUpMNLP)M6$1Zxx8XBv>T|&V)JxeEZ-8`j|lhwE%=YZJY4<2U($lWsA&F0f*9#HAB zGGN-N8qH^+Hc7dE%#6_zw%IX*44^`RYoYR&DFpnFycl3bPq`xcU)$3>Q<0}H$;9aJ zQKYKUL4dG7z3@61fJ1Ux-v+tvZYGw=$`g@8kCf@L)9{|s`zUq4NcKyw}94V&IvygLX z^TIb&3G7EhAi0F+XpJ!=y;zkvxYU1bQo^omEzl|j0&oqnK^^Jw>U(-?tcSj8)A@u+ zuw#=*jBi}9PDF|(<_!`Dy&3zZ+14{Ch(j-tSK*u*H7u6xqad)IYkvU(yR$IVpf@(J znh_YojvFJ7Z=TcF++joP;h0?8-!X+cG(FzF(q6tf@snrokNzG_%%piH3Fv!dv} z&+6eyn3iiM3E8V3cJlOZtI~n;k|X=GAl65D&VAU^Nk@e5PRP!+kJ}1kEA@Jt=k*@6 zq)ANuk^^|+GM1Uu6Au7OjCm%=ZpiPAkH22t#!*0_BEPdB47B5!*{o-XsQlFnNU%`V zD3!>7?nS3!xyF;rvg=d$K}#$wE4n*r?6^i%Y|8v?2#*Sgi#@=zAb@;l3{xM-Q_ zM4Dq-RMXFM6DBrAD82_xCab0<0>01L5osC2Ga!o{*2nEg(CGMde+lQo;OaStD*s&w z#q3YnXh3+8Mz{~o4OQ6UTf4s=VCsd`A7UU~1Bu7P#waS}T|atydVp9>)v%f8iS$?2 zku_n37j8hP!G*3T_2up50>ayS8|yG1BrrJzh19D6D&^=--{XLfdDK~ild8xY1Mg-~ zr{7kS&4=*av+eLBb77T8yvjnfSW}t5=8cbyjg61r#`6`l=gGr?1$`|Cy!qg*eUxrc zj?r^|H`%63is*;j+UQ3y;#Ei7NO@wue7`@eca3Y8wEOF6gNCm?mezb+-o!m;rOWrS z7VQr+i`irK=@lVB_G7dFOIqzwODIrKdRUE&{yEn2EC2IGc0uxC;`?F#itEqbdb-~~ z5%m8U-Vftk&tDFJo#UzqlXpH?+Z~N29+sGYBIJXQ#Rp}dmN`jZb!4vmEeXAiKAPL0g7=vVm0wDHL+}J;y5#qIv6cP zhe;%mV5i*&ar88`oel{tG)lUoPFg^cdr$b~_3Liw8<20tPa5N1kPM5swu@OdHGz}c`mC^o^Y3#k0o~7zghG~M57|GHyssbtlLy0XAWIh z?bQq;_pr#8)jyrpY(FON;L||QQ~$BSJMTpvgV-W+=Ek_XTENaeySJDyNI)ici~R*y zNSro}AMGuvW@ZOK4YS~XO@i%Evwumg^PYjI+L;7!bQiQI?fW@tVPQ=ZueAd%Yyr^exQ8=jfZ=O6v=wFH?Hev9jO7 zTZ6djukgmzfmKW}u(5d5AMn;?=CJc#gUIkaIeE-Ae%_{*qRkRzq!q5r7th$dU?0pK!U_0n&Fs{ym&i`+vv!LN{FyA=J>V zW|2!qLYy4pw%dJlrrwl1vT7={93c;!fxbOzUs?1#P)323TGkN|`N5=|)idh!Mob&% ze)#dMdiH=^Cm(Nb)r}GoPgK@^GDoy!iBL33s&Jv;!VBH|{Q#vkjs!>-NI6JptsRqu zBj77Q&)C7?A^7<4&~Y(jQ2{XjCa@Ryj9oO5{XIYA*VUc+tp>&&p#bHJwNr;H$}Ja~ zXYsp8%2tsIA`HR6H zB;3oT=9b!{PDN0jdaZn&ws?%zh;AN0iwD9UKf}aJ#izsux0JlV|BI;8KTyX>s5Gkn z;FZ+x$Fv`>=*#1N`#iGn7)*#8#z={)Buv(I1&3d)jNC+T9;VE`zgQTjbFr1(*N*3` z%+)bMQ_414=Xd#VeRDghk$j%j)#mcFN_>Ark9YhqRd@VV_OnO4k&j4RBU=(ge4b!8 zYXp)oVnY%+64eJwXp$$bWVRL}$K%Ck`+!^*vYm@=EAGx}x=|plEwsZ>dXK_!qWWr9 zy_zYAcDNgn3({%fnM8qf*s1j$x$)rm8!%r{==s0mYDg9R6WMYHnERwOUI-i5jB+-m z9%Y5;ITX$sf7__Ay;xd&tT^sqSMnbv{$K~Tu@PP+k1yjTN+u9ZNMW(Dk6u|VwD&1s zTHkhKu-0!gMnLe{cqb*U8Ni*LsA$~r%`|qi)Q)R`WHf|A&AhN%>YQ~+!N{uP&ALF= z$svXZdF-<=cEFfcWl9e$pfs%5(V+l(^3EDdoieWiDJ3q7^^IsX=OWo%F>*Bu2SzL| zVPspv{%4`i$8M`j-(=%h`c;Q~Bk$dGGA@3# zxIlJ};q{8jRB8Z$1q()Ru@U0=dN65tOD%O$n+;UQ#n%An(M*Y^rP(6Td?+7jCXjW~ zC>#-!kS9nfSHj92#C%)4nwh52K-Q-1xRvV6(Z9h-K6_9+q>ISkHum;7 z2tDX1mU1QEmZOccrvIjdG9l)Mu5g*_SF1*<47mCC7E0hIrAc15s9KgXBUgy=@MCoC zU0iS_ptAq|jp7|>da>a61_;2!g7>uy1zL~hg%Yx|*O6HDFQFkBwmFA(^PFKsV74Ir z1u9MtgEETy75|Do{g{oy?t-lbs|QVJHPJsHkKarUG#LTD0?&7gV5K z4y}Lhc`qd$ci&K7D)Sm3=;si|O1$|T~9+5euFqzg4ob#Yqn!L~XANYwU zF&y*^fS*xz+LxQ_N!Qzi9>X=Fq+gu@#T%f#l>PHLkrLO)OOWTcnX9*jos9(%0K>au z=`=OE`#PnZXpU!ERXb$2)rCIY#Qtb_SmwC}Cs)Ai4oj6UDIa1>S20Vhc4#cf9!-0?w`iDRz)5Mtz?Vhw43ehG@5k9&Aq| zQGM+bHM-vPZm3!y>h?_!H#_su#_?v+65ZDAfS*PUkjoE3wK5z{`Y>f@(fOu(`6*b! zC2>ei_qeL+PJ79VJXVw_BO@qwD4ST7;L3`O&f0l=EdOp1%lrC)C(zY{-`oL{to#RL;cOMvSWflNizt?n#!Qxvq)3s;%Qj%(K-)>u~EW}ly< z3FnOyCK{s%-EA%>ADt&axz$}YH}zOOmtUOsg4zndyU2zfHVymz(iusSL*@BVcP7Pk z+&mmn`EOg{H7UkrPh{4gL+(7l6uqV9E@ZU=!5y9P**r2NBpz@a6i`SfWA-|m543`` zZF!?xcpc>*^<%!F5Kuu$ub~E2tB!<174K*!Zc{8^STJfd^hzX?5jc++=hK$&a}ApT zsc5tsD=dwQZg`j_;o9gjIE1g2m5Tr{G0GD0B9sF;PG~*C)KFic zWJCq)FwVI1AXGp*vcXLel*)e%XzPF>p%s}wGDy9Z9Z<;AJY$#;{vT0a85Pz0g-c6F zr<8QJ(%s!LG!oJs(hbtx-9x8zgLF!FcQbUU_xStYyY8o9z8qMK_w0A?XFu^+QCj-0 z1@YbPAyhlTf+K=0%%~%%9_2g)n;~s7?Vn$^>2T~0hnKhaOf=(3NBIl=;A6}vGIt(h z5A;r{hM!_Mw@av;KKcN>fEW{ti?ke5(^7}nvF*%n3X3W+hY7Vh*8VwHn$=^OQInm0`lq}u{;zied?o7h zi}=|Zbg3Io`GoktJtsjbALC{jt4V=H0CD?^)}B{TiPCqjWqsJ z9BXZ^wmyHif?vRwiXYs~)0@kDzP?0eZih5C8=qPX^Ez3WKud-nd&o;o_bHwZk8g+o zA6)G&DT+lHo`_IQGDcAq4FWx^9TvQOuZQs+bbj=hKSr0ACqBtJR) zHBoRz!M}=4Al%S$g=_1+fC&iIlpWX6`(l+Y_DJ`ch0s~0~mpo7TtEB zgy1#8$H1%bX&8QE>@75R*t!9;(5oP#ezQ>YK~*2!Y&hD1l<1h40(Sqe>)7$QH5mVH zhdh{u-O9nqJ|w3{N1RLCDTK(M?gJL=C-htJ@cIJw^i$Ew(65lR1A}#`g*2Qk_I(cz z#}>#f$+_UbijZ!u?mOB>ZsF|7;wpI)4s)s^X;oK_ZDetB!~U9u>`Bz7SxLUWX37Ybdk`! z_{B7M$ssPr%v+jc!(gXz7;iz#^M>IZd??aO+SC%3mG#>WoL|kH4597_{?Nm@zPRt6 z{xh~YzI#^DO!IPNX;~4R{}V6ng@fHcY!qj*Hvjt4?$A*nKH_CIkvj56QwsvHs5J;~ zQ4ybE9f_%1H_Ug!olRtxwn{M@l4ZiQYf7$lOIO@cU?WQ0g{Cb@r=9z7MtVl_UPd;I zUV)2|l#pHR<_kSy)H)1qcmFm(F~FOq82HH+H!Q$KY0=$Z$BYQjg_y|X!A#MQBOmIu z#{>dU#&Do{l?j~(y;W7r35=MW;wu29+Eu(MUbv3X5wa0|GWvvvDdAGa?{K*!{S6M`-X?1zOgjo`Sm?X-MkN7@3`rj&w3g!Iv`#A;4U zv9><%x5l)tJw2m6aP8U}G1&)a=VkjAcC(f`NI;KWh_x9>PVKU!br^;7n;|gBoYc3$ z9_12u@ws1(q}b=xM~1KaK9~)#aVZyEaN6E26^hIg! z2&SyGbN4B}eOkXh;FqSkic{VY=DR;0m`F-;nU0+n66AV(TV9U>C^xaJRoS}wg7p$7 z`?IIzC6m}oi^|NwRZtqh>tKsax$rPb)M3`#Uhf+l4HBs`AX_}is#P}H8m!q{>H|5% zVj6V`wRiIS{hmB-;+C%I5^A6l(_(UnQ}sd7_2*;=!&rys2n_#@-x8MAt0Yo&kuYdi zL#!K5siz`;t~<0MBuUuzKo7m}w%9u_w>7ZWC;#|;%HWD5FTypO>oqJo_R`!&7leXV z@2hWJUXieVQ2>^z1_4P1os*hO{t=%Fue)#$Biss}c<$R`!BB?w0H zHpS(<`a1X`m+mxke{7|B&Kg7XbYYrex=+1Y$^j_q?86x$fs)(3B!B0FN4XN8zI98c zxU56JLtJAsT(qK}X%Z`mjCq%A8oi|*YCx4hGl5X-q8uP87$;HEo3NKh=*+OK(sMRH zUeMH~?VYfTYx?{;Nz*e-SW)BF!ud`&3+AiW30r!_x}nT?eJ|+CCy-xgWjk8hK667t@FT7^UQ@lNYz;vNzku64H&o; zMpXBaRM3hfs0sK0g*)gB4~Su*naO&C#k7{A@-&5BLAZYxpY)-S4hNWq7_vVWL%!z1 z*$1D!W7@f)p`~@g`i0h=!}HrE`<+o_AnL~ugHC*R*e!g{R$R;Piat(0IyiL^E+*LC z^$|&XLf6S8_dIy_JgFbuh-3MKxt0ekcEAw)osO{V>FJNv`fMRY;SWa=BdF_e^NbxD zzZ?6jf3m_q4Nr%B6az&45apkVmCng}5gbA})R{^9b~}5ecc~bUd1W{o6-*^Pp{lKMuC1U&huG<56N(!` z2<#uql4<`pPKbzYIp>=-9YmnJ2UO7o4F*%HqsJ-=3b4Ntn7KJWoMb%XTi_Yx>gbE| zbu@l6&zL>=%C>+|2Z*f$s(?A7v)lLP@FC)Ct+du5xT;sz!r>~rqbZo!%FqH$@FMBX6bH~k)m?R^b5n3sFwU1<@lZMPJPLSlW|X>rly8+n?Bhdt|X3t^Tp)y zO;*Ce5*=~ZpOYD)9`Gt0N*tGDCKVdHkVnu%?k+Im-v3-YUSEd@h1WsvzrPfmnnK{wPt6}m>Ded;PZ zvl=halL?tGbu~1<776Vv@6IZ^CYk&4lcU?!F+uD0XiZrFPD{q{yJr7Og#(5*?#Xe4 zYwN{~TGyFlc~KX0G7>l_Ry%2C>DRW6pGutCFS^`V~(1PF{X0m*x|Dm(P@{V4bOh~u7;L+eiwBav`)&(tsK1{nQ@9tD8=lT za?#ny76Z3IFFr8?dVj43NoKIhdLHS;xngJo9ruT>kC6Ou=tOGtbie{9{IBllZjVXB zwL}9O)$K|r<3ZO=~7fI4)46)~h3dbI@!atD*x;zD&bk|4mS>L#+A z@zFdFgXRvy{4Fjd02$*aE)5tXtD2xjgef1!xK$T{O~2Lg-z@A6nHw+tL%92q5EO*X zKnG*lC&}RLU-;|2GNEvcM{4}-k6~}sqVuoDNgsJ@q?-vh>baf&t)HQhNKjt7V5u1Cxz?RbjGt~cW*E_jN`YS? zAVf2AIGlhe!UVunptX^lf( zd%as`G-%Dj;XIofyb75r(8(()6xcyl39+I0vK_NAW5aJc-eLNtYn(io zSizp0=1$M^+7M3RVaLs#x_yk*MPg&=2PDjeH_dQE=)7;ths*U=isW~uKB>9RX9E%MTl-lG+ z$fTWd7;`SNd6;^RV1kAP*#hQBtKA*)wm4yVO&>ml>i3kTZ%%3VCcwCq^)h9rx3@xV zT@_c7Z>`6SK4K`#j|UvTI|_7XH9LOWJL*(M}7vx6eSD%%#(jY81Wh}KhIRPofH{%LtJY+CT7Opk%^VhNj*CxN(Pb(kDt0=a59_qRTli!;m%n2HU)@ShS zxqzer^cW^mR`zdW{@FMz_XPToYY5%A|KR>i+TZrkA`bLffiJh)s1WT~Q3K4lyEao{ zs%b=LCf%EFN--Rj@hy)u-B*#NWEE&C=@*cg11pNZIwU4zFtcnXqS4yv=^RGJo6|n< ztAS9UUqH-;BxdGYlCn@=?O#vq$vn9+<>|B#n?1sCBA*YCC5^_b{^YKA&V5Eqf5;ZS zg_YXUGcq!Ofml&NA;7Bbkf^mYPZq)~39OPQC5~eJ zZ~?H>wievq)ne*Q@MUC|?QKLyEIA$SB|oKO{}_=Xg_K9WL-cIKFnyOCr8$xThBH(Z zU9Q}8sKa8r&rpE{++GInZzd%FQHju$j*WjolM?7u+sQ)`rjk%7u^#~mE)U1^_3}j0 z-VbGE6)!(8zk`X{@!KWCTs<#0$m&bU*%>}Gh?`5vsMOV2ws!#)*~BTc9~Mg|r=!XH z;gDtfbbT^sj@u}&O%ch=ZTE!;lS*Z|%Dz*`+4OPbeq#neP*cCD@W8C=7Sdfv*Ej?> z4W+gW*EpcCiaKKwQ_d|C$t`U~Pj(#(@^1N?_+3BQGWizwWwYt3o6FD6pF7xI&vScZ z5(?TWlDb4~t>WD+7aB`bSjG+dp19V{Su3R;cTpq!iYhG=gK@*L)*r;JQOnWLCJ(f5 z)x1mvi->pC7LFCw0-EeTVdxHOD=X!BF1WMkf)}t%6g^hzuBv;*CIMSUp_4M-rR+0_ zYAN&TBB8AnlE-;OtjssMgbTD1KA-Yv;e$GfC{eAiH5G(;)1+=|6irQLA8f2$Ejl3q zf~(edI;&!K)q&2zm1X@(vhNxia8uVRhDuQbWhc!S?+;Ek)fEx=b<;X-%H|Akk_D6~LEDioq)YI|qv0w14@LP3 zD9*IVZK1xOkV>LqlturM<~t_U#V2@lko85|977}M;kse?+4T=}Yw+;#f#AmX|0qXy z0C2?WCAXQ{xo4sArW`Qo`b2&mcVO{{(cf|>mEzsM07s0+BmlvQD82t-AA=IFHZ4ew z-#P(b@>io>y<~!f^|4DXY=R;i%eQIPoAEdA-wTD43-Y_a1n_LcbbByEh&XU+7cE+% zZQAgGMGqgUa2iak)dsZT+0{jF(EgWb2OXk>Ktkrl>-l&iWg_Dv6l%+)$!>v|V)4jKt`ybqN%P%K3L>4s;YV(m< z9s3v_2Js7uCJa=V4A=K8Fzrq7LcW3(}5ye!rYIsNvc!(vDak3m;E+ zADs}(QmX!1b+f3886tj4AbnF0NOb(hTos*@dp!B@Ai>{GL1JhlQ{~8Vh|5TY7QcKg*MYUgAM!z`@CI!qW@$_8G&L<&c(T9MP|ih1{$vh}Lm86^gbAq^ z?_<~(p?Abd!WEwfcnWlB<=Oz+{{N`Pw86O;8#$f7?;9Js>8ZcBE3w2HVscehq7Rpn z#wiPb$noP4x;=kdkHSV_EKN1c(KQroYV`8*+&gcIaan@aAOZ%*fLfOI^=?;-$K8vZ z+m>$$ESsBMuCMol{0=Oep1ywo-p&yK#;bF0X16{cF1sPW_jnu1D$>AUtg5*pZi9He z(bUfoY)8I9wWyNzKz>4iw)p$oA$r{A+s^SqSl6&cqVJJ<7wx;3STo9u02B=jlx5S{ z2S>Z$+WGB?+PZ~#IWCux<^9UaTONf1wvj%(dmTzqy$SQ1*BnSb|HdpH{Za=Y_%87> z%Gd;z-QrnpKvAjNyq{OCNGpDj=})remJHOKWZroh%5S5l(kas9G>j3&szrMEOxQ&Z z>Nk!dwDuk3YgxdVdYL1qH)apZc}PdiqoYPhBH7q61F>;pjGMz+smlX49DMqhRpqzM z%?L4*e&Wp4docKe+4cFH>+8prRjCz~#fiw?fkRql^|&^~lDH4zgw9&g9$3F2(QAZ@ zpgF86v6$OEHJi{r@{C|i>GyQUHt61~K}`!!hM`mPa!rVu3r6p&VfN5goc)CQY+eP3JMvuy-M-@pq7x-v^3s;&7WcDkf?Ft+=^PNKUVvwnnucR@xg!dgnVD@ zr(INDto&I^K52ybbC&IUv52hKM#esTD!4i@OzZdxG`fg_Tx0JwMs(J@TtMjHevAMZ z=Tr{9y5#!cL4|+BVl8q|U1Y{-mszOX{(Fr`70PKH0Q4w1%@0*VFre@f019lxXvOV7 z|M9>^eI>e7?K)6qXP)kgC_e#~2*MIzTbIT3*tWG=64L6WGAT zy1ClzWAS)%v6Ob%*?l*fHSTU`)b>h0djK5Ubx)T|uIf5I&)<_y@e46IkgVF_+8!Z* zMgR74dCXD$1E6U(<*1S^-d{ita_Z0WVwoM#r@IONIWYV-*}f^-8PB`B|9GWzXI8ke zqP-+iv1W=2(()cdy?pr&Rae^GX9O;#mK~DHiz>``t*Q>pXC`cr1d7|C6gs?zC2Fgk zYH7@7OBTp}{9WVmx+Lx;OpZqWEso8`3qu}w%(M*R#k^CNY-x{_p)1yOFC<})gJ;aOhJ)mI?k&VevWEvtdiF|D6e=tsVKRTv(T&_-oy$I9ynIiB2_HG&Rh6(T>Xn51xkj{J7Oxu z$lihNWj4^&|MOnG#PwjHX6V7x&##LxF@xGiXlq4>GIM{f%0Q)nn2@2r5b+$Y04ejsm_x3`4+X=&Skpw8}z7TA*r*}F9 zw7@<);K^w2NYv{P%d++?82lGzy6Fo`n%ytk6_?8m-`;Zuy8A>r6*Tw zu|+?k;Jm(VN8VjT>l`lJ$LD4A>29v*6QD8@5{}Jm!g@8~S)77bS-e=n-mX;M)NlR$@^-QD16b(bFjmDTtyn)EPcBLKf|e{bQ?wPD zT;QxCxP~2k`25bKiw+XxY8$4mEK$6x656GD+Nkw)_GSq57u@VkgFniEt06d6 zqu90WL#FJZm1hEqisZgcwFT@LkKm;4#zErLs+mUN1x&e;&WKzUFn{tXaxr$USqHr~ z*d5o#padZeEH|qqm$IPtW5&YaVUTI3j(UB0dq$%TP!cEd>Kp70F451<;_hMq;twKO z+T!%`8Kc;w@NK;PbC5mr+=^A8mVB=ja(bq3lN(@+l!X^(b>Z5I=PspP8DjCpFO(6T zc3yS}959^`?v=RWXrbK6zgOD(-OmPaB$<7!5)!9LFx5{4s&sxHq%WJt%X<)M+G;BHm-pnK z6j|ZDDj8j2nPBp+Bc2HT*QSM^f)2eMkxi!$c2t8z*Ea(a0I^qh7b)>58W6^>73NyI zU|+`_eJ~&dk+!zVzri3$BvOOA#8sG1JwmUqWa#VQq(-r*B(c~eP4a`v^0r_Z!leRR zf-5MGgzH6-)elTkp61pqYyi@(G(7+%@9TfbR2$$7Dm8=3{@|ADAdIor_aut;sHI(yX1**AwUK>iiZtJ7fjn+fG{I8Up9O zS6&xx>hyv4Sq1M!Zed6l$_*X7o7=GMIFEtU|n$IrWs7 z&jj*rUEgL{jIs>jqg|dbyKCWmo>1Hj=S+4Qtg43gO_?{j^IoF_l$vkIfl|0=;!WHa z@{e%p_CI=>hYY~5th~sLu@pg!Uvei^nBl81TRv>fywmu^^)lwBq*(G}o(xlGXAOGx zGhF;LAGbB~XBM{HInuZw1lW}jVUlk{CN-^d#6yyPA$@pArmVF6RPSeHyy4%UBtyv; zLTQ`u^}~sNr|6R$QPsLW#5LcU;O+N3FOm6-za_7K3#0Br-Q@uh;I6Jx!3teBPam#4 z(UT#@Qn|+NVj}?d;*h!0xLg79Siqm8uSojwqfqC&%y$33*xU16-Yvq<`-jzf-0}9C z`rY5`fSg85D=VvS-yYsVQAi97$QTt~_hkzK+nZ()nlA+L3u9x*Qu=KVfX(l0NB{ju zNy~*Q#-4hOS^StNy^MLeJCge%|1e<5x1|LUy4=*-lfi*IR~cic3U*EAfTlKBw$9qT%&fWM8| z?&fG{ip$cHGIKRao*r*KurhqR%}qj?8c~V*@#&Wv`0PpS@3WqG+T}-psDAkJumVh8 zo1Wr*P!4LH_j}xic|bQiFsU53^>nukd?Xm3&K0$&_`#0B$dO1N%p$A+JEPd_Y}rtL z!3**h&fU6j_Y=b3xSE%pz&)7JR5L@nvZrLzKTl}IDamNRXFL50>JYT%4g;tdt9cOKr0=@^e!TG1tg~wRVJ6iBSH27k?sy;` zIn=2eIZ$Zd%I0}x^?iUH0|T|GdR@a}WwmqgF5rjgS<=zGxz{9xwW(oaQ->D*HSUFk zy_9zzd-U%6CwliP+H?XX6}YHI?u5I6YVa4J=`_R0R^O?reay`IeSc4C8cb`6`c)9g zLQloik&Ekz7#v?9$ACfVyWI{T7OQDvL6fU6fZX$IOlf{UQUk-{uEv88W~$(qn07j` z{3Vl{EK$n^dxH{<3heR9kU*3??R@v6vto*RsY;QvhQ{F_HICy*?+eVlm_@IhUBSf> zX|wNGMJ!3U>Uc2=4x4N`J0wN9?S zP_4J*u-^LZH{TPomA&7e{=q1NjSZ+z0!}y4|2YyLAI1CMjM9=Zx(4b$i{7))h{7p5 zpriz)3t_i}s0;~H)P&$Ltogg|J9&iZ znx;%*PWB29VXB+jdDT{MKJ)SQ`{H{kvAC1yA-Wq~n=7>!{+v8?v?@PQF_!l$Z|hwB zYI%1`1nc%-TlT27^{lL9xFz8J$gQ;TcDIkpp^(#lTcqCN?|M4rklT7&l;rN`@-|dj zG*0w0DehH?h4y=`Yi{>~;J3COn_|`(5?UAtptcc+^{}xiQ(-*-wcbD@9Kd|KtHH|Y zkT@#0N6c8;(?kt4$7)u&^`eCqhna&T}aH9(#VH_9Z zcM|+vHO0+CApM=f1vwl76^3~k&x1Q_gKcT@!Cx*`mDK7#wl?vqDj?h9@{Aj}DVJ(E zu2as)UP`R#H_H?{MjU7I8M;AkO@`8X%PXX@vXE}ain%-)Z`0p1^D3WnT!-g!&E|0( zZ0|@|T5wP3nPT%n4@p{|A#2hF|lL3=% z7$B^Gpytx&2I(m>8pQ3uq0h|3V%X_g-ckC_@%vG%MF`L<;D>BpUT$<8hdDbP^h(N5 zCF}Xs{(=JCTn-{?B@Uu$UrEv<9=Hc0!<#bzg%pg%#o$@a{0VnJVNjbI@r=1@mjf2} zZ2SxEz~>ak^F#~A|FTAmLuwFwnc5|Q+3Tb)SX%hWZ{-pFM0l$9we?pzX#FiX5o|R5 z$?s}!$cTUa$>w<|E=nPk(8f6QUM1n=T`05XU^O-FB1acL!iL>RK-a+cAmq1Fk9 ztU(6$_;AeyRQ(Vb;JyldNcULwJ(N0JR=XJqqV?_na2)m2(SP~*xNwu8F})vJ8t&G+ zg;QVsYDv?(^33NuVdOlh@SUlOYb0PB9IviW`{11axUunqcbxzg)1C|?LaqA^v)N4nWlMXI9tQPK*k zBoXCn>YUv#n=(&|{=yL{d!JU|mTFmoMe+n^xo>HEOjD-!bzHA} zuo2xdd>64Lg7tmcVAfSkr=i3t%U^iqHe~O5U~-C7uIOfY87eon>z%vgK_@qjVJ1^D zdP%hkM|2CTsu9!7i<&r@0uTQc!1}0tP(Z4ol^Zx{ynE#O1+=*CgW`*IOT<)JxKalD z4k3DEw1NyM=5`huQfe*)t^e$pX-2S|qktKvnpWTNEd(^!ly0hdozkC*-O|9i(1SYB;( zgk8d!Q7rjE?d-o7Gtz;{*-V5gYZ)LORI@}D%P9GUBfq_1;Q;-epe!A%{ayn@r)m=d z8-fD{awxjes#K=o!Ss^)l+#-O&Hg_Te@{RsE>y2Q`u!0m{nPaE7#;ruAj&0X;UZ^c zvU+XBAYOP0hLH=4T#XlE;rPhFfuE|=m@<{=rL33(SddRFY2S`9%RHAXic?>BmK^pY z%PTVeI`nAVYn@x8eD=26BrT#g*h($4i&^?0{s8dDKD1D-7Ypod5 zk%$*JgGKL{HjP(Z``Flopx&)9pY)k44B3s0B`ub)V`NVG4DfG2uv2ySUf#rOY<`h% zV!^Od^v$mUOyPh1X8MIGcaR2br_b-0>A<1tpo8X27_!RNP~_6fNlF2^CvBOjFNC0I9Xqs&CnnL&HvrGG_IUL zBsjPI#_MB`;}ghF#jUmM#L?+&heF-Z$;L^?+c4tUG2z*<{@GF1+pnCuXFylQ{O5e9 z#8p`pz-8=eYEsL<<6I0vmQR>6ta8IUBZk*~-I;xO!}^pDKr0N@b(~xtx_Uu4v<64B zAX&v2zc@~Sta83sww56G@`K)g$TTKXSA3EgN2FF|4@zBg;q{(#6RSE(snRWeGLjC3 zhdkwUo!YCV1_2c)cX?YMqFS+df+ul+|I25h-;0a+m4f>%l5?B3>pAw;u3_ghfiheS zgJ-9{tJZNfiE)(TQPLW>8^J1fHG_ zP(uL@U9a`X+XK5Clt~mdn7}SGnb0%$f8&YTu^rm1x!c(v*0+!FJx^U@R|lMb$a?5& zTd8}B?|}d=N7=LCP#KzD+!2P_0W}p9Ku&>cx~nAmQ;;yYNZWLj^~b&qlcX*`5AvMv z#H%RH7lg*Q)&b|%^@7@aPR=l*Xptxpb#=OJ1<5X}7G@e9({d4MhIRTC?0eM4*0RP~ zcv41g4~B}ac3oi31XZM6J5du_M8v8UXfe$4$=%~T)l|*u72XE)QF*T)LAArh+~=AX z)vgfKW%UaYwc(q;ountTae8_8uf&RsS)-kd5bw`|0I|0ZSxY2?Lk2XRm^owp2r_SV z@hrjm)PtpO(UuAk+x!zJg7Vj#mgXrNdsKuA%y`XT#Id^lPTm8iXp0*1%u>omRP=Z{ zB^;L?rK~fk1J1(%3gq4c#>ku>ey22%Vk-Bm+Q&0krX-UbJmC4SW`*-m0_D>xhVz53 z2$Q#79eB!sL1cav503Af^e2P9u6e z+XFw@_maoRK6;S;C~=7lLU~J3nW?%tJ^6elCO#Rf8!b zxhn^)o)_WHE$ zR}o{YbyuNd<5%94ziz0pL$@F+BdMz=`oY@PlTgn%w5VorX%+{rCRwX}oI#M$?cTNO{h(+M_ginXgkgI$vN$JMw zdIzVeB*pM66E@@nBTT@Kt(u*6tj{%QUeY6 z{D)iZ{*9fgVM6GZ`33JLO|`bZuVoOeCHRUnQP*yY9E~zJY$Hr9)!f(jT!M*GYTKuiq>AiD zPP>^Kf?$)e-4Mml^128C{L1+BCTDDhgsY{=CO3ovD$##Wd9hkFOg#tVDhA(EhPhcNcA zci|^#hp6OHzM&)%T}1FAd)BD@q=Tm?9t3Vs`p<&^kO)wY;43|nRw7cOG@TcYm}*Tj z$8b*%P9gwyhK4Vt*tAQ$ncM3h|2JWjzqLlyZ+^LuC6t&gMz%j*qI1L4%wdrep46$G zYI1i&rOvt~luV?tLC#eCAnUu!NI6~1`BjOTS(`J!@E*9TKn7Qpz}vg<+{pPy4OSD+ z#z1mFcdA0yL0!GqI3mF3^vnkycecQp3_E>NOT)g1TA5F|eo9Zo_!oV2ZnGK#dn>YA z4Mi9B!HZWdaI;i8b92KhO!h^}jT*-Wlvh-gEFK2@U`}?VZKqsm6eg*Yq?nSiU?WK~ zQM}I`(ru|;00u_lnz}Ti;_p)aF7mBl^8CsNJS$O>SfBRyy4IQ!bOgPFAPvvY2N-s=5r2m82q&=eOfjx#%c*GYQ925n_kj9D=-lTcZ`sHKLK>aeQ({!W5V z3H^Pv+r!iO%py%*+kyjoSjCyZR|NcD^4XISth399!2`QntZWe%nc z2+BqwY0F&e6uKN}E{~?t84~MPxf8`e$6J^dZOvji>OGD`?nEZ_gI+PBY#zw*W-s}} z2a`jK15y*6MH#svHNH=G@JKPZFKTn#@s868pT4r2kh7Zr{aELDg~?VdTJ1HY>*h}4KTjdd zf+Jp$e{obl|GpVT{vEH?^1G^oETM7x*VY}p8)OcX(*+_Lo}nWTG!M+`##mjFEe%R2 zQiGdkH&*w#xu5NrMdPRm8zq0nhAa_swS3pj`sV_veS+*kTy%|AAWI(>Phr@9;sHiW9DihW?uIJlqQ?U`!_DYcd3f9O8lwg2zM8HiC@g79w=9u1H^NU=ivsE5O{Mwk z-&zMUL5Fm|S}V@pQkzv=inxy>JxMTiEe6d(VQAs&ak_Wm!p9VmP3W!Mr{hDD<#pQV z(;A$UU_jO{_B3yN6OG7#&lE5S=(kd|^a}m}_ID$ve+Ifj%u47%V4LVajFXGWsG= zqSe~e7(SFZ52pP8L$wARs&-$Xe!UF78NK2De7wm*$IU>N*Fyn<1n`^pQyTYEnn_vM z{q-&X_$Bbx&g&ZN**iS6a3{HEv{4f{4Vg}9kC3ABnH;-YX7hrJPX*WzhJ`Cw&YswnCM$BQK>Va2m|Yf-MOV zzmzKKDd;=m2s=CT1xw{E5!*UIXa$k<7%#uG?!=->s0#)Th)^vMDU@ue)()a8oL-mo zKWO)2MJyLKr;2!%V0&ok?6J)7-Y|q$-7ToiX34beS-ErUM`!5y4AFe_Bqj8{0F%{J zv@g!3of4d#Q*8B%v@@nd_)VCr$)U(=khz=l`x8Ls!%Zs_J7wG%NX5S&$|?olD~ur| ziH}ZbH@j37p(tpoU)kB;WYNidm*z1{)ccY?zfM^bCkHXn4UU)(iVXS;X7yJ1 zhTp^I!-Lh3uS%GddKsp+vTz1okRy(MTfh8@Pz;r!W7A>(8d!_dAcodj2r`IJ2^cZ>MHX7Ewc2cA1j9MzE95;5h% zk>uz_I3$sPehUC6SlFbUPzUJXow~$S+IHmvRUIN83(2Mx|HCV?u)K0%sVcKtF8}!d z-P`&5Hr`%1%Ozf-=wQjpVDp=23$cM=HvI+~GzeC!E-5g)X?}-QW4THa$75nB&t@4n z%Ro~vHL{B5s<(gabLVVmGjEN&!khq3&6i?5NSPI@>PPlAZevr>)V>|B4wGm0{0hWv zb>;Uf8MBSq!V`v(F_vnd!!JS4CXRLGK)!tfIMl??7PfbA7nrrw`@=0ZcXAhfn<@=U zz}C;yw?IOf4A)6w{UWfAagk*7rApPvo5v(hR{@$#T|Bs_eM%4Pevrm563yd3i>)jJ zsS?I^9VCj$ZTCWF0as^SmUhd*=(tI61dmSDI5u-9p2U<;=@o;gmS%}9KYPhLnL^8y zXb~?jp1yMpEeV;#dCzBJuygl?NibXHet3@EU0DI<4NR6!Pq*Re0U+9XEg zq44wOIh6Ie%M$)m52Jx>27k9Lbs?k9`;U5?V*Q6Y+#&lSwKl;{4J49Oob-;m(Jul=`LRQ{VtTBd-4Rl%M zF9@MiM^K}uL)G5Ge|tXu88lkNP0M`ml_j(j0#&cx=i^6JD2YeAWXCL!2Rrc$Ua&x1vu zAPVn-AuTeo{e&*~0ZAdNhc{<=QF>3LpiE?jFF>CJ`8?nb)8| zwL25w=}k+kQLb+lj1KjS!LXCe-9Tw_K>b>*oxicA&$_T6caSpmfY(#XoX^Q4>Iwk) zH(=PK`X{rjZKP^hC~-2Ne#Dj>yl==0)76k+Q&rRn*cp zgYP!n@JG8BPp;jRB+!g2KC%NF$$^7tLZT$3ii~8_QDL8$FjLDaAUnO%-qDs3S5Iw58`{ve(KhFn! zvLl=Q<^n~9kdMq$2-Oq9EtD>UKBxwpU`7+)*c2Lhzwe+^=7a;Q&R7-Zl>Ge*Cwg>6 z{nCjz8KXZhp(}T z9z;Hlsbl?jkcL8IkIC$`TCV)s$R&GI0R&ur?1aPbAvHRz=1+%|1PbC}Jj(FOk) z2nec_xuPrPIluc(S1~UKQ?uSqXr!Lh1D-mtMp4nY(=y7MQP(_RSmI|QV{}oe{PB^Y z?>;HXxPAz&ilGvYxV@gy7D>vsAewgbK$(}hAX1LL_C4q;;}S3ZKqnf=#*WkLXKY#d zC`!7m&4U}fI=KZLS=t?S;vWr;_>%}XcWFMDn)D_>D2e5m87!nX|23kq@hLMCR+Dr4 zGg4#3{PMA4Yax=wXZpcD5LAzISLNU_`f^bsH9$A1sZK&rC;2_&>Hue!GWCSbXwj@TR1yP9C^3KSXuxL3=OHpI@L+&$M!9!<|rfv6HE11Zq`9c-s_Z$uh2t zkb1NRIfC>~0FV5xhcENE36$Dw`t<)I<7jELOh{n}A5AeM~w${eypac}qqW7o5)MoH#K3*|FCL zR4tnirfe0b`*e4vm&1MTl3qth1UTlMX$cY3R~ROaiSC_~8W>k!4TD+}*-yH}h@{GW z`&m4N{sXeMzW>4`A=3fENUntcnC$pJ-;Z4#asSOPJ9rIc-WvZz%3|Hn1jE(&V2n3=PtyP2C?Mu8S1%&a|1`0)XmD?lCd zNjg0@vT4(#t5)WSI!*XX%8;h^CDX4}lwSc_s537g`x#=oT4AWf%_J9byNX1@%%jyF z#Bz$Xub4Pmp)>~fr)YO5B}BdB>)sGlRl2osKTk^a6wH>-tT8JJrH$5d z@<7W-0*tmHovOY-vkCfHUO>D7EkCkG8o6AQ6PUb3T3Pk59To8C$R66?sSY|qTNNX# zOr_}o>snjhg=DL?P}^D~xrQ{bD^n0n0OJ`dn6K-htXj~_0sZ-6CjJvzx3&FEV+PD* zOkg`-T)}EdWg_8emuv(DDtO%~d(IqrapAQJtfCMZc8+sVS3b(UI>VcM3Pw-||Cq(+FYhkNezdTD7GS_!Si`9^|Z79tLi9OP~yG z4a*oY?`Y^R`wrI>g3;5QF{A9XqO~KH$$(&mN?gn^k}p7deF4*DR13n7NoxYLrux7P zV)HPd9O1(uivD?fcDZB!f?o4xK7e?K8*-K`@7>=+AE@*SuK=W<;x97u1gtOTn{-*7@9=Gk0ARF!rO2 zEi>LppW!qFN-eAz7F#3Ta)XfFMR_N0P{wkezw-Q&bx4NcjPSU`ISZn!3r=fXwqY$K zI54ro$dR_SzM$p|WijBPV@FeEsdgpbdDUMjkXE^SEs*~0$HJ@-h->tdFuTOdb-FG|>Rudk7XL|=y@J(H+ zkAY?{pcnVcAzmg!9@i!yly3CQH{-KM3BfO$2~{ zG?LV+h^WtUJ{G%PEnp$7j}4jg{6&)}&1_88uYejM-}EG=txKw^xkU}<9`B~2zC;z? zUpN(QU_7bEcx7a$eioXuWJfjl$|7{>4NHo=;hV`fDT5^?cF8Tx(Y$4fD7Ghy)mT+^ zX-sYIY*odPdxBSHkdM+lgv1|clPo`qp=F{JQPq`(25rB&udWq-jA-OjK@n~$J9Er< zc6y1Ec%pL#c@`!+t|Iqj`QTUul6Po-Q4KDF#~%jeP`2U;ULU=~!(6QMGddNkJ^{?* zzT`2gGfo+EcPS%>S=wA*vGo5k+jGP9G&d{?0$Z_g>H7oR(KI{FF8guoOUP%gEVS@! z8ZHvZWH7k1QCZs1+3H!4R3_#WMdvc!L4<$nEQjCO`1lyAv8km+(0S{i;J?mD1YN<$ ztSky2ixz*}zV?V;R^%KJ zA^9Kfxry%jzqp6xtUGw(90kSygmyL5F6{~hF^@xsD3he3^wkPVk-p!)?QCt%Ezzp! zG?R^9Mv-1_7`$~$9+}y0ZhBZU`+NN?e-p3qko?dU(=_mj;vQv?MMuc#W)gjD*>iT? zhMNF?Gj+fGyg2=(Q4t3Nw_jQfQrfQGaf26x|D(n=7g(iFjL(--rI`xXgT|n9f{HQ} zjjzybYLx5sH%99`chiItw84_fch77DR600+E+!}EQx?ZMCBx+Gh{-&TeX|eQ%Gq+S z*->n9ltL?r?4?h&2)m0;qceAh25AD991U}b2E zk%`Pf+O^1}<4N1NzY$$eYHq<;(s|h`#=K~g-4a*IhXOm*b+^E6pV@p=almMvdLXH@ zo-9{?NVaFjl$i;t$NTEDX)rLz4&^v&`1xRM@u>=car_F5_IR=0ZC0m!VaD80v~=*? z=Vk~stC(hNZGNbJ!?teqi)sRk%*#adByoO5=2C1<_OCP=OAKGy+;^r8T?693!haQg z#wUg}HU8XbE*gbva`9-qg#BtFs_xQ8Ez#(#AxmD&xqnDpzpi5TN+{83FCRRVV zf16;-WNgMH1WEpoR5}l>L zG-2}Q6wwVj7v}He~jIXqOBOk*!AQC&PTdUe`~ExhY8fZtn;{S3MzUR zHbeq2W;18{I9y!m^z>4{dKD@{Q`%-)uIk8BQ~%M$RVUdU|9<|Sm#>SxSk2Zm;iKV2 z5f@zoR~cpPWgICDciclWPX`tvasJbJbhJn(fzon%x1GS^RyNSG^z z7CG}TEWzT1qk=lThIP$7KzJdf0m){5ZLSh10jWKQNc%<1p>!bhR!`D!jHU3pq09On zO9&4QT_;6Wt#Fi~*%terbf=cpQBCEoN{RBoN6mmuhJQwCFBsnTXRO-k3DS5fUxVCV zKMNwt-hb&sShH#`avx-ylgdKd7#kFco4{v{$J$Y;8^&xy^v5l&BJ+Hy7$rJP?ZZE# zS(^3P$Ag!9Rf`!tLG$bLChcjzS_C=yPm`FxFDpGmZJ^V(*8a5jz`s(>U^y6lEj-Pr zg+6iqz0?%t{jh3?O9aboh-f%;b_nyJMz|9VQL1^HX8FYPgT&IdSHlHzHgBHoSLL?3 zRCc5j>wh|k9z#v%qQV1o_*-|T-V~hNQ_S6_qS})^f2i_CKSN z`%YIw&b7MDudG5r9)e9$I;Ztxbd7(CYoR|G2p0cdgIXdZ%f_p0x+$^X2Vl`1oJH8p3a?q}gsz>5bZk(s!`K&0G&^YptfzJOL!MFx48GW1#nWds9>;+EiKeE-zHjKQT>ZlH+rK!DU5?A_YMSlv5>y|CDS5L==~Zy_tYT zdT-Qc0*xn;ChmD7`DHKryI9k!X}o~+3V3kwnXBy|pFej()>RUIDQgRIp$6u12PD%1IT-~&tVCI$WdyIfD>Qz1 z&R33uQlaVfHD*&kki?oyh(*Q9Qzlm}5gAN-G}0&1>TxXaHJhp(%DA|^Ba3yYwNfLk z1$@1cfc)S|GnHv#!8m?oV43(zZ(KU6U#&Iaqx&UA6CJo}>6vi|v^^)UyM8{lnXb=e zNzR!90`dd_L6{~IV9+9ryRqsw_*W_@i}gH=G!_xo40&8V>%3hJ611q^i%O>LbOHJ! zjzU@>pzX`4Dx4|<6=lY1QE7jq1`Tc(zWw92!P}hD&x%^RuyE z;@+0=+s*?+Ob^$<=Q#QwFWA`9vM|biGa$Hsoct7r;`UHDZ1-{_!nOPS?TIA6`rl&K zcTGTbtO51>!`~(giF>7adl2e4LI#OMZPb+%g#8r)$j_cbF-qdfqw7kF0?@)V_1`6z z&yBmPye)8q*sS#{`()gk@`WhR9!hry+xk5=eGARCqJMnM`1{){ z;kuwtqvuBe}np!ZKCB}z>qP4b*1=zNV$M6IX#ML^xL7bT3Mtr|II-SocJ@;=uQ!Tl< zw5`Y|HM^_BoNvolRAE1$nE0sC;*F|Cb07pHAK_Gw_AM}(~n6NP>bQ%Ri9UF{)=KDryo{^YSL0H{adSDSlGu$LO7zJYK{q zgCeTN6zk3PiQX7*Qc-j~U+R=2J`jMqImq|l9zeg9}34f0BuqIgZZ0x!IHP-GO^ z^*-Ejprxs7*JY8rY<3mLwd+qwrY}4G0_vFhiIA&p@|M-1VYAteX5?t1ehAE2Zog(O z24GQ_t4Z}8lR;y6X!-QzmX4Bg3EhhK@~J;y5EL*UP2GBM7T%i1_CJ$unzoH%vH{K5 z3#sCa88VwzPlmGfu~xny?MWS+tYi|VZp1!U`f5a`dX!Dvqjo5pF_WZE8crrT)XzN< z)oUMkv3p88bg2LCz9iTuCpX{j6Og&_U9G;UY1h>6VbPt;PidQl`+ojZN*&)SdZFuc zKA%JFpY|7Tri8kr*{BdkM=EX41V6UDh@Ez(Uo3MbLcM4F7K~eS zzxa=axAyVwJcI6Mdw1sRp64}=EXqpV1p!pdc)&FLROZY?@So^97oi{h{*XRsZ`wPe zH$gh>f`HlXtyJIkca~4$gQiads)r7-stZ=2vu<#ZJ-qD#3#0MDsKPg`Iy6R_L-t1|DZf~Ly-;1b~(}K1Xui>5behiPqVhtH`^bwA=Tvd zE{Mghw06_7st8ANkK?awtNq^JcQSogRhy_Uys2sKrGpS4Sa~B6n#< zWc!p099c0_d&!^tRQpH>=L|my)_c=@)cC~V~Ae|X4k9)TGW%D*is*g7zUf=O= z3L);Dy~W#`%+fKeuQfjdL~T4gn=;970o&0-A|q?^a;T?+Vs%5fJ38i`7n3{6VuohY zh!niMuvD9UKpMx>!)y{ssy6=b;O4iml*79NH}7vYW%&x+0^JvP!)LZ^)oNx0eM@e0 zm@Mdj*GrE?_|G{6_rjqZFV(c=BeFT4BY5LZR!j&@!p^UT&lE!25_LCOmoQ^HQ+!*? z;7P>ft_LKIXo~$wm*^z??9!B>Kr&sq`R>%434xDKw_m@uhB2!^EhiO1)czH6yz$%4*DvFqG_f7fkqAoKPQ=Q}lhJNbC9$|ml_lRiTi5jx; z2u*YJ%lo~JkZ5Bm77-oCLe-+JV+8GeEZ+zGEvPf3Ti4{FL0U|}??o*~GkRp?hZ!+< zU(#|o4O{my9lp_&Z7VDfae0stXf6hTAC^vtV@XB>W0N|D2B>trt00Imu(80pR z&?4y7OzM86*OQt))g%TDS>}8eB9mV>AU*P^bjtAI;=qg0&e!v5bQYfH7i?@U_e0=B zhwFo_YC`=C#SP6nh}Cm7s*8)Ga*lbY8fn>O`9M^j2l!)JNL=npaKt^g16;I4(`>}n z@zx>WUQ!{)bi);I|594+q$A|em5q(y_+*~H_UU}gG3@+!(d1@69zu?ib#!sTfp63e zj0uFilQ0S|_#H~t1xbcpBl_Y!W$E~ymJSYY8RbITIY*&GZ6?WfrvIm_=9x2xnD%*oE*Me2e&=a&=b6yIDo8&CKzOv|uLLpaLMsTbR?g>gqW zx!d!r8eYWwl=MzI;s3^&+w1eWKq$cr+kCRLlhR%!w|Z=IN3;wGm^|HvMiW5+*h$ee zCrhxELf$@Z!W(9B9)deBv!rzqB8|+wCpZt@Rvj*cxp<|mGT9ZUNC-$rbbl> zKZQ#W=Y&fGayX$J>2$;*7{<;Q7}}&@HZzVzfjAB(Ms0_9$#|fyarISZF5XjWK&)Y~ zbaarRmOUG_UJ+t33#qSmsXwYqs)|R0`40De2X>!#8vQD7-3O-Q$SIw{JLVR@9HQkt z(crXotu4tW%{9)OjepLevKVGs69jSskz4lOZJN4@#;|=phpDaKn?!5DTYijk-^clF z-kP;7UkfY!v(95GAaB@0-r8i6!?uN5)l`f<2!8VVm=B-vNc2CEJG)EJdunb{+ zS^FbCUFsXm>-_%TiG>Tv)2-o(za6;v; zTmnypKr~Wmu(-(`oU88470$jqIT@@~#p#ifYkIV&VvofOEvlaTq6LHY>|Bn60>@4_R>k-@WXVhGW zRu1`DOYFnZiv63C)>zeQy-{NpCE}HzEA0c>B##HYOZ^SuGk~d;`8dlA%9Q>nE!qbdXGCD}20k`(R*x-&^l|6zvj_-WPAq#NK;4m-iC)mP23p7$deZ|B#`3`)E?30Ek?27$q(g{>H9WzXD#8D68sf&MaifbXw%ML$wY8%h4*BUZZDM z1V)CU&8FObG<>vAK23(Yn>>ov1GGUA#wrjBE1)sZ1_*gf!WqI_sAR4VyNeA2G(NQd zaJYUvGqJnQ`1*G{#;jVu*o5a>YuHsWBT|lF3)FeITJdlcqybVo<#_#QuROc{G*xv| z#X*&f!U|V3Bm`D|8pa--k7ibfVHaW>*QdwU9wBpL;*GcGhV%zk(zaa$-*)v&1 zc|Zh31jY*PNlI>6 zp8_3n?)fFnql45&>|vEL!vNwtLEvgy5l;%DX+bgSJgNtHNx@ZTt4~A zqV^0;LnKugU^lq?mrLm+eEdv$>gr=JueKlj;kX-jz#H|04Lfv&Nofmyk!4O<7Dl|6 z{~bpU?PX-Pk_LE#`Osq`3`sV1);B$AHsGQm!OeZR{RBj*qx@U zp(1S`X-sLgXM`X{BqhDzBvm3kD28H#=YWg~FwC0XMIV9*6#UD-H$my_O0g>~G#7Bn z;M!>iSXKWg7p!8XhJ8moX6}jS^e6Hk2~L_G;OYEs3WkB5l(Sa)I-fOBrL0bb?DPAB z13$2pf46A~L9l@9#P>tq_`F9Z$&(KB_}@!FDvJS*@aoZ((s6fjy$y4xDO+X6T5;)r zxU1>}7;HT~gWfN6iyCNw7^Z<<1Vo6=0d6tTru+-dAx)$|sg_IMj}6!C?Q!>_0ncc; z(ZBjCjZDQonD=PEh-Zr%LUl<&Z{)SFRVP3SsUDU8*4N70>Qrx4um65nfW>v<`7S$P zf$9Df;iFmbZ=EI3gTA6!`Z$&+1`z+@p)VYc>Dt zHRWFCY=B>g`~m^EU4+$6Y$?~a*Iru^367+98nNqJk_%`4;bJ%!2j7E3h486YnY;|a z0l0|*Q|zkPg=@4Ic3Xf3!4SqCA_rW*_M{buT<$2$a6^Vj%s1+RUY~9=D!XH)=7e-G zUl7N)R0&qPum-wts)U2<2@v6g(O`Y56-?Cr*SkquVs&1`W8=?R)+s~<&RQtvfSn>;lt%{417;u2(SYv3_L4DK06>JgsBNDzTiRIQ&;!$G&rZ^ z#QfyKs+>t3zXdjPY$0sQ&I#Pu4>)i&3~Dtm*<^iR3q}&vtoV9=_a%zyylyxZG-i~K zF1PTE8zp^*d-4;WfH%=(U#o4SAAbd+Twb31HBQ-3=-5Xk8a$q}R+)r+J3Mi(47GVO zoBb;GFp9^XH>-z>k1*V{w)wc2<38`fGS49>kxo>NpfLN`9BDFn{U*z>A-a=4)4&lw{sDd(KkXVJ?d4&dHc#=L8x0Z zL3N-iK)`3lzu7O`a82*zB9+o)k2kW*ZOQk_IthYNNcNXGUy+s`SEC$l zq>|*|&m8CGq>aAcgHsE5;n=Cnf*L^js}p+O8V?%Z9k$CRz#v+8J7fHSB>BYM|Jh{G zCC9aix6v=HSi5bHZ&Y8ju%1gF5(7Tw|n@$)9oA+;2}2&}c~mqg-) zs6#1neF8}*$&o=M$55JRvcD9ueVCjc6^&;)stYtE2> z*@^Sp%G25@N5ik-u<%Om#x@3**;G(*Q1!$!2q>)T%tTDNyW{XQzdBIye}u}>La=Lv z3G#Sv)p4oSz4VwRfCd?xkRFL;KuvMN7Nh3=!rIY3OEc0shCISr-Jgj&CE2)!^B7+h z0BM2p$RA88@)6Z47H;NdF#5zvV#p_@GQ z-`;>vQmOBx30!G>Hu$u(!K`%_DYvP`CB(#u(YV%EKglH=S(WAsgPw0Fau}OFM;|G*lWBSk{m8gmTc!YW4|Aqz0lOn zfGy5BEtgKg^!wxtO{BDUGp+h;8Lb-54)p#Uv-8qr~T4I(?k%k~7ay+7s3powwf(7do;Ui_!Y3E%6{Y4}gz!ots@H8fb! z)XN5~{aS3Rv4AG>c)U=ONM=Ry4)0IRHZL$ka1HGd@x(V#7P6{0j+g$;aehc9Kff&v zW!wnaczZU<=s#}tR(xc(S!(aBVHpRarehHg37&8rSWOjs5ovp1!|hEMgm-d1`y_J9 zq-8!Oqqw^CH?^Lpyk40LMu9y70zC)wCJP0;@8p`g(7U4HDzHZj{lwLGcHt@1U?+&E zam$>)VEWa80a>XC{IOaQineC(h-9cdZJO%Tm+NK`=dr1KwbB9s8iRsCX&?$mOiz>v zQYFbVNfdV1i;|p{!+vvw86-RTp8cnDBkR#yB@ha~dT-CiVORt01}g`Avy8-POx^#( zIIWQpr{lwi%_608;IFvuS6t}p3FlcraLfS@mMZ?bi&GO9TuyX(rc6#4 zGL@&N1R<1Wflq+ZvGUM0dRv_)kPF=S;dlV_6D@>RuEKT{$$O@>7o4PDqTiE;Q<8Q> z(;%iEqMt|Y8{p(YqbXF)X6^nvP6+Tl$m1R=J@Lx%%)O-}DbyVt|LNslLyk`u!9pon zxQHZ$yx6kr0SB7TDw~;w%@zWrwlrreAuU`1Q>6jRQzC0aM2f;+(kY`Tx2|&%cIpX? zVpX>&QYkn%GO3?MY=)P`DM78Sg#0ic*hm+8O}aVma!Fyv;Of?^8-xnWc&V~pPPFGi z?WWT1N!j#*xjjN9U*9Rw$jW}z;pjjGN)c|2Q2F8;N^-mr?#m}Ke=m>L*w#jHJIB3K ziU5})9I9xM{14nJt7MT4v`PwP`PJNIjntm!WRi+CPO_|2^mR;2b+Wqgcz#r7jIl7w z*Vllqnuq(pFRNOet{{}!($!XEl&JTQY|iZ)8m#K>@QD~`{+Nk#hc_Vb+P)<)0(Q7c zC)S4Drel0vHPKk5u<#!P;Y;&EVI0-ue}*_%o$YMZR{xSuqu{t>?hl#&>fzEyu%N5= z8^qWNwIvM(x81!%+Rvx;jW&oi6Hz{p%+!_ND z4}crVabXfsGLZj0@%S;A_SX5WqB))!82yLAKw9O_NPwumk}u^rmGw6+BBb>Z18F*& z9;nmbup`Za@v)OLP-#`j#M#|VZ(~*DZ9yhKep2iV_S$S=A<#<7|2+D(Ak7<`wUT7? znR$*|)NJ+}MSViu_~yMV?x>BJp3{`cjAwCacDC#=VMH^CT}V;iCM%}h??kA^O55ttNYsUs`rp0MBvn@Vn>-Ub*>snsu7vYTYfSVI2XTo-uB* z`NhCIT}Pq6icRZ$Ci`ZboEPefqADX4QC%P4&P|qfUvpurb%z&!BOVag0mT#9@<0gC za3ys%=&W=8Km1ZVK?VuAs?ZuZMiE4@2R&|Ttg}?uzueT>u#gHtn2^mCeD(0_CP9)_E&%X^9e?g6mNZm!@tE94;z1uHyJg zn<7r$^^*o#Z$q#yu5S$hX38&2yFhR-eqaDF5ufX~aaFxa2DN>9pQzFV9vD$EdO%5f z+>f1(1#k1J9&$QEvMt?L7&rnEsdLibaZ+NsC9buf+pbtkCOyZ`lX3guKJAV@p68`X zT^?<16e7uj#nPq9s=x%D#fj<)7HvnGAJ^9B3BXXNB$8P2;;n35#_KD@YL5u5Nz+R_7Yy6ZFBJuH|>cW-4}+aEOgdC6=Ao zAgwW8>ZiD@#y&47ZyHS8wCGJ`IH;y)lKUASgPx5gZfrVs9C*iqzJZ@3Ox+zJVW4w`1 zDe+1gRWf54r^7{1kZ3Qq%Wh5rL<%#ix;{;&oMUxR*w}HC8EH;V~+MIq~^v1@b$aqEqITNP-K{VBS|Z`RZh5_vtT)v-V?McR7ZK7E!L~Aa1EQ*F z_W%Vn)fl!Tl|!e1dak^&cfunjUO$qz(#Z9_CG**9jfXOvr1ZiIWQ)!DY$WkRvN*;= zkIoF+0pCpd!eNccmb@PkCX?1h+8Jqa2mi7Y$pu}7Qh+40&az+nyFk1SBy|`WTn_B6 zBA)$|<5(r!+)w&;*TY5=gtVQ~Ab6YRfA(C6I7*bkl#uFJosi@aX8!+9tDS`44&|_* z_`P4(U8#P%41?f9syKL@oXsT7Lc_;?(U9X`Fe$>!*mHo42p^atuC(L;aV&c{f(-qx zg<%MutvN}d&-8)i=8(#S!O`^001qfX9)bXkZh^QVRf5?GT^@@T_~Ebsoi3HyHR+xy zutNfBopXoL^AXM5`mIco7Ctf)?Cjv8j+K703CXi+=u|tRDW<@9}wP4ISP%740#dv;wo$Pb|WRna-x1BonqZn3IZ`uCUZp zAfiNS>HOJTe3y&KjIJ>CR7s-{a27!8tp7 zRf2muB3H#lM~0Sw<_AXvcR!}^0pEY%lhksvVR=$NNL!5B`V?-5U=3wo`b$Nl7q9zS zukf?uUajAD&fCrIXW_Gdp6w&N;z|P*tKO=42Cbo9sQ*1n9e566sLONKak+9M1*i9r zmAkm^gT#FK-kSeC!S%LMCuQ}#h=r?5ny`G@sc1m-tfgWs6+V{;rDG5+#&Gq#3O+ie zmowvI(O{x*4j5gEZQ%lvm6;%>V+Ps~xK17EJ^Y{HXvPU;hT6iG7=sIPcw2Uyh^|i^ zwPS&bc8h41~rq(~$I#Dw0KD4b{7xk`H-fTkZ0;ex7oh$S1m zZ8x<8P$W@Hs^%;#j|u-Q;NiPY>hNjROW&GWbITU$Up!=$#rSiyT`^w7^xj*lh;-aB zP4cE4w&EbP22E@+O~OPd)epMs@7_bFpD!^C905v=vSMhuO#xk`>>GCZLoR64iXB`3sea?(_@P+Xu@;%6%vZ|#zg}M& zrO5>;UKr2Po2!0nG-avom$o2`s2YThRq!YC&e)i1o|h;3d>@5K9lzFnrYgC3W0O9)ma#TO96R%- z03Iqi`6sC#S3EVTD=CC!4JM+C2Mw*$C4>%MND-aHBYgQ35G!*URpN(SE-Ce4ozQ zZnymWYWL<)-eF8%x^aK&{z2NRdT}1O)5Q| z1w8mV;1VW#AxbD|sB&?O%b`H{VJp8X^d zPYl3lQ9nnHjr1)pn&1E9-niw0j*dP<+eYTZ~(wW>ynw!SGGb3>Jrr zzSAI(jINI>qcl2>tsD{RMPHyLNGfYeSe7_5g};V!o7Qa5F32Wn5!!SzUiE+m;!ix< z!F~ip<@=dZ%cFb(8C$-A7m_j-9D~2O_FRPRR!AoC-QY!zHKa}if^=sD)QKeYA!!bC zltVw}-a1EWFoYX~+Zl-wO6>Uh1jE0{ssx#7flvdLYM`i|mEBXzO!NdlFtS`I{;QT3 z;?+KI!6r4Y4VL2H3*KWP>uMVbR5W&)qAh&H%ez(AsO8`D35Z=d>L9djbwXumj#tv+ zd*e7R*$a6v?Jhvk7cdpaXA_exy)~DxB5mXfDwl{-BaR5>i6Qt(@X6P^xf#@a`!$}o zIdGyHKIowhi2tKmKzh=wvObw90pQIbS(80(MgJ*sIKEe-Cd z%OS5RI0dW6yCSi>ehU3}8Ft@lhY9{q&z;C!zi}U``k&Hp8wnXhsYv%UzH^^*uXj6< zn(NOXXy0CaReUdjmC2u&{T=5jp#F2&rj2K3DH-45+KFPIE(2ZzX}J{GuN-MjQg^Tn~fTT zWuP0zID9Aa^El;S`(-JsLzDvF0{M*Acvq>0G~rlxB{1#jvLkJ1FVeBEe$qfD*Mp*T zau&gYnr3B1^zVS`?{}r#az?H+yaUOgW2?p&wz=C!BdjeWv&=NOg!EYj7)kpd{2g)D zl^5kG8E6~)g_5%?__tbODPd=5IzVHR5rZI%qbcDzTB&eFlw3{9KdYjYJzYd1V_PlS zO#jZKFoU5(jn4a(%mIUN_R_x(hW0|ba%IOclUjG-|xHkf4GOA z3d78qInUY8+H0@9wjl~~63B@7h%a8eK>jQ#s`TQ;Ynm4?Ue&*O1s+)m!&(6UymU~K z`1qo9h;Rq|0Ang5EArw+MI_R_J}med!B$e;;l&G-_UAt@yKR0Oy?F7I_gPfri>uE5 z1AO%tl__p_{;sBF@O9*}d6wIKAw-CeoA1`ZMI!$b2~#Tz1d+P z|DVIahOE5|twan7hse*~Sc-h*XYljUL)Q2+sg6|VgnlvpEV&r|flzJQ4;BgKgd~Xo z{XYjQ_e1)~{msrWWTo$sM(1R15=-b>ezS^lq=a$rzb6TfV#FEB;J2H*xBi4(yHoYs z?n>;Uf%y+knd`ysDor?)WtCkQRforVw=n=|tb<`s*^P%%`Y*W@DK71uiR}?t@L+`E z*PMNrEaO_uWQwp~DpcT8uTK9^sMdR2NUqvK#^Z0Q;%(#Cm|b+frnnoY?UbvHnvCMemFOMX-FmYjiMnfeo-T>h^S0ij=W>Cyn)P<*A`IL$+Sdc=u@OH7z0-6b&Zy)$ zw3YHY+xiAKg=Z}v4P`e~%{l4}+TB2K$dyVE46V^L1`LDGnJLvD(72t)B@KOg@3YBR z%&=#Iw(Mj@;tMyJA?)*Td!cz2HIVr&GD?z?%WAF~#L!<}wPo6OG;&`IFl%O=8(#Nq zZ?hMqc83#iGiy}S9uwyn6`VT^r1RHhW`6jwGhR@p1+ni>VB!np-9*d189=E`?QwF9 zjlXtC;zX)?!EZGA952_L-<@PrxVD-uLo=*v*1_WavShpZlMt$FU6=13gv`lj<(_kv zKfQ)kMx<+ox>Nl}yc^kbb7xBW*EhCAoRd74W-S4ezBD&HIg%*vX-)j^CQSf3Q)8^>uWXC*C#9e;cB(i z$lIb?k3f4_-#rsexbeJ=K0IbKh>MEe($UnLyt}-h zU6IA`i%*~DQge+%8dY!hge1(_EJ8WwA#c&owOYId zSPe}ElJs?E@l5{N-Cv);!onuambKNLiufA$Csc^*X{%#VfNk7|2oMWj$Xo7W7)R9# zQm>T58?VV|b-dW62%D<>IjG$-caG_wW;(x%^;mAmU6aS}h-=lryiN9ZTb7UY(_MW` zi7MtC4O0D`Wi{Fy-zL&-98BR%`9%xotp-x41c%btO*a=Hv;9pN8x29~?4~<;M~zlE zO`Ew$DhDWSMjz&eh8Jdcl|JDR8n5?67kw>hgX20vQPWCX@W`>;xy)>ZI_-&v;a1ph z^rc6}sCQS-*v2w35w+3gh=(KUvYD7B`F2+rb_bT>xTx;yzzbH$yN{WoCNMrD6pq1R zS{s?+mcX>T-6VD>1817bpPeyhVQZbLp{#1x@8^U%WAN*^Dz$vCBh{u4>Xsj;TOOU( zy29s-82VtSE<$M8-`^*cXinM8Oc-};c55;g&DdfSKgkq{Ek`DS8=!An`w7tnr^+O+ zj7}M`JA#3bwbFKbqz#<{u{(?@O@LQZQ)(bhoyWmhzjdO`Yz>hHl_8BI*LDmwKv@D? zE<-_$C&$)Aqt&uMom{3Jxz=AtW{~v0pGRFlRa5GlfY7S&FLpj^rVUa2NUhFhgAkSvA`L5WX^J!KWy!rU5Qf&THZRc=w$vp7{9CFn# zIy~Rz5Hlf%`z5>j6zAC}wKRX^4CCWZgPRJik@;$~Sl1f8RzI*khBAb8|8^Hi1@af~ ztpt$>?G;y552MB#zff<_oDB-D6gy7nm>Lx9vi2^Xt^7$c+yVV%4XM8x;n+i*8FbN( zshhZNk7O6Nd|&i2Pd!nG_blzqMB8(=7`}h7_-tk1@iiinNv^K@0e%&t=}-!<@%jJ> z{=og^qq=SyN72TSY0d3gaRkoL{zb=tqV5o5QjE0%V$u&wLGSx(5}*4Do8{(ZlaT`X z46;vwVMP4cSADe%oTtl9#sg~f{^K&;5k$J4C!N-d(1V4Y&&*VNujnuKrfnAL?dBKf z`9*N4%1htZcMX5bJ{c5@%qx3t9*>HR)S$n-8wROBU}%6mhNm3m_K7O!u11@ET4 zy{_|#C9H1`dj@=?wVK~PSIoonj8~}4CkuN+5?gImRp`OMScXL z5b+7T=KcYX`gPl(FOF_Dzu{x>;;Bdksy>#dOX3^&%(CX&-CrJuZikR9@krv5sGYib z!S`4ValdN2Bg7E~7kH%gwE-pQ3mKd^dIgQO#B|VqdB)bTFTf7*=b)OM;unviP@5=H zJ!-x?yt_Xemc`C-Kd6}&O|xmf5x33KpDa{i_*&dEM@%D|axMzj#Y9g(cero==G5nQ zhi2*xCa>;ruosMT7cZeSpUdF_)XAa%)4GgOvuRk*&UEDLEzhTJCPqWw|#!3(=k#r{mUgzV?9ssByf; zVtRynnsoKM|3*4{1L+`CBkzgLyfd(h*s5`TFIsI{xcv)TvR197dJqax2cM?+PxNiq z=-ApAY$lC?RBrkDe&?A+b;^zbIpGIK5!cm@kk{}iagoRDhoW;4mF+A+*ZWCUrU-L+ zGT7)IL?I=q9^uPctnEFxhO;JJV*81mr%zY`=^I1)xs~IZFQ?m2AS_R)ux#>=LGCOA1yVZv)p;sT`J)k zH#Ano6(haf%DlW@i`2Dkg#~vsU)##BZpnSG6Gs>9O2bw$;-=F+29}0>HhgzNHlrRa zyz-Xr;y9uo_W%>=aVl8!StMVVXwICfj0Ny zk{9(RVBYE-B84~Bz^@C3sY#>HiP5R{c3;C@iCia}{<^u{D7UVfg z)b+;GF^2uUVcAXS5SGcr8lW8hI}{Zm36enO_2P!u;md%bx7!De5UUMH%<-GUc!kdx z)m3j-gj9(Y6aG$*7c-n88^&YfO>ue-rK!&fdP_QY9}&Lt-wPr!X*oXa3uU2$-sG=0 zUFEYB_d88%ub^LPIE;!_6$vSil=;+3e;!CvdGEA8@Uo2Mc9%uWD?$=kDDT_I@=v(5 z+hL2Ioj)Qp*4vleH$=nqgrlW;UDbYVK3%JXznOUqR9F9y4h>VwB>ju_`9To*T{uf5 zo4sI~YTm7TMErdCgv>*4>)#YuZ3p+}gW7pfA46D);jc$8D7UIgEq72dU;2WCaxh*H z8Jpl~)}f8^k}q3gMO(E3;!*vC_kP~7;0?a_-9a7LUtPc7HtDwqg1k6cq-rye#2WD( z*Bp>r0#5VwFsdn@GtPd!$NQUNbpL&rb#V6LpXhgRjA5o~%^m=E0CId{i9+RFD=aFt zH%i2Kg>*t!bIcb-DX{5+sv<-cqmZY?-cyoUID-CBMUJ!->}XZW$o6l#fS`a4uAE4! zAe|xdCXVqXo0}8BzN7lJ2<|1@yiH3&G-l;#+HOSFR^CncX)@!W3>T@EZN9L72ahK98cUhEjYX~e1N%=V&03j8 zmC~=G+ST8p={M#W&haR1t5k}<(jgQYX#1HTS9gZuz$5G=i|%{8cQokFKkBk6oN%1Y zAu(1{4W()d9Qwu1(3EK#oVUn1)?!babkbWOZQW#ewvkA4)J*g66KNK@H)J)v*xPU< zx8!g%#Zao|e8vQeOpxbc9IR-EIrNLGu)pze+IsswHCu#s+Dz<0o^IF0Tya^slG|+c zqE0j;=c~)D!-`9!dpa zrvD|(6TcNN3r#44F8PB72_H+7JYvMqB3~&y8YVT!UqQOHKe9&${5q%0H|@}o=sEn> zJ;=ShP-``R+(KL@Yd%$cGodWcE9}qZxqo-mBJnkDM#PsmV6q~f@Kz;D_A8UEyG78S znMi%~m*K=bwwYbGF{EU(q`E#2H75Q%Z}cTaCLD$ZCGcK-{&DQBkxJTqIK>)eA1Nfl zm$kxB)~Hmf#p|9T1`5Km##5;rf0=hFu#(bTJLB@g4**LV5;Hiy%~jJ)U2Nw>DhK`NHKY4F(#(m%8+qUtuh-w6WceBmEy!$}gfMgQ2<;%0%LapZ99?N)Z>EC6 zd$=i};XY|cr?)KtN%;ETYl%Sxq!sOH-N#cL=E03)rU{ASvk-bSQWsnLC6u%vRY`dK zH*>8jxh2PYMl#YK@J@HqWKUm0rL)upqQ-ZvF?B@QR6qvrxcYL!+*VUSjG!J)amlLY zzPA~^96tZ0qIXO}n7(+yb48g6+vjSHQ3yNj0L{AE0uwVgb=uS721^xd(bM7d*V}IB zyV<_RZF`8S{netmsRar;yZU-pca!n{gVHWSywZ(@xTlCxy*kcc)z5y~ZMh!y_dX)})xH zymm~USqTS?hDmw9rSg&g${s`&lhwf^i)zO0EqNSmEI0=+)txbC`bNm{I!CPaFiR*B zKV3o9B$n7HIKtQX9;q=-H%do#^y}ShS%Ngp09^!I@I8Box9R1F$&f+v8rY z1CEP$+r8f?ktVG^1{7W!3ZZSk7cau@_)wc#1*K+4BOq(Q+1`_qOFAn5s+Gz*y(*FPkd z#^c?hGNGIGSXC{%&QzP`-YXrCgBpz*^BSAwrL~%A9gmAi)nyQ_0Ftej8gHtGg``ms zI9|33K3=b_F!ZDmG*mnw+kxEg^LVr6OtLFZ!VwVzG104>XouSN0j33e`>lB<#%yCW;ep5mt8N)ymw25VhNeb|Fnv*PMYe(~yNlc2?wRAM zO%EW3<7$2 zSO+=U?Gv@pNOsSwMHhjN4?GEjzZ31Xt4CEmDsVP-CyNr9sG(#2b5fSQpj3xT|!+zJ#9T#o9sYy>oJ?)oyUelb~14ZZ8KOKhUTQ;QL z6~Enpu0`x`=palv9W@m(*W2EvU&&;!iIrJi3COUdaUb06hR!{jj(&gl6YiJN1j)w7 zT7^>OpUp1mXxi$%^m!=Xp_IF|@?djL=!r@C3?7q6H_$DD-4O zGMRyr7EmANWM|>=+Gd8?&$z*HhujGvg}k!M*WOrjAM1} zi4fs0gNX4PHl2pF0v-l<7Hh;vsw***T_@*_FaBt^RM0XIe`)~OSA@zeg5x!{c zU#_bm1U8N6ZiPyDh*#skC={uEs+8x|VY_2E+bMbjKQYKEhaii&tsjBRdVku_A`8FQ zhF+mG`hq1llE`##wA}mQRx5o|!ytn?z!Eau<;j^De`sPPN&qu%K;@pI0X8Cu_q9IZ zm-W1?`iD}B-^VGkwjd&@(qxMi>^g;+XE^tu$Jsk|%bZqyMopEAXYWgF5385T zn61xr#a_!X;=7usIO%KnI^~5Vrv8P>wL?v6t{axQ)+FOCQr+^AB%#jpuo)aZBLWz!k4T60Ybcm_C2o5qb)x3dbPQjL)fC&l zO_!!KbqxxEwAI*(_nN3Rs@O@AI0i;XsZ2+ZRhzv@$NOgE*kDr0`+6k^-%wj%q}Ts1 z2wDw@)i=P)R_W)ai`Cy*u_e%JAy#c^gYqN$ttt@u1uEK5D`pXlbTAb^kUQ?Lm~k(A zR;3k;*pWQ6(e?In4RRdL)f9Q%&KO4OOZo-E1!wA*lwjYniV(q@KK52I$8|%aAE^*Uc7Axk62Owg-T_={OT3!el%ls6C0>c*Fn}SqoauvM* zh+%O*W3lACoYO0F&g zS*fp{eiSf3QOUff#NWUiGg&E43@JXEsf_BN0))y)F!nVG+_+&(T7 z1H+LST&2tBc=I{~4}_kf1wVCtZD9SdqK2WOf=hqY>DDxM)NwLgkD9L9xZfDK%)Fh2 zrhlvw)YGnwy<|)KCZzZG1x@N$IdhJl_AF#0>%16=qiTifqv8)W&5ye=wV%b?2y6MA z_i4pgCCQ_cgngQg-db;`VO1ES(f&@x@v7_-+b76%u?uwi{NgZO{5aBO$*lmW@XxgZ z$fjn~YRb7UDco*%3IH#Upb|L#``TAOhcOt|Ih!R2bzjPTB*0MMb~^`uUTB@6yUU2K zx$pI81IW6_2WT;lUp~6(X^UnF)h*Z~VZ8HWO!z^z!>})9$g6{q|KgAegE^?V@$q&K z^aHw9qR1LY%wR(90VzCH$Eh&N*6MjDyB&#f)8S89@VA$;r*7GMej9)9<4s>YgU{ux zDKTAOd^4!D{Sa1z9r>&SRNdLgH;tyuPq+qY^_*38y*LZ|l3JxOxm>h2htlVNE9NvD zLZ#WM+obIH`CtSoyu~oFVWw)(_S_p!2yZH7TZ|bJm^A!eGU+gOoTx;YSJijB`WMR# z8n8}fP52pTqu|bFCg^L|PMQ^@2R=w5gOIy?Rkju$Tv(A;r~8-r?>dZ3cun+o%ip#d zT}^*!N#C52+xHZ-UoHET*)RtN*}t~?5+i1og=L9tc;HeT8nD45zI61L{VS91g!f1# zVmP+&lB;u|6H^D&1l!V3d&*-vNk}jqRoJ|KKQI+TRX6>{0v)0|Zgbaocj&mnInCJe z*oAlGMVc?uZ(FlUo5bm~ZHffdD$kog3WYO%^Yt3tE5*jxS^(uybM&ga_~~{yVDab| zpWSse-j0pnPhY;YUUZS#u8Q~XGdeTTIR5z&M#G!(AK`Y`? z)A6dwv2I!Z? z#BX1wED9d~FRfSQ%uFGOMz4zANK=3Q?Y$Wc(?ZZat@17YIOwP_NzwKYMb;j!mal?c3|!xkkMGQs zYBzw65NMAsWpY|fbwK~>x965ZcMAd8T*>)D<;&(taBi=~N*DMMrk$m0B7vGiY+u<( zO;rR)`@bxqnQaoV8wAWde0)Sh?JNxoAtsWwHJeOr%_B6perJ$&VZQ($qyk7ef50N*Ov- z8awh|PlzI5m|!2q$2PW9F~8|MDwt_>Gb}sV(H&1L)BT%M$e}s07SxsuyYpm$LWt4U z%KY9+BPHDB$wVjM=N@x2IQM-5y^wkMQO}Hk0p$OX))m2=K)9lZc z7we+N{E*>;gY@r41e03066C!@?_ZBsCoh8E``(j@zv1rK&10Egz2LADGSqP}VW7-_%hkge$fTZ;*{O`|lynwIRu1C*>aPH@KrKf=F{CfvvH_;y3 zS4DK@3@)|ekb3t_kz4ceS}V<(uOuvgzWl)u@^5hMNH}b|(xL0?Gx+!{_t}jX7iN-1 z33$r!k%?kObT<4JDMsga+_rtVnDznL7a%B&O8gdoVE3`?Du|~bBseO&Oaklr6~NDE zl7G$lck$t)-;6&_s_Ie+9~XvERVom?Q7A10In9x)<~W#MrBq9ufUm!S95q>uqH-o% z4CyLmCE^=N8%@b-8FWnrvkJY9U+imkyk5ZNPVi`D64}o|=2caZl`y)8z~SF>p85$+ zoEi&m*Ta5^J=6;!e+lQ!PtE0+sa5r1E8mG+WFbD$WfTK!%nJuSW zZ`PlnGO9l3An$`o<+7H1N@?zmK}1IUWm%gkbr!IULif+GbrvOh*E#%;^7wS_=W!wP z`s2XVIxR1iO@_{a7NY^39Tvhm9go3Pi_%n$t#-P#uD*;NW-3-J-&CQCZh2EDsH<|F zF!dctBEF;4t?9*%4Hi515BbmDJ{^Ta5`)|BR}&{c#t#ZC<>fT~{ApB=+lu>G>#<}) z^P%VV+e=mK#6|yE6OTjOxfx#f_(!HV!ORm)n}&B zKOz1ZH>P{eh%vA043Rx}_}kygD5Kaa<4=i2Am4+kQ`>pg7$fTjbYpn((mfzJ1)C>;IRHY2hM%hO!=kJSdoO0Ix>t_$ zHAXc@8Xakp_)YeQPOu64X>k>e*MsR47;aOE$ZOit>`9R zTRMy%>5F4&zFvhV@hq23<;qgH0|hQ}0NX>pY-(lFjrU0>4!)sYc55hj66j9SM|L)k-a?L;FTcZY*#)GKzUU2t0ov(up1oJTAT@LEzu}Wd zTiwSO)e76d0JSX&jUB~Db2^L!2Gv6#Qz5gQTKyyzbkCH0OeL)7bWoFh|DZNj4UdcT3(K$RbA*$ zASQw2knsIuF{6DamTI;6B;sBQr$s_YKe2v?Vv*3gK;S`(LJx1^; zC=G6(6&4_lXz~mo^sgBDMw7Dkj57hMwh^yNK8}l^VIr?DEVoq{1*hT~ujBchVu!Zu zA70^i51t1@f`j?G?uv5ew-k+JuentUzqImdfP_AI&db za{H&E_13hQ|HD*jp1;0hSUQ$XobmrdsU#?T9NmT<3qbQ2CoP?)!`&?tzH zoBkc)$@$n(7KVp6rGm9*4$XWub#am%(avqTK>EhC9rI1R9~Kvd^>8Y;4QQPSbuz0c z{at`KL|+vAaz}hOCPTUY#WdY1K||Z$uBpwY&5u^06lV66u8SV0I=%sQW2kQK?#u75 z|1NM>eZ)UNjjxLYMf@;oe6s`K&?xx| z%#^|EZ!_WQUz1gB_sjs6uezzMo*a5jpCG>1a52HEb^Jo`q_zC6O>VexzRVae3^WObHa@i6R8hXx zNoU@lXh%_)&1!GMU6=)e-b+O|8G}x}#Ll=ZotRl*zZ5$k27}u6&=9-n5T>r>&IixV z%nu*XMK4(f_dkHT`gqa6U3?$uy}fJJJm~x;FllmGFI)rFrK8=x%)fQ1RqR=!0|K;x z*o{pnlNabJz7HH0x(h>{F~~|wRd>lgC!a-6YyT(S_xT?&@8waT^j`m;`a1cb3t%Ps zCXPR4JRIW#dSUQOukkvcLKF<(0g4V{rf`_~v8A;2L{ljGV0PC-bm}9{lE}8-C3(@J z9{@$ffMOp7}A12qUewG3ortEwGc$a_`A zMUP=LDMMuomMh#pO!Pom=^W%_eBHkeJWw(z9C|Bh+y(Ez%zTH?yXfKdq`a4i5>jGO5 z)(|?~maO%v&G>qVb>6@w69>W9>Ez$o>y;#c5hE<2u12>CIvAAvp*?sFgaJ{oNZ36x zuAgUAXMZY@awC3C0eF+tQIe@-F&MWYfdd1EHZiRH4{VM68QTdyRvumo@ zz;kC4eTXdSr8mXi88f%gK~78!+ETY=9sM-Y0*qpx*DkDYcfDdBGJ;63gu(_Z#|Q(* z8bXcvr2BSO(651emRig}=9@QEBC+qkDu{=8^q9dy$T;3aW(fqv)QCh3-^aXHphXCP z(lT=CZgdtdzCsWxDrF|YNi@WTJ2m_@?nQ5ZB1?CWGcO_;KFq$B$>(hYOb3Kw z20$?c;HGLC*sfrcELPeAidhj-mmjD?uc`Eoedtmtm=ES^JOHn3AFgWKtFT-|IWFT0 zAo7io3q;1}_&^I9ete$Sww8>VI42f{x7DB3R40LO2Pjw{x7LJp4^*XSI=Eq$M+MQ} z7HZUsA=3|;&}cbsL+T4y9U)!S`@ol1sy=Qu10~!8!pkE!=;hJz%#$fCS{t6O6X`Sr zVJtc%7A}e;$$T~{l1A2kwTI|~%&?y=_^JFcqTF#uNx;xWViqzG^Il3%yHjSxZl+w{ zgr3hR^$-!yMT+8y*!iYjy8IbsU+>NR_`jDW-+%9eD*SLh-kdDlfge>e|59pvQ}<;Y zAz1P{>qT%=i_nvwXdb+?E=ByzlxZ$W_%0v`XT&yOBR=>^5HMNJnI4?GnN6ukVTQW$ z=3gM4Np^S#Ap=yv4ZHq7A0V>kE%>Wwe(KjJ>3XI=y?QF?; zz6)+|zHkV<-+^h4_X@to`8z@P4jv^#BWJLf27j34NpS_(D4XW2jT>4mriwvqCSvf?-tU0@+@^dE%x$zRXtImE}Eh z@s)-)TccS9((nPWGfDBpPayIVtVlUYiq6(4FB=-rGcQ1BKst6`q<(2 z74q!qW9x|PedmMAnWt0GMlZYd)tralll4p0_?+{PY1z~U>q+`ndSE#1tZ~1XYrEN- zLsh?$OLU4)Wujl!gVS}d>|M|}Fh#}{3W$U?4LyR^{y16dM#blNgZ1Vp`~8n5SWNid z4=!+TarNR_lb^w3U%jL^^smzjd%-`-4$N)_8Es}B3)cvO zaPn@=ooU?!!%WMW$I++-!lOoyMY_e73m%K6Kc>Ad)}ScDr4}S*u2x5@1On@!t$QgK z>Q@>KD)L;~$2~#pebX$i#U~3}8Ur`bAI*yAcW@Pn1j=w@;j9sNlzDDWeEN-Z3=&xcBM%3#Vv^LC6G`pw>qv z;)^rL^7y=tw9JI-MdLLIH`o1YZeMcvKg;=HbDHX1iZfI3oTW7+ax=b2_+bUA+&{_U z`Fm;LPB_iWXOZ`6GMxyxmakLV<%w@?u`_yIhr&)t2E8hK@5Qx&=T2IgS)Kbp{~a|U z#^XE1x43`n?bhH>iSGdyb7JweZioaT!|qI#>F@_Oh0>UuZ?RTQsc-1>IQuhaX!$<| zZsoSf0qS)Gw6G$><|u=nuqv9K%VlEVAmOAu+v@loJxTX$ES&z1ONoMv&kC^)YAYPv z%3F4wWO2=$TEAP$upMq#1J>s;Enw;ew?`#)(Br6I{dJ)1rsfSE^B^?0DcIo6RIkuJ z6{*?^HI0DFYsg$vfaePTN3*$oi+hG`G+<>WL*speO33wRb{dwYI!zhUO9(lu=yD*o z;NS*U@X1b1{9&)kle8_(0kes`%;gcfSn3FdgnuZ}`xMUp#nH8_KXfBVnHanXKI+$Y zvWQ2)sqZv=taXA@M>qD{kII|+Pr&FJwp}|)5^{Sl)V-#e+*43H7@w8r%ut5xEcD54 z0rz?Xbn~kf*H+C`)owM*{*>^8&tUWxwalAe7xIJ{Y`UWVIbi0fs|exmVu zTFYJfq!kOi!P?rf%}-?ZP%tYoog!_rrPN2 zWUNJ1FB`(G^(30&l=qaZ{@;^#2$S)4G3al)GT7{D!>VX3$;Fh0Y1 zm@wYn<>oK;$lb}`Gq-~5HZiHT_}V%znO0xM=FTG^RYE-^G7fQHc;UA zsz(igM-Vr))f;vPRx^D+V6AujVLSx9&%nDrtA>VNp-TpC>jNt7v|p#Nm#~RS=O)3C zW%-RSwI+QnpIT|RhSi_A8^&b=ht4U@EoK&}ycl?1r9Ts(o(Julf6c#t(_#|8eLuU= zp9sA8F|d_l@U#P%fXnlET<)_Pj&+9xAmNy_i->l32Rtv7aIsc}rNPQ6H-AY>Q|o3> zij~`b>|kWgQd&Mm1~7d>F%wN7MQW2}?t-=KURn%1Qw_WkcNEPtK7o5G5Y ziQF2_U|}`QK*i6k`xNLzB=CL%WL`NS4EM%RCA)&F68`U16{#{4@VRw9gmW!k*kx-~ z83kZ#_SMWNwaT8AV5QJVIm9nJV=+8Am8I`i)qD&c+#z6h8aL=~myL1Yln!E-+9`;=m!qRS)l1w4#UHPI)ejTq}^H<6PQgPKqn`^Bmw)V;z@t7&-kIM zv~m4_>54;2Xo2HKA(jc1tMwxWDnwq``l+v4Mrel8&8B^Qk%Z>xmiEC-H^&hHt|~U- z?lyboM|kWNm(bR&=?1=g&7wX(Ry(4US?aN zN|84ZcCM)mJ064oyTa-<#aG+$TVLnxr@MRM%YTc9+~Hd{*F`f7YS((`tCltpP#@j% zDArh=4l?&%L1~IyWP~n1uSP^-toy^=ggZobmJ+EPAu4^tKE3)3TdO76{wcBT!cCSVP$Nx&&syNdXY~B1T-$I zLC090bd8;^g2Hoed87z8rgt5L&pA`COm|}F0$jX;VZbO-cYU|gj;oR`Tj~Gixr?rE5 z8aNcfde56vpVlKQCbUHmqG(T1Aoha(vobJKPD2)&HboiKN<8D*BsNWZYa9skqXB&j zkBU&ci--{7wNMjgI*t0uZ>#s&5fm|;e0jR0i&LbF)YCj#ki(nlh(hPFA|n;=-UH;A zD-M}j!tbn@PWaLF`OYb>8ycJ1X3j|s)>cvVMT*&(6UEQu92jiP&faQNe;WldTLv(G zloW!C{|W?K{MZ2?(ft6^06bpljM1Mz3mpSjK7G8>E<1bvdZEsIvM(-?QT?4STn_q-Bf#O9r zg=4nS%>h_abv+I^LzSd1A)3WVO%~Io+G<|PkL$7WU;@dI(?zsU=x)CXXwJSRmr006 z{7L=575of8BwHbc;E^8#E68JXa zlp_Q$XV`~$){3i!Zs(UDorie0zWi1Yk+TABW#HVQX(`o$R01as@Qh^$8V{4dSLz$TWxJH49g#dQ z^?x@p2-VyEUJD_~cVz^7`?t{DhxN4*3`3K=*xCA7u}MD4!{Q9r!!yyR&pR=^{bN*f zTDlBwpAI_0Yu?pO$S$bStUTV%NwKM3vf4Q;cE~!hU)5B$u_I&P-&d*T)6d&!mT3x6 zQu6!n<@4?ME@-7DixoYFl!Q!d31e!XVw0)&@I=F1}!6F z<9=m7vDf)1DSUNei9-`9#hR%RxvHO2mI&|`+X-7Q)Pp8%%k^q#C;ky(Lnlg z_c4TQ$m2aiiQ7n2(#{B>lV!Rs&zK?cA4Gq-cWXUSsH`KUbK`vq)#$ZwangPeIgP1{ zwQ-iiq*7*>&NFwE(z=ve9dp4*Y)bt-Lk@9`57wP1mtSqGi>X)4S?U#0jxjW)ftQh+ zx}^?zuYI9Yd0G%s`y*BtS=O8FJ+Hlqy_!hnVCFi-AcksV;?&CS)w?4n`OB0jLT-Lu zBaO<9@9Rt?`9;L$G2b{zM-45Z)4$bwhl3~&A8GA0n?&1}dLNU?nu%gPYrInYwUrrW zi)~VzYKXKPy$4~q)GZO2txieGJXuQS&y}i5k6NCd7wQNg^Q9XBWuxzFcyAE8NkN2{ z;NdN`#72HFZ31?XAV8=jk*mW+R*Vg>mc6hzS|gRl{bAoZVz2kBhM8OLPeJ^;#TA|u zfQ9{9_~j44c(u5XIi8@o1-4^4yQy5hGUB4yNMG`Kw1JoAibuyCU03;-SKthICC4Gpw` zKWiQIIr8oFw2M{y)GcZ?i}!4N?lfbmWoPK)22wcp!q|sgK}uypIlN;$gG%_C`sTx0$AuF{c#C|ghHkaD z^5`zI7|Kyq0(R4x(`j2B#*w2mvsyH@sSr+?+_I%CCg*-S&sF%k3P~>AbmN8?K^F>4U4kTU57W{;TG}@0Bn~!nC7HtdU z9eb;F@4|0$TaGOSe+Nr-p1Z8ruJpxg-A6!Z@|oY7eVhIZ&7FxUMly8=-E-hVS$g>z z4orFBZ}=Ub6$9(o%a!`eIg5%?(7L+aOtldYi|g-5)Uy8^Pp<;NWOuXxj*?W3(i12y z)7maXm*4*`0z1{|Vc!5roIB|FKSwSAB1q6^j)bo3N`Ot%MS{m$#&Tw}`R!+G&oKXy zz@nnBR|nJ@vXKxYEYki_W<4)a=c92sl|v%{7@L-dOa8-pLtwCv^906uX6QC~mBL3i zqmL|c8^3cR+CDC@XjH#}y}9yva%t>X13FZAr{hGCO3{=o_oBZaa92gE*rgxO*Rz>u zU&nGHQY8?3c>nW-FYkR$H}XEWu~f|f)^*%AuwrWnyGeW+L)bfw6SV`q0(IVuTh%S* zCl-RXFx% zTT3t+f9zG|qin%T)vEjRt*tQ|X-TT_#A!5U^3O%8@<9-d?ls%&VK-&qxuM8u%3R3& zF3l#3yifa>ljCV#Sxg4X=TbFQ4i|Own@A28daZ2gNgwk{_kwl7aEwTw7)t$r6WRFb z7%KCW%|tXd)E;3>d{2X-KXlB7M(jU~F6&5-KxPS^zSz^c(1{IEewuN#educ4H4_q(FawaYyL<)J`2HUt#mTKQskIPw%Wct#EWhlnLzNe9P1RT771hJb@X8Hd2;zpov8n;7%=eh}K{)S9n3pMMk z!K?rezNlbhcN1*et9G1-dlV7Oqq1D(A{O2i)=&2XCX6aQ{pI3)jy3@&@7DPlPRZhx|G}T>~-!L>+yf z$>ip;(c^DH^9XX9z2RV>r7b6Gf1+m~Hz3i!_eVHG>h>PB*woFCN;?zBIN>`QOxK?2 zo#h0>kkZa1v2wlgHL@++d>b3<{EHY!Uoi(YzxuP6EGe9SofaJ&+TnP=RdC*40G~pQ ze<91Po4Qb+w_S*e!O4eHqLG2G5!KxNv$P~OsUr8=p}g3JCN;5T40eO3mEwa=uSaU` z^3OrFH1C#+j)IV&6s$q@Ut0Cq+f%n8RfROa?UqtQip=w#zIL|DzKg7rtHw{FcFQrz zQ&(O56~YwqCG=5@rYSAc;SsaeBmKes)Q|g}GInmPg4y>$LZAB+2_h#<@(uByok1fk zDj*ScLqX!AOzut5vySYl#Np=q%t{i7)rsEQbWn20*+1 z7`UCge(SjJP@#N3@vl?HC6mKDd|l0Z(($g{-Y~6rw86#Z3RDv!1#SHTdJfI{O0K&A z+&#u+x#@~k%a$Npzf$i|@IUI!jj{#6C2%=o_)QcfMEWnk(Y$9w{X9MUndu%vd7TW$Wr&*q)sH{OE?(Dbb3_1QTav*$Km!BS8#@~hm>p*$& zw`_#fO#HRgYGj+wC&WT}@q?im<-I_%E=fbKs0NUj3;RG=z2Oh?en>_APZI(9Z3XvY z;7&N@MO8aTdk3Tx*bbODxC%Rs@-kR)er9Q}OH2=6CxnK}NMy9@g#WT8$I*qM9|;c| zy&eCDy|;YGa*MXUw}L2L(jeW9NOwrLv~(j~qLg$=3P^W%BS@Dt2uKMENJ>d6O1$$v z=lluJ$JdX#VZ(i0YpprQ{Ee}gIq4_8p9BUtd|YKK1%h!7s_sA$QrqL zb?~J>t)}R^54&ChM?lGo^)EHkc>ywJ^}f+(zr$YoCw(X}Tfcc4*`1TCTDpF8 zh{jFzHSSlXw`oR=rmsHJs^I_TQ?~g_5hPF^#WtrjApv<33-0+F2nSWCx`Due(s*_HJWQN zxzdkckJ(2m6j>Xs&7UF8jz3Xc_fc!04IR)UqO}l5bp3@)%iV?)Oop; zq3IA!$bNIt(nYNtXn1z?o$@`RIKm89GGm9b$>ZG68 z9;uk`AAB{DK%5Q#_eP}qgnLkTyq}8YwivX`X^})8t>cjSdGqh6B!CJzl?2}iDy%>E zUr@2yhU1VE#}N;yS8Bkp4cx2fBqtGHwW|yWm_M7sn*N{)CKoVDvph@x!TpImc&C)* z@m#2*VHs?PNZNR%q6Xv35=jtD*i*-Z;pR zl6~*bTLd6kr%knUXBnjl6W#KmRBy{W%X(v5t=I8{on{+?Y4LC*VdGw)cWt_Psigef zXTG?*XYj#=8jJW_o19G2ofMAr8Q1P`&QI~V{R}M=Z1JJ}&-2v)FdRO{Ac%e9_H(8hN2EyGFIEES3d{nS6Fj@t#KxlnPd zoEGX@4rHcJZRvcD=~~i)bJJCZEx#fH)V-y)3?DCV4m0NPQmp7JD8RtJ8eDyEA771h zLREyQhkHFHpOqVZ^wMLf-^)g>+ym29Ul`J!J*YRGrbcTojjThySw)}V=)ITE_WL&2 z#wO?8A6fHZJqo_~3heRN4Uf1?yMa9Fy)T8dtVBS#`DhzaAs>A_>MTmj`R$5L0mTu; zmQ`If#2Ufjh9fz-XxReakBt}x8fiUP^^!OAdb-~81mE3clSp_fUo0L`s!&{FtS5`` zxl{ZWp-Egi^t?JPE67pFI&mwPihlN|A^-G!Nf==M|)OyJ$f8EIUUvcSns`oBhn(Z0cf}9lGWo z&#v=WmW5RwC06 zLx{s2&LZ2}5!RZa8NK&D+HMyZSOdOR4L>Y&el8##Hs9dJ`(S5ErG z{$ce6yb%_Ce^Scf?L9!Bqc_WKMp-%hScK3_Q!QeLZ(nBpSwDi_kenY#vGU|5Wdrjf zMRoUV3rTifno$8Dxmc=)&51VQUq7_dH-}$96P^~2Q79A;oASB&$P@AQjo?) zDo9{mBOf_@i0{9xWX&IYMev$L%!CrVaLXV6fvw_~FjuB~!iWdAc# zr_A|Nq2SDN&UB7+Nr~|v8kM1&KbAj#m1u5vX4`)eR|#eqSHjFrFTYm#8I)eu$5L|W zocU9b)l~q)QVFTgV~LHWt1f)ViZYj>npQs z+FBqS*^9G%@p5^6)+LfGbW%2pI$6S^Vd`MN-p+gdlS|}@sav^h*DUvBF-x=jc~0i* zHpibWaRj>GWba13+IXyxbC@vHS59~P*TG(@?7OEzPW?x^@LbDip7^_8q2=bOAG-uD4EmbQB{xWH^1LT z{Y4<)^KeI*o&iq!91KV&E#%LO6qCVhr^y*O#)Jqp=qi7@A|GFpykY$00HFl_iiEPJ zY2o=BQm8T{Pq)UoOY)?{*D;~-8)cRVkg0;~km4{SYMV>vQ4o;=$G((lF^Zr~0Y57R zaR;(P>gF88>`G#1Q_>6Ca7aNfRQQ~H9v$7R4|>XQ@$@Fn|4AUz`(nQNO=qhB_9b~b zGV7ejXj)Hx7rTQg8EltnR=r~GCO4|tA|#OrDU-OL?Y}-O@gdrBIHsv)cD^ z>dx4CT)XbC{#%?%;C@Kxm8it#pKJQ()zG%nqRGW_p^pt(Tyhk`SwVexJUxW z?PFCPdiQsBgks4|YQJC8__@n`@u;EY8Nd1C-A1><`uHq|=fKE}jUvuph*i8o&o&b` zbx(UA4ez;iRG-G%>>rBP)kP&TMp=G>J`?2cq~Ok5 zCZWhXG0s1)8F?~2Y4C5lfrH6RF(^VnL>p$%WAcC3c~|7Pm^FI(hs322_6G)|+46KYzy+ zVfnG0e^pGIjM`PBZ;j3CIbtcQQ7@8twUg}Bs`9Lv&I6-E>QlS1q=A1;=3Pnu57U^< z$=m$jZqB`bVyhMFr!$l5&_Ai(zX=b#onBy{^X&ewYLR{Jyym~Od&3``CnmO)Zd5}u@07~+RBW;5b#nR!FskjZ zBWUfaw+_39RB6hJLh$mjvayZz2mjwp|2`)nXXe)z3;FKG%V*AUg*Y|0)u|o+?yJU& zf;xY<$GhIEb&-)}-CS$SSQ`DqoU1Vrhc&tK_xAQ-aML4xr)Ah%acKjai zPBca#`l?5%O6Pi>cKG&R;A~g2(zV>>Y=92@e4%ICcV49}K~*g^eEXVCrHdiy?~y0P z0$6tP%`VnVdqI1hyS`EjBwvu2XHd&t?h3d?#b@X*#MelHmw$bA;OdpT%|!O^1MKMP z(&me}IH&8|6_c}oZyA4YzrFw4g@u@|zyEYQX;gOWYGU90K|2ytDPWgU>Dy$T$Z5$1 zLv^N&*NguXCK0JWaA-PELHZplyp^uC7B^R|4clW`I$SUJ3kCZICm!)w&tc!6 zd1Bf4;^I#vVVH;pODUVS7bKzRcP5+a`tYvL^Gw;5LgM+IP_CH`n%)QfXj^|u9 zpL_MAu}5A&;M6HC4HkptOMe-eMZ{D2zd!#!!}0%=LRrX2&FKk>2qw@G-$TR2rT<^B zrQf&@y3S&-ra&-W9qxUS!M7y%PL(%rNgi*FrM)|kjEE3{M-OOB9TAlm0R%gya+v`f zM*Eofk?SwB{s>%h)3cq=Fgl1LVb7=gU!rCK9Z1=^g*pphmW5uOY(T9;c6mM{MNTC1h;moCNU<%@7ryU;+5Q+g^wH$mwEpEat|r@s}uV7@a{Yy zfoSOH4b1%OxpF*dnLJh_wPt=ssE84#1?tLyf8$F@?b_8Nbt*&c1GUlw~JaieU?6Hf(I+_WU{9 z6MWysh>nH^XdnN35qS_Hh!@cD`Wzm6!;0k~X@}46&Y$HKkRZZAXruJ{X4(k+A==e2W*W$yYnC zXD4?Rc5`wK?mQ1ri@&*kqVQ#w%kU!lFa%@i1S9^C4~!ShU!5Mm=1zN7u2nJt>i;wV z0it3KS1h@XUH;bshJ4=-u~I|T=E}9BKSiN>Z$sXTG=U+a2(QF_bW5QA>>1s2+I7gg zxuQcdR3Mk`s%O8z=c>0j0Dlb!pLO&F9~x!AbG1D#Abh(mY~;b z6)Q8RP2vP`7`2fDSe+Aa^UBQ3j3e|T>Vvq;AsvSb8h6NA1a`gy9=60tyPoF!fa@~9R2!2t2m^KO)Iv$=vD=7?Plgb2* zlaC8GAlTMCD@%Mb5*jr1U+<4crgAINf|fa_wFM^>clLfl6aA>R8jdUhq^n&R+AZFCasQQ@8p#6+S(q zp0dHs5BO^{M(x^BNu-4kW*FOgfe1M&G+-S1vlr>R_m3DQj@AvZV$2HI^!YmIZkwb1 zIzX&$coqRL;D9t%Ffr6e;xn2X!QkCoQu2=UW(#8=0>G+T__vbyZX|q(;>kjF*vEb^ z#(MXCl0Ab~H!J8bU(r?%_f~ShKC`96NS1u{UG4bJ}z92MA1r2uK3JMDUDN#0~2(-M)d3<2qdYDi6y1lX!x}3NVCd z)|n4LF>$+SlXLL7AY7SQ^v%O_2uRZ{RbT75PYJ`z*EwQ-gK*>F94^_piyr9=$0r`lzjn-JVo z3R@_w?WFrpEF<8lX-d~XQ}UKl{G0vHb>8pbI|qlFFBTY>o8jomRlmCowan}9e!tU9 zAy^AO&j5J4-O88AnRkyN)%3_DfsERpU*>KO8;^wp4u#^?eW&* zNfGHA=!Cyl8S>{#y?Wz=-wF@sux*cn9RPRb1NbnFqIl#mhs^Mcxrn+&+`b>$bu;M1 zXs-bq-NIYU{C?E3coBF3n1`xzvN-a`&iKOa4kq!rV$C8&P;4_dyqvB-MaczqiACqO2r)sngHrg4-k=R8sM`6CUjmCau`$F;{ld z5hqlS*@ckG^PQ%}BeNlJJw+;OsVx1z5gD?6g^3>94t~aY8 z{^H_2SLhhYCP*5e2ZQWQ?Z6(vx@Vr@L-(n`anB$6;$rDyc`E@i5@URWhxx>Tk88nN z3NOj2?Yb1xnh2U-qgVL_0ug3Hy`fTv<>ZBPc2B+aGR4pdcb&pLltog8VW@eCD#x>K z_-uE^HTD-pKSY(>{_eWHhN->|fo4RK`-UWS~3W(Va1-gfWHiqm=GToxO8RLiF zYgY0G^V>$gV!|yv3Ex7i{|xWDVyrd)ipLB@hS~_A5^&z}JqDib;lNNUxLfZD+i80h z=5hJKIl9h`wFik2RZ|Q}O3w9Jr){akohR?;3Jo=mg3vj*+KO&L!Hk752W$0*ASBy3 zQhR4jo(@ZeJ4i5K*DiLRf}%j-79veFu~6C|_Z->wQeie_w24-C~ScZF~m2zSB4nxoOtn}vP|-ssXZOBM&!ljNOFU3IbCz6B~>Of`CoYb zEZKTkZ2SJaeY>7YBzQ=mDZoY(z4oD)Hl|E7{|a&3asCK9pu*0A@Td`m=AFYdCrGn% z$focnYwamjCePs$5;kPUdv=WM#l^hhS5K_SIG^9(y9(yv?;Lwl0_ya`Pq_Z0XS!Q6 z70R=rhxIMgEsdzy4c;u$S&5-Qa&kVNz*HtRmo_TQyL?v67j$ma>PFvY%9>U%i1wR#PYSCvs&eRhF&_hZOy|D(3?GNc>q{hEGn$m`3Xu3T zLIZYeRRqHvOVf;)ol4y}^4rVw_1)(~g}HqUUbAdU^xlU+@rDfJfa^UI!3LK8m4X$y zVq-cki=AZYSkFyeecY!7g(`G!c1Bk(XwNIfwr9g$X>k7ws)$D6^+@UdsfR6G_%_AV zBX0UmTP0@2Po+BG{@xSmJH3|4+Y%&K&N*bl8Lg71xX z_#*?(RRX{#bbh)?n)f$Bw2q0Z*mq?ujjZnDb^%!gvS@260E8@+Qp8fEC-0ax^xh*C zabVd8g*vdWMh(&B66L>b=K=aRzJ-oOdr9eAIE7cLsZ8uy*g_1spe8R!VnnwvE{l5N z)@NIkiBtvqA;{G z-Cz(*x(NjopO&u_7MJU|vO3}Cft|wPh{Sg@e0GvNJF05KM=%9=AkQPbdfpX}rw(AnNm7ZnQ8=opAxOuwLU2x5$4cV;q+-V6|GQ$xmsl1~j zGatfZkx#VWCAV9V#xw-+wCQ8L7%{JR{u7qqDohZx|wD%zy41Rwrm3FxD zF+(0i$RsjZqPJ6npR?YD2YN+{S{Sv@mUBxrmxA@~WA^JzIpx)7LoZ;#pEng8@508d zsj0*o{X4bE$9JgST!j27r|`qeRqApW!iSTeYWhsE7(VZf6Wk&m)O`W<|Ji2@bLqN< z(Atp!GG-y= zi-$;#__%{NQlmJuo&BFm$GQI)u6i{V6-w%N7v#NS_+dJH*3wUE=x6x#a@-}X7B|A` zzFCO$Px_~k#8SvAe^BoY5%Dfa9&{pHA@n_zGlUf{A zNRrT)?(lpjZ%8g5_Sj_ODW?VV``0QazPulyBGBMN^fuh=&(T8Nq6kPr1GUb}_Psr1f$8s>PSiiY@WH;CXGJG z>z}M=7U!n5E}_uG#2Ay2+L#9<-Tm5UJ+|VqbV^C5N#+($jiK2# zKF{)oJo0`Cw=LD3<=~qwr+S&;CYZjJ(VLRwPnis7x6~5f|MA~*3bJf5zczz|2Disk zD0}rIOCfT5FX}V<`$;YjKOR{Jg!C;xdBA7+%3UK=bc#At!aM8i=n-uX=ZgB1$MR*h z_bXq(xxODc$E5`Ca_LJb0THvZ#qDQk(oK2Fj3VZI7`A~>fXcXw1%Ge}12$6U!vn`Z zNH6R4muIFrrDdePK+h>CIQYFpjgobgLFgnPr9b>nc8nk(qEiCh5pUf`m`froXq zfix|hFFz$F5)1CBnBgOOD)ruyXLt2e;RPp;J)2oiez*Yxo`!qz%zxIZ+BY01)^cP@7$n}xNRRhZtP$LUG-OPy zwf?Ok*7&mN?!d`}iC3Qs3OSrm=CqsawdoZ4lX$eLk$YR(4HG>{h-UD7lkc}l55sRR zEJmtIDtz^;k3v*Uj`=6INB=e{)y+ZUIjmL*Z5bJ^Mu>j>bKt!^vdcDcaPYs z)hDj?h0jEllgb~gnUvzv%mvFu2UVI@JH-CCW-Jyb_Se>N1LK4w{JfC=uB3Ux;gE?~ z7wTzZnr$ri9!CuIo&E2SZIdGYv$Q}J3hczb+_4~kT#hOh43j)-D@UZ7zObf#SvDHH zz62(V3Q|>{;S-p)$(8(xJJ4&VS1LJ0H!ayH1J#ZPPbM$}IniWO$4HQRImNn>4kMW!Ob7 zI_u)ySQm%U^10DR!{aM+4H-ctbu0tC=;8-FLOP5xwSqaHx(Ld7aIIT*J>b59eknmg zYfGW!RgiMZbZd;E=VHh2+RR+C?Y_HqkN6=0!D6aZU;(M-zyoEX)XeMNo}tO>R1Cw- zmMz-@sbOOf>2T@6Pq8Se^J_PWAv)rrTkxCp26Xbn>mM4R>l6q4+aK$7E0V$h$I`OFVW488YM#)+N^8X*rz!gT1FZ$QMr z>z8y%nvQ=I$a5txbv8Trp&xBo)7jf-4TFVyMzK|fb)4UJO5%)v5qPYTv*M#wjxu>S zO<|r5fr<^7*(aeEiZ)8my%#{uBObT9_k6^|@^0R;gygGT{ci)zyJHWi_KjT!2$tMg z&_WjNb~Q{0rRBV{Sf24*{q2v4DA;rnv-bMrL8{qJ>Z*hm@x$7ZK+jMW&AI9%G`iNd zQAEaC4}Fg7JFsUj!gy;VdEY##N5QP32vzwMk%B=MkEMNn^xb6LOqmB}Zu(jiHb&5* zs&dcW8$3}+LJ}R&JAp1iYDS+xcF=8Tf3bn_lCFU+MciT#!;Mb%6m8`cx1HnHWB1>Y zlzJ3GAx&FIWAdVk2KwJ@zch|rd`I!(YK)Z-#k{+hIA5ZiCY3Z`<@j{e#t0M>MjaE@ zXw4T?pEbki`|7A4l%Qx?7^PMxe=%MI=Yti&-MzaWX-fQ#OG$n4riQK-=slO0T%V9a zGW7pIoaY!1w9$!ti>McGJoD7OaQ>m+gUWbk3_ERJG^bJ0C00H3c%jxCwbT5bhA)b1 zyQ{$i=YUuHTjLpkDICby6t5ATjrI05c{o?qaSRR*DS=`+%&_i5juhajSC2zz3ySX$ zKDL?JKHYC6-`rpV$@Hwf*`Kn-vKWp`i19bR6suIc;I|iOjhYoPRuquHyb|ue=+Vlr zmej~;Tg_=e;@`FT*&zNG^wD4AQogm%3f;OmVD|3m#lBBSKx8iN3p`SNRT;gz|8TR? zac-SB4vpO|UwF>yWq4voENIk~QEiEQ+*B35DtkfV}s_X4gtUz5f% z$V>0!bN?-+eUX~0aRYpA>c=lc?xAks7JdUSK0j}e#uk0(S4fPBNKMzU@CRipXW8qk zM;=*|Pg2 zw=mhXPLRV~B?&4+F9Tu=OC8vEYt>JFfWRK>P_xPc^+zOlIyNox;he~zxWKu|Y>C+a z!@*8c3Th7m@Viv*f3rc1Wkd50>+-0Li}>nk^N@{^N4&S5wA`!NskeO-LufpbJUX8c z@cYPf==C?ASy!d)doGxT>wo;U#L3EmWMF2bNjf6+YNbd)x*#mff^`?u9nHx)2!dw_ z`5KJoWLcXbRIZ{|SBU|{CeOwvpW1e`-g+MMx^D+=Smf}&FRv=j3ZnbW{$L*E(v&hb zgeX1q(mpu#L=>ZYiJ8At+k%(FEYeZPo%@O9sFWcV2ky;zm`3VEzhm0+ND2zZ$B&ih zZ+9GA0G8*`VA2P&ChHi5@E5V3?x7LU;3@DS0;akD#>@{~iq%6k7YZ@RzIoo8BPg$| ztPNiO0L+i*57U&f-a9THYj;m;-P49pqx!b3dnO|X+IlS{OpP*^%YpXk7C&HM#e2j) z2gIIY#+hblwL#ew5>RVv2?9E@-X6`7WW+G5AWm$l z7>9;8H+YcG`Om*UBA0-TJY;lqY_%Uy0~ z#U0!5O-Ac?qyH%bGDVKeD$ujFKp>}@q( z*S&e45$GAYRjA<4Q;}QqUfI-Bh9*!sJ08pf``l%F5H6SWd0aL{ljEg10ba0Hu{vu7 ziNPSjt4)#q9YA=xpm(&C!6&jQG9JUDFvGzmWWGYwI&5)o3yzX?jU%^3lL8H7w2Upu z-AjnGiIPhGYeJQ4SJtv9c-+J>J8_K4E;?f45X3|*o4hl2^O}UCJ>8seUp*xe%Zf)N zj)%c2h|WUZyMzQ}dcEfpX%jJkJk@VfF*q4y_)P2c>{W+`cb=$;FY{iLxfFv!vLO5_WejG^WnQLt7_? z=WsmhSm8nODi@e$;|GT(6~~5n6}^M4?BBfqC6pO_lL74=U!4~OoY)WH?q%4a` zJt8j7O_I4Ym3J>R-fkj2t~Gp>UOq+quaL2;cW^9-cCpYaGe*L3B5u?9TYH*~0Ttnc zqnt{LpEa&H>mLS`F56=wySdThdQ-I*WgMg)I`fxWd%cWpLN+x@4LQXovyMJ_^DHfN zO(1X8Lfx<%ueA4zl-?@F5Dq40&rr&+vHIacZqz$H-2041iNkbp*EP3)Io-!1)b!K8 zUv2S=_3_tU#8%no7`$}nXCCyB(Xg7~#-a$K4;&ba_OY!bva0;3mD8j}R@xOD?-Sj7 z3}(_F#(G@$CQSBC2$BFakWB(G!0P^0E+}A$6*3t)nU?Q?Fx3)NeaAl1Znu;5I{TNqjibIvCuo|nSc?c z%wF%PI*wPzFh;=-3(*z4Po{A*7oD9>9otKDnV9*YXvF5}H{a8Iq(nN$oxMiI`b?Hw zviIcV4=TDDo-mBJd&upRe;n66A*?CV!#qRdSwUaUFW1kA7#fnkI~_P-$YO z+DN$0Q0Z*Q^4{|+iPj}9VJ;@WAf|WP^qr3@_2svf6&a|fo8!mD@Q}1-blA`PJx1ie z(YR4z>bH^%B_zfqF$aXC;8}u18@%f)^!GkXpJM$AL{W#e;F@cKY~Qimx5^VpHaKf6 z=ED0)qt}Ns9%&Xj`u79%1=huruM5+N#$C0ZW1^ZeNm)KAu4Oty?J7bKE+1eYTgesR z-aIY&@yPXkDlTqZnCb8@PA&}G)H_*K5AAjmtWM;ucZ@N3IGQGf_Sn*uWWDh?d)-QH zXr71i_AchZkeDamQ`gG%SWsx@xl|FIF072;A~SkSy=2l93AX`#1yf|P;p1n=9j4k$ zOiU8X2b|w%x@d~wRwBYs7|z`Hw{q2x9{+8OMMTkh+A5sNyteEDF19jXziTX zX&mJ|m{FYc1Q;#Jjo5T{l9Adh2n4*mDYWro)dGbRO=%y%|W-k0H0=2mA# z)6(vrk`>fuw|%Nf3Q9Bn+}KdZuIaOs4~RrS!p!usEaeKe*N|^+2mhJ}Xp)ocmYVOK z@k^FyI|rYo348tQ`{hq4%tiwHI}XC$g$B64={S~nmh3vM>2)9R4kHKPFgf&L951?q zFwOE{yxzY~aKxrwY51g;?=m!fnDFj>w_K5|kjLV7_HcV0R-U4-2F-w?vuX^FIZl4f z36~>iAa zD<1bRKEIKmZ969Z8($la5*=BYuiuc1v2juJe(5ue2jqJzuWkt5UR!`RvY#b9U zkEPPOnJIXRHDG5d+Qn^*gFggiz#t{0lXQcesu5cohgWw;%;ecrPXu{)#Np`^><8?A zTbwZ|dE`k+jpb^;%{T;o!lVwQN0pDJgF-~DjcNh<-%JajY6s7pM6z4AZhY0gbeK2u zaFc5sro-|F+@d#A(=l#2d6*j^xdP_*4i5(lIuRI_eU>j6V#lmu?E`F3q|h1SYb(7* z@kNTeN+j%LD#3Cn=b^2Ix=~c}o@&mr@5;jrQg1r---+ze3P|)GhF$)CIQdFUzvWw| z#BQ_6n^~AkcqP*B58l$M_fPgvB1a9ijbPEwpfD|Kyt?2(id!qhYQt^kj_;*i(yia z>d2{5lqd?*qQ>`qqemxX_bpldW6d`Q4B94%64_T=Ux`T(Y#3OxHk-YySl$+w8crln zdY|;)<>uEa79HYvJHvL7p+IwOdPBlsl*5c_IVyr07VY%wGj5iJglNE5K9L`9d z-oHflm#CE$P}%TV@O{6jxI2s(WO4$=23X@PSiPW25n7L+{RVTu5YDeO=0|35ZCLP+ z+iRiqZAfj9=!O9>QU^`M|57uG}f?P1`OjuSxTl~@gKs_gK{n5!$Bms!$7SXN=&%v?cTS`nwks$aOh$nfo5Wte~$(imqcdH6JBl4 zi~U8!wLGwc-QHYh&5}GeZ23oJKRtQd?kywJKLI=mxu6^TB%`M{6Wd*E5NQ$OLya67 z8oHPt(Shl@@QV0&q)lE%296F2s@gsxYk$gv$A)L80DxCx4Z zKR1Kc$uS*o1l_lCp94UV_yQE$7#~^k5WP;{R+%{f z$G{W<)D44mV*~=61SH1%NCH{9{WVyRA=?9-eU&QxJ>iq$x640&AAEfY0jXEi{?0fW z82=k-vrqBBq~USEH!JWW;PVhux^hvo{RR9A?Qy_MhCM=D+*kkiU7gMS`z7NlS!HCB z{-37g^!rEdcd5rM_^}yqy*xgAzQma+{_;j7kNIf{5M3rA2+rq%EM$cnT!cYEL7+yd z#4M;NX9$IU`5R+AYjc)(B*)1y{^jM_y5tYSnDly=zhh^2W!3>cI#xo^O8x#wACbPN z3%IUB>cf5PM+n*u=-SJ-O!Q$GSDgX3cUpM$Ug{rI>CP?gx0!z>coc24d(xJ1O7g4k!i4?yG@6zrUqhRUc;3a}g^&;0VwfX8$$z z-tfq-ZZkoxS!DXPQtO-{i*MqMM@|RN=Hleox%w#kOa8CE&J8i=T}ER5OIKrLH3)P~ z6eywlc+=vd`dk5ry`lLKuk|8SgcXunwae8z2AD`W!r{OzxwMPB#jyuz1#gSx; z@P?@2=+6ft$=KWXTpfyYRDVAxNjIskycqaNYEo5wyg6C@^FU|bwx#@VepDFiIgkHO z`1Q}CQND}g7<&*rdqTFF@76T2Zfd^%hQhWmgQ*|_YP-W>u;U|MsQ7U9V0C1|L%-DdG+^dOEjRZ=^{+a z_}lBV2H60==AG2-XcM$J|Kgp(_jvQ2Ep<92$@s;2Mgy4H*Wtz_meCg^7F@~A-ju4ck|p{h`*hz@tM#4~!$-Dtn>~aXln!+RKakk* ze)F!pmisaO`^ne8rqNZ{P0QsMfrJ^4=Tq(*I&~C!trv0XPL8)fo8TBb%zfLj;$p?8 z(=R5=z_q_wL>JF*O-VC?gIL>o?JiD}X3T2257IJ%P6)zHx3Nn3`b)?!B&Y_tY;FZ@Uua~P{EufDldbw8b(eV4=N zHM4ZZp(Ah)l?SpVM&a*}z6uQK6Qw_aX#>Q0)PtjRA+aOA zY5`^Ny&PaKO|X@AKWawLtdxx=L>LO28eHIXJcOr$UWsAe6{jZ@$10Z=O&7+Y*!C$}-a{t%8knN=8b%tQ~%Kl~z87r^Z^2 zVGKu3*&hxIHmYJ8<{ecMZ90;DPiCI%ZZ1&FSsm!bRTyFcS3YmzlXSqMT^{mT=*#|j zmMqoF*PzlKSe+!)I>`3lpeWh>dsby|-hMhEo%?%4Gf~iENB#2_Fh!EC z(NeX;i8a>832vXItYMri>pZWt-!nXe8){EeB;U^+Ug~>;1upsoNv z82x<@-9!Aw&s1laeXYZk9QQ*dS7QyzF*p0SD%Ok@nC2Pg=>w)9+-tdGGBHll?E|*o zX}H#*MzY$Ju9+(0?q#U!tKj%2V0i|pW_a%u>-`m_zBV8OZh<^2&#h7dGg>tss)TGR5H4^wj1B2R47^kOgK>%cewiZIG5L&Q`Y&4cLp=2tYl~a8 zF9ac-6MEYj9k=qjIs4=V9q^9?MtoxB{hF|i>>NVHr<)xd8}@+W$;^MX9LhwOTe^AC zlT_5aGprurnG<;|4^iqKxi?)J5J-1orMFIUG9o{_9HZnnl{+~lm}8jdW>j}n&F!74 zPsN!kwoE456ebm-+}Ni3Fzmb~<`JGtjeK6u-t4KH`Vspen)!!D^5m7S0B_u_qx5}QHYTEbuV$?|4gL18cz+8;FcwLz>(WjvWkwQ)xq ztPaL3k7-1H{T^K3a|J$~KLC@MfYDpO5SHOusih5^TN%y}_HqtVUZca}wEtWk#H^Hi zz}Lq3qz%H|C%iqDDg#RHBAD2M-h1Kx9 z8!lwFIKVJ(MPPM6dID-_fzj)c*U<^H{)9T>ejGHUu`H9ke=sC^JjZF~^Yz}`xkPk- zQPVr!c_m{l&R4Q48%^i<+kLgAR4V1~$mo7?R;^}@-;_qzs zKiMFajcYP)!JivYTNtrlqOzU`X9xPHaK|(RstMakgNs%l^rl+ld!UAOwD1NAs%`#f9q`d#6i7**@*n<%2W)_#1Y3Y{4GLxl#N&bwS=6rd zk)0HMM$!x2oTQJ`Vu#DnFreT_G097oi(ix=WMP49Qgw&%vA4Z zUFz!72z?hWu8*c@bp~=PyVilqIg_cKks+L)9+%7RQ`77TNz^(FXQHe$*HzEs+vt9M zJ@~>9v1x-Z+(zfC$N0y+aOJP{ul5Foj8d|nTYX#n(tP#f9AodVIc)H7^kF0or5M(k z-y;nP2RpU)Y=bzQ&aVG%fnyk3)a&uu^`9AqK*m3pV@TFi4k+5`|=jP&_wz z_YtCKN7J}J@w{xP37l^r!J){UP%Io7K%xNZQy|XbV`T258WJM{0&b7v0w8Zm5Yo@? zQB#v6hf??VgSLDPBXpVz1nXvpNW>ToE@XzD|o)w(f_Q?H`(3#HEav60NyHD1aLDi^W64NHxhQP4v1K_mUv@IPd_g# zDOh}^=OFwG>>>9({6=JWRqNVmEb5YrxQ`)x3MmPXD?7DaPMV)CEra7# z;Evsgd5V|I)IWge`ce>E-^*N*nV)j^`Mteq+-*qMdy9hC+DWHZ14V~P?<&~{EGo_d z98btBGQe$4B!lH%V()AQ{@WE5{OyjM_DZLdleXb#d&Zh8uH%&r%bH=?INx-U+v|SW zrs*6`FZmliy;)zElXZhgC3{9rIQdTg{FIGre$FU!5aGGT#M_cyJQyHAwob3HHdB)2 zl|F<1esy610|^m7*W9oyKsOYGS7J=c_253_*YOAqXt1NPCTz`c486oQ?s2+$XH)+L zr2eur?f8N7@j4E&JCn3iLU>MsybYW|RyQaSJo4XN#$WQvdeld?#E) zV#)(?8nCk(?5#}MVq9^@_1=8`?~bOe5k?@gVUjw1*n&s?eZhU4ptliAkcZg&S&`K| zlDSXJ%vdMtH=e0})mZEFKwx~=-ttv2Nm%#eGIl|lMkxjTy7 zv1aMKb)Qakxy)bU>d)T^5}8XDDEXTLS*mT-7lWtY7CiorX23DJR*+4`@4)icX+v$h zLuA{T)9Jx&w(G~rQI3I3m%D~56Ud*IVd7-ay1){PNJN{EUI?3_N{t%T8D}8EAGk|B ze5~>E9|DB!knS>y@kDh=ypMV}E$a$KJPTjf@6ORz3OAsMS_)k&eTlV7M7}pm!*5<{ zyTioH^nlVFGfmQLl}kP@)omj|4sGTsk%x?Ng4Cg8Ff!?}>`RA9SCy@I8yJqpQW!cV z&(m?W$Z2Hp$z!(;JzwrTEbftDVB+7Yh#_}}>0x9>Y%O10nHfQBs&%>gmF!alO+W!a zS}IW6S>#6mf}hl3WGzI9{b&R(HC-z@=*?bqQnrts5}o-1za7P z_kX}VnCe)Enb-rYUj@AtofPxw%dUSE(hBdM5tJc`e)*i2DO$%dDkqAH$ozUYT7>3{ zn?n_&Qx0|ZCHWrD4k}|N6~${yUi9!;1Gc!Z$NE@Q^)H;yW!=NQwTa6gGO5)VG$~G) zN{|fbm0tk+rn2&l&h_G>!v2V->%m57QzFr<;`3j3SW-Uh1oL9Mw_=A9`Nuo0wl%7r z)YK3rJJ&s)vvL(oOgk~&ABkOc^ZnYs@J>x}?X4-%uM2?IV?WW5T#<-28I#Hf>V!h7gxHRR@3NTx;K#rlsh+WG5fqUfa;N8rvM5V(MtdTeZu z`mC;sAZf@^=xkJq5ZvDr}jmDx~{ZBK# zuj1&%GB;E`PSgvbT+nJJYxr6@^42zzM1AxZDbLR8Q=A`+mQnd1cvSTITqYVfw1T(1qNo`Da_45*b~xzG z=njZ}$X6e{kBp3~5W@W)`cgFs{LT;L7nAB2xsIbA>(gMQ=<+%+s8GnYOQ%wkZvFEg zBSxF-J_+KWjJGhd=}h_aX)ojT+pj_amnpiP3og?QFPzI7{8x%+dyDo)p6GdRSg`)8 zI_0@7tfSkj*O2AlmU^1>p9EDc(gE+sXC5EdqgautGzMuS=H-!I=gF);tdte)QSE#< z+Mn?2@nv@#T=2Hx*7I-?tx}2jHJnjr^=Y1U+n=f8}jKhF%v_|KFd+#$OpL{ zD{a<#eoKyU{(3HE>+0 z4Rrm}hsfDcOnf(=rXhAgT>J9&_(w5&Sq3SCY5?o2!+*oz=bi9nd^IOL?EdZACi36o z@2W)EEma#=*ogtJ>UI)}_Z;45T~$X{gv?{`-8&h1PI$Mg%%F)ybF^?S-Dg3p6g4VW zhjZ>vALY%Pr%e1WBje3pMgLnx+>wEi*vE87k@&mNQpr%fC{2<(!MNTRH~AtyifRj_ zrGe?%dv^^b_?jAOkw>4wBtK=IV!JreI5WrMg>-$4nwh<@lFNVJR9OquyKNRyu`o1+ zvDX4E%~1u4hD_PWvoO{fvvp4mR7t9{gIoAcADV7IsYc^0Wo$gw_wXYIdQj)YHqC6Ty}INCe+E(PhC z--a$M?Mo!Fum>;Ysp#R(ah1+wnaZ;^4yU~%VLpY!&pf;tMI$KDZ=+TY%TIY+BZOOJ z$}QS~STA>Ipwf~?inTYyj|J{$7wi)XTH<*sXE>m#kw8oG*)oPhS@2DsV*irUYkeYG z1KVSfOs`rqtsh+L1X_>LebT7}2`OSMxSeo{Yhng4XC`+D>b6(K%_2K^e=P;i{x8bX5XKMQT6Dt~&9A6Ngxlum3ruD^Qx@w^wnxCT6GpzhE9K!2{-cL1k^<1j!7a1MN!2pS?OKA==0&^jXw}UfAR&?WqMHFF z`5@B+1P$7|ZMexHMvjfx_7Up&;?%_qj{hHfZ~Yb37xsTkN_TfkNH-`*cf%kc-Hjli zqyj^Sk8+1GWwuh&~3 zI-HA8{E54wG?$4P?wEp`y`P{+N$SaZYiPx6eJy~@#MYGc<}rY>M3-iABIoKaQ|LhKD^uvb z@!JTuM5h~fpKaHRTGVkAK*YjG!b--VIb>Q@4lt2 zN;th;tI2I*su-~w_1gT*9mT`>>#E|e@W&6hY#07dmiSu3;~!hIT1TF(w_gB1qZ%%b zugheZ^U!B6=x;IuX*bG4-GXq(Ur1o%-^B2GN?k{rekCn_jAtGj+8SiB_^{vpHCiF= z0sYwCF#sSf>gdY7{@g*&2*$+QCUfj<>pR*1vZzSu9^q=N+|E}-gl5X>AkK$j97#M#K`S?i+jGETARPAz zrMb`rncC;BNjvU8Ni=C64wV}?Kw)rqEHobJ9iw9VZu)QFQCLZ@O;lw4WPBML2%UXtzMHi`9`KcbVOwM<}fdD0*$> z_mtHoKkZoEzpyYtB7V+7j>Y&b($_oLS8N9xX+N91nZ0nGt}`JEvB|eLKaFkTJ6!Bm z3P(O_z|ODFS5k(6wC#r}E<4qM<#1kJ@0C>fcXq7C$Lwm+xMJ-!e2E~GdC2gh)y!0W5?kAPO&e@kWwAXxB4PP$Pvjl2fgWm|jz< z_ddyMyd3`K_FlFZ=78bzNu6^7O>E(nMbk+b0mwrDyg7w&){sZ0j)AT3bICrCl(|%@qBr9r-SX zPyu7rMekQeeJyazZS0(Tc`cbvqA+B#i2E#%P`1g*hCJ!PdncF*DK;CPqm4_pYRFCX z#B~~$*UI{)nZ1^ zXS&1$nzB84&vjeic)lx6Qog8(c-gr5EGM8~ETE$lJpE<2YdGG5YG+1i+i(Ky#0Y1Y zR-dguy*QwhC3w+yyZgmQhWy9FwKe9x{jr|E-}q+Bc0DGXdgeg& zL97)S0}!Ph4vl=Q2uH8l|7Iq0pL$hWWm(NzR6>J}A#-&x)S_dXlY_zNiis zEwX&&P|4qQ>WAhOQvFTG2ApE4B%RL?U+QZCR5Vw1GTU-R22}|_D!|Njbb8O6N5y`E zmHn#(E%Z9>%wa@95jz=2&>mgk6}RG?m=AwRG~OahHCDy|Z4x$xm}?o6@T7c!EI;rr z&Lo(oy!GK2ArK9I5pPsPaYshVleFA_f-tZkk5c)jxmnWeMO5ShiX?|7mHO-&YS~;( z!eh!M=~It#u>)Uz4|HiqmC=9{Tmw2bEZjG{rL%2F zR|mvu&^RelN9;#rX0zZdy;JouR(xY_qvM56eur&O!wWgitZHT2JW zBMU^T@4J5tQ=*V6??GR=xV;U=B9bYp7hyapO`#-s!<1A)-@w<}I9>rs^u^vGbD;Yf z));8MZeVOATf-BoQZ|fmBI&knKA@-qnX@yrH)J1~$LR((+rP&&c@xS#n{)YQ^#wLx z>Pw>1og&eoyaT0)=`qsC{iEDC0-c8`9vwGS;<~cG{q44sST>gY%HTyxrBqjJVhv29 zHUP0VR>yJoyK=q@zik?U&i83R7c11zJ!{v&12o~j1Pj!{Q(&k^o-On>Bj%oytdW(n z4#w@~{htI4lb^ka{wG^0vNCT7^0$XuKi_9_ayI`Ab3FWVEk>hvre>wqP4CC292SJc z`O!ZN+D>FTrjL+=1r)0MpFCBHBdwogG9@~_mzYE^OIfh`+zCLRqi4nuPkAGa`E$qC zo$cGCDkRLI^vS37_}j|^YQQ{8tKqvxWO!DZ&J#+0><$HC0teD8T#jax72bn)jW0P) zMvA$XpM;U{pO3DRDRAOX!D*V{?NyB#UIge%oli{(9EDvorV*DU5hoaaFPa?i*#Qk2 zqXWBrWPg4aYQt6`-vzQ~rgjP0v6o+KFms^8U%mrpsQ@gC9ju|g< zJV;kr_6x_bz5ifb)N;x%#<8F=>oFW5`FiGvspNhN)SrzH0YALAA8M?E6Se7^Z2Nny zo~@o&x;-nNPTv()?A~zf{)6^N^+IH;o;U(khjMIdHYW)8ySp0gU)j& zH;->eXvb`;czO;$_~&1m0L=zQxpc>6Go^T*rLabOWA*V$(UD~}_b>vA8O7ZprKq+& z5VI1QK`25*p+p)ph>0nu&O%%k!QC*XrVXzJxQNGfoh(wg*(TFTTiUP<|6d z#u-b71*P>qF(*#Pq(2>-f3@F~rjP`)!$D#i-O}zMeW|rD2`7+O{l>i@XM^yFudZy{s%#MVK99OlZxUQNWsH zMbe^*a!_0>k~kNqlb>w%JTvY6z@whj(^l`Sk!||-rgT?uA?2-a7wqYIdJ(QGxi2um zZ4$g1s-M@wPgQU%HLBJTrB0ICOW4(`d(`Yh|3doeTe`u|pw5BU=4Cfq;e=A!qX!i9 zYxNkKBmLGlC)Y>?!Up|O_uSM7lb9+d>R(Vu2Vh&-*-K_(NMJIvz0lR(lQ0w#qe=4u zVrm9_HzK--XHOnUic%AMc{zCveBj{>r%l!%b(Lh>07(ATJk=Px$<$L+>;==0;*@F` z=hwLT%>_Z9&*o-oC#OG#%9)zcQcG?J0t-%tc2sM+kjQ(!Zjm7EG4_CxyBHQ{iZ?phhtQ9w<4VJ^@ z>9&V)@bondn*8umaz60BCr|EWI`M3xijG`2rVX9Z=9v3|-DmI8FZpb5tc~cCZL{~~ zES0W)U~Z*}G9`V?&YzEsVs}3n@A_`qItD4itdqTePn=X!8VySGh+C4B<>CzxI?}uS zqH+{4fmD#^*_pqI#&Q#lV6C3`!PL3d;nJsh4-b~lMf^%)?;|2kR~oM}q1I_IBJjqB!MO^tZw4`1^t*)L_TH6W9ZnDbHE`_wAa&VZ#A+cop?`SX zGJhAu;`>$Q*gfO)Uv1p8mrAc3ufOxVNakU*h`!{B0o(Gk4c^*?T}-o$qYKi1b;!zr z;hBst)>KsP5+PQYBy4CfP2b&LgR{S$C06loHrcyLQ9KHz``OB|lx}q2m_NY$Q%vK{ zZ;m*as2mwF$o1Q17Zd`2~MIdy#Uz!l&SDn#@)4lEO%f- zy}NKNgAsd$S}YJvoG{^j;!{TCC=vcEoQis;GO{0<S#fsqDDQ}$STeEGiZGgK>$d{ELb*hAfz@>PLTjurgmj$u=U@LY>6|ptpObq{;(! zCYM_CAnwPTt|dMGlje>_3hgQ4ORGrtQIZu9Dx9zjsz!dNR_~3Cp1|2yPQ5Oqe{39W za9!SCj|MT3DMXHG(muHc77N}ya}rR@gb2c1Wnt#@UZyFnXkx`Nq8o)M`QlV;4|Qes zq$B9i_kS^{s0lDRK`aGML;C`OfXp~7SBmD8qA&tECVHnL4Wt-Z7^d8-je%m*_mVYf z75YW25!l#h5vIjtIUf?OnGngEjQMLHiibhq!tShJZ&0AV&Cjpv`S%tthBFj&3jzQs z^T_a1m#n)AvHB|AJTv-$QkC<~FsQs-KGU zIkh`X(V)oHY&Vt$5*jb9c$WYBeK?`@S3Ws%G=3hiU>EivMYV2!`Jm>5DZ@t!6;Z+sqqdFo~ z`Jv}#w{6km7t-ZazcTekx5xTu!zT_$JLGBE$NjCA+uQL;;PLkPG?b8{coIkj9!pp@ zl_@X(!iOZ}V@CDfm)5^sPh`kw*frOKTYa&0KYvUsch~Nowqiu(f(aL&GYLG!0sD?Rhw)51%<80=7kLXrF(PWS|fpgiAy+S)0p=wg=-H3@vC4%rDGv zKwyD>6^R;khcY+X>~!dPfx8Fuq{t=Y*Z^&|;vwc$1#(c-FJ$-$KEiuXJwQsRa7kN+ zK(F1GS-mcI1_<|=M#@J7f+N;^-$ierrkW;?BCZ3M>F032wjH-!Zogjwx7h_C9={Lf z^Y4!vBemd`+8!$UVyRkIN10mqCw{4Q{c0QWXp=AB)avfffaA~u6qUnQd?QCLJSs9ok7g|NETcOxfyfXlPMQiCz?%gkxvJIr#h6E_>}6K|e0 z^3;*nj?VdWu8Vc{%KUtS+0dS`Rhq&z_4q|K+-?FX-Q(4ODaq+L_PHzYi!AjyQ3Kfd zYrlPR^$lVWC6mz|au;;;lfT3>BQeglj~fxHA{&4-feAY+N`aJNGObnf~1ydkJ;caj-|C}mS9&5ki7@l^f6 z&-Qa0h;Ab~nTw^q&ij>)Q@IHw5T>NqMx5u;i65AQ>YxWO3j;to5zuc4WL03DyD!8> zgVC%tm_MICzMei- zcyIo^`K0A!tuT&5t1aeg?KftdMVD9Zh!5VOyiLsk;-|l$2)%1jrFf!JZwF+|+9mISFavza z9oU&k11%e%!uA8RxtRmE;%G}Wut!(Td`x{W**z?3pP-mt87uAEiFnn}94yz4>UQt# zS7^5KH5l7N7?{veKf9aVeh^OO5~dJ|mn9P%;M{E&zf3IVrv2epz|ma@%N3(eY2BUp z#mzVW{O$eCDvyr3Z2utct2;xrzdh-x(?JOJ`KMbZl*|38!lN=OC!RziCD(wX<##wc zROkb)Gw$1eZ}$^_L4d9mB~rFT9f)(q?_q*KRyDx?;Z;vY?6SGr=WMBN<)gbGo~s_X zUESL?KZA3bpTC~vY5rv-Hz+q+TR-V2&02^K{2ztvy>d7lv_J&`J08HZ%zEnY{j25{ z=zQh4TkPjxydc<=Dlt2{dsA(=bZ5f#%AnyuJiSe3#b)n&3@*#wy;#`xoI*?X2L z;yk<67kJ=`AM z_4`LI`TW#Eej)!h+wRRxm+zbIfKQ|Kr`Bgs!TW_+A=1i9hE*M{>~=eo_|h@bOQNL1l|5+j)l$1{fN8gWd`57`>|XLPi|fljs`2A z@KNyP-p%dw?`hzu`#X2K{g`COb>xq~i{}SMx0L@EpVWtspmRXUI+++f`c8Nd?|0Sz zdt;@t*Nn2oRlrVIfe5-sKaDZ{eAR+1i=2?JWI|jQk-D`Yez|a#4>q z%Krh#E0{7}TKy%RmEZo`FIa-p{}A^o;lV$6jn5ePLUnOh76DcAAzjJxy|omez?hkL z2i*WAm5~bF;MRlnd(%IFmBhLGa#~%im?jC5G6h!rD|!GcM%!*14<;=*811Jwcd0jE z1kkXzl``HXO(B5t|BU?e8?_b_l^D)@jrSIlTR9M6;Q=*1QdMGz!UNqNsgD2;Gw&)rS_rhOKg1ebxmSUKE&=d;Zca)W-yUdW zl-;R#18!sQv|A4{xP$58c~4w!s@yd*a1kcw`T`MP@jDa#9mK>knGDf*HdT)k=te=m zouP`gTuXC(vWs_}>0JZ7OZaD7x+eY{V6H@&TXQIUGq1U3eTf(U^xx?2QrHF!PiXY?btdc!NdPJkm785x;foFC3`L$I6pitDsI zjQF$+3=JTG2EV^xWd8g6XSrHK#$pfD_ps5bFYLRN9l)5CCKqTCtQ0-1Hg2%7#w;yY ze-g?(IkA%Bu~I}Y%VtOMbrNt5bDw4gzXe&tC zOd(zF)n1{AEaw>Wi)^`8ryQbDqZ3($VG*s-E)gIzAXPsvl&-ZU4>L)FUYA-DqZOJZ z3IfYqyoj3?qE!V!X9n`f&?KeDq5uJB`3Zq!t;QNT`rOr_W}QD*t}}uwxdz21^{%TF zc>z#?fDjb4j|HRcQ~X|-4%ekBh!yI`dc|vw5Lsepl(S08;$4kAB~YQ68>8ITBZvN` zGpaV0V^1?2P5FF2lI}{!y^K#hNpWgb@Qyw`iVp=0f*%`q&r?J9Hj49!pHeKxw+qYx zV1_fvVtoeJ^=ubVO25}%pRPrDau4a|YePRpFpFbZgBv92y~=wAcOD3ghePgwa8mLdpQiP9p?qvej<2DH_&88DvT^Kr@ju)I>jw<0RkM>Ht+9TRu?qZ*jqcSw zHt^@1loKvYO6e<6CZ^LuCa5?Vk_X%a{9<>Fn3o=nj%h^&z`ct}8F)PPheW33Y{SRZ zEJJQebvAg>TY3PquC^#nXCr3ZZ?rni0Xz!Zn{QBMYF%8r$_x&I8HA8$@ucssl60be}j5(1`%6A!E6Q^&QOL zyPc}M&cmWo$H~eI1uqkQS6(y3%xc=cmkIB0=aY194;686e^}CWUaL{Y0hIx5RK`6a zUF+Xc>4v{fs>X|z%p{;1+88@4Yy%u@mPjXUam~y{j~bg1<*L+Bx}7`uSv^0o^mfQN6LC?PSB#1Kq<4M$ zw9_))4+%{LxzuHG=j)ScmxV?@`W&&z5W~tD#%CQ39?DKk9!K(x1I@B^S`|}$W|u6R z&I`_Kozdfq_5~fwg$ZZ(%M);u#aGWx+%`A=wXdW|Kq_LA5bi-kN(I+U5JLDIFKS6* zON4s=@BxBzhr;!ee*Ta&0|nEez_ciCE`f@{KwoCY1Gh4oT_Ki0bqzTkm->bB5S<<6xJckHd00;Fd8AmZ{J=~sVcITdvk=#9xz=J$PDE1VfHp^z zja+pMy5m+$1Ay2+sku^53TeW zu1H>C7{QnoF)?BzxYLsJ%n~C{*V-si@VUQJ8``mLmRAxhiRY8_bYm_kua_`ng;E_B z)p73&(T^$QBq@4PCTE~vd$F46L-@V2gu+_j0`vl2^aGTPWVRNuC=t>md?<5$KFf2O zCdPs6p(8}J^SF31hnh(NLTzc)lo-_?NK!XwjZ8^*R1})nrCPCgGN0=WiyUd;)Y5d5^ z?0hOtcJ`@@a`z0j2(&W!%kX^sP|3c0w1tskO`(<+KPL9ko@{}GJQ04SqTm$XZsf~| z6+h}Ex0{bBS)oCXLG+qX|)z$M6K?h#KSb12^!qm{aixy{vc^cB1jZY>=RnhK5Tn9%x z&nq#_OMl~k?Jc}2JKa|c;5&e_qX zw3y#GB=zuJER@6IhadA$pdBe$<4Z*PQ%76#isy^-e=4B9P)~x*#&$S9R2*O5a3w4; zQFqr&iZOoQ;iA(W7~(SRgidnPSS zFIHGg3G)OFA8Ha*(eX6A_koOTfll}>ne>p{dD8-Q1<8}$2dHWUo6uO-qQY+U*gO{n zGu#-YV^X#B1{?O2;;UC=vRuXXRFu%b*@JxxVJ^9JFX`B;?a$@yuEX&R&Zy@}*V!{8 zCzJDC@~p8Xk=IUVWTby3g93!8sWv#XG33Mf5#?gr2qZFCwRXRv&TZEMV$9=8b`A@g z78>t6c}Y-As-0TzcNQw@O*$E$A5oY^5LM7qI{=nr+%~5yL+IGm5Qmc9}XgxL7KyUl#22=ZlO4nFVAWhDJtS}LyUq*aqN^N$~iJvg>;#4jPIXv)DV6c(nL;YKbBMacQ%Y8=_{ zv?DLIRBU70%S+@pxT^8D;ma!N-PTU*)WRjSL`8!fmO`+?mhA^+!>!wnFPa<6&*Xy1oxv{P0G{Vm$dc*a}H^8Cgw=`5NRDrIcvT@C|9O{?O<58&@En0keMvjSD3{|&N?+Pm@;UsWT!1vcy z+u}nY6GU=*4;qWJFdG^RLJxGX^z4pYEnM*B$mX0ecdaCEXN_L3=-HZU#%d-A(!%D2 zCb6)dYe?jb;@~O0ib)VEt5Zjt!gFUyBkZDr$x3C$iMj2~;3Kte9bM>Sghtk*DI$o9 z$=1BA!$N%<;2<-aTsL0q#j8a$^oxhfIbxd(vs+*DQO-dvb?`x1;Ff-5@4WOro$N@G z*}!?0uQ371a-Uh)3WV6c409o`Fh1v*tEmYt4sAxI8t$v@=gMhI*m$h_M9c5Jr7|g< z7vn?{sKwTtXys{z_n@I;KXU7(Foo!Xlh9hM8|3+sdQIP*mEJ_FQIE1v_N)I{hMMhDWlYWKUX;0MeI~i07QQl?(t}dss$C;LU z@fHPM3viCkQV`{-@_r8=ZP?juBCIl1nPde`T1@Q2HiEc{C?~>}4g|}DgpSf(@g8Jq z+OdW8-T|{C-N@M;Q`RcReI=9>ty}`A?tqYB823+WocVeMNvgkBJHt@Y(pZ^Y(jtoJ zbJfI#W;-1B-gWE}h{Q5-{7iLC#9;IjgTH*{x6c^iFF{9Sh|){m-;Wz>|1w-Ro&Lo& z$*AX}Up+06i^j5n(J`r-(9Fm|anv{!l~LsPDJ~;;1+^m=F$P6ZOl{ejykiu@D4hea zWu;>I`;Er_)&*0k0$%WLNnooKn)#?86mvbYm08Wnfx<8xdaae5_}hTuwTAlZ4OP>c7g67RBS7v0>Kr1ZtYZG6Lq#e&Wmu#cO zPzpPAcjjC4a}{yho3x^3g9)OQmO_gI`?1yu zgdK57A=PnFJd8ojO1TKt`V?7+Ha0Jo>n&g+-?$@$oZtvuMVd7>pFP#WCgn;qQ_x_& zotNRs=gKKlFW5QK1rF;z5DNPg zJo`-*M?k{i9@ir7l!+^S!#uPsX*^r2H)<0p=JB0kPx&Xc=27HQ!wV}w(RdoQq&L8V z`D|=z-p2>K`f)Sc_>_g6`Rs!%1d~*~$A;8kc1jtez9{L67?e zRSks-GYdXx4+4CKCUR;UGGh&y;~l-pPbr#|st}@z#RN0jD@e zC4cwV?lU(f>gz%@gG{A^+N^Go2II4-2-JeE_9!aaecTlj`;(-u-#5XB#IQ!Y`2CQBiNzgPTtrH{jiD9?W~e2F7qiBR0h(vU3+Bh$*r{|nus=Z{$ zIL%PjUE73G^ehFubPYVXk?=}b#p(Vt(=p|p!07j6NnAhUeX$+SuoYtzm1pHMNqzcx zpwGS2I5WP})g>rd-v*YvB8(9)ynl9!PZX>yYbYHvZxhWi;z^c4xFO6UZo+Dxhgt;|<77`7J@^*9+H$-A=( zX&0zFloVS)bsIAYXy#B7lJxp7UsXS*5*tDEC-_rm2VpYD&V*TC$U%f!2vMDFl!dZj zonbS0#LYrDqmC4u-@Og6AZ8IpyHpb=X$R!FQPu;;MOy-wC6Vyna_3PjXzwQzN&|zj zXw8~By#vj)duwLdjV7(PpAd!(?Poq^v}5xGaFWu%mw{cXx=uS(9N4*YrWY?t*xH6T zb;z1tGQUER(#?@6j7?eO!z(Ec^%2q4<>{3r3!ha%<9f=&iSHHGi->nppcYBO(;m$; z^;oW#LqiBAt5o-w{9;J&pDy>-)qn&vVq1`8&fVpA-Nm;xaWD0J`@0kJ^X-qffKu8O zXWkZuLEeCDVA4V_DXyr%V(D5!21X&DV1*_r2ZUdK4%AU)Nm3QSW-E-@yQ!6Q*w3p? zA7o=ot$!Mle|U*dmK>4%Bv|Xk@TxXliR-oX@0h{|uwldtpQ?cZS66O{fClFR5_Eb| z&hk*xC!03Tb)8gP^M;hu=Cq^ER(>|MuuoN$e1XFR&Hle^Er#`NB&K$ih?8;vn`vrq zA|nTtwP=t@C(ZTS#=1MVtK%3?8&Uc}JGscP(HlTDE?t*-8Gih@!Fv}jr3$7q8_4PC_unaek*(zBnE&#OJ~R-Z5(0W-8{ zOzN4HuTk@wh5d zO`PW|D55Q?=jPZS1jNQ$^+`^seNyEWa&19`5tl}#WPWgp+=^$Nu5?js!Sq%fC#BKw z#*-SnabPJ@H1`+BU?8y@r~kW0^jd$y+QDUKeepT%XDR9|5=OsW$?n6UL=$0qMFI)6 zp(wI1>8>7>>s)t!b;o z)lpo)L0GNR#1y7Os({|+WhU{;1Pe`=ecap$$o)O2RzGb= zTG%tjc4D5;X3**$!=i@V@Cj%WF;ZtEX-{aCRJsp$OnkrmC<)ksa z#Eax4By&~bc0LL7oTSl%^2TPZV%83sp;PgzH}DjhxZ1X#`Vmx+ptn`WphZo54dpFD z#M18QKEln3rR}c@wfjb_JK=xPn7EioNRXQ{+Tx=jNEVLaAWA_xakMVrx=lj;Er43J z{h*-?8Bxi_BUCk5u4!f!p-mpXj*O$T?h`tk^)B00_2)A?C<>*Y@Tc^k{@Urjm3@ag z>aRdG`dPTvl^$a-J65s=t*M^+jYUuueIDjcPTXu>;1EGmYiO_&8TKclJyq-VgP=KC zjh5?oQ57e~^}X6R`daC{gNrhF;bNS(T+gqGjV>Rh1&z1LaQT2YX3BQ-?V z5#-QR!8ej6C(79p(6Hai_B63UEn1g0a&e*q?Gqr9`fR;#P>;Mm8x#*d_5W0@m*(o( z-Ko!ahn?u4JA0#A4ASoOm15fEWUKp z>(eg%QvBbmv`Z0djb)s%>e2Bpq$othas^LAaRQ<-`PWyz^GEcL$Ua_*ac`1?VxGRXgleHi}`(AUhyo7D>DlNf9Y}cdgt8)UG zoa)r^Xuph?CR#19UIjT!@*JsvppS)d-&aFdt8AuT)jatj7wBxutXL3lY^9icdUrmR z^zNWP`qgyJyEWf1Gn$SX|B5*8IqP-BYSu5~LyEfzMS;Y8i`tYqChdEVEuXA7JLsJ( zJ78Wtfa#q)WUt01+ccv!>{ZjWkSxfYo#|k&f95NgbcVOu=3vJdn-l$`4?(pNvOHhc z5qkk{J0`!d1hR#z!V%V8=SyR$R-ST|s;5>{oP>GB>epAhftfEb*Hfz(QxBQGzeE`6 zXSee)8oTmtEE?6Ui_u@FGj_~7T1LfjtHj{8tqPZFP0Zll!hNAXbn9l@Oxs{P<>$9E z>GK}uOCAZw*|u&Jo9gYa|2@`&48zkq#Qq9Vx|6}qvprF3@zraF^&JEWT2geiFyu89 z<{v?Da`gTP5>u$F2|`{yu+MH$g~cq^Qx3 zm|8mQbDReJMC#ilO%=NOf|Sn1t;3at9HnjgS--yW%)7vrwJ_H&6s&wc)kcOVkGYQb zipa-Hk8e+K;}y0WYnbV zVZzz=*_`sBi#ZOg3~%>CzRL@~qW0ssRo0$l)l;$u?FRCOBnmCH-gy#I(SeXvClgQ0 zbgwuVoC0EHkbW&HVyh^86zaqjkk+eo;{x}Ye}^_cr3#rMT|82mQFc#`6rFde>lArh zcFEmh<~^ZZvuO6wjtR&-E>!q0_9FR|b~we&e&ExjdFMSAcjA>xCpC{{uWhHOUS^{ zV*3GhUWkmc#c}&k!QGN4?daNau{q}ho7dy5`A+ERY8baTTW$Bj{fG1*;W2aI~|=7pxs zFc;?t7d_nU1sHhKiFaXE-QV9cvOo4<)ouZUr6AAc&=g)u4p(xmgtc<2wCsGVTy)RX z0)K3Nv$eXWA=F{YLr)!i#sBMHOPajAi}9ZLm=nMArv~6ZO^9pAp92TB;P<~-`z_#0 z1H0-q7@(wzS|g>KXr5zIi!V#z54(dVT4ct^#opgs{h9m`G5+mkbStlU4MCxv zYQ>&w&w0AquigeCnS(@7j5Nfcl)3G0t$iEZ-coomPFV`39GRXuvzuUrMP*{GZ$F8( zG3C>!!@?hmz7h2i4N*-A z0}tbx487g2g{!}#%xXFWGr_BZW-!)@5qk0i$@E1Cd8|UnHq(bEug?Z!NXu*g@^g1v z+^n5#qYaYGS5Sze53D?hd;Ipn3anl*#qpW!f4@N9SbzRrfkP`>1gOJ+pdbPGJO%#Z zC^^UN((0Lc(tiH%bi5}O|G&eBBBhcoze4^U)_p`rM+#IDLy|oOEzPa0H+5< zj{8ggnKRhH*$#gMe+(r82Sf~x9=tM(gn=QArt)B0AYcYRSiT+Y)HAPnh>{DSZU^IU z8$;0UtHyvshr4)@kBSFA)4vGL?@E{L`OWM8z0I0xQV5Mx>q`Ie-#;Gvk-t4!R|qL- z3Hoo}-1V(=dMRKryKxmEOtBjefn_4VA02Oa1J#^21Q%$z?=637?|lIq?O%QU#NG)i z$QGwPu%S3gegONj#-Q}D^xsRrHPou0w)vDRnbV+;IQZDz9hoEf%Ax8GQ(Iu-ZOxEJ z9fdpk#n)*{zc~G_O&{oM0IwUKVx^GBVkFbvs;FIjXC?zI{D4`Yf#Jg4tpcv9pqxdc zU5qPA-5>Uhn5)?FD*z)I7q^Z8o`h=GqU?ss)FMtuzzz_o_(FS131Jr zN*s*YEhjc79OzvJp8{(~V8GV-@Ag>9R@4??KESD;0)+se88rc?Qb6={)_FcQ0wHy6 z3M|LDw~7N0m3ywaIS|5Bc{&RK)eR7~roPT8M+97-n2@~v`|+hK*1${wzfM$+4EMqw4H42rMd{>@IGEf{UQ zzXk`$LY%n7LT=#Bso+9nJcvJ1?Z#F9nT#9g8%BZ9RUqis%YSJgtOgn%J#&vPS1~6f z(=dKRXq~@^uv8PPay(~GWmyMqcFK?0$kmq(54EDhq?`1D)+V4^!GU-bs-DfQ(^^(l3mlY=c#1NvQMd?7XvtSsZhd| znzEsAInK;R%mUv|*J-uxWUgARk`vD11$`fB@3XR3qJ`w55@T3&jBr3NUq1nF?05wJbl7Msv%e;2MIloP~0% zHpxD7{zlUohU=ilNZ~MKfv`h(-q=&-VTULWu8tj^SF0~Q}RKI>3z4p zTyTv75i2dqVPKqCo)sGVo!e4JU%OK@mpdV1iPtmcS#eHAW|{+AhQ*?4dvsQv*YQJq zW@!CT%#jQGd=(#(2>2}JuYu)6?JL_7P*!N_5LxFGBJ6I@|0XDEL&z3NS+AJ(CKktA zp6geqzwT0RWPJKY;BB)W-*HD7Ik$UG$k2;3j($8XPO^o)?5|La-!$*knN%)oe!>eH zq!mJ_C*qw7&T(HT`NpU@533R<*0z+R;*X1OT$M^{)(7nkKMtq>n6T!!;XhtejTZBS z%tL|>qI1Ty#0BQfKF3{eSmu?>y)$QL6)S27UA4>E+o{zP9h8Z87 zEfMvT`LjbQ>BfRK=JT)^*-40=d6{Qp8IR0(+!2kK8x<~6Pqx~#>Awe!3Ec)*%}^?v z|8?-G-2#}~eS4{D5s(t5L6+Yvl%lXRznHj85${v%AXAcGCnJ~V^*x+b8t0%< zMgKMo@o?Jv%zjmbSS}24S=sQWl!Of81REGG0XX1lo2L#QxhjS7Ws8FP2r35`!#}6u zItM6!07CLu*z2vaA#&qvWiM2OUE;l$ZkSx?u3qx2SP` z$zOa+yhmvy*H(#Tp%Lgh6v)Runk&Yi?Ju*BShVgNRyVNYikwGLxuJUj3qwL)3J;wI zqKDPNxf>UA`*58{6SDM97a=ASn~Ss!3r8g|eRu0ezmG=`+pqIB*f@z@v8zaoiRZlm z?&_|=@Hnk&CFR!y28L<6H`l67Hc6M(g=GkdI>D|d zwAUB4<02<4ACa||_s1+FyX@S~_}^6MAfYUiIwVgCK%^wh*I*_ws#T%BFQbRBq&cw|+m zOke+VH7dqxF{N}Z>{89n_Fq7JAF0N7VPWqVsdeCUvS|X10BqjP>CNh5JA)~6M{&jkT6yv_hs7ieER(1h%)U(U6_Y(RqLu0m z~-tlc`a^usDG7{7q1cOFA5UqpHs8S6Ch?X{XvF6~m5LYn!l-P7{}&m?2vob9t!KKyBk zPJXoDaqYTQ0(NrjSRZz!?8nmp!w(;TSC?;RtY%BpgnY*O3VmgtC(nTW%qisN6~jG$ z8nj7g|AiTYGb4-zfeHqBi&Y{1+TG%NNxsU|G|${a*s3 z`v3{5{NF|y1W{P`ff)#ZXygo^-@nSUMjzqazdE7c2U+052~7X{NB(zA{`Wq)Pb&QX zZ03j=2=ykwcA*?XbIX{M^Gf6em_ zI-clLawOvGIBA>!tm-bncy}417~%wZCC{bW4FIfUuYX}j7Um34<&K8ShU`m#xDA@- ze*;_d`n4)0@~0s{0SX{_wggfK1vwrF=Rd!G{Fiy-jseF(bOw?!de86veY*<*Mw;5$ zB9(04K$o9ch-oDcQo9U@&~I~ zi9b~@?1q~f$~EcRpDHKP`QKZc`OK>Ejkg)OXz+^&8&@@U0U~cJfZdVI0V-{s(Q{)! zCIiIIKfo987BogRQ%8H+7GC=5WiJHD{^hJau2K(V2br9-=XKzo70Cs8*>~iRjev1B zEBeS%&%dj1LYa@CC4xd$D$OGwIAa51?+qC8R33i7=B^95s#5Z8FCBB3&Xe{%GGqrG zG{l?{xRiXkpyA^GVec)Ys$9GN(XE0=3W&7Q-JR0i9gC7KL1{rky1Ppxg+)o1fFdB> zT}mk_f{Gv@|GD1xd_3cPIp5AWV?1N*XFD8wEpD!RUUUBDFAhJYVH2}wiFlO7x~qDO z&$?UM(aM5y zSMEAVuN4RB?LK9x-Ovln*oq2PH)efi*S9070Jjym53zJ#9X?fzC)eMyb}MFAAJzZy zxmuroqf0)_;%HMIpBQQLIMmIz|XvN6f}4(%dQ>250^91jZbr&YZg&s zkwzYKmZ9z$FXJ4VD?_~oL1MH2l?`#@4XVc1V}X|#&IdTEB@mpCLV?0!Rt`GB0VMj zo)C%`2X&EJ_?(_N$L&xVa%%}`I?py@D;B0YFI6a$3u9X3z1*xpz+$DNAoAn=t#~Vk zThdBF|9%!6f&Hu#SilQw^SW){JOjDjA-M1sTpif|0fo#oWKP3@Y--gudxCWVdDWZ- z5NQ2|sy!7{`~hwSf#NP;DZs!y$~& za;4R+zn%d`uW^0z^hqd?{G^`(^$cZcTwzfCRZMlIw8Th-rp%x);7%nBOiF?SgGw(NtCEjFa zJ`V2n+kvs-R<@sb3a;=YM7N>NYdCb_5D zUK6oNwC{wayv%%7y}r7Nwyb*R`qXs-h#v3EL=k@5b`Ck|)bYK2|C_`gk^cSeeOjY) z#;^lN0^rET#*|2USuD{bRj8;tDNr(~JE<3qx=D`_OyAaznGcjj_A+ zP3*IDuew}a2K_c$2&qeb9%}ZykmdH#EvF#XZqooRhqU}Ut?Np zo55v3e2?{;v&F>{h(;yBK_12t)o)IqB!rJT_%sn3nxl&?-88W`F4}>HyP@#PQ4|C1fB*nCh z(-+{B3U3&8jNEsj*u=nJ#b6F+0YEFDwT_B@rRHAgM<0iTc#zMRK^#I{j_&~*tof(y zyJb+#rwuIv1i}kX;lIXYamK~oNZ#~;VM&kVn5GBibO)&So(eNDyAie3%x#tmF==o3 ztQ29Q6gO~iQ?_I;PGVPRgVX9{Yx; zQ8Z;uEJD93xIU-SZki*H5_GG$@h3|Fi$U?Zn~{GxXHimAqvpskvy3#hPS`CBJo;W# zRQhlUgRkPuNm%mU4``~$mEiqiVaX7tF0}C!-Gv<7Bswm**iX0)5P|dZI$ESCGi(OL zhH_d}20d~MoCOFump1GrFS7Mm^HWU$OTU8p$_-ZVSpDH)s|O~yG9}D$ptXB7cRmWg z#%N9dB7k>8xc=N@+x|0xBNsU-RNu<4=@n3V@=>c@MTCwBhl-hxW7yE`6T~z!WSaKy zUXg?}gPo~)<=XmWzNWEM~CKdiLh-`oU^5A{&u&puoQq;(|B#O&H;@ev0}B|c!5Sa5y$ZDxun175Yb+#tcihV+ng@MKf6Z_PLZ3;k=9@jn=h|Am4o0D&+m3BL-N z62woGbYye)7Va-9$~g9aK|#DyGCKNAep;X+6yVAys8BH+S$7`#OA&;0vZvDkRe+jv={%9wF<7dqNoc*0VI zv$xZ*+@u%xyWQ=yPZf((4e&8c%m3IFuODRg=f;wkzu~dlyzE*m zhsj0f#G*nhQ@9NE=^4ChrNQM4U0z3PtL>EFNl-RXZ6ZXT^8$xAq=>u|q}{KsDGiwA ztacDMiz`aA0`6N%9ye|$cB^@l$=^8h$x7%vuI7F>vsR?Ji3A_;r{S{GyTjD^2d-f9D7^0w0+~0mKHdXdL%UEtIJ&!JKlmRyTP(wMp-hX5 z{8+30V`lA>#3>J}iZTfA?uu;Tx0tniu8%;v#x)h#E)hMnl&06lM2$eu+&KoJ`uV(b zXhyZW{`p=We_B=f!N?0_gcIE{;3Fts{)*Xct-elonWnijFbY8ri7Xr<-5>G9{J(n? z(DBb#85bu#;_;5JDS!C5F1 zWw^bau}3Q#1Z^#O&fW%+nxfP}u^76Iapp@QI%N2=Cq+VST2IuN#kd>wSTuTrCmAZRnqsBwF}|fiJX08#v_ITPiDZ0b{*%99 zylG#2I*mOEjL?|*xflT6hli9+@?Q6E zd2bOffr4Jy48lMX+K1fZA`>RnJl~3oHk1 z9GkF`f6!4YucuV9s;H)LN=m1)1c7n4(sBweSyUtc#ilZ0M(F2n%2g5Y}%)+5+&-X_B$0&4k4CX_Y@2a-mGm3E_`Cb2bZhE$1cKoETs1|u``2vydg~oX z%9)+0QeH^Yg_Vu+y(U9*Ut0*qOKbQExfJC^GOxh%A6mxTy9dL^3iLz+=vbRzAXT

&vHH|sT&G#>ShT?nlx+XB9?r7E`w@SU`I+Yuk?bcRsxfKHZpQBjO^VEg?_-VEC&P5@0>W@DGp zmtQHhL#LKK6+6ml)*dxJGDP(*T*if&sTgHPw)Gq!doa_I@oEq!=Scn$~6c1V8a8!UE0c0}_{ zEIZ~F%T+P9X_K8DHMP~g`YX)(RgQB{ddZP{VuBs=SIiD`q)nJ}pPj5*5!T!L9@GHx z-vWSJePHP17qmcuy#$JCHJ9<_PV%KrA41Skt}&>_0%d5pQEPx&30UgF-`6j%gpDcG zvBZ8PakcI7Mjvnk_EtMu{`g4)QHdrjo(aiz$+g|mP$?9Yh=fEkTQAffkN)4Wwf^4# zt4(%j9&X|C_lbd3ElPl5d`aK~JBx#V4ni+c69AxTFqZv-{V~Lp%7TxonD+q?w+3pR zI#8d>9|lX9JMse7{WyNH{otxGvNf3c#xM(&0E&4J;3W~80eli*G*x@U*9WQ?6SA^N z+CAAAC^RV3iIHr+baohSp^Jg`E`pj1bp!Q;m)?*T1nY{a{m^abPHN0i%(UuE)V^m> z0KN^%VIzk>I?Y%=cn!Jk4V)=9gQ_gaAPHkZ2m=Ca$W`hWchuf!Mt|$u9l#w;8XYEY zub{pF;s%P$h79*7gB2g3hnbvaOKMLAHX(A&;_YK;$9H2{Y^JTxXnqRCcy98fS z=IqBkp!K}A26_^o>q;v)r=)-0_#0Ve-ifFMpPvM%Qu&|laDm3a>IcI=bK6q;43}0z zpSua0qrogr6TKPyqIQt*Af{qrFgculbN5jGDR@StjZttveh=0=l@I20$O@zPu0Bs! zAs1cX(fs&8%Z8%P>@ca=f=A0QU44BQv>uJ^Bnb}v`OEX4gRh}T+@%zL3z4f$pF8Rm z!t#Tmq)1rxMggPh6(gHPgt6F0bl!;s%t`t-)1pCAg9G3vuG|it@}v>`fH5+5yW;w$ ze(T{R<(&|EIAzXfKgQ2b2h?9i68gopv!tZNkLHz31f63QZ45pZ#;M^x8`(c=uiLivJZ<6hzh zxEFkQoafj#Gq^scaj#Vxa*^~Bi?x%6OAejOdZlYUdq3e%P1z(AbHeL~dUV0mE~rOW zo&i(-Jz9$M&AuLZVJb4m46OdpZVW7cVuEx`A!o#DZkz--9}JIXvNeF@1R~f3>iH`wqPAd>ciS? z07f6OWa&;hCo+7e!cbm*+jDoy7N{2nHb8T-AtTuAVMaC{ffg^ixRj7QN``eRW{;In zQD54ETq!q$&DlXmnPar~F<`Y7{0a;7=>Vv_t~HO#%0aMJuQ*ASCi}tRpI8g;moEq= z-U=mrNIY9kH{A57VyYexsVN%P|>Z&Ifen#Cn z1(BA}19(I3{1)B=KCpEHieJJC3+pGOwxnK8f{g_j*)VG488zvjpMs;FIc4RV;oG5! zc>yu@IN-%T+iuxa|6qy(l$uM+Ugpvc!ZF~wWpd8s_ivhBQDS-m%$ckg)je1T^L_g|rH2!4Lv1 z%P!?^B<2%8YkgZj!7nmc2I=cOaM5uQ0%*Z^kB!~kn=~~>i?~g;k7d%jXB)@ zV_IsPf{Rz<^U1!09!b1W*KM|_P-=(84xgtktshF0=@bbqXNmvk{KI~}G6ao9W~eVB zd>%ZtAn{tD>*Vu#g?Eis;Are^WTur->$Ach;Neb4>5<&v2l@vCrvo(|LYUbfj3uC& zB6O`)=FS;(3CsayI+!fR(C>|MgKA^4{2yF;%-uQ)KL}j5okessH%}Vm1Y=?D*m8w_5?TGXn`e8@G z|1VMk&dVKKS&5VrxWe!EDE*0pdIEWhs2i}}W)S>k3~Nl!p>|>(!NsDV{=BGs9eL@2bSHV8idN}Z4 z^~DRnbS(BlR1ZY11_e`&6m})Ta3;wsPct`A$TqZL>DQF_4+Pz}2HCgxyMOPfJ_$A* zHQ$3DVL{MML&2-*Au$JnAKDH$@Z)(R(?t-w=?C$>zYHF!L~+MMdE|DQDTley<;$Oa z5`*%!CysF!khD1hf$c3BU6)-!O|FOCx8Tn!e>{U)4jpBVWKbZeGUlwHd)c39Qu&37 z{l2(F??Cv+P~d13NOYc}rBm_1_^U7o4{pXu7b!@n`Y}k%=A&jQVp_;xnEIWj5$CmX z<>a>_=n;~qOt#mI^ze*0)gOdtMij>ClZJmg}V=eWHU}~ zrqfl<21)DOwVePTJ?KrqO3!z=M)lma3@SeKq%>`SDQztoom3hp@uC_*Lx(P>NSAa5 z)eQVtyGb1{OkrHP9sUcM;gvz6;h8#X#ne^tY+AW6c*p@Lf^P-^R{AK^*JmHAn~Kk) z5N_U;rX1Sl?N4z^Nf_+!3%>o^7c`cY;FFMk!Vw}xmT%s8Ygh_ei^6_4^4VGPq|`0F zwz(JTh-6b}b*b+Fw%G;|h<0#@VNqH|Vj~wif;1d12ni5v%mzH?}71glUX#8K+ z4Tb+W*hGpl1qH;OnRM;2S`cR-?QjuG?B%SlS~-!Gr&q>&G3ZC+CS21MhGuAl2iU+ZEpxcElNR|Fx*E)TjHtLq2u8Vpv_>~r+@ZF&A*R)Vo47e~D`XP>&xa3a zE&m)WrhZR8wE=?jQZ9@P`7~rNj^K#^-U?e&`IZV$XOTieHF#y(4xKzA+iaBY+qy0a z1N1b&8!q_1Dj!*;^bfPaR0Gg-&x#)`)<#!tRB*TvcDFj}R-%sewLbC@UM5my?^nz5Vv9fm(WGnt{UfIbXW z*Zqa%4Qy-XvTRqpqFG0hm8_;`NQJ_@_yziLKPWeFQ(6usoZ2z@$stco^_8lf*ya2% zyOs!pKCF{Qml-_w-I(LuWk?y})v#o?pQ98RDeHp4ecm~PaH>%Eo^iCA>~oaiKcRh{rL4ftJzjK9$B(jy&Z=KST2}BM{d4}3F*>BB z?mYQKa-rXJR_et)8L{`;qyDcSx!LeVpM`6;&CYYvVi`K_xw1|dY2CqX9?VA_9-x-}yWa zm8$k7eKgfaKOJqUBC0hddGN99J7P%$&A5T{$zD;miP=a|*yQV+=tPIN{jx*K>7?yn zBgoudy|9fW8aMeKnKNS@_ASDC!sYxe4U(L6smNjcXPILpe$PdJArVvw=0Owh3KkRz zcz{+@{8%p8)Mw52%^ygYAL0Qf2bZLM$q1UMJMhO>h7?LoLo!e48%}<|G>N_j3_Us3 zMjBI@F%_HP`GY}{n@UTs`0Vk9x6&xTHrq`2rKMf6q7M~My%IOfQI3?0qa3_(x~*rN zO%Nibqi0o6K0BG_Yc%E3HkVa!Ik|@Jyr%lltFW2(`MtP-?b|vIy+!h96C6Tv(T4K% zcZyjFxP9h--56PYMqa*Qq&nNDx!r%Czp00|HZ$rzdPVa{rtQDXr#@+|rAcTL)!2XI z3~PSh_w8)_^;Ro5?%Dg+h}WI$sYy<|83u1d-g(8+{%*CLlmAQP>qI2z7)!{u{ba9C zna5|?C1C%J0WG`4B|C?_IeyxNi5>}+Y3v*GiPb1Hs@j-mTTYnu6)bL+*ln(h@_cix z>q}BZ+@&>j&QVg(@$o;a4jxGR(#nx*poc!1Hq7Wb8g%5(?L2HBL=N=rf=GV{ShNQZ z*`#OQ$y~;ld0rr_NvVR8if=KI$%qCWHqFQE6_wKy?*4#X0-J?TTkG||i%47wgMa=c zLq29{!5R9p_ic(#4wJ<>?ham^loP4u540}%?9C`orIb>~4<7So6XKC-Pi@?V*p_8p zFOX8JBGS)G)G`ilY`ecHG4HCJ(0OGy$J~^l5|hDO-i1_A#a*C(V52+slJBpRDZL(U z{Ai9AsgP@)+?bx5R9jXS^?0nhtkP6oiMEX&t)^Oh$R8@l)5rz z{deM6bUIcRi*KX}OcD54CzW#lDa^dL$*tg=zg-$=G_5d9o2!m`lfJMi5w|_N8yUI)8Alv)q-Z;dCN}ZO<8Ot?UAA8A2QM(iDUlrnX$k}KLog}Z43)}R(6MUjgm5;l( z3_0(QYPT03Tx?YLFF7cqy`?Mu8Gi?#m?M6BZUPN|@^$Q~jpDIC@ZhbQZp`*kw|(h! zsG1s{z&X)UJ||Bk+>mt(U9Rt9;Tv%AXjBkwzn_GJvn$? z`0<_F;d;X{7y1luO0xF|ahKzgi_p`v(4WTcxx1`aS=U*VeGGI74y%((G2Sk##m=6s zkHtR*xxsVS$eqeq_l4)8G3kW5e4m%_*0Y%1%%ic9s+aqJZs}fri}+slM5mOFDc)AD zl3gX@UYHK30*|O7p(S>fB4mx$<#arKN*dsQ1h$9#EcdXVo-bNels+9G=~N2Kd9bT) zmr_SBu21NcOdfh0SBF8do=!1i>r)5;gQR0za$R~szH%LMh=kB@(A&SqzfjoN3|L>SJir;KVF?l*p;QHqDI6#@-&Pf23(SapR`R?mU{V zsSYiY!oaMi$*@CXR$oC+M=$ex8rD_eT)3SRu3kigf;i8pP82OO9NW$;R0b8sN)Dbb z4)JVh30f~9Nda4a4)Z+m*w7Mrxj2UnBX81>g7w6MdJR_Fq&p| z%hC+1JU_{|votA8 zuC3`1YuVX8<w55+iIYr4ZtDi9A-gc)+DI&H`?J5KctSTG2vZw%|}frl=E?C4 z#4=duXm_$+Q;v7!y&3AbG<%BF>ax=szN5mm%5pcpv!jfgUX@HQ+NUj5dQmTsqdoY6 zW4bk=FAuiKKvbMZ{lXs&Ye!=jZAV?ZAw9R(LEAp_3oON{=^y9+nP<9GFogQ!^MkQK zzj~fzjqR14NhU#p@{bx^7tw?LauQueXYY`H37R4@I<@288Ro*G_iEXyR;6SYl+S@G z!+cAn^jDGDb5~B=p+0*$!sM#m9YnNy)7(sJ2V|>c>v8L9insa&xY3s@NLg4@5mxW2qAIEzVr81hb02Fz&eI$7=)hab zEyFeTu1^p@9ge;j)mcnaa^i3tP2I?2k56~*ult+7 ziTKOk{(VZsP{6JPVfKLoqjiY7;gV7^@SV?gPx(7FEZ0Sn%9Jm*4)gxhecmeT*Tvx2+c49_h3z&fu^PjLdfXDwliWk1w8yhzr%=CwY z18m5#U&H=EQShWMv&0fJkDTM}(INX=&mv@aS;nGh=={=mNqUDgCWc=uf^%DrT}1gV zE1lCI9yY?gzL`n(&id76k{dtjX>Q%EkonG16nu(;k8->raNB&T)I;WFkePN8&2hAi{DQ5VtO~ag-c8Hj#AAi5Kr^jN@Lt) z4Uc3U?qIWalXv@4(E|c!`9JuSI~e23h<1mBZJD_v7B(cGzpHrrP68W=HG6?i9{wmh zoq<5u}BFGki=8pohL_N#@OppRaQv#qkU`UJtLjVqviD~Npx@Rn7!KyQ#+p=e&&idO( zc52wdb8`R=fy}Ov&D%$)2C(=Kq`?!K|2;`AH_rnBo&`8E2;z=`hb(!;;V)GMo(7i> zU_A+IR$?x5Q?pkb|En*1t4{qX)l|n);5_nfLd%+;^HQTD;IeNiXSWv#;q$BehVLVV zmI;^346nDI=*H?Swq3L5ZWY*J&_(O&Z#6$5@Qgs)rOm}TejQ1et--a58h;eBu##_owmw* z2@u7$fZM}T8~puoiHjWd_P!`fjrf9m@_*Xhf3lyS@9us*u%uvtK;!DAPgi9 zfK5E7u=U-n;uMe=iZmeO_h4E457wY>)N}1#;5-oh1;!(RKtyXfupd(Io45qF_qW3& zAdIitn_K<}snJY8dU>hpsxkP3{X*_zoz{vS+hOA& zfcZv1W(@m0Pg$E4JL`F0W~4}vi4|-eR$$j{{JSe;YZj19i00E_BKNGG$O)SlJ9@V% z^+W6F+H{=;iV%_B5Lmyd2?X6xR!WZ%9z!#)S*U1FK06i1_glW%1j@$|%hh`Ub=-T| zaNGpuO&k6%+zUm}sDC(&@$mU$SfragJ91_9_J!DryJ81#W${F|U>2pjLr&EQv=B;Q z+x3DL;)9mbPjD4G+vW=L?YnQtFEJ3&aQ|=*U;~wQ2~`xIjb z5IT+o(YdB=mth7Na-!M5KXIsAA#`qDEF1z@RrCnedllZM&}R#zIvef z^B|5wXiNtXxJ5A399AZPq_e3O3)EUq@h)%rIe|9_va{R}Tz^OwMcJtt;66btkaWGTSas!Yt1 z(4l(%B^ad+7#H5e`P44^Hv81wL{)|p)@kmqNl~jQ&_(_XD_#+KmJ+%{IB_wCLUYH5k$x4doK+dSGgUR z%mwDR^pVYT9FhdRerr%O;guS@pBS!Q~dy;LXJu1kr_n?&xifG8G?YMMqN# zdFA1Z(TOt8W1dM23;oT&(b39irF0G?o!YYYIY(ptHrwi% zxe;QOP=r2D_!N36l89Juu@eZ9JCJc{y$ggOnGM-!cfKph>u=W+JU7jM1_!vE0R{K$ z>GkQ;Op8E~$lY9^&sBkTTfnW@&8;~5XCFqm!yF+}Ww=K){`CTjnUnXsTBEuRprl~bFrH&sTX6lSic3|hG z7)N>x1Q3+E4GJ&0gFgrl{5S3uJo~k8aYvT2VU40Al3l@el#K>&tt_-<^3QN zt`&Gg%QLnM92-}R#uTHIQkRmn@+$J*tQpgt8F}cW9W4_%1x>391pud(#x1Td80v9q zdha%H$i{Iw7LU#2&PYF4D%bEnPA$lrj1>rHZy48b`TWz^hub-)XM;$ve9(y{=tuLm zqDuqcG>Ya&X|2vR{bwvndx(n0CY$9}x^Ql7)M8R!nx>cksd4x(OW&AdXVcwdr66w1-Dprk2z^=mxvv;mv5 zRm$3>ajV*wOdDrZFFNC9X=Zkg((#H>DUx(PzaTDCDZ^&u-eEl3L3@_!sL-7p{bIqY zGhnbW4S=Ssmg9!=+!ZPfc9&4JY^nW37VD-nM0PhYJb64ux+-T{&haX(^qazY=5px- zdgc&e`KFws=9d5WmQNbO>u784<3`)Q?AD75OFOQ@uGo$h9Ls|? z=PX&26Kk@FS694wKGR(Kh?6(${MRme`{f4d`#KH}IEo&<*Zf#V?TKPaW3GY7h<1dG zqlv4sD%j4|%Th5(L^tBU&4UF!$}ily{(K}ZOU*7FKx)g1YP&ZLcLt{!RtO`Jm2(;| z8r|2Lm1-Z4`4+u4JIV;YaI4_Ee_1Q4-G?#W%~ES+yw3UALiR+@9KEz^QDVgC$u0W8*xcLj^%mKu}V}_zMN;cELSolea zCq377+EnXHv^xNYWd2-LCB+n_1913&k{H_Ur8eGGUh+q2tboJp1}vmC$Tfbb7tV06 z6{YWZo$1UlZ|Z?6NS|T$P;5xl`uq=g)@OZOe%;WDEC_K1iC?4YpAi|Vz8Il`kLqx&S<^1noIZ9DVwCy#voAB?XZgAK7Av) zEw3N4-j;R{nvb}31)U$*Bh?<1l6`Ok0Y|jI*W0G7l{Dcp{lC=vTw@-oKca|Vb~E?U>~o0vLRzr zi#}MAWp1E~uKMDhsn@K2KcdUOO*pG7`ls|`8dGwLa5vd$Swg0#lGo?snP%E$>uTshxc40}*?qvRD$ezzmKVaksu_!+`ShXv zfj4eV$9K`=t^bBH49tnQqnTcP;fMw<^kqbTV!(m5ZRDMt?@Q06&@TU79MwwZw_ZUj zg4L(3_+Y!ais&19s;ZSO=Ug~W>2hy&a=_{0xAjOWPHdY8)vsyh z@#u&46h?~fkrezq7kNHk7hW(9FV{kc8=`QNT*jg!HsEgTmmeSacJMu18zw*;Df|3! zKKCh3ZCDXu31gMmF*4JIojPNRa}{0#GvS@y4}8BNA%2C~JK5#&_q?r#wQ(k2*D7?G ziZgWw%#7;e8fk)EtoM0rO8vHA9#+2y@q9%y#bvkf8bG z89au!Pw+#>tnR){;N_fTv=lSSKl`)dfs#M(tEK(t`Auzhbx2dHwKwY4eDKarnxMGe zRA}n2Bw0MS*Y{|vM1<61lH6B@6W*oR(cfiR!Q5aeBDJv?&oXr&QV=$tdi(P)s;XCD z9rJ`!UF|5659_~DOBuVh2>Z}tC7P7-=p+(GhWrU!Q{E!`^d=O{AHIkQ-nIzj*j8z# zf7Q`q!<+MyRB*8>tnLfCnh(MZe}WQP)v&IM*h9BNGrj(jy~xx$5?h&xJgn-a$A5^F zn~iC`j$L+!R8oBPYM03b>T-5X-!slGe~xo?tVTD0W`k@83WLytQ(Kayod^n7Zbipe z1h;YR*Q;2B&WdC2>~DnCm$ff&NW28J7+blQr)~Pir$+=|kV%KggREaMbU|M)_VGOT?@rRY~@ z9_s;vaDrX#kd@n-KY(*n!|%evSu(QgvHmVyR^6|2)v+2lr%fA7hVjNNLO7{#R9+2j z)ShrWq-{Y`-u3kRYAzPNgScCB*r9z(N7IhC>Uq?L@y|5hhlh`H6e8ZrR&{i`6qtB+ zBp{hnLySMV7QX4sOwrjU`}2~h&dTw?1aFxpj|9uZjphzLb-2C5G|}nFs(!NARPOz6 z9BwTCB)$Q2;l=wsBHfz~>qGYU3wYSG6Xf2EI^G|N^|V`Tux4to_Bo%BA=q;@mFQ@` z74ZCL-Ka4Q?@8zG1wGxnF|_6We=TZudar!^($sIqJ8#%L%C&Q9Ayx7}Fe+nrz?A>6 z-tUY3ra0?P{hQgruV9u8p?NMEWoSc!k3Xz=%biI%+%LJUSj6zUoxj;PPo}wL-HGR^ zI_ez)skvK-2m^|Ok^E~xbW2sAZ`RiA3C%X6Rf`y6P~cPe^hbiNo)j|>FG=jBN&dIL z`>!SFLWp+>R9ch9KhF5G*95^jV8VL)iSF(+({q*&bsN2Hpc@OgnIxPanqWpTdBes; zj0#mahxKVUsWT$;#&qf*P*;j1G7E~N=OhP%0o{i#dg(AAgIf#MG>p?QtE(v0;Oua`6nsa*qV%#`%{U%n>%SK4?Zv|$vIKesnm&rrn(BaHMDl7 z(W&Gf2kz0Sj53x3oZhk2%zsG5dd+h4iH7YlT7rkHgq*9MA9_mqQY z%`;eO-2HzBV-etsNxvYLGf82*WAsG?gMIFO@U6Z@N?TohKVMQX3vlPiPiK@*YjD&g zSIx_{Yb9n`6rIB5RB;kQzhU3oRqu;7>e?bwoe;mbu-%N)4&tK;V%n#LLC}$BQYD^( zec|EVz#q57^3X2|cpD-)TJEjXSdad+atp{ydc%R1+>49bYA8`&o<1;$ebV<1t-$zD zW-q)yzlIaRl(C@LLuij%m9vVs#4Bk(QpF2~BW5wq}Xl_&Yy zr->$FA56tmHfP)&p*SMDb}U0cJ2SzyI9W6b^BCU_2V`6q-O;FsnS0R|9{ z494aff94rTIHgM9886puxhtlOXL@F#9V~i?e)MJH9eYsl;|`t7ClT9PvA8^4!4`H6 zOw8AMTc#d*%1MMjOEb+?u#((<;SYnKTWsolLd$Br7p&Ap`5(Bf1z)| z_PJiEzv?_`^q#v`8T;Z43k$};Cy8)pI|cDAOl;@5s${dc{nZd8M}>x~2Y&~HE`J&K z4inxPw|cG8l$ShPEO)97S4{c&TT(lG(N_|h0TJ2MIb4UTGfNpWgtq;>&YTA~+SR!# zpDMt*3GXv0e;7YYjoCz_7oDqEHd2Y!i_Xe(W|8(RrR22YJrf4`65sYFWhS#y!w;a$U-DSoZt4Xc zFSUfLu^>sq^zgq%jt8$!qq7ZAy_YjG_DRZvJif6T% zaKU3?v7k*}A4n@slvq;K?_78XV-;DlGcN0+=QTEWLfxzOT+y3=ZlBc0z`f~*K>0x2 z8swj%cp5)UeIb86xUWaj!k}j@QuQD~V-K8gri`EdWuPHo)6ie@lhe)n$fe{*&&qu2{^3Q z$`6T?4Vwt^*-`!;--{3+_<3&P8E32;X;2{iwKxrWFEM5lygTN3)Y`P7^soPKO*>X{ksOoHKFlJ8E?LJ@Js_+rB zK<5rLGWz7zKqzNRk8L?qTGSmnh?D6bc`Wx1C)QNu`+JY@e9}7CBgti7zF)>7TkbVn za8mk&Y{uwRM|D=8yD@-Mu1}L;O+8qvEKJQJhvwo5_nhY+SM1}+xpho^ONG)*WKsK$ zSz*Qs&Scz^ReE&vgxu{GcPYuJ{e2})lNr;n zff@0Vl?G+CA-SQ_m&G+WVmENa z!D^#A#OzpRyQOySO}jYnL;kj6tK!`^krG8pJSyzvx3nbOFa1I&O%v$8WofSdC2m;8 zL-C$~W4BpFZ+sw*5#PF8@#dA^9#~@>T)O9pJbS<af%DE^NhqR~c|zpF7AWT1UJdnaOFA({U#>b58g@9_?IAGOK?L zd88fR_oyf2Z_(;>z4@^~gfWM9X!7}QMmg_(Z!*n}{JgxE$V;1g-m9W^B}?;kg2kCQ z>yt=py|&-9#F%mzNzqY-?`VUFT895cc9F+6)6;K?Zfc0`mH;%zw}4_D?WFwW%owj8 z5F?Hj443%}W)ivf5szgM@sLhw=XFS`Peq-IZpfJs^W%2 zthHTWj1H^e?GAd`^_8tK=1t-N;O|6EoQsn6O}5)@xO6=@b9$L=Mix2?k&dgeKMgXX zSU!9C>YPzalvO0TZf42J^Y5_Tp*kN>S$mAqRBdn#`*~w%F3(ooLJR zxtL|VdsGjrx}3%4Qg;@suEOfdIq6h_as2*kD;c^Ookd9X@X0M?tPT5xborz1vDA2N zvx$Db6R>UgXh$4WFhT0mRd-Za_EyBMex{pFo?n=bEcWh&#H8;-XQU5MrN3@`e4|CQ zSsmx1?lmYqMrqPcdC|ieefGp|AK6qjs+ajurR~rXW6AD5g?f?dKxI(EZ_Ry}BSWFzYSEbGaM0$}y~Oz2df2;PJUJ^W z{WU-09wn&$qtK>J!+R9AeUFuX{;+wu=JM@kb;}yi!9x>IRM2|8>0P7li}vfXYH2uC z$V9Uqg0a%m8(XYmUuBLbuw>*$qC>Z;i|hDn#%!whXw%OIeRUhQ%c+bT%G#Mj!MX_L zFP8V5m*M}g_m*!__FvfVPrXqDTM>g$LTQvn2>}J^ZU&^g8w3I8^v_wXOP8@D7$iIW48qwVbc>l(WI=osdMwEHZ8m{dgXA<|%K^gin|($4=4 zvpjX~`z}-!pS^pqmfZhLgGa&t>OFJ&y$L_k?mtgxpDi=u4ZZI-jVx=s|3U^e%* zzOVM&u32X70iA)Ik_X#N^=19PKe?}x|40+RuG`2YL6`WD-ak|W_}c#?YeHe@wuUT z?}$}5XqSfO1*avG>)DK?w}YE*eBQvU+={xalh<~aN~@HG(&7eXdK9)(I!}! zIA8gka(Rlk@3DT^zV2&3zr3*u@-u;kDyCm7jo?u(+dJ z=Jj^QR`Z1BCkSDW54&_t8lb2Af46bduFh^I`tHN~c7DYz7tS5VeKbNJ9TWO;7563t z+AprHx9qj(c1DgDjXV8&d3L%&N=dl%T2ozyR%&f%0c4@I8 zVoB2|mo`56OQ<0gfo$;asX?QWoPBX#59|iFk)&jZ5OjHvkqyyBKB$-)QKdEB(^@Hy zyt?;?>|y;|p3t*{wi2ziH_mN;e{ERuXwOLgPS}iZON!Om%F zX}Boq`cL5BCpWJ3;&Vz_@_cLheZNH{UuIx(AW82~?(NQ*J7l|_uqi#j88MtDJM1qR zmM8scL&EW|DMrg<8>g4o3ZNf-!bn3-b-fn)K_>KK!;%F%i};jEoUOY*yG3h}6@81W z$AY5LBcGH75d!HPxo~+C(%SW(8uueNM+$OO)GaR-z2L2lKlvTuk@Xa3g})dnela+A z@oV8O&AC*K-kxVAHU zX*5x#?~_Ojt=oQa^pC0uqk}TVN%dV%k@8BS@ylN??m>HIVfl>AO4QdK3U1L$KWSw# z6($WaJV(F=S(ld%zuAz)MY0=p_7zn^hEeh0`RTSdXeIsN>l|EZ&fnTnY#My>S>N^y z0Quvx<*nk3NBq}mO(?vAFMir)c>Hmh;gK0;LQPPM!8lm|hfl+0Us?X`u&e*GaC<9} zvvm8+Ejst6ZQ!320+B#Y@^gd~Q|6cB29e2Ui&42z*2)%&=(btfMV3)QM{L%{WIYJ< zz58#<2JV=}dkR>%+wr6KBnf!i#x|AQSe6Vd$zmJ5wYf51azPhaS;ScC!ga>7VaU>; zbjyk3Jt%ht=47Z4Dazq1alitd5`n8cRUtXKsNK77J#Ep9#(O{i6qi$fBLJ-6#6owf zUvX^QH#TzZ;8zzB1wB>r))flA@-*>z6^d^ylB|QHxr$XI&%CDRH;Cy-WHCI9@omBG zlVeW9mLL8Ah(V@L(kYVoGP57na=5>{GnnCa6zxg%V#lYZ1nv_Zpnrh`$B{lafDNI2 z?RzPLU6qUTOMu=>c3HT~PD~28WVH(YslNT5jWz5#c~^!7Ay%LnZ)R>2RUi6Na&F6R z(d3DqX_8#H9MW#1GTYRe7)p1e{iReX=)&GwG11l)%8WCA#Xmk{i4DR`!h+dWFHS<+ z0Yoyrmy#^%0{+qc$!y`~`4VEQW&|&PoA=WDZlmb#p!Oax(InMOspzwWySpf^XdRw2R&JZgM??kN+^Oz}yn}Lelc3PlMj{3squG85^ebme_m(23L)6 zWp;Dao8bYz#u)j%$*)uIG=1-ZHDxrRVkXA?QXfZpotTYU?>nv3OM7o5Wwj0|V-?KJ zjB>SJ2Th+*%Ic@?wESEb=RyPxUEx`WE;9pwX?@c^O3wqr5OY0<5NI|?+De+Jw!*ofEu;mCtq*i#JMuZVdNzUNNnk7GaKsQJ_qK)o}++7WlW-Yvy zo>-)tIkt(DcnrmuQ?Xph6`3;1dYYTXmr$!t zwmCEQHTvn+>*#3;6KOe=lQ8G3-_;m!phPY(B;Lm`Zq@oP45`=zU+bg6BT%znw2>}r zrGMD`{ueTkB;*5y~P--!0l)R3i1Ox?mH^*EigUn8@1|c4w04+YC zMi2{KuvS-xmSB?zXm35@hk&ia$E#v4%-Kgzn-`<>LsZz$ zL4)IBe|zn?g1$dOIvI=u9~rb!x}kcE#vDiZ3(*3WZ*H9~#db)_1ib5wr(*tI35 zQt23akLCyTLt}sYtR`mVH3?x`4*rju>^aoP%}fcDf2zPa5Kw89`)`Zyj?;vDox_0% z3#!1BfArns^rw%aCFS_HK$?%W!1UOx1^@@ zDGvw0zovL9`&z<1Z1^6yr66)HO!)k4XQCJ2COr>&6DfG@(rn^A59X03OnFq6wN~CD z{WKju9nw#P2VB4~=cgp?NN)4}jNr+7h_UKPzh!qHn$SC?vKHj~oz?Mix3C>EY&IuG zzR1&qg!q*sVw0iwDzE6T=}Gl>Gj9}5b~!tF?-*qJcBotoDL6_;J<$c-{t%$3mW2^2 zCsO9^m>$%{k%;$ZSYI|150cnL3w4O_x|z856PCv3`5QW3jMLkwRvTXhZS+E$xlbi9 z1t!h`+!h#zNVtiSZk-S>2i-CwSN}SDvx0UL^D0b=`bQ5vTAl;wEh%k>@?_1g8SH+O zA%dPjNhEjdlSkh0S9N=aQ`2B_r-9^=Z-CkftN>;Se?un z3sH73-no-NKdy~Kr8E$ui zsRwYWAcS?@B(>4)``rcp4QUWnDLwae+YwLVIIO5jOl?mNz(A5dQa|c>xC}TR_Cc7_ z^UCWS$l#%a!6PP*@`LYDt=%9|m~5dA;hRhHsRfHsC=)VbX?u|pQ%WVsctZN!REXmQ znWLtqV9U8C0yvO|XJ7iO4Z_E<12<|t?;j#p`Ac9Wd?_xE`ame3eu!8%fL{5v`V9gf z-Y%;aocH zQd0lO7-cH$X#0H$(Z6rko*u7K0_Apmzr%S4(3(IBY$&}8aCU&1-tXp__;B+Mw=X8Y zRwLOGMMIkC>wWE(J=Q4M2~s)YrYZ{W%zo=qCr*+3^Z{=-5R^vZDrRn{;4Xn*LMB`P z=`1k>Qbu+Ab5mP-yY- z9D;Wbe#=1k*ukB=kyG4p0C$0TRG8b=oY03~$6;MCED`G0@t+HV<%@Y$T8ei7vWo|A zwi7Ikq1O?MLb0$LKysI0R(|-(1$dRmOoX3+r67+2l;1GohC+-#aZfoeZvna0djWlF zd62@~A~f_Wd|CL$b$f@aIAxk(Z0b=KcZUftL-8~4<BYc6C+GdF97D1bC#Hk=J?9p`6~G{t^$&bn8B5(YXdKw`p-`T zAm^q%{A&DjW1M$}fq8GMS9XyE3GLIJgpLTZSB~UBPlh>a4_zMswlZr46Lr`svfTe0 z2=#yvm;gC<3ya{fwH~Ca?~6)EYD|4*%uD)iRd?(pL>(BVEGcO!l?1fWD=*Khi|Wn= z>~GG(2wkZZ-0oBCyDBaehg57HKWJ6eqaiq>8wPzR*BF%^crDZ|ddpuDT0oX)4K^ec zr*anN5shM)8V^xV-<+VH%()s*Fh)I*d9p4oxzR`<4V;!$gld_q4vdVrw`rbG4=i^h zS5!p7`ate89q=L)G9SNA^u;UziFXj-d<%NzK;4jgosv1SH23;kbcdMWf&7&yV(NQw zHuV<)em`3-BuwtH)twf;BD@7Avcpf*!E$rDPby6-mj{a7QB0j6xOzB4DB&Z)9tWH@x%+|#-61ehyp}n;q<(=9 zL{<{0KWm_XJcpG6F)xQncaueY`A`W0%|&m7H<=NKl(iWoNDM{NJwSfW)G#SRidSG3 zI|d7~>$4d!jXwvzx+#-F6CILM$1ZX4dTN@>mDEf3xdNBipT$MX%j8XofXdco;0&oW ze{bk5gs_P$UtD)t6B_6il~9$NrF6*AC9)GXCa>ixmd&1zPEY@Wi(TCDE?%S8iKYW~ zCaZ(~8X(&(0dlxbEpb7w;OJZ@pc|Dh-FaYV}b$yiY_p3@LAnr5uFh#E&Q&38f}t9ZWulI2svlkl!L=pD~G^(wE8b$?dt!T zrLZPCe21SV=yBjM7#|3U54E;9W!3C-RalcRNPN=bfqnMVxnJ65nHT9o5KefSe|ic# zga~9p>FX_^pnm%8q&0xw>N)gufUalPOzzw_jhtHyBT;kbhlJlC;K5aoRd*V~wz;vI z=f8xLK9xR%T1SZE(!f{0Vx#tFu=LU%D2fQwy<<=Xl{XgolI0Ki)5pKaO; zQ#AkWG$SDW?=)xe->m!NO}wB?s(32r7(SlCy$JNWWf;YMQ*a|G>Glmif={|N>0iG4 zLy>W}MdsTB`x}vUBd}6J>|nQ4y-Nr0EG(gwFQXo$j%@*kpcWDo6j85)K&B`#5q%EW z%@vMy;OKl3)c+THDtl2{Xs#!nnAhAeU>G?p9RLH4tf-2w2D%-74T_Q3{)BT0`@y@{ z&p=nDe{726Z#;PSDIBcx--wa3p!h$Qb5U?M9<+p0epWOBNM-NZ<035C(oz9 zqRTWw2aHU7()7VUnaPc;wT36|594KU@W{dye@lg+yEGYJ^%>j4I7F$akW z8s;YjsqJtJvJepH@-?`-t(afAx8?;`*P5*!NdiBj>gfp0*RsX^s(0FBG)S(o^(_r> zSGwMf>;Z0j><3$D87A@32X{i$)Lb( zaF-rtYPr{R@NG)j31!jW*9a=5>-ZuES_f^7a3S_6&m4;U28#R6 zU;nHjx}oKC=d&=b9KcVuCV|KCs`*q4tjR6G%baiw021>W=yEY^hMzT4bzq*I|BKd! z<}7=2ll$LaG{!vaQ+PGP9uf7$QQB@GpvLYKzQ!D2qEpe_e>JM@~|U@Hr3n*sdmk1NIfaH1`x z-sTanxn7%8X_f$JbHYVHP<6M=O=rpzGkPhOJW_wNLbOPo^ssp`qYdSvZrGhbi0o|Y}0aeK=fpvdbGT2g} zS7IFu$OnKJo(9W&p(-u{))xeg1H`>h;56IM`=yS)vo*- zU&rWEO;2SUD~F16*`JQ&{bwUU6Zr< zI${njLTa4_kEU{W`Q9oHU$CkLbN#R**)zAJ;nfqoY!n%sOLfO%dGd&8>$UaFD1jUBdnl@k{jhg$pTN z-I#IrO7CfsiaTfpb-yrZchg1d#HFLvHN=u2mtR{zj>JY*BKQ%)Xn*uRFwF51o~Y;!715wv>a^j@|tqsDn!yr3*D*6=wot`Igfo zb%y@xu_Iez(d&h2_gi=4kG|E>ZWp{#gRZ`(O8YbB$q%f@xV8I+p~wK-zZw{CNT-={ zHkPG@m5~R+$$}!82EWzKmxR|XYE+~c*PV%XzxsA^v@R&V(B^MnG^^!@g#~UKligXr zn$iRKOgr!J>wbRn$`RSFnjR9+T7vP@d@9)NWhAfYTtT z<-u$-jMoQ8u` z+*>U8^zkI!(F=hGlfz#3*=#%ZezEI#z5;AE@~AnGhezYMx*uWA_^<%Fty{ebh`F}? z0^Ot&_@edn(-^WB_TXrD0GHnM=`tM&lN zAu4tMiN#1@MSxeGLF19Hi=?v?M*S{(0uf@+F@FjjG+Mb?FI>7cmGH2=VP?iCHN_p75$sk*ZI`PZKDKIf zzwJudiJn6y#}iz?k3Hu+8RfmA0izYydLJb>HJ{6tLZhGBP4l8Xxk{2K2_D4E3*B5rRe$u zrOcYov`2^SIg78f@b)ej08lsEqquHPqu3}2z?3J@U4Cy43@gV*Aw|j)6#gO}J>0ky zW}*suMdBiPiQnAkCy?VT(;D*Z88Z5NVC6u{iF0rtgJUX^lST?bTfeJTYc+H8)}a3` zJWFnPS7+eM zIHwE0UENLxWtUa8?T40EomP4eJI$QGA7$>K_O`}069;D-cMhxfehW~u?(e?A(5 z`#y7QE??2V0SAXqeI(@ye@D-%`GblvNNGh17(JL0dQRu+QpL2`g*R1J@mDA5@NPAy z1e;GfL1#KS+K(;4nb{yGH=_wy%|^ceL%iL=eIwX4;-yRRsYmO<6Y`shfZa7Zy<$Z8 z@JNKL4-S_@)vJ|r7n|Mp-R1A^`4+(4@s|ozFlfz7e^^($u$)B-6rXb^C}P>lA94vK zn$hR-oGzZ`>gfVv0Bo$^;TAbu=jEll+MC(ATf18WZSP3w40qf7>r1A~zH2AFy(;pk zd}bX1`@aL4I|rwaMvE48GUInUwzyWMY745z5^PRlF3#5Ru2*wEc8RYtI^xANCr%!> zFDzQ%SEYD%M=#D+^RFy9Hzgi+46qxI@8eELm)J^&6=T1$y!u=M?Y&A+g9EDMI3NRT zC!4}`0*Vd8!SFPy6sC+2g(;y-1(hX>2aK@YO9F!y(qx+X@89pDRRI))cCww8$;{AA zI}l#f3fd1VU$NSy0ecf}o^0`#FVzUVlfHZ9qNnAi6F90X>|w^ka^z z;F{k8jKfwygr>Kd&EIak_R7(6iu4*Av22M>iHUqMYvsw&tRN6HH$i{&fYveeE7&+; zE%RLaaiMJkcZel?URaeqUYHx2n^vjvJBDu^Ju2{Y?YC^M=S~&o`Eqe(!>+3Hn6)FG zGH2fHPptN6%@s4ZZ5{*ZPLXPEl=JbA1(w77mGVxsaouSpzSrITRKKdmFL84Mrs`Iczb^v9qNTquHu_;v#ct%kK@4{FmOtJ<$!(#H&;IkWhH$7HQ(6e%CtkkkhCo^d#Rtme&{|M@4SGE;;?Ob=m!AX zbho+)1YHo`x;j~RO37wLg2OIBYYCUrR#4R`{)2h#3I5{aQ_~Fs>kz@&QUBRm_K7&> z=J@@Na`tfwubJnQo$F=?!kGD;oL0wlv!&?OK>mis+^3m!%X(Y%z1I5*tD8>by_56O z2YHe?rkXu|c_|N}pX%Wjz(-u5`MvY`D&O;AKYvJJ%~H;)p)HZ*B9r^<$2MHBkfIbQ z`MlQ{A~<*Va7v^X_*8LDvBL5wB&zUG3FR;h%A{rRqP=!SwtRXB-^M4)O4qUe;@bBb zDbxLms7C;36St(LuUKcl{IEo2EM(!^1H@#U^hn)+_OY@&vqRvdArMp$Bs=iWp}{`A z7)msfx*bx_zBjvDe!hND*q>TS=lu3P$PJAB5Th@5PNpONc_e`o2nHEuuwFDVjIJM! zpC+7Zf=S!A)S92j$fO}gdgT%Yp9=syKGH4!xO^8~-n@|}9@-Rizbq(=C8%9h>Qg=X zoyJupa551@EdV(nC7*tbM&)gYGb(;DZEU#em%D?)r(INC-ud-@)?!z*%tzHp(Ck$i zb@kYs=hXet5H;N78n+uoVI^K3b4XU4(b;Y8MqW`ldmZD3es;8N<(EIV;5fIz;>WV+ zFlQcr71clSM|bvE6<_RhcRbS`chIDpKVSnzlxb=1QG@(}B(4ZyjN_;yo@8BjR|_Jq zrmI+Dn{F#%@*}Ju&{Z^rABqGZhm?IM`bCeae_;Bzf(l(S4~@seY;@1LoIzbel9zZ- zKvF7vEr5kX(CkJVtFhk@wF%6GhsTk8?K$V6`f|1nUFp24o$y|-K<+5H658d(uZ9o9 zd4Ev!JXIPUpL@-tfA;^#CvUb0Ec4sls+@;#$7eHCS12wCzqDL_>|g0F!D|Czhs_C8 z>(*|C`@5q(N^V?+kdd~Znx8K{kL674DVaid66Mg-ymjq?`st>gw3xeU#rxl7Fc%Xn zuNK&0^$wxbG|+#3drc4)LSPNrVfv|JRzZ7v=@t{vgnPgE#MxZQQ_W%}WkIE)@oz}` zn~Se)PRdDWjfgvVnzk1P3R5?|{iJv~wTd5A|229K3#gtP>1xNLlgM8hayMtyp0;=| z|GaPo!(7*rEqO8HI4M$^PS0=!4PFB$7>ag}o?jwY4;C|y4BdwUBR!Qq6y>f^HV0Tt zk7j4RS44&Pibo_@mTaxaDb!zXu4R#V!uI-Mn+!!N4=)xx5bqdfznQm_&8JsQnn1Zj z#`D~|AHB$PY+z%somjfv1=3hPrkY!9En(W{zY*M_Z_SsoBvv?EB#xF``J-0s6+Lk2 zG32t1*ML5Q#JSp;W4BhX|C3qyy|(kF`{EJT@din8rc9+`z7W>(n&*`|t4eriqrylWrBWjC^Y_}?l!Jl;DRW77rG zs4J)Xkqx5SdtdX6m-v#MGo=sCqL3{y-q-?|D8~^8^azN8=u2q#ZX!;L12>$ZS>JytYR>%+zPg{6>UBzE$g5mn zunP4UGxSJ}dW3t`Jn$?JDK=p#-c;oVrm%|th^D%0U9+vSURb=%S@O^dD*N`C>Vw@y zgB_bKB&RsGjONB;wjB0)S4`^p2!E!VPxYhon<7z8ca87#{eiuj#=vpviEDfCa&jqC9w#<9!Anol zy_X~IJWcryju&pgzbz6LQfSDoq+JpcG3C`xBbg2HS%d-Lm{XDNIpFMhP(GLX05_c_ zFG&>^(i~{=;x-Snqr>Njs}UgeCu&K$7Jb~Dy!YCJsgg1y<1UCu}p^tHIAVm*q2S`4_^<#Nv;3q7=s|Tw8}5ybe2B zLdWk;IJQ1dm9=yW;!&R%rk1rbo2i-K;SN7v7j4(D!{0e(sMTrAHNRVF@kn7F`pU71 zX6UR31_gpkqbZe3E~W|#B#M_?2vUTau&W;T9*|Q2IO2Xcmz^}xfIZj-l)h>;zG<|% zDP=1DWj-Z8Xf9ee?nJ*|B%QSlHqHd|`}OBUn&s}4UiV0nC@uBJ%rNv}@~BSc{&y(C z-f!W2J8frUl3hH0hT69L42omtX=4L@Z?UyjtIykYUEg!Krwrw^R|rY(c|R!r6~TgH zcm$zf=b!JeJciTWs>)o9W$oYd4ovG$#U8Se(Ml}aMxEdOY4*Y=NY-0is3VkAkC|Fv&}c;_#&`lXUZ%RfZV`j6K+LqlEsgCBNsaX3OHMY=E}Ms zPwGeY2Q44c-#V}dK)eCn)2eYuEp5WuP`v(Xpy;fY=3}h-$(8^kTxhn9tG&h# zH!^oA>}Kkm1oZLZ$CXyqb48{fGJvTAf=BHqRmsx?$XI?>sQME%7GANefAw7iS9FQQ z;y^8!MXEsGFl8;0a%MEk(JM&$c{?)Klu3jXM?0-}ZW^OuzIx_MwdvWb;ajpat`tie zJIku-(FWNu7`gmPwPL*g#j=kohJ-u&y$~Wq>u}XJsm89XRDd=)vN`ZtTGzn|@L&5P)ZOJ9W2^aBzbHM`{}%3*s7V7Om1q*v`+YN`m44x$0}jMj zK~0c)@~S~GcdeA@cFNI<2*ZpIi#x5P?>k84|31VCue+?7{lG^?Ff8h2h{{htoH+02 zDl;M{EYL(hoBXN{pit7Gv$S$A?|Vrp^1d>3I$sp*MsJ+xa8oyU@X|>6dei+^87_09 zCl49hBRK#*OXq1v}zZaqM#HPC=1YC-hUvr6zofBj50i*bNr$NF4xG z)tj6X(_3Q$&P=fWDa`}TI4=BVf&WSjmW z3U;F%vLC)aOULyxTknFXt#-CuhPbkntFxt6bG$syQVElAP@)XqdGgqU+s`$xaY?_O zRE{i0iOzicJ+@IcPkajp-25pq#jM-d7vcZVR1_$3)>K$vS1TU{)tT+e2G-6Idr{a- zJr@b~a__R0&i~O|!}-V9THv&o`|x(Nr~tXE~mYRLGK^KZ@0QbDWni46$ zuEG#qVOv0v!3T9G5M<7tVNF~pm#B>cWISw3(fit7$J-EX)Ae<*mvID)VfBq7zEgN` z>ZPjthd7^=Ar9E3zJ zLH>&Y@ba3JQ=I0ylDEelO?x?{rc>mqSf*ot8fCEv*=$HQGoQX(XwsKv_T!@^SCY17 z(Uf#-kK^S@(#G36tuknpYu;m#K)T9eDJB38kKmp ztyV6P9K5qAYLH+pc+-2+0Bc>5Hh^R)el(9@8+CgP4xE(AJC8qxVGJSSODJjW{Xz<# z+s=~dB4ZhE4u;%fT$T9*Vzwxl?@6vaCX~v&Gj)}uC8??JI~>zgUw+fHY*po?P&$~0 zBRM<(pQf=O?XwE092u2?jd#D*-;xS#VI=BN``N`@Hlj!9+5fj;IHi*CD_dUHZJgo5 zC}wnWjcn1H<`;=50=i1p3$Z=evlDA}J1AD_O-sAPiPl(6n( z*5)iaDsgrn297*jTE!^B_De#yh6OB8vAD`$5QGirn1%lclze^J8n96GjPJUA%^iAl z+oPuu?=8+xrZAleGQ3shL|S1TqasZfMZ*7e%0GhZ8}4bg)o5j*QDQms7*{(DNK%IE zN|E|1dA9Fd9>0upk*Iz?>;G`ppF>uO_u%sry}GxvY0~nj^Nw`93N7TBRNJZPseuG6 z72$GZ5(d2oN|Cj#K`hcH^Y3UAE-kA$6+DlLGStcy3Zir786m4Dvq|C|xSUy|;oG4= zDean`E}WUTbH1nN*Zds^OCJ1?lGeaKT*{6@k^)hL?HV{auaI|#e~!V3-$%Bu#eD2u z-tPT6<`r&brU>g<&*Q!@h1uCl{9%0B8N+gz=egpCsX9v9c=l%7{z4^c61SYhIeOK# zxH;K+hi|Dp!4Ik^a*E3MbE?i(2lA8XD~C1RCx_O2o5$hHwcLM~yjI<2tZp6(l!@0# z>)aLm^TjLihP>R%1m6YX9S~LE zu0akPoz}2aYn$`^^WoK(#WYB04RTT{X;4)^%KI+bE#-`Dwa`D{eB8kCxH^To2V@-|SBc8Y(Xt(sN~F|>d`A-~G_9s9KNF#l`}N#kS% z$r!i+zI-eu)7Xe(vuBw9`)BQgCV5^&cXGbw4;tr6hxvL+#YrENsB${`TeoK=*DK(M z#{Y#%)B=#+BY+JnsR~#rD6tgcBluVq@xM>*#=wU6Nz(ed-J4h-#jTlCfT) zI@_}T+SF8pf_K*Nsd2pGYe}9(GV&{weu2F{*RSxrn$HAy@v~@0+jj5XU-U0ic#B$9 zrN>akOFVj?OS>9{mctm?WEOOF!~}Snx0u~JszRd)R(OAuqYK|F&3C-vm5)!6;VbUy zso*y0dT_pt(|p=3^iP^U6wuGAwo3-9&93&bJ3^7}MDVopl)9VvHMZo6Yx5_n{gb-6 z`hIy-o9gcbzWGXiLC%HxU1kuCk73s-N3Y`J0Z6V^M=elO;Z`PEFT=;k-{ zZwaJusHK+9>YBS9nMj9-s5l=^>~WorF8@X~TmN-NU6Y8G>i=h2SFv?>nzYc;WYL)W z+O?fH6oNVh>A$zXFvV$@IovB}SBYTMu|zUw5KJAfsa`MaunE>yyF_hmS|g@nOj~R#!26M*Nc;(yRp##;eD7*SMaj56FeOKS4Se!-;R(q*%JSKo(mZVbs@VT<#7yncV=K9k?=KTnD8G2l4$z z`Z5YZa_P^TIj(!05Bk*BM(nbG?}EdHQ?dId(dXP}M;he}ZZk4mrjOV_CueT!ARxc| z@;ynJ<^Rt4mzsYy9=tM9eZx#P3Bo<~)f>BdfKfkBZ_>dk`R5{H%kynibF0Ys<7)05 zhyU6@l+B-4*)RFzmA_xBsa2S*^v`QVL2V*!sAy>zc}=h}%_dB?JnYJe)bA>sztz+9 zJ~fEl7~C{6*1W#I?Wn>dI=Icgck4RfB^=}zuk~uP&I%sp?6)kqtncek(4&d-+PKfA zQ&V?H)tK;18;1S$8PHJjHs0ozv;j}ZNavi)jE?)J^5yEmJ(%MP3U z66=m*`LB4^;Gbd+j$D-M^i{X_e=T?ls*mnAW85fe(8j%q^BSYa1sS^uVzu3qpOkBY z-BR)0+88(TP0`L&6$gF`L%fKpfOFSefWX1X{PU2-TGP{y*JKeM4lxWVvzWZ=IC#8O71r_tZ_)TNVA`&_@8*mTcMPIa2w{yp)-a*??H^# zTj-Gpd~H47$YaixqWy#lE41EqbELqB*3)0z`|&LooYcj6HuoKid%m2*eJi^%F6%*l z)6N6@s(efxhb2F*n7`r~vaB39h}m8m>>c5ENg%5a;8|OnQzp+oJDK((mdlcm6f0Ub zA>}8u@%oAQh19-XJ4u}$gGb75uNepsrY3VkI^7q#m z<1hD{dL$*!2Dq`4+p}Wy9~bU8^2pu%O6)}_?0qo#&30A!cBj;H6^WpvPpRE zJ}oqBqbzIr4^j+KtD1mfEPFKZ~%lbjzq6jcq*7L;zHb38MuD0j3{9`EV0|8mK&fEYu9Fxo5mqps6rImog?{_N^`ToFfvAn)T%;b2;bSLhIAgq zkQk$P%`XpmHNKJjd~CGBNsP)Z9T20>QLcDls#s5~+~{>;^Co^XH}j7547y$qy|t|^ zVTMf)2oN@%NlCv>YIbpJBb-xw_SPH@LpmyY+da)Zh*8mkD0NXmO-^rOq3y1NCLa?m zM52->I8)YVv;0kBxLJSOaI<#NI~C_=nHbl$dP`XucYYs{WWgiLJKG$1cM~ero|5Dp znzL1Tf+{DMC-V}?oKBpqcTc)wk3B0Zcb{V1DN(NE)5`me`x*FH7B}u=ebH46gIAiT zV+gfMxauyo$~NCy$JujYI%|ojjse%V`N7JIvB7aDS!{`L@vxhOzS1hb@%%jwjD}9J zu&GwoZOeafR~8o(aMGOmL=P0{#4BLi(h8f}li?s<`A!^W?A6DNnt=5e0Oi_spZ16GNG z0@x5PNs8kgOFbopK*}FOMx9rYd`cc&4t( zV-Co+MLQeD=3HAC@+mIl?<}~s#8AM=&vR{IrZO#5EC z7xJLA-x)=0)LFgk_k4$E-Cl8cg@1kJ+@lff_=nO%>2m$m^)e6VBWCxYD%Z|+?p1+_ zjL}D0Wt$%sougeE@+Pg7ie~pTYxyTiSA*(2;6Hoj&pQt9J{mh(7I^GYa_D*}OFqDk zX0$MOdEl|rDtlgp5V4kpvwbN5-2Nde$xMer;-u_AW)?W{scM=8A|@ z<>IH&!%?r^wt(4UO)MpNmn__?RrVvFhP@9&KJIm0;-{_~2H(t))POY|^1^fXg4?|p znGN51SdimzKkaU+AG9*EvTE!d`m)wmyL7h&ENBOi)cwn0s+`tUsE<{!rfTuQMxQ`tgjoyC|*cpb~M?=`zYoR^=bBV@ViQ zS+uM7bUZg|;`8`c`z{QP?Ff$xNJcQB_74^rV<763HEhvnb(@q~hZ&<0add2+zUzoJ zWzadr?rP{32Mk$yOdLpP<>w3KqWhB!+lDax<+W)$V>veQ`3E~#qjr{lS55bPuiSj; z-1LAUjEcf|(ln<3jfbU11irG5w3G>Y6~nE|B|X~ghBw?iE}NCL6ScLS#)Q8u$aj2J zL7(p^W$eSHS<1@6IMRm~EbXetc#Wj5V7KpC|H1Xhw0%2J%`MgHtF!LGs7Kmqj&aW` zSBC9gj6unz4;X5Q+KDu4&8DYQs#SIFJB#8f`&hWPaXI?SrB2;T*xHTUZFGpp^gU?( zZAxhjs1n43(Ha9I`Qut-8W z;)Ek$St&pGt2wIe`h!_DZd}P_`js||RqaxBEQ_GdzI0@~*XH!>xI^Q z55+lq#BS!-OpTbc@*W;Yc2-Oj5o_t#cdO&MI0eKeI7t&dP_g#aVRPwILjfcS_REb! z9O|_hLAA45nS->m1tUuC-Mn}$mwv~{ICoUD?V=dQ{yQ(^J8eBCT zZ<-~UiE}tFtBO{?-pxQW#y;c1nOPSxDG@U=OO7vKvfI>E=_|T&(Y-Y+f~$dTo#vH) zmPuw4CmbC^2iaK!cemO)`Ez?_0@=v%eAU9F)3fpYeT&uXd1!}jM{e9ZDXLe%(m2{-J zWNVh<6tUF{-o327>v6pUruU}3GtMuCXD3@ z_t;`t!`|n`s$t!olbVH2G4+z1c>~=UJd=*|gPA4kXde5)iZR)Wsijaxd?u<#33rR7 zEH9R*vwQazt#)KwDxRJ+QMol%8-0sQou_Tl0Gl@)hwIB}=Oz1N*{Gx_9_o>xRX>~2 zBu$G`HB9KX^OgH+O=H4&Bj`A#i;HfP z$f6bVfLFv48K6|y3eSaLL- zwKT>xL)CD_{LpSSh22ZjwrKt$gHZtcY1M&o;=(~aI|k!rs`!P`BVZjHgxaj2=LruU ziX3VcwX8HTQ@rAebJ$=47FgOqt6m)#*HL_}WQOrQez_{kEtCDlFftH)# z{}a0jMD{wm?;j$skBe`*h1b0UNw;v@%^`O^Ecu&Ge%;|_s;5>vs&^jNTHni=|wfQ@RO&t)V!LSRg?2dVp-)ea~61u zTAHo7pO{yX)U1-6RpMY~erj4xPAf7_E7E6Wwvy9wVp@(*EAcrzzVKjX5_2pkr=|G# zC?;4bF)76-rI;R3juNB8=t*&ZbQqadl4IGU5|mQZkhUJh$A>Xs!{Wa5Qhan26GQ{w2!rAUY`8 zR^iog?xiHZ&n}h|;a_3z=U(>nF9(Q1<7i0Sg@4h@zF_U=U-Z1^oy=Y*^StZr9p|2R zvoE^2mt6q47wyb0(#`JmWPjfCUbZrO2*!?N4;Wr-f$4b9+gPB@?qM{*ZYwS6c;T*O zx99B<7g!s6D%4Dc+G*@KZjkNtUR(L>0><7E`3tkVh$vya8p%*2rQFOb+)RfXV9b$6 z#9&g`YGrmC_J}l6do6QprX^$|ds>;ex&UKm1=dXMHIpI42+_lhr17{^J@X|QXp?|< zQ3&UlMed0QW8FzoA_l0)EvfV@3gm=iD-^_c5R`f%gv9_vCp}{Bv2fvyukj<;A+ZE@>WU~Bx(^0lZG~!aNsv%22*o;IkiJvm zJJr}Wf(wp>@M9tgq)482ca)U@s!_988j$!rMzn zhh-oVV;CKNbB^i{<;1t)k+}2X2&|SeZ%D*odSODwphvzGELNavk(k{J z;L;;!L@%K_pz>uGIU$~v_7#g2ciC;1SdQQFfz!g7mqe8c#w+cjAhxTLt-Y4EF{tOH z?aulK=a2p%#$2T{`b?hUnt<^Wp-Nn^O=zpa?qOY(V5nF37|PSfs}87X`Ucf2yI9<< zg`n7_s*9ROyHvR?xwW`0x7+DZC!@a|ZQE+6cDw04WZ>-%yl~$OAA6x*dI!O>C`DGa z;Cua z)})*n~BKW~P=uG+t>n!l~ve_ZzdxIF%K)%|wf`gYpH z{`$>~PdFSgQ`1!Q{4dg}V>uKxDqW*Omd_8UcblUu~Xz+;g^I7MYRgd-4Joq%N z{=CG}{k*7uo(12|+h3NgkJu-{=LKG^&-3P|S^d+z!TNC)e3;jMT8iq^oX6V7iT`<4 z|DxUCaa?^I`(W7mJg+}aYL65D1MAp-%Wut5<-^4PG^>4(1nj;&DI*`IRlr{s%@4Es zyK(jHsQPwXeK)SWpNI8{0cudy;r>H9^7^^p6nEA1&Vn=%ZC=Wp2TV{3gmUJ)Y05iqK$~7x zQ>=)ANi}=MV<54@(`PjSz%!wlo;s^Bl6k8dJX8d&co@j3#If_tC8c>yO;aN(sCYV;51jP?1JvUQsyOVr+`2B<(a^IWD)Eor0yeVY38W zbXhniYl5*^0?NT&0D`hk%gJ$BBfX`n@g55+WA><&m|BaNz$Kd7g=E^Nb_*nBk literal 0 HcmV?d00001 diff --git a/windows/security/threat-protection/windows-defender-antivirus/images/MDATP_3_ConfirmDeviceMgmt.png b/windows/security/threat-protection/windows-defender-antivirus/images/MDATP_3_ConfirmDeviceMgmt.png new file mode 100644 index 0000000000000000000000000000000000000000..6771c71e4228d8649f3a7e9bc2b743147c25f94d GIT binary patch literal 101408 zcmb@tby!r}_dl*8AgzLow1|S_NJ~o#NT;N9cgzf_!hkeLDJdcX($X-1bayihLl51} z0N-;z_j=#=_y2D{4-XILoW1wjYp;B*MW~vJJP9E+;f)(NNEBYlXxzAgV|3%jt+YG0 zfG4`a@pph~PMt zxN+k;TR}!r3u?TXh6~k}AL%$a+A=uTIHAlN98O$NA)+9p$SH553k$h@i}5xjOr#Bk zLNPsIymgywoBC1EoxL5%wxJ4GP$O5(;%Y$jLIlJO;~?r427&$>=U3|V{R;r0K zskM(9%h#|CdFf9SoF*gn>+LPXEF z(791CJF(}aVmiPiB>dQNNx!vPX^#|5C_3O4jJ z)9shf>3)tv_`j!bM3a!@b=xyd*hPxyIL{E|4Yk(mn^&y|dn|kljvda^;gz-%+|sJb z_Nh-yqpn;ZzGJ&Jo9l^@E3D&lK-EavpWr3hGu3Nj@CvJ~Mui2vHqAc9&b}F@(dSyP z+B8JF^~vHCk+?b!4yR4jate=S7Ou#-S0vX=oVOLq#YOQa?}jlOJ~G@Lf0cKpl%xNH zkC#vbkzT>JzG*h@tc7ew>6bBXdnVUSILbjHs5_00Jm7u0@h zWycIr;Wbj4Zx|z`QZT9(rgz(t`r)}pCL?trvUzwUF>Sr-rC?B1+J?TTE~GB&IqC~>L03UN{?Lh0!vz4%(E3gwYel-%GaD2g6Jhgc`aZGsJ#jbk}!&S_8EwFon# zlaGUOymS_|A2ySQM0h-W?>P8d+serg4;aZy>G%Fh7Ie9#s@oR_=Tn zwHn<+*&=48E>$}1xo?UM3_d(!wR-ksd6rX}7U}6MORwZ=C%29IWvtiyY$EvMN-#C0 zSR^IqV>T)?+aB-8{;gWmoA+8s`%(J(3t)O1!;ddw&4SEZJRFH>1WNCKUOYE@csvWA zd}A!Tlo&fj!Mm3}xq_Ldw0E$vT~QhJ^MG1nzycH1=-_O zpPIw;`-WpW2b7^oTJ4XIqWUXr7{UP*uCEWsiM!@b&|m zTAI*E;=E@2mVOC7o;F|Pa!7kxfX&QuN4wEazIBZ})1;q~wOUS-*=B+L%QPOW6JPD8 z&W*Z9J+B+meQNMf>{r9ZianB~;Yr0NB^Ibu-25MXde40~N1ddZt4UH&*2n$xG*Qtg zSJ%VJgU4A=lvB-$_R?(O#nP3B;+v(JRYwd*@d>IT?9Ke~L6$?&a?#K>&PVmZ;qLli z2js6G=nNb1x1WZSKaimoWgmxP`rw8%W=T`NDTdpqde!<-#V>0osLT3AH`5xQ0q@6F zlE^BnZ!pu3k;{DsD=2hXHgn>_3Ep06g}`ES%mtoqYtgC6T@h_Za!1VqGbA5jjs_MS z<_PziaNFx}8&JzCz$+KbibSH7%DtO29%SL!_S4Fjtw?Y-ideIKO6>o!=HU4G*W~(_ zZ_TV;tz1vrKIDaFH*;&Wx;YY#^HL=0Dp|oUe5NFxYNV)VYCY|nGVU~r^C9Gj0Y*13j#$1-T0JkeY`-*p`YGLvHQlU zh!RR}^1=zLFxHu0UFOQ%#g6DJPBW9tYUQt(8cJMvbSpSvhWXm>flV3K_4@6K`I;CY1 z-Hq&CS?(E=!htYOP+q7-<-NKUt#tmP{&0H3t3<_gs?K$Xd)wy|~KYL|cT8N&yg&1L`LEbM^~D(Bgl3`_zGsbkrZsX$9FX;z=j|7SPs|+)&((>Str#%xY>Ccyuvnf}|eu;{X z4kT?!i;w8e$5-2T`krB% zuwaSLNn2Z8mT21fL%S;0HRSea;J@_Y-+MLJLw8A+$YCU6i~Zh=5)j=%Tx7>XGh><~ z3I#9q+z&tSkfTO^D689$P@YMBY9*bR!Y)Dd<>Jh_<)_xV@KWJ1GBU1bl$EY( zxaz<=`{0vca7A}{b*r_({_<{r22#R=>)Llpl+d@9`x>8@4KZ6h(BovEK>aiK?}5$y zO*B%0-YT*9(nLh$WprX<-MEy&fq-bNlCT=;*Gg*D?8NyOq-xc9n_YSn9IdmA7p7?~ z=6q*+ppy7=viO^Qzeyr?!V+R9AFNgnO1mWVOy+TgE{BKzdg6Hftc%IulkT=mF;-y~ z_DQrsae7aEbvPOm$z{}gS#_8gO*1|AR?!=S0z(Y1Rt75>irHdDBvhL&;Y4)L)R$ha zHHRoZm@yH(zPdGqaJNc5xZJq(X|NF0Jg#6b`u5Lo%lJ)%Jfj+jWr@m&ZzMw8rBA#C zevS6hoo_#&jJJJgbbRr>mY;lG@Kvs^V5SP4^!m7Ru8BmZfBknmiPUH6MdoAlJ3>wh zd$zw^nb+D!I8nFH0<#R)i#0usv716s{_wJ} zf%zhqBj1bhf_su6&hH-s)Qao<*u5HtpZMv%sE&7SLbg0@*zZp>J%$u}WhBq;m&(>D zYW*1wtru-x4S3*GK2r^Gc5r!*DJ^Bg=H}YIbaY%cJM*R9)Z6zil7STCm9LBz9qYYA z5sB>eD;M5y>V8;hnray0Zn|zJ^6fz0SzM*n>%;z(RRY%DxN2V21+O0ViF6ow{lU|% zPTJ>8x@qaCWu_Rfqep9Lm&V(om`mHSUt8zDb~ASf8J-#0nB+qP?=19$}$`CSP>~M zU-etZhndTW7^2n}`~`8R?qf_(*|drUuyC)2E?DNCT6JNSd&W41(l@#MKq>H+)NRO; z@=UsjtAW#Eg8gKs_3V=Y2M{P=8uB&`(8eFT&uTakgVzbhExcgXRF)o;^+^ec$(*}YOk)rNZ7q0d(AF=0l=E(%{jKb$wjeASjeC+sl8 z-bCR+lD|J6*crWRyqYFx)rWr&9B`>95)IN^f!{19Sv~KnRWXKMZ9P*uRBvXWd)-l$rQh6QgJgw{E)6@pGG@k7D>HX?PkUs}MBR0N66h!J& zCMv%&_BFVf=zyi5uf#&8N!L(g5&piI#AV>u+KALeBPW8v*e3NJ<+SE-Gm#R-jQKpg z3H?AwO?W5$0~MvE-;`hJzSJLc%h!4;?q&d;XM@iFbwq+2{C>epR<%Lup;HSXeRe)-$+SKN7S z@K(Gd5=xs?YJCYE8%Frir}fb=4kK?jxQ>Z{QR4Z|=qB4RY z9kHDatOBd0JX|EIkRqWcxR6mE}%^eWIs9r4)WRO`{^Y;q=@G zpGI~>RlKX~SC811>;t?9rxwar69HS7pLzrqa~wa7W&LAE_j?Hq2Pufwex-u+q4T4+ zP#P=n=ZNcygRW6;&6BVq7A5UhKaT_V;`oj@8x3t@q@*9gT@$*C+20(5=r2ZGgA`&x z)T4u#NH6*$Z;zvlL^0Qc4uv{57H=xDsKSMWr1SQL=H8pZ$r3(+nQ2UUB5^YYO=VmA)nEio-0Ouj83ndCswa3nCv9xt%0SJK; z5p$Y`X}_OO%jhZpb+udq9YH!8ry}4~0Z;w+MXU!>x6@A=z3PlTk9&ta6fQEni?Iz? z^UmzESLZ2pvJEv_1wjK43Duv2wQgHzo{H(u3*;6C+)?M#Tj!&mu)=h|l?YA{AJfGV ze5Z}e?_lLy)yV+X?W%ew<#0Q-aM5i4l}g=0WB79C?lP%?@s`j!YA=$PlP%WLuM!~L zxAG`1T6ekcMe&S53$lI~cC54oSvSr669E>!yuHH$H}v@dIab6VdQ6ws`!tzV`!c#Q zM6yBDR}+>ebx{U{0;vb?NB5!Ru6oG)ddAatEk~ATlo!7b>OAsYOT9F<#U!*i zs$>`8q#W5{hA)y5>r?Z+wvu`r$7#4kt~L-CWUn$mN|N}Eh+H5xE3pami^epA%SVzb z#Uu_Fc4+@%kCc5N99v7vl~?#fUH8r>YSz~~OR@b^NYmwHWla`k<*kd(9}lgelwPN1 zA`H*wh`9W(J@){&a<*89&j^2vw^b&psWLIX1Fx*RMtTVr8^%4Z+T71!OvH*)eppSS zm$Lnsv8O}zXA4E1QbxGp9oEAjiXV{aFa1+Jreo86nk=dV8Rza6nnBoXX0IG zQ#RGym-w*y4x&C)%5G_kSMyPaj+NQ=Wh16z$-rUR|5Z4c9j+V{Exm+>WiB)R>LTJC zh`pYJ6#hA}R=T0WdkQIh;N3{nVH9$tYBsUoHK%2o#2{xKL-gmfbYq3J65xCeWnz9Q zj%x5uOOplN3ug4@Ux|D^GaWwX9bdT<>1T{#i;ZT@AP( zN@E-BURoDXr1N8%VLPSTaU=&?KE0sPzVHu2J-Pu#&kCwU41n~-4Q)haX07Jo2ApUS z_5U$FUXjPxMu>w?{0%f3BMG0__N}6c)JO74% zuf#Tf6gE$Kwk#D0s+_Tyhqv$O|A%+NZNVTn*K3$*3SA-@$Vmn5W?rjfK&w+U&1bu? z82#KB_D6=hHQDkGq>KS34p%jt(87lHJ$3M{K5pH)dQ)1=OLFF({kH(8D=Nf+x}!%O6wz+dwK^$ul$-{FR=ua9Y4j$>&*B$k zt#_^~_s%oQhS=+f*`jMY@9=m5IjI=B-T0wS9Yv4~&-Ko1wY%e<)kU%I$*~M?@y%ZsmbPMV1pY6=NwAi8fMzBg4XA7{!rPmSJ4epJcpI^%cDH=mdBDOn`>H9cnbg0Q_O8568)A`M zPQo7UV-14|Cl+n9gV{bsV1n8PGn3pe4Z^4G$(Mq`jx{$**~NX)x32SB1Wcf1Svw2@ z9Y%=d!l(unBGulL#@V-Wois(_-zP0K|K`q*B}tfRejn)whKq*BL#rq%{~CGBy$mmT zPd4Kx!YPpuA3y4GT&jztc|F7x9VSVLgfThSoiz+KJ(9N7%x!$UVBlPP-mtvRWHHJW zm=-g?>{Yk^T5JI#EXvBw&BiRg@8oOo8k@FSeR^AN?4^u{Z_v|NgCTAL$l`rp6?nk( zNaGp8e5T$_~_s5lL? z@Z$nTRUZP#4+v!FdxY)QnDu@hZ&JLhE-p;5}8mps={D($RUMt|;J zk^UXX=@-_2-YUe&FIYqv(z{-M3itB&st{$CG7LbY20Zhch-d}~VcGTj%@jdR?HtSP zw0FWI4CrVHmw(YxOemC56Ku%ZO( zFGClB;29xb*8S|t*#VI&{|#KGoD(8Pgb0Ta6)2-~Fhs6(=-KPopPOtT?qrwatDnwu zfW&kLun0SSz{oDc|BfWdnusv{2BK!GyE9JtSAg#&IJw(9|A2@*+h8T?=BIvP(J z(_-GQ*gQ7kS&uOeGuT!XD0{$_tK(7fY|}CS-NU9zwtMQ#{MwGVns51DeR2%Xl{BM1 z4Ci{mcXDdg*>E7Z(?8{>-JR_HSO+QWt&nzS;`{gS?;<`Z_m8Jrsjzw2EbqBip~P97 zeKHW2MJdJ7MA4((X~Am9fHXvYlmv8FL#8vKvr71UI`V@o$quQKs$6?3@8NIDAqB5H zd3&N1(!yLKo~#_fy;YAFnW3xyShVhz-R8Oan;VH>wrTs31C@aNfZaRo#T966uimR~ zEywk!AzkW3gP^5eBW$(ya+Ne7Ox#T6G0lR8eu~6oT;jeN%jS0N=7S#n#&3LZwdf&V zuX?jMSLlibFIP{p$PlO@OvSM{SGelk&AtPv{T8iP;1@On(d1;Yvu3lU=OfYabnfpc zNyL{NM5~va687*V)+l58zw$S3M5uM;(|Ikgg0#-60vRADRZpMp*RfFyj06mvm>+8* zb^UJH!kLo?#B|)d=S6Xj5i1MQv4{P2;%oCJp3Rv*+@CD^BYvXi*OyJxKGw8U?Wg~3SxqgPhLSi#J| zDlYnvUBN1ET<5vbkN&!RWl_<$Ej0%BT%T9U@kZ-V1$^9Ybm9h4#ejYA;~Ct)HW9Z} z9_28!=?I=%kKMXJteX^llD}aUL7k??21pTrB32 zHTbnY$P~EO>xt=u4g&mW!>AW@)M<6s^l_Yfgdv?58|lg+PF#ew$8S^vpvZi#x-b%? zpw~qk`9zkJd`HtQg54$zlQ5@5+VzAOml9z7%Y3&+b7sq#HppfXl=S2oF)=Zpp}dcy zD!q$^4lH+mU%&8fKzBiQf4Bo@<gc4%IB9GsO2?#xCieGFCl zh@ffQ>MZmgkv86Vn`)`A&!^=#;;CE6DzAf!emPd{^HVAq&q*|?5b`yZnvnH7YQXzc zgzLq&=fW|rQpIj&{(PyL7!(s?1kt3KdaW&cwYaKnC$l@R6bq=!r~7f=78eFkVFbc7 zvk=r5pkiTcvv?F14(W<*A{PVGA?~`evvDzVadQYeq2V9b#C7*cCl3^TvKmLF`y#BG z-uuWqHbU3EDQeqUo&W?RJT|spquFJHH<=9ZAdT;M=QHn>5)df3?uCL{%%TiKX)6}Z z`WxOq_cSORrkp-EH=b;-+xR(Rp-1iEhbc99aU=0eLSEHrN?lr`q?c@w%ru`)zQyX? zu%3dFw@c|ix@`o+v6j117>NNQ^x6{0?I{}@bHm=|U4wnh;BZ+-@<@<-=<15}OQ{#d zg)4Mq;Sor$!*O{d$aPMIbp>lkv~lQT%#lc`LDYR zI4Hn(ZX4O(Od$!lz^IrK)>&O0{19ep23aNjT8#cm(N%Hv=6dNlu`>wQ`1*TFBVE>q zGD>;`3kMJ7@f#TSJx2e!-*%3cPknAejQu!RV}|KT1ap*0c=9HUN)EbQx%c^#L4v=? zbKm^Tu`e4#We}6J1<$kH2aEP45cB(XDne$ytdnkvCs8TR8@L^B)gK8n&u%~`M~!rK zwumAtd_fRx7n@4)_fn6$QY&TC0VuB{Q&(}(HPtl^+_Wn67vf9J!5n`wM7eFP$G8`YDMj5O4d>IMt32}s zG~@8l4}vC6yPVSl4ACow`pa99Kiv1d^9oN&3NZ>oo?^9K1z8M`gB;CHK&K~CT=|6i zA6fg2r~8eJvD7y)6;A6@w5PXMx!WlV`3iAZS-RMa)8AyMzKG>bE7M(5Z@OvSLQYPe zgl80@HN+RZP;t6DhkFwbAMO<(BKq(fHoeXSLKJNhu#0EMdz)(JQhdF#ZtiP6peIl0 zeq8+uKQSm0e;R_nBNV{0x|t>wcsx8PLg!~X{{zM#(}{hDxNA?0b|X#qThQ0?^_A*@ zb*PP1ax&$_O7zhg>4FEvyHY*#84#o_%eG8M zF=@k1=}#lY9xAii%(T-1+>e>L=9i9gM+Cq1L@#x_-Y{t&IL$=$W3Z#1;W>?lt zgSi`=5F1Ndii@OIChUs_q)TVT%g!T;Q8QJGHV=WY_5Oy6h~jc_6`J2At0`mdDc~|) zZPxZa#O>XP?=8RB2zH;*ue)XrYf2O_xTAc1WW94wN80)!4Z=|&M)G3)H81H{?)YZx zZZj4qFmaoo=d1R6NuNhqxiaSgv|<}75^lnL$p#HMPSO#p6jgWmSoz(qV|&{3OxM&e zSa0!e)DFMZ$LErvq^TUp#QjNa;x73fl!mA)}CJ5AvyE7%`&%f@amAdguv$#Sq zoiy&FC}#D@m<6qlBx#53n%(9fp%mkPAh$a0URd8iL*=`t)7$*c{_`R3;?80O11W7) z%d={xC&YH)KZ6T7=$Z_lA1zK0Q==eTZ$fnF89a|bY{VySHcsjZ>LtE{xksXl9>;Pr z4yBnsYb&7oTV5HY^3Og<&KY~1V>4r}Z^Guk46e=_44C)srF%Sa{jrlExO4qpPG7J; z8bpPDoxJ6PJHr2&-c9;X8YxR34D#N_h9hFEY>Iyu`+OLXf63DwE%sJ{ThC}<%o^~q zPGmJl$S5U(Py$EF^mlc4hX}@C__rl_j?^dJx*Woml>bAt+V{XYP{QO}j$>B!pST4%CS;9rI;oZWoQws|R zY$B6j+2NhLJU6!jEk?h1Em_HMe99K-U1=a|Cjj>fx(xihY*)9;uj$ByFxS7+m0YZZ zKV*Q=AkIXUKND)MkI-L{i-KMASK?dB_oGsF!0u9_QSh-8*F$Ap69er`n}=J2*`0wP zCSK1e<;%t`KEnRJy7SD$A+Yeh2Pq|cgOL!CbF1}*D(1=4SWphU zV;&xXd&W(@Z+r4C)&R`0+o%KGHI5%Z2B^+`*?l(x`E^8E4n^)Hi+=q&i?iQ6GLa?k z+_;O#(#>r0Q8f&&rJy_*`7S*xn|FG8J&vCWD)=FP3f+gl@I({) z;>?st@{YFm6SM25A{cUR*!(n3=3b}*F5cEzMwz7MQjvvm)is_6p$4vGrb>-$F)w5a z<(ROS+5V#}I*#<@Lpmj`g)atA8|`{amvPuE5a`jj1b2p%U-_F>goX^D5k%pALxQ`Jqz${W zy-xvgA!9xBN8xY=YCWJX2Yo{M6lVGk)`&z}hp0U%|@RzoCkTJiA@dtsI!k5fpL|9jFtugc^A!wjbU|EtD+6r}|l z@>$DeZf{)kfn`4S$)FoHzEXq|;S}F53*D0q!D|ut0G3&zyL%{U-B{9DEr!{Sr?0rK z88?1Tb7qkO*cVb|FD?3jm=8*UMFCUn@SXBcx2jS$J-=W{tb-ADXW~4gG0d|&OD8}` z-htbJ?<6YX-O-jOo&@q-@&8r!{Qw1U(RAO)qo4JJtMc zVMAHsR)A~(l2X~Y`s$^Pq3^BlBgcnP)W%*@6=vuoqN;6yFLY*^CgTe;-|Xo)23k{k z#oIY=(YMo5HwCu?jE}OZuw#YaletxCaZ}vJ%^ZFJT@v)EFdGQOQ zsk-Y6?c)Z?CBgj{u;ooq^@~oIoWz5u#*LN5!RCMMA8T|nX!!onNe)2>K!TXdUKCb9 zvBQ!jYjFW|Y65pe4EOsObQXSGJ*^B^xmzi*F;C_v1UcX;|2?0SMq)+#G&dUQ%B@6p z4f^Dl^FZTBeFB9uPLo0Hz}GVe2O2#RG7p?O&N@zv-Zkkpyibky5EPgn-kOw7ddxNR zyuoV2mDu>r$Iq}7^c}uQKWJ}KsZn?49o;V z^DniVD}}Hm;ml9$$Hwy4a=ekeuUZiaO{j^nZX#)$E*<%(tf;>uI!s44DEt3dLO^>S^2dLNgrw7 zvsbUkq0hV%bTN{C(?};(*zU}!;?aT=cAQBtAM3UH0JP|EWHJxui)2A8uGBf~ctWqg zMq-wihBFf|;4$UD zyzTid^QvolB%plR0JJN`=oo1Y50Y&|*U(5HPZURl7+vzdNuL1fEU0_^HG`R6+=H8E z)uCGQ4M&*YjN?fyPG(GsSGa1!tFX9}a-(*Fg~=_DiIa5+Z5^c}%+ydyYK5!4%=v&z zR2n)D3k1=VOQ%%vR9}2S?4AkCx(rflM$JTg437vkdFWEOHWRZWAO6!vtzy_YwYtfYpr<0}=YB%=IH0bL#p=RH$W@GuOZ?sfzZ(*FKV}|a{pV#N zdDW!0c8NvPatJCy)wE$~);f7$xwW+wfbvQiVJ^@AKuteHiNS}Hr7r!4QmCuPV7_ms z?or0AJCoI|CKDMKzfoWyG#tqsdceVfA9c%9h4_-&x4*Kq4v~04JK;)mCysLt0;Zab9sEO7>Fk z#&?Ol9kA=!**w(q3pS2v(n=tL?iR&W0a@VrFUXDhUEzCpA^8$aK`Wc(3!GGMzpSM$ zk?qBxcN77elDSMXzJ}bgEppGIr%N_Dp!J;@H3J@g|Ov~_R$44=K0NmBV!mLdX`8dQO z#&+5pS(nsorWkc6_)t^vPb^g^dK-LrIN9KGY_bgh*t$r05QUD2IFKMWwqB2AuQJ!& zth-82*&Be~jhYZXeMzWl6ituV!x~=aD};tx%F*2o*78_w$kKh>lC{WwX?4a(L!)S+ zg&fXWKb4+vqLFYhf}E@C+wzDk^`oGx6t7on#?ujsR$OoID`RMh!lMpEI5BWJ5Qk@nLKs^@BlQ?>+?bhU6(of?c_-PgPBEm zQi~ZSzEM&m<@XEOkS(H``<~7F&}3!@CD%(cgJJ+at^Dj$Fh0t(Q+;N&R$6y`UglB( zK@kgET9jbFM@h3sSBab#5H#F-K!dhyW7TjwCLt82*$xn%Iki~IT7ct?R802u?ORW6 zkOqBo&p5(cG@wUayw{GQ4VGS)3ez@*2}4=$o5_<{#9?n#iL_jPsD&=wm-{Di7 z=xP~2r{@*oe{I~^7u=WnxLL6~xj6An!sSF-OjCQ*zcH@Z_Y3oG!QR*!1_>4B6ul`V z?jiJR^E1wKTf4a4#Bd|eA9M<@6>DkfHBqOL+i02x+z~VVbzWuW#L;UG!9PD zRQsP?6N6`JE{i4P<-X#Ag<*cNlPStEg8`@t9NAMW@^McbcTMwh-ko_!U)Hx4Gg= z70EqiX7-oxzNVp5Lv|`;bYX$yZesi4bs<7*NvBf$s+s8C=vU8SMt1~WDgju?ETf5c zcmXa6;CvsI;h>@!8oS-*H@1EagPCyosUiGh6Fz_4;_jfplF7p@gb9xpzyElOzY)UH zm#K9}3)=60vqbLmRG448G=>D<*>{Tlcka|%DZEhZPv=J#$p+y##nu~iucW<_4=9>S~EN9Kg!^ zW(CzYN6e3G!%ZQXh08R9bz#I)`1gpz!|coEP7l=1jBnC+G)wKYUYYqaAy=y{KL$)- z$Z+ADh~2x0-PMF#073uWNmMs8K%`*J@$2x;!|I_^`cE(LoA0iw#(|7LFv9ZpViZu51?93Ug$iKs{t_QnTkBxDe+n)RQ35ezsE=o z5UoMrRc1hGeh4qbxEA9*d(&s|_=r^e=m%YBwfz(N8d`oQ%+vCx*TZ5HPBIS%_CR>X zJ{4(uelFD)qCGX6UucG;1v0=QE5Cgbakse{z|$T- zM*t|Zzr^`VkAgkb29$0ZEI%uO{cZ^XQmu3dN%Fysoo)Ldy4Pvl-!9|1w=?km`D&SWHk^6yf&Ln8e$ z^yvW^g;GD!1Vgp!n%8Uc9%svxBbN;vh{P+-?Bss#t2$h(xI)O>ZXw9*QLutSNv{Zm zyl6HQK)c+62OhloJh6uaIk)NgYlN5{_!rizW}`{DNNb}$?Gc1NWII&hs9)OZo*Ps& zCqqmzE)U2&);k62o~e{+cV4)&2+Tg)cHKM%OmT+$Vec@iv8Q`v5d1SNOrhGJg_(mb zYNPXW5H}JGl#`RV)KZhtUPqq#P~T{{;jLe?ZPbVC!UFV2N-9K>Xkx0dHVf^(D5aOk zbTy5y__xE(%K?@P<$b;&O74E3OeFmhh(5j<*;V%3(A=z8;TVNA_lFnHF2e8J76#k~ zGKzYj17~37USY5LJ3$e!u&W50|4e`Q&OZgNZeH*;DOl#t(wDl^s?U&uiD}-N3z`g3 z-Yk9)_=S%j?-S_nVE2BaXz9Y<=U|Abx-;aERm3~sWX!r_yP9w4V1IQBB*H18ZP7WK zGz|+FVlTN^9|5AL>?D@Ve&dY8NfeMXG^O+_?;`lTI@$meJD%$H!oCRC)R7wbBc8l4c*aAAeK-Sp0S%P zHN5-~QFU_u(d@5MoXec?i_+yggD+Z}nHfBhk>WUl)IR|aQ+gsSJqDDWfKoN4BQ!+6 zU*sw(MO*t-FH!$&%>{l%GQ_vD{eai6xOcBk*mnbF!#(z`43(K&s75OW1S#xdb^#&T zEcni%JGGlj7l}A!K$S)k@l!=~wE;WoECTLF`gu+lv0qMP1WriN=241e;}xM@jyT1< z19FyGOlQj?Q}7o|8?ywzljTo1nHaA?9rKq=mZ6X-)}_oZ0k47*u~%w z)xYY;A@+KO7m`RX_w;$_csj*<_;+_6ai(V(^6@{Pz(ogysQVa881BRIsK_WC`(wU; z+`A-D+R%ue@^G8yYEx&f`Dw^B<6TrSl)Aj-SGD>gd%Ki@Db~S^+(5hQ?cv1Gh7gUm zqkRmyauCt1{*`-MuG+LB*XLwn9UA@QEDGoB``qENlilPRPD@Q50?ZXUZpDkA4zxjm z8zSXA6wiGutjujVys7t5oo^?yS?DkfAznEg2hnvL;_BAZL$rQ4kBI)AZv3O5+1sKc@nNIimv3!<`ox=_EMNR=SBVSwhny zI0H*w0umj{sWU_SXpH_=d1n+xe;ZoVHjYVlh80cyxaKps&iJuGm+atjy0THcFq|Yvw8b6(*%d;dflX?(InGf9QVQ- zw7K}^YeunjrWBlrqH_mR$Ii;i%FM;cZ2adu%dD|_#*6oX$_P3#JUS|rJhYaEhKi2- zp67{*g~#NUh+s>zwDW8O`MtFmut`G%6|WNtanm?g?HL6jTq+Yv9c%N-?87TFDPJjH zLtjG&!%bA(kh*&8z1Vy6+(WUXxP(jB$4KW(EVdx~|7HLaRqx#g2It(Z*0#2`_V)JH z)?I2qTJGJuM^8^rNl8ifU`;JoEmPQYo%V&xZ+)%Izc<^XXj+25+c-UiW(Grm>U308 zF!gMWJLY%`3CYTez;tTo>!7NfGb(bW{+_YGD&=NulMW&TM|}KPvfup6vS+-|0CIhG zIsWZ0;(=wua_)E`29Je!5YKsdH2R6mx8;PO-roJ6xfgrC@c#ER;C}+PvX*jlpJfJf zL$c_wSgciFvgi4st-bo+OA)qd-Zn74!?aW=su)ZS9O^RzcSK~(#@zBUzvDFDGW?${ zRiAzhWacklgzrBC8Z8YSBASSDR5OYYYX1;z3#S89$l2^m-31uJ0LuUO1uMRxT5hJ{ zZ&F71BWC86BHY;6Sb{y*ZlVW&ubl37hwgTzeDFRWurAOXXC{T%m-^?J*0%uqVHOYR z==$jXrDWiC5NO|SzgdrHsq;B2wUc&gaa`!FB(m=)vT^RA%r>mc=$3SnD5&(RsTs^cgPqJp7&gOThH}ITvXq;w})8{Fy~4 z#8m!Eis+Tr9|_&-mHhaXQ)H>|e^V%$@4%_|b^bSrBs19X*}wFSXJYl8I8S%d>t36cvLsjPUum8U;{2V%8ZaebtrlO0$ z13-TN$Kk&o6uc?xPZcs({zrAyMB`j`4-Y-u+z9X7DPjKmcGRAwE4;XkkFT4nX1Xz6 zIDY$&Z1WO?tn{Tco~@+h>lFU_@7KP2ZJ+_MlbNsw>;(jW)XMrkDYD8Ltns}wn1ts4 z^SI7yOXFWQxa{ukKGVt_JU`kf{LfrG@aVxmH%tiMyMTLcjH4>-llUe7Sc2Ehr;Txp z(!sPsZmr2*)v);=!^6WPA`rlb%RNb8V+8bQeXOM9xyF5R@8<$jHm1D<843 zbtl{1tSZn|eX)ASC@b)KTkmW8;^tp_?|pBXgY#PT4qnUaU^gBunKb&NkVv27%_+b0 z!#vHLepQLfQGkaxaqxOm1b60|0!vFv#|xs#)qDVpqLj!%CFXtj@g9>-k)f?y6A_5( zHXfdFotN^g_|Utr#c#^2dOve}-1V|i_A9S;$MnzE`$$Vky(VG@RA^xbzAx2g{(g1U z2CCf__JD|zLcQZAC3o11&)!#x4p;U~I9h7Z`Zs$mB|mIB;vo;VJDlLd}L!*Azt zy!pm{ov9U72NCgDjbV}}^&;v?GQ@MvSgdA#6Fny@D!#j{6iLhdWry$%Ktr~ct*TH5AookD$FChTqt+0flf z`-vhHVBV^$Uu+lYmEP);IGw|}v%R<2k=+>=Uhi|lLrKMJ6_j|%-qTiSQ1y0l2XWAk z$p{dC`}-YW=r>5<3wbYPWLiVXSxD)GJ(jy4ppKti$pSis?Rn?I=RAweiWdLizSN!2 zGdAWqi-6GxI?Yr$qvu;fPBy2?oKUs*nB-o{e>I`vv3TdtX;eF^e`_+cI833XW+}s;Y z21Xz>!Xu+M{Hc`(cogU9as>&?Txj=Q3X0bC4l5|YWWY9$Yrz*{0ht>4p{!|~d#dYl zwr`mz^@=elFh+HbjD)0OwvGXCcm-TmTA3eJ9DQHDDj6z}W z=1Hk}N2Me3*uytZ2|C}w5P)^wlXBTxXrmMHD$yQnk!l+W8Oztjbj5|V#h|R9&}x3| zOz6_T7U1du$D3b4*>@{rB?7K2dlF^kwrhCm_1FJ zTU^vEG87u$1I{IJ#JlP`2L~KmL?n%%KOlHhzbrRq>+4Vh)XylQ@9P*tS9+=JKS=H6 z-bnhOZV6ZyK;q0hqUzl-QAcv?yC)~bMs)(CC2E;c7biQaTc(fK2nY!FC|zRPdF8uo zQ{*)k78ZIJJ~OK(U#kXZruK^44EbesB9XT{FPYA>A>+&|O3K5F+i+ zEg>Q(2n-A@4Gtllib#WkN_T?@CMBYR(jX!{o6miJ@Adfup0(aTycY{c=eqVj&*MCf z*WNMqZbmx|VwG~zf=mK@{5m+LK>Yf;s5tc-V?-j$3>$VLM8YD*htW-~7K_(`{we1xNZE!hg9G{SN}gh-3V_1oU&dLW$?& z-7fkqMvo*52}3)K6N?Mw1H|oGy};`RWkR?cF*rdns7|?l_t}S5Z>`QYP$knT)`!y* zXdWES>Velw>vY7$tPqGEN@ZETp3b4F1cy%)+@r2<!Y+g33o7?ea zh%l5kAU4`yLu<|F0RSU%y!Rm37eG~cj7`#(K)1uCZKfy>$j*hd(N3iNfbnSu8 z*eI)SX*sAhuh^K`o2xPcOSVwPJ8R~73X?=R;lljjV3mExEz26ys@S}-`p%$r5~a(t zpU-zbbkw|A*!=lZ^h;#8jl+vzV*B1%Z~;wI&+cmfyLww*ZVIicNl3t_mu;@YRPdRu zy8&ZVtTJRz`vfLmLmC{r;(GSr$Ex0VW`{N5 zD`a2#LhHa1v^`U%l>q*;I0v7;_@RzVMkWLlE#~$c&z-!cwj>-ncSkaLsTp#?&hIA^ zcYJA;))X5XYfeb*j5<5{old=k}GY6kB{HE{Jzb%%279ORfDeJ=f@Y)Pa2$Fol)O)>Ex-}6-q|uUo``q zWNbs#j$`Wxk#nLu{VvfaFGV1v#8bvRRns_VEIS6RU2)n{Sa>bZ+0MK$Vpv@<5CQFT z%h97GrDDS&oC&N4xBs0TxhjB<7EvS~PUjrv$LR^hv#=ai=%w5Jt|G{zny*78xhMFT z6)8Bs@+b75cvWHQC;G+|E4<6Uz4_xuGNo+}?n&r$qNKpt`j3s#Y{BVAHy`{tm{wo^ zhPwwgEqKbUo0dWx3~aa!&=JtKtygQ4i0Bh|%&#sl{{A`m=6NLe!#?1gW`zzEljnAA zBIaMxY+!_m6qMKG;=Dldw=7opHvZ^2c*}kd$V?X_PVn5he^}L7RN1xpeE$47PP`L6 zn#FHhAPjM?$^vVsZMJqU#j>n*58agVu0KOMHckArFMV& zKQFKPEBeMEm6E&KzCh-ZLw8t^%N!5|NpzrKO%|)(kB72!Mo(uZblP+Vu0DTr!TO~4 zO1YeE76zb8@})hi#pdkW{R~zzDMmHwk)F3QWBgFp*C=wtbwr9-8`V>yD=J(;V{KwS zr-qa+oqUNhli?GjLzjm<0LQ7cqr+|95 zdL8ik{>d$0AE{C^ux}|CM2NoS#qbh0L_fA~^;-S*O>o%{|3vCYkF-993j94!?K{M^ z`P%e&5MoLrtRqWFo2ed2wEU=mkDWo(7lc|w!9~vuvIQDj!w)vW<4#vi_tqt0vP09} z3!4UAADOb04ZRt$N8H{Qz|B?{xr*n5dAE9;!xL3)oX_lg&#umbe=eVXF@jOU@WJ05 z`H#?!gp;1{pd6)52GJI1nSIO>Usr@WB=e=G^;_-ARMR$yvzIxF)Lm6$#kMaZecr3} zTSP5{RsUA>(FY z`gAB&{cOPNKLUl!R~<%QBQDyr2V(oz0(wxl3P!#RZm*B8BmWw|CLWLLYz_FrVR-VZ z>vwZ|^F{L-o$Kqrzmyrjo_xNaUKKi!NYl=Stzz*QIy0(8n@!)Fbcp^;lfWwDg=fpx z9=Y2~njt4{EJ9LP$EngAmL+U0yj#DjX zolR+u%K+jf%M)m182#L8C~oUn$7c-3+j`sV_lb`Vi7RMoxjY9v`aqUjEAw#but2Gf z^O=LABj>LDL$_GYe#hGUW`vOs@A*7M%#X)+Khs!Kstd?~C_U~v+=G?kdYMZl>@z}n zwNWd9YO{=eqYJd>U2YsDy(VpTtlw5YsxJtuff&H0P4(?dX71=>{`D+1xi-Bc}>zzxKNswos$z!o=Sbq|{c@WsiTnP2rJw$WOit zrBkLD;eSAoJ%W?ueRlZs9rdFAUHx7MRD=}TQ=glqkt2=By>&5+8feQf<+jWi!x_p1 z=lUk;!!+$D7)t4+3BoC$c+qYK!zo+uJ_NjZ7>R&54a}?{=!tMQLV4Sx`BqnjgfH-z zhSkd)6vU1z?c&q@@t)a0Y@)LRmKtLOM({Qs34G_O>hxIg@&y%ZOUpA~xwyD^F^h5g zeH&zMXm?dQ10hu*@<5+chw}5SFRwop{N+Fh|JhTTm?ElCkd;nkPDq+)loG-bERJmO z5MFl^|v!)CxgF5yVBv%ggsMq$c;^DFQ_>fAQ}xApybCL5~qx zGK_xFfdDVZ%CHv_1$OW)8fL&yNi6ze@VS#;sqJO?uF+-UPG>6(=nlHS9e$tRQU`iI z3{R~2g6bJ&)N{Gm*si~7BmGAzF`$QXU zp46zV9U}^RyV85`ZTg#7N1_4ICXfWQ8>N*ncvRFSSYk9dZjIn}e9tOg;bM|y=g9(D zEQD!Dt)3*V7BmwrZJ=;k+{YQq70w{P`4(wuSY)%&np5bP%&_t78l4ozT8iJj^a~nZ zagSz9euaLY(;;K5%!dy6(XvPpv|G7DLgIa|<_043131eZ;qPH*vV0<=Y^LB|oRqGW zzQU^^gP7JDvm^e-j8P?r0mhgoraSdw~%5N_t1#+uPHnK&`}Qe*M)GL->`& z>;37`yPIXo%rTPgC}v_6m_#|lF$bTE6DYu8#1&tjTo=`!iyX3me1=6rthbp%VKe%#p#GNi@4LKieH z2ozeWL&m~R|3Hhg>&{P)6JES+{8CgW>|QeqIt^_=!aCk_KbcW%Oe|II-l11^62X%} z&}i=U#cav`(z~5gPI8{W&7}qAUQ{aNmz|Ma@!Pef5YA~q!GA8t=8QjAKLjcaJ*tai z-&SLYmfi3|O{68DLn(fN0db+$yi+{1q6Wu4XK**ny_CgWU;$LmTJS3YA1+3Oe#K!*AR6(XZH(4kT#837MVP2^R=V1p68UM)7MkaJvj0e12Li32NT++r&1EO)a{lLe`$wtH+8$OOUUzm^$|P3O|X1$^%QbMw+e zlIr~JjhjstbR1cn5A<|(n(_Q}Bt zz9`3(^Ir~pn61#W+`uA8`pBEg!uHlSS@^hA@WkVovhZ^eX`cvDNV4AeE-TFY48E@U zMc_(vsNO4O*h|9mxT~MXrY&15La13mw6alh#xp}ZDD5_)k+NXGaX?1dNA#3yVxEm@ zR9%AX1{X|9942u4AW7CR4{o6F+@gviPK(w*#?b$LYYYX#ZFBx|A&eUuU7AL)kwC%s z4*#DwmFt}5!Km!V6tsjjMp@vpl3lxmlB5c)PaW(*NZoJ1OjF+*-}~!10r%mT$dkti z@}UNx6hlMf?~EE;bJ7g5myhMC5Oi;k}#FbRF>P-)x~~5 zI6*LB)K-6aWt>#orA|Ls|8(~Ywp4?{~^fcBQ3sg@F$&{0A(pFGEwA|n_Z1LArlEe^4Z&*~U^`f)BHCB;&YcG_7KsLwyk zC|gbZ>Svf32GhfwxZ9((>g8ER6QM*JuDa3bPb{cYo?rNv(j}JtkndzV1KSF?9q;mJ zc1T2K!E*l+`|wI_ZLiYMc`o&l2>m4m8?FfWS?SF6Z{YQT3gwW>fr2wn8fIp)>pWad zJkM{w`CM>MeW@V*nta*}vK=healNDU^>r*$pE;Qo7#4CTLUD5bc2}zB?eg-n99qkN zHNuLF-|)iuHFyjEbSM$-WAq>18{@iRaxLKp9==Z~$pizrT)6)^w)^GFz9q>JQxxun zdq>rC5Tm)ZdA+^>ZIJW+L@`g|W|~y3c2|3M;D>hq+GGJ6fwp+`G;$dzK;hOxT~bO` zBI;=VR5nG6=4Ap|zEFz+m8dGKU?+W^`ZVTLVJ`d8{zf$L3J`=MdM*qF+Yxxr4xqn-ACpGfNh(sMMpyuBiksgr5?1V?fYc#X+C6$g|%Sqxy0&3 zW2lr>g9A$*ZxV1T2DE1A8uAMSSC;$`jf#1mX2AK4?*bF^M6b`=C;U;hV(2xiT2zd# z^E6P|0@8U0$TQP>$<{mbHPq|_R5J=)ze~vkz!Wvvq;gGee!J03f%6{KH97d8g;3A= z;P!?lX^==Z)0{&r2_>*l`11W@jskPL!w-?GS zBX6gt(`#d&fPta)pHpQ`P0c7IyQ7dqg0BdcV4)&H7-zP|wnxJ1_SbKmDAS(fFYOD^ z4(sdW6arW9s=2g4*N>e)*Yk$2Y;6hExWvhPh!wJrOGxN{xh1?k7LjJm461@mWK2}O zeTQkV04ZM*PbyVtsc%-|d!ftE_kSxYDlR|XLyP9|{-{*^(BnM};ivgKV~NA(Ez~t* zNdW_4kJs|GMy+TSO(qn1N0YLD8?ghd8pGl|;q68T+uke35JQl{7U%o$$TAUqLMQGL zjkf+DZ=Ws;mt9X`6q|^;r+wW|7F?*R@9cB)%g~byayF7IvGi^%)0)nLhn|}8%1-M0 zcQ>Ob{drns-&%x%+9>TgHSo&vAmPEkvsZtAbwO*xS0+_3k6q13WZGK9bs7JThnI~4 z_v5mf%T&Q-fNV6ME%kMgaZ5tJTI5SHi8%jn(g?*8AM5z?pv!Zb!`H_!x|i(hGpAQdpPH(xiE5LyL$aCrMwyk7T)DV*^dLys(+#1i(6~>>5 zk9jAh5!Xo19xWS_i~slV*C%D2*J-Tkm*>(`J?)wk9L&rkAzWC;m<wF9 zOzJmBI39Zy06UlQaAE2k7^g&vU&HT0^WtRZgQtlJ`Mc*g z_2_i*lk<;%zxVs}GPl-PTRz+wg+hT6<5dML0mK^yQEOn5rz89zVT5tbAed7WyE*$< zCA@ioM8LENnA=V+a^^G8gP!5xn!wdQD@a@0zfM3?Wo+4l*?(g2naoxqyVn|UvRr1s zHc|%ScgZJs@)6t?W2E6!cjY1+_Sq>g^g#AtP%2-u%p1TZQ11F#_cF@G^v4 zeyGon@ZRw@`JWc5XiD5OP%T_K@Gf1cSGKqPSTn>c)YVpg{w(Zcmvp>v9pQ55@NSC1Hk?0N6 zu(D@{|FZ@zm3wn1&89@?(@B73l;GT`(9C9p_Inf zgQq(~=X_k^jWO>o9T&KRW55tSwaG744rCHDGH{P%i0O~9C`A|xj){(AN~9DE2ygGV;}z#Jlc@D z44N3P_qvmS69;ZO%L&LUDnrR0@swHzvUcjfFPOLeweO>3%!&x-uE^#AhtH6hpf?L) zWgQ(ID(&s-*hb?KI%t6tnw!!mO z(u#*RO3thGLEij3w%-a%w#G6c3+7j_^!4TyB)Q<1En9BTpKyJ8A0d^f=CCUgiU@ZG zzN+Q9TVr$^#z3%pCbSfUY8-UT-5LHt$t4ojLKliXVH+oqBy608?+?OggaMS7M4vgj z7UT*oN-e%-g*SmVV%opa8R*Q)znO`o6p$#A_Dpj#N*m5*vKYO&fwhrBAYeyZ1%-w7 z?`zs=)x295Uwx5?3+#a=Vn8$?1bXmMkDY}!h+jHWzSfu&3bc`*9q$;;=N#?r(Kxw0 zFv0btKI1Fo(s5D%s(($$EhP+ovCC!i>Yi-owMh`%*fzTvEVPIeK+D5Hy=D}%a}z6~ z;K*RA4ss%s$RRBV?anY!&LNH(DN>ZqE2Fic@&V3k8wgL9;%?|0Cx64js@1`LdJ;FC z2KN7MwCZ=IO7!FBIzIs!QyhMuz(=WY?u(i3@Z0g#hPfhvymfp!h-$EhDwqT$zzX1d zz~9YieVE`h&~xXA~)mPzMtY2Z=+A3y1pKN zPaE4=OsOWP z?L{Gg~<~2k{r(>CXCS|@#{~llFYq;xBb5U9vGO2kUwOmAz&9` zg=tYuDo<#co>!%T3chs56Igge=tNVnw)tVStj>IKZpe!BmxW1SUAv4=vq?oXG&Fca zU$HYQK=sc(qLD~sUw{84>OlScQ$|!G6NmbPBJ&|G1=?1q1Xf@3?~I6y%pvd^CwSxI z4YZ5jV40+d)c+mQC3yh>Yww2*aOI4TW$f?kb8&GY0j999rN9`tPAQb0`jjmkgo~$z zr*C%qKowU|R<01S^8WPl4)CX44i=&X+HdbZKR{Bv-$O2-1@Y8xhlJ#8*8A5G?2izA zLxM*p9R2_Bg1s$#!PqJqKCnsj_*$wjXuvuc5Si{%4ckTkY5h`ZkiCMfzkt_!pZAj* ziOoXBz}tE$p|Un0O;yMN4YIpB;)nT}+CKMy^~-MkDDBH|i{O z!nnIBu5-6-lg?dyHb_1d3@dy7TtfWe({;YAZ}=dz-wOe8{n|~!pRV9VOWR*GpbxiZ zg&W?7Myoa^O#_olXR*Oi)H%2pLtH|WpBO>(8of3&zWqtU* zY#Fcfh9o5=q44eEByrulVBLZwWpEpWo-#>x!6?SaMuzY#PJ=W~bq-Z-V-N(r2>G6s zolO^O56s#P&d@l2zHiul(J!4aBB6)BCwsC>-3dvl9Q^(WI(#0R{}J(LziRKN9P>9& zFk7+vQJn#Q62ex2)!~L|G^{x;2nej`+_#!{Q_y9FGb}`iF$sDPywTWsvfG#!@BfV_CV{Nqa!2`hcfXqU;!9vu z%?lB^@2>O;UogXZSa03B1?8*=xQM>(a|)hl964QJ8Q=wGu)y#4TN)h1rXgV9vCe5z zj{j!trHX||89inL7W&ZrrWZhYljI7S6MQXuUl%!B{HHGudc8@7sShGaEKU(nQAo)u zgI?6%+~`sDx?0h|SCbbzH`_&e_`Z4YZwvC7D$^v0ieRgvrA7KabMc zthlnV%q*~87vjK&I_Y-NKna%M zRVdDm9bcMy{YwCQb*mzMe`B+&5VrsgE|~rggpk?unj#5~qk@!Nsxtpcr(-@9wB@5ynuEWNfxKKZ znvI>kDeFjA1UzqUHvKIHLXqLt_UIwapL-D=Ftzh{;oQlxzKd|sh53#0jDs{J9A6Si zS15w$6lF}xTSJ?ZaQx!s%lH3!h{GEkUhurBODY!fD`p~y2klvxk6`o8epHI4Xd;tZ zI#%@h6Cz33;h!Zd*k}P8pFryE=oWrXRJYe$rGb!fF^G)DQcqL5XU@qaRNMXrK11#a zIe*2DUOv+-3zI=R=9wM9tP)uejer=TxsezSF96QAg5YcuXkY_(_8S?2)P47Bo9LeT zQ){tb&BkFn-H*>_Ay-c-i>_?oZr! zmv@}VyvQJl{=kEUHVuW~wUK{rC6*VltcKPTKXF#mBT1#QO6@d~FGI=P+uty#H?%Dy zfSF8;JO1eSE7cr5v48h=@ES31%p=@pvyM+UjP49x}B{vr3 z*Hk-3q9-TQS;%%ObV9~6c}d|EXQBm`u+X&id~biYuy56ABs<(z+yu2-3?uALHL&^n~5M* zm!e<>G6bm^Y#T^H7d4tu%<*(Vh6ZJ*!Ze(4$G;aqWvu6zQ9E?YBhRgoXcf)#WW4)h zA!&9%wRZVjqUg=YRePR|TQjZ#LD_71SjAC0fDO>+4YFOU>Jf(JsBJ0?0`QXxT}pjC-z_kUn^>WDJOK#~#ZjZ5) zjiD{C>6Dd2x4rIf^_8pK`lukp+bc`yG(zyHTnAFF#!Z>#Wdbf8oXtN{)p1$^hCB~x zWYbq{#a#@cj+$$FFdu|1ZujfWkKVn5I>F5A9CwpRPHWPS8&iK4d0m-C7$?>b03*q8i-$} zO*toN3hcU(SbyhlQ1PVB4wdbpXpq>+g>%nqhuOUE&M@=~=Z;p=l6OYKa{90k>A!&_ zb^|!%-c`5(40m|EzkfJ)aih;$ky#4&WO`xDo0IXrh#{Q!m2 ztKL7>X0a+)i0q~Ev)hgG>r2#EvPazx?S}x%FRs}809l>Bi#$ey#;7WID^*}Afq^=~ z4ZrMx{f!%-;IffjoA>~r9veFP3T^63^bh_#F{(tzb@vJ#&t+?*Ams9=o=>3aHt+mv?-B#9?~+>j&Xz zZL%M6*LnDL>ak*j1~KI(C2FbJx?8A-FwN8Pc90U85@PRSXt*@x-qV(Yo7o!B=7|P4ZeoD5t+P=Z>1+*k&9#HeGXldsCuE+M8amb@Mf8?KL`l zlUgwyr^MgR@*~zIYLR}=d@z_9)PyNrs2TT6-aqK~H7kwO^n2TU+{2x(#B$>-PJVs5 zcE3FR&-CnQuN{8BuD_n1p0XLbylDZ^ETb*T9KJD<`5*6_YFmGI9hfj%09ykSH7XNNzY@I` zG!$DHUbWFwA3h5gR48^2Oiof#N!~y9`y8S1ws26CBI2va;nACCLS}ngt36Yj>X(0}VbSs^T`l)&)r<$7@V+0gGfQ*vTWXJd2 zB@s@u6?aTcjMvNhdO`)9R8jJXSB6Z~Ip{YyzqO&w6R z`1nMa-i(edbbHCXQa=+|yP%|9k+)&Y8WdOD7HDn2%04?it?Ycn8w8lD68j6(eXy#% z&t*!HWv5K5jlS>1|A$;Y6=hZl+r83lo;DM-a7xB@IOJ*R{2M5YhIt z0+6Hyz%HuR)QR9vib0)f{|B%>6-`V}|I+4r1N@QF_}{NiKL7pwrUVpu01x%keEm5J zSWv2k#wf!#4$n|R9GuK=ZjJ~@w0(*H55T;JAG9`*1ad_H%60?Q#t$qaRH+6S=-vRJ z3ApxMFJ1tm)bt`iw+yAyj=1>kwl!0>&r5Lipit*JMap+?f&B`kdx@0$7)aQGtI5gC zT&qr1ic+Bg^d#8lS(o(L{~^nxsK5kB&Ui%>0$R5z;lKFrSSHgFHOK$Qh7U?p{TC1p zu85QKFZh4Iob1U4exP`}`oDhge+cFO!vFbky%5lTc7Fd3_-{^osUzSf;FH?@mRw|yy{`+%#AxHm5t*@?p|Gr$RNyy2``QN{?*R===pK9<% z;(x)~$V*P!|0TDbd;Y^%{~rjymwE-r)|lP+e@OUVDlmHf_pAK>&)Kh)Ac4h#L}HF6 zrKy`po-dwIr=OmlzOgu`c2;(Za@oGPN6JYN6cm(RFE*$Z6C@d#3o#gw=NPNtsFF}k z>QPf7roV*cFsb2Z+>w)$TRgkq0H4S4?d<`e?Lna`D=S+(kqfIO+uOjDN$PzAs@R6G zaO6XRj+NCyfvoS;V`b0C%Z$die6rfWoF^uJtR7Wd^hn(CJ#hYk6a4JN0<%EAu><(% zyF2gi?7Wu^|2xesB}MxQ*cIbg+3zti?b?>v^-BaL#%hDbQk6{(`X{y)cuZ0E;w=`3 zhe^!}20n_Vt9d#?w` zG>6Ow5-L-VJI-6wgC^W*>@`w z%MDDzAD~$;o|p+UGr4d#ne?TWl-vYgXLGtF;MG3_*8?_{utxn%o~Q=V+}&UmhY@(rCs!ry z;_vTqAl3j33*b%_g@@8HMu*`0fa*j)ED3@LeSgpnq8nE20OH@Y`Ii?Q5|9Ud6D(oi zX*CI`;sGtS2#y%-1E&GxhoH69KMbunkM4Pz|7=k{inFh;4@j+;pUIiNZ=cA5dYtg1 z6pv|Vwt`fb1Ayq3+YJDrzj~;RrC`>T0gNwjV>2mbuC0NO0%)WE&il5kZ;}JR`&n%U z5f1HVG)BR^$wdd5c=XSbqJ3X`7-*+4dyF;E600Zs$7Rv@b^ahI)l27S6HtW$*O6Qw zh|-SNX2jr`V3=vf_vFdEKn`R5+{s@)v^`oL%BBzqX7_!@&6mKikGjWCPC?1Ee$|!rq#&>#I;Ir~4 zqr^ID#~fle%xNHWl?iM6Mf!n17KDZ19ZR=cy4!uTF~~#mEn?VSz)k@j|8do6e%xCwQ(up z;4lpC83ALqIAKU$S=k%lPjY_++XHCUr>HW5F|?{T{rdJ&Q*1kmNrK5C~ zJrWpp|9*vfNA1I<61x>a!5qvpV%7rE8;Ey+JOCOY?}f(lh9->?!K1-c;|%(DGN}ji zX6lirs|gAV?djFP8YMwuZX>0<4%Qtug^fHGi%Fy>AEYSmM+_wqBbWHxIRSL zu7S%r1S8gxDPw%`RPt>X3N{TxNuMn(8hQb9sty2B8~$^%Z}VYz_V>>pXP#{{x%^^} z6o-|P4gAzWbL|HuZT`+-lh2W4{S9Mp1)-UQ}vRwK;vi zR7f}oM-{|8hAXosi7cxD)DB|hmZM0Exl+woo4Fw7hM?fo`0Gq?o9KWFu}=eZjkLLi zz67DshHE{5;t(tr;L*VS6(Ke;hB5r=bnn%PLX&$0_rw6AJqtT2K3VlaK1*&uJsfg zgpC4V?xHUXy8=;)#AbOgJsO^PVv$Q8GLkF$h>cp>87vgDRL!VX|M_al7F@_;qzm-l zGZ3l&+5hT{m#Vzi224mq@$=VbPXHa%sG%SPB{bnmnXx|1sqs+2fs>=W70|S}fM_tp zqw)|M3d75_bdSkj=pWPAlu6IZSJ0?Ir8OJbBjQt}xs68tir62A(v9`hx_UrF& zPNt~O@Wl7MvW=?$^DE|#A9(il9DYMKqHc zWLwg}J7kN`U2U0Gi*=Ej@e3QFo*r_kP43&!=H#xfw*%H*S@0s~Ca+ekv}@?gRN|FP zfmkMxw$t67?&0H6e@glezMZN-IE*kCENIM{cQ-b~3dORzxgJYmnDcwf$;JsdM&h$= zbxp_08I}=TLp8x{gl&WS8Lk##De`l$g$(WUXCNgADWPYJ=f_f}hQOZEYU50VqH_bm zDcr4i%UQknSX&K5R?R9@MrmDeE55@OrYvu%B8+l69f&5E3tZ92yHU;4lH<>rRDW+m z3kf&R7n4Y#Qi*4XJHiZN$t9YyRppIn-FL#c$4QN-<6@6!M6`&;3S^(cyTA!APj8Pp zj0}v#<}R6cWlL?7MPorrXA4CjzHE-Q4cvy)R?GIc&HU|+5ltJ~F&9i*mPte&+}6g) z-FJLn+Y9(2{AVq=W;vRS?J3zkvz&yM=H$#0@q;`sy>4z9kC6=gTiOmq3PC)gcfc7Q zVdNuQesDt4C{=?9%V;V6+$I|Luq^o7lxoCjprTa;*H5*kgsJ9pAl=emXPDN;ei%(Q z7JeBY{-Syv-U*MO_vBK$Jiond_L7`li&IKVV#BhGNWETDbi?yS9I}_`>*1pnQln}J zk>g?{hA|Vs)dVjOzSoohF_h)I-X1E_U~wOW}107J{+IcbMLAVKn@y`5nZ)Y5aZx0W&HJ=EM4eu~Ue7)hz#8X;AOiKUb71O>_S^$K+-o%I^y zA(j$PJehjN#0tp%YbL-=e?*>^gcImwDT+;7*)TS<8>UYc9%SLYC0RXT(i82%SW8XA z`V1GZfFPV~b)gt%b30`wqmLI`enwac1qZ?Oq+X?cC)a_wt}&qa8DZV*ZDp1rc@ts0 zU9uxQKg<=YxO9#E4;GTm(IRCGKcNjg+i_}ZRj2BobtrL6Aaoq|I^saZLZK85gA;up zz6<|h5r%7c=Ko!+Kha>qt<)*sg7{ zzN<~1#ZfgsM-zSLRTkG}5$u)RfYC>}el3%W4*;354CU88=@&*p)znk2GEvk35o5Ou ze;J>-+U&5tdaClt?GL{oL?IU)Zml8!5tjrA-9SYpBSOGX3fT;}W>R=KzKx6NOgiPcJ)7`dUWGa{SEiyLh z@pJQNj%)hSGy}t7n|f82{?I7eknz<-?`rsYcxUJS0@G@}rS?7RsN*rX1$?jhCp!X- z=k^siZuJXss*0Mcj7$S!iv8$Mg4UzA8S@CO_<5Qi>@70FIl=MMCL-D%LyCOqHx^ny z<0wCPGDe^J-#;dN8~wHkguW>5PDB5C+mQTUjnysm%^6J-qhek}vMq+-XpU1$1I_ke zeC=2;`G5kvjX4>wM>dpqpzm#Gye`Tx4W@MW*F>y-EfXwQ(9g1~W@{(~N*aicaRw2!J-e7tmC zg8TreNo-#qle_ngHg+0cc8E|tJ4NfVsutTd2d7Wf#i#O;p^mwfE~6dVOFgWk=j zPnAkFSyQc`&IVGaAP|1rLlS1pc1sdNbO$3|nbG_a!@4E{g}qb2>&|F<vzr8Ys}f9HLds`iUpj!3}=SZGaz z0)6pUxo>7yE&lyY*2z5?8Tpzwc(DlM#@p7{&h$x~Mev^BU(&_9C4g+CnSIbuc zBB|o{u9L7Q3bs^B7Br_w_nt-H6G|W4Qmd!GZcF6$35{vg%gQIVx!s6Yy$Qgl4-;e` zodlS&6OSxIEm87ei1;j)SI+$;%}JK4=I}~m@do^<*kyO!^<&WBr1>SueAROG<>vM{ z+as(J;~mCp6aqOy;WCr5YNN@TN&=EhO%H7yF523QiwUsiU6I!xiJO#<`Ad&;;4Ljf!#$nZ}9x-$Y98So6lI+0zwtPO!9{_H0IXjGxFWbkP;ig&ljsLJjf#1aM2 z?ILRhXZ2rFt9$THS%}`v56Vy^6Mu(D2aG*E(u_aO3`ZJ6>7n(UUmE5#qFdq{5gq8u z(FA3YsswFX+nRNau^!X0Yge1P5G@Vp@rTBU=xffNB#)jXI%gnV0s%nqg^T8E5QB)G z{7_Cv7&mX){v5@)K1eIb95e82uxyq1zrZakgekMUecWONP07Ddgj0SWEaM3yfpm3y zaG3Fm^jK4?Aqd(h=h$*vqz4Tw=G0r|g1pyDHSoPU*c|fF^rgfZ%s&QF0%={C;iLgy zT0E(#Bpeuh(^+Mce<21smFnp`1ovl!UEUZoMx?6@+*!qk15O9{jHhN4b;63Z=$f;M zpmaV6z0S{VzD$<(eq=bQ3CmTikinNGZbw&{y6kxU0RpeI_kFX(AiV5F`Y&YIXDIsR z+Vx^ zsy^hL)%>xkISBIHA{4SUgP%;u>zwcLhu5RO+{W#zZA-L;l{i}; zqc;7b?6Rkpy*c#Q;O2(-&qo6~_6>L~Wx)g@XD~mqJM{}8$!pq7i?Y6I5feh0?Gk>9|ElF-PH1-q*hT>} zG$f8w)XX;(l&pD*(7K_Qm8d+FCj1cvd65Fi(>JYT*z%k7W>b*w^ndCoAtBpKG-=38 z;8cw`Q(yFy!tPbs<YB?iP zFM{qni!C$WOx6HyvKx{BR~&BT-ei;&yd=~VnvW%_1AQtx1uH&as(M@(p$n&Gz)3J7|R z3XDwmEdRn^SxaTzWLRGxg@xn^x3kHJwG%Iqj!O?Lu_ZiW4Ma2>kW`Beq)bAWXYzWH zoDTFS{i`NU`jhZT&<>e8=$(Y78I2K%!9}C2Q^)ZtTLQY(^h0HxDq+sZrhDrgR(&H< zxq$oY8xyeSJ?lG5a_<}x0+YRmkxe4sUaS;R2W_@x?=RdxmUdkS88l3g@jRi|k(#Wk)z^~Jn ziPhr0%9BmGj?{GyrN^(YK7gDWCs?14UgCqrW$sLg+Sg0op9w zD4Kf-=C~oo9>>(&82nJPF*^KX*xzG+W09awL`VJXfU|gkj$Ir6$C(TiF`eX}VaRg3&-h3tujm3@zC@7dhQ ze7%HEC{<@mw;@K=&xO?9s4eW+WuWM53{MFMa9Ss$9Czj@rlatKPW<(-)NY2Qy*^-) zS9E{G%=AFM8dQ6CG35UFz$l= zDOKPSRg||=wbM^zIO=h2ZO~9CF877j?_HK4BQMUMu}cF)u}dcxzj+Hw>H7_XR=aF+ z893DC--YYqj|utrLL{35wLj+8eR_5Ou90{JM{_0%;hc$Fd9V}(`ZJE5Q7C|gCfr4f z_d!#xNpvnpn{9BHMo zr=S(SN=L%Ty9lvnTctGCIsOIXA|MZ9-5<8k->nx066&%(w;o5tC(u1%K?ffj=mw`b z`Z&VI7u@f-rjHOy1FhFXUgq4C@d-hb8TwV)qMk+@wImo|8zN+C-wGUgCL}yFD?=m1 z?159*#t0444j?BRBN=$36i7tuZ5SaL60X$TiHrV9FNDIQAb5+ObPuZW9e^Swthhk_ zBa>V_&<4kC2a zvPSpLy+f>N`2XYVt>UU|w>Mn6rAwrhkPbmoLPZpiF6l-ZMY_8~q+1#(0VSmy1O$<8 zr8}fy55D!S|8MPseX`GVI-T>KZ;WR=W8C*OP-c9hdx$j7B##5G5m~ZWihT?gZmkaT zbsBG$lN%$oz7Y3C;O20+johp2d$Ic-1jz(Eg&7jRk?t(s<6;U-lomf}uP3K!2(G>d zH5du-Zu;t0y5PSYPUm%X zfkXL;2(cbGAvH-u4jLFO)WYK~(x6mEBuwvRZwO!xt2L*<`@CF^;6ck=)y+2nJfyup z33@Lsqz>@JE~3qYG-+#agsysmhb}>O*5^VemHjTnmz;E_Tx2Yfz>7AS5SN=4Cw;NC z`+jRqGm~PV$RT#vk7wqhKM~0~iaxAElV}zxyLF(d#$ioqp`~3vR7Tb$%y<98B84Sa zBRQqIF>Rs^&#jJX?u25zX!8B;aPQSjcK0yG&0mPlbT-IyJb1&h`r>(aj0`+%d-`#M zmdT$9&}X+v(ploZjlR5t_8}EojID}$#tp$%Y;yM&s~zxpZN|$HtqoFZ{PFdO3c3^) z#hiIQ^@5?v;?c9fsKp+~l>iODJbT_>%z<$}ek0}Y{GWs(@AmSQMov~J8k;9lX&6Ca z+iF+g3-nJVS-I80{;{jNU{K6nY$QP4+1^u#SVo)XGXS+Wd^NT~?M%PLo|{@tFBf(V zKVqDjMP(zyL!R8B)J4XLR+q#+oQIPY-F9ThQiwJN55uhjtsMD^)vKPCtr2J|{ME54 z<*H!6j*mj`u8Yv)rgtV*#?kxY5!v70kyc|G7SJ(0J*`2K#N*6q@8981f;U6%uzdeq zd{|TFHjlfv&}UxMp2tGp7lQhUr>C?P|67=dVk@K_GdkwZsB!3RUv&A@7Zw$IAb9&N^yQ73F;}0J5u?2*aYW6Om zmotze#nWN(5(jO?1oQl6q9sVbZ$j2eCyRny@wukCszyeiQCA5BwzB?|i>Z7YqWB~j zb^a?L;!q0xgJ#+z)Ytlb@>$i}ckgmjeu`%os}cK*Rrtn6+Gk?;lXgdotREd6G1L(L zloM(_lm4BZ!raX2(;|Z1K2WZ@%4k`agRm);2o-+ePP+Z1J08O28p@F4P6U6jyN~qs zv>{L&$;4RnPjW7)@(7HVJzdFY`<8jKe1a8BghD4Mrhk-wPIxo-=&O~c!C#FK=E(aP zp&CkO*ai65M(C|fX#twcy>VeyDHCwe-r|bCuRd_$Z#B65Uk_ z^iI6jf%#d965pQtF6ve))?0%3-CIHo3mJi#=MKM;+ujG+b+CcUtmfnS38AcS^%Dhm zLSZ|(1OrT{^>C|l*Cb+KVIw!&RN-pIEaIRTq%SN{EPo$IET9gLsFsY<7Xc2Lv0V}m zmop=VXK+C7)1=y}zD@)hT7p|((y?*VHGlMMISx13teOjr;{9vsZn96UR$TY(bvBVr z@|!9yGtULsMGgJhiNC(%`rywTZ9^@Y;;p!#v%G?hx-nMP<(9<89Hp+1@*rrR9Ht(X z-{LnNzct&bhQ7$UCV(l6ZQGTgk*ra%Nr^z+<|!~ z{H2qw@Mu|cc*Eop^f}vCD<6vA>LlpA&rio_7z!383@stZKvJUyhWQxDP!#`K^%M7E zao+Q;c-yI(b61weeRlgGfVpjzHx3k=Y;nZgE_BV9e~hvPNCu1^$v4Xnwc|`gKh0y& zIsY9ipBR3^|E<}ZjqilzF8u_;Nc^u31H0G#FX^#;MV`esj$p|YxHqDf>|%}cKh+RT zJU5gdPSO-0{6zCMHHNS?RFjlV1L1kD=kVvIO;V_Kbk*q7*t>Ns;r$7aC)c1!N?q0@ z@Qx+mn_%O?)RfXBxR)02o&;PEer&NTFys>>X+T=<$rD#j7 z$3GqvO;Vvt_R)SJ54vc784~80xr4&x(CJX{BKs#>_3B+J?swv5+*6Z=#;UbP5hy0PhOEF#y*VF#^RArU23v9lzOI! zgK8e8&Rec{2RVqUAj7f}Ba?b~4@I|7Z?lJMLHZ-|yzehLUrX$>;I;N+W*fOL4$*XZ znOg{$Lm66&yH&oinaCl(rbsgdU5tsjXeScyE{?+#C_^a`f6M*=T!#s(7)#=Kk)Pr3 zHKZOaP^fl@_4rjsM=skjiiwF?(BerX%TeK1CnSZnJ}@58{z*&l`1zNrZuYeRhoKz4 zf)=e_Lk5aCT?Nb%@cc*%fipCi0SJ2gb9^_A!xGiAT{;P|Ek(*tvbJoybx7 z-&k5T_HdMxzu~d?`Fhg7*QKwnjtRTV4Kj7G@T zTeN>2ANwsf{~~_iPqB(to_>N5t@<<-UwY(3r1L=nhC`CSAxD|95-muJ`g~b zL^x`?Uw>MKmF!rHN1MJC12553oFYgiX-O;UD&E}|^SprCJ+#bqKr%0wuPDMJ-U00t zWnhW@J@%A*nx&8fSk+J_@=Y59&;3&_;qtIF0sBQzooq!)5r;ktOiUy{Ezkb+$r4(~ zurh&^D0NXYVKL*ev~)N0Ql@8SYPsZRh_RkpfY8j@A}flWI0{q$9=!WKQ%C4C9LGS% z!4?v%rxgFEL;L>*vbHi&10N5>JknP`a-Z~NBD`7JWd4$p zNF{GsPtofhKYncOH7TCujD=4|<^;;n)VVWVP`{;fK;;9;4mM7pN{j@O0l4~MwK8Y` zTQV0k5|u#z)Bw&h5N}aGav$HeBz4-J)@*clfzxz6bME%53B$q8$!R5S12)*bbG5UL z9&SJrgH`Br*av1_Fn$tOf(i)#J1@UjM?NSXgCinDp*S=L1;N9$xAU`e{EvRxK+kuL{@XqJwcvqvyj1_UDL#Od$ebvs;DZ1VH~)X^-`_RDmUTBs`Il>5fgMZ8PZ zA`S@-mcGKa0NLg=AB|L3SJ%NW5tht%2P;R2NpL=ve*boWYvXGIEq~xIRrm3G38Hq7 zz|8~3s#kMbky_>y;})yi+q!^SJ0Lrd+l_A=Pxt=lSIFOMm(ZA5o)m<=n0iW@Ju#~9 z+pG9ER4bN^wsJhl)vAzX?RO5w+E+(}oUrFxn~w*6ALaZ4F6EN3OleBafyHDfwzuf( z?w>yD^?A=*9EOD}?87W;QDt}NXTF*ik=#Lg+g(%sj=D$R<1OAWenjYxC%0JcF_qZ$ zeSKFE^O9ey455mCO~r6|CE03OOZm1^&C|yYK1zn@(G7Y?SW3KHZ?W!)@dXb!j>GN> ztgc|yHDOpR@jri4q8;*Mv=)5%4a6Yl7w5cy?oyh zEi!{^d~%S(|6U%?H608HZ*G9l?gj~5@`?}aeVc;c7vg`&mXNROcS?*mQr8&}4Y5kqltgb+_p&-ZVjT?9}>6OfVl z=Z3|5835eG87MGW=>p}y1>H}$h(|;ybH~~n?jBzijkbe?1myCe1UEJoSCBdr4w@6& z=zMcMf^=b5$aYrbU||xZZJ+HL-A{p>5FW=>oO6D5CP}P-Yy!;VK*M`VQy~8YIkw~_ ziuys*0R#ro*W@V{&hw>~Wj zn)m6HKK*p#k7Req=m(KKpOMF6JErWjhadoZoqlUX`7kCjr3Qq<@Qdt70&zOXpO|B* za%U>svbmA8jrTxs$kK!l$Ug$@mcPHh^ev4>2-zCIKbcmc_o56pJYl~Y`;p6@9D);iUn@Ipa+J$@fjjraQ*zyWGON*0P7+AI|BMhQ@ZU0&({%;30ps zJAl~6zvsDU3lP<~Isp9pG7tn$JcxUg>n*fD2i4@<<6dwvTJZiL$2h&qN8Cxn6%0C& zEq(71fm+49~B20OLXJ%QSu^ct-{A4>Zu9Jd<5Q?vI0051ag@h*s=1s#4uz4ep|+ z1{U$D=E1jQJ}~=mC(Ty~05zV80z{o$7oc@w8*0C|ah`L}P;i5D!1m!8ATu)R9 zMkzU#lCS6=y#s?!zk}=v_3j6(LGjX8^vBT5Oq$hD3}{~Q=aZiO?qW2~^8*%a=M!=> zSdVgUs874He;kS+=1%)|1HiWc!DInc1|YOrEmWWcRd`^c5_8o1Rpc-99$GcI4?q~chxBalV4YX z@~MUt1@)Rv=aEiV@CcR7gon_rVFi$Mjpu}gVONp!gL!~LDua5#$Qe~d=`Vs&XSmN( z1AIp+9EMvlk=CzsA*{d#B}chHj$n_&LR>W~O91T-jzgdkm54L`M?Ag-j%@L=+f--? zLKBkR@gb=KBC$y7?S|oufvr!*Qzy&qfaRf(7};h^`@zxcqhAIuvw5UUTVEmi*U$|f zK5`EhgKB(A%Kp`PLQvgGs;Ynn70KlD9YMs1k9h9bZ68@khMASUpN>1mihH7A5ZB91PuhekJvc3LSVyg3OdcC{BT++zo_@ITUcZ#IF4=KxGA!&uIMVj3nG~X zCE~|Gy~1bsUH*Wm4&xmpbaPKPp)zR6IIaAc>GQDx)6Ud99!OsfrIA)@?Fe%T z{7V3i7lw*BV`Q0wa#$P6gHbCqp=5-cpgohDr{enZ+_NQZS$ z%FV}FO5R|MF$)qg-Wr$%-<=4qQJ|3&$P>T4NCQ9J=qJ7!bXTTtXybTzK?V(1XB&h9 zz@e>x0xvjD>?0->D4}#}DZof#tjEw_k<& zDHFp;LM2d4Lb)Jf;jSrmmJd%W4j0l`bmdLiYm5%dJowTe)e5iXsTKsgINnNVUyOuO z5-Ou42PjLht+G`iboxzdAcXap$*y6qm9xGAnSyf`<)6^K*93t-fC&oi@cnpd5-9$4 zkUtW+9m*LbAKnVlZB<|zwXM}O^X{%Q8{PT^)gq<$ zc5fQ676U``{5ZE$b&Fp-lkJRJD?rR|HP^r^i+5OkvoHV0kcROGKzsmp}Z4-u-m^5ou{@_TjhHi&d=7IenN7nbM-ul z0P?qd90sD;2%0)Y_A-q!SetT2^g264sJbE+e8b6zYr)WCcL>=WH-77d?EEV>s$El+ zk9R9*GYKPuSb5IvNC@c`@AXRg($_GbDiWHVK*cUKHMJ%H74F^E(x}(WzrbT6&kPzB z1L*XVHL$IQv-OECB#pX*0qsdL7(&OU<0*gyz_+tE+3#j{)1 zX`ZMY2=bu--q_NJ(-hfW1r6SsEhDJx?QDHgQhC94moj;AbAoY;yj41RB3j5;LohW}ZAJ zHu45K&^`AKQg|Yb?%e3eU1T_iP|z@~eM^R4+(RTACqujudn)tjq!?YgmM{MqfXX9{k!SP?>nb~CoRD(otp50}fR6DPcx z*45RuHL*5Ov*Nb55#~W9GBxTgL$|v|p%Y+@cwI-|=98|VF%r-nGGUMTpdG2;2|b0O zKad>2JRV$)Lqr*N+n}27V-!SvqV33ZtI$=Xc;nI-y?umb)O0BZyDku~_8uyAKXkh% zi_U4>Sk4sVAgs?kE_Rm>7RY}3{wTpI5D72ew~0bBRH_S)lYVlWk*&=~biywyv6cuK zJT`0?dD$$m3g1{OxWGfc|BXn^+67zPn+CsBBTch?Az;6UiCzyJsKN38GPU_x5R){A z;^P9_5m*cSB?$3;JK5FH?uwtoKEePGuMazf2EQ1#8}3kN_s2I!Cm?uHxn8WAOQoEH!<7gSXwvnA!` z8N%IwI`LbBLqMPg*qU$VAAmEH{Oj|5eezvNbDA+@KPv+)@hj-KO6ZwmR4zdkf5jTi zCck5HMZAKlvy}ey#>GZaHAK7qzDLp=I==xzRf5NeFBWthXi~(vpXUpYYf>kV6vEE& zIVXY}xeIgQ=dibuP{NMIIND_P8dmzgr8c^FhNMG;~D(1lKjclx~z zx-%VdDk=&x&z`1M;s6NFV~Feg^11IOPS$Y8Cgl3vm_n9b*U&6IWo5jr3ZV)8pU@OR z*4w5a?%@9!^B;3w4>sx(ByzeiVLF9$>g0LSg&V<3`#d-UXuv@Wn+KG9aAROG#f}sP zEe1qma$tDkqlPr1i1g5U>ktH)PoB-9q1-zg9YZ3He@xMRYlewmhMJz{Lk#l(AC?!) z0ccmOeX8edd5%hj;Npvg-|)u)tMmdql-&tjuE*PQta*$mD&kd80}wd+P{*^Oaktos+tfL%8G6{d&|+7%xPqe>kh+93 znUBEN^H4Z`xxg!*6x70md>!eDHkM2_CC^RIvVY37S@B&mcLo+@mg)4GYH@i~b4` zy6^cY?9~kD!g0s!$j)S_OJ9@O{w9q?4cJ>7|!hQdP1wmO0ktB%(hd{i}z$|~V)+L4+TxViYlZU}3 z=8=|;s8zw$G?4T;8CuibnUazH9{IFRDtr2)qO%25o>n8B8JB{OY-Srm?t3RDVC#}# zbr7N4>}@gBQQipaN+&+_YKmTEZipuD_r?8u_Z3$oV0=DwKdE7e34ZFGK+hO#0DGpv zSf;2{90^27m2^O;H0&btT|s;ypa4->(0w{>p#B8>tA@c{-FhN>@_5;E3f*O~w| ze^RYw3+z@c$mk46pu7>!_4oljK6oG^YM!F_qS@aPT_m*y>lmg_Cdu}2J2-=7r@#C( zMveIbx-bwX1c_&sr=IqV=`3)g*a{#@;93O4%uG+4f0#c8MgIF(dT2{45CO1YePKZ& zTFPtRXqbRhUkO9VfwWIy1@!Y-B{vN$3j8w|s-urpdbr!CUkIrgVz8(c zGiOM);qoxIvRM2ozAq9&KqrmOnPVzV_ymgbhbqo=x5>NUgW57^v7n0?=&giTBL03J zv6V?*1fpOIQqBlR@tBCpGJ6~Q<3XJQwEn0MznhXV=L0}RpD53W|5-?31m{^HSy<4m9=L)69M?uangZ;;CZ}!0MOz zEZRsWr89`Wocw5s3#SS~6D95|Kl}1@5QU6Az>+gY8B7&KR&HlCe$^6s<92h1E|P^N zIMAzMWykI`Ridd2$IiOf=KrEVE=t-glB>kZ#Q;pV{$z#`kZCfk1bEAlv9$bM&2~vh zLpuoY5%((Km9+ut*n2_PR6EnEXhf1^b?lS8aSX)yOk9mzss*mv6V|aqTn0p2`**X8 zFI%ybW_Bf0BP?NmM2fPBFo@PquzA1h_a?LF)v4Kpj6SI|FK>(`RJ)8@d`<^Z;_u>j z7~#?@z_Y7y2*E(ym?0P|_Ac@Tnl2Bxp2x>ENF8{H?oRZA)RS~T;^i*~X*z`~HN}ud5j&mqLEuw(zp4Ro;Uh)N`*C@p zONQAIEN}K7Lr~6;agJ9)Izc&Iz=r_bf=j**dw$|q&+!91hMl%UmkXWGI9} z;b9X)Gm^#r0SUERKFT=__>A8IDGc$&1(+&fm{YmMwxnDp-;l{Z0IhjXD_{2yu%F4; z_Yw{SaJR)v-&g#IB4kI_*LPrlLQkCWd6{Beyll-EPy@JCJr{(}p;=mxq^tZG>N}V# zIF!|i=LITIOC3l4mVI8X;Tq%?&9Tys03=k}2m6j7C%YL*F@+Z!1oHa6XgcJ2IhQcG z)u-S+3MJzl$Q1u@djyK3y=zpDdbD13F->&B>?j?V?mh)zs1eh1sNh^--DU`Q(XL=c zs8L^#fxAeahutErzfk_5E|B5#g?Zm#zOo=dX`=ZxsLIM^1Igp1RL9ZX-Y3Zgi2VH8 z0UV88th|&O4%8kzEr99Cl9>*Y20IA#eHy=p;_Hww#=|iOV_19U+z;fSo@Kiy--#rh z_BHd>S5Yu}3lM&|_JLeApAqoz%u8@!@#aNh>~ zgyv8&a?0S~PzZL)6$#$$m4!x=AJGP+(o|j^7lz_4CUIHWwCvozzkK(uucZXT1dk%6 z(J;p(#rK=C2Ntfs%P)xoWzEnoN~mjSe>MzoHjYQnX)g$Kn@$FQLJOf_Hbn=k0UiWu(92?g2tzPwZ3X74M>x zBBt{lw&azLr3rlEd6-Z3@m{|lx9^7`&D9F`Z)lnP1l5p)ak-%(O$~pX=0Q}IWO$YJ z(xUU{PbmnQO8a2E{P-Bad_UxRTgeQl_iv%?7wgoMvP2a^7Mc#8e@ZRM=X6B)Utsmh z9)-Cz-_aw(Dfk?|TzKBPAbf^}h4oR9N8kA1{5cmgW!nS3HmvJrhy7o;Tq*+5?jaK1 z9pt!Y0av>$2S#Bvh?}9JXjnsaf*SaI7_9EnoBGsehBO6e*~ph^JSJEc`lY+OcIz$m z(6xTv&mWw|6nBI{SvUW=srVga~0wm)tk}ACb{; z^!FE4$bHs0Cw7IB!l%IuPbwtsnTKqVc$E#^5n6%rsE5bFSRG5q0=N9puKi~nG1C%Fa(th3Rn7fsl(Q-qKfW%p(I5R=-)X7b=Y92&mBh<{F1s z!Fd15roF2R2wkV(qo`wJg-#V-5R4$Pg>6S2!hLGidyI^o;}-@Ai`+hueRmP00x4Jy z)L`BkxK|;<|9(9551Imgiy0{{m;^4Nm)x(14Da~ob&(Xie`iPiVVeHWOF(sCqjdN1 z$d^qrygEz!F9Bl0->*Y3Y>Ot&Y$juL_G-TzP?{!97$_ge=A{yX;V|6ZVk zg8WU*A7URMaQ^%9Jxb_z9iDgp`**A$pab7D3P9cT`F{rkg7JPCMi9*bu&w`z%SzgRKu-U6 zOfdfQW)$ebLFNA(0(ryk%`Cb9H;tk-3y5ZrlKfct?=Jx01yqlZU>F>LsV4!AAu<(Q zlY&orn}#UC+@tJOEc*RiSh>A1Ol>aJ`$;}Sn$L|{jS;)Ok6p4lq!um2q4 zRT?)HWB8wpal)$C0Y95cvM72(BU*L9F z8~98HPiV!9XVUdNqrEE4fB`+#Bg;Pc@n!aoaGJT;&id()*y9x6!D*dM8qd{MosIJ* z%mkaxcUtbEIN~YYT%AFP{^wIyD?DF?f4n)1^Yf~H|Ieuvxw6~c z-yc3`?V=%YB9gLhi0L>o9*rS0b)9)d;$SwPd?&+6NY!;-uq+zGGS3SE|C4vDqDx)I zsm*+?rmjKX#g2of!(~Tamy}Hd0nznPeq7i^>xO(ojSWrs)=qoCkid$j`p6|AkHJ*Q zgl;u@F)sV$j%>^$Gn#nsZ9%HE?F6GH>sl9%2aI&8FHW5@9RHa(x;HNFvJmTYH(}dz z-Id3-dL-V63t5pnL?>Qber{7EA9c*xZB?>={>ww$)FxriDfTW+^-i0{=b^t*m`dBj z$L;(MOT)_Cs3O8EM7$dvSRK~~w5XqDcUpg&a2$wRxMQ;^Z0U98{E+mK>p`w*S71p! z-FsOdZ`6CU(+*F{78m8IcxFJ3;5 zwGO)5NaMa;qShsIOXQ*X_Xz1QTnm*l(@qTz3C4mQ7VOGc;WERvi=Da3(~B zLAp-VA=>kA-5LkC;73JFIPePbFT8YUwJPIE5LBNU_*Q4^4|kSa`#{!m+d; zCYhOQKtN!Za_mY>H%C~R;6R;_;pMG0RFbo_a9vXTm+6t%rAL|s$%)bAcT#G8ic#MA zn)dcx-7}3R4@_=d)zAqTPLr}xt_fYgD*H25O&wlyyebw$r$O!9WwK3D9WWMuGMD8S zf0(no>OU&sM6R5#sh+=y!)r}QO(kYFW}V=oK0~TA?RlrEtl1wKQaWtBC)%WAu`~i11;SVFjT;?^ zCLOlg{xVg(d(>0%@p7P5T^dh_DsJ@1cwyEo>{u)%ziW++>ZKZu+k#a4&XM2vN&9JI z^_;m&!OfEZK5_ID-CBMq!E)hPwBr$t#cpeqa4J_5 z8xref-cFJ$5l1HzqhqSq(Ir1qh0~+Bvhy|EgVI*ZE-RkMS4|FLM^Bj^lb#1C8z*@Q zgbMx?OKw`ZU5%<9r5EBOuG~YmEj18sE$^u9yrt&9*VEf#`S`7a;H7<#a)yI|rrX6+ zDYMPxJE(4HbPQn|h44!|t!wXJl$}u}1uXnSf8w>W+Nq^q4+8&P#Ganu6QN1ul%bn}pU_eXF4HTIf;97*|_V%@z z*q_3icy^=2I6;|*+w!EOnv%l57_V`M_w8r-z6e@~W+Bo+{}KUcX;~x|qBI3R`m= zt)8YXGk=AtXWS?M3<{_Frp7#)LDqGynp_R5;(OB;@$eOuTS>>BVv5b?quV+r?E&;2 z^IwidLmKVwmbP7ds>0BU2$OHPlfdPE86mGDkE=`8JM$8|OmuA5JjrL}*G^as1t|mt z4is!rC(6iia(DE=G3VYtkI8OX2;X`%IlqcDS8lnmH)hjS&slS3ld^>EVS7#)RxGw> z_@i+}4ej<8uCCMNceSptL(%&7>%S92xu z(xGa=mdq(5oZ`!xY2eo`t$`Xzp|58(mpzi-2Abp6jCjws9fvb#V)njt>Rc2Z6sk%r zP(QoddrMHybm;Uknc@7Urf~Y1LAy)SlA>_b6TVdU!tcebRWhpotR5E;H&>nZ@FgWB zwyyKIq@HX$(>?w~=UVf*%8kD>nhnC!S)ScLsSNCJZAzxx^7RKtJmP~G85tqk{F%Bk z8{4UW%S*rAYrXV|BrZs=#(@>Yv9%c%{9D5l8)zY#l`Ai2sq@{~>TTTa-50Ru%iCDA z+!4;OD|p)uv0~kbvzy4QiRgN8)=OMV)%rYL?8tVsX#HD}>&~p}@r={9Aa#`BN-;Ut zO0b|IO8;%HEZ=()D){&k;u6jNh$>Hr6~zfKS?Cp`?>!Hpr$4#goJlw+t*_pr9IU0i z9HXfJF1U>0ark3pbxv?>G9_;H`&zH3UG5K$MA)#beaVVNd z-y{8+1RDN?r?-&`qrI)4ezo_)cB0poj7{fq*`MTktD>j*NA5tG`tC%5JZm7rhi7xb zZwEU^mPXcb;Xf9Q_M_`ve!Mu2F!T6Kv38~Wt%pkQ{Nt2XSeeVk!L_2-zUf2R6#k}G z9rZ_lPq&?9y&P3A8E7aDO-kGz)gR|R?Q6Pn{7W{cJ!X03=_Kz}^!}ONxw%WkTQL`> zUiCxr`A(rzLMg|&byQgsTzjgK7qVCTl4#ZB)O))9$rzWVD zDMws?^#{xe6xetAU#mF{U#r{hi;bm(bHdMu z&6;612{tXIUYE`0T)*kb@k{myv|_1iHZEIe9d!MsV}JIuUgqoT-PaKZOjmt>l&=cm zedq6=2Upru*XnWTSyx<7of2`!Ta1tv3+19of3$f#oP~`%qX{RB7g!m{{IXe@xt*tM<3$`mp-`%bj;jmwIF`FK80vPvOtk z*BpuF(~f?PcJCAz$RZ1Vw?5ion^{dRymm`_ZhAa;#B`k?!#F13;hUw?8W8mLq+plc32xb%{%c$u2SKgMo+*-5Sm8~W#fZYUa`gi(&PtDqZy@1NUnJUdPgTyG6-|g zm=DCjHcG^ z$NGlb_w$54rX~T?i4B@E^23GDy~;-2#tPrg=6f6>rE(!KqQbERbKA4)aKrVxn?aR* z0`7(W=_eWvvyxA^b_=^bBsG68&igF*lkBZFH07JBi6b|X(ukH-F4mtPkdaY(?DU(> zeM;;IRkf@+ysotxz9rx9<)Yp3q-L=sMDP1$#p1!A1L}0k;<&lD3odEP)Xsz9c#pJB zHw$th5828$3COpYL_u?N?XJKwnF)9v9gTS zC$Tz%=397|f|K0>Z=ANY2*SSM_Tj`w+q#B5lZ&%~+O*~QhO)+$)&t@1GsmTC2MNVj z?t2#4>SgECobe!AOy=W^&~bd(C8+#J?`ZaCS!9##UwA|@YclwEQdXqcQw~pyYQxm$ zu6xNcRIk2wab zPsOsSm21a8A13hzuIx-v_vW9<`i*mJ@E`9}zpb|Bvd-5MOXDd+stlAn!|K|6GnMZo z@@@XF8L8EX{-kP@N2BXe^0Ams2$dF|MpfqfW;D;53;%P|T9wn>=J)eU<Xp6T-$W8osXkws z3G#G#o-p{Z(Q#cXL#6pww7eSSw0q|xrvc}x_dF?0HFgJg^3wL_i%BoZBnr}O?kn#2 zAvYD+ulqX(J+$90Ql?IPr#~|2i%sLX)Mqr+Uk8ihpE=Id&$}sSGh){?M~s{$fiEn7 zWquY!qv9?+WF(1CJ004TE6Z?gBRUALS6^Do7khA?);k!fM^RlYwG}m2{2-2+yavOQ z?yDLy=`TH`{VNuiA_A zwtV-s?)9X4+}ufyGIi=VkG9tbjn`=@>^8}+jzNME>8W1Q2e(OaLn?NcXAiEOM?Zws z4_J%pFA%VsQ4cRxW)a03U5aiedR}-`PBv8SZhKLgj`Tx4&ZHC01o=lLGnJ|e z#yF85lSQ?Q6w}%LJ{slashcmj_jxV$Zi4Q#iOm>YSYLU$p+IrNoDQ$JMd7NON4=wU z8`Fy3xXZxmnjT3RxgJI3W^*3z)m$G-qp-8XrzBhXVsA-`vz~o1UC~j8MdFB24~OmR z2E%=?daL2DxAIjlayvt>yKJ}M330h@bUazj==n}*N;B0v5zm(UpyNm1ViQ&s z<+B;#%99_(J+l#c#{!blD^>3j#Al+-27BFCaZVy z-Ct18>$Cg2(`x~wB8$}Xp8ltw)IBOq7lv&UN{UaSf@Q{7v{;gw9FB&|8cR@$LuIg< zUVX`Xug~%_YijJ%m`Y>(`EekfPRCA~Y*IB=_J_;sZc7O~M?{S%HBVEW)s#`o7@EZk zi_z-1CLTh$UqZT9N7ZxJ>HAJ~uNoG$Flr1{GmSc$dWCWe1Qc?d%q|t zaehtaRa{@Eadq?%<8&@XfQJ&zWVYA#>YMxb=DJRT3VJsl6|pmZ^`jPIkDjxXUmx_l#cMdH+vVskD*s z9@~ov{=HZ2vPt9BsZ7l^mt1mX(UEt6(_gKVAN^%bmq*t+Z~j@*3g5lx2`FsR)hpAj zFP>CCgSZK=m*l_TkiB`r;LobewOlugAN)l%>v!vazN1hjz@p*u?-XdvW&Zol$!1lf z`DPy~A%{esKj>F@pZ|U9&%kVoLDA!BWIPcr;1McG{O5~REc{d=$aJ0Q{_o@CwExMP z;J+0qyfOIqT}6^`eE)tD76Vz{e-0{_<-`B)H!rwmf=kuZ{+};s!hUX%dl>)f_=9#0 z^(r(!(g9m|@z3}Ddi&h${j2-ma({_3kd>mpO8Mt%>`4Ffc9kV?!pZ;lr@#2015+`A zzA0#NphaX+Nc-=Z`yx@)2`$7au#Exx{sY#(ze4Fwjzz=8ejhZ)Q+P~X{J-7~Q@33Q z1XrN9Qlt|7pYtC#NvpaP&O0D*GVcdX<5w)w|6U{O=%OD`$*$k7+W>L^2T9JqpU*En zO3r7Y0zkoo0d4m_Vs^|gj*^B=? z@o@aNl=!5=$!`w-;{3l?`c91n4$Y$mK*0h)ne%@>`p;b9Kau~R`|`T<9m`R6vT`9v zG!h0Lij+WS0Xm7GI$}*L6T4}PRKhT{DQJU(i$lH#+ASr^fV<6>yt(p4taD_g@~$gs zPHey6%4i8)^HsEi`1}NHxH2nZ`Op&vb@RdbkRmg)g>qS1sr??!RN6%{nhd=snty%<%ZD39XRr znx#lUz!qzK{-{z{YH_1aVw8hD60*84A;%bcmV#Dp;Bh$JLy33n&h|mx!OUd=Ky+xDZrJ7 zK5%e@`P5CP%PG08O;VuFS{R2(IvrchgSpsnagWZGBA}B~2JM~-{X*I=FJHWf<>74D zZH?fcEC7{v?yz3A8613+*G2XX+;~#yhkOxu8`QP!pMpO;NA=iqzWu5AOt1#}Cf9XjTxVX}wJXp}RuQ`1a)2A}Y5~uyK(liB=KPEs1f{uc*NXog z!$o1k71?c0v8lsExe%Q{swUY5)^JynS^An|se0M$moZ(fy4{B|gHty3)?mVsS!q(D zaoA_UcT~bKmQT*RsJpmO1i_n8pxdvq6_P|G(1&XG8R2 zx9zmiPUqLdId@*W`Q{nNsS=pe2_qszx9{tm@VV}FkTGUW!d9K~jzj+zBAkqsez2%4#*2iNsEQ zV?}GHpaMFW4j4~;%dRWpj=EhD_0RidQdsw8Bh;U*TW(i1ysEXSSqRLIdgKbgPzq0w zVZpt4c|SkZP>5pUr_Bu##Y}PJ<`i(+x)9TvOKMD$~8s&Wc z=#NwM=4bI0u58E~OU2nI*L(3Y>XY#=So=o9&ptb@-s+~;pSB&HxB7V@5%@iV4SO**`Nkb3Qw^5X|lUbF+=ibsNnqWtRM~M8J?Q5h(|#LKbqNoXv_C}= zGX60PJfUZ0MWn~Dg0V}`k+lYMzz07Bxo!BbV0VBKpk?qF?fu0??+5Vx-eSki9nowO zwGX$$>&2cYvmK3R>T-_*DtKILP8P#pj!Y#yW*N?lA#gaqSj!ra$o@{hl|MZ2%P^dS z7{Qd`{$_6io+B^!&f8|>F%!{>L1a1(KNO!)jlv)S^`p!TC{TGsiT<_I*OnauuS~?l zS#qgQ!0rjw6*AV4SGF$kS)I_U?<0zXv*z|#5|s@s*#sK9`~J>eoA+s>$=7ukFlQN zvYZr8V#}^s@f!~EnnAmO2i>AOeB`C@_Xs@)VKAN`e1i*3?Kp1Gukdl2@D6hgzKBcd zkXlIh+W6nj( zXqkO(iH$E)S*zcH$)i2Io`NzZ7LzyiQV!k?nHsOAUCrr@E{9Vz3EBdWB7ZAltzx{n>)uJ-waslTW zz9T``^)+Z2%k%mpL_!^OF)or6CF(%sEdui=OwPa@z=F;}rfr8vo(7okPpLh*#lB7u zWmxw0af-R)uaa&B`>+vv-!(PX{_qRTbDP*Bamd<_ezpOe9fu z8SSr#-$U?>(&y1anhf-q8)aM_VFsf8Jla|^&)r&7ruz>$cf00c%)!OqC|^ zvdN3=p)7sxc(pqUcnpxOx8=YZIpA8TsZ(Si*Vq1unz#QCJY3;XPfGS(;(WEmQ@eD* zvG%9CY`zsJg(%gv#-slD;y9i3+VA?gyPWy;*&UXYe*STh;_C~_g#=%#vW z>KGDMS|>=5Hp=niv`?z-vL1+dUAY^V!)^4uQ~Utrhmm7~xvq2A>kD+Z6-(o^M^yws zhj4+CsE>v3A2)3GGf21q$x+~MViuCP&;1IXXslp&SOIUID0D>ky7%d6^emX?kcFu= zg5T{l@j2H3gM%tuXqZKFBM{9BqE@;kQ6V=tgvIrIyeJM^)3+Sl?1O2->dudue=^it zzJnlUFaql{DMLXIi4clQC!bt-&ETW+%%IgLCIOL(7{rz%c@Y*u_G_JYZ2jYga)8b+ z3`q!Ny41FD&7|AmgVQk&#A1!KyXpGHeO$e@&F||Dw+V|v27v7F%C%z`kwDwVPJwC*>*JwoD)L!bY=m%#y^X%TaA0e^0Oa%OT*!x!-^o1a_e107Jeah)p-xPN@3fmp$kM^lX2;%ZVm_gsf&1}y{ue-8!xH4j{@fL!Z*=$4Oiy>r zT?T#Wm6LS0Z3#5+1kxpLK#YrdMtwVjoK){r$rD62aF=W;4nvB_UOlZu*@}^-_x3yA z^Iw|O`o@fM0*EZ~8l^-Y{LOIP(7dL&!xPyRZ}-N7HOj^r zi%i8&ld%z^|0g3-hnqm+x|&tq7Cc`A*-=rO?LW|I;ZFA zL?u%xk5JS?6RcCBvr%uTDydQ^kRF}>juoZzwpGIn6d%QZgw5o}KW>_0-P@FRN|Y?( z!ZRg;mdH0C42$}yVDyJHh*}nq2Z`VbkhGCvr;!nu=vsy8?*_MCIg7sT6^}jk#V&~y z-2V$Bb?$_lbASkZuL>47^wnSVSYk4q6ajxYt3)8Z_k371-wI+JQdxeS^oh_;%T}Irv3aQs2I`%aY-F zh`e~DT8mQ+iFXF%xRbi}9VF&xcFbK`I2&NAp~V*F9wODU`V3hC*^(hu`5%@%6~S^$ zwIXESAAuG(BR)QNQEzl|OQ@)W2SPj=uG);lh#X|dg%)*6v9d(-`y}llwjFRKVezkj zx501H`$5a57FAQtz7fmxR`=gYOHSiL8d5{Uf~}(5cG>#P3Tzqg8vE=~PJ)-Nr+*R# z1(w1gfn|TR@yru48bssxW@fCm6UdiH_P~+}d!Z%r7@B?#mS`b$op+-!@Btl%yjgvZ zy_v;zImyhaA6t*q@)xn=?;-D5s>Z+n0 zy?J%Fx?UU^NhA!gshaGkZne6-BjM)SkyC2^5)+(pjH@3-@TT?43--%xGg0{F;c>cv z7lA#;Ft{7PD^z=H4Nj$K6vm=+vw7g-YCl|1zNxUlI6|0@uB_jt1|Mq3ZSOd7451hd(${}olIwZVwvW23=|InH5|F=BjO)dTrMF z#_!@v{TD{YSl6W=@$2@oZL=0Ytc689^Z2?+WTYjDcUKC*xZ_r%AVT4pfT zfB!f|k$LCU2&iA(D;|P`Gt9%SK~?5`)cZHD9x8RF>&6^lO5{sBz8!p#Q6$@~v3ho4XB?Gne@XaeW=1 z9t6C9uaqZ?%ifJWAWAD8c+8SzhC$kG5jdlo+X;sn+?PL%$Pz7B6Zsl2QlU$dxe#Bj zGH&=YZ$s>kIO^m|z{4@L{lzXF3>u;aF>9N~k8*xPSgd$v)28Rv?oR>%-oB^J8QVQk zY_HtpU?lKkP$6uFzM>xM(E%orrA)rp6{_%|*TQbLT%wuiN5 zt}rs+j8jN_&XxC1xIi&A@d}(>xSDN(7z&jWw zq-6T^!(e@DwFmE!SHV;L18S0=FJbbuBKE!qdOA-M6*8?ft^e{=z|IQmajOD2=tN@Fh>6&xcpPB_m}VTkS`Q%g%$XODw4OBpuTB8a6oVwr3=AY+wALwWuyenTz{6%_9bFU-j-soo539m2xn zUodzjCI^jTS6kj?kZYY}`-vE8hmzgU3^41tg=)gO!*b1g#>KCY=&4sit4tTLSGRlo zG_9&1n%NWjR-AB>+Q;*?1>Wz|ANnH0rEBZq36aE}rH*!D(Z$)0%phM#?JnG7*~Je0 zAiq1^QCSD{FJ|W)N^>4=D2?8*%0DRnaJ~0(PD++rAPU@@aw|I8EX+`&@O@20%e+9K zd7U@-F9xxB(C<0!m{}{a4qc)*NQJ{_awxoeZB0^DXEoR@2&gO1IAh$@h!lxW6R<94 zz($`DicA7uT2KQt5JN(mw?y#-<{!W!zaP52knrW53=@SmVSlES7_;!E=%1gfmvHc( zKn6h0Eu}e^wr{LvQRJA*%)g;073Q3T<#Xn7zUEd>jrA^la#|0_p0VeI@G+zMu4(qY z$;yo59Mm6@6bfCBTfN<#KSE$2tkUeVJZnW4ikD~e8Yb#rfMjvEgb}~Lwbl;i=<&aR z0}<4NI3HV@_u>ZmCXACX1`54_`94JkjDHoq8&~NK;C=mdRb+{zW=5r;ZUy=24MIq`MW=~9`yEz&LL0JWzJ%GhS3`mT&NIFMF6MtS0!AO8oLJtx!e z;M-ey_mA(4TQK8P;Ob4$1DNEi&D;OHbnP_eR5@ouw#Z~|&gyC=T6|GQ0OMV%3Lpq! ztla9ET`fG0L?M{5bb{(R8$K08^#lTjI%o0yKS=xUYd{2?3!lQfc-U_6pTDvC)Bl|t zc=o?=YZSU&OPVSvv>R`qT`WalvM= zKg$VzcQ7G!0NS84^>_LVfmER}Ly$1|Jz%#f65|1@uCi2jF8w!t0nFVFzjMhii*neX z7zo!oIP=4(5bSn?$2`$+HQ=WdE-2lN0l7rL4%juuDa%d9s+kMj4>2)~aFyOsK>B^` z^{Z23&3bwq+ES2y)%-Hb9>4*Z&$wfrwOk9yfKk054MsX5dg&$B5P-6dey&=ymUVu4 z@wj5pu@$0k79ie96-g8M&LUqq{~UVtETH{ln4kK5om?NgJ@K|7@5ydCTaFjm*y+>1 znsdLweSZ19>*70LUcu{MT;!?oSvHU0F)4#(H87fN9(_{LS%5(aqH_RbCS{C+PAGx)7aQ?>2pJFnqJMaM zzC85Z^rS83ojdMtgHa?|e79_nE`acnXNv|&uE(ZJ>vm=#Z^d~&LML3JWG-T2p3?yC zJHqwG>vkqDJm;&8&k$`&j`(jFVLD(>C>5+ngUJ<;_r2O)BAM)<5H-PZ15;<%WQPpJ$( zKiyTe#CkkZ=`h4x+q1|1SC^4u=2Me>;k{v<)`hFI;zxkV!vaRr-=8>ZJ^*3U2+`i; zvYWDs$u`p}*ehDNttNu;Ws-!J8I`fOqnmER!+#&{MNWO@Bfp~BIHSr}Ues@#%>tJwMkfE3vFE#ZJwAu<>SxXgd6$?ZkQEJXRJ>N! zWBL<$4@-ZFjjinAWNc**H3fI`!9I{!6w;pGpfUau29M`Q4p&LI#{h^_pQ5HU*ofwB zTKE}0%3b0Uq`jhpQQpNgqxW|I@)R_@z-uT>WKeJgl8G?s#_Olu;0|kDf=41#If@;m zFkP;|U(&yj4tfIDl(|)uR@80nqp9nUu+B4{QE2fU520`;H>AS;^)f8Edg2qH&--~EP5V70Mo9Q604Vcm8e*{L_6145fU_H17E z>6HcY&QHxkF%T}BhWIyTvH3}lbp7bQ8>;CX4*Pm7J9V0-jpG9+p z9LVlFH;fCDc><<#Tn#gn0Jaxigiponolj;FT@*b;iZ@dA+w2;+~4+0HNrJHU4AO(A`hi(|7kyN+X+0bHSY9&$2jLFcy?#!j9Bz`B@M)5sTVJBmWhK}k!>u}yvL8yX}j z_KJ27<_-WSsoZJx!K8#AADz`f>wGl~!3Z5GSVO%@JDb z?3G|z9)kLf@9ldRJWBXm(=YLkj!MLy#d~PS98`7w>k)d>vJnT1F4>dogcoeDfv|7= zETv>!c|v<#pUeZ0f{c}kRY z;QwQE=k4d%V!azb+8g;@+zRylU?x5uk!#6#034|7J(sXO*_rB~%|sDaApdD%9hFZ0 zBRVh}1crih@yV8CdsE<3b9}Wk7JS}5tkcxH&GXg-*Y}^Y<))Om$=be`d-kfB0B=hU zS1_h8p~UvFvRvgTZ@Zca(hTS;%01&!ME5zIfl2AX`42fas}4S_C@nP&Z~R(jo^QJV zlV*<62s^RgzFP=v_9opzyz?}p*75tlRywX@{jop>3o*6wclP5+@V0J|4NXH#4kSxu z6NGBzu}$ULI^3G16sl$J^y&`x=JDNcE}H=kPGjcwY( zEU*f+(34G}QCmFKhhcuyM@FP*w(cRfoPX^=^a3H3n_?g)y0Xz^!w2zru1P`(z{_Wk zU%ZY2e#X?uj$n(7tiJCH%_IZP@!+(Zggpsc)f_Ar{bMN?2(f2v_?i%iMdaD{m!MTc zDf`A^egcc%;V@fQ)fwK(gT52VZU6;8<@Q6!@4?Xlf3U4SOmX&4#G& z>bMoeT0bj|g$0Ee?=gu)(LO&R0#@3vHm5*JrPWt$q$SfE#2F^v}maqJMmU}nUiM$Ac(Udz=Q3 zf7s&Y^MW?Q;v|-&M>6K`1%LY!>JGHu!(sY|4ErHQE@pVf>FsSm5DqMw1)_b5R7VpR z?iY_Xu(*?OtGh77jM`FL;mO+7nK~h&bi7dbblh){;7WCC7u4E@-W4mx<5xA_(}r1E zVuybdI`TVw%!wy!q%Q%AR*N5^=qW#-7CAKX`rvf&iKdyKLRZf7V?F*`MkUqPFU;$p z^?-60YctDIcFRl3$sQvd{kd+z#&hP*msUYMB|~0SSPtJNQBbgw2~GxW{ksptZp-eG zg_EzWH+#4{1SWB7Ko0Ae$9n*NUt+i16KXDyV80n2vG7oonC;IlIhBPtl`& z+QpLoMxhqoN#Lyx#<@j(F!!$VR~uv@qe;>Qz~#XmAPmHa|H_~ek7vbMZZZX!`>jWH z?b2 zfg}#=Z}1AA=3V{@G4MyfZbqHQbWc%C`5cgMpKsIHBzsMZF4^}gGC8(wp7WV7QqP5p zviySqbN4Rx0Kz&~pxbs6HHf>E>0^pJ=x`#QPDP4F_Qnui-!RHEn}Q+W+WH^Jm0EU|fQ$)%CDZ)1FWGDvgnA`4 zLs3Ktl?B;;2WcTkPTpFq`&L`-gS0U=*~_q6d8zjhaNe@sn3jbIbjE6Us}wK$9Pa8- zlj4LGuwObbQV_(cdLhpUPCecg>2;FtI)q^uttMV|250o}Xny<-#eP6`Dz5g%s8ptC z)6qUT1dkNfe$;n4!h8RVlxH1F6|G+8Wb4}FxcgF(+1wxBhKF0+Da!WiXy1NS`KI%; zAVrGvoa6wWLo;(j{IqaqcX0h`8^f?Tg@_Wf(Zo^zU70@S0f&fpeRXnQFi=JvgJn&5D6`IEe(eJU!%@ z0tlyYaRL7cd@&@jD}il0t?zX!(yc&`r(Z?sNm`k#DY}~8hbUMRY@-|~%*Lktt9}!Z z$pJJOZMly8LJ-f~H$<%{@MdAG=WA~{sN)b)qfudC6?M`v6t#9E+k{moPGjT`zg}cm ze89Zr!C1o?ylQamp)CE7J%bm9=*BeA2-xJ1b^G8$R3F*B+hggQb0!_Wt-BSKq6RuU zBqyQ|I8s}o8A82kg%kz6*tabkTPmoG>)*yn`X8%q*!tg?bYmh5f+1OL9R`?R*B0#Y zSd0B*PgF1R30=LwzU_wp0MhEx*zVQ95NyVXdY1bh1#Ks{$m0TH!2lR<=LGK4ZL)YD zyj5DeUWrz#f|>3B`=DEDyYurhx7VbCJ*zxvNQpXsLo?jEP03;zJ9Bd^N1_>+7Q!`= zxdSdkBi0miK#m!N={C7CJzrx#0eJP~541Cn#0C$uD+{reX%vD4bw#&bdX}sYBd=+= z-NDc?y%zbULJDXvYe7W;_Q%(+S-4@P=iba;frpBlk`gO_U^?Op8Wk@{5EfMqYwP9= zO#2PZH~&#**85dlp)j)_p~Nn6zY`iSA=IgA`NAEaWVx7*I8H-ooqhCC_(rXtg;5TH z`XEoVwC`sJwqU%`{@Uy}hqR%3oQ>=3K$%PdEJAA$oXpot@r=|imb1L14UPt?M{RMf z2dz`?eH8E}!Nv4K`A@m&<`{^06B2m+7z}?W_l{7QQNQ7xl>v3(cInqvGaUyC-VPX- zf5ggA=(s9NPfh)L6DQs=2X5Ux-qD%hI1TJ`{)5 zp-{ujBhJ^(j6+yO?nU2w_)Ayd&4TIJsJ>Yo#!FgDeV6dqYS8#;tN+RHwZUtqxnP&x z;AX!1tKg{-ZRwNVC00Qg6kxr5K5k7C@$dWwa$cNp0(31qT#AjWyqw9Ahh#FKGQ9V6 z^#wAO;8E~jXLqF3!N9U9flR4B%&2?#?i~B1i6y^A?4MH2cV!Z2t9G#y1yZ zus+C#Izq1Y>rpp;UQyr*(rml0gGQ)S%LwMdY}a%0ExNpHsyD#`BxdpX8*R|d*L|!r z#uKiT0bz|MwxX}HKZQH_C6!s(BDA?|En0zc&V3I1q<$GZ7ZF~a!>lj+9*x^NT8}Mn zQB%Ee%2<4Uumn+kPN!=V<>khGE%I`BH`|vtDA5|_qPFWsmU_tkzP3?)nh+8W?@+=q z^YOn@3SWy>7J%%0%eQ)d-)nO9ClK#@b5|6bM6{QM1M9qRRrchHGBcEhZNR&PBKg9+ zY~LWgHorOruTW%_S;Is1qs=3Dx-&@^wA|LQsmw@ZSrcgi{1bd-djhhu;Tb?$bOPP0 zNqEx>H%uSvWJSP}Z7Sz|3fO{WI~22C0lc(`P19dTNRroAwZ!KJS=@HKWLB?U#H%H{ zKNkVXBLYH!GA0_Ly^aALU?d%|*uW!7VrBRVd7H_fVy>~O%|ii4Zdr4LJW){b0jJpz z*Z~x(ygO;@*V4ScCU)^l)SIIFE!E(Lh(X*fa=_hn#;3Nu0CY1vZ7uj9r79 zC6Ahb$z%2|E-kY(;8`4_wE4ZyhmsfF3rdKSuMn#`w7T13=|i6n+yp<`UqF-Iw;xBj z`|XfT^!gSQQn>is_kxskf6!R=`AnAHtcf)*1`N~Sm5dD`!q-9xQb=I`(4mtoCHOR?1JDsP$EJ+NJIX9XYCRT zE6UBT9YhzHeXE@U#(ne!;T+X|OQEd$b?@s9gpQNt7I6gckm_)P_PFalf*{n>BGNS) z=eMLnlDp7VGG)&-Jko5v`@}P$X2gPA|I=+~$6P_;aCnVh9O_?58+%q{lH}nKz))hb z&*TJCZt~%dhIsJc_i3gk+NOhcjOT&sgyr5} z$)8qWuA*D?UD@y2dZwD+R4!n8?sp$g{Wt__qyAw-d)#)dB5J*T2DqK68~vYf@~2^R zr1gVvBSL1}HPNtU;~ppUf#I>}i(NcbVkJ(uH!EH}!;(Hw#TrP0VaY_}zbIlJUOI&_ zGkg~F9;ut{uG_BcGz2^d^WzVRME(AvgYRs7l(;%~V+yNG0h1~WIf6t6<2X@_l>T(llu1-n^?ki-{ z6%)s|hzk;dg;BOt@VpnV>5#Ckt;0JvDT`{oy_hWo$h6z$G^Eg4=>lGM`ulsS2J`^w zl`|0C>B;e;d-XW&mJme806v?bf1_T@5WZ^n3@YY?5U4*XF(-008{=gKzi(z@>Rt%E zwF8M%sA{a_%3DS>V++&xA+|90GY+eUk$hehVcOR3xL~f;$}q9mGa$Zi^u%fAh*LOv zng`xero`*>1tqz?{*d@#XsyFsMMi|IkI#o(DN`jOhv`U`hva$F7~I~3+6!+BtFgCJ zpyhv|U59@b?Jdu=vW+!Ljq7Xdattb@UCErTDRG|t6j5vC|4L4o?)IH)TLKN&F17dPV7%T}R%9r{H26 zPc8fUibXj<$~%X?(_b+5QY^+w;*6{ngQI8gI@<-t6(ZM~ZZT7L$4K5R?HH#)T{%W# zmFLt3>kfQuUWks~KT+8!ckFqQ8;izk5^m;q z9?O)3D362xNKgZBg|tTe874m)k->X&(86m<;To6BsoHt=KoTtkVlBgu*1(`xYH%U5 z`7`L!q5$zw#34l1Z;&DDZ(A@X5qs*&yaoyZk##~A^8RX9SKdjgJ>o^sM*J$DYa@wB ztx)G3h<$|O|B3jjKtaYT+y8X8{BQhO1q$XaAfz}hH$o8K0uc8&H8&suDiAv3htPQa z?5^Bq;)B6!NinD2j!ZfHQ3J zN;hHC=T3>ZJnA>0a#AX}Xh?sbcN$bV01AtR4*y^9eHZJcd`3G`FHvF3FlljH2ZlF` z$MlOIsH8#AvH%R%hK@HlF%-MUKv?gUdn)nx+jI#WvqXwIA#fj@XpX7Xox+>VlT)g5 zd7UiArvm!zj1QL=f*at0!0!52rK3VhmaXeS(JUXR1ey><+rn)7t=u;y9ZDfGk3z#YMTt@65H z+J(I2P;|__VxZu{1n(9Cx0`YIXX{QbKr;%Bzx5Dx8$uuf^PHWdr%hWVhLoR@v@Z4h z13<5HZa+%e1daC{=g(fhcjw%{(erWn^7YK{i zfn~ca0^;iguJ{A*Ien0ttHa<0H$>y_7f_svsV=TpJ8ZUZ&ILa4K5*`78-fuwPU2JSD z1&W@E0hqu*I{pb_x8Lfen6NcMf-b0bf5J6J6zL^}@bK1wp`&XzaT($*5z7f&f_<1` z%Am&wl)vB z?bQt$_%HuUPWMLm2Uh?LrccDHp!xR;KdtPNJcmCy2l#=o&ABK#y1;|?plh69`UuTa zEwq7cTuhvjza-(G0NqLI3}={t(|j%H^rA60uUDDH9>C+`VUhkpSBB%O4~PZx58&e~ z=A7M6Rl`fXDK=d<|4N;F9rA7D?R2YET?la zAW1Zcp(uHwYX8Ayqw|`)3x+o%Xbs_paO4$;Y}3W3TA-9mI%0nm3;2)TZX=68^fK`O zCE?ev5eGMUfK~!gp+QfKmJe(`5&qk{8wf=lmC?^N48QnCEOnlNQ#dP(!99l4_~Q5kw45>Mz{f?AqNArte&?EM#j?1#F)-7$zL61XFz*6qZuhc+ z3L%EB%ZeOt2Oi znSD<=|cVKpz$&fSE8kP4GZQbl)ZSL8c_pp3fO^oLya0a9z62 zw)yt)PzIdU7joYFqVlG$D19`zx|(Nt1~Uq@Yf z%h|l&>o~GE<5z9#uY@lG95TzvQ^|)Oe@%=j4-4F@TkgioCR)0QxMN@5w_@zAYiRl2 zXtxeZf{nK=%2$6dJT$-9)kw!jQ?E+Rdu{2Cbk8FnOU%nuoYL+#3c6pLbtaX$sgt0S z{%Z_qzog&JwI<)j|JbJkHI|jrCRiq+YMSIN;Ymy2ZT%JRf+WU`o60@iM#g4Um|$-2 z3XZ-Ji~YS_Y7xna#Hf%S%LjtGSuN&y_?wQLziBu@&qrT>ow36D6VMmbZHR)|Nu*1D zdJ&`?F4ghsW~>m*y5rjZLzre9P`IG=D5^q{?W^#^(1J+~)v1!rL9OV7qG<+93DX4^ zKN?yBma_a^y*KavypS8lq*?*)FUi>y5gY{?1TvfB*@N|Lh}93wU&BeMaR@&J4?+y$ z2OC4==68P7W|?_B_eX!AZofqE1j5!o0FFLQ_|Sx4g3`f28`VDo zIc@ZTPzYRECy*gd&eZ)_6jDd;U2x;N{|_fKJ~w8|nq#?~5Xo2f%Q1z=Z?MjUM}WZD1*=L4mh4maw19-&J$HQ(aC3 zFmnJ*T6LW=15t`Q*ER8g`5cEkN3YsVEVAsS3*F$&$`GiAh@>}gdv?60x_~xjENcgv zDi_=>ZS-ILt_8zInV2T1f?S?DZKDr1ls$!IObk5RFhWCLB+))ws!6}{k>oEZM&5Wt z;^WHz)y%_7EPq9y3SPLqBfnbTlF;;%kL9|9WVb!Q@h5P z=i%j3i08mtvkrP{rPFTo8T7%e8aEY1{V%K%wvk3)yv-;acq6_Qz)Y zkc(e=zRTW*KAE>ID6W6{HIZTXfI~kEvV%W}BefOWYFqcx66JD9g%#cJx9}CF9PvX} z%tds)e+D$lC0d87cnV2AgR;D(|HrjEq{M~| zF_jsEWbMgsu^VqKuqR1f$Ej*Lm+;vuqaS@=3))MpaQ?a3`H2`G!uN=;!k8(`iD1%z zx@C**Q^&lcTxJz?3j48c61sdXYvIsOihksoFq)LLB7H25P~-oG#!E2hk^_)IkMO>i^^v)y+cZ#GlFH#s z%fD?$$Br1(Grj(4Vf!d>h%u&R6JLn@3~-TW=4J3ejwr}=;7}UYt=n%r3Y6AW5MO6e zcOnmbe2qZFgo^b_1Yi_#{>e9me;q!0skhs#b5)}A{`^*tx7i={#mw_ro3iuSFZQEE zUjJC0S^u#918cO@{rBwV`*Em#3Kw5}nSbA^oLp`=pP_r->6%Dc0(KWOPSoeZd(Q`a zZW?!()&7LJIHQ22!V=@9U`N_=3CU5kSRrdmI*;vZfZhmA=Z}vTYRn}}FQL9C5CrXg zW95C{Fu2)nU_V`FK!%eLD`lwB=w5{Nym$Y)e<28qeAdzKN~b&7V)zp|lrveV#5^&$ z&srv(N}ry)EYalDs>ND4t@6U^X(VUk;I*y`7UGjdEXLSAIJZCLw^La5XUnh2War2) zwz%62?zxwXQwiqoetN@q)s$&;P_?!@kr4f^TVUtFI?guBMXG!2?1oAD2s&4vld*14 zj*S+{e;|U?3h2A^t2n%o{lC`t3ZK=0kW)Z)BHKtpV;%%hH)Gx-LV8gWDwFh~M`q~0 z8~R?11C_+S+?C8DI9r2y=Fdl=CEy|3k`&tP<|y2LBpfO>{(Fo%aIIW%0yP%e=0$Vv z`T78WUxrs+C6S&jv{&&SCJ>=ZQ8@_0Mma9)q;Ay&fruil`b5%OXa;wUXg3I+^GQ!S zhdmjvrmK{!i~Y5cL0mZ9`qa}&-iEPx7*MfzCsC}iI{fdkI-au>O`_0lNUi8Ol)U(g z%}cn3t9P|Dly7tyV{J^`(YRG^?KvO42?y%U>zBTu3*F7%fnI`%ZrwILyC3NAF+GuV zhL{fFS9mluvHUalK%dDNPq6@$jLqtrK5+oaOqe(6yBCH=#;gYGwZ}>Li*N6g*-*xD z1*DsH!s{AMa^+!S&60em8m+I89vR`9^n)g2GfgU1G6|g9SpNO|tMMUzU($6o{GoAP z#%SWBb{2DTAzG4%=6B!TkB=q!WBCSD%X0IJXdo|poDMQI(J#u)1K?`sn_jXrh>^k= zma=wO$`BTh_*^({&XxKLbVbztGYWz9RJ3gt^D+;|s6_;8>40K%=St)m=3b)8%&>Z0 zMgO>9DR)>2-N7>{yE*^tdNr`8T6bW`;xb}s(z)wMn_0!+$;8;+wOrswjB2PaLKh`2 zZ(7!w3Q4E!Sd)7`AJHD9MN~^L+E>R%d|j}Qh=Ts({BgHDD1D^r7rU6JMqDl;m|YiU zKRRs^={m6f$}Fc3ZY3LLc>;c~hSM)Kys zRjmu-=Q+7QzU_`G>I?f?KbkDH@h-+~LUoNC##MKn^6d|?zrK#wb0tO2#KSCy;OZj^ zX79>gvLKZJFnB0*gvru<><@d(nE35}+;lY-aq1{N#&b5C;V4Qf76u!iiXzVsceO)T zo?O>vyo{izZ3NX>q*ZuibB4qhqsQpDw78FN$wjYA9)-T+9QgNOpz)MHJn9QZhiGJb z)f+}zi*ISTN8Dec!dSl~JzvWzCSn>RaHQ#Bc^sp?_1TY&RuF41qGDsF{2L9yWS^;H zUzOPN@-LI^L{G2v!3gk~l5#7RqxA3reJU>jsq7e$6DjF_2cQWl|k9D!N{5Bv(4FyF5 zes6r>{ZhgN8P}H1;PkHR@2P|{?Q9-emFKB6u~BYeA{8>p!&oFSjVX4ZOLAUrYn1bE zenp@@67E6Dz%Cv4Z2ed_=;R)LR)<2o9_Ql0c&35)v5()~kr$UYxlr9jp{gaDGLX-0##ylaXd6FbkQY(fV1vI=nB7~?2 zGkb=dgC?7x=*4&$3Cj~Cielq&4kPCCBq>Ra>tjC*mg?w8o}#U(l^Us#-*K4kGx4Lu z;DssgCjQ`RY(u?wKP}QGVq+SU_WgVi@pGxiRmqUe{BuxAe=f62cNFt`jK ze}Xv4>29}3IYzg9jizxSvHAGH<95V%!mSp-7wPEwN=s9Fb|_6+17_-86mp3sL<+Pa zGC6FXq4*w7K>`9RI|b2C3nSK^{P$mfCc(;}K#{N%_Y#}+^>hnn6jUs-Nn`W2r1+Z+ z(!H$p@E94w3znubpTcC+o{)rb-`9yJ!7fp9<#LU$(ml$aG_gO;2ZVCVH!>BUMq@iR zAkevuF4~C2=?Q`I>Dl-%>t%%WO%50@**O#OGzgNA2ka=5oYH zw1au5dWnS zh3l7;>j`+gTjE9>2Mn7)7A;t|_P@Mt%&q$RX@28J(i$1o^S*yQYjO`wH$Ze0+URm~ zuwFF$ilsNb)Im2U%0)Ttc=n&`x*WM(iCSd*Wa&$Yzj(Ox^@F!5`s-b@*g7mVv}Wm_ zEt^C^1Fk(}2OG*bgAPNoyRk8%3KX~4T1XUSbrP&8{XV>7sKI;O<~()fwi5^NjgL?( zHv;im{oai@aAK0m_n!a=;el&x(EBuIBU6OHj6KM$XrZ+T``IK*cZG7s)e-f$4E1X% z>-=w-MW;$%_6PA0BKyT6@P&LMWXt@Hg{Z8Iz3g@5G?aR!ab=naTKSw@EI*8xtmZ%P zeETk6M=G9OI?NiC{l3?rVXX&}d)9GVC+}tb%Th*ngD$;sX=9--&#ii1cv&l4Y^BM> zfPnKrl6sybG~i@303*qTMMR_H8Vm3AtJS@>y+@|$?FHN8r(E?>}ky<#RFW+yWO zmEuOLLC|7J9`E%wFxfmC1i*s``@q01ONLXTigxvnGgAPP%i%?RT-)GRD0MNYYNbt38*v6jf3D< zdbrBZVKAnSR$|h$?v6wz=~RP_gv77lkBgiZ5M{B(q;b_9B#u-+=cy+=*7RZgzqT-| zhRL_(L~`wCOody4(+^p~uaQNZriQc4os_cz#|@J=qh4;aeP^ebf=OBT!b=-ZR#v=R z{DEdqAC%g+%4w{qA1pyCi`cU!5||JylWS^Oxp~ZTrRw3GM!T1~jD30!Yu|6)x0?yc z6356^X5D@(PPJ?BdXV>+OhixkveLZ$Y^mr6z#4eU?@$RAbx@IblsSRadO-QXy zN*(@yx25}Uk|=;DDD~o+1;Ib~J_?)UGJ9+rw^i%d;qiXpsCIaosxkZFb&DK=3^apK zvQj)nyx&!4B`iG;(AXbHP~h`o)f2tikmItmAM|5cp~6SI_H;1U@5_63tz^$|f_PW- zwnleGocf6tzR1D=-B#zjL&oldE+SrJnoO^fcUzPK#qYEO9w}guM@_QNll3iLkw}25 z89|q&-ql(#58mHGxMKFd4hNZG$IKY_Bz03OmU4wjQYvERqvCR^Q#6ic_RXq>f5?)= zz2|#;p=*sA&{r_48?f=1DtpHIu5! zp*~aR%sV@u*1y60whk3COIHTdxxjMy zp7;q1=9i%+Gdoh>O8p|(6`m7Ztl^411cb1*mv=1t=`}VV;1-_I???g!+4Orz+)|-2 zFDOPn|NaVo1%J>L4#{CM$u@8aXOyxCl1w1Z48@pSaKn8DOax=LYBcZi?2+o&!xK%~ zR{0=YvJU2*XWR4OV7F;8S~^bDR>FVEA66-7>@8meN@agQ>J@5G&zV+qjGL13pJ~}K zbg!3(T8i5o@iAu)mPC`pkW6|EmEXmA$d(u;cOs}VQqp%TJo)&hu>s}t%=x-bU z_~ub$WLrQ=_Ex$fbO&ZLgYmDc&I;psr>*pet`D`iq*xNX6icA2Ns6l5A!(N66>@hL zh_u^q6R`P<$GZgni4A>9D^h_70%MGPg)Dn*+$a0c)xD288;DVqUu>d1cWV3gT6Bel z**2-dn0Ai4hPLR{?7deU53#Znhd45q0c@!bR!j89=r!M)z4t~#603fdR(GEYjz@7+0bDm56G#l zvs>uXDw=bTiTkl8_h8yHP&(gp;%&Gt8%iLG_E~%1(=TSF)i%d2e|70FqgqCT?b{oQ zKJSkW1yd9eC=H@ip7m7(+{I^i%~d&P9qH0-2p-DZ8rFHz^b14Y$(A^dhiqj234~je z3|*CB{OuefY&R^+_D90hITS-Y-7h?HFE`hYiP@GfmX&L$od`%3o1OYJ1SV`!px8S+ z^EFVVmFE2qwBAm=wTXg**VKS5t}z$)saUnAGfR=%XXK@SZu|AXiZ zf~!U|hzcb`+JC^SuVUyvW3b7LA5ZZO=55dKEC*OdXs<-kZ&@cyZ1$fKt3)gI?pGa( zq#h_$`lUWh5?{ai_`Mjzz}0^dZx|at0}cVfX9vf6vr;9m7w?YoYu@u!nI*hFBv?=u ziutltAFqS5IXor}JNM}(VS#cGS3ipamV%-jRLB011G@5XD9qrc>fPwkCK}%-e z+MPXmK~s((pnue%-m#zQ*5H%yI}#ID-0v`Fstvvv$QjZ`@ei0onBQxUB0MJvQ^|l9 z=3<@_j(NkJLIG{gNUUrHR0@M+O532}tHkMz3>i%mmxFPQQWv3Q{hMW66ErTbjuUzY zuobV{jNG)J%-=wby;~ETDJf%3@f)6-hZwt6trOqsPc+JJ0UrR< zh9_u;`0ra@TX;+|0e+o74Q5Kh7RkSXYzPMF>E0-+DSEG|X)~W)^FX-M@AAn8-$ebU zGeM`=amCWPW6BC=K=27emibFe{bOU-QGK*Z@M)nuQpdSP?${Vh=W;jmL^`e1oV9De z>Nd>0BZ;GB#48}GsPO8Vv)H7y`zV4|c^^KRDjili+y9qFK~X@LnUGY9SzHnS>!j2#!+!m!O62N&i2d>F{ZX`pRZZ0( zW>Bz3MTgNV-h)SZL&=iF^)~C!1GX1Nv4=N*`uKrdY%{tZ>jvd|Bx8$+-@7<7>uylJ z(RuEO$M*zBU+JMgD%RfM;R8A?RNtM=1pD!pW8f_g;cRE1tzBW8ntff)9;?_S%VTiQjYMX6Bp646Qou?&sV5AzS2?*}a`U%=H4{+(yLyqm;9+?NJ{7~#x~s-` zh%DB5r9;gA7q>Q09>8y&;9BIo*7^S0G1gqOte;P)Sm)9Y@Ce}66=7E__@M1T1pr9I zcX06qn>{<#oP|UM#5-oS`WUDjIIr)CJAeHPdaSU0+2;Py_|e=Oi!R{OA<|(#pZ+v2 zK-d=iANb_C5L6I*00@aR1hYZN$H{TDB4^`+GDVP1Z!d4C(v;82Jb*#fxHGWz{O##t zmMhm~R@N~If5z#=v!SY*>Bg&SF2g|Jc7SXQFuv3GnsK_qZ(-&`Hf+-|lD*LVp5qvq z`{7c94UtrIsiEGr&1%};3-(j0{#4-(hbhl};5sU5;Xe`zL~>CX_mc`CRAkOai~lRE zKwKdZ9MlScI*RJn|4>`#&{T1@)B=UGeMzA3U%7^!Bc|T}h%@;gIjWGH*~zDNK41d! zqUN~^88ef1pK8?;f+zp^gR2`5%XQ`p0UJdyw7Ybm1~z0^d5^#ti(r;~oyXSSkboQb zM~S}%&j_pm^sw3$nF7&+8)7JibVX`GTcz?cQ0V^}2fgP3lH>ptg@*$EANYMt2K8*< z%RsUQE^=P1HdAsN@q>=!IPYgsUs~w>a91vHh|Yr)MhZTBCdCAZA5_rG2KNrUqEwe5 zG6-N_!DH4kiGuIltK<;06y%wgQKrke|4m#}2F)gj1k5?BojgE;4aDpKWDX`hgFsEN zg;qi~75D8gA984-Z2O?=6?h0L0FZ?YUtaM3=eG*U=3JqIQg;qCAjnd{G#e$d9@@N)eR;l8g#AXYn9#Odu!LoJ${SF_lH2fYu&p?BA`06C9Y?;jT)-y9;l8qrH3J zlmZp9X&cE-1!f%(Z_^}~&B0{f-(W2iUyr;d=^8 zH}I8&!1%d}(50GHdSE(7jx?|-ny?x23;WO6@)+_Wn|7sh2lxQ>H4*`d=hB8dSN#eWg#LRH0+Cb)k zvOXhTj=ooU8Uh9=pu8>Mzk`&p&Myia*KiPae^zYuTvdSWb=`sQ{TYZ05pgI9$@=ea zGiu+Aoj^}~l7&IA-osVXvH^0>Z*!Gdj3DU4MMtV4$hncv7ZlD# z(G^ymND%@AuLY78G{wIa1Ck?4g5-FCMU{ssp6?D!Tg?zHYvTrR8uFE&wsW?+-J1eD zsNezAyy|0cjLrZL8UZ??i12U@PDhEH1#066@2 zm-i-cp}_rLfOzKn$X!qcArO>J*{LF2BSPLY zD3B`4`ka?r|IJFiq=wH-_7wgkpoM++<^bacXPWXb%+N@D2P8{Ma&~uacy7U6Uh9E; z(*6?o2x!5$TG(HA2qk;)6G>&+n%p1=T13I)dbJt&Y~&Mw>)8s&@^iE6CHzxAzOlFj zxz8&}|9VH{a)U+)=N`%embasCveLa-;2ldzFI)P3izFR=Zc@Lj-gjijZ5fo=lKPi;cheX($^w%`}d1xG1B>`(eY zUJlO)ifaJaD{J^ZMlT7~3m_El6I^fjq+#133!(lsdpInUB{1DS0HGfu34rVd04&85 zM4?x%wV&i^nnw=Ad*l$&*$|3@G!FSG7}Gm9;<((_LF(q!qckX>_1_x4YBn52lLGk= zG)7G@3-|x)m_*Vw;Or)Hdas4y!q?q^YIZWHGD4C~*by4R z#2%0zQb?r}jG2Qk5w;r>hhlolUUL_xlL2H8 zFYq5Af@LmGCJ>KxQUY;3;};EyAG5{EY4kUR{`(@h7Q&rYLU!4ItXcq~@FbhF!~g*=7Kl#&aa7>=YY45L+ywx)*VMa3<9Q z=?UL&2fO!aW^K$oa`v{KOl7*Skt^vBz##!8ckD#$)l=|}Q+v&pX#?bor!oWK8Sd8|j@QbkPJ`+#=9OHgwdPy64JsROAQ1@@rl2ix^KC?3HFe`Ehg-ZY#O zavl)q4J2GIN&D~NDR=yTQdIumfA~KE=Km{P{KlJ(!x2E-gdj%k|By){g#irO*+LFF z|3^SK0bfVT{|q6AzfRvCq7RVk3mp`#gxiflnb&2y;>!9ne5iHTTbSD4nE&%7b*V!l zPu}DJs1nbiKBj*NN$iem0$Kh)fVK^5%#3T7$DZFFOt{_v321`=M$?{{}E_xPw>+qTTenGHXIDfntRi&pyO@0rQL)NKznGjxr1B#vpah z0V-0`_t|n!s0f!>e~@zmpNtFiD2NCUqQ@&?H#_n=f~n*jr0VP1Q5L}`+sIo9hfedA zs6a*aV+>O;&hNsD2T@qG2lGhQ_NUfLiO@FgRT}`9?fuJANOtG$ss)dNc;N#(e{;5RkrK8l(dwj(%k|A z0#X7Z(lsd&=>`D-0g;|aNH-!K(k-BAiaM9_TRNgN6=lvGuy+4@%%(Om}gAMx^uZLd=JM9^x}) z@KI=WI6|V293%(iwn4ftRpC#fpK#!ZD(qbc=#`sJ#_tCNp~1B9=w=VZ829T}d z?g7l-)&QF9`#pf?48)@(j$c1D@|h7EiGG8l46%+1qo{4z(NwDbv_tXzd!o}iCHm7;M!$ZxU$_HmOIceq6f2tlQNCqrbWeR zWbDI1&;7I>zB58>+PKZ2?+_m*=6hhxA;lzO9kFdFUKa0u5d!n2drgpBIZ}vGU3~XM zxSYZip_TK^PBFS*nA!z7ZMCyu9wO>|tJ-b%4T%yFev~Hv3kH(qBQUVOhF#+?2<<<^ z{r(mJxMi&sy!tPuJjqNsVu$sS_TNe*W#L48R&jvB49~!~L$qITIz$p8p|@HAFlNGs zwl)8zX*;b6sXz0w@jkhKTFDi#{uB~K(@C1@lPtOoiGEn^LZ0v}9EO&$RR_E`D*NCk zBh?*t2Zi!@*Mw1mPud;$3WNoH#Nx-IysRaYIMvhlLYc<+8VEV_?OZlTbE@N$X8VJ{ zXQKB|ixO6gC`8K4aNRY__1=UMZSwo4;umfXjw0y_AE~m1qe{EEL5B7z?U9*rOf&t1M-jegj=O8W;Ih*}XP_%Nr!!o)@aRQ$UZ$DKK>s@Rt zW2Rk1p%0u(-q-SzD84FtkT%09!4Mh;vXsB@xCZ6%_Eme7F=mNFC=YK?E20d-(f2ed z1}7W_e?tkDJOPQk2|SU_&QAcIfZQ%QN7Zw9;=}(Si4DHHp!EZ-a4b%ok1NzODI(V? zDCmQf(v9-e+DNj?2;>n2RB$pcudLvg7Cn6>2UKy z01y^oDeZN4FoKODXG+NO+}<^*iW@-rg0k#5zN^QyfOJy|OVsN9tJXXgTz zy?d{mGaPvzCKwb4-6oG4z+LfOz5Et#+g9s5B1^`o6U+ma4(t= z_M&DeTL9%VrIP?Vr2i419kT%&|8#khUX13!e#uc~NR9At^IAfu!@l7k_}e+k&HsF* z?9sj|tu0GP>VqM4H7|tu;#!Lne5|c7XwBURuOm6QEZ}_8*zp)1BiY4aQgE^=U7(?VPV_5EdUprhR?YApc3u$ogzbmb z@L~jX?p^!^+G4naY^iI4d`$p7X&VFYauTJi%>bqS1jx?9YmGHx5yfB4i%h74SOUlz zkDdVrKpb`!mR>kdFmps7EYRD(a-1SG`MLYq@E8ux@hRwLn5QY$ju#d70XQpu1-7M! zaBqH;JKffTeGl7e64~8<7N3CG?lat}H?I)tBhDzVG~)|rNST3#!7+?rk*Pt^vNr=^ z+^4h3ggef<2jr~_APZfgGPH-cI=;^oUg5S{sYyr3Kv*WLl=9rFfve!Lv-Ty&)pP_Q z`oSz+Y0mT`GC;wv)5U*KGY%)0NnzitmFYqVh|94v8~hD2O5q57<}u1%Y<2u&=xw_C zXh$c9EZ+LQWjd@V&XUbKT~S#e+8N3up%YOWWz@kzb(yuy5O*Nu;*sNA+PG+#j`lFx zH0}Ewq%hMuv<_j~ynhPzg@oDZG$v%&v&iMMZIjiJu^(ergFi>hxaVd`@Ql@2Lc5I! z<80Cm(upWGcS3ECn!Bm*g4y8n%Ij4O*0BoLhcKd^X2U2IfX{L#19@X$QQy?Jm062d zjKVpoPbA@R;5qEgRGGLyV~I~N6OkxbXB50Jssm@j?z$`t)C}HrL)VYA;gtnboqEN=c z5so61f~nKke?`)1nm-x2j&|s;-8tWn7SYDFSN&yAs$vmxbTp%tLY^3TBS!YLVg!>r z_0TvX=NXBFHWAkrU2pD1FKEJW16-(E*sl{6Prll5H5!}>S9v|RVYIg-KBTWl61t-A zpDw%Azp_S|(IsXhaVGL8`O?TtVH+|BN#ZplMG~ddn``pD4uBR7(tT9N{01!&bWC+@ zEcW>6LbW8v8MBz*;A1L%>9*7S`1dzhxuc6JwpQMJm%rlU2jM0RL^|0#;Y;-RP8pN? zp6>k|Y2XSsY$2S!EM*v%)$y6cocr?$rO!r@uTQ88uBBwv&%*ZOROSU`q6e78#pr9? zqH)zjxWo0={J52M&LF+)F3&TkTWw4$l)v0zYPx?4kzn@ky6sMdRgv#5HU+*rm8wsG zF0H?k*ads5CvES0CD2Dsfdz(71G?tl>i=LuoxMZWUwi`9jtJnxOHc0Q&e7$tsm;J8 zx(~yRKN22Mb(&SU16$oT89BU*p?*RIOOdcv-;`0IVKOT}hCk*E0o+15-o1{93ngKY zB(%u-&c@OVDw5wm!3}zb$)`qJvQp-H%UnM?kl|V#bW?APN~-e5X8AY5L#W4_5|W!C8n;5Km~|%Eo$O3?^2n09qm3wt@fbX{ z0ge>NcSwDhmmNxUYaSDi9%CavONq@7K_gT*7l{sy7a_e210PA%LV}%~lzLc8>b%fxKY(C;AlY`^a8;Ul#Dnn&0*vSvb8U2C6V&HZ9%re)XkimQ ztS#zyAPG^YUEz(~KEg2d2lPV19ccsP^dVSD&iQf9>J<};_x_y2Y;ij|MCa*nWY>aS z97&#xCf zP^Bk%5{;-Y!*}C>%yAe+N4f=FaUQ5Fe8WtrjcXOOc}ZT`@+)KtImagWC8Tc5WwZX6nB9p^DmNtt2yqJDb4JWkB8+(eM^$aH|V;AaZ@%E zJn546G8*+PmX^7uySb&pK6M0P557NoS=ZOTvT_LHFo3Gpqc@SA^v^wH9f|jhFtn}! zE3<}cD%N9%~9&CfvFrMM7-k^1V7dR zn8hN&^LQx7SAGLcB2f;;V*cB*XH8moqDI+l$u-yaeb2zv=2vuI&2ho~VB6 z6()@?i>%9i>QGlgXT2R%x{uRgWj|^{bj4|SS2#*-`V;p)7OEUlUt5mmIhU6S+J6j> zXt4jvKLOx)s%4Y4JcvkAsCkT)@Y&G_w(kj|@rL-VBD^?yELquHq*rn=1BNne7OD(0 zMyv?PQA{~Ntge8H z2?^JZS*vUTvRaVZABaxK=Q|}DRB79?2DcX`2N=q53-H-w6S4ql$rCpIft$GI!yq!G zWZnxq(_pKQqODZoAB5S-T;?NK2)?;YV~GTMfe&R7+|r>2zkcgsiT;^|fo?_5x#1C1 zCk1~zGN;s)zho+A(ScJ!98}WUy9=q2*XLkXM@X8>lxbH)<#9;GV04k4=tgJWMehs_ z2=s{P*>ejWX^^`2H~V|RQHv#8zoguCh#;L^QdrPaAMnN}Vuw9VC(QH!O!$m7tA`-R;eaVGH>lst||A>ed&}a$*cy z#>n{dToI|Kxo$poHZKUVk>E{%933+V(k4N~8x`-!*6)6Z)H<)cTns4&Z1c>odVyxy z3n3E3C>1oei8g8#MqsYRB*&Sb@K9V04u{UIjz(ri9>QA}X@zoCQ!53VgP4ofkf|1s z0uFrpPYpa-9t1S716>c$!m?A@-Je~7*OpfXSnLg0gn2R%kXnI`l2Ekj4%F7YsXnrF z`pS&wY>Rj&RW7-=jb1$l5$GuZ%d@`Kw3jCJG`G+ZV z?qcpH%R@T_VGnUaSMxLT?p+*xX*|bIc)=`X3!$SHpE?pVN&}9=bhiHfUA*e)hJpa} zIdRLEW;?Nb1&_2lEW9ZrdhcJa80p2beHB!_(7_M$(ND zC?BvdBvKVK7Yzsqas!=A$snHivM9&CHvn@grCbdH1G);J%nfjg12*NIk`{==lMPR% z;lSCW#>od9@x8l1EuF4cze8S5@X^MrHp>;C}D5ONUw@;|2UmG@Zx`72%0 zp$Y{o%cB3Ixe@s1fB%E1mpuTeLQYrqf3WPv;PM{$We};~$@%|ijRa4~FPQgV1it@o z9yTw?(zGRU zy(no?PCM{c8;txQx0K|jIz8o3c(&D+3&Y+~WZpfbqYoK|1J$?AJkS=Lbyak!szqn* z1CR~yfc-XW-uj{w05-q&?>|2g9rxZC%E-pae>#BFI%e@;#6|1mm4J>2~U zd!6l*+dmAOBMN(1Zw&lKE?fA{V_(aOV{QPt#wR8cv-z->3MP!<_;mk=j+rwg98oBPfJ(FMZAbmKK;) zoEvJllYi;#s_p4Vo)hZWx(cv@(?Xho7VY`RekH7L^Qs#t zUbtAklpTDZtYG>Buri>j3kWU`kNym-)=l6}fai1*_=6MFUw$%RI@e*Zsexr>dpTZ_ z#1}ZJv!2O=@=1U~Ap7P3?A+&{@lraQS72WfcyS)TmWOm!AfELX=OTBKpw?mniBKq! zz7Ko?bSm|3-{;ap6_cy%k}Uk0<$L*c%kOZtHTaTJwiTz*oSTF zL1Z8+zhn)l27nwTh&{QvyadZe3sh19xakb*8$;J5+=MJ7z-(=w6+u=)&SBuM@vYu2 zxthO#-DQh8rRvE6WrZ*eaZGZuyeFIoYvvKK8N0*83Ow6;0F%xwz9hnfBelNRXeKB6 z=-V7H5%)a$IaH9r3iw$?=~oB$-}OW4cMTi}WScO7ZGEiHv3>|7M3CCwpK@P+ricP_ zzp1udbol-zEON_CaG8cI1ZdZ7gLeCxd0WuL@l|T-gt%2&8p~Yd{L(xp#QXqRs5_8t zE&60`49Gf=Q_UglW~yU_9K};GB!xsQFAn9cL~dJXwBymDu6|;v$D5(Tw^J z=qh*v^~3;Sykn>kbI$M>F1DBJa4NvTxeLs6s^GmcL`;ChBtd)-%v>q43^xWoi2Q*l ziod_VF9Ko98@Pk$Aw8Di{6qWDo*xy3g)QDta@^!X@UZpU2i7K+c)lJT)k zmwD`M%4(<+(f?1Y<#}+`9=y_%*w16OW-8tvfg|RpGMh?Q1T8vxDXO3{%6R~9r^nT5Kh9ZL5)fKpYDiyfyszn#NyUmx zKGl1e!Hj83rl50-_47yMc>;xlF@u&WcL`v_ZgzW1?Wz@;zWl82ZjqLXk zuv@(~^KJOZ&(a=bO2F0JggG#zwK7*>xH~WWrEpoK;_vT}2-tVVO(*HW9!EFQ;qF1{ zfp2K!nPz#9_3MS8js0IH_$`sN1$cZT<@6n8Ahb+XG@>O4d82dzuWqdLbIb#TOiGH< z8x{~g-?N@15R?YiTdNDf0c1SA zNZ3Ut4ITcRil*BD$u}c3@~T1<2ZEh~PQ`~kFZQk3f(*1G7P>uteFAZDE~Xv;;i>iP zgl5ld6@|gsii8gAY$^ST>(UmS-3JyjbsG{_Jg1Pm5?r-IIdY2}1j>hCZWxz`n=*5? z&#W$a=pP{iymNxEiuwWtkcH5DI5bgay%d`e`#Ax-KJzoOSLQW5NMxyC#x}eJHWGSP zg$k*C--uW9fd(d8y2N0v5XVsN=2N9g(Z{*KMt_QS}~iL zd%V$Cng%{DG2=H4{wO;9{_c_v@CJIV&9^4b9xr$$AZfZ}Zc4>v|ZR8<*uCo#QO6^Z+V-@o?@pnt96P99;M(eJi z(%N1IN~g^;F&@{=yRNl_j4{M^SC;9^nLXR9G;wG*BXE8_f3dzq_T}YeDV*qMztz_h z-G2^g#<|VW=0rXYuf^egn48nnSU%&Dd>2b&t`9lBkx6XYeX5470noRT1gS<6)!2lS zLUl=7gyJ!-FZMhd%xSeT#;J#+1{Fw7!K8DMNtQlgW}2Z-*$wA<*K>ls1`t6F)OiPv z=U+<2;4ewMsJ7w)(zJ_(^pOTF^Y>rjzvDqVRJb}F|MGD^;cEd-gX-pRcEymDjf<jT_lN`f?WjL4B|YH zvXbJIW%WWozO7DPJw;pT3V~$?nemyDtjA}KjH2U-)F zWuy@m5&UDaLCA2k%5(>@#2Qq|>dwJmNx2htNl5SqPV-5DiGL7x+5?FH2v6PEPo+{a z-#3`L>|jGRR10Ub@-mr5&?-!bqon(q5n5!+AU6^qZ0a54l8BDmH$HyMPbfI~(CxXK z<7^#==UBZLje@duQJc0Sid)6k+ z=f%eMN=Zw64f7h7%zpl)0jEhAU6>^b1TvCb{@u2{OWS~0Q>Y!`F67A!a)lv%fwmER zMg#>Kd3ApSX*O0B4UdOW*9%J6$m=Y-327-!xf{em5cH_rs^>d={lsG>dv02YB<$kG zh?-^pk6@El68^MC#rR@2OO0T(LO0<~aI|X5J3}QMe&L)|6_R!fX|lj46>uSZ!#eXV z(N#x3OTBCUrm;PzL~LsA>n9U5%oZjF+2n`&3*(gnFL4slmzG`ILWod8_JvT@(A>ET z!3Q+b9TE$yY|b2Th;THed(md87EK#Z;dduJaeR^T!cefu7_OgaNI6TLU^l_rzcW2L zK(YXV4?()?R_zL)+!3?xi@!!j@eipk!xU zC$tfZ^oH*^)ix_t4L1?rn4)AqTv0dfgMw7@`xw4$)q9|JFt~~9hbt4FbQRM3qd_xp zktd|gr^V24PV+Y6;Fy1?xbjI?GsOM=k5DV2Pj-MDKsC1_gaMm$DL8%@4!G76RO42}GCp1?q$P6y7t6GDgoU1wx~R0~z5mWa5kjW%xHjsNP2I0&lbYF=wL# z##!QjGQXF7gY)dhm{Q-k@4du#=eJ)?=n)PTu5AHn8(wCF*+U)8@P}9RZ~OnoH>Y~+ z9u+E36)@1EP2e9#W4kE!dBD4%U*}3 zi{gW+vMJJlnCjOUN+1V9W}=nncTt{@inbJvUOfNR2FoB99~^KUwS|J)%C6I`ATPG$ zG~*cHL)sZT3l&@JV3|f*7RQGGrF#$S4dQ)j*9DO6a*94Y&<2E7rOcI z=-t|Y6@DsSleQ70jy_0pNjNjEgMXOrLJ^f@brdth0g>ROVykU*mIe&!ENAhrql};a z7^R}8C?UqSzTg0Bzdo0}7YN`e)?f|aK?1nMz93bt#c7EJwg}K&^BsPaY7tfZ52B8f z_{o&j>wpaymmq{AaHl^?^ArLwjBYb{QF40o;vEVQ;HrmDMlZe(X24nnp!XraxKbbd z4o~Mbf(@ZbEzdOMw)4K!GzI=MPzm|NYRW&k2XxIuWX=rtLVfCB5x9<&4Q&S=_gE_9 zu)J&Vza{@kH%uFZVGMFWU);h^xM{&L$<27XQA97SeG=Bcr@f-b>!yhH;fowTu_$&O zT)$#uT?ey^9W4IbCf<-w+GjK-t~=ZjhO|@N?!`ve&#x-EHXtD6MY5*|oGmN6OHjM>b>!gw{veJV zpE|B(Vb1}LiTDo)4QeBKE_)Ky6vVElx&zDIBYwsEa9Z#4>U6Y`VR6bb;Rr))75@*I zDGPrD9h>>@cZ2wq{`ihg2(PRQe-~~8xu*g}*}|H63$;VP83;7l41)0E@#9pV>b{%o z9*TRzRd^E27Oc zfEBryiIfGU69;+X_gi}@`19R2DeWs}Y4w72t048@J53qJ?IS!}Sc}q0qf=}O$9)lr zFi3hso)FSOwEt+ic>cjh4UjD4QY|aAMX}ke4@@sc;+4RV$o28gVe1p%C)LiUX$*Qk zm%>X$L)Z1a6W)WS@MbV^th_DdSyFlBK=mN792vMFdjzf4u>p%ncfl>35R6>CisX_D zDm2mpVepFIZB-RD{y;9U(#u17ZOQ?JhW}K&3*7CfxDOqz_v7(DGK-t~0C0aG--`Rn zEUUV!mUaQ40NMwcrYsZ5ODyA6Sf;V4C9}7Xg*fTXQrq>EINEg(^@8X)tRTvL5Ixf+ zwo5<`AgF%`U;{)VIJz9Gk&#dH?-xrSI>nm2Ai}Nj1y8gqMfbEkMBIzb7d=l!l zb7=l_!Fp}u3+lc6>yO?tFgI&Axi*Cm&EwlIwQf>=M_I*M!i#Wf#8v_m0)c!Yz@Q2+z(UzvjHX$zS5Nj! zo@jCKtB9)3dA;`S(9=RmbJd?Q;&BGQc02l;Uuy4N<=@Fqb5@?@#V-YW2sY%#4u8T{ z#t90#oi$CK@|sAx)K6De(|@pB?r74n1W^jonMwg7`z0M>AFq{H)*v~V7p~@x0xc?V z-;eAzDZE?voxdGKY50T0Ie{inJrQpr1W8l73+j^HuO8AWw*SiRT3FunJUpDw)Sz)x9?Wo4y93eaH#AHkBf(*;9$6 z5Isa<5&a1yrXzjPwm5tVFT>Ltfq->}o>kePYl7H?^bXL;9A{?)B1;SI8+j?7f2+^` zRPVR!z#!BF{MKJOXZ=1NQ;C1srhI!7ZY)=47s)sC3>x?r+-V)py@`D+f-z|XV_*R# zqoG%b$%+`Q(wN-SEhdlcEIaF!m&Oqv$XYU36JdSW9%!~D4{{}>)sYp?+USYVS|ol8 zlNlrs2Ka#e#*;$Z@*Bk-T$z@-)1IINm|{ul3TGc?+zR6V*;zzvl|2sq1SRsUIM|dc zDRDo=!p05?$xEgo{iKQd3b6K6!`U*=KSTEi-6X0Cr22?vRiTgDjamkSjVzb*!58YV zlrjU&Ww2`8fSn$8X&fHur+bWl6QVNV=MY${BeU(jM!pG%M6iT~cS{BHkKSoe`i9$Q zd#m@d=@~_Ij!1o}00Ti+Ek#;~p}(cJ&Vb<`N{=}TjU|#!OR9mQ%=G0ud4m*7>+kC4 zXjP7GKJ*fzKJOaHBuc)m&qy#wZZKUap>$W=oU^v8ra3gEEx?3z6Tv=TJ`S79`_%K? zS<^hlo|5WlO7vb7X{qGXVa%;p_%&POf&t~q7g8Tfc%~T}m)owmeb{-a*ZPpE&4A@y zfx}yAn%O|<#~8PhJU;Sy_P<-6?bOmVzhXX9hs5>6<7w3(yGwujoFj z)f;o=5qO9O0|QT1nZ{AjkZw8p6VlWTiU5|i{1J{W24X+hvylkRCP9}+JY@Rp|& zOJCS!A)PhhjnX4P_~#^pP|%Xx_4oI30Hj<5;nnk=0^mU@)uq<%fq7$Ap(jO7|1+>Z zLFWD^G*=y7&3UM8ut@eo+DsfHE$43pGT9ldyNRny;}_AyT=xmVZ@5qkT78WkLX_ek zd^WrETRw~-4P|3S7`MGFYzVXlk}V~NJ)=gyuX)6meTMEy46Oe2c0X*p4XW=q%84lG z48;`TeEl}@O8@egqClS11i^%7SFW@1Uvu?Ojw8A$o*wZVjjyiyD%oECg7G5Ow!y>L zb!)Godu>@B13U&wn=|--n7KlGh&qCB%d7Dyjm~8IO$kY=@&SwoHR~@J+4RZ9*D1nO zBIp$G6{uLkC}WJy+=UL!d(Z#eKmRf@@P5f^AR-L8Qm^Y()*S_#8XZIJT`Y#;;S4$H zEz6OIlOp*tGiu$#4 zUCoO?lF}Z}{M`1r%SQ27pnpN=5A)0_qywRDg|VRn+g12OWZ$y)s38LENN=?K+{;19 z@433@?25|X-XMFf_+yE}J8XPBG()+$&Q$RcpPT1)=fHdJcTh88{A5&UrRGoUTI#YQ z3;RZ(_j};p&UprYLl3lDkZ4corM(Vs1G@*j)=CQ>Fe3$)TTNOHEB?@jJ52( znQ5HT(UW!iTCxh)Z8yqSe;A8=GC6#6_&JxJ@+oiP(+1T23v+DlsfLgSsX;0nwqTju zA@p-9a)5C7wSCn)Un+4L-J8dW9BLu5cQ%RmeF~~W8JPhDqI_P{RM}@J0>l?ce+G) zFeAp;-O8dYO@|vr$Yr#*O^PlJXfc%c8}dJ+(3p%Qzw(F*Tric`i?RN-~j`d#igs~ zXUZ1S$f^JfCZgFVvNgGl zM@{%N3vkf_cK-a{FS+eXHWSqG`K6xClz*&ie@j=+ZzElNtI?e>fQL@~Q?(p;qGdeI zbK0S0g1B&gHoaVVVga;--09f^CL|3VSj!@Db(GsO++Lag%@*?ghgal9<-xCj{3-au z=>L&n{{Qyk{QvyJAF-dnl!Fx8W+Fe?q@Uonx-MT))8y+C=v0x19^I3F8EO~N?2Wp9 zYL$=w5$i$lClHoL|F|V5{VG-LihiV;{7(MQ@10Vnjby(6^ShQQ{I`vWkmJ8n+YAe zo4DhQQ&Gsj|MMhn>E)P_+24s)kB}(+fBn}h&5m;(-vZL;-+bO`I(+i)-)<7O@^Vv7 z)45HvklbxeGZpZm)fW6gj|Lf;F zlPw!x%MY!Rwi&Jc&Q5bif-XV~#o!FB0+>|)$J=C3ofmo@d}#z?4=FeXn6v0`QB!@Y zazt%&anKYY@z)2_s!bZp^c!R&W{W$W4?Ua(IvnWj35K}KiUztRLD%%V-t(PB-zhh{ zDpw$0w=44ry*~_rmbyohg7=VLUvk16!C5p03xT%O`IRmeTST_&k)pRfpoFxD@ftA) zLuoJ)jUJF1b;i4W8|&xfa(;_cX$Vbo@NR{As+25&(TgzYZ!ySg!+VS zc`5>A&D#jOj(9NdzN*lFjj1w&5I*2n;C^w=(1ln!s~%Hd7Bp!FdF_ut$!I)f z@4X*v_;JB*C<5W}e`*ua2r4;%5!4>?^Z}mzvI$H_$OU0-$eRG8&TkN?rj;2G24hx0 zkU(y~?s#>AE7F)Iqb3me_b={@FyKebv{%)v`3dUa9zlsv`_s$#d4digr2LE;G=3g1 zPD7@CeFc{8_t|YY}L&djd7^^$R-v8+bbpog;3XY2!t0cX0+`p6XP!&!q zvc$n&^cQ&W`_OSezvuwF-iaqc1k$k!5KDAs6;_3WV7w-;M}>4I&AKY9+Hq;?358^= z-jsq)iF9pgZtK=`(Lp)O+7BRIWB{pxN97S=wh&V297R+xO3R@iKrf^BQihp>R z8nl1he`{(uQ2q#&{PYgG?DGb5?CG;JtBM^4$6F){DZ6Ew+P?aHnO|Za0NVK;+;R}9 z(AA>mazw~@cOlgh`F^MLnf zoMFs{7imlJFSFHyhigBLL7|`vUljDN&>wYW)#Cs==AU;P>;cewGza!-aO2;rF%Mo~7Z7XD z4_A*djQq+3qRyPy3>gT@Hl%a@1FE2^uiqDKlEJjpQ3R3@Ie-|)9(G4jZG48hcZ4Ye zU^C1HwilfbrjSjZ0gz02ap3bh1>07jRQYxC=P2F0Q?461X8uKdD(kQbK7k!z{gYdQ zFJji0&Lx=u*Aw02ftDIbK%Z)fe>#;RWT5~~Y~*=zqEx@CMNBIspQG-z9dn)6Z0|}f z2p#yFDpWgaQ%A|VlY*pDInC;jF#y!|sGP^JWEko%(J%B207*YJ{hIF_*vv_1cvAt@ z9V$ObIfSt-Old}b!%3j|@`oGZs?eL#(CF{qx4DBDi@QIKgOqWA_rtRf@#{62pbiLWSC{r}`jhzykk{OlvzGBsR5_l}TCN}CXahi-C?OXfePlQi zP^;hS`$EJf%8OF}5BY*>MfGMAM29^j67@fFOK8K5jiO=^=c9=q=*CVXq&4WCLVVD% z&0caI<`pkkXsc0fERRl^p{Z>M-GDfi!v{1Bo?H@svSF-^_U~w7WpNE;%Pejba++#p zO*JCzP+W%Jr6d+5*xIgB(WvX5W0Eja!C(G|cuexPF+MiWbyuXlOUq|wa*on3T8Ky( z#ZTa%=?YaoFI4kfXRU&V2H%?cr|3!Ecc;WwGO2yka#v$OM&(Z=hYUL$AJW zC?dk+PNp4ky|4Po-5X8<4PDtDESHlv^le!31gbM%%;>cj>WkBKmXcLF45RlstH4b7 zC=Evrd#I1hKwBC=g?CZ6QCH#)`<2Ov*HdvGGJB!na_#8iRqyGr-_|P(d3f@n&PGkkl+!Z!hZW@)ZUs@#M_t~9WPfmQh^{?c3siQ@uiOJz)vbcy z_NiP;-Yrwbb$|PBnK-h4w!=l-PkSFG`)07^7+qleFouOb4dFEy8155VudT(W zH7Ye_|Ds_p+=ID!9cIAF3FlMM&1^Z{o$?!lct>YZ$BxzR3xqd zs%yjcN=(h6u7Kg9@XU){S8-Va)E|qKduHW*Zsgn*t3y2 zmSSG^l1HlNuT!4#n=(iD4@ilWpI9@ina`)xtMX~e7de{j`|Ji!{h+^k!e4d5B~HwR zu_nic>s(5o!*-*JHAz<>os=o}+)Z1BnNHlm4HG&Psn({tjB3mN;k|23?!T_h<8V}E!;?(T(pR1IYSH$O~ zHmH9Vc`qzoSHsm!sn@`8$`{~L`$b=+<&-D;wER0I_(ShG3?2)yhHJY{lT>WLZ1q5? zHzdi9wxY7H_8Z~6(zEMVAB9~Ii~q|^GBG!*F`E z9wbQm>0mjgyI;% z$hg4L{kpFul;159|GeYi)`M&rqbk!U`em7qQ{QwvC1<>Bl3+wqe#z9H^2PHT&pW4h zjc&d;OxLN9)pMcTz(S$jrBi10_nqcaUTOcFUy2ow;kpgMTBHUs)MKzZ z^V3;j82-)h5(HL^=e|8-8MvP@v;Mi!$?keXqonp?EM1y4Nxa4PR|Wkj@%EX!yM2in zZ%2(@sYr5qR1TYL*4CGoYFpOi;8J(p#jJZ>y4M3jtMD(xt7W+N5sEtgV@ANNj~BFsqX8yqPNnO5{78XIWaI)Q$Fgj zjN7c>dJJ9L7YuVjW-%W8l$W;5<9!rAtRyRP6$CFND_4)8dEFi_Q`aYDb8JhbeD_s+ z6{{zb+QlDPhu5J@M(DspZHCk3G_t!tr#ri~*gZPkm&_4R9~lB`fJdz&PU-(y4$cE^>Rx^hO;KQ?3DL^Wu}m;r1W%qRyD-I z9hSc7+c{vOA>1~}&2?DkJw?-}j@q#Pl}lD-8+4Gfu8?_W`nhy>GJceTAMXq077Y9H@>lu>q5y}M4WS~CNG7CJ%? zPniyeNUP6i0+G>LW{V&cHSx1YfmC_r*AtvG-BpEoLPPE?SUn4>b!c#$8rYI9h#c|S zqIjzGqZoqNrtE!Z+YLXCj3#`vnnmrpUU)b2=&K$@`soM{;lA`Ifc_nr&HB&-Eo9%6 zLby)*2b$4UB_@cGL*1)_uchnSTdNxtIJ0oreSSM2zTSb&QZi<63d_j=W-B?h zE@Yi<1O>uI%X(#dSgYrGbA{FS@JMvy2{THCcO6@}b0k)CjX1yuM0M-LcU11$K5P!# zFK;G$+pl{|6$6j|Sr~i$j+{spN}NcKkDtqo(7F3=V*V>?m4|q+fb}*b#Hb+{%%yG1 z6jN+ez4%kD>gpyw?+s`T9WVDb$KTz1%}Bo|M^s6}U;j=B(v9Yo3GEVxF1NP@&%JaJ zwr4Trw&Nq^8vLdijZVsr>F#t_?P=`liz{Wl=IB9^yVetN*U%Sr$9Kut@0v~J)MgTF zkypHpNLC$be`~gc6&)X_r#M%>yVEkCdnGOW!RH1Cw!({CSS-aOmC1jL(pCJQxk{QR zNxsJ0H{O3I)Li3Zh?D(8$ZmxGOP>QdF-ueBHq8;miofgRdxK~0q4>CN8x&UpLWne6 zK=>LW?ON+$O#ZH8_}1Q=zmuMaQQq^ok6xoIMQAB@G&MdfbU5>MFqUi2Hgq_Q=e_O7 z9U4nPn^)Q|C&_c$9{P&vXuL4DbQ)e(h}djt@+ssgl)Pd@WxADGTNJTo#Nc7x8OdeW z^z6+PmT=o{=|gmuGkLemtw$;MS%kQ4A5n6V}J6^K^?6smsp2 zJ_^bSQ&C~})}OG5aEpZf@s?L-yVjrZYGVe+MfXpw#q9RipX-n~PwY1qS!iibYyCN; zLA3Pi&l{4u5A2JjWs+QXgFNKj@^VnkP){?0X7QqRFsq0%w3(vfq%+}+C?x3{`WQUI zfw4#Pps+^aR;X$}HK)y7emrW7MMQ&zVPN1{TEmcnZUUp{%xf-HSAZ61(yHHOY%crk$447?BY568$RiVmCY$$L+9&iZRJqX?PX^} zBxv0e=gwmMd6j^%v%8YggZ{dHE(`WRix4rJDLz|P&kq5E;|0%1oM*17E2p&v7^B`U7ivNTz=qopu){fqE8&;^7SXzF-hQT`&5p6LzN z9DH!7U@Hoiz$8V&}tOb=4R=Eo&KX7B+hCBQNGu6%qF_@}ey} z^L&u>kV9rop){vr=CwD0=VxH(<~5r$s7_TqJ=JeV8|Jk3&Va$}OTDv^cLP@XSB=E@ zm>FTpnqbRfa9V{>(Nbo}=Lvk4wNd;!S(>Dwr|Suxw8|#_oS$DCI`4vrAKS>QvuH?j3^rpb9ue%%_y;~CqO-bzYta)^ zmEL80rFK<;7_l+0ibcjS#`WN3YR)pR)Ak8>0$xD7=lEQl?T*e9BXj;^Bjs_`oplat zy>6cs`2~Y(3wPV@V?&h$ySb*}`zRufU!Y0+4(gkg9(nenH694>-weL3F)wW&a4NK#B8@SykZ-Pup{zUsb` z9UcmjG#>h1f|OOb6iE_scSx30%$}v}|>leM*%2N^D>r zxp3n7Auq|uazVRyx3fsl;fs6=6g1jgxJW`MD4OQRld%DkWx59;%gHy;E>*A7=3lAD z{5C^lMAbybna=hLF+SHnM#F)7!qpuAB9-&2=+yw%#dk7zQsNC9582Ys-~b)`ByaHz z7l5}Vj&epEFeyV1;U+FmYqx2Hh*F>@p zwv~};>vdi|x4FDOgLUJxZ=P~%dhNZs9N$=%FZcM)Wg~_eq+VVlt-2@8$v1dfC*k8&Mv@*eI-Fr)iu)yapJXj>DV#U)UPFi0WvO*X zy1s1245KI!L82n=G$V=}<^D^4v5nkmp50U)l8>L+$FLsOe&Auk9icERx2;XToqETN zXQI`{lH&a>5w>(o76}bLq5+Bzh9fzgW~~|VOY6?QeZs58uJh|7Du(NpL5}#!B1y6Z zW8AHIc#1U|Ghs~pQmo6=hnAHs4;?TI&^|M$w#)q~*ME?)(0K6UrWZ1m7w5*{)!f4$UW^dVO6`6`-KPW}sX*4A-5!;#tWCQ90Uzm>8oOUqQ`ri_wO zMuhRx2lwi_PL{U2C-^+=SX5Xp7Ai#t(0@_d%0#2x3QC7qdZwNmr>ouUbVX$2EK8)y zZA8fyP;vVv<|3$23wORMA+GjW=z z_$ASY`b?rUZ!Xqcdx?s+CpW<|!k|sy_(t^BSX)rcxT!{}A|`moR&ZdPk;cLDmbw80 z#d(Niwy?_AjNB(ZPbfLoMP5ft<&6|5srdL!wxF)jf1hpa3f1V5vC+j9VY~D(ul6g3 zPudsS;;~?olrIApDReBH#Aw7L2nS2@{;IuH+M<}TDI9Up6EvPPf5Pp&>|;clkCxkS z@CYumD|t2^*1PhM_+2B{%oRQ}pAyIQQdow(8MD=dTjt_E%zFJOVP| zCblSZ{#5g#bUX2cvR~2fVd?$#MLr!( z-4KmM?t^^C*ib{~7ZkLn5#;Lxr0*uAZ4dBW>+5-F{@SusxmEwC6jg1l+Ix$%rS_^(wcA>aSyG9us%UGA z+M?x)#@@s(wMVSjqH3=MF-nkM5`KRs_k8Z|xx452+`XUIbDx*r8Sut zvp;X{t<-X(6A-(2s@_;Ies1tPL!9b?UJ9-1dvWr8z{lDmmvus(&#K!4W)+7%m&G<2 z%+=`E+~B>XZdw`mON;gvC+9}iz27LKpVwR($KS}>8FS9v7mV$%T-Dd*SpWV&r{uR( zkTXBstq_?jy-DiV*>Qlt>ASlhH{*?C;Mc_~%mwI}#M(X!+h1>UyY3$=>vZ|A_aU$3 z`?Ejxuh4sn(i*b)syO2o?>mDq6_0rc=D+kwYQBHp@v|1bW#3*9|Tr@3Jc1h^IR=Z=Gs*wF{Mzd=S3Xx?H){P*}%pmO7vRA0< zMsu9SN|}svJe9lBzeJGN7L^Vxm(G1K8dnzo1Nbp6V$_xAV3SuTlGr^K^)1eO~Var=2XME30&Lcc991Vhj@oPC{Yh@v|n6c*a zA)ZHH`J7%dTpu0&WUzC#@!a(a$+ZbkB?re{)k7 zSbAU`wVU;~A-JF^xn@9J9^UpydHmqTS3j|K#^`74SK6oUM2mKushCfi0gptdMy92u zz1SOOuLrWPscv<3bVT1}ILM)S%s}bzNRr zA#r>>B3&ha7-s}>#sb3T*E2UacTP|^NV+|6Q~mMLlfYO(|AR7a7aiXOeFKAY1-)n9 znrXQz5>;!*2G0lL<$dP z=;g6m=dkn;jq2290eLlmV&HOVGqVWEn$n~N+EX+%a^0$-m2L;X;o%MM2Q)MvDx@J7 zrsVQlx817S0%>Sy5c6FuBTffE$w3!ZMjD!i@nnwxXGAaD^db$-AGe-^9~BylzX+6( z<_qj})z)%oz-by9cSMO$@!@ZTcY!#W=dg5p)Ed{+a4cT%EDg=N6qj(Ck3L>P&Vs_j zMeA>&2?yXFJN3CF_}x+ND%g0ygz|avPzf$;#nwfl(=jm_E>f%zGusFpSD+&cTxaL9 z)L20JjI)d>3s4w~CDB^$W8c5UhwGdn)8*P#nSD$&Qj_S(o}nm}2p3UveO;|^EZ9+N z?69JBt9q_iKL40p;=alSCFpnr%WC@&zCS_-SYUDQwm%d2W=0$ut(A&(`ven93T&-^vF8>antJgEo*xP zr&CW#I8m}aVPekz0SlGQy@gpNSPC%a*t%L;?}r)BIOk2FsR|+HXO&1c^9?)RIPz>8 zW|C{T&1~tGUiy8YYD6Y$FEKFpEw%YCJUy`wD6@6-b;`eqOJpy!O79I+wbIYYi%?y% zr?=)~)}*XZ z%ythZ4A=ycV}xwLm{x3D!|_BH^nY)w-r+|@o`fj!Gal&Y5Eo}L!DvSw`+-aPHe{bY zyqfq;=0qb5fyfa?qC;Jy8pfJ%ft{+492%*0H&W~e?+Ib~+##Iny{y`a;IXYeXk zAF$z1vhp;DSw3y1;>yN5dciQJtB#@bY?Gk0y4e(?G zWK+MTr^LO#o)lkXNsEJvTWPk!a}KkT=}aZp7j6LgfUf@T{7W}lKD)rP#V4R4Dd z3ZY7M=}GL0qW&*s&k&)K+Cr6H02#8PLr0pnEl}f-jGKOL7RA};E)b8Gz6U$6h>wzU z-7s0XPY*Io>s4qff70w*^H~hoRj9f z65p_bnM}t9D|)BuKNn-N8bCh>K|XGJdnKBJBy)8qdb&{#$UP$wo)!PPux&5uk|jB) zC8Rqe2fOXO%LLOJL8V=im0er|59Sd0f26L^4z8<_;(09kTQbiS*jwnmoe+r9O9IN+ zzo@s|CQ@UXaZ^^Pq|6Af0t9 zqG%4jw0L3rQNoM8R`1tg`CAb$_p_J`7#C;J62zpHH(WoCc#R7d>Wf#U9x?jAI(LEH z6^Tn+^UKZumJg7BAtWGMj(0&&_Q%(jE1gxAiOwo0rj74kb7Qs!ZlMObM4PPZbdBXJ z9`fk_))lYO4fEDfi-?TPu!|Qv8jbbSQ@vUa&+u=~u-gi-YrG81UVhUVr{`)ea?!s8 z{*3W5WAf+Ae!*fE-Poayz`b2^8x2@8W!Jdx-~ddM{crz#tQymRLPtP`K##W*oxs2u zb$!!3lUhT(3=Zel?I52E0OFKh{PfS@mpocguVOKFg8b;(66~|g!OSb*hzpt+r)stA z<{eUD^z}j`6w3N-Ad`OPxZq~N#DLmv6l*7Q63cihWzFCBmUDSIRnt3Mph6e(=mk^u zsSM-4DH=&8iRw&526aWfC6mGFsnLR6S~shSsk#OEO7#e%OizH%j(z?2kCXH~dN)o< zvO)n4I=izu&kgLxJIhJ8i4)jnwdgk?hUaoTEd1mN2^{wI?g2*`*?wTXS4?(MeTyb( z&c;7u@!*V=z=-*Wu&RQrK?_nH>N^G9bum@pK5+3){$>;60-WOMiN{0 zWi4y~m+j*@XYTVyyxJZ2u^pT33(v#x4(`q(^QEEY*(Tx33C-)ZIfZnNwL5Nrk>NZMuG zdzl>+yAqG_)cLY(_C3wM)IlgiiOYG=NPA>2>YK!MwNyRBr4i+=LJ@w#4F)!z_uhGk zn*Mu14nj4$%@}jJXmL*+B;9w{NPaYqkYiZ4m0OU6FBrq9q2BrQRVM#C)f&D|T~mOh z6%O3b>SFd+VAWv1B3#>Gdd}cYWrwr5d5~a!gZ_T&FSx`!T?rJIR<+6Uq<=H+kM8z5 zVTTk&i<=AEortz&*Xsx$Y`QQZIVBnFS1={bYzl^oRYqeT@(lixR2ZiPhkB^oc7~z% zLeD;F|2!U1Wh+?e=Db+KI^K;XwV9QV*Lr=~*9`Z}?@Rs{Ad45?6)@_0p~^g|XWNzO zx!c2s$wM84l(xc{W})fc3ZJesbI7ar4TIed!U*&)nyP);&}o?C^mG z?Diz^Z|?+f8z&I}8k?LIkRao-sr>ymTj;&voU4l!@`b_A|Amfw6eU*lU=`)@qO##t z@E6NZGVGeot6lyo!5$-J)~izdh@l><9EXF?huyl9@Th=J{j6p?{3XbKZmg8MN#@;% z?m$~mc@|U~(SfzG*d7YDnR!r~{-o0vw23-Yf1h;)^LH?DB|l`l-Q!FBaF@Y1S(7Et z>8i916oir;-VaqV-XFco0mheWOoBHo9({?Bu4SoTQ6y7#MT0I|grp;Z8%pcEM zDd+a=P*}z^oEOeK+M(@n zc#v2~>YyV-c0S6E+$ODPwpqS;xp_+MmKb-$iWlvwrtQ+2WxY|UQJJ~{S|SnFv+Th< zv9qMMpHPp*hME&TGCxNm{F-(m2{E#T8k*UC5v=9EoUoo1>gB+dc|D?4I~dwiI?!8_ z{3;U{|DzyW?>2fAE09uB_x7n%<9$jRaFLby>N0C9GD&weuwe%b;N8ASNX=h?Z^hef zZ<hynQxZ1#MTm`OG za~^m1_C#mDnK4+ew8;^k1{F)JkRL1_)!cC(Ts7W3gxJiMYq-EJO^Omsf5& ziaCs%(pvK*;BWE+R>tejsJXx3VpKoF{k&m3?q|Fl}@BP~qYfrr{ zt*?o4uBaNGPF^*1onFBwP8L+H=?)g${C2hyhEC|>+S0xmqu3DLu#HNvpQtWg^_eBe z4>(0t*&ym%p^pGI&Je%Y??Xc<-?0s9k@NT2y$^~-$#p}RRD*3F=%N>(}58$F*_1(&ggYrV{3_31nR>nb`)Rea~X zi`$)qN81#oW@)z zb?yEI$9)%>6jrzmx~bx3KQS)47HlT)kKEzdZQJzl(1^#c+KdCW-U`w0SMu4hB#gr} zkD&ZsTjK3Z#QOgxqO)Ti%93g~5CRkVqKIB)U)u->^iMcJ`=&8sEK6N$iY_!@Z|<~L z=@ep_0qE#e_r52nf5QWEft8Y(e<*x_THm|_v95{wyaPWgsUyOs+85N^;N4l}8NT0l z7sFu!gz*i2>CGSYdKzK!BVSX0D#W0|IvazwCrU?ss6eZH7yxPM7`EhmP1%8SB$#Yt zE|sU&aoiAI+itYr(;+bzod1>+r!^M03Vf|3FyNtWKa;qKsR}skEs`fjp#)S(LRx0> zdagfK2WI6n3J~ezS;)VE*$2s1HkPUu z`Ijlz$$sxTP=T^6_=1Mk;$IWveDh=2QfIKqb`Nty{N~*(!o8F(C}d-s_4+$F`9dXfvG}$HdinqxpSM6*=XJK zz$Xu=tVaJ>0$%ou4dsxyH{Z;*_g9ZLg_zqA zZl!U$=^^oOSrJ|#F6I>1HmW1R4Z~hLep!?WstCO2a8+I3$DNtqyx<@LM=I9hy9x;w zrqLq~o^bvE%$op4=ow^vW)A3E4ZD!z=n-IrcIUQ~R(1I^qU}(#@9JB*SHaKDFPIE) z0ICAD16$T^NGI{65$5TDJ0g@i_ESh+aCd~|_HbsrbC1x}<(N-$?T>XuW=5m?B9SbS z4N`4e_Ilm0%%yK$PiLTCk~Qa^dzexxi|N^QRnea>Neha*ynXX416`6oLpai1jJ{hP z)n~<%;uo6bcwjeQGJQ_`KJ^#<3r)bFOQNp75k&BnSQL!M?TSecBRB`kJuPD za{8dlbJ5rT*~O$BwOSFJZ+07qCdE2D_q*t=zLNnrm6G(H>FDOook|7W+kG!s%jCCdlnM4Lc*IEL;6q0m_|=##=zwpY!Sx@Q1__5Foz#j=tK~6XZq%ipu3=A z(8>HIVzoLFL>EV*eEu&v|LvQd)l;o2$0*BuE`NL^FlTCGzxHGR;Vo8*!i^@m3}snj zNn`~b165*KL-UQkCtBI9`OMb+9~dj!n_1m{O0A~XC9))(SEEOKTd8m+c3v(KD8gHA z!A99oX=?Z*X>Fs9kt<|33tT$K;@INj$;u_lwmqu@4Z9S*-IGde+84VRcg63Hv7A6q z_QgtLrtXo{AOZJemwpZf?~31>xOqYrM>dIMPO4LpCMjDt&$ARy()1*5O)m+bIQa!X xQ=-J&z5nBjnjL?(xPeUOW4Ea+E-(`OTH+NBB=^5`ke{SceWsd literal 0 HcmV?d00001 diff --git a/windows/security/threat-protection/windows-defender-antivirus/images/MDATP_4_ManagementProfile.png b/windows/security/threat-protection/windows-defender-antivirus/images/MDATP_4_ManagementProfile.png new file mode 100644 index 0000000000000000000000000000000000000000..a52e252d2e4d746b22cdf9dd84300057c05dc6f6 GIT binary patch literal 49758 zcmcG$Wmr{F+cioVh=MdI-5r98bf*#`0@8>gf`oJ}GC@9!<$Umq}7U@PPC^frs zl48#sbl1+WeIbyE%EnoB6t=cM+=!1aJv^Npj*0)%9;As$cYDG)WNQLzv+}U^`t+y6 z39qdQ=h52J#{1p3-hJc7n~+8PJep_@kJqtLS0nDGDqF2k625J9Z^p>z`RlV8qu0hR zmZt~nU%q_7BIY0yurs^7I4`%~oQV02%~_;n<{a}&*9^0H!M>BhKM>PwD97OZWPf$w zSFDip!APO$V5Vli)BcKD#`9kqxrWC(^KDV=T4gpS*}9cPY#Lnl8)HG_0@x&6Q;9zV z+ym#kZl!IE6lScazY05l66hOSyuNhbJOdJVk>Z+c&qS5O5O3=O6kbik*JYe+BdA0Sxg;s~}-D0!E z9Lvg=+qx^*FC>q4aa$<+J@% zw7e-6b>~xMI?Wq)30|Kc4{+oY6k-#c&J$P?VKZd39_osg?UoRxR4*9>rRAS(z6j4b z%Zf5F!Yj@$*xLOyQo`=55=E-;5IZjSYyIZxWwF_*?C}EEft@E|I=OCl*KG!_ z=DWO!S5!M;e{2{%|IR{(SjR@LBX#AYM_YY;>Ij`)+gyF>34!wu?)}8K9cPPWSQn)| ze(ok!+j=kFT~e{I+;}9j8}i%7$EV2;!Q_WX!9Ac988zniWO*E?Y|eoZErg5Kv)kLOIV}Y?HtG6t%SlJ`Tado$eT#UdV1kF z7(0-Xvnyy>yN-W3UauDRyy|OYh-J7c5pfJu_>C8td@yM)# zYQk)=hI;;Z&@NPzi(Q3){>he8W%!OT{$t|vn!;`r(jXrn%TjF`9SbyyEwAF@xjyq; z;vXeR1ejxZQYyU|n|Xc86ZFh>JxMex)6>(3o0G-C@^39SCo2E*)~Y0e?ZJO;flnscKG^NCm?-9S##tk_=&0L=NPxXD+9>$v=G;HuARA7tZ&?$S_6x0^Y zIm+t!@^EAP{PfUbw1|D#?ffK=l*hXs7TUP|i@`7T-n+sAw-giX)<=4*FOFt|p?uNL zy_u{!M@adv{c-aN3>=42^};_Vhs%({S?cX?4TC>F)qbqEU1MEQkqM%j5Q$`6 z%u;RASyVWT9uP+;k_TiWJal+TRTgpJmlh|njBK&SdIRu zGxn#?pA#QhFBDusKDrcY`5RHseyL7&6&pqS(YZu@7u|BZ^+=oX#Z3aE*~%*dUu^Wx z;<;P1#ecmheA}O{0x7xjCqq3;yA-xMnnNdV@QPS4h0szJ{7BAe>h}kHhR0MruvXL( z-Wscsd(u0K=vaP1aifk{DV6Z`pK&OQc3Y_UW!jc)mur?NmRl9$_zbcYZawSQyX&sA zcTL@s_H8?#=X*}6?04)%S^0iwc0ERt8^>S2jXmG1)D&{g{PZz(_21JXiwKiUtyE`a zO*6}lAt`k6+{CBihI>%!d7kGyLB(uj)UI@j%qL1zN)XI_al#iG4^ay%i%G;> ze4_^{`V!ZA05Qhop0gbT>7JjB-b3@TkTrPM%OrJ7O74oa&%M-nzrw zY8vqjL%S$j(w7qYDQaN<>#JQrP}JbhS46ZcQCWjOO0CU$Ut?Xu6KyBzoC`bc40=QS}u;YtIPPg(fcqmCj+ zXYrn6x6g$!60rlSd8Cikrqrz^;}dX`$hi$MmKEdqsfVBfPUIM%kF%bPS2*rU`4c^f z;|pb3I%)7HwqG0i@Zx3CYKr_|mQHTCrDVMSb;dgHTgi#*J;^fTWwx|5G)wUr&wh9s zd;a`@evJmR1d$WQAUk2=lRiqydHwrw!+HSxvuuW$t)eF#SZp!b=!57>qi&%xVZQm1 zBO-|_!ToGo2Jh(=Whd{HFoqME3*YZdw~2{AUwI_cPyZ{$r<&sg9ovcvgLVay?f>?- zN4LbVOfAlyxs9g-l4jPr&bw1#v;0&J-!9)z62OZ;G2d{REvrd{+tJpv6GI9P$t887U86txHSE3h(ZQ-UbaAc@Uoj(^>HDbs$)eLx zQVB#=mc*Br_z0PyF$&?@_J1vW+J@^OCP{uA&1P(2V^feKL3H}rQOA>TU*EiXR4N>| zecc{5{Q$%2be!W(2!U;A{z|Mx6}84`+{tKcy=<95^7v#EUaTW%6ReC*~o z34Qpdp8;+hDKO!Iegw(xN3KHo=zU5G=6uh~8QT^P&Ag9n#8}I}5fHk@@=v9yG86f2 zSq>m=@>HJRH|eeak(GiOW`8G+XMMC-2``hjEKWQ#Z?{F%t1Di>*f>ErFd#s(P0nnj zfZ6w?w-nb{uficzR;NJFHyu4J_?ldPl&-qedExe;l)J|ShQ!=b?gzbyWMs`(w>!i- zLy%orL$rt%p;t4>Ad5OSIlmDl=B1_6EfOviokf?zztu3uwsgC*)I9dgOUWeXA+i?! zZDF2YoIB$l!AirY0!X;Ud-saw+oC6n-o+Z_(stS8rO18THk7ITj7=_&fKC{`z7@w%VC$($e#jV3j5dey>9- z{BLK_E~vS^eSWC&5a_=Ep+wLa(M=h54TjPL$+1h~6-Uc|m^N&Tv*=YOhT2#SP? z1z+9Vv=dhuMS#)+@(KjHaB9s2#<0Vt)@n@(`fNUZYqk^wCVcvxaRt@E9buP}6lfVO zKcFIyLc8NZqZ%)^(9`@x$EjPP(YrS*;eC@Dk~7$%>ew5j@@?t+`Nja!I;NOk&$4yn zLs7*D({2=!JcP#h)q(t04jGdPihKN3zfMgRs9pd$L#7@|CB*WY;E4`qYnReI{PQS# zskQrMK>9vRAbi%{3vg+9Ij328`g7qTb-7BLu_o?T;$lPk|M-z;1Fi*T>-t} zVmUN&L<8i%QXNs?km(ffR*5Fy>I;OU7@DQwQ8~%wmMiEgINmz5?V;3mAiUm`9dHL< zty(2wKSl%3hg zmn;w~>{=Fo2vCmn_dO15-5%6LJO4_D)W$R-VJ$=o=2CoD+@qJqo(ljB<8tj7J^(71 z?dW7O`K-RqD>-;vx?Zs}0eBN|uu^%>k6bD z0Wq;LWpF==g+<-sblvB5BInSRyYjg1{|1K*0RZE8-~6!&RYV+jj5IVzBnD-Ept@}x zM7fNxAJEvs%!2v?IqOW3+uvy|r?Z3^V>o2`bhCOg-&o1UX0Ouukb-Wj+p~`D^80n$ zZ4b%{`fZcw>puDH!vzJ@zJDhc^sL{`_^5bitV5BN*T4V0Pu)WMrxWg;%LobC{%KfZ ztzvT>0El0sbA@e42>KhmDx5j_gxB$E3@nCdO5rM|6<+K7d~5ui_(lpaZsAwxZl+We zWAsV6-_H6wjg?J#@%)G(z`4a;AU%NH; z{_{)9X12qBpS1n&C%+;7UUV6Q&=&b7ImYyKR(Oj%znIkDiLw{-zgJXNQHSeA*m(Mt z{T)d0|Np#1MQFNvHdBp3BDY%(7Bk!sv+b7;j;bo|NleV4Gmm~Uh9Q`izr;SYxY+Ac z61hCv-KoMAb8WKv^7jXH61DzFUax;wDNe^v9(6MR zkd7`*XiMLLTt0cGS@snJ1B0RjEuZw4@a4TX|9c^Ge@8T$6}sNi^tQ_D0=ox}FpxPo z96^FW({_S>%NEV4=N5fSb`rVlc&#bdRNPPYOx*pUD!zuH9*U=RsrErxgs8Sm5Sim_ z<1GP7UVw7Zfk3k8Z_hMXSy>(Ud01uwWUg>KcftcwN6_Vnt5GFcI@jx|sH4QcW#|n~ z&&OHAoZkG1iU0i9i&xpsrc^8WuRGqCkHbog<-Ka#TkcyYM5She$>w{!oT!u#p~}Ct z5bf|sxj0ua6@8!jHzGlOJjzc z*s@(6$gR`J(yJD>UFjF|y4n%Lvj~0e`wO&Zi9*grDUV#tLeZLnDd8H+DRSXeryBwz zUPJDu>&1Ly0AhxhmX-_v#F6pchF+lc2mtdRauucC7i_%x6BUkpHPq!M558kaLYzh@ zGm!i7_wbDP7KpfC#MML5zwJP?42z*p%5Re{*dpyZzwt24m!gd&<)kH?Q6Y+LINum2 zW1%zNdFnUn8SQU~qz4oDTSWV;>RAC~kHW4hlQ5d$$}LQ8&o)h#SfLwGJTxcsQ*7}k z=A`L;>VNgy44q_ucyW~4O@=MzgjX2fFr@$IJ}~JX(9ocb({GKNeu%)k$Rl!WBs}#x zK}>2$_J=-}Nx3qB+&rjt&(esp)(DCCWW1~tm_!WgeZm=)3?-f71ug;Z!vq$c0=^EBx%&J>Nckiy+l{fgLXX{n#_6DGb7|Y=w z`U`oapPI2tN=dyN&U*zYvMGoh-yaVJSsuh=Z0J`C@E%E;_9(2akxZA=m%#ie)%qg$)!Ja6dB(IPVNh=>VoR%&S;3mcnR_cyVRrIOPG z__R9#4Vc+-$>ns=c=;T*rXWVxwM&$5B-hhQ2mJPAX{xW+Xn1#fA4c?{7>uncAN~tS zGQ~_B*5{cacQJiV&W?9ee?!Pi_QTzGV28<0jBIUL9=vJ)!p&pc*)OnF^DnEzDI|rs z@M=b5BDOTYB)?44C6E3TkBOFe>w49>AKYYx&{79*ATt=UtUd(2oin$oSsm{q^S1gMxG7*l4KG?)rpNl{<0 zu=rpu0jF*pZ>$4s767VOf0lZZQ!93a;UQ93pY>0&!f42NE*!z4)>_1nW4Hdod0d9_ z7U{kEA{O0lv9|5y?j)~wPNbW(aUTI|41LnYDjp4Vm}N8_$V65X>xG-rbV(+C-(mTv zejzU05dXbym~3Y#tqcS(q<5}*dip7~g9_)f^zQZ;9>&LCM89wlX%w5s>umfYc zkLs0JCIRydncI~pB64L;p-bFj#S)$x#$@FT>A*WYuiLNV;51S5B?eU3u0Dqht3I0X zR}wx>dG_P!Ghq1kkmWItlggohTob}O)8FfvNmThF&P*!}R7`YDR?`GfuE zqc7y4vtE@jWVS4Ru?(`@U-|Q{&z~5^D1u}%OJmk%ODLXiQe48l+CIFC&`e$hF2aI)#n4bUbHJf6A}79q?eDl9mA%cMW*>N-*UP( zPkw1A_a)aKU{?b3MxJA(=-}-Xe-8}}g@#7tkM7wTQ#Zn{RpiqkaK{@sdc?3@V=ZYF zh8>B6y|T7Iq9{NRwrt-cg8kX1V1Hax23D;kQZv~#cx9|SZ$vJ9x|R=IlS-;;nqm<% zs_)>dCU|0b{?c?{GW6Ic9>?*i46tl^7tpO-PV)DZE#Wz+sJLfa(xm~DvE%W)ARJqY zpaB<0rXN>7kEt6#Yi(`q_0tp&$zFt#a*8Z&Kf-#kGwjN-KnBVmAqu6Kd#~vHuOj!p zBb-gP?#}(Ubi=r`(o_~f@=4j5wvzFoVu`}8*9Y>AT4;#G?ILJ=9pr9xlC=qcF>w3hw zX;u_XtIu{6H2t|~i#2?HweTZ01Yg@d8#_*i_)M)A4~{|95!f>x8LtGW1E*KBEMzvs zwK(B1_S(M4(?Q`EpmRTZts=9|&%CWs?5xtqOhm-~MxzBLv{$G+(s4+*MDqX#6tq@p zRJoLD#96#&-GsWW)B6X3xX_(uUx88{&ij>moAq*{%vK>FC_TC9I$fv`s@`<%ryd+; zu2-!D1AfA|lnP`wT~7}p(Ew;L-u=e^p**G1!cgfeuUtUCI05~w`Weso%cW%K+yaP= zc6@H@g~z$gZPOmsxt4jUOI!`(n7aMps>#x~NXwg_`+RwIgVhqT0y*J(C600XUM#_S zv{?vZV=TP+3-`+~p+D8?F46zH))p#^tSi0W#L$oXRv?t7sVVb9UH#fNEh3OA&=~4r(e&JqBBdjm^#0INE>+;X>I9 zos~H)-{9cr7dr%^>6-c9N#-?C{@&IE3?D76bQ&;Te^*WmU^6H?qZi*8D}7``ps)3mN>;`A8vSUA)hzJ$v@B%PK+)yp zLkr1$%ev{w%efMBC)VE3VzP`7pWKx_@;4#2mH#eXY#)8|eBz2U@mr5Q|kbacm$3OfVTb008--CwecPRAq?9Io%KPu3BE7ILZ-qevR^pN7Xg~(6c_*~N97}n9U zvsh$h-sOK^Ceh*U?tb8*gYM&zlkU+k&!ZSr-H!~ne$h2P=W#a*Hu5dmR_KyCyil+E zLig&7UE+D{uo-8A$Yphhp}Uo16gh9x%KNij+*Jw(VugMB2I~m4_bZUCi=&&MdJwk- z-hFs|*=}Quc^JZ5;R8S%-+7>>n@M{8=cw@RJ}?VG+tDr(|8ye-Q!AB=FWX+H#PWmL z)Qae{kzZO5&kElDc?;<6?nCnk7(Z?k5iL~Ibly$^9vLu6q#9h4xLkGUcs3VsPp-{U zw-{RhS3TZu1HW=~-V$h}iLM8vjX=8k_S8J8jmUk{B3ng>y8CE?lFa9Qz&`U4dV)F?)*~`<( z%Zp(5GcRtFRQX62^{jU0hU%0@SfszgJ!(H;Eq2Ch^=cm|8eEMuj1YO*@Si{lpSM`g zwq8pp*ZsB;WOZP^YwN!(K=~+&w;(R?{8epKN?qv2WK3F^n#`m**YUMyF}%LWb#Fqr z>AKca>=~_F&5CHnqNgIVFaZB6%`t4PPG|GuRYAos818gFfAY0Bp$2L?5XBQNiUgk@ z+RJj9r9CCY?oU;SCLtR-e&}6tcIQ0JHec28FvU@&OWA$BKUZt2* z_wrLZF=|wL*=Dcv=j<~V-kn9`YKI5$F7gHBwyVd%!DHdY!#j@!iW40V=8SQ&u4eH* z*&hywpI!)dazAPCa{s}Eh3Nd<(4t#;?jm!sQ5^(hEO4U6;OIYf5&LMspu!Vo-94-tJ4A3!368BmB(DOIL6yVw)L_1OoN5! zpV-E+ja`Uyq)&WGlLK)SzejbPSLcKSJsq5i+&>1lTHi+AS%(VX3W zDC0GbbGpzIy^+TAAGTx$thg+%Zn(Ls_7l{+{*|I|tMb#c%gVZak)nW(f!)T|IwcaC z9J}Kr#+$^lIWGCNWB3yNZ8#4{G+(a8vk93u>saCW%y^}3xSJX!SnHLVeC~07V{k$A zZ9kLp()gUDc3a9Im^o%Q!y%x)UN}~4WOCiUcu^`?>M&i_Msd0|xxJHSB?Hg=SJ&vN zhBOIV#MyD_;^iQ3R6%ha9gNNfPj@QUV<2d;G;=MbcI$VX8zS3vsSnN+S^$(& zuRv|+jASLwvh>l4V;qiSqgnBp@y!si5Zo?Mc25p^Rb4snb5hTaGjCoYimK8bFi<|Z zBxEu(duc{qe0avAUK^Vxk2v#ew_#(j&q+&$h(Zgkx?4i% z79ZtjP*1XTcu~Ku6$Gd4;J2Vsoba+NFi70>OQ8w zf9_O@S#KI#y-WFPCPW(7R$QZ^#rvw(W(e&{1a)Yd(%I!ZqSMobT=#dBG7*#-{g7e{ z%UuacrWDGb=Ib6y2PE+Rh^HOlLcPBi4;%ypY24_ z5l}7Mf0eQ=j1;CfHzTuOzs9qEiTCSHo&xsT9Pm&`l^t*&NHGxAH~cF(P$R0K1>VHI zI4G{3zWo-_59qSq${}pAqq%uOMf-6A#)x*nRb54aYlE5f>5M!tV@}TqCz*!(x*TjB%nZCD6C@Va;tG&8%t~nY1pw=l(wxyfi_&iu_s zAp0f-NbaA%Y}0sFy;fX&y&FgO#CItwwC0DYh+aP09A6w-$ zA8lj5U&mJH%b$v)!(NlRzht@b1fdfl2fUSOj7 zZ-a=>cCv37y5Yw?Px9Z%d=cdx?k>uJncQ*fU_ChG%-x3fPWz6MZ8GUKK6)?hi*A|& z_W`9+`pe|3W79IaMk->Ki%o`X?T5|YmAwc=!gE=U6^g6g*+KTd<|uSq7J){1(+hF2 z?jl+tbS>QhOdbGA&4+S6po!jDGA2`*EHDYz*=xY+HQamt2KCeT8Q}Fa%K=kw?*dW; z=17+C0UbT1paWGD9ir;6=J5L4(EL}4&g~8-?X&qt{t4`yn%7-26Uq|t;&}+D#%c0s zZS5x~IWsy1AK70zD%)!VcZF)A+b@z?#C7yf=H*|Lux-yHnfzF0#j^Mc_@8YOk$kR>XDSKAdx62t33TR!P}l}@(cqX6F6 zfIXUm$c^FWREUkXHkpZWl)3&I2T`jk)+KmYkajzu=;DSYNy=X~)xL5ANW3_pu2<52 zxHc?-{ybaP6)4zEk1r4OQ{=8QR#FfR^vd3l05OW3UizdJB)%zp+J+_GF!jgSg-lbA zjj@B$(Op@I6cq(F75cAWW1HfT@#!z>Re-|*o#tnID6s+zp)Kb;enH?Sa)Y>0O_787eW=;<3AKQL#jt)AX^-l|@zVc+GIGtq;N^)Wid zJkZCR)m`H=;w2@~LvI#)x8tPI!YZ@WrQ!FLi0abAu?oC;yK4i z6UM-9L7`5P_{@aaUuL^XH0T1v#J?6gR<3!W6h3r=)_jn{U1not74HnV3sxF##K#0# zHWNwQRIy9&iLJaZwFBM@_Z_XNQ4^l6_mqZ@u%?1%&BM1Wx!KoC>-Rc~yHPQV-*STE zig2Djuv^|!FD5Wcr#y;Ry>f_DS05A)ERzV`0g!(B4~}M}jEqvoW)}3E@Yn))n(>U< zs;Ht!RBU=dt4mF$s#%VxFno{ZU&bpTh?PyfB5JW=SDwlpBH52BB(2Ig_C>mEd;UQR z1h4(``J?io(qNGdT1f-Ili!uD(kvgQz6A0DnhF zJa06+U4Kx4%YE|1->K|4Kbb|pV!YE|<@Mg6@xAIiDHVM+hjR}z?~%B{+B517&5z`7 z?85wnw;5M%-Xr1V`Zi6q#kmZgqL=P!D$(SNlS4xqjIrAN_7ju--v@%;?EK!pO~^^0 zyAX4lc3d2-Z$>)2yf>SVC#U3>C}x1WuO^ZeT^5ucZthTee_27PLx@nOKl_qQ39Yz^ zGM@j<_-jVbG|?{8bGdv%x6BJ}3Av2)YBd<%FOzC3{E0cZZf=g1;t#%aaS<%1yL{hb z75{BA^HmOTB@PHXZD0^$dBsE}B{A+OHGK%JeKx(4dPw~=?S{Ekf{}Gu#Uipc_&58G zp$gk9g@j8VglOQ=1X6`^oIKf-c(JETb&!hE!(}2pcc$>-EhZuloLBUL*Lv}!X){vj zzcY4(cxL{#{D2kr@sMYY&cT$2+*56nzWYTSpLsO97DE^Dgk--|%&?jKurK8^%}a6lgOh$2B{vg|cFP?0Po^(ymwDu763aBD4SNC$m5Q3q_ii z_p8yP7$KX2vaDDTD)tnxuUzW7Z5&%K0%!RV4@NCo1_tlkpWs(&(r|;W zkAC&$7eU8+#*Z!^SWLKpBPS&drhW4rBE?Lp< zT+pA7AUI?whEz*CLbUr)sb!vHC9>C5Yi-1o?z|q0lPS|{54kHc8E|@h($Zv1lc>|c zfw&lR;=z7Ou%FR|kaKa%!lM?*>J%#VV7*~eF@k^UUH)3*!A0XU@a2=k-W!8t@OpY(EDP5ApE!_x_qf0FCDQiv$k(~1+ zuq|>1E!gpUP=8X@j!oPLPszqToG6i47|;yCNlov@Q~}&X-kQ&u=AGo*0Z+HPlO$l1 zXlk(YOeYB6>2czV_RCo-hDGu07D}CiU1-lN1yd2t=L8UAs9Mz7G(BZ$JN~WyXtSiP zdmq<+(UylKxLI=?s1w@CKd;mXwn@vVl-8z91T-U0ysEG5WK1aifKh2o6S^)7bluCu zd-)_5GLn)7X2W6rTQd#*DdZ(rLDB1hJA4xRK&Q$jX2^A+Jw_Wbl&f#dZo>RnC+jxH zI1&5T@CGEK!O_y|auR$uSR~SMNY_@ZVs|f>@!oMspY5@?U>o8*SU}6&JFCr6cl=N_pi;t!8%kT}wvRz9Nf2^oFzouGWnSu^j-DqORTyUL6CB*c zVJ@W{s?jSskwTvd3C&0IImqv38b5T)HsP%AM(rd=ck`lwD&pgQensYy4%zSF447W{gsm zWN(FEBGSe=WE%~>_>9s)WWyDX))!LEX^&&>fnTAi_C>k210Ug!&OZ~tk^cjNiclhdu*AB(?#s*H0b9gXirOI$=Oe`uYuVCISWMvfn zVvy}DP$IMuTRj#fBH=EvAyVDdUDHXo)qWn%Bdk2}H*)M-meUjy=$f-M^BcidKMb^t6!K2uSTWWpOpmSaAWJ8PIbMLI9HlFB46ie#39J(a+Pw#>i(R$V+f=lAc2n~ zcIOz_l)`4&su3PYIJCZ~szfFNY6NHktvKZTHgHA)o_0LPpbor#zHOhtlSc{ee&8Sg zAxj<|NAm)rWJgr4?J!O&a-9q6X>6f{$*ly?;pT%d6 zTYMWnK5e}GVH;PfATr%a>}A0|a#=ExKKgOCZa{FUe2;>{t*`sdS%pyW<-|1q%TKv? zDes{jy-Ozf$z}fSVK( z|6lH)I`Yf=v!PtL5Z0!ra^Cv=65TzloEqI`EF>Wl9; zq}_`rE2V_=^zgqeZW1e|Mr;ph3M;}3HRY^BVOm4B+P`tfjD?XS@X z+4Qpw!-L3${H|WYaL=y%O%#+}Q1}BMbb-(WceP}r&qS+Q@fc=4IM)OO4@iOp|HIt` zrk#1TV(Z#cib;(xt~ow?G=2Y}=Jk5hz;dsprv`S>3smuT4>w(x9MBoRL3A=!>e|gq* zdG;R~e75>xwff?;`tsDm{q*i~_1Qcp9o_k0^@Un5U31vCv&73YV>#7Neso8NIPOPa zF-FQJ;q$D15a1DvV|X0Lhq3teLg_&QnttDE2$dQ%H^|%PD?A- zcxOdkG=|0JJn9!A$o}hd3I{yuP84H#)Sa}u*h$?eiyRA)8xBgd$oaC8X8vpX&_~v< z_YyF^O~X^Fi@AIp1_wQoe|tJo9dj#TYrWxID0+^H8fk9p9vTGBbI3K1si>b5vY?&W;HL zq$b|y5?6c`_q$lALZL!prSz8R~8<+Nt3zyl|gYx_T zHY~^E||n%wO&iY*BLH4MCdQ;BPRz z{O9fTI!S*+DjDe}nFvg`7W&fS7)(C9GnCBaw{x{SusfzZwL5o6r~NKciUrXIybZ>a zXeAA$m8A56TiBB4V9f$klaH^j3#28>eqAoYYZ zJi+^+3m!x;hYXoM=mB?PNl6I|V%$Ck0pjBjHM^&T%uhdFRsGUv&HLsUR?eS@U0yCf z)uv{YXdg0Wh#5Ss#lP>`Aq#|w;TfEr$P@ zi*gkeq{${egIbI`6#$Z;`$GFY2M&{jl*r|5yD5|3a!Pc*H4MLO{F~) z*_`2wuVFWQNhx~*I4b8_!eMYPAexpjMEZ>u!4&i)=H3;oR(adFzuI_dWlVI^0Ar$y zrzj#GV9)JP=^_YhazesL?w5_wgbk*fXvXcD~=^V6(R3^5y;ox{cbS^Cny-5?MrZ9SigQXsHOv&H3cjmOq z?E)*E&W^a9KMn12(sROyoDRqE_(eTiV}N3~Lio3Ms7hQD_4C3n5g z;-_B>r>vJu0Wzq_c)q{$uC0W4jon$C?%g8()NM&gN!S;e6k@>3u>M9jfj0(RW9DxI z8oEpXNsYee9z+U=r2!9nC8uTi5EpC1Jb2(>{VoSyl%RA~ERl~#a3Y5$mJG2147dCp zp`gG(dX=BgegI?Rp9|)DJ@@nbzEe`JwI4B|#TVSD`W@_d!iucity=W`Qsk)qrFQHr z_jc-VL_me4;^q(hUa=O2F5n0xLnNy@Bq|aC!w%FMW-Fki0!zs1AIZiVb!pXGTw@ht=e1w{flCc)s>XXf`Ky&8{Y zWs^{QZF_s$j$vQFzwLHnJ=7+bsY`BcKhSu?ju1|p60&9Dc zCUTDXpAGuf*DO*d`_=r4iDdq(Kj813rw|~%8$ArJ2kyLasJc%-b)U@!i@?#^A_D2> z@fu@{5i(vP=X;PAvGAPo>To_|^(|@1@$Fe3egP?NQqdf#-aWLGMKF(o z-UWwCt?Rjdre6#8bJFLN+MKMmFg~lBCnY3&Wjuj$wL74H{jp`7fIV^svunhGsQJc9 zRg*qWnkmqpAT;Xefjo>T=(r<05({?%na?ttxCjKP-dkX5$ z63wCzx`v|b!AEywHMt^Sno6QP59eRb+M5{xB3e81WcxJD%3WaUm9|(I>t11DxV%wW zfv<0@`w3={W(|yxOE^%RHyifkT6%ig_2@PlEW_?wcOPh1IB*k+=zFwVCJo0J#fiA< z3XkKHlXnd0ZNA@HxG#AQUfP?X>j9K#{wITa?#RpQT$LbPrgD$;}ZT&Z5}@*AXKy60`}EhH<$roic<8k$d)BWKE~n$ zb&SF5GPC_ZRJDoU{HpB4X;GU@Y?yz4g@h(kr~Cm2hhpzdHTrD^J_LwH_E|RKTaXHc zCVh>=v;jyf4NN?6T#AGg^rUzeO4mJ=9)uK>0tHl>4`4WX>dzHj_>|Qn9ePl#l_fyS zEz9+h`zp#D2nay;i{nM)c>upB@%(DNawAmIA2zOwfDQfUi$WH26R(Pg`Hs5_U=7+| z8xCiUu)-tX143$EMF(ow5XUQ6fQ5pOp~HY%O44(k{rSo7xG|}w$c94q_vxW-sX7{y z$K%riZ6pe!sK9crIdmuOp{N%~IsjR|!yp#NXN9JKxA^q&mScO*7ce~K+F}zlX>Z7% z@QUwrpi#X>!7XrFo)JGjfXr)Y%F?IF=On}ZK z^s+HPn>p{nqaREwVEFphlutj7w-5eZecrH(2|xbojd_LWrL;0T$WsK7wC0v4naiVdFF5ozaO3fg;_*JIiSPuSs3(KW$YI(H6BT~L^a6%t;)5_d}!L??y zLpR@k=YH(oM?WV&OY>wJyGB3l`OaIFH;o%0s9WxBMHWJTc>&rG7*3fN?8Ji~oYRJkWkbi>a~t~P>4Q5DZZ7CQ=HD(8y=*@-vP{8AZQtKS`B z&-rpGac&<83i4~N>M&UCm&fPPXK*GaoA6Ch4 z5VG(B?fru9Z9h{%NJ5Yws${(DT6YpUx}l&l$(3_BMz2-)w!u#2i8og7uRfIJrtspL z_b(+lB?(7FW$O1eva}zWJi2yEK&52Q1kgy@y8!W}ddsJIMsg2ap-95c%PW*1NYkn5 z`oXSifbYbhS1umNC%pIZbp|HgFma+*uKx?Jsc&kKY`3sUEkmT4b7!NxxPVdwCp)e- zA*U|cOT5J>bg$}{!f+M>NKhm}PwVRfB5rMB&*DON513itbf*cK`?I3=^Q|{I&?(Q< z$6bq<+$(R!wX9u<-O|MBA|o?CYh4l(maEm2Z(~$SAe%BLNeu+pcLXs zR?=cyt&Sfuo1hWy6C`2n3g<36l}KMFg;N-}RZeK}FpQQcbuM^2L+l((W%@t68&C#cfCbagi#Q<-^w31e_{-f}!8x01TKWI3Ndnr(9$U#s}o`*(M7 zh$Wn*xJxG4AKz3)CLQ5>{o@Nsw@gBTybl#}UuWeAC4&m=6~g@a%SGi{V{6(foh5U9 z($yZ|THst1&3KfwP99zVm`1bGELev-e50DyAbpG()5Th#h1+;lag5WLxcZw?a#u&_ zf{ctk=1PhnhVapre7TY-cWXHnwC6~#<^1RGRie=wG+VjE15jmkR1UoraMs$LSyvX4 zraoc8Aq;?g_)VV4EgUV?+9m<5rHvYG#~ni<>E!BhUsFnpNUM^zZH!2m9}^lS)R2er zt63s@f&3jY@TG?N@EZ%GJ;rGZo&Lz^jlx03FJIsY2gyJ7?>&F7`gzs!w+;)U1`%ABQF?itF`tn4*kxk2zv6te3F{fmo{uKv|O8H}4vkHAlK3y#$UIar3Y zycgx;>nu)L`o_)Ax&GeFs$t8=MqefECZWpx4_^wQhCLsaB*Q_4#iha(7$!BPl*%Ac zOv*fXoq4M#+whQar6su3Y`m0^^N828y2HvYl1arAO5wAlyG?jUQ+2HC!u?q~v6hJn z-aHt#hw7}NDI0OAsMl>(()=H}Z$KN0RyM@uK!51==)=p_ETR>ac}oWhup3Fwv08^H+N+RU9@-dHIv+3k*tHrBQG}%*^EP#lB+u~*EmHq0kS^|Fxq( z<4w;&-**Y_7oSFS#r6xyG50n1C$q9+T2<`&UcJ(P_x9%Is?`WQbe z_FX#ViZ{eX1m>21y~A&#l=S^uz;^&+nWO2x64FSgwFPq2KIVsafI-0Uv7ARpK@Bnm z8od1m8xGhc$_f4?v30;A1T~MWrSM(yvl_xqY5S_bGrw{3{q(J`5V|Jj2?MYZput z6c@B$SrgkHB_5)EniaBf%x~z@%O%>rJ#V^R z(G#AMt2bjRwIulPtr3Zuw+Rteu5T439&q!Kon&$NfV$A*Z=IP{*gB##&b{J*QJj>N+YL-2J5v_ua=za7G^&)3TkLUQ~P#aMmg6uQ# zbxf{TkyoK9L7?0fvh?uclFP80qCe zY!=*l6L@;#w=)<1jZl%WrCG3UJ?yN9qATpQBJoNQyfU2v)Ku1vX091WF3gjoy z;XcOtvz|k)Z~NDNseZoQ(0;82d^GBi5hOGG9QFg?(sY{Sg_n5gWsXHR#3BR(-cS?j z$VCVmeUP~fopp4ClfoGF)f-51QAqu89gg=eRXCvti<|!RzY9iy3|bu02P(z{Abw5X zAPV$D1)vz~&Utdf0n8pJ&ZH=Sev^FKu5^$KI?ydV{CjNGX!oP2aD;=HLPh4w&??u* zroV90k|~KVAoiQLd_>jE_h;4jRakAqgHOpC?`?UUL|8v^4RvX~iY59cWye2INbifP zt)V&oN2O?^oEtUCH|44un50M*&}Z(ZJ?c_Hd);^cRbXZHT-v;xr^PQ?@wC*NH^twU zl!)!j#G~j?&zpavX1sdlLZ z%rdF$kW;{+|7A=SyAItbKLirkFUZEKN}xsD6)tt(Gc&S!o93%vjOUy|_XzEWZt2T$ z!2F%@oB?q5^~{8F0+wjQ@~^dDxQ;;%nH>SB#oo|STx6<_{p} z9%2Q#721h?+K2wTsHg}E$Du2hBoNbsxHm^I9z?nb|C#YK-U=Kux`gm%M>zOJjIRZ>_`5B!Uzdm6)m3 zsHTYlf%o@XYb6$=J%C1}{}s>*?fxE@=kAUBHMa@hFZ(hF3#Ajd3kJSM2LCAFHVfD7 z!#dX(zW9rrPGT6AnXYzq+-JITKKb*qRO0njuk#blPcc5QWkVc@C-!RGguZ4YSL&1fI-Y(`&6QyYcab z@T7^HeUTh_bS8$g8l;x&L^TCq1pe6*|FgH{`{zvjawp=?X~Cb&%ArM%~pS8I)fb#gX9J4Hv%k_lJxm3vh43i;NS0?o^?BL$Fg>b1Ox^^raTy$jPm2 zvDcTdkH+Sqc&q=XSK?mZQ?W?K)T5#Q-ej|JfwBGGY*RuqaFG-aEQ|@ zUn!!D5r8uX08wCUyyu#b|w?{SHmiRMh{< zLKx&@S;NAi5U|@^ABPuv0TetV)1Mw&AE{r;SFJD0e9!pt>%aWG*mR9%*g?LS=tBG|Zsj1r3?7CaW{+Xbxu^h~>Uuf<5AjsQ6{wDaZBmv8$N5lspvfP|3+XCbX zRI6y(-##PY@{arhMnra8WOw|7J>>BS2!`M>0KC%3*L8>X$EX@iyl_x)A$!vHNa}qX z5`Np6DWF6kHGly);5ZhI`8&Y-07k6H)yQQi_$YS3`(02ef$J0OAi_->?_+`xw#VR)T^E3**JQHV;0>0wPuHfOtPXx2n1xpXqR}hgp@QGj z)98q%w;IlV9VIDRodl0yIRNTT-I6Q=Ru zC9q|+1#W|a`wKivfKo2i)cI~?LQWQ$N{QJ%bB$;s?OsmcA@7K!_S3X&lnt-VWn;UV(Cp9*u$wMqs|d?E?%zr-kT`hP=I;=k$3W5fnn? zrAt_@wWZ$3W`$8DkXuAVHx!)Zk>kq!?Z8G4jYr91gVUJlr;4EWDc|B2xT_JVUN0Ow zDs?$JxgNFyxuaDrNQu&B4ujFfd-1@`bd>!h=FnXcr48Zl&?}l|vI5m;c7p)ztCaj4 zcrafUR}+A=mf4Y&5p~imF}u~t;)}f&*(_fj&NtZhDJr}Za?dCm-t$p&qHWI9upapdE0-u58M;ugHB(TFVO+IWbG1FMh<;mW(h&_@N%XdP9T=&B zl;(lx22O)o0Ezu_idX2TkzV(p?Cbz+c+JwTeL6!)4e*wYjEzBR`f4Dt!ukAo2L?iP zcp2G!O839J!(smASpi3hBc#w!6=p94XhZY`oURZ*QTf$*dpUR`7!P>aQ83t}xF8Mb zz>~wu-)oJ}Dtk6~1*Q(sfx#Xt5`F$jFfZDMCkplo_+7I=fTn841oB&r++2X=$NVbx zv4Fgqs@QjT@H4_O(-DY_PXQbB4Yswv48{IfjA@l*=M_d(fU=C7ih-2}M^RTS!R0!X zW1wi(fnP&X!p)S&x$zIRkx3EwYHB#lk2Zllp!T_80>bOnLatPZynrb+iTKH{7;rqc z$Jp`>CVraIL1rm2t%^K>k06K!)%-O*%!UEMImeE9);ij%#gkpa$BO#Oe~Bb7&LOpp zrnwI$M*s?b;XJ(<7kmwt`M}RmHGp?g+TE8_0J@U(Aq~qK^^M|`^F3vf)zWn(Tu>Kp z^M0@Jn&T!3%o=!k;*y~nUH$;3fLXMMmzQtFtEgy+==BhPzb4j#fU@km`@jwLy=R|< z3cKNjD=?pe>gz&34Wm@#n`A9OFS<-twXOv~4vP1Q#MzHnVlL|mDLaj6dJ0GXe1v~y zKWQTF_@t!nhwQH=e?=6>9+4yGvx9t4a$&(5Qm!j~c{9oHRi9byi5z7s3<2na%&xb- z|JliTciFZP+C88^*1K~Fh>4M@lfvn!uaVQ3zmB>8VJMng0u~KeGLwnVOaOwyawz4c z{`Vp2y#8NogXwVo!1?w?w_;b0(!04X145E^!O{}>Z}T9)V+TwKic|~T?ZMOqlZP!6 z$~J4T2TW*Y%5scK)#k(C3|cJ^4s)LJLnw%Sc375O0 zI6;PY0Pu_I2Mn5`R389Pct3Y_S`x4ZslVZK$|ySzrin+;oCHso+xs>2fb(T#iB0v> zo8VL7cePE4X@qc`c2$_0&yaj*Yi*q%HLxp!G_l8nNU0OcEX$I1Z_+*1XJx!sSo0b= z7JS|v1K2Q+3`?dk|39 zDnOx+acX*Ay++x_y2T4m&|(=mZ%t??YLM-KZd>+MI4UftIFxvbfFiC!-fUWLRBc6r zSIzL*$ohbuO5!oayd4|2CeVO1!vZ75DU}DI7D#^+tR>)Z{Q~)lA-ZubJ3AXjS`TCE zqds@xsu36Jf<|-m8jkdJz!@$Tx}yaKZDh(V)K$#=ES*CJ!(TK)xF5oQrkU%2D z_61~=30xOYgX8L|j148v;P~9^R{dP|)BC}dsuinGh|T&SxmR6=PB2(dG4a}88Gxan z{A+$d;=-^SN_cC*moT>rB^}~_?22eVgxUZU>Nt>b*`94^FZ~vYgcX4iJ~M=JwLp`nKS7plZ768{z}78aOC;c!r0Db^|5}zLYE)NG@Bb9#W<(&n$S#4M&o)9nr##ogtNlKcMYGZPc8G!P@QWl0c zCbguMoR%m9SQtVCrR~pQ%Ld*&x^Q=l42Hq@Clt{>nEZ^JdZ-;fqgcCgK_o{~Ca}yD zG+^%e$|gntmDau&5Jrm|0Id7U)y;-hFv>l~^K^3J3rK3xgbWY&>TIY71lDb`at2|+ zG-IY8do1H&o8}X!SlnSho4w`PmD+!6`~+116%P+jH;kqR=_cLiq4Tpc`!ADfQ;Ab} z41ugO@K6dr&RZxPCKIY}k@=*cwXv%qm`A2r zA?G1;Vxky%5Z_t9Whq9L=;JDYWa4>zx;4s3ypG8^Ui=S;RIp{JcEm|6A!2 z-7wxEPy?EfjMc01$at8i0|Q+7SrKHw0zE@R^qMxs)yv2_mEMn=q(Kbq;gpcs@N;n?*KEwlxRDR&iI$rf*DL}FKM9rY3_G$LxMqx;ikq$5?Q;klZw?~$hM&i zH2L-8%F1X#TA)xs)YaF2>ZwryS~H4;S9_6KZw`LOGW~TQ`wHqZB~4Eql4dpxL_iMg zF~k9qtiD=d7KkBXgbDI{Jd~DK(vYQ8 zED0{q8wUCk_BM6tITpOc!_a@=UH3)!fNqULs&)K$E(_9hmU%KrT=Jiy@<2EZUnF1^ z__e?jC0ZrEBVyBhG;`k{5<3W4)K?(mQ9#ZXlb9oP-U#RMFtaWcw?^f|@ZE9*Spy75 zqWB4|fCyPTqDnRoq^HyPlSaYSF#np4C?-T` z_f_^#R59&7f)JZ(?E^+={)#R1NJ6fgp?GRp637tj_v~E-3QadUWrhVq$%A3~wCm_- z_hRHLbAhp1ZjTTwr^HPQg#0 z??ykQIrQap$AMDvYCbFI6reX~xw0`<1e$SH{<1i}w*Y$mu)@?hQ^Y=+=z5SqXfh+B zmq<>o4mQ8X2|S*_Y+4MOwc)tQEhp~K>)R6V(_|?+DTG}@qe-9{L3(@HE+vLRUBPbo z;2cWKM;eL3G02$0F)KUi$}RYQ54tB!qP(z$9T?-ABej-R@9`Xm9!SfWc{(ysh_T$ z2WGn>WvxWm3dei*VKFzy=_x*jiJ@TXIW8SIwp(WXj8-^|(XLC8c$Wq^!KX#i-QU20 zL1@e4Cksy9`JP8XzJi1_YxN3^4WDd4CzZ`a@!$jhx(PT32yW?Cy6to>c1f@8GdP^x z&3+IfNW6LnqAPn%rIM^}5}B_E!OaUo@!&be<-ldKGkfwckEOHCH5N-Wq662P)97QQ zoHR5vzrtMk{EpeS<@8o8swt_jjMKfRntNb2)a!V~){cafv}3HXw~of?&CQDqrT#*} zfpt1mi2xXXg zMg-U#C6`=5c9)?-G}TFF{_qY+4@F;N1-lWG@OM3N@$`?zhhwY<5Go*(Qy8^=lz5$q z;oGu};JNM;4Pe(Yt`u4wtu|XwGeIJ4X11-jj7vWGuQb`k6qLAs1kmdsk zouF+rH9CU+1lV*!VKDO0v-{_G0$hGu{U1Zga&S0bdjsOB@snqB&?xo({N|Pg}0Sa5(@*MVxo(27y})gRT);D^IvQ zgitIJ#U40!^=W8V-~~dLQS;x=vC`@p0%lV`rrAq4h?<$ymp_NAEP9jopg%?CE&}ZZ z?)D9bitP4RhH!^PY*0{;{h&>mCsa;o57Rp#coyEw;YQg{7#=(k>uQ;}XEicwviqw8 z(x^s9cP|>YEFkRn<14-W@9_F<=O!?=?OW^ZltJKT2E$92%kK#=?y*w()SL;sQ0bY~ z@=q~9IxvnqIw|w&Jd^kz=UTJHf-dW0@HB(+@O&=m!(@h|q9usb9sjfOitO0d1di_i zbFB3p=+Q#UlSaQfd2fJ3p(yfHGwP7l%gnB8;+@G2fv=w<;D2FZcSSwE)#-p-!K1y= zV&>%c^0PNsVZlIwEwPj+7sw!={r<{x^EdD2JYgHHFs+|Y21I58Hh&q3sIEp`1=K=@B(HHJIM5yA($_V`ch|^VFIqUeFc{6?YA@s{g+|xeSgxdV)B<;`1KgNzW--}V-izDAZ zN65Zv&=fiDC~70$7n*RF=&xvjDZt`~b5 zd&>?HT#k4wYPkxG-!(&_r!gUwQ$EWt==#&{Ti?-v42h87N^$jJsQ@^_(ph`uR56%j zh81u{L-6E{spo9X?6-9K#eVY$WpRyGk>H6W7MsH4vUgdf;z5vycW`C56*k=moJu_O zuCJZp*}i){{L#3$^7AlnXJj}mvntPfRzRW6;j%qyCXtuYp?NXwlU3*yNU?HCdVN3= zZOmiVTU|d0=0^FsQvaK&tsbql&O*eTOBTPLhuS_^ahS(>6Jl3s5U6K0WvP&2z8H{HR9`0&-xGs5i!iQ`RxJLLSUu{Gc2 zqf-8;U?3~M7D%d>%3D%iR(SHY3YzDwTX<)P`2A#Pb&oivGL^~FARW|W{-WP|FhgPY zT@vlu%ZVsibUbJGhTC5EBbq_J2J)0 zjSN$pC%(KPo><9!m0&LW$koW)3cUpZO62UreGcdgqWJL+;D)OS&)QL_s#Czh1ZAI1 z-uuskt}wET@1&qtG`_3gDU}ElFvU|S+@Liz@tU>$&9auG2&D>|X5fk2a@;}6u$O}h zZ)K8>Gva(r<(49R>;31T#lt+e`e_I)cK@sx)nDnq&nG0Y<-AF)_?iUBtIf1#H zoE#&bvu{G0*e>;vPOl6sXUW%*iExw#>g|&W{}JM> z?N2%RphbS~pcZYTWD@`s9NB(R<)ttJ=%vd*p0Yg1d%d93^otBh{qz-|BjzyGiChZ~ ziujBgnQ3>fI#7^-%BV07`u8poGX(}=^t7IZulZ00Au1M=kckT%Q5C;83wq$0jaN8k zWgw%YV-vZaU$wlh5KGr!hycP$-Q?wKGvP8RFB{R8e>PKZDU!RL_$*ZJtYZ4tK={pZ z^7Wv=aTTp~-#GWqm|>!RnaT$s9;nHv9$8Zkw(UTrO3+F>iIK5TNt4ERx|R3us$?|f27AlruV&F8uHmlY$2lO`g<;loS5B# z5uCzbsrGzGcu0qw{5?!U#>>O-60R>${@0uj8S$*a8IyT0vXTOXW_$ zMLJw*b~_5t0R31!qw`!J<1WSqTQotHI2a|(dy-_>g>5C#0o;zjsC<30tnWTOawcS+ z&+u^^tXeQ0Ebh)q4JL>F;qdHCs+P|4mL{w;xe{+5Uj`bQMj?vpE>|${&R~fY*?m$N zfddW;+K2DF4<-Kok_ShmLP;=Qzy~h28jLL@*CbBBOD4P!0#XF9=FtT`xzvucc$hkig@4f!8`<8=rAb0>J zNjpeVl%8R(>%mNS{3)Q$7JMS277Dd8DCJ|q&TDjsgm8m^?krAm=Q+o$<8I(DPf?KJ zfoZCc7OYu4(ezzl(re!2GOS0L&?>h>2G~9>k`BV>nF0)cV;nAHljm+&*nzBd5pasR z=wk%_{c=**KBCWjGBI3X2CK{}CwT^eR;3d&M&obTdLi5>AWMikkvV^jN<;njoy*MQ zhkPUpR)MFGk&ZO>z}&~Zi|jGsug&xqz2}?IT+!FK?HCOLcmLpzNh2RZ<3m^36jW-6 zLoWjEO%Q<`=CP5}46s&1of30g)sai5&;^^t1M_TwD@x7E2#bD}?la-9+;JH?o_ zaHEt5h=J)hfQ)cZDCy#Z<6tD?^Ef%5lgvmXZ0BZ+<+xY>ES?-}MCvay2bBJs&9B0n zdh5C;aSwnA6Ii>79O9=4^Rv(+!UGZdZ$C+Q^rFteH-yHLOB+0XvhiK?vXCjW3s4j| z!Qbs{uN0h9FCpgc<`JbSB5 z)0#TwHNp{Si_d4W4~zN@B4vl4O1`U^_ zxIQ8dkqwd97-+#EAq0v*OGb78*q}j9ZKW6>(?-=q1e_K$ZbCereAW|$bCTT|8VZpW z`T`pA3-6uaOBI9UhhFiv>@_i414g+ewK&pG$S~Z}W^4;O?2Yaa;u!=8lHBDkEm>|c zB*lNd#sl|I7~fIARgF28frj%N>>uP55WZW-Pr7m-XJA+KYmamKZXC^6Q3Y~p71J3L zHYaMB0=0_6;TU{4aHC2i$!fsuY(3Q(W`6KSTVGek&?qrFK`8EoT=l+;` zzAl7DY%%Vvd_K~Jn^+*+O5|JORdRw@Vc6$y7m8Uh_9xD9K{`qfO2KiIvY&ziJTa%N zK|<-cvNvxAL2f-qT39^74sJxmmo7aJfDd7E_ zZ1kXiZDim@x%n{4CTmPO@Ua;j!tvqeuG4+muMc>uZR>`tKHi4+%D6836dFYFHrQ%` z30HnJ`v7hLxr@$s16+^m5OfKNznm$A4r4F`SP##pO$5*-VYa*67h!Q%%!`CJX|4ND z3c0O&y7|7(6Py$d?QhvBJJ)CvAYcc1F;s&g4%JT8*75G+X=Sjc%!1AoG(jzn9bDZ2V-wq_L8Gr)v?_~LN5 zKSfAmu=wh%PhH78Yz`wO9PdT*3n z;wwpmojml$E`W}9l05HQYFXS+*Bw)<(u-fqTtE{HbcST#uNyZ4jR1PD!+Lkyt|i-I zUn9TmqBZykeD2V6PLg6B#?E!Yg$;DG`A@PykG-Cw@rxcQ3#g@g4u||#n%=`&y}6pv zbqBbGrUje)@l(ATj~~4{bQKqyvw=ccw~EBX(?kv)so_xkT~UegUH)*;K8N561h$cJ_8dc4>jEkLBNAb;fipwt6jY&DP-wV+ z#iCiu#@qP~ntoD!C%C-C)I&o}PB;nyhm#oGlC$t?7?uQ%@Wwd=#INw@-MLSg|M)Ye z^THmkx-pJaC>+ z$*2W@L})La3za$#K_T*w_UemYLdQ?1PndxLBm>v587{6qR1K_#J6Mr@BTJ>NI_X^* zd|c;2P~FK@M4|J^N~he=45!n(`B<8C{hZH1HGvy7*xw$AjG4w5a=GEvc3j2fY1;=b zkk}6_F##vd2Aq}P-4c%W!@Gw`wFdl;t{J7NL%m4@d+ZOkiu$^=u9qp2XN|L%n)hZHr}lA(UO#~Icg#wbh{*}+T@I^D09^EVN^k(O8Kpt2+iY;#zyiD!1>SlZ z6XGg-lE0V3#k3TE)UPXfU5gH>Ohc~nG$?M{mqR>M$<4bH@>`I>5D#F*eToWjLI!Lp z7Y2dA2vYo_ESDK^z66wM!B=8YMKbu=B;_NyZz#^lP?>CT{(*1q=zK4R+uf5@)gD9m z@L!0|9UWA!mN#;%p|SZ303xMU{~Pf8WgT)_Yx2aL1q50&wqqSonOB3$;O>S9%A=F{ zA_P-sveXexn!lSh^3ISJ2r+;q)vU?;25#-j5Q1A#d2|M?{tneB&32?G7qFX!m*S!i z7lFlnG=_r^CnYq+m;IkV>1<@-lLifaH)*DI8x3{gk(?O@<7UWRiIPe1KQMm~|DestmD~0e@}4j^ zbOcfo47$DMW(fE`?!OOrkX2uCVt@yHLu5L{+5@6p{(Ah*`KTP#&?`;2Lym;{n{fYE zuT@%m>wrXlSUC^x5*{AOqe)Wa59uL<4}OLunE(D6G?oYXRS;Q#Q5g>(XFPEf9vM7N zYqg(cwrT&4=J?m!gw*af73AkYn<_hZSh{O=bNvWu9ZNL}vRh}|7QUQPtPf)plB z`SeUk&3wv&pv#n~QLK4aDV?QnIkA^{XLIw!$q`1CHRQaWpiYt9uP9!&=hQM=jw?gT z@t_mAOqD1DTy1I|Z4W#bP@-dr{PhQxBXl9lXV(rZT|+z%bxSulkCdaoiR)^-NEo5G zwNKo!*)cQ~lj-4e+Rc-XsATc&p-Y30#7YU6$ZZpTAVlRNAXZW)<$sVDT^ZJ^g!!SpMX>zWH&a>X?{KtzJ5_s&!Uc1erzjU4j zJ<_jdFDl~mJ|=jMkUyJ#m%r|QJSys1yLdp~yeo!~IcYC=s;0zDHDR zfHI=@fn*FCg-MaJZxQ%Z*qmq}_t&7vUY0=tfo_v?PVTUHYn-wI~$pl^=idw^U;ue_6yNkM74iE3B z9ZAcPrSwJ*P1g{=FkuNNUvS^5@t#S>B9aT$TC!s>+;_EyzLhQ!pP9W9Bc^--l;qw91JO ze<;0H(aSNycfLbnfKkqGeP6a~lSOxGSi5#`Y;g>+|NXbZmFqNP%9HJ8oecb3-HlNN zPrGI+T}f}hdt$UT)pJZP(43LgN4IgZ%E-KMGS`-Y9x3(Wd-IR%#NS<~3~CiZQen*t zO$CoWzgr%$K0p8WHldJ44jcDrL7Xoe4P2Iz@9TWpv9Dpl!AP0x%a`lmRRsAZ1A3${ zbg_3SDI@UMvuM2gfh}TE%95G`whxJnHZ1`STyDQx=| z<7?`)#Tcwc&y4GLR^KAy9_1edZp}6-xoo<8w9s$=C zZY#NP>YmrmuB)3A{MdEz?n z2~1y=i9cEZ10qxaUP-j)m9%Rha3!SGrhv-aSaA{lVIg2ll!oTbW(Uh6+3NQ&mMtva zuFJw^`I<3e7iyt>8AYXE)=w;ZM3iQuYk^Vmqiz?Ixgnik1jo_j z^zWW&tQdCPMs<@A@e7kTdaTE#@%W!Nc;{#hGjPDtB((Uq$SUp9kUkrsK;RbFSjgTAh@aY`S)BZrbjpjnqIZd+62Xd6k?ZNc6YA=59L`H|tD z^SB_&{kG!OxuD9m3g4g2ZFuq9RQdI3WwEr*11yRnc2=biV0}%oK23C*ekY$~iLpwD zu(_)$e0Y~P{9Pg>5yk{oe#auDQs%QA4Xd*Zd5_v-@oCIE`1FlTv@*QXkIjykZ*q2v zvlrUPD|N~QZ!B5zp$Qo2tETIPB_~J6WJb4crt-B^kK6ru%^bA6w-goZep}_R>on7= z9}&(vnA$G?B;H_d^~q8HThL~K zFA3pf+8P@e7uK`63n1ls@f;l1Iz}6M0g1nV86yIig z_iQtIe`2Y@dgyj>0@Y{^w~d;>5P)44v=y#K`XP zt|mG6S|=x6=xTi0&n7sn=h->r>RzLgikDDDc(*d42=CC}j1I3lJJ}yksUa*2%DqO0&s%wjv#9d z2nU1^9Im~1yAW>~m|dltkG$z)43Hw@i}-8hFe8T$BAt7o@4Gf!*|L$ttQ8w3r8_us z5fipw&ZIr;w$PZ1ZTA>N60aYf`{&c7kr_iF9(?cf;hq#`db&}cPXCV_R(p0?0$IlF z@44#k1A?|*9*%v9s*M*tR8Q(zHw;rR4^Jj6`pgAGH%E>K)kS=+o)i&rcv84)Zr+sZ zrgc%goL*o|BpLoQ9?)X_U>XQ>Toio~A;w&tSzPB`69>jCZWm|GY$)vg? z>gr?nebw;(TTvaGy^qtUQW)-1{kIPa&=c~$>e&u<&>l!iS<7(hL=7bGtUBOjCRgnw zmLyk>2s_cN&7k+kN?(d|8m|p53EdJw$4TVTZ(9~cUMP$#=g7s^3Z3)nuT^D`1T0Mj zA7Qje492<++J?K2Y%VJ^840|FOj*MjgS|gAPAImoxsT4hYv^C8rSdVhoppVE+wRhd zllh$A);+cM=_K2_lARl*h4F}OxAMI+PF|Ojo+Y)TD?@J$T2f}sYx^~0XCe|oF`gK& zuxqJv5+W(Qr~eNDSZCW`_Z8wyVfFzp8L8S`h&54A^P2Y#5%d0sWv@&7xTtEt>ZMND z;J8wFBHV=TV|z1$?Ee~b$Nmq@eWx&02c>V_wP;_(S?^ivZx8=|G&qvoqw-UmD3rWA z+U9)d#-*bgnD!H`DW}J z=LG@FJH|&#?3=dNcM4o{McTrX9bb0cXFg>3*Ki=PTh6Ff3E#fseod(7#LYeCM^@U8 zZP$ZTF^Nj{f+jOmna#hC$y!&tRt?Hf#4&}s8k}SpV409?-FZcX-NgsLkuEwv0@>Bz#oeu)5 zd!A)Ef#;dM#Ls)aZj6ks`|6npQT8R;bqM7>R`W$()@%q&&As*UjxQs8e{OTGPQ5)M z7kX(%)@9KA<4d0BHrLRcHp0dx(PjO`(n}2AQ|WCv&~T`*W6a~_xd&_^RZI|sn#<+$1#TrJ;Dl;$4!}xrxE73hGv@P zO50tWV&NL+%C3K2XVQ2M6tT87@2y026Pn-l$uwmZ85qcvXv)lt6Zl!!p~To!#IDvU zY8U9`J98-F@+Q$DAhUFJR=z-@D=en;?sQCM66ua0ReD=T*OkL?-eY6cW z2&&}1@ao8SFYDBS+iXr-DM(Ej4w&@^&&lsr9#<7*{0&qB?&QByUQrVLNg0b#-tQ1f z5#JR^o?=_uD9e)TS#dd@vzLrDM<#bYdXk}nxU0#)T z87;fe8ildhLsPj&x>a`RX8D}Ilcg8eIF(Ugi+HN=>T2Yg;*VT2ta6uE+3;X^U3SYX zwWfJhnUu~RC{mrdnd%=l)XLUl!y>w>34TAyAAHt4(88{|sTkE4<~@u1#OzdQC^XF{ zS|c^hSH%;m-Zy&z;GBuecP8gl+){;7;ORou>~g)2rIhkbjA7^|bOZrTg~X zzI8MsB}7h?c|h}msuih;re&f5hkaX!&)nvZwxfdjgl@|p@dwjg&pgW3K3BMUU!0n; zj<9{pSJ9gmJxh3dk4-WB@48L#I6{7R`(m!fR4dgjOHsWeC=2O z?L?iy&tdi#OBKtnl7EKig@-mKAk}Vw7DY3t9PZs^dajj>P2-%ed$QWrQ)4jro+{Bu zs`g$AGlIhT$JnY}-bv|zOblEkiP*m@G^u43?s&AVR!T>B_F#P`@Pqs>%)_^voSd6B zqSiPVL!XD#ixJlNc^-$GM^(;F+^Ul4k1Sr040V3fn&SY>&Ow z!lQ-ZCBw;X9aA;3*`pJxr@wK?xb}=DEaj|7q%1-2gEEtHSJ2t+a_ym7~mf;u!jb4GaP<5aL&*?SGMhwU2jR%9p=`reJ~>Gp48#8 z{&2#xt%v1L-GffJRCP1}9Y?gxrX*`A?kY3z8{_p||CGN^e(q?YsZsq?m{kov`ZHhh zDi&=NGK1E>jNZo((sj?YkE)V@kT>r`o{6{Co^zh-t>gDVxf9$m|EoKY*3o+db~Q84eY+!WV|5YhAsgmC<& zxyr?!>O6)P>EXraE=`%`9tvWMKjcNqwtlgg*;sUy_|3{pPfa|38Oxl^TxWJSH#*Sc zl>xPk8o#O6+6T${=4f|Gez2v*@2vCV%x+A6f!>PQcWtH5x%{Ak1(YPkHIa+->u<~yr1h|kImNRny{>)w$Q)) zGF0!l9a%$j<;x@*uI)SFk%bp~OM1!Jh!@fwzN6Gm0hOmg1a<&;Nfa;lO2w^%j#H{(Y`!y;G%nHRliKq z=Gvo{>JXJHzn==WHNcH34Va20PY)^M+}*M1)>>-0t_e^0iMX!6!1+?`qPu;>+D;N! zbKkUDdoh(a?b}(hWb5YdQT{_w&y4`-bIpT09l{~0yh#qa82(zR8GdfV4 zp+7YCy#1S_(p|-Cy}V{ql(zm_Ecm?so-DwRmt5LAo@|nq^!)6y9+M_{QQ-E6tL#?k z*1nf-e{WsEKU)B4`~H7{U1MEe)rnKO$`?tX%w%j%E~I?_56EhuQ89f*3^6b0G=^l8 zmu-a8UM;s(jRDRWbEg;Rc3K+WYu8;BQ-D7_l~Pr)OB`ied|8>GV7AO|ceJq;6n;2E zd-P_jd)1^z>CgRt(bTxK*G7(1frorK)K#9c4HcjR!6d7N4k)IKGAvt2wHbmWW z^-83|n2Gk70bbuw7Ee{^$%o#KCo`TVOZHj*wi{d1a5(@dZ4Mqa?QMTjs+vwKg9>ZXjcuz+&wp|Q%(*F8O_)YWNHn5*T{k4jAgA;M@~j`xNvzr zT2MPU-pQshxuRy(YmeCe`-|TcBB9@D*339!!u5KTsDHdT`QSm+Eq#}LGU3E9@JCYV zwr*%)sG3=8-Uv9tP0)fXi8(k* zR9hh}p+ztMFq3F`TxU;@r&~D>Vw7q;{=8O-T4hn2NWI`Spe7I#B5*BM&z{$>8OeX8 zYBi`@V$x^4zc6C$8d0Eh`>yrqK%myrx@_`YoZ~jZAU46U+uBdws*M7?{s(j-<|&Mo zRgVr()cZN6{>7749-Zk1>726#OpTaDbu^e1tCbL5G*0J600k}_VzgMuAR&dY2vvG$ zCMtfPcSI*(!gEdI9c`vvR{mzHw^HMs7u9_Hx#XC1B`%^d^|jB36mJ3gb@qViHCKpvB^TjRw$Jd<%|K_@m&)$j4gAzU6Y1h1OT*0pvi2bSUK*?t!-S$(J6 z)8xFRr-JM3+xAnbO>WX*>0UZ%Zee!|1>HYWU-{<@gjtO2k784Y-&XIZ)|`=^4H&oT zXD1{w|Bg3MB5!56$`B#9bogFDWkah)|F-kdmwT<6>sXF$aSgADiYkaX9QIL`T?SBJ zVlZp;)@r~Jr{{2{(%d2a(v3>`HV%OGin`5d0{XoVqUPE%8Hygh33Yj7i48U_>BYjS z#%&vbD@icuyvq0#me`5#C%w*5wbHpE%{cj6JDnt#4!@SwJLfYq*<-D$_ftO#?-;)E z36-haE}!OP)>Y$8ukak!9J+p;BTCIo3Ih!v$NwO7O6gQ(BrvBW&mBVqi^tT1% z+lfB8pQxpA{rTnrS zr1~~V+`MhuaPk6Fl#KsWlrL`ul5SK?|E(wsUbbuH3z0B?5uL8w*|XnEiN_#}u6Mmu z>}%ovt+6?ITr{}M#6eKONZo!%B2V;p$-~PUW>kg7YEBM=%Kc}AGJ7cfbrhKgDvG4j z9|h9iIO5>L+ABJiX^XIw!LLOPAD`=H!F2Cg4(LP2b^ZiYSd-!of*TgR0f^VB`dOkI zB!&%T5ji(m1LAJn9|{p@(`(o!N4n<7xD-c}z8z&0l!Qm)TK|F!DO*3XD>CHK|Ff$g zG;8zr;$GSzz{JPBLpen;Qa?RbFB4U}pb`VSL4ghOPjZ->LIJ51zb3hrqm3^7_Z8-K zo|&h$)LHVf#(Cx8Np_xPaRfHWPWpF4RyaG2iQf*8Z)^z9W`3~9xRS-?#M|$6 zP(#LFV{{{73VPLNu~p%3S?x}+IEW7y8t#4i-Bu3e-Hx@$vL*f0#OhYJnNK8~d-VeP zUZPP>kfOfYwx|72FM_d$25WxxwexYcUVNxvU7Mr8$t8Mevz**q(ac^Ni%T!;6TBJ9 z`@fx>l@n0tY+*3{`jG8*@jzynbfZ`XIa;I~*GlvDeA;^k!T!u4=y)z&J2oR4T(V?z z`4Nt2_0i1*Im_l2!HDWROZEgsn0{(I|Dg^O))_?-T~4LWtOy+O+o8&xsE?hgQDmxb zwkX$0;)uIdSl~5FWbY06?YHkTSh1znO@_=tXimu{@;YBXN_erD;oWKBh@MWxMNKXZJ}ns2ChP9bvjLC;48K+rFK>8#kXJIj3Z zi=ZIsX^qR_^kC=TCn+*1W_&7KYs$#xA3wN9B*eV**?{~81!7>9r(!Wq;H%PBiPsPV z%`W5b3*rwG;)ws%5Yq>b*r_u0k{0OY;{<<0=Nr!ajVyz9pWg!C-=U(I$mzy|9o16x zShN7%L>2AW7CFCf@gDV!13r4=4I#!jC~qPt$VEow0E%}282WF8$Nz)M5_%l6b{++b zQIVys^8PEfeHJ*X$(}=nGbz`v(`?XJo8QftKqGpdd`cP-2lVbZeyCA5V}%U&0v+>*AU&TotLhBGU2$GHSi;>{MlCQCNwTABBYNS zZoU27@9JoOIZ{!ATU(fSH_;!p%NAun7@D-b>tm6e?=3fUqiS9HTy$@iACF-Z%T^}4mQ!WHjQcuFQN7?lsxo~B$kaGxGX-0)8fOD|RM z7h=r+b+dZU!^vV7gRa;9IL}LOgzd5}Ui#@mU(rC46IS@=YiiM-o@Jb> z$z>RM>+p2Z7JuvBh^*Xu2`|t6eL5G(r+8;9d>sTCCFHv?jt2*q_&3@d>gg5rlPjNx zurXtXWhhv?)y0DZpI^ya?{gZjuR%C}=K7KQ+OkbX?K``gSrV?1q8cJAmBK=%RfaOU zBWtGcG0$9yE>Ew?Xl;jko^dU=UR})EE!am#{KgvEXs5VFCl&55BKZV zeKY>osm(9@qVgNh+DUQn8FipnD)iO3uqJQIcv5rN>xSJDvzyM0SOje~EXpp;s&EkP zxFp4e>0L860_n)-Chgk~l4?R})bX&aAz@i_nLY80T;p(ibJ6G0xKg6m@8@>XPoHO^ z(vhpX&D$Ghaa8HI1QYM$lep03u6F7bx%(TI=OMQ@Eod8m{DM25@%^c*?)shI+M>$qs--Z$gYkm6dX% z*;5obEADbaW{t3qei8C%NiX$&m(89BO0N?kZXfv|D!&x<#GH}vN8}S9=@R>a2gbRV z*bV0;qn&46LUq-3L4ftA`_AP*S6OlH0}9k4)<2JMiH6&j4oz@05m`&`e8X@r(~|Y* z*i9~%^3IH$5jr?}E$Ul6r*Q##6wr0y|76)_suPwy$|yBlytBqpGFk5*A~Z_8Gt9T4 zM4CiVZY zMod$+t>Rp6EB5>y7k;=1V`&;zOv$eb>@`>Z%~sf|;_A*y#n(M{UBEUOf2W|Z!G*0I zN{<*d+zj~ezpPeTTnc_Q%%Wv9bxN(f1>+46E(ZCFvU7f@4y`sdS;cPXcs3e=mMN-N z1skH>A^z_uZ!>P~NR7(4eO9qNrR{-sGzHSC0=IvxG5SZWryj_Wur~^DtxES4M-DGA z;YF0S9LN0_gf7p^X?eQSRI6^%EHfu76e%x3@8HLlTlqh-AB%V4WoL(+aBtf&{TjuI zsQv4@TTK@Gg%?LW7^S~2lzI+ezUh2O&G4|p=Tn6~?y_Oi9-QrtN$a-yMq@rW!P$6b zfyAsOlUKA#M4Y_$M>Mi{Z-uHL>+k%wVo<#RVxxOD;nqdHZ%|)MgxgQ|k$*CbE7NFJ zM(7qNMwN;RH5DeP5aE9~sAQyf-lE(;_6mc2G?1Rv_t>SLZsbnw5Y9%}fk#Hlx#o4K z?y%b7wEd&zVdTvc*M;72I0~8@a-c4eQs>~-%EM_fNY#V}^|i_HPb>^K!&hAekzxp`iG7wMP5%=R9$1>~?;YqE_}oDXOh2H%+mi(`wWxuW4`o7Hh9rv(|gA z;g&lulF^a}N+7=1*Og*~E%Aeu%~b;v1ed9|44RmCllh=!8&@{o#5N<6OP5-a^6xi> znzUwBHxA8PvcoO9U7U`Mc3Q!)UY$`oy$d|nvAW(rlP>qycWct_<3>ewv>+N;d9o79 z{VFQdFxgJjrNhgxlejoJRmML?!l~h|BYDkPtqXcARH!l)bBLM2wG>RwN@#} z>+yx*DGztg&H|cYZ!7lPdWs3G87?T?14$gTg=JlbLwWSNlVC>6y=$RgLd{|Ysum<1 z%XL8i8k26pi_m3J@xIf$?IhHe@Qs5z(Y~^Dqa&E>f(wyar?%8hi;HXGA<43j)N*}~ z^Yf$Ur7k(7yr5hs|73@H#h2W>5(W+7fT1#7QtSyYZ#b{WDSF`+9=jFmN*so#`1jJ( z$|tL~UEkJ@8|B@0Zho0woXRA^4wbqK9Pq8$ru(0NH5CnF3vhpxQN>@HxjAz@>(<_n z`=${mjc!(|3v0S=7_{x}piy|~h@8=L<;NaNoSKI{9Z2Nd(JEud-wrB;pC?6Lh`z_u z-p=7yGVCVqBIdkPtW_fCS;NxELABmCze9n=%GQSGtkD;;tdFy|+*~mVDmyph+)pV>S1Z&qsShuHVkeb4W6 zj9J;28%o;oH0^LJws(%HB}eL`VVfC9KVjX|o}^#$Z2|PTZM6DD=9sa|+V4cj3Se3S z*`P=-)D1s3GfNG&P9=N}O>s|t@+}!H;Pj?UAy61z$sx_;m?Ew>+p9QiBO+t7ht7{y z3N)*E(zTX1AIM@$&^1cPNyLAUmqJbheH|9i`gq|?W>nCmopOX)zms1+vgi|ck^L>qv)lV-`m@BJd2Ag`T2^ZX1j0)aWlF0JW)RdfIeKNkaWf_kzYZ-}? z^)R!nxV6H2*J*WdB2W0p^7p!SReUZPno|t{=hchE9J_f;k(Pv{Elkr~ixU4#;AO#O zy(N8mY}nS&`O3Wy0mMJ8?uW;6uy8`fgm-lcD?Ak0WGC@)XvnxXAxw**ZM<+c#?N)0 zYLN*9Ylw1}@>hXEPb*zE{cw|kW0!yta@eZDw)8af) z|1NA>8NwwowV*ggD+CU*%9nCR=9HF-+X^wI=;tfzREnid;)<4c-FoIalek=DiXQWC zlKciCLCC^jOIWpEQkeLmE`#)%*#ZSMlzIbeGj7?&;;Ji@Y`mJ8WkhGgv}-0_`#Y;e z&kR?{<>$zqOdmi_2Wc;&_ zp#o|4Z~jiTzA)APw9?74+UGUuC?$5_(B#r@ue1)>I^~h@AiH~B8Y-og)70m8LZ`Fg zICjlk+uF?~W@PQtEzfpxO^Z5P)2B;6FgTsWP;Ol>VVh>OCvAY|ABC+j`@OW4@8j|v z#f!{#vA;0Q@?@P6yZ^{sqng-l_;hR2A?U7mKDPP?tgN}IsD=_-bsdS%mMxFF>>gHW z>X#&-7M=)hXWUZ4blM$%TbAA>WMkFVoCxaW#Ka60q5@<0Qy_&4`nW*$5d+z3Emn~@ zSaOL^{o?xalnqmFwK$v9KLrsyQyp0L1Bise^kdloK5yho$1jHwW~;%H>O?r z0a2(btJAu$@afngaQwZsMpii!4rM!}B0F*~wxWRgyn=?Mco#8uJ)?MGxhv6oAd3K7ijZ66g@$h-=coOtvvG9En?yu6~bsMB_y z+<76i9;N)mey&?9-6A0-+^R>)^_zW}VIC{Wxtk3(lTPo!ek}UIzIFl;6*QycP3-?gDPU9_F=zQ^aY8ZEU#?y=xj$ z=OY?A^Y~r&HbNhRMs}dd@L8cUJ1!@2XZA?l6hhaQTs@*uUyt@@=p{SyIo)CJd{zr0 zCd73v^RGI>cDoVlDv6Fr;m0KPQ6i_y>>0FST8nGE@5w;lSNMLDLMzi6TszslaYwuT z^X4Tru-f>09FxMFFO;+N(<|It#v_a|UO}}^L2WADE8Q66Mq3SYrlEo`rYUyFNpM`{ zo$|P9`*l?Uauxl^uMaDFXGI?6+^tR4{C8r-to?G1IQ}NuD9rB-U%9KS9(!dq0zcKL znS3{UcWuQ5r~kL>$de~pQ>F$I$qhk{OQ-Up%avT)(3KV(A|lK}O_%UxXOsO!X{>_> z7GHZY$`zzVsy;)RNsLsE z7V_9Z5QE`C01(rZa6F|FsA$re`~qQqrHL1j*0sa>B}pZPCvGw7(e#s{%I&)(M(+js z$Ub_$EmJm9<^R2svF>-UQ+v%k|LLZcDP-o1b83nu)lv==4Vb-+V6!V(RsPIX?fy1T z+{WrM=NGrHH&IdfQQF;Km*9Ni4OXUD+jsd*8fxxy<2EJeL2q?S>wMS^N#WoP`LQ_U z5O~7K2(x;8)~g(~Ctsd@hB?@;EdIrW$!|iPO?!)ol&eZMGu!$lDv}`8_6n;Mo0e0W zvt%NEyOqVMB08;V$Ys)WhE}=TuWXn8Pjh$VS3|Fq=mQZS34Pmg(Vnb09d$KWE6C3P z#>6MX8)+PRDP2pVz^p~CyV9yakNqNG4-5_jo;>>YaDe4<6B-wjqdr+0F(sSS>pS>> zAjYlRY%XnhqQ`!|rMj6y8)awP8S!Q79P_+0$P08m{9EoObDMdLwB;$P;(h$HA;sFa z7YH}Wk*k~3oThabd$C3$Ru1l{(!}~nA+`LxcuBiCnfNp!RzsmN9x1oqReFgZ$*zCw z_S`YG47{W)VAphK-&`H<`iS0}Y+ZL?7IufSi0VbOC)%bRYb9>p`VvKQFUVs#7`yz& zHA$87U7Vm!r*?s>xIvJoWlONx)C$e|v_69nKLiu{v6(HYR@Q z*eNP4I)vA?$l(mK2BL&mW_Zq=%rqJ%94BSk_Dtpr38mTlI(6Q9S&xKOIHQMdg2sI6 zdy9#8q2G3&6Gt3-3cP5mGvOui)OMK5*9S-p=W6P|%GIG0Q=4y$hubNCu&Tr{T^&~L zFVnL-I*H9v@t*9G8xH--JG0^YmvQ!MB%R%H93m(rjet+ zxE{(P`Bq9Fhd%RMl^ByK*`w>%R4SVh6|$OjuL#ng9lEh`T#DMK&D00#Y_BUHw6OcuAhTcL{ zEy$YQUgq|CGQVdAoExwZpQDO};Nv94Yo7N*?aRPW2?m40)vAZUg#akwvI9h}47Y3y zGyH{8c-#^MQUbUuC99`_kpRYZ8ONlktL%tnfCahETemT7V}G^8xPm{#1#1^v)Zreso_=4+T%-i=C+xWw~3svf)q2+^p!zF^+dBw)%;M$YyZDSl9t<(v{#9@Gd5=F7sOnayVr5-Z=MnXZ#s(wSc;J9`lA!f{OqeGu6`S1gM`n z!@(2WE(EeDIpkAZ{n8EeUV#WMO<$fmh-tcWn(Hj^iBm2JTPVXYfM-X|dru1>>>wZ1 zgHU6!313LNP0$9fZk9o*kPReY$?k8OUIyM{COoBswC=B)kgY}&AmKc9&SNl9?zI0w zehY*pP@232W(&vj@eW^r<9iq99V8syAjzw*uNU5YI9#y>Q8H70$4UZ@ULlKefb8>> zcrVGP`%lCIUJ3_)U{k$9NoytT0|P_R^a>>mc%Xc=L9|0!t@>c~Cu03Ns@6%Y(JtqF^8NcZS@EC2iTZ?ot>4@TNjd$`+=56GngsIlt8$6T zv4fSU9aHxh3dd`9WL!pz z+cgWi$=1Vp=hONgE5-DQSe-cky@id0Nk;j;FRKoj@cxG)wqO_$^ay8f5%nwO8$Y7e zDFu@ycWlCh?)YF6e)`)sc!&@5F(f{*{C+Gc@BLCw|GB@_B?AyB7fwcg1GT&$dDRXj zQc|j$+!B}jrJ)+&jMqy}2F)i@6TUt0fNR4@ym_tiVkDn>B4IYfKe3d2AYPCNxu%>`hCjBy}nqVECHflG1o-M(TH5bIPG?l1)Z$)Gxbd0z@77)Uk)baDQH ze><@rkPPdLH?Dm60B-c~HNY1fP!|h;1jH&{Hdek^by~i&+f{eG59?S$t{I>- zeQ^WsWJbeV@Y6ayx>b>$D$EB_9%?X|e9vx-BUk8*vydwP_B=RdFNDZ z_Zv{iMLX|o*cDPh(8)v~03vGA!4b-QhVbL}1E@X=Z{jf6djZeD3cFT+0>~_SCRm!v znwP2zCSowc*~XCj`T1=Ef<^u2b_*n>oI~d$Uk0c^Mqc1MN3f#XdY`yM+XVonQJ`*2 zjE@7o03Nl9KLv-fiPPBFn4d8uR)C?6E0C!1#KQ{+QB`lsb)XSYU)D;6EGw9#KDEfb zp#(=G>4q*95(LWI(=Z?oQL^echsyg}7akqaFaeh0F5j-wJw8P$B+*VTBmqxFFyAnXww;lna-Z=3GZ9A{~@u3*N zAhGnW>|P-TY{QN8^H;UfwIFIK7p@5AsQ@u(8FsjrG8|a|8t}kZsxtPN8@OA-^o?;+ zct}|QSElzeTx4e$P0tZ3=LL}uPyNa7qJWo~w`l{n2%<)H8wHL$lL%H=7SKSNkaUr! z%1rb*$c}$?F!;LlJFTdwCZjw6sM2?uWF0sXFc`dmX~;DyGJtZW-M(`IP*M&nJ2rMF z5B(gkI3QXK9NO@1KuTFWekARuQ+qj_J4~&AY28c!93ZTFg~C;CYj6Z{8{EBa)mN}r zg@IIOVM)FuVQ}&p{#{aUv95RckLyyaWqxk}==y~5>5^B=9f;;JRNwzSKloco+m*il z@o%3RT3gw(@`C5DvDTS{WzF@Q*>#eJdFG*%222*hdopyg`BhI>8;I9m;z8j=?@zkE;5vz9etzfGW5)#t8=JQ`S^7)JxvMWI zUrRkk{8I9nzx@B?_ibqr0f9$gk%P+PdsUps4Q*XrKtE|nrR}CXFbj95ocS{QBR-O? z@Fc;Ktgj>iK`zO41_FW@=FTGoxy1kX9|b697`i_=93yzf?sGliDzkuyh{%;Iy(1(1 zu2#){{x&{}XM8*?EmQWtJt+JmcERa9-h zW{BE*1?lUqm^$e=YUH&w@iCc0I>x4P-Ll)afB*C-2 z&AojSfz;OwG$#owj26LM9H)w#Y>q&RsLq&&x2n-3kPtkJx}NX@5I89*DWcgQfALfS zFs5YSAeXGJu5NB_Zezp6lbU^9sCjhc8^sI(L8PMUF975BWWKYpvqN5?2e@khQb|e4 zkWV*rFBTJAT6X&$d^Q2b8LGd~Y8C#=mxDFSUB=DAFm$fByP4@!6ROWi>T%F)^UXJalur`|9sMa7zet65Lr{?FoLcORYKH_k= zz<2MgpNd6gWF*x-OjT=D6uPUgm}GE~9iE#B7X;iWyJ(OS9tEgGX!(X^h@OzHuHxxG zw|s(#2r^PcQY}xv`X&?aU~PSSr=XGN;6L)YLqzaJnU$5bQN}Pn=AYZ~_uV#j3ck|= z7!%!Fui*#o-WH&po1H~XKCZ~f;FgjqFDTI5;eYQD#qNX*D?E4blmN}C?^SI)v3-1K zXb4E#RnF7F8^+A*LQ1%l*%n`q+b<;vzIa_vxTB^PI4GK@>28#>`cp3T7=ek5ggev% zdy@{&o|9eFVT}g2+G}jgN2T8vV$S@vCH@TStR$5k|P9PJQ!u3OyPIn7w|M4 zAx##(=29hnc{2mFb=>(gKJbBV3=lM8YHAvE1xC7zFzLaAQ#rV|Uc&!Re>6KgSdpwk zK=3}#1BEJ3WyK>ZCC!6IIEk&M{i0yL(1b2;$jg6I*-m+~UfV<+PB9K`{yW_<8c$M1fy}P}RCe8dP z@qMkl8r|Y-d%W&C8i_9+6 z@a^UP<>EMu!AhY?ADUMJW#(hYjqu56iY+y7?V6NYz3h_x+DJH{X`KJ^+f`HDEfR%V zOqlM1V*|U|rz*_klCAMP7bdQ>IA=qW!CY!ZTJ=?Z80S#OR8fjRiP>sXa0~bCQ;yxZ zCu`H*uCiOBae*UGcfR3=C9ecB_-$XzPEWUf+6hFo4S8*OZ7r=(1^16l~5cxd39K&uGkpV(G2g>v$M0)($ccB5WsB) zqQvaX%*^cU1v)ym+L-9*=$IHt*5r6R+}+&`%T!m_I_Yc5-wXIPyASX^5h%*3-psyk G;{9J|0>jq; literal 0 HcmV?d00001 diff --git a/windows/security/threat-protection/windows-defender-antivirus/images/MDATP_5_allDevices.png b/windows/security/threat-protection/windows-defender-antivirus/images/MDATP_5_allDevices.png new file mode 100644 index 0000000000000000000000000000000000000000..1a84470e43980a28342e0d01529ae1c56b1c9ac8 GIT binary patch literal 47578 zcmdSBcU06%@I5F9N>Gv{0VPWYB}h;hG7K4J5Xlb_NlF-U&N&ZB5G02g1QbCsC`gt( zfMkgh1O&-(oA=b``|j`T**&{^&h8(|VP-x(-PK)Hw{G1gOhZlKDgh0_g$oz1LKS7T zE?l@2bm0P)A09S%g>RKF9Q?p?&{B}TP|`!U41U2emr|9waN$i1;jsxW_#NL)QP<(Z z1)}Eje^_m{g^w>>sJ4a5O2J)?zMT-hPSj5QdKG!+NB75(ep&57A$gJ;qucP9?&J&^ zt!Pu3Wep2!EJG6PAtsG{b^`yTFk~nzyOG8wL0CQ$r;(yYo!?*is0la;tCWiD9l6+} z8*vc~RMjGo-Lr*`h1$JQy1z2!uudCYP22Q(-G>(pR}FjhRz)|a3Z^Ei9lm}_dHb2# zH1baCKmWmgU|tB@p1;#5`17UnH!=5jPPYpn-Qc~HUmpdp=P#o6HrwdWmeqaqOn#4H z8i{gS@j6^CAf)7e`0RhYygO=6NX2Vl{@<5*^vaideNKPK|2q>?m2Q~r=4?v@CC_2! ze`ly)WF6>QC^y=KMKA|TUK7vwzbg3SM|le;H5ifgzdD1?Nr^_PU9&RfHNFa6S0;ijKB%s(*Pz+1%%}BD-tY#@4ghT>PeSiG`Eo!G|#GvUZbLI&DUU zmX8n{u}3qo0<{|=c3<*UUzE90*fnTXY8<_*6|l5iH!OApheETt%f3-PlTZ|E8r z+$)yrF{kA7ul?fO$qo;~4hXkVTc(>Z`Tj~#DN7cL z%Gh(W6C0p4=gu<9b%==6q# zSXFN?z9hp=X#GeO!LdzUEiJ7@QGc=^^eosjY~I$LJ2J9e#$h0>JLpvio=FEkN60P4 zEF2nnxRn7;!fF@?ZJ$mnzeOH@flqEJ9(UU0^P^Rc-{?hFh3%$?r=K1k;-&r}CgPhK-3>AeruVBJ_wfY0$?QE&; zL(#~%c_l@s*m(EC%$3cZ5#znJahKh1qn`4ug*WiXsi?13t)Po;dTndcaEtD_7AEej zK&7oUGs6|-q_rGzHJ96>VmYDOldM_4-Ono3eRa54|Lv3Rmz|qCyOZhkMt58`ce#x+ zzs45@pW0l6y400Lt3#{s7<3pI4u!?fUXf{4WE^)jO?y=Z-G-hOZ%}DTPAyL5amK@g zbZm}ydvrz^86$CSSjxXa76~TMo~=X}(4uG8DyJKEhV?6-iYB~aNs#ZL=RFNpZz9vG zvVjS4D*3W&D?gif)r}KQ%b}`KQoewN2xK9RR%4(OO8SIrRZQcHu&=y!awMgk8_Ov} zZp6=Q^*G`7GcC91&-LsR&g0K?bKkRNcp^GjlV9;j`m#%7+_#rLyzOQ)VbQO&ITKvd4$q_Rk2y@;nX4nsL>}#B+a0Y{n#W9T#$t6w7!K~;5#s<8DePrr}>sow6bA>rH^ zvGtVO_L*w*uak{q)+Afdph2)?5zAH&Kb?}{l@PGhitEJW4GfU=L6y7YiXOE_UJtl* zb*$k;<3O8KRY||(lI%Dh1IMVQ8O?Rp_&CW4o%Xy-mU0B_5ltMHMiok17We%c8@*D< z5fph9rf%?FYZ2@eb~^5czWh+oIL&Nz+$vg*YnJ~ z>FY#;=h}$J+4ln5)2}C7nv#lDBZW>{B#o!dPoVoO+>CAzwJbQ|IQ^LXaxc&h94yR-kMh(d#l_D>%!%j0= zw1U&5Y1&c4Frw!~E^CM*=!^$5YoCk`j3b5O70C$I>ZlcRYxyqO`W)$FdveB>nYKmK z+SbJx=oowLv_{d!d4lu`jB+ayQBsIx#p}$%>Fk(Qz*co@z%GL+Vu)};pIj%HPtDbr z5unLn5~Z*YNQjgjjd+1pYagOWcpCPvEu!7QkQA4sFg&WgU$d*;<-(!##nzqY zwE6f(V943bs*!qWa++iyuGrc3d(JXu1(PpW-MyZ1nmkta~yMs)_we|NnSKIbHho~{=#@2UII zbMI}t-^IYvhQk$L2eMNT7bei!ToQ@ok=F$lTWM|S#2gE=*&Wv>+`uuyNxl0_$&bu? zyI(;&k)bdmyG&8ng1A_#!+)hP0V!1x!ZOG%DM<64ts52vzlxhk&)`-b?u)@Ix0y`k z#A^gW5hqqwVS(MI_+P^%xC4;1Smpg1@$IwMmyDYaPvVU|vsTZR8lRpFd$mC8Gp61L z+3mm3N2IosQX=Tm8XvigD2&9B;$xYey_iytRmSSm!OzVO3q-K1rp{|wdZOi}@N>~q z=2MeNw{8%_RRtWG1%t$fPnaHQvWTi}2cs;&5=_mP&%Y?h4U#C|Z>lq^gMs znnVb1(*PUuXk07{er((&U?RPK17Vt9F*jcxRR`($9fVq`VHCS<*MGeWe)afF{|6{k zSu^oT`)$<7I~5A`rH!YDMPOs6{v71T|M62HC-%RQ5j%M1A|Ov(uB5a!JGQZK|n) zVbUe_yJM5JF6K;s3|xzO1u3zgYb_=yx9HCXsRw!PSC@%ze%g)>V^vN{^H{GIp0H~! zF|6g+ocwF}m2OS9LyxFAK+FG(9Cs2a&_gZeXwjo%@vm{LqEdI-f{yUt*-oE+2_POW zHEsmQjcs_uw5a3sZQL77FfGlQX5N5 zBe*p0A!j{V<3wfTI%Ae>c-MOP)u1}0UOhv?WA|Ifz<+iE*J_CVGN?yHKr-d4``)Db z;x4od;N}Leqq|m^!t?w(R-Pi}v;s`MO=y1(U4iv--}#)KVqLtHDFEJ;i=Y$&KXgis zHob<#J$CC3SBf4hV6`j0Q97KDSFdr|n97tKDKUf`E-`!QKhWi^`hq-}v3Bv*#b zMI(x84k3;?!_MM{qtR`V*O{yT^&}Kg#ahgGx#eIGl@WCV=gPC;SEHlm8BvSkdlQ2- zPOFDItLkYY_FsF_bqws~nuD)??S4@ZX+2URzESrB9HJ_-uB0>w(ZXtJqtVU0^W>9V zq><+W!RNUl87jtX50q4#zL2YaSDBwh|$Ie}0H1IB!%f44sRwg7BUL5BCC zKQ3WtG@U52Ng;|R4=%##Gf`zfw-j>eDve!C`C6Jo&y2T>&vb*=-lPjXfw=oN!}lWN z6M}BFbg_N`5W8ijDs7Fcha`FWlg%BTWzzPF?-{UwI#Tj;;{`({A7ILg1ZYQsI#0rA zsWD_djSr30J z>*D?oTNrTwTehk}L9oZPjQ?7Ghy9;)!Uyf?$+o-_QTB?A# z8nE8wE7Y&S?w1K$4$S}Ph3JqWy^eM{Jg?;Pu%$L6-U?bdn%k})$vF9DPVf2MkEKYb zG(TC|2Oz15mgjd&x3lRpWI~8o6M40!fD78Lja9HLtJd#-C9|Xj#ls+2ST-@_*lxY` z`n}E!39p)LRFS6mG(e8FjVDPg=x8eHsNY+!;#By|C(XzqKE$E}$!ebNL}?|eS7}r4 z_G1y#oX1ym`pq1oUuDM_lzS@T1$}GM9PF_8Nt5Ekx6!w&RHx&XMEvWY-U8NDM0?SM0Gv*D+{5{`Dlms}cFNCZg0Q|RL z7O!6nOcBqf?#*Tb*6u;@(OP$Fw#7$L@x&gHLMm6tiCvxHzWXgD(c}5SkFOikjTyA` zB6fcPNZMx!>QfL>i0MRP7w&%o&SdO56LduMV}C9t`8Z0{t9CcG3yoLbcNxWZrE`A{ zk;*irQAB_Bdvkx|tqgEJTT7MZG4S^i!w!m0o;;ZKJm68yuJM zJ`x81ku=0GXow9s@*qses&Q&o2ZkH>6KvlY(#(W{f!dD%iHW zHqMbWz-|KeJ!P9+x5{p&*L(M^d=!l#m}fE3V76QY@XNNzg}SFGAD$4w1&w&w(#ydO zTk^K^eMN5N^AUUv46)9(W0!VJ4(SDCx6LtmSig}SD)lbl4Al~sd?9YNPf}9=y*z9ftfZ+a=<6tFoY28+*&&h}nt0a7D zqSo**uiCn#dhtb*Z6)rZ(vuwdsB_PU7A~m!91fzji`uF4K7c^1ioZp6^WtF!{w8Ny ztT8v8{?K0A@;bw%Am7s=)Ha)Hs%#bT1>i}sO)tegro4~VKqBH&3h65X(F+3NbkSi3 znR@|o1wbkDMpx$LH6l!~*UiStEphHX8zWCwvD#aov^0-Q{`bU)G6}85SWi^FF`~2v z`Bc-*t?&*^?D$L_)Kt?I)+0v*XQgkY0xr$ujWzn5fdZc9?o&lkaICIo81~Rtf+G*2 z3#tZWBVvi;Gwpt#(}S-ZY5bb`p7ZDaGJ4L8y?dsQf0>9*vGv?(H}!25g6hIqjr-y= z)=O&Fvsu9+?MI03f4_j*{uG4^qIn&dY~X26(;0+yEEgKDZ&MwVtygYAT94&!yzxn( z_bCX#WoBJ0fd;fsK0W^s#a#WxpOB>WOeYUAUTGU+aORT8S*TdeE|oZ7d)Qb6^4)lY zS1rLG?3_aGlN0+7DdsOnL1>MUIAq`B90q$&>by3l-8eT41}9~f2i}rtEEBN38ZYWY z7i+fveFh`V7)2wrGFe-BYR)yJnl4rWlHv{_iR;dg&fd3Cnbwe-?(Ey8H7jU!i33@= z8$4Dfn^X`f?>qIQI$l0>eRUwlgNWT)UJaO}A76WWm%pwj?*b;IZKf2Xz7dyjRAN(d z^|j~07C>#OWU;U@(-`r5AEq}T>w`V$&~N)%>b=7y7+3o6jem{w*_6kIYJJhaPP7;b z0M369W90upbN`nB5`cMzB(WT6*fg92WqB7s2G$!IEx>yE{^zoq9AW#+q+--T}aD#MlSa z*r>}S=&iQ?NHAFTXP-X+sER5Kc3PEe?CrL_)DMujcEa~->i4BCgdIBu+SV-R-xPPB z@YtxwNOI$$2yJD0buTb`Y-}b^it%aBz`7s$zZNO_j=zM$( z_!11K<9rV@AsI(|H`P^!Qo(fPjlVSh z3YDhbB&c$Fk6lepD}8USkOnXFB3w41PEyk7t{Iy$0F?)_uC_Bl5*>pB|3bchMrE@d z0cUXj$H3PCe~6kUc`jcTfAIY@GcbAgn498@-7j?bE5uGk2-s94J2lnFrIBR{%1mME zR#bsd{y)ycbCi@1ogYY7lYlky4E9ha;>)hyn`oXST^~9uuT_Bw{h9AfB#@INZw{gP!}@oj$a)b9=>A*+i;!P#E+qPb z6+5%6v?W6$BQgyV?duI8`u6+})X)Zv+W!;w-(h|8=Sls4xJYRH?{^7BO~(l2)4inm zy)YCvILt62^{c-@Je(4gB^)6I!M|f8X9RGbgl1Ut@9HVB1ynMfGpOIh{qxR8pypcm zj=BA7WEC^8uIC6>tKSdhmw|#yMfAQ<x8-#%8zmEN4)$b4ghTiA%_{7n9Re0jI zOiAoS|zqVKVA=a<3eMz4?iY(=zGb14ff=FaVIzNjv15Bu%ne@{k~qIx!*3l!-! z74N4{Ca1*#>8C4AN|8a+!duNfle<`Cy9?oWTZIrCk8G_Eot?bX-tpk>aKaurd%IB< z-Dngtc1+<>_H+@a?X>EV1bBLcko)0lhHF0yPqp)Mt$=RGrBzB*B?^3AXJepoKa1be zPy5B*q`>kjH-hZW(ona3qe9)K22XxhyDOjRsa}C)JfnzB;P^Glb#<^j8(xOj?r7stZDTy71Vqn@Z!t&iZGMdn zhg})RkL+Ju9*#_Vr+TxHyZF6OuT6s8R2hM%`Hwh-o1&|)-tK>z9SZJQ9xUhuPFUs| zB$BPXUe-2Zjvn$|bXpyb>ZP%I=7!)Iar&5R`UK$Fw%gGVvE4RY{dZ40j6%5lb5)kB zOnB=K7GD6+)-(Ih(Rf}Heqz7Kl6x%U3g@lvJe<4fZM~}Q{bv8nzI)(CEiu`UZ3hRG zPGtXNdio8)%$a-DN1e|iPo@!FJmxoo?NS2vz+?`$mz%|(Z07hG2+hwBgqUs)9SE;h zouHo!+Zs8KeN1v+)NmaBo3%cb^GO@$t6S z%}=3odurgxbVFFHS%!jT7EI{X>wZ^Q|2JlSHK&i>KpVqA7q zTjvsPx?8_DMQc;G)xd_)khoiLX;RCOT1*)IpN(LN&<`@>?Eu5WDgYDipF_Tsg(`9RpM6F|66{ z;%mfYV0rJ=PHRuoU!H)wPV8gG9Uj(IEhw@^rokO!1Nk);L18aVHu}?-DuVyEnLn|K z*@^v`#~v%>pk-F)>w5dF_IG*@`opMdOTxzP*^rrIItjuiP_9NClX{ZLOYg@u^M&R` z(*}yN1rcbst7nR8+5_f(pUBPA3yS&2Uwah4WHDbEo&1jV_%ZwxQ6?9P< zGvV2N&&l4)ulj_`n&~Uo#xLUW@$T?ECEY`|5PocL)fgb2NFR$dfG{XhyG1&&7ffPX ztoUhe7Z%<-t#WPS@fwYKfu!ZdmXs8Zh^Di%OhS(0|7>Skh0wRrSGsP_PM@9b0X}-> z%J;1` zKVZ31N`NKGpa^zvW){Df$c~7OF9U_mfKN;{uf-+Z__Yz4vvTZ#-pOFC=9?5*n#ziV zl%Q=;nEH7mpFt2{eD5Yay|k9V2i3Gu3J5J5qbF#~xPq!)Knm z=K2Prm@m#-NnJG)|BTS5G_uuJLI3XVwM14r zE2%1-f#KHl2SYrTI>(`X!4qqt6VDLVf-ide)I$<`AGN`>XSQ2&NEF-ZwVqBpefcKE zbv9EnbhbOIV{mRg)+X+1a(h1A#5VeN4 zAQ>!o6=0Fg&%|`);@%EpSva=W9W!AO{>NOHbK>Y8Aay`#cQWY$*{5KP#=3S(rJczv zh2N|buodJlMID~FD~Udl09Ijt%aYq!-1-$bZVh5Vsl)OL5_HJK50`RUqD9AAtGN=o zGB3fkqeU;Ryn?I;wA3yH(j12Hq%4Je8}s;n=JkVsocBOA?Cl+5?S1a1kyrv)Z2MPf zk)4+Ipe#G01Y3?e7-f*M(XFmKKURf_Pl|L)x^5b0gmogWoK_(xkE z7M_%lE0rB27MKe{SDBs-uZ0BKO_+{d)D9Y?RVT#4rg4$uYKoq`+*|Dc5JWiZS!EZM zaHH2ykGR6V5@JG`5)vuKvd(lUMZ)WCpzKUY!Vs>}pOd}5KlhM#$B5R?^&;<=^(Oku zDciS2eGKfK|H&#U#hT-%Raa^6CfxT(*bBv-p($d35j>7#dQf6;(8*QGZZ~4+LUA+_ zo8Vbrl6oq{A3Po%9^NI~CYip|_M!3qJ0tHxgr%_ReVQ!gJ5owpucZJA8C0 zT=ldvA`+CB(tWa}lSocFVk^&eu}4}2JW!vGXj+_XyqutZJqf3yQ7XpO5Q@#(7?XMMC`V$weeibuN^RMi+CenV&{G&>07uRlN7!`=Y4iG z4Vsr|_rxAol>f3d9M2?G|ms0Nj*5

+FF0H@yRZkKLyj!t*^65$pSIXo+ z2oq+Fc?YrCSs7yOy$O0--O_)bt(+JMnviRsK@OdCnJ(sw?bJ?I%6&!ECpmpPk0g&t zDnmV5-XfTV)${Q@r&``)ioCr=jpw2cw<<^&I2B%IUdM}=bO`bE3#s?R;aq=qUkKH8 zT4n1@FETexRFBoR^8<_PQbXN=i_e(o$y-AmiRziNF`gfjk=~`-kiQl0pgV|*rpiIVKH=al=ho1(|x z!BDYX(aL6mt7mo08W?cH_9hp_ob$TM<% z<9iJq+iF(3^!uk#2lqC-yt>fcyV%cH_%}nQb&7?er|I{)g{MDdK+cGL_M2Dn8;>S8 zp7g$~cYapkE#3dm5pm$(WIl$3R8D&zfvI;h(RJ-@_{;=RMX%@!WO#0cO&H;9yVFE+ zR2^vXJq(0u{pHecTSMx-loc|6i)*({vmrbP*;7_7Nsv{@et$deW1}yLrdo-Lk8y<- z#@;9GVa;Z(zR{HDa52}}-n#N>^N_KT>qct-#xuxl@6+qBwra2A#k6EmUL=2>>B7gI zUp*`prDsQT@1Bls0ZQk*T>_G<8?Y_l1rC9?lb?NabZa7{yjjU`-(cxJh=PF*yaIvC z%2w>LtWDJeTKIl_R|c?AOcQRN*=Y~p+|Z&+$WYE&Q8hI@P?IfM{H`w@5E@0NRX~UZ z+5C7-pRjRt``jlUzIg;FaV0d-xy71(glb@tbJZ~;-+C;f5F&I4Y%rAY7Wi@bl z%X_O?_zUoEx49RuZ#yiibozb&kasGS;LuY6N?pk}=C@b)+rmJx_?+Op9Q-@@=a*q# zLTmsL!Ym(|S;OtUts;8tL%r=_tLRK+r$v$TMZu*0Ef$mXw%S04Wm&lK;3|dL z<~1C*QS=t-#`(5Fd$f}sdQ;{;{?UEI=vsBq3qSf8nsXR))hR@8pPmq=bi$u5dh_>? z)TS!wdGF3L0`64!{y`q0-U2wSCjFm}foj-+?DvYnvR6P=of1#-M}H4yjv@snfryRH zxla57G;B<3*dA(mu}A-jJQ8*E-wg#E+%u2ey^J^a@7pgsb$M`Au8(FcUx!ux z_Cydx6Z7Pc?T?7Pr_UxEMdrLky_Sc?kEZn+gjj@o4c=@>8oH^TcWCR~cg8BLbtr{z zefZ<}!jot=+v-!QrmEakjLM#lzw9Rz&Tm3-y)zqAc+{UQ2iVwR9p4N6+#jB&w*AlN zP7sF!m>uWwSBU|TheLdBrqR~#KT)JO>ptmDO+5TE|3ap)@Q#ow&(R#{DL9z=0g;l& z_`8+ES6#0W3!UfXCLqssk3&FzY%yM4A}fesUN3ZhSl>2JGRTSQI{>;`-jBJ1xgRHN zC2+v_Er&GJwB@j%m_#|w&dp>MmwwBd!KI>{JiEORo5oL{7m#=)a*Dn)8W$h!v%piZ zMUluDV|PN0^i2Yb_l7Q$PETD7sWcSwDh(!_ew{5nX7T>v6|l~J-Nj; zeK1K1^mBj{tOXiR4@Mi%7X{|a9`y`1B}xax{Ki;C1b4B1rP_4vT)Z@BatGUiM$NJg z4D_c}@BwCEWe7X=ve3ellY7IG#gWw%*OE4Y$%jPec&Dua`B;ag@yuLSB=eQd0?L3g zQ07VOe+ih$IPZSQ5Q~$mrD+g`vr1oI$eH;8nkuo!pEKL$T{~wJbC_5M4IMS*f+;#9 z4SB=VhWq-w-Sth$iD{*S`R9@Fw!x575Qz;D57m`0QI@?HlxdRU8c!bosz6m1PVB8+ zzI7i=+IYH%Zawmu7)$p^%;TJQ?>Z^d7g^SV(3nUHq&Xs*I|_!&En!-u@#PDMyjNVym9#2L(mnc@IGxDEXqdZYTdX{o+Kqlwx<Oae{|GP8^b+fAjZ6fVW7wWYbUOUeP$ueK*`*8H$sumwbTT5 zHA1)wbnV%d++eDy+aR$Pl4PMd7}rU&2oj_NQG#OOx8)YfVr9R|8sf<)7)xkxbf<~N zTa4LaQJ~6whne~fNqpI(-~@0F$$+Bq8JJsMl1#T^yhY^LHLOhD$IYba3n}qwW7}<5A>$%Es~?MQ7uX;j z6^HQ++Dx&ETK6}rG}!(y`?Ud_9-Gl zDXw8lIw3%!8jhG?$Phcz8KUTJUk_Ryuk334pVY(D(2 zv5b)LQ^wARONpQEG2`pDEBb*TpyN)Z#OjNKo9f3h77z%RAf`Bx36CG}fJ+7yG{ur= zRMK}IfETiPE3QMAWDPyZh(tT@*f9x4=tq0o?BiwT)bu6DHlf}5c^*WG!X2>!`>7=~ zbJ(#X&cI;!1d>v#e2PARMtvM+_a;?T7X^T@ z-TKvD=?@+bc_}NV8gl#kvL(+gw!YrNWJc&XMY|%MXHnLSu+NP}Yy*WC%1#~=J zzGNnJ2{?cIyx)7}cG1#w@h(tkfMAHI+#IcOvOZY!2Wpf{RCpOQSO;@`PlwRjb-7+k(`o&Z`3TW9qZZAtnxhe#D`rCG_z1*CbJEGfvjM&u{(q#gUX=iAG2pM~1# zl_?5P#y?=xI$6qQhp_mjHfeHX#HBLpXvz-K5{GK#Cur|{N)d2ayMkc7rqP?st?Qz| zJoKgAW2pq0^tJO7=^pKjU~MN`W(~^~+|Jy`oy5>PmRjX3#e$0WILVnj6g5H%G%J)J zPLP$6sMQkTibtVR&n3jR4|eiVOo_5p53ed&B{im(cU!4&{%rQZ<7wO=L_lieGZ@)e zH9xSLwD$m+x~v_b+fk`82T2Pz4D$KHV4M2Tai2aH8_LemaWIEatN-36rKf|ZsiCRW zUhx6s%v8v_OXE>GQ8}Ia+`}FYVR6Xn6?I?rdc2GFWQzhu*`y)SI~@nc=HD1t9#;cN zRzjTmd?tT@NNfSy58pzytrisP4sKJ5fH|j1lwhJ#b!mC}@>MOkpvoc6eq@PcXiwHt z+yOK*pQaOEEGZ)j!9~u0lBdsfZ)rV&vl|a5E?m{(EDG8dgQK&FMb!5X_%f?tT`**aJ_M!FS-&8pzk?}`*O zAG(l7DJ)W)?#mgKFI_?m^J=ov=e(k1#iZ%mJ39`2n|YxXNq@O^_XhRR zS5+PLj;XM@6#=i&q6p!Q(%}gERt&yXH+|ciyL&-=H~LvISk$5@S!1^aiW@Nw=1;S; z=-Zs;Ek)Q%NYP??ZGQK$b*23*E+NW_9`@7bnHEu9nma^9=6l^Ml z(nB$!65^RG1T4&*K>C^+gj`A*jAmj+uy9uQ6*iU&P-rQplExO!OC}QNC7!kg7~I=& zFw~T=8ptKUkRWAeSWpg_E%JmRQIc-<@}xs?|z>jPOM&BL;_HeQpn zYq-Q&F>ycc_AySh+x(6S0=#p!q&?-%V+`IMPbSrYZh1K^JffWzVh`rxNnCzmz4ip9zm!H&}Pyk}1s`{X?H&5$%( z{gd`M)UO`Sef+S|I9=y4JzHGsvUV>vEK=0IP{_yNhTmJk%ct8PjW|T!wB0$K51yih zZTp+3#=1Y|R4$(MCw1J<37LNUQyY;+fT;rQ%WJ8yPWsBD5I#5USXgHx%=)E*6^fC# z2Q_!Un7MDfT6pAVzGV|WZ=*)T+USKBzUwf&t-6yReBEK6>wWdc%1<4un)~1NSpnwA z{wItDt$y6UU;9H(@Uuz!XL_!)*nZLr)bOHeHiNF(yPTu=ih zn>Y4M`6cu6dBa3@a0Q#AkWNZuN0PLANSj}K2!$j1F89F%H4Qx$1@(+?VHwc99L!!fD{khY38w=g9u-^Xr*3Q3wA1y=j=-`L&PFPd|l8gZ3cm1?saf z4vJP$b2$N?#Ao^WwaF)Lw}htJT+4^wV&e6}Q*luIOE>PYE|2Gn2Jt&d*$3oZ!cn># z%r1?@E7BI7rtH@su}qO2H0bv&XSJkYdKM;_C@#p#l3J_E(k?>}hs*w6H@c9+#{gV# z3?{na{{4#-eu3(XVIZjjXL|Y9bY=z_--|9K>EYje+UP; za3EPOYu^a!&43vDDf-VYbJ!*{jHV7}e`8(MvMTw&AT*Rs;}E53xMkikp7`S#suf;{ zfIpE%1zpIH%m~l(JGUZ=Taj$s`IAFPmcIb{uQBxnDcvP=c3qR z{gB5%>T~hZl_j9nqk9o0s#*97LNwp$ha5EdK2upDyW$ZZ$xuonT^*aveh@ith&FL;8`buj%VWFy}5oFlatr~iIil9w!0Gd&`7jRfK8A-&iYv)Su zkmb6`xl?Ju@)R+g91J68o|%C_!*EUe08PXgoS>fgYksW>1^LJJG55C=0o4lbG6p{e zYC0fY@>`6}-{=1jr0+#>$~>-;60FT^AB{m{^!~Q-!Qs?JI${ z`>lDeytK7#)l4u@AeUQ@tWTe=O*_^|xPE6~d+Z4R0(6nY70u6;Gyq8~dQ)ppH{JhM z-c8A0^Z46NwD+996>8>O0-|34Q8(w>fJ)s05HMn;K=*8Zu(bfx>&z2bG9f@;u6bH@ zuDCR+d;Y^2903w7a;tkT>-X)xyg%8S_F1bKA-l={xSc}B;7!Q|0Bt3Xzc+)5xm5RU zFjABPMwN)Z(@MwopQMAygxG-FQaI-q#(>7Pmy^L~0<^);mC(F~HEC{(DTmI_kL}&R z%FO_!Bk3s+tpf>04%IXXDCogl-T{3%C&po^%WSLd>UI7=1U7!2=_mU?IZ;k!kettz z$3QFqG<+a%J_8pFW@3&`Hhg@5_8Ab-(j}G1Q;{Yvoe}`Xhvqxtf$ElFWE`M&4wKFV z4zvZ3wIS-k__?;z4IX>zi4%Vi%^(u~{S|mI^pFN{55j$v=h&Xb3B-7J2#7%WL1#%1 z2k0xowS*)deeeC55TH_7?$5d01ZF=8w0b~qYXH>A;QB03dGPs60G+!U&^rKK!}@fi z54cTy*e_HjAc%nc-?`nAr_z+>RLvZTndJ&>eUZ4W5Z3R>8GO?NS}Z=nF}2axCr zJ1%KpG#WMd>0%EiLZo}(fE3x)J#sc{uxfGH7pMBbG zJJ`}*FZ)AicdlSFZs;`pj~9HV|JtQf-SsD73Pfn02b?aWe}J!ZsT-g10`Gq);%_lO z7K$d!{@fIxnrra|n> zR{2!dc_iPX=V=(5yuUr+b0f`AhxnV@8lS^;uLE?ze-{eOc*Ut^AUF&>x7ak=XbXB-yRat zz3L^o*-szx+Q=`iSN)0)UB;Q6lyxA)dcbidBtk;Jk;~}^-i98c- zqKsS%D?2lEfMb-*m~Hz%yQ&;@G{<{$uU|B1I#T(>UZ<|Q>hQFx0oQz@&g@0AYOD4X zeKG<5Qf&!pFABka)dUTF&c%t8AVZQwdp}d^APZ$;fd=i1b(CBi`8ybayweH00?22% zDsWTAsGgrn00r_1xKy$O^jwK%fW&S;koBkO#Oq-9Vt|S<@%y7A3<|-e1-M|p4lM%# zqokl-9(EpguALPbGxbUS%P_U6IyZr4orzw{QnYf`!|RV2BwH56AletQb$hV;r8PR- z^>UMf)pZAW2OcVB-_hR7N3fts`W}CwZs3>6=}{1+AdBYLCTF!sh+|hqm+IwOVyn_Q z#ks53b3(7cwsYO}->MUkQqmk!M@X-e_4naW+;nPTmIAjk9VKPX$P12L{enMXbkPw1 zRO>s532_I~B`QL9B6W}Lb`AUnG_}NnOjn?gvG^XPc;xD{l!|g?Xz>>#xT0ucK{vIa zg$9PVPetLrc25Ooc0o^QLA_L?*U8SvNRx)eglDo8;SG!Glx#0QnAj2UAm#c1m`Tcon`(mdHpMn32$_ zN5;}Ti`Yc!`9{lMuP#$myQr3r|8VZKYPh$1=*$k!XJW^eZ}sqq54{{iSV=Y0aPe~2 zy;chEa=eceL=~aVJazQRVm=AV- zMv0)wq@RgyF^1d31Xpf>g^8P6H#FZWE|))1i5x>lu1BFEXvOBq8NVvr3U2f9ZfiNJ zafhrpWUhuD!zp)4y}7c6{PQdT(d)89WVyvCG9FqB7A zx@3hN(zdNJ1`A$B;COEy)W+(nra+Ps}Buc}!i_*Cx`(R^gS zSek`cswF%}UXwAbNho1cQ89igi;3W)?~_f~OXOT4f$EK~77DlXAJWJRq}!y5s8DvR zKCE|lDtX_>2;_2{s?FNnoiZt^(qr)}f`>}t8P2X9YPWo8I+tG)gm*%*`H|`2*^(80 z(zy(XXQ9rVweyw_qb^T&p#)}^@%#^?yhBe5e8gPV>H5*&!UjSvFQG&3xjGV|9$mJC zFC}#~mLzCmKiEK1aQ7LpcY$txiwiCauoAv;bY zZ>p7zgB-Y&Lm$%#l>}{*GlXtsNh1yUh+AV-eoN!_EP>C&P&~1hZbj;86=pI?tQ{cw zdEYKMV{b0n_6yLeA-p0w!G#z?r~#`op4&P^ZC^~ZB)*yca+$?p?E@=)voHH9Bb*#m z8yZ;MX%v)bBD1`FEB@4LY-(4+w2t;R_)Np4ld&z=Od8a6!)p`Pv&}K0lD?SoT08~y zVC=0&3$w*xc(`(d_9}$rR*Yhts>-j*?t^xG+-3r6rD15HSjvTrHxW@U`Ci_zESb$> zgr=AJCgfcM`&dGt6+sx6PwE(Y$QGd^p5K!50C6kW+eUD((6N*D6T7UR^!1QXtnS%@ z`~5nWjsUQD<|AO{qGP15)MBLV9e$FVuM$%65jP6o z6js->vqNvecaW8?j*qq}qMVaF=R?t-VRj!Kn5hLK#tW`3VPQKmi_t{Sp2qyMSFE_= zSE|_*s{0~+$7Grjb6lbyV^N-tP5f!E$X#mP1ESm=H9Mx-cd|lBduMU8&+rSX_f@)B zQi-q%jc!~=n1!=TX{Wuq_8KI)tQhejz$_XHZ=Y4Z968m}0fL~-Rz`CJr(^pJR>(AE zJMM#%y}8+wibrRuyh<93oT58zE#r1IXill*Z3k&%wnHcWgSpoRPpw~Drz-J321bV) zFK*1mK;->9VEEX$W+8$cWn3GeB^ks}MPhIU40-^G3&N!ua;ioYI%KN}!NoRjlmAW$nqAXJeZ%S2lyhn?gB1tUDk(Kj$y zU3;DYsxTZ1IALv5G%t_kprC!3(di64iYTTqAxtZ%EFRtD5EB?FD$5v4RCu!hMpsjW z-qhmDL*)}8%9#tV;~-`&C^bS85~=VM$p%?;G95{jdI~TsY*b{}Ex~$Lw?bdS;TQEB zJTx_U3FfcOfAGV=rK$Dha*Qfszae2F2rczdQk~wyqUy~hVTSka3Xs=RsN}xn`-k)= zOXGNj^9lUb(thFF^CU^JaJ`lSZ2#L(s{$4pR9~2%DG94)R1lN8ba-w0>sGFtwt+46 zSrU;`l$=)=xQ!Ure6kEYIh82AF5e}f;=CG!esYZ!v{gLI)ZPP!L)Xm5)Y^<`iO!+t zVz_ogDQahcCfq<#T2a!r#GW*Ekf%Q1yDC)AeRnwqyZ?I|Gz0wQj+3zjv{D~yo3Yx` zs%)bgkx!ZmC;6Ew*<;K@RVXqs;Xt|atrYbpxA*fxqB+G9*Hr~XifQbQO0g9vJDa(( zf`c}-I|{h_^HxX>6~1~psd1+8 z!z*%L5K9a*>XsX_?KfRL_s`(rvqyx!X_pgvoLUe|sfN@la%XveF*OHlAP5Ta4l<@IP5^ED|e~a>g;; zA!e7(XxHt??0#FtC9EJ*&cttL?2Oo)oa`BdLFkuhg;YYgiUU>it-_M=oLZtm3^M`| z8IHN)991XM>gKt7FL&iTBrtz1)NmbU*ri4QB{zZI0ej&y_aBl_N#DEdG`iUYW}+Rp z{sQ8p5>IRB&WXKOJbmP#&`z@)~JMAy;W0M+WiS*cQMhERud&CGHHW@qjGjC+p`BYgjbyd86T8?U-?Z@^S9DSP#iLx606k(Ow1uwQ$kT_G-n zZrzbxt~}O`T)FDu4~*=Ij4jDcs+#4|P z%n!1r8!U-_N5K}xjuljh&DhB{i1SL^XCkk@Wc8pAwsuM4v$LeLp)0g9EgIAqYv<^M zn%j?2hMg-V%$r^1nYERq+0I8s58c<#nS{zrwD1-D4l{JKD6KD8q1CEiH!g3*4!e@^ z#VWAW2#P7(AOuCc`aOk!CN{DDaWZtJGUqk5TD|KI>3n8cj4(!No=-^PWcQ-NK1Ezgft3B zDBZ0BB1nTEC?(CEOMUm=-rpG~?mcImG5o_Z6j-b^zt1!0r)HsKoKP7AX9V-lyUFA^=qyHa+u6k?KPw`m`W8ISRFJH5 zJBt2BOtj8ew_NEb2)9s>Ji#J=BQW!*s#aj^({MKnW*#n4+@5bTn@$cby`9aEmhXkP zF{Sk#P^4;@UOt|km*tJn6d5iQ^EEp2e&djCJB-Gfkx>x5*MmywpQ|IUn$q)z_NInV%C z@B5ek?vDuUFE3jj|MA_?TTYF$->eA}oWQ1(D)<*@q6ssB1mcq`OqcE|$6IU44t-ev z1qSlEJFNRr`NVZ4$Wh$j^>J36<3qKRtpkZWJtJX41pk=>5|@X5a@X>#L7}X@-=ykC zn#@aay{d|%lu)FuY$2(myB8p}!=IbYfK(w&E~1lm(dG~Qh0Q3b9L%>|c`zEbSVr2E zFTC2@-&o)?vHR21MeL1B&R9`5cZE)&KOVcig!GBs%Seq^p3Xb2 z{dwij|0#&nj)!|0&*$uZXGCW^1!@g8IS8-!Bn*@5BDu&ZRQL@>$RmgIuoq>`m`;Q?bQfXJ5VJ z9#YeO!`BO^LXPz?urEuLeIV7fg=jaA?`GbLw2^vyr3QfDxvL6mVp?4hC z>CVMkNuO%y#R{gYEtbh;+*e2P#y`s@u^xkaOTKD>m4UoQi>P1gNLv0VkGel1+TB!g z7Q}EW?#e3v<@J43Gkpl3sf5Anl{AjiWy9WP#^d4#@ifg3d$I)PO-$=oUk0AdOgM_u zO`Y_&_h_cSLz6R9ARRAl5l~os8k4+G_{&lEJoLqaeFqWm5$SXojtcW$CraV0IAN@8 z5;LLd8ha`4d-{?wW_*R(ab$+awf6}I-P4?WV8r_KKmZAd;M@0^qW*|Td*g#)etkh# z?O@B)=d69*eWu~fR_OXkt;4Zp5Wvjv+sX_ST9E41*89CJ(LAkH?>Z=#M-6=Pg7)R> zT#4%mVvlYU=)_0I(cTntR;1DT(EKzzSdnza{ zp?B2(xk~o|`?1ed3=Y41ov0;Y&}4QiM_F80zB5ATC1&n~z}a`hQhWv4Wsy+S);h*I z`Qj(3syB;^v?oRlC8Zog*Q7?)g3eSPGq*4c-F{jq`1g+tmcUErIQD&C%;f92nfl(; zX`<0>(^b6nif+H}lKOhc~gR=q}qJU95 z#R@uvk+D!DnLi*j`N@y#vugt8f6go3VwEs9KnT~_C=F^H zb|Kj1t7#~d*vCeo_U^YsnebIYlvEU>=IA>r1BngT?RUN z%mpU=*>|fh zB{u5Uu4ng^0He_i#gE$tS%RuXW8io^&vvVX3_R=*Lle9z?FK{ysgVncbZd6^qrM%y z*72;qL~aF;NW>{WBvWhxi6DzPFb%*^IDpOF>D86Rjn8jliopyHM)?&CPcx9egWIbt zJ%DFW)U7X(3v;w#)%6f6Ds1vTw!-97( zxLQ?Id0eEdbofAx(QH^RQ`UYr+|+0?+*&!U{Zl5TUXt)!ygELBPes)9l|e%3;C*r$|W`uC+Zy!8tF4{1OU}!D`qon$N~8)hUeg^Ezo6^C z141k5@Z*IyjC~%EjW9Aw=&rLDr89pjxZhgI4$aBd%f*BD1BvyZgBL32c5j1AJ4X!P z@KHQuH+`TnMW^AA9`^OI~2bcJrqL;Ep${z*SMX#s_HxXJ7{R#ko0E- zFjDduE1&K(TMMb3HQd5k;X)Qj()ZQHLJHN7-+!L24K$`~B%N+z`rgds#+-FCJy-?+zV`2`9bUy40B1U0A>k4l(`y72;E<$x+&^uuG(Zif~-TAO5R z+?UR?KVzb2c&+?o=Z0Jl-89wSLbTHL*$6yq{`?QaJdYr(Bm?rugb9D}PEtRx&}i6M z;}a+$xv%L(yxOG~*vcmG0rG~C@4qaID@uEOg;_u=0+~2sYya*s8YUbjUSMh-OczUW z;j({X{dQOQ6Fj7Xgn1_XFKiCl7c+f-w38Cbwy>;L_FngbzvI;VqND+z+LtEsGduM9 z+#W-2Y0uS4pfYUxp7lNx;j=;r5?TmD7TfV87~OzKgp?Iwh#uID9smwm-;{!=7R*)^ z&QSZ|Vsk(jTUjp+W~gC->ur7;GNL$Mtx9b{=or#~T99_1eDN6KmFpoChM6))IjQce zRr6f<3Q)n8!aCZL?0T;|seMxs{gi(gCu0Rw( zR_Hy>FW-m2hR{JERH!L0aEM@499cQrd)<6{G(Y@9q>$T^OKvXDDv7Y%A@ZtVKE8YJ z^m|J}t{Ld-Q`dO)ltUO*lFNr*y z*~30{MSo#^#pW~DWg-~_E#g}yNCkBO|(DsPRzm3ti8&en< zE`8FDGYU-lyQ^Y+Rd3^sHw_`zbOWO2GLOe@Sh9xN_}_99C-%F-V`JB-rQP-p5lSjr z1iq~9Mrw%TqJQcR*HD(OTpV z2rW~Vi~vQhXMt39cs4@TM){521dg+1-_vDq`4aI}(zO`{JX3y7<2chKc8g*gnd(j0 zP97cFLO`M`H#^=BKF{b}xETY{ZLO)E8i1POsd@X>WwTM`csSx+OW;OGcep8sa*IGQ zKZ=Ciz|5D9k8SP3O-HOX44iYJD8+bmEf4WSjhL;j;GO-zsFS5u*%69zB*;s>$H&d5 zf{Pz1Hpo86sbvp=MSXJd_w!q2NR8WaN6mhe&{{p+qKB+Hu2&+Hw&lj-jb1zQf%Qdi-x|2j3(w$;wNVCwmS$b5Rkp0;U7g{J4M_cRY`MW zYvYZ?{_8H~5yi`q7J7-2?AP z4W=A_cFh;qP7AXsZ+J84*Ii3cwRDsD4RLRwcOEbIx6>g(^i`@RtXmD)vfEInOm@UpzgxkVmC_qD(E+#hV!}>m zVd|jxQ5aJ^B2|+~Exj)r{~PJlwIu_*Hy$}roD+o=kAo0MwPWYAjmTDcf~A<4r>9K> z9jNI(hpTY*yTqFv1>@zDY~S>2K;*3p>fglK)U+})6siw+wxH$OlUp6-_~XNjp4HYq zq7*N1KZXw-&oDq8ttc>-M1>(!qWOgjFT+hH)ZC{wtfDubiQ$J*qkL!w4UF5oWbBxF z7dO%A630j7F!42vv_A7D;Ak-;JqtNI{m|tjc_U8(un0Z6u3S^NKzI3x49SO6Na{_h z5~H|w!c68xC4`4rWj<0Y%H*&n*OXe`t z71>8|U99pz$;O=L7^K`sW~iLg>FiO!l;{0Pr<>f^w?b&6n|69d8ZCV%H|?#h`-gW^ zE!B?>T(j$%X9=wtxv7b*i;#{a2PnPC;UKeFN#8|H+S$mNXbBR)Hhlhegb*=9{c+Gxk7p0iNkjiGdoilaQmwUgx7}h zmpS{m7rARB9c&jwAD4%KSk6M`4W#!?!ib5dJdy?;vyB*PFnwp~4{ zI{yJi5TaKGnUdWTbcSWq(At(JY|NB;#akwe5|2g=Q z&(+JN(aqGaU1p{5t^()^G#c;DAsbtHo(ObPLfP7#J?+I@74O202$&@f32yl_Rhx^l zj;MaoYLpX1%o30?=3jl4aPXoz8K%4Rhp&c~HO0Zgi? zU7jVmF|kQxIY#RrA=C0IlW;n=%&rq>tthUZWxt&4+1{r+1v(B_DGCH@vag`YnlJ>? znP|Ki_vp+6c}LzFw5!(ChWg zk35A&(6^0h>_?Yi7SOES-%NXtXnrKr1zN2PubZChXS=3n?%-bPdkhop-Cpi?qSBXv z4>$KO=_Ap_h?sHeprkiHIw-J|(?#n*!ZrftkpYR5Q3>Rr5Moi5!fVg{aL0~68T5)N zoaRyvv|5^VBzNK@c@`qsN>u~b9B&|&8Nj=vqBA>r@#gI1Y(f-GC2TeI5wRh-vDe-g z7ksp;eGr~cv?7VR?tZxUje;Y*bEUUa(d57{;?IFW$9(UVZ6c&Nbf;R_R>5?0uLvCz zQY!hq_M8SnY*X)|8)A5y?m~SSHh6ILR2&3zs(Cqw#33fMGhV)lzvOvT)^fDBKz-&F zP$$oNaHex*5#y>yCJbK?I>xD#Odvt7Nad zKN`99s|b9q28mc#9C}ZfPr#zOB+qBhj5at=3J^@QJa#O>Bx@`yyMs8_R1H?zJX8ESKH4|wLm*04k?U7&W*9n zaQw_EC~c#@DV)ln>7AjHa*nd)_^C^2=@34}a}0wjMDEI0DXZN%^wzP-ZYnF16TW)q z)?2pHT2vJqTB-EqF=7jcnmMn8w|e(rlY$uf6HMF;Cp=pWg>zURuyWd%**-RS zZtvt-vY6cwa*nMw!?#KL4(-QKXZ=@ug^PC-C(V)^!0&%X_`dRNn9(A*OX*{ucZ(eUAE;S$>wST|mHHPU#pUOk5Mt?QqiK5+13|O5=fciC(CE4sy!9X`iYNE1x#)mEA;bI&7ieIE8Ht7= zWS2+ZW6RTSv-!;De%2~o+EcESJ_1He{_U)wtF)`?ck^!r`@g-udob(kDw(L?je3)B zPQT$T1SJYUBJlO}AjHdafm$*OIOyi_SZ9YHn?H;q1E$2zQ)&WDgP$(`TwI6~p5TaV zt2UplFdgeXEYgIGOzvF2;-X~kg6u}IkJB;186~eh{TH%)6J;_0w&cEwUdSa346wb8-DIiO?REC&H zJ*zxql6dVkk6C+J{+-a*x5d8MXL8_JI{Bjw3;L!5jd5_)L6UUF5pma~EyRF8K4jhW zI%h{>OeAs;=}j--MxK$s85jxdKe%mb+buqLX^LShG5`_L;vhJ<7_+a!88=`!|X?wPhmI?F~aT`^M;^+rGEv=FU1xB zLt|Wj?_jsgH%$hQ2iAS~9whj7(-t6uWxl;HhROd8QK@d()!|5q(^>#EL4+MWpmC$r za=@|Z2}CUZgY7F@7qa+H!T(kj`Bn{Q-1Sgu8$eimw*`EwkUCzIi%41p;FpJJnE3sd zi{63c59vXXiJ+(n;6^rsU`y$t&10TG5BWNh*UNPT_CM_tvxqBy|9U;tKOuGog0mOU69zxs*T_!@x+CZfLp{&M?op*HYK z04u=h-;3Cij*3Z^>7hN-{h?$fWP8h_Eow!j9*#yI2y0y-GATOhHFURIqJN~>4*Gu@ zp+(7nOL6Ib+}5;epUn#;R84Q7kxN!R02Q|5dF+*#fX55+nrGx0^=Rr9!!{w=Z|$ze zb}N-iUu5NdR*tPvER{aW`&S@lT%PLDJdjolOxh$8eM_3Bf#^Qc28|mY(^6f=SIMfImP;@+^O= zs0BspJ=?Obw&Jz8;OLjMlChFRGKmHYTGFP43^ZjuSSP&7CfK;76t2!uc4N$0v7?uj zJ^x~Ag*>Mt>8=&%HMWon(J9Otk*Hs%H;$O5mJ>8GU=1o-{1U@R>6%Vl6u~bqA1m3N zjV;98f37>LERICoVWq%)GBa8xRxLg%D2nrtNbeXgv->|69>k~fG7(Z}A&qBa zow6-#D01=Re5qS{{eAi^R(f5@+kW38@?Aa=|zPBKuiQukw<4?Z3%e{V6%hAMgOdj*WIOCY5w~pFS)qEM#wU zM#B9y4Sn*`MQa8H9)}A=+V(r?4jM%)$OM~z++IM=?Rvlef?U*t6lxEiZJ)sk030k^ zO-oh$zdqDLFn4e<@&3wIMIPpRJ+nqY2&Fvx&3y~u{Te}#|Ln$E^{7{*IsL%YIYX1< zdNyX2)o)#U1oFU!L05!t$Lld*%SeMW`hKe_WV+rc52=}EnXtzo2jZ~bmzieN!4Rni4hjjS z;tPq6Dpt2%0PA20T$BFe!Yg{rT;;e7IO>3*wvKRLK<3fUcZ4U+fBW=WPQ_J=<^IOh z0pwtpch-VQIGDR?8YTxg&N%TQ!bzl1^T~M(yb{PS0)Ph@K$XuC<8vlPap@IxT_6W~ zgey=j=n+!-E#`?@$fzoq@xTlI-0>~sV}?>l`W5Zc-&-HQ3luWuuHhi<=Wps=Ls`-_ z5wKk16cP@9vVexUI;L(VI}{ozW~}XEIOtaqJnl)U#1{d7;jD8DD3n&{XT%d(-Tcf zC`sTwz5JnVqURsXuKc0XQ41@4vVe7VgpNT0;eSB{p}mVRD-z_I22c{-uBkT<%65AF zgkpB}E3LW#??I+!Sz*a!g2l%+9nc-~X3iein6Uq;`Q%giGr0>YxU}vlHV?tdrZ2S{ zRfmAMTEGzWr38guJ56v$7)sD0%Vo$6^-!L&xPcJOFRfWt(q_oaT=kIP)KK#+5c5I^ePlifVLZ!^a8f&0VOM__(yfH~Th6mEiTwZ(>A>~i3d;+j4~Q1NLTvYPqtSUm^DWNf*-O4=4lx=R zGgG15E3OYFa-A1a!@QMn@x33)d8;#;m&R&D*0fAL+@GPUb}q$tj8S%KSsl3B(Wl@>2=pQ>Fdv# zWdrfMb8P^zXo{zl!nMk7RIBcwK0;1s#c|WPgpsJ%TR~r)g<%=*DW>C!6VmvwCbR*f{8i~t ztoA4iRjf!#p)H_X`uh=mRI-;w3z%~{{PAn19tpX8kyIX(K6*wyfEf*hbm@3S?!`o) z5A|)+^0w&clHsIUZu5{oI@*Myj37`iwMZFM^oE5ZJ8K^~Uhy)U!g9J{8xVU=b{l!` zzDJ^K12;vB_d3(`h&WDwd7f9#bZ7ru(zAN&co~Ivn2B_W;E080@78@~6g+jz0_CKZ z3fLvWt{HV>8fv+n)KvMh)Bs(A@%;$^nLSZ-2q=Q zZ)GsTj#*u|Z^mq{lKS%3?ZZ?L+f3xHu8tKFq7z}s766*b(YOD zG=?8m(t!;!l$1j@xQ-Z^~mQ0%H~7}>jgxhL-MWNh307`rNO0`~8J{8vdIU zqeza)063=I&$0;i6rrcl8kS0(PDp-E1N_cm}XACNR2QC?Y=rYuA<_ z&4Rh*d@%Q=%ipa?$larJR6T$%teEa2`artQB<%tV*Ve4x&-q9P*L-{s4ruBze7xmV zYW;}v;g8f`^>GFS=W%;}_Nwp&+1yxHCi;ht>f-0#2&f3b?T6EF8whs$WO=4Q0$c08 z6P4%BtqaqDH_5g?52r!bkXo8BI3R0~D?DJ7bl)2l;*{afsO!jSmwo&#W&t^pyh(;c zS~l`#K!t#WP)+7lfQg8uI>!7m7%gvdxNJtyzP>o95w z@nb|jiF`QON}1x1XkDjU)}iWefQBF|)FbqlzJQb6;DmZ!#HNpoJ#gV7#SuswIv;4a zUMt21M>pBk0_nWi$0M$<#9pq!y)5B7wjbu!r|5r%&dxS!gb^F zl-Re+zwNO8V}~x{@5FmL7Ng9;>#8PlZ>8Mq9cqct-rbFOl zGR*J9AY$BT7G^U`5g1nhJAeQEI#2D5>@gW3CvwI3B1Bs)M-q9>R$yD%lj{LUdDiJ)w?Jba%lvg@*E7s(6aM^K zbZGe)(pZjjf9_kX#5Eq$SB!o49Lf%G=cUNB+Qp-H`A!2;s>CU& z2H|`lv0-ibuE0E$3oCjAESk%Wkby1?yngHSS>+ISW_YJDZm|yh)()Q_)aafbZ5(q= zX5mcaXe4Hrb7kN~z5&&Tp)}J*l3l2r0HsZqrC3wfd)b#LfNwzHnzSLSJ z1-X8pm!o|5ix8Wn`>2e&0p)Hd6m$US2Ivi`__T8D{C131+4)I~(B&_`3vM%e9w@ek z%w(0`hxc+#?wz9e0&{1p!anThG7oJnM|#bvgzsfuSCmbUcZ%@$kl0v6OZ&Mo!}VY{ z_~jej+-Bw=Xb15}IYUXWB~Pm1Eda}H<<~NTiqcq+!xZGN6zF%;O~N&AqBl%@7U1Nd zCuJmkx>PjZE{OAKVFocEHUv7DOT>!%V1{{Cd4ZC3gY#z6vpzYQq@qjW`)1HqKWZt# z8VQOY^my3YOx-Cpm=vx>*%FOI{X_)r{Z|(r(rb22gC!3Hjpr6K9!z^8I>#O8*B#2g zwyVkGsXE8LwO@m-feI?7K(I#vBBAG-!V0zQ#O4SXM4`_DrA3uOd~2ZC0kB*YccN8U z9?4ijL(65#`#`T{NEB8q;N5<^P<|jgkJ4 zm>FE#I0fmkdHdak(M)3f%G8P8qX%YM#bpi?o8~bW-p7pAjM(ke@)ojIlWNA}Lw={EpSE?cH58Thu}=*)}tlqGxZ_UBAv} z>TS`eK`+L$Ic}&P_*EvIZGw`0b+c3DH2duI$xQhEmt~q+)`O$FAlzB_LL(=cnRV%? z4ti4P4m0Q!^(Hx=<#u2yl5q?KoTqh_$vj?>(?g3^`c0`8JdAYFYnk&=dMU=aTi)2$ zx!+rdWX=4RZ1gO(Zj1!+M`&Uv0O5rytO#Ee{=WPVS7n*0#n}LzAjg3ZCAtuKCX=GC zqjE-+#hA8@*zGO@H!|!S{uY+Wa3Dq9j=ei7UIllpYb~doUYAFCUN>szFRCn&gX@87 zx(JY~vSGUsqc;yf=8#!Xxmbm2mc=)v<%BaMBOHMOwa3EsMz%ul8N|@Xqy%wYZ?K)` z!*xmu@{ez`FgDUvtQIwXY*~y*qpWZl8qiw{J*&^@m)W0`Ie zxy(s9!!FY$_SFVpl{t=ro4Qs%P;V0aI$|`7h2Un?9Qx_Gngp##$IEuAicD8$`m#ro zvA0AW@}CZ!v%e5Hu!lR^6UPR74m;hNfJ2Lpq;9bZtl1RkHPE2nQmYB~V;AWuVruup&M-@E3p1`Nzoygo4iyr!%wr_=#1P0N(vk6rfZA)QX*fe*gpo*4`*(*5pEWe=(pn{Iu&HUEyu8#9MfywXq3{8+4 zlYGXYe#BWL?j#9;8U|c?|A&p(XWX@#oCT%dv5Y{YAo^JVFc}1H&4iDy+B8pLhe; z4vA*rt&76Vx7vEe{0l+exZG7w`jb`tIH!p41IG*%ZBu!MJ7Q z-31$tF8){)i=Ct0wSv!9dLKETVeT$)x?J8{8GiD)9QV$3-3vXDKIG}3TTpTM^oo5p zCVi*l;GZJYbeySkv(;CmuAaOyrJY9a2@^&~+Hk^RfX8KsZSOw_X7cw|rIgit(kG;G zM2+AVF{gJ5;q01S#j$(V2Yaqz1DXblj+S_TCKocmRKc<2Y%GDFMg4uXL@23zV4RpC z#8v#>HnpT}a}fXFX}?qK!?|GEzG%nj9Zs-a@F8WX`&?9s{_T4UT+Q`?R@#vtfvtt%3Ep=A|MkwNzvj7n!bT6$ zf?$3~Kf2}5)sec>moD}Ot_d%kv$Ay}WES)9wOLDYfAX9YW5|#v^8eX=TYuo}|5m`t zzp209|LK2z{g=i>A=ltPI5}5==>PZc^w%OW$U~okW)6vBL&pl^zE$>Sb3q8KLcGSr zN2n9255!ig&^9n-`csLM$VFuTn9H=|lVSIX-LS>VP}Zy*97YE4_yKS8K>M^7BFkp} zg@A5?=K^-_Ho;OG;0g`?PS%F+0W;1^xCfDlS0xx3V7}bh_@$$RK~;TpES zYw3XYUs$*9#V!rz~0CNlZPzFcVWljCb+Tyj)$ZlZs#fF`bwC~i-DkP zW>trZ0mXzXph1`Mz^Va}AIzbEoWNgQeye1!^}sgm74=E*KESAD^yZs#-rtro$gzT} znF^+1z#WmyhR^XnH2wXFT+*kt?V+TweexK3P$ZoK_cN9nD5XnZ1D+IJ4=yu6)EfY6 zoQ=#G-#HNs1k6ba3%Otq-e{8RM$8#h?Qnc%4&hs}{uP9e;9H4AE`9X}xhGOnQia_` z{S$5mli$*NX?;^`D)eh{Fnr{!q@yT7q=} z5Jd%ifcN3f703dCDuB%h(TDS}^|%sXV07zW-$!#jvR7!;^;EFYQ%>(xum|#O#xDH7 zzfHvV-^v^Tr*Y1f*+@ee@&L9Yp3z0_BbFD=mT(3cHwYk)z=VPY&@GrA27)(>HCsS* z_AQdkuaXOK6+A9lTRKbQS^_}unSk2XzR-k}}d!EHV}*?dkpO#K=nw?SB% zj^KdpsIVRyGhP7V(QGMKFV+^^_$F;?bgoq7aDPN8%he{*%Jf9yZvm^AO7no+IE?vQps_3#Ss{=UbKHpdKnh z()Yl_SBH$~rE_niK=jiFqnV-B;(fk)3lx&^9 z5mS}@4jJ4A$#1YrS#P?_jrts9lDYMlR;ZC%Roo1P1b zy3Fd)0ufP(uBmNW=N;XF*3q%P*jsRw7)lK}h%%D#gr8VAhJFVuky6MtmndX-D^i6T zHmW1em!KqCzG`RaU;6EF>3sdqZ)fWJ$BwY*=7P-{ zzZo8_t+2f|Lba#>e9QK&*B0&Aiz8>~ zU#u$NE&?|OrCaA#C+&+2Mz&XjqN0WRj9zdz2&%m_eiP4Q2E}dvR8h5?uhz==#$Bz# zU~ht@w99sq`47n0rw-jPhofIps}r#!-(DRbU;ygm0*EEd|Fl67)UV17TDUY5SrONU z-)z*wl4DOzX4zheJ)+)TAM$7SE8twdZf~Nd7%`5eITV75lmI^;EtFR3Lb`vXUI<_U z36}!*)MenuYh;BbVc5G3wg8KA2MjUvy-q3~Lh(jX_tsVN(`nz&bq_|xM$g2|e^mgR z;mA&40#Gv>(~X9+A^5O?!{oMAz^Fg6TD2Vgv0vbohgQ%a-j+=MWERRVUl)lU~$?EaX3rZjO%+C|SnvOp6?>IV;P z53@>-N}QfKG;IU+GQ19LLa{RdEq9@&ig^gOVTBW6=v@3?N| zEvIX$O4B})_7$PiZ~_3$C9l`glV1LtaM>7(YBY-sUUizP{Q;ox-iQ(hT+%D>oPSUf zHm4@`044*pr;nFFNM5e;yl4cqyEB}kvqf10ImFq<{SK5=EkifcM8~5H4j35^vsjHK z0Au0|RPIjXB|U-rjm*-AFO}KP{v=seGug~cfm+3xrjKpbCa^3U?ma1VD!LcC$#wlR zr+cr1u!V7#C=9#BGzmyzh!^1{fv`h7#mqJEU7XOV4vJ>C6b?fl`?;F8$kSkTj?21- zh+#EiB>;Lbmn!<)KVPnode~I&nKz>M3cS(-_nTYDW)Dz2DgN z%=v2V{Fv}f0N>cfiE4A<%6)T-l?ryq4gL6lqBn&xO2$G`<89wp#|H}|HzOo&r@a))^wzvHJVBupWx6{GtT)^%csNZt(0Sa&|X3eWrg z+w!w)fwcU@oBiAJgXCEB8@`iccDBIc_0=JU@gUBU$>Q%$3r+n!Sq>VoBv_Ug=ZrjKR>?&hqX@mD>*_`7u6nACo2QH+9ENwmA-saOlnS6|q4 zso~+Q&*6E*D|mlcv;#crl}!KgQ@jB_Qjn)SIQ{;leM!EP@&t~tu z-cJm2ZQ7}1d%$=oyPWJ;Dg+n8L|Ca&U9?f6yz((HH-bR$kW7NQ>OwEG78)hmu&rUq z`N&Lj-u!)f!cV4qLy-9T_DiLci=@i8BLHGqLP9n`h#At3TJ)njX)o8*62%GGY3iM~ zBSzVqvC0s3XJx8}W~Q*LmXG}$(c@WJ6ubw^A!gNy{ zXZ5|ztip{;e{_mZGW(Oi`z(gtm$XBr5|GUj;54L`u3*4f*< z62nF%_%tq%mLq;R-{)t&1RkAKqM9oCVa|>5(DFzEc|K{(3*)9e zrFlI>c@HjN_F}tDivW;bO-;NKQx6?j@AWshNt%Q)Z5z5;E$%Fj@GYGX|Mw zg6_`+rWH$0xFxZKUbE>sxzPPW3IlY^z8O|ghXPWqy-9!vTS4v!nNnz7`qcXf_fEuL z-k_Aja!j|!MFX3iTntIhg;BpvL6(E_ruIlPIKY%X z5EBXLd~aLA70K(aB2h<+bkvd4&U{{d418m5g5aHeDQ87v-RFeA751mK($);QTVp$B zOMZEWAz&7PA%Ih}i%BKizYW7F=r02y3o0cU`+|0*LzZ%-i`IqM5bi<()xer= zWdEdg_4EuGRuG=hF(09qAt(^7E1r3;OIalcWdsvD?b{W`{8nH)#wU;y4LX|^t6w=l zT$Ce%Z0UD9t~j{?PXc4`9msQJ?&J;Qj9h_Bx9f}QZyQsWQoK{q;0NR0poSCOS#Phc z$TP7PBl@`Gv!bxA^Or=2VD;|-quA96T?}e2dkCI4F1w+n7wj-Hr+3myX7Xa9`(3h{#7lhnt)toZx*`_SXB-D!)u5aUxKJT zXppj`lh!{D3a^#y=&GyaWoBGK$cAv{wCX9R3CEoR@-+|Y6E{;MiwoA5kmS%0t7)#g ziO#9XQEj9NABaz}T9Gjk``j-%dwZ@6(wZ3UZgz%W6%$^ruzoHEn*u5Z0nN+)3U<#I zHG2EMokQm|Cci__byR|yGkuShf5gws@ItMHbYK2y&}NPxMyIUMvvM|zxe0f@byWNl z8yM6ue$g7l?fAy}`)YWKtl~N5!JKl5d|(TDMG97>yGZ3s(>(;*eLhNokZ)D7tq4Ms zDw~Ukdb(olg|jLO6h=m*6l6)>V<9O;mpv?M=7J`cKjh}TPTY;*;H~T<;QK6ffu`gO z)-M;ex$jg~@Uo#xQShxj zt}=H1SekZvD*LVeIh4%vgfM^)SCM9ZoAOTUPyMneA+V70o}ZuME%w;%Z^%+BB9RsR zbwgcXd7-P1Di=mZu;w^LVD9=n;WB1{w2edZAAgW&y=b1m=X-?0t7a9_*0yi`xV>c~ zD7)Q!;M|3{d7dWBE1lpJ$$sjp+=|(XMrtHkfgC6fbE;S;C@Ho-il-cY841l*F2v*y z1xScvNMz%d)XR-iZR&ithjQVp%;76*T^erWS`>{mZ*Op^ zX>)pai|AZ;Gh7f8f%$~|7fCbl@Q7_40?9C)R5PegnJ@zMa{XS&iiVPUY&QNBbh|Mw zhV%&eeHgVkLM(Fj2Kb(=nXcJi5r0&hj)KPm5(iAR4Ec=Ix%yYcKB}Zu&7iI^(yEza zOSpABwvIzwDp$Y1mq$0kelrT2&HXpHgLJ<9Mg?(GCYX2I2xJl&KGLtokCACP0#Ko0 zdZTBKuN$-|_4igQ0i;7XhjH;qZ}7c#cr0GmmD0}EldBLjr>n234*+5gv!&0y%FZ9P zg=QK6@~f)N{|=smHA}BOwqN(l`KX^(Dh-Tz|M?w|{{xIV4HC|90;-Aa zj?qO*+?{AtTcmVBX2EOyEG&_5PXFioSgLxep8lLi#X5TZ9&rWdv!Y<3wnuO0q0Lc7WK=cn20w6kk z5!*`S69CR0Kx)|Kx@GuDA7MA70{W$^q5yL|p3548B?&*0Agf&L&G*dbtO_f+Hyys- zRl-3k!HJ&2YZ}H)mdkrVkZ-Q2NFkZT%Ab5uL!;X!k(%JIw-vdH6V7yKicL;Gr%(ko zjXhexNNBA5Qs`McTHLx#O;v^5vUco956TxMQ`3tadWS{i=DgAw=Q5rPgE0wpD}q2p z35WSRZ2qRt94o?BU<;3zgyBiY%s_Brjq3EnZ6e}+PWQjo>FPU7QR^-V^ZQPXqZX1P z#`vjynDAzS6k6PimME=d9-Gq-_hKR2H*RFLe@Bh7u_*XIgI9pa<5=Qqm5^S)c@|i~jEuh`eTf)QfH9F*{%-txDj$$if zj@8Y^f6+soz|Ucj(i2J%)oc9~^{>~ZJx%=pPG`{n_8;#Ll8SHH44@>uiTLpUGbms2qmlRooqh#9vNREkrawZMrKARdzP8KKK3eE2_K}8%KZ4)$;gO`tWb)w{a#1i zdw<<~fA@F)bezXIpL5Q8yk4*8c(H5dL84Pl`lZQ9Hy}^wv~IcN$orO;?3yQ7Y_}F< zxb*r3@U=Q4co-iE6o4m2<|A|ED z23{LVV`u$ih%Bx_&#RsJgIgm|tW5<=?-ReShV+gD_%Llc5Adt@ES7()djA#+`Mr!_ zTcGj<`D-oEdQfH|0g4zPLV+{}ryd@<8WmH7+B(wp&mL!6kG1$|0{p7XK+6o;>;@n{ zmMr`f1no7TOX6B8&1-W~=VB5msH|2ILKoPjX+NTs{J2V3ILmM#kfr`5kQMER4jmVu zUCiQ0Mc;(qHyrQJFBLQN1jOun*`|L;TP{7m5*lpH2gHPaplemukTpTaLSQ{x&3eHC zdm(AU;NEY9!;$O1b2{rP0HcqUJEt^op>YfDpaZJ7+8~{pkn|c-laf3405un~-uR8H zq0Q+mwfK^7#Uz|#ExZ=ixk~=>PBviyKsmPi7GEh`JP8HrVk)aeap0vN*qS*fhu9B* zyVfmqdc98XJz{uKh*Ss)1CXZEMKer*9=0k8aLf_nu*S~_t#IWk^c?a48i*y~lOGoI zh;+h{N9!N(2KYE7Tp>L@TTL`eJ6c_J@&+~_I}X`@kfNQt7^X7yxc7(!5k zY8ksTC)o|CM(+VreRxk+h!7=;Se_AuA(m&MAqM<62YFR4BTgoedv5`2J%Xu=jd5Wd zA|FA{$~7d^{(&80TEN5X0K?AUf&PuJ3;=2<{(qo`WdHzUJ;ba3*6&Pq>~_;DsCfZq zi*(bmv@tG~t(SC}%xc6Z>=Ao_1VwUIIv`E~4U#dNK1bSFs8UOXCEMok{U@ihR3FmH z`Yeek`WFD6fzBX~yGnK%5FLO>#d|foMPd_R@zh5{4NYu9k|$a~Kdwb!n~nm_@}cs( zj{sl1K3|+Vynb&RKD2iyfAVvKaEdN@2TT>SzU^z>LeR;swtiC_XZIvXsJ?FrC&D<* z0ahtAm%&CewjBQffm>HZ!qx$b5zmV1VjtG2Tbm>Ao(0^LJ#c3ghF0Z{1uZ7MfNp#) z>vqb}r^-6O-GG&Y=&x+RS3HrNc=z-SlB*e+E9(zT+Khq8-!G)yj+){M0e~$^m)ytn z2iQ}`G1^A6CwOqHRtI7f*CJw%aB{m|bc(7*QI%OGI5c%=TqYW_*aapxRl_3DQ94tD zS9`KChcms<^4TOcH2~c+%azn|z$V2W#nMHlP1D781BYN50&N$94bYf>g)|&CONOn? z11H2JKD_DDm&q#s@MU)-+gIkD#O@Te28aGR^V%wIe++*vs@FM@o;r*d`-89d=cz(tr#uN{*}$D6Pf)5!(<9@bO%}!0Aslg;YEe)54gStz zR~q%lUN7?8aonjP6++?{Pi&RO+AVsTE2}+xH9t4$Wyood=s$!3N9NZrJTbTc73^!t z6eU+0j)<5(iyxalr2t*$|F_7b&f8*9sZIN(nS0A$fZwb5rifaGw7mG#&eSr5vC{0e znIX7mh=a_!viuj&@w9OGm!nyc$cZ8v8HP2!LfXK~p%>NwVh5Nis{&@x(h zyW`*G(IJZW}$U)H9kyr2Y_5 z%$o-8t}~2&6vrfn9IJ8+-)x_la>cSj!d42RJNOVM^Ye^I0~bq*W~2vjb71#CL0AuB zZE1Xm>wb(}lMjHSFG1X>H=q^avj;+!4>rcK2?!qaOUQEE?V^=k0VR{>%q^v;DVM68{h%RdFH3APfW5N*UB|io^&b=v(mYbgR`%QY+AKrJ6vH5Pr@E0i3Y%HiLT2gd z)8_Mr!A49QLREE@h8Ud zPdXA!9ngOSzPKpa({ay9W8eUvHGu#DtTQZtg2Go61IRl4MEblGmS>LD~B zD~IlB;LmaC`VRxg0I&GNmBALrY-K`qwR{^OVMatF@;9bq0u-}Cs{$+KC@)&{LYR2s zQpXkiUpotS+tp|iVTfjPf1UydvO7-JYLPvb5==!AgU3_Ipj3ZIg6Uemh%t{eeG9fK zTe!x^gv|JD6V1JcUlE=QY$^5$T2e1P-LST`x3POrR zq{FzK+Rcl{PbvRhqLTY0N#6(M2HFq4GVinZO^kN>)pH5!=q_}sroZ?!+995n!9^TF z;OLvx$KgBdo-0FVdrt5e4~ z30DWHu@WVQMz>yzi2=(9|ZJ1HKIV|{M*?aQl1m| z**!tgcFfbt%s_0m0=b1D2?q7u_1C^8x8usv0+v~*+Gzat zgz8;H{tCQ|q-hd50jcxcEeubzMH-X8A_^E%5o4RT6KX=TWJPDCpOlRnd32ld2&rIb zpw_2R#vJAbB}phL6>3~5A1j%My5CBFJ|PL4VKD7*)R6+qQSJIoU5fj2#>Wr$``(I` zPvnx$#v z_Td4`j4>B3f@z#~cZiFHWGMk6$Z|EFZBhA5ei7rhg5piZW_C+AI4VP9I zIy68$$7HVaPW^L2&JavGP@{VTLF60Ol}Z+L$kS4N{Gk zKprCR0QQm&8bJREk8vj$l*Nl;XP8aNYUz)b4VErB#X=0#E)cIY5FFwo`^4&eT)QD_ zYgIQk1~HPEE?C7r)GmD0e{P>wX9wuKh<)IUB zbnb*1E*APXg@+Mdkfrr&7&~e)k__$@=tmlBzH9UOFJ1DqHtX*8Yw4^hM&$;S7XuIN z)@c-B{t17y#xR!;KoFlab zBT5nQ4J$^Z7ZFMK;Ug~b|B`Sljmvs<9HX+EpT3<2VcpGMthm*EDQ^7+dQLu$cKtfb zyUYg`M4V*=PlU5b5f7^a0SD}YTi+GFA0rfu{1ey6DLIV&LQNE%x5R;;T}FVDXl#ya zO7T4$9g;H}IN8#|9$9$hziy}8ZAG;8H1YDj1Wyjt_ z3aAKnt{5*&cS5J!$;qQUW1tI13~Ux$%LKMrhM(l6sICEMO?u5Nwx+4AgFTh$X2<9_ zi@ooFrhL5UJ4`rLPbr1vMTLOBB}(y6>cQ4b>||NqWmDI-1BpUYJ49oVL4z-Lf0)cL zNU`$DW`Q5Hib5OYAh1K;hV2C+uCqPEkkWY~vlWj%)p%f*^xi}C#EM*P(abVXRiDq^ zrM(pM*3uat2LlHL>t{Am9B|#&sgZUqTKn6si{X$vxo7p?5XX?62`)eJ$}D{KUTQld z0WrZj^u^wonH0*10ZWXeR17g+wu1b)gbwueyxwSgV0^|{ZDRM?EQAx!?gbiZY=W<;9nflk zpWfoP16odRV$o&>m9T)#4__XcfvX=G-Gf5@BNji`5aRq|aMKw}7nk~lLRcF$$|dz| z);P1ukA}AA%>3bg)++j++|L99`kD-=w$hs{3l2-jM-z=7-^x9OxHP3xK)LUF`>NxE zSBE>vaJg+*4MfWr91u1emYe^x3p)AL zcf>WEl!KFWDeufXgP=P0H>P!7iyw~^9NLFL$MHV$w`c>Ek%`iopWiO+R`Ab}TBMEjCx(Ol zI+zsO0BC1^dDDr_V@R9b}pa#lDeMco!w6U?OEx_XCV}dWra5b zH|@m<4~G0+%v8nL=0Zi4#Z*z|%a?|1BVT^flhnU+E|F*SX8CfSjRelBxv})~(ThN~ zk!25sY~2^=(!0hc6(bE0zD~w6eS)Ero}S*;)|Qfz;z(UFsy0}(HJMCaW$Me|Ku2EX zW@W`G-=`i!rdQ8%lz?VmT+}&tcXzpCBJyQP-yH5z zg+BL|mOg#=SlmM^(wazaqT(u_|3u~nK0=S)9=rUOG=E3og8*C z-ljqYE9Mu?YFspeF&W>dV;5uWPsSm?a7^mQwxK497dM@OZ`|{)N{MVpMo{f)%t+Fl zD~F)kkLQhzS6%eTrQ)L8Ja1AiDeMd%vTY;jn+|}15Hy`E#%0_3Hn7j4)ytJQHQg(X@q8$jAu7U2c!hI<`FL>g(%k zVq!v>v*)@x{4O8Q*-lP6t}9EBxAkF0>d-k3Qsb3%A8vjE&d<8$mr+IwLUU~I)ElLqwQg+D3UPuLCR9q~ zi?fVj+P$}fXPM!*ha)gW?PjrXOmwr8ArYs4|Jm%$GkTFdk_%U+6zb*;MBu7;TBmi@ J%l|UJ^FJ7yd0YSh literal 0 HcmV?d00001 diff --git a/windows/security/threat-protection/windows-defender-antivirus/images/MDATP_6_SystemConfigurationProfiles.png b/windows/security/threat-protection/windows-defender-antivirus/images/MDATP_6_SystemConfigurationProfiles.png new file mode 100644 index 0000000000000000000000000000000000000000..be6bc477b4d66d8e0d1dc4a3ea7fa92f6407cc4c GIT binary patch literal 37942 zcmd42XH-*N*Df5pfT)Pb4Tz`+D4|FT0zwoNBoOJL2}p;8P?X-HNRz5SKtO6}p|{Wj z3IYPs2_*$AXz)8>!ik3pbuhPR}`ljRR5kj#kDP0ynlWi7#IjN1kcm2 zagV=w-s||ULTqgC^yACNf1UgOHuQhqKUrh1hX20!_;PFLHssF@kAoZyI_M$|l+vYhKr%G7#I^Tr${r znGm=Xv$?G|a?9AJR5*KMIII7+1Pel!F z81W2*kN4bD!W?)>SnGAQ9_?m(8g~jJ_lJ`cVmuuS?mSMp@UKyEjkhrl4`9Bu)@ZA4 zw#S5c&XCysezKTl`l!#ghwNaVa=}tkrq@o{?2zif#xBW&GSG-Rzn{7?AsZ3O-@;CR z6#Une5`s|ERgMd!*GBU7QSC(DNO@o3^#rA8v(nZ(V9lYLhd&3O6=z93ae7)=DqY?L z7rvr(515@byJNjlL&iD8{!9Ba;DctD(ni6i2M*2M@{d0%FS_k}LnWp(^|ctd*GknX zvN3|@LuFbbn|S-|D17LUzlOdW`Z^ogVXUl?)HfF%jyxUPhMA-E{p!npY$ZUw^tHF+ zS7y)6W{cDF7KPZ)Exq_<_Qu<-H%F; zMB=am@`zNkP8&vuj`IUgSs#Pg&WW9Tr#)As(8hXzq-1} z^F&|3D=BjJ98O^1ML|F7*Pluodm4A)h-NBN90mGYiwN~os=BWS-m23;%bvda&`;ILoISiszF^+T zH<;CWIDR9PSJm9Pc08|i@4#>Qp%#BIE=7Fq2iO?R@~u51MmdC+`(moBbC8Z9k0qB{ z9l4pR_CJkD&iIDdVMXKq6l*&=QYOe{Mk4`Fr%EmMnd!ZBm?2t?gTP>R2L?0f={24a z=mo3O&!d=AI&wdiX}wkA*TBXWxG-!2-UP&4oDI>7`@BQ z_u%0zq!y961e75EeA?-rRdWBR<^}8y{a+Usb5!10ASHK2yyfRDRO~YD&-PvCF6LQiYdAUno-AAf0D8N5yCys}l+#wNMNDaSBOj&h<*m>HDfl91EHESd85ot-at`(Db#>N zXf`#Cs_#IMc7!IFW|EkTM|a_ZN)t@-lszJpG8MCLis5~hSX{A6z9{9v2!ScB(J=;* zDOE;VUAw4IX7hV5f@+a%6?O$myIAkWD}xL)v|$e&u8lIUXBd~#2}iK~;E?M1N6|Hq*5K%H-whER-QaQ~RjZxMx(ZpI2d14QqT6PtKvrq_aa!`dg*Ed1Wm6F-M#F7mH-{?xF0QxJrf0QdKWjQPC z<~6scF(_IJK>+QJ31WUir<;CTEF$diuY8~^fPTesT(id$TY z_Fun62rG?_G`%BOcE>A&?q4@>RS5G{&et!WHNSTIox*K@=C{}@ryoy1j5OVWSix?`7fntrY0~IAkX8(2a2ZiJksaa_+Hz$I%$J|NdqH%;A32@3>om)mM_- z=xO;AgkgE<37)$Q#~Pzcu^<1*G~-i_59lBF_@aAJvTwYlL& zoIk6STplAdglo^;DN5i`&lpveyb%|G+0Ww`a*$qsee`9Ev7bIME8$d)!A`H7l6LZR z$za=sLrXEsP1I&lhw7#6$=44R2J1c3T&dw@MHmXkh=Ti@eLw%6K`=tg%{DIib(@%ZYs}^)lYvY)n5|LGPW61F&@7~&UwK6VI?HR_^;rytYLSSD~xkq$5 z6<3iMl%MYK=K8nZDr-6FFn(KJt(L`(oAO=Iz=t}%(0~aME=jlqg@ONF)7k)^!{@BE zHVLJR=07n<2Yj(79j-$?s|IK8=zDBvyas$ZWGJM^LSE<7;0&{Uq~~gQLbhIIFIv?1 znpGoM-1U1C+uI7vw8V(ZRJ8d|$fL*^!mG*VE%8tXmXU+u?~_W^Wt|Yss+G1z&y`xL zJ|Z&KQh9|z$iRt(BVxAWCaclZ{s!gZ;g?gFKD#ZJ&-djy4Qh0(c#c+$u-Psy9WdP& zK0LR}+xf)0@}7litO_)uT1NkQTP}$^Pp&lXkz7(8UZq1jkAtIiEO?-5qAK%8K zlMa}Nb{T~)(Gr@sd@iX(e|(l}LrEcY7da4obX`p<(3^Ps>S3eZXr3m?V>rfd|^kalukrbbqY!wnlE zabpjM_<@;4mlDx~S*YQI+8usfvu|-Wp1(esGq6b~v7I?}aq)HA^IrFFWv#g)=nvJkSXfWPVK3orb;Fldo@Vo~J={$o?vGNixMiT-3@U zR{Xs$>8iP+o@t}e%w=IhZDdaQzP@Q~y{2wTZC(f0K@(j;c%n=Rea7}~eT&pCji^7A z#g`k~i6b+AO>kuSmIqJr@u^2FUE=EPq%MZ!+>gwD9Mhe}bl`Ho_nVj*6?d896(y)!XrO7&aYRSq=k;ni&C9c+ z5@fRnK92Xs4V;jB?6gXnuj1|%$mEw`ng-vvuA+o>Z5JlIl@vs#q)MASuZ^nK>3hl_ zK08PuJzL|s!kj;*+^p$-0^y#6SCqRdLE%<54L1K+!Ifvzq&9tNpl{nnWWg&+bWbR) zsuk>>7a+&TK3QJz%Zr8+9y0+s8PRvX7a2-GIN4>4*7@nm5e{xb%={famfS|xSY_Pv@^NWux_4*Ii{VMT<_R8< z>m5rKlaac`&cS%SWB=C>%tFu%MeaSeYUNfNb}EKrK1p-Q=?MqMogfgd3{EOp)jRlR zd|^aguYu5JnPx;C@azi~-)FGkIFw8D^}JnjL1iW5;3{b7Szez3#zStpU?q+sXFyz? zjT*5Vq~i+Fb(qvc5$2P1M|yCkSCMyZXhR`T`>`b}@BD>RM=Se!G!T4_9-HI=2Uz*A zBdGES0NK#nXV}_uzjPZb|NUN*Je#FXMkeK)H^>hsLwI|u%>)S z#BbVV|I|Dw!+A=?>$!i98v5u33D^6wo{WMH*xoi>P(*UT=2Ya9jC9lam38&P@;E7l zIJH5x5TtMnoNK>_tYH^t+2NXv>)1a0iF^e8$lMf;D-kD;W(*(k>_=nFoV|J-MpPwcwrmAF{i1cezwVM;x zPsoN>PR|944sQdoh~MG$;E8uBc6NS^v{>&WpEi`HGHB(p})uTHWYt@Ll@#tuFfM%)3%OXQf6{cm)Yj9>|-+jY)D+s zC}G$;N!W0v5c+i98pxKZWAba+A{h1v8ZXl2+SY@{8tdRXUt*?yBxCcQ zQH>^3mT0!whVEd^1B>#6tj(U$^9Aw;Mr6~)pXIxRS8G$P))H?cQ$B9Ygx>yPaocpC zFJYxeDz`kpI3L#~w7cGQP4vywpSNaIL<9*2~#Gaq)DW~H61JP(!b&(axOrmt7l ze}|$TbYCo=K6~M>M7YD&1`JlepcPU2k$_Ke+>uoubo}Lcmt!NNgmkCRZ2My!#}1wV zeo+Jce19nr-R&=nmf%HPN6ZPlz*ylO<2{J{Asf`@CuaCuXI;uG*ZTK|b3Kg_(4u|G zQr1q)KFb!5yBw{g=db<|?Yow4a>HwpkV`DpsvZP0%~V7VJEPc&_b;K_Y*k8;}B`^?Yasri8~9ZtimdTDrSQ!TOWpRoYdy>j_M5wn0mk6BPque`L55y{bF1_RF@w9%z7rZCQ`j2xM1bY{whw)$6f#9j z6V;b1xjTbPz#O^&TiW@Q(egBKR^cKgRs**g=1Eym6Ag~{Y|xZ2E+3hv)apMcQOIIi zc*=@M#30`&<4cPH?rvPgUX@a2PF3*2rTafoE`vRMyn|*JF5N1D5CYlW%4tcx$gHrq z7L52TGBbHjvv5pYlG_%yH8%-9$VYOy;eU8Osve#9fzC;J?3UTF@Bab~J>{3=-?G24 zWHmHo^JAVy)5>AcZ8O8;mrq`Gf!#DQu;e;qUxeW;1d)XYCr9ALS2M%) z_Vs1Z!HEJQg$XT6tk<&8IG-k4j@uCDr|X$Fge^Ysu~}DA>x9Yn0%800SY2!_ycI>; znlV6V5sYUJTu-lscx)lL9;2bg_2o~j2#(3#2@14(1NWG&1@@0>bvdawaCLuJT}R4d zJTE}q>X|538Bqr1(Ax}+zL^iayyAi>)G%jplFZ}Zq6l#hJMW3sz-XCyTR^wQ(jdn@X2br z&9^q&LQWoK-6UD(UsBq%4qImqi@n+J;_EJ8uFV<6dfH+dtn$J}nV!q+zUF|JkNUFw zlzmeka(prg^_5H2gEbh;;C!W@d|l|}=PEhqY~9l5;v2Oz{AH9Y%yP#kRQ+qTc|0EO z(04OZ-GDTsf}TX1Kwny!h!o>f*kAx&L5qx%dzOoyoMK!X4coUcOjQm>`?_Fv99)xC zTAuqX*Jb83+8z|7l3g}8s!f+nc+fYGJtzS4v1{pw6UH1N}-33tfP-Yn46yJq%IR5 zO5tQz?`RF16|cRde6S^qZXXtB+5LJ7&bfL0NvOCmN^^d@;6w{$n#4D&lxNmsZ;jjk zlGU0)u#`V#W3Tjzp`Q*vnh=eIZtmrfWS70W;W29^%!aZu+Jj1T4#>TGcWt;D!yLQT zXXKOz<0r`KU9Pj82}p(v9CJYlbMM7;z|NX8R94=rqvI@Hv%DmlEwn+%@SlNF2C{xo(g110MZMe_7 zGNP1;z!Wc_u-n;_3-@ayEdii;nCPYy3u%RnxGfRq^J?@%n_sxE)Hi1v)KuGyRQGOL zbXRQqD$8IqHFfJ?LD{Um>L|B}PS>6x2&wE~a}Z726ymBr7?%0*?Lbho?pp}q0t*~l ztwpPg)Jo*@L^AZBH`Gmks;0HqDaWRv%S0g6UqsLbC+b!Aljp|L5zz+ea%Uh`{%pMv z5w8S+&w4Jg^?iW>avlEWd$cze3lZ)-_I8R2c zJ&&mr`$;+L$HPZgdpR60<|t;M{&i*@x`(NVO?%3YWAb8!46u3(D~wu(LpeHjmM2Z?BWiOa92c>}iw`55-h z)hkg5!ID1n{c_s${FAYIJImR-^?P)D<;L$YwcA*WJhsPrJt5*6o+4Bt5h|(I5>5Lp zkd5)rlF8!Ti7+UR3zC>$f0tW|*TbW%XSr-)dQ8dZNWg)5^hv-3)3unk_*>Kxr!kz^ zzDwXunPPa&%crY6_g?n~&!aC(l4n=bYmwf*g>>%09O!`MAj>cPf;z%$^+F$^{0#B#R=08c)Y3qq`1I3=23?$4{NRSUhHn_C&Jcsd<*1 z6QRntZxuajn~2h103}+!Oa(0y6FAg1$wZ=Fck#)05wU?t6HT-P=C<- z9By=c1(mP*CVTwzRWQ)Oi+5PZTV4KK3GS=k*+UmdS$&r2ah%b|+>Ej>$IeL$p?b5I0HTK3O~+)Snj57y3+SIeFq~}0 zT07-x=fC_~O=lkOGUZRlZZA0maJP^LWB%}1h$TOQT(<*2{G+iz{)*t!WQX-mIo-hs zb>XkDwRJBK0G9KWPlUC*PYH=%e&6=>9NR^(-U%Aj}-z9d(l`?o5Mw?nk-x|e*+&0|B2nTdXtc+=QQNtYF07C%H;@K3hJ0@ z;!3FU*mGn6EGX_f+tCW!ys7RfhO(}UVTU<6xAjn|z{JEB%fmC?0HMQhSYvkr^ zcOz8Ep!xp0irfPvsYiCU;NEjyrK+!Z~r z%EdD%{?kYE+Vo|!X|Z>3SLQ9d({^aQE-JfJuJqnyfmqG3jMjYUCeHljFq>sZn6)>8 zb_1u#b1inHM+~$4^&D@v3RyB0FmbLf2L!ij^`CLodQ(;S3$G5o_WJ@$Vt7wfCT*{$ zLs{JfV#5OX2wk~uUm*jq5%)ECrJJbJ;)|#`tNgBscKf*=eDezjl7@BVJ7Bu4DGE92 zDK4n2XPVl0kE~hxgzax@?a(Dvs;Wrd7iG)8-d)<1-dQMWKb+u#?sWSbhlt6#ZFpwy zhp+PEV>ZwOtg$MXMYMt1KC=4gU}Sgjq0V>rQd40yL4{JcFfqw16+) zi05UAA1T@^}gNmQ^XMR>}{1Av2FnNUq!p88Ngg|wO?+T8SaPK8gk0Y;RE)xXRJOjN6OcOO@+UKY;X%+ z^k%Xp>S)0n+I{A6-Xaj)J+~Hz$S66AO6r_(TT1HOMiwd}Oea6mW2K&P@1)TEd5aAJ zt}JJC&+M^KOi-s#^D85+Co_;W1U^d#)@%*CIT&{CDC!&T2f0G#n6pkEoL(v$zbHAM zebbjU@2HbTf_HN*r_6IQD{d_yz2}nZbz&G6;g$}1<2Z{1Gf;q?ev)^c! z&_RMnxrtTFu5ATpCmMLKZcYLD5k-g2?ak87bFB6qfKTts))sm-@xAU6^aT^IB8}&2 z6Bqh2=52`H>+Za3tA0dRA7(y=%S@IZbBnr!`TLb6F0_1#nW?~OChY$T5^C$9*XO4u za@R4|Uh-T%H92X{T@qCuu<@$n4QEW_4Y%xrTZz0=^9Dy1`ey*2nC9DsdfebXU>Y?m z@(SR>+fN`-76sNv%?B8;8xjx%^ZSJCMu1M(bb<)tj0^AO_F=k1_ z?m(o?rCtsBE~6_gp9x#s%Di+H)WHYOS5?^qoMnZHLlTx;|2_3e|5L!lZ$>|`OU}({ zo{^N*ETC6<*f~;stlz8KwuwzI3>3-r&5I5@*R9^(eETtY%Dgyml}_$@QdTTOwpM|( zjU~f~6Pi##eGEk%gEtMr3j-4w+_&r4s%Me|t7oef`JS}MUEp9o(Xe|b?^&Cx8SZ&Xy%k+L zlm^!g(%-%$x&8sN(HzEQnWs4%BsIqps3*{X9`YGOnm!flZ;06Ydnc*9~Q{a(3gytq1El% z_inf^KaS(m>$W#7I=LsJHKU4y$Es{N`fkVww`6a=ci$EwiIoGP%t6YuVR!OL^u+F< zHgzB!Gm}-_Atg2x6=%SCJLaQsVoWBX2mxm_J)=`odDU1Pvh zr5`o1Go29S=K=UQ7D-q8g==ZV%h`(kEk9Y}R{$82(Gb?uhl88c#39wvrFXM}Fm^uu z_RJk#tP#1<@#%$zZ@kHe<9d?kZxYsQ{zGk2~YNANu@ zL_?xxLCuN{|7kG&sL%*~wRjkR?nDnH?RbTj!VlR4?>O+>jFjhAFN+Tt_dC<8cM7RB z$imVgdpZcc3Iqfws0$;oBNJV zQ~4q?eBy2#gs&drt@%$In6>W*l(sJD>#a^keiq*xqb{f{2`fRSXM~*jCMfSi-Df=R zx5WzR6a4v$%*u5-Zx0Z^&K1+uj>k#5l?a;0IYb`V8?jqx=)|&(n7hB_%^M@C?wz!L z)nLN;?d%22`Yn=dmR(zTx-i7QH6vw2Vv-T#6!iU`!&FN5kpL z21k&~$tjV{ZCUm6dhjLmCRY>Ua|LY!AB%V9+igzv9rvljlMi0p}Q>C{P4W*oIcYGL&7SwE9usT|K<; z(81P79{j*$qqZ-N?S9pRzZ}o*56SKQdS*=Kkk0BNt0yL?sNX2s z4!23A#IH@<3#J9^2k#i{L_K)=4f)utqj++~dmUOGB^|pF=X8)lkyCpsCfrNdps7oPv+O6r$Nu*bEC8pq&$uh8mhbJNoYaM zW$4z=*OZ2MCakQ~-a=7hFiZLm-qN4R>7^ZOFZ32(A9X*MfTtxBo1$Wae;M%H-W&@^ zT6^7mFFoVY%;n;R{-Z%Wj>g{|s2=*JqgXsLpd<(f&&{M~4;eLoU;CI_bU}XUO{il}I|N zH?TkQ3ngq>v732Q%vg}#s4;dJ_LTB^_!gKHlSNe15&&Yu{9!0=_Sn5?+5wn1$*C|& z#;-ZV;c@5F2>|Wh5Hbt$nA2NnPTd+hcf&mZnHm zIWO+e$m;Y7K1a;~)-W5b^+9F@hKaZI>AU6VoiN@my-s3dI9NhU9qqIO&^GvRIFx^R zN!2&vX#E$PMNlxCzU))05B;O*2E6OS>p$-UOd*(=U+b3WD*t8T&op>!S_%GrJn?Yk zN^gm2_DqsfHI-nS!gJ1r6_K4p;JocUonb%MS$WmQls_MrH3!kb=m5)lD@ZrYLgDWKLa7xBaj#8SoCFD`F#d5H#0fsdJqdM z2;|i>*93rh+y9xKrIXeyK=fSz_S`?!ktDP67d@P`4d2N?7C#)kDvt)rW;4$IJqACl z_0O`-!? z9&n z)L9^f(MG+VF=kQa#f`hs*lz(U|N0+OTyoPby-;Pb6zQaAJP#?wd0Ta5t2c;QblgOJ zTg3W`gsBLr%bOn^9$c+6C=vH4Bg~r@zy22Dx_!1_DEc{^x2g`44qni4TrC5= z1>2Yj43vp5=~?g5kh^Pn1|;_7@1NwPM<8{?06C*bRV?+$Vz{bE4?KBzcjB+V4|$BD z7G8PWi-u2Gc1OF&EZPYs1F*Y}T&zwV*NIoY|11|GTm2cBat+@!BhbkPxfk95BPpEO zTp_w@b3Br=eg4NPW+C7+ZzBHLnE!i*)UAPV-AOmQe437CYjx)4KN6;%MQZLD5Kx5& zNUOAfR>}GH_?-2Cz-KIg>f`_BVw^P~Yl2(=PiJxEC*bZt8IK)v?CX4Kx#H}@fLbiM zPd7#(pu!W!PEPq$c5$%F+7#`Lhy7@fa6_)7Zk|W-)~S{@yTRX`1DGEu6`y%xt-ng4 zG2g0KN)`GE`Q0+yI$t$9VPA>1bqD|mYtQ9VI7l-Lb|ekWXly{W#~x4(M8NCM>0Sr_ z#hWsd@)0{%0Eltiy)5OjMUS)fS#ug9?b;=``t`H;Lr#8(iE|r%o#W4Cz;cfxZhc*I zWTdh&H6PG$-^4uo5`#|tC?Ib75Xh2F`nyK4KCn%UOfEUCK5XgcF{nKFP=q=0fmgfM z+eT{Pm`$WDwAyipuUCucN*GCXUBpVW{@m(f>VuY#v`H?Jr{-Ff^o92>`AY7m4?3cY zgZ?aMB1^Wq8tgQOkLs6bA#)g8PR^E&nmkwt)dOUY{6vAr07zL{mFkI$h?lXh5lb;) zWaUHatYs$|l3r|YJ)}T25uQSx9CU-;Ac3$Mk+5kZ#C>t4h z7Z|`kX9skhkES?AK7M-cG4)|SVLzKWG_R_bLh}U(T_9u!ErMH782%`)VlML-4o;{t zVcw~UY*JNo!>?d_C>q#% zw?zI{{d*GKvek=rS)!BPQ@bR2v@ITyX&nG9d1Fc!;~P=YQm7dEqz)B%U2IP6d^l>@AjxT6r{~ z@BA708|+D8sz2WY!6W?t>>_Y1PCx!uOMEE)FK4F-#0&dt|D2ou4{=C1u)l^)`m#u^ zq^0<&f5C%9ZTnp0qYxmbx&HYPi)&i9Q0WZD5^=RWSDb4NvFC#_=AGDoUr)g-3cunOVZ|- z^gYwuZ|5Rh486bNEj^sC3goHpnXS-5! z&lkeRGwGyQBm&~CYSE8M{@%pO*}S+EPJuvRCNEkSzLjd2)lRHH5xTSkg0%4r?(=UX$ND3F3d$~fNqoH_L?E<=3>HYm_sM8fdPo%lV8MxWqVLnGMaVn-`2S8@ok+3H#zVYYb$5{HYEn2Y_W z{(Oe4h%|Vp*fM69Up)J?OOw{Ne92wMMqAW~a;`Y4((T3=r?(ti_STlU81E7dQ^~$$op)?p1F7T{ z&P%PL#o&j=0zE^aX6V)ommGa#a=vR2YaH3L3ow^u`u$JXRVvR-d=m5K=Yj@+N#vM& z#V2oO>1=0r4EGCtgMLgt5x~A3#NeF$2xpmhc556JwPX|wWLx(14x6arYCZVl><+^B zC_mS7(YeF>6F{{3wOWojTx=sm3IJdu-sjl1RAu^HD=&?XnAuZiSP$T#RbE}UGL@RtR=K9{zyG5A(yHqnKfFDgVFOW-D>W2{H3ZQ`(i3}z9i#U0-mZ#A-zw( zrCkQ#zr&T7{4NfK$gG*g&CbybARk6wmO}5V)mxj8&u41d zEzFu92kOj9;;yhi=8y&>sy;-p)U)b_iY3`CIv+N6#&z;9cw+V4{c=*7 zp9;1|UX*-}Ea(z2ZkTa3iM{d-fc{p)RRfU9i-18&w7fY{_y$1F#o-+q?NWh^+Rm3+ zO0m*`s=6ZUw^v04W#}1P;RAs!7|Dj3v09s&yZqzo2J;NZ%oQlmxsfBqT(%t-4dnag zI{Q9V=>#9Svx)oYxs`;()f|yR58eUDAt=x$lNP8TK6^cBz23bm~ zCm>gfGqJwa4-9Kh@0pA|bO3buQ)e%9m;vk}r==@ZA?J(KuI2%&)6XPgT8XrXt9n;8 z*Go|&lBP(n3i~!})O>w}<9wyl7~=(y_#ah3m?rzGYS$`)`*HEn(C0j=4VAk>79EMp zU5EjT22fo+rvxFAGCj06?E|At3H#b(VY!q5>h-t zDM`J>dbKyd`5EWn9gXko;cgx>&kRMfhxmfE@#MKh);>+LzJf3MP4?(9`*~yb7ApAJUn1g7!{JMV4ThYa zP<%;nbg`;PG8Nd}%f`+4zx3JwOAXp&A}*`mt<^J25R@Lgz$^44!|f>;`-Yq#x)b7Q zOWJF;ZLp;tWI>%W0o)wG0)%PsXMqPUw^C*=R5Zh4LEKc5r~fDMB+V!1YNFpiZ0`R^ zZ#ibhXF+#t`9m*`{fh-6=5#=p|0l-t-_oEz7c0KPN^M3wTSfXlYmW_>CpbvN`1juT z+}{TDxK_02mtxCqGayX}L55Xdc}4Y`*t}aT=n|Ige?RsqMd93~kFOPEht96w0pP4F zg`UW!L?L5oZJcL$iLtky}VlSeu_`$+O-mm{nym;APhp9mK z$+rCUXT=5W^VCBPC3wPrMAtKO;y7J8L8i}Evwu`|o8lf<(d>TB3byk43!x)Nmy75Z zG?Is#yta&@=9vYPI`SiXzB5A|9~iO}wzIY$ZPyME8=xCLLrXRzh2z03)1KSO14rn| zG`XLPSF}sJa&&2cq7$F;*F$Dvz?q+C=&W?I(Gz(AVa?Rc0~lyq0<;DwtpX}3Y$e1Q zXtTabRFs_UY#&Prf8J#YxN|ovM*-Vkk0$k=GK8@bJWVTRCIC6>bj4pKzF61NHFb5- z@~g4JaIYwd4Qw-8qF%KZ@5M0MV-@{mBpq z!5XL5X_WG&BA}d-h8yqdED!dNK*TKczeiNqj@E*6%f`0-Tli~U#9E&NJu0!J1(R?` z%R_1^LlMHPijFF7-~8zyf#SPL%i-)So+p^q%B&o~*m|;SPwo=E`~2b{^R27B6E5!- z{wvoD-}u7>;COA3FR*YR4KWPV6HMVYcR~p^l@v%R3+QH@eJB>zvJh}@!X# zd{#tTMw0?l8eHz6yWphnG$PM`j9NXqMO^b`WD$E255L;t4Zd1(L19<0=KiEzNFod zaJ2fgu4Rz(({*4)2Y9-Ns9Z-aTur^tqeB8#(W)rx2OEyRgRkW;1_`pg>jfGkR-cd_ zvpj#kt7%C_0CxcD%bZvm*=p=(RW(n8K4{oep-Zq+VV^Rk+y6~ozwZ*exYc`Z3Q5~! zWdfz9g1oPJj(C-zUZN1RPITCu1)4(xAGD0F>09-Mz<&uxoGsRN7rg$Wav?Sw`TZXH zqw6|76Sp#>LMEkV2A|^4X$G){{U?VV`{LN*0qj=ejCtoxNC?+Jrzp~?hmWBw_%tBG z{RZ5~`7OhL@dFS@`)QPNb}>Cr@1v*F0}D60b4RI*J?9&Q7~s=3F<3p?QY!!^f3oqz zN~0^^TWs-*sCU6M#`|tsIYJ47hJ(uZ-d@sCo9}Vkbxq?4nAIF>MGZO>Wr=Q>K)xx z`8*?7=5Sawg@vJ|D)=6*io-*q3!458sin$paXom71?G#GKF0`&O3;bUM{ie`FtrX) zA&?>r@{a4lWL6YCAW6bw?d^{D0RvQ#RQ~g0)EyUqNs7c-HC=^0iv^xrGMDF9BBRi1 zj}nSYY@Cg|(<-u(QpCyU7RjiD5?w|^H?)a@jxKi7r9$?Z4*qQ3HkBtDtih<8LO!H- zXHk|%_pVS?8_0&4$cx+BeSpNSS7`Dcd=m7XyTTig z%3BjtbBgDmi5sm^1?Q8Feb(~_qo*xrKHQSwtKK$J>(aF$k|<|E$5j1TIROint(Uut zhH-%zvNZGJAJ~mWcR~^3R{i;BXs(q3^_c^JJPhcDc)32-BO46)+`y1R8z8+TJ_Q(Y z%<13p4^TW3Yo7#gMgI`{u{-d&8UMNO|P_Ad%kM<$yn+mV7Dk?7|fC-1gtKQ9Qv))GbiE@yM9o2 zm)@?N+~UvqKT`h@o+t=#90W~{ri;>dot0ZPduDsIhI*b*M{(snEp=sY-!^s+Mg&Ni>M4FwcZ&Nk{wT+ia~J$ zj}{2yA~eV5OW1|uI2~AkbkYq%j(Y5CgP)F_6c%1zfHyVcmhRL|i1Zc|{TVdy_)?ef zVbo!pDXWu4xE{AFHy}wT>VdIAzR>|mF(!>|fc$)%J*(W%pB3qQK@S@R#?DV%SKU(_ z@dhxBjfkA$qUvuzl(xDy-CnBK{Oz-9Q9mCYET0^yzNL|c81O*c(k$WFSqV2j33_u5 z0LHR*&&fk0VC>cAGo)VJ(Ruym3_YoF7SAZ*l`sW9DpQqBCRjRMKpx|Z&`oL)s~`DE zFboSR>ICRfSiE(rZX;I7M-wwMxC{Oz$a!-r+P&dktU^KnJC)9 z8%uc4;{4Gmi8V#w8SzI?U30OEE@%hC_ITc!>s6CpNj^iBfw7YdfC9C>JlgnVeQ5*( zRO`a#?0$R_Ae)MaXjRzb#gX2^^&np0mljJ@`6E7Fj@(Hw=@D$wd!# ziNaHa>c9?*%oSRShKv@+@m@{q;QNW&01vIVvQ-__g^!52{7S=l&ZwRMjA}_3U}pL4TflSUsX<3&7+?*nbM)q< z0O~fl&Nc(iQ_G_(ZfU3*50S`zIaJ{QDRgA$JMqB<$cAolZ4dc)W7}s=fSA+uz_dri zE@V;+(M`7%wpCr~(DEg4)7qs^q{RBQ1k4*z0fcUPm`y5zJtdu-+L$k8rNBotfXU|M z`1Ys~dl1?HIV9HT=wDzK{w@pp{-90XEd^^mJ;HGYG;;?yKPhs<1xKwOl>)nmrF9|J z*=>n5OW0mnvsoJ#-?Oth>NhOiC^kvlI(X(Q@Og00eIE^jZe==_?$uEX5L2U=r4msS z@Fa24XmE}M;6xrf=~#Br5Fasseg9w0y?0ns+t)6N6$KGd5D8KgsSyyQs0dgn5_$_A zq(dNp(xfW_DpinxbSa@DE!0r9AYEGMgd$C80i<{C43@q3@A=NX=bZ06_ujwMW!74A z%{j)HqrBstY(F#G79`miE}F^?`V=Y>!=Ie@ ze_ay)zc;7y06wupdy0hluYV@zX|*$~j@@XIF&^R#<*WB|6taaiI+mXAnzyLaf z3@HzJ$MDbX%0eBA@{0%XZ&$bC)=yN3>1W$(bLRY+>j2Q3yhk!j`7^$Yz~GcbDJm5y zFW*wy0>!VW_@fR~z{hj}z?xyH+s#(F_(#C96SV|Xg@jyiGVHCfx4Xnl3_wXqsAqjc zY)^V+OnT|5yez_2a!pOj1tioqUx?lN{&dhX&11VOLBT(RpZFMsUylK`lyM7fPLKIv zY{|t$VQsAp3=VOIAXwdPoSrDgH2zK~d{?=uJ@SB;e+^T3P8Oewowc56LQ5~oNJVzUCRWs~7TIo0k7X)y@ zo#>A^=o8LQY{^xHRa)~p!fRtT$WAx5R}=N ztHikR5^)Jd-}M%#@CGCbe$+04NnZhhIg&0!XwR8MEj5t03bd7(rBQjt4|^kJu#ve6ZXJ=bZJ|u8l`3xp)ZDf#tkRhE;4?$>KhXNn zBTj3Ge2A?H^k)rFkt!1OKJd>xS;8+mXyNHTM-x+%(iJvnmC4mD$>5>Y4Ol(2>51-8 z_g)e(jKdo+RaI~8JN*ksGIh;+^KGeTF*ds3NTQInf6wzN~y>qwfcfID0nhU#=} zp!CWOI!!vR&3Y=|VsCwpA}hgOHkc@;&%^ao6SOlDe{3CRBKgombiE|9bbw5FaWFk} zn+ix&@~eYf*$RC^^uB%joiqb6gS5L|Q0)|ad)$%lVvDqv6V ziyg=4#iy+%yoqv>&^6N#NdvPYBSJwaa0eu39)P{`(!x~deXvZwP#OScM$+-KZuP&T z_CddY^fmVdyMKh8{kSDm;{tFI4ckEC3jD*>kC<4D+ zIulSZBo@+u_f7JgSfgFN{;OZ-S6ceeZQ=(om5#z+h57pb;Y*TH*$#818F;ofJ9-i& z+FupIOF4#UH+>zw{zCH>UQ*k##}00aWx$(X6O_x#8) zP_8Qj`!8~&!UgVwr+6#!dqmo`Fkwcg)j^Ma%ROmI&5h9ZoV@@=>$~HZ0PrE(0eA&$ z$*uy`7`>vX8-_I?BRMQ30fWjr9k)3Bk4Mxk)Peing>X3Wy7r=vK7dl-380dqSo_o2 zq)RrBh^Y9J!vNj)8$ndLI*-z{PdtztGqdurS&ZCLC{9z<;N2k|aqQW9kQHw|f@fBV%- z71+rSARH|C6)(c%qC~w!$7mt7%-U*QG4ygr9)HMUdYM{=v^Xf+qbbsjgq3_;3Ta3L zF8uVLO#*i{GltU~@KhAqmQVjWH>#XIQePq`NW^rQ9Qpm5cq25T@5gCRijY+X-)-&u zsB}gE>i7z}MZ6bjNjidlK{Sk4si8DDiH#pFOHV2yWew(Y)Q|^PJeL>WSqtnik8tHg zDxrmZ*VgQP$(QQ>o)Q*z_+Vut>>;}lG)U|EJ*mH?OymU`UA;R_n(QV& z!O|2HMnHCyf?lYf2oqnEvLXyN8jw;l&I^%flN~->szoQmWEEu0mSKZe01(6p{BUI* zZ;K6j8s4X05(*p#@V3rnxOVGx)GE`|&N?V^5L7)|G(k__h;|7|ODfvRSw~&mX{jh+PIMawuheH$V^c_q&u!gPy0L*cLOnGW0;&u|)6#D8rho6Z3i6 zDwP$*M+MqKJXe$7zmE>%S}cYVQ^WV#rtbr6&;m5(j4y6OU5bJ?d&Gccf}1Os?Bvh`Nu}vvst;R$|^sfY~cc> zIS=z9RSN+iz@B7lT%hXHff8E-TXcv&s7Asav!FxZv*o{O=46UDNXvz+pD*r0CvCa|5Z!-FJb;~nsYFG!U>YoLoLZK ze`_*O51vuEa}sxFe;Y->5BC}#wEeeoo=#Fv7W-{g0kNY+Pdeo)E4~z_*P(6 zTt_d+hP=78wt7TX0~t)nVOWXRap`q=d1o+yxm@(m_*f|65CnRVlGmMcXl|m;QN&MQ zQ0hd!(0z$q%eUXyKo)4ZN#4gHw-D6!rLP6>na*tfIc7 zX@E^hq&-V#6QdDGH;2y*jcHa=e;o8icsOzQH2eC-KBBJKB6248pyoL!O0+*Z*Bba| zW*c9kxGF@NX}MWEFvU&-Naaz$pb-A;3s+!r)SU6w=xws8 z^l*i$zdy2aTC6ijnd$e&?UJX`lvFba!gY^sLo~wb+>V?9a_6`KGQjSf_w?$mwMbfh zPr{@o|G$PG%{$1xw*Sra{c1vS3vZF7*$loYr+eW|Chnj}^;W@Y=zRyt>z)LHqI;$@ z1z*l@sR8q7+4bP8zu)=Rz(FJJKZDS;9MmjFtZ03w7+-NsYEphEH}|(tBH8C(de(Zm zp_rrTdOli{do_xNzRJ~Zw1fGTuBd`cb(EN#l(7t;;EUaEA-CfA$IF%< zqn(^ph3H!PXjO1+5P#-!fxl&d62ASH_bAg=oM+EM;2=^Bh#>_OP?qS58-HUL>%o8D zGv9dNLP0+wTsc+cQYhG=^sn>{_<(|Oe8{vxQf+YU_kWVmHcYev+rq^@d zGBn@Xt5g)s#x3^>(XFj#NNFy{;plT>feW++foHmkoAp=LBTgqh{Clo$m*Dz&ToSLT zaLv#+75Kv;Y_;wbP>KdhtX0GXMTTi-Dv9C0f9;Zodk^s&6YP8-#jz9q(y0;V!7IC6 z0kO>PF2^@)#M=pYr}O^vW1}%rOo=ui(%A`j)XY%SmIo5d@y73b9OIuw2b+U>pAxwchX--vBm+p9Cg?t>Pmli%Z< z4w90GK zf00oeqry2;QkB0ObD#}ks(0@_ky~R1l5)f`fl9^gkU{wN!U7?gl;L2vq)Hiso0gh^ zHh8%8n2H-X?t5k5S$yB~odLUDVLWnqeMOsTD)*V4^&1^pAj*Q0{`BXp`e> zWi^$>q?n7t{_jD8;a=R&;kZtV((doAUQoQX6Qjtqj-m+>+p4u1-6^43WN@i-YtUaA ziOFr_y?*DK|4VY-_~|?0%H18L8l^#3-w@~E9t=#sG!nWunR{SAYT4lBKCWmZw$NzM z?$#H+y3`Wzq|11*s(KUeD>=$>{cdUAqJWglUtA~ z&RD8?qdC)bK`J8~GtR!Le;>b;1UY4aQO<_;l2WT0YH87eM@(D(9LXK`CZyNxHEDm3 z)cy30*0hnWn(-J$Hw`}fnHooOugP$SvA&I}+XIdqEQx638zny30g2m(Vj167g42J? zDz??6Sk5HJIx<|jXI~QkgI3iueRGAgfm7^BSG)L=S{aSetsEg%kA?R&J9yn!m-w56 zIlv5RS>4o&%7)GMqoPdKcBuDQ>QBFDc6v=kd#u54n}U5M6wduRu=}uyC$x zsR@-+tKu;Z*>$z{2bB(y7y}WQHVrkg%i_*Sc(grEGvk@_#(H9a*Gf^;_sfpo+l$3l z78ef|e8!z+vOMfY#SXR2;S8AY6b!BnR6l^c2ERakiv=Jq@RY;9UnaVkB-%&8kBE*Z zNe5`axee0m;J+hCpslz6)>xv8`BRP0{?TpwzZL!vD11*A0FObo6=!@EFpTB7te8a- zAcv9WV)-0TOebKsxULZzje=@`W|s6U+M$_WFBQPU9+s%?05n8_yG9=Ht^vfz;v&8~ zg}+-0qr#)}s?7<2V8Qq>$6Jd*%p9rk{>CSy1K)Bd-A%L7ptd{}3XWFPd^rJ5j6uNI zKMcURI4|FLd~Z28Sxs=)T5rD(#KSF*Oi+Aju_DeNS@%v=@o#xN9}jAMoYVnBl{|6h z1-wdhW!a9are?VOm|S4H4o%p7VfS1$8+MWK*(e*bCWB|k)CZkGTK4^}%tcZPNJ_C* zGHNSjNtpMYvtiLp+PPU&g+^wEFSiVZsrA(&Xm3OPm!AuPIS#T~eoYBycwLUE$Xt*} zP7gXQjY;7m=%*$gy{VS$hZ>ykl{KXy6;`JaB;I8CvI6My+W5y5!6#@E-pXzyoGZmy zhJ_mRQw2Say4I7e)}I4sMfxnoXXSm$$sv*%Y!rU}dF!;~xHizX5UGzZICq{#olq3s zEqYgSCn{keo-xPp(eW$~Z(9!!mCfdBiMnKK{805uVxd$XSt7ajb^WwwcgE|*bp9%h z!LHYOJSErnN}MAuZ?%oH2tzM2Y^~R@`2YAq6?5_O$NtULv6zG%MUW)y*amf9Ie=&X z=C$5g261xZmy13NJBL(#rll6dyMmyH`*Cq%py7JFkqD@*-c?TS-bTSa1Ni|1kqn$y zvu#%fTLpR$h#$pytS(H3+*Tf1;rMVYhtqfM9r+yl#a=~@YHbGWK0Ngz64iSfXjqwYr3`i zZ2>u&B+aIdmWj_%d&JX|_0U9U zi#fde=5~%k0gmZlv!SxN3^3~oTlX)4{`tG>(04)y-)#3&#}}3TTnUBkVnU6i;+voH zp5lv<#2z$cBxKM*1d=>{XO88z+Ot~^((0Cb+8$y9I#1of_kMixKyBiCvv5z_wN*Ld z=K!Z+;EqkMS;Tg>1E_xh0u%&oS+ZZx*XSCgFs&*s;41F5t&7oY>Ltu0^|gEReOD8+a4is)0S9O2h)tG!nSK;*cB zt3|ZQyF|Jd0d@(&%xobA28VGi1RHm`b$X0HaQ>A-TG*zkp&o!uLE+6M0Sl$(_EJRh zeZR8|+x7Ier34W5Q>o+0_2gSLIlHA9;0V|ty0;W0n{BANlw^XO>I9t1+}*~g1cBu< zo7`qcXk~o)w!gDDT4)}Ew+VTFq?`S?A@67}EG2E^FWg(tA8{N!O^HTyM4mGwTSnz2 z%ktqP^7aofCB;VqY;Mb1PEXtCLge*@97JePPeA4kuyl<2oW5|9k};b+qlL|42xj_< z|Is_;A|g*ii!ia^BG2M+g#tJnGwCRy`!Yf0bq^% zSu6z9Gjkwb#zhd$_Au`HiWXlGegc>@qv8pqaJq1$^1FWj1Jg! zhelXTYKoMH5f_DeE=^ynZfjaR2)Pd3XM>t#@z!jhGq*vs<=xraQ%uBDaAfnMa0OK+~TC zg#$empmsxsKjNAgEV4qU5PO)NL;nR$+&N&K1WR!v`lsk0Zf>aPs$Rg zjh_|oss{Wz^QxXi5gU2}7(d|58K^<+7Xp3jvyYH(`@a@zsA^6Cek2SafR#Enn98<{ z0EUTN}n=XX7;T?Y}Evu}gr_p;XPWW@EWO)po~k^DC+N zd-rOM7hjmmZF`(zV0E*mgw+(?3WG4bf*iYPXtbK{%jIGP8q4ORL%i<|`Sl;=5pmp5QGB2BOC z2)eu0t?J6QDVwBJ>*?4B;7>B9n3fEW_X{}=0|llC3k^`E8Uh^zu+wOvB85foW*>za z=ZrDE-tvZKOrOmsgwK1n`jdREYo?yIngfaY`GOA*U5yeIti2Y!#^8P3@3R&NjcCY) zu5cI^h%2rvcB4NDIj&)#8F_BXJz`ffAEVX7F-zZQY{k25Yj?*u$~+o`9~j0$5l9M#@w+fE+cfqXK%{%InccMJIlu&hY!V!;V+QfFOIpYMA=tCtd4hB-4q9Cs1pzUkyzOP$t@z_n8mdv#r zJ?1bgKY!pTr9Dje8uK1#TQAa?FFIX}Rj}B0bU~Xzn%020?O=6n+_mA_TELW?F%ZsO zjPK*=P0mv2-~^$a{Ah5`snbz*^l$Fp4SU~VpsuuIyF|aGpTV#4Fh5l*!Wc=%C2`G*I z_cl~}(^87-*c}hEzK?oD5J_s^C%asl06W`$A@@`xt)i-;pK}NrvA@Lz?-!|dea75p zMV{01^2Mji48aoaWJiZx9Jy4yo-ekLPv%Oym|gvea&$4rP=$4MJvYUXD*yh2@YRGY z*Nsf6?K&%|oKJod;PL^Ij)D*eq^ZMte}LS}z)eSQO@l^&*e{B@5^bzVPplb}z_ zy7>-Ju*si}mj)dOBB)wPxgZhJfx@OI|2lz{0Zf&u-$i@)x> zN{aI8TJ^;lNMxv3btL!QC#*5#X!`tG|C*Gb?17$M<7FXaKeX5^T}oIpgD05SPN^5O z8h~waVk(ZGgk?^38MAze5pG91)4e36{8-!;tes)u{oW}z%zs?4ln2VaPbrzjVL7(e z(knLDAo?JHSsk&lo|YIbV8DfhBrYB44)V!(mWJ^U^H1Ubs8g~4KrM7)?xm5Wz;v0= z?iH!dzqECUKe(qWQ~0n5w3$2Zt@Sl@EBU;9#8g|E4;#DL(=3o&pI^6WdsgoKjYKEV zEM)~h$%O-*fxhPv)0u-H+0XV!2RUh99DhyQu-bFa^I&HbOE{~NfI{4n&&(KhBE#$} zU{nl^%7L*e8P2fiUr<+3u12**qTp~`&D_IY>Kp-ApWd z0G$Xn=%z4M*U?UO2Th{l;RrmPrJ#V7JOGERR6wNqFAuJ@L2CMVa;(rv0pZ=#xKCZ@ zWGqGD+Ph5taAolL$ZQu0I7IZQ10P6^zd|$<9Sg8-D}$#5x%O4LG&vo@&2%!T<&(aN z^JZB*9-POQ*v_+fI${EEw3D}V=iQe(4oIJJr13PcM5)4*+>jh;SMw8MbkL=1(047x zb(<&B4c*)}76_vKi0irafL_7`X;{U0QL}!jA*m7&FU~taPq5ga6&cI--*7N4Vr}&K zdc}Ip3CSM49E>w7-&kHvKOsy=mmx@=UreJi{R~S?HtB@z#fhW1^(!88^ z%)V5{qL!W5b=N1Wn}8==qJY1ckzOdaJHpTn#RS@9>jT&LYwXX9h-dcQ$~OiW0KPoj z$+4%WNkr+0?(l|A#_si0(+AO}3G!ANlDy$Q8TH8H-=YPIlNc2eKHi@U?PMQ0i%med z=~-g#R=4oenA7IND9#5BN~MSN+KIq8a`nfQFF`tD(p%3bJpt@03_9oGgN}A($DhZa zfs?hSfTib(OiwpuB%pkdL#2Fd(GOx^&Fj{x6xf~j7?qns244$UGhGr7h74qTo_l`c zb4Q!W1z+Hiax;F#Y$R=HA>ifTt)T5Te+hX3O1SD!cAVt-ww(qpx>V(Pq&}h;MYa`n zI`(sm7i||y14P6r+vR7`6V2;`eqOc<8QoZE_y# zX`M8KMBa0r0$$e0SvJgjWqmT%jeW{0G1Cl(fS{0Y2!6q~Z9bU+Wv zf5hpNt*|Sg+6S%@vuyu}#95%jO*`;xI`7&IMzB z-Rn;`^?Ci_YoVTGOywO}B{uUviVL@d2&9a>FT!_MARm1T5gX@b){r7E2DibN zrco!4D-YLph8-R@v-;Tr<%Y(>hCCKMKGN`gjdx5Ntz7RO{kWGa(iiLgJvw1HKNX*i zp*4A<2zVm%nOtT$5EfB4X>5_fRSmZ5rLP^9KH<+=VT%SzQN0Vn#OYf7{PvCC=XJAd z2+a(TW^2mYR&XV}eUrO42avoK1bNVU9=g4Vg4-#%WNs-b2P)97ws_=x(6nUwG5XDS zCjS0{{Q*vTBve-3VU(0(*xu25t>&|Vc2!Q5Kx$0VU48xh!M<0C?%4&ZwK?!t7j?Yy z^{O8Cg!@!gq!P$Unz5$XP8bUZ*M?&qlKu9R2>-Qp`#0spbK|(__?0(!MwTi8+haqv zAv$f}DMtgB8>IIJ<(+&58ss(FIV#ExQGaaKmUJ!h6Z`(fkt~1Hwp#%PXDkZSKj_E2 z*?pM|^+Y~ixFBo9d&AU7Fpgm?U(G7~Vz%*hhIzw=J>1#*-_v$Az4hyyWTXNHS{mdq{b!8OB^nktKEod$Bv)@dX!5sm^GMJwQN%|irxN&A9k%}7m^Af-Hi zCx5HVRHE3Wx!EH2JjaQ zw+7^b)@opdA)GVd>?EBc1J@bW<B)u$W_TGOZ(kSLOF(>QAG(@5y0lvoW^;H2_Vt z8CoY|A1@*s>~8)eG=?T1n3yT4d-mM!={YiPO={L;?a zqe-F~n#>T{v;ZM;B@g%QIqCu2A|AyPfr6{!KtfIEO9L#?)UH6QEyQcrxDWQY5&%ff zzCa0qTv@?`u51VUPFNO~rD5xINv8Hp<(`|%*~>*=OreR*CigkZth-+j97rDpylW-l z%oryHS9k1$ zJ^WRZwgWz(eB32oyqIuJ$7Df=G5gcH=jcbY+z_Z551}BrRX)^Os?R+Gq z2fdQoo5csM-0miCt9+UWy7&^=m4;z^?+gh2yw+Fb-J-6sbMah%_9->dGAl@RMc=X{ zC-W-UKrKHW&R2|vV+SmYeUZWO@xZG+8Z7lF;LI-friLR**lpt%g^UCUreU$^!5LVBWDs#Bf>AaDKNh@NH=D&nwrWO0 zcIU-|x4y_Y@9un4*YJgDKePY5-LO+WdkZN<=kCqKWi}nhN{@t6Y}9WY>3;RD^>xZi zClu-VQyuMLlwt;ze;Y)<9R!A zw_9+Gj2Hs45x2SyPH6_a+9R*ThjvC2c0XUC-0xyf+h6(4wovWTGo^w<<_5oiy0_J5 z;IYu3r7&1N#od<{*eJ-b-m@l2 zzL{R7CvVN(t?OqfJep}azkPyP+v&;PLN_Wds^8EFLR>>{)Y*y+Z{Crm6I&Ju()$Yr zOxv<`7*w*D(A0!@zvVzIcjzcVsxP(rN^g^29G#CN^-1`i!&RuX%Z|3Q&`bXU&n-?Sn+jLHW5No z2wA7e3%mUguCq96oQ~y>CEn64n3w&XyGhG8yCgM;6-I&Y`ZI}?p0l=W3sx~qRr~Ff zr8^;KD|T%CH(;Ze_Lshpw~K6CPiz=fxYLFp;SYY-+O3(ZP>3rK&Kuu*Gu~i=w52h8 zf^zz?mnD|IealvP;$sViEK9wC~berevqhPK*+-DF(Q0rAeXXDH_ zPMnk;(!xTBpZf_$uw4=tHm!cSu=C2xW16?xVPn+O8rQH9lQ;SeMN3(^8X4Ak7*nT& zFwzeFAOJ$cavKu5`hRW-9WPcY*mkdGgN~kq1?dvDrynhK0 zaTx*tDDc#eIM2KQu=emVx;4?a?dD&@7wSB z`8kGYb98_yS{;SSTaTt#$yc$UJ2WZ8!wG_(6a6HunQuvl`%QGGtz$Wghu-mV?lEa@ zdmX?*e<-uT+B32wBflTr1wU7xfz187$#!bq7_Ut1j3N#Y7r4`jMPl>}g~B|z2ktq2HQyN(0O zMo;tYkoB15ftTi9yLk;_%WFFaKPFVgJUb?Nk@}8h8o0__N}|CX8D1tK+5D57YqD_TVw5_~NIN;&NNlO*caXh%;MQV>bdXI~GB?jdwdM z#q1ZXOOCuHH474(3hyigr+2b?@W7RZu0QPz+~P3~FArZQJwby_xeQku7WAr@EKb`c zF=B~)*H0G|&k^GHF)zZk3Cj?h*-)tj|FBFJ!N_^f7ui&MV4k@r^&n z9(*@9+ZUhEha^pEEbdhA=&vZIf{Kz~ZcLwZyA|zRXSrHRN+^Hhy(pqd+!hLG0b7;`gt6!qfBT&{~DrUOMtdla~g)I;T4qrUS?Gt_nR( z@yIvXv$$3AVf?6dH~5l^YFhV7p|dJec2-0c0vlYKwC5UF{-pY~Y9@EWB9F>MZvBB{ zg7o^{D2uoe&~xMd!G`V9hHH{;0)U)_V3tZXr7KgxKxTo1d1MsJdJ)u`F|8+*P9JW( zAg%24=EBCjOSPPg^BvaVD&tq#4xdpPWjJuocq0=o`e{b!Z4|4ww@?Px;>E?QFf__7 zpqRlBMD@KNpZ8z+EQHUaYHm<|qN|pCB&As0EbApM{8RH_T#2TV>5(a{z%$fD4l(@` zZJ)bJzX48+W#7#~?$`BuRJk7{cuZAQ^Nv7+K#^tJ)QX8P!HD%u`j(W~apbqmOf-Z< zqWoam<;vy8`1K@|KHoS@L)%Y7PSADjj;lML@XkLohw9)=b-9(#ib`*$$gi8l^b? zFR*}Ft*|d&;nSPR$r1d6fSKb2iPkl07AidTR8-j5@eGs5NA6c``FjdXTnzIPQ>|#F zdF}HjdBiaWvc63d8CQ|Ar)j7BtmY=1PIft*%|C*VE2%$fg!NCm0+HByETGZV%cVRY zd?+)PGhpvsS=-sqZ)e%@T&p_R$!}s3u~>c)qoHpNBxWy6Fr*QT{9EWIBgs9)@44?Y z5O->i7c~_tH-5!wX@bVSqNpB1MJTI%Y2U;qCK048eP}z2-2mdw&6w4i6x0H4u z2Zj*S4n*Re2_qf@d4@nulWZ>* zVNzm4QQJX)k`i;iP5&y)Q&mdm{=kCJT!zV`_{W>e9%B_qwKl1g5%qkfrc3bT3T`g# z;p^2B35#cj9!J;YW)HhqUH{-7$s~ALjEl=AoE;FB<^wx@8N|bMzfG)xo*S|gR#Gy| zRMcON#6E!EnJh^Bh&hw?{)MGfytY|fbK@gICtza)3`zR_jgO6vs$Szb<>F5sH%1=cH`;1sUC)1FB>(V=?<-VBK1VTT}R3zAlKNapxJ`duKeK3M-aS!sF< zo{g)xnUu@yFxPps`^Di7T%Y6cMX-7h9Qie!j4!73=+>EGeaK^vHhoqXC{{)p9h}_W zBc*c(K~q^&3iXtxVWxj%Iw+SqDSQQaBFREPDm=i^5>G#7lFlJ3*-T3Lid+3N%>SAb zr{ToOcj`<7VzEw@kBWJ(*f+$-N{5_?N*sNKXekWc_r7HgU4(6k7ee z{l9lP0POnnc+f^mL=OU3+3#!!C&@jQ|K%$TMF6&T>Ju?>O{PTpTMPgIOfE)j&yU^) z5V+4yHmQPhas>>>KmP!>jX~IE5Mx=ci~Z%Z0JPhOv%mFE1-BtPuRQ;qBL zS+&p9Bu@e66y(x>d7nL{s1e``Eq9KKzpu91Xw$;3kC9^jtCqlE)i~7CrOmMqFD1wXOks~d_${a2X*!w<<1^=S z)N(u6`;VN2v^QKf=u5_RDr$_3 zx=YD3T4k=BAsr0i)XJ1#k<*FKXRj0w_ysA61^Z7VK`5Aua`<%^!c)({0SKVZn~R)d z6#XgdvMmMC@p}W`URz;H3w+rYvs<*X8FR+sXHXB^$NzF`gfNp{AAWzv!49kkx6baF zVKD`!sf~-aW{|pQBT0NtYcU^8bT6pASYj&>a_j1BpOBN~P0g^DlAPlo$X;+tK6={B zziv{wu%r z{-5?69gJ4?mzTC98!S*R=w|?~e4G`U_WE_*()1e^hGP}xWahjaXP#x+4er)7DN=8@ zLw6_hYo3HqS8dphEe-fqZO~Rd<$;rN2mZEP^QBKhQ443>1^fwZuvZ42zEFzL&8TZ5 z_=9^?Gx29SM3M-Bu{XYXvzo55U<3oErh1SMPlyD_h`V(x>v>?2&S(_L=Tmi$J_|{@ zq?+8i&o#h$KA|y2uIRd!{w3@5nZdfw7TxP*EtG^l6~pCcnUC-)HIijxgWIKXp9JC_ zTL0zrJtzNp|HpC5*C&<5F17YxieNwYCi|S#@j74Gi?pj8qI**}eQzf4XwP^x!mnO4zkgiV2^WbzI3CA}^gq(`kQuVQYOM!-eLG zQ6UTchA@cM%z|MpuQU3JYcDpk>qYWHkrSu-wyng{Q!6(LEh#)}B1Yl|YLdEJIiAz; zRK2y81`Muq`kv_|$BSC-xG<%}4}V3eh89~_$VQz!A!?+GLQ?Ng%ebfO*+)KPLAhuQ zG{)Pp*75Dl=Ga;~XV`O&%22=J-ch-SUFp@lXRTrR`fIumecoNVpB@ARUhcf8-^UgD z#itR*n`we(7gxSzs6V!29~-himtAwekjy|%)ACI}R@uW=0a@v98}9jhTxzKpWL?t> zgw>y8{+~AGGdIO9z>0Q8=V&^F{f~Q3>vJHnIqJnA@#s80&zdwTY>J@?C)gCm!~7;s z`|*y_w&A6wtR-gkXvk54hJwxbq@*71HQCjzw!bJ+Id_TvXZ_J;=Pl*hvE-z2DHr~v zLuu^Ec37TlA|6=;g05kw#1F;%+i^`u_N9ccbDd(J#3wRpI2A7{xK=C?UXi^T(ztbN zxifb}XLDK9xBZ|%1`ffzTTCKx9RC#s?DZ7&0n6xy-%}3A!52eK&<}a&XJIXzTn0-6 z9tZmi!RD(+EpK*gN>kUVW#rxRDc|Z-Ds8u*=NhzZ_2;ceG<}AVWRB0HU!P%PyCLcA zeead-&0f}YM~s$oN7td1X@Rv;{Y7D^BphG-f0ZT;LI?^^fenb!rDDj9~&BQiLN!( zw8wL}&n4D;+MuZt%UUXOBR42ZTSB{$8B}2H{u*G&$GHV8D(@$M{=nwC;=g2zq8ejH zJK^!y0D%m#pnw2gt?o(|2;h9g%8_oJ(v>KE{z-lf2#Z5w9{1|`H>dXN(^s3h5b3#r zVWzo>D((Dqg6_F6-umXI;vbtGiw5@ni^#g$YFe*Oh&Deg;l z{VI~#DUXaI&kNby&{_*+sCt*ykJY4EI32<^kgOn}R2qvj!>(K;7oCzl?TlKq6k#{4 z${CR_bRYw}W9Be)xX3E9uLB&TxaIV0L%=WF;cJ&~;YDikQgP98*};P!HKCN$;sw0h z)0J(~;$9kt2UxO%x#y^ek+1&pZh$0hx*8=~h^sz_{Ge7}443qftaix*%xaUkqV%nG7XxWxPf08+rZ+NJ$f$sgiY_ zo-YoWr>wv(`CbFC@Bd9WTmyA`J^^k++oTq7dVNN=~=m#Z$AaW zpB~?M^H`(-pY`TcBxttyLlsV-#m zTF-7;?o_0V9ddh|rj^lw)hhFWV{jY{Rl`4oHY~gwOYs?i4s_5e%^bRNOPkxH00GE|EqRuyD^ZerP;u1;6DX^c< z09I*|vd={K5fq$$U6X(gm%6kRsN3G%8){k4@F-Gx(X2LKegwmOI1=WsK%Y_7}ivJDA^S^f&2(t#~BJJ-`f299AKl(HOH(QJYH0tGW zw?_g8v)?LdCU|WIcScjGUFCVEe^91U?z=%!(sX1d9Uyd32z+U^u{C!G2tvIf&NZ zd`IU?Ijp(45<|8#q`NsmK3IrTk`0irJ)e&pRi;31mv~%Y)?W}6o_(6z!jh*%@$aWD zETU3ryHZdK_NqS$cMgPAaN?EuOJgx)UM}`ywl;PjS|{f)4&{VjRl z>V3ztMH_DSNnziR5%}gx08Y~qqlKv_Ic*kx8WzAnd0n;Tak|lym|BE1Mp;OM^YpoY zYk}o{C5}>oci*LpNgnEHXA9fjD7m=*qqv6MhIe;`!MD2n*4hTFr3hzSpsn)dkt{yb zJ8`fC$8~{(*cUT=nAq6`j~Lb5P5ZFlKv5@dyWJ7wTOGI%29ptYaZB9zQe(b&ecnw5 z3FY=TYoZPy+|$6nRgiM&!MYgo1Ir=phz}-lOu@38sOiOy;q4lyH_1ovsr8ZZ8yaJ`)=o!{r;x+ zZ7-*>Sn+C$HUqu8=A*LT+$V9jRd9-DKw0j@?`pyy9g79b8C?H1B!2?I-?r@U(D45s zSBSZPKp31VpWsPLmO$6~Z6v9KyOv6QP8vw}6`^;hQSW5{= zAj|%pD!0U$XpjNkEn>Oz_w2-$=MXz7KB9sTQ{5oXP71dk*eIVWz*RZtj^^8^WjjcG zPVY?Cvy64y*+5MErQD(m`LOdJi&KaL?xIs$?Ck=%k~r_CcWLRKdsq=yMOXEFo0i~d z{TYQl^PS*0z#l<(dlsPqk%rIe3GjFCZwyMEJk@tn^wb}P-lHZv5HFUzX8A0LqZpv# PNMs}xBtAZP?EQZM*S^jB literal 0 HcmV?d00001 diff --git a/windows/security/threat-protection/windows-defender-antivirus/images/MDATP_7_DeviceStatusBlade.png b/windows/security/threat-protection/windows-defender-antivirus/images/MDATP_7_DeviceStatusBlade.png new file mode 100644 index 0000000000000000000000000000000000000000..379f1bbddd0fbe2255384abf02e757ea19f721f6 GIT binary patch literal 27232 zcmce;2{_bk+%~L5QAr48Ns*F@x-c$WmlC zV>d;%v6YOSd9SJN`+J}F{hsG|j^q2@*KyxRe~kJ6uj~3|C6(EuQ6_cO zo=!D#`fRDCLU+&AaDDqiW1Dq!gY60SFVw}CZo0Z2EYVB`7r4St)iND55P)8gqB|vd z`jXJa;Oplu91XpA`4G#+7iTVBzIWjr520$itEVF6g&O?E;Z;LV(V%_5m2Q&xgoU5z zt5*jB$|wJqFRi%5o8Y0r*Ta-I{=cuJwEMk(UxAg71 z?n;f3f@;uaregKLBu&@;g})Jxb}|F2G**}I)#F{9JH6c_mz=W;4>p4+wfq#JlWZcd zulcx@^por=bJe3EVq&KWhrrFtoo>%Dzj;%h(<4kgaF{2Kzg_EOQ8Ajnw!=g0GBr9| zWSYk{b6hwg|Gdojc3-ZBr?S^n3t9Ht_tLc>U!;YDv&lx%L6XL1OPz4a$K~6*xh*lc z5r{=`lkX{Q1v&EdBdp9hKk5uqzcf}z`8XQu5=a&AyB(4nleU8B>Pw}abbIMak5>y6 z*|pKjS}YAIKjJ0YajU*3D}baPL+hXYe<|<@LRT|q@>Ma%1$vY zEp3zUbI#%G)G36%g0Oru7zw@P%r&y%n2fz3sx-8)a3q%~R)TNSogo(QC?RSz>39y z&8J}3$Q(uOz3_+b9HK(aPk4ArK33U>mHR&$G^DA>U z+|??eCqjsj=NT3clOYxObynhL>PEU7c(}kJ-EG_~Y1x)nyVxZ;I{?k2eOr#C!ZLt{ z4djGW7{74WBV#R($T$ptZ$2rWCiinQ+p5rn;i~JWt7B}r+P%HT4x=2M36S>8y$XTC z)~;Ub+H^jsf=a4`g05Eam1mTNg)EjT+2=@zMzJR5c-0t|MOIcc<+a5Ksje#m`H)pg zw(BoQ*`er>dXB#3TS(B6AF!V)>Ep%M*qj z91o+p>c%Q|Fy$ZMO~oR(pS@w|{IJA@yM>lR6ZNEy9q;i|RvOpf#xs@1xnpDf#l`8) zc^!NHL9L#1ORICCi&_bE6F*5R3N5pR<$lE^n0rYFq@uA%`GuRqU8F$AAVxwh!7&3D z+>d1TlPdgJ36@U|ojd99x9d%ekVi&z_BP@sl;T80-;{m9T&kd9CtcnJ4cM%5@iWI3 z*``(^cN{sVYgc)FR_iy-eHZekrlzP1hb~Slv+aqwpg7vUyRq!|z3Dg%qDfsB7^Tk!h8fJRxC)afv|@iyfL59O6ZdM-LmHp;RUw;OwW{qV4SLSXo)AN%6MgBHl4HGxtgS zbfjs_!28P;W~1`h+S&Xk>0fpX^J^nHw8qEdH|jiZVt72ASob=nm4Plu0=|tCQpj??7@9eH?e8leWMgvnuXfEb0 z{)g?n``8rYa(;mx*=E`}9c7mN8I^pFVY4hqA*07I(HbxV8o5_Yx~Js$h@J8L!2LX%3FPZ`ss2vR-y3rBjt8+ zE8`x=nTwve>aW>4vADSF-;m2zKtH)%n}OG*uQC%Oq9c@F@E1ko1q7O;Cd|}*68?c% z&xKz?UJQyK4(o8;wdhp77WfxZ%Szg2Q+=7m?vbh?$p*tU#*6nJkYVVNL;mEKX;*i> zxs|M0{RxpDrf)3gbhe5EU$&^C9bb6|nxBfD*}b_4vztMs5Ia0q4B2Egt+sArWXDjb zzMI}LnJ(mtVS|J%=N>LEMf=j^F&D_1!YTY~aC8{Gy?o`0-RIX==Xx@$xTN2$O`MB$ zi!VNb&fkG|!Lg{92HP`97N_C78>>VLSgAC5Pfau0r)tCgMGeg8+!S~Ewpl!8IqO4W@q}bcMgb3*`ltyV51^Y~k+lqi=z$AYZEi3Js zr*22iQo@&Ub}}p*!bg37O717$GMLNuu>aAoCB8u5MKm6x?gf|~xn`@(EeJMke1i|^ z!D>X^5)-%**wCJ_f{LB&{doklw8S za`$b78P_D&iR#Uua5wy123v?d%n8#Q?>L*+CSvp&mbp3y5t_R}>_gei*>$6tWsdRW z{Bp1!b(4E3aKVjOVW;>u7rvbv8dbauwjlq=zQC+PgugmJibpX-;KBL5_aipQe;d*X zHA&jILiy3o!z1r8|K!N=a^J7bv{=Z1CMRE|Ef#s0L>jTptZ)h_&`E!L$p9_iQ980i zuOY`=WSZ(2>O0^v%Es{3)_Bx+L$=rEeu5gS2ysiAio>>Ek(j^v!oGymqb1Q)wp`9`1p*D1ml(xUoZ_*996+`u9e{GM~qg)3JmDt53+ zcp?w}X@5s)xpM6&`gm$WUakO(+UB`h_W^FTl0Zk2Hs9#@Af@Mm{Jbx`S>0n`05kT2 z)goP=*XtEr-&DALMu@47MTDqczJJdyQ`w|3sA?>sdT!6-98#sW2YIXbj=!rzGw0##LpJ8-`W&4L~8o+%y08&ndX)psiWU1 z{8nxwg*Dz;pEPt=y*^;FHPB&iSGsr6X6pDSE%KO|Pa zu`r-f{4#Rr&56-7jxkz71D?V!59P}C-d&Wwa^+KhOiJ}_YDwerip28mhUbK{x$;5T zGsclMq5!v|Yo$P?koAw-q8({J?R*ThXM`pDa{|3B$=|Cq2X*B%5kG@&$rbryE~1?k zQ3ldr%?4BP2EvQl#WFciMo5J#aRTv`T{<+3AmwmV>U{J{KKhcavow5faz5Y%rqXa z7VuEry*Xy!NX|%#a)`s;N|;a})w;uN3<^74cL_Yrkm31`%}sRbyTz{wce|@)pQlD> znlU1CJl;UJ`YvkS(*EG9FHefT{AVfpB1pOp62>=(iMR%3SWw;4>XcXLuB3E2 zEqnam0XrVVhJf}MZoeN>tGt$-7wXonZsD&npTV(uY8C+{t>0tEY_g$R? z9WOS!t$q8HENKhUdJP&4`52k0hM?{VjA5}-z|OcgF@Rgat6VoqzR_brPj@wJkU;3p zP~7cSSanG5?T_JB2;8hAViBdh2k<}o0m9NOSzzfy>KSJ!JqlssUm_N zuK?&`y!QQZetc4rE&j5gpoV9Ee?QXR-s+|ns2^Dbb(RJTJ{XXI1 zcWz*pF)HtU|0I}ckU3H3ZP-2L+!$cxy*m_H@-SmzVS&xJ7kMPkwEW>qwDp4rh!3Nq zqo3jg?YqaSoQIGGA!?lWOA`(qIreU2)SmQ{JY->bAWQU*OH1?LobbjptV#2b8NMBi-@ko|gU2T%;6eIk;FK9A8JRzOg&PAQ-g4tKymfMv_@Ry{zX?L!AZY9RSL6+cUs>XD+rvaUtzz@~^_{g&@w#32x}L`A z7=^cQ-zrfG2MX?*q=SjwobS8IkojneUio#-uD`X+8OxDM$FWm)0|Ntfztq4()N(f$ zhkB+2hSDE+c~#m-1ReNCb%LG61EBuS4?YnYO908O+|Nlp?5*`&3=ZUzqM#7Z2Zx57 zhfA8gZc&5%`T6M#|A@$vYGU2OMBS!+aee-6B%N&XBR&yhQDI>%ZEZ(lL%p%*%D54? z`C`)jU!n5YE|IRYBSH8$_mPnibUyb~;IVVR z9xeolBU+YbdXTO7&!0aJ;qWFubDr7T{#jE~lQ>!9UI0=4`B}1d86@&L$`LWPl5>i_ z>#b4jqI1Vu)DdVjnoZn%ydl7kGIodIZhwPHZlFz1#stnxAxS(iB=60eZwj5K_ zuHX&7p|&wl(zw+szOgc4&sc^U1y!H9i3vvUWK6mJkP}E#V9!Jc(X`m6mpc<142#VJ zcGmka0Vnf8)&q-u0wVqQ?YPubO!BzrkQp>KXNwc3ji~h~+%fD@d3tP{lK5hoWrmSQ z$sdG;ReKCf+MbnPSh#aG3ppxBx+X1+Z}80H#d?tj7q;gzhZ-Od2x+9OV3`L$lt1A! zmwxcT+-HUrI~lM!F`9sG#;Jj76PTJq4Sy@??l^fJ_*j;WnAo9kIG+4O1+Gw#!!DZf6 z+I|CwA+)6b*7tl>#Nbot90Y8Yz=5y|`JxDFzv> zuurnFcTLMs^b@maxF!`e`Oas>=X@rb;k-l(%x`zOYQg}ftf*+Fw${e!EMz-Y=?In* zuHCiVDc<;e$M{9%LvSeW+gtL1eea6!vJT zw0&cF%y$3xZn3}Z@&}N7kx~8cK@-*g0_UJr)e#+?otb_sHGNEtyA!K1Tyo53O-;j}lYs7H* zEaWAnNT2FEXHO{l)Y*9wo}zA2{@~NAdwI!f+Npn#7S_~V4bc)x&nANSl7WQg)1EZ& z0rY8|_iANHD13RF-5L&qZENG!JrhRFeQwySKO`3+(GD0wL2duhax`u*n}o0fX-eK8 z#$EzU-OO2bc9RCOLjXj>^BYLfeMb$97GAw#PR%ek!z}82>3Ggp&Pu>W#_Ptk^>Yn2 zGBYnsrwqVj$i=Xk_Lbjg&c$8YDx`Jlu$cV4JYTbtdnzzk!pzvyOUCH{qC|11N|)Y& zHiQa3Cn2PVO!MGPtP3!#h*Qp_X@kT*BErHQJin$;d*3O14dO4M%Bo`m_Y9=$`Y(gS z{{+cG>IDayhu`6Jheua}*O4oZa)bi6y@}sZ>r`tK6sA_Zp&Ev`({z|EaQFrTyK1u- z&a(Flk|nA5w5TZIX&(0DO!d8xnL6E2%ssgw->_D?UNk- zVf-@hvkmjiP`v%T;r8#=`?XqITb)c{-|Zn9lI0<+Mik@dW$Y9BbJpl!^cBbYniC|! z$v^Pd=3hoPPMH@ma!mAcLQ^AT!ndjc_?RWu=xI#`0a zZ1a@O7GMgxk|i}TkctcO(?jKzP&JNjiWAgI;9h*8j>8c=TrQ9{56d#k7wzjYQUrmrum;)+AoTA((74d-(S6@g;irsUgM(ct!Vmew_J@`M(gnQk6dZp5PbP z|En$VpVS7A&&bOJ{}yzjuZPgmsr=q-XV`f~uG9T4CmvUWo89+Vi${N>sF=DDLR*zokQwN^xiX=d1|TS4 zekwmBR1wDJz8mL7o2XhGO}Vrx!iDp^G}0hR%&c2|Z!M|OA26rE!RNs1{(x>r4kos7 zF%BMcCSDQI*k8}{SVq*6DUtCp{Nf{pws7Hhyx^c*_a{GEa+}B*WBC0vj>ceSRZdjj z=6J-?usP}1xHls%+T0J28e2@s-qP2-;h9=B*`@iuT!1BpfV$%NXBfZkC(jYc(#HD0 zF0`lQ;b`OjvU8ofP&Pj6V%zc=OQQ;8!t#j)Vq>F>oY1WoGPR6UOf{|whO$__l3MaZ zC6Tb9AOhf}S)CUigC!jV?eCBiV?0w;5tk8m$9_*^OBCHnC+=vUUk|rpVXt%dZq;W5 zmUNy?8|J;69czdBs5mU)y<*zw(RYYH|8AzanHly@J;X5`H4AVaHoG6kGW3)g)LsE! zL)qgOl*M!Rg!w#|Q&98j2N66SVuMDbu_Z!3zklKp;fBaG=hQ?nkLq=q=2h|#iY=Vo zEA?{qIz4(Chjj>WVfXGdIXDFROBQ@zamKO<%lE{&8BYE+3ZQZY(`x#Q#oxnF^#%_s zUJ*7~CjPy0MSC|Nt|qHPTmqbX%rNIp)e|uyoH~DBYK^6uUu9-CdM%HB{`~o_^1erF zBrDK4R1UqM!^$)>lfxrLheX}h*4A#^Zqv+&tCHl5M9v5X~%Y zdL!PDurE=8GTAAON+O9i=co>`M;-XMeI1EvDih6?s{e8+4rew|Bz4mOv^yM?r_woGwk$JJQQp-C$`!aF?0TtR^&cA}ad0j0N+ zRenf66mSZQvB|5c*+U6MIEKR~0{~9)q*ma(@Mkf5;z5>W>x=v8# z-J~qUg;{aMob<+|mdeZ1|l|nL6|ahAri4N|=Pz5i!FY1;c3t&CAyUJ^X56 znU+_5UIvwnRBIS^s~7Bg&bJ6&!t#DPv=o~$=ot$P!n6fEC6+c*(n!3iX zH*+FkbUm0Hj$$g7K01X*@`+Sm*}KI;-6c|0iMx4YJxaR{Ks{>eh*c&K2!Wt_`j%S0c)b!s+XGkXW!UnM(l*en=Dy4Ii2`@QW@)=RHNcNz|c(eC{wOUO1gvF zFAfz`KmaxDZ;WMCyPBGQXw~InFVju0n)KCLKwS*?n{7n}r&N0wI0wcsqi&8fVLV%Bu(dnLl?%>426PMtZ`RlE3=n%OzKX=>o`w;N?L0*UBWuZiaB1a( z;Q#3cvdwzN#yhjA&KXJp@(5=>5hpjS&?g2!v{)E?=ZAdxkFS+*o_tpw*jY(__{1W! zi+(qhU5fVi$@;#l|3;(7$#R-Mpdl3i1t;!5;6N4tf^qpjAi#-@SESnW51tqoiFjT@ zBWw2E%R%BFxN%ve`S7@A!!J(a;sq+k_`i)&{sRmO2Su(DHK=LENmMMue8G|)c!fYV zFaccce~NSH`qr2d^$T>YZEQeo_5)O9nF`)3D-(53f5EluCRDi9*UXd%=#heg0%~zx zSqaAg<;8coVrVjm5+MAG_9zde&VcB7%NqafHE_59#U}LLK3Xk`ZF!_j5bClSXJrJH!zR_UoTFo|B06q>KMA zTs@l8qJcmoNg2C)AA6O#xf(WJBwE@tDpr%;bB;xkp1Nf*P{$Jxun)xIN~Z~qA`MWf zUZd>&1a(4FZF}go2jHw+IjO=X4*-B3_sI&OubK()m{H?1mt_v;2;_u7P$>xzCVVVh z8iyQpX{7A0iiTU|;eJKWxDzv%<@Uke%-5hD!hKL=2VNlV>|~HQA8o2L1kdc6P2l z4Bmiy^Ly0(D;%us`g8R@7lNu9(3B%hf3daI*vk^ldM1?V@6thx#d}U4UZPWK8`;ue zzVn%<4|@0&Gy=yX4;Dti@|Rk*gNl@P@o_;buL!7elcntRTwPtki~#NlUWE9uvsheg zRwuK;<1E8EDS4%hRyC5BNQ5>Q$FaEPO~P;uJ&YaI0%Be)g>Io1T|BL;`gz6g)*|uL zD1AJp0l;^0fYG;RVPo}T1^@D?{#W}27fjv1PkMXrA)DZ$of`>9D~jj7G(816@9jw4 z8yJ;Cy?e$2&3XvL*0_65`rodA-VYhxy48&rKe`|-BaxF<6}S_cCHyrmv(5Ak?^3Et zY3VC_HCWD0ISfh*%aFEDl!xx4lBps49((yEQ)2ey5fNkaQ9UWou~K@@n03TnLa1T6 z)Y{cVQIpCoC~H)u&;b0&Ea5OyB1r6j)~{|BzW*}n9{&wYk9yz>wfJ5n6xs(2D-Vf; z!WjP~!8Nr^VL;ZQ{peZ?QdZiH47zrp4W43z)G)eewEuda2HVZj4nnNvZ(LR#0MeVD zYaxNL_+fIxe)XDrY?|v=R+FN@BLHqo0+tN*3|{FlA^{ft?OTcZTHPqpofN4;G+I-8 zXJdI$c{#_>^VQ3j*`L9oux&w?BJYXz{n*i=*X$+|oSQ;YHLG!gy-7*5vl}{ERXH0| z!lfJtc&G}%6d``?f^t{-sFH77SE3?Ip7+QV?U9LU8VE1e%rb$Y`%UpEi(9Ui?8*{3 z<*59Vb%=YdIhVmwKnsD8rGTcASVUKwCGTovtVkwTXW(T3o{? z0!jh?cfaym)vFLS1a43GhWVqJgV>GzF%83pGiNz1OLrLP0u0`u(H%J#?lZow=2GUJ zmT0{pN*JfrFr5=?o?@Pw67MJ-j%Ef_q}Z~23l`fNxbTa+aIwENzgkkHG~X=TXk0=j z!k2&`7-Fq@d8z*|<@;0B!_T6!s}T{*hJmMta??#unp6OA|Iw$Rb4&I zui~T58|Cq-e+tr9AL%;nO-?*3R+PHeI_dQCp60`lysMPN-eh~q=_uO2-}2_ST}zzO zcUNw{e~1I`0cBonVrDKRd&7gk;E_}PrFa+2pW`}Q3&eK?Sy^fQQy}}DvH|7> z)48?`FW1KRV5PtIS9AYUee=I$Vv`H1@oLfVGkwu&5ntS&WzOgDqhWXYK$=INb=%G) zD)#kLL(0{QP~dF<@5;=Y@5;pXqunhTeb3A&6eahCkof&~`3|lCrD0TA{NVfXy1ijd zs|K#4!2 zeT&Ds($dmkZtH-+QF8iAWlJH=V;9JEkw3J?eX|Dt?eAYd0HkOJb~BJ8g2#D+ig38o zdNfW)(oWFO6&wx$%St`qI-8yzuk%=V(F7a^;Jij^gZ-N0 zUk}m18yF=cAClG7;O*66G$}dN)zu9R4Ov;&7l0d-fX5p(%t(cDm-xbVfUGP(xoq$y z#y3Sw z340c$kaJ;OP0?bNU!egIL8NBsKuG|d6lPX|wYsXdRQ4UWYNFM%h#*Lbl_-ghxiMy^ zRHx{z7LRh^xNqgnPZg2eY8uI1UB!iXz`-CGV}eR{6@?tzE3D#5okT@7kG3)azaehN z`ziX_aLPgWbuHwI{*#!Ldy37<2$6PfeeCyp<^D;zA)|>22@7~glzeH=^X1wh$CLRNctB@*rtn0zq!0V*Uh(5bXl`5E=Eh(Qt+%aRFKpGiK>n4IP~I7 zsiBT`W8zyYV)qd*XwK77ozq_XmN_x@6jdfaW|z6+Lp}~M4A~)`GdSotS5fA$@C6Lp zSat$r8IHBJR!=!dXTTz5A|Z9#WAhNV>Dmq_-w$C7i$E0`l)|l_ERUc4o3;9;o}EIG z$K#d@swhq^pClCPxl`hE zPLT8mvu6-DIa__%6yBSeRIDi+a>|)iV*ML>JPKdR*J`JD+-fjO6NObni0CU0%e6!f zVi~^ry3cXRqF^ooVJmrr$ACARvQa}^-Z=Weph?H)fW8w#T@K~Y^Z4=sc**IDDk;;( z9o%0u$FAap85QKJPoBig@(dm1sSkR-8s1j%G{p>afpU?MFx(4u*X5m;Y9_OcWlNiu z+T55VBl)R# z*~uwH&6Z{J3vPI%J-uLW$4hgx%r@3-X?+eAES-enrP2P1O9LPk2>*6+KvV`iMPksA zrNF%yB zSPTbr`(@ujH~C(!Nq(&xa1NzcONL3n-kj)w$|FroO)ysJW0f?rS|`&^TwcEi9gR8c z{hT^gYZG^t-Z7CyFJYY32w2Bzd2i0CO_mBz_(-i=GWHOtCtA9Iv>0c&L@8lbNLuLE zQ1jx@qs?1B&!(_1x1xH!=*X=z6!s+`Bt=F>0%5HVln)djW~(^u?fragc4teYyua4B z*M87-SxmafXYls>ZbmQMUkB$u=!iR+QqXF}fU+t*y&oZmvrVEq!K>zlwHka%EbAdV zj4d|2{$hcNu&(Wp$$`wT=+M)rAL~7wvTJa!Jx1#LDXo$VaV(y?)v%!g))BNO-t<{Q zp69T!AvB=2Mvc2HP#G>6nKF;?$|G5H;UoGx%K0XSZ;Oz)Q1VXAfhMIXfv0=dsBdjDBB{Yz4Rhh@zL_|&=Vfmw@jh?cMq@ZohkAIwk;iL zg8QIcyTr1A)%JmOTyadT4`XUy^mL*f@EJr7TxTu zI*qj)Ov~N*5$ij2#HI85U0UC6NI zwEaUnSP2Xkg}hLaCx7pQ8f|JL)W0HN^zL5a|6<`vl}7V@0$wFGEDg%GO@c#c|& z#y~8I=k8$+FxgZnb5RUPdq51f+E^L^87MIs*pq=v0XR&~SgMTui++x3Ak<^HMjC@C zKy;e{1|*QO!EGug$rxAOBTgiV5i1nh)ZlGcX^#s*{ z1hi)$jOOL#!C){T8>gSk{;a_hV33SN34HqW2{`(J!aiK-nCjNi(UB3jvj7Tg#&dst z0UENQa0Rxwm{?-@l!SN&{3F#8j2D^yMYCV%wBT?;j#`w!-3(I`lhpL|^u)wUy8(fy z5>udB1A#a{Uwr{6*Pzz<%qz0LyV=vzqx|Umz1Rzi@r5`8EC8uEoD-m&0CA@8J6di> z?Y4=~1+xgq3*dd3-y{YVX8_QHE|o%QAA89AFKMIH{5FUZ$lq|Vvk0nYQ6@Ia!otGs zZ*g~lZOUuN%p0Wj!hAJEKKRqw#O{wDb$tPP0xC<@GyQlYQ`2!Ut3UwPXxoM|h&D?& zj!KcI5&8H-DdGPtQA8|t40fRF0oc*`G-5==#l4vlE9|LU$$n^PDBB(S=n^3_1B1bW zyP2Mg0B+%p{+ikPF-^K8DA<0?`0axTT76)wlCf+K=}ZzgQTkUfbG_{!qPDQKwDji9 zWxtE9Y6t@SoI&>jT-Hu0(^W{z(WFt-z49A>Yvc)m*EuwWVM3V5(Uxgfo_ME??f)Z%)<$m&v{T0uHh0PLLGX{hyf>E-*?*$7K*j zdiwg}77bhv4mn11>vPL{yau{Hw?5zp$6lnLnDm+B=3jRm2ZATC#~ic%Q4$Eo(@cG| zzo?HkMl!kK>FMdE0p>^=Fc3vWBG`tt4q+f$!Y?J7)kbs4fn9z8_Hsv`^f+Mq^!4=O zi}f(avR*E|_TBr@4!jLcb3D8v?;Stt(C%D>@BDV3ReHQL4dDj_MEP0jZP>y~=GzK^ zN(l^vO@QrD@FcARFQAA;!#j`-fz`8WpHbNCTwyTUXll8N2rPtUNStZS+lGe81Y_rz z8F8~(gH1aU68H&02MtiL_Q7-jPe;xPYinzeb~>QWz~Tf3LeK@=YhPnfkY8A9d}3n$ zn>VPpTNZS0wW|KN99=Ebq=tys0biP$q`usCU>l3qhr!6tl=oCpv%2=Cc_@$aaxox( z?Ep0a$tm4y6{}bYCga%!Ulh=EK~h3m?`o#nT+NDLg1}h1dL{5Td)a%Bja(%k?5^HT zm03=<&8Pu|CU~&BkDIqe`g0 zNWhiW7VK>I1mRLKYin+1#6PAnv9O#Fu>fiy;0LAQl!JX(SHiIgGwXyT5u+UWyVriS zaC?uxjEe*8?;AMaU}{DDHb!iLan+Mp0W4DH^}fr*Mj}Usa*#Q>J(|g)L6=A?c3<6@kA#$-yBEFKdB*3oH#L>b_ z8!a83$vW?1o4ghf1$cj;h^NbY0tKfmU{+@`U#J-i#K(7!YzXK zE0h$;u0=<{@i7g~uplQVT!2V^K|vjaIS06jPH5_2#|_K*DZ{|WnuVXxh_UzV>03>Jce6i>v8(vr zlJH2bx1$0PqGqV9xk%3NTe%`4VqiQ3s~zuCiX zUk;hcT*2B4^syp_bCpPRd#-bK#R{q&ze2#K>M((9<<7ISa%3<-H7xM4db+s*5_F--iU7{l zj8-tLSaE&UP(!r&RehB%2D8C>1)El5!Hp-aGz%+_(3HE0@>upIyr31paau-nt#5DR zg!7i)ULhHG0Q2*r7Zs9}_Mm~F&3^XmolGUOAs--3(7V;wsYst!4)h286CYplEq~$| zdjSOO2`-#T6%L2%&WD&-0+|ktR0ODbRY~$%MYNSup4IxPv`?KF1fove?6yF~zzvKmZ1k9T2FOBu} zbGi6EKJHq4Vcjg9FYr8k{_6dZeZI#a>gAtoWu|8HWFg1OZ0{=6&$9rJ+yn%WYUij0 z9+tzhFMSLJ&CLKlRkPA77KRR*^PV4HTmlM5%45@NmrMNvM6-8~pxOYffa7c3=`RHZ z1<=WnA>TJ&c`4X} z0CRARED8R29z>5YHNAH4J(NkulJx51Ts4>WdK7e>#+?`Z!H8G7)D(OD^8KCH1E0u-eBYT?O zG^61t{U@%C_pp-h0e~xz2O*p%hP^upvVw)Dy!XnxdriS@*FNN|1E22FoE!O&qU)4u z=TVyR62dvl(w~7YRht95^|QG>1)#}b;ifR6eHlyp3kG9bW;&Au@4Wt^TzrD2`Vdey z{Y!s3M-4ffRQS{>CN60pz=HtJR#bt)Ryg(oIA?Fi35-yx%N}YOh&0Nb`J*vc&jbKf zd3$>sKseC-(D1WcLDq5fEO2Q#-2x1AGEZ^Gqt&M)QIdD59dOFcZc{DvGnnKQ9Eackktq3(3%$Aq~ zvRh$bsPFe&(Ncz1GVyRW&-huYaQj|VTvD;bzy~Zm7ka}21)O02xYF$M zm=a4TLA*Rt%i$Ff69uAL8X&zmAOo=_2x;;eV7+wXIB!YMVQL)*&D3PEtqJ|-LGsS? ziC`#iSDq^G!-_SD-z7yF0L8^~d&F(o7GdyBGa&kTNsEj}PFpiJzrkB*`wQS zemtMe_B8TXE?7bf_opeEW0K;DaN5nd@{UrXBhw~~ubr__6l{yx6g^(pJP@jr;V z|2b1)G%>xG#7;EZ_6`LYj|n#KMkX@5shol7n(V%MNhzjmB`l9Aiao#2s=ALcP~1{0 zWq<+o%-_n(Zlo}gxT!r`F(iF@rUuyw@M`;`Xk~ykmNld7ZG}+9Y zmr%C+ksf^LfIxGw4B#n$19cF+<-nEp|5PtEcz`bcgAb6mlqvBV_0{jOF;rXNAFt$p z+Y0#qQ|a*k>Nb3wiptvi>8R#jem36u)LR-FYP-&FvED`hY<$o`+bl&;QSg(fG0aBy z6wSj{umG1vokH@^Xe3Z)K-4o3oYA06c9?uu)6k%VpcIB_9g;FzqR;+iy2b*iQ1447 zP1f(e^Z5xH`JTRQlLLh`&~DZ_07-|MXkFbdWetKtb+5Dm)&JS4^Zg*90GKa^D7pC2 zkqP*R5LVn^bTOvgG>76=1Ly(y~|@&tHY&yl9KxEyGa&- z$!Tfte96cJuoBnRKsw0+Wf&k32qaKi14g2!yE}%YKNme&?^kSEqbIEq%^?jwcA=ND zC}-97oSsDh+yUt0$UOVU;Bz>56ucZj-$4|c=v!n?Tn|7YWIOBZ7j5gANl8PX^1u_{ zT1U;Gvf+N~^IwO0{;l3dJLc~FR7YqEi*Fk5;fvWED)NZ0xC_MHWJ9T&@Uh9`pc}mj z$t!!nDvL>_sDO61=fl;mxnivV3bFW_v7+&yX82)i=-ISGZZT5+^Q?rT}ev`K*& zXD3)t2#iI;5_3_Msx`L-d(MNqd9X_;QeT~p?B(`Y9!7!*8xvcWT#I@CSgsH-7lC4F zqtMY)WCLnq!db|=f3+TzHbD7GijNms-mC%BWp*qLVE%=)v^3C^uqgjk^XWM@atU-@ z-gkXIid`H+b!~utA()||29kFCINWNd2e3SXuM!h&epZzN;;e8-#&!mrS%5OjV+c4c z;~X+GVb*T;s5P;X3&POx7+wU9QTZPWkiDmjO1(zKU=L>cuYCgC8GsLuKxfzLc#S?Q zK(s$VS6Wrt%QGvwy-8ywU{fY){xa=vN1ly$ZeAcTcQ2S91z#jAmqN80iyO^o&vy?Y6i&w4M=Bo)a@sUff zZV4WpSX-$0%A)2Vh@^T-dz9@}wPA8jb@92N$F#P3&|FhT2R^G0nhYoXRjE#)h*edc&vhtEFD76J*v!r46E%fQ*HqyqBH|+pvHhT!+-6z znd-500e(9=a*;CTKz`$OxlK;;*!BBC9_de(4VE->55k91AWpY`R(h49I*PO@Rs7~% z`^q{N*Ivg_-eDW+my=Xrv6G3uRr48dvMxSqZdKmM?GM`ez~gaoQTw1>`2Z>hUG?$P zTI9BW_NMz9T%)~kG7lY>o{p_kNRqtw{_$L9koi7luD6ofcKhw6Mttti$2!vfD@UTg z@zhLRP%DMy<`#h<+&C4L`=JE1=75Wsju9r!hxk=}9x<`QIgCjlqmq2DFCcz7>f&V_ zN8k9TdwHz&X_Q%`Q$lax#u{-CE&z`n=t|kSdXdu}FbO-~x`2Sw4N~PZMjl)gD4Cx; z7mwZf$|~B~*zk5WCH5fEE0K}#gtPxXQ{s@hA2uiF#^ztjlHpnXxgyEcED)_-v zHP})}p@*K{tBuzisT&zMamTrHyScy;_op-`boZ&Z9x&l$ywKG!qjT1ywv+|Er&)j(d z_?VC|H6%z%Ucmoqn;9Sj4u#d*+^x0l`r6!d|D%>O4~P0+`?$6r5*49H6GCNaktK@k zWhabnh!RHjLD{CH6veNFerT-OW~`BA#1uuDWSc>j6bVC=hGZDe{jF2yT<3Ytb6w9l z*W)jBS-w8s&vw7xulpSu$oNxOibm1D?i~in2!c6K`M&~PP`vJ@w;@NdEW`56MxCt@ z)1Zr0BKtBr zUDuFQlzLlZ&I~r>BZ3A2wx3z!C>gNt&&`6^svz5D8nSDIxNwQ(L_Xn$5Lt+yr&iVmX z?c2m_-Q@1fR`a@=g1wpjiaj-0`&>qKv?0bsQ{WiS{Y|vQ{8_+$XsOdF(x&(Gtuc$^ zY~tg`jy-CC4bmd+`NZISOIXG5kMUg@>xFDeolPtS)IGuSfL&Y${P^0*;@U&^)p`>D zRJe@vy%7!^Dqb$BylS?kjNs82#N%$(J`S~c#;1TW3EoU2g}DN5WEW<9*oXff7ix2> z4{LptbXKch6Un}=Tja^eW!HrcyHG`C{fsuh2!6HcMmz&O3XXHUy)&` z*r8uDd3?ppGqpr3QJFZx9ygp!vDImYDdjz7UJ~k-zc>SV(LPyw4SFs9)FjhnaAAlxf3_Hx zP@BinE>KA&2Ko4g^$gq`=ikfQy0(2a99Mifd3m6Ke?vM=r?bJzwF-`v3|1>^Az4~sYj*ehq z?z8%_Wj~^Yn5Lmb@De!^XM&hSu z@SgB_pRXC(skm;Iazn(7Wr2?j<9%4nzI5mI?SauaHiyu+hgkcdIZOxiK}wsXoSCyG zTGuJwonf023)UwUpxww7b(fwMM`qaALG8VvrH?9PcBM4|i_GM>)RYtvjA@Z$P3PNaEXguGz2wrN`*Rtdw$W0-s*?jd z5_(2&4enZ?JJ%Y53%P}ZsuGd`*IILw|!;ZN1!{a$I`-Z0{N`E z9Y;gA2nk_za3*KlMm*5t!?SS3x2Y*EHdVP4tT)b>OxdTTGzU0>CbVVI+I!S^ogSb6 za$P3P9L-n)FR$r4_q*w9Kyb9xD^0M+6~tHu zRt2ey#4>*)bqDMHpUPK04DXo_ zp=ONZ6*@Z2)o*>>q465rsj2s8eLd?i)^;4RH22H0qV{Cmm-azos;`}%1U0N;kM9tgz2Eo z`>jO2vu2!0$3J*;)MYFo5$=Gg9$`%D*1;T$$$O<-aSGXy3ysxejA*5=Z7KT}y)tIe_j=;#B0WEbKl0YWp!cqX ze43eq8~W+h&t3DJ^Lg*##9%X&Q8|Nt48=;pz9jJ7EUrLN7c$lB4;Ml5_NtWN)t%c+ zgw^cnyf>DK_us}6mtZ0GvAW;(YG^t`3fZK2_K(RLR2-OfkX}>#=RnaF2!11W*M#*u zjQQx^Gxzk6<`BCm@28E_X46;TcK43WiQa-4fU@%`+kI|{M5)TESnL?IhsvD(9qv|B z4>D^D!8AIad@|R#gZD4ODqUe6#u*mf`8deC+{(%M0(u@YhH^&oc{>=coo;CS)stbyRZ${7qb-T{)&-35w`SSZi{!Qnt~eha z(XD-^m&uXV0@kH3te^r{Sf#}22DaoK@+-RFXQ(7{7D2f0`h%Dbg>en+lZL%VMB_{I zwP~o1bfU5esru0;g~+x9;zC?(l%ZzMx3&ze%Tt8I;Cq8rx94Q@HB-KpWL5vHx0=B_ zR3T0wG?X0AQ|3&*8QRw4xNPS&m#YEk4>@YnJ=i%@gvX8_{b^~N9~PNLEN!uoOz$~j z$iu~+>J;vD)-lO9F}Zx(!crRR&wJf1XyY;<%@+WQ53Om!i%<9?3fHzqhN@@C#=LKg zA?0fLPkl8-MIm@)-ec?F!a&wV8zt6s!fSD|X}bj;?DTUhHd=ChlbZA_OM=8*5SoXZ zI^CziFPsurjnJ^Ky2U8MfcHGMuO~PmT=Y0K#7#IMom7dN38_l2U%0$CJd8Y>Mxr#i znuug1#De7e#*~)&WIn*kehI6eLp(jRqZYflXtAxddWY3h4gSJJx2w6!#=Lnpp>v8l zGTW7SE5zkNfx9S_D+>nhJW^bOTllFfuMHS~#e)ZN6GB@gJ8-MsWmz2?5xk2}E33&y zIdl*YUUucEy3=c5A)IutdU&i++N9F-a;IXah z>`G1wnKNlR;IIv4mBmvYmYqh9{MlPuzSGrY>7#Kr7-Oo)qPXA}G-g4^v5oDQ=_z$6 z_O!5Zq=|5_MITE0a7t>*CU;K|=%1xr z)Z*d5`NEd(MoNaLJ+|*s+O{c!L%7RyKb{%^$)F+}(H) z>V6B04Ve1gdpJiEDMuN@TBGe0mk~)hqNlTZRrpBHIaL6izi3Sw{Nj|sp{qE;?AT#+ zNUDKfG_#bW8Tw0_oFXcpYl}KaIB(_`KK3PhhoP+}jUx3y4Q(nZDL352Ph}b{bH$PA z;Q-pFrlhXxzc_%g8%1z+5cZ+tUV+< z{cFBr0!RdCEb#})73>f|EZ`<*EeK4)LuhYUTnr@*T?7Wb(>rbH}0J3XjK)`|^6)mj|^v6*A zfLDnTNJmlX%iIWFMI-J*9 z+x(151+>AGhOs;?19S2xVe#Ok>l}l=IMrVh=x#2wanc~2=#M!J>lYE^vp}T;P-<$3 zf<(IFiN5kudi${8mZx;g2gBjACi9-L}l36L2*8F7}U@@O^ITzxYWvA zk(qO%0xo6nES+#unXy*_8_|?2L6dzRWXVrUI*?t)`=;QDMmY2ttAY^Ngx|y}L}|#b z$`}P7MZ3Z_+6|6covRyO{#|qd^ge*cy1Fzfu5=+&s4gC|ZJ=NSjTW{4)G@^J2lX1% zHTf|R!>hQciBBaGavm?uQXw1XTu<>JfO2P&o1!Ekj>;;AXyfdx3F55g()*2AAK_rI zKw*xA{N$HDU3UYX>GDB(Kh%jApq>|o1}xSLctDRKR7R-+3-7?(0g3Dzg;(GZRM-f! zu^T#mZqnC6rj^R+rVVaR$&R`n(Rwt;ev-PS^|eo3eXG5r2%8Y*48*;o5R3zOP-iVP zw-02>gEaN}4*^NsRt;c8=IKY!CpontVFiQ1JP70PzD!sT9+cW!$dt=A^GjCoO(UR~ zWyqNsv1#%=I#*+Ez`ZyC0%E14m|EL{xHpG&?v|6IJ&GCis6M~K$<48IJy;mJaeB76 zQAF{CUg@6hZbtBKd3o=yToWOppUahes-&>X37{&VI{{F$QkO;?I(G+C4PvKmb4gj* znVhS3qb5Ooi*AT>C8PY^3-ExCdbDSNK$djx9#{_npvJ*KUJ%hvCgU8+T=jquNkj_a zkCiZczmB!_H@+e!OEwDa0Q%-1Nzvw$3ca@xL`IAY-&N$)7S8}C0Da+Ebyo}8Slwi^`A z9uj(=nEz7_j=t3)d)qA@!!JG_t0IB_fDK?M!sDOWkCP}opdXzEnNI4s z@l9den}a$_Ux9W38xNFio*r-tv_qQ1k5R5lM`8ObZGs_1h{fSN%{9W5f|kJ!bbK4QUUGlE)9eCPNsn11qJOSOtNS@}!K4TMd1yNfyiWSP^b z;)>%V!BUyrRG9)?AhAGHK18`x@p8N&eX8#fNom|2!24vuPGPMtv8z(xk*znzm) z@uWEHJQ&R@PCF(bNVd9Sx|(Jl;(Tiw?+9!r>D1qg_{mn4p$gy0t*uY>Ay}$b;Wcfq zx_W<;CDN#aD~H^U89J=e8pP;NtK}wtRgBVb}qRY)1#l&6BPw_6)r@6UK zy{_tn+z2aH^Ocx^-G(vq+X~iI@J>f(;N09sA*v2uBW!FMb)Y}dVD5ZtyEL)2=aUU6 zck#mNqScBzv{wF$%FU+hW*&cy*O-}_EH+$NVLj_@&eGsqt}xv>o!uUh-AzC_Y6C@3 z2{*iot~iAaon2i;t2y3X{jmw2`AwIyj@n~3+T}N36n_l@?k7i@C#pCYD!63}oC59E ze&Dkspen2z_-rSYCw}~(54>Bb-ppKFGH>Qcq>e!;oT%v5vV{b!au`I+jYrJ@Y6tZI zRNnWoa2?$sre>9#s_ab$d|=mO7I6KqlCSSW!T!}#+yqO z>Tq~#(+ZA3C?ULO=1W^ED=PqF+J@lVSwO`pz`o)m#q=a4oQ>FtRKDP6z2k?rxp_^C zseXNI+Wq_Ien3Jln}t}%q5Gy0X(cX1;g3KfCs>hFNpdf++aq>;Hv2XrjeY+MpPj-> zOtkvO+^9XfzV1jTsk7xv7x;IOXO*Eq#BH2s4XwPj{xeY)UFkdIq=y_n2}^Rt*@vqy z&GYBHHt*qr59w@b{tRzfcYCA zH1z6%V8Q1ib{!G}XdUm0NzHKuWdYV8DkLuwNq% zUvng{xRlg$c3zcr+`Sb_!6hL$*#YF4)qtSHr6nW^5H_?SNGyXHwI1MHm0iC%_h)PZ z4K7EJ9S;raqY4cV;r;-|p^TIiMBrTj`35@i=Kpe~X}+FG!wm3$@3FlZ;qa7Az!x!) zIO+IMAf7+Hty90Wbr+m(kg!6fzIufOTVm`>?8>DX&Z28Mp2@slp=kKfh zf2Y;$J}%2H&#%iWaM7$yymiaJh>Hp#YSPAk`F)>t%lYISN%xCfx6=YCj^JbX_5v3b zZVQ0gr6(mR!$<;S35hf8#K^c(<5XpN$fgkthLphGt^Pput&<%-mqe|T!4q(32j0{K#e zH@CIb{?EU0mqx?v+(h5id-;oUaz%c>ewk5}q+Gh7wWA0EtT()rh;2T(N{4~hp7lk$y)lJwzWk?-X2KVcg^ z>UUu!C&z-BPJD&IHTbD|AC*-Pw7k_3d_Qk!cRxVE{d{p(&CVaH6Cy$G5 zgcOruIEF7ZTUP1L`OYbYCak<^mYzVH2a5JEY@?r-Jn5AF`yimBb1scG zK}1!}XC1-flrSH?WC6=O`?b#`WtJ7YFkyqNe;^-Cvye9W^OyqvOWzS+~viGT)OK@|9P>Hfto8^;c3{)JWpW|Ki z;sUZ<6?*Jx15E*|w(yjASSPc0Vb*z#etc(Od#)_SCozZqkF!OJ;q2ve>bgop*0X(T zA!XJ2P9M0p7_s7>n=ILYv=YsO@0}^#-K;IcyHCMqm_PEden}>!ak$g|uHW~{{Q6Ko zl3Y>n?@2AYoYelAH1zCNzHfJ7!dl0|7YWV_x3)M0wcXzBJtto}{B5RwVnpcCLkX2) z5~YEa(s>atmTT-aiT3lHJF;@w8k~ABLG|rMlSud*@-f^gLXmpb5YPp=a>&0gR_|Ke zmeinsq%j}`7KGRD1#$Zw7Y`4$sO%TB2Fr!V=*6!W0N*VqCl31(@-vYB^U~7j-@_>m yvLgS(f8!fZtY`B)`ElOCs{OwQ-z|J;UO`=RJFpAQnRyX;uoHTwy2aY3qW%lGG98=% literal 0 HcmV?d00001 diff --git a/windows/security/threat-protection/windows-defender-antivirus/images/MDATP_8_IntuneAppInfo.png b/windows/security/threat-protection/windows-defender-antivirus/images/MDATP_8_IntuneAppInfo.png new file mode 100644 index 0000000000000000000000000000000000000000..2cb9a5a416294e04adda97ab19588aceae8fc7e0 GIT binary patch literal 62416 zcmY(r1z1$y7d32yI)J1!h|)cDOE*YKN)9RAjS@qHbO}fb(j^Vb(A^!@ z?|ojM2XXG)x%bRD`>eh8TKgLOPC*jw8R4^g_wJ!dONlApyZ68s{6wHW07n|%?eTzL z_Z^faMeY^%6K{eSk4%N-h40-fi+p}%@EE*)YAdDbaPJ;E;_l~uhfN;r-n}DZX)$3{ zSKaN@$DXPk(}A_fdgQnV{iu1y+fdOmkunkUC<;bp;%9Ahb0W4bE-n*)V&D3TlfPmT zlNLdJ`sHoL?B0}@qGC0XIUc7$Oz%<3!dfb_H;HY1yZ35cz|m!BOiLnn|PTTmNq@ZWo??g~!{(oELw&in6VYFdK#cQ3jPHxuMD zJc`@MYSO+bb4t}FpQKrwJ}J1nL_Vy?yn6VLWvnWD;oZyFw&*GTV&!;++GM2i(7zig zzn3vNs*%y;%}*KrcVA70q`qZ3QVhy0k?F`mX+6XbK80G!X4vx1ejwZ`PGhbjiP) zXeHxA*wp2es*;_==8;W%*;rjW3w6-qTD{1hz^UNkZi_vh*}J`5xOKOFJ|e)Uv-fAp zlc%^vPAH5rqWW0=y&M85uI$#i6Nnc7B&zAd3;p+>MolHTjf?%?B%iC@%}%*7G^Ilx zJ9)_Dv@3l*&4O45b< zmjP>_wj<}`vgQ|_>GJQalhdcD?iMI#JE3>YZe-MRdMNy5R%@D9Yx9<&q*sjQv?ov9 zyACyq^h<$dX?&03IZZDn9cIx&{#(~CX6L&FcG|_Qr4zZb@C&3)=xccH)uEm!{qchD z6|(?I<{nLOG>(Qdm1;SCKYTMKFObIbdkWROYB5`El^F@5W`c zJ;zpRv6+V0%OJ0=2tnH;JU};AIvvK^Db^V-u!y~`^y{dgg*z~t;ZS-S!TMq zHYJe_x{9;3H+?){MUpBZ&R#1mx_Cbi@#0?l(|3!0USa=lYY@p@K&;~vS3Qbsp(ih} zQ%vMXc)xe@7bVEeZ{>Jg6xY2oIxCiWSY4IoYbL7tF4Ekm zjC)gOgmlt#w@x>`QdA*nBCYe2$I+(`n0mv3^S9C>P}}n1rJvXiv0bA>_GZQeulP7= zMRk9o7iE2k=<+(*bA|<%qeyHFADe1D=ZTmpstUHTty||6>&p-D9zMH)6B~)`%v7NP z0r7aFA^lS;&Kb0iE>UTg)+xg9dFAqAp8|T2aQdgJ#2vI(;LIh#W&YrxqQAzY$y0UY#?U2vFf6M2if#+X_w79ZZ zpTT!}iIO~C@(-*&N~f>(VZG979(yS-u(O7*`lgEA`BE(w>!~mXUK(mKyX_X(pfA(w zK983>)o(GDBe-hcla!}2XpK4l6dnzyF=Anheru3OLq2+jC zMqw|jus~iZ{sr|>sH3g`GScJE!*ShVqVp+c`d}|UrmLz23%{?}9OdZ0&Kj2KD#;Mr zgJz49I}>@Q9l?RQ+ed3+?hJe-HXQP~DbeZqxOQ;3J~O}<4pHRv@KcfN+`nRDMYYgb zT3(Z2{aCdIPlCA2V8MmO=<9>hKa?It9Ee~J>2LFAl?dHjcR5e+(eOU@K53qCG-mP6 zTq&(tfaxu%v*Rw;AV2u3hT+)AG;>b+(VPw~Q}1y3V`-?|laG^+iIj+<#A#QMhX-%k zWg;gpOWIy{;U6gwiCFyGEGhE2*o~SL<)b#P#m%;C;bt1cYdu3b?uBH{Jr(mc4btn4eNq5$T~nUe{AM+QV`94?S$X@lm=r%f@HPN8ifa;h=z1p91?RpVwQ%79At-~N~)BG=gTTyvs za>;5lbzHG5zEC2h8+JH%d!vcN>m>C{Cl;jV1-djm!_@0O#6v-D@nJH$twf^+%@V6EbNcg`sH*gPAeE-LEWuc5Tba zZ*|_8eo=&pppxB|ByvppI|C?vyX6G_8IF3sPI(unVyVm~c1LoXM zf3#_#|KYs+K#Jh3d(mLXmEs(m zWy>%X0ILfwybJ8+ZMh8;M!bxw$&37{y<>gjU&6u0BR=nxlje!&@duKRC=2vn{EeD< zA|x-+EiP-r?s>boSD{F-JFdV>c(T%kovFPI@~ULxvoN;K(%C;dO&r@7@_wVQ{PhM{ zJ4?@`Io45#kD6rPkl3wP6HsRcTTgso-(WqH5TfCkLb7?-;3V@(<5L8p>pt}!(h3TT z5nZUUdS{H)A}5`#UY=csf;Qmig1^VORcdI~{3>>mP+K=R?m%BP{o|L#>OeQFM+?%P za;qDT`Ls>$0sj_&GZ7ZgB`;Q;`P<}%eV7S31GgPqA(9vK$W8ylas8!KlcHGuvfy1; z%%*_$biQQx8+4iNJX2}&uR&88;**Xk`#8(r^U;qYAOH0pk&o`}KeoYE?{Y*slE$9A zvv7HR+`79N4ri1(?{G_TJ3gKd+A2x8deRw~Rh;5AvRRaoW`6YoWi@@*l=t1WVte*U z+>coVzYw9*TyOrrq~h0QNk`3*?#y1r+`ICNeXqnmk!Ld>Be_8QN$3BlHo+ZNiz|2R z9xIQ$kT?Iw-wI>@ckIjmcrl%^4j`6l-NVxVF?3}-*}n@nrr%@d)A#ij%{2Z;;nTG5ZWsdpM_W~uH_zWVsc8NG??F5F z`%<_N2!yDpsLgB*CJqh`KK{nu-roB9`qtLg5z2f>VPrx=!uRjr0|Nt7Qc?;EwpM!* z+)8kt1&ACFvtA_{tE#HPVA)AnD32Zm;fIpam*20$s;{pP#X_OSc^0r#YZwI2%F22g z^qPXArKLqIc#7PR!JQ$xu=8(e=HbDCaPZTh65YlStU#LobGnhCA!?9(Tp}7pduB(- z_GgCgsG*cpP0l-7H6j`BXwvB6X55^d@6`=!`NHwH+!?-ghZLgA5Sw}KGqbYF^v)E$ zqrnMT4_bUKTWzy|M;Q?jG2WKgso_s37Kf`zGOqUf_wPC^4-b!{h<_vG0VCX-t$i)y zxi!xCAxu0{JQ{cE;d|AK@B0rPJn;1LavMpH_~@;)UM%sonUKKkD1J>QhLKw2H2wJ) zRD#L|{TmkJQKi^y7(w}!dB3m8$W4lp52qln*3saP6G|$N%A?j` z?%X_+@tCAD_ntvNH(rf&*U>^;4KZ0BW;F*I}(J;Y&Xo}AI>O)d4v z{^6lv=|=+D$tEwpkB*E+4@mTfGR6H+Fvbtx`<|O3cjvUIOpU%Qo}IbIax*b0yfk|I z?^`^He}8yJMoGmW5$v{*9zliOAbVV+)o?k6F|XMErFGMv8W$+CUvnXr?%c=&Ya7u^ zTG_tf_!=YN%`^O(++=r`D0!l@kmUE=`lUGmHhvi5{Sym~w#R$mx3 z9{zNhS;l|0r>?QGvlio(X|z;npYL!cvXWM@s70kR>CPL5>{&F-j`uMcZW0r*K$-J| zhCRMZel&@ahryOt7m@pDn)r?wABm~AQO3}LW!x5*8t@=v~sf*(DLtQ+xA(ob-^PkO)XIWpiqk^OZ!l9Bdd zg$w+cMYrzb{jykoJ4(9kTm$CrhUw8b3H!%7UYbkzKhPkJUawn9K-j_q;q4s^)xbgu~S()6>|{ zETd@x*h>qCgE6|5*!+>ohi{t0%-@z2aQ|_yPr8ZrI=vWa67!uB{wz8uK0)@}R4jW9 zGup+3mNwx7Z=z4<4x6<(#~&M_THD1ILJkWYMlIFyFn2hQ=zLq7IR6H_X61|4EK!=? zUgpQ#FEqarf9(A7%Iosf`0?BLCcE=PW8H8MeCNd%LDj^lv$M1NY>1lrTOJl#i2!`5 z-a4nPrt4E}8ylM`@n?x@Tg%G`nA2j*<1P~q$N+qAuHFT?`=QI>)vvt4g7xVpLZ zC9?YEWXE$YmJe7>Yvz_9GoG`;F!aJQ1V-H$$*r4J97R2RzRnCt;BGpnKKarn-Sga~ zv1vuW6^_mI+^O;ATBG?vD!)s5Xm0jqlJe2Z#zu?qL;A_75o@Cj0^}r?Kx3ZUaovk& zwi12c3F%(0?V|71cG?zAww7^cA!l^6;0i|%Zbv#BhaTM)+}P<<{|R#KhG@DOwMVej zq8nejIk1|y&($ND+!mPTCJLHTg*a-?I|%3%K93eZv6u@hv zYwd4gatp908G#)LKU}=H!kz z$HNABl&sV?51kTTP{O%gMr7RJNY_W<(y5-EOz1VAEj`!mBIU7PIT{dRR{Nnk_Cu{e zt)LwuWY`)soFl9LLp5Kc%@@Xm34ox*~h1QU#nQBmbv-Le(;;{ z;^HFl#WixlW+?M<{ngoWB#xBsjx2MdSeZ@JIlLQ$>6gX)D+8JbhJ{E{W!gUaiG_~M zx(tGuf%ej@siadqJg8M*hSgWhiO(OXET589{I<=<&e^m$BS&_tr({rmHE*gq z3h*HahVIQn5otd9(*&L6J;-*X0Mm{4?s%F~8B&h#ZJV&5NrKXP_RNmxOCz_ess_wr z+e@C`_{3hD87cURADRjBo$#f+2Zy~Hnca!zgNC*cE52`#s5)IMsps1qqDJl35TXWX zEV@L+>W6O-^_d#I?(A`?2ZJI3&kW?!1sheqE8yp8?atOFjg>WD?$&2XMn(|xlneVk zfh8?2cbyp^iX;^Pz{?KMv<{0+N-UU6kg+fK ziH!ge{b{aBFZl!+zw4l(`+ma1>k9@nul#(J8#HPg+`nro9&-9CMXi`05#M)ef=9-f zKSMz@UhuiM8a-NQxYeE6s_*X@CnR}`H%=UyaWk^(GMUOtk9Lq=N_jYcjZ(saT%p0C z8CgJXSMlM$QbGz{P4(2MJR59QFV=CpxpHH)@h$KX2@v)kJvXPeLBDoW-)n6}X>-5O zX|_WS=FA8wpoRp?dahC{epMzloh$o{f2L;zFUG&RSwyaE}dK2#^1$0PGe5oEdM)@sq5;gH40bdQK@ z&*)Ej)g_gccSX+6{I2Y80t(eVr^o{C$&w7O7v|m02yuld0F50>au~XGMXTZa-hGqC z+~e9s#gYpOS1v{v`RSFnEml7j7R}zVoK(rE%!#`x%%7}3 zexF5-Ijij3=dKxwz#_0~4w${F#B3H^rghd2?P>E+22>_&WC%%~^rCkg5AnSb{Y08F zYcxCX_OM@$Ia1n2afWo~kg7X>{J1R@d_i5GLj~XnAB3$u;ka(Aa+^ z%!n2Go2kFQADA2acwhnE9Ed-!s3R&(kDzGJ@B^7=B`nB>(Pnd)r0%bQkJWaW^ za`TEWvug9Wa1WTxx)xG^P|5Nkxfj}l!hOE+Wek70cfibxKVqkwHIi%&lGW zWR8Az?xoT2&lKkrNRhxMo+1H+q`wh4%mOKH7f*i_=60Dml{#IMh};!wJ(}D2HK*Xu zfYF1tpWaB_eaw5szS^$4UUSof=&)uV^p)BCPkf&ZLn}8878Zg|)Z!ePs0&A@YE^>2du< z+%`6gsZH3XlNl$Y<87O3BvCMjx!QFX%*AbGNI?Qv%9PC`TS@-=H&1Y1RPd- z7y%oVe6qjY;fgf>YIj_LUh~b#*2KvN7VdX3RPro9`1oP~aa~V!akZK(HAsRQn?aPA zHBDY6t5%rEdnK%lbw`j#erfA(H-lP+P_>0vqR8}S;!{$QH#u#+cXT}78(({WWs`hz zxhLfywk@h#vw6@Pw>%tndaONRBa%y9Wh?a&+`Z!9$q**NAbo*859 zes`BJnLW>nZbgZdW0nn>^OZOMpHKg1a`A+oR92`mqtF34i3ytzq&KIR+E!PUVNqGdE=2O^ zBhc~X(R`K8(s)*12==xGL4cM1*?ehdDaDNFTL#686YADm6&mQ{z0$zXTs|XEiGC02 z_646pMaMW;#Oz%{27&`u%lk*hF23qYwB_%etwx#h(lTUmk5FwV4 zo%^6V42Bb=KWf!t2BOllHV2U|TlA&hekc?OI>Pth2+=EbB1#0$69Gazg7-tEK%e4w z`C@Ql$^HGCkA_yl;ug@!GF*#SEG87YY!!YV=T`C)wPy*IWOQcoyB)3^EO#6mP(k~0 z-ob=NgSMBTIq_Z@}%oc z;fgc_pR*px4PWcl2bBdDK0b{zFHwHyyDy91&x7Kl7YldWWG~Vz=1qYT`5?Q)6ot61 z>*8aHocIA(!RzCZa^s$m)P9LI_Qa@*Tz_#kHQstwm;^g94$jKP20k`+)++8ma2Q}C z-FNjIDEXK)O8?B*H1{c0qDdr@VUP(Dw zefsYGPxl{gqytDku_zYTg zmR%Ea-Xn}0avgH1(nA`(z)$?lRj=wmI1=pGFj{J{Vd5)>!)Qf zimvB@I9veU$x_j7n(jrFA`{ObP4h(u{*qbuYAwY^CJ9s}lWlE}*Fh!T`O{`0?U`|m zH(7~7Dle?wWsm9R_G(>drrIV!K4ksDhX;fD^Mr1f3@wf=GFFG+wnFa5sEiC+l{C-! zcojqO7+VK?<1BMz;x=;Ht>X&betuwJU|=bu=o7PBXFbPjNxSevjo#=$2NKxXDHZ=c z8dsz0PoYv4JboZ9bd0h4hkDzmi{{%)p|8U%S^?ff&({dqOdx%DL_Q)S4?HNz!~nhc zQpn`>5aBQS0;BQw zy1Kec$NT#)gx<}Mjl~HE$h*9fIz%E97)lCU~=VvJk`^=0)-l~5^`G7+~Cr` z|H7zVOiaH881?ls*)2JJkMlTevbBR@C56)}Bvl8#-j~ub`ZnQ1y))zEi<7NDm0Z6G zT@S09t8C9#>7(+XTO)nU8edFy;OnIWD)1d{ob&`lG$4zBR1r#67b}cBxXD0mB2WZ$v zE_Kq=BT#W{lGUv}EonG>_WJQ2?nMQ!u69 zU}n6|R}&fzj#-NEUIQVBL9dCQ#2Dz1$vsjQfnZDPdv)M{3skZMRW}H_l8jCYDCnV*_b2Mu?sy{(`_{I@;`Ps=2h47hce39Ls=x ze`|GP!_2Z60}*$?kaDM8mUr438d6j|RoB>!E<0WfS2)OJzcyWL3Fsx+?(__l%=Ih& zP%m@;-151sw`I~AYM(K-&7jcjxuSV6#Zg%ZTeQ&G6+^A~+xIame%hmYfW~VLuo3EX zPZ8<&y~=7pO=x3AyWGf%d_(_gJ6ArX6jR^wn)dCX@S~EZ3%V_%vJ;7$ouMR~wsavM zZz|_&C8eLOAyA09i;+|UB&)>a=}_v*aaGdM-#(*hbcvtVb27JsP@i8j(gVNV@_m<2 zkr40*%OdMST(+4c-ZxnJ%g|N+zf2)Ac zW+DeF#xM6d?HE+`wt+y>m&(T_P9WjJ`hwB@4JIdNq8fca!)H=7HX$ua!uW%yQnWz= zrv1d6WuCuty=kY)j3mpwy}dtw{*3RmHI6HkeP)SYl!L#Asj||;+#L36ITmrCAWe{D z_vT%^c?42{leHsCz~`m`hMN>w+}gmQXs1F5r6x4N0pN6-QJr{d5Wi-LRb?bhONnWO zmrCIcV7jiwK-NuyjFVn}TOyp0K=zsz5r%#R02EJ%-E#6pB(U04b9_n^3EPdM3L#7s zc$RnqlZOUfI4GFeGzcG$V~&sGL3;6{Fn9J@p)6||K3?8K@2$U-4X4u|4atl3 zyiRcMGXd!+)rlg*^k}VbXgXg7jcgu|z{F+TOc{bs!V8<7xrfO%WV<)tcvs^08NaC# zElsqVDqsDc?p+6TAYd-pD`n#sbdDEkv(+O1j)gKz7xt7^`ui#SW#nO2Sa8_9|D-9} zOluWqR-;vA0g;M-&0zQG@iR?LM>b6Tts$0#REGN~p&K9xMba~bT92!p^}!PRyO*N4 zo~KA)8KiWx?A4Tw-fE=97(WeQ9GL|wDP4--&6!bo!*aA5|I4(C*IMK;33A%GKWX1b z8B~TBi(C%}em29vD1T#tTnr=&S>fj6i!t_XQBd@$P=ynu^*TXQqKvayo*sUD3oUdOs}!GnM$3aV#IVdk3f-q&>d z^P{6COwLdSB0>8&$b5ws+QW(|j0PsZeV{f5aR2@03|5wVfjq*75iS1BCSx+68SbxlPLGE` zd(GY~4M8PL`o9Lp#C6*=U$@H;r&9G?z+JFKO`h4<>T^(`veNU1-4zIR_A3$}MRP&}SwjF1>njZ>BsaZ8>q$d82`Q=oH<4 zdpMC}gXj5S@U&XqyA1FT{M+*Zp9|z3^C6f-syV0Yi<3!;F$zSOpyjnNa};}lTG^Bs zl8P?p9tRsomuZ@O!2^Y)LhovwJBmz}GWE0`kkUz7bPA11GfW3)8!ENj-4tI?kW+WE ze0b0%AEBu(P4v8p>uUy-fn^z++ajsikWfB^-;CfjR?)NEp9+qSl_oh6o3BdE!{S-H zqo*)Of~+xFM!YKC6Eh^v$NucDSZoeJ3RDe92l)HjURTM<4000Y8;5O-+&?POyp1=H zdd9;yPt^yuIAACvZ($m~{V7~F_6!H2@KdgK^LOuFJlABrg}fmXdvLSz?3KpBMu=lH z0kp6bGm%5iMy4XV(~RIJlSzTS%CWgp554`pBwBPg(5A&taNHU6ZdDNIeQ^Y zBWg?uTG&a-zbaXYqlw8z(C?ozJWk2WJKfbq+m>P}C@5&zJ-=YAniw?%mAeK?VQ%{T zu+p`>fp{!roxC><&9v4`BZGx9%UC0$llbmfxjTE|yTnXzX@Sl$gFhozS)$_a-_RP} zER>2I=)AkT+sfZ;7UghTuI6!`_LIg_7;86Z6?x z>aU=gn~c9xr4-Mz{=25zA6P|~R?c>^7+ln7_lbD>V|d3C^3J=;3l9`$+rq`x52=&n z$LWkG9FO`RMj7Cufz}7`_S8d|tM3%7NZDE5ot*(%mo|EO&n*RsJHYwt9Io^Psy8~ zSZYM&{F}|}tts0v%5|dR#!;thLSEBL)uiGb6 zOwyTn>RpR9>brWA9>yd=Q2ggY!o$%}QS~WQXv&G7K7D%UHiU$Tz&R2`q8@jRy?$+c z=7%A4@xy)$L#SJ&*fZd9&wI&P1$KIUprYhEw@;0Y9-YqA%2y~R{M?>hsC1)eGews( z8Gr}FhxEzG--D}y?Az4TWLDbT+`OhtQ%+v%p1T|~4BG6hkYlY2q$#*$?I#PUV zLiX2m+Z3FH%eXihFH!5ABE7h*7qVc9vHXN4ubh|L(KHokaWtQU9vOq4*#@^GQ0hAl zEkqx52F0K6aD^Jz^#6F?h;;vAQRIl1b(5@`j*w|{1eN|wGh?l2`u%m?law!uP~)D7A1Zs-7=n)WpwIoVhdH5Sf6S$-nOU`_^PGO- z#qtv&&I~wnckFe(_{V33Q;i)x*f+=)R}SBfSW7ev_#rPjE6ugT#VanTd9F#e-wd<6=MbmrHUs1_q8jMpNWAihz3Lva{S#god7 zsPS*am+>#9)4g9*O<+y5cCsP?OnMg&FAm`pD9xzph6$VnM8#`xH$-RIo^C2 zvUOLsCs1HK4{YDy{PBkbC*M>>4i#>GDxuo2>5~2q=aIxfGLE$tb3?loYLJ zz~v5G|66_)0%u3ZQJl%3P8QG)?16E8Y3AB&s_Gssn|I3iI?j@9bEtIlmgo+VGr^}O zp}Ek)u066Kh>;m|*0gh>r&MO@brL`=aR7$l(FOsGMxP-_c}ey{!bfI=Y8Od|*94s*4ar)-ygib_k87^NJ`*>e}v$^kx-!fFJMFZ2KO=^isPGh^1f zY+p6NhXi|xrvVuf4MdkdU1|#j)&Qnavn z`c6=yqM}6Mkj<%z^;ABWPC@r$npdx0(bCdVP>4JO9`Nxr&~)}D%U%l#-TFlNoiil`0F~;G6;Gz}8ij-eSR(eNE z?(Pm$AzL6vpPrsBcSM>#kl&3W3HCd9z3745C1Ex6ude1&Fg0CwJ6g-=b44wms&hLs zxpH)Lre150G$EpYw}Mkhfyh5GsKZPBJ6UD~Y--Aa9+o+q?pWIEOJuX>IaIT5Ax|lb zX5_nKI*=X=$mbo!r#U@NEz6H>U%q@P8XiInH-^gbh%0;&6n=ZRVJTD}$WVov#x8bX zDoI}|3QD`%`eX@zbV~F~4C5BFwPi^TK^fW^&glUIE(7{OZ$r|o(d0-cklP}Od3=Ar zsj(QN3)>v|u0l$X#^XSxNwEnuQ9FsC0|4YtV_AZ<)Crm`04Ikilz-v7hq8aA3o;u zP*525CbAlJM5LOC0aX}52mMM&fxvfU8;=FwNesUEWrK-z7i1p|!tyvvDJj%;K-TZ- za=SmjJ~w(GDY_Wm=9vBn?B>CK4y##U0j%P2fg~bdnE35ma+EoclR?i4=7%Nq^Y0WO z`hp`O6n2N4Zx(J(@i9|q!!#9lEkS+8xHnNk1{Xu%+gsp=d=*{mWEms^YLB#fgZ=8W z@(`4aF=K9acASR1Us6@HpBcAt`Q-pobFGm&T#^*43oCV z6OTfaz9A&#?cx@vFBg)^+LYf63x&t{ZD3KbaSery^5+h6O!@yFp(+@#Jx>4CiZeLeP{0lo5|Dh9@ zqs{0=hga3thFGohARsbfUj@Cie$rXSue+*fWt8#)`u8(T9D0QufahD}Xt$Pq(vJR6 zVG`~I1qJ#W?Y?g$H#aw0Yl{dVyusmc5LH7aOmX{ZN1qcrq0->{mD{cLMo<5}ZReLn<{aZt-R_W^u*^8#{*m zm4cicjFZccR`+M}5D;jSIX<3l42hQKciDP+HpIkWe=dg+XwA>h8)8>x5FBE^STdle zjEV^gLY;E}Z7TfHCnqO4B4vFR{au69uHRR3E2}aM`jlzX!ikv>t#rvbrP5F>I5pAt zjmn^qX7!H&N1v`qqd}MFW)KXxwvs=Su}Da+fdug6@#97yFg$$m+9PY`W8EidEltn79r z!fJQw-d*Py%nSN8HPyI)_BkHI#%wK{1Okr6WjXmND)UYQ&jjw_;eymR(9*+>>6WLQ z6Ef>2VR$f*#P%Kd7Wk?npXlSh(WHAG29sWra@*dcz69+)F@DKoUlGFaKJO+(PmgR@ zX$#)}2H|Jyy0Xx-ucA_{!;@(sGUl@2Rc+Fj?5Z4VFdZ`PeRa^$K#_Ng^tqKJW+3Ku zL|q4d87&?GLGY5hhX+{eV&Z!n^l!5F4%l`pZ zFNl?t{UJdbpG$Gzc|Dyb+6`5)3+-m=&(bw0Prt9k@08|i8RFsrT4{z`owOl%307`WG~zq->Ax{F84ex;3`KnWnr)z|aU{nryw2 z?T{$Nw14tII}S4Qpjn9Z>e69x99ll$er-qbsYE&!12RP5J3z9n3sTJVvz90 zx`RwSsHCDD@felmxi667-~j=4cyg&A$@HeQZkR9*Ils&HFK*2@XSti1I$paaF~28h zW{jzKhAIQ`V^q;wxVzV)G~xf^B87aPynhNrJJ_ztv#fgn z0a)EKzTte^!=qE}l!I>~fy47%#CgcL1|TlZx1V%sKLFSLvm7b3Hh8CwcNoHR(43u} zJ1g?7%swB$={hcMF888l0Ebo5z1d;KW*>^wlnwKsQ4V1GttKPy_d6GsSS)3e1Qf&B zS_e(c!zS>IOIEjK9e66G$@6?e0qaa5kwrKyn!FCMn^7OC)CeTFqROXTVd>VCG8Vg~ z*0sJAA@3_!Fk2NSeVLP>rw#-QdNF1}N9xtYIZ;K#IYzqeMO@IMmsX+@J^OhFY!J3e z3KZ~o8RLLBd{wU)0OT#;*+#a^a+0E#r{}u|qT=m;Qd+`dfTIew?7(RJgVDjN zkLnODN@#DkwDVeT5{N?9kHH2g;>n$nJ7!5R5EX37y6&5l01||RnqTU=3h#DQTF)id z0RCH7NX^YY7komzB_6dX9YZC(*XVj+2)^ltYaYidd$5r2i?jmt+8>Di0m%j(1LOM- z01(R3>;0(*^aMXKzlxY-wZ54^-Fce)1>_kM-{{4!4`M>^NL|b#s9K-fdzE(%91KG|2WRJYQTARY)d0xeLUTGx z0=EgEjga@Jd`dXi4f3rwgKW|;Vh%wic+o&!SU+dG# zbhRk=hkPgVx=x?~ocK$LO{ue-l+>>**kpSb0B0`qT)U9>Fds2^(oaiacm=V$9CHxl zBS9NmOdpUe`#SXr(x5&6xNwpK;Fqq??nH+q06hmPrbOS(#7`wN4Tx%Ki~h-`KrkwV zC?@{6R>-E9i2CqEpG7{Pz|kaPT|s3V(5Hgl1dj#X$WGAP=Sdkf4z{rnIhFR%;-1FL0vX2xc!Jm4Ps0I)l!K7trA?f+^px|nf~Px*V9 zbvUrXq@`cc(SqD;eoVMUq&q!~adDJ6$Sq(fR_kq~8INRgJ3P+~}t z4nau?MM(hx35RY31q>QVB?Lr3IM=xQJLkOb+0TCV4|jLwndiBm>%OjU-E3lfwk(vF z0GYY_7k=u)$e`|Kls=@}XTR|ESg4+rz~wOrWXO*g5@$ila+Oi}&rBHg#p|!)elCv` z_>ulo`Q*tH4=BhJzz}HMxOMNlWG~EgJM1U>Br04em$F?n{LHD4 zlc37oq_Zq6y+5F)EY)vqZOzf2z4smAMN30NbA!%XT2xe&gM)*g|0)2NYyUo0E}Xbf zBAUA;V)CT44ZZhRnnw+L>7VCnq-(3I0h=?*RcucuY5;VhS7JWiEf0AJgUZ3q3NwaP z(s^etR)nj@<*t`k!BG?q_u1>UwT>g9dUrn8+5r*UFPwwqJcOG6w-OpDT|=#JYz)2l zPX+ZZtx^eFJn-0oo|j@@2ot4z{|Y(FO;xPpRLWVTD~t)#%|UP9zJ;Dny%t7w_Mn}S z5XcM(4=3#HKCvi=+5r;#ZtcvO8S8a!&3NmAVJ;jLqZ4>kULZh~dd7(pY1(`TWu8gU zOeyU}1vKae3cnX}PLB9&|LI*YgGHoxs9EFZOaJey2gC!q4;J~T!+^B@2;*kf_200V z6m?_7<(c;`mirsO+bNRxc??AKjprr;n0ho0yAQQ2CImLciIR1^P6jSJ!Ug)xZfIp# zzV7bqq*xAIy$Zqud_(h(Q}-rFCl;(1fO`W~A{RLx0JtkBC#RjsrjvB=E{TgZ@9#Bm z;i`pFW)IQS^MlS(*7I6KiLxwaaUI6>0zzds-XvwPLKn5K30GyvA&_h< z_NTB0|Mf5a-U5t^L^j!Qz@T!U{F$q6j*k4#3l_bkOk1FG$!mgw;SqQKkMgNJyW{)4 zwsE2uiSg07Z{IYyf!~6jy}hSLtB=2mg0XvZ49Td-3a}&;Od5Crs!oGcto=@8QoLNJ z)Jo=pyQvovP4#^^59Yog*o9yY`@XVLdZ!{A>UuZ zC}H`odxQx_1!0z&E&BM!v2ehtU=&PDAd%%gJqM(@n zr)s?~-Y=u9qoDgDtc>{&Ek4}FE1uFi7TAfrLo3prwE zmZ1>TP*A|Fc>(nlWH%tM8@8vWe)QlB32pZ)%er_JUb0r2mm90yU|jTjrcdr(#;JOQAEo^%WLxWf*dgmLCt+@TRMYM8SMY8?%fyXC{d7?a}ZNNfm7omxOn zKlOhE9(*%q3Dk*E!XDyM%cw6eEv2QzzEdGl;m$!pK`_r;umb=~+Li57oCi$Luu0f- zH#2wFg1RvRzN`P{*OWm44xH)9?|Ax_bx!yyqn5NvDbTaMFDqVzBHbU*@2ae?@B$f~NvsJ>(&=&k*a5d&;U-?m z3e1T1_rCLIk;ooFpZ!g=klUS%Ly5IgYXv*rAdo==YPpsK+ltF{v(@LKZZ1p-qWJXu z)sqY2XJX1Gl#+F;i=sqFw;Zd#X+H~emgKKuO#71ZG}l#oiJp0?pQR-JwL*UCr}Qh< zeQ81@RBX%&f%O>khMz?==i_@wFOfG-EP%Cxu>=w+2Siy)6uUw zVJ;%QJ)xtGhv|5529ZvIW!+=|=oOv{Qo&4EjJP}B+OrOZVS+<58ys&+N~fNJ&L}UC z^t>2<7c8vZ6anMqBG6bCiS*vIHtqlX`EyrSS5J=<>?rWMYXrP)YPx3Z+-bjk4venF zxB!B4b|NF+$mn=)G549Y41v6GFyZf0f^-HF_b{H=MKam){_M`^!lCZeBr zAkUv~4*nBB9BpcXet{7}78MW^gUec-suiA(ls3t#8_BV}c-5XN1O z%Ol*AOn}``iQQc_5wNx}Lt6pvehxtHVowhF-OUyvg1S@J}N?0I3qJ8eFwW+FiUU&uNf1zs7OfJfE2L z;A`jL`SNHu=AsM3zf_aVpD5?|#62F4)m_DTMcK$e> zc$^ed+<8$OFTrq{2uE<&P)*rsjlb*4*(w*Qy)|}G?5fAFqndnj%Ls+7Ksz%{j9FiX zwdwjw2C(v#BFZlzx#649#CfH0XP31B-Qm2hdi~&XiqO}+L}E;TMm4uo<_ikQZ9b%rq*sIPtb*@!FE}I7h$I$6-cHdeLF9IJf>sg zP==sp&JsojH)Oqs62u<7&q?rm>fXjk^cKk2K`W~bHH-wo+!~cnA>}xntDA`e>&$U8CqNEo9wP|plRq5P-;tJ|7tN7TrpcNiVTuDKtz=OF9vrNX99t{l*qa;=F zLyz`_2y?UU6In)BsJ$Nn-W9WrjpQM{uH^FepE0Kcp_BEl4TIyRGaei0oiZ4p!< zE}gyZCt^r`T+^sGDh?Pg*NKYL+>%K9%4l~R1atsXVN!_m@_yhPg2w1prAa<%AsjU%eU?d@^Z*g-DUlW#;0Yg33f)DjnnH5W=U-nEGr1cDJUc zrVKIx-F1AOjqiBS9ent`ZhO(iCIB;0=3Z&jam{A5KJ7l?KO7q4CkzFdi0VUVJ!N8! za-!FJ<;E@e2sCVSyKY-GKe^XzJ?Hi*XdfVoV4#*Z>*=C|1-1t#b2DDrbX};AQEo_Q zE?|(%1BtjAPVkReTct2A`7xpeFLJHeJX(e6R~iMjkpQFAi~lV9127I#;#8snDN#0LgQL4@!^1(Nqr<(A?6`GNp62elQ9tf{-`u z_hn{kpr1~c<+ml|p_<^og?N#?D&WhufBqB)7#A10cCsEtphmz9eUr@#83A4QxLO*r zVVz_*7HA4i^P7k39fg)646YW~a>>dZpvVqQ?|EHQ>TrdBX;3k%1;O(1um%EN+JFQd$SfyTh`cgwpbjgVnfj4nv1)h|&ZsmRGy(iXN}mLlj*#jz{i)aJr% zUlu)m`n0YLb9ik@u6#3eNzMR=B)Oqd(W8%wS5WH<3u?Lj|3DlNx`)eB*4zpk&9%TX zx4>X0nIhUNj>`@zO~c`dzW(G=21XdihCv4L%}B{rR$>q$>6QrpLl2`QK~ZY@R$#ya z{*f5j2jRXJXY)dz~R^v1( z!?rtmO8&<0Jk`jLudFP8U@kt50PuLH)kCt6u*m9AgzwK9);|D|2*E-Hk)jq-~qdTEjD(FhkxiGZMfrg7TU~RCaZ|9@CKrjfvxB3_Tz>@z!Uuaihp+K(p6Tk z%To+p$1=#0XGMWV_0&Olw>wq?2jerJnc51ZrNqJ}NP{deilk=eZFqvRi%BWHUjDRO zw1e~t{LyiF$e&B1qGz4d`ZuYWMU^lHO4w-4jv^@^Wn&=P@!;!ffN6ub)9+zMhXZhX z0kD7aXCq`X2G52Yg~0Z!)?u8CM;i-_Dt!ml*Xt@#{OuwRxZ#{u7ub?U#!Y0NbVz6|yv}ajU@P&b&F;6r= z%l8P(FH!W*;=ZI5QM$k^JPgCdWXI6ZBfW0XUd?q@8XC@s2it4o6G*4oMHRm5IF~rqxg}~eW(avlY(+>qF zx}fP`^##n~PhHfG?UHZWf2wf;`l|iZJ6CepDk|Y|K>G_ssPtXA%a{AUpN{wkFWQwr z?H73;1UIWDQYvBT#21$?JAZh-+ryUw!(#L+EN7176ER!jHm)FHK|zF=DmL@9I@6Qv zY|q7B9+W%`a^wsbyM;L(#U#!WQ?kf|`s~7m1)%5iLSl;m8zTSnjX&i#&{S~OA65b= z@J3*OIiXw~piAf@6K^?1#l;1JQR|Hi0J$5@hpsWGxDn_I78t`QmeA`RfKMMx^0xiN=uvLToswpt%p$#b?SHSWx=Xz^vYsjCqTN2DjkgB5Y zHt)RGQ5$mE-rP*skoht7_HaOY8npRU1qHTX-x`(;wV>+t2NYDh*<0D2?cBMS8wA~= zZF0mUD&Eo2l>j`&{efch{`?yU;mbCn_6u~+K^6ll1vi)>G{=Nb^36o>Zd5BQUgGch zh&;kRJx2$ln=GIZE@*gn!ZQswl+d7>_((CTg&P%VM(4il;;E>4TIRI6h55 z#c8xa+yfx8fo=kSX$}YyY_dO5+Y40TO|gGxH>JDAa$VLJah0nlK$*z=&mW(HkHD6( zQeL9(!3)bJAji9cDswM_CxVOa-$iJK{r(M!r;xgKlHVf_{;z*yfd%!t@ipL&CdvL@ zQJ9_IjRuU2y!_EjTNt!)Uvf5>-G#3mx~a#VcE0dFsqCFS4S3#+;ERa={@5W!mZD;4 zOCIGGSOIH`C#^~W>%Zjaxv#OYwQVG@Asu8CKi_GVA^HC6IQ0T%#1KjpjiYo zEY65OKR>^qK=Kj~$`niTY`$m*>@$A5G5Ymq1J{;bzG@)8err|YS6PVPm$wy{f62?s zv$3%iHVtaB2bn-O2;#gnL30!eW%TpnQ@Q|&>^wj}!JAM96c_!>@^XoJY3^=@cQPmH z%TmUPNpV8%MC0YJxYhDzna%r=x5myb4cA*Kh&hDX8YhF4Jr2fRA@eG=Y*4<#yJlkx zjP}Yb>YPht5+j8S$4zethx%;XfF-Mvk&TV{oR|k_3KY-!b=< zMDflx`+C1SKW*6cvP4(uwD?iwfglzD*Qs=eN7ys- zCPqEZJx2dhn=#l#v=(7omVAL)*l5};czuqb6tF1-%1lCS&3)W|2rs+KM8zyXPI!ND z_QeQ*8P@0KLMz>-n?ZtPePO)AcgmlHvkkmU)9x(HN|~^o6A}^qK0M^ETYk1rh5-Qi z(j+j|F^Dz%9fl?>?VZ}stCB3!(0RN)79>IG&Zi1~J=8&%8y0MkImIEYGMC{^9FVajG+wlOiGC%!1$U{-$fN)`R_M##x+erLkF znj+6ENXf(kF}g>TED~q4_TkBub6$xY^#xpd9PTa%CoOATenTB|1%UO)oMJTVy{W&H zi`2vCh3~5`=)j9yVJDb4yA^VB$$|^VTCRQ^C`yE!`c6mZx90i@w!~SOZN5*p+zNkK zAqX;0F%B731ZjGYX{pg7xbR)RR-jb@+Yxmhew&VY}4&LNjkz)0=i3%m!Sj}k>r&OF$%VJ%CfzWmP_r;&zRFOnG7gIv?vWI;$F z_{+bM6dPbymYE+^`ts$ppt*2j4yvxx1_AfSpp*IyB37fDn(654*RNlAh-?9eF0k`L z|2(J9kNU=$46bGXeTD6Su86M(>?ZC0E{w{4AVqi#`v*|H=>o=`x>&Hufk4Bb{A6d; z00WS_TK2TRWS*4S4NDxgyK9CHA4}@|GNarJl9EFbSQ$nIiEy$~=)#1ZUElluxeh7@aIE7uRyrlT2hW47 zXrl;HUaLwm0#Mg$<9MW>eILDqGf#xg6B=?N5|Z2gIvl#bK0Y5&lLR0T$MpTTVu9xO zmItDYdWo7c6 zZEw8FlhX~8lFP*1iT)fPIsYDt5lOG7K3h-3+@dpo3MBnW$!t3K8W6ZzRabh8hgIv} z&jaCpA^{gp*U~h3c7;`i;se>xu6g%RL4VO0&+Xc>&%xF+3A0I7mFTV?1xrQ!7VgW} znX2x^Kl!}q?$f(Yl=bWU?!#lf-m7Ah4S!}zd&HMEWCA-cueLcJYMmjb#`#Mw3_iYd zXfJH$)7fDVbLX<3^HkOA`0HU(KNL`R2J=(1e9pDZ^u)s_7T^E5JN&zEeBfrycG8C4 z^VLlq&Aq#nO|N}E2iNkJ>nZY^!(ki$J;g-C5OBIN>yLKbv`IQ6f^YH_I-Rik^yw}c zpG-_2?yxV@?YhVPS*ZST+V6mhxyJkZ$Ji+v(&su#{a>EF=!(w?mDA5@^jk{2wR`T6 zlI`6kOFrEvdh&W7ugFl{&2GfJcG!PgNmuma@=D;;Jn``w%`X9aX^&4tvHW$&-8+BEI6Y|ZysygbE4Yol)z8yBGao-B?9bY+%W7|b+6lY))xxw`5 zu(w=vVrefw*RFM&OKi+!_F*2$-s{h3G1=o2CoW+uFMv6%@$HN1%!W9#~POn?BrHy zJ?qy^vk^iDv(elQ*`*TtNn&!Ijt93cf$suvuBGFKLT&-HaC4 z1QTZSK)D{@W`Y&pxrd`G8klN0A#7WYjvXJd%~_6Iev#}zn$@ZIIJoUH+ra1gL(<8+ zpQ&9YeRZb|(`Vpy(gD!biTUiT=Ane^t?xXe#o;S}MK<;ve49in2v-sC}kz^guppKyrE*eUt4 zw0L%xzm6;J`Bpjzo7EmJziB>049hZfhWRzF=aR?j1evkn;%&|?qokC_h(3p`QitVk zU|I}rR&|~|gg1Z#c_i^BBTal4dnsCR5~HtnQwg@uIx>-Hu156 zwr0V~&i;r!j3Z+!LMY4e;)l8M=%}a!Id(7#CnU7Svt0$RtsGGHqWB=2O|}+k!2@kG zLGuy$D_O_k4Ozj3Yi`Nc7j88lWA^Uw>)bZ(u@F%I_fj@0Jq*=Xzqo!-M6aR-?9|fH zYBey48yXryr>=Q_3+Tr`fSoZz!DPSevkv1p3_{_#t0)&Yw?|Uoe$TQF00;v}dKX9; zmAWrd0-Qbi@|R2d~IN<+;_P)oqT*w zpTyg%S?uD@U?%)rr!0nAy&^Ee;iX&RfA5UDvuNbr%IFg4PxzntC7|OYDj`ZLaTeM$ zmb#-2*dM`vCY_9?5BO5=0s0jL1;wcJ>DBlzv`C!`lw7#>0V5?4JTxP^zUq<3D&E^X zU;^%F;62R-@m6$;(;~f8T(_ukG#nk|a^cA@#HCGtn&}M9iL|5*$VAX>)3Q?|QG_kW zF3hY$(8TLLGr{;lTL~Q|7q%H5r6)2zE-oAFIE~b-Qi7tQ*LvLda0jTS&pfNC%}clY zo8>&+Hs@|}Q{8L-;rYy_#S%4K*03wVc zl;z9JwWLLH?}aVQBi(hk?EoKdI7}tzL=! zV_z?#K$rL!LFe)ovQ42i)6>$RjmHv?cRG=whi!pTzbA~=EHaQ6&>0WgNq1rRoT5O2JzsWq&1d?G3= zL5o@`5Z?hTnWDJ??zsto?eKGrs07zN^nnZD75R(ohllQmD;+wiLA$TVDVRiFuk906 z6O=wXN42Eb|5K|j7>9kBW!mCFQT_6w-6M=~OFqPSokjBC_?qTdg*KV1PdaCwoc=2P zTS(@d$DpEuBoYhb`NuMII`n)(%}NB*&4daws5lzHBp4;n0#mxNgmAnO!b0`CVVxGV;xtm|cFZKlAUpUM+A3aReTx~+8He|lwmj9^4&WgzE7Vr5Wxgd;^|7o_o zA0}PIPI;F+u3TZwnT36XAk@%XOhMtP<35nCkAKbLfI~bTt!IcGiN=R7tb?RJx6#oZ zR0w32S(3LkIAU+X?sMrnt+em@gcyYG!0Yv|RIE{9{og^SpB$jBQiywjapkVBFFOiD z`XYSeA^suXcnu3Q2yb@Lrko^$0SNiaB_m4e*X0e)R{P_ymWJ0GAM5-->o>;B#ui&G z-6Yg_y(axb(yvCxdOcL~v!c+Ze`ytihTh}1!9!b_vEzoFmr$ikxrQH{KO$wEZHjM( z3GaWA_xl*sPKXPk;?=XP4;Vc*Hu^BP+vxlOV)%D{{Gel6lXRYXu3Cp%8Vhmk*8Y3% z1V{fmrVwefTCk@jSSbh95;uL^IFg7wJ6+OFZhXUVPThgaC}s94H*^0!sXI*dfchFX zg58t_R(W&XR6yVOxb$nsdcUo?bdg(~`}jbNS?J;`MJ7Qg5`_RE2@EIa3qTU8udjc# zkJYUSvNnLK<&*+XKIj4G&)O3uu#^XJ#z z$f?91wLCerx)6B${3Y{tgh^_Z8onR^eg$%ea2`}yu}E?KQN_g1#y8{d_oLEYytt(7 z4j?(6nhn*LU-kg+3*J8j=wXxqo_>%)s^E2p6wIJwEAhB~28dxuVzZ8><-x}#VKR&l zV0i#`e!bL)Cvg@wIsof^LA?sRIzFX^M?eG>r;O&ZCUYJjAA9~!tZC5RqyxN#D#;~H zjwAUXR=0pf7Z#=pEY(HRGBaS3Z7)?Z{Oji#dcd8m`0>xPdnd{Te9>R;bu-UdAZm=y zvvTL~ixI!St!PVw6~?LSr0_O%ZpH`fAB0Tns$vtJ<05YR2AbA0>%WimS5TgRR;XQ@ zgKx08Mk}Hn_wV1U$wb7S(mC+h%E{4^iqHc7KBL5>kF`w;vpzd(SnDzgHkVwIPgu+~ zqmzKj`<{+zG|u*CZ8$cI44#};v?;JlVj!iaPCrLf+q+9(q8+-w9+`=77}j%AnM%Lq zzZ(!f+d{Ecdf+=f&vfsoze7>#cGv@-n>!H87O?D+DRK#&(Ni(~vI{^@3M1Z`y=3X> z-iL_tso;8>R2ILhibrDr8c`@ni(x)}Sv6Z3R*>1xT(U09s+w9K(jjtv}N zU?_TwQ2JPK6H!6Tj$K@f^czeMZBZZadevG#74YB$xWx*Nx=7X2T6r;M_4gE4nx?;h zPj`DI&)Pg9J2(7cxwWM6lT^e&vh0ZH%D(!BC&LSlv^Ud1C!+*88}2fXoNHGm&iEhK zSm(V8iacOGdCM{Kou|bSfvI{{$Nq7f3`KMBMSZY^zeFPx+9{gur4_SY8 zvbsUk(d5PVuPWs7e6zc90<_i<$59_Kcu0EGKwErU+yeVD>43U!;|iv~M5~&D>C&Xz zgbaSWEXD``R|;B8Ks^^=9|ITDmlxMXOpr+EjDM9H7lYUn_U&)qzXt(h4jjw3p`7W- z$xO7mzdYzyOMwSCL#bHM52<+?k6mp9;&wn_!3n4{AZ^rSWQHg96B_$}dUD*_-$ss9 z4=#RPHZ`b%$WF6J-9~{s9p0N|_`N-9Yb$ojKFg%n{_kA^NasBWXH05=KZ6*sB9wgK z{wA}-v&Qo<^;EN!Ox2$nAgdPG43*WSa`;5|Wc0CXqF}1v7G+VM*Q)_iZ z?D)OxtMeLS(mncK>(UGM4OyqW|83s@Yvqd+ucT*~8UzUu5d)ldaen%7?#=Ry7iXf80h6jA&~B!fOP`gZ%O2j9uv~8pI1nnc@TnXp{ebO$kD$=`)Nzkg{iOQgTf>9gU^_boAAC8luE>(?Rix zxeCbwhF<_rqT6N!Tmk~R;&q4L3cQKo9z zB=FK`P%ACT1C@PV=9PVB>)B)(=BOZ~olV#Zudz{?<`$bQQq-r#*B7RABpaoHsq`~1 z@*YM0!*%7H>cmDRPZNK`hN`KW&iWNFl6kE?HmVo zWzLw5%HVQUkao2IBtA7(Rd+B>tHQRy48m|UA1bQ665hlhG5)x+S=2V{0yL)+YU+UnH zm%kB12F4QT8r5Pfrb_DJO=(klYvz#KEMeqZ)zqD%*ivcDcz+b4?_oJ5;!~&q6;GHI zTS=Rh{E_G-5=kwGjG{G=VXqn!^2`+5wW=v~iHIT1FdYnEUS0+X*4b#hjq$9a#0Cks z4BVwRkY%P2bZ{-M_Wu^OCH{b$2&nOMC>$_wh}m{BUlPZ6Fpz}XW5Rp-t{|K#0tsPw zfA7)0hj-nzJQbKXUK$nqve?jrK6Z^%;H%R=zIKu(9v}BVT@}+Fv(^(sGg80`iH~{sQY)u_wpe7Ohl&mdbhd zth~P4FL4LcGIIC4K8zc<)%-l!pu+S=Ik2v|Fm5q}U-3%?I!uPl5{&VoD#iS`C<)>R z7Is;mHrvTJK5nKa7+Awb^%Pj5Pm`edQcyF zp?kT19Vq75=yPP!<4^9UHx7S(Yb$qt@6PKVx+~6-tan!$2gFgw!AYh&WB7flJ`=4_AHenDEgPfBDV1hPIIKYL$2QvEn5Li`7MC*7S z#wGs_m(^f)fT&+bG$QsY3?d!?(l8qXf+3222PJ>eY#4<5;j$=H67wI(v-{c{)VSZK zi*-7JLF_JH(jGXuXc+rUStBnMXySmo{m;i@W{#yP2JZ4}LstF3WftU3&yNLu^YQFV zm#+Btp{u$GY+rkZMC_wNj*t5HmAqqz4}SmNT^lv5kNYr(W#D7OAM5Xn7c zlQrs-4+Q9S2;LEZyC?>@i(Ed{2t3~eZVirfN>R$3NJn*xRu-k?NI21U2?5Lh<>SY# z%}qS76cs(G9T&d@n4w=UphZB3eTr`8n*EREvAm1?F;)s2pO<&&j7>*OWkKM#zQIAN z)19_%ZU&~-;rP>>2eYI_&_O`h{dst+nU>E({Gq|tZHwCI{}Vy?_vQCkNtgvkx)jXG z5H!mSPM9s@;zvYZEauNwcKj@INa3`gj4^mTlX*5sgosCbC8p$}D|f6fD_TS#$xAQ^{mgVO3Q z0AbK&IemWL25*9_u~0#`2JEI2sLTMk*ndR-6nb|Cp`9SGx9BA6CwNt$mO@+O>*<+K z>D>%f2b}H?WPzJshW{Np0|*d`C6y|NfsC7#>DQ9t7jwvewzkflfVhhSTEw6YOtL16 zv$M)++n@l3C>nN62V*6rRy7ZbR(( zO?;@sFF1a3OB4f<`4Z)1@S477y^|w2HdYqP12$1qwrzKI*84Fy%}X)p0Fsm4t6*#c zDvY6v9F{+?p<}=j_?pNb)69eEfrNwvAZBlnOwjXsf*Y>=Q7FqLaiu#4E+u`U3`T;G z!vj)q44-a>QWRJNr(aoJ&R+sd!9%7!~o>$oi2vUD8$H2xo`KEMg;gt@Zw zZ;&p5a>Q@hPdB$H_*}qt{JC$QuEwHV0M>}2AQr)Ypm);jUmi>uli_qp)y@nidmAWJ z2|ch?RO~SFtwvq7t*@^yyZM&ooK;Kk74sBN$V#aB4*I!F7s5A^KhSvS>aiW*vON6K zHh|$Bwzs!~7**#1jKiEbUBZ;Y^w`nCL4Aa}&%2ALK(|?JN&ek;UO|liVf5N=g}DN#{(P}s%wgW9ccIrTbchoc|NB6yRY z{VU9ESj3qG_${b6PU)XG{~GfmV&{af47IJW6odjAa#)(adf$g^scGB!{Ft#fU!RA( z8?$@dN9wfp!4UC z3$NyfK%JVVIR}|xH?id$Zxh6GyoL;36WD6{{qhQ`{3PGXWY1^Iddc*H&K#-WHxYrG zMWQg>kOZ(bY~qs*(yidfn&QM%Y~9yv(xw52FILjw?-|Ao-MkUZ2^6Pw_ECTB4Dn&PpzU~a^W4DNqaegNjo#gok5TLAR6v#T(dSLpu7QeO9Q8C zhu367z6i6oPN=-q=Y=WBBy2Yrkmi+d7v$%Ir^o*|)JAJzfJWVwh?<(Zly1S0qLITB zQ`!PG=Ems@Y08?+F>Ok@NRz?UWYkW`t4CQ`mhfA8xFTUzY!kind_`c`qLbVF8#!Zr z1H!8mB5svhh0I@(eJ?zXsDr+pco#?*3?0Y&CeLNq%X;K-Bc%`gPkl$z;Y=CNI!g6< z;1nhyOxO%>t;**4D_Z+H zPOOitH~+ljspNCSUTG`&H_;Sk>iBz73K997!?aMyyi3~=jPg-|HgTNEH8|~}i^4(}+%&Z`)pRMhz zO|Ta0OG|TByflrMkgMhv5F6DvSoz4Mes6f8bnZgBn@~Xo4?KQxWvm#fL}EV}Vr@W^ z4ttA%C3Zv|!@Lki1$)J)o!N60?BdTOh!QG7#myux>Y8We#}cNmb3sBGI{H56h$yjb z_}$tmgq-4P-~M8KdzIfFbKBJ^6Ir4^vNWl9CL|qw5xtj-gpOI|Q4hY^%l$Y#o%50{ z>N>#zw5&GXt7FkgHQ^i?(xlXMROJW*f6|ADTTOm6sy&%PhkWzJR==<&}&K8s+MrS}&M0H+1}qMw@M+RtE=E5o(;`o8P>%~{&wP;SH;%~SuNwScNnkSA0#E6gx$9S ztYh!Y{bRD(Ui}7Qa#uu>-v~#5tgX9-9ho`q`g4z6yik@&wYr2hi+s~+{=|de0=YSg zsH0c^i`21~DxnO-27$8m0wI_!Esa;k5+!4(#`T0buD>^ldp!l;7v?Z#-JOZ*pRt>O zvuJVr_V(@`9_YB+uQ0jIO}CxsuaPqLR1ir&QxDTTVPQLaxJGl5d$a2ZG)akzDP|YK zUBg>*UjwHMCK(t+yWc--q0N3via_lA`sL6Ty8}^*0e*f75O~6M=JFk`6Y{UIvDkd> z?tU%R_AZ9U=7j8EA7;q03TwNFYBJ2b%5L#UOPaCUT@Es9S>(Ts z&wRMQxs?o>m$Koa+5^B*K&+^-0Zin;!m^jnZ>WH1jdv?jm$=`uOY8N)Gj#6$G z!93B&^dLN>?I^5pnMCbbf$tF*?R@}Y&w2_ZoF|ozmV6!eJ+H6Au>wFBIl0HNPK;;W zVAus^VFYdOLA0Y$l*t{i(Pb8%5SsD9z( z1$z*ERgft~+Yk}x5eP^q#YDSzwzua}!qC%w#$5l5tc2?cMbX{W{euG|vPOvc+G>4p zW{mqa5h3B#)7aaNjwOzwbJ}SI&~m9>i1D9=p@g|EPVws?Va%Ot&nL_f&!4@9rGU*R zBOBw!wm#U*y#r(I<)8zJ-V4EqE1%Mym$XUD6j^v1uJ< z|8mpYxA=L*Gvf8lOf*N%t-viJ%HeGdKXwX6!EPt#-`)wq$eYkt!LCzHnIR%LRRbbg5|Xb9Ufe!Q6{EzTH+<$ymafgsB)8=W=lw}*)U;vWdo<#+f5v+m zN3E!K4u3+V#C@^@05CG2f-&NAu>pI`$Va^H(H4~I09=Y#)~-XH{Qm(MqoOb9sKxl7 zE@INrd zp7!A4)vz8m0lSSnl>S@L+7g*Do<+lX+sT4N6X6TupTVrP3nB%eGcBs^DaV;!e})MX zV(R&8Lr#KY3>mVzjh^n!D4&oriW_5P8O^Ta)A0SC@j+-RjX5cZQ4^5lYh2jJwU zFHD7g|2f@jTn_*y_~6m!RQI6sDy#IH_X`nd{cs+V8U7T4cK~L@7kMY#+1ehF{e```_1Mr1asC6 zxhIj-q)&Jc81Bx8#KYDmY^tz_cHIDw9BTyokRPP3hIgMKMr44{A@XcASgVvwor;BV za5ov-6#Ta@q;gn+Da75=6P#?H0mJa1J_AuVZPCgcQKC`F8niS<442MSEe}9Ch*${; zpJ!AOlEPjFtU!VsO=!` zvHzpxISf9Kvc}06aju#`kkpa0L*eAeOYXifu1PW{Xb&lbl=ZyO)nWU|L|R&UFdw-4 zZLfO!)Zy!R+%he!tZw_;zzc96|EpOy#qt%YVmEks2b!5!Z#)+>_Q5o|1&9f4#hfyNR5eqzG7-&dim(^9!om-TX`@er z^Z|QI&i4J5%J7A|w2$FbaE5+N2H63aalnKl%mgW|Ef5;W<;9=NsP>-A5E4tdtl^cv z>H@-5QnM{liay>c!~{CL=W+Btphs0?-bnlW@jw0FNU4jWrO65SWIVys8bp^;rGUkqtZE z9AtuxX1P69l6TT@!Htkf+hv9_Ukrk{@~LxU;j9SSpMvMxVV4PHj{31VizBO&y#{o= z><fV5o5S&uM2`f^H*b*UMCPnT6Vv?~Wq$RjyJGz=q`%Tf5D?G)xm1&bx?yI8 z?RvyM4K|sTD7BdF`3-^&89h^VFx2FU5)|q1PQt-TdP7ofQ*5QGOceC|9On%T3>pYK zZU*iCL-3 z{jX7XE-s_8o06a*t@@N;1Gf_65O6)6sdQ6xYvAoWt( ztv@tR?TggqJOp|5?p9Rfms!Ss>X3Nov4Ud3E3%#V(~DTmb=I&}V?uL%j@_p%$QcxGpYN zcN0q0VU*J_gD|ARP1X={a@<5Y zciJU|I4pu_KJ8P+nqBJIbLSqG7@xWGb9c7`w+v}0OfO;jC{?rWX04QT3;ZNGv$eM; zm5hFs>UfduvQJ!c2OQ>P7p6yg(`PV^w0mT-;q?sO7Hg@U zIW=}z8)3iM2qsap#m&7+3dw69z`Y=NGD=)|1R-3GoNkQgu!|J>jFzy7i)kgEV$s*` zzj)AQX2XP-(z{6$yucoIdJn*8^l}Dc?rApl;M8>N*6}K;|MM?!6>78FE=G2hm4cDZ z8EDbtg;Y^8+Sgup1Wci;;K3nD+(_IKgt|os;4BjYt5D9Kh1QgappSrxSY`A_4y_vD>mox%UE}m;u+b74hb3mvilTB9{dfEZ@?atn^WP) z9h?xN?hdX-pjaw6=5sM4ifJogG)>_1zb*)xynCADD|qXT+lS*$V%^YA444%-jFjd%fC7=Ha}=(vxV)vNN2}t)WaVbP`VNuu4!@f2-c#a{Du}kjJkT?KR~SWtZ)}4RbRGfzvu+g) zyx#5k%!ina$;V4~{7pf{{HYpz^TZlk*fLsEd(1zZ928^n;pm`-uc15_ZYj>0(1Fl>PTS2o@qZzai%wY$NuXdMcHE zt8>#o1M{J1ox01eF=O8k6gnCu3N%{rEkA3pVqo!pC{p>mE{}< zE`LO=^;Z~=KeNA|HK=5+ux963Fv4C#t0IP96&cogkR{hVT^6Rd>qWl2$Jyla^?Xlq z^LJ9(%v3N*maw`_1D%3BM-H$+@$?1+k;J56L}{G}P_pft)V(4j_XqM;{F{YBWX(p< zTG_ZTJnLx0j-sfOYcf$g9pqunC6g%RV?4@y^&86;Z#pX;xlsa;RE~x-F9$~T#SIEK z@sM7|u%?jZUX5ta9=fPUHlj3@2k?Kwm6)imD9QJf;j-@+F#EF4vwj*63Xqur&0~s@ z$Ndo+R1ITfpT$AFLQHqf4gvd z!%bG3umG8m^0XTds;%)LAeaaV4MXpfhLU{O*oV&a;lAf=@Z@_dk-1dcNTgyEDr@ga zeJqt=+L)oN)753(%&ap0<~akb>-I*QZ#FtQoE=)4+--V(q{O%$bzZWYX0tVKyC0Ja z-vrVPH$}N)-p6=s_zDMji=PG89TXHjOF4i6+Qe;dWI>B&h-nhqn=Yq?&tqLk&}#4T6E3UZeaT=RaH6aA%*5WU<4L$OBS>xd&`dl$#^6wFIOB4a`1LSPYE__RHeZ zH;`d6elGjgZ2_MH0?tVb?K;6$g!y`}pV|s#((A)(8;_c>i#W1U@_AWGh`8w=$B>o$ zWH^HLX-=6W)gc;d^RqSy<5%y;wuAekY^~&tJ#3`Cl*7edYi)|YPS{~Sqc9-IIgOYL zN3nT`R_`RUZez3IyLH913qx+ne=c%zGAe_!f-J}H0j zPK-kNedXgoKMo-6MIE+c#Tm400H(IRdNqUATgLGhll;sIwO3i#*)jRBScX?L!>d6I z^?DBBKm2~Kzb{H{j$ui$fjI_mTyWap7zWxR6s-kvxjaPsIcl%0kX1u7>fLHb!Arnw zm@bx-cs=U9|BX|WBAzB5V-$RL;f=KIwug-!6Mxd0nfR{x89Z!@oMYagY4tH0$p;g(X6!F;Ro2tnM)y>z;|N|E1ew>2B5< z&vokLNlreIM_}U$mkjC3k)nBroCFUj6uoSVGN-*WL`EfAOh#Ldsx5weZXj)c;oFD# z-5<2p`^+pc`K57}_134-Wlb!+w)RUR79J*xe%$TNQk!vp*GZv@yLEMvir3=fInD_0 zeHS&<;F|wqkR*FO57uEy+(Zw!eyUA@BufXfC7WqLnfF%#`7(Dqop z*>KmIo%x4zM6l)Lk*-k($K=U3-)=e%xnM4K{e}(o`LjVMpDwui#-%ET^QT}+s{djG ziY}cNr?al;`nNg^(6`QeLwg>4z6Jnfsas(ugQ|e{`Zh-BB<}X# z^vJc2or!6wg9V519lF!m?YsUkSVT#gzkaMM;PC(PTy-+AedlaV-vIy9t7%n9g zA;I+|V#(FLMtp&vu0992Bk2G~0$gymXZp&^6=pJ}*S2M1s_k1eBX3qjY^q{?CpMsD zD~6mNP*Zjr=doyKv#C%PBy;DF4+=YU)8i0TS$XG2TR<}{iH)6|m@_sra}W0Otu{U9 zS_{m5y-f^e%MQr#t~}T6f@Bh?k$5!ggsFO)*``xV^wig{$k?#*{1p(=+P@41pXL(l z+;8!87wK|i@qqg)iyXgIbLY^I8Wd!6?8%L3VJh>F{fVx_67_~rE+vO__A|ztivAF^ zIB*itq6PvEH{URW_9+j<5Oe@cg@=C^3_(5UiIN;#!-%j7aHZCgYw63XtSQ#Ap&pH$ z*hIjPgsB+qCd_wDwc&YCiCRtsWRW|dDP>>vQ=?Z81d|&LSkdTvFgm#n?ir8$%?_VV zB*ZRKYf)ns6LL~3g#mzo8Z5F{Y-VN#`rwwS7cn4ykH7(BH0PB4o##JU~avwan6*eD&%T z*a2n}?k%{&BP7lbF2o3+xw-iUSNo54EGO5@3GMQ*{l3F0?;|azv{GO{lP2?%1f34+ zYqLl4e&l(rPF!WQW<`8CU`-dJW?u5Jao^HK^PaXp(35p%CZFZeVMljY>{>7@H_M7O zjy#`)+Sk|=vObGqZ9cjma`Ex@NrncA>sYH;z9rF>@)lh|qj)7@U4GDg`N9T;ZGazi z7KW#ix(wJbnNqmm@p2F2oj6oS;4_46kB;=B^~PS~ADU8{pFZUd6Jz)inFtKb$)X!< zQVhjI(7Hh;w&S)Dv=C}J69b$eC>wT4pF7}+RhsfcA7fq5(<9)rO4h$@Y`lvrdC~() z?Gp;{EMM~>bJM%E>g{IsEngz6U`jO6ek@imv49qkN>{S&KjI~-6d=A!$zjhSdMT~f zlZX52(t0(bJ(X4-?R@id5inQcJjm>!*A;VI#-HN(>ZWR$fj40v>vRBeG6b3bI#AUf zOzDeSoaqBz!a0knyI(L_kcdu-6b4*CcwZIC3W*CjW6VZPa`OwgkLbr5oj0P4XCLYP ztqUzQCwi5!ILzX~(uqGhpL@3WvxI*5;aSiG+cawO&pl8Jm!X zDJD2EyFrbBF!w!jd~yudGZHEiN_T;-I6N88i`PoB7z$a`$apn@+$n~L;XtCrayq_E zEfNLtr!MjEWuB0$F|Lz){A-LnJu_H+FEjUkjsJ(>?qb&?k5?>bG9>>HQEOlYs#xgSHoI|pw^A7JA8>j z3#Dlgzsqei3Io19+j`D5RE|2b4c4(SRjz6F8L|Om_Zhc8gY<2~?vsX*1#RVWR0Hbv zg-9$)qyI?4o1J2n(5$YR`U1GfWl@n)trVlNx zq?9SK^z9U>M*joVKuuGhMS7cZ6t)owkexA&p;^hQzvcF5W%R&dv9%Wba;bM$ll_*b zlO9cCy3nzn_q5O=sF&$)x&QU}J^H&bGHWJ|4sxW}=+hk#aMT-%4dy%-eJbyeLB&&w zmD42;&yC4h9zLF>8<~2p25k64M1x-c74<8pQyZsN0ykGbzbUnzjxSS7{?2c*)Muwj zt(JYt0@{ktc2)iKoIFw%zE_{=_4WNb`#0&?KTc64q-M}hk9fn}YI%M`f&bHxV%94c zt=h_k&77CG#-)7AcaOgIVcv06d{@)Y>>Gh?5~o-3 z&JG+;6$Ehy>vjMBeMhb4(6}$lu|KwGO`Z>g)J(%BAf^uKN@fZhicWhYW!0~zQuVK~ zfCLLU$=wjoRXzvL7v4x0J{u&em5n?>K|z{&1y9hZw3djKF#E+v+0y^*LzmR75xv4x`J2gO6?9h`N3Xh#J~)VwqrL-N21Pz<9_D8iYe!pt-dTfIl>g z-d0?>;(P}EkewJcM3ZJ@TY>4awEtsv$f=mtWi5=BG z>1l<8Ml_FOA)C>0rr`@Z8-0WBu+xgIv%vurewC20bj$Xw zHoLe3tN2vK%+5n%lHkhnLB(1)s>gKN5v>x;8Ss8rY)2PE7YeHL9@pKiLJlbDkt>91&ILwOBMuAVoIEh^S)6YQaBcw8V)1K zeD+@H_kg9@is^xM>v+0(rwB8OhPC$A6ljPBLK1HL>uB#z7Z4_U`jG<;;OfDcs4tMX z@ukgNEA#f^i-|UWE|NNMF}v5&D2zFgnOvNMUZLM>zqf4N26f#RZDm~SwIQi;0=J;} z+Lao9OU0bfwB(dtGDt{JIez-~@hR_2D}=v<;@lj9PnFUTG8dVzBi)CPi+HD~h9hI| ztM=xS6l}i*jyJ%;$j5vh>B}sm8I-)W$#7VjH}N2twhQghU>J1IweN^qUxAK`FjcZ7 zSy$frE_i{UA7;uX?#3D@wqAq6&Mv|0mFjC3%3Q7mMrm!qx_f6LIhX7|`2qn414F{p z(VE|PV;&>rrDtU1KccL+@w|3W;Fg}|=4fxkNi^scAbFJFG}DSH>||Jr_^$T=ciW?PD1`{ii`rIDU@qK=I^#Yk<_ih1(DZnm-2$4X z=H3U*S7h;n2{g?}(e6qsNhIQ|;9T7ViXVP)vh5oBNv3C!SuVqUi@_tX^|(38yVk($ z0*9$lPMC`1xH4d<2B-$BzRTp57A2NF?B_eBQnSmL7l8q19D`C%#f}wJ*0P3$8&ygnLtM!SZDpIH zC?>9}OE@^5Z*PPXiq@L^-EMqc9bp?kb$x;`n>bR9vCYcDrYe_4KK) z3N4Fm!u)m6wdzf_TisU4vb@npqDkr?9V|=luA7Sz%qt;?tD|BvQgTCS!Hm&$81lJh zt}eO-JA-E^{a#k>+nS6)mPl$1ssFCpbTlDD1u4ih77tTOaZWh`$m|d0x z)B@(i?Ds4gNpHqKLRqx>PHTtkWNkar1T^k^JAd{My|Fj`JqCS-AXv#4{?;@hHxr(Q z|9REISJLg_XH5K#M#jhg#`Entu}I>4jpCHI&#y48=u6?>Mtg&>aU7XX?#(0CnR`xk zrp@PO(A~Fyuh6&X{k-ht;?pk##ypPS`_OuM6CziKsi+9dKVB>}pW5?#W~)6k0Kv9M zwRRDOl!8j>-ST{zPj{CRD*Ah$@5I=A?LCCS6wtNz-3jDoTlLLLfn>hn=;I3j4jm(1 z0=~8xoB!C28|pCBad)S0E^}0cTF@G2XLH2XE0qk#R93E7aRCsKtL$T{#kAV-A(Og){enJm+75{#$*K;p& zM(&z7d!|n?{@&)czpnn(4P{7E;pXt-PYPibiG4J=YyWkx1pxCWl1@3%1YU!#+t0CmdgJVTlZB2b;W?|WVbQ}Y(3<4HTA5cJo4`72^ z3S@aUu+)-pNxLAf@4yH>{2Sip_@KH$m$(hBWFoLZmN6_oKE9$;HlEPh;{4aCXZvOH zG1tj0tz{|uIP;-n*55tKulZ3=QmX&SiSe`$Ruoz*g~BmLu;7&#os3oXf+UmVvl5o8 z@*$amCbtOJ2y!T5Slx`x2M-h5U>Y0NeGSD!(Cj26jh8;&WKDTIY(OFKxzwCrm}AZ{ z5;2Nd`mKQcMSHV*3t%O-s~Q0fpLe@(sHuOO5Qy>)n?D8XygKXE41a5;YX}ce9hBw6 zUz?d9jJ_=rf662zi0KMnBS^0BQ{4M&mLnqNFyFq`?2zR7$@03zz^;%qa;6*^?qFUt z)45h7fR~RC*g-RJXJ0f38+;Nd444?NJfAc7rx0)=K<=D-+!09lbxQ3w+7Z(?N2HrzL zv1iC~^KGfvgt23gdagaWL_}fq_5?d!*hIk@CoaCVCER>QPr4b_NJu{9g}fTJgCgCc zMd-#y34OXBjPaE)rp+VX!TS(b`OQAG}vzY;&%)6^lrD#}_ zGls#8G0Y{Zcy}f2V9F+nJ$yva)R08e&Ra(;Djfu#x)YM`b3QJhc57b`Jm+3Lb6;Ck zjg4;;Tcp+17*5eEa2JS?L^V~wQDw08SVU~>v$xOR9TuhndRAN`lGeG4Lf_N9NSO~) zg8x-V81F1N5H)+;m#?!%Wx7KtV`ZZG8fUSj=TeBc2Ume<;b>q;SVr5rOln)4ur(F& zIAcOy558O2YDYdS#s^cs9=TCT{V!23j?5H#MBVV3oe?&R#2AM*uj`tm=Rk+k6~Lyx+tw5$(CQ9InWyPuZon<{iOcWmZKg)8 z&G>C_kZ*)9=B`!f30svcz&lM0QfR9ePPtj%Ts|HAD*79H?W(JadpcjgEZmkQW?o9D8`nMz-}AIKGN$`j{adZsRArH* zRkLyfPveVc9g^*r`fTTdW6P%xh8uo~W>z1|G7NKSZ~yb-^9qMx;Dz8z^Jvd}d!=v3 zlcQ!|nJ;b-rsqHJr6Ja%{e^s$Q|K-yM`XPGFNwren%C4!*FMvZ=2Dt|Jh=2l>)vsT z#6G%Lbk5wXg4D&U9*;x}s>eHd@40KX;dH0c$pK=MU7hUyXBk$yrUh4Tsd+<{`%(T& zHeR|zq`bZ;p;j|&ZAM(yjUPuUUh6L5cwk}@tw8&j?FSlS9gpN(AJua5QDEo$d`H7` z^ueu4)i2-kJ?EtKb_>GCVkuu|9{HP$W0dUUL&@Z#by|;<>&6U@wDqa| zD!Z=0wYoJ|g8u%xx2qa=csc7XAwD9hL81QQ+oMH{e3z6oMAfFQAARw2#iwQAYil~& zTdD%4POF%Y^AJCy$c?&wF>Scg24z;sM1X7cEWHIKQuSlZ62tFzNypyW)xPx<(Ywpf z@3_xOpYP@v!v#lV~Kmg&P;w(T-&0sz$pYIPvmB${_1ae${J=dX=c|# zKp$R^1N0F6q(nPOz-Z>uA9F(06c%!Ga+QFmQ-?pOA7tI5M9b*@7|8Y9I6sx|y9rWW z&d$!ZC?wnGdjURYXlIUATmJde^{i)Cu+0gVDfKz*O^|y2#YHSR!_Rz`r>RpBslxno zy$M0;UdJjWnp)fJNwIJEG2X$n+a{5?>x5!Q9Q?$cJ0~~ZH@POR+UoL8wOfIZ_^X3gO7T8X?%bo1+ zhPxHN3iin+-4kS!#Pj8;tmKrf5c2Gyf9qENQEy@vW?e0cyJi}`}<#D&{D~|`i{aIRyH=*YY*gCdG6Y&d2!Dj znX8I}byS7?$Gc@J6;n0%_mu|T6}bQ>AS9I#tioUhA#vHvdjo1G&?I1rLuGD8xQv3~ znPU$PZ1j;wfOn0IV4|dvu-;+EAP%Z$rk}V_$1zsL%D>i}&db9VS32fFZa_i^6-uk4 zMi+=$53OAGV}~st#z;CVAuNbIwtGQIgTk?)fq??on5AV(o6(Cp_I;$$Jc^NFAf@6d zBm(%teFcOctaO(S~ zk8nS%Jag+2JRBufmaF!DIvH3c9I9h$nO z%%`v|2<0$3uKa zpO@C?RRH*d5z>)|N$%B7Hgo4diyzh7W|zaIl2prwfJB(0F-)czFzI82t`YN#8&KJ~ z|GW3~S>vs?=V!Eox-MNmeArQ-bNJ=+=bh|!hB9R@OiMaD7cyp8d5JPbupMeul88CG zFLq`vB;#;y+K2Rd_Dh#Mn z;Z^M4Vm(yFRW!V#QdS0%JjBUJk|N z6sJ9#cJJvGvi=Ntl%Kcp;v#Z8ncj}7dHf5rnNvuc!U66Mg&_sHl0LVr0nLItbn^DX z`$9?LpX&CHez>ksPWn9Fv4r+T#?3vP$_+9$>8RrQzXw|alYCAC+wy^RNk6l5@*h~1 zA}qkLJL%=VTaQ27-GiA5fP&J_g5{*ZS$}rZ;|%Pk-0L{i*wDKnn)7k7v3Fn|V{0AV z1Dg@)XRIK8J#K2+%ol`UU|6t`ar5@=-YSYKr|Y;a-FJ7lR$`p%L|_TAQ@ zaA0A`Qy-8^&~b>ZTRl5=s;6hWRB2HWFDCV%xe|T`ZZw4APit!{Cbj#3eOrTv-V*qmN8h)6{AxyeJN`uQ!-V>D0a3!0B*(0}-PO7iQ&B$#&3QRsKJ*O@0 zzp$)K7T+iAL%KUunEvj43#zjag90B^sOV6h+TQ0(-vpEwIN43KM8=ccyX+&LSw~!2 zZfc~zgqgV;V}OpmfKf72Qx}h-iL?3>C!G#M!!Mxj9k0WE=@iB>Pu&w5rn^fOu|SBn za|}>DKU$I+k;hy_Y1^FO_xZ+$ulL`5{pxFf2t~TPF@^$94Cb7=d2}?8%C;^!H8qM7 zd$LPb&&`2T@SWlH=p#Qq?GNH#wm=%hd}T<47KM2hRT} z=)u26YgX4B1v$Lz*5{jEKooH`+=YqA>f<97xK(mDp>Jr#*bNd6pTq8L*xYAk>y6d@ z7~b|MShfjolJFrdK79DFlH6W;HpcUXP3{~Uwn#0iuYK{taU?(g+rc4!F}CvG(uUsV zco02TGz^<%bf~vaFdkrA_)I~_2=C_<^ftR{s{*^}p?zs;0-kBUybI$fS#R?MZioIk zu%^`Ts>O5XwdbwWYnvA`ym@3#yxL5~d}FXePTz&he9E2Bc*=T7io~PNVyX> ze>mBRw<)%%n#|U}d{5Wo@Bd*`9pN*e4qhuF_tVY2%_N`Gx)DA#NsAtO;{Tkz(RX3} zx{+mncUul6^1LFxBOlvwWUlWgD3MFD=l{Vc3QKD ze0f&}|9dINx}mwh`TUT;-xjb5!wo&VEx-7GDb9I!ffi2CP+W0eM;T{4rbw8bQu zsmNMnS6B0v=`T}VONeM<`cV3*Mny%1v?~P&o13d^vAMIezCPyC`M1<>E*}5}VUeL` zJ+Mgs#EBWSFSit)$Tog)eScO{z_Pu+#?%pEomRfw`Y|{1m!c6Bp<_d;yB|Q3bv-_W z^~|rZ)zgBqvLgUAB+WN%dJO})E$$&iNRfWV(s_9&R2=+8#eoaM*HVhUH3KN{Ly}}_oJ-f1U z^9#=JjOQ=&>|Wz-)9#Lp`mmXW#e+SD)QB1xY3X;iZOW3evX2@Y@88;JS5#J}x@wo# z@Pe)rxa4thqDPsVoS}Jq`FKVC0VcJjObdp-eEBkZV)S^|YM17wrhIm-g(KSRj9Ci; zFE?Mx)zj6zpYrW;QhIu{zSl+a%%VgUJB>r{V*+9V&FKBrMXeTktmM2Y>(9I^i#UWB za6FTmDjdzR`f|VI*DyLmL&JLO*e4IdDIbijsZRHc$SRwNy<%TN4rb?6R6ORdH~^%3 z|BZoEuyF5;*Yo>*oBDY9H(?$7?zH9WBQN)YeP|Tv&U^6}%tPY+2qjZ@JIQb!Yb|h2 z0E-DNgqKe6n%@KRL4@7m+S&Bp>G!x*?&7_~uATmb5&E8^y(ch%xzWU=&F*F`@QrZj6v3d(*)wNOl}|!&{qDz0x3ag{|8~><)eXG**VC+7p4S2x z>wbRsyQ+)O2(G(W{-mr=E8`!K6<4hsoG4U=Y9M)?wKAHS_pq z-J8JVeotus&bxD=b}~fp*9Yz2eA>F1e*Mhe+v|DHr84>5!kE!2<}LS@`xq>}Ef+Xl zc)#NJ*_&ws4@fu&4w9M100ox~Z03LKnp)KsDp|Znmbu+xGj}S=( znpIg>9UByi&{bK<$M^Gv*X1GV1I&A4CvHTRZgEzLfw@iMHiQ1i>pR;*YoT4^fzva% zP3XqCbEIS@AB9|d(eiPO4U4`G{I$1%gSnes8qF^{W)b%?_bZ6v!NV9W+Gb;%vUaVw zxcKg^iNWlNMjepdwYTTP-Uvz0IyPL4{5U6cWP$s|zST2>#$5jTB@PY_T@7fH$G0qe zX~2-|wr9_j0aa@?Q%2M}L%I^}$v0uxPkEFxvJRp2feRj=RW?38&N9|{s6|u4V_JR8 zW?s9%Rci3;^2M^7!#G zHjygBH;12EtP|>~E9ss2e6-*NvUbP}x{B60MTm3WyfZuXvG?bbqX~qHg-Wn(_L$7o z%eypyo*!RR*8y<31D}{ zseisFw95w4j77UT%31S~wmPBB%;VrI@O;P7^WFzWt>KIz)n8^21?!fFlQZXzAA_IS^RXW_zfYLFS;zLBQG3bK>gLaPU@!A! z^M~Eiq(aIax)(`^oh0$NdPla^8+@5UMldQ6Tjg%QyBoSC$Y~gu!*@p9Oqj$JBKw5U z!s9vYE>BxqgYSLb);qPFCDCZ623FfzAB;4?kV2lLqqjD$4zO`7DfN1ET-+)Z_oZC5 zqk%teA%TDMeB#I5ADWWaR1a?{)}=CqCK}N_UfsD;ad#c&l@d;jR6I1G+HgFU@XyiRbtib(}gt>*<||OFE!MV!PB45M>Dfw=bI6+yDwYi0Joh7?~BPs%fL{b zrJT!1Of2LkB%}9_EFJ!Iy;tseeZWL|?`@porN+VrMoaV>;{(5nOdF1Ja0+*we3Zao z&*^32$T&Rn>~i2$2*q}*nfkIdA3^REC&+bJFhxej-8_9Q+pjU4zQwl~A6%n7Z(^K_ zL-Xs>Bb7MOMG2{?-(dkY{X~7#V9Od({V0bE=XrRrG7G83aT*Wj^$|*_>@I{OaKK3G zJIx^r#XY+T@Wzv7dpV^6U6Rzt;|!yv=6w7V+*+Z%;%zc^$uSK?xu2o>vh z-(XJ#pdDwb%5k#;WW8Nywq&|<-<%w}tVFUf+a8JMc5bq=(~$cIq?2rkd`3&4l&oid zA885WS^iXA58Mc}OhJJp9;onyZGvYFQJo;iF{E~sZw;pS|6=ba$#y8*Y{vNN(+ieI zJN>VrAz@%Gcn+Q1;1?o$#lnPvzmtR!m4nIpsI~$P(u2S4&em?WDuy~BwN-l10@VrEi zE))@1gd8bFw*35|8!Mvfu_#IQYzrvxQU$XPg%=ecKO<}>S&`L+fyu@MpaYKX7Zr}o6f*Ez6 zE9gx?8l$h($*+&Wdl)Ujz=4#lR_qU&sByx=!U;NWR;^g^VZythkVLuBH-ej6etY#8 z?rKIZu!ig|CoXUv=2`O^S@NWNT39>o`P@GB&((_ra+}=E(-d?^q6H_3csDNBsz6Uk zDk>_%NaBh}sFOtqq-z~v_7b9lj5mh*u5UqueQEBA|cmemX~R7D=wz2K!%{nh@rX+ zh-2js_}>w2B~FzQ+s=1LXQ`;DBeuf@*VZTxyo9OqXF1;rt5GP1kHB2#gQYeX0Hq-q zrE_V;?+6WB?e}J3-Qx(~fo=os$@?7np&Cp~%ic-VFkLR#9!%l9R-30LNqE8z>}%Nt z#n{ZC0c~6tg@`N$}k#;ahGCMM(;@{Yp4owIO zio&~((b6(~twj^V2`k60nxNmHqB-u|8NcHu3hbP{dAm8EH$4>($Sms!rFeOIer-r2 zedeW|eAJcc$ zAM?mr59M+kUIk1%{?T)YqjMSCFRTT+Eis6@Pd<oR^9$qUYdFMIq`%{& zbv*;|VN!#5Fo(a9R3GUM#oZ65xFM9Z?9#9~w?Y<*YAF<5ef_WuztXVB7q>)Do*3DD zIJ$-X1@HziH;a_kgf5N_ws*b6Fr$8Rzi4ZQ>&ln%Q&Nso*(#Q8!wQdBO>L-|A=rNw z_CM1sHOf?pr=UUM<|GU^HGind-%ZVT`QB{_smy*;wrZVKid*1 z&O?_6faLMn9TbzcF#@qZlFlJWyYKG(#hh5EH zd!hEXHgcl-?zjY8)r=nD^;m>onDQJ;HebdL%Cb>!?f7l&J2*1nb|JI($mD7H8nivF zC;F=_3rih@4V{Mo6vV;Y$<@dk8&%hBUKl?4A_SvYNg!diam*uto>LvMwQpD=$ zP=k19`b18f$(`7&ebjiFiiWqzgHHXdhLV9Z!=L%S+0|Ot5gMbq!T(+SaB_tNO@!*V^+e-}@+2|L_yH|0OGWnkw6Q^??2)Nc>F2+0K zcA9uE4pnnVrIP_u8tbziy+^FZ!x&25FHd3v8?jCJ)AE)1tzAGiqRzpmb{=VFOQNUJ zBK(1_Fajba0=l@U4#Gx8!`3RfbJeTgo^8kZB5+=n@$5%lqEF_t`ljJ z2+8QWAshD!9pX%zQe*yok?Oif?p-o}j{)u2!%JMB_U`|{GeB)tyX>>qHjDX5k{i-W#e8)j->nmjsMs;&y*Xf zP(TFoS<*u|Lzob=Z79Q&_K5)%+FD#+kNOjMVQ%y&SeRS3ba-99vo>fpAURJIYO=#i z)pzMpO*mI3&&N71)tKcW>=pU>22E{7yVSzd{Z_b?l$0D^{ruUpXB{0InP+#G_4n@{ zF~N+Khlf<@ zm{KP_Z@O8Lvgc#HR`Grd|2%y!)gGW4@Q-^~R~PZfikFKkDIp;^Rq4=s^V=x@gbujv z+xHnmx#+2!+^3?XbP!M|{z2*-tiFw`=)J62ve}r~ZZ(pVb|e^Q%53fIb}t*`Qy;z3 z4aoq)4SDU_~_@7JA)DU6>+jn zSeNk?5tQ_O%SoB)N98J!F179Cn)a-QKl!9;uodq&>rHGg*>L3ep3pY$+~oiaXvb;H zpgd`8)YVhDja(eWR)BCCT@S`$yn!ar^h|uZ`JXK*3$IWC_^7nm}o!YziBO zwMhGJI=K6xGuM!sk^)D16DKYLdiLAe&QyHh_FzBM%TK*$B|94?+fa{C!zrih0YK4` z0{V?qp9=_@+X%&v9~eB-&yMN6+*-b>EXpP^n8G2jAw1k2j8q3%{uL`En8VAuBJP?# zeOy~uTwGk#x`hgA4!D#nxZH05I?*pGGh6Z4AI1X(1qB`DuK?!)!^8~;;bx+RvI*sR zv~Nf}Wn3=8j`M|)fkA}Tj3)s)8nNX)K|0j8^~4(b?gqVzN_@t(?7rMwVKsjKaQCNA zpIYxu{tRV=a*O2f@bKH0Laeqq37?OUVyh`4?!v(~g{*bv+k?eO`^5Z2Zl7E&fREM2(vrSIXn<9wFC)3R;1iup74Na?O|!#|XX1?i^hTLhak(R*04^oXR9sY4 zTDnCl2!2sT`^`&GuaAc*0dBjFig6= z>)PIJ9v;O_DlLFpzizYS_F^ul7;9f3R%;Ati#Xjy^4A>Hf5s{oFJ9a-Wc%hlIzq)U zhXIEDf|cpu8Ei7!L?dr+*|;sP=N5WBsH-btt%z8Xm6>FaOiekVmkouq}kY0ms03)|&=+s&*5Uy0-#Cd;AyVCL|^by*%?! zAXkZ9X#M)1z?1e`F?fU|#b3#7zbiC!&r|Jy3W6|^t{Uj5vi=qm6T1V)TOfZ>NJ&>9 z(>XTb7(H!oZ#@E;cTQpIEl5!X^I)*k$;xU0qlCD4uH%j!=e_CU!tDqgZp}s$py*&2 zCIoNK=|l32zM2~E=*iFawGN2~jvbpqxshmp+pj{y$s{5^{!F?VN)NWjd?`YKUnjXt z%mmuk-u15j!s^lYv_*zndB1sMpk8H2=a}+b0?qqsxvKeg9UWD85iu}8ae%XIF-8AE zq@F0${d}grdidA=MsL4QFTw}3IaJ*ndAD)f?F2_Z^gRj)!7@{R{v00_9lsUo@o|1| zN$O$}-cv+6p}E1efpam>*lZ;d{f~ zY37ah9?HaPseHUA?^#nVD$ig?RW=&qSu@u)LG#NuyZ*qgS3VIZVh>1ciRuieKeFh2 zaZ876XJ|U7B6aZM#zn6UgO^;P6J5Gm0syJc=+9QhquD| z^?Z@QgCITSAT9Fp>njs}HM{TclV_d_Oe!3(d|f?w^s;=(`io9)dK4;H+7ukC4X8w- za1MFSnX5UQ!UnOkHSib4d=#x-(*T_EHrA;ZS~E}9pIbqpFiYc+uvO&b}Atw11;s^WbGH1$s&hI z(o|g!%f7!6t9;ls@`Hy1Rp*4WBLN`EIljKn%VvWV&pwx|M@NrBiScicBFef*>8_* z_5R;=Mr#iXfrjW}_q6Myf|o-6BzN=uOf!|3-a@D=-MhRwWnFNgwWH%jrB90KFfkkq9ns~lLkXK}&9uN_3b7O=RW4b@-W4FEvM$>7~43L$3TT@XCC zD)#py>+Cf@P)?BMr$sLYZqL9~D z0gPlm<+Stg`!@V+BTn@mNL6jj_Ski0P`}N7toiEAnt7QSV$oq;S*QMP>VW5Yky5&a>G50o?j+fN8kiuHZ3tTGcE}o7Z0A?KIEB^ zNr_OOKYrqbrk=~!a-f}-W@eBb^u>^I3Y*8TMeFoSPM$oOn3%X(a`KrEI^N@jOef=4 zt`9xv+2xwnHr6$FV*^vQurKJFob-!WTBdJGC{LM0P!e@~So!ecN~~1W$rM6I8$*xw z{_riBl=*faeN;lR7cNg|p<6EVU|prbJANsj)5Q5yn{hnt&CSmrt*Ohrp|h#Ubp6XE>J+Z? zXy1V=zJyst)8G+P@!_FdO|ZI(s;ZK)X24X4WRbTe8JoXu2ss;c?-IfnRyOSxIQ#fn=p~cHE1hbTFr$eufwKbVJ&k!mZ5q;xiysJajp2t>q(UxzX3hbD8+?a;pe@D1NoO8TPjv2k&@zABoy_fy@|CTZui%Yr)TaUAOXBPsZ^vk{e3 z-eV3mM=ZtfA%Ia9JrzL8wio$2))hWO1Zh{p(bS!1T_BUf!}!isd33*#5ykYUh?tlm z5uo_kjIHph_mpooRVa##og*o2)QdbqkGbvHT2{8`di>LRr=?CG%vop^)Ew_<@m!uY zR?18qr+-Nconv)pXsK70uE!I+F}FM0g$oyIO01onE=AFqqlM_{DNPz8I_-(|03J=v z%xnw&aoObc-Z*Dpd(zUCg(`EgBkuH@uIo%t~E1?(REy=T2G=(e^K%mmGpIY{DrbWcu`hX7BV!+ z%j-c`A3_pa%N$SM{YLZ?V`8>r%GGh{xfX~+T5%uWym@mdz24>-(o=4UP1(QDRaSj* zK3OoNb$KL(Lcvjfb72f*Ld-8oZ_Zk`-^tZgtPV9|c%C|B%wKcvMg?=}+V^E}eRuiw zrOIGSy^yGcM3(09Yit(2PclqX^bfn3yftyd8Gcy1ENjW~8M>cn*?XMSMi7Zo=2fTi0~>}_Fx0z+U-=N`uJg;h!K^$xFXThO;-WSVFoVz|Xw zBqA-x^Xs?4WMmgozR@g2@p}G8xbH<_6we^{=FJU4LJLzk&zPwuUbl;`N_2MJzo|Ru zRR{<7k9V=rfj_1y&*crD4EFNl!u?32vxGcV*kJWmt$d$a-QD_XZfQd=J-S;VPdeN@ zmwVlR9Fa!$was5RDtzyx!$Pizc+Nx4VU-RIyr%WKP;nMW;q*Lp>Xh@ZO1ZUZ85uEk zC`cg0C!3PE_y1-$I6qzrnNp8|eLrQ+pm2VH&G@Q5ah)D1N|-!ngK!1BGV3m51PI-& zP20DxtU884*xR=?vOX+_n(F`GMCf z(djQK9K1%S>#U2+xyNof6tKP#XbUT0WoF$OIP{B|@tD=Q3-105Z3;Knc&1ecZ|YDO zCm|K+oTvP>lYRE3+5ej<3@IQPVFQs2J9fn`1dlshbVo+IayCECzN=VP9}d+qk5R!x zRG{hD+637!oSw;s1TxS6W(|3L%mgl_^62H!rOyeViU^*@{12}^OqM}iltf?yqf}+oS+QfowLEt~SG>F^k7!b3+R&942&Iy(OUF+0q;ED9FD@;8 z^ytwRKD|ps)AM1C@4uWlL}w%}r&#%v4)oW7SBL@L z^ppoiEk_3FUfMo}j#c8lBk=fBg5-r1qpPbcQiwshHm7`pzy?!CC&StzvTyNVfEZhA z6M}%5scCu1#f{OK6)%&F81iFFmOdw*D&stJ?V%&vqOUO#kswh^+yppQb%1BupyI;8xvT(gZDi!S9x@U z-14W>k?K`lSST(k3e3O-@?cyK=pvRU%6$EaNii`AiM(?yCAobW85u)QFEk$!{DQC} z(pD1`Bo*=iNz9_X@w|$9c944zYQhw;N)C5wELk|J9L`2=o1rkZC_g_U~aP?LUZvWnDf-ZI5E;|vj`(1?NAMys;?p; zM_TbM>Yp6xe?gwAzD;fbm)-iK|1Io;ZQJI#$YU{_mbBz&zRVFYLcBX6ic|d$$B@QP zmWVm#_`hv5uqjt1BdOr~7t3Z=S)rvV7J1Lp@5M(;T2tviP@B%Q@u7pYM{k0Ps(I-` z()&;95ne#ouLg8mUEUlUn-%DEHqGDJ^gDMF+nAK&e&kYr*aC<)Yf9oYE9HaexW>kt z@;DxE7>j-(FV|?cFq3~(n?CWy#`$PnIU-o4{(oO%I$mmI9?P~bEcNbbB=JpXqNE-w zS7R2hKUnI0Qo5aKtOtZ_&9J{*PrCcF(`QXbiH|aO-E<|HWSc z&=ED>leDw^?8nWC_4z-YPE^G{;B)eRp!i2EpJTD2t-3R4JMr3oS`Lp4sN@X%@OoP6 zIfq8-Q7iQQUzKki`)|pWH4LLC=WFx1a(3*IVnA!o)_*#liie^)eV)+D^Ldi{Za2TE z<>QO~@@CKHev6>(WuoOxYrGsLLiFXo>zG3spQy^t&c1omae&!l9f~)F%2WUBejgA{ zfiGfU1XNIB_ye??+@LL&IosK>K2!X-7en3W&@EuIfv9y6X~BPsRLLbb5Ede;s;XT| zrmarkrI$)rExhA~uENbHGBRGfb`-O=mL?eemT~BJHTOtccjYS$8>r=CgG5FRs2kEx zyQ=s1YNe@(iMayRYk+f@G65}t??B9=7#Sgj37i|{0S0@I9pp6f5@4Jls7YS@_UYw1 zVPU$Go!!gF*Mcs59MI0+$BQcsqv|ag>+_UiV}U#pni$wef?Iu)$3DV-ibNuTZ4@V~ z!fKiK0yIacH=IC7cdx#9aTr`|Kx>j5Fdz#P4wWJ>l)r^cX%q!!82NZp&}gC}Bk!l; z(jX{wr4W&qmS#zm^Nrq`LlnNEknV{-17d+XfC3K^l2C)6C716WbCn5CYxfz+K1J(V z{Kc|k#Yj(@n)D{q!P!)KK^OWKJq|%lP;{ZjkTVSun31rirohQo9}^R1u87E-K5&PK z;Ey6ST~8P)TtUnW#Z^|e+;aC{{O3;PVhe+ugHROPk|orgCo*}Dfdyv;WxU#6)aN%+ z8;z-hCa@W1G=YfuS_J6<)TGswNB3wx zL5bmIBvPS_xRWIDx`XEDa~~l2_;Wqc`hj8XQ6KgX$@;fg0%HdPCP#~@{oPtZ2KShNwjtQ2)BLhZ51KPzvhb%T@TYZ|{eHum zUcBz9j}QSj0pEXCIn`V#ZM)+?>jkZ;mytjnqpkw(Du!4-e|ZmkUye19%bCDPj3+Fu`AoSBSh zA*LVMK5UavI2X&{EZxq>?g_U*Jo#n>QaEY;rx}mzbmXalUO-S$!=!Rx#R+rU4!biP zmfvt^=g(XYG7=hETZ?1S6h9pyC1z}^Jb6EAsS1hXc+P{qDI%W{;lEQ3V_Ap#^LQBZ z%_IF4{q%Ig+Iaro5=CE#wb_$!I^%J>m5mhg{$IOEjRIR9+?KLxTYb=3MP*R>d$j?w zCoj817$BocW>c46vV0$vmwBzS=KF~`F^7a$a^nsc{@en6SCF=A#o68hMUqvQfoF|q zL=Urzl9t#RPkZWX0M=mB8`^E{?PnmP5nM)HKI@N6ea%Mm+>O#qSVjNFY@DiNFa0$0gM;3rU4a_J_PtsI0X9RsmE#(Z}k~We`+k@9J8Og56_wb$1VWX8b)3Ftp2+2uaUub~LE2$7s?r?vsviG} zUN3<{KVjvUltJ=3JGVhRPjX;HgcX?~nWS?|F*o+$3)MO>-y|rN0~&ms#YqX{u<*Gv)Q_n^{@IU$-pq?mDaOn=hru&pr_h zweRg6D#)}h?Yrvo?rs`6T?Z3FqE-IP?Mvw_im=Zhrn2*Wl!Gh3x|*B`@Ny)ePoU92 z*}i{)mt=?W@CbM%KI~A+VdBmAWf{@FoEzipL43hjj@6?U>(bKelBEF%77244UdnBs z7$x&F-9KEZl#tWIO`5Ktn$aLn*$()cZiGD|$`UOV3sw?VQ2P1tx~u|2I?|!IyTWh) zazSre*rVEyu+wEhk=DS19Nyw~fNu~eq;+W_ zQjyP}lo~OH{QR}LL->X@=i>@Bq-Oy)V_kk=fUV8=-k$NDfwSPdDc4i2X=c5-=Sn)) zTK0CQeGA}q95(%Rkarv+6FRnifbk#-$kuCb0@_z@nQI~f1l5em<9eo71sE`L*$M^j zvAlh9NpN+_zH!Ti#d_t8-qM*WI5zD068SZbYE~WeuJ%aQm~zWI-e=Kz?*#Uw0?v|< ztvjPj!<)e5}ioW#8(i7GZUx4H}<&`^ll z(yBfjRg45%!fN)AgzSxDeY+`>1V(FvCR7^Gy}?#Hu-{M%9Sdn|c-*{EsJ>gYb5|2n z5Q1=9aCo>_p9C|fr-TOGUmIT7q!yVa*IK8*|9(YJR;^+$RU*PS8AzP(kW7~%sJU|5 z_6M~vBmSh?{-BfmOXb3n0GmI=%HN%6v?*X8J$if0pM3s)bv4e(DsrLZh^noQ{0p3< zdl6$N{gnrj9A`e~GluW9nD}!h<=dbw_6fM-<2F-IGa>8$lMWz;hh_<5mOl80y zrg&5ET(2wmYf*bq1fNq*?<&skFV5pf8nxEBsRzh5q>8s(+XgS2gyX7qQpOB~*>yQ@ zflba`J9H3N`GuyoEKURCmvDeREBfYx2S2i$w6K-WK~p~XQw9jwXpdy36q32_18h8- zup1+fR$-$Ckgzy{l}{0wA9&p%I!$4{6->ClSg&&{|KQ5TOmT|-JJamYm~5uh|BP}7 z?!5hZ+#&{wfS%f_4zD($;>_{!ADLD2DOK-lL~8T;PK^X1i&!vFu2C^_hwfDurW_4T zu?MNgbyRYJENgrxH&z~19KgL2=mJ8>oH?ccVFcuN+(v zvub!4g3a&8VQn3uWJ8v()1gctLm4xrjl0>cKlkt(4JQ357d;?A)msW~Asxm}N_ucW zX(tt7*WF?N=_ldzq~P~;@b!W(vF zYb`j}1**#~7+2Z5;EkJM1#axlU~D6}UO1|xcl#HmG?j)kekoq`J-s_x>w1N%fys$k z#%SH78WsE%F87>$T}1_>K~XR1vNMSiK6ooDipQNPwMKRrf7%Xzp9B3;Q4c3#g?Uel z;we2EyKs9A3=$L5)6xV!^9o5=+asxhaj6+48tqj3nK2BfXK=ynbgi4+imwUZx;!CR zZ22}vKb5;#MWriT878bj3$ZvU^H^I{I6V&tPQNRl(-Y&*D5l57cb3y0Ox()P!}-gH z8u)ojdED+utgX`cu7tvw|8({WVH?P=0+1guV;NhKZ5aDl1~b2BbozYG_xt<*uj~Ksx~i+0G4E%2J@@N=-LLy8>WZlW|8B9} zJUl%7hJRl&=i%8I%fqwH>5t#QD+Ya4Q1I6_KXZeNJozn$Cc!^`M_e$uz{67*$G35P z2l)4{n}6H-@$d+I;{M*&;Dfut!}HYK@X`fXkOO0r|Ai&BYBt!qp0Vy9SKT}jQCU7N zy2S8h_*VFtq$!=tR2wN)AG`UySn_jJ?6D5${BhZYYjdnajW7Qwclup#-{NmpU!(65 z51l@K$vDjLSmlYmFaF4^{KNd>yugkZbUl+)Xz#OvKU&XLWMyUj`tqIJx0W)ro(-rc4%OX(2i5K5 zIoAYZ@cw)~{8?4#N=QU$=!&=C^hY^Wp7*v{bP4Wz=hsL#f^H%145Vp=PBT!KP&}u< z!GlK=#MQj_h(9CT3(p%9@i7ZW+V}j8(_>u6Qqow9GYckZna<3X?}>SR>pmV1)=+6> z{wwU!H%gln9ir&mxc&F!AlTM{jXHeIU)Mg6b=_wI((Rks-4ky&a+*vFA{`~!mn;wF8F3)2Qog=XU$R+5;6$XciAjv) zr+~PDfIcrlt)(kHV4eOvFMv1%@&9~OlW%%jBA~gsxgu~@fC%2&p5$O8D0=o7)4C=n zcKIuNyO(u;sY_k`_L6c`YsGlD&!-9Al3v$9+@jeyLqL2NDW&UJw#%TS9XTcJ`^N_d zj$d|jci+{Q+O`%kQ&P|IxQNx+uD^(O`XMH9!gFP}1SJ-Se(~Kx)g>;UN`S{**U&}0 z={(u-21Z_6qDA3wPV(^)r4~(7-;*NiU2A@@64Qb;Iw>ON>i&ygW~(JM0>Z{MhT5Hb zW(uV?Ck)~=7ykY^AKKa2L+VcZ2H)sLo+{`JPp&FesC3%Sv&Rji<|BFb#^(~RK2M7T zg0t3Q%bS(_+&)%Pso(>Kb3+NkYrQ{C)wZcM&5K=2or1Mg1Y>D=V3wu!*k#(-+wzK< zFtd0&ZS{~UL0H8~*fOcBzfEA!=B8;gRvNFT@7>^!HM!M<7@a&In58(l@0`8 z6cVpj>@~^J4MTUCYKUMh+TK`t_CgY8EsZNzTZHk$a!dN?TgRBkCSEXh!PYubF`Uko zkH^@ae==dwl9t_j*u{Ovs#S&LPtAC4Zu*;V&%4)^C6px=J<-yc*eBFQ;O4&yFPc{hc9&!t(EheOd{zE}R$m z_=W8*W;KsyG}lUpA}YxE4Ey?7u&i;~EF9IRdTmU_qsu0ekW%h9PWY4$ub|+(yH?{k zt8qwZt6YBB$ADf3OhbJqhB!j55EP3j<7MJ!^V>Fo7Od~1j#%otlP#UQ<$n^rSxMb>dK}Md(4Mof||m+ zTUtlU(n7yTC)uD)B1RLe?FRI1&3JfjvokkgX+siPAxod1{k1#@K|8~Pw(;_up2mRHe-a!U+Y>7C%l!)~vUA=WKLV^(i;f^caJ^D}*|h_*BtU z>T(UHtS-)Sqiuc<{vOMTTzuop^FE&%c+yvZPSWnKS}faIdB{_{u%yzmqtTS$$?4+B zPbSY~K8#yqvy3E+!@LL$ovb%1amP#lS=A?I$5aX)4V(FdAx}n}b1WcUiqSr;Eulit zT|T(mTn(e6tvG*Yevh_aSlL092o^5}M1(4?N6e{uHRzexevaNLhN7pIKVq=NiY*jC!ml!ie+5NdJU6Fv}2u94^3mghp zE3LUF^-)#j(jxBOPWq!y5BV*k86A66G4tx%cz9SzBiRcZ3Z_#6lA3NlxqQSy9v;M< z7;&{UG<)p`VZ8t$Ahmhzhhl(=r@B~)U-f!hnocDe48x-N;@`H}W_;(e|@R$x~w-|vNes+bu!=ed@f4%-QVf9+b!o87Xqe^&)>;)(#@5OZlDoz2SkXCLnbt&ggNiy zxaSf$VKm!Pdu^be^2!ypwiFN`Jlu*=v>6!Qfx}5_OPmbaT^O_$9-R`j5BGTO?d_xJJm03Dv3aJW(t=m21P$0uD^vDE ze0?&exQO<*UZDbqI3wZ)?8ycV%7qw0TyR-0VS--`mJN0fftQCzJ|cye%cEiAA&3zNRMN2SdSzU z2->CWkE-E82(!ENh}ydi&nZYo)P9{r*=3*X`m&<8rVV1@uk9)eH9+R7Z#Dbc7yiM{ zz622lF`qk_60o*7Ta+n$<>tfH^!K$ED8r`pC3%zd)iHg=^h1j!t`?yif_X;ELw|?i z^(A(*I~&MrKbmSbnrbwkVk`7>hI|_&$R00p^2taLgIy*5}`uKZy~rX zCfa)!!s+qi`&Q5QEgcD=6jB^{NpM1s0+u`rxY>lkMW>{K_br1qfzv&OScAA~%z6x$ z58YfoF^7=WroZ~D!Su<-XqsAyM3IT5wz_MllyxcIVWnZavt+LagAg=;YqgGeXYq-e zpVo!@o@^3>Y}ZuH3yEMQ$~W`sT!E*0y&z?~UV+P7#l__pCV#MUVN#sT{oyI+e4Xs= z4LHNfm{>QD&W-d{S8QwUV~O^pYy+KV<>+AREu>vNF)mNIk^Z|!>0h+PYfPI;T2KU< zW?4QF%ji0ib}0^`k`t&pS1ILLh$bqec6DM{4dnG#ffU>h8?0haNS3L(w#59njP{Ok zzsIsx*3JmWNC#^vj?8KNh_HxMx0^*wfPP66Tb_a=AMbvi>m6>6@cQ&gUw`#v@zCZ>AWDXyo|BV9 zvW^kUH!L#*&h1s{k8$VUJt-bc>wV! zS!~roFOD@|*T|-iq`7-=CggN_nNdDfUZb5OB{Nz}*8{rwNptfXc!oUoWU8;NdHcfZxIKdvPv#ZO^;Gm^>sI-Gur7W73 z2jA|MWRj7gpI%vXXRw!LADI@NzD>yfo{o>*d%eKv0;L7ClaR)I5OMXSP3x+M^EK{;=u_zp>37Nyz5!S46FRfTu9l93%d_(lc3!6TaXp5U6J6dMVSJr^ zYg*`dYT!dbDfYMy$CkM=80z!&<(VQxYYDu>UCKXv>=goLJzmzH0hy}w9jT|&kr)FQ zR1Iad4pLUO3C2}7>{c`#R(MA>PTy87CVcJ#Z`kA?68($BOMc$O5c;iv=$k;s@opb~8-Gsy2CMYx$(G+req}JCb4S zFHB7s*8y%6Lwn-b>w+GwDPww83`6B}I64?#zI2i>(QMFsh{pm>M80O^P*@ zWHJksFz*7uyEtXb?={@d+`hFt3VzgdY7ouYbOvJu{9_<+NPcLRfYA(I7_N)v6_ng) zPzTM@c)9J;hJyu#Ff12O|_}V>p=2U$D6j@qQQZMlp zoU3Zi=4^W4U@)?KL|0Jjt-jVSCX;D>)wfQ4JO#TPtypc7Lp?xE9Z7Dn@~${_zW<#| z6Te#jYu$-5LG9JoY3Ql8j*hb^I?SZFk?KGaantlld>A%10z)pTK zWuHM!5&}z>Hcsqu^tP;E2}(dZm6@v9>hY^=`T;}v9YjO(Dg;elFn@3(t-dEqa6O?G4^K7t4Ix>#ggE}yR#M=!*u%iW{!_9^yZr0m(n6{7nsk0=eB6RJUT-#`^WH!KjyB9Tz7X76Ezgr>i@Se+j!30#_JpRHO+3vj<4DJWIq&C}NO zh|Z0L*J?k0BUe^GrvLaNlYU6qtqmSHkol<&I`CLXj^aI;zlMPs(V#0$elmHQnE6aJPZXn??Gb~~a0cvNpJG=b7Thu0zGNyRJJl9lG!_+cpg zgYKW}zfT2^r>c4Pm&v3BId!}>^lcq(VB8w*wam1$B07YxjV5{Qhq{c^$8_<72%9B< z^UQO5@S0DSU-)W1#I_=UfzV!j#VxF~rNww1b_`(xfE0iv(N0OeG7QWhQ;z%q_}6{a zuQ^+ri3bbt$Xc46WJQF4$*Mnbe;-}vD zg^N?&x1mrdq_S`jYFT_}r!+d^!l}a;6^}$OqeHI@=W#89*UHL{&IQcX8N3{W=i?c`^%x@%_8+m=D- zj5Neqmx9OV%oB3*S^eYM*(Q#DNe%MV3*aY?i-IcN3slx1wqhl<>^v%#LFwmnU2EHG zwS82;&Uw!J6x?rN2E$~cMHB%f-#irLe%+%h7mvpSJn*ALfYYPHq*%=5__% zokk{;7h5!Z+FoDaqH7MZTFd}N)~0rM=WK$k+MXif7zPqxG>Ts%Y;{hpdY(VM_LNP* z`Ec)=%>ek|#m+DBO-YK@06O9WXZmd|EU?%K8y(JCE2_6hz!#PsJq$oIry1i-HstHP zzY zK!DOJkW^Vl$m;h8Yue!-%-#H4 z5CY4pWS_7Rae$Fs%(48688L|e1V94OXljYiP(-_)NN?!SsXB4>TQ`i2qXY1ZA0P06 zWH}8@l~l2Bc&lFI+Po0t4T`Vi#bl3s^;V|mHQw?*Rm`pjA`Uii z_&`q&&Lob0>g77EyBd7CHfbv39FlTEel`xhffde5)QuFFy!kU^jWYg9kKT$$u)q>J z5gTI|pORBwweb+=`X^`9$vvmwu7+(&ov2Axa7YJ9M|(!?irAEfBIX)cu*vG z`CRsJb2|s3X}mRECuGU3wdU0EqQD-}^+P#&sAYQwKx?xqkXlN*pPy|V$X&!iv7nUq zvP61#ptOqMEg6u!OV-*R?Qcl8FWlRiXH$3)Q}U3-VgW97HO5SH{ywu9*P?UHLo#gc z!cVY}e#SSkz{LsM%qaSXkHOV&CUtp5+TXo>Y@!{jNS-(vM?Mu&0i+Jpj*cvHuT($* z&J@N4&iWW}l6AN@$aLojoi5YMeLlqe{4`asWPN$N;?Fc^VQO8vCn=B)zx72LsKK;i zoaw-HU=Pr!a09}cfCkh>i;UN&_5+zX6DY(0p8y&iyR{82$wi+WWoYWRlJ zT3^u+Fbir!|mh0OiG zXNUdSWvYW0wFgJ_`_NMi7Qma>eb-~d?Iw&mzZxaaHdK&ng}$nRrlW# zOMo60LqU=PO^OowuMqnWt_f2u|A?j!`_Dd^qy+Xbhe7i8$kL~I>9D^yIs1JgB7N&%!BJZ<2)wDCq#|5iRV`;~3P+_vzG2bQ(BU3x42evZ0L z{J)R=nSuY<2j?cbr+Qlv!c%qRUnd6+%Q8)cKoIp$L}`=}FnK`lK`Fi;l3M-n;ZBpB z-jAx>5iZ$-vf>v4O#=l;O!i@(MR zlG@5u)1J@sK(WrX6)tx716&l89n>raRe^Ll6~cUfXZv!jW}gSBZ|I$EZLeFpGMWK@ zs@JlRPwvect_tFQp{&U-xB)QDC!+A=FI7W56kv#nqj;B@{&HcQZ8X`PNV7D2;6cAu zL9qqOxD-^+uZv3Ug$^fzv|(&8{pTL;R|y^e&jJiuilAAR=Fn8g6VuDhRWU8ggzRx& zWE2)cdLpHx{X|rYHdfjTGi;VB?I|>$;;!dyZIOTSd(Q9Bfkb(GaEuYpUK#4S^M9$J zKbf_xD#9s9W{6H#-J&~-rr2%3QTW8zZBX1+qfF@NuV(}B>IHiZ%2S5KO<}U_pX1M7 zsd~+VGGIKE>J3drJwjWL|>`6h)`TdHac zh0B-Z6wQ)`O;eCOG#``qt!NWYyE(coGzun+xEH+FIWB>1ao8V1lD~n_Dw08lYt7?V+%m(7|mP zYuL?d zLsv_^2WTLb<=QURi~A@mE9YJ^&;?`aH5DQ6E{PcVW zqr-g$z4Dh1$wR6qDI{Wg*O`a_g2>f-5c`o;nW6c#9h(uGgEg3WdLEzHuBo=!8(7G? z)w@}jb%n**9qX}OSae*@JqB}DLTYBnYB~PG(1ji77PlmHD{aFmGPcIB>3$$}TQC{D zTZJ1;l#dmY`>QtcAyvDXNoC6rtGMO;Friigr8xo{FB`%@Zf;uUqn1VT>$92L-ERqz zRy}B*QkWs~Wc%1sRhL_+MVP6Oe4p6|hah{Y5nd8G75iA)MOM$WaZSPTZL|SC!^9`b ztTWbpjk3F)js zXhpaI4zY}g<{#qB7~tJEF@;L=Mi34EF943YgpP;jL^^=R5FJ9%;gcl1Ku9Kmj1mr2 zM-n}$w(_*%z$BX}-7}WOqO&m#g#0hjEA7V|tP4r_b^$^|zwg2Z>ej|x^?VJDXDxKq z8WH}|x|c!Cgd2|Eqg@MRu6UX{J`ABnM)Rd5tJN$0nf~URj?p2xAhW&~VC9jBQEPOs zBxKv>1@4eT8>>a8HDG!|Q`Z=T+95Hv{Me8`?TL~%s%@o=|8gPRD)*km(e*s*HUI|c z;mfv`Gc8a(42eW4Plba7vc)cVu4w;Mb`S{-iPav&AZBu>Lv4Tzp(xE(JGiH%u-;mg z)X-qUj2d4FDanq-u&yQ7n8rGuZa^VqI&7;zZ%cK`$D@zT`82%&8a6eSVMRq2ojP~u z%Wm@ZW^cdgJT{Z-wJ@#o^Ih8km0%^@)!BV2JGO?8azRImvcI%pNNgGIti{l1hlGXn zt1=5spy`xWQT`JP1i}IO{LhhRlO3j58kaWoa%I`7 z2T+TG?^$y8)Yb|Y`wfU{mZ4|b%Q4E$rr)LeWK?RXBbkuAUWW{Ebn0|MSv%`biT0M_ zYgL~O-6c7wTae-^r`EK)$LEF9hg$S7b!H~1%pXB&<1!fnz377~G$#t~L7k6)>}PEr z4d3>x0{*1~_*s$g>{aV(G*Oh3I3M5x5D95rS93t4{@~-^EOZdC(mTlpLvE@?5=YZ& zE_Yc^^-beVOI}}c9<_h!gSoJ z^<}I3Kv>D$>@0E&Q@VWhQW*dIdbo1GSVQ1!t5N?_B)`mpnPi(z?U1)D*n;WM=IVQ% z#Biy#m1`R&Z-vD@hN9-Bf(m`iISLjP;pt-Oj&U?0ssDQx0MFn2#@wJr9Qw`GD{Oos zrZum|>w8~=S=hm3o}~kqQ0KY4k%y;IhMS_uMZK*`XtQO1_p&PaKi>1`!gzmdmGrN} zw$hGZvdOBG}K3g)VzI zYRJ*|k^%N#JJ0tIL$bV!Q=r_|HvbVlSJ)t_!P!`p2dYQ@Ogzq1by_S*-sm6oU@R9N6^wq8`v`#>dBqw{;Q&KskNS0&o zz4&+?qnrI?8PHho3P#a0E|DTW1!_vORT$S~^TP7KYQ$0~JYrvfPM(}2Ol_l~LPyhg z!O^jF(vcl@$)#!{= zSLIwd5Wtgp(@GDucnfHc8_m9h%~X=Q@uX(DN-=9OR_CQGGyY2qgi4ASCPM3aP1DA zzJZn6#9{c_%z+9iqWaj}tWfv$cuPqjRpmzy!aCJ%7^hHtobvoJePgj8>of5^h_dte zU&EL6fn_(f{uQU0!DrUf;_mI8Pb3P8>&e>`Tmv2gE5{N~+h<{U>s@*F<9@<#s}jp5 z=M8jN?VwYT3y+320fh|>Od76A8hMO2k&+87dOg2EFuaIw(@}I-sacV#vhs~jq;rI( z852DeVX8d^95gnkyaP^Zhh3R z2ak#1tPk0b0!^b)-v@beHLKEF-^Vv2d%MecgXn|^bU_O8VEr@UcwrS1iq^`%T5hgYB|SF( zO5bG#>56F_^vV`!N|f(}f<)pHrr&hMS+#uX(XRN{R}!A{K0{~joiN>_%_ zheOSaDyYt{)v6@pd}Ce)Y4iajg|bgW<9Ac*Q3I5{y>{7n?{>~o{D5OwXi}1*NiV9& zXE1mz&-u*(Fo>PxUxRSr6z%6aVL);BvHnXu`QYZ5T8+E+%u?zl+o`U+qDz;BLM<>~ zTcmIMo*zRo-Wi3Ctu)}-pojEzf3YVld(F%4`23Qp4E<<;$m;nfcpaKb;%@p2XsA z7)&c6Ypr7L3B>JDw?$E%JR!(T#0;k!)RAp~iWPj}6(uN7%QO*>mE0;Y&e!}BJae8v z;XthhR=nv_k4ah)@Es&33inYZT6H*;kxt82WjnGXk}X|jd|r2As}@Z)O*)-7>eZlX zQ;K30GnAF)I%sM=%fQ106h_GgnrYEkHI(V7H>l_nJl!T5E(-okK#so(TFZP~K8eKa zu3Mf*uYZan0+PjqqSr7iRRZ(;xr2{F}aj7CFddJPw zIxmFh02zfpsF=|ICUQ$9Zd3dZ6d1!+rW`q}V)o5TqZ1Ewm<6xfd_L%!ZIvmn|2z6Y z9l32wzirWsCBA=y=l`0f9xO5wjhFGj@yX zB>?8gy1II6`pkcc4ETxDbHyZ**5X$sR6j#zz``#bpU? z-}Y3E?&%;M&-9ZLdJX1!pnK6&l4cfUN7igsxhw0hnK*Sp7+83~1AUCMFV=35*1CG!4J8%i=v6w+!Lmai&wR&bmC7FS~pyuk$xk zx$FZOki&7fSgz+6EP{Ep`73Cu1F;?)yuVZ;fQ;Q|mMJ`SsN_JoIz$g9qH1&>Cy-EI zRA8B7MWs@0oh>XnU!1f64MEUmkjgWgof~y=zh1SM3Yy2WuMlZq&@DhK+p-iN+?^Sg zc@_()dh&!+T#WNwUuJL?@uw2(L89p~{V_HHo5z_lXzP^560}q9SX-o;gK75n=bBJAKb44`18oEk7_Vc32~NAjSowOT zdy^H`i*;Y?hWY@I%Ca9v6lbv;FZuqYr~jGy16)fjbU>z>^u}~`6T1xCVTFB%1wM6ZN%^rHg`bPBw+s(F);^CvQ~2IR8rAUnSBZ; zNN(0rdwIpgXCz>TsgHm>Glo!$=KbWXt&`8XAFi&w_R4V7f2_Cz z^8YZ_zkegb4wGi*c6o&yCb>4OI}{4+7i`x|{~S*59K4;Vl^AI?uj%`IRQH{np+t9& z4TCz8xGClKNRr5=4&F7klrn3B#U;^WAo)9ypjC+dlHb6>aZ5>);cVL{L2u5sOnm{Q-nNCx%ujFm%975i}ajA!IVM0D2HA@zelj@Q;Q5 zq@y|?77}$pE()6o#+fBPORyNYg$uG1%r)s>w(vIL2qULBB=C2{5gMBHcQdxx1=iU6lZxWEZdS1WCMdo)Sg@lIkdtVH! zyo$8e!ULRkrCR6SbF=uUKQ48fah71gi?KpYJ&pbb(dNm46a4r5jXT5U@uVN92nVIk zXE{KPymkA+1&gn)F|@|f*BfLwtrDE{ML==HNOA+O{(+3M-;7-JQL}0E+Njtv0t{&B zV+J*rCJ||C54?LnpG?RNew1ZEr4B(Fw#%nH*6=9fbd^xSv?f&-#^ z#V`INObkbE%`&1>l&>RrW!hZOi@avD+LjiGe?ZrHTie~js<&PxhkvG^ zuct&+;GNP>lWsQKzHqI`ErRr9*^JLzLIFcWp^pAOM1blWMMaV|Mv~s^U?@*q;TC(N z(ezkt2%?*_*300Gq2+9frzZaLGuQnEt=n^9uCQ*tQ$g<*5+<6RklkZkFsT^c(-g0= z7Q7^KO+ICR`eMAAvinY{sZ^CB4x~KjB5JP1H`et?QcQSmo8xU2v6<{^x?zSHue^3z z!YH;esq&Vvxb(f^nU5d(uYK()E-{YlQquPLmiwG<)HHbLDhDXtKN3z7G?cxaWHE9! z0s|XZ%K4vHF%CAKmqmENx<&ckYT^ioJThw5+GIi&zV_dwXWzb4RD1g|z2uO#;hQVD zpiuOvnyH5!vwnMsJi1J|`RfaApS*-RnIKAa*Rr!5sy@Sbk}k@>apO(g%x~L41^wXc zY2zO)n?x84=@R=F^}IJ`GpSSvkME7PZHHQT;g$u2&dR&h#iOmif| zqJrMhRQwjE@$*(o8JE$JFM%`o!`K~5PTbd>b@rTGXbXpTs$krQtxalbWE0U%GAC_@ zpJchzHEMX&1nvwrd61;k^5*dib3IgDcNY5DceDjju{4Cs|5gLsT0fUsh}%v{ zdPG0*BJ89WtaN0EErs9H(imIAGK2fC2Bt3dR^k3bp5uC z==ASQw}k0ec7|H7@WPHaKj>R3=gGH5%4JZ81ry0pVP4Jc3FKe^i=-!|1#scw7s+>bU0KJgJA>xDgr7p7knw_%@?z^+cDW zbZFL~j<$;s!<<)R2l%t<8rE{!*jjp>w1x6UH7B@5zQR5#^u(I^u;BZMF+c9~B8gS( z?{ab$F%AJ})<+6#N7K8Zjjrc>1JnU9OUqoi5T6MJr`@|FtAd4(kJ7X(662Iz@ za5u)P)XAU_r>B64Vge;U=whKv_BUEC4q8DuLY)~G>PEdj?Gr1}ZZ)A7p1;wU3D)Z zJiyM6uu7P|G4g%BH#2rvW>kn7HD#sTHKI55`b)TIfWAiJhI${)MCU?6nJG7+8R^Jw zO*P>h!2=Suz}%El=%rS_VPYu?yE7Mzqd2*>mP3XvHyxH!I6D$x*d*@R%aXOx{8(`C z)AoI>2D|mei}>_VNGPwRa)Qel?Wn*jCwtsba`XG-Ulh7mttM9u#^V%J%JtVUd7i{p zSBbDkb}&P|i&o|p=1Mjv%TyJ`UWVAghJ!29!hho{*|WYels$L`Ax+vNVJ(Bp_>$Ld zXX;_f=s01ieD8Sok>T%yFSQ=0zpyTr%Wu#-5b{3zd&KSl{YxlrREoaeiptFAdMI%_ z9Tt_IIJ<$Lq>BueEI5jI2fM+ivUDfY4jR=Z0uVEhN=t40mOH)v(M76?S<+aIE;~hP zGU_u!KT9TDi;7Ry;0u39k&`bkeP~;}Pe##!(k!Nu9ZowVnL*aOwnN-&r(Cj(z!i#2 z0;SetnXKOnu?%bWHB-cYXMeanG&LXJiZ{?uiRp0KIN!xwipkK*TACnfBp`z)kqat$;BQ6)^AH^(MhC0hrs-H5Ql zKJ2k)yfc8-nKsImbWh~172vV}@U2dH^o>b{*# zeVT8ho8*lHa^2OR(aqk#Tme*NzZ)ki8r9vD<@K(tTb5iUmc9+ZPqX4gQf!I_5hu)t zQ$BX^uPbNBcJ(}uhEg&NRP4T|vI>V)tZC@}BjpP0t zRC}U|yv$f7>a%?{XJNTiFd{{aYVE@Ms&3u=q_<$jhLCy@dNLTcGB{$E_556d1ZT#= zt0v@u z#oF>lb5lSKnj^kGQZJ(>X&OV%J$043`sxUE*>$&N@hkfIH!p}UGzk{qhFhHZ^{dZr z&1KnJd|D?Q+~czIvbnQQ^kS)7UFK(n#_1n^L~e|~xzduml?`EcaWgdv{rj_T>0Bi{ ze@qYT(w{A|So_e_XMx?FSiYFlFrQKvfLszdXk=>)`kD#%)CQ6t|Ja>)k5e;`zY}h= z^CqnH)Qafk_21nH2YXRn!kd2U2q=?COxlYV`1vUE&-DXEduhq&r9)rvm&06=Xz9IS z$EelSIW@cb3P{X%9K;Q}m%rb*Vh!2#>y*9VM7xp(v%ET>|6x^w@((Em$$XKgl5>;L z`2K)ae-+cT<*C)8d^NL|xuRLEDcHxY&a>Y-k0m!|Qx%xS`Z?=+8{aFqJf_29wO4!c zIYAd>F^lh}`WO2ogOpY7|01vNcLU+%wXs$Vo!t?pDfDGvsY8`((yf`+k`(+ZY&>dS zqt~)nan8vCuBW9{Q*^&&xTJLtzH2Zj7nHwo+GdsA0-LO^?cLq6MTxxWF9RnZ<>Y#c zrpvzA=GZ7g#i!U*R0Bq1&rY9OhH*Z{qE}7|Sr+5#599=A@Bf+j8{aGbL{2swm8ysG z7@8cOeJ>ogNCVS8rEO7IS{ZD7h*39is;KCD+Pk$MlGI?mx_g==n?G=kUMrVZ$Yy_w z_GIS%;t{(?PbmVbCjqRBKu-uMZU(abNsBCH6_s9BE8yY+O2fx`cS397ci zy~UCd*d`Fphd{y%sUGJmhhnW=wZKk|3}HQ36)4wLz(cco(oD}x@5T~CShCirhG zynSQ`Tnnh>Lf};(pFY)~ebHmnvYe4N$#&cK#so~^!M{|9i?Hr}X-q3k7{NL90xWyH z;qK?LLzc>hKrPxhHl@Boxja?O#(QTZGN-z8oOI1wD^-Cl90O^7rGy}yVT(NBm~7hM z(SbY(SYUaW=I0%OaR)X>&L2wXYFnEn6utEfneij4AqG!~i15c@A;v5UxJ7Y}U{UDp zkjuGe_O){_5m5o%i9ABU{zG415cg71_YsH-Fg3riuapBXL#&v;6XLWOc(`8L;Ix7l z^7(4InGh;IXxsderHSnL)V=4WPy7QJ88s^*;Pg_JB3{xaI--o{o_XUGeQkEO!!@d|9A_7i3+VjmfCaXoXAt#=o**HajN$u zfr-|A-c~_>3RfFBXQ+(!jx{dc@A$+}+C(*K)B-s@ZKH}2qh7#7ybe+wN>M_@GD|y` zvJv%?BBJsZ|z@h z?6PiGKwUAGB^Zx}OHz9k#N`HY0;&n9zw_>#E#Ui4r~^SsM;|5ZV>@v4m>F8RQCE6s zs`#X@S~IpcH?2?9wMh4GFR#2Exi-6B-|$l zc^c_U=tDp)+o3?n@(QM9ep>6yXmL>Ma*QrCL6sfb4XH~z@A%N#)2HFCDZB)V-T5%) zerlN%v>2aR&$&y-21tB-R~ICW&-@Ly7kKJms>KmYIaK+fHH#pb)W#UTQtje=ROcIi zv)!3a|9kW~&jYUo=Q_vGiAJhR&`^_w$b*2MHT#_))!%Wq^ktG#Ujt|G&`$YJ1<< zcv|u62AWn^Vg0=az)Ei4O8H=5tJeCaa=+9^dbP2+hmz_dS0~F)<2FIEx-8~wkY@5< zuhmy*Y3O<^*2UqPouQ(5^h{U<#I*LA~U=YN>biQbIZZB;n*Ohgde zSxhX;H`p3qsnH?8n>WdO!Jj|VNTao^5+R;^D5tx-+w4(KKo+V7R6%_B!sacO)3zyW!SA*KjaQ{qIh87F%>N^KZat8P2uyqh&L6?<~Xcg7b zh;1o$6m_iuKMN0p{AEkboWnQquRP3obg4?S&wbZ81JqbqhdOsFl)US zV8x(M?|U;#S|o`sx%tsghz+;C#AOq0`HH-Uqm{*mw=+&rWJ0f?WuFj-+*($jOz)ll zt=Kw7yQa21n-L@TYbGEw{o_iJl_5-BPM107n?~i+Jj~ZOaOLKsG-b0kSt~`IQXVo_ zL;k{Li~nhE!U>8?2(zZ~JsA-B*1-yqqQFAS)pg45{6puZ4+BtL;Bstmmtw0K4Zi>h z=Uipn|Di;v!eXGQ?3_-|(!=y3nzV_f~^XA|RJ-}Y})&OgS0|KT{;@;^#E z?Z#}m>W-VH;MNNYQeU2Nt_PmD?8lPXrl|xCRgXZij5}hIC7@Liq8}(ip87nP`1;2$ zCmdIi(t1Mo56tZAZ;t|g)B6$+{6(p#hhTAT-!ZaYn;&WDi@7hW^`(VeiG4JA{t{}d zeaYqJphNz&dl8qPpWkv(Ihygf|0vg?dfP@<_Y*MkGTkubF2$>5ZFIzKT>if;b_+&- zQlq>{j2KkNQlGaEaOswQTSm9!K{x8{;<|95D(h0yT)*RqXu9$h43ZKovo<;lRsCu3ne8NWVpd23Q{^cNTCQ-7xH~%IOo(0Wp;0 z1z5Mnzo%Puh&q{1qX!s!tqdXO#eJz>NrEB+D+;j`Rz7(%U!tYif*t+Co?IbC8i za9m&NHZyc$n!mX8PyQ$lv4TN8&)+I3ts>0B13O+5kX_ro*`lywno9jJqp%_Q`WueI zxTLw)Md-hVjn8t7^n|%kr-8i)pwL27RY7Y;`QDJtRC@@kxGRlZYK46(AWwUO0NwS3 z%YlCcFa-LdR>?!XqYmNq2=<>3hPEF(L11I9OoEM-y$jy>uQKinw$^T2F33=Lfem)Pi2Q=bA>0F$J4 zb=~5B%ne;Yu$OcVN^7uw>4xoEptIcc-NOEmpd^8g?Q}?m|;> z_n0qWbKu~~rYj76zbF}Arcym)ynKu3QRRhv)RQB@FRBsXnbL17RS2Ee+KJv)(*3hV zdF`+*2}zYsx_XNY9T081v(%yCx#tq-us8@}xsdbv(a*-`oaM!*ky8 zZOJ%r;}?%_H&cy%pL>8-vjsaNm>l9UDQxvovpR*!2I7syv^$8wR28Gi^lad?xU{VKSQEW zC~iqv{3hklK_`nf=#BGwsJy&9V1|$a_I+^iRXEu+je;6&a%8`wk<^s8ZGwac*8isi z3&OMg@`r0pf0dlGT`bEBf@K?+jUtgqPf4j9XmVRfR?w1g37<)36-Z9iX?GU4*+kR1 zPJS<%GTbxQw>?7-T-M=IU z?nRyRpLhxieT34EY;&opT$P~WYUr2s@xbRv--7`@EyIwfFNo&v|~=b*}6D z>Bx6{zMt_PuR)_(R|EyR0J7>t(w5H$hwP1zNy6QZAt-(D;YobPQmRfwYaU>z__PE6 z%4NvaARSTbhP~b&C=0;w3kHf!&Iw?+EQUmhSFZ9rGff3lJ^)T1Zouc|@EMBU@19+q z2%aGFiNt@hc+ZlLn#UFZH6kcK&?r`#1uzEs`dm>ZLv8^091tfR!ngol zj;3prhGYIb;yv3hy}kf|WYj9~AjDMMP(D$zeqI<@%4iD=1B93AvtE}(rCslGxFW?3 zMDgj5_AhRwjf>B2xND5-w7w$*+t*?ZL8Bj7R|pCqd3s^i04?;<~Q+sIcND9 zEK@G-yf8atSz<+n#ADbHNY&S#@_8G3kH5Wjn;B@r=$_09oF43i0;t7hdfNr}D3fYx zB`$}fd=KD09aXJX(+fXDB2}VQmaZN>b+hNmpHTDQU$wFQ+Zzk@La(QK#>mrbDnrU; z`NB4Q_OD@b$4xWQMCZgnU5gn(#o}j*H~hp3Bg$F$qLd|2VFKtFkLT^y1H5z?nWeG( z#=)rjmEnCbStQr5%iBk`Z5mFwcN))RFqAwU=OdPWC@MX{_F9Uh2QPP6H z)m)^y-TRCrTMo`Y;OI?>tXI}gJ=-K5)WmgY`4{3!c-m`1(EfdX*X?5icFpIiZ>wZX zGB0il7iZ}eeM>E;_IG*cKX+xBW!c_v%E#H>v2t|VW*w9LJS@QQ7wXN&*D@Ib!j<}? zl3$PT;>%4U5&vk7|wHh5A(Ndl0^@}L&M(B=7NO*dhF+sS9V%2vV>+W|JrmcGI*>606)HxVo|(HUARbD0$>ej3j@O-&gFTUN&g=XIoddPZdXZ z;bV%_!&`;5)zA7SC2L8l{*a+--I)t(k^9)%{^8(M_rB5{d4B!GejG<|Zl9X@!g}P* zwP?rZF;C1h1FMBlD~GcGqCd)7p)!{EY_14OxsI`@am4n5QEnz(>+-v2aVqZex0-~1 zjWsFFB7ho=QqX(BO!Mrwmt27h;-&!vMPQoJE7z7ZiF2?RctAsn6K93O9+tG!njxZi zo|4%Ggq|_c58oU#y+<*&d$XiAPrvNBgF(TmR&KJW?T9zp!8Nj38z3?da5O9 ztyP>g&F5bOQ@V@43&2Q>N{%87Qc$J|efzl*&nsGeRIg_Ah!7*DF|_5a0F;PkdyJaS zr_Zep=oM&jS_nEvt1E)BfG~sJR0VJF`9;so2gb?Wh{mTJg5QNQi*u6a`~|rpn*wQ; zYEG54injLQvjwDwS!1@6rgf}0sgL`Mj~w)O_jy%*e{iaA?R^lHLtK5RPvm8(Ao2Ix z{t7u~kJ3g}S~5&3fkY=a6uV-7LKcn6V2&@2`L(F>6wi{RSZO$);8-pQzSJ6MK}CueSq>mQPj* z5~qI%&o|plR?{@Muppio^uHR??=Cqucn-ge!B1)C;xvPcnSty8XCwECrx6n9`TYid z$Ka99FoTE}Mf$9(Ia*UJyXd(@M(Z=hq2?1tJN<8GL<(0@|Jdl9s#_}aV{v;cFvz17e%EmY8^c2%Wuqs6a%*fqgVzh2Z2I>36!> zvOZZzXFM9h_=8OYHmV5oc7|<{h~M__B9?FWN!`YbnhD^E?~*pFAbTdhJAl9c8&jcq zM>eVN{_s!2>oxgeqgjrw0nWtWsVR@U+j7HskrP2%kZMM$kAr3JTW32>PP49#S^kv@ znO80%IjC|MeSAYnY*_+Und~^q&E5F?jV0l|M;nAEqOtU zAA5t8yRLlsMtu0gKcX(gAOEBV@bk{Re}+?lRUc6lMV!4_6+L3ckBk$7lOQlcX!5yN ze7Zhx>i$bU31w&RiFSb{O8~v)?lk6WMLzk0$>U)D32*;1-}}FqxBkyAwR)7+4Xm$X zul|`mki$Of{7^EKNK(Uda~3lK!^w#?H_Xbs0{Tk_+?asY1$dp;y6D}^&MuUV0XE3(LDmXsj2BZxW|bf zHGmHbC&$DK!?OJ}xiARsWslI@*C(4IBKt@M$+Y~`a_%mI0OD0Lly?gUS7%54lpy0Zn$4=PHRc7RsU`?fGw>lya8P;V1ULYgYaU1%kRl24?T(s>goQGcE zT8&+yHEMpQi`NxjgbU-km8>h-FiHqSpB$yL%`g*3(%sAn$=RC$&9Cs$_VC*AlSKf=&CzJc6h81#N^qoGa${!NsiZ zt?g?umQ~A=qWX`yt}Gvb+qT(Z^|>QqPjiu%Ap>uts4VB9U)BS@-#EqaNlwPxp17Z5 zT^Uct_ZEz-2FEHsmnv|jBk?cIOVdAgUuo4yf4B8;41Zu{Y2AL40{|K+o3yt?9HwMv z^8mTm+&KL-fm{nj;%hr>KNT8YP>faE5^YLQt(S_bxa35pu(_sGT6r5KyiXrC_E%KX zxOz@Wv7-2;d@J_JpSDfeOa?ePwpg3&Qqsq7GYwT29Q~eZ8uD+?A`o9fu3oyrrSc~{ z**y(&YBkShg#11sn#DK7A*#Ey3Ja<}^O=uXw(;Gh@g!fxTSo`})$lp0&pLU8TZspkI+f&+C$&PdqYf zb>U56ZDWs}&DTE{+10uO$|Q&I#l_Knu4uK0fP|ezPlSHA>Ho2gmj#JqykZpd^wMm* zQa$yxZ%@4oed&o}TgawVg2r_Th&GiIN zH`JcKZG;3g22&0@%+p}qqd}llL`b!^v4MQ5_kQQ#o5zl3H+gINja-l%n8n`kKnTBR zVYbwdJh_&tw)&v8@fEEa~9}aiKijPAw+~?5$R#60W`f z$EmjgNP2{9h+%eOs;=1NR(bL+GjqGF@C`sju`p$ zb~#ndE7llM1GY?ukw~%59aS9IB@zAa2^ocVaTKlC~H+d~j$dEqEU{Oz6F#G7vR}Gw8 z*&~C#=b+KpnAsa}@qKvUYukL{O(2oa+VZ+egIE$J6*a?~#$l5gGxDH~>Rnb^*)ssI zTs~RK9qX>{%J*j}R-{FF_MnUA;6)9~5To&KcQ>WG{FGQh?S_H__V>c}1*{k7nkB|5 zYvG(>hrcjZCGL=a1LJHIG@wGu)ZsCEx{Y*t_Eo&Aofme?r6>|NoxAwgn`L)+CFyzU zys}wNG9TJMG4Xim?K&q?-2MLU4AJw1;CWzhkJiMNbJUdqN>!G)LDmY8#ASigiGhQU zwQh5rv{gKp98Jy;FV0m2FBgdE;X%>|y3|@zGiB%d9A*UC$!g6e_RDsPgm|rBzD5`? zEKdz(VbQHVv6AsfmV2me-1A0Tqx?2h#I24ubNOd>(WU?lf9 z<+>)QT(>04>V%-<=eoX=G@SiGb;>q(E=s_6Cs&wHJt7;raYIg6d}w8$Nq&!!%tu|@ zuFRuqWK1>JR(-Y3DljWDO?o=xRzZD|72Sh%&-yNOfPzlD%NK9lX2Q5#X)YY>5B1HMm)=Ye z{W6IevwM6v2e$uLM%{KD#mgo5Zalu(X)lX9(8-V_N+3NOXBBj{NooG^)ErDinubWzv)(3?q1dTnDN z1Ym#{zMgob6Km$r5mUhrCN)X=(!T{0rLvY{h@ zKDaeIqc-ajr5$YwCcXjkHpFK2)lXOr`Y=TT_Ys+a!=r6k9?v-XD+KxFp zzv2+iBJe`ZB2wRraPX26eTEWiJts`jV`<)aOJ3(*CI&mxyRt|usI)D`uU#{JVL`Xe zE?+WeBO49qwf>Bi(l;8Q&vH7kVj&NXDfx&GJBrF%CST=_kPp~i;kH>#537{P`uW<$ z%+<=x#87beU6g0TJC-3DPHb6pTCq691o!}s-LM+rx7WII1@&Jz||KQn>tU z&~@AR@sZU+Dd6!dF$W&SEza)#q+W*l6(y?Ysco|~VG`6cl{Y@1;BWbQ=F63v}S%PgH6|MqfE zp8%qXUjN5t3CbSGwo!wn+>rdG%sDCMP#@F&W7T?yUAG#G6kQfFR23@epP!mray&dY z*7PSL&q)cfick7rTZ=F20rJUGgWWtezkKg>E@3fU)C>54hdAxNYZdtmX=x?{!tSCI zB1$i!;Y?FE=jcjW=xrbUW2$J-b+Bo7a8>(uk1)Z~U2(^k-#`Q#;{@~zYJ3B*E1*nf zXiuiR)x$TgO_`WzXxl~8l5i;Jb@KOEnU#!~Cm}~h^kO{HyU^{5eG-PN@)4@#wwIF) zB?Sduo&aW21}^F1@8dlTo6z;|L9k$0G%;fB;!5kAiIh_Zf%=kqGL_kvwPr1Qg;exj z-EDp0LtUxRx=xIv^xlQex9cjby71b;!Qlrw#)O-~h2&UFCx(!4Noh5YzAV4;F+6(K zU^uRyjf%FLT3q1-pQC>Vu)nGRu?^cFNXkt$&jwg4dH4I->B=YeAR!AlGWkG@mPx$W zHdB{ay#9NrY551!ggHp8y0>R7IH##CtS3w+nRAj-@l@$__+$swo2Zz&Z4!GdUy1Xx zhj;Q2vY)4Y^uXsQ!}1j zn8mDc-`GY_DZJf;(CJw5(aOvQr$Sw$ot_37 zXt!IfTY?W7%RD0J#PbA_E9HVwMNc3`TkmO|YQJD8#k#YK{iuqtA*;D$g&0$tL(>g= zIzzN*2l3RVm99)N4yN-etf!U3d!K#P9{UyLKipA>LO5UYn8xxjPe;P2bHy%MMsLN+ zyY4;xy~$m!{0}vLK;-=9kv+YP)9y7jst%A);+8|SYWk+^45QR`cLK{vAx>siwsC0z z*~8XIFUC2316`$w#*1JRzc&D;#4DwrQTm4{!SFjg3FOG0}D@$xQ$J zRO%Y0A}!|_^v4cUzBR=he5ZHZ;InELztebn;50tZYh9UoBqzXh{m92N{F>)40taXU z2C1p3YU>+B?k#P*!}QAaTj#fklI`-}oJ4IlDk(TwwQ=K(&*AcYk4<)o6=OZ91F;I+ z{P{n)M>ZnPy78M4aB-$mbbkqyXo<3_$LqRSc?6Yteb~i_b>5*DJfP$4g^V@i-sWz6 zz`vFP?LNe{tGQF@D5R(;51rH`fjGPIb6bPi*475XlMRo4deQr_P@`_Nt#18-Sr6sv znko&jp`F?vo~Yvuhi8TbASrux!8Ac}in(dB=uMp|CP?so(Uk=%RgV=LH9-=mkC}DjMR*^dT>j0;81E60s$$k7l-2u8WC!{|$wm#;l z2{x-`s;h9dY@(Sg;|)F`c2d)8GkT#j0$pg*y=c7-*Ln_vsb7a_bpdgktXAnWN&1$)r&R9W z62lf>=lKIs+;fq0ipSZ38P|^E&#LmabRX};Rek#51^8j}LEHJw%1&>d-cZC#Jll3+ z{U2RFf0Rt(^N~Z{z32?xP@j12oG1pr?mhMGSt`;&0yD_jFNUSV-WOXEJelHC4w-*UcSQMu*BWC>eD=OqK1~FO#w% z5n9C{X)Q)o5E?4bc2(MZ=gnM$r23O$)Svkmzms+NiyRC8@BU{Q{NFwN|E7uk-(HGB zq2!d82SYy$SY`IhzR&_Rdi=AFG6jmonX_S%?DT$6t+^T5@+6mEB)zP8D?P{Mrdp@6 zrL(zeG;w2ue96v4eB%hU7#ePB%Y=LxTB^v_nRIU*{Bqy&g~6`izQ>h|iIro7p^mT= zVG8!|M~3t?znJ&t-i~N)mEXLjuP~DEPClB;T>lU|nMI_$R@udRFK_XXGJaw?jBMNE zJ1gjEvpAjAYiNjivZXaLreHvS95m$ ztZ1fT*;e%*-3!)e9n{5mLhDtISRQAZr6Hba6q%QygUY2A7_O?2@P#51-&btyp6Oru zPTSpGwZcMxv1fJK)tFH?JNENAJ^h56)-x`oxzjZy2_*Ju=M07Le1BKITca-Y6{S3^ zn|CnUxzA3ZVUVU~m(5Js5#2&Jg9lO!YXGX?>mk_vOpH&<_;Z|&o3d#KQt~fXbM^?j z$VZs6@6mymni3(Gu=-XllJP#|tY<-W-CX#bHK5e*oNjUR9{nwblG9`Z%-e$_yTl|rdv1C)OtQCDHY~elxN$168U;5?OP`sJW z9;B%si5Q|;W69th(OuDbn@J>6`9aom5aVamm2#K~x0M=Aw8sUuUbqCEgbD39Aib0? zhjg@W11O%DR!{&)es_$^@YQBx!nVzr{Nqzj-V`tUfF8nc`fo5dIPE+abOGmFq*-mCfZrg#znwhy)73aJU z@!L87)6~7{MBQz79G|y3l?{&VKwE@Lwu_DlOFtrQ-1GF+tn)z;-m#T>ZQmQd?Q32w zK1Q2Px~mox7Dm0a;r!@YW;z_^$(^M;apj>TpLb6Cv4K+ zDR8D=IQLgWHU!zC@d_$F;cD);)ikE6cOm(uyrcPkH3E#+snWc2rPkQw>?VTK_T5F* z?h*iu%E0vE*xnf|S5z!lzTybW1K%G_yB^$F;C^b@y&0DchDHAFWb$CDb0@gUhkx{`5&229xLMNN+ z>`RFcmF%=Y*pIl?sAL7VF!>%NB!N&0WgIu?=tUuGpqaS5oWt+qNvJj~xzmw#cg4tl zp|2AOwCgI|=5r@Amz`Zz&Tle`e2ayON3>e^iHV1jH$$%e)$iwra8e+{!v6R@v>qSm z$PiFuKYW|Z%Lt33&Rh(t%?vO3T1Zq{Rdkc^G9qi!QLpmvw@qmQbYL$GM7FttlmscbP)>Pn#Jmh%GYO^lFnRV`F>_ejHvEev7ya}5^~Fp2ILfLy=)laez>nK)wp&BL+Ra-r!`;I}^0@bt zG_1&t8qYj4P2-koGBY4nT(hgCw-}dD4&ppH?y+jsuO}ZfKrZi98<{C>?Bk@D68hCb z-)EXo^Mn0n73!MU{X(Od|~H~q7T=k5}d#V#wfLc z6WME~kQz=uk|X-0Q=>8bx@@y0sdN3=H8uBd+?u~*xR|k9?eI3yE<0`RNCj_n&xH@P z)LpU=ueL+-kD(tAYuVM4jcgwA&=I_yBpKT)lp6C)5&Rr8Kz8Ur(dQz z*4_tD5o?*Q?O@2l5$arvYpXQgB4z4stSN!ipOV?N=LkWZCAs>Jynb)xBvVqaw{N+3 zlleNJ<->ZlQ-o}`S58P`f87DoYQJ7oK~YNJ#~7O7r#hbHtHG2+WWPUaajVyGx}Uqe zWwZqT7d~V&c(0PtMxaR#@J4$H2FgyReHvh(eo;{h^aN*xu-p0mPOv?Wu zu(51s5MplLvna}{>8K-5i=|03dtBx)G!?B?F_M#!Q}YuW|ohFlUtu#!fj$qU|x zpt4R{iE))X*co33 z8Y)frwQ=Rf@V0x;p0%}5aHmFpBF^_TZ`V2(JoJ0N)Enwun>>Zyf_(|iF)u$BTkgeM zg%#`I85A}r9~IU%e4XMI<-nrh|? zb5bmsp@5RfAH~koOA=48?GK<6Xu9`{0I#mPuk0k>ZPqTYXF(D13*IsLRD#jcz5E@oA@Y)D#R_hwBlAtCa8 zE5|HND8-a>3e~J|bujmJFzq_BJY(Xc#KvY@_6L`&u9989@&j#9ssXGDA5i^sh-<+7 zd6QHow)K*JC$tl44@?y1-^B)wx6nEI=l3R29f8UYGT0pgk{}Ha^efL=Z>CNbN+sbWc*=jGow83PJ zP(x`lrkIyC$Hki@AzSgaaGP&(@PET>`FOz4d%j!JlN=#|7tGYnjF>ROx5WGHQVLNW z+mxrJ3zkE50rV&bVVhGqj#o(`?r+)-+TJa4m#y5;o-V11`xY2Id4_)D+uS5qUL}^g z_)D^=mABkuXIq`-PG*(+?N4E1sJ!G5dFiyeg=9bZ?g!T#bs`JJwp$pM9r^Nn;(wU3 zKg2)%#`jbsWFj83Bv6)!Yz!8!8Chd_X7!tPU7BZ9SO_ylo0)gm-)7+ARvS8M1j_UM zTTE9rcD0K&T0K>yxhSiSKR`7!yzW@nu^MBwXGN~bdmJ6Kk+ z3k$DEUA}P!yb$?H0k19;S(@#Fu|ownFtk20~FghLY)o}41T&iA1dgSb+m0+BWxcz_nwbF}JG z2enpk@mPHJxf+5*B566gCi8ikX|LZ?i;Y$pzuK5QPwa|U^|a0L)N{^N`}`@7{8ms@ zWb)`pN=1bh*5Aa;%nW!SA>%hapycsMU8X4vTq5cQs*lG(uy-a>Bup3{|Dv>unN@{I zyHQU|O(bZI&j%?8^`9<1+6_-DPm_DwLOCTnqE7mZ5BpC@DsXP9YEPX06Gwiff)jWi zsn?PNVDJxG#@1ugPo}^}2ko2}_FJ*3Ful83;ZaKgZK8|u+D2`3gd_BMAf8=m?(Ma; zumFP58PEa+5W*)x!V`8=PqHpV4Hj5b)l$z1*!Wb=<l2(+`2@1qir+ z9ttZ*@D*Tu3oN4Da&yJ+kq))$NCs_OZp~&`noPXA|EM@aCb-wi{X4sRhl>12`LSQ% z49O<)(OSB3TPn|u1$%6GK@YeP|NEusylY{%CD2fj^6A~9hwpvlCTeupJnSO6K@?*bSu7y&H3blUL<-$Wj`G}Un|IRCD^1dE!gCy|+$NOuj1bi?819yTl-=11`O zws^mpVpAWO3fASSf8YPEzE&SsO|S&MC^$HDUP6hsn{AG(CSrOh;Yug!-tMr-vb3LQ zj-c8UW(0H1Bd2!Q|2az#mb#!#p?-~d(lkK_>tzz%9k-<>$W}>;DwnqmK$j@q`&WbY=Ph>6g)JLxq;hLs#?^U%a*8HF z*22upaeBcr^6iZ_`<$e=Rk&;-U)HzM#y_H(bdOW{t?=0j_NP=*W9O0z!fTQ<;SH*s^@ZmhZa& z43sZ2+W@7-0GKk?mf#BY7;E3$lG!#J&*JyDlmjdhY#_0RbpUGd9UBRtVhUUR7c4bj zC!V=HQMn#2mt$Gr^1F2*j!l?lS*(xyS58xKvs_lJT}U9L&7XZG^fBSSJH(-yIqw5z zGc!ET&{A;Q5SKAYEDKun#v`Fl(yW4omJi7Ev(ow4!zGtOa4iU0n@*BxK1GFZz@GtM ziLvuF@uWZl3f!&G7I7I#AxqE%w`2NJb@1?}d}odMh5qQGq9Qto&d-8*f|acQNLs9$ zr=ug^T_tq6yN`g%aD^PpDj0ss1(p{?Q}a&uf%lLfI`uC$>086$mc&n9$-*G z)7UnKZ@dSt8J3BTrfg5R)So5?=FZF5F@Qw$qZ+t?>6?(JmHrJh%?tsL6Zf1F-LMFC zMB0B6f$}KEu@6Cu2kZq`yWHulw1ZLH95BI!%#f0=g9pTs2@?2*{!~gsFFk_^0`d1L zLIWrMYF>O&BuB$lW??9pU|zuYcOatLJ31CXYO+lmu?#Bkrlrig+_oGH5%6<4)(nGL zFr!(UwOeO|BFvSsT?GK>A2{+XRV}y@pdkCP53UYMgPBn))oiv58~|~K4b^vc;eEsa zFNOG?FAh!D!82_H5UAuy$0bzST`njy`gC53&Bm0P;~^H_Kmgk@#fk-oW%74`(!FL4 zclW)+1k048ABrkhvlTCxXs^zIe*?v+zS4WZfRscLI@sPh|8j%?ej~Nf(tSgB&{kx% z1UB5a2vpPyeLj7U@ISy}02n*?=>($-(t zD;TU6TEn2lnp~a%0d(YBOAlI3U9k!7e1&NpNUOexPZD+{8*{P<|<>{Ay#Va_@`p=>1eW~@v0ffj8#kc z^uy<9u>Ja$iF$Z1c@@Xnt%A+fj!KTDtqM`oTXe0b4s6)3%wq^~AG6UG78(26_UR<3 z98k$X@<3CaF(Bmq>Hzob0b0wAuFTGY_MtbC5VRg6ex+^xks!s=6xHztQ8X&##Kp3> z*z=PyQQU%&_puRVwJ8nb$dc$Jzq92R_BsV?{H!dFBUh&~1Cl-6#O9{ZqI5eBix!Hc z3BK5wxDn_K@r*!OL^#dJR$7b(MsLU_j#rX0OCRL zsTcq8s7~=q_UO)gD;qX5+6O{BdWMIUQn`n)0IBmCYGBOw3BRdnJqFG^Qzeb5gq_a6 zJhDC-lRkT$c8~O9&@h^W%$T+42a!eWwp2`^1uD08LFt)wtuwE}DdRY!y^V~4buO;* z>Q*0HTY#WI1gpH6X$|ZUCAXrY;=+yCf07^p)5d=mcAz%qd~1?P)xS>s z0(_T7t>vr?d`3*m=702`_z*p9WbXq5&X$Ks@{5`3qHF#YR8#vPQ#Cq-z^DO$I;kR& zw0#b@P0Y?2cDHKzY;|_L@jv0aP)q;cBEWog{mbBxzkbBY zv=ek!cXu!m=~Zsj0Fmip&J(O`Fc=IPon{J(7LTW*o6@!N+)A+_nlvrgR7R=Cv!f5!0NY`D8du15XwwiY*Pv9H++j zeKWlAhi;dm{m8b#9kZq;rB|OCm0r)?7qXrbE@>>l!o6U1;(U*$L=DgLm0pMW`8f>g z{HR4{{|wLHoo-o(H|Y5|{3>)|;e#G`@y$|PF=pVZ@KE;woem?{z2zfLEajgKhg<8e z9dU=6xNSQ(L@ra^o?(f>(%GwB2~TGWu3MK{=M~j+UVq0{7&VRTa*s5hzgnn4YHH8I zO?9<)o;=b0?d7(QUuh1~!$AAB$4{ZX#-@D?-ZV4Eka5W)L@rsE|8hA-l?qLk5>kD; zD2nEyr9)54rxLDOqndkxIn-HyweQ3NB>>WIFl*y?*bmSm$VEvCtMdR-I}xemS@Oa< zU1@oHoz}7Bhqu_uQNeSD2nU#x}3@wD0;lq&V3Jnj1D78KPo-=PX$kN<{lCih{8 z|ym^r8aaO^m5iu_}7(uGuaH~jF>hME?ovU#>rMQlkx>lgoL+K6h0 z>2>Mg)ay%;H$RMjssbRE&Oz1?vzWuj(9p`m#utllkIE)1``QbQX9xGw`${J5>eyK> zSX>mYc{8_{g)^9SQOzV2sCS?m22`27`QMXToF?}b8j{b|g-aY9rxVaseTY5VQJQ1M zE*9L|R5Qe7KR(PE-Ue1Ukmk;H9Hs%XPC3+ir6-e444jL(B_mS)^YWs$imGau)Cuio z00WD<8n&gIB#lS=ZJx(a6KQot8~o(n5gD&Nh3<;?Q;bPm>Kb?OMI`Rf0qjL29NJCG z{JpEA53TC?!oPKG>SeUQ zFlXeMnP-t!iGwESh$kejTW!WPIDZ&6@Wf-9@l#O~`>H)pbGolBe5B{58c92x^B2$p zzu1TAZx450dXcS2TUO*xqC1}_k=%mlh4nH#jkgNxAUbCytkqVD4YeGwW6fu>cP<-I zacAjZO58W2ezALI`66Sxv{p~4@Hz$`;;s-P0My@~q9(%2LwkOiy$0eVmpZPVck|$a z-<3d!*bqgrOZGHPMS!{b*5c0cb{*K+_d8b$DOA{+e*xuO8nm<09?4C{ z`5ErrzN7S%xlZ(yN1>2g-R#=b3R7TyU1gky1jrK(d8$Vb{I*1s{)LEtyi*S!+C!M6 z7BwEBwH)Lw4kab+26sW{4vRo6L&uyV-3i%~0*2|!W=7cwG(T2UPacA(r!%c9XTY!T zyS}Jlk>`AJUM0dkILnl{Dpl1LY^DiCbH1A#vRcN%Bs25+xCA!&p*{O(Ow=Aa9KMKh zrO&|B4}28%&&OiaMOHFzl01!6YIVp}3(EHl+7O8JYEyPTNnLA|P;1HtaH{qFdB%ty zMAZ3>V+!8oS17m>Kti;@C3fEA;Yjg|@=&iw5cqYJm|ZMJXn@O7p3i55k+^Uz_=Ghr zt-s%hs0Nh^&4lF{cPP{~Gq}`@#5@thaqtS8c_y&k(r_=vbpnig>2*-`A^L-zr8mQc z&bX+oR4*pu4rwDb(XBm&m3nC}h`x*LN0vw%^5PDtr>LlTERBqH7n$6zei2M}af;aB z(V|8%#md&xhq7PqI_Z6>FK08TD%G_-KGnoHj7bFqi{*@yRZRKK`uj>A zgpCORe3q{C_HRa7=It2P>dlUDN&!u zHcLwU;ETAzF%VgvAVSpF{r6O~69ulcauK%>|# zsm4bMr%?b8VIDfk3Wg`)SiVxIzjWClY1G$ksyq>G^%@ADzQ0fJZUh^>^0XXyvE5g8pb?)Z#gH(h(682RRd!+QvKnzeVj*+|3f><*B^$ z{pw*lV5FMDz{XE=nsd!LHfy1NCDwV}EB94_XuAz^e&yD6qL8#U?DsL7qynDpl*1J8 zUF~KcbtQo(M!7_HpsPQ4$@ zHFJ^)HDDDS3cZ5nTy%5Y{jxJ1Zf_F`jya7JNwWAZ`JF7+7Hw^bp-Ww@@t_o-mA};e zUX65?6JzOYs+#?(q032R8_I-dfS(j=g)+7aJWmxC#igF&E64s_AVXY)BOeea-KGAX zJ`T${gFgzYaZ38i)*5ID9#FvO4L&-vQ5HZ(Fx&qw=fJ~fovPCc`WWdyZqucKZyv9+ z?KUwE`_t6(vk(g32TvXxoK61YhVaL)EQ0t+IzQq5pLYVTDEolZMx?lkEEbXQU#jlP zm*F4LL%+496n~Z5eY*NF%)=JRSNpP0d3}}tezKamY>i`%9BLf7i)8Kb6UYGKJUID* zgK9o>bj5UhbCI8l?K8zl*Fq)nla1UbahEGCoZ|@|_ddTQgoZ8eL7iY_7Zqj#pdTi` zt=D?h)!KR#6d=GH@;rDL0;p@!gyt3-?2VkgYVKhjq4p+8+ip5DI?RP;neOC>F9vl1 zO}B%7zV1b9Tvw7`Pw{nyw>GW6$jy+!<@-xMb*1HJ*S7~g4;1o>8KnEB#{mf3q9|A? zub2Nxoo#?GIsR5vv&)u#5&tb-ALU%RZoE>|4Bk#3gn5tx;rqkPHA|&f!MFVuZ5d!= zv8415bqhYQRktpiO66DgGcFjFsJ1YQiikSwtdQZReJ1sJU^iY>T%4G_0I(y&aZMjd zEL}?BO1|)|;F6+dK&JjuioMXY>%Uw!O$X00wFnL_=gv{;v8W+wE8d=mzZ-HvU!x^m z*6;hiOg&aVjz&U7%zt}j?Vrp^)8nD$C$nsmg3=kFts$Jdn_t_1w?de!=R(WLW1#MZ4}Cda2`cxTHBBFjB`?TP@nNP|QK zalN{Z&hsD@Ek3)(3oDcg(JuJc>bAdD?Hz+CuDMR7GVFgODB_kE&i?@sCBap5&c5TD z84%#-AH00SE)b>4k7j_Fzl&JPW<*m2{AY!Zki$`2q%>!}JlT%GH=R99+LmEm8L|on z*CjYM6U^FjtnvpVReN1rTr5kx2S6OcHgF*3a@ZEcvDXja;arE_AER}9J;~D&D22%I z!8NCr4QOG_hki~o3T*A0;&9EgZtvN?cMR4L@`z+Q{H8nb!$J$`r15-R_9pFx;r^%n zzQeC(Ac}-O-7VgI8MGbP#wcR!ON+*ON~R$)Q}XU<3FjV-2Gw7Cb@FSWVU@q%>eC(r zYGzM(*Q2d_m)|7-CMiJoc*1wAn;tWgf9JgLiz``)0DCuPW~efxu-l)TzoP(MjnMoc^sq>?Ctn@0_A`L#(9{<#i`qMh}6~G!378d&1 z9(Cw-cCEkE`I7nPm1D%9ORraIPZ9exr3j+v1GMhPfh3zA&hy8zpv};xQKA^w``qD} zU=^xJEYHhEqr`~_-koUBIA1-XW$%WalgB1YqM)_pLAS<&CtF<8D75QY-wZ(J{|}uh zC=6fHnf^VHq%Lb_*QM#Y*0B5#sa@z@DJ$D8-*E}zUe&U-<7SlsER84N(3dVdzxA^2!@RK(AJBgH=XNXrJJ{MR$}e`NIUJNi9cNHXKp+SrYR=ilfNKvqaG!L+l=Qb`kMIcw*+tWf%+iUu zwkzGm$xy0)`lD`U_rK1`sv_Mw}R7DIgAH!(SF_n9`0AM=fxbFs#BN^_l?S){qrF^~ypN72`R= z?jVbVMkR>zj~c z9^sNdjlWYK1~C@X>1DzJ{ILh0$i`oV0VZT-*4%cjI3}gP(O_k8*590m&4+%@IN4tH z>~sFA`|OPx#1ZP1_K>z@;j|==^1poj532;bRa{vGi!vFvd!vV){sAK>D18_-1K~y+Tb(4Qc zQ&AMhr=oK|+~#zfZf@#qLPR-QsF)Na%339bh@%xK{wg&8S!zmuMdWK!r&c7iKQb*g zOE3_{i82XM@dqKMO&W@c;lv-yA9Fun=j}aV`=c-C!M*3*&pG#=b1%v5af7+sE--xT z@p@1cJvclVHVt=mb-A3biHV7xo*t{!3Vtu@4MZ>=C%rx|7_4wO92*-OK*}!3$Yk=) z&Q4ibS$KGOLqo&D!ouF(9u~#F7&4J?*yDrGeRy^L@?&2qV%*)CC#CZZCFdpJS5z zN~J{p_O^Dy7c4rR4*RdDs37LS%F4@V>R*uK~KNAQ5tFpUuVp`%b9xtKgr$wn$5~yEk=h7Tb z$5lff4Po(G1;Tc5oGyW{OZ>2Cc=P@Jg?H&unrQ#~ISsLG+m=Wq1Wh8z(qujq&FsER zX^JZNqU^PN{cP#)|1~(WX1?2BOm3pFG%*;D8~$vkr>8SBGjU#eUJ9YJKjuK$l3%6D zjrq?ewQKg@r301RRsmbfVFvPnA#!tbffosc%a-N)Lk~DQ0i2(qVW;Ucs)lMr9bzD% z7Mxao5RbiOH+B$cheDwc3WcR*r2{{Pm4n5RO?0R~Y?$_v1teR`r6SBcV}1~ig@AVW zcd@dvQe9o0ot1sCZ8vR>U+Kx?=@J;47^pu}6U%Plfv0QH_z!MUMFK%dj*9>Q002ov JPDHLkV1m(m%`^Z2 literal 0 HcmV?d00001 diff --git a/windows/security/threat-protection/windows-defender-antivirus/images/MDATP_Icon_Bar.png b/windows/security/threat-protection/windows-defender-antivirus/images/MDATP_Icon_Bar.png new file mode 100644 index 0000000000000000000000000000000000000000..6280f2d7d2c03c92c1191ffdde17852957b49e19 GIT binary patch literal 5881 zcmVX0ssI2BXI>_00001b5ch_0Itp) z=>Px#1ZP1_K>z@;j|==^1poj532;bRa{vGi!vFvd!vV){sAK>D7LG|oK~#8N?V5R5 z)z!Mkt)8;9V^*3SD?8b#JDlg<2Je$;)^$!%K}7)v1P7cL8~_zWMMXeRnZ;QY2b4iY zKtNE`5JVKkfdEk%L`4LYdGvmMEZXgU2*PIfM_!iSXFtEae(!qM^nTxAV~6UR>UOlF z9e)i}S9hSvdsRYhUG1|*O(xThcC@1{sN!FZs-$JG7!PV{Yv5;bNpVDE#GXBSsw%5u zV`KO2+n14%L4WPD+QviL(T;Yg0M$t=MiN>@bS*D0&&kPwu6_QePsffOA3uIPYu2pS zUw_@o$|^ZIxv;QMqHet~^j3|xVt7+fmShUqTR^9>Ogml2 zrOOxp{6be(7xrGdeCb)86m`YiF9dtWDI{GREazTML`1~cv11jId5woJcjVDYFDMp>o9V zTzUC(lwmgMD~Z3a3eUdei!fmj5j_4D)V)vH(c z?%nH&`Frc!xigVgnY5z4_10T(d;0Y0?1bSh+zgWG8R^THFW`>E5X5-ujhC&WuF zA^t+bg}C@Qs%Sbhvof7GI3Eu=4#RQ1=i|=T3rS)ZFJ3$ub#k-!<`pYeJj#EBzmQF# z0#3)Awz09Xu&}^qty;Ni&6+jKZI&-tvSiWXMb=i<`H%C}GK&IeV_&;{cAHz8bL{Lw z(T{bCxdfeJV`FV?ZRgINJAdAMcXxM=2#N{;J~+$i1;tLS^vr z;Ly-eA}XIylt$1%CMr5gM@J_$Ej1$}BPb{+G$b^vz9Ght%*@Q2DK}BV1H!T?RKU4k z&S4p=Y**2k7tOP0&*qYFE^F7UB{^pnWoOTw(W88Gd{wmOZxqu3euw<@^z{1m>j&8~ zvoi(F?q=RSfBt-Wdb;=uNh~cb4Gat%939p>t%tW}W@hk;m4J$h3QsT3DO0D+oH3K7 z+O4yjHEWiIxdp^#4T|XiU&ABA$BY>>apJ_4D_63krOTEg%$)`X29{NnA>-iSFkrxd zx%1{ycPQ_al_XzJ*4Nh`IB4L${reRCY6R0U>FPDBr|M7j@btKM?_T{WN-ZZR$7{0} zv%_B5!c+izfu%EzW`6U{H=F?4sL@7^8r8plfA-#z_5-c|5BL|>CR4651aTxTDfc!H zF@{CBxw_TUP~P5t`)$%=jJV8D}8wSfZ%&YU@u z#5nO%;+)xY%+1ZSva&oqJhALSg9Z&AJb38Pp@?yATeoe^y`TH@&p!*&qDok~${^Gb z!Pr7cNr|hQE7pvIKr`_WTY3EW@zvz3+1c5OSxDHf-?+{i#MBHV6vUp7J#+R9#n^*~ z51Qj`ZFNdY%A`q?i02S;*|KHXx!K60FjStE=n61q;K&!&wQ92Te^) zSVw?mQcj6u#Mh*yr|}jIC&EwQWlqJM;;ZtEd?h#G2E9DJo)$l4Y<@vLE|U06(Qzx| z7UsKo^Jb2h(j(>96vaR!2~8}6ep+BqAU%q=Y5@v4d}%KlBe!ke#%U`ro@dTs+qP{` ziwq0Nwk$wwhe&H;W^(M7j+jVVTH2;fn<$_~_wtPqkGLTloDGeO&U38p50^;P!k4TO-JGD$BaNMxNBSr>}H9NH=Cgt4I`$bh1RYVDy&ZdB> z2GUkltzEko(h@Mojvb4^k)R$6KBhBKXXJ>H6kzk_&BLILO^iwT&YnHXKr%`4!v@mk z+#5A|6yd_&!5$6Ru52O|z>0cPWuJD2P0kf{?GQnbe)kmfJ<(*VJE0 zL`_XiuV25e&>+Cqgo_ELW~L^lCgkDemE~+rnY4Tg%MkL42Y8sBlReE~8k#A3(L**q z%ZTh})|4qz7A#m`Z*R}1hK7cPr3HC=<9SJsiL_)W=;SNZB~5_nq{o5@>({R*n@C7V z(A3f-;A7TwGAWLgyuj1b)5gYT{{e}#idCrv%)(w)u3G8n==fYt(nD^tapT6ela`fp zM=q`|)gBGQs7lR9#pD3R*GMsu|m zTx#P;3nbF&|ADkejvT?KVBBPnxEnGB%4~uX4faAOoXanJuP6Zss#3`i7>H}52SY~>^TH((0kRVKw#s%Dhq-T`{O2O%Psf~w z-sI$V>+BrYJ6c&;ksaVG_xkQFEtO&~2@8e`Jr*xsj0;FjOJx+LCb2y#I!gR4P()hU z^4bUtkKL_zS`R^}h7{+Z06nScsf!jZV&zCS&Ldh5alb~hjlTW%+htbEP{m>5`mwQ} znr=V-_+!6*{kY%8Yf}p_Cl=QFNLwTQo%ZIXPWD2@1xi_=fed(G~xcb&Vv zzo7@{;`DA$*MEHE{`ueoqc1*4LW4|aQ(z)x(!x(n2S-jnB~5^T0Q7?%&KsNwwiLPx z7c5M>l}5BTF*d9RtDP#zr}O~l3(!ZGX*Vl1&-GI#D= z>Qd4iWC(yLBw1CALIad`b9K|w((>8sBYwxGp<(X4xfBS${35vq(b6;0i6Nw#iqNf4 za{A2aNqUpCCuoz^Go$f*V}cu0WG-wMZ({Fg&yI3(bHY!A!|mYX!3^Xs#*ZJLm!B6N z9*#Gs#->wQbK8M7cFhUnlBg+IsxmEkrUzHWzM@Y>!?8BbPHr3$8bT`0jJPT`PWs^C z>48Nx)u5}pyZdwNZFPZFNlcUVHV-H#egTe*jO^UGb3IiXTJL{+7I!h;{ESU+@Betm z>AiQIyMwOI-M-z?*D%a@fbWp^H-2bvVtzq+kto(*2xj@crd_i}kd`blF)IdgsFLWctCIRVK;X- zLawv3GX*3OkJR+!$&&~W*{Cy5ojN5(VO5wZc0*N36+kX06!OXTiPA8Na}(?2lOh>O ziU`t3W#i@*{(>Zs5Sn}~IW3)&PQ%|RQgLjT>~zlTIXH-ic@JmInBleAi|r6yiNMG} z+QsIJ{|wRsw!@`!<^R(?`di}58@Xn51du;mX6Sv+Ux_sQz<=7) zao_%Z$Pi|QKLlsqTW)>bDaCF$$ylc3@e=@jk;vf;BK z()OL(hYTJ9v3W%kCdk4XhXrCa@0BR5Bxe9zmF*k>WyHf@fq@Bym7gUmOtTqB%yBej!Ga$n5J2X-S^N zFU)PcNCnV?O%nr26v?;IOecndO%rp*jUVTC(C=FEwY_`y5-^#a91-jM|$3b^Fe3K@SB`j)|0%lwdbhl7tRxYim<8Q+82NCH*h%8#itQ1qD&Pvl0%| z-`^i2Ce9FlNTI1(`_s_XM{=S|E^`uFc|zSx{s$WsoG^Zyw?LS@Re1pnWINW&t^4=uzj4z>_62ok%$%Vy zN@Kis{a>PA)UeX= zodZ~ZYHBL}48m|j;-^B4jD8?wXbiz><1fUcBr7`$8QByngYB1=mlCN+eQ_4bnxPFf zG`4#P~07#Zx~;K73|nDvnE8WD2cIMiV;p52f=XWC2or!mI&s`X}JJ% zv3?fjvdIOnAzKx|o2;^3HD&4)#v;rDsLY2A8%9PWyg5~+_ye-?DD^_DiUr`CNMR28 z9mM-!iVq$>z)tAV*48#PHI0jJ_zh15Fhxa01?5TK@A|G@y_!?Px;VGNg9Z;DHk|#w zunip|{r4VXzRGK8jJA>%urU_IVX-*$^!n(Nl++ac6LY(}d_+y##p%7TcJwtqVb;sN zH*}@G?Y^m}&T+%XWd)d`Ox1J2N#UrZ|At~?L#67y#e1{&W}2s`C&^oGZZ4Mu2M!-T zd@JJ?=^|+x^_7s38sb~LsRnIU*f4}p3;|?Qv;`!<_!LSwyo0jolckftk*;sswhaQ1 zz@LseO%}&-!5@}!=FAxa0&5HK51`IuNb?J0U|B`kxwGe@qN7N?8u}SgpR)mc0W~wF z!D0Wy%u9GDzu4`w`*`qiTouCTCpjnfZr#3>1M%?mz{<&Q8_&x|@N{8eVM$k#P%C>2 z*fnGbj|dl(MgxJJJc7{2R|L}2(^;ol{utgoSSscxw#FyVq6fEvi`3KAGd3|!PEMvr zEUdMFA!pB?<)*l0^y4>ie13j@K}Se&Ufj3~{1^A7+U!k%Rkew<67TE(httiQH}UbG zeDVodQ^<`7y)eT!9o~M|xf}U#=k;Bo>wC^0baH%W_#w@N2bYDnXgTiX-h*;0SFVJ* z&<`wMz8vp<5OL6|;G)~|qgt5}Kns@R|yE<2My6|ys7>YBP5 zIHNyRpLiP^8w-t9V~*Gwjc3IHwyLQ%Z&MK5X%lII^kZ`UW~ePqOiTv!A5i@0No4Ms zpY{#!;qq}8r}w)$cYDXF+j|>((6i_IA!#2i%Z(L~wyhLZ1RDC4B^$}e@CV^`ywu>j z$q3-BuC6YwoSfq2FaY(C7NCd|!EIAwUAc0lx>E8_NqN@|!shq(`p=#&y*~B&cdejF zXR=~R4(sY92iz*s3JBsU zSw-SiSyT0(IPY#zR#s8=-J;Cgr}rzWE5t7%DloPk?N9-bwzRCYps?U&GCB659?~j9 z(6R;&*EW[!IMPORTANT] +>Some information relates to prereleased product which may be substantially modified before it's commercially released. Microsoft makes no warranties, express or implied, with respect to the information provided here. + +This topic describes how to install and use Microsoft Defender ATP for Mac. It supports the preview program and the information here is subject to change. +Microsoft Defender ATP for Mac is not yet widely available, and this topic only applies to enterprise customers who have been accepted into the preview program. + +## Prerequisites +You should have beginner-level experience in macOS and BASH scripting. You must have administrative privileges on the machine. + +You should also have access to Windows Defender Security Center. + +### System Requirements +Microsoft Defender ATP for Mac system requirements: +- macOS version: 10.14 (Mojave), 10.13 (High Sierra), 10.12 (Sierra) +- Disk space during preview: 1GB +- The following URLs must be accessible from the Mac device: + - ```https://fresno.blob.core.windows.net/preview/macos/wdav.pkg ```
+ - ```https://cdn.x.cp.wd.microsoft.com/ ```
+ - ```https://eu-cdn.x.cp.wd.microsoft.com/ ```
+ - ```https://wu-cdn.x.cp.wd.microsoft.com/ ```
+ - ```https://x.cp.wd.microsoft.com/ ```
+ - ```https://asia.x.cp.wd.microsoft.com/ ```
+ - ```https://australia.x.cp.wd.microsoft.com/ ```
+ - ```https://europe.x.cp.wd.microsoft.com/ ```
+ - ```https://unitedkingdom.x.cp.wd.microsoft.com/ ```
+ - ```https://unitedstates.x.cp.wd.microsoft.com/ ```
+ +## Installation and configuration overview +There are various methods and deployment tools that you can use to install and configure Microsoft Defender ATP for Mac. +In general you'll need to take the following steps: +- [Register macOS devices](#register-macos-devices) with Windows Defender ATP +- Deploy Microsoft Defender ATP for Mac using any of the following deployment methods and tools: + - [Microsoft Intune based deployment](#microsoft-intune-based-deployment) + - [JAMF based deployment](#jamf-based-deployment) + - [Manual deployment](#manual-deployment) + +## Register macOS devices +To onboard your devices for Microsoft Defender ATP for Mac, you must register the devices with Windows Defender ATP and provide consent to submit telemetry. + +Use the following URL to give consent to submit telemetry: ```https://login.microsoftonline.com/common/oauth2/authorize?prompt=consent&client_id=f9eb614c-7a8e-422a-947d-2059e657d855&response_type=code&sso_reload=true``` + +> [!NOTE] +> You may get an error that a page on ```https://ppe.fresno.wd.microsoft.com``` cannot be opened. Disregard the error as it does not affect the onboarding process. + + +![App registration permission screenshot](images/MDATP_1_RegisterApp.png) + +## Deploy Microsoft Defender ATP for Mac +Use any of the supported methods to deploy Microsoft Defender ATP for Mac + +## Microsoft Intune based deployment + +### Download installation and onboarding packages +Download the installation and onboarding packages from Windows Defender Security Center: +1. In Windows Defender Security Center, go to **Settings > Machine Management > Onboarding**. +2. In Section 1 of the page, set operating system to **Linux, macOS, iOS or Android** and Deployment method to **Mobile Device Management / Microsoft Intune**. +3. In Section 2 of the page, click **Download installation package**. Save it as wdav.pkg to a local directory. +4. In Section 2 of the page, click **Download onboarding package**. Save it as WindowsDefenderATPOnboardingPackage.zip to the same directory. +5. Download IntuneAppUtil from https://docs.microsoft.com/en-us/intune/lob-apps-macos. + + ![Windows Defender Security Center screenshot](images/MDATP_2_IntuneAppUtil.png) + +6. From a command prompt, verify that you have the three files. + Extract the contents of the .zip files: + + ``` + mavel-macmini:Downloads test$ ls -l + total 721688 + -rw-r--r-- 1 test staff 269280 Mar 15 11:25 IntuneAppUtil + -rw-r--r-- 1 test staff 11821 Mar 15 09:23 WindowsDefenderATPOnboardingPackage.zip + -rw-r--r-- 1 test staff 354531845 Mar 13 08:57 wdav.pkg + mavel-macmini:Downloads test$ unzip WindowsDefenderATPOnboardingPackage.zip + Archive: WindowsDefenderATPOnboardingPackage.zip + warning: WindowsDefenderATPOnboardingPackage.zip appears to use backslashes as path separators + inflating: intune/kext.xml + inflating: intune/WindowsDefenderATPOnboarding.xml + inflating: jamf/WindowsDefenderATPOnboarding.plist + mavel-macmini:Downloads test$ + ``` +7. Make IntuneAppUtil an executable: + + ```mavel-macmini:Downloads test$ chmod +x IntuneAppUtil``` + +8. Create the wdav.pkg.intunemac package from wdav.pkg: + + ``` + mavel-macmini:Downloads test$ ./IntuneAppUtil -c wdav.pkg -o . -i "com.microsoft.wdav" -n "1.0.0" + Microsoft Intune Application Utility for Mac OS X + Version: 1.0.0.0 + Copyright 2018 Microsoft Corporation + + Creating intunemac file for /Users/test/Downloads/wdav.pkg + Composing the intunemac file output + Output written to ./wdav.pkg.intunemac. + + IntuneAppUtil successfully processed "wdav.pkg", + to deploy refer to the product documentation. + ``` + +### Client Machine Setup +You need no special provisioning for a Mac machine beyond a standard [Company Portal installation](https://docs.microsoft.com/en-us/intune-user-help/enroll-your-device-in-intune-macos-cp). + +1. You'll be asked to confirm device management. + +![Confirm device management screenshot](images/MDATP_3_ConfirmDeviceMgmt.png) + +2. Click the **Continue** button, and your Management Profile is displayed as verified: + +![Management profile screenshot](images/MDATP_4_ManagementProfile.png) + +You can enroll additional machines. Optionally, you can do it later, after system configuration and application package are provisioned. + +3. In Intune, open the **Manage > Devices > All devices** blade. You'll see your machine: + +![Add Devices screenshot](images/MDATP_5_allDevices.png) + +### Create System Configuration profiles +1. In Intune open the **Manage > Device configuration** blade. Click **Manage > Profiles > Create Profile**. +2. Choose a name for the profile. Change **Platform=macOS**, **Profile type=Custom**. Click **Configure**. +3. Open the configuration profile and upload intune/kext.xml. This file was created during the Generate settings step above. +4. Click **OK**. + + ![System configuration profiles screenshot](images/MDATP_6_SystemConfigurationProfiles.png) + +5. **Click Manage > Assignments**. In the **Include** tab, click **Assign to All Users & All devices**. +7. Repeat these steps with the second profile. +8. Create Profile one more time, give it a name, upload the intune/WindowsDefenderATPOnboarding.xml file. +9. Click **Manage > Assignments**. In the Include tab, click **Assign to All Users & All devices**. + +After Intune changes are propagated to the enrolled machines, you'll see it on the **Monitor > Device status** blade: + +![System configuration profiles screenshot](images/MDATP_7_DeviceStatusBlade.png) + +### Publish application + +1. In Intune, open the **Manage > Client apps** blade. Click **Apps > Add**. +2. Select **App type=Other/Line-of-business app**. +3. Select **file=wdav.pkg.intunemac**. Click **OK** to upload. +4. Click **Configure** and add the required information. +5. Use **macOS Sierra 10.12** as the minimum OS. Other settings can be any other value. + + ![Device status blade screenshot](images/MDATP_8_IntuneAppInfo.png) + +6. Click **OK** and **Add**. + + ![Device status blade screenshot](images/MDATP_9_IntunePkgInfo.png) + +7. It will take a while to upload the package. After it's done, click the name and then go to **Assignments** and **Add group**. + + ![Client apps screenshot](images/MDATP_10_ClientApps.png) + +8. Change **Assignment type=Required**. +9. Click **Included Groups**. Select M**ake this app required for all devices=Yes**. Click **Select group to include** and add a group that contains the users you want to target. Select **OK** and **Save**. + + ![Intune assignments info screenshot](images/MDATP_11_Assignments.png) + +10. After some time the application will be published to all enrolled machines. You'll see it on the **Monitor > Device** install status blade: + + ![Intune device status screenshot](images/MDATP_12_DeviceInstall.png) + +### Verify client machine state +1. After the configuration profiles are deployed to your machines, on your Mac device, open **System Preferences > Profiles**. + + ![System Preferences screenshot](images/MDATP_13_SystemPreferences.png) + ![System Preferences Profiles screenshot](images/MDATP_14_SystemPreferencesProfiles.png) + +2. Verify the three profiles listed there: + ![Profiles screenshot](images/MDATP_15_ManagementProfileConfig.png) + +3. The **Management Profile** should be the Intune system profile. +4. wdav-config and wdav-kext are system configuration profiles that we added in Intune. +5. You should also see the Microsoft Defender icon in the top-right corner: + + ![Microsoft Defender icon in status bar screenshot](images/MDATP_Icon_Bar.png) + +## JAMF based deployment +### Prerequsites +You need to be familiar with JAMF administration tasks, have a JAMF tenant, and know how to deploy packages. This includes a properly configured distribution point. JAMF has many alternative ways to complete the same task. These instructions provide you an example for most common processes. Your organization might use a different workflow. + + +### Download installation and onboarding packages +Download the installation and onboarding packages from Windows Defender Security Center: +1. In Windows Defender Security Center, go to **Settings > Machine Management > Onboarding**. +2. In Section 1 of the page, set operating system to **Linux, macOS, iOS or Android** and Deployment method to **Mobile Device Management / Microsoft Intune**. +3. In Section 2 of the page, click **Download installation package**. Save it as wdav.pkg to a local directory. +4. In Section 2 of the page, click **Download onboarding package**. Save it as WindowsDefenderATPOnboardingPackage.zip to the same directory. + + ![Windows Defender Security Center screenshot](images/MDATP_2_IntuneAppUtil.png) + +5. From a command prompt, verify that you have the two files. + Extract the contents of the .zip files: + + ``` + mavel-macmini:Downloads test$ ls -l + total 721160 + -rw-r--r-- 1 test staff 11821 Mar 15 09:23 WindowsDefenderATPOnboardingPackage.zip + -rw-r--r-- 1 test staff 354531845 Mar 13 08:57 wdav.pkg + mavel-macmini:Downloads test$ unzip WindowsDefenderATPOnboardingPackage.zip + Archive: WindowsDefenderATPOnboardingPackage.zip + warning: WindowsDefenderATPOnboardingPackage.zip appears to use backslashes as path separators + inflating: intune/kext.xml + inflating: intune/WindowsDefenderATPOnboarding.xml + inflating: jamf/WindowsDefenderATPOnboarding.plist + mavel-macmini:Downloads test$ + ``` + +### Create JAMF Policies +You need to create a configuration profile and a policy to start deploying Microsoft Defender ATP for Mac to client machines. + +#### Configuration Profile +The configuration profile contains one custom settings payload that includes: + +- Microsoft Defender ATP for Mac onboarding information +- Approved Kernel Extensions payload to enable the Microsoft kernel driver to run + + +1. Upload jamf/WindowsDefenderATPOnboarding.plist as the Property List File. + + >[!NOTE] + > You must use exactly "com.microsoft.wdav.atp" as the Preference Domain. + + ![Configuration profile screenshot](images/MDATP_16_PreferenceDomain.png) + +#### Approved Kernel Extension + +To approve the kernel extension: +1. In **Computers > Configuration Profiles** click **Options > Approved Kernel Extensions**. +2. Use **UBF8T346G9** for Team Id. + +![Approved kernel extensions screenshot](images/MDATP_17_approvedKernelExtensions.png) + +#### Configuration Profile's Scope +Configure the appropriate scope to specify the machines that will receive this configuration profile. + +In the Configuration Profiles, click **Scope > Targets**. Select the appropriate Target computers. + +![Configuration profile scope screenshot](images/MDATP_18_ConfigurationProfilesScope.png) + +Save the **Configuration Profile**. + +Use the **Logs** tab to monitor deployment status for each enrolled machine. + +#### Package +1. Create a package in **Settings > Computer Management > Packages**. + + ![Computer management packages screenshot](images/MDATP_19_MicrosoftDefenderWDAVPKG.png) + +2. Upload wdav.pkg to the Distribution Point. +3. In the **filename** field, enter the name of the package. For example, wdav.pkg. + +#### Policy +Your policy should contain a single package for Microsoft Defender. + +![Microsoft Defender packages screenshot](images/MDATP_20_MicrosoftDefenderPackages.png) + +Configure the appropriate scope to specify the computers that will receive this policy. + +After you save the Configuration Profile, you can use the Logs tab to monitor the deployment status for each enrolled machine. + +### Client machine setup +You need no special provisioning for a macOS computer beyond the standard JAMF Enrollment. + +> [!NOTE] +> After a computer is enrolled, it will show up in the Computers inventory (All Computers). + +1. Open the machine details, from **General** tab, and make sure that **User Approved MDM** is set to **Yes**. If it's set to No, the user needs to open **System Preferences > Profiles** and click **Approve** on the MDM Profile. + +![MDM approve button screenshot](images/MDATP_21_MDMProfile1.png) +![MDM screenshot](images/MDATP_22_MDMProfileApproved.png) + +After some time, the machine's User Approved MDM status will change to Yes. + +![MDM status screenshot](images/MDATP_23_MDMStatus.png) + +You can enroll additional machines now. Optionally, can do it after system configuration and application packages are provisioned. + + +### Deployment +Enrolled client machines periodically poll the JAMF Server and install new configuration profiles and policies as soon as they are detected. + +#### Status on server +You can monitor the deployment status in the Logs tab: + - **Pending** means that the deployment is scheduled but has not yet happened + - **Completed** means that the deployment succeeded and is no longer scheduled + +![Status on server screenshot](images/MDATP_24_StatusOnServer.png) + + +#### Status on client machine +After the Configuration Profile is deployed, you'll see the profile on the machine in the **System Preferences > Profiles >** Name of Configuration Profile. + +![Status on client screenshot](images/MDATP_25_StatusOnClient.png) + +After the policy is applied, you'll see the Microsoft Defender icon in the macOS status bar in the top-right corner. + +![Microsoft Defender icon in status bar screenshot](images/MDATP_Icon_Bar.png) + +You can monitor policy installation on a machine by following the JAMF's log file: + +``` +mavel-mojave:~ testuser$ tail -f /var/log/jamf.log +Thu Feb 21 11:11:41 mavel-mojave jamf[7960]: No patch policies were found. +Thu Feb 21 11:16:41 mavel-mojave jamf[8051]: Checking for policies triggered by "recurring check-in" for user "testuser"... +Thu Feb 21 11:16:43 mavel-mojave jamf[8051]: Executing Policy WDAV +Thu Feb 21 11:17:02 mavel-mojave jamf[8051]: Installing Microsoft Defender... +Thu Feb 21 11:17:23 mavel-mojave jamf[8051]: Successfully installed Microsoft Defender. +Thu Feb 21 11:17:23 mavel-mojave jamf[8051]: Checking for patches... +Thu Feb 21 11:17:23 mavel-mojave jamf[8051]: No patch policies were found. +``` + +You can also check the onboarding status: +``` +mavel-mojave:~ testuser$ /Library/Extensions/wdavkext.kext/Contents/Resources/Tools/wdavconfig.py +uuid : 69EDB575-22E1-53E1-83B8-2E1AB1E410A6 +orgid : 79109c9d-83bb-4f3e-9152-8d75ee59ae22 +orgid managed : 79109c9d-83bb-4f3e-9152-8d75ee59ae22 +orgid effective : 79109c9d-83bb-4f3e-9152-8d75ee59ae22 +``` + +- **orgid/orgid managed**: This is the Microsoft Defender ATP org id specified in the configuration profile. If this value is blank, then the Configuration Profile was not properly set. + +- **orgid effective**: This is the Microsoft Defender ATP org id currently in use. If it does not match the value in the Configuration Profile, then the configuration has not been refreshed. + +### Uninstalling Microsoft Defender ATP for Mac +#### Uninstalling with a script + +Create a script in **Settings > Computer Management > Scripts**. + +![Microsoft Defender uninstall screenshot](images/MDATP_26_Uninstall.png) + +For example, this script removes Microsoft Defender ATP from the /Applications directory: + +``` +echo "Is WDAV installed?" +ls -ld '/Applications/Microsoft Defender.app' 2>/dev/null + +echo "Uninstalling WDAV..." +rm -rf '/Applications/Microsoft Defender.app' + +echo "Is WDAV still installed?" +ls -ld '/Applications/Microsoft Defender.app' 2>/dev/null + +echo "Done!" +``` + +#### Uninstalling with a policy +Your policy should contain a single script: + +![Microsoft Defender uninstall script screenshot](images/MDATP_27_UninstallScript.png) + +Configure the appropriate scope in the **Scope** tab to specify the machines that will receive this policy. + +### Check onboarding status + +You can check that machines are correctly onboarded by creating a script. For example, the following script checks that enrolled machines are onboarded: + +``` +/Library/Extensions/wdavkext.kext/Contents/Resources/Tools/wdavconfig.py | grep -E 'orgid effective : [-a-zA-Z0-9]+' +``` + +This script returns 0 if Microsoft Defender ATP is registered with the Windows Defender ATP service, and another exit code if it is not installed or registered. + +## Manual deployment + +### Download installation and onboarding packages +Download the installation and onboarding packages from Windows Defender Security Center: +1. In Windows Defender Security Center, go to **Settings > Machine Management > Onboarding**. +2. In Section 1 of the page, set operating system to **Linux, macOS, iOS or Android** and Deployment method to **Mobile Device Management / Microsoft Intune**. +3. In Section 2 of the page, click **Download installation package**. Save it as wdav.pkg to a local directory. +4. In Section 2 of the page, click **Download onboarding package**. Save it as WindowsDefenderATPOnboardingPackage.zip to the same directory. + + ![Windows Defender Security Center screenshot](images/MDATP_2_IntuneAppUtil.png) + +5. From a command prompt, verify that you have the two files. + Extract the contents of the .zip files: + + ``` + mavel-macmini:Downloads test$ ls -l + total 721152 + -rw-r--r-- 1 test staff 6185 Mar 15 10:45 WindowsDefenderATPOnboardingPackage.zip + -rw-r--r-- 1 test staff 354531845 Mar 13 08:57 wdav.pkg + mavel-macmini:Downloads test$ unzip WindowsDefenderATPOnboardingPackage.zip + Archive: WindowsDefenderATPOnboardingPackage.zip + inflating: WindowsDefenderATPOnboarding.py + ``` + +### Application installation +To complete this process, you must have admin privileges on the machine. + +1. Download the wdav.pkg from: https://fresno.blob.core.windows.net/preview/macos/wdav.pkg. + +2. Navigate to the downloaded wdav.pkg in Finder and open it. + + ![App install screenshot](images/MDATP_28_AppInstall.png) + +3. Click **Continue**, agree with the License terms, and enter the password when prompted. + + ![App install screenshot](images/MDATP_29_AppInstallLogin.png) + + > [!IMPORTANT] + > You will be prompted to allow a driver from Microsoft to be installed (either "System Exception Blocked" or "Installation is on hold" or both. The driver must be allowed to be installed. + + ![App install screenshot](images/MDATP_30_SystemExtension.png) + +4. Click **Open Security Preferences** or **Open System Preferences > Security & Privacy**. Click **Allow**: + + ![Security and privacy window screenshot](images/MDATP_31_SecurityPrivacySettings.png) + + +The installation will proceed. + +> [!NOTE] +> If you don't click **Allow**, the installation will fail after 5 minutes. You can restart it again at any time. + +### Client configuration +1. Copy wdav.pkg and WindowsDefenderATPOnboarding.py to the machine where you deploy Microsoft Defender ATP for Mac. + + The client machine is not associated with orgId. Note that the orgid is blank. + + ``` + mavel-mojave:wdavconfig testuser$ /Library/Extensions/wdavkext.kext/Contents/Resources/Tools/wdavconfig.py + uuid : 69EDB575-22E1-53E1-83B8-2E1AB1E410A6 + orgid : + ``` +2. Install the configuration file on a client machine: + + ``` + mavel-mojave:wdavconfig testuser$ python WindowsDefenderATPOnboarding.py + Generating /Library/Application Support/Microsoft/Defender/com.microsoft.wdav.atp.plist ... (You may be required to enter sudos password) + ``` + +3. Verify that the machine is now associated with orgId: + + ``` + mavel-mojave:wdavconfig testuser$ /Library/Extensions/wdavkext.kext/Contents/Resources/Tools/wdavconfig.py + uuid : 69EDB575-22E1-53E1-83B8-2E1AB1E410A6 + orgid : E6875323-A6C0-4C60-87AD-114BBE7439B8 + ``` +After installation, you'll see the Microsoft Defender icon in the macOS status bar in the top-right corner. + + ![Microsoft Defender icon in status bar screenshot](images/MDATP_Icon_Bar.png) + +## Uninstallation +### Removing Microsoft Defender ATP from Mac devices +To remove Microsoft Defender ATP from your macOS devices: + +- Open **Finder > Applications**. Right click on **Microsoft Defender ATP > Move to Trash**. + +Or, from a command line: + +- ```sudo rm -rf '/Applications/Microsoft Defender ATP'``` + +## Known issues +- Microsoft Defender ATP is not yet optimized for performance or disk space. +- Centrally managed uninstall using Intune/JAMF is still in development. To uninstall (as a workaround an uninstall action has to be completed on each client device). +- Geo preference for telemetry traffic is not yet supported. Cloud traffic (definition updates) routed to US only. +- Full Windows Defender ATP integration is not yet available +- Not localized yet +- There might be accessibility issues + +### Installation issues +If an error occurs during installation, the installer will only report a general failure. The detailed log is saved to /Library/Logs/Microsoft/wdav.install.log. If you experience issues during installation, send us this file so we can help diagnose the cause. You can also contact xplatpreviewsupport@microsoft.com for support on onboarding issues. + + +For feedback on the preview, contact: mdatpfeedback@microsoft.com. + + + From ad191329006ff8e6fd1c5a568c4de32170994864 Mon Sep 17 00:00:00 2001 From: Justin Hall Date: Thu, 21 Mar 2019 14:41:16 -0700 Subject: [PATCH 087/724] added IME support --- .../faq-wd-app-guard.md | 10 ++++++++-- 1 file changed, 8 insertions(+), 2 deletions(-) diff --git a/windows/security/threat-protection/windows-defender-application-guard/faq-wd-app-guard.md b/windows/security/threat-protection/windows-defender-application-guard/faq-wd-app-guard.md index 0fe3b780be..92683a153d 100644 --- a/windows/security/threat-protection/windows-defender-application-guard/faq-wd-app-guard.md +++ b/windows/security/threat-protection/windows-defender-application-guard/faq-wd-app-guard.md @@ -6,9 +6,9 @@ ms.mktglfcycl: manage ms.sitesec: library ms.pagetype: security ms.localizationpriority: medium -author: justinha +author: qrscharmed ms.author: justinha -ms.date: 11/07/2017 +ms.date: 03/21/2019 --- # Frequently asked questions - Windows Defender Application Guard @@ -58,6 +58,12 @@ Answering frequently asked questions about Windows Defender Application Guard (A |**A:** |WDAG requires proxies to have a symbolic name, not just an IP address. IP-Literal proxy settings such as “192.168.1.4:81” can be annotated as “itproxy:81” or using a record such as “P19216810010” for a proxy with an IP address of 192.168.100.10. This applies to Windows 10 Enterprise edition, 1709 or higher.|
+| | | +|---|----------------------------| +|**Q:** |Which input Method Editors (IME) in 19H1 are not supported?| +|**A:** |The following Input Method Editors (IME) that are introduced in the Windows 10 May 2019 Update are currently not supported in WDAG.
Vietnam Telex keyboard
Vietnam number key-based keyboard
Hindi phonetic keyboard
Bangla phonetic keyboard
Marathi phonetic keyboard
Telugu phonetic keyboard
Tamil phonetic keyboard
Kannada phonetic keyboard
Malayalam phonetic keyboard
Gujarati phonetic keyboard
Odia phonetic keyboard
Punjabi phonetic keyboard| +
+ | | | |---|----------------------------| |**Q:** |I enabled the hardware acceleration policy on my Windows 10 Enterprise, version 1803 deployment. Why are my users still only getting CPU rendering?| From 1108b06dd4838f30b595649fe8181b4ef13325a3 Mon Sep 17 00:00:00 2001 From: Justin Hall Date: Thu, 21 Mar 2019 14:41:29 -0700 Subject: [PATCH 088/724] added IME support --- .../windows-defender-application-guard/faq-wd-app-guard.md | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/windows/security/threat-protection/windows-defender-application-guard/faq-wd-app-guard.md b/windows/security/threat-protection/windows-defender-application-guard/faq-wd-app-guard.md index 92683a153d..402f197bcd 100644 --- a/windows/security/threat-protection/windows-defender-application-guard/faq-wd-app-guard.md +++ b/windows/security/threat-protection/windows-defender-application-guard/faq-wd-app-guard.md @@ -60,7 +60,7 @@ Answering frequently asked questions about Windows Defender Application Guard (A | | | |---|----------------------------| -|**Q:** |Which input Method Editors (IME) in 19H1 are not supported?| +|**Q:** |Which Input Method Editors (IME) in 19H1 are not supported?| |**A:** |The following Input Method Editors (IME) that are introduced in the Windows 10 May 2019 Update are currently not supported in WDAG.
Vietnam Telex keyboard
Vietnam number key-based keyboard
Hindi phonetic keyboard
Bangla phonetic keyboard
Marathi phonetic keyboard
Telugu phonetic keyboard
Tamil phonetic keyboard
Kannada phonetic keyboard
Malayalam phonetic keyboard
Gujarati phonetic keyboard
Odia phonetic keyboard
Punjabi phonetic keyboard|
From 591d48f5786610a44662272cbabc1770fc444e74 Mon Sep 17 00:00:00 2001 From: Justin Hall Date: Thu, 21 Mar 2019 14:42:09 -0700 Subject: [PATCH 089/724] edits --- .../windows-defender-application-guard/faq-wd-app-guard.md | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/windows/security/threat-protection/windows-defender-application-guard/faq-wd-app-guard.md b/windows/security/threat-protection/windows-defender-application-guard/faq-wd-app-guard.md index 402f197bcd..875de5e08e 100644 --- a/windows/security/threat-protection/windows-defender-application-guard/faq-wd-app-guard.md +++ b/windows/security/threat-protection/windows-defender-application-guard/faq-wd-app-guard.md @@ -61,7 +61,7 @@ Answering frequently asked questions about Windows Defender Application Guard (A | | | |---|----------------------------| |**Q:** |Which Input Method Editors (IME) in 19H1 are not supported?| -|**A:** |The following Input Method Editors (IME) that are introduced in the Windows 10 May 2019 Update are currently not supported in WDAG.
Vietnam Telex keyboard
Vietnam number key-based keyboard
Hindi phonetic keyboard
Bangla phonetic keyboard
Marathi phonetic keyboard
Telugu phonetic keyboard
Tamil phonetic keyboard
Kannada phonetic keyboard
Malayalam phonetic keyboard
Gujarati phonetic keyboard
Odia phonetic keyboard
Punjabi phonetic keyboard| +|**A:** |The following Input Method Editors (IME) introduced in Windows 10, version 1903 are currently not supported in WDAG.
Vietnam Telex keyboard
Vietnam number key-based keyboard
Hindi phonetic keyboard
Bangla phonetic keyboard
Marathi phonetic keyboard
Telugu phonetic keyboard
Tamil phonetic keyboard
Kannada phonetic keyboard
Malayalam phonetic keyboard
Gujarati phonetic keyboard
Odia phonetic keyboard
Punjabi phonetic keyboard|
| | | From 5c3f4f8881106b8565a0a047e0f87be09eea16bc Mon Sep 17 00:00:00 2001 From: Jeanie Decker Date: Mon, 25 Mar 2019 07:49:34 -0700 Subject: [PATCH 090/724] add ms.date --- windows/configuration/wcd/wcd-cellular.md | 2 +- windows/configuration/wcd/wcd-changes.md | 2 +- windows/configuration/wcd/wcd-deviceupdatecenter.md | 2 +- windows/configuration/wcd/wcd-oobe.md | 2 +- windows/configuration/wcd/wcd-policies.md | 2 +- windows/configuration/wcd/wcd-privacy.md | 2 +- windows/configuration/wcd/wcd-time.md | 2 +- 7 files changed, 7 insertions(+), 7 deletions(-) diff --git a/windows/configuration/wcd/wcd-cellular.md b/windows/configuration/wcd/wcd-cellular.md index 1019d87dd8..9c292c9e3d 100644 --- a/windows/configuration/wcd/wcd-cellular.md +++ b/windows/configuration/wcd/wcd-cellular.md @@ -8,7 +8,7 @@ author: jdeckerMS ms.localizationpriority: medium ms.author: jdecker ms.topic: article -ms.date: 10/02/2018 +ms.date: 05/21/2019 --- # Cellular (Windows Configuration Designer reference) diff --git a/windows/configuration/wcd/wcd-changes.md b/windows/configuration/wcd/wcd-changes.md index 785a38cf30..571f137000 100644 --- a/windows/configuration/wcd/wcd-changes.md +++ b/windows/configuration/wcd/wcd-changes.md @@ -8,7 +8,7 @@ author: jdeckerMS ms.localizationpriority: medium ms.author: jdecker ms.topic: article -ms.date: 10/02/2018 +ms.date: 05/21/2019 --- # Changes to settings in Windows Configuration Designer diff --git a/windows/configuration/wcd/wcd-deviceupdatecenter.md b/windows/configuration/wcd/wcd-deviceupdatecenter.md index 7417a12104..09f2af4d12 100644 --- a/windows/configuration/wcd/wcd-deviceupdatecenter.md +++ b/windows/configuration/wcd/wcd-deviceupdatecenter.md @@ -8,7 +8,7 @@ author: jdeckerMS ms.localizationpriority: medium ms.author: jdecker ms.topic: article -ms.date: 09/06/2017 +ms.date: 05/21/2019 --- # DeviceUpdateCenter (Windows Configuration Designer reference) diff --git a/windows/configuration/wcd/wcd-oobe.md b/windows/configuration/wcd/wcd-oobe.md index 6bf1ca1d44..31af250386 100644 --- a/windows/configuration/wcd/wcd-oobe.md +++ b/windows/configuration/wcd/wcd-oobe.md @@ -8,7 +8,7 @@ author: jdeckerMS ms.localizationpriority: medium ms.author: jdecker ms.topic: article -ms.date: 09/06/2017 +ms.date: 05/21/2019 --- # OOBE (Windows Configuration Designer reference) diff --git a/windows/configuration/wcd/wcd-policies.md b/windows/configuration/wcd/wcd-policies.md index 19bc04a0f5..a2098f93b8 100644 --- a/windows/configuration/wcd/wcd-policies.md +++ b/windows/configuration/wcd/wcd-policies.md @@ -8,7 +8,7 @@ author: jdeckerMS ms.localizationpriority: medium ms.author: jdecker ms.topic: article -ms.date: 10/02/2018 +ms.date: 05/21/2019 --- # Policies (Windows Configuration Designer reference) diff --git a/windows/configuration/wcd/wcd-privacy.md b/windows/configuration/wcd/wcd-privacy.md index 1451f639d8..ad2a699688 100644 --- a/windows/configuration/wcd/wcd-privacy.md +++ b/windows/configuration/wcd/wcd-privacy.md @@ -8,7 +8,7 @@ author: jdeckerMS ms.localizationpriority: medium ms.author: jdecker ms.topic: article -ms.date: 09/06/2017 +ms.date: 05/21/2019 --- # Privacy (Windows Configuration Designer reference) diff --git a/windows/configuration/wcd/wcd-time.md b/windows/configuration/wcd/wcd-time.md index 57086da3c3..b81a6d8f1c 100644 --- a/windows/configuration/wcd/wcd-time.md +++ b/windows/configuration/wcd/wcd-time.md @@ -8,7 +8,7 @@ author: jdeckerMS ms.localizationpriority: medium ms.author: jdecker ms.topic: article -ms.date: 09/06/2017 +ms.date: 05/21/2019 --- # Time From 970f6486da29a20e6e29ee6da832bf36d7e7a744 Mon Sep 17 00:00:00 2001 From: Brian Lich Date: Tue, 26 Mar 2019 09:02:03 -0700 Subject: [PATCH 091/724] new build 3/26/2019 9:02 AM --- .../basic-level-windows-diagnostic-events-and-fields-1903.md | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/windows/privacy/basic-level-windows-diagnostic-events-and-fields-1903.md b/windows/privacy/basic-level-windows-diagnostic-events-and-fields-1903.md index 9e412991e5..a7a06f32ec 100644 --- a/windows/privacy/basic-level-windows-diagnostic-events-and-fields-1903.md +++ b/windows/privacy/basic-level-windows-diagnostic-events-and-fields-1903.md @@ -13,7 +13,7 @@ manager: dansimp ms.collection: M365-security-compliance ms.topic: article audience: ITPro -ms.date: 03/21/2019 +ms.date: 03/26/2019 --- From 3e550647faf490d4c9490766f145808fea01430b Mon Sep 17 00:00:00 2001 From: Brian Lich Date: Tue, 26 Mar 2019 09:02:11 -0700 Subject: [PATCH 092/724] new build 3/26/2019 9:02 AM --- ...ndows-diagnostic-events-and-fields-1703.md | 2 +- ...ndows-diagnostic-events-and-fields-1709.md | 37 +- ...ndows-diagnostic-events-and-fields-1803.md | 2 +- ...ndows-diagnostic-events-and-fields-1809.md | 15670 ++++++++-------- 4 files changed, 7949 insertions(+), 7762 deletions(-) diff --git a/windows/privacy/basic-level-windows-diagnostic-events-and-fields-1703.md b/windows/privacy/basic-level-windows-diagnostic-events-and-fields-1703.md index 8bd5d541d3..ae09444cb1 100644 --- a/windows/privacy/basic-level-windows-diagnostic-events-and-fields-1703.md +++ b/windows/privacy/basic-level-windows-diagnostic-events-and-fields-1703.md @@ -13,7 +13,7 @@ manager: dansimp ms.collection: M365-security-compliance ms.topic: article audience: ITPro -ms.date: 03/21/2019 +ms.date: 03/26/2019 --- diff --git a/windows/privacy/basic-level-windows-diagnostic-events-and-fields-1709.md b/windows/privacy/basic-level-windows-diagnostic-events-and-fields-1709.md index d36fddc9a7..494bb5b1d5 100644 --- a/windows/privacy/basic-level-windows-diagnostic-events-and-fields-1709.md +++ b/windows/privacy/basic-level-windows-diagnostic-events-and-fields-1709.md @@ -13,7 +13,7 @@ manager: dansimp ms.collection: M365-security-compliance ms.topic: article audience: ITPro -ms.date: 03/21/2019 +ms.date: 03/26/2019 --- @@ -1912,6 +1912,41 @@ The following fields are available: - **pendingDecision** Indicates the cause of reboot, if applicable. +### CbsServicingProvider.CbsSelectableUpdateChangeV2 + +This event reports the results of enabling or disabling optional Windows Content to keep Windows up to date. + +The following fields are available: + +- **applicableUpdateState** Indicates the highest applicable state of the optional content. +- **buildVersion** The build version of the package being installed. +- **clientId** The name of the application requesting the optional content change. +- **downloadSource** Indicates if optional content was obtained from Windows Update or a locally accessible file. +- **downloadtimeInSeconds** Indicates if optional content was obtained from Windows Update or a locally accessible file. +- **executionID** A unique ID used to identify events associated with a single servicing operation and not reused for future operations. +- **executionSequence** A counter that tracks the number of servicing operations attempted on the device. +- **firstMergedExecutionSequence** The value of a pervious executionSequence counter that is being merged with the current operation, if applicable. +- **firstMergedID** A unique ID of a pervious servicing operation that is being merged with this operation, if applicable. +- **hrDownloadResult** The return code of the download operation. +- **hrStatusUpdate** The return code of the servicing operation. +- **identityHash** A pseudonymized (hashed) identifier for the Windows Package that is being installed or uninstalled. +- **initiatedOffline** Indicates whether the operation was performed against an offline Windows image file or a running instance of Windows. +- **majorVersion** The major version of the package being installed. +- **minorVersion** The minor version of the package being installed. +- **packageArchitecture** The architecture of the package being installed. +- **packageLanguage** The language of the package being installed. +- **packageName** The name of the package being installed. +- **rebootRequired** Indicates whether a reboot is required to complete the operation. +- **revisionVersion** The revision number of the package being installed. +- **stackBuild** The build number of the servicing stack binary performing the installation. +- **stackMajorVersion** The major version number of the servicing stack binary performing the installation. +- **stackMinorVersion** The minor version number of the servicing stack binary performing the installation. +- **stackRevision** The revision number of the servicing stack binary performing the installation. +- **updateName** The name of the optional Windows Operation System feature being enabled or disabled. +- **updateStartState** A value indicating the state of the optional content before the operation started. +- **updateTargetState** A value indicating the desired state of the optional content. + + ## Diagnostic data events ### TelClientSynthetic.AuthorizationInfo_RuntimeTransition diff --git a/windows/privacy/basic-level-windows-diagnostic-events-and-fields-1803.md b/windows/privacy/basic-level-windows-diagnostic-events-and-fields-1803.md index cdb533230d..38b1e69785 100644 --- a/windows/privacy/basic-level-windows-diagnostic-events-and-fields-1803.md +++ b/windows/privacy/basic-level-windows-diagnostic-events-and-fields-1803.md @@ -13,7 +13,7 @@ manager: dansimp ms.collection: M365-security-compliance ms.topic: article audience: ITPro -ms.date: 03/21/2019 +ms.date: 03/26/2019 --- diff --git a/windows/privacy/basic-level-windows-diagnostic-events-and-fields-1809.md b/windows/privacy/basic-level-windows-diagnostic-events-and-fields-1809.md index 3f57313fe0..1fdf4dd009 100644 --- a/windows/privacy/basic-level-windows-diagnostic-events-and-fields-1809.md +++ b/windows/privacy/basic-level-windows-diagnostic-events-and-fields-1809.md @@ -1,7759 +1,7911 @@ ---- -description: Use this article to learn more about what Windows diagnostic data is gathered at the basic level. -title: Windows 10, version 1809 basic diagnostic events and fields (Windows 10) -keywords: privacy, telemetry -ms.prod: w10 -ms.mktglfcycl: manage -ms.sitesec: library -ms.pagetype: security -localizationpriority: high -author: brianlic-msft -ms.author: brianlic -manager: dansimp -ms.collection: M365-security-compliance -ms.topic: article -audience: ITPro -ms.date: 03/21/2019 ---- - - -# Windows 10, version 1809 basic level Windows diagnostic events and fields - - **Applies to** - -- Windows 10, version 1809 - - -The Basic level gathers a limited set of information that is critical for understanding the device and its configuration including: basic device information, quality-related information, app compatibility, and Microsoft Store. When the level is set to Basic, it also includes the Security level information. - -The Basic level helps to identify problems that can occur on a particular device hardware or software configuration. For example, it can help determine if crashes are more frequent on devices with a specific amount of memory or that are running a particular driver version. This helps Microsoft fix operating system or app problems. - -Use this article to learn about diagnostic events, grouped by event area, and the fields within each event. A brief description is provided for each field. Every event generated includes common data, which collects device data. - -You can learn more about Windows functional and diagnostic data through these articles: - - -- [Windows 10, version 1803 basic diagnostic events and fields](basic-level-windows-diagnostic-events-and-fields-1803.md) -- [Windows 10, version 1709 basic diagnostic events and fields](basic-level-windows-diagnostic-events-and-fields-1709.md) -- [Windows 10, version 1703 basic diagnostic events and fields](basic-level-windows-diagnostic-events-and-fields-1703.md) -- [Manage connections from Windows operating system components to Microsoft services](manage-connections-from-windows-operating-system-components-to-microsoft-services.md) -- [Configure Windows diagnostic data in your organization](configure-windows-diagnostic-data-in-your-organization.md) - - - - -## Account trace logging provider events - -### Microsoft.Windows.Mitigation.AccountTraceLoggingProvider.General - -This event provides information about application properties to indicate the successful execution. - -The following fields are available: - -- **AppMode** Indicates the mode the app is being currently run around privileges. -- **ExitCode** Indicates the exit code of the app. -- **Help** Indicates if the app needs to be launched in the help mode. -- **ParseError** Indicates if there was a parse error during the execution. -- **RightsAcquired** Indicates if the right privileges were acquired for successful execution. -- **RightsWereEnabled** Indicates if the right privileges were enabled for successful execution. -- **TestMode** Indicates whether the app is being run in test mode. - - -### Microsoft.Windows.Mitigation.AccountTraceLoggingProvider.GetCount - -This event provides information about the properties of user accounts in the Administrator group. - -The following fields are available: - -- **Internal** Indicates the internal property associated with the count group. -- **LastError** The error code (if applicable) for the cause of the failure to get the count of the user account. -- **Result** The HResult error. - - -## AppLocker events - -### Microsoft.Windows.Security.AppLockerCSP.ActivityStoppedAutomatically - -Automatically closed activity for start/stop operations that aren't explicitly closed. - - - -### Microsoft.Windows.Security.AppLockerCSP.AddParams - -Parameters passed to Add function of the AppLockerCSP Node. - -The following fields are available: - -- **child** The child URI of the node to add. -- **uri** URI of the node relative to %SYSTEM32%/AppLocker. - - -### Microsoft.Windows.Security.AppLockerCSP.AddStart - -Start of "Add" Operation for the AppLockerCSP Node. - - - -### Microsoft.Windows.Security.AppLockerCSP.AddStop - -End of "Add" Operation for AppLockerCSP Node. - -The following fields are available: - -- **hr** The HRESULT returned by Add function in AppLockerCSP. - - -### Microsoft.Windows.Security.AppLockerCSP.CAppLockerCSP::Rollback - -Result of the 'Rollback' operation in AppLockerCSP. - -The following fields are available: - -- **oldId** Previous id for the CSP transaction. -- **txId** Current id for the CSP transaction. - - -### Microsoft.Windows.Security.AppLockerCSP.ClearParams - -Parameters passed to the "Clear" operation for AppLockerCSP. - -The following fields are available: - -- **uri** The URI relative to the %SYSTEM32%\AppLocker folder. - - -### Microsoft.Windows.Security.AppLockerCSP.ClearStart - -Start of the "Clear" operation for the AppLockerCSP Node. - - - -### Microsoft.Windows.Security.AppLockerCSP.ClearStop - -End of the "Clear" operation for the AppLockerCSP node. - -The following fields are available: - -- **hr** HRESULT reported at the end of the 'Clear' function. - - -### Microsoft.Windows.Security.AppLockerCSP.ConfigManagerNotificationStart - -Start of the "ConfigManagerNotification" operation for AppLockerCSP. - -The following fields are available: - -- **NotifyState** State sent by ConfigManager to AppLockerCSP. - - -### Microsoft.Windows.Security.AppLockerCSP.ConfigManagerNotificationStop - -End of the "ConfigManagerNotification" operation for AppLockerCSP. - -The following fields are available: - -- **hr** HRESULT returned by the ConfigManagerNotification function in AppLockerCSP. - - -### Microsoft.Windows.Security.AppLockerCSP.CreateNodeInstanceParams - -Parameters passed to the CreateNodeInstance function of the AppLockerCSP node. - -The following fields are available: - -- **NodeId** NodeId passed to CreateNodeInstance. -- **nodeOps** NodeOperations parameter passed to CreateNodeInstance. -- **uri** URI passed to CreateNodeInstance, relative to %SYSTEM32%\AppLocker. - - -### Microsoft.Windows.Security.AppLockerCSP.CreateNodeInstanceStart - -Start of the "CreateNodeInstance" operation for the AppLockerCSP node. - - - -### Microsoft.Windows.Security.AppLockerCSP.CreateNodeInstanceStop - -End of the "CreateNodeInstance" operation for the AppLockerCSP node - -The following fields are available: - -- **hr** HRESULT returned by the CreateNodeInstance function in AppLockerCSP. - - -### Microsoft.Windows.Security.AppLockerCSP.DeleteChildParams - -Parameters passed to the DeleteChild function of the AppLockerCSP node. - -The following fields are available: - -- **child** The child URI of the node to delete. -- **uri** URI relative to %SYSTEM32%\AppLocker. - - -### Microsoft.Windows.Security.AppLockerCSP.DeleteChildStart - -Start of the "DeleteChild" operation for the AppLockerCSP node. - - - -### Microsoft.Windows.Security.AppLockerCSP.DeleteChildStop - -End of the "DeleteChild" operation for the AppLockerCSP node. - -The following fields are available: - -- **hr** HRESULT returned by the DeleteChild function in AppLockerCSP. - - -### Microsoft.Windows.Security.AppLockerCSP.EnumPolicies - -Logged URI relative to %SYSTEM32%\AppLocker, if the Plugin GUID is null, or the CSP doesn't believe the old policy is present. - -The following fields are available: - -- **uri** URI relative to %SYSTEM32%\AppLocker. - - -### Microsoft.Windows.Security.AppLockerCSP.GetChildNodeNamesParams - -Parameters passed to the GetChildNodeNames function of the AppLockerCSP node. - -The following fields are available: - -- **uri** URI relative to %SYSTEM32%/AppLocker for MDM node. - - -### Microsoft.Windows.Security.AppLockerCSP.GetChildNodeNamesStart - -Start of the "GetChildNodeNames" operation for the AppLockerCSP node. - - - -### Microsoft.Windows.Security.AppLockerCSP.GetChildNodeNamesStop - -End of the "GetChildNodeNames" operation for the AppLockerCSP node. - -The following fields are available: - -- **child[0]** If function succeeded, the first child's name, else "NA". -- **count** If function succeeded, the number of child node names returned by the function, else 0. -- **hr** HRESULT returned by the GetChildNodeNames function of AppLockerCSP. - - -### Microsoft.Windows.Security.AppLockerCSP.GetLatestId - -The result of 'GetLatestId' in AppLockerCSP (the latest time stamped GUID). - -The following fields are available: - -- **dirId** The latest directory identifier found by GetLatestId. -- **id** The id returned by GetLatestId if id > 0 - otherwise the dirId parameter. - - -### Microsoft.Windows.Security.AppLockerCSP.HResultException - -HRESULT thrown by any arbitrary function in AppLockerCSP. - -The following fields are available: - -- **file** File in the OS code base in which the exception occurs. -- **function** Function in the OS code base in which the exception occurs. -- **hr** HRESULT that is reported. -- **line** Line in the file in the OS code base in which the exception occurs. - - -### Microsoft.Windows.Security.AppLockerCSP.SetValueParams - -Parameters passed to the SetValue function of the AppLockerCSP node. - -The following fields are available: - -- **dataLength** Length of the value to set. -- **uri** The node URI to that should contain the value, relative to %SYSTEM32%\AppLocker. - - -### Microsoft.Windows.Security.AppLockerCSP.SetValueStart - -Start of the "SetValue" operation for the AppLockerCSP node. - - - -### Microsoft.Windows.Security.AppLockerCSP.SetValueStop - -End of the "SetValue" operation for the AppLockerCSP node. - -The following fields are available: - -- **hr** HRESULT returned by the SetValue function in AppLockerCSP. - - -### Microsoft.Windows.Security.AppLockerCSP.TryRemediateMissingPolicies - -EntryPoint of fix step or policy remediation, includes URI relative to %SYSTEM32%\AppLocker that needs to be fixed. - -The following fields are available: - -- **uri** URI for node relative to %SYSTEM32%/AppLocker. - - -## Appraiser events - -### Microsoft.Windows.Appraiser.General.ChecksumTotalPictureCount - -This event lists the types of objects and how many of each exist on the client device. This allows for a quick way to ensure that the records present on the server match what is present on the client. - -The following fields are available: - -- **DatasourceApplicationFile_19ASetup** The count of the number of this particular object type present on this device. -- **DatasourceApplicationFile_19H1** The count of the number of this particular object type present on this device. -- **DatasourceApplicationFile_19H1Setup** The count of the number of this particular object type present on this device. -- **DatasourceApplicationFile_RS1** An ID for the system, calculated by hashing hardware identifiers. -- **DatasourceApplicationFile_RS2** An ID for the system, calculated by hashing hardware identifiers. -- **DatasourceApplicationFile_RS3** The count of the number of this particular object type present on this device. -- **DatasourceApplicationFile_RS3Setup** The count of the number of this particular object type present on this device. -- **DatasourceApplicationFile_RS4** The count of the number of this particular object type present on this device. -- **DatasourceApplicationFile_RS4Setup** The count of the number of this particular object type present on this device. -- **DatasourceApplicationFile_RS5** The count of the number of this particular object type present on this device. -- **DatasourceApplicationFile_RS5Setup** The count of the number of this particular object type present on this device. -- **DatasourceApplicationFile_TH1** The count of the number of this particular object type present on this device. -- **DatasourceApplicationFile_TH2** The count of the number of this particular object type present on this device. -- **DatasourceDevicePnp_19ASetup** The count of the number of this particular object type present on this device. -- **DatasourceDevicePnp_19H1** The count of the number of this particular object type present on this device. -- **DatasourceDevicePnp_19H1Setup** The count of the number of this particular object type present on this device. -- **DatasourceDevicePnp_RS1** The total DataSourceDevicePnp objects targeting Windows 10 version 1607 on this device. -- **DatasourceDevicePnp_RS2** The count of the number of this particular object type present on this device. -- **DatasourceDevicePnp_RS3** The count of the number of this particular object type present on this device. -- **DatasourceDevicePnp_RS3Setup** The count of the number of this particular object type present on this device. -- **DatasourceDevicePnp_RS4** The count of the number of this particular object type present on this device. -- **DatasourceDevicePnp_RS4Setup** The count of the number of this particular object type present on this device. -- **DatasourceDevicePnp_RS5** The count of the number of this particular object type present on this device. -- **DatasourceDevicePnp_RS5Setup** The count of the number of this particular object type present on this device. -- **DatasourceDevicePnp_TH1** The count of the number of this particular object type present on this device. -- **DatasourceDevicePnp_TH2** The count of the number of this particular object type present on this device. -- **DatasourceDriverPackage_19ASetup** The count of the number of this particular object type present on this device. -- **DatasourceDriverPackage_19H1** The count of the number of this particular object type present on this device. -- **DatasourceDriverPackage_19H1Setup** The count of the number of this particular object type present on this device. -- **DatasourceDriverPackage_RS1** The total DataSourceDriverPackage objects targeting Windows 10 version 1607 on this device. -- **DatasourceDriverPackage_RS2** The total DataSourceDriverPackage objects targeting Windows 10, version 1703 on this device. -- **DatasourceDriverPackage_RS3** The count of the number of this particular object type present on this device. -- **DatasourceDriverPackage_RS3Setup** The count of the number of this particular object type present on this device. -- **DatasourceDriverPackage_RS4** The count of the number of this particular object type present on this device. -- **DatasourceDriverPackage_RS4Setup** The count of the number of this particular object type present on this device. -- **DatasourceDriverPackage_RS5** The count of the number of this particular object type present on this device. -- **DatasourceDriverPackage_RS5Setup** The count of the number of this particular object type present on this device. -- **DatasourceDriverPackage_TH1** The count of the number of this particular object type present on this device. -- **DatasourceDriverPackage_TH2** The count of the number of this particular object type present on this device. -- **DataSourceMatchingInfoBlock_19ASetup** The count of the number of this particular object type present on this device. -- **DataSourceMatchingInfoBlock_19H1** The count of the number of this particular object type present on this device. -- **DataSourceMatchingInfoBlock_19H1Setup** The count of the number of this particular object type present on this device. -- **DataSourceMatchingInfoBlock_RS1** The total DataSourceMatchingInfoBlock objects targeting Windows 10 version 1607 on this device. -- **DataSourceMatchingInfoBlock_RS2** The count of the number of this particular object type present on this device. -- **DataSourceMatchingInfoBlock_RS3** The count of the number of this particular object type present on this device. -- **DataSourceMatchingInfoBlock_RS3Setup** The count of the number of this particular object type present on this device. -- **DataSourceMatchingInfoBlock_RS4** The count of the number of this particular object type present on this device. -- **DataSourceMatchingInfoBlock_RS4Setup** The count of the number of this particular object type present on this device. -- **DataSourceMatchingInfoBlock_RS5** The count of the number of this particular object type present on this device. -- **DataSourceMatchingInfoBlock_RS5Setup** The count of the number of this particular object type present on this device. -- **DataSourceMatchingInfoBlock_TH1** The count of the number of this particular object type present on this device. -- **DataSourceMatchingInfoBlock_TH2** The count of the number of this particular object type present on this device. -- **DataSourceMatchingInfoPassive_19ASetup** The count of the number of this particular object type present on this device. -- **DataSourceMatchingInfoPassive_19H1** The count of the number of this particular object type present on this device. -- **DataSourceMatchingInfoPassive_19H1Setup** The count of the number of this particular object type present on this device. -- **DataSourceMatchingInfoPassive_RS1** The total DataSourceMatchingInfoPassive objects targeting Windows 10 version 1607 on this device. -- **DataSourceMatchingInfoPassive_RS2** The count of the number of this particular object type present on this device. -- **DataSourceMatchingInfoPassive_RS3** The count of the number of this particular object type present on this device. -- **DataSourceMatchingInfoPassive_RS3Setup** The count of the number of this particular object type present on this device. -- **DataSourceMatchingInfoPassive_RS4** The count of the number of this particular object type present on this device. -- **DataSourceMatchingInfoPassive_RS4Setup** The count of the number of this particular object type present on this device. -- **DataSourceMatchingInfoPassive_RS5** The count of the number of this particular object type present on this device. -- **DataSourceMatchingInfoPassive_RS5Setup** The count of the number of this particular object type present on this device. -- **DataSourceMatchingInfoPassive_TH1** The count of the number of this particular object type present on this device. -- **DataSourceMatchingInfoPassive_TH2** The count of the number of this particular object type present on this device. -- **DataSourceMatchingInfoPostUpgrade_19ASetup** The count of the number of this particular object type present on this device. -- **DataSourceMatchingInfoPostUpgrade_19H1** The count of the number of this particular object type present on this device. -- **DataSourceMatchingInfoPostUpgrade_19H1Setup** The count of the number of this particular object type present on this device. -- **DataSourceMatchingInfoPostUpgrade_RS1** The total DataSourceMatchingInfoPostUpgrade objects targeting Windows 10 version 1607 on this device. -- **DataSourceMatchingInfoPostUpgrade_RS2** The total DataSourceMatchingInfoPostUpgrade objects targeting Windows 10 version 1703 on this device. -- **DataSourceMatchingInfoPostUpgrade_RS3** The total DataSourceMatchingInfoPostUpgrade objects targeting Windows 10 version 1709 on this device. -- **DataSourceMatchingInfoPostUpgrade_RS3Setup** The count of the number of this particular object type present on this device. -- **DataSourceMatchingInfoPostUpgrade_RS4** The count of the number of this particular object type present on this device. -- **DataSourceMatchingInfoPostUpgrade_RS4Setup** The count of the number of this particular object type present on this device. -- **DataSourceMatchingInfoPostUpgrade_RS5** The count of the number of this particular object type present on this device. -- **DataSourceMatchingInfoPostUpgrade_RS5Setup** The count of the number of this particular object type present on this device. -- **DataSourceMatchingInfoPostUpgrade_TH1** The count of the number of this particular object type present on this device. -- **DataSourceMatchingInfoPostUpgrade_TH2** The count of the number of this particular object type present on this device. -- **DatasourceSystemBios_19ASetup** The count of the number of this particular object type present on this device. -- **DatasourceSystemBios_19H1** The count of the number of this particular object type present on this device. -- **DatasourceSystemBios_19H1Setup** The count of the number of this particular object type present on this device. -- **DatasourceSystemBios_RS1** The total DatasourceSystemBios objects targeting Windows 10 version 1607 present on this device. -- **DatasourceSystemBios_RS2** The total DatasourceSystemBios objects targeting Windows 10 version 1703 present on this device. -- **DatasourceSystemBios_RS3** The total DatasourceSystemBios objects targeting Windows 10 version 1709 present on this device. -- **DatasourceSystemBios_RS3Setup** The count of the number of this particular object type present on this device. -- **DatasourceSystemBios_RS4** The count of the number of this particular object type present on this device. -- **DatasourceSystemBios_RS4Setup** The count of the number of this particular object type present on this device. -- **DatasourceSystemBios_RS5** The count of the number of this particular object type present on this device. -- **DatasourceSystemBios_RS5Setup** The count of the number of this particular object type present on this device. -- **DatasourceSystemBios_TH1** The count of the number of this particular object type present on this device. -- **DatasourceSystemBios_TH2** The count of the number of this particular object type present on this device. -- **DecisionApplicationFile_19ASetup** The count of the number of this particular object type present on this device. -- **DecisionApplicationFile_19H1** The count of the number of this particular object type present on this device. -- **DecisionApplicationFile_19H1Setup** The count of the number of this particular object type present on this device. -- **DecisionApplicationFile_RS1** The count of the number of this particular object type present on this device. -- **DecisionApplicationFile_RS2** The count of the number of this particular object type present on this device. -- **DecisionApplicationFile_RS3** The count of the number of this particular object type present on this device. -- **DecisionApplicationFile_RS3Setup** The count of the number of this particular object type present on this device. -- **DecisionApplicationFile_RS4** The count of the number of this particular object type present on this device. -- **DecisionApplicationFile_RS4Setup** The count of the number of this particular object type present on this device. -- **DecisionApplicationFile_RS5** The count of the number of this particular object type present on this device. -- **DecisionApplicationFile_RS5Setup** The count of the number of this particular object type present on this device. -- **DecisionApplicationFile_TH1** The count of the number of this particular object type present on this device. -- **DecisionApplicationFile_TH2** The count of the number of this particular object type present on this device. -- **DecisionDevicePnp_19ASetup** The count of the number of this particular object type present on this device. -- **DecisionDevicePnp_19H1** The count of the number of this particular object type present on this device. -- **DecisionDevicePnp_19H1Setup** The count of the number of this particular object type present on this device. -- **DecisionDevicePnp_RS1** The total DecisionDevicePnp objects targeting Windows 10 version 1607 on this device. -- **DecisionDevicePnp_RS2** The count of the number of this particular object type present on this device. -- **DecisionDevicePnp_RS3** The count of the number of this particular object type present on this device. -- **DecisionDevicePnp_RS3Setup** The count of the number of this particular object type present on this device. -- **DecisionDevicePnp_RS4** The count of the number of this particular object type present on this device. -- **DecisionDevicePnp_RS4Setup** The count of the number of this particular object type present on this device. -- **DecisionDevicePnp_RS5** The count of the number of this particular object type present on this device. -- **DecisionDevicePnp_RS5Setup** The count of the number of this particular object type present on this device. -- **DecisionDevicePnp_TH1** The count of the number of this particular object type present on this device. -- **DecisionDevicePnp_TH2** The count of the number of this particular object type present on this device. -- **DecisionDriverPackage_19ASetup** The count of the number of this particular object type present on this device. -- **DecisionDriverPackage_19H1** The count of the number of this particular object type present on this device. -- **DecisionDriverPackage_19H1Setup** The count of the number of this particular object type present on this device. -- **DecisionDriverPackage_RS1** The total DecisionDriverPackage objects targeting Windows 10 version 1607 on this device. -- **DecisionDriverPackage_RS2** The count of the number of this particular object type present on this device. -- **DecisionDriverPackage_RS3** The count of the number of this particular object type present on this device. -- **DecisionDriverPackage_RS3Setup** The count of the number of this particular object type present on this device. -- **DecisionDriverPackage_RS4** The count of the number of this particular object type present on this device. -- **DecisionDriverPackage_RS4Setup** The count of the number of this particular object type present on this device. -- **DecisionDriverPackage_RS5** The count of the number of this particular object type present on this device. -- **DecisionDriverPackage_RS5Setup** The count of the number of this particular object type present on this device. -- **DecisionDriverPackage_TH1** The count of the number of this particular object type present on this device. -- **DecisionDriverPackage_TH2** The count of the number of this particular object type present on this device. -- **DecisionMatchingInfoBlock_19ASetup** The count of the number of this particular object type present on this device. -- **DecisionMatchingInfoBlock_19H1** The count of the number of this particular object type present on this device. -- **DecisionMatchingInfoBlock_19H1Setup** The count of the number of this particular object type present on this device. -- **DecisionMatchingInfoBlock_RS1** The total DecisionMatchingInfoBlock objects targeting Windows 10 version 1607 present on this device. -- **DecisionMatchingInfoBlock_RS2** The total DecisionMatchingInfoBlock objects targeting Windows 10 version 1703 present on this device. -- **DecisionMatchingInfoBlock_RS3** The total DecisionMatchingInfoBlock objects targeting Windows 10 version 1709 present on this device. -- **DecisionMatchingInfoBlock_RS3Setup** The count of the number of this particular object type present on this device. -- **DecisionMatchingInfoBlock_RS4** The total DecisionMatchingInfoBlock objects targeting Windows 10 version 1803 present on this device. -- **DecisionMatchingInfoBlock_RS4Setup** The count of the number of this particular object type present on this device. -- **DecisionMatchingInfoBlock_RS5** The count of the number of this particular object type present on this device. -- **DecisionMatchingInfoBlock_RS5Setup** The count of the number of this particular object type present on this device. -- **DecisionMatchingInfoBlock_TH1** The count of the number of this particular object type present on this device. -- **DecisionMatchingInfoBlock_TH2** The count of the number of this particular object type present on this device. -- **DecisionMatchingInfoPassive_19ASetup** The count of the number of this particular object type present on this device. -- **DecisionMatchingInfoPassive_19H1** The count of the number of this particular object type present on this device. -- **DecisionMatchingInfoPassive_19H1Setup** The count of the number of this particular object type present on this device. -- **DecisionMatchingInfoPassive_RS1** The total DecisionMatchingInfoPassive objects targeting Windows 10 version 1607 on this device. -- **DecisionMatchingInfoPassive_RS2** The total DecisionMatchingInfoPassive objects targeting Windows 10 version 1703 on this device. -- **DecisionMatchingInfoPassive_RS3** The total DecisionMatchingInfoPassive objects targeting Windows 10 version 1803 on this device. -- **DecisionMatchingInfoPassive_RS3Setup** The count of the number of this particular object type present on this device. -- **DecisionMatchingInfoPassive_RS4** The count of the number of this particular object type present on this device. -- **DecisionMatchingInfoPassive_RS4Setup** The count of the number of this particular object type present on this device. -- **DecisionMatchingInfoPassive_RS5** The count of the number of this particular object type present on this device. -- **DecisionMatchingInfoPassive_RS5Setup** The count of the number of this particular object type present on this device. -- **DecisionMatchingInfoPassive_TH1** The count of the number of this particular object type present on this device. -- **DecisionMatchingInfoPassive_TH2** The count of the number of this particular object type present on this device. -- **DecisionMatchingInfoPostUpgrade_19ASetup** The count of the number of this particular object type present on this device. -- **DecisionMatchingInfoPostUpgrade_19H1** The count of the number of this particular object type present on this device. -- **DecisionMatchingInfoPostUpgrade_19H1Setup** The count of the number of this particular object type present on this device. -- **DecisionMatchingInfoPostUpgrade_RS1** The total DecisionMatchingInfoPostUpgrade objects targeting Windows 10 version 1607 on this device. -- **DecisionMatchingInfoPostUpgrade_RS2** The total DecisionMatchingInfoPostUpgrade objects targeting Windows 10 version 1703 on this device. -- **DecisionMatchingInfoPostUpgrade_RS3** The total DecisionMatchingInfoPostUpgrade objects targeting Windows 10 version 1709 on this device. -- **DecisionMatchingInfoPostUpgrade_RS3Setup** The count of the number of this particular object type present on this device. -- **DecisionMatchingInfoPostUpgrade_RS4** The count of the number of this particular object type present on this device. -- **DecisionMatchingInfoPostUpgrade_RS4Setup** The count of the number of this particular object type present on this device. -- **DecisionMatchingInfoPostUpgrade_RS5** The count of the number of this particular object type present on this device. -- **DecisionMatchingInfoPostUpgrade_RS5Setup** The count of the number of this particular object type present on this device. -- **DecisionMatchingInfoPostUpgrade_TH1** The count of the number of this particular object type present on this device. -- **DecisionMatchingInfoPostUpgrade_TH2** The count of the number of this particular object type present on this device. -- **DecisionMediaCenter_19ASetup** The count of the number of this particular object type present on this device. -- **DecisionMediaCenter_19H1** The count of the number of this particular object type present on this device. -- **DecisionMediaCenter_19H1Setup** The total DecisionMediaCenter objects targeting the next release of Windows on this device. -- **DecisionMediaCenter_RS1** The total DecisionMediaCenter objects targeting Windows 10 version 1607 present on this device. -- **DecisionMediaCenter_RS2** The total DecisionMediaCenter objects targeting Windows 10 version 1703 present on this device. -- **DecisionMediaCenter_RS3** The total DecisionMediaCenter objects targeting Windows 10 version 1709 present on this device. -- **DecisionMediaCenter_RS3Setup** The count of the number of this particular object type present on this device. -- **DecisionMediaCenter_RS4** The total DecisionMediaCenter objects targeting Windows 10 version 1803 present on this device. -- **DecisionMediaCenter_RS4Setup** The count of the number of this particular object type present on this device. -- **DecisionMediaCenter_RS5** The count of the number of this particular object type present on this device. -- **DecisionMediaCenter_RS5Setup** The count of the number of this particular object type present on this device. -- **DecisionMediaCenter_TH1** The count of the number of this particular object type present on this device. -- **DecisionMediaCenter_TH2** The count of the number of this particular object type present on this device. -- **DecisionSystemBios_19ASetup** The total DecisionSystemBios objects targeting the next release of Windows on this device. -- **DecisionSystemBios_19H1** The count of the number of this particular object type present on this device. -- **DecisionSystemBios_19H1Setup** The total DecisionSystemBios objects targeting the next release of Windows on this device. -- **DecisionSystemBios_RS1** The total DecisionSystemBios objects targeting Windows 10 version 1607 on this device. -- **DecisionSystemBios_RS2** The total DecisionSystemBios objects targeting Windows 10 version 1703 on this device. -- **DecisionSystemBios_RS3** The total DecisionSystemBios objects targeting Windows 10 version 1709 on this device. -- **DecisionSystemBios_RS3Setup** The count of the number of this particular object type present on this device. -- **DecisionSystemBios_RS4** The total DecisionSystemBios objects targeting Windows 10 version, 1803 present on this device. -- **DecisionSystemBios_RS4Setup** The total DecisionSystemBios objects targeting the next release of Windows on this device. -- **DecisionSystemBios_RS5** The total DecisionSystemBios objects targeting the next release of Windows on this device. -- **DecisionSystemBios_RS5Setup** The total DecisionSystemBios objects targeting the next release of Windows on this device. -- **DecisionSystemBios_TH1** The count of the number of this particular object type present on this device. -- **DecisionSystemBios_TH2** The count of the number of this particular object type present on this device. -- **DecisionSystemProcessor_RS2** The count of the number of this particular object type present on this device. -- **DecisionTest_RS1** An ID for the system, calculated by hashing hardware identifiers. -- **I4BD-B1CFi2vuW9de87ed73cb92d3ca4.amd64fre.rs5_2eu5umeZone** No content is currently available. -- **InventoryApplicationFile** The count of the number of this particular object type present on this device. -- **InventoryDeviceContainer** A count of device container objects in cache. -- **InventoryDevicePnp** A count of device Plug and Play objects in cache. -- **InventoryDriverBinary** A count of driver binary objects in cache. -- **InventoryDriverPackage** A count of device objects in cache. -- **InventoryLanguagePack** The count of the number of this particular object type present on this device. -- **InventoryMediaCenter** The count of the number of this particular object type present on this device. -- **InventorySystemBios** The count of the number of this particular object type present on this device. -- **InventorySystemMachine** The count of the number of this particular object type present on this device. -- **InventorySystemProcessor** The count of the number of this particular object type present on this device. -- **InventoryTest** The count of the number of this particular object type present on this device. -- **InventoryUplevelDriverPackage** The count of the number of this particular object type present on this device. -- **PCFP** The count of the number of this particular object type present on this device. -- **SystemMemory** The count of the number of this particular object type present on this device. -- **SystemProcessorCompareExchange** The count of the number of this particular object type present on this device. -- **SystemProcessorLahfSahf** The count of the number of this particular object type present on this device. -- **SystemProcessorNx** The total number of objects of this type present on this device. -- **SystemProcessorPrefetchW** The total number of objects of this type present on this device. -- **SystemProcessorSse2** The total number of objects of this type present on this device. -- **SystemTouch** The count of the number of this particular object type present on this device. -- **SystemWim** The total number of objects of this type present on this device. -- **SystemWindowsActivationStatus** The count of the number of this particular object type present on this device. -- **SystemWlan** The total number of objects of this type present on this device. -- **Wmdrm_19ASetup** The count of the number of this particular object type present on this device. -- **Wmdrm_19H1** The count of the number of this particular object type present on this device. -- **Wmdrm_19H1Setup** The total Wmdrm objects targeting the next release of Windows on this device. -- **Wmdrm_RS1** An ID for the system, calculated by hashing hardware identifiers. -- **Wmdrm_RS2** An ID for the system, calculated by hashing hardware identifiers. -- **Wmdrm_RS3** An ID for the system, calculated by hashing hardware identifiers. -- **Wmdrm_RS3Setup** The count of the number of this particular object type present on this device. -- **Wmdrm_RS4** The total Wmdrm objects targeting Windows 10, version 1803 present on this device. -- **Wmdrm_RS4Setup** The count of the number of this particular object type present on this device. -- **Wmdrm_RS5** The count of the number of this particular object type present on this device. -- **Wmdrm_RS5Setup** The count of the number of this particular object type present on this device. -- **Wmdrm_TH1** The count of the number of this particular object type present on this device. -- **Wmdrm_TH2** The count of the number of this particular object type present on this device. - - -### Microsoft.Windows.Appraiser.General.DatasourceApplicationFileAdd - -Represents the basic metadata about specific application files installed on the system. - -This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedeviceinventorychange). - -The following fields are available: - -- **AppraiserVersion** The version of the appraiser file that is generating the events. -- **AvDisplayName** If the app is an anti-virus app, this is its display name. -- **CompatModelIndex** The compatibility prediction for this file. -- **HasCitData** Indicates whether the file is present in CIT data. -- **HasUpgradeExe** Indicates whether the anti-virus app has an upgrade.exe file. -- **IsAv** Is the file an anti-virus reporting EXE? -- **ResolveAttempted** This will always be an empty string when sending telemetry. -- **SdbEntries** An array of fields that indicates the SDB entries that apply to this file. - - -### Microsoft.Windows.Appraiser.General.DatasourceApplicationFileRemove - -This event indicates that the DatasourceApplicationFile object is no longer present. - -This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedeviceinventorychange). - -The following fields are available: - -- **AppraiserVersion** The version of the Appraiser file that is generating the events. - - -### Microsoft.Windows.Appraiser.General.DatasourceApplicationFileStartSync - -This event indicates that a new set of DatasourceApplicationFileAdd events will be sent. - -This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedeviceinventorychange). - -The following fields are available: - -- **AppraiserVersion** The version of the Appraiser file that is generating the events. - - -### Microsoft.Windows.Appraiser.General.DatasourceDevicePnpAdd - -This event sends compatibility data for a Plug and Play device, to help keep Windows up to date. - -This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedeviceinventorychange). - -The following fields are available: - -- **ActiveNetworkConnection** Indicates whether the device is an active network device. -- **AppraiserVersion** The version of the appraiser file generating the events. -- **CosDeviceRating** An enumeration that indicates if there is a driver on the target operating system. -- **CosDeviceSolution** An enumeration that indicates how a driver on the target operating system is available. -- **CosDeviceSolutionUrl** Microsoft.Windows.Appraiser.General.DatasourceDevicePnpAdd . Empty string -- **CosPopulatedFromId** The expected uplevel driver matching ID based on driver coverage data. -- **IsBootCritical** Indicates whether the device boot is critical. -- **UplevelInboxDriver** Indicates whether there is a driver uplevel for this device. -- **WuDriverCoverage** Indicates whether there is a driver uplevel for this device, according to Windows Update. -- **WuDriverUpdateId** The Windows Update ID of the applicable uplevel driver. -- **WuPopulatedFromId** The expected uplevel driver matching ID based on driver coverage from Windows Update. - - -### Microsoft.Windows.Appraiser.General.DatasourceDevicePnpRemove - -This event indicates that the DatasourceDevicePnp object is no longer present. - -This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedeviceinventorychange). - -The following fields are available: - -- **AppraiserVersion** The version of the Appraiser file that is generating the events. - - -### Microsoft.Windows.Appraiser.General.DatasourceDevicePnpStartSync - -This event indicates that a new set of DatasourceDevicePnpAdd events will be sent. - -This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedeviceinventorychange). - -The following fields are available: - -- **AppraiserVersion** The version of the Appraiser file that is generating the events. - - -### Microsoft.Windows.Appraiser.General.DatasourceDriverPackageAdd - -This event sends compatibility database data about driver packages to help keep Windows up to date. - -This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedeviceinventorychange). - -The following fields are available: - -- **AppraiserVersion** The version of the appraiser file generating the events. - - -### Microsoft.Windows.Appraiser.General.DatasourceDriverPackageStartSync - -This event indicates that a new set of DatasourceDriverPackageAdd events will be sent. - -This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedeviceinventorychange). - -The following fields are available: - -- **AppraiserVersion** The version of the Appraiser file that is generating the events. - - -### Microsoft.Windows.Appraiser.General.DataSourceMatchingInfoBlockAdd - -This event sends blocking data about any compatibility blocking entries hit on the system that are not directly related to specific applications or devices, to help keep Windows up-to-date. - -This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedeviceinventorychange). - -The following fields are available: - -- **AppraiserVersion** The version of the appraiser file generating the events. - - -### Microsoft.Windows.Appraiser.General.DataSourceMatchingInfoBlockRemove - -This event indicates that the DataSourceMatchingInfoBlock object is no longer present. - -This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedeviceinventorychange). - -The following fields are available: - -- **AppraiserVersion** The version of the Appraiser file that is generating the events. - - -### Microsoft.Windows.Appraiser.General.DataSourceMatchingInfoBlockStartSync - -This event indicates that a full set of DataSourceMatchingInfoBlockStAdd events have been sent. - -This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedeviceinventorychange). - -The following fields are available: - -- **AppraiserVersion** The version of the Appraiser file that is generating the events. - - -### Microsoft.Windows.Appraiser.General.DataSourceMatchingInfoPassiveAdd - -This event sends compatibility database information about non-blocking compatibility entries on the system that are not keyed by either applications or devices, to help keep Windows up-to-date. - -This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedeviceinventorychange). - -The following fields are available: - -- **AppraiserVersion** The version of the appraiser file generating the events. - - -### Microsoft.Windows.Appraiser.General.DataSourceMatchingInfoPassiveRemove - -This event indicates that the DataSourceMatchingInfoPassive object is no longer present. - -This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedeviceinventorychange). - -The following fields are available: - -- **AppraiserVersion** The version of the Appraiser file that is generating the events. - - -### Microsoft.Windows.Appraiser.General.DataSourceMatchingInfoPassiveStartSync - -This event indicates that a new set of DataSourceMatchingInfoPassiveAdd events will be sent. - -This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedeviceinventorychange). - -The following fields are available: - -- **AppraiserVersion** The version of the Appraiser file that is generating the events. - - -### Microsoft.Windows.Appraiser.General.DataSourceMatchingInfoPostUpgradeAdd - -This event sends compatibility database information about entries requiring reinstallation after an upgrade on the system that are not keyed by either applications or devices, to help keep Windows up-to-date. - -This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedeviceinventorychange). - -The following fields are available: - -- **AppraiserVersion** The version of the appraiser file generating the events. - - -### Microsoft.Windows.Appraiser.General.DataSourceMatchingInfoPostUpgradeRemove - -This event indicates that the DataSourceMatchingInfoPostUpgrade object is no longer present. - -This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedeviceinventorychange). - -The following fields are available: - -- **AppraiserVersion** The version of the Appraiser file that is generating the events. - - -### Microsoft.Windows.Appraiser.General.DataSourceMatchingInfoPostUpgradeStartSync - -This event indicates that a new set of DataSourceMatchingInfoPostUpgradeAdd events will be sent. - -This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedeviceinventorychange). - -The following fields are available: - -- **AppraiserVersion** The version of the Appraiser file that is generating the events. - - -### Microsoft.Windows.Appraiser.General.DatasourceSystemBiosAdd - -This event sends compatibility database information about the BIOS to help keep Windows up-to-date. - -This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedeviceinventorychange). - -The following fields are available: - -- **AppraiserVersion** The version of the Appraiser file generating the events. - - -### Microsoft.Windows.Appraiser.General.DatasourceSystemBiosRemove - -This event indicates that the DatasourceSystemBios object is no longer present. - -This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedeviceinventorychange). - -The following fields are available: - -- **AppraiserVersion** The version of the Appraiser file that is generating the events. - - -### Microsoft.Windows.Appraiser.General.DatasourceSystemBiosStartSync - -This event indicates that a new set of DatasourceSystemBiosAdd events will be sent. - -This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedeviceinventorychange). - -The following fields are available: - -- **AppraiserVersion** The version of the Appraiser file that is generating the events. - - -### Microsoft.Windows.Appraiser.General.DecisionApplicationFileAdd - -This event sends compatibility decision data about a file to help keep Windows up-to-date. - -This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedeviceinventorychange). - -The following fields are available: - -- **AppraiserVersion** The version of the appraiser file that is generating the events. -- **BlockAlreadyInbox** The uplevel runtime block on the file already existed on the current OS. -- **BlockingApplication** Indicates whether there are any application issues that interfere with the upgrade due to the file in question. -- **DisplayGenericMessage** Will be a generic message be shown for this file? -- **DisplayGenericMessageGated** Indicates whether a generic message be shown for this file. -- **HardBlock** This file is blocked in the SDB. -- **HasUxBlockOverride** Does the file have a block that is overridden by a tag in the SDB? -- **MigApplication** Does the file have a MigXML from the SDB associated with it that applies to the current upgrade mode? -- **MigRemoval** Does the file have a MigXML from the SDB that will cause the app to be removed on upgrade? -- **NeedsDismissAction** Will the file cause an action that can be dimissed? -- **NeedsInstallPostUpgradeData** After upgrade, the file will have a post-upgrade notification to install a replacement for the app. -- **NeedsNotifyPostUpgradeData** Does the file have a notification that should be shown after upgrade? -- **NeedsReinstallPostUpgradeData** After upgrade, this file will have a post-upgrade notification to reinstall the app. -- **NeedsUninstallAction** The file must be uninstalled to complete the upgrade. -- **SdbBlockUpgrade** The file is tagged as blocking upgrade in the SDB, -- **SdbBlockUpgradeCanReinstall** The file is tagged as blocking upgrade in the SDB. It can be reinstalled after upgrade. -- **SdbBlockUpgradeUntilUpdate** The file is tagged as blocking upgrade in the SDB. If the app is updated, the upgrade can proceed. -- **SdbReinstallUpgrade** The file is tagged as needing to be reinstalled after upgrade in the SDB. It does not block upgrade. -- **SdbReinstallUpgradeWarn** The file is tagged as needing to be reinstalled after upgrade with a warning in the SDB. It does not block upgrade. -- **SoftBlock** The file is softblocked in the SDB and has a warning. - - -### Microsoft.Windows.Appraiser.General.DecisionApplicationFileRemove - -This event indicates Indicates that the DecisionApplicationFile object is no longer present. - -This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedeviceinventorychange). - -The following fields are available: - -- **AppraiserVersion** The version of the Appraiser file that is generating the events. - - -### Microsoft.Windows.Appraiser.General.DecisionApplicationFileStartSync - -This event indicates that a new set of DecisionApplicationFileAdd events will be sent. - -This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedeviceinventorychange). - -The following fields are available: - -- **AppraiserVersion** The version of the Appraiser file that is generating the events. - - -### Microsoft.Windows.Appraiser.General.DecisionDevicePnpAdd - -This event sends compatibility decision data about a PNP device to help keep Windows up to date. - -This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedeviceinventorychange). - -The following fields are available: - -- **AppraiserVersion** The version of the appraiser file generating the events. -- **AssociatedDriverIsBlocked** Is the driver associated with this PNP device blocked? -- **AssociatedDriverWillNotMigrate** Will the driver associated with this plug-and-play device migrate? -- **BlockAssociatedDriver** Should the driver associated with this PNP device be blocked? -- **BlockingDevice** Is this PNP device blocking upgrade? -- **BlockUpgradeIfDriverBlocked** Is the PNP device both boot critical and does not have a driver included with the OS? -- **BlockUpgradeIfDriverBlockedAndOnlyActiveNetwork** Is this PNP device the only active network device? -- **DisplayGenericMessage** Will a generic message be shown during Setup for this PNP device? -- **DisplayGenericMessageGated** Indicates whether a generic message will be shown during Setup for this PNP device. -- **DriverAvailableInbox** Is a driver included with the operating system for this PNP device? -- **DriverAvailableOnline** Is there a driver for this PNP device on Windows Update? -- **DriverAvailableUplevel** Is there a driver on Windows Update or included with the operating system for this PNP device? -- **DriverBlockOverridden** Is there is a driver block on the device that has been overridden? -- **NeedsDismissAction** Will the user would need to dismiss a warning during Setup for this device? -- **NotRegressed** Does the device have a problem code on the source OS that is no better than the one it would have on the target OS? -- **SdbDeviceBlockUpgrade** Is there an SDB block on the PNP device that blocks upgrade? -- **SdbDriverBlockOverridden** Is there an SDB block on the PNP device that blocks upgrade, but that block was overridden? - - -### Microsoft.Windows.Appraiser.General.DecisionDevicePnpRemove - -This event indicates that the DecisionDevicePnp object is no longer present. - -This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedeviceinventorychange). - -The following fields are available: - -- **AppraiserVersion** The version of the Appraiser file that is generating the events. - - -### Microsoft.Windows.Appraiser.General.DecisionDevicePnpStartSync - -The DecisionDevicePnpStartSync event indicates that a new set of DecisionDevicePnpAdd events will be sent. - -This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedeviceinventorychange). - -The following fields are available: - -- **AppraiserVersion** The version of the Appraiser file that is generating the events. - - -### Microsoft.Windows.Appraiser.General.DecisionDriverPackageAdd - -This event sends decision data about driver package compatibility to help keep Windows up to date. - -This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedeviceinventorychange). - -The following fields are available: - -- **AppraiserVersion** The version of the appraiser file generating the events. -- **DisplayGenericMessageGated** Indicates whether a generic offer block message will be shown for this driver package. -- **DriverBlockOverridden** Does the driver package have an SDB block that blocks it from migrating, but that block has been overridden? -- **DriverIsDeviceBlocked** Was the driver package was blocked because of a device block? -- **DriverIsDriverBlocked** Is the driver package blocked because of a driver block? -- **DriverIsTroubleshooterBlocked** Indicates whether the driver package is blocked because of a troubleshooter block. -- **DriverShouldNotMigrate** Should the driver package be migrated during upgrade? -- **SdbDriverBlockOverridden** Does the driver package have an SDB block that blocks it from migrating, but that block has been overridden? - - -### Microsoft.Windows.Appraiser.General.DecisionDriverPackageRemove - -This event indicates that the DecisionDriverPackage object is no longer present. - -This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedeviceinventorychange). - -The following fields are available: - -- **AppraiserVersion** The version of the Appraiser file that is generating the events. - - -### Microsoft.Windows.Appraiser.General.DecisionDriverPackageStartSync - -This event indicates that a new set of DecisionDriverPackageAdd events will be sent. - -This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedeviceinventorychange). - -The following fields are available: - -- **AppraiserVersion** The version of the Appraiser file that is generating the events. - - -### Microsoft.Windows.Appraiser.General.DecisionMatchingInfoBlockAdd - -This event sends compatibility decision data about blocking entries on the system that are not keyed by either applications or devices, to help keep Windows up to date. - -This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedeviceinventorychange). - -The following fields are available: - -- **AppraiserVersion** The version of the appraiser file generating the events. -- **BlockingApplication** Are there are any application issues that interfere with upgrade due to matching info blocks? -- **DisplayGenericMessage** Will a generic message be shown for this block? -- **NeedsUninstallAction** Does the user need to take an action in setup due to a matching info block? -- **SdbBlockUpgrade** Is a matching info block blocking upgrade? -- **SdbBlockUpgradeCanReinstall** Is a matching info block blocking upgrade, but has the can reinstall tag? -- **SdbBlockUpgradeUntilUpdate** Is a matching info block blocking upgrade but has the until update tag? - - -### Microsoft.Windows.Appraiser.General.DecisionMatchingInfoBlockRemove - -This event indicates that the DecisionMatchingInfoBlock object is no longer present. - -This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedeviceinventorychange). - -The following fields are available: - -- **AppraiserVersion** The version of the Appraiser file that is generating the events. - - -### Microsoft.Windows.Appraiser.General.DecisionMatchingInfoBlockStartSync - -This event indicates that a new set of DecisionMatchingInfoBlockAdd events will be sent. - -This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedeviceinventorychange). - -The following fields are available: - -- **AppraiserVersion** The version of the Appraiser file that is generating the events. - - -### Microsoft.Windows.Appraiser.General.DecisionMatchingInfoPassiveAdd - -This event sends compatibility decision data about non-blocking entries on the system that are not keyed by either applications or devices, to help keep Windows up to date. - -This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedeviceinventorychange). - -The following fields are available: - -- **AppraiserVersion** The version of the Appraiser file that is generating the events. -- **BlockingApplication** Are there any application issues that interfere with upgrade due to matching info blocks? -- **DisplayGenericMessageGated** Indicates whether a generic offer block message will be shown due to matching info blocks. -- **MigApplication** Is there a matching info block with a mig for the current mode of upgrade? - - -### Microsoft.Windows.Appraiser.General.DecisionMatchingInfoPassiveRemove - -This event Indicates that the DecisionMatchingInfoPassive object is no longer present. - -This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedeviceinventorychange). - -The following fields are available: - -- **AppraiserVersion** The version of the Appraiser file that is generating the events. - - -### Microsoft.Windows.Appraiser.General.DecisionMatchingInfoPassiveStartSync - -This event indicates that a new set of DecisionMatchingInfoPassiveAdd events will be sent. - -This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedeviceinventorychange). - -The following fields are available: - -- **AppraiserVersion** The version of the Appraiser file that is generating the events. - - -### Microsoft.Windows.Appraiser.General.DecisionMatchingInfoPostUpgradeAdd - -This event sends compatibility decision data about entries that require reinstall after upgrade. It's used to help keep Windows up to date. - -This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedeviceinventorychange). - -The following fields are available: - -- **AppraiserVersion** The version of the Appraiser file that is generating the events. -- **NeedsInstallPostUpgradeData** Will the file have a notification after upgrade to install a replacement for the app? -- **NeedsNotifyPostUpgradeData** Should a notification be shown for this file after upgrade? -- **NeedsReinstallPostUpgradeData** Will the file have a notification after upgrade to reinstall the app? -- **SdbReinstallUpgrade** The file is tagged as needing to be reinstalled after upgrade in the compatibility database (but is not blocking upgrade). - - -### Microsoft.Windows.Appraiser.General.DecisionMatchingInfoPostUpgradeRemove - -This event indicates that the DecisionMatchingInfoPostUpgrade object is no longer present. - -This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedeviceinventorychange). - -The following fields are available: - -- **AppraiserVersion** The version of the Appraiser file that is generating the events. - - -### Microsoft.Windows.Appraiser.General.DecisionMatchingInfoPostUpgradeStartSync - -This event indicates that a new set of DecisionMatchingInfoPostUpgradeAdd events will be sent. - -This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedeviceinventorychange). - -The following fields are available: - -- **AppraiserVersion** The version of the Appraiser file that is generating the events. - - -### Microsoft.Windows.Appraiser.General.DecisionMediaCenterAdd - -This event sends decision data about the presence of Windows Media Center, to help keep Windows up to date. - -This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedeviceinventorychange). - -The following fields are available: - -- **AppraiserVersion** The version of the Appraiser file generating the events. -- **BlockingApplication** Is there any application issues that interfere with upgrade due to Windows Media Center? -- **MediaCenterActivelyUsed** If Windows Media Center is supported on the edition, has it been run at least once and are the MediaCenterIndicators are true? -- **MediaCenterIndicators** Do any indicators imply that Windows Media Center is in active use? -- **MediaCenterInUse** Is Windows Media Center actively being used? -- **MediaCenterPaidOrActivelyUsed** Is Windows Media Center actively being used or is it running on a supported edition? -- **NeedsDismissAction** Are there any actions that can be dismissed coming from Windows Media Center? - - -### Microsoft.Windows.Appraiser.General.DecisionMediaCenterRemove - -This event indicates that the DecisionMediaCenter object is no longer present. - -This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedeviceinventorychange). - -The following fields are available: - -- **AppraiserVersion** The version of the Appraiser file that is generating the events. - - -### Microsoft.Windows.Appraiser.General.DecisionMediaCenterStartSync - -This event indicates that a new set of DecisionMediaCenterAdd events will be sent. - -This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedeviceinventorychange). - -The following fields are available: - -- **AppraiserVersion** The version of the Appraiser file that is generating the events. - - -### Microsoft.Windows.Appraiser.General.DecisionSystemBiosAdd - -This event sends compatibility decision data about the BIOS to help keep Windows up to date. - -This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedeviceinventorychange). - -The following fields are available: - -- **AppraiserVersion** The version of the Appraiser file generating the events. -- **Blocking** Is the device blocked from upgrade due to a BIOS block? -- **DisplayGenericMessageGated** Indicates whether a generic offer block message will be shown for the bios. -- **HasBiosBlock** Does the device have a BIOS block? - - -### Microsoft.Windows.Appraiser.General.DecisionSystemBiosRemove - -This event indicates that the DecisionSystemBios object is no longer present. - -This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedeviceinventorychange). - -The following fields are available: - -- **AppraiserVersion** The version of the Appraiser file that is generating the events. - - -### Microsoft.Windows.Appraiser.General.DecisionSystemBiosStartSync - -This event indicates that a new set of DecisionSystemBiosAdd events will be sent. - -This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedeviceinventorychange). - -The following fields are available: - -- **AppraiserVersion** The version of the Appraiser file that is generating the events. - - -### Microsoft.Windows.Appraiser.General.GatedRegChange - -This event sends data about the results of running a set of quick-blocking instructions, to help keep Windows up to date. - -The following fields are available: - -- **NewData** The data in the registry value after the scan completed. -- **OldData** The previous data in the registry value before the scan ran. -- **PCFP** An ID for the system calculated by hashing hardware identifiers. -- **RegKey** The registry key name for which a result is being sent. -- **RegValue** The registry value for which a result is being sent. -- **Time** The client time of the event. - - -### Microsoft.Windows.Appraiser.General.InventoryApplicationFileAdd - -This event represents the basic metadata about a file on the system. The file must be part of an app and either have a block in the compatibility database or be part of an antivirus program. - -This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedeviceinventorychange). - -The following fields are available: - -- **AppraiserVersion** The version of the Appraiser file generating the events. -- **AvDisplayName** If the app is an antivirus app, this is its display name. -- **AvProductState** Indicates whether the antivirus program is turned on and the signatures are up to date. -- **BinaryType** A binary type. Example: UNINITIALIZED, ZERO_BYTE, DATA_ONLY, DOS_MODULE, NE16_MODULE, PE32_UNKNOWN, PE32_I386, PE32_ARM, PE64_UNKNOWN, PE64_AMD64, PE64_ARM64, PE64_IA64, PE32_CLR_32, PE32_CLR_IL, PE32_CLR_IL_PREFER32, PE64_CLR_64. -- **BinFileVersion** An attempt to clean up FileVersion at the client that tries to place the version into 4 octets. -- **BinProductVersion** An attempt to clean up ProductVersion at the client that tries to place the version into 4 octets. -- **BoeProgramId** If there is no entry in Add/Remove Programs, this is the ProgramID that is generated from the file metadata. -- **CompanyName** The company name of the vendor who developed this file. -- **FileId** A hash that uniquely identifies a file. -- **FileVersion** The File version field from the file metadata under Properties -> Details. -- **HasUpgradeExe** Indicates whether the antivirus app has an upgrade.exe file. -- **IsAv** Indicates whether the file an antivirus reporting EXE. -- **LinkDate** The date and time that this file was linked on. -- **LowerCaseLongPath** The full file path to the file that was inventoried on the device. -- **Name** The name of the file that was inventoried. -- **ProductName** The Product name field from the file metadata under Properties -> Details. -- **ProductVersion** The Product version field from the file metadata under Properties -> Details. -- **ProgramId** A hash of the Name, Version, Publisher, and Language of an application used to identify it. -- **Size** The size of the file (in hexadecimal bytes). - - -### Microsoft.Windows.Appraiser.General.InventoryApplicationFileRemove - -This event indicates that the InventoryApplicationFile object is no longer present. - -This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedeviceinventorychange). - -The following fields are available: - -- **AppraiserVersion** The version of the Appraiser file that is generating the events. - - -### Microsoft.Windows.Appraiser.General.InventoryApplicationFileStartSync - -This event indicates indicates that a new set of InventoryApplicationFileAdd events will be sent. - -This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedeviceinventorychange). - -The following fields are available: - -- **AppraiserVersion** The version of the Appraiser file that is generating the events. - - -### Microsoft.Windows.Appraiser.General.InventoryLanguagePackAdd - -This event sends data about the number of language packs installed on the system, to help keep Windows up to date. - -This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedeviceinventorychange). - -The following fields are available: - -- **AppraiserVersion** The version of the Appraiser file that is generating the events. -- **HasLanguagePack** Indicates whether this device has 2 or more language packs. -- **LanguagePackCount** The number of language packs are installed. - - -### Microsoft.Windows.Appraiser.General.InventoryLanguagePackRemove - -This event indicates that the InventoryLanguagePack object is no longer present. - -This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedeviceinventorychange). - -The following fields are available: - -- **AppraiserVersion** The version of the Appraiser file that is generating the events. - - -### Microsoft.Windows.Appraiser.General.InventoryLanguagePackStartSync - -This event indicates that a new set of InventoryLanguagePackAdd events will be sent. - -This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedeviceinventorychange). - -The following fields are available: - -- **AppraiserVersion** The version of the Appraiser file that is generating the events. - - -### Microsoft.Windows.Appraiser.General.InventoryMediaCenterAdd - -This event sends true/false data about decision points used to understand whether Windows Media Center is used on the system, to help keep Windows up to date. - -This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedeviceinventorychange). - -The following fields are available: - -- **AppraiserVersion** The version of the Appraiser file generating the events. -- **EverLaunched** Has Windows Media Center ever been launched? -- **HasConfiguredTv** Has the user configured a TV tuner through Windows Media Center? -- **HasExtendedUserAccounts** Are any Windows Media Center Extender user accounts configured? -- **HasWatchedFolders** Are any folders configured for Windows Media Center to watch? -- **IsDefaultLauncher** Is Windows Media Center the default app for opening music or video files? -- **IsPaid** Is the user running a Windows Media Center edition that implies they paid for Windows Media Center? -- **IsSupported** Does the running OS support Windows Media Center? - - -### Microsoft.Windows.Appraiser.General.InventoryMediaCenterRemove - -This event indicates that the InventoryMediaCenter object is no longer present. - -This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedeviceinventorychange). - -The following fields are available: - -- **AppraiserVersion** The version of the Appraiser file that is generating the events. - - -### Microsoft.Windows.Appraiser.General.InventoryMediaCenterStartSync - -This event indicates that a new set of InventoryMediaCenterAdd events will be sent. - -This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedeviceinventorychange). - -The following fields are available: - -- **AppraiserVersion** The version of the Appraiser file that is generating the events. - - -### Microsoft.Windows.Appraiser.General.InventorySystemBiosAdd - -This event sends basic metadata about the BIOS to determine whether it has a compatibility block. - -This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedeviceinventorychange). - -The following fields are available: - -- **AppraiserVersion** The version of the Appraiser file that is generating the events. -- **biosDate** The release date of the BIOS in UTC format. -- **BiosDate** The release date of the BIOS in UTC format. -- **biosName** The name field from Win32_BIOS. -- **BiosName** The name field from Win32_BIOS. -- **manufacturer** The manufacturer field from Win32_ComputerSystem. -- **Manufacturer** The manufacturer field from Win32_ComputerSystem. -- **model** The model field from Win32_ComputerSystem. -- **Model** The model field from Win32_ComputerSystem. - - -### Microsoft.Windows.Appraiser.General.InventorySystemBiosRemove - -This event indicates that the InventorySystemBios object is no longer present. - -This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedeviceinventorychange). - -The following fields are available: - -- **AppraiserVersion** The version of the Appraiser file that is generating the events. - - -### Microsoft.Windows.Appraiser.General.InventorySystemBiosStartSync - -This event indicates that a new set of InventorySystemBiosAdd events will be sent. - -This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedeviceinventorychange). - -The following fields are available: - -- **AppraiserVersion** The version of the Appraiser file that is generating the events. - - -### Microsoft.Windows.Appraiser.General.InventoryUplevelDriverPackageAdd - -This event is only runs during setup. It provides a listing of the uplevel driver packages that were downloaded before the upgrade. Is critical to understanding if failures in setup can be traced to not having sufficient uplevel drivers before the upgrade. - -This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedeviceinventorychange). - -The following fields are available: - -- **AppraiserVersion** The version of the Appraiser file that is generating the events. -- **BootCritical** Is the driver package marked as boot critical? -- **Build** The build value from the driver package. -- **CatalogFile** The name of the catalog file within the driver package. -- **Class** The device class from the driver package. -- **ClassGuid** The device class unique ID from the driver package. -- **Date** The date from the driver package. -- **Inbox** Is the driver package of a driver that is included with Windows? -- **OriginalName** The original name of the INF file before it was renamed. Generally a path under $WINDOWS.~BT\Drivers\DU. -- **Provider** The provider of the driver package. -- **PublishedName** The name of the INF file after it was renamed. -- **Revision** The revision of the driver package. -- **SignatureStatus** Indicates if the driver package is signed. Unknown = 0, Unsigned = 1, Signed = 2. -- **VersionMajor** The major version of the driver package. -- **VersionMinor** The minor version of the driver package. - - -### Microsoft.Windows.Appraiser.General.InventoryUplevelDriverPackageRemove - -This event indicates that the InventoryUplevelDriverPackage object is no longer present. - -This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedeviceinventorychange). - -The following fields are available: - -- **AppraiserVersion** The version of the Appraiser file that is generating the events. - - -### Microsoft.Windows.Appraiser.General.InventoryUplevelDriverPackageStartSync - -This event indicates that a new set of InventoryUplevelDriverPackageAdd events will be sent. - -This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedeviceinventorychange). - -The following fields are available: - -- **AppraiserVersion** The version of the Appraiser file that is generating the events. - - -### Microsoft.Windows.Appraiser.General.RunContext - -This event indicates what should be expected in the data payload. - -The following fields are available: - -- **AppraiserBranch** The source branch in which the currently running version of Appraiser was built. -- **AppraiserProcess** The name of the process that launched Appraiser. -- **AppraiserVersion** The version of the Appraiser file generating the events. -- **CensusId** A unique hardware identifier. -- **Context** Indicates what mode Appraiser is running in. Example: Setup or Telemetry. -- **PCFP** An ID for the system calculated by hashing hardware identifiers. -- **Subcontext** Indicates what categories of incompatibilities appraiser is scanning for. Can be N/A, Resolve, or a semicolon-delimited list that can include App, Dev, Sys, Gat, or Rescan. -- **Time** The client time of the event. - - -### Microsoft.Windows.Appraiser.General.SystemMemoryAdd - -This event sends data on the amount of memory on the system and whether it meets requirements, to help keep Windows up-to-date. - -This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedeviceinventorychange). - -The following fields are available: - -- **AppraiserVersion** The version of the Appraiser file generating the events. -- **Blocking** Is the device from upgrade due to memory restrictions? -- **MemoryRequirementViolated** Was a memory requirement violated? -- **pageFile** The current committed memory limit for the system or the current process, whichever is smaller (in bytes). -- **ram** The amount of memory on the device. -- **ramKB** The amount of memory (in KB). -- **virtual** The size of the user-mode portion of the virtual address space of the calling process (in bytes). -- **virtualKB** The amount of virtual memory (in KB). - - -### Microsoft.Windows.Appraiser.General.SystemMemoryRemove - -This event that the SystemMemory object is no longer present. - -This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedeviceinventorychange). - -The following fields are available: - -- **AppraiserVersion** The version of the Appraiser file that is generating the events. - - -### Microsoft.Windows.Appraiser.General.SystemMemoryStartSync - -This event indicates that a new set of SystemMemoryAdd events will be sent. - -This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedeviceinventorychange). - -The following fields are available: - -- **AppraiserVersion** The version of the Appraiser file that is generating the events. - - -### Microsoft.Windows.Appraiser.General.SystemProcessorCompareExchangeAdd - -This event sends data indicating whether the system supports the CompareExchange128 CPU requirement, to help keep Windows up to date. - -This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedeviceinventorychange). - -The following fields are available: - -- **AppraiserVersion** The version of the Appraiser file generating the events. -- **Blocking** Is the upgrade blocked due to the processor? -- **CompareExchange128Support** Does the CPU support CompareExchange128? - - -### Microsoft.Windows.Appraiser.General.SystemProcessorCompareExchangeRemove - -This event indicates that the SystemProcessorCompareExchange object is no longer present. - -This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedeviceinventorychange). - -The following fields are available: - -- **AppraiserVersion** The version of the Appraiser file that is generating the events. - - -### Microsoft.Windows.Appraiser.General.SystemProcessorCompareExchangeStartSync - -This event indicates that a new set of SystemProcessorCompareExchangeAdd events will be sent. - -This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedeviceinventorychange). - -The following fields are available: - -- **AppraiserVersion** The version of the Appraiser file that is generating the events. - - -### Microsoft.Windows.Appraiser.General.SystemProcessorLahfSahfAdd - -This event sends data indicating whether the system supports the LahfSahf CPU requirement, to help keep Windows up-to-date. - -This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedeviceinventorychange). - -The following fields are available: - -- **AppraiserVersion** The version of the Appraiser file generating the events. -- **Blocking** Is the upgrade blocked due to the processor? -- **LahfSahfSupport** Does the CPU support LAHF/SAHF? - - -### Microsoft.Windows.Appraiser.General.SystemProcessorLahfSahfRemove - -This event indicates that the SystemProcessorLahfSahf object is no longer present. - -This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedeviceinventorychange). - -The following fields are available: - -- **AppraiserVersion** The version of the Appraiser file that is generating the events. - - -### Microsoft.Windows.Appraiser.General.SystemProcessorLahfSahfStartSync - -This event indicates that a new set of SystemProcessorLahfSahfAdd events will be sent. - -This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedeviceinventorychange). - -The following fields are available: - -- **AppraiserVersion** The version of the Appraiser file that is generating the events. - - -### Microsoft.Windows.Appraiser.General.SystemProcessorNxAdd - -This event sends data indicating whether the system supports the NX CPU requirement, to help keep Windows up-to-date. - -This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedeviceinventorychange). - -The following fields are available: - -- **AppraiserVersion** The version of the Appraiser file that is generating the events. -- **Blocking** Is the upgrade blocked due to the processor? -- **NXDriverResult** The result of the driver used to do a non-deterministic check for NX support. -- **NXProcessorSupport** Does the processor support NX? - - -### Microsoft.Windows.Appraiser.General.SystemProcessorNxRemove - -This event indicates that the SystemProcessorNx object is no longer present. - -This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedeviceinventorychange). - -The following fields are available: - -- **AppraiserVersion** The version of the Appraiser file that is generating the events. - - -### Microsoft.Windows.Appraiser.General.SystemProcessorNxStartSync - -This event indicates that a new set of SystemProcessorNxAdd events will be sent. - -This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedeviceinventorychange). - -The following fields are available: - -- **AppraiserVersion** The version of the Appraiser file that is generating the events. - - -### Microsoft.Windows.Appraiser.General.SystemProcessorPrefetchWAdd - -This event sends data indicating whether the system supports the PrefetchW CPU requirement, to help keep Windows up to date. - -This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedeviceinventorychange). - -The following fields are available: - -- **AppraiserVersion** The version of the Appraiser file that is generating the events. -- **Blocking** Is the upgrade blocked due to the processor? -- **PrefetchWSupport** Does the processor support PrefetchW? - - -### Microsoft.Windows.Appraiser.General.SystemProcessorPrefetchWRemove - -This event indicates that the SystemProcessorPrefetchW object is no longer present. - -This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedeviceinventorychange). - -The following fields are available: - -- **AppraiserVersion** The version of the Appraiser file that is generating the events. - - -### Microsoft.Windows.Appraiser.General.SystemProcessorPrefetchWStartSync - -This event indicates that a new set of SystemProcessorPrefetchWAdd events will be sent. - -This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedeviceinventorychange). - -The following fields are available: - -- **AppraiserVersion** The version of the Appraiser file that is generating the events. - - -### Microsoft.Windows.Appraiser.General.SystemProcessorSse2Add - -This event sends data indicating whether the system supports the SSE2 CPU requirement, to help keep Windows up to date. - -This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedeviceinventorychange). - -The following fields are available: - -- **AppraiserVersion** The version of the Appraiser file that is generating the events. -- **Blocking** Is the upgrade blocked due to the processor? -- **SSE2ProcessorSupport** Does the processor support SSE2? - - -### Microsoft.Windows.Appraiser.General.SystemProcessorSse2Remove - -This event indicates that the SystemProcessorSse2 object is no longer present. - -This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedeviceinventorychange). - -The following fields are available: - -- **AppraiserVersion** The version of the Appraiser file that is generating the events. - - -### Microsoft.Windows.Appraiser.General.SystemProcessorSse2StartSync - -This event indicates that a new set of SystemProcessorSse2Add events will be sent. - -This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedeviceinventorychange). - -The following fields are available: - -- **AppraiserVersion** The version of the Appraiser file that is generating the events. - - -### Microsoft.Windows.Appraiser.General.SystemTouchAdd - -This event sends data indicating whether the system supports touch, to help keep Windows up to date. - -This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedeviceinventorychange). - -The following fields are available: - -- **AppraiserVersion** The version of the Appraiser file that is generating the events. -- **IntegratedTouchDigitizerPresent** Is there an integrated touch digitizer? -- **MaximumTouches** The maximum number of touch points supported by the device hardware. - - -### Microsoft.Windows.Appraiser.General.SystemTouchRemove - -This event indicates that the SystemTouch object is no longer present. - -This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedeviceinventorychange). - -The following fields are available: - -- **AppraiserVersion** The version of the Appraiser file that is generating the events. - - -### Microsoft.Windows.Appraiser.General.SystemTouchStartSync - -This event indicates that a new set of SystemTouchAdd events will be sent. - -This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedeviceinventorychange). - -The following fields are available: - -- **AppraiserVersion** The version of the Appraiser file that is generating the events. - - -### Microsoft.Windows.Appraiser.General.SystemWimAdd - -This event sends data indicating whether the operating system is running from a compressed Windows Imaging Format (WIM) file, to help keep Windows up to date. - -This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedeviceinventorychange). - -The following fields are available: - -- **AppraiserVersion** The version of the Appraiser file that is generating the events. -- **IsWimBoot** Is the current operating system running from a compressed WIM file? -- **RegistryWimBootValue** The raw value from the registry that is used to indicate if the device is running from a WIM. - - -### Microsoft.Windows.Appraiser.General.SystemWimRemove - -This event indicates that the SystemWim object is no longer present. - -This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedeviceinventorychange). - -The following fields are available: - -- **AppraiserVersion** The version of the Appraiser file that is generating the events. - - -### Microsoft.Windows.Appraiser.General.SystemWimStartSync - -This event indicates that a new set of SystemWimAdd events will be sent. - -This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedeviceinventorychange). - -The following fields are available: - -- **AppraiserVersion** The version of the Appraiser file that is generating the events. - - -### Microsoft.Windows.Appraiser.General.SystemWindowsActivationStatusAdd - -This event sends data indicating whether the current operating system is activated, to help keep Windows up to date. - -This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedeviceinventorychange). - -The following fields are available: - -- **AppraiserVersion** The version of the Appraiser file that is generating the events. -- **WindowsIsLicensedApiValue** The result from the API that's used to indicate if operating system is activated. -- **WindowsNotActivatedDecision** Is the current operating system activated? - - -### Microsoft.Windows.Appraiser.General.SystemWindowsActivationStatusRemove - -This event indicates that the SystemWindowsActivationStatus object is no longer present. - -This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedeviceinventorychange). - -The following fields are available: - -- **AppraiserVersion** The version of the Appraiser file that is generating the events. - - -### Microsoft.Windows.Appraiser.General.SystemWindowsActivationStatusStartSync - -This event indicates that a new set of SystemWindowsActivationStatusAdd events will be sent. - -This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedeviceinventorychange). - -The following fields are available: - -- **AppraiserVersion** The version of the Appraiser file that is generating the events. - - -### Microsoft.Windows.Appraiser.General.SystemWlanAdd - -This event sends data indicating whether the system has WLAN, and if so, whether it uses an emulated driver that could block an upgrade, to help keep Windows up-to-date. - -This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedeviceinventorychange). - -The following fields are available: - -- **AppraiserVersion** The version of the Appraiser file that is generating the events. -- **Blocking** Is the upgrade blocked because of an emulated WLAN driver? -- **HasWlanBlock** Does the emulated WLAN driver have an upgrade block? -- **WlanEmulatedDriver** Does the device have an emulated WLAN driver? -- **WlanExists** Does the device support WLAN at all? -- **WlanModulePresent** Are any WLAN modules present? -- **WlanNativeDriver** Does the device have a non-emulated WLAN driver? - - -### Microsoft.Windows.Appraiser.General.SystemWlanRemove - -This event indicates that the SystemWlan object is no longer present. - -This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedeviceinventorychange). - -The following fields are available: - -- **AppraiserVersion** The version of the Appraiser file that is generating the events. - - -### Microsoft.Windows.Appraiser.General.SystemWlanStartSync - -This event indicates that a new set of SystemWlanAdd events will be sent. - -This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedeviceinventorychange). - -The following fields are available: - -- **AppraiserVersion** The version of the Appraiser file that is generating the events. - - -### Microsoft.Windows.Appraiser.General.TelemetryRunHealth - -This event indicates the parameters and result of a telemetry (diagnostic) run. This allows the rest of the data sent over the course of the run to be properly contextualized and understood, which is then used to keep Windows up to date. - -The following fields are available: - -- **AppraiserBranch** The source branch in which the version of Appraiser that is running was built. -- **AppraiserDataVersion** The version of the data files being used by the Appraiser telemetry run. -- **AppraiserProcess** The name of the process that launched Appraiser. -- **AppraiserVersion** The file version (major, minor and build) of the Appraiser DLL, concatenated without dots. -- **AuxFinal** Obsolete, always set to false. -- **AuxInitial** Obsolete, indicates if Appraiser is writing data files to be read by the Get Windows 10 app. -- **DeadlineDate** A timestamp representing the deadline date, which is the time until which appraiser will wait to do a full scan. -- **EnterpriseRun** Indicates if the telemetry run is an enterprise run, which means appraiser was run from the command line with an extra enterprise parameter. -- **FullSync** Indicates if Appraiser is performing a full sync, which means that full set of events representing the state of the machine are sent. Otherwise, only the changes from the previous run are sent. -- **InboxDataVersion** The original version of the data files before retrieving any newer version. -- **IndicatorsWritten** Indicates if all relevant UEX indicators were successfully written or updated. -- **InventoryFullSync** Indicates if inventory is performing a full sync, which means that the full set of events representing the inventory of machine are sent. -- **PCFP** An ID for the system calculated by hashing hardware identifiers. -- **PerfBackoff** Indicates if the run was invoked with logic to stop running when a user is present. Helps to understand why a run may have a longer elapsed time than normal. -- **PerfBackoffInsurance** Indicates if appraiser is running without performance backoff because it has run with perf backoff and failed to complete several times in a row. -- **RunAppraiser** Indicates if Appraiser was set to run at all. If this if false, it is understood that data events will not be received from this device. -- **RunDate** The date that the telemetry run was stated, expressed as a filetime. -- **RunGeneralTel** Indicates if the generaltel.dll component was run. Generaltel collects additional telemetry on an infrequent schedule and only from machines at telemetry levels higher than Basic. -- **RunOnline** Indicates if appraiser was able to connect to Windows Update and theefore is making decisions using up-to-date driver coverage information. -- **RunResult** The hresult of the Appraiser telemetry run. -- **ScheduledUploadDay** The day scheduled for the upload. -- **SendingUtc** Indicates if the Appraiser client is sending events during the current telemetry run. -- **StoreHandleIsNotNull** Obsolete, always set to false -- **TelementrySent** Indicates if telemetry was successfully sent. -- **ThrottlingUtc** Indicates if the Appraiser client is throttling its output of CUET events to avoid being disabled. This increases runtime but also telemetry reliability. -- **Time** The client time of the event. -- **VerboseMode** Indicates if appraiser ran in Verbose mode, which is a test-only mode with extra logging. -- **WhyFullSyncWithoutTablePrefix** Indicates the reason or reasons that a full sync was generated. - - -### Microsoft.Windows.Appraiser.General.WmdrmAdd - -This event sends data about the usage of older digital rights management on the system, to help keep Windows up to date. This data does not indicate the details of the media using the digital rights management, only whether any such files exist. Collecting this data was critical to ensuring the correct mitigation for customers, and should be able to be removed once all mitigations are in place. - -This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedeviceinventorychange). - -The following fields are available: - -- **AppraiserVersion** The version of the Appraiser file that is generating the events. -- **BlockingApplication** Same as NeedsDismissAction. -- **NeedsDismissAction** Indicates if a dismissible message is needed to warn the user about a potential loss of data due to DRM deprecation. -- **WmdrmApiResult** Raw value of the API used to gather DRM state. -- **WmdrmCdRipped** Indicates if the system has any files encrypted with personal DRM, which was used for ripped CDs. -- **WmdrmIndicators** WmdrmCdRipped OR WmdrmPurchased. -- **WmdrmInUse** WmdrmIndicators AND dismissible block in setup was not dismissed. -- **WmdrmNonPermanent** Indicates if the system has any files with non-permanent licenses. -- **WmdrmPurchased** Indicates if the system has any files with permanent licenses. - - -### Microsoft.Windows.Appraiser.General.WmdrmRemove - -This event indicates that the Wmdrm object is no longer present. - -This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedeviceinventorychange). - -The following fields are available: - -- **AppraiserVersion** The version of the Appraiser file that is generating the events. - - -### Microsoft.Windows.Appraiser.General.WmdrmStartSync - -This event indicates that a new set of WmdrmAdd events will be sent. - -This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedeviceinventorychange). - -The following fields are available: - -- **AppraiserVersion** The version of the Appraiser file that is generating the events. - - -## Census events - -### Census.App - -Provides information on IE and Census versions running on the device - -The following fields are available: - -- **AppraiserEnterpriseErrorCode** The error code of the last Appraiser enterprise run. -- **AppraiserErrorCode** The error code of the last Appraiser run. -- **AppraiserRunEndTimeStamp** The end time of the last Appraiser run. -- **AppraiserRunIsInProgressOrCrashed** Flag that indicates if the Appraiser run is in progress or has crashed. -- **AppraiserRunStartTimeStamp** The start time of the last Appraiser run. -- **AppraiserTaskEnabled** Whether the Appraiser task is enabled. -- **AppraiserTaskExitCode** The Appraiser task exist code. -- **AppraiserTaskLastRun** The last runtime for the Appraiser task. -- **CensusVersion** The version of Census that generated the current data for this device. -- **IEVersion** The version of Internet Explorer that is running on the device. - - -### Census.Battery - -This event sends type and capacity data about the battery on the device, as well as the number of connected standby devices in use, type to help keep Windows up to date. - -The following fields are available: - -- **InternalBatteryCapablities** Represents information about what the battery is capable of doing. -- **InternalBatteryCapacityCurrent** Represents the battery's current fully charged capacity in mWh (or relative). Compare this value to DesignedCapacity  to estimate the battery's wear. -- **InternalBatteryCapacityDesign** Represents the theoretical capacity of the battery when new, in mWh. -- **InternalBatteryNumberOfCharges** Provides the number of battery charges. This is used when creating new products and validating that existing products meets targeted functionality performance. -- **IsAlwaysOnAlwaysConnectedCapable** Represents whether the battery enables the device to be AlwaysOnAlwaysConnected . Boolean value. - - -### Census.Camera - -This event sends data about the resolution of cameras on the device, to help keep Windows up to date. - -The following fields are available: - -- **FrontFacingCameraResolution** Represents the resolution of the front facing camera in megapixels. If a front facing camera does not exist, then the value is 0. -- **RearFacingCameraResolution** Represents the resolution of the rear facing camera in megapixels. If a rear facing camera does not exist, then the value is 0. - - -### Census.Enterprise - -This event sends data about Azure presence, type, and cloud domain use in order to provide an understanding of the use and integration of devices in an enterprise, cloud, and server environment. - -The following fields are available: - -- **AADDeviceId** Azure Active Directory device ID. -- **AzureOSIDPresent** Represents the field used to identify an Azure machine. -- **AzureVMType** Represents whether the instance is Azure VM PAAS, Azure VM IAAS or any other VMs. -- **CDJType** Represents the type of cloud domain joined for the machine. -- **CommercialId** Represents the GUID for the commercial entity which the device is a member of.  Will be used to reflect insights back to customers. -- **ContainerType** The type of container, such as process or virtual machine hosted. -- **EnrollmentType** Defines the type of MDM enrollment on the device. -- **HashedDomain** The hashed representation of the user domain used for login. -- **IsCloudDomainJoined** Is this device joined to an Azure Active Directory (AAD) tenant? true/false -- **IsDERequirementMet** Represents if the device can do device encryption. -- **IsDeviceProtected** Represents if Device protected by BitLocker/Device Encryption -- **IsDomainJoined** Indicates whether a machine is joined to a domain. -- **IsEDPEnabled** Represents if Enterprise data protected on the device. -- **IsMDMEnrolled** Whether the device has been MDM Enrolled or not. -- **MPNId** Returns the Partner ID/MPN ID from Regkey. HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\DeployID -- **SCCMClientId** This ID correlate systems that send data to Compat Analytics (OMS) and other OMS based systems with systems in an Enterprise SCCM environment. -- **ServerFeatures** Represents the features installed on a Windows   Server. This can be used by developers and administrators who need to automate the process of determining the features installed on a set of server computers. -- **SystemCenterID** The SCCM ID is an anonymized one-way hash of the Active Directory Organization identifier - - -### Census.Firmware - -This event sends data about the BIOS and startup embedded in the device, to help keep Windows up to date. - -The following fields are available: - -- **FirmwareManufacturer** Represents the manufacturer of the device's firmware (BIOS). -- **FirmwareReleaseDate** Represents the date the current firmware was released. -- **FirmwareType** Represents the firmware type. The various types can be unknown, BIOS, UEFI. -- **FirmwareVersion** Represents the version of the current firmware. - - -### Census.Flighting - -This event sends Windows Insider data from customers participating in improvement testing and feedback programs, to help keep Windows up to date. - -The following fields are available: - -- **DeviceSampleRate** The telemetry sample rate assigned to the device. -- **EnablePreviewBuilds** Used to enable Windows Insider builds on a device. -- **FlightIds** A list of the different Windows Insider builds on this device. -- **FlightingBranchName** The name of the Windows Insider branch currently used by the device. -- **IsFlightsDisabled** Represents if the device is participating in the Windows Insider program. -- **MSA_Accounts** Represents a list of hashed IDs of the Microsoft Accounts that are flighting (pre-release builds) on this device. -- **SSRK** Retrieves the mobile targeting settings. - - -### Census.Hardware - -This event sends data about the device, including hardware type, OEM brand, model line, model, telemetry level setting, and TPM support, to help keep Windows up to date. - -The following fields are available: - -- **ActiveMicCount** The number of active microphones attached to the device. -- **ChassisType** Represents the type of device chassis, such as desktop or low profile desktop. The possible values can range between 1 - 36. -- **ComputerHardwareID** Identifies a device class that is represented by a hash of different SMBIOS fields. -- **D3DMaxFeatureLevel** Supported Direct3D version. -- **DeviceColor** Indicates a color of the device. -- **DeviceForm** Indicates the form as per the device classification. -- **DeviceName** The device name that is set by the user. -- **DigitizerSupport** Is a digitizer supported? -- **DUID** The device unique ID. -- **Gyroscope** Indicates whether the device has a gyroscope (a mechanical component that measures and maintains orientation). -- **InventoryId** The device ID used for compatibility testing. -- **Magnetometer** Indicates whether the device has a magnetometer (a mechanical component that works like a compass). -- **NFCProximity** Indicates whether the device supports NFC (a set of communication protocols that helps establish communication when applicable devices are brought close together.) -- **OEMDigitalMarkerFileName** The name of the file placed in the \Windows\system32\drivers directory that specifies the OEM and model name of the device. -- **OEMManufacturerName** The device manufacturer name. The OEMName for an inactive device is not reprocessed even if the clean OEM name is changed at a later date. -- **OEMModelBaseBoard** The baseboard model used by the OEM. -- **OEMModelBaseBoardVersion** Differentiates between developer and retail devices. -- **OEMModelName** The device model name. -- **OEMModelNumber** The device model number. -- **OEMModelSKU** The device edition that is defined by the manufacturer. -- **OEMModelSystemFamily** The system family set on the device by an OEM. -- **OEMModelSystemVersion** The system model version set on the device by the OEM. -- **OEMOptionalIdentifier** A Microsoft assigned value that represents a specific OEM subsidiary. -- **OEMSerialNumber** The serial number of the device that is set by the manufacturer. -- **PhoneManufacturer** The friendly name of the phone manufacturer. -- **PowerPlatformRole** The OEM preferred power management profile. It's used to help to identify the basic form factor of the device. -- **SoCName** The firmware manufacturer of the device. -- **StudyID** Used to identify retail and non-retail device. -- **TelemetryLevel** The telemetry level the user has opted into, such as Basic or Enhanced. -- **TelemetryLevelLimitEnhanced** The telemetry level for Windows Analytics-based solutions. -- **TelemetrySettingAuthority** Determines who set the telemetry level, such as GP, MDM, or the user. -- **TPMManufacturerId** The ID of the TPM manufacturer. -- **TPMManufacturerVersion** The version of the TPM manufacturer. -- **TPMVersion** The supported Trusted Platform Module (TPM) on the device. If no TPM is present, the value is 0. -- **VoiceSupported** Does the device have a cellular radio capable of making voice calls? - - -### Census.Memory - -This event sends data about the memory on the device, including ROM and RAM, to help keep Windows up to date. - -The following fields are available: - -- **TotalPhysicalRAM** Represents the physical memory (in MB). -- **TotalVisibleMemory** Represents the memory that is not reserved by the system. - - -### Census.Network - -This event sends data about the mobile and cellular network used by the device (mobile service provider, network, device ID, and service cost factors), to help keep Windows up to date. - -The following fields are available: - -- **IMEI0** Represents the International Mobile Station Equipment Identity. This number is usually unique and used by the mobile operator to distinguish different phone hardware. Microsoft does not have access to mobile operator billing data so collecting this data does not expose or identify the user. The two fields represent phone with dual sim coverage. -- **IMEI1** Represents the International Mobile Station Equipment Identity. This number is usually unique and used by the mobile operator to distinguish different phone hardware. Microsoft does not have access to mobile operator billing data so collecting this data does not expose or identify the user. The two fields represent phone with dual sim coverage. -- **MCC0** Represents the Mobile Country Code (MCC). It used with the Mobile Network Code (MNC) to uniquely identify a mobile network operator. The two fields represent phone with dual sim coverage. -- **MCC1** Represents the Mobile Country Code (MCC). It used with the Mobile Network Code (MNC) to uniquely identify a mobile network operator. The two fields represent phone with dual sim coverage. -- **MEID** Represents the Mobile Equipment Identity (MEID). MEID is a worldwide unique phone ID assigned to CDMA phones. MEID replaces electronic serial number (ESN), and is equivalent to IMEI for GSM and WCDMA phones. Microsoft does not have access to mobile operator billing data so collecting this data does not expose or identify the user. -- **MNC0** Retrieves the Mobile Network Code (MNC). It used with the Mobile Country Code (MCC) to uniquely identify a mobile network operator. The two fields represent phone with dual sim coverage. -- **MNC1** Retrieves the Mobile Network Code (MNC). It used with the Mobile Country Code (MCC) to uniquely identify a mobile network operator. The two fields represent phone with dual sim coverage. -- **MobileOperatorBilling** Represents the telephone company that provides services for mobile phone users. -- **MobileOperatorCommercialized** Represents which reseller and geography the phone is commercialized for. This is the set of values on the phone for who and where it was intended to be used. For example, the commercialized mobile operator code AT&T in the US would be ATT-US. -- **MobileOperatorNetwork0** Represents the operator of the current mobile network that the device is used on. (AT&T, T-Mobile, Vodafone). The two fields represent phone with dual sim coverage. -- **MobileOperatorNetwork1** Represents the operator of the current mobile network that the device is used on. (AT&T, T-Mobile, Vodafone). The two fields represent phone with dual sim coverage. -- **NetworkAdapterGUID** The GUID of the primary network adapter. -- **NetworkCost** Represents the network cost associated with a connection. -- **SPN0** Retrieves the Service Provider Name (SPN). For example, these might be AT&T, Sprint, T-Mobile, or Verizon. The two fields represent phone with dual sim coverage. -- **SPN1** Retrieves the Service Provider Name (SPN). For example, these might be AT&T, Sprint, T-Mobile, or Verizon. The two fields represent phone with dual sim coverage. - - -### Census.OS - -This event sends data about the operating system such as the version, locale, update service configuration, when and how it was originally installed, and whether it is a virtual device, to help keep Windows up to date. - -The following fields are available: - -- **ActivationChannel** Retrieves the retail license key or Volume license key for a machine. -- **AssignedAccessStatus** Kiosk configuration mode. -- **CompactOS** Indicates if the Compact OS feature from Win10 is enabled. -- **DeveloperUnlockStatus** Represents if a device has been developer unlocked by the user or Group Policy. -- **DeviceTimeZone** The time zone that is set on the device. Example: Pacific Standard Time -- **GenuineState** Retrieves the ID Value specifying the OS Genuine check. -- **InstallationType** Retrieves the type of OS installation. (Clean, Upgrade, Reset, Refresh, Update). -- **InstallLanguage** The first language installed on the user machine. -- **IsDeviceRetailDemo** Retrieves if the device is running in demo mode. -- **IsEduData** Returns Boolean if the education data policy is enabled. -- **IsPortableOperatingSystem** Retrieves whether OS is running Windows-To-Go -- **IsSecureBootEnabled** Retrieves whether Boot chain is signed under UEFI. -- **LanguagePacks** The list of language packages installed on the device. -- **LicenseStateReason** Retrieves why (or how) a system is licensed or unlicensed. The HRESULT may indicate an error code that indicates a key blocked error, or it may indicate that we are running an OS License granted by the MS store. -- **OA3xOriginalProductKey** Retrieves the License key stamped by the OEM to the machine. -- **OSEdition** Retrieves the version of the current OS. -- **OSInstallType** Retrieves a numeric description of what install was used on the device i.e. clean, upgrade, refresh, reset, etc -- **OSOOBEDateTime** Retrieves Out of Box Experience (OOBE) Date in Coordinated Universal Time (UTC). -- **OSSKU** Retrieves the Friendly Name of OS Edition. -- **OSSubscriptionStatus** Represents the existing status for enterprise subscription feature for PRO machines. -- **OSSubscriptionTypeId** Returns boolean for enterprise subscription feature for selected PRO machines. -- **OSTimeZoneBiasInMins** Retrieves the time zone set on machine. -- **OSUILocale** Retrieves the locale of the UI that is currently used by the OS. -- **ProductActivationResult** Returns Boolean if the OS Activation was successful. -- **ProductActivationTime** Returns the OS Activation time for tracking piracy issues. -- **ProductKeyID2** Retrieves the License key if the machine is updated with a new license key. -- **RACw7Id** Retrieves the Microsoft Reliability Analysis Component (RAC) Win7 Identifier. RAC is used to monitor and analyze system usage and reliability. -- **ServiceMachineIP** Retrieves the IP address of the KMS host used for anti-piracy. -- **ServiceMachinePort** Retrieves the port of the KMS host used for anti-piracy. -- **ServiceProductKeyID** Retrieves the License key of the KMS -- **SharedPCMode** Returns Boolean for education devices used as shared cart -- **Signature** Retrieves if it is a signature machine sold by Microsoft store. -- **SLICStatus** Whether a SLIC table exists on the device. -- **SLICVersion** Returns OS type/version from SLIC table. - - -### Census.PrivacySettings - -This event provides information about the device level privacy settings and whether device-level access was granted to these capabilities. Not all settings are applicable to all devices. Each field records the consent state for the corresponding privacy setting. The consent state is encoded as a 16-bit signed integer, where the first 8 bits represents the effective consent value, and the last 8 bits represent the authority that set the value. The effective consent (first 8 bits) is one of the following values: -3 = unexpected consent value, -2 = value was not requested, -1 = an error occurred while attempting to retrieve the value, 0 = undefined, 1 = allow, 2 = deny, 3 = prompt. The consent authority (last 8 bits) is one of the following values: -3 = unexpected authority, -2 = value was not requested, -1 = an error occurred while attempting to retrieve the value, 0 = system, 1 = a higher authority (a gating setting, the system-wide setting, or a group policy), 2 = advertising ID group policy, 3 = advertising ID policy for child account, 4 = privacy setting provider doesn't know the actual consent authority, 5 = consent was not configured and a default set in code was used, 6 = system default, 7 = organization policy, 8 = OneSettings. - -The following fields are available: - -- **Activity** Current state of the activity history setting. -- **ActivityHistoryCloudSync** Current state of the activity history cloud sync setting. -- **ActivityHistoryCollection** Current state of the activity history collection setting. -- **AdvertisingId** Current state of the advertising ID setting. -- **AppDiagnostics** Current state of the app diagnostics setting. -- **Appointments** Current state of the calendar setting. -- **Bluetooth** Current state of the Bluetooth capability setting. -- **BluetoothSync** Current state of the Bluetooth sync capability setting. -- **BroadFileSystemAccess** Current state of the broad file system access setting. -- **CellularData** Current state of the cellular data capability setting. -- **Chat** Current state of the chat setting. -- **Contacts** Current state of the contacts setting. -- **DocumentsLibrary** Current state of the documents library setting. -- **Email** Current state of the email setting. -- **FindMyDevice** Current state of the "find my device" setting. -- **GazeInput** Current state of the gaze input setting. -- **HumanInterfaceDevice** Current state of the human interface device setting. -- **InkTypeImprovement** Current state of the improve inking and typing setting. -- **Location** Current state of the location setting. -- **LocationHistory** Current state of the location history setting. -- **LocationHistoryCloudSync** Current state of the location history cloud sync setting. -- **LocationHistoryOnTimeline** Current state of the location history on timeline setting. -- **Microphone** Current state of the microphone setting. -- **PhoneCall** Current state of the phone call setting. -- **PhoneCallHistory** Current state of the call history setting. -- **PicturesLibrary** Current state of the pictures library setting. -- **Radios** Current state of the radios setting. -- **SensorsCustom** Current state of the custom sensor setting. -- **SerialCommunication** Current state of the serial communication setting. -- **Sms** Current state of the text messaging setting. -- **SpeechPersonalization** Current state of the speech services setting. -- **USB** Current state of the USB setting. -- **UserAccountInformation** Current state of the account information setting. -- **UserDataTasks** Current state of the tasks setting. -- **UserNotificationListener** Current state of the notifications setting. -- **VideosLibrary** Current state of the videos library setting. -- **Webcam** Current state of the camera setting. -- **WiFiDirect** Current state of the Wi-Fi direct setting. - - -### Census.Processor - -Provides information on several important data points about Processor settings - -The following fields are available: - -- **KvaShadow** This is the micro code information of the processor. -- **MMSettingOverride** Microcode setting of the processor. -- **MMSettingOverrideMask** Microcode setting override of the processor. -- **PreviousUpdateRevision** Previous microcode revision -- **ProcessorArchitecture** Retrieves the processor architecture of the installed operating system. -- **ProcessorClockSpeed** Clock speed of the processor in MHz. -- **ProcessorCores** Number of logical cores in the processor. -- **ProcessorIdentifier** Processor Identifier of a manufacturer. -- **ProcessorManufacturer** Name of the processor manufacturer. -- **ProcessorModel** Name of the processor model. -- **ProcessorPhysicalCores** Number of physical cores in the processor. -- **ProcessorUpdateRevision** The microcode revision. -- **ProcessorUpdateStatus** Enum value that represents the processor microcode load status -- **SocketCount** Count of CPU sockets. -- **SpeculationControl** Indicates whether the system has enabled protections needed to validate the speculation control vulnerability. - - -### Census.Security - -This event provides information on about security settings used to help keep Windows up to date and secure. - -The following fields are available: - -- **AvailableSecurityProperties** This field helps to enumerate and report state on the relevant security properties for Device Guard. -- **CGRunning** Credential Guard isolates and hardens key system and user secrets against compromise, helping to minimize the impact and breadth of a Pass the Hash style attack in the event that malicious code is already running via a local or network based vector. This field tells if Credential Guard is running. -- **DGState** This field summarizes the Device Guard state. -- **HVCIRunning** Hypervisor Code Integrity (HVCI) enables Device Guard to help protect kernel mode processes and drivers from vulnerability exploits and zero days. HVCI uses the processor’s functionality to force all software running in kernel mode to safely allocate memory. This field tells if HVCI is running. -- **IsSawGuest** Indicates whether the device is running as a Secure Admin Workstation Guest. -- **IsSawHost** Indicates whether the device is running as a Secure Admin Workstation Host. -- **RequiredSecurityProperties** Describes the required security properties to enable virtualization-based security. -- **SecureBootCapable** Systems that support Secure Boot can have the feature turned off via BIOS. This field tells if the system is capable of running Secure Boot, regardless of the BIOS setting. -- **SModeState** The Windows S mode trail state. -- **VBSState** Virtualization-based security (VBS) uses the hypervisor to help protect the kernel and other parts of the operating system. Credential Guard and Hypervisor Code Integrity (HVCI) both depend on VBS to isolate/protect secrets, and kernel-mode code integrity validation. VBS has a tri-state that can be Disabled, Enabled, or Running. - - -### Census.Speech - -This event is used to gather basic speech settings on the device. - -The following fields are available: - -- **AboveLockEnabled** Cortana setting that represents if Cortana can be invoked when the device is locked. -- **GPAllowInputPersonalization** Indicates if a Group Policy setting has enabled speech functionalities. -- **HolographicSpeechInputDisabled** Holographic setting that represents if the attached HMD devices have speech functionality disabled by the user. -- **HolographicSpeechInputDisabledRemote** Indicates if a remote policy has disabled speech functionalities for the HMD devices. -- **KeyVer** Version information for the census speech event. -- **KWSEnabled** Cortana setting that represents if a user has enabled the "Hey Cortana" keyword spotter (KWS). -- **MDMAllowInputPersonalization** Indicates if an MDM policy has enabled speech functionalities. -- **RemotelyManaged** Indicates if the device is being controlled by a remote administrator (MDM or Group Policy) in the context of speech functionalities. -- **SpeakerIdEnabled** Cortana setting that represents if keyword detection has been trained to try to respond to a single user's voice. -- **SpeechServicesEnabled** Windows setting that represents whether a user is opted-in for speech services on the device. -- **SpeechServicesValueSource** Indicates the deciding factor for the effective online speech recognition privacy policy settings: remote admin, local admin, or user preference. - - -### Census.Storage - -This event sends data about the total capacity of the system volume and primary disk, to help keep Windows up to date. - -The following fields are available: - -- **PrimaryDiskTotalCapacity** Retrieves the amount of disk space on the primary disk of the device in MB. -- **PrimaryDiskType** Retrieves an enumerator value of type STORAGE_BUS_TYPE that indicates the type of bus to which the device is connected. This should be used to interpret the raw device properties at the end of this structure (if any). -- **StorageReservePassedPolicy** Indicates whether the Storage Reserve policy, which ensures that updates have enough disk space and customers are on the latest OS, is enabled on this device. -- **SystemVolumeTotalCapacity** Retrieves the size of the partition that the System volume is installed on in MB. - - -### Census.Userdefault - -This event sends data about the current user's default preferences for browser and several of the most popular extensions and protocols, to help keep Windows up to date. - -The following fields are available: - -- **CalendarType** The calendar identifiers that are used to specify different calendars. -- **DefaultApp** The current uer's default program selected for the following extension or protocol: .html, .htm, .jpg, .jpeg, .png, .mp3, .mp4, .mov, .pdf. -- **DefaultBrowserProgId** The ProgramId of the current user's default browser. -- **LongDateFormat** The long date format the user has selected. -- **ShortDateFormat** The short date format the user has selected. - - -### Census.UserDisplay - -This event sends data about the logical/physical display size, resolution and number of internal/external displays, and VRAM on the system, to help keep Windows up to date. - -The following fields are available: - -- **InternalPrimaryDisplayLogicalDPIX** Retrieves the logical DPI in the x-direction of the internal display. -- **InternalPrimaryDisplayLogicalDPIY** Retrieves the logical DPI in the y-direction of the internal display. -- **InternalPrimaryDisplayPhysicalDPIX** Retrieves the physical DPI in the x-direction of the internal display. -- **InternalPrimaryDisplayPhysicalDPIY** Retrieves the physical DPI in the y-direction of the internal display. -- **InternalPrimaryDisplayResolutionHorizontal** Retrieves the number of pixels in the horizontal direction of the internal display. -- **InternalPrimaryDisplayResolutionVertical** Retrieves the number of pixels in the vertical direction of the internal display. -- **InternalPrimaryDisplaySizePhysicalH** Retrieves the physical horizontal length of the display in mm. Used for calculating the diagonal length in inches . -- **InternalPrimaryDisplaySizePhysicalY** Retrieves the physical vertical length of the display in mm. Used for calculating the diagonal length in inches -- **NumberofExternalDisplays** Retrieves the number of external displays connected to the machine -- **NumberofInternalDisplays** Retrieves the number of internal displays in a machine. -- **VRAMDedicated** Retrieves the video RAM in MB. -- **VRAMDedicatedSystem** Retrieves the amount of memory on the dedicated video card. -- **VRAMSharedSystem** Retrieves the amount of RAM memory that the video card can use. - - -### Census.UserNLS - -This event sends data about the default app language, input, and display language preferences set by the user, to help keep Windows up to date. - -The following fields are available: - -- **DefaultAppLanguage** The current user Default App Language. -- **DisplayLanguage** The current user preferred Windows Display Language. -- **HomeLocation** The current user location, which is populated using GetUserGeoId() function. -- **KeyboardInputLanguages** The Keyboard input languages installed on the device. -- **SpeechInputLanguages** The Speech Input languages installed on the device. - - -### Census.UserPrivacySettings - -This event provides information about the current users privacy settings and whether device-level access was granted to these capabilities. Not all settings are applicable to all devices. Each field records the consent state for the corresponding privacy setting. The consent state is encoded as a 16-bit signed integer, where the first 8 bits represents the effective consent value, and the last 8 bits represents the authority that set the value. The effective consent is one of the following values: -3 = unexpected consent value, -2 = value was not requested, -1 = an error occurred while attempting to retrieve the value, 0 = undefined, 1 = allow, 2 = deny, 3 = prompt. The consent authority is one of the following values: -3 = unexpected authority, -2 = value was not requested, -1 = an error occurred while attempting to retrieve the value, 0 = user, 1 = a higher authority (a gating setting, the system-wide setting, or a group policy), 2 = advertising ID group policy, 3 = advertising ID policy for child account, 4 = privacy setting provider doesn't know the actual consent authority, 5 = consent was not configured and a default set in code was used, 6 = system default, 7 = organization policy, 8 = OneSettings. - -The following fields are available: - -- **Activity** Current state of the activity history setting. -- **ActivityHistoryCloudSync** Current state of the activity history cloud sync setting. -- **ActivityHistoryCollection** Current state of the activity history collection setting. -- **AdvertisingId** Current state of the advertising ID setting. -- **AppDiagnostics** Current state of the app diagnostics setting. -- **Appointments** Current state of the calendar setting. -- **Bluetooth** Current state of the Bluetooth capability setting. -- **BluetoothSync** Current state of the Bluetooth sync capability setting. -- **BroadFileSystemAccess** Current state of the broad file system access setting. -- **CellularData** Current state of the cellular data capability setting. -- **Chat** Current state of the chat setting. -- **Contacts** Current state of the contacts setting. -- **DocumentsLibrary** Current state of the documents library setting. -- **Email** Current state of the email setting. -- **GazeInput** Current state of the gaze input setting. -- **HumanInterfaceDevice** Current state of the human interface device setting. -- **InkTypeImprovement** Current state of the improve inking and typing setting. -- **InkTypePersonalization** Current state of the inking and typing personalization setting. -- **Location** Current state of the location setting. -- **LocationHistory** Current state of the location history setting. -- **LocationHistoryCloudSync** Current state of the location history cloud synchronization setting. -- **LocationHistoryOnTimeline** Current state of the location history on timeline setting. -- **Microphone** Current state of the microphone setting. -- **PhoneCall** Current state of the phone call setting. -- **PhoneCallHistory** Current state of the call history setting. -- **PicturesLibrary** Current state of the pictures library setting. -- **Radios** Current state of the radios setting. -- **SensorsCustom** Current state of the custom sensor setting. -- **SerialCommunication** Current state of the serial communication setting. -- **Sms** Current state of the text messaging setting. -- **SpeechPersonalization** Current state of the speech services setting. -- **USB** Current state of the USB setting. -- **UserAccountInformation** Current state of the account information setting. -- **UserDataTasks** Current state of the tasks setting. -- **UserNotificationListener** Current state of the notifications setting. -- **VideosLibrary** Current state of the videos library setting. -- **Webcam** Current state of the camera setting. -- **WiFiDirect** Current state of the Wi-Fi direct setting. - - -### Census.VM - -This event sends data indicating whether virtualization is enabled on the device, and its various characteristics, to help keep Windows up to date. - -The following fields are available: - -- **CloudService** Indicates which cloud service, if any, that this virtual machine is running within. -- **HyperVisor** Retrieves whether the current OS is running on top of a Hypervisor. -- **IOMMUPresent** Represents if an input/output memory management unit (IOMMU) is present. -- **IsVDI** Is the device using Virtual Desktop Infrastructure? -- **IsVirtualDevice** Retrieves that when the Hypervisor is Microsoft's Hyper-V Hypervisor or other Hv#1 Hypervisor, this field will be set to FALSE for the Hyper-V host OS and TRUE for any guest OS's. This field should not be relied upon for non-Hv#1 Hypervisors. -- **SLATSupported** Represents whether Second Level Address Translation (SLAT) is supported by the hardware. -- **VirtualizationFirmwareEnabled** Represents whether virtualization is enabled in the firmware. - - -### Census.WU - -This event sends data about the Windows update server and other App store policies, to help keep Windows up to date. - -The following fields are available: - -- **AppraiserGatedStatus** Indicates whether a device has been gated for upgrading. -- **AppStoreAutoUpdate** Retrieves the Appstore settings for auto upgrade. (Enable/Disabled). -- **AppStoreAutoUpdateMDM** Retrieves the App Auto Update value for MDM: 0 - Disallowed. 1 - Allowed. 2 - Not configured. Default: [2] Not configured -- **AppStoreAutoUpdatePolicy** Retrieves the Microsoft Store App Auto Update group policy setting -- **DelayUpgrade** Retrieves the Windows upgrade flag for delaying upgrades. -- **OSAssessmentFeatureOutOfDate** How many days has it been since a the last feature update was released but the device did not install it? -- **OSAssessmentForFeatureUpdate** Is the device is on the latest feature update? -- **OSAssessmentForQualityUpdate** Is the device on the latest quality update? -- **OSAssessmentForSecurityUpdate** Is the device on the latest security update? -- **OSAssessmentQualityOutOfDate** How many days has it been since a the last quality update was released but the device did not install it? -- **OSAssessmentReleaseInfoTime** The freshness of release information used to perform an assessment. -- **OSRollbackCount** The number of times feature updates have rolled back on the device. -- **OSRolledBack** A flag that represents when a feature update has rolled back during setup. -- **OSUninstalled** A flag that represents when a feature update is uninstalled on a device . -- **OSWUAutoUpdateOptions** Retrieves the auto update settings on the device. -- **OSWUAutoUpdateOptionsSource** The source of auto update setting that appears in the OSWUAutoUpdateOptions field. For example: Group Policy (GP), Mobile Device Management (MDM), and Default. -- **UninstallActive** A flag that represents when a device has uninstalled a previous upgrade recently. -- **UpdateServiceURLConfigured** Retrieves if the device is managed by Windows Server Update Services (WSUS). -- **WUDeferUpdatePeriod** Retrieves if deferral is set for Updates. -- **WUDeferUpgradePeriod** Retrieves if deferral is set for Upgrades. -- **WUDODownloadMode** Retrieves whether DO is turned on and how to acquire/distribute updates Delivery Optimization (DO) allows users to deploy previously downloaded WU updates to other devices on the same network. -- **WUMachineId** Retrieves the Windows Update (WU) Machine Identifier. -- **WUPauseState** Retrieves WU setting to determine if updates are paused. -- **WUServer** Retrieves the HTTP(S) URL of the WSUS server that is used by Automatic Updates and API callers (by default). - - -### Census.Xbox - -This event sends data about the Xbox Console, such as Serial Number and DeviceId, to help keep Windows up to date. - -The following fields are available: - -- **XboxConsolePreferredLanguage** Retrieves the preferred language selected by the user on Xbox console. -- **XboxConsoleSerialNumber** Retrieves the serial number of the Xbox console. -- **XboxLiveDeviceId** Retrieves the unique device ID of the console. -- **XboxLiveSandboxId** Retrieves the developer sandbox ID if the device is internal to Microsoft. - - -## Common data extensions - -### Common Data Extensions.app - -Describes the properties of the running application. This extension could be populated by a client app or a web app. - -The following fields are available: - -- **asId** An integer value that represents the app session. This value starts at 0 on the first app launch and increments after each subsequent app launch per boot session. -- **env** The environment from which the event was logged. -- **expId** Associates a flight, such as an OS flight, or an experiment, such as a web site UX experiment, with an event. -- **id** Represents a unique identifier of the client application currently loaded in the process producing the event; and is used to group events together and understand usage pattern, errors by application. -- **locale** The locale of the app. -- **name** The name of the app. -- **userId** The userID as known by the application. -- **ver** Represents the version number of the application. Used to understand errors by Version, Usage by Version across an app. - - -### Common Data Extensions.container - -Describes the properties of the container for events logged within a container. - -The following fields are available: - -- **epoch** An ID that's incremented for each SDK initialization. -- **localId** The device ID as known by the client. -- **osVer** The operating system version. -- **seq** An ID that's incremented for each event. -- **type** The container type. Examples: Process or VMHost - - -### Common Data Extensions.cs - -Describes properties related to the schema of the event. - -The following fields are available: - -- **sig** A common schema signature that identifies new and modified event schemas. - - -### Common Data Extensions.device - -Describes the device-related fields. - -The following fields are available: - -- **deviceClass** The device classification. For example, Desktop, Server, or Mobile. -- **localId** A locally-defined unique ID for the device. This is not the human-readable device name. Most likely equal to the value stored at HKLM\Software\Microsoft\SQMClient\MachineId -- **make** Device manufacturer. -- **model** Device model. - - -### Common Data Extensions.Envelope - -Represents an envelope that contains all of the common data extensions. - -The following fields are available: - -- **cV** Represents the Correlation Vector: A single field for tracking partial order of related telemetry events across component boundaries. -- **data** Represents the optional unique diagnostic data for a particular event schema. -- **ext_app** Describes the properties of the running application. This extension could be populated by either a client app or a web app. See [Common Data Extensions.app](#common-data-extensionsapp). -- **ext_container** Describes the properties of the container for events logged within a container. See [Common Data Extensions.container](#common-data-extensionscontainer). -- **ext_cs** Describes properties related to the schema of the event. See [Common Data Extensions.cs](#common-data-extensionscs). -- **ext_device** Describes the device-related fields. See [Common Data Extensions.device](#common-data-extensionsdevice). -- **ext_os** Describes the operating system properties that would be populated by the client. See [Common Data Extensions.os](#common-data-extensionsos). -- **ext_receipts** Describes the fields related to time as provided by the client for debugging purposes. See [Common Data Extensions.receipts](#common-data-extensionsreceipts). -- **ext_sdk** Describes the fields related to a platform library required for a specific SDK. See [Common Data Extensions.sdk](#common-data-extensionssdk). -- **ext_user** Describes the fields related to a user. See [Common Data Extensions.user](#common-data-extensionsuser). -- **ext_utc** Describes the fields that might be populated by a logging library on Windows. See [Common Data Extensions.utc](#common-data-extensionsutc). -- **ext_xbl** Describes the fields related to XBOX Live. See [Common Data Extensions.xbl](#common-data-extensionsxbl). -- **flags** Represents a collection of bits that describe how the event should be processed by the Connected User Experience and Telemetry component pipeline. The lowest-order byte is the event persistence. The next byte is the event latency. -- **iKey** Represents an ID for applications or other logical groupings of events. -- **name** Represents the uniquely qualified name for the event. -- **popSample** Represents the effective sample rate for this event at the time it was generated by a client. -- **time** Represents the event date time in Coordinated Universal Time (UTC) when the event was generated on the client. This should be in ISO 8601 format. -- **ver** Represents the major and minor version of the extension. - - -### Common Data Extensions.os - -Describes some properties of the operating system. - -The following fields are available: - -- **bootId** An integer value that represents the boot session. This value starts at 0 on first boot after OS install and increments after every reboot. -- **expId** Represents the experiment ID. The standard for associating a flight, such as an OS flight (pre-release build), or an experiment, such as a web site UX experiment, with an event is to record the flight / experiment IDs in Part A of the common schema. -- **locale** Represents the locale of the operating system. -- **name** Represents the operating system name. -- **ver** Represents the major and minor version of the extension. - - -### Common Data Extensions.receipts - -Represents various time information as provided by the client and helps for debugging purposes. - -The following fields are available: - -- **originalTime** The original event time. -- **uploadTime** The time the event was uploaded. - - -### Common Data Extensions.sdk - -Used by platform specific libraries to record fields that are required for a specific SDK. - -The following fields are available: - -- **epoch** An ID that is incremented for each SDK initialization. -- **installId** An ID that's created during the initialization of the SDK for the first time. -- **libVer** The SDK version. -- **seq** An ID that is incremented for each event. - - -### Common Data Extensions.user - -Describes the fields related to a user. - -The following fields are available: - -- **authId** This is an ID of the user associated with this event that is deduced from a token such as a Microsoft Account ticket or an XBOX token. -- **locale** The language and region. -- **localId** Represents a unique user identity that is created locally and added by the client. This is not the user's account ID. - - -### Common Data Extensions.utc - -Describes the properties that could be populated by a logging library on Windows. - -The following fields are available: - -- **aId** Represents the ETW ActivityId. Logged via TraceLogging or directly via ETW. -- **bSeq** Upload buffer sequence number in the format: buffer identifier:sequence number -- **cat** Represents a bitmask of the ETW Keywords associated with the event. -- **cpId** The composer ID, such as Reference, Desktop, Phone, Holographic, Hub, IoT Composer. -- **epoch** Represents the epoch and seqNum fields, which help track how many events were fired and how many events were uploaded, and enables identification of data lost during upload and de-duplication of events on the ingress server. -- **flags** Represents the bitmap that captures various Windows specific flags. -- **mon** Combined monitor and event sequence numbers in the format: monitor sequence : event sequence -- **op** Represents the ETW Op Code. -- **raId** Represents the ETW Related ActivityId. Logged via TraceLogging or directly via ETW. -- **seq** Represents the sequence field used to track absolute order of uploaded events. It is an incrementing identifier for each event added to the upload queue. The Sequence helps track how many events were fired and how many events were uploaded and enables identification of data lost during upload and de-duplication of events on the ingress server. -- **stId** Represents the Scenario Entry Point ID. This is a unique GUID for each event in a diagnostic scenario. This used to be Scenario Trigger ID. - - -### Common Data Extensions.xbl - -Describes the fields that are related to XBOX Live. - -The following fields are available: - -- **claims** Any additional claims whose short claim name hasn't been added to this structure. -- **did** XBOX device ID -- **dty** XBOX device type -- **dvr** The version of the operating system on the device. -- **eid** A unique ID that represents the developer entity. -- **exp** Expiration time -- **ip** The IP address of the client device. -- **nbf** Not before time -- **pid** A comma separated list of PUIDs listed as base10 numbers. -- **sbx** XBOX sandbox identifier -- **sid** The service instance ID. -- **sty** The service type. -- **tid** The XBOX Live title ID. -- **tvr** The XBOX Live title version. -- **uts** A bit field, with 2 bits being assigned to each user ID listed in xid. This field is omitted if all users are retail accounts. -- **xid** A list of base10-encoded XBOX User IDs. - - -## Common data fields - -### Ms.Device.DeviceInventoryChange - -Describes the installation state for all hardware and software components available on a particular device. - -The following fields are available: - -- **action** The change that was invoked on a device inventory object. -- **inventoryId** Device ID used for Compatibility testing -- **objectInstanceId** Object identity which is unique within the device scope. -- **objectType** Indicates the object type that the event applies to. -- **objectType(objectInstanceId** No content is currently available. -- **syncId** A string used to group StartSync, EndSync, Add, and Remove operations that belong together. This field is unique by Sync period and is used to disambiguate in situations where multiple agents perform overlapping inventories for the same object. - - -## Compatibility events - -### Microsoft.Windows.Compatibility.Apphelp.SdbFix - -Product instrumentation for helping debug/troubleshoot issues with inbox compatibility components. - -The following fields are available: - -- **AppName** Name of the application impacted by SDB. -- **FixID** SDB GUID. -- **Flags** List of flags applied. -- **ImageName** Name of file. - - -## Component-based servicing events - -### CbsServicingProvider.CbsCapabilityEnumeration - -This event reports on the results of scanning for optional Windows content on Windows Update. - -The following fields are available: - -- **architecture** Indicates the scan was limited to the specified architecture. -- **capabilityCount** The number of optional content packages found during the scan. -- **clientId** The name of the application requesting the optional content. -- **duration** The amount of time it took to complete the scan. -- **hrStatus** The HReturn code of the scan. -- **language** Indicates the scan was limited to the specified language. -- **majorVersion** Indicates the scan was limited to the specified major version. -- **minorVersion** Indicates the scan was limited to the specified minor version. -- **namespace** Indicates the scan was limited to packages in the specified namespace. -- **sourceFilter** A bitmask indicating the scan checked for locally available optional content. -- **stackBuild** The build number of the servicing stack. -- **stackMajorVersion** The major version number of the servicing stack. -- **stackMinorVersion** The minor version number of the servicing stack. -- **stackRevision** The revision number of the servicing stack. - - -### CbsServicingProvider.CbsCapabilitySessionFinalize - -This event provides information about the results of installing or uninstalling optional Windows content from Windows Update. - -The following fields are available: - -- **capabilities** The names of the optional content packages that were installed. -- **clientId** The name of the application requesting the optional content. -- **currentID** The ID of the current install session. -- **downloadSource** The source of the download. -- **highestState** The highest final install state of the optional content. -- **hrLCUReservicingStatus** Indicates whether the optional content was updated to the latest available version. -- **hrStatus** The HReturn code of the install operation. -- **rebootCount** The number of reboots required to complete the install. -- **retryID** The session ID that will be used to retry a failed operation. -- **retryStatus** Indicates whether the install will be retried in the event of failure. -- **stackBuild** The build number of the servicing stack. -- **stackMajorVersion** The major version number of the servicing stack. -- **stackMinorVersion** The minor version number of the servicing stack. -- **stackRevision** The revision number of the servicing stack. - - -### CbsServicingProvider.CbsCapabilitySessionPended - -This event provides information about the results of installing optional Windows content that requires a reboot to keep Windows up to date. - -The following fields are available: - -- **clientId** The name of the application requesting the optional content. -- **pendingDecision** Indicates the cause of reboot, if applicable. - - -### CbsServicingProvider.CbsLateAcquisition - -This event sends data to indicate if some Operating System packages could not be updated as part of an upgrade, to help keep Windows up to date. - -The following fields are available: - -- **Features** The list of feature packages that could not be updated. -- **RetryID** The ID identifying the retry attempt to update the listed packages. - - -### CbsServicingProvider.CbsPackageRemoval - -This event provides information about the results of uninstalling a Windows Cumulative Security Update to help keep Windows up to date. - -The following fields are available: - -- **buildVersion** The build number of the security update being uninstalled. -- **clientId** The name of the application requesting the uninstall. -- **currentStateEnd** The final state of the update after the operation. -- **failureDetails** Information about the cause of a failure, if applicable. -- **failureSourceEnd** The stage during the uninstall where the failure occurred. -- **hrStatusEnd** The overall exit code of the operation. -- **initiatedOffline** Indicates if the uninstall was initiated for a mounted Windows image. -- **majorVersion** The major version number of the security update being uninstalled. -- **minorVersion** The minor version number of the security update being uninstalled. -- **originalState** The starting state of the update before the operation. -- **pendingDecision** Indicates the cause of reboot, if applicable. -- **primitiveExecutionContext** The state during system startup when the uninstall was completed. -- **revisionVersion** The revision number of the security update being uninstalled. -- **transactionCanceled** Indicates whether the uninstall was cancelled. - - -### CbsServicingProvider.CbsQualityUpdateInstall - -This event reports on the performance and reliability results of installing Servicing content from Windows Update to keep Windows up to date. - -The following fields are available: - -- **buildVersion** The build version number of the update package. -- **clientId** The name of the application requesting the optional content. -- **corruptionHistoryFlags** A bitmask of the types of component store corruption that have caused update failures on the device. -- **corruptionType** An enumeration listing the type of data corruption responsible for the current update failure. -- **currentStateEnd** The final state of the package after the operation has completed. -- **doqTimeSeconds** The time in seconds spent updating drivers. -- **executeTimeSeconds** The number of seconds required to execute the install. -- **failureDetails** The driver or installer that caused the update to fail. -- **failureSourceEnd** An enumeration indicating at what phase of the update a failure occurred. -- **hrStatusEnd** The return code of the install operation. -- **initiatedOffline** A true or false value indicating whether the package was installed into an offline Windows Imaging Format (WIM) file. -- **majorVersion** The major version number of the update package. -- **minorVersion** The minor version number of the update package. -- **originalState** The starting state of the package. -- **overallTimeSeconds** The time (in seconds) to perform the overall servicing operation. -- **planTimeSeconds** The time in seconds required to plan the update operations. -- **poqTimeSeconds** The time in seconds processing file and registry operations. -- **postRebootTimeSeconds** The time (in seconds) to do startup processing for the update. -- **preRebootTimeSeconds** The time (in seconds) between execution of the installation and the reboot. -- **primitiveExecutionContext** An enumeration indicating at what phase of shutdown or startup the update was installed. -- **rebootCount** The number of reboots required to install the update. -- **rebootTimeSeconds** The time (in seconds) before startup processing begins for the update. -- **resolveTimeSeconds** The time in seconds required to resolve the packages that are part of the update. -- **revisionVersion** The revision version number of the update package. -- **rptTimeSeconds** The time in seconds spent executing installer plugins. -- **shutdownTimeSeconds** The time (in seconds) required to do shutdown processing for the update. -- **stackRevision** The revision number of the servicing stack. -- **stageTimeSeconds** The time (in seconds) required to stage all files that are part of the update. - - -### CbsServicingProvider.CbsSelectableUpdateChangeV2 - -This event reports the results of enabling or disabling optional Windows Content to keep Windows up to date. - -The following fields are available: - -- **applicableUpdateState** Indicates the highest applicable state of the optional content. -- **buildVersion** The build version of the package being installed. -- **clientId** The name of the application requesting the optional content change. -- **downloadSource** Indicates if optional content was obtained from Windows Update or a locally accessible file. -- **downloadtimeInSeconds** The number of seconds required to complete the optional content download. -- **executionID** A unique ID used to identify events associated with a single servicing operation and not reused for future operations. -- **executionSequence** A counter that tracks the number of servicing operations attempted on the device. -- **firstMergedExecutionSequence** The value of a pervious executionSequence counter that is being merged with the current operation, if applicable. -- **firstMergedID** A unique ID of a pervious servicing operation that is being merged with this operation, if applicable. -- **hrDownloadResult** The return code of the download operation. -- **hrStatusUpdate** The return code of the servicing operation. -- **identityHash** A pseudonymized (hashed) identifier for the Windows Package that is being installed or uninstalled. -- **initiatedOffline** Indicates whether the operation was performed against an offline Windows image file or a running instance of Windows. -- **majorVersion** The major version of the package being installed. -- **minorVersion** The minor version of the package being installed. -- **packageArchitecture** The architecture of the package being installed. -- **packageLanguage** The language of the package being installed. -- **packageName** The name of the package being installed. -- **rebootRequired** Indicates whether a reboot is required to complete the operation. -- **revisionVersion** The revision number of the package being installed. -- **stackBuild** The build number of the servicing stack binary performing the installation. -- **stackMajorVersion** The major version number of the servicing stack binary performing the installation. -- **stackMinorVersion** The minor version number of the servicing stack binary performing the installation. -- **stackRevision** The revision number of the servicing stack binary performing the installation. -- **updateName** The name of the optional Windows Operation System feature being enabled or disabled. -- **updateStartState** A value indicating the state of the optional content before the operation started. -- **updateTargetState** A value indicating the desired state of the optional content. - - -## Deployment extensions - -### DeploymentTelemetry.Deployment_End - -This event indicates that a Deployment 360 API has completed. - -The following fields are available: - -- **ClientId** Client ID of the user utilizing the D360 API. -- **ErrorCode** Error code of action. -- **FlightId** The specific ID of the Windows Insider build the device is getting. -- **Mode** Phase in upgrade. -- **RelatedCV** The correction vector (CV) of any other related events -- **Result** End result of the action. - - -### DeploymentTelemetry.Deployment_SetupBoxLaunch - -This event indicates that the Deployment 360 APIs have launched Setup Box. - -The following fields are available: - -- **ClientId** The client ID of the user utilizing the D360 API. -- **FlightId** The specific ID of the Windows Insider build the device is getting. -- **Quiet** Whether Setup will run in quiet mode or full mode. -- **RelatedCV** The correlation vector (CV) of any other related events. -- **SetupMode** The current setup phase. - - -### DeploymentTelemetry.Deployment_SetupBoxResult - -This event indicates that the Deployment 360 APIs have received a return from Setup Box. - -The following fields are available: - -- **ClientId** Client ID of the user utilizing the D360 API. -- **ErrorCode** Error code of the action. -- **FlightId** The specific ID of the Windows Insider build the device is getting. -- **Quiet** Indicates whether Setup will run in quiet mode or full mode. -- **RelatedCV** The correlation vector (CV) of any other related events. -- **SetupMode** The current Setup phase. - - -### DeploymentTelemetry.Deployment_Start - -This event indicates that a Deployment 360 API has been called. - -The following fields are available: - -- **ClientId** Client ID of the user utilizing the D360 API. -- **FlightId** The specific ID of the Windows Insider build the device is getting. -- **Mode** The current phase of the upgrade. -- **RelatedCV** The correlation vector (CV) of any other related events. - - -## Diagnostic data events - -### TelClientSynthetic.AuthorizationInfo_RuntimeTransition - -This event sends data indicating that a device has undergone a change of telemetry opt-in level detected at UTC startup, to help keep Windows up to date. The telemetry opt-in level signals what data we are allowed to collect. - -The following fields are available: - -- **CanAddMsaToMsTelemetry** True if we can add MSA PUID and CID to telemetry, false otherwise. -- **CanCollectAnyTelemetry** True if we are allowed to collect partner telemetry, false otherwise. -- **CanCollectCoreTelemetry** True if we can collect CORE/Basic telemetry, false otherwise. -- **CanCollectHeartbeats** True if we can collect heartbeat telemetry, false otherwise. -- **CanCollectOsTelemetry** True if we can collect diagnostic data telemetry, false otherwise. -- **CanCollectWindowsAnalyticsEvents** True if we can collect Windows Analytics data, false otherwise. -- **CanPerformDiagnosticEscalations** True if we can perform diagnostic escalation collection, false otherwise. -- **CanPerformTraceEscalations** True if we can perform trace escalation collection, false otherwise. -- **CanReportScenarios** True if we can report scenario completions, false otherwise. -- **PreviousPermissions** Bitmask of previous telemetry state. -- **TransitionFromEverythingOff** True if we are transitioning from all telemetry being disabled, false otherwise. - - -### TelClientSynthetic.AuthorizationInfo_Startup - -Fired by UTC at startup to signal what data we are allowed to collect. - -The following fields are available: - -- **CanAddMsaToMsTelemetby** No content is currently available. -- **CanAddMsaToMsTelemetry** True if we can add MSA PUID and CID to telemetry, false otherwise. -- **CanCollectAnyTelemetry** True if we are allowed to collect partner telemetry, false otherwise. -- **CanCollectCoreTelemetry** True if we can collect CORE/Basic telemetry, false otherwise. -- **CanCollectHeartbeats** True if we can collect heartbeat telemetry, false otherwise. -- **CanCollectOsTelemetry** True if we can collect diagnostic data telemetry, false otherwise. -- **CanCollectWindowsAnalyticsEvents** True if we can collect Windows Analytics data, false otherwise. -- **CanCollectWintowsAnalyticsEvents** No content is currently available. -- **CanPerformDiagnosticEscalations** True if we can perform diagnostic escalation collection, false otherwise. -- **CanPerformTraceEscalations** True if we can perform trace escalation collection, false otherwise. -- **CanReportScenarios** True if we can report scenario completions, false otherwise. -- **PreviousPermissions** Bitmask of previous telemetry state. -- **TransitionFromEverythingOff** True if we are transitioning from all telemetry being disabled, false otherwise. - - -### TelClientSynthetic.ConnectivityHeartBeat_0 - -This event sends data about the connectivity status of the Connected User Experience and Telemetry component that uploads telemetry events. If an unrestricted free network (such as Wi-Fi) is available, this event updates the last successful upload time. Otherwise, it checks whether a Connectivity Heartbeat event was fired in the past 24 hours, and if not, it fires an event. A Connectivity Heartbeat event also fires when a device recovers from costed network to free network. - -The following fields are available: - -- **CensusExitCode** Returns last execution codes from census client run. -- **CensusStartTime** Returns timestamp corresponding to last successful census run. -- **CensusTaskEnabled** Returns Boolean value for the census task (Enable/Disable) on client machine. -- **LastConnectivityLossTime** Retrieves the last time the device lost free network. -- **NetworkState** Retrieves the network state: 0 = No network. 1 = Restricted network. 2 = Free network. -- **NoNetworkTime** Retrieves the time spent with no network (since the last time) in seconds. -- **RestrictedNetworkTime** Retrieves the time spent on a metered (cost restricted) network in seconds. - - -### TelClientSynthetic.HeartBeat_5 - -This event sends data about the health and quality of the diagnostic data from the given device, to help keep Windows up to date. It also enables data analysts to determine how 'trusted' the data is from a given device. - -The following fields are available: - -- **AgentConnectionErrorsCount** Number of non-timeout errors associated with the host/agent channel. -- **CensusExitCode** The last exit code of the Census task. -- **CensusStartTime** Time of last Census run. -- **CensusTaskEnabled** True if Census is enabled, false otherwise. -- **CompressedBytesUploaded** Number of compressed bytes uploaded. -- **ConsumerDroppedCount** Number of events dropped at consumer layer of telemetry client. -- **CriticalDataDbDroppedCount** Number of critical data sampled events dropped at the database layer. -- **CriticalDataThrottleDroppedCount** The number of critical data sampled events that were dropped because of throttling. -- **CriticalOverflowEntersCounter** Number of times critical overflow mode was entered in event DB. -- **DbCriticalDroppedCount** Total number of dropped critical events in event DB. -- **DbDroppedCount** Number of events dropped due to DB fullness. -- **DbDroppedFailureCount** Number of events dropped due to DB failures. -- **DbDroppedFullCount** Number of events dropped due to DB fullness. -- **DecodingDroppedCount** Number of events dropped due to decoding failures. -- **EnteringCriticalOverflowDroppedCounter** Number of events dropped due to critical overflow mode being initiated. -- **EtwDroppedBufferCount** Number of buffers dropped in the UTC ETW session. -- **EtwDroppedCount** Number of events dropped at ETW layer of telemetry client. -- **EventsPersistedCount** Number of events that reached the PersistEvent stage. -- **EventStoreLifetimeResetCounter** Number of times event DB was reset for the lifetime of UTC. -- **EventStoreResetCounter** Number of times event DB was reset. -- **EventStoreResetSizeSum** Total size of event DB across all resets reports in this instance. -- **EventSubStoreResetCounter** Number of times event DB was reset. -- **EventSubStoreResetSizeSum** Total size of event DB across all resets reports in this instance. -- **EventsUploaded** Number of events uploaded. -- **Flags** Flags indicating device state such as network state, battery state, and opt-in state. -- **FullTriggerBufferDroppedCount** Number of events dropped due to trigger buffer being full. -- **HeartBeatSequenceNumber** The sequence number of this heartbeat. -- **InvalidHttpCodeCount** Number of invalid HTTP codes received from contacting Vortex. -- **LastAgentConnectionError** Last non-timeout error encountered in the host/agent channel. -- **LastEventSizeOffender** Event name of last event which exceeded max event size. -- **LastInvalidHttpCode** Last invalid HTTP code received from Vortex. -- **MaxActiveAgentConnectionCount** The maximum number of active agents during this heartbeat timeframe. -- **MaxInUseScenarioCounter** Soft maximum number of scenarios loaded by UTC. -- **PreviousHeartBeatTime** Time of last heartbeat event (allows chaining of events). -- **PrivacyBlockedCount** The number of events blocked due to privacy settings or tags. -- **RepeatedUploadFailureDropped** Number of events lost due to repeated upload failures for a single buffer. -- **SettingsHttpAttempts** Number of attempts to contact OneSettings service. -- **SettingsHttpFailures** The number of failures from contacting the OneSettings service. -- **ThrottledDroppedCount** Number of events dropped due to throttling of noisy providers. -- **TopUploaderErrors** List of top errors received from the upload endpoint. -- **UploaderDroppedCount** Number of events dropped at the uploader layer of telemetry client. -- **UploaderErrorCount** Number of errors received from the upload endpoint. -- **VortexFailuresTimeout** The number of timeout failures received from Vortex. -- **VortexHttpAttempts** Number of attempts to contact Vortex. -- **VortexHttpFailures4xx** Number of 400-499 error codes received from Vortex. -- **VortexHttpFailures5xx** Number of 500-599 error codes received from Vortex. -- **VortexHttpResponseFailures** Number of Vortex responses that are not 2XX or 400. -- **VortexHttpResponsesWithDroppedEvents** Number of Vortex responses containing at least 1 dropped event. - - -### TelClientSynthetic.HeartBeat_Aria_5 - -This event is the telemetry client ARIA heartbeat. - -The following fields are available: - -- **CompressedBytesUploaded** Number of compressed bytes uploaded. -- **CriticalDataDbDroppedCount** Number of critical data sampled events dropped at the database layer. -- **CriticalOverflowEntersCounter** Number of times critical overflow mode was entered in event database. -- **DbCriticalDroppedCount** Total number of dropped critical events in event database. -- **DbDroppedCount** Number of events dropped at the database layer. -- **DbDroppedFailureCount** Number of events dropped due to database failures. -- **DbDroppedFullCount** Number of events dropped due to database being full. -- **EnteringCriticalOverflowDroppedCounter** Number of events dropped due to critical overflow mode being initiated. -- **EventsPersistedCount** Number of events that reached the PersistEvent stage. -- **EventStoreLifetimeResetCounter** Number of times the event store has been reset. -- **EventStoreResetCounter** Number of times the event store has been reset during this heartbeat. -- **EventStoreResetSizeSum** Size of event store reset in bytes. -- **EventsUploaded** Number of events uploaded. -- **HeartBeatSequenceNumber** The sequence number of this heartbeat. -- **InvalidHttpCodeCount** Number of invalid HTTP codes received from contacting Vortex. -- **LastEventSizeOffender** Event name of last event which exceeded max event size. -- **LastInvalidHttpCode** Last invalid HTTP code received from Vortex. -- **PreviousHeartBeatTime** The FILETIME of the previous heartbeat fire. -- **PrivacyBlockedCount** The number of events blocked due to privacy settings or tags. -- **RepeatedUploadFailureDropped** Number of events lost due to repeated upload failures for a single buffer. -- **SettingsHttpAttempts** Number of attempts to contact OneSettings service. -- **SettingsHttpFailures** Number of failures from contacting OneSettings service. -- **TopUploaderErrors** List of top errors received from the upload endpoint. -- **UploaderDroppedCount** Number of events dropped at the uploader layer of telemetry client. -- **UploaderErrorCount** Number of errors received from the upload endpoint. -- **VortexFailuresTimeout** Number of time out failures received from Vortex. -- **VortexHttpAttempts** Number of attempts to contact Vortex. -- **VortexHttpFailures4xx** Number of 400-499 error codes received from Vortex. -- **VortexHttpFailures5xx** Number of 500-599 error codes received from Vortex. -- **VortexHttpResponseFailures** Number of Vortex responses that are not 2XX or 400. -- **VortexHttpResponsesWithDroppedEvents** Number of Vortex responses containing at least 1 dropped event. - - -### TelClientSynthetic.HeartBeat_Seville_5 - -This event is sent by the universal telemetry client (UTC) as a heartbeat signal for Sense. - -The following fields are available: - -- **AgentConnectionErrorsCount** Number of non-timeout errors associated with the host or agent channel. -- **CompressedBytesUploaded** Number of compressed bytes uploaded. -- **ConsumerDroppedCount** Number of events dropped at consumer layer of the telemetry client. -- **CriticalDataDbDroppedCount** Number of critical data sampled events dropped at the database layer. -- **CriticalDataThrottleDroppedCount** Number of critical data sampled events dropped due to throttling. -- **CriticalOverflowEntersCounter** Number of times critical overflow mode was entered in event database. -- **DailyUploadQuotaInBytes** Daily upload quota for Sense in bytes (only in in-proc mode). -- **DbCriticalDroppedCount** Total number of dropped critical events in event database. -- **DbDroppedCount** Number of events dropped due to database being full. -- **DbDroppedFailureCount** Number of events dropped due to database failures. -- **DbDroppedFullCount** Number of events dropped due to database being full. -- **DecodingDroppedCount** Number of events dropped due to decoding failures. -- **DiskSizeInBytes** Size of event store for Sense in bytes (only in in-proc mode). -- **EnteringCriticalOverflowDroppedCounter** Number of events dropped due to critical overflow mode being initiated. -- **EtwDroppedBufferCount** Number of buffers dropped in the universal telemetry client (UTC) event tracing for Windows (ETW) session. -- **EtwDroppedCount** Number of events dropped at the event tracing for Windows (ETW) layer of telemetry client. -- **EventsPersistedCount** Number of events that reached the PersistEvent stage. -- **EventStoreLifetimeResetCounter** Number of times event the database was reset for the lifetime of the universal telemetry client (UTC). -- **EventStoreResetCounter** Number of times the event database was reset. -- **EventStoreResetSizeSum** Total size of the event database across all resets reports in this instance. -- **EventsUploaded** Number of events uploaded. -- **Flags** Flags indicating device state, such as network state, battery state, and opt-in state. -- **FullTriggerBufferDroppedCount** Number of events dropped due to trigger buffer being full. -- **HeartBeatSequenceNumber** The sequence number of this heartbeat. -- **InvalidHttpCodeCount** Number of invalid HTTP codes received from contacting Vortex. -- **LastAgentConnectionError** Last non-timeout error encountered in the host/agent channel. -- **LastEventSizeOffender** Event name of last event which exceeded the maximum event size. -- **LastInvalidHttpCode** Last invalid HTTP code received from Vortex. -- **MaxActiveAgentConnectionCount** Maximum number of active agents during this heartbeat timeframe. -- **NormalUploadTimerMillis** Number of milliseconds between each upload of normal events for SENSE (only in in-proc mode). -- **PreviousHeartBeatTime** Time of last heartbeat event (allows chaining of events). -- **RepeatedUploadFailureDropped** Number of events lost due to repeated failed uploaded attempts. -- **SettingsHttpAttempts** Number of attempts to contact OneSettings service. -- **SettingsHttpFailures** Number of failures from contacting the OneSettings service. -- **ThrottledDroppedCount** Number of events dropped due to throttling of noisy providers. -- **TopUploaderErrors** Top uploader errors, grouped by endpoint and error type. -- **UploaderDroppedCount** Number of events dropped at the uploader layer of the telemetry client. -- **UploaderErrorCount** Number of input for the TopUploaderErrors mode estimation. -- **VortexFailuresTimeout** Number of time out failures received from Vortex. -- **VortexHttpAttempts** Number of attempts to contact Vortex. -- **VortexHttpFailures4xx** Number of 400-499 error codes received from Vortex. -- **VortexHttpFailures5xx** Number of 500-599 error codes received from Vortex. -- **VortexHttpResponseFailures** Number of Vortex responses that are not 2XX or 400. -- **VortexHttpResponsesWithDroppedEvents** Number of Vortex responses containing at least 1 dropped event. - - -## Direct to update events - -### Microsoft.Windows.DirectToUpdate.DTUCoordinatorCheckApplicability - -Event to indicate that the Coordinator CheckApplicability call succeeded. - -The following fields are available: - -- **ApplicabilityResult** Result of CheckApplicability function. -- **CampaignID** Campaign ID being run. -- **ClientID** Client ID being run. -- **CoordinatorVersion** Coordinator version of DTU. -- **CV** Correlation vector. -- **IsDeviceAADDomainJoined** Indicates whether the device is logged in to the AAD (Azure Active Directory) domain. -- **IsDeviceADDomainJoined** Indicates whether the device is logged in to the AD (Active Directory) domain. -- **IsDeviceCloverTrail** Indicates whether the device has a Clover Trail system installed. -- **IsDeviceFeatureUpdatingPaused** Indicates whether Feature Update is paused on the device. -- **IsDeviceNetworkMetered** Indicates whether the device is connected to a metered network. -- **IsDeviceOobeBlocked** Indicates whether user approval is required to install updates on the device. -- **IsDeviceRequireUpdateApproval** Indicates whether user approval is required to install updates on the device. -- **IsDeviceSccmManaged** Indicates whether the device is running the Microsoft SCCM (System Center Configuration Manager) to keep the operating system and applications up to date. -- **IsDeviceUninstallActive** Indicates whether the OS (operating system) on the device was recently updated. -- **IsDeviceUpdateNotificationLevel** Indicates whether the device has a set policy to control update notifications. -- **IsDeviceUpdateServiceManaged** Indicates whether the device uses WSUS (Windows Server Update Services). -- **IsDeviceZeroExhaust** Indicates whether the device subscribes to the Zero Exhaust policy to minimize connections from Windows to Microsoft. -- **IsGreaterThanMaxRetry** Indicates whether the DTU (Direct to Update) service has exceeded its maximum retry count. -- **IsVolumeLicensed** Indicates whether a volume license was used to authenticate the operating system or applications on the device. - - -### Microsoft.Windows.DirectToUpdate.DTUCoordinatorCheckApplicabilityGenericFailure - -This event indicatse that we have received an unexpected error in the Direct to Update (DTU) Coordinators CheckApplicability call. - -The following fields are available: - -- **CampaignID** ID of the campaign being run. -- **ClientID** ID of the client receiving the update. -- **CoordinatorVersion** Coordinator version of Direct to Update. -- **CV** Correlation vector. -- **hResult** HRESULT of the failure. - - -### Microsoft.Windows.DirectToUpdate.DTUCoordinatorCleanupGenericFailure - -This event indicates that we have received an unexpected error in the Direct to Update (DTU) Coordinator Cleanup call. - -The following fields are available: - -- **CampaignID** Campaign ID being run -- **ClientID** Client ID being run -- **CoordinatorVersion** Coordinator version of DTU -- **CV** Correlation vector -- **hResult** HRESULT of the failure - - -### Microsoft.Windows.DirectToUpdate.DTUCoordinatorCleanupSuccess - -This event indicates that the Coordinator Cleanup call succeeded. - -The following fields are available: - -- **CampaignID** Campaign ID being run -- **ClientID** Client ID being run -- **CoordinatorVersion** Coordinator version of DTU -- **CV** Correlation vector - - -### Microsoft.Windows.DirectToUpdate.DTUCoordinatorCommitGenericFailure - -This event indicates that we have received an unexpected error in the Direct to Update (DTU) Coordinator Commit call. - -The following fields are available: - -- **CampaignID** Campaign ID being run. -- **ClientID** Client ID being run. -- **CoordinatorVersion** Coordinator version of DTU. -- **CV** Correlation vector. -- **hResult** HRESULT of the failure. - - -### Microsoft.Windows.DirectToUpdate.DTUCoordinatorCommitSuccess - -This event indicates that the Coordinator Commit call succeeded. - -The following fields are available: - -- **CampaignID** Campaign ID being run. -- **ClientID** Client ID being run. -- **CoordinatorVersion** Coordinator version of DTU. -- **CV** Correlation vector. - - -### Microsoft.Windows.DirectToUpdate.DTUCoordinatorDownloadGenericFailure - -This event indicates that we have received an unexpected error in the Direct to Update (DTU) Coordinator Download call. - -The following fields are available: - -- **CampaignID** Campaign ID being run. -- **ClientID** Client ID being run. -- **CoordinatorVersion** Coordinator version of DTU. -- **CV** Correlation vector. -- **hResult** HRESULT of the failure. - - -### Microsoft.Windows.DirectToUpdate.DTUCoordinatorDownloadIgnoredFailure - -This event indicates that we have received an error in the Direct to Update (DTU) Coordinator Download call that will be ignored. - -The following fields are available: - -- **CampaignID** Campaign ID being run. -- **ClientID** Client ID being run. -- **CoordinatorVersion** Coordinator version of DTU. -- **CV** Correlation vector. -- **hResult** HRESULT of the failure. - - -### Microsoft.Windows.DirectToUpdate.DTUCoordinatorDownloadSuccess - -This event indicates that the Coordinator Download call succeeded. - -The following fields are available: - -- **CampaignID** Campaign ID being run. -- **ClientID** Client ID being run. -- **CoordinatorVersion** Coordinator version of DTU. -- **CV** Correlation vector. - - -### Microsoft.Windows.DirectToUpdate.DTUCoordinatorHandleShutdownGenericFailure - -This event indicates that we have received an unexpected error in the Direct to Update (DTU) Coordinator HandleShutdown call. - -The following fields are available: - -- **CampaignID** Campaign ID being run. -- **ClientID** Client ID being run. -- **CoordinatorVersion** Coordinate version of DTU. -- **CV** Correlation vector. -- **hResult** HRESULT of the failure. - - -### Microsoft.Windows.DirectToUpdate.DTUCoordinatorHandleShutdownSuccess - -This event indicates that the Coordinator HandleShutdown call succeeded. - -The following fields are available: - -- **CampaignID** Campaign ID being run. -- **ClientID** Client ID being run. -- **CoordinatorVersion** Coordinator version of DTU. -- **CV** Correlation vector. - - -### Microsoft.Windows.DirectToUpdate.DTUCoordinatorInitializeGenericFailure - -This event indicates that we have received an unexpected error in the Direct to Update (DTU) Coordinator Initialize call. - -The following fields are available: - -- **CampaignID** Campaign ID being run. -- **ClientID** Client ID being run. -- **CoordinatorVersion** Coordinator version of DTU. -- **CV** Correlation vector. -- **hResult** HRESULT of the failure. - - -### Microsoft.Windows.DirectToUpdate.DTUCoordinatorInitializeSuccess - -This event indicates that the Coordinator Initialize call succeeded. - -The following fields are available: - -- **CampaignID** Campaign ID being run. -- **ClientID** Client ID being run. -- **CoordinatorVersion** Coordinator version of DTU. -- **CV** Correlation vector. - - -### Microsoft.Windows.DirectToUpdate.DTUCoordinatorInstallGenericFailure - -This event indicates that we have received an unexpected error in the Direct to Update (DTU) Coordinator Install call. - -The following fields are available: - -- **CampaignID** Campaign ID being run. -- **ClientID** Client ID being run. -- **CoordinatorVersion** Coordinator version of DTU. -- **CV** Correlation vector. -- **hResult** HRESULT of the failure. - - -### Microsoft.Windows.DirectToUpdate.DTUCoordinatorInstallIgnoredFailure - -This event indicates that we have received an error in the Direct to Update (DTU) Coordinator Install call that will be ignored. - -The following fields are available: - -- **CampaignID** Campaign ID being run. -- **ClientID** Client ID being run. -- **CoordinatorVersion** Coordinator version of DTU. -- **CV** Correlation vector. -- **hResult** HRESULT of the failure. - - -### Microsoft.Windows.DirectToUpdate.DTUCoordinatorInstallSuccess - -This event indicates that the Coordinator Install call succeeded. - -The following fields are available: - -- **CampaignID** Campaign ID being run. -- **ClientID** Client ID being run. -- **CoordinatorVersion** Coordinator version of DTU. -- **CV** Correlation vector. - - -### Microsoft.Windows.DirectToUpdate.DTUCoordinatorProgressCallBack - -This event indicates that the Coordinator's progress callback has been called. - -The following fields are available: - -- **CampaignID** Campaign ID being run. -- **ClientID** Client ID being run. -- **CoordinatorVersion** Coordinator version of DTU. -- **CV** Correlation vector. -- **DeployPhase** Current Deploy Phase. - - -### Microsoft.Windows.DirectToUpdate.DTUCoordinatorSetCommitReadySuccess - -This event indicates that the Coordinator SetCommitReady call succeeded. - -The following fields are available: - -- **CampaignID** ID of the update campaign being run. -- **ClientID** ID of the client receiving the update. -- **CoordinatorVersion** Coordinator version of Direct to Update. -- **CV** Correlation vector. - - -### Microsoft.Windows.DirectToUpdate.DTUCoordinatorWaitForRebootUiNotShown - -This event indicates that the Coordinator WaitForRebootUi call succeeded. - -The following fields are available: - -- **CampaignID** Campaign ID being run. -- **ClientID** ID of the client receiving the update. -- **CoordinatorVersion** Coordinator version of Direct to Update. -- **CV** Correlation vector. -- **hResult** HRESULT of the failure. - - -### Microsoft.Windows.DirectToUpdate.DTUCoordinatorWaitForRebootUiSelection - -This event indicates that the user selected an option on the Reboot UI. - -The following fields are available: - -- **CampaignID** ID of the update campaign being run. -- **ClientID** ID of the client receiving the update. -- **CoordinatorVersion** Coordinator version of Direct to Update. -- **CV** Correlation vector. -- **rebootUiSelection** Selection on the Reboot UI. - - -### Microsoft.Windows.DirectToUpdate.DTUCoordinatorWaitForRebootUiSuccess - -This event indicates that the Coordinator WaitForRebootUi call succeeded. - -The following fields are available: - -- **CampaignID** ID of the update campaign being run. -- **ClientID** ID of the client receiving the update. -- **CoordinatorVersion** Coordinator version of Direct to Update. -- **CV** Correlation vector. - - -### Microsoft.Windows.DirectToUpdate.DTUHandlerCheckApplicabilityInternalGenericFailure - -This event indicates that we have received an unexpected error in the Direct to Update (DTU) Handler CheckApplicabilityInternal call. - -The following fields are available: - -- **CampaignID** ID of the campaign being run. -- **ClientID** ID of the client receiving the update. -- **CoordinatorVersion** Coordinator version of Direct to Update. -- **CV** Correlation vector. -- **hResult** HRESULT of the failure. - - -### Microsoft.Windows.DirectToUpdate.DTUHandlerCheckApplicabilityInternalSuccess - -This event indicates that the Handler CheckApplicabilityInternal call succeeded. - -The following fields are available: - -- **ApplicabilityResult** The result of the applicability check. -- **CampaignID** ID of the update campaign being run. -- **ClientID** ID of the client receiving the update. -- **CoordinatorVersion** Coordinator version of Direct to Update. -- **CV** Correlation vector. - - -### Microsoft.Windows.DirectToUpdate.DTUHandlerCheckApplicabilitySuccess - -This event indicates that the Handler CheckApplicability call succeeded. - -The following fields are available: - -- **ApplicabilityResult** The result code indicating whether the update is applicable. -- **CampaignID** ID of the update campaign being run. -- **ClientID** ID of the client receiving the update. -- **CoordinatorVersion** Coordinator version of Direct to Update. -- **CV** Correlation vector. -- **CV_new** New correlation vector. - - -### Microsoft.Windows.DirectToUpdate.DTUHandlerCheckIfCoordinatorMinApplicableVersionSuccess - -This event indicates that the Handler CheckIfCoordinatorMinApplicableVersion call succeeded. - -The following fields are available: - -- **CampaignID** ID of the update campaign being run. -- **CheckIfCoordinatorMinApplicableVersionResult** Result of CheckIfCoordinatorMinApplicableVersion function. -- **ClientID** ID of the client receiving the update. -- **CoordinatorVersion** Coordinator version of Direct to Update. -- **CV** Correlation vector. - - -### Microsoft.Windows.DirectToUpdate.DTUHandlerCommitGenericFailure - -This event indicates that we have received an unexpected error in the Direct to Update (DTU) Handler Commit call. - -The following fields are available: - -- **CampaignID** ID of the update campaign being run. -- **ClientID** ID of the client receiving the update. -- **CoordinatorVersion** Coordinator version of Direct to Update. -- **CV** Correlation vector. -- **CV_new** New correlation vector. -- **hResult** HRESULT of the failure. - - -### Microsoft.Windows.DirectToUpdate.DTUHandlerCommitSuccess - -This event indicates that the Handler Commit call succeeded. - -The following fields are available: - -- **CampaignID** ID of the update campaign being run.run -- **ClientID** ID of the client receiving the update. -- **CoordinatorVersion** Coordinator version of Direct to Update. -- **CV** Correlation vector. -- **CV_new** New correlation vector. - - -### Microsoft.Windows.DirectToUpdate.DTUHandlerDownloadAndExtractCabFailure - -This event indicates that the Handler Download and Extract cab call failed. - -The following fields are available: - -- **CampaignID** ID of the update campaign being run. -- **ClientID** ID of the client receiving the update. -- **CoordinatorVersion** Coordinator version of Direct to Update. -- **CV** Correlation vector. -- **DownloadAndExtractCabFunction_failureReason** Reason why the update download and extract process failed. -- **hResult** HRESULT of the failure. - - -### Microsoft.Windows.DirectToUpdate.DTUHandlerDownloadAndExtractCabSuccess - -This event indicates that the Handler Download and Extract cab call succeeded. - -The following fields are available: - -- **CampaignID** ID of the update campaign being run. -- **ClientID** ID of the client receiving the update. -- **CoordinatorVersion** Coordinator version of Direct to Update. -- **CV** Correlation vector. - - -### Microsoft.Windows.DirectToUpdate.DTUHandlerDownloadGenericFailure - -This event indicates that we have received an unexpected error in the Direct to Update (DTU) Handler Download call. - -The following fields are available: - -- **CampaignID** ID of the update campaign being run. -- **ClientID** ID of the client receiving the update. -- **CoordinatorVersion** Coordinator version of Direct to Update. -- **CV** Correlation vector. -- **hResult** HRESULT of the failure. - - -### Microsoft.Windows.DirectToUpdate.DTUHandlerDownloadSuccess - -This event indicates that the Handler Download call succeeded. - -The following fields are available: - -- **CampaignID** ID of the update campaign being run. -- **ClientID** ID of the client receiving the update. -- **CoordinatorVersion** Coordinator version of Direct to Update. -- **CV** Correlation vector. - - -### Microsoft.Windows.DirectToUpdate.DTUHandlerInitializeGenericFailure - -This event indicates that we have received an unexpected error in the Direct to Update (DTU) Handler Initialize call. - -The following fields are available: - -- **CampaignID** ID of the update campaign being run. -- **ClientID** ID of the client receiving the update. -- **CoordinatorVersion** Coordinator version of Direct to Update. -- **CV** Correlation vector. -- **DownloadAndExtractCabFunction_hResult** HRESULT of the download and extract. -- **hResult** HRESULT of the failure. - - -### Microsoft.Windows.DirectToUpdate.DTUHandlerInitializeSuccess - -This event indicates that the Handler Initialize call succeeded. - -The following fields are available: - -- **CampaignID** ID of the update campaign being run. -- **ClientID** ID of the client receiving the update. -- **CoordinatorVersion** Coordinator version of Direct to Update. -- **CV** Correlation vector. -- **DownloadAndExtractCabFunction_hResult** HRESULT of the download and extraction. - - -### Microsoft.Windows.DirectToUpdate.DTUHandlerInstallGenericFailure - -This event indicates that we have received an unexpected error in the Direct to Update (DTU) Handler Install call. - -The following fields are available: - -- **CampaignID** ID of the update campaign being run. -- **ClientID** ID of the client receiving the update. -- **CoordinatorVersion** Coordinator version of Direct to Update. -- **CV** Correlation vector. -- **hResult** HRESULT of the failure. - - -### Microsoft.Windows.DirectToUpdate.DTUHandlerInstallSuccess - -This event indicates that the Coordinator Install call succeeded. - -The following fields are available: - -- **CampaignID** ID of the update campaign being run. -- **ClientID** ID of the client receiving the update. -- **CoordinatorVersion** Coordinator version of Direct to Update. -- **CV** Correlation vector. - - -### Microsoft.Windows.DirectToUpdate.DTUHandlerSetCommitReadySuccess - -This event indicates that the Handler SetCommitReady call succeeded. - -The following fields are available: - -- **CampaignID** ID of the campaign being run. -- **ClientID** ID of the client receiving the update. -- **CoordinatorVersion** Coordinator version of Direct to Update. -- **CV** Correlation vector. - - -### Microsoft.Windows.DirectToUpdate.DTUHandlerWaitForRebootUiGenericFailure - -This event indicates that we have received an unexpected error in the Direct to Update (DTU) Handler WaitForRebootUi call. - -The following fields are available: - -- **CampaignID** The ID of the campaigning being run. -- **ClientID** ID of the client receiving the update. -- **CoordinatorVersion** Coordinator version of Direct to Update. -- **CV** Correlation vector. -- **hResult** The HRESULT of the failure. - - -### Microsoft.Windows.DirectToUpdate.DTUHandlerWaitForRebootUiSuccess - -This event indicates that the Handler WaitForRebootUi call succeeded. - -The following fields are available: - -- **CampaignID** ID of the campaign being run. -- **ClientID** ID of the client receiving the update. -- **CoordinatorVersion** Coordinator version of Direct to Update. -- **CV** Correlation vector. - - -## DxgKernelTelemetry events - -### DxgKrnlTelemetry.GPUAdapterInventoryV2 - -This event sends basic GPU and display driver information to keep Windows and display drivers up-to-date. - -The following fields are available: - -- **AdapterTypeValue** The numeric value indicating the type of Graphics adapter. -- **aiSeqId** The event sequence ID. -- **bootId** The system boot ID. -- **BrightnessVersionViaDDI** The version of the Display Brightness Interface. -- **BrightngssVersionViaDDI** No content is currently available. -- **ComputePreemptionLevel** The maximum preemption level supported by GPU for compute payload. -- **DedicatedSystemMemoryB** The amount of system memory dedicated for GPU use (in bytes). -- **DedicatedVideoMemoryB** The amount of dedicated VRAM of the GPU (in bytes). -- **DisplayAdapterLuid** The display adapter LUID. -- **DriverDate** The date of the display driver. -- **DriverRank** The rank of the display driver. -- **DriverVersion** The display driver version. -- **DriverVgrsion** No content is currently available. -- **DX10UMDFilePath** The file path to the location of the DirectX 10 Display User Mode Driver in the Driver Store. -- **DX11UMDFilePath** The file path to the location of the DirectX 11 Display User Mode Driver in the Driver Store. -- **DX12UMDFilePath** The file path to the location of the DirectX 12 Display User Mode Driver in the Driver Store. -- **DX9UMDFilePatè** No content is currently available. -- **DX9UMDFilePath** The file path to the location of the DirectX 9 Display User Mode Driver in the Driver Store. -- **GPUDeviceID** The GPU device ID. -- **GPUPreemptionLevel** The maximum preemption level supported by GPU for graphics payload. -- **GPURevisionID** The GPU revision ID. -- **GPUVendorID** The GPU vendor ID. -- **InterfaceId** The GPU interface ID. -- **IsDisplayDevice** Does the GPU have displaying capabilities? -- **IsHwSchSupported** Indicates whether the adapter supports hardware scheduling. -- **IsHybridDiscrete** Does the GPU have discrete GPU capabilities in a hybrid device? -- **IsHybridIntegrated** Does the GPU have integrated GPU capabilities in a hybrid device? -- **IsLDA** Is the GPU comprised of Linked Display Adapters? -- **IsMiracastSupported** Does the GPU support Miracast? -- **IsMismatchLDA** Is at least one device in the Linked Display Adapters chain from a different vendor? -- **IsMPOSupported** Does the GPU support Multi-Plane Overlays? -- **IsMsMiracastSupported** Are the GPU Miracast capabilities driven by a Microsoft solution? -- **IsPostAdapter** Is this GPU the POST GPU in the device? -- **IsRemovable** TRUE if the adapter supports being disabled or removed. -- **IsRenderDevice** Does the GPU have rendering capabilities? -- **IsRendgrDevice** No content is currently available. -- **IsSoftwareDevice** Is this a software implementation of the GPU? -- **KMDFilePath** The file path to the location of the Display Kernel Mode Driver in the Driver Store. -- **MeasureEnabled** Is the device listening to MICROSOFT_KEYWORD_MEASURES? -- **MeasurgEnabled** No content is currently available. -- **MsHybridDiscrete** Indicates whether the adapter is a discrete adapter in a hybrid configuration. -- **NumVidPnSources** The number of supported display output sources. -- **NumVidPnTargets** The number of supported display output targets. -- **NumVidPnTattets** No content is currently available. -- **SharedSystemMemoryB** The amount of system memory shared by GPU and CPU (in bytes). -- **SubSystemID** The subsystem ID. -- **SubVendorID** The GPU sub vendor ID. -- **TelemetpyEnabled** No content is currently available. -- **TelemetryEnabled** Is the device listening to MICROSOFT_KEYWORD_TELEMETRY? -- **TelInvEvntTrigger** What triggered this event to be logged? Example: 0 (GPU enumeration) or 1 (DxgKrnlTelemetry provider toggling) -- **version** The event version. -- **verskon** No content is currently available. -- **WDDMVersion** The Windows Display Driver Model version. - - -## Failover Clustering events - -### Microsoft.Windows.Server.FailoverClusteringCritical.ClusterSummary2 - -This event returns information about how many resources and of what type are in the server cluster. This data is collected to keep Windows Server safe, secure, and up to date. The data includes information about whether hardware is configured correctly, if the software is patched correctly, and assists in preventing crashes by attributing issues (like fatal errors) to workloads and system configurations. - -The following fields are available: - -- **autoAssignSite** The cluster parameter: auto site. -- **autoBalancerLevel** The cluster parameter: auto balancer level. -- **autoBalancerMode** The cluster parameter: auto balancer mode. -- **blockCacheSize** The configured size of the block cache. -- **ClusterAdConfiguration** The ad configuration of the cluster. -- **clusterAdType** The cluster parameter: mgmt_point_type. -- **clusterDumpPolicy** The cluster configured dump policy. -- **clusterFunctionalLevel** The current cluster functional level. -- **clusterGuid** The unique identifier for the cluster. -- **clusterWitnessType** The witness type the cluster is configured for. -- **countNodesInSite** The number of nodes in the cluster. -- **crossSiteDelay** The cluster parameter: CrossSiteDelay. -- **crossSiteThreshold** The cluster parameter: CrossSiteThreshold. -- **crossSubnetDelay** The cluster parameter: CrossSubnetDelay. -- **crossSubnetThreshold** The cluster parameter: CrossSubnetThreshold. -- **csvCompatibleFilters** The cluster parameter: ClusterCsvCompatibleFilters. -- **csvIncompatibleFilters** The cluster parameter: ClusterCsvIncompatibleFilters. -- **csvResourceCount** The number of resources in the cluster. -- **currentNodeSite** The name configured for the current site for the cluster. -- **dasModeBusType** The direct storage bus type of the storage spaces. -- **downLevelNodeCount** The number of nodes in the cluster that are running down-level. -- **drainOnShutdown** Specifies whether a node should be drained when it is shut down. -- **dynamicQuorumEnabled** Specifies whether dynamic Quorum has been enabled. -- **enforcedAntiAffinity** The cluster parameter: enforced anti affinity. -- **genAppNames** The win32 service name of a clustered service. -- **genSvcNames** The command line of a clustered genapp. -- **hangRecoveryAction** The cluster parameter: hang recovery action. -- **hangTimeOut** Specifies the “hang time out” parameter for the cluster. -- **isCalabria** Specifies whether storage spaces direct is enabled. -- **isMixedMode** Identifies if the cluster is running with different version of OS for nodes. -- **isRunningDownLevel** Identifies if the current node is running down-level. -- **logLevel** Specifies the granularity that is logged in the cluster log. -- **logSize** Specifies the size of the cluster log. -- **lowerQuorumPriorityNodeId** The cluster parameter: lower quorum priority node ID. -- **minNeverPreempt** The cluster parameter: minimum never preempt. -- **minPreemptor** The cluster parameter: minimum preemptor priority. -- **netftIpsecEnabled** The parameter: netftIpsecEnabled. -- **NodeCount** The number of nodes in the cluster. -- **nodeId** The current node number in the cluster. -- **nodeResourceCounts** Specifies the number of node resources. -- **nodeResourceOnlineCounts** Specifies the number of node resources that are online. -- **numberOfSites** The number of different sites. -- **numNodesInNoSite** The number of nodes not belonging to a site. -- **plumbAllCrossSubnetRoutes** The cluster parameter: plumb all cross subnet routes. -- **preferredSite** The preferred site location. -- **privateCloudWitness** Specifies whether a private cloud witness exists for this cluster. -- **quarantineDuration** The quarantine duration. -- **quarantineThreshold** The quarantine threshold. -- **quorumArbitrationTimeout** In the event of an arbitration event, this specifies the quorum timeout period. -- **resiliencyLevel** Specifies the level of resiliency. -- **resourceCounts** Specifies the number of resources. -- **resourceTypeCounts** Specifies the number of resource types in the cluster. -- **resourceTypes** Data representative of each resource type. -- **resourceTypesPath** Data representative of the DLL path for each resource type. -- **sameSubnetDelay** The cluster parameter: same subnet delay. -- **sameSubnetThreshold** The cluster parameter: same subnet threshold. -- **secondsInMixedMode** The amount of time (in seconds) that the cluster has been in mixed mode (nodes with different operating system versions in the same cluster). -- **securityLevel** The cluster parameter: security level. -- **securityLevelForStorage** The cluster parameter: security level for storage. -- **sharedVolumeBlockCacheSize** Specifies the block cache size for shared for shared volumes. -- **shutdownTimeoutMinutes** Specifies the amount of time it takes to time out when shutting down. -- **upNodeCount** Specifies the number of nodes that are up (online). -- **useClientAccessNetworksForCsv** The cluster parameter: use client access networks for CSV. -- **vmIsolationTime** The cluster parameter: VM isolation time. -- **witnessDatabaseWriteTimeout** Specifies the timeout period for writing to the quorum witness database. - - -## Fault Reporting events - -### Microsoft.Windows.FaultReporting.AppCrashEvent - -This event sends data about crashes for both native and managed applications, to help keep Windows up to date. The data includes information about the crashing process and a summary of its exception record. It does not contain any Watson bucketing information. The bucketing information is recorded in a Windows Error Reporting (WER) event that is generated when the WER client reports the crash to the Watson service, and the WER event will contain the same ReportID (see field 14 of crash event, field 19 of WER event) as the crash event for the crash being reported. AppCrash is emitted once for each crash handled by WER (e.g. from an unhandled exception or FailFast or ReportException). Note that Generic Watson event types (e.g. from PLM) that may be considered crashes\" by a user DO NOT emit this event. - -The following fields are available: - -- **AppName** The name of the app that has crashed. -- **AppSessionGuid** GUID made up of process ID and is used as a correlation vector for process instances in the telemetry backend. -- **AppTimeStamp** The date/time stamp of the app. -- **AppVersion** The version of the app that has crashed. -- **DargetAsId** No content is currently available. -- **ExceptionCode** The exception code returned by the process that has crashed. -- **ExceptionOffset** The address where the exception had occurred. -- **Flags** Flags indicating how reporting is done. For example, queue the report, do not offer JIT debugging, or do not terminate the process after reporting. -- **FriendlyAppName** The description of the app that has crashed, if different from the AppName. Otherwise, the process name. -- **IsFatal** True/False to indicate whether the crash resulted in process termination. -- **ModNa-e** No content is currently available. -- **ModName** Exception module name (e.g. bar.dll). -- **ModTimeStamp** The date/time stamp of the module. -- **ModVersion** The version of the module that has crashed. -- **OodTimeStamp** No content is currently available. -- **PackageFullName** Store application identity. -- **PackageRelativeAppId** Store application identity. -- **ProcessArchitecture** Architecture of the crashing process, as one of the PROCESSOR_ARCHITECTURE_* constants: 0: PROCESSOR_ARCHITECTURE_INTEL. 5: PROCESSOR_ARCHITECTURE_ARM. 9: PROCESSOR_ARCHITECTURE_AMD64. 12: PROCESSOR_ARCHITECTURE_ARM64. -- **ProcessCreateTime** The time of creation of the process that has crashed. -- **ProcessId** The ID of the process that has crashed. -- **ReportId** A GUID used to identify the report. This can used to track the report across Watson. -- **TargetAppId** The kernel reported AppId of the application being reported. -- **TargetAppVer** The specific version of the application being reported -- **TargetAsId** The sequence number for the hanging process. - - -## Feature update events - -### Microsoft.Windows.Upgrade.Uninstall.UninstallFinalizedAndRebootTriggered - -This event indicates that the uninstall was properly configured and that a system reboot was initiated. - - - -### Microsoft.Windows.Upgrade.Uninstall.UninstallGoBackButtonClicked - -This event sends basic metadata about the starting point of uninstalling a feature update, which helps ensure customers can safely revert to a well-known state if the update caused any problems. - - - -## Hang Reporting events - -### Microsoft.Windows.HangReporting.AppHangEvent - -This event sends data about hangs for both native and managed applications, to help keep Windows up to date. It does not contain any Watson bucketing information. The bucketing information is recorded in a Windows Error Reporting (WER) event that is generated when the WER client reports the hang to the Watson service, and the WER event will contain the same ReportID (see field 13 of hang event, field 19 of WER event) as the hang event for the hang being reported. AppHang is reported only on PC devices. It handles classic Win32 hangs and is emitted only once per report. Some behaviors that may be perceived by a user as a hang are reported by app managers (e.g. PLM/RM/EM) as Watson Generics and will not produce AppHang events. - -The following fields are available: - -- **AppName** The name of the app that has hung. -- **AppSessionGuid** GUID made up of process id used as a correlation vector for process instances in the telemetry backend. -- **AppVersion** The version of the app that has hung. -- **IsFatal** True/False based on whether the hung application caused the creation of a Fatal Hang Report. -- **PackageFullName** Store application identity. -- **PackageRelativeAppId** Store application identity. -- **ProcessArchitecture** Architecture of the hung process, as one of the PROCESSOR_ARCHITECTURE_* constants: 0: PROCESSOR_ARCHITECTURE_INTEL. 5: PROCESSOR_ARCHITECTURE_ARM. 9: PROCESSOR_ARCHITECTURE_AMD64. 12: PROCESSOR_ARCHITECTURE_ARM64. -- **ProcessCreateTime** The time of creation of the process that has hung. -- **ProcessId** The ID of the process that has hung. -- **ReportId** A GUID used to identify the report. This can used to track the report across Watson. -- **TargetAppId** The kernel reported AppId of the application being reported. -- **TargetAppVer** The specific version of the application being reported. -- **TargetAsId** The sequence number for the hanging process. -- **TypeCode** Bitmap describing the hang type. -- **WaitingOnAppName** If this is a cross process hang waiting for an application, this has the name of the application. -- **WaitingOnAppVersion** If this is a cross process hang, this has the version of the application for which it is waiting. -- **WaitingOnPackageFullName** If this is a cross process hang waiting for a package, this has the full name of the package for which it is waiting. -- **WaitingOnPackageRelativeAppId** If this is a cross process hang waiting for a package, this has the relative application id of the package. - - -## Inventory events - -### Microsoft.Windows.Inventory.Core.AmiTelCacheChecksum - -This event captures basic checksum data about the device inventory items stored in the cache for use in validating data completeness for Microsoft.Windows.Inventory.Core events. The fields in this event may change over time, but they will always represent a count of a given object. - -The following fields are available: - -- **Device** A count of device objects in cache. -- **DeviceCensus** A count of device census objects in cache. -- **DriverPackageExtended** A count of driverpackageextended objects in cache. -- **File** A count of file objects in cache. -- **FileSigningInfo** A count of file signing objects in cache. -- **Generic** A count of generic objects in cache. -- **HwItem** A count of hwitem objects in cache. -- **InventoryApplication** A count of application objects in cache. -- **InventoryApplicationAppV** A count of application AppV objects in cache. -- **InventoryApplicationDriver** A count of application driver objects in cache -- **InventoryApplicationFile** A count of application file objects in cache. -- **InventoryApplicationFramework** A count of application framework objects in cache -- **InventoryApplicationShortcut** A count of application shortcut objects in cache -- **InventoryDeviceContainer** A count of device container objects in cache. -- **InventoryDeviceInterface** A count of Plug and Play device interface objects in cache. -- **InventoryDeviceMediaClass** A count of device media objects in cache. -- **InventoryDevicePnp** A count of device Plug and Play objects in cache. -- **InventoryDeviceUsbHubClass** A count of device usb objects in cache -- **InventoryDriverBinary** A count of driver binary objects in cache. -- **InventoryDriverPackage** A count of device objects in cache. -- **InventoryMiscellaneousOfficeAddIn** A count of office add-in objects in cache -- **InventoryMiscellaneousOfficeAddInUsage** A count of office add-in usage objects in cache. -- **InventoryMiscellaneousOfficeIdentifiers** A count of office identifier objects in cache -- **InventoryMiscellaneousOfficeIESettings** A count of office ie settings objects in cache -- **InventoryMiscellaneousOfficeInsights** A count of office insights objects in cache -- **InventoryMiscellaneousOfficeProducts** A count of office products objects in cache -- **InventoryMiscellaneousOfficeSettings** A count of office settings objects in cache -- **InventoryMiscellaneousOfficeVBA** A count of office vba objects in cache -- **InventoryMiscellaneousOfficeVBARuleViolations** A count of office vba rule violations objects in cache -- **InventoryMiscellaneousUUPInfo** A count of uup info objects in cache -- **Metadata** A count of metadata objects in cache. -- **Orphan** A count of orphan file objects in cache. -- **Programs** A count of program objects in cache. - - -### Microsoft.Windows.Inventory.Core.AmiTelCacheFileInfo - -Diagnostic data about the inventory cache. - -The following fields are available: - -- **CacheFileSize** Size of the cache. -- **InventoryVersion** Inventory version of the cache. -- **TempCacheCount** Number of temp caches created. -- **TempCacheDeletedCount** Number of temp caches deleted. - - -### Microsoft.Windows.Inventory.Core.AmiTelCacheVersions - -This event sends inventory component versions for the Device Inventory data. - -The following fields are available: - -- **aeinv** The version of the App inventory component. -- **devinv** The file version of the Device inventory component. - - -### Microsoft.Windows.Inventory.Core.InventoryApplicationAdd - -This event sends basic metadata about an application on the system to help keep Windows up to date. - -This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedeviceinventorychange). - -The following fields are available: - -- **HiddenArp** Indicates whether a program hides itself from showing up in ARP. -- **InstallDate** The date the application was installed (a best guess based on folder creation date heuristics). -- **InstallDateArpLastModified** The date of the registry ARP key for a given application. Hints at install date but not always accurate. Passed as an array. Example: 4/11/2015 00:00:00 -- **InstallDateFromLbnkFile** No content is currently available. -- **InstallDateFromLinkFile** The estimated date of install based on the links to the files. Passed as an array. -- **InstallDateMsi** The install date if the application was installed via Microsoft Installer (MSI). Passed as an array. -- **InventoryVersion** The version of the inventory file generating the events. -- **Language** The language code of the program. -- **MsiPackageCode** A GUID that describes the MSI Package. Multiple 'Products' (apps) can make up an MsiPackage. -- **MsiProductCode** A GUID that describe the MSI Product. -- **Name** The name of the application. -- **OSVersionAtInstallTime** The four octets from the OS version at the time of the application's install. -- **PackageFullName** The package full name for a Store application. -- **ProgramInstanceId** A hash of the file IDs in an app. -- **Publisher** The Publisher of the application. Location pulled from depends on the 'Source' field. -- **RootDirPath** The path to the root directory where the program was installed. -- **Source** How the program was installed (for example, ARP, MSI, Appx). -- **StoreAppType** A sub-classification for the type of Microsoft Store app, such as UWP or Win8StoreApp. -- **Type** One of ("Application", "Hotfix", "BOE", "Service", "Unknown"). Application indicates Win32 or Appx app, Hotfix indicates app updates (KBs), BOE indicates it's an app with no ARP or MSI entry, Service indicates that it is a service. Application and BOE are the ones most likely seen. -- **Version** The version number of the program. - - -### Microsoft.Windows.Inventory.Core.InventoryApplicationDriverAdd - -This event represents what drivers an application installs. - -This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedeviceinventorychange). - -The following fields are available: - -- **InventoryVersion** The version of the inventory component. -- **ProgramIds** The unique program identifier the driver is associated with. - - -### Microsoft.Windows.Inventory.Core.InventoryApplicationDriverStartSync - -The InventoryApplicationDriverStartSync event indicates that a new set of InventoryApplicationDriverStartAdd events will be sent. - -This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedeviceinventorychange). - -The following fields are available: - -- **InventoryVersion** The version of the inventory component. - - -### Microsoft.Windows.Inventory.Core.InventoryApplicationFrameworkAdd - -This event provides the basic metadata about the frameworks an application may depend on. - -This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedeviceinventorychange). - -The following fields are available: - -- **FileId** A hash that uniquely identifies a file. -- **Frameworks** The list of frameworks this file depends on. -- **InventoryVersion** The version of the inventory file generating the events. - - -### Microsoft.Windows.Inventory.Core.InventoryApplicationFrameworkStartSync - -This event indicates that a new set of InventoryApplicationFrameworkAdd events will be sent. - -This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedeviceinventorychange). - -The following fields are available: - -- **InventoryVersion** The version of the inventory file generating the events. - - -### Microsoft.Windows.Inventory.Core.InventoryApplicationRemove - -This event indicates that a new set of InventoryDevicePnpAdd events will be sent. - -This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedeviceinventorychange). - -The following fields are available: - -- **InventoryVersion** The version of the inventory file generating the events. - - -### Microsoft.Windows.Inventory.Core.InventoryApplicationStartSync - -This event indicates that a new set of InventoryApplicationAdd events will be sent. - -This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedeviceinventorychange). - -The following fields are available: - -- **InventoryVersion** The version of the inventory file generating the events. - - -### Microsoft.Windows.Inventory.Core.InventoryDeviceContainerAdd - -This event sends basic metadata about a device container (such as a monitor or printer as opposed to a Plug and Play device) to help keep Windows up to date. - -This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedeviceinventorychange). - -The following fields are available: - -- **Categories** A comma separated list of functional categories in which the container belongs. -- **DiscoveryMethod** The discovery method for the device container. -- **FriendlyName** The name of the device container. -- **InventoryVersion** The version of the inventory file generating the events. -- **IsActive** Is the device connected, or has it been seen in the last 14 days? -- **IsConnected** For a physically attached device, this value is the same as IsPresent. For wireless a device, this value represents a communication link. -- **IsMachineContainer** Is the container the root device itself? -- **IsNetworked** Is this a networked device? -- **IsPaired** Does the device container require pairing? -- **Manufacturer** The manufacturer name for the device container. -- **ModelId** A unique model ID. -- **ModelName** The model name. -- **ModelNumber** The model number for the device container. -- **PrimaryCategory** The primary category for the device container. - - -### Microsoft.Windows.Inventory.Core.InventoryDeviceContainerRemove - -This event indicates that the InventoryDeviceContainer object is no longer present. - -This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedeviceinventorychange). - -The following fields are available: - -- **InventoryVersion** The version of the inventory file generating the events. - - -### Microsoft.Windows.Inventory.Core.InventoryDeviceContainerStartSync - -This event indicates that a new set of InventoryDeviceContainerAdd events will be sent. - -This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedeviceinventorychange). - -The following fields are available: - -- **InventoryVersion** The version of the inventory file generating the events. - - -### Microsoft.Windows.Inventory.Core.InventoryDeviceInterfaceAdd - -This event retrieves information about what sensor interfaces are available on the device. - -This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedeviceinventorychange). - -The following fields are available: - -- **Accelerometer3D** Indicates if an Accelerator3D sensor is found. -- **ActivityDetection** Indicates if an Activity Detection sensor is found. -- **AmbientLight** Indicates if an Ambient Light sensor is found. -- **Barometer** Indicates if a Barometer sensor is found. -- **Custom** Indicates if a Custom sensor is found. -- **EnergyMeter** Indicates if an Energy sensor is found. -- **FloorElevation** Indicates if a Floor Elevation sensor is found. -- **GeomagneticOrientation** Indicates if a Geo Magnetic Orientation sensor is found. -- **GravityVector** Indicates if a Gravity Detector sensor is found. -- **Gyrometer3D** Indicates if a Gyrometer3D sensor is found. -- **Humidity** Indicates if a Humidity sensor is found. -- **InventoryVersion** The version of the inventory file generating the events. -- **LinearAccelerometer** Indicates if a Linear Accelerometer sensor is found. -- **Magnetometer3D** Indicates if a Magnetometer3D sensor is found. -- **Orientation** Indicates if an Orientation sensor is found. -- **Pedometer** Indicates if a Pedometer sensor is found. -- **Proximity** Indicates if a Proximity sensor is found. -- **RelativeOrientation** Indicates if a Relative Orientation sensor is found. -- **SimpleDeviceOrientation** Indicates if a Simple Device Orientation sensor is found. -- **Temperature** Indicates if a Temperature sensor is found. - - -### Microsoft.Windows.Inventory.Core.InventoryDeviceInterfaceStartSync - -This event indicates that a new set of InventoryDeviceInterfaceAdd events will be sent. - -This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedeviceinventorychange). - -The following fields are available: - -- **InventoryVersion** The version of the inventory file generating the events. - - -### Microsoft.Windows.Inventory.Core.InventoryDeviceMediaClassAdd - -This event sends additional metadata about a Plug and Play device that is specific to a particular class of devices to help keep Windows up to date while reducing overall size of data payload. - -This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedeviceinventorychange). - -The following fields are available: - -- **audio.captureDriver** Audio device capture driver. Example: hdaudio.inf:db04a16ce4e8d6ee:HdAudModel:10.0.14887.1000:hdaudio\func_01 -- **audio.renderDriver** Audio device render driver. Example: hdaudio.inf:db04a16ce4e8d6ee:HdAudModel:10.0.14889.1001:hdaudio\func_01 -- **Audio_CaptureDriver** The Audio device capture driver endpoint. -- **Audio_RenderDriver** The Audio device render driver endpoint. -- **InventoryVersion** The version of the inventory file generating the events. - - -### Microsoft.Windows.Inventory.Core.InventoryDeviceMediaClassRemove - -This event indicates that the InventoryDeviceMediaClassRemove object is no longer present. - -This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedeviceinventorychange). - -The following fields are available: - -- **InventoryVersion** The version of the inventory file generating the events. - - -### Microsoft.Windows.Inventory.Core.InventoryDeviceMediaClassStartSync - -This event indicates that a new set of InventoryDeviceMediaClassSAdd events will be sent. - -This event includes fields from [Ms.Device.De~iceInventoryChange](#msdevicede~iceinventorychange). - -The following fields are available: - -- **InventoryVersion** The version of the inventory file generating the events. - - -### Microsoft.Windows.Inventory.Core.InventoryDevicePnpAdd - -This event represents the basic metadata about a plug and play (PNP) device and its associated driver. - -This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedeviceinventorychange). - -The following fields are available: - -- **basedata** No content is currently available. See [basedata](#basedata). -- **BusReportedDescription** The description of the device reported by the bux. -- **Class** The device setup class of the driver loaded for the device. -- **ClassGuid** The device class unique identifier of the driver package loaded on the device. -- **COMPID** The list of “Compatible IDs” for this device. -- **ContainerId** The system-supplied unique identifier that specifies which group(s) the device(s) installed on the parent (main) device belong to. -- **Description** The description of the device. -- **DeviceInterfaceClasses** The device interfaces that this device implements. -- **DeviceState** Identifies the current state of the parent (main) device. -- **DevicmState** No content is currently available. -- **DriverId** The unique identifier for the installed driver. -- **DriverName** The name of the driver image file. -- **DriverPackageStrongName** The immediate parent directory name in the Directory field of InventoryDriverPackage. -- **DriverVerDate** The date associated with the driver installed on the device. -- **DriverVerVersion** The version number of the driver installed on the device. -- **Enumerator** Identifies the bus that enumerated the device. -- **ExtendedInfs** The extended INF file names. -- **HWID** A list of hardware IDs for the device. -- **Inf** The name of the INF file (possibly renamed by the OS, such as oemXX.inf). -- **InstallState** The device installation state. For a list of values, see: https://msdn.microsoft.com/en-us/library/windows/hardware/ff543130.aspx -- **InventoryVersion** The version number of the inventory process generating the events. -- **LowerClassFilters** The identifiers of the Lower Class filters installed for the device. -- **LowerFilters** The identifiers of the Lower filters installed for the device. -- **Manufacturer** The manufacturer of the device. -- **MatchingID** The Hardware ID or Compatible ID that Windows uses to install a device instance. -- **Model** Identifies the model of the device. -- **ParentId** The Device Instance ID of the parent of the device. -- **ProblemCode** The error code currently returned by the device, if applicable. -- **Provider** Identifies the device provider. -- **Service** The name of the device service. -- **STACKID** The list of hardware IDs for the stack. -- **UpperClassFilters** The identifiers of the Upper Class filters installed for the device. -- **UpperFilers** No content is currently available. -- **UpperFilters** The identifiers of the Upper filters installed for the device. - - -### Microsoft.Windows.Inventory.Core.InventoryDevicePnpRemove - -This event indicates that the InventoryDevicePnpRemove object is no longer present. - -This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedeviceinventorychange). - -The following fields are available: - -- **InventoryVersion** The version of the inventory file generating the events. - - -### Microsoft.Windows.Inventory.Core.InventoryDevicePnpStartSync - -This event indicates that a new set of InventoryDevicePnpAdd events will be sent. - -This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedeviceinventorychange). - -The following fields are available: - -- **InventoryVersion** The version of the inventory file generating the events. - - -### Microsoft.Windows.Inventory.Core.InventoryDeviceUsbHubClassAdd - -This event sends basic metadata about the USB hubs on the device. - -This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedeviceinventorychange). - -The following fields are available: - -- **InventoryVersion** The version of the inventory file generating the events. -- **TotalUserConnectablePorts** Total number of connectable USB ports. -- **TotalUserConnectableTypeCPorts** Total number of connectable USB Type C ports. - - -### Microsoft.Windows.Inventory.Core.InventoryDeviceUsbHubClassStartSync - -This event indicates that a new set of InventoryDeviceUsbHubClassAdd events will be sent. - -This event includes fields from [Ms.De~ice.DeviceInventoryChange](#msde~icedeviceinventorychange). - -The following fields are available: - -- **InventoryVersion** The version of the inventory file generating the events. - - -### Microsoft.Windows.Inventory.Core.InventoryDriverBinaryAdd - -This event provides the basic metadata about driver binaries running on the system. - -This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedeviceinventorychange). - -The following fields are available: - -- **DriverCheckSum** The checksum of the driver file. -- **DriverCompany** The company name that developed the driver. -- **DriverInBox** Is the driver included with the operating system? -- **DriverIsKernelMode** Is it a kernel mode driver? -- **DriverName** The file name of the driver. -- **DriverPackageStrongName** The strong name of the driver package -- **DriverSigned** The strong name of the driver package -- **DriverTimeStamp** The low 32 bits of the time stamp of the driver file. -- **DriverType** A bitfield of driver attributes: 1. define DRIVER_MAP_DRIVER_TYPE_PRINTER 0x0001. 2. define DRIVER_MAP_DRIVER_TYPE_KERNEL 0x0002. 3. define DRIVER_MAP_DRIVER_TYPE_USER 0x0004. 4. define DRIVER_MAP_DRIVER_IS_SIGNED 0x0008. 5. define DRIVER_MAP_DRIVER_IS_INBOX 0x0010. 6. define DRIVER_MAP_DRIVER_IS_WINQUAL 0x0040. 7. define DRIVER_MAP_DRIVER_IS_SELF_SIGNED 0x0020. 8. define DRIVER_MAP_DRIVER_IS_CI_SIGNED 0x0080. 9. define DRIVER_MAP_DRIVER_HAS_BOOT_SERVICE 0x0100. 10. define DRIVER_MAP_DRIVER_TYPE_I386 0x10000. 11. define DRIVER_MAP_DRIVER_TYPE_IA64 0x20000. 12. define DRIVER_MAP_DRIVER_TYPE_AMD64 0x40000. 13. define DRIVER_MAP_DRIVER_TYPE_ARM 0x100000. 14. define DRIVER_MAP_DRIVER_TYPE_THUMB 0x200000. 15. define DRIVER_MAP_DRIVER_TYPE_ARMNT 0x400000. 16. define DRIVER_MAP_DRIVER_IS_TIME_STAMPED 0x800000. -- **DriverVersion** The version of the driver file. -- **ImageSize** The size of the driver file. -- **Inf** The name of the INF file. -- **InventoryVersion** The version of the inventory file generating the events. -- **Product** The product name that is included in the driver file. -- **ProductVersion** The product version that is included in the driver file. -- **Service** The name of the service that is installed for the device. -- **WdfVersion** The Windows Driver Framework version. - - -### Microsoft.Windows.Inventory.Core.InventoryDriverBinaryRemove - -This event indicates that the InventoryDriverBinary object is no longer present. - -This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedeviceinventorychange). - -The following fields are available: - -- **InventoryVersion** The version of the inventory file generating the events. - - -### Microsoft.Windows.Inventory.Core.InventoryDriverBinaryStartSync - -This event indicates that a new set of InventoryDriverBinaryAdd events will be sent. - -This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedeviceinventorychange). - -The following fields are available: - -- **InventoryVersion** The version of the inventory file generating the events. - - -### Microsoft.Windows.Inventory.Core.InventoryDriverPackageAdd - -This event sends basic metadata about drive packages installed on the system to help keep Windows up to date. - -This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedeviceinventorychange). - -The following fields are available: - -- **Class** The class name for the device driver. -- **ClassGuid** The class GUID for the device driver. -- **Date** The driver package date. -- **Directory** The path to the driver package. -- **DriverInBox** Is the driver included with the operating system? -- **Inf** The INF name of the driver package. -- **InventoryVersion** The version of the inventory file generating the events. -- **Provider** The provider for the driver package. -- **SubmissionId** The HLK submission ID for the driver package. -- **Version** The version of the driver package. - - -### Microsoft.Windows.Inventory.Core.InventoryDriverPackageRemove - -This event indicates that the InventoryDriverPackageRemove object is no longer present. - -This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedeviceinventorychange). - -The following fields are available: - -- **InventoryVersion** The version of the inventory file generating the events. - - -### Microsoft.Windows.Inventory.Core.InventoryDriverPackageStartSync - -This event indicates that a new set of InventoryDriverPackageAdd events will be sent. - -This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedeviceinventorychange). - -The following fields are available: - -- **InventoryVersion** The version of the inventory file generating the events. - - -### Microsoft.Windows.Inventory.Core.StartUtcJsonTrace - -This event collects traces of all other Core events, not used in typical customer scenarios. This event signals the beginning of the event download, and that tracing should begin. - - - -### Microsoft.Windows.Inventory.Core.StopUtcJsonTrace - -This event collects traces of all other Core events, not used in typical customer scenarios. This event signals the end of the event download, and that tracing should end. - - - -### Microsoft.Windows.Inventory.General.AppHealthStaticAdd - -This event sends details collected for a specific application on the source device. - -The following fields are available: - -- **AhaVersion** The binary version of the App Health Analyzer tool. -- **ApplicationErrors** The count of application errors from the event log. -- **Bitness** The architecture type of the application (16 Bit or 32 bit or 64 bit). -- **device_level** Various JRE/JAVA versions installed on a particular device. -- **ExtendedProperties** Attribute used for aggregating all other attributes under this event type. -- **Jar** Flag to determine if an app has a Java JAR file dependency. -- **Jre** Flag to determine if an app has JRE framework dependency. -- **Jre_version** JRE versions an app has declared framework dependency for. -- **Name** Name of the application. -- **NonDPIAware** Flag to determine if an app is non-DPI aware. -- **NumBinaries** Count of all binaries (.sys,.dll,.ini) from application install location. -- **RequiresAdmin** Flag to determine if an app requests admin privileges for execution. -- **RequiresAdminv2** Additional flag to determine if an app requests admin privileges for execution. -- **RequiresUIAccess** Flag to determine if an app is based on UI features for accessibility. -- **VB6** Flag to determine if an app is based on VB6 framework. -- **VB6v2** Additional flag to determine if an app is based on VB6 framework. -- **Version** Version of the application. -- **VersionCheck** Flag to determine if an app has a static dependency on OS version. -- **VersionCheckv2** Additional flag to determine if an app has a static dependency on OS version. - - -### Microsoft.Windows.Inventory.General.AppHealthStaticStartSync - -This event indicates the beginning of a series of AppHealthStaticAdd events. - -The following fields are available: - -- **AllowTelemetry** Indicates the presence of the 'allowtelemetry' command line argument. -- **CommandLineArgs** Command line arguments passed when launching the App Health Analyzer executable. -- **Enhanced** Indicates the presence of the 'enhanced' command line argument. -- **StartTime** UTC date and time at which this event was sent. - - -### Microsoft.Windows.Inventory.General.InventoryMiscellaneousOfficeAddInAdd - -Provides data on the installed Office Add-ins. - -This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedeviceinventorychange). - -The following fields are available: - -- **AddinCLSID** The class identifier key for the Microsoft Office add-in. -- **AddInCLSID** The class identifier key for the Microsoft Office add-in. -- **AddInId** The identifier for the Microsoft Office add-in. -- **AddinType** The type of the Microsoft Office add-in. -- **BinFileTimestamp** The timestamp of the Office add-in. -- **BinFileVersion** The version of the Microsoft Office add-in. -- **Description** Description of the Microsoft Office add-in. -- **FileId** The file identifier of the Microsoft Office add-in. -- **FileSize** The file size of the Microsoft Office add-in. -- **FriendlyName** The friendly name for the Microsoft Office add-in. -- **FullPath** The full path to the Microsoft Office add-in. -- **InventoryVersion** The version of the inventory binary generating the events. -- **LoadBehavior** Integer that describes the load behavior. -- **LoadTime** Load time for the Office add-in. -- **OfficeApplication** The Microsoft Office application associated with the add-in. -- **OfficeArchitecture** The architecture of the add-in. -- **OfficeVersion** The Microsoft Office version for this add-in. -- **OutlookCrashingAddin** Indicates whether crashes have been found for this add-in. -- **ProductCompany** The name of the company associated with the Office add-in. -- **ProductName** The product name associated with the Microsoft Office add-in. -- **ProductVersion** The version associated with the Office add-in. -- **ProgramId** The unique program identifier of the Microsoft Office add-in. -- **Provider** Name of the provider for this add-in. - - -### Microsoft.Windows.Inventory.General.InventoryMiscellaneousOfficeAddInRemove - -Indicates that this particular data object represented by the objectInstanceId is no longer present. - -This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedeviceinventorychange). - -The following fields are available: - -- **InventoryVersion** The version of the inventory binary generating the events. - - -### Microsoft.Windows.Inventory.General.InventoryMiscellaneousOfficeAddInStartSync - -This event indicates that a new sync is being generated for this object type. - -This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedeviceinventorychange). - -The following fields are available: - -- **InventoryVersion** The version of the inventory binary generating the events. - - -### Microsoft.Windows.Inventory.General.InventoryMiscellaneousOfficeIdentifiersAdd - -Provides data on the Office identifiers. - -This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedeviceinventorychange). - -The following fields are available: - -- **InventoryVersion** The version of the inventory binary generating the events. -- **OAudienceData** Sub-identifier for Microsoft Office release management, identifying the pilot group for a device -- **OAudienceId** Microsoft Office identifier for Microsoft Office release management, identifying the pilot group for a device -- **OMID** Identifier for the Office SQM Machine -- **OPlatform** Whether the installed Microsoft Office product is 32-bit or 64-bit -- **OTenantId** Unique GUID representing the Microsoft O365 Tenant -- **OVersion** Installed version of Microsoft Office. For example, 16.0.8602.1000 -- **OWowMID** Legacy Microsoft Office telemetry identifier (SQM Machine ID) for WoW systems (32-bit Microsoft Office on 64-bit Windows) - - -### Microsoft.Windows.Inventory.General.InventoryMiscellaneousOfficeIdentifiersStartSync - -Diagnostic event to indicate a new sync is being generated for this object type. - -This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedeviceinventorychange). - -The following fields are available: - -- **InventoryVersion** The version of the inventory binary generating the events. - - -### Microsoft.Windows.Inventory.General.InventoryMiscellaneousOfficeIESettingsAdd - -Provides data on Office-related Internet Explorer features. - -This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedeviceinventorychange). - -The following fields are available: - -- **InventoryVersion** The version of the inventory binary generating the events. -- **OIeFeatureAddon** Flag indicating which Microsoft Office products have this setting enabled. The FEATURE_ADDON_MANAGEMENT feature lets applications hosting the WebBrowser Control to respect add-on management selections made using the Add-on Manager feature of Internet Explorer. Add-ons disabled by the user or by administrative group policy will also be disabled in applications that enable this feature. -- **OIeMachineLockdown** Flag indicating which Microsoft Office products have this setting enabled. When the FEATURE_LOCALMACHINE_LOCKDOWN feature is enabled, Internet Explorer applies security restrictions on content loaded from the user's local machine, which helps prevent malicious behavior involving local files. -- **OIeMimeHandling** Flag indicating which Microsoft Office products have this setting enabled. When the FEATURE_MIME_HANDLING feature control is enabled, Internet Explorer handles MIME types more securely. Only applies to Windows Internet Explorer 6 for Windows XP Service Pack 2 (SP2) -- **OIeMimeSniffing** Flag indicating which Microsoft Office products have this setting enabled. Determines a file's type by examining its bit signature. Windows Internet Explorer uses this information to determine how to render the file. The FEATURE_MIME_SNIFFING feature, when enabled, allows to be set differently for each security zone by using the URLACTION_FEATURE_MIME_SNIFFING URL action flag -- **OIeNoAxInstall** Flag indicating which Microsoft Office products have this setting enabled. When a webpage attempts to load or install an ActiveX control that isn't already installed, the FEATURE_RESTRICT_ACTIVEXINSTALL feature blocks the request. When a webpage tries to load or install an ActiveX control that isn't already installed, the FEATURE_RESTRICT_ACTIVEXINSTALL feature blocks the request -- **OIeNoDownload** Flag indicating which Microsoft Office products have this setting enabled. The FEATURE_RESTRICT_FILEDOWNLOAD feature blocks file download requests that navigate to a resource, that display a file download dialog box, or that are not initiated explicitly by a user action (for example, a mouse click or key press). Only applies to Windows Internet Explorer 6 for Windows XP Service Pack 2 (SP2) -- **OIeObjectCaching** Flag indicating which Microsoft Office products have this setting enabled. When enabled, the FEATURE_OBJECT_CACHING feature prevents webpages from accessing or instantiating ActiveX controls cached from different domains or security contexts -- **OIePasswordDisable** Flag indicating which Microsoft Office products have this setting enabled. After Windows Internet Explorer 6 for Windows XP Service Pack 2 (SP2), Internet Explorer no longer allows usernames and passwords to be specified in URLs that use the HTTP or HTTPS protocols. URLs using other protocols, such as FTP, still allow usernames and passwords -- **OIeSafeBind** Flag indicating which Microsoft Office products have this setting enabled. The FEATURE_SAFE_BINDTOOBJECT feature performs additional safety checks when calling MonikerBindToObject to create and initialize Microsoft ActiveX controls. Specifically, prevent the control from being created if COMPAT_EVIL_DONT_LOAD is in the registry for the control -- **OIeSecurityBand** Flag indicating which Microsoft Office products have this setting enabled. The FEATURE_SECURITYBAND feature controls the display of the Internet Explorer Information bar. When enabled, the Information bar appears when file download or code installation is restricted -- **OIeUncSaveCheck** Flag indicating which Microsoft Office products have this setting enabled. The FEATURE_UNC_SAVEDFILECHECK feature enables the Mark of the Web (MOTW) for local files loaded from network locations that have been shared by using the Universal Naming Convention (UNC) -- **OIeValidateUrl** Flag indicating which Microsoft Office products have this setting enabled. When enabled, the FEATURE_VALIDATE_NAVIGATE_URL feature control prevents Windows Internet Explorer from navigating to a badly formed URL -- **OIeWebOcPopup** Flag indicating which Microsoft Office products have this setting enabled. The FEATURE_WEBOC_POPUPMANAGEMENT feature allows applications hosting the WebBrowser Control to receive the default Internet Explorer pop-up window management behavior -- **OIeWinRestrict** Flag indicating which Microsoft Office products have this setting enabled. When enabled, the FEATURE_WINDOW_RESTRICTIONS feature adds several restrictions to the size and behavior of popup windows -- **OIeZoneElevate** Flag indicating which Microsoft Office products have this setting enabled. When enabled, the FEATURE_ZONE_ELEVATION feature prevents pages in one zone from navigating to pages in a higher security zone unless the navigation is generated by the user - - -### Microsoft.Windows.Inventory.General.InventoryMiscellaneousOfficeIESettingsStartSync - -Diagnostic event to indicate a new sync is being generated for this object type. - -This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedeviceinventorychange). - -The following fields are available: - -- **InventoryVersion** The version of the inventory binary generating the events. - - -### Microsoft.Windows.Inventory.General.InventoryMiscellaneousOfficeInsightsAdd - -This event provides insight data on the installed Office products - -This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedeviceinventorychange). - -The following fields are available: - -- **InventoryVersion** The version of the inventory binary generating the events. -- **OfficeApplication** The name of the Office application. -- **OfficeArchitecture** The bitness of the Office application. -- **OfficeVersion** The version of the Office application. -- **Value** The insights collected about this entity. - - -### Microsoft.Windows.Inventory.General.InventoryMiscellaneousOfficeInsightsRemove - -Indicates that this particular data object represented by the objectInstanceId is no longer present. - -This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedeviceinventorychange). - -The following fields are available: - -- **InventoryVersion** The version of the inventory binary generating the events. - - -### Microsoft.Windows.Inventory.General.InventoryMiscellaneousOfficeInsightsStartSync - -This diagnostic event indicates that a new sync is being generated for this object type. - -This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedeviceinventorychange). - -The following fields are available: - -- **InventoryVersion** The version of the inventory binary generating the events. - - -### Microsoft.Windows.Inventory.General.InventoryMiscellaneousOfficeProductsAdd - -Describes Office Products installed. - -This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedeviceinventorychange). - -The following fields are available: - -- **InventoryVersion** The version of the inventory binary generating the events. -- **OC2rApps** A GUID the describes the Office Click-To-Run apps -- **OC2rSkus** Comma-delimited list (CSV) of Office Click-To-Run products installed on the device. For example, Office 2016 ProPlus -- **OMsiApps** Comma-delimited list (CSV) of Office MSI products installed on the device. For example, Microsoft Word -- **OProductCodes** A GUID that describes the Office MSI products - - -### Microsoft.Windows.Inventory.General.InventoryMiscellaneousOfficeProductsStartSync - -Diagnostic event to indicate a new sync is being generated for this object type. - -This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedeviceinventorychange). - -The following fields are available: - -- **InventoryVersion** The version of the inventory binary generating the events. - - -### Microsoft.Windows.Inventory.General.InventoryMiscellaneousOfficeSettingsAdd - -This event describes various Office settings - -This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedeviceinventorychange). - -The following fields are available: - -- **BrowserFlags** Browser flags for Office-related products -- **ExchangeProviderFlags** Provider policies for Office Exchange -- **InventoryVersion** The version of the inventory binary generating the events. -- **SharedComputerLicensing** Office shared computer licensing policies - - -### Microsoft.Windows.Inventory.General.InventoryMiscellaneousOfficeSettingsStartSync - -Indicates a new sync is being generated for this object type. - -This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedeviceinventorychange). - -The following fields are available: - -- **InventoryVersion** The version of the inventory binary generating the events. - - -### Microsoft.Windows.Inventory.General.InventoryMiscellaneousOfficeVBAAdd - -This event provides a summary rollup count of conditions encountered while performing a local scan of Office files, analyzing for known VBA programmability compatibility issues between legacy office version and ProPlus, and between 32 and 64-bit versions - -This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedeviceinventorychange). - -The following fields are available: - -- **Design** Count of files with design issues found. -- **Design_x64** Count of files with 64 bit design issues found. -- **DuplicateVBA** Count of files with duplicate VBA code. -- **HasVBA** Count of files with VBA code. -- **Inaccessible** Count of files that were inaccessible for scanning. -- **InventoryVersion** The version of the inventory binary generating the events. -- **Issues** Count of files with issues detected. -- **Issues_x64** Count of files with 64-bit issues detected. -- **IssuesNone** Count of files with no issues detected. -- **IssuesNone_x64** Count of files with no 64-bit issues detected. -- **Locked** Count of files that were locked, preventing scanning. -- **NoVBA** Count of files with no VBA inside. -- **Protected** Count of files that were password protected, preventing scanning. -- **RemLimited** Count of files that require limited remediation changes. -- **RemLimited_x64** Count of files that require limited remediation changes for 64-bit issues. -- **RemSignificant** Count of files that require significant remediation changes. -- **RemSignificant_x64** Count of files that require significant remediation changes for 64-bit issues. -- **Score** Overall compatibility score calculated for scanned content. -- **Score_x64** Overall 64-bit compatibility score calculated for scanned content. -- **Total** Total number of files scanned. -- **Validation** Count of files that require additional manual validation. -- **Validation_x64** Count of files that require additional manual validation for 64-bit issues. - - -### Microsoft.Windows.Inventory.General.InventoryMiscellaneousOfficeVBARemove - -Indicates that this particular data object represented by the objectInstanceId is no longer present. - -This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedeviceinventorychange). - -The following fields are available: - -- **InventoryVersion** The version of the inventory binary generating the events. - - -### Microsoft.Windows.Inventory.General.InventoryMiscellaneousOfficeVBARuleViolationsAdd - -This event provides data on Microsoft Office VBA rule violations, including a rollup count per violation type, giving an indication of remediation requirements for an organization. The event identifier is a unique GUID, associated with the validation rule - -This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedeviceinventorychange). - -The following fields are available: - -- **Count** Count of total Microsoft Office VBA rule violations -- **InventoryVersion** The version of the inventory binary generating the events. - - -### Microsoft.Windows.Inventory.General.InventoryMiscellaneousOfficeVBARuleViolationsRemove - -Indicates that this particular data object represented by the objectInstanceId is no longer present. - -This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedeviceinventorychange). - -The following fields are available: - -- **InventoryVersion** The version of the inventory binary generating the events. - - -### Microsoft.Windows.Inventory.General.InventoryMiscellaneousOfficeVBARuleViolationsStartSync - -This event indicates that a new sync is being generated for this object type. - -This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedeviceinventorychange). - -The following fields are available: - -- **InventoryVersion** The version of the inventory binary generating the events. - - -### Microsoft.Windows.Inventory.General.InventoryMiscellaneousOfficeVBAStartSync - -Diagnostic event to indicate a new sync is being generated for this object type. - -This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedeviceinventorychange). - -The following fields are available: - -- **InventoryVersion** The version of the inventory binary generating the events. - - -### Microsoft.Windows.Inventory.General.InventoryMiscellaneousUUPInfoAdd - -Provides data on Unified Update Platform (UUP) products and what version they are at. - -This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedeviceinventorychange). - -The following fields are available: - -- **Identifier** UUP identifier -- **LastActivatedVersion** Last activated version -- **PreviousVersion** Previous version -- **Source** UUP source -- **Version** UUP version - - -### Microsoft.Windows.Inventory.General.InventoryMiscellaneousUUPInfoRemove - -Indicates that this particular data object represented by the objectInstanceId is no longer present. - -This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedeviceinventorychange). - - - -### Microsoft.Windows.Inventory.General.InventoryMiscellaneousUUPInfoStartSync - -Diagnostic event to indicate a new sync is being generated for this object type. - -This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedeviceinventorychange). - - - -### Microsoft.Windows.Inventory.Indicators.Checksum - -This event summarizes the counts for the InventoryMiscellaneousUexIndicatorAdd events. - -The following fields are available: - -- **CensusId** A unique hardware identifier. -- **ChecksumDictionary** A count of each operating system indicator. -- **PCFP** Equivalent to the InventoryId field that is found in other core events. - - -### Microsoft.Windows.Inventory.Indicators.InventoryMiscellaneousUexIndicatorAdd - -These events represent the basic metadata about the OS indicators installed on the system which are used for keeping the device up to date. - -This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedeviceinventorychange). - -The following fields are available: - -- **IndicatorValue** The indicator value. -- **Value** Describes an operating system indicator that may be relevant for the device upgrade. - - -### Microsoft.Windows.Inventory.Indicators.InventoryMiscellaneousUexIndicatorRemove - -This event is a counterpart to InventoryMiscellaneousUexIndicatorAdd that indicates that the item has been removed. - -This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedeviceinventorychange). - - - -### Microsoft.Windows.Inventory.Indicators.InventoryMiscellaneousUexIndicatorStartSync - -This event indicates that a new set of InventoryMiscellaneousUexIndicatorAdd events will be sent. - -This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedeviceinventorychange). - - - -## Kernel events - -### IO - -This event indicates the number of bytes read from or read by the OS and written to or written by the OS upon system startup. - -The following fields are available: - -- **BytesRead** The total number of bytes read from or read by the OS upon system startup. -- **BytesWritten** The total number of bytes written to or written by the OS upon system startup. - - -### Microsoft.Windows.Kernel.BootEnvironment.OsLaunch - -OS information collected during Boot, used to evaluate the success of the upgrade process. - -The following fields are available: - -- **BootApplicationId** This field tells us what the OS Loader Application Identifier is. -- **BootAttemptCount** The number of consecutive times the boot manager has attempted to boot into this operating system. -- **BootSequence** The current Boot ID, used to correlate events related to a particular boot session. -- **BootStatusPolicy** Identifies the applicable Boot Status Policy. -- **BootType** Identifies the type of boot (e.g.: "Cold", "Hiber", "Resume"). -- **EventTimestamp** Seconds elapsed since an arbitrary time point. This can be used to identify the time difference in successive boot attempts being made. -- **FirmwareResetReasonEmbeddedController** Reason for system reset provided by firmware. -- **FirmwareResetReasonEmbeddedControllerAdditional** Additional information on system reset reason provided by firmware if needed. -- **FirmwareResetReasonPch** Reason for system reset provided by firmware. -- **FirmwareResetReasonPchAdditional** Additional information on system reset reason provided by firmware if needed. -- **FirmwareResetReasonSupplied** Flag indicating that a reason for system reset was provided by firmware. -- **IO** Amount of data written to and read from the disk by the OS Loader during boot. See [IO](#io). -- **LastBootSucceeded** Flag indicating whether the last boot was successful. -- **LastShutdownSucceeded** Flag indicating whether the last shutdown was successful. -- **MaxAbove4GbFreeRange** This field describes the largest memory range available above 4Gb. -- **MaxBelow4GbFreeRange** This field describes the largest memory range available below 4Gb. -- **MeasuredLaunchPrepared** This field tells us if the OS launch was initiated using Measured/Secure Boot over DRTM (Dynamic Root of Trust for Measurement). -- **MeasuredLaunchResume** This field tells us if Dynamic Root of Trust for Measurement (DRTM) was used when resuming from hibernation. -- **MenuPolicy** Type of advanced options menu that should be shown to the user (Legacy, Standard, etc.). -- **RecoveryEnabled** Indicates whether recovery is enabled. -- **SecureLaunchPrepared** This field indicates if DRTM was prepared during boot. -- **TcbLaunch** Indicates whether the Trusted Computing Base was used during the boot flow. -- **UserInputTime** The amount of time the loader application spent waiting for user input. - - -## Miracast events - -### Microsoft.Windows.Cast.Miracast.MiracastSessionEnd - -This event sends data at the end of a Miracast session that helps determine RTSP related Miracast failures along with some statistics about the session - -The following fields are available: - -- **AudioChannelCount** The number of audio channels. -- **AudioSampleRate** The sample rate of audio in terms of samples per second. -- **AudioSubtype** The unique subtype identifier of the audio codec (encoding method) used for audio encoding. -- **AverageBitrate** The average video bitrate used during the Miracast session, in bits per second. -- **AverageDataRate** The average available bandwidth reported by the WiFi driver during the Miracast session, in bits per second. -- **AveragePacketSendTimeInMs** The average time required for the network to send a sample, in milliseconds. -- **ConnectorType** The type of connector used during the Miracast session. -- **EncodeAverageTimeMS** The average time to encode a frame of video, in milliseconds. -- **EncodeCount** The count of total frames encoded in the session. -- **EncodeMaxTimeMS** The maximum time to encode a frame, in milliseconds. -- **EncodeMinTimeMS** The minimum time to encode a frame, in milliseconds. -- **EncoderCreationTimeInMs** The time required to create the video encoder, in milliseconds. -- **ErrorSource** Identifies the component that encountered an error that caused a disconnect, if applicable. -- **FirstFrameTime** The time (tick count) when the first frame is sent. -- **FirstLatencyMode** The first latency mode. -- **FrameAverageTimeMS** Average time to process an entire frame, in milliseconds. -- **FrameCount** The total number of frames processed. -- **FrameMaxTimeMS** The maximum time required to process an entire frame, in milliseconds. -- **FrameMinTimeMS** The minimum time required to process an entire frame, in milliseconds. -- **Glitches** The number of frames that failed to be delivered on time. -- **HardwareCursorEnabled** Indicates if hardware cursor was enabled when the connection ended. -- **HDCPState** The state of HDCP (High-bandwidth Digital Content Protection) when the connection ended. -- **HighestBitrate** The highest video bitrate used during the Miracast session, in bits per second. -- **HighestDataRate** The highest available bandwidth reported by the WiFi driver, in bits per second. -- **LastLatencyMode** The last reported latency mode. -- **LogTimeReference** The reference time, in tick counts. -- **LowestBitrate** The lowest video bitrate used during the Miracast session, in bits per second. -- **LowestDataRate** The lowest video bitrate used during the Miracast session, in bits per second. -- **MediaErrorCode** The error code reported by the media session, if applicable. -- **MiracastEntry** The time (tick count) when the Miracast driver was first loaded. -- **MiracastM1** The time (tick count) when the M1 request was sent. -- **MiracastM2** The time (tick count) when the M2 request was sent. -- **MiracastM3** The time (tick count) when the M3 request was sent. -- **MiracastM4** The time (tick count) when the M4 request was sent. -- **MiracastM5** The time (tick count) when the M5 request was sent. -- **MiracastM6** The time (tick count) when the M6 request was sent. -- **MiracastM7** The time (tick count) when the M7 request was sent. -- **MiracastSessionState** The state of the Miracast session when the connection ended. -- **MiracastStreaming** The time (tick count) when the Miracast session first started processing frames. -- **ProfileCount** The count of profiles generated from the receiver M4 response. -- **ProfileCountAfterFiltering** The count of profiles after filtering based on available bandwidth and encoder capabilities. -- **RefreshRate** The refresh rate set on the remote display. -- **RotationSupported** Indicates if the Miracast receiver supports display rotation. -- **RTSPSessionId** The unique identifier of the RTSP session. This matches the RTSP session ID for the receiver for the same session. -- **SessionGuid** The unique identifier of to correlate various Miracast events from a session. -- **SinkHadEdid** Indicates if the Miracast receiver reported an EDID. -- **SupportMicrosoftColorSpaceConversion** Indicates whether the Microsoft color space conversion for extra color fidelity is supported by the receiver. -- **SupportsMicrosoftDiagnostics** Indicates whether the Miracast receiver supports the Microsoft Diagnostics Miracast extension. -- **SupportsMicrosoftFormatChange** Indicates whether the Miracast receiver supports the Microsoft Format Change Miracast extension. -- **SupportsMicrosoftLatencyManagement** Indicates whether the Miracast receiver supports the Microsoft Latency Management Miracast extension. -- **SupportsMicrosoftRTCP** Indicates whether the Miracast receiver supports the Microsoft RTCP Miracast extension. -- **SupportsMicrosoftVideoFormats** Indicates whether the Miracast receiver supports Microsoft video format for 3:2 resolution. -- **SupportsWiDi** Indicates whether Miracast receiver supports Intel WiDi extensions. -- **TeardownErrorCode** The error code reason for teardown provided by the receiver, if applicable. -- **TeardownErrorReason** The text string reason for teardown provided by the receiver, if applicable. -- **UIBCEndState** Indicates whether UIBC was enabled when the connection ended. -- **UIBCEverEnabled** Indicates whether UIBC was ever enabled. -- **UIBCStatus** The result code reported by the UIBC setup process. -- **VideoBitrate** The starting bitrate for the video encoder. -- **VideoCodecLevel** The encoding level used for encoding, specific to the video subtype. -- **VideoHeight** The height of encoded video frames. -- **VideoSubtype** The unique subtype identifier of the video codec (encoding method) used for video encoding. -- **VideoWidth** The width of encoded video frames. -- **WFD2Supported** Indicates if the Miracast receiver supports WFD2 protocol. - - -## OneDrive events - -### Microsoft.OneDrive.Sync.Setup.APIOperation - -This event includes basic data about install and uninstall OneDrive API operations. - -The following fields are available: - -- **APIName** The name of the API. -- **Duration** How long the operation took. -- **IsSuccess** Was the operation successful? -- **ResultCode** The result code. -- **ScenarioName** The name of the scenario. - - -### Microsoft.OneDrive.Sync.Setup.EndExperience - -This event includes a success or failure summary of the installation. - -The following fields are available: - -- **APIName** The name of the API. -- **HResult** HResult of the operation -- **IsSuccess** Whether the operation is successful or not -- **ScenarioName** The name of the scenario. - - -### Microsoft.OneDrive.Sync.Setup.OSUpgradeInstallationOperation - -This event is related to the OS version when the OS is upgraded with OneDrive installed. - -The following fields are available: - -- **CurrentOneDriveVersion** The current version of OneDrive. -- **CurrentOSBuildBranch** The current branch of the operating system. -- **CurrentOSBuildNumber** The current build number of the operating system. -- **CurrentOSVersion** The current version of the operating system. -- **HResult** The HResult of the operation. -- **SourceOSBuildBranch** The source branch of the operating system. -- **SourceOSBuildNumber** The source build number of the operating system. -- **SourceOSVersion** The source version of the operating system. - - -### Microsoft.OneDrive.Sync.Setup.RegisterStandaloneUpdaterAPIOperation - -This event is related to registering or unregistering the OneDrive update task. - -The following fields are available: - -- **APIName** The name of the API. -- **IsSuccess** Was the operation successful? -- **RegisterNewTaskResult** The HResult of the RegisterNewTask operation. -- **ScenarioName** The name of the scenario. -- **UnregisterOldTaskResult** The HResult of the UnregisterOldTask operation. - - -### Microsoft.OneDrive.Sync.Updater.ComponentInstallState - -This event includes basic data about the installation state of dependent OneDrive components. - -The following fields are available: - -- **ComponentName** The name of the dependent component. -- **isInstalled** Is the dependent component installed? - - -### Microsoft.OneDrive.Sync.Updater.OverlayIconStatus - -This event indicates if the OneDrive overlay icon is working correctly. 0 = healthy; 1 = can be fixed; 2 = broken - -The following fields are available: - -- **32bit** The status of the OneDrive overlay icon on a 32-bit operating system. -- **64bit** The status of the OneDrive overlay icon on a 64-bit operating system. - - -### Microsoft.OneDrive.Sync.Updater.UpdateOverallResult - -This event sends information describing the result of the update. - -The following fields are available: - -- **hr** The HResult of the operation. -- **IsLoggingEnabled** Indicates whether logging is enabled for the updater. -- **UpdaterVersion** The version of the updater. - - -### Microsoft.OneDrive.Sync.Updater.UpdateXmlDownloadHResult - -This event determines the status when downloading the OneDrive update configuration file. - -The following fields are available: - -- **hr** The HResult of the operation. - - -### Microsoft.OneDrive.Sync.Updater.WebConnectionStatus - -This event determines the error code that was returned when verifying Internet connectivity. - -The following fields are available: - -- **winInetError** The HResult of the operation. - - -## Privacy consent logging events - -### Microsoft.Windows.Shell.PrivacyConsentLogging.PrivacyConsentCompleted - -This event is used to determine whether the user successfully completed the privacy consent experience. - -The following fields are available: - -- **presentationVersion** Which display version of the privacy consent experience the user completed -- **privacyConsentState** The current state of the privacy consent experience -- **settingsVersion** Which setting version of the privacy consent experience the user completed -- **userOobeExitReason** The exit reason of the privacy consent experience - - -### Microsoft.Windows.Shell.PrivacyConsentLogging.PrivacyConsentStatus - -Event tells us effectiveness of new privacy experience. - -The following fields are available: - -- **isAdmin** whether the person who is logging in is an admin -- **isExistingUser** whether the account existed in a downlevel OS -- **isLaunching** Whether or not the privacy consent experience will be launched -- **isSilentElevation** whether the user has most restrictive UAC controls -- **privacyConsentState** whether the user has completed privacy experience -- **userRegionCode** The current user's region setting - - -### wilActivity - -This event provides a Windows Internal Library context used for Product and Service diagnostics. - -The following fields are available: - -- **callContext** The function where the failure occurred. -- **currentContextId** The ID of the current call context where the failure occurred. -- **currentContextMessage** The message of the current call context where the failure occurred. -- **currentContextName** The name of the current call context where the failure occurred. -- **failureCount** The number of failures for this failure ID. -- **failureId** The ID of the failure that occurred. -- **failureType** The type of the failure that occurred. -- **fileName** The file name where the failure occurred. -- **function** The function where the failure occurred. -- **hresult** The HResult of the overall activity. -- **lineNumber** The line number where the failure occurred. -- **message** The message of the failure that occurred. -- **module** The module where the failure occurred. -- **originatingContextId** The ID of the originating call context that resulted in the failure. -- **originatingContextMessage** The message of the originating call context that resulted in the failure. -- **originatingContextName** The name of the originating call context that resulted in the failure. -- **threadId** The ID of the thread on which the activity is executing. - - -## Sediment events - -### Microsoft.Windows.Sediment.Info.DetailedState - -This event is sent when detailed state information is needed from an update trial run. - -The following fields are available: - -- **Data** Data relevant to the state, such as what percent of disk space the directory takes up. -- **Id** Identifies the trial being run, such as a disk related trial. -- **ReleaseVer** The version of the component. -- **State** The state of the reporting data from the trial, such as the top-level directory analysis. -- **Time** The time the event was fired. - - -### Microsoft.Windows.Sediment.Info.Error - -This event indicates an error in the updater payload. This information assists in keeping Windows up to date. - -The following fields are available: - -- **FailureType** The type of error encountered. -- **FileName** The code file in which the error occurred. -- **HResult** The failure error code. -- **LineNumber** The line number in the code file at which the error occurred. -- **ReleaseVer** The version information for the component in which the error occurred. -- **Time** The system time at which the error occurred. - - -### Microsoft.Windows.Sediment.Info.PhaseChange - -The event indicates progress made by the updater. This information assists in keeping Windows up to date. - -The following fields are available: - -- **NewPhase** The phase of progress made. -- **ReleaseVer** The version information for the component in which the change occurred. -- **Time** The system time at which the phase chance occurred. - - -## Setup events - -### SetupPlatformTel.SetupPlatformTelActivityEvent - -This event sends basic metadata about the SetupPlatform update installation process, to help keep Windows up to date. - -The following fields are available: - -- **FieldName** Retrieves the event name/data point. Examples: InstallStartTime, InstallEndtime, OverallResult etc. -- **GroupName** Retrieves the groupname the event belongs to. Example: Install Information, DU Information, Disk Space Information etc. -- **Value** Value associated with the corresponding event name. For example, time-related events will include the system time - - -### SetupPlatformTel.SetupPlatformTelActivityStarted - -This event sends basic metadata about the update installation process generated by SetupPlatform to help keep Windows up to date. - -The following fields are available: - -- **Name** The name of the dynamic update type. Example: GDR driver - - -### SetupPlatformTel.SetupPlatformTelActivityStopped - -This event sends basic metadata about the update installation process generated by SetupPlatform to help keep Windows up to date. - - - -### SetupPlatformTel.SetupPlatformTelEvent - -This service retrieves events generated by SetupPlatform, the engine that drives the various deployment scenarios. - -The following fields are available: - -- **FieldName** Retrieves the event name/data point. Examples: InstallStartTime, InstallEndtime, OverallResult etc. -- **GroupName** Retrieves the groupname the event belongs to. Example: Install Information, DU Information, Disk Space Information etc. -- **Value** Retrieves the value associated with the corresponding event name (Field Name). For example: For time related events this will include the system time. - - -## Software update events - -### SoftwareUpdateClientTelemetry.CheckForUpdates - -Scan process event on Windows Update client. See the EventScenario field for specifics (started/failed/succeeded). - -The following fields are available: - -- **ActivityMatchingId** Contains a unique ID identifying a single CheckForUpdates session from initialization to completion. -- **AllowCachedResults** Indicates if the scan allowed using cached results. -- **ApplicableUpdateInfo** Metadata for the updates which were detected as applicable -- **BiosFamily** The family of the BIOS (Basic Input Output System). -- **BiosName** The name of the device BIOS. -- **BiosReleaseDate** The release date of the device BIOS. -- **BiosSKUNumber** The sku number of the device BIOS. -- **BIOSVendor** The vendor of the BIOS. -- **BiosVersion** The version of the BIOS. -- **BranchReadinessLevel** The servicing branch configured on the device. -- **CachedEngineVersion** For self-initiated healing, the version of the SIH engine that is cached on the device. If the SIH engine does not exist, the value is null. -- **CallerApplicationName** The name provided by the caller who initiated API calls into the software distribution client. -- **CapabilityDetectoidGuid** The GUID for a hardware applicability detectoid that could not be evaluated. -- **CDNCountryCode** Two letter country abbreviation for the Content Distribution Network (CDN) location. -- **CDNId** The unique identifier of a specific device, used to identify how many devices are encountering success or a particular issue. -- **ClientVersion** The version number of the software distribution client. -- **CommonProps** A bitmask for future flags associated with the Windows Update client behavior. No data is currently reported in this field. Expected value for this field is 0. -- **Context** Gives context on where the error has occurred. Example: AutoEnable, GetSLSData, AddService, Misc, or Unknown -- **CurrentMobileOperator** The mobile operator the device is currently connected to. -- **DeferralPolicySources** Sources for any update deferral policies defined (GPO = 0x10, MDM = 0x100, Flight = 0x1000, UX = 0x10000). -- **DeferredUpdates** Update IDs which are currently being deferred until a later time -- **DeviceModel** What is the device model. -- **DriverError** The error code hit during a driver scan. This is 0 if no error was encountered. -- **DriverExclusionPolicy** Indicates if the policy for not including drivers with Windows Update is enabled. -- **DriverSyncPassPerformed** Were drivers scanned this time? -- **EventInstanceID** A globally unique identifier for event instance. -- **EventScenario** Indicates the purpose of sending this event - whether because the software distribution just started checking for content, or whether it was cancelled, succeeded, or failed. -- **ExtendedMetadataCabUrl** Hostname that is used to download an update. -- **ExtendedStatusCode** Secondary error code for certain scenarios where StatusCode wasn't specific enough. -- **FailedUpdateGuids** The GUIDs for the updates that failed to be evaluated during the scan. -- **FailedUpdatesCount** The number of updates that failed to be evaluated during the scan. -- **FeatureUpdateDeferral** The deferral period configured for feature OS updates on the device (in days). -- **FeatureUpdatePause** Indicates whether feature OS updates are paused on the device. -- **FeatureUpdatePausePeriod** The pause duration configured for feature OS updates on the device (in days). -- **FlightBranch** The branch that a device is on if participating in flighting (pre-release builds). -- **FlightRing** The ring (speed of getting builds) that a device is on if participating in flighting (pre-release builds). -- **HomeMobileOperator** The mobile operator that the device was originally intended to work with. -- **IntentPFNs** Intended application-set metadata for atomic update scenarios. -- **IPVersion** Indicates whether the download took place over IPv4 or IPv6 -- **IsWUfBDualScanEnabled** Indicates if Windows Update for Business dual scan is enabled on the device. -- **IsWUfBEnabled** Indicates if Windows Update for Business is enabled on the device. -- **IsWUfBFederatedScanDisabled** Indicates if Windows Update for Business federated scan is disabled on the device. -- **MetadataIntegrityMode** The mode of the update transport metadata integrity check. 0-Unknown, 1-Ignoe, 2-Audit, 3-Enforce -- **MSIError** The last error that was encountered during a scan for updates. -- **NetworkConnectivityDetected** Indicates the type of network connectivity that was detected. 0 - IPv4, 1 - IPv6 -- **NumberOfApplicableUpdates** The number of updates which were ultimately deemed applicable to the system after the detection process is complete -- **NumberOfApplicationsCategoryScanEvaluated** The number of categories (apps) for which an app update scan checked -- **NumberOfLoop** The number of round trips the scan required -- **NumberOfNewUpdatesFromServiceSync** The number of updates which were seen for the first time in this scan -- **NumberOfUpdatesEvaluated** The total number of updates which were evaluated as a part of the scan -- **NumFailedMetadataSignatures** The number of metadata signatures checks which failed for new metadata synced down. -- **Online** Indicates if this was an online scan. -- **PausedUpdates** A list of UpdateIds which that currently being paused. -- **PauseFeatureUpdatesEndTime** If feature OS updates are paused on the device, this is the date and time for the end of the pause time window. -- **PauseFeatureUpdatesStartTime** If feature OS updates are paused on the device, this is the date and time for the beginning of the pause time window. -- **PauseQualityUpdatesEndTime** If quality OS updates are paused on the device, this is the date and time for the end of the pause time window. -- **PauseQualityUpdatesStartTime** If quality OS updates are paused on the device, this is the date and time for the beginning of the pause time window. -- **PhonePreviewEnabled** Indicates whether a phone was getting preview build, prior to flighting (pre-release builds) being introduced. -- **ProcessName** The process name of the caller who initiated API calls, in the event where CallerApplicationName was not provided. -- **QualityUpdateDeferral** The deferral period configured for quality OS updates on the device (in days). -- **QualityUpdatePause** Indicates whether quality OS updates are paused on the device. -- **QualityUpdatePausePeriod** The pause duration configured for quality OS updates on the device (in days). -- **RelatedCV** The previous Correlation Vector that was used before swapping with a new one -- **ScanDurationInSeconds** The number of seconds a scan took -- **ScanEnqueueTime** The number of seconds it took to initialize a scan -- **ScanProps** This is a 32-bit integer containing Boolean properties for a given Windows Update scan. The following bits are used; all remaining bits are reserved and set to zero. Bit 0 (0x1): IsInteractive - is set to 1 if the scan is requested by a user, or 0 if the scan is requested by Automatic Updates. Bit 1 (0x2): IsSeeker - is set to 1 if the Windows Update client's Seeker functionality is enabled. Seeker functionality is enabled on certain interactive scans, and results in the scans returning certain updates that are in the initial stages of release (not yet released for full adoption via Automatic Updates). -- **ServiceGuid** An ID which represents which service the software distribution client is checking for content (Windows Update, Microsoft Store, etc.). -- **ServiceUrl** The environment URL a device is configured to scan with -- **ShippingMobileOperator** The mobile operator that a device shipped on. -- **StatusCode** Indicates the result of a CheckForUpdates event (success, cancellation, failure code HResult). -- **SyncTyp%** No content is currently available. -- **SyncType** Describes the type of scan the event was -- **SystemBIOSMajorRelease** Major version of the BIOS. -- **SystemBIOSMinorRelease** Minor version of the BIOS. -- **TargetMetadataVersion** For self-initiated healing, this is the target version of the SIH engine to download (if needed). If not, the value is null. -- **TotalNumMetadataSignatures** The total number of metadata signatures checks done for new metadata that was synced down. -- **WebServiceRetryMethods** Web service method requests that needed to be retried to complete operation. -- **WUDeviceID** The unique identifier of a specific device, used to identify how many devices are encountering success or a particular issue. - - -### SoftwareUpdateClientTelemetry.Commit - -This event tracks the commit process post the update installation when software update client is trying to update the device. - -The following fields are available: - -- **BiosFamily** Device family as defined in the system BIOS -- **BiosName** Name of the system BIOS -- **BiosReleaseDate** Release date of the system BIOS -- **BiosSKUNumber** Device SKU as defined in the system BIOS -- **BIOSVendor** Vendor of the system BIOS -- **BiosVersion** Version of the system BIOS -- **BundleId** Identifier associated with the specific content bundle; should not be all zeros if the bundleID was found. -- **BundleRevisionNumber** Identifies the revision number of the content bundle -- **CallerApplicationName** Name provided by the caller who initiated API calls into the software distribution client -- **ClientVersion** Version number of the software distribution client -- **DeploymentProviderMode** The mode of operation of the update deployment provider. -- **DeviceModel** Device model as defined in the system bios -- **EventInstanceID** A globally unique identifier for event instance -- **EventScenario** Indicates the purpose of the event - whether because scan started, succeded, failed, etc. -- **EventType** Possible values are "Child", "Bundle", "Relase" or "Driver". -- **FlightId** The specific id of the flight the device is getting -- **HandlerType** Indicates the kind of content (app, driver, windows patch, etc.) -- **RevisionNumber** Identifies the revision number of this specific piece of content -- **ServiceGuid** A unique identifier for the service that the software distribution client is installing content for (Windows Update, Microsoft Store, etc). -- **SystemBIOSMajorRelease** Major release version of the system bios -- **SystemBIOSMinorRelease** Minor release version of the system bios -- **UpdateId** Identifier associated with the specific piece of content -- **WUDeviceID** Unique device id controlled by the software distribution client - - -### SoftwareUpdateClientTelemetry.Download - -Download process event for target update on Windows Update client. See the EventScenario field for specifics (started/failed/succeeded). - -The following fields are available: - -- **ActiveDownloadTime** How long the download took, in seconds, excluding time where the update wasn't actively being downloaded. -- **AppXBlockHashFailures** Indicates the number of blocks that failed hash validation during download of the app payload. -- **AppXBlockHashValidationFailureCount** A count of the number of blocks that have failed validation after being downloaded. -- **AppXDownloadScope** Indicates the scope of the download for application content. -- **AppXScope** Indicates the scope of the app download. -- **BiosFamily** The family of the BIOS (Basic Input Output System). -- **BiosName** The name of the device BIOS. -- **BiosReleaseDate** The release date of the device BIOS. -- **BiosSKUNumber** The sku number of the device BIOS. -- **BIOSVendor** The vendor of the BIOS. -- **BiosVersion** The version of the BIOS. -- **BundleBytesDownloaded** Number of bytes downloaded for the specific content bundle. -- **BundleId** Identifier associated with the specific content bundle. -- **BundleRepeatFailCount** Indicates whether this particular update bundle has previously failed. -- **BundleRepeatFailFlag** Indicates whether this particular update bundle previously failed to download. -- **BundleRevisionNumber** Identifies the revision number of the content bundle. -- **BytesDownloaded** Number of bytes that were downloaded for an individual piece of content (not the entire bundle). -- **CachedEngineVersion** The version of the “Self-Initiated Healing” (SIH) engine that is cached on the device, if applicable. -- **CallerApplicationName** The name provided by the application that initiated API calls into the software distribution client. -- **CbsDownloadMethod** Indicates whether the download was a full- or a partial-file download. -- **CbsMethod** The method used for downloading the update content related to the Component Based Servicing (CBS) technology. -- **CDNCountryCode** Two letter country abbreviation for the Content Distribution Network (CDN) location. -- **CDNId** ID which defines which CDN the software distribution client downloaded the content from. -- **ClientVersion** The version number of the software distribution client. -- **CommonProps** A bitmask for future flags associated with the Windows Update client behavior. -- **ConnectTime** Indicates the cumulative amount of time (in seconds) it took to establish the connection for all updates in an update bundle. -- **CurrentMobileOperator** The mobile operator the device is currently connected to. -- **DeviceModel** The model of the device. -- **DownloadPriority** Indicates whether a download happened at background, normal, or foreground priority. -- **DownloadProps** Information about the download operation properties in the form of a bitmask. -- **DownloadType** Differentiates the download type of “Self-Initiated Healing” (SIH) downloads between Metadata and Payload downloads. -- **EventInstanceID** A globally unique identifier for event instance. -- **EventScenario** Indicates the purpose for sending this event: whether because the software distribution just started downloading content; or whether it was cancelled, succeeded, or failed. -- **EventType** Identifies the type of the event (Child, Bundle, or Driver). -- **ExtendedStatusCode** Secondary error code for certain scenarios where StatusCode wasn't specific enough. -- **FeatureUpdatePause** Indicates whether feature OS updates are paused on the device. -- **FlightBranch** The branch that a device is on if participating in flighting (pre-release builds). -- **FlightBuildNumber** If this download was for a flight (pre-release build), this indicates the build number of that flight. -- **FlightId** The specific ID of the flight (pre-release build) the device is getting. -- **FlightRing** The ring (speed of getting builds) that a device is on if participating in flighting (pre-release builds). -- **HandlerType** Indicates what kind of content is being downloaded (app, driver, windows patch, etc.). -- **HardwareId** If this download was for a driver targeted to a particular device model, this ID indicates the model of the device. -- **HomeMobileOperator** The mobile operator that the device was originally intended to work with. -- **HostName** The hostname URL the content is downloading from. -- **IPVersion** Indicates whether the download took place over IPv4 or IPv6. -- **IsDependentSet** Indicates whether a driver is a part of a larger System Hardware/Firmware Update -- **IsWUfBDualScanEnabled** Indicates if Windows Update for Business dual scan is enabled on the device. -- **IsWUfBEnabled** Indicates if Windows Update for Business is enabled on the device. -- **NetworkCost** A flag indicating the cost of the network (congested, fixed, variable, over data limit, roaming, etc.) used for downloading the update content. -- **NetworkCostBitMask** Indicates what kind of network the device is connected to (roaming, metered, over data cap, etc.) -- **NetworkRestrictionStatus** More general version of NetworkCostBitMask, specifying whether Windows considered the current network to be "metered." -- **PackageFullName** The package name of the content. -- **PhonePreviewEnabled** Indicates whether a phone was opted-in to getting preview builds, prior to flighting (pre-release builds) being introduced. -- **PostDnldTime** Time (in seconds) taken to signal download completion after the last job completed downloading the payload. -- **ProcessName** The process name of the application that initiated API calls, in the event where CallerApplicationName was not provided. -- **QualityUpdatePause** Indicates whether quality OS updates are paused on the device. -- **Reason** A 32-bit integer representing the reason the update is blocked from being downloaded in the background. -- **RegulationReason** The reason that the update is regulated -- **RegulationResult** The result code (HResult) of the last attempt to contact the regulation web service for download regulation of update content. -- **RelatedCV** The Correlation Vector that was used before the most recent change to a new Correlation Vector. -- **RepeatFailCount** Indicates whether this specific content has previously failed. -- **RepeatFailFlag** Indicates whether this specific content previously failed to download. -- **RevisionNumber** The revision number of the specified piece of content. -- **ServiceGuid** A unique identifier for the service that the software distribution client is installing content for (Windows Update, Microsoft Store, etc). -- **Setup360Phase** Identifies the active phase of the upgrade download if the current download is for an Operating System upgrade. -- **ShippingMobileOperator** The mobile operator linked to the device when the device shipped. -- **SizeCalcTime** Time (in seconds) taken to calculate the total download size of the payload. -- **StatusCode** Indicates the result of a Download event (success, cancellation, failure code HResult). -- **SystemBIOSMajorRelease** Major version of the BIOS. -- **SystemBIOSMinorRelease** Minor version of the BIOS. -- **TargetGroupId** For drivers targeted to a specific device model, this ID indicates the distribution group of devices receiving that driver. -- **TargetingVersion** For drivers targeted to a specific device model, this is the version number of the drivers being distributed to the device. -- **TargetMetadataVersion** The version of the currently downloading (or most recently downloaded) package. -- **ThrottlingServiceHResult** Result code (success/failure) while contacting a web service to determine whether this device should download content yet. -- **TimeToEstablishConnection** Time (in milliseconds) it took to establish the connection prior to beginning downloaded. -- **TotalExpectedBytes** The total size (in Bytes) expected to be downloaded. -- **UpdateId** An identifier associated with the specific piece of content. -- **UpdateID** An identifier associated with the specific piece of content. -- **UpdateImportance** Indicates whether the content was marked as Important, Recommended, or Optional. -- **UsedDO** Indicates whether the download used the Delivery Optimization (DO) service. -- **UsedSystemVolume** Indicates whether the content was downloaded to the device's main system storage drive, or an alternate storage drive. -- **WUDeviceID** The unique identifier of a specific device, used to identify how many devices are encountering success or a particular issue. - - -### SoftwareUpdateClientTelemetry.DownloadCheckpoint - -This event provides a checkpoint between each of the Windows Update download phases for UUP content - -The following fields are available: - -- **CallerApplicationName** The name provided by the caller who initiated API calls into the software distribution client -- **ClientVersion** The version number of the software distribution client -- **EventScenario** Indicates the purpose of sending this event - whether because the software distribution just started checking for content, or whether it was cancelled, succeeded, or failed -- **EventType** Possible values are "Child", "Bundle", "Relase" or "Driver" -- **ExtendedStatusCode** Secondary error code for certain scenarios where StatusCode wasn't specific enough -- **FileId** A hash that uniquely identifies a file -- **FileName** Name of the downloaded file -- **FlightId** The unique identifier for each flight -- **RelatedCV** The previous Correlation Vector that was used before swapping with a new one -- **RevisionNumber** Unique revision number of Update -- **ServiceGuid** An ID which represents which service the software distribution client is checking for content (Windows Update, Microsoft Store, etc.) -- **StatusCode** Indicates the result of a CheckForUpdates event (success, cancellation, failure code HResult) -- **UpdateId** Unique Update ID -- **WUDeviceID** The unique identifier of a specific device, used to identify how many devices are encountering success or a particular issue - - -### SoftwareUpdateClientTelemetry.DownloadHeartbeat - -This event allows tracking of ongoing downloads and contains data to explain the current state of the download - -The following fields are available: - -- **BytesTotal** Total bytes to transfer for this content -- **BytesTransferred** Total bytes transferred for this content at the time of heartbeat -- **CallerApplicationName** Name provided by the caller who initiated API calls into the software distribution client -- **ClientVersion** The version number of the software distribution client -- **ConnectionStatus** Indicates the connectivity state of the device at the time of heartbeat -- **CurrentError** Last (transient) error encountered by the active download -- **DownloadFlags** Flags indicating if power state is ignored -- **DownloadState** Current state of the active download for this content (queued, suspended, or progressing) -- **EventType** Possible values are "Child", "Bundle", or "Driver" -- **FlightId** The unique identifier for each flight -- **IsNetworkMetered** Indicates whether Windows considered the current network to be ?metered" -- **MOAppDownloadLimit** Mobile operator cap on size of application downloads, if any -- **MOUpdateDownloadLimit** Mobile operator cap on size of operating system update downloads, if any -- **PowerState** Indicates the power state of the device at the time of heartbeart (DC, AC, Battery Saver, or Connected Standby) -- **RelatedCV** The previous correlation vector that was used by the client, before swapping with a new one -- **ResumeCount** Number of times this active download has resumed from a suspended state -- **RevisionNumber** Identifies the revision number of this specific piece of content -- **ServiceGuid** Identifier for the service to which the software distribution client is connecting (Windows Update, Microsoft Store, etc) -- **SuspendCount** Number of times this active download has entered a suspended state -- **SuspendReason** Last reason for why this active download entered a suspended state -- **UpdateId** Identifier associated with the specific piece of content -- **WUDeviceID** Unique device id controlled by the software distribution client - - -### SoftwareUpdateClientTelemetry.Install - -This event sends tracking data about the software distribution client installation of the content for that update, to help keep Windows up to date. - -The following fields are available: - -- **BiosFamily** The family of the BIOS (Basic Input Output System). -- **BiosName** The name of the device BIOS. -- **BiosReleaseDate** The release date of the device BIOS. -- **BiosSKUNumber** The sku number of the device BIOS. -- **BIOSVendor** The vendor of the BIOS. -- **BiosVersion** The version of the BIOS. -- **BundleId** Identifier associated with the specific content bundle; should not be all zeros if the bundleID was found. -- **BundleRepeatFailCount** Indicates whether this particular update bundle has previously failed. -- **BundleRepeatFailFlag** Indicates whether this particular update bundle previously failed to install. -- **BundleRevisionNumber** Identifies the revision number of the content bundle. -- **CachedEngineVersion** For self-initiated healing, the version of the SIH engine that is cached on the device. If the SIH engine does not exist, the value is null. -- **CallerApplicationName** The name provided by the caller who initiated API calls into the software distribution client. -- **ClientVersion** The version number of the software distribution client. -- **CommonProps** A bitmask for future flags associated with the Windows Update client behavior. No value is currently reported in this field. Expected value for this field is 0. -- **CSIErrorType** The stage of CBS installation where it failed. -- **CurrentMobileOperator** The mobile operator to which the device is currently connected. -- **DeploymentProviderMode** The mode of operation of the update deployment provider. -- **DeviceModel** The device model. -- **DriverPingBack** Contains information about the previous driver and system state. -- **DriverRecoveryIds** The list of identifiers that could be used for uninstalling the drivers if a recovery is required. -- **EventInstanceID** A globally unique identifier for event instance. -- **EventScenario** Indicates the purpose of sending this event - whether because the software distribution just started installing content, or whether it was cancelled, succeeded, or failed. -- **EventType** Possible values are Child, Bundle, or Driver. -- **ExtendedErrorCode** The extended error code. -- **ExtendedStatusCode** Secondary error code for certain scenarios where StatusCode is not specific enough. -- **FeatureUpdatePause** Indicates whether feature OS updates are paused on the device. -- **FlightBranch** The branch that a device is on if participating in the Windows Insider Program. -- **FlightBuildNumber** If this installation was for a Windows Insider build, this is the build number of that build. -- **FlightId** The specific ID of the Windows Insider build the device is getting. -- **FlightRing** The ring that a device is on if participating in the Windows Insider Program. -- **HandlerType** Indicates what kind of content is being installed (for example, app, driver, Windows update). -- **HardwareId** If this install was for a driver targeted to a particular device model, this ID indicates the model of the device. -- **HomeMobileOperator** The mobile operator that the device was originally intended to work with. -- **InstallProps** A bitmask for future flags associated with the install operation. No value is currently reported in this field. Expected value for this field is 0. -- **IntentPFNs** Intended application-set metadata for atomic update scenarios. -- **IsDependentSet** Indicates whether the driver is part of a larger System Hardware/Firmware update. -- **IsFinalOutcomeEvent** Indicates whether this event signals the end of the update/upgrade process. -- **IsFirmware** Indicates whether this update is a firmware update. -- **IsSuccessFailurePostReboot** Indicates whether the update succeeded and then failed after a restart. -- **IsWUfBDualScanEnabled** Indicates whether Windows Update for Business dual scan is enabled on the device. -- **IsWUfBEnabled** Indicates whether Windows Update for Business is enabled on the device. -- **MergedUpdate** Indicates whether the OS update and a BSP update merged for installation. -- **MsiAction** The stage of MSI installation where it failed. -- **MsiProductCode** The unique identifier of the MSI installer. -- **PackageFullName** The package name of the content being installed. -- **PhonePreviewEnabled** Indicates whether a phone was getting preview build, prior to flighting being introduced. -- **ProcessName** The process name of the caller who initiated API calls, in the event that CallerApplicationName was not provided. -- **QualityUpdatePause** Indicates whether quality OS updates are paused on the device. -- **RelatedCV** The previous Correlation Vector that was used before swapping with a new one -- **RepeatFailCount** Indicates whether this specific piece of content has previously failed. -- **RepeatFailFlag** Indicates whether this specific piece of content previously failed to install. -- **RevisionNumber** The revision number of this specific piece of content. -- **ServiceGuid** An ID which represents which service the software distribution client is installing content for (Windows Update, Microsoft Store, etc.). -- **Setup360Phase** If the install is for an operating system upgrade, indicates which phase of the upgrade is underway. -- **ShippingMobileOperator** The mobile operator that a device shipped on. -- **StatusCode** Indicates the result of an installation event (success, cancellation, failure code HResult). -- **SystemBIOSMajorRelease** Major version of the BIOS. -- **SystemBIOSMinorRelease** Minor version of the BIOS. -- **TargetGroupId** For drivers targeted to a specific device model, this ID indicates the distribution group of devices receiving that driver. -- **TargetingVersion** For drivers targeted to a specific device model, this is the version number of the drivers being distributed to the device. -- **TransactionCode** The ID that represents a given MSI installation. -- **UpdateId** Unique update ID. -- **UpdateID** An identifier associated with the specific piece of content. -- **UpdateImportance** Indicates whether a piece of content was marked as Important, Recommended, or Optional. -- **UsedSystemVolume** Indicates whether the content was downloaded and then installed from the device's main system storage drive, or an alternate storage drive. -- **WUDeviceID** The unique identifier of a specific device, used to identify how many devices are encountering success or a particular issue. - - -### SoftwareUpdateClientTelemetry.Revert - -Revert event for target update on Windows Update Client. See EventScenario field for specifics (for example, Started/Failed/Succeeded). - -The following fields are available: - -- **BundleId** Identifier associated with the specific content bundle. Should not be all zeros if the BundleId was found. -- **BundleRepeatFailCount** Indicates whether this particular update bundle has previously failed. -- **BundleRevisionNumber** Identifies the revision number of the content bundle. -- **CallerApplicationName** Name of application making the Windows Update request. Used to identify context of request. -- **ClientVersion** Version number of the software distribution client. -- **CommonProps** A bitmask for future flags associated with the Windows Update client behavior. There is no value being reported in this field right now. Expected value for this field is 0. -- **CSIErrorType** Stage of CBS installation that failed. -- **DriverPingBack** Contains information about the previous driver and system state. -- **DriverRecoveryIds** The list of identifiers that could be used for uninstalling the drivers if a recovery is required. -- **EventInstanceID** A globally unique identifier for event instance. -- **EventScenario** Indicates the purpose of the event (scan started, succeeded, failed, etc.). -- **EventType** Event type (Child, Bundle, Release, or Driver). -- **ExtendedStatusCode** Secondary status code for certain scenarios where StatusCode is not specific enough. -- **FeatureUpdatePause** Indicates whether feature OS updates are paused on the device. -- **FlightBuildNumber** Indicates the build number of the flight. -- **FlightId** The specific ID of the flight the device is getting. -- **HandlerType** Indicates the kind of content (app, driver, windows patch, etc.). -- **HardwareId** If this download was for a driver targeted to a particular device model, this ID indicates the model of the device. -- **IsFinalOutcomeEvent** Indicates whether this event signals the end of the update/upgrade process. -- **IsFirmware** Indicates whether an update was a firmware update. -- **IsSuccessFailurePostReboot** Indicates whether an initial success was a failure after a reboot. -- **IsWUfBDualScanEnabled** Flag indicating whether WU-for-Business dual scan is enabled on the device. -- **IsWUfBEnabled** Flag indicating whether WU-for-Business is enabled on the device. -- **MergedUpdate** Indicates whether an OS update and a BSP update were merged for install. -- **ProcessName** Process name of the caller who initiated API calls into the software distribution client. -- **QualityUpdatePause** Indicates whether quality OS updates are paused on the device. -- **RelatedCV** The previous correlation vector that was used by the client before swapping with a new one. -- **RepeatFailCount** Indicates whether this specific piece of content has previously failed. -- **RevisionNumber** Identifies the revision number of this specific piece of content. -- **ServiceGuid** A unique identifier for the service that the software distribution client is installing content for (Windows Update, Microsoft Store, etc). -- **StatusCode** Result code of the event (success, cancellation, failure code HResult). -- **TargetGroupId** For drivers targeted to a specific device model, this ID indicates the distribution group of devices receiving that driver. -- **TargetingVersion** For drivers targeted to a specific device model, this is the version number of the drivers being distributed to the device. -- **UpdateId** The identifier associated with the specific piece of content. -- **UpdateImportance** Indicates the importance of a driver, and why it received that importance level (0-Unknown, 1-Optional, 2-Important-DNF, 3-Important-Generic, 4-Important-Other, 5-Recommended). -- **UsedSystemVolume** Indicates whether the device's main system storage drive or an alternate storage drive was used. -- **WUDeviceID** Unique device ID controlled by the software distribution client. - - -### SoftwareUpdateClientTelemetry.TaskRun - -Start event for Server Initiated Healing client. See EventScenario field for specifics (for example, started/completed). - -The following fields are available: - -- **CallerApplicationName** Name of application making the Windows Update request. Used to identify context of request. -- **ClientVersion** Version number of the software distribution client. -- **CmdLineArgs** Command line arguments passed in by the caller. -- **EventInstanceID** A globally unique identifier for the event instance. -- **EventScenario** Indicates the purpose of the event (scan started, succeeded, failed, etc.). -- **ServiceGuid** Identifier for the service to which the software distribution client is connecting (Windows Update, Microsoft Store, etc.). -- **StatusCode** Result code of the event (success, cancellation, failure code HResult). -- **WUDeviceID** Unique device ID controlled by the software distribution client. - - -### SoftwareUpdateClientTelemetry.Uninstall - -Uninstall event for target update on Windows Update Client. See EventScenario field for specifics (for example, Started/Failed/Succeeded). - -The following fields are available: - -- **BundleId** The identifier associated with the specific content bundle. This should not be all zeros if the bundleID was found. -- **BundleRepeatFailCount** Indicates whether this particular update bundle previously failed. -- **BundleRevisionNumber** Identifies the revision number of the content bundle. -- **CallerApplicationName** Name of the application making the Windows Update request. Used to identify context of request. -- **ClientVersion** Version number of the software distribution client. -- **CommonProps** A bitmask for future flags associated with the Windows Update client behavior. There is no value being reported in this field right now. Expected value for this field is 0. -- **DriverPingBack** Contains information about the previous driver and system state. -- **DriverRecoveryIds** The list of identifiers that could be used for uninstalling the drivers when a recovery is required. -- **EventInstanceID** A globally unique identifier for event instance. -- **EventScenario** Indicates the purpose of the event (a scan started, succeded, failed, etc.). -- **EventType** Indicates the event type. Possible values are "Child", "Bundle", "Release" or "Driver". -- **ExtendedStatusCode** Secondary status code for certain scenarios where StatusCode is not specific enough. -- **FeatureUpdatePause** Indicates whether feature OS updates are paused on the device. -- **FlightBuildNumber** Indicates the build number of the flight. -- **FlightId** The specific ID of the flight the device is getting. -- **HandlerType** Indicates the kind of content (app, driver, windows patch, etc.). -- **HardwareId** If the download was for a driver targeted to a particular device model, this ID indicates the model of the device. -- **IsFinalOutcomeEvent** Indicates whether this event signals the end of the update/upgrade process. -- **IsFirmware** Indicates whether an update was a firmware update. -- **IsSuccessFailurePostReboot** Indicates whether an initial success was then a failure after a reboot. -- **IsWUfBDualScanEnabled** Flag indicating whether WU-for-Business dual scan is enabled on the device. -- **IsWUfBEnabled** Flag indicating whether WU-for-Business is enabled on the device. -- **MergedUpdate** Indicates whether an OS update and a BSP update were merged for install. -- **ProcessName** Process name of the caller who initiated API calls into the software distribution client. -- **QualityUpdatePause** Indicates whether quality OS updates are paused on the device. -- **RelatedCV** The previous correlation vector that was used by the client before swapping with a new one. -- **RepeatFailCount** Indicates whether this specific piece of content previously failed. -- **RevisionNumber** Identifies the revision number of this specific piece of content. -- **ServiceGuid** A unique identifier for the service that the software distribution client is installing content for (Windows Update, Microsoft Store, etc). -- **StatusCode** Result code of the event (success, cancellation, failure code HResult). -- **TargetGroupId** For drivers targeted to a specific device model, this ID indicates the distribution group of devices receiving that driver. -- **TargetingVersion** For drivers targeted to a specific device model, this is the version number of the drivers being distributed to the device. -- **UpdateId** Identifier associated with the specific piece of content. -- **UpdateImportance** Indicates the importance of a driver and why it received that importance level (0-Unknown, 1-Optional, 2-Important-DNF, 3-Important-Generic, 4-Important-Other, 5-Recommended). -- **UsedSystemVolume** Indicates whether the device’s main system storage drive or an alternate storage drive was used. -- **WUDeviceID** Unique device ID controlled by the software distribution client. - - -### SoftwareUpdateClientTelemetry.UpdateDetected - -This event sends data about an AppX app that has been updated from the Microsoft Store, including what app needs an update and what version/architecture is required, in order to understand and address problems with apps getting required updates. - -The following fields are available: - -- **ApplicableUpdateInfo** Metadata for the updates which were detected as applicable. -- **CallerApplicationName** The name provided by the caller who initiated API calls into the software distribution client. -- **IntentPFNs** Intended application-set metadata for atomic update scenarios. -- **NumberOfApplicableUpdates** The number of updates ultimately deemed applicable to the system after the detection process is complete. -- **RelatedCV** The previous Correlation Vector that was used before swapping with a new one. -- **ServiceGuid** An ID that represents which service the software distribution client is connecting to (Windows Update, Microsoft Store, etc.). -- **WUDeviceID** The unique device ID controlled by the software distribution client. - - -### SoftwareUpdateClientTelemetry.UpdateMetadataIntegrity - -Ensures Windows Updates are secure and complete. Event helps to identify whether update content has been tampered with and protects against man-in-the-middle attack. - -The following fields are available: - -- **CallerApplicationName** Name of application making the Windows Update request. Used to identify context of request. -- **EndpointUrl** URL of the endpoint where client obtains update metadata. Used to identify test vs staging vs production environments. -- **EventScenario** Indicates the purpose of the event - whether because scan started, succeded, failed, etc. -- **ExtendedStatusCode** Secondary status code for certain scenarios where StatusCode was not specific enough. -- **LeafCertId** The integral ID from the FragmentSigning data for the certificate that failed. -- **ListOfSHA256OfIntermediateCerData** A semicolon delimited list of base64 encoding of hashes for the Base64CerData in the FragmentSigning data of an intermediate certificate. -- **MetadataIntegrityMode** Mode of update transport metadata integrity check. 0-Unknown, 1-Ignoe, 2-Audit, 3-Enforce -- **MetadataSignature** A base64-encoded string of the signature associated with the update metadata (specified by revision ID). -- **RawMode** The raw unparsed mode string from the SLS response. This field is null if not applicable. -- **RawValidityWindowInDays** The raw unparsed validity window string in days of the timestamp token. This field is null if not applicable. -- **RevisionId** The revision ID for a specific piece of content. -- **RevisionNumber** The revision number for a specific piece of content. -- **ServiceGuid** Identifies the service to which the software distribution client is connected, Example: Windows Update or Microsoft Store -- **SHA256OfLeafCerData** A base64 encoding of the hash for the Base64CerData in the FragmentSigning data of the leaf certificate. -- **SHA256OfLeafCertPublicKey** A base64 encoding of the hash of the Base64CertData in the FragmentSigning data of the leaf certificate. -- **SHA256OfTimestampToken** An encoded string of the timestamp token. -- **SignatureAlgorithm** The hash algorithm for the metadata signature. -- **SLSPrograms** A test program a machine may be opted in. Examples include "Canary" and "Insider Fast". -- **StatusCode** Result code of the event (success, cancellation, failure code HResult) -- **TimestampTokenCertThumbprint** The thumbprint of the encoded timestamp token. -- **TimestampTokenId** The time this was created. It is encoded in a timestamp blob and will be zero if the token is malformed. -- **UpdateId** The update ID for a specific piece of content. -- **ValidityWindowInDays** The validity window that's in effect when verifying the timestamp. - - -## System Resource Usage Monitor events - -### Microsoft.Windows.Srum.Sdp.CpuUsage - -This event provides information on CPU usage. - -The following fields are available: - -- **UsageMax** The maximum of hourly average CPU usage. -- **UsageMean** The mean of hourly average CPU usage. -- **UsageMedian** The median of hourly average CPU usage. -- **UsageTwoHourMaxMean** The mean of the maximum of every two hour of hourly average CPU usage. -- **UsageTwoHourMedianMean** The mean of the median of every two hour of hourly average CPU usage. - - -### Microsoft.Windows.Srum.Sdp.NetworkUsage - -This event provides information on network usage. - -The following fields are available: - -- **AdapterGuid** The unique ID of the adapter. -- **BytesTotalMax** The maximum of the hourly average bytes total. -- **BytesTotalMean** The mean of the hourly average bytes total. -- **BytesTotalMedian** The median of the hourly average bytes total. -- **BytesTotalTwoHourMaxMean** The mean of the maximum of every two hours of hourly average bytes total. -- **BytesTotalTwoHourMedianMean** The mean of the median of every two hour of hourly average bytes total. -- **LinkSpeed** The adapter link speed. - - -## Update events - -### Update360Telemetry.Revert - -This event sends data relating to the Revert phase of updating Windows. - -The following fields are available: - -- **ErrorCode** The error code returned for the Revert phase. -- **FlightId** Unique ID for the flight (test instance version). -- **ObjectId** The unique value for each Update Agent mode. -- **RebootRequired** Indicates reboot is required. -- **RelatedCV** The correlation vector value generated from the latest USO (Update Service Orchestrator) scan. -- **Result** The HResult of the event. -- **RevertResult** The result code returned for the Revert operation. -- **ScenarioId** The ID of the update scenario. -- **SessionId** The ID of the update attempt. -- **UpdateId** The ID of the update. - - -### Update360Telemetry.UpdateAgentCommit - -This event collects information regarding the commit phase of the new Unified Update Platform (UUP) update scenario, which is leveraged by both Mobile and Desktop. - -The following fields are available: - -- **ErrorCode** The error code returned for the current install phase. -- **FlightId** Unique ID for each flight. -- **ObjectId** Unique value for each Update Agent mode. -- **RelatedCV** Correlation vector value generated from the latest USO scan. -- **Result** Outcome of the install phase of the update. -- **ScenarioId** Indicates the update scenario. -- **SessionId** Unique value for each update attempt. -- **UpdateId** Unique ID for each update. - - -### Update360Telemetry.UpdateAgentDownloadRequest - -This event sends data for the download request phase of updating Windows via the new Unified Update Platform (UUP) scenario. Applicable to PC and Mobile. - -The following fields are available: - -- **DeletedCorruptFiles** Boolean indicating whether corrupt payload was deleted. -- **DownloadRequests** Number of times a download was retried. -- **ErrorCode** The error code returned for the current download request phase. -- **ExtensionName** Indicates whether the payload is related to Operating System content or a plugin. -- **FlightId** Unique ID for each flight. -- **InternalFailureResult** Indicates a non-fatal error from a plugin. -- **ObjectId** Unique value for each Update Agent mode (same concept as InstanceId for Setup360). -- **PackageCategoriesSkipped** Indicates package categories that were skipped, if applicable. -- **PackageCountOptional** Number of optional packages requested. -- **PackageCountRequired** Number of required packages requested. -- **PackageCountTotal** Total number of packages needed. -- **PackageCountTotalCanonical** Total number of canonical packages. -- **PackageCountTotalDiff** Total number of diff packages. -- **PackageCountTotalExpress** Total number of express packages. -- **PackageCountTotalPSFX** The total number of PSFX packages. -- **PackageExpressType** Type of express package. -- **PackageSizeCanonical** Size of canonical packages in bytes. -- **PackageSizeDiff** Size of diff packages in bytes. -- **PackageSizeExpress** Size of express packages in bytes. -- **PackageSizePSFX** The size of PSFX packages, in bytes. -- **RangeRequestState** Indicates the range request type used. -- **RelatedCV** Correlation vector value generated from the latest USO scan. -- **Result** Outcome of the download request phase of update. -- **SandboxTaggedForReserves** The sandbox for reserves. -- **ScenarioId** Indicates the update scenario. -- **SessionId** Unique value for each attempt (same value for initialize, download, install commit phases). -- **UpdateId** Unique ID for each update. - - -### Update360Telemetry.UpdateAgentExpand - -This event collects information regarding the expansion phase of the new Unified Update Platform (UUP) update scenario, which is leveraged by both Mobile and Desktop. - -The following fields are available: - -- **ElapsedTickCount** Time taken for expand phase. -- **EndFreeSpace** Free space after expand phase. -- **EndSandboxSize** Sandbox size after expand phase. -- **ErrorCode** The error code returned for the current install phase. -- **FlightId** Unique ID for each flight. -- **ObjectId** Unique value for each Update Agent mode. -- **RelatedCV** Correlation vector value generated from the latest USO scan. -- **ScenarioId** Indicates the update scenario. -- **SessionId** Unique value for each update attempt. -- **StartFreeSpace** Free space before expand phase. -- **StartSandboxSize** Sandbox size after expand phase. -- **UpdateId** Unique ID for each update. - - -### Update360Telemetry.UpdateAgentFellBackToCanonical - -This event collects information when express could not be used and we fall back to canonical during the new Unified Update Platform (UUP) update scenario, which is leveraged by both Mobile and Desktop. - -The following fields are available: - -- **FlightId** Unique ID for each flight. -- **ObjectId** Unique value for each Update Agent mode. -- **PackageCount** Number of packages that feel back to canonical. -- **PackageList** PackageIds which fell back to canonical. -- **RelatedCV** Correlation vector value generated from the latest USO scan. -- **ScenarioId** Indicates the update scenario. -- **SessionId** Unique value for each update attempt. -- **UpdateId** Unique ID for each update. - - -### Update360Telemetry.UpdateAgentInitialize - -This event sends data for the initialize phase of updating Windows via the new Unified Update Platform (UUP) scenario, which is applicable to both PCs and Mobile. - -The following fields are available: - -- **ErrorCode** The error code returned for the current install phase. -- **FlightId** Unique ID for each flight. -- **FlightMetadata** Contains the FlightId and the build being flighted. -- **ObjectId** Unique value for each Update Agent mode. -- **RelatedCV** Correlation vector value generated from the latest USO scan. -- **Result** Outcome of the install phase of the update. -- **ScenarioId** Indicates the update scenario. -- **SessionData** String containing instructions to update agent for processing FODs and DUICs (Null for other scenarios). -- **SessionId** Unique value for each update attempt. -- **UpdateId** Unique ID for each update. - - -### Update360Telemetry.UpdateAgentInstall - -This event sends data for the install phase of updating Windows. - -The following fields are available: - -- **ErrorCode** The error code returned for the current install phase. -- **ExtensionName** Indicates whether the payload is related to Operating System content or a plugin. -- **FlightId** Unique value for each Update Agent mode (same concept as InstanceId for Setup360). -- **InternalFailureResult** Indicates a non-fatal error from a plugin. -- **ObjectId** Correlation vector value generated from the latest USO scan. -- **RelatedCV** Correlation vector value generated from the latest USO scan. -- **Result** The result for the current install phase. -- **ScenarioId** Indicates the update scenario. -- **SessionId** Unique value for each update attempt. -- **UpdateId** Unique ID for each update. - - -### Update360Telemetry.UpdateAgentMerge - -The UpdateAgentMerge event sends data on the merge phase when updating Windows. - -The following fields are available: - -- **ErrorCode** The error code returned for the current merge phase. -- **FlightId** Unique ID for each flight. -- **MergeId** The unique ID to join two update sessions being merged. -- **ObjectId** Unique value for each Update Agent mode. -- **RelatedCV** Related correlation vector value. -- **Result** Outcome of the merge phase of the update. -- **ScenarioId** Indicates the update scenario. -- **SessionId** Unique value for each attempt. -- **UpdateId** Unique ID for each update. - - -### Update360Telemetry.UpdateAgentMitigationResult - -This event sends data indicating the result of each update agent mitigation. - -The following fields are available: - -- **Applicable** Indicates whether the mitigation is applicable for the current update. -- **CommandCount** The number of command operations in the mitigation entry. -- **CustomCount** The number of custom operations in the mitigation entry. -- **FileCount** The number of file operations in the mitigation entry. -- **FlightId** Unique identifier for each flight. -- **Index** The mitigation index of this particular mitigation. -- **MitigationScenario** The update scenario in which the mitigation was executed. -- **Name** The friendly name of the mitigation. -- **ObjectId** Unique value for each Update Agent mode. -- **OperationIndex** The mitigation operation index (in the event of a failure). -- **OperationName** The friendly name of the mitigation operation (in the event of failure). -- **RegistryCount** The number of registry operations in the mitigation entry. -- **RelatedCV** The correlation vector value generated from the latest USO scan. -- **Result** The HResult of this operation. -- **ScenarioId** The update agent scenario ID. -- **SessionId** Unique value for each update attempt. -- **TimeDiff** The amount of time spent performing the mitigation (in 100-nanosecond increments). -- **UpdateId** Unique ID for each Update. - - -### Update360Telemetry.UpdateAgentMitigationSummary - -This event sends a summary of all the update agent mitigations available for an this update. - -The following fields are available: - -- **Applicable** The count of mitigations that were applicable to the system and scenario. -- **Failed** The count of mitigations that failed. -- **FlightId** Unique identifier for each flight. -- **MitigationScenario** The update scenario in which the mitigations were attempted. -- **ObjectId** The unique value for each Update Agent mode. -- **RelatedCV** The correlation vector value generated from the latest USO scan. -- **Result** The HResult of this operation. -- **ScenarioId** The update agent scenario ID. -- **SessionId** Unique value for each update attempt. -- **TimeDiff** The amount of time spent performing all mitigations (in 100-nanosecond increments). -- **Total** Total number of mitigations that were available. -- **UpdateId** Unique ID for each update. - - -### Update360Telemetry.UpdateAgentModeStart - -This event sends data for the start of each mode during the process of updating Windows via the new Unified Update Platform (UUP) scenario. Applicable to both PCs and Mobile. - -The following fields are available: - -- **FlightId** Unique ID for each flight. -- **Mode** Indicates the mode that has started. -- **ObjectId** Unique value for each Update Agent mode. -- **RelatedCV** Correlation vector value generated from the latest USO scan. -- **ScenarioId** Indicates the update scenario. -- **SessionId** Unique value for each update attempt. -- **UpdateId** Unique ID for each update. -- **Version** Version of update - - -### Update360Telemetry.UpdateAgentOneSettings - -This event collects information regarding the post reboot phase of the new UUP (Unified Update Platform) update scenario; which is leveraged by both Mobile and Desktop. - -The following fields are available: - -- **Count** The count of applicable OneSettings for the device. -- **FlightId** Unique ID for the flight (test instance version). -- **ObjectId** The unique value for each Update Agent mode. -- **Parameters** The set of name value pair parameters sent to OneSettings to determine if there are any applicable OneSettings. -- **RelatedCV** The correlation vector value generated from the latest USO (Update Service Orchestrator) scan. -- **Result** The HResult of the event. -- **ScenarioId** The ID of the update scenario. -- **SessionId** The ID of the update attempt. -- **UpdateId** The ID of the update. -- **Values** The values sent back to the device, if applicable. - - -### Update360Telemetry.UpdateAgentPostRebootResult - -This event collects information for both Mobile and Desktop regarding the post reboot phase of the new Unified Update Platform (UUP) update scenario. - -The following fields are available: - -- **ErrorCode** The error code returned for the current post reboot phase. -- **FlightId** The specific ID of the Windows Insider build the device is getting. -- **ObjectId** Unique value for each Update Agent mode. -- **PostRebootResult** Indicates the Hresult. -- **RelatedCV** Correlation vector value generated from the latest USO scan. -- **ScenarioId** The scenario ID. Example: MobileUpdate, DesktopLanguagePack, DesktopFeatureOnDemand, or DesktopDriverUpdate. -- **SessionId** Unique value for each update attempt. -- **UpdateId** Unique ID for each update. - - -### Update360Telemetry.UpdateAgentReboot - -This event sends information indicating that a request has been sent to suspend an update. - -The following fields are available: - -- **ErrorCode** The error code returned for the current reboot. -- **FlightId** Unique ID for the flight (test instance version). -- **ObjectId** The unique value for each Update Agent mode. -- **RelatedCV** The correlation vector value generated from the latest USO (Update Service Orchestrator) scan. -- **Result** The HResult of the event. -- **ScenarioId** The ID of the update scenario. -- **SessionId** The ID of the update attempt. -- **UpdateId** The ID of the update. - - -### Update360Telemetry.UpdateAgentSetupBoxLaunch - -The UpdateAgent_SetupBoxLaunch event sends data for the launching of the setup box when updating Windows via the new Unified Update Platform (UUP) scenario. This event is only applicable to PCs. - -The following fields are available: - -- **ContainsExpressPackage** Indicates whether the download package is express. -- **FlightId** Unique ID for each flight. -- **FreeSpace** Free space on OS partition. -- **InstallCount** Number of install attempts using the same sandbox. -- **ObjectId** Unique value for each Update Agent mode. -- **Quiet** Indicates whether setup is running in quiet mode. -- **RelatedCV** Correlation vector value generated from the latest USO scan. -- **SandboxSize** Size of the sandbox. -- **ScenarioId** Indicates the update scenario. -- **SessionId** Unique value for each update attempt. -- **SetupMode** Mode of setup to be launched. -- **UpdateId** Unique ID for each Update. -- **UserSession** Indicates whether install was invoked by user actions. - - -## Update notification events - -### Microsoft.Windows.UpdateNotificationPipeline.UNPCampaignManagerHeartbeat - -This event is sent at the start of the CampaignManager event and is intended to be used as a heartbeat. - -The following fields are available: - -- **CampaignConfigVersion** Configuration version for the current campaign. -- **CampaignID** Currently campaign that is running on Update Notification Pipeline (UNP). -- **ConfigCatalogVersion** Current catalog version of UNP. -- **ContentVersion** Content version for the current campaign on UNP. -- **CV** Correlation vector. -- **DetectorVersion** Most recently run detector version for the current campaign on UNP. -- **GlobalEventCounter** Client-side counter that indicates the event ordering sent by the user. -- **PackageVersion** Current UNP package version. - - -## Upgrade events - -### FacilitatorTelemetry.DCATDownload - -This event indicates whether devices received additional or critical supplemental content during an OS Upgrade, to help keep Windows up-to-date and secure. - -The following fields are available: - -- **DownloadSize** Download size of payload. -- **ElapsedTime** Time taken to download payload. -- **MediaFallbackUsed** Used to determine if we used Media CompDBs to figure out package requirements for the upgrade. -- **ResultCode** Result returned by the Facilitator DCAT call. -- **Scenario** Dynamic update scenario (Image DU, or Setup DU). -- **Type** Type of package that was downloaded. -- **UpdateId** The ID of the update that was downloaded. - - -### FacilitatorTelemetry.DUDownload - -This event returns data about the download of supplemental packages critical to upgrading a device to the next version of Windows. - -The following fields are available: - -- **DownloadRequestAttributes** The attributes sent for download. -- **PackageCategoriesFailed** Lists the categories of packages that failed to download. -- **PackageCategoriesSkipped** Lists the categories of package downloads that were skipped. -- **ResultCode** The result of the event execution. -- **Scenario** Identifies the active Download scenario. -- **Url** The URL the download request was sent to. -- **Version** Identifies the version of Facilitator used. - - -### FacilitatorTelemetry.InitializeDU - -This event determines whether devices received additional or critical supplemental content during an OS upgrade. - -The following fields are available: - -- **DCATUrl** The Delivery Catalog (DCAT) URL we send the request to. -- **DownloadRequestAttributes** The attributes we send to DCAT. -- **ResultCode** The result returned from the initiation of Facilitator with the URL/attributes. -- **Scenario** Dynamic Update scenario (Image DU, or Setup DU). -- **Url** The Delivery Catalog (DCAT) URL we send the request to. -- **Version** Version of Facilitator. - - -### Setup360Telemetry.Downlevel - -This event sends data indicating that the device has started the downlevel phase of the upgrade, to help keep Windows up-to-date and secure. - -The following fields are available: - -- **ClientId** If using Windows Update, this will be the Windows Update client ID that is passed to Setup. In Media setup, the default value is Media360, but it can be overwritten by the caller to a unique value. -- **FlightData** Unique value that identifies the flight. -- **HostOSBuildNumber** The build number of the downlevel OS. -- **HostOsSkuName** The operating system edition which is running Setup360 instance (downlevel OS). -- **InstanceId** A unique GUID that identifies each instance of setuphost.exe. -- **ReportId** In the Windows Update scenario, this is the updateID that is passed to Setup. In media setup, this is the GUID for the install.wim. -- **Setup360Extended** More detailed information about phase/action when the potential failure occurred. -- **Setup360Mode** The phase of Setup360 (for example, Predownload, Install, Finalize, Rollback). -- **Setup360Result** The result of Setup360 (HRESULT used to diagnose errors). -- **Setup360Scenario** The Setup360 flow type (for example, Boot, Media, Update, MCT). -- **SetupVersionBuildNumber** The build number of Setup360 (build number of the target OS). -- **State** Exit state of given Setup360 run. Example: succeeded, failed, blocked, cancelled. -- **TestId** An ID that uniquely identifies a group of events. -- **WuId** This is the Windows Update Client ID. In the Windows Update scenario, this is the same as the clientId. - - -### Setup360Telemetry.Finalize - -This event sends data indicating that the device has started the phase of finalizing the upgrade, to help keep Windows up-to-date and secure. - -The following fields are available: - -- **ClientId** With Windows Update, this will be the Windows Update client ID that is passed to Setup. In Media setup, default value is Media360, but can be overwritten by the caller to a unique value. -- **FlightData** Unique value that identifies the flight. -- **HostOSBuildNumber** The build number of the previous OS. -- **HostOsSkuName** The OS edition which is running Setup360 instance (previous OS). -- **InstanceId** A unique GUID that identifies each instance of setuphost.exe -- **ReportId** With Windows Update, this is the updateID that is passed to Setup. In media setup, this is the GUID for the install.wim. -- **Setup360Extended** More detailed information about the phase/action when the potential failure occurred. -- **Setup360Mode** The phase of Setup360. Example: Predownload, Install, Finalize, Rollback. -- **Setup360Result** The result of Setup360. This is an HRESULT error code that is used to diagnose errors. -- **Setup360Scenario** The Setup360 flow type. Example: Boot, Media, Update, MCT. -- **SetupVersionBuildNumber** The build number of Setup360 (build number of target OS). -- **State** The exit state of a Setup360 run. Example: succeeded, failed, blocked, cancelled. -- **TestId** ID that uniquely identifies a group of events. -- **WuId** This is the Windows Update Client ID. With Windows Update, this is the same as the clientId. - - -### Setup360Telemetry.OsUninstall - -This event sends data regarding OS updates and upgrades from Windows 7, Windows 8, and Windows 10. Specifically, it indicates the outcome of an OS uninstall. - -The following fields are available: - -- **ClientId** For Windows Update, this will be the Windows Update client ID that is passed to Setup. In Media setup, default value is Media360, but can be overwritten by the caller to a unique value. -- **FlightData** Unique value that identifies the flight. -- **HostOSBuildNumber** The build number of the previous OS. -- **HostOsSkuName** The OS edition which is running the Setup360 instance (previous OS). -- **InstanceId** A unique GUID that identifies each instance of setuphost.exe. -- **ReportId** For Windows Update, this will be the Windows Update client ID that is passed to Setup. In Media setup, this is the GUID for the install.wim. -- **Setup360Extended** Detailed information about the phase or action when the potential failure occurred. -- **Setup360Mode** The phase of Setup360. Example: Predownload, Install, Finalize, Rollback. -- **Setup360Result** The result of Setup360. This is an HRESULT error code that is used to diagnose errors. -- **Setup360Scenario** The Setup360 flow type. Example: Boot, Media, Update, MCT -- **SetupVersionBuildNumber** The build number of Setup360 (build number of target OS). -- **State** Exit state of a Setup360 run. Example: succeeded, failed, blocked, cancelled. -- **TestId** ID that uniquely identifies a group of events. -- **WuId** Windows Update client ID. - - -### Setup360Telemetry.PostRebootInstall - -This event sends data indicating that the device has invoked the post reboot install phase of the upgrade, to help keep Windows up-to-date. - -The following fields are available: - -- **ClientId** With Windows Update, this is the Windows Update client ID that is passed to Setup. In Media setup, the default value is Media360, but can be overwritten by the caller to a unique value. -- **FlightData** Unique value that identifies the flight. -- **HostOSBuildNumber** The build number of the previous OS. -- **HostOsSkuName** The OS edition which is running Setup360 instance (previous OS). -- **InstanceId** A unique GUID that identifies each instance of setuphost.exe. -- **ReportId** With Windows Update, this is the updateID that is passed to Setup. In media setup, this is the GUID for the install.wim. -- **Setup360Extended** Extension of result - more granular information about phase/action when the potential failure happened -- **Setup360Mode** The phase of Setup360. Example: Predownload, Install, Finalize, Rollback -- **Setup360Result** The result of Setup360. This is an HRESULT error code that's used to diagnose errors. -- **Setup360Scenario** The Setup360 flow type. Example: Boot, Media, Update, MCT -- **SetupVersionBuildNumber** The build number of Setup360 (build number of target OS). -- **State** The exit state of a Setup360 run. Example: succeeded, failed, blocked, cancelled -- **TestId** A string to uniquely identify a group of events. -- **WuId** This is the Windows Update Client ID. With Windows Update, this is the same as ClientId. - - -### Setup360Telemetry.PreDownloadQuiet - -This event sends data indicating that the device has invoked the predownload quiet phase of the upgrade, to help keep Windows up to date. - -The following fields are available: - -- **ClientId** Using Windows Update, this will be the Windows Update client ID that is passed to Setup. In Media setup, default value is Media360, but can be overwritten by the caller to a unique value. -- **FlightData** Unique value that identifies the flight. -- **HostOSBuildNumber** The build number of the previous OS. -- **HostOsSkuName** The OS edition which is running Setup360 instance (previous operating system). -- **InstanceId** A unique GUID that identifies each instance of setuphost.exe. -- **ReportId** Using Windows Update, this is the updateID that is passed to Setup. In media setup, this is the GUID for the install.wim. -- **Setup360Extended** Detailed information about the phase/action when the potential failure occurred. -- **Setup360Mode** The phase of Setup360. Example: Predownload, Install, Finalize, Rollback. -- **Setup360Result** The result of Setup360. This is an HRESULT error code that is used to diagnose errors. -- **Setup360Scenario** The Setup360 flow type. Example: Boot, Media, Update, MCT. -- **SetupVersionBuildNumber** The build number of Setup360 (build number of target OS). -- **State** The exit state of a Setup360 run. Example: succeeded, failed, blocked, canceled. -- **TestId** ID that uniquely identifies a group of events. -- **WuId** This is the Windows Update Client ID. Using Windows Update, this is the same as the clientId. - - -### Setup360Telemetry.PreDownloadUX - -This event sends data regarding OS Updates and Upgrades from Windows 7.X, Windows 8.X, Windows 10 and RS, to help keep Windows up-to-date and secure. Specifically, it indicates the outcome of the PredownloadUX portion of the update process. - -The following fields are available: - -- **ClientId** For Windows Update, this will be the Windows Update client ID that is passed to Setup. In Media setup, default value is Media360, but can be overwritten by the caller to a unique value. -- **FlightData** In the WU scenario, this will be the WU client ID that is passed to Setup. In Media setup, default value is Media360, but can be overwritten by the caller to a unique value. -- **HostOSBuildNumber** The build number of the previous operating system. -- **HostOsSkuName** The OS edition which is running the Setup360 instance (previous operating system). -- **InstanceId** Unique GUID that identifies each instance of setuphost.exe. -- **ReportId** For Windows Update, this will be the Windows Update client ID that is passed to Setup. In Media setup, this is the GUID for the install.wim. -- **Setup360Extended** Detailed information about the phase/action when the potential failure occurred. -- **Setup360Mode** The phase of Setup360. Example: Predownload, Install, Finalize, Rollback. -- **Setup360Result** The result of Setup360. This is an HRESULT error code that can be used to diagnose errors. -- **Setup360Scenario** The Setup360 flow type. Example: Boot, Media, Update, MCT. -- **SetupVersionBuildNumber** The build number of Setup360 (build number of the target OS). -- **State** The exit state of the Setup360 run. Example: succeeded, failed, blocked, cancelled. -- **TestId** ID that uniquely identifies a group of events. -- **WuId** Windows Update client ID. - - -### Setup360Telemetry.PreInstallQuiet - -This event sends data indicating that the device has invoked the preinstall quiet phase of the upgrade, to help keep Windows up-to-date. - -The following fields are available: - -- **ClientId** With Windows Update, this will be the Windows Update client ID that is passed to Setup. In Media setup, default value is Media360, but can be overwritten by the caller to a unique value. -- **FlightData** Unique value that identifies the flight. -- **HostOSBuildNumber** The build number of the previous OS. -- **HostOsSkuName** The OS edition which is running Setup360 instance (previous OS). -- **InstanceId** A unique GUID that identifies each instance of setuphost.exe -- **ReportId** With Windows Update, this is the updateID that is passed to Setup. In media setup, this is the GUID for the install.wim. -- **Setup360Extended** Detailed information about the phase/action when the potential failure occurred. -- **Setup360Mode** The phase of Setup360. Example: Predownload, Install, Finalize, Rollback. -- **Setup360Result** The result of Setup360. This is an HRESULT error code that can be used to diagnose errors. -- **Setup360Scenario** Setup360 flow type (Boot, Media, Update, MCT). -- **SetupVersionBuildNumber** The build number of Setup360 (build number of target OS). -- **State** The exit state of a Setup360 run. Example: succeeded, failed, blocked, cancelled. -- **TestId** A string to uniquely identify a group of events. -- **WuId** This is the Windows Update Client ID. With Windows Update, this is the same as the clientId. - - -### Setup360Telemetry.PreInstallUX - -This event sends data regarding OS updates and upgrades from Windows 7, Windows 8, and Windows 10, to help keep Windows up-to-date. Specifically, it indicates the outcome of the PreinstallUX portion of the update process. - -The following fields are available: - -- **ClientId** For Windows Update, this will be the Windows Update client ID that is passed to Setup. In Media setup, default value is Media360, but can be overwritten by the caller to a unique value. -- **FlightData** Unique value that identifies the flight. -- **HostOSBuildNumber** The build number of the previous OS. -- **HostOsSkuName** The OS edition which is running the Setup360 instance (previous OS). -- **InstanceId** A unique GUID that identifies each instance of setuphost.exe. -- **ReportId** For Windows Update, this will be the Windows Update client ID that is passed to Setup. In Media setup, this is the GUID for the install.wim. -- **Setup360Extended** Detailed information about the phase/action when the potential failure occurred. -- **Setup360Mode** The phase of Setup360. Example: Predownload, Install, Finalize, Rollback. -- **Setup360Result** The result of Setup360. This is an HRESULT error code that is used to diagnose errors. -- **Setup360Scenario** The Setup360 flow type, Example: Boot, Media, Update, MCT. -- **SetupVersionBuildNumber** The build number of Setup360 (build number of target OS). -- **State** The exit state of a Setup360 run. Example: succeeded, failed, blocked, cancelled. -- **TestId** A string to uniquely identify a group of events. -- **WuId** Windows Update client ID. - - -### Setup360Telemetry.Setup360 - -This event sends data about OS deployment scenarios, to help keep Windows up-to-date. - -The following fields are available: - -- **ClientId** Retrieves the upgrade ID. In the Windows Update scenario, this will be the Windows Update client ID. In Media setup, default value is Media360, but can be overwritten by the caller to a unique value. -- **FieldName** Retrieves the data point. -- **FlightData** Specifies a unique identifier for each group of Windows Insider builds. -- **InstanceId** Retrieves a unique identifier for each instance of a setup session. -- **ReportId** Retrieves the report ID. -- **ScenarioId** Retrieves the deployment scenario. -- **Value** Retrieves the value associated with the corresponding FieldName. - - -### Setup360Telemetry.Setup360DynamicUpdate - -This event helps determine whether the device received supplemental content during an operating system upgrade, to help keep Windows up-to-date. - -The following fields are available: - -- **FlightData** Specifies a unique identifier for each group of Windows Insider builds. -- **InstanceId** Retrieves a unique identifier for each instance of a setup session. -- **Operation** Facilitator’s last known operation (scan, download, etc.). -- **ReportId** ID for tying together events stream side. -- **ResultCode** Result returned for the entire setup operation. -- **Scenario** Dynamic Update scenario (Image DU, or Setup DU). -- **ScenarioId** Identifies the update scenario. -- **TargetBranch** Branch of the target OS. -- **TargetBuild** Build of the target OS. - - -### Setup360Telemetry.Setup360MitigationResult - -This event sends data indicating the result of each setup mitigation. - -The following fields are available: - -- **Applicable** TRUE if the mitigation is applicable for the current update. -- **ClientId** In the Windows Update scenario, this is the client ID passed to Setup. In Media setup, default value is Media360, but can be overwritten by the caller to a unique value. -- **CommandCount** The number of command operations in the mitigation entry. -- **CustomCount** The number of custom operations in the mitigation entry. -- **FileCount** The number of file operations in the mitigation entry. -- **FlightData** The unique identifier for each flight (test release). -- **Index** The mitigation index of this particular mitigation. -- **InstanceId** The GUID (Globally Unique ID) that identifies each instance of SetupHost.EXE. -- **MitigationScenario** The update scenario in which the mitigation was executed. -- **Name** The friendly (descriptive) name of the mitigation. -- **OperationIndex** The mitigation operation index (in the event of a failure). -- **OperationName** The friendly (descriptive) name of the mitigation operation (in the event of failure). -- **RegistryCount** The number of registry operations in the mitigation entry. -- **ReportId** In the Windows Update scenario, the Update ID that is passed to Setup. In media setup, this is the GUID for the INSTALL.WIM. -- **Result** HResult of this operation. -- **ScenarioId** Setup360 flow type. -- **TimeDiff** The amount of time spent performing the mitigation (in 100-nanosecond increments). - - -### Setup360Telemetry.Setup360MitigationSummary - -This event sends a summary of all the setup mitigations available for this update. - -The following fields are available: - -- **Applicable** The count of mitigations that were applicable to the system and scenario. -- **ClientId** The Windows Update client ID passed to Setup. -- **Failed** The count of mitigations that failed. -- **FlightData** The unique identifier for each flight (test release). -- **InstanceId** The GUID (Globally Unique ID) that identifies each instance of SetupHost.EXE. -- **MitigationScenario** The update scenario in which the mitigations were attempted. -- **ReportId** In the Windows Update scenario, the Update ID that is passed to Setup. In media setup, this is the GUID for the INSTALL.WIM. -- **Result** HResult of this operation. -- **ScenarioId** Setup360 flow type. -- **TimeDiff** The amount of time spent performing the mitigation (in 100-nanosecond increments). -- **Total** The total number of mitigations that were available. - - -### Setup360Telemetry.Setup360OneSettings - -This event collects information regarding the post reboot phase of the new UUP (Unified Update Platform) update scenario; which is leveraged by both Mobile and Desktop. - -The following fields are available: - -- **ClientId** The Windows Update client ID passed to Setup. -- **Count** The count of applicable OneSettings for the device. -- **FlightData** The ID for the flight (test instance version). -- **InstanceId** The GUID (Globally-Unique ID) that identifies each instance of setuphost.exe. -- **Parameters** The set of name value pair parameters sent to OneSettings to determine if there are any applicable OneSettings. -- **ReportId** The Update ID passed to Setup. -- **Result** The HResult of the event error. -- **ScenarioId** The update scenario ID. -- **Values** Values sent back to the device, if applicable. - - -### Setup360Telemetry.UnexpectedEvent - -This event sends data indicating that the device has invoked the unexpected event phase of the upgrade, to help keep Windows up to date. - -The following fields are available: - -- **ClientId** With Windows Update, this will be the Windows Update client ID that is passed to Setup. In Media setup, default value is Media360, but can be overwritten by the caller to a unique value. -- **FlightData** Unique value that identifies the flight. -- **HostOSBuildNumber** The build number of the previous OS. -- **HostOsSkuName** The OS edition which is running Setup360 instance (previous OS). -- **InstanceId** A unique GUID that identifies each instance of setuphost.exe -- **ReportId** With Windows Update, this is the updateID that is passed to Setup. In media setup, this is the GUID for the install.wim. -- **Setup360Extended** Detailed information about the phase/action when the potential failure occurred. -- **Setup360Mode** The phase of Setup360. Example: Predownload, Install, Finalize, Rollback. -- **Setup360Result** The result of Setup360. This is an HRESULT error code that can be used used to diagnose errors. -- **Setup360Scenario** The Setup360 flow type. Example: Boot, Media, Update, MCT. -- **SetupVersionBuildNumber** The build number of Setup360 (build number of target OS). -- **State** The exit state of a Setup360 run. Example: succeeded, failed, blocked, cancelled. -- **TestId** A string to uniquely identify a group of events. -- **WuId** This is the Windows Update Client ID. With Windows Update, this is the same as the clientId. - - -## Windows as a Service diagnostic events - -### Microsoft.Windows.WaaSMedic.SummaryEvent - -Result of the WaaSMedic operation. - -The following fields are available: - -- **callerApplication** The name of the calling application. -- **capsuleCount** The number of Sediment Pack capsules. -- **capsuleFailureCount** The number of capsule failures. -- **detectionSummary** Result of each applicable detection that was run. -- **featureAssessmentImpact** WaaS Assessment impact for feature updates. -- **hrEngineBlockReason** Indicates the reason for stopping WaaSMedic. -- **hrEngineResult** Error code from the engine operation. -- **hrLastSandboxError** The last error sent by the WaaSMedic sandbox. -- **initSummary** Summary data of the initialization method. -- **insufficientSessions** Device not eligible for diagnostics. -- **isInteractiveMode** The user started a run of WaaSMedic. -- **isManaged** Device is managed for updates. -- **isWUConnected** Device is connected to Windows Update. -- **noMoreActions** No more applicable diagnostics. -- **pluginFailureCount** The number of plugins that have failed. -- **pluginsCount** The number of plugins. -- **qualityAssessmentImpact** WaaS Assessment impact for quality updates. -- **remediationSummary** Result of each operation performed on a device to fix an invalid state or configuration that's preventing the device from getting updates. For example, if Windows Update service is turned off, the fix is to turn the it back on. -- **usingBackupFeatureAssessment** Relying on backup feature assessment. -- **usingBackupQualityAssessment** Relying on backup quality assessment. -- **usingCachedFeatureAssessment** WaaS Medic run did not get OS build age from the network on the previous run. -- **usingCachedQualityAssessment** WaaS Medic run did not get OS revision age from the network on the previous run. -- **versionString** Version of the WaaSMedic engine. -- **waasMedicRunMode** Indicates whether this was a background regular run of the medic or whether it was triggered by a user launching Windows Update Troubleshooter. - - -## Windows Error Reporting events - -### Microsoft.Windows.WERVertical.OSCrash - -This event sends binary data from the collected dump file wheneveer a bug check occurs, to help keep Windows up to date. The is the OneCore version of this event. - -The following fields are available: - -- **BootId** Uint32 identifying the boot number for this device. -- **BugCheckCode** Uint64 "bugcheck code" that identifies a proximate cause of the bug check. -- **BugCheckParameter1** Uint64 parameter providing additional information. -- **BugCheckParameter2** Uint64 parameter providing additional information. -- **BugCheckParameter3** Uint64 parameter providing additional information. -- **BugCheckParameter4** Uint64 parameter providing additional information. -- **DumpFileAttributes** Codes that identify the type of data contained in the dump file -- **DumpFileSize** Size of the dump file -- **IsValidDumpFile** True if the dump file is valid for the debugger, false otherwise -- **ReportId** WER Report Id associated with this bug check (used for finding the corresponding report archive in Watson). - - -## Windows Error Reporting MTT events - -### Microsoft.Windows.WER.MTT.Denominator - -This event provides a denominator to calculate MTTF (mean-time-to-failure) for crashes and other errors, to help keep Windows up to date. - -The following fields are available: - -- **DPRange** Maximum mean value range. -- **DPValue** Randomized bit value (0 or 1) that can be reconstituted over a large population to estimate the mean. -- **Value** Standard UTC emitted DP value structure See [Value](#value). - - -### Value - -This event returns data about Mean Time to Failure (MTTF) for Windows devices. It is the primary means of estimating reliability problems in Basic Diagnostic reporting with very strong privacy guarantees. Since Basic Diagnostic reporting does not include system up-time, and since that information is important to ensuring the safe and stable operation of Windows, the data provided by this event provides that data in a manner which does not threaten a user’s privacy. - -The following fields are available: - -- **Algorithm** The algorithm used to preserve privacy. -- **DPRange** The upper bound of the range being measured. -- **DPValue** The randomized response returned by the client. -- **Epsilon** The level of privacy to be applied. -- **HistType** The histogram type if the algorithm is a histogram algorithm. -- **PertProb** The probability the entry will be Perturbed if the algorithm chosen is “heavy-hitters”. - - -## Windows Store events - -### Microsoft.Windows.Store.StoreActivating - -This event sends tracking data about when the Store app activation via protocol URI is in progress, to help keep Windows up to date. - - - -### Microsoft.Windows.StoreAgent.Telemetry.AbortedInstallation - -This event is sent when an installation or update is canceled by a user or the system and is used to help keep Windows Apps up to date and secure. - -The following fields are available: - -- **AggregatedPackageFullNames** The names of all packages to be downloaded and installed. -- **AttemptNumber** Number of retry attempts before it was canceled. -- **BundleId** The Item Bundle ID. -- **CategoryId** The Item Category ID. -- **ClientAppId** The identity of the app that initiated this operation. -- **HResult** The result code of the last action performed before this operation. -- **IsBundle** Is this a bundle? -- **IsInteractive** Was this requested by a user? -- **IsMandatory** Was this a mandatory update? -- **IsRemediation** Was this a remediation install? -- **IsRestore** Is this automatically restoring a previously acquired product? -- **IsUpdate** Flag indicating if this is an update. -- **ParentBundleId** The product ID of the parent (if this product is part of a bundle). -- **PFN** The product family name of the product being installed. -- **ProductId** The identity of the package or packages being installed. -- **SystemAttemptNumber** The total number of automatic attempts at installation before it was canceled. -- **UserAttemptNumber** The total number of user attempts at installation before it was canceled. -- **WUContentId** The Windows Update content ID. - - -### Microsoft.Windows.StoreAgent.Telemetry.BeginGetInstalledContentIds - -This event is sent when an inventory of the apps installed is started to determine whether updates for those apps are available. It's used to help keep Windows up-to-date and secure. - - - -### Microsoft.Windows.StoreAgent.Telemetry.BeginUpdateMetadataPrepare - -This event is sent when the Store Agent cache is refreshed with any available package updates. It's used to help keep Windows up-to-date and secure. - - - -### Microsoft.Windows.StoreAgent.Telemetry.CancelInstallation - -This event is sent when an app update or installation is canceled while in interactive mode. This can be canceled by the user or the system. It's used to help keep Windows up-to-date and secure. - -The following fields are available: - -- **AggregatedPackageFullNames** The names of all package or packages to be downloaded and installed. -- **AttemptNumber** Total number of installation attempts. -- **BundleId** The identity of the Windows Insider build that is associated with this product. -- **CategoryId** The identity of the package or packages being installed. -- **ClientAppId** The identity of the app that initiated this operation. -- **IsBundle** Is this a bundle? -- **IsInteractive** Was this requested by a user? -- **IsMandatory** Is this a mandatory update? -- **IsRemediation** Is this repairing a previous installation? -- **IsRestore** Is this an automatic restore of a previously acquired product? -- **IsUpdate** Is this a product update? -- **ParentBundleId** The product ID of the parent (if this product is part of a bundle). -- **PFN** The name of all packages to be downloaded and installed. -- **PreviousHResult** The previous HResult code. -- **PreviousInstallState** Previous installation state before it was canceled. -- **ProductId** The name of the package or packages requested for installation. -- **RelatedCV** Correlation Vector of a previous performed action on this product. -- **SystemAttemptNumber** Total number of automatic attempts to install before it was canceled. -- **UserAttemptNumber** Total number of user attempts to install before it was canceled. -- **WUContentId** The Windows Update content ID. - - -### Microsoft.Windows.StoreAgent.Telemetry.CompleteInstallOperationRequest - -This event is sent at the end of app installations or updates to help keep Windows up-to-date and secure. - -The following fields are available: - -- **CatalogId** The Store Product ID of the app being installed. -- **HResult** HResult code of the action being performed. -- **IsBundle** Is this a bundle? -- **PackageFamilyName** The name of the package being installed. -- **ProductId** The Store Product ID of the product being installed. -- **SkuId** Specific edition of the item being installed. - - -### Microsoft.Windows.StoreAgent.Telemetry.EndAcquireLicense - -This event is sent after the license is acquired when a product is being installed. It's used to help keep Windows up-to-date and secure. - -The following fields are available: - -- **AggregatedPackageFullNames** Includes a set of package full names for each app that is part of an atomic set. -- **AttemptNumber** The total number of attempts to acquire this product. -- **CategoryId** The identity of the package or packages being installed. -- **ClientAppId** The identity of the app that initiated this operation. -- **HResult** HResult code to show the result of the operation (success/failure). -- **IsBundle** Is this a bundle? -- **IsInteractive** Did the user initiate the installation? -- **IsMandatory** Is this a mandatory update? -- **IsRemediation** Is this repairing a previous installation? -- **IsRestore** Is this happening after a device restore? -- **IsUpdate** Is this an update? -- **PFN** Product Family Name of the product being installed. -- **ProductId** The Store Product ID for the product being installed. -- **SystemAttemptNumber** The number of attempts by the system to acquire this product. -- **UserAttemptNumber** The number of attempts by the user to acquire this product -- **WUContentId** The Windows Update content ID. - - -### Microsoft.Windows.StoreAgent.Telemetry.EndDownload - -This event is sent after an app is downloaded to help keep Windows up-to-date and secure. - -The following fields are available: - -- **AggregatedPackageFullNames** The name of all packages to be downloaded and installed. -- **AttemptNumber** Number of retry attempts before it was canceled. -- **BundleId** The identity of the Windows Insider build associated with this product. -- **CategoryId** The identity of the package or packages being installed. -- **ClientAppId** The identity of the app that initiated this operation. -- **DownloadSize** The total size of the download. -- **ExtendedHResult** Any extended HResult error codes. -- **HResult** The result code of the last action performed. -- **IsBundle** Is this a bundle? -- **IsInteractive** Is this initiated by the user? -- **IsMandatory** Is this a mandatory installation? -- **IsRemediation** Is this repairing a previous installation? -- **IsRestore** Is this a restore of a previously acquired product? -- **IsUpdate** Is this an update? -- **ParentBundleId** The parent bundle ID (if it's part of a bundle). -- **PFN** The Product Family Name of the app being download. -- **ProductId** The Store Product ID for the product being installed. -- **SystemAttemptNumber** The number of attempts by the system to download. -- **UserAttemptNumber** The number of attempts by the user to download. -- **WUContentId** The Windows Update content ID. - - -### Microsoft.Windows.StoreAgent.Telemetry.EndFrameworkUpdate - -This event is sent when an app update requires an updated Framework package and the process starts to download it. It is used to help keep Windows up-to-date and secure. - -The following fields are available: - -- **HResult** The result code of the last action performed before this operation. - - -### Microsoft.Windows.StoreAgent.Telemetry.EndGetInstalledContentIds - -This event is sent after sending the inventory of the products installed to determine whether updates for those products are available. It's used to help keep Windows up-to-date and secure. - -The following fields are available: - -- **HResult** The result code of the last action performed before this operation. - - -### Microsoft.Windows.StoreAgent.Telemetry.EndInstall - -This event is sent after a product has been installed to help keep Windows up-to-date and secure. - -The following fields are available: - -- **AggregatedPackageFullNames** The names of all packages to be downloaded and installed. -- **AttemptNumber** The number of retry attempts before it was canceled. -- **BundleId** The identity of the build associated with this product. -- **CategoryId** The identity of the package or packages being installed. -- **ClientAppId** The identity of the app that initiated this operation. -- **ExtendedHResult** The extended HResult error code. -- **HResult** The result code of the last action performed. -- **IsBundle** Is this a bundle? -- **IsInteractive** Is this an interactive installation? -- **IsMandatory** Is this a mandatory installation? -- **IsRemediation** Is this repairing a previous installation? -- **IsRestore** Is this automatically restoring a previously acquired product? -- **IsUpdate** Is this an update? -- **ParentBundleId** The product ID of the parent (if this product is part of a bundle). -- **PFN** Product Family Name of the product being installed. -- **ProductId** The Store Product ID for the product being installed. -- **SystemAttemptNumber** The total number of system attempts. -- **UserAttemptNumber** The total number of user attempts. -- **WUContentId** The Windows Update content ID. - - -### Microsoft.Windows.StoreAgent.Telemetry.EndScanForUpdates - -This event is sent after a scan for product updates to determine if there are packages to install. It's used to help keep Windows up-to-date and secure. - -The following fields are available: - -- **ClientAppId** The identity of the app that initiated this operation. -- **HResult** The result code of the last action performed. -- **IsApplicability** Is this request to only check if there are any applicable packages to install? -- **IsInteractive** Is this user requested? -- **IsOnline** Is the request doing an online check? - - -### Microsoft.Windows.StoreAgent.Telemetry.EndSearchUpdatePackages - -This event is sent after searching for update packages to install. It is used to help keep Windows up-to-date and secure. - -The following fields are available: - -- **AggregatedPackageFullNames** The names of all packages to be downloaded and installed. -- **AttemptNumber** The total number of retry attempts before it was canceled. -- **BundleId** The identity of the build associated with this product. -- **CategoryId** The identity of the package or packages being installed. -- **ClientAppId** The identity of the app that initiated this operation. -- **HResult** The result code of the last action performed. -- **IsBundle** Is this a bundle? -- **IsInteractive** Is this user requested? -- **IsMandatory** Is this a mandatory update? -- **IsRemediation** Is this repairing a previous installation? -- **IsRestore** Is this restoring previously acquired content? -- **IsUpdate** Is this an update? -- **ParentBundleId** The product ID of the parent (if this product is part of a bundle). -- **PFN** The name of the package or packages requested for install. -- **ProductId** The Store Product ID for the product being installed. -- **SystemAttemptNumber** The total number of system attempts. -- **UserAttemptNumber** The total number of user attempts. -- **WUContentId** The Windows Update content ID. - - -### Microsoft.Windows.StoreAgent.Telemetry.EndStageUserData - -This event is sent after restoring user data (if any) that needs to be restored following a product install. It is used to keep Windows up-to-date and secure. - -The following fields are available: - -- **AggregatedPackageFullNames** The name of all packages to be downloaded and installed. -- **AttemptNumber** The total number of retry attempts before it was canceled. -- **BundleId** The identity of the build associated with this product. -- **CategoryId** The identity of the package or packages being installed. -- **ClientAppId** The identity of the app that initiated this operation. -- **HResult** The result code of the last action performed. -- **IsBundle** Is this a bundle? -- **IsInteractive** Is this user requested? -- **IsMandatory** Is this a mandatory update? -- **IsRemediation** Is this repairing a previous installation? -- **IsRestore** Is this restoring previously acquired content? -- **IsUpdate** Is this an update? -- **ParentBundleId** The product ID of the parent (if this product is part of a bundle). -- **PFN** The name of the package or packages requested for install. -- **ProductId** The Store Product ID for the product being installed. -- **SystemAttemptNumber** The total number of system attempts. -- **UserAttemptNumber** The total number of system attempts. -- **WUContentId** The Windows Update content ID. - - -### Microsoft.Windows.StoreAgent.Telemetry.EndUpdateMetadataPrepare - -This event is sent after a scan for available app updates to help keep Windows up-to-date and secure. - -The following fields are available: - -- **HResult** The result code of the last action performed. - - -### Microsoft.Windows.StoreAgent.Telemetry.FulfillmentComplete - -This event is sent at the end of an app install or update to help keep Windows up-to-date and secure. - -The following fields are available: - -- **CatalogId** The name of the product catalog from which this app was chosen. -- **FailedRetry** Indicates whether the installation or update retry was successful. -- **HResult** The HResult code of the operation. -- **PFN** The Package Family Name of the app that is being installed or updated. -- **ProductId** The product ID of the app that is being updated or installed. - - -### Microsoft.Windows.StoreAgent.Telemetry.FulfillmentInitiate - -This event is sent at the beginning of an app install or update to help keep Windows up-to-date and secure. - -The following fields are available: - -- **CatalogId** The name of the product catalog from which this app was chosen. -- **FulfillmentPluginId** The ID of the plugin needed to install the package type of the product. -- **PFN** The Package Family Name of the app that is being installed or updated. -- **PluginTelemetryData** Diagnostic information specific to the package-type plug-in. -- **ProductId** The product ID of the app that is being updated or installed. - - -### Microsoft.Windows.StoreAgent.Telemetry.InstallOperationRequest - -This event is sent when a product install or update is initiated, to help keep Windows up-to-date and secure. - -The following fields are available: - -- **BundleId** The identity of the build associated with this product. -- **CatalogId** If this product is from a private catalog, the Store Product ID for the product being installed. -- **ProductId** The Store Product ID for the product being installed. -- **SkuId** Specific edition ID being installed. -- **VolumePath** The disk path of the installation. - - -### Microsoft.Windows.StoreAgent.Telemetry.PauseInstallation - -This event is sent when a product install or update is paused (either by a user or the system), to help keep Windows up-to-date and secure. - -The following fields are available: - -- **AggregatedPackageFullNames** The names of all packages to be downloaded and installed. -- **AttemptNumber** The total number of retry attempts before it was canceled. -- **BundleId** The identity of the build associated with this product. -- **CategoryId** The identity of the package or packages being installed. -- **ClientAppId** The identity of the app that initiated this operation. -- **IsBundle** Is this a bundle? -- **IsInteractive** Is this user requested? -- **IsMandatory** Is this a mandatory update? -- **IsRemediation** Is this repairing a previous installation? -- **IsRestore** Is this restoring previously acquired content? -- **IsUpdate** Is this an update? -- **ParentBundleId** The product ID of the parent (if this product is part of a bundle). -- **PFN** The Product Full Name. -- **PreviousHResult** The result code of the last action performed before this operation. -- **PreviousInstallState** Previous state before the installation or update was paused. -- **ProductId** The Store Product ID for the product being installed. -- **RelatedCV** Correlation Vector of a previous performed action on this product. -- **SystemAttemptNumber** The total number of system attempts. -- **UserAttemptNumber** The total number of user attempts. -- **WUContentId** The Windows Update content ID. - - -### Microsoft.Windows.StoreAgent.Telemetry.ResumeInstallation - -This event is sent when a product install or update is resumed (either by a user or the system), to help keep Windows up-to-date and secure. - -The following fields are available: - -- **AggregatedPackageFullNames** The names of all packages to be downloaded and installed. -- **AttemptNumber** The number of retry attempts before it was canceled. -- **BundleId** The identity of the build associated with this product. -- **CategoryId** The identity of the package or packages being installed. -- **ClientAppId** The identity of the app that initiated this operation. -- **HResult** The result code of the last action performed before this operation. -- **IsBundle** Is this a bundle? -- **IsInteractive** Is this user requested? -- **IsMandatory** Is this a mandatory update? -- **IsRemediation** Is this repairing a previous installation? -- **IsRestore** Is this restoring previously acquired content? -- **IsUpdate** Is this an update? -- **IsUserRetry** Did the user initiate the retry? -- **ParentBundleId** The product ID of the parent (if this product is part of a bundle). -- **PFN** The name of the package or packages requested for install. -- **PreviousHResult** The previous HResult error code. -- **PreviousInstallState** Previous state before the installation was paused. -- **ProductId** The Store Product ID for the product being installed. -- **RelatedCV** Correlation Vector for the original install before it was resumed. -- **ResumeClientId** The ID of the app that initiated the resume operation. -- **SystemAttemptNumber** The total number of system attempts. -- **UserAttemptNumber** The total number of user attempts. -- **WUContentId** The Windows Update content ID. - - -### Microsoft.Windows.StoreAgent.Telemetry.ResumeOperationRequest - -This event is sent when a product install or update is resumed by a user or on installation retries, to help keep Windows up-to-date and secure. - -The following fields are available: - -- **ProductId** The Store Product ID for the product being installed. - - -### Microsoft.Windows.StoreAgent.Telemetry.SearchForUpdateOperationRequest - -This event is sent when searching for update packages to install, to help keep Windows up-to-date and secure. - -The following fields are available: - -- **CatalogId** The Store Catalog ID for the product being installed. -- **ProductId** The Store Product ID for the product being installed. -- **SkuId** Specfic edition of the app being updated. - - -### Microsoft.Windows.StoreAgent.Telemetry.UpdateAppOperationRequest - -This event occurs when an update is requested for an app, to help keep Windows up-to-date and secure. - -The following fields are available: - -- **PFamN** The name of the app that is requested for update. - - -## Windows System Kit events - -### Microsoft.Windows.Kits.WSK.WskImageCreate - -This event sends simple Product and Service usage data when a user is using the Windows System Kit to create new OS “images”. The data includes the version of the Windows System Kit and the state of the event and is used to help investigate “image” creation failures. - -The following fields are available: - -- **Phase** The image creation phase. Values are “Start” or “End”. -- **WskVersion** The version of the Windows System Kit being used. - - -### Microsoft.Windows.Kits.WSK.WskImageCustomization - -This event sends simple Product and Service usage data when a user is using the Windows System Kit to create/modify configuration files allowing the customization of a new OS image with Apps or Drivers. The data includes the version of the Windows System Kit, the state of the event, the customization type (drivers or apps) and the mode (new or updating) and is used to help investigate configuration file creation failures. - -The following fields are available: - -- **CustomizationMode** Indicates the mode of the customization (new or updating). -- **CustomizationType** Indicates the type of customization (drivers or apps). -- **Mode** The mode of update to image configuration files. Values are “New” or “Update”. -- **Phase** The image creation phase. Values are “Start” or “End”. -- **Type** The type of update to image configuration files. Values are “Apps” or “Drivers”. -- **WskVersion** The version of the Windows System Kit being used. - - -### Microsoft.Windows.Kits.WSK.WskWorkspaceCreate - -This event sends simple Product and Service usage data when a user is using the Windows System Kit to create new workspace for generating OS “images”. The data includes the version of the Windows System Kit and the state of the event and is used to help investigate workspace creation failures. - -The following fields are available: - -- **Architecture** The OS architecture that the workspace will target. Values are one of: “AMD64”, “ARM64”, “x86”, or “ARM”. -- **OsEdition** The Operating System Edition that the workspace will target. -- **Phase** The image creation phase. Values are “Start” or “End”. -- **WorkspaceArchitecture** The operating system architecture that the workspace will target. -- **WorkspaceOsEdition** The operating system edition that the workspace will target. -- **WskVersion** The version of the Windows System Kit being used. - - -## Windows Update Delivery Optimization events - -### Microsoft.OSG.DU.DeliveryOptClient.DownloadCanceled - -This event describes when a download was canceled with Delivery Optimization. It's used to understand and address problems regarding downloads. - -The following fields are available: - -- **background** Is the download being done in the background? -- **bytesFromCacheServer** Bytes received from a cache host. -- **bytesFromCDN** The number of bytes received from a CDN source. -- **bytesFromGroupPeers** The number of bytes received from a peer in the same group. -- **bytesFromIntPeers** The number of bytes received from peers not in the same LAN or in the same group. -- **bytesFromLinkLocalPeers** The number of bytes received from local peers. -- **bytesFromLocalCache** Bytes copied over from local (on disk) cache. -- **bytesFromPeers** The number of bytes received from a peer in the same LAN. -- **cdnErrorCodes** A list of CDN connection errors since the last FailureCDNCommunication event. -- **cdnErrorCounts** The number of times each error in cdnErrorCodes was encountered. -- **cdnIp** The IP Address of the source CDN (Content Delivery Network). -- **cdnUrl** The URL of the source CDN (Content Delivery Network). -- **dataSourcesTotal** Bytes received per source type, accumulated for the whole session. -- **errorCode** The error code that was returned. -- **experimentId** When running a test, this is used to correlate events that are part of the same test. -- **fileID** The ID of the file being downloaded. -- **gCurMemoryStreamBytes** Current usage for memory streaming. -- **gMaxMemoryStreamBytes** Maximum usage for memory streaming. -- **isVpn** Indicates whether the device is connected to a VPN (Virtual Private Network). -- **jobID** Identifier for the Windows Update job. -- **predefinedCallerName** The name of the API Caller. -- **reasonCode** Reason the action or event occurred. -- **routeToCacheServer** The cache server setting, source, and value. -- **sessionID** The ID of the file download session. -- **updateID** The ID of the update being downloaded. -- **usedMemoryStream** TRUE if the download is using memory streaming for App downloads. - - -### Microsoft.OSG.DU.DeliveryOptClient.DownloadCompleted - -This event describes when a download has completed with Delivery Optimization. It's used to understand and address problems regarding downloads. - -The following fields are available: - -- **#dnErrorCounts** No content is currently available. -- **__TlgCVß_** No content is currently available. -- **|anConnectionCount** No content is currently available. -- **}plinkUsageBps** No content is currently available. -- **0redefinedCallerName** No content is currently available. -- **b6nConnectionCount** No content is currently available. -- **b6nErrorCodes** No content is currently available. -- **b6nErrorCounts** No content is currently available. -- **b6nIp** No content is currently available. -- **b6nUrl** No content is currently available. -- **background** Is the download a background download? -- **bytesFrkmIntPeers** No content is currently available. -- **bytesFromCacheSedver** No content is currently available. -- **bytesFromCacheServer** Bytes received from a cache host. -- **bytesFromCdN** No content is currently available. -- **bytesFromCDN** The number of bytes received from a CDN source. -- **bytesFromGpoupPeers** No content is currently available. -- **bytesFromGroupPeers** The number of bytes received from a peer in the same domain group. -- **bytesFromIntÐeers** No content is currently available. -- **bytesFromIntPeers** The number of bytes received from peers not in the same LAN or in the same domain group. -- **bytesFromLinkLocalPeers** The number of bytes received from local peers. -- **bytesFromLocalCache** Bytes copied over from local (on disk) cache. -- **bytesFromPeers** The number of bytes received from a peer in the same LAN. -- **bytesRequested** The total number of bytes requested for download. -- **cacheSarverConnectionCount** No content is currently available. -- **cacheSedverConnectionCount** No content is currently available. -- **cacheServerConndctionCount** No content is currently available. -- **cacheServerConnectionCoujt** No content is currently available. -- **cacheServerConnectionCount** Number of connections made to cache hosts. -- **cdnConnectionCount** The total number of connections made to the CDN. -- **cdnErrorCodes** A list of CDN connection errors since the last FailureCDNCommunication event. -- **cdnErrorCounts** The number of times each error in cdnErrorCodes was encountered. -- **cdnIp** The IP address of the source CDN. -- **cdnSonnectionCount** No content is currently available. -- **cdnUrl** Url of the source Content Distribution Network (CDN). -- **dataSourcesTotal** Bytes received per source type, accumulated for the whole session. -- **dkwnloadModeSrc** No content is currently available. -- **doErrorCode** The Delivery Optimization error code that was returned. -- **dowflinkBps** No content is currently available. -- **downlinkBps** The maximum measured available download bandwidth (in bytes per second). -- **downlinkUsageBps** The download speed (in bytes per second). -- **downloadMode** The download mode used for this file download session. -- **doWnloadMode** No content is currently available. -- **downloadModeReason** Reason for the download. -- **downloadModeSrc** Source of the DownloadMode setting (KvsProvider = 0, GeoProvider = 1, GeoVerProvider = 2, CpProvider = 3, DiscoveryProvider = 4, RegistryProvider = 5, GroupPolicyProvider = 6, MdmProvider = 7, SettingsProvider = 8, InvalidProviderType = 9). -- **downloadMofeSrc** No content is currently available. -- **experimentId** When running a test, this is used to correlate with other events that are part of the same test. -- **expiresAt** The time when the content will expire from the Delivery Optimization Cache. -- **fileID** The ID of the file being downloaded. -- **fileSize** The size of the file being downloaded. -- **gCurMemoryStreamBytes** Current usage for memory streaming. -- **gMaxMemoryStreamBytes** Maximum usage for memory streaming. -- **groupConjectionCount** No content is currently available. -- **groupConnectionCount** The total number of connections made to peers in the same group. -- **in4ernetConnectionCount** No content is currently available. -- **internetConnectionCnunt** No content is currently available. -- **internetConnectionCount** The total number of connections made to peers not in the same LAN or the same group. -- **internetConnectionCountdownlinkBps** No content is currently available. -- **isEjcrypted** No content is currently available. -- **isEncryptdd** No content is currently available. -- **isEncrypted** TRUE if the file is encrypted and will be decrypted after download. -- **isVpn** Is the device connected to a Virtual Private Network? -- **jobID** Identifier for the Windows Update job. -- **lanConnectionCo}nt** No content is currently available. -- **lanConnectionCount** The total number of connections made to peers in the same LAN. -- **linkLocalConnectionCount** The number of connections made to peers in the same Link-local network. -- **numPeers** The total number of peers used for this download. -- **numPeersLocal** The total number of local peers used for this download. -- **predefi.edCallerName** No content is currently available. -- **predefinedCallerName** The name of the API Caller. -- **predefinedCalleRName** No content is currently available. -- **rcdnIp** No content is currently available. -- **restrictedUpload** Is the upload restricted? -- **romteToCacheServer** No content is currently available. -- **roupeToCacheServer** No content is currently available. -- **routeTnCacheServer** No content is currently available. -- **routeToCacheSedver** No content is currently available. -- **routeToCacheServer** The cache server setting, source, and value. -- **sessionID** The ID of the download session. -- **totalTimeMs** Duration of the download (in seconds). -- **updateID** The ID of the update being downloaded. -- **uplinkBps** The maximum measured available upload bandwidth (in bytes per second). -- **uplinkUsageBps** The upload speed (in bytes per second). -- **uplinkUsegeBps** No content is currently available. -- **usedMemoryStream** TRUE if the download is using memory streaming for App downloads. - - -### Microsoft.OSG.DU.DeliveryOptClient.DownloadPaused - -This event represents a temporary suspension of a download with Delivery Optimization. It's used to understand and address problems regarding downloads. - -The following fields are available: - -- **AddinType** No content is currently available. -- **backgground** No content is currently available. -- **backgro}nd** No content is currently available. -- **backgrou|d** No content is currently available. -- **background** Is the download a background download? -- **BinFileTimestamp** No content is currently available. -- **BinFileVersion** No content is currently available. -- **c`nUrl** No content is currently available. -- **cdnUrl** The URL of the source CDN (Content Delivery Network). -- **errorBode** No content is currently available. -- **errorCode** The error code that was returned. -- **expebimentId** No content is currently available. -- **expebimentIderrorCode** No content is currently available. -- **experiientId** No content is currently available. -- **experimenpId** No content is currently available. -- **experimentId** When running a test, this is used to correlate with other events that are part of the same test. -- **fileID** The ID of the file being paused. -- **FileId** No content is currently available. -- **FileSize** No content is currently available. -- **isVp|** No content is currently available. -- **isVpn** Is the device connected to a Virtual Private Network? -- **jobID** Identifier for the Windows Update job. -- **ksVpn** No content is currently available. -- **LoadBehavior** No content is currently available. -- **LSID** No content is currently available. -- **OfficeArchitecture** No content is currently available. -- **OutlookCrashingAddin** No content is currently available. -- **predefinedCallerName** The name of the API Caller object. -- **ProductCompany** No content is currently available. -- **ProductName** No content is currently available. -- **ProductVersion** No content is currently available. -- **ProgramId** No content is currently available. -- **Provider** No content is currently available. -- **reasonCod%** No content is currently available. -- **reasonCode** The reason for pausing the download. -- **recsonCodesessiolID** No content is currently available. -- **routeToCacheSedver** No content is currently available. -- **routeToCacheServer** The cache server setting, source, and value. -- **sessionID** The ID of the download session. -- **updateID** The ID of the update being paused. -- **updateMD** No content is currently available. - - -### Microsoft.OSG.DU.DeliveryOptClient.DownloadStarted - -This event sends data describing the start of a new download to enable Delivery Optimization. It's used to understand and address problems regarding downloads. - -The following fields are available: - -- **b6nUrl** No content is currently available. -- **background** Indicates whether the download is happening in the background. -- **bacoground** No content is currently available. -- **bileSizeCaller** No content is currently available. -- **bytesRequested** Number of bytes requested for the download. -- **cdnUrl** The URL of the source Content Distribution Network (CDN). -- **costFlags** A set of flags representing network cost. -- **costFlaos** No content is currently available. -- **deviceProfile** Identifies the usage or form factor (such as Desktop, Xbox, or VM). -- **diceRoll** Random number used for determining if a client will use peering. -- **doClientVersion** The version of the Delivery Optimization client. -- **doErrorC/de** No content is currently available. -- **doErrorCode** The Delivery Optimization error code that was returned. -- **doErrorCoee** No content is currently available. -- **downloadMode** The download mode used for this file download session (CdnOnly = 0, Lan = 1, Group = 2, Internet = 3, Simple = 99, Bypass = 100). -- **downloadModeReason** Reason for the download. -- **downloadModeSrc** Source of the DownloadMode setting (KvsProvider = 0, GeoProvider = 1, GeoVerProvider = 2, CpProvider = 3, DiscoveryProvider = 4, RegistryProvider = 5, GroupPolicyProvider = 6, MdmProvider = 7, SettingsProvider = 8, InvalidProviderType = 9). -- **errorCode** The error code that was returned. -- **experimejtId** No content is currently available. -- **experimentId** ID used to correlate client/services calls that are part of the same test during A/B testing. -- **expeZone** No content is currently available. -- **faleID** No content is currently available. -- **fiheID** No content is currently available. -- **fileID** The ID of the file being downloaded. -- **filePat(** No content is currently available. -- **filePath** The path to where the downloaded file will be written. -- **fileSize** Total file size of the file that was downloaded. -- **fileSizeCaller** Value for total file size provided by our caller. -- **groqpID** No content is currently available. -- **groupID** ID for the group. -- **isEncrypted** Indicates whether the download is encrypted. -- **isFpn** No content is currently available. -- **isVpn** Indicates whether the device is connected to a Virtual Private Network. -- **jobID** The ID of the Windows Update job. -- **peerID** The ID for this delivery optimization client. -- **predefinedCall%rName** No content is currently available. -- **predefinedCallerName** Name of the API caller. -- **rimentId** No content is currently available. -- **routeToCacheSedver** No content is currently available. -- **routeToCacheServer** Cache server setting, source, and value. -- **sessionID** The ID for the file download session. -- **sessionIF** No content is currently available. -- **sessmonID** No content is currently available. -- **setConfigs** A JSON representation of the configurations that have been set, and their sources. -- **updateID** The ID of the update being downloaded. -- **updateYD** No content is currently available. -- **usedMemoryStream** Indicates whether the download used memory streaming. - - -### Microsoft.OSG.DU.DeliveryOptClient.FailureCdnCommunication - -This event represents a failure to download from a CDN with Delivery Optimization. It's used to understand and address problems regarding downloads. - -The following fields are available: - -- **cdnHeaders** The HTTP headers returned by the CDN. -- **cdnIp** The IP address of the CDN. -- **cdnUrl** The URL of the CDN. -- **eErrorCode** No content is currently available. -- **eErrorCunt** No content is currently available. -- **errorCode** The error code that was returned. -- **errorCount** The total number of times this error code was seen since the last FailureCdnCommunication event was encountered. -- **experimentId** When running a test, this is used to correlate with other events that are part of the same test. -- **fileID** The ID of the file being downloaded. -- **htppStatusCode** No content is currently available. -- **httpStatusCode** The HTTP status code returned by the CDN. -- **isHeadRequest** The type of HTTP request that was sent to the CDN. Example: HEAD or GET -- **peerTyp,** No content is currently available. -- **peerType** The type of peer (LAN, Group, Internet, CDN, Cache Host, etc.). -- **requestOffset** The byte offset within the file in the sent request. -- **requestSize** The size of the range requested from the CDN. -- **responseSize** The size of the range response received from the CDN. -- **sessionID** The ID of the download session. - - -### Microsoft.OSG.DU.DeliveryOptClient.JobError - -This event represents a Windows Update job error. It allows for investigation of top errors. - -The following fields are available: - -- **cdnIp** The IP Address of the source CDN (Content Delivery Network). -- **doErrorCode** Error code returned for delivery optimization. -- **errorCode** The error code returned. -- **experimentId** When running a test, this is used to correlate with other events that are part of the same test. -- **fileID** The ID of the file being downloaded. -- **jobID** The Windows Update job ID. -- **jobKD** No content is currently available. - - -## Windows Update events - -### Microsoft.Windows.Update.DeviceUpdateAgent.UpdateAgentAnalysisSummary - -This event collects information regarding the state of devices and drivers on the system following a reboot after the install phase of the new device manifest UUP (Unified Update Platform) update scenario which is used to install a device manifest describing a set of driver packages. - -The following fields are available: - -- **activated** Whether the entire device manifest update is considered activated and in use. -- **analysisErrorCount** The number of driver packages that could not be analyzed because errors occurred during analysis. -- **flightId** Unique ID for each flight. -- **missingDriverCount** The number of driver packages delivered by the device manifest that are missing from the system. -- **missingUpdateCount** The number of updates in the device manifest that are missing from the system. -- **objectId** Unique value for each diagnostics session. -- **publishedCount** The number of drivers packages delivered by the device manifest that are published and available to be used on devices. -- **relatedCV** Correlation vector value generated from the latest USO scan. -- **scenarioId** Indicates the update scenario. -- **sessionId** Unique value for each update session. -- **summary** A summary string that contains basic information about driver packages that are part of the device manifest and any devices on the system that those driver packages match. -- **summaryAppendError** A Boolean indicating if there was an error appending more information to the summary string. -- **truncatedDeviceCount** The number of devices missing from the summary string because there is not enough room in the string. -- **truncatedDriverCount** The number of driver packages missing from the summary string because there is not enough room in the string. -- **unpublishedCount** How many drivers packages that were delivered by the device manifest that are still unpublished and unavailable to be used on devices. -- **updateId** The unique ID for each update. - - -### Microsoft.Windows.Update.DeviceUpdateAgent.UpdateAgentCommit - -This event collects information regarding the final commit phase of the new device manifest UUP (Unified Update Platform) update scenario, which is used to install a device manifest describing a set of driver packages. - -The following fields are available: - -- **errorCode** The error code returned for the current session initialization. -- **flightId** The unique identifier for each flight. -- **objectId** The unique GUID for each diagnostics session. -- **relatedCV** A correlation vector value generated from the latest USO scan. -- **result** Outcome of the initialization of the session. -- **scenarioId** Identifies the Update scenario. -- **sessionId** The unique value for each update session. -- **updateId** The unique identifier for each Update. - - -### Microsoft.Windows.Update.DeviceUpdateAgent.UpdateAgentDownloadRequest - -This event collects information regarding the download request phase of the new device manifest UUP (Unified Update Platform) update scenario, which is used to install a device manifest describing a set of driver packages. - -The following fields are available: - -- **deletedCorruptFiles** Indicates if UpdateAgent found any corrupt payload files and whether the payload was deleted. -- **errorCode** The error code returned for the current session initialization. -- **flightId** The unique identifier for each flight. -- **objectId** Unique value for each Update Agent mode. -- **packageCountOptional** Number of optional packages requested. -- **packageCountRequired** Number of required packages requested. -- **packageCountTotal** Total number of packages needed. -- **packageCountTotalCanonical** Total number of canonical packages. -- **packageCountTotalDiff** Total number of diff packages. -- **packageCountTotalExpress** Total number of express packages. -- **packageSizeCanonical** Size of canonical packages in bytes. -- **packageSizeDiff** Size of diff packages in bytes. -- **packageSizeExpress** Size of express packages in bytes. -- **rangeRequestState** Represents the state of the download range request. -- **relatedCV** Correlation vector value generated from the latest USO scan. -- **result** Result of the download request phase of update. -- **scenarioId** The scenario ID. Example: MobileUpdate, DesktopLanguagePack, DesktopFeatureOnDemand, or DesktopDriverUpdate. -- **sessionId** Unique value for each Update Agent mode attempt. -- **updateId** Unique ID for each update. - - -### Microsoft.Windows.Update.DeviceUpdateAgent.UpdateAgentInitialize - -This event sends data for initializing a new update session for the new device manifest UUP (Unified Update Platform) update scenario, which is used to install a device manifest describing a set of driver packages. - -The following fields are available: - -- **errorCode** The error code returned for the current session initialization. -- **flightId** The unique identifier for each flight. -- **flightMetadata** Contains the FlightId and the build being flighted. -- **objectId** Unique value for each Update Agent mode. -- **relatedCV** Correlation vector value generated from the latest USO scan. -- **result** Result of the initialize phase of the update. 0 = Succeeded, 1 = Failed, 2 = Cancelled, 3 = Blocked, 4 = BlockCancelled. -- **scenarioId** The scenario ID. Example: MobileUpdate, DesktopLanguagePack, DesktopFeatureOnDemand, or DesktopDriverUpdate. -- **sessionData** Contains instructions to update agent for processing FODs and DUICs (Null for other scenarios). -- **sessionId** Unique value for each Update Agent mode attempt. -- **updateId** Unique ID for each update. - - -### Microsoft.Windows.Update.DeviceUpdateAgent.UpdateAgentInstall - -This event collects information regarding the install phase of the new device manifest UUP (Unified Update Platform) update scenario, which is used to install a device manifest describing a set of driver packages. - -The following fields are available: - -- **errorCode** The error code returned for the current install phase. -- **flightId** The unique identifier for each flight (pre-release builds). -- **objectId** The unique identifier for each diagnostics session. -- **relatedCV** Correlation vector value generated from the latest scan. -- **result** Outcome of the install phase of the update. -- **scenarioId** The scenario ID. Example: MobileUpdate, DesktopLanguagePack, DesktopFeatureOnDemand, or DesktopDriverUpdate -- **sessionId** The unique identifier for each update session. -- **updateId** The unique identifier for each Update. - - -### Microsoft.Windows.Update.DeviceUpdateAgent.UpdateAgentModeStart - -This event sends data for the start of each mode during the process of updating device manifest assets via the UUP (Unified Update Platform) update scenario, which is used to install a device manifest describing a set of driver packages. - -The following fields are available: - -- **flightId** The unique identifier for each flight (pre-release builds). -- **mode** Indicates the active Update Agent mode. -- **objectId** Unique value for each diagnostics session. -- **relatedCV** Correlation vector value generated from the latest scan. -- **scenarioId** The scenario ID. Example: MobileUpdate, DesktopLanguagePack, DesktopFeatureOnDemand, or DesktopDriverUpdate. -- **sessionId** The unique identifier for each update session. -- **updateId** The unique identifier for each Update. - - -### Microsoft.Windows.Update.NotificationUx.DialogNotificationToBeDisplayed - -This event indicates that a notification dialog box is about to be displayed to user. - -The following fields are available: - -- **AcceptAutoModeLimit** The maximum number of days for a device to automatically enter Auto Reboot mode. -- **AutoToAutoFailedLimit** The maximum number of days for Auto Reboot mode to fail before the RebootFailed dialog box is shown. -- **DaysSinceRebootRequired** Number of days since restart was required. -- **DeviceLocalTime** The local time on the device sending the event. -- **EngagedModeLimit** The number of days to switch between DTE dialog boxes. -- **EnterAutoModeLimit** The maximum number of days for a device to enter Auto Reboot mode. -- **ETag** OneSettings versioning value. -- **IsForcedEnabled** Indicates whether Forced Reboot mode is enabled for this device. -- **IsUltimateForcedEnabled** Indicates whether Ultimate Forced Reboot mode is enabled for this device. -- **NotificationUxState** Indicates which dialog box is shown. -- **NotificationUxStateString** Indicates which dialog box is shown. -- **RebootUxState** Indicates the state of the restart (Engaged, Auto, Forced, or UltimateForced). -- **RebootUxStateString** Indicates the state of the restart (Engaged, Auto, Forced, or UltimateForced). -- **RebootVersion** Version of DTE. -- **SkipToAutoModeLimit** The minimum length of time to pass in restart pending before a device can be put into auto mode. -- **UpdateId** The ID of the update that is pending restart to finish installation. -- **UpdateRevision** The revision of the update that is pending restart to finish installation. -- **UtcTime** The time the dialog box notification will be displayed, in Coordinated Universal Time. - - -### Microsoft.Windows.Update.NotificationUx.EnhancedEngagedRebootAcceptAutoDialog - -This event indicates that the Enhanced Engaged restart "accept automatically" dialog box was displayed. - -The following fields are available: - -- **DeviceLocalTime** The local time on the device sending the event. -- **ETag** OneSettings versioning value. -- **ExitCode** Indicates how users exited the dialog box. -- **RebootVersion** Version of DTE. -- **UpdateId** The ID of the update that is pending restart to finish installation. -- **UpdateRevision** The revision of the update that is pending restart to finish installation. -- **UserResponseString** The option that user chose on this dialog box. -- **UtcTime** The time that the dialog box was displayed, in Coordinated Universal Time. - - -### Microsoft.Windows.Update.NotificationUx.EnhancedEngagedRebootFirstReminderDialog - -This event indicates that the Enhanced Engaged restart "first reminder" dialog box was displayed.. - -The following fields are available: - -- **DeviceLocalTime** The local time on the device sending the event. -- **ETag** OneSettings versioning value. -- **ExitCode** Indicates how users exited the dialog box. -- **RebootVersion** Version of DTE. -- **UpdateId** The ID of the update that is pending restart to finish installation. -- **UpdateRevision** The revision of the update that is pending restart to finish installation. -- **UserResponseString** The option that user chose in this dialog box. -- **UtcTime** The time that the dialog box was displayed, in Coordinated Universal Time. - - -### Microsoft.Windows.Update.NotificationUx.EnhancedEngagedRebootRebootFailedDialog - -This event indicates that the Enhanced Engaged restart "restart failed" dialog box was displayed. - -The following fields are available: - -- **DeviceLocalTime** The local time of the device sending the event. -- **ETag** OneSettings versioning value. -- **ExitCode** Indicates how users exited the dialog box. -- **RebootVersion** Version of DTE. -- **UpdateId** The ID of the update that is pending restart to finish installation. -- **UpdateRevision** The revision of the update that is pending restart to finish installation. -- **UserResponseString** The option that the user chose in this dialog box. -- **UtcTime** The time that the dialog box was displayed, in Coordinated Universal Time. - - -### Microsoft.Windows.Update.NotificationUx.EnhancedEngagedRebootRebootImminentDialog - -This event indicates that the Enhanced Engaged restart "restart imminent" dialog box was displayed. - -The following fields are available: - -- **DeviceLocalTime** Time the dialog box was shown on the local device. -- **ETag** OneSettings versioning value. -- **ExitCode** Indicates how users exited the dialog box. -- **RebootVersion** Version of DTE. -- **UpdateId** The ID of the update that is pending restart to finish installation. -- **UpdateRevision** The revision of the update that is pending restart to finish installation. -- **UserResponseString** The option that user chose in this dialog box. -- **UtcTime** The time that dialog box was displayed, in Coordinated Universal Time. - - -### Microsoft.Windows.Update.NotificationUx.EnhancedEngagedRebootReminderDialog - -This event returns information relating to the Enhanced Engaged reboot reminder dialog that was displayed. - -The following fields are available: - -- **DeviceLocalTime** The time at which the reboot reminder dialog was shown (based on the local device time settings). -- **ETag** The OneSettings versioning value. -- **ExitCode** Indicates how users exited the reboot reminder dialog box. -- **RebootVersion** The version of the DTE (Direct-to-Engaged). -- **UpdateId** The ID of the update that is waiting for reboot to finish installation. -- **UpdateRevision** The revision of the update that is waiting for reboot to finish installation. -- **UserResponseString** The option chosen by the user on the reboot dialog box. -- **UtcTime** The time at which the reboot reminder dialog was shown (in UTC). - - -### Microsoft.Windows.Update.NotificationUx.EnhancedEngagedRebootReminderToast - -This event indicates that the Enhanced Engaged restart reminder pop-up banner was displayed. - -The following fields are available: - -- **DeviceLocalTime** The local time on the device sending the event. -- **ETag** OneSettings versioning value. -- **ExitCode** Indicates how users exited the pop-up banner. -- **RebootVersion** The version of the reboot logic. -- **UpdateId** The ID of the update that is pending restart to finish installation. -- **UpdateRevision** The revision of the update that is pending restart to finish installation. -- **UserResponseString** The option that the user chose in the pop-up banner. -- **UtcTime** The time that the pop-up banner was displayed, in Coordinated Universal Time. - - -### Microsoft.Windows.Update.NotificationUx.RebootScheduled - -Indicates when a reboot is scheduled by the system or a user for a security, quality, or feature update. - -The following fields are available: - -- **activeHoursApplicable** Indicates whether an Active Hours policy is present on the device. -- **IsEnhancedEngagedReboot** Indicates whether this is an Enhanced Engaged reboot. -- **rebootArgument** Argument for the reboot task. It also represents specific reboot related action. -- **rebootOutsideOfActiveHours** Indicates whether a restart is scheduled outside of active hours. -- **rebootScheduledByUser** Indicates whether the restart was scheduled by user (if not, it was scheduled automatically). -- **rebootState** The current state of the restart. -- **rebootUsingSmartScheduler** Indicates whether the reboot is scheduled by smart scheduler. -- **revisionNumber** Revision number of the update that is getting installed with this restart. -- **scheduledRebootTime** Time of the scheduled restart. -- **scheduledRebootTimeInUTC** Time of the scheduled restart in Coordinated Universal Time. -- **updateId** ID of the update that is getting installed with this restart. -- **wuDeviceid** Unique device ID used by Windows Update. - - -### Microsoft.Windows.Update.Orchestrator.ActivityRestrictedByActiveHoursPolicy - -This event indicates a policy is present that may restrict update activity to outside of active hours. - -The following fields are available: - -- **activeHoursEnd** The end of the active hours window. -- **activeHoursStart** The start of the active hours window. -- **wuDeviceid** Unique device ID used by Windows Update. - - -### Microsoft.Windows.Update.Orchestrator.BlockedByActiveHours - -This event indicates that update activity was blocked because it is within the active hours window. - -The following fields are available: - -- **activeHoursEnd** The end of the active hours window. -- **activeHoursStart** The start of the active hours window. -- **updatePhase** The current state of the update process. -- **wuDeviceid** Unique device ID used by Windows Update. - - -### Microsoft.Windows.Update.Orchestrator.BlockedByBatteryLevel - -This event indicates that Windows Update activity was blocked due to low battery level. - -The following fields are available: - -- **batteryLevel** The current battery charge capacity. -- **batteryLevelThreshold** The battery capacity threshold to stop update activity. -- **updatePhase** The current state of the update process. -- **wuDeviceid** Device ID. - - -### Microsoft.Windows.Update.Orchestrator.DeferRestart - -This event indicates that a restart required for installing updates was postponed. - -The following fields are available: - -- **displayNeededReason** List of reasons for needing display. -- **eventScenario** Indicates the purpose of the event (scan started, succeeded, failed, etc.). -- **filteredDeferReason** Applicable filtered reasons why reboot was postponed (such as user active, or low battery). -- **gameModeReason** Name of the executable that caused the game mode state check to start. -- **ignoredReason** List of reasons that were intentionally ignored. -- **IgnoreReasonsForRestart** List of reasons why restart was deferred. -- **revisionNumber** Update ID revision number. -- **systemNeededReason** List of reasons why system is needed. -- **updateId** Update ID. -- **updateScenarioType** Update session type. -- **wuDeviceid** Unique device ID used by Windows Update. - - -### Microsoft.Windows.Update.Orchestrator.Detection - -This event indicates that a scan for a Windows Update occurred. - -The following fields are available: - -- **deferReason** The reason why the device could not check for updates. -- **detectionBlockingPolicy** The Policy that blocked detection. -- **detectionBlockreason** The reason detection did not complete. -- **detectionRetryMode** Indicates whether we will try to scan again. -- **errorCode** The error code returned for the current process. -- **eventScenario** End-to-end update session ID, or indicates the purpose of sending this event - whether because the software distribution just started installing content, or whether it was cancelled, succeeded, or failed. -- **flightID** The unique identifier for the flight (Windows Insider pre-release build) should be delivered to the device, if applicable. -- **interactive** Indicates whether the user initiated the session. -- **networkStatus** Indicates if the device is connected to the internet. -- **revisionNumber** The Update revision number. -- **scanTriggerSource** The source of the triggered scan. -- **updateId** The unique identifier of the Update. -- **updateScenarioType** Identifies the type of update session being performed. -- **wuDeviceid** The unique device ID used by Windows Update. - - -### Microsoft.Windows.Update.Orchestrator.DisplayNeeded - -This event indicates the reboot was postponed due to needing a display. - -The following fields are available: - -- **displayNeededReason** Reason the display is needed. -- **eventScenario** Indicates the purpose of sending this event - whether because the software distribution just started checking for content, or whether it was cancelled, succeeded, or failed. -- **rebootOutsideOfActiveHours** Indicates whether the reboot was to occur outside of active hours. -- **revisionNumber** Revision number of the update. -- **updateId** Update ID. -- **updateScenarioType** The update session type. -- **uxRebootstate** Indicates the exact state of the user experience at the time the required reboot was initiated. -- **wuDeviceid** The unique identifier of a specific device, used to identify how many devices are encountering success or a particular issue - - -### Microsoft.Windows.Update.Orchestrator.Download - -This event sends launch data for a Windows Update download to help keep Windows up to date. - -The following fields are available: - -- **deferReason** Reason for download not completing. -- **e:4|SScenario** No content is currently available. -- **errorCode** An error code represented as a hexadecimal value. -- **eventScenario** End-to-end update session ID. -- **fdightID** No content is currently available. -- **flightID** The specific ID of the Windows Insider build the device is getting. -- **interactive** Indicates whether the session is user initiated. -- **interactiveelatedCVerrorCode** No content is currently available. -- **revisionNumber** Update revision number. -- **updateId** Update ID. -- **updateScenariotate** No content is currently available. -- **updateScenarioType** The update session type. -- **wuDeviceid** Unique device ID used by Windows Update. - - -### Microsoft.Windows.Update.Orchestrator.DTUCompletedWhenWuFlightPendingCommit - -This event indicates that DTU completed installation of the electronic software delivery (ESD), when Windows Update was already in Pending Commit phase of the feature update. - -The following fields are available: - -- **wuDeviceid** Device ID used by Windows Update. - - -### Microsoft.Windows.Update.Orchestrator.DTUEnabled - -This event indicates that Inbox DTU functionality was enabled. - -The following fields are available: - -- **wuDeviceid** Device ID used by Windows Update. - - -### Microsoft.Windows.Update.Orchestrator.DTUInitiated - -This event indicates that Inbox DTU functionality was intiated. - -The following fields are available: - -- **dtuErrorCode** Return code from creating the DTU Com Server. -- **isDtuApplicable** Determination of whether DTU is applicable to the machine it is running on. -- **wuDeviceid** Device ID used by Windows Update. - - -### Microsoft.Windows.Update.Orchestrator.EscalationRiskLevels - -This event is sent during update scan, download, or install, and indicates that the device is at risk of being out-of-date. - -The following fields are available: - -- **configVersion** The escalation configuration version on the device. -- **downloadElapsedTime** Indicates how long since the download is required on device. -- **downloadRiskLevel** At-risk level of download phase. -- **installElapsedTime** Indicates how long since the install is required on device. -- **installRiskLevel** The at-risk level of install phase. -- **isSediment** Assessment of whether is device is at risk. -- **scanElapsedTime** Indicates how long since the scan is required on device. -- **scanRiskLevel** At-risk level of the scan phase. -- **wuDeviceid** Device ID used by Windows Update. - - -### Microsoft.Windows.Update.Orchestrator.FailedToAddTimeTriggerToScanTask - -This event indicated that USO failed to add a trigger time to a task. - -The following fields are available: - -- **errorCode** The Windows Update error code. -- **wuDeviceid** The Windows Update device ID. - - -### Microsoft.Windows.Update.Orchestrator.FlightInapplicable - -This event indicates that the update is no longer applicable to this device. - -The following fields are available: - -- **EventPublishedTime** Time when this event was generated. -- **flightID** The specific ID of the Windows Insider build. -- **inapplicableReason** The reason why the update is inapplicable. -- **revisionNumber** Update revision number. -- **updateId** Unique Windows Update ID. -- **updateScenarioType** Update session type. -- **UpdateStatus** Last status of update. -- **UUPFallBackConfigured** Indicates whether UUP fallback is configured. -- **wuDeviceid** Unique Device ID. - - -### Microsoft.Windows.Update.Orchestrator.InitiatingReboot - -This event sends data about an Orchestrator requesting a reboot from power management to help keep Windows up to date. - -The following fields are available: - -- **EventPublishedTime** Time of the event. -- **flightID** Unique update ID -- **interactive** Indicates whether the reboot initiation stage of the update process was entered as a result of user action. -- **rebootOutsideOfActiveHours** Indicates whether the reboot was to occur outside of active hours. -- **revisionNumber** Revision number of the update. -- **updateId** Update ID. -- **updateScenarioType** The update session type. -- **uxRebootstate** Indicates the exact state of the user experience at the time the required reboot was initiated. -- **wuDeviceid** Unique device ID used by Windows Update. - - -### Microsoft.Windows.Update.Orchestrator.Install - -This event sends launch data for a Windows Update install to help keep Windows up to date. - -The following fields are available: - -- **batteryLevel** Current battery capacity in mWh or percentage left. -- **defeec-9-0S** No content is currently available. -- **deferReason** Reason for install not completing. -- **errorCode** The error code reppresented by a hexadecimal value. -- **eventScenario** End-to-end update session ID. -- **flightID** The ID of the Windows Insider build the device is getting. -- **flightUpdate** Indicates whether the update is a Windows Insider build. -- **ForcedRebootReminderSet** A boolean value that indicates if a forced reboot will happen for updates. -- **Ignorec-9-0SsFoec-start** No content is currently available. -- **IgnoreReasonsForRestart** The reason(s) a Postpone Restart command was ignored. -- **installCommitfailedtime** The time it took for a reboot to happen but the upgrade failed to progress. -- **installRebootinitiatetime** The time it took for a reboot to be attempted. -- **interactive** Identifies if session is user initiated. -- **minutesToCommit** The time it took to install updates. -- **rebootOutsideOfActiveHours** Indicates whether a reboot is scheduled outside of active hours. -- **revisionNumber** Update revision number. -- **updateId** Update ID. -- **updateMd** No content is currently available. -- **updateScenarioType** The update session type. -- **uxRebootstate** Indicates the exact state of the user experience at the time the required reboot was initiated to ensure the correct update process and experience is provided to keep Windows up to date. -- **wuDeviceid** Unique device ID used by Windows Update. - - -### Microsoft.Windows.Update.Orchestrator.LowUptimes - -This event is sent if a device is identified as not having sufficient uptime to reliably process updates in order to keep secure. - -The following fields are available: - -- **availableHistoryMinutes** The number of minutes available from the local machine activity history. -- **isLowUptimeMachine** Is the machine considered low uptime or not. -- **lowUptimeMinHours** Current setting for the minimum number of hours needed to not be considered low uptime. -- **lowUptimeQueryDays** Current setting for the number of recent days to check for uptime. -- **uptimeMinutes** Number of minutes of uptime measured. -- **wuDeviceid** Unique device ID for Windows Update. - - -### Microsoft.Windows.Update.Orchestrator.OneshotUpdateDetection - -This event returns data about scans initiated through settings UI, or background scans that are urgent; to help keep Windows up to date. - -The following fields are available: - -- **externalOneshotupdate** The last time a task-triggered scan was completed. -- **interactiveOneshotupdate** The last time an interactive scan was completed. -- **oldlastscanOneshotupdate** The last time a scan completed successfully. -- **wuDeviceid** The Windows Update Device GUID (Globally-Unique ID). - - -### Microsoft.Windows.Update.Orchestrator.PreShutdownStart - -This event is generated before the shutdown and commit operations. - -The following fields are available: - -- **wuDeviceid** The unique identifier of a specific device, used to identify how many devices are encountering success or a particular issue. - - -### Microsoft.Windows.Update.Orchestrator.RebootFailed - -This event sends information about whether an update required a reboot and reasons for failure, to help keep Windows up to date. - -The following fields are available: - -- **batteryLevel** Current battery capacity in mWh or percentage left. -- **deferReason** Reason for install not completing. -- **EventPublishedTime** The time that the reboot failure occurred. -- **flightID** Unique update ID. -- **rebootOutsideOfActiveHours** Indicates whether a reboot was scheduled outside of active hours. -- **RebootResults** Hex code indicating failure reason. Typically, we expect this to be a specific USO generated hex code. -- **revisionNumber** Update revision number. -- **updateId** Update ID. -- **updateScenarioType** The update session type. -- **uxRebootstate** Indicates the exact state of the user experience at the time the required reboot was initiated to ensure the correct update process and experience is provided to keep Windows up to date. -- **wuDeviceid** Unique device ID used by Windows Update. - - -### Microsoft.Windows.Update.Orchestrator.RefreshSettings - -This event sends basic data about the version of upgrade settings applied to the system to help keep Windows up to date. - -The following fields are available: - -- **errorCode** Hex code for the error message, to allow lookup of the specific error. -- **settingsDownloadTime** Timestamp of the last attempt to acquire settings. -- **settingsETag** Version identifier for the settings. -- **wuDeviceid** Unique device ID used by Windows Update. - - -### Microsoft.Windows.Update.Orchestrator.RestoreRebootTask - -This event sends data indicating that a reboot task is missing unexpectedly on a device and the task is restored because a reboot is still required, to help keep Windows up to date. - -The following fields are available: - -- **RebootTaskMissedTimeUTC** The time when the reboot task was scheduled to run, but did not. -- **RebootTaskNextTimeUTC** The time when the reboot task was rescheduled for. -- **RebootTaskRestoredTime** Time at which this reboot task was restored. -- **wuDeviceid** Device ID for the device on which the reboot is restored. - - -### Microsoft.Windows.Update.Orchestrator.ScanTriggered - -This event indicates that Update Orchestrator has started a scan operation. - -The following fields are available: - -- **errorCode** The error code returned for the current scan operation. -- **eventScenario** Indicates the purpose of sending this event. -- **interactive** Indicates whether the scan is interactive. -- **isDTUEnabled** Indicates whether DTU (internal abbreviation for Direct Feature Update) channel is enabled on the client system. -- **isScanPastSla** Indicates whether the SLA has elapsed for scanning. -- **isScanPastTriggerSla** Indicates whether the SLA has elapsed for triggering a scan. -- **minutesOverScanSla** Indicates how many minutes the scan exceeded the scan SLA. -- **minutesOverScanTriggerSla** Indicates how many minutes the scan exceeded the scan trigger SLA. -- **scanTriggerSource** Indicates what caused the scan. -- **updateScenarioType** The update session type. -- **wuDeviceid** Unique device ID used by Windows Update. - - -### Microsoft.Windows.Update.Orchestrator.StickUpdate - -This event is sent when the update service orchestrator (USO) indicates the update cannot be superseded by a newer update. - -The following fields are available: - -- **updateAd** No content is currently available. -- **updateId** Identifier associated with the specific piece of content. -- **wuDeviceid** Unique device ID controlled by the software distribution client. - - -### Microsoft.Windows.Update.Orchestrator.SystemNeeded - -This event sends data about why a device is unable to reboot, to help keep Windows up to date. - -The following fields are available: - -- **eventScenario** End-to-end update session ID. -- **rebootOutsideOfActiveHours** Indicates whether a reboot is scheduled outside of active hours. -- **revisionNumber** Update revision number. -- **systemNeededReason** List of apps or tasks that are preventing the system from restarting. -- **updateId** Update ID. -- **updateScenarioType** The update session type. -- **uxRebootstate** Indicates the exact state of the user experience at the time the required reboot was initiated to ensure the correct update process and experience is provided to keep Windows up to date. -- **wuDeviceid** Unique device ID used by Windows Update. - - -### Microsoft.Windows.Update.Orchestrator.TerminatedByActiveHours - -This event indicates that update activity was stopped due to active hours starting. - -The following fields are available: - -- **activeHoursEnd** The end of the active hours window. -- **activeHoursStart** The start of the active hours window. -- **updatePhase** The current state of the update process. -- **wuDeviceid** The device identifier. - - -### Microsoft.Windows.Update.Orchestrator.TerminatedByBatteryLevel - -This event is sent when update activity was stopped due to a low battery level. - -The following fields are available: - -- **batteryLevel** The current battery charge capacity. -- **batteryLevelThreshold** The battery capacity threshold to stop update activity. -- **updatePhase** The current state of the update process. -- **wuDeviceid** The device identifier. - - -### Microsoft.Windows.Update.Orchestrator.UnstickUpdate - -This event is sent when the update service orchestrator (USO) indicates that the update can be superseded by a newer update. - -The following fields are available: - -- **updateId** Identifier associated with the specific piece of content. -- **wuDeviceid** Unique device ID controlled by the software distribution client. - - -### Microsoft.Windows.Update.Orchestrator.UpdatePolicyCacheRefresh - -This event sends data on whether Update Management Policies were enabled on a device, to help keep Windows up to date. - -The following fields are available: - -- **configuredPoliciescount** Number of policies on the device. -- **policiesNamevaluesource** Policy name and source of policy (group policy, MDM or flight). -- **policyCacherefreshtime** Time when policy cache was refreshed. -- **updateInstalluxsetting** Indicates whether a user has set policies via a user experience option. -- **wuDeviceid** Unique device ID used by Windows Update. - - -### Microsoft.Windows.Update.Orchestrator.UpdateRebootRequired - -This event sends data about whether an update required a reboot to help keep Windows up to date. - -The following fields are available: - -- **flightID** The specific ID of the Windows Insider build the device is getting. -- **interactive** Indicates whether the reboot initiation stage of the update process was entered as a result of user action. -- **revisionNumber** Update revision number. -- **updateId** Update ID. -- **updateScenarioType** The update session type. -- **uxRebootstate** Indicates the exact state of the user experience at the time the required reboot was initiated to ensure the correct update process and experience is provided to keep Windows up to date. -- **wuDeviceid** Unique device ID used by Windows Update. - - -### Microsoft.Windows.Update.Orchestrator.updateSettingsFlushFailed - -This event sends information about an update that encountered problems and was not able to complete. - -The following fields are available: - -- **errorCode** The error code encountered. -- **wuDeviceid** The ID of the device in which the error occurred. - - -### Microsoft.Windows.Update.Orchestrator.UsoSession - -This event represents the state of the USO service at start and completion. - -The following fields are available: - -- **activeSessionid** A unique session GUID. -- **eventScenario** The state of the update action. -- **interactive** Is the USO session interactive? -- **lastErrorcode** The last error that was encountered. -- **lastErrorstate** The state of the update when the last error was encountered. -- **sessionType** A GUID that refers to the update session type. -- **updateScenarioType** A descriptive update session type. -- **wuDeviceid** The Windows Update device GUID. - - -### Microsoft.Windows.Update.Ux.MusNotification.EnhancedEngagedRebootUxState - -This event sends information about the configuration of Enhanced Direct-to-Engaged (eDTE), which includes values for the timing of how eDTE will progress through each phase of the reboot. - -The following fields are available: - -- **AcceptAutoModeLimit** The maximum number of days for a device to automatically enter Auto Reboot mode. -- **AutoToAutoFailedLimit** The maximum number of days for Auto Reboot mode to fail before a Reboot Failed dialog will be shown. -- **DeviceLocalTime** The date and time (based on the device date/time settings) the reboot mode changed. -- **EngagedModeLimit** The number of days to switch between DTE (Direct-to-Engaged) dialogs. -- **EnterAutoModeLimit** The maximum number of days a device can enter Auto Reboot mode. -- **ETag** The Entity Tag that represents the OneSettings version. -- **IsForcedEnabled** Identifies whether Forced Reboot mode is enabled for the device. -- **IsUltimateForcedEnabled** Identifies whether Ultimate Forced Reboot mode is enabled for the device. -- **OldestUpdateLocalTime** The date and time (based on the device date/time settings) this update’s reboot began pending. -- **RebootUxState** Identifies the reboot state: Engaged, Auto, Forced, UltimateForced. -- **RebootVersion** The version of the DTE (Direct-to-Engaged). -- **SkipToAutoModeLimit** The maximum number of days to switch to start while in Auto Reboot mode. -- **UpdateId** The ID of the update that is waiting for reboot to finish installation. -- **UpdateRevision** The revision of the update that is waiting for reboot to finish installation. - - -### Microsoft.Windows.Update.Ux.MusNotification.RebootNoLongerNeeded - -This event is sent when a security update has successfully completed. - -The following fields are available: - -- **UtcTime** The Coordinated Universal Time that the restart was no longer needed. - - -### Microsoft.Windows.Update.Ux.MusNotification.RebootScheduled - -This event sends basic information about scheduling an update-related reboot, to get security updates and to help keep Windows up-to-date. - -The following fields are available: - -- **activeHoursApplicable** Indicates whether Active Hours applies on this device. -- **IsEnhancedEngagedReboot** Indicates whether Enhanced reboot was enabled. -- **rebootArgument** Argument for the reboot task. It also represents specific reboot related action. -- **rebootOutsideOfActiveHours** True, if a reboot is scheduled outside of active hours. False, otherwise. -- **rebootScheduledByUser** True, if a reboot is scheduled by user. False, if a reboot is scheduled automatically. -- **rebootState** Current state of the reboot. -- **rebootUsingSmartScheduler** Indicates that the reboot is scheduled by SmartScheduler. -- **revisionNumber** Revision number of the OS. -- **scheduledRebootTime** Time scheduled for the reboot. -- **scheduledRebootTimeInUTC** Time scheduled for the reboot, in UTC. -- **updateId** Identifies which update is being scheduled. -- **wuDeviceid** The unique device ID used by Windows Update. - - -### Microsoft.Windows.Update.Ux.MusNotification.UxBrokerScheduledTask - -This event is sent when MUSE broker schedules a task. - -The following fields are available: - -- **TaskArgument** The arguments with which the task is scheduled. -- **TaskName** Name of the task. - - -### Microsoft.Windows.Update.Ux.MusUpdateSettings.RebootScheduled - -This event sends basic information for scheduling a device restart to install security updates. It's used to help keep Windows up to date. - -The following fields are available: - -- **activeHoursApplicable** Is the restart respecting Active Hours? -- **IsEnhancedEngagedReboot** TRUE if the reboot path is Enhanced Engaged. Otherwise, FALSE. -- **rebootArgument** The arguments that are passed to the OS for the restarted. -- **rebootOutsideOfActiveHours** Was the restart scheduled outside of Active Hours? -- **rebootScheduledByUser** Was the restart scheduled by the user? If the value is false, the restart was scheduled by the device. -- **rebootState** The state of the restart. -- **rebootUsingSmartScheduler** TRUE if the reboot should be performed by the Smart Scheduler. Otherwise, FALSE. -- **revisionNumber** The revision number of the OS being updated. -- **scheduledRebootTime** Time of the scheduled reboot -- **scheduledRebootTimeInUTC** Time of the scheduled restart, in Coordinated Universal Time. -- **updateId** The Windows Update device GUID. -- **wuDeviceid** The Windows Update device GUID. - - -## Windows Update mitigation events - -### Mitigation360Telemetry.MitigationCustom.CleanupSafeOsImages - -This event sends data specific to the CleanupSafeOsImages mitigation used for OS Updates. - -The following fields are available: - -- **ClientId** The client ID used by Windows Update. -- **FlightId** The ID of each Windows Insider build the device received. -- **InstanceId** A unique device ID that identifies each update instance. -- **MitigationScenario** The update scenario in which the mitigation was executed. -- **MountedImageCount** The number of mounted images. -- **MountedImageMatches** The number of mounted image matches. -- **MountedImagesFailed** The number of mounted images that could not be removed. -- **MountedImagesRemoved** The number of mounted images that were successfully removed. -- **MountedImagesSkipped** The number of mounted images that were not found. -- **RelatedCV** The correlation vector value generated from the latest USO scan. -- **Result** HResult of this operation. -- **ScenarioId** ID indicating the mitigation scenario. -- **ScenarioSupported** Indicates whether the scenario was supported. -- **SessionId** Unique value for each update attempt. -- **UpdateId** Unique ID for each Windows Update. -- **WuId** Unique ID for the Windows Update client. - - -### Mitigation360Telemetry.MitigationCustom.FixAppXReparsePoints - -This event sends data specific to the FixAppXReparsePoints mitigation used for OS updates. - -The following fields are available: - -- **ClientId** Unique identifier for each flight. -- **FlightId** Unique GUID that identifies each instances of setuphost.exe. -- **InstanceId** The update scenario in which the mitigation was executed. -- **MitigationScenario** Correlation vector value generated from the latest USO scan. -- **RelatedCV** Number of reparse points that are corrupted but we failed to fix them. -- **ReparsePointsFailed** Number of reparse points that were corrupted and were fixed by this mitigation. -- **ReparsePointsFixed** Number of reparse points that are not corrupted and no action is required. -- **ReparsePointsSkipped** HResult of this operation. -- **Result** ID indicating the mitigation scenario. -- **ScenarioId** Indicates whether the scenario was supported. -- **ScenarioSupported** Unique value for each update attempt. -- **SessionId** Unique ID for each Update. -- **UpdateId** Unique ID for the Windows Update client. -- **WuId** Unique ID for the Windows Update client. - - -### Mitigation360Telemetry.MitigationCustom.FixupEditionId - -This event sends data specific to the FixupEditionId mitigation used for OS updates. - -The following fields are available: - -- **ClientId** In the WU scenario, this will be the WU client ID that is passed to Setup. In Media setup, default value is Media360, but can be overwritten by the caller to a unique value. -- **EditionIdUpdated** Determine whether EditionId was changed. -- **FlightId** Unique identifier for each flight. -- **InstanceId** Unique GUID that identifies each instances of setuphost.exe. -- **MitigationScenario** The update scenario in which the mitigation was executed. -- **ProductEditionId** Expected EditionId value based on GetProductInfo. -- **ProductType** Value returned by GetProductInfo. -- **RegistryEditionId** EditionId value in the registry. -- **RelatedCV** Correlation vector value generated from the latest USO scan. -- **Result** HResult of this operation. -- **ScenarioId** ID indicating the mitigation scenario. -- **ScenarioSupported** Indicates whether the scenario was supported. -- **SessionId** Unique value for each update attempt. -- **UpdateId** Unique ID for each update. -- **WuId** Unique ID for the Windows Update client. - - -## Windows Update Reserve Manager events - -### Microsoft.Windows.UpdateReserveManager.CommitPendingHardReserveAdjustment - -This event is sent when the Update Reserve Manager commits a hard reserve adjustment that was pending. - -The following fields are available: - -- **FinalAdjustment** Final adjustment for the hard reserve following the addition or removal of optional content. -- **InitialAdjustment** Initial intended adjustment for the hard reserve following the addition/removal of optional content. - - -### Microsoft.Windows.UpdateReserveManager.FunctionReturnedError - -This event is sent when the Update Reserve Manager returns an error from one of its internal functions. - -The following fields are available: - -- **FailedExpression** The failed expression that was returned. -- **FailedFile** The binary file that contained the failed function. -- **FailedFunction** The name of the function that originated the failure. -- **FailedLine** The line number of the failure. -- **ReturnCode** The return code of the function. - - -### Microsoft.Windows.UpdateReserveManager.InitializeUpdateReserveManager - -This event returns data about the Update Reserve Manager, including whether it’s been initialized. - -The following fields are available: - -- **ClientId** The ID of the caller application. -- **Flags** The enumerated flags used to initialize the manager. -- **FlightId** The flight ID of the content the calling client is currently operating with. -- **Offline** Indicates whether or the reserve manager is called during offline operations. -- **PolicyPassed** Indicates whether the machine is able to use reserves. -- **ReturnCode** Return code of the operation. -- **Version** The version of the Update Reserve Manager. - - -### Microsoft.Windows.UpdateReserveManager.PrepareTIForReserveInitialization - -This event is sent when the Update Reserve Manager prepares the Trusted Installer to initialize reserves on the next boot. - -The following fields are available: - -- **Flags** The flags that are passed to the function to prepare the Trusted Installer for reserve initialization. - - -### Microsoft.Windows.UpdateReserveManager.RemovePendingHardReserveAdjustment - -This event is sent when the Update Reserve Manager removes a pending hard reserve adjustment. - - - -### Microsoft.Windows.UpdateReserveManager.UpdatePendingHardReserveAdjustment - -This event is sent when the Update Reserve Manager needs to adjust the size of the hard reserve after the option content is installed. - -The following fields are available: - -- **ChangeSize** The change in the hard reserve size based on the addition or removal of optional content. -- **Disposition** The parameter for the hard reserve adjustment function. -- **Flags** The flags passed to the hard reserve adjustment function. -- **PendingHardReserveAdjustment** The final change to the hard reserve size. -- **UpdateType** Indicates whether the change is an increase or decrease in the size of the hard reserve. - - -## Winlogon events - -### Microsoft.Windows.Security.Winlogon.SetupCompleteLogon - -This event signals the completion of the setup process. It happens only once during the first logon. - - - -## XBOX events - -### Microsoft.Xbox.XamTelemetry.AppActivationError - -This event indicates whether the system detected an activation error in the app. - -The following fields are available: - -- **ActivationUri** Activation URI (Uniform Resource Identifier) used in the attempt to activate the app. -- **AppId** The Xbox LIVE Title ID. -- **AppUserModelId** The AUMID (Application User Model ID) of the app to activate. -- **Result** The HResult error. -- **UserId** The Xbox LIVE User ID (XUID). - - -### Microsoft.Xbox.XamTelemetry.AppActivity - -This event is triggered whenever the current app state is changed by: launch, switch, terminate, snap, etc. - -The following fields are available: - -- **AppActionId** The ID of the application action. -- **AppCurrentVisibilityState** The ID of the current application visibility state. -- **AppId** The Xbox LIVE Title ID of the app. -- **AppPackageFullName** The full name of the application package. -- **AppPreviousVisibilityState** The ID of the previous application visibility state. -- **AppSessionId** The application session ID. -- **AppType** The type ID of the application (AppType_NotKnown, AppType_Era, AppType_Sra, AppType_Uwa). -- **BCACode** The BCA (Burst Cutting Area) mark code of the optical disc used to launch the application. -- **DurationMs** The amount of time (in milliseconds) since the last application state transition. -- **IsTrialLicense** This boolean value is TRUE if the application is on a trial license. -- **LicenseType** The type of licensed used to authorize the app (0 - Unknown, 1 - User, 2 - Subscription, 3 - Offline, 4 - Disc). -- **LicenseXuid** If the license type is 1 (User), this field contains the XUID (Xbox User ID) of the registered owner of the license. -- **ProductGuid** The Xbox product GUID (Globally-Unique ID) of the application. -- **UserId** The XUID (Xbox User ID) of the current user. - - - +--- +description: Use this article to learn more about what Windows diagnostic data is gathered at the basic level. +title: Windows 10, version 1809 basic diagnostic events and fields (Windows 10) +keywords: privacy, telemetry +ms.prod: w10 +ms.mktglfcycl: manage +ms.sitesec: library +ms.pagetype: security +localizationpriority: high +author: brianlic-msft +ms.author: brianlic +manager: dansimp +ms.collection: M365-security-compliance +ms.topic: article +audience: ITPro +ms.date: 03/26/2019 +--- + + +# Windows 10, version 1809 basic level Windows diagnostic events and fields + + **Applies to** + +- Windows 10, version 1809 + + +The Basic level gathers a limited set of information that is critical for understanding the device and its configuration including: basic device information, quality-related information, app compatibility, and Microsoft Store. When the level is set to Basic, it also includes the Security level information. + +The Basic level helps to identify problems that can occur on a particular device hardware or software configuration. For example, it can help determine if crashes are more frequent on devices with a specific amount of memory or that are running a particular driver version. This helps Microsoft fix operating system or app problems. + +Use this article to learn about diagnostic events, grouped by event area, and the fields within each event. A brief description is provided for each field. Every event generated includes common data, which collects device data. + +You can learn more about Windows functional and diagnostic data through these articles: + + +- [Windows 10, version 1803 basic diagnostic events and fields](basic-level-windows-diagnostic-events-and-fields-1803.md) +- [Windows 10, version 1709 basic diagnostic events and fields](basic-level-windows-diagnostic-events-and-fields-1709.md) +- [Windows 10, version 1703 basic diagnostic events and fields](basic-level-windows-diagnostic-events-and-fields-1703.md) +- [Manage connections from Windows operating system components to Microsoft services](manage-connections-from-windows-operating-system-components-to-microsoft-services.md) +- [Configure Windows diagnostic data in your organization](configure-windows-diagnostic-data-in-your-organization.md) + + + + +## Account trace logging provider events + +### Microsoft.Windows.Mitigation.AccountTraceLoggingProvider.General + +This event provides information about application properties to indicate the successful execution. + +The following fields are available: + +- **AppMode** Indicates the mode the app is being currently run around privileges. +- **ExitCode** Indicates the exit code of the app. +- **Help** Indicates if the app needs to be launched in the help mode. +- **ParseError** Indicates if there was a parse error during the execution. +- **RightsAcquired** Indicates if the right privileges were acquired for successful execution. +- **RightsWereEnabled** Indicates if the right privileges were enabled for successful execution. +- **TestMode** Indicates whether the app is being run in test mode. + + +### Microsoft.Windows.Mitigation.AccountTraceLoggingProvider.GetCount + +This event provides information about the properties of user accounts in the Administrator group. + +The following fields are available: + +- **Internal** Indicates the internal property associated with the count group. +- **LastError** The error code (if applicable) for the cause of the failure to get the count of the user account. +- **Result** The HResult error. + + +## AppLocker events + +### Microsoft.Windows.Security.AppLockerCSP.ActivityStoppedAutomatically + +Automatically closed activity for start/stop operations that aren't explicitly closed. + + + +### Microsoft.Windows.Security.AppLockerCSP.AddParams + +Parameters passed to Add function of the AppLockerCSP Node. + +The following fields are available: + +- **child** The child URI of the node to add. +- **uri** URI of the node relative to %SYSTEM32%/AppLocker. + + +### Microsoft.Windows.Security.AppLockerCSP.AddStart + +Start of "Add" Operation for the AppLockerCSP Node. + + + +### Microsoft.Windows.Security.AppLockerCSP.AddStop + +End of "Add" Operation for AppLockerCSP Node. + +The following fields are available: + +- **hr** The HRESULT returned by Add function in AppLockerCSP. + + +### Microsoft.Windows.Security.AppLockerCSP.CAppLockerCSP::Rollback + +Result of the 'Rollback' operation in AppLockerCSP. + +The following fields are available: + +- **oldId** Previous id for the CSP transaction. +- **txId** Current id for the CSP transaction. + + +### Microsoft.Windows.Security.AppLockerCSP.ClearParams + +Parameters passed to the "Clear" operation for AppLockerCSP. + +The following fields are available: + +- **uri** The URI relative to the %SYSTEM32%\AppLocker folder. + + +### Microsoft.Windows.Security.AppLockerCSP.ClearStart + +Start of the "Clear" operation for the AppLockerCSP Node. + + + +### Microsoft.Windows.Security.AppLockerCSP.ClearStop + +End of the "Clear" operation for the AppLockerCSP node. + +The following fields are available: + +- **hr** HRESULT reported at the end of the 'Clear' function. + + +### Microsoft.Windows.Security.AppLockerCSP.ConfigManagerNotificationStart + +Start of the "ConfigManagerNotification" operation for AppLockerCSP. + +The following fields are available: + +- **NotifyState** State sent by ConfigManager to AppLockerCSP. + + +### Microsoft.Windows.Security.AppLockerCSP.ConfigManagerNotificationStop + +End of the "ConfigManagerNotification" operation for AppLockerCSP. + +The following fields are available: + +- **hr** HRESULT returned by the ConfigManagerNotification function in AppLockerCSP. + + +### Microsoft.Windows.Security.AppLockerCSP.CreateNodeInstanceParams + +Parameters passed to the CreateNodeInstance function of the AppLockerCSP node. + +The following fields are available: + +- **NodeId** NodeId passed to CreateNodeInstance. +- **nodeOps** NodeOperations parameter passed to CreateNodeInstance. +- **uri** URI passed to CreateNodeInstance, relative to %SYSTEM32%\AppLocker. + + +### Microsoft.Windows.Security.AppLockerCSP.CreateNodeInstanceStart + +Start of the "CreateNodeInstance" operation for the AppLockerCSP node. + + + +### Microsoft.Windows.Security.AppLockerCSP.CreateNodeInstanceStop + +End of the "CreateNodeInstance" operation for the AppLockerCSP node + +The following fields are available: + +- **hr** HRESULT returned by the CreateNodeInstance function in AppLockerCSP. + + +### Microsoft.Windows.Security.AppLockerCSP.DeleteChildParams + +Parameters passed to the DeleteChild function of the AppLockerCSP node. + +The following fields are available: + +- **child** The child URI of the node to delete. +- **uri** URI relative to %SYSTEM32%\AppLocker. + + +### Microsoft.Windows.Security.AppLockerCSP.DeleteChildStart + +Start of the "DeleteChild" operation for the AppLockerCSP node. + + + +### Microsoft.Windows.Security.AppLockerCSP.DeleteChildStop + +End of the "DeleteChild" operation for the AppLockerCSP node. + +The following fields are available: + +- **hr** HRESULT returned by the DeleteChild function in AppLockerCSP. + + +### Microsoft.Windows.Security.AppLockerCSP.EnumPolicies + +Logged URI relative to %SYSTEM32%\AppLocker, if the Plugin GUID is null, or the CSP doesn't believe the old policy is present. + +The following fields are available: + +- **uri** URI relative to %SYSTEM32%\AppLocker. + + +### Microsoft.Windows.Security.AppLockerCSP.GetChildNodeNamesParams + +Parameters passed to the GetChildNodeNames function of the AppLockerCSP node. + +The following fields are available: + +- **uri** URI relative to %SYSTEM32%/AppLocker for MDM node. + + +### Microsoft.Windows.Security.AppLockerCSP.GetChildNodeNamesStart + +Start of the "GetChildNodeNames" operation for the AppLockerCSP node. + + + +### Microsoft.Windows.Security.AppLockerCSP.GetChildNodeNamesStop + +End of the "GetChildNodeNames" operation for the AppLockerCSP node. + +The following fields are available: + +- **child[0]** If function succeeded, the first child's name, else "NA". +- **count** If function succeeded, the number of child node names returned by the function, else 0. +- **hr** HRESULT returned by the GetChildNodeNames function of AppLockerCSP. + + +### Microsoft.Windows.Security.AppLockerCSP.GetLatestId + +The result of 'GetLatestId' in AppLockerCSP (the latest time stamped GUID). + +The following fields are available: + +- **dirId** The latest directory identifier found by GetLatestId. +- **id** The id returned by GetLatestId if id > 0 - otherwise the dirId parameter. + + +### Microsoft.Windows.Security.AppLockerCSP.HResultException + +HRESULT thrown by any arbitrary function in AppLockerCSP. + +The following fields are available: + +- **file** File in the OS code base in which the exception occurs. +- **function** Function in the OS code base in which the exception occurs. +- **hr** HRESULT that is reported. +- **line** Line in the file in the OS code base in which the exception occurs. + + +### Microsoft.Windows.Security.AppLockerCSP.SetValueParams + +Parameters passed to the SetValue function of the AppLockerCSP node. + +The following fields are available: + +- **dataLength** Length of the value to set. +- **uri** The node URI to that should contain the value, relative to %SYSTEM32%\AppLocker. + + +### Microsoft.Windows.Security.AppLockerCSP.SetValueStart + +Start of the "SetValue" operation for the AppLockerCSP node. + + + +### Microsoft.Windows.Security.AppLockerCSP.SetValueStop + +End of the "SetValue" operation for the AppLockerCSP node. + +The following fields are available: + +- **hr** HRESULT returned by the SetValue function in AppLockerCSP. + + +### Microsoft.Windows.Security.AppLockerCSP.TryRemediateMissingPolicies + +EntryPoint of fix step or policy remediation, includes URI relative to %SYSTEM32%\AppLocker that needs to be fixed. + +The following fields are available: + +- **uri** URI for node relative to %SYSTEM32%/AppLocker. + + +## Appraiser events + +### Microsoft.Windows.Appraiser.General.ChecksumTotalPictureCount + +This event lists the types of objects and how many of each exist on the client device. This allows for a quick way to ensure that the records present on the server match what is present on the client. + +The following fields are available: + +- **DatasourceApplicationFile_19ASetup** The count of the number of this particular object type present on this device. +- **DatasourceApplicationFile_19H1** The count of the number of this particular object type present on this device. +- **DatasourceApplicationFile_19H1Setup** The count of the number of this particular object type present on this device. +- **DatasourceApplicationFile_RS1** An ID for the system, calculated by hashing hardware identifiers. +- **DatasourceApplicationFile_RS2** An ID for the system, calculated by hashing hardware identifiers. +- **DatasourceApplicationFile_RS3** The count of the number of this particular object type present on this device. +- **DatasourceApplicationFile_RS3Setup** The count of the number of this particular object type present on this device. +- **DatasourceApplicationFile_RS4** The count of the number of this particular object type present on this device. +- **DatasourceApplicationFile_RS4Setup** The count of the number of this particular object type present on this device. +- **DatasourceApplicationFile_RS5** The count of the number of this particular object type present on this device. +- **DatasourceApplicationFile_RS5Setup** The count of the number of this particular object type present on this device. +- **DatasourceApplicationFile_TH1** The count of the number of this particular object type present on this device. +- **DatasourceApplicationFile_TH2** The count of the number of this particular object type present on this device. +- **DatasourceDevicePnp_19ASetup** The count of the number of this particular object type present on this device. +- **DatasourceDevicePnp_19H1** The count of the number of this particular object type present on this device. +- **DatasourceDevicePnp_19H1Setup** The count of the number of this particular object type present on this device. +- **DatasourceDevicePnp_RS1** The total DataSourceDevicePnp objects targeting Windows 10 version 1607 on this device. +- **DatasourceDevicePnp_RS2** The count of the number of this particular object type present on this device. +- **DatasourceDevicePnp_RS3** The count of the number of this particular object type present on this device. +- **DatasourceDevicePnp_RS3Setup** The count of the number of this particular object type present on this device. +- **DatasourceDevicePnp_RS4** The count of the number of this particular object type present on this device. +- **DatasourceDevicePnp_RS4Setup** The count of the number of this particular object type present on this device. +- **DatasourceDevicePnp_RS5** The count of the number of this particular object type present on this device. +- **DatasourceDevicePnp_RS5Setup** The count of the number of this particular object type present on this device. +- **DatasourceDevicePnp_TH1** The count of the number of this particular object type present on this device. +- **DatasourceDevicePnp_TH2** The count of the number of this particular object type present on this device. +- **DatasourceDriverPackage_19ASetup** The count of the number of this particular object type present on this device. +- **DatasourceDriverPackage_19H1** The count of the number of this particular object type present on this device. +- **DatasourceDriverPackage_19H1Setup** The count of the number of this particular object type present on this device. +- **DatasourceDriverPackage_RS1** The total DataSourceDriverPackage objects targeting Windows 10 version 1607 on this device. +- **DatasourceDriverPackage_RS2** The total DataSourceDriverPackage objects targeting Windows 10, version 1703 on this device. +- **DatasourceDriverPackage_RS3** The count of the number of this particular object type present on this device. +- **DatasourceDriverPackage_RS3Setup** The count of the number of this particular object type present on this device. +- **DatasourceDriverPackage_RS4** The count of the number of this particular object type present on this device. +- **DatasourceDriverPackage_RS4Setup** The count of the number of this particular object type present on this device. +- **DatasourceDriverPackage_RS5** The count of the number of this particular object type present on this device. +- **DatasourceDriverPackage_RS5Setup** The count of the number of this particular object type present on this device. +- **DatasourceDriverPackage_TH1** The count of the number of this particular object type present on this device. +- **DatasourceDriverPackage_TH2** The count of the number of this particular object type present on this device. +- **DataSourceMatchingInfoBlock_19ASetup** The count of the number of this particular object type present on this device. +- **DataSourceMatchingInfoBlock_19H1** The count of the number of this particular object type present on this device. +- **DataSourceMatchingInfoBlock_19H1Setup** The count of the number of this particular object type present on this device. +- **DataSourceMatchingInfoBlock_RS1** The total DataSourceMatchingInfoBlock objects targeting Windows 10 version 1607 on this device. +- **DataSourceMatchingInfoBlock_RS2** The count of the number of this particular object type present on this device. +- **DataSourceMatchingInfoBlock_RS3** The count of the number of this particular object type present on this device. +- **DataSourceMatchingInfoBlock_RS3Setup** The count of the number of this particular object type present on this device. +- **DataSourceMatchingInfoBlock_RS4** The count of the number of this particular object type present on this device. +- **DataSourceMatchingInfoBlock_RS4Setup** The count of the number of this particular object type present on this device. +- **DataSourceMatchingInfoBlock_RS5** The count of the number of this particular object type present on this device. +- **DataSourceMatchingInfoBlock_RS5Setup** The count of the number of this particular object type present on this device. +- **DataSourceMatchingInfoBlock_TH1** The count of the number of this particular object type present on this device. +- **DataSourceMatchingInfoBlock_TH2** The count of the number of this particular object type present on this device. +- **DataSourceMatchingInfoPassive_19ASetup** The count of the number of this particular object type present on this device. +- **DataSourceMatchingInfoPassive_19H1** The count of the number of this particular object type present on this device. +- **DataSourceMatchingInfoPassive_19H1Setup** The count of the number of this particular object type present on this device. +- **DataSourceMatchingInfoPassive_RS1** The total DataSourceMatchingInfoPassive objects targeting Windows 10 version 1607 on this device. +- **DataSourceMatchingInfoPassive_RS2** The count of the number of this particular object type present on this device. +- **DataSourceMatchingInfoPassive_RS3** The count of the number of this particular object type present on this device. +- **DataSourceMatchingInfoPassive_RS3Setup** The count of the number of this particular object type present on this device. +- **DataSourceMatchingInfoPassive_RS4** The count of the number of this particular object type present on this device. +- **DataSourceMatchingInfoPassive_RS4Setup** The count of the number of this particular object type present on this device. +- **DataSourceMatchingInfoPassive_RS5** The count of the number of this particular object type present on this device. +- **DataSourceMatchingInfoPassive_RS5Setup** The count of the number of this particular object type present on this device. +- **DataSourceMatchingInfoPassive_TH1** The count of the number of this particular object type present on this device. +- **DataSourceMatchingInfoPassive_TH2** The count of the number of this particular object type present on this device. +- **DataSourceMatchingInfoPostUpgrade_19ASetup** The count of the number of this particular object type present on this device. +- **DataSourceMatchingInfoPostUpgrade_19H1** The count of the number of this particular object type present on this device. +- **DataSourceMatchingInfoPostUpgrade_19H1Setup** The count of the number of this particular object type present on this device. +- **DataSourceMatchingInfoPostUpgrade_RS1** The total DataSourceMatchingInfoPostUpgrade objects targeting Windows 10 version 1607 on this device. +- **DataSourceMatchingInfoPostUpgrade_RS2** The total DataSourceMatchingInfoPostUpgrade objects targeting Windows 10 version 1703 on this device. +- **DataSourceMatchingInfoPostUpgrade_RS3** The total DataSourceMatchingInfoPostUpgrade objects targeting Windows 10 version 1709 on this device. +- **DataSourceMatchingInfoPostUpgrade_RS3Setup** The count of the number of this particular object type present on this device. +- **DataSourceMatchingInfoPostUpgrade_RS4** The count of the number of this particular object type present on this device. +- **DataSourceMatchingInfoPostUpgrade_RS4Setup** The count of the number of this particular object type present on this device. +- **DataSourceMatchingInfoPostUpgrade_RS5** The count of the number of this particular object type present on this device. +- **DataSourceMatchingInfoPostUpgrade_RS5Setup** The count of the number of this particular object type present on this device. +- **DataSourceMatchingInfoPostUpgrade_TH1** The count of the number of this particular object type present on this device. +- **DataSourceMatchingInfoPostUpgrade_TH2** The count of the number of this particular object type present on this device. +- **DatasourceSystemBios_19ASetup** The count of the number of this particular object type present on this device. +- **DatasourceSystemBios_19H1** The count of the number of this particular object type present on this device. +- **DatasourceSystemBios_19H1Setup** The count of the number of this particular object type present on this device. +- **DatasourceSystemBios_RS1** The total DatasourceSystemBios objects targeting Windows 10 version 1607 present on this device. +- **DatasourceSystemBios_RS2** The total DatasourceSystemBios objects targeting Windows 10 version 1703 present on this device. +- **DatasourceSystemBios_RS3** The total DatasourceSystemBios objects targeting Windows 10 version 1709 present on this device. +- **DatasourceSystemBios_RS3Setup** The count of the number of this particular object type present on this device. +- **DatasourceSystemBios_RS4** The count of the number of this particular object type present on this device. +- **DatasourceSystemBios_RS4Setup** The count of the number of this particular object type present on this device. +- **DatasourceSystemBios_RS5** The count of the number of this particular object type present on this device. +- **DatasourceSystemBios_RS5Setup** The count of the number of this particular object type present on this device. +- **DatasourceSystemBios_TH1** The count of the number of this particular object type present on this device. +- **DatasourceSystemBios_TH2** The count of the number of this particular object type present on this device. +- **DecisionApplicationFile_19ASetup** The count of the number of this particular object type present on this device. +- **DecisionApplicationFile_19H1** The count of the number of this particular object type present on this device. +- **DecisionApplicationFile_19H1Setup** The count of the number of this particular object type present on this device. +- **DecisionApplicationFile_RS1** The count of the number of this particular object type present on this device. +- **DecisionApplicationFile_RS2** The count of the number of this particular object type present on this device. +- **DecisionApplicationFile_RS3** The count of the number of this particular object type present on this device. +- **DecisionApplicationFile_RS3Setup** The count of the number of this particular object type present on this device. +- **DecisionApplicationFile_RS4** The count of the number of this particular object type present on this device. +- **DecisionApplicationFile_RS4Setup** The count of the number of this particular object type present on this device. +- **DecisionApplicationFile_RS5** The count of the number of this particular object type present on this device. +- **DecisionApplicationFile_RS5Setup** The count of the number of this particular object type present on this device. +- **DecisionApplicationFile_TH1** The count of the number of this particular object type present on this device. +- **DecisionApplicationFile_TH2** The count of the number of this particular object type present on this device. +- **DecisionDevicePnp_19ASetup** The count of the number of this particular object type present on this device. +- **DecisionDevicePnp_19H1** The count of the number of this particular object type present on this device. +- **DecisionDevicePnp_19H1Setup** The count of the number of this particular object type present on this device. +- **DecisionDevicePnp_RS1** The total DecisionDevicePnp objects targeting Windows 10 version 1607 on this device. +- **DecisionDevicePnp_RS2** The count of the number of this particular object type present on this device. +- **DecisionDevicePnp_RS3** The count of the number of this particular object type present on this device. +- **DecisionDevicePnp_RS3Setup** The count of the number of this particular object type present on this device. +- **DecisionDevicePnp_RS4** The count of the number of this particular object type present on this device. +- **DecisionDevicePnp_RS4Setup** The count of the number of this particular object type present on this device. +- **DecisionDevicePnp_RS5** The count of the number of this particular object type present on this device. +- **DecisionDevicePnp_RS5Setup** The count of the number of this particular object type present on this device. +- **DecisionDevicePnp_TH1** The count of the number of this particular object type present on this device. +- **DecisionDevicePnp_TH2** The count of the number of this particular object type present on this device. +- **DecisionDriverPackage_19ASetup** The count of the number of this particular object type present on this device. +- **DecisionDriverPackage_19H1** The count of the number of this particular object type present on this device. +- **DecisionDriverPackage_19H1Setup** The count of the number of this particular object type present on this device. +- **DecisionDriverPackage_RS1** The total DecisionDriverPackage objects targeting Windows 10 version 1607 on this device. +- **DecisionDriverPackage_RS2** The count of the number of this particular object type present on this device. +- **DecisionDriverPackage_RS3** The count of the number of this particular object type present on this device. +- **DecisionDriverPackage_RS3Setup** The count of the number of this particular object type present on this device. +- **DecisionDriverPackage_RS4** The count of the number of this particular object type present on this device. +- **DecisionDriverPackage_RS4Setup** The count of the number of this particular object type present on this device. +- **DecisionDriverPackage_RS5** The count of the number of this particular object type present on this device. +- **DecisionDriverPackage_RS5Setup** The count of the number of this particular object type present on this device. +- **DecisionDriverPackage_TH1** The count of the number of this particular object type present on this device. +- **DecisionDriverPackage_TH2** The count of the number of this particular object type present on this device. +- **DecisionMatchingInfoBlock_19ASetup** The count of the number of this particular object type present on this device. +- **DecisionMatchingInfoBlock_19H1** The count of the number of this particular object type present on this device. +- **DecisionMatchingInfoBlock_19H1Setup** The count of the number of this particular object type present on this device. +- **DecisionMatchingInfoBlock_RS1** The total DecisionMatchingInfoBlock objects targeting Windows 10 version 1607 present on this device. +- **DecisionMatchingInfoBlock_RS2** The total DecisionMatchingInfoBlock objects targeting Windows 10 version 1703 present on this device. +- **DecisionMatchingInfoBlock_RS3** The total DecisionMatchingInfoBlock objects targeting Windows 10 version 1709 present on this device. +- **DecisionMatchingInfoBlock_RS3Setup** The count of the number of this particular object type present on this device. +- **DecisionMatchingInfoBlock_RS4** The total DecisionMatchingInfoBlock objects targeting Windows 10 version 1803 present on this device. +- **DecisionMatchingInfoBlock_RS4Setup** The count of the number of this particular object type present on this device. +- **DecisionMatchingInfoBlock_RS5** The count of the number of this particular object type present on this device. +- **DecisionMatchingInfoBlock_RS5Setup** The count of the number of this particular object type present on this device. +- **DecisionMatchingInfoBlock_TH1** The count of the number of this particular object type present on this device. +- **DecisionMatchingInfoBlock_TH2** The count of the number of this particular object type present on this device. +- **DecisionMatchingInfoPassive_19ASetup** The count of the number of this particular object type present on this device. +- **DecisionMatchingInfoPassive_19H1** The count of the number of this particular object type present on this device. +- **DecisionMatchingInfoPassive_19H1Setup** The count of the number of this particular object type present on this device. +- **DecisionMatchingInfoPassive_RS1** The total DecisionMatchingInfoPassive objects targeting Windows 10 version 1607 on this device. +- **DecisionMatchingInfoPassive_RS2** The total DecisionMatchingInfoPassive objects targeting Windows 10 version 1703 on this device. +- **DecisionMatchingInfoPassive_RS3** The total DecisionMatchingInfoPassive objects targeting Windows 10 version 1803 on this device. +- **DecisionMatchingInfoPassive_RS3Setup** The count of the number of this particular object type present on this device. +- **DecisionMatchingInfoPassive_RS4** The count of the number of this particular object type present on this device. +- **DecisionMatchingInfoPassive_RS4Setup** The count of the number of this particular object type present on this device. +- **DecisionMatchingInfoPassive_RS5** The count of the number of this particular object type present on this device. +- **DecisionMatchingInfoPassive_RS5Setup** The count of the number of this particular object type present on this device. +- **DecisionMatchingInfoPassive_TH1** The count of the number of this particular object type present on this device. +- **DecisionMatchingInfoPassive_TH2** The count of the number of this particular object type present on this device. +- **DecisionMatchingInfoPostUpgrade_19ASetup** The count of the number of this particular object type present on this device. +- **DecisionMatchingInfoPostUpgrade_19H1** The count of the number of this particular object type present on this device. +- **DecisionMatchingInfoPostUpgrade_19H1Setup** The count of the number of this particular object type present on this device. +- **DecisionMatchingInfoPostUpgrade_RS1** The total DecisionMatchingInfoPostUpgrade objects targeting Windows 10 version 1607 on this device. +- **DecisionMatchingInfoPostUpgrade_RS2** The total DecisionMatchingInfoPostUpgrade objects targeting Windows 10 version 1703 on this device. +- **DecisionMatchingInfoPostUpgrade_RS3** The total DecisionMatchingInfoPostUpgrade objects targeting Windows 10 version 1709 on this device. +- **DecisionMatchingInfoPostUpgrade_RS3Setup** The count of the number of this particular object type present on this device. +- **DecisionMatchingInfoPostUpgrade_RS4** The count of the number of this particular object type present on this device. +- **DecisionMatchingInfoPostUpgrade_RS4Setup** The count of the number of this particular object type present on this device. +- **DecisionMatchingInfoPostUpgrade_RS5** The count of the number of this particular object type present on this device. +- **DecisionMatchingInfoPostUpgrade_RS5Setup** The count of the number of this particular object type present on this device. +- **DecisionMatchingInfoPostUpgrade_TH1** The count of the number of this particular object type present on this device. +- **DecisionMatchingInfoPostUpgrade_TH2** The count of the number of this particular object type present on this device. +- **DecisionMediaCenter_19ASetup** The count of the number of this particular object type present on this device. +- **DecisionMediaCenter_19H1** The count of the number of this particular object type present on this device. +- **DecisionMediaCenter_19H1Setup** The total DecisionMediaCenter objects targeting the next release of Windows on this device. +- **DecisionMediaCenter_RS1** The total DecisionMediaCenter objects targeting Windows 10 version 1607 present on this device. +- **DecisionMediaCenter_RS2** The total DecisionMediaCenter objects targeting Windows 10 version 1703 present on this device. +- **DecisionMediaCenter_RS3** The total DecisionMediaCenter objects targeting Windows 10 version 1709 present on this device. +- **DecisionMediaCenter_RS3Setup** The count of the number of this particular object type present on this device. +- **DecisionMediaCenter_RS4** The total DecisionMediaCenter objects targeting Windows 10 version 1803 present on this device. +- **DecisionMediaCenter_RS4Setup** The count of the number of this particular object type present on this device. +- **DecisionMediaCenter_RS5** The count of the number of this particular object type present on this device. +- **DecisionMediaCenter_RS5Setup** The count of the number of this particular object type present on this device. +- **DecisionMediaCenter_TH1** The count of the number of this particular object type present on this device. +- **DecisionMediaCenter_TH2** The count of the number of this particular object type present on this device. +- **DecisionSystemBios_19ASetup** The total DecisionSystemBios objects targeting the next release of Windows on this device. +- **DecisionSystemBios_19H1** The count of the number of this particular object type present on this device. +- **DecisionSystemBios_19H1Setup** The total DecisionSystemBios objects targeting the next release of Windows on this device. +- **DecisionSystemBios_RS1** The total DecisionSystemBios objects targeting Windows 10 version 1607 on this device. +- **DecisionSystemBios_RS2** The total DecisionSystemBios objects targeting Windows 10 version 1703 on this device. +- **DecisionSystemBios_RS3** The total DecisionSystemBios objects targeting Windows 10 version 1709 on this device. +- **DecisionSystemBios_RS3Setup** The count of the number of this particular object type present on this device. +- **DecisionSystemBios_RS4** The total DecisionSystemBios objects targeting Windows 10 version, 1803 present on this device. +- **DecisionSystemBios_RS4Setup** The total DecisionSystemBios objects targeting the next release of Windows on this device. +- **DecisionSystemBios_RS5** The total DecisionSystemBios objects targeting the next release of Windows on this device. +- **DecisionSystemBios_RS5Setup** The total DecisionSystemBios objects targeting the next release of Windows on this device. +- **DecisionSystemBios_TH1** The count of the number of this particular object type present on this device. +- **DecisionSystemBios_TH2** The count of the number of this particular object type present on this device. +- **DecisionSystemProcessor_RS2** The count of the number of this particular object type present on this device. +- **DecisionTest_RS1** An ID for the system, calculated by hashing hardware identifiers. +- **InventoryApplicationFile** The count of the number of this particular object type present on this device. +- **InventoryDeviceContainer** A count of device container objects in cache. +- **InventoryDevicePnp** A count of device Plug and Play objects in cache. +- **InventoryDriverBinary** A count of driver binary objects in cache. +- **InventoryDriverPackage** A count of device objects in cache. +- **InventoryLanguagePack** The count of the number of this particular object type present on this device. +- **InventoryMediaCenter** The count of the number of this particular object type present on this device. +- **InventorySystemBios** The count of the number of this particular object type present on this device. +- **InventorySystemMachine** The count of the number of this particular object type present on this device. +- **InventorySystemProcessor** The count of the number of this particular object type present on this device. +- **InventoryTest** The count of the number of this particular object type present on this device. +- **InventoryUplevelDriverPackage** The count of the number of this particular object type present on this device. +- **PCFP** The count of the number of this particular object type present on this device. +- **SystemMemory** The count of the number of this particular object type present on this device. +- **SystemProcessorCompareExchange** The count of the number of this particular object type present on this device. +- **SystemProcessorLahfSahf** The count of the number of this particular object type present on this device. +- **SystemProcessorNx** The total number of objects of this type present on this device. +- **SystemProcessorPrefetchW** The total number of objects of this type present on this device. +- **SystemProcessorSse2** The total number of objects of this type present on this device. +- **SystemTouch** The count of the number of this particular object type present on this device. +- **SystemWim** The total number of objects of this type present on this device. +- **SystemWindowsActivationStatus** The count of the number of this particular object type present on this device. +- **SystemWlan** The total number of objects of this type present on this device. +- **Wmdrm_19ASetup** The count of the number of this particular object type present on this device. +- **Wmdrm_19H1** The count of the number of this particular object type present on this device. +- **Wmdrm_19H1Setup** The total Wmdrm objects targeting the next release of Windows on this device. +- **Wmdrm_RS1** An ID for the system, calculated by hashing hardware identifiers. +- **Wmdrm_RS2** An ID for the system, calculated by hashing hardware identifiers. +- **Wmdrm_RS3** An ID for the system, calculated by hashing hardware identifiers. +- **Wmdrm_RS3Setup** The count of the number of this particular object type present on this device. +- **Wmdrm_RS4** The total Wmdrm objects targeting Windows 10, version 1803 present on this device. +- **Wmdrm_RS4Setup** The count of the number of this particular object type present on this device. +- **Wmdrm_RS5** The count of the number of this particular object type present on this device. +- **Wmdrm_RS5Setup** The count of the number of this particular object type present on this device. +- **Wmdrm_TH1** The count of the number of this particular object type present on this device. +- **Wmdrm_TH2** The count of the number of this particular object type present on this device. + + +### Microsoft.Windows.Appraiser.General.DatasourceApplicationFileAdd + +Represents the basic metadata about specific application files installed on the system. + +This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedeviceinventorychange). + +The following fields are available: + +- **AppraiserVersion** The version of the appraiser file that is generating the events. +- **AvDisplayName** If the app is an anti-virus app, this is its display name. +- **CompatModelIndex** The compatibility prediction for this file. +- **HasCitData** Indicates whether the file is present in CIT data. +- **HasCitDcta** No content is currently available. +- **HasUpgradeExe** Indicates whether the anti-virus app has an upgrade.exe file. +- **IsAv** Is the file an anti-virus reporting EXE? +- **ResolveAttempted** This will always be an empty string when sending telemetry. +- **SdbEntries** An array of fields that indicates the SDB entries that apply to this file. + + +### Microsoft.Windows.Appraiser.General.DatasourceApplicationFileRemove + +This event indicates that the DatasourceApplicationFile object is no longer present. + +This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedeviceinventorychange). + +The following fields are available: + +- **AppraiserVersion** The version of the Appraiser file that is generating the events. + + +### Microsoft.Windows.Appraiser.General.DatasourceApplicationFileStartSync + +This event indicates that a new set of DatasourceApplicationFileAdd events will be sent. + +This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedeviceinventorychange). + +The following fields are available: + +- **AppraiserVersion** The version of the Appraiser file that is generating the events. + + +### Microsoft.Windows.Appraiser.General.DatasourceDevicePnpAdd + +This event sends compatibility data for a Plug and Play device, to help keep Windows up to date. + +This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedeviceinventorychange). + +The following fields are available: + +- **ActiveNetworkConnection** Indicates whether the device is an active network device. +- **ActivóNetworkConnection** No content is currently available. +- **AppraiserVersion** The version of the appraiser file generating the events. +- **CosDeviceRating** An enumeration that indicates if there is a driver on the target operating system. +- **CosDeviceSolution** An enumeration that indicates how a driver on the target operating system is available. +- **CosDeviceSolutionUrl** Microsoft.Windows.Appraiser.General.DatasourceDevicePnpAdd . Empty string +- **CosPopulatedFromId** The expected uplevel driver matching ID based on driver coverage data. +- **IsBootCritical** Indicates whether the device boot is critical. +- **UplevelInboxDriver** Indicates whether there is a driver uplevel for this device. +- **WuDriverCoverage** Indicates whether there is a driver uplevel for this device, according to Windows Update. +- **WuDriverUpdateId** The Windows Update ID of the applicable uplevel driver. +- **WuPopulatedFromId** The expected uplevel driver matching ID based on driver coverage from Windows Update. + + +### Microsoft.Windows.Appraiser.General.DatasourceDevicePnpRemove + +This event indicates that the DatasourceDevicePnp object is no longer present. + +This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedeviceinventorychange). + +The following fields are available: + +- **AppraiserVersion** The version of the Appraiser file that is generating the events. + + +### Microsoft.Windows.Appraiser.General.DatasourceDevicePnpStartSync + +This event indicates that a new set of DatasourceDevicePnpAdd events will be sent. + +This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedeviceinventorychange). + +The following fields are available: + +- **AppraiserVersion** The version of the Appraiser file that is generating the events. + + +### Microsoft.Windows.Appraiser.General.DatasourceDriverPackageAdd + +This event sends compatibility database data about driver packages to help keep Windows up to date. + +This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedeviceinventorychange). + +The following fields are available: + +- **AppraiserVersion** The version of the appraiser file generating the events. + + +### Microsoft.Windows.Appraiser.General.DatasourceDriverPackageRemove + +This event indicates that the DatasourceDriverPackage object is no longer present. + +This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedeviceinventorychange). + +The following fields are available: + +- **AppraiserVersion** The version of the Appraiser file that is generating the events. + + +### Microsoft.Windows.Appraiser.General.DatasourceDriverPackageStartSync + +This event indicates that a new set of DatasourceDriverPackageAdd events will be sent. + +This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedeviceinventorychange). + +The following fields are available: + +- **AppraiserVersion** The version of the Appraiser file that is generating the events. + + +### Microsoft.Windows.Appraiser.General.DataSourceMatchingInfoBlockAdd + +This event sends blocking data about any compatibility blocking entries hit on the system that are not directly related to specific applications or devices, to help keep Windows up-to-date. + +This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedeviceinventorychange). + +The following fields are available: + +- **AppraiserVersion** The version of the appraiser file generating the events. + + +### Microsoft.Windows.Appraiser.General.DataSourceMatchingInfoBlockRemove + +This event indicates that the DataSourceMatchingInfoBlock object is no longer present. + +This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedeviceinventorychange). + +The following fields are available: + +- **AppraiserVersion** The version of the Appraiser file that is generating the events. + + +### Microsoft.Windows.Appraiser.General.DataSourceMatchingInfoBlockStartSync + +This event indicates that a full set of DataSourceMatchingInfoBlockStAdd events have been sent. + +This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedeviceinventorychange). + +The following fields are available: + +- **AppraiserVersion** The version of the Appraiser file that is generating the events. + + +### Microsoft.Windows.Appraiser.General.DataSourceMatchingInfoPassiveAdd + +This event sends compatibility database information about non-blocking compatibility entries on the system that are not keyed by either applications or devices, to help keep Windows up-to-date. + +This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedeviceinventorychange). + +The following fields are available: + +- **AppraiserVersion** The version of the appraiser file generating the events. + + +### Microsoft.Windows.Appraiser.General.DataSourceMatchingInfoPassiveRemove + +This event indicates that the DataSourceMatchingInfoPassive object is no longer present. + +This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedeviceinventorychange). + +The following fields are available: + +- **AppraiserVersion** The version of the Appraiser file that is generating the events. + + +### Microsoft.Windows.Appraiser.General.DataSourceMatchingInfoPassiveStartSync + +This event indicates that a new set of DataSourceMatchingInfoPassiveAdd events will be sent. + +This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedeviceinventorychange). + +The following fields are available: + +- **AppraiserVersion** The version of the Appraiser file that is generating the events. + + +### Microsoft.Windows.Appraiser.General.DataSourceMatchingInfoPostUpgradeAdd + +This event sends compatibility database information about entries requiring reinstallation after an upgrade on the system that are not keyed by either applications or devices, to help keep Windows up-to-date. + +This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedeviceinventorychange). + +The following fields are available: + +- **AppraiserVersion** The version of the appraiser file generating the events. + + +### Microsoft.Windows.Appraiser.General.DataSourceMatchingInfoPostUpgradeRemove + +This event indicates that the DataSourceMatchingInfoPostUpgrade object is no longer present. + +This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedeviceinventorychange). + +The following fields are available: + +- **AppraiserVersion** The version of the Appraiser file that is generating the events. + + +### Microsoft.Windows.Appraiser.General.DataSourceMatchingInfoPostUpgradeStartSync + +This event indicates that a new set of DataSourceMatchingInfoPostUpgradeAdd events will be sent. + +This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedeviceinventorychange). + +The following fields are available: + +- **AppraiserVersion** The version of the Appraiser file that is generating the events. + + +### Microsoft.Windows.Appraiser.General.DatasourceSystemBiosAdd + +This event sends compatibility database information about the BIOS to help keep Windows up-to-date. + +This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedeviceinventorychange). + +The following fields are available: + +- **AppraiserVersion** The version of the Appraiser file generating the events. + + +### Microsoft.Windows.Appraiser.General.DatasourceSystemBiosRemove + +This event indicates that the DatasourceSystemBios object is no longer present. + +This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedeviceinventorychange). + +The following fields are available: + +- **AppraiserVersion** The version of the Appraiser file that is generating the events. + + +### Microsoft.Windows.Appraiser.General.DatasourceSystemBiosStartSync + +This event indicates that a new set of DatasourceSystemBiosAdd events will be sent. + +This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedeviceinventorychange). + +The following fields are available: + +- **AppraiserVersion** The version of the Appraiser file that is generating the events. + + +### Microsoft.Windows.Appraiser.General.DecisionApplicationFileAdd + +This event sends compatibility decision data about a file to help keep Windows up-to-date. + +This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedeviceinventorychange). + +The following fields are available: + +- **AppraiserVersion** The version of the appraiser file that is generating the events. +- **BlockAlreadyInbox** The uplevel runtime block on the file already existed on the current OS. +- **BlockingApplication** Indicates whether there are any application issues that interfere with the upgrade due to the file in question. +- **DisplayGenericMessage** Will be a generic message be shown for this file? +- **DisplayGenericMessageGated** Indicates whether a generic message be shown for this file. +- **HardBlock** This file is blocked in the SDB. +- **HasUxBlockOverride** Does the file have a block that is overridden by a tag in the SDB? +- **MigApplication** Does the file have a MigXML from the SDB associated with it that applies to the current upgrade mode? +- **MigRemoval** Does the file have a MigXML from the SDB that will cause the app to be removed on upgrade? +- **NeedsDismissAction** Will the file cause an action that can be dimissed? +- **NeedsInstallPostUpgradeData** After upgrade, the file will have a post-upgrade notification to install a replacement for the app. +- **NeedsNotifyPostUpgradeData** Does the file have a notification that should be shown after upgrade? +- **NeedsReinstallPostUpgradeData** After upgrade, this file will have a post-upgrade notification to reinstall the app. +- **NeedsUninstallAction** The file must be uninstalled to complete the upgrade. +- **SdbBlockUpgrade** The file is tagged as blocking upgrade in the SDB, +- **SdbBlockUpgradeCanReinstall** The file is tagged as blocking upgrade in the SDB. It can be reinstalled after upgrade. +- **SdbBlockUpgradeUntilUpdate** The file is tagged as blocking upgrade in the SDB. If the app is updated, the upgrade can proceed. +- **SdbReinstallUpgrade** The file is tagged as needing to be reinstalled after upgrade in the SDB. It does not block upgrade. +- **SdbReinstallUpgradeWarn** The file is tagged as needing to be reinstalled after upgrade with a warning in the SDB. It does not block upgrade. +- **SoftBlock** The file is softblocked in the SDB and has a warning. + + +### Microsoft.Windows.Appraiser.General.DecisionApplicationFileRemove + +This event indicates Indicates that the DecisionApplicationFile object is no longer present. + +This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedeviceinventorychange). + +The following fields are available: + +- **AppraiserVersion** The version of the Appraiser file that is generating the events. + + +### Microsoft.Windows.Appraiser.General.DecisionApplicationFileStartSync + +This event indicates that a new set of DecisionApplicationFileAdd events will be sent. + +This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedeviceinventorychange). + +The following fields are available: + +- **AppraiserVersion** The version of the Appraiser file that is generating the events. + + +### Microsoft.Windows.Appraiser.General.DecisionDevicePnpAdd + +This event sends compatibility decision data about a PNP device to help keep Windows up to date. + +This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedeviceinventorychange). + +The following fields are available: + +- **AppraiserVersion** The version of the appraiser file generating the events. +- **AssociatedDriverIsBlocked** Is the driver associated with this PNP device blocked? +- **AssociatedDriverWillNotMigrate** Will the driver associated with this plug-and-play device migrate? +- **BlockAssociatedDriver** Should the driver associated with this PNP device be blocked? +- **BlockingDevice** Is this PNP device blocking upgrade? +- **BlockUpgradeIfDriverBlocked** Is the PNP device both boot critical and does not have a driver included with the OS? +- **BlockUpgradeIfDriverBlockedAndOnlyActiveNetwork** Is this PNP device the only active network device? +- **CssociatedDriverIsBlocked** No content is currently available. +- **DisplayGenericMessage** Will a generic message be shown during Setup for this PNP device? +- **DisplayGenericMessageGated** Indicates whether a generic message will be shown during Setup for this PNP device. +- **DriverAvailableInbox** Is a driver included with the operating system for this PNP device? +- **DriverAvailableOnline** Is there a driver for this PNP device on Windows Update? +- **DriverAvailableUplevel** Is there a driver on Windows Update or included with the operating system for this PNP device? +- **DriverBlockOverridden** Is there is a driver block on the device that has been overridden? +- **DviverAvailableInbox** No content is currently available. +- **NeedsDismissAction** Will the user would need to dismiss a warning during Setup for this device? +- **NotRegressed** Does the device have a problem code on the source OS that is no better than the one it would have on the target OS? +- **SdbDeviceBlockUpgrade** Is there an SDB block on the PNP device that blocks upgrade? +- **SdbDriverBlockOverridden** Is there an SDB block on the PNP device that blocks upgrade, but that block was overridden? + + +### Microsoft.Windows.Appraiser.General.DecisionDevicePnpRemove + +This event indicates that the DecisionDevicePnp object is no longer present. + +This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedeviceinventorychange). + +The following fields are available: + +- **AppraiserVersion** The version of the Appraiser file that is generating the events. + + +### Microsoft.Windows.Appraiser.General.DecisionDevicePnpStartSync + +The DecisionDevicePnpStartSync event indicates that a new set of DecisionDevicePnpAdd events will be sent. + +This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedeviceinventorychange). + +The following fields are available: + +- **AppraiserVersion** The version of the Appraiser file that is generating the events. + + +### Microsoft.Windows.Appraiser.General.DecisionDriverPackageAdd + +This event sends decision data about driver package compatibility to help keep Windows up to date. + +This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedeviceinventorychange). + +The following fields are available: + +- **AppraiserVersion** The version of the appraiser file generating the events. +- **DisplayGenericMessageGated** Indicates whether a generic offer block message will be shown for this driver package. +- **DriverBlockOverridden** Does the driver package have an SDB block that blocks it from migrating, but that block has been overridden? +- **DriverIsDeviceBlocked** Was the driver package was blocked because of a device block? +- **DriverIsDriverBlocked** Is the driver package blocked because of a driver block? +- **DriverIsTroubleshooterBlocked** Indicates whether the driver package is blocked because of a troubleshooter block. +- **DriverShouldNotMigrate** Should the driver package be migrated during upgrade? +- **SdbDriverBlockOverridden** Does the driver package have an SDB block that blocks it from migrating, but that block has been overridden? + + +### Microsoft.Windows.Appraiser.General.DecisionDriverPackageRemove + +This event indicates that the DecisionDriverPackage object is no longer present. + +This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedeviceinventorychange). + +The following fields are available: + +- **AppraiserVersion** The version of the Appraiser file that is generating the events. + + +### Microsoft.Windows.Appraiser.General.DecisionDriverPackageStartSync + +This event indicates that a new set of DecisionDriverPackageAdd events will be sent. + +This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedeviceinventorychange). + +The following fields are available: + +- **AppraiserVersion** The version of the Appraiser file that is generating the events. + + +### Microsoft.Windows.Appraiser.General.DecisionMatchingInfoBlockAdd + +This event sends compatibility decision data about blocking entries on the system that are not keyed by either applications or devices, to help keep Windows up to date. + +This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedeviceinventorychange). + +The following fields are available: + +- **AppraiserVersion** The version of the appraiser file generating the events. +- **BlockingApplication** Are there are any application issues that interfere with upgrade due to matching info blocks? +- **DisplayGenericMessage** Will a generic message be shown for this block? +- **NeedsUninstallAction** Does the user need to take an action in setup due to a matching info block? +- **SdbBlockUpgrade** Is a matching info block blocking upgrade? +- **SdbBlockUpgradeCanReinstall** Is a matching info block blocking upgrade, but has the can reinstall tag? +- **SdbBlockUpgradeUntilUpdate** Is a matching info block blocking upgrade but has the until update tag? + + +### Microsoft.Windows.Appraiser.General.DecisionMatchingInfoBlockRemove + +This event indicates that the DecisionMatchingInfoBlock object is no longer present. + +This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedeviceinventorychange). + +The following fields are available: + +- **AppraiserVersion** The version of the Appraiser file that is generating the events. + + +### Microsoft.Windows.Appraiser.General.DecisionMatchingInfoBlockStartSync + +This event indicates that a new set of DecisionMatchingInfoBlockAdd events will be sent. + +This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedeviceinventorychange). + +The following fields are available: + +- **AppraiserVersion** The version of the Appraiser file that is generating the events. + + +### Microsoft.Windows.Appraiser.General.DecisionMatchingInfoPassiveAdd + +This event sends compatibility decision data about non-blocking entries on the system that are not keyed by either applications or devices, to help keep Windows up to date. + +This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedeviceinventorychange). + +The following fields are available: + +- **AppraiserVersion** The version of the Appraiser file that is generating the events. +- **BlockingApplication** Are there any application issues that interfere with upgrade due to matching info blocks? +- **DisplayGenericMessageGated** Indicates whether a generic offer block message will be shown due to matching info blocks. +- **MigApplication** Is there a matching info block with a mig for the current mode of upgrade? + + +### Microsoft.Windows.Appraiser.General.DecisionMatchingInfoPassiveRemove + +This event Indicates that the DecisionMatchingInfoPassive object is no longer present. + +This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedeviceinventorychange). + +The following fields are available: + +- **AppraiserVersion** The version of the Appraiser file that is generating the events. + + +### Microsoft.Windows.Appraiser.General.DecisionMatchingInfoPassiveStartSync + +This event indicates that a new set of DecisionMatchingInfoPassiveAdd events will be sent. + +This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedeviceinventorychange). + +The following fields are available: + +- **AppraiserVersion** The version of the Appraiser file that is generating the events. + + +### Microsoft.Windows.Appraiser.General.DecisionMatchingInfoPostUpgradeAdd + +This event sends compatibility decision data about entries that require reinstall after upgrade. It's used to help keep Windows up to date. + +This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedeviceinventorychange). + +The following fields are available: + +- **AppraiserVersion** The version of the Appraiser file that is generating the events. +- **NeedsInstallPostUpgradeData** Will the file have a notification after upgrade to install a replacement for the app? +- **NeedsNotifyPostUpgradeData** Should a notification be shown for this file after upgrade? +- **NeedsReinstallPostUpgradeData** Will the file have a notification after upgrade to reinstall the app? +- **SdbReinstallUpgrade** The file is tagged as needing to be reinstalled after upgrade in the compatibility database (but is not blocking upgrade). + + +### Microsoft.Windows.Appraiser.General.DecisionMatchingInfoPostUpgradeRemove + +This event indicates that the DecisionMatchingInfoPostUpgrade object is no longer present. + +This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedeviceinventorychange). + +The following fields are available: + +- **AppraiserVersion** The version of the Appraiser file that is generating the events. + + +### Microsoft.Windows.Appraiser.General.DecisionMatchingInfoPostUpgradeStartSync + +This event indicates that a new set of DecisionMatchingInfoPostUpgradeAdd events will be sent. + +This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedeviceinventorychange). + +The following fields are available: + +- **AppraiserVersion** The version of the Appraiser file that is generating the events. + + +### Microsoft.Windows.Appraiser.General.DecisionMediaCenterAdd + +This event sends decision data about the presence of Windows Media Center, to help keep Windows up to date. + +This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedeviceinventorychange). + +The following fields are available: + +- **AppraiserVersion** The version of the Appraiser file generating the events. +- **BlockingApplication** Is there any application issues that interfere with upgrade due to Windows Media Center? +- **MediaCenterActivelyUsed** If Windows Media Center is supported on the edition, has it been run at least once and are the MediaCenterIndicators are true? +- **MediaCenterIndicators** Do any indicators imply that Windows Media Center is in active use? +- **MediaCenterInUse** Is Windows Media Center actively being used? +- **MediaCenterPaidOrActivelyUsed** Is Windows Media Center actively being used or is it running on a supported edition? +- **NeedsDismissAction** Are there any actions that can be dismissed coming from Windows Media Center? + + +### Microsoft.Windows.Appraiser.General.DecisionMediaCenterRemove + +This event indicates that the DecisionMediaCenter object is no longer present. + +This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedeviceinventorychange). + +The following fields are available: + +- **AppraiserVersion** The version of the Appraiser file that is generating the events. + + +### Microsoft.Windows.Appraiser.General.DecisionMediaCenterStartSync + +This event indicates that a new set of DecisionMediaCenterAdd events will be sent. + +This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedeviceinventorychange). + +The following fields are available: + +- **AppraiserVersion** The version of the Appraiser file that is generating the events. + + +### Microsoft.Windows.Appraiser.General.DecisionSystemBiosAdd + +This event sends compatibility decision data about the BIOS to help keep Windows up to date. + +This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedeviceinventorychange). + +The following fields are available: + +- **AppraiserVersion** The version of the Appraiser file generating the events. +- **Blocking** Is the device blocked from upgrade due to a BIOS block? +- **DisplayGenericMessageGated** Indicates whether a generic offer block message will be shown for the bios. +- **HasBiosBlock** Does the device have a BIOS block? + + +### Microsoft.Windows.Appraiser.General.DecisionSystemBiosRemove + +This event indicates that the DecisionSystemBios object is no longer present. + +This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedeviceinventorychange). + +The following fields are available: + +- **AppraiserVersion** The version of the Appraiser file that is generating the events. + + +### Microsoft.Windows.Appraiser.General.DecisionSystemBiosStartSync + +This event indicates that a new set of DecisionSystemBiosAdd events will be sent. + +This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedeviceinventorychange). + +The following fields are available: + +- **AppraiserVersion** The version of the Appraiser file that is generating the events. + + +### Microsoft.Windows.Appraiser.General.GatedRegChange + +This event sends data about the results of running a set of quick-blocking instructions, to help keep Windows up to date. + +The following fields are available: + +- **NewData** The data in the registry value after the scan completed. +- **OldData** The previous data in the registry value before the scan ran. +- **PCFP** An ID for the system calculated by hashing hardware identifiers. +- **RegKey** The registry key name for which a result is being sent. +- **RegValue** The registry value for which a result is being sent. +- **Time** The client time of the event. + + +### Microsoft.Windows.Appraiser.General.InventoryApplicationFileAdd + +This event represents the basic metadata about a file on the system. The file must be part of an app and either have a block in the compatibility database or be part of an antivirus program. + +This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedeviceinventorychange). + +The following fields are available: + +- **AppraiserVersion** The version of the Appraiser file generating the events. +- **AvDisplayName** If the app is an antivirus app, this is its display name. +- **AvProductState** Indicates whether the antivirus program is turned on and the signatures are up to date. +- **BinaryType** A binary type. Example: UNINITIALIZED, ZERO_BYTE, DATA_ONLY, DOS_MODULE, NE16_MODULE, PE32_UNKNOWN, PE32_I386, PE32_ARM, PE64_UNKNOWN, PE64_AMD64, PE64_ARM64, PE64_IA64, PE32_CLR_32, PE32_CLR_IL, PE32_CLR_IL_PREFER32, PE64_CLR_64. +- **BinFileVersion** An attempt to clean up FileVersion at the client that tries to place the version into 4 octets. +- **BinProductVersion** An attempt to clean up ProductVersion at the client that tries to place the version into 4 octets. +- **BoeProgramId** If there is no entry in Add/Remove Programs, this is the ProgramID that is generated from the file metadata. +- **CompanyName** The company name of the vendor who developed this file. +- **FileId** A hash that uniquely identifies a file. +- **FileVersion** The File version field from the file metadata under Properties -> Details. +- **HasUpgradeExe** Indicates whether the antivirus app has an upgrade.exe file. +- **IsAv** Indicates whether the file an antivirus reporting EXE. +- **LinkDate** The date and time that this file was linked on. +- **LowerCaseLongPath** The full file path to the file that was inventoried on the device. +- **Name** The name of the file that was inventoried. +- **ProductName** The Product name field from the file metadata under Properties -> Details. +- **ProductVersion** The Product version field from the file metadata under Properties -> Details. +- **ProgramId** A hash of the Name, Version, Publisher, and Language of an application used to identify it. +- **Size** The size of the file (in hexadecimal bytes). + + +### Microsoft.Windows.Appraiser.General.InventoryApplicationFileRemove + +This event indicates that the InventoryApplicationFile object is no longer present. + +This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedeviceinventorychange). + +The following fields are available: + +- **AppraiserVersion** The version of the Appraiser file that is generating the events. + + +### Microsoft.Windows.Appraiser.General.InventoryApplicationFileStartSync + +This event indicates indicates that a new set of InventoryApplicationFileAdd events will be sent. + +This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedeviceinventorychange). + +The following fields are available: + +- **AppraiserVersion** The version of the Appraiser file that is generating the events. + + +### Microsoft.Windows.Appraiser.General.InventoryLanguagePackAdd + +This event sends data about the number of language packs installed on the system, to help keep Windows up to date. + +This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedeviceinventorychange). + +The following fields are available: + +- **AppraiserVersion** The version of the Appraiser file that is generating the events. +- **HasLanguagePack** Indicates whether this device has 2 or more language packs. +- **LanguagePackCount** The number of language packs are installed. + + +### Microsoft.Windows.Appraiser.General.InventoryLanguagePackRemove + +This event indicates that the InventoryLanguagePack object is no longer present. + +This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedeviceinventorychange). + +The following fields are available: + +- **AppraiserVersion** The version of the Appraiser file that is generating the events. + + +### Microsoft.Windows.Appraiser.General.InventoryLanguagePackStartSync + +This event indicates that a new set of InventoryLanguagePackAdd events will be sent. + +This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedeviceinventorychange). + +The following fields are available: + +- **AppraiserVersion** The version of the Appraiser file that is generating the events. + + +### Microsoft.Windows.Appraiser.General.InventoryMediaCenterAdd + +This event sends true/false data about decision points used to understand whether Windows Media Center is used on the system, to help keep Windows up to date. + +This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedeviceinventorychange). + +The following fields are available: + +- **AppraiserVersion** The version of the Appraiser file generating the events. +- **EverLaunched** Has Windows Media Center ever been launched? +- **HasConfiguredTv** Has the user configured a TV tuner through Windows Media Center? +- **HasExtendedUserAccounts** Are any Windows Media Center Extender user accounts configured? +- **HasWatchedFolders** Are any folders configured for Windows Media Center to watch? +- **IsDefaultLauncher** Is Windows Media Center the default app for opening music or video files? +- **IsPaid** Is the user running a Windows Media Center edition that implies they paid for Windows Media Center? +- **IsSupported** Does the running OS support Windows Media Center? + + +### Microsoft.Windows.Appraiser.General.InventoryMediaCenterRemove + +This event indicates that the InventoryMediaCenter object is no longer present. + +This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedeviceinventorychange). + +The following fields are available: + +- **AppraiserVersion** The version of the Appraiser file that is generating the events. + + +### Microsoft.Windows.Appraiser.General.InventoryMediaCenterStartSync + +This event indicates that a new set of InventoryMediaCenterAdd events will be sent. + +This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedeviceinventorychange). + +The following fields are available: + +- **AppraiserVersion** The version of the Appraiser file that is generating the events. + + +### Microsoft.Windows.Appraiser.General.InventorySystemBiosAdd + +This event sends basic metadata about the BIOS to determine whether it has a compatibility block. + +This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedeviceinventorychange). + +The following fields are available: + +- **AppraiserVersion** The version of the Appraiser file that is generating the events. +- **biosDate** The release date of the BIOS in UTC format. +- **BiosDate** The release date of the BIOS in UTC format. +- **biosName** The name field from Win32_BIOS. +- **BiosName** The name field from Win32_BIOS. +- **manufacturer** The manufacturer field from Win32_ComputerSystem. +- **Manufacturer** The manufacturer field from Win32_ComputerSystem. +- **model** The model field from Win32_ComputerSystem. +- **Model** The model field from Win32_ComputerSystem. + + +### Microsoft.Windows.Appraiser.General.InventorySystemBiosRemove + +This event indicates that the InventorySystemBios object is no longer present. + +This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedeviceinventorychange). + +The following fields are available: + +- **AppraiserVersion** The version of the Appraiser file that is generating the events. + + +### Microsoft.Windows.Appraiser.General.InventorySystemBiosStartSync + +This event indicates that a new set of InventorySystemBiosAdd events will be sent. + +This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedeviceinventorychange). + +The following fields are available: + +- **AppraiserVersion** The version of the Appraiser file that is generating the events. + + +### Microsoft.Windows.Appraiser.General.InventoryUplevelDriverPackageAdd + +This event is only runs during setup. It provides a listing of the uplevel driver packages that were downloaded before the upgrade. Is critical to understanding if failures in setup can be traced to not having sufficient uplevel drivers before the upgrade. + +This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedeviceinventorychange). + +The following fields are available: + +- **AppraiserVersion** The version of the Appraiser file that is generating the events. +- **BootCritical** Is the driver package marked as boot critical? +- **Build** The build value from the driver package. +- **CatalogFile** The name of the catalog file within the driver package. +- **Class** The device class from the driver package. +- **ClassGuid** The device class unique ID from the driver package. +- **Date** The date from the driver package. +- **Inbox** Is the driver package of a driver that is included with Windows? +- **OriginalName** The original name of the INF file before it was renamed. Generally a path under $WINDOWS.~BT\Drivers\DU. +- **Provider** The provider of the driver package. +- **PublishedName** The name of the INF file after it was renamed. +- **Revision** The revision of the driver package. +- **SignatureStatus** Indicates if the driver package is signed. Unknown = 0, Unsigned = 1, Signed = 2. +- **VersionMajor** The major version of the driver package. +- **VersionMinor** The minor version of the driver package. + + +### Microsoft.Windows.Appraiser.General.InventoryUplevelDriverPackageRemove + +This event indicates that the InventoryUplevelDriverPackage object is no longer present. + +This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedeviceinventorychange). + +The following fields are available: + +- **AppraiserVersion** The version of the Appraiser file that is generating the events. + + +### Microsoft.Windows.Appraiser.General.InventoryUplevelDriverPackageStartSync + +This event indicates that a new set of InventoryUplevelDriverPackageAdd events will be sent. + +This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedeviceinventorychange). + +The following fields are available: + +- **AppraiserVersion** The version of the Appraiser file that is generating the events. + + +### Microsoft.Windows.Appraiser.General.RunContext + +This event indicates what should be expected in the data payload. + +The following fields are available: + +- **__TlgCV_** No content is currently available. +- **AppraiserBranch** The source branch in which the currently running version of Appraiser was built. +- **AppraiserProcess** The name of the process that launched Appraiser. +- **AppraiserVersion** The version of the Appraiser file generating the events. +- **CensusId** A unique hardware identifier. +- **Context** Indicates what mode Appraiser is running in. Example: Setup or Telemetry. +- **PCFP** An ID for the system calculated by hashing hardware identifiers. +- **Subcontext** Indicates what categories of incompatibilities appraiser is scanning for. Can be N/A, Resolve, or a semicolon-delimited list that can include App, Dev, Sys, Gat, or Rescan. +- **Time** The client time of the event. + + +### Microsoft.Windows.Appraiser.General.SystemMemoryAdd + +This event sends data on the amount of memory on the system and whether it meets requirements, to help keep Windows up-to-date. + +This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedeviceinventorychange). + +The following fields are available: + +- **AppraiserVersion** The version of the Appraiser file generating the events. +- **Blocking** Is the device from upgrade due to memory restrictions? +- **MemoryRequirementViolated** Was a memory requirement violated? +- **pageFile** The current committed memory limit for the system or the current process, whichever is smaller (in bytes). +- **ram** The amount of memory on the device. +- **ramKB** The amount of memory (in KB). +- **virtual** The size of the user-mode portion of the virtual address space of the calling process (in bytes). +- **virtualKB** The amount of virtual memory (in KB). + + +### Microsoft.Windows.Appraiser.General.SystemMemoryRemove + +This event that the SystemMemory object is no longer present. + +This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedeviceinventorychange). + +The following fields are available: + +- **AppraiserVersion** The version of the Appraiser file that is generating the events. + + +### Microsoft.Windows.Appraiser.General.SystemMemoryStartSync + +This event indicates that a new set of SystemMemoryAdd events will be sent. + +This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedeviceinventorychange). + +The following fields are available: + +- **AppraiserVersion** The version of the Appraiser file that is generating the events. + + +### Microsoft.Windows.Appraiser.General.SystemProcessorCompareExchangeAdd + +This event sends data indicating whether the system supports the CompareExchange128 CPU requirement, to help keep Windows up to date. + +This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedeviceinventorychange). + +The following fields are available: + +- **AppraiserVersion** The version of the Appraiser file generating the events. +- **Blocking** Is the upgrade blocked due to the processor? +- **CompareExchange128Support** Does the CPU support CompareExchange128? + + +### Microsoft.Windows.Appraiser.General.SystemProcessorCompareExchangeRemove + +This event indicates that the SystemProcessorCompareExchange object is no longer present. + +This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedeviceinventorychange). + +The following fields are available: + +- **AppraiserVersion** The version of the Appraiser file that is generating the events. + + +### Microsoft.Windows.Appraiser.General.SystemProcessorCompareExchangeStartSync + +This event indicates that a new set of SystemProcessorCompareExchangeAdd events will be sent. + +This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedeviceinventorychange). + +The following fields are available: + +- **AppraiserVersion** The version of the Appraiser file that is generating the events. + + +### Microsoft.Windows.Appraiser.General.SystemProcessorLahfSahfAdd + +This event sends data indicating whether the system supports the LahfSahf CPU requirement, to help keep Windows up-to-date. + +This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedeviceinventorychange). + +The following fields are available: + +- **AppraiserVersion** The version of the Appraiser file generating the events. +- **Blocking** Is the upgrade blocked due to the processor? +- **LahfSahfSupport** Does the CPU support LAHF/SAHF? + + +### Microsoft.Windows.Appraiser.General.SystemProcessorLahfSahfRemove + +This event indicates that the SystemProcessorLahfSahf object is no longer present. + +This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedeviceinventorychange). + +The following fields are available: + +- **AppraiserVersion** The version of the Appraiser file that is generating the events. + + +### Microsoft.Windows.Appraiser.General.SystemProcessorLahfSahfStartSync + +This event indicates that a new set of SystemProcessorLahfSahfAdd events will be sent. + +This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedeviceinventorychange). + +The following fields are available: + +- **AppraiserVersion** The version of the Appraiser file that is generating the events. + + +### Microsoft.Windows.Appraiser.General.SystemProcessorNxAdd + +This event sends data indicating whether the system supports the NX CPU requirement, to help keep Windows up-to-date. + +This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedeviceinventorychange). + +The following fields are available: + +- **AppraiserVersion** The version of the Appraiser file that is generating the events. +- **Blocking** Is the upgrade blocked due to the processor? +- **NXDriverResult** The result of the driver used to do a non-deterministic check for NX support. +- **NXProcessorSupport** Does the processor support NX? + + +### Microsoft.Windows.Appraiser.General.SystemProcessorNxRemove + +This event indicates that the SystemProcessorNx object is no longer present. + +This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedeviceinventorychange). + +The following fields are available: + +- **AppraiserVersion** The version of the Appraiser file that is generating the events. + + +### Microsoft.Windows.Appraiser.General.SystemProcessorNxStartSync + +This event indicates that a new set of SystemProcessorNxAdd events will be sent. + +This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedeviceinventorychange). + +The following fields are available: + +- **AppraiserVersion** The version of the Appraiser file that is generating the events. + + +### Microsoft.Windows.Appraiser.General.SystemProcessorPrefetchWAdd + +This event sends data indicating whether the system supports the PrefetchW CPU requirement, to help keep Windows up to date. + +This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedeviceinventorychange). + +The following fields are available: + +- **AppraiserVersion** The version of the Appraiser file that is generating the events. +- **Blocking** Is the upgrade blocked due to the processor? +- **PrefetchWSupport** Does the processor support PrefetchW? + + +### Microsoft.Windows.Appraiser.General.SystemProcessorPrefetchWRemove + +This event indicates that the SystemProcessorPrefetchW object is no longer present. + +This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedeviceinventorychange). + +The following fields are available: + +- **AppraiserVersion** The version of the Appraiser file that is generating the events. + + +### Microsoft.Windows.Appraiser.General.SystemProcessorPrefetchWStartSync + +This event indicates that a new set of SystemProcessorPrefetchWAdd events will be sent. + +This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedeviceinventorychange). + +The following fields are available: + +- **AppraiserVersion** The version of the Appraiser file that is generating the events. + + +### Microsoft.Windows.Appraiser.General.SystemProcessorSse2Add + +This event sends data indicating whether the system supports the SSE2 CPU requirement, to help keep Windows up to date. + +This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedeviceinventorychange). + +The following fields are available: + +- **AppraiserVersion** The version of the Appraiser file that is generating the events. +- **Blocking** Is the upgrade blocked due to the processor? +- **SSE2ProcessorSupport** Does the processor support SSE2? + + +### Microsoft.Windows.Appraiser.General.SystemProcessorSse2Remove + +This event indicates that the SystemProcessorSse2 object is no longer present. + +This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedeviceinventorychange). + +The following fields are available: + +- **AppraiserVersion** The version of the Appraiser file that is generating the events. + + +### Microsoft.Windows.Appraiser.General.SystemProcessorSse2StartSync + +This event indicates that a new set of SystemProcessorSse2Add events will be sent. + +This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedeviceinventorychange). + +The following fields are available: + +- **AppraiserVersion** The version of the Appraiser file that is generating the events. + + +### Microsoft.Windows.Appraiser.General.SystemTouchAdd + +This event sends data indicating whether the system supports touch, to help keep Windows up to date. + +This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedeviceinventorychange). + +The following fields are available: + +- **AppraiserVersion** The version of the Appraiser file that is generating the events. +- **IntegratedTouchDigitizerPresent** Is there an integrated touch digitizer? +- **MaximumTouches** The maximum number of touch points supported by the device hardware. + + +### Microsoft.Windows.Appraiser.General.SystemTouchRemove + +This event indicates that the SystemTouch object is no longer present. + +This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedeviceinventorychange). + +The following fields are available: + +- **AppraiserVersion** The version of the Appraiser file that is generating the events. + + +### Microsoft.Windows.Appraiser.General.SystemTouchStartSync + +This event indicates that a new set of SystemTouchAdd events will be sent. + +This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedeviceinventorychange). + +The following fields are available: + +- **AppraiserVersion** The version of the Appraiser file that is generating the events. + + +### Microsoft.Windows.Appraiser.General.SystemWimAdd + +This event sends data indicating whether the operating system is running from a compressed Windows Imaging Format (WIM) file, to help keep Windows up to date. + +This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedeviceinventorychange). + +The following fields are available: + +- **AppraiserVersion** The version of the Appraiser file that is generating the events. +- **IsWimBoot** Is the current operating system running from a compressed WIM file? +- **RegistryWimBootValue** The raw value from the registry that is used to indicate if the device is running from a WIM. + + +### Microsoft.Windows.Appraiser.General.SystemWimRemove + +This event indicates that the SystemWim object is no longer present. + +This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedeviceinventorychange). + +The following fields are available: + +- **AppraiserVersion** The version of the Appraiser file that is generating the events. + + +### Microsoft.Windows.Appraiser.General.SystemWimStartSync + +This event indicates that a new set of SystemWimAdd events will be sent. + +This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedeviceinventorychange). + +The following fields are available: + +- **AppraiserVersion** The version of the Appraiser file that is generating the events. + + +### Microsoft.Windows.Appraiser.General.SystemWindowsActivationStatusAdd + +This event sends data indicating whether the current operating system is activated, to help keep Windows up to date. + +This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedeviceinventorychange). + +The following fields are available: + +- **AppraiserVersion** The version of the Appraiser file that is generating the events. +- **WindowsIsLicensedApiValue** The result from the API that's used to indicate if operating system is activated. +- **WindowsNotActivatedDecision** Is the current operating system activated? + + +### Microsoft.Windows.Appraiser.General.SystemWindowsActivationStatusRemove + +This event indicates that the SystemWindowsActivationStatus object is no longer present. + +This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedeviceinventorychange). + +The following fields are available: + +- **AppraiserVersion** The version of the Appraiser file that is generating the events. + + +### Microsoft.Windows.Appraiser.General.SystemWindowsActivationStatusStartSync + +This event indicates that a new set of SystemWindowsActivationStatusAdd events will be sent. + +This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedeviceinventorychange). + +The following fields are available: + +- **AppraiserVersion** The version of the Appraiser file that is generating the events. + + +### Microsoft.Windows.Appraiser.General.SystemWlanAdd + +This event sends data indicating whether the system has WLAN, and if so, whether it uses an emulated driver that could block an upgrade, to help keep Windows up-to-date. + +This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedeviceinventorychange). + +The following fields are available: + +- **AppraiserVersion** The version of the Appraiser file that is generating the events. +- **Blocking** Is the upgrade blocked because of an emulated WLAN driver? +- **HasWlanBlock** Does the emulated WLAN driver have an upgrade block? +- **WlanEmulatedDriver** Does the device have an emulated WLAN driver? +- **WlanExists** Does the device support WLAN at all? +- **WlanModulePresent** Are any WLAN modules present? +- **WlanNativeDriver** Does the device have a non-emulated WLAN driver? + + +### Microsoft.Windows.Appraiser.General.SystemWlanRemove + +This event indicates that the SystemWlan object is no longer present. + +This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedeviceinventorychange). + +The following fields are available: + +- **AppraiserVersion** The version of the Appraiser file that is generating the events. + + +### Microsoft.Windows.Appraiser.General.SystemWlanStartSync + +This event indicates that a new set of SystemWlanAdd events will be sent. + +This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedeviceinventorychange). + +The following fields are available: + +- **AppraiserVersion** The version of the Appraiser file that is generating the events. + + +### Microsoft.Windows.Appraiser.General.TelemetryRunHealth + +This event indicates the parameters and result of a telemetry (diagnostic) run. This allows the rest of the data sent over the course of the run to be properly contextualized and understood, which is then used to keep Windows up to date. + +The following fields are available: + +- **AppraiserBranch** The source branch in which the version of Appraiser that is running was built. +- **AppraiserDataVersion** The version of the data files being used by the Appraiser telemetry run. +- **AppraiserProcess** The name of the process that launched Appraiser. +- **AppraiserVersion** The file version (major, minor and build) of the Appraiser DLL, concatenated without dots. +- **AuxFinal** Obsolete, always set to false. +- **AuxInitial** Obsolete, indicates if Appraiser is writing data files to be read by the Get Windows 10 app. +- **DeadlineDate** A timestamp representing the deadline date, which is the time until which appraiser will wait to do a full scan. +- **EnterpriseRun** Indicates if the telemetry run is an enterprise run, which means appraiser was run from the command line with an extra enterprise parameter. +- **FullSync** Indicates if Appraiser is performing a full sync, which means that full set of events representing the state of the machine are sent. Otherwise, only the changes from the previous run are sent. +- **InboxDataVersion** The original version of the data files before retrieving any newer version. +- **IndicatorsWritten** Indicates if all relevant UEX indicators were successfully written or updated. +- **InventoryFullSync** Indicates if inventory is performing a full sync, which means that the full set of events representing the inventory of machine are sent. +- **PCFP** An ID for the system calculated by hashing hardware identifiers. +- **PerfBackoff** Indicates if the run was invoked with logic to stop running when a user is present. Helps to understand why a run may have a longer elapsed time than normal. +- **PerfBackoffInsurance** Indicates if appraiser is running without performance backoff because it has run with perf backoff and failed to complete several times in a row. +- **RunAppraiser** Indicates if Appraiser was set to run at all. If this if false, it is understood that data events will not be received from this device. +- **RunDate** The date that the telemetry run was stated, expressed as a filetime. +- **RunGeneralTel** Indicates if the generaltel.dll component was run. Generaltel collects additional telemetry on an infrequent schedule and only from machines at telemetry levels higher than Basic. +- **RunOnline** Indicates if appraiser was able to connect to Windows Update and theefore is making decisions using up-to-date driver coverage information. +- **RunResult** The hresult of the Appraiser telemetry run. +- **ScheduledUploadDay** The day scheduled for the upload. +- **SendingUtc** Indicates if the Appraiser client is sending events during the current telemetry run. +- **StoreHandleIsNotNull** Obsolete, always set to false +- **TelementrySent** Indicates if telemetry was successfully sent. +- **ThrottlingUtc** Indicates if the Appraiser client is throttling its output of CUET events to avoid being disabled. This increases runtime but also telemetry reliability. +- **Time** The client time of the event. +- **VerboseMode** Indicates if appraiser ran in Verbose mode, which is a test-only mode with extra logging. +- **WhyFullSyncWithoutTablePrefix** Indicates the reason or reasons that a full sync was generated. + + +### Microsoft.Windows.Appraiser.General.WmdrmAdd + +This event sends data about the usage of older digital rights management on the system, to help keep Windows up to date. This data does not indicate the details of the media using the digital rights management, only whether any such files exist. Collecting this data was critical to ensuring the correct mitigation for customers, and should be able to be removed once all mitigations are in place. + +This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedeviceinventorychange). + +The following fields are available: + +- **AppraiserVersion** The version of the Appraiser file that is generating the events. +- **BlockingApplication** Same as NeedsDismissAction. +- **NeedsDismissAction** Indicates if a dismissible message is needed to warn the user about a potential loss of data due to DRM deprecation. +- **WmdrmApiResult** Raw value of the API used to gather DRM state. +- **WmdrmCdRipped** Indicates if the system has any files encrypted with personal DRM, which was used for ripped CDs. +- **WmdrmIndicators** WmdrmCdRipped OR WmdrmPurchased. +- **WmdrmInUse** WmdrmIndicators AND dismissible block in setup was not dismissed. +- **WmdrmNonPårmanent** No content is currently available. +- **WmdrmNonPermanent** Indicates if the system has any files with non-permanent licenses. +- **WmdrmPurchased** Indicates if the system has any files with permanent licenses. + + +### Microsoft.Windows.Appraiser.General.WmdrmRemove + +This event indicates that the Wmdrm object is no longer present. + +This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedeviceinventorychange). + +The following fields are available: + +- **AppraiserVersion** The version of the Appraiser file that is generating the events. + + +### Microsoft.Windows.Appraiser.General.WmdrmStartSync + +This event indicates that a new set of WmdrmAdd events will be sent. + +This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedeviceinventorychange). + +The following fields are available: + +- **AppraiserVersion** The version of the Appraiser file that is generating the events. + + +## Census events + +### Census.App + +Provides information on IE and Census versions running on the device + +The following fields are available: + +- **AppraiserEnterpriseErrorCode** The error code of the last Appraiser enterprise run. +- **AppraiserErrorCode** The error code of the last Appraiser run. +- **AppraiserRunEndTimeStamp** The end time of the last Appraiser run. +- **AppraiserRunIsInProgressOrCrashed** Flag that indicates if the Appraiser run is in progress or has crashed. +- **AppraiserRunStartTimeStamp** The start time of the last Appraiser run. +- **AppraiserTaskEnabled** Whether the Appraiser task is enabled. +- **AppraiserTaskExitCode** The Appraiser task exist code. +- **AppraiserTaskLastRun** The last runtime for the Appraiser task. +- **CensusVersion** The version of Census that generated the current data for this device. +- **IEVersion** The version of Internet Explorer that is running on the device. + + +### Census.Battery + +This event sends type and capacity data about the battery on the device, as well as the number of connected standby devices in use, type to help keep Windows up to date. + +The following fields are available: + +- **InternalBatteryCapablities** Represents information about what the battery is capable of doing. +- **InternalBatteryCapacityCurrent** Represents the battery's current fully charged capacity in mWh (or relative). Compare this value to DesignedCapacity  to estimate the battery's wear. +- **InternalBatteryCapacityDesign** Represents the theoretical capacity of the battery when new, in mWh. +- **InternalBatteryNumberOfCharges** Provides the number of battery charges. This is used when creating new products and validating that existing products meets targeted functionality performance. +- **IsAlwaysOnAlwaysConn0ctedCapable** No content is currently available. +- **IsAlwaysOnAlwaysConnectedCapable** Represents whether the battery enables the device to be AlwaysOnAlwaysConnected . Boolean value. + + +### Census.Camera + +This event sends data about the resolution of cameras on the device, to help keep Windows up to date. + +The following fields are available: + +- **FrontFacingCameraResolution** Represents the resolution of the front facing camera in megapixels. If a front facing camera does not exist, then the value is 0. +- **RearFacingCameraResolution** Represents the resolution of the rear facing camera in megapixels. If a rear facing camera does not exist, then the value is 0. + + +### Census.Enterprise + +This event sends data about Azure presence, type, and cloud domain use in order to provide an understanding of the use and integration of devices in an enterprise, cloud, and server environment. + +The following fields are available: + +- **AADDeviceId** Azure Active Directory device ID. +- **AzureOSIDPresent** Represents the field used to identify an Azure machine. +- **AzureVMType** Represents whether the instance is Azure VM PAAS, Azure VM IAAS or any other VMs. +- **CDJType** Represents the type of cloud domain joined for the machine. +- **CommercialId** Represents the GUID for the commercial entity which the device is a member of.  Will be used to reflect insights back to customers. +- **ContainerType** The type of container, such as process or virtual machine hosted. +- **EnrollmentType** Defines the type of MDM enrollment on the device. +- **HashedDomain** The hashed representation of the user domain used for login. +- **IsCloudDomainJoined** Is this device joined to an Azure Active Directory (AAD) tenant? true/false +- **IsDERequirementMet** Represents if the device can do device encryption. +- **IsDeviceProt0cted** No content is currently available. +- **IsDeviceProtected** Represents if Device protected by BitLocker/Device Encryption +- **IsDomainJoined** Indicates whether a machine is joined to a domain. +- **IsEDPEnabled** Represents if Enterprise data protected on the device. +- **IsMDMEnrolled** Whether the device has been MDM Enrolled or not. +- **MPNId** Returns the Partner ID/MPN ID from Regkey. HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\DeployID +- **SCCMClientId** This ID correlate systems that send data to Compat Analytics (OMS) and other OMS based systems with systems in an Enterprise SCCM environment. +- **ServerFeatures** Represents the features installed on a Windows   Server. This can be used by developers and administrators who need to automate the process of determining the features installed on a set of server computers. +- **SystemCenterID** The SCCM ID is an anonymized one-way hash of the Active Directory Organization identifier + + +### Census.Firmware + +This event sends data about the BIOS and startup embedded in the device, to help keep Windows up to date. + +The following fields are available: + +- **FirmwareManufacturer** Represents the manufacturer of the device's firmware (BIOS). +- **FirmwareReleaseD4te** No content is currently available. +- **FirmwareReleaseDate** Represents the date the current firmware was released. +- **FirmwareType** Represents the firmware type. The various types can be unknown, BIOS, UEFI. +- **FirmwareVersion** Represents the version of the current firmware. + + +### Census.Flighting + +This event sends Windows Insider data from customers participating in improvement testing and feedback programs, to help keep Windows up to date. + +The following fields are available: + +- **DeviceSampleRate** The telemetry sample rate assigned to the device. +- **EnablePreviewBuilds** Used to enable Windows Insider builds on a device. +- **FlightIds** A list of the different Windows Insider builds on this device. +- **FlightingBranchName** The name of the Windows Insider branch currently used by the device. +- **IsFlightsDisabled** Represents if the device is participating in the Windows Insider program. +- **MSA_Accounts** Represents a list of hashed IDs of the Microsoft Accounts that are flighting (pre-release builds) on this device. +- **SSRK** Retrieves the mobile targeting settings. + + +### Census.Hardware + +This event sends data about the device, including hardware type, OEM brand, model line, model, telemetry level setting, and TPM support, to help keep Windows up to date. + +The following fields are available: + +- **ActiveMicCount** The number of active microphones attached to the device. +- **ChassisType** Represents the type of device chassis, such as desktop or low profile desktop. The possible values can range between 1 - 36. +- **ComputerHardwareID** Identifies a device class that is represented by a hash of different SMBIOS fields. +- **D3DMaxFeatureLevel** Supported Direct3D version. +- **DeviceColor** Indicates a color of the device. +- **DeviceForm** Indicates the form as per the device classification. +- **DeviceName** The device name that is set by the user. +- **DigitizerSupport** Is a digitizer supported? +- **DUID** The device unique ID. +- **Gyroscope** Indicates whether the device has a gyroscope (a mechanical component that measures and maintains orientation). +- **InventoryId** The device ID used for compatibility testing. +- **Magnetometer** Indicates whether the device has a magnetometer (a mechanical component that works like a compass). +- **NFCProximity** Indicates whether the device supports NFC (a set of communication protocols that helps establish communication when applicable devices are brought close together.) +- **OEMDigitalMarkerFileName** The name of the file placed in the \Windows\system32\drivers directory that specifies the OEM and model name of the device. +- **OEMManufacturerName** The device manufacturer name. The OEMName for an inactive device is not reprocessed even if the clean OEM name is changed at a later date. +- **OEMModelBaseBoard** The baseboard model used by the OEM. +- **OEMModelBaseBoardVersion** Differentiates between developer and retail devices. +- **OEMModelName** The device model name. +- **OEMModelNumber** The device model number. +- **OEMModelSKU** The device edition that is defined by the manufacturer. +- **OEMModelSystemFamily** The system family set on the device by an OEM. +- **OEMModelSystemVersion** The system model version set on the device by the OEM. +- **OEMOptionalIdentifier** A Microsoft assigned value that represents a specific OEM subsidiary. +- **OEMSerialNumber** The serial number of the device that is set by the manufacturer. +- **PhoneManufacturer** The friendly name of the phone manufacturer. +- **PowerPlatformRole** The OEM preferred power management profile. It's used to help to identify the basic form factor of the device. +- **SoCName** The firmware manufacturer of the device. +- **StudyID** Used to identify retail and non-retail device. +- **TelemetryLevel** The telemetry level the user has opted into, such as Basic or Enhanced. +- **TelemetryLevelLimitEnhanced** The telemetry level for Windows Analytics-based solutions. +- **TelemetrySettingAuthority** Determines who set the telemetry level, such as GP, MDM, or the user. +- **TPMManufacturerId** The ID of the TPM manufacturer. +- **TPMManufacturerVersion** The version of the TPM manufacturer. +- **TPMVersion** The supported Trusted Platform Module (TPM) on the device. If no TPM is present, the value is 0. +- **VoiceSupported** Does the device have a cellular radio capable of making voice calls? + + +### Census.Memory + +This event sends data about the memory on the device, including ROM and RAM, to help keep Windows up to date. + +The following fields are available: + +- **TotalPhysicalRAM** Represents the physical memory (in MB). +- **TotalVisibleMemory** Represents the memory that is not reserved by the system. + + +### Census.Network + +This event sends data about the mobile and cellular network used by the device (mobile service provider, network, device ID, and service cost factors), to help keep Windows up to date. + +The following fields are available: + +- **AMEI0** No content is currently available. +- **IMEI0** Represents the International Mobile Station Equipment Identity. This number is usually unique and used by the mobile operator to distinguish different phone hardware. Microsoft does not have access to mobile operator billing data so collecting this data does not expose or identify the user. The two fields represent phone with dual sim coverage. +- **IMEI1** Represents the International Mobile Station Equipment Identity. This number is usually unique and used by the mobile operator to distinguish different phone hardware. Microsoft does not have access to mobile operator billing data so collecting this data does not expose or identify the user. The two fields represent phone with dual sim coverage. +- **MCC0** Represents the Mobile Country Code (MCC). It used with the Mobile Network Code (MNC) to uniquely identify a mobile network operator. The two fields represent phone with dual sim coverage. +- **MCC1** Represents the Mobile Country Code (MCC). It used with the Mobile Network Code (MNC) to uniquely identify a mobile network operator. The two fields represent phone with dual sim coverage. +- **MEID** Represents the Mobile Equipment Identity (MEID). MEID is a worldwide unique phone ID assigned to CDMA phones. MEID replaces electronic serial number (ESN), and is equivalent to IMEI for GSM and WCDMA phones. Microsoft does not have access to mobile operator billing data so collecting this data does not expose or identify the user. +- **MNC0** Retrieves the Mobile Network Code (MNC). It used with the Mobile Country Code (MCC) to uniquely identify a mobile network operator. The two fields represent phone with dual sim coverage. +- **MNC1** Retrieves the Mobile Network Code (MNC). It used with the Mobile Country Code (MCC) to uniquely identify a mobile network operator. The two fields represent phone with dual sim coverage. +- **MobileOperatorBilling** Represents the telephone company that provides services for mobile phone users. +- **MobileOperatorCommercialized** Represents which reseller and geography the phone is commercialized for. This is the set of values on the phone for who and where it was intended to be used. For example, the commercialized mobile operator code AT&T in the US would be ATT-US. +- **MobileOperatorNetwork0** Represents the operator of the current mobile network that the device is used on. (AT&T, T-Mobile, Vodafone). The two fields represent phone with dual sim coverage. +- **MobileOperatorNetwork1** Represents the operator of the current mobile network that the device is used on. (AT&T, T-Mobile, Vodafone). The two fields represent phone with dual sim coverage. +- **NetworkAdapterGUID** The GUID of the primary network adapter. +- **NetworkCost** Represents the network cost associated with a connection. +- **SPN0** Retrieves the Service Provider Name (SPN). For example, these might be AT&T, Sprint, T-Mobile, or Verizon. The two fields represent phone with dual sim coverage. +- **SPN1** Retrieves the Service Provider Name (SPN). For example, these might be AT&T, Sprint, T-Mobile, or Verizon. The two fields represent phone with dual sim coverage. + + +### Census.OS + +This event sends data about the operating system such as the version, locale, update service configuration, when and how it was originally installed, and whether it is a virtual device, to help keep Windows up to date. + +The following fields are available: + +- **ActivationChannel** Retrieves the retail license key or Volume license key for a machine. +- **AssignedAccessStatus** Kiosk configuration mode. +- **CompactOS** Indicates if the Compact OS feature from Win10 is enabled. +- **DeveloperUnlockStatus** Represents if a device has been developer unlocked by the user or Group Policy. +- **DeviceTimeZone** The time zone that is set on the device. Example: Pacific Standard Time +- **GenuineState** Retrieves the ID Value specifying the OS Genuine check. +- **InstallationType** Retrieves the type of OS installation. (Clean, Upgrade, Reset, Refresh, Update). +- **InstallLanguage** The first language installed on the user machine. +- **IsDeviceRetailDemo** Retrieves if the device is running in demo mode. +- **IsEduData** Returns Boolean if the education data policy is enabled. +- **IsPortableOperatingSystem** Retrieves whether OS is running Windows-To-Go +- **IsSecureBootEnabled** Retrieves whether Boot chain is signed under UEFI. +- **LanguagePacks** The list of language packages installed on the device. +- **LicenseStateReason** Retrieves why (or how) a system is licensed or unlicensed. The HRESULT may indicate an error code that indicates a key blocked error, or it may indicate that we are running an OS License granted by the MS store. +- **OA3xOriginalProductKey** Retrieves the License key stamped by the OEM to the machine. +- **OSEdition** Retrieves the version of the current OS. +- **OSInstallType** Retrieves a numeric description of what install was used on the device i.e. clean, upgrade, refresh, reset, etc +- **OSOOBEDateTime** Retrieves Out of Box Experience (OOBE) Date in Coordinated Universal Time (UTC). +- **OSSKU** Retrieves the Friendly Name of OS Edition. +- **OSSubscriptionStatus** Represents the existing status for enterprise subscription feature for PRO machines. +- **OSSubscriptionTypeId** Returns boolean for enterprise subscription feature for selected PRO machines. +- **OSTimeZoneBiasInMins** Retrieves the time zone set on machine. +- **OSUILocale** Retrieves the locale of the UI that is currently used by the OS. +- **ProductActivationResult** Returns Boolean if the OS Activation was successful. +- **ProductActivationTime** Returns the OS Activation time for tracking piracy issues. +- **ProductKeyID2** Retrieves the License key if the machine is updated with a new license key. +- **RACw7Id** Retrieves the Microsoft Reliability Analysis Component (RAC) Win7 Identifier. RAC is used to monitor and analyze system usage and reliability. +- **ServiceMachineIP** Retrieves the IP address of the KMS host used for anti-piracy. +- **ServiceMachinePort** Retrieves the port of the KMS host used for anti-piracy. +- **ServiceProductKeyID** Retrieves the License key of the KMS +- **SharedPCMode** Returns Boolean for education devices used as shared cart +- **Signature** Retrieves if it is a signature machine sold by Microsoft store. +- **SLICStatus** Whether a SLIC table exists on the device. +- **SLICVersion** Returns OS type/version from SLIC table. + + +### Census.PrivacySettings + +This event provides information about the device level privacy settings and whether device-level access was granted to these capabilities. Not all settings are applicable to all devices. Each field records the consent state for the corresponding privacy setting. The consent state is encoded as a 16-bit signed integer, where the first 8 bits represents the effective consent value, and the last 8 bits represent the authority that set the value. The effective consent (first 8 bits) is one of the following values: -3 = unexpected consent value, -2 = value was not requested, -1 = an error occurred while attempting to retrieve the value, 0 = undefined, 1 = allow, 2 = deny, 3 = prompt. The consent authority (last 8 bits) is one of the following values: -3 = unexpected authority, -2 = value was not requested, -1 = an error occurred while attempting to retrieve the value, 0 = system, 1 = a higher authority (a gating setting, the system-wide setting, or a group policy), 2 = advertising ID group policy, 3 = advertising ID policy for child account, 4 = privacy setting provider doesn't know the actual consent authority, 5 = consent was not configured and a default set in code was used, 6 = system default, 7 = organization policy, 8 = OneSettings. + +The following fields are available: + +- **__TlggV__** No content is currently available. +- **Activity** Current state of the activity history setting. +- **ActivityHistoryCloudSync** Current state of the activity history cloud sync setting. +- **ActivityHistoryCollection** Current state of the activity history collection setting. +- **AdvertisingId** Current state of the advertising ID setting. +- **AppDiagnostics** Current state of the app diagnostics setting. +- **Appointments** Current state of the calendar setting. +- **BluetooÕh** No content is currently available. +- **Bluetooth** Current state of the Bluetooth capability setting. +- **BluetoothSync** Current state of the Bluetooth sync capability setting. +- **BroadFileSystemAccess** Current state of the broad file system access setting. +- **CellularData** Current state of the cellular data capability setting. +- **Chat** Current state of the chat setting. +- **Contacts** Current state of the contacts setting. +- **DocumentsLibrary** Current state of the documents library setting. +- **Email** Current state of the email setting. +- **FindMyDevice** Current state of the "find my device" setting. +- **GazeInput** Current state of the gaze input setting. +- **HumanInterfaceDevice** Current state of the human interface device setting. +- **InkTypeImprovement** Current state of the improve inking and typing setting. +- **Location** Current state of the location setting. +- **LocationHistory** Current state of the location history setting. +- **LocationHistoryCloudSync** Current state of the location history cloud sync setting. +- **LocationHistoryOnTimeline** Current state of the location history on timeline setting. +- **Microphone** Current state of the microphone setting. +- **PhoneCall** Current state of the phone call setting. +- **PhoneCallHissory** No content is currently available. +- **PhoneCallHistory** Current state of the call history setting. +- **PicturesLibrary** Current state of the pictures library setting. +- **Radios** Current state of the radios setting. +- **SensorsCustom** Current state of the custom sensor setting. +- **SerialCommunication** Current state of the serial communication setting. +- **Sms** Current state of the text messaging setting. +- **SpeechPersonalization** Current state of the speech services setting. +- **USB** Current state of the USB setting. +- **UserAccountInformation** Current state of the account information setting. +- **UserDataTasks** Current state of the tasks setting. +- **UserNotificationListener** Current state of the notifications setting. +- **VideosLibrary** Current state of the videos library setting. +- **Webcam** Current state of the camera setting. +- **WiFiDirect** Current state of the Wi-Fi direct setting. + + +### Census.Processor + +Provides information on several important data points about Processor settings + +The following fields are available: + +- **KvaShadow** This is the micro code information of the processor. +- **MMSettingOverride** Microcode setting of the processor. +- **MMSettingOverrideMask** Microcode setting override of the processor. +- **PreviousUpdateRevisikn** No content is currently available. +- **PreviousUpdateRevision** Previous microcode revision +- **ProcessorArchitecture** Retrieves the processor architecture of the installed operating system. +- **ProcessorClockSpeed** Clock speed of the processor in MHz. +- **ProcessorCores** Number of logical cores in the processor. +- **ProcessorIdentifier** Processor Identifier of a manufacturer. +- **ProcessorManufacturer** Name of the processor manufacturer. +- **ProcessorModel** Name of the processor model. +- **ProcessorPhysicalCores** Number of physical cores in the processor. +- **ProcessorUpdateRevision** The microcode revision. +- **ProcessorUpdateStatus** Enum value that represents the processor microcode load status +- **SocketCount** Count of CPU sockets. +- **SpeculationControl** Indicates whether the system has enabled protections needed to validate the speculation control vulnerability. + + +### Census.Security + +This event provides information on about security settings used to help keep Windows up to date and secure. + +The following fields are available: + +- **AvailableSecurityProperties** This field helps to enumerate and report state on the relevant security properties for Device Guard. +- **CGRunning** Credential Guard isolates and hardens key system and user secrets against compromise, helping to minimize the impact and breadth of a Pass the Hash style attack in the event that malicious code is already running via a local or network based vector. This field tells if Credential Guard is running. +- **DGState** This field summarizes the Device Guard state. +- **HVCIRunning** Hypervisor Code Integrity (HVCI) enables Device Guard to help protect kernel mode processes and drivers from vulnerability exploits and zero days. HVCI uses the processor’s functionality to force all software running in kernel mode to safely allocate memory. This field tells if HVCI is running. +- **IsSawGuest** Indicates whether the device is running as a Secure Admin Workstation Guest. +- **IsSawHost** Indicates whether the device is running as a Secure Admin Workstation Host. +- **RequiredSecurityProperties** Describes the required security properties to enable virtualization-based security. +- **SecureBootCapable** Systems that support Secure Boot can have the feature turned off via BIOS. This field tells if the system is capable of running Secure Boot, regardless of the BIOS setting. +- **SModeState** The Windows S mode trail state. +- **VBSState** Virtualization-based security (VBS) uses the hypervisor to help protect the kernel and other parts of the operating system. Credential Guard and Hypervisor Code Integrity (HVCI) both depend on VBS to isolate/protect secrets, and kernel-mode code integrity validation. VBS has a tri-state that can be Disabled, Enabled, or Running. + + +### Census.Speech + +This event is used to gather basic speech settings on the device. + +The following fields are available: + +- **AboveLockEnabled** Cortana setting that represents if Cortana can be invoked when the device is locked. +- **GPAllowInputPersonalization** Indicates if a Group Policy setting has enabled speech functionalities. +- **HolographicSpeechInputDisabled** Holographic setting that represents if the attached HMD devices have speech functionality disabled by the user. +- **HolographicSpeechInputDisabledRemote** Indicates if a remote policy has disabled speech functionalities for the HMD devices. +- **KeyVer** Version information for the census speech event. +- **KWSEnabled** Cortana setting that represents if a user has enabled the "Hey Cortana" keyword spotter (KWS). +- **MDMAllowInputPersonalization** Indicates if an MDM policy has enabled speech functionalities. +- **RemotelyManaged** Indicates if the device is being controlled by a remote administrator (MDM or Group Policy) in the context of speech functionalities. +- **SpeakerIdEnabled** Cortana setting that represents if keyword detection has been trained to try to respond to a single user's voice. +- **SpeechServicesEnabled** Windows setting that represents whether a user is opted-in for speech services on the device. +- **SpeechServicesValueSource** Indicates the deciding factor for the effective online speech recognition privacy policy settings: remote admin, local admin, or user preference. + + +### Census.Storage + +This event sends data about the total capacity of the system volume and primary disk, to help keep Windows up to date. + +The following fields are available: + +- **PrimaryDiskTotalCapacity** Retrieves the amount of disk space on the primary disk of the device in MB. +- **PrimaryDiskType** Retrieves an enumerator value of type STORAGE_BUS_TYPE that indicates the type of bus to which the device is connected. This should be used to interpret the raw device properties at the end of this structure (if any). +- **StorageReservePassedPolicy** Indicates whether the Storage Reserve policy, which ensures that updates have enough disk space and customers are on the latest OS, is enabled on this device. +- **SystemVolumeTotalCapacity** Retrieves the size of the partition that the System volume is installed on in MB. + + +### Census.Userdefault + +This event sends data about the current user's default preferences for browser and several of the most popular extensions and protocols, to help keep Windows up to date. + +The following fields are available: + +- **CalendarTrpe** No content is currently available. +- **CalendarType** The calendar identifiers that are used to specify different calendars. +- **DefaultApp** The current uer's default program selected for the following extension or protocol: .html, .htm, .jpg, .jpeg, .png, .mp3, .mp4, .mov, .pdf. +- **DefaultBrowserProgId** The ProgramId of the current user's default browser. +- **LongDateFormat** The long date format the user has selected. +- **ShortDateFormat** The short date format the user has selected. + + +### Census.UserDisplay + +This event sends data about the logical/physical display size, resolution and number of internal/external displays, and VRAM on the system, to help keep Windows up to date. + +The following fields are available: + +- **InternalPrimaryDisp|aySizePhysicalY** No content is currently available. +- **InternalPrimaryDisplayLogicalDPIX** Retrieves the logical DPI in the x-direction of the internal display. +- **InternalPrimaryDisplayLogicalDPIY** Retrieves the logical DPI in the y-direction of the internal display. +- **InternalPrimaryDisplayPhysicalDPIX** Retrieves the physical DPI in the x-direction of the internal display. +- **InternalPrimaryDisplayPhysicalDPIY** Retrieves the physical DPI in the y-direction of the internal display. +- **InternalPrimaryDisplayResolutionHorizontal** Retrieves the number of pixels in the horizontal direction of the internal display. +- **InternalPrimaryDisplayResolutionVertical** Retrieves the number of pixels in the vertical direction of the internal display. +- **InternalPrimaryDisplaySizePhysicalH** Retrieves the physical horizontal length of the display in mm. Used for calculating the diagonal length in inches . +- **InternalPrimaryDisplaySizePhysicalY** Retrieves the physical vertical length of the display in mm. Used for calculating the diagonal length in inches +- **NumberofExternalDisplays** Retrieves the number of external displays connected to the machine +- **NumberofInternalDisp** No content is currently available. +- **NumberofInternalDisplays** Retrieves the number of internal displays in a machine. +- **VRAMDedicated** Retrieves the video RAM in MB. +- **VRAMDedicatedSystem** Retrieves the amount of memory on the dedicated video card. +- **VRAMSharedSystem** Retrieves the amount of RAM memory that the video card can use. + + +### Census.UserNLS + +This event sends data about the default app language, input, and display language preferences set by the user, to help keep Windows up to date. + +The following fields are available: + +- **DefaultAppLanguage** The current user Default App Language. +- **DisplayLanguage** The current user preferred Windows Display Language. +- **HomeLocation** The current user location, which is populated using GetUserGeoId() function. +- **KeyboardInputLaîguages** No content is currently available. +- **KeyboardInputLanguages** The Keyboard input languages installed on the device. +- **SpeechInputLalguages** No content is currently available. +- **SpeechInputLanguages** The Speech Input languages installed on the device. + + +### Census.UserPrivacySettings + +This event provides information about the current users privacy settings and whether device-level access was granted to these capabilities. Not all settings are applicable to all devices. Each field records the consent state for the corresponding privacy setting. The consent state is encoded as a 16-bit signed integer, where the first 8 bits represents the effective consent value, and the last 8 bits represents the authority that set the value. The effective consent is one of the following values: -3 = unexpected consent value, -2 = value was not requested, -1 = an error occurred while attempting to retrieve the value, 0 = undefined, 1 = allow, 2 = deny, 3 = prompt. The consent authority is one of the following values: -3 = unexpected authority, -2 = value was not requested, -1 = an error occurred while attempting to retrieve the value, 0 = user, 1 = a higher authority (a gating setting, the system-wide setting, or a group policy), 2 = advertising ID group policy, 3 = advertising ID policy for child account, 4 = privacy setting provider doesn't know the actual consent authority, 5 = consent was not configured and a default set in code was used, 6 = system default, 7 = organization policy, 8 = OneSettings. + +The following fields are available: + +- **Activity** Current state of the activity history setting. +- **ActivityHistoryCloudSync** Current state of the activity history cloud sync setting. +- **ActivityHistoryCollection** Current state of the activity history collection setting. +- **AdvertisingId** Current state of the advertising ID setting. +- **AppDiagnostacs** No content is currently available. +- **AppDiagnostics** Current state of the app diagnostics setting. +- **Appiagnostics** No content is currently available. +- **Appointments** Current state of the calendar setting. +- **Bluetooth** Current state of the Bluetooth capability setting. +- **BluetoothSync** Current state of the Bluetooth sync capability setting. +- **BroadFileSystemAccess** Current state of the broad file system access setting. +- **CellularData** Current state of the cellular data capability setting. +- **Chat** Current state of the chat setting. +- **Contacts** Current state of the contacts setting. +- **DocumentsLibrary** Current state of the documents library setting. +- **Email** Current state of the email setting. +- **GazeInput** Current state of the gaze input setting. +- **HumanInterfaceDevice** Current state of the human interface device setting. +- **InkT9peImprovement** No content is currently available. +- **InkT9pePersonalization** No content is currently available. +- **InkTypeImprovement** Current state of the improve inking and typing setting. +- **InkTypePersonalization** Current state of the inking and typing personalization setting. +- **Location** Current state of the location setting. +- **LocationHistory** Current state of the location history setting. +- **LocationHistoryCloudSync** Current state of the location history cloud synchronization setting. +- **LocationHistoryOnTimeline** Current state of the location history on timeline setting. +- **Microphona** No content is currently available. +- **Microphone** Current state of the microphone setting. +- **PhoneCall** Current state of the phone call setting. +- **PhoneCallHistory** Current state of the call history setting. +- **PicturesLibrary** Current state of the pictures library setting. +- **Radios** Current state of the radios setting. +- **SensorsÃustom** No content is currently available. +- **SensorsCustom** Current state of the custom sensor setting. +- **SerialCommunication** Current state of the serial communication setting. +- **Sms** Current state of the text messaging setting. +- **SpeechPersonalization** Current state of the speech services setting. +- **UqerDataTasks** No content is currently available. +- **USB** Current state of the USB setting. +- **UserAccountInformation** Current state of the account information setting. +- **UserDataTasks** Current state of the tasks setting. +- **UserNotificationListener** Current state of the notifications setting. +- **VideosLibrary** Current state of the videos library setting. +- **Webcam** Current state of the camera setting. +- **WiFiDirect** Current state of the Wi-Fi direct setting. + + +### Census.VM + +This event sends data indicating whether virtualization is enabled on the device, and its various characteristics, to help keep Windows up to date. + +The following fields are available: + +- **CloudService** Indicates which cloud service, if any, that this virtual machine is running within. +- **HyperVisor** Retrieves whether the current OS is running on top of a Hypervisor. +- **IOMMUPresent** Represents if an input/output memory management unit (IOMMU) is present. +- **IsVDI** Is the device using Virtual Desktop Infrastructure? +- **IsVirtualDevice** Retrieves that when the Hypervisor is Microsoft's Hyper-V Hypervisor or other Hv#1 Hypervisor, this field will be set to FALSE for the Hyper-V host OS and TRUE for any guest OS's. This field should not be relied upon for non-Hv#1 Hypervisors. +- **SLATSupported** Represents whether Second Level Address Translation (SLAT) is supported by the hardware. +- **VirtualizationFirmwareEnabled** Represents whether virtualization is enabled in the firmware. + + +### Census.WU + +This event sends data about the Windows update server and other App store policies, to help keep Windows up to date. + +The following fields are available: + +- **AppraiserGatedStatus** Indicates whether a device has been gated for upgrading. +- **AppStoreAutoUpdate** Retrieves the Appstore settings for auto upgrade. (Enable/Disabled). +- **AppStoreAutoUpdateMDM** Retrieves the App Auto Update value for MDM: 0 - Disallowed. 1 - Allowed. 2 - Not configured. Default: [2] Not configured +- **AppStoreAutoUpdatePolicy** Retrieves the Microsoft Store App Auto Update group policy setting +- **DelayUpgrade** Retrieves the Windows upgrade flag for delaying upgrades. +- **OSAssessmentFeatureOutOfDate** How many days has it been since a the last feature update was released but the device did not install it? +- **OSAssessmentForFeatureUpdate** Is the device is on the latest feature update? +- **OSAssessmentForQualityUpdate** Is the device on the latest quality update? +- **OSAssessmentForSecurityUpdate** Is the device on the latest security update? +- **OSAssessmentQualityOutOfDate** How many days has it been since a the last quality update was released but the device did not install it? +- **OSAssessmentReleaseInfoTime** The freshness of release information used to perform an assessment. +- **OSRollbackCount** The number of times feature updates have rolled back on the device. +- **OSRolledBack** A flag that represents when a feature update has rolled back during setup. +- **OSUninstalled** A flag that represents when a feature update is uninstalled on a device . +- **OSWUAutoUpdateOptions** Retrieves the auto update settings on the device. +- **OSWUAutoUpdateOptionsSource** The source of auto update setting that appears in the OSWUAutoUpdateOptions field. For example: Group Policy (GP), Mobile Device Management (MDM), and Default. +- **UninstallActive** A flag that represents when a device has uninstalled a previous upgrade recently. +- **UpdateServiceURLConfigured** Retrieves if the device is managed by Windows Server Update Services (WSUS). +- **WUDeferUpdatePeriod** Retrieves if deferral is set for Updates. +- **WUDeferUpgradePeriod** Retrieves if deferral is set for Upgrades. +- **WUDODownloadMode** Retrieves whether DO is turned on and how to acquire/distribute updates Delivery Optimization (DO) allows users to deploy previously downloaded WU updates to other devices on the same network. +- **WUMachineId** Retrieves the Windows Update (WU) Machine Identifier. +- **WUPauseState** Retrieves WU setting to determine if updates are paused. +- **WUServer** Retrieves the HTTP(S) URL of the WSUS server that is used by Automatic Updates and API callers (by default). + + +### Census.Xbox + +This event sends data about the Xbox Console, such as Serial Number and DeviceId, to help keep Windows up to date. + +The following fields are available: + +- **XboxConsolePreferredLanguage** Retrieves the preferred language selected by the user on Xbox console. +- **XboxConsoleSerialNumber** Retrieves the serial number of the Xbox console. +- **XboxLiveDeviceId** Retrieves the unique device ID of the console. +- **XboxLiveSandboxId** Retrieves the developer sandbox ID if the device is internal to Microsoft. + + +## Common data extensions + +### Common Data Extensions.app + +Describes the properties of the running application. This extension could be populated by a client app or a web app. + +The following fields are available: + +- **asId** An integer value that represents the app session. This value starts at 0 on the first app launch and increments after each subsequent app launch per boot session. +- **env** The environment from which the event was logged. +- **expId** Associates a flight, such as an OS flight, or an experiment, such as a web site UX experiment, with an event. +- **id** Represents a unique identifier of the client application currently loaded in the process producing the event; and is used to group events together and understand usage pattern, errors by application. +- **locale** The locale of the app. +- **name** The name of the app. +- **userId** The userID as known by the application. +- **ver** Represents the version number of the application. Used to understand errors by Version, Usage by Version across an app. + + +### Common Data Extensions.container + +Describes the properties of the container for events logged within a container. + +The following fields are available: + +- **epoch** An ID that's incremented for each SDK initialization. +- **localId** The device ID as known by the client. +- **osVer** The operating system version. +- **seq** An ID that's incremented for each event. +- **type** The container type. Examples: Process or VMHost + + +### Common Data Extensions.cs + +Describes properties related to the schema of the event. + +The following fields are available: + +- **sig** A common schema signature that identifies new and modified event schemas. + + +### Common Data Extensions.device + +Describes the device-related fields. + +The following fields are available: + +- **deviceClass** The device classification. For example, Desktop, Server, or Mobile. +- **localId** A locally-defined unique ID for the device. This is not the human-readable device name. Most likely equal to the value stored at HKLM\Software\Microsoft\SQMClient\MachineId +- **make** Device manufacturer. +- **model** Device model. + + +### Common Data Extensions.Envelope + +Represents an envelope that contains all of the common data extensions. + +The following fields are available: + +- **cV** Represents the Correlation Vector: A single field for tracking partial order of related telemetry events across component boundaries. +- **data** Represents the optional unique diagnostic data for a particular event schema. +- **ext_app** Describes the properties of the running application. This extension could be populated by either a client app or a web app. See [Common Data Extensions.app](#common-data-extensionsapp). +- **ext_container** Describes the properties of the container for events logged within a container. See [Common Data Extensions.container](#common-data-extensionscontainer). +- **ext_cs** Describes properties related to the schema of the event. See [Common Data Extensions.cs](#common-data-extensionscs). +- **ext_device** Describes the device-related fields. See [Common Data Extensions.device](#common-data-extensionsdevice). +- **ext_os** Describes the operating system properties that would be populated by the client. See [Common Data Extensions.os](#common-data-extensionsos). +- **ext_receipts** Describes the fields related to time as provided by the client for debugging purposes. See [Common Data Extensions.receipts](#common-data-extensionsreceipts). +- **ext_sdk** Describes the fields related to a platform library required for a specific SDK. See [Common Data Extensions.sdk](#common-data-extensionssdk). +- **ext_user** Describes the fields related to a user. See [Common Data Extensions.user](#common-data-extensionsuser). +- **ext_utc** Describes the fields that might be populated by a logging library on Windows. See [Common Data Extensions.utc](#common-data-extensionsutc). +- **ext_xbl** Describes the fields related to XBOX Live. See [Common Data Extensions.xbl](#common-data-extensionsxbl). +- **flags** Represents a collection of bits that describe how the event should be processed by the Connected User Experience and Telemetry component pipeline. The lowest-order byte is the event persistence. The next byte is the event latency. +- **iKey** Represents an ID for applications or other logical groupings of events. +- **name** Represents the uniquely qualified name for the event. +- **popSample** Represents the effective sample rate for this event at the time it was generated by a client. +- **time** Represents the event date time in Coordinated Universal Time (UTC) when the event was generated on the client. This should be in ISO 8601 format. +- **ver** Represents the major and minor version of the extension. + + +### Common Data Extensions.os + +Describes some properties of the operating system. + +The following fields are available: + +- **bootId** An integer value that represents the boot session. This value starts at 0 on first boot after OS install and increments after every reboot. +- **expId** Represents the experiment ID. The standard for associating a flight, such as an OS flight (pre-release build), or an experiment, such as a web site UX experiment, with an event is to record the flight / experiment IDs in Part A of the common schema. +- **locale** Represents the locale of the operating system. +- **name** Represents the operating system name. +- **ver** Represents the major and minor version of the extension. + + +### Common Data Extensions.receipts + +Represents various time information as provided by the client and helps for debugging purposes. + +The following fields are available: + +- **originalTime** The original event time. +- **uploadTime** The time the event was uploaded. + + +### Common Data Extensions.sdk + +Used by platform specific libraries to record fields that are required for a specific SDK. + +The following fields are available: + +- **epoch** An ID that is incremented for each SDK initialization. +- **installId** An ID that's created during the initialization of the SDK for the first time. +- **libVer** The SDK version. +- **seq** An ID that is incremented for each event. + + +### Common Data Extensions.user + +Describes the fields related to a user. + +The following fields are available: + +- **authId** This is an ID of the user associated with this event that is deduced from a token such as a Microsoft Account ticket or an XBOX token. +- **locale** The language and region. +- **localId** Represents a unique user identity that is created locally and added by the client. This is not the user's account ID. + + +### Common Data Extensions.utc + +Describes the properties that could be populated by a logging library on Windows. + +The following fields are available: + +- **aId** Represents the ETW ActivityId. Logged via TraceLogging or directly via ETW. +- **bSeq** Upload buffer sequence number in the format: buffer identifier:sequence number +- **cat** Represents a bitmask of the ETW Keywords associated with the event. +- **cpId** The composer ID, such as Reference, Desktop, Phone, Holographic, Hub, IoT Composer. +- **epoch** Represents the epoch and seqNum fields, which help track how many events were fired and how many events were uploaded, and enables identification of data lost during upload and de-duplication of events on the ingress server. +- **flags** Represents the bitmap that captures various Windows specific flags. +- **mon** Combined monitor and event sequence numbers in the format: monitor sequence : event sequence +- **op** Represents the ETW Op Code. +- **raId** Represents the ETW Related ActivityId. Logged via TraceLogging or directly via ETW. +- **seq** Represents the sequence field used to track absolute order of uploaded events. It is an incrementing identifier for each event added to the upload queue. The Sequence helps track how many events were fired and how many events were uploaded and enables identification of data lost during upload and de-duplication of events on the ingress server. +- **stId** Represents the Scenario Entry Point ID. This is a unique GUID for each event in a diagnostic scenario. This used to be Scenario Trigger ID. + + +### Common Data Extensions.xbl + +Describes the fields that are related to XBOX Live. + +The following fields are available: + +- **claims** Any additional claims whose short claim name hasn't been added to this structure. +- **did** XBOX device ID +- **dty** XBOX device type +- **dvr** The version of the operating system on the device. +- **eid** A unique ID that represents the developer entity. +- **exp** Expiration time +- **ip** The IP address of the client device. +- **nbf** Not before time +- **pid** A comma separated list of PUIDs listed as base10 numbers. +- **sbx** XBOX sandbox identifier +- **sid** The service instance ID. +- **sty** The service type. +- **tid** The XBOX Live title ID. +- **tvr** The XBOX Live title version. +- **uts** A bit field, with 2 bits being assigned to each user ID listed in xid. This field is omitted if all users are retail accounts. +- **xid** A list of base10-encoded XBOX User IDs. + + +## Common data fields + +### Ms.Device.DeviceInventoryChange + +Describes the installation state for all hardware and software components available on a particular device. + +The following fields are available: + +- **action** The change that was invoked on a device inventory object. +- **invent¹ryId** No content is currently available. +- **inventoryId** Device ID used for Compatibility testing +- **objectInstanceId** Object identity which is unique within the device scope. +- **objectType** Indicates the object type that the event applies to. +- **objmctType** No content is currently available. +- **syncId** A string used to group StartSync, EndSync, Add, and Remove operations that belong together. This field is unique by Sync period and is used to disambiguate in situations where multiple agents perform overlapping inventories for the same object. + + +## Compatibility events + +### Microsoft.Windows.Compatibility.Apphelp.SdbFix + +Product instrumentation for helping debug/troubleshoot issues with inbox compatibility components. + +The following fields are available: + +- **AppName** Name of the application impacted by SDB. +- **FixID** SDB GUID. +- **Flags** List of flags applied. +- **ImageName** Name of file. + + +## Component-based servicing events + +### CbsServicingProvider.CbsCapabilityEnumeration + +This event reports on the results of scanning for optional Windows content on Windows Update. + +The following fields are available: + +- **architecture** Indicates the scan was limited to the specified architecture. +- **capabilityCount** The number of optional content packages found during the scan. +- **clientId** The name of the application requesting the optional content. +- **duration** The amount of time it took to complete the scan. +- **hrStatus** The HReturn code of the scan. +- **language** Indicates the scan was limited to the specified language. +- **majorVersion** Indicates the scan was limited to the specified major version. +- **minorVersion** Indicates the scan was limited to the specified minor version. +- **namespace** Indicates the scan was limited to packages in the specified namespace. +- **sourceFilter** A bitmask indicating the scan checked for locally available optional content. +- **stackBuild** The build number of the servicing stack. +- **stackMajorVersion** The major version number of the servicing stack. +- **stackMinorVersion** The minor version number of the servicing stack. +- **stackRevision** The revision number of the servicing stack. + + +### CbsServicingProvider.CbsCapabilitySessionFinalize + +This event provides information about the results of installing or uninstalling optional Windows content from Windows Update. + +The following fields are available: + +- **capabilities** The names of the optional content packages that were installed. +- **clientId** The name of the application requesting the optional content. +- **currentID** The ID of the current install session. +- **downloadSource** The source of the download. +- **highestState** The highest final install state of the optional content. +- **hrLCUReservicingStatus** Indicates whether the optional content was updated to the latest available version. +- **hrStatus** The HReturn code of the install operation. +- **rebootCount** The number of reboots required to complete the install. +- **retryID** The session ID that will be used to retry a failed operation. +- **retryStatus** Indicates whether the install will be retried in the event of failure. +- **stackBuild** The build number of the servicing stack. +- **stackMajorVersion** The major version number of the servicing stack. +- **stackMinorVersion** The minor version number of the servicing stack. +- **stackRevision** The revision number of the servicing stack. + + +### CbsServicingProvider.CbsCapabilitySessionPended + +This event provides information about the results of installing optional Windows content that requires a reboot to keep Windows up to date. + +The following fields are available: + +- **clientId** The name of the application requesting the optional content. +- **pendingDecision** Indicates the cause of reboot, if applicable. + + +### CbsServicingProvider.CbsLateAcquisition + +This event sends data to indicate if some Operating System packages could not be updated as part of an upgrade, to help keep Windows up to date. + +The following fields are available: + +- **Features** The list of feature packages that could not be updated. +- **RetryID** The ID identifying the retry attempt to update the listed packages. + + +### CbsServicingProvider.CbsPackageRemoval + +This event provides information about the results of uninstalling a Windows Cumulative Security Update to help keep Windows up to date. + +The following fields are available: + +- **buildVersion** The build number of the security update being uninstalled. +- **clientId** The name of the application requesting the uninstall. +- **currentStateEnd** The final state of the update after the operation. +- **failureDetails** Information about the cause of a failure, if applicable. +- **failureSourceEnd** The stage during the uninstall where the failure occurred. +- **hrStatusEnd** The overall exit code of the operation. +- **initiatedOffline** Indicates if the uninstall was initiated for a mounted Windows image. +- **majorVersion** The major version number of the security update being uninstalled. +- **minorVersion** The minor version number of the security update being uninstalled. +- **originalState** The starting state of the update before the operation. +- **pendingDecision** Indicates the cause of reboot, if applicable. +- **primitiveExecutionContext** The state during system startup when the uninstall was completed. +- **revisionVersion** The revision number of the security update being uninstalled. +- **transactionCanceled** Indicates whether the uninstall was cancelled. + + +### CbsServicingProvider.CbsQualityUpdateInstall + +This event reports on the performance and reliability results of installing Servicing content from Windows Update to keep Windows up to date. + +The following fields are available: + +- **buildVersion** The build version number of the update package. +- **clientId** The name of the application requesting the optional content. +- **corruptionHistoryFlags** A bitmask of the types of component store corruption that have caused update failures on the device. +- **corruptionType** An enumeration listing the type of data corruption responsible for the current update failure. +- **currentStateEnd** The final state of the package after the operation has completed. +- **doqTimeSeconds** The time in seconds spent updating drivers. +- **executeTimeSeconds** The number of seconds required to execute the install. +- **failureDetails** The driver or installer that caused the update to fail. +- **failureSourceEnd** An enumeration indicating at what phase of the update a failure occurred. +- **hrStatusEnd** The return code of the install operation. +- **initiatedOffline** A true or false value indicating whether the package was installed into an offline Windows Imaging Format (WIM) file. +- **majorVersion** The major version number of the update package. +- **minorVersion** The minor version number of the update package. +- **originalState** The starting state of the package. +- **overallTimeSeconds** The time (in seconds) to perform the overall servicing operation. +- **planTimeSeconds** The time in seconds required to plan the update operations. +- **poqTimeSeconds** The time in seconds processing file and registry operations. +- **postRebootTimeSeconds** The time (in seconds) to do startup processing for the update. +- **preRebootTimeSeconds** The time (in seconds) between execution of the installation and the reboot. +- **primitiveExecutionContext** An enumeration indicating at what phase of shutdown or startup the update was installed. +- **rebootCount** The number of reboots required to install the update. +- **rebootTimeSeconds** The time (in seconds) before startup processing begins for the update. +- **resolveTimeSeconds** The time in seconds required to resolve the packages that are part of the update. +- **revisionVersion** The revision version number of the update package. +- **rptTimeSeconds** The time in seconds spent executing installer plugins. +- **shutdownTimeSeconds** The time (in seconds) required to do shutdown processing for the update. +- **stackRevision** The revision number of the servicing stack. +- **stageTimeSeconds** The time (in seconds) required to stage all files that are part of the update. + + +### CbsServicingProvider.CbsSelectableUpdateChangeV2 + +This event reports the results of enabling or disabling optional Windows Content to keep Windows up to date. + +The following fields are available: + +- **applicableUpdateState** Indicates the highest applicable state of the optional content. +- **buildVersion** The build version of the package being installed. +- **clientId** The name of the application requesting the optional content change. +- **downloadSource** Indicates if optional content was obtained from Windows Update or a locally accessible file. +- **downloadtimeInSeconds** The number of seconds required to complete the optional content download. +- **executionID** A unique ID used to identify events associated with a single servicing operation and not reused for future operations. +- **executionSequence** A counter that tracks the number of servicing operations attempted on the device. +- **firstMergedExecutionSequence** The value of a pervious executionSequence counter that is being merged with the current operation, if applicable. +- **firstMergedID** A unique ID of a pervious servicing operation that is being merged with this operation, if applicable. +- **hrDownloadResult** The return code of the download operation. +- **hrStatusUpdate** The return code of the servicing operation. +- **identityHash** A pseudonymized (hashed) identifier for the Windows Package that is being installed or uninstalled. +- **initiatedOffline** Indicates whether the operation was performed against an offline Windows image file or a running instance of Windows. +- **majorVersion** The major version of the package being installed. +- **minorVersion** The minor version of the package being installed. +- **packageArchitecture** The architecture of the package being installed. +- **packageLanguage** The language of the package being installed. +- **packageName** The name of the package being installed. +- **rebootRequired** Indicates whether a reboot is required to complete the operation. +- **revisionVersion** The revision number of the package being installed. +- **stackBuild** The build number of the servicing stack binary performing the installation. +- **stackMajorVersion** The major version number of the servicing stack binary performing the installation. +- **stackMinorVersion** The minor version number of the servicing stack binary performing the installation. +- **stackRevision** The revision number of the servicing stack binary performing the installation. +- **updateName** The name of the optional Windows Operation System feature being enabled or disabled. +- **updateStartState** A value indicating the state of the optional content before the operation started. +- **updateTargetState** A value indicating the desired state of the optional content. + + +## Deployment extensions + +### DeploymentTelemetry.Deployment_End + +This event indicates that a Deployment 360 API has completed. + +The following fields are available: + +- **ClientId** Client ID of the user utilizing the D360 API. +- **ErrorCode** Error code of action. +- **FlightId** The specific ID of the Windows Insider build the device is getting. +- **Mode** Phase in upgrade. +- **RelatedCV** The correction vector (CV) of any other related events +- **Result** End result of the action. + + +### DeploymentTelemetry.Deployment_SetupBoxLaunch + +This event indicates that the Deployment 360 APIs have launched Setup Box. + +The following fields are available: + +- **ClientId** The client ID of the user utilizing the D360 API. +- **FlightId** The specific ID of the Windows Insider build the device is getting. +- **Quiet** Whether Setup will run in quiet mode or full mode. +- **RelatedCV** The correlation vector (CV) of any other related events. +- **SetupMode** The current setup phase. + + +### DeploymentTelemetry.Deployment_SetupBoxResult + +This event indicates that the Deployment 360 APIs have received a return from Setup Box. + +The following fields are available: + +- **ClientId** Client ID of the user utilizing the D360 API. +- **ErrorCode** Error code of the action. +- **FlightId** The specific ID of the Windows Insider build the device is getting. +- **Quiet** Indicates whether Setup will run in quiet mode or full mode. +- **RelatedCV** The correlation vector (CV) of any other related events. +- **SetupMode** The current Setup phase. + + +### DeploymentTelemetry.Deployment_Start + +This event indicates that a Deployment 360 API has been called. + +The following fields are available: + +- **ClientId** Client ID of the user utilizing the D360 API. +- **FlightId** The specific ID of the Windows Insider build the device is getting. +- **Mode** The current phase of the upgrade. +- **RelatedCV** The correlation vector (CV) of any other related events. + + +## Diagnostic data events + +### TelClientSynthetic.AuthorizationInfo_RuntimeTransition + +This event sends data indicating that a device has undergone a change of telemetry opt-in level detected at UTC startup, to help keep Windows up to date. The telemetry opt-in level signals what data we are allowed to collect. + +The following fields are available: + +- **CanAddMsaToMsTelemetry** True if we can add MSA PUID and CID to telemetry, false otherwise. +- **CanCollectAnyTelemetry** True if we are allowed to collect partner telemetry, false otherwise. +- **CanCollectCoreTelemetry** True if we can collect CORE/Basic telemetry, false otherwise. +- **CanCollectHeartbeats** True if we can collect heartbeat telemetry, false otherwise. +- **CanCollectOsTelemetry** True if we can collect diagnostic data telemetry, false otherwise. +- **CanCollectWindowsAnalyticsEvents** True if we can collect Windows Analytics data, false otherwise. +- **CanPerformDiagnosticEscalations** True if we can perform diagnostic escalation collection, false otherwise. +- **CanPerformTraceEscalations** True if we can perform trace escalation collection, false otherwise. +- **CanReportScenarios** True if we can report scenario completions, false otherwise. +- **PreviousPermissions** Bitmask of previous telemetry state. +- **TransitionFromEverythingOff** True if we are transitioning from all telemetry being disabled, false otherwise. + + +### TelClientSynthetic.AuthorizationInfo_Startup + +Fired by UTC at startup to signal what data we are allowed to collect. + +The following fields are available: + +- **CanAdd** No content is currently available. +- **CanAddMsaToMsTelemetry** True if we can add MSA PUID and CID to telemetry, false otherwise. +- **CanCollectAnyTelemetry** True if we are allowed to collect partner telemetry, false otherwise. +- **CanCollectCoreTelemetry** True if we can collect CORE/Basic telemetry, false otherwise. +- **CanCollectHe.Debeats** No content is currently available. +- **CanCollectHeartbeats** True if we can collect heartbeat telemetry, false otherwise. +- **CanCollectOsTelemetry** True if we can collect diagnostic data telemetry, false otherwise. +- **CanCollectWindowsAnalyticsEvents** True if we can collect Windows Analytics data, false otherwise. +- **CanPerformDiagnosticEscalationc** No content is currently available. +- **CanPerformDiagnosticEscalations** True if we can perform diagnostic escalation collection, false otherwise. +- **CanPerformTraceEscalations** True if we can perform trace escalation collection, false otherwise. +- **CanReportScenarios** True if we can report scenario completions, false otherwise. +- **PreviousPermicsions** No content is currently available. +- **PreviousPermissions** Bitmask of previous telemetry state. +- **TransitionFromEveryt`ingOff** No content is currently available. +- **TransitionFromEverythingOff** True if we are transitioning from all telemetry being disabled, false otherwise. + + +### TelClientSynthetic.ConnectivityHeartBeat_0 + +This event sends data about the connectivity status of the Connected User Experience and Telemetry component that uploads telemetry events. If an unrestricted free network (such as Wi-Fi) is available, this event updates the last successful upload time. Otherwise, it checks whether a Connectivity Heartbeat event was fired in the past 24 hours, and if not, it fires an event. A Connectivity Heartbeat event also fires when a device recovers from costed network to free network. + +The following fields are available: + +- **CensusExitCode** Returns last execution codes from census client run. +- **CensusStartTime** Returns timestamp corresponding to last successful census run. +- **CensusTaskEnabled** Returns Boolean value for the census task (Enable/Disable) on client machine. +- **LastConnectivityLossTime** Retrieves the last time the device lost free network. +- **NetworkState** Retrieves the network state: 0 = No network. 1 = Restricted network. 2 = Free network. +- **NoNetworkTime** Retrieves the time spent with no network (since the last time) in seconds. +- **RestrictedNetworkTime** Retrieves the time spent on a metered (cost restricted) network in seconds. +- **捔祦⽌䱩⽪昫橷瘴場漸䤫〫洯硈㍈㡮⽯** No content is currently available. +- **⽫甸㑪摭橷捔橗⭪晙晅晣穹椸樷** No content is currently available. +- **䉪䌯䱏杄䬷㝐灌䩚㠯⽉䝲伹㡈㕉佤** No content is currently available. + + +### TelClientSynthetic.HeartBeat_5 + +This event sends data about the health and quality of the diagnostic data from the given device, to help keep Windows up to date. It also enables data analysts to determine how 'trusted' the data is from a given device. + +The following fields are available: + +- **** No content is currently available. +- **艍ጋⰎჄ↶췸̎耀艊ጀ‏艋ጃᰌი↶** No content is currently available. +- **@쯵￿耀蝉ᄀ〉‭ᢤ↱p** No content is currently available. +- **⬰げㅶ漴䬸穕婒㘳㕡䙤乯欸㉂夷** No content is currently available. +- **㉕睐灆㝎剓畷⽧⽶扙全ぐ⽒灥湐湌䈶灦晋砰っ礯䈱㕪** No content is currently available. +- **AgentConnectionErrorsCount** Number of non-timeout errors associated with the host/agent channel. +- **AgentCoNnectionErrorsCount** No content is currently available. +- **āकĒࠨ婆Pက喬↵갸ژāक** No content is currently available. +- **āकĒࠨ婦Tက** No content is currently available. +- **āकĒࠨ媦\က** No content is currently available. +- **āकĒࠨ宆xက僸↵곌׌** No content is currently available. +- **āकĒࠨ汆 嬨↵꼔** No content is currently available. +- **CensusExitCode** The last exit code of the Census task. +- **CensusStartTime** Time of last Census run. +- **CensusTaskEnabled** True if Census is enabled, false otherwise. +- **CompressedBytesUploaded** Number of compressed bytes uploaded. +- **ConsumerDroppedCount** Number of events dropped at consumer layer of telemetry client. +- **CriticalDataDbDroppedCount** Number of critical data sampled events dropped at the database layer. +- **CriticalDataThrottleDroppedCount** The number of critical data sampled events that were dropped because of throttling. +- **CriticalOverflowEntersCounter** Number of times critical overflow mode was entered in event DB. +- **CriticalOvErflowEntersCounter** No content is currently available. +- **DbCriticalDroppedCount** Total number of dropped critical events in event DB. +- **DbDroppedCount** Number of events dropped due to DB fullness. +- **DbDroppedFailureCount** Number of events dropped due to DB failures. +- **DbDroppedFullCount** Number of events dropped due to DB fullness. +- **DecndingDroppedCount** No content is currently available. +- **DecodingDroppedCount** Number of events dropped due to decoding failures. +- **Ēࠨ⳥ࠥ䃀첤↵쁸拠** No content is currently available. +- **EnteringCriticalOverflowDroppedCounter** Number of events dropped due to critical overflow mode being initiated. +- **EtwDroppedBufferCount** Number of buffers dropped in the UTC ETW session. +- **EtwDroppedCount** Number of events dropped at ETW layer of telemetry client. +- **EventsPersistedCount** Number of events that reached the PersistEvent stage. +- **EventStoreLifetimeResetCounter** Number of times event DB was reset for the lifetime of UTC. +- **EventStoreResetCounter** Number of times event DB was reset. +- **EventStoreResetSizeSum** Total size of event DB across all resets reports in this instance. +- **EventSubStoreResetCounter** Number of times event DB was reset. +- **EventSubStoreResetSizeSum** Total size of event DB across all resets reports in this instance. +- **EventsUploaded** Number of events uploaded. +- **Flags** Flags indicating device state such as network state, battery state, and opt-in state. +- **FullTriggerBufferDroppedCount** Number of events dropped due to trigger buffer being full. +- **FullTrigwerBufferDroppedCount** No content is currently available. +- **HeartBeatSequenceNumber** The sequence number of this heartbeat. +- **InvalidH4BFCodeCount** No content is currently available. +- **InvalidHttpCodeCount** Number of invalid HTTP codes received from contacting Vortex. +- **ȋ耀耭⬀‧早诉耮⬄怛昡设耯⬈** No content is currently available. +- **LastAgentConnectionError** Last non-timeout error encountered in the host/agent channel. +- **LastEventSizeOffender** Event name of last event which exceeded max event size. +- **LastInvalidH4BFCode** No content is currently available. +- **LastInvalidHttpCode** Last invalid HTTP code received from Vortex. +- **MaxActiveAgentConnectionCount** The maximum number of active agents during this heartbeat timeframe. +- **MaxInUseScenarioCounter** Soft maximum number of scenarios loaded by UTC. +- **PreviousHeartBeatTime** Time of last heartbeat event (allows chaining of events). +- **PrivacyBlockedCount** The number of events blocked due to privacy settings or tags. +- **ⓅЀ쬐↵삔托ā** No content is currently available. +- **RepeatedUploadFailureDropped** Number of events lost due to repeated upload failures for a single buffer. +- **SettingsH4BFAttempts** No content is currently available. +- **SettingsH4BFFailures** No content is currently available. +- **SettingsHttpAttempts** Number of attempts to contact OneSettings service. +- **SettingsHttpFailures** The number of failures from contacting the OneSettings service. +- **ThrottledDroppedCount** Number of events dropped due to throttling of noisy providers. +- **TopUploaderErrors** List of top errors received from the upload endpoint. +- **UploaderDroppedCount** Number of events dropped at the uploader layer of telemetry client. +- **UploaderErrorCount** Number of errors received from the upload endpoint. +- **VortexFailuresTimeout** The number of timeout failures received from Vortex. +- **VortexH4BFAttempts** No content is currently available. +- **VortexH4BFFailures4xx** No content is currently available. +- **VortexH4BFFailures5xx** No content is currently available. +- **VortexH4BFResponseFailures** No content is currently available. +- **VortexH4BFResponsesWithDroppedEvents** No content is currently available. +- **VortexHttpAttempts** Number of attempts to contact Vortex. +- **VortexHttpFailures4xx** Number of 400-499 error codes received from Vortex. +- **VortexHttpFailures5xx** Number of 500-599 error codes received from Vortex. +- **VortexHttpResponseFailures** Number of Vortex responses that are not 2XX or 400. +- **VortexHttpResponsesWi|hDroppedEvents** No content is currently available. +- **VortexHttpResponsesWithDroppedEvents** Number of Vortex responses containing at least 1 dropped event. +- **V聯rtexHttpFailures5xx** No content is currently available. +- **अĒࠨⴅ!₀俨↵겈Ѹ** No content is currently available. +- **ြ갌暠聇⭜搽갌暜聈⭠밾갌** No content is currently available. +- **ေ괔暜耼⬰뀲궄暠耽⬴吳괄暜** No content is currently available. +- **̎耀艊ጀ‏艋ጃᰌი↶** No content is currently available. +- **권擘耩⬔ఫ권擔耪⬘〬권擘耫⬜ﰭ권擔耬⬠�� 擝诚** No content is currently available. +- **곔暜聄⭐к괤暠聅⭔퐻갔暜** No content is currently available. +- **갌暜聘⮠偎갌暠聙⮤鑏갌暜聚** No content is currently available. +- **꺨徠耋** No content is currently available. +- **껨徤而⬬퐱길徠耍⬰耲기徤耎⬴㐳** No content is currently available. +- **꼄ቌāकĒࠨ** No content is currently available. +- **쐴궤暠耿⬼찵곴暜** No content is currently available. +- **乭睱祒ㅡ坘牦晩塴唯㥺扱氫㝬㜸⭗偑圶㍡䈲䔯略儹祘㝈圳㡆晪煥瘰䱫琯汗朸⽦ㅵ歶** No content is currently available. +- **佗䱺䑁⽱橒失猶畓湳硖䭏煲愴呌眹卲愹癦慂㝘㡔䰰⭗偡穭䌹㍧偙** No content is currently available. +- **佱塪癒噲歋㤶癉乴煙瑬睷婇睶杭剓摁乄** No content is currently available. +- **倰煹穑䅣䍏楍桧㥡䙪畴䑕橲䕋甯朱㝗硐⭨渶㕶㈯杖䤸穗䡈㥂㥭㑱㝙** No content is currently available. +- **偊〫祰汓汨兄男捇䉧潗塶睥唴㕺瑰煲焰㕸卩兢㉮** No content is currently available. +- **典止歂㔴ぎ䕅穔䜫㥹地䵭ㅔ煘乓假穑䙭䕱㈰晃卉敳祎煙捺灘橙癭䵈伹ぴ硱** No content is currently available. +- **典㙪獬牵汑ㅘ灢㕌㝶湌㑣㙌捯㑷㈳潏祓㥪戳㉺** No content is currently available. +- **剼↵겤״āकĒࠨ婦T** No content is currently available. +- **匈↵걼بāकĒࠨ媦\က咈↵ڐ** No content is currently available. +- **匷硬䭦兔楰㑔汬㑶儷䱈乥猴㕘晱歈瑘游剏㡸㝩倵** No content is currently available. +- **呅穹敖兌橤㈵汴洲䨶潈乺⭎⭕栫** No content is currently available. +- **呣礲晉坩穑〹ひ䝰ぷ噢晘堳刳噒䩈丵畏兑䩨琳⬹佫搱噈** No content is currently available. +- **啧癃獷奆䕤穱啧晬呈䅌琴䴫桗獍噲瘶㕨橰啪楗佧** No content is currently available. +- **噪兙䑯楓㍈奬慰㝋坣睵潕婤瑚䱊昹伵朱敕杰爸睶** No content is currently available. +- **噶甴う歶㍔䈹㝘潳䍈煆⼹挴⬯㝷祄䈯㝃⼯** No content is currently available. +- **坪䙵失慒獗攱猱塘⽰桪⬲摫倶摘塂䄰䰶⽵歐浪瀷** No content is currently available. +- **堿갌暜聊⭨ⱀ갌暠聋⭬** No content is currently available. +- **塩猯䡦癐㝔祤偪捲浖焷㍁浲祹䕡橆橨瑈坰獕教** No content is currently available. +- **失椷䡔㠱呯⽅䕴慴乊匵戱洱番偓㡤䘳㡪奨楈** No content is currently available. +- **夵楲䑣癳摌六䔴㍍⬶獖晘⽅䅅祸㙖橸佣坂㉵ㅚ慇** No content is currently available. +- **慦㥣㥘硸癒䕎䩪㤰䠯祔う敚⬹户䨳啢䩖䡦䘱桎癆** No content is currently available. +- **扊㍩坒潅㝤児堷䩤㉫硩䠶橗杤橚慃杇橙㉡摔娳** No content is currently available. +- **捔祦⽌䱩⽪昫橷瘴場漸䤫〫洯硈㍈㡮⽯** No content is currently available. +- **敬䉶癷潘場㡌䱥⭬䙐⽹楈堵硪牣㑸䵸䥴㝄噣瑒䠸ㅪ** No content is currently available. +- **昡讱⮮耀耰⬀‧晩讛耱⬄怛暥讐耲⬈** No content is currently available. +- **暜耸⬠蠮궴暠耹⬤뀯괤暜耺⬨氰긔暠** No content is currently available. +- **暜职⭰䱂갌暠聍⭴籃갌暜聎⭸聄** No content is currently available. +- **暜聒⮈챈갌暠聓⮌둉갌暜联** No content is currently available. +- **暠耳⬌ﰩ굔暜耴⬐瀪귤暠耵⬔瀫굄暜耶⬘쐬긔暠耷⬜** No content is currently available. +- **暠聏⭼㑅갌暜聐⮀ᑆ갌暠聑⮄** No content is currently available. +- **术硂瑲⽑㥴䱡偭橏䬷礫癪硷㡲⽰䑇游临㙐橪㑯倴⽓剂** No content is currently available. +- **樲㙘䡌㡘坯歎楈⽹ご㥹湭歆㡨婨⬵啊䍶桊塌吶㥈敍汍㕪刲慄** No content is currently available. +- **毆€ 娠↵꺈࿐** No content is currently available. +- **泆  嚔↵곴बā** No content is currently available. +- **湹䩳⭑晹礰婶啊灋䱸晒㉉㑬ひ⭄㑉慙㝲䡦** No content is currently available. +- **潭晰橷睧䌵** No content is currently available. +- **瀯㉪䡏ㅏ⭕楆摡倶㙑愰佚䍪䤳煃奄硭摍嘯煗㍓唸卆** No content is currently available. +- **灋瘸乏煆䬳桱㕙瘸㑘䙸橧㥶䔵橲㕙楗佧吸⭚獏桗** No content is currently available. +- **獇牅歘䉡汸㉂夸乶坁浂偕㤲塅䩸桑と牚穒癲浕** No content is currently available. +- **獭䭏啪漲睌穩⬫入䨱䈸⽁䑇敉儴慣㙹么䥶晋湋朶剹慷** No content is currently available. +- **瑖穒㍤摧癵摆䑧⭧䍏杭䵫敘煰橲煤橲煤橲煤橲煤橲煤橲煤橲煤橲武** No content is currently available. +- **⽫甸㑪摭橷捔橗⭪晙晅晣穹椸樷** No content is currently available. +- **穇圹塑⽈潘䉘䉒头㡕湲㠵汪圸夸䑬潕杪䙔戴䑌** No content is currently available. +- **穬⼱䍯昫㤹卲儫⬯牎奦㡈㙸ㄯ時㍊佘䱳伵㠫栱䥦⭦慊祘⽂浶** No content is currently available. +- **ࠣ耀耤⬀‧撡豒耥⬄怛擝豇耦⬈귄擘耧⬌鐩** No content is currently available. +- **̎耀艊ጀ‏艋ጃᰌი↶艌錇萍ƒ** No content is currently available. +- **̎耀艊ጀ‏艋ጃᰌი↶艌錇萍ƒ჌↶ 艍ጋⰎ** No content is currently available. +- **耏⬸찴기徤耐⬼됵기** No content is currently available. +- **耑⭀萶기徤耒⭄࠷기徠耓** No content is currently available. +- **耝⬐�� 拱費Ԗ耀耞** No content is currently available. +- **艋ጃᰌი↶艌錇萍ƒ჌↶ 艍ጋⰎჄ↶** No content is currently available. +- **萍ƒ჌↶ 艍ጋⰎჄ↶᝞耀老⬀‧彵** No content is currently available. +- **萍ƒ჌↶ 艍ጋⰎჄ↶큰̎耀艊** No content is currently available. +- **葊갌暠聕⮔ࡋ갌暜聖⮘豌갌暠聗** No content is currently available. +- **㐰愱啬瑬癏䝒乘慲椰㉑眫䱄晶獶䝅䙗䕫㉡** No content is currently available. +- **䄸䵒䝰ㅹ灌癳噚䥍祫䬵礷楗光摹䑑䡢ㅑ䭱獎伱噺獃䕑济浱桱** No content is currently available. +- **䉪䌯䱏杄䬷㝐灌䩚㠯⽉䝲伹㡈㕉佤** No content is currently available. +- **䍭㐰䕩坶㥆慉塲夶煁椫㝖瀱栲硪爯畉乂㑒㝥昷䕺乍併娴橲䭎改睗畃睯** No content is currently available. +- **䍸欳昷偔坊問扨婔䨷㥗桴塲㍄䵹橥癉嘷䵊噲湥** No content is currently available. +- **䠷坸⽦䄯⽣晵ㄳ卂楖づ睧䤵椹穴䝊潩硍䩢䵎橫㍸牨** No content is currently available. +- **䨵浤汗位㑗䕶㝸䥮敡潱倱偑煥塪晢** No content is currently available. +- **䰶굔暠聁⭄砷곤暜聂⭈8궄暠** No content is currently available. +- **䱥⭫䙐晹楈䠵硨牣㑷噏挶䍈伹桪湣㑸呵㠴乘攸浌䡥穆䱶㕧瑘捷㉌伶穆䡦㕩橶捸砳甴㑚堸** No content is currently available. +- **䱲㝏危㡨呥卐䩯⭒祐汮潧䩑ㅷ歈偤㉱灕⬲穏公** No content is currently available. +- **䴶㑊啥䕪乶汊摉㥐焲楂䜹洳敡⬫灍⭒佦呮敮婪〷朵癹呧煡㙤䤫浨瘹** No content is currently available. + + +### TelClientSynthetic.HeartBeat_Aria_5 + +This event is the telemetry client ARIA heartbeat. + +The following fields are available: + +- **CompressedBytesUploaded** Number of compressed bytes uploaded. +- **CriticalDataDbDroppedCount** Number of critical data sampled events dropped at the database layer. +- **CriticalOverflowEntersCounter** Number of times critical overflow mode was entered in event database. +- **DbCriticalDroppedCount** Total number of dropped critical events in event database. +- **DbDroppedCount** Number of events dropped at the database layer. +- **DbDroppedFailureCount** Number of events dropped due to database failures. +- **DbDroppedFullCount** Number of events dropped due to database being full. +- **EnteringCriticalOverflowDroppedCounter** Number of events dropped due to critical overflow mode being initiated. +- **EventsPersistedCount** Number of events that reached the PersistEvent stage. +- **EventStoreLifetimeResetCounter** Number of times the event store has been reset. +- **EventStoreResetCounter** Number of times the event store has been reset during this heartbeat. +- **EventStoreResetSizeSum** Size of event store reset in bytes. +- **EventsUploaded** Number of events uploaded. +- **HeartBeatSequenceNumber** The sequence number of this heartbeat. +- **InvalidHttpCodeCount** Number of invalid HTTP codes received from contacting Vortex. +- **LastEventSizeOffender** Event name of last event which exceeded max event size. +- **LastInvalidHttpCode** Last invalid HTTP code received from Vortex. +- **PreviousHeartBeatTime** The FILETIME of the previous heartbeat fire. +- **PrivacyBlockedCount** The number of events blocked due to privacy settings or tags. +- **RepeatedUploadFailureDropped** Number of events lost due to repeated upload failures for a single buffer. +- **SettingsHttpAttempts** Number of attempts to contact OneSettings service. +- **SettingsHttpFailures** Number of failures from contacting OneSettings service. +- **TopUploaderErrors** List of top errors received from the upload endpoint. +- **UploaderDroppedCount** Number of events dropped at the uploader layer of telemetry client. +- **UploaderErrorCount** Number of errors received from the upload endpoint. +- **VortexFailuresTimeout** Number of time out failures received from Vortex. +- **VortexHttpAttempts** Number of attempts to contact Vortex. +- **VortexHttpFailures4xx** Number of 400-499 error codes received from Vortex. +- **VortexHttpFailures5xx** Number of 500-599 error codes received from Vortex. +- **VortexHttpResponseFailures** Number of Vortex responses that are not 2XX or 400. +- **VortexHttpResponsesWithDroppedEvents** Number of Vortex responses containing at least 1 dropped event. + + +### TelClientSynthetic.HeartBeat_Seville_5 + +This event is sent by the universal telemetry client (UTC) as a heartbeat signal for Sense. + +The following fields are available: + +- **AgentConnectionErrorsCount** Number of non-timeout errors associated with the host or agent channel. +- **CompressedBytesUploaded** Number of compressed bytes uploaded. +- **ConsumerDroppedCount** Number of events dropped at consumer layer of the telemetry client. +- **CriticalDataDbDroppedCount** Number of critical data sampled events dropped at the database layer. +- **CriticalDataThrottleDroppedCount** Number of critical data sampled events dropped due to throttling. +- **CriticalOverflowEntersCounter** Number of times critical overflow mode was entered in event database. +- **DailyUploadQuotaInBytes** Daily upload quota for Sense in bytes (only in in-proc mode). +- **DbCriticalDroppedCount** Total number of dropped critical events in event database. +- **DbDroppedCount** Number of events dropped due to database being full. +- **DbDroppedFailureCount** Number of events dropped due to database failures. +- **DbDroppedFullCount** Number of events dropped due to database being full. +- **DecodingDroppedCount** Number of events dropped due to decoding failures. +- **DiskSizeInBytes** Size of event store for Sense in bytes (only in in-proc mode). +- **EnteringCriticalOverflowDroppedCounter** Number of events dropped due to critical overflow mode being initiated. +- **EtwDroppedBufferCount** Number of buffers dropped in the universal telemetry client (UTC) event tracing for Windows (ETW) session. +- **EtwDroppedCount** Number of events dropped at the event tracing for Windows (ETW) layer of telemetry client. +- **EventsPersistedCount** Number of events that reached the PersistEvent stage. +- **EventStoreLifetimeResetCounter** Number of times event the database was reset for the lifetime of the universal telemetry client (UTC). +- **EventStoreResetCounter** Number of times the event database was reset. +- **EventStoreResetSizeSum** Total size of the event database across all resets reports in this instance. +- **EventsUploaded** Number of events uploaded. +- **Flags** Flags indicating device state, such as network state, battery state, and opt-in state. +- **FullTriggerBufferDroppedCount** Number of events dropped due to trigger buffer being full. +- **HeartBeatSequenceNumber** The sequence number of this heartbeat. +- **InvalidHttpCodeCount** Number of invalid HTTP codes received from contacting Vortex. +- **LastAgentConnectionError** Last non-timeout error encountered in the host/agent channel. +- **LastEventSizeOffender** Event name of last event which exceeded the maximum event size. +- **LastInvalidHttpCode** Last invalid HTTP code received from Vortex. +- **MaxActiveAgentConnectionCount** Maximum number of active agents during this heartbeat timeframe. +- **NormalUploadTimerMillis** Number of milliseconds between each upload of normal events for SENSE (only in in-proc mode). +- **PreviousHeartBeatTime** Time of last heartbeat event (allows chaining of events). +- **RepeatedUploadFailureDropped** Number of events lost due to repeated failed uploaded attempts. +- **SettingsHttpAttempts** Number of attempts to contact OneSettings service. +- **SettingsHttpFailures** Number of failures from contacting the OneSettings service. +- **ThrottledDroppedCount** Number of events dropped due to throttling of noisy providers. +- **TopUploaderErrors** Top uploader errors, grouped by endpoint and error type. +- **UploaderDroppedCount** Number of events dropped at the uploader layer of the telemetry client. +- **UploaderErrorCount** Number of input for the TopUploaderErrors mode estimation. +- **VortexFailuresTimeout** Number of time out failures received from Vortex. +- **VortexHttpAttempts** Number of attempts to contact Vortex. +- **VortexHttpFailures4xx** Number of 400-499 error codes received from Vortex. +- **VortexHttpFailures5xx** Number of 500-599 error codes received from Vortex. +- **VortexHttpResponseFailures** Number of Vortex responses that are not 2XX or 400. +- **VortexHttpResponsesWithDroppedEvents** Number of Vortex responses containing at least 1 dropped event. + + +## Direct to update events + +### Microsoft.Windows.DirectToUpdate.DTUCoordinatorCheckApplicability + +Event to indicate that the Coordinator CheckApplicability call succeeded. + +The following fields are available: + +- **ApplicabilityResult** Result of CheckApplicability function. +- **CampaignID** Campaign ID being run. +- **ClientID** Client ID being run. +- **CoordinatorVersion** Coordinator version of DTU. +- **CV** Correlation vector. +- **IsDeviceAADDomainJoined** Indicates whether the device is logged in to the AAD (Azure Active Directory) domain. +- **IsDeviceADDomainJoined** Indicates whether the device is logged in to the AD (Active Directory) domain. +- **IsDeviceCloverTrail** Indicates whether the device has a Clover Trail system installed. +- **IsDeviceFeatureUpdatingPaused** Indicates whether Feature Update is paused on the device. +- **IsDeviceNetworkMetered** Indicates whether the device is connected to a metered network. +- **IsDeviceOobeBlocked** Indicates whether user approval is required to install updates on the device. +- **IsDeviceRequireUpdateApproval** Indicates whether user approval is required to install updates on the device. +- **IsDeviceSccmManaged** Indicates whether the device is running the Microsoft SCCM (System Center Configuration Manager) to keep the operating system and applications up to date. +- **IsDeviceUninstallActive** Indicates whether the OS (operating system) on the device was recently updated. +- **IsDeviceUpdateNotificationLevel** Indicates whether the device has a set policy to control update notifications. +- **IsDeviceUpdateServiceManaged** Indicates whether the device uses WSUS (Windows Server Update Services). +- **IsDeviceZeroExhaust** Indicates whether the device subscribes to the Zero Exhaust policy to minimize connections from Windows to Microsoft. +- **IsGreaterThanMaxRetry** Indicates whether the DTU (Direct to Update) service has exceeded its maximum retry count. +- **IsVolumeLicensed** Indicates whether a volume license was used to authenticate the operating system or applications on the device. + + +### Microsoft.Windows.DirectToUpdate.DTUCoordinatorCheckApplicabilityGenericFailure + +This event indicatse that we have received an unexpected error in the Direct to Update (DTU) Coordinators CheckApplicability call. + +The following fields are available: + +- **CampaignID** ID of the campaign being run. +- **ClientID** ID of the client receiving the update. +- **CoordinatorVersion** Coordinator version of Direct to Update. +- **CV** Correlation vector. +- **hResult** HRESULT of the failure. + + +### Microsoft.Windows.DirectToUpdate.DTUCoordinatorCleanupGenericFailure + +This event indicates that we have received an unexpected error in the Direct to Update (DTU) Coordinator Cleanup call. + +The following fields are available: + +- **CampaignID** Campaign ID being run +- **ClientID** Client ID being run +- **CoordinatorVersion** Coordinator version of DTU +- **CV** Correlation vector +- **hResult** HRESULT of the failure + + +### Microsoft.Windows.DirectToUpdate.DTUCoordinatorCleanupSuccess + +This event indicates that the Coordinator Cleanup call succeeded. + +The following fields are available: + +- **CampaignID** Campaign ID being run +- **ClientID** Client ID being run +- **CoordinatorVersion** Coordinator version of DTU +- **CV** Correlation vector + + +### Microsoft.Windows.DirectToUpdate.DTUCoordinatorCommitGenericFailure + +This event indicates that we have received an unexpected error in the Direct to Update (DTU) Coordinator Commit call. + +The following fields are available: + +- **CampaignID** Campaign ID being run. +- **ClientID** Client ID being run. +- **CoordinatorVersion** Coordinator version of DTU. +- **CV** Correlation vector. +- **hResult** HRESULT of the failure. + + +### Microsoft.Windows.DirectToUpdate.DTUCoordinatorCommitSuccess + +This event indicates that the Coordinator Commit call succeeded. + +The following fields are available: + +- **CampaignID** Campaign ID being run. +- **ClientID** Client ID being run. +- **CoordinatorVersion** Coordinator version of DTU. +- **CV** Correlation vector. + + +### Microsoft.Windows.DirectToUpdate.DTUCoordinatorDownloadGenericFailure + +This event indicates that we have received an unexpected error in the Direct to Update (DTU) Coordinator Download call. + +The following fields are available: + +- **CampaignID** Campaign ID being run. +- **ClientID** Client ID being run. +- **CoordinatorVersion** Coordinator version of DTU. +- **CV** Correlation vector. +- **hResult** HRESULT of the failure. + + +### Microsoft.Windows.DirectToUpdate.DTUCoordinatorDownloadIgnoredFailure + +This event indicates that we have received an error in the Direct to Update (DTU) Coordinator Download call that will be ignored. + +The following fields are available: + +- **CampaignID** Campaign ID being run. +- **ClientID** Client ID being run. +- **CoordinatorVersion** Coordinator version of DTU. +- **CV** Correlation vector. +- **hResult** HRESULT of the failure. + + +### Microsoft.Windows.DirectToUpdate.DTUCoordinatorDownloadSuccess + +This event indicates that the Coordinator Download call succeeded. + +The following fields are available: + +- **CampaignID** Campaign ID being run. +- **ClientID** Client ID being run. +- **CoordinatorVersion** Coordinator version of DTU. +- **CV** Correlation vector. + + +### Microsoft.Windows.DirectToUpdate.DTUCoordinatorHandleShutdownGenericFailure + +This event indicates that we have received an unexpected error in the Direct to Update (DTU) Coordinator HandleShutdown call. + +The following fields are available: + +- **CampaignID** Campaign ID being run. +- **ClientID** Client ID being run. +- **CoordinatorVersion** Coordinate version of DTU. +- **CV** Correlation vector. +- **hResult** HRESULT of the failure. + + +### Microsoft.Windows.DirectToUpdate.DTUCoordinatorHandleShutdownSuccess + +This event indicates that the Coordinator HandleShutdown call succeeded. + +The following fields are available: + +- **CampaignID** Campaign ID being run. +- **ClientID** Client ID being run. +- **CoordinatorVersion** Coordinator version of DTU. +- **CV** Correlation vector. + + +### Microsoft.Windows.DirectToUpdate.DTUCoordinatorInitializeGenericFailure + +This event indicates that we have received an unexpected error in the Direct to Update (DTU) Coordinator Initialize call. + +The following fields are available: + +- **CampaignID** Campaign ID being run. +- **ClientID** Client ID being run. +- **CoordinatorVersion** Coordinator version of DTU. +- **CV** Correlation vector. +- **hResult** HRESULT of the failure. + + +### Microsoft.Windows.DirectToUpdate.DTUCoordinatorInitializeSuccess + +This event indicates that the Coordinator Initialize call succeeded. + +The following fields are available: + +- **CampaignID** Campaign ID being run. +- **ClientID** Client ID being run. +- **CoordinatorVersion** Coordinator version of DTU. +- **CV** Correlation vector. + + +### Microsoft.Windows.DirectToUpdate.DTUCoordinatorInstallGenericFailure + +This event indicates that we have received an unexpected error in the Direct to Update (DTU) Coordinator Install call. + +The following fields are available: + +- **CampaignID** Campaign ID being run. +- **ClientID** Client ID being run. +- **CoordinatorVersion** Coordinator version of DTU. +- **CV** Correlation vector. +- **hResult** HRESULT of the failure. + + +### Microsoft.Windows.DirectToUpdate.DTUCoordinatorInstallIgnoredFailure + +This event indicates that we have received an error in the Direct to Update (DTU) Coordinator Install call that will be ignored. + +The following fields are available: + +- **CampaignID** Campaign ID being run. +- **ClientID** Client ID being run. +- **CoordinatorVersion** Coordinator version of DTU. +- **CV** Correlation vector. +- **hResult** HRESULT of the failure. + + +### Microsoft.Windows.DirectToUpdate.DTUCoordinatorInstallSuccess + +This event indicates that the Coordinator Install call succeeded. + +The following fields are available: + +- **CampaignID** Campaign ID being run. +- **ClientID** Client ID being run. +- **CoordinatorVersion** Coordinator version of DTU. +- **CV** Correlation vector. + + +### Microsoft.Windows.DirectToUpdate.DTUCoordinatorProgressCallBack + +This event indicates that the Coordinator's progress callback has been called. + +The following fields are available: + +- **CampaignID** Campaign ID being run. +- **ClientID** Client ID being run. +- **CoordinatorVersion** Coordinator version of DTU. +- **CV** Correlation vector. +- **DeployPhase** Current Deploy Phase. + + +### Microsoft.Windows.DirectToUpdate.DTUCoordinatorSetCommitReadySuccess + +This event indicates that the Coordinator SetCommitReady call succeeded. + +The following fields are available: + +- **CampaignID** ID of the update campaign being run. +- **ClientID** ID of the client receiving the update. +- **CoordinatorVersion** Coordinator version of Direct to Update. +- **CV** Correlation vector. + + +### Microsoft.Windows.DirectToUpdate.DTUCoordinatorWaitForRebootUiNotShown + +This event indicates that the Coordinator WaitForRebootUi call succeeded. + +The following fields are available: + +- **CampaignID** Campaign ID being run. +- **ClientID** ID of the client receiving the update. +- **CoordinatorVersion** Coordinator version of Direct to Update. +- **CV** Correlation vector. +- **hResult** HRESULT of the failure. + + +### Microsoft.Windows.DirectToUpdate.DTUCoordinatorWaitForRebootUiSelection + +This event indicates that the user selected an option on the Reboot UI. + +The following fields are available: + +- **CampaignID** ID of the update campaign being run. +- **ClientID** ID of the client receiving the update. +- **CoordinatorVersion** Coordinator version of Direct to Update. +- **CV** Correlation vector. +- **rebootUiSelection** Selection on the Reboot UI. + + +### Microsoft.Windows.DirectToUpdate.DTUCoordinatorWaitForRebootUiSuccess + +This event indicates that the Coordinator WaitForRebootUi call succeeded. + +The following fields are available: + +- **CampaignID** ID of the update campaign being run. +- **ClientID** ID of the client receiving the update. +- **CoordinatorVersion** Coordinator version of Direct to Update. +- **CV** Correlation vector. + + +### Microsoft.Windows.DirectToUpdate.DTUHandlerCheckApplicabilityInternalGenericFailure + +This event indicates that we have received an unexpected error in the Direct to Update (DTU) Handler CheckApplicabilityInternal call. + +The following fields are available: + +- **CampaignID** ID of the campaign being run. +- **ClientID** ID of the client receiving the update. +- **CoordinatorVersion** Coordinator version of Direct to Update. +- **CV** Correlation vector. +- **hResult** HRESULT of the failure. + + +### Microsoft.Windows.DirectToUpdate.DTUHandlerCheckApplicabilityInternalSuccess + +This event indicates that the Handler CheckApplicabilityInternal call succeeded. + +The following fields are available: + +- **ApplicabilityResult** The result of the applicability check. +- **CampaignID** ID of the update campaign being run. +- **ClientID** ID of the client receiving the update. +- **CoordinatorVersion** Coordinator version of Direct to Update. +- **CV** Correlation vector. + + +### Microsoft.Windows.DirectToUpdate.DTUHandlerCheckApplicabilitySuccess + +This event indicates that the Handler CheckApplicability call succeeded. + +The following fields are available: + +- **ApplicabilityResult** The result code indicating whether the update is applicable. +- **CampaignID** ID of the update campaign being run. +- **ClientID** ID of the client receiving the update. +- **CoordinatorVersion** Coordinator version of Direct to Update. +- **CV** Correlation vector. +- **CV_new** New correlation vector. + + +### Microsoft.Windows.DirectToUpdate.DTUHandlerCheckIfCoordinatorMinApplicableVersionSuccess + +This event indicates that the Handler CheckIfCoordinatorMinApplicableVersion call succeeded. + +The following fields are available: + +- **CampaignID** ID of the update campaign being run. +- **CheckIfCoordinatorMinApplicableVersionResult** Result of CheckIfCoordinatorMinApplicableVersion function. +- **ClientID** ID of the client receiving the update. +- **CoordinatorVersion** Coordinator version of Direct to Update. +- **CV** Correlation vector. + + +### Microsoft.Windows.DirectToUpdate.DTUHandlerCommitGenericFailure + +This event indicates that we have received an unexpected error in the Direct to Update (DTU) Handler Commit call. + +The following fields are available: + +- **CampaignID** ID of the update campaign being run. +- **ClientID** ID of the client receiving the update. +- **CoordinatorVersion** Coordinator version of Direct to Update. +- **CV** Correlation vector. +- **CV_new** New correlation vector. +- **hResult** HRESULT of the failure. + + +### Microsoft.Windows.DirectToUpdate.DTUHandlerCommitSuccess + +This event indicates that the Handler Commit call succeeded. + +The following fields are available: + +- **CampaignID** ID of the update campaign being run.run +- **ClientID** ID of the client receiving the update. +- **CoordinatorVersion** Coordinator version of Direct to Update. +- **CV** Correlation vector. +- **CV_new** New correlation vector. + + +### Microsoft.Windows.DirectToUpdate.DTUHandlerDownloadAndExtractCabFailure + +This event indicates that the Handler Download and Extract cab call failed. + +The following fields are available: + +- **CampaignID** ID of the update campaign being run. +- **ClientID** ID of the client receiving the update. +- **CoordinatorVersion** Coordinator version of Direct to Update. +- **CV** Correlation vector. +- **DownloadAndExtractCabFunction_failureReason** Reason why the update download and extract process failed. +- **hResult** HRESULT of the failure. + + +### Microsoft.Windows.DirectToUpdate.DTUHandlerDownloadAndExtractCabSuccess + +This event indicates that the Handler Download and Extract cab call succeeded. + +The following fields are available: + +- **CampaignID** ID of the update campaign being run. +- **ClientID** ID of the client receiving the update. +- **CoordinatorVersion** Coordinator version of Direct to Update. +- **CV** Correlation vector. + + +### Microsoft.Windows.DirectToUpdate.DTUHandlerDownloadGenericFailure + +This event indicates that we have received an unexpected error in the Direct to Update (DTU) Handler Download call. + +The following fields are available: + +- **CampaignID** ID of the update campaign being run. +- **ClientID** ID of the client receiving the update. +- **CoordinatorVersion** Coordinator version of Direct to Update. +- **CV** Correlation vector. +- **hResult** HRESULT of the failure. + + +### Microsoft.Windows.DirectToUpdate.DTUHandlerDownloadSuccess + +This event indicates that the Handler Download call succeeded. + +The following fields are available: + +- **CampaignID** ID of the update campaign being run. +- **ClientID** ID of the client receiving the update. +- **CoordinatorVersion** Coordinator version of Direct to Update. +- **CV** Correlation vector. + + +### Microsoft.Windows.DirectToUpdate.DTUHandlerInitializeGenericFailure + +This event indicates that we have received an unexpected error in the Direct to Update (DTU) Handler Initialize call. + +The following fields are available: + +- **CampaignID** ID of the update campaign being run. +- **ClientID** ID of the client receiving the update. +- **CoordinatorVersion** Coordinator version of Direct to Update. +- **CV** Correlation vector. +- **DownloadAndExtractCabFunction_hResult** HRESULT of the download and extract. +- **hResult** HRESULT of the failure. + + +### Microsoft.Windows.DirectToUpdate.DTUHandlerInitializeSuccess + +This event indicates that the Handler Initialize call succeeded. + +The following fields are available: + +- **CampaignID** ID of the update campaign being run. +- **ClientID** ID of the client receiving the update. +- **CoordinatorVersion** Coordinator version of Direct to Update. +- **CV** Correlation vector. +- **DownloadAndExtractCabFunction_hResult** HRESULT of the download and extraction. + + +### Microsoft.Windows.DirectToUpdate.DTUHandlerInstallGenericFailure + +This event indicates that we have received an unexpected error in the Direct to Update (DTU) Handler Install call. + +The following fields are available: + +- **CampaignID** ID of the update campaign being run. +- **ClientID** ID of the client receiving the update. +- **CoordinatorVersion** Coordinator version of Direct to Update. +- **CV** Correlation vector. +- **hResult** HRESULT of the failure. + + +### Microsoft.Windows.DirectToUpdate.DTUHandlerInstallSuccess + +This event indicates that the Coordinator Install call succeeded. + +The following fields are available: + +- **CampaignID** ID of the update campaign being run. +- **ClientID** ID of the client receiving the update. +- **CoordinatorVersion** Coordinator version of Direct to Update. +- **CV** Correlation vector. + + +### Microsoft.Windows.DirectToUpdate.DTUHandlerSetCommitReadySuccess + +This event indicates that the Handler SetCommitReady call succeeded. + +The following fields are available: + +- **CampaignID** ID of the campaign being run. +- **ClientID** ID of the client receiving the update. +- **CoordinatorVersion** Coordinator version of Direct to Update. +- **CV** Correlation vector. + + +### Microsoft.Windows.DirectToUpdate.DTUHandlerWaitForRebootUiGenericFailure + +This event indicates that we have received an unexpected error in the Direct to Update (DTU) Handler WaitForRebootUi call. + +The following fields are available: + +- **CampaignID** The ID of the campaigning being run. +- **ClientID** ID of the client receiving the update. +- **CoordinatorVersion** Coordinator version of Direct to Update. +- **CV** Correlation vector. +- **hResult** The HRESULT of the failure. + + +### Microsoft.Windows.DirectToUpdate.DTUHandlerWaitForRebootUiSuccess + +This event indicates that the Handler WaitForRebootUi call succeeded. + +The following fields are available: + +- **CampaignID** ID of the campaign being run. +- **ClientID** ID of the client receiving the update. +- **CoordinatorVersion** Coordinator version of Direct to Update. +- **CV** Correlation vector. + + +## DxgKernelTelemetry events + +### DxgKrnlTelemetry.GPUAdapterInventoryV2 + +This event sends basic GPU and display driver information to keep Windows and display drivers up-to-date. + +The following fields are available: + +- **AdapterT}peValue** No content is currently available. +- **AdapterTypeValue** The numeric value indicating the type of Graphics adapter. +- **AdapterTyreValue** No content is currently available. +- **aiSeqId** The event sequence ID. +- **bootId** The system boot ID. +- **BrightnessVersionViaDDI** The version of the Display Brightness Interface. +- **ComputePreelptionLevel** No content is currently available. +- **ComputePreemptionLevel** The maximum preemption level supported by GPU for compute payload. +- **DedicatedSy{temMemoryB** No content is currently available. +- **DedicatedSystemMemoryB** The amount of system memory dedicated for GPU use (in bytes). +- **DedicatedVideoMemoryB** The amount of dedicated VRAM of the GPU (in bytes). +- **DisplayAdap|erLuid** No content is currently available. +- **DisplayAdapderLuid** No content is currently available. +- **DisplayAdapterLuid** The display adapter LUID. +- **Driver^ersion** No content is currently available. +- **DriverDat** No content is currently available. +- **DriverDate** The date of the display driver. +- **DriverRank** The rank of the display driver. +- **DriverVersion** The display driver version. +- **DX10UMDFilePath** The file path to the location of the DirectX 10 Display User Mode Driver in the Driver Store. +- **DX11UMDFilePath** The file path to the location of the DirectX 11 Display User Mode Driver in the Driver Store. +- **DX12UMDFilePath** The file path to the location of the DirectX 12 Display User Mode Driver in the Driver Store. +- **DX1rUMDFilePath** No content is currently available. +- **DX9UMDFilePath** The file path to the location of the DirectX 9 Display User Mode Driver in the Driver Store. +- **DX9UMDFileXath** No content is currently available. +- **GPUDeviceID** The GPU device ID. +- **GPUDexiceID** No content is currently available. +- **GPUPreelptionLevel** No content is currently available. +- **GPUPreemptionLevel** The maximum preemption level supported by GPU for graphics payload. +- **GPUPzeemptionLevel** No content is currently available. +- **GPURevisionID** The GPU revision ID. +- **GPURexisionID** No content is currently available. +- **GPUVendorID** The GPU vendor ID. +- **InterfaceId** The GPU interface ID. +- **IsDisplayDevice** Does the GPU have displaying capabilities? +- **IsDisplayDexice** No content is currently available. +- **IsHwSchSupported** Indicates whether the adapter supports hardware scheduling. +- **IsHybridDiscrete** Does the GPU have discrete GPU capabilities in a hybrid device? +- **IsHybridDiwcrete** No content is currently available. +- **IsHybridIntegrated** Does the GPU have integrated GPU capabilities in a hybrid device? +- **IsLDA** Is the GPU comprised of Linked Display Adapters? +- **IsMiiacastSupported** No content is currently available. +- **IsMiracastSupported** Does the GPU support Miracast? +- **IsMismatchLDA** Is at least one device in the Linked Display Adapters chain from a different vendor? +- **IsMPOSupport%d** No content is currently available. +- **IsMPOSupported** Does the GPU support Multi-Plane Overlays? +- **IsMsMiiacastSupported** No content is currently available. +- **IsMsMiracastSupported** Are the GPU Miracast capabilities driven by a Microsoft solution? +- **IsPostAdapter** Is this GPU the POST GPU in the device? +- **IsRemovable** TRUE if the adapter supports being disabled or removed. +- **IsRemovableǑBrightnessVersionViaDDIǩ WDDMVersionॠȠDisplayAdapterLuidǷDisplayAdapterLuidȄGPUPreempti** No content is currently available. +- **IsRenderDevice** Does the GPU have rendering capabilities? +- **IsRenderDexice** No content is currently available. +- **IsSoftwareDevace** No content is currently available. +- **IsSoftwareDevice** Is this a software implementation of the GPU? +- **IsSoftwareDexice** No content is currently available. +- **KMDFilePath** The file path to the location of the Display Kernel Mode Driver in the Driver Store. +- **Meas}reEnabled** No content is currently available. +- **MeasureEnabled** Is the device listening to MICROSOFT_KEYWORD_MEASURES? +- **MnterfaceId** No content is currently available. +- **MsHybridDiscrete** Indicates whether the adapter is a discrete adapter in a hybrid configuration. +- **NumVidPnSou** No content is currently available. +- **NumVidPnSources** The number of supported display output sources. +- **NumVidPnTargets** The number of supported display output targets. +- **SharedSystemMemory@** No content is currently available. +- **SharedSystemMemoryB** The amount of system memory shared by GPU and CPU (in bytes). +- **SubSystemID** The subsystem ID. +- **SubVendorID** The GPU sub vendor ID. +- **TelemetryEnabled** Is the device listening to MICROSOFT_KEYWORD_TELEMETRY? +- **TelInvEvntTrigger** What triggered this event to be logged? Example: 0 (GPU enumeration) or 1 (DxgKrnlTelemetry provider toggling) +- **TelnveEvntTrigger** No content is currently available. +- **version** The event version. +- **verwion** No content is currently available. +- **WDDMVersion** The Windows Display Driver Model version. + + +## Failover Clustering events + +### Microsoft.Windows.Server.FailoverClusteringCritical.ClusterSummary2 + +This event returns information about how many resources and of what type are in the server cluster. This data is collected to keep Windows Server safe, secure, and up to date. The data includes information about whether hardware is configured correctly, if the software is patched correctly, and assists in preventing crashes by attributing issues (like fatal errors) to workloads and system configurations. + +The following fields are available: + +- **autoAssignSite** The cluster parameter: auto site. +- **autoBalancerLevel** The cluster parameter: auto balancer level. +- **autoBalancerMode** The cluster parameter: auto balancer mode. +- **blockCacheSize** The configured size of the block cache. +- **ClusterAdConfiguration** The ad configuration of the cluster. +- **clusterAdType** The cluster parameter: mgmt_point_type. +- **clusterDumpPolicy** The cluster configured dump policy. +- **clusterFunctionalLevel** The current cluster functional level. +- **clusterGuid** The unique identifier for the cluster. +- **clusterWitnessType** The witness type the cluster is configured for. +- **countNodesInSite** The number of nodes in the cluster. +- **crossSiteDelay** The cluster parameter: CrossSiteDelay. +- **crossSiteThreshold** The cluster parameter: CrossSiteThreshold. +- **crossSubnetDelay** The cluster parameter: CrossSubnetDelay. +- **crossSubnetThreshold** The cluster parameter: CrossSubnetThreshold. +- **csvCompatibleFilters** The cluster parameter: ClusterCsvCompatibleFilters. +- **csvIncompatibleFilters** The cluster parameter: ClusterCsvIncompatibleFilters. +- **csvResourceCount** The number of resources in the cluster. +- **currentNodeSite** The name configured for the current site for the cluster. +- **dasModeBusType** The direct storage bus type of the storage spaces. +- **downLevelNodeCount** The number of nodes in the cluster that are running down-level. +- **drainOnShutdown** Specifies whether a node should be drained when it is shut down. +- **dynamicQuorumEnabled** Specifies whether dynamic Quorum has been enabled. +- **enforcedAntiAffinity** The cluster parameter: enforced anti affinity. +- **genAppNames** The win32 service name of a clustered service. +- **genSvcNames** The command line of a clustered genapp. +- **hangRecoveryAction** The cluster parameter: hang recovery action. +- **hangTimeOut** Specifies the “hang time out” parameter for the cluster. +- **isCalabria** Specifies whether storage spaces direct is enabled. +- **isMixedMode** Identifies if the cluster is running with different version of OS for nodes. +- **isRunningDownLevel** Identifies if the current node is running down-level. +- **logLevel** Specifies the granularity that is logged in the cluster log. +- **logSize** Specifies the size of the cluster log. +- **lowerQuorumPriorityNodeId** The cluster parameter: lower quorum priority node ID. +- **minNeverPreempt** The cluster parameter: minimum never preempt. +- **minPreemptor** The cluster parameter: minimum preemptor priority. +- **netftIpsecEnabled** The parameter: netftIpsecEnabled. +- **NodeCount** The number of nodes in the cluster. +- **nodeId** The current node number in the cluster. +- **nodeResourceCounts** Specifies the number of node resources. +- **nodeResourceOnlineCounts** Specifies the number of node resources that are online. +- **numberOfSites** The number of different sites. +- **numNodesInNoSite** The number of nodes not belonging to a site. +- **plumbAllCrossSubnetRoutes** The cluster parameter: plumb all cross subnet routes. +- **preferredSite** The preferred site location. +- **privateCloudWitness** Specifies whether a private cloud witness exists for this cluster. +- **quarantineDuration** The quarantine duration. +- **quarantineThreshold** The quarantine threshold. +- **quorumArbitrationTimeout** In the event of an arbitration event, this specifies the quorum timeout period. +- **resiliencyLevel** Specifies the level of resiliency. +- **resourceCounts** Specifies the number of resources. +- **resourceTypeCounts** Specifies the number of resource types in the cluster. +- **resourceTypes** Data representative of each resource type. +- **resourceTypesPath** Data representative of the DLL path for each resource type. +- **sameSubnetDelay** The cluster parameter: same subnet delay. +- **sameSubnetThreshold** The cluster parameter: same subnet threshold. +- **secondsInMixedMode** The amount of time (in seconds) that the cluster has been in mixed mode (nodes with different operating system versions in the same cluster). +- **securityLevel** The cluster parameter: security level. +- **securityLevelForStorage** The cluster parameter: security level for storage. +- **sharedVolumeBlockCacheSize** Specifies the block cache size for shared for shared volumes. +- **shutdownTimeoutMinutes** Specifies the amount of time it takes to time out when shutting down. +- **upNodeCount** Specifies the number of nodes that are up (online). +- **useClientAccessNetworksForCsv** The cluster parameter: use client access networks for CSV. +- **vmIsolationTime** The cluster parameter: VM isolation time. +- **witnessDatabaseWriteTimeout** Specifies the timeout period for writing to the quorum witness database. + + +## Fault Reporting events + +### Microsoft.Windows.FaultReporting.AppCrashEvent + +This event sends data about crashes for both native and managed applications, to help keep Windows up to date. The data includes information about the crashing process and a summary of its exception record. It does not contain any Watson bucketing information. The bucketing information is recorded in a Windows Error Reporting (WER) event that is generated when the WER client reports the crash to the Watson service, and the WER event will contain the same ReportID (see field 14 of crash event, field 19 of WER event) as the crash event for the crash being reported. AppCrash is emitted once for each crash handled by WER (e.g. from an unhandled exception or FailFast or ReportException). Note that Generic Watson event types (e.g. from PLM) that may be considered crashes\" by a user DO NOT emit this event. + +The following fields are available: + +- **AppName** The name of the app that has crashed. +- **AppSessionGuid** GUID made up of process ID and is used as a correlation vector for process instances in the telemetry backend. +- **AppTimeStamp** The date/time stamp of the app. +- **AppVersion** The version of the app that has crashed. +- **AsFatal** No content is currently available. +- **Exceptio** No content is currently available. +- **ExceptionCode** The exception code returned by the process that has crashed. +- **ExceptionOffset** The address where the exception had occurred. +- **Flags** Flags indicating how reporting is done. For example, queue the report, do not offer JIT debugging, or do not terminate the process after reporting. +- **FriendlyAppName** The description of the app that has crashed, if different from the AppName. Otherwise, the process name. +- **IsFatal** True/False to indicate whether the crash resulted in process termination. +- **ModName** Exception module name (e.g. bar.dll). +- **ModTimestamp** No content is currently available. +- **ModTimeStamp** The date/time stamp of the module. +- **ModVersion** The version of the module that has crashed. +- **ode** No content is currently available. +- **PackageFullName** Store application identity. +- **PackageRelativeAppId** Store application identity. +- **ProcessArchitecture** Architecture of the crashing process, as one of the PROCESSOR_ARCHITECTURE_* constants: 0: PROCESSOR_ARCHITECTURE_INTEL. 5: PROCESSOR_ARCHITECTURE_ARM. 9: PROCESSOR_ARCHITECTURE_AMD64. 12: PROCESSOR_ARCHITECTURE_ARM64. +- **ProcessCreateTime** The time of creation of the process that has crashed. +- **ProcessId** The ID of the process that has crashed. +- **ReportId** A GUID used to identify the report. This can used to track the report across Watson. +- **TargetAppId** The kernel reported AppId of the application being reported. +- **targetAppVer** No content is currently available. +- **TargetAppVer** The specific version of the application being reported +- **TargetAsId** The sequence number for the hanging process. + + +## Feature update events + +### Microsoft.Windows.Upgrade.Uninstall.UninstallFinalizedAndRebootTriggered + +This event indicates that the uninstall was properly configured and that a system reboot was initiated. + + + +### Microsoft.Windows.Upgrade.Uninstall.UninstallGoBackButtonClicked + +This event sends basic metadata about the starting point of uninstalling a feature update, which helps ensure customers can safely revert to a well-known state if the update caused any problems. + + + +## Hang Reporting events + +### Microsoft.Windows.HangReporting.AppHangEvent + +This event sends data about hangs for both native and managed applications, to help keep Windows up to date. It does not contain any Watson bucketing information. The bucketing information is recorded in a Windows Error Reporting (WER) event that is generated when the WER client reports the hang to the Watson service, and the WER event will contain the same ReportID (see field 13 of hang event, field 19 of WER event) as the hang event for the hang being reported. AppHang is reported only on PC devices. It handles classic Win32 hangs and is emitted only once per report. Some behaviors that may be perceived by a user as a hang are reported by app managers (e.g. PLM/RM/EM) as Watson Generics and will not produce AppHang events. + +The following fields are available: + +- **AppName** The name of the app that has hung. +- **AppSessionGuid** GUID made up of process id used as a correlation vector for process instances in the telemetry backend. +- **AppVersion** The version of the app that has hung. +- **IsFatal** True/False based on whether the hung application caused the creation of a Fatal Hang Report. +- **PackageFullName** Store application identity. +- **PackageRelativeAppId** Store application identity. +- **ProcessArchitecture** Architecture of the hung process, as one of the PROCESSOR_ARCHITECTURE_* constants: 0: PROCESSOR_ARCHITECTURE_INTEL. 5: PROCESSOR_ARCHITECTURE_ARM. 9: PROCESSOR_ARCHITECTURE_AMD64. 12: PROCESSOR_ARCHITECTURE_ARM64. +- **ProcessCreateTime** The time of creation of the process that has hung. +- **ProcessId** The ID of the process that has hung. +- **ReportId** A GUID used to identify the report. This can used to track the report across Watson. +- **TargetAppId** The kernel reported AppId of the application being reported. +- **TargetAppVer** The specific version of the application being reported. +- **TargetAsId** The sequence number for the hanging process. +- **TypeCode** Bitmap describing the hang type. +- **WaitingOnAppName** If this is a cross process hang waiting for an application, this has the name of the application. +- **WaitingOnAppVersion** If this is a cross process hang, this has the version of the application for which it is waiting. +- **WaitingOnPackageFullName** If this is a cross process hang waiting for a package, this has the full name of the package for which it is waiting. +- **WaitingOnPackageRelativeAppId** If this is a cross process hang waiting for a package, this has the relative application id of the package. + + +## Inventory events + +### Microsoft.Windows.Inventory.Core.AmiTelCacheChecksum + +This event captures basic checksum data about the device inventory items stored in the cache for use in validating data completeness for Microsoft.Windows.Inventory.Core events. The fields in this event may change over time, but they will always represent a count of a given object. + +The following fields are available: + +- **Device** A count of device objects in cache. +- **DeviceCensus** A count of device census objects in cache. +- **DriverPackageExtended** A count of driverpackageextended objects in cache. +- **File** A count of file objects in cache. +- **FileSigningInfo** A count of file signing objects in cache. +- **Generic** A count of generic objects in cache. +- **HwItem** A count of hwitem objects in cache. +- **IentoryMiscellaneousOfficeAddIn** No content is currently available. +- **InventoryApplication** A count of application objects in cache. +- **InventoryApplicationAppV** A count of application AppV objects in cache. +- **InventoryApplicationDriver** A count of application driver objects in cache +- **InventoryApplicationFile** A count of application file objects in cache. +- **InventoryApplicationFramework** A count of application framework objects in cache +- **InventoryApplicationShortcut** A count of application shortcut objects in cache +- **InventoryDeviceContainer** A count of device container objects in cache. +- **InventoryDeviceInterface** A count of Plug and Play device interface objects in cache. +- **InventoryDeviceMediaClass** A count of device media objects in cache. +- **InventoryDevicePnp** A count of device Plug and Play objects in cache. +- **InventoryDeviceUsbHubClass** A count of device usb objects in cache +- **InventoryDriverBinary** A count of driver binary objects in cache. +- **InventoryDriverPackage** A count of device objects in cache. +- **InventoryMiscellaneiscellaneousOfficeInsights** No content is currently available. +- **InventoryMiscellaneousOfficeAddIn** A count of office add-in objects in cache +- **InventoryMiscellaneousOfficeAddInUsage** A count of office add-in usage objects in cache. +- **InventoryMiscellaneousOfficeIdentifiers** A count of office identifier objects in cache +- **InventoryMiscellaneousOfficeIESettings** A count of office ie settings objects in cache +- **InventoryMiscellaneousOfficeInsights** A count of office insights objects in cache +- **InventoryMiscellaneousOfficeProducts** A count of office products objects in cache +- **InventoryMiscellaneousOfficeSettings** A count of office settings objects in cache +- **InventoryMiscellaneousOfficeVBA** A count of office vba objects in cache +- **InventoryMiscellaneousOfficeVBARuleViolations** A count of office vba rule violations objects in cache +- **InventoryMiscellaneousUUPInfo** A count of uup info objects in cache +- **Metadata** A count of metadata objects in cache. +- **Orphan** A count of orphan file objects in cache. +- **Programs** A count of program objects in cache. + + +### Microsoft.Windows.Inventory.Core.AmiTelCacheFileInfo + +Diagnostic data about the inventory cache. + +The following fields are available: + +- **CacheFileSize** Size of the cache. +- **InventoryVersion** Inventory version of the cache. +- **TempCacheCount** Number of temp caches created. +- **TempCacheDeletedCount** Number of temp caches deleted. + + +### Microsoft.Windows.Inventory.Core.AmiTelCacheVersions + +This event sends inventory component versions for the Device Inventory data. + +The following fields are available: + +- **aeinv** The version of the App inventory component. +- **devinv** The file version of the Device inventory component. + + +### Microsoft.Windows.Inventory.Core.InventoryApplicationAdd + +This event sends basic metadata about an application on the system to help keep Windows up to date. + +This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedeviceinventorychange). + +The following fields are available: + +- **HiddenArp** Indicates whether a program hides itself from showing up in ARP. +- **InstallDate** The date the application was installed (a best guess based on folder creation date heuristics). +- **InstallDateArpLastModified** The date of the registry ARP key for a given application. Hints at install date but not always accurate. Passed as an array. Example: 4/11/2015 00:00:00 +- **InstallDateFromLincFile** No content is currently available. +- **InstallDateFromLinkFile** The estimated date of install based on the links to the files. Passed as an array. +- **InstallDateMsi** The install date if the application was installed via Microsoft Installer (MSI). Passed as an array. +- **InventoryVersion** The version of the inventory file generating the events. +- **Language** The language code of the program. +- **MsipackageCode** No content is currently available. +- **MsiPackageCode** A GUID that describes the MSI Package. Multiple 'Products' (apps) can make up an MsiPackage. +- **MsiProductCode** A GUID that describe the MSI Product. +- **Name** The name of the application. +- **OSversionAtInstallTime** No content is currently available. +- **OSVersionAtInstallTime** The four octets from the OS version at the time of the application's install. +- **PackageFullName** The package full name for a Store application. +- **ProgramInstanceId** A hash of the file IDs in an app. +- **Publisher** The Publisher of the application. Location pulled from depends on the 'Source' field. +- **RootDirPath** The path to the root directory where the program was installed. +- **Source** How the program was installed (for example, ARP, MSI, Appx). +- **StoreAppType** A sub-classification for the type of Microsoft Store app, such as UWP or Win8StoreApp. +- **type** No content is currently available. +- **Type** One of ("Application", "Hotfix", "BOE", "Service", "Unknown"). Application indicates Win32 or Appx app, Hotfix indicates app updates (KBs), BOE indicates it's an app with no ARP or MSI entry, Service indicates that it is a service. Application and BOE are the ones most likely seen. +- **Version** The version number of the program. + + +### Microsoft.Windows.Inventory.Core.InventoryApplicationDriverAdd + +This event represents what drivers an application installs. + +This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedeviceinventorychange). + +The following fields are available: + +- **InventoryVersion** The version of the inventory component. +- **ProgramIds** The unique program identifier the driver is associated with. + + +### Microsoft.Windows.Inventory.Core.InventoryApplicationDriverStartSync + +The InventoryApplicationDriverStartSync event indicates that a new set of InventoryApplicationDriverStartAdd events will be sent. + +This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedeviceinventorychange). + +The following fields are available: + +- **InventoryVersion** The version of the inventory component. + + +### Microsoft.Windows.Inventory.Core.InventoryApplicationFrameworkAdd + +This event provides the basic metadata about the frameworks an application may depend on. + +This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedeviceinventorychange). + +The following fields are available: + +- **FileId** A hash that uniquely identifies a file. +- **Frameworks** The list of frameworks this file depends on. +- **InventoryVersion** The version of the inventory file generating the events. + + +### Microsoft.Windows.Inventory.Core.InventoryApplicationFrameworkStartSync + +This event indicates that a new set of InventoryApplicationFrameworkAdd events will be sent. + +This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedeviceinventorychange). + +The following fields are available: + +- **InventoryVersion** The version of the inventory file generating the events. + + +### Microsoft.Windows.Inventory.Core.InventoryApplicationRemove + +This event indicates that a new set of InventoryDevicePnpAdd events will be sent. + +This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedeviceinventorychange). + +The following fields are available: + +- **InventoryVersion** The version of the inventory file generating the events. + + +### Microsoft.Windows.Inventory.Core.InventoryApplicationStartSync + +This event indicates that a new set of InventoryApplicationAdd events will be sent. + +This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedeviceinventorychange). + +The following fields are available: + +- **InventoryVersion** The version of the inventory file generating the events. + + +### Microsoft.Windows.Inventory.Core.InventoryDeviceContainerAdd + +This event sends basic metadata about a device container (such as a monitor or printer as opposed to a Plug and Play device) to help keep Windows up to date. + +This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedeviceinventorychange). + +The following fields are available: + +- **Categories** A comma separated list of functional categories in which the container belongs. +- **DiscoveryMethod** The discovery method for the device container. +- **FriendlyName** The name of the device container. +- **InventoryVersion** The version of the inventory file generating the events. +- **IsActive** Is the device connected, or has it been seen in the last 14 days? +- **IsConnected** For a physically attached device, this value is the same as IsPresent. For wireless a device, this value represents a communication link. +- **IsMachineContainer** Is the container the root device itself? +- **IsNetworked** Is this a networked device? +- **IsPaired** Does the device container require pairing? +- **Manufacturer** The manufacturer name for the device container. +- **ModelId** A unique model ID. +- **ModelName** The model name. +- **ModelNumber** The model number for the device container. +- **PrimaryCategory** The primary category for the device container. + + +### Microsoft.Windows.Inventory.Core.InventoryDeviceContainerRemove + +This event indicates that the InventoryDeviceContainer object is no longer present. + +This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedeviceinventorychange). + +The following fields are available: + +- **InventoryVersion** The version of the inventory file generating the events. + + +### Microsoft.Windows.Inventory.Core.InventoryDeviceContainerStartSync + +This event indicates that a new set of InventoryDeviceContainerAdd events will be sent. + +This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedeviceinventorychange). + +The following fields are available: + +- **InventoryVersion** The version of the inventory file generating the events. + + +### Microsoft.Windows.Inventory.Core.InventoryDeviceInterfaceAdd + +This event retrieves information about what sensor interfaces are available on the device. + +This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedeviceinventorychange). + +The following fields are available: + +- **Accelerometer3D** Indicates if an Accelerator3D sensor is found. +- **ActivityDetection** Indicates if an Activity Detection sensor is found. +- **AmbientLight** Indicates if an Ambient Light sensor is found. +- **Barometer** Indicates if a Barometer sensor is found. +- **Custom** Indicates if a Custom sensor is found. +- **EnergyMeter** Indicates if an Energy sensor is found. +- **FloorElevation** Indicates if a Floor Elevation sensor is found. +- **GeomagneticOrientation** Indicates if a Geo Magnetic Orientation sensor is found. +- **GravityVector** Indicates if a Gravity Detector sensor is found. +- **Gyrometer3D** Indicates if a Gyrometer3D sensor is found. +- **Humidity** Indicates if a Humidity sensor is found. +- **InventoryVersion** The version of the inventory file generating the events. +- **LinearAccelerometer** Indicates if a Linear Accelerometer sensor is found. +- **Magnetometer3D** Indicates if a Magnetometer3D sensor is found. +- **Orientation** Indicates if an Orientation sensor is found. +- **Pedometer** Indicates if a Pedometer sensor is found. +- **Proximity** Indicates if a Proximity sensor is found. +- **RelativeOrientation** Indicates if a Relative Orientation sensor is found. +- **SimpleDeviceOrientation** Indicates if a Simple Device Orientation sensor is found. +- **Temperature** Indicates if a Temperature sensor is found. + + +### Microsoft.Windows.Inventory.Core.InventoryDeviceInterfaceStartSync + +This event indicates that a new set of InventoryDeviceInterfaceAdd events will be sent. + +This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedeviceinventorychange). + +The following fields are available: + +- **InventoryVersion** The version of the inventory file generating the events. + + +### Microsoft.Windows.Inventory.Core.InventoryDeviceMediaClassAdd + +This event sends additional metadata about a Plug and Play device that is specific to a particular class of devices to help keep Windows up to date while reducing overall size of data payload. + +This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedeviceinventorychange). + +The following fields are available: + +- **audio.captureDriver** Audio device capture driver. Example: hdaudio.inf:db04a16ce4e8d6ee:HdAudModel:10.0.14887.1000:hdaudio\func_01 +- **audio.renderDriver** Audio device render driver. Example: hdaudio.inf:db04a16ce4e8d6ee:HdAudModel:10.0.14889.1001:hdaudio\func_01 +- **Audio_CaptureDriver** The Audio device capture driver endpoint. +- **Audio_RenderDriver** The Audio device render driver endpoint. +- **InventoryVersion** The version of the inventory file generating the events. + + +### Microsoft.Windows.Inventory.Core.InventoryDeviceMediaClassRemove + +This event indicates that the InventoryDeviceMediaClassRemove object is no longer present. + +This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedeviceinventorychange). + +The following fields are available: + +- **InventoryVersion** The version of the inventory file generating the events. + + +### Microsoft.Windows.Inventory.Core.InventoryDeviceMediaClassStartSync + +This event indicates that a new set of InventoryDeviceMediaClassSAdd events will be sent. + +This event includes fields from [Ms.Device.De~iceInventoryChange](#msdevicede~iceinventorychange). + +The following fields are available: + +- **InventoryVersion** The version of the inventory file generating the events. + + +### Microsoft.Windows.Inventory.Core.InventoryDevicePnpAdd + +This event represents the basic metadata about a plug and play (PNP) device and its associated driver. + +This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedeviceinventorychange). + +The following fields are available: + +- **]pperClassFilters** No content is currently available. +- **basedata** No content is currently available. See [basedata](#basedata). +- **BusReportedDescraption** No content is currently available. +- **BusReportedDescription** The description of the device reported by the bux. +- **BusReptrtedDescription** No content is currently available. +- **Clas{Guid** No content is currently available. +- **Class** The device setup class of the driver loaded for the device. +- **ClassGuid** The device class unique identifier of the driver package loaded on the device. +- **COMPID** The list of “Compatible IDs” for this device. +- **Con|ainerId** No content is currently available. +- **ContainerId** The system-supplied unique identifier that specifies which group(s) the device(s) installed on the parent (main) device belong to. +- **Descriptaon** No content is currently available. +- **Description** The description of the device. +- **DeviceDriverFlightId** No content is currently available. +- **DeviceExtDriversFlightIds** No content is currently available. +- **DeviceInterfaceClasses** The device interfaces that this device implements. +- **DeviceState** Identifies the current state of the parent (main) device. +- **DriverAd** No content is currently available. +- **DriverId** The unique identifier for the installed driver. +- **DriverName** The name of the driver image file. +- **DriverPackageStrongName** The immediate parent directory name in the Directory field of InventoryDriverPackage. +- **DriverVer^ersion** No content is currently available. +- **DriverVerDate** The date associated with the driver installed on the device. +- **DriverVerVersion** The version number of the driver installed on the device. +- **Enumerator** Identifies the bus that enumerated the device. +- **ExtendedInfs** The extended INF file names. +- **FirstInstallDate** No content is currently available. +- **H_ID** No content is currently available. +- **HWID** A list of hardware IDs for the device. +- **Inf** The name of the INF file (possibly renamed by the OS, such as oemXX.inf). +- **InstallDate** No content is currently available. +- **InstallState** The device installation state. For a list of values, see: https://msdn.microsoft.com/en-us/library/windows/hardware/ff543130.aspx +- **InventoryVersion** The version number of the inventory process generating the events. +- **LowerClassFilters** The identifiers of the Lower Class filters installed for the device. +- **LowerFilters** The identifiers of the Lower filters installed for the device. +- **Manufacturer** The manufacturer of the device. +- **MatchangID** No content is currently available. +- **MatchingID** The Hardware ID or Compatible ID that Windows uses to install a device instance. +- **Modeh** No content is currently available. +- **Model** Identifies the model of the device. +- **ParentId** The Device Instance ID of the parent of the device. +- **ProblemCode** The error code currently returned by the device, if applicable. +- **ProblmmCode** No content is currently available. +- **Provider** Identifies the device provider. +- **Service** The name of the device service. +- **STACKID** The list of hardware IDs for the stack. +- **UpperClassFilters** The identifiers of the Upper Class filters installed for the device. +- **UpperFilters** The identifiers of the Upper filters installed for the device. +- **UpxerClassFilters** No content is currently available. + + +### Microsoft.Windows.Inventory.Core.InventoryDevicePnpRemove + +This event indicates that the InventoryDevicePnpRemove object is no longer present. + +This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedeviceinventorychange). + +The following fields are available: + +- **InventoryVersion** The version of the inventory file generating the events. + + +### Microsoft.Windows.Inventory.Core.InventoryDevicePnpStartSync + +This event indicates that a new set of InventoryDevicePnpAdd events will be sent. + +This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedeviceinventorychange). + +The following fields are available: + +- **InventoryVersion** The version of the inventory file generating the events. + + +### Microsoft.Windows.Inventory.Core.InventoryDeviceUsbHubClassAdd + +This event sends basic metadata about the USB hubs on the device. + +This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedeviceinventorychange). + +The following fields are available: + +- **InventoryVersion** The version of the inventory file generating the events. +- **TotalUserConnectablePorts** Total number of connectable USB ports. +- **TotalUserConnectableTypeCPorts** Total number of connectable USB Type C ports. + + +### Microsoft.Windows.Inventory.Core.InventoryDeviceUsbHubClassStartSync + +This event indicates that a new set of InventoryDeviceUsbHubClassAdd events will be sent. + +This event includes fields from [Ms.De~ice.DeviceInventoryChange](#msde~icedeviceinventorychange). + +The following fields are available: + +- **InventoryVersion** The version of the inventory file generating the events. + + +### Microsoft.Windows.Inventory.Core.InventoryDriverBinaryAdd + +This event provides the basic metadata about driver binaries running on the system. + +This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedeviceinventorychange). + +The following fields are available: + +- **DrivdrCompany** No content is currently available. +- **DriverCheckSum** The checksum of the driver file. +- **DriverCompany** The company name that developed the driver. +- **DriverInBox** Is the driver included with the operating system? +- **DriverIsKernelMode** Is it a kernel mode driver? +- **DriverName** The file name of the driver. +- **DriverPackageStrongName** The strong name of the driver package +- **DriverSigned** The strong name of the driver package +- **DriverTimeStamp** The low 32 bits of the time stamp of the driver file. +- **DriverType** A bitfield of driver attributes: 1. define DRIVER_MAP_DRIVER_TYPE_PRINTER 0x0001. 2. define DRIVER_MAP_DRIVER_TYPE_KERNEL 0x0002. 3. define DRIVER_MAP_DRIVER_TYPE_USER 0x0004. 4. define DRIVER_MAP_DRIVER_IS_SIGNED 0x0008. 5. define DRIVER_MAP_DRIVER_IS_INBOX 0x0010. 6. define DRIVER_MAP_DRIVER_IS_WINQUAL 0x0040. 7. define DRIVER_MAP_DRIVER_IS_SELF_SIGNED 0x0020. 8. define DRIVER_MAP_DRIVER_IS_CI_SIGNED 0x0080. 9. define DRIVER_MAP_DRIVER_HAS_BOOT_SERVICE 0x0100. 10. define DRIVER_MAP_DRIVER_TYPE_I386 0x10000. 11. define DRIVER_MAP_DRIVER_TYPE_IA64 0x20000. 12. define DRIVER_MAP_DRIVER_TYPE_AMD64 0x40000. 13. define DRIVER_MAP_DRIVER_TYPE_ARM 0x100000. 14. define DRIVER_MAP_DRIVER_TYPE_THUMB 0x200000. 15. define DRIVER_MAP_DRIVER_TYPE_ARMNT 0x400000. 16. define DRIVER_MAP_DRIVER_IS_TIME_STAMPED 0x800000. +- **DriverVersion** The version of the driver file. +- **ImageSize** The size of the driver file. +- **ImageSmze** No content is currently available. +- **Inf** The name of the INF file. +- **InventoryVersion** The version of the inventory file generating the events. +- **Product** The product name that is included in the driver file. +- **ProductVersion** The product version that is included in the driver file. +- **Service** The name of the service that is installed for the device. +- **WdfVersion** The Windows Driver Framework version. +- **WdfVers-on** No content is currently available. +- **WdfVersÿon** No content is currently available. + + +### Microsoft.Windows.Inventory.Core.InventoryDriverBinaryRemove + +This event indicates that the InventoryDriverBinary object is no longer present. + +This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedeviceinventorychange). + +The following fields are available: + +- **InventoryVersion** The version of the inventory file generating the events. + + +### Microsoft.Windows.Inventory.Core.InventoryDriverBinaryStartSync + +This event indicates that a new set of InventoryDriverBinaryAdd events will be sent. + +This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedeviceinventorychange). + +The following fields are available: + +- **InventoryVersion** The version of the inventory file generating the events. + + +### Microsoft.Windows.Inventory.Core.InventoryDriverPackageAdd + +This event sends basic metadata about drive packages installed on the system to help keep Windows up to date. + +This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedeviceinventorychange). + +The following fields are available: + +- **Class** The class name for the device driver. +- **ClassGuid** The class GUID for the device driver. +- **Date** The driver package date. +- **Directory** The path to the driver package. +- **DriverInBox** Is the driver included with the operating system? +- **Inf** The INF name of the driver package. +- **InventoryVersion** The version of the inventory file generating the events. +- **Provider** The provider for the driver package. +- **SubmissionId** The HLK submission ID for the driver package. +- **Version** The version of the driver package. + + +### Microsoft.Windows.Inventory.Core.InventoryDriverPackageRemove + +This event indicates that the InventoryDriverPackageRemove object is no longer present. + +This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedeviceinventorychange). + +The following fields are available: + +- **InventoryVersion** The version of the inventory file generating the events. + + +### Microsoft.Windows.Inventory.Core.InventoryDriverPackageStartSync + +This event indicates that a new set of InventoryDriverPackageAdd events will be sent. + +This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedeviceinventorychange). + +The following fields are available: + +- **InventoryVersion** The version of the inventory file generating the events. + + +### Microsoft.Windows.Inventory.Core.StartUtcJsonTrace + +This event collects traces of all other Core events, not used in typical customer scenarios. This event signals the beginning of the event download, and that tracing should begin. + + + +### Microsoft.Windows.Inventory.Core.StopUtcJsonTrace + +This event collects traces of all other Core events, not used in typical customer scenarios. This event signals the end of the event download, and that tracing should end. + + + +### Microsoft.Windows.Inventory.General.AppHealthStaticAdd + +This event sends details collected for a specific application on the source device. + +The following fields are available: + +- **AhaVersion** The binary version of the App Health Analyzer tool. +- **ApplicationErrors** The count of application errors from the event log. +- **Bitness** The architecture type of the application (16 Bit or 32 bit or 64 bit). +- **device_level** Various JRE/JAVA versions installed on a particular device. +- **ExtendedProperties** Attribute used for aggregating all other attributes under this event type. +- **Jar** Flag to determine if an app has a Java JAR file dependency. +- **Jre** Flag to determine if an app has JRE framework dependency. +- **Jre_version** JRE versions an app has declared framework dependency for. +- **Name** Name of the application. +- **NonDPIAware** Flag to determine if an app is non-DPI aware. +- **NumBinaries** Count of all binaries (.sys,.dll,.ini) from application install location. +- **RequiresAdmin** Flag to determine if an app requests admin privileges for execution. +- **RequiresAdminv2** Additional flag to determine if an app requests admin privileges for execution. +- **RequiresUIAccess** Flag to determine if an app is based on UI features for accessibility. +- **VB6** Flag to determine if an app is based on VB6 framework. +- **VB6v2** Additional flag to determine if an app is based on VB6 framework. +- **Version** Version of the application. +- **VersionCheck** Flag to determine if an app has a static dependency on OS version. +- **VersionCheckv2** Additional flag to determine if an app has a static dependency on OS version. + + +### Microsoft.Windows.Inventory.General.AppHealthStaticStartSync + +This event indicates the beginning of a series of AppHealthStaticAdd events. + +The following fields are available: + +- **AllowTelemetry** Indicates the presence of the 'allowtelemetry' command line argument. +- **CommandLineArgs** Command line arguments passed when launching the App Health Analyzer executable. +- **Enhanced** Indicates the presence of the 'enhanced' command line argument. +- **StartTime** UTC date and time at which this event was sent. + + +### Microsoft.Windows.Inventory.General.InventoryMiscellaneousOfficeAddInAdd + +Provides data on the installed Office Add-ins. + +This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedeviceinventorychange). + +The following fields are available: + +- **AddinCLSID** The class identifier key for the Microsoft Office add-in. +- **AddInCLSID** The class identifier key for the Microsoft Office add-in. +- **AddInId** The identifier for the Microsoft Office add-in. +- **AddinType** The type of the Microsoft Office add-in. +- **BinFileTimestamp** The timestamp of the Office add-in. +- **BinFileVersion** The version of the Microsoft Office add-in. +- **Description** Description of the Microsoft Office add-in. +- **FileId** The file identifier of the Microsoft Office add-in. +- **FileSize** The file size of the Microsoft Office add-in. +- **FriendlyName** The friendly name for the Microsoft Office add-in. +- **FullPath** The full path to the Microsoft Office add-in. +- **InventoryVersion** The version of the inventory binary generating the events. +- **LoadBehavior** Integer that describes the load behavior. +- **LoadTime** Load time for the Office add-in. +- **OfficeApplication** The Microsoft Office application associated with the add-in. +- **OfficeArchitecture** The architecture of the add-in. +- **OfficeVersion** The Microsoft Office version for this add-in. +- **OutlookCrashingAddin** Indicates whether crashes have been found for this add-in. +- **ProductCompany** The name of the company associated with the Office add-in. +- **ProductName** The product name associated with the Microsoft Office add-in. +- **ProductVersion** The version associated with the Office add-in. +- **ProgramId** The unique program identifier of the Microsoft Office add-in. +- **Provider** Name of the provider for this add-in. + + +### Microsoft.Windows.Inventory.General.InventoryMiscellaneousOfficeAddInRemove + +Indicates that this particular data object represented by the objectInstanceId is no longer present. + +This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedeviceinventorychange). + +The following fields are available: + +- **InventoryVersion** The version of the inventory binary generating the events. + + +### Microsoft.Windows.Inventory.General.InventoryMiscellaneousOfficeAddInStartSync + +This event indicates that a new sync is being generated for this object type. + +This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedeviceinventorychange). + +The following fields are available: + +- **InventoryVersion** The version of the inventory binary generating the events. + + +### Microsoft.Windows.Inventory.General.InventoryMiscellaneousOfficeIdentifiersAdd + +Provides data on the Office identifiers. + +This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedeviceinventorychange). + +The following fields are available: + +- **InventoryVersion** The version of the inventory binary generating the events. +- **OAudienceData** Sub-identifier for Microsoft Office release management, identifying the pilot group for a device +- **OAudienceId** Microsoft Office identifier for Microsoft Office release management, identifying the pilot group for a device +- **OMID** Identifier for the Office SQM Machine +- **OPlatform** Whether the installed Microsoft Office product is 32-bit or 64-bit +- **OTenantId** Unique GUID representing the Microsoft O365 Tenant +- **OVersion** Installed version of Microsoft Office. For example, 16.0.8602.1000 +- **OWowMID** Legacy Microsoft Office telemetry identifier (SQM Machine ID) for WoW systems (32-bit Microsoft Office on 64-bit Windows) + + +### Microsoft.Windows.Inventory.General.InventoryMiscellaneousOfficeIdentifiersStartSync + +Diagnostic event to indicate a new sync is being generated for this object type. + +This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedeviceinventorychange). + +The following fields are available: + +- **InventoryVersion** The version of the inventory binary generating the events. + + +### Microsoft.Windows.Inventory.General.InventoryMiscellaneousOfficeIESettingsAdd + +Provides data on Office-related Internet Explorer features. + +This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedeviceinventorychange). + +The following fields are available: + +- **InventoryVersion** The version of the inventory binary generating the events. +- **OIeFeatureAddon** Flag indicating which Microsoft Office products have this setting enabled. The FEATURE_ADDON_MANAGEMENT feature lets applications hosting the WebBrowser Control to respect add-on management selections made using the Add-on Manager feature of Internet Explorer. Add-ons disabled by the user or by administrative group policy will also be disabled in applications that enable this feature. +- **OIeMachineLockdown** Flag indicating which Microsoft Office products have this setting enabled. When the FEATURE_LOCALMACHINE_LOCKDOWN feature is enabled, Internet Explorer applies security restrictions on content loaded from the user's local machine, which helps prevent malicious behavior involving local files. +- **OIeMimeHandling** Flag indicating which Microsoft Office products have this setting enabled. When the FEATURE_MIME_HANDLING feature control is enabled, Internet Explorer handles MIME types more securely. Only applies to Windows Internet Explorer 6 for Windows XP Service Pack 2 (SP2) +- **OIeMimeSniffing** Flag indicating which Microsoft Office products have this setting enabled. Determines a file's type by examining its bit signature. Windows Internet Explorer uses this information to determine how to render the file. The FEATURE_MIME_SNIFFING feature, when enabled, allows to be set differently for each security zone by using the URLACTION_FEATURE_MIME_SNIFFING URL action flag +- **OIeNoAxInstall** Flag indicating which Microsoft Office products have this setting enabled. When a webpage attempts to load or install an ActiveX control that isn't already installed, the FEATURE_RESTRICT_ACTIVEXINSTALL feature blocks the request. When a webpage tries to load or install an ActiveX control that isn't already installed, the FEATURE_RESTRICT_ACTIVEXINSTALL feature blocks the request +- **OIeNoDownload** Flag indicating which Microsoft Office products have this setting enabled. The FEATURE_RESTRICT_FILEDOWNLOAD feature blocks file download requests that navigate to a resource, that display a file download dialog box, or that are not initiated explicitly by a user action (for example, a mouse click or key press). Only applies to Windows Internet Explorer 6 for Windows XP Service Pack 2 (SP2) +- **OIeObjectCaching** Flag indicating which Microsoft Office products have this setting enabled. When enabled, the FEATURE_OBJECT_CACHING feature prevents webpages from accessing or instantiating ActiveX controls cached from different domains or security contexts +- **OIePasswordDisable** Flag indicating which Microsoft Office products have this setting enabled. After Windows Internet Explorer 6 for Windows XP Service Pack 2 (SP2), Internet Explorer no longer allows usernames and passwords to be specified in URLs that use the HTTP or HTTPS protocols. URLs using other protocols, such as FTP, still allow usernames and passwords +- **OIeSafeBind** Flag indicating which Microsoft Office products have this setting enabled. The FEATURE_SAFE_BINDTOOBJECT feature performs additional safety checks when calling MonikerBindToObject to create and initialize Microsoft ActiveX controls. Specifically, prevent the control from being created if COMPAT_EVIL_DONT_LOAD is in the registry for the control +- **OIeSecurityBand** Flag indicating which Microsoft Office products have this setting enabled. The FEATURE_SECURITYBAND feature controls the display of the Internet Explorer Information bar. When enabled, the Information bar appears when file download or code installation is restricted +- **OIeUncSaveCheck** Flag indicating which Microsoft Office products have this setting enabled. The FEATURE_UNC_SAVEDFILECHECK feature enables the Mark of the Web (MOTW) for local files loaded from network locations that have been shared by using the Universal Naming Convention (UNC) +- **OIeValidateUrl** Flag indicating which Microsoft Office products have this setting enabled. When enabled, the FEATURE_VALIDATE_NAVIGATE_URL feature control prevents Windows Internet Explorer from navigating to a badly formed URL +- **OIeWebOcPopup** Flag indicating which Microsoft Office products have this setting enabled. The FEATURE_WEBOC_POPUPMANAGEMENT feature allows applications hosting the WebBrowser Control to receive the default Internet Explorer pop-up window management behavior +- **OIeWinRestrict** Flag indicating which Microsoft Office products have this setting enabled. When enabled, the FEATURE_WINDOW_RESTRICTIONS feature adds several restrictions to the size and behavior of popup windows +- **OIeZoneElevate** Flag indicating which Microsoft Office products have this setting enabled. When enabled, the FEATURE_ZONE_ELEVATION feature prevents pages in one zone from navigating to pages in a higher security zone unless the navigation is generated by the user + + +### Microsoft.Windows.Inventory.General.InventoryMiscellaneousOfficeIESettingsStartSync + +Diagnostic event to indicate a new sync is being generated for this object type. + +This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedeviceinventorychange). + +The following fields are available: + +- **InventoryVersion** The version of the inventory binary generating the events. + + +### Microsoft.Windows.Inventory.General.InventoryMiscellaneousOfficeInsightsAdd + +This event provides insight data on the installed Office products + +This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedeviceinventorychange). + +The following fields are available: + +- **InventoryVersion** The version of the inventory binary generating the events. +- **OfficeApplication** The name of the Office application. +- **OfficeArchitecture** The bitness of the Office application. +- **OfficeVersion** The version of the Office application. +- **Valóe** No content is currently available. +- **Value** The insights collected about this entity. + + +### Microsoft.Windows.Inventory.General.InventoryMiscellaneousOfficeInsightsRemove + +Indicates that this particular data object represented by the objectInstanceId is no longer present. + +This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedeviceinventorychange). + +The following fields are available: + +- **InventoryVersion** The version of the inventory binary generating the events. + + +### Microsoft.Windows.Inventory.General.InventoryMiscellaneousOfficeInsightsStartSync + +This diagnostic event indicates that a new sync is being generated for this object type. + +This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedeviceinventorychange). + +The following fields are available: + +- **InventoryVersion** The version of the inventory binary generating the events. + + +### Microsoft.Windows.Inventory.General.InventoryMiscellaneousOfficeProductsAdd + +Describes Office Products installed. + +This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedeviceinventorychange). + +The following fields are available: + +- **InventoryVersion** The version of the inventory binary generating the events. +- **OC2rApps** A GUID the describes the Office Click-To-Run apps +- **OC2rSkus** Comma-delimited list (CSV) of Office Click-To-Run products installed on the device. For example, Office 2016 ProPlus +- **OMsiApps** Comma-delimited list (CSV) of Office MSI products installed on the device. For example, Microsoft Word +- **OProductCodes** A GUID that describes the Office MSI products + + +### Microsoft.Windows.Inventory.General.InventoryMiscellaneousOfficeProductsStartSync + +Diagnostic event to indicate a new sync is being generated for this object type. + +This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedeviceinventorychange). + +The following fields are available: + +- **InventoryVersion** The version of the inventory binary generating the events. + + +### Microsoft.Windows.Inventory.General.InventoryMiscellaneousOfficeSettingsAdd + +This event describes various Office settings + +This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedeviceinventorychange). + +The following fields are available: + +- **BrowserFlags** Browser flags for Office-related products +- **ExchangeProviderFlags** Provider policies for Office Exchange +- **InventoryVersion** The version of the inventory binary generating the events. +- **SharedComputerLicensing** Office shared computer licensing policies + + +### Microsoft.Windows.Inventory.General.InventoryMiscellaneousOfficeSettingsStartSync + +Indicates a new sync is being generated for this object type. + +This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedeviceinventorychange). + +The following fields are available: + +- **InventoryVersion** The version of the inventory binary generating the events. + + +### Microsoft.Windows.Inventory.General.InventoryMiscellaneousOfficeVBAAdd + +This event provides a summary rollup count of conditions encountered while performing a local scan of Office files, analyzing for known VBA programmability compatibility issues between legacy office version and ProPlus, and between 32 and 64-bit versions + +This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedeviceinventorychange). + +The following fields are available: + +- **Design** Count of files with design issues found. +- **Design_x64** Count of files with 64 bit design issues found. +- **DuplicateVBA** Count of files with duplicate VBA code. +- **HasVBA** Count of files with VBA code. +- **Inaccessible** Count of files that were inaccessible for scanning. +- **InventoryVersion** The version of the inventory binary generating the events. +- **Issues** Count of files with issues detected. +- **Issues_x64** Count of files with 64-bit issues detected. +- **IssuesNone** Count of files with no issues detected. +- **IssuesNone_x64** Count of files with no 64-bit issues detected. +- **Locked** Count of files that were locked, preventing scanning. +- **NoVBA** Count of files with no VBA inside. +- **Protected** Count of files that were password protected, preventing scanning. +- **RemLimited** Count of files that require limited remediation changes. +- **RemLimited_x64** Count of files that require limited remediation changes for 64-bit issues. +- **RemSignificant** Count of files that require significant remediation changes. +- **RemSignificant_x64** Count of files that require significant remediation changes for 64-bit issues. +- **Score** Overall compatibility score calculated for scanned content. +- **Score_x64** Overall 64-bit compatibility score calculated for scanned content. +- **Total** Total number of files scanned. +- **Validation** Count of files that require additional manual validation. +- **Validation_x64** Count of files that require additional manual validation for 64-bit issues. + + +### Microsoft.Windows.Inventory.General.InventoryMiscellaneousOfficeVBARemove + +Indicates that this particular data object represented by the objectInstanceId is no longer present. + +This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedeviceinventorychange). + +The following fields are available: + +- **InventoryVersion** The version of the inventory binary generating the events. + + +### Microsoft.Windows.Inventory.General.InventoryMiscellaneousOfficeVBARuleViolationsAdd + +This event provides data on Microsoft Office VBA rule violations, including a rollup count per violation type, giving an indication of remediation requirements for an organization. The event identifier is a unique GUID, associated with the validation rule + +This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedeviceinventorychange). + +The following fields are available: + +- **Count** Count of total Microsoft Office VBA rule violations +- **InventoryVersion** The version of the inventory binary generating the events. + + +### Microsoft.Windows.Inventory.General.InventoryMiscellaneousOfficeVBARuleViolationsRemove + +Indicates that this particular data object represented by the objectInstanceId is no longer present. + +This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedeviceinventorychange). + +The following fields are available: + +- **InventoryVersion** The version of the inventory binary generating the events. + + +### Microsoft.Windows.Inventory.General.InventoryMiscellaneousOfficeVBARuleViolationsStartSync + +This event indicates that a new sync is being generated for this object type. + +This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedeviceinventorychange). + +The following fields are available: + +- **InventoryVersion** The version of the inventory binary generating the events. + + +### Microsoft.Windows.Inventory.General.InventoryMiscellaneousOfficeVBAStartSync + +Diagnostic event to indicate a new sync is being generated for this object type. + +This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedeviceinventorychange). + +The following fields are available: + +- **InventoryVersion** The version of the inventory binary generating the events. + + +### Microsoft.Windows.Inventory.General.InventoryMiscellaneousUUPInfoAdd + +Provides data on Unified Update Platform (UUP) products and what version they are at. + +This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedeviceinventorychange). + +The following fields are available: + +- **Identifier** UUP identifier +- **LastActivatedVersion** Last activated version +- **PreviousVersion** Previous version +- **Source** UUP source +- **Version** UUP version + + +### Microsoft.Windows.Inventory.General.InventoryMiscellaneousUUPInfoRemove + +Indicates that this particular data object represented by the objectInstanceId is no longer present. + +This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedeviceinventorychange). + + + +### Microsoft.Windows.Inventory.General.InventoryMiscellaneousUUPInfoStartSync + +Diagnostic event to indicate a new sync is being generated for this object type. + +This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedeviceinventorychange). + + + +### Microsoft.Windows.Inventory.Indicators.Checksum + +This event summarizes the counts for the InventoryMiscellaneousUexIndicatorAdd events. + +The following fields are available: + +- **CensusId** A unique hardware identifier. +- **ChecksumDictionary** A count of each operating system indicator. +- **PCFP** Equivalent to the InventoryId field that is found in other core events. + + +### Microsoft.Windows.Inventory.Indicators.InventoryMiscellaneousUexIndicatorAdd + +These events represent the basic metadata about the OS indicators installed on the system which are used for keeping the device up to date. + +This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedeviceinventorychange). + +The following fields are available: + +- **IndicatorValue** The indicator value. +- **Value** Describes an operating system indicator that may be relevant for the device upgrade. + + +### Microsoft.Windows.Inventory.Indicators.InventoryMiscellaneousUexIndicatorRemove + +This event is a counterpart to InventoryMiscellaneousUexIndicatorAdd that indicates that the item has been removed. + +This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedeviceinventorychange). + + + +### Microsoft.Windows.Inventory.Indicators.InventoryMiscellaneousUexIndicatorStartSync + +This event indicates that a new set of InventoryMiscellaneousUexIndicatorAdd events will be sent. + +This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedeviceinventorychange). + + + +## Kernel events + +### IO + +This event indicates the number of bytes read from or read by the OS and written to or written by the OS upon system startup. + +The following fields are available: + +- **BootAttemptCount** No content is currently available. +- **BootStatusPolicy** No content is currently available. +- **BootType** No content is currently available. +- **BytesRead** The total number of bytes read from or read by the OS upon system startup. +- **BytesWritten** The total number of bytes written to or written by the OS upon system startup. +- **FirmwareResetReasonEmbeddedController** No content is currently available. +- **FirmwareResetReasonEmbeddedControllerAdditional** No content is currently available. +- **FirmwareResetReasonPch** No content is currently available. +- **FirmwareResetReasonPchAdditional** No content is currently available. +- **FirmwareResetReasonSupplied** No content is currently available. +- **LastBootSucceeded** No content is currently available. +- **LastShutdownSucceeded** No content is currently available. +- **MeasuredLaunchResume** No content is currently available. +- **MenuPolicy** No content is currently available. +- **RecoveryEnabled** No content is currently available. +- **UserInputTime** No content is currently available. + + +### Microsoft.Windows.Kernel.BootEnvironment.OsLaunch + +OS information collected during Boot, used to evaluate the success of the upgrade process. + +The following fields are available: + +- **Boo|ApplicationId** No content is currently available. +- **BootApplicataonId** No content is currently available. +- **BootApplicationId** This field tells us what the OS Loader Application Identifier is. +- **BootAttemptCount** The number of consecutive times the boot manager has attempted to boot into this operating system. +- **BootSequence** The current Boot ID, used to correlate events related to a particular boot session. +- **BootStatusPolicy** Identifies the applicable Boot Status Policy. +- **BootType** Identifies the type of boot (e.g.: "Cold", "Hiber", "Resume"). +- **EventTimestamp** Seconds elapsed since an arbitrary time point. This can be used to identify the time difference in successive boot attempts being made. +- **FirmwareResetReasonEmbeddedController** Reason for system reset provided by firmware. +- **FirmwareResetReasonEmbeddedControllerAdditional** Additional information on system reset reason provided by firmware if needed. +- **FirmwareResetReasonPch** Reason for system reset provided by firmware. +- **FirmwareResetReasonPchAdditional** Additional information on system reset reason provided by firmware if needed. +- **FirmwareResetReasonSupplied** Flag indicating that a reason for system reset was provided by firmware. +- **IO** Amount of data written to and read from the disk by the OS Loader during boot. See [IO](#io). +- **LastBootSucceeded** Flag indicating whether the last boot was successful. +- **LastShutdownSucceeded** Flag indicating whether the last shutdown was successful. +- **MaxAbove4GbFreeRange** This field describes the largest memory range available above 4Gb. +- **MaxBelow4GbFreeRange** This field describes the largest memory range available below 4Gb. +- **MeasuredLaunchPrepared** This field tells us if the OS launch was initiated using Measured/Secure Boot over DRTM (Dynamic Root of Trust for Measurement). +- **MeasuredLaunchResume** This field tells us if Dynamic Root of Trust for Measurement (DRTM) was used when resuming from hibernation. +- **MenuPolicy** Type of advanced options menu that should be shown to the user (Legacy, Standard, etc.). +- **RecoveryEnabled** Indicates whether recovery is enabled. +- **SecureLaunchPrepared** This field indicates if DRTM was prepared during boot. +- **TcbLaunch** Indicates whether the Trusted Computing Base was used during the boot flow. +- **UserInputTime** The amount of time the loader application spent waiting for user input. + + +## Miracast events + +### Microsoft.Windows.Cast.Miracast.MiracastSessionEnd + +This event sends data at the end of a Miracast session that helps determine RTSP related Miracast failures along with some statistics about the session + +The following fields are available: + +- **AudioChannelCount** The number of audio channels. +- **AudioSampleRate** The sample rate of audio in terms of samples per second. +- **AudioSubtype** The unique subtype identifier of the audio codec (encoding method) used for audio encoding. +- **AverageBitrate** The average video bitrate used during the Miracast session, in bits per second. +- **AverageDataRate** The average available bandwidth reported by the WiFi driver during the Miracast session, in bits per second. +- **AveragePacketSendTimeInMs** The average time required for the network to send a sample, in milliseconds. +- **ConnectorType** The type of connector used during the Miracast session. +- **EncodeAverageTimeMS** The average time to encode a frame of video, in milliseconds. +- **EncodeCount** The count of total frames encoded in the session. +- **EncodeMaxTimeMS** The maximum time to encode a frame, in milliseconds. +- **EncodeMinTimeMS** The minimum time to encode a frame, in milliseconds. +- **EncoderCreationTimeInMs** The time required to create the video encoder, in milliseconds. +- **ErrorSource** Identifies the component that encountered an error that caused a disconnect, if applicable. +- **FirstFrameTime** The time (tick count) when the first frame is sent. +- **FirstLatencyMode** The first latency mode. +- **FrameAverageTimeMS** Average time to process an entire frame, in milliseconds. +- **FrameCount** The total number of frames processed. +- **FrameMaxTimeMS** The maximum time required to process an entire frame, in milliseconds. +- **FrameMinTimeMS** The minimum time required to process an entire frame, in milliseconds. +- **Glitches** The number of frames that failed to be delivered on time. +- **HardwareCursorEnabled** Indicates if hardware cursor was enabled when the connection ended. +- **HDCPState** The state of HDCP (High-bandwidth Digital Content Protection) when the connection ended. +- **HighestBitrate** The highest video bitrate used during the Miracast session, in bits per second. +- **HighestDataRate** The highest available bandwidth reported by the WiFi driver, in bits per second. +- **LastLatencyMode** The last reported latency mode. +- **LogTimeReference** The reference time, in tick counts. +- **LowestBitrate** The lowest video bitrate used during the Miracast session, in bits per second. +- **LowestDataRate** The lowest video bitrate used during the Miracast session, in bits per second. +- **MediaErrorCode** The error code reported by the media session, if applicable. +- **MiracastEntry** The time (tick count) when the Miracast driver was first loaded. +- **MiracastM1** The time (tick count) when the M1 request was sent. +- **MiracastM2** The time (tick count) when the M2 request was sent. +- **MiracastM3** The time (tick count) when the M3 request was sent. +- **MiracastM4** The time (tick count) when the M4 request was sent. +- **MiracastM5** The time (tick count) when the M5 request was sent. +- **MiracastM6** The time (tick count) when the M6 request was sent. +- **MiracastM7** The time (tick count) when the M7 request was sent. +- **MiracastSessionState** The state of the Miracast session when the connection ended. +- **MiracastStreaming** The time (tick count) when the Miracast session first started processing frames. +- **ProfileCount** The count of profiles generated from the receiver M4 response. +- **ProfileCountAfterFiltering** The count of profiles after filtering based on available bandwidth and encoder capabilities. +- **RefreshRate** The refresh rate set on the remote display. +- **RotationSupported** Indicates if the Miracast receiver supports display rotation. +- **RTSPSessionId** The unique identifier of the RTSP session. This matches the RTSP session ID for the receiver for the same session. +- **SessionGuid** The unique identifier of to correlate various Miracast events from a session. +- **SinkHadEdid** Indicates if the Miracast receiver reported an EDID. +- **SupportMicrosoftColorSpaceConversion** Indicates whether the Microsoft color space conversion for extra color fidelity is supported by the receiver. +- **SupportsMicrosoftDiagnostics** Indicates whether the Miracast receiver supports the Microsoft Diagnostics Miracast extension. +- **SupportsMicrosoftFormatChange** Indicates whether the Miracast receiver supports the Microsoft Format Change Miracast extension. +- **SupportsMicrosoftLatencyManagement** Indicates whether the Miracast receiver supports the Microsoft Latency Management Miracast extension. +- **SupportsMicrosoftRTCP** Indicates whether the Miracast receiver supports the Microsoft RTCP Miracast extension. +- **SupportsMicrosoftVideoFormats** Indicates whether the Miracast receiver supports Microsoft video format for 3:2 resolution. +- **SupportsWiDi** Indicates whether Miracast receiver supports Intel WiDi extensions. +- **TeardownErrorCode** The error code reason for teardown provided by the receiver, if applicable. +- **TeardownErrorReason** The text string reason for teardown provided by the receiver, if applicable. +- **UIBCEndState** Indicates whether UIBC was enabled when the connection ended. +- **UIBCEverEnabled** Indicates whether UIBC was ever enabled. +- **UIBCStatus** The result code reported by the UIBC setup process. +- **VideoBitrate** The starting bitrate for the video encoder. +- **VideoCodecLevel** The encoding level used for encoding, specific to the video subtype. +- **VideoHeight** The height of encoded video frames. +- **VideoSubtype** The unique subtype identifier of the video codec (encoding method) used for video encoding. +- **VideoWidth** The width of encoded video frames. +- **WFD2Supported** Indicates if the Miracast receiver supports WFD2 protocol. + + +## OneDrive events + +### Microsoft.OneDrive.Sync.Setup.APIOperation + +This event includes basic data about install and uninstall OneDrive API operations. + +The following fields are available: + +- **APIName** The name of the API. +- **Duration** How long the operation took. +- **IsSuccess** Was the operation successful? +- **ResultCode** The result code. +- **ScenarioName** The name of the scenario. + + +### Microsoft.OneDrive.Sync.Setup.EndExperience + +This event includes a success or failure summary of the installation. + +The following fields are available: + +- **APIName** The name of the API. +- **HResult** HResult of the operation +- **IsSuccess** Whether the operation is successful or not +- **ScenarioName** The name of the scenario. + + +### Microsoft.OneDrive.Sync.Setup.OSUpgradeInstallationOperation + +This event is related to the OS version when the OS is upgraded with OneDrive installed. + +The following fields are available: + +- **CurrentOneDriveVersion** The current version of OneDrive. +- **CurrentOSBuildBranch** The current branch of the operating system. +- **CurrentOSBuildNumber** The current build number of the operating system. +- **CurrentOSVersion** The current version of the operating system. +- **HResult** The HResult of the operation. +- **SourceOSBuildBranch** The source branch of the operating system. +- **SourceOSBuildNumber** The source build number of the operating system. +- **SourceOSVersion** The source version of the operating system. + + +### Microsoft.OneDrive.Sync.Setup.RegisterStandaloneUpdaterAPIOperation + +This event is related to registering or unregistering the OneDrive update task. + +The following fields are available: + +- **APIName** The name of the API. +- **IsSuccess** Was the operation successful? +- **RegisterNewTaskResult** The HResult of the RegisterNewTask operation. +- **ScenarioName** The name of the scenario. +- **UnregisterOldTaskResult** The HResult of the UnregisterOldTask operation. + + +### Microsoft.OneDrive.Sync.Updater.ComponentInstallState + +This event includes basic data about the installation state of dependent OneDrive components. + +The following fields are available: + +- **ComponentName** The name of the dependent component. +- **isInstalled** Is the dependent component installed? + + +### Microsoft.OneDrive.Sync.Updater.OverlayIconStatus + +This event indicates if the OneDrive overlay icon is working correctly. 0 = healthy; 1 = can be fixed; 2 = broken + +The following fields are available: + +- **32bit** The status of the OneDrive overlay icon on a 32-bit operating system. +- **64bit** The status of the OneDrive overlay icon on a 64-bit operating system. + + +### Microsoft.OneDrive.Sync.Updater.UpdateOverallResult + +This event sends information describing the result of the update. + +The following fields are available: + +- **br** No content is currently available. +- **hr** The HResult of the operation. +- **IsLoggingE~abled** No content is currently available. +- **IsLoggingEnabled** Indicates whether logging is enabled for the updater. +- **UpdaterVersion** The version of the updater. + + +### Microsoft.OneDrive.Sync.Updater.UpdateXmlDownloadHResult + +This event determines the status when downloading the OneDrive update configuration file. + +The following fields are available: + +- **hr** The HResult of the operation. + + +### Microsoft.OneDrive.Sync.Updater.WebConnectionStatus + +This event determines the error code that was returned when verifying Internet connectivity. + +The following fields are available: + +- **winInetError** The HResult of the operation. + + +## Privacy consent logging events + +### Microsoft.Windows.Shell.PrivacyConsentLogging.PrivacyConsentCompleted + +This event is used to determine whether the user successfully completed the privacy consent experience. + +The following fields are available: + +- **presentationVersion** Which display version of the privacy consent experience the user completed +- **privacyConsentState** The current state of the privacy consent experience +- **settingsVersion** Which setting version of the privacy consent experience the user completed +- **userOobeExitReason** The exit reason of the privacy consent experience + + +### Microsoft.Windows.Shell.PrivacyConsentLogging.PrivacyConsentStatus + +Event tells us effectiveness of new privacy experience. + +The following fields are available: + +- **isAdmin** whether the person who is logging in is an admin +- **isExistingUser** whether the account existed in a downlevel OS +- **isLaunching** Whether or not the privacy consent experience will be launched +- **isSilentElevation** whether the user has most restrictive UAC controls +- **privacyConsentState** whether the user has completed privacy experience +- **userRegionCode** The current user's region setting + + +### wilActivity + +This event provides a Windows Internal Library context used for Product and Service diagnostics. + +The following fields are available: + +- **callContext** The function where the failure occurred. +- **currentContextId** The ID of the current call context where the failure occurred. +- **currentContextMessage** The message of the current call context where the failure occurred. +- **currentContextName** The name of the current call context where the failure occurred. +- **failureCount** The number of failures for this failure ID. +- **failureId** The ID of the failure that occurred. +- **failureType** The type of the failure that occurred. +- **fileName** The file name where the failure occurred. +- **function** The function where the failure occurred. +- **hresult** The HResult of the overall activity. +- **lineNumber** The line number where the failure occurred. +- **message** The message of the failure that occurred. +- **module** The module where the failure occurred. +- **originatingContextId** The ID of the originating call context that resulted in the failure. +- **originatingContextMessage** The message of the originating call context that resulted in the failure. +- **originatingContextName** The name of the originating call context that resulted in the failure. +- **threadId** The ID of the thread on which the activity is executing. + + +## Sediment events + +### Microsoft.Windows.Sediment.Info.DetailedState + +This event is sent when detailed state information is needed from an update trial run. + +The following fields are available: + +- **Data** Data relevant to the state, such as what percent of disk space the directory takes up. +- **Id** Identifies the trial being run, such as a disk related trial. +- **ReleaseVer** The version of the component. +- **State** The state of the reporting data from the trial, such as the top-level directory analysis. +- **Time** The time the event was fired. + + +### Microsoft.Windows.Sediment.Info.Error + +This event indicates an error in the updater payload. This information assists in keeping Windows up to date. + +The following fields are available: + +- **FailureType** The type of error encountered. +- **FileName** The code file in which the error occurred. +- **HResult** The failure error code. +- **LineNumber** The line number in the code file at which the error occurred. +- **ReleaseVer** The version information for the component in which the error occurred. +- **Time** The system time at which the error occurred. + + +### Microsoft.Windows.Sediment.Info.PhaseChange + +The event indicates progress made by the updater. This information assists in keeping Windows up to date. + +The following fields are available: + +- **NewPhase** The phase of progress made. +- **ReleaseVer** The version information for the component in which the change occurred. +- **Time** The system time at which the phase chance occurred. + + +## Setup events + +### SetupPlatformTel.SetupPlatformTelActivityEvent + +This event sends basic metadata about the SetupPlatform update installation process, to help keep Windows up to date. + +The following fields are available: + +- **FieldName** Retrieves the event name/data point. Examples: InstallStartTime, InstallEndtime, OverallResult etc. +- **GroupName** Retrieves the groupname the event belongs to. Example: Install Information, DU Information, Disk Space Information etc. +- **Value** Value associated with the corresponding event name. For example, time-related events will include the system time + + +### SetupPlatformTel.SetupPlatformTelActivityStarted + +This event sends basic metadata about the update installation process generated by SetupPlatform to help keep Windows up to date. + +The following fields are available: + +- **Name** The name of the dynamic update type. Example: GDR driver + + +### SetupPlatformTel.SetupPlatformTelActivityStopped + +This event sends basic metadata about the update installation process generated by SetupPlatform to help keep Windows up to date. + + + +### SetupPlatformTel.SetupPlatformTelEvent + +This service retrieves events generated by SetupPlatform, the engine that drives the various deployment scenarios. + +The following fields are available: + +- **FieldName** Retrieves the event name/data point. Examples: InstallStartTime, InstallEndtime, OverallResult etc. +- **GroupName** Retrieves the groupname the event belongs to. Example: Install Information, DU Information, Disk Space Information etc. +- **Value** Retrieves the value associated with the corresponding event name (Field Name). For example: For time related events this will include the system time. + + +## Software update events + +### SoftwareUpdateClientTelemetry.CheckForUpdates + +Scan process event on Windows Update client. See the EventScenario field for specifics (started/failed/succeeded). + +The following fields are available: + +- **ActivityMatchingId** Contains a unique ID identifying a single CheckForUpdates session from initialization to completion. +- **AllowCachedResults** Indicates if the scan allowed using cached results. +- **ApplicableUpdateInfo** Metadata for the updates which were detected as applicable +- **BiosFamily** The family of the BIOS (Basic Input Output System). +- **BiosName** The name of the device BIOS. +- **BiosReleaseDate** The release date of the device BIOS. +- **BiosSKUNumber** The sku number of the device BIOS. +- **BIOSVendor** The vendor of the BIOS. +- **BiosVersion** The version of the BIOS. +- **BranchReadinessLevel** The servicing branch configured on the device. +- **CachedEngineVersion** For self-initiated healing, the version of the SIH engine that is cached on the device. If the SIH engine does not exist, the value is null. +- **CallerApplicationName** The name provided by the caller who initiated API calls into the software distribution client. +- **CapabilityDetectoidGuid** The GUID for a hardware applicability detectoid that could not be evaluated. +- **CDNCountryCode** Two letter country abbreviation for the Content Distribution Network (CDN) location. +- **CDNId** The unique identifier of a specific device, used to identify how many devices are encountering success or a particular issue. +- **ClientVersion** The version number of the software distribution client. +- **CommonProps** A bitmask for future flags associated with the Windows Update client behavior. No data is currently reported in this field. Expected value for this field is 0. +- **Context** Gives context on where the error has occurred. Example: AutoEnable, GetSLSData, AddService, Misc, or Unknown +- **CurrentMobileOperator** The mobile operator the device is currently connected to. +- **DeferralPolicySources** Sources for any update deferral policies defined (GPO = 0x10, MDM = 0x100, Flight = 0x1000, UX = 0x10000). +- **DeferredUpdates** Update IDs which are currently being deferred until a later time +- **DeviceModel** What is the device model. +- **DriverError** The error code hit during a driver scan. This is 0 if no error was encountered. +- **DriverExclusionPolicy** Indicates if the policy for not including drivers with Windows Update is enabled. +- **DriverGxclusionPolicy** No content is currently available. +- **DriverSyncPassPerformed** Were drivers scanned this time? +- **EventInstanceID** A globally unique identifier for event instance. +- **EventScenario** Indicates the purpose of sending this event - whether because the software distribution just started checking for content, or whether it was cancelled, succeeded, or failed. +- **ExtendedMetadataCabUrl** Hostname that is used to download an update. +- **ExtendedStatusCode** Secondary error code for certain scenarios where StatusCode wasn't specific enough. +- **FailedUpdateGuids** The GUIDs for the updates that failed to be evaluated during the scan. +- **FailedUpdatesCount** The number of updates that failed to be evaluated during the scan. +- **FeatureUpdateDeferral** The deferral period configured for feature OS updates on the device (in days). +- **FeatureUpdatePause** Indicates whether feature OS updates are paused on the device. +- **FeatureUpdatePause9-8iod** No content is currently available. +- **FeatureUpdatePausePeriod** The pause duration configured for feature OS updates on the device (in days). +- **FlightBranch** The branch that a device is on if participating in flighting (pre-release builds). +- **FlightRing** The ring (speed of getting builds) that a device is on if participating in flighting (pre-release builds). +- **HomeMobileOperator** The mobile operator that the device was originally intended to work with. +- **I#Version** No content is currently available. +- **IntentPFNs** Intended application-set metadata for atomic update scenarios. +- **IPVersion** Indicates whether the download took place over IPv4 or IPv6 +- **IsWUfBDualScanEnabled** Indicates if Windows Update for Business dual scan is enabled on the device. +- **IsWUfBDualScaninabled** No content is currently available. +- **IsWUfBEnabled** Indicates if Windows Update for Business is enabled on the device. +- **IsWUfBFederatedScanDisabled** Indicates if Windows Update for Business federated scan is disabled on the device. +- **IsWUfBinabled** No content is currently available. +- **MetadataIntegrityMode** The mode of the update transport metadata integrity check. 0-Unknown, 1-Ignoe, 2-Audit, 3-Enforce +- **MSIError** The last error that was encountered during a scan for updates. +- **NetworkConnectivityDetected** Indicates the type of network connectivity that was detected. 0 - IPv4, 1 - IPv6 +- **NumberOfApplicableUpdates** The number of updates which were ultimately deemed applicable to the system after the detection process is complete +- **NumberOfApplicationsCategoryScanEval}ated** No content is currently available. +- **NumberOfApplicationsCategoryScanEvaluated** The number of categories (apps) for which an app update scan checked +- **NumberOfLoop** The number of round trips the scan required +- **NumberOfNewUpdatesFromServiceSync** The number of updates which were seen for the first time in this scan +- **NumberOfUpdatesEvaluated** The total number of updates which were evaluated as a part of the scan +- **NumFailedMetadataSignatures** The number of metadata signatures checks which failed for new metadata synced down. +- **Online** Indicates if this was an online scan. +- **PausedUpdates** A list of UpdateIds which that currently being paused. +- **PauseFeatureUpdatesEndTime** If feature OS updates are paused on the device, this is the date and time for the end of the pause time window. +- **PauseFeatureUpdatesStartTime** If feature OS updates are paused on the device, this is the date and time for the beginning of the pause time window. +- **PauseQualityUpdatesEndTime** If quality OS updates are paused on the device, this is the date and time for the end of the pause time window. +- **PauseQualityUpdatesStartTime** If quality OS updates are paused on the device, this is the date and time for the beginning of the pause time window. +- **PhonePreviewEnabled** Indicates whether a phone was getting preview build, prior to flighting (pre-release builds) being introduced. +- **ProcessName** The process name of the caller who initiated API calls, in the event where CallerApplicationName was not provided. +- **QualityUpdateDeferral** The deferral period configured for quality OS updates on the device (in days). +- **QualityUpdatePause** Indicates whether quality OS updates are paused on the device. +- **QualityUpdatePause9-8iod** No content is currently available. +- **QualityUpdatePausePeriod** The pause duration configured for quality OS updates on the device (in days). +- **RelatedCV** The previous Correlation Vector that was used before swapping with a new one +- **S}ncType** No content is currently available. +- **ScanDuratioInSeconds** No content is currently available. +- **ScanDurationInSeconds** The number of seconds a scan took +- **ScanEnqueueTime** The number of seconds it took to initialize a scan +- **ScanPrps** No content is currently available. +- **ScanProps** This is a 32-bit integer containing Boolean properties for a given Windows Update scan. The following bits are used; all remaining bits are reserved and set to zero. Bit 0 (0x1): IsInteractive - is set to 1 if the scan is requested by a user, or 0 if the scan is requested by Automatic Updates. Bit 1 (0x2): IsSeeker - is set to 1 if the Windows Update client's Seeker functionality is enabled. Seeker functionality is enabled on certain interactive scans, and results in the scans returning certain updates that are in the initial stages of release (not yet released for full adoption via Automatic Updates). +- **ServiceGuid** An ID which represents which service the software distribution client is checking for content (Windows Update, Microsoft Store, etc.). +- **ServiceUrl** The environment URL a device is configured to scan with +- **ShippingMobileOperator** The mobile operator that a device shipped on. +- **StatusCode** Indicates the result of a CheckForUpdates event (success, cancellation, failure code HResult). +- **SyncType** Describes the type of scan the event was +- **SystemBIOSMajorRelease** Major version of the BIOS. +- **SystemBIOSMinorRelease** Minor version of the BIOS. +- **TargetMetadataVersion** For self-initiated healing, this is the target version of the SIH engine to download (if needed). If not, the value is null. +- **TotalNumMetadataSignatureM** No content is currently available. +- **TotalNumMetadataSignatures** The total number of metadata signatures checks done for new metadata that was synced down. +- **WebServiceRetryMethods** Web service method requests that needed to be retried to complete operation. +- **WUDeviceID** The unique identifier of a specific device, used to identify how many devices are encountering success or a particular issue. + + +### SoftwareUpdateClientTelemetry.Commit + +This event tracks the commit process post the update installation when software update client is trying to update the device. + +The following fields are available: + +- **BiosFamily** Device family as defined in the system BIOS +- **BiosName** Name of the system BIOS +- **BiosReleaseDate** Release date of the system BIOS +- **BiosSKUNumber** Device SKU as defined in the system BIOS +- **BIOSVendor** Vendor of the system BIOS +- **BiosVersion** Version of the system BIOS +- **BundleId** Identifier associated with the specific content bundle; should not be all zeros if the bundleID was found. +- **BundleRevisionNumber** Identifies the revision number of the content bundle +- **CallerApplicationName** Name provided by the caller who initiated API calls into the software distribution client +- **ClientVersion** Version number of the software distribution client +- **DeploymentProviderMode** The mode of operation of the update deployment provider. +- **DeviceModel** Device model as defined in the system bios +- **EventInstanceID** A globally unique identifier for event instance +- **EventScenario** Indicates the purpose of the event - whether because scan started, succeded, failed, etc. +- **EventType** Possible values are "Child", "Bundle", "Relase" or "Driver". +- **FlightId** The specific id of the flight the device is getting +- **HandlerType** Indicates the kind of content (app, driver, windows patch, etc.) +- **RevisionNumber** Identifies the revision number of this specific piece of content +- **ServiceGuid** A unique identifier for the service that the software distribution client is installing content for (Windows Update, Microsoft Store, etc). +- **SystemBIOSMajorRelease** Major release version of the system bios +- **SystemBIOSMinorRelease** Minor release version of the system bios +- **UpdateId** Identifier associated with the specific piece of content +- **WUDeviceID** Unique device id controlled by the software distribution client + + +### SoftwareUpdateClientTelemetry.Download + +Download process event for target update on Windows Update client. See the EventScenario field for specifics (started/failed/succeeded). + +The following fields are available: + +- **ActiveDownloadTime** How long the download took, in seconds, excluding time where the update wasn't actively being downloaded. +- **AppXBlockHashFailures** Indicates the number of blocks that failed hash validation during download of the app payload. +- **AppXBlockHashValidationFailureCount** A count of the number of blocks that have failed validation after being downloaded. +- **AppXDownloadScope** Indicates the scope of the download for application content. +- **AppXScope** Indicates the scope of the app download. +- **aundleBy1esDownl?aded** No content is currently available. +- **B1ndleRepeatFailCount** No content is currently available. +- **BiosFamily** The family of the BIOS (Basic Input Output System). +- **BiosName** The name of the device BIOS. +- **BiosReleaseDate** The release date of the device BIOS. +- **BiosSKUNumber** The sku number of the device BIOS. +- **BIOSVendor** The vendor of the BIOS. +- **BiosVersion** The version of the BIOS. +- **BundleBytesDownloaded** Number of bytes downloaded for the specific content bundle. +- **BundleId** Identifier associated with the specific content bundle. +- **BundleRepeatFailCount** Indicates whether this particular update bundle has previously failed. +- **BundleRepeatFailFlag** Indicates whether this particular update bundle previously failed to download. +- **BundleRevisionNumber** Identifies the revision number of the content bundle. +- **BytesDownloaded** Number of bytes that were downloaded for an individual piece of content (not the entire bundle). +- **CachedEngineVersion** The version of the “Self-Initiated Healing” (SIH) engine that is cached on the device, if applicable. +- **CallerApplicationName** The name provided by the application that initiated API calls into the software distribution client. +- **Cbs5ethod** No content is currently available. +- **CbsDownloadMethod** Indicates whether the download was a full- or a partial-file download. +- **CbsMethod** The method used for downloading the update content related to the Component Based Servicing (CBS) technology. +- **CDNCountryCode** Two letter country abbreviation for the Content Distribution Network (CDN) location. +- **CDNId** ID which defines which CDN the software distribution client downloaded the content from. +- **ClientVersion** The version number of the software distribution client. +- **CommonProps** A bitmask for future flags associated with the Windows Update client behavior. +- **ConnectTime** Indicates the cumulative amount of time (in seconds) it took to establish the connection for all updates in an update bundle. +- **CurrentMobileOperator** The mobile operator the device is currently connected to. +- **DeviceModel** The model of the device. +- **DownloadPriority** Indicates whether a download happened at background, normal, or foreground priority. +- **DownloadProps** Information about the download operation properties in the form of a bitmask. +- **DownloadType** Differentiates the download type of “Self-Initiated Healing” (SIH) downloads between Metadata and Payload downloads. +- **EventInstanceID** A globally unique identifier for event instance. +- **EventScenarao** No content is currently available. +- **EventScenario** Indicates the purpose for sending this event: whether because the software distribution just started downloading content; or whether it was cancelled, succeeded, or failed. +- **EventType** Identifies the type of the event (Child, Bundle, or Driver). +- **ExtendedStatusCode** Secondary error code for certain scenarios where StatusCode wasn't specific enough. +- **FeatureUpdatePause** Indicates whether feature OS updates are paused on the device. +- **FlightBranch** The branch that a device is on if participating in flighting (pre-release builds). +- **flightBuildNumber** No content is currently available. +- **FlightBuildNumber** If this download was for a flight (pre-release build), this indicates the build number of that flight. +- **FlightId** The specific ID of the flight (pre-release build) the device is getting. +- **FlightRing** The ring (speed of getting builds) that a device is on if participating in flighting (pre-release builds). +- **HandlerType** Indicates what kind of content is being downloaded (app, driver, windows patch, etc.). +- **HardwareId** If this download was for a driver targeted to a particular device model, this ID indicates the model of the device. +- **HomeMobileOperator** The mobile operator that the device was originally intended to work with. +- **HostName** The hostname URL the content is downloading from. +- **IPVersion** Indicates whether the download took place over IPv4 or IPv6. +- **IsDependentSet** Indicates whether a driver is a part of a larger System Hardware/Firmware Update +- **IsWUfBDualScanEnabled** Indicates if Windows Update for Business dual scan is enabled on the device. +- **IsWUfBEnabled** Indicates if Windows Update for Business is enabled on the device. +- **IsWVfBDualScanEnabled** No content is currently available. +- **IsWVfBEnabled** No content is currently available. +- **NetworkCost** A flag indicating the cost of the network (congested, fixed, variable, over data limit, roaming, etc.) used for downloading the update content. +- **NetworkCostBitMask** Indicates what kind of network the device is connected to (roaming, metered, over data cap, etc.) +- **NetworkRestrictionStatus** More general version of NetworkCostBitMask, specifying whether Windows considered the current network to be "metered." +- **PackageFullName** The package name of the content. +- **PhonePreviewEnabled** Indicates whether a phone was opted-in to getting preview builds, prior to flighting (pre-release builds) being introduced. +- **PostDnldTime** Time (in seconds) taken to signal download completion after the last job completed downloading the payload. +- **ProcessName** The process name of the application that initiated API calls, in the event where CallerApplicationName was not provided. +- **QualityUpdatePause** Indicates whether quality OS updates are paused on the device. +- **Reason** A 32-bit integer representing the reason the update is blocked from being downloaded in the background. +- **RegulationReason** The reason that the update is regulated +- **RegulationReóult** No content is currently available. +- **RegulationResult** The result code (HResult) of the last attempt to contact the regulation web service for download regulation of update content. +- **RelatedCV** The Correlation Vector that was used before the most recent change to a new Correlation Vector. +- **RelqtedCV** No content is currently available. +- **RepeatFailCount** Indicates whether this specific content has previously failed. +- **RepeatFailFlag** Indicates whether this specific content previously failed to download. +- **RevisionNumber** The revision number of the specified piece of content. +- **ServiceGuid** A unique identifier for the service that the software distribution client is installing content for (Windows Update, Microsoft Store, etc). +- **Setup360Phase** Identifies the active phase of the upgrade download if the current download is for an Operating System upgrade. +- **ShippingMobileOperator** The mobile operator linked to the device when the device shipped. +- **SizeCalcTime** Time (in seconds) taken to calculate the total download size of the payload. +- **StatusCode** Indicates the result of a Download event (success, cancellation, failure code HResult). +- **SystemBIOSMajorRelease** Major version of the BIOS. +- **SystemBIOSMinorRelease** Minor version of the BIOS. +- **TargetGroupId** For drivers targeted to a specific device model, this ID indicates the distribution group of devices receiving that driver. +- **TargetingVersion** For drivers targeted to a specific device model, this is the version number of the drivers being distributed to the device. +- **TargetMetadataVersion** The version of the currently downloading (or most recently downloaded) package. +- **ThrottlingServiceHResult** Result code (success/failure) while contacting a web service to determine whether this device should download content yet. +- **TimeToEstablishConnection** Time (in milliseconds) it took to establish the connection prior to beginning downloaded. +- **TotalEx8ectedBydes** No content is currently available. +- **TotalExpectedBytes** The total size (in Bytes) expected to be downloaded. +- **UpdateId** An identifier associated with the specific piece of content. +- **UpdateID** An identifier associated with the specific piece of content. +- **UpdateImportance** Indicates whether the content was marked as Important, Recommended, or Optional. +- **UsecDO** No content is currently available. +- **UsedDO** Indicates whether the download used the Delivery Optimization (DO) service. +- **UsedSystemVolume** Indicates whether the content was downloaded to the device's main system storage drive, or an alternate storage drive. +- **WUDeviceID** The unique identifier of a specific device, used to identify how many devices are encountering success or a particular issue. +- **YsWUfBEnabled** No content is currently available. + + +### SoftwareUpdateClientTelemetry.DownloadCheckpoint + +This event provides a checkpoint between each of the Windows Update download phases for UUP content + +The following fields are available: + +- **CallerApplicationName** The name provided by the caller who initiated API calls into the software distribution client +- **ClientVersion** The version number of the software distribution client +- **EventScenario** Indicates the purpose of sending this event - whether because the software distribution just started checking for content, or whether it was cancelled, succeeded, or failed +- **EventType** Possible values are "Child", "Bundle", "Relase" or "Driver" +- **ExtendedStatusCode** Secondary error code for certain scenarios where StatusCode wasn't specific enough +- **FileId** A hash that uniquely identifies a file +- **FileName** Name of the downloaded file +- **FlightId** The unique identifier for each flight +- **RelatedCV** The previous Correlation Vector that was used before swapping with a new one +- **RevisionNumber** Unique revision number of Update +- **ServiceGuid** An ID which represents which service the software distribution client is checking for content (Windows Update, Microsoft Store, etc.) +- **StatusCode** Indicates the result of a CheckForUpdates event (success, cancellation, failure code HResult) +- **UpdateId** Unique Update ID +- **WUDeviceID** The unique identifier of a specific device, used to identify how many devices are encountering success or a particular issue + + +### SoftwareUpdateClientTelemetry.DownloadHeartbeat + +This event allows tracking of ongoing downloads and contains data to explain the current state of the download + +The following fields are available: + +- **BytesTotal** Total bytes to transfer for this content +- **BytesTransferred** Total bytes transferred for this content at the time of heartbeat +- **CallerApplicationName** Name provided by the caller who initiated API calls into the software distribution client +- **ClientVersion** The version number of the software distribution client +- **ConnectionStatus** Indicates the connectivity state of the device at the time of heartbeat +- **CurrentError** Last (transient) error encountered by the active download +- **DownloadFlags** Flags indicating if power state is ignored +- **DownloadState** Current state of the active download for this content (queued, suspended, or progressing) +- **EventType** Possible values are "Child", "Bundle", or "Driver" +- **FlightId** The unique identifier for each flight +- **IsNetworkMetered** Indicates whether Windows considered the current network to be ?metered" +- **MOAppDownloadLimit** Mobile operator cap on size of application downloads, if any +- **MOUpdateDownloadLimit** Mobile operator cap on size of operating system update downloads, if any +- **PowerState** Indicates the power state of the device at the time of heartbeart (DC, AC, Battery Saver, or Connected Standby) +- **RelatedCV** The previous correlation vector that was used by the client, before swapping with a new one +- **ResumeCount** Number of times this active download has resumed from a suspended state +- **RevisionNumber** Identifies the revision number of this specific piece of content +- **ServiceGuid** Identifier for the service to which the software distribution client is connecting (Windows Update, Microsoft Store, etc) +- **SuspendCount** Number of times this active download has entered a suspended state +- **SuspendReason** Last reason for why this active download entered a suspended state +- **UpdateId** Identifier associated with the specific piece of content +- **WUDeviceID** Unique device id controlled by the software distribution client + + +### SoftwareUpdateClientTelemetry.Install + +This event sends tracking data about the software distribution client installation of the content for that update, to help keep Windows up to date. + +The following fields are available: + +- **BiosFamily** The family of the BIOS (Basic Input Output System). +- **BiosName** The name of the device BIOS. +- **BiosReleaseDate** The release date of the device BIOS. +- **BiosSKUNumber** The sku number of the device BIOS. +- **BIOSVendor** The vendor of the BIOS. +- **BiosVersion** The version of the BIOS. +- **BundleId** Identifier associated with the specific content bundle; should not be all zeros if the bundleID was found. +- **BundleRepeatFailCount** Indicates whether this particular update bundle has previously failed. +- **BundleRepeatFailFlag** Indicates whether this particular update bundle previously failed to install. +- **BundleRevisionNumber** Identifies the revision number of the content bundle. +- **CachedEngineVersion** For self-initiated healing, the version of the SIH engine that is cached on the device. If the SIH engine does not exist, the value is null. +- **CallerApplicationName** The name provided by the caller who initiated API calls into the software distribution client. +- **ClientVersion** The version number of the software distribution client. +- **CommonProps** A bitmask for future flags associated with the Windows Update client behavior. No value is currently reported in this field. Expected value for this field is 0. +- **CSIErrorType** The stage of CBS installation where it failed. +- **CurrentMobileOperator** The mobile operator to which the device is currently connected. +- **DeploymentProviderMode** The mode of operation of the update deployment provider. +- **DeviceModel** The device model. +- **DriverPingBack** Contains information about the previous driver and system state. +- **DriverRecoveryIds** The list of identifiers that could be used for uninstalling the drivers if a recovery is required. +- **EventInstanceID** A globally unique identifier for event instance. +- **EventScenario** Indicates the purpose of sending this event - whether because the software distribution just started installing content, or whether it was cancelled, succeeded, or failed. +- **EventType** Possible values are Child, Bundle, or Driver. +- **ExtendedErrorCode** The extended error code. +- **ExtendedStatusCode** Secondary error code for certain scenarios where StatusCode is not specific enough. +- **FeatureUpdatePause** Indicates whether feature OS updates are paused on the device. +- **FlightBranch** The branch that a device is on if participating in the Windows Insider Program. +- **FlightBuildNumber** If this installation was for a Windows Insider build, this is the build number of that build. +- **FlightId** The specific ID of the Windows Insider build the device is getting. +- **FlightRing** The ring that a device is on if participating in the Windows Insider Program. +- **HandlerType** Indicates what kind of content is being installed (for example, app, driver, Windows update). +- **HardwareId** If this install was for a driver targeted to a particular device model, this ID indicates the model of the device. +- **HomeMobileOperator** The mobile operator that the device was originally intended to work with. +- **InstallProps** A bitmask for future flags associated with the install operation. No value is currently reported in this field. Expected value for this field is 0. +- **IntentPFNs** Intended application-set metadata for atomic update scenarios. +- **IsDependentSet** Indicates whether the driver is part of a larger System Hardware/Firmware update. +- **IsFinalOutcomeEvent** Indicates whether this event signals the end of the update/upgrade process. +- **IsFirmware** Indicates whether this update is a firmware update. +- **IsSuccessFailurePostReboot** Indicates whether the update succeeded and then failed after a restart. +- **IsWUfBDualScanEnabled** Indicates whether Windows Update for Business dual scan is enabled on the device. +- **IsWUfBEnabled** Indicates whether Windows Update for Business is enabled on the device. +- **MergedUpdate** Indicates whether the OS update and a BSP update merged for installation. +- **MsiAction** The stage of MSI installation where it failed. +- **MsiProductCode** The unique identifier of the MSI installer. +- **PackageFullName** The package name of the content being installed. +- **PhonePreviewEnabled** Indicates whether a phone was getting preview build, prior to flighting being introduced. +- **ProcessName** The process name of the caller who initiated API calls, in the event that CallerApplicationName was not provided. +- **QualityUpdatePause** Indicates whether quality OS updates are paused on the device. +- **RelatedCV** The previous Correlation Vector that was used before swapping with a new one +- **RepeatFailCount** Indicates whether this specific piece of content has previously failed. +- **RepeatFailFlag** Indicates whether this specific piece of content previously failed to install. +- **RevisionNumber** The revision number of this specific piece of content. +- **ServiceGuid** An ID which represents which service the software distribution client is installing content for (Windows Update, Microsoft Store, etc.). +- **Setup360Phase** If the install is for an operating system upgrade, indicates which phase of the upgrade is underway. +- **ShippingMobileOperator** The mobile operator that a device shipped on. +- **StatusCode** Indicates the result of an installation event (success, cancellation, failure code HResult). +- **SystemBIOSMajorRelease** Major version of the BIOS. +- **SystemBIOSMinorRelease** Minor version of the BIOS. +- **TargetGroupId** For drivers targeted to a specific device model, this ID indicates the distribution group of devices receiving that driver. +- **Targeti~gVersion** No content is currently available. +- **TargetingVersion** For drivers targeted to a specific device model, this is the version number of the drivers being distributed to the device. +- **TransactionCode** The ID that represents a given MSI installation. +- **UpdateId** Unique update ID. +- **UpdateID** An identifier associated with the specific piece of content. +- **UpdateImportance** Indicates whether a piece of content was marked as Important, Recommended, or Optional. +- **UsedSystemVolume** Indicates whether the content was downloaded and then installed from the device's main system storage drive, or an alternate storage drive. +- **WUDeviceID** The unique identifier of a specific device, used to identify how many devices are encountering success or a particular issue. + + +### SoftwareUpdateClientTelemetry.Revert + +Revert event for target update on Windows Update Client. See EventScenario field for specifics (for example, Started/Failed/Succeeded). + +The following fields are available: + +- **BundleId** Identifier associated with the specific content bundle. Should not be all zeros if the BundleId was found. +- **BundleRepeatFailCount** Indicates whether this particular update bundle has previously failed. +- **BundleRevisionNumber** Identifies the revision number of the content bundle. +- **CallerApplicationName** Name of application making the Windows Update request. Used to identify context of request. +- **ClientVersion** Version number of the software distribution client. +- **CommonProps** A bitmask for future flags associated with the Windows Update client behavior. There is no value being reported in this field right now. Expected value for this field is 0. +- **CSIErrorType** Stage of CBS installation that failed. +- **DriverPingBack** Contains information about the previous driver and system state. +- **DriverRecoveryIds** The list of identifiers that could be used for uninstalling the drivers if a recovery is required. +- **EventInstanceID** A globally unique identifier for event instance. +- **EventScenario** Indicates the purpose of the event (scan started, succeeded, failed, etc.). +- **EventType** Event type (Child, Bundle, Release, or Driver). +- **ExtendedStatusCode** Secondary status code for certain scenarios where StatusCode is not specific enough. +- **FeatureUpdatePause** Indicates whether feature OS updates are paused on the device. +- **FlightBuildNumber** Indicates the build number of the flight. +- **FlightId** The specific ID of the flight the device is getting. +- **HandlerType** Indicates the kind of content (app, driver, windows patch, etc.). +- **HardwareId** If this download was for a driver targeted to a particular device model, this ID indicates the model of the device. +- **IsFinalOutcomeEvent** Indicates whether this event signals the end of the update/upgrade process. +- **IsFirmware** Indicates whether an update was a firmware update. +- **IsSuccessFailurePostReboot** Indicates whether an initial success was a failure after a reboot. +- **IsWUfBDualScanEnabled** Flag indicating whether WU-for-Business dual scan is enabled on the device. +- **IsWUfBEnabled** Flag indicating whether WU-for-Business is enabled on the device. +- **MergedUpdate** Indicates whether an OS update and a BSP update were merged for install. +- **ProcessName** Process name of the caller who initiated API calls into the software distribution client. +- **QualityUpdatePause** Indicates whether quality OS updates are paused on the device. +- **RelatedCV** The previous correlation vector that was used by the client before swapping with a new one. +- **RepeatFailCount** Indicates whether this specific piece of content has previously failed. +- **RevisionNumber** Identifies the revision number of this specific piece of content. +- **ServiceGuid** A unique identifier for the service that the software distribution client is installing content for (Windows Update, Microsoft Store, etc). +- **StatusCode** Result code of the event (success, cancellation, failure code HResult). +- **TargetGroupId** For drivers targeted to a specific device model, this ID indicates the distribution group of devices receiving that driver. +- **TargetingVersion** For drivers targeted to a specific device model, this is the version number of the drivers being distributed to the device. +- **UpdateId** The identifier associated with the specific piece of content. +- **UpdateImportance** Indicates the importance of a driver, and why it received that importance level (0-Unknown, 1-Optional, 2-Important-DNF, 3-Important-Generic, 4-Important-Other, 5-Recommended). +- **UsedSystemVolume** Indicates whether the device's main system storage drive or an alternate storage drive was used. +- **WUDeviceID** Unique device ID controlled by the software distribution client. + + +### SoftwareUpdateClientTelemetry.TaskRun + +Start event for Server Initiated Healing client. See EventScenario field for specifics (for example, started/completed). + +The following fields are available: + +- **CallerApplicationName** Name of application making the Windows Update request. Used to identify context of request. +- **ClientVersion** Version number of the software distribution client. +- **CmdLineArgs** Command line arguments passed in by the caller. +- **EventInstanceID** A globally unique identifier for the event instance. +- **EventScenario** Indicates the purpose of the event (scan started, succeeded, failed, etc.). +- **ServiceGuid** Identifier for the service to which the software distribution client is connecting (Windows Update, Microsoft Store, etc.). +- **StatusCode** Result code of the event (success, cancellation, failure code HResult). +- **WUDeviceID** Unique device ID controlled by the software distribution client. + + +### SoftwareUpdateClientTelemetry.Uninstall + +Uninstall event for target update on Windows Update Client. See EventScenario field for specifics (for example, Started/Failed/Succeeded). + +The following fields are available: + +- **BundleId** The identifier associated with the specific content bundle. This should not be all zeros if the bundleID was found. +- **BundleRepeatFailCount** Indicates whether this particular update bundle previously failed. +- **BundleRevisionNumber** Identifies the revision number of the content bundle. +- **CallerApplicationName** Name of the application making the Windows Update request. Used to identify context of request. +- **ClientVersion** Version number of the software distribution client. +- **CommonProps** A bitmask for future flags associated with the Windows Update client behavior. There is no value being reported in this field right now. Expected value for this field is 0. +- **DriverPingBack** Contains information about the previous driver and system state. +- **DriverRecoveryIds** The list of identifiers that could be used for uninstalling the drivers when a recovery is required. +- **EventInstanceID** A globally unique identifier for event instance. +- **EventScenario** Indicates the purpose of the event (a scan started, succeded, failed, etc.). +- **EventType** Indicates the event type. Possible values are "Child", "Bundle", "Release" or "Driver". +- **ExtendedStatusCode** Secondary status code for certain scenarios where StatusCode is not specific enough. +- **FeatureUpdatePause** Indicates whether feature OS updates are paused on the device. +- **FlightBuildNumber** Indicates the build number of the flight. +- **FlightId** The specific ID of the flight the device is getting. +- **HandlerType** Indicates the kind of content (app, driver, windows patch, etc.). +- **HardwareId** If the download was for a driver targeted to a particular device model, this ID indicates the model of the device. +- **IsFinalOutcomeEvent** Indicates whether this event signals the end of the update/upgrade process. +- **IsFirmware** Indicates whether an update was a firmware update. +- **IsSuccessFailurePostReboot** Indicates whether an initial success was then a failure after a reboot. +- **IsWUfBDualScanEnabled** Flag indicating whether WU-for-Business dual scan is enabled on the device. +- **IsWUfBEnabled** Flag indicating whether WU-for-Business is enabled on the device. +- **MergedUpdate** Indicates whether an OS update and a BSP update were merged for install. +- **ProcessName** Process name of the caller who initiated API calls into the software distribution client. +- **QualityUpdatePause** Indicates whether quality OS updates are paused on the device. +- **RelatedCV** The previous correlation vector that was used by the client before swapping with a new one. +- **RepeatFailCount** Indicates whether this specific piece of content previously failed. +- **RevisionNumber** Identifies the revision number of this specific piece of content. +- **ServiceGuid** A unique identifier for the service that the software distribution client is installing content for (Windows Update, Microsoft Store, etc). +- **StatusCode** Result code of the event (success, cancellation, failure code HResult). +- **TargetGroupId** For drivers targeted to a specific device model, this ID indicates the distribution group of devices receiving that driver. +- **TargetingVersion** For drivers targeted to a specific device model, this is the version number of the drivers being distributed to the device. +- **UpdateId** Identifier associated with the specific piece of content. +- **UpdateImportance** Indicates the importance of a driver and why it received that importance level (0-Unknown, 1-Optional, 2-Important-DNF, 3-Important-Generic, 4-Important-Other, 5-Recommended). +- **UsedSystemVolume** Indicates whether the device’s main system storage drive or an alternate storage drive was used. +- **WUDeviceID** Unique device ID controlled by the software distribution client. + + +### SoftwareUpdateClientTelemetry.UpdateDetected + +This event sends data about an AppX app that has been updated from the Microsoft Store, including what app needs an update and what version/architecture is required, in order to understand and address problems with apps getting required updates. + +The following fields are available: + +- **ApplicableUpdateInfo** Metadata for the updates which were detected as applicable. +- **CallerApplicationName** The name provided by the caller who initiated API calls into the software distribution client. +- **IntentPFNs** Intended application-set metadata for atomic update scenarios. +- **NumberOfA0plicableUpdates** No content is currently available. +- **NumberOfApplicableUpdates** The number of updates ultimately deemed applicable to the system after the detection process is complete. +- **RelatedCV** The previous Correlation Vector that was used before swapping with a new one. +- **ServiceGuid** An ID that represents which service the software distribution client is connecting to (Windows Update, Microsoft Store, etc.). +- **WUDeviceID** The unique device ID controlled by the software distribution client. + + +### SoftwareUpdateClientTelemetry.UpdateMetadataIntegrity + +Ensures Windows Updates are secure and complete. Event helps to identify whether update content has been tampered with and protects against man-in-the-middle attack. + +The following fields are available: + +- **CallerApplicationName** Name of application making the Windows Update request. Used to identify context of request. +- **EndpointUrl** URL of the endpoint where client obtains update metadata. Used to identify test vs staging vs production environments. +- **EventScenario** Indicates the purpose of the event - whether because scan started, succeded, failed, etc. +- **ExtendedStatusCode** Secondary status code for certain scenarios where StatusCode was not specific enough. +- **LeafCertId** The integral ID from the FragmentSigning data for the certificate that failed. +- **ListOfSHA256OfIntermediateCerData** A semicolon delimited list of base64 encoding of hashes for the Base64CerData in the FragmentSigning data of an intermediate certificate. +- **MetadataIntegrityMode** Mode of update transport metadata integrity check. 0-Unknown, 1-Ignoe, 2-Audit, 3-Enforce +- **MetadataSignature** A base64-encoded string of the signature associated with the update metadata (specified by revision ID). +- **RawMode** The raw unparsed mode string from the SLS response. This field is null if not applicable. +- **RawValidityWindowInDays** The raw unparsed validity window string in days of the timestamp token. This field is null if not applicable. +- **RevisionId** The revision ID for a specific piece of content. +- **RevisionNumber** The revision number for a specific piece of content. +- **ServiceGuid** Identifies the service to which the software distribution client is connected, Example: Windows Update or Microsoft Store +- **SHA256OfLeafCerData** A base64 encoding of the hash for the Base64CerData in the FragmentSigning data of the leaf certificate. +- **SHA256OfLeafCertPublicKey** A base64 encoding of the hash of the Base64CertData in the FragmentSigning data of the leaf certificate. +- **SHA256OfTimestampToken** An encoded string of the timestamp token. +- **SignatureAlgorithm** The hash algorithm for the metadata signature. +- **SLSPrograms** A test program a machine may be opted in. Examples include "Canary" and "Insider Fast". +- **StatusCode** Result code of the event (success, cancellation, failure code HResult) +- **TimestampTokenCertThumbprint** The thumbprint of the encoded timestamp token. +- **TimestampTokenId** The time this was created. It is encoded in a timestamp blob and will be zero if the token is malformed. +- **UpdateId** The update ID for a specific piece of content. +- **ValidityWindowInDays** The validity window that's in effect when verifying the timestamp. + + +## System Resource Usage Monitor events + +### Microsoft.Windows.Srum.Sdp.CpuUsage + +This event provides information on CPU usage. + +The following fields are available: + +- **UsageMax** The maximum of hourly average CPU usage. +- **UsageMean** The mean of hourly average CPU usage. +- **UsageMedian** The median of hourly average CPU usage. +- **UsageTwoHourMaxMean** The mean of the maximum of every two hour of hourly average CPU usage. +- **UsageTwoHourMedianMean** The mean of the median of every two hour of hourly average CPU usage. + + +### Microsoft.Windows.Srum.Sdp.NetworkUsage + +This event provides information on network usage. + +The following fields are available: + +- **AdapterGuid** The unique ID of the adapter. +- **BytesTotalMax** The maximum of the hourly average bytes total. +- **BytesTotalMean** The mean of the hourly average bytes total. +- **BytesTotalMedian** The median of the hourly average bytes total. +- **BytesTotalTwoHourMaxMean** The mean of the maximum of every two hours of hourly average bytes total. +- **BytesTotalTwoHourMedianMean** The mean of the median of every two hour of hourly average bytes total. +- **LinkSpeed** The adapter link speed. + + +## Update events + +### Update360Telemetry.Revert + +This event sends data relating to the Revert phase of updating Windows. + +The following fields are available: + +- **ErrorCode** The error code returned for the Revert phase. +- **FlightId** Unique ID for the flight (test instance version). +- **ObjectId** The unique value for each Update Agent mode. +- **RebootRequired** Indicates reboot is required. +- **RelatedCV** The correlation vector value generated from the latest USO (Update Service Orchestrator) scan. +- **Result** The HResult of the event. +- **RevertResult** The result code returned for the Revert operation. +- **ScenarioId** The ID of the update scenario. +- **SessionId** The ID of the update attempt. +- **UpdateId** The ID of the update. + + +### Update360Telemetry.UpdateAgentCommit + +This event collects information regarding the commit phase of the new Unified Update Platform (UUP) update scenario, which is leveraged by both Mobile and Desktop. + +The following fields are available: + +- **ErrorCode** The error code returned for the current install phase. +- **FlightId** Unique ID for each flight. +- **ObjectId** Unique value for each Update Agent mode. +- **RelatedCV** Correlation vector value generated from the latest USO scan. +- **Result** Outcome of the install phase of the update. +- **ScenarioId** Indicates the update scenario. +- **SessionId** Unique value for each update attempt. +- **UpdateId** Unique ID for each update. + + +### Update360Telemetry.UpdateAgentDownloadRequest + +This event sends data for the download request phase of updating Windows via the new Unified Update Platform (UUP) scenario. Applicable to PC and Mobile. + +The following fields are available: + +- **DeletedCorruptFiles** Boolean indicating whether corrupt payload was deleted. +- **DownloadRequests** Number of times a download was retried. +- **ErrorCode** The error code returned for the current download request phase. +- **ExtensionName** Indicates whether the payload is related to Operating System content or a plugin. +- **FlightId** Unique ID for each flight. +- **InternalFailureResult** Indicates a non-fatal error from a plugin. +- **ObjectId** Unique value for each Update Agent mode (same concept as InstanceId for Setup360). +- **PackageCategoriesSkipped** Indicates package categories that were skipped, if applicable. +- **PackageCCoegoriesSkipped** No content is currently available. +- **PackageCountOptional** Number of optional packages requested. +- **PackageCountRequired** Number of required packages requested. +- **PackageCountTotal** Total number of packages needed. +- **PackageCountTotalCanonical** Total number of canonical packages. +- **PackageCountTotalDiff** Total number of diff packages. +- **PackageCountTotalExpress** Total number of express packages. +- **PackageCountTotalPSFX** The total number of PSFX packages. +- **PackageExpressType** Type of express package. +- **PackageSizeCanonical** Size of canonical packages in bytes. +- **PackageSizeDiff** Size of diff packages in bytes. +- **PackageSizeExpress** Size of express packages in bytes. +- **PackageSizePSFX** The size of PSFX packages, in bytes. +- **RangeRequestSsCoe** No content is currently available. +- **RangeRequestState** Indicates the range request type used. +- **RelatedCV** Correlation vector value generated from the latest USO scan. +- **Result** Outcome of the download request phase of update. +- **SandboxTaggedForReserves** The sandbox for reserves. +- **ScenarioId** Indicates the update scenario. +- **SessionId** Unique value for each attempt (same value for initialize, download, install commit phases). +- **UpdateId** Unique ID for each update. + + +### Update360Telemetry.UpdateAgentExpand + +This event collects information regarding the expansion phase of the new Unified Update Platform (UUP) update scenario, which is leveraged by both Mobile and Desktop. + +The following fields are available: + +- **ElapsedTickCount** Time taken for expand phase. +- **EndFreeSpace** Free space after expand phase. +- **EndSandboxSize** Sandbox size after expand phase. +- **ErrorCode** The error code returned for the current install phase. +- **FlightId** Unique ID for each flight. +- **ObjectId** Unique value for each Update Agent mode. +- **RelatedCV** Correlation vector value generated from the latest USO scan. +- **ScenarioId** Indicates the update scenario. +- **SessionId** Unique value for each update attempt. +- **StartFreeSpace** Free space before expand phase. +- **StartSandboxSize** Sandbox size after expand phase. +- **UpdateId** Unique ID for each update. + + +### Update360Telemetry.UpdateAgentFellBackToCanonical + +This event collects information when express could not be used and we fall back to canonical during the new Unified Update Platform (UUP) update scenario, which is leveraged by both Mobile and Desktop. + +The following fields are available: + +- **FlightId** Unique ID for each flight. +- **ObjectId** Unique value for each Update Agent mode. +- **PackageCount** Number of packages that feel back to canonical. +- **PackageList** PackageIds which fell back to canonical. +- **RelatedCV** Correlation vector value generated from the latest USO scan. +- **ScenarioId** Indicates the update scenario. +- **SessionId** Unique value for each update attempt. +- **UpdateId** Unique ID for each update. + + +### Update360Telemetry.UpdateAgentInitialize + +This event sends data for the initialize phase of updating Windows via the new Unified Update Platform (UUP) scenario, which is applicable to both PCs and Mobile. + +The following fields are available: + +- **ErrorCode** The error code returned for the current install phase. +- **FlightId** Unique ID for each flight. +- **FlightMetadata** Contains the FlightId and the build being flighted. +- **ObjectId** Unique value for each Update Agent mode. +- **RelatedCV** Correlation vector value generated from the latest USO scan. +- **Result** Outcome of the install phase of the update. +- **ScenarioId** Indicates the update scenario. +- **SessionData** String containing instructions to update agent for processing FODs and DUICs (Null for other scenarios). +- **SessionId** Unique value for each update attempt. +- **UpdateId** Unique ID for each update. + + +### Update360Telemetry.UpdateAgentInstall + +This event sends data for the install phase of updating Windows. + +The following fields are available: + +- **ErrorCode** The error code returned for the current install phase. +- **ExtensionName** Indicates whether the payload is related to Operating System content or a plugin. +- **FlightId** Unique value for each Update Agent mode (same concept as InstanceId for Setup360). +- **InternalFailureResult** Indicates a non-fatal error from a plugin. +- **ObjectId** Correlation vector value generated from the latest USO scan. +- **RelatedCV** Correlation vector value generated from the latest USO scan. +- **Result** The result for the current install phase. +- **ScenarioId** Indicates the update scenario. +- **SessionId** Unique value for each update attempt. +- **UpdateId** Unique ID for each update. + + +### Update360Telemetry.UpdateAgentMerge + +The UpdateAgentMerge event sends data on the merge phase when updating Windows. + +The following fields are available: + +- **ErrorCode** The error code returned for the current merge phase. +- **FlightId** Unique ID for each flight. +- **MergeId** The unique ID to join two update sessions being merged. +- **ObjectId** Unique value for each Update Agent mode. +- **RelatedCV** Related correlation vector value. +- **Result** Outcome of the merge phase of the update. +- **ScenarioId** Indicates the update scenario. +- **SessionId** Unique value for each attempt. +- **UpdateId** Unique ID for each update. + + +### Update360Telemetry.UpdateAgentMitigationResult + +This event sends data indicating the result of each update agent mitigation. + +The following fields are available: + +- **Applicable** Indicates whether the mitigation is applicable for the current update. +- **CommandCount** The number of command operations in the mitigation entry. +- **CustomCount** The number of custom operations in the mitigation entry. +- **FileCount** The number of file operations in the mitigation entry. +- **FlightId** Unique identifier for each flight. +- **Index** The mitigation index of this particular mitigation. +- **MitigationScenario** The update scenario in which the mitigation was executed. +- **Name** The friendly name of the mitigation. +- **ObjectId** Unique value for each Update Agent mode. +- **OperationIndex** The mitigation operation index (in the event of a failure). +- **OperationName** The friendly name of the mitigation operation (in the event of failure). +- **RegistryCount** The number of registry operations in the mitigation entry. +- **RelatedCV** The correlation vector value generated from the latest USO scan. +- **Result** The HResult of this operation. +- **ScenarioId** The update agent scenario ID. +- **SessionId** Unique value for each update attempt. +- **TimeDiff** The amount of time spent performing the mitigation (in 100-nanosecond increments). +- **UpdateId** Unique ID for each Update. + + +### Update360Telemetry.UpdateAgentMitigationSummary + +This event sends a summary of all the update agent mitigations available for an this update. + +The following fields are available: + +- **Applicable** The count of mitigations that were applicable to the system and scenario. +- **Failed** The count of mitigations that failed. +- **FlightId** Unique identifier for each flight. +- **MitigationScenario** The update scenario in which the mitigations were attempted. +- **ObjectId** The unique value for each Update Agent mode. +- **RelatedCV** The correlation vector value generated from the latest USO scan. +- **Result** The HResult of this operation. +- **ScenarioId** The update agent scenario ID. +- **SessionId** Unique value for each update attempt. +- **TimeDiff** The amount of time spent performing all mitigations (in 100-nanosecond increments). +- **Total** Total number of mitigations that were available. +- **UpdateId** Unique ID for each update. + + +### Update360Telemetry.UpdateAgentModeStart + +This event sends data for the start of each mode during the process of updating Windows via the new Unified Update Platform (UUP) scenario. Applicable to both PCs and Mobile. + +The following fields are available: + +- **FlightId** Unique ID for each flight. +- **Mode** Indicates the mode that has started. +- **ObjectId** Unique value for each Update Agent mode. +- **RelatedCV** Correlation vector value generated from the latest USO scan. +- **ScenarioId** Indicates the update scenario. +- **SessionId** Unique value for each update attempt. +- **UpdateId** Unique ID for each update. +- **Version** Version of update + + +### Update360Telemetry.UpdateAgentOneSettings + +This event collects information regarding the post reboot phase of the new UUP (Unified Update Platform) update scenario; which is leveraged by both Mobile and Desktop. + +The following fields are available: + +- **Count** The count of applicable OneSettings for the device. +- **FlightId** Unique ID for the flight (test instance version). +- **ObjectId** The unique value for each Update Agent mode. +- **Parameters** The set of name value pair parameters sent to OneSettings to determine if there are any applicable OneSettings. +- **RelatedCV** The correlation vector value generated from the latest USO (Update Service Orchestrator) scan. +- **Result** The HResult of the event. +- **ScenarioId** The ID of the update scenario. +- **SessionId** The ID of the update attempt. +- **UpdateId** The ID of the update. +- **Values** The values sent back to the device, if applicable. + + +### Update360Telemetry.UpdateAgentPostRebootResult + +This event collects information for both Mobile and Desktop regarding the post reboot phase of the new Unified Update Platform (UUP) update scenario. + +The following fields are available: + +- **ErrorCode** The error code returned for the current post reboot phase. +- **FlightId** The specific ID of the Windows Insider build the device is getting. +- **ObjectId** Unique value for each Update Agent mode. +- **PostRebootResult** Indicates the Hresult. +- **RelatedCV** Correlation vector value generated from the latest USO scan. +- **ScenarioId** The scenario ID. Example: MobileUpdate, DesktopLanguagePack, DesktopFeatureOnDemand, or DesktopDriverUpdate. +- **SessionId** Unique value for each update attempt. +- **UpdateId** Unique ID for each update. + + +### Update360Telemetry.UpdateAgentReboot + +This event sends information indicating that a request has been sent to suspend an update. + +The following fields are available: + +- **ErrorCode** The error code returned for the current reboot. +- **FlightId** Unique ID for the flight (test instance version). +- **ObjectId** The unique value for each Update Agent mode. +- **RelatedCV** The correlation vector value generated from the latest USO (Update Service Orchestrator) scan. +- **Result** The HResult of the event. +- **ScenarioId** The ID of the update scenario. +- **SessionId** The ID of the update attempt. +- **UpdateId** The ID of the update. + + +### Update360Telemetry.UpdateAgentSetupBoxLaunch + +The UpdateAgent_SetupBoxLaunch event sends data for the launching of the setup box when updating Windows via the new Unified Update Platform (UUP) scenario. This event is only applicable to PCs. + +The following fields are available: + +- **ContainsExpressPackage** Indicates whether the download package is express. +- **FlightId** Unique ID for each flight. +- **FreeSpace** Free space on OS partition. +- **InstallCount** Number of install attempts using the same sandbox. +- **ObjectId** Unique value for each Update Agent mode. +- **Quiet** Indicates whether setup is running in quiet mode. +- **RelatedCV** Correlation vector value generated from the latest USO scan. +- **SandboxSize** Size of the sandbox. +- **ScenarioId** Indicates the update scenario. +- **SessionId** Unique value for each update attempt. +- **SetupMode** Mode of setup to be launched. +- **UpdateId** Unique ID for each Update. +- **UserSession** Indicates whether install was invoked by user actions. + + +## Update notification events + +### Microsoft.Windows.UpdateNotificationPipeline.UNPCampaignManagerHeartbeat + +This event is sent at the start of the CampaignManager event and is intended to be used as a heartbeat. + +The following fields are available: + +- **CampaignConfigVersion** Configuration version for the current campaign. +- **CampaignID** Currently campaign that is running on Update Notification Pipeline (UNP). +- **ConfigCatalogVersion** Current catalog version of UNP. +- **ContentVersion** Content version for the current campaign on UNP. +- **CV** Correlation vector. +- **DetectorVersion** Most recently run detector version for the current campaign on UNP. +- **GlobalEventCounter** Client-side counter that indicates the event ordering sent by the user. +- **PackageVersion** Current UNP package version. + + +## Upgrade events + +### FacilitatorTelemetry.DCATDownload + +This event indicates whether devices received additional or critical supplemental content during an OS Upgrade, to help keep Windows up-to-date and secure. + +The following fields are available: + +- **DownloadSize** Download size of payload. +- **ElapsedTime** Time taken to download payload. +- **MediaFallbackUsed** Used to determine if we used Media CompDBs to figure out package requirements for the upgrade. +- **ResultCode** Result returned by the Facilitator DCAT call. +- **Scenario** Dynamic update scenario (Image DU, or Setup DU). +- **Type** Type of package that was downloaded. +- **UpdateId** The ID of the update that was downloaded. + + +### FacilitatorTelemetry.DUDownload + +This event returns data about the download of supplemental packages critical to upgrading a device to the next version of Windows. + +The following fields are available: + +- **DownloadRequestAttributes** The attributes sent for download. +- **PackageCategoriesFailed** Lists the categories of packages that failed to download. +- **PackageCategoriesSkipped** Lists the categories of package downloads that were skipped. +- **ResultCode** The result of the event execution. +- **Scenario** Identifies the active Download scenario. +- **Url** The URL the download request was sent to. +- **Version** Identifies the version of Facilitator used. + + +### FacilitatorTelemetry.InitializeDU + +This event determines whether devices received additional or critical supplemental content during an OS upgrade. + +The following fields are available: + +- **DCATUrl** The Delivery Catalog (DCAT) URL we send the request to. +- **DownloadRequestAttributes** The attributes we send to DCAT. +- **ResultCode** The result returned from the initiation of Facilitator with the URL/attributes. +- **Scenario** Dynamic Update scenario (Image DU, or Setup DU). +- **Url** The Delivery Catalog (DCAT) URL we send the request to. +- **Version** Version of Facilitator. + + +### Setup360Telemetry.Downlevel + +This event sends data indicating that the device has started the downlevel phase of the upgrade, to help keep Windows up-to-date and secure. + +The following fields are available: + +- **ClientId** If using Windows Update, this will be the Windows Update client ID that is passed to Setup. In Media setup, the default value is Media360, but it can be overwritten by the caller to a unique value. +- **FlightData** Unique value that identifies the flight. +- **HostOSBuildNumber** The build number of the downlevel OS. +- **HostOsSkuName** The operating system edition which is running Setup360 instance (downlevel OS). +- **InstanceId** A unique GUID that identifies each instance of setuphost.exe. +- **ReportId** In the Windows Update scenario, this is the updateID that is passed to Setup. In media setup, this is the GUID for the install.wim. +- **Setup360Extended** More detailed information about phase/action when the potential failure occurred. +- **Setup360Mode** The phase of Setup360 (for example, Predownload, Install, Finalize, Rollback). +- **Setup360Result** The result of Setup360 (HRESULT used to diagnose errors). +- **Setup360Scenario** The Setup360 flow type (for example, Boot, Media, Update, MCT). +- **SetupVersionBuildNumber** The build number of Setup360 (build number of the target OS). +- **State** Exit state of given Setup360 run. Example: succeeded, failed, blocked, cancelled. +- **TestId** An ID that uniquely identifies a group of events. +- **WuId** This is the Windows Update Client ID. In the Windows Update scenario, this is the same as the clientId. + + +### Setup360Telemetry.Finalize + +This event sends data indicating that the device has started the phase of finalizing the upgrade, to help keep Windows up-to-date and secure. + +The following fields are available: + +- **ClientId** With Windows Update, this will be the Windows Update client ID that is passed to Setup. In Media setup, default value is Media360, but can be overwritten by the caller to a unique value. +- **FlightData** Unique value that identifies the flight. +- **HostOSBuildNumber** The build number of the previous OS. +- **HostOsSkuName** The OS edition which is running Setup360 instance (previous OS). +- **InstanceId** A unique GUID that identifies each instance of setuphost.exe +- **ReportId** With Windows Update, this is the updateID that is passed to Setup. In media setup, this is the GUID for the install.wim. +- **Setup360Extended** More detailed information about the phase/action when the potential failure occurred. +- **Setup360Mode** The phase of Setup360. Example: Predownload, Install, Finalize, Rollback. +- **Setup360Result** The result of Setup360. This is an HRESULT error code that is used to diagnose errors. +- **Setup360Scenario** The Setup360 flow type. Example: Boot, Media, Update, MCT. +- **SetupVersionBuildNumber** The build number of Setup360 (build number of target OS). +- **State** The exit state of a Setup360 run. Example: succeeded, failed, blocked, cancelled. +- **TestId** ID that uniquely identifies a group of events. +- **WuId** This is the Windows Update Client ID. With Windows Update, this is the same as the clientId. + + +### Setup360Telemetry.OsUninstall + +This event sends data regarding OS updates and upgrades from Windows 7, Windows 8, and Windows 10. Specifically, it indicates the outcome of an OS uninstall. + +The following fields are available: + +- **ClientId** For Windows Update, this will be the Windows Update client ID that is passed to Setup. In Media setup, default value is Media360, but can be overwritten by the caller to a unique value. +- **FlightData** Unique value that identifies the flight. +- **HostOSBuildNumber** The build number of the previous OS. +- **HostOsSkuName** The OS edition which is running the Setup360 instance (previous OS). +- **InstanceId** A unique GUID that identifies each instance of setuphost.exe. +- **ReportId** For Windows Update, this will be the Windows Update client ID that is passed to Setup. In Media setup, this is the GUID for the install.wim. +- **Setup360Extended** Detailed information about the phase or action when the potential failure occurred. +- **Setup360Mode** The phase of Setup360. Example: Predownload, Install, Finalize, Rollback. +- **Setup360Result** The result of Setup360. This is an HRESULT error code that is used to diagnose errors. +- **Setup360Scenario** The Setup360 flow type. Example: Boot, Media, Update, MCT +- **SetupVersionBuildNumber** The build number of Setup360 (build number of target OS). +- **State** Exit state of a Setup360 run. Example: succeeded, failed, blocked, cancelled. +- **TestId** ID that uniquely identifies a group of events. +- **WuId** Windows Update client ID. + + +### Setup360Telemetry.PostRebootInstall + +This event sends data indicating that the device has invoked the post reboot install phase of the upgrade, to help keep Windows up-to-date. + +The following fields are available: + +- **ClientId** With Windows Update, this is the Windows Update client ID that is passed to Setup. In Media setup, the default value is Media360, but can be overwritten by the caller to a unique value. +- **FlightData** Unique value that identifies the flight. +- **HostOSBuildNumber** The build number of the previous OS. +- **HostOsSkuName** The OS edition which is running Setup360 instance (previous OS). +- **InstanceId** A unique GUID that identifies each instance of setuphost.exe. +- **ReportId** With Windows Update, this is the updateID that is passed to Setup. In media setup, this is the GUID for the install.wim. +- **Setup360Extended** Extension of result - more granular information about phase/action when the potential failure happened +- **Setup360Mode** The phase of Setup360. Example: Predownload, Install, Finalize, Rollback +- **Setup360Result** The result of Setup360. This is an HRESULT error code that's used to diagnose errors. +- **Setup360Scenario** The Setup360 flow type. Example: Boot, Media, Update, MCT +- **SetupVersionBuildNumber** The build number of Setup360 (build number of target OS). +- **State** The exit state of a Setup360 run. Example: succeeded, failed, blocked, cancelled +- **TestId** A string to uniquely identify a group of events. +- **WuId** This is the Windows Update Client ID. With Windows Update, this is the same as ClientId. + + +### Setup360Telemetry.PreDownloadQuiet + +This event sends data indicating that the device has invoked the predownload quiet phase of the upgrade, to help keep Windows up to date. + +The following fields are available: + +- **ClientId** Using Windows Update, this will be the Windows Update client ID that is passed to Setup. In Media setup, default value is Media360, but can be overwritten by the caller to a unique value. +- **FlightData** Unique value that identifies the flight. +- **HostOSBuildNumber** The build number of the previous OS. +- **HostOsSkuName** The OS edition which is running Setup360 instance (previous operating system). +- **InstanceId** A unique GUID that identifies each instance of setuphost.exe. +- **ReportId** Using Windows Update, this is the updateID that is passed to Setup. In media setup, this is the GUID for the install.wim. +- **Setup360Extended** Detailed information about the phase/action when the potential failure occurred. +- **Setup360Mode** The phase of Setup360. Example: Predownload, Install, Finalize, Rollback. +- **Setup360Result** The result of Setup360. This is an HRESULT error code that is used to diagnose errors. +- **Setup360Scenario** The Setup360 flow type. Example: Boot, Media, Update, MCT. +- **SetupVersionBuildNumber** The build number of Setup360 (build number of target OS). +- **State** The exit state of a Setup360 run. Example: succeeded, failed, blocked, canceled. +- **TestId** ID that uniquely identifies a group of events. +- **WuId** This is the Windows Update Client ID. Using Windows Update, this is the same as the clientId. + + +### Setup360Telemetry.PreDownloadUX + +This event sends data regarding OS Updates and Upgrades from Windows 7.X, Windows 8.X, Windows 10 and RS, to help keep Windows up-to-date and secure. Specifically, it indicates the outcome of the PredownloadUX portion of the update process. + +The following fields are available: + +- **ClientId** For Windows Update, this will be the Windows Update client ID that is passed to Setup. In Media setup, default value is Media360, but can be overwritten by the caller to a unique value. +- **FlightData** In the WU scenario, this will be the WU client ID that is passed to Setup. In Media setup, default value is Media360, but can be overwritten by the caller to a unique value. +- **HostOSBuildNumber** The build number of the previous operating system. +- **HostOsSkuName** The OS edition which is running the Setup360 instance (previous operating system). +- **InstanceId** Unique GUID that identifies each instance of setuphost.exe. +- **ReportId** For Windows Update, this will be the Windows Update client ID that is passed to Setup. In Media setup, this is the GUID for the install.wim. +- **Setup360Extended** Detailed information about the phase/action when the potential failure occurred. +- **Setup360Mode** The phase of Setup360. Example: Predownload, Install, Finalize, Rollback. +- **Setup360Result** The result of Setup360. This is an HRESULT error code that can be used to diagnose errors. +- **Setup360Scenario** The Setup360 flow type. Example: Boot, Media, Update, MCT. +- **SetupVersionBuildNumber** The build number of Setup360 (build number of the target OS). +- **State** The exit state of the Setup360 run. Example: succeeded, failed, blocked, cancelled. +- **TestId** ID that uniquely identifies a group of events. +- **WuId** Windows Update client ID. + + +### Setup360Telemetry.PreInstallQuiet + +This event sends data indicating that the device has invoked the preinstall quiet phase of the upgrade, to help keep Windows up-to-date. + +The following fields are available: + +- **ClientId** With Windows Update, this will be the Windows Update client ID that is passed to Setup. In Media setup, default value is Media360, but can be overwritten by the caller to a unique value. +- **FlightData** Unique value that identifies the flight. +- **HostOSBuildNumber** The build number of the previous OS. +- **HostOsSkuName** The OS edition which is running Setup360 instance (previous OS). +- **InstanceId** A unique GUID that identifies each instance of setuphost.exe +- **ReportId** With Windows Update, this is the updateID that is passed to Setup. In media setup, this is the GUID for the install.wim. +- **Setup360Extended** Detailed information about the phase/action when the potential failure occurred. +- **Setup360Mode** The phase of Setup360. Example: Predownload, Install, Finalize, Rollback. +- **Setup360Result** The result of Setup360. This is an HRESULT error code that can be used to diagnose errors. +- **Setup360Scenario** Setup360 flow type (Boot, Media, Update, MCT). +- **SetupVersionBuildNumber** The build number of Setup360 (build number of target OS). +- **State** The exit state of a Setup360 run. Example: succeeded, failed, blocked, cancelled. +- **TestId** A string to uniquely identify a group of events. +- **WuId** This is the Windows Update Client ID. With Windows Update, this is the same as the clientId. + + +### Setup360Telemetry.PreInstallUX + +This event sends data regarding OS updates and upgrades from Windows 7, Windows 8, and Windows 10, to help keep Windows up-to-date. Specifically, it indicates the outcome of the PreinstallUX portion of the update process. + +The following fields are available: + +- **ClientId** For Windows Update, this will be the Windows Update client ID that is passed to Setup. In Media setup, default value is Media360, but can be overwritten by the caller to a unique value. +- **FlightData** Unique value that identifies the flight. +- **HostOSBuildNumber** The build number of the previous OS. +- **HostOsSkuName** The OS edition which is running the Setup360 instance (previous OS). +- **InstanceId** A unique GUID that identifies each instance of setuphost.exe. +- **ReportId** For Windows Update, this will be the Windows Update client ID that is passed to Setup. In Media setup, this is the GUID for the install.wim. +- **Setup360Extended** Detailed information about the phase/action when the potential failure occurred. +- **Setup360Mode** The phase of Setup360. Example: Predownload, Install, Finalize, Rollback. +- **Setup360Result** The result of Setup360. This is an HRESULT error code that is used to diagnose errors. +- **Setup360Scenario** The Setup360 flow type, Example: Boot, Media, Update, MCT. +- **SetupVersionBuildNumber** The build number of Setup360 (build number of target OS). +- **State** The exit state of a Setup360 run. Example: succeeded, failed, blocked, cancelled. +- **TestId** A string to uniquely identify a group of events. +- **WuId** Windows Update client ID. + + +### Setup360Telemetry.Setup360 + +This event sends data about OS deployment scenarios, to help keep Windows up-to-date. + +The following fields are available: + +- **ClientId** Retrieves the upgrade ID. In the Windows Update scenario, this will be the Windows Update client ID. In Media setup, default value is Media360, but can be overwritten by the caller to a unique value. +- **FieldName** Retrieves the data point. +- **FlightData** Specifies a unique identifier for each group of Windows Insider builds. +- **InstanceId** Retrieves a unique identifier for each instance of a setup session. +- **ReportId** Retrieves the report ID. +- **ScenarioId** Retrieves the deployment scenario. +- **Value** Retrieves the value associated with the corresponding FieldName. + + +### Setup360Telemetry.Setup360DynamicUpdate + +This event helps determine whether the device received supplemental content during an operating system upgrade, to help keep Windows up-to-date. + +The following fields are available: + +- **FlightData** Specifies a unique identifier for each group of Windows Insider builds. +- **InstanceId** Retrieves a unique identifier for each instance of a setup session. +- **Operation** Facilitator’s last known operation (scan, download, etc.). +- **ReportId** ID for tying together events stream side. +- **ResultCode** Result returned for the entire setup operation. +- **Scenario** Dynamic Update scenario (Image DU, or Setup DU). +- **ScenarioId** Identifies the update scenario. +- **TargetBranch** Branch of the target OS. +- **TargetBuild** Build of the target OS. + + +### Setup360Telemetry.Setup360MitigationResult + +This event sends data indicating the result of each setup mitigation. + +The following fields are available: + +- **Applicable** TRUE if the mitigation is applicable for the current update. +- **ClientId** In the Windows Update scenario, this is the client ID passed to Setup. In Media setup, default value is Media360, but can be overwritten by the caller to a unique value. +- **CommandCount** The number of command operations in the mitigation entry. +- **CustomCount** The number of custom operations in the mitigation entry. +- **FileCount** The number of file operations in the mitigation entry. +- **FlightData** The unique identifier for each flight (test release). +- **Index** The mitigation index of this particular mitigation. +- **InstanceId** The GUID (Globally Unique ID) that identifies each instance of SetupHost.EXE. +- **MitigationScenario** The update scenario in which the mitigation was executed. +- **Name** The friendly (descriptive) name of the mitigation. +- **OperationIndex** The mitigation operation index (in the event of a failure). +- **OperationName** The friendly (descriptive) name of the mitigation operation (in the event of failure). +- **RegistryCount** The number of registry operations in the mitigation entry. +- **ReportId** In the Windows Update scenario, the Update ID that is passed to Setup. In media setup, this is the GUID for the INSTALL.WIM. +- **Result** HResult of this operation. +- **ScenarioId** Setup360 flow type. +- **TimeDiff** The amount of time spent performing the mitigation (in 100-nanosecond increments). + + +### Setup360Telemetry.Setup360MitigationSummary + +This event sends a summary of all the setup mitigations available for this update. + +The following fields are available: + +- **Applicable** The count of mitigations that were applicable to the system and scenario. +- **ClientId** The Windows Update client ID passed to Setup. +- **Failed** The count of mitigations that failed. +- **FlightData** The unique identifier for each flight (test release). +- **InstanceId** The GUID (Globally Unique ID) that identifies each instance of SetupHost.EXE. +- **MitigationScenario** The update scenario in which the mitigations were attempted. +- **ReportId** In the Windows Update scenario, the Update ID that is passed to Setup. In media setup, this is the GUID for the INSTALL.WIM. +- **Result** HResult of this operation. +- **ScenarioId** Setup360 flow type. +- **TimeDiff** The amount of time spent performing the mitigation (in 100-nanosecond increments). +- **Total** The total number of mitigations that were available. + + +### Setup360Telemetry.Setup360OneSettings + +This event collects information regarding the post reboot phase of the new UUP (Unified Update Platform) update scenario; which is leveraged by both Mobile and Desktop. + +The following fields are available: + +- **ClientId** The Windows Update client ID passed to Setup. +- **Count** The count of applicable OneSettings for the device. +- **FlightData** The ID for the flight (test instance version). +- **InstanceId** The GUID (Globally-Unique ID) that identifies each instance of setuphost.exe. +- **Parameters** The set of name value pair parameters sent to OneSettings to determine if there are any applicable OneSettings. +- **ReportId** The Update ID passed to Setup. +- **Result** The HResult of the event error. +- **ScenarioId** The update scenario ID. +- **Values** Values sent back to the device, if applicable. + + +### Setup360Telemetry.UnexpectedEvent + +This event sends data indicating that the device has invoked the unexpected event phase of the upgrade, to help keep Windows up to date. + +The following fields are available: + +- **ClientId** With Windows Update, this will be the Windows Update client ID that is passed to Setup. In Media setup, default value is Media360, but can be overwritten by the caller to a unique value. +- **FlightData** Unique value that identifies the flight. +- **HostOSBuildNumber** The build number of the previous OS. +- **HostOsSkuName** The OS edition which is running Setup360 instance (previous OS). +- **InstanceId** A unique GUID that identifies each instance of setuphost.exe +- **ReportId** With Windows Update, this is the updateID that is passed to Setup. In media setup, this is the GUID for the install.wim. +- **Setup360Extended** Detailed information about the phase/action when the potential failure occurred. +- **Setup360Mode** The phase of Setup360. Example: Predownload, Install, Finalize, Rollback. +- **Setup360Result** The result of Setup360. This is an HRESULT error code that can be used used to diagnose errors. +- **Setup360Scenario** The Setup360 flow type. Example: Boot, Media, Update, MCT. +- **SetupVersionBuildNumber** The build number of Setup360 (build number of target OS). +- **State** The exit state of a Setup360 run. Example: succeeded, failed, blocked, cancelled. +- **TestId** A string to uniquely identify a group of events. +- **WuId** This is the Windows Update Client ID. With Windows Update, this is the same as the clientId. + + +## Windows as a Service diagnostic events + +### Microsoft.Windows.WaaSMedic.SummaryEvent + +Result of the WaaSMedic operation. + +The following fields are available: + +- **callerApplication** The name of the calling application. +- **capsuleCount** The number of Sediment Pack capsules. +- **capsuleFailureCount** The number of capsule failures. +- **detectionSummary** Result of each applicable detection that was run. +- **featureAssessmentImpact** WaaS Assessment impact for feature updates. +- **hrEngineBlockReason** Indicates the reason for stopping WaaSMedic. +- **hrEngineResult** Error code from the engine operation. +- **hrLastSandboxError** The last error sent by the WaaSMedic sandbox. +- **initSummary** Summary data of the initialization method. +- **insufficientSessions** Device not eligible for diagnostics. +- **isInteractiveMode** The user started a run of WaaSMedic. +- **isManaged** Device is managed for updates. +- **isWUConnected** Device is connected to Windows Update. +- **noMoreActions** No more applicable diagnostics. +- **pluginFailureCount** The number of plugins that have failed. +- **pluginsCount** The number of plugins. +- **qualityAssessmentImpact** WaaS Assessment impact for quality updates. +- **remediationSummary** Result of each operation performed on a device to fix an invalid state or configuration that's preventing the device from getting updates. For example, if Windows Update service is turned off, the fix is to turn the it back on. +- **usingBackupFeatureAssessment** Relying on backup feature assessment. +- **usingBackupQualityAssessment** Relying on backup quality assessment. +- **usingCachedFeatureAssessment** WaaS Medic run did not get OS build age from the network on the previous run. +- **usingCachedQualityAssessment** WaaS Medic run did not get OS revision age from the network on the previous run. +- **versionString** Version of the WaaSMedic engine. +- **waasMedicRunMode** Indicates whether this was a background regular run of the medic or whether it was triggered by a user launching Windows Update Troubleshooter. + + +## Windows Error Reporting events + +### Microsoft.Windows.WERVertical.OSCrash + +This event sends binary data from the collected dump file wheneveer a bug check occurs, to help keep Windows up to date. The is the OneCore version of this event. + +The following fields are available: + +- **BootId** Uint32 identifying the boot number for this device. +- **BugCheckCode** Uint64 "bugcheck code" that identifies a proximate cause of the bug check. +- **BugCheckParameter1** Uint64 parameter providing additional information. +- **BugCheckParameter2** Uint64 parameter providing additional information. +- **BugCheckParameter3** Uint64 parameter providing additional information. +- **BugCheckParameter4** Uint64 parameter providing additional information. +- **DumpFileAttributes** Codes that identify the type of data contained in the dump file +- **DumpFileSize** Size of the dump file +- **IsValidDumpFile** True if the dump file is valid for the debugger, false otherwise +- **ReportId** WER Report Id associated with this bug check (used for finding the corresponding report archive in Watson). + + +## Windows Error Reporting MTT events + +### Microsoft.Windows.WER.MTT.Denominator + +This event provides a denominator to calculate MTTF (mean-time-to-failure) for crashes and other errors, to help keep Windows up to date. + +The following fields are available: + +- **DPRange** Maximum mean value range. +- **DPValue** Randomized bit value (0 or 1) that can be reconstituted over a large population to estimate the mean. +- **Value** Standard UTC emitted DP value structure See [Value](#value). + + +### Value + +This event returns data about Mean Time to Failure (MTTF) for Windows devices. It is the primary means of estimating reliability problems in Basic Diagnostic reporting with very strong privacy guarantees. Since Basic Diagnostic reporting does not include system up-time, and since that information is important to ensuring the safe and stable operation of Windows, the data provided by this event provides that data in a manner which does not threaten a user’s privacy. + +The following fields are available: + +- **Algorithm** The algorithm used to preserve privacy. +- **DPRange** The upper bound of the range being measured. +- **DPValue** The randomized response returned by the client. +- **Epsilon** The level of privacy to be applied. +- **HistType** The histogram type if the algorithm is a histogram algorithm. +- **PertProb** The probability the entry will be Perturbed if the algorithm chosen is “heavy-hitters”. + + +## Windows Store events + +### Microsoft.Windows.Store.StoreActivating + +This event sends tracking data about when the Store app activation via protocol URI is in progress, to help keep Windows up to date. + + + +### Microsoft.Windows.StoreAgent.Telemetry.AbortedInstallation + +This event is sent when an installation or update is canceled by a user or the system and is used to help keep Windows Apps up to date and secure. + +The following fields are available: + +- **AggregatedPackageFullNames** The names of all packages to be downloaded and installed. +- **AttemptNumber** Number of retry attempts before it was canceled. +- **BundleId** The Item Bundle ID. +- **CategoryId** The Item Category ID. +- **ClientAppId** The identity of the app that initiated this operation. +- **HResult** The result code of the last action performed before this operation. +- **IsBundle** Is this a bundle? +- **IsInteractive** Was this requested by a user? +- **IsMandatory** Was this a mandatory update? +- **IsRemediation** Was this a remediation install? +- **IsRestore** Is this automatically restoring a previously acquired product? +- **IsUpdate** Flag indicating if this is an update. +- **ParentBundleId** The product ID of the parent (if this product is part of a bundle). +- **PFN** The product family name of the product being installed. +- **ProductId** The identity of the package or packages being installed. +- **SystemAttemptNumber** The total number of automatic attempts at installation before it was canceled. +- **UserAttemptNumber** The total number of user attempts at installation before it was canceled. +- **WUContentId** The Windows Update content ID. + + +### Microsoft.Windows.StoreAgent.Telemetry.BeginGetInstalledContentIds + +This event is sent when an inventory of the apps installed is started to determine whether updates for those apps are available. It's used to help keep Windows up-to-date and secure. + + + +### Microsoft.Windows.StoreAgent.Telemetry.BeginUpdateMetadataPrepare + +This event is sent when the Store Agent cache is refreshed with any available package updates. It's used to help keep Windows up-to-date and secure. + + + +### Microsoft.Windows.StoreAgent.Telemetry.CancelInstallation + +This event is sent when an app update or installation is canceled while in interactive mode. This can be canceled by the user or the system. It's used to help keep Windows up-to-date and secure. + +The following fields are available: + +- **AggregatedPackageFullNames** The names of all package or packages to be downloaded and installed. +- **AttemptNumber** Total number of installation attempts. +- **BundleId** The identity of the Windows Insider build that is associated with this product. +- **CategoryId** The identity of the package or packages being installed. +- **ClientAppId** The identity of the app that initiated this operation. +- **IsBundle** Is this a bundle? +- **IsInteractive** Was this requested by a user? +- **IsMandatory** Is this a mandatory update? +- **IsRemediation** Is this repairing a previous installation? +- **IsRestore** Is this an automatic restore of a previously acquired product? +- **IsUpdate** Is this a product update? +- **ParentBundleId** The product ID of the parent (if this product is part of a bundle). +- **PFN** The name of all packages to be downloaded and installed. +- **PreviousHResult** The previous HResult code. +- **PreviousInstallState** Previous installation state before it was canceled. +- **ProductId** The name of the package or packages requested for installation. +- **RelatedCV** Correlation Vector of a previous performed action on this product. +- **SystemAttemptNumber** Total number of automatic attempts to install before it was canceled. +- **UserAttemptNumber** Total number of user attempts to install before it was canceled. +- **WUContentId** The Windows Update content ID. + + +### Microsoft.Windows.StoreAgent.Telemetry.CompleteInstallOperationRequest + +This event is sent at the end of app installations or updates to help keep Windows up-to-date and secure. + +The following fields are available: + +- **CatalogId** The Store Product ID of the app being installed. +- **HResult** HResult code of the action being performed. +- **IsBundle** Is this a bundle? +- **PackageFamilyName** The name of the package being installed. +- **ProductId** The Store Product ID of the product being installed. +- **SkuId** Specific edition of the item being installed. + + +### Microsoft.Windows.StoreAgent.Telemetry.EndAcquireLicense + +This event is sent after the license is acquired when a product is being installed. It's used to help keep Windows up-to-date and secure. + +The following fields are available: + +- **AggregatedPackageFullNames** Includes a set of package full names for each app that is part of an atomic set. +- **AttemptNumber** The total number of attempts to acquire this product. +- **CategoryId** The identity of the package or packages being installed. +- **ClientAppId** The identity of the app that initiated this operation. +- **HResult** HResult code to show the result of the operation (success/failure). +- **IsBundle** Is this a bundle? +- **IsInteractive** Did the user initiate the installation? +- **IsMandatory** Is this a mandatory update? +- **IsRemediation** Is this repairing a previous installation? +- **IsRestore** Is this happening after a device restore? +- **IsUpdate** Is this an update? +- **PFN** Product Family Name of the product being installed. +- **ProductId** The Store Product ID for the product being installed. +- **SystemAttemptNumber** The number of attempts by the system to acquire this product. +- **UserAttemptNumber** The number of attempts by the user to acquire this product +- **WUContentId** The Windows Update content ID. + + +### Microsoft.Windows.StoreAgent.Telemetry.EndDownload + +This event is sent after an app is downloaded to help keep Windows up-to-date and secure. + +The following fields are available: + +- **AggregatedPackageFullNames** The name of all packages to be downloaded and installed. +- **AttemptNumber** Number of retry attempts before it was canceled. +- **BundleId** The identity of the Windows Insider build associated with this product. +- **CategoryId** The identity of the package or packages being installed. +- **ClientAppId** The identity of the app that initiated this operation. +- **DownloadSize** The total size of the download. +- **ExtendedHResult** Any extended HResult error codes. +- **HResult** The result code of the last action performed. +- **IsBundle** Is this a bundle? +- **IsInteractive** Is this initiated by the user? +- **IsMandatory** Is this a mandatory installation? +- **IsRemediation** Is this repairing a previous installation? +- **IsRestore** Is this a restore of a previously acquired product? +- **IsUpdate** Is this an update? +- **ParentBundleId** The parent bundle ID (if it's part of a bundle). +- **PFN** The Product Family Name of the app being download. +- **ProductId** The Store Product ID for the product being installed. +- **SystemAttemptNumber** The number of attempts by the system to download. +- **UserAttemptNumber** The number of attempts by the user to download. +- **WUContentId** The Windows Update content ID. + + +### Microsoft.Windows.StoreAgent.Telemetry.EndFrameworkUpdate + +This event is sent when an app update requires an updated Framework package and the process starts to download it. It is used to help keep Windows up-to-date and secure. + +The following fields are available: + +- **HResult** The result code of the last action performed before this operation. + + +### Microsoft.Windows.StoreAgent.Telemetry.EndGetInstalledContentIds + +This event is sent after sending the inventory of the products installed to determine whether updates for those products are available. It's used to help keep Windows up-to-date and secure. + +The following fields are available: + +- **HResult** The result code of the last action performed before this operation. + + +### Microsoft.Windows.StoreAgent.Telemetry.EndInstall + +This event is sent after a product has been installed to help keep Windows up-to-date and secure. + +The following fields are available: + +- **AggregatedPackageFullNames** The names of all packages to be downloaded and installed. +- **AttemptNumber** The number of retry attempts before it was canceled. +- **BundleId** The identity of the build associated with this product. +- **CategoryId** The identity of the package or packages being installed. +- **ClientAppId** The identity of the app that initiated this operation. +- **ExtendedHResult** The extended HResult error code. +- **HResult** The result code of the last action performed. +- **IsBundle** Is this a bundle? +- **IsInteractive** Is this an interactive installation? +- **IsMandatory** Is this a mandatory installation? +- **IsRemediation** Is this repairing a previous installation? +- **IsRestore** Is this automatically restoring a previously acquired product? +- **IsUpdate** Is this an update? +- **ParentBundleId** The product ID of the parent (if this product is part of a bundle). +- **PFN** Product Family Name of the product being installed. +- **ProductId** The Store Product ID for the product being installed. +- **SystemAttemptNumber** The total number of system attempts. +- **UserAttemptNumber** The total number of user attempts. +- **WUContentId** The Windows Update content ID. + + +### Microsoft.Windows.StoreAgent.Telemetry.EndScanForUpdates + +This event is sent after a scan for product updates to determine if there are packages to install. It's used to help keep Windows up-to-date and secure. + +The following fields are available: + +- **AsOnline** No content is currently available. +- **ClientAppId** The identity of the app that initiated this operation. +- **HResult** The result code of the last action performed. +- **IsApplicability** Is this request to only check if there are any applicable packages to install? +- **IsInteractive** Is this user requested? +- **IsOnline** Is the request doing an online check? + + +### Microsoft.Windows.StoreAgent.Telemetry.EndSearchUpdatePackages + +This event is sent after searching for update packages to install. It is used to help keep Windows up-to-date and secure. + +The following fields are available: + +- **AggregatedPackageFullNames** The names of all packages to be downloaded and installed. +- **AttemptNumber** The total number of retry attempts before it was canceled. +- **BundleId** The identity of the build associated with this product. +- **CategoryId** The identity of the package or packages being installed. +- **ClientAppId** The identity of the app that initiated this operation. +- **HResult** The result code of the last action performed. +- **IsBundle** Is this a bundle? +- **IsInteractive** Is this user requested? +- **IsMandatory** Is this a mandatory update? +- **IsRemediation** Is this repairing a previous installation? +- **IsRestore** Is this restoring previously acquired content? +- **IsUpdate** Is this an update? +- **ParentBundleId** The product ID of the parent (if this product is part of a bundle). +- **PFN** The name of the package or packages requested for install. +- **ProductId** The Store Product ID for the product being installed. +- **SystemAttemptNumber** The total number of system attempts. +- **UserAttemptNumber** The total number of user attempts. +- **WUContentId** The Windows Update content ID. + + +### Microsoft.Windows.StoreAgent.Telemetry.EndStageUserData + +This event is sent after restoring user data (if any) that needs to be restored following a product install. It is used to keep Windows up-to-date and secure. + +The following fields are available: + +- **AggregatedPackageFullNames** The name of all packages to be downloaded and installed. +- **AttemptNumber** The total number of retry attempts before it was canceled. +- **BundleId** The identity of the build associated with this product. +- **CategoryId** The identity of the package or packages being installed. +- **ClientAppId** The identity of the app that initiated this operation. +- **HResult** The result code of the last action performed. +- **IsBundle** Is this a bundle? +- **IsInteractive** Is this user requested? +- **IsMandatory** Is this a mandatory update? +- **IsRemediation** Is this repairing a previous installation? +- **IsRestore** Is this restoring previously acquired content? +- **IsUpdate** Is this an update? +- **ParentBundleId** The product ID of the parent (if this product is part of a bundle). +- **PFN** The name of the package or packages requested for install. +- **ProductId** The Store Product ID for the product being installed. +- **SystemAttemptNumber** The total number of system attempts. +- **UserAttemptNumber** The total number of system attempts. +- **WUContentId** The Windows Update content ID. + + +### Microsoft.Windows.StoreAgent.Telemetry.EndUpdateMetadataPrepare + +This event is sent after a scan for available app updates to help keep Windows up-to-date and secure. + +The following fields are available: + +- **HResult** The result code of the last action performed. + + +### Microsoft.Windows.StoreAgent.Telemetry.FulfillmentComplete + +This event is sent at the end of an app install or update to help keep Windows up-to-date and secure. + +The following fields are available: + +- **CatalogId** The name of the product catalog from which this app was chosen. +- **FailedRetry** Indicates whether the installation or update retry was successful. +- **HResult** The HResult code of the operation. +- **PFN** The Package Family Name of the app that is being installed or updated. +- **ProductId** The product ID of the app that is being updated or installed. + + +### Microsoft.Windows.StoreAgent.Telemetry.FulfillmentInitiate + +This event is sent at the beginning of an app install or update to help keep Windows up-to-date and secure. + +The following fields are available: + +- **CatalogId** The name of the product catalog from which this app was chosen. +- **FulfillmentPluginId** The ID of the plugin needed to install the package type of the product. +- **PFN** The Package Family Name of the app that is being installed or updated. +- **PluginTelemetryData** Diagnostic information specific to the package-type plug-in. +- **ProductId** The product ID of the app that is being updated or installed. + + +### Microsoft.Windows.StoreAgent.Telemetry.InstallOperationRequest + +This event is sent when a product install or update is initiated, to help keep Windows up-to-date and secure. + +The following fields are available: + +- **BundleId** The identity of the build associated with this product. +- **CatalogId** If this product is from a private catalog, the Store Product ID for the product being installed. +- **ProductId** The Store Product ID for the product being installed. +- **SkuId** Specific edition ID being installed. +- **VolumePath** The disk path of the installation. + + +### Microsoft.Windows.StoreAgent.Telemetry.PauseInstallation + +This event is sent when a product install or update is paused (either by a user or the system), to help keep Windows up-to-date and secure. + +The following fields are available: + +- **AggregatedPackageFullNames** The names of all packages to be downloaded and installed. +- **AttemptNumber** The total number of retry attempts before it was canceled. +- **BundleId** The identity of the build associated with this product. +- **CategoryId** The identity of the package or packages being installed. +- **ClientAppId** The identity of the app that initiated this operation. +- **IsBundle** Is this a bundle? +- **IsInteractive** Is this user requested? +- **IsMandatory** Is this a mandatory update? +- **IsRemediation** Is this repairing a previous installation? +- **IsRestore** Is this restoring previously acquired content? +- **IsUpdate** Is this an update? +- **ParentBundleId** The product ID of the parent (if this product is part of a bundle). +- **PFN** The Product Full Name. +- **PreviousHResult** The result code of the last action performed before this operation. +- **PreviousInstallState** Previous state before the installation or update was paused. +- **ProductId** The Store Product ID for the product being installed. +- **RelatedCV** Correlation Vector of a previous performed action on this product. +- **SystemAttemptNumber** The total number of system attempts. +- **UserAttemptNumber** The total number of user attempts. +- **WUContentId** The Windows Update content ID. + + +### Microsoft.Windows.StoreAgent.Telemetry.ResumeInstallation + +This event is sent when a product install or update is resumed (either by a user or the system), to help keep Windows up-to-date and secure. + +The following fields are available: + +- **AggregatedPackageFullNames** The names of all packages to be downloaded and installed. +- **AttemptNumber** The number of retry attempts before it was canceled. +- **BundleId** The identity of the build associated with this product. +- **CategoryId** The identity of the package or packages being installed. +- **ClientAppId** The identity of the app that initiated this operation. +- **HResult** The result code of the last action performed before this operation. +- **IsBundle** Is this a bundle? +- **IsInteractive** Is this user requested? +- **IsMandatory** Is this a mandatory update? +- **IsRemediation** Is this repairing a previous installation? +- **IsRestore** Is this restoring previously acquired content? +- **IsUpdate** Is this an update? +- **IsUserRetry** Did the user initiate the retry? +- **ParentBundleId** The product ID of the parent (if this product is part of a bundle). +- **PFN** The name of the package or packages requested for install. +- **PreviousHResult** The previous HResult error code. +- **PreviousInstallState** Previous state before the installation was paused. +- **ProductId** The Store Product ID for the product being installed. +- **RelatedCV** Correlation Vector for the original install before it was resumed. +- **ResumeClientId** The ID of the app that initiated the resume operation. +- **SystemAttemptNumber** The total number of system attempts. +- **UserAttemptNumber** The total number of user attempts. +- **WUContentId** The Windows Update content ID. + + +### Microsoft.Windows.StoreAgent.Telemetry.ResumeOperationRequest + +This event is sent when a product install or update is resumed by a user or on installation retries, to help keep Windows up-to-date and secure. + +The following fields are available: + +- **ProductId** The Store Product ID for the product being installed. + + +### Microsoft.Windows.StoreAgent.Telemetry.SearchForUpdateOperationRequest + +This event is sent when searching for update packages to install, to help keep Windows up-to-date and secure. + +The following fields are available: + +- **CatalogId** The Store Catalog ID for the product being installed. +- **ProductId** The Store Product ID for the product being installed. +- **SkuId** Specfic edition of the app being updated. + + +### Microsoft.Windows.StoreAgent.Telemetry.UpdateAppOperationRequest + +This event occurs when an update is requested for an app, to help keep Windows up-to-date and secure. + +The following fields are available: + +- **PFamN** The name of the app that is requested for update. + + +## Windows System Kit events + +### Microsoft.Windows.Kits.WSK.WskImageCreate + +This event sends simple Product and Service usage data when a user is using the Windows System Kit to create new OS “images”. The data includes the version of the Windows System Kit and the state of the event and is used to help investigate “image” creation failures. + +The following fields are available: + +- **Phase** The image creation phase. Values are “Start” or “End”. +- **WskVersion** The version of the Windows System Kit being used. + + +### Microsoft.Windows.Kits.WSK.WskImageCustomization + +This event sends simple Product and Service usage data when a user is using the Windows System Kit to create/modify configuration files allowing the customization of a new OS image with Apps or Drivers. The data includes the version of the Windows System Kit, the state of the event, the customization type (drivers or apps) and the mode (new or updating) and is used to help investigate configuration file creation failures. + +The following fields are available: + +- **CustomizationMode** Indicates the mode of the customization (new or updating). +- **CustomizationType** Indicates the type of customization (drivers or apps). +- **Mode** The mode of update to image configuration files. Values are “New” or “Update”. +- **Phase** The image creation phase. Values are “Start” or “End”. +- **Type** The type of update to image configuration files. Values are “Apps” or “Drivers”. +- **WskVersion** The version of the Windows System Kit being used. + + +### Microsoft.Windows.Kits.WSK.WskWorkspaceCreate + +This event sends simple Product and Service usage data when a user is using the Windows System Kit to create new workspace for generating OS “images”. The data includes the version of the Windows System Kit and the state of the event and is used to help investigate workspace creation failures. + +The following fields are available: + +- **Architecture** The OS architecture that the workspace will target. Values are one of: “AMD64”, “ARM64”, “x86”, or “ARM”. +- **OsEdition** The Operating System Edition that the workspace will target. +- **Phase** The image creation phase. Values are “Start” or “End”. +- **WorkspaceArchitecture** The operating system architecture that the workspace will target. +- **WorkspaceOsEdition** The operating system edition that the workspace will target. +- **WskVersion** The version of the Windows System Kit being used. + + +## Windows Update Delivery Optimization events + +### Microsoft.OSG.DU.DeliveryOptClient.DownloadCanceled + +This event describes when a download was canceled with Delivery Optimization. It's used to understand and address problems regarding downloads. + +The following fields are available: + +- **background** Is the download being done in the background? +- **bytesFromCacheServer** Bytes received from a cache host. +- **bytesFromCDN** The number of bytes received from a CDN source. +- **bytesFromGroupPeers** The number of bytes received from a peer in the same group. +- **bytesFromIntPeers** The number of bytes received from peers not in the same LAN or in the same group. +- **bytesFromLinkLocalPeers** The number of bytes received from local peers. +- **bytesFromLocalCache** Bytes copied over from local (on disk) cache. +- **bytesFromPeers** The number of bytes received from a peer in the same LAN. +- **cdnErrorCodes** A list of CDN connection errors since the last FailureCDNCommunication event. +- **cdnErrorCounts** The number of times each error in cdnErrorCodes was encountered. +- **cdnIp** The IP Address of the source CDN (Content Delivery Network). +- **cdnUrl** The URL of the source CDN (Content Delivery Network). +- **dataSourcesTotal** Bytes received per source type, accumulated for the whole session. +- **errorCode** The error code that was returned. +- **experimentId** When running a test, this is used to correlate events that are part of the same test. +- **fileID** The ID of the file being downloaded. +- **gCurMemoryStreamBytes** Current usage for memory streaming. +- **gMaxMemoryStreamBytes** Maximum usage for memory streaming. +- **isVpn** Indicates whether the device is connected to a VPN (Virtual Private Network). +- **jobID** Identifier for the Windows Update job. +- **predefinedCallerName** The name of the API Caller. +- **reasonCode** Reason the action or event occurred. +- **routeToCacheServer** The cache server setting, source, and value. +- **sessionID** The ID of the file download session. +- **updateID** The ID of the update being downloaded. +- **usedMemoryStream** TRUE if the download is using memory streaming for App downloads. + + +### Microsoft.OSG.DU.DeliveryOptClient.DownloadCompleted + +This event describes when a download has completed with Delivery Optimization. It's used to understand and address problems regarding downloads. + +The following fields are available: + +- **background** Is the download a background download? +- **bytesFromCacheServer** Bytes received from a cache host. +- **bytesFromCDN** The number of bytes received from a CDN source. +- **bytesFromGroupPeers** The number of bytes received from a peer in the same domain group. +- **bytesFromIntPeers** The number of bytes received from peers not in the same LAN or in the same domain group. +- **bytesFromLinkLocalPeers** The number of bytes received from local peers. +- **bytesFromLocalCache** Bytes copied over from local (on disk) cache. +- **bytesFromPeers** The number of bytes received from a peer in the same LAN. +- **bytesRequested** The total number of bytes requested for download. +- **cacheServerBonnectionCount** No content is currently available. +- **cacheServerConnectionCount** Number of connections made to cache hosts. +- **cdnConnectionCount** The total number of connections made to the CDN. +- **cdnErrorCodes** A list of CDN connection errors since the last FailureCDNCommunication event. +- **cdnErrorCounts** The number of times each error in cdnErrorCodes was encountered. +- **cdnIp** The IP address of the source CDN. +- **cdnUrl** Url of the source Content Distribution Network (CDN). +- **dataSourcesTotal** Bytes received per source type, accumulated for the whole session. +- **dnErrorCounts** No content is currently available. +- **doErrorCode** The Delivery Optimization error code that was returned. +- **downlinkBps** The maximum measured available download bandwidth (in bytes per second). +- **downlinkUsageBps** The download speed (in bytes per second). +- **downloadMode** The download mode used for this file download session. +- **downloadModeReason** Reason for the download. +- **downloadModeSrc** Source of the DownloadMode setting (KvsProvider = 0, GeoProvider = 1, GeoVerProvider = 2, CpProvider = 3, DiscoveryProvider = 4, RegistryProvider = 5, GroupPolicyProvider = 6, MdmProvider = 7, SettingsProvider = 8, InvalidProviderType = 9). +- **experimentId** When running a test, this is used to correlate with other events that are part of the same test. +- **expiresAt** The time when the content will expire from the Delivery Optimization Cache. +- **fileID** The ID of the file being downloaded. +- **fileSize** The size of the file being downloaded. +- **gCurMemoryStreamBytes** Current usage for memory streaming. +- **gdnConnectionCount** No content is currently available. +- **gMaxMemoryStreamBytes** Maximum usage for memory streaming. +- **groupConnectionCo** No content is currently available. +- **groupConnectionCount** The total number of connections made to peers in the same group. +- **internetConnectionCount** The total number of connections made to peers not in the same LAN or the same group. +- **isEncrypted** TRUE if the file is encrypted and will be decrypted after download. +- **isVpn** Is the device connected to a Virtual Private Network? +- **jobID** Identifier for the Windows Update job. +- **lanConnectionCount** The total number of connections made to peers in the same LAN. +- **linkLocalConnectionCount** The number of connections made to peers in the same Link-local network. +- **numPeers** The total number of peers used for this download. +- **numPeersLocal** The total number of local peers used for this download. +- **predefinedCallerName** The name of the API Caller. +- **restrictedU`load** No content is currently available. +- **restrictedUpload** Is the upload restricted? +- **routeToCacheServer** The cache server setting, source, and value. +- **sessionID** The ID of the download session. +- **totalTimeMs** Duration of the download (in seconds). +- **updateID** The ID of the update being downloaded. +- **uplinkBps** The maximum measured available upload bandwidth (in bytes per second). +- **uplinkUsageBps** The upload speed (in bytes per second). +- **usedMemoryStream** TRUE if the download is using memory streaming for App downloads. + + +### Microsoft.OSG.DU.DeliveryOptClient.DownloadPaused + +This event represents a temporary suspension of a download with Delivery Optimization. It's used to understand and address problems regarding downloads. + +The following fields are available: + +- **background** Is the download a background download? +- **cdnUrl** The URL of the source CDN (Content Delivery Network). +- **errorCode** The error code that was returned. +- **experimentId** When running a test, this is used to correlate with other events that are part of the same test. +- **fileID** The ID of the file being paused. +- **isVpn** Is the device connected to a Virtual Private Network? +- **jobID** Identifier for the Windows Update job. +- **predefinedCallerName** The name of the API Caller object. +- **reasonCode** The reason for pausing the download. +- **routeToCacheServer** The cache server setting, source, and value. +- **sessionID** The ID of the download session. +- **updateID** The ID of the update being paused. + + +### Microsoft.OSG.DU.DeliveryOptClient.DownloadStarted + +This event sends data describing the start of a new download to enable Delivery Optimization. It's used to understand and address problems regarding downloads. + +The following fields are available: + +- **ActiveNetworkConnection** No content is currently available. +- **background** Indicates whether the download is happening in the background. +- **bytesRequested** Number of bytes requested for the download. +- **cdnUrl** The URL of the source Content Distribution Network (CDN). +- **costFlags** A set of flags representing network cost. +- **deviceProfile** Identifies the usage or form factor (such as Desktop, Xbox, or VM). +- **diceRoll** Random number used for determining if a client will use peering. +- **doClientVersion** The version of the Delivery Optimization client. +- **doErrorCode** The Delivery Optimization error code that was returned. +- **downloadMode** The download mode used for this file download session (CdnOnly = 0, Lan = 1, Group = 2, Internet = 3, Simple = 99, Bypass = 100). +- **downloadModeReason** Reason for the download. +- **downloadModeSrc** Source of the DownloadMode setting (KvsProvider = 0, GeoProvider = 1, GeoVerProvider = 2, CpProvider = 3, DiscoveryProvider = 4, RegistryProvider = 5, GroupPolicyProvider = 6, MdmProvider = 7, SettingsProvider = 8, InvalidProviderType = 9). +- **errorCode** The error code that was returned. +- **experimentId** ID used to correlate client/services calls that are part of the same test during A/B testing. +- **fileID** The ID of the file being downloaded. +- **filePath** The path to where the downloaded file will be written. +- **fileSize** Total file size of the file that was downloaded. +- **fileSizeCaller** Value for total file size provided by our caller. +- **groupID** ID for the group. +- **IsBootCritical** No content is currently available. +- **isEncrypted** Indicates whether the download is encrypted. +- **isVpn** Indicates whether the device is connected to a Virtual Private Network. +- **jobID** The ID of the Windows Update job. +- **peerID** The ID for this delivery optimization client. +- **predefinedCallerName** Name of the API caller. +- **routeToCacheServer** Cache server setting, source, and value. +- **SdbEntries** No content is currently available. +- **sessionID** The ID for the file download session. +- **setConfigs** A JSON representation of the configurations that have been set, and their sources. +- **updateID** The ID of the update being downloaded. +- **usedMemoryStream** Indicates whether the download used memory streaming. +- **WuDriverCoverage** No content is currently available. +- **WuDriverUpdateId** No content is currently available. +- **WuPopulatedFromId** No content is currently available. + + +### Microsoft.OSG.DU.DeliveryOptClient.FailureCdnCommunication + +This event represents a failure to download from a CDN with Delivery Optimization. It's used to understand and address problems regarding downloads. + +The following fields are available: + +- **cdnHeaders** The HTTP headers returned by the CDN. +- **cdnIp** The IP address of the CDN. +- **cdnUrl** The URL of the CDN. +- **errorCode** The error code that was returned. +- **errorCount** The total number of times this error code was seen since the last FailureCdnCommunication event was encountered. +- **experimentId** When running a test, this is used to correlate with other events that are part of the same test. +- **fileID** The ID of the file being downloaded. +- **httpStatusCode** The HTTP status code returned by the CDN. +- **isHeadRequest** The type of HTTP request that was sent to the CDN. Example: HEAD or GET +- **peerType** The type of peer (LAN, Group, Internet, CDN, Cache Host, etc.). +- **requestOffset** The byte offset within the file in the sent request. +- **requestSize** The size of the range requested from the CDN. +- **responseSize** The size of the range response received from the CDN. +- **sessionID** The ID of the download session. + + +### Microsoft.OSG.DU.DeliveryOptClient.JobError + +This event represents a Windows Update job error. It allows for investigation of top errors. + +The following fields are available: + +- **cdnIp** The IP Address of the source CDN (Content Delivery Network). +- **doErrorCode** Error code returned for delivery optimization. +- **errorCode** The error code returned. +- **experimentId** When running a test, this is used to correlate with other events that are part of the same test. +- **fileID** The ID of the file being downloaded. +- **jobID** The Windows Update job ID. + + +## Windows Update events + +### Microsoft.Windows.Update.DeviceUpdateAgent.UpdateAgentAnalysisSummary + +This event collects information regarding the state of devices and drivers on the system following a reboot after the install phase of the new device manifest UUP (Unified Update Platform) update scenario which is used to install a device manifest describing a set of driver packages. + +The following fields are available: + +- **activated** Whether the entire device manifest update is considered activated and in use. +- **analysisErrorCount** The number of driver packages that could not be analyzed because errors occurred during analysis. +- **flightId** Unique ID for each flight. +- **missingDriverCount** The number of driver packages delivered by the device manifest that are missing from the system. +- **missingUpdateCount** The number of updates in the device manifest that are missing from the system. +- **objectId** Unique value for each diagnostics session. +- **publishedCount** The number of drivers packages delivered by the device manifest that are published and available to be used on devices. +- **relatedCV** Correlation vector value generated from the latest USO scan. +- **scenarioId** Indicates the update scenario. +- **sessionId** Unique value for each update session. +- **summary** A summary string that contains basic information about driver packages that are part of the device manifest and any devices on the system that those driver packages match. +- **summaryAppendError** A Boolean indicating if there was an error appending more information to the summary string. +- **truncatedDeviceCount** The number of devices missing from the summary string because there is not enough room in the string. +- **truncatedDriverCount** The number of driver packages missing from the summary string because there is not enough room in the string. +- **unpublishedCount** How many drivers packages that were delivered by the device manifest that are still unpublished and unavailable to be used on devices. +- **updateId** The unique ID for each update. + + +### Microsoft.Windows.Update.DeviceUpdateAgent.UpdateAgentCommit + +This event collects information regarding the final commit phase of the new device manifest UUP (Unified Update Platform) update scenario, which is used to install a device manifest describing a set of driver packages. + +The following fields are available: + +- **errorCode** The error code returned for the current session initialization. +- **flightId** The unique identifier for each flight. +- **objectId** The unique GUID for each diagnostics session. +- **relatedCV** A correlation vector value generated from the latest USO scan. +- **result** Outcome of the initialization of the session. +- **scenarioId** Identifies the Update scenario. +- **sessionId** The unique value for each update session. +- **updateId** The unique identifier for each Update. + + +### Microsoft.Windows.Update.DeviceUpdateAgent.UpdateAgentDownloadRequest + +This event collects information regarding the download request phase of the new device manifest UUP (Unified Update Platform) update scenario, which is used to install a device manifest describing a set of driver packages. + +The following fields are available: + +- **deletedCorruptFiles** Indicates if UpdateAgent found any corrupt payload files and whether the payload was deleted. +- **errorCode** The error code returned for the current session initialization. +- **flightId** The unique identifier for each flight. +- **objectId** Unique value for each Update Agent mode. +- **packageCountOptional** Number of optional packages requested. +- **packageCountRequired** Number of required packages requested. +- **packageCountTotal** Total number of packages needed. +- **packageCountTotalCanonical** Total number of canonical packages. +- **packageCountTotalDiff** Total number of diff packages. +- **packageCountTotalExpress** Total number of express packages. +- **packageSizeCanonical** Size of canonical packages in bytes. +- **packageSizeDiff** Size of diff packages in bytes. +- **packageSizeExpress** Size of express packages in bytes. +- **rangeRequestState** Represents the state of the download range request. +- **relatedCV** Correlation vector value generated from the latest USO scan. +- **result** Result of the download request phase of update. +- **scenarioId** The scenario ID. Example: MobileUpdate, DesktopLanguagePack, DesktopFeatureOnDemand, or DesktopDriverUpdate. +- **sessionId** Unique value for each Update Agent mode attempt. +- **updateId** Unique ID for each update. + + +### Microsoft.Windows.Update.DeviceUpdateAgent.UpdateAgentInitialize + +This event sends data for initializing a new update session for the new device manifest UUP (Unified Update Platform) update scenario, which is used to install a device manifest describing a set of driver packages. + +The following fields are available: + +- **errorCode** The error code returned for the current session initialization. +- **flightId** The unique identifier for each flight. +- **flightMetadata** Contains the FlightId and the build being flighted. +- **objectId** Unique value for each Update Agent mode. +- **relatedCV** Correlation vector value generated from the latest USO scan. +- **result** Result of the initialize phase of the update. 0 = Succeeded, 1 = Failed, 2 = Cancelled, 3 = Blocked, 4 = BlockCancelled. +- **scenarioId** The scenario ID. Example: MobileUpdate, DesktopLanguagePack, DesktopFeatureOnDemand, or DesktopDriverUpdate. +- **sessionData** Contains instructions to update agent for processing FODs and DUICs (Null for other scenarios). +- **sessionId** Unique value for each Update Agent mode attempt. +- **updateId** Unique ID for each update. + + +### Microsoft.Windows.Update.DeviceUpdateAgent.UpdateAgentInstall + +This event collects information regarding the install phase of the new device manifest UUP (Unified Update Platform) update scenario, which is used to install a device manifest describing a set of driver packages. + +The following fields are available: + +- **errorCode** The error code returned for the current install phase. +- **flightId** The unique identifier for each flight (pre-release builds). +- **objectId** The unique identifier for each diagnostics session. +- **relatedCV** Correlation vector value generated from the latest scan. +- **result** Outcome of the install phase of the update. +- **scenarioId** The scenario ID. Example: MobileUpdate, DesktopLanguagePack, DesktopFeatureOnDemand, or DesktopDriverUpdate +- **sessionId** The unique identifier for each update session. +- **updateId** The unique identifier for each Update. + + +### Microsoft.Windows.Update.DeviceUpdateAgent.UpdateAgentModeStart + +This event sends data for the start of each mode during the process of updating device manifest assets via the UUP (Unified Update Platform) update scenario, which is used to install a device manifest describing a set of driver packages. + +The following fields are available: + +- **flightId** The unique identifier for each flight (pre-release builds). +- **mode** Indicates the active Update Agent mode. +- **objectId** Unique value for each diagnostics session. +- **relatedCV** Correlation vector value generated from the latest scan. +- **scenarioId** The scenario ID. Example: MobileUpdate, DesktopLanguagePack, DesktopFeatureOnDemand, or DesktopDriverUpdate. +- **sessionId** The unique identifier for each update session. +- **updateId** The unique identifier for each Update. + + +### Microsoft.Windows.Update.NotificationUx.DialogNotificationToBeDisplayed + +This event indicates that a notification dialog box is about to be displayed to user. + +The following fields are available: + +- **AcceptAutoModeLimit** The maximum number of days for a device to automatically enter Auto Reboot mode. +- **AutoToAutoFailedLimit** The maximum number of days for Auto Reboot mode to fail before the RebootFailed dialog box is shown. +- **DaysSinceRebootRequired** Number of days since restart was required. +- **DeviceLocalTime** The local time on the device sending the event. +- **EngagedModeLimit** The number of days to switch between DTE dialog boxes. +- **EnterAutoModeLimit** The maximum number of days for a device to enter Auto Reboot mode. +- **ETag** OneSettings versioning value. +- **IsForcedEnabled** Indicates whether Forced Reboot mode is enabled for this device. +- **IsUltimateForcedEnabled** Indicates whether Ultimate Forced Reboot mode is enabled for this device. +- **NotificationUxState** Indicates which dialog box is shown. +- **NotificationUxStateString** Indicates which dialog box is shown. +- **RebootUxState** Indicates the state of the restart (Engaged, Auto, Forced, or UltimateForced). +- **RebootUxStateString** Indicates the state of the restart (Engaged, Auto, Forced, or UltimateForced). +- **RebootVersion** Version of DTE. +- **SkipToAutoModeLimit** The minimum length of time to pass in restart pending before a device can be put into auto mode. +- **UpdateId** The ID of the update that is pending restart to finish installation. +- **UpdateRevision** The revision of the update that is pending restart to finish installation. +- **UtcTime** The time the dialog box notification will be displayed, in Coordinated Universal Time. + + +### Microsoft.Windows.Update.NotificationUx.EnhancedEngagedRebootAcceptAutoDialog + +This event indicates that the Enhanced Engaged restart "accept automatically" dialog box was displayed. + +The following fields are available: + +- **DeviceLocalTime** The local time on the device sending the event. +- **ETag** OneSettings versioning value. +- **ExitCode** Indicates how users exited the dialog box. +- **RebootVersion** Version of DTE. +- **UpdateId** The ID of the update that is pending restart to finish installation. +- **UpdateRevision** The revision of the update that is pending restart to finish installation. +- **UserResponseString** The option that user chose on this dialog box. +- **UtcTime** The time that the dialog box was displayed, in Coordinated Universal Time. + + +### Microsoft.Windows.Update.NotificationUx.EnhancedEngagedRebootFirstReminderDialog + +This event indicates that the Enhanced Engaged restart "first reminder" dialog box was displayed.. + +The following fields are available: + +- **DeviceLocalTime** The local time on the device sending the event. +- **ETag** OneSettings versioning value. +- **ExitCode** Indicates how users exited the dialog box. +- **RebootVersion** Version of DTE. +- **UpdateId** The ID of the update that is pending restart to finish installation. +- **UpdateRevision** The revision of the update that is pending restart to finish installation. +- **UserResponseString** The option that user chose in this dialog box. +- **UtcTime** The time that the dialog box was displayed, in Coordinated Universal Time. + + +### Microsoft.Windows.Update.NotificationUx.EnhancedEngagedRebootRebootFailedDialog + +This event indicates that the Enhanced Engaged restart "restart failed" dialog box was displayed. + +The following fields are available: + +- **DeviceLocalTime** The local time of the device sending the event. +- **ETag** OneSettings versioning value. +- **ExitCode** Indicates how users exited the dialog box. +- **RebootVersion** Version of DTE. +- **UpdateId** The ID of the update that is pending restart to finish installation. +- **UpdateRevision** The revision of the update that is pending restart to finish installation. +- **UserResponseString** The option that the user chose in this dialog box. +- **UtcTime** The time that the dialog box was displayed, in Coordinated Universal Time. + + +### Microsoft.Windows.Update.NotificationUx.EnhancedEngagedRebootRebootImminentDialog + +This event indicates that the Enhanced Engaged restart "restart imminent" dialog box was displayed. + +The following fields are available: + +- **DeviceLocalTime** Time the dialog box was shown on the local device. +- **ETag** OneSettings versioning value. +- **ExitCode** Indicates how users exited the dialog box. +- **RebootVersion** Version of DTE. +- **UpdateId** The ID of the update that is pending restart to finish installation. +- **UpdateRevision** The revision of the update that is pending restart to finish installation. +- **UserResponseString** The option that user chose in this dialog box. +- **UtcTime** The time that dialog box was displayed, in Coordinated Universal Time. + + +### Microsoft.Windows.Update.NotificationUx.EnhancedEngagedRebootReminderDialog + +This event returns information relating to the Enhanced Engaged reboot reminder dialog that was displayed. + +The following fields are available: + +- **DeviceLocalTime** The time at which the reboot reminder dialog was shown (based on the local device time settings). +- **ETag** The OneSettings versioning value. +- **ExitCode** Indicates how users exited the reboot reminder dialog box. +- **RebootVersion** The version of the DTE (Direct-to-Engaged). +- **UpdateId** The ID of the update that is waiting for reboot to finish installation. +- **UpdateRevision** The revision of the update that is waiting for reboot to finish installation. +- **UserResponseString** The option chosen by the user on the reboot dialog box. +- **UtcTime** The time at which the reboot reminder dialog was shown (in UTC). + + +### Microsoft.Windows.Update.NotificationUx.EnhancedEngagedRebootReminderToast + +This event indicates that the Enhanced Engaged restart reminder pop-up banner was displayed. + +The following fields are available: + +- **DeviceLocalTime** The local time on the device sending the event. +- **ETag** OneSettings versioning value. +- **ExitCode** Indicates how users exited the pop-up banner. +- **RebootVersion** The version of the reboot logic. +- **UpdateId** The ID of the update that is pending restart to finish installation. +- **UpdateRevision** The revision of the update that is pending restart to finish installation. +- **UserResponseString** The option that the user chose in the pop-up banner. +- **UtcTime** The time that the pop-up banner was displayed, in Coordinated Universal Time. + + +### Microsoft.Windows.Update.NotificationUx.RebootScheduled + +Indicates when a reboot is scheduled by the system or a user for a security, quality, or feature update. + +The following fields are available: + +- **activeHoursApplicable** Indicates whether an Active Hours policy is present on the device. +- **IsEnhancedEngagedReboot** Indicates whether this is an Enhanced Engaged reboot. +- **rebootArgument** Argument for the reboot task. It also represents specific reboot related action. +- **rebootOutsideOfActiveHours** Indicates whether a restart is scheduled outside of active hours. +- **rebootScheduledByUser** Indicates whether the restart was scheduled by user (if not, it was scheduled automatically). +- **rebootState** The current state of the restart. +- **rebootUsingSmartScheduler** Indicates whether the reboot is scheduled by smart scheduler. +- **revisionNumber** Revision number of the update that is getting installed with this restart. +- **scheduledRebootTime** Time of the scheduled restart. +- **scheduledRebootTimeInUTC** Time of the scheduled restart in Coordinated Universal Time. +- **updateId** ID of the update that is getting installed with this restart. +- **wuDeviceid** Unique device ID used by Windows Update. + + +### Microsoft.Windows.Update.Orchestrator.ActivityRestrictedByActiveHoursPolicy + +This event indicates a policy is present that may restrict update activity to outside of active hours. + +The following fields are available: + +- **activeHoursEnd** The end of the active hours window. +- **activeHoursStart** The start of the active hours window. +- **wuDeviceid** Unique device ID used by Windows Update. + + +### Microsoft.Windows.Update.Orchestrator.BlockedByActiveHours + +This event indicates that update activity was blocked because it is within the active hours window. + +The following fields are available: + +- **activeHoursEnd** The end of the active hours window. +- **activeHoursStart** The start of the active hours window. +- **updatePhase** The current state of the update process. +- **wuDeviceid** Unique device ID used by Windows Update. + + +### Microsoft.Windows.Update.Orchestrator.BlockedByBatteryLevel + +This event indicates that Windows Update activity was blocked due to low battery level. + +The following fields are available: + +- **batteryLevel** The current battery charge capacity. +- **batteryLevelThreshold** The battery capacity threshold to stop update activity. +- **updatePhase** The current state of the update process. +- **wuDeviceid** Device ID. + + +### Microsoft.Windows.Update.Orchestrator.DeferRestart + +This event indicates that a restart required for installing updates was postponed. + +The following fields are available: + +- **displayNeededReason** List of reasons for needing display. +- **eventScenario** Indicates the purpose of the event (scan started, succeeded, failed, etc.). +- **filteredDeferReason** Applicable filtered reasons why reboot was postponed (such as user active, or low battery). +- **gameModeReason** Name of the executable that caused the game mode state check to start. +- **ignoredReason** List of reasons that were intentionally ignored. +- **IgnoreReasonsForRestart** List of reasons why restart was deferred. +- **revisionNumber** Update ID revision number. +- **systemNeededReason** List of reasons why system is needed. +- **updateId** Update ID. +- **updateScenarioType** Update session type. +- **wuDeviceid** Unique device ID used by Windows Update. + + +### Microsoft.Windows.Update.Orchestrator.Detection + +This event indicates that a scan for a Windows Update occurred. + +The following fields are available: + +- **deferReason** The reason why the device could not check for updates. +- **detectionBlockingPolicy** The Policy that blocked detection. +- **detectionBlockreason** The reason detection did not complete. +- **detectionRetryMode** Indicates whether we will try to scan again. +- **errorCode** The error code returned for the current process. +- **eventScenario** End-to-end update session ID, or indicates the purpose of sending this event - whether because the software distribution just started installing content, or whether it was cancelled, succeeded, or failed. +- **flightID** The unique identifier for the flight (Windows Insider pre-release build) should be delivered to the device, if applicable. +- **interactive** Indicates whether the user initiated the session. +- **networkStatus** Indicates if the device is connected to the internet. +- **revisionNumber** The Update revision number. +- **scanTriggerSource** The source of the triggered scan. +- **updateId** The unique identifier of the Update. +- **updateScenarioType** Identifies the type of update session being performed. +- **wuDeviceid** The unique device ID used by Windows Update. + + +### Microsoft.Windows.Update.Orchestrator.DisplayNeeded + +This event indicates the reboot was postponed due to needing a display. + +The following fields are available: + +- **displayNeededReason** Reason the display is needed. +- **eventScenario** Indicates the purpose of sending this event - whether because the software distribution just started checking for content, or whether it was cancelled, succeeded, or failed. +- **rebootOutsideOfActiveHours** Indicates whether the reboot was to occur outside of active hours. +- **revisionNumber** Revision number of the update. +- **updateId** Update ID. +- **updateScenarioType** The update session type. +- **uxRebootstate** Indicates the exact state of the user experience at the time the required reboot was initiated. +- **wuDeviceid** The unique identifier of a specific device, used to identify how many devices are encountering success or a particular issue + + +### Microsoft.Windows.Update.Orchestrator.Download + +This event sends launch data for a Windows Update download to help keep Windows up to date. + +The following fields are available: + +- **deferReason** Reason for download not completing. +- **errorCode** An error code represented as a hexadecimal value. +- **eventScenario** End-to-end update session ID. +- **flightID** The specific ID of the Windows Insider build the device is getting. +- **interactive** Indicates whether the session is user initiated. +- **revisionNumber** Update revision number. +- **updateId** Update ID. +- **updateScenarioType** The update session type. +- **wuDeviceid** Unique device ID used by Windows Update. + + +### Microsoft.Windows.Update.Orchestrator.DTUCompletedWhenWuFlightPendingCommit + +This event indicates that DTU completed installation of the electronic software delivery (ESD), when Windows Update was already in Pending Commit phase of the feature update. + +The following fields are available: + +- **wuDeviceid** Device ID used by Windows Update. + + +### Microsoft.Windows.Update.Orchestrator.DTUEnabled + +This event indicates that Inbox DTU functionality was enabled. + +The following fields are available: + +- **wuDeviceid** Device ID used by Windows Update. + + +### Microsoft.Windows.Update.Orchestrator.DTUInitiated + +This event indicates that Inbox DTU functionality was intiated. + +The following fields are available: + +- **dtuErrorCode** Return code from creating the DTU Com Server. +- **isDtuApplicable** Determination of whether DTU is applicable to the machine it is running on. +- **wuDeviceid** Device ID used by Windows Update. + + +### Microsoft.Windows.Update.Orchestrator.EscalationRiskLevels + +This event is sent during update scan, download, or install, and indicates that the device is at risk of being out-of-date. + +The following fields are available: + +- **configVersion** The escalation configuration version on the device. +- **downloadElapsedTime** Indicates how long since the download is required on device. +- **downloadRiskLevel** At-risk level of download phase. +- **installElapsedTime** Indicates how long since the install is required on device. +- **installRiskLevel** The at-risk level of install phase. +- **isSediment** Assessment of whether is device is at risk. +- **scanElapsedTime** Indicates how long since the scan is required on device. +- **scanRiskLevel** At-risk level of the scan phase. +- **wuDeviceid** Device ID used by Windows Update. + + +### Microsoft.Windows.Update.Orchestrator.FailedToAddTimeTriggerToScanTask + +This event indicated that USO failed to add a trigger time to a task. + +The following fields are available: + +- **errorCode** The Windows Update error code. +- **wuDeviceid** The Windows Update device ID. + + +### Microsoft.Windows.Update.Orchestrator.FlightInapplicable + +This event indicates that the update is no longer applicable to this device. + +The following fields are available: + +- **EventPublishedTime** Time when this event was generated. +- **flightID** The specific ID of the Windows Insider build. +- **inapplicableReason** The reason why the update is inapplicable. +- **revisionNumber** Update revision number. +- **updateId** Unique Windows Update ID. +- **updateScenarioType** Update session type. +- **UpdateStatus** Last status of update. +- **UUPFallBackConfigured** Indicates whether UUP fallback is configured. +- **wuDeviceid** Unique Device ID. + + +### Microsoft.Windows.Update.Orchestrator.InitiatingReboot + +This event sends data about an Orchestrator requesting a reboot from power management to help keep Windows up to date. + +The following fields are available: + +- **EventPublishedTime** Time of the event. +- **flightID** Unique update ID +- **interactive** Indicates whether the reboot initiation stage of the update process was entered as a result of user action. +- **rebootOutsideOfActiveHours** Indicates whether the reboot was to occur outside of active hours. +- **revisionNumber** Revision number of the update. +- **updateId** Update ID. +- **updateScenarioType** The update session type. +- **uxRebootstate** Indicates the exact state of the user experience at the time the required reboot was initiated. +- **wuDeviceid** Unique device ID used by Windows Update. + + +### Microsoft.Windows.Update.Orchestrator.Install + +This event sends launch data for a Windows Update install to help keep Windows up to date. + +The following fields are available: + +- **batteryLevel** Current battery capacity in mWh or percentage left. +- **deferReason** Reason for install not completing. +- **errorCode** The error code reppresented by a hexadecimal value. +- **eventScenario** End-to-end update session ID. +- **flightID** The ID of the Windows Insider build the device is getting. +- **flightUpdate** Indicates whether the update is a Windows Insider build. +- **ForcedRebootReminderSet** A boolean value that indicates if a forced reboot will happen for updates. +- **IgnoreReasonsForRestart** The reason(s) a Postpone Restart command was ignored. +- **installCommitfailedtime** The time it took for a reboot to happen but the upgrade failed to progress. +- **installRebootinitiatetime** The time it took for a reboot to be attempted. +- **interactive** Identifies if session is user initiated. +- **minutesToCommit** The time it took to install updates. +- **rebootOutsideOfActiveHours** Indicates whether a reboot is scheduled outside of active hours. +- **revisionNumber** Update revision number. +- **updateId** Update ID. +- **updateScenarioType** The update session type. +- **uxRebootstate** Indicates the exact state of the user experience at the time the required reboot was initiated to ensure the correct update process and experience is provided to keep Windows up to date. +- **wuDeviceid** Unique device ID used by Windows Update. + + +### Microsoft.Windows.Update.Orchestrator.LowUptimes + +This event is sent if a device is identified as not having sufficient uptime to reliably process updates in order to keep secure. + +The following fields are available: + +- **availableHistoryMinutes** The number of minutes available from the local machine activity history. +- **isLowUptimeMachine** Is the machine considered low uptime or not. +- **lowUptimeMinHours** Current setting for the minimum number of hours needed to not be considered low uptime. +- **lowUptimeQueryDays** Current setting for the number of recent days to check for uptime. +- **uptimeMinutes** Number of minutes of uptime measured. +- **wuDeviceid** Unique device ID for Windows Update. + + +### Microsoft.Windows.Update.Orchestrator.OneshotUpdateDetection + +This event returns data about scans initiated through settings UI, or background scans that are urgent; to help keep Windows up to date. + +The following fields are available: + +- **externalOneshotupdate** The last time a task-triggered scan was completed. +- **interactiveOneshotupdate** The last time an interactive scan was completed. +- **oldlastscanOneshotupdate** The last time a scan completed successfully. +- **wuDeviceid** The Windows Update Device GUID (Globally-Unique ID). + + +### Microsoft.Windows.Update.Orchestrator.PreShutdownStart + +This event is generated before the shutdown and commit operations. + +The following fields are available: + +- **wuDeviceid** The unique identifier of a specific device, used to identify how many devices are encountering success or a particular issue. + + +### Microsoft.Windows.Update.Orchestrator.RebootFailed + +This event sends information about whether an update required a reboot and reasons for failure, to help keep Windows up to date. + +The following fields are available: + +- **batteryLevel** Current battery capacity in mWh or percentage left. +- **deferReason** Reason for install not completing. +- **EventPublishedTime** The time that the reboot failure occurred. +- **flightID** Unique update ID. +- **rebootOutsideOfActiveHours** Indicates whether a reboot was scheduled outside of active hours. +- **RebootResults** Hex code indicating failure reason. Typically, we expect this to be a specific USO generated hex code. +- **revisionNumber** Update revision number. +- **updateId** Update ID. +- **updateScenarioType** The update session type. +- **uxRebootstate** Indicates the exact state of the user experience at the time the required reboot was initiated to ensure the correct update process and experience is provided to keep Windows up to date. +- **wuDeviceid** Unique device ID used by Windows Update. + + +### Microsoft.Windows.Update.Orchestrator.RefreshSettings + +This event sends basic data about the version of upgrade settings applied to the system to help keep Windows up to date. + +The following fields are available: + +- **errorCode** Hex code for the error message, to allow lookup of the specific error. +- **settingsDownloadTime** Timestamp of the last attempt to acquire settings. +- **settingsETag** Version identifier for the settings. +- **wuDeviceid** Unique device ID used by Windows Update. + + +### Microsoft.Windows.Update.Orchestrator.RestoreRebootTask + +This event sends data indicating that a reboot task is missing unexpectedly on a device and the task is restored because a reboot is still required, to help keep Windows up to date. + +The following fields are available: + +- **RebootTaskMissedTimeUTC** The time when the reboot task was scheduled to run, but did not. +- **RebootTaskNextTimeUTC** The time when the reboot task was rescheduled for. +- **RebootTaskRestoredTime** Time at which this reboot task was restored. +- **wuDeviceid** Device ID for the device on which the reboot is restored. + + +### Microsoft.Windows.Update.Orchestrator.ScanTriggered + +This event indicates that Update Orchestrator has started a scan operation. + +The following fields are available: + +- **errorCode** The error code returned for the current scan operation. +- **eventScenario** Indicates the purpose of sending this event. +- **interactive** Indicates whether the scan is interactive. +- **isDTUEnabled** Indicates whether DTU (internal abbreviation for Direct Feature Update) channel is enabled on the client system. +- **isScanPastSla** Indicates whether the SLA has elapsed for scanning. +- **isScanPastTriggerSla** Indicates whether the SLA has elapsed for triggering a scan. +- **minutesOverScanSla** Indicates how many minutes the scan exceeded the scan SLA. +- **minutesOverScanTriggerSla** Indicates how many minutes the scan exceeded the scan trigger SLA. +- **scanTriggerSource** Indicates what caused the scan. +- **updateScenarioType** The update session type. +- **wuDeviceid** Unique device ID used by Windows Update. + + +### Microsoft.Windows.Update.Orchestrator.StickUpdate + +This event is sent when the update service orchestrator (USO) indicates the update cannot be superseded by a newer update. + +The following fields are available: + +- **updateId** Identifier associated with the specific piece of content. +- **wuDeviceid** Unique device ID controlled by the software distribution client. + + +### Microsoft.Windows.Update.Orchestrator.SystemNeeded + +This event sends data about why a device is unable to reboot, to help keep Windows up to date. + +The following fields are available: + +- **eventScenario** End-to-end update session ID. +- **rebootOutsideOfActiveHours** Indicates whether a reboot is scheduled outside of active hours. +- **revisionNumber** Update revision number. +- **systemNeededReason** List of apps or tasks that are preventing the system from restarting. +- **updateId** Update ID. +- **updateScenarioType** The update session type. +- **uxRebootstate** Indicates the exact state of the user experience at the time the required reboot was initiated to ensure the correct update process and experience is provided to keep Windows up to date. +- **wuDeviceid** Unique device ID used by Windows Update. + + +### Microsoft.Windows.Update.Orchestrator.TerminatedByActiveHours + +This event indicates that update activity was stopped due to active hours starting. + +The following fields are available: + +- **activeHoursEnd** The end of the active hours window. +- **activeHoursStart** The start of the active hours window. +- **updatePhase** The current state of the update process. +- **wuDeviceid** The device identifier. + + +### Microsoft.Windows.Update.Orchestrator.TerminatedByBatteryLevel + +This event is sent when update activity was stopped due to a low battery level. + +The following fields are available: + +- **batteryLevel** The current battery charge capacity. +- **batteryLevelThreshold** The battery capacity threshold to stop update activity. +- **updatePhase** The current state of the update process. +- **wuDeviceid** The device identifier. + + +### Microsoft.Windows.Update.Orchestrator.UnstickUpdate + +This event is sent when the update service orchestrator (USO) indicates that the update can be superseded by a newer update. + +The following fields are available: + +- **updateId** Identifier associated with the specific piece of content. +- **wuDeviceid** Unique device ID controlled by the software distribution client. + + +### Microsoft.Windows.Update.Orchestrator.UpdatePolicyCacheRefresh + +This event sends data on whether Update Management Policies were enabled on a device, to help keep Windows up to date. + +The following fields are available: + +- **configuredPoliciescount** Number of policies on the device. +- **configuredPoliciescsunt** No content is currently available. +- **policiesNamevaluesource** Policy name and source of policy (group policy, MDM or flight). +- **policyCacherefreshtime** Time when policy cache was refreshed. +- **updateInstalluxsetting** Indicates whether a user has set policies via a user experience option. +- **wuDeviceid** Unique device ID used by Windows Update. + + +### Microsoft.Windows.Update.Orchestrator.UpdateRebootRequired + +This event sends data about whether an update required a reboot to help keep Windows up to date. + +The following fields are available: + +- **flightID** The specific ID of the Windows Insider build the device is getting. +- **interactive** Indicates whether the reboot initiation stage of the update process was entered as a result of user action. +- **revisionNumber** Update revision number. +- **updateId** Update ID. +- **updateScenarioType** The update session type. +- **uxRebootstate** Indicates the exact state of the user experience at the time the required reboot was initiated to ensure the correct update process and experience is provided to keep Windows up to date. +- **wuDeviceid** Unique device ID used by Windows Update. + + +### Microsoft.Windows.Update.Orchestrator.updateSettingsFlushFailed + +This event sends information about an update that encountered problems and was not able to complete. + +The following fields are available: + +- **errorCode** The error code encountered. +- **wuDeviceid** The ID of the device in which the error occurred. + + +### Microsoft.Windows.Update.Orchestrator.UsoSession + +This event represents the state of the USO service at start and completion. + +The following fields are available: + +- **activeSessionid** A unique session GUID. +- **eventScenario** The state of the update action. +- **interactive** Is the USO session interactive? +- **lastErrorcode** The last error that was encountered. +- **lastErrorstate** The state of the update when the last error was encountered. +- **sessionType** A GUID that refers to the update session type. +- **updateScenarioType** A descriptive update session type. +- **wuDeviceid** The Windows Update device GUID. + + +### Microsoft.Windows.Update.Ux.MusNotification.EnhancedEngagedRebootUxState + +This event sends information about the configuration of Enhanced Direct-to-Engaged (eDTE), which includes values for the timing of how eDTE will progress through each phase of the reboot. + +The following fields are available: + +- **AcceptAutoModeLimit** The maximum number of days for a device to automatically enter Auto Reboot mode. +- **AutoToAutoFailedLimit** The maximum number of days for Auto Reboot mode to fail before a Reboot Failed dialog will be shown. +- **DeviceLocalTime** The date and time (based on the device date/time settings) the reboot mode changed. +- **EngagedModeLimit** The number of days to switch between DTE (Direct-to-Engaged) dialogs. +- **EnterAutoModeLimit** The maximum number of days a device can enter Auto Reboot mode. +- **ETag** The Entity Tag that represents the OneSettings version. +- **IsForcedEnabled** Identifies whether Forced Reboot mode is enabled for the device. +- **IsUltimateForcedEnabled** Identifies whether Ultimate Forced Reboot mode is enabled for the device. +- **OldestUpdateLocalTime** The date and time (based on the device date/time settings) this update’s reboot began pending. +- **RebootUxState** Identifies the reboot state: Engaged, Auto, Forced, UltimateForced. +- **RebootVersion** The version of the DTE (Direct-to-Engaged). +- **SkipToAutoModeLimit** The maximum number of days to switch to start while in Auto Reboot mode. +- **UpdateId** The ID of the update that is waiting for reboot to finish installation. +- **UpdateRevision** The revision of the update that is waiting for reboot to finish installation. + + +### Microsoft.Windows.Update.Ux.MusNotification.RebootNoLongerNeeded + +This event is sent when a security update has successfully completed. + +The following fields are available: + +- **UtcTime** The Coordinated Universal Time that the restart was no longer needed. + + +### Microsoft.Windows.Update.Ux.MusNotification.RebootScheduled + +This event sends basic information about scheduling an update-related reboot, to get security updates and to help keep Windows up-to-date. + +The following fields are available: + +- **activeHoursApplicable** Indicates whether Active Hours applies on this device. +- **IsEnhancedEngagedReboot** Indicates whether Enhanced reboot was enabled. +- **rebootArgument** Argument for the reboot task. It also represents specific reboot related action. +- **rebootOutsideOfActiveHours** True, if a reboot is scheduled outside of active hours. False, otherwise. +- **rebootScheduledByUser** True, if a reboot is scheduled by user. False, if a reboot is scheduled automatically. +- **rebootState** Current state of the reboot. +- **rebootUsingSmartScheduler** Indicates that the reboot is scheduled by SmartScheduler. +- **revisionNumber** Revision number of the OS. +- **scheduledRebootTime** Time scheduled for the reboot. +- **scheduledRebootTimeInUTC** Time scheduled for the reboot, in UTC. +- **updateId** Identifies which update is being scheduled. +- **wuDeviceid** The unique device ID used by Windows Update. + + +### Microsoft.Windows.Update.Ux.MusNotification.UxBrokerScheduledTask + +This event is sent when MUSE broker schedules a task. + +The following fields are available: + +- **TaskArgument** The arguments with which the task is scheduled. +- **TaskName** Name of the task. + + +### Microsoft.Windows.Update.Ux.MusUpdateSettings.RebootScheduled + +This event sends basic information for scheduling a device restart to install security updates. It's used to help keep Windows up to date. + +The following fields are available: + +- **activeHoursApplicable** Is the restart respecting Active Hours? +- **IsEnhancedEngagedReboot** TRUE if the reboot path is Enhanced Engaged. Otherwise, FALSE. +- **rebootArgument** The arguments that are passed to the OS for the restarted. +- **rebootOutsideOfActiveHours** Was the restart scheduled outside of Active Hours? +- **rebootScheduledByUser** Was the restart scheduled by the user? If the value is false, the restart was scheduled by the device. +- **rebootState** The state of the restart. +- **rebootUsingSmartScheduler** TRUE if the reboot should be performed by the Smart Scheduler. Otherwise, FALSE. +- **revisionNumber** The revision number of the OS being updated. +- **scheduledRebootTime** Time of the scheduled reboot +- **scheduledRebootTimeInUTC** Time of the scheduled restart, in Coordinated Universal Time. +- **updateId** The Windows Update device GUID. +- **wuDeviceid** The Windows Update device GUID. + + +## Windows Update mitigation events + +### Mitigation360Telemetry.MitigationCustom.CleanupSafeOsImages + +This event sends data specific to the CleanupSafeOsImages mitigation used for OS Updates. + +The following fields are available: + +- **ClientId** The client ID used by Windows Update. +- **FlightId** The ID of each Windows Insider build the device received. +- **InstanceId** A unique device ID that identifies each update instance. +- **MitigationScenario** The update scenario in which the mitigation was executed. +- **MountedImageCount** The number of mounted images. +- **MountedImageMatches** The number of mounted image matches. +- **MountedImagesFailed** The number of mounted images that could not be removed. +- **MountedImagesRemoved** The number of mounted images that were successfully removed. +- **MountedImagesSkipped** The number of mounted images that were not found. +- **RelatedCV** The correlation vector value generated from the latest USO scan. +- **Result** HResult of this operation. +- **ScenarioId** ID indicating the mitigation scenario. +- **ScenarioSupported** Indicates whether the scenario was supported. +- **SessionId** Unique value for each update attempt. +- **UpdateId** Unique ID for each Windows Update. +- **WuId** Unique ID for the Windows Update client. + + +### Mitigation360Telemetry.MitigationCustom.FixAppXReparsePoints + +This event sends data specific to the FixAppXReparsePoints mitigation used for OS updates. + +The following fields are available: + +- **ClientId** Unique identifier for each flight. +- **FlightId** Unique GUID that identifies each instances of setuphost.exe. +- **InstanceId** The update scenario in which the mitigation was executed. +- **MitigationScenario** Correlation vector value generated from the latest USO scan. +- **RelatedCV** Number of reparse points that are corrupted but we failed to fix them. +- **ReparsePointsFailed** Number of reparse points that were corrupted and were fixed by this mitigation. +- **ReparsePointsFixed** Number of reparse points that are not corrupted and no action is required. +- **ReparsePointsSkipped** HResult of this operation. +- **Result** ID indicating the mitigation scenario. +- **ScenarioId** Indicates whether the scenario was supported. +- **ScenarioSupported** Unique value for each update attempt. +- **SessionId** Unique ID for each Update. +- **UpdateId** Unique ID for the Windows Update client. +- **WuId** Unique ID for the Windows Update client. + + +### Mitigation360Telemetry.MitigationCustom.FixupEditionId + +This event sends data specific to the FixupEditionId mitigation used for OS updates. + +The following fields are available: + +- **ClientId** In the WU scenario, this will be the WU client ID that is passed to Setup. In Media setup, default value is Media360, but can be overwritten by the caller to a unique value. +- **EditionIdUpdated** Determine whether EditionId was changed. +- **FlightId** Unique identifier for each flight. +- **InstanceId** Unique GUID that identifies each instances of setuphost.exe. +- **MitigationScenario** The update scenario in which the mitigation was executed. +- **ProductEditionId** Expected EditionId value based on GetProductInfo. +- **ProductType** Value returned by GetProductInfo. +- **RegistryEditionId** EditionId value in the registry. +- **RelatedCV** Correlation vector value generated from the latest USO scan. +- **Result** HResult of this operation. +- **ScenarioId** ID indicating the mitigation scenario. +- **ScenarioSupported** Indicates whether the scenario was supported. +- **SessionId** Unique value for each update attempt. +- **UpdateId** Unique ID for each update. +- **WuId** Unique ID for the Windows Update client. + + +## Windows Update Reserve Manager events + +### Microsoft.Windows.UpdateReserveManager.CommitPendingHardReserveAdjustment + +This event is sent when the Update Reserve Manager commits a hard reserve adjustment that was pending. + +The following fields are available: + +- **FinalAdjustment** Final adjustment for the hard reserve following the addition or removal of optional content. +- **InitialAdjustment** Initial intended adjustment for the hard reserve following the addition/removal of optional content. + + +### Microsoft.Windows.UpdateReserveManager.FunctionReturnedError + +This event is sent when the Update Reserve Manager returns an error from one of its internal functions. + +The following fields are available: + +- **FailedExpression** The failed expression that was returned. +- **FailedFile** The binary file that contained the failed function. +- **FailedFunction** The name of the function that originated the failure. +- **FailedLine** The line number of the failure. +- **ReturnCode** The return code of the function. + + +### Microsoft.Windows.UpdateReserveManager.InitializeUpdateReserveManager + +This event returns data about the Update Reserve Manager, including whether it’s been initialized. + +The following fields are available: + +- **ClientId** The ID of the caller application. +- **Flags** The enumerated flags used to initialize the manager. +- **FlightId** The flight ID of the content the calling client is currently operating with. +- **Offline** Indicates whether or the reserve manager is called during offline operations. +- **PolicyPassed** Indicates whether the machine is able to use reserves. +- **ReturnCode** Return code of the operation. +- **Version** The version of the Update Reserve Manager. + + +### Microsoft.Windows.UpdateReserveManager.PrepareTIForReserveInitialization + +This event is sent when the Update Reserve Manager prepares the Trusted Installer to initialize reserves on the next boot. + +The following fields are available: + +- **Flags** The flags that are passed to the function to prepare the Trusted Installer for reserve initialization. + + +### Microsoft.Windows.UpdateReserveManager.RemovePendingHardReserveAdjustment + +This event is sent when the Update Reserve Manager removes a pending hard reserve adjustment. + + + +### Microsoft.Windows.UpdateReserveManager.UpdatePendingHardReserveAdjustment + +This event is sent when the Update Reserve Manager needs to adjust the size of the hard reserve after the option content is installed. + +The following fields are available: + +- **ChangeSize** The change in the hard reserve size based on the addition or removal of optional content. +- **Disposition** The parameter for the hard reserve adjustment function. +- **Flags** The flags passed to the hard reserve adjustment function. +- **PendingHardReserveAdjustment** The final change to the hard reserve size. +- **UpdateType** Indicates whether the change is an increase or decrease in the size of the hard reserve. + + +## Winlogon events + +### Microsoft.Windows.Security.Winlogon.SetupCompleteLogon + +This event signals the completion of the setup process. It happens only once during the first logon. + + + +## XBOX events + +### Microsoft.Xbox.XamTelemetry.AppActivationError + +This event indicates whether the system detected an activation error in the app. + +The following fields are available: + +- **ActivationUri** Activation URI (Uniform Resource Identifier) used in the attempt to activate the app. +- **AppId** The Xbox LIVE Title ID. +- **AppUserModelId** The AUMID (Application User Model ID) of the app to activate. +- **Result** The HResult error. +- **UserId** The Xbox LIVE User ID (XUID). + + +### Microsoft.Xbox.XamTelemetry.AppActivity + +This event is triggered whenever the current app state is changed by: launch, switch, terminate, snap, etc. + +The following fields are available: + +- **AppActionId** The ID of the application action. +- **AppCurrentVisibilityState** The ID of the current application visibility state. +- **AppId** The Xbox LIVE Title ID of the app. +- **AppPackageFullName** The full name of the application package. +- **AppPreviousVisibilityState** The ID of the previous application visibility state. +- **AppSessionId** The application session ID. +- **AppType** The type ID of the application (AppType_NotKnown, AppType_Era, AppType_Sra, AppType_Uwa). +- **BCACode** The BCA (Burst Cutting Area) mark code of the optical disc used to launch the application. +- **DurationMs** The amount of time (in milliseconds) since the last application state transition. +- **IsTrialLicense** This boolean value is TRUE if the application is on a trial license. +- **LicenseType** The type of licensed used to authorize the app (0 - Unknown, 1 - User, 2 - Subscription, 3 - Offline, 4 - Disc). +- **LicenseXuid** If the license type is 1 (User), this field contains the XUID (Xbox User ID) of the registered owner of the license. +- **ProductGuid** The Xbox product GUID (Globally-Unique ID) of the application. +- **UserId** The XUID (Xbox User ID) of the current user. + + + From a9b48ce01f125b4d7bf26d5653a34122d743f54b Mon Sep 17 00:00:00 2001 From: Brian Lich Date: Wed, 27 Mar 2019 09:03:25 -0700 Subject: [PATCH 093/724] new build 3/27/2019 9:03 AM --- .../basic-level-windows-diagnostic-events-and-fields-1903.md | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/windows/privacy/basic-level-windows-diagnostic-events-and-fields-1903.md b/windows/privacy/basic-level-windows-diagnostic-events-and-fields-1903.md index a7a06f32ec..6d5138182b 100644 --- a/windows/privacy/basic-level-windows-diagnostic-events-and-fields-1903.md +++ b/windows/privacy/basic-level-windows-diagnostic-events-and-fields-1903.md @@ -13,7 +13,7 @@ manager: dansimp ms.collection: M365-security-compliance ms.topic: article audience: ITPro -ms.date: 03/26/2019 +ms.date: 03/27/2019 --- From 666dcc2f9c959cfcae120ee93a2f71d1b7260c18 Mon Sep 17 00:00:00 2001 From: Brian Lich Date: Wed, 27 Mar 2019 09:03:35 -0700 Subject: [PATCH 094/724] new build 3/27/2019 9:03 AM --- ...ndows-diagnostic-events-and-fields-1703.md | 2 +- ...ndows-diagnostic-events-and-fields-1709.md | 2 +- ...ndows-diagnostic-events-and-fields-1803.md | 2 +- ...ndows-diagnostic-events-and-fields-1809.md | 15678 ++++++++-------- 4 files changed, 7770 insertions(+), 7914 deletions(-) diff --git a/windows/privacy/basic-level-windows-diagnostic-events-and-fields-1703.md b/windows/privacy/basic-level-windows-diagnostic-events-and-fields-1703.md index ae09444cb1..1a4810d670 100644 --- a/windows/privacy/basic-level-windows-diagnostic-events-and-fields-1703.md +++ b/windows/privacy/basic-level-windows-diagnostic-events-and-fields-1703.md @@ -13,7 +13,7 @@ manager: dansimp ms.collection: M365-security-compliance ms.topic: article audience: ITPro -ms.date: 03/26/2019 +ms.date: 03/27/2019 --- diff --git a/windows/privacy/basic-level-windows-diagnostic-events-and-fields-1709.md b/windows/privacy/basic-level-windows-diagnostic-events-and-fields-1709.md index 494bb5b1d5..0ca537440b 100644 --- a/windows/privacy/basic-level-windows-diagnostic-events-and-fields-1709.md +++ b/windows/privacy/basic-level-windows-diagnostic-events-and-fields-1709.md @@ -13,7 +13,7 @@ manager: dansimp ms.collection: M365-security-compliance ms.topic: article audience: ITPro -ms.date: 03/26/2019 +ms.date: 03/27/2019 --- diff --git a/windows/privacy/basic-level-windows-diagnostic-events-and-fields-1803.md b/windows/privacy/basic-level-windows-diagnostic-events-and-fields-1803.md index 38b1e69785..a2d892faf3 100644 --- a/windows/privacy/basic-level-windows-diagnostic-events-and-fields-1803.md +++ b/windows/privacy/basic-level-windows-diagnostic-events-and-fields-1803.md @@ -13,7 +13,7 @@ manager: dansimp ms.collection: M365-security-compliance ms.topic: article audience: ITPro -ms.date: 03/26/2019 +ms.date: 03/27/2019 --- diff --git a/windows/privacy/basic-level-windows-diagnostic-events-and-fields-1809.md b/windows/privacy/basic-level-windows-diagnostic-events-and-fields-1809.md index 1fdf4dd009..8540ded6cf 100644 --- a/windows/privacy/basic-level-windows-diagnostic-events-and-fields-1809.md +++ b/windows/privacy/basic-level-windows-diagnostic-events-and-fields-1809.md @@ -1,7911 +1,7767 @@ ---- -description: Use this article to learn more about what Windows diagnostic data is gathered at the basic level. -title: Windows 10, version 1809 basic diagnostic events and fields (Windows 10) -keywords: privacy, telemetry -ms.prod: w10 -ms.mktglfcycl: manage -ms.sitesec: library -ms.pagetype: security -localizationpriority: high -author: brianlic-msft -ms.author: brianlic -manager: dansimp -ms.collection: M365-security-compliance -ms.topic: article -audience: ITPro -ms.date: 03/26/2019 ---- - - -# Windows 10, version 1809 basic level Windows diagnostic events and fields - - **Applies to** - -- Windows 10, version 1809 - - -The Basic level gathers a limited set of information that is critical for understanding the device and its configuration including: basic device information, quality-related information, app compatibility, and Microsoft Store. When the level is set to Basic, it also includes the Security level information. - -The Basic level helps to identify problems that can occur on a particular device hardware or software configuration. For example, it can help determine if crashes are more frequent on devices with a specific amount of memory or that are running a particular driver version. This helps Microsoft fix operating system or app problems. - -Use this article to learn about diagnostic events, grouped by event area, and the fields within each event. A brief description is provided for each field. Every event generated includes common data, which collects device data. - -You can learn more about Windows functional and diagnostic data through these articles: - - -- [Windows 10, version 1803 basic diagnostic events and fields](basic-level-windows-diagnostic-events-and-fields-1803.md) -- [Windows 10, version 1709 basic diagnostic events and fields](basic-level-windows-diagnostic-events-and-fields-1709.md) -- [Windows 10, version 1703 basic diagnostic events and fields](basic-level-windows-diagnostic-events-and-fields-1703.md) -- [Manage connections from Windows operating system components to Microsoft services](manage-connections-from-windows-operating-system-components-to-microsoft-services.md) -- [Configure Windows diagnostic data in your organization](configure-windows-diagnostic-data-in-your-organization.md) - - - - -## Account trace logging provider events - -### Microsoft.Windows.Mitigation.AccountTraceLoggingProvider.General - -This event provides information about application properties to indicate the successful execution. - -The following fields are available: - -- **AppMode** Indicates the mode the app is being currently run around privileges. -- **ExitCode** Indicates the exit code of the app. -- **Help** Indicates if the app needs to be launched in the help mode. -- **ParseError** Indicates if there was a parse error during the execution. -- **RightsAcquired** Indicates if the right privileges were acquired for successful execution. -- **RightsWereEnabled** Indicates if the right privileges were enabled for successful execution. -- **TestMode** Indicates whether the app is being run in test mode. - - -### Microsoft.Windows.Mitigation.AccountTraceLoggingProvider.GetCount - -This event provides information about the properties of user accounts in the Administrator group. - -The following fields are available: - -- **Internal** Indicates the internal property associated with the count group. -- **LastError** The error code (if applicable) for the cause of the failure to get the count of the user account. -- **Result** The HResult error. - - -## AppLocker events - -### Microsoft.Windows.Security.AppLockerCSP.ActivityStoppedAutomatically - -Automatically closed activity for start/stop operations that aren't explicitly closed. - - - -### Microsoft.Windows.Security.AppLockerCSP.AddParams - -Parameters passed to Add function of the AppLockerCSP Node. - -The following fields are available: - -- **child** The child URI of the node to add. -- **uri** URI of the node relative to %SYSTEM32%/AppLocker. - - -### Microsoft.Windows.Security.AppLockerCSP.AddStart - -Start of "Add" Operation for the AppLockerCSP Node. - - - -### Microsoft.Windows.Security.AppLockerCSP.AddStop - -End of "Add" Operation for AppLockerCSP Node. - -The following fields are available: - -- **hr** The HRESULT returned by Add function in AppLockerCSP. - - -### Microsoft.Windows.Security.AppLockerCSP.CAppLockerCSP::Rollback - -Result of the 'Rollback' operation in AppLockerCSP. - -The following fields are available: - -- **oldId** Previous id for the CSP transaction. -- **txId** Current id for the CSP transaction. - - -### Microsoft.Windows.Security.AppLockerCSP.ClearParams - -Parameters passed to the "Clear" operation for AppLockerCSP. - -The following fields are available: - -- **uri** The URI relative to the %SYSTEM32%\AppLocker folder. - - -### Microsoft.Windows.Security.AppLockerCSP.ClearStart - -Start of the "Clear" operation for the AppLockerCSP Node. - - - -### Microsoft.Windows.Security.AppLockerCSP.ClearStop - -End of the "Clear" operation for the AppLockerCSP node. - -The following fields are available: - -- **hr** HRESULT reported at the end of the 'Clear' function. - - -### Microsoft.Windows.Security.AppLockerCSP.ConfigManagerNotificationStart - -Start of the "ConfigManagerNotification" operation for AppLockerCSP. - -The following fields are available: - -- **NotifyState** State sent by ConfigManager to AppLockerCSP. - - -### Microsoft.Windows.Security.AppLockerCSP.ConfigManagerNotificationStop - -End of the "ConfigManagerNotification" operation for AppLockerCSP. - -The following fields are available: - -- **hr** HRESULT returned by the ConfigManagerNotification function in AppLockerCSP. - - -### Microsoft.Windows.Security.AppLockerCSP.CreateNodeInstanceParams - -Parameters passed to the CreateNodeInstance function of the AppLockerCSP node. - -The following fields are available: - -- **NodeId** NodeId passed to CreateNodeInstance. -- **nodeOps** NodeOperations parameter passed to CreateNodeInstance. -- **uri** URI passed to CreateNodeInstance, relative to %SYSTEM32%\AppLocker. - - -### Microsoft.Windows.Security.AppLockerCSP.CreateNodeInstanceStart - -Start of the "CreateNodeInstance" operation for the AppLockerCSP node. - - - -### Microsoft.Windows.Security.AppLockerCSP.CreateNodeInstanceStop - -End of the "CreateNodeInstance" operation for the AppLockerCSP node - -The following fields are available: - -- **hr** HRESULT returned by the CreateNodeInstance function in AppLockerCSP. - - -### Microsoft.Windows.Security.AppLockerCSP.DeleteChildParams - -Parameters passed to the DeleteChild function of the AppLockerCSP node. - -The following fields are available: - -- **child** The child URI of the node to delete. -- **uri** URI relative to %SYSTEM32%\AppLocker. - - -### Microsoft.Windows.Security.AppLockerCSP.DeleteChildStart - -Start of the "DeleteChild" operation for the AppLockerCSP node. - - - -### Microsoft.Windows.Security.AppLockerCSP.DeleteChildStop - -End of the "DeleteChild" operation for the AppLockerCSP node. - -The following fields are available: - -- **hr** HRESULT returned by the DeleteChild function in AppLockerCSP. - - -### Microsoft.Windows.Security.AppLockerCSP.EnumPolicies - -Logged URI relative to %SYSTEM32%\AppLocker, if the Plugin GUID is null, or the CSP doesn't believe the old policy is present. - -The following fields are available: - -- **uri** URI relative to %SYSTEM32%\AppLocker. - - -### Microsoft.Windows.Security.AppLockerCSP.GetChildNodeNamesParams - -Parameters passed to the GetChildNodeNames function of the AppLockerCSP node. - -The following fields are available: - -- **uri** URI relative to %SYSTEM32%/AppLocker for MDM node. - - -### Microsoft.Windows.Security.AppLockerCSP.GetChildNodeNamesStart - -Start of the "GetChildNodeNames" operation for the AppLockerCSP node. - - - -### Microsoft.Windows.Security.AppLockerCSP.GetChildNodeNamesStop - -End of the "GetChildNodeNames" operation for the AppLockerCSP node. - -The following fields are available: - -- **child[0]** If function succeeded, the first child's name, else "NA". -- **count** If function succeeded, the number of child node names returned by the function, else 0. -- **hr** HRESULT returned by the GetChildNodeNames function of AppLockerCSP. - - -### Microsoft.Windows.Security.AppLockerCSP.GetLatestId - -The result of 'GetLatestId' in AppLockerCSP (the latest time stamped GUID). - -The following fields are available: - -- **dirId** The latest directory identifier found by GetLatestId. -- **id** The id returned by GetLatestId if id > 0 - otherwise the dirId parameter. - - -### Microsoft.Windows.Security.AppLockerCSP.HResultException - -HRESULT thrown by any arbitrary function in AppLockerCSP. - -The following fields are available: - -- **file** File in the OS code base in which the exception occurs. -- **function** Function in the OS code base in which the exception occurs. -- **hr** HRESULT that is reported. -- **line** Line in the file in the OS code base in which the exception occurs. - - -### Microsoft.Windows.Security.AppLockerCSP.SetValueParams - -Parameters passed to the SetValue function of the AppLockerCSP node. - -The following fields are available: - -- **dataLength** Length of the value to set. -- **uri** The node URI to that should contain the value, relative to %SYSTEM32%\AppLocker. - - -### Microsoft.Windows.Security.AppLockerCSP.SetValueStart - -Start of the "SetValue" operation for the AppLockerCSP node. - - - -### Microsoft.Windows.Security.AppLockerCSP.SetValueStop - -End of the "SetValue" operation for the AppLockerCSP node. - -The following fields are available: - -- **hr** HRESULT returned by the SetValue function in AppLockerCSP. - - -### Microsoft.Windows.Security.AppLockerCSP.TryRemediateMissingPolicies - -EntryPoint of fix step or policy remediation, includes URI relative to %SYSTEM32%\AppLocker that needs to be fixed. - -The following fields are available: - -- **uri** URI for node relative to %SYSTEM32%/AppLocker. - - -## Appraiser events - -### Microsoft.Windows.Appraiser.General.ChecksumTotalPictureCount - -This event lists the types of objects and how many of each exist on the client device. This allows for a quick way to ensure that the records present on the server match what is present on the client. - -The following fields are available: - -- **DatasourceApplicationFile_19ASetup** The count of the number of this particular object type present on this device. -- **DatasourceApplicationFile_19H1** The count of the number of this particular object type present on this device. -- **DatasourceApplicationFile_19H1Setup** The count of the number of this particular object type present on this device. -- **DatasourceApplicationFile_RS1** An ID for the system, calculated by hashing hardware identifiers. -- **DatasourceApplicationFile_RS2** An ID for the system, calculated by hashing hardware identifiers. -- **DatasourceApplicationFile_RS3** The count of the number of this particular object type present on this device. -- **DatasourceApplicationFile_RS3Setup** The count of the number of this particular object type present on this device. -- **DatasourceApplicationFile_RS4** The count of the number of this particular object type present on this device. -- **DatasourceApplicationFile_RS4Setup** The count of the number of this particular object type present on this device. -- **DatasourceApplicationFile_RS5** The count of the number of this particular object type present on this device. -- **DatasourceApplicationFile_RS5Setup** The count of the number of this particular object type present on this device. -- **DatasourceApplicationFile_TH1** The count of the number of this particular object type present on this device. -- **DatasourceApplicationFile_TH2** The count of the number of this particular object type present on this device. -- **DatasourceDevicePnp_19ASetup** The count of the number of this particular object type present on this device. -- **DatasourceDevicePnp_19H1** The count of the number of this particular object type present on this device. -- **DatasourceDevicePnp_19H1Setup** The count of the number of this particular object type present on this device. -- **DatasourceDevicePnp_RS1** The total DataSourceDevicePnp objects targeting Windows 10 version 1607 on this device. -- **DatasourceDevicePnp_RS2** The count of the number of this particular object type present on this device. -- **DatasourceDevicePnp_RS3** The count of the number of this particular object type present on this device. -- **DatasourceDevicePnp_RS3Setup** The count of the number of this particular object type present on this device. -- **DatasourceDevicePnp_RS4** The count of the number of this particular object type present on this device. -- **DatasourceDevicePnp_RS4Setup** The count of the number of this particular object type present on this device. -- **DatasourceDevicePnp_RS5** The count of the number of this particular object type present on this device. -- **DatasourceDevicePnp_RS5Setup** The count of the number of this particular object type present on this device. -- **DatasourceDevicePnp_TH1** The count of the number of this particular object type present on this device. -- **DatasourceDevicePnp_TH2** The count of the number of this particular object type present on this device. -- **DatasourceDriverPackage_19ASetup** The count of the number of this particular object type present on this device. -- **DatasourceDriverPackage_19H1** The count of the number of this particular object type present on this device. -- **DatasourceDriverPackage_19H1Setup** The count of the number of this particular object type present on this device. -- **DatasourceDriverPackage_RS1** The total DataSourceDriverPackage objects targeting Windows 10 version 1607 on this device. -- **DatasourceDriverPackage_RS2** The total DataSourceDriverPackage objects targeting Windows 10, version 1703 on this device. -- **DatasourceDriverPackage_RS3** The count of the number of this particular object type present on this device. -- **DatasourceDriverPackage_RS3Setup** The count of the number of this particular object type present on this device. -- **DatasourceDriverPackage_RS4** The count of the number of this particular object type present on this device. -- **DatasourceDriverPackage_RS4Setup** The count of the number of this particular object type present on this device. -- **DatasourceDriverPackage_RS5** The count of the number of this particular object type present on this device. -- **DatasourceDriverPackage_RS5Setup** The count of the number of this particular object type present on this device. -- **DatasourceDriverPackage_TH1** The count of the number of this particular object type present on this device. -- **DatasourceDriverPackage_TH2** The count of the number of this particular object type present on this device. -- **DataSourceMatchingInfoBlock_19ASetup** The count of the number of this particular object type present on this device. -- **DataSourceMatchingInfoBlock_19H1** The count of the number of this particular object type present on this device. -- **DataSourceMatchingInfoBlock_19H1Setup** The count of the number of this particular object type present on this device. -- **DataSourceMatchingInfoBlock_RS1** The total DataSourceMatchingInfoBlock objects targeting Windows 10 version 1607 on this device. -- **DataSourceMatchingInfoBlock_RS2** The count of the number of this particular object type present on this device. -- **DataSourceMatchingInfoBlock_RS3** The count of the number of this particular object type present on this device. -- **DataSourceMatchingInfoBlock_RS3Setup** The count of the number of this particular object type present on this device. -- **DataSourceMatchingInfoBlock_RS4** The count of the number of this particular object type present on this device. -- **DataSourceMatchingInfoBlock_RS4Setup** The count of the number of this particular object type present on this device. -- **DataSourceMatchingInfoBlock_RS5** The count of the number of this particular object type present on this device. -- **DataSourceMatchingInfoBlock_RS5Setup** The count of the number of this particular object type present on this device. -- **DataSourceMatchingInfoBlock_TH1** The count of the number of this particular object type present on this device. -- **DataSourceMatchingInfoBlock_TH2** The count of the number of this particular object type present on this device. -- **DataSourceMatchingInfoPassive_19ASetup** The count of the number of this particular object type present on this device. -- **DataSourceMatchingInfoPassive_19H1** The count of the number of this particular object type present on this device. -- **DataSourceMatchingInfoPassive_19H1Setup** The count of the number of this particular object type present on this device. -- **DataSourceMatchingInfoPassive_RS1** The total DataSourceMatchingInfoPassive objects targeting Windows 10 version 1607 on this device. -- **DataSourceMatchingInfoPassive_RS2** The count of the number of this particular object type present on this device. -- **DataSourceMatchingInfoPassive_RS3** The count of the number of this particular object type present on this device. -- **DataSourceMatchingInfoPassive_RS3Setup** The count of the number of this particular object type present on this device. -- **DataSourceMatchingInfoPassive_RS4** The count of the number of this particular object type present on this device. -- **DataSourceMatchingInfoPassive_RS4Setup** The count of the number of this particular object type present on this device. -- **DataSourceMatchingInfoPassive_RS5** The count of the number of this particular object type present on this device. -- **DataSourceMatchingInfoPassive_RS5Setup** The count of the number of this particular object type present on this device. -- **DataSourceMatchingInfoPassive_TH1** The count of the number of this particular object type present on this device. -- **DataSourceMatchingInfoPassive_TH2** The count of the number of this particular object type present on this device. -- **DataSourceMatchingInfoPostUpgrade_19ASetup** The count of the number of this particular object type present on this device. -- **DataSourceMatchingInfoPostUpgrade_19H1** The count of the number of this particular object type present on this device. -- **DataSourceMatchingInfoPostUpgrade_19H1Setup** The count of the number of this particular object type present on this device. -- **DataSourceMatchingInfoPostUpgrade_RS1** The total DataSourceMatchingInfoPostUpgrade objects targeting Windows 10 version 1607 on this device. -- **DataSourceMatchingInfoPostUpgrade_RS2** The total DataSourceMatchingInfoPostUpgrade objects targeting Windows 10 version 1703 on this device. -- **DataSourceMatchingInfoPostUpgrade_RS3** The total DataSourceMatchingInfoPostUpgrade objects targeting Windows 10 version 1709 on this device. -- **DataSourceMatchingInfoPostUpgrade_RS3Setup** The count of the number of this particular object type present on this device. -- **DataSourceMatchingInfoPostUpgrade_RS4** The count of the number of this particular object type present on this device. -- **DataSourceMatchingInfoPostUpgrade_RS4Setup** The count of the number of this particular object type present on this device. -- **DataSourceMatchingInfoPostUpgrade_RS5** The count of the number of this particular object type present on this device. -- **DataSourceMatchingInfoPostUpgrade_RS5Setup** The count of the number of this particular object type present on this device. -- **DataSourceMatchingInfoPostUpgrade_TH1** The count of the number of this particular object type present on this device. -- **DataSourceMatchingInfoPostUpgrade_TH2** The count of the number of this particular object type present on this device. -- **DatasourceSystemBios_19ASetup** The count of the number of this particular object type present on this device. -- **DatasourceSystemBios_19H1** The count of the number of this particular object type present on this device. -- **DatasourceSystemBios_19H1Setup** The count of the number of this particular object type present on this device. -- **DatasourceSystemBios_RS1** The total DatasourceSystemBios objects targeting Windows 10 version 1607 present on this device. -- **DatasourceSystemBios_RS2** The total DatasourceSystemBios objects targeting Windows 10 version 1703 present on this device. -- **DatasourceSystemBios_RS3** The total DatasourceSystemBios objects targeting Windows 10 version 1709 present on this device. -- **DatasourceSystemBios_RS3Setup** The count of the number of this particular object type present on this device. -- **DatasourceSystemBios_RS4** The count of the number of this particular object type present on this device. -- **DatasourceSystemBios_RS4Setup** The count of the number of this particular object type present on this device. -- **DatasourceSystemBios_RS5** The count of the number of this particular object type present on this device. -- **DatasourceSystemBios_RS5Setup** The count of the number of this particular object type present on this device. -- **DatasourceSystemBios_TH1** The count of the number of this particular object type present on this device. -- **DatasourceSystemBios_TH2** The count of the number of this particular object type present on this device. -- **DecisionApplicationFile_19ASetup** The count of the number of this particular object type present on this device. -- **DecisionApplicationFile_19H1** The count of the number of this particular object type present on this device. -- **DecisionApplicationFile_19H1Setup** The count of the number of this particular object type present on this device. -- **DecisionApplicationFile_RS1** The count of the number of this particular object type present on this device. -- **DecisionApplicationFile_RS2** The count of the number of this particular object type present on this device. -- **DecisionApplicationFile_RS3** The count of the number of this particular object type present on this device. -- **DecisionApplicationFile_RS3Setup** The count of the number of this particular object type present on this device. -- **DecisionApplicationFile_RS4** The count of the number of this particular object type present on this device. -- **DecisionApplicationFile_RS4Setup** The count of the number of this particular object type present on this device. -- **DecisionApplicationFile_RS5** The count of the number of this particular object type present on this device. -- **DecisionApplicationFile_RS5Setup** The count of the number of this particular object type present on this device. -- **DecisionApplicationFile_TH1** The count of the number of this particular object type present on this device. -- **DecisionApplicationFile_TH2** The count of the number of this particular object type present on this device. -- **DecisionDevicePnp_19ASetup** The count of the number of this particular object type present on this device. -- **DecisionDevicePnp_19H1** The count of the number of this particular object type present on this device. -- **DecisionDevicePnp_19H1Setup** The count of the number of this particular object type present on this device. -- **DecisionDevicePnp_RS1** The total DecisionDevicePnp objects targeting Windows 10 version 1607 on this device. -- **DecisionDevicePnp_RS2** The count of the number of this particular object type present on this device. -- **DecisionDevicePnp_RS3** The count of the number of this particular object type present on this device. -- **DecisionDevicePnp_RS3Setup** The count of the number of this particular object type present on this device. -- **DecisionDevicePnp_RS4** The count of the number of this particular object type present on this device. -- **DecisionDevicePnp_RS4Setup** The count of the number of this particular object type present on this device. -- **DecisionDevicePnp_RS5** The count of the number of this particular object type present on this device. -- **DecisionDevicePnp_RS5Setup** The count of the number of this particular object type present on this device. -- **DecisionDevicePnp_TH1** The count of the number of this particular object type present on this device. -- **DecisionDevicePnp_TH2** The count of the number of this particular object type present on this device. -- **DecisionDriverPackage_19ASetup** The count of the number of this particular object type present on this device. -- **DecisionDriverPackage_19H1** The count of the number of this particular object type present on this device. -- **DecisionDriverPackage_19H1Setup** The count of the number of this particular object type present on this device. -- **DecisionDriverPackage_RS1** The total DecisionDriverPackage objects targeting Windows 10 version 1607 on this device. -- **DecisionDriverPackage_RS2** The count of the number of this particular object type present on this device. -- **DecisionDriverPackage_RS3** The count of the number of this particular object type present on this device. -- **DecisionDriverPackage_RS3Setup** The count of the number of this particular object type present on this device. -- **DecisionDriverPackage_RS4** The count of the number of this particular object type present on this device. -- **DecisionDriverPackage_RS4Setup** The count of the number of this particular object type present on this device. -- **DecisionDriverPackage_RS5** The count of the number of this particular object type present on this device. -- **DecisionDriverPackage_RS5Setup** The count of the number of this particular object type present on this device. -- **DecisionDriverPackage_TH1** The count of the number of this particular object type present on this device. -- **DecisionDriverPackage_TH2** The count of the number of this particular object type present on this device. -- **DecisionMatchingInfoBlock_19ASetup** The count of the number of this particular object type present on this device. -- **DecisionMatchingInfoBlock_19H1** The count of the number of this particular object type present on this device. -- **DecisionMatchingInfoBlock_19H1Setup** The count of the number of this particular object type present on this device. -- **DecisionMatchingInfoBlock_RS1** The total DecisionMatchingInfoBlock objects targeting Windows 10 version 1607 present on this device. -- **DecisionMatchingInfoBlock_RS2** The total DecisionMatchingInfoBlock objects targeting Windows 10 version 1703 present on this device. -- **DecisionMatchingInfoBlock_RS3** The total DecisionMatchingInfoBlock objects targeting Windows 10 version 1709 present on this device. -- **DecisionMatchingInfoBlock_RS3Setup** The count of the number of this particular object type present on this device. -- **DecisionMatchingInfoBlock_RS4** The total DecisionMatchingInfoBlock objects targeting Windows 10 version 1803 present on this device. -- **DecisionMatchingInfoBlock_RS4Setup** The count of the number of this particular object type present on this device. -- **DecisionMatchingInfoBlock_RS5** The count of the number of this particular object type present on this device. -- **DecisionMatchingInfoBlock_RS5Setup** The count of the number of this particular object type present on this device. -- **DecisionMatchingInfoBlock_TH1** The count of the number of this particular object type present on this device. -- **DecisionMatchingInfoBlock_TH2** The count of the number of this particular object type present on this device. -- **DecisionMatchingInfoPassive_19ASetup** The count of the number of this particular object type present on this device. -- **DecisionMatchingInfoPassive_19H1** The count of the number of this particular object type present on this device. -- **DecisionMatchingInfoPassive_19H1Setup** The count of the number of this particular object type present on this device. -- **DecisionMatchingInfoPassive_RS1** The total DecisionMatchingInfoPassive objects targeting Windows 10 version 1607 on this device. -- **DecisionMatchingInfoPassive_RS2** The total DecisionMatchingInfoPassive objects targeting Windows 10 version 1703 on this device. -- **DecisionMatchingInfoPassive_RS3** The total DecisionMatchingInfoPassive objects targeting Windows 10 version 1803 on this device. -- **DecisionMatchingInfoPassive_RS3Setup** The count of the number of this particular object type present on this device. -- **DecisionMatchingInfoPassive_RS4** The count of the number of this particular object type present on this device. -- **DecisionMatchingInfoPassive_RS4Setup** The count of the number of this particular object type present on this device. -- **DecisionMatchingInfoPassive_RS5** The count of the number of this particular object type present on this device. -- **DecisionMatchingInfoPassive_RS5Setup** The count of the number of this particular object type present on this device. -- **DecisionMatchingInfoPassive_TH1** The count of the number of this particular object type present on this device. -- **DecisionMatchingInfoPassive_TH2** The count of the number of this particular object type present on this device. -- **DecisionMatchingInfoPostUpgrade_19ASetup** The count of the number of this particular object type present on this device. -- **DecisionMatchingInfoPostUpgrade_19H1** The count of the number of this particular object type present on this device. -- **DecisionMatchingInfoPostUpgrade_19H1Setup** The count of the number of this particular object type present on this device. -- **DecisionMatchingInfoPostUpgrade_RS1** The total DecisionMatchingInfoPostUpgrade objects targeting Windows 10 version 1607 on this device. -- **DecisionMatchingInfoPostUpgrade_RS2** The total DecisionMatchingInfoPostUpgrade objects targeting Windows 10 version 1703 on this device. -- **DecisionMatchingInfoPostUpgrade_RS3** The total DecisionMatchingInfoPostUpgrade objects targeting Windows 10 version 1709 on this device. -- **DecisionMatchingInfoPostUpgrade_RS3Setup** The count of the number of this particular object type present on this device. -- **DecisionMatchingInfoPostUpgrade_RS4** The count of the number of this particular object type present on this device. -- **DecisionMatchingInfoPostUpgrade_RS4Setup** The count of the number of this particular object type present on this device. -- **DecisionMatchingInfoPostUpgrade_RS5** The count of the number of this particular object type present on this device. -- **DecisionMatchingInfoPostUpgrade_RS5Setup** The count of the number of this particular object type present on this device. -- **DecisionMatchingInfoPostUpgrade_TH1** The count of the number of this particular object type present on this device. -- **DecisionMatchingInfoPostUpgrade_TH2** The count of the number of this particular object type present on this device. -- **DecisionMediaCenter_19ASetup** The count of the number of this particular object type present on this device. -- **DecisionMediaCenter_19H1** The count of the number of this particular object type present on this device. -- **DecisionMediaCenter_19H1Setup** The total DecisionMediaCenter objects targeting the next release of Windows on this device. -- **DecisionMediaCenter_RS1** The total DecisionMediaCenter objects targeting Windows 10 version 1607 present on this device. -- **DecisionMediaCenter_RS2** The total DecisionMediaCenter objects targeting Windows 10 version 1703 present on this device. -- **DecisionMediaCenter_RS3** The total DecisionMediaCenter objects targeting Windows 10 version 1709 present on this device. -- **DecisionMediaCenter_RS3Setup** The count of the number of this particular object type present on this device. -- **DecisionMediaCenter_RS4** The total DecisionMediaCenter objects targeting Windows 10 version 1803 present on this device. -- **DecisionMediaCenter_RS4Setup** The count of the number of this particular object type present on this device. -- **DecisionMediaCenter_RS5** The count of the number of this particular object type present on this device. -- **DecisionMediaCenter_RS5Setup** The count of the number of this particular object type present on this device. -- **DecisionMediaCenter_TH1** The count of the number of this particular object type present on this device. -- **DecisionMediaCenter_TH2** The count of the number of this particular object type present on this device. -- **DecisionSystemBios_19ASetup** The total DecisionSystemBios objects targeting the next release of Windows on this device. -- **DecisionSystemBios_19H1** The count of the number of this particular object type present on this device. -- **DecisionSystemBios_19H1Setup** The total DecisionSystemBios objects targeting the next release of Windows on this device. -- **DecisionSystemBios_RS1** The total DecisionSystemBios objects targeting Windows 10 version 1607 on this device. -- **DecisionSystemBios_RS2** The total DecisionSystemBios objects targeting Windows 10 version 1703 on this device. -- **DecisionSystemBios_RS3** The total DecisionSystemBios objects targeting Windows 10 version 1709 on this device. -- **DecisionSystemBios_RS3Setup** The count of the number of this particular object type present on this device. -- **DecisionSystemBios_RS4** The total DecisionSystemBios objects targeting Windows 10 version, 1803 present on this device. -- **DecisionSystemBios_RS4Setup** The total DecisionSystemBios objects targeting the next release of Windows on this device. -- **DecisionSystemBios_RS5** The total DecisionSystemBios objects targeting the next release of Windows on this device. -- **DecisionSystemBios_RS5Setup** The total DecisionSystemBios objects targeting the next release of Windows on this device. -- **DecisionSystemBios_TH1** The count of the number of this particular object type present on this device. -- **DecisionSystemBios_TH2** The count of the number of this particular object type present on this device. -- **DecisionSystemProcessor_RS2** The count of the number of this particular object type present on this device. -- **DecisionTest_RS1** An ID for the system, calculated by hashing hardware identifiers. -- **InventoryApplicationFile** The count of the number of this particular object type present on this device. -- **InventoryDeviceContainer** A count of device container objects in cache. -- **InventoryDevicePnp** A count of device Plug and Play objects in cache. -- **InventoryDriverBinary** A count of driver binary objects in cache. -- **InventoryDriverPackage** A count of device objects in cache. -- **InventoryLanguagePack** The count of the number of this particular object type present on this device. -- **InventoryMediaCenter** The count of the number of this particular object type present on this device. -- **InventorySystemBios** The count of the number of this particular object type present on this device. -- **InventorySystemMachine** The count of the number of this particular object type present on this device. -- **InventorySystemProcessor** The count of the number of this particular object type present on this device. -- **InventoryTest** The count of the number of this particular object type present on this device. -- **InventoryUplevelDriverPackage** The count of the number of this particular object type present on this device. -- **PCFP** The count of the number of this particular object type present on this device. -- **SystemMemory** The count of the number of this particular object type present on this device. -- **SystemProcessorCompareExchange** The count of the number of this particular object type present on this device. -- **SystemProcessorLahfSahf** The count of the number of this particular object type present on this device. -- **SystemProcessorNx** The total number of objects of this type present on this device. -- **SystemProcessorPrefetchW** The total number of objects of this type present on this device. -- **SystemProcessorSse2** The total number of objects of this type present on this device. -- **SystemTouch** The count of the number of this particular object type present on this device. -- **SystemWim** The total number of objects of this type present on this device. -- **SystemWindowsActivationStatus** The count of the number of this particular object type present on this device. -- **SystemWlan** The total number of objects of this type present on this device. -- **Wmdrm_19ASetup** The count of the number of this particular object type present on this device. -- **Wmdrm_19H1** The count of the number of this particular object type present on this device. -- **Wmdrm_19H1Setup** The total Wmdrm objects targeting the next release of Windows on this device. -- **Wmdrm_RS1** An ID for the system, calculated by hashing hardware identifiers. -- **Wmdrm_RS2** An ID for the system, calculated by hashing hardware identifiers. -- **Wmdrm_RS3** An ID for the system, calculated by hashing hardware identifiers. -- **Wmdrm_RS3Setup** The count of the number of this particular object type present on this device. -- **Wmdrm_RS4** The total Wmdrm objects targeting Windows 10, version 1803 present on this device. -- **Wmdrm_RS4Setup** The count of the number of this particular object type present on this device. -- **Wmdrm_RS5** The count of the number of this particular object type present on this device. -- **Wmdrm_RS5Setup** The count of the number of this particular object type present on this device. -- **Wmdrm_TH1** The count of the number of this particular object type present on this device. -- **Wmdrm_TH2** The count of the number of this particular object type present on this device. - - -### Microsoft.Windows.Appraiser.General.DatasourceApplicationFileAdd - -Represents the basic metadata about specific application files installed on the system. - -This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedeviceinventorychange). - -The following fields are available: - -- **AppraiserVersion** The version of the appraiser file that is generating the events. -- **AvDisplayName** If the app is an anti-virus app, this is its display name. -- **CompatModelIndex** The compatibility prediction for this file. -- **HasCitData** Indicates whether the file is present in CIT data. -- **HasCitDcta** No content is currently available. -- **HasUpgradeExe** Indicates whether the anti-virus app has an upgrade.exe file. -- **IsAv** Is the file an anti-virus reporting EXE? -- **ResolveAttempted** This will always be an empty string when sending telemetry. -- **SdbEntries** An array of fields that indicates the SDB entries that apply to this file. - - -### Microsoft.Windows.Appraiser.General.DatasourceApplicationFileRemove - -This event indicates that the DatasourceApplicationFile object is no longer present. - -This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedeviceinventorychange). - -The following fields are available: - -- **AppraiserVersion** The version of the Appraiser file that is generating the events. - - -### Microsoft.Windows.Appraiser.General.DatasourceApplicationFileStartSync - -This event indicates that a new set of DatasourceApplicationFileAdd events will be sent. - -This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedeviceinventorychange). - -The following fields are available: - -- **AppraiserVersion** The version of the Appraiser file that is generating the events. - - -### Microsoft.Windows.Appraiser.General.DatasourceDevicePnpAdd - -This event sends compatibility data for a Plug and Play device, to help keep Windows up to date. - -This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedeviceinventorychange). - -The following fields are available: - -- **ActiveNetworkConnection** Indicates whether the device is an active network device. -- **ActivóNetworkConnection** No content is currently available. -- **AppraiserVersion** The version of the appraiser file generating the events. -- **CosDeviceRating** An enumeration that indicates if there is a driver on the target operating system. -- **CosDeviceSolution** An enumeration that indicates how a driver on the target operating system is available. -- **CosDeviceSolutionUrl** Microsoft.Windows.Appraiser.General.DatasourceDevicePnpAdd . Empty string -- **CosPopulatedFromId** The expected uplevel driver matching ID based on driver coverage data. -- **IsBootCritical** Indicates whether the device boot is critical. -- **UplevelInboxDriver** Indicates whether there is a driver uplevel for this device. -- **WuDriverCoverage** Indicates whether there is a driver uplevel for this device, according to Windows Update. -- **WuDriverUpdateId** The Windows Update ID of the applicable uplevel driver. -- **WuPopulatedFromId** The expected uplevel driver matching ID based on driver coverage from Windows Update. - - -### Microsoft.Windows.Appraiser.General.DatasourceDevicePnpRemove - -This event indicates that the DatasourceDevicePnp object is no longer present. - -This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedeviceinventorychange). - -The following fields are available: - -- **AppraiserVersion** The version of the Appraiser file that is generating the events. - - -### Microsoft.Windows.Appraiser.General.DatasourceDevicePnpStartSync - -This event indicates that a new set of DatasourceDevicePnpAdd events will be sent. - -This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedeviceinventorychange). - -The following fields are available: - -- **AppraiserVersion** The version of the Appraiser file that is generating the events. - - -### Microsoft.Windows.Appraiser.General.DatasourceDriverPackageAdd - -This event sends compatibility database data about driver packages to help keep Windows up to date. - -This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedeviceinventorychange). - -The following fields are available: - -- **AppraiserVersion** The version of the appraiser file generating the events. - - -### Microsoft.Windows.Appraiser.General.DatasourceDriverPackageRemove - -This event indicates that the DatasourceDriverPackage object is no longer present. - -This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedeviceinventorychange). - -The following fields are available: - -- **AppraiserVersion** The version of the Appraiser file that is generating the events. - - -### Microsoft.Windows.Appraiser.General.DatasourceDriverPackageStartSync - -This event indicates that a new set of DatasourceDriverPackageAdd events will be sent. - -This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedeviceinventorychange). - -The following fields are available: - -- **AppraiserVersion** The version of the Appraiser file that is generating the events. - - -### Microsoft.Windows.Appraiser.General.DataSourceMatchingInfoBlockAdd - -This event sends blocking data about any compatibility blocking entries hit on the system that are not directly related to specific applications or devices, to help keep Windows up-to-date. - -This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedeviceinventorychange). - -The following fields are available: - -- **AppraiserVersion** The version of the appraiser file generating the events. - - -### Microsoft.Windows.Appraiser.General.DataSourceMatchingInfoBlockRemove - -This event indicates that the DataSourceMatchingInfoBlock object is no longer present. - -This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedeviceinventorychange). - -The following fields are available: - -- **AppraiserVersion** The version of the Appraiser file that is generating the events. - - -### Microsoft.Windows.Appraiser.General.DataSourceMatchingInfoBlockStartSync - -This event indicates that a full set of DataSourceMatchingInfoBlockStAdd events have been sent. - -This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedeviceinventorychange). - -The following fields are available: - -- **AppraiserVersion** The version of the Appraiser file that is generating the events. - - -### Microsoft.Windows.Appraiser.General.DataSourceMatchingInfoPassiveAdd - -This event sends compatibility database information about non-blocking compatibility entries on the system that are not keyed by either applications or devices, to help keep Windows up-to-date. - -This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedeviceinventorychange). - -The following fields are available: - -- **AppraiserVersion** The version of the appraiser file generating the events. - - -### Microsoft.Windows.Appraiser.General.DataSourceMatchingInfoPassiveRemove - -This event indicates that the DataSourceMatchingInfoPassive object is no longer present. - -This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedeviceinventorychange). - -The following fields are available: - -- **AppraiserVersion** The version of the Appraiser file that is generating the events. - - -### Microsoft.Windows.Appraiser.General.DataSourceMatchingInfoPassiveStartSync - -This event indicates that a new set of DataSourceMatchingInfoPassiveAdd events will be sent. - -This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedeviceinventorychange). - -The following fields are available: - -- **AppraiserVersion** The version of the Appraiser file that is generating the events. - - -### Microsoft.Windows.Appraiser.General.DataSourceMatchingInfoPostUpgradeAdd - -This event sends compatibility database information about entries requiring reinstallation after an upgrade on the system that are not keyed by either applications or devices, to help keep Windows up-to-date. - -This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedeviceinventorychange). - -The following fields are available: - -- **AppraiserVersion** The version of the appraiser file generating the events. - - -### Microsoft.Windows.Appraiser.General.DataSourceMatchingInfoPostUpgradeRemove - -This event indicates that the DataSourceMatchingInfoPostUpgrade object is no longer present. - -This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedeviceinventorychange). - -The following fields are available: - -- **AppraiserVersion** The version of the Appraiser file that is generating the events. - - -### Microsoft.Windows.Appraiser.General.DataSourceMatchingInfoPostUpgradeStartSync - -This event indicates that a new set of DataSourceMatchingInfoPostUpgradeAdd events will be sent. - -This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedeviceinventorychange). - -The following fields are available: - -- **AppraiserVersion** The version of the Appraiser file that is generating the events. - - -### Microsoft.Windows.Appraiser.General.DatasourceSystemBiosAdd - -This event sends compatibility database information about the BIOS to help keep Windows up-to-date. - -This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedeviceinventorychange). - -The following fields are available: - -- **AppraiserVersion** The version of the Appraiser file generating the events. - - -### Microsoft.Windows.Appraiser.General.DatasourceSystemBiosRemove - -This event indicates that the DatasourceSystemBios object is no longer present. - -This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedeviceinventorychange). - -The following fields are available: - -- **AppraiserVersion** The version of the Appraiser file that is generating the events. - - -### Microsoft.Windows.Appraiser.General.DatasourceSystemBiosStartSync - -This event indicates that a new set of DatasourceSystemBiosAdd events will be sent. - -This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedeviceinventorychange). - -The following fields are available: - -- **AppraiserVersion** The version of the Appraiser file that is generating the events. - - -### Microsoft.Windows.Appraiser.General.DecisionApplicationFileAdd - -This event sends compatibility decision data about a file to help keep Windows up-to-date. - -This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedeviceinventorychange). - -The following fields are available: - -- **AppraiserVersion** The version of the appraiser file that is generating the events. -- **BlockAlreadyInbox** The uplevel runtime block on the file already existed on the current OS. -- **BlockingApplication** Indicates whether there are any application issues that interfere with the upgrade due to the file in question. -- **DisplayGenericMessage** Will be a generic message be shown for this file? -- **DisplayGenericMessageGated** Indicates whether a generic message be shown for this file. -- **HardBlock** This file is blocked in the SDB. -- **HasUxBlockOverride** Does the file have a block that is overridden by a tag in the SDB? -- **MigApplication** Does the file have a MigXML from the SDB associated with it that applies to the current upgrade mode? -- **MigRemoval** Does the file have a MigXML from the SDB that will cause the app to be removed on upgrade? -- **NeedsDismissAction** Will the file cause an action that can be dimissed? -- **NeedsInstallPostUpgradeData** After upgrade, the file will have a post-upgrade notification to install a replacement for the app. -- **NeedsNotifyPostUpgradeData** Does the file have a notification that should be shown after upgrade? -- **NeedsReinstallPostUpgradeData** After upgrade, this file will have a post-upgrade notification to reinstall the app. -- **NeedsUninstallAction** The file must be uninstalled to complete the upgrade. -- **SdbBlockUpgrade** The file is tagged as blocking upgrade in the SDB, -- **SdbBlockUpgradeCanReinstall** The file is tagged as blocking upgrade in the SDB. It can be reinstalled after upgrade. -- **SdbBlockUpgradeUntilUpdate** The file is tagged as blocking upgrade in the SDB. If the app is updated, the upgrade can proceed. -- **SdbReinstallUpgrade** The file is tagged as needing to be reinstalled after upgrade in the SDB. It does not block upgrade. -- **SdbReinstallUpgradeWarn** The file is tagged as needing to be reinstalled after upgrade with a warning in the SDB. It does not block upgrade. -- **SoftBlock** The file is softblocked in the SDB and has a warning. - - -### Microsoft.Windows.Appraiser.General.DecisionApplicationFileRemove - -This event indicates Indicates that the DecisionApplicationFile object is no longer present. - -This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedeviceinventorychange). - -The following fields are available: - -- **AppraiserVersion** The version of the Appraiser file that is generating the events. - - -### Microsoft.Windows.Appraiser.General.DecisionApplicationFileStartSync - -This event indicates that a new set of DecisionApplicationFileAdd events will be sent. - -This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedeviceinventorychange). - -The following fields are available: - -- **AppraiserVersion** The version of the Appraiser file that is generating the events. - - -### Microsoft.Windows.Appraiser.General.DecisionDevicePnpAdd - -This event sends compatibility decision data about a PNP device to help keep Windows up to date. - -This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedeviceinventorychange). - -The following fields are available: - -- **AppraiserVersion** The version of the appraiser file generating the events. -- **AssociatedDriverIsBlocked** Is the driver associated with this PNP device blocked? -- **AssociatedDriverWillNotMigrate** Will the driver associated with this plug-and-play device migrate? -- **BlockAssociatedDriver** Should the driver associated with this PNP device be blocked? -- **BlockingDevice** Is this PNP device blocking upgrade? -- **BlockUpgradeIfDriverBlocked** Is the PNP device both boot critical and does not have a driver included with the OS? -- **BlockUpgradeIfDriverBlockedAndOnlyActiveNetwork** Is this PNP device the only active network device? -- **CssociatedDriverIsBlocked** No content is currently available. -- **DisplayGenericMessage** Will a generic message be shown during Setup for this PNP device? -- **DisplayGenericMessageGated** Indicates whether a generic message will be shown during Setup for this PNP device. -- **DriverAvailableInbox** Is a driver included with the operating system for this PNP device? -- **DriverAvailableOnline** Is there a driver for this PNP device on Windows Update? -- **DriverAvailableUplevel** Is there a driver on Windows Update or included with the operating system for this PNP device? -- **DriverBlockOverridden** Is there is a driver block on the device that has been overridden? -- **DviverAvailableInbox** No content is currently available. -- **NeedsDismissAction** Will the user would need to dismiss a warning during Setup for this device? -- **NotRegressed** Does the device have a problem code on the source OS that is no better than the one it would have on the target OS? -- **SdbDeviceBlockUpgrade** Is there an SDB block on the PNP device that blocks upgrade? -- **SdbDriverBlockOverridden** Is there an SDB block on the PNP device that blocks upgrade, but that block was overridden? - - -### Microsoft.Windows.Appraiser.General.DecisionDevicePnpRemove - -This event indicates that the DecisionDevicePnp object is no longer present. - -This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedeviceinventorychange). - -The following fields are available: - -- **AppraiserVersion** The version of the Appraiser file that is generating the events. - - -### Microsoft.Windows.Appraiser.General.DecisionDevicePnpStartSync - -The DecisionDevicePnpStartSync event indicates that a new set of DecisionDevicePnpAdd events will be sent. - -This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedeviceinventorychange). - -The following fields are available: - -- **AppraiserVersion** The version of the Appraiser file that is generating the events. - - -### Microsoft.Windows.Appraiser.General.DecisionDriverPackageAdd - -This event sends decision data about driver package compatibility to help keep Windows up to date. - -This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedeviceinventorychange). - -The following fields are available: - -- **AppraiserVersion** The version of the appraiser file generating the events. -- **DisplayGenericMessageGated** Indicates whether a generic offer block message will be shown for this driver package. -- **DriverBlockOverridden** Does the driver package have an SDB block that blocks it from migrating, but that block has been overridden? -- **DriverIsDeviceBlocked** Was the driver package was blocked because of a device block? -- **DriverIsDriverBlocked** Is the driver package blocked because of a driver block? -- **DriverIsTroubleshooterBlocked** Indicates whether the driver package is blocked because of a troubleshooter block. -- **DriverShouldNotMigrate** Should the driver package be migrated during upgrade? -- **SdbDriverBlockOverridden** Does the driver package have an SDB block that blocks it from migrating, but that block has been overridden? - - -### Microsoft.Windows.Appraiser.General.DecisionDriverPackageRemove - -This event indicates that the DecisionDriverPackage object is no longer present. - -This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedeviceinventorychange). - -The following fields are available: - -- **AppraiserVersion** The version of the Appraiser file that is generating the events. - - -### Microsoft.Windows.Appraiser.General.DecisionDriverPackageStartSync - -This event indicates that a new set of DecisionDriverPackageAdd events will be sent. - -This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedeviceinventorychange). - -The following fields are available: - -- **AppraiserVersion** The version of the Appraiser file that is generating the events. - - -### Microsoft.Windows.Appraiser.General.DecisionMatchingInfoBlockAdd - -This event sends compatibility decision data about blocking entries on the system that are not keyed by either applications or devices, to help keep Windows up to date. - -This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedeviceinventorychange). - -The following fields are available: - -- **AppraiserVersion** The version of the appraiser file generating the events. -- **BlockingApplication** Are there are any application issues that interfere with upgrade due to matching info blocks? -- **DisplayGenericMessage** Will a generic message be shown for this block? -- **NeedsUninstallAction** Does the user need to take an action in setup due to a matching info block? -- **SdbBlockUpgrade** Is a matching info block blocking upgrade? -- **SdbBlockUpgradeCanReinstall** Is a matching info block blocking upgrade, but has the can reinstall tag? -- **SdbBlockUpgradeUntilUpdate** Is a matching info block blocking upgrade but has the until update tag? - - -### Microsoft.Windows.Appraiser.General.DecisionMatchingInfoBlockRemove - -This event indicates that the DecisionMatchingInfoBlock object is no longer present. - -This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedeviceinventorychange). - -The following fields are available: - -- **AppraiserVersion** The version of the Appraiser file that is generating the events. - - -### Microsoft.Windows.Appraiser.General.DecisionMatchingInfoBlockStartSync - -This event indicates that a new set of DecisionMatchingInfoBlockAdd events will be sent. - -This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedeviceinventorychange). - -The following fields are available: - -- **AppraiserVersion** The version of the Appraiser file that is generating the events. - - -### Microsoft.Windows.Appraiser.General.DecisionMatchingInfoPassiveAdd - -This event sends compatibility decision data about non-blocking entries on the system that are not keyed by either applications or devices, to help keep Windows up to date. - -This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedeviceinventorychange). - -The following fields are available: - -- **AppraiserVersion** The version of the Appraiser file that is generating the events. -- **BlockingApplication** Are there any application issues that interfere with upgrade due to matching info blocks? -- **DisplayGenericMessageGated** Indicates whether a generic offer block message will be shown due to matching info blocks. -- **MigApplication** Is there a matching info block with a mig for the current mode of upgrade? - - -### Microsoft.Windows.Appraiser.General.DecisionMatchingInfoPassiveRemove - -This event Indicates that the DecisionMatchingInfoPassive object is no longer present. - -This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedeviceinventorychange). - -The following fields are available: - -- **AppraiserVersion** The version of the Appraiser file that is generating the events. - - -### Microsoft.Windows.Appraiser.General.DecisionMatchingInfoPassiveStartSync - -This event indicates that a new set of DecisionMatchingInfoPassiveAdd events will be sent. - -This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedeviceinventorychange). - -The following fields are available: - -- **AppraiserVersion** The version of the Appraiser file that is generating the events. - - -### Microsoft.Windows.Appraiser.General.DecisionMatchingInfoPostUpgradeAdd - -This event sends compatibility decision data about entries that require reinstall after upgrade. It's used to help keep Windows up to date. - -This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedeviceinventorychange). - -The following fields are available: - -- **AppraiserVersion** The version of the Appraiser file that is generating the events. -- **NeedsInstallPostUpgradeData** Will the file have a notification after upgrade to install a replacement for the app? -- **NeedsNotifyPostUpgradeData** Should a notification be shown for this file after upgrade? -- **NeedsReinstallPostUpgradeData** Will the file have a notification after upgrade to reinstall the app? -- **SdbReinstallUpgrade** The file is tagged as needing to be reinstalled after upgrade in the compatibility database (but is not blocking upgrade). - - -### Microsoft.Windows.Appraiser.General.DecisionMatchingInfoPostUpgradeRemove - -This event indicates that the DecisionMatchingInfoPostUpgrade object is no longer present. - -This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedeviceinventorychange). - -The following fields are available: - -- **AppraiserVersion** The version of the Appraiser file that is generating the events. - - -### Microsoft.Windows.Appraiser.General.DecisionMatchingInfoPostUpgradeStartSync - -This event indicates that a new set of DecisionMatchingInfoPostUpgradeAdd events will be sent. - -This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedeviceinventorychange). - -The following fields are available: - -- **AppraiserVersion** The version of the Appraiser file that is generating the events. - - -### Microsoft.Windows.Appraiser.General.DecisionMediaCenterAdd - -This event sends decision data about the presence of Windows Media Center, to help keep Windows up to date. - -This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedeviceinventorychange). - -The following fields are available: - -- **AppraiserVersion** The version of the Appraiser file generating the events. -- **BlockingApplication** Is there any application issues that interfere with upgrade due to Windows Media Center? -- **MediaCenterActivelyUsed** If Windows Media Center is supported on the edition, has it been run at least once and are the MediaCenterIndicators are true? -- **MediaCenterIndicators** Do any indicators imply that Windows Media Center is in active use? -- **MediaCenterInUse** Is Windows Media Center actively being used? -- **MediaCenterPaidOrActivelyUsed** Is Windows Media Center actively being used or is it running on a supported edition? -- **NeedsDismissAction** Are there any actions that can be dismissed coming from Windows Media Center? - - -### Microsoft.Windows.Appraiser.General.DecisionMediaCenterRemove - -This event indicates that the DecisionMediaCenter object is no longer present. - -This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedeviceinventorychange). - -The following fields are available: - -- **AppraiserVersion** The version of the Appraiser file that is generating the events. - - -### Microsoft.Windows.Appraiser.General.DecisionMediaCenterStartSync - -This event indicates that a new set of DecisionMediaCenterAdd events will be sent. - -This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedeviceinventorychange). - -The following fields are available: - -- **AppraiserVersion** The version of the Appraiser file that is generating the events. - - -### Microsoft.Windows.Appraiser.General.DecisionSystemBiosAdd - -This event sends compatibility decision data about the BIOS to help keep Windows up to date. - -This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedeviceinventorychange). - -The following fields are available: - -- **AppraiserVersion** The version of the Appraiser file generating the events. -- **Blocking** Is the device blocked from upgrade due to a BIOS block? -- **DisplayGenericMessageGated** Indicates whether a generic offer block message will be shown for the bios. -- **HasBiosBlock** Does the device have a BIOS block? - - -### Microsoft.Windows.Appraiser.General.DecisionSystemBiosRemove - -This event indicates that the DecisionSystemBios object is no longer present. - -This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedeviceinventorychange). - -The following fields are available: - -- **AppraiserVersion** The version of the Appraiser file that is generating the events. - - -### Microsoft.Windows.Appraiser.General.DecisionSystemBiosStartSync - -This event indicates that a new set of DecisionSystemBiosAdd events will be sent. - -This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedeviceinventorychange). - -The following fields are available: - -- **AppraiserVersion** The version of the Appraiser file that is generating the events. - - -### Microsoft.Windows.Appraiser.General.GatedRegChange - -This event sends data about the results of running a set of quick-blocking instructions, to help keep Windows up to date. - -The following fields are available: - -- **NewData** The data in the registry value after the scan completed. -- **OldData** The previous data in the registry value before the scan ran. -- **PCFP** An ID for the system calculated by hashing hardware identifiers. -- **RegKey** The registry key name for which a result is being sent. -- **RegValue** The registry value for which a result is being sent. -- **Time** The client time of the event. - - -### Microsoft.Windows.Appraiser.General.InventoryApplicationFileAdd - -This event represents the basic metadata about a file on the system. The file must be part of an app and either have a block in the compatibility database or be part of an antivirus program. - -This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedeviceinventorychange). - -The following fields are available: - -- **AppraiserVersion** The version of the Appraiser file generating the events. -- **AvDisplayName** If the app is an antivirus app, this is its display name. -- **AvProductState** Indicates whether the antivirus program is turned on and the signatures are up to date. -- **BinaryType** A binary type. Example: UNINITIALIZED, ZERO_BYTE, DATA_ONLY, DOS_MODULE, NE16_MODULE, PE32_UNKNOWN, PE32_I386, PE32_ARM, PE64_UNKNOWN, PE64_AMD64, PE64_ARM64, PE64_IA64, PE32_CLR_32, PE32_CLR_IL, PE32_CLR_IL_PREFER32, PE64_CLR_64. -- **BinFileVersion** An attempt to clean up FileVersion at the client that tries to place the version into 4 octets. -- **BinProductVersion** An attempt to clean up ProductVersion at the client that tries to place the version into 4 octets. -- **BoeProgramId** If there is no entry in Add/Remove Programs, this is the ProgramID that is generated from the file metadata. -- **CompanyName** The company name of the vendor who developed this file. -- **FileId** A hash that uniquely identifies a file. -- **FileVersion** The File version field from the file metadata under Properties -> Details. -- **HasUpgradeExe** Indicates whether the antivirus app has an upgrade.exe file. -- **IsAv** Indicates whether the file an antivirus reporting EXE. -- **LinkDate** The date and time that this file was linked on. -- **LowerCaseLongPath** The full file path to the file that was inventoried on the device. -- **Name** The name of the file that was inventoried. -- **ProductName** The Product name field from the file metadata under Properties -> Details. -- **ProductVersion** The Product version field from the file metadata under Properties -> Details. -- **ProgramId** A hash of the Name, Version, Publisher, and Language of an application used to identify it. -- **Size** The size of the file (in hexadecimal bytes). - - -### Microsoft.Windows.Appraiser.General.InventoryApplicationFileRemove - -This event indicates that the InventoryApplicationFile object is no longer present. - -This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedeviceinventorychange). - -The following fields are available: - -- **AppraiserVersion** The version of the Appraiser file that is generating the events. - - -### Microsoft.Windows.Appraiser.General.InventoryApplicationFileStartSync - -This event indicates indicates that a new set of InventoryApplicationFileAdd events will be sent. - -This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedeviceinventorychange). - -The following fields are available: - -- **AppraiserVersion** The version of the Appraiser file that is generating the events. - - -### Microsoft.Windows.Appraiser.General.InventoryLanguagePackAdd - -This event sends data about the number of language packs installed on the system, to help keep Windows up to date. - -This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedeviceinventorychange). - -The following fields are available: - -- **AppraiserVersion** The version of the Appraiser file that is generating the events. -- **HasLanguagePack** Indicates whether this device has 2 or more language packs. -- **LanguagePackCount** The number of language packs are installed. - - -### Microsoft.Windows.Appraiser.General.InventoryLanguagePackRemove - -This event indicates that the InventoryLanguagePack object is no longer present. - -This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedeviceinventorychange). - -The following fields are available: - -- **AppraiserVersion** The version of the Appraiser file that is generating the events. - - -### Microsoft.Windows.Appraiser.General.InventoryLanguagePackStartSync - -This event indicates that a new set of InventoryLanguagePackAdd events will be sent. - -This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedeviceinventorychange). - -The following fields are available: - -- **AppraiserVersion** The version of the Appraiser file that is generating the events. - - -### Microsoft.Windows.Appraiser.General.InventoryMediaCenterAdd - -This event sends true/false data about decision points used to understand whether Windows Media Center is used on the system, to help keep Windows up to date. - -This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedeviceinventorychange). - -The following fields are available: - -- **AppraiserVersion** The version of the Appraiser file generating the events. -- **EverLaunched** Has Windows Media Center ever been launched? -- **HasConfiguredTv** Has the user configured a TV tuner through Windows Media Center? -- **HasExtendedUserAccounts** Are any Windows Media Center Extender user accounts configured? -- **HasWatchedFolders** Are any folders configured for Windows Media Center to watch? -- **IsDefaultLauncher** Is Windows Media Center the default app for opening music or video files? -- **IsPaid** Is the user running a Windows Media Center edition that implies they paid for Windows Media Center? -- **IsSupported** Does the running OS support Windows Media Center? - - -### Microsoft.Windows.Appraiser.General.InventoryMediaCenterRemove - -This event indicates that the InventoryMediaCenter object is no longer present. - -This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedeviceinventorychange). - -The following fields are available: - -- **AppraiserVersion** The version of the Appraiser file that is generating the events. - - -### Microsoft.Windows.Appraiser.General.InventoryMediaCenterStartSync - -This event indicates that a new set of InventoryMediaCenterAdd events will be sent. - -This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedeviceinventorychange). - -The following fields are available: - -- **AppraiserVersion** The version of the Appraiser file that is generating the events. - - -### Microsoft.Windows.Appraiser.General.InventorySystemBiosAdd - -This event sends basic metadata about the BIOS to determine whether it has a compatibility block. - -This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedeviceinventorychange). - -The following fields are available: - -- **AppraiserVersion** The version of the Appraiser file that is generating the events. -- **biosDate** The release date of the BIOS in UTC format. -- **BiosDate** The release date of the BIOS in UTC format. -- **biosName** The name field from Win32_BIOS. -- **BiosName** The name field from Win32_BIOS. -- **manufacturer** The manufacturer field from Win32_ComputerSystem. -- **Manufacturer** The manufacturer field from Win32_ComputerSystem. -- **model** The model field from Win32_ComputerSystem. -- **Model** The model field from Win32_ComputerSystem. - - -### Microsoft.Windows.Appraiser.General.InventorySystemBiosRemove - -This event indicates that the InventorySystemBios object is no longer present. - -This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedeviceinventorychange). - -The following fields are available: - -- **AppraiserVersion** The version of the Appraiser file that is generating the events. - - -### Microsoft.Windows.Appraiser.General.InventorySystemBiosStartSync - -This event indicates that a new set of InventorySystemBiosAdd events will be sent. - -This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedeviceinventorychange). - -The following fields are available: - -- **AppraiserVersion** The version of the Appraiser file that is generating the events. - - -### Microsoft.Windows.Appraiser.General.InventoryUplevelDriverPackageAdd - -This event is only runs during setup. It provides a listing of the uplevel driver packages that were downloaded before the upgrade. Is critical to understanding if failures in setup can be traced to not having sufficient uplevel drivers before the upgrade. - -This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedeviceinventorychange). - -The following fields are available: - -- **AppraiserVersion** The version of the Appraiser file that is generating the events. -- **BootCritical** Is the driver package marked as boot critical? -- **Build** The build value from the driver package. -- **CatalogFile** The name of the catalog file within the driver package. -- **Class** The device class from the driver package. -- **ClassGuid** The device class unique ID from the driver package. -- **Date** The date from the driver package. -- **Inbox** Is the driver package of a driver that is included with Windows? -- **OriginalName** The original name of the INF file before it was renamed. Generally a path under $WINDOWS.~BT\Drivers\DU. -- **Provider** The provider of the driver package. -- **PublishedName** The name of the INF file after it was renamed. -- **Revision** The revision of the driver package. -- **SignatureStatus** Indicates if the driver package is signed. Unknown = 0, Unsigned = 1, Signed = 2. -- **VersionMajor** The major version of the driver package. -- **VersionMinor** The minor version of the driver package. - - -### Microsoft.Windows.Appraiser.General.InventoryUplevelDriverPackageRemove - -This event indicates that the InventoryUplevelDriverPackage object is no longer present. - -This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedeviceinventorychange). - -The following fields are available: - -- **AppraiserVersion** The version of the Appraiser file that is generating the events. - - -### Microsoft.Windows.Appraiser.General.InventoryUplevelDriverPackageStartSync - -This event indicates that a new set of InventoryUplevelDriverPackageAdd events will be sent. - -This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedeviceinventorychange). - -The following fields are available: - -- **AppraiserVersion** The version of the Appraiser file that is generating the events. - - -### Microsoft.Windows.Appraiser.General.RunContext - -This event indicates what should be expected in the data payload. - -The following fields are available: - -- **__TlgCV_** No content is currently available. -- **AppraiserBranch** The source branch in which the currently running version of Appraiser was built. -- **AppraiserProcess** The name of the process that launched Appraiser. -- **AppraiserVersion** The version of the Appraiser file generating the events. -- **CensusId** A unique hardware identifier. -- **Context** Indicates what mode Appraiser is running in. Example: Setup or Telemetry. -- **PCFP** An ID for the system calculated by hashing hardware identifiers. -- **Subcontext** Indicates what categories of incompatibilities appraiser is scanning for. Can be N/A, Resolve, or a semicolon-delimited list that can include App, Dev, Sys, Gat, or Rescan. -- **Time** The client time of the event. - - -### Microsoft.Windows.Appraiser.General.SystemMemoryAdd - -This event sends data on the amount of memory on the system and whether it meets requirements, to help keep Windows up-to-date. - -This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedeviceinventorychange). - -The following fields are available: - -- **AppraiserVersion** The version of the Appraiser file generating the events. -- **Blocking** Is the device from upgrade due to memory restrictions? -- **MemoryRequirementViolated** Was a memory requirement violated? -- **pageFile** The current committed memory limit for the system or the current process, whichever is smaller (in bytes). -- **ram** The amount of memory on the device. -- **ramKB** The amount of memory (in KB). -- **virtual** The size of the user-mode portion of the virtual address space of the calling process (in bytes). -- **virtualKB** The amount of virtual memory (in KB). - - -### Microsoft.Windows.Appraiser.General.SystemMemoryRemove - -This event that the SystemMemory object is no longer present. - -This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedeviceinventorychange). - -The following fields are available: - -- **AppraiserVersion** The version of the Appraiser file that is generating the events. - - -### Microsoft.Windows.Appraiser.General.SystemMemoryStartSync - -This event indicates that a new set of SystemMemoryAdd events will be sent. - -This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedeviceinventorychange). - -The following fields are available: - -- **AppraiserVersion** The version of the Appraiser file that is generating the events. - - -### Microsoft.Windows.Appraiser.General.SystemProcessorCompareExchangeAdd - -This event sends data indicating whether the system supports the CompareExchange128 CPU requirement, to help keep Windows up to date. - -This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedeviceinventorychange). - -The following fields are available: - -- **AppraiserVersion** The version of the Appraiser file generating the events. -- **Blocking** Is the upgrade blocked due to the processor? -- **CompareExchange128Support** Does the CPU support CompareExchange128? - - -### Microsoft.Windows.Appraiser.General.SystemProcessorCompareExchangeRemove - -This event indicates that the SystemProcessorCompareExchange object is no longer present. - -This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedeviceinventorychange). - -The following fields are available: - -- **AppraiserVersion** The version of the Appraiser file that is generating the events. - - -### Microsoft.Windows.Appraiser.General.SystemProcessorCompareExchangeStartSync - -This event indicates that a new set of SystemProcessorCompareExchangeAdd events will be sent. - -This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedeviceinventorychange). - -The following fields are available: - -- **AppraiserVersion** The version of the Appraiser file that is generating the events. - - -### Microsoft.Windows.Appraiser.General.SystemProcessorLahfSahfAdd - -This event sends data indicating whether the system supports the LahfSahf CPU requirement, to help keep Windows up-to-date. - -This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedeviceinventorychange). - -The following fields are available: - -- **AppraiserVersion** The version of the Appraiser file generating the events. -- **Blocking** Is the upgrade blocked due to the processor? -- **LahfSahfSupport** Does the CPU support LAHF/SAHF? - - -### Microsoft.Windows.Appraiser.General.SystemProcessorLahfSahfRemove - -This event indicates that the SystemProcessorLahfSahf object is no longer present. - -This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedeviceinventorychange). - -The following fields are available: - -- **AppraiserVersion** The version of the Appraiser file that is generating the events. - - -### Microsoft.Windows.Appraiser.General.SystemProcessorLahfSahfStartSync - -This event indicates that a new set of SystemProcessorLahfSahfAdd events will be sent. - -This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedeviceinventorychange). - -The following fields are available: - -- **AppraiserVersion** The version of the Appraiser file that is generating the events. - - -### Microsoft.Windows.Appraiser.General.SystemProcessorNxAdd - -This event sends data indicating whether the system supports the NX CPU requirement, to help keep Windows up-to-date. - -This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedeviceinventorychange). - -The following fields are available: - -- **AppraiserVersion** The version of the Appraiser file that is generating the events. -- **Blocking** Is the upgrade blocked due to the processor? -- **NXDriverResult** The result of the driver used to do a non-deterministic check for NX support. -- **NXProcessorSupport** Does the processor support NX? - - -### Microsoft.Windows.Appraiser.General.SystemProcessorNxRemove - -This event indicates that the SystemProcessorNx object is no longer present. - -This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedeviceinventorychange). - -The following fields are available: - -- **AppraiserVersion** The version of the Appraiser file that is generating the events. - - -### Microsoft.Windows.Appraiser.General.SystemProcessorNxStartSync - -This event indicates that a new set of SystemProcessorNxAdd events will be sent. - -This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedeviceinventorychange). - -The following fields are available: - -- **AppraiserVersion** The version of the Appraiser file that is generating the events. - - -### Microsoft.Windows.Appraiser.General.SystemProcessorPrefetchWAdd - -This event sends data indicating whether the system supports the PrefetchW CPU requirement, to help keep Windows up to date. - -This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedeviceinventorychange). - -The following fields are available: - -- **AppraiserVersion** The version of the Appraiser file that is generating the events. -- **Blocking** Is the upgrade blocked due to the processor? -- **PrefetchWSupport** Does the processor support PrefetchW? - - -### Microsoft.Windows.Appraiser.General.SystemProcessorPrefetchWRemove - -This event indicates that the SystemProcessorPrefetchW object is no longer present. - -This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedeviceinventorychange). - -The following fields are available: - -- **AppraiserVersion** The version of the Appraiser file that is generating the events. - - -### Microsoft.Windows.Appraiser.General.SystemProcessorPrefetchWStartSync - -This event indicates that a new set of SystemProcessorPrefetchWAdd events will be sent. - -This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedeviceinventorychange). - -The following fields are available: - -- **AppraiserVersion** The version of the Appraiser file that is generating the events. - - -### Microsoft.Windows.Appraiser.General.SystemProcessorSse2Add - -This event sends data indicating whether the system supports the SSE2 CPU requirement, to help keep Windows up to date. - -This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedeviceinventorychange). - -The following fields are available: - -- **AppraiserVersion** The version of the Appraiser file that is generating the events. -- **Blocking** Is the upgrade blocked due to the processor? -- **SSE2ProcessorSupport** Does the processor support SSE2? - - -### Microsoft.Windows.Appraiser.General.SystemProcessorSse2Remove - -This event indicates that the SystemProcessorSse2 object is no longer present. - -This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedeviceinventorychange). - -The following fields are available: - -- **AppraiserVersion** The version of the Appraiser file that is generating the events. - - -### Microsoft.Windows.Appraiser.General.SystemProcessorSse2StartSync - -This event indicates that a new set of SystemProcessorSse2Add events will be sent. - -This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedeviceinventorychange). - -The following fields are available: - -- **AppraiserVersion** The version of the Appraiser file that is generating the events. - - -### Microsoft.Windows.Appraiser.General.SystemTouchAdd - -This event sends data indicating whether the system supports touch, to help keep Windows up to date. - -This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedeviceinventorychange). - -The following fields are available: - -- **AppraiserVersion** The version of the Appraiser file that is generating the events. -- **IntegratedTouchDigitizerPresent** Is there an integrated touch digitizer? -- **MaximumTouches** The maximum number of touch points supported by the device hardware. - - -### Microsoft.Windows.Appraiser.General.SystemTouchRemove - -This event indicates that the SystemTouch object is no longer present. - -This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedeviceinventorychange). - -The following fields are available: - -- **AppraiserVersion** The version of the Appraiser file that is generating the events. - - -### Microsoft.Windows.Appraiser.General.SystemTouchStartSync - -This event indicates that a new set of SystemTouchAdd events will be sent. - -This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedeviceinventorychange). - -The following fields are available: - -- **AppraiserVersion** The version of the Appraiser file that is generating the events. - - -### Microsoft.Windows.Appraiser.General.SystemWimAdd - -This event sends data indicating whether the operating system is running from a compressed Windows Imaging Format (WIM) file, to help keep Windows up to date. - -This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedeviceinventorychange). - -The following fields are available: - -- **AppraiserVersion** The version of the Appraiser file that is generating the events. -- **IsWimBoot** Is the current operating system running from a compressed WIM file? -- **RegistryWimBootValue** The raw value from the registry that is used to indicate if the device is running from a WIM. - - -### Microsoft.Windows.Appraiser.General.SystemWimRemove - -This event indicates that the SystemWim object is no longer present. - -This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedeviceinventorychange). - -The following fields are available: - -- **AppraiserVersion** The version of the Appraiser file that is generating the events. - - -### Microsoft.Windows.Appraiser.General.SystemWimStartSync - -This event indicates that a new set of SystemWimAdd events will be sent. - -This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedeviceinventorychange). - -The following fields are available: - -- **AppraiserVersion** The version of the Appraiser file that is generating the events. - - -### Microsoft.Windows.Appraiser.General.SystemWindowsActivationStatusAdd - -This event sends data indicating whether the current operating system is activated, to help keep Windows up to date. - -This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedeviceinventorychange). - -The following fields are available: - -- **AppraiserVersion** The version of the Appraiser file that is generating the events. -- **WindowsIsLicensedApiValue** The result from the API that's used to indicate if operating system is activated. -- **WindowsNotActivatedDecision** Is the current operating system activated? - - -### Microsoft.Windows.Appraiser.General.SystemWindowsActivationStatusRemove - -This event indicates that the SystemWindowsActivationStatus object is no longer present. - -This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedeviceinventorychange). - -The following fields are available: - -- **AppraiserVersion** The version of the Appraiser file that is generating the events. - - -### Microsoft.Windows.Appraiser.General.SystemWindowsActivationStatusStartSync - -This event indicates that a new set of SystemWindowsActivationStatusAdd events will be sent. - -This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedeviceinventorychange). - -The following fields are available: - -- **AppraiserVersion** The version of the Appraiser file that is generating the events. - - -### Microsoft.Windows.Appraiser.General.SystemWlanAdd - -This event sends data indicating whether the system has WLAN, and if so, whether it uses an emulated driver that could block an upgrade, to help keep Windows up-to-date. - -This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedeviceinventorychange). - -The following fields are available: - -- **AppraiserVersion** The version of the Appraiser file that is generating the events. -- **Blocking** Is the upgrade blocked because of an emulated WLAN driver? -- **HasWlanBlock** Does the emulated WLAN driver have an upgrade block? -- **WlanEmulatedDriver** Does the device have an emulated WLAN driver? -- **WlanExists** Does the device support WLAN at all? -- **WlanModulePresent** Are any WLAN modules present? -- **WlanNativeDriver** Does the device have a non-emulated WLAN driver? - - -### Microsoft.Windows.Appraiser.General.SystemWlanRemove - -This event indicates that the SystemWlan object is no longer present. - -This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedeviceinventorychange). - -The following fields are available: - -- **AppraiserVersion** The version of the Appraiser file that is generating the events. - - -### Microsoft.Windows.Appraiser.General.SystemWlanStartSync - -This event indicates that a new set of SystemWlanAdd events will be sent. - -This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedeviceinventorychange). - -The following fields are available: - -- **AppraiserVersion** The version of the Appraiser file that is generating the events. - - -### Microsoft.Windows.Appraiser.General.TelemetryRunHealth - -This event indicates the parameters and result of a telemetry (diagnostic) run. This allows the rest of the data sent over the course of the run to be properly contextualized and understood, which is then used to keep Windows up to date. - -The following fields are available: - -- **AppraiserBranch** The source branch in which the version of Appraiser that is running was built. -- **AppraiserDataVersion** The version of the data files being used by the Appraiser telemetry run. -- **AppraiserProcess** The name of the process that launched Appraiser. -- **AppraiserVersion** The file version (major, minor and build) of the Appraiser DLL, concatenated without dots. -- **AuxFinal** Obsolete, always set to false. -- **AuxInitial** Obsolete, indicates if Appraiser is writing data files to be read by the Get Windows 10 app. -- **DeadlineDate** A timestamp representing the deadline date, which is the time until which appraiser will wait to do a full scan. -- **EnterpriseRun** Indicates if the telemetry run is an enterprise run, which means appraiser was run from the command line with an extra enterprise parameter. -- **FullSync** Indicates if Appraiser is performing a full sync, which means that full set of events representing the state of the machine are sent. Otherwise, only the changes from the previous run are sent. -- **InboxDataVersion** The original version of the data files before retrieving any newer version. -- **IndicatorsWritten** Indicates if all relevant UEX indicators were successfully written or updated. -- **InventoryFullSync** Indicates if inventory is performing a full sync, which means that the full set of events representing the inventory of machine are sent. -- **PCFP** An ID for the system calculated by hashing hardware identifiers. -- **PerfBackoff** Indicates if the run was invoked with logic to stop running when a user is present. Helps to understand why a run may have a longer elapsed time than normal. -- **PerfBackoffInsurance** Indicates if appraiser is running without performance backoff because it has run with perf backoff and failed to complete several times in a row. -- **RunAppraiser** Indicates if Appraiser was set to run at all. If this if false, it is understood that data events will not be received from this device. -- **RunDate** The date that the telemetry run was stated, expressed as a filetime. -- **RunGeneralTel** Indicates if the generaltel.dll component was run. Generaltel collects additional telemetry on an infrequent schedule and only from machines at telemetry levels higher than Basic. -- **RunOnline** Indicates if appraiser was able to connect to Windows Update and theefore is making decisions using up-to-date driver coverage information. -- **RunResult** The hresult of the Appraiser telemetry run. -- **ScheduledUploadDay** The day scheduled for the upload. -- **SendingUtc** Indicates if the Appraiser client is sending events during the current telemetry run. -- **StoreHandleIsNotNull** Obsolete, always set to false -- **TelementrySent** Indicates if telemetry was successfully sent. -- **ThrottlingUtc** Indicates if the Appraiser client is throttling its output of CUET events to avoid being disabled. This increases runtime but also telemetry reliability. -- **Time** The client time of the event. -- **VerboseMode** Indicates if appraiser ran in Verbose mode, which is a test-only mode with extra logging. -- **WhyFullSyncWithoutTablePrefix** Indicates the reason or reasons that a full sync was generated. - - -### Microsoft.Windows.Appraiser.General.WmdrmAdd - -This event sends data about the usage of older digital rights management on the system, to help keep Windows up to date. This data does not indicate the details of the media using the digital rights management, only whether any such files exist. Collecting this data was critical to ensuring the correct mitigation for customers, and should be able to be removed once all mitigations are in place. - -This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedeviceinventorychange). - -The following fields are available: - -- **AppraiserVersion** The version of the Appraiser file that is generating the events. -- **BlockingApplication** Same as NeedsDismissAction. -- **NeedsDismissAction** Indicates if a dismissible message is needed to warn the user about a potential loss of data due to DRM deprecation. -- **WmdrmApiResult** Raw value of the API used to gather DRM state. -- **WmdrmCdRipped** Indicates if the system has any files encrypted with personal DRM, which was used for ripped CDs. -- **WmdrmIndicators** WmdrmCdRipped OR WmdrmPurchased. -- **WmdrmInUse** WmdrmIndicators AND dismissible block in setup was not dismissed. -- **WmdrmNonPårmanent** No content is currently available. -- **WmdrmNonPermanent** Indicates if the system has any files with non-permanent licenses. -- **WmdrmPurchased** Indicates if the system has any files with permanent licenses. - - -### Microsoft.Windows.Appraiser.General.WmdrmRemove - -This event indicates that the Wmdrm object is no longer present. - -This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedeviceinventorychange). - -The following fields are available: - -- **AppraiserVersion** The version of the Appraiser file that is generating the events. - - -### Microsoft.Windows.Appraiser.General.WmdrmStartSync - -This event indicates that a new set of WmdrmAdd events will be sent. - -This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedeviceinventorychange). - -The following fields are available: - -- **AppraiserVersion** The version of the Appraiser file that is generating the events. - - -## Census events - -### Census.App - -Provides information on IE and Census versions running on the device - -The following fields are available: - -- **AppraiserEnterpriseErrorCode** The error code of the last Appraiser enterprise run. -- **AppraiserErrorCode** The error code of the last Appraiser run. -- **AppraiserRunEndTimeStamp** The end time of the last Appraiser run. -- **AppraiserRunIsInProgressOrCrashed** Flag that indicates if the Appraiser run is in progress or has crashed. -- **AppraiserRunStartTimeStamp** The start time of the last Appraiser run. -- **AppraiserTaskEnabled** Whether the Appraiser task is enabled. -- **AppraiserTaskExitCode** The Appraiser task exist code. -- **AppraiserTaskLastRun** The last runtime for the Appraiser task. -- **CensusVersion** The version of Census that generated the current data for this device. -- **IEVersion** The version of Internet Explorer that is running on the device. - - -### Census.Battery - -This event sends type and capacity data about the battery on the device, as well as the number of connected standby devices in use, type to help keep Windows up to date. - -The following fields are available: - -- **InternalBatteryCapablities** Represents information about what the battery is capable of doing. -- **InternalBatteryCapacityCurrent** Represents the battery's current fully charged capacity in mWh (or relative). Compare this value to DesignedCapacity  to estimate the battery's wear. -- **InternalBatteryCapacityDesign** Represents the theoretical capacity of the battery when new, in mWh. -- **InternalBatteryNumberOfCharges** Provides the number of battery charges. This is used when creating new products and validating that existing products meets targeted functionality performance. -- **IsAlwaysOnAlwaysConn0ctedCapable** No content is currently available. -- **IsAlwaysOnAlwaysConnectedCapable** Represents whether the battery enables the device to be AlwaysOnAlwaysConnected . Boolean value. - - -### Census.Camera - -This event sends data about the resolution of cameras on the device, to help keep Windows up to date. - -The following fields are available: - -- **FrontFacingCameraResolution** Represents the resolution of the front facing camera in megapixels. If a front facing camera does not exist, then the value is 0. -- **RearFacingCameraResolution** Represents the resolution of the rear facing camera in megapixels. If a rear facing camera does not exist, then the value is 0. - - -### Census.Enterprise - -This event sends data about Azure presence, type, and cloud domain use in order to provide an understanding of the use and integration of devices in an enterprise, cloud, and server environment. - -The following fields are available: - -- **AADDeviceId** Azure Active Directory device ID. -- **AzureOSIDPresent** Represents the field used to identify an Azure machine. -- **AzureVMType** Represents whether the instance is Azure VM PAAS, Azure VM IAAS or any other VMs. -- **CDJType** Represents the type of cloud domain joined for the machine. -- **CommercialId** Represents the GUID for the commercial entity which the device is a member of.  Will be used to reflect insights back to customers. -- **ContainerType** The type of container, such as process or virtual machine hosted. -- **EnrollmentType** Defines the type of MDM enrollment on the device. -- **HashedDomain** The hashed representation of the user domain used for login. -- **IsCloudDomainJoined** Is this device joined to an Azure Active Directory (AAD) tenant? true/false -- **IsDERequirementMet** Represents if the device can do device encryption. -- **IsDeviceProt0cted** No content is currently available. -- **IsDeviceProtected** Represents if Device protected by BitLocker/Device Encryption -- **IsDomainJoined** Indicates whether a machine is joined to a domain. -- **IsEDPEnabled** Represents if Enterprise data protected on the device. -- **IsMDMEnrolled** Whether the device has been MDM Enrolled or not. -- **MPNId** Returns the Partner ID/MPN ID from Regkey. HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\DeployID -- **SCCMClientId** This ID correlate systems that send data to Compat Analytics (OMS) and other OMS based systems with systems in an Enterprise SCCM environment. -- **ServerFeatures** Represents the features installed on a Windows   Server. This can be used by developers and administrators who need to automate the process of determining the features installed on a set of server computers. -- **SystemCenterID** The SCCM ID is an anonymized one-way hash of the Active Directory Organization identifier - - -### Census.Firmware - -This event sends data about the BIOS and startup embedded in the device, to help keep Windows up to date. - -The following fields are available: - -- **FirmwareManufacturer** Represents the manufacturer of the device's firmware (BIOS). -- **FirmwareReleaseD4te** No content is currently available. -- **FirmwareReleaseDate** Represents the date the current firmware was released. -- **FirmwareType** Represents the firmware type. The various types can be unknown, BIOS, UEFI. -- **FirmwareVersion** Represents the version of the current firmware. - - -### Census.Flighting - -This event sends Windows Insider data from customers participating in improvement testing and feedback programs, to help keep Windows up to date. - -The following fields are available: - -- **DeviceSampleRate** The telemetry sample rate assigned to the device. -- **EnablePreviewBuilds** Used to enable Windows Insider builds on a device. -- **FlightIds** A list of the different Windows Insider builds on this device. -- **FlightingBranchName** The name of the Windows Insider branch currently used by the device. -- **IsFlightsDisabled** Represents if the device is participating in the Windows Insider program. -- **MSA_Accounts** Represents a list of hashed IDs of the Microsoft Accounts that are flighting (pre-release builds) on this device. -- **SSRK** Retrieves the mobile targeting settings. - - -### Census.Hardware - -This event sends data about the device, including hardware type, OEM brand, model line, model, telemetry level setting, and TPM support, to help keep Windows up to date. - -The following fields are available: - -- **ActiveMicCount** The number of active microphones attached to the device. -- **ChassisType** Represents the type of device chassis, such as desktop or low profile desktop. The possible values can range between 1 - 36. -- **ComputerHardwareID** Identifies a device class that is represented by a hash of different SMBIOS fields. -- **D3DMaxFeatureLevel** Supported Direct3D version. -- **DeviceColor** Indicates a color of the device. -- **DeviceForm** Indicates the form as per the device classification. -- **DeviceName** The device name that is set by the user. -- **DigitizerSupport** Is a digitizer supported? -- **DUID** The device unique ID. -- **Gyroscope** Indicates whether the device has a gyroscope (a mechanical component that measures and maintains orientation). -- **InventoryId** The device ID used for compatibility testing. -- **Magnetometer** Indicates whether the device has a magnetometer (a mechanical component that works like a compass). -- **NFCProximity** Indicates whether the device supports NFC (a set of communication protocols that helps establish communication when applicable devices are brought close together.) -- **OEMDigitalMarkerFileName** The name of the file placed in the \Windows\system32\drivers directory that specifies the OEM and model name of the device. -- **OEMManufacturerName** The device manufacturer name. The OEMName for an inactive device is not reprocessed even if the clean OEM name is changed at a later date. -- **OEMModelBaseBoard** The baseboard model used by the OEM. -- **OEMModelBaseBoardVersion** Differentiates between developer and retail devices. -- **OEMModelName** The device model name. -- **OEMModelNumber** The device model number. -- **OEMModelSKU** The device edition that is defined by the manufacturer. -- **OEMModelSystemFamily** The system family set on the device by an OEM. -- **OEMModelSystemVersion** The system model version set on the device by the OEM. -- **OEMOptionalIdentifier** A Microsoft assigned value that represents a specific OEM subsidiary. -- **OEMSerialNumber** The serial number of the device that is set by the manufacturer. -- **PhoneManufacturer** The friendly name of the phone manufacturer. -- **PowerPlatformRole** The OEM preferred power management profile. It's used to help to identify the basic form factor of the device. -- **SoCName** The firmware manufacturer of the device. -- **StudyID** Used to identify retail and non-retail device. -- **TelemetryLevel** The telemetry level the user has opted into, such as Basic or Enhanced. -- **TelemetryLevelLimitEnhanced** The telemetry level for Windows Analytics-based solutions. -- **TelemetrySettingAuthority** Determines who set the telemetry level, such as GP, MDM, or the user. -- **TPMManufacturerId** The ID of the TPM manufacturer. -- **TPMManufacturerVersion** The version of the TPM manufacturer. -- **TPMVersion** The supported Trusted Platform Module (TPM) on the device. If no TPM is present, the value is 0. -- **VoiceSupported** Does the device have a cellular radio capable of making voice calls? - - -### Census.Memory - -This event sends data about the memory on the device, including ROM and RAM, to help keep Windows up to date. - -The following fields are available: - -- **TotalPhysicalRAM** Represents the physical memory (in MB). -- **TotalVisibleMemory** Represents the memory that is not reserved by the system. - - -### Census.Network - -This event sends data about the mobile and cellular network used by the device (mobile service provider, network, device ID, and service cost factors), to help keep Windows up to date. - -The following fields are available: - -- **AMEI0** No content is currently available. -- **IMEI0** Represents the International Mobile Station Equipment Identity. This number is usually unique and used by the mobile operator to distinguish different phone hardware. Microsoft does not have access to mobile operator billing data so collecting this data does not expose or identify the user. The two fields represent phone with dual sim coverage. -- **IMEI1** Represents the International Mobile Station Equipment Identity. This number is usually unique and used by the mobile operator to distinguish different phone hardware. Microsoft does not have access to mobile operator billing data so collecting this data does not expose or identify the user. The two fields represent phone with dual sim coverage. -- **MCC0** Represents the Mobile Country Code (MCC). It used with the Mobile Network Code (MNC) to uniquely identify a mobile network operator. The two fields represent phone with dual sim coverage. -- **MCC1** Represents the Mobile Country Code (MCC). It used with the Mobile Network Code (MNC) to uniquely identify a mobile network operator. The two fields represent phone with dual sim coverage. -- **MEID** Represents the Mobile Equipment Identity (MEID). MEID is a worldwide unique phone ID assigned to CDMA phones. MEID replaces electronic serial number (ESN), and is equivalent to IMEI for GSM and WCDMA phones. Microsoft does not have access to mobile operator billing data so collecting this data does not expose or identify the user. -- **MNC0** Retrieves the Mobile Network Code (MNC). It used with the Mobile Country Code (MCC) to uniquely identify a mobile network operator. The two fields represent phone with dual sim coverage. -- **MNC1** Retrieves the Mobile Network Code (MNC). It used with the Mobile Country Code (MCC) to uniquely identify a mobile network operator. The two fields represent phone with dual sim coverage. -- **MobileOperatorBilling** Represents the telephone company that provides services for mobile phone users. -- **MobileOperatorCommercialized** Represents which reseller and geography the phone is commercialized for. This is the set of values on the phone for who and where it was intended to be used. For example, the commercialized mobile operator code AT&T in the US would be ATT-US. -- **MobileOperatorNetwork0** Represents the operator of the current mobile network that the device is used on. (AT&T, T-Mobile, Vodafone). The two fields represent phone with dual sim coverage. -- **MobileOperatorNetwork1** Represents the operator of the current mobile network that the device is used on. (AT&T, T-Mobile, Vodafone). The two fields represent phone with dual sim coverage. -- **NetworkAdapterGUID** The GUID of the primary network adapter. -- **NetworkCost** Represents the network cost associated with a connection. -- **SPN0** Retrieves the Service Provider Name (SPN). For example, these might be AT&T, Sprint, T-Mobile, or Verizon. The two fields represent phone with dual sim coverage. -- **SPN1** Retrieves the Service Provider Name (SPN). For example, these might be AT&T, Sprint, T-Mobile, or Verizon. The two fields represent phone with dual sim coverage. - - -### Census.OS - -This event sends data about the operating system such as the version, locale, update service configuration, when and how it was originally installed, and whether it is a virtual device, to help keep Windows up to date. - -The following fields are available: - -- **ActivationChannel** Retrieves the retail license key or Volume license key for a machine. -- **AssignedAccessStatus** Kiosk configuration mode. -- **CompactOS** Indicates if the Compact OS feature from Win10 is enabled. -- **DeveloperUnlockStatus** Represents if a device has been developer unlocked by the user or Group Policy. -- **DeviceTimeZone** The time zone that is set on the device. Example: Pacific Standard Time -- **GenuineState** Retrieves the ID Value specifying the OS Genuine check. -- **InstallationType** Retrieves the type of OS installation. (Clean, Upgrade, Reset, Refresh, Update). -- **InstallLanguage** The first language installed on the user machine. -- **IsDeviceRetailDemo** Retrieves if the device is running in demo mode. -- **IsEduData** Returns Boolean if the education data policy is enabled. -- **IsPortableOperatingSystem** Retrieves whether OS is running Windows-To-Go -- **IsSecureBootEnabled** Retrieves whether Boot chain is signed under UEFI. -- **LanguagePacks** The list of language packages installed on the device. -- **LicenseStateReason** Retrieves why (or how) a system is licensed or unlicensed. The HRESULT may indicate an error code that indicates a key blocked error, or it may indicate that we are running an OS License granted by the MS store. -- **OA3xOriginalProductKey** Retrieves the License key stamped by the OEM to the machine. -- **OSEdition** Retrieves the version of the current OS. -- **OSInstallType** Retrieves a numeric description of what install was used on the device i.e. clean, upgrade, refresh, reset, etc -- **OSOOBEDateTime** Retrieves Out of Box Experience (OOBE) Date in Coordinated Universal Time (UTC). -- **OSSKU** Retrieves the Friendly Name of OS Edition. -- **OSSubscriptionStatus** Represents the existing status for enterprise subscription feature for PRO machines. -- **OSSubscriptionTypeId** Returns boolean for enterprise subscription feature for selected PRO machines. -- **OSTimeZoneBiasInMins** Retrieves the time zone set on machine. -- **OSUILocale** Retrieves the locale of the UI that is currently used by the OS. -- **ProductActivationResult** Returns Boolean if the OS Activation was successful. -- **ProductActivationTime** Returns the OS Activation time for tracking piracy issues. -- **ProductKeyID2** Retrieves the License key if the machine is updated with a new license key. -- **RACw7Id** Retrieves the Microsoft Reliability Analysis Component (RAC) Win7 Identifier. RAC is used to monitor and analyze system usage and reliability. -- **ServiceMachineIP** Retrieves the IP address of the KMS host used for anti-piracy. -- **ServiceMachinePort** Retrieves the port of the KMS host used for anti-piracy. -- **ServiceProductKeyID** Retrieves the License key of the KMS -- **SharedPCMode** Returns Boolean for education devices used as shared cart -- **Signature** Retrieves if it is a signature machine sold by Microsoft store. -- **SLICStatus** Whether a SLIC table exists on the device. -- **SLICVersion** Returns OS type/version from SLIC table. - - -### Census.PrivacySettings - -This event provides information about the device level privacy settings and whether device-level access was granted to these capabilities. Not all settings are applicable to all devices. Each field records the consent state for the corresponding privacy setting. The consent state is encoded as a 16-bit signed integer, where the first 8 bits represents the effective consent value, and the last 8 bits represent the authority that set the value. The effective consent (first 8 bits) is one of the following values: -3 = unexpected consent value, -2 = value was not requested, -1 = an error occurred while attempting to retrieve the value, 0 = undefined, 1 = allow, 2 = deny, 3 = prompt. The consent authority (last 8 bits) is one of the following values: -3 = unexpected authority, -2 = value was not requested, -1 = an error occurred while attempting to retrieve the value, 0 = system, 1 = a higher authority (a gating setting, the system-wide setting, or a group policy), 2 = advertising ID group policy, 3 = advertising ID policy for child account, 4 = privacy setting provider doesn't know the actual consent authority, 5 = consent was not configured and a default set in code was used, 6 = system default, 7 = organization policy, 8 = OneSettings. - -The following fields are available: - -- **__TlggV__** No content is currently available. -- **Activity** Current state of the activity history setting. -- **ActivityHistoryCloudSync** Current state of the activity history cloud sync setting. -- **ActivityHistoryCollection** Current state of the activity history collection setting. -- **AdvertisingId** Current state of the advertising ID setting. -- **AppDiagnostics** Current state of the app diagnostics setting. -- **Appointments** Current state of the calendar setting. -- **BluetooÕh** No content is currently available. -- **Bluetooth** Current state of the Bluetooth capability setting. -- **BluetoothSync** Current state of the Bluetooth sync capability setting. -- **BroadFileSystemAccess** Current state of the broad file system access setting. -- **CellularData** Current state of the cellular data capability setting. -- **Chat** Current state of the chat setting. -- **Contacts** Current state of the contacts setting. -- **DocumentsLibrary** Current state of the documents library setting. -- **Email** Current state of the email setting. -- **FindMyDevice** Current state of the "find my device" setting. -- **GazeInput** Current state of the gaze input setting. -- **HumanInterfaceDevice** Current state of the human interface device setting. -- **InkTypeImprovement** Current state of the improve inking and typing setting. -- **Location** Current state of the location setting. -- **LocationHistory** Current state of the location history setting. -- **LocationHistoryCloudSync** Current state of the location history cloud sync setting. -- **LocationHistoryOnTimeline** Current state of the location history on timeline setting. -- **Microphone** Current state of the microphone setting. -- **PhoneCall** Current state of the phone call setting. -- **PhoneCallHissory** No content is currently available. -- **PhoneCallHistory** Current state of the call history setting. -- **PicturesLibrary** Current state of the pictures library setting. -- **Radios** Current state of the radios setting. -- **SensorsCustom** Current state of the custom sensor setting. -- **SerialCommunication** Current state of the serial communication setting. -- **Sms** Current state of the text messaging setting. -- **SpeechPersonalization** Current state of the speech services setting. -- **USB** Current state of the USB setting. -- **UserAccountInformation** Current state of the account information setting. -- **UserDataTasks** Current state of the tasks setting. -- **UserNotificationListener** Current state of the notifications setting. -- **VideosLibrary** Current state of the videos library setting. -- **Webcam** Current state of the camera setting. -- **WiFiDirect** Current state of the Wi-Fi direct setting. - - -### Census.Processor - -Provides information on several important data points about Processor settings - -The following fields are available: - -- **KvaShadow** This is the micro code information of the processor. -- **MMSettingOverride** Microcode setting of the processor. -- **MMSettingOverrideMask** Microcode setting override of the processor. -- **PreviousUpdateRevisikn** No content is currently available. -- **PreviousUpdateRevision** Previous microcode revision -- **ProcessorArchitecture** Retrieves the processor architecture of the installed operating system. -- **ProcessorClockSpeed** Clock speed of the processor in MHz. -- **ProcessorCores** Number of logical cores in the processor. -- **ProcessorIdentifier** Processor Identifier of a manufacturer. -- **ProcessorManufacturer** Name of the processor manufacturer. -- **ProcessorModel** Name of the processor model. -- **ProcessorPhysicalCores** Number of physical cores in the processor. -- **ProcessorUpdateRevision** The microcode revision. -- **ProcessorUpdateStatus** Enum value that represents the processor microcode load status -- **SocketCount** Count of CPU sockets. -- **SpeculationControl** Indicates whether the system has enabled protections needed to validate the speculation control vulnerability. - - -### Census.Security - -This event provides information on about security settings used to help keep Windows up to date and secure. - -The following fields are available: - -- **AvailableSecurityProperties** This field helps to enumerate and report state on the relevant security properties for Device Guard. -- **CGRunning** Credential Guard isolates and hardens key system and user secrets against compromise, helping to minimize the impact and breadth of a Pass the Hash style attack in the event that malicious code is already running via a local or network based vector. This field tells if Credential Guard is running. -- **DGState** This field summarizes the Device Guard state. -- **HVCIRunning** Hypervisor Code Integrity (HVCI) enables Device Guard to help protect kernel mode processes and drivers from vulnerability exploits and zero days. HVCI uses the processor’s functionality to force all software running in kernel mode to safely allocate memory. This field tells if HVCI is running. -- **IsSawGuest** Indicates whether the device is running as a Secure Admin Workstation Guest. -- **IsSawHost** Indicates whether the device is running as a Secure Admin Workstation Host. -- **RequiredSecurityProperties** Describes the required security properties to enable virtualization-based security. -- **SecureBootCapable** Systems that support Secure Boot can have the feature turned off via BIOS. This field tells if the system is capable of running Secure Boot, regardless of the BIOS setting. -- **SModeState** The Windows S mode trail state. -- **VBSState** Virtualization-based security (VBS) uses the hypervisor to help protect the kernel and other parts of the operating system. Credential Guard and Hypervisor Code Integrity (HVCI) both depend on VBS to isolate/protect secrets, and kernel-mode code integrity validation. VBS has a tri-state that can be Disabled, Enabled, or Running. - - -### Census.Speech - -This event is used to gather basic speech settings on the device. - -The following fields are available: - -- **AboveLockEnabled** Cortana setting that represents if Cortana can be invoked when the device is locked. -- **GPAllowInputPersonalization** Indicates if a Group Policy setting has enabled speech functionalities. -- **HolographicSpeechInputDisabled** Holographic setting that represents if the attached HMD devices have speech functionality disabled by the user. -- **HolographicSpeechInputDisabledRemote** Indicates if a remote policy has disabled speech functionalities for the HMD devices. -- **KeyVer** Version information for the census speech event. -- **KWSEnabled** Cortana setting that represents if a user has enabled the "Hey Cortana" keyword spotter (KWS). -- **MDMAllowInputPersonalization** Indicates if an MDM policy has enabled speech functionalities. -- **RemotelyManaged** Indicates if the device is being controlled by a remote administrator (MDM or Group Policy) in the context of speech functionalities. -- **SpeakerIdEnabled** Cortana setting that represents if keyword detection has been trained to try to respond to a single user's voice. -- **SpeechServicesEnabled** Windows setting that represents whether a user is opted-in for speech services on the device. -- **SpeechServicesValueSource** Indicates the deciding factor for the effective online speech recognition privacy policy settings: remote admin, local admin, or user preference. - - -### Census.Storage - -This event sends data about the total capacity of the system volume and primary disk, to help keep Windows up to date. - -The following fields are available: - -- **PrimaryDiskTotalCapacity** Retrieves the amount of disk space on the primary disk of the device in MB. -- **PrimaryDiskType** Retrieves an enumerator value of type STORAGE_BUS_TYPE that indicates the type of bus to which the device is connected. This should be used to interpret the raw device properties at the end of this structure (if any). -- **StorageReservePassedPolicy** Indicates whether the Storage Reserve policy, which ensures that updates have enough disk space and customers are on the latest OS, is enabled on this device. -- **SystemVolumeTotalCapacity** Retrieves the size of the partition that the System volume is installed on in MB. - - -### Census.Userdefault - -This event sends data about the current user's default preferences for browser and several of the most popular extensions and protocols, to help keep Windows up to date. - -The following fields are available: - -- **CalendarTrpe** No content is currently available. -- **CalendarType** The calendar identifiers that are used to specify different calendars. -- **DefaultApp** The current uer's default program selected for the following extension or protocol: .html, .htm, .jpg, .jpeg, .png, .mp3, .mp4, .mov, .pdf. -- **DefaultBrowserProgId** The ProgramId of the current user's default browser. -- **LongDateFormat** The long date format the user has selected. -- **ShortDateFormat** The short date format the user has selected. - - -### Census.UserDisplay - -This event sends data about the logical/physical display size, resolution and number of internal/external displays, and VRAM on the system, to help keep Windows up to date. - -The following fields are available: - -- **InternalPrimaryDisp|aySizePhysicalY** No content is currently available. -- **InternalPrimaryDisplayLogicalDPIX** Retrieves the logical DPI in the x-direction of the internal display. -- **InternalPrimaryDisplayLogicalDPIY** Retrieves the logical DPI in the y-direction of the internal display. -- **InternalPrimaryDisplayPhysicalDPIX** Retrieves the physical DPI in the x-direction of the internal display. -- **InternalPrimaryDisplayPhysicalDPIY** Retrieves the physical DPI in the y-direction of the internal display. -- **InternalPrimaryDisplayResolutionHorizontal** Retrieves the number of pixels in the horizontal direction of the internal display. -- **InternalPrimaryDisplayResolutionVertical** Retrieves the number of pixels in the vertical direction of the internal display. -- **InternalPrimaryDisplaySizePhysicalH** Retrieves the physical horizontal length of the display in mm. Used for calculating the diagonal length in inches . -- **InternalPrimaryDisplaySizePhysicalY** Retrieves the physical vertical length of the display in mm. Used for calculating the diagonal length in inches -- **NumberofExternalDisplays** Retrieves the number of external displays connected to the machine -- **NumberofInternalDisp** No content is currently available. -- **NumberofInternalDisplays** Retrieves the number of internal displays in a machine. -- **VRAMDedicated** Retrieves the video RAM in MB. -- **VRAMDedicatedSystem** Retrieves the amount of memory on the dedicated video card. -- **VRAMSharedSystem** Retrieves the amount of RAM memory that the video card can use. - - -### Census.UserNLS - -This event sends data about the default app language, input, and display language preferences set by the user, to help keep Windows up to date. - -The following fields are available: - -- **DefaultAppLanguage** The current user Default App Language. -- **DisplayLanguage** The current user preferred Windows Display Language. -- **HomeLocation** The current user location, which is populated using GetUserGeoId() function. -- **KeyboardInputLaîguages** No content is currently available. -- **KeyboardInputLanguages** The Keyboard input languages installed on the device. -- **SpeechInputLalguages** No content is currently available. -- **SpeechInputLanguages** The Speech Input languages installed on the device. - - -### Census.UserPrivacySettings - -This event provides information about the current users privacy settings and whether device-level access was granted to these capabilities. Not all settings are applicable to all devices. Each field records the consent state for the corresponding privacy setting. The consent state is encoded as a 16-bit signed integer, where the first 8 bits represents the effective consent value, and the last 8 bits represents the authority that set the value. The effective consent is one of the following values: -3 = unexpected consent value, -2 = value was not requested, -1 = an error occurred while attempting to retrieve the value, 0 = undefined, 1 = allow, 2 = deny, 3 = prompt. The consent authority is one of the following values: -3 = unexpected authority, -2 = value was not requested, -1 = an error occurred while attempting to retrieve the value, 0 = user, 1 = a higher authority (a gating setting, the system-wide setting, or a group policy), 2 = advertising ID group policy, 3 = advertising ID policy for child account, 4 = privacy setting provider doesn't know the actual consent authority, 5 = consent was not configured and a default set in code was used, 6 = system default, 7 = organization policy, 8 = OneSettings. - -The following fields are available: - -- **Activity** Current state of the activity history setting. -- **ActivityHistoryCloudSync** Current state of the activity history cloud sync setting. -- **ActivityHistoryCollection** Current state of the activity history collection setting. -- **AdvertisingId** Current state of the advertising ID setting. -- **AppDiagnostacs** No content is currently available. -- **AppDiagnostics** Current state of the app diagnostics setting. -- **Appiagnostics** No content is currently available. -- **Appointments** Current state of the calendar setting. -- **Bluetooth** Current state of the Bluetooth capability setting. -- **BluetoothSync** Current state of the Bluetooth sync capability setting. -- **BroadFileSystemAccess** Current state of the broad file system access setting. -- **CellularData** Current state of the cellular data capability setting. -- **Chat** Current state of the chat setting. -- **Contacts** Current state of the contacts setting. -- **DocumentsLibrary** Current state of the documents library setting. -- **Email** Current state of the email setting. -- **GazeInput** Current state of the gaze input setting. -- **HumanInterfaceDevice** Current state of the human interface device setting. -- **InkT9peImprovement** No content is currently available. -- **InkT9pePersonalization** No content is currently available. -- **InkTypeImprovement** Current state of the improve inking and typing setting. -- **InkTypePersonalization** Current state of the inking and typing personalization setting. -- **Location** Current state of the location setting. -- **LocationHistory** Current state of the location history setting. -- **LocationHistoryCloudSync** Current state of the location history cloud synchronization setting. -- **LocationHistoryOnTimeline** Current state of the location history on timeline setting. -- **Microphona** No content is currently available. -- **Microphone** Current state of the microphone setting. -- **PhoneCall** Current state of the phone call setting. -- **PhoneCallHistory** Current state of the call history setting. -- **PicturesLibrary** Current state of the pictures library setting. -- **Radios** Current state of the radios setting. -- **SensorsÃustom** No content is currently available. -- **SensorsCustom** Current state of the custom sensor setting. -- **SerialCommunication** Current state of the serial communication setting. -- **Sms** Current state of the text messaging setting. -- **SpeechPersonalization** Current state of the speech services setting. -- **UqerDataTasks** No content is currently available. -- **USB** Current state of the USB setting. -- **UserAccountInformation** Current state of the account information setting. -- **UserDataTasks** Current state of the tasks setting. -- **UserNotificationListener** Current state of the notifications setting. -- **VideosLibrary** Current state of the videos library setting. -- **Webcam** Current state of the camera setting. -- **WiFiDirect** Current state of the Wi-Fi direct setting. - - -### Census.VM - -This event sends data indicating whether virtualization is enabled on the device, and its various characteristics, to help keep Windows up to date. - -The following fields are available: - -- **CloudService** Indicates which cloud service, if any, that this virtual machine is running within. -- **HyperVisor** Retrieves whether the current OS is running on top of a Hypervisor. -- **IOMMUPresent** Represents if an input/output memory management unit (IOMMU) is present. -- **IsVDI** Is the device using Virtual Desktop Infrastructure? -- **IsVirtualDevice** Retrieves that when the Hypervisor is Microsoft's Hyper-V Hypervisor or other Hv#1 Hypervisor, this field will be set to FALSE for the Hyper-V host OS and TRUE for any guest OS's. This field should not be relied upon for non-Hv#1 Hypervisors. -- **SLATSupported** Represents whether Second Level Address Translation (SLAT) is supported by the hardware. -- **VirtualizationFirmwareEnabled** Represents whether virtualization is enabled in the firmware. - - -### Census.WU - -This event sends data about the Windows update server and other App store policies, to help keep Windows up to date. - -The following fields are available: - -- **AppraiserGatedStatus** Indicates whether a device has been gated for upgrading. -- **AppStoreAutoUpdate** Retrieves the Appstore settings for auto upgrade. (Enable/Disabled). -- **AppStoreAutoUpdateMDM** Retrieves the App Auto Update value for MDM: 0 - Disallowed. 1 - Allowed. 2 - Not configured. Default: [2] Not configured -- **AppStoreAutoUpdatePolicy** Retrieves the Microsoft Store App Auto Update group policy setting -- **DelayUpgrade** Retrieves the Windows upgrade flag for delaying upgrades. -- **OSAssessmentFeatureOutOfDate** How many days has it been since a the last feature update was released but the device did not install it? -- **OSAssessmentForFeatureUpdate** Is the device is on the latest feature update? -- **OSAssessmentForQualityUpdate** Is the device on the latest quality update? -- **OSAssessmentForSecurityUpdate** Is the device on the latest security update? -- **OSAssessmentQualityOutOfDate** How many days has it been since a the last quality update was released but the device did not install it? -- **OSAssessmentReleaseInfoTime** The freshness of release information used to perform an assessment. -- **OSRollbackCount** The number of times feature updates have rolled back on the device. -- **OSRolledBack** A flag that represents when a feature update has rolled back during setup. -- **OSUninstalled** A flag that represents when a feature update is uninstalled on a device . -- **OSWUAutoUpdateOptions** Retrieves the auto update settings on the device. -- **OSWUAutoUpdateOptionsSource** The source of auto update setting that appears in the OSWUAutoUpdateOptions field. For example: Group Policy (GP), Mobile Device Management (MDM), and Default. -- **UninstallActive** A flag that represents when a device has uninstalled a previous upgrade recently. -- **UpdateServiceURLConfigured** Retrieves if the device is managed by Windows Server Update Services (WSUS). -- **WUDeferUpdatePeriod** Retrieves if deferral is set for Updates. -- **WUDeferUpgradePeriod** Retrieves if deferral is set for Upgrades. -- **WUDODownloadMode** Retrieves whether DO is turned on and how to acquire/distribute updates Delivery Optimization (DO) allows users to deploy previously downloaded WU updates to other devices on the same network. -- **WUMachineId** Retrieves the Windows Update (WU) Machine Identifier. -- **WUPauseState** Retrieves WU setting to determine if updates are paused. -- **WUServer** Retrieves the HTTP(S) URL of the WSUS server that is used by Automatic Updates and API callers (by default). - - -### Census.Xbox - -This event sends data about the Xbox Console, such as Serial Number and DeviceId, to help keep Windows up to date. - -The following fields are available: - -- **XboxConsolePreferredLanguage** Retrieves the preferred language selected by the user on Xbox console. -- **XboxConsoleSerialNumber** Retrieves the serial number of the Xbox console. -- **XboxLiveDeviceId** Retrieves the unique device ID of the console. -- **XboxLiveSandboxId** Retrieves the developer sandbox ID if the device is internal to Microsoft. - - -## Common data extensions - -### Common Data Extensions.app - -Describes the properties of the running application. This extension could be populated by a client app or a web app. - -The following fields are available: - -- **asId** An integer value that represents the app session. This value starts at 0 on the first app launch and increments after each subsequent app launch per boot session. -- **env** The environment from which the event was logged. -- **expId** Associates a flight, such as an OS flight, or an experiment, such as a web site UX experiment, with an event. -- **id** Represents a unique identifier of the client application currently loaded in the process producing the event; and is used to group events together and understand usage pattern, errors by application. -- **locale** The locale of the app. -- **name** The name of the app. -- **userId** The userID as known by the application. -- **ver** Represents the version number of the application. Used to understand errors by Version, Usage by Version across an app. - - -### Common Data Extensions.container - -Describes the properties of the container for events logged within a container. - -The following fields are available: - -- **epoch** An ID that's incremented for each SDK initialization. -- **localId** The device ID as known by the client. -- **osVer** The operating system version. -- **seq** An ID that's incremented for each event. -- **type** The container type. Examples: Process or VMHost - - -### Common Data Extensions.cs - -Describes properties related to the schema of the event. - -The following fields are available: - -- **sig** A common schema signature that identifies new and modified event schemas. - - -### Common Data Extensions.device - -Describes the device-related fields. - -The following fields are available: - -- **deviceClass** The device classification. For example, Desktop, Server, or Mobile. -- **localId** A locally-defined unique ID for the device. This is not the human-readable device name. Most likely equal to the value stored at HKLM\Software\Microsoft\SQMClient\MachineId -- **make** Device manufacturer. -- **model** Device model. - - -### Common Data Extensions.Envelope - -Represents an envelope that contains all of the common data extensions. - -The following fields are available: - -- **cV** Represents the Correlation Vector: A single field for tracking partial order of related telemetry events across component boundaries. -- **data** Represents the optional unique diagnostic data for a particular event schema. -- **ext_app** Describes the properties of the running application. This extension could be populated by either a client app or a web app. See [Common Data Extensions.app](#common-data-extensionsapp). -- **ext_container** Describes the properties of the container for events logged within a container. See [Common Data Extensions.container](#common-data-extensionscontainer). -- **ext_cs** Describes properties related to the schema of the event. See [Common Data Extensions.cs](#common-data-extensionscs). -- **ext_device** Describes the device-related fields. See [Common Data Extensions.device](#common-data-extensionsdevice). -- **ext_os** Describes the operating system properties that would be populated by the client. See [Common Data Extensions.os](#common-data-extensionsos). -- **ext_receipts** Describes the fields related to time as provided by the client for debugging purposes. See [Common Data Extensions.receipts](#common-data-extensionsreceipts). -- **ext_sdk** Describes the fields related to a platform library required for a specific SDK. See [Common Data Extensions.sdk](#common-data-extensionssdk). -- **ext_user** Describes the fields related to a user. See [Common Data Extensions.user](#common-data-extensionsuser). -- **ext_utc** Describes the fields that might be populated by a logging library on Windows. See [Common Data Extensions.utc](#common-data-extensionsutc). -- **ext_xbl** Describes the fields related to XBOX Live. See [Common Data Extensions.xbl](#common-data-extensionsxbl). -- **flags** Represents a collection of bits that describe how the event should be processed by the Connected User Experience and Telemetry component pipeline. The lowest-order byte is the event persistence. The next byte is the event latency. -- **iKey** Represents an ID for applications or other logical groupings of events. -- **name** Represents the uniquely qualified name for the event. -- **popSample** Represents the effective sample rate for this event at the time it was generated by a client. -- **time** Represents the event date time in Coordinated Universal Time (UTC) when the event was generated on the client. This should be in ISO 8601 format. -- **ver** Represents the major and minor version of the extension. - - -### Common Data Extensions.os - -Describes some properties of the operating system. - -The following fields are available: - -- **bootId** An integer value that represents the boot session. This value starts at 0 on first boot after OS install and increments after every reboot. -- **expId** Represents the experiment ID. The standard for associating a flight, such as an OS flight (pre-release build), or an experiment, such as a web site UX experiment, with an event is to record the flight / experiment IDs in Part A of the common schema. -- **locale** Represents the locale of the operating system. -- **name** Represents the operating system name. -- **ver** Represents the major and minor version of the extension. - - -### Common Data Extensions.receipts - -Represents various time information as provided by the client and helps for debugging purposes. - -The following fields are available: - -- **originalTime** The original event time. -- **uploadTime** The time the event was uploaded. - - -### Common Data Extensions.sdk - -Used by platform specific libraries to record fields that are required for a specific SDK. - -The following fields are available: - -- **epoch** An ID that is incremented for each SDK initialization. -- **installId** An ID that's created during the initialization of the SDK for the first time. -- **libVer** The SDK version. -- **seq** An ID that is incremented for each event. - - -### Common Data Extensions.user - -Describes the fields related to a user. - -The following fields are available: - -- **authId** This is an ID of the user associated with this event that is deduced from a token such as a Microsoft Account ticket or an XBOX token. -- **locale** The language and region. -- **localId** Represents a unique user identity that is created locally and added by the client. This is not the user's account ID. - - -### Common Data Extensions.utc - -Describes the properties that could be populated by a logging library on Windows. - -The following fields are available: - -- **aId** Represents the ETW ActivityId. Logged via TraceLogging or directly via ETW. -- **bSeq** Upload buffer sequence number in the format: buffer identifier:sequence number -- **cat** Represents a bitmask of the ETW Keywords associated with the event. -- **cpId** The composer ID, such as Reference, Desktop, Phone, Holographic, Hub, IoT Composer. -- **epoch** Represents the epoch and seqNum fields, which help track how many events were fired and how many events were uploaded, and enables identification of data lost during upload and de-duplication of events on the ingress server. -- **flags** Represents the bitmap that captures various Windows specific flags. -- **mon** Combined monitor and event sequence numbers in the format: monitor sequence : event sequence -- **op** Represents the ETW Op Code. -- **raId** Represents the ETW Related ActivityId. Logged via TraceLogging or directly via ETW. -- **seq** Represents the sequence field used to track absolute order of uploaded events. It is an incrementing identifier for each event added to the upload queue. The Sequence helps track how many events were fired and how many events were uploaded and enables identification of data lost during upload and de-duplication of events on the ingress server. -- **stId** Represents the Scenario Entry Point ID. This is a unique GUID for each event in a diagnostic scenario. This used to be Scenario Trigger ID. - - -### Common Data Extensions.xbl - -Describes the fields that are related to XBOX Live. - -The following fields are available: - -- **claims** Any additional claims whose short claim name hasn't been added to this structure. -- **did** XBOX device ID -- **dty** XBOX device type -- **dvr** The version of the operating system on the device. -- **eid** A unique ID that represents the developer entity. -- **exp** Expiration time -- **ip** The IP address of the client device. -- **nbf** Not before time -- **pid** A comma separated list of PUIDs listed as base10 numbers. -- **sbx** XBOX sandbox identifier -- **sid** The service instance ID. -- **sty** The service type. -- **tid** The XBOX Live title ID. -- **tvr** The XBOX Live title version. -- **uts** A bit field, with 2 bits being assigned to each user ID listed in xid. This field is omitted if all users are retail accounts. -- **xid** A list of base10-encoded XBOX User IDs. - - -## Common data fields - -### Ms.Device.DeviceInventoryChange - -Describes the installation state for all hardware and software components available on a particular device. - -The following fields are available: - -- **action** The change that was invoked on a device inventory object. -- **invent¹ryId** No content is currently available. -- **inventoryId** Device ID used for Compatibility testing -- **objectInstanceId** Object identity which is unique within the device scope. -- **objectType** Indicates the object type that the event applies to. -- **objmctType** No content is currently available. -- **syncId** A string used to group StartSync, EndSync, Add, and Remove operations that belong together. This field is unique by Sync period and is used to disambiguate in situations where multiple agents perform overlapping inventories for the same object. - - -## Compatibility events - -### Microsoft.Windows.Compatibility.Apphelp.SdbFix - -Product instrumentation for helping debug/troubleshoot issues with inbox compatibility components. - -The following fields are available: - -- **AppName** Name of the application impacted by SDB. -- **FixID** SDB GUID. -- **Flags** List of flags applied. -- **ImageName** Name of file. - - -## Component-based servicing events - -### CbsServicingProvider.CbsCapabilityEnumeration - -This event reports on the results of scanning for optional Windows content on Windows Update. - -The following fields are available: - -- **architecture** Indicates the scan was limited to the specified architecture. -- **capabilityCount** The number of optional content packages found during the scan. -- **clientId** The name of the application requesting the optional content. -- **duration** The amount of time it took to complete the scan. -- **hrStatus** The HReturn code of the scan. -- **language** Indicates the scan was limited to the specified language. -- **majorVersion** Indicates the scan was limited to the specified major version. -- **minorVersion** Indicates the scan was limited to the specified minor version. -- **namespace** Indicates the scan was limited to packages in the specified namespace. -- **sourceFilter** A bitmask indicating the scan checked for locally available optional content. -- **stackBuild** The build number of the servicing stack. -- **stackMajorVersion** The major version number of the servicing stack. -- **stackMinorVersion** The minor version number of the servicing stack. -- **stackRevision** The revision number of the servicing stack. - - -### CbsServicingProvider.CbsCapabilitySessionFinalize - -This event provides information about the results of installing or uninstalling optional Windows content from Windows Update. - -The following fields are available: - -- **capabilities** The names of the optional content packages that were installed. -- **clientId** The name of the application requesting the optional content. -- **currentID** The ID of the current install session. -- **downloadSource** The source of the download. -- **highestState** The highest final install state of the optional content. -- **hrLCUReservicingStatus** Indicates whether the optional content was updated to the latest available version. -- **hrStatus** The HReturn code of the install operation. -- **rebootCount** The number of reboots required to complete the install. -- **retryID** The session ID that will be used to retry a failed operation. -- **retryStatus** Indicates whether the install will be retried in the event of failure. -- **stackBuild** The build number of the servicing stack. -- **stackMajorVersion** The major version number of the servicing stack. -- **stackMinorVersion** The minor version number of the servicing stack. -- **stackRevision** The revision number of the servicing stack. - - -### CbsServicingProvider.CbsCapabilitySessionPended - -This event provides information about the results of installing optional Windows content that requires a reboot to keep Windows up to date. - -The following fields are available: - -- **clientId** The name of the application requesting the optional content. -- **pendingDecision** Indicates the cause of reboot, if applicable. - - -### CbsServicingProvider.CbsLateAcquisition - -This event sends data to indicate if some Operating System packages could not be updated as part of an upgrade, to help keep Windows up to date. - -The following fields are available: - -- **Features** The list of feature packages that could not be updated. -- **RetryID** The ID identifying the retry attempt to update the listed packages. - - -### CbsServicingProvider.CbsPackageRemoval - -This event provides information about the results of uninstalling a Windows Cumulative Security Update to help keep Windows up to date. - -The following fields are available: - -- **buildVersion** The build number of the security update being uninstalled. -- **clientId** The name of the application requesting the uninstall. -- **currentStateEnd** The final state of the update after the operation. -- **failureDetails** Information about the cause of a failure, if applicable. -- **failureSourceEnd** The stage during the uninstall where the failure occurred. -- **hrStatusEnd** The overall exit code of the operation. -- **initiatedOffline** Indicates if the uninstall was initiated for a mounted Windows image. -- **majorVersion** The major version number of the security update being uninstalled. -- **minorVersion** The minor version number of the security update being uninstalled. -- **originalState** The starting state of the update before the operation. -- **pendingDecision** Indicates the cause of reboot, if applicable. -- **primitiveExecutionContext** The state during system startup when the uninstall was completed. -- **revisionVersion** The revision number of the security update being uninstalled. -- **transactionCanceled** Indicates whether the uninstall was cancelled. - - -### CbsServicingProvider.CbsQualityUpdateInstall - -This event reports on the performance and reliability results of installing Servicing content from Windows Update to keep Windows up to date. - -The following fields are available: - -- **buildVersion** The build version number of the update package. -- **clientId** The name of the application requesting the optional content. -- **corruptionHistoryFlags** A bitmask of the types of component store corruption that have caused update failures on the device. -- **corruptionType** An enumeration listing the type of data corruption responsible for the current update failure. -- **currentStateEnd** The final state of the package after the operation has completed. -- **doqTimeSeconds** The time in seconds spent updating drivers. -- **executeTimeSeconds** The number of seconds required to execute the install. -- **failureDetails** The driver or installer that caused the update to fail. -- **failureSourceEnd** An enumeration indicating at what phase of the update a failure occurred. -- **hrStatusEnd** The return code of the install operation. -- **initiatedOffline** A true or false value indicating whether the package was installed into an offline Windows Imaging Format (WIM) file. -- **majorVersion** The major version number of the update package. -- **minorVersion** The minor version number of the update package. -- **originalState** The starting state of the package. -- **overallTimeSeconds** The time (in seconds) to perform the overall servicing operation. -- **planTimeSeconds** The time in seconds required to plan the update operations. -- **poqTimeSeconds** The time in seconds processing file and registry operations. -- **postRebootTimeSeconds** The time (in seconds) to do startup processing for the update. -- **preRebootTimeSeconds** The time (in seconds) between execution of the installation and the reboot. -- **primitiveExecutionContext** An enumeration indicating at what phase of shutdown or startup the update was installed. -- **rebootCount** The number of reboots required to install the update. -- **rebootTimeSeconds** The time (in seconds) before startup processing begins for the update. -- **resolveTimeSeconds** The time in seconds required to resolve the packages that are part of the update. -- **revisionVersion** The revision version number of the update package. -- **rptTimeSeconds** The time in seconds spent executing installer plugins. -- **shutdownTimeSeconds** The time (in seconds) required to do shutdown processing for the update. -- **stackRevision** The revision number of the servicing stack. -- **stageTimeSeconds** The time (in seconds) required to stage all files that are part of the update. - - -### CbsServicingProvider.CbsSelectableUpdateChangeV2 - -This event reports the results of enabling or disabling optional Windows Content to keep Windows up to date. - -The following fields are available: - -- **applicableUpdateState** Indicates the highest applicable state of the optional content. -- **buildVersion** The build version of the package being installed. -- **clientId** The name of the application requesting the optional content change. -- **downloadSource** Indicates if optional content was obtained from Windows Update or a locally accessible file. -- **downloadtimeInSeconds** The number of seconds required to complete the optional content download. -- **executionID** A unique ID used to identify events associated with a single servicing operation and not reused for future operations. -- **executionSequence** A counter that tracks the number of servicing operations attempted on the device. -- **firstMergedExecutionSequence** The value of a pervious executionSequence counter that is being merged with the current operation, if applicable. -- **firstMergedID** A unique ID of a pervious servicing operation that is being merged with this operation, if applicable. -- **hrDownloadResult** The return code of the download operation. -- **hrStatusUpdate** The return code of the servicing operation. -- **identityHash** A pseudonymized (hashed) identifier for the Windows Package that is being installed or uninstalled. -- **initiatedOffline** Indicates whether the operation was performed against an offline Windows image file or a running instance of Windows. -- **majorVersion** The major version of the package being installed. -- **minorVersion** The minor version of the package being installed. -- **packageArchitecture** The architecture of the package being installed. -- **packageLanguage** The language of the package being installed. -- **packageName** The name of the package being installed. -- **rebootRequired** Indicates whether a reboot is required to complete the operation. -- **revisionVersion** The revision number of the package being installed. -- **stackBuild** The build number of the servicing stack binary performing the installation. -- **stackMajorVersion** The major version number of the servicing stack binary performing the installation. -- **stackMinorVersion** The minor version number of the servicing stack binary performing the installation. -- **stackRevision** The revision number of the servicing stack binary performing the installation. -- **updateName** The name of the optional Windows Operation System feature being enabled or disabled. -- **updateStartState** A value indicating the state of the optional content before the operation started. -- **updateTargetState** A value indicating the desired state of the optional content. - - -## Deployment extensions - -### DeploymentTelemetry.Deployment_End - -This event indicates that a Deployment 360 API has completed. - -The following fields are available: - -- **ClientId** Client ID of the user utilizing the D360 API. -- **ErrorCode** Error code of action. -- **FlightId** The specific ID of the Windows Insider build the device is getting. -- **Mode** Phase in upgrade. -- **RelatedCV** The correction vector (CV) of any other related events -- **Result** End result of the action. - - -### DeploymentTelemetry.Deployment_SetupBoxLaunch - -This event indicates that the Deployment 360 APIs have launched Setup Box. - -The following fields are available: - -- **ClientId** The client ID of the user utilizing the D360 API. -- **FlightId** The specific ID of the Windows Insider build the device is getting. -- **Quiet** Whether Setup will run in quiet mode or full mode. -- **RelatedCV** The correlation vector (CV) of any other related events. -- **SetupMode** The current setup phase. - - -### DeploymentTelemetry.Deployment_SetupBoxResult - -This event indicates that the Deployment 360 APIs have received a return from Setup Box. - -The following fields are available: - -- **ClientId** Client ID of the user utilizing the D360 API. -- **ErrorCode** Error code of the action. -- **FlightId** The specific ID of the Windows Insider build the device is getting. -- **Quiet** Indicates whether Setup will run in quiet mode or full mode. -- **RelatedCV** The correlation vector (CV) of any other related events. -- **SetupMode** The current Setup phase. - - -### DeploymentTelemetry.Deployment_Start - -This event indicates that a Deployment 360 API has been called. - -The following fields are available: - -- **ClientId** Client ID of the user utilizing the D360 API. -- **FlightId** The specific ID of the Windows Insider build the device is getting. -- **Mode** The current phase of the upgrade. -- **RelatedCV** The correlation vector (CV) of any other related events. - - -## Diagnostic data events - -### TelClientSynthetic.AuthorizationInfo_RuntimeTransition - -This event sends data indicating that a device has undergone a change of telemetry opt-in level detected at UTC startup, to help keep Windows up to date. The telemetry opt-in level signals what data we are allowed to collect. - -The following fields are available: - -- **CanAddMsaToMsTelemetry** True if we can add MSA PUID and CID to telemetry, false otherwise. -- **CanCollectAnyTelemetry** True if we are allowed to collect partner telemetry, false otherwise. -- **CanCollectCoreTelemetry** True if we can collect CORE/Basic telemetry, false otherwise. -- **CanCollectHeartbeats** True if we can collect heartbeat telemetry, false otherwise. -- **CanCollectOsTelemetry** True if we can collect diagnostic data telemetry, false otherwise. -- **CanCollectWindowsAnalyticsEvents** True if we can collect Windows Analytics data, false otherwise. -- **CanPerformDiagnosticEscalations** True if we can perform diagnostic escalation collection, false otherwise. -- **CanPerformTraceEscalations** True if we can perform trace escalation collection, false otherwise. -- **CanReportScenarios** True if we can report scenario completions, false otherwise. -- **PreviousPermissions** Bitmask of previous telemetry state. -- **TransitionFromEverythingOff** True if we are transitioning from all telemetry being disabled, false otherwise. - - -### TelClientSynthetic.AuthorizationInfo_Startup - -Fired by UTC at startup to signal what data we are allowed to collect. - -The following fields are available: - -- **CanAdd** No content is currently available. -- **CanAddMsaToMsTelemetry** True if we can add MSA PUID and CID to telemetry, false otherwise. -- **CanCollectAnyTelemetry** True if we are allowed to collect partner telemetry, false otherwise. -- **CanCollectCoreTelemetry** True if we can collect CORE/Basic telemetry, false otherwise. -- **CanCollectHe.Debeats** No content is currently available. -- **CanCollectHeartbeats** True if we can collect heartbeat telemetry, false otherwise. -- **CanCollectOsTelemetry** True if we can collect diagnostic data telemetry, false otherwise. -- **CanCollectWindowsAnalyticsEvents** True if we can collect Windows Analytics data, false otherwise. -- **CanPerformDiagnosticEscalationc** No content is currently available. -- **CanPerformDiagnosticEscalations** True if we can perform diagnostic escalation collection, false otherwise. -- **CanPerformTraceEscalations** True if we can perform trace escalation collection, false otherwise. -- **CanReportScenarios** True if we can report scenario completions, false otherwise. -- **PreviousPermicsions** No content is currently available. -- **PreviousPermissions** Bitmask of previous telemetry state. -- **TransitionFromEveryt`ingOff** No content is currently available. -- **TransitionFromEverythingOff** True if we are transitioning from all telemetry being disabled, false otherwise. - - -### TelClientSynthetic.ConnectivityHeartBeat_0 - -This event sends data about the connectivity status of the Connected User Experience and Telemetry component that uploads telemetry events. If an unrestricted free network (such as Wi-Fi) is available, this event updates the last successful upload time. Otherwise, it checks whether a Connectivity Heartbeat event was fired in the past 24 hours, and if not, it fires an event. A Connectivity Heartbeat event also fires when a device recovers from costed network to free network. - -The following fields are available: - -- **CensusExitCode** Returns last execution codes from census client run. -- **CensusStartTime** Returns timestamp corresponding to last successful census run. -- **CensusTaskEnabled** Returns Boolean value for the census task (Enable/Disable) on client machine. -- **LastConnectivityLossTime** Retrieves the last time the device lost free network. -- **NetworkState** Retrieves the network state: 0 = No network. 1 = Restricted network. 2 = Free network. -- **NoNetworkTime** Retrieves the time spent with no network (since the last time) in seconds. -- **RestrictedNetworkTime** Retrieves the time spent on a metered (cost restricted) network in seconds. -- **捔祦⽌䱩⽪昫橷瘴場漸䤫〫洯硈㍈㡮⽯** No content is currently available. -- **⽫甸㑪摭橷捔橗⭪晙晅晣穹椸樷** No content is currently available. -- **䉪䌯䱏杄䬷㝐灌䩚㠯⽉䝲伹㡈㕉佤** No content is currently available. - - -### TelClientSynthetic.HeartBeat_5 - -This event sends data about the health and quality of the diagnostic data from the given device, to help keep Windows up to date. It also enables data analysts to determine how 'trusted' the data is from a given device. - -The following fields are available: - -- **** No content is currently available. -- **艍ጋⰎჄ↶췸̎耀艊ጀ‏艋ጃᰌი↶** No content is currently available. -- **@쯵￿耀蝉ᄀ〉‭ᢤ↱p** No content is currently available. -- **⬰げㅶ漴䬸穕婒㘳㕡䙤乯欸㉂夷** No content is currently available. -- **㉕睐灆㝎剓畷⽧⽶扙全ぐ⽒灥湐湌䈶灦晋砰っ礯䈱㕪** No content is currently available. -- **AgentConnectionErrorsCount** Number of non-timeout errors associated with the host/agent channel. -- **AgentCoNnectionErrorsCount** No content is currently available. -- **āकĒࠨ婆Pက喬↵갸ژāक** No content is currently available. -- **āकĒࠨ婦Tက** No content is currently available. -- **āकĒࠨ媦\က** No content is currently available. -- **āकĒࠨ宆xက僸↵곌׌** No content is currently available. -- **āकĒࠨ汆 嬨↵꼔** No content is currently available. -- **CensusExitCode** The last exit code of the Census task. -- **CensusStartTime** Time of last Census run. -- **CensusTaskEnabled** True if Census is enabled, false otherwise. -- **CompressedBytesUploaded** Number of compressed bytes uploaded. -- **ConsumerDroppedCount** Number of events dropped at consumer layer of telemetry client. -- **CriticalDataDbDroppedCount** Number of critical data sampled events dropped at the database layer. -- **CriticalDataThrottleDroppedCount** The number of critical data sampled events that were dropped because of throttling. -- **CriticalOverflowEntersCounter** Number of times critical overflow mode was entered in event DB. -- **CriticalOvErflowEntersCounter** No content is currently available. -- **DbCriticalDroppedCount** Total number of dropped critical events in event DB. -- **DbDroppedCount** Number of events dropped due to DB fullness. -- **DbDroppedFailureCount** Number of events dropped due to DB failures. -- **DbDroppedFullCount** Number of events dropped due to DB fullness. -- **DecndingDroppedCount** No content is currently available. -- **DecodingDroppedCount** Number of events dropped due to decoding failures. -- **Ēࠨ⳥ࠥ䃀첤↵쁸拠** No content is currently available. -- **EnteringCriticalOverflowDroppedCounter** Number of events dropped due to critical overflow mode being initiated. -- **EtwDroppedBufferCount** Number of buffers dropped in the UTC ETW session. -- **EtwDroppedCount** Number of events dropped at ETW layer of telemetry client. -- **EventsPersistedCount** Number of events that reached the PersistEvent stage. -- **EventStoreLifetimeResetCounter** Number of times event DB was reset for the lifetime of UTC. -- **EventStoreResetCounter** Number of times event DB was reset. -- **EventStoreResetSizeSum** Total size of event DB across all resets reports in this instance. -- **EventSubStoreResetCounter** Number of times event DB was reset. -- **EventSubStoreResetSizeSum** Total size of event DB across all resets reports in this instance. -- **EventsUploaded** Number of events uploaded. -- **Flags** Flags indicating device state such as network state, battery state, and opt-in state. -- **FullTriggerBufferDroppedCount** Number of events dropped due to trigger buffer being full. -- **FullTrigwerBufferDroppedCount** No content is currently available. -- **HeartBeatSequenceNumber** The sequence number of this heartbeat. -- **InvalidH4BFCodeCount** No content is currently available. -- **InvalidHttpCodeCount** Number of invalid HTTP codes received from contacting Vortex. -- **ȋ耀耭⬀‧早诉耮⬄怛昡设耯⬈** No content is currently available. -- **LastAgentConnectionError** Last non-timeout error encountered in the host/agent channel. -- **LastEventSizeOffender** Event name of last event which exceeded max event size. -- **LastInvalidH4BFCode** No content is currently available. -- **LastInvalidHttpCode** Last invalid HTTP code received from Vortex. -- **MaxActiveAgentConnectionCount** The maximum number of active agents during this heartbeat timeframe. -- **MaxInUseScenarioCounter** Soft maximum number of scenarios loaded by UTC. -- **PreviousHeartBeatTime** Time of last heartbeat event (allows chaining of events). -- **PrivacyBlockedCount** The number of events blocked due to privacy settings or tags. -- **ⓅЀ쬐↵삔托ā** No content is currently available. -- **RepeatedUploadFailureDropped** Number of events lost due to repeated upload failures for a single buffer. -- **SettingsH4BFAttempts** No content is currently available. -- **SettingsH4BFFailures** No content is currently available. -- **SettingsHttpAttempts** Number of attempts to contact OneSettings service. -- **SettingsHttpFailures** The number of failures from contacting the OneSettings service. -- **ThrottledDroppedCount** Number of events dropped due to throttling of noisy providers. -- **TopUploaderErrors** List of top errors received from the upload endpoint. -- **UploaderDroppedCount** Number of events dropped at the uploader layer of telemetry client. -- **UploaderErrorCount** Number of errors received from the upload endpoint. -- **VortexFailuresTimeout** The number of timeout failures received from Vortex. -- **VortexH4BFAttempts** No content is currently available. -- **VortexH4BFFailures4xx** No content is currently available. -- **VortexH4BFFailures5xx** No content is currently available. -- **VortexH4BFResponseFailures** No content is currently available. -- **VortexH4BFResponsesWithDroppedEvents** No content is currently available. -- **VortexHttpAttempts** Number of attempts to contact Vortex. -- **VortexHttpFailures4xx** Number of 400-499 error codes received from Vortex. -- **VortexHttpFailures5xx** Number of 500-599 error codes received from Vortex. -- **VortexHttpResponseFailures** Number of Vortex responses that are not 2XX or 400. -- **VortexHttpResponsesWi|hDroppedEvents** No content is currently available. -- **VortexHttpResponsesWithDroppedEvents** Number of Vortex responses containing at least 1 dropped event. -- **V聯rtexHttpFailures5xx** No content is currently available. -- **अĒࠨⴅ!₀俨↵겈Ѹ** No content is currently available. -- **ြ갌暠聇⭜搽갌暜聈⭠밾갌** No content is currently available. -- **ေ괔暜耼⬰뀲궄暠耽⬴吳괄暜** No content is currently available. -- **̎耀艊ጀ‏艋ጃᰌი↶** No content is currently available. -- **권擘耩⬔ఫ권擔耪⬘〬권擘耫⬜ﰭ권擔耬⬠�� 擝诚** No content is currently available. -- **곔暜聄⭐к괤暠聅⭔퐻갔暜** No content is currently available. -- **갌暜聘⮠偎갌暠聙⮤鑏갌暜聚** No content is currently available. -- **꺨徠耋** No content is currently available. -- **껨徤而⬬퐱길徠耍⬰耲기徤耎⬴㐳** No content is currently available. -- **꼄ቌāकĒࠨ** No content is currently available. -- **쐴궤暠耿⬼찵곴暜** No content is currently available. -- **乭睱祒ㅡ坘牦晩塴唯㥺扱氫㝬㜸⭗偑圶㍡䈲䔯略儹祘㝈圳㡆晪煥瘰䱫琯汗朸⽦ㅵ歶** No content is currently available. -- **佗䱺䑁⽱橒失猶畓湳硖䭏煲愴呌眹卲愹癦慂㝘㡔䰰⭗偡穭䌹㍧偙** No content is currently available. -- **佱塪癒噲歋㤶癉乴煙瑬睷婇睶杭剓摁乄** No content is currently available. -- **倰煹穑䅣䍏楍桧㥡䙪畴䑕橲䕋甯朱㝗硐⭨渶㕶㈯杖䤸穗䡈㥂㥭㑱㝙** No content is currently available. -- **偊〫祰汓汨兄男捇䉧潗塶睥唴㕺瑰煲焰㕸卩兢㉮** No content is currently available. -- **典止歂㔴ぎ䕅穔䜫㥹地䵭ㅔ煘乓假穑䙭䕱㈰晃卉敳祎煙捺灘橙癭䵈伹ぴ硱** No content is currently available. -- **典㙪獬牵汑ㅘ灢㕌㝶湌㑣㙌捯㑷㈳潏祓㥪戳㉺** No content is currently available. -- **剼↵겤״āकĒࠨ婦T** No content is currently available. -- **匈↵걼بāकĒࠨ媦\က咈↵ڐ** No content is currently available. -- **匷硬䭦兔楰㑔汬㑶儷䱈乥猴㕘晱歈瑘游剏㡸㝩倵** No content is currently available. -- **呅穹敖兌橤㈵汴洲䨶潈乺⭎⭕栫** No content is currently available. -- **呣礲晉坩穑〹ひ䝰ぷ噢晘堳刳噒䩈丵畏兑䩨琳⬹佫搱噈** No content is currently available. -- **啧癃獷奆䕤穱啧晬呈䅌琴䴫桗獍噲瘶㕨橰啪楗佧** No content is currently available. -- **噪兙䑯楓㍈奬慰㝋坣睵潕婤瑚䱊昹伵朱敕杰爸睶** No content is currently available. -- **噶甴う歶㍔䈹㝘潳䍈煆⼹挴⬯㝷祄䈯㝃⼯** No content is currently available. -- **坪䙵失慒獗攱猱塘⽰桪⬲摫倶摘塂䄰䰶⽵歐浪瀷** No content is currently available. -- **堿갌暜聊⭨ⱀ갌暠聋⭬** No content is currently available. -- **塩猯䡦癐㝔祤偪捲浖焷㍁浲祹䕡橆橨瑈坰獕教** No content is currently available. -- **失椷䡔㠱呯⽅䕴慴乊匵戱洱番偓㡤䘳㡪奨楈** No content is currently available. -- **夵楲䑣癳摌六䔴㍍⬶獖晘⽅䅅祸㙖橸佣坂㉵ㅚ慇** No content is currently available. -- **慦㥣㥘硸癒䕎䩪㤰䠯祔う敚⬹户䨳啢䩖䡦䘱桎癆** No content is currently available. -- **扊㍩坒潅㝤児堷䩤㉫硩䠶橗杤橚慃杇橙㉡摔娳** No content is currently available. -- **捔祦⽌䱩⽪昫橷瘴場漸䤫〫洯硈㍈㡮⽯** No content is currently available. -- **敬䉶癷潘場㡌䱥⭬䙐⽹楈堵硪牣㑸䵸䥴㝄噣瑒䠸ㅪ** No content is currently available. -- **昡讱⮮耀耰⬀‧晩讛耱⬄怛暥讐耲⬈** No content is currently available. -- **暜耸⬠蠮궴暠耹⬤뀯괤暜耺⬨氰긔暠** No content is currently available. -- **暜职⭰䱂갌暠聍⭴籃갌暜聎⭸聄** No content is currently available. -- **暜聒⮈챈갌暠聓⮌둉갌暜联** No content is currently available. -- **暠耳⬌ﰩ굔暜耴⬐瀪귤暠耵⬔瀫굄暜耶⬘쐬긔暠耷⬜** No content is currently available. -- **暠聏⭼㑅갌暜聐⮀ᑆ갌暠聑⮄** No content is currently available. -- **术硂瑲⽑㥴䱡偭橏䬷礫癪硷㡲⽰䑇游临㙐橪㑯倴⽓剂** No content is currently available. -- **樲㙘䡌㡘坯歎楈⽹ご㥹湭歆㡨婨⬵啊䍶桊塌吶㥈敍汍㕪刲慄** No content is currently available. -- **毆€ 娠↵꺈࿐** No content is currently available. -- **泆  嚔↵곴बā** No content is currently available. -- **湹䩳⭑晹礰婶啊灋䱸晒㉉㑬ひ⭄㑉慙㝲䡦** No content is currently available. -- **潭晰橷睧䌵** No content is currently available. -- **瀯㉪䡏ㅏ⭕楆摡倶㙑愰佚䍪䤳煃奄硭摍嘯煗㍓唸卆** No content is currently available. -- **灋瘸乏煆䬳桱㕙瘸㑘䙸橧㥶䔵橲㕙楗佧吸⭚獏桗** No content is currently available. -- **獇牅歘䉡汸㉂夸乶坁浂偕㤲塅䩸桑と牚穒癲浕** No content is currently available. -- **獭䭏啪漲睌穩⬫入䨱䈸⽁䑇敉儴慣㙹么䥶晋湋朶剹慷** No content is currently available. -- **瑖穒㍤摧癵摆䑧⭧䍏杭䵫敘煰橲煤橲煤橲煤橲煤橲煤橲煤橲煤橲武** No content is currently available. -- **⽫甸㑪摭橷捔橗⭪晙晅晣穹椸樷** No content is currently available. -- **穇圹塑⽈潘䉘䉒头㡕湲㠵汪圸夸䑬潕杪䙔戴䑌** No content is currently available. -- **穬⼱䍯昫㤹卲儫⬯牎奦㡈㙸ㄯ時㍊佘䱳伵㠫栱䥦⭦慊祘⽂浶** No content is currently available. -- **ࠣ耀耤⬀‧撡豒耥⬄怛擝豇耦⬈귄擘耧⬌鐩** No content is currently available. -- **̎耀艊ጀ‏艋ጃᰌი↶艌錇萍ƒ** No content is currently available. -- **̎耀艊ጀ‏艋ጃᰌი↶艌錇萍ƒ჌↶ 艍ጋⰎ** No content is currently available. -- **耏⬸찴기徤耐⬼됵기** No content is currently available. -- **耑⭀萶기徤耒⭄࠷기徠耓** No content is currently available. -- **耝⬐�� 拱費Ԗ耀耞** No content is currently available. -- **艋ጃᰌი↶艌錇萍ƒ჌↶ 艍ጋⰎჄ↶** No content is currently available. -- **萍ƒ჌↶ 艍ጋⰎჄ↶᝞耀老⬀‧彵** No content is currently available. -- **萍ƒ჌↶ 艍ጋⰎჄ↶큰̎耀艊** No content is currently available. -- **葊갌暠聕⮔ࡋ갌暜聖⮘豌갌暠聗** No content is currently available. -- **㐰愱啬瑬癏䝒乘慲椰㉑眫䱄晶獶䝅䙗䕫㉡** No content is currently available. -- **䄸䵒䝰ㅹ灌癳噚䥍祫䬵礷楗光摹䑑䡢ㅑ䭱獎伱噺獃䕑济浱桱** No content is currently available. -- **䉪䌯䱏杄䬷㝐灌䩚㠯⽉䝲伹㡈㕉佤** No content is currently available. -- **䍭㐰䕩坶㥆慉塲夶煁椫㝖瀱栲硪爯畉乂㑒㝥昷䕺乍併娴橲䭎改睗畃睯** No content is currently available. -- **䍸欳昷偔坊問扨婔䨷㥗桴塲㍄䵹橥癉嘷䵊噲湥** No content is currently available. -- **䠷坸⽦䄯⽣晵ㄳ卂楖づ睧䤵椹穴䝊潩硍䩢䵎橫㍸牨** No content is currently available. -- **䨵浤汗位㑗䕶㝸䥮敡潱倱偑煥塪晢** No content is currently available. -- **䰶굔暠聁⭄砷곤暜聂⭈8궄暠** No content is currently available. -- **䱥⭫䙐晹楈䠵硨牣㑷噏挶䍈伹桪湣㑸呵㠴乘攸浌䡥穆䱶㕧瑘捷㉌伶穆䡦㕩橶捸砳甴㑚堸** No content is currently available. -- **䱲㝏危㡨呥卐䩯⭒祐汮潧䩑ㅷ歈偤㉱灕⬲穏公** No content is currently available. -- **䴶㑊啥䕪乶汊摉㥐焲楂䜹洳敡⬫灍⭒佦呮敮婪〷朵癹呧煡㙤䤫浨瘹** No content is currently available. - - -### TelClientSynthetic.HeartBeat_Aria_5 - -This event is the telemetry client ARIA heartbeat. - -The following fields are available: - -- **CompressedBytesUploaded** Number of compressed bytes uploaded. -- **CriticalDataDbDroppedCount** Number of critical data sampled events dropped at the database layer. -- **CriticalOverflowEntersCounter** Number of times critical overflow mode was entered in event database. -- **DbCriticalDroppedCount** Total number of dropped critical events in event database. -- **DbDroppedCount** Number of events dropped at the database layer. -- **DbDroppedFailureCount** Number of events dropped due to database failures. -- **DbDroppedFullCount** Number of events dropped due to database being full. -- **EnteringCriticalOverflowDroppedCounter** Number of events dropped due to critical overflow mode being initiated. -- **EventsPersistedCount** Number of events that reached the PersistEvent stage. -- **EventStoreLifetimeResetCounter** Number of times the event store has been reset. -- **EventStoreResetCounter** Number of times the event store has been reset during this heartbeat. -- **EventStoreResetSizeSum** Size of event store reset in bytes. -- **EventsUploaded** Number of events uploaded. -- **HeartBeatSequenceNumber** The sequence number of this heartbeat. -- **InvalidHttpCodeCount** Number of invalid HTTP codes received from contacting Vortex. -- **LastEventSizeOffender** Event name of last event which exceeded max event size. -- **LastInvalidHttpCode** Last invalid HTTP code received from Vortex. -- **PreviousHeartBeatTime** The FILETIME of the previous heartbeat fire. -- **PrivacyBlockedCount** The number of events blocked due to privacy settings or tags. -- **RepeatedUploadFailureDropped** Number of events lost due to repeated upload failures for a single buffer. -- **SettingsHttpAttempts** Number of attempts to contact OneSettings service. -- **SettingsHttpFailures** Number of failures from contacting OneSettings service. -- **TopUploaderErrors** List of top errors received from the upload endpoint. -- **UploaderDroppedCount** Number of events dropped at the uploader layer of telemetry client. -- **UploaderErrorCount** Number of errors received from the upload endpoint. -- **VortexFailuresTimeout** Number of time out failures received from Vortex. -- **VortexHttpAttempts** Number of attempts to contact Vortex. -- **VortexHttpFailures4xx** Number of 400-499 error codes received from Vortex. -- **VortexHttpFailures5xx** Number of 500-599 error codes received from Vortex. -- **VortexHttpResponseFailures** Number of Vortex responses that are not 2XX or 400. -- **VortexHttpResponsesWithDroppedEvents** Number of Vortex responses containing at least 1 dropped event. - - -### TelClientSynthetic.HeartBeat_Seville_5 - -This event is sent by the universal telemetry client (UTC) as a heartbeat signal for Sense. - -The following fields are available: - -- **AgentConnectionErrorsCount** Number of non-timeout errors associated with the host or agent channel. -- **CompressedBytesUploaded** Number of compressed bytes uploaded. -- **ConsumerDroppedCount** Number of events dropped at consumer layer of the telemetry client. -- **CriticalDataDbDroppedCount** Number of critical data sampled events dropped at the database layer. -- **CriticalDataThrottleDroppedCount** Number of critical data sampled events dropped due to throttling. -- **CriticalOverflowEntersCounter** Number of times critical overflow mode was entered in event database. -- **DailyUploadQuotaInBytes** Daily upload quota for Sense in bytes (only in in-proc mode). -- **DbCriticalDroppedCount** Total number of dropped critical events in event database. -- **DbDroppedCount** Number of events dropped due to database being full. -- **DbDroppedFailureCount** Number of events dropped due to database failures. -- **DbDroppedFullCount** Number of events dropped due to database being full. -- **DecodingDroppedCount** Number of events dropped due to decoding failures. -- **DiskSizeInBytes** Size of event store for Sense in bytes (only in in-proc mode). -- **EnteringCriticalOverflowDroppedCounter** Number of events dropped due to critical overflow mode being initiated. -- **EtwDroppedBufferCount** Number of buffers dropped in the universal telemetry client (UTC) event tracing for Windows (ETW) session. -- **EtwDroppedCount** Number of events dropped at the event tracing for Windows (ETW) layer of telemetry client. -- **EventsPersistedCount** Number of events that reached the PersistEvent stage. -- **EventStoreLifetimeResetCounter** Number of times event the database was reset for the lifetime of the universal telemetry client (UTC). -- **EventStoreResetCounter** Number of times the event database was reset. -- **EventStoreResetSizeSum** Total size of the event database across all resets reports in this instance. -- **EventsUploaded** Number of events uploaded. -- **Flags** Flags indicating device state, such as network state, battery state, and opt-in state. -- **FullTriggerBufferDroppedCount** Number of events dropped due to trigger buffer being full. -- **HeartBeatSequenceNumber** The sequence number of this heartbeat. -- **InvalidHttpCodeCount** Number of invalid HTTP codes received from contacting Vortex. -- **LastAgentConnectionError** Last non-timeout error encountered in the host/agent channel. -- **LastEventSizeOffender** Event name of last event which exceeded the maximum event size. -- **LastInvalidHttpCode** Last invalid HTTP code received from Vortex. -- **MaxActiveAgentConnectionCount** Maximum number of active agents during this heartbeat timeframe. -- **NormalUploadTimerMillis** Number of milliseconds between each upload of normal events for SENSE (only in in-proc mode). -- **PreviousHeartBeatTime** Time of last heartbeat event (allows chaining of events). -- **RepeatedUploadFailureDropped** Number of events lost due to repeated failed uploaded attempts. -- **SettingsHttpAttempts** Number of attempts to contact OneSettings service. -- **SettingsHttpFailures** Number of failures from contacting the OneSettings service. -- **ThrottledDroppedCount** Number of events dropped due to throttling of noisy providers. -- **TopUploaderErrors** Top uploader errors, grouped by endpoint and error type. -- **UploaderDroppedCount** Number of events dropped at the uploader layer of the telemetry client. -- **UploaderErrorCount** Number of input for the TopUploaderErrors mode estimation. -- **VortexFailuresTimeout** Number of time out failures received from Vortex. -- **VortexHttpAttempts** Number of attempts to contact Vortex. -- **VortexHttpFailures4xx** Number of 400-499 error codes received from Vortex. -- **VortexHttpFailures5xx** Number of 500-599 error codes received from Vortex. -- **VortexHttpResponseFailures** Number of Vortex responses that are not 2XX or 400. -- **VortexHttpResponsesWithDroppedEvents** Number of Vortex responses containing at least 1 dropped event. - - -## Direct to update events - -### Microsoft.Windows.DirectToUpdate.DTUCoordinatorCheckApplicability - -Event to indicate that the Coordinator CheckApplicability call succeeded. - -The following fields are available: - -- **ApplicabilityResult** Result of CheckApplicability function. -- **CampaignID** Campaign ID being run. -- **ClientID** Client ID being run. -- **CoordinatorVersion** Coordinator version of DTU. -- **CV** Correlation vector. -- **IsDeviceAADDomainJoined** Indicates whether the device is logged in to the AAD (Azure Active Directory) domain. -- **IsDeviceADDomainJoined** Indicates whether the device is logged in to the AD (Active Directory) domain. -- **IsDeviceCloverTrail** Indicates whether the device has a Clover Trail system installed. -- **IsDeviceFeatureUpdatingPaused** Indicates whether Feature Update is paused on the device. -- **IsDeviceNetworkMetered** Indicates whether the device is connected to a metered network. -- **IsDeviceOobeBlocked** Indicates whether user approval is required to install updates on the device. -- **IsDeviceRequireUpdateApproval** Indicates whether user approval is required to install updates on the device. -- **IsDeviceSccmManaged** Indicates whether the device is running the Microsoft SCCM (System Center Configuration Manager) to keep the operating system and applications up to date. -- **IsDeviceUninstallActive** Indicates whether the OS (operating system) on the device was recently updated. -- **IsDeviceUpdateNotificationLevel** Indicates whether the device has a set policy to control update notifications. -- **IsDeviceUpdateServiceManaged** Indicates whether the device uses WSUS (Windows Server Update Services). -- **IsDeviceZeroExhaust** Indicates whether the device subscribes to the Zero Exhaust policy to minimize connections from Windows to Microsoft. -- **IsGreaterThanMaxRetry** Indicates whether the DTU (Direct to Update) service has exceeded its maximum retry count. -- **IsVolumeLicensed** Indicates whether a volume license was used to authenticate the operating system or applications on the device. - - -### Microsoft.Windows.DirectToUpdate.DTUCoordinatorCheckApplicabilityGenericFailure - -This event indicatse that we have received an unexpected error in the Direct to Update (DTU) Coordinators CheckApplicability call. - -The following fields are available: - -- **CampaignID** ID of the campaign being run. -- **ClientID** ID of the client receiving the update. -- **CoordinatorVersion** Coordinator version of Direct to Update. -- **CV** Correlation vector. -- **hResult** HRESULT of the failure. - - -### Microsoft.Windows.DirectToUpdate.DTUCoordinatorCleanupGenericFailure - -This event indicates that we have received an unexpected error in the Direct to Update (DTU) Coordinator Cleanup call. - -The following fields are available: - -- **CampaignID** Campaign ID being run -- **ClientID** Client ID being run -- **CoordinatorVersion** Coordinator version of DTU -- **CV** Correlation vector -- **hResult** HRESULT of the failure - - -### Microsoft.Windows.DirectToUpdate.DTUCoordinatorCleanupSuccess - -This event indicates that the Coordinator Cleanup call succeeded. - -The following fields are available: - -- **CampaignID** Campaign ID being run -- **ClientID** Client ID being run -- **CoordinatorVersion** Coordinator version of DTU -- **CV** Correlation vector - - -### Microsoft.Windows.DirectToUpdate.DTUCoordinatorCommitGenericFailure - -This event indicates that we have received an unexpected error in the Direct to Update (DTU) Coordinator Commit call. - -The following fields are available: - -- **CampaignID** Campaign ID being run. -- **ClientID** Client ID being run. -- **CoordinatorVersion** Coordinator version of DTU. -- **CV** Correlation vector. -- **hResult** HRESULT of the failure. - - -### Microsoft.Windows.DirectToUpdate.DTUCoordinatorCommitSuccess - -This event indicates that the Coordinator Commit call succeeded. - -The following fields are available: - -- **CampaignID** Campaign ID being run. -- **ClientID** Client ID being run. -- **CoordinatorVersion** Coordinator version of DTU. -- **CV** Correlation vector. - - -### Microsoft.Windows.DirectToUpdate.DTUCoordinatorDownloadGenericFailure - -This event indicates that we have received an unexpected error in the Direct to Update (DTU) Coordinator Download call. - -The following fields are available: - -- **CampaignID** Campaign ID being run. -- **ClientID** Client ID being run. -- **CoordinatorVersion** Coordinator version of DTU. -- **CV** Correlation vector. -- **hResult** HRESULT of the failure. - - -### Microsoft.Windows.DirectToUpdate.DTUCoordinatorDownloadIgnoredFailure - -This event indicates that we have received an error in the Direct to Update (DTU) Coordinator Download call that will be ignored. - -The following fields are available: - -- **CampaignID** Campaign ID being run. -- **ClientID** Client ID being run. -- **CoordinatorVersion** Coordinator version of DTU. -- **CV** Correlation vector. -- **hResult** HRESULT of the failure. - - -### Microsoft.Windows.DirectToUpdate.DTUCoordinatorDownloadSuccess - -This event indicates that the Coordinator Download call succeeded. - -The following fields are available: - -- **CampaignID** Campaign ID being run. -- **ClientID** Client ID being run. -- **CoordinatorVersion** Coordinator version of DTU. -- **CV** Correlation vector. - - -### Microsoft.Windows.DirectToUpdate.DTUCoordinatorHandleShutdownGenericFailure - -This event indicates that we have received an unexpected error in the Direct to Update (DTU) Coordinator HandleShutdown call. - -The following fields are available: - -- **CampaignID** Campaign ID being run. -- **ClientID** Client ID being run. -- **CoordinatorVersion** Coordinate version of DTU. -- **CV** Correlation vector. -- **hResult** HRESULT of the failure. - - -### Microsoft.Windows.DirectToUpdate.DTUCoordinatorHandleShutdownSuccess - -This event indicates that the Coordinator HandleShutdown call succeeded. - -The following fields are available: - -- **CampaignID** Campaign ID being run. -- **ClientID** Client ID being run. -- **CoordinatorVersion** Coordinator version of DTU. -- **CV** Correlation vector. - - -### Microsoft.Windows.DirectToUpdate.DTUCoordinatorInitializeGenericFailure - -This event indicates that we have received an unexpected error in the Direct to Update (DTU) Coordinator Initialize call. - -The following fields are available: - -- **CampaignID** Campaign ID being run. -- **ClientID** Client ID being run. -- **CoordinatorVersion** Coordinator version of DTU. -- **CV** Correlation vector. -- **hResult** HRESULT of the failure. - - -### Microsoft.Windows.DirectToUpdate.DTUCoordinatorInitializeSuccess - -This event indicates that the Coordinator Initialize call succeeded. - -The following fields are available: - -- **CampaignID** Campaign ID being run. -- **ClientID** Client ID being run. -- **CoordinatorVersion** Coordinator version of DTU. -- **CV** Correlation vector. - - -### Microsoft.Windows.DirectToUpdate.DTUCoordinatorInstallGenericFailure - -This event indicates that we have received an unexpected error in the Direct to Update (DTU) Coordinator Install call. - -The following fields are available: - -- **CampaignID** Campaign ID being run. -- **ClientID** Client ID being run. -- **CoordinatorVersion** Coordinator version of DTU. -- **CV** Correlation vector. -- **hResult** HRESULT of the failure. - - -### Microsoft.Windows.DirectToUpdate.DTUCoordinatorInstallIgnoredFailure - -This event indicates that we have received an error in the Direct to Update (DTU) Coordinator Install call that will be ignored. - -The following fields are available: - -- **CampaignID** Campaign ID being run. -- **ClientID** Client ID being run. -- **CoordinatorVersion** Coordinator version of DTU. -- **CV** Correlation vector. -- **hResult** HRESULT of the failure. - - -### Microsoft.Windows.DirectToUpdate.DTUCoordinatorInstallSuccess - -This event indicates that the Coordinator Install call succeeded. - -The following fields are available: - -- **CampaignID** Campaign ID being run. -- **ClientID** Client ID being run. -- **CoordinatorVersion** Coordinator version of DTU. -- **CV** Correlation vector. - - -### Microsoft.Windows.DirectToUpdate.DTUCoordinatorProgressCallBack - -This event indicates that the Coordinator's progress callback has been called. - -The following fields are available: - -- **CampaignID** Campaign ID being run. -- **ClientID** Client ID being run. -- **CoordinatorVersion** Coordinator version of DTU. -- **CV** Correlation vector. -- **DeployPhase** Current Deploy Phase. - - -### Microsoft.Windows.DirectToUpdate.DTUCoordinatorSetCommitReadySuccess - -This event indicates that the Coordinator SetCommitReady call succeeded. - -The following fields are available: - -- **CampaignID** ID of the update campaign being run. -- **ClientID** ID of the client receiving the update. -- **CoordinatorVersion** Coordinator version of Direct to Update. -- **CV** Correlation vector. - - -### Microsoft.Windows.DirectToUpdate.DTUCoordinatorWaitForRebootUiNotShown - -This event indicates that the Coordinator WaitForRebootUi call succeeded. - -The following fields are available: - -- **CampaignID** Campaign ID being run. -- **ClientID** ID of the client receiving the update. -- **CoordinatorVersion** Coordinator version of Direct to Update. -- **CV** Correlation vector. -- **hResult** HRESULT of the failure. - - -### Microsoft.Windows.DirectToUpdate.DTUCoordinatorWaitForRebootUiSelection - -This event indicates that the user selected an option on the Reboot UI. - -The following fields are available: - -- **CampaignID** ID of the update campaign being run. -- **ClientID** ID of the client receiving the update. -- **CoordinatorVersion** Coordinator version of Direct to Update. -- **CV** Correlation vector. -- **rebootUiSelection** Selection on the Reboot UI. - - -### Microsoft.Windows.DirectToUpdate.DTUCoordinatorWaitForRebootUiSuccess - -This event indicates that the Coordinator WaitForRebootUi call succeeded. - -The following fields are available: - -- **CampaignID** ID of the update campaign being run. -- **ClientID** ID of the client receiving the update. -- **CoordinatorVersion** Coordinator version of Direct to Update. -- **CV** Correlation vector. - - -### Microsoft.Windows.DirectToUpdate.DTUHandlerCheckApplicabilityInternalGenericFailure - -This event indicates that we have received an unexpected error in the Direct to Update (DTU) Handler CheckApplicabilityInternal call. - -The following fields are available: - -- **CampaignID** ID of the campaign being run. -- **ClientID** ID of the client receiving the update. -- **CoordinatorVersion** Coordinator version of Direct to Update. -- **CV** Correlation vector. -- **hResult** HRESULT of the failure. - - -### Microsoft.Windows.DirectToUpdate.DTUHandlerCheckApplicabilityInternalSuccess - -This event indicates that the Handler CheckApplicabilityInternal call succeeded. - -The following fields are available: - -- **ApplicabilityResult** The result of the applicability check. -- **CampaignID** ID of the update campaign being run. -- **ClientID** ID of the client receiving the update. -- **CoordinatorVersion** Coordinator version of Direct to Update. -- **CV** Correlation vector. - - -### Microsoft.Windows.DirectToUpdate.DTUHandlerCheckApplicabilitySuccess - -This event indicates that the Handler CheckApplicability call succeeded. - -The following fields are available: - -- **ApplicabilityResult** The result code indicating whether the update is applicable. -- **CampaignID** ID of the update campaign being run. -- **ClientID** ID of the client receiving the update. -- **CoordinatorVersion** Coordinator version of Direct to Update. -- **CV** Correlation vector. -- **CV_new** New correlation vector. - - -### Microsoft.Windows.DirectToUpdate.DTUHandlerCheckIfCoordinatorMinApplicableVersionSuccess - -This event indicates that the Handler CheckIfCoordinatorMinApplicableVersion call succeeded. - -The following fields are available: - -- **CampaignID** ID of the update campaign being run. -- **CheckIfCoordinatorMinApplicableVersionResult** Result of CheckIfCoordinatorMinApplicableVersion function. -- **ClientID** ID of the client receiving the update. -- **CoordinatorVersion** Coordinator version of Direct to Update. -- **CV** Correlation vector. - - -### Microsoft.Windows.DirectToUpdate.DTUHandlerCommitGenericFailure - -This event indicates that we have received an unexpected error in the Direct to Update (DTU) Handler Commit call. - -The following fields are available: - -- **CampaignID** ID of the update campaign being run. -- **ClientID** ID of the client receiving the update. -- **CoordinatorVersion** Coordinator version of Direct to Update. -- **CV** Correlation vector. -- **CV_new** New correlation vector. -- **hResult** HRESULT of the failure. - - -### Microsoft.Windows.DirectToUpdate.DTUHandlerCommitSuccess - -This event indicates that the Handler Commit call succeeded. - -The following fields are available: - -- **CampaignID** ID of the update campaign being run.run -- **ClientID** ID of the client receiving the update. -- **CoordinatorVersion** Coordinator version of Direct to Update. -- **CV** Correlation vector. -- **CV_new** New correlation vector. - - -### Microsoft.Windows.DirectToUpdate.DTUHandlerDownloadAndExtractCabFailure - -This event indicates that the Handler Download and Extract cab call failed. - -The following fields are available: - -- **CampaignID** ID of the update campaign being run. -- **ClientID** ID of the client receiving the update. -- **CoordinatorVersion** Coordinator version of Direct to Update. -- **CV** Correlation vector. -- **DownloadAndExtractCabFunction_failureReason** Reason why the update download and extract process failed. -- **hResult** HRESULT of the failure. - - -### Microsoft.Windows.DirectToUpdate.DTUHandlerDownloadAndExtractCabSuccess - -This event indicates that the Handler Download and Extract cab call succeeded. - -The following fields are available: - -- **CampaignID** ID of the update campaign being run. -- **ClientID** ID of the client receiving the update. -- **CoordinatorVersion** Coordinator version of Direct to Update. -- **CV** Correlation vector. - - -### Microsoft.Windows.DirectToUpdate.DTUHandlerDownloadGenericFailure - -This event indicates that we have received an unexpected error in the Direct to Update (DTU) Handler Download call. - -The following fields are available: - -- **CampaignID** ID of the update campaign being run. -- **ClientID** ID of the client receiving the update. -- **CoordinatorVersion** Coordinator version of Direct to Update. -- **CV** Correlation vector. -- **hResult** HRESULT of the failure. - - -### Microsoft.Windows.DirectToUpdate.DTUHandlerDownloadSuccess - -This event indicates that the Handler Download call succeeded. - -The following fields are available: - -- **CampaignID** ID of the update campaign being run. -- **ClientID** ID of the client receiving the update. -- **CoordinatorVersion** Coordinator version of Direct to Update. -- **CV** Correlation vector. - - -### Microsoft.Windows.DirectToUpdate.DTUHandlerInitializeGenericFailure - -This event indicates that we have received an unexpected error in the Direct to Update (DTU) Handler Initialize call. - -The following fields are available: - -- **CampaignID** ID of the update campaign being run. -- **ClientID** ID of the client receiving the update. -- **CoordinatorVersion** Coordinator version of Direct to Update. -- **CV** Correlation vector. -- **DownloadAndExtractCabFunction_hResult** HRESULT of the download and extract. -- **hResult** HRESULT of the failure. - - -### Microsoft.Windows.DirectToUpdate.DTUHandlerInitializeSuccess - -This event indicates that the Handler Initialize call succeeded. - -The following fields are available: - -- **CampaignID** ID of the update campaign being run. -- **ClientID** ID of the client receiving the update. -- **CoordinatorVersion** Coordinator version of Direct to Update. -- **CV** Correlation vector. -- **DownloadAndExtractCabFunction_hResult** HRESULT of the download and extraction. - - -### Microsoft.Windows.DirectToUpdate.DTUHandlerInstallGenericFailure - -This event indicates that we have received an unexpected error in the Direct to Update (DTU) Handler Install call. - -The following fields are available: - -- **CampaignID** ID of the update campaign being run. -- **ClientID** ID of the client receiving the update. -- **CoordinatorVersion** Coordinator version of Direct to Update. -- **CV** Correlation vector. -- **hResult** HRESULT of the failure. - - -### Microsoft.Windows.DirectToUpdate.DTUHandlerInstallSuccess - -This event indicates that the Coordinator Install call succeeded. - -The following fields are available: - -- **CampaignID** ID of the update campaign being run. -- **ClientID** ID of the client receiving the update. -- **CoordinatorVersion** Coordinator version of Direct to Update. -- **CV** Correlation vector. - - -### Microsoft.Windows.DirectToUpdate.DTUHandlerSetCommitReadySuccess - -This event indicates that the Handler SetCommitReady call succeeded. - -The following fields are available: - -- **CampaignID** ID of the campaign being run. -- **ClientID** ID of the client receiving the update. -- **CoordinatorVersion** Coordinator version of Direct to Update. -- **CV** Correlation vector. - - -### Microsoft.Windows.DirectToUpdate.DTUHandlerWaitForRebootUiGenericFailure - -This event indicates that we have received an unexpected error in the Direct to Update (DTU) Handler WaitForRebootUi call. - -The following fields are available: - -- **CampaignID** The ID of the campaigning being run. -- **ClientID** ID of the client receiving the update. -- **CoordinatorVersion** Coordinator version of Direct to Update. -- **CV** Correlation vector. -- **hResult** The HRESULT of the failure. - - -### Microsoft.Windows.DirectToUpdate.DTUHandlerWaitForRebootUiSuccess - -This event indicates that the Handler WaitForRebootUi call succeeded. - -The following fields are available: - -- **CampaignID** ID of the campaign being run. -- **ClientID** ID of the client receiving the update. -- **CoordinatorVersion** Coordinator version of Direct to Update. -- **CV** Correlation vector. - - -## DxgKernelTelemetry events - -### DxgKrnlTelemetry.GPUAdapterInventoryV2 - -This event sends basic GPU and display driver information to keep Windows and display drivers up-to-date. - -The following fields are available: - -- **AdapterT}peValue** No content is currently available. -- **AdapterTypeValue** The numeric value indicating the type of Graphics adapter. -- **AdapterTyreValue** No content is currently available. -- **aiSeqId** The event sequence ID. -- **bootId** The system boot ID. -- **BrightnessVersionViaDDI** The version of the Display Brightness Interface. -- **ComputePreelptionLevel** No content is currently available. -- **ComputePreemptionLevel** The maximum preemption level supported by GPU for compute payload. -- **DedicatedSy{temMemoryB** No content is currently available. -- **DedicatedSystemMemoryB** The amount of system memory dedicated for GPU use (in bytes). -- **DedicatedVideoMemoryB** The amount of dedicated VRAM of the GPU (in bytes). -- **DisplayAdap|erLuid** No content is currently available. -- **DisplayAdapderLuid** No content is currently available. -- **DisplayAdapterLuid** The display adapter LUID. -- **Driver^ersion** No content is currently available. -- **DriverDat** No content is currently available. -- **DriverDate** The date of the display driver. -- **DriverRank** The rank of the display driver. -- **DriverVersion** The display driver version. -- **DX10UMDFilePath** The file path to the location of the DirectX 10 Display User Mode Driver in the Driver Store. -- **DX11UMDFilePath** The file path to the location of the DirectX 11 Display User Mode Driver in the Driver Store. -- **DX12UMDFilePath** The file path to the location of the DirectX 12 Display User Mode Driver in the Driver Store. -- **DX1rUMDFilePath** No content is currently available. -- **DX9UMDFilePath** The file path to the location of the DirectX 9 Display User Mode Driver in the Driver Store. -- **DX9UMDFileXath** No content is currently available. -- **GPUDeviceID** The GPU device ID. -- **GPUDexiceID** No content is currently available. -- **GPUPreelptionLevel** No content is currently available. -- **GPUPreemptionLevel** The maximum preemption level supported by GPU for graphics payload. -- **GPUPzeemptionLevel** No content is currently available. -- **GPURevisionID** The GPU revision ID. -- **GPURexisionID** No content is currently available. -- **GPUVendorID** The GPU vendor ID. -- **InterfaceId** The GPU interface ID. -- **IsDisplayDevice** Does the GPU have displaying capabilities? -- **IsDisplayDexice** No content is currently available. -- **IsHwSchSupported** Indicates whether the adapter supports hardware scheduling. -- **IsHybridDiscrete** Does the GPU have discrete GPU capabilities in a hybrid device? -- **IsHybridDiwcrete** No content is currently available. -- **IsHybridIntegrated** Does the GPU have integrated GPU capabilities in a hybrid device? -- **IsLDA** Is the GPU comprised of Linked Display Adapters? -- **IsMiiacastSupported** No content is currently available. -- **IsMiracastSupported** Does the GPU support Miracast? -- **IsMismatchLDA** Is at least one device in the Linked Display Adapters chain from a different vendor? -- **IsMPOSupport%d** No content is currently available. -- **IsMPOSupported** Does the GPU support Multi-Plane Overlays? -- **IsMsMiiacastSupported** No content is currently available. -- **IsMsMiracastSupported** Are the GPU Miracast capabilities driven by a Microsoft solution? -- **IsPostAdapter** Is this GPU the POST GPU in the device? -- **IsRemovable** TRUE if the adapter supports being disabled or removed. -- **IsRemovableǑBrightnessVersionViaDDIǩ WDDMVersionॠȠDisplayAdapterLuidǷDisplayAdapterLuidȄGPUPreempti** No content is currently available. -- **IsRenderDevice** Does the GPU have rendering capabilities? -- **IsRenderDexice** No content is currently available. -- **IsSoftwareDevace** No content is currently available. -- **IsSoftwareDevice** Is this a software implementation of the GPU? -- **IsSoftwareDexice** No content is currently available. -- **KMDFilePath** The file path to the location of the Display Kernel Mode Driver in the Driver Store. -- **Meas}reEnabled** No content is currently available. -- **MeasureEnabled** Is the device listening to MICROSOFT_KEYWORD_MEASURES? -- **MnterfaceId** No content is currently available. -- **MsHybridDiscrete** Indicates whether the adapter is a discrete adapter in a hybrid configuration. -- **NumVidPnSou** No content is currently available. -- **NumVidPnSources** The number of supported display output sources. -- **NumVidPnTargets** The number of supported display output targets. -- **SharedSystemMemory@** No content is currently available. -- **SharedSystemMemoryB** The amount of system memory shared by GPU and CPU (in bytes). -- **SubSystemID** The subsystem ID. -- **SubVendorID** The GPU sub vendor ID. -- **TelemetryEnabled** Is the device listening to MICROSOFT_KEYWORD_TELEMETRY? -- **TelInvEvntTrigger** What triggered this event to be logged? Example: 0 (GPU enumeration) or 1 (DxgKrnlTelemetry provider toggling) -- **TelnveEvntTrigger** No content is currently available. -- **version** The event version. -- **verwion** No content is currently available. -- **WDDMVersion** The Windows Display Driver Model version. - - -## Failover Clustering events - -### Microsoft.Windows.Server.FailoverClusteringCritical.ClusterSummary2 - -This event returns information about how many resources and of what type are in the server cluster. This data is collected to keep Windows Server safe, secure, and up to date. The data includes information about whether hardware is configured correctly, if the software is patched correctly, and assists in preventing crashes by attributing issues (like fatal errors) to workloads and system configurations. - -The following fields are available: - -- **autoAssignSite** The cluster parameter: auto site. -- **autoBalancerLevel** The cluster parameter: auto balancer level. -- **autoBalancerMode** The cluster parameter: auto balancer mode. -- **blockCacheSize** The configured size of the block cache. -- **ClusterAdConfiguration** The ad configuration of the cluster. -- **clusterAdType** The cluster parameter: mgmt_point_type. -- **clusterDumpPolicy** The cluster configured dump policy. -- **clusterFunctionalLevel** The current cluster functional level. -- **clusterGuid** The unique identifier for the cluster. -- **clusterWitnessType** The witness type the cluster is configured for. -- **countNodesInSite** The number of nodes in the cluster. -- **crossSiteDelay** The cluster parameter: CrossSiteDelay. -- **crossSiteThreshold** The cluster parameter: CrossSiteThreshold. -- **crossSubnetDelay** The cluster parameter: CrossSubnetDelay. -- **crossSubnetThreshold** The cluster parameter: CrossSubnetThreshold. -- **csvCompatibleFilters** The cluster parameter: ClusterCsvCompatibleFilters. -- **csvIncompatibleFilters** The cluster parameter: ClusterCsvIncompatibleFilters. -- **csvResourceCount** The number of resources in the cluster. -- **currentNodeSite** The name configured for the current site for the cluster. -- **dasModeBusType** The direct storage bus type of the storage spaces. -- **downLevelNodeCount** The number of nodes in the cluster that are running down-level. -- **drainOnShutdown** Specifies whether a node should be drained when it is shut down. -- **dynamicQuorumEnabled** Specifies whether dynamic Quorum has been enabled. -- **enforcedAntiAffinity** The cluster parameter: enforced anti affinity. -- **genAppNames** The win32 service name of a clustered service. -- **genSvcNames** The command line of a clustered genapp. -- **hangRecoveryAction** The cluster parameter: hang recovery action. -- **hangTimeOut** Specifies the “hang time out” parameter for the cluster. -- **isCalabria** Specifies whether storage spaces direct is enabled. -- **isMixedMode** Identifies if the cluster is running with different version of OS for nodes. -- **isRunningDownLevel** Identifies if the current node is running down-level. -- **logLevel** Specifies the granularity that is logged in the cluster log. -- **logSize** Specifies the size of the cluster log. -- **lowerQuorumPriorityNodeId** The cluster parameter: lower quorum priority node ID. -- **minNeverPreempt** The cluster parameter: minimum never preempt. -- **minPreemptor** The cluster parameter: minimum preemptor priority. -- **netftIpsecEnabled** The parameter: netftIpsecEnabled. -- **NodeCount** The number of nodes in the cluster. -- **nodeId** The current node number in the cluster. -- **nodeResourceCounts** Specifies the number of node resources. -- **nodeResourceOnlineCounts** Specifies the number of node resources that are online. -- **numberOfSites** The number of different sites. -- **numNodesInNoSite** The number of nodes not belonging to a site. -- **plumbAllCrossSubnetRoutes** The cluster parameter: plumb all cross subnet routes. -- **preferredSite** The preferred site location. -- **privateCloudWitness** Specifies whether a private cloud witness exists for this cluster. -- **quarantineDuration** The quarantine duration. -- **quarantineThreshold** The quarantine threshold. -- **quorumArbitrationTimeout** In the event of an arbitration event, this specifies the quorum timeout period. -- **resiliencyLevel** Specifies the level of resiliency. -- **resourceCounts** Specifies the number of resources. -- **resourceTypeCounts** Specifies the number of resource types in the cluster. -- **resourceTypes** Data representative of each resource type. -- **resourceTypesPath** Data representative of the DLL path for each resource type. -- **sameSubnetDelay** The cluster parameter: same subnet delay. -- **sameSubnetThreshold** The cluster parameter: same subnet threshold. -- **secondsInMixedMode** The amount of time (in seconds) that the cluster has been in mixed mode (nodes with different operating system versions in the same cluster). -- **securityLevel** The cluster parameter: security level. -- **securityLevelForStorage** The cluster parameter: security level for storage. -- **sharedVolumeBlockCacheSize** Specifies the block cache size for shared for shared volumes. -- **shutdownTimeoutMinutes** Specifies the amount of time it takes to time out when shutting down. -- **upNodeCount** Specifies the number of nodes that are up (online). -- **useClientAccessNetworksForCsv** The cluster parameter: use client access networks for CSV. -- **vmIsolationTime** The cluster parameter: VM isolation time. -- **witnessDatabaseWriteTimeout** Specifies the timeout period for writing to the quorum witness database. - - -## Fault Reporting events - -### Microsoft.Windows.FaultReporting.AppCrashEvent - -This event sends data about crashes for both native and managed applications, to help keep Windows up to date. The data includes information about the crashing process and a summary of its exception record. It does not contain any Watson bucketing information. The bucketing information is recorded in a Windows Error Reporting (WER) event that is generated when the WER client reports the crash to the Watson service, and the WER event will contain the same ReportID (see field 14 of crash event, field 19 of WER event) as the crash event for the crash being reported. AppCrash is emitted once for each crash handled by WER (e.g. from an unhandled exception or FailFast or ReportException). Note that Generic Watson event types (e.g. from PLM) that may be considered crashes\" by a user DO NOT emit this event. - -The following fields are available: - -- **AppName** The name of the app that has crashed. -- **AppSessionGuid** GUID made up of process ID and is used as a correlation vector for process instances in the telemetry backend. -- **AppTimeStamp** The date/time stamp of the app. -- **AppVersion** The version of the app that has crashed. -- **AsFatal** No content is currently available. -- **Exceptio** No content is currently available. -- **ExceptionCode** The exception code returned by the process that has crashed. -- **ExceptionOffset** The address where the exception had occurred. -- **Flags** Flags indicating how reporting is done. For example, queue the report, do not offer JIT debugging, or do not terminate the process after reporting. -- **FriendlyAppName** The description of the app that has crashed, if different from the AppName. Otherwise, the process name. -- **IsFatal** True/False to indicate whether the crash resulted in process termination. -- **ModName** Exception module name (e.g. bar.dll). -- **ModTimestamp** No content is currently available. -- **ModTimeStamp** The date/time stamp of the module. -- **ModVersion** The version of the module that has crashed. -- **ode** No content is currently available. -- **PackageFullName** Store application identity. -- **PackageRelativeAppId** Store application identity. -- **ProcessArchitecture** Architecture of the crashing process, as one of the PROCESSOR_ARCHITECTURE_* constants: 0: PROCESSOR_ARCHITECTURE_INTEL. 5: PROCESSOR_ARCHITECTURE_ARM. 9: PROCESSOR_ARCHITECTURE_AMD64. 12: PROCESSOR_ARCHITECTURE_ARM64. -- **ProcessCreateTime** The time of creation of the process that has crashed. -- **ProcessId** The ID of the process that has crashed. -- **ReportId** A GUID used to identify the report. This can used to track the report across Watson. -- **TargetAppId** The kernel reported AppId of the application being reported. -- **targetAppVer** No content is currently available. -- **TargetAppVer** The specific version of the application being reported -- **TargetAsId** The sequence number for the hanging process. - - -## Feature update events - -### Microsoft.Windows.Upgrade.Uninstall.UninstallFinalizedAndRebootTriggered - -This event indicates that the uninstall was properly configured and that a system reboot was initiated. - - - -### Microsoft.Windows.Upgrade.Uninstall.UninstallGoBackButtonClicked - -This event sends basic metadata about the starting point of uninstalling a feature update, which helps ensure customers can safely revert to a well-known state if the update caused any problems. - - - -## Hang Reporting events - -### Microsoft.Windows.HangReporting.AppHangEvent - -This event sends data about hangs for both native and managed applications, to help keep Windows up to date. It does not contain any Watson bucketing information. The bucketing information is recorded in a Windows Error Reporting (WER) event that is generated when the WER client reports the hang to the Watson service, and the WER event will contain the same ReportID (see field 13 of hang event, field 19 of WER event) as the hang event for the hang being reported. AppHang is reported only on PC devices. It handles classic Win32 hangs and is emitted only once per report. Some behaviors that may be perceived by a user as a hang are reported by app managers (e.g. PLM/RM/EM) as Watson Generics and will not produce AppHang events. - -The following fields are available: - -- **AppName** The name of the app that has hung. -- **AppSessionGuid** GUID made up of process id used as a correlation vector for process instances in the telemetry backend. -- **AppVersion** The version of the app that has hung. -- **IsFatal** True/False based on whether the hung application caused the creation of a Fatal Hang Report. -- **PackageFullName** Store application identity. -- **PackageRelativeAppId** Store application identity. -- **ProcessArchitecture** Architecture of the hung process, as one of the PROCESSOR_ARCHITECTURE_* constants: 0: PROCESSOR_ARCHITECTURE_INTEL. 5: PROCESSOR_ARCHITECTURE_ARM. 9: PROCESSOR_ARCHITECTURE_AMD64. 12: PROCESSOR_ARCHITECTURE_ARM64. -- **ProcessCreateTime** The time of creation of the process that has hung. -- **ProcessId** The ID of the process that has hung. -- **ReportId** A GUID used to identify the report. This can used to track the report across Watson. -- **TargetAppId** The kernel reported AppId of the application being reported. -- **TargetAppVer** The specific version of the application being reported. -- **TargetAsId** The sequence number for the hanging process. -- **TypeCode** Bitmap describing the hang type. -- **WaitingOnAppName** If this is a cross process hang waiting for an application, this has the name of the application. -- **WaitingOnAppVersion** If this is a cross process hang, this has the version of the application for which it is waiting. -- **WaitingOnPackageFullName** If this is a cross process hang waiting for a package, this has the full name of the package for which it is waiting. -- **WaitingOnPackageRelativeAppId** If this is a cross process hang waiting for a package, this has the relative application id of the package. - - -## Inventory events - -### Microsoft.Windows.Inventory.Core.AmiTelCacheChecksum - -This event captures basic checksum data about the device inventory items stored in the cache for use in validating data completeness for Microsoft.Windows.Inventory.Core events. The fields in this event may change over time, but they will always represent a count of a given object. - -The following fields are available: - -- **Device** A count of device objects in cache. -- **DeviceCensus** A count of device census objects in cache. -- **DriverPackageExtended** A count of driverpackageextended objects in cache. -- **File** A count of file objects in cache. -- **FileSigningInfo** A count of file signing objects in cache. -- **Generic** A count of generic objects in cache. -- **HwItem** A count of hwitem objects in cache. -- **IentoryMiscellaneousOfficeAddIn** No content is currently available. -- **InventoryApplication** A count of application objects in cache. -- **InventoryApplicationAppV** A count of application AppV objects in cache. -- **InventoryApplicationDriver** A count of application driver objects in cache -- **InventoryApplicationFile** A count of application file objects in cache. -- **InventoryApplicationFramework** A count of application framework objects in cache -- **InventoryApplicationShortcut** A count of application shortcut objects in cache -- **InventoryDeviceContainer** A count of device container objects in cache. -- **InventoryDeviceInterface** A count of Plug and Play device interface objects in cache. -- **InventoryDeviceMediaClass** A count of device media objects in cache. -- **InventoryDevicePnp** A count of device Plug and Play objects in cache. -- **InventoryDeviceUsbHubClass** A count of device usb objects in cache -- **InventoryDriverBinary** A count of driver binary objects in cache. -- **InventoryDriverPackage** A count of device objects in cache. -- **InventoryMiscellaneiscellaneousOfficeInsights** No content is currently available. -- **InventoryMiscellaneousOfficeAddIn** A count of office add-in objects in cache -- **InventoryMiscellaneousOfficeAddInUsage** A count of office add-in usage objects in cache. -- **InventoryMiscellaneousOfficeIdentifiers** A count of office identifier objects in cache -- **InventoryMiscellaneousOfficeIESettings** A count of office ie settings objects in cache -- **InventoryMiscellaneousOfficeInsights** A count of office insights objects in cache -- **InventoryMiscellaneousOfficeProducts** A count of office products objects in cache -- **InventoryMiscellaneousOfficeSettings** A count of office settings objects in cache -- **InventoryMiscellaneousOfficeVBA** A count of office vba objects in cache -- **InventoryMiscellaneousOfficeVBARuleViolations** A count of office vba rule violations objects in cache -- **InventoryMiscellaneousUUPInfo** A count of uup info objects in cache -- **Metadata** A count of metadata objects in cache. -- **Orphan** A count of orphan file objects in cache. -- **Programs** A count of program objects in cache. - - -### Microsoft.Windows.Inventory.Core.AmiTelCacheFileInfo - -Diagnostic data about the inventory cache. - -The following fields are available: - -- **CacheFileSize** Size of the cache. -- **InventoryVersion** Inventory version of the cache. -- **TempCacheCount** Number of temp caches created. -- **TempCacheDeletedCount** Number of temp caches deleted. - - -### Microsoft.Windows.Inventory.Core.AmiTelCacheVersions - -This event sends inventory component versions for the Device Inventory data. - -The following fields are available: - -- **aeinv** The version of the App inventory component. -- **devinv** The file version of the Device inventory component. - - -### Microsoft.Windows.Inventory.Core.InventoryApplicationAdd - -This event sends basic metadata about an application on the system to help keep Windows up to date. - -This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedeviceinventorychange). - -The following fields are available: - -- **HiddenArp** Indicates whether a program hides itself from showing up in ARP. -- **InstallDate** The date the application was installed (a best guess based on folder creation date heuristics). -- **InstallDateArpLastModified** The date of the registry ARP key for a given application. Hints at install date but not always accurate. Passed as an array. Example: 4/11/2015 00:00:00 -- **InstallDateFromLincFile** No content is currently available. -- **InstallDateFromLinkFile** The estimated date of install based on the links to the files. Passed as an array. -- **InstallDateMsi** The install date if the application was installed via Microsoft Installer (MSI). Passed as an array. -- **InventoryVersion** The version of the inventory file generating the events. -- **Language** The language code of the program. -- **MsipackageCode** No content is currently available. -- **MsiPackageCode** A GUID that describes the MSI Package. Multiple 'Products' (apps) can make up an MsiPackage. -- **MsiProductCode** A GUID that describe the MSI Product. -- **Name** The name of the application. -- **OSversionAtInstallTime** No content is currently available. -- **OSVersionAtInstallTime** The four octets from the OS version at the time of the application's install. -- **PackageFullName** The package full name for a Store application. -- **ProgramInstanceId** A hash of the file IDs in an app. -- **Publisher** The Publisher of the application. Location pulled from depends on the 'Source' field. -- **RootDirPath** The path to the root directory where the program was installed. -- **Source** How the program was installed (for example, ARP, MSI, Appx). -- **StoreAppType** A sub-classification for the type of Microsoft Store app, such as UWP or Win8StoreApp. -- **type** No content is currently available. -- **Type** One of ("Application", "Hotfix", "BOE", "Service", "Unknown"). Application indicates Win32 or Appx app, Hotfix indicates app updates (KBs), BOE indicates it's an app with no ARP or MSI entry, Service indicates that it is a service. Application and BOE are the ones most likely seen. -- **Version** The version number of the program. - - -### Microsoft.Windows.Inventory.Core.InventoryApplicationDriverAdd - -This event represents what drivers an application installs. - -This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedeviceinventorychange). - -The following fields are available: - -- **InventoryVersion** The version of the inventory component. -- **ProgramIds** The unique program identifier the driver is associated with. - - -### Microsoft.Windows.Inventory.Core.InventoryApplicationDriverStartSync - -The InventoryApplicationDriverStartSync event indicates that a new set of InventoryApplicationDriverStartAdd events will be sent. - -This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedeviceinventorychange). - -The following fields are available: - -- **InventoryVersion** The version of the inventory component. - - -### Microsoft.Windows.Inventory.Core.InventoryApplicationFrameworkAdd - -This event provides the basic metadata about the frameworks an application may depend on. - -This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedeviceinventorychange). - -The following fields are available: - -- **FileId** A hash that uniquely identifies a file. -- **Frameworks** The list of frameworks this file depends on. -- **InventoryVersion** The version of the inventory file generating the events. - - -### Microsoft.Windows.Inventory.Core.InventoryApplicationFrameworkStartSync - -This event indicates that a new set of InventoryApplicationFrameworkAdd events will be sent. - -This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedeviceinventorychange). - -The following fields are available: - -- **InventoryVersion** The version of the inventory file generating the events. - - -### Microsoft.Windows.Inventory.Core.InventoryApplicationRemove - -This event indicates that a new set of InventoryDevicePnpAdd events will be sent. - -This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedeviceinventorychange). - -The following fields are available: - -- **InventoryVersion** The version of the inventory file generating the events. - - -### Microsoft.Windows.Inventory.Core.InventoryApplicationStartSync - -This event indicates that a new set of InventoryApplicationAdd events will be sent. - -This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedeviceinventorychange). - -The following fields are available: - -- **InventoryVersion** The version of the inventory file generating the events. - - -### Microsoft.Windows.Inventory.Core.InventoryDeviceContainerAdd - -This event sends basic metadata about a device container (such as a monitor or printer as opposed to a Plug and Play device) to help keep Windows up to date. - -This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedeviceinventorychange). - -The following fields are available: - -- **Categories** A comma separated list of functional categories in which the container belongs. -- **DiscoveryMethod** The discovery method for the device container. -- **FriendlyName** The name of the device container. -- **InventoryVersion** The version of the inventory file generating the events. -- **IsActive** Is the device connected, or has it been seen in the last 14 days? -- **IsConnected** For a physically attached device, this value is the same as IsPresent. For wireless a device, this value represents a communication link. -- **IsMachineContainer** Is the container the root device itself? -- **IsNetworked** Is this a networked device? -- **IsPaired** Does the device container require pairing? -- **Manufacturer** The manufacturer name for the device container. -- **ModelId** A unique model ID. -- **ModelName** The model name. -- **ModelNumber** The model number for the device container. -- **PrimaryCategory** The primary category for the device container. - - -### Microsoft.Windows.Inventory.Core.InventoryDeviceContainerRemove - -This event indicates that the InventoryDeviceContainer object is no longer present. - -This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedeviceinventorychange). - -The following fields are available: - -- **InventoryVersion** The version of the inventory file generating the events. - - -### Microsoft.Windows.Inventory.Core.InventoryDeviceContainerStartSync - -This event indicates that a new set of InventoryDeviceContainerAdd events will be sent. - -This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedeviceinventorychange). - -The following fields are available: - -- **InventoryVersion** The version of the inventory file generating the events. - - -### Microsoft.Windows.Inventory.Core.InventoryDeviceInterfaceAdd - -This event retrieves information about what sensor interfaces are available on the device. - -This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedeviceinventorychange). - -The following fields are available: - -- **Accelerometer3D** Indicates if an Accelerator3D sensor is found. -- **ActivityDetection** Indicates if an Activity Detection sensor is found. -- **AmbientLight** Indicates if an Ambient Light sensor is found. -- **Barometer** Indicates if a Barometer sensor is found. -- **Custom** Indicates if a Custom sensor is found. -- **EnergyMeter** Indicates if an Energy sensor is found. -- **FloorElevation** Indicates if a Floor Elevation sensor is found. -- **GeomagneticOrientation** Indicates if a Geo Magnetic Orientation sensor is found. -- **GravityVector** Indicates if a Gravity Detector sensor is found. -- **Gyrometer3D** Indicates if a Gyrometer3D sensor is found. -- **Humidity** Indicates if a Humidity sensor is found. -- **InventoryVersion** The version of the inventory file generating the events. -- **LinearAccelerometer** Indicates if a Linear Accelerometer sensor is found. -- **Magnetometer3D** Indicates if a Magnetometer3D sensor is found. -- **Orientation** Indicates if an Orientation sensor is found. -- **Pedometer** Indicates if a Pedometer sensor is found. -- **Proximity** Indicates if a Proximity sensor is found. -- **RelativeOrientation** Indicates if a Relative Orientation sensor is found. -- **SimpleDeviceOrientation** Indicates if a Simple Device Orientation sensor is found. -- **Temperature** Indicates if a Temperature sensor is found. - - -### Microsoft.Windows.Inventory.Core.InventoryDeviceInterfaceStartSync - -This event indicates that a new set of InventoryDeviceInterfaceAdd events will be sent. - -This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedeviceinventorychange). - -The following fields are available: - -- **InventoryVersion** The version of the inventory file generating the events. - - -### Microsoft.Windows.Inventory.Core.InventoryDeviceMediaClassAdd - -This event sends additional metadata about a Plug and Play device that is specific to a particular class of devices to help keep Windows up to date while reducing overall size of data payload. - -This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedeviceinventorychange). - -The following fields are available: - -- **audio.captureDriver** Audio device capture driver. Example: hdaudio.inf:db04a16ce4e8d6ee:HdAudModel:10.0.14887.1000:hdaudio\func_01 -- **audio.renderDriver** Audio device render driver. Example: hdaudio.inf:db04a16ce4e8d6ee:HdAudModel:10.0.14889.1001:hdaudio\func_01 -- **Audio_CaptureDriver** The Audio device capture driver endpoint. -- **Audio_RenderDriver** The Audio device render driver endpoint. -- **InventoryVersion** The version of the inventory file generating the events. - - -### Microsoft.Windows.Inventory.Core.InventoryDeviceMediaClassRemove - -This event indicates that the InventoryDeviceMediaClassRemove object is no longer present. - -This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedeviceinventorychange). - -The following fields are available: - -- **InventoryVersion** The version of the inventory file generating the events. - - -### Microsoft.Windows.Inventory.Core.InventoryDeviceMediaClassStartSync - -This event indicates that a new set of InventoryDeviceMediaClassSAdd events will be sent. - -This event includes fields from [Ms.Device.De~iceInventoryChange](#msdevicede~iceinventorychange). - -The following fields are available: - -- **InventoryVersion** The version of the inventory file generating the events. - - -### Microsoft.Windows.Inventory.Core.InventoryDevicePnpAdd - -This event represents the basic metadata about a plug and play (PNP) device and its associated driver. - -This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedeviceinventorychange). - -The following fields are available: - -- **]pperClassFilters** No content is currently available. -- **basedata** No content is currently available. See [basedata](#basedata). -- **BusReportedDescraption** No content is currently available. -- **BusReportedDescription** The description of the device reported by the bux. -- **BusReptrtedDescription** No content is currently available. -- **Clas{Guid** No content is currently available. -- **Class** The device setup class of the driver loaded for the device. -- **ClassGuid** The device class unique identifier of the driver package loaded on the device. -- **COMPID** The list of “Compatible IDs” for this device. -- **Con|ainerId** No content is currently available. -- **ContainerId** The system-supplied unique identifier that specifies which group(s) the device(s) installed on the parent (main) device belong to. -- **Descriptaon** No content is currently available. -- **Description** The description of the device. -- **DeviceDriverFlightId** No content is currently available. -- **DeviceExtDriversFlightIds** No content is currently available. -- **DeviceInterfaceClasses** The device interfaces that this device implements. -- **DeviceState** Identifies the current state of the parent (main) device. -- **DriverAd** No content is currently available. -- **DriverId** The unique identifier for the installed driver. -- **DriverName** The name of the driver image file. -- **DriverPackageStrongName** The immediate parent directory name in the Directory field of InventoryDriverPackage. -- **DriverVer^ersion** No content is currently available. -- **DriverVerDate** The date associated with the driver installed on the device. -- **DriverVerVersion** The version number of the driver installed on the device. -- **Enumerator** Identifies the bus that enumerated the device. -- **ExtendedInfs** The extended INF file names. -- **FirstInstallDate** No content is currently available. -- **H_ID** No content is currently available. -- **HWID** A list of hardware IDs for the device. -- **Inf** The name of the INF file (possibly renamed by the OS, such as oemXX.inf). -- **InstallDate** No content is currently available. -- **InstallState** The device installation state. For a list of values, see: https://msdn.microsoft.com/en-us/library/windows/hardware/ff543130.aspx -- **InventoryVersion** The version number of the inventory process generating the events. -- **LowerClassFilters** The identifiers of the Lower Class filters installed for the device. -- **LowerFilters** The identifiers of the Lower filters installed for the device. -- **Manufacturer** The manufacturer of the device. -- **MatchangID** No content is currently available. -- **MatchingID** The Hardware ID or Compatible ID that Windows uses to install a device instance. -- **Modeh** No content is currently available. -- **Model** Identifies the model of the device. -- **ParentId** The Device Instance ID of the parent of the device. -- **ProblemCode** The error code currently returned by the device, if applicable. -- **ProblmmCode** No content is currently available. -- **Provider** Identifies the device provider. -- **Service** The name of the device service. -- **STACKID** The list of hardware IDs for the stack. -- **UpperClassFilters** The identifiers of the Upper Class filters installed for the device. -- **UpperFilters** The identifiers of the Upper filters installed for the device. -- **UpxerClassFilters** No content is currently available. - - -### Microsoft.Windows.Inventory.Core.InventoryDevicePnpRemove - -This event indicates that the InventoryDevicePnpRemove object is no longer present. - -This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedeviceinventorychange). - -The following fields are available: - -- **InventoryVersion** The version of the inventory file generating the events. - - -### Microsoft.Windows.Inventory.Core.InventoryDevicePnpStartSync - -This event indicates that a new set of InventoryDevicePnpAdd events will be sent. - -This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedeviceinventorychange). - -The following fields are available: - -- **InventoryVersion** The version of the inventory file generating the events. - - -### Microsoft.Windows.Inventory.Core.InventoryDeviceUsbHubClassAdd - -This event sends basic metadata about the USB hubs on the device. - -This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedeviceinventorychange). - -The following fields are available: - -- **InventoryVersion** The version of the inventory file generating the events. -- **TotalUserConnectablePorts** Total number of connectable USB ports. -- **TotalUserConnectableTypeCPorts** Total number of connectable USB Type C ports. - - -### Microsoft.Windows.Inventory.Core.InventoryDeviceUsbHubClassStartSync - -This event indicates that a new set of InventoryDeviceUsbHubClassAdd events will be sent. - -This event includes fields from [Ms.De~ice.DeviceInventoryChange](#msde~icedeviceinventorychange). - -The following fields are available: - -- **InventoryVersion** The version of the inventory file generating the events. - - -### Microsoft.Windows.Inventory.Core.InventoryDriverBinaryAdd - -This event provides the basic metadata about driver binaries running on the system. - -This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedeviceinventorychange). - -The following fields are available: - -- **DrivdrCompany** No content is currently available. -- **DriverCheckSum** The checksum of the driver file. -- **DriverCompany** The company name that developed the driver. -- **DriverInBox** Is the driver included with the operating system? -- **DriverIsKernelMode** Is it a kernel mode driver? -- **DriverName** The file name of the driver. -- **DriverPackageStrongName** The strong name of the driver package -- **DriverSigned** The strong name of the driver package -- **DriverTimeStamp** The low 32 bits of the time stamp of the driver file. -- **DriverType** A bitfield of driver attributes: 1. define DRIVER_MAP_DRIVER_TYPE_PRINTER 0x0001. 2. define DRIVER_MAP_DRIVER_TYPE_KERNEL 0x0002. 3. define DRIVER_MAP_DRIVER_TYPE_USER 0x0004. 4. define DRIVER_MAP_DRIVER_IS_SIGNED 0x0008. 5. define DRIVER_MAP_DRIVER_IS_INBOX 0x0010. 6. define DRIVER_MAP_DRIVER_IS_WINQUAL 0x0040. 7. define DRIVER_MAP_DRIVER_IS_SELF_SIGNED 0x0020. 8. define DRIVER_MAP_DRIVER_IS_CI_SIGNED 0x0080. 9. define DRIVER_MAP_DRIVER_HAS_BOOT_SERVICE 0x0100. 10. define DRIVER_MAP_DRIVER_TYPE_I386 0x10000. 11. define DRIVER_MAP_DRIVER_TYPE_IA64 0x20000. 12. define DRIVER_MAP_DRIVER_TYPE_AMD64 0x40000. 13. define DRIVER_MAP_DRIVER_TYPE_ARM 0x100000. 14. define DRIVER_MAP_DRIVER_TYPE_THUMB 0x200000. 15. define DRIVER_MAP_DRIVER_TYPE_ARMNT 0x400000. 16. define DRIVER_MAP_DRIVER_IS_TIME_STAMPED 0x800000. -- **DriverVersion** The version of the driver file. -- **ImageSize** The size of the driver file. -- **ImageSmze** No content is currently available. -- **Inf** The name of the INF file. -- **InventoryVersion** The version of the inventory file generating the events. -- **Product** The product name that is included in the driver file. -- **ProductVersion** The product version that is included in the driver file. -- **Service** The name of the service that is installed for the device. -- **WdfVersion** The Windows Driver Framework version. -- **WdfVers-on** No content is currently available. -- **WdfVersÿon** No content is currently available. - - -### Microsoft.Windows.Inventory.Core.InventoryDriverBinaryRemove - -This event indicates that the InventoryDriverBinary object is no longer present. - -This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedeviceinventorychange). - -The following fields are available: - -- **InventoryVersion** The version of the inventory file generating the events. - - -### Microsoft.Windows.Inventory.Core.InventoryDriverBinaryStartSync - -This event indicates that a new set of InventoryDriverBinaryAdd events will be sent. - -This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedeviceinventorychange). - -The following fields are available: - -- **InventoryVersion** The version of the inventory file generating the events. - - -### Microsoft.Windows.Inventory.Core.InventoryDriverPackageAdd - -This event sends basic metadata about drive packages installed on the system to help keep Windows up to date. - -This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedeviceinventorychange). - -The following fields are available: - -- **Class** The class name for the device driver. -- **ClassGuid** The class GUID for the device driver. -- **Date** The driver package date. -- **Directory** The path to the driver package. -- **DriverInBox** Is the driver included with the operating system? -- **Inf** The INF name of the driver package. -- **InventoryVersion** The version of the inventory file generating the events. -- **Provider** The provider for the driver package. -- **SubmissionId** The HLK submission ID for the driver package. -- **Version** The version of the driver package. - - -### Microsoft.Windows.Inventory.Core.InventoryDriverPackageRemove - -This event indicates that the InventoryDriverPackageRemove object is no longer present. - -This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedeviceinventorychange). - -The following fields are available: - -- **InventoryVersion** The version of the inventory file generating the events. - - -### Microsoft.Windows.Inventory.Core.InventoryDriverPackageStartSync - -This event indicates that a new set of InventoryDriverPackageAdd events will be sent. - -This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedeviceinventorychange). - -The following fields are available: - -- **InventoryVersion** The version of the inventory file generating the events. - - -### Microsoft.Windows.Inventory.Core.StartUtcJsonTrace - -This event collects traces of all other Core events, not used in typical customer scenarios. This event signals the beginning of the event download, and that tracing should begin. - - - -### Microsoft.Windows.Inventory.Core.StopUtcJsonTrace - -This event collects traces of all other Core events, not used in typical customer scenarios. This event signals the end of the event download, and that tracing should end. - - - -### Microsoft.Windows.Inventory.General.AppHealthStaticAdd - -This event sends details collected for a specific application on the source device. - -The following fields are available: - -- **AhaVersion** The binary version of the App Health Analyzer tool. -- **ApplicationErrors** The count of application errors from the event log. -- **Bitness** The architecture type of the application (16 Bit or 32 bit or 64 bit). -- **device_level** Various JRE/JAVA versions installed on a particular device. -- **ExtendedProperties** Attribute used for aggregating all other attributes under this event type. -- **Jar** Flag to determine if an app has a Java JAR file dependency. -- **Jre** Flag to determine if an app has JRE framework dependency. -- **Jre_version** JRE versions an app has declared framework dependency for. -- **Name** Name of the application. -- **NonDPIAware** Flag to determine if an app is non-DPI aware. -- **NumBinaries** Count of all binaries (.sys,.dll,.ini) from application install location. -- **RequiresAdmin** Flag to determine if an app requests admin privileges for execution. -- **RequiresAdminv2** Additional flag to determine if an app requests admin privileges for execution. -- **RequiresUIAccess** Flag to determine if an app is based on UI features for accessibility. -- **VB6** Flag to determine if an app is based on VB6 framework. -- **VB6v2** Additional flag to determine if an app is based on VB6 framework. -- **Version** Version of the application. -- **VersionCheck** Flag to determine if an app has a static dependency on OS version. -- **VersionCheckv2** Additional flag to determine if an app has a static dependency on OS version. - - -### Microsoft.Windows.Inventory.General.AppHealthStaticStartSync - -This event indicates the beginning of a series of AppHealthStaticAdd events. - -The following fields are available: - -- **AllowTelemetry** Indicates the presence of the 'allowtelemetry' command line argument. -- **CommandLineArgs** Command line arguments passed when launching the App Health Analyzer executable. -- **Enhanced** Indicates the presence of the 'enhanced' command line argument. -- **StartTime** UTC date and time at which this event was sent. - - -### Microsoft.Windows.Inventory.General.InventoryMiscellaneousOfficeAddInAdd - -Provides data on the installed Office Add-ins. - -This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedeviceinventorychange). - -The following fields are available: - -- **AddinCLSID** The class identifier key for the Microsoft Office add-in. -- **AddInCLSID** The class identifier key for the Microsoft Office add-in. -- **AddInId** The identifier for the Microsoft Office add-in. -- **AddinType** The type of the Microsoft Office add-in. -- **BinFileTimestamp** The timestamp of the Office add-in. -- **BinFileVersion** The version of the Microsoft Office add-in. -- **Description** Description of the Microsoft Office add-in. -- **FileId** The file identifier of the Microsoft Office add-in. -- **FileSize** The file size of the Microsoft Office add-in. -- **FriendlyName** The friendly name for the Microsoft Office add-in. -- **FullPath** The full path to the Microsoft Office add-in. -- **InventoryVersion** The version of the inventory binary generating the events. -- **LoadBehavior** Integer that describes the load behavior. -- **LoadTime** Load time for the Office add-in. -- **OfficeApplication** The Microsoft Office application associated with the add-in. -- **OfficeArchitecture** The architecture of the add-in. -- **OfficeVersion** The Microsoft Office version for this add-in. -- **OutlookCrashingAddin** Indicates whether crashes have been found for this add-in. -- **ProductCompany** The name of the company associated with the Office add-in. -- **ProductName** The product name associated with the Microsoft Office add-in. -- **ProductVersion** The version associated with the Office add-in. -- **ProgramId** The unique program identifier of the Microsoft Office add-in. -- **Provider** Name of the provider for this add-in. - - -### Microsoft.Windows.Inventory.General.InventoryMiscellaneousOfficeAddInRemove - -Indicates that this particular data object represented by the objectInstanceId is no longer present. - -This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedeviceinventorychange). - -The following fields are available: - -- **InventoryVersion** The version of the inventory binary generating the events. - - -### Microsoft.Windows.Inventory.General.InventoryMiscellaneousOfficeAddInStartSync - -This event indicates that a new sync is being generated for this object type. - -This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedeviceinventorychange). - -The following fields are available: - -- **InventoryVersion** The version of the inventory binary generating the events. - - -### Microsoft.Windows.Inventory.General.InventoryMiscellaneousOfficeIdentifiersAdd - -Provides data on the Office identifiers. - -This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedeviceinventorychange). - -The following fields are available: - -- **InventoryVersion** The version of the inventory binary generating the events. -- **OAudienceData** Sub-identifier for Microsoft Office release management, identifying the pilot group for a device -- **OAudienceId** Microsoft Office identifier for Microsoft Office release management, identifying the pilot group for a device -- **OMID** Identifier for the Office SQM Machine -- **OPlatform** Whether the installed Microsoft Office product is 32-bit or 64-bit -- **OTenantId** Unique GUID representing the Microsoft O365 Tenant -- **OVersion** Installed version of Microsoft Office. For example, 16.0.8602.1000 -- **OWowMID** Legacy Microsoft Office telemetry identifier (SQM Machine ID) for WoW systems (32-bit Microsoft Office on 64-bit Windows) - - -### Microsoft.Windows.Inventory.General.InventoryMiscellaneousOfficeIdentifiersStartSync - -Diagnostic event to indicate a new sync is being generated for this object type. - -This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedeviceinventorychange). - -The following fields are available: - -- **InventoryVersion** The version of the inventory binary generating the events. - - -### Microsoft.Windows.Inventory.General.InventoryMiscellaneousOfficeIESettingsAdd - -Provides data on Office-related Internet Explorer features. - -This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedeviceinventorychange). - -The following fields are available: - -- **InventoryVersion** The version of the inventory binary generating the events. -- **OIeFeatureAddon** Flag indicating which Microsoft Office products have this setting enabled. The FEATURE_ADDON_MANAGEMENT feature lets applications hosting the WebBrowser Control to respect add-on management selections made using the Add-on Manager feature of Internet Explorer. Add-ons disabled by the user or by administrative group policy will also be disabled in applications that enable this feature. -- **OIeMachineLockdown** Flag indicating which Microsoft Office products have this setting enabled. When the FEATURE_LOCALMACHINE_LOCKDOWN feature is enabled, Internet Explorer applies security restrictions on content loaded from the user's local machine, which helps prevent malicious behavior involving local files. -- **OIeMimeHandling** Flag indicating which Microsoft Office products have this setting enabled. When the FEATURE_MIME_HANDLING feature control is enabled, Internet Explorer handles MIME types more securely. Only applies to Windows Internet Explorer 6 for Windows XP Service Pack 2 (SP2) -- **OIeMimeSniffing** Flag indicating which Microsoft Office products have this setting enabled. Determines a file's type by examining its bit signature. Windows Internet Explorer uses this information to determine how to render the file. The FEATURE_MIME_SNIFFING feature, when enabled, allows to be set differently for each security zone by using the URLACTION_FEATURE_MIME_SNIFFING URL action flag -- **OIeNoAxInstall** Flag indicating which Microsoft Office products have this setting enabled. When a webpage attempts to load or install an ActiveX control that isn't already installed, the FEATURE_RESTRICT_ACTIVEXINSTALL feature blocks the request. When a webpage tries to load or install an ActiveX control that isn't already installed, the FEATURE_RESTRICT_ACTIVEXINSTALL feature blocks the request -- **OIeNoDownload** Flag indicating which Microsoft Office products have this setting enabled. The FEATURE_RESTRICT_FILEDOWNLOAD feature blocks file download requests that navigate to a resource, that display a file download dialog box, or that are not initiated explicitly by a user action (for example, a mouse click or key press). Only applies to Windows Internet Explorer 6 for Windows XP Service Pack 2 (SP2) -- **OIeObjectCaching** Flag indicating which Microsoft Office products have this setting enabled. When enabled, the FEATURE_OBJECT_CACHING feature prevents webpages from accessing or instantiating ActiveX controls cached from different domains or security contexts -- **OIePasswordDisable** Flag indicating which Microsoft Office products have this setting enabled. After Windows Internet Explorer 6 for Windows XP Service Pack 2 (SP2), Internet Explorer no longer allows usernames and passwords to be specified in URLs that use the HTTP or HTTPS protocols. URLs using other protocols, such as FTP, still allow usernames and passwords -- **OIeSafeBind** Flag indicating which Microsoft Office products have this setting enabled. The FEATURE_SAFE_BINDTOOBJECT feature performs additional safety checks when calling MonikerBindToObject to create and initialize Microsoft ActiveX controls. Specifically, prevent the control from being created if COMPAT_EVIL_DONT_LOAD is in the registry for the control -- **OIeSecurityBand** Flag indicating which Microsoft Office products have this setting enabled. The FEATURE_SECURITYBAND feature controls the display of the Internet Explorer Information bar. When enabled, the Information bar appears when file download or code installation is restricted -- **OIeUncSaveCheck** Flag indicating which Microsoft Office products have this setting enabled. The FEATURE_UNC_SAVEDFILECHECK feature enables the Mark of the Web (MOTW) for local files loaded from network locations that have been shared by using the Universal Naming Convention (UNC) -- **OIeValidateUrl** Flag indicating which Microsoft Office products have this setting enabled. When enabled, the FEATURE_VALIDATE_NAVIGATE_URL feature control prevents Windows Internet Explorer from navigating to a badly formed URL -- **OIeWebOcPopup** Flag indicating which Microsoft Office products have this setting enabled. The FEATURE_WEBOC_POPUPMANAGEMENT feature allows applications hosting the WebBrowser Control to receive the default Internet Explorer pop-up window management behavior -- **OIeWinRestrict** Flag indicating which Microsoft Office products have this setting enabled. When enabled, the FEATURE_WINDOW_RESTRICTIONS feature adds several restrictions to the size and behavior of popup windows -- **OIeZoneElevate** Flag indicating which Microsoft Office products have this setting enabled. When enabled, the FEATURE_ZONE_ELEVATION feature prevents pages in one zone from navigating to pages in a higher security zone unless the navigation is generated by the user - - -### Microsoft.Windows.Inventory.General.InventoryMiscellaneousOfficeIESettingsStartSync - -Diagnostic event to indicate a new sync is being generated for this object type. - -This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedeviceinventorychange). - -The following fields are available: - -- **InventoryVersion** The version of the inventory binary generating the events. - - -### Microsoft.Windows.Inventory.General.InventoryMiscellaneousOfficeInsightsAdd - -This event provides insight data on the installed Office products - -This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedeviceinventorychange). - -The following fields are available: - -- **InventoryVersion** The version of the inventory binary generating the events. -- **OfficeApplication** The name of the Office application. -- **OfficeArchitecture** The bitness of the Office application. -- **OfficeVersion** The version of the Office application. -- **Valóe** No content is currently available. -- **Value** The insights collected about this entity. - - -### Microsoft.Windows.Inventory.General.InventoryMiscellaneousOfficeInsightsRemove - -Indicates that this particular data object represented by the objectInstanceId is no longer present. - -This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedeviceinventorychange). - -The following fields are available: - -- **InventoryVersion** The version of the inventory binary generating the events. - - -### Microsoft.Windows.Inventory.General.InventoryMiscellaneousOfficeInsightsStartSync - -This diagnostic event indicates that a new sync is being generated for this object type. - -This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedeviceinventorychange). - -The following fields are available: - -- **InventoryVersion** The version of the inventory binary generating the events. - - -### Microsoft.Windows.Inventory.General.InventoryMiscellaneousOfficeProductsAdd - -Describes Office Products installed. - -This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedeviceinventorychange). - -The following fields are available: - -- **InventoryVersion** The version of the inventory binary generating the events. -- **OC2rApps** A GUID the describes the Office Click-To-Run apps -- **OC2rSkus** Comma-delimited list (CSV) of Office Click-To-Run products installed on the device. For example, Office 2016 ProPlus -- **OMsiApps** Comma-delimited list (CSV) of Office MSI products installed on the device. For example, Microsoft Word -- **OProductCodes** A GUID that describes the Office MSI products - - -### Microsoft.Windows.Inventory.General.InventoryMiscellaneousOfficeProductsStartSync - -Diagnostic event to indicate a new sync is being generated for this object type. - -This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedeviceinventorychange). - -The following fields are available: - -- **InventoryVersion** The version of the inventory binary generating the events. - - -### Microsoft.Windows.Inventory.General.InventoryMiscellaneousOfficeSettingsAdd - -This event describes various Office settings - -This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedeviceinventorychange). - -The following fields are available: - -- **BrowserFlags** Browser flags for Office-related products -- **ExchangeProviderFlags** Provider policies for Office Exchange -- **InventoryVersion** The version of the inventory binary generating the events. -- **SharedComputerLicensing** Office shared computer licensing policies - - -### Microsoft.Windows.Inventory.General.InventoryMiscellaneousOfficeSettingsStartSync - -Indicates a new sync is being generated for this object type. - -This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedeviceinventorychange). - -The following fields are available: - -- **InventoryVersion** The version of the inventory binary generating the events. - - -### Microsoft.Windows.Inventory.General.InventoryMiscellaneousOfficeVBAAdd - -This event provides a summary rollup count of conditions encountered while performing a local scan of Office files, analyzing for known VBA programmability compatibility issues between legacy office version and ProPlus, and between 32 and 64-bit versions - -This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedeviceinventorychange). - -The following fields are available: - -- **Design** Count of files with design issues found. -- **Design_x64** Count of files with 64 bit design issues found. -- **DuplicateVBA** Count of files with duplicate VBA code. -- **HasVBA** Count of files with VBA code. -- **Inaccessible** Count of files that were inaccessible for scanning. -- **InventoryVersion** The version of the inventory binary generating the events. -- **Issues** Count of files with issues detected. -- **Issues_x64** Count of files with 64-bit issues detected. -- **IssuesNone** Count of files with no issues detected. -- **IssuesNone_x64** Count of files with no 64-bit issues detected. -- **Locked** Count of files that were locked, preventing scanning. -- **NoVBA** Count of files with no VBA inside. -- **Protected** Count of files that were password protected, preventing scanning. -- **RemLimited** Count of files that require limited remediation changes. -- **RemLimited_x64** Count of files that require limited remediation changes for 64-bit issues. -- **RemSignificant** Count of files that require significant remediation changes. -- **RemSignificant_x64** Count of files that require significant remediation changes for 64-bit issues. -- **Score** Overall compatibility score calculated for scanned content. -- **Score_x64** Overall 64-bit compatibility score calculated for scanned content. -- **Total** Total number of files scanned. -- **Validation** Count of files that require additional manual validation. -- **Validation_x64** Count of files that require additional manual validation for 64-bit issues. - - -### Microsoft.Windows.Inventory.General.InventoryMiscellaneousOfficeVBARemove - -Indicates that this particular data object represented by the objectInstanceId is no longer present. - -This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedeviceinventorychange). - -The following fields are available: - -- **InventoryVersion** The version of the inventory binary generating the events. - - -### Microsoft.Windows.Inventory.General.InventoryMiscellaneousOfficeVBARuleViolationsAdd - -This event provides data on Microsoft Office VBA rule violations, including a rollup count per violation type, giving an indication of remediation requirements for an organization. The event identifier is a unique GUID, associated with the validation rule - -This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedeviceinventorychange). - -The following fields are available: - -- **Count** Count of total Microsoft Office VBA rule violations -- **InventoryVersion** The version of the inventory binary generating the events. - - -### Microsoft.Windows.Inventory.General.InventoryMiscellaneousOfficeVBARuleViolationsRemove - -Indicates that this particular data object represented by the objectInstanceId is no longer present. - -This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedeviceinventorychange). - -The following fields are available: - -- **InventoryVersion** The version of the inventory binary generating the events. - - -### Microsoft.Windows.Inventory.General.InventoryMiscellaneousOfficeVBARuleViolationsStartSync - -This event indicates that a new sync is being generated for this object type. - -This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedeviceinventorychange). - -The following fields are available: - -- **InventoryVersion** The version of the inventory binary generating the events. - - -### Microsoft.Windows.Inventory.General.InventoryMiscellaneousOfficeVBAStartSync - -Diagnostic event to indicate a new sync is being generated for this object type. - -This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedeviceinventorychange). - -The following fields are available: - -- **InventoryVersion** The version of the inventory binary generating the events. - - -### Microsoft.Windows.Inventory.General.InventoryMiscellaneousUUPInfoAdd - -Provides data on Unified Update Platform (UUP) products and what version they are at. - -This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedeviceinventorychange). - -The following fields are available: - -- **Identifier** UUP identifier -- **LastActivatedVersion** Last activated version -- **PreviousVersion** Previous version -- **Source** UUP source -- **Version** UUP version - - -### Microsoft.Windows.Inventory.General.InventoryMiscellaneousUUPInfoRemove - -Indicates that this particular data object represented by the objectInstanceId is no longer present. - -This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedeviceinventorychange). - - - -### Microsoft.Windows.Inventory.General.InventoryMiscellaneousUUPInfoStartSync - -Diagnostic event to indicate a new sync is being generated for this object type. - -This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedeviceinventorychange). - - - -### Microsoft.Windows.Inventory.Indicators.Checksum - -This event summarizes the counts for the InventoryMiscellaneousUexIndicatorAdd events. - -The following fields are available: - -- **CensusId** A unique hardware identifier. -- **ChecksumDictionary** A count of each operating system indicator. -- **PCFP** Equivalent to the InventoryId field that is found in other core events. - - -### Microsoft.Windows.Inventory.Indicators.InventoryMiscellaneousUexIndicatorAdd - -These events represent the basic metadata about the OS indicators installed on the system which are used for keeping the device up to date. - -This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedeviceinventorychange). - -The following fields are available: - -- **IndicatorValue** The indicator value. -- **Value** Describes an operating system indicator that may be relevant for the device upgrade. - - -### Microsoft.Windows.Inventory.Indicators.InventoryMiscellaneousUexIndicatorRemove - -This event is a counterpart to InventoryMiscellaneousUexIndicatorAdd that indicates that the item has been removed. - -This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedeviceinventorychange). - - - -### Microsoft.Windows.Inventory.Indicators.InventoryMiscellaneousUexIndicatorStartSync - -This event indicates that a new set of InventoryMiscellaneousUexIndicatorAdd events will be sent. - -This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedeviceinventorychange). - - - -## Kernel events - -### IO - -This event indicates the number of bytes read from or read by the OS and written to or written by the OS upon system startup. - -The following fields are available: - -- **BootAttemptCount** No content is currently available. -- **BootStatusPolicy** No content is currently available. -- **BootType** No content is currently available. -- **BytesRead** The total number of bytes read from or read by the OS upon system startup. -- **BytesWritten** The total number of bytes written to or written by the OS upon system startup. -- **FirmwareResetReasonEmbeddedController** No content is currently available. -- **FirmwareResetReasonEmbeddedControllerAdditional** No content is currently available. -- **FirmwareResetReasonPch** No content is currently available. -- **FirmwareResetReasonPchAdditional** No content is currently available. -- **FirmwareResetReasonSupplied** No content is currently available. -- **LastBootSucceeded** No content is currently available. -- **LastShutdownSucceeded** No content is currently available. -- **MeasuredLaunchResume** No content is currently available. -- **MenuPolicy** No content is currently available. -- **RecoveryEnabled** No content is currently available. -- **UserInputTime** No content is currently available. - - -### Microsoft.Windows.Kernel.BootEnvironment.OsLaunch - -OS information collected during Boot, used to evaluate the success of the upgrade process. - -The following fields are available: - -- **Boo|ApplicationId** No content is currently available. -- **BootApplicataonId** No content is currently available. -- **BootApplicationId** This field tells us what the OS Loader Application Identifier is. -- **BootAttemptCount** The number of consecutive times the boot manager has attempted to boot into this operating system. -- **BootSequence** The current Boot ID, used to correlate events related to a particular boot session. -- **BootStatusPolicy** Identifies the applicable Boot Status Policy. -- **BootType** Identifies the type of boot (e.g.: "Cold", "Hiber", "Resume"). -- **EventTimestamp** Seconds elapsed since an arbitrary time point. This can be used to identify the time difference in successive boot attempts being made. -- **FirmwareResetReasonEmbeddedController** Reason for system reset provided by firmware. -- **FirmwareResetReasonEmbeddedControllerAdditional** Additional information on system reset reason provided by firmware if needed. -- **FirmwareResetReasonPch** Reason for system reset provided by firmware. -- **FirmwareResetReasonPchAdditional** Additional information on system reset reason provided by firmware if needed. -- **FirmwareResetReasonSupplied** Flag indicating that a reason for system reset was provided by firmware. -- **IO** Amount of data written to and read from the disk by the OS Loader during boot. See [IO](#io). -- **LastBootSucceeded** Flag indicating whether the last boot was successful. -- **LastShutdownSucceeded** Flag indicating whether the last shutdown was successful. -- **MaxAbove4GbFreeRange** This field describes the largest memory range available above 4Gb. -- **MaxBelow4GbFreeRange** This field describes the largest memory range available below 4Gb. -- **MeasuredLaunchPrepared** This field tells us if the OS launch was initiated using Measured/Secure Boot over DRTM (Dynamic Root of Trust for Measurement). -- **MeasuredLaunchResume** This field tells us if Dynamic Root of Trust for Measurement (DRTM) was used when resuming from hibernation. -- **MenuPolicy** Type of advanced options menu that should be shown to the user (Legacy, Standard, etc.). -- **RecoveryEnabled** Indicates whether recovery is enabled. -- **SecureLaunchPrepared** This field indicates if DRTM was prepared during boot. -- **TcbLaunch** Indicates whether the Trusted Computing Base was used during the boot flow. -- **UserInputTime** The amount of time the loader application spent waiting for user input. - - -## Miracast events - -### Microsoft.Windows.Cast.Miracast.MiracastSessionEnd - -This event sends data at the end of a Miracast session that helps determine RTSP related Miracast failures along with some statistics about the session - -The following fields are available: - -- **AudioChannelCount** The number of audio channels. -- **AudioSampleRate** The sample rate of audio in terms of samples per second. -- **AudioSubtype** The unique subtype identifier of the audio codec (encoding method) used for audio encoding. -- **AverageBitrate** The average video bitrate used during the Miracast session, in bits per second. -- **AverageDataRate** The average available bandwidth reported by the WiFi driver during the Miracast session, in bits per second. -- **AveragePacketSendTimeInMs** The average time required for the network to send a sample, in milliseconds. -- **ConnectorType** The type of connector used during the Miracast session. -- **EncodeAverageTimeMS** The average time to encode a frame of video, in milliseconds. -- **EncodeCount** The count of total frames encoded in the session. -- **EncodeMaxTimeMS** The maximum time to encode a frame, in milliseconds. -- **EncodeMinTimeMS** The minimum time to encode a frame, in milliseconds. -- **EncoderCreationTimeInMs** The time required to create the video encoder, in milliseconds. -- **ErrorSource** Identifies the component that encountered an error that caused a disconnect, if applicable. -- **FirstFrameTime** The time (tick count) when the first frame is sent. -- **FirstLatencyMode** The first latency mode. -- **FrameAverageTimeMS** Average time to process an entire frame, in milliseconds. -- **FrameCount** The total number of frames processed. -- **FrameMaxTimeMS** The maximum time required to process an entire frame, in milliseconds. -- **FrameMinTimeMS** The minimum time required to process an entire frame, in milliseconds. -- **Glitches** The number of frames that failed to be delivered on time. -- **HardwareCursorEnabled** Indicates if hardware cursor was enabled when the connection ended. -- **HDCPState** The state of HDCP (High-bandwidth Digital Content Protection) when the connection ended. -- **HighestBitrate** The highest video bitrate used during the Miracast session, in bits per second. -- **HighestDataRate** The highest available bandwidth reported by the WiFi driver, in bits per second. -- **LastLatencyMode** The last reported latency mode. -- **LogTimeReference** The reference time, in tick counts. -- **LowestBitrate** The lowest video bitrate used during the Miracast session, in bits per second. -- **LowestDataRate** The lowest video bitrate used during the Miracast session, in bits per second. -- **MediaErrorCode** The error code reported by the media session, if applicable. -- **MiracastEntry** The time (tick count) when the Miracast driver was first loaded. -- **MiracastM1** The time (tick count) when the M1 request was sent. -- **MiracastM2** The time (tick count) when the M2 request was sent. -- **MiracastM3** The time (tick count) when the M3 request was sent. -- **MiracastM4** The time (tick count) when the M4 request was sent. -- **MiracastM5** The time (tick count) when the M5 request was sent. -- **MiracastM6** The time (tick count) when the M6 request was sent. -- **MiracastM7** The time (tick count) when the M7 request was sent. -- **MiracastSessionState** The state of the Miracast session when the connection ended. -- **MiracastStreaming** The time (tick count) when the Miracast session first started processing frames. -- **ProfileCount** The count of profiles generated from the receiver M4 response. -- **ProfileCountAfterFiltering** The count of profiles after filtering based on available bandwidth and encoder capabilities. -- **RefreshRate** The refresh rate set on the remote display. -- **RotationSupported** Indicates if the Miracast receiver supports display rotation. -- **RTSPSessionId** The unique identifier of the RTSP session. This matches the RTSP session ID for the receiver for the same session. -- **SessionGuid** The unique identifier of to correlate various Miracast events from a session. -- **SinkHadEdid** Indicates if the Miracast receiver reported an EDID. -- **SupportMicrosoftColorSpaceConversion** Indicates whether the Microsoft color space conversion for extra color fidelity is supported by the receiver. -- **SupportsMicrosoftDiagnostics** Indicates whether the Miracast receiver supports the Microsoft Diagnostics Miracast extension. -- **SupportsMicrosoftFormatChange** Indicates whether the Miracast receiver supports the Microsoft Format Change Miracast extension. -- **SupportsMicrosoftLatencyManagement** Indicates whether the Miracast receiver supports the Microsoft Latency Management Miracast extension. -- **SupportsMicrosoftRTCP** Indicates whether the Miracast receiver supports the Microsoft RTCP Miracast extension. -- **SupportsMicrosoftVideoFormats** Indicates whether the Miracast receiver supports Microsoft video format for 3:2 resolution. -- **SupportsWiDi** Indicates whether Miracast receiver supports Intel WiDi extensions. -- **TeardownErrorCode** The error code reason for teardown provided by the receiver, if applicable. -- **TeardownErrorReason** The text string reason for teardown provided by the receiver, if applicable. -- **UIBCEndState** Indicates whether UIBC was enabled when the connection ended. -- **UIBCEverEnabled** Indicates whether UIBC was ever enabled. -- **UIBCStatus** The result code reported by the UIBC setup process. -- **VideoBitrate** The starting bitrate for the video encoder. -- **VideoCodecLevel** The encoding level used for encoding, specific to the video subtype. -- **VideoHeight** The height of encoded video frames. -- **VideoSubtype** The unique subtype identifier of the video codec (encoding method) used for video encoding. -- **VideoWidth** The width of encoded video frames. -- **WFD2Supported** Indicates if the Miracast receiver supports WFD2 protocol. - - -## OneDrive events - -### Microsoft.OneDrive.Sync.Setup.APIOperation - -This event includes basic data about install and uninstall OneDrive API operations. - -The following fields are available: - -- **APIName** The name of the API. -- **Duration** How long the operation took. -- **IsSuccess** Was the operation successful? -- **ResultCode** The result code. -- **ScenarioName** The name of the scenario. - - -### Microsoft.OneDrive.Sync.Setup.EndExperience - -This event includes a success or failure summary of the installation. - -The following fields are available: - -- **APIName** The name of the API. -- **HResult** HResult of the operation -- **IsSuccess** Whether the operation is successful or not -- **ScenarioName** The name of the scenario. - - -### Microsoft.OneDrive.Sync.Setup.OSUpgradeInstallationOperation - -This event is related to the OS version when the OS is upgraded with OneDrive installed. - -The following fields are available: - -- **CurrentOneDriveVersion** The current version of OneDrive. -- **CurrentOSBuildBranch** The current branch of the operating system. -- **CurrentOSBuildNumber** The current build number of the operating system. -- **CurrentOSVersion** The current version of the operating system. -- **HResult** The HResult of the operation. -- **SourceOSBuildBranch** The source branch of the operating system. -- **SourceOSBuildNumber** The source build number of the operating system. -- **SourceOSVersion** The source version of the operating system. - - -### Microsoft.OneDrive.Sync.Setup.RegisterStandaloneUpdaterAPIOperation - -This event is related to registering or unregistering the OneDrive update task. - -The following fields are available: - -- **APIName** The name of the API. -- **IsSuccess** Was the operation successful? -- **RegisterNewTaskResult** The HResult of the RegisterNewTask operation. -- **ScenarioName** The name of the scenario. -- **UnregisterOldTaskResult** The HResult of the UnregisterOldTask operation. - - -### Microsoft.OneDrive.Sync.Updater.ComponentInstallState - -This event includes basic data about the installation state of dependent OneDrive components. - -The following fields are available: - -- **ComponentName** The name of the dependent component. -- **isInstalled** Is the dependent component installed? - - -### Microsoft.OneDrive.Sync.Updater.OverlayIconStatus - -This event indicates if the OneDrive overlay icon is working correctly. 0 = healthy; 1 = can be fixed; 2 = broken - -The following fields are available: - -- **32bit** The status of the OneDrive overlay icon on a 32-bit operating system. -- **64bit** The status of the OneDrive overlay icon on a 64-bit operating system. - - -### Microsoft.OneDrive.Sync.Updater.UpdateOverallResult - -This event sends information describing the result of the update. - -The following fields are available: - -- **br** No content is currently available. -- **hr** The HResult of the operation. -- **IsLoggingE~abled** No content is currently available. -- **IsLoggingEnabled** Indicates whether logging is enabled for the updater. -- **UpdaterVersion** The version of the updater. - - -### Microsoft.OneDrive.Sync.Updater.UpdateXmlDownloadHResult - -This event determines the status when downloading the OneDrive update configuration file. - -The following fields are available: - -- **hr** The HResult of the operation. - - -### Microsoft.OneDrive.Sync.Updater.WebConnectionStatus - -This event determines the error code that was returned when verifying Internet connectivity. - -The following fields are available: - -- **winInetError** The HResult of the operation. - - -## Privacy consent logging events - -### Microsoft.Windows.Shell.PrivacyConsentLogging.PrivacyConsentCompleted - -This event is used to determine whether the user successfully completed the privacy consent experience. - -The following fields are available: - -- **presentationVersion** Which display version of the privacy consent experience the user completed -- **privacyConsentState** The current state of the privacy consent experience -- **settingsVersion** Which setting version of the privacy consent experience the user completed -- **userOobeExitReason** The exit reason of the privacy consent experience - - -### Microsoft.Windows.Shell.PrivacyConsentLogging.PrivacyConsentStatus - -Event tells us effectiveness of new privacy experience. - -The following fields are available: - -- **isAdmin** whether the person who is logging in is an admin -- **isExistingUser** whether the account existed in a downlevel OS -- **isLaunching** Whether or not the privacy consent experience will be launched -- **isSilentElevation** whether the user has most restrictive UAC controls -- **privacyConsentState** whether the user has completed privacy experience -- **userRegionCode** The current user's region setting - - -### wilActivity - -This event provides a Windows Internal Library context used for Product and Service diagnostics. - -The following fields are available: - -- **callContext** The function where the failure occurred. -- **currentContextId** The ID of the current call context where the failure occurred. -- **currentContextMessage** The message of the current call context where the failure occurred. -- **currentContextName** The name of the current call context where the failure occurred. -- **failureCount** The number of failures for this failure ID. -- **failureId** The ID of the failure that occurred. -- **failureType** The type of the failure that occurred. -- **fileName** The file name where the failure occurred. -- **function** The function where the failure occurred. -- **hresult** The HResult of the overall activity. -- **lineNumber** The line number where the failure occurred. -- **message** The message of the failure that occurred. -- **module** The module where the failure occurred. -- **originatingContextId** The ID of the originating call context that resulted in the failure. -- **originatingContextMessage** The message of the originating call context that resulted in the failure. -- **originatingContextName** The name of the originating call context that resulted in the failure. -- **threadId** The ID of the thread on which the activity is executing. - - -## Sediment events - -### Microsoft.Windows.Sediment.Info.DetailedState - -This event is sent when detailed state information is needed from an update trial run. - -The following fields are available: - -- **Data** Data relevant to the state, such as what percent of disk space the directory takes up. -- **Id** Identifies the trial being run, such as a disk related trial. -- **ReleaseVer** The version of the component. -- **State** The state of the reporting data from the trial, such as the top-level directory analysis. -- **Time** The time the event was fired. - - -### Microsoft.Windows.Sediment.Info.Error - -This event indicates an error in the updater payload. This information assists in keeping Windows up to date. - -The following fields are available: - -- **FailureType** The type of error encountered. -- **FileName** The code file in which the error occurred. -- **HResult** The failure error code. -- **LineNumber** The line number in the code file at which the error occurred. -- **ReleaseVer** The version information for the component in which the error occurred. -- **Time** The system time at which the error occurred. - - -### Microsoft.Windows.Sediment.Info.PhaseChange - -The event indicates progress made by the updater. This information assists in keeping Windows up to date. - -The following fields are available: - -- **NewPhase** The phase of progress made. -- **ReleaseVer** The version information for the component in which the change occurred. -- **Time** The system time at which the phase chance occurred. - - -## Setup events - -### SetupPlatformTel.SetupPlatformTelActivityEvent - -This event sends basic metadata about the SetupPlatform update installation process, to help keep Windows up to date. - -The following fields are available: - -- **FieldName** Retrieves the event name/data point. Examples: InstallStartTime, InstallEndtime, OverallResult etc. -- **GroupName** Retrieves the groupname the event belongs to. Example: Install Information, DU Information, Disk Space Information etc. -- **Value** Value associated with the corresponding event name. For example, time-related events will include the system time - - -### SetupPlatformTel.SetupPlatformTelActivityStarted - -This event sends basic metadata about the update installation process generated by SetupPlatform to help keep Windows up to date. - -The following fields are available: - -- **Name** The name of the dynamic update type. Example: GDR driver - - -### SetupPlatformTel.SetupPlatformTelActivityStopped - -This event sends basic metadata about the update installation process generated by SetupPlatform to help keep Windows up to date. - - - -### SetupPlatformTel.SetupPlatformTelEvent - -This service retrieves events generated by SetupPlatform, the engine that drives the various deployment scenarios. - -The following fields are available: - -- **FieldName** Retrieves the event name/data point. Examples: InstallStartTime, InstallEndtime, OverallResult etc. -- **GroupName** Retrieves the groupname the event belongs to. Example: Install Information, DU Information, Disk Space Information etc. -- **Value** Retrieves the value associated with the corresponding event name (Field Name). For example: For time related events this will include the system time. - - -## Software update events - -### SoftwareUpdateClientTelemetry.CheckForUpdates - -Scan process event on Windows Update client. See the EventScenario field for specifics (started/failed/succeeded). - -The following fields are available: - -- **ActivityMatchingId** Contains a unique ID identifying a single CheckForUpdates session from initialization to completion. -- **AllowCachedResults** Indicates if the scan allowed using cached results. -- **ApplicableUpdateInfo** Metadata for the updates which were detected as applicable -- **BiosFamily** The family of the BIOS (Basic Input Output System). -- **BiosName** The name of the device BIOS. -- **BiosReleaseDate** The release date of the device BIOS. -- **BiosSKUNumber** The sku number of the device BIOS. -- **BIOSVendor** The vendor of the BIOS. -- **BiosVersion** The version of the BIOS. -- **BranchReadinessLevel** The servicing branch configured on the device. -- **CachedEngineVersion** For self-initiated healing, the version of the SIH engine that is cached on the device. If the SIH engine does not exist, the value is null. -- **CallerApplicationName** The name provided by the caller who initiated API calls into the software distribution client. -- **CapabilityDetectoidGuid** The GUID for a hardware applicability detectoid that could not be evaluated. -- **CDNCountryCode** Two letter country abbreviation for the Content Distribution Network (CDN) location. -- **CDNId** The unique identifier of a specific device, used to identify how many devices are encountering success or a particular issue. -- **ClientVersion** The version number of the software distribution client. -- **CommonProps** A bitmask for future flags associated with the Windows Update client behavior. No data is currently reported in this field. Expected value for this field is 0. -- **Context** Gives context on where the error has occurred. Example: AutoEnable, GetSLSData, AddService, Misc, or Unknown -- **CurrentMobileOperator** The mobile operator the device is currently connected to. -- **DeferralPolicySources** Sources for any update deferral policies defined (GPO = 0x10, MDM = 0x100, Flight = 0x1000, UX = 0x10000). -- **DeferredUpdates** Update IDs which are currently being deferred until a later time -- **DeviceModel** What is the device model. -- **DriverError** The error code hit during a driver scan. This is 0 if no error was encountered. -- **DriverExclusionPolicy** Indicates if the policy for not including drivers with Windows Update is enabled. -- **DriverGxclusionPolicy** No content is currently available. -- **DriverSyncPassPerformed** Were drivers scanned this time? -- **EventInstanceID** A globally unique identifier for event instance. -- **EventScenario** Indicates the purpose of sending this event - whether because the software distribution just started checking for content, or whether it was cancelled, succeeded, or failed. -- **ExtendedMetadataCabUrl** Hostname that is used to download an update. -- **ExtendedStatusCode** Secondary error code for certain scenarios where StatusCode wasn't specific enough. -- **FailedUpdateGuids** The GUIDs for the updates that failed to be evaluated during the scan. -- **FailedUpdatesCount** The number of updates that failed to be evaluated during the scan. -- **FeatureUpdateDeferral** The deferral period configured for feature OS updates on the device (in days). -- **FeatureUpdatePause** Indicates whether feature OS updates are paused on the device. -- **FeatureUpdatePause9-8iod** No content is currently available. -- **FeatureUpdatePausePeriod** The pause duration configured for feature OS updates on the device (in days). -- **FlightBranch** The branch that a device is on if participating in flighting (pre-release builds). -- **FlightRing** The ring (speed of getting builds) that a device is on if participating in flighting (pre-release builds). -- **HomeMobileOperator** The mobile operator that the device was originally intended to work with. -- **I#Version** No content is currently available. -- **IntentPFNs** Intended application-set metadata for atomic update scenarios. -- **IPVersion** Indicates whether the download took place over IPv4 or IPv6 -- **IsWUfBDualScanEnabled** Indicates if Windows Update for Business dual scan is enabled on the device. -- **IsWUfBDualScaninabled** No content is currently available. -- **IsWUfBEnabled** Indicates if Windows Update for Business is enabled on the device. -- **IsWUfBFederatedScanDisabled** Indicates if Windows Update for Business federated scan is disabled on the device. -- **IsWUfBinabled** No content is currently available. -- **MetadataIntegrityMode** The mode of the update transport metadata integrity check. 0-Unknown, 1-Ignoe, 2-Audit, 3-Enforce -- **MSIError** The last error that was encountered during a scan for updates. -- **NetworkConnectivityDetected** Indicates the type of network connectivity that was detected. 0 - IPv4, 1 - IPv6 -- **NumberOfApplicableUpdates** The number of updates which were ultimately deemed applicable to the system after the detection process is complete -- **NumberOfApplicationsCategoryScanEval}ated** No content is currently available. -- **NumberOfApplicationsCategoryScanEvaluated** The number of categories (apps) for which an app update scan checked -- **NumberOfLoop** The number of round trips the scan required -- **NumberOfNewUpdatesFromServiceSync** The number of updates which were seen for the first time in this scan -- **NumberOfUpdatesEvaluated** The total number of updates which were evaluated as a part of the scan -- **NumFailedMetadataSignatures** The number of metadata signatures checks which failed for new metadata synced down. -- **Online** Indicates if this was an online scan. -- **PausedUpdates** A list of UpdateIds which that currently being paused. -- **PauseFeatureUpdatesEndTime** If feature OS updates are paused on the device, this is the date and time for the end of the pause time window. -- **PauseFeatureUpdatesStartTime** If feature OS updates are paused on the device, this is the date and time for the beginning of the pause time window. -- **PauseQualityUpdatesEndTime** If quality OS updates are paused on the device, this is the date and time for the end of the pause time window. -- **PauseQualityUpdatesStartTime** If quality OS updates are paused on the device, this is the date and time for the beginning of the pause time window. -- **PhonePreviewEnabled** Indicates whether a phone was getting preview build, prior to flighting (pre-release builds) being introduced. -- **ProcessName** The process name of the caller who initiated API calls, in the event where CallerApplicationName was not provided. -- **QualityUpdateDeferral** The deferral period configured for quality OS updates on the device (in days). -- **QualityUpdatePause** Indicates whether quality OS updates are paused on the device. -- **QualityUpdatePause9-8iod** No content is currently available. -- **QualityUpdatePausePeriod** The pause duration configured for quality OS updates on the device (in days). -- **RelatedCV** The previous Correlation Vector that was used before swapping with a new one -- **S}ncType** No content is currently available. -- **ScanDuratioInSeconds** No content is currently available. -- **ScanDurationInSeconds** The number of seconds a scan took -- **ScanEnqueueTime** The number of seconds it took to initialize a scan -- **ScanPrps** No content is currently available. -- **ScanProps** This is a 32-bit integer containing Boolean properties for a given Windows Update scan. The following bits are used; all remaining bits are reserved and set to zero. Bit 0 (0x1): IsInteractive - is set to 1 if the scan is requested by a user, or 0 if the scan is requested by Automatic Updates. Bit 1 (0x2): IsSeeker - is set to 1 if the Windows Update client's Seeker functionality is enabled. Seeker functionality is enabled on certain interactive scans, and results in the scans returning certain updates that are in the initial stages of release (not yet released for full adoption via Automatic Updates). -- **ServiceGuid** An ID which represents which service the software distribution client is checking for content (Windows Update, Microsoft Store, etc.). -- **ServiceUrl** The environment URL a device is configured to scan with -- **ShippingMobileOperator** The mobile operator that a device shipped on. -- **StatusCode** Indicates the result of a CheckForUpdates event (success, cancellation, failure code HResult). -- **SyncType** Describes the type of scan the event was -- **SystemBIOSMajorRelease** Major version of the BIOS. -- **SystemBIOSMinorRelease** Minor version of the BIOS. -- **TargetMetadataVersion** For self-initiated healing, this is the target version of the SIH engine to download (if needed). If not, the value is null. -- **TotalNumMetadataSignatureM** No content is currently available. -- **TotalNumMetadataSignatures** The total number of metadata signatures checks done for new metadata that was synced down. -- **WebServiceRetryMethods** Web service method requests that needed to be retried to complete operation. -- **WUDeviceID** The unique identifier of a specific device, used to identify how many devices are encountering success or a particular issue. - - -### SoftwareUpdateClientTelemetry.Commit - -This event tracks the commit process post the update installation when software update client is trying to update the device. - -The following fields are available: - -- **BiosFamily** Device family as defined in the system BIOS -- **BiosName** Name of the system BIOS -- **BiosReleaseDate** Release date of the system BIOS -- **BiosSKUNumber** Device SKU as defined in the system BIOS -- **BIOSVendor** Vendor of the system BIOS -- **BiosVersion** Version of the system BIOS -- **BundleId** Identifier associated with the specific content bundle; should not be all zeros if the bundleID was found. -- **BundleRevisionNumber** Identifies the revision number of the content bundle -- **CallerApplicationName** Name provided by the caller who initiated API calls into the software distribution client -- **ClientVersion** Version number of the software distribution client -- **DeploymentProviderMode** The mode of operation of the update deployment provider. -- **DeviceModel** Device model as defined in the system bios -- **EventInstanceID** A globally unique identifier for event instance -- **EventScenario** Indicates the purpose of the event - whether because scan started, succeded, failed, etc. -- **EventType** Possible values are "Child", "Bundle", "Relase" or "Driver". -- **FlightId** The specific id of the flight the device is getting -- **HandlerType** Indicates the kind of content (app, driver, windows patch, etc.) -- **RevisionNumber** Identifies the revision number of this specific piece of content -- **ServiceGuid** A unique identifier for the service that the software distribution client is installing content for (Windows Update, Microsoft Store, etc). -- **SystemBIOSMajorRelease** Major release version of the system bios -- **SystemBIOSMinorRelease** Minor release version of the system bios -- **UpdateId** Identifier associated with the specific piece of content -- **WUDeviceID** Unique device id controlled by the software distribution client - - -### SoftwareUpdateClientTelemetry.Download - -Download process event for target update on Windows Update client. See the EventScenario field for specifics (started/failed/succeeded). - -The following fields are available: - -- **ActiveDownloadTime** How long the download took, in seconds, excluding time where the update wasn't actively being downloaded. -- **AppXBlockHashFailures** Indicates the number of blocks that failed hash validation during download of the app payload. -- **AppXBlockHashValidationFailureCount** A count of the number of blocks that have failed validation after being downloaded. -- **AppXDownloadScope** Indicates the scope of the download for application content. -- **AppXScope** Indicates the scope of the app download. -- **aundleBy1esDownl?aded** No content is currently available. -- **B1ndleRepeatFailCount** No content is currently available. -- **BiosFamily** The family of the BIOS (Basic Input Output System). -- **BiosName** The name of the device BIOS. -- **BiosReleaseDate** The release date of the device BIOS. -- **BiosSKUNumber** The sku number of the device BIOS. -- **BIOSVendor** The vendor of the BIOS. -- **BiosVersion** The version of the BIOS. -- **BundleBytesDownloaded** Number of bytes downloaded for the specific content bundle. -- **BundleId** Identifier associated with the specific content bundle. -- **BundleRepeatFailCount** Indicates whether this particular update bundle has previously failed. -- **BundleRepeatFailFlag** Indicates whether this particular update bundle previously failed to download. -- **BundleRevisionNumber** Identifies the revision number of the content bundle. -- **BytesDownloaded** Number of bytes that were downloaded for an individual piece of content (not the entire bundle). -- **CachedEngineVersion** The version of the “Self-Initiated Healing” (SIH) engine that is cached on the device, if applicable. -- **CallerApplicationName** The name provided by the application that initiated API calls into the software distribution client. -- **Cbs5ethod** No content is currently available. -- **CbsDownloadMethod** Indicates whether the download was a full- or a partial-file download. -- **CbsMethod** The method used for downloading the update content related to the Component Based Servicing (CBS) technology. -- **CDNCountryCode** Two letter country abbreviation for the Content Distribution Network (CDN) location. -- **CDNId** ID which defines which CDN the software distribution client downloaded the content from. -- **ClientVersion** The version number of the software distribution client. -- **CommonProps** A bitmask for future flags associated with the Windows Update client behavior. -- **ConnectTime** Indicates the cumulative amount of time (in seconds) it took to establish the connection for all updates in an update bundle. -- **CurrentMobileOperator** The mobile operator the device is currently connected to. -- **DeviceModel** The model of the device. -- **DownloadPriority** Indicates whether a download happened at background, normal, or foreground priority. -- **DownloadProps** Information about the download operation properties in the form of a bitmask. -- **DownloadType** Differentiates the download type of “Self-Initiated Healing” (SIH) downloads between Metadata and Payload downloads. -- **EventInstanceID** A globally unique identifier for event instance. -- **EventScenarao** No content is currently available. -- **EventScenario** Indicates the purpose for sending this event: whether because the software distribution just started downloading content; or whether it was cancelled, succeeded, or failed. -- **EventType** Identifies the type of the event (Child, Bundle, or Driver). -- **ExtendedStatusCode** Secondary error code for certain scenarios where StatusCode wasn't specific enough. -- **FeatureUpdatePause** Indicates whether feature OS updates are paused on the device. -- **FlightBranch** The branch that a device is on if participating in flighting (pre-release builds). -- **flightBuildNumber** No content is currently available. -- **FlightBuildNumber** If this download was for a flight (pre-release build), this indicates the build number of that flight. -- **FlightId** The specific ID of the flight (pre-release build) the device is getting. -- **FlightRing** The ring (speed of getting builds) that a device is on if participating in flighting (pre-release builds). -- **HandlerType** Indicates what kind of content is being downloaded (app, driver, windows patch, etc.). -- **HardwareId** If this download was for a driver targeted to a particular device model, this ID indicates the model of the device. -- **HomeMobileOperator** The mobile operator that the device was originally intended to work with. -- **HostName** The hostname URL the content is downloading from. -- **IPVersion** Indicates whether the download took place over IPv4 or IPv6. -- **IsDependentSet** Indicates whether a driver is a part of a larger System Hardware/Firmware Update -- **IsWUfBDualScanEnabled** Indicates if Windows Update for Business dual scan is enabled on the device. -- **IsWUfBEnabled** Indicates if Windows Update for Business is enabled on the device. -- **IsWVfBDualScanEnabled** No content is currently available. -- **IsWVfBEnabled** No content is currently available. -- **NetworkCost** A flag indicating the cost of the network (congested, fixed, variable, over data limit, roaming, etc.) used for downloading the update content. -- **NetworkCostBitMask** Indicates what kind of network the device is connected to (roaming, metered, over data cap, etc.) -- **NetworkRestrictionStatus** More general version of NetworkCostBitMask, specifying whether Windows considered the current network to be "metered." -- **PackageFullName** The package name of the content. -- **PhonePreviewEnabled** Indicates whether a phone was opted-in to getting preview builds, prior to flighting (pre-release builds) being introduced. -- **PostDnldTime** Time (in seconds) taken to signal download completion after the last job completed downloading the payload. -- **ProcessName** The process name of the application that initiated API calls, in the event where CallerApplicationName was not provided. -- **QualityUpdatePause** Indicates whether quality OS updates are paused on the device. -- **Reason** A 32-bit integer representing the reason the update is blocked from being downloaded in the background. -- **RegulationReason** The reason that the update is regulated -- **RegulationReóult** No content is currently available. -- **RegulationResult** The result code (HResult) of the last attempt to contact the regulation web service for download regulation of update content. -- **RelatedCV** The Correlation Vector that was used before the most recent change to a new Correlation Vector. -- **RelqtedCV** No content is currently available. -- **RepeatFailCount** Indicates whether this specific content has previously failed. -- **RepeatFailFlag** Indicates whether this specific content previously failed to download. -- **RevisionNumber** The revision number of the specified piece of content. -- **ServiceGuid** A unique identifier for the service that the software distribution client is installing content for (Windows Update, Microsoft Store, etc). -- **Setup360Phase** Identifies the active phase of the upgrade download if the current download is for an Operating System upgrade. -- **ShippingMobileOperator** The mobile operator linked to the device when the device shipped. -- **SizeCalcTime** Time (in seconds) taken to calculate the total download size of the payload. -- **StatusCode** Indicates the result of a Download event (success, cancellation, failure code HResult). -- **SystemBIOSMajorRelease** Major version of the BIOS. -- **SystemBIOSMinorRelease** Minor version of the BIOS. -- **TargetGroupId** For drivers targeted to a specific device model, this ID indicates the distribution group of devices receiving that driver. -- **TargetingVersion** For drivers targeted to a specific device model, this is the version number of the drivers being distributed to the device. -- **TargetMetadataVersion** The version of the currently downloading (or most recently downloaded) package. -- **ThrottlingServiceHResult** Result code (success/failure) while contacting a web service to determine whether this device should download content yet. -- **TimeToEstablishConnection** Time (in milliseconds) it took to establish the connection prior to beginning downloaded. -- **TotalEx8ectedBydes** No content is currently available. -- **TotalExpectedBytes** The total size (in Bytes) expected to be downloaded. -- **UpdateId** An identifier associated with the specific piece of content. -- **UpdateID** An identifier associated with the specific piece of content. -- **UpdateImportance** Indicates whether the content was marked as Important, Recommended, or Optional. -- **UsecDO** No content is currently available. -- **UsedDO** Indicates whether the download used the Delivery Optimization (DO) service. -- **UsedSystemVolume** Indicates whether the content was downloaded to the device's main system storage drive, or an alternate storage drive. -- **WUDeviceID** The unique identifier of a specific device, used to identify how many devices are encountering success or a particular issue. -- **YsWUfBEnabled** No content is currently available. - - -### SoftwareUpdateClientTelemetry.DownloadCheckpoint - -This event provides a checkpoint between each of the Windows Update download phases for UUP content - -The following fields are available: - -- **CallerApplicationName** The name provided by the caller who initiated API calls into the software distribution client -- **ClientVersion** The version number of the software distribution client -- **EventScenario** Indicates the purpose of sending this event - whether because the software distribution just started checking for content, or whether it was cancelled, succeeded, or failed -- **EventType** Possible values are "Child", "Bundle", "Relase" or "Driver" -- **ExtendedStatusCode** Secondary error code for certain scenarios where StatusCode wasn't specific enough -- **FileId** A hash that uniquely identifies a file -- **FileName** Name of the downloaded file -- **FlightId** The unique identifier for each flight -- **RelatedCV** The previous Correlation Vector that was used before swapping with a new one -- **RevisionNumber** Unique revision number of Update -- **ServiceGuid** An ID which represents which service the software distribution client is checking for content (Windows Update, Microsoft Store, etc.) -- **StatusCode** Indicates the result of a CheckForUpdates event (success, cancellation, failure code HResult) -- **UpdateId** Unique Update ID -- **WUDeviceID** The unique identifier of a specific device, used to identify how many devices are encountering success or a particular issue - - -### SoftwareUpdateClientTelemetry.DownloadHeartbeat - -This event allows tracking of ongoing downloads and contains data to explain the current state of the download - -The following fields are available: - -- **BytesTotal** Total bytes to transfer for this content -- **BytesTransferred** Total bytes transferred for this content at the time of heartbeat -- **CallerApplicationName** Name provided by the caller who initiated API calls into the software distribution client -- **ClientVersion** The version number of the software distribution client -- **ConnectionStatus** Indicates the connectivity state of the device at the time of heartbeat -- **CurrentError** Last (transient) error encountered by the active download -- **DownloadFlags** Flags indicating if power state is ignored -- **DownloadState** Current state of the active download for this content (queued, suspended, or progressing) -- **EventType** Possible values are "Child", "Bundle", or "Driver" -- **FlightId** The unique identifier for each flight -- **IsNetworkMetered** Indicates whether Windows considered the current network to be ?metered" -- **MOAppDownloadLimit** Mobile operator cap on size of application downloads, if any -- **MOUpdateDownloadLimit** Mobile operator cap on size of operating system update downloads, if any -- **PowerState** Indicates the power state of the device at the time of heartbeart (DC, AC, Battery Saver, or Connected Standby) -- **RelatedCV** The previous correlation vector that was used by the client, before swapping with a new one -- **ResumeCount** Number of times this active download has resumed from a suspended state -- **RevisionNumber** Identifies the revision number of this specific piece of content -- **ServiceGuid** Identifier for the service to which the software distribution client is connecting (Windows Update, Microsoft Store, etc) -- **SuspendCount** Number of times this active download has entered a suspended state -- **SuspendReason** Last reason for why this active download entered a suspended state -- **UpdateId** Identifier associated with the specific piece of content -- **WUDeviceID** Unique device id controlled by the software distribution client - - -### SoftwareUpdateClientTelemetry.Install - -This event sends tracking data about the software distribution client installation of the content for that update, to help keep Windows up to date. - -The following fields are available: - -- **BiosFamily** The family of the BIOS (Basic Input Output System). -- **BiosName** The name of the device BIOS. -- **BiosReleaseDate** The release date of the device BIOS. -- **BiosSKUNumber** The sku number of the device BIOS. -- **BIOSVendor** The vendor of the BIOS. -- **BiosVersion** The version of the BIOS. -- **BundleId** Identifier associated with the specific content bundle; should not be all zeros if the bundleID was found. -- **BundleRepeatFailCount** Indicates whether this particular update bundle has previously failed. -- **BundleRepeatFailFlag** Indicates whether this particular update bundle previously failed to install. -- **BundleRevisionNumber** Identifies the revision number of the content bundle. -- **CachedEngineVersion** For self-initiated healing, the version of the SIH engine that is cached on the device. If the SIH engine does not exist, the value is null. -- **CallerApplicationName** The name provided by the caller who initiated API calls into the software distribution client. -- **ClientVersion** The version number of the software distribution client. -- **CommonProps** A bitmask for future flags associated with the Windows Update client behavior. No value is currently reported in this field. Expected value for this field is 0. -- **CSIErrorType** The stage of CBS installation where it failed. -- **CurrentMobileOperator** The mobile operator to which the device is currently connected. -- **DeploymentProviderMode** The mode of operation of the update deployment provider. -- **DeviceModel** The device model. -- **DriverPingBack** Contains information about the previous driver and system state. -- **DriverRecoveryIds** The list of identifiers that could be used for uninstalling the drivers if a recovery is required. -- **EventInstanceID** A globally unique identifier for event instance. -- **EventScenario** Indicates the purpose of sending this event - whether because the software distribution just started installing content, or whether it was cancelled, succeeded, or failed. -- **EventType** Possible values are Child, Bundle, or Driver. -- **ExtendedErrorCode** The extended error code. -- **ExtendedStatusCode** Secondary error code for certain scenarios where StatusCode is not specific enough. -- **FeatureUpdatePause** Indicates whether feature OS updates are paused on the device. -- **FlightBranch** The branch that a device is on if participating in the Windows Insider Program. -- **FlightBuildNumber** If this installation was for a Windows Insider build, this is the build number of that build. -- **FlightId** The specific ID of the Windows Insider build the device is getting. -- **FlightRing** The ring that a device is on if participating in the Windows Insider Program. -- **HandlerType** Indicates what kind of content is being installed (for example, app, driver, Windows update). -- **HardwareId** If this install was for a driver targeted to a particular device model, this ID indicates the model of the device. -- **HomeMobileOperator** The mobile operator that the device was originally intended to work with. -- **InstallProps** A bitmask for future flags associated with the install operation. No value is currently reported in this field. Expected value for this field is 0. -- **IntentPFNs** Intended application-set metadata for atomic update scenarios. -- **IsDependentSet** Indicates whether the driver is part of a larger System Hardware/Firmware update. -- **IsFinalOutcomeEvent** Indicates whether this event signals the end of the update/upgrade process. -- **IsFirmware** Indicates whether this update is a firmware update. -- **IsSuccessFailurePostReboot** Indicates whether the update succeeded and then failed after a restart. -- **IsWUfBDualScanEnabled** Indicates whether Windows Update for Business dual scan is enabled on the device. -- **IsWUfBEnabled** Indicates whether Windows Update for Business is enabled on the device. -- **MergedUpdate** Indicates whether the OS update and a BSP update merged for installation. -- **MsiAction** The stage of MSI installation where it failed. -- **MsiProductCode** The unique identifier of the MSI installer. -- **PackageFullName** The package name of the content being installed. -- **PhonePreviewEnabled** Indicates whether a phone was getting preview build, prior to flighting being introduced. -- **ProcessName** The process name of the caller who initiated API calls, in the event that CallerApplicationName was not provided. -- **QualityUpdatePause** Indicates whether quality OS updates are paused on the device. -- **RelatedCV** The previous Correlation Vector that was used before swapping with a new one -- **RepeatFailCount** Indicates whether this specific piece of content has previously failed. -- **RepeatFailFlag** Indicates whether this specific piece of content previously failed to install. -- **RevisionNumber** The revision number of this specific piece of content. -- **ServiceGuid** An ID which represents which service the software distribution client is installing content for (Windows Update, Microsoft Store, etc.). -- **Setup360Phase** If the install is for an operating system upgrade, indicates which phase of the upgrade is underway. -- **ShippingMobileOperator** The mobile operator that a device shipped on. -- **StatusCode** Indicates the result of an installation event (success, cancellation, failure code HResult). -- **SystemBIOSMajorRelease** Major version of the BIOS. -- **SystemBIOSMinorRelease** Minor version of the BIOS. -- **TargetGroupId** For drivers targeted to a specific device model, this ID indicates the distribution group of devices receiving that driver. -- **Targeti~gVersion** No content is currently available. -- **TargetingVersion** For drivers targeted to a specific device model, this is the version number of the drivers being distributed to the device. -- **TransactionCode** The ID that represents a given MSI installation. -- **UpdateId** Unique update ID. -- **UpdateID** An identifier associated with the specific piece of content. -- **UpdateImportance** Indicates whether a piece of content was marked as Important, Recommended, or Optional. -- **UsedSystemVolume** Indicates whether the content was downloaded and then installed from the device's main system storage drive, or an alternate storage drive. -- **WUDeviceID** The unique identifier of a specific device, used to identify how many devices are encountering success or a particular issue. - - -### SoftwareUpdateClientTelemetry.Revert - -Revert event for target update on Windows Update Client. See EventScenario field for specifics (for example, Started/Failed/Succeeded). - -The following fields are available: - -- **BundleId** Identifier associated with the specific content bundle. Should not be all zeros if the BundleId was found. -- **BundleRepeatFailCount** Indicates whether this particular update bundle has previously failed. -- **BundleRevisionNumber** Identifies the revision number of the content bundle. -- **CallerApplicationName** Name of application making the Windows Update request. Used to identify context of request. -- **ClientVersion** Version number of the software distribution client. -- **CommonProps** A bitmask for future flags associated with the Windows Update client behavior. There is no value being reported in this field right now. Expected value for this field is 0. -- **CSIErrorType** Stage of CBS installation that failed. -- **DriverPingBack** Contains information about the previous driver and system state. -- **DriverRecoveryIds** The list of identifiers that could be used for uninstalling the drivers if a recovery is required. -- **EventInstanceID** A globally unique identifier for event instance. -- **EventScenario** Indicates the purpose of the event (scan started, succeeded, failed, etc.). -- **EventType** Event type (Child, Bundle, Release, or Driver). -- **ExtendedStatusCode** Secondary status code for certain scenarios where StatusCode is not specific enough. -- **FeatureUpdatePause** Indicates whether feature OS updates are paused on the device. -- **FlightBuildNumber** Indicates the build number of the flight. -- **FlightId** The specific ID of the flight the device is getting. -- **HandlerType** Indicates the kind of content (app, driver, windows patch, etc.). -- **HardwareId** If this download was for a driver targeted to a particular device model, this ID indicates the model of the device. -- **IsFinalOutcomeEvent** Indicates whether this event signals the end of the update/upgrade process. -- **IsFirmware** Indicates whether an update was a firmware update. -- **IsSuccessFailurePostReboot** Indicates whether an initial success was a failure after a reboot. -- **IsWUfBDualScanEnabled** Flag indicating whether WU-for-Business dual scan is enabled on the device. -- **IsWUfBEnabled** Flag indicating whether WU-for-Business is enabled on the device. -- **MergedUpdate** Indicates whether an OS update and a BSP update were merged for install. -- **ProcessName** Process name of the caller who initiated API calls into the software distribution client. -- **QualityUpdatePause** Indicates whether quality OS updates are paused on the device. -- **RelatedCV** The previous correlation vector that was used by the client before swapping with a new one. -- **RepeatFailCount** Indicates whether this specific piece of content has previously failed. -- **RevisionNumber** Identifies the revision number of this specific piece of content. -- **ServiceGuid** A unique identifier for the service that the software distribution client is installing content for (Windows Update, Microsoft Store, etc). -- **StatusCode** Result code of the event (success, cancellation, failure code HResult). -- **TargetGroupId** For drivers targeted to a specific device model, this ID indicates the distribution group of devices receiving that driver. -- **TargetingVersion** For drivers targeted to a specific device model, this is the version number of the drivers being distributed to the device. -- **UpdateId** The identifier associated with the specific piece of content. -- **UpdateImportance** Indicates the importance of a driver, and why it received that importance level (0-Unknown, 1-Optional, 2-Important-DNF, 3-Important-Generic, 4-Important-Other, 5-Recommended). -- **UsedSystemVolume** Indicates whether the device's main system storage drive or an alternate storage drive was used. -- **WUDeviceID** Unique device ID controlled by the software distribution client. - - -### SoftwareUpdateClientTelemetry.TaskRun - -Start event for Server Initiated Healing client. See EventScenario field for specifics (for example, started/completed). - -The following fields are available: - -- **CallerApplicationName** Name of application making the Windows Update request. Used to identify context of request. -- **ClientVersion** Version number of the software distribution client. -- **CmdLineArgs** Command line arguments passed in by the caller. -- **EventInstanceID** A globally unique identifier for the event instance. -- **EventScenario** Indicates the purpose of the event (scan started, succeeded, failed, etc.). -- **ServiceGuid** Identifier for the service to which the software distribution client is connecting (Windows Update, Microsoft Store, etc.). -- **StatusCode** Result code of the event (success, cancellation, failure code HResult). -- **WUDeviceID** Unique device ID controlled by the software distribution client. - - -### SoftwareUpdateClientTelemetry.Uninstall - -Uninstall event for target update on Windows Update Client. See EventScenario field for specifics (for example, Started/Failed/Succeeded). - -The following fields are available: - -- **BundleId** The identifier associated with the specific content bundle. This should not be all zeros if the bundleID was found. -- **BundleRepeatFailCount** Indicates whether this particular update bundle previously failed. -- **BundleRevisionNumber** Identifies the revision number of the content bundle. -- **CallerApplicationName** Name of the application making the Windows Update request. Used to identify context of request. -- **ClientVersion** Version number of the software distribution client. -- **CommonProps** A bitmask for future flags associated with the Windows Update client behavior. There is no value being reported in this field right now. Expected value for this field is 0. -- **DriverPingBack** Contains information about the previous driver and system state. -- **DriverRecoveryIds** The list of identifiers that could be used for uninstalling the drivers when a recovery is required. -- **EventInstanceID** A globally unique identifier for event instance. -- **EventScenario** Indicates the purpose of the event (a scan started, succeded, failed, etc.). -- **EventType** Indicates the event type. Possible values are "Child", "Bundle", "Release" or "Driver". -- **ExtendedStatusCode** Secondary status code for certain scenarios where StatusCode is not specific enough. -- **FeatureUpdatePause** Indicates whether feature OS updates are paused on the device. -- **FlightBuildNumber** Indicates the build number of the flight. -- **FlightId** The specific ID of the flight the device is getting. -- **HandlerType** Indicates the kind of content (app, driver, windows patch, etc.). -- **HardwareId** If the download was for a driver targeted to a particular device model, this ID indicates the model of the device. -- **IsFinalOutcomeEvent** Indicates whether this event signals the end of the update/upgrade process. -- **IsFirmware** Indicates whether an update was a firmware update. -- **IsSuccessFailurePostReboot** Indicates whether an initial success was then a failure after a reboot. -- **IsWUfBDualScanEnabled** Flag indicating whether WU-for-Business dual scan is enabled on the device. -- **IsWUfBEnabled** Flag indicating whether WU-for-Business is enabled on the device. -- **MergedUpdate** Indicates whether an OS update and a BSP update were merged for install. -- **ProcessName** Process name of the caller who initiated API calls into the software distribution client. -- **QualityUpdatePause** Indicates whether quality OS updates are paused on the device. -- **RelatedCV** The previous correlation vector that was used by the client before swapping with a new one. -- **RepeatFailCount** Indicates whether this specific piece of content previously failed. -- **RevisionNumber** Identifies the revision number of this specific piece of content. -- **ServiceGuid** A unique identifier for the service that the software distribution client is installing content for (Windows Update, Microsoft Store, etc). -- **StatusCode** Result code of the event (success, cancellation, failure code HResult). -- **TargetGroupId** For drivers targeted to a specific device model, this ID indicates the distribution group of devices receiving that driver. -- **TargetingVersion** For drivers targeted to a specific device model, this is the version number of the drivers being distributed to the device. -- **UpdateId** Identifier associated with the specific piece of content. -- **UpdateImportance** Indicates the importance of a driver and why it received that importance level (0-Unknown, 1-Optional, 2-Important-DNF, 3-Important-Generic, 4-Important-Other, 5-Recommended). -- **UsedSystemVolume** Indicates whether the device’s main system storage drive or an alternate storage drive was used. -- **WUDeviceID** Unique device ID controlled by the software distribution client. - - -### SoftwareUpdateClientTelemetry.UpdateDetected - -This event sends data about an AppX app that has been updated from the Microsoft Store, including what app needs an update and what version/architecture is required, in order to understand and address problems with apps getting required updates. - -The following fields are available: - -- **ApplicableUpdateInfo** Metadata for the updates which were detected as applicable. -- **CallerApplicationName** The name provided by the caller who initiated API calls into the software distribution client. -- **IntentPFNs** Intended application-set metadata for atomic update scenarios. -- **NumberOfA0plicableUpdates** No content is currently available. -- **NumberOfApplicableUpdates** The number of updates ultimately deemed applicable to the system after the detection process is complete. -- **RelatedCV** The previous Correlation Vector that was used before swapping with a new one. -- **ServiceGuid** An ID that represents which service the software distribution client is connecting to (Windows Update, Microsoft Store, etc.). -- **WUDeviceID** The unique device ID controlled by the software distribution client. - - -### SoftwareUpdateClientTelemetry.UpdateMetadataIntegrity - -Ensures Windows Updates are secure and complete. Event helps to identify whether update content has been tampered with and protects against man-in-the-middle attack. - -The following fields are available: - -- **CallerApplicationName** Name of application making the Windows Update request. Used to identify context of request. -- **EndpointUrl** URL of the endpoint where client obtains update metadata. Used to identify test vs staging vs production environments. -- **EventScenario** Indicates the purpose of the event - whether because scan started, succeded, failed, etc. -- **ExtendedStatusCode** Secondary status code for certain scenarios where StatusCode was not specific enough. -- **LeafCertId** The integral ID from the FragmentSigning data for the certificate that failed. -- **ListOfSHA256OfIntermediateCerData** A semicolon delimited list of base64 encoding of hashes for the Base64CerData in the FragmentSigning data of an intermediate certificate. -- **MetadataIntegrityMode** Mode of update transport metadata integrity check. 0-Unknown, 1-Ignoe, 2-Audit, 3-Enforce -- **MetadataSignature** A base64-encoded string of the signature associated with the update metadata (specified by revision ID). -- **RawMode** The raw unparsed mode string from the SLS response. This field is null if not applicable. -- **RawValidityWindowInDays** The raw unparsed validity window string in days of the timestamp token. This field is null if not applicable. -- **RevisionId** The revision ID for a specific piece of content. -- **RevisionNumber** The revision number for a specific piece of content. -- **ServiceGuid** Identifies the service to which the software distribution client is connected, Example: Windows Update or Microsoft Store -- **SHA256OfLeafCerData** A base64 encoding of the hash for the Base64CerData in the FragmentSigning data of the leaf certificate. -- **SHA256OfLeafCertPublicKey** A base64 encoding of the hash of the Base64CertData in the FragmentSigning data of the leaf certificate. -- **SHA256OfTimestampToken** An encoded string of the timestamp token. -- **SignatureAlgorithm** The hash algorithm for the metadata signature. -- **SLSPrograms** A test program a machine may be opted in. Examples include "Canary" and "Insider Fast". -- **StatusCode** Result code of the event (success, cancellation, failure code HResult) -- **TimestampTokenCertThumbprint** The thumbprint of the encoded timestamp token. -- **TimestampTokenId** The time this was created. It is encoded in a timestamp blob and will be zero if the token is malformed. -- **UpdateId** The update ID for a specific piece of content. -- **ValidityWindowInDays** The validity window that's in effect when verifying the timestamp. - - -## System Resource Usage Monitor events - -### Microsoft.Windows.Srum.Sdp.CpuUsage - -This event provides information on CPU usage. - -The following fields are available: - -- **UsageMax** The maximum of hourly average CPU usage. -- **UsageMean** The mean of hourly average CPU usage. -- **UsageMedian** The median of hourly average CPU usage. -- **UsageTwoHourMaxMean** The mean of the maximum of every two hour of hourly average CPU usage. -- **UsageTwoHourMedianMean** The mean of the median of every two hour of hourly average CPU usage. - - -### Microsoft.Windows.Srum.Sdp.NetworkUsage - -This event provides information on network usage. - -The following fields are available: - -- **AdapterGuid** The unique ID of the adapter. -- **BytesTotalMax** The maximum of the hourly average bytes total. -- **BytesTotalMean** The mean of the hourly average bytes total. -- **BytesTotalMedian** The median of the hourly average bytes total. -- **BytesTotalTwoHourMaxMean** The mean of the maximum of every two hours of hourly average bytes total. -- **BytesTotalTwoHourMedianMean** The mean of the median of every two hour of hourly average bytes total. -- **LinkSpeed** The adapter link speed. - - -## Update events - -### Update360Telemetry.Revert - -This event sends data relating to the Revert phase of updating Windows. - -The following fields are available: - -- **ErrorCode** The error code returned for the Revert phase. -- **FlightId** Unique ID for the flight (test instance version). -- **ObjectId** The unique value for each Update Agent mode. -- **RebootRequired** Indicates reboot is required. -- **RelatedCV** The correlation vector value generated from the latest USO (Update Service Orchestrator) scan. -- **Result** The HResult of the event. -- **RevertResult** The result code returned for the Revert operation. -- **ScenarioId** The ID of the update scenario. -- **SessionId** The ID of the update attempt. -- **UpdateId** The ID of the update. - - -### Update360Telemetry.UpdateAgentCommit - -This event collects information regarding the commit phase of the new Unified Update Platform (UUP) update scenario, which is leveraged by both Mobile and Desktop. - -The following fields are available: - -- **ErrorCode** The error code returned for the current install phase. -- **FlightId** Unique ID for each flight. -- **ObjectId** Unique value for each Update Agent mode. -- **RelatedCV** Correlation vector value generated from the latest USO scan. -- **Result** Outcome of the install phase of the update. -- **ScenarioId** Indicates the update scenario. -- **SessionId** Unique value for each update attempt. -- **UpdateId** Unique ID for each update. - - -### Update360Telemetry.UpdateAgentDownloadRequest - -This event sends data for the download request phase of updating Windows via the new Unified Update Platform (UUP) scenario. Applicable to PC and Mobile. - -The following fields are available: - -- **DeletedCorruptFiles** Boolean indicating whether corrupt payload was deleted. -- **DownloadRequests** Number of times a download was retried. -- **ErrorCode** The error code returned for the current download request phase. -- **ExtensionName** Indicates whether the payload is related to Operating System content or a plugin. -- **FlightId** Unique ID for each flight. -- **InternalFailureResult** Indicates a non-fatal error from a plugin. -- **ObjectId** Unique value for each Update Agent mode (same concept as InstanceId for Setup360). -- **PackageCategoriesSkipped** Indicates package categories that were skipped, if applicable. -- **PackageCCoegoriesSkipped** No content is currently available. -- **PackageCountOptional** Number of optional packages requested. -- **PackageCountRequired** Number of required packages requested. -- **PackageCountTotal** Total number of packages needed. -- **PackageCountTotalCanonical** Total number of canonical packages. -- **PackageCountTotalDiff** Total number of diff packages. -- **PackageCountTotalExpress** Total number of express packages. -- **PackageCountTotalPSFX** The total number of PSFX packages. -- **PackageExpressType** Type of express package. -- **PackageSizeCanonical** Size of canonical packages in bytes. -- **PackageSizeDiff** Size of diff packages in bytes. -- **PackageSizeExpress** Size of express packages in bytes. -- **PackageSizePSFX** The size of PSFX packages, in bytes. -- **RangeRequestSsCoe** No content is currently available. -- **RangeRequestState** Indicates the range request type used. -- **RelatedCV** Correlation vector value generated from the latest USO scan. -- **Result** Outcome of the download request phase of update. -- **SandboxTaggedForReserves** The sandbox for reserves. -- **ScenarioId** Indicates the update scenario. -- **SessionId** Unique value for each attempt (same value for initialize, download, install commit phases). -- **UpdateId** Unique ID for each update. - - -### Update360Telemetry.UpdateAgentExpand - -This event collects information regarding the expansion phase of the new Unified Update Platform (UUP) update scenario, which is leveraged by both Mobile and Desktop. - -The following fields are available: - -- **ElapsedTickCount** Time taken for expand phase. -- **EndFreeSpace** Free space after expand phase. -- **EndSandboxSize** Sandbox size after expand phase. -- **ErrorCode** The error code returned for the current install phase. -- **FlightId** Unique ID for each flight. -- **ObjectId** Unique value for each Update Agent mode. -- **RelatedCV** Correlation vector value generated from the latest USO scan. -- **ScenarioId** Indicates the update scenario. -- **SessionId** Unique value for each update attempt. -- **StartFreeSpace** Free space before expand phase. -- **StartSandboxSize** Sandbox size after expand phase. -- **UpdateId** Unique ID for each update. - - -### Update360Telemetry.UpdateAgentFellBackToCanonical - -This event collects information when express could not be used and we fall back to canonical during the new Unified Update Platform (UUP) update scenario, which is leveraged by both Mobile and Desktop. - -The following fields are available: - -- **FlightId** Unique ID for each flight. -- **ObjectId** Unique value for each Update Agent mode. -- **PackageCount** Number of packages that feel back to canonical. -- **PackageList** PackageIds which fell back to canonical. -- **RelatedCV** Correlation vector value generated from the latest USO scan. -- **ScenarioId** Indicates the update scenario. -- **SessionId** Unique value for each update attempt. -- **UpdateId** Unique ID for each update. - - -### Update360Telemetry.UpdateAgentInitialize - -This event sends data for the initialize phase of updating Windows via the new Unified Update Platform (UUP) scenario, which is applicable to both PCs and Mobile. - -The following fields are available: - -- **ErrorCode** The error code returned for the current install phase. -- **FlightId** Unique ID for each flight. -- **FlightMetadata** Contains the FlightId and the build being flighted. -- **ObjectId** Unique value for each Update Agent mode. -- **RelatedCV** Correlation vector value generated from the latest USO scan. -- **Result** Outcome of the install phase of the update. -- **ScenarioId** Indicates the update scenario. -- **SessionData** String containing instructions to update agent for processing FODs and DUICs (Null for other scenarios). -- **SessionId** Unique value for each update attempt. -- **UpdateId** Unique ID for each update. - - -### Update360Telemetry.UpdateAgentInstall - -This event sends data for the install phase of updating Windows. - -The following fields are available: - -- **ErrorCode** The error code returned for the current install phase. -- **ExtensionName** Indicates whether the payload is related to Operating System content or a plugin. -- **FlightId** Unique value for each Update Agent mode (same concept as InstanceId for Setup360). -- **InternalFailureResult** Indicates a non-fatal error from a plugin. -- **ObjectId** Correlation vector value generated from the latest USO scan. -- **RelatedCV** Correlation vector value generated from the latest USO scan. -- **Result** The result for the current install phase. -- **ScenarioId** Indicates the update scenario. -- **SessionId** Unique value for each update attempt. -- **UpdateId** Unique ID for each update. - - -### Update360Telemetry.UpdateAgentMerge - -The UpdateAgentMerge event sends data on the merge phase when updating Windows. - -The following fields are available: - -- **ErrorCode** The error code returned for the current merge phase. -- **FlightId** Unique ID for each flight. -- **MergeId** The unique ID to join two update sessions being merged. -- **ObjectId** Unique value for each Update Agent mode. -- **RelatedCV** Related correlation vector value. -- **Result** Outcome of the merge phase of the update. -- **ScenarioId** Indicates the update scenario. -- **SessionId** Unique value for each attempt. -- **UpdateId** Unique ID for each update. - - -### Update360Telemetry.UpdateAgentMitigationResult - -This event sends data indicating the result of each update agent mitigation. - -The following fields are available: - -- **Applicable** Indicates whether the mitigation is applicable for the current update. -- **CommandCount** The number of command operations in the mitigation entry. -- **CustomCount** The number of custom operations in the mitigation entry. -- **FileCount** The number of file operations in the mitigation entry. -- **FlightId** Unique identifier for each flight. -- **Index** The mitigation index of this particular mitigation. -- **MitigationScenario** The update scenario in which the mitigation was executed. -- **Name** The friendly name of the mitigation. -- **ObjectId** Unique value for each Update Agent mode. -- **OperationIndex** The mitigation operation index (in the event of a failure). -- **OperationName** The friendly name of the mitigation operation (in the event of failure). -- **RegistryCount** The number of registry operations in the mitigation entry. -- **RelatedCV** The correlation vector value generated from the latest USO scan. -- **Result** The HResult of this operation. -- **ScenarioId** The update agent scenario ID. -- **SessionId** Unique value for each update attempt. -- **TimeDiff** The amount of time spent performing the mitigation (in 100-nanosecond increments). -- **UpdateId** Unique ID for each Update. - - -### Update360Telemetry.UpdateAgentMitigationSummary - -This event sends a summary of all the update agent mitigations available for an this update. - -The following fields are available: - -- **Applicable** The count of mitigations that were applicable to the system and scenario. -- **Failed** The count of mitigations that failed. -- **FlightId** Unique identifier for each flight. -- **MitigationScenario** The update scenario in which the mitigations were attempted. -- **ObjectId** The unique value for each Update Agent mode. -- **RelatedCV** The correlation vector value generated from the latest USO scan. -- **Result** The HResult of this operation. -- **ScenarioId** The update agent scenario ID. -- **SessionId** Unique value for each update attempt. -- **TimeDiff** The amount of time spent performing all mitigations (in 100-nanosecond increments). -- **Total** Total number of mitigations that were available. -- **UpdateId** Unique ID for each update. - - -### Update360Telemetry.UpdateAgentModeStart - -This event sends data for the start of each mode during the process of updating Windows via the new Unified Update Platform (UUP) scenario. Applicable to both PCs and Mobile. - -The following fields are available: - -- **FlightId** Unique ID for each flight. -- **Mode** Indicates the mode that has started. -- **ObjectId** Unique value for each Update Agent mode. -- **RelatedCV** Correlation vector value generated from the latest USO scan. -- **ScenarioId** Indicates the update scenario. -- **SessionId** Unique value for each update attempt. -- **UpdateId** Unique ID for each update. -- **Version** Version of update - - -### Update360Telemetry.UpdateAgentOneSettings - -This event collects information regarding the post reboot phase of the new UUP (Unified Update Platform) update scenario; which is leveraged by both Mobile and Desktop. - -The following fields are available: - -- **Count** The count of applicable OneSettings for the device. -- **FlightId** Unique ID for the flight (test instance version). -- **ObjectId** The unique value for each Update Agent mode. -- **Parameters** The set of name value pair parameters sent to OneSettings to determine if there are any applicable OneSettings. -- **RelatedCV** The correlation vector value generated from the latest USO (Update Service Orchestrator) scan. -- **Result** The HResult of the event. -- **ScenarioId** The ID of the update scenario. -- **SessionId** The ID of the update attempt. -- **UpdateId** The ID of the update. -- **Values** The values sent back to the device, if applicable. - - -### Update360Telemetry.UpdateAgentPostRebootResult - -This event collects information for both Mobile and Desktop regarding the post reboot phase of the new Unified Update Platform (UUP) update scenario. - -The following fields are available: - -- **ErrorCode** The error code returned for the current post reboot phase. -- **FlightId** The specific ID of the Windows Insider build the device is getting. -- **ObjectId** Unique value for each Update Agent mode. -- **PostRebootResult** Indicates the Hresult. -- **RelatedCV** Correlation vector value generated from the latest USO scan. -- **ScenarioId** The scenario ID. Example: MobileUpdate, DesktopLanguagePack, DesktopFeatureOnDemand, or DesktopDriverUpdate. -- **SessionId** Unique value for each update attempt. -- **UpdateId** Unique ID for each update. - - -### Update360Telemetry.UpdateAgentReboot - -This event sends information indicating that a request has been sent to suspend an update. - -The following fields are available: - -- **ErrorCode** The error code returned for the current reboot. -- **FlightId** Unique ID for the flight (test instance version). -- **ObjectId** The unique value for each Update Agent mode. -- **RelatedCV** The correlation vector value generated from the latest USO (Update Service Orchestrator) scan. -- **Result** The HResult of the event. -- **ScenarioId** The ID of the update scenario. -- **SessionId** The ID of the update attempt. -- **UpdateId** The ID of the update. - - -### Update360Telemetry.UpdateAgentSetupBoxLaunch - -The UpdateAgent_SetupBoxLaunch event sends data for the launching of the setup box when updating Windows via the new Unified Update Platform (UUP) scenario. This event is only applicable to PCs. - -The following fields are available: - -- **ContainsExpressPackage** Indicates whether the download package is express. -- **FlightId** Unique ID for each flight. -- **FreeSpace** Free space on OS partition. -- **InstallCount** Number of install attempts using the same sandbox. -- **ObjectId** Unique value for each Update Agent mode. -- **Quiet** Indicates whether setup is running in quiet mode. -- **RelatedCV** Correlation vector value generated from the latest USO scan. -- **SandboxSize** Size of the sandbox. -- **ScenarioId** Indicates the update scenario. -- **SessionId** Unique value for each update attempt. -- **SetupMode** Mode of setup to be launched. -- **UpdateId** Unique ID for each Update. -- **UserSession** Indicates whether install was invoked by user actions. - - -## Update notification events - -### Microsoft.Windows.UpdateNotificationPipeline.UNPCampaignManagerHeartbeat - -This event is sent at the start of the CampaignManager event and is intended to be used as a heartbeat. - -The following fields are available: - -- **CampaignConfigVersion** Configuration version for the current campaign. -- **CampaignID** Currently campaign that is running on Update Notification Pipeline (UNP). -- **ConfigCatalogVersion** Current catalog version of UNP. -- **ContentVersion** Content version for the current campaign on UNP. -- **CV** Correlation vector. -- **DetectorVersion** Most recently run detector version for the current campaign on UNP. -- **GlobalEventCounter** Client-side counter that indicates the event ordering sent by the user. -- **PackageVersion** Current UNP package version. - - -## Upgrade events - -### FacilitatorTelemetry.DCATDownload - -This event indicates whether devices received additional or critical supplemental content during an OS Upgrade, to help keep Windows up-to-date and secure. - -The following fields are available: - -- **DownloadSize** Download size of payload. -- **ElapsedTime** Time taken to download payload. -- **MediaFallbackUsed** Used to determine if we used Media CompDBs to figure out package requirements for the upgrade. -- **ResultCode** Result returned by the Facilitator DCAT call. -- **Scenario** Dynamic update scenario (Image DU, or Setup DU). -- **Type** Type of package that was downloaded. -- **UpdateId** The ID of the update that was downloaded. - - -### FacilitatorTelemetry.DUDownload - -This event returns data about the download of supplemental packages critical to upgrading a device to the next version of Windows. - -The following fields are available: - -- **DownloadRequestAttributes** The attributes sent for download. -- **PackageCategoriesFailed** Lists the categories of packages that failed to download. -- **PackageCategoriesSkipped** Lists the categories of package downloads that were skipped. -- **ResultCode** The result of the event execution. -- **Scenario** Identifies the active Download scenario. -- **Url** The URL the download request was sent to. -- **Version** Identifies the version of Facilitator used. - - -### FacilitatorTelemetry.InitializeDU - -This event determines whether devices received additional or critical supplemental content during an OS upgrade. - -The following fields are available: - -- **DCATUrl** The Delivery Catalog (DCAT) URL we send the request to. -- **DownloadRequestAttributes** The attributes we send to DCAT. -- **ResultCode** The result returned from the initiation of Facilitator with the URL/attributes. -- **Scenario** Dynamic Update scenario (Image DU, or Setup DU). -- **Url** The Delivery Catalog (DCAT) URL we send the request to. -- **Version** Version of Facilitator. - - -### Setup360Telemetry.Downlevel - -This event sends data indicating that the device has started the downlevel phase of the upgrade, to help keep Windows up-to-date and secure. - -The following fields are available: - -- **ClientId** If using Windows Update, this will be the Windows Update client ID that is passed to Setup. In Media setup, the default value is Media360, but it can be overwritten by the caller to a unique value. -- **FlightData** Unique value that identifies the flight. -- **HostOSBuildNumber** The build number of the downlevel OS. -- **HostOsSkuName** The operating system edition which is running Setup360 instance (downlevel OS). -- **InstanceId** A unique GUID that identifies each instance of setuphost.exe. -- **ReportId** In the Windows Update scenario, this is the updateID that is passed to Setup. In media setup, this is the GUID for the install.wim. -- **Setup360Extended** More detailed information about phase/action when the potential failure occurred. -- **Setup360Mode** The phase of Setup360 (for example, Predownload, Install, Finalize, Rollback). -- **Setup360Result** The result of Setup360 (HRESULT used to diagnose errors). -- **Setup360Scenario** The Setup360 flow type (for example, Boot, Media, Update, MCT). -- **SetupVersionBuildNumber** The build number of Setup360 (build number of the target OS). -- **State** Exit state of given Setup360 run. Example: succeeded, failed, blocked, cancelled. -- **TestId** An ID that uniquely identifies a group of events. -- **WuId** This is the Windows Update Client ID. In the Windows Update scenario, this is the same as the clientId. - - -### Setup360Telemetry.Finalize - -This event sends data indicating that the device has started the phase of finalizing the upgrade, to help keep Windows up-to-date and secure. - -The following fields are available: - -- **ClientId** With Windows Update, this will be the Windows Update client ID that is passed to Setup. In Media setup, default value is Media360, but can be overwritten by the caller to a unique value. -- **FlightData** Unique value that identifies the flight. -- **HostOSBuildNumber** The build number of the previous OS. -- **HostOsSkuName** The OS edition which is running Setup360 instance (previous OS). -- **InstanceId** A unique GUID that identifies each instance of setuphost.exe -- **ReportId** With Windows Update, this is the updateID that is passed to Setup. In media setup, this is the GUID for the install.wim. -- **Setup360Extended** More detailed information about the phase/action when the potential failure occurred. -- **Setup360Mode** The phase of Setup360. Example: Predownload, Install, Finalize, Rollback. -- **Setup360Result** The result of Setup360. This is an HRESULT error code that is used to diagnose errors. -- **Setup360Scenario** The Setup360 flow type. Example: Boot, Media, Update, MCT. -- **SetupVersionBuildNumber** The build number of Setup360 (build number of target OS). -- **State** The exit state of a Setup360 run. Example: succeeded, failed, blocked, cancelled. -- **TestId** ID that uniquely identifies a group of events. -- **WuId** This is the Windows Update Client ID. With Windows Update, this is the same as the clientId. - - -### Setup360Telemetry.OsUninstall - -This event sends data regarding OS updates and upgrades from Windows 7, Windows 8, and Windows 10. Specifically, it indicates the outcome of an OS uninstall. - -The following fields are available: - -- **ClientId** For Windows Update, this will be the Windows Update client ID that is passed to Setup. In Media setup, default value is Media360, but can be overwritten by the caller to a unique value. -- **FlightData** Unique value that identifies the flight. -- **HostOSBuildNumber** The build number of the previous OS. -- **HostOsSkuName** The OS edition which is running the Setup360 instance (previous OS). -- **InstanceId** A unique GUID that identifies each instance of setuphost.exe. -- **ReportId** For Windows Update, this will be the Windows Update client ID that is passed to Setup. In Media setup, this is the GUID for the install.wim. -- **Setup360Extended** Detailed information about the phase or action when the potential failure occurred. -- **Setup360Mode** The phase of Setup360. Example: Predownload, Install, Finalize, Rollback. -- **Setup360Result** The result of Setup360. This is an HRESULT error code that is used to diagnose errors. -- **Setup360Scenario** The Setup360 flow type. Example: Boot, Media, Update, MCT -- **SetupVersionBuildNumber** The build number of Setup360 (build number of target OS). -- **State** Exit state of a Setup360 run. Example: succeeded, failed, blocked, cancelled. -- **TestId** ID that uniquely identifies a group of events. -- **WuId** Windows Update client ID. - - -### Setup360Telemetry.PostRebootInstall - -This event sends data indicating that the device has invoked the post reboot install phase of the upgrade, to help keep Windows up-to-date. - -The following fields are available: - -- **ClientId** With Windows Update, this is the Windows Update client ID that is passed to Setup. In Media setup, the default value is Media360, but can be overwritten by the caller to a unique value. -- **FlightData** Unique value that identifies the flight. -- **HostOSBuildNumber** The build number of the previous OS. -- **HostOsSkuName** The OS edition which is running Setup360 instance (previous OS). -- **InstanceId** A unique GUID that identifies each instance of setuphost.exe. -- **ReportId** With Windows Update, this is the updateID that is passed to Setup. In media setup, this is the GUID for the install.wim. -- **Setup360Extended** Extension of result - more granular information about phase/action when the potential failure happened -- **Setup360Mode** The phase of Setup360. Example: Predownload, Install, Finalize, Rollback -- **Setup360Result** The result of Setup360. This is an HRESULT error code that's used to diagnose errors. -- **Setup360Scenario** The Setup360 flow type. Example: Boot, Media, Update, MCT -- **SetupVersionBuildNumber** The build number of Setup360 (build number of target OS). -- **State** The exit state of a Setup360 run. Example: succeeded, failed, blocked, cancelled -- **TestId** A string to uniquely identify a group of events. -- **WuId** This is the Windows Update Client ID. With Windows Update, this is the same as ClientId. - - -### Setup360Telemetry.PreDownloadQuiet - -This event sends data indicating that the device has invoked the predownload quiet phase of the upgrade, to help keep Windows up to date. - -The following fields are available: - -- **ClientId** Using Windows Update, this will be the Windows Update client ID that is passed to Setup. In Media setup, default value is Media360, but can be overwritten by the caller to a unique value. -- **FlightData** Unique value that identifies the flight. -- **HostOSBuildNumber** The build number of the previous OS. -- **HostOsSkuName** The OS edition which is running Setup360 instance (previous operating system). -- **InstanceId** A unique GUID that identifies each instance of setuphost.exe. -- **ReportId** Using Windows Update, this is the updateID that is passed to Setup. In media setup, this is the GUID for the install.wim. -- **Setup360Extended** Detailed information about the phase/action when the potential failure occurred. -- **Setup360Mode** The phase of Setup360. Example: Predownload, Install, Finalize, Rollback. -- **Setup360Result** The result of Setup360. This is an HRESULT error code that is used to diagnose errors. -- **Setup360Scenario** The Setup360 flow type. Example: Boot, Media, Update, MCT. -- **SetupVersionBuildNumber** The build number of Setup360 (build number of target OS). -- **State** The exit state of a Setup360 run. Example: succeeded, failed, blocked, canceled. -- **TestId** ID that uniquely identifies a group of events. -- **WuId** This is the Windows Update Client ID. Using Windows Update, this is the same as the clientId. - - -### Setup360Telemetry.PreDownloadUX - -This event sends data regarding OS Updates and Upgrades from Windows 7.X, Windows 8.X, Windows 10 and RS, to help keep Windows up-to-date and secure. Specifically, it indicates the outcome of the PredownloadUX portion of the update process. - -The following fields are available: - -- **ClientId** For Windows Update, this will be the Windows Update client ID that is passed to Setup. In Media setup, default value is Media360, but can be overwritten by the caller to a unique value. -- **FlightData** In the WU scenario, this will be the WU client ID that is passed to Setup. In Media setup, default value is Media360, but can be overwritten by the caller to a unique value. -- **HostOSBuildNumber** The build number of the previous operating system. -- **HostOsSkuName** The OS edition which is running the Setup360 instance (previous operating system). -- **InstanceId** Unique GUID that identifies each instance of setuphost.exe. -- **ReportId** For Windows Update, this will be the Windows Update client ID that is passed to Setup. In Media setup, this is the GUID for the install.wim. -- **Setup360Extended** Detailed information about the phase/action when the potential failure occurred. -- **Setup360Mode** The phase of Setup360. Example: Predownload, Install, Finalize, Rollback. -- **Setup360Result** The result of Setup360. This is an HRESULT error code that can be used to diagnose errors. -- **Setup360Scenario** The Setup360 flow type. Example: Boot, Media, Update, MCT. -- **SetupVersionBuildNumber** The build number of Setup360 (build number of the target OS). -- **State** The exit state of the Setup360 run. Example: succeeded, failed, blocked, cancelled. -- **TestId** ID that uniquely identifies a group of events. -- **WuId** Windows Update client ID. - - -### Setup360Telemetry.PreInstallQuiet - -This event sends data indicating that the device has invoked the preinstall quiet phase of the upgrade, to help keep Windows up-to-date. - -The following fields are available: - -- **ClientId** With Windows Update, this will be the Windows Update client ID that is passed to Setup. In Media setup, default value is Media360, but can be overwritten by the caller to a unique value. -- **FlightData** Unique value that identifies the flight. -- **HostOSBuildNumber** The build number of the previous OS. -- **HostOsSkuName** The OS edition which is running Setup360 instance (previous OS). -- **InstanceId** A unique GUID that identifies each instance of setuphost.exe -- **ReportId** With Windows Update, this is the updateID that is passed to Setup. In media setup, this is the GUID for the install.wim. -- **Setup360Extended** Detailed information about the phase/action when the potential failure occurred. -- **Setup360Mode** The phase of Setup360. Example: Predownload, Install, Finalize, Rollback. -- **Setup360Result** The result of Setup360. This is an HRESULT error code that can be used to diagnose errors. -- **Setup360Scenario** Setup360 flow type (Boot, Media, Update, MCT). -- **SetupVersionBuildNumber** The build number of Setup360 (build number of target OS). -- **State** The exit state of a Setup360 run. Example: succeeded, failed, blocked, cancelled. -- **TestId** A string to uniquely identify a group of events. -- **WuId** This is the Windows Update Client ID. With Windows Update, this is the same as the clientId. - - -### Setup360Telemetry.PreInstallUX - -This event sends data regarding OS updates and upgrades from Windows 7, Windows 8, and Windows 10, to help keep Windows up-to-date. Specifically, it indicates the outcome of the PreinstallUX portion of the update process. - -The following fields are available: - -- **ClientId** For Windows Update, this will be the Windows Update client ID that is passed to Setup. In Media setup, default value is Media360, but can be overwritten by the caller to a unique value. -- **FlightData** Unique value that identifies the flight. -- **HostOSBuildNumber** The build number of the previous OS. -- **HostOsSkuName** The OS edition which is running the Setup360 instance (previous OS). -- **InstanceId** A unique GUID that identifies each instance of setuphost.exe. -- **ReportId** For Windows Update, this will be the Windows Update client ID that is passed to Setup. In Media setup, this is the GUID for the install.wim. -- **Setup360Extended** Detailed information about the phase/action when the potential failure occurred. -- **Setup360Mode** The phase of Setup360. Example: Predownload, Install, Finalize, Rollback. -- **Setup360Result** The result of Setup360. This is an HRESULT error code that is used to diagnose errors. -- **Setup360Scenario** The Setup360 flow type, Example: Boot, Media, Update, MCT. -- **SetupVersionBuildNumber** The build number of Setup360 (build number of target OS). -- **State** The exit state of a Setup360 run. Example: succeeded, failed, blocked, cancelled. -- **TestId** A string to uniquely identify a group of events. -- **WuId** Windows Update client ID. - - -### Setup360Telemetry.Setup360 - -This event sends data about OS deployment scenarios, to help keep Windows up-to-date. - -The following fields are available: - -- **ClientId** Retrieves the upgrade ID. In the Windows Update scenario, this will be the Windows Update client ID. In Media setup, default value is Media360, but can be overwritten by the caller to a unique value. -- **FieldName** Retrieves the data point. -- **FlightData** Specifies a unique identifier for each group of Windows Insider builds. -- **InstanceId** Retrieves a unique identifier for each instance of a setup session. -- **ReportId** Retrieves the report ID. -- **ScenarioId** Retrieves the deployment scenario. -- **Value** Retrieves the value associated with the corresponding FieldName. - - -### Setup360Telemetry.Setup360DynamicUpdate - -This event helps determine whether the device received supplemental content during an operating system upgrade, to help keep Windows up-to-date. - -The following fields are available: - -- **FlightData** Specifies a unique identifier for each group of Windows Insider builds. -- **InstanceId** Retrieves a unique identifier for each instance of a setup session. -- **Operation** Facilitator’s last known operation (scan, download, etc.). -- **ReportId** ID for tying together events stream side. -- **ResultCode** Result returned for the entire setup operation. -- **Scenario** Dynamic Update scenario (Image DU, or Setup DU). -- **ScenarioId** Identifies the update scenario. -- **TargetBranch** Branch of the target OS. -- **TargetBuild** Build of the target OS. - - -### Setup360Telemetry.Setup360MitigationResult - -This event sends data indicating the result of each setup mitigation. - -The following fields are available: - -- **Applicable** TRUE if the mitigation is applicable for the current update. -- **ClientId** In the Windows Update scenario, this is the client ID passed to Setup. In Media setup, default value is Media360, but can be overwritten by the caller to a unique value. -- **CommandCount** The number of command operations in the mitigation entry. -- **CustomCount** The number of custom operations in the mitigation entry. -- **FileCount** The number of file operations in the mitigation entry. -- **FlightData** The unique identifier for each flight (test release). -- **Index** The mitigation index of this particular mitigation. -- **InstanceId** The GUID (Globally Unique ID) that identifies each instance of SetupHost.EXE. -- **MitigationScenario** The update scenario in which the mitigation was executed. -- **Name** The friendly (descriptive) name of the mitigation. -- **OperationIndex** The mitigation operation index (in the event of a failure). -- **OperationName** The friendly (descriptive) name of the mitigation operation (in the event of failure). -- **RegistryCount** The number of registry operations in the mitigation entry. -- **ReportId** In the Windows Update scenario, the Update ID that is passed to Setup. In media setup, this is the GUID for the INSTALL.WIM. -- **Result** HResult of this operation. -- **ScenarioId** Setup360 flow type. -- **TimeDiff** The amount of time spent performing the mitigation (in 100-nanosecond increments). - - -### Setup360Telemetry.Setup360MitigationSummary - -This event sends a summary of all the setup mitigations available for this update. - -The following fields are available: - -- **Applicable** The count of mitigations that were applicable to the system and scenario. -- **ClientId** The Windows Update client ID passed to Setup. -- **Failed** The count of mitigations that failed. -- **FlightData** The unique identifier for each flight (test release). -- **InstanceId** The GUID (Globally Unique ID) that identifies each instance of SetupHost.EXE. -- **MitigationScenario** The update scenario in which the mitigations were attempted. -- **ReportId** In the Windows Update scenario, the Update ID that is passed to Setup. In media setup, this is the GUID for the INSTALL.WIM. -- **Result** HResult of this operation. -- **ScenarioId** Setup360 flow type. -- **TimeDiff** The amount of time spent performing the mitigation (in 100-nanosecond increments). -- **Total** The total number of mitigations that were available. - - -### Setup360Telemetry.Setup360OneSettings - -This event collects information regarding the post reboot phase of the new UUP (Unified Update Platform) update scenario; which is leveraged by both Mobile and Desktop. - -The following fields are available: - -- **ClientId** The Windows Update client ID passed to Setup. -- **Count** The count of applicable OneSettings for the device. -- **FlightData** The ID for the flight (test instance version). -- **InstanceId** The GUID (Globally-Unique ID) that identifies each instance of setuphost.exe. -- **Parameters** The set of name value pair parameters sent to OneSettings to determine if there are any applicable OneSettings. -- **ReportId** The Update ID passed to Setup. -- **Result** The HResult of the event error. -- **ScenarioId** The update scenario ID. -- **Values** Values sent back to the device, if applicable. - - -### Setup360Telemetry.UnexpectedEvent - -This event sends data indicating that the device has invoked the unexpected event phase of the upgrade, to help keep Windows up to date. - -The following fields are available: - -- **ClientId** With Windows Update, this will be the Windows Update client ID that is passed to Setup. In Media setup, default value is Media360, but can be overwritten by the caller to a unique value. -- **FlightData** Unique value that identifies the flight. -- **HostOSBuildNumber** The build number of the previous OS. -- **HostOsSkuName** The OS edition which is running Setup360 instance (previous OS). -- **InstanceId** A unique GUID that identifies each instance of setuphost.exe -- **ReportId** With Windows Update, this is the updateID that is passed to Setup. In media setup, this is the GUID for the install.wim. -- **Setup360Extended** Detailed information about the phase/action when the potential failure occurred. -- **Setup360Mode** The phase of Setup360. Example: Predownload, Install, Finalize, Rollback. -- **Setup360Result** The result of Setup360. This is an HRESULT error code that can be used used to diagnose errors. -- **Setup360Scenario** The Setup360 flow type. Example: Boot, Media, Update, MCT. -- **SetupVersionBuildNumber** The build number of Setup360 (build number of target OS). -- **State** The exit state of a Setup360 run. Example: succeeded, failed, blocked, cancelled. -- **TestId** A string to uniquely identify a group of events. -- **WuId** This is the Windows Update Client ID. With Windows Update, this is the same as the clientId. - - -## Windows as a Service diagnostic events - -### Microsoft.Windows.WaaSMedic.SummaryEvent - -Result of the WaaSMedic operation. - -The following fields are available: - -- **callerApplication** The name of the calling application. -- **capsuleCount** The number of Sediment Pack capsules. -- **capsuleFailureCount** The number of capsule failures. -- **detectionSummary** Result of each applicable detection that was run. -- **featureAssessmentImpact** WaaS Assessment impact for feature updates. -- **hrEngineBlockReason** Indicates the reason for stopping WaaSMedic. -- **hrEngineResult** Error code from the engine operation. -- **hrLastSandboxError** The last error sent by the WaaSMedic sandbox. -- **initSummary** Summary data of the initialization method. -- **insufficientSessions** Device not eligible for diagnostics. -- **isInteractiveMode** The user started a run of WaaSMedic. -- **isManaged** Device is managed for updates. -- **isWUConnected** Device is connected to Windows Update. -- **noMoreActions** No more applicable diagnostics. -- **pluginFailureCount** The number of plugins that have failed. -- **pluginsCount** The number of plugins. -- **qualityAssessmentImpact** WaaS Assessment impact for quality updates. -- **remediationSummary** Result of each operation performed on a device to fix an invalid state or configuration that's preventing the device from getting updates. For example, if Windows Update service is turned off, the fix is to turn the it back on. -- **usingBackupFeatureAssessment** Relying on backup feature assessment. -- **usingBackupQualityAssessment** Relying on backup quality assessment. -- **usingCachedFeatureAssessment** WaaS Medic run did not get OS build age from the network on the previous run. -- **usingCachedQualityAssessment** WaaS Medic run did not get OS revision age from the network on the previous run. -- **versionString** Version of the WaaSMedic engine. -- **waasMedicRunMode** Indicates whether this was a background regular run of the medic or whether it was triggered by a user launching Windows Update Troubleshooter. - - -## Windows Error Reporting events - -### Microsoft.Windows.WERVertical.OSCrash - -This event sends binary data from the collected dump file wheneveer a bug check occurs, to help keep Windows up to date. The is the OneCore version of this event. - -The following fields are available: - -- **BootId** Uint32 identifying the boot number for this device. -- **BugCheckCode** Uint64 "bugcheck code" that identifies a proximate cause of the bug check. -- **BugCheckParameter1** Uint64 parameter providing additional information. -- **BugCheckParameter2** Uint64 parameter providing additional information. -- **BugCheckParameter3** Uint64 parameter providing additional information. -- **BugCheckParameter4** Uint64 parameter providing additional information. -- **DumpFileAttributes** Codes that identify the type of data contained in the dump file -- **DumpFileSize** Size of the dump file -- **IsValidDumpFile** True if the dump file is valid for the debugger, false otherwise -- **ReportId** WER Report Id associated with this bug check (used for finding the corresponding report archive in Watson). - - -## Windows Error Reporting MTT events - -### Microsoft.Windows.WER.MTT.Denominator - -This event provides a denominator to calculate MTTF (mean-time-to-failure) for crashes and other errors, to help keep Windows up to date. - -The following fields are available: - -- **DPRange** Maximum mean value range. -- **DPValue** Randomized bit value (0 or 1) that can be reconstituted over a large population to estimate the mean. -- **Value** Standard UTC emitted DP value structure See [Value](#value). - - -### Value - -This event returns data about Mean Time to Failure (MTTF) for Windows devices. It is the primary means of estimating reliability problems in Basic Diagnostic reporting with very strong privacy guarantees. Since Basic Diagnostic reporting does not include system up-time, and since that information is important to ensuring the safe and stable operation of Windows, the data provided by this event provides that data in a manner which does not threaten a user’s privacy. - -The following fields are available: - -- **Algorithm** The algorithm used to preserve privacy. -- **DPRange** The upper bound of the range being measured. -- **DPValue** The randomized response returned by the client. -- **Epsilon** The level of privacy to be applied. -- **HistType** The histogram type if the algorithm is a histogram algorithm. -- **PertProb** The probability the entry will be Perturbed if the algorithm chosen is “heavy-hitters”. - - -## Windows Store events - -### Microsoft.Windows.Store.StoreActivating - -This event sends tracking data about when the Store app activation via protocol URI is in progress, to help keep Windows up to date. - - - -### Microsoft.Windows.StoreAgent.Telemetry.AbortedInstallation - -This event is sent when an installation or update is canceled by a user or the system and is used to help keep Windows Apps up to date and secure. - -The following fields are available: - -- **AggregatedPackageFullNames** The names of all packages to be downloaded and installed. -- **AttemptNumber** Number of retry attempts before it was canceled. -- **BundleId** The Item Bundle ID. -- **CategoryId** The Item Category ID. -- **ClientAppId** The identity of the app that initiated this operation. -- **HResult** The result code of the last action performed before this operation. -- **IsBundle** Is this a bundle? -- **IsInteractive** Was this requested by a user? -- **IsMandatory** Was this a mandatory update? -- **IsRemediation** Was this a remediation install? -- **IsRestore** Is this automatically restoring a previously acquired product? -- **IsUpdate** Flag indicating if this is an update. -- **ParentBundleId** The product ID of the parent (if this product is part of a bundle). -- **PFN** The product family name of the product being installed. -- **ProductId** The identity of the package or packages being installed. -- **SystemAttemptNumber** The total number of automatic attempts at installation before it was canceled. -- **UserAttemptNumber** The total number of user attempts at installation before it was canceled. -- **WUContentId** The Windows Update content ID. - - -### Microsoft.Windows.StoreAgent.Telemetry.BeginGetInstalledContentIds - -This event is sent when an inventory of the apps installed is started to determine whether updates for those apps are available. It's used to help keep Windows up-to-date and secure. - - - -### Microsoft.Windows.StoreAgent.Telemetry.BeginUpdateMetadataPrepare - -This event is sent when the Store Agent cache is refreshed with any available package updates. It's used to help keep Windows up-to-date and secure. - - - -### Microsoft.Windows.StoreAgent.Telemetry.CancelInstallation - -This event is sent when an app update or installation is canceled while in interactive mode. This can be canceled by the user or the system. It's used to help keep Windows up-to-date and secure. - -The following fields are available: - -- **AggregatedPackageFullNames** The names of all package or packages to be downloaded and installed. -- **AttemptNumber** Total number of installation attempts. -- **BundleId** The identity of the Windows Insider build that is associated with this product. -- **CategoryId** The identity of the package or packages being installed. -- **ClientAppId** The identity of the app that initiated this operation. -- **IsBundle** Is this a bundle? -- **IsInteractive** Was this requested by a user? -- **IsMandatory** Is this a mandatory update? -- **IsRemediation** Is this repairing a previous installation? -- **IsRestore** Is this an automatic restore of a previously acquired product? -- **IsUpdate** Is this a product update? -- **ParentBundleId** The product ID of the parent (if this product is part of a bundle). -- **PFN** The name of all packages to be downloaded and installed. -- **PreviousHResult** The previous HResult code. -- **PreviousInstallState** Previous installation state before it was canceled. -- **ProductId** The name of the package or packages requested for installation. -- **RelatedCV** Correlation Vector of a previous performed action on this product. -- **SystemAttemptNumber** Total number of automatic attempts to install before it was canceled. -- **UserAttemptNumber** Total number of user attempts to install before it was canceled. -- **WUContentId** The Windows Update content ID. - - -### Microsoft.Windows.StoreAgent.Telemetry.CompleteInstallOperationRequest - -This event is sent at the end of app installations or updates to help keep Windows up-to-date and secure. - -The following fields are available: - -- **CatalogId** The Store Product ID of the app being installed. -- **HResult** HResult code of the action being performed. -- **IsBundle** Is this a bundle? -- **PackageFamilyName** The name of the package being installed. -- **ProductId** The Store Product ID of the product being installed. -- **SkuId** Specific edition of the item being installed. - - -### Microsoft.Windows.StoreAgent.Telemetry.EndAcquireLicense - -This event is sent after the license is acquired when a product is being installed. It's used to help keep Windows up-to-date and secure. - -The following fields are available: - -- **AggregatedPackageFullNames** Includes a set of package full names for each app that is part of an atomic set. -- **AttemptNumber** The total number of attempts to acquire this product. -- **CategoryId** The identity of the package or packages being installed. -- **ClientAppId** The identity of the app that initiated this operation. -- **HResult** HResult code to show the result of the operation (success/failure). -- **IsBundle** Is this a bundle? -- **IsInteractive** Did the user initiate the installation? -- **IsMandatory** Is this a mandatory update? -- **IsRemediation** Is this repairing a previous installation? -- **IsRestore** Is this happening after a device restore? -- **IsUpdate** Is this an update? -- **PFN** Product Family Name of the product being installed. -- **ProductId** The Store Product ID for the product being installed. -- **SystemAttemptNumber** The number of attempts by the system to acquire this product. -- **UserAttemptNumber** The number of attempts by the user to acquire this product -- **WUContentId** The Windows Update content ID. - - -### Microsoft.Windows.StoreAgent.Telemetry.EndDownload - -This event is sent after an app is downloaded to help keep Windows up-to-date and secure. - -The following fields are available: - -- **AggregatedPackageFullNames** The name of all packages to be downloaded and installed. -- **AttemptNumber** Number of retry attempts before it was canceled. -- **BundleId** The identity of the Windows Insider build associated with this product. -- **CategoryId** The identity of the package or packages being installed. -- **ClientAppId** The identity of the app that initiated this operation. -- **DownloadSize** The total size of the download. -- **ExtendedHResult** Any extended HResult error codes. -- **HResult** The result code of the last action performed. -- **IsBundle** Is this a bundle? -- **IsInteractive** Is this initiated by the user? -- **IsMandatory** Is this a mandatory installation? -- **IsRemediation** Is this repairing a previous installation? -- **IsRestore** Is this a restore of a previously acquired product? -- **IsUpdate** Is this an update? -- **ParentBundleId** The parent bundle ID (if it's part of a bundle). -- **PFN** The Product Family Name of the app being download. -- **ProductId** The Store Product ID for the product being installed. -- **SystemAttemptNumber** The number of attempts by the system to download. -- **UserAttemptNumber** The number of attempts by the user to download. -- **WUContentId** The Windows Update content ID. - - -### Microsoft.Windows.StoreAgent.Telemetry.EndFrameworkUpdate - -This event is sent when an app update requires an updated Framework package and the process starts to download it. It is used to help keep Windows up-to-date and secure. - -The following fields are available: - -- **HResult** The result code of the last action performed before this operation. - - -### Microsoft.Windows.StoreAgent.Telemetry.EndGetInstalledContentIds - -This event is sent after sending the inventory of the products installed to determine whether updates for those products are available. It's used to help keep Windows up-to-date and secure. - -The following fields are available: - -- **HResult** The result code of the last action performed before this operation. - - -### Microsoft.Windows.StoreAgent.Telemetry.EndInstall - -This event is sent after a product has been installed to help keep Windows up-to-date and secure. - -The following fields are available: - -- **AggregatedPackageFullNames** The names of all packages to be downloaded and installed. -- **AttemptNumber** The number of retry attempts before it was canceled. -- **BundleId** The identity of the build associated with this product. -- **CategoryId** The identity of the package or packages being installed. -- **ClientAppId** The identity of the app that initiated this operation. -- **ExtendedHResult** The extended HResult error code. -- **HResult** The result code of the last action performed. -- **IsBundle** Is this a bundle? -- **IsInteractive** Is this an interactive installation? -- **IsMandatory** Is this a mandatory installation? -- **IsRemediation** Is this repairing a previous installation? -- **IsRestore** Is this automatically restoring a previously acquired product? -- **IsUpdate** Is this an update? -- **ParentBundleId** The product ID of the parent (if this product is part of a bundle). -- **PFN** Product Family Name of the product being installed. -- **ProductId** The Store Product ID for the product being installed. -- **SystemAttemptNumber** The total number of system attempts. -- **UserAttemptNumber** The total number of user attempts. -- **WUContentId** The Windows Update content ID. - - -### Microsoft.Windows.StoreAgent.Telemetry.EndScanForUpdates - -This event is sent after a scan for product updates to determine if there are packages to install. It's used to help keep Windows up-to-date and secure. - -The following fields are available: - -- **AsOnline** No content is currently available. -- **ClientAppId** The identity of the app that initiated this operation. -- **HResult** The result code of the last action performed. -- **IsApplicability** Is this request to only check if there are any applicable packages to install? -- **IsInteractive** Is this user requested? -- **IsOnline** Is the request doing an online check? - - -### Microsoft.Windows.StoreAgent.Telemetry.EndSearchUpdatePackages - -This event is sent after searching for update packages to install. It is used to help keep Windows up-to-date and secure. - -The following fields are available: - -- **AggregatedPackageFullNames** The names of all packages to be downloaded and installed. -- **AttemptNumber** The total number of retry attempts before it was canceled. -- **BundleId** The identity of the build associated with this product. -- **CategoryId** The identity of the package or packages being installed. -- **ClientAppId** The identity of the app that initiated this operation. -- **HResult** The result code of the last action performed. -- **IsBundle** Is this a bundle? -- **IsInteractive** Is this user requested? -- **IsMandatory** Is this a mandatory update? -- **IsRemediation** Is this repairing a previous installation? -- **IsRestore** Is this restoring previously acquired content? -- **IsUpdate** Is this an update? -- **ParentBundleId** The product ID of the parent (if this product is part of a bundle). -- **PFN** The name of the package or packages requested for install. -- **ProductId** The Store Product ID for the product being installed. -- **SystemAttemptNumber** The total number of system attempts. -- **UserAttemptNumber** The total number of user attempts. -- **WUContentId** The Windows Update content ID. - - -### Microsoft.Windows.StoreAgent.Telemetry.EndStageUserData - -This event is sent after restoring user data (if any) that needs to be restored following a product install. It is used to keep Windows up-to-date and secure. - -The following fields are available: - -- **AggregatedPackageFullNames** The name of all packages to be downloaded and installed. -- **AttemptNumber** The total number of retry attempts before it was canceled. -- **BundleId** The identity of the build associated with this product. -- **CategoryId** The identity of the package or packages being installed. -- **ClientAppId** The identity of the app that initiated this operation. -- **HResult** The result code of the last action performed. -- **IsBundle** Is this a bundle? -- **IsInteractive** Is this user requested? -- **IsMandatory** Is this a mandatory update? -- **IsRemediation** Is this repairing a previous installation? -- **IsRestore** Is this restoring previously acquired content? -- **IsUpdate** Is this an update? -- **ParentBundleId** The product ID of the parent (if this product is part of a bundle). -- **PFN** The name of the package or packages requested for install. -- **ProductId** The Store Product ID for the product being installed. -- **SystemAttemptNumber** The total number of system attempts. -- **UserAttemptNumber** The total number of system attempts. -- **WUContentId** The Windows Update content ID. - - -### Microsoft.Windows.StoreAgent.Telemetry.EndUpdateMetadataPrepare - -This event is sent after a scan for available app updates to help keep Windows up-to-date and secure. - -The following fields are available: - -- **HResult** The result code of the last action performed. - - -### Microsoft.Windows.StoreAgent.Telemetry.FulfillmentComplete - -This event is sent at the end of an app install or update to help keep Windows up-to-date and secure. - -The following fields are available: - -- **CatalogId** The name of the product catalog from which this app was chosen. -- **FailedRetry** Indicates whether the installation or update retry was successful. -- **HResult** The HResult code of the operation. -- **PFN** The Package Family Name of the app that is being installed or updated. -- **ProductId** The product ID of the app that is being updated or installed. - - -### Microsoft.Windows.StoreAgent.Telemetry.FulfillmentInitiate - -This event is sent at the beginning of an app install or update to help keep Windows up-to-date and secure. - -The following fields are available: - -- **CatalogId** The name of the product catalog from which this app was chosen. -- **FulfillmentPluginId** The ID of the plugin needed to install the package type of the product. -- **PFN** The Package Family Name of the app that is being installed or updated. -- **PluginTelemetryData** Diagnostic information specific to the package-type plug-in. -- **ProductId** The product ID of the app that is being updated or installed. - - -### Microsoft.Windows.StoreAgent.Telemetry.InstallOperationRequest - -This event is sent when a product install or update is initiated, to help keep Windows up-to-date and secure. - -The following fields are available: - -- **BundleId** The identity of the build associated with this product. -- **CatalogId** If this product is from a private catalog, the Store Product ID for the product being installed. -- **ProductId** The Store Product ID for the product being installed. -- **SkuId** Specific edition ID being installed. -- **VolumePath** The disk path of the installation. - - -### Microsoft.Windows.StoreAgent.Telemetry.PauseInstallation - -This event is sent when a product install or update is paused (either by a user or the system), to help keep Windows up-to-date and secure. - -The following fields are available: - -- **AggregatedPackageFullNames** The names of all packages to be downloaded and installed. -- **AttemptNumber** The total number of retry attempts before it was canceled. -- **BundleId** The identity of the build associated with this product. -- **CategoryId** The identity of the package or packages being installed. -- **ClientAppId** The identity of the app that initiated this operation. -- **IsBundle** Is this a bundle? -- **IsInteractive** Is this user requested? -- **IsMandatory** Is this a mandatory update? -- **IsRemediation** Is this repairing a previous installation? -- **IsRestore** Is this restoring previously acquired content? -- **IsUpdate** Is this an update? -- **ParentBundleId** The product ID of the parent (if this product is part of a bundle). -- **PFN** The Product Full Name. -- **PreviousHResult** The result code of the last action performed before this operation. -- **PreviousInstallState** Previous state before the installation or update was paused. -- **ProductId** The Store Product ID for the product being installed. -- **RelatedCV** Correlation Vector of a previous performed action on this product. -- **SystemAttemptNumber** The total number of system attempts. -- **UserAttemptNumber** The total number of user attempts. -- **WUContentId** The Windows Update content ID. - - -### Microsoft.Windows.StoreAgent.Telemetry.ResumeInstallation - -This event is sent when a product install or update is resumed (either by a user or the system), to help keep Windows up-to-date and secure. - -The following fields are available: - -- **AggregatedPackageFullNames** The names of all packages to be downloaded and installed. -- **AttemptNumber** The number of retry attempts before it was canceled. -- **BundleId** The identity of the build associated with this product. -- **CategoryId** The identity of the package or packages being installed. -- **ClientAppId** The identity of the app that initiated this operation. -- **HResult** The result code of the last action performed before this operation. -- **IsBundle** Is this a bundle? -- **IsInteractive** Is this user requested? -- **IsMandatory** Is this a mandatory update? -- **IsRemediation** Is this repairing a previous installation? -- **IsRestore** Is this restoring previously acquired content? -- **IsUpdate** Is this an update? -- **IsUserRetry** Did the user initiate the retry? -- **ParentBundleId** The product ID of the parent (if this product is part of a bundle). -- **PFN** The name of the package or packages requested for install. -- **PreviousHResult** The previous HResult error code. -- **PreviousInstallState** Previous state before the installation was paused. -- **ProductId** The Store Product ID for the product being installed. -- **RelatedCV** Correlation Vector for the original install before it was resumed. -- **ResumeClientId** The ID of the app that initiated the resume operation. -- **SystemAttemptNumber** The total number of system attempts. -- **UserAttemptNumber** The total number of user attempts. -- **WUContentId** The Windows Update content ID. - - -### Microsoft.Windows.StoreAgent.Telemetry.ResumeOperationRequest - -This event is sent when a product install or update is resumed by a user or on installation retries, to help keep Windows up-to-date and secure. - -The following fields are available: - -- **ProductId** The Store Product ID for the product being installed. - - -### Microsoft.Windows.StoreAgent.Telemetry.SearchForUpdateOperationRequest - -This event is sent when searching for update packages to install, to help keep Windows up-to-date and secure. - -The following fields are available: - -- **CatalogId** The Store Catalog ID for the product being installed. -- **ProductId** The Store Product ID for the product being installed. -- **SkuId** Specfic edition of the app being updated. - - -### Microsoft.Windows.StoreAgent.Telemetry.UpdateAppOperationRequest - -This event occurs when an update is requested for an app, to help keep Windows up-to-date and secure. - -The following fields are available: - -- **PFamN** The name of the app that is requested for update. - - -## Windows System Kit events - -### Microsoft.Windows.Kits.WSK.WskImageCreate - -This event sends simple Product and Service usage data when a user is using the Windows System Kit to create new OS “images”. The data includes the version of the Windows System Kit and the state of the event and is used to help investigate “image” creation failures. - -The following fields are available: - -- **Phase** The image creation phase. Values are “Start” or “End”. -- **WskVersion** The version of the Windows System Kit being used. - - -### Microsoft.Windows.Kits.WSK.WskImageCustomization - -This event sends simple Product and Service usage data when a user is using the Windows System Kit to create/modify configuration files allowing the customization of a new OS image with Apps or Drivers. The data includes the version of the Windows System Kit, the state of the event, the customization type (drivers or apps) and the mode (new or updating) and is used to help investigate configuration file creation failures. - -The following fields are available: - -- **CustomizationMode** Indicates the mode of the customization (new or updating). -- **CustomizationType** Indicates the type of customization (drivers or apps). -- **Mode** The mode of update to image configuration files. Values are “New” or “Update”. -- **Phase** The image creation phase. Values are “Start” or “End”. -- **Type** The type of update to image configuration files. Values are “Apps” or “Drivers”. -- **WskVersion** The version of the Windows System Kit being used. - - -### Microsoft.Windows.Kits.WSK.WskWorkspaceCreate - -This event sends simple Product and Service usage data when a user is using the Windows System Kit to create new workspace for generating OS “images”. The data includes the version of the Windows System Kit and the state of the event and is used to help investigate workspace creation failures. - -The following fields are available: - -- **Architecture** The OS architecture that the workspace will target. Values are one of: “AMD64”, “ARM64”, “x86”, or “ARM”. -- **OsEdition** The Operating System Edition that the workspace will target. -- **Phase** The image creation phase. Values are “Start” or “End”. -- **WorkspaceArchitecture** The operating system architecture that the workspace will target. -- **WorkspaceOsEdition** The operating system edition that the workspace will target. -- **WskVersion** The version of the Windows System Kit being used. - - -## Windows Update Delivery Optimization events - -### Microsoft.OSG.DU.DeliveryOptClient.DownloadCanceled - -This event describes when a download was canceled with Delivery Optimization. It's used to understand and address problems regarding downloads. - -The following fields are available: - -- **background** Is the download being done in the background? -- **bytesFromCacheServer** Bytes received from a cache host. -- **bytesFromCDN** The number of bytes received from a CDN source. -- **bytesFromGroupPeers** The number of bytes received from a peer in the same group. -- **bytesFromIntPeers** The number of bytes received from peers not in the same LAN or in the same group. -- **bytesFromLinkLocalPeers** The number of bytes received from local peers. -- **bytesFromLocalCache** Bytes copied over from local (on disk) cache. -- **bytesFromPeers** The number of bytes received from a peer in the same LAN. -- **cdnErrorCodes** A list of CDN connection errors since the last FailureCDNCommunication event. -- **cdnErrorCounts** The number of times each error in cdnErrorCodes was encountered. -- **cdnIp** The IP Address of the source CDN (Content Delivery Network). -- **cdnUrl** The URL of the source CDN (Content Delivery Network). -- **dataSourcesTotal** Bytes received per source type, accumulated for the whole session. -- **errorCode** The error code that was returned. -- **experimentId** When running a test, this is used to correlate events that are part of the same test. -- **fileID** The ID of the file being downloaded. -- **gCurMemoryStreamBytes** Current usage for memory streaming. -- **gMaxMemoryStreamBytes** Maximum usage for memory streaming. -- **isVpn** Indicates whether the device is connected to a VPN (Virtual Private Network). -- **jobID** Identifier for the Windows Update job. -- **predefinedCallerName** The name of the API Caller. -- **reasonCode** Reason the action or event occurred. -- **routeToCacheServer** The cache server setting, source, and value. -- **sessionID** The ID of the file download session. -- **updateID** The ID of the update being downloaded. -- **usedMemoryStream** TRUE if the download is using memory streaming for App downloads. - - -### Microsoft.OSG.DU.DeliveryOptClient.DownloadCompleted - -This event describes when a download has completed with Delivery Optimization. It's used to understand and address problems regarding downloads. - -The following fields are available: - -- **background** Is the download a background download? -- **bytesFromCacheServer** Bytes received from a cache host. -- **bytesFromCDN** The number of bytes received from a CDN source. -- **bytesFromGroupPeers** The number of bytes received from a peer in the same domain group. -- **bytesFromIntPeers** The number of bytes received from peers not in the same LAN or in the same domain group. -- **bytesFromLinkLocalPeers** The number of bytes received from local peers. -- **bytesFromLocalCache** Bytes copied over from local (on disk) cache. -- **bytesFromPeers** The number of bytes received from a peer in the same LAN. -- **bytesRequested** The total number of bytes requested for download. -- **cacheServerBonnectionCount** No content is currently available. -- **cacheServerConnectionCount** Number of connections made to cache hosts. -- **cdnConnectionCount** The total number of connections made to the CDN. -- **cdnErrorCodes** A list of CDN connection errors since the last FailureCDNCommunication event. -- **cdnErrorCounts** The number of times each error in cdnErrorCodes was encountered. -- **cdnIp** The IP address of the source CDN. -- **cdnUrl** Url of the source Content Distribution Network (CDN). -- **dataSourcesTotal** Bytes received per source type, accumulated for the whole session. -- **dnErrorCounts** No content is currently available. -- **doErrorCode** The Delivery Optimization error code that was returned. -- **downlinkBps** The maximum measured available download bandwidth (in bytes per second). -- **downlinkUsageBps** The download speed (in bytes per second). -- **downloadMode** The download mode used for this file download session. -- **downloadModeReason** Reason for the download. -- **downloadModeSrc** Source of the DownloadMode setting (KvsProvider = 0, GeoProvider = 1, GeoVerProvider = 2, CpProvider = 3, DiscoveryProvider = 4, RegistryProvider = 5, GroupPolicyProvider = 6, MdmProvider = 7, SettingsProvider = 8, InvalidProviderType = 9). -- **experimentId** When running a test, this is used to correlate with other events that are part of the same test. -- **expiresAt** The time when the content will expire from the Delivery Optimization Cache. -- **fileID** The ID of the file being downloaded. -- **fileSize** The size of the file being downloaded. -- **gCurMemoryStreamBytes** Current usage for memory streaming. -- **gdnConnectionCount** No content is currently available. -- **gMaxMemoryStreamBytes** Maximum usage for memory streaming. -- **groupConnectionCo** No content is currently available. -- **groupConnectionCount** The total number of connections made to peers in the same group. -- **internetConnectionCount** The total number of connections made to peers not in the same LAN or the same group. -- **isEncrypted** TRUE if the file is encrypted and will be decrypted after download. -- **isVpn** Is the device connected to a Virtual Private Network? -- **jobID** Identifier for the Windows Update job. -- **lanConnectionCount** The total number of connections made to peers in the same LAN. -- **linkLocalConnectionCount** The number of connections made to peers in the same Link-local network. -- **numPeers** The total number of peers used for this download. -- **numPeersLocal** The total number of local peers used for this download. -- **predefinedCallerName** The name of the API Caller. -- **restrictedU`load** No content is currently available. -- **restrictedUpload** Is the upload restricted? -- **routeToCacheServer** The cache server setting, source, and value. -- **sessionID** The ID of the download session. -- **totalTimeMs** Duration of the download (in seconds). -- **updateID** The ID of the update being downloaded. -- **uplinkBps** The maximum measured available upload bandwidth (in bytes per second). -- **uplinkUsageBps** The upload speed (in bytes per second). -- **usedMemoryStream** TRUE if the download is using memory streaming for App downloads. - - -### Microsoft.OSG.DU.DeliveryOptClient.DownloadPaused - -This event represents a temporary suspension of a download with Delivery Optimization. It's used to understand and address problems regarding downloads. - -The following fields are available: - -- **background** Is the download a background download? -- **cdnUrl** The URL of the source CDN (Content Delivery Network). -- **errorCode** The error code that was returned. -- **experimentId** When running a test, this is used to correlate with other events that are part of the same test. -- **fileID** The ID of the file being paused. -- **isVpn** Is the device connected to a Virtual Private Network? -- **jobID** Identifier for the Windows Update job. -- **predefinedCallerName** The name of the API Caller object. -- **reasonCode** The reason for pausing the download. -- **routeToCacheServer** The cache server setting, source, and value. -- **sessionID** The ID of the download session. -- **updateID** The ID of the update being paused. - - -### Microsoft.OSG.DU.DeliveryOptClient.DownloadStarted - -This event sends data describing the start of a new download to enable Delivery Optimization. It's used to understand and address problems regarding downloads. - -The following fields are available: - -- **ActiveNetworkConnection** No content is currently available. -- **background** Indicates whether the download is happening in the background. -- **bytesRequested** Number of bytes requested for the download. -- **cdnUrl** The URL of the source Content Distribution Network (CDN). -- **costFlags** A set of flags representing network cost. -- **deviceProfile** Identifies the usage or form factor (such as Desktop, Xbox, or VM). -- **diceRoll** Random number used for determining if a client will use peering. -- **doClientVersion** The version of the Delivery Optimization client. -- **doErrorCode** The Delivery Optimization error code that was returned. -- **downloadMode** The download mode used for this file download session (CdnOnly = 0, Lan = 1, Group = 2, Internet = 3, Simple = 99, Bypass = 100). -- **downloadModeReason** Reason for the download. -- **downloadModeSrc** Source of the DownloadMode setting (KvsProvider = 0, GeoProvider = 1, GeoVerProvider = 2, CpProvider = 3, DiscoveryProvider = 4, RegistryProvider = 5, GroupPolicyProvider = 6, MdmProvider = 7, SettingsProvider = 8, InvalidProviderType = 9). -- **errorCode** The error code that was returned. -- **experimentId** ID used to correlate client/services calls that are part of the same test during A/B testing. -- **fileID** The ID of the file being downloaded. -- **filePath** The path to where the downloaded file will be written. -- **fileSize** Total file size of the file that was downloaded. -- **fileSizeCaller** Value for total file size provided by our caller. -- **groupID** ID for the group. -- **IsBootCritical** No content is currently available. -- **isEncrypted** Indicates whether the download is encrypted. -- **isVpn** Indicates whether the device is connected to a Virtual Private Network. -- **jobID** The ID of the Windows Update job. -- **peerID** The ID for this delivery optimization client. -- **predefinedCallerName** Name of the API caller. -- **routeToCacheServer** Cache server setting, source, and value. -- **SdbEntries** No content is currently available. -- **sessionID** The ID for the file download session. -- **setConfigs** A JSON representation of the configurations that have been set, and their sources. -- **updateID** The ID of the update being downloaded. -- **usedMemoryStream** Indicates whether the download used memory streaming. -- **WuDriverCoverage** No content is currently available. -- **WuDriverUpdateId** No content is currently available. -- **WuPopulatedFromId** No content is currently available. - - -### Microsoft.OSG.DU.DeliveryOptClient.FailureCdnCommunication - -This event represents a failure to download from a CDN with Delivery Optimization. It's used to understand and address problems regarding downloads. - -The following fields are available: - -- **cdnHeaders** The HTTP headers returned by the CDN. -- **cdnIp** The IP address of the CDN. -- **cdnUrl** The URL of the CDN. -- **errorCode** The error code that was returned. -- **errorCount** The total number of times this error code was seen since the last FailureCdnCommunication event was encountered. -- **experimentId** When running a test, this is used to correlate with other events that are part of the same test. -- **fileID** The ID of the file being downloaded. -- **httpStatusCode** The HTTP status code returned by the CDN. -- **isHeadRequest** The type of HTTP request that was sent to the CDN. Example: HEAD or GET -- **peerType** The type of peer (LAN, Group, Internet, CDN, Cache Host, etc.). -- **requestOffset** The byte offset within the file in the sent request. -- **requestSize** The size of the range requested from the CDN. -- **responseSize** The size of the range response received from the CDN. -- **sessionID** The ID of the download session. - - -### Microsoft.OSG.DU.DeliveryOptClient.JobError - -This event represents a Windows Update job error. It allows for investigation of top errors. - -The following fields are available: - -- **cdnIp** The IP Address of the source CDN (Content Delivery Network). -- **doErrorCode** Error code returned for delivery optimization. -- **errorCode** The error code returned. -- **experimentId** When running a test, this is used to correlate with other events that are part of the same test. -- **fileID** The ID of the file being downloaded. -- **jobID** The Windows Update job ID. - - -## Windows Update events - -### Microsoft.Windows.Update.DeviceUpdateAgent.UpdateAgentAnalysisSummary - -This event collects information regarding the state of devices and drivers on the system following a reboot after the install phase of the new device manifest UUP (Unified Update Platform) update scenario which is used to install a device manifest describing a set of driver packages. - -The following fields are available: - -- **activated** Whether the entire device manifest update is considered activated and in use. -- **analysisErrorCount** The number of driver packages that could not be analyzed because errors occurred during analysis. -- **flightId** Unique ID for each flight. -- **missingDriverCount** The number of driver packages delivered by the device manifest that are missing from the system. -- **missingUpdateCount** The number of updates in the device manifest that are missing from the system. -- **objectId** Unique value for each diagnostics session. -- **publishedCount** The number of drivers packages delivered by the device manifest that are published and available to be used on devices. -- **relatedCV** Correlation vector value generated from the latest USO scan. -- **scenarioId** Indicates the update scenario. -- **sessionId** Unique value for each update session. -- **summary** A summary string that contains basic information about driver packages that are part of the device manifest and any devices on the system that those driver packages match. -- **summaryAppendError** A Boolean indicating if there was an error appending more information to the summary string. -- **truncatedDeviceCount** The number of devices missing from the summary string because there is not enough room in the string. -- **truncatedDriverCount** The number of driver packages missing from the summary string because there is not enough room in the string. -- **unpublishedCount** How many drivers packages that were delivered by the device manifest that are still unpublished and unavailable to be used on devices. -- **updateId** The unique ID for each update. - - -### Microsoft.Windows.Update.DeviceUpdateAgent.UpdateAgentCommit - -This event collects information regarding the final commit phase of the new device manifest UUP (Unified Update Platform) update scenario, which is used to install a device manifest describing a set of driver packages. - -The following fields are available: - -- **errorCode** The error code returned for the current session initialization. -- **flightId** The unique identifier for each flight. -- **objectId** The unique GUID for each diagnostics session. -- **relatedCV** A correlation vector value generated from the latest USO scan. -- **result** Outcome of the initialization of the session. -- **scenarioId** Identifies the Update scenario. -- **sessionId** The unique value for each update session. -- **updateId** The unique identifier for each Update. - - -### Microsoft.Windows.Update.DeviceUpdateAgent.UpdateAgentDownloadRequest - -This event collects information regarding the download request phase of the new device manifest UUP (Unified Update Platform) update scenario, which is used to install a device manifest describing a set of driver packages. - -The following fields are available: - -- **deletedCorruptFiles** Indicates if UpdateAgent found any corrupt payload files and whether the payload was deleted. -- **errorCode** The error code returned for the current session initialization. -- **flightId** The unique identifier for each flight. -- **objectId** Unique value for each Update Agent mode. -- **packageCountOptional** Number of optional packages requested. -- **packageCountRequired** Number of required packages requested. -- **packageCountTotal** Total number of packages needed. -- **packageCountTotalCanonical** Total number of canonical packages. -- **packageCountTotalDiff** Total number of diff packages. -- **packageCountTotalExpress** Total number of express packages. -- **packageSizeCanonical** Size of canonical packages in bytes. -- **packageSizeDiff** Size of diff packages in bytes. -- **packageSizeExpress** Size of express packages in bytes. -- **rangeRequestState** Represents the state of the download range request. -- **relatedCV** Correlation vector value generated from the latest USO scan. -- **result** Result of the download request phase of update. -- **scenarioId** The scenario ID. Example: MobileUpdate, DesktopLanguagePack, DesktopFeatureOnDemand, or DesktopDriverUpdate. -- **sessionId** Unique value for each Update Agent mode attempt. -- **updateId** Unique ID for each update. - - -### Microsoft.Windows.Update.DeviceUpdateAgent.UpdateAgentInitialize - -This event sends data for initializing a new update session for the new device manifest UUP (Unified Update Platform) update scenario, which is used to install a device manifest describing a set of driver packages. - -The following fields are available: - -- **errorCode** The error code returned for the current session initialization. -- **flightId** The unique identifier for each flight. -- **flightMetadata** Contains the FlightId and the build being flighted. -- **objectId** Unique value for each Update Agent mode. -- **relatedCV** Correlation vector value generated from the latest USO scan. -- **result** Result of the initialize phase of the update. 0 = Succeeded, 1 = Failed, 2 = Cancelled, 3 = Blocked, 4 = BlockCancelled. -- **scenarioId** The scenario ID. Example: MobileUpdate, DesktopLanguagePack, DesktopFeatureOnDemand, or DesktopDriverUpdate. -- **sessionData** Contains instructions to update agent for processing FODs and DUICs (Null for other scenarios). -- **sessionId** Unique value for each Update Agent mode attempt. -- **updateId** Unique ID for each update. - - -### Microsoft.Windows.Update.DeviceUpdateAgent.UpdateAgentInstall - -This event collects information regarding the install phase of the new device manifest UUP (Unified Update Platform) update scenario, which is used to install a device manifest describing a set of driver packages. - -The following fields are available: - -- **errorCode** The error code returned for the current install phase. -- **flightId** The unique identifier for each flight (pre-release builds). -- **objectId** The unique identifier for each diagnostics session. -- **relatedCV** Correlation vector value generated from the latest scan. -- **result** Outcome of the install phase of the update. -- **scenarioId** The scenario ID. Example: MobileUpdate, DesktopLanguagePack, DesktopFeatureOnDemand, or DesktopDriverUpdate -- **sessionId** The unique identifier for each update session. -- **updateId** The unique identifier for each Update. - - -### Microsoft.Windows.Update.DeviceUpdateAgent.UpdateAgentModeStart - -This event sends data for the start of each mode during the process of updating device manifest assets via the UUP (Unified Update Platform) update scenario, which is used to install a device manifest describing a set of driver packages. - -The following fields are available: - -- **flightId** The unique identifier for each flight (pre-release builds). -- **mode** Indicates the active Update Agent mode. -- **objectId** Unique value for each diagnostics session. -- **relatedCV** Correlation vector value generated from the latest scan. -- **scenarioId** The scenario ID. Example: MobileUpdate, DesktopLanguagePack, DesktopFeatureOnDemand, or DesktopDriverUpdate. -- **sessionId** The unique identifier for each update session. -- **updateId** The unique identifier for each Update. - - -### Microsoft.Windows.Update.NotificationUx.DialogNotificationToBeDisplayed - -This event indicates that a notification dialog box is about to be displayed to user. - -The following fields are available: - -- **AcceptAutoModeLimit** The maximum number of days for a device to automatically enter Auto Reboot mode. -- **AutoToAutoFailedLimit** The maximum number of days for Auto Reboot mode to fail before the RebootFailed dialog box is shown. -- **DaysSinceRebootRequired** Number of days since restart was required. -- **DeviceLocalTime** The local time on the device sending the event. -- **EngagedModeLimit** The number of days to switch between DTE dialog boxes. -- **EnterAutoModeLimit** The maximum number of days for a device to enter Auto Reboot mode. -- **ETag** OneSettings versioning value. -- **IsForcedEnabled** Indicates whether Forced Reboot mode is enabled for this device. -- **IsUltimateForcedEnabled** Indicates whether Ultimate Forced Reboot mode is enabled for this device. -- **NotificationUxState** Indicates which dialog box is shown. -- **NotificationUxStateString** Indicates which dialog box is shown. -- **RebootUxState** Indicates the state of the restart (Engaged, Auto, Forced, or UltimateForced). -- **RebootUxStateString** Indicates the state of the restart (Engaged, Auto, Forced, or UltimateForced). -- **RebootVersion** Version of DTE. -- **SkipToAutoModeLimit** The minimum length of time to pass in restart pending before a device can be put into auto mode. -- **UpdateId** The ID of the update that is pending restart to finish installation. -- **UpdateRevision** The revision of the update that is pending restart to finish installation. -- **UtcTime** The time the dialog box notification will be displayed, in Coordinated Universal Time. - - -### Microsoft.Windows.Update.NotificationUx.EnhancedEngagedRebootAcceptAutoDialog - -This event indicates that the Enhanced Engaged restart "accept automatically" dialog box was displayed. - -The following fields are available: - -- **DeviceLocalTime** The local time on the device sending the event. -- **ETag** OneSettings versioning value. -- **ExitCode** Indicates how users exited the dialog box. -- **RebootVersion** Version of DTE. -- **UpdateId** The ID of the update that is pending restart to finish installation. -- **UpdateRevision** The revision of the update that is pending restart to finish installation. -- **UserResponseString** The option that user chose on this dialog box. -- **UtcTime** The time that the dialog box was displayed, in Coordinated Universal Time. - - -### Microsoft.Windows.Update.NotificationUx.EnhancedEngagedRebootFirstReminderDialog - -This event indicates that the Enhanced Engaged restart "first reminder" dialog box was displayed.. - -The following fields are available: - -- **DeviceLocalTime** The local time on the device sending the event. -- **ETag** OneSettings versioning value. -- **ExitCode** Indicates how users exited the dialog box. -- **RebootVersion** Version of DTE. -- **UpdateId** The ID of the update that is pending restart to finish installation. -- **UpdateRevision** The revision of the update that is pending restart to finish installation. -- **UserResponseString** The option that user chose in this dialog box. -- **UtcTime** The time that the dialog box was displayed, in Coordinated Universal Time. - - -### Microsoft.Windows.Update.NotificationUx.EnhancedEngagedRebootRebootFailedDialog - -This event indicates that the Enhanced Engaged restart "restart failed" dialog box was displayed. - -The following fields are available: - -- **DeviceLocalTime** The local time of the device sending the event. -- **ETag** OneSettings versioning value. -- **ExitCode** Indicates how users exited the dialog box. -- **RebootVersion** Version of DTE. -- **UpdateId** The ID of the update that is pending restart to finish installation. -- **UpdateRevision** The revision of the update that is pending restart to finish installation. -- **UserResponseString** The option that the user chose in this dialog box. -- **UtcTime** The time that the dialog box was displayed, in Coordinated Universal Time. - - -### Microsoft.Windows.Update.NotificationUx.EnhancedEngagedRebootRebootImminentDialog - -This event indicates that the Enhanced Engaged restart "restart imminent" dialog box was displayed. - -The following fields are available: - -- **DeviceLocalTime** Time the dialog box was shown on the local device. -- **ETag** OneSettings versioning value. -- **ExitCode** Indicates how users exited the dialog box. -- **RebootVersion** Version of DTE. -- **UpdateId** The ID of the update that is pending restart to finish installation. -- **UpdateRevision** The revision of the update that is pending restart to finish installation. -- **UserResponseString** The option that user chose in this dialog box. -- **UtcTime** The time that dialog box was displayed, in Coordinated Universal Time. - - -### Microsoft.Windows.Update.NotificationUx.EnhancedEngagedRebootReminderDialog - -This event returns information relating to the Enhanced Engaged reboot reminder dialog that was displayed. - -The following fields are available: - -- **DeviceLocalTime** The time at which the reboot reminder dialog was shown (based on the local device time settings). -- **ETag** The OneSettings versioning value. -- **ExitCode** Indicates how users exited the reboot reminder dialog box. -- **RebootVersion** The version of the DTE (Direct-to-Engaged). -- **UpdateId** The ID of the update that is waiting for reboot to finish installation. -- **UpdateRevision** The revision of the update that is waiting for reboot to finish installation. -- **UserResponseString** The option chosen by the user on the reboot dialog box. -- **UtcTime** The time at which the reboot reminder dialog was shown (in UTC). - - -### Microsoft.Windows.Update.NotificationUx.EnhancedEngagedRebootReminderToast - -This event indicates that the Enhanced Engaged restart reminder pop-up banner was displayed. - -The following fields are available: - -- **DeviceLocalTime** The local time on the device sending the event. -- **ETag** OneSettings versioning value. -- **ExitCode** Indicates how users exited the pop-up banner. -- **RebootVersion** The version of the reboot logic. -- **UpdateId** The ID of the update that is pending restart to finish installation. -- **UpdateRevision** The revision of the update that is pending restart to finish installation. -- **UserResponseString** The option that the user chose in the pop-up banner. -- **UtcTime** The time that the pop-up banner was displayed, in Coordinated Universal Time. - - -### Microsoft.Windows.Update.NotificationUx.RebootScheduled - -Indicates when a reboot is scheduled by the system or a user for a security, quality, or feature update. - -The following fields are available: - -- **activeHoursApplicable** Indicates whether an Active Hours policy is present on the device. -- **IsEnhancedEngagedReboot** Indicates whether this is an Enhanced Engaged reboot. -- **rebootArgument** Argument for the reboot task. It also represents specific reboot related action. -- **rebootOutsideOfActiveHours** Indicates whether a restart is scheduled outside of active hours. -- **rebootScheduledByUser** Indicates whether the restart was scheduled by user (if not, it was scheduled automatically). -- **rebootState** The current state of the restart. -- **rebootUsingSmartScheduler** Indicates whether the reboot is scheduled by smart scheduler. -- **revisionNumber** Revision number of the update that is getting installed with this restart. -- **scheduledRebootTime** Time of the scheduled restart. -- **scheduledRebootTimeInUTC** Time of the scheduled restart in Coordinated Universal Time. -- **updateId** ID of the update that is getting installed with this restart. -- **wuDeviceid** Unique device ID used by Windows Update. - - -### Microsoft.Windows.Update.Orchestrator.ActivityRestrictedByActiveHoursPolicy - -This event indicates a policy is present that may restrict update activity to outside of active hours. - -The following fields are available: - -- **activeHoursEnd** The end of the active hours window. -- **activeHoursStart** The start of the active hours window. -- **wuDeviceid** Unique device ID used by Windows Update. - - -### Microsoft.Windows.Update.Orchestrator.BlockedByActiveHours - -This event indicates that update activity was blocked because it is within the active hours window. - -The following fields are available: - -- **activeHoursEnd** The end of the active hours window. -- **activeHoursStart** The start of the active hours window. -- **updatePhase** The current state of the update process. -- **wuDeviceid** Unique device ID used by Windows Update. - - -### Microsoft.Windows.Update.Orchestrator.BlockedByBatteryLevel - -This event indicates that Windows Update activity was blocked due to low battery level. - -The following fields are available: - -- **batteryLevel** The current battery charge capacity. -- **batteryLevelThreshold** The battery capacity threshold to stop update activity. -- **updatePhase** The current state of the update process. -- **wuDeviceid** Device ID. - - -### Microsoft.Windows.Update.Orchestrator.DeferRestart - -This event indicates that a restart required for installing updates was postponed. - -The following fields are available: - -- **displayNeededReason** List of reasons for needing display. -- **eventScenario** Indicates the purpose of the event (scan started, succeeded, failed, etc.). -- **filteredDeferReason** Applicable filtered reasons why reboot was postponed (such as user active, or low battery). -- **gameModeReason** Name of the executable that caused the game mode state check to start. -- **ignoredReason** List of reasons that were intentionally ignored. -- **IgnoreReasonsForRestart** List of reasons why restart was deferred. -- **revisionNumber** Update ID revision number. -- **systemNeededReason** List of reasons why system is needed. -- **updateId** Update ID. -- **updateScenarioType** Update session type. -- **wuDeviceid** Unique device ID used by Windows Update. - - -### Microsoft.Windows.Update.Orchestrator.Detection - -This event indicates that a scan for a Windows Update occurred. - -The following fields are available: - -- **deferReason** The reason why the device could not check for updates. -- **detectionBlockingPolicy** The Policy that blocked detection. -- **detectionBlockreason** The reason detection did not complete. -- **detectionRetryMode** Indicates whether we will try to scan again. -- **errorCode** The error code returned for the current process. -- **eventScenario** End-to-end update session ID, or indicates the purpose of sending this event - whether because the software distribution just started installing content, or whether it was cancelled, succeeded, or failed. -- **flightID** The unique identifier for the flight (Windows Insider pre-release build) should be delivered to the device, if applicable. -- **interactive** Indicates whether the user initiated the session. -- **networkStatus** Indicates if the device is connected to the internet. -- **revisionNumber** The Update revision number. -- **scanTriggerSource** The source of the triggered scan. -- **updateId** The unique identifier of the Update. -- **updateScenarioType** Identifies the type of update session being performed. -- **wuDeviceid** The unique device ID used by Windows Update. - - -### Microsoft.Windows.Update.Orchestrator.DisplayNeeded - -This event indicates the reboot was postponed due to needing a display. - -The following fields are available: - -- **displayNeededReason** Reason the display is needed. -- **eventScenario** Indicates the purpose of sending this event - whether because the software distribution just started checking for content, or whether it was cancelled, succeeded, or failed. -- **rebootOutsideOfActiveHours** Indicates whether the reboot was to occur outside of active hours. -- **revisionNumber** Revision number of the update. -- **updateId** Update ID. -- **updateScenarioType** The update session type. -- **uxRebootstate** Indicates the exact state of the user experience at the time the required reboot was initiated. -- **wuDeviceid** The unique identifier of a specific device, used to identify how many devices are encountering success or a particular issue - - -### Microsoft.Windows.Update.Orchestrator.Download - -This event sends launch data for a Windows Update download to help keep Windows up to date. - -The following fields are available: - -- **deferReason** Reason for download not completing. -- **errorCode** An error code represented as a hexadecimal value. -- **eventScenario** End-to-end update session ID. -- **flightID** The specific ID of the Windows Insider build the device is getting. -- **interactive** Indicates whether the session is user initiated. -- **revisionNumber** Update revision number. -- **updateId** Update ID. -- **updateScenarioType** The update session type. -- **wuDeviceid** Unique device ID used by Windows Update. - - -### Microsoft.Windows.Update.Orchestrator.DTUCompletedWhenWuFlightPendingCommit - -This event indicates that DTU completed installation of the electronic software delivery (ESD), when Windows Update was already in Pending Commit phase of the feature update. - -The following fields are available: - -- **wuDeviceid** Device ID used by Windows Update. - - -### Microsoft.Windows.Update.Orchestrator.DTUEnabled - -This event indicates that Inbox DTU functionality was enabled. - -The following fields are available: - -- **wuDeviceid** Device ID used by Windows Update. - - -### Microsoft.Windows.Update.Orchestrator.DTUInitiated - -This event indicates that Inbox DTU functionality was intiated. - -The following fields are available: - -- **dtuErrorCode** Return code from creating the DTU Com Server. -- **isDtuApplicable** Determination of whether DTU is applicable to the machine it is running on. -- **wuDeviceid** Device ID used by Windows Update. - - -### Microsoft.Windows.Update.Orchestrator.EscalationRiskLevels - -This event is sent during update scan, download, or install, and indicates that the device is at risk of being out-of-date. - -The following fields are available: - -- **configVersion** The escalation configuration version on the device. -- **downloadElapsedTime** Indicates how long since the download is required on device. -- **downloadRiskLevel** At-risk level of download phase. -- **installElapsedTime** Indicates how long since the install is required on device. -- **installRiskLevel** The at-risk level of install phase. -- **isSediment** Assessment of whether is device is at risk. -- **scanElapsedTime** Indicates how long since the scan is required on device. -- **scanRiskLevel** At-risk level of the scan phase. -- **wuDeviceid** Device ID used by Windows Update. - - -### Microsoft.Windows.Update.Orchestrator.FailedToAddTimeTriggerToScanTask - -This event indicated that USO failed to add a trigger time to a task. - -The following fields are available: - -- **errorCode** The Windows Update error code. -- **wuDeviceid** The Windows Update device ID. - - -### Microsoft.Windows.Update.Orchestrator.FlightInapplicable - -This event indicates that the update is no longer applicable to this device. - -The following fields are available: - -- **EventPublishedTime** Time when this event was generated. -- **flightID** The specific ID of the Windows Insider build. -- **inapplicableReason** The reason why the update is inapplicable. -- **revisionNumber** Update revision number. -- **updateId** Unique Windows Update ID. -- **updateScenarioType** Update session type. -- **UpdateStatus** Last status of update. -- **UUPFallBackConfigured** Indicates whether UUP fallback is configured. -- **wuDeviceid** Unique Device ID. - - -### Microsoft.Windows.Update.Orchestrator.InitiatingReboot - -This event sends data about an Orchestrator requesting a reboot from power management to help keep Windows up to date. - -The following fields are available: - -- **EventPublishedTime** Time of the event. -- **flightID** Unique update ID -- **interactive** Indicates whether the reboot initiation stage of the update process was entered as a result of user action. -- **rebootOutsideOfActiveHours** Indicates whether the reboot was to occur outside of active hours. -- **revisionNumber** Revision number of the update. -- **updateId** Update ID. -- **updateScenarioType** The update session type. -- **uxRebootstate** Indicates the exact state of the user experience at the time the required reboot was initiated. -- **wuDeviceid** Unique device ID used by Windows Update. - - -### Microsoft.Windows.Update.Orchestrator.Install - -This event sends launch data for a Windows Update install to help keep Windows up to date. - -The following fields are available: - -- **batteryLevel** Current battery capacity in mWh or percentage left. -- **deferReason** Reason for install not completing. -- **errorCode** The error code reppresented by a hexadecimal value. -- **eventScenario** End-to-end update session ID. -- **flightID** The ID of the Windows Insider build the device is getting. -- **flightUpdate** Indicates whether the update is a Windows Insider build. -- **ForcedRebootReminderSet** A boolean value that indicates if a forced reboot will happen for updates. -- **IgnoreReasonsForRestart** The reason(s) a Postpone Restart command was ignored. -- **installCommitfailedtime** The time it took for a reboot to happen but the upgrade failed to progress. -- **installRebootinitiatetime** The time it took for a reboot to be attempted. -- **interactive** Identifies if session is user initiated. -- **minutesToCommit** The time it took to install updates. -- **rebootOutsideOfActiveHours** Indicates whether a reboot is scheduled outside of active hours. -- **revisionNumber** Update revision number. -- **updateId** Update ID. -- **updateScenarioType** The update session type. -- **uxRebootstate** Indicates the exact state of the user experience at the time the required reboot was initiated to ensure the correct update process and experience is provided to keep Windows up to date. -- **wuDeviceid** Unique device ID used by Windows Update. - - -### Microsoft.Windows.Update.Orchestrator.LowUptimes - -This event is sent if a device is identified as not having sufficient uptime to reliably process updates in order to keep secure. - -The following fields are available: - -- **availableHistoryMinutes** The number of minutes available from the local machine activity history. -- **isLowUptimeMachine** Is the machine considered low uptime or not. -- **lowUptimeMinHours** Current setting for the minimum number of hours needed to not be considered low uptime. -- **lowUptimeQueryDays** Current setting for the number of recent days to check for uptime. -- **uptimeMinutes** Number of minutes of uptime measured. -- **wuDeviceid** Unique device ID for Windows Update. - - -### Microsoft.Windows.Update.Orchestrator.OneshotUpdateDetection - -This event returns data about scans initiated through settings UI, or background scans that are urgent; to help keep Windows up to date. - -The following fields are available: - -- **externalOneshotupdate** The last time a task-triggered scan was completed. -- **interactiveOneshotupdate** The last time an interactive scan was completed. -- **oldlastscanOneshotupdate** The last time a scan completed successfully. -- **wuDeviceid** The Windows Update Device GUID (Globally-Unique ID). - - -### Microsoft.Windows.Update.Orchestrator.PreShutdownStart - -This event is generated before the shutdown and commit operations. - -The following fields are available: - -- **wuDeviceid** The unique identifier of a specific device, used to identify how many devices are encountering success or a particular issue. - - -### Microsoft.Windows.Update.Orchestrator.RebootFailed - -This event sends information about whether an update required a reboot and reasons for failure, to help keep Windows up to date. - -The following fields are available: - -- **batteryLevel** Current battery capacity in mWh or percentage left. -- **deferReason** Reason for install not completing. -- **EventPublishedTime** The time that the reboot failure occurred. -- **flightID** Unique update ID. -- **rebootOutsideOfActiveHours** Indicates whether a reboot was scheduled outside of active hours. -- **RebootResults** Hex code indicating failure reason. Typically, we expect this to be a specific USO generated hex code. -- **revisionNumber** Update revision number. -- **updateId** Update ID. -- **updateScenarioType** The update session type. -- **uxRebootstate** Indicates the exact state of the user experience at the time the required reboot was initiated to ensure the correct update process and experience is provided to keep Windows up to date. -- **wuDeviceid** Unique device ID used by Windows Update. - - -### Microsoft.Windows.Update.Orchestrator.RefreshSettings - -This event sends basic data about the version of upgrade settings applied to the system to help keep Windows up to date. - -The following fields are available: - -- **errorCode** Hex code for the error message, to allow lookup of the specific error. -- **settingsDownloadTime** Timestamp of the last attempt to acquire settings. -- **settingsETag** Version identifier for the settings. -- **wuDeviceid** Unique device ID used by Windows Update. - - -### Microsoft.Windows.Update.Orchestrator.RestoreRebootTask - -This event sends data indicating that a reboot task is missing unexpectedly on a device and the task is restored because a reboot is still required, to help keep Windows up to date. - -The following fields are available: - -- **RebootTaskMissedTimeUTC** The time when the reboot task was scheduled to run, but did not. -- **RebootTaskNextTimeUTC** The time when the reboot task was rescheduled for. -- **RebootTaskRestoredTime** Time at which this reboot task was restored. -- **wuDeviceid** Device ID for the device on which the reboot is restored. - - -### Microsoft.Windows.Update.Orchestrator.ScanTriggered - -This event indicates that Update Orchestrator has started a scan operation. - -The following fields are available: - -- **errorCode** The error code returned for the current scan operation. -- **eventScenario** Indicates the purpose of sending this event. -- **interactive** Indicates whether the scan is interactive. -- **isDTUEnabled** Indicates whether DTU (internal abbreviation for Direct Feature Update) channel is enabled on the client system. -- **isScanPastSla** Indicates whether the SLA has elapsed for scanning. -- **isScanPastTriggerSla** Indicates whether the SLA has elapsed for triggering a scan. -- **minutesOverScanSla** Indicates how many minutes the scan exceeded the scan SLA. -- **minutesOverScanTriggerSla** Indicates how many minutes the scan exceeded the scan trigger SLA. -- **scanTriggerSource** Indicates what caused the scan. -- **updateScenarioType** The update session type. -- **wuDeviceid** Unique device ID used by Windows Update. - - -### Microsoft.Windows.Update.Orchestrator.StickUpdate - -This event is sent when the update service orchestrator (USO) indicates the update cannot be superseded by a newer update. - -The following fields are available: - -- **updateId** Identifier associated with the specific piece of content. -- **wuDeviceid** Unique device ID controlled by the software distribution client. - - -### Microsoft.Windows.Update.Orchestrator.SystemNeeded - -This event sends data about why a device is unable to reboot, to help keep Windows up to date. - -The following fields are available: - -- **eventScenario** End-to-end update session ID. -- **rebootOutsideOfActiveHours** Indicates whether a reboot is scheduled outside of active hours. -- **revisionNumber** Update revision number. -- **systemNeededReason** List of apps or tasks that are preventing the system from restarting. -- **updateId** Update ID. -- **updateScenarioType** The update session type. -- **uxRebootstate** Indicates the exact state of the user experience at the time the required reboot was initiated to ensure the correct update process and experience is provided to keep Windows up to date. -- **wuDeviceid** Unique device ID used by Windows Update. - - -### Microsoft.Windows.Update.Orchestrator.TerminatedByActiveHours - -This event indicates that update activity was stopped due to active hours starting. - -The following fields are available: - -- **activeHoursEnd** The end of the active hours window. -- **activeHoursStart** The start of the active hours window. -- **updatePhase** The current state of the update process. -- **wuDeviceid** The device identifier. - - -### Microsoft.Windows.Update.Orchestrator.TerminatedByBatteryLevel - -This event is sent when update activity was stopped due to a low battery level. - -The following fields are available: - -- **batteryLevel** The current battery charge capacity. -- **batteryLevelThreshold** The battery capacity threshold to stop update activity. -- **updatePhase** The current state of the update process. -- **wuDeviceid** The device identifier. - - -### Microsoft.Windows.Update.Orchestrator.UnstickUpdate - -This event is sent when the update service orchestrator (USO) indicates that the update can be superseded by a newer update. - -The following fields are available: - -- **updateId** Identifier associated with the specific piece of content. -- **wuDeviceid** Unique device ID controlled by the software distribution client. - - -### Microsoft.Windows.Update.Orchestrator.UpdatePolicyCacheRefresh - -This event sends data on whether Update Management Policies were enabled on a device, to help keep Windows up to date. - -The following fields are available: - -- **configuredPoliciescount** Number of policies on the device. -- **configuredPoliciescsunt** No content is currently available. -- **policiesNamevaluesource** Policy name and source of policy (group policy, MDM or flight). -- **policyCacherefreshtime** Time when policy cache was refreshed. -- **updateInstalluxsetting** Indicates whether a user has set policies via a user experience option. -- **wuDeviceid** Unique device ID used by Windows Update. - - -### Microsoft.Windows.Update.Orchestrator.UpdateRebootRequired - -This event sends data about whether an update required a reboot to help keep Windows up to date. - -The following fields are available: - -- **flightID** The specific ID of the Windows Insider build the device is getting. -- **interactive** Indicates whether the reboot initiation stage of the update process was entered as a result of user action. -- **revisionNumber** Update revision number. -- **updateId** Update ID. -- **updateScenarioType** The update session type. -- **uxRebootstate** Indicates the exact state of the user experience at the time the required reboot was initiated to ensure the correct update process and experience is provided to keep Windows up to date. -- **wuDeviceid** Unique device ID used by Windows Update. - - -### Microsoft.Windows.Update.Orchestrator.updateSettingsFlushFailed - -This event sends information about an update that encountered problems and was not able to complete. - -The following fields are available: - -- **errorCode** The error code encountered. -- **wuDeviceid** The ID of the device in which the error occurred. - - -### Microsoft.Windows.Update.Orchestrator.UsoSession - -This event represents the state of the USO service at start and completion. - -The following fields are available: - -- **activeSessionid** A unique session GUID. -- **eventScenario** The state of the update action. -- **interactive** Is the USO session interactive? -- **lastErrorcode** The last error that was encountered. -- **lastErrorstate** The state of the update when the last error was encountered. -- **sessionType** A GUID that refers to the update session type. -- **updateScenarioType** A descriptive update session type. -- **wuDeviceid** The Windows Update device GUID. - - -### Microsoft.Windows.Update.Ux.MusNotification.EnhancedEngagedRebootUxState - -This event sends information about the configuration of Enhanced Direct-to-Engaged (eDTE), which includes values for the timing of how eDTE will progress through each phase of the reboot. - -The following fields are available: - -- **AcceptAutoModeLimit** The maximum number of days for a device to automatically enter Auto Reboot mode. -- **AutoToAutoFailedLimit** The maximum number of days for Auto Reboot mode to fail before a Reboot Failed dialog will be shown. -- **DeviceLocalTime** The date and time (based on the device date/time settings) the reboot mode changed. -- **EngagedModeLimit** The number of days to switch between DTE (Direct-to-Engaged) dialogs. -- **EnterAutoModeLimit** The maximum number of days a device can enter Auto Reboot mode. -- **ETag** The Entity Tag that represents the OneSettings version. -- **IsForcedEnabled** Identifies whether Forced Reboot mode is enabled for the device. -- **IsUltimateForcedEnabled** Identifies whether Ultimate Forced Reboot mode is enabled for the device. -- **OldestUpdateLocalTime** The date and time (based on the device date/time settings) this update’s reboot began pending. -- **RebootUxState** Identifies the reboot state: Engaged, Auto, Forced, UltimateForced. -- **RebootVersion** The version of the DTE (Direct-to-Engaged). -- **SkipToAutoModeLimit** The maximum number of days to switch to start while in Auto Reboot mode. -- **UpdateId** The ID of the update that is waiting for reboot to finish installation. -- **UpdateRevision** The revision of the update that is waiting for reboot to finish installation. - - -### Microsoft.Windows.Update.Ux.MusNotification.RebootNoLongerNeeded - -This event is sent when a security update has successfully completed. - -The following fields are available: - -- **UtcTime** The Coordinated Universal Time that the restart was no longer needed. - - -### Microsoft.Windows.Update.Ux.MusNotification.RebootScheduled - -This event sends basic information about scheduling an update-related reboot, to get security updates and to help keep Windows up-to-date. - -The following fields are available: - -- **activeHoursApplicable** Indicates whether Active Hours applies on this device. -- **IsEnhancedEngagedReboot** Indicates whether Enhanced reboot was enabled. -- **rebootArgument** Argument for the reboot task. It also represents specific reboot related action. -- **rebootOutsideOfActiveHours** True, if a reboot is scheduled outside of active hours. False, otherwise. -- **rebootScheduledByUser** True, if a reboot is scheduled by user. False, if a reboot is scheduled automatically. -- **rebootState** Current state of the reboot. -- **rebootUsingSmartScheduler** Indicates that the reboot is scheduled by SmartScheduler. -- **revisionNumber** Revision number of the OS. -- **scheduledRebootTime** Time scheduled for the reboot. -- **scheduledRebootTimeInUTC** Time scheduled for the reboot, in UTC. -- **updateId** Identifies which update is being scheduled. -- **wuDeviceid** The unique device ID used by Windows Update. - - -### Microsoft.Windows.Update.Ux.MusNotification.UxBrokerScheduledTask - -This event is sent when MUSE broker schedules a task. - -The following fields are available: - -- **TaskArgument** The arguments with which the task is scheduled. -- **TaskName** Name of the task. - - -### Microsoft.Windows.Update.Ux.MusUpdateSettings.RebootScheduled - -This event sends basic information for scheduling a device restart to install security updates. It's used to help keep Windows up to date. - -The following fields are available: - -- **activeHoursApplicable** Is the restart respecting Active Hours? -- **IsEnhancedEngagedReboot** TRUE if the reboot path is Enhanced Engaged. Otherwise, FALSE. -- **rebootArgument** The arguments that are passed to the OS for the restarted. -- **rebootOutsideOfActiveHours** Was the restart scheduled outside of Active Hours? -- **rebootScheduledByUser** Was the restart scheduled by the user? If the value is false, the restart was scheduled by the device. -- **rebootState** The state of the restart. -- **rebootUsingSmartScheduler** TRUE if the reboot should be performed by the Smart Scheduler. Otherwise, FALSE. -- **revisionNumber** The revision number of the OS being updated. -- **scheduledRebootTime** Time of the scheduled reboot -- **scheduledRebootTimeInUTC** Time of the scheduled restart, in Coordinated Universal Time. -- **updateId** The Windows Update device GUID. -- **wuDeviceid** The Windows Update device GUID. - - -## Windows Update mitigation events - -### Mitigation360Telemetry.MitigationCustom.CleanupSafeOsImages - -This event sends data specific to the CleanupSafeOsImages mitigation used for OS Updates. - -The following fields are available: - -- **ClientId** The client ID used by Windows Update. -- **FlightId** The ID of each Windows Insider build the device received. -- **InstanceId** A unique device ID that identifies each update instance. -- **MitigationScenario** The update scenario in which the mitigation was executed. -- **MountedImageCount** The number of mounted images. -- **MountedImageMatches** The number of mounted image matches. -- **MountedImagesFailed** The number of mounted images that could not be removed. -- **MountedImagesRemoved** The number of mounted images that were successfully removed. -- **MountedImagesSkipped** The number of mounted images that were not found. -- **RelatedCV** The correlation vector value generated from the latest USO scan. -- **Result** HResult of this operation. -- **ScenarioId** ID indicating the mitigation scenario. -- **ScenarioSupported** Indicates whether the scenario was supported. -- **SessionId** Unique value for each update attempt. -- **UpdateId** Unique ID for each Windows Update. -- **WuId** Unique ID for the Windows Update client. - - -### Mitigation360Telemetry.MitigationCustom.FixAppXReparsePoints - -This event sends data specific to the FixAppXReparsePoints mitigation used for OS updates. - -The following fields are available: - -- **ClientId** Unique identifier for each flight. -- **FlightId** Unique GUID that identifies each instances of setuphost.exe. -- **InstanceId** The update scenario in which the mitigation was executed. -- **MitigationScenario** Correlation vector value generated from the latest USO scan. -- **RelatedCV** Number of reparse points that are corrupted but we failed to fix them. -- **ReparsePointsFailed** Number of reparse points that were corrupted and were fixed by this mitigation. -- **ReparsePointsFixed** Number of reparse points that are not corrupted and no action is required. -- **ReparsePointsSkipped** HResult of this operation. -- **Result** ID indicating the mitigation scenario. -- **ScenarioId** Indicates whether the scenario was supported. -- **ScenarioSupported** Unique value for each update attempt. -- **SessionId** Unique ID for each Update. -- **UpdateId** Unique ID for the Windows Update client. -- **WuId** Unique ID for the Windows Update client. - - -### Mitigation360Telemetry.MitigationCustom.FixupEditionId - -This event sends data specific to the FixupEditionId mitigation used for OS updates. - -The following fields are available: - -- **ClientId** In the WU scenario, this will be the WU client ID that is passed to Setup. In Media setup, default value is Media360, but can be overwritten by the caller to a unique value. -- **EditionIdUpdated** Determine whether EditionId was changed. -- **FlightId** Unique identifier for each flight. -- **InstanceId** Unique GUID that identifies each instances of setuphost.exe. -- **MitigationScenario** The update scenario in which the mitigation was executed. -- **ProductEditionId** Expected EditionId value based on GetProductInfo. -- **ProductType** Value returned by GetProductInfo. -- **RegistryEditionId** EditionId value in the registry. -- **RelatedCV** Correlation vector value generated from the latest USO scan. -- **Result** HResult of this operation. -- **ScenarioId** ID indicating the mitigation scenario. -- **ScenarioSupported** Indicates whether the scenario was supported. -- **SessionId** Unique value for each update attempt. -- **UpdateId** Unique ID for each update. -- **WuId** Unique ID for the Windows Update client. - - -## Windows Update Reserve Manager events - -### Microsoft.Windows.UpdateReserveManager.CommitPendingHardReserveAdjustment - -This event is sent when the Update Reserve Manager commits a hard reserve adjustment that was pending. - -The following fields are available: - -- **FinalAdjustment** Final adjustment for the hard reserve following the addition or removal of optional content. -- **InitialAdjustment** Initial intended adjustment for the hard reserve following the addition/removal of optional content. - - -### Microsoft.Windows.UpdateReserveManager.FunctionReturnedError - -This event is sent when the Update Reserve Manager returns an error from one of its internal functions. - -The following fields are available: - -- **FailedExpression** The failed expression that was returned. -- **FailedFile** The binary file that contained the failed function. -- **FailedFunction** The name of the function that originated the failure. -- **FailedLine** The line number of the failure. -- **ReturnCode** The return code of the function. - - -### Microsoft.Windows.UpdateReserveManager.InitializeUpdateReserveManager - -This event returns data about the Update Reserve Manager, including whether it’s been initialized. - -The following fields are available: - -- **ClientId** The ID of the caller application. -- **Flags** The enumerated flags used to initialize the manager. -- **FlightId** The flight ID of the content the calling client is currently operating with. -- **Offline** Indicates whether or the reserve manager is called during offline operations. -- **PolicyPassed** Indicates whether the machine is able to use reserves. -- **ReturnCode** Return code of the operation. -- **Version** The version of the Update Reserve Manager. - - -### Microsoft.Windows.UpdateReserveManager.PrepareTIForReserveInitialization - -This event is sent when the Update Reserve Manager prepares the Trusted Installer to initialize reserves on the next boot. - -The following fields are available: - -- **Flags** The flags that are passed to the function to prepare the Trusted Installer for reserve initialization. - - -### Microsoft.Windows.UpdateReserveManager.RemovePendingHardReserveAdjustment - -This event is sent when the Update Reserve Manager removes a pending hard reserve adjustment. - - - -### Microsoft.Windows.UpdateReserveManager.UpdatePendingHardReserveAdjustment - -This event is sent when the Update Reserve Manager needs to adjust the size of the hard reserve after the option content is installed. - -The following fields are available: - -- **ChangeSize** The change in the hard reserve size based on the addition or removal of optional content. -- **Disposition** The parameter for the hard reserve adjustment function. -- **Flags** The flags passed to the hard reserve adjustment function. -- **PendingHardReserveAdjustment** The final change to the hard reserve size. -- **UpdateType** Indicates whether the change is an increase or decrease in the size of the hard reserve. - - -## Winlogon events - -### Microsoft.Windows.Security.Winlogon.SetupCompleteLogon - -This event signals the completion of the setup process. It happens only once during the first logon. - - - -## XBOX events - -### Microsoft.Xbox.XamTelemetry.AppActivationError - -This event indicates whether the system detected an activation error in the app. - -The following fields are available: - -- **ActivationUri** Activation URI (Uniform Resource Identifier) used in the attempt to activate the app. -- **AppId** The Xbox LIVE Title ID. -- **AppUserModelId** The AUMID (Application User Model ID) of the app to activate. -- **Result** The HResult error. -- **UserId** The Xbox LIVE User ID (XUID). - - -### Microsoft.Xbox.XamTelemetry.AppActivity - -This event is triggered whenever the current app state is changed by: launch, switch, terminate, snap, etc. - -The following fields are available: - -- **AppActionId** The ID of the application action. -- **AppCurrentVisibilityState** The ID of the current application visibility state. -- **AppId** The Xbox LIVE Title ID of the app. -- **AppPackageFullName** The full name of the application package. -- **AppPreviousVisibilityState** The ID of the previous application visibility state. -- **AppSessionId** The application session ID. -- **AppType** The type ID of the application (AppType_NotKnown, AppType_Era, AppType_Sra, AppType_Uwa). -- **BCACode** The BCA (Burst Cutting Area) mark code of the optical disc used to launch the application. -- **DurationMs** The amount of time (in milliseconds) since the last application state transition. -- **IsTrialLicense** This boolean value is TRUE if the application is on a trial license. -- **LicenseType** The type of licensed used to authorize the app (0 - Unknown, 1 - User, 2 - Subscription, 3 - Offline, 4 - Disc). -- **LicenseXuid** If the license type is 1 (User), this field contains the XUID (Xbox User ID) of the registered owner of the license. -- **ProductGuid** The Xbox product GUID (Globally-Unique ID) of the application. -- **UserId** The XUID (Xbox User ID) of the current user. - - - +--- +description: Use this article to learn more about what Windows diagnostic data is gathered at the basic level. +title: Windows 10, version 1809 basic diagnostic events and fields (Windows 10) +keywords: privacy, telemetry +ms.prod: w10 +ms.mktglfcycl: manage +ms.sitesec: library +ms.pagetype: security +localizationpriority: high +author: brianlic-msft +ms.author: brianlic +manager: dansimp +ms.collection: M365-security-compliance +ms.topic: article +audience: ITPro +ms.date: 03/27/2019 +--- + + +# Windows 10, version 1809 basic level Windows diagnostic events and fields + + **Applies to** + +- Windows 10, version 1809 + + +The Basic level gathers a limited set of information that is critical for understanding the device and its configuration including: basic device information, quality-related information, app compatibility, and Microsoft Store. When the level is set to Basic, it also includes the Security level information. + +The Basic level helps to identify problems that can occur on a particular device hardware or software configuration. For example, it can help determine if crashes are more frequent on devices with a specific amount of memory or that are running a particular driver version. This helps Microsoft fix operating system or app problems. + +Use this article to learn about diagnostic events, grouped by event area, and the fields within each event. A brief description is provided for each field. Every event generated includes common data, which collects device data. + +You can learn more about Windows functional and diagnostic data through these articles: + + +- [Windows 10, version 1803 basic diagnostic events and fields](basic-level-windows-diagnostic-events-and-fields-1803.md) +- [Windows 10, version 1709 basic diagnostic events and fields](basic-level-windows-diagnostic-events-and-fields-1709.md) +- [Windows 10, version 1703 basic diagnostic events and fields](basic-level-windows-diagnostic-events-and-fields-1703.md) +- [Manage connections from Windows operating system components to Microsoft services](manage-connections-from-windows-operating-system-components-to-microsoft-services.md) +- [Configure Windows diagnostic data in your organization](configure-windows-diagnostic-data-in-your-organization.md) + + + + +## Account trace logging provider events + +### Microsoft.Windows.Mitigation.AccountTraceLoggingProvider.General + +This event provides information about application properties to indicate the successful execution. + +The following fields are available: + +- **AppMode** Indicates the mode the app is being currently run around privileges. +- **ExitCode** Indicates the exit code of the app. +- **Help** Indicates if the app needs to be launched in the help mode. +- **ParseError** Indicates if there was a parse error during the execution. +- **RightsAcquired** Indicates if the right privileges were acquired for successful execution. +- **RightsWereEnabled** Indicates if the right privileges were enabled for successful execution. +- **TestMode** Indicates whether the app is being run in test mode. + + +### Microsoft.Windows.Mitigation.AccountTraceLoggingProvider.GetCount + +This event provides information about the properties of user accounts in the Administrator group. + +The following fields are available: + +- **Internal** Indicates the internal property associated with the count group. +- **LastError** The error code (if applicable) for the cause of the failure to get the count of the user account. +- **Result** The HResult error. + + +## AppLocker events + +### Microsoft.Windows.Security.AppLockerCSP.ActivityStoppedAutomatically + +Automatically closed activity for start/stop operations that aren't explicitly closed. + + + +### Microsoft.Windows.Security.AppLockerCSP.AddParams + +Parameters passed to Add function of the AppLockerCSP Node. + +The following fields are available: + +- **child** The child URI of the node to add. +- **uri** URI of the node relative to %SYSTEM32%/AppLocker. + + +### Microsoft.Windows.Security.AppLockerCSP.AddStart + +Start of "Add" Operation for the AppLockerCSP Node. + + + +### Microsoft.Windows.Security.AppLockerCSP.AddStop + +End of "Add" Operation for AppLockerCSP Node. + +The following fields are available: + +- **hr** The HRESULT returned by Add function in AppLockerCSP. + + +### Microsoft.Windows.Security.AppLockerCSP.CAppLockerCSP::Rollback + +Result of the 'Rollback' operation in AppLockerCSP. + +The following fields are available: + +- **oldId** Previous id for the CSP transaction. +- **txId** Current id for the CSP transaction. + + +### Microsoft.Windows.Security.AppLockerCSP.ClearParams + +Parameters passed to the "Clear" operation for AppLockerCSP. + +The following fields are available: + +- **uri** The URI relative to the %SYSTEM32%\AppLocker folder. + + +### Microsoft.Windows.Security.AppLockerCSP.ClearStart + +Start of the "Clear" operation for the AppLockerCSP Node. + + + +### Microsoft.Windows.Security.AppLockerCSP.ClearStop + +End of the "Clear" operation for the AppLockerCSP node. + +The following fields are available: + +- **hr** HRESULT reported at the end of the 'Clear' function. + + +### Microsoft.Windows.Security.AppLockerCSP.ConfigManagerNotificationStart + +Start of the "ConfigManagerNotification" operation for AppLockerCSP. + +The following fields are available: + +- **NotifyState** State sent by ConfigManager to AppLockerCSP. + + +### Microsoft.Windows.Security.AppLockerCSP.ConfigManagerNotificationStop + +End of the "ConfigManagerNotification" operation for AppLockerCSP. + +The following fields are available: + +- **hr** HRESULT returned by the ConfigManagerNotification function in AppLockerCSP. + + +### Microsoft.Windows.Security.AppLockerCSP.CreateNodeInstanceParams + +Parameters passed to the CreateNodeInstance function of the AppLockerCSP node. + +The following fields are available: + +- **NodeId** NodeId passed to CreateNodeInstance. +- **nodeOps** NodeOperations parameter passed to CreateNodeInstance. +- **uri** URI passed to CreateNodeInstance, relative to %SYSTEM32%\AppLocker. + + +### Microsoft.Windows.Security.AppLockerCSP.CreateNodeInstanceStart + +Start of the "CreateNodeInstance" operation for the AppLockerCSP node. + + + +### Microsoft.Windows.Security.AppLockerCSP.CreateNodeInstanceStop + +End of the "CreateNodeInstance" operation for the AppLockerCSP node + +The following fields are available: + +- **hr** HRESULT returned by the CreateNodeInstance function in AppLockerCSP. + + +### Microsoft.Windows.Security.AppLockerCSP.DeleteChildParams + +Parameters passed to the DeleteChild function of the AppLockerCSP node. + +The following fields are available: + +- **child** The child URI of the node to delete. +- **uri** URI relative to %SYSTEM32%\AppLocker. + + +### Microsoft.Windows.Security.AppLockerCSP.DeleteChildStart + +Start of the "DeleteChild" operation for the AppLockerCSP node. + + + +### Microsoft.Windows.Security.AppLockerCSP.DeleteChildStop + +End of the "DeleteChild" operation for the AppLockerCSP node. + +The following fields are available: + +- **hr** HRESULT returned by the DeleteChild function in AppLockerCSP. + + +### Microsoft.Windows.Security.AppLockerCSP.EnumPolicies + +Logged URI relative to %SYSTEM32%\AppLocker, if the Plugin GUID is null, or the CSP doesn't believe the old policy is present. + +The following fields are available: + +- **uri** URI relative to %SYSTEM32%\AppLocker. + + +### Microsoft.Windows.Security.AppLockerCSP.GetChildNodeNamesParams + +Parameters passed to the GetChildNodeNames function of the AppLockerCSP node. + +The following fields are available: + +- **uri** URI relative to %SYSTEM32%/AppLocker for MDM node. + + +### Microsoft.Windows.Security.AppLockerCSP.GetChildNodeNamesStart + +Start of the "GetChildNodeNames" operation for the AppLockerCSP node. + + + +### Microsoft.Windows.Security.AppLockerCSP.GetChildNodeNamesStop + +End of the "GetChildNodeNames" operation for the AppLockerCSP node. + +The following fields are available: + +- **child[0]** If function succeeded, the first child's name, else "NA". +- **count** If function succeeded, the number of child node names returned by the function, else 0. +- **hr** HRESULT returned by the GetChildNodeNames function of AppLockerCSP. + + +### Microsoft.Windows.Security.AppLockerCSP.GetLatestId + +The result of 'GetLatestId' in AppLockerCSP (the latest time stamped GUID). + +The following fields are available: + +- **dirId** The latest directory identifier found by GetLatestId. +- **id** The id returned by GetLatestId if id > 0 - otherwise the dirId parameter. + + +### Microsoft.Windows.Security.AppLockerCSP.HResultException + +HRESULT thrown by any arbitrary function in AppLockerCSP. + +The following fields are available: + +- **file** File in the OS code base in which the exception occurs. +- **function** Function in the OS code base in which the exception occurs. +- **hr** HRESULT that is reported. +- **line** Line in the file in the OS code base in which the exception occurs. + + +### Microsoft.Windows.Security.AppLockerCSP.SetValueParams + +Parameters passed to the SetValue function of the AppLockerCSP node. + +The following fields are available: + +- **dataLength** Length of the value to set. +- **uri** The node URI to that should contain the value, relative to %SYSTEM32%\AppLocker. + + +### Microsoft.Windows.Security.AppLockerCSP.SetValueStart + +Start of the "SetValue" operation for the AppLockerCSP node. + + + +### Microsoft.Windows.Security.AppLockerCSP.SetValueStop + +End of the "SetValue" operation for the AppLockerCSP node. + +The following fields are available: + +- **hr** HRESULT returned by the SetValue function in AppLockerCSP. + + +### Microsoft.Windows.Security.AppLockerCSP.TryRemediateMissingPolicies + +EntryPoint of fix step or policy remediation, includes URI relative to %SYSTEM32%\AppLocker that needs to be fixed. + +The following fields are available: + +- **uri** URI for node relative to %SYSTEM32%/AppLocker. + + +## Appraiser events + +### Microsoft.Windows.Appraiser.General.ChecksumTotalPictureCount + +This event lists the types of objects and how many of each exist on the client device. This allows for a quick way to ensure that the records present on the server match what is present on the client. + +The following fields are available: + +- **DatasourceApplicationFile_19ASetup** The count of the number of this particular object type present on this device. +- **DatasourceApplicationFile_19H1** The count of the number of this particular object type present on this device. +- **DatasourceApplicationFile_19H1Setup** The count of the number of this particular object type present on this device. +- **DatasourceApplicationFile_RS1** An ID for the system, calculated by hashing hardware identifiers. +- **DatasourceApplicationFile_RS2** An ID for the system, calculated by hashing hardware identifiers. +- **DatasourceApplicationFile_RS3** The count of the number of this particular object type present on this device. +- **DatasourceApplicationFile_RS3Setup** The count of the number of this particular object type present on this device. +- **DatasourceApplicationFile_RS4** The count of the number of this particular object type present on this device. +- **DatasourceApplicationFile_RS4Setup** The count of the number of this particular object type present on this device. +- **DatasourceApplicationFile_RS5** The count of the number of this particular object type present on this device. +- **DatasourceApplicationFile_RS5Setup** The count of the number of this particular object type present on this device. +- **DatasourceApplicationFile_TH1** The count of the number of this particular object type present on this device. +- **DatasourceApplicationFile_TH2** The count of the number of this particular object type present on this device. +- **DatasourceDevicePnp_19ASetup** The count of the number of this particular object type present on this device. +- **DatasourceDevicePnp_19H1** The count of the number of this particular object type present on this device. +- **DatasourceDevicePnp_19H1Setup** The count of the number of this particular object type present on this device. +- **DatasourceDevicePnp_RS1** The total DataSourceDevicePnp objects targeting Windows 10 version 1607 on this device. +- **DatasourceDevicePnp_RS2** The count of the number of this particular object type present on this device. +- **DatasourceDevicePnp_RS3** The count of the number of this particular object type present on this device. +- **DatasourceDevicePnp_RS3Setup** The count of the number of this particular object type present on this device. +- **DatasourceDevicePnp_RS4** The count of the number of this particular object type present on this device. +- **DatasourceDevicePnp_RS4Setup** The count of the number of this particular object type present on this device. +- **DatasourceDevicePnp_RS5** The count of the number of this particular object type present on this device. +- **DatasourceDevicePnp_RS5Setup** The count of the number of this particular object type present on this device. +- **DatasourceDevicePnp_TH1** The count of the number of this particular object type present on this device. +- **DatasourceDevicePnp_TH2** The count of the number of this particular object type present on this device. +- **DatasourceDriverPackage_19ASetup** The count of the number of this particular object type present on this device. +- **DatasourceDriverPackage_19H1** The count of the number of this particular object type present on this device. +- **DatasourceDriverPackage_19H1Setup** The count of the number of this particular object type present on this device. +- **DatasourceDriverPackage_RS1** The total DataSourceDriverPackage objects targeting Windows 10 version 1607 on this device. +- **DatasourceDriverPackage_RS2** The total DataSourceDriverPackage objects targeting Windows 10, version 1703 on this device. +- **DatasourceDriverPackage_RS3** The count of the number of this particular object type present on this device. +- **DatasourceDriverPackage_RS3Setup** The count of the number of this particular object type present on this device. +- **DatasourceDriverPackage_RS4** The count of the number of this particular object type present on this device. +- **DatasourceDriverPackage_RS4Setup** The count of the number of this particular object type present on this device. +- **DatasourceDriverPackage_RS5** The count of the number of this particular object type present on this device. +- **DatasourceDriverPackage_RS5Setup** The count of the number of this particular object type present on this device. +- **DatasourceDriverPackage_TH1** The count of the number of this particular object type present on this device. +- **DatasourceDriverPackage_TH2** The count of the number of this particular object type present on this device. +- **DataSourceMatchingInfoBlock_19ASetup** The count of the number of this particular object type present on this device. +- **DataSourceMatchingInfoBlock_19H1** The count of the number of this particular object type present on this device. +- **DataSourceMatchingInfoBlock_19H1Setup** The count of the number of this particular object type present on this device. +- **DataSourceMatchingInfoBlock_RS1** The total DataSourceMatchingInfoBlock objects targeting Windows 10 version 1607 on this device. +- **DataSourceMatchingInfoBlock_RS2** The count of the number of this particular object type present on this device. +- **DataSourceMatchingInfoBlock_RS3** The count of the number of this particular object type present on this device. +- **DataSourceMatchingInfoBlock_RS3Setup** The count of the number of this particular object type present on this device. +- **DataSourceMatchingInfoBlock_RS4** The count of the number of this particular object type present on this device. +- **DataSourceMatchingInfoBlock_RS4Setup** The count of the number of this particular object type present on this device. +- **DataSourceMatchingInfoBlock_RS5** The count of the number of this particular object type present on this device. +- **DataSourceMatchingInfoBlock_RS5Setup** The count of the number of this particular object type present on this device. +- **DataSourceMatchingInfoBlock_TH1** The count of the number of this particular object type present on this device. +- **DataSourceMatchingInfoBlock_TH2** The count of the number of this particular object type present on this device. +- **DataSourceMatchingInfoPassive_19ASetup** The count of the number of this particular object type present on this device. +- **DataSourceMatchingInfoPassive_19H1** The count of the number of this particular object type present on this device. +- **DataSourceMatchingInfoPassive_19H1Setup** The count of the number of this particular object type present on this device. +- **DataSourceMatchingInfoPassive_RS1** The total DataSourceMatchingInfoPassive objects targeting Windows 10 version 1607 on this device. +- **DataSourceMatchingInfoPassive_RS2** The count of the number of this particular object type present on this device. +- **DataSourceMatchingInfoPassive_RS3** The count of the number of this particular object type present on this device. +- **DataSourceMatchingInfoPassive_RS3Setup** The count of the number of this particular object type present on this device. +- **DataSourceMatchingInfoPassive_RS4** The count of the number of this particular object type present on this device. +- **DataSourceMatchingInfoPassive_RS4Setup** The count of the number of this particular object type present on this device. +- **DataSourceMatchingInfoPassive_RS5** The count of the number of this particular object type present on this device. +- **DataSourceMatchingInfoPassive_RS5Setup** The count of the number of this particular object type present on this device. +- **DataSourceMatchingInfoPassive_TH1** The count of the number of this particular object type present on this device. +- **DataSourceMatchingInfoPassive_TH2** The count of the number of this particular object type present on this device. +- **DataSourceMatchingInfoPostUpgrade_19ASetup** The count of the number of this particular object type present on this device. +- **DataSourceMatchingInfoPostUpgrade_19H1** The count of the number of this particular object type present on this device. +- **DataSourceMatchingInfoPostUpgrade_19H1Setup** The count of the number of this particular object type present on this device. +- **DataSourceMatchingInfoPostUpgrade_RS1** The total DataSourceMatchingInfoPostUpgrade objects targeting Windows 10 version 1607 on this device. +- **DataSourceMatchingInfoPostUpgrade_RS2** The total DataSourceMatchingInfoPostUpgrade objects targeting Windows 10 version 1703 on this device. +- **DataSourceMatchingInfoPostUpgrade_RS3** The total DataSourceMatchingInfoPostUpgrade objects targeting Windows 10 version 1709 on this device. +- **DataSourceMatchingInfoPostUpgrade_RS3Setup** The count of the number of this particular object type present on this device. +- **DataSourceMatchingInfoPostUpgrade_RS4** The count of the number of this particular object type present on this device. +- **DataSourceMatchingInfoPostUpgrade_RS4Setup** The count of the number of this particular object type present on this device. +- **DataSourceMatchingInfoPostUpgrade_RS5** The count of the number of this particular object type present on this device. +- **DataSourceMatchingInfoPostUpgrade_RS5Setup** The count of the number of this particular object type present on this device. +- **DataSourceMatchingInfoPostUpgrade_TH1** The count of the number of this particular object type present on this device. +- **DataSourceMatchingInfoPostUpgrade_TH2** The count of the number of this particular object type present on this device. +- **DatasourceSystemBios_19ASetup** The count of the number of this particular object type present on this device. +- **DatasourceSystemBios_19H1** The count of the number of this particular object type present on this device. +- **DatasourceSystemBios_19H1Setup** The count of the number of this particular object type present on this device. +- **DatasourceSystemBios_RS1** The total DatasourceSystemBios objects targeting Windows 10 version 1607 present on this device. +- **DatasourceSystemBios_RS2** The total DatasourceSystemBios objects targeting Windows 10 version 1703 present on this device. +- **DatasourceSystemBios_RS3** The total DatasourceSystemBios objects targeting Windows 10 version 1709 present on this device. +- **DatasourceSystemBios_RS3Setup** The count of the number of this particular object type present on this device. +- **DatasourceSystemBios_RS4** The count of the number of this particular object type present on this device. +- **DatasourceSystemBios_RS4Setup** The count of the number of this particular object type present on this device. +- **DatasourceSystemBios_RS5** The count of the number of this particular object type present on this device. +- **DatasourceSystemBios_RS5Setup** The count of the number of this particular object type present on this device. +- **DatasourceSystemBios_TH1** The count of the number of this particular object type present on this device. +- **DatasourceSystemBios_TH2** The count of the number of this particular object type present on this device. +- **DecisionApplicationFile_19ASetup** The count of the number of this particular object type present on this device. +- **DecisionApplicationFile_19H1** The count of the number of this particular object type present on this device. +- **DecisionApplicationFile_19H1Setup** The count of the number of this particular object type present on this device. +- **DecisionApplicationFile_RS1** The count of the number of this particular object type present on this device. +- **DecisionApplicationFile_RS2** The count of the number of this particular object type present on this device. +- **DecisionApplicationFile_RS3** The count of the number of this particular object type present on this device. +- **DecisionApplicationFile_RS3Setup** The count of the number of this particular object type present on this device. +- **DecisionApplicationFile_RS4** The count of the number of this particular object type present on this device. +- **DecisionApplicationFile_RS4Setup** The count of the number of this particular object type present on this device. +- **DecisionApplicationFile_RS5** The count of the number of this particular object type present on this device. +- **DecisionApplicationFile_RS5Setup** The count of the number of this particular object type present on this device. +- **DecisionApplicationFile_TH1** The count of the number of this particular object type present on this device. +- **DecisionApplicationFile_TH2** The count of the number of this particular object type present on this device. +- **DecisionDevicePnp_19ASetup** The count of the number of this particular object type present on this device. +- **DecisionDevicePnp_19H1** The count of the number of this particular object type present on this device. +- **DecisionDevicePnp_19H1Setup** The count of the number of this particular object type present on this device. +- **DecisionDevicePnp_RS1** The total DecisionDevicePnp objects targeting Windows 10 version 1607 on this device. +- **DecisionDevicePnp_RS2** The count of the number of this particular object type present on this device. +- **DecisionDevicePnp_RS3** The count of the number of this particular object type present on this device. +- **DecisionDevicePnp_RS3Setup** The count of the number of this particular object type present on this device. +- **DecisionDevicePnp_RS4** The count of the number of this particular object type present on this device. +- **DecisionDevicePnp_RS4Setup** The count of the number of this particular object type present on this device. +- **DecisionDevicePnp_RS5** The count of the number of this particular object type present on this device. +- **DecisionDevicePnp_RS5Setup** The count of the number of this particular object type present on this device. +- **DecisionDevicePnp_TH1** The count of the number of this particular object type present on this device. +- **DecisionDevicePnp_TH2** The count of the number of this particular object type present on this device. +- **DecisionDriverPackage_19ASetup** The count of the number of this particular object type present on this device. +- **DecisionDriverPackage_19H1** The count of the number of this particular object type present on this device. +- **DecisionDriverPackage_19H1Setup** The count of the number of this particular object type present on this device. +- **DecisionDriverPackage_RS1** The total DecisionDriverPackage objects targeting Windows 10 version 1607 on this device. +- **DecisionDriverPackage_RS2** The count of the number of this particular object type present on this device. +- **DecisionDriverPackage_RS3** The count of the number of this particular object type present on this device. +- **DecisionDriverPackage_RS3Setup** The count of the number of this particular object type present on this device. +- **DecisionDriverPackage_RS4** The count of the number of this particular object type present on this device. +- **DecisionDriverPackage_RS4Setup** The count of the number of this particular object type present on this device. +- **DecisionDriverPackage_RS5** The count of the number of this particular object type present on this device. +- **DecisionDriverPackage_RS5Setup** The count of the number of this particular object type present on this device. +- **DecisionDriverPackage_TH1** The count of the number of this particular object type present on this device. +- **DecisionDriverPackage_TH2** The count of the number of this particular object type present on this device. +- **DecisionMatchingInfoBlock_19ASetup** The count of the number of this particular object type present on this device. +- **DecisionMatchingInfoBlock_19H1** The count of the number of this particular object type present on this device. +- **DecisionMatchingInfoBlock_19H1Setup** The count of the number of this particular object type present on this device. +- **DecisionMatchingInfoBlock_RS1** The total DecisionMatchingInfoBlock objects targeting Windows 10 version 1607 present on this device. +- **DecisionMatchingInfoBlock_RS2** The total DecisionMatchingInfoBlock objects targeting Windows 10 version 1703 present on this device. +- **DecisionMatchingInfoBlock_RS3** The total DecisionMatchingInfoBlock objects targeting Windows 10 version 1709 present on this device. +- **DecisionMatchingInfoBlock_RS3Setup** The count of the number of this particular object type present on this device. +- **DecisionMatchingInfoBlock_RS4** The total DecisionMatchingInfoBlock objects targeting Windows 10 version 1803 present on this device. +- **DecisionMatchingInfoBlock_RS4Setup** The count of the number of this particular object type present on this device. +- **DecisionMatchingInfoBlock_RS5** The count of the number of this particular object type present on this device. +- **DecisionMatchingInfoBlock_RS5Setup** The count of the number of this particular object type present on this device. +- **DecisionMatchingInfoBlock_TH1** The count of the number of this particular object type present on this device. +- **DecisionMatchingInfoBlock_TH2** The count of the number of this particular object type present on this device. +- **DecisionMatchingInfoPassive_19ASetup** The count of the number of this particular object type present on this device. +- **DecisionMatchingInfoPassive_19H1** The count of the number of this particular object type present on this device. +- **DecisionMatchingInfoPassive_19H1Setup** The count of the number of this particular object type present on this device. +- **DecisionMatchingInfoPassive_RS1** The total DecisionMatchingInfoPassive objects targeting Windows 10 version 1607 on this device. +- **DecisionMatchingInfoPassive_RS2** The total DecisionMatchingInfoPassive objects targeting Windows 10 version 1703 on this device. +- **DecisionMatchingInfoPassive_RS3** The total DecisionMatchingInfoPassive objects targeting Windows 10 version 1803 on this device. +- **DecisionMatchingInfoPassive_RS3Setup** The count of the number of this particular object type present on this device. +- **DecisionMatchingInfoPassive_RS4** The count of the number of this particular object type present on this device. +- **DecisionMatchingInfoPassive_RS4Setup** The count of the number of this particular object type present on this device. +- **DecisionMatchingInfoPassive_RS5** The count of the number of this particular object type present on this device. +- **DecisionMatchingInfoPassive_RS5Setup** The count of the number of this particular object type present on this device. +- **DecisionMatchingInfoPassive_TH1** The count of the number of this particular object type present on this device. +- **DecisionMatchingInfoPassive_TH2** The count of the number of this particular object type present on this device. +- **DecisionMatchingInfoPostUpgrade_19ASetup** The count of the number of this particular object type present on this device. +- **DecisionMatchingInfoPostUpgrade_19H1** The count of the number of this particular object type present on this device. +- **DecisionMatchingInfoPostUpgrade_19H1Setup** The count of the number of this particular object type present on this device. +- **DecisionMatchingInfoPostUpgrade_RS1** The total DecisionMatchingInfoPostUpgrade objects targeting Windows 10 version 1607 on this device. +- **DecisionMatchingInfoPostUpgrade_RS2** The total DecisionMatchingInfoPostUpgrade objects targeting Windows 10 version 1703 on this device. +- **DecisionMatchingInfoPostUpgrade_RS3** The total DecisionMatchingInfoPostUpgrade objects targeting Windows 10 version 1709 on this device. +- **DecisionMatchingInfoPostUpgrade_RS3Setup** The count of the number of this particular object type present on this device. +- **DecisionMatchingInfoPostUpgrade_RS4** The count of the number of this particular object type present on this device. +- **DecisionMatchingInfoPostUpgrade_RS4Setup** The count of the number of this particular object type present on this device. +- **DecisionMatchingInfoPostUpgrade_RS5** The count of the number of this particular object type present on this device. +- **DecisionMatchingInfoPostUpgrade_RS5Setup** The count of the number of this particular object type present on this device. +- **DecisionMatchingInfoPostUpgrade_TH1** The count of the number of this particular object type present on this device. +- **DecisionMatchingInfoPostUpgrade_TH2** The count of the number of this particular object type present on this device. +- **DecisionMediaCenter_19ASetup** The count of the number of this particular object type present on this device. +- **DecisionMediaCenter_19H1** The count of the number of this particular object type present on this device. +- **DecisionMediaCenter_19H1Setup** The total DecisionMediaCenter objects targeting the next release of Windows on this device. +- **DecisionMediaCenter_RS1** The total DecisionMediaCenter objects targeting Windows 10 version 1607 present on this device. +- **DecisionMediaCenter_RS2** The total DecisionMediaCenter objects targeting Windows 10 version 1703 present on this device. +- **DecisionMediaCenter_RS3** The total DecisionMediaCenter objects targeting Windows 10 version 1709 present on this device. +- **DecisionMediaCenter_RS3Setup** The count of the number of this particular object type present on this device. +- **DecisionMediaCenter_RS4** The total DecisionMediaCenter objects targeting Windows 10 version 1803 present on this device. +- **DecisionMediaCenter_RS4Setup** The count of the number of this particular object type present on this device. +- **DecisionMediaCenter_RS5** The count of the number of this particular object type present on this device. +- **DecisionMediaCenter_RS5Setup** The count of the number of this particular object type present on this device. +- **DecisionMediaCenter_TH1** The count of the number of this particular object type present on this device. +- **DecisionMediaCenter_TH2** The count of the number of this particular object type present on this device. +- **DecisionSystemBios_19ASetup** The total DecisionSystemBios objects targeting the next release of Windows on this device. +- **DecisionSystemBios_19H1** The count of the number of this particular object type present on this device. +- **DecisionSystemBios_19H1Setup** The total DecisionSystemBios objects targeting the next release of Windows on this device. +- **DecisionSystemBios_RS1** The total DecisionSystemBios objects targeting Windows 10 version 1607 on this device. +- **DecisionSystemBios_RS2** The total DecisionSystemBios objects targeting Windows 10 version 1703 on this device. +- **DecisionSystemBios_RS3** The total DecisionSystemBios objects targeting Windows 10 version 1709 on this device. +- **DecisionSystemBios_RS3Setup** The count of the number of this particular object type present on this device. +- **DecisionSystemBios_RS4** The total DecisionSystemBios objects targeting Windows 10 version, 1803 present on this device. +- **DecisionSystemBios_RS4Setup** The total DecisionSystemBios objects targeting the next release of Windows on this device. +- **DecisionSystemBios_RS5** The total DecisionSystemBios objects targeting the next release of Windows on this device. +- **DecisionSystemBios_RS5Setup** The total DecisionSystemBios objects targeting the next release of Windows on this device. +- **DecisionSystemBios_TH1** The count of the number of this particular object type present on this device. +- **DecisionSystemBios_TH2** The count of the number of this particular object type present on this device. +- **DecisionSystemProcessor_RS2** The count of the number of this particular object type present on this device. +- **DecisionTest_RS1** An ID for the system, calculated by hashing hardware identifiers. +- **InventoryApplicationFile** The count of the number of this particular object type present on this device. +- **InventoryDeviceContainer** A count of device container objects in cache. +- **InventoryDevicePnp** A count of device Plug and Play objects in cache. +- **InventoryDriverBinary** A count of driver binary objects in cache. +- **InventoryDriverPackage** A count of device objects in cache. +- **InventoryLanguagePack** The count of the number of this particular object type present on this device. +- **InventoryMediaCenter** The count of the number of this particular object type present on this device. +- **InventorySystemBios** The count of the number of this particular object type present on this device. +- **InventorySystemMachine** The count of the number of this particular object type present on this device. +- **InventorySystemProcessor** The count of the number of this particular object type present on this device. +- **InventoryTest** The count of the number of this particular object type present on this device. +- **InventoryUplevelDriverPackage** The count of the number of this particular object type present on this device. +- **PCFP** The count of the number of this particular object type present on this device. +- **SystemMemory** The count of the number of this particular object type present on this device. +- **SystemProcessorCompareExchange** The count of the number of this particular object type present on this device. +- **SystemProcessorLahfSahf** The count of the number of this particular object type present on this device. +- **SystemProcessorNx** The total number of objects of this type present on this device. +- **SystemProcessorPrefetchW** The total number of objects of this type present on this device. +- **SystemProcessorSse2** The total number of objects of this type present on this device. +- **SystemTouch** The count of the number of this particular object type present on this device. +- **SystemWim** The total number of objects of this type present on this device. +- **SystemWindowsActivationStatus** The count of the number of this particular object type present on this device. +- **SystemWlan** The total number of objects of this type present on this device. +- **Wmdrm_19ASetup** The count of the number of this particular object type present on this device. +- **Wmdrm_19H1** The count of the number of this particular object type present on this device. +- **Wmdrm_19H1Setup** The total Wmdrm objects targeting the next release of Windows on this device. +- **Wmdrm_RS1** An ID for the system, calculated by hashing hardware identifiers. +- **Wmdrm_RS2** An ID for the system, calculated by hashing hardware identifiers. +- **Wmdrm_RS3** An ID for the system, calculated by hashing hardware identifiers. +- **Wmdrm_RS3Setup** The count of the number of this particular object type present on this device. +- **Wmdrm_RS4** The total Wmdrm objects targeting Windows 10, version 1803 present on this device. +- **Wmdrm_RS4Setup** The count of the number of this particular object type present on this device. +- **Wmdrm_RS5** The count of the number of this particular object type present on this device. +- **Wmdrm_RS5Setup** The count of the number of this particular object type present on this device. +- **Wmdrm_TH1** The count of the number of this particular object type present on this device. +- **Wmdrm_TH2** The count of the number of this particular object type present on this device. + + +### Microsoft.Windows.Appraiser.General.DatasourceApplicationFileAdd + +Represents the basic metadata about specific application files installed on the system. + +This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedeviceinventorychange). + +The following fields are available: + +- **AppraiserVersion** The version of the appraiser file that is generating the events. +- **AvDisplayName** If the app is an anti-virus app, this is its display name. +- **CompatModelIndex** The compatibility prediction for this file. +- **HasCitData** Indicates whether the file is present in CIT data. +- **HasUpgradeExe** Indicates whether the anti-virus app has an upgrade.exe file. +- **IsAv** Is the file an anti-virus reporting EXE? +- **ResolveAttempted** This will always be an empty string when sending telemetry. +- **SdbEntries** An array of fields that indicates the SDB entries that apply to this file. + + +### Microsoft.Windows.Appraiser.General.DatasourceApplicationFileRemove + +This event indicates that the DatasourceApplicationFile object is no longer present. + +This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedeviceinventorychange). + +The following fields are available: + +- **AppraiserVersion** The version of the Appraiser file that is generating the events. + + +### Microsoft.Windows.Appraiser.General.DatasourceApplicationFileStartSync + +This event indicates that a new set of DatasourceApplicationFileAdd events will be sent. + +This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedeviceinventorychange). + +The following fields are available: + +- **AppraiserVersion** The version of the Appraiser file that is generating the events. + + +### Microsoft.Windows.Appraiser.General.DatasourceDevicePnpAdd + +This event sends compatibility data for a Plug and Play device, to help keep Windows up to date. + +This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedeviceinventorychange). + +The following fields are available: + +- **ActiveNetworkConnection** Indicates whether the device is an active network device. +- **AppraiserVersion** The version of the appraiser file generating the events. +- **CosDeviceRating** An enumeration that indicates if there is a driver on the target operating system. +- **CosDeviceSolution** An enumeration that indicates how a driver on the target operating system is available. +- **CosDeviceSolutionUrl** Microsoft.Windows.Appraiser.General.DatasourceDevicePnpAdd . Empty string +- **CosPopulatedFromId** The expected uplevel driver matching ID based on driver coverage data. +- **IsBootCritical** Indicates whether the device boot is critical. +- **UplevelInboxDriver** Indicates whether there is a driver uplevel for this device. +- **WuDriverCoverage** Indicates whether there is a driver uplevel for this device, according to Windows Update. +- **WuDriverUpdateId** The Windows Update ID of the applicable uplevel driver. +- **WuPopulatedFromId** The expected uplevel driver matching ID based on driver coverage from Windows Update. + + +### Microsoft.Windows.Appraiser.General.DatasourceDevicePnpRemove + +This event indicates that the DatasourceDevicePnp object is no longer present. + +This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedeviceinventorychange). + +The following fields are available: + +- **AppraiserVersion** The version of the Appraiser file that is generating the events. + + +### Microsoft.Windows.Appraiser.General.DatasourceDevicePnpStartSync + +This event indicates that a new set of DatasourceDevicePnpAdd events will be sent. + +This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedeviceinventorychange). + +The following fields are available: + +- **AppraiserVersion** The version of the Appraiser file that is generating the events. + + +### Microsoft.Windows.Appraiser.General.DatasourceDriverPackageAdd + +This event sends compatibility database data about driver packages to help keep Windows up to date. + +This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedeviceinventorychange). + +The following fields are available: + +- **AppraiserVersion** The version of the appraiser file generating the events. + + +### Microsoft.Windows.Appraiser.General.DatasourceDriverPackageRemove + +This event indicates that the DatasourceDriverPackage object is no longer present. + +This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedeviceinventorychange). + +The following fields are available: + +- **AppraiserVersion** The version of the Appraiser file that is generating the events. + + +### Microsoft.Windows.Appraiser.General.DatasourceDriverPackageStartSync + +This event indicates that a new set of DatasourceDriverPackageAdd events will be sent. + +This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedeviceinventorychange). + +The following fields are available: + +- **AppraiserVersion** The version of the Appraiser file that is generating the events. + + +### Microsoft.Windows.Appraiser.General.DataSourceMatchingInfoBlockAdd + +This event sends blocking data about any compatibility blocking entries hit on the system that are not directly related to specific applications or devices, to help keep Windows up-to-date. + +This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedeviceinventorychange). + +The following fields are available: + +- **AppraiserVersion** The version of the appraiser file generating the events. + + +### Microsoft.Windows.Appraiser.General.DataSourceMatchingInfoBlockRemove + +This event indicates that the DataSourceMatchingInfoBlock object is no longer present. + +This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedeviceinventorychange). + +The following fields are available: + +- **AppraiserVersion** The version of the Appraiser file that is generating the events. + + +### Microsoft.Windows.Appraiser.General.DataSourceMatchingInfoBlockStartSync + +This event indicates that a full set of DataSourceMatchingInfoBlockStAdd events have been sent. + +This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedeviceinventorychange). + +The following fields are available: + +- **AppraiserVersion** The version of the Appraiser file that is generating the events. + + +### Microsoft.Windows.Appraiser.General.DataSourceMatchingInfoPassiveAdd + +This event sends compatibility database information about non-blocking compatibility entries on the system that are not keyed by either applications or devices, to help keep Windows up-to-date. + +This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedeviceinventorychange). + +The following fields are available: + +- **AppraiserVersion** The version of the appraiser file generating the events. + + +### Microsoft.Windows.Appraiser.General.DataSourceMatchingInfoPassiveRemove + +This event indicates that the DataSourceMatchingInfoPassive object is no longer present. + +This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedeviceinventorychange). + +The following fields are available: + +- **AppraiserVersion** The version of the Appraiser file that is generating the events. + + +### Microsoft.Windows.Appraiser.General.DataSourceMatchingInfoPassiveStartSync + +This event indicates that a new set of DataSourceMatchingInfoPassiveAdd events will be sent. + +This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedeviceinventorychange). + +The following fields are available: + +- **AppraiserVersion** The version of the Appraiser file that is generating the events. + + +### Microsoft.Windows.Appraiser.General.DataSourceMatchingInfoPostUpgradeAdd + +This event sends compatibility database information about entries requiring reinstallation after an upgrade on the system that are not keyed by either applications or devices, to help keep Windows up-to-date. + +This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedeviceinventorychange). + +The following fields are available: + +- **AppraiserVersion** The version of the appraiser file generating the events. + + +### Microsoft.Windows.Appraiser.General.DataSourceMatchingInfoPostUpgradeRemove + +This event indicates that the DataSourceMatchingInfoPostUpgrade object is no longer present. + +This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedeviceinventorychange). + +The following fields are available: + +- **AppraiserVersion** The version of the Appraiser file that is generating the events. + + +### Microsoft.Windows.Appraiser.General.DataSourceMatchingInfoPostUpgradeStartSync + +This event indicates that a new set of DataSourceMatchingInfoPostUpgradeAdd events will be sent. + +This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedeviceinventorychange). + +The following fields are available: + +- **AppraiserVersion** The version of the Appraiser file that is generating the events. + + +### Microsoft.Windows.Appraiser.General.DatasourceSystemBiosAdd + +This event sends compatibility database information about the BIOS to help keep Windows up-to-date. + +This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedeviceinventorychange). + +The following fields are available: + +- **AppraiserVersion** The version of the Appraiser file generating the events. + + +### Microsoft.Windows.Appraiser.General.DatasourceSystemBiosRemove + +This event indicates that the DatasourceSystemBios object is no longer present. + +This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedeviceinventorychange). + +The following fields are available: + +- **AppraiserVersion** The version of the Appraiser file that is generating the events. + + +### Microsoft.Windows.Appraiser.General.DatasourceSystemBiosStartSync + +This event indicates that a new set of DatasourceSystemBiosAdd events will be sent. + +This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedeviceinventorychange). + +The following fields are available: + +- **AppraiserVersion** The version of the Appraiser file that is generating the events. + + +### Microsoft.Windows.Appraiser.General.DecisionApplicationFileAdd + +This event sends compatibility decision data about a file to help keep Windows up-to-date. + +This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedeviceinventorychange). + +The following fields are available: + +- **AppraiserVersion** The version of the appraiser file that is generating the events. +- **BlockAlreadyInbox** The uplevel runtime block on the file already existed on the current OS. +- **BlockingApplication** Indicates whether there are any application issues that interfere with the upgrade due to the file in question. +- **DisplayGenericMessage** Will be a generic message be shown for this file? +- **DisplayGenericMessageGated** Indicates whether a generic message be shown for this file. +- **HardBlock** This file is blocked in the SDB. +- **HasUxBlockOverride** Does the file have a block that is overridden by a tag in the SDB? +- **MigApplication** Does the file have a MigXML from the SDB associated with it that applies to the current upgrade mode? +- **MigRemoval** Does the file have a MigXML from the SDB that will cause the app to be removed on upgrade? +- **NeedsDismissAction** Will the file cause an action that can be dimissed? +- **NeedsInstallPostUpgradeData** After upgrade, the file will have a post-upgrade notification to install a replacement for the app. +- **NeedsNotifyPostUpgradeData** Does the file have a notification that should be shown after upgrade? +- **NeedsReinstallPostUpgradeData** After upgrade, this file will have a post-upgrade notification to reinstall the app. +- **NeedsUninstallAction** The file must be uninstalled to complete the upgrade. +- **SdbBlockUpgrade** The file is tagged as blocking upgrade in the SDB, +- **SdbBlockUpgradeCanReinstall** The file is tagged as blocking upgrade in the SDB. It can be reinstalled after upgrade. +- **SdbBlockUpgradeUntilUpdate** The file is tagged as blocking upgrade in the SDB. If the app is updated, the upgrade can proceed. +- **SdbReinstallUpgrade** The file is tagged as needing to be reinstalled after upgrade in the SDB. It does not block upgrade. +- **SdbReinstallUpgradeWarn** The file is tagged as needing to be reinstalled after upgrade with a warning in the SDB. It does not block upgrade. +- **SoftBlock** The file is softblocked in the SDB and has a warning. + + +### Microsoft.Windows.Appraiser.General.DecisionApplicationFileRemove + +This event indicates Indicates that the DecisionApplicationFile object is no longer present. + +This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedeviceinventorychange). + +The following fields are available: + +- **AppraiserVersion** The version of the Appraiser file that is generating the events. + + +### Microsoft.Windows.Appraiser.General.DecisionApplicationFileStartSync + +This event indicates that a new set of DecisionApplicationFileAdd events will be sent. + +This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedeviceinventorychange). + +The following fields are available: + +- **AppraiserVersion** The version of the Appraiser file that is generating the events. + + +### Microsoft.Windows.Appraiser.General.DecisionDevicePnpAdd + +This event sends compatibility decision data about a PNP device to help keep Windows up to date. + +This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedeviceinventorychange). + +The following fields are available: + +- **AppraiserVersion** The version of the appraiser file generating the events. +- **AssociatedDriverIsBlocked** Is the driver associated with this PNP device blocked? +- **AssociatedDriverWillNotMigrate** Will the driver associated with this plug-and-play device migrate? +- **BlockAssociatedDriver** Should the driver associated with this PNP device be blocked? +- **BlockingDevice** Is this PNP device blocking upgrade? +- **BlockUpgradeIfDriverBlocked** Is the PNP device both boot critical and does not have a driver included with the OS? +- **BlockUpgradeIfDriverBlockedAndOnlyActiveNetwork** Is this PNP device the only active network device? +- **DisplayGenericMessage** Will a generic message be shown during Setup for this PNP device? +- **DisplayGenericMessageGated** Indicates whether a generic message will be shown during Setup for this PNP device. +- **DriverAvailableInbox** Is a driver included with the operating system for this PNP device? +- **DriverAvailableOnline** Is there a driver for this PNP device on Windows Update? +- **DriverAvailableUplevel** Is there a driver on Windows Update or included with the operating system for this PNP device? +- **DriverBlockOverridden** Is there is a driver block on the device that has been overridden? +- **NeedsDismissAction** Will the user would need to dismiss a warning during Setup for this device? +- **NotRegressed** Does the device have a problem code on the source OS that is no better than the one it would have on the target OS? +- **SdbDeviceBlockUpgrade** Is there an SDB block on the PNP device that blocks upgrade? +- **SdbDriverBlockOverridden** Is there an SDB block on the PNP device that blocks upgrade, but that block was overridden? + + +### Microsoft.Windows.Appraiser.General.DecisionDevicePnpRemove + +This event indicates that the DecisionDevicePnp object is no longer present. + +This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedeviceinventorychange). + +The following fields are available: + +- **AppraiserVersion** The version of the Appraiser file that is generating the events. + + +### Microsoft.Windows.Appraiser.General.DecisionDevicePnpStartSync + +The DecisionDevicePnpStartSync event indicates that a new set of DecisionDevicePnpAdd events will be sent. + +This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedeviceinventorychange). + +The following fields are available: + +- **AppraiserVersion** The version of the Appraiser file that is generating the events. + + +### Microsoft.Windows.Appraiser.General.DecisionDriverPackageAdd + +This event sends decision data about driver package compatibility to help keep Windows up to date. + +This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedeviceinventorychange). + +The following fields are available: + +- **AppraiserVersion** The version of the appraiser file generating the events. +- **DisplayGenericMessageGated** Indicates whether a generic offer block message will be shown for this driver package. +- **DriverBlockOverridden** Does the driver package have an SDB block that blocks it from migrating, but that block has been overridden? +- **DriverIsDeviceBlocked** Was the driver package was blocked because of a device block? +- **DriverIsDriverBlocked** Is the driver package blocked because of a driver block? +- **DriverIsTroubleshooterBlocked** Indicates whether the driver package is blocked because of a troubleshooter block. +- **DriverShouldNotMigrate** Should the driver package be migrated during upgrade? +- **SdbDriverBlockOverridden** Does the driver package have an SDB block that blocks it from migrating, but that block has been overridden? + + +### Microsoft.Windows.Appraiser.General.DecisionDriverPackageRemove + +This event indicates that the DecisionDriverPackage object is no longer present. + +This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedeviceinventorychange). + +The following fields are available: + +- **AppraiserVersion** The version of the Appraiser file that is generating the events. + + +### Microsoft.Windows.Appraiser.General.DecisionDriverPackageStartSync + +This event indicates that a new set of DecisionDriverPackageAdd events will be sent. + +This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedeviceinventorychange). + +The following fields are available: + +- **AppraiserVersion** The version of the Appraiser file that is generating the events. + + +### Microsoft.Windows.Appraiser.General.DecisionMatchingInfoBlockAdd + +This event sends compatibility decision data about blocking entries on the system that are not keyed by either applications or devices, to help keep Windows up to date. + +This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedeviceinventorychange). + +The following fields are available: + +- **AppraiserVersion** The version of the appraiser file generating the events. +- **BlockingApplication** Are there are any application issues that interfere with upgrade due to matching info blocks? +- **DisplayGenericMessage** Will a generic message be shown for this block? +- **NeedsUninstallAction** Does the user need to take an action in setup due to a matching info block? +- **SdbBlockUpgrade** Is a matching info block blocking upgrade? +- **SdbBlockUpgradeCanReinstall** Is a matching info block blocking upgrade, but has the can reinstall tag? +- **SdbBlockUpgradeUntilUpdate** Is a matching info block blocking upgrade but has the until update tag? + + +### Microsoft.Windows.Appraiser.General.DecisionMatchingInfoBlockRemove + +This event indicates that the DecisionMatchingInfoBlock object is no longer present. + +This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedeviceinventorychange). + +The following fields are available: + +- **AppraiserVersion** The version of the Appraiser file that is generating the events. + + +### Microsoft.Windows.Appraiser.General.DecisionMatchingInfoBlockStartSync + +This event indicates that a new set of DecisionMatchingInfoBlockAdd events will be sent. + +This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedeviceinventorychange). + +The following fields are available: + +- **AppraiserVersion** The version of the Appraiser file that is generating the events. + + +### Microsoft.Windows.Appraiser.General.DecisionMatchingInfoPassiveAdd + +This event sends compatibility decision data about non-blocking entries on the system that are not keyed by either applications or devices, to help keep Windows up to date. + +This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedeviceinventorychange). + +The following fields are available: + +- **AppraiserVersion** The version of the Appraiser file that is generating the events. +- **BlockingApplication** Are there any application issues that interfere with upgrade due to matching info blocks? +- **DisplayGenericMessageGated** Indicates whether a generic offer block message will be shown due to matching info blocks. +- **MigApplication** Is there a matching info block with a mig for the current mode of upgrade? + + +### Microsoft.Windows.Appraiser.General.DecisionMatchingInfoPassiveRemove + +This event Indicates that the DecisionMatchingInfoPassive object is no longer present. + +This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedeviceinventorychange). + +The following fields are available: + +- **AppraiserVersion** The version of the Appraiser file that is generating the events. + + +### Microsoft.Windows.Appraiser.General.DecisionMatchingInfoPassiveStartSync + +This event indicates that a new set of DecisionMatchingInfoPassiveAdd events will be sent. + +This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedeviceinventorychange). + +The following fields are available: + +- **AppraiserVersion** The version of the Appraiser file that is generating the events. + + +### Microsoft.Windows.Appraiser.General.DecisionMatchingInfoPostUpgradeAdd + +This event sends compatibility decision data about entries that require reinstall after upgrade. It's used to help keep Windows up to date. + +This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedeviceinventorychange). + +The following fields are available: + +- **AppraiserVersion** The version of the Appraiser file that is generating the events. +- **NeedsInstallPostUpgradeData** Will the file have a notification after upgrade to install a replacement for the app? +- **NeedsNotifyPostUpgradeData** Should a notification be shown for this file after upgrade? +- **NeedsReinstallPostUpgradeData** Will the file have a notification after upgrade to reinstall the app? +- **SdbReinstallUpgrade** The file is tagged as needing to be reinstalled after upgrade in the compatibility database (but is not blocking upgrade). + + +### Microsoft.Windows.Appraiser.General.DecisionMatchingInfoPostUpgradeRemove + +This event indicates that the DecisionMatchingInfoPostUpgrade object is no longer present. + +This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedeviceinventorychange). + +The following fields are available: + +- **AppraiserVersion** The version of the Appraiser file that is generating the events. + + +### Microsoft.Windows.Appraiser.General.DecisionMatchingInfoPostUpgradeStartSync + +This event indicates that a new set of DecisionMatchingInfoPostUpgradeAdd events will be sent. + +This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedeviceinventorychange). + +The following fields are available: + +- **AppraiserVersion** The version of the Appraiser file that is generating the events. + + +### Microsoft.Windows.Appraiser.General.DecisionMediaCenterAdd + +This event sends decision data about the presence of Windows Media Center, to help keep Windows up to date. + +This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedeviceinventorychange). + +The following fields are available: + +- **AppraiserVersion** The version of the Appraiser file generating the events. +- **BlockingApplication** Is there any application issues that interfere with upgrade due to Windows Media Center? +- **MediaCenterActivelyUsed** If Windows Media Center is supported on the edition, has it been run at least once and are the MediaCenterIndicators are true? +- **MediaCenterIndicators** Do any indicators imply that Windows Media Center is in active use? +- **MediaCenterInUse** Is Windows Media Center actively being used? +- **MediaCenterPaidOrActivelyUsed** Is Windows Media Center actively being used or is it running on a supported edition? +- **NeedsDismissAction** Are there any actions that can be dismissed coming from Windows Media Center? + + +### Microsoft.Windows.Appraiser.General.DecisionMediaCenterRemove + +This event indicates that the DecisionMediaCenter object is no longer present. + +This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedeviceinventorychange). + +The following fields are available: + +- **AppraiserVersion** The version of the Appraiser file that is generating the events. + + +### Microsoft.Windows.Appraiser.General.DecisionMediaCenterStartSync + +This event indicates that a new set of DecisionMediaCenterAdd events will be sent. + +This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedeviceinventorychange). + +The following fields are available: + +- **AppraiserVersion** The version of the Appraiser file that is generating the events. + + +### Microsoft.Windows.Appraiser.General.DecisionSystemBiosAdd + +This event sends compatibility decision data about the BIOS to help keep Windows up to date. + +This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedeviceinventorychange). + +The following fields are available: + +- **AppraiserVersion** The version of the Appraiser file generating the events. +- **Blocking** Is the device blocked from upgrade due to a BIOS block? +- **DisplayGenericMessageGated** Indicates whether a generic offer block message will be shown for the bios. +- **HasBiosBlock** Does the device have a BIOS block? + + +### Microsoft.Windows.Appraiser.General.DecisionSystemBiosRemove + +This event indicates that the DecisionSystemBios object is no longer present. + +This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedeviceinventorychange). + +The following fields are available: + +- **AppraiserVersion** The version of the Appraiser file that is generating the events. + + +### Microsoft.Windows.Appraiser.General.DecisionSystemBiosStartSync + +This event indicates that a new set of DecisionSystemBiosAdd events will be sent. + +This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedeviceinventorychange). + +The following fields are available: + +- **AppraiserVersion** The version of the Appraiser file that is generating the events. + + +### Microsoft.Windows.Appraiser.General.GatedRegChange + +This event sends data about the results of running a set of quick-blocking instructions, to help keep Windows up to date. + +The following fields are available: + +- **NewData** The data in the registry value after the scan completed. +- **OldData** The previous data in the registry value before the scan ran. +- **PCFP** An ID for the system calculated by hashing hardware identifiers. +- **RegKey** The registry key name for which a result is being sent. +- **RegValue** The registry value for which a result is being sent. +- **Time** The client time of the event. + + +### Microsoft.Windows.Appraiser.General.InventoryApplicationFileAdd + +This event represents the basic metadata about a file on the system. The file must be part of an app and either have a block in the compatibility database or be part of an antivirus program. + +This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedeviceinventorychange). + +The following fields are available: + +- **AppraiserVersion** The version of the Appraiser file generating the events. +- **AvDisplayName** If the app is an antivirus app, this is its display name. +- **AvProductState** Indicates whether the antivirus program is turned on and the signatures are up to date. +- **BinaryType** A binary type. Example: UNINITIALIZED, ZERO_BYTE, DATA_ONLY, DOS_MODULE, NE16_MODULE, PE32_UNKNOWN, PE32_I386, PE32_ARM, PE64_UNKNOWN, PE64_AMD64, PE64_ARM64, PE64_IA64, PE32_CLR_32, PE32_CLR_IL, PE32_CLR_IL_PREFER32, PE64_CLR_64. +- **BinFileVersion** An attempt to clean up FileVersion at the client that tries to place the version into 4 octets. +- **BinProductVersion** An attempt to clean up ProductVersion at the client that tries to place the version into 4 octets. +- **BoeProgramId** If there is no entry in Add/Remove Programs, this is the ProgramID that is generated from the file metadata. +- **CompanyName** The company name of the vendor who developed this file. +- **FileId** A hash that uniquely identifies a file. +- **FileVersion** The File version field from the file metadata under Properties -> Details. +- **HasUpgradeExe** Indicates whether the antivirus app has an upgrade.exe file. +- **IsAv** Indicates whether the file an antivirus reporting EXE. +- **LinkDate** The date and time that this file was linked on. +- **LowerCaseLongPath** The full file path to the file that was inventoried on the device. +- **Name** The name of the file that was inventoried. +- **ProductName** The Product name field from the file metadata under Properties -> Details. +- **ProductVersion** The Product version field from the file metadata under Properties -> Details. +- **ProgramId** A hash of the Name, Version, Publisher, and Language of an application used to identify it. +- **Size** The size of the file (in hexadecimal bytes). + + +### Microsoft.Windows.Appraiser.General.InventoryApplicationFileRemove + +This event indicates that the InventoryApplicationFile object is no longer present. + +This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedeviceinventorychange). + +The following fields are available: + +- **AppraiserVersion** The version of the Appraiser file that is generating the events. + + +### Microsoft.Windows.Appraiser.General.InventoryApplicationFileStartSync + +This event indicates indicates that a new set of InventoryApplicationFileAdd events will be sent. + +This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedeviceinventorychange). + +The following fields are available: + +- **AppraiserVersion** The version of the Appraiser file that is generating the events. + + +### Microsoft.Windows.Appraiser.General.InventoryLanguagePackAdd + +This event sends data about the number of language packs installed on the system, to help keep Windows up to date. + +This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedeviceinventorychange). + +The following fields are available: + +- **AppraiserVersion** The version of the Appraiser file that is generating the events. +- **HasLanguagePack** Indicates whether this device has 2 or more language packs. +- **LanguagePackCount** The number of language packs are installed. + + +### Microsoft.Windows.Appraiser.General.InventoryLanguagePackRemove + +This event indicates that the InventoryLanguagePack object is no longer present. + +This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedeviceinventorychange). + +The following fields are available: + +- **AppraiserVersion** The version of the Appraiser file that is generating the events. + + +### Microsoft.Windows.Appraiser.General.InventoryLanguagePackStartSync + +This event indicates that a new set of InventoryLanguagePackAdd events will be sent. + +This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedeviceinventorychange). + +The following fields are available: + +- **AppraiserVersion** The version of the Appraiser file that is generating the events. + + +### Microsoft.Windows.Appraiser.General.InventoryMediaCenterAdd + +This event sends true/false data about decision points used to understand whether Windows Media Center is used on the system, to help keep Windows up to date. + +This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedeviceinventorychange). + +The following fields are available: + +- **AppraiserVersion** The version of the Appraiser file generating the events. +- **EverLaunched** Has Windows Media Center ever been launched? +- **HasConfiguredTv** Has the user configured a TV tuner through Windows Media Center? +- **HasExtendedUserAccounts** Are any Windows Media Center Extender user accounts configured? +- **HasWatchedFolders** Are any folders configured for Windows Media Center to watch? +- **IsDefaultLauncher** Is Windows Media Center the default app for opening music or video files? +- **IsPaid** Is the user running a Windows Media Center edition that implies they paid for Windows Media Center? +- **IsSupported** Does the running OS support Windows Media Center? + + +### Microsoft.Windows.Appraiser.General.InventoryMediaCenterRemove + +This event indicates that the InventoryMediaCenter object is no longer present. + +This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedeviceinventorychange). + +The following fields are available: + +- **AppraiserVersion** The version of the Appraiser file that is generating the events. + + +### Microsoft.Windows.Appraiser.General.InventoryMediaCenterStartSync + +This event indicates that a new set of InventoryMediaCenterAdd events will be sent. + +This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedeviceinventorychange). + +The following fields are available: + +- **AppraiserVersion** The version of the Appraiser file that is generating the events. + + +### Microsoft.Windows.Appraiser.General.InventorySystemBiosAdd + +This event sends basic metadata about the BIOS to determine whether it has a compatibility block. + +This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedeviceinventorychange). + +The following fields are available: + +- **AppraiserVersion** The version of the Appraiser file that is generating the events. +- **biosDate** The release date of the BIOS in UTC format. +- **BiosDate** The release date of the BIOS in UTC format. +- **biosName** The name field from Win32_BIOS. +- **BiosName** The name field from Win32_BIOS. +- **manufacturer** The manufacturer field from Win32_ComputerSystem. +- **Manufacturer** The manufacturer field from Win32_ComputerSystem. +- **model** The model field from Win32_ComputerSystem. +- **Model** The model field from Win32_ComputerSystem. + + +### Microsoft.Windows.Appraiser.General.InventorySystemBiosRemove + +This event indicates that the InventorySystemBios object is no longer present. + +This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedeviceinventorychange). + +The following fields are available: + +- **AppraiserVersion** The version of the Appraiser file that is generating the events. + + +### Microsoft.Windows.Appraiser.General.InventorySystemBiosStartSync + +This event indicates that a new set of InventorySystemBiosAdd events will be sent. + +This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedeviceinventorychange). + +The following fields are available: + +- **AppraiserVersion** The version of the Appraiser file that is generating the events. + + +### Microsoft.Windows.Appraiser.General.InventoryUplevelDriverPackageAdd + +This event is only runs during setup. It provides a listing of the uplevel driver packages that were downloaded before the upgrade. Is critical to understanding if failures in setup can be traced to not having sufficient uplevel drivers before the upgrade. + +This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedeviceinventorychange). + +The following fields are available: + +- **AppraiserVersion** The version of the Appraiser file that is generating the events. +- **BootCritical** Is the driver package marked as boot critical? +- **Build** The build value from the driver package. +- **CatalogFile** The name of the catalog file within the driver package. +- **Class** The device class from the driver package. +- **ClassGuid** The device class unique ID from the driver package. +- **Date** The date from the driver package. +- **Inbox** Is the driver package of a driver that is included with Windows? +- **OriginalName** The original name of the INF file before it was renamed. Generally a path under $WINDOWS.~BT\Drivers\DU. +- **Provider** The provider of the driver package. +- **PublishedName** The name of the INF file after it was renamed. +- **Revision** The revision of the driver package. +- **SignatureStatus** Indicates if the driver package is signed. Unknown = 0, Unsigned = 1, Signed = 2. +- **VersionMajor** The major version of the driver package. +- **VersionMinor** The minor version of the driver package. + + +### Microsoft.Windows.Appraiser.General.InventoryUplevelDriverPackageRemove + +This event indicates that the InventoryUplevelDriverPackage object is no longer present. + +This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedeviceinventorychange). + +The following fields are available: + +- **AppraiserVersion** The version of the Appraiser file that is generating the events. + + +### Microsoft.Windows.Appraiser.General.InventoryUplevelDriverPackageStartSync + +This event indicates that a new set of InventoryUplevelDriverPackageAdd events will be sent. + +This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedeviceinventorychange). + +The following fields are available: + +- **AppraiserVersion** The version of the Appraiser file that is generating the events. + + +### Microsoft.Windows.Appraiser.General.RunContext + +This event indicates what should be expected in the data payload. + +The following fields are available: + +- **AppraiserBranch** The source branch in which the currently running version of Appraiser was built. +- **AppraiserProcess** The name of the process that launched Appraiser. +- **AppraiserVersion** The version of the Appraiser file generating the events. +- **CensusId** A unique hardware identifier. +- **Context** Indicates what mode Appraiser is running in. Example: Setup or Telemetry. +- **PCFP** An ID for the system calculated by hashing hardware identifiers. +- **Subcontext** Indicates what categories of incompatibilities appraiser is scanning for. Can be N/A, Resolve, or a semicolon-delimited list that can include App, Dev, Sys, Gat, or Rescan. +- **Time** The client time of the event. + + +### Microsoft.Windows.Appraiser.General.SystemMemoryAdd + +This event sends data on the amount of memory on the system and whether it meets requirements, to help keep Windows up-to-date. + +This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedeviceinventorychange). + +The following fields are available: + +- **AppraiserVersion** The version of the Appraiser file generating the events. +- **Blocking** Is the device from upgrade due to memory restrictions? +- **MemoryRequirementViolated** Was a memory requirement violated? +- **pageFile** The current committed memory limit for the system or the current process, whichever is smaller (in bytes). +- **ram** The amount of memory on the device. +- **ramKB** The amount of memory (in KB). +- **virtual** The size of the user-mode portion of the virtual address space of the calling process (in bytes). +- **virtualKB** The amount of virtual memory (in KB). + + +### Microsoft.Windows.Appraiser.General.SystemMemoryRemove + +This event that the SystemMemory object is no longer present. + +This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedeviceinventorychange). + +The following fields are available: + +- **AppraiserVersion** The version of the Appraiser file that is generating the events. + + +### Microsoft.Windows.Appraiser.General.SystemMemoryStartSync + +This event indicates that a new set of SystemMemoryAdd events will be sent. + +This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedeviceinventorychange). + +The following fields are available: + +- **AppraiserVersion** The version of the Appraiser file that is generating the events. + + +### Microsoft.Windows.Appraiser.General.SystemProcessorCompareExchangeAdd + +This event sends data indicating whether the system supports the CompareExchange128 CPU requirement, to help keep Windows up to date. + +This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedeviceinventorychange). + +The following fields are available: + +- **AppraiserVersion** The version of the Appraiser file generating the events. +- **Blocking** Is the upgrade blocked due to the processor? +- **CompareExchange128Support** Does the CPU support CompareExchange128? + + +### Microsoft.Windows.Appraiser.General.SystemProcessorCompareExchangeRemove + +This event indicates that the SystemProcessorCompareExchange object is no longer present. + +This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedeviceinventorychange). + +The following fields are available: + +- **AppraiserVersion** The version of the Appraiser file that is generating the events. + + +### Microsoft.Windows.Appraiser.General.SystemProcessorCompareExchangeStartSync + +This event indicates that a new set of SystemProcessorCompareExchangeAdd events will be sent. + +This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedeviceinventorychange). + +The following fields are available: + +- **AppraiserVersion** The version of the Appraiser file that is generating the events. + + +### Microsoft.Windows.Appraiser.General.SystemProcessorLahfSahfAdd + +This event sends data indicating whether the system supports the LahfSahf CPU requirement, to help keep Windows up-to-date. + +This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedeviceinventorychange). + +The following fields are available: + +- **AppraiserVersion** The version of the Appraiser file generating the events. +- **Blocking** Is the upgrade blocked due to the processor? +- **LahfSahfSupport** Does the CPU support LAHF/SAHF? + + +### Microsoft.Windows.Appraiser.General.SystemProcessorLahfSahfRemove + +This event indicates that the SystemProcessorLahfSahf object is no longer present. + +This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedeviceinventorychange). + +The following fields are available: + +- **AppraiserVersion** The version of the Appraiser file that is generating the events. + + +### Microsoft.Windows.Appraiser.General.SystemProcessorLahfSahfStartSync + +This event indicates that a new set of SystemProcessorLahfSahfAdd events will be sent. + +This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedeviceinventorychange). + +The following fields are available: + +- **AppraiserVersion** The version of the Appraiser file that is generating the events. + + +### Microsoft.Windows.Appraiser.General.SystemProcessorNxAdd + +This event sends data indicating whether the system supports the NX CPU requirement, to help keep Windows up-to-date. + +This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedeviceinventorychange). + +The following fields are available: + +- **AppraiserVersion** The version of the Appraiser file that is generating the events. +- **Blocking** Is the upgrade blocked due to the processor? +- **NXDriverResult** The result of the driver used to do a non-deterministic check for NX support. +- **NXProcessorSupport** Does the processor support NX? + + +### Microsoft.Windows.Appraiser.General.SystemProcessorNxRemove + +This event indicates that the SystemProcessorNx object is no longer present. + +This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedeviceinventorychange). + +The following fields are available: + +- **AppraiserVersion** The version of the Appraiser file that is generating the events. + + +### Microsoft.Windows.Appraiser.General.SystemProcessorNxStartSync + +This event indicates that a new set of SystemProcessorNxAdd events will be sent. + +This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedeviceinventorychange). + +The following fields are available: + +- **AppraiserVersion** The version of the Appraiser file that is generating the events. + + +### Microsoft.Windows.Appraiser.General.SystemProcessorPrefetchWAdd + +This event sends data indicating whether the system supports the PrefetchW CPU requirement, to help keep Windows up to date. + +This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedeviceinventorychange). + +The following fields are available: + +- **AppraiserVersion** The version of the Appraiser file that is generating the events. +- **Blocking** Is the upgrade blocked due to the processor? +- **PrefetchWSupport** Does the processor support PrefetchW? + + +### Microsoft.Windows.Appraiser.General.SystemProcessorPrefetchWRemove + +This event indicates that the SystemProcessorPrefetchW object is no longer present. + +This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedeviceinventorychange). + +The following fields are available: + +- **AppraiserVersion** The version of the Appraiser file that is generating the events. + + +### Microsoft.Windows.Appraiser.General.SystemProcessorPrefetchWStartSync + +This event indicates that a new set of SystemProcessorPrefetchWAdd events will be sent. + +This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedeviceinventorychange). + +The following fields are available: + +- **AppraiserVersion** The version of the Appraiser file that is generating the events. + + +### Microsoft.Windows.Appraiser.General.SystemProcessorSse2Add + +This event sends data indicating whether the system supports the SSE2 CPU requirement, to help keep Windows up to date. + +This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedeviceinventorychange). + +The following fields are available: + +- **AppraiserVersion** The version of the Appraiser file that is generating the events. +- **Blocking** Is the upgrade blocked due to the processor? +- **SSE2ProcessorSupport** Does the processor support SSE2? + + +### Microsoft.Windows.Appraiser.General.SystemProcessorSse2Remove + +This event indicates that the SystemProcessorSse2 object is no longer present. + +This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedeviceinventorychange). + +The following fields are available: + +- **AppraiserVersion** The version of the Appraiser file that is generating the events. + + +### Microsoft.Windows.Appraiser.General.SystemProcessorSse2StartSync + +This event indicates that a new set of SystemProcessorSse2Add events will be sent. + +This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedeviceinventorychange). + +The following fields are available: + +- **AppraiserVersion** The version of the Appraiser file that is generating the events. + + +### Microsoft.Windows.Appraiser.General.SystemTouchAdd + +This event sends data indicating whether the system supports touch, to help keep Windows up to date. + +This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedeviceinventorychange). + +The following fields are available: + +- **AppraiserVersion** The version of the Appraiser file that is generating the events. +- **IntegratedTouchDigitizerPresent** Is there an integrated touch digitizer? +- **MaximumTouches** The maximum number of touch points supported by the device hardware. + + +### Microsoft.Windows.Appraiser.General.SystemTouchRemove + +This event indicates that the SystemTouch object is no longer present. + +This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedeviceinventorychange). + +The following fields are available: + +- **AppraiserVersion** The version of the Appraiser file that is generating the events. + + +### Microsoft.Windows.Appraiser.General.SystemTouchStartSync + +This event indicates that a new set of SystemTouchAdd events will be sent. + +This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedeviceinventorychange). + +The following fields are available: + +- **AppraiserVersion** The version of the Appraiser file that is generating the events. + + +### Microsoft.Windows.Appraiser.General.SystemWimAdd + +This event sends data indicating whether the operating system is running from a compressed Windows Imaging Format (WIM) file, to help keep Windows up to date. + +This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedeviceinventorychange). + +The following fields are available: + +- **AppraiserVersion** The version of the Appraiser file that is generating the events. +- **IsWimBoot** Is the current operating system running from a compressed WIM file? +- **RegistryWimBootValue** The raw value from the registry that is used to indicate if the device is running from a WIM. + + +### Microsoft.Windows.Appraiser.General.SystemWimRemove + +This event indicates that the SystemWim object is no longer present. + +This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedeviceinventorychange). + +The following fields are available: + +- **AppraiserVersion** The version of the Appraiser file that is generating the events. + + +### Microsoft.Windows.Appraiser.General.SystemWimStartSync + +This event indicates that a new set of SystemWimAdd events will be sent. + +This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedeviceinventorychange). + +The following fields are available: + +- **AppraiserVersion** The version of the Appraiser file that is generating the events. + + +### Microsoft.Windows.Appraiser.General.SystemWindowsActivationStatusAdd + +This event sends data indicating whether the current operating system is activated, to help keep Windows up to date. + +This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedeviceinventorychange). + +The following fields are available: + +- **AppraiserVersion** The version of the Appraiser file that is generating the events. +- **WindowsIsLicensedApiValue** The result from the API that's used to indicate if operating system is activated. +- **WindowsNotActivatedDecision** Is the current operating system activated? + + +### Microsoft.Windows.Appraiser.General.SystemWindowsActivationStatusRemove + +This event indicates that the SystemWindowsActivationStatus object is no longer present. + +This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedeviceinventorychange). + +The following fields are available: + +- **AppraiserVersion** The version of the Appraiser file that is generating the events. + + +### Microsoft.Windows.Appraiser.General.SystemWindowsActivationStatusStartSync + +This event indicates that a new set of SystemWindowsActivationStatusAdd events will be sent. + +This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedeviceinventorychange). + +The following fields are available: + +- **AppraiserVersion** The version of the Appraiser file that is generating the events. + + +### Microsoft.Windows.Appraiser.General.SystemWlanAdd + +This event sends data indicating whether the system has WLAN, and if so, whether it uses an emulated driver that could block an upgrade, to help keep Windows up-to-date. + +This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedeviceinventorychange). + +The following fields are available: + +- **AppraiserVersion** The version of the Appraiser file that is generating the events. +- **Blocking** Is the upgrade blocked because of an emulated WLAN driver? +- **HasWlanBlock** Does the emulated WLAN driver have an upgrade block? +- **WlanEmulatedDriver** Does the device have an emulated WLAN driver? +- **WlanExists** Does the device support WLAN at all? +- **WlanModulePresent** Are any WLAN modules present? +- **WlanNativeDriver** Does the device have a non-emulated WLAN driver? + + +### Microsoft.Windows.Appraiser.General.SystemWlanRemove + +This event indicates that the SystemWlan object is no longer present. + +This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedeviceinventorychange). + +The following fields are available: + +- **AppraiserVersion** The version of the Appraiser file that is generating the events. + + +### Microsoft.Windows.Appraiser.General.SystemWlanStartSync + +This event indicates that a new set of SystemWlanAdd events will be sent. + +This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedeviceinventorychange). + +The following fields are available: + +- **AppraiserVersion** The version of the Appraiser file that is generating the events. + + +### Microsoft.Windows.Appraiser.General.TelemetryRunHealth + +This event indicates the parameters and result of a telemetry (diagnostic) run. This allows the rest of the data sent over the course of the run to be properly contextualized and understood, which is then used to keep Windows up to date. + +The following fields are available: + +- **AppraiserBranch** The source branch in which the version of Appraiser that is running was built. +- **AppraiserDataVersion** The version of the data files being used by the Appraiser telemetry run. +- **AppraiserProcess** The name of the process that launched Appraiser. +- **AppraiserVersion** The file version (major, minor and build) of the Appraiser DLL, concatenated without dots. +- **AuxFinal** Obsolete, always set to false. +- **AuxInitial** Obsolete, indicates if Appraiser is writing data files to be read by the Get Windows 10 app. +- **DeadlineDate** A timestamp representing the deadline date, which is the time until which appraiser will wait to do a full scan. +- **EnterpriseRun** Indicates if the telemetry run is an enterprise run, which means appraiser was run from the command line with an extra enterprise parameter. +- **FullSync** Indicates if Appraiser is performing a full sync, which means that full set of events representing the state of the machine are sent. Otherwise, only the changes from the previous run are sent. +- **InboxDataVersion** The original version of the data files before retrieving any newer version. +- **IndicatorsWritten** Indicates if all relevant UEX indicators were successfully written or updated. +- **InventoryFullSync** Indicates if inventory is performing a full sync, which means that the full set of events representing the inventory of machine are sent. +- **PCFP** An ID for the system calculated by hashing hardware identifiers. +- **PerfBackoff** Indicates if the run was invoked with logic to stop running when a user is present. Helps to understand why a run may have a longer elapsed time than normal. +- **PerfBackoffInsurance** Indicates if appraiser is running without performance backoff because it has run with perf backoff and failed to complete several times in a row. +- **RunAppraiser** Indicates if Appraiser was set to run at all. If this if false, it is understood that data events will not be received from this device. +- **RunDate** The date that the telemetry run was stated, expressed as a filetime. +- **RunGeneralTel** Indicates if the generaltel.dll component was run. Generaltel collects additional telemetry on an infrequent schedule and only from machines at telemetry levels higher than Basic. +- **RunOnline** Indicates if appraiser was able to connect to Windows Update and theefore is making decisions using up-to-date driver coverage information. +- **RunResult** The hresult of the Appraiser telemetry run. +- **ScheduledUploadDay** The day scheduled for the upload. +- **SendingUtc** Indicates if the Appraiser client is sending events during the current telemetry run. +- **StoreHandleIsNotNull** Obsolete, always set to false +- **TelementrySent** Indicates if telemetry was successfully sent. +- **ThrottlingUtc** Indicates if the Appraiser client is throttling its output of CUET events to avoid being disabled. This increases runtime but also telemetry reliability. +- **Time** The client time of the event. +- **VerboseMode** Indicates if appraiser ran in Verbose mode, which is a test-only mode with extra logging. +- **WhyFullSyncWithoutTablePrefix** Indicates the reason or reasons that a full sync was generated. + + +### Microsoft.Windows.Appraiser.General.WmdrmAdd + +This event sends data about the usage of older digital rights management on the system, to help keep Windows up to date. This data does not indicate the details of the media using the digital rights management, only whether any such files exist. Collecting this data was critical to ensuring the correct mitigation for customers, and should be able to be removed once all mitigations are in place. + +This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedeviceinventorychange). + +The following fields are available: + +- **AppraiserVersion** The version of the Appraiser file that is generating the events. +- **BlockingApplication** Same as NeedsDismissAction. +- **NeedsDismissAction** Indicates if a dismissible message is needed to warn the user about a potential loss of data due to DRM deprecation. +- **WmdrmApiResult** Raw value of the API used to gather DRM state. +- **WmdrmCdRipped** Indicates if the system has any files encrypted with personal DRM, which was used for ripped CDs. +- **WmdrmIndicators** WmdrmCdRipped OR WmdrmPurchased. +- **WmdrmInUse** WmdrmIndicators AND dismissible block in setup was not dismissed. +- **WmdrmNonPermanent** Indicates if the system has any files with non-permanent licenses. +- **WmdrmPurchased** Indicates if the system has any files with permanent licenses. + + +### Microsoft.Windows.Appraiser.General.WmdrmRemove + +This event indicates that the Wmdrm object is no longer present. + +This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedeviceinventorychange). + +The following fields are available: + +- **AppraiserVersion** The version of the Appraiser file that is generating the events. + + +### Microsoft.Windows.Appraiser.General.WmdrmStartSync + +This event indicates that a new set of WmdrmAdd events will be sent. + +This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedeviceinventorychange). + +The following fields are available: + +- **AppraiserVersion** The version of the Appraiser file that is generating the events. + + +## Census events + +### Census.App + +Provides information on IE and Census versions running on the device + +The following fields are available: + +- **AppraiserEnterpriseErrorCode** The error code of the last Appraiser enterprise run. +- **AppraiserErrorCode** The error code of the last Appraiser run. +- **AppraiserRunEndTimeStamp** The end time of the last Appraiser run. +- **AppraiserRunIsInProgressOrCrashed** Flag that indicates if the Appraiser run is in progress or has crashed. +- **AppraiserRunStartTimeStamp** The start time of the last Appraiser run. +- **AppraiserTaskEnabled** Whether the Appraiser task is enabled. +- **AppraiserTaskExitCode** The Appraiser task exist code. +- **AppraiserTaskLastRun** The last runtime for the Appraiser task. +- **CensusVersion** The version of Census that generated the current data for this device. +- **IEVersion** The version of Internet Explorer that is running on the device. + + +### Census.Battery + +This event sends type and capacity data about the battery on the device, as well as the number of connected standby devices in use, type to help keep Windows up to date. + +The following fields are available: + +- **InternalBatteryCapablities** Represents information about what the battery is capable of doing. +- **InternalBatteryCapacityCurrent** Represents the battery's current fully charged capacity in mWh (or relative). Compare this value to DesignedCapacity  to estimate the battery's wear. +- **InternalBatteryCapacityDesign** Represents the theoretical capacity of the battery when new, in mWh. +- **InternalBatteryNumberOfCharges** Provides the number of battery charges. This is used when creating new products and validating that existing products meets targeted functionality performance. +- **IsAlwaysOnAlwaysConnectedCapable** Represents whether the battery enables the device to be AlwaysOnAlwaysConnected . Boolean value. + + +### Census.Camera + +This event sends data about the resolution of cameras on the device, to help keep Windows up to date. + +The following fields are available: + +- **FrontFacingCameraResolution** Represents the resolution of the front facing camera in megapixels. If a front facing camera does not exist, then the value is 0. +- **RearFacingCameraResolution** Represents the resolution of the rear facing camera in megapixels. If a rear facing camera does not exist, then the value is 0. + + +### Census.Enterprise + +This event sends data about Azure presence, type, and cloud domain use in order to provide an understanding of the use and integration of devices in an enterprise, cloud, and server environment. + +The following fields are available: + +- **AADDeviceId** Azure Active Directory device ID. +- **AzureOSIDPresent** Represents the field used to identify an Azure machine. +- **AzureVMType** Represents whether the instance is Azure VM PAAS, Azure VM IAAS or any other VMs. +- **CDJType** Represents the type of cloud domain joined for the machine. +- **CommercialId** Represents the GUID for the commercial entity which the device is a member of.  Will be used to reflect insights back to customers. +- **ContainerType** The type of container, such as process or virtual machine hosted. +- **EnrollmentType** Defines the type of MDM enrollment on the device. +- **HashedDomain** The hashed representation of the user domain used for login. +- **IsCloudDomainJoined** Is this device joined to an Azure Active Directory (AAD) tenant? true/false +- **IsDERequirementMet** Represents if the device can do device encryption. +- **IsDeviceProtected** Represents if Device protected by BitLocker/Device Encryption +- **IsDomainJoined** Indicates whether a machine is joined to a domain. +- **IsEDPEnabled** Represents if Enterprise data protected on the device. +- **IsMDMEnrolled** Whether the device has been MDM Enrolled or not. +- **MPNId** Returns the Partner ID/MPN ID from Regkey. HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\DeployID +- **SCCMClientId** This ID correlate systems that send data to Compat Analytics (OMS) and other OMS based systems with systems in an Enterprise SCCM environment. +- **ServerFeatures** Represents the features installed on a Windows   Server. This can be used by developers and administrators who need to automate the process of determining the features installed on a set of server computers. +- **SystemCenterID** The SCCM ID is an anonymized one-way hash of the Active Directory Organization identifier + + +### Census.Firmware + +This event sends data about the BIOS and startup embedded in the device, to help keep Windows up to date. + +The following fields are available: + +- **FirmwareManufacturer** Represents the manufacturer of the device's firmware (BIOS). +- **FirmwareReleaseDate** Represents the date the current firmware was released. +- **FirmwareType** Represents the firmware type. The various types can be unknown, BIOS, UEFI. +- **FirmwareVersion** Represents the version of the current firmware. + + +### Census.Flighting + +This event sends Windows Insider data from customers participating in improvement testing and feedback programs, to help keep Windows up to date. + +The following fields are available: + +- **DeviceSampleRate** The telemetry sample rate assigned to the device. +- **EnablePreviewBuilds** Used to enable Windows Insider builds on a device. +- **FlightIds** A list of the different Windows Insider builds on this device. +- **FlightingBranchName** The name of the Windows Insider branch currently used by the device. +- **IsFlightsDisabled** Represents if the device is participating in the Windows Insider program. +- **MSA_Accounts** Represents a list of hashed IDs of the Microsoft Accounts that are flighting (pre-release builds) on this device. +- **SSRK** Retrieves the mobile targeting settings. + + +### Census.Hardware + +This event sends data about the device, including hardware type, OEM brand, model line, model, telemetry level setting, and TPM support, to help keep Windows up to date. + +The following fields are available: + +- **ActiveMicCount** The number of active microphones attached to the device. +- **ChassisType** Represents the type of device chassis, such as desktop or low profile desktop. The possible values can range between 1 - 36. +- **ComputerHardwareID** Identifies a device class that is represented by a hash of different SMBIOS fields. +- **D3DMaxFeatureLevel** Supported Direct3D version. +- **DeviceColor** Indicates a color of the device. +- **DeviceForm** Indicates the form as per the device classification. +- **DeviceName** The device name that is set by the user. +- **DigitizerSupport** Is a digitizer supported? +- **DUID** The device unique ID. +- **Gyroscope** Indicates whether the device has a gyroscope (a mechanical component that measures and maintains orientation). +- **InventoryId** The device ID used for compatibility testing. +- **Magnetometer** Indicates whether the device has a magnetometer (a mechanical component that works like a compass). +- **NFCProximity** Indicates whether the device supports NFC (a set of communication protocols that helps establish communication when applicable devices are brought close together.) +- **OEMDigitalMarkerFileName** The name of the file placed in the \Windows\system32\drivers directory that specifies the OEM and model name of the device. +- **OEMManufacturerName** The device manufacturer name. The OEMName for an inactive device is not reprocessed even if the clean OEM name is changed at a later date. +- **OEMModelBaseBoard** The baseboard model used by the OEM. +- **OEMModelBaseBoardVersion** Differentiates between developer and retail devices. +- **OEMModelName** The device model name. +- **OEMModelNumber** The device model number. +- **OEMModelSKU** The device edition that is defined by the manufacturer. +- **OEMModelSystemFamily** The system family set on the device by an OEM. +- **OEMModelSystemVersion** The system model version set on the device by the OEM. +- **OEMOptionalIdentifier** A Microsoft assigned value that represents a specific OEM subsidiary. +- **OEMSerialNumber** The serial number of the device that is set by the manufacturer. +- **PhoneManufacturer** The friendly name of the phone manufacturer. +- **PowerPlatformRole** The OEM preferred power management profile. It's used to help to identify the basic form factor of the device. +- **SoCName** The firmware manufacturer of the device. +- **StudyID** Used to identify retail and non-retail device. +- **TelemetryLevel** The telemetry level the user has opted into, such as Basic or Enhanced. +- **TelemetryLevelLimitEnhanced** The telemetry level for Windows Analytics-based solutions. +- **TelemetrySettingAuthority** Determines who set the telemetry level, such as GP, MDM, or the user. +- **TPMManufacturerId** The ID of the TPM manufacturer. +- **TPMManufacturerVersion** The version of the TPM manufacturer. +- **TPMVersion** The supported Trusted Platform Module (TPM) on the device. If no TPM is present, the value is 0. +- **VoiceSupported** Does the device have a cellular radio capable of making voice calls? + + +### Census.Memory + +This event sends data about the memory on the device, including ROM and RAM, to help keep Windows up to date. + +The following fields are available: + +- **TotalPhysicalRAM** Represents the physical memory (in MB). +- **TotalVisibleMemory** Represents the memory that is not reserved by the system. + + +### Census.Network + +This event sends data about the mobile and cellular network used by the device (mobile service provider, network, device ID, and service cost factors), to help keep Windows up to date. + +The following fields are available: + +- **IMEI0** Represents the International Mobile Station Equipment Identity. This number is usually unique and used by the mobile operator to distinguish different phone hardware. Microsoft does not have access to mobile operator billing data so collecting this data does not expose or identify the user. The two fields represent phone with dual sim coverage. +- **IMEI1** Represents the International Mobile Station Equipment Identity. This number is usually unique and used by the mobile operator to distinguish different phone hardware. Microsoft does not have access to mobile operator billing data so collecting this data does not expose or identify the user. The two fields represent phone with dual sim coverage. +- **MCC0** Represents the Mobile Country Code (MCC). It used with the Mobile Network Code (MNC) to uniquely identify a mobile network operator. The two fields represent phone with dual sim coverage. +- **MCC1** Represents the Mobile Country Code (MCC). It used with the Mobile Network Code (MNC) to uniquely identify a mobile network operator. The two fields represent phone with dual sim coverage. +- **MEID** Represents the Mobile Equipment Identity (MEID). MEID is a worldwide unique phone ID assigned to CDMA phones. MEID replaces electronic serial number (ESN), and is equivalent to IMEI for GSM and WCDMA phones. Microsoft does not have access to mobile operator billing data so collecting this data does not expose or identify the user. +- **MNC0** Retrieves the Mobile Network Code (MNC). It used with the Mobile Country Code (MCC) to uniquely identify a mobile network operator. The two fields represent phone with dual sim coverage. +- **MNC1** Retrieves the Mobile Network Code (MNC). It used with the Mobile Country Code (MCC) to uniquely identify a mobile network operator. The two fields represent phone with dual sim coverage. +- **MobileOperatorBilling** Represents the telephone company that provides services for mobile phone users. +- **MobileOperatorCommercialized** Represents which reseller and geography the phone is commercialized for. This is the set of values on the phone for who and where it was intended to be used. For example, the commercialized mobile operator code AT&T in the US would be ATT-US. +- **MobileOperatorNetwork0** Represents the operator of the current mobile network that the device is used on. (AT&T, T-Mobile, Vodafone). The two fields represent phone with dual sim coverage. +- **MobileOperatorNetwork1** Represents the operator of the current mobile network that the device is used on. (AT&T, T-Mobile, Vodafone). The two fields represent phone with dual sim coverage. +- **NetworkAdapterGUID** The GUID of the primary network adapter. +- **NetworkCost** Represents the network cost associated with a connection. +- **SPN0** Retrieves the Service Provider Name (SPN). For example, these might be AT&T, Sprint, T-Mobile, or Verizon. The two fields represent phone with dual sim coverage. +- **SPN1** Retrieves the Service Provider Name (SPN). For example, these might be AT&T, Sprint, T-Mobile, or Verizon. The two fields represent phone with dual sim coverage. + + +### Census.OS + +This event sends data about the operating system such as the version, locale, update service configuration, when and how it was originally installed, and whether it is a virtual device, to help keep Windows up to date. + +The following fields are available: + +- **ActivationChannel** Retrieves the retail license key or Volume license key for a machine. +- **AssignedAccessStatus** Kiosk configuration mode. +- **CompactOS** Indicates if the Compact OS feature from Win10 is enabled. +- **DeveloperUnlockStatus** Represents if a device has been developer unlocked by the user or Group Policy. +- **DeviceTimeZone** The time zone that is set on the device. Example: Pacific Standard Time +- **GenuineState** Retrieves the ID Value specifying the OS Genuine check. +- **InstallationType** Retrieves the type of OS installation. (Clean, Upgrade, Reset, Refresh, Update). +- **InstallLanguage** The first language installed on the user machine. +- **IsDeviceRetailDemo** Retrieves if the device is running in demo mode. +- **IsEduData** Returns Boolean if the education data policy is enabled. +- **IsPortableOperatingSystem** Retrieves whether OS is running Windows-To-Go +- **IsSecureBootEnabled** Retrieves whether Boot chain is signed under UEFI. +- **LanguagePacks** The list of language packages installed on the device. +- **LicenseStateReason** Retrieves why (or how) a system is licensed or unlicensed. The HRESULT may indicate an error code that indicates a key blocked error, or it may indicate that we are running an OS License granted by the MS store. +- **OA3xOriginalProductKey** Retrieves the License key stamped by the OEM to the machine. +- **OSEdition** Retrieves the version of the current OS. +- **OSInstallType** Retrieves a numeric description of what install was used on the device i.e. clean, upgrade, refresh, reset, etc +- **OSOOBEDateTime** Retrieves Out of Box Experience (OOBE) Date in Coordinated Universal Time (UTC). +- **OSSKU** Retrieves the Friendly Name of OS Edition. +- **OSSubscriptionStatus** Represents the existing status for enterprise subscription feature for PRO machines. +- **OSSubscriptionTypeId** Returns boolean for enterprise subscription feature for selected PRO machines. +- **OSTimeZoneBiasInMins** Retrieves the time zone set on machine. +- **OSUILocale** Retrieves the locale of the UI that is currently used by the OS. +- **ProductActivationResult** Returns Boolean if the OS Activation was successful. +- **ProductActivationTime** Returns the OS Activation time for tracking piracy issues. +- **ProductKeyID2** Retrieves the License key if the machine is updated with a new license key. +- **RACw7Id** Retrieves the Microsoft Reliability Analysis Component (RAC) Win7 Identifier. RAC is used to monitor and analyze system usage and reliability. +- **ServiceMachineIP** Retrieves the IP address of the KMS host used for anti-piracy. +- **ServiceMachinePort** Retrieves the port of the KMS host used for anti-piracy. +- **ServiceProductKeyID** Retrieves the License key of the KMS +- **SharedPCMode** Returns Boolean for education devices used as shared cart +- **Signature** Retrieves if it is a signature machine sold by Microsoft store. +- **SLICStatus** Whether a SLIC table exists on the device. +- **SLICVersion** Returns OS type/version from SLIC table. + + +### Census.PrivacySettings + +This event provides information about the device level privacy settings and whether device-level access was granted to these capabilities. Not all settings are applicable to all devices. Each field records the consent state for the corresponding privacy setting. The consent state is encoded as a 16-bit signed integer, where the first 8 bits represents the effective consent value, and the last 8 bits represent the authority that set the value. The effective consent (first 8 bits) is one of the following values: -3 = unexpected consent value, -2 = value was not requested, -1 = an error occurred while attempting to retrieve the value, 0 = undefined, 1 = allow, 2 = deny, 3 = prompt. The consent authority (last 8 bits) is one of the following values: -3 = unexpected authority, -2 = value was not requested, -1 = an error occurred while attempting to retrieve the value, 0 = system, 1 = a higher authority (a gating setting, the system-wide setting, or a group policy), 2 = advertising ID group policy, 3 = advertising ID policy for child account, 4 = privacy setting provider doesn't know the actual consent authority, 5 = consent was not configured and a default set in code was used, 6 = system default, 7 = organization policy, 8 = OneSettings. + +The following fields are available: + +- **Activity** Current state of the activity history setting. +- **ActivityHistoryCloudSync** Current state of the activity history cloud sync setting. +- **ActivityHistoryCollection** Current state of the activity history collection setting. +- **AdvertisingId** Current state of the advertising ID setting. +- **AppDiagnostics** Current state of the app diagnostics setting. +- **Appointments** Current state of the calendar setting. +- **Bluetooth** Current state of the Bluetooth capability setting. +- **BluetoothSync** Current state of the Bluetooth sync capability setting. +- **BroadFileSystemAccess** Current state of the broad file system access setting. +- **CellularData** Current state of the cellular data capability setting. +- **Chat** Current state of the chat setting. +- **Contacts** Current state of the contacts setting. +- **DocumentsLibrary** Current state of the documents library setting. +- **Email** Current state of the email setting. +- **FindMyDevice** Current state of the "find my device" setting. +- **GazeInput** Current state of the gaze input setting. +- **HumanInterfaceDevice** Current state of the human interface device setting. +- **InkTypeImprovement** Current state of the improve inking and typing setting. +- **Location** Current state of the location setting. +- **LocationHistory** Current state of the location history setting. +- **LocationHistoryCloudSync** Current state of the location history cloud sync setting. +- **LocationHistoryOnTimeline** Current state of the location history on timeline setting. +- **Microphone** Current state of the microphone setting. +- **PhoneCall** Current state of the phone call setting. +- **PhoneCallHistory** Current state of the call history setting. +- **PicturesLibrary** Current state of the pictures library setting. +- **Radios** Current state of the radios setting. +- **SensorsCustom** Current state of the custom sensor setting. +- **SerialCommunication** Current state of the serial communication setting. +- **Sms** Current state of the text messaging setting. +- **SpeechPersonalization** Current state of the speech services setting. +- **USB** Current state of the USB setting. +- **UserAccountInformation** Current state of the account information setting. +- **UserDataTasks** Current state of the tasks setting. +- **UserNotificationListener** Current state of the notifications setting. +- **VideosLibrary** Current state of the videos library setting. +- **Webcam** Current state of the camera setting. +- **WiFiDirect** Current state of the Wi-Fi direct setting. + + +### Census.Processor + +Provides information on several important data points about Processor settings + +The following fields are available: + +- **KvaShadow** This is the micro code information of the processor. +- **MMSettingOverride** Microcode setting of the processor. +- **MMSettingOverrideMask** Microcode setting override of the processor. +- **PreviousUpdateRevision** Previous microcode revision +- **ProcessorArchitecture** Retrieves the processor architecture of the installed operating system. +- **ProcessorClockSpeed** Clock speed of the processor in MHz. +- **ProcessorCores** Number of logical cores in the processor. +- **ProcessorIdentifier** Processor Identifier of a manufacturer. +- **ProcessorManufacturer** Name of the processor manufacturer. +- **ProcessorModel** Name of the processor model. +- **ProcessorPhysicalCores** Number of physical cores in the processor. +- **ProcessorUpdateRevision** The microcode revision. +- **ProcessorUpdateStatus** Enum value that represents the processor microcode load status +- **SocketCount** Count of CPU sockets. +- **SpeculationControl** Indicates whether the system has enabled protections needed to validate the speculation control vulnerability. + + +### Census.Security + +This event provides information on about security settings used to help keep Windows up to date and secure. + +The following fields are available: + +- **AvailableSecurityProperties** This field helps to enumerate and report state on the relevant security properties for Device Guard. +- **CGRunning** Credential Guard isolates and hardens key system and user secrets against compromise, helping to minimize the impact and breadth of a Pass the Hash style attack in the event that malicious code is already running via a local or network based vector. This field tells if Credential Guard is running. +- **DGState** This field summarizes the Device Guard state. +- **HVCIRunning** Hypervisor Code Integrity (HVCI) enables Device Guard to help protect kernel mode processes and drivers from vulnerability exploits and zero days. HVCI uses the processor’s functionality to force all software running in kernel mode to safely allocate memory. This field tells if HVCI is running. +- **IsSawGuest** Indicates whether the device is running as a Secure Admin Workstation Guest. +- **IsSawHost** Indicates whether the device is running as a Secure Admin Workstation Host. +- **RequiredSecurityProperties** Describes the required security properties to enable virtualization-based security. +- **SecureBootCapable** Systems that support Secure Boot can have the feature turned off via BIOS. This field tells if the system is capable of running Secure Boot, regardless of the BIOS setting. +- **SModeState** The Windows S mode trail state. +- **VBSState** Virtualization-based security (VBS) uses the hypervisor to help protect the kernel and other parts of the operating system. Credential Guard and Hypervisor Code Integrity (HVCI) both depend on VBS to isolate/protect secrets, and kernel-mode code integrity validation. VBS has a tri-state that can be Disabled, Enabled, or Running. + + +### Census.Speech + +This event is used to gather basic speech settings on the device. + +The following fields are available: + +- **AboveLockEnabled** Cortana setting that represents if Cortana can be invoked when the device is locked. +- **GPAllowInputPersonalization** Indicates if a Group Policy setting has enabled speech functionalities. +- **HolographicSpeechInputDisabled** Holographic setting that represents if the attached HMD devices have speech functionality disabled by the user. +- **HolographicSpeechInputDisabledRemote** Indicates if a remote policy has disabled speech functionalities for the HMD devices. +- **KeyVer** Version information for the census speech event. +- **KWSEnabled** Cortana setting that represents if a user has enabled the "Hey Cortana" keyword spotter (KWS). +- **MDMAllowInputPersonalization** Indicates if an MDM policy has enabled speech functionalities. +- **RemotelyManaged** Indicates if the device is being controlled by a remote administrator (MDM or Group Policy) in the context of speech functionalities. +- **SpeakerIdEnabled** Cortana setting that represents if keyword detection has been trained to try to respond to a single user's voice. +- **SpeechServicesEnabled** Windows setting that represents whether a user is opted-in for speech services on the device. +- **SpeechServicesValueSource** Indicates the deciding factor for the effective online speech recognition privacy policy settings: remote admin, local admin, or user preference. + + +### Census.Storage + +This event sends data about the total capacity of the system volume and primary disk, to help keep Windows up to date. + +The following fields are available: + +- **PrimaryDiskTotalCapacity** Retrieves the amount of disk space on the primary disk of the device in MB. +- **PrimaryDiskType** Retrieves an enumerator value of type STORAGE_BUS_TYPE that indicates the type of bus to which the device is connected. This should be used to interpret the raw device properties at the end of this structure (if any). +- **StorageReservePassedPolicy** Indicates whether the Storage Reserve policy, which ensures that updates have enough disk space and customers are on the latest OS, is enabled on this device. +- **SystemVolumeTotalCapacity** Retrieves the size of the partition that the System volume is installed on in MB. + + +### Census.Userdefault + +This event sends data about the current user's default preferences for browser and several of the most popular extensions and protocols, to help keep Windows up to date. + +The following fields are available: + +- **CalendarType** The calendar identifiers that are used to specify different calendars. +- **DefaultApp** The current uer's default program selected for the following extension or protocol: .html, .htm, .jpg, .jpeg, .png, .mp3, .mp4, .mov, .pdf. +- **DefaultBrowserProgId** The ProgramId of the current user's default browser. +- **LongDateFormat** The long date format the user has selected. +- **ShortDateFormat** The short date format the user has selected. + + +### Census.UserDisplay + +This event sends data about the logical/physical display size, resolution and number of internal/external displays, and VRAM on the system, to help keep Windows up to date. + +The following fields are available: + +- **InternalPrimaryDisplayLogicalDPIX** Retrieves the logical DPI in the x-direction of the internal display. +- **InternalPrimaryDisplayLogicalDPIY** Retrieves the logical DPI in the y-direction of the internal display. +- **InternalPrimaryDisplayPhysicalDPIX** Retrieves the physical DPI in the x-direction of the internal display. +- **InternalPrimaryDisplayPhysicalDPIY** Retrieves the physical DPI in the y-direction of the internal display. +- **InternalPrimaryDisplayResolutionHorizontal** Retrieves the number of pixels in the horizontal direction of the internal display. +- **InternalPrimaryDisplayResolutionVertical** Retrieves the number of pixels in the vertical direction of the internal display. +- **InternalPrimaryDisplaySizePhysicalH** Retrieves the physical horizontal length of the display in mm. Used for calculating the diagonal length in inches . +- **InternalPrimaryDisplaySizePhysicalY** Retrieves the physical vertical length of the display in mm. Used for calculating the diagonal length in inches +- **NumberofExternalDisplays** Retrieves the number of external displays connected to the machine +- **NumberofInternalDisplays** Retrieves the number of internal displays in a machine. +- **VRAMDedicated** Retrieves the video RAM in MB. +- **VRAMDedicatedSystem** Retrieves the amount of memory on the dedicated video card. +- **VRAMSharedSystem** Retrieves the amount of RAM memory that the video card can use. + + +### Census.UserNLS + +This event sends data about the default app language, input, and display language preferences set by the user, to help keep Windows up to date. + +The following fields are available: + +- **DefaultAppLanguage** The current user Default App Language. +- **DisplayLanguage** The current user preferred Windows Display Language. +- **HomeLocation** The current user location, which is populated using GetUserGeoId() function. +- **KeyboardInputLaîguages** No content is currently available. +- **KeyboardInputLanguages** The Keyboard input languages installed on the device. +- **SpeechInputLalguages** No content is currently available. +- **SpeechInputLanguages** The Speech Input languages installed on the device. + + +### Census.UserPrivacySettings + +This event provides information about the current users privacy settings and whether device-level access was granted to these capabilities. Not all settings are applicable to all devices. Each field records the consent state for the corresponding privacy setting. The consent state is encoded as a 16-bit signed integer, where the first 8 bits represents the effective consent value, and the last 8 bits represents the authority that set the value. The effective consent is one of the following values: -3 = unexpected consent value, -2 = value was not requested, -1 = an error occurred while attempting to retrieve the value, 0 = undefined, 1 = allow, 2 = deny, 3 = prompt. The consent authority is one of the following values: -3 = unexpected authority, -2 = value was not requested, -1 = an error occurred while attempting to retrieve the value, 0 = user, 1 = a higher authority (a gating setting, the system-wide setting, or a group policy), 2 = advertising ID group policy, 3 = advertising ID policy for child account, 4 = privacy setting provider doesn't know the actual consent authority, 5 = consent was not configured and a default set in code was used, 6 = system default, 7 = organization policy, 8 = OneSettings. + +The following fields are available: + +- **Activity** Current state of the activity history setting. +- **ActivityHistoryCloudSync** Current state of the activity history cloud sync setting. +- **ActivityHistoryCollection** Current state of the activity history collection setting. +- **AdvertisingId** Current state of the advertising ID setting. +- **AppDiagnostacs** No content is currently available. +- **AppDiagnostics** Current state of the app diagnostics setting. +- **Appiagnostics** No content is currently available. +- **Appointments** Current state of the calendar setting. +- **Bluetooth** Current state of the Bluetooth capability setting. +- **BluetoothSync** Current state of the Bluetooth sync capability setting. +- **BroadFileSystemAccess** Current state of the broad file system access setting. +- **CellularData** Current state of the cellular data capability setting. +- **Chat** Current state of the chat setting. +- **Contacts** Current state of the contacts setting. +- **DocumentsLibrary** Current state of the documents library setting. +- **Email** Current state of the email setting. +- **GazeInput** Current state of the gaze input setting. +- **HumanInterfaceDevice** Current state of the human interface device setting. +- **InkT9peImprovement** No content is currently available. +- **InkT9pePersonalization** No content is currently available. +- **InkTypeImprovement** Current state of the improve inking and typing setting. +- **InkTypePersonalization** Current state of the inking and typing personalization setting. +- **Location** Current state of the location setting. +- **LocationHistory** Current state of the location history setting. +- **LocationHistoryCloudSync** Current state of the location history cloud synchronization setting. +- **LocationHistoryOnTimeline** Current state of the location history on timeline setting. +- **Microphona** No content is currently available. +- **Microphone** Current state of the microphone setting. +- **PhoneCall** Current state of the phone call setting. +- **PhoneCallHistory** Current state of the call history setting. +- **PicturesLibrary** Current state of the pictures library setting. +- **Radios** Current state of the radios setting. +- **SensorsÃustom** No content is currently available. +- **SensorsCustom** Current state of the custom sensor setting. +- **SerialCommunication** Current state of the serial communication setting. +- **Sms** Current state of the text messaging setting. +- **SpeechPersonalization** Current state of the speech services setting. +- **UqerDataTasks** No content is currently available. +- **USB** Current state of the USB setting. +- **UserAccountInformation** Current state of the account information setting. +- **UserDataTasks** Current state of the tasks setting. +- **UserNotificationListener** Current state of the notifications setting. +- **VideosLibrary** Current state of the videos library setting. +- **Webcam** Current state of the camera setting. +- **WiFiDirect** Current state of the Wi-Fi direct setting. + + +### Census.VM + +This event sends data indicating whether virtualization is enabled on the device, and its various characteristics, to help keep Windows up to date. + +The following fields are available: + +- **CloudService** Indicates which cloud service, if any, that this virtual machine is running within. +- **HyperVisor** Retrieves whether the current OS is running on top of a Hypervisor. +- **IOMMUPresent** Represents if an input/output memory management unit (IOMMU) is present. +- **IsVDI** Is the device using Virtual Desktop Infrastructure? +- **IsVirtualDevice** Retrieves that when the Hypervisor is Microsoft's Hyper-V Hypervisor or other Hv#1 Hypervisor, this field will be set to FALSE for the Hyper-V host OS and TRUE for any guest OS's. This field should not be relied upon for non-Hv#1 Hypervisors. +- **SLATSupported** Represents whether Second Level Address Translation (SLAT) is supported by the hardware. +- **VirtualizationFirmwareEnabled** Represents whether virtualization is enabled in the firmware. + + +### Census.WU + +This event sends data about the Windows update server and other App store policies, to help keep Windows up to date. + +The following fields are available: + +- **AppraiserGatedStatus** Indicates whether a device has been gated for upgrading. +- **AppStoreAutoUpdate** Retrieves the Appstore settings for auto upgrade. (Enable/Disabled). +- **AppStoreAutoUpdateMDM** Retrieves the App Auto Update value for MDM: 0 - Disallowed. 1 - Allowed. 2 - Not configured. Default: [2] Not configured +- **AppStoreAutoUpdatePolicy** Retrieves the Microsoft Store App Auto Update group policy setting +- **DelayUpgrade** Retrieves the Windows upgrade flag for delaying upgrades. +- **OSAssessmentFeatureOutOfDate** How many days has it been since a the last feature update was released but the device did not install it? +- **OSAssessmentForFeatureUpdate** Is the device is on the latest feature update? +- **OSAssessmentForQualityUpdate** Is the device on the latest quality update? +- **OSAssessmentForSecurityUpdate** Is the device on the latest security update? +- **OSAssessmentQualityOutOfDate** How many days has it been since a the last quality update was released but the device did not install it? +- **OSAssessmentReleaseInfoTime** The freshness of release information used to perform an assessment. +- **OSRollbackCount** The number of times feature updates have rolled back on the device. +- **OSRolledBack** A flag that represents when a feature update has rolled back during setup. +- **OSUninstalled** A flag that represents when a feature update is uninstalled on a device . +- **OSWUAutoUpdateOptions** Retrieves the auto update settings on the device. +- **OSWUAutoUpdateOptionsSource** The source of auto update setting that appears in the OSWUAutoUpdateOptions field. For example: Group Policy (GP), Mobile Device Management (MDM), and Default. +- **UninstallActive** A flag that represents when a device has uninstalled a previous upgrade recently. +- **UpdateServiceURLConfigured** Retrieves if the device is managed by Windows Server Update Services (WSUS). +- **WUDeferUpdatePeriod** Retrieves if deferral is set for Updates. +- **WUDeferUpgradePeriod** Retrieves if deferral is set for Upgrades. +- **WUDODownloadMode** Retrieves whether DO is turned on and how to acquire/distribute updates Delivery Optimization (DO) allows users to deploy previously downloaded WU updates to other devices on the same network. +- **WUMachineId** Retrieves the Windows Update (WU) Machine Identifier. +- **WUPauseState** Retrieves WU setting to determine if updates are paused. +- **WUServer** Retrieves the HTTP(S) URL of the WSUS server that is used by Automatic Updates and API callers (by default). + + +### Census.Xbox + +This event sends data about the Xbox Console, such as Serial Number and DeviceId, to help keep Windows up to date. + +The following fields are available: + +- **XboxConsolePreferredLanguage** Retrieves the preferred language selected by the user on Xbox console. +- **XboxConsoleSerialNumber** Retrieves the serial number of the Xbox console. +- **XboxLiveDeviceId** Retrieves the unique device ID of the console. +- **XboxLiveSandboxId** Retrieves the developer sandbox ID if the device is internal to Microsoft. + + +## Common data extensions + +### Common Data Extensions.app + +Describes the properties of the running application. This extension could be populated by a client app or a web app. + +The following fields are available: + +- **asId** An integer value that represents the app session. This value starts at 0 on the first app launch and increments after each subsequent app launch per boot session. +- **env** The environment from which the event was logged. +- **expId** Associates a flight, such as an OS flight, or an experiment, such as a web site UX experiment, with an event. +- **id** Represents a unique identifier of the client application currently loaded in the process producing the event; and is used to group events together and understand usage pattern, errors by application. +- **locale** The locale of the app. +- **name** The name of the app. +- **userId** The userID as known by the application. +- **ver** Represents the version number of the application. Used to understand errors by Version, Usage by Version across an app. + + +### Common Data Extensions.container + +Describes the properties of the container for events logged within a container. + +The following fields are available: + +- **epoch** An ID that's incremented for each SDK initialization. +- **localId** The device ID as known by the client. +- **osVer** The operating system version. +- **seq** An ID that's incremented for each event. +- **type** The container type. Examples: Process or VMHost + + +### Common Data Extensions.cs + +Describes properties related to the schema of the event. + +The following fields are available: + +- **sig** A common schema signature that identifies new and modified event schemas. + + +### Common Data Extensions.device + +Describes the device-related fields. + +The following fields are available: + +- **deviceClass** The device classification. For example, Desktop, Server, or Mobile. +- **localId** A locally-defined unique ID for the device. This is not the human-readable device name. Most likely equal to the value stored at HKLM\Software\Microsoft\SQMClient\MachineId +- **make** Device manufacturer. +- **model** Device model. + + +### Common Data Extensions.Envelope + +Represents an envelope that contains all of the common data extensions. + +The following fields are available: + +- **cV** Represents the Correlation Vector: A single field for tracking partial order of related telemetry events across component boundaries. +- **data** Represents the optional unique diagnostic data for a particular event schema. +- **ext_app** Describes the properties of the running application. This extension could be populated by either a client app or a web app. See [Common Data Extensions.app](#common-data-extensionsapp). +- **ext_container** Describes the properties of the container for events logged within a container. See [Common Data Extensions.container](#common-data-extensionscontainer). +- **ext_cs** Describes properties related to the schema of the event. See [Common Data Extensions.cs](#common-data-extensionscs). +- **ext_device** Describes the device-related fields. See [Common Data Extensions.device](#common-data-extensionsdevice). +- **ext_os** Describes the operating system properties that would be populated by the client. See [Common Data Extensions.os](#common-data-extensionsos). +- **ext_receipts** Describes the fields related to time as provided by the client for debugging purposes. See [Common Data Extensions.receipts](#common-data-extensionsreceipts). +- **ext_sdk** Describes the fields related to a platform library required for a specific SDK. See [Common Data Extensions.sdk](#common-data-extensionssdk). +- **ext_user** Describes the fields related to a user. See [Common Data Extensions.user](#common-data-extensionsuser). +- **ext_utc** Describes the fields that might be populated by a logging library on Windows. See [Common Data Extensions.utc](#common-data-extensionsutc). +- **ext_xbl** Describes the fields related to XBOX Live. See [Common Data Extensions.xbl](#common-data-extensionsxbl). +- **flags** Represents a collection of bits that describe how the event should be processed by the Connected User Experience and Telemetry component pipeline. The lowest-order byte is the event persistence. The next byte is the event latency. +- **iKey** Represents an ID for applications or other logical groupings of events. +- **name** Represents the uniquely qualified name for the event. +- **popSample** Represents the effective sample rate for this event at the time it was generated by a client. +- **time** Represents the event date time in Coordinated Universal Time (UTC) when the event was generated on the client. This should be in ISO 8601 format. +- **ver** Represents the major and minor version of the extension. + + +### Common Data Extensions.os + +Describes some properties of the operating system. + +The following fields are available: + +- **bootId** An integer value that represents the boot session. This value starts at 0 on first boot after OS install and increments after every reboot. +- **expId** Represents the experiment ID. The standard for associating a flight, such as an OS flight (pre-release build), or an experiment, such as a web site UX experiment, with an event is to record the flight / experiment IDs in Part A of the common schema. +- **locale** Represents the locale of the operating system. +- **name** Represents the operating system name. +- **ver** Represents the major and minor version of the extension. + + +### Common Data Extensions.receipts + +Represents various time information as provided by the client and helps for debugging purposes. + +The following fields are available: + +- **originalTime** The original event time. +- **uploadTime** The time the event was uploaded. + + +### Common Data Extensions.sdk + +Used by platform specific libraries to record fields that are required for a specific SDK. + +The following fields are available: + +- **epoch** An ID that is incremented for each SDK initialization. +- **installId** An ID that's created during the initialization of the SDK for the first time. +- **libVer** The SDK version. +- **seq** An ID that is incremented for each event. + + +### Common Data Extensions.user + +Describes the fields related to a user. + +The following fields are available: + +- **authId** This is an ID of the user associated with this event that is deduced from a token such as a Microsoft Account ticket or an XBOX token. +- **locale** The language and region. +- **localId** Represents a unique user identity that is created locally and added by the client. This is not the user's account ID. + + +### Common Data Extensions.utc + +Describes the properties that could be populated by a logging library on Windows. + +The following fields are available: + +- **aId** Represents the ETW ActivityId. Logged via TraceLogging or directly via ETW. +- **bSeq** Upload buffer sequence number in the format: buffer identifier:sequence number +- **cat** Represents a bitmask of the ETW Keywords associated with the event. +- **cpId** The composer ID, such as Reference, Desktop, Phone, Holographic, Hub, IoT Composer. +- **epoch** Represents the epoch and seqNum fields, which help track how many events were fired and how many events were uploaded, and enables identification of data lost during upload and de-duplication of events on the ingress server. +- **flags** Represents the bitmap that captures various Windows specific flags. +- **mon** Combined monitor and event sequence numbers in the format: monitor sequence : event sequence +- **op** Represents the ETW Op Code. +- **raId** Represents the ETW Related ActivityId. Logged via TraceLogging or directly via ETW. +- **seq** Represents the sequence field used to track absolute order of uploaded events. It is an incrementing identifier for each event added to the upload queue. The Sequence helps track how many events were fired and how many events were uploaded and enables identification of data lost during upload and de-duplication of events on the ingress server. +- **stId** Represents the Scenario Entry Point ID. This is a unique GUID for each event in a diagnostic scenario. This used to be Scenario Trigger ID. + + +### Common Data Extensions.xbl + +Describes the fields that are related to XBOX Live. + +The following fields are available: + +- **claims** Any additional claims whose short claim name hasn't been added to this structure. +- **did** XBOX device ID +- **dty** XBOX device type +- **dvr** The version of the operating system on the device. +- **eid** A unique ID that represents the developer entity. +- **exp** Expiration time +- **ip** The IP address of the client device. +- **nbf** Not before time +- **pid** A comma separated list of PUIDs listed as base10 numbers. +- **sbx** XBOX sandbox identifier +- **sid** The service instance ID. +- **sty** The service type. +- **tid** The XBOX Live title ID. +- **tvr** The XBOX Live title version. +- **uts** A bit field, with 2 bits being assigned to each user ID listed in xid. This field is omitted if all users are retail accounts. +- **xid** A list of base10-encoded XBOX User IDs. + + +## Common data fields + +### Ms.Device.DeviceInventoryChange + +Describes the installation state for all hardware and software components available on a particular device. + +The following fields are available: + +- **action** The change that was invoked on a device inventory object. +- **inventoryId** Device ID used for Compatibility testing +- **objectInstanceId** Object identity which is unique within the device scope. +- **objectType** Indicates the object type that the event applies to. +- **syncId** A string used to group StartSync, EndSync, Add, and Remove operations that belong together. This field is unique by Sync period and is used to disambiguate in situations where multiple agents perform overlapping inventories for the same object. + + +## Compatibility events + +### Microsoft.Windows.Compatibility.Apphelp.SdbFix + +Product instrumentation for helping debug/troubleshoot issues with inbox compatibility components. + +The following fields are available: + +- **AppName** Name of the application impacted by SDB. +- **FixID** SDB GUID. +- **Flags** List of flags applied. +- **ImageName** Name of file. + + +## Component-based servicing events + +### CbsServicingProvider.CbsCapabilityEnumeration + +This event reports on the results of scanning for optional Windows content on Windows Update. + +The following fields are available: + +- **architecture** Indicates the scan was limited to the specified architecture. +- **capabilityCount** The number of optional content packages found during the scan. +- **clientId** The name of the application requesting the optional content. +- **duration** The amount of time it took to complete the scan. +- **hrStatus** The HReturn code of the scan. +- **language** Indicates the scan was limited to the specified language. +- **majorVersion** Indicates the scan was limited to the specified major version. +- **minorVersion** Indicates the scan was limited to the specified minor version. +- **namespace** Indicates the scan was limited to packages in the specified namespace. +- **sourceFilter** A bitmask indicating the scan checked for locally available optional content. +- **stackBuild** The build number of the servicing stack. +- **stackMajorVersion** The major version number of the servicing stack. +- **stackMinorVersion** The minor version number of the servicing stack. +- **stackRevision** The revision number of the servicing stack. + + +### CbsServicingProvider.CbsCapabilitySessionFinalize + +This event provides information about the results of installing or uninstalling optional Windows content from Windows Update. + +The following fields are available: + +- **capabilities** The names of the optional content packages that were installed. +- **clientId** The name of the application requesting the optional content. +- **currentID** The ID of the current install session. +- **downloadSource** The source of the download. +- **highestState** The highest final install state of the optional content. +- **hrLCUReservicingStatus** Indicates whether the optional content was updated to the latest available version. +- **hrStatus** The HReturn code of the install operation. +- **rebootCount** The number of reboots required to complete the install. +- **retryID** The session ID that will be used to retry a failed operation. +- **retryStatus** Indicates whether the install will be retried in the event of failure. +- **stackBuild** The build number of the servicing stack. +- **stackMajorVersion** The major version number of the servicing stack. +- **stackMinorVersion** The minor version number of the servicing stack. +- **stackRevision** The revision number of the servicing stack. + + +### CbsServicingProvider.CbsCapabilitySessionPended + +This event provides information about the results of installing optional Windows content that requires a reboot to keep Windows up to date. + +The following fields are available: + +- **clientId** The name of the application requesting the optional content. +- **pendingDecision** Indicates the cause of reboot, if applicable. + + +### CbsServicingProvider.CbsLateAcquisition + +This event sends data to indicate if some Operating System packages could not be updated as part of an upgrade, to help keep Windows up to date. + +The following fields are available: + +- **Features** The list of feature packages that could not be updated. +- **RetryID** The ID identifying the retry attempt to update the listed packages. + + +### CbsServicingProvider.CbsPackageRemoval + +This event provides information about the results of uninstalling a Windows Cumulative Security Update to help keep Windows up to date. + +The following fields are available: + +- **buildVersion** The build number of the security update being uninstalled. +- **clientId** The name of the application requesting the uninstall. +- **currentStateEnd** The final state of the update after the operation. +- **failureDetails** Information about the cause of a failure, if applicable. +- **failureSourceEnd** The stage during the uninstall where the failure occurred. +- **hrStatusEnd** The overall exit code of the operation. +- **initiatedOffline** Indicates if the uninstall was initiated for a mounted Windows image. +- **majorVersion** The major version number of the security update being uninstalled. +- **minorVersion** The minor version number of the security update being uninstalled. +- **originalState** The starting state of the update before the operation. +- **pendingDecision** Indicates the cause of reboot, if applicable. +- **primitiveExecutionContext** The state during system startup when the uninstall was completed. +- **revisionVersion** The revision number of the security update being uninstalled. +- **transactionCanceled** Indicates whether the uninstall was cancelled. + + +### CbsServicingProvider.CbsQualityUpdateInstall + +This event reports on the performance and reliability results of installing Servicing content from Windows Update to keep Windows up to date. + +The following fields are available: + +- **buildVersion** The build version number of the update package. +- **clientId** The name of the application requesting the optional content. +- **corruptionHistoryFlags** A bitmask of the types of component store corruption that have caused update failures on the device. +- **corruptionType** An enumeration listing the type of data corruption responsible for the current update failure. +- **currentStateEnd** The final state of the package after the operation has completed. +- **doqTimeSeconds** The time in seconds spent updating drivers. +- **executeTimeSeconds** The number of seconds required to execute the install. +- **failureDetails** The driver or installer that caused the update to fail. +- **failureSourceEnd** An enumeration indicating at what phase of the update a failure occurred. +- **hrStatusEnd** The return code of the install operation. +- **initiatedOffline** A true or false value indicating whether the package was installed into an offline Windows Imaging Format (WIM) file. +- **majorVersion** The major version number of the update package. +- **minorVersion** The minor version number of the update package. +- **originalState** The starting state of the package. +- **overallTimeSeconds** The time (in seconds) to perform the overall servicing operation. +- **planTimeSeconds** The time in seconds required to plan the update operations. +- **poqTimeSeconds** The time in seconds processing file and registry operations. +- **postRebootTimeSeconds** The time (in seconds) to do startup processing for the update. +- **preRebootTimeSeconds** The time (in seconds) between execution of the installation and the reboot. +- **primitiveExecutionContext** An enumeration indicating at what phase of shutdown or startup the update was installed. +- **rebootCount** The number of reboots required to install the update. +- **rebootTimeSeconds** The time (in seconds) before startup processing begins for the update. +- **resolveTimeSeconds** The time in seconds required to resolve the packages that are part of the update. +- **revisionVersion** The revision version number of the update package. +- **rptTimeSeconds** The time in seconds spent executing installer plugins. +- **shutdownTimeSeconds** The time (in seconds) required to do shutdown processing for the update. +- **stackRevision** The revision number of the servicing stack. +- **stageTimeSeconds** The time (in seconds) required to stage all files that are part of the update. + + +### CbsServicingProvider.CbsSelectableUpdateChangeV2 + +This event reports the results of enabling or disabling optional Windows Content to keep Windows up to date. + +The following fields are available: + +- **applicableUpdateState** Indicates the highest applicable state of the optional content. +- **buildVersion** The build version of the package being installed. +- **clientId** The name of the application requesting the optional content change. +- **downloadSource** Indicates if optional content was obtained from Windows Update or a locally accessible file. +- **downloadtimeInSeconds** The number of seconds required to complete the optional content download. +- **executionID** A unique ID used to identify events associated with a single servicing operation and not reused for future operations. +- **executionSequence** A counter that tracks the number of servicing operations attempted on the device. +- **firstMergedExecutionSequence** The value of a pervious executionSequence counter that is being merged with the current operation, if applicable. +- **firstMergedID** A unique ID of a pervious servicing operation that is being merged with this operation, if applicable. +- **hrDownloadResult** The return code of the download operation. +- **hrStatusUpdate** The return code of the servicing operation. +- **identityHash** A pseudonymized (hashed) identifier for the Windows Package that is being installed or uninstalled. +- **initiatedOffline** Indicates whether the operation was performed against an offline Windows image file or a running instance of Windows. +- **majorVersion** The major version of the package being installed. +- **minorVersion** The minor version of the package being installed. +- **packageArchitecture** The architecture of the package being installed. +- **packageLanguage** The language of the package being installed. +- **packageName** The name of the package being installed. +- **rebootRequired** Indicates whether a reboot is required to complete the operation. +- **revisionVersion** The revision number of the package being installed. +- **stackBuild** The build number of the servicing stack binary performing the installation. +- **stackMajorVersion** The major version number of the servicing stack binary performing the installation. +- **stackMinorVersion** The minor version number of the servicing stack binary performing the installation. +- **stackRevision** The revision number of the servicing stack binary performing the installation. +- **updateName** The name of the optional Windows Operation System feature being enabled or disabled. +- **updateStartState** A value indicating the state of the optional content before the operation started. +- **updateTargetState** A value indicating the desired state of the optional content. + + +## Deployment extensions + +### DeploymentTelemetry.Deployment_End + +This event indicates that a Deployment 360 API has completed. + +The following fields are available: + +- **ClientId** Client ID of the user utilizing the D360 API. +- **ErrorCode** Error code of action. +- **FlightId** The specific ID of the Windows Insider build the device is getting. +- **Mode** Phase in upgrade. +- **RelatedCV** The correction vector (CV) of any other related events +- **Result** End result of the action. + + +### DeploymentTelemetry.Deployment_SetupBoxLaunch + +This event indicates that the Deployment 360 APIs have launched Setup Box. + +The following fields are available: + +- **ClientId** The client ID of the user utilizing the D360 API. +- **FlightId** The specific ID of the Windows Insider build the device is getting. +- **Quiet** Whether Setup will run in quiet mode or full mode. +- **RelatedCV** The correlation vector (CV) of any other related events. +- **SetupMode** The current setup phase. + + +### DeploymentTelemetry.Deployment_SetupBoxResult + +This event indicates that the Deployment 360 APIs have received a return from Setup Box. + +The following fields are available: + +- **ClientId** Client ID of the user utilizing the D360 API. +- **ErrorCode** Error code of the action. +- **FlightId** The specific ID of the Windows Insider build the device is getting. +- **Quiet** Indicates whether Setup will run in quiet mode or full mode. +- **RelatedCV** The correlation vector (CV) of any other related events. +- **SetupMode** The current Setup phase. + + +### DeploymentTelemetry.Deployment_Start + +This event indicates that a Deployment 360 API has been called. + +The following fields are available: + +- **ClientId** Client ID of the user utilizing the D360 API. +- **FlightId** The specific ID of the Windows Insider build the device is getting. +- **Mode** The current phase of the upgrade. +- **RelatedCV** The correlation vector (CV) of any other related events. + + +## Diagnostic data events + +### TelClientSynthetic.AuthorizationInfo_RuntimeTransition + +This event sends data indicating that a device has undergone a change of telemetry opt-in level detected at UTC startup, to help keep Windows up to date. The telemetry opt-in level signals what data we are allowed to collect. + +The following fields are available: + +- **CanAddMsaToMsTelemetry** True if we can add MSA PUID and CID to telemetry, false otherwise. +- **CanCollectAnyTelemetry** True if we are allowed to collect partner telemetry, false otherwise. +- **CanCollectCoreTelemetry** True if we can collect CORE/Basic telemetry, false otherwise. +- **CanCollectHeartbeats** True if we can collect heartbeat telemetry, false otherwise. +- **CanCollectOsTelemetry** True if we can collect diagnostic data telemetry, false otherwise. +- **CanCollectWindowsAnalyticsEvents** True if we can collect Windows Analytics data, false otherwise. +- **CanPerformDiagnosticEscalations** True if we can perform diagnostic escalation collection, false otherwise. +- **CanPerformTraceEscalations** True if we can perform trace escalation collection, false otherwise. +- **CanReportScenarios** True if we can report scenario completions, false otherwise. +- **PreviousPermissions** Bitmask of previous telemetry state. +- **TransitionFromEverythingOff** True if we are transitioning from all telemetry being disabled, false otherwise. + + +### TelClientSynthetic.AuthorizationInfo_Startup + +Fired by UTC at startup to signal what data we are allowed to collect. + +The following fields are available: + +- **CanAddMsaToMsTelemetry** True if we can add MSA PUID and CID to telemetry, false otherwise. +- **CanCollectAnyTelemetry** True if we are allowed to collect partner telemetry, false otherwise. +- **CanCollectCoreTelemetry** True if we can collect CORE/Basic telemetry, false otherwise. +- **CanCollectHeartbeats** True if we can collect heartbeat telemetry, false otherwise. +- **CanCollectOsTelemetry** True if we can collect diagnostic data telemetry, false otherwise. +- **CanCollectWindowsAnalyticsEvents** True if we can collect Windows Analytics data, false otherwise. +- **CanPerformDiagnosticEscalations** True if we can perform diagnostic escalation collection, false otherwise. +- **CanPerformTraceEscalations** True if we can perform trace escalation collection, false otherwise. +- **CanReportScenarios** True if we can report scenario completions, false otherwise. +- **PreviousPermissions** Bitmask of previous telemetry state. +- **TransitionFromEverythingOff** True if we are transitioning from all telemetry being disabled, false otherwise. + + +### TelClientSynthetic.ConnectivityHeartBeat_0 + +This event sends data about the connectivity status of the Connected User Experience and Telemetry component that uploads telemetry events. If an unrestricted free network (such as Wi-Fi) is available, this event updates the last successful upload time. Otherwise, it checks whether a Connectivity Heartbeat event was fired in the past 24 hours, and if not, it fires an event. A Connectivity Heartbeat event also fires when a device recovers from costed network to free network. + +The following fields are available: + +- **CensusExitCode** Returns last execution codes from census client run. +- **CensusStartTime** Returns timestamp corresponding to last successful census run. +- **CensusTaskEnabled** Returns Boolean value for the census task (Enable/Disable) on client machine. +- **LastConnectivityLossTime** Retrieves the last time the device lost free network. +- **NetworkState** Retrieves the network state: 0 = No network. 1 = Restricted network. 2 = Free network. +- **NoNetworkTime** Retrieves the time spent with no network (since the last time) in seconds. +- **RestrictedNetworkTime** Retrieves the time spent on a metered (cost restricted) network in seconds. +- **捔祦⽌䱩⽪昫橷瘴場漸䤫〫洯硈㍈㡮⽯** No content is currently available. +- **⽫甸㑪摭橷捔橗⭪晙晅晣穹椸樷** No content is currently available. +- **䉪䌯䱏杄䬷㝐灌䩚㠯⽉䝲伹㡈㕉佤** No content is currently available. + + +### TelClientSynthetic.HeartBeat_5 + +This event sends data about the health and quality of the diagnostic data from the given device, to help keep Windows up to date. It also enables data analysts to determine how 'trusted' the data is from a given device. + +The following fields are available: + +- **AgentConnectionErrorsCount** Number of non-timeout errors associated with the host/agent channel. +- **CensusExitCode** The last exit code of the Census task. +- **CensusStartTime** Time of last Census run. +- **CensusTaskEnabled** True if Census is enabled, false otherwise. +- **CompressedBytesUploaded** Number of compressed bytes uploaded. +- **ConsumerDroppedCount** Number of events dropped at consumer layer of telemetry client. +- **CriticalDataDbDroppedCount** Number of critical data sampled events dropped at the database layer. +- **CriticalDataThrottleDroppedCount** The number of critical data sampled events that were dropped because of throttling. +- **CriticalOverflowEntersCounter** Number of times critical overflow mode was entered in event DB. +- **CriticalOvErflowEntersCounter** No content is currently available. +- **DbCriticalDroppedCount** Total number of dropped critical events in event DB. +- **DbDroppedCount** Number of events dropped due to DB fullness. +- **DbDroppedFailureCount** Number of events dropped due to DB failures. +- **DbDroppedFullCount** Number of events dropped due to DB fullness. +- **DecndingDroppedCount** No content is currently available. +- **DecodingDroppedCount** Number of events dropped due to decoding failures. +- **EnteringCriticalOverflowDroppedCounter** Number of events dropped due to critical overflow mode being initiated. +- **EtwDroppedBufferCount** Number of buffers dropped in the UTC ETW session. +- **EtwDroppedCount** Number of events dropped at ETW layer of telemetry client. +- **EventsPersistedCount** Number of events that reached the PersistEvent stage. +- **EventStoreLifetimeResetCounter** Number of times event DB was reset for the lifetime of UTC. +- **EventStoreResetCounter** Number of times event DB was reset. +- **EventStoreResetSizeSum** Total size of event DB across all resets reports in this instance. +- **EventSubStoreResetCounter** Number of times event DB was reset. +- **EventSubStoreResetSizeSum** Total size of event DB across all resets reports in this instance. +- **EventsUploaded** Number of events uploaded. +- **Flags** Flags indicating device state such as network state, battery state, and opt-in state. +- **FullTriggerBufferDroppedCount** Number of events dropped due to trigger buffer being full. +- **FullTrigwerBufferDroppedCount** No content is currently available. +- **HeartBeatSequenceNumber** The sequence number of this heartbeat. +- **InvalidH4BFCodeCount** No content is currently available. +- **InvalidHttpCodeCount** Number of invalid HTTP codes received from contacting Vortex. +- **LastAgentConnectionError** Last non-timeout error encountered in the host/agent channel. +- **LastEventSizeOffender** Event name of last event which exceeded max event size. +- **LastInvalidH4BFCode** No content is currently available. +- **LastInvalidHttpCode** Last invalid HTTP code received from Vortex. +- **MaxActiveAgentConnectionCount** The maximum number of active agents during this heartbeat timeframe. +- **MaxInUseScenarioCounter** Soft maximum number of scenarios loaded by UTC. +- **PreviousHeartBeatTime** Time of last heartbeat event (allows chaining of events). +- **PrivacyBlockedCount** The number of events blocked due to privacy settings or tags. +- **RepeatedUploadFailureDropped** Number of events lost due to repeated upload failures for a single buffer. +- **SettingsH4BFAttempts** No content is currently available. +- **SettingsH4BFFailures** No content is currently available. +- **SettingsHttpAttempts** Number of attempts to contact OneSettings service. +- **SettingsHttpFailures** The number of failures from contacting the OneSettings service. +- **ThrottledDroppedCount** Number of events dropped due to throttling of noisy providers. +- **TopUploaderErrors** List of top errors received from the upload endpoint. +- **UploaderDroppedCount** Number of events dropped at the uploader layer of telemetry client. +- **UploaderErrorCount** Number of errors received from the upload endpoint. +- **VortexFailuresTimeout** The number of timeout failures received from Vortex. +- **VortexH4BFAttempts** No content is currently available. +- **VortexH4BFFailures4xx** No content is currently available. +- **VortexH4BFFailures5xx** No content is currently available. +- **VortexH4BFResponseFailures** No content is currently available. +- **VortexH4BFResponsesWithDroppedEvents** No content is currently available. +- **VortexHttpAttempts** Number of attempts to contact Vortex. +- **VortexHttpFailures4xx** Number of 400-499 error codes received from Vortex. +- **VortexHttpFailures5xx** Number of 500-599 error codes received from Vortex. +- **VortexHttpResponseFailures** Number of Vortex responses that are not 2XX or 400. +- **VortexHttpResponsesWi|hDroppedEvents** No content is currently available. +- **VortexHttpResponsesWithDroppedEvents** Number of Vortex responses containing at least 1 dropped event. + + +### TelClientSynthetic.HeartBeat_Aria_5 + +This event is the telemetry client ARIA heartbeat. + +The following fields are available: + +- **CompressedBytesUploaded** Number of compressed bytes uploaded. +- **CriticalDataDbDroppedCount** Number of critical data sampled events dropped at the database layer. +- **CriticalOverflowEntersCounter** Number of times critical overflow mode was entered in event database. +- **DbCriticalDroppedCount** Total number of dropped critical events in event database. +- **DbDroppedCount** Number of events dropped at the database layer. +- **DbDroppedFailureCount** Number of events dropped due to database failures. +- **DbDroppedFullCount** Number of events dropped due to database being full. +- **EnteringCriticalOverflowDroppedCounter** Number of events dropped due to critical overflow mode being initiated. +- **EventsPersistedCount** Number of events that reached the PersistEvent stage. +- **EventStoreLifetimeResetCounter** Number of times the event store has been reset. +- **EventStoreResetCounter** Number of times the event store has been reset during this heartbeat. +- **EventStoreResetSizeSum** Size of event store reset in bytes. +- **EventsUploaded** Number of events uploaded. +- **HeartBeatSequenceNumber** The sequence number of this heartbeat. +- **InvalidHttpCodeCount** Number of invalid HTTP codes received from contacting Vortex. +- **LastEventSizeOffender** Event name of last event which exceeded max event size. +- **LastInvalidHttpCode** Last invalid HTTP code received from Vortex. +- **PreviousHeartBeatTime** The FILETIME of the previous heartbeat fire. +- **PrivacyBlockedCount** The number of events blocked due to privacy settings or tags. +- **RepeatedUploadFailureDropped** Number of events lost due to repeated upload failures for a single buffer. +- **SettingsHttpAttempts** Number of attempts to contact OneSettings service. +- **SettingsHttpFailures** Number of failures from contacting OneSettings service. +- **TopUploaderErrors** List of top errors received from the upload endpoint. +- **UploaderDroppedCount** Number of events dropped at the uploader layer of telemetry client. +- **UploaderErrorCount** Number of errors received from the upload endpoint. +- **VortexFailuresTimeout** Number of time out failures received from Vortex. +- **VortexHttpAttempts** Number of attempts to contact Vortex. +- **VortexHttpFailures4xx** Number of 400-499 error codes received from Vortex. +- **VortexHttpFailures5xx** Number of 500-599 error codes received from Vortex. +- **VortexHttpResponseFailures** Number of Vortex responses that are not 2XX or 400. +- **VortexHttpResponsesWithDroppedEvents** Number of Vortex responses containing at least 1 dropped event. + + +### TelClientSynthetic.HeartBeat_Seville_5 + +This event is sent by the universal telemetry client (UTC) as a heartbeat signal for Sense. + +The following fields are available: + +- **AgentConnectionErrorsCount** Number of non-timeout errors associated with the host or agent channel. +- **CompressedBytesUploaded** Number of compressed bytes uploaded. +- **ConsumerDroppedCount** Number of events dropped at consumer layer of the telemetry client. +- **CriticalDataDbDroppedCount** Number of critical data sampled events dropped at the database layer. +- **CriticalDataThrottleDroppedCount** Number of critical data sampled events dropped due to throttling. +- **CriticalOverflowEntersCounter** Number of times critical overflow mode was entered in event database. +- **DailyUploadQuotaInBytes** Daily upload quota for Sense in bytes (only in in-proc mode). +- **DbCriticalDroppedCount** Total number of dropped critical events in event database. +- **DbDroppedCount** Number of events dropped due to database being full. +- **DbDroppedFailureCount** Number of events dropped due to database failures. +- **DbDroppedFullCount** Number of events dropped due to database being full. +- **DecodingDroppedCount** Number of events dropped due to decoding failures. +- **DiskSizeInBytes** Size of event store for Sense in bytes (only in in-proc mode). +- **EnteringCriticalOverflowDroppedCounter** Number of events dropped due to critical overflow mode being initiated. +- **EtwDroppedBufferCount** Number of buffers dropped in the universal telemetry client (UTC) event tracing for Windows (ETW) session. +- **EtwDroppedCount** Number of events dropped at the event tracing for Windows (ETW) layer of telemetry client. +- **EventsPersistedCount** Number of events that reached the PersistEvent stage. +- **EventStoreLifetimeResetCounter** Number of times event the database was reset for the lifetime of the universal telemetry client (UTC). +- **EventStoreResetCounter** Number of times the event database was reset. +- **EventStoreResetSizeSum** Total size of the event database across all resets reports in this instance. +- **EventsUploaded** Number of events uploaded. +- **Flags** Flags indicating device state, such as network state, battery state, and opt-in state. +- **FullTriggerBufferDroppedCount** Number of events dropped due to trigger buffer being full. +- **HeartBeatSequenceNumber** The sequence number of this heartbeat. +- **InvalidHttpCodeCount** Number of invalid HTTP codes received from contacting Vortex. +- **LastAgentConnectionError** Last non-timeout error encountered in the host/agent channel. +- **LastEventSizeOffender** Event name of last event which exceeded the maximum event size. +- **LastInvalidHttpCode** Last invalid HTTP code received from Vortex. +- **MaxActiveAgentConnectionCount** Maximum number of active agents during this heartbeat timeframe. +- **NormalUploadTimerMillis** Number of milliseconds between each upload of normal events for SENSE (only in in-proc mode). +- **PreviousHeartBeatTime** Time of last heartbeat event (allows chaining of events). +- **RepeatedUploadFailureDropped** Number of events lost due to repeated failed uploaded attempts. +- **SettingsHttpAttempts** Number of attempts to contact OneSettings service. +- **SettingsHttpFailures** Number of failures from contacting the OneSettings service. +- **ThrottledDroppedCount** Number of events dropped due to throttling of noisy providers. +- **TopUploaderErrors** Top uploader errors, grouped by endpoint and error type. +- **UploaderDroppedCount** Number of events dropped at the uploader layer of the telemetry client. +- **UploaderErrorCount** Number of input for the TopUploaderErrors mode estimation. +- **VortexFailuresTimeout** Number of time out failures received from Vortex. +- **VortexHttpAttempts** Number of attempts to contact Vortex. +- **VortexHttpFailures4xx** Number of 400-499 error codes received from Vortex. +- **VortexHttpFailures5xx** Number of 500-599 error codes received from Vortex. +- **VortexHttpResponseFailures** Number of Vortex responses that are not 2XX or 400. +- **VortexHttpResponsesWithDroppedEvents** Number of Vortex responses containing at least 1 dropped event. + + +## Direct to update events + +### Microsoft.Windows.DirectToUpdate.DTUCoordinatorCheckApplicability + +Event to indicate that the Coordinator CheckApplicability call succeeded. + +The following fields are available: + +- **ApplicabilityResult** Result of CheckApplicability function. +- **CampaignID** Campaign ID being run. +- **ClientID** Client ID being run. +- **CoordinatorVersion** Coordinator version of DTU. +- **CV** Correlation vector. +- **IsDeviceAADDomainJoined** Indicates whether the device is logged in to the AAD (Azure Active Directory) domain. +- **IsDeviceADDomainJoined** Indicates whether the device is logged in to the AD (Active Directory) domain. +- **IsDeviceCloverTrail** Indicates whether the device has a Clover Trail system installed. +- **IsDeviceFeatureUpdatingPaused** Indicates whether Feature Update is paused on the device. +- **IsDeviceNetworkMetered** Indicates whether the device is connected to a metered network. +- **IsDeviceOobeBlocked** Indicates whether user approval is required to install updates on the device. +- **IsDeviceRequireUpdateApproval** Indicates whether user approval is required to install updates on the device. +- **IsDeviceSccmManaged** Indicates whether the device is running the Microsoft SCCM (System Center Configuration Manager) to keep the operating system and applications up to date. +- **IsDeviceUninstallActive** Indicates whether the OS (operating system) on the device was recently updated. +- **IsDeviceUpdateNotificationLevel** Indicates whether the device has a set policy to control update notifications. +- **IsDeviceUpdateServiceManaged** Indicates whether the device uses WSUS (Windows Server Update Services). +- **IsDeviceZeroExhaust** Indicates whether the device subscribes to the Zero Exhaust policy to minimize connections from Windows to Microsoft. +- **IsGreaterThanMaxRetry** Indicates whether the DTU (Direct to Update) service has exceeded its maximum retry count. +- **IsVolumeLicensed** Indicates whether a volume license was used to authenticate the operating system or applications on the device. + + +### Microsoft.Windows.DirectToUpdate.DTUCoordinatorCheckApplicabilityGenericFailure + +This event indicatse that we have received an unexpected error in the Direct to Update (DTU) Coordinators CheckApplicability call. + +The following fields are available: + +- **CampaignID** ID of the campaign being run. +- **ClientID** ID of the client receiving the update. +- **CoordinatorVersion** Coordinator version of Direct to Update. +- **CV** Correlation vector. +- **hResult** HRESULT of the failure. + + +### Microsoft.Windows.DirectToUpdate.DTUCoordinatorCleanupGenericFailure + +This event indicates that we have received an unexpected error in the Direct to Update (DTU) Coordinator Cleanup call. + +The following fields are available: + +- **CampaignID** Campaign ID being run +- **ClientID** Client ID being run +- **CoordinatorVersion** Coordinator version of DTU +- **CV** Correlation vector +- **hResult** HRESULT of the failure + + +### Microsoft.Windows.DirectToUpdate.DTUCoordinatorCleanupSuccess + +This event indicates that the Coordinator Cleanup call succeeded. + +The following fields are available: + +- **CampaignID** Campaign ID being run +- **ClientID** Client ID being run +- **CoordinatorVersion** Coordinator version of DTU +- **CV** Correlation vector + + +### Microsoft.Windows.DirectToUpdate.DTUCoordinatorCommitGenericFailure + +This event indicates that we have received an unexpected error in the Direct to Update (DTU) Coordinator Commit call. + +The following fields are available: + +- **CampaignID** Campaign ID being run. +- **ClientID** Client ID being run. +- **CoordinatorVersion** Coordinator version of DTU. +- **CV** Correlation vector. +- **hResult** HRESULT of the failure. + + +### Microsoft.Windows.DirectToUpdate.DTUCoordinatorCommitSuccess + +This event indicates that the Coordinator Commit call succeeded. + +The following fields are available: + +- **CampaignID** Campaign ID being run. +- **ClientID** Client ID being run. +- **CoordinatorVersion** Coordinator version of DTU. +- **CV** Correlation vector. + + +### Microsoft.Windows.DirectToUpdate.DTUCoordinatorDownloadGenericFailure + +This event indicates that we have received an unexpected error in the Direct to Update (DTU) Coordinator Download call. + +The following fields are available: + +- **CampaignID** Campaign ID being run. +- **ClientID** Client ID being run. +- **CoordinatorVersion** Coordinator version of DTU. +- **CV** Correlation vector. +- **hResult** HRESULT of the failure. + + +### Microsoft.Windows.DirectToUpdate.DTUCoordinatorDownloadIgnoredFailure + +This event indicates that we have received an error in the Direct to Update (DTU) Coordinator Download call that will be ignored. + +The following fields are available: + +- **CampaignID** Campaign ID being run. +- **ClientID** Client ID being run. +- **CoordinatorVersion** Coordinator version of DTU. +- **CV** Correlation vector. +- **hResult** HRESULT of the failure. + + +### Microsoft.Windows.DirectToUpdate.DTUCoordinatorDownloadSuccess + +This event indicates that the Coordinator Download call succeeded. + +The following fields are available: + +- **CampaignID** Campaign ID being run. +- **ClientID** Client ID being run. +- **CoordinatorVersion** Coordinator version of DTU. +- **CV** Correlation vector. + + +### Microsoft.Windows.DirectToUpdate.DTUCoordinatorHandleShutdownGenericFailure + +This event indicates that we have received an unexpected error in the Direct to Update (DTU) Coordinator HandleShutdown call. + +The following fields are available: + +- **CampaignID** Campaign ID being run. +- **ClientID** Client ID being run. +- **CoordinatorVersion** Coordinate version of DTU. +- **CV** Correlation vector. +- **hResult** HRESULT of the failure. + + +### Microsoft.Windows.DirectToUpdate.DTUCoordinatorHandleShutdownSuccess + +This event indicates that the Coordinator HandleShutdown call succeeded. + +The following fields are available: + +- **CampaignID** Campaign ID being run. +- **ClientID** Client ID being run. +- **CoordinatorVersion** Coordinator version of DTU. +- **CV** Correlation vector. + + +### Microsoft.Windows.DirectToUpdate.DTUCoordinatorInitializeGenericFailure + +This event indicates that we have received an unexpected error in the Direct to Update (DTU) Coordinator Initialize call. + +The following fields are available: + +- **CampaignID** Campaign ID being run. +- **ClientID** Client ID being run. +- **CoordinatorVersion** Coordinator version of DTU. +- **CV** Correlation vector. +- **hResult** HRESULT of the failure. + + +### Microsoft.Windows.DirectToUpdate.DTUCoordinatorInitializeSuccess + +This event indicates that the Coordinator Initialize call succeeded. + +The following fields are available: + +- **CampaignID** Campaign ID being run. +- **ClientID** Client ID being run. +- **CoordinatorVersion** Coordinator version of DTU. +- **CV** Correlation vector. + + +### Microsoft.Windows.DirectToUpdate.DTUCoordinatorInstallGenericFailure + +This event indicates that we have received an unexpected error in the Direct to Update (DTU) Coordinator Install call. + +The following fields are available: + +- **CampaignID** Campaign ID being run. +- **ClientID** Client ID being run. +- **CoordinatorVersion** Coordinator version of DTU. +- **CV** Correlation vector. +- **hResult** HRESULT of the failure. + + +### Microsoft.Windows.DirectToUpdate.DTUCoordinatorInstallIgnoredFailure + +This event indicates that we have received an error in the Direct to Update (DTU) Coordinator Install call that will be ignored. + +The following fields are available: + +- **CampaignID** Campaign ID being run. +- **ClientID** Client ID being run. +- **CoordinatorVersion** Coordinator version of DTU. +- **CV** Correlation vector. +- **hResult** HRESULT of the failure. + + +### Microsoft.Windows.DirectToUpdate.DTUCoordinatorInstallSuccess + +This event indicates that the Coordinator Install call succeeded. + +The following fields are available: + +- **CampaignID** Campaign ID being run. +- **ClientID** Client ID being run. +- **CoordinatorVersion** Coordinator version of DTU. +- **CV** Correlation vector. + + +### Microsoft.Windows.DirectToUpdate.DTUCoordinatorProgressCallBack + +This event indicates that the Coordinator's progress callback has been called. + +The following fields are available: + +- **CampaignID** Campaign ID being run. +- **ClientID** Client ID being run. +- **CoordinatorVersion** Coordinator version of DTU. +- **CV** Correlation vector. +- **DeployPhase** Current Deploy Phase. + + +### Microsoft.Windows.DirectToUpdate.DTUCoordinatorSetCommitReadySuccess + +This event indicates that the Coordinator SetCommitReady call succeeded. + +The following fields are available: + +- **CampaignID** ID of the update campaign being run. +- **ClientID** ID of the client receiving the update. +- **CoordinatorVersion** Coordinator version of Direct to Update. +- **CV** Correlation vector. + + +### Microsoft.Windows.DirectToUpdate.DTUCoordinatorWaitForRebootUiNotShown + +This event indicates that the Coordinator WaitForRebootUi call succeeded. + +The following fields are available: + +- **CampaignID** Campaign ID being run. +- **ClientID** ID of the client receiving the update. +- **CoordinatorVersion** Coordinator version of Direct to Update. +- **CV** Correlation vector. +- **hResult** HRESULT of the failure. + + +### Microsoft.Windows.DirectToUpdate.DTUCoordinatorWaitForRebootUiSelection + +This event indicates that the user selected an option on the Reboot UI. + +The following fields are available: + +- **CampaignID** ID of the update campaign being run. +- **ClientID** ID of the client receiving the update. +- **CoordinatorVersion** Coordinator version of Direct to Update. +- **CV** Correlation vector. +- **rebootUiSelection** Selection on the Reboot UI. + + +### Microsoft.Windows.DirectToUpdate.DTUCoordinatorWaitForRebootUiSuccess + +This event indicates that the Coordinator WaitForRebootUi call succeeded. + +The following fields are available: + +- **CampaignID** ID of the update campaign being run. +- **ClientID** ID of the client receiving the update. +- **CoordinatorVersion** Coordinator version of Direct to Update. +- **CV** Correlation vector. + + +### Microsoft.Windows.DirectToUpdate.DTUHandlerCheckApplicabilityInternalGenericFailure + +This event indicates that we have received an unexpected error in the Direct to Update (DTU) Handler CheckApplicabilityInternal call. + +The following fields are available: + +- **CampaignID** ID of the campaign being run. +- **ClientID** ID of the client receiving the update. +- **CoordinatorVersion** Coordinator version of Direct to Update. +- **CV** Correlation vector. +- **hResult** HRESULT of the failure. + + +### Microsoft.Windows.DirectToUpdate.DTUHandlerCheckApplicabilityInternalSuccess + +This event indicates that the Handler CheckApplicabilityInternal call succeeded. + +The following fields are available: + +- **ApplicabilityResult** The result of the applicability check. +- **CampaignID** ID of the update campaign being run. +- **ClientID** ID of the client receiving the update. +- **CoordinatorVersion** Coordinator version of Direct to Update. +- **CV** Correlation vector. + + +### Microsoft.Windows.DirectToUpdate.DTUHandlerCheckApplicabilitySuccess + +This event indicates that the Handler CheckApplicability call succeeded. + +The following fields are available: + +- **ApplicabilityResult** The result code indicating whether the update is applicable. +- **CampaignID** ID of the update campaign being run. +- **ClientID** ID of the client receiving the update. +- **CoordinatorVersion** Coordinator version of Direct to Update. +- **CV** Correlation vector. +- **CV_new** New correlation vector. + + +### Microsoft.Windows.DirectToUpdate.DTUHandlerCheckIfCoordinatorMinApplicableVersionSuccess + +This event indicates that the Handler CheckIfCoordinatorMinApplicableVersion call succeeded. + +The following fields are available: + +- **CampaignID** ID of the update campaign being run. +- **CheckIfCoordinatorMinApplicableVersionResult** Result of CheckIfCoordinatorMinApplicableVersion function. +- **ClientID** ID of the client receiving the update. +- **CoordinatorVersion** Coordinator version of Direct to Update. +- **CV** Correlation vector. + + +### Microsoft.Windows.DirectToUpdate.DTUHandlerCommitGenericFailure + +This event indicates that we have received an unexpected error in the Direct to Update (DTU) Handler Commit call. + +The following fields are available: + +- **CampaignID** ID of the update campaign being run. +- **ClientID** ID of the client receiving the update. +- **CoordinatorVersion** Coordinator version of Direct to Update. +- **CV** Correlation vector. +- **CV_new** New correlation vector. +- **hResult** HRESULT of the failure. + + +### Microsoft.Windows.DirectToUpdate.DTUHandlerCommitSuccess + +This event indicates that the Handler Commit call succeeded. + +The following fields are available: + +- **CampaignID** ID of the update campaign being run.run +- **ClientID** ID of the client receiving the update. +- **CoordinatorVersion** Coordinator version of Direct to Update. +- **CV** Correlation vector. +- **CV_new** New correlation vector. + + +### Microsoft.Windows.DirectToUpdate.DTUHandlerDownloadAndExtractCabFailure + +This event indicates that the Handler Download and Extract cab call failed. + +The following fields are available: + +- **CampaignID** ID of the update campaign being run. +- **ClientID** ID of the client receiving the update. +- **CoordinatorVersion** Coordinator version of Direct to Update. +- **CV** Correlation vector. +- **DownloadAndExtractCabFunction_failureReason** Reason why the update download and extract process failed. +- **hResult** HRESULT of the failure. + + +### Microsoft.Windows.DirectToUpdate.DTUHandlerDownloadAndExtractCabSuccess + +This event indicates that the Handler Download and Extract cab call succeeded. + +The following fields are available: + +- **CampaignID** ID of the update campaign being run. +- **ClientID** ID of the client receiving the update. +- **CoordinatorVersion** Coordinator version of Direct to Update. +- **CV** Correlation vector. + + +### Microsoft.Windows.DirectToUpdate.DTUHandlerDownloadGenericFailure + +This event indicates that we have received an unexpected error in the Direct to Update (DTU) Handler Download call. + +The following fields are available: + +- **CampaignID** ID of the update campaign being run. +- **ClientID** ID of the client receiving the update. +- **CoordinatorVersion** Coordinator version of Direct to Update. +- **CV** Correlation vector. +- **hResult** HRESULT of the failure. + + +### Microsoft.Windows.DirectToUpdate.DTUHandlerDownloadSuccess + +This event indicates that the Handler Download call succeeded. + +The following fields are available: + +- **CampaignID** ID of the update campaign being run. +- **ClientID** ID of the client receiving the update. +- **CoordinatorVersion** Coordinator version of Direct to Update. +- **CV** Correlation vector. + + +### Microsoft.Windows.DirectToUpdate.DTUHandlerInitializeGenericFailure + +This event indicates that we have received an unexpected error in the Direct to Update (DTU) Handler Initialize call. + +The following fields are available: + +- **CampaignID** ID of the update campaign being run. +- **ClientID** ID of the client receiving the update. +- **CoordinatorVersion** Coordinator version of Direct to Update. +- **CV** Correlation vector. +- **DownloadAndExtractCabFunction_hResult** HRESULT of the download and extract. +- **hResult** HRESULT of the failure. + + +### Microsoft.Windows.DirectToUpdate.DTUHandlerInitializeSuccess + +This event indicates that the Handler Initialize call succeeded. + +The following fields are available: + +- **CampaignID** ID of the update campaign being run. +- **ClientID** ID of the client receiving the update. +- **CoordinatorVersion** Coordinator version of Direct to Update. +- **CV** Correlation vector. +- **DownloadAndExtractCabFunction_hResult** HRESULT of the download and extraction. + + +### Microsoft.Windows.DirectToUpdate.DTUHandlerInstallGenericFailure + +This event indicates that we have received an unexpected error in the Direct to Update (DTU) Handler Install call. + +The following fields are available: + +- **CampaignID** ID of the update campaign being run. +- **ClientID** ID of the client receiving the update. +- **CoordinatorVersion** Coordinator version of Direct to Update. +- **CV** Correlation vector. +- **hResult** HRESULT of the failure. + + +### Microsoft.Windows.DirectToUpdate.DTUHandlerInstallSuccess + +This event indicates that the Coordinator Install call succeeded. + +The following fields are available: + +- **CampaignID** ID of the update campaign being run. +- **ClientID** ID of the client receiving the update. +- **CoordinatorVersion** Coordinator version of Direct to Update. +- **CV** Correlation vector. + + +### Microsoft.Windows.DirectToUpdate.DTUHandlerSetCommitReadySuccess + +This event indicates that the Handler SetCommitReady call succeeded. + +The following fields are available: + +- **CampaignID** ID of the campaign being run. +- **ClientID** ID of the client receiving the update. +- **CoordinatorVersion** Coordinator version of Direct to Update. +- **CV** Correlation vector. + + +### Microsoft.Windows.DirectToUpdate.DTUHandlerWaitForRebootUiGenericFailure + +This event indicates that we have received an unexpected error in the Direct to Update (DTU) Handler WaitForRebootUi call. + +The following fields are available: + +- **CampaignID** The ID of the campaigning being run. +- **ClientID** ID of the client receiving the update. +- **CoordinatorVersion** Coordinator version of Direct to Update. +- **CV** Correlation vector. +- **hResult** The HRESULT of the failure. + + +### Microsoft.Windows.DirectToUpdate.DTUHandlerWaitForRebootUiSuccess + +This event indicates that the Handler WaitForRebootUi call succeeded. + +The following fields are available: + +- **CampaignID** ID of the campaign being run. +- **ClientID** ID of the client receiving the update. +- **CoordinatorVersion** Coordinator version of Direct to Update. +- **CV** Correlation vector. + + +## DxgKernelTelemetry events + +### DxgKrnlTelemetry.GPUAdapterInventoryV2 + +This event sends basic GPU and display driver information to keep Windows and display drivers up-to-date. + +The following fields are available: + +- **AdapterTypeValue** The numeric value indicating the type of Graphics adapter. +- **aiSeqId** The event sequence ID. +- **bootId** The system boot ID. +- **BrightnessVersionViaDDI** The version of the Display Brightness Interface. +- **ComputePreemptionLevel** The maximum preemption level supported by GPU for compute payload. +- **DedicatedSystemMemoryB** The amount of system memory dedicated for GPU use (in bytes). +- **DedicatedVideoMemoryB** The amount of dedicated VRAM of the GPU (in bytes). +- **DisplayAdapterLuid** The display adapter LUID. +- **DriverDate** The date of the display driver. +- **DriverRank** The rank of the display driver. +- **DriverVersion** The display driver version. +- **DX10UMDFilePath** The file path to the location of the DirectX 10 Display User Mode Driver in the Driver Store. +- **DX11UMDFilePath** The file path to the location of the DirectX 11 Display User Mode Driver in the Driver Store. +- **DX12UMDFilePath** The file path to the location of the DirectX 12 Display User Mode Driver in the Driver Store. +- **DX9UMDFilePath** The file path to the location of the DirectX 9 Display User Mode Driver in the Driver Store. +- **GPUDeviceID** The GPU device ID. +- **GPUPreemptionLevel** The maximum preemption level supported by GPU for graphics payload. +- **GPURevisionID** The GPU revision ID. +- **GPUVendorID** The GPU vendor ID. +- **InterfaceId** The GPU interface ID. +- **IsDisplayDevice** Does the GPU have displaying capabilities? +- **IsHwSchSupported** Indicates whether the adapter supports hardware scheduling. +- **IsHybridDiscrete** Does the GPU have discrete GPU capabilities in a hybrid device? +- **IsHybridIntegrated** Does the GPU have integrated GPU capabilities in a hybrid device? +- **IsLDA** Is the GPU comprised of Linked Display Adapters? +- **IsMiracastSupported** Does the GPU support Miracast? +- **IsMismatchLDA** Is at least one device in the Linked Display Adapters chain from a different vendor? +- **IsMPOSupported** Does the GPU support Multi-Plane Overlays? +- **IsMsMiracastSupported** Are the GPU Miracast capabilities driven by a Microsoft solution? +- **IsPostAdapter** Is this GPU the POST GPU in the device? +- **IsRemovable** TRUE if the adapter supports being disabled or removed. +- **IsRenderDevice** Does the GPU have rendering capabilities? +- **IsSoftwareDevice** Is this a software implementation of the GPU? +- **KMDFilePath** The file path to the location of the Display Kernel Mode Driver in the Driver Store. +- **MeasureEnabled** Is the device listening to MICROSOFT_KEYWORD_MEASURES? +- **MsHybridDiscrete** Indicates whether the adapter is a discrete adapter in a hybrid configuration. +- **NumVidPnSources** The number of supported display output sources. +- **NumVidPnTargets** The number of supported display output targets. +- **SharedSystemMemoryB** The amount of system memory shared by GPU and CPU (in bytes). +- **SubSystemID** The subsystem ID. +- **SubVendorID** The GPU sub vendor ID. +- **TelemetryEnabled** Is the device listening to MICROSOFT_KEYWORD_TELEMETRY? +- **TelInvEvntTrigger** What triggered this event to be logged? Example: 0 (GPU enumeration) or 1 (DxgKrnlTelemetry provider toggling) +- **version** The event version. +- **WDDMVersion** The Windows Display Driver Model version. + + +## Failover Clustering events + +### Microsoft.Windows.Server.FailoverClusteringCritical.ClusterSummary2 + +This event returns information about how many resources and of what type are in the server cluster. This data is collected to keep Windows Server safe, secure, and up to date. The data includes information about whether hardware is configured correctly, if the software is patched correctly, and assists in preventing crashes by attributing issues (like fatal errors) to workloads and system configurations. + +The following fields are available: + +- **autoAssignSite** The cluster parameter: auto site. +- **autoBalancerLevel** The cluster parameter: auto balancer level. +- **autoBalancerMode** The cluster parameter: auto balancer mode. +- **blockCacheSize** The configured size of the block cache. +- **ClusterAdConfiguration** The ad configuration of the cluster. +- **clusterAdType** The cluster parameter: mgmt_point_type. +- **clusterDumpPolicy** The cluster configured dump policy. +- **clusterFunctionalLevel** The current cluster functional level. +- **clusterGuid** The unique identifier for the cluster. +- **clusterWitnessType** The witness type the cluster is configured for. +- **countNodesInSite** The number of nodes in the cluster. +- **crossSiteDelay** The cluster parameter: CrossSiteDelay. +- **crossSiteThreshold** The cluster parameter: CrossSiteThreshold. +- **crossSubnetDelay** The cluster parameter: CrossSubnetDelay. +- **crossSubnetThreshold** The cluster parameter: CrossSubnetThreshold. +- **csvCompatibleFilters** The cluster parameter: ClusterCsvCompatibleFilters. +- **csvIncompatibleFilters** The cluster parameter: ClusterCsvIncompatibleFilters. +- **csvResourceCount** The number of resources in the cluster. +- **currentNodeSite** The name configured for the current site for the cluster. +- **dasModeBusType** The direct storage bus type of the storage spaces. +- **downLevelNodeCount** The number of nodes in the cluster that are running down-level. +- **drainOnShutdown** Specifies whether a node should be drained when it is shut down. +- **dynamicQuorumEnabled** Specifies whether dynamic Quorum has been enabled. +- **enforcedAntiAffinity** The cluster parameter: enforced anti affinity. +- **genAppNames** The win32 service name of a clustered service. +- **genSvcNames** The command line of a clustered genapp. +- **hangRecoveryAction** The cluster parameter: hang recovery action. +- **hangTimeOut** Specifies the “hang time out” parameter for the cluster. +- **isCalabria** Specifies whether storage spaces direct is enabled. +- **isMixedMode** Identifies if the cluster is running with different version of OS for nodes. +- **isRunningDownLevel** Identifies if the current node is running down-level. +- **logLevel** Specifies the granularity that is logged in the cluster log. +- **logSize** Specifies the size of the cluster log. +- **lowerQuorumPriorityNodeId** The cluster parameter: lower quorum priority node ID. +- **minNeverPreempt** The cluster parameter: minimum never preempt. +- **minPreemptor** The cluster parameter: minimum preemptor priority. +- **netftIpsecEnabled** The parameter: netftIpsecEnabled. +- **NodeCount** The number of nodes in the cluster. +- **nodeId** The current node number in the cluster. +- **nodeResourceCounts** Specifies the number of node resources. +- **nodeResourceOnlineCounts** Specifies the number of node resources that are online. +- **numberOfSites** The number of different sites. +- **numNodesInNoSite** The number of nodes not belonging to a site. +- **plumbAllCrossSubnetRoutes** The cluster parameter: plumb all cross subnet routes. +- **preferredSite** The preferred site location. +- **privateCloudWitness** Specifies whether a private cloud witness exists for this cluster. +- **quarantineDuration** The quarantine duration. +- **quarantineThreshold** The quarantine threshold. +- **quorumArbitrationTimeout** In the event of an arbitration event, this specifies the quorum timeout period. +- **resiliencyLevel** Specifies the level of resiliency. +- **resourceCounts** Specifies the number of resources. +- **resourceTypeCounts** Specifies the number of resource types in the cluster. +- **resourceTypes** Data representative of each resource type. +- **resourceTypesPath** Data representative of the DLL path for each resource type. +- **sameSubnetDelay** The cluster parameter: same subnet delay. +- **sameSubnetThreshold** The cluster parameter: same subnet threshold. +- **secondsInMixedMode** The amount of time (in seconds) that the cluster has been in mixed mode (nodes with different operating system versions in the same cluster). +- **securityLevel** The cluster parameter: security level. +- **securityLevelForStorage** The cluster parameter: security level for storage. +- **sharedVolumeBlockCacheSize** Specifies the block cache size for shared for shared volumes. +- **shutdownTimeoutMinutes** Specifies the amount of time it takes to time out when shutting down. +- **upNodeCount** Specifies the number of nodes that are up (online). +- **useClientAccessNetworksForCsv** The cluster parameter: use client access networks for CSV. +- **vmIsolationTime** The cluster parameter: VM isolation time. +- **witnessDatabaseWriteTimeout** Specifies the timeout period for writing to the quorum witness database. + + +## Fault Reporting events + +### Microsoft.Windows.FaultReporting.AppCrashEvent + +This event sends data about crashes for both native and managed applications, to help keep Windows up to date. The data includes information about the crashing process and a summary of its exception record. It does not contain any Watson bucketing information. The bucketing information is recorded in a Windows Error Reporting (WER) event that is generated when the WER client reports the crash to the Watson service, and the WER event will contain the same ReportID (see field 14 of crash event, field 19 of WER event) as the crash event for the crash being reported. AppCrash is emitted once for each crash handled by WER (e.g. from an unhandled exception or FailFast or ReportException). Note that Generic Watson event types (e.g. from PLM) that may be considered crashes\" by a user DO NOT emit this event. + +The following fields are available: + +- **AppName** The name of the app that has crashed. +- **AppSessionGuid** GUID made up of process ID and is used as a correlation vector for process instances in the telemetry backend. +- **AppTimeStamp** The date/time stamp of the app. +- **AppVersion** The version of the app that has crashed. +- **AsFatal** No content is currently available. +- **Exceptio** No content is currently available. +- **ExceptionCode** The exception code returned by the process that has crashed. +- **ExceptionOffset** The address where the exception had occurred. +- **Flags** Flags indicating how reporting is done. For example, queue the report, do not offer JIT debugging, or do not terminate the process after reporting. +- **FriendlyAppName** The description of the app that has crashed, if different from the AppName. Otherwise, the process name. +- **IsFatal** True/False to indicate whether the crash resulted in process termination. +- **ModName** Exception module name (e.g. bar.dll). +- **ModTimestamp** No content is currently available. +- **ModTimeStamp** The date/time stamp of the module. +- **ModVersion** The version of the module that has crashed. +- **ode** No content is currently available. +- **PackageFullName** Store application identity. +- **PackageRelativeAppId** Store application identity. +- **ProcessArchitecture** Architecture of the crashing process, as one of the PROCESSOR_ARCHITECTURE_* constants: 0: PROCESSOR_ARCHITECTURE_INTEL. 5: PROCESSOR_ARCHITECTURE_ARM. 9: PROCESSOR_ARCHITECTURE_AMD64. 12: PROCESSOR_ARCHITECTURE_ARM64. +- **ProcessCreateTime** The time of creation of the process that has crashed. +- **ProcessId** The ID of the process that has crashed. +- **ReportId** A GUID used to identify the report. This can used to track the report across Watson. +- **TargetAppId** The kernel reported AppId of the application being reported. +- **targetAppVer** No content is currently available. +- **TargetAppVer** The specific version of the application being reported +- **TargetAsId** The sequence number for the hanging process. + + +## Feature update events + +### Microsoft.Windows.Upgrade.Uninstall.UninstallFinalizedAndRebootTriggered + +This event indicates that the uninstall was properly configured and that a system reboot was initiated. + + + +### Microsoft.Windows.Upgrade.Uninstall.UninstallGoBackButtonClicked + +This event sends basic metadata about the starting point of uninstalling a feature update, which helps ensure customers can safely revert to a well-known state if the update caused any problems. + + + +## Hang Reporting events + +### Microsoft.Windows.HangReporting.AppHangEvent + +This event sends data about hangs for both native and managed applications, to help keep Windows up to date. It does not contain any Watson bucketing information. The bucketing information is recorded in a Windows Error Reporting (WER) event that is generated when the WER client reports the hang to the Watson service, and the WER event will contain the same ReportID (see field 13 of hang event, field 19 of WER event) as the hang event for the hang being reported. AppHang is reported only on PC devices. It handles classic Win32 hangs and is emitted only once per report. Some behaviors that may be perceived by a user as a hang are reported by app managers (e.g. PLM/RM/EM) as Watson Generics and will not produce AppHang events. + +The following fields are available: + +- **AppName** The name of the app that has hung. +- **AppSessionGuid** GUID made up of process id used as a correlation vector for process instances in the telemetry backend. +- **AppVersion** The version of the app that has hung. +- **IsFatal** True/False based on whether the hung application caused the creation of a Fatal Hang Report. +- **PackageFullName** Store application identity. +- **PackageRelativeAppId** Store application identity. +- **ProcessArchitecture** Architecture of the hung process, as one of the PROCESSOR_ARCHITECTURE_* constants: 0: PROCESSOR_ARCHITECTURE_INTEL. 5: PROCESSOR_ARCHITECTURE_ARM. 9: PROCESSOR_ARCHITECTURE_AMD64. 12: PROCESSOR_ARCHITECTURE_ARM64. +- **ProcessCreateTime** The time of creation of the process that has hung. +- **ProcessId** The ID of the process that has hung. +- **ReportId** A GUID used to identify the report. This can used to track the report across Watson. +- **TargetAppId** The kernel reported AppId of the application being reported. +- **TargetAppVer** The specific version of the application being reported. +- **TargetAsId** The sequence number for the hanging process. +- **TypeCode** Bitmap describing the hang type. +- **WaitingOnAppName** If this is a cross process hang waiting for an application, this has the name of the application. +- **WaitingOnAppVersion** If this is a cross process hang, this has the version of the application for which it is waiting. +- **WaitingOnPackageFullName** If this is a cross process hang waiting for a package, this has the full name of the package for which it is waiting. +- **WaitingOnPackageRelativeAppId** If this is a cross process hang waiting for a package, this has the relative application id of the package. + + +## Inventory events + +### Microsoft.Windows.Inventory.Core.AmiTelCacheChecksum + +This event captures basic checksum data about the device inventory items stored in the cache for use in validating data completeness for Microsoft.Windows.Inventory.Core events. The fields in this event may change over time, but they will always represent a count of a given object. + +The following fields are available: + +- **Device** A count of device objects in cache. +- **DeviceCensus** A count of device census objects in cache. +- **DriverPackageExtended** A count of driverpackageextended objects in cache. +- **File** A count of file objects in cache. +- **FileSigningInfo** A count of file signing objects in cache. +- **Generic** A count of generic objects in cache. +- **HwItem** A count of hwitem objects in cache. +- **IentoryMiscellaneousOfficeAddIn** No content is currently available. +- **InventoryApplication** A count of application objects in cache. +- **InventoryApplicationAppV** A count of application AppV objects in cache. +- **InventoryApplicationDriver** A count of application driver objects in cache +- **InventoryApplicationFile** A count of application file objects in cache. +- **InventoryApplicationFramework** A count of application framework objects in cache +- **InventoryApplicationShortcut** A count of application shortcut objects in cache +- **InventoryDeviceContainer** A count of device container objects in cache. +- **InventoryDeviceInterface** A count of Plug and Play device interface objects in cache. +- **InventoryDeviceMediaClass** A count of device media objects in cache. +- **InventoryDevicePnp** A count of device Plug and Play objects in cache. +- **InventoryDeviceUsbHubClass** A count of device usb objects in cache +- **InventoryDriverBinary** A count of driver binary objects in cache. +- **InventoryDriverPackage** A count of device objects in cache. +- **InventoryMiscellaneiscellaneousOfficeInsights** No content is currently available. +- **InventoryMiscellaneousOfficeAddIn** A count of office add-in objects in cache +- **InventoryMiscellaneousOfficeAddInUsage** A count of office add-in usage objects in cache. +- **InventoryMiscellaneousOfficeIdentifiers** A count of office identifier objects in cache +- **InventoryMiscellaneousOfficeIESettings** A count of office ie settings objects in cache +- **InventoryMiscellaneousOfficeInsights** A count of office insights objects in cache +- **InventoryMiscellaneousOfficeProducts** A count of office products objects in cache +- **InventoryMiscellaneousOfficeSettings** A count of office settings objects in cache +- **InventoryMiscellaneousOfficeVBA** A count of office vba objects in cache +- **InventoryMiscellaneousOfficeVBARuleViolations** A count of office vba rule violations objects in cache +- **InventoryMiscellaneousUUPInfo** A count of uup info objects in cache +- **Metadata** A count of metadata objects in cache. +- **Orphan** A count of orphan file objects in cache. +- **Programs** A count of program objects in cache. + + +### Microsoft.Windows.Inventory.Core.AmiTelCacheFileInfo + +Diagnostic data about the inventory cache. + +The following fields are available: + +- **CacheFileSize** Size of the cache. +- **InventoryVersion** Inventory version of the cache. +- **TempCacheCount** Number of temp caches created. +- **TempCacheDeletedCount** Number of temp caches deleted. + + +### Microsoft.Windows.Inventory.Core.AmiTelCacheVersions + +This event sends inventory component versions for the Device Inventory data. + +The following fields are available: + +- **aeinv** The version of the App inventory component. +- **devinv** The file version of the Device inventory component. + + +### Microsoft.Windows.Inventory.Core.InventoryApplicationAdd + +This event sends basic metadata about an application on the system to help keep Windows up to date. + +This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedeviceinventorychange). + +The following fields are available: + +- **HiddenArp** Indicates whether a program hides itself from showing up in ARP. +- **InstallDate** The date the application was installed (a best guess based on folder creation date heuristics). +- **InstallDateArpLastModified** The date of the registry ARP key for a given application. Hints at install date but not always accurate. Passed as an array. Example: 4/11/2015 00:00:00 +- **InstallDateFromLincFile** No content is currently available. +- **InstallDateFromLinkFile** The estimated date of install based on the links to the files. Passed as an array. +- **InstallDateMsi** The install date if the application was installed via Microsoft Installer (MSI). Passed as an array. +- **InventoryVersion** The version of the inventory file generating the events. +- **Language** The language code of the program. +- **MsipackageCode** No content is currently available. +- **MsiPackageCode** A GUID that describes the MSI Package. Multiple 'Products' (apps) can make up an MsiPackage. +- **MsiProductCode** A GUID that describe the MSI Product. +- **Name** The name of the application. +- **OSversionAtInstallTime** No content is currently available. +- **OSVersionAtInstallTime** The four octets from the OS version at the time of the application's install. +- **PackageFullName** The package full name for a Store application. +- **ProgramInstanceId** A hash of the file IDs in an app. +- **Publisher** The Publisher of the application. Location pulled from depends on the 'Source' field. +- **RootDirPath** The path to the root directory where the program was installed. +- **Source** How the program was installed (for example, ARP, MSI, Appx). +- **StoreAppType** A sub-classification for the type of Microsoft Store app, such as UWP or Win8StoreApp. +- **type** No content is currently available. +- **Type** One of ("Application", "Hotfix", "BOE", "Service", "Unknown"). Application indicates Win32 or Appx app, Hotfix indicates app updates (KBs), BOE indicates it's an app with no ARP or MSI entry, Service indicates that it is a service. Application and BOE are the ones most likely seen. +- **Version** The version number of the program. + + +### Microsoft.Windows.Inventory.Core.InventoryApplicationDriverAdd + +This event represents what drivers an application installs. + +This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedeviceinventorychange). + +The following fields are available: + +- **InventoryVersion** The version of the inventory component. +- **ProgramIds** The unique program identifier the driver is associated with. + + +### Microsoft.Windows.Inventory.Core.InventoryApplicationDriverStartSync + +The InventoryApplicationDriverStartSync event indicates that a new set of InventoryApplicationDriverStartAdd events will be sent. + +This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedeviceinventorychange). + +The following fields are available: + +- **InventoryVersion** The version of the inventory component. + + +### Microsoft.Windows.Inventory.Core.InventoryApplicationFrameworkAdd + +This event provides the basic metadata about the frameworks an application may depend on. + +This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedeviceinventorychange). + +The following fields are available: + +- **FileId** A hash that uniquely identifies a file. +- **Frameworks** The list of frameworks this file depends on. +- **InventoryVersion** The version of the inventory file generating the events. + + +### Microsoft.Windows.Inventory.Core.InventoryApplicationFrameworkStartSync + +This event indicates that a new set of InventoryApplicationFrameworkAdd events will be sent. + +This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedeviceinventorychange). + +The following fields are available: + +- **InventoryVersion** The version of the inventory file generating the events. + + +### Microsoft.Windows.Inventory.Core.InventoryApplicationRemove + +This event indicates that a new set of InventoryDevicePnpAdd events will be sent. + +This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedeviceinventorychange). + +The following fields are available: + +- **InventoryVersion** The version of the inventory file generating the events. + + +### Microsoft.Windows.Inventory.Core.InventoryApplicationStartSync + +This event indicates that a new set of InventoryApplicationAdd events will be sent. + +This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedeviceinventorychange). + +The following fields are available: + +- **InventoryVersion** The version of the inventory file generating the events. + + +### Microsoft.Windows.Inventory.Core.InventoryDeviceContainerAdd + +This event sends basic metadata about a device container (such as a monitor or printer as opposed to a Plug and Play device) to help keep Windows up to date. + +This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedeviceinventorychange). + +The following fields are available: + +- **Categories** A comma separated list of functional categories in which the container belongs. +- **DiscoveryMethod** The discovery method for the device container. +- **FriendlyName** The name of the device container. +- **InventoryVersion** The version of the inventory file generating the events. +- **IsActive** Is the device connected, or has it been seen in the last 14 days? +- **IsConnected** For a physically attached device, this value is the same as IsPresent. For wireless a device, this value represents a communication link. +- **IsMachineContainer** Is the container the root device itself? +- **IsNetworked** Is this a networked device? +- **IsPaired** Does the device container require pairing? +- **Manufacturer** The manufacturer name for the device container. +- **ModelId** A unique model ID. +- **ModelName** The model name. +- **ModelNumber** The model number for the device container. +- **PrimaryCategory** The primary category for the device container. + + +### Microsoft.Windows.Inventory.Core.InventoryDeviceContainerRemove + +This event indicates that the InventoryDeviceContainer object is no longer present. + +This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedeviceinventorychange). + +The following fields are available: + +- **InventoryVersion** The version of the inventory file generating the events. + + +### Microsoft.Windows.Inventory.Core.InventoryDeviceContainerStartSync + +This event indicates that a new set of InventoryDeviceContainerAdd events will be sent. + +This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedeviceinventorychange). + +The following fields are available: + +- **InventoryVersion** The version of the inventory file generating the events. + + +### Microsoft.Windows.Inventory.Core.InventoryDeviceInterfaceAdd + +This event retrieves information about what sensor interfaces are available on the device. + +This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedeviceinventorychange). + +The following fields are available: + +- **Accelerometer3D** Indicates if an Accelerator3D sensor is found. +- **ActivityDetection** Indicates if an Activity Detection sensor is found. +- **AmbientLight** Indicates if an Ambient Light sensor is found. +- **Barometer** Indicates if a Barometer sensor is found. +- **Custom** Indicates if a Custom sensor is found. +- **EnergyMeter** Indicates if an Energy sensor is found. +- **FloorElevation** Indicates if a Floor Elevation sensor is found. +- **GeomagneticOrientation** Indicates if a Geo Magnetic Orientation sensor is found. +- **GravityVector** Indicates if a Gravity Detector sensor is found. +- **Gyrometer3D** Indicates if a Gyrometer3D sensor is found. +- **Humidity** Indicates if a Humidity sensor is found. +- **InventoryVersion** The version of the inventory file generating the events. +- **LinearAccelerometer** Indicates if a Linear Accelerometer sensor is found. +- **Magnetometer3D** Indicates if a Magnetometer3D sensor is found. +- **Orientation** Indicates if an Orientation sensor is found. +- **Pedometer** Indicates if a Pedometer sensor is found. +- **Proximity** Indicates if a Proximity sensor is found. +- **RelativeOrientation** Indicates if a Relative Orientation sensor is found. +- **SimpleDeviceOrientation** Indicates if a Simple Device Orientation sensor is found. +- **Temperature** Indicates if a Temperature sensor is found. + + +### Microsoft.Windows.Inventory.Core.InventoryDeviceInterfaceStartSync + +This event indicates that a new set of InventoryDeviceInterfaceAdd events will be sent. + +This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedeviceinventorychange). + +The following fields are available: + +- **InventoryVersion** The version of the inventory file generating the events. + + +### Microsoft.Windows.Inventory.Core.InventoryDeviceMediaClassAdd + +This event sends additional metadata about a Plug and Play device that is specific to a particular class of devices to help keep Windows up to date while reducing overall size of data payload. + +This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedeviceinventorychange). + +The following fields are available: + +- **audio.captureDriver** Audio device capture driver. Example: hdaudio.inf:db04a16ce4e8d6ee:HdAudModel:10.0.14887.1000:hdaudio\func_01 +- **audio.renderDriver** Audio device render driver. Example: hdaudio.inf:db04a16ce4e8d6ee:HdAudModel:10.0.14889.1001:hdaudio\func_01 +- **Audio_CaptureDriver** The Audio device capture driver endpoint. +- **Audio_RenderDriver** The Audio device render driver endpoint. +- **InventoryVersion** The version of the inventory file generating the events. + + +### Microsoft.Windows.Inventory.Core.InventoryDeviceMediaClassRemove + +This event indicates that the InventoryDeviceMediaClassRemove object is no longer present. + +This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedeviceinventorychange). + +The following fields are available: + +- **InventoryVersion** The version of the inventory file generating the events. + + +### Microsoft.Windows.Inventory.Core.InventoryDeviceMediaClassStartSync + +This event indicates that a new set of InventoryDeviceMediaClassSAdd events will be sent. + +This event includes fields from [Ms.Device.De~iceInventoryChange](#msdevicede~iceinventorychange). + +The following fields are available: + +- **InventoryVersion** The version of the inventory file generating the events. + + +### Microsoft.Windows.Inventory.Core.InventoryDevicePnpAdd + +This event represents the basic metadata about a plug and play (PNP) device and its associated driver. + +This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedeviceinventorychange). + +The following fields are available: + +- **]pperClassFilters** No content is currently available. +- **basedata** No content is currently available. See [basedata](#basedata). +- **BusReportedDescraption** No content is currently available. +- **BusReportedDescription** The description of the device reported by the bux. +- **BusReptrtedDescription** No content is currently available. +- **Clas{Guid** No content is currently available. +- **Class** The device setup class of the driver loaded for the device. +- **ClassGuid** The device class unique identifier of the driver package loaded on the device. +- **COMPID** The list of “Compatible IDs” for this device. +- **Con|ainerId** No content is currently available. +- **ContainerId** The system-supplied unique identifier that specifies which group(s) the device(s) installed on the parent (main) device belong to. +- **Descriptaon** No content is currently available. +- **Description** The description of the device. +- **DeviceDriverFlightId** No content is currently available. +- **DeviceExtDriversFlightIds** No content is currently available. +- **DeviceInterfaceClasses** The device interfaces that this device implements. +- **DeviceState** Identifies the current state of the parent (main) device. +- **DriverAd** No content is currently available. +- **DriverId** The unique identifier for the installed driver. +- **DriverName** The name of the driver image file. +- **DriverPackageStrongName** The immediate parent directory name in the Directory field of InventoryDriverPackage. +- **DriverVer^ersion** No content is currently available. +- **DriverVerDate** The date associated with the driver installed on the device. +- **DriverVerVersion** The version number of the driver installed on the device. +- **Enumerator** Identifies the bus that enumerated the device. +- **ExtendedInfs** The extended INF file names. +- **FirstInstallDate** No content is currently available. +- **H_ID** No content is currently available. +- **HWID** A list of hardware IDs for the device. +- **Inf** The name of the INF file (possibly renamed by the OS, such as oemXX.inf). +- **InstallDate** No content is currently available. +- **InstallState** The device installation state. For a list of values, see: https://msdn.microsoft.com/en-us/library/windows/hardware/ff543130.aspx +- **InventoryVersion** The version number of the inventory process generating the events. +- **LowerClassFilters** The identifiers of the Lower Class filters installed for the device. +- **LowerFilters** The identifiers of the Lower filters installed for the device. +- **Manufacturer** The manufacturer of the device. +- **MatchangID** No content is currently available. +- **MatchingID** The Hardware ID or Compatible ID that Windows uses to install a device instance. +- **Modeh** No content is currently available. +- **Model** Identifies the model of the device. +- **ParentId** The Device Instance ID of the parent of the device. +- **ProblemCode** The error code currently returned by the device, if applicable. +- **ProblmmCode** No content is currently available. +- **Provider** Identifies the device provider. +- **Service** The name of the device service. +- **STACKID** The list of hardware IDs for the stack. +- **UpperClassFilters** The identifiers of the Upper Class filters installed for the device. +- **UpperFilters** The identifiers of the Upper filters installed for the device. +- **UpxerClassFilters** No content is currently available. + + +### Microsoft.Windows.Inventory.Core.InventoryDevicePnpRemove + +This event indicates that the InventoryDevicePnpRemove object is no longer present. + +This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedeviceinventorychange). + +The following fields are available: + +- **InventoryVersion** The version of the inventory file generating the events. + + +### Microsoft.Windows.Inventory.Core.InventoryDevicePnpStartSync + +This event indicates that a new set of InventoryDevicePnpAdd events will be sent. + +This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedeviceinventorychange). + +The following fields are available: + +- **InventoryVersion** The version of the inventory file generating the events. + + +### Microsoft.Windows.Inventory.Core.InventoryDeviceUsbHubClassAdd + +This event sends basic metadata about the USB hubs on the device. + +This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedeviceinventorychange). + +The following fields are available: + +- **InventoryVersion** The version of the inventory file generating the events. +- **TotalUserConnectablePorts** Total number of connectable USB ports. +- **TotalUserConnectableTypeCPorts** Total number of connectable USB Type C ports. + + +### Microsoft.Windows.Inventory.Core.InventoryDeviceUsbHubClassStartSync + +This event indicates that a new set of InventoryDeviceUsbHubClassAdd events will be sent. + +This event includes fields from [Ms.De~ice.DeviceInventoryChange](#msde~icedeviceinventorychange). + +The following fields are available: + +- **InventoryVersion** The version of the inventory file generating the events. + + +### Microsoft.Windows.Inventory.Core.InventoryDriverBinaryAdd + +This event provides the basic metadata about driver binaries running on the system. + +This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedeviceinventorychange). + +The following fields are available: + +- **DrivdrCompany** No content is currently available. +- **DriverCheckSum** The checksum of the driver file. +- **DriverCompany** The company name that developed the driver. +- **DriverInBox** Is the driver included with the operating system? +- **DriverIsKernelMode** Is it a kernel mode driver? +- **DriverName** The file name of the driver. +- **DriverPackageStrongName** The strong name of the driver package +- **DriverSigned** The strong name of the driver package +- **DriverTimeStamp** The low 32 bits of the time stamp of the driver file. +- **DriverType** A bitfield of driver attributes: 1. define DRIVER_MAP_DRIVER_TYPE_PRINTER 0x0001. 2. define DRIVER_MAP_DRIVER_TYPE_KERNEL 0x0002. 3. define DRIVER_MAP_DRIVER_TYPE_USER 0x0004. 4. define DRIVER_MAP_DRIVER_IS_SIGNED 0x0008. 5. define DRIVER_MAP_DRIVER_IS_INBOX 0x0010. 6. define DRIVER_MAP_DRIVER_IS_WINQUAL 0x0040. 7. define DRIVER_MAP_DRIVER_IS_SELF_SIGNED 0x0020. 8. define DRIVER_MAP_DRIVER_IS_CI_SIGNED 0x0080. 9. define DRIVER_MAP_DRIVER_HAS_BOOT_SERVICE 0x0100. 10. define DRIVER_MAP_DRIVER_TYPE_I386 0x10000. 11. define DRIVER_MAP_DRIVER_TYPE_IA64 0x20000. 12. define DRIVER_MAP_DRIVER_TYPE_AMD64 0x40000. 13. define DRIVER_MAP_DRIVER_TYPE_ARM 0x100000. 14. define DRIVER_MAP_DRIVER_TYPE_THUMB 0x200000. 15. define DRIVER_MAP_DRIVER_TYPE_ARMNT 0x400000. 16. define DRIVER_MAP_DRIVER_IS_TIME_STAMPED 0x800000. +- **DriverVersion** The version of the driver file. +- **ImageSize** The size of the driver file. +- **ImageSmze** No content is currently available. +- **Inf** The name of the INF file. +- **InventoryVersion** The version of the inventory file generating the events. +- **Product** The product name that is included in the driver file. +- **ProductVersion** The product version that is included in the driver file. +- **Service** The name of the service that is installed for the device. +- **WdfVersion** The Windows Driver Framework version. +- **WdfVers-on** No content is currently available. +- **WdfVersÿon** No content is currently available. + + +### Microsoft.Windows.Inventory.Core.InventoryDriverBinaryRemove + +This event indicates that the InventoryDriverBinary object is no longer present. + +This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedeviceinventorychange). + +The following fields are available: + +- **InventoryVersion** The version of the inventory file generating the events. + + +### Microsoft.Windows.Inventory.Core.InventoryDriverBinaryStartSync + +This event indicates that a new set of InventoryDriverBinaryAdd events will be sent. + +This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedeviceinventorychange). + +The following fields are available: + +- **InventoryVersion** The version of the inventory file generating the events. + + +### Microsoft.Windows.Inventory.Core.InventoryDriverPackageAdd + +This event sends basic metadata about drive packages installed on the system to help keep Windows up to date. + +This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedeviceinventorychange). + +The following fields are available: + +- **Class** The class name for the device driver. +- **ClassGuid** The class GUID for the device driver. +- **Date** The driver package date. +- **Directory** The path to the driver package. +- **DriverInBox** Is the driver included with the operating system? +- **Inf** The INF name of the driver package. +- **InventoryVersion** The version of the inventory file generating the events. +- **Provider** The provider for the driver package. +- **SubmissionId** The HLK submission ID for the driver package. +- **Version** The version of the driver package. + + +### Microsoft.Windows.Inventory.Core.InventoryDriverPackageRemove + +This event indicates that the InventoryDriverPackageRemove object is no longer present. + +This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedeviceinventorychange). + +The following fields are available: + +- **InventoryVersion** The version of the inventory file generating the events. + + +### Microsoft.Windows.Inventory.Core.InventoryDriverPackageStartSync + +This event indicates that a new set of InventoryDriverPackageAdd events will be sent. + +This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedeviceinventorychange). + +The following fields are available: + +- **InventoryVersion** The version of the inventory file generating the events. + + +### Microsoft.Windows.Inventory.Core.StartUtcJsonTrace + +This event collects traces of all other Core events, not used in typical customer scenarios. This event signals the beginning of the event download, and that tracing should begin. + + + +### Microsoft.Windows.Inventory.Core.StopUtcJsonTrace + +This event collects traces of all other Core events, not used in typical customer scenarios. This event signals the end of the event download, and that tracing should end. + + + +### Microsoft.Windows.Inventory.General.AppHealthStaticAdd + +This event sends details collected for a specific application on the source device. + +The following fields are available: + +- **AhaVersion** The binary version of the App Health Analyzer tool. +- **ApplicationErrors** The count of application errors from the event log. +- **Bitness** The architecture type of the application (16 Bit or 32 bit or 64 bit). +- **device_level** Various JRE/JAVA versions installed on a particular device. +- **ExtendedProperties** Attribute used for aggregating all other attributes under this event type. +- **Jar** Flag to determine if an app has a Java JAR file dependency. +- **Jre** Flag to determine if an app has JRE framework dependency. +- **Jre_version** JRE versions an app has declared framework dependency for. +- **Name** Name of the application. +- **NonDPIAware** Flag to determine if an app is non-DPI aware. +- **NumBinaries** Count of all binaries (.sys,.dll,.ini) from application install location. +- **RequiresAdmin** Flag to determine if an app requests admin privileges for execution. +- **RequiresAdminv2** Additional flag to determine if an app requests admin privileges for execution. +- **RequiresUIAccess** Flag to determine if an app is based on UI features for accessibility. +- **VB6** Flag to determine if an app is based on VB6 framework. +- **VB6v2** Additional flag to determine if an app is based on VB6 framework. +- **Version** Version of the application. +- **VersionCheck** Flag to determine if an app has a static dependency on OS version. +- **VersionCheckv2** Additional flag to determine if an app has a static dependency on OS version. + + +### Microsoft.Windows.Inventory.General.AppHealthStaticStartSync + +This event indicates the beginning of a series of AppHealthStaticAdd events. + +The following fields are available: + +- **AllowTelemetry** Indicates the presence of the 'allowtelemetry' command line argument. +- **CommandLineArgs** Command line arguments passed when launching the App Health Analyzer executable. +- **Enhanced** Indicates the presence of the 'enhanced' command line argument. +- **StartTime** UTC date and time at which this event was sent. + + +### Microsoft.Windows.Inventory.General.InventoryMiscellaneousOfficeAddInAdd + +Provides data on the installed Office Add-ins. + +This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedeviceinventorychange). + +The following fields are available: + +- **AddinCLSID** The class identifier key for the Microsoft Office add-in. +- **AddInCLSID** The class identifier key for the Microsoft Office add-in. +- **AddInId** The identifier for the Microsoft Office add-in. +- **AddinType** The type of the Microsoft Office add-in. +- **BinFileTimestamp** The timestamp of the Office add-in. +- **BinFileVersion** The version of the Microsoft Office add-in. +- **Description** Description of the Microsoft Office add-in. +- **FileId** The file identifier of the Microsoft Office add-in. +- **FileSize** The file size of the Microsoft Office add-in. +- **FriendlyName** The friendly name for the Microsoft Office add-in. +- **FullPath** The full path to the Microsoft Office add-in. +- **InventoryVersion** The version of the inventory binary generating the events. +- **LoadBehavior** Integer that describes the load behavior. +- **LoadTime** Load time for the Office add-in. +- **OfficeApplication** The Microsoft Office application associated with the add-in. +- **OfficeArchitecture** The architecture of the add-in. +- **OfficeVersion** The Microsoft Office version for this add-in. +- **OutlookCrashingAddin** Indicates whether crashes have been found for this add-in. +- **ProductCompany** The name of the company associated with the Office add-in. +- **ProductName** The product name associated with the Microsoft Office add-in. +- **ProductVersion** The version associated with the Office add-in. +- **ProgramId** The unique program identifier of the Microsoft Office add-in. +- **Provider** Name of the provider for this add-in. + + +### Microsoft.Windows.Inventory.General.InventoryMiscellaneousOfficeAddInRemove + +Indicates that this particular data object represented by the objectInstanceId is no longer present. + +This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedeviceinventorychange). + +The following fields are available: + +- **InventoryVersion** The version of the inventory binary generating the events. + + +### Microsoft.Windows.Inventory.General.InventoryMiscellaneousOfficeAddInStartSync + +This event indicates that a new sync is being generated for this object type. + +This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedeviceinventorychange). + +The following fields are available: + +- **InventoryVersion** The version of the inventory binary generating the events. + + +### Microsoft.Windows.Inventory.General.InventoryMiscellaneousOfficeIdentifiersAdd + +Provides data on the Office identifiers. + +This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedeviceinventorychange). + +The following fields are available: + +- **InventoryVersion** The version of the inventory binary generating the events. +- **OAudienceData** Sub-identifier for Microsoft Office release management, identifying the pilot group for a device +- **OAudienceId** Microsoft Office identifier for Microsoft Office release management, identifying the pilot group for a device +- **OMID** Identifier for the Office SQM Machine +- **OPlatform** Whether the installed Microsoft Office product is 32-bit or 64-bit +- **OTenantId** Unique GUID representing the Microsoft O365 Tenant +- **OVersion** Installed version of Microsoft Office. For example, 16.0.8602.1000 +- **OWowMID** Legacy Microsoft Office telemetry identifier (SQM Machine ID) for WoW systems (32-bit Microsoft Office on 64-bit Windows) + + +### Microsoft.Windows.Inventory.General.InventoryMiscellaneousOfficeIdentifiersStartSync + +Diagnostic event to indicate a new sync is being generated for this object type. + +This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedeviceinventorychange). + +The following fields are available: + +- **InventoryVersion** The version of the inventory binary generating the events. + + +### Microsoft.Windows.Inventory.General.InventoryMiscellaneousOfficeIESettingsAdd + +Provides data on Office-related Internet Explorer features. + +This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedeviceinventorychange). + +The following fields are available: + +- **InventoryVersion** The version of the inventory binary generating the events. +- **OIeFeatureAddon** Flag indicating which Microsoft Office products have this setting enabled. The FEATURE_ADDON_MANAGEMENT feature lets applications hosting the WebBrowser Control to respect add-on management selections made using the Add-on Manager feature of Internet Explorer. Add-ons disabled by the user or by administrative group policy will also be disabled in applications that enable this feature. +- **OIeMachineLockdown** Flag indicating which Microsoft Office products have this setting enabled. When the FEATURE_LOCALMACHINE_LOCKDOWN feature is enabled, Internet Explorer applies security restrictions on content loaded from the user's local machine, which helps prevent malicious behavior involving local files. +- **OIeMimeHandling** Flag indicating which Microsoft Office products have this setting enabled. When the FEATURE_MIME_HANDLING feature control is enabled, Internet Explorer handles MIME types more securely. Only applies to Windows Internet Explorer 6 for Windows XP Service Pack 2 (SP2) +- **OIeMimeSniffing** Flag indicating which Microsoft Office products have this setting enabled. Determines a file's type by examining its bit signature. Windows Internet Explorer uses this information to determine how to render the file. The FEATURE_MIME_SNIFFING feature, when enabled, allows to be set differently for each security zone by using the URLACTION_FEATURE_MIME_SNIFFING URL action flag +- **OIeNoAxInstall** Flag indicating which Microsoft Office products have this setting enabled. When a webpage attempts to load or install an ActiveX control that isn't already installed, the FEATURE_RESTRICT_ACTIVEXINSTALL feature blocks the request. When a webpage tries to load or install an ActiveX control that isn't already installed, the FEATURE_RESTRICT_ACTIVEXINSTALL feature blocks the request +- **OIeNoDownload** Flag indicating which Microsoft Office products have this setting enabled. The FEATURE_RESTRICT_FILEDOWNLOAD feature blocks file download requests that navigate to a resource, that display a file download dialog box, or that are not initiated explicitly by a user action (for example, a mouse click or key press). Only applies to Windows Internet Explorer 6 for Windows XP Service Pack 2 (SP2) +- **OIeObjectCaching** Flag indicating which Microsoft Office products have this setting enabled. When enabled, the FEATURE_OBJECT_CACHING feature prevents webpages from accessing or instantiating ActiveX controls cached from different domains or security contexts +- **OIePasswordDisable** Flag indicating which Microsoft Office products have this setting enabled. After Windows Internet Explorer 6 for Windows XP Service Pack 2 (SP2), Internet Explorer no longer allows usernames and passwords to be specified in URLs that use the HTTP or HTTPS protocols. URLs using other protocols, such as FTP, still allow usernames and passwords +- **OIeSafeBind** Flag indicating which Microsoft Office products have this setting enabled. The FEATURE_SAFE_BINDTOOBJECT feature performs additional safety checks when calling MonikerBindToObject to create and initialize Microsoft ActiveX controls. Specifically, prevent the control from being created if COMPAT_EVIL_DONT_LOAD is in the registry for the control +- **OIeSecurityBand** Flag indicating which Microsoft Office products have this setting enabled. The FEATURE_SECURITYBAND feature controls the display of the Internet Explorer Information bar. When enabled, the Information bar appears when file download or code installation is restricted +- **OIeUncSaveCheck** Flag indicating which Microsoft Office products have this setting enabled. The FEATURE_UNC_SAVEDFILECHECK feature enables the Mark of the Web (MOTW) for local files loaded from network locations that have been shared by using the Universal Naming Convention (UNC) +- **OIeValidateUrl** Flag indicating which Microsoft Office products have this setting enabled. When enabled, the FEATURE_VALIDATE_NAVIGATE_URL feature control prevents Windows Internet Explorer from navigating to a badly formed URL +- **OIeWebOcPopup** Flag indicating which Microsoft Office products have this setting enabled. The FEATURE_WEBOC_POPUPMANAGEMENT feature allows applications hosting the WebBrowser Control to receive the default Internet Explorer pop-up window management behavior +- **OIeWinRestrict** Flag indicating which Microsoft Office products have this setting enabled. When enabled, the FEATURE_WINDOW_RESTRICTIONS feature adds several restrictions to the size and behavior of popup windows +- **OIeZoneElevate** Flag indicating which Microsoft Office products have this setting enabled. When enabled, the FEATURE_ZONE_ELEVATION feature prevents pages in one zone from navigating to pages in a higher security zone unless the navigation is generated by the user + + +### Microsoft.Windows.Inventory.General.InventoryMiscellaneousOfficeIESettingsStartSync + +Diagnostic event to indicate a new sync is being generated for this object type. + +This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedeviceinventorychange). + +The following fields are available: + +- **InventoryVersion** The version of the inventory binary generating the events. + + +### Microsoft.Windows.Inventory.General.InventoryMiscellaneousOfficeInsightsAdd + +This event provides insight data on the installed Office products + +This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedeviceinventorychange). + +The following fields are available: + +- **InventoryVersion** The version of the inventory binary generating the events. +- **OfficeApplication** The name of the Office application. +- **OfficeArchitecture** The bitness of the Office application. +- **OfficeVersion** The version of the Office application. +- **Valóe** No content is currently available. +- **Value** The insights collected about this entity. + + +### Microsoft.Windows.Inventory.General.InventoryMiscellaneousOfficeInsightsRemove + +Indicates that this particular data object represented by the objectInstanceId is no longer present. + +This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedeviceinventorychange). + +The following fields are available: + +- **InventoryVersion** The version of the inventory binary generating the events. + + +### Microsoft.Windows.Inventory.General.InventoryMiscellaneousOfficeInsightsStartSync + +This diagnostic event indicates that a new sync is being generated for this object type. + +This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedeviceinventorychange). + +The following fields are available: + +- **InventoryVersion** The version of the inventory binary generating the events. + + +### Microsoft.Windows.Inventory.General.InventoryMiscellaneousOfficeProductsAdd + +Describes Office Products installed. + +This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedeviceinventorychange). + +The following fields are available: + +- **InventoryVersion** The version of the inventory binary generating the events. +- **OC2rApps** A GUID the describes the Office Click-To-Run apps +- **OC2rSkus** Comma-delimited list (CSV) of Office Click-To-Run products installed on the device. For example, Office 2016 ProPlus +- **OMsiApps** Comma-delimited list (CSV) of Office MSI products installed on the device. For example, Microsoft Word +- **OProductCodes** A GUID that describes the Office MSI products + + +### Microsoft.Windows.Inventory.General.InventoryMiscellaneousOfficeProductsStartSync + +Diagnostic event to indicate a new sync is being generated for this object type. + +This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedeviceinventorychange). + +The following fields are available: + +- **InventoryVersion** The version of the inventory binary generating the events. + + +### Microsoft.Windows.Inventory.General.InventoryMiscellaneousOfficeSettingsAdd + +This event describes various Office settings + +This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedeviceinventorychange). + +The following fields are available: + +- **BrowserFlags** Browser flags for Office-related products +- **ExchangeProviderFlags** Provider policies for Office Exchange +- **InventoryVersion** The version of the inventory binary generating the events. +- **SharedComputerLicensing** Office shared computer licensing policies + + +### Microsoft.Windows.Inventory.General.InventoryMiscellaneousOfficeSettingsStartSync + +Indicates a new sync is being generated for this object type. + +This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedeviceinventorychange). + +The following fields are available: + +- **InventoryVersion** The version of the inventory binary generating the events. + + +### Microsoft.Windows.Inventory.General.InventoryMiscellaneousOfficeVBAAdd + +This event provides a summary rollup count of conditions encountered while performing a local scan of Office files, analyzing for known VBA programmability compatibility issues between legacy office version and ProPlus, and between 32 and 64-bit versions + +This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedeviceinventorychange). + +The following fields are available: + +- **Design** Count of files with design issues found. +- **Design_x64** Count of files with 64 bit design issues found. +- **DuplicateVBA** Count of files with duplicate VBA code. +- **HasVBA** Count of files with VBA code. +- **Inaccessible** Count of files that were inaccessible for scanning. +- **InventoryVersion** The version of the inventory binary generating the events. +- **Issues** Count of files with issues detected. +- **Issues_x64** Count of files with 64-bit issues detected. +- **IssuesNone** Count of files with no issues detected. +- **IssuesNone_x64** Count of files with no 64-bit issues detected. +- **Locked** Count of files that were locked, preventing scanning. +- **NoVBA** Count of files with no VBA inside. +- **Protected** Count of files that were password protected, preventing scanning. +- **RemLimited** Count of files that require limited remediation changes. +- **RemLimited_x64** Count of files that require limited remediation changes for 64-bit issues. +- **RemSignificant** Count of files that require significant remediation changes. +- **RemSignificant_x64** Count of files that require significant remediation changes for 64-bit issues. +- **Score** Overall compatibility score calculated for scanned content. +- **Score_x64** Overall 64-bit compatibility score calculated for scanned content. +- **Total** Total number of files scanned. +- **Validation** Count of files that require additional manual validation. +- **Validation_x64** Count of files that require additional manual validation for 64-bit issues. + + +### Microsoft.Windows.Inventory.General.InventoryMiscellaneousOfficeVBARemove + +Indicates that this particular data object represented by the objectInstanceId is no longer present. + +This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedeviceinventorychange). + +The following fields are available: + +- **InventoryVersion** The version of the inventory binary generating the events. + + +### Microsoft.Windows.Inventory.General.InventoryMiscellaneousOfficeVBARuleViolationsAdd + +This event provides data on Microsoft Office VBA rule violations, including a rollup count per violation type, giving an indication of remediation requirements for an organization. The event identifier is a unique GUID, associated with the validation rule + +This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedeviceinventorychange). + +The following fields are available: + +- **Count** Count of total Microsoft Office VBA rule violations +- **InventoryVersion** The version of the inventory binary generating the events. + + +### Microsoft.Windows.Inventory.General.InventoryMiscellaneousOfficeVBARuleViolationsRemove + +Indicates that this particular data object represented by the objectInstanceId is no longer present. + +This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedeviceinventorychange). + +The following fields are available: + +- **InventoryVersion** The version of the inventory binary generating the events. + + +### Microsoft.Windows.Inventory.General.InventoryMiscellaneousOfficeVBARuleViolationsStartSync + +This event indicates that a new sync is being generated for this object type. + +This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedeviceinventorychange). + +The following fields are available: + +- **InventoryVersion** The version of the inventory binary generating the events. + + +### Microsoft.Windows.Inventory.General.InventoryMiscellaneousOfficeVBAStartSync + +Diagnostic event to indicate a new sync is being generated for this object type. + +This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedeviceinventorychange). + +The following fields are available: + +- **InventoryVersion** The version of the inventory binary generating the events. + + +### Microsoft.Windows.Inventory.General.InventoryMiscellaneousUUPInfoAdd + +Provides data on Unified Update Platform (UUP) products and what version they are at. + +This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedeviceinventorychange). + +The following fields are available: + +- **Identifier** UUP identifier +- **LastActivatedVersion** Last activated version +- **PreviousVersion** Previous version +- **Source** UUP source +- **Version** UUP version + + +### Microsoft.Windows.Inventory.General.InventoryMiscellaneousUUPInfoRemove + +Indicates that this particular data object represented by the objectInstanceId is no longer present. + +This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedeviceinventorychange). + + + +### Microsoft.Windows.Inventory.General.InventoryMiscellaneousUUPInfoStartSync + +Diagnostic event to indicate a new sync is being generated for this object type. + +This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedeviceinventorychange). + + + +### Microsoft.Windows.Inventory.Indicators.Checksum + +This event summarizes the counts for the InventoryMiscellaneousUexIndicatorAdd events. + +The following fields are available: + +- **CensusId** A unique hardware identifier. +- **ChecksumDictionary** A count of each operating system indicator. +- **PCFP** Equivalent to the InventoryId field that is found in other core events. + + +### Microsoft.Windows.Inventory.Indicators.InventoryMiscellaneousUexIndicatorAdd + +These events represent the basic metadata about the OS indicators installed on the system which are used for keeping the device up to date. + +This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedeviceinventorychange). + +The following fields are available: + +- **IndicatorValue** The indicator value. +- **Value** Describes an operating system indicator that may be relevant for the device upgrade. + + +### Microsoft.Windows.Inventory.Indicators.InventoryMiscellaneousUexIndicatorRemove + +This event is a counterpart to InventoryMiscellaneousUexIndicatorAdd that indicates that the item has been removed. + +This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedeviceinventorychange). + + + +### Microsoft.Windows.Inventory.Indicators.InventoryMiscellaneousUexIndicatorStartSync + +This event indicates that a new set of InventoryMiscellaneousUexIndicatorAdd events will be sent. + +This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedeviceinventorychange). + + + +## Kernel events + +### IO + +This event indicates the number of bytes read from or read by the OS and written to or written by the OS upon system startup. + +The following fields are available: + +- **BootAttemptCount** No content is currently available. +- **BootStatusPolicy** No content is currently available. +- **BootType** No content is currently available. +- **BytesRead** The total number of bytes read from or read by the OS upon system startup. +- **BytesWritten** The total number of bytes written to or written by the OS upon system startup. +- **FirmwareResetReasonEmbeddedController** No content is currently available. +- **FirmwareResetReasonEmbeddedControllerAdditional** No content is currently available. +- **FirmwareResetReasonPch** No content is currently available. +- **FirmwareResetReasonPchAdditional** No content is currently available. +- **FirmwareResetReasonSupplied** No content is currently available. +- **LastBootSucceeded** No content is currently available. +- **LastShutdownSucceeded** No content is currently available. +- **MeasuredLaunchResume** No content is currently available. +- **MenuPolicy** No content is currently available. +- **RecoveryEnabled** No content is currently available. +- **UserInputTime** No content is currently available. + + +### Microsoft.Windows.Kernel.BootEnvironment.OsLaunch + +OS information collected during Boot, used to evaluate the success of the upgrade process. + +The following fields are available: + +- **Boo|ApplicationId** No content is currently available. +- **BootApplicataonId** No content is currently available. +- **BootApplicationId** This field tells us what the OS Loader Application Identifier is. +- **BootAttemptCount** The number of consecutive times the boot manager has attempted to boot into this operating system. +- **BootSequence** The current Boot ID, used to correlate events related to a particular boot session. +- **BootStatusPolicy** Identifies the applicable Boot Status Policy. +- **BootType** Identifies the type of boot (e.g.: "Cold", "Hiber", "Resume"). +- **EventTimestamp** Seconds elapsed since an arbitrary time point. This can be used to identify the time difference in successive boot attempts being made. +- **FirmwareResetReasonEmbeddedController** Reason for system reset provided by firmware. +- **FirmwareResetReasonEmbeddedControllerAdditional** Additional information on system reset reason provided by firmware if needed. +- **FirmwareResetReasonPch** Reason for system reset provided by firmware. +- **FirmwareResetReasonPchAdditional** Additional information on system reset reason provided by firmware if needed. +- **FirmwareResetReasonSupplied** Flag indicating that a reason for system reset was provided by firmware. +- **IO** Amount of data written to and read from the disk by the OS Loader during boot. See [IO](#io). +- **LastBootSucceeded** Flag indicating whether the last boot was successful. +- **LastShutdownSucceeded** Flag indicating whether the last shutdown was successful. +- **MaxAbove4GbFreeRange** This field describes the largest memory range available above 4Gb. +- **MaxBelow4GbFreeRange** This field describes the largest memory range available below 4Gb. +- **MeasuredLaunchPrepared** This field tells us if the OS launch was initiated using Measured/Secure Boot over DRTM (Dynamic Root of Trust for Measurement). +- **MeasuredLaunchResume** This field tells us if Dynamic Root of Trust for Measurement (DRTM) was used when resuming from hibernation. +- **MenuPolicy** Type of advanced options menu that should be shown to the user (Legacy, Standard, etc.). +- **RecoveryEnabled** Indicates whether recovery is enabled. +- **SecureLaunchPrepared** This field indicates if DRTM was prepared during boot. +- **TcbLaunch** Indicates whether the Trusted Computing Base was used during the boot flow. +- **UserInputTime** The amount of time the loader application spent waiting for user input. + + +## Miracast events + +### Microsoft.Windows.Cast.Miracast.MiracastSessionEnd + +This event sends data at the end of a Miracast session that helps determine RTSP related Miracast failures along with some statistics about the session + +The following fields are available: + +- **AudioChannelCount** The number of audio channels. +- **AudioSampleRate** The sample rate of audio in terms of samples per second. +- **AudioSubtype** The unique subtype identifier of the audio codec (encoding method) used for audio encoding. +- **AverageBitrate** The average video bitrate used during the Miracast session, in bits per second. +- **AverageDataRate** The average available bandwidth reported by the WiFi driver during the Miracast session, in bits per second. +- **AveragePacketSendTimeInMs** The average time required for the network to send a sample, in milliseconds. +- **ConnectorType** The type of connector used during the Miracast session. +- **EncodeAverageTimeMS** The average time to encode a frame of video, in milliseconds. +- **EncodeCount** The count of total frames encoded in the session. +- **EncodeMaxTimeMS** The maximum time to encode a frame, in milliseconds. +- **EncodeMinTimeMS** The minimum time to encode a frame, in milliseconds. +- **EncoderCreationTimeInMs** The time required to create the video encoder, in milliseconds. +- **ErrorSource** Identifies the component that encountered an error that caused a disconnect, if applicable. +- **FirstFrameTime** The time (tick count) when the first frame is sent. +- **FirstLatencyMode** The first latency mode. +- **FrameAverageTimeMS** Average time to process an entire frame, in milliseconds. +- **FrameCount** The total number of frames processed. +- **FrameMaxTimeMS** The maximum time required to process an entire frame, in milliseconds. +- **FrameMinTimeMS** The minimum time required to process an entire frame, in milliseconds. +- **Glitches** The number of frames that failed to be delivered on time. +- **HardwareCursorEnabled** Indicates if hardware cursor was enabled when the connection ended. +- **HDCPState** The state of HDCP (High-bandwidth Digital Content Protection) when the connection ended. +- **HighestBitrate** The highest video bitrate used during the Miracast session, in bits per second. +- **HighestDataRate** The highest available bandwidth reported by the WiFi driver, in bits per second. +- **LastLatencyMode** The last reported latency mode. +- **LogTimeReference** The reference time, in tick counts. +- **LowestBitrate** The lowest video bitrate used during the Miracast session, in bits per second. +- **LowestDataRate** The lowest video bitrate used during the Miracast session, in bits per second. +- **MediaErrorCode** The error code reported by the media session, if applicable. +- **MiracastEntry** The time (tick count) when the Miracast driver was first loaded. +- **MiracastM1** The time (tick count) when the M1 request was sent. +- **MiracastM2** The time (tick count) when the M2 request was sent. +- **MiracastM3** The time (tick count) when the M3 request was sent. +- **MiracastM4** The time (tick count) when the M4 request was sent. +- **MiracastM5** The time (tick count) when the M5 request was sent. +- **MiracastM6** The time (tick count) when the M6 request was sent. +- **MiracastM7** The time (tick count) when the M7 request was sent. +- **MiracastSessionState** The state of the Miracast session when the connection ended. +- **MiracastStreaming** The time (tick count) when the Miracast session first started processing frames. +- **ProfileCount** The count of profiles generated from the receiver M4 response. +- **ProfileCountAfterFiltering** The count of profiles after filtering based on available bandwidth and encoder capabilities. +- **RefreshRate** The refresh rate set on the remote display. +- **RotationSupported** Indicates if the Miracast receiver supports display rotation. +- **RTSPSessionId** The unique identifier of the RTSP session. This matches the RTSP session ID for the receiver for the same session. +- **SessionGuid** The unique identifier of to correlate various Miracast events from a session. +- **SinkHadEdid** Indicates if the Miracast receiver reported an EDID. +- **SupportMicrosoftColorSpaceConversion** Indicates whether the Microsoft color space conversion for extra color fidelity is supported by the receiver. +- **SupportsMicrosoftDiagnostics** Indicates whether the Miracast receiver supports the Microsoft Diagnostics Miracast extension. +- **SupportsMicrosoftFormatChange** Indicates whether the Miracast receiver supports the Microsoft Format Change Miracast extension. +- **SupportsMicrosoftLatencyManagement** Indicates whether the Miracast receiver supports the Microsoft Latency Management Miracast extension. +- **SupportsMicrosoftRTCP** Indicates whether the Miracast receiver supports the Microsoft RTCP Miracast extension. +- **SupportsMicrosoftVideoFormats** Indicates whether the Miracast receiver supports Microsoft video format for 3:2 resolution. +- **SupportsWiDi** Indicates whether Miracast receiver supports Intel WiDi extensions. +- **TeardownErrorCode** The error code reason for teardown provided by the receiver, if applicable. +- **TeardownErrorReason** The text string reason for teardown provided by the receiver, if applicable. +- **UIBCEndState** Indicates whether UIBC was enabled when the connection ended. +- **UIBCEverEnabled** Indicates whether UIBC was ever enabled. +- **UIBCStatus** The result code reported by the UIBC setup process. +- **VideoBitrate** The starting bitrate for the video encoder. +- **VideoCodecLevel** The encoding level used for encoding, specific to the video subtype. +- **VideoHeight** The height of encoded video frames. +- **VideoSubtype** The unique subtype identifier of the video codec (encoding method) used for video encoding. +- **VideoWidth** The width of encoded video frames. +- **WFD2Supported** Indicates if the Miracast receiver supports WFD2 protocol. + + +## OneDrive events + +### Microsoft.OneDrive.Sync.Setup.APIOperation + +This event includes basic data about install and uninstall OneDrive API operations. + +The following fields are available: + +- **APIName** The name of the API. +- **Duration** How long the operation took. +- **IsSuccess** Was the operation successful? +- **ResultCode** The result code. +- **ScenarioName** The name of the scenario. + + +### Microsoft.OneDrive.Sync.Setup.EndExperience + +This event includes a success or failure summary of the installation. + +The following fields are available: + +- **APIName** The name of the API. +- **HResult** HResult of the operation +- **IsSuccess** Whether the operation is successful or not +- **ScenarioName** The name of the scenario. + + +### Microsoft.OneDrive.Sync.Setup.OSUpgradeInstallationOperation + +This event is related to the OS version when the OS is upgraded with OneDrive installed. + +The following fields are available: + +- **CurrentOneDriveVersion** The current version of OneDrive. +- **CurrentOSBuildBranch** The current branch of the operating system. +- **CurrentOSBuildNumber** The current build number of the operating system. +- **CurrentOSVersion** The current version of the operating system. +- **HResult** The HResult of the operation. +- **SourceOSBuildBranch** The source branch of the operating system. +- **SourceOSBuildNumber** The source build number of the operating system. +- **SourceOSVersion** The source version of the operating system. + + +### Microsoft.OneDrive.Sync.Setup.RegisterStandaloneUpdaterAPIOperation + +This event is related to registering or unregistering the OneDrive update task. + +The following fields are available: + +- **APIName** The name of the API. +- **IsSuccess** Was the operation successful? +- **RegisterNewTaskResult** The HResult of the RegisterNewTask operation. +- **ScenarioName** The name of the scenario. +- **UnregisterOldTaskResult** The HResult of the UnregisterOldTask operation. + + +### Microsoft.OneDrive.Sync.Updater.ComponentInstallState + +This event includes basic data about the installation state of dependent OneDrive components. + +The following fields are available: + +- **ComponentName** The name of the dependent component. +- **isInstalled** Is the dependent component installed? + + +### Microsoft.OneDrive.Sync.Updater.OverlayIconStatus + +This event indicates if the OneDrive overlay icon is working correctly. 0 = healthy; 1 = can be fixed; 2 = broken + +The following fields are available: + +- **32bit** The status of the OneDrive overlay icon on a 32-bit operating system. +- **64bit** The status of the OneDrive overlay icon on a 64-bit operating system. + + +### Microsoft.OneDrive.Sync.Updater.UpdateOverallResult + +This event sends information describing the result of the update. + +The following fields are available: + +- **br** No content is currently available. +- **hr** The HResult of the operation. +- **IsLoggingE~abled** No content is currently available. +- **IsLoggingEnabled** Indicates whether logging is enabled for the updater. +- **UpdaterVersion** The version of the updater. + + +### Microsoft.OneDrive.Sync.Updater.UpdateXmlDownloadHResult + +This event determines the status when downloading the OneDrive update configuration file. + +The following fields are available: + +- **hr** The HResult of the operation. + + +### Microsoft.OneDrive.Sync.Updater.WebConnectionStatus + +This event determines the error code that was returned when verifying Internet connectivity. + +The following fields are available: + +- **winInetError** The HResult of the operation. + + +## Privacy consent logging events + +### Microsoft.Windows.Shell.PrivacyConsentLogging.PrivacyConsentCompleted + +This event is used to determine whether the user successfully completed the privacy consent experience. + +The following fields are available: + +- **presentationVersion** Which display version of the privacy consent experience the user completed +- **privacyConsentState** The current state of the privacy consent experience +- **settingsVersion** Which setting version of the privacy consent experience the user completed +- **userOobeExitReason** The exit reason of the privacy consent experience + + +### Microsoft.Windows.Shell.PrivacyConsentLogging.PrivacyConsentStatus + +Event tells us effectiveness of new privacy experience. + +The following fields are available: + +- **isAdmin** whether the person who is logging in is an admin +- **isExistingUser** whether the account existed in a downlevel OS +- **isLaunching** Whether or not the privacy consent experience will be launched +- **isSilentElevation** whether the user has most restrictive UAC controls +- **privacyConsentState** whether the user has completed privacy experience +- **userRegionCode** The current user's region setting + + +### wilActivity + +This event provides a Windows Internal Library context used for Product and Service diagnostics. + +The following fields are available: + +- **callContext** The function where the failure occurred. +- **currentContextId** The ID of the current call context where the failure occurred. +- **currentContextMessage** The message of the current call context where the failure occurred. +- **currentContextName** The name of the current call context where the failure occurred. +- **failureCount** The number of failures for this failure ID. +- **failureId** The ID of the failure that occurred. +- **failureType** The type of the failure that occurred. +- **fileName** The file name where the failure occurred. +- **function** The function where the failure occurred. +- **hresult** The HResult of the overall activity. +- **lineNumber** The line number where the failure occurred. +- **message** The message of the failure that occurred. +- **module** The module where the failure occurred. +- **originatingContextId** The ID of the originating call context that resulted in the failure. +- **originatingContextMessage** The message of the originating call context that resulted in the failure. +- **originatingContextName** The name of the originating call context that resulted in the failure. +- **threadId** The ID of the thread on which the activity is executing. + + +## Sediment events + +### Microsoft.Windows.Sediment.Info.DetailedState + +This event is sent when detailed state information is needed from an update trial run. + +The following fields are available: + +- **Data** Data relevant to the state, such as what percent of disk space the directory takes up. +- **Id** Identifies the trial being run, such as a disk related trial. +- **ReleaseVer** The version of the component. +- **State** The state of the reporting data from the trial, such as the top-level directory analysis. +- **Time** The time the event was fired. + + +### Microsoft.Windows.Sediment.Info.Error + +This event indicates an error in the updater payload. This information assists in keeping Windows up to date. + +The following fields are available: + +- **FailureType** The type of error encountered. +- **FileName** The code file in which the error occurred. +- **HResult** The failure error code. +- **LineNumber** The line number in the code file at which the error occurred. +- **ReleaseVer** The version information for the component in which the error occurred. +- **Time** The system time at which the error occurred. + + +### Microsoft.Windows.Sediment.Info.PhaseChange + +The event indicates progress made by the updater. This information assists in keeping Windows up to date. + +The following fields are available: + +- **NewPhase** The phase of progress made. +- **ReleaseVer** The version information for the component in which the change occurred. +- **Time** The system time at which the phase chance occurred. + + +## Setup events + +### SetupPlatformTel.SetupPlatformTelActivityEvent + +This event sends basic metadata about the SetupPlatform update installation process, to help keep Windows up to date. + +The following fields are available: + +- **FieldName** Retrieves the event name/data point. Examples: InstallStartTime, InstallEndtime, OverallResult etc. +- **GroupName** Retrieves the groupname the event belongs to. Example: Install Information, DU Information, Disk Space Information etc. +- **Value** Value associated with the corresponding event name. For example, time-related events will include the system time + + +### SetupPlatformTel.SetupPlatformTelActivityStarted + +This event sends basic metadata about the update installation process generated by SetupPlatform to help keep Windows up to date. + +The following fields are available: + +- **Name** The name of the dynamic update type. Example: GDR driver + + +### SetupPlatformTel.SetupPlatformTelActivityStopped + +This event sends basic metadata about the update installation process generated by SetupPlatform to help keep Windows up to date. + + + +### SetupPlatformTel.SetupPlatformTelEvent + +This service retrieves events generated by SetupPlatform, the engine that drives the various deployment scenarios. + +The following fields are available: + +- **FieldName** Retrieves the event name/data point. Examples: InstallStartTime, InstallEndtime, OverallResult etc. +- **GroupName** Retrieves the groupname the event belongs to. Example: Install Information, DU Information, Disk Space Information etc. +- **Value** Retrieves the value associated with the corresponding event name (Field Name). For example: For time related events this will include the system time. + + +## Software update events + +### SoftwareUpdateClientTelemetry.CheckForUpdates + +Scan process event on Windows Update client. See the EventScenario field for specifics (started/failed/succeeded). + +The following fields are available: + +- **ActivityMatchingId** Contains a unique ID identifying a single CheckForUpdates session from initialization to completion. +- **AllowCachedResults** Indicates if the scan allowed using cached results. +- **ApplicableUpdateInfo** Metadata for the updates which were detected as applicable +- **BiosFamily** The family of the BIOS (Basic Input Output System). +- **BiosName** The name of the device BIOS. +- **BiosReleaseDate** The release date of the device BIOS. +- **BiosSKUNumber** The sku number of the device BIOS. +- **BIOSVendor** The vendor of the BIOS. +- **BiosVersion** The version of the BIOS. +- **BranchReadinessLevel** The servicing branch configured on the device. +- **CachedEngineVersion** For self-initiated healing, the version of the SIH engine that is cached on the device. If the SIH engine does not exist, the value is null. +- **CallerApplicationName** The name provided by the caller who initiated API calls into the software distribution client. +- **CapabilityDetectoidGuid** The GUID for a hardware applicability detectoid that could not be evaluated. +- **CDNCountryCode** Two letter country abbreviation for the Content Distribution Network (CDN) location. +- **CDNId** The unique identifier of a specific device, used to identify how many devices are encountering success or a particular issue. +- **ClientVersion** The version number of the software distribution client. +- **CommonProps** A bitmask for future flags associated with the Windows Update client behavior. No data is currently reported in this field. Expected value for this field is 0. +- **Context** Gives context on where the error has occurred. Example: AutoEnable, GetSLSData, AddService, Misc, or Unknown +- **CurrentMobileOperator** The mobile operator the device is currently connected to. +- **DeferralPolicySources** Sources for any update deferral policies defined (GPO = 0x10, MDM = 0x100, Flight = 0x1000, UX = 0x10000). +- **DeferredUpdates** Update IDs which are currently being deferred until a later time +- **DeviceModel** What is the device model. +- **DriverError** The error code hit during a driver scan. This is 0 if no error was encountered. +- **DriverExclusionPolicy** Indicates if the policy for not including drivers with Windows Update is enabled. +- **DriverGxclusionPolicy** No content is currently available. +- **DriverSyncPassPerformed** Were drivers scanned this time? +- **EventInstanceID** A globally unique identifier for event instance. +- **EventScenario** Indicates the purpose of sending this event - whether because the software distribution just started checking for content, or whether it was cancelled, succeeded, or failed. +- **ExtendedMetadataCabUrl** Hostname that is used to download an update. +- **ExtendedStatusCode** Secondary error code for certain scenarios where StatusCode wasn't specific enough. +- **FailedUpdateGuids** The GUIDs for the updates that failed to be evaluated during the scan. +- **FailedUpdatesCount** The number of updates that failed to be evaluated during the scan. +- **FeatureUpdateDeferral** The deferral period configured for feature OS updates on the device (in days). +- **FeatureUpdatePause** Indicates whether feature OS updates are paused on the device. +- **FeatureUpdatePause9-8iod** No content is currently available. +- **FeatureUpdatePausePeriod** The pause duration configured for feature OS updates on the device (in days). +- **FlightBranch** The branch that a device is on if participating in flighting (pre-release builds). +- **FlightRing** The ring (speed of getting builds) that a device is on if participating in flighting (pre-release builds). +- **HomeMobileOperator** The mobile operator that the device was originally intended to work with. +- **I#Version** No content is currently available. +- **IntentPFNs** Intended application-set metadata for atomic update scenarios. +- **IPVersion** Indicates whether the download took place over IPv4 or IPv6 +- **IsWUfBDualScanEnabled** Indicates if Windows Update for Business dual scan is enabled on the device. +- **IsWUfBDualScaninabled** No content is currently available. +- **IsWUfBEnabled** Indicates if Windows Update for Business is enabled on the device. +- **IsWUfBFederatedScanDisabled** Indicates if Windows Update for Business federated scan is disabled on the device. +- **IsWUfBinabled** No content is currently available. +- **MetadataIntegrityMode** The mode of the update transport metadata integrity check. 0-Unknown, 1-Ignoe, 2-Audit, 3-Enforce +- **MSIError** The last error that was encountered during a scan for updates. +- **NetworkConnectivityDetected** Indicates the type of network connectivity that was detected. 0 - IPv4, 1 - IPv6 +- **NumberOfApplicableUpdates** The number of updates which were ultimately deemed applicable to the system after the detection process is complete +- **NumberOfApplicationsCategoryScanEval}ated** No content is currently available. +- **NumberOfApplicationsCategoryScanEvaluated** The number of categories (apps) for which an app update scan checked +- **NumberOfLoop** The number of round trips the scan required +- **NumberOfNewUpdatesFromServiceSync** The number of updates which were seen for the first time in this scan +- **NumberOfUpdatesEvaluated** The total number of updates which were evaluated as a part of the scan +- **NumFailedMetadataSignatures** The number of metadata signatures checks which failed for new metadata synced down. +- **Online** Indicates if this was an online scan. +- **PausedUpdates** A list of UpdateIds which that currently being paused. +- **PauseFeatureUpdatesEndTime** If feature OS updates are paused on the device, this is the date and time for the end of the pause time window. +- **PauseFeatureUpdatesStartTime** If feature OS updates are paused on the device, this is the date and time for the beginning of the pause time window. +- **PauseQualityUpdatesEndTime** If quality OS updates are paused on the device, this is the date and time for the end of the pause time window. +- **PauseQualityUpdatesStartTime** If quality OS updates are paused on the device, this is the date and time for the beginning of the pause time window. +- **PhonePreviewEnabled** Indicates whether a phone was getting preview build, prior to flighting (pre-release builds) being introduced. +- **ProcessName** The process name of the caller who initiated API calls, in the event where CallerApplicationName was not provided. +- **QualityUpdateDeferral** The deferral period configured for quality OS updates on the device (in days). +- **QualityUpdatePause** Indicates whether quality OS updates are paused on the device. +- **QualityUpdatePause9-8iod** No content is currently available. +- **QualityUpdatePausePeriod** The pause duration configured for quality OS updates on the device (in days). +- **RelatedCV** The previous Correlation Vector that was used before swapping with a new one +- **S}ncType** No content is currently available. +- **ScanDuratioInSeconds** No content is currently available. +- **ScanDurationInSeconds** The number of seconds a scan took +- **ScanEnqueueTime** The number of seconds it took to initialize a scan +- **ScanPrps** No content is currently available. +- **ScanProps** This is a 32-bit integer containing Boolean properties for a given Windows Update scan. The following bits are used; all remaining bits are reserved and set to zero. Bit 0 (0x1): IsInteractive - is set to 1 if the scan is requested by a user, or 0 if the scan is requested by Automatic Updates. Bit 1 (0x2): IsSeeker - is set to 1 if the Windows Update client's Seeker functionality is enabled. Seeker functionality is enabled on certain interactive scans, and results in the scans returning certain updates that are in the initial stages of release (not yet released for full adoption via Automatic Updates). +- **ServiceGuid** An ID which represents which service the software distribution client is checking for content (Windows Update, Microsoft Store, etc.). +- **ServiceUrl** The environment URL a device is configured to scan with +- **ShippingMobileOperator** The mobile operator that a device shipped on. +- **StatusCode** Indicates the result of a CheckForUpdates event (success, cancellation, failure code HResult). +- **SyncType** Describes the type of scan the event was +- **SystemBIOSMajorRelease** Major version of the BIOS. +- **SystemBIOSMinorRelease** Minor version of the BIOS. +- **TargetMetadataVersion** For self-initiated healing, this is the target version of the SIH engine to download (if needed). If not, the value is null. +- **TotalNumMetadataSignatureM** No content is currently available. +- **TotalNumMetadataSignatures** The total number of metadata signatures checks done for new metadata that was synced down. +- **WebServiceRetryMethods** Web service method requests that needed to be retried to complete operation. +- **WUDeviceID** The unique identifier of a specific device, used to identify how many devices are encountering success or a particular issue. + + +### SoftwareUpdateClientTelemetry.Commit + +This event tracks the commit process post the update installation when software update client is trying to update the device. + +The following fields are available: + +- **BiosFamily** Device family as defined in the system BIOS +- **BiosName** Name of the system BIOS +- **BiosReleaseDate** Release date of the system BIOS +- **BiosSKUNumber** Device SKU as defined in the system BIOS +- **BIOSVendor** Vendor of the system BIOS +- **BiosVersion** Version of the system BIOS +- **BundleId** Identifier associated with the specific content bundle; should not be all zeros if the bundleID was found. +- **BundleRevisionNumber** Identifies the revision number of the content bundle +- **CallerApplicationName** Name provided by the caller who initiated API calls into the software distribution client +- **ClientVersion** Version number of the software distribution client +- **DeploymentProviderMode** The mode of operation of the update deployment provider. +- **DeviceModel** Device model as defined in the system bios +- **EventInstanceID** A globally unique identifier for event instance +- **EventScenario** Indicates the purpose of the event - whether because scan started, succeded, failed, etc. +- **EventType** Possible values are "Child", "Bundle", "Relase" or "Driver". +- **FlightId** The specific id of the flight the device is getting +- **HandlerType** Indicates the kind of content (app, driver, windows patch, etc.) +- **RevisionNumber** Identifies the revision number of this specific piece of content +- **ServiceGuid** A unique identifier for the service that the software distribution client is installing content for (Windows Update, Microsoft Store, etc). +- **SystemBIOSMajorRelease** Major release version of the system bios +- **SystemBIOSMinorRelease** Minor release version of the system bios +- **UpdateId** Identifier associated with the specific piece of content +- **WUDeviceID** Unique device id controlled by the software distribution client + + +### SoftwareUpdateClientTelemetry.Download + +Download process event for target update on Windows Update client. See the EventScenario field for specifics (started/failed/succeeded). + +The following fields are available: + +- **ActiveDownloadTime** How long the download took, in seconds, excluding time where the update wasn't actively being downloaded. +- **AppXBlockHashFailures** Indicates the number of blocks that failed hash validation during download of the app payload. +- **AppXBlockHashValidationFailureCount** A count of the number of blocks that have failed validation after being downloaded. +- **AppXDownloadScope** Indicates the scope of the download for application content. +- **AppXScope** Indicates the scope of the app download. +- **aundleBy1esDownl?aded** No content is currently available. +- **B1ndleRepeatFailCount** No content is currently available. +- **BiosFamily** The family of the BIOS (Basic Input Output System). +- **BiosName** The name of the device BIOS. +- **BiosReleaseDate** The release date of the device BIOS. +- **BiosSKUNumber** The sku number of the device BIOS. +- **BIOSVendor** The vendor of the BIOS. +- **BiosVersion** The version of the BIOS. +- **BundleBytesDownloaded** Number of bytes downloaded for the specific content bundle. +- **BundleId** Identifier associated with the specific content bundle. +- **BundleRepeatFailCount** Indicates whether this particular update bundle has previously failed. +- **BundleRepeatFailFlag** Indicates whether this particular update bundle previously failed to download. +- **BundleRevisionNumber** Identifies the revision number of the content bundle. +- **BytesDownloaded** Number of bytes that were downloaded for an individual piece of content (not the entire bundle). +- **CachedEngineVersion** The version of the “Self-Initiated Healing” (SIH) engine that is cached on the device, if applicable. +- **CallerApplicationName** The name provided by the application that initiated API calls into the software distribution client. +- **Cbs5ethod** No content is currently available. +- **CbsDownloadMethod** Indicates whether the download was a full- or a partial-file download. +- **CbsMethod** The method used for downloading the update content related to the Component Based Servicing (CBS) technology. +- **CDNCountryCode** Two letter country abbreviation for the Content Distribution Network (CDN) location. +- **CDNId** ID which defines which CDN the software distribution client downloaded the content from. +- **ClientVersion** The version number of the software distribution client. +- **CommonProps** A bitmask for future flags associated with the Windows Update client behavior. +- **ConnectTime** Indicates the cumulative amount of time (in seconds) it took to establish the connection for all updates in an update bundle. +- **CurrentMobileOperator** The mobile operator the device is currently connected to. +- **DeviceModel** The model of the device. +- **DownloadPriority** Indicates whether a download happened at background, normal, or foreground priority. +- **DownloadProps** Information about the download operation properties in the form of a bitmask. +- **DownloadType** Differentiates the download type of “Self-Initiated Healing” (SIH) downloads between Metadata and Payload downloads. +- **EventInstanceID** A globally unique identifier for event instance. +- **EventScenarao** No content is currently available. +- **EventScenario** Indicates the purpose for sending this event: whether because the software distribution just started downloading content; or whether it was cancelled, succeeded, or failed. +- **EventType** Identifies the type of the event (Child, Bundle, or Driver). +- **ExtendedStatusCode** Secondary error code for certain scenarios where StatusCode wasn't specific enough. +- **FeatureUpdatePause** Indicates whether feature OS updates are paused on the device. +- **FlightBranch** The branch that a device is on if participating in flighting (pre-release builds). +- **flightBuildNumber** No content is currently available. +- **FlightBuildNumber** If this download was for a flight (pre-release build), this indicates the build number of that flight. +- **FlightId** The specific ID of the flight (pre-release build) the device is getting. +- **FlightRing** The ring (speed of getting builds) that a device is on if participating in flighting (pre-release builds). +- **HandlerType** Indicates what kind of content is being downloaded (app, driver, windows patch, etc.). +- **HardwareId** If this download was for a driver targeted to a particular device model, this ID indicates the model of the device. +- **HomeMobileOperator** The mobile operator that the device was originally intended to work with. +- **HostName** The hostname URL the content is downloading from. +- **IPVersion** Indicates whether the download took place over IPv4 or IPv6. +- **IsDependentSet** Indicates whether a driver is a part of a larger System Hardware/Firmware Update +- **IsWUfBDualScanEnabled** Indicates if Windows Update for Business dual scan is enabled on the device. +- **IsWUfBEnabled** Indicates if Windows Update for Business is enabled on the device. +- **IsWVfBDualScanEnabled** No content is currently available. +- **IsWVfBEnabled** No content is currently available. +- **NetworkCost** A flag indicating the cost of the network (congested, fixed, variable, over data limit, roaming, etc.) used for downloading the update content. +- **NetworkCostBitMask** Indicates what kind of network the device is connected to (roaming, metered, over data cap, etc.) +- **NetworkRestrictionStatus** More general version of NetworkCostBitMask, specifying whether Windows considered the current network to be "metered." +- **PackageFullName** The package name of the content. +- **PhonePreviewEnabled** Indicates whether a phone was opted-in to getting preview builds, prior to flighting (pre-release builds) being introduced. +- **PostDnldTime** Time (in seconds) taken to signal download completion after the last job completed downloading the payload. +- **ProcessName** The process name of the application that initiated API calls, in the event where CallerApplicationName was not provided. +- **QualityUpdatePause** Indicates whether quality OS updates are paused on the device. +- **Reason** A 32-bit integer representing the reason the update is blocked from being downloaded in the background. +- **RegulationReason** The reason that the update is regulated +- **RegulationReóult** No content is currently available. +- **RegulationResult** The result code (HResult) of the last attempt to contact the regulation web service for download regulation of update content. +- **RelatedCV** The Correlation Vector that was used before the most recent change to a new Correlation Vector. +- **RelqtedCV** No content is currently available. +- **RepeatFailCount** Indicates whether this specific content has previously failed. +- **RepeatFailFlag** Indicates whether this specific content previously failed to download. +- **RevisionNumber** The revision number of the specified piece of content. +- **ServiceGuid** A unique identifier for the service that the software distribution client is installing content for (Windows Update, Microsoft Store, etc). +- **Setup360Phase** Identifies the active phase of the upgrade download if the current download is for an Operating System upgrade. +- **ShippingMobileOperator** The mobile operator linked to the device when the device shipped. +- **SizeCalcTime** Time (in seconds) taken to calculate the total download size of the payload. +- **StatusCode** Indicates the result of a Download event (success, cancellation, failure code HResult). +- **SystemBIOSMajorRelease** Major version of the BIOS. +- **SystemBIOSMinorRelease** Minor version of the BIOS. +- **TargetGroupId** For drivers targeted to a specific device model, this ID indicates the distribution group of devices receiving that driver. +- **TargetingVersion** For drivers targeted to a specific device model, this is the version number of the drivers being distributed to the device. +- **TargetMetadataVersion** The version of the currently downloading (or most recently downloaded) package. +- **ThrottlingServiceHResult** Result code (success/failure) while contacting a web service to determine whether this device should download content yet. +- **TimeToEstablishConnection** Time (in milliseconds) it took to establish the connection prior to beginning downloaded. +- **TotalEx8ectedBydes** No content is currently available. +- **TotalExpectedBytes** The total size (in Bytes) expected to be downloaded. +- **UpdateId** An identifier associated with the specific piece of content. +- **UpdateID** An identifier associated with the specific piece of content. +- **UpdateImportance** Indicates whether the content was marked as Important, Recommended, or Optional. +- **UsecDO** No content is currently available. +- **UsedDO** Indicates whether the download used the Delivery Optimization (DO) service. +- **UsedSystemVolume** Indicates whether the content was downloaded to the device's main system storage drive, or an alternate storage drive. +- **WUDeviceID** The unique identifier of a specific device, used to identify how many devices are encountering success or a particular issue. +- **YsWUfBEnabled** No content is currently available. + + +### SoftwareUpdateClientTelemetry.DownloadCheckpoint + +This event provides a checkpoint between each of the Windows Update download phases for UUP content + +The following fields are available: + +- **CallerApplicationName** The name provided by the caller who initiated API calls into the software distribution client +- **ClientVersion** The version number of the software distribution client +- **EventScenario** Indicates the purpose of sending this event - whether because the software distribution just started checking for content, or whether it was cancelled, succeeded, or failed +- **EventType** Possible values are "Child", "Bundle", "Relase" or "Driver" +- **ExtendedStatusCode** Secondary error code for certain scenarios where StatusCode wasn't specific enough +- **FileId** A hash that uniquely identifies a file +- **FileName** Name of the downloaded file +- **FlightId** The unique identifier for each flight +- **RelatedCV** The previous Correlation Vector that was used before swapping with a new one +- **RevisionNumber** Unique revision number of Update +- **ServiceGuid** An ID which represents which service the software distribution client is checking for content (Windows Update, Microsoft Store, etc.) +- **StatusCode** Indicates the result of a CheckForUpdates event (success, cancellation, failure code HResult) +- **UpdateId** Unique Update ID +- **WUDeviceID** The unique identifier of a specific device, used to identify how many devices are encountering success or a particular issue + + +### SoftwareUpdateClientTelemetry.DownloadHeartbeat + +This event allows tracking of ongoing downloads and contains data to explain the current state of the download + +The following fields are available: + +- **BytesTotal** Total bytes to transfer for this content +- **BytesTransferred** Total bytes transferred for this content at the time of heartbeat +- **CallerApplicationName** Name provided by the caller who initiated API calls into the software distribution client +- **ClientVersion** The version number of the software distribution client +- **ConnectionStatus** Indicates the connectivity state of the device at the time of heartbeat +- **CurrentError** Last (transient) error encountered by the active download +- **DownloadFlags** Flags indicating if power state is ignored +- **DownloadState** Current state of the active download for this content (queued, suspended, or progressing) +- **EventType** Possible values are "Child", "Bundle", or "Driver" +- **FlightId** The unique identifier for each flight +- **IsNetworkMetered** Indicates whether Windows considered the current network to be ?metered" +- **MOAppDownloadLimit** Mobile operator cap on size of application downloads, if any +- **MOUpdateDownloadLimit** Mobile operator cap on size of operating system update downloads, if any +- **PowerState** Indicates the power state of the device at the time of heartbeart (DC, AC, Battery Saver, or Connected Standby) +- **RelatedCV** The previous correlation vector that was used by the client, before swapping with a new one +- **ResumeCount** Number of times this active download has resumed from a suspended state +- **RevisionNumber** Identifies the revision number of this specific piece of content +- **ServiceGuid** Identifier for the service to which the software distribution client is connecting (Windows Update, Microsoft Store, etc) +- **SuspendCount** Number of times this active download has entered a suspended state +- **SuspendReason** Last reason for why this active download entered a suspended state +- **UpdateId** Identifier associated with the specific piece of content +- **WUDeviceID** Unique device id controlled by the software distribution client + + +### SoftwareUpdateClientTelemetry.Install + +This event sends tracking data about the software distribution client installation of the content for that update, to help keep Windows up to date. + +The following fields are available: + +- **BiosFamily** The family of the BIOS (Basic Input Output System). +- **BiosName** The name of the device BIOS. +- **BiosReleaseDate** The release date of the device BIOS. +- **BiosSKUNumber** The sku number of the device BIOS. +- **BIOSVendor** The vendor of the BIOS. +- **BiosVersion** The version of the BIOS. +- **BundleId** Identifier associated with the specific content bundle; should not be all zeros if the bundleID was found. +- **BundleRepeatFailCount** Indicates whether this particular update bundle has previously failed. +- **BundleRepeatFailFlag** Indicates whether this particular update bundle previously failed to install. +- **BundleRevisionNumber** Identifies the revision number of the content bundle. +- **CachedEngineVersion** For self-initiated healing, the version of the SIH engine that is cached on the device. If the SIH engine does not exist, the value is null. +- **CallerApplicationName** The name provided by the caller who initiated API calls into the software distribution client. +- **ClientVersion** The version number of the software distribution client. +- **CommonProps** A bitmask for future flags associated with the Windows Update client behavior. No value is currently reported in this field. Expected value for this field is 0. +- **CSIErrorType** The stage of CBS installation where it failed. +- **CurrentMobileOperator** The mobile operator to which the device is currently connected. +- **DeploymentProviderMode** The mode of operation of the update deployment provider. +- **DeviceModel** The device model. +- **DriverPingBack** Contains information about the previous driver and system state. +- **DriverRecoveryIds** The list of identifiers that could be used for uninstalling the drivers if a recovery is required. +- **EventInstanceID** A globally unique identifier for event instance. +- **EventScenario** Indicates the purpose of sending this event - whether because the software distribution just started installing content, or whether it was cancelled, succeeded, or failed. +- **EventType** Possible values are Child, Bundle, or Driver. +- **ExtendedErrorCode** The extended error code. +- **ExtendedStatusCode** Secondary error code for certain scenarios where StatusCode is not specific enough. +- **FeatureUpdatePause** Indicates whether feature OS updates are paused on the device. +- **FlightBranch** The branch that a device is on if participating in the Windows Insider Program. +- **FlightBuildNumber** If this installation was for a Windows Insider build, this is the build number of that build. +- **FlightId** The specific ID of the Windows Insider build the device is getting. +- **FlightRing** The ring that a device is on if participating in the Windows Insider Program. +- **HandlerType** Indicates what kind of content is being installed (for example, app, driver, Windows update). +- **HardwareId** If this install was for a driver targeted to a particular device model, this ID indicates the model of the device. +- **HomeMobileOperator** The mobile operator that the device was originally intended to work with. +- **InstallProps** A bitmask for future flags associated with the install operation. No value is currently reported in this field. Expected value for this field is 0. +- **IntentPFNs** Intended application-set metadata for atomic update scenarios. +- **IsDependentSet** Indicates whether the driver is part of a larger System Hardware/Firmware update. +- **IsFinalOutcomeEvent** Indicates whether this event signals the end of the update/upgrade process. +- **IsFirmware** Indicates whether this update is a firmware update. +- **IsSuccessFailurePostReboot** Indicates whether the update succeeded and then failed after a restart. +- **IsWUfBDualScanEnabled** Indicates whether Windows Update for Business dual scan is enabled on the device. +- **IsWUfBEnabled** Indicates whether Windows Update for Business is enabled on the device. +- **MergedUpdate** Indicates whether the OS update and a BSP update merged for installation. +- **MsiAction** The stage of MSI installation where it failed. +- **MsiProductCode** The unique identifier of the MSI installer. +- **PackageFullName** The package name of the content being installed. +- **PhonePreviewEnabled** Indicates whether a phone was getting preview build, prior to flighting being introduced. +- **ProcessName** The process name of the caller who initiated API calls, in the event that CallerApplicationName was not provided. +- **QualityUpdatePause** Indicates whether quality OS updates are paused on the device. +- **RelatedCV** The previous Correlation Vector that was used before swapping with a new one +- **RepeatFailCount** Indicates whether this specific piece of content has previously failed. +- **RepeatFailFlag** Indicates whether this specific piece of content previously failed to install. +- **RevisionNumber** The revision number of this specific piece of content. +- **ServiceGuid** An ID which represents which service the software distribution client is installing content for (Windows Update, Microsoft Store, etc.). +- **Setup360Phase** If the install is for an operating system upgrade, indicates which phase of the upgrade is underway. +- **ShippingMobileOperator** The mobile operator that a device shipped on. +- **StatusCode** Indicates the result of an installation event (success, cancellation, failure code HResult). +- **SystemBIOSMajorRelease** Major version of the BIOS. +- **SystemBIOSMinorRelease** Minor version of the BIOS. +- **TargetGroupId** For drivers targeted to a specific device model, this ID indicates the distribution group of devices receiving that driver. +- **Targeti~gVersion** No content is currently available. +- **TargetingVersion** For drivers targeted to a specific device model, this is the version number of the drivers being distributed to the device. +- **TransactionCode** The ID that represents a given MSI installation. +- **UpdateId** Unique update ID. +- **UpdateID** An identifier associated with the specific piece of content. +- **UpdateImportance** Indicates whether a piece of content was marked as Important, Recommended, or Optional. +- **UsedSystemVolume** Indicates whether the content was downloaded and then installed from the device's main system storage drive, or an alternate storage drive. +- **WUDeviceID** The unique identifier of a specific device, used to identify how many devices are encountering success or a particular issue. + + +### SoftwareUpdateClientTelemetry.Revert + +Revert event for target update on Windows Update Client. See EventScenario field for specifics (for example, Started/Failed/Succeeded). + +The following fields are available: + +- **BundleId** Identifier associated with the specific content bundle. Should not be all zeros if the BundleId was found. +- **BundleRepeatFailCount** Indicates whether this particular update bundle has previously failed. +- **BundleRevisionNumber** Identifies the revision number of the content bundle. +- **CallerApplicationName** Name of application making the Windows Update request. Used to identify context of request. +- **ClientVersion** Version number of the software distribution client. +- **CommonProps** A bitmask for future flags associated with the Windows Update client behavior. There is no value being reported in this field right now. Expected value for this field is 0. +- **CSIErrorType** Stage of CBS installation that failed. +- **DriverPingBack** Contains information about the previous driver and system state. +- **DriverRecoveryIds** The list of identifiers that could be used for uninstalling the drivers if a recovery is required. +- **EventInstanceID** A globally unique identifier for event instance. +- **EventScenario** Indicates the purpose of the event (scan started, succeeded, failed, etc.). +- **EventType** Event type (Child, Bundle, Release, or Driver). +- **ExtendedStatusCode** Secondary status code for certain scenarios where StatusCode is not specific enough. +- **FeatureUpdatePause** Indicates whether feature OS updates are paused on the device. +- **FlightBuildNumber** Indicates the build number of the flight. +- **FlightId** The specific ID of the flight the device is getting. +- **HandlerType** Indicates the kind of content (app, driver, windows patch, etc.). +- **HardwareId** If this download was for a driver targeted to a particular device model, this ID indicates the model of the device. +- **IsFinalOutcomeEvent** Indicates whether this event signals the end of the update/upgrade process. +- **IsFirmware** Indicates whether an update was a firmware update. +- **IsSuccessFailurePostReboot** Indicates whether an initial success was a failure after a reboot. +- **IsWUfBDualScanEnabled** Flag indicating whether WU-for-Business dual scan is enabled on the device. +- **IsWUfBEnabled** Flag indicating whether WU-for-Business is enabled on the device. +- **MergedUpdate** Indicates whether an OS update and a BSP update were merged for install. +- **ProcessName** Process name of the caller who initiated API calls into the software distribution client. +- **QualityUpdatePause** Indicates whether quality OS updates are paused on the device. +- **RelatedCV** The previous correlation vector that was used by the client before swapping with a new one. +- **RepeatFailCount** Indicates whether this specific piece of content has previously failed. +- **RevisionNumber** Identifies the revision number of this specific piece of content. +- **ServiceGuid** A unique identifier for the service that the software distribution client is installing content for (Windows Update, Microsoft Store, etc). +- **StatusCode** Result code of the event (success, cancellation, failure code HResult). +- **TargetGroupId** For drivers targeted to a specific device model, this ID indicates the distribution group of devices receiving that driver. +- **TargetingVersion** For drivers targeted to a specific device model, this is the version number of the drivers being distributed to the device. +- **UpdateId** The identifier associated with the specific piece of content. +- **UpdateImportance** Indicates the importance of a driver, and why it received that importance level (0-Unknown, 1-Optional, 2-Important-DNF, 3-Important-Generic, 4-Important-Other, 5-Recommended). +- **UsedSystemVolume** Indicates whether the device's main system storage drive or an alternate storage drive was used. +- **WUDeviceID** Unique device ID controlled by the software distribution client. + + +### SoftwareUpdateClientTelemetry.TaskRun + +Start event for Server Initiated Healing client. See EventScenario field for specifics (for example, started/completed). + +The following fields are available: + +- **CallerApplicationName** Name of application making the Windows Update request. Used to identify context of request. +- **ClientVersion** Version number of the software distribution client. +- **CmdLineArgs** Command line arguments passed in by the caller. +- **EventInstanceID** A globally unique identifier for the event instance. +- **EventScenario** Indicates the purpose of the event (scan started, succeeded, failed, etc.). +- **ServiceGuid** Identifier for the service to which the software distribution client is connecting (Windows Update, Microsoft Store, etc.). +- **StatusCode** Result code of the event (success, cancellation, failure code HResult). +- **WUDeviceID** Unique device ID controlled by the software distribution client. + + +### SoftwareUpdateClientTelemetry.Uninstall + +Uninstall event for target update on Windows Update Client. See EventScenario field for specifics (for example, Started/Failed/Succeeded). + +The following fields are available: + +- **BundleId** The identifier associated with the specific content bundle. This should not be all zeros if the bundleID was found. +- **BundleRepeatFailCount** Indicates whether this particular update bundle previously failed. +- **BundleRevisionNumber** Identifies the revision number of the content bundle. +- **CallerApplicationName** Name of the application making the Windows Update request. Used to identify context of request. +- **ClientVersion** Version number of the software distribution client. +- **CommonProps** A bitmask for future flags associated with the Windows Update client behavior. There is no value being reported in this field right now. Expected value for this field is 0. +- **DriverPingBack** Contains information about the previous driver and system state. +- **DriverRecoveryIds** The list of identifiers that could be used for uninstalling the drivers when a recovery is required. +- **EventInstanceID** A globally unique identifier for event instance. +- **EventScenario** Indicates the purpose of the event (a scan started, succeded, failed, etc.). +- **EventType** Indicates the event type. Possible values are "Child", "Bundle", "Release" or "Driver". +- **ExtendedStatusCode** Secondary status code for certain scenarios where StatusCode is not specific enough. +- **FeatureUpdatePause** Indicates whether feature OS updates are paused on the device. +- **FlightBuildNumber** Indicates the build number of the flight. +- **FlightId** The specific ID of the flight the device is getting. +- **HandlerType** Indicates the kind of content (app, driver, windows patch, etc.). +- **HardwareId** If the download was for a driver targeted to a particular device model, this ID indicates the model of the device. +- **IsFinalOutcomeEvent** Indicates whether this event signals the end of the update/upgrade process. +- **IsFirmware** Indicates whether an update was a firmware update. +- **IsSuccessFailurePostReboot** Indicates whether an initial success was then a failure after a reboot. +- **IsWUfBDualScanEnabled** Flag indicating whether WU-for-Business dual scan is enabled on the device. +- **IsWUfBEnabled** Flag indicating whether WU-for-Business is enabled on the device. +- **MergedUpdate** Indicates whether an OS update and a BSP update were merged for install. +- **ProcessName** Process name of the caller who initiated API calls into the software distribution client. +- **QualityUpdatePause** Indicates whether quality OS updates are paused on the device. +- **RelatedCV** The previous correlation vector that was used by the client before swapping with a new one. +- **RepeatFailCount** Indicates whether this specific piece of content previously failed. +- **RevisionNumber** Identifies the revision number of this specific piece of content. +- **ServiceGuid** A unique identifier for the service that the software distribution client is installing content for (Windows Update, Microsoft Store, etc). +- **StatusCode** Result code of the event (success, cancellation, failure code HResult). +- **TargetGroupId** For drivers targeted to a specific device model, this ID indicates the distribution group of devices receiving that driver. +- **TargetingVersion** For drivers targeted to a specific device model, this is the version number of the drivers being distributed to the device. +- **UpdateId** Identifier associated with the specific piece of content. +- **UpdateImportance** Indicates the importance of a driver and why it received that importance level (0-Unknown, 1-Optional, 2-Important-DNF, 3-Important-Generic, 4-Important-Other, 5-Recommended). +- **UsedSystemVolume** Indicates whether the device’s main system storage drive or an alternate storage drive was used. +- **WUDeviceID** Unique device ID controlled by the software distribution client. + + +### SoftwareUpdateClientTelemetry.UpdateDetected + +This event sends data about an AppX app that has been updated from the Microsoft Store, including what app needs an update and what version/architecture is required, in order to understand and address problems with apps getting required updates. + +The following fields are available: + +- **ApplicableUpdateInfo** Metadata for the updates which were detected as applicable. +- **CallerApplicationName** The name provided by the caller who initiated API calls into the software distribution client. +- **IntentPFNs** Intended application-set metadata for atomic update scenarios. +- **NumberOfA0plicableUpdates** No content is currently available. +- **NumberOfApplicableUpdates** The number of updates ultimately deemed applicable to the system after the detection process is complete. +- **RelatedCV** The previous Correlation Vector that was used before swapping with a new one. +- **ServiceGuid** An ID that represents which service the software distribution client is connecting to (Windows Update, Microsoft Store, etc.). +- **WUDeviceID** The unique device ID controlled by the software distribution client. + + +### SoftwareUpdateClientTelemetry.UpdateMetadataIntegrity + +Ensures Windows Updates are secure and complete. Event helps to identify whether update content has been tampered with and protects against man-in-the-middle attack. + +The following fields are available: + +- **CallerApplicationName** Name of application making the Windows Update request. Used to identify context of request. +- **EndpointUrl** URL of the endpoint where client obtains update metadata. Used to identify test vs staging vs production environments. +- **EventScenario** Indicates the purpose of the event - whether because scan started, succeded, failed, etc. +- **ExtendedStatusCode** Secondary status code for certain scenarios where StatusCode was not specific enough. +- **LeafCertId** The integral ID from the FragmentSigning data for the certificate that failed. +- **ListOfSHA256OfIntermediateCerData** A semicolon delimited list of base64 encoding of hashes for the Base64CerData in the FragmentSigning data of an intermediate certificate. +- **MetadataIntegrityMode** Mode of update transport metadata integrity check. 0-Unknown, 1-Ignoe, 2-Audit, 3-Enforce +- **MetadataSignature** A base64-encoded string of the signature associated with the update metadata (specified by revision ID). +- **RawMode** The raw unparsed mode string from the SLS response. This field is null if not applicable. +- **RawValidityWindowInDays** The raw unparsed validity window string in days of the timestamp token. This field is null if not applicable. +- **RevisionId** The revision ID for a specific piece of content. +- **RevisionNumber** The revision number for a specific piece of content. +- **ServiceGuid** Identifies the service to which the software distribution client is connected, Example: Windows Update or Microsoft Store +- **SHA256OfLeafCerData** A base64 encoding of the hash for the Base64CerData in the FragmentSigning data of the leaf certificate. +- **SHA256OfLeafCertPublicKey** A base64 encoding of the hash of the Base64CertData in the FragmentSigning data of the leaf certificate. +- **SHA256OfTimestampToken** An encoded string of the timestamp token. +- **SignatureAlgorithm** The hash algorithm for the metadata signature. +- **SLSPrograms** A test program a machine may be opted in. Examples include "Canary" and "Insider Fast". +- **StatusCode** Result code of the event (success, cancellation, failure code HResult) +- **TimestampTokenCertThumbprint** The thumbprint of the encoded timestamp token. +- **TimestampTokenId** The time this was created. It is encoded in a timestamp blob and will be zero if the token is malformed. +- **UpdateId** The update ID for a specific piece of content. +- **ValidityWindowInDays** The validity window that's in effect when verifying the timestamp. + + +## System Resource Usage Monitor events + +### Microsoft.Windows.Srum.Sdp.CpuUsage + +This event provides information on CPU usage. + +The following fields are available: + +- **UsageMax** The maximum of hourly average CPU usage. +- **UsageMean** The mean of hourly average CPU usage. +- **UsageMedian** The median of hourly average CPU usage. +- **UsageTwoHourMaxMean** The mean of the maximum of every two hour of hourly average CPU usage. +- **UsageTwoHourMedianMean** The mean of the median of every two hour of hourly average CPU usage. + + +### Microsoft.Windows.Srum.Sdp.NetworkUsage + +This event provides information on network usage. + +The following fields are available: + +- **AdapterGuid** The unique ID of the adapter. +- **BytesTotalMax** The maximum of the hourly average bytes total. +- **BytesTotalMean** The mean of the hourly average bytes total. +- **BytesTotalMedian** The median of the hourly average bytes total. +- **BytesTotalTwoHourMaxMean** The mean of the maximum of every two hours of hourly average bytes total. +- **BytesTotalTwoHourMedianMean** The mean of the median of every two hour of hourly average bytes total. +- **LinkSpeed** The adapter link speed. + + +## Update events + +### Update360Telemetry.Revert + +This event sends data relating to the Revert phase of updating Windows. + +The following fields are available: + +- **ErrorCode** The error code returned for the Revert phase. +- **FlightId** Unique ID for the flight (test instance version). +- **ObjectId** The unique value for each Update Agent mode. +- **RebootRequired** Indicates reboot is required. +- **RelatedCV** The correlation vector value generated from the latest USO (Update Service Orchestrator) scan. +- **Result** The HResult of the event. +- **RevertResult** The result code returned for the Revert operation. +- **ScenarioId** The ID of the update scenario. +- **SessionId** The ID of the update attempt. +- **UpdateId** The ID of the update. + + +### Update360Telemetry.UpdateAgentCommit + +This event collects information regarding the commit phase of the new Unified Update Platform (UUP) update scenario, which is leveraged by both Mobile and Desktop. + +The following fields are available: + +- **ErrorCode** The error code returned for the current install phase. +- **FlightId** Unique ID for each flight. +- **ObjectId** Unique value for each Update Agent mode. +- **RelatedCV** Correlation vector value generated from the latest USO scan. +- **Result** Outcome of the install phase of the update. +- **ScenarioId** Indicates the update scenario. +- **SessionId** Unique value for each update attempt. +- **UpdateId** Unique ID for each update. + + +### Update360Telemetry.UpdateAgentDownloadRequest + +This event sends data for the download request phase of updating Windows via the new Unified Update Platform (UUP) scenario. Applicable to PC and Mobile. + +The following fields are available: + +- **DeletedCorruptFiles** Boolean indicating whether corrupt payload was deleted. +- **DownloadRequests** Number of times a download was retried. +- **ErrorCode** The error code returned for the current download request phase. +- **ExtensionName** Indicates whether the payload is related to Operating System content or a plugin. +- **FlightId** Unique ID for each flight. +- **InternalFailureResult** Indicates a non-fatal error from a plugin. +- **ObjectId** Unique value for each Update Agent mode (same concept as InstanceId for Setup360). +- **PackageCategoriesSkipped** Indicates package categories that were skipped, if applicable. +- **PackageCCoegoriesSkipped** No content is currently available. +- **PackageCountOptional** Number of optional packages requested. +- **PackageCountRequired** Number of required packages requested. +- **PackageCountTotal** Total number of packages needed. +- **PackageCountTotalCanonical** Total number of canonical packages. +- **PackageCountTotalDiff** Total number of diff packages. +- **PackageCountTotalExpress** Total number of express packages. +- **PackageCountTotalPSFX** The total number of PSFX packages. +- **PackageExpressType** Type of express package. +- **PackageSizeCanonical** Size of canonical packages in bytes. +- **PackageSizeDiff** Size of diff packages in bytes. +- **PackageSizeExpress** Size of express packages in bytes. +- **PackageSizePSFX** The size of PSFX packages, in bytes. +- **RangeRequestSsCoe** No content is currently available. +- **RangeRequestState** Indicates the range request type used. +- **RelatedCV** Correlation vector value generated from the latest USO scan. +- **Result** Outcome of the download request phase of update. +- **SandboxTaggedForReserves** The sandbox for reserves. +- **ScenarioId** Indicates the update scenario. +- **SessionId** Unique value for each attempt (same value for initialize, download, install commit phases). +- **UpdateId** Unique ID for each update. + + +### Update360Telemetry.UpdateAgentExpand + +This event collects information regarding the expansion phase of the new Unified Update Platform (UUP) update scenario, which is leveraged by both Mobile and Desktop. + +The following fields are available: + +- **ElapsedTickCount** Time taken for expand phase. +- **EndFreeSpace** Free space after expand phase. +- **EndSandboxSize** Sandbox size after expand phase. +- **ErrorCode** The error code returned for the current install phase. +- **FlightId** Unique ID for each flight. +- **ObjectId** Unique value for each Update Agent mode. +- **RelatedCV** Correlation vector value generated from the latest USO scan. +- **ScenarioId** Indicates the update scenario. +- **SessionId** Unique value for each update attempt. +- **StartFreeSpace** Free space before expand phase. +- **StartSandboxSize** Sandbox size after expand phase. +- **UpdateId** Unique ID for each update. + + +### Update360Telemetry.UpdateAgentFellBackToCanonical + +This event collects information when express could not be used and we fall back to canonical during the new Unified Update Platform (UUP) update scenario, which is leveraged by both Mobile and Desktop. + +The following fields are available: + +- **FlightId** Unique ID for each flight. +- **ObjectId** Unique value for each Update Agent mode. +- **PackageCount** Number of packages that feel back to canonical. +- **PackageList** PackageIds which fell back to canonical. +- **RelatedCV** Correlation vector value generated from the latest USO scan. +- **ScenarioId** Indicates the update scenario. +- **SessionId** Unique value for each update attempt. +- **UpdateId** Unique ID for each update. + + +### Update360Telemetry.UpdateAgentInitialize + +This event sends data for the initialize phase of updating Windows via the new Unified Update Platform (UUP) scenario, which is applicable to both PCs and Mobile. + +The following fields are available: + +- **ErrorCode** The error code returned for the current install phase. +- **FlightId** Unique ID for each flight. +- **FlightMetadata** Contains the FlightId and the build being flighted. +- **ObjectId** Unique value for each Update Agent mode. +- **RelatedCV** Correlation vector value generated from the latest USO scan. +- **Result** Outcome of the install phase of the update. +- **ScenarioId** Indicates the update scenario. +- **SessionData** String containing instructions to update agent for processing FODs and DUICs (Null for other scenarios). +- **SessionId** Unique value for each update attempt. +- **UpdateId** Unique ID for each update. + + +### Update360Telemetry.UpdateAgentInstall + +This event sends data for the install phase of updating Windows. + +The following fields are available: + +- **ErrorCode** The error code returned for the current install phase. +- **ExtensionName** Indicates whether the payload is related to Operating System content or a plugin. +- **FlightId** Unique value for each Update Agent mode (same concept as InstanceId for Setup360). +- **InternalFailureResult** Indicates a non-fatal error from a plugin. +- **ObjectId** Correlation vector value generated from the latest USO scan. +- **RelatedCV** Correlation vector value generated from the latest USO scan. +- **Result** The result for the current install phase. +- **ScenarioId** Indicates the update scenario. +- **SessionId** Unique value for each update attempt. +- **UpdateId** Unique ID for each update. + + +### Update360Telemetry.UpdateAgentMerge + +The UpdateAgentMerge event sends data on the merge phase when updating Windows. + +The following fields are available: + +- **ErrorCode** The error code returned for the current merge phase. +- **FlightId** Unique ID for each flight. +- **MergeId** The unique ID to join two update sessions being merged. +- **ObjectId** Unique value for each Update Agent mode. +- **RelatedCV** Related correlation vector value. +- **Result** Outcome of the merge phase of the update. +- **ScenarioId** Indicates the update scenario. +- **SessionId** Unique value for each attempt. +- **UpdateId** Unique ID for each update. + + +### Update360Telemetry.UpdateAgentMitigationResult + +This event sends data indicating the result of each update agent mitigation. + +The following fields are available: + +- **Applicable** Indicates whether the mitigation is applicable for the current update. +- **CommandCount** The number of command operations in the mitigation entry. +- **CustomCount** The number of custom operations in the mitigation entry. +- **FileCount** The number of file operations in the mitigation entry. +- **FlightId** Unique identifier for each flight. +- **Index** The mitigation index of this particular mitigation. +- **MitigationScenario** The update scenario in which the mitigation was executed. +- **Name** The friendly name of the mitigation. +- **ObjectId** Unique value for each Update Agent mode. +- **OperationIndex** The mitigation operation index (in the event of a failure). +- **OperationName** The friendly name of the mitigation operation (in the event of failure). +- **RegistryCount** The number of registry operations in the mitigation entry. +- **RelatedCV** The correlation vector value generated from the latest USO scan. +- **Result** The HResult of this operation. +- **ScenarioId** The update agent scenario ID. +- **SessionId** Unique value for each update attempt. +- **TimeDiff** The amount of time spent performing the mitigation (in 100-nanosecond increments). +- **UpdateId** Unique ID for each Update. + + +### Update360Telemetry.UpdateAgentMitigationSummary + +This event sends a summary of all the update agent mitigations available for an this update. + +The following fields are available: + +- **Applicable** The count of mitigations that were applicable to the system and scenario. +- **Failed** The count of mitigations that failed. +- **FlightId** Unique identifier for each flight. +- **MitigationScenario** The update scenario in which the mitigations were attempted. +- **ObjectId** The unique value for each Update Agent mode. +- **RelatedCV** The correlation vector value generated from the latest USO scan. +- **Result** The HResult of this operation. +- **ScenarioId** The update agent scenario ID. +- **SessionId** Unique value for each update attempt. +- **TimeDiff** The amount of time spent performing all mitigations (in 100-nanosecond increments). +- **Total** Total number of mitigations that were available. +- **UpdateId** Unique ID for each update. + + +### Update360Telemetry.UpdateAgentModeStart + +This event sends data for the start of each mode during the process of updating Windows via the new Unified Update Platform (UUP) scenario. Applicable to both PCs and Mobile. + +The following fields are available: + +- **FlightId** Unique ID for each flight. +- **Mode** Indicates the mode that has started. +- **ObjectId** Unique value for each Update Agent mode. +- **RelatedCV** Correlation vector value generated from the latest USO scan. +- **ScenarioId** Indicates the update scenario. +- **SessionId** Unique value for each update attempt. +- **UpdateId** Unique ID for each update. +- **Version** Version of update + + +### Update360Telemetry.UpdateAgentOneSettings + +This event collects information regarding the post reboot phase of the new UUP (Unified Update Platform) update scenario; which is leveraged by both Mobile and Desktop. + +The following fields are available: + +- **Count** The count of applicable OneSettings for the device. +- **FlightId** Unique ID for the flight (test instance version). +- **ObjectId** The unique value for each Update Agent mode. +- **Parameters** The set of name value pair parameters sent to OneSettings to determine if there are any applicable OneSettings. +- **RelatedCV** The correlation vector value generated from the latest USO (Update Service Orchestrator) scan. +- **Result** The HResult of the event. +- **ScenarioId** The ID of the update scenario. +- **SessionId** The ID of the update attempt. +- **UpdateId** The ID of the update. +- **Values** The values sent back to the device, if applicable. + + +### Update360Telemetry.UpdateAgentPostRebootResult + +This event collects information for both Mobile and Desktop regarding the post reboot phase of the new Unified Update Platform (UUP) update scenario. + +The following fields are available: + +- **ErrorCode** The error code returned for the current post reboot phase. +- **FlightId** The specific ID of the Windows Insider build the device is getting. +- **ObjectId** Unique value for each Update Agent mode. +- **PostRebootResult** Indicates the Hresult. +- **RelatedCV** Correlation vector value generated from the latest USO scan. +- **ScenarioId** The scenario ID. Example: MobileUpdate, DesktopLanguagePack, DesktopFeatureOnDemand, or DesktopDriverUpdate. +- **SessionId** Unique value for each update attempt. +- **UpdateId** Unique ID for each update. + + +### Update360Telemetry.UpdateAgentReboot + +This event sends information indicating that a request has been sent to suspend an update. + +The following fields are available: + +- **ErrorCode** The error code returned for the current reboot. +- **FlightId** Unique ID for the flight (test instance version). +- **ObjectId** The unique value for each Update Agent mode. +- **RelatedCV** The correlation vector value generated from the latest USO (Update Service Orchestrator) scan. +- **Result** The HResult of the event. +- **ScenarioId** The ID of the update scenario. +- **SessionId** The ID of the update attempt. +- **UpdateId** The ID of the update. + + +### Update360Telemetry.UpdateAgentSetupBoxLaunch + +The UpdateAgent_SetupBoxLaunch event sends data for the launching of the setup box when updating Windows via the new Unified Update Platform (UUP) scenario. This event is only applicable to PCs. + +The following fields are available: + +- **ContainsExpressPackage** Indicates whether the download package is express. +- **FlightId** Unique ID for each flight. +- **FreeSpace** Free space on OS partition. +- **InstallCount** Number of install attempts using the same sandbox. +- **ObjectId** Unique value for each Update Agent mode. +- **Quiet** Indicates whether setup is running in quiet mode. +- **RelatedCV** Correlation vector value generated from the latest USO scan. +- **SandboxSize** Size of the sandbox. +- **ScenarioId** Indicates the update scenario. +- **SessionId** Unique value for each update attempt. +- **SetupMode** Mode of setup to be launched. +- **UpdateId** Unique ID for each Update. +- **UserSession** Indicates whether install was invoked by user actions. + + +## Update notification events + +### Microsoft.Windows.UpdateNotificationPipeline.UNPCampaignManagerHeartbeat + +This event is sent at the start of the CampaignManager event and is intended to be used as a heartbeat. + +The following fields are available: + +- **CampaignConfigVersion** Configuration version for the current campaign. +- **CampaignID** Currently campaign that is running on Update Notification Pipeline (UNP). +- **ConfigCatalogVersion** Current catalog version of UNP. +- **ContentVersion** Content version for the current campaign on UNP. +- **CV** Correlation vector. +- **DetectorVersion** Most recently run detector version for the current campaign on UNP. +- **GlobalEventCounter** Client-side counter that indicates the event ordering sent by the user. +- **PackageVersion** Current UNP package version. + + +## Upgrade events + +### FacilitatorTelemetry.DCATDownload + +This event indicates whether devices received additional or critical supplemental content during an OS Upgrade, to help keep Windows up-to-date and secure. + +The following fields are available: + +- **DownloadSize** Download size of payload. +- **ElapsedTime** Time taken to download payload. +- **MediaFallbackUsed** Used to determine if we used Media CompDBs to figure out package requirements for the upgrade. +- **ResultCode** Result returned by the Facilitator DCAT call. +- **Scenario** Dynamic update scenario (Image DU, or Setup DU). +- **Type** Type of package that was downloaded. +- **UpdateId** The ID of the update that was downloaded. + + +### FacilitatorTelemetry.DUDownload + +This event returns data about the download of supplemental packages critical to upgrading a device to the next version of Windows. + +The following fields are available: + +- **DownloadRequestAttributes** The attributes sent for download. +- **PackageCategoriesFailed** Lists the categories of packages that failed to download. +- **PackageCategoriesSkipped** Lists the categories of package downloads that were skipped. +- **ResultCode** The result of the event execution. +- **Scenario** Identifies the active Download scenario. +- **Url** The URL the download request was sent to. +- **Version** Identifies the version of Facilitator used. + + +### FacilitatorTelemetry.InitializeDU + +This event determines whether devices received additional or critical supplemental content during an OS upgrade. + +The following fields are available: + +- **DCATUrl** The Delivery Catalog (DCAT) URL we send the request to. +- **DownloadRequestAttributes** The attributes we send to DCAT. +- **ResultCode** The result returned from the initiation of Facilitator with the URL/attributes. +- **Scenario** Dynamic Update scenario (Image DU, or Setup DU). +- **Url** The Delivery Catalog (DCAT) URL we send the request to. +- **Version** Version of Facilitator. + + +### Setup360Telemetry.Downlevel + +This event sends data indicating that the device has started the downlevel phase of the upgrade, to help keep Windows up-to-date and secure. + +The following fields are available: + +- **ClientId** If using Windows Update, this will be the Windows Update client ID that is passed to Setup. In Media setup, the default value is Media360, but it can be overwritten by the caller to a unique value. +- **FlightData** Unique value that identifies the flight. +- **HostOSBuildNumber** The build number of the downlevel OS. +- **HostOsSkuName** The operating system edition which is running Setup360 instance (downlevel OS). +- **InstanceId** A unique GUID that identifies each instance of setuphost.exe. +- **ReportId** In the Windows Update scenario, this is the updateID that is passed to Setup. In media setup, this is the GUID for the install.wim. +- **Setup360Extended** More detailed information about phase/action when the potential failure occurred. +- **Setup360Mode** The phase of Setup360 (for example, Predownload, Install, Finalize, Rollback). +- **Setup360Result** The result of Setup360 (HRESULT used to diagnose errors). +- **Setup360Scenario** The Setup360 flow type (for example, Boot, Media, Update, MCT). +- **SetupVersionBuildNumber** The build number of Setup360 (build number of the target OS). +- **State** Exit state of given Setup360 run. Example: succeeded, failed, blocked, cancelled. +- **TestId** An ID that uniquely identifies a group of events. +- **WuId** This is the Windows Update Client ID. In the Windows Update scenario, this is the same as the clientId. + + +### Setup360Telemetry.Finalize + +This event sends data indicating that the device has started the phase of finalizing the upgrade, to help keep Windows up-to-date and secure. + +The following fields are available: + +- **ClientId** With Windows Update, this will be the Windows Update client ID that is passed to Setup. In Media setup, default value is Media360, but can be overwritten by the caller to a unique value. +- **FlightData** Unique value that identifies the flight. +- **HostOSBuildNumber** The build number of the previous OS. +- **HostOsSkuName** The OS edition which is running Setup360 instance (previous OS). +- **InstanceId** A unique GUID that identifies each instance of setuphost.exe +- **ReportId** With Windows Update, this is the updateID that is passed to Setup. In media setup, this is the GUID for the install.wim. +- **Setup360Extended** More detailed information about the phase/action when the potential failure occurred. +- **Setup360Mode** The phase of Setup360. Example: Predownload, Install, Finalize, Rollback. +- **Setup360Result** The result of Setup360. This is an HRESULT error code that is used to diagnose errors. +- **Setup360Scenario** The Setup360 flow type. Example: Boot, Media, Update, MCT. +- **SetupVersionBuildNumber** The build number of Setup360 (build number of target OS). +- **State** The exit state of a Setup360 run. Example: succeeded, failed, blocked, cancelled. +- **TestId** ID that uniquely identifies a group of events. +- **WuId** This is the Windows Update Client ID. With Windows Update, this is the same as the clientId. + + +### Setup360Telemetry.OsUninstall + +This event sends data regarding OS updates and upgrades from Windows 7, Windows 8, and Windows 10. Specifically, it indicates the outcome of an OS uninstall. + +The following fields are available: + +- **ClientId** For Windows Update, this will be the Windows Update client ID that is passed to Setup. In Media setup, default value is Media360, but can be overwritten by the caller to a unique value. +- **FlightData** Unique value that identifies the flight. +- **HostOSBuildNumber** The build number of the previous OS. +- **HostOsSkuName** The OS edition which is running the Setup360 instance (previous OS). +- **InstanceId** A unique GUID that identifies each instance of setuphost.exe. +- **ReportId** For Windows Update, this will be the Windows Update client ID that is passed to Setup. In Media setup, this is the GUID for the install.wim. +- **Setup360Extended** Detailed information about the phase or action when the potential failure occurred. +- **Setup360Mode** The phase of Setup360. Example: Predownload, Install, Finalize, Rollback. +- **Setup360Result** The result of Setup360. This is an HRESULT error code that is used to diagnose errors. +- **Setup360Scenario** The Setup360 flow type. Example: Boot, Media, Update, MCT +- **SetupVersionBuildNumber** The build number of Setup360 (build number of target OS). +- **State** Exit state of a Setup360 run. Example: succeeded, failed, blocked, cancelled. +- **TestId** ID that uniquely identifies a group of events. +- **WuId** Windows Update client ID. + + +### Setup360Telemetry.PostRebootInstall + +This event sends data indicating that the device has invoked the post reboot install phase of the upgrade, to help keep Windows up-to-date. + +The following fields are available: + +- **ClientId** With Windows Update, this is the Windows Update client ID that is passed to Setup. In Media setup, the default value is Media360, but can be overwritten by the caller to a unique value. +- **FlightData** Unique value that identifies the flight. +- **HostOSBuildNumber** The build number of the previous OS. +- **HostOsSkuName** The OS edition which is running Setup360 instance (previous OS). +- **InstanceId** A unique GUID that identifies each instance of setuphost.exe. +- **ReportId** With Windows Update, this is the updateID that is passed to Setup. In media setup, this is the GUID for the install.wim. +- **Setup360Extended** Extension of result - more granular information about phase/action when the potential failure happened +- **Setup360Mode** The phase of Setup360. Example: Predownload, Install, Finalize, Rollback +- **Setup360Result** The result of Setup360. This is an HRESULT error code that's used to diagnose errors. +- **Setup360Scenario** The Setup360 flow type. Example: Boot, Media, Update, MCT +- **SetupVersionBuildNumber** The build number of Setup360 (build number of target OS). +- **State** The exit state of a Setup360 run. Example: succeeded, failed, blocked, cancelled +- **TestId** A string to uniquely identify a group of events. +- **WuId** This is the Windows Update Client ID. With Windows Update, this is the same as ClientId. + + +### Setup360Telemetry.PreDownloadQuiet + +This event sends data indicating that the device has invoked the predownload quiet phase of the upgrade, to help keep Windows up to date. + +The following fields are available: + +- **ClientId** Using Windows Update, this will be the Windows Update client ID that is passed to Setup. In Media setup, default value is Media360, but can be overwritten by the caller to a unique value. +- **FlightData** Unique value that identifies the flight. +- **HostOSBuildNumber** The build number of the previous OS. +- **HostOsSkuName** The OS edition which is running Setup360 instance (previous operating system). +- **InstanceId** A unique GUID that identifies each instance of setuphost.exe. +- **ReportId** Using Windows Update, this is the updateID that is passed to Setup. In media setup, this is the GUID for the install.wim. +- **Setup360Extended** Detailed information about the phase/action when the potential failure occurred. +- **Setup360Mode** The phase of Setup360. Example: Predownload, Install, Finalize, Rollback. +- **Setup360Result** The result of Setup360. This is an HRESULT error code that is used to diagnose errors. +- **Setup360Scenario** The Setup360 flow type. Example: Boot, Media, Update, MCT. +- **SetupVersionBuildNumber** The build number of Setup360 (build number of target OS). +- **State** The exit state of a Setup360 run. Example: succeeded, failed, blocked, canceled. +- **TestId** ID that uniquely identifies a group of events. +- **WuId** This is the Windows Update Client ID. Using Windows Update, this is the same as the clientId. + + +### Setup360Telemetry.PreDownloadUX + +This event sends data regarding OS Updates and Upgrades from Windows 7.X, Windows 8.X, Windows 10 and RS, to help keep Windows up-to-date and secure. Specifically, it indicates the outcome of the PredownloadUX portion of the update process. + +The following fields are available: + +- **ClientId** For Windows Update, this will be the Windows Update client ID that is passed to Setup. In Media setup, default value is Media360, but can be overwritten by the caller to a unique value. +- **FlightData** In the WU scenario, this will be the WU client ID that is passed to Setup. In Media setup, default value is Media360, but can be overwritten by the caller to a unique value. +- **HostOSBuildNumber** The build number of the previous operating system. +- **HostOsSkuName** The OS edition which is running the Setup360 instance (previous operating system). +- **InstanceId** Unique GUID that identifies each instance of setuphost.exe. +- **ReportId** For Windows Update, this will be the Windows Update client ID that is passed to Setup. In Media setup, this is the GUID for the install.wim. +- **Setup360Extended** Detailed information about the phase/action when the potential failure occurred. +- **Setup360Mode** The phase of Setup360. Example: Predownload, Install, Finalize, Rollback. +- **Setup360Result** The result of Setup360. This is an HRESULT error code that can be used to diagnose errors. +- **Setup360Scenario** The Setup360 flow type. Example: Boot, Media, Update, MCT. +- **SetupVersionBuildNumber** The build number of Setup360 (build number of the target OS). +- **State** The exit state of the Setup360 run. Example: succeeded, failed, blocked, cancelled. +- **TestId** ID that uniquely identifies a group of events. +- **WuId** Windows Update client ID. + + +### Setup360Telemetry.PreInstallQuiet + +This event sends data indicating that the device has invoked the preinstall quiet phase of the upgrade, to help keep Windows up-to-date. + +The following fields are available: + +- **ClientId** With Windows Update, this will be the Windows Update client ID that is passed to Setup. In Media setup, default value is Media360, but can be overwritten by the caller to a unique value. +- **FlightData** Unique value that identifies the flight. +- **HostOSBuildNumber** The build number of the previous OS. +- **HostOsSkuName** The OS edition which is running Setup360 instance (previous OS). +- **InstanceId** A unique GUID that identifies each instance of setuphost.exe +- **ReportId** With Windows Update, this is the updateID that is passed to Setup. In media setup, this is the GUID for the install.wim. +- **Setup360Extended** Detailed information about the phase/action when the potential failure occurred. +- **Setup360Mode** The phase of Setup360. Example: Predownload, Install, Finalize, Rollback. +- **Setup360Result** The result of Setup360. This is an HRESULT error code that can be used to diagnose errors. +- **Setup360Scenario** Setup360 flow type (Boot, Media, Update, MCT). +- **SetupVersionBuildNumber** The build number of Setup360 (build number of target OS). +- **State** The exit state of a Setup360 run. Example: succeeded, failed, blocked, cancelled. +- **TestId** A string to uniquely identify a group of events. +- **WuId** This is the Windows Update Client ID. With Windows Update, this is the same as the clientId. + + +### Setup360Telemetry.PreInstallUX + +This event sends data regarding OS updates and upgrades from Windows 7, Windows 8, and Windows 10, to help keep Windows up-to-date. Specifically, it indicates the outcome of the PreinstallUX portion of the update process. + +The following fields are available: + +- **ClientId** For Windows Update, this will be the Windows Update client ID that is passed to Setup. In Media setup, default value is Media360, but can be overwritten by the caller to a unique value. +- **FlightData** Unique value that identifies the flight. +- **HostOSBuildNumber** The build number of the previous OS. +- **HostOsSkuName** The OS edition which is running the Setup360 instance (previous OS). +- **InstanceId** A unique GUID that identifies each instance of setuphost.exe. +- **ReportId** For Windows Update, this will be the Windows Update client ID that is passed to Setup. In Media setup, this is the GUID for the install.wim. +- **Setup360Extended** Detailed information about the phase/action when the potential failure occurred. +- **Setup360Mode** The phase of Setup360. Example: Predownload, Install, Finalize, Rollback. +- **Setup360Result** The result of Setup360. This is an HRESULT error code that is used to diagnose errors. +- **Setup360Scenario** The Setup360 flow type, Example: Boot, Media, Update, MCT. +- **SetupVersionBuildNumber** The build number of Setup360 (build number of target OS). +- **State** The exit state of a Setup360 run. Example: succeeded, failed, blocked, cancelled. +- **TestId** A string to uniquely identify a group of events. +- **WuId** Windows Update client ID. + + +### Setup360Telemetry.Setup360 + +This event sends data about OS deployment scenarios, to help keep Windows up-to-date. + +The following fields are available: + +- **ClientId** Retrieves the upgrade ID. In the Windows Update scenario, this will be the Windows Update client ID. In Media setup, default value is Media360, but can be overwritten by the caller to a unique value. +- **FieldName** Retrieves the data point. +- **FlightData** Specifies a unique identifier for each group of Windows Insider builds. +- **InstanceId** Retrieves a unique identifier for each instance of a setup session. +- **ReportId** Retrieves the report ID. +- **ScenarioId** Retrieves the deployment scenario. +- **Value** Retrieves the value associated with the corresponding FieldName. + + +### Setup360Telemetry.Setup360DynamicUpdate + +This event helps determine whether the device received supplemental content during an operating system upgrade, to help keep Windows up-to-date. + +The following fields are available: + +- **FlightData** Specifies a unique identifier for each group of Windows Insider builds. +- **InstanceId** Retrieves a unique identifier for each instance of a setup session. +- **Operation** Facilitator’s last known operation (scan, download, etc.). +- **ReportId** ID for tying together events stream side. +- **ResultCode** Result returned for the entire setup operation. +- **Scenario** Dynamic Update scenario (Image DU, or Setup DU). +- **ScenarioId** Identifies the update scenario. +- **TargetBranch** Branch of the target OS. +- **TargetBuild** Build of the target OS. + + +### Setup360Telemetry.Setup360MitigationResult + +This event sends data indicating the result of each setup mitigation. + +The following fields are available: + +- **Applicable** TRUE if the mitigation is applicable for the current update. +- **ClientId** In the Windows Update scenario, this is the client ID passed to Setup. In Media setup, default value is Media360, but can be overwritten by the caller to a unique value. +- **CommandCount** The number of command operations in the mitigation entry. +- **CustomCount** The number of custom operations in the mitigation entry. +- **FileCount** The number of file operations in the mitigation entry. +- **FlightData** The unique identifier for each flight (test release). +- **Index** The mitigation index of this particular mitigation. +- **InstanceId** The GUID (Globally Unique ID) that identifies each instance of SetupHost.EXE. +- **MitigationScenario** The update scenario in which the mitigation was executed. +- **Name** The friendly (descriptive) name of the mitigation. +- **OperationIndex** The mitigation operation index (in the event of a failure). +- **OperationName** The friendly (descriptive) name of the mitigation operation (in the event of failure). +- **RegistryCount** The number of registry operations in the mitigation entry. +- **ReportId** In the Windows Update scenario, the Update ID that is passed to Setup. In media setup, this is the GUID for the INSTALL.WIM. +- **Result** HResult of this operation. +- **ScenarioId** Setup360 flow type. +- **TimeDiff** The amount of time spent performing the mitigation (in 100-nanosecond increments). + + +### Setup360Telemetry.Setup360MitigationSummary + +This event sends a summary of all the setup mitigations available for this update. + +The following fields are available: + +- **Applicable** The count of mitigations that were applicable to the system and scenario. +- **ClientId** The Windows Update client ID passed to Setup. +- **Failed** The count of mitigations that failed. +- **FlightData** The unique identifier for each flight (test release). +- **InstanceId** The GUID (Globally Unique ID) that identifies each instance of SetupHost.EXE. +- **MitigationScenario** The update scenario in which the mitigations were attempted. +- **ReportId** In the Windows Update scenario, the Update ID that is passed to Setup. In media setup, this is the GUID for the INSTALL.WIM. +- **Result** HResult of this operation. +- **ScenarioId** Setup360 flow type. +- **TimeDiff** The amount of time spent performing the mitigation (in 100-nanosecond increments). +- **Total** The total number of mitigations that were available. + + +### Setup360Telemetry.Setup360OneSettings + +This event collects information regarding the post reboot phase of the new UUP (Unified Update Platform) update scenario; which is leveraged by both Mobile and Desktop. + +The following fields are available: + +- **ClientId** The Windows Update client ID passed to Setup. +- **Count** The count of applicable OneSettings for the device. +- **FlightData** The ID for the flight (test instance version). +- **InstanceId** The GUID (Globally-Unique ID) that identifies each instance of setuphost.exe. +- **Parameters** The set of name value pair parameters sent to OneSettings to determine if there are any applicable OneSettings. +- **ReportId** The Update ID passed to Setup. +- **Result** The HResult of the event error. +- **ScenarioId** The update scenario ID. +- **Values** Values sent back to the device, if applicable. + + +### Setup360Telemetry.UnexpectedEvent + +This event sends data indicating that the device has invoked the unexpected event phase of the upgrade, to help keep Windows up to date. + +The following fields are available: + +- **ClientId** With Windows Update, this will be the Windows Update client ID that is passed to Setup. In Media setup, default value is Media360, but can be overwritten by the caller to a unique value. +- **FlightData** Unique value that identifies the flight. +- **HostOSBuildNumber** The build number of the previous OS. +- **HostOsSkuName** The OS edition which is running Setup360 instance (previous OS). +- **InstanceId** A unique GUID that identifies each instance of setuphost.exe +- **ReportId** With Windows Update, this is the updateID that is passed to Setup. In media setup, this is the GUID for the install.wim. +- **Setup360Extended** Detailed information about the phase/action when the potential failure occurred. +- **Setup360Mode** The phase of Setup360. Example: Predownload, Install, Finalize, Rollback. +- **Setup360Result** The result of Setup360. This is an HRESULT error code that can be used used to diagnose errors. +- **Setup360Scenario** The Setup360 flow type. Example: Boot, Media, Update, MCT. +- **SetupVersionBuildNumber** The build number of Setup360 (build number of target OS). +- **State** The exit state of a Setup360 run. Example: succeeded, failed, blocked, cancelled. +- **TestId** A string to uniquely identify a group of events. +- **WuId** This is the Windows Update Client ID. With Windows Update, this is the same as the clientId. + + +## Windows as a Service diagnostic events + +### Microsoft.Windows.WaaSMedic.SummaryEvent + +Result of the WaaSMedic operation. + +The following fields are available: + +- **callerApplication** The name of the calling application. +- **capsuleCount** The number of Sediment Pack capsules. +- **capsuleFailureCount** The number of capsule failures. +- **detectionSummary** Result of each applicable detection that was run. +- **featureAssessmentImpact** WaaS Assessment impact for feature updates. +- **hrEngineBlockReason** Indicates the reason for stopping WaaSMedic. +- **hrEngineResult** Error code from the engine operation. +- **hrLastSandboxError** The last error sent by the WaaSMedic sandbox. +- **initSummary** Summary data of the initialization method. +- **insufficientSessions** Device not eligible for diagnostics. +- **isInteractiveMode** The user started a run of WaaSMedic. +- **isManaged** Device is managed for updates. +- **isWUConnected** Device is connected to Windows Update. +- **noMoreActions** No more applicable diagnostics. +- **pluginFailureCount** The number of plugins that have failed. +- **pluginsCount** The number of plugins. +- **qualityAssessmentImpact** WaaS Assessment impact for quality updates. +- **remediationSummary** Result of each operation performed on a device to fix an invalid state or configuration that's preventing the device from getting updates. For example, if Windows Update service is turned off, the fix is to turn the it back on. +- **usingBackupFeatureAssessment** Relying on backup feature assessment. +- **usingBackupQualityAssessment** Relying on backup quality assessment. +- **usingCachedFeatureAssessment** WaaS Medic run did not get OS build age from the network on the previous run. +- **usingCachedQualityAssessment** WaaS Medic run did not get OS revision age from the network on the previous run. +- **versionString** Version of the WaaSMedic engine. +- **waasMedicRunMode** Indicates whether this was a background regular run of the medic or whether it was triggered by a user launching Windows Update Troubleshooter. + + +## Windows Error Reporting events + +### Microsoft.Windows.WERVertical.OSCrash + +This event sends binary data from the collected dump file wheneveer a bug check occurs, to help keep Windows up to date. The is the OneCore version of this event. + +The following fields are available: + +- **BootId** Uint32 identifying the boot number for this device. +- **BugCheckCode** Uint64 "bugcheck code" that identifies a proximate cause of the bug check. +- **BugCheckParameter1** Uint64 parameter providing additional information. +- **BugCheckParameter2** Uint64 parameter providing additional information. +- **BugCheckParameter3** Uint64 parameter providing additional information. +- **BugCheckParameter4** Uint64 parameter providing additional information. +- **DumpFileAttributes** Codes that identify the type of data contained in the dump file +- **DumpFileSize** Size of the dump file +- **IsValidDumpFile** True if the dump file is valid for the debugger, false otherwise +- **ReportId** WER Report Id associated with this bug check (used for finding the corresponding report archive in Watson). + + +## Windows Error Reporting MTT events + +### Microsoft.Windows.WER.MTT.Denominator + +This event provides a denominator to calculate MTTF (mean-time-to-failure) for crashes and other errors, to help keep Windows up to date. + +The following fields are available: + +- **DPRange** Maximum mean value range. +- **DPValue** Randomized bit value (0 or 1) that can be reconstituted over a large population to estimate the mean. +- **Value** Standard UTC emitted DP value structure See [Value](#value). + + +### Value + +This event returns data about Mean Time to Failure (MTTF) for Windows devices. It is the primary means of estimating reliability problems in Basic Diagnostic reporting with very strong privacy guarantees. Since Basic Diagnostic reporting does not include system up-time, and since that information is important to ensuring the safe and stable operation of Windows, the data provided by this event provides that data in a manner which does not threaten a user’s privacy. + +The following fields are available: + +- **Algorithm** The algorithm used to preserve privacy. +- **DPRange** The upper bound of the range being measured. +- **DPValue** The randomized response returned by the client. +- **Epsilon** The level of privacy to be applied. +- **HistType** The histogram type if the algorithm is a histogram algorithm. +- **PertProb** The probability the entry will be Perturbed if the algorithm chosen is “heavy-hitters”. + + +## Windows Store events + +### Microsoft.Windows.Store.StoreActivating + +This event sends tracking data about when the Store app activation via protocol URI is in progress, to help keep Windows up to date. + + + +### Microsoft.Windows.StoreAgent.Telemetry.AbortedInstallation + +This event is sent when an installation or update is canceled by a user or the system and is used to help keep Windows Apps up to date and secure. + +The following fields are available: + +- **AggregatedPackageFullNames** The names of all packages to be downloaded and installed. +- **AttemptNumber** Number of retry attempts before it was canceled. +- **BundleId** The Item Bundle ID. +- **CategoryId** The Item Category ID. +- **ClientAppId** The identity of the app that initiated this operation. +- **HResult** The result code of the last action performed before this operation. +- **IsBundle** Is this a bundle? +- **IsInteractive** Was this requested by a user? +- **IsMandatory** Was this a mandatory update? +- **IsRemediation** Was this a remediation install? +- **IsRestore** Is this automatically restoring a previously acquired product? +- **IsUpdate** Flag indicating if this is an update. +- **ParentBundleId** The product ID of the parent (if this product is part of a bundle). +- **PFN** The product family name of the product being installed. +- **ProductId** The identity of the package or packages being installed. +- **SystemAttemptNumber** The total number of automatic attempts at installation before it was canceled. +- **UserAttemptNumber** The total number of user attempts at installation before it was canceled. +- **WUContentId** The Windows Update content ID. + + +### Microsoft.Windows.StoreAgent.Telemetry.BeginGetInstalledContentIds + +This event is sent when an inventory of the apps installed is started to determine whether updates for those apps are available. It's used to help keep Windows up-to-date and secure. + + + +### Microsoft.Windows.StoreAgent.Telemetry.BeginUpdateMetadataPrepare + +This event is sent when the Store Agent cache is refreshed with any available package updates. It's used to help keep Windows up-to-date and secure. + + + +### Microsoft.Windows.StoreAgent.Telemetry.CancelInstallation + +This event is sent when an app update or installation is canceled while in interactive mode. This can be canceled by the user or the system. It's used to help keep Windows up-to-date and secure. + +The following fields are available: + +- **AggregatedPackageFullNames** The names of all package or packages to be downloaded and installed. +- **AttemptNumber** Total number of installation attempts. +- **BundleId** The identity of the Windows Insider build that is associated with this product. +- **CategoryId** The identity of the package or packages being installed. +- **ClientAppId** The identity of the app that initiated this operation. +- **IsBundle** Is this a bundle? +- **IsInteractive** Was this requested by a user? +- **IsMandatory** Is this a mandatory update? +- **IsRemediation** Is this repairing a previous installation? +- **IsRestore** Is this an automatic restore of a previously acquired product? +- **IsUpdate** Is this a product update? +- **ParentBundleId** The product ID of the parent (if this product is part of a bundle). +- **PFN** The name of all packages to be downloaded and installed. +- **PreviousHResult** The previous HResult code. +- **PreviousInstallState** Previous installation state before it was canceled. +- **ProductId** The name of the package or packages requested for installation. +- **RelatedCV** Correlation Vector of a previous performed action on this product. +- **SystemAttemptNumber** Total number of automatic attempts to install before it was canceled. +- **UserAttemptNumber** Total number of user attempts to install before it was canceled. +- **WUContentId** The Windows Update content ID. + + +### Microsoft.Windows.StoreAgent.Telemetry.CompleteInstallOperationRequest + +This event is sent at the end of app installations or updates to help keep Windows up-to-date and secure. + +The following fields are available: + +- **CatalogId** The Store Product ID of the app being installed. +- **HResult** HResult code of the action being performed. +- **IsBundle** Is this a bundle? +- **PackageFamilyName** The name of the package being installed. +- **ProductId** The Store Product ID of the product being installed. +- **SkuId** Specific edition of the item being installed. + + +### Microsoft.Windows.StoreAgent.Telemetry.EndAcquireLicense + +This event is sent after the license is acquired when a product is being installed. It's used to help keep Windows up-to-date and secure. + +The following fields are available: + +- **AggregatedPackageFullNames** Includes a set of package full names for each app that is part of an atomic set. +- **AttemptNumber** The total number of attempts to acquire this product. +- **CategoryId** The identity of the package or packages being installed. +- **ClientAppId** The identity of the app that initiated this operation. +- **HResult** HResult code to show the result of the operation (success/failure). +- **IsBundle** Is this a bundle? +- **IsInteractive** Did the user initiate the installation? +- **IsMandatory** Is this a mandatory update? +- **IsRemediation** Is this repairing a previous installation? +- **IsRestore** Is this happening after a device restore? +- **IsUpdate** Is this an update? +- **PFN** Product Family Name of the product being installed. +- **ProductId** The Store Product ID for the product being installed. +- **SystemAttemptNumber** The number of attempts by the system to acquire this product. +- **UserAttemptNumber** The number of attempts by the user to acquire this product +- **WUContentId** The Windows Update content ID. + + +### Microsoft.Windows.StoreAgent.Telemetry.EndDownload + +This event is sent after an app is downloaded to help keep Windows up-to-date and secure. + +The following fields are available: + +- **AggregatedPackageFullNames** The name of all packages to be downloaded and installed. +- **AttemptNumber** Number of retry attempts before it was canceled. +- **BundleId** The identity of the Windows Insider build associated with this product. +- **CategoryId** The identity of the package or packages being installed. +- **ClientAppId** The identity of the app that initiated this operation. +- **DownloadSize** The total size of the download. +- **ExtendedHResult** Any extended HResult error codes. +- **HResult** The result code of the last action performed. +- **IsBundle** Is this a bundle? +- **IsInteractive** Is this initiated by the user? +- **IsMandatory** Is this a mandatory installation? +- **IsRemediation** Is this repairing a previous installation? +- **IsRestore** Is this a restore of a previously acquired product? +- **IsUpdate** Is this an update? +- **ParentBundleId** The parent bundle ID (if it's part of a bundle). +- **PFN** The Product Family Name of the app being download. +- **ProductId** The Store Product ID for the product being installed. +- **SystemAttemptNumber** The number of attempts by the system to download. +- **UserAttemptNumber** The number of attempts by the user to download. +- **WUContentId** The Windows Update content ID. + + +### Microsoft.Windows.StoreAgent.Telemetry.EndFrameworkUpdate + +This event is sent when an app update requires an updated Framework package and the process starts to download it. It is used to help keep Windows up-to-date and secure. + +The following fields are available: + +- **HResult** The result code of the last action performed before this operation. + + +### Microsoft.Windows.StoreAgent.Telemetry.EndGetInstalledContentIds + +This event is sent after sending the inventory of the products installed to determine whether updates for those products are available. It's used to help keep Windows up-to-date and secure. + +The following fields are available: + +- **HResult** The result code of the last action performed before this operation. + + +### Microsoft.Windows.StoreAgent.Telemetry.EndInstall + +This event is sent after a product has been installed to help keep Windows up-to-date and secure. + +The following fields are available: + +- **AggregatedPackageFullNames** The names of all packages to be downloaded and installed. +- **AttemptNumber** The number of retry attempts before it was canceled. +- **BundleId** The identity of the build associated with this product. +- **CategoryId** The identity of the package or packages being installed. +- **ClientAppId** The identity of the app that initiated this operation. +- **ExtendedHResult** The extended HResult error code. +- **HResult** The result code of the last action performed. +- **IsBundle** Is this a bundle? +- **IsInteractive** Is this an interactive installation? +- **IsMandatory** Is this a mandatory installation? +- **IsRemediation** Is this repairing a previous installation? +- **IsRestore** Is this automatically restoring a previously acquired product? +- **IsUpdate** Is this an update? +- **ParentBundleId** The product ID of the parent (if this product is part of a bundle). +- **PFN** Product Family Name of the product being installed. +- **ProductId** The Store Product ID for the product being installed. +- **SystemAttemptNumber** The total number of system attempts. +- **UserAttemptNumber** The total number of user attempts. +- **WUContentId** The Windows Update content ID. + + +### Microsoft.Windows.StoreAgent.Telemetry.EndScanForUpdates + +This event is sent after a scan for product updates to determine if there are packages to install. It's used to help keep Windows up-to-date and secure. + +The following fields are available: + +- **AsOnline** No content is currently available. +- **ClientAppId** The identity of the app that initiated this operation. +- **HResult** The result code of the last action performed. +- **IsApplicability** Is this request to only check if there are any applicable packages to install? +- **IsInteractive** Is this user requested? +- **IsOnline** Is the request doing an online check? + + +### Microsoft.Windows.StoreAgent.Telemetry.EndSearchUpdatePackages + +This event is sent after searching for update packages to install. It is used to help keep Windows up-to-date and secure. + +The following fields are available: + +- **AggregatedPackageFullNames** The names of all packages to be downloaded and installed. +- **AttemptNumber** The total number of retry attempts before it was canceled. +- **BundleId** The identity of the build associated with this product. +- **CategoryId** The identity of the package or packages being installed. +- **ClientAppId** The identity of the app that initiated this operation. +- **HResult** The result code of the last action performed. +- **IsBundle** Is this a bundle? +- **IsInteractive** Is this user requested? +- **IsMandatory** Is this a mandatory update? +- **IsRemediation** Is this repairing a previous installation? +- **IsRestore** Is this restoring previously acquired content? +- **IsUpdate** Is this an update? +- **ParentBundleId** The product ID of the parent (if this product is part of a bundle). +- **PFN** The name of the package or packages requested for install. +- **ProductId** The Store Product ID for the product being installed. +- **SystemAttemptNumber** The total number of system attempts. +- **UserAttemptNumber** The total number of user attempts. +- **WUContentId** The Windows Update content ID. + + +### Microsoft.Windows.StoreAgent.Telemetry.EndStageUserData + +This event is sent after restoring user data (if any) that needs to be restored following a product install. It is used to keep Windows up-to-date and secure. + +The following fields are available: + +- **AggregatedPackageFullNames** The name of all packages to be downloaded and installed. +- **AttemptNumber** The total number of retry attempts before it was canceled. +- **BundleId** The identity of the build associated with this product. +- **CategoryId** The identity of the package or packages being installed. +- **ClientAppId** The identity of the app that initiated this operation. +- **HResult** The result code of the last action performed. +- **IsBundle** Is this a bundle? +- **IsInteractive** Is this user requested? +- **IsMandatory** Is this a mandatory update? +- **IsRemediation** Is this repairing a previous installation? +- **IsRestore** Is this restoring previously acquired content? +- **IsUpdate** Is this an update? +- **ParentBundleId** The product ID of the parent (if this product is part of a bundle). +- **PFN** The name of the package or packages requested for install. +- **ProductId** The Store Product ID for the product being installed. +- **SystemAttemptNumber** The total number of system attempts. +- **UserAttemptNumber** The total number of system attempts. +- **WUContentId** The Windows Update content ID. + + +### Microsoft.Windows.StoreAgent.Telemetry.EndUpdateMetadataPrepare + +This event is sent after a scan for available app updates to help keep Windows up-to-date and secure. + +The following fields are available: + +- **HResult** The result code of the last action performed. + + +### Microsoft.Windows.StoreAgent.Telemetry.FulfillmentComplete + +This event is sent at the end of an app install or update to help keep Windows up-to-date and secure. + +The following fields are available: + +- **CatalogId** The name of the product catalog from which this app was chosen. +- **FailedRetry** Indicates whether the installation or update retry was successful. +- **HResult** The HResult code of the operation. +- **PFN** The Package Family Name of the app that is being installed or updated. +- **ProductId** The product ID of the app that is being updated or installed. + + +### Microsoft.Windows.StoreAgent.Telemetry.FulfillmentInitiate + +This event is sent at the beginning of an app install or update to help keep Windows up-to-date and secure. + +The following fields are available: + +- **CatalogId** The name of the product catalog from which this app was chosen. +- **FulfillmentPluginId** The ID of the plugin needed to install the package type of the product. +- **PFN** The Package Family Name of the app that is being installed or updated. +- **PluginTelemetryData** Diagnostic information specific to the package-type plug-in. +- **ProductId** The product ID of the app that is being updated or installed. + + +### Microsoft.Windows.StoreAgent.Telemetry.InstallOperationRequest + +This event is sent when a product install or update is initiated, to help keep Windows up-to-date and secure. + +The following fields are available: + +- **BundleId** The identity of the build associated with this product. +- **CatalogId** If this product is from a private catalog, the Store Product ID for the product being installed. +- **ProductId** The Store Product ID for the product being installed. +- **SkuId** Specific edition ID being installed. +- **VolumePath** The disk path of the installation. + + +### Microsoft.Windows.StoreAgent.Telemetry.PauseInstallation + +This event is sent when a product install or update is paused (either by a user or the system), to help keep Windows up-to-date and secure. + +The following fields are available: + +- **AggregatedPackageFullNames** The names of all packages to be downloaded and installed. +- **AttemptNumber** The total number of retry attempts before it was canceled. +- **BundleId** The identity of the build associated with this product. +- **CategoryId** The identity of the package or packages being installed. +- **ClientAppId** The identity of the app that initiated this operation. +- **IsBundle** Is this a bundle? +- **IsInteractive** Is this user requested? +- **IsMandatory** Is this a mandatory update? +- **IsRemediation** Is this repairing a previous installation? +- **IsRestore** Is this restoring previously acquired content? +- **IsUpdate** Is this an update? +- **ParentBundleId** The product ID of the parent (if this product is part of a bundle). +- **PFN** The Product Full Name. +- **PreviousHResult** The result code of the last action performed before this operation. +- **PreviousInstallState** Previous state before the installation or update was paused. +- **ProductId** The Store Product ID for the product being installed. +- **RelatedCV** Correlation Vector of a previous performed action on this product. +- **SystemAttemptNumber** The total number of system attempts. +- **UserAttemptNumber** The total number of user attempts. +- **WUContentId** The Windows Update content ID. + + +### Microsoft.Windows.StoreAgent.Telemetry.ResumeInstallation + +This event is sent when a product install or update is resumed (either by a user or the system), to help keep Windows up-to-date and secure. + +The following fields are available: + +- **AggregatedPackageFullNames** The names of all packages to be downloaded and installed. +- **AttemptNumber** The number of retry attempts before it was canceled. +- **BundleId** The identity of the build associated with this product. +- **CategoryId** The identity of the package or packages being installed. +- **ClientAppId** The identity of the app that initiated this operation. +- **HResult** The result code of the last action performed before this operation. +- **IsBundle** Is this a bundle? +- **IsInteractive** Is this user requested? +- **IsMandatory** Is this a mandatory update? +- **IsRemediation** Is this repairing a previous installation? +- **IsRestore** Is this restoring previously acquired content? +- **IsUpdate** Is this an update? +- **IsUserRetry** Did the user initiate the retry? +- **ParentBundleId** The product ID of the parent (if this product is part of a bundle). +- **PFN** The name of the package or packages requested for install. +- **PreviousHResult** The previous HResult error code. +- **PreviousInstallState** Previous state before the installation was paused. +- **ProductId** The Store Product ID for the product being installed. +- **RelatedCV** Correlation Vector for the original install before it was resumed. +- **ResumeClientId** The ID of the app that initiated the resume operation. +- **SystemAttemptNumber** The total number of system attempts. +- **UserAttemptNumber** The total number of user attempts. +- **WUContentId** The Windows Update content ID. + + +### Microsoft.Windows.StoreAgent.Telemetry.ResumeOperationRequest + +This event is sent when a product install or update is resumed by a user or on installation retries, to help keep Windows up-to-date and secure. + +The following fields are available: + +- **ProductId** The Store Product ID for the product being installed. + + +### Microsoft.Windows.StoreAgent.Telemetry.SearchForUpdateOperationRequest + +This event is sent when searching for update packages to install, to help keep Windows up-to-date and secure. + +The following fields are available: + +- **CatalogId** The Store Catalog ID for the product being installed. +- **ProductId** The Store Product ID for the product being installed. +- **SkuId** Specfic edition of the app being updated. + + +### Microsoft.Windows.StoreAgent.Telemetry.UpdateAppOperationRequest + +This event occurs when an update is requested for an app, to help keep Windows up-to-date and secure. + +The following fields are available: + +- **PFamN** The name of the app that is requested for update. + + +## Windows System Kit events + +### Microsoft.Windows.Kits.WSK.WskImageCreate + +This event sends simple Product and Service usage data when a user is using the Windows System Kit to create new OS “images”. The data includes the version of the Windows System Kit and the state of the event and is used to help investigate “image” creation failures. + +The following fields are available: + +- **Phase** The image creation phase. Values are “Start” or “End”. +- **WskVersion** The version of the Windows System Kit being used. + + +### Microsoft.Windows.Kits.WSK.WskImageCustomization + +This event sends simple Product and Service usage data when a user is using the Windows System Kit to create/modify configuration files allowing the customization of a new OS image with Apps or Drivers. The data includes the version of the Windows System Kit, the state of the event, the customization type (drivers or apps) and the mode (new or updating) and is used to help investigate configuration file creation failures. + +The following fields are available: + +- **CustomizationMode** Indicates the mode of the customization (new or updating). +- **CustomizationType** Indicates the type of customization (drivers or apps). +- **Mode** The mode of update to image configuration files. Values are “New” or “Update”. +- **Phase** The image creation phase. Values are “Start” or “End”. +- **Type** The type of update to image configuration files. Values are “Apps” or “Drivers”. +- **WskVersion** The version of the Windows System Kit being used. + + +### Microsoft.Windows.Kits.WSK.WskWorkspaceCreate + +This event sends simple Product and Service usage data when a user is using the Windows System Kit to create new workspace for generating OS “images”. The data includes the version of the Windows System Kit and the state of the event and is used to help investigate workspace creation failures. + +The following fields are available: + +- **Architecture** The OS architecture that the workspace will target. Values are one of: “AMD64”, “ARM64”, “x86”, or “ARM”. +- **OsEdition** The Operating System Edition that the workspace will target. +- **Phase** The image creation phase. Values are “Start” or “End”. +- **WorkspaceArchitecture** The operating system architecture that the workspace will target. +- **WorkspaceOsEdition** The operating system edition that the workspace will target. +- **WskVersion** The version of the Windows System Kit being used. + + +## Windows Update Delivery Optimization events + +### Microsoft.OSG.DU.DeliveryOptClient.DownloadCanceled + +This event describes when a download was canceled with Delivery Optimization. It's used to understand and address problems regarding downloads. + +The following fields are available: + +- **background** Is the download being done in the background? +- **bytesFromCacheServer** Bytes received from a cache host. +- **bytesFromCDN** The number of bytes received from a CDN source. +- **bytesFromGroupPeers** The number of bytes received from a peer in the same group. +- **bytesFromIntPeers** The number of bytes received from peers not in the same LAN or in the same group. +- **bytesFromLinkLocalPeers** The number of bytes received from local peers. +- **bytesFromLocalCache** Bytes copied over from local (on disk) cache. +- **bytesFromPeers** The number of bytes received from a peer in the same LAN. +- **cdnErrorCodes** A list of CDN connection errors since the last FailureCDNCommunication event. +- **cdnErrorCounts** The number of times each error in cdnErrorCodes was encountered. +- **cdnIp** The IP Address of the source CDN (Content Delivery Network). +- **cdnUrl** The URL of the source CDN (Content Delivery Network). +- **dataSourcesTotal** Bytes received per source type, accumulated for the whole session. +- **errorCode** The error code that was returned. +- **experimentId** When running a test, this is used to correlate events that are part of the same test. +- **fileID** The ID of the file being downloaded. +- **gCurMemoryStreamBytes** Current usage for memory streaming. +- **gMaxMemoryStreamBytes** Maximum usage for memory streaming. +- **isVpn** Indicates whether the device is connected to a VPN (Virtual Private Network). +- **jobID** Identifier for the Windows Update job. +- **predefinedCallerName** The name of the API Caller. +- **reasonCode** Reason the action or event occurred. +- **routeToCacheServer** The cache server setting, source, and value. +- **sessionID** The ID of the file download session. +- **updateID** The ID of the update being downloaded. +- **usedMemoryStream** TRUE if the download is using memory streaming for App downloads. + + +### Microsoft.OSG.DU.DeliveryOptClient.DownloadCompleted + +This event describes when a download has completed with Delivery Optimization. It's used to understand and address problems regarding downloads. + +The following fields are available: + +- **background** Is the download a background download? +- **bytesFromCacheServer** Bytes received from a cache host. +- **bytesFromCDN** The number of bytes received from a CDN source. +- **bytesFromGroupPeers** The number of bytes received from a peer in the same domain group. +- **bytesFromIntPeers** The number of bytes received from peers not in the same LAN or in the same domain group. +- **bytesFromLinkLocalPeers** The number of bytes received from local peers. +- **bytesFromLocalCache** Bytes copied over from local (on disk) cache. +- **bytesFromPeers** The number of bytes received from a peer in the same LAN. +- **bytesRequested** The total number of bytes requested for download. +- **cacheServerBonnectionCount** No content is currently available. +- **cacheServerConnectionCount** Number of connections made to cache hosts. +- **cdnConnectionCount** The total number of connections made to the CDN. +- **cdnErrorCodes** A list of CDN connection errors since the last FailureCDNCommunication event. +- **cdnErrorCounts** The number of times each error in cdnErrorCodes was encountered. +- **cdnIp** The IP address of the source CDN. +- **cdnUrl** Url of the source Content Distribution Network (CDN). +- **dataSourcesTotal** Bytes received per source type, accumulated for the whole session. +- **dnErrorCounts** No content is currently available. +- **doErrorCode** The Delivery Optimization error code that was returned. +- **downlinkBps** The maximum measured available download bandwidth (in bytes per second). +- **downlinkUsageBps** The download speed (in bytes per second). +- **downloadMode** The download mode used for this file download session. +- **downloadModeReason** Reason for the download. +- **downloadModeSrc** Source of the DownloadMode setting (KvsProvider = 0, GeoProvider = 1, GeoVerProvider = 2, CpProvider = 3, DiscoveryProvider = 4, RegistryProvider = 5, GroupPolicyProvider = 6, MdmProvider = 7, SettingsProvider = 8, InvalidProviderType = 9). +- **experimentId** When running a test, this is used to correlate with other events that are part of the same test. +- **expiresAt** The time when the content will expire from the Delivery Optimization Cache. +- **fileID** The ID of the file being downloaded. +- **fileSize** The size of the file being downloaded. +- **gCurMemoryStreamBytes** Current usage for memory streaming. +- **gdnConnectionCount** No content is currently available. +- **gMaxMemoryStreamBytes** Maximum usage for memory streaming. +- **groupConnectionCo** No content is currently available. +- **groupConnectionCount** The total number of connections made to peers in the same group. +- **internetConnectionCount** The total number of connections made to peers not in the same LAN or the same group. +- **isEncrypted** TRUE if the file is encrypted and will be decrypted after download. +- **isVpn** Is the device connected to a Virtual Private Network? +- **jobID** Identifier for the Windows Update job. +- **lanConnectionCount** The total number of connections made to peers in the same LAN. +- **linkLocalConnectionCount** The number of connections made to peers in the same Link-local network. +- **numPeers** The total number of peers used for this download. +- **numPeersLocal** The total number of local peers used for this download. +- **predefinedCallerName** The name of the API Caller. +- **restrictedU`load** No content is currently available. +- **restrictedUpload** Is the upload restricted? +- **routeToCacheServer** The cache server setting, source, and value. +- **sessionID** The ID of the download session. +- **totalTimeMs** Duration of the download (in seconds). +- **updateID** The ID of the update being downloaded. +- **uplinkBps** The maximum measured available upload bandwidth (in bytes per second). +- **uplinkUsageBps** The upload speed (in bytes per second). +- **usedMemoryStream** TRUE if the download is using memory streaming for App downloads. + + +### Microsoft.OSG.DU.DeliveryOptClient.DownloadPaused + +This event represents a temporary suspension of a download with Delivery Optimization. It's used to understand and address problems regarding downloads. + +The following fields are available: + +- **background** Is the download a background download? +- **cdnUrl** The URL of the source CDN (Content Delivery Network). +- **errorCode** The error code that was returned. +- **experimentId** When running a test, this is used to correlate with other events that are part of the same test. +- **fileID** The ID of the file being paused. +- **isVpn** Is the device connected to a Virtual Private Network? +- **jobID** Identifier for the Windows Update job. +- **predefinedCallerName** The name of the API Caller object. +- **reasonCode** The reason for pausing the download. +- **routeToCacheServer** The cache server setting, source, and value. +- **sessionID** The ID of the download session. +- **updateID** The ID of the update being paused. + + +### Microsoft.OSG.DU.DeliveryOptClient.DownloadStarted + +This event sends data describing the start of a new download to enable Delivery Optimization. It's used to understand and address problems regarding downloads. + +The following fields are available: + +- **ActiveNetworkConnection** No content is currently available. +- **background** Indicates whether the download is happening in the background. +- **bytesRequested** Number of bytes requested for the download. +- **cdnUrl** The URL of the source Content Distribution Network (CDN). +- **costFlags** A set of flags representing network cost. +- **deviceProfile** Identifies the usage or form factor (such as Desktop, Xbox, or VM). +- **diceRoll** Random number used for determining if a client will use peering. +- **doClientVersion** The version of the Delivery Optimization client. +- **doErrorCode** The Delivery Optimization error code that was returned. +- **downloadMode** The download mode used for this file download session (CdnOnly = 0, Lan = 1, Group = 2, Internet = 3, Simple = 99, Bypass = 100). +- **downloadModeReason** Reason for the download. +- **downloadModeSrc** Source of the DownloadMode setting (KvsProvider = 0, GeoProvider = 1, GeoVerProvider = 2, CpProvider = 3, DiscoveryProvider = 4, RegistryProvider = 5, GroupPolicyProvider = 6, MdmProvider = 7, SettingsProvider = 8, InvalidProviderType = 9). +- **errorCode** The error code that was returned. +- **experimentId** ID used to correlate client/services calls that are part of the same test during A/B testing. +- **fileID** The ID of the file being downloaded. +- **filePath** The path to where the downloaded file will be written. +- **fileSize** Total file size of the file that was downloaded. +- **fileSizeCaller** Value for total file size provided by our caller. +- **groupID** ID for the group. +- **IsBootCritical** No content is currently available. +- **isEncrypted** Indicates whether the download is encrypted. +- **isVpn** Indicates whether the device is connected to a Virtual Private Network. +- **jobID** The ID of the Windows Update job. +- **peerID** The ID for this delivery optimization client. +- **predefinedCallerName** Name of the API caller. +- **routeToCacheServer** Cache server setting, source, and value. +- **SdbEntries** No content is currently available. +- **sessionID** The ID for the file download session. +- **setConfigs** A JSON representation of the configurations that have been set, and their sources. +- **updateID** The ID of the update being downloaded. +- **usedMemoryStream** Indicates whether the download used memory streaming. +- **WuDriverCoverage** No content is currently available. +- **WuDriverUpdateId** No content is currently available. +- **WuPopulatedFromId** No content is currently available. + + +### Microsoft.OSG.DU.DeliveryOptClient.FailureCdnCommunication + +This event represents a failure to download from a CDN with Delivery Optimization. It's used to understand and address problems regarding downloads. + +The following fields are available: + +- **cdnHeaders** The HTTP headers returned by the CDN. +- **cdnIp** The IP address of the CDN. +- **cdnUrl** The URL of the CDN. +- **errorCode** The error code that was returned. +- **errorCount** The total number of times this error code was seen since the last FailureCdnCommunication event was encountered. +- **experimentId** When running a test, this is used to correlate with other events that are part of the same test. +- **fileID** The ID of the file being downloaded. +- **httpStatusCode** The HTTP status code returned by the CDN. +- **isHeadRequest** The type of HTTP request that was sent to the CDN. Example: HEAD or GET +- **peerType** The type of peer (LAN, Group, Internet, CDN, Cache Host, etc.). +- **requestOffset** The byte offset within the file in the sent request. +- **requestSize** The size of the range requested from the CDN. +- **responseSize** The size of the range response received from the CDN. +- **sessionID** The ID of the download session. + + +### Microsoft.OSG.DU.DeliveryOptClient.JobError + +This event represents a Windows Update job error. It allows for investigation of top errors. + +The following fields are available: + +- **cdnIp** The IP Address of the source CDN (Content Delivery Network). +- **doErrorCode** Error code returned for delivery optimization. +- **errorCode** The error code returned. +- **experimentId** When running a test, this is used to correlate with other events that are part of the same test. +- **fileID** The ID of the file being downloaded. +- **jobID** The Windows Update job ID. + + +## Windows Update events + +### Microsoft.Windows.Update.DeviceUpdateAgent.UpdateAgentAnalysisSummary + +This event collects information regarding the state of devices and drivers on the system following a reboot after the install phase of the new device manifest UUP (Unified Update Platform) update scenario which is used to install a device manifest describing a set of driver packages. + +The following fields are available: + +- **activated** Whether the entire device manifest update is considered activated and in use. +- **analysisErrorCount** The number of driver packages that could not be analyzed because errors occurred during analysis. +- **flightId** Unique ID for each flight. +- **missingDriverCount** The number of driver packages delivered by the device manifest that are missing from the system. +- **missingUpdateCount** The number of updates in the device manifest that are missing from the system. +- **objectId** Unique value for each diagnostics session. +- **publishedCount** The number of drivers packages delivered by the device manifest that are published and available to be used on devices. +- **relatedCV** Correlation vector value generated from the latest USO scan. +- **scenarioId** Indicates the update scenario. +- **sessionId** Unique value for each update session. +- **summary** A summary string that contains basic information about driver packages that are part of the device manifest and any devices on the system that those driver packages match. +- **summaryAppendError** A Boolean indicating if there was an error appending more information to the summary string. +- **truncatedDeviceCount** The number of devices missing from the summary string because there is not enough room in the string. +- **truncatedDriverCount** The number of driver packages missing from the summary string because there is not enough room in the string. +- **unpublishedCount** How many drivers packages that were delivered by the device manifest that are still unpublished and unavailable to be used on devices. +- **updateId** The unique ID for each update. + + +### Microsoft.Windows.Update.DeviceUpdateAgent.UpdateAgentCommit + +This event collects information regarding the final commit phase of the new device manifest UUP (Unified Update Platform) update scenario, which is used to install a device manifest describing a set of driver packages. + +The following fields are available: + +- **errorCode** The error code returned for the current session initialization. +- **flightId** The unique identifier for each flight. +- **objectId** The unique GUID for each diagnostics session. +- **relatedCV** A correlation vector value generated from the latest USO scan. +- **result** Outcome of the initialization of the session. +- **scenarioId** Identifies the Update scenario. +- **sessionId** The unique value for each update session. +- **updateId** The unique identifier for each Update. + + +### Microsoft.Windows.Update.DeviceUpdateAgent.UpdateAgentDownloadRequest + +This event collects information regarding the download request phase of the new device manifest UUP (Unified Update Platform) update scenario, which is used to install a device manifest describing a set of driver packages. + +The following fields are available: + +- **deletedCorruptFiles** Indicates if UpdateAgent found any corrupt payload files and whether the payload was deleted. +- **errorCode** The error code returned for the current session initialization. +- **flightId** The unique identifier for each flight. +- **objectId** Unique value for each Update Agent mode. +- **packageCountOptional** Number of optional packages requested. +- **packageCountRequired** Number of required packages requested. +- **packageCountTotal** Total number of packages needed. +- **packageCountTotalCanonical** Total number of canonical packages. +- **packageCountTotalDiff** Total number of diff packages. +- **packageCountTotalExpress** Total number of express packages. +- **packageSizeCanonical** Size of canonical packages in bytes. +- **packageSizeDiff** Size of diff packages in bytes. +- **packageSizeExpress** Size of express packages in bytes. +- **rangeRequestState** Represents the state of the download range request. +- **relatedCV** Correlation vector value generated from the latest USO scan. +- **result** Result of the download request phase of update. +- **scenarioId** The scenario ID. Example: MobileUpdate, DesktopLanguagePack, DesktopFeatureOnDemand, or DesktopDriverUpdate. +- **sessionId** Unique value for each Update Agent mode attempt. +- **updateId** Unique ID for each update. + + +### Microsoft.Windows.Update.DeviceUpdateAgent.UpdateAgentInitialize + +This event sends data for initializing a new update session for the new device manifest UUP (Unified Update Platform) update scenario, which is used to install a device manifest describing a set of driver packages. + +The following fields are available: + +- **errorCode** The error code returned for the current session initialization. +- **flightId** The unique identifier for each flight. +- **flightMetadata** Contains the FlightId and the build being flighted. +- **objectId** Unique value for each Update Agent mode. +- **relatedCV** Correlation vector value generated from the latest USO scan. +- **result** Result of the initialize phase of the update. 0 = Succeeded, 1 = Failed, 2 = Cancelled, 3 = Blocked, 4 = BlockCancelled. +- **scenarioId** The scenario ID. Example: MobileUpdate, DesktopLanguagePack, DesktopFeatureOnDemand, or DesktopDriverUpdate. +- **sessionData** Contains instructions to update agent for processing FODs and DUICs (Null for other scenarios). +- **sessionId** Unique value for each Update Agent mode attempt. +- **updateId** Unique ID for each update. + + +### Microsoft.Windows.Update.DeviceUpdateAgent.UpdateAgentInstall + +This event collects information regarding the install phase of the new device manifest UUP (Unified Update Platform) update scenario, which is used to install a device manifest describing a set of driver packages. + +The following fields are available: + +- **errorCode** The error code returned for the current install phase. +- **flightId** The unique identifier for each flight (pre-release builds). +- **objectId** The unique identifier for each diagnostics session. +- **relatedCV** Correlation vector value generated from the latest scan. +- **result** Outcome of the install phase of the update. +- **scenarioId** The scenario ID. Example: MobileUpdate, DesktopLanguagePack, DesktopFeatureOnDemand, or DesktopDriverUpdate +- **sessionId** The unique identifier for each update session. +- **updateId** The unique identifier for each Update. + + +### Microsoft.Windows.Update.DeviceUpdateAgent.UpdateAgentModeStart + +This event sends data for the start of each mode during the process of updating device manifest assets via the UUP (Unified Update Platform) update scenario, which is used to install a device manifest describing a set of driver packages. + +The following fields are available: + +- **flightId** The unique identifier for each flight (pre-release builds). +- **mode** Indicates the active Update Agent mode. +- **objectId** Unique value for each diagnostics session. +- **relatedCV** Correlation vector value generated from the latest scan. +- **scenarioId** The scenario ID. Example: MobileUpdate, DesktopLanguagePack, DesktopFeatureOnDemand, or DesktopDriverUpdate. +- **sessionId** The unique identifier for each update session. +- **updateId** The unique identifier for each Update. + + +### Microsoft.Windows.Update.NotificationUx.DialogNotificationToBeDisplayed + +This event indicates that a notification dialog box is about to be displayed to user. + +The following fields are available: + +- **AcceptAutoModeLimit** The maximum number of days for a device to automatically enter Auto Reboot mode. +- **AutoToAutoFailedLimit** The maximum number of days for Auto Reboot mode to fail before the RebootFailed dialog box is shown. +- **DaysSinceRebootRequired** Number of days since restart was required. +- **DeviceLocalTime** The local time on the device sending the event. +- **EngagedModeLimit** The number of days to switch between DTE dialog boxes. +- **EnterAutoModeLimit** The maximum number of days for a device to enter Auto Reboot mode. +- **ETag** OneSettings versioning value. +- **IsForcedEnabled** Indicates whether Forced Reboot mode is enabled for this device. +- **IsUltimateForcedEnabled** Indicates whether Ultimate Forced Reboot mode is enabled for this device. +- **NotificationUxState** Indicates which dialog box is shown. +- **NotificationUxStateString** Indicates which dialog box is shown. +- **RebootUxState** Indicates the state of the restart (Engaged, Auto, Forced, or UltimateForced). +- **RebootUxStateString** Indicates the state of the restart (Engaged, Auto, Forced, or UltimateForced). +- **RebootVersion** Version of DTE. +- **SkipToAutoModeLimit** The minimum length of time to pass in restart pending before a device can be put into auto mode. +- **UpdateId** The ID of the update that is pending restart to finish installation. +- **UpdateRevision** The revision of the update that is pending restart to finish installation. +- **UtcTime** The time the dialog box notification will be displayed, in Coordinated Universal Time. + + +### Microsoft.Windows.Update.NotificationUx.EnhancedEngagedRebootAcceptAutoDialog + +This event indicates that the Enhanced Engaged restart "accept automatically" dialog box was displayed. + +The following fields are available: + +- **DeviceLocalTime** The local time on the device sending the event. +- **ETag** OneSettings versioning value. +- **ExitCode** Indicates how users exited the dialog box. +- **RebootVersion** Version of DTE. +- **UpdateId** The ID of the update that is pending restart to finish installation. +- **UpdateRevision** The revision of the update that is pending restart to finish installation. +- **UserResponseString** The option that user chose on this dialog box. +- **UtcTime** The time that the dialog box was displayed, in Coordinated Universal Time. + + +### Microsoft.Windows.Update.NotificationUx.EnhancedEngagedRebootFirstReminderDialog + +This event indicates that the Enhanced Engaged restart "first reminder" dialog box was displayed.. + +The following fields are available: + +- **DeviceLocalTime** The local time on the device sending the event. +- **ETag** OneSettings versioning value. +- **ExitCode** Indicates how users exited the dialog box. +- **RebootVersion** Version of DTE. +- **UpdateId** The ID of the update that is pending restart to finish installation. +- **UpdateRevision** The revision of the update that is pending restart to finish installation. +- **UserResponseString** The option that user chose in this dialog box. +- **UtcTime** The time that the dialog box was displayed, in Coordinated Universal Time. + + +### Microsoft.Windows.Update.NotificationUx.EnhancedEngagedRebootRebootFailedDialog + +This event indicates that the Enhanced Engaged restart "restart failed" dialog box was displayed. + +The following fields are available: + +- **DeviceLocalTime** The local time of the device sending the event. +- **ETag** OneSettings versioning value. +- **ExitCode** Indicates how users exited the dialog box. +- **RebootVersion** Version of DTE. +- **UpdateId** The ID of the update that is pending restart to finish installation. +- **UpdateRevision** The revision of the update that is pending restart to finish installation. +- **UserResponseString** The option that the user chose in this dialog box. +- **UtcTime** The time that the dialog box was displayed, in Coordinated Universal Time. + + +### Microsoft.Windows.Update.NotificationUx.EnhancedEngagedRebootRebootImminentDialog + +This event indicates that the Enhanced Engaged restart "restart imminent" dialog box was displayed. + +The following fields are available: + +- **DeviceLocalTime** Time the dialog box was shown on the local device. +- **ETag** OneSettings versioning value. +- **ExitCode** Indicates how users exited the dialog box. +- **RebootVersion** Version of DTE. +- **UpdateId** The ID of the update that is pending restart to finish installation. +- **UpdateRevision** The revision of the update that is pending restart to finish installation. +- **UserResponseString** The option that user chose in this dialog box. +- **UtcTime** The time that dialog box was displayed, in Coordinated Universal Time. + + +### Microsoft.Windows.Update.NotificationUx.EnhancedEngagedRebootReminderDialog + +This event returns information relating to the Enhanced Engaged reboot reminder dialog that was displayed. + +The following fields are available: + +- **DeviceLocalTime** The time at which the reboot reminder dialog was shown (based on the local device time settings). +- **ETag** The OneSettings versioning value. +- **ExitCode** Indicates how users exited the reboot reminder dialog box. +- **RebootVersion** The version of the DTE (Direct-to-Engaged). +- **UpdateId** The ID of the update that is waiting for reboot to finish installation. +- **UpdateRevision** The revision of the update that is waiting for reboot to finish installation. +- **UserResponseString** The option chosen by the user on the reboot dialog box. +- **UtcTime** The time at which the reboot reminder dialog was shown (in UTC). + + +### Microsoft.Windows.Update.NotificationUx.EnhancedEngagedRebootReminderToast + +This event indicates that the Enhanced Engaged restart reminder pop-up banner was displayed. + +The following fields are available: + +- **DeviceLocalTime** The local time on the device sending the event. +- **ETag** OneSettings versioning value. +- **ExitCode** Indicates how users exited the pop-up banner. +- **RebootVersion** The version of the reboot logic. +- **UpdateId** The ID of the update that is pending restart to finish installation. +- **UpdateRevision** The revision of the update that is pending restart to finish installation. +- **UserResponseString** The option that the user chose in the pop-up banner. +- **UtcTime** The time that the pop-up banner was displayed, in Coordinated Universal Time. + + +### Microsoft.Windows.Update.NotificationUx.RebootScheduled + +Indicates when a reboot is scheduled by the system or a user for a security, quality, or feature update. + +The following fields are available: + +- **activeHoursApplicable** Indicates whether an Active Hours policy is present on the device. +- **IsEnhancedEngagedReboot** Indicates whether this is an Enhanced Engaged reboot. +- **rebootArgument** Argument for the reboot task. It also represents specific reboot related action. +- **rebootOutsideOfActiveHours** Indicates whether a restart is scheduled outside of active hours. +- **rebootScheduledByUser** Indicates whether the restart was scheduled by user (if not, it was scheduled automatically). +- **rebootState** The current state of the restart. +- **rebootUsingSmartScheduler** Indicates whether the reboot is scheduled by smart scheduler. +- **revisionNumber** Revision number of the update that is getting installed with this restart. +- **scheduledRebootTime** Time of the scheduled restart. +- **scheduledRebootTimeInUTC** Time of the scheduled restart in Coordinated Universal Time. +- **updateId** ID of the update that is getting installed with this restart. +- **wuDeviceid** Unique device ID used by Windows Update. + + +### Microsoft.Windows.Update.Orchestrator.ActivityRestrictedByActiveHoursPolicy + +This event indicates a policy is present that may restrict update activity to outside of active hours. + +The following fields are available: + +- **activeHoursEnd** The end of the active hours window. +- **activeHoursStart** The start of the active hours window. +- **wuDeviceid** Unique device ID used by Windows Update. + + +### Microsoft.Windows.Update.Orchestrator.BlockedByActiveHours + +This event indicates that update activity was blocked because it is within the active hours window. + +The following fields are available: + +- **activeHoursEnd** The end of the active hours window. +- **activeHoursStart** The start of the active hours window. +- **updatePhase** The current state of the update process. +- **wuDeviceid** Unique device ID used by Windows Update. + + +### Microsoft.Windows.Update.Orchestrator.BlockedByBatteryLevel + +This event indicates that Windows Update activity was blocked due to low battery level. + +The following fields are available: + +- **batteryLevel** The current battery charge capacity. +- **batteryLevelThreshold** The battery capacity threshold to stop update activity. +- **updatePhase** The current state of the update process. +- **wuDeviceid** Device ID. + + +### Microsoft.Windows.Update.Orchestrator.DeferRestart + +This event indicates that a restart required for installing updates was postponed. + +The following fields are available: + +- **displayNeededReason** List of reasons for needing display. +- **eventScenario** Indicates the purpose of the event (scan started, succeeded, failed, etc.). +- **filteredDeferReason** Applicable filtered reasons why reboot was postponed (such as user active, or low battery). +- **gameModeReason** Name of the executable that caused the game mode state check to start. +- **ignoredReason** List of reasons that were intentionally ignored. +- **IgnoreReasonsForRestart** List of reasons why restart was deferred. +- **revisionNumber** Update ID revision number. +- **systemNeededReason** List of reasons why system is needed. +- **updateId** Update ID. +- **updateScenarioType** Update session type. +- **wuDeviceid** Unique device ID used by Windows Update. + + +### Microsoft.Windows.Update.Orchestrator.Detection + +This event indicates that a scan for a Windows Update occurred. + +The following fields are available: + +- **deferReason** The reason why the device could not check for updates. +- **detectionBlockingPolicy** The Policy that blocked detection. +- **detectionBlockreason** The reason detection did not complete. +- **detectionRetryMode** Indicates whether we will try to scan again. +- **errorCode** The error code returned for the current process. +- **eventScenario** End-to-end update session ID, or indicates the purpose of sending this event - whether because the software distribution just started installing content, or whether it was cancelled, succeeded, or failed. +- **flightID** The unique identifier for the flight (Windows Insider pre-release build) should be delivered to the device, if applicable. +- **interactive** Indicates whether the user initiated the session. +- **networkStatus** Indicates if the device is connected to the internet. +- **revisionNumber** The Update revision number. +- **scanTriggerSource** The source of the triggered scan. +- **updateId** The unique identifier of the Update. +- **updateScenarioType** Identifies the type of update session being performed. +- **wuDeviceid** The unique device ID used by Windows Update. + + +### Microsoft.Windows.Update.Orchestrator.DisplayNeeded + +This event indicates the reboot was postponed due to needing a display. + +The following fields are available: + +- **displayNeededReason** Reason the display is needed. +- **eventScenario** Indicates the purpose of sending this event - whether because the software distribution just started checking for content, or whether it was cancelled, succeeded, or failed. +- **rebootOutsideOfActiveHours** Indicates whether the reboot was to occur outside of active hours. +- **revisionNumber** Revision number of the update. +- **updateId** Update ID. +- **updateScenarioType** The update session type. +- **uxRebootstate** Indicates the exact state of the user experience at the time the required reboot was initiated. +- **wuDeviceid** The unique identifier of a specific device, used to identify how many devices are encountering success or a particular issue + + +### Microsoft.Windows.Update.Orchestrator.Download + +This event sends launch data for a Windows Update download to help keep Windows up to date. + +The following fields are available: + +- **deferReason** Reason for download not completing. +- **errorCode** An error code represented as a hexadecimal value. +- **eventScenario** End-to-end update session ID. +- **flightID** The specific ID of the Windows Insider build the device is getting. +- **interactive** Indicates whether the session is user initiated. +- **revisionNumber** Update revision number. +- **updateId** Update ID. +- **updateScenarioType** The update session type. +- **wuDeviceid** Unique device ID used by Windows Update. + + +### Microsoft.Windows.Update.Orchestrator.DTUCompletedWhenWuFlightPendingCommit + +This event indicates that DTU completed installation of the electronic software delivery (ESD), when Windows Update was already in Pending Commit phase of the feature update. + +The following fields are available: + +- **wuDeviceid** Device ID used by Windows Update. + + +### Microsoft.Windows.Update.Orchestrator.DTUEnabled + +This event indicates that Inbox DTU functionality was enabled. + +The following fields are available: + +- **wuDeviceid** Device ID used by Windows Update. + + +### Microsoft.Windows.Update.Orchestrator.DTUInitiated + +This event indicates that Inbox DTU functionality was intiated. + +The following fields are available: + +- **dtuErrorCode** Return code from creating the DTU Com Server. +- **isDtuApplicable** Determination of whether DTU is applicable to the machine it is running on. +- **wuDeviceid** Device ID used by Windows Update. + + +### Microsoft.Windows.Update.Orchestrator.EscalationRiskLevels + +This event is sent during update scan, download, or install, and indicates that the device is at risk of being out-of-date. + +The following fields are available: + +- **configVersion** The escalation configuration version on the device. +- **downloadElapsedTime** Indicates how long since the download is required on device. +- **downloadRiskLevel** At-risk level of download phase. +- **installElapsedTime** Indicates how long since the install is required on device. +- **installRiskLevel** The at-risk level of install phase. +- **isSediment** Assessment of whether is device is at risk. +- **scanElapsedTime** Indicates how long since the scan is required on device. +- **scanRiskLevel** At-risk level of the scan phase. +- **wuDeviceid** Device ID used by Windows Update. + + +### Microsoft.Windows.Update.Orchestrator.FailedToAddTimeTriggerToScanTask + +This event indicated that USO failed to add a trigger time to a task. + +The following fields are available: + +- **errorCode** The Windows Update error code. +- **wuDeviceid** The Windows Update device ID. + + +### Microsoft.Windows.Update.Orchestrator.FlightInapplicable + +This event indicates that the update is no longer applicable to this device. + +The following fields are available: + +- **EventPublishedTime** Time when this event was generated. +- **flightID** The specific ID of the Windows Insider build. +- **inapplicableReason** The reason why the update is inapplicable. +- **revisionNumber** Update revision number. +- **updateId** Unique Windows Update ID. +- **updateScenarioType** Update session type. +- **UpdateStatus** Last status of update. +- **UUPFallBackConfigured** Indicates whether UUP fallback is configured. +- **wuDeviceid** Unique Device ID. + + +### Microsoft.Windows.Update.Orchestrator.InitiatingReboot + +This event sends data about an Orchestrator requesting a reboot from power management to help keep Windows up to date. + +The following fields are available: + +- **EventPublishedTime** Time of the event. +- **flightID** Unique update ID +- **interactive** Indicates whether the reboot initiation stage of the update process was entered as a result of user action. +- **rebootOutsideOfActiveHours** Indicates whether the reboot was to occur outside of active hours. +- **revisionNumber** Revision number of the update. +- **updateId** Update ID. +- **updateScenarioType** The update session type. +- **uxRebootstate** Indicates the exact state of the user experience at the time the required reboot was initiated. +- **wuDeviceid** Unique device ID used by Windows Update. + + +### Microsoft.Windows.Update.Orchestrator.Install + +This event sends launch data for a Windows Update install to help keep Windows up to date. + +The following fields are available: + +- **batteryLevel** Current battery capacity in mWh or percentage left. +- **deferReason** Reason for install not completing. +- **errorCode** The error code reppresented by a hexadecimal value. +- **eventScenario** End-to-end update session ID. +- **flightID** The ID of the Windows Insider build the device is getting. +- **flightUpdate** Indicates whether the update is a Windows Insider build. +- **ForcedRebootReminderSet** A boolean value that indicates if a forced reboot will happen for updates. +- **IgnoreReasonsForRestart** The reason(s) a Postpone Restart command was ignored. +- **installCommitfailedtime** The time it took for a reboot to happen but the upgrade failed to progress. +- **installRebootinitiatetime** The time it took for a reboot to be attempted. +- **interactive** Identifies if session is user initiated. +- **minutesToCommit** The time it took to install updates. +- **rebootOutsideOfActiveHours** Indicates whether a reboot is scheduled outside of active hours. +- **revisionNumber** Update revision number. +- **updateId** Update ID. +- **updateScenarioType** The update session type. +- **uxRebootstate** Indicates the exact state of the user experience at the time the required reboot was initiated to ensure the correct update process and experience is provided to keep Windows up to date. +- **wuDeviceid** Unique device ID used by Windows Update. + + +### Microsoft.Windows.Update.Orchestrator.LowUptimes + +This event is sent if a device is identified as not having sufficient uptime to reliably process updates in order to keep secure. + +The following fields are available: + +- **availableHistoryMinutes** The number of minutes available from the local machine activity history. +- **isLowUptimeMachine** Is the machine considered low uptime or not. +- **lowUptimeMinHours** Current setting for the minimum number of hours needed to not be considered low uptime. +- **lowUptimeQueryDays** Current setting for the number of recent days to check for uptime. +- **uptimeMinutes** Number of minutes of uptime measured. +- **wuDeviceid** Unique device ID for Windows Update. + + +### Microsoft.Windows.Update.Orchestrator.OneshotUpdateDetection + +This event returns data about scans initiated through settings UI, or background scans that are urgent; to help keep Windows up to date. + +The following fields are available: + +- **externalOneshotupdate** The last time a task-triggered scan was completed. +- **interactiveOneshotupdate** The last time an interactive scan was completed. +- **oldlastscanOneshotupdate** The last time a scan completed successfully. +- **wuDeviceid** The Windows Update Device GUID (Globally-Unique ID). + + +### Microsoft.Windows.Update.Orchestrator.PreShutdownStart + +This event is generated before the shutdown and commit operations. + +The following fields are available: + +- **wuDeviceid** The unique identifier of a specific device, used to identify how many devices are encountering success or a particular issue. + + +### Microsoft.Windows.Update.Orchestrator.RebootFailed + +This event sends information about whether an update required a reboot and reasons for failure, to help keep Windows up to date. + +The following fields are available: + +- **batteryLevel** Current battery capacity in mWh or percentage left. +- **deferReason** Reason for install not completing. +- **EventPublishedTime** The time that the reboot failure occurred. +- **flightID** Unique update ID. +- **rebootOutsideOfActiveHours** Indicates whether a reboot was scheduled outside of active hours. +- **RebootResults** Hex code indicating failure reason. Typically, we expect this to be a specific USO generated hex code. +- **revisionNumber** Update revision number. +- **updateId** Update ID. +- **updateScenarioType** The update session type. +- **uxRebootstate** Indicates the exact state of the user experience at the time the required reboot was initiated to ensure the correct update process and experience is provided to keep Windows up to date. +- **wuDeviceid** Unique device ID used by Windows Update. + + +### Microsoft.Windows.Update.Orchestrator.RefreshSettings + +This event sends basic data about the version of upgrade settings applied to the system to help keep Windows up to date. + +The following fields are available: + +- **errorCode** Hex code for the error message, to allow lookup of the specific error. +- **settingsDownloadTime** Timestamp of the last attempt to acquire settings. +- **settingsETag** Version identifier for the settings. +- **wuDeviceid** Unique device ID used by Windows Update. + + +### Microsoft.Windows.Update.Orchestrator.RestoreRebootTask + +This event sends data indicating that a reboot task is missing unexpectedly on a device and the task is restored because a reboot is still required, to help keep Windows up to date. + +The following fields are available: + +- **RebootTaskMissedTimeUTC** The time when the reboot task was scheduled to run, but did not. +- **RebootTaskNextTimeUTC** The time when the reboot task was rescheduled for. +- **RebootTaskRestoredTime** Time at which this reboot task was restored. +- **wuDeviceid** Device ID for the device on which the reboot is restored. + + +### Microsoft.Windows.Update.Orchestrator.ScanTriggered + +This event indicates that Update Orchestrator has started a scan operation. + +The following fields are available: + +- **errorCode** The error code returned for the current scan operation. +- **eventScenario** Indicates the purpose of sending this event. +- **interactive** Indicates whether the scan is interactive. +- **isDTUEnabled** Indicates whether DTU (internal abbreviation for Direct Feature Update) channel is enabled on the client system. +- **isScanPastSla** Indicates whether the SLA has elapsed for scanning. +- **isScanPastTriggerSla** Indicates whether the SLA has elapsed for triggering a scan. +- **minutesOverScanSla** Indicates how many minutes the scan exceeded the scan SLA. +- **minutesOverScanTriggerSla** Indicates how many minutes the scan exceeded the scan trigger SLA. +- **scanTriggerSource** Indicates what caused the scan. +- **updateScenarioType** The update session type. +- **wuDeviceid** Unique device ID used by Windows Update. + + +### Microsoft.Windows.Update.Orchestrator.StickUpdate + +This event is sent when the update service orchestrator (USO) indicates the update cannot be superseded by a newer update. + +The following fields are available: + +- **updateId** Identifier associated with the specific piece of content. +- **wuDeviceid** Unique device ID controlled by the software distribution client. + + +### Microsoft.Windows.Update.Orchestrator.SystemNeeded + +This event sends data about why a device is unable to reboot, to help keep Windows up to date. + +The following fields are available: + +- **eventScenario** End-to-end update session ID. +- **rebootOutsideOfActiveHours** Indicates whether a reboot is scheduled outside of active hours. +- **revisionNumber** Update revision number. +- **systemNeededReason** List of apps or tasks that are preventing the system from restarting. +- **updateId** Update ID. +- **updateScenarioType** The update session type. +- **uxRebootstate** Indicates the exact state of the user experience at the time the required reboot was initiated to ensure the correct update process and experience is provided to keep Windows up to date. +- **wuDeviceid** Unique device ID used by Windows Update. + + +### Microsoft.Windows.Update.Orchestrator.TerminatedByActiveHours + +This event indicates that update activity was stopped due to active hours starting. + +The following fields are available: + +- **activeHoursEnd** The end of the active hours window. +- **activeHoursStart** The start of the active hours window. +- **updatePhase** The current state of the update process. +- **wuDeviceid** The device identifier. + + +### Microsoft.Windows.Update.Orchestrator.TerminatedByBatteryLevel + +This event is sent when update activity was stopped due to a low battery level. + +The following fields are available: + +- **batteryLevel** The current battery charge capacity. +- **batteryLevelThreshold** The battery capacity threshold to stop update activity. +- **updatePhase** The current state of the update process. +- **wuDeviceid** The device identifier. + + +### Microsoft.Windows.Update.Orchestrator.UnstickUpdate + +This event is sent when the update service orchestrator (USO) indicates that the update can be superseded by a newer update. + +The following fields are available: + +- **updateId** Identifier associated with the specific piece of content. +- **wuDeviceid** Unique device ID controlled by the software distribution client. + + +### Microsoft.Windows.Update.Orchestrator.UpdatePolicyCacheRefresh + +This event sends data on whether Update Management Policies were enabled on a device, to help keep Windows up to date. + +The following fields are available: + +- **configuredPoliciescount** Number of policies on the device. +- **configuredPoliciescsunt** No content is currently available. +- **policiesNamevaluesource** Policy name and source of policy (group policy, MDM or flight). +- **policyCacherefreshtime** Time when policy cache was refreshed. +- **updateInstalluxsetting** Indicates whether a user has set policies via a user experience option. +- **wuDeviceid** Unique device ID used by Windows Update. + + +### Microsoft.Windows.Update.Orchestrator.UpdateRebootRequired + +This event sends data about whether an update required a reboot to help keep Windows up to date. + +The following fields are available: + +- **flightID** The specific ID of the Windows Insider build the device is getting. +- **interactive** Indicates whether the reboot initiation stage of the update process was entered as a result of user action. +- **revisionNumber** Update revision number. +- **updateId** Update ID. +- **updateScenarioType** The update session type. +- **uxRebootstate** Indicates the exact state of the user experience at the time the required reboot was initiated to ensure the correct update process and experience is provided to keep Windows up to date. +- **wuDeviceid** Unique device ID used by Windows Update. + + +### Microsoft.Windows.Update.Orchestrator.updateSettingsFlushFailed + +This event sends information about an update that encountered problems and was not able to complete. + +The following fields are available: + +- **errorCode** The error code encountered. +- **wuDeviceid** The ID of the device in which the error occurred. + + +### Microsoft.Windows.Update.Orchestrator.UsoSession + +This event represents the state of the USO service at start and completion. + +The following fields are available: + +- **activeSessionid** A unique session GUID. +- **eventScenario** The state of the update action. +- **interactive** Is the USO session interactive? +- **lastErrorcode** The last error that was encountered. +- **lastErrorstate** The state of the update when the last error was encountered. +- **sessionType** A GUID that refers to the update session type. +- **updateScenarioType** A descriptive update session type. +- **wuDeviceid** The Windows Update device GUID. + + +### Microsoft.Windows.Update.Ux.MusNotification.EnhancedEngagedRebootUxState + +This event sends information about the configuration of Enhanced Direct-to-Engaged (eDTE), which includes values for the timing of how eDTE will progress through each phase of the reboot. + +The following fields are available: + +- **AcceptAutoModeLimit** The maximum number of days for a device to automatically enter Auto Reboot mode. +- **AutoToAutoFailedLimit** The maximum number of days for Auto Reboot mode to fail before a Reboot Failed dialog will be shown. +- **DeviceLocalTime** The date and time (based on the device date/time settings) the reboot mode changed. +- **EngagedModeLimit** The number of days to switch between DTE (Direct-to-Engaged) dialogs. +- **EnterAutoModeLimit** The maximum number of days a device can enter Auto Reboot mode. +- **ETag** The Entity Tag that represents the OneSettings version. +- **IsForcedEnabled** Identifies whether Forced Reboot mode is enabled for the device. +- **IsUltimateForcedEnabled** Identifies whether Ultimate Forced Reboot mode is enabled for the device. +- **OldestUpdateLocalTime** The date and time (based on the device date/time settings) this update’s reboot began pending. +- **RebootUxState** Identifies the reboot state: Engaged, Auto, Forced, UltimateForced. +- **RebootVersion** The version of the DTE (Direct-to-Engaged). +- **SkipToAutoModeLimit** The maximum number of days to switch to start while in Auto Reboot mode. +- **UpdateId** The ID of the update that is waiting for reboot to finish installation. +- **UpdateRevision** The revision of the update that is waiting for reboot to finish installation. + + +### Microsoft.Windows.Update.Ux.MusNotification.RebootNoLongerNeeded + +This event is sent when a security update has successfully completed. + +The following fields are available: + +- **UtcTime** The Coordinated Universal Time that the restart was no longer needed. + + +### Microsoft.Windows.Update.Ux.MusNotification.RebootScheduled + +This event sends basic information about scheduling an update-related reboot, to get security updates and to help keep Windows up-to-date. + +The following fields are available: + +- **activeHoursApplicable** Indicates whether Active Hours applies on this device. +- **IsEnhancedEngagedReboot** Indicates whether Enhanced reboot was enabled. +- **rebootArgument** Argument for the reboot task. It also represents specific reboot related action. +- **rebootOutsideOfActiveHours** True, if a reboot is scheduled outside of active hours. False, otherwise. +- **rebootScheduledByUser** True, if a reboot is scheduled by user. False, if a reboot is scheduled automatically. +- **rebootState** Current state of the reboot. +- **rebootUsingSmartScheduler** Indicates that the reboot is scheduled by SmartScheduler. +- **revisionNumber** Revision number of the OS. +- **scheduledRebootTime** Time scheduled for the reboot. +- **scheduledRebootTimeInUTC** Time scheduled for the reboot, in UTC. +- **updateId** Identifies which update is being scheduled. +- **wuDeviceid** The unique device ID used by Windows Update. + + +### Microsoft.Windows.Update.Ux.MusNotification.UxBrokerScheduledTask + +This event is sent when MUSE broker schedules a task. + +The following fields are available: + +- **TaskArgument** The arguments with which the task is scheduled. +- **TaskName** Name of the task. + + +### Microsoft.Windows.Update.Ux.MusUpdateSettings.RebootScheduled + +This event sends basic information for scheduling a device restart to install security updates. It's used to help keep Windows up to date. + +The following fields are available: + +- **activeHoursApplicable** Is the restart respecting Active Hours? +- **IsEnhancedEngagedReboot** TRUE if the reboot path is Enhanced Engaged. Otherwise, FALSE. +- **rebootArgument** The arguments that are passed to the OS for the restarted. +- **rebootOutsideOfActiveHours** Was the restart scheduled outside of Active Hours? +- **rebootScheduledByUser** Was the restart scheduled by the user? If the value is false, the restart was scheduled by the device. +- **rebootState** The state of the restart. +- **rebootUsingSmartScheduler** TRUE if the reboot should be performed by the Smart Scheduler. Otherwise, FALSE. +- **revisionNumber** The revision number of the OS being updated. +- **scheduledRebootTime** Time of the scheduled reboot +- **scheduledRebootTimeInUTC** Time of the scheduled restart, in Coordinated Universal Time. +- **updateId** The Windows Update device GUID. +- **wuDeviceid** The Windows Update device GUID. + + +## Windows Update mitigation events + +### Mitigation360Telemetry.MitigationCustom.CleanupSafeOsImages + +This event sends data specific to the CleanupSafeOsImages mitigation used for OS Updates. + +The following fields are available: + +- **ClientId** The client ID used by Windows Update. +- **FlightId** The ID of each Windows Insider build the device received. +- **InstanceId** A unique device ID that identifies each update instance. +- **MitigationScenario** The update scenario in which the mitigation was executed. +- **MountedImageCount** The number of mounted images. +- **MountedImageMatches** The number of mounted image matches. +- **MountedImagesFailed** The number of mounted images that could not be removed. +- **MountedImagesRemoved** The number of mounted images that were successfully removed. +- **MountedImagesSkipped** The number of mounted images that were not found. +- **RelatedCV** The correlation vector value generated from the latest USO scan. +- **Result** HResult of this operation. +- **ScenarioId** ID indicating the mitigation scenario. +- **ScenarioSupported** Indicates whether the scenario was supported. +- **SessionId** Unique value for each update attempt. +- **UpdateId** Unique ID for each Windows Update. +- **WuId** Unique ID for the Windows Update client. + + +### Mitigation360Telemetry.MitigationCustom.FixAppXReparsePoints + +This event sends data specific to the FixAppXReparsePoints mitigation used for OS updates. + +The following fields are available: + +- **ClientId** Unique identifier for each flight. +- **FlightId** Unique GUID that identifies each instances of setuphost.exe. +- **InstanceId** The update scenario in which the mitigation was executed. +- **MitigationScenario** Correlation vector value generated from the latest USO scan. +- **RelatedCV** Number of reparse points that are corrupted but we failed to fix them. +- **ReparsePointsFailed** Number of reparse points that were corrupted and were fixed by this mitigation. +- **ReparsePointsFixed** Number of reparse points that are not corrupted and no action is required. +- **ReparsePointsSkipped** HResult of this operation. +- **Result** ID indicating the mitigation scenario. +- **ScenarioId** Indicates whether the scenario was supported. +- **ScenarioSupported** Unique value for each update attempt. +- **SessionId** Unique ID for each Update. +- **UpdateId** Unique ID for the Windows Update client. +- **WuId** Unique ID for the Windows Update client. + + +### Mitigation360Telemetry.MitigationCustom.FixupEditionId + +This event sends data specific to the FixupEditionId mitigation used for OS updates. + +The following fields are available: + +- **ClientId** In the WU scenario, this will be the WU client ID that is passed to Setup. In Media setup, default value is Media360, but can be overwritten by the caller to a unique value. +- **EditionIdUpdated** Determine whether EditionId was changed. +- **FlightId** Unique identifier for each flight. +- **InstanceId** Unique GUID that identifies each instances of setuphost.exe. +- **MitigationScenario** The update scenario in which the mitigation was executed. +- **ProductEditionId** Expected EditionId value based on GetProductInfo. +- **ProductType** Value returned by GetProductInfo. +- **RegistryEditionId** EditionId value in the registry. +- **RelatedCV** Correlation vector value generated from the latest USO scan. +- **Result** HResult of this operation. +- **ScenarioId** ID indicating the mitigation scenario. +- **ScenarioSupported** Indicates whether the scenario was supported. +- **SessionId** Unique value for each update attempt. +- **UpdateId** Unique ID for each update. +- **WuId** Unique ID for the Windows Update client. + + +## Windows Update Reserve Manager events + +### Microsoft.Windows.UpdateReserveManager.CommitPendingHardReserveAdjustment + +This event is sent when the Update Reserve Manager commits a hard reserve adjustment that was pending. + +The following fields are available: + +- **FinalAdjustment** Final adjustment for the hard reserve following the addition or removal of optional content. +- **InitialAdjustment** Initial intended adjustment for the hard reserve following the addition/removal of optional content. + + +### Microsoft.Windows.UpdateReserveManager.FunctionReturnedError + +This event is sent when the Update Reserve Manager returns an error from one of its internal functions. + +The following fields are available: + +- **FailedExpression** The failed expression that was returned. +- **FailedFile** The binary file that contained the failed function. +- **FailedFunction** The name of the function that originated the failure. +- **FailedLine** The line number of the failure. +- **ReturnCode** The return code of the function. + + +### Microsoft.Windows.UpdateReserveManager.InitializeUpdateReserveManager + +This event returns data about the Update Reserve Manager, including whether it’s been initialized. + +The following fields are available: + +- **ClientId** The ID of the caller application. +- **Flags** The enumerated flags used to initialize the manager. +- **FlightId** The flight ID of the content the calling client is currently operating with. +- **Offline** Indicates whether or the reserve manager is called during offline operations. +- **PolicyPassed** Indicates whether the machine is able to use reserves. +- **ReturnCode** Return code of the operation. +- **Version** The version of the Update Reserve Manager. + + +### Microsoft.Windows.UpdateReserveManager.PrepareTIForReserveInitialization + +This event is sent when the Update Reserve Manager prepares the Trusted Installer to initialize reserves on the next boot. + +The following fields are available: + +- **Flags** The flags that are passed to the function to prepare the Trusted Installer for reserve initialization. + + +### Microsoft.Windows.UpdateReserveManager.RemovePendingHardReserveAdjustment + +This event is sent when the Update Reserve Manager removes a pending hard reserve adjustment. + + + +### Microsoft.Windows.UpdateReserveManager.UpdatePendingHardReserveAdjustment + +This event is sent when the Update Reserve Manager needs to adjust the size of the hard reserve after the option content is installed. + +The following fields are available: + +- **ChangeSize** The change in the hard reserve size based on the addition or removal of optional content. +- **Disposition** The parameter for the hard reserve adjustment function. +- **Flags** The flags passed to the hard reserve adjustment function. +- **PendingHardReserveAdjustment** The final change to the hard reserve size. +- **UpdateType** Indicates whether the change is an increase or decrease in the size of the hard reserve. + + +## Winlogon events + +### Microsoft.Windows.Security.Winlogon.SetupCompleteLogon + +This event signals the completion of the setup process. It happens only once during the first logon. + + + +## XBOX events + +### Microsoft.Xbox.XamTelemetry.AppActivationError + +This event indicates whether the system detected an activation error in the app. + +The following fields are available: + +- **ActivationUri** Activation URI (Uniform Resource Identifier) used in the attempt to activate the app. +- **AppId** The Xbox LIVE Title ID. +- **AppUserModelId** The AUMID (Application User Model ID) of the app to activate. +- **Result** The HResult error. +- **UserId** The Xbox LIVE User ID (XUID). + + +### Microsoft.Xbox.XamTelemetry.AppActivity + +This event is triggered whenever the current app state is changed by: launch, switch, terminate, snap, etc. + +The following fields are available: + +- **AppActionId** The ID of the application action. +- **AppCurrentVisibilityState** The ID of the current application visibility state. +- **AppId** The Xbox LIVE Title ID of the app. +- **AppPackageFullName** The full name of the application package. +- **AppPreviousVisibilityState** The ID of the previous application visibility state. +- **AppSessionId** The application session ID. +- **AppType** The type ID of the application (AppType_NotKnown, AppType_Era, AppType_Sra, AppType_Uwa). +- **BCACode** The BCA (Burst Cutting Area) mark code of the optical disc used to launch the application. +- **DurationMs** The amount of time (in milliseconds) since the last application state transition. +- **IsTrialLicense** This boolean value is TRUE if the application is on a trial license. +- **LicenseType** The type of licensed used to authorize the app (0 - Unknown, 1 - User, 2 - Subscription, 3 - Offline, 4 - Disc). +- **LicenseXuid** If the license type is 1 (User), this field contains the XUID (Xbox User ID) of the registered owner of the license. +- **ProductGuid** The Xbox product GUID (Globally-Unique ID) of the application. +- **UserId** The XUID (Xbox User ID) of the current user. + + + From b1567238bc987713dde8b105a0b9b029cf03fb4f Mon Sep 17 00:00:00 2001 From: Brian Lich Date: Thu, 28 Mar 2019 08:21:14 -0700 Subject: [PATCH 095/724] new build 3/28/2019 8:21 AM --- .../basic-level-windows-diagnostic-events-and-fields-1903.md | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/windows/privacy/basic-level-windows-diagnostic-events-and-fields-1903.md b/windows/privacy/basic-level-windows-diagnostic-events-and-fields-1903.md index 6d5138182b..76c72b91b1 100644 --- a/windows/privacy/basic-level-windows-diagnostic-events-and-fields-1903.md +++ b/windows/privacy/basic-level-windows-diagnostic-events-and-fields-1903.md @@ -13,7 +13,7 @@ manager: dansimp ms.collection: M365-security-compliance ms.topic: article audience: ITPro -ms.date: 03/27/2019 +ms.date: 03/28/2019 --- From fe66322f4c0cf05d89c157dbb5faa784b805af3c Mon Sep 17 00:00:00 2001 From: Brian Lich Date: Thu, 28 Mar 2019 08:21:21 -0700 Subject: [PATCH 096/724] new build 3/28/2019 8:21 AM --- ...ndows-diagnostic-events-and-fields-1703.md | 2 +- ...ndows-diagnostic-events-and-fields-1709.md | 2 +- ...ndows-diagnostic-events-and-fields-1803.md | 2 +- ...ndows-diagnostic-events-and-fields-1809.md | 74 +++++-------------- 4 files changed, 22 insertions(+), 58 deletions(-) diff --git a/windows/privacy/basic-level-windows-diagnostic-events-and-fields-1703.md b/windows/privacy/basic-level-windows-diagnostic-events-and-fields-1703.md index 1a4810d670..49791ce7a0 100644 --- a/windows/privacy/basic-level-windows-diagnostic-events-and-fields-1703.md +++ b/windows/privacy/basic-level-windows-diagnostic-events-and-fields-1703.md @@ -13,7 +13,7 @@ manager: dansimp ms.collection: M365-security-compliance ms.topic: article audience: ITPro -ms.date: 03/27/2019 +ms.date: 03/28/2019 --- diff --git a/windows/privacy/basic-level-windows-diagnostic-events-and-fields-1709.md b/windows/privacy/basic-level-windows-diagnostic-events-and-fields-1709.md index 0ca537440b..d6a6f6eaad 100644 --- a/windows/privacy/basic-level-windows-diagnostic-events-and-fields-1709.md +++ b/windows/privacy/basic-level-windows-diagnostic-events-and-fields-1709.md @@ -13,7 +13,7 @@ manager: dansimp ms.collection: M365-security-compliance ms.topic: article audience: ITPro -ms.date: 03/27/2019 +ms.date: 03/28/2019 --- diff --git a/windows/privacy/basic-level-windows-diagnostic-events-and-fields-1803.md b/windows/privacy/basic-level-windows-diagnostic-events-and-fields-1803.md index a2d892faf3..12fd625a8a 100644 --- a/windows/privacy/basic-level-windows-diagnostic-events-and-fields-1803.md +++ b/windows/privacy/basic-level-windows-diagnostic-events-and-fields-1803.md @@ -13,7 +13,7 @@ manager: dansimp ms.collection: M365-security-compliance ms.topic: article audience: ITPro -ms.date: 03/27/2019 +ms.date: 03/28/2019 --- diff --git a/windows/privacy/basic-level-windows-diagnostic-events-and-fields-1809.md b/windows/privacy/basic-level-windows-diagnostic-events-and-fields-1809.md index 8540ded6cf..60f70721cc 100644 --- a/windows/privacy/basic-level-windows-diagnostic-events-and-fields-1809.md +++ b/windows/privacy/basic-level-windows-diagnostic-events-and-fields-1809.md @@ -13,7 +13,7 @@ manager: dansimp ms.collection: M365-security-compliance ms.topic: article audience: ITPro -ms.date: 03/27/2019 +ms.date: 03/28/2019 --- @@ -2172,9 +2172,7 @@ The following fields are available: - **DefaultAppLanguage** The current user Default App Language. - **DisplayLanguage** The current user preferred Windows Display Language. - **HomeLocation** The current user location, which is populated using GetUserGeoId() function. -- **KeyboardInputLaîguages** No content is currently available. - **KeyboardInputLanguages** The Keyboard input languages installed on the device. -- **SpeechInputLalguages** No content is currently available. - **SpeechInputLanguages** The Speech Input languages installed on the device. @@ -2188,9 +2186,7 @@ The following fields are available: - **ActivityHistoryCloudSync** Current state of the activity history cloud sync setting. - **ActivityHistoryCollection** Current state of the activity history collection setting. - **AdvertisingId** Current state of the advertising ID setting. -- **AppDiagnostacs** No content is currently available. - **AppDiagnostics** Current state of the app diagnostics setting. -- **Appiagnostics** No content is currently available. - **Appointments** Current state of the calendar setting. - **Bluetooth** Current state of the Bluetooth capability setting. - **BluetoothSync** Current state of the Bluetooth sync capability setting. @@ -2202,26 +2198,21 @@ The following fields are available: - **Email** Current state of the email setting. - **GazeInput** Current state of the gaze input setting. - **HumanInterfaceDevice** Current state of the human interface device setting. -- **InkT9peImprovement** No content is currently available. -- **InkT9pePersonalization** No content is currently available. - **InkTypeImprovement** Current state of the improve inking and typing setting. - **InkTypePersonalization** Current state of the inking and typing personalization setting. - **Location** Current state of the location setting. - **LocationHistory** Current state of the location history setting. - **LocationHistoryCloudSync** Current state of the location history cloud synchronization setting. - **LocationHistoryOnTimeline** Current state of the location history on timeline setting. -- **Microphona** No content is currently available. - **Microphone** Current state of the microphone setting. - **PhoneCall** Current state of the phone call setting. - **PhoneCallHistory** Current state of the call history setting. - **PicturesLibrary** Current state of the pictures library setting. - **Radios** Current state of the radios setting. -- **SensorsÃustom** No content is currently available. - **SensorsCustom** Current state of the custom sensor setting. - **SerialCommunication** Current state of the serial communication setting. - **Sms** Current state of the text messaging setting. - **SpeechPersonalization** Current state of the speech services setting. -- **UqerDataTasks** No content is currently available. - **USB** Current state of the USB setting. - **UserAccountInformation** Current state of the account information setting. - **UserDataTasks** Current state of the tasks setting. @@ -2753,9 +2744,6 @@ The following fields are available: - **NetworkState** Retrieves the network state: 0 = No network. 1 = Restricted network. 2 = Free network. - **NoNetworkTime** Retrieves the time spent with no network (since the last time) in seconds. - **RestrictedNetworkTime** Retrieves the time spent on a metered (cost restricted) network in seconds. -- **捔祦⽌䱩⽪昫橷瘴場漸䤫〫洯硈㍈㡮⽯** No content is currently available. -- **⽫甸㑪摭橷捔橗⭪晙晅晣穹椸樷** No content is currently available. -- **䉪䌯䱏杄䬷㝐灌䩚㠯⽉䝲伹㡈㕉佤** No content is currently available. ### TelClientSynthetic.HeartBeat_5 @@ -2773,12 +2761,10 @@ The following fields are available: - **CriticalDataDbDroppedCount** Number of critical data sampled events dropped at the database layer. - **CriticalDataThrottleDroppedCount** The number of critical data sampled events that were dropped because of throttling. - **CriticalOverflowEntersCounter** Number of times critical overflow mode was entered in event DB. -- **CriticalOvErflowEntersCounter** No content is currently available. - **DbCriticalDroppedCount** Total number of dropped critical events in event DB. - **DbDroppedCount** Number of events dropped due to DB fullness. - **DbDroppedFailureCount** Number of events dropped due to DB failures. - **DbDroppedFullCount** Number of events dropped due to DB fullness. -- **DecndingDroppedCount** No content is currently available. - **DecodingDroppedCount** Number of events dropped due to decoding failures. - **EnteringCriticalOverflowDroppedCounter** Number of events dropped due to critical overflow mode being initiated. - **EtwDroppedBufferCount** Number of buffers dropped in the UTC ETW session. @@ -2792,21 +2778,16 @@ The following fields are available: - **EventsUploaded** Number of events uploaded. - **Flags** Flags indicating device state such as network state, battery state, and opt-in state. - **FullTriggerBufferDroppedCount** Number of events dropped due to trigger buffer being full. -- **FullTrigwerBufferDroppedCount** No content is currently available. - **HeartBeatSequenceNumber** The sequence number of this heartbeat. -- **InvalidH4BFCodeCount** No content is currently available. - **InvalidHttpCodeCount** Number of invalid HTTP codes received from contacting Vortex. - **LastAgentConnectionError** Last non-timeout error encountered in the host/agent channel. - **LastEventSizeOffender** Event name of last event which exceeded max event size. -- **LastInvalidH4BFCode** No content is currently available. - **LastInvalidHttpCode** Last invalid HTTP code received from Vortex. - **MaxActiveAgentConnectionCount** The maximum number of active agents during this heartbeat timeframe. - **MaxInUseScenarioCounter** Soft maximum number of scenarios loaded by UTC. - **PreviousHeartBeatTime** Time of last heartbeat event (allows chaining of events). - **PrivacyBlockedCount** The number of events blocked due to privacy settings or tags. - **RepeatedUploadFailureDropped** Number of events lost due to repeated upload failures for a single buffer. -- **SettingsH4BFAttempts** No content is currently available. -- **SettingsH4BFFailures** No content is currently available. - **SettingsHttpAttempts** Number of attempts to contact OneSettings service. - **SettingsHttpFailures** The number of failures from contacting the OneSettings service. - **ThrottledDroppedCount** Number of events dropped due to throttling of noisy providers. @@ -2814,16 +2795,10 @@ The following fields are available: - **UploaderDroppedCount** Number of events dropped at the uploader layer of telemetry client. - **UploaderErrorCount** Number of errors received from the upload endpoint. - **VortexFailuresTimeout** The number of timeout failures received from Vortex. -- **VortexH4BFAttempts** No content is currently available. -- **VortexH4BFFailures4xx** No content is currently available. -- **VortexH4BFFailures5xx** No content is currently available. -- **VortexH4BFResponseFailures** No content is currently available. -- **VortexH4BFResponsesWithDroppedEvents** No content is currently available. - **VortexHttpAttempts** Number of attempts to contact Vortex. - **VortexHttpFailures4xx** Number of 400-499 error codes received from Vortex. - **VortexHttpFailures5xx** Number of 500-599 error codes received from Vortex. - **VortexHttpResponseFailures** Number of Vortex responses that are not 2XX or 400. -- **VortexHttpResponsesWi|hDroppedEvents** No content is currently available. - **VortexHttpResponsesWithDroppedEvents** Number of Vortex responses containing at least 1 dropped event. @@ -3561,18 +3536,14 @@ The following fields are available: - **AppSessionGuid** GUID made up of process ID and is used as a correlation vector for process instances in the telemetry backend. - **AppTimeStamp** The date/time stamp of the app. - **AppVersion** The version of the app that has crashed. -- **AsFatal** No content is currently available. -- **Exceptio** No content is currently available. - **ExceptionCode** The exception code returned by the process that has crashed. - **ExceptionOffset** The address where the exception had occurred. - **Flags** Flags indicating how reporting is done. For example, queue the report, do not offer JIT debugging, or do not terminate the process after reporting. - **FriendlyAppName** The description of the app that has crashed, if different from the AppName. Otherwise, the process name. - **IsFatal** True/False to indicate whether the crash resulted in process termination. - **ModName** Exception module name (e.g. bar.dll). -- **ModTimestamp** No content is currently available. - **ModTimeStamp** The date/time stamp of the module. - **ModVersion** The version of the module that has crashed. -- **ode** No content is currently available. - **PackageFullName** Store application identity. - **PackageRelativeAppId** Store application identity. - **ProcessArchitecture** Architecture of the crashing process, as one of the PROCESSOR_ARCHITECTURE_* constants: 0: PROCESSOR_ARCHITECTURE_INTEL. 5: PROCESSOR_ARCHITECTURE_ARM. 9: PROCESSOR_ARCHITECTURE_AMD64. 12: PROCESSOR_ARCHITECTURE_ARM64. @@ -3580,7 +3551,6 @@ The following fields are available: - **ProcessId** The ID of the process that has crashed. - **ReportId** A GUID used to identify the report. This can used to track the report across Watson. - **TargetAppId** The kernel reported AppId of the application being reported. -- **targetAppVer** No content is currently available. - **TargetAppVer** The specific version of the application being reported - **TargetAsId** The sequence number for the hanging process. @@ -3642,7 +3612,6 @@ The following fields are available: - **FileSigningInfo** A count of file signing objects in cache. - **Generic** A count of generic objects in cache. - **HwItem** A count of hwitem objects in cache. -- **IentoryMiscellaneousOfficeAddIn** No content is currently available. - **InventoryApplication** A count of application objects in cache. - **InventoryApplicationAppV** A count of application AppV objects in cache. - **InventoryApplicationDriver** A count of application driver objects in cache @@ -3656,7 +3625,6 @@ The following fields are available: - **InventoryDeviceUsbHubClass** A count of device usb objects in cache - **InventoryDriverBinary** A count of driver binary objects in cache. - **InventoryDriverPackage** A count of device objects in cache. -- **InventoryMiscellaneiscellaneousOfficeInsights** No content is currently available. - **InventoryMiscellaneousOfficeAddIn** A count of office add-in objects in cache - **InventoryMiscellaneousOfficeAddInUsage** A count of office add-in usage objects in cache. - **InventoryMiscellaneousOfficeIdentifiers** A count of office identifier objects in cache @@ -3705,16 +3673,13 @@ The following fields are available: - **HiddenArp** Indicates whether a program hides itself from showing up in ARP. - **InstallDate** The date the application was installed (a best guess based on folder creation date heuristics). - **InstallDateArpLastModified** The date of the registry ARP key for a given application. Hints at install date but not always accurate. Passed as an array. Example: 4/11/2015 00:00:00 -- **InstallDateFromLincFile** No content is currently available. - **InstallDateFromLinkFile** The estimated date of install based on the links to the files. Passed as an array. - **InstallDateMsi** The install date if the application was installed via Microsoft Installer (MSI). Passed as an array. - **InventoryVersion** The version of the inventory file generating the events. - **Language** The language code of the program. -- **MsipackageCode** No content is currently available. - **MsiPackageCode** A GUID that describes the MSI Package. Multiple 'Products' (apps) can make up an MsiPackage. - **MsiProductCode** A GUID that describe the MSI Product. - **Name** The name of the application. -- **OSversionAtInstallTime** No content is currently available. - **OSVersionAtInstallTime** The four octets from the OS version at the time of the application's install. - **PackageFullName** The package full name for a Store application. - **ProgramInstanceId** A hash of the file IDs in an app. @@ -3722,7 +3687,6 @@ The following fields are available: - **RootDirPath** The path to the root directory where the program was installed. - **Source** How the program was installed (for example, ARP, MSI, Appx). - **StoreAppType** A sub-classification for the type of Microsoft Store app, such as UWP or Win8StoreApp. -- **type** No content is currently available. - **Type** One of ("Application", "Hotfix", "BOE", "Service", "Unknown"). Application indicates Win32 or Appx app, Hotfix indicates app updates (KBs), BOE indicates it's an app with no ARP or MSI entry, Service indicates that it is a service. Application and BOE are the ones most likely seen. - **Version** The version number of the program. @@ -3928,55 +3892,41 @@ This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedevic The following fields are available: -- **]pperClassFilters** No content is currently available. -- **basedata** No content is currently available. See [basedata](#basedata). -- **BusReportedDescraption** No content is currently available. - **BusReportedDescription** The description of the device reported by the bux. -- **BusReptrtedDescription** No content is currently available. -- **Clas{Guid** No content is currently available. - **Class** The device setup class of the driver loaded for the device. - **ClassGuid** The device class unique identifier of the driver package loaded on the device. - **COMPID** The list of “Compatible IDs” for this device. -- **Con|ainerId** No content is currently available. - **ContainerId** The system-supplied unique identifier that specifies which group(s) the device(s) installed on the parent (main) device belong to. -- **Descriptaon** No content is currently available. - **Description** The description of the device. -- **DeviceDriverFlightId** No content is currently available. -- **DeviceExtDriversFlightIds** No content is currently available. +- **DeviceDriverFlightId** The test build (Flight) identifier of the device driver. +- **DeviceExtDriversFlightIds** The test build (Flight) identifier for all extended device drivers. - **DeviceInterfaceClasses** The device interfaces that this device implements. - **DeviceState** Identifies the current state of the parent (main) device. -- **DriverAd** No content is currently available. - **DriverId** The unique identifier for the installed driver. - **DriverName** The name of the driver image file. - **DriverPackageStrongName** The immediate parent directory name in the Directory field of InventoryDriverPackage. -- **DriverVer^ersion** No content is currently available. - **DriverVerDate** The date associated with the driver installed on the device. - **DriverVerVersion** The version number of the driver installed on the device. - **Enumerator** Identifies the bus that enumerated the device. - **ExtendedInfs** The extended INF file names. -- **FirstInstallDate** No content is currently available. -- **H_ID** No content is currently available. +- **FirstInstallDate** The first time this device was installed on the machine. - **HWID** A list of hardware IDs for the device. - **Inf** The name of the INF file (possibly renamed by the OS, such as oemXX.inf). -- **InstallDate** No content is currently available. +- **InstallDate** The date of the most recent installation of the device on the machine. - **InstallState** The device installation state. For a list of values, see: https://msdn.microsoft.com/en-us/library/windows/hardware/ff543130.aspx - **InventoryVersion** The version number of the inventory process generating the events. - **LowerClassFilters** The identifiers of the Lower Class filters installed for the device. - **LowerFilters** The identifiers of the Lower filters installed for the device. - **Manufacturer** The manufacturer of the device. -- **MatchangID** No content is currently available. - **MatchingID** The Hardware ID or Compatible ID that Windows uses to install a device instance. -- **Modeh** No content is currently available. - **Model** Identifies the model of the device. - **ParentId** The Device Instance ID of the parent of the device. - **ProblemCode** The error code currently returned by the device, if applicable. -- **ProblmmCode** No content is currently available. - **Provider** Identifies the device provider. - **Service** The name of the device service. - **STACKID** The list of hardware IDs for the stack. - **UpperClassFilters** The identifiers of the Upper Class filters installed for the device. - **UpperFilters** The identifiers of the Upper filters installed for the device. -- **UpxerClassFilters** No content is currently available. ### Microsoft.Windows.Inventory.Core.InventoryDevicePnpRemove @@ -4779,6 +4729,20 @@ The following fields are available: - **winInetError** The HResult of the operation. +## Other events + +### Microsoft.Windows.MigrationCore.MigObjectCountKFSys + +No content is currently available. + +The following fields are available: + +- **knownFolderLoc->DirName->CString** No content is currently available. +- **knownFoldersSys[i]** No content is currently available. +- **migDiagSession->CString** No content is currently available. +- **objectCount** No content is currently available. + + ## Privacy consent logging events ### Microsoft.Windows.Shell.PrivacyConsentLogging.PrivacyConsentCompleted From 39f90cf585d3cf0746fc039bc5a43dfb63d6f01b Mon Sep 17 00:00:00 2001 From: Jeanie Decker Date: Thu, 28 Mar 2019 11:57:38 -0700 Subject: [PATCH 097/724] updates for my task 3180695 --- windows/configuration/kiosk-single-app.md | 2 +- .../mobile-devices/provisioning-configure-mobile.md | 2 +- .../provision-pcs-for-initial-deployment.md | 2 +- windows/deployment/vda-subscription-activation.md | 2 +- 4 files changed, 4 insertions(+), 4 deletions(-) diff --git a/windows/configuration/kiosk-single-app.md b/windows/configuration/kiosk-single-app.md index 439acaa52b..7aba6dd11a 100644 --- a/windows/configuration/kiosk-single-app.md +++ b/windows/configuration/kiosk-single-app.md @@ -203,7 +203,7 @@ When you use the **Provision kiosk devices** wizard in Windows Configuration Des - + diff --git a/windows/configuration/mobile-devices/provisioning-configure-mobile.md b/windows/configuration/mobile-devices/provisioning-configure-mobile.md index 141db07726..ee0785c38d 100644 --- a/windows/configuration/mobile-devices/provisioning-configure-mobile.md +++ b/windows/configuration/mobile-devices/provisioning-configure-mobile.md @@ -44,7 +44,7 @@ The **Provision Windows mobile devices** wizard lets you configure common settin
![step one](images/one.png)![set up device](images/set-up-device.png)

Enable device setup if you want to configure settings on this page.

**If enabled:**

Enter a name for the device.

(Optional) Select a license file to upgrade Windows 10 to a different edition. [See the permitted upgrades.](https://technet.microsoft.com/itpro/windows/deploy/windows-10-edition-upgrades)

Toggle **Configure devices for shared use** off. This setting optimizes Windows 10 for shared use scenarios and isn't necessary for a kiosk scenario.

You can also select to remove pre-installed software from the device.
![device name, upgrade to enterprise, shared use, remove pre-installed software](images/set-up-device-details.png)
![step two](images/two.png) ![set up network](images/set-up-network.png)

Enable network setup if you want to configure settings on this page.

**If enabled:**

Toggle **On** or **Off** for wireless network connectivity. If you select **On**, enter the SSID, the network type (**Open** or **WPA2-Personal**), and (if **WPA2-Personal**) the password for the wireless network.
![Enter network SSID and type](images/set-up-network-details.png)
![step three](images/three.png) ![account management](images/account-management.png)

Enable account management if you want to configure settings on this page.

**If enabled:**

You can enroll the device in Active Directory, enroll in Azure Active Directory, or create a local administrator account on the device

To enroll the device in Active Directory, enter the credentials for a least-privileged user account to join the device to the domain.

Before you use a Windows Configuration Designer wizard to configure bulk Azure AD enrollment, [set up Azure AD join in your organization](https://docs.microsoft.com/azure/active-directory/active-directory-azureadjoin-setup). The **maximum number of devices per user** setting in your Azure AD tenant determines how many times the bulk token that you get in the wizard can be used. To enroll the device in Azure AD, select that option and enter a friendly name for the bulk token you will get using the wizard. Set an expiration date for the token (maximum is 30 days from the date you get the token). Click **Get bulk token**. In the **Let's get you signed in** window, enter an account that has permissions to join a device to Azure AD, and then the password. Click **Accept** to give Windows Configuration Designer the necessary permissions.

**Warning:** You must run Windows Configuration Designer on Windows 10 to configure Azure Active Directory enrollment using any of the wizards.

To create a local administrator account, select that option and enter a user name and password.

**Important:** If you create a local account in the provisioning package, you must change the password using the **Settings** app every 42 days. If the password is not changed during that period, the account might be locked out and unable to sign in.
![join Active Directory, Azure AD, or create a local admin account](images/account-management-details.png)
![step three](images/three.png) ![account management](images/account-management.png)

Enable account management if you want to configure settings on this page.

**If enabled:**

You can enroll the device in Active Directory, enroll in Azure Active Directory, or create a local administrator account on the device

To enroll the device in Active Directory, enter the credentials for a least-privileged user account to join the device to the domain.

Before you use a Windows Configuration Designer wizard to configure bulk Azure AD enrollment, [set up Azure AD join in your organization](https://docs.microsoft.com/azure/active-directory/active-directory-azureadjoin-setup). The **maximum number of devices per user** setting in your Azure AD tenant determines how many times the bulk token that you get in the wizard can be used. To enroll the device in Azure AD, select that option and enter a friendly name for the bulk token you will get using the wizard. Set an expiration date for the token (maximum is 180 days from the date you get the token). Click **Get bulk token**. In the **Let's get you signed in** window, enter an account that has permissions to join a device to Azure AD, and then the password. Click **Accept** to give Windows Configuration Designer the necessary permissions.

**Warning:** You must run Windows Configuration Designer on Windows 10 to configure Azure Active Directory enrollment using any of the wizards.

To create a local administrator account, select that option and enter a user name and password.

**Important:** If you create a local account in the provisioning package, you must change the password using the **Settings** app every 42 days. If the password is not changed during that period, the account might be locked out and unable to sign in.
![join Active Directory, Azure AD, or create a local admin account](images/account-management-details.png)
![step four](images/four.png) ![add applications](images/add-applications.png)

You can provision the kiosk app in the **Add applications** step. You can install multiple applications, both Windows desktop applications (Win32) and Universal Windows Platform (UWP) apps, in a provisioning package. The settings in this step vary according to the application that you select. For help with the settings, see [Provision PCs with apps](provisioning-packages/provision-pcs-with-apps.md)

**Warning:** If you click the plus button to add an application, you must specify an application for the provisioning package to validate. If you click the plus button in error, select any executable file in **Installer Path**, and then a **Cancel** button becomes available, allowing you to complete the provisioning package without an application.
![add an application](images/add-applications-details.png)
![step five](images/five.png) ![add certificates](images/add-certificates.png)

To provision the device with a certificate for the kiosk app, click **Add a certificate**. Enter a name for the certificate, and then browse to and select the certificate to be used.
![add a certificate](images/add-certificates-details.png)
![step six](images/six.png) ![Configure kiosk account and app](images/kiosk-account.png)

You can create a local standard user account that will be used to run the kiosk app. If you toggle **No**, make sure that you have an existing user account to run the kiosk app.

If you want to create an account, enter the user name and password, and then toggle **Yes** or **No** to automatically sign in the account when the device starts. (If you encounter issues with auto sign-in after you apply the provisioning package, check the Event Viewer logs for auto logon issues under **Applications and Services Logs\Microsoft\Windows\Authentication User Interface\Operational**.)

In **Configure the kiosk mode app**, enter the name of the user account that will run the kiosk mode app. Select the type of app to run in kiosk mode, and then enter the path or filename (for a Windows desktop application) or the AUMID (for a Universal Windows app). For a Windows desktop application, you can use the filename if the path to the file is in the PATH environment variable, otherwise the full path is required.
![Configure kiosk account and app](images/kiosk-account-details.png)
- +
![step one](../images/one.png)![set up device](../images/set-up-device-mobile.png)

Enter a device name.

Optionally, you can enter a product key to upgrade the device from Windows 10 Mobile to Windows 10 Mobile Enterprise.
![device name, upgrade license](../images/set-up-device-details-mobile.png)
![step two](../images/two.png) ![set up network](../images/set-up-network-mobile.png)

Toggle **On** or **Off** for wireless network connectivity.

If you select **On**, enter the SSID, network type (**Open** or **WPA2-Personal**), and (if **WPA2-Personal**) the password for the wireless network.
![Enter network SSID and type](../images/set-up-network-details-mobile.png)
![step three](../images/three.png) ![bulk enrollment in Azure Active Directory](../images/bulk-enroll-mobile.png)

Before you use a Windows Configuration Designer wizard to configure bulk Azure AD enrollment, [set up Azure AD join in your organization](https://docs.microsoft.com/azure/active-directory/active-directory-azureadjoin-setup). The **maximum number of devices per user** setting in your Azure AD tenant determines how many times the bulk token that you get in the wizard can be used.

Set an expiration date for the token (maximum is 30 days from the date you get the token). Click **Get bulk token**. In the **Let's get you signed in** window, enter an account that has permissions to join a device to Azure AD, and then the password. Click **Accept** to give Windows Configuration Designer the necessary permissions.

**Warning:** You must run Windows Configuration Designer on Windows 10 to configure Azure Active Directory enrollment using any of the wizards.
![Enter expiration and get bulk token](../images/bulk-enroll-mobile-details.png)
![step three](../images/three.png) ![bulk enrollment in Azure Active Directory](../images/bulk-enroll-mobile.png)

Before you use a Windows Configuration Designer wizard to configure bulk Azure AD enrollment, [set up Azure AD join in your organization](https://docs.microsoft.com/azure/active-directory/active-directory-azureadjoin-setup). The **maximum number of devices per user** setting in your Azure AD tenant determines how many times the bulk token that you get in the wizard can be used.

Set an expiration date for the token (maximum is 180 days from the date you get the token). Click **Get bulk token**. In the **Let's get you signed in** window, enter an account that has permissions to join a device to Azure AD, and then the password. Click **Accept** to give Windows Configuration Designer the necessary permissions.

**Warning:** You must run Windows Configuration Designer on Windows 10 to configure Azure Active Directory enrollment using any of the wizards.
![Enter expiration and get bulk token](../images/bulk-enroll-mobile-details.png)
![step four](../images/four.png) ![finish](../images/finish-mobile.png)

You can set a password to protect your provisioning package. You must enter this password when you apply the provisioning package to a device.
![Protect your package](../images/finish-details-mobile.png)
diff --git a/windows/configuration/provisioning-packages/provision-pcs-for-initial-deployment.md b/windows/configuration/provisioning-packages/provision-pcs-for-initial-deployment.md index 9979020ba7..13941c3e8f 100644 --- a/windows/configuration/provisioning-packages/provision-pcs-for-initial-deployment.md +++ b/windows/configuration/provisioning-packages/provision-pcs-for-initial-deployment.md @@ -81,7 +81,7 @@ Use the Windows Configuration Designer tool to create a provisioning package. [L - + diff --git a/windows/deployment/vda-subscription-activation.md b/windows/deployment/vda-subscription-activation.md index 52d00d7f17..bc7249bb71 100644 --- a/windows/deployment/vda-subscription-activation.md +++ b/windows/deployment/vda-subscription-activation.md @@ -88,7 +88,7 @@ For examples of activation issues, see [Troubleshoot the user experience](https: ## Azure Active Directory-joined VMs >[!IMPORTANT] ->Azure Active Directory (Azure AD) provisioning packages have a 30 day limit on bulk token usage. You will need to update the provisioning package and re-inject it into the image after 30 days. Existing virtual machines that are Azure AD-joined and deployed will not need to be recreated. +>Azure Active Directory (Azure AD) provisioning packages have a 180 day limit on bulk token usage. You will need to update the provisioning package and re-inject it into the image after 180 days. Existing virtual machines that are Azure AD-joined and deployed will not need to be recreated. For Azure AD-joined VMs, follow the same instructions (above) as for [Active Directory-joined VMs](#active-directory-joined-vms) with the following exceptions: - In step 9, during setup with Windows Configuration Designer, under **Name**, type a name for the project that indicates it is not for Active Directory joined VMs, such as **Desktop Bulk Enrollment Token Pro GVLK**. From d8006946d7a35a9a85b3fa33e5a22ddab662096e Mon Sep 17 00:00:00 2001 From: Jeanie Decker Date: Fri, 29 Mar 2019 07:59:34 -0700 Subject: [PATCH 098/724] task 3180700 --- .../configuration/configure-windows-10-taskbar.md | 12 +++++++++++- 1 file changed, 11 insertions(+), 1 deletion(-) diff --git a/windows/configuration/configure-windows-10-taskbar.md b/windows/configuration/configure-windows-10-taskbar.md index 6d89596e32..9439d40848 100644 --- a/windows/configuration/configure-windows-10-taskbar.md +++ b/windows/configuration/configure-windows-10-taskbar.md @@ -9,7 +9,7 @@ author: jdeckerms ms.author: jdecker ms.topic: article ms.localizationpriority: medium -ms.date: 01/18/2018 +ms.date: 05/21/2019 --- # Configure Windows 10 taskbar @@ -315,6 +315,16 @@ The resulting taskbar for computers in any other country region: + + + + + + + + + + ``` From cfac8ae6fcfba81d9c6004d129253f1558d4b200 Mon Sep 17 00:00:00 2001 From: Jeanie Decker Date: Fri, 29 Mar 2019 09:05:12 -0700 Subject: [PATCH 099/724] Revert "task 3180700" This reverts commit d8006946d7a35a9a85b3fa33e5a22ddab662096e. --- .../configuration/configure-windows-10-taskbar.md | 12 +----------- 1 file changed, 1 insertion(+), 11 deletions(-) diff --git a/windows/configuration/configure-windows-10-taskbar.md b/windows/configuration/configure-windows-10-taskbar.md index 9439d40848..6d89596e32 100644 --- a/windows/configuration/configure-windows-10-taskbar.md +++ b/windows/configuration/configure-windows-10-taskbar.md @@ -9,7 +9,7 @@ author: jdeckerms ms.author: jdecker ms.topic: article ms.localizationpriority: medium -ms.date: 05/21/2019 +ms.date: 01/18/2018 --- # Configure Windows 10 taskbar @@ -315,16 +315,6 @@ The resulting taskbar for computers in any other country region: - - - - - - - - - - ``` From 6d6481535f028c25e3d706ae7cebbed2a263c278 Mon Sep 17 00:00:00 2001 From: Brian Lich Date: Fri, 29 Mar 2019 13:15:15 -0700 Subject: [PATCH 100/724] new build 3/29/2019 1:15 PM --- .../basic-level-windows-diagnostic-events-and-fields-1903.md | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/windows/privacy/basic-level-windows-diagnostic-events-and-fields-1903.md b/windows/privacy/basic-level-windows-diagnostic-events-and-fields-1903.md index 76c72b91b1..f91d4a0548 100644 --- a/windows/privacy/basic-level-windows-diagnostic-events-and-fields-1903.md +++ b/windows/privacy/basic-level-windows-diagnostic-events-and-fields-1903.md @@ -13,7 +13,7 @@ manager: dansimp ms.collection: M365-security-compliance ms.topic: article audience: ITPro -ms.date: 03/28/2019 +ms.date: 03/29/2019 --- From 8c5178c35dc73447dbac3b204c0a75ec8a9207d8 Mon Sep 17 00:00:00 2001 From: Brian Lich Date: Fri, 29 Mar 2019 13:15:20 -0700 Subject: [PATCH 101/724] new build 3/29/2019 1:15 PM --- ...ndows-diagnostic-events-and-fields-1703.md | 2 +- ...ndows-diagnostic-events-and-fields-1709.md | 2 +- ...ndows-diagnostic-events-and-fields-1803.md | 2 +- ...ndows-diagnostic-events-and-fields-1809.md | 55 ++----------------- 4 files changed, 9 insertions(+), 52 deletions(-) diff --git a/windows/privacy/basic-level-windows-diagnostic-events-and-fields-1703.md b/windows/privacy/basic-level-windows-diagnostic-events-and-fields-1703.md index 49791ce7a0..b5c2cbf517 100644 --- a/windows/privacy/basic-level-windows-diagnostic-events-and-fields-1703.md +++ b/windows/privacy/basic-level-windows-diagnostic-events-and-fields-1703.md @@ -13,7 +13,7 @@ manager: dansimp ms.collection: M365-security-compliance ms.topic: article audience: ITPro -ms.date: 03/28/2019 +ms.date: 03/29/2019 --- diff --git a/windows/privacy/basic-level-windows-diagnostic-events-and-fields-1709.md b/windows/privacy/basic-level-windows-diagnostic-events-and-fields-1709.md index d6a6f6eaad..800377e966 100644 --- a/windows/privacy/basic-level-windows-diagnostic-events-and-fields-1709.md +++ b/windows/privacy/basic-level-windows-diagnostic-events-and-fields-1709.md @@ -13,7 +13,7 @@ manager: dansimp ms.collection: M365-security-compliance ms.topic: article audience: ITPro -ms.date: 03/28/2019 +ms.date: 03/29/2019 --- diff --git a/windows/privacy/basic-level-windows-diagnostic-events-and-fields-1803.md b/windows/privacy/basic-level-windows-diagnostic-events-and-fields-1803.md index 12fd625a8a..e22d5344bb 100644 --- a/windows/privacy/basic-level-windows-diagnostic-events-and-fields-1803.md +++ b/windows/privacy/basic-level-windows-diagnostic-events-and-fields-1803.md @@ -13,7 +13,7 @@ manager: dansimp ms.collection: M365-security-compliance ms.topic: article audience: ITPro -ms.date: 03/28/2019 +ms.date: 03/29/2019 --- diff --git a/windows/privacy/basic-level-windows-diagnostic-events-and-fields-1809.md b/windows/privacy/basic-level-windows-diagnostic-events-and-fields-1809.md index 60f70721cc..6c3abb47aa 100644 --- a/windows/privacy/basic-level-windows-diagnostic-events-and-fields-1809.md +++ b/windows/privacy/basic-level-windows-diagnostic-events-and-fields-1809.md @@ -13,7 +13,7 @@ manager: dansimp ms.collection: M365-security-compliance ms.topic: article audience: ITPro -ms.date: 03/28/2019 +ms.date: 03/29/2019 --- @@ -3983,7 +3983,6 @@ This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedevic The following fields are available: -- **DrivdrCompany** No content is currently available. - **DriverCheckSum** The checksum of the driver file. - **DriverCompany** The company name that developed the driver. - **DriverInBox** Is the driver included with the operating system? @@ -3995,15 +3994,12 @@ The following fields are available: - **DriverType** A bitfield of driver attributes: 1. define DRIVER_MAP_DRIVER_TYPE_PRINTER 0x0001. 2. define DRIVER_MAP_DRIVER_TYPE_KERNEL 0x0002. 3. define DRIVER_MAP_DRIVER_TYPE_USER 0x0004. 4. define DRIVER_MAP_DRIVER_IS_SIGNED 0x0008. 5. define DRIVER_MAP_DRIVER_IS_INBOX 0x0010. 6. define DRIVER_MAP_DRIVER_IS_WINQUAL 0x0040. 7. define DRIVER_MAP_DRIVER_IS_SELF_SIGNED 0x0020. 8. define DRIVER_MAP_DRIVER_IS_CI_SIGNED 0x0080. 9. define DRIVER_MAP_DRIVER_HAS_BOOT_SERVICE 0x0100. 10. define DRIVER_MAP_DRIVER_TYPE_I386 0x10000. 11. define DRIVER_MAP_DRIVER_TYPE_IA64 0x20000. 12. define DRIVER_MAP_DRIVER_TYPE_AMD64 0x40000. 13. define DRIVER_MAP_DRIVER_TYPE_ARM 0x100000. 14. define DRIVER_MAP_DRIVER_TYPE_THUMB 0x200000. 15. define DRIVER_MAP_DRIVER_TYPE_ARMNT 0x400000. 16. define DRIVER_MAP_DRIVER_IS_TIME_STAMPED 0x800000. - **DriverVersion** The version of the driver file. - **ImageSize** The size of the driver file. -- **ImageSmze** No content is currently available. - **Inf** The name of the INF file. - **InventoryVersion** The version of the inventory file generating the events. - **Product** The product name that is included in the driver file. - **ProductVersion** The product version that is included in the driver file. - **Service** The name of the service that is installed for the device. - **WdfVersion** The Windows Driver Framework version. -- **WdfVers-on** No content is currently available. -- **WdfVersÿon** No content is currently available. ### Microsoft.Windows.Inventory.Core.InventoryDriverBinaryRemove @@ -4254,7 +4250,6 @@ The following fields are available: - **OfficeApplication** The name of the Office application. - **OfficeArchitecture** The bitness of the Office application. - **OfficeVersion** The version of the Office application. -- **Valóe** No content is currently available. - **Value** The insights collected about this entity. @@ -4521,8 +4516,6 @@ OS information collected during Boot, used to evaluate the success of the upgrad The following fields are available: -- **Boo|ApplicationId** No content is currently available. -- **BootApplicataonId** No content is currently available. - **BootApplicationId** This field tells us what the OS Loader Application Identifier is. - **BootAttemptCount** The number of consecutive times the boot manager has attempted to boot into this operating system. - **BootSequence** The current Boot ID, used to correlate events related to a particular boot session. @@ -4704,9 +4697,7 @@ This event sends information describing the result of the update. The following fields are available: -- **br** No content is currently available. - **hr** The HResult of the operation. -- **IsLoggingE~abled** No content is currently available. - **IsLoggingEnabled** Indicates whether logging is enabled for the updater. - **UpdaterVersion** The version of the updater. @@ -4733,14 +4724,13 @@ The following fields are available: ### Microsoft.Windows.MigrationCore.MigObjectCountKFSys -No content is currently available. +This event returns data about the count of the migration objects across various phases during feature update. The following fields are available: -- **knownFolderLoc->DirName->CString** No content is currently available. -- **knownFoldersSys[i]** No content is currently available. -- **migDiagSession->CString** No content is currently available. -- **objectCount** No content is currently available. +- **knownFoldersSys[i]** The predefined folder path locations. +- **migDiagSession->CString** Identifies the phase of the upgrade where migration happens. +- **objectCount** The count of the number of objects that are being transferred. ## Privacy consent logging events @@ -4787,6 +4777,7 @@ The following fields are available: - **fileName** The file name where the failure occurred. - **function** The function where the failure occurred. - **hresult** The HResult of the overall activity. +- **hrutTyp** No content is currently available. - **lineNumber** The line number where the failure occurred. - **message** The message of the failure that occurred. - **module** The module where the failure occurred. @@ -4907,7 +4898,6 @@ The following fields are available: - **DeviceModel** What is the device model. - **DriverError** The error code hit during a driver scan. This is 0 if no error was encountered. - **DriverExclusionPolicy** Indicates if the policy for not including drivers with Windows Update is enabled. -- **DriverGxclusionPolicy** No content is currently available. - **DriverSyncPassPerformed** Were drivers scanned this time? - **EventInstanceID** A globally unique identifier for event instance. - **EventScenario** Indicates the purpose of sending this event - whether because the software distribution just started checking for content, or whether it was cancelled, succeeded, or failed. @@ -4917,24 +4907,19 @@ The following fields are available: - **FailedUpdatesCount** The number of updates that failed to be evaluated during the scan. - **FeatureUpdateDeferral** The deferral period configured for feature OS updates on the device (in days). - **FeatureUpdatePause** Indicates whether feature OS updates are paused on the device. -- **FeatureUpdatePause9-8iod** No content is currently available. - **FeatureUpdatePausePeriod** The pause duration configured for feature OS updates on the device (in days). - **FlightBranch** The branch that a device is on if participating in flighting (pre-release builds). - **FlightRing** The ring (speed of getting builds) that a device is on if participating in flighting (pre-release builds). - **HomeMobileOperator** The mobile operator that the device was originally intended to work with. -- **I#Version** No content is currently available. - **IntentPFNs** Intended application-set metadata for atomic update scenarios. - **IPVersion** Indicates whether the download took place over IPv4 or IPv6 - **IsWUfBDualScanEnabled** Indicates if Windows Update for Business dual scan is enabled on the device. -- **IsWUfBDualScaninabled** No content is currently available. - **IsWUfBEnabled** Indicates if Windows Update for Business is enabled on the device. - **IsWUfBFederatedScanDisabled** Indicates if Windows Update for Business federated scan is disabled on the device. -- **IsWUfBinabled** No content is currently available. - **MetadataIntegrityMode** The mode of the update transport metadata integrity check. 0-Unknown, 1-Ignoe, 2-Audit, 3-Enforce - **MSIError** The last error that was encountered during a scan for updates. - **NetworkConnectivityDetected** Indicates the type of network connectivity that was detected. 0 - IPv4, 1 - IPv6 - **NumberOfApplicableUpdates** The number of updates which were ultimately deemed applicable to the system after the detection process is complete -- **NumberOfApplicationsCategoryScanEval}ated** No content is currently available. - **NumberOfApplicationsCategoryScanEvaluated** The number of categories (apps) for which an app update scan checked - **NumberOfLoop** The number of round trips the scan required - **NumberOfNewUpdatesFromServiceSync** The number of updates which were seen for the first time in this scan @@ -4950,14 +4935,10 @@ The following fields are available: - **ProcessName** The process name of the caller who initiated API calls, in the event where CallerApplicationName was not provided. - **QualityUpdateDeferral** The deferral period configured for quality OS updates on the device (in days). - **QualityUpdatePause** Indicates whether quality OS updates are paused on the device. -- **QualityUpdatePause9-8iod** No content is currently available. - **QualityUpdatePausePeriod** The pause duration configured for quality OS updates on the device (in days). - **RelatedCV** The previous Correlation Vector that was used before swapping with a new one -- **S}ncType** No content is currently available. -- **ScanDuratioInSeconds** No content is currently available. - **ScanDurationInSeconds** The number of seconds a scan took - **ScanEnqueueTime** The number of seconds it took to initialize a scan -- **ScanPrps** No content is currently available. - **ScanProps** This is a 32-bit integer containing Boolean properties for a given Windows Update scan. The following bits are used; all remaining bits are reserved and set to zero. Bit 0 (0x1): IsInteractive - is set to 1 if the scan is requested by a user, or 0 if the scan is requested by Automatic Updates. Bit 1 (0x2): IsSeeker - is set to 1 if the Windows Update client's Seeker functionality is enabled. Seeker functionality is enabled on certain interactive scans, and results in the scans returning certain updates that are in the initial stages of release (not yet released for full adoption via Automatic Updates). - **ServiceGuid** An ID which represents which service the software distribution client is checking for content (Windows Update, Microsoft Store, etc.). - **ServiceUrl** The environment URL a device is configured to scan with @@ -4967,7 +4948,6 @@ The following fields are available: - **SystemBIOSMajorRelease** Major version of the BIOS. - **SystemBIOSMinorRelease** Minor version of the BIOS. - **TargetMetadataVersion** For self-initiated healing, this is the target version of the SIH engine to download (if needed). If not, the value is null. -- **TotalNumMetadataSignatureM** No content is currently available. - **TotalNumMetadataSignatures** The total number of metadata signatures checks done for new metadata that was synced down. - **WebServiceRetryMethods** Web service method requests that needed to be retried to complete operation. - **WUDeviceID** The unique identifier of a specific device, used to identify how many devices are encountering success or a particular issue. @@ -5015,8 +4995,6 @@ The following fields are available: - **AppXBlockHashValidationFailureCount** A count of the number of blocks that have failed validation after being downloaded. - **AppXDownloadScope** Indicates the scope of the download for application content. - **AppXScope** Indicates the scope of the app download. -- **aundleBy1esDownl?aded** No content is currently available. -- **B1ndleRepeatFailCount** No content is currently available. - **BiosFamily** The family of the BIOS (Basic Input Output System). - **BiosName** The name of the device BIOS. - **BiosReleaseDate** The release date of the device BIOS. @@ -5031,7 +5009,6 @@ The following fields are available: - **BytesDownloaded** Number of bytes that were downloaded for an individual piece of content (not the entire bundle). - **CachedEngineVersion** The version of the “Self-Initiated Healing” (SIH) engine that is cached on the device, if applicable. - **CallerApplicationName** The name provided by the application that initiated API calls into the software distribution client. -- **Cbs5ethod** No content is currently available. - **CbsDownloadMethod** Indicates whether the download was a full- or a partial-file download. - **CbsMethod** The method used for downloading the update content related to the Component Based Servicing (CBS) technology. - **CDNCountryCode** Two letter country abbreviation for the Content Distribution Network (CDN) location. @@ -5045,13 +5022,11 @@ The following fields are available: - **DownloadProps** Information about the download operation properties in the form of a bitmask. - **DownloadType** Differentiates the download type of “Self-Initiated Healing” (SIH) downloads between Metadata and Payload downloads. - **EventInstanceID** A globally unique identifier for event instance. -- **EventScenarao** No content is currently available. - **EventScenario** Indicates the purpose for sending this event: whether because the software distribution just started downloading content; or whether it was cancelled, succeeded, or failed. - **EventType** Identifies the type of the event (Child, Bundle, or Driver). - **ExtendedStatusCode** Secondary error code for certain scenarios where StatusCode wasn't specific enough. - **FeatureUpdatePause** Indicates whether feature OS updates are paused on the device. - **FlightBranch** The branch that a device is on if participating in flighting (pre-release builds). -- **flightBuildNumber** No content is currently available. - **FlightBuildNumber** If this download was for a flight (pre-release build), this indicates the build number of that flight. - **FlightId** The specific ID of the flight (pre-release build) the device is getting. - **FlightRing** The ring (speed of getting builds) that a device is on if participating in flighting (pre-release builds). @@ -5063,8 +5038,6 @@ The following fields are available: - **IsDependentSet** Indicates whether a driver is a part of a larger System Hardware/Firmware Update - **IsWUfBDualScanEnabled** Indicates if Windows Update for Business dual scan is enabled on the device. - **IsWUfBEnabled** Indicates if Windows Update for Business is enabled on the device. -- **IsWVfBDualScanEnabled** No content is currently available. -- **IsWVfBEnabled** No content is currently available. - **NetworkCost** A flag indicating the cost of the network (congested, fixed, variable, over data limit, roaming, etc.) used for downloading the update content. - **NetworkCostBitMask** Indicates what kind of network the device is connected to (roaming, metered, over data cap, etc.) - **NetworkRestrictionStatus** More general version of NetworkCostBitMask, specifying whether Windows considered the current network to be "metered." @@ -5075,10 +5048,8 @@ The following fields are available: - **QualityUpdatePause** Indicates whether quality OS updates are paused on the device. - **Reason** A 32-bit integer representing the reason the update is blocked from being downloaded in the background. - **RegulationReason** The reason that the update is regulated -- **RegulationReóult** No content is currently available. - **RegulationResult** The result code (HResult) of the last attempt to contact the regulation web service for download regulation of update content. - **RelatedCV** The Correlation Vector that was used before the most recent change to a new Correlation Vector. -- **RelqtedCV** No content is currently available. - **RepeatFailCount** Indicates whether this specific content has previously failed. - **RepeatFailFlag** Indicates whether this specific content previously failed to download. - **RevisionNumber** The revision number of the specified piece of content. @@ -5094,16 +5065,13 @@ The following fields are available: - **TargetMetadataVersion** The version of the currently downloading (or most recently downloaded) package. - **ThrottlingServiceHResult** Result code (success/failure) while contacting a web service to determine whether this device should download content yet. - **TimeToEstablishConnection** Time (in milliseconds) it took to establish the connection prior to beginning downloaded. -- **TotalEx8ectedBydes** No content is currently available. - **TotalExpectedBytes** The total size (in Bytes) expected to be downloaded. - **UpdateId** An identifier associated with the specific piece of content. - **UpdateID** An identifier associated with the specific piece of content. - **UpdateImportance** Indicates whether the content was marked as Important, Recommended, or Optional. -- **UsecDO** No content is currently available. - **UsedDO** Indicates whether the download used the Delivery Optimization (DO) service. - **UsedSystemVolume** Indicates whether the content was downloaded to the device's main system storage drive, or an alternate storage drive. - **WUDeviceID** The unique identifier of a specific device, used to identify how many devices are encountering success or a particular issue. -- **YsWUfBEnabled** No content is currently available. ### SoftwareUpdateClientTelemetry.DownloadCheckpoint @@ -5223,7 +5191,6 @@ The following fields are available: - **SystemBIOSMajorRelease** Major version of the BIOS. - **SystemBIOSMinorRelease** Minor version of the BIOS. - **TargetGroupId** For drivers targeted to a specific device model, this ID indicates the distribution group of devices receiving that driver. -- **Targeti~gVersion** No content is currently available. - **TargetingVersion** For drivers targeted to a specific device model, this is the version number of the drivers being distributed to the device. - **TransactionCode** The ID that represents a given MSI installation. - **UpdateId** Unique update ID. @@ -5347,7 +5314,6 @@ The following fields are available: - **ApplicableUpdateInfo** Metadata for the updates which were detected as applicable. - **CallerApplicationName** The name provided by the caller who initiated API calls into the software distribution client. - **IntentPFNs** Intended application-set metadata for atomic update scenarios. -- **NumberOfA0plicableUpdates** No content is currently available. - **NumberOfApplicableUpdates** The number of updates ultimately deemed applicable to the system after the detection process is complete. - **RelatedCV** The previous Correlation Vector that was used before swapping with a new one. - **ServiceGuid** An ID that represents which service the software distribution client is connecting to (Windows Update, Microsoft Store, etc.). @@ -5465,7 +5431,6 @@ The following fields are available: - **InternalFailureResult** Indicates a non-fatal error from a plugin. - **ObjectId** Unique value for each Update Agent mode (same concept as InstanceId for Setup360). - **PackageCategoriesSkipped** Indicates package categories that were skipped, if applicable. -- **PackageCCoegoriesSkipped** No content is currently available. - **PackageCountOptional** Number of optional packages requested. - **PackageCountRequired** Number of required packages requested. - **PackageCountTotal** Total number of packages needed. @@ -5478,7 +5443,6 @@ The following fields are available: - **PackageSizeDiff** Size of diff packages in bytes. - **PackageSizeExpress** Size of express packages in bytes. - **PackageSizePSFX** The size of PSFX packages, in bytes. -- **RangeRequestSsCoe** No content is currently available. - **RangeRequestState** Indicates the range request type used. - **RelatedCV** Correlation vector value generated from the latest USO scan. - **Result** Outcome of the download request phase of update. @@ -6337,7 +6301,6 @@ This event is sent after a scan for product updates to determine if there are pa The following fields are available: -- **AsOnline** No content is currently available. - **ClientAppId** The identity of the app that initiated this operation. - **HResult** The result code of the last action performed. - **IsApplicability** Is this request to only check if there are any applicable packages to install? @@ -6624,7 +6587,6 @@ The following fields are available: - **bytesFromLocalCache** Bytes copied over from local (on disk) cache. - **bytesFromPeers** The number of bytes received from a peer in the same LAN. - **bytesRequested** The total number of bytes requested for download. -- **cacheServerBonnectionCount** No content is currently available. - **cacheServerConnectionCount** Number of connections made to cache hosts. - **cdnConnectionCount** The total number of connections made to the CDN. - **cdnErrorCodes** A list of CDN connection errors since the last FailureCDNCommunication event. @@ -6632,7 +6594,6 @@ The following fields are available: - **cdnIp** The IP address of the source CDN. - **cdnUrl** Url of the source Content Distribution Network (CDN). - **dataSourcesTotal** Bytes received per source type, accumulated for the whole session. -- **dnErrorCounts** No content is currently available. - **doErrorCode** The Delivery Optimization error code that was returned. - **downlinkBps** The maximum measured available download bandwidth (in bytes per second). - **downlinkUsageBps** The download speed (in bytes per second). @@ -6644,9 +6605,7 @@ The following fields are available: - **fileID** The ID of the file being downloaded. - **fileSize** The size of the file being downloaded. - **gCurMemoryStreamBytes** Current usage for memory streaming. -- **gdnConnectionCount** No content is currently available. - **gMaxMemoryStreamBytes** Maximum usage for memory streaming. -- **groupConnectionCo** No content is currently available. - **groupConnectionCount** The total number of connections made to peers in the same group. - **internetConnectionCount** The total number of connections made to peers not in the same LAN or the same group. - **isEncrypted** TRUE if the file is encrypted and will be decrypted after download. @@ -6657,7 +6616,6 @@ The following fields are available: - **numPeers** The total number of peers used for this download. - **numPeersLocal** The total number of local peers used for this download. - **predefinedCallerName** The name of the API Caller. -- **restrictedU`load** No content is currently available. - **restrictedUpload** Is the upload restricted? - **routeToCacheServer** The cache server setting, source, and value. - **sessionID** The ID of the download session. @@ -7415,7 +7373,6 @@ This event sends data on whether Update Management Policies were enabled on a de The following fields are available: - **configuredPoliciescount** Number of policies on the device. -- **configuredPoliciescsunt** No content is currently available. - **policiesNamevaluesource** Policy name and source of policy (group policy, MDM or flight). - **policyCacherefreshtime** Time when policy cache was refreshed. - **updateInstalluxsetting** Indicates whether a user has set policies via a user experience option. From ce42be5de8a47a7fd35fe6b79beadfe982105351 Mon Sep 17 00:00:00 2001 From: Brian Lich Date: Mon, 1 Apr 2019 16:27:21 -0700 Subject: [PATCH 102/724] new build 4/1/2019 4:27 PM --- .../basic-level-windows-diagnostic-events-and-fields-1903.md | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/windows/privacy/basic-level-windows-diagnostic-events-and-fields-1903.md b/windows/privacy/basic-level-windows-diagnostic-events-and-fields-1903.md index f91d4a0548..c9df4f0d71 100644 --- a/windows/privacy/basic-level-windows-diagnostic-events-and-fields-1903.md +++ b/windows/privacy/basic-level-windows-diagnostic-events-and-fields-1903.md @@ -13,7 +13,7 @@ manager: dansimp ms.collection: M365-security-compliance ms.topic: article audience: ITPro -ms.date: 03/29/2019 +ms.date: 04/01/2019 --- From 8bd56a341549d1dfc1dfb68f7417069c1e7fa366 Mon Sep 17 00:00:00 2001 From: Brian Lich Date: Mon, 1 Apr 2019 16:27:28 -0700 Subject: [PATCH 103/724] new build 4/1/2019 4:27 PM --- ...ndows-diagnostic-events-and-fields-1703.md | 2 +- ...ndows-diagnostic-events-and-fields-1709.md | 2 +- ...ndows-diagnostic-events-and-fields-1803.md | 2 +- ...ndows-diagnostic-events-and-fields-1809.md | 34 +++++++++++++++---- 4 files changed, 30 insertions(+), 10 deletions(-) diff --git a/windows/privacy/basic-level-windows-diagnostic-events-and-fields-1703.md b/windows/privacy/basic-level-windows-diagnostic-events-and-fields-1703.md index b5c2cbf517..1d21304909 100644 --- a/windows/privacy/basic-level-windows-diagnostic-events-and-fields-1703.md +++ b/windows/privacy/basic-level-windows-diagnostic-events-and-fields-1703.md @@ -13,7 +13,7 @@ manager: dansimp ms.collection: M365-security-compliance ms.topic: article audience: ITPro -ms.date: 03/29/2019 +ms.date: 04/01/2019 --- diff --git a/windows/privacy/basic-level-windows-diagnostic-events-and-fields-1709.md b/windows/privacy/basic-level-windows-diagnostic-events-and-fields-1709.md index 800377e966..e06f5187b6 100644 --- a/windows/privacy/basic-level-windows-diagnostic-events-and-fields-1709.md +++ b/windows/privacy/basic-level-windows-diagnostic-events-and-fields-1709.md @@ -13,7 +13,7 @@ manager: dansimp ms.collection: M365-security-compliance ms.topic: article audience: ITPro -ms.date: 03/29/2019 +ms.date: 04/01/2019 --- diff --git a/windows/privacy/basic-level-windows-diagnostic-events-and-fields-1803.md b/windows/privacy/basic-level-windows-diagnostic-events-and-fields-1803.md index e22d5344bb..0606766261 100644 --- a/windows/privacy/basic-level-windows-diagnostic-events-and-fields-1803.md +++ b/windows/privacy/basic-level-windows-diagnostic-events-and-fields-1803.md @@ -13,7 +13,7 @@ manager: dansimp ms.collection: M365-security-compliance ms.topic: article audience: ITPro -ms.date: 03/29/2019 +ms.date: 04/01/2019 --- diff --git a/windows/privacy/basic-level-windows-diagnostic-events-and-fields-1809.md b/windows/privacy/basic-level-windows-diagnostic-events-and-fields-1809.md index 6c3abb47aa..25ff1cd99e 100644 --- a/windows/privacy/basic-level-windows-diagnostic-events-and-fields-1809.md +++ b/windows/privacy/basic-level-windows-diagnostic-events-and-fields-1809.md @@ -13,7 +13,7 @@ manager: dansimp ms.collection: M365-security-compliance ms.topic: article audience: ITPro -ms.date: 03/29/2019 +ms.date: 04/01/2019 --- @@ -346,6 +346,7 @@ The following fields are available: - **DatasourceDriverPackage_TH2** The count of the number of this particular object type present on this device. - **DataSourceMatchingInfoBlock_19ASetup** The count of the number of this particular object type present on this device. - **DataSourceMatchingInfoBlock_19H1** The count of the number of this particular object type present on this device. +- **DataSourceMatchIngInfoBlock_19H1** No content is currently available. - **DataSourceMatchingInfoBlock_19H1Setup** The count of the number of this particular object type present on this device. - **DataSourceMatchingInfoBlock_RS1** The total DataSourceMatchingInfoBlock objects targeting Windows 10 version 1607 on this device. - **DataSourceMatchingInfoBlock_RS2** The count of the number of this particular object type present on this device. @@ -2760,13 +2761,20 @@ The following fields are available: - **ConsumerDroppedCount** Number of events dropped at consumer layer of telemetry client. - **CriticalDataDbDroppedCount** Number of critical data sampled events dropped at the database layer. - **CriticalDataThrottleDroppedCount** The number of critical data sampled events that were dropped because of throttling. +- **CriticalDt2eDbDroppedCount** No content is currently available. +- **CriticalDt2eThrottleDroppedCount** No content is currently available. - **CriticalOverflowEntersCounter** Number of times critical overflow mode was entered in event DB. +- **CrrancalDataDbDroppedCount** No content is currently available. +- **CrrancalDataThrottleDroppedCount** No content is currently available. +- **CrrancalOverflowEntersCounter** No content is currently available. - **DbCriticalDroppedCount** Total number of dropped critical events in event DB. +- **DbCrrancalDroppedCount** No content is currently available. - **DbDroppedCount** Number of events dropped due to DB fullness. - **DbDroppedFailureCount** Number of events dropped due to DB failures. - **DbDroppedFullCount** Number of events dropped due to DB fullness. - **DecodingDroppedCount** Number of events dropped due to decoding failures. - **EnteringCriticalOverflowDroppedCounter** Number of events dropped due to critical overflow mode being initiated. +- **EnteringCrrancalOverflowDroppedCounter** No content is currently available. - **EtwDroppedBufferCount** Number of buffers dropped in the UTC ETW session. - **EtwDroppedCount** Number of events dropped at ETW layer of telemetry client. - **EventsPersistedCount** Number of events that reached the PersistEvent stage. @@ -2796,6 +2804,8 @@ The following fields are available: - **UploaderErrorCount** Number of errors received from the upload endpoint. - **VortexFailuresTimeout** The number of timeout failures received from Vortex. - **VortexHttpAttempts** Number of attempts to contact Vortex. +- **VortexHttpeReponseFailures** No content is currently available. +- **VortexHttpeReponsesWithDroppedEvents** No content is currently available. - **VortexHttpFailures4xx** Number of 400-499 error codes received from Vortex. - **VortexHttpFailures5xx** Number of 500-599 error codes received from Vortex. - **VortexHttpResponseFailures** Number of Vortex responses that are not 2XX or 400. @@ -3409,6 +3419,7 @@ The following fields are available: - **ComputePreemptionLevel** The maximum preemption level supported by GPU for compute payload. - **DedicatedSystemMemoryB** The amount of system memory dedicated for GPU use (in bytes). - **DedicatedVideoMemoryB** The amount of dedicated VRAM of the GPU (in bytes). +- **DedicatedVidmoMemoryB** No content is currently available. - **DisplayAdapterLuid** The display adapter LUID. - **DriverDate** The date of the display driver. - **DriverRank** The rank of the display driver. @@ -3435,6 +3446,7 @@ The following fields are available: - **IsRemovable** TRUE if the adapter supports being disabled or removed. - **IsRenderDevice** Does the GPU have rendering capabilities? - **IsSoftwareDevice** Is this a software implementation of the GPU? +- **KMDF** No content is currently available. - **KMDFilePath** The file path to the location of the Display Kernel Mode Driver in the Driver Store. - **MeasureEnabled** Is the device listening to MICROSOFT_KEYWORD_MEASURES? - **MsHybridDiscrete** Indicates whether the adapter is a discrete adapter in a hybrid configuration. @@ -3445,6 +3457,7 @@ The following fields are available: - **SubVendorID** The GPU sub vendor ID. - **TelemetryEnabled** Is the device listening to MICROSOFT_KEYWORD_TELEMETRY? - **TelInvEvntTrigger** What triggered this event to be logged? Example: 0 (GPU enumeration) or 1 (DxgKrnlTelemetry provider toggling) +- **TmlemetryEnabled** No content is currently available. - **version** The event version. - **WDDMVersion** The Windows Display Driver Model version. @@ -3552,6 +3565,7 @@ The following fields are available: - **ReportId** A GUID used to identify the report. This can used to track the report across Watson. - **TargetAppId** The kernel reported AppId of the application being reported. - **TargetAppVer** The specific version of the application being reported +- **TargetAppVr** No content is currently available. - **TargetAsId** The sequence number for the hanging process. @@ -4000,6 +4014,7 @@ The following fields are available: - **ProductVersion** The product version that is included in the driver file. - **Service** The name of the service that is installed for the device. - **WdfVersion** The Windows Driver Framework version. +- **YmageSize** No content is currently available. ### Microsoft.Windows.Inventory.Core.InventoryDriverBinaryRemove @@ -4777,6 +4792,7 @@ The following fields are available: - **fileName** The file name where the failure occurred. - **function** The function where the failure occurred. - **hresult** The HResult of the overall activity. +- **hresult€threadId** No content is currently available. - **hrutTyp** No content is currently available. - **lineNumber** The line number where the failure occurred. - **message** The message of the failure that occurred. @@ -4938,6 +4954,8 @@ The following fields are available: - **QualityUpdatePausePeriod** The pause duration configured for quality OS updates on the device (in days). - **RelatedCV** The previous Correlation Vector that was used before swapping with a new one - **ScanDurationInSeconds** The number of seconds a scan took +- **ScanDurationInSeuonds** No content is currently available. +- **ScanEnque}eTime** No content is currently available. - **ScanEnqueueTime** The number of seconds it took to initialize a scan - **ScanProps** This is a 32-bit integer containing Boolean properties for a given Windows Update scan. The following bits are used; all remaining bits are reserved and set to zero. Bit 0 (0x1): IsInteractive - is set to 1 if the scan is requested by a user, or 0 if the scan is requested by Automatic Updates. Bit 1 (0x2): IsSeeker - is set to 1 if the Windows Update client's Seeker functionality is enabled. Seeker functionality is enabled on certain interactive scans, and results in the scans returning certain updates that are in the initial stages of release (not yet released for full adoption via Automatic Updates). - **ServiceGuid** An ID which represents which service the software distribution client is checking for content (Windows Update, Microsoft Store, etc.). @@ -4995,6 +5013,7 @@ The following fields are available: - **AppXBlockHashValidationFailureCount** A count of the number of blocks that have failed validation after being downloaded. - **AppXDownloadScope** Indicates the scope of the download for application content. - **AppXScope** Indicates the scope of the app download. +- **AppXU3s8aHashFailures** No content is currently available. - **BiosFamily** The family of the BIOS (Basic Input Output System). - **BiosName** The name of the device BIOS. - **BiosReleaseDate** The release date of the device BIOS. @@ -5028,6 +5047,7 @@ The following fields are available: - **FeatureUpdatePause** Indicates whether feature OS updates are paused on the device. - **FlightBranch** The branch that a device is on if participating in flighting (pre-release builds). - **FlightBuildNumber** If this download was for a flight (pre-release build), this indicates the build number of that flight. +- **FlighTBuildNumber** No content is currently available. - **FlightId** The specific ID of the flight (pre-release build) the device is getting. - **FlightRing** The ring (speed of getting builds) that a device is on if participating in flighting (pre-release builds). - **HandlerType** Indicates what kind of content is being downloaded (app, driver, windows patch, etc.). @@ -5069,6 +5089,7 @@ The following fields are available: - **UpdateId** An identifier associated with the specific piece of content. - **UpdateID** An identifier associated with the specific piece of content. - **UpdateImportance** Indicates whether the content was marked as Important, Recommended, or Optional. +- **UpdatEImportance** No content is currently available. - **UsedDO** Indicates whether the download used the Delivery Optimization (DO) service. - **UsedSystemVolume** Indicates whether the content was downloaded to the device's main system storage drive, or an alternate storage drive. - **WUDeviceID** The unique identifier of a specific device, used to identify how many devices are encountering success or a particular issue. @@ -5132,6 +5153,7 @@ This event sends tracking data about the software distribution client installati The following fields are available: +- **2À@=2§3F'™+ck** No content is currently available. - **BiosFamily** The family of the BIOS (Basic Input Output System). - **BiosName** The name of the device BIOS. - **BiosReleaseDate** The release date of the device BIOS. @@ -5152,11 +5174,13 @@ The following fields are available: - **DeviceModel** The device model. - **DriverPingBack** Contains information about the previous driver and system state. - **DriverRecoveryIds** The list of identifiers that could be used for uninstalling the drivers if a recovery is required. +- **DriverReuoveryIds** No content is currently available. - **EventInstanceID** A globally unique identifier for event instance. - **EventScenario** Indicates the purpose of sending this event - whether because the software distribution just started installing content, or whether it was cancelled, succeeded, or failed. - **EventType** Possible values are Child, Bundle, or Driver. - **ExtendedErrorCode** The extended error code. - **ExtendedStatusCode** Secondary error code for certain scenarios where StatusCode is not specific enough. +- **ExtendEdStatusCode** No content is currently available. - **FeatureUpdatePause** Indicates whether feature OS updates are paused on the device. - **FlightBranch** The branch that a device is on if participating in the Windows Insider Program. - **FlightBuildNumber** If this installation was for a Windows Insider build, this is the build number of that build. @@ -6594,6 +6618,7 @@ The following fields are available: - **cdnIp** The IP address of the source CDN. - **cdnUrl** Url of the source Content Distribution Network (CDN). - **dataSourcesTotal** Bytes received per source type, accumulated for the whole session. +- **dataSourcEsTotal** No content is currently available. - **doErrorCode** The Delivery Optimization error code that was returned. - **downlinkBps** The maximum measured available download bandwidth (in bytes per second). - **downlinkUsageBps** The download speed (in bytes per second). @@ -6603,6 +6628,7 @@ The following fields are available: - **experimentId** When running a test, this is used to correlate with other events that are part of the same test. - **expiresAt** The time when the content will expire from the Delivery Optimization Cache. - **fileID** The ID of the file being downloaded. +- **fileSaze** No content is currently available. - **fileSize** The size of the file being downloaded. - **gCurMemoryStreamBytes** Current usage for memory streaming. - **gMaxMemoryStreamBytes** Maximum usage for memory streaming. @@ -6652,7 +6678,6 @@ This event sends data describing the start of a new download to enable Delivery The following fields are available: -- **ActiveNetworkConnection** No content is currently available. - **background** Indicates whether the download is happening in the background. - **bytesRequested** Number of bytes requested for the download. - **cdnUrl** The URL of the source Content Distribution Network (CDN). @@ -6671,21 +6696,16 @@ The following fields are available: - **fileSize** Total file size of the file that was downloaded. - **fileSizeCaller** Value for total file size provided by our caller. - **groupID** ID for the group. -- **IsBootCritical** No content is currently available. - **isEncrypted** Indicates whether the download is encrypted. - **isVpn** Indicates whether the device is connected to a Virtual Private Network. - **jobID** The ID of the Windows Update job. - **peerID** The ID for this delivery optimization client. - **predefinedCallerName** Name of the API caller. - **routeToCacheServer** Cache server setting, source, and value. -- **SdbEntries** No content is currently available. - **sessionID** The ID for the file download session. - **setConfigs** A JSON representation of the configurations that have been set, and their sources. - **updateID** The ID of the update being downloaded. - **usedMemoryStream** Indicates whether the download used memory streaming. -- **WuDriverCoverage** No content is currently available. -- **WuDriverUpdateId** No content is currently available. -- **WuPopulatedFromId** No content is currently available. ### Microsoft.OSG.DU.DeliveryOptClient.FailureCdnCommunication From bbf3529726f7e837cfefbf1f31d91297425677b2 Mon Sep 17 00:00:00 2001 From: Brian Lich Date: Tue, 2 Apr 2019 08:53:08 -0700 Subject: [PATCH 104/724] new build 4/2/2019 8:53 AM --- ...basic-level-windows-diagnostic-events-and-fields-1903.md | 6 +++--- 1 file changed, 3 insertions(+), 3 deletions(-) diff --git a/windows/privacy/basic-level-windows-diagnostic-events-and-fields-1903.md b/windows/privacy/basic-level-windows-diagnostic-events-and-fields-1903.md index c9df4f0d71..b745b8fa81 100644 --- a/windows/privacy/basic-level-windows-diagnostic-events-and-fields-1903.md +++ b/windows/privacy/basic-level-windows-diagnostic-events-and-fields-1903.md @@ -13,7 +13,7 @@ manager: dansimp ms.collection: M365-security-compliance ms.topic: article audience: ITPro -ms.date: 04/01/2019 +ms.date: 04/02/2019 --- @@ -3130,8 +3130,8 @@ This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedevic The following fields are available: -- **Audio.CaptureDriver** No content is currently available. -- **Audio.RenderDriver** No content is currently available. +- **Audio.CaptureDriver** The capture driver endpoint for the audio device. +- **Audio.RenderDriver** The render driver for the audio device. - **Audio_CaptureDriver** The Audio device capture driver endpoint. - **Audio_RenderDriver** The Audio device render driver endpoint. - **InventoryVersion** The version of the inventory file generating the events. From a168f8af7f9af53e7dd874afa4e8fb05bde719cc Mon Sep 17 00:00:00 2001 From: Brian Lich Date: Tue, 2 Apr 2019 08:53:13 -0700 Subject: [PATCH 105/724] new build 4/2/2019 8:53 AM --- ...ndows-diagnostic-events-and-fields-1703.md | 2 +- ...ndows-diagnostic-events-and-fields-1709.md | 2 +- ...ndows-diagnostic-events-and-fields-1803.md | 2 +- ...ndows-diagnostic-events-and-fields-1809.md | 125 +++++++++++++++++- 4 files changed, 125 insertions(+), 6 deletions(-) diff --git a/windows/privacy/basic-level-windows-diagnostic-events-and-fields-1703.md b/windows/privacy/basic-level-windows-diagnostic-events-and-fields-1703.md index 1d21304909..c7bbf928bd 100644 --- a/windows/privacy/basic-level-windows-diagnostic-events-and-fields-1703.md +++ b/windows/privacy/basic-level-windows-diagnostic-events-and-fields-1703.md @@ -13,7 +13,7 @@ manager: dansimp ms.collection: M365-security-compliance ms.topic: article audience: ITPro -ms.date: 04/01/2019 +ms.date: 04/02/2019 --- diff --git a/windows/privacy/basic-level-windows-diagnostic-events-and-fields-1709.md b/windows/privacy/basic-level-windows-diagnostic-events-and-fields-1709.md index e06f5187b6..72b3a95d4c 100644 --- a/windows/privacy/basic-level-windows-diagnostic-events-and-fields-1709.md +++ b/windows/privacy/basic-level-windows-diagnostic-events-and-fields-1709.md @@ -13,7 +13,7 @@ manager: dansimp ms.collection: M365-security-compliance ms.topic: article audience: ITPro -ms.date: 04/01/2019 +ms.date: 04/02/2019 --- diff --git a/windows/privacy/basic-level-windows-diagnostic-events-and-fields-1803.md b/windows/privacy/basic-level-windows-diagnostic-events-and-fields-1803.md index 0606766261..48424772ba 100644 --- a/windows/privacy/basic-level-windows-diagnostic-events-and-fields-1803.md +++ b/windows/privacy/basic-level-windows-diagnostic-events-and-fields-1803.md @@ -13,7 +13,7 @@ manager: dansimp ms.collection: M365-security-compliance ms.topic: article audience: ITPro -ms.date: 04/01/2019 +ms.date: 04/02/2019 --- diff --git a/windows/privacy/basic-level-windows-diagnostic-events-and-fields-1809.md b/windows/privacy/basic-level-windows-diagnostic-events-and-fields-1809.md index 25ff1cd99e..f86d9d6c9c 100644 --- a/windows/privacy/basic-level-windows-diagnostic-events-and-fields-1809.md +++ b/windows/privacy/basic-level-windows-diagnostic-events-and-fields-1809.md @@ -13,7 +13,7 @@ manager: dansimp ms.collection: M365-security-compliance ms.topic: article audience: ITPro -ms.date: 04/01/2019 +ms.date: 04/02/2019 --- @@ -1774,6 +1774,7 @@ The following fields are available: - **WmdrmInUse** WmdrmIndicators AND dismissible block in setup was not dismissed. - **WmdrmNonPermanent** Indicates if the system has any files with non-permanent licenses. - **WmdrmPurchased** Indicates if the system has any files with permanent licenses. +- **聗mdrmNonPermanent** No content is currently available. ### Microsoft.Windows.Appraiser.General.WmdrmRemove @@ -1960,7 +1961,9 @@ The following fields are available: - **MEID** Represents the Mobile Equipment Identity (MEID). MEID is a worldwide unique phone ID assigned to CDMA phones. MEID replaces electronic serial number (ESN), and is equivalent to IMEI for GSM and WCDMA phones. Microsoft does not have access to mobile operator billing data so collecting this data does not expose or identify the user. - **MNC0** Retrieves the Mobile Network Code (MNC). It used with the Mobile Country Code (MCC) to uniquely identify a mobile network operator. The two fields represent phone with dual sim coverage. - **MNC1** Retrieves the Mobile Network Code (MNC). It used with the Mobile Country Code (MCC) to uniquely identify a mobile network operator. The two fields represent phone with dual sim coverage. +- **Mobi�eOperatorNetwork1** No content is currently available. - **MobileOperatorBilling** Represents the telephone company that provides services for mobile phone users. +- **MobileOperatorCommercia�ized** No content is currently available. - **MobileOperatorCommercialized** Represents which reseller and geography the phone is commercialized for. This is the set of values on the phone for who and where it was intended to be used. For example, the commercialized mobile operator code AT&T in the US would be ATT-US. - **MobileOperatorNetwork0** Represents the operator of the current mobile network that the device is used on. (AT&T, T-Mobile, Vodafone). The two fields represent phone with dual sim coverage. - **MobileOperatorNetwork1** Represents the operator of the current mobile network that the device is used on. (AT&T, T-Mobile, Vodafone). The two fields represent phone with dual sim coverage. @@ -2719,7 +2722,9 @@ Fired by UTC at startup to signal what data we are allowed to collect. The following fields are available: +- **CanAddMsagoMsTelemetry** No content is currently available. - **CanAddMsaToMsTelemetry** True if we can add MSA PUID and CID to telemetry, false otherwise. +- **CanCollactAnyTelemetry** No content is currently available. - **CanCollectAnyTelemetry** True if we are allowed to collect partner telemetry, false otherwise. - **CanCollectCoreTelemetry** True if we can collect CORE/Basic telemetry, false otherwise. - **CanCollectHeartbeats** True if we can collect heartbeat telemetry, false otherwise. @@ -2727,7 +2732,9 @@ The following fields are available: - **CanCollectWindowsAnalyticsEvents** True if we can collect Windows Analytics data, false otherwise. - **CanPerformDiagnosticEscalations** True if we can perform diagnostic escalation collection, false otherwise. - **CanPerformTraceEscalations** True if we can perform trace escalation collection, false otherwise. +- **CanPerfotmDiagnosticEscalations** No content is currently available. - **CanReportScenarios** True if we can report scenario completions, false otherwise. +- **Can䁃ollectCoreTelemetry** No content is currently available. - **PreviousPermissions** Bitmask of previous telemetry state. - **TransitionFromEverythingOff** True if we are transitioning from all telemetry being disabled, false otherwise. @@ -2742,6 +2749,7 @@ The following fields are available: - **CensusStartTime** Returns timestamp corresponding to last successful census run. - **CensusTaskEnabled** Returns Boolean value for the census task (Enable/Disable) on client machine. - **LastConnectivityLossTime** Retrieves the last time the device lost free network. +- **LastGonnectivityLossTime** No content is currently available. - **NetworkState** Retrieves the network state: 0 = No network. 1 = Restricted network. 2 = Free network. - **NoNetworkTime** Retrieves the time spent with no network (since the last time) in seconds. - **RestrictedNetworkTime** Retrieves the time spent on a metered (cost restricted) network in seconds. @@ -2754,9 +2762,18 @@ This event sends data about the health and quality of the diagnostic data from t The following fields are available: - **AgentConnectionErrorsCount** Number of non-timeout errors associated with the host/agent channel. +- **AggregationFlags** No content is currently available. +- **AggregationPeriodMS** No content is currently available. +- **AudioInMS** No content is currently available. +- **AudioOutMS** No content is currently available. +- **BackgroundMouseSec** No content is currently available. +- **BitPeriodMS** No content is currently available. - **CensusExitCode** The last exit code of the Census task. - **CensusStartTime** Time of last Census run. - **CensusTaskEnabled** True if Census is enabled, false otherwise. +- **CompositionDirtyGeneratedSec** No content is currently available. +- **CompositionDirtyPropagatedSec** No content is currently available. +- **CompositionRenderedSec** No content is currently available. - **CompressedBytesUploaded** Number of compressed bytes uploaded. - **ConsumerDroppedCount** Number of events dropped at consumer layer of telemetry client. - **CriticalDataDbDroppedCount** Number of critical data sampled events dropped at the database layer. @@ -2773,43 +2790,72 @@ The following fields are available: - **DbDroppedFailureCount** Number of events dropped due to DB failures. - **DbDroppedFullCount** Number of events dropped due to DB fullness. - **DecodingDroppedCount** Number of events dropped due to decoding failures. +- **Decoding刁刁刁刁刁刁刁刁刁刁刁刁** No content is currently available. - **EnteringCriticalOverflowDroppedCounter** Number of events dropped due to critical overflow mode being initiated. - **EnteringCrrancalOverflowDroppedCounter** No content is currently available. - **EtwDroppedBufferCount** Number of buffers dropped in the UTC ETW session. +- **EtwDroppedBuffertorFlags** No content is currently available. - **EtwDroppedCount** Number of events dropped at ETW layer of telemetry client. +- **Eve~tStoreResetSizeSum** No content is currently available. +- **EventSequence** No content is currently available. - **EventsPersistedCount** Number of events that reached the PersistEvent stage. - **EventStoreLifetimeResetCounter** Number of times event DB was reset for the lifetime of UTC. - **EventStoreResetCounter** Number of times event DB was reset. - **EventStoreResetSizeSum** Total size of event DB across all resets reports in this instance. +- **EventStOreResetSizeSum** No content is currently available. - **EventSubStoreResetCounter** Number of times event DB was reset. - **EventSubStoreResetSizeSum** Total size of event DB across all resets reports in this instance. - **EventsUploaded** Number of events uploaded. - **Flags** Flags indicating device state such as network state, battery state, and opt-in state. - **FullTriggerBufferDroppedCount** Number of events dropped due to trigger buffer being full. +- **FullTriggerBuvferDroppedCount** No content is currently available. +- **GameInputSec** No content is currently available. - **HeartBeatSequenceNumber** The sequence number of this heartbeat. +- **InteractiveTimeoutPeriodMS** No content is currently available. - **InvalidHttpCodeCount** Number of invalid HTTP codes received from contacting Vortex. +- **InvalidHttpCodECount** No content is currently available. - **LastAgentConnectionError** Last non-timeout error encountered in the host/agent channel. - **LastEventSizeOffender** Event name of last event which exceeded max event size. - **LastInvalidHttpCode** Last invalid HTTP code received from Vortex. - **MaxActiveAgentConnectionCount** The maximum number of active agents during this heartbeat timeframe. +- **MaxIn]seScenarioCounter** No content is currently available. - **MaxInUseScenarioCounter** Soft maximum number of scenarios loaded by UTC. +- **MaxInUseScenarioCountev** No content is currently available. - **PreviousHeartBeatTime** Time of last heartbeat event (allows chaining of events). - **PrivacyBlockedCount** The number of events blocked due to privacy settings or tags. +- **Repe`tedUploadFailureDropped** No content is currently available. - **RepeatedUploadFailureDropped** Number of events lost due to repeated upload failures for a single buffer. +- **SettingsHttpAtsempts** No content is currently available. - **SettingsHttpAttempts** Number of attempts to contact OneSettings service. - **SettingsHttpFailures** The number of failures from contacting the OneSettings service. +- **SinceFirstInteractivityMS** No content is currently available. +- **SpeechRecognitionSec** No content is currently available. +- **SummaryRound** No content is currently available. +- **TargetAsId** No content is currently available. - **ThrottledDroppedCount** Number of events dropped due to throttling of noisy providers. - **TopUploaderErrors** List of top errors received from the upload endpoint. - **UploaderDroppedCount** Number of events dropped at the uploader layer of telemetry client. - **UploaderErrorCount** Number of errors received from the upload endpoint. +- **ViewFlags** No content is currently available. +- **VodtexFailuresTimeout** No content is currently available. +- **VodtexHttpAttempts** No content is currently available. +- **VodtexHttpFailures4xx** No content is currently available. +- **VodtexHttpFailures5xx** No content is currently available. +- **VodtexHttpResponseFailures** No content is currently available. +- **VodtexHttpResponsesWithDroppedEvents** No content is currently available. - **VortexFailuresTimeout** The number of timeout failures received from Vortex. +- **VortexHttpAtsempts** No content is currently available. - **VortexHttpAttempts** Number of attempts to contact Vortex. - **VortexHttpeReponseFailures** No content is currently available. - **VortexHttpeReponsesWithDroppedEvents** No content is currently available. - **VortexHttpFailures4xx** Number of 400-499 error codes received from Vortex. - **VortexHttpFailures5xx** Number of 500-599 error codes received from Vortex. +- **VortexHttpFailures5xz** No content is currently available. - **VortexHttpResponseFailures** Number of Vortex responses that are not 2XX or 400. - **VortexHttpResponsesWithDroppedEvents** Number of Vortex responses containing at least 1 dropped event. +- **VortexHttpResponsesWythDroppedEvents** No content is currently available. +- **WindowFlags** No content is currently available. +- **刁刁刁刁刁merDroppedCoᕵnt** No content is currently available. ### TelClientSynthetic.HeartBeat_Aria_5 @@ -3414,12 +3460,17 @@ The following fields are available: - **AdapterTypeValue** The numeric value indicating the type of Graphics adapter. - **aiSeqId** The event sequence ID. +- **bootAd** No content is currently available. - **bootId** The system boot ID. - **BrightnessVersionViaDDI** The version of the Display Brightness Interface. +- **CompupePreemptionLevel** No content is currently available. - **ComputePreemptionLevel** The maximum preemption level supported by GPU for compute payload. +- **ComputePreeMptionLevel** No content is currently available. - **DedicatedSystemMemoryB** The amount of system memory dedicated for GPU use (in bytes). +- **DedicatedViddoMemoryB** No content is currently available. - **DedicatedVideoMemoryB** The amount of dedicated VRAM of the GPU (in bytes). - **DedicatedVidmoMemoryB** No content is currently available. +- **DedicatedVifeoMemoryB** No content is currently available. - **DisplayAdapterLuid** The display adapter LUID. - **DriverDate** The date of the display driver. - **DriverRank** The rank of the display driver. @@ -3432,6 +3483,7 @@ The following fields are available: - **GPUPreemptionLevel** The maximum preemption level supported by GPU for graphics payload. - **GPURevisionID** The GPU revision ID. - **GPUVendorID** The GPU vendor ID. +- **IntarfaceId** No content is currently available. - **InterfaceId** The GPU interface ID. - **IsDisplayDevice** Does the GPU have displaying capabilities? - **IsHwSchSupported** Indicates whether the adapter supports hardware scheduling. @@ -3440,6 +3492,7 @@ The following fields are available: - **IsLDA** Is the GPU comprised of Linked Display Adapters? - **IsMiracastSupported** Does the GPU support Miracast? - **IsMismatchLDA** Is at least one device in the Linked Display Adapters chain from a different vendor? +- **IsMismat-hLDA** No content is currently available. - **IsMPOSupported** Does the GPU support Multi-Plane Overlays? - **IsMsMiracastSupported** Are the GPU Miracast capabilities driven by a Microsoft solution? - **IsPostAdapter** Is this GPU the POST GPU in the device? @@ -3448,6 +3501,7 @@ The following fields are available: - **IsSoftwareDevice** Is this a software implementation of the GPU? - **KMDF** No content is currently available. - **KMDFilePath** The file path to the location of the Display Kernel Mode Driver in the Driver Store. +- **MeasureEnablad** No content is currently available. - **MeasureEnabled** Is the device listening to MICROSOFT_KEYWORD_MEASURES? - **MsHybridDiscrete** Indicates whether the adapter is a discrete adapter in a hybrid configuration. - **NumVidPnSources** The number of supported display output sources. @@ -3457,6 +3511,7 @@ The following fields are available: - **SubVendorID** The GPU sub vendor ID. - **TelemetryEnabled** Is the device listening to MICROSOFT_KEYWORD_TELEMETRY? - **TelInvEvntTrigger** What triggered this event to be logged? Example: 0 (GPU enumeration) or 1 (DxgKrnlTelemetry provider toggling) +- **TelINvEvntTrigger** No content is currently available. - **TmlemetryEnabled** No content is currently available. - **version** The event version. - **WDDMVersion** The Windows Display Driver Model version. @@ -3546,27 +3601,39 @@ This event sends data about crashes for both native and managed applications, to The following fields are available: - **AppName** The name of the app that has crashed. +- **AppSassionGuid** No content is currently available. +- **AppSessionGqid** No content is currently available. - **AppSessionGuid** GUID made up of process ID and is used as a correlation vector for process instances in the telemetry backend. +- **AppTimestamp** No content is currently available. - **AppTimeStamp** The date/time stamp of the app. - **AppVersion** The version of the app that has crashed. +- **ExcaptionCode** No content is currently available. - **ExceptionCode** The exception code returned by the process that has crashed. - **ExceptionOffset** The address where the exception had occurred. - **Flags** Flags indicating how reporting is done. For example, queue the report, do not offer JIT debugging, or do not terminate the process after reporting. - **FriendlyAppName** The description of the app that has crashed, if different from the AppName. Otherwise, the process name. - **IsFatal** True/False to indicate whether the crash resulted in process termination. - **ModName** Exception module name (e.g. bar.dll). +- **ModTimaStamp** No content is currently available. - **ModTimeStamp** The date/time stamp of the module. +- **ModVarsion** No content is currently available. - **ModVersion** The version of the module that has crashed. +- **PackageFullNama** No content is currently available. - **PackageFullName** Store application identity. - **PackageRelativeAppId** Store application identity. - **ProcessArchitecture** Architecture of the crashing process, as one of the PROCESSOR_ARCHITECTURE_* constants: 0: PROCESSOR_ARCHITECTURE_INTEL. 5: PROCESSOR_ARCHITECTURE_ARM. 9: PROCESSOR_ARCHITECTURE_AMD64. 12: PROCESSOR_ARCHITECTURE_ARM64. +- **ProcessArinetecture** No content is currently available. - **ProcessCreateTime** The time of creation of the process that has crashed. - **ProcessId** The ID of the process that has crashed. - **ReportId** A GUID used to identify the report. This can used to track the report across Watson. +- **TargepAsId** No content is currently available. - **TargetAppId** The kernel reported AppId of the application being reported. - **TargetAppVer** The specific version of the application being reported - **TargetAppVr** No content is currently available. - **TargetAsId** The sequence number for the hanging process. +- **TarSetAppId** No content is currently available. +- **TarSetAppVer** No content is currently available. +- **TarSetAsId** No content is currently available. ## Feature update events @@ -3684,6 +3751,7 @@ This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedevic The following fields are available: +- **HiddenAr`** No content is currently available. - **HiddenArp** Indicates whether a program hides itself from showing up in ARP. - **InstallDate** The date the application was installed (a best guess based on folder creation date heuristics). - **InstallDateArpLastModified** The date of the registry ARP key for a given application. Hints at install date but not always accurate. Passed as an array. Example: 4/11/2015 00:00:00 @@ -3692,12 +3760,15 @@ The following fields are available: - **InventoryVersion** The version of the inventory file generating the events. - **Language** The language code of the program. - **MsiPackageCode** A GUID that describes the MSI Package. Multiple 'Products' (apps) can make up an MsiPackage. +- **MsiPqckageCode** No content is currently available. - **MsiProductCode** A GUID that describe the MSI Product. - **Name** The name of the application. +- **OSVersionAtI~stallTi}e** No content is currently available. - **OSVersionAtInstallTime** The four octets from the OS version at the time of the application's install. - **PackageFullName** The package full name for a Store application. - **ProgramInstanceId** A hash of the file IDs in an app. - **Publisher** The Publisher of the application. Location pulled from depends on the 'Source' field. +- **RootDibPath** No content is currently available. - **RootDirPath** The path to the root directory where the program was installed. - **Source** How the program was installed (for example, ARP, MSI, Appx). - **StoreAppType** A sub-classification for the type of Microsoft Store app, such as UWP or Win8StoreApp. @@ -3906,6 +3977,8 @@ This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedevic The following fields are available: +- **** No content is currently available. +- **€** No content is currently available. - **BusReportedDescription** The description of the device reported by the bux. - **Class** The device setup class of the driver loaded for the device. - **ClassGuid** The device class unique identifier of the driver package loaded on the device. @@ -3919,6 +3992,8 @@ The following fields are available: - **DriverId** The unique identifier for the installed driver. - **DriverName** The name of the driver image file. - **DriverPackageStrongName** The immediate parent directory name in the Directory field of InventoryDriverPackage. +- **DriverPackageStrongName** No content is currently available. +- **DriverV** No content is currently available. - **DriverVerDate** The date associated with the driver installed on the device. - **DriverVerVersion** The version number of the driver installed on the device. - **Enumerator** Identifies the bus that enumerated the device. @@ -4538,12 +4613,15 @@ The following fields are available: - **BootType** Identifies the type of boot (e.g.: "Cold", "Hiber", "Resume"). - **EventTimestamp** Seconds elapsed since an arbitrary time point. This can be used to identify the time difference in successive boot attempts being made. - **FirmwareResetReasonEmbeddedController** Reason for system reset provided by firmware. +- **FirmwareresetReasonEmbeddedControllerAdditional** No content is currently available. - **FirmwareResetReasonEmbeddedControllerAdditional** Additional information on system reset reason provided by firmware if needed. - **FirmwareResetReasonPch** Reason for system reset provided by firmware. - **FirmwareResetReasonPchAdditional** Additional information on system reset reason provided by firmware if needed. +- **FirmwareResetReasonPchADditional** No content is currently available. - **FirmwareResetReasonSupplied** Flag indicating that a reason for system reset was provided by firmware. - **IO** Amount of data written to and read from the disk by the OS Loader during boot. See [IO](#io). - **LastBootSucceeded** Flag indicating whether the last boot was successful. +- **LastBootSucceedEd** No content is currently available. - **LastShutdownSucceeded** Flag indicating whether the last shutdown was successful. - **MaxAbove4GbFreeRange** This field describes the largest memory range available above 4Gb. - **MaxBelow4GbFreeRange** This field describes the largest memory range available below 4Gb. @@ -4792,8 +4870,6 @@ The following fields are available: - **fileName** The file name where the failure occurred. - **function** The function where the failure occurred. - **hresult** The HResult of the overall activity. -- **hresult€threadId** No content is currently available. -- **hrutTyp** No content is currently available. - **lineNumber** The line number where the failure occurred. - **message** The message of the failure that occurred. - **module** The module where the failure occurred. @@ -4877,8 +4953,10 @@ This service retrieves events generated by SetupPlatform, the engine that drives The following fields are available: +- **CroupName** No content is currently available. - **FieldName** Retrieves the event name/data point. Examples: InstallStartTime, InstallEndtime, OverallResult etc. - **GroupName** Retrieves the groupname the event belongs to. Example: Install Information, DU Information, Disk Space Information etc. +- **Valqe** No content is currently available. - **Value** Retrieves the value associated with the corresponding event name (Field Name). For example: For time related events this will include the system time. @@ -4890,6 +4968,8 @@ Scan process event on Windows Update client. See the EventScenario field for spe The following fields are available: +- **Ä7G§ Date: Wed, 3 Apr 2019 08:16:17 -0700 Subject: [PATCH 106/724] new build 4/3/2019 8:16 AM --- ...ndows-diagnostic-events-and-fields-1903.md | 98 +++++++++---------- 1 file changed, 49 insertions(+), 49 deletions(-) diff --git a/windows/privacy/basic-level-windows-diagnostic-events-and-fields-1903.md b/windows/privacy/basic-level-windows-diagnostic-events-and-fields-1903.md index b745b8fa81..e28e119c2b 100644 --- a/windows/privacy/basic-level-windows-diagnostic-events-and-fields-1903.md +++ b/windows/privacy/basic-level-windows-diagnostic-events-and-fields-1903.md @@ -13,7 +13,7 @@ manager: dansimp ms.collection: M365-security-compliance ms.topic: article audience: ITPro -ms.date: 04/02/2019 +ms.date: 04/03/2019 --- @@ -3780,7 +3780,7 @@ The following fields are available: - **ClassGuid** The unique ID for the device class. - **DeviceInstanceId** The unique ID for the device on the system. -- **DriverDate** The date the driver was installed. +- **DriverDate** The date of the driver. - **DriverFlightIds** The IDs for the driver flights. - **DriverInfName** Driver INF file name. - **DriverProvider** The driver manufacturer or provider. @@ -3969,7 +3969,7 @@ The following fields are available: ### Microsoft.Windows.DriverInstall.DeviceInstall -This critical event sends device instance properties for the driver installation that took place. +This critical event sends information about the driver installation that took place. The following fields are available: @@ -3981,59 +3981,59 @@ The following fields are available: - **DeviceConfigured** Indicates whether this device was configured through the kernel configuration. - **DeviceInstanceId** The unique identifier of the device in the system. - **DeviceStack** The device stack of the driver being installed. -- **DriverDate** No content is currently available. -- **DriverDescription** No content is currently available. -- **DriverInfName** No content is currently available. -- **DriverInfSectionName** No content is currently available. -- **DriverPackageId** No content is currently available. -- **DriverProvider** No content is currently available. -- **DriverUpdated** No content is currently available. -- **DriverVersion** No content is currently available. -- **EndTime** No content is currently available. -- **Error** No content is currently available. -- **ExtensionDrivers** No content is currently available. -- **FinishInstallAction** No content is currently available. -- **FinishInstallUI** No content is currently available. -- **FirmwareDate** No content is currently available. -- **FirmwareRevision** No content is currently available. -- **FirmwareVersion** No content is currently available. -- **FirstHardwareId** No content is currently available. -- **FlightIds** No content is currently available. -- **GenericDriver** No content is currently available. -- **Inbox** No content is currently available. -- **InstallDate** No content is currently available. -- **LastCompatibleId** No content is currently available. -- **LegacyInstallReasonError** No content is currently available. -- **LowerFilters** No content is currently available. -- **MatchingDeviceId** No content is currently available. -- **NeedReboot** No content is currently available. -- **OriginalDriverInfName** No content is currently available. -- **ParentDeviceInstanceId** No content is currently available. -- **PendedUntilReboot** No content is currently available. -- **Problem** No content is currently available. -- **ProblemStatus** No content is currently available. -- **SecondaryDevice** No content is currently available. -- **ServiceName** No content is currently available. -- **SetupMode** No content is currently available. -- **StartTime** No content is currently available. -- **SubmissionId** No content is currently available. -- **UpperFilters** No content is currently available. +- **DriverDate** The date of the driver. +- **DriverDescription** A description of the driver function. +- **DriverInfName** Name of the INF file (the setup information file) for the driver. +- **DriverInfSectionName** Name of the DDInstall section within the driver INF file. +- **DriverPackageId** The ID of the driver package that is staged to the driver store. +- **DriverProvider** The driver manufacturer or provider. +- **DriverUpdated** Indicates whether the driver is replacing an old driver. +- **DriverVersion** The version of the driver file. +- **EndTime** The time the installation completed. +- **Error** Provides the WIN32 error code for the installation. +- **ExtensionDrivers** List of extension drivers that complement this installation. +- **FinishInstallAction** Indicates whether the co-installer invoked the finish-install action. +- **FinishInstallUI** Indicates whether the installation process shows the user interface. +- **FirmwareDate** The firmware date that will be stored in the EFI System Resource Table (ESRT). +- **FirmwareRevision** The firmware revision that will be stored in the EFI System Resource Table (ESRT). +- **FirmwareVersion** The firmware version that will be stored in the EFI System Resource Table (ESRT). +- **FirstHardwareId** The ID in the hardware ID list that provides the most specific device description. +- **FlightIds** A list of the different Windows Insider builds on the device. +- **GenericDriver** Indicates whether the driver is a generic driver. +- **Inbox** Indicates whether the driver package is included with Windows. +- **InstallDate** The date the driver was installed. +- **LastCompatibleId** The ID in the hardware ID list that provides the least specific device description. +- **LegacyInstallReasonError** The error code for the legacy installation. +- **LowerFilters** The list of lower filter drivers. +- **MatchingDeviceId** The hardware ID or compatible ID that Windows used to install the device instance. +- **NeedReboot** Indicates whether the driver requires a reboot. +- **OriginalDriverInfName** The original name of the INF file before it was renamed. +- **ParentDeviceInstanceId** The device instance ID of the parent of the device. +- **PendedUntilReboot** Indicates whether the installation is pending until the device is rebooted. +- **Problem** Error code returned by the device after installation. +- **ProblemStatus** The status of the device after the driver installation. +- **SecondaryDevice** Indicates whether the device is a secondary device. +- **ServiceName** The service name of the driver. +- **SetupMode** Indicates whether the driver installation took place before the initial installation of the device was completed. +- **StartTime** The time when the installation started. +- **SubmissionId** The driver submission identifier assigned by the Windows Hardware Development Center. +- **UpperFilters** The list of upper filter drivers. ### Microsoft.Windows.DriverInstall.NewDevInstallDeviceEnd -No content is currently available. +This event sends data about the driver installation once it is completed. The following fields are available: -- **DeviceInstanceId** No content is currently available. -- **DriverUpdated** No content is currently available. -- **Error** No content is currently available. -- **FlightId** No content is currently available. -- **InstallDate** No content is currently available. -- **InstallFlags** No content is currently available. -- **RebootRequired** No content is currently available. -- **RollbackPossible** No content is currently available. +- **DeviceInstanceId** The unique identifier of the device in the system. +- **DriverUpdated** Indicates whether the driver was updated. +- **Error** The Win32 error code of the installation. +- **FlightId** The ID of the Windows Insider build the device received. +- **InstallDate** The date the driver was installed. +- **InstallFlags** The driver installation flags. +- **RebootRequired** Indicates whether a reboot is required after the installation. +- **RollbackPossible** Indicates whether this driver can be rolled back. - **WuTargetedHardwareId** No content is currently available. - **WuUntargetedHardwareId** No content is currently available. From c14180bb1ecd7810628c83071bb0ea541e4632fe Mon Sep 17 00:00:00 2001 From: Brian Lich Date: Wed, 3 Apr 2019 08:16:25 -0700 Subject: [PATCH 107/724] new build 4/3/2019 8:16 AM --- ...ndows-diagnostic-events-and-fields-1703.md | 2 +- ...ndows-diagnostic-events-and-fields-1709.md | 2 +- ...ndows-diagnostic-events-and-fields-1803.md | 2 +- ...ndows-diagnostic-events-and-fields-1809.md | 102 +++++++----------- 4 files changed, 42 insertions(+), 66 deletions(-) diff --git a/windows/privacy/basic-level-windows-diagnostic-events-and-fields-1703.md b/windows/privacy/basic-level-windows-diagnostic-events-and-fields-1703.md index c7bbf928bd..b1c005dbbe 100644 --- a/windows/privacy/basic-level-windows-diagnostic-events-and-fields-1703.md +++ b/windows/privacy/basic-level-windows-diagnostic-events-and-fields-1703.md @@ -13,7 +13,7 @@ manager: dansimp ms.collection: M365-security-compliance ms.topic: article audience: ITPro -ms.date: 04/02/2019 +ms.date: 04/03/2019 --- diff --git a/windows/privacy/basic-level-windows-diagnostic-events-and-fields-1709.md b/windows/privacy/basic-level-windows-diagnostic-events-and-fields-1709.md index 72b3a95d4c..ab77c90805 100644 --- a/windows/privacy/basic-level-windows-diagnostic-events-and-fields-1709.md +++ b/windows/privacy/basic-level-windows-diagnostic-events-and-fields-1709.md @@ -13,7 +13,7 @@ manager: dansimp ms.collection: M365-security-compliance ms.topic: article audience: ITPro -ms.date: 04/02/2019 +ms.date: 04/03/2019 --- diff --git a/windows/privacy/basic-level-windows-diagnostic-events-and-fields-1803.md b/windows/privacy/basic-level-windows-diagnostic-events-and-fields-1803.md index 48424772ba..db64dc298d 100644 --- a/windows/privacy/basic-level-windows-diagnostic-events-and-fields-1803.md +++ b/windows/privacy/basic-level-windows-diagnostic-events-and-fields-1803.md @@ -13,7 +13,7 @@ manager: dansimp ms.collection: M365-security-compliance ms.topic: article audience: ITPro -ms.date: 04/02/2019 +ms.date: 04/03/2019 --- diff --git a/windows/privacy/basic-level-windows-diagnostic-events-and-fields-1809.md b/windows/privacy/basic-level-windows-diagnostic-events-and-fields-1809.md index f86d9d6c9c..f398e84056 100644 --- a/windows/privacy/basic-level-windows-diagnostic-events-and-fields-1809.md +++ b/windows/privacy/basic-level-windows-diagnostic-events-and-fields-1809.md @@ -13,7 +13,7 @@ manager: dansimp ms.collection: M365-security-compliance ms.topic: article audience: ITPro -ms.date: 04/02/2019 +ms.date: 04/03/2019 --- @@ -346,7 +346,6 @@ The following fields are available: - **DatasourceDriverPackage_TH2** The count of the number of this particular object type present on this device. - **DataSourceMatchingInfoBlock_19ASetup** The count of the number of this particular object type present on this device. - **DataSourceMatchingInfoBlock_19H1** The count of the number of this particular object type present on this device. -- **DataSourceMatchIngInfoBlock_19H1** No content is currently available. - **DataSourceMatchingInfoBlock_19H1Setup** The count of the number of this particular object type present on this device. - **DataSourceMatchingInfoBlock_RS1** The total DataSourceMatchingInfoBlock objects targeting Windows 10 version 1607 on this device. - **DataSourceMatchingInfoBlock_RS2** The count of the number of this particular object type present on this device. @@ -1742,6 +1741,8 @@ The following fields are available: - **PCFP** An ID for the system calculated by hashing hardware identifiers. - **PerfBackoff** Indicates if the run was invoked with logic to stop running when a user is present. Helps to understand why a run may have a longer elapsed time than normal. - **PerfBackoffInsurance** Indicates if appraiser is running without performance backoff because it has run with perf backoff and failed to complete several times in a row. +- **PerfBnDroff** No content is currently available. +- **PerfBnDroffInsurance** No content is currently available. - **RunAppraiser** Indicates if Appraiser was set to run at all. If this if false, it is understood that data events will not be received from this device. - **RunDate** The date that the telemetry run was stated, expressed as a filetime. - **RunGeneralTel** Indicates if the generaltel.dll component was run. Generaltel collects additional telemetry on an infrequent schedule and only from machines at telemetry levels higher than Basic. @@ -1807,6 +1808,7 @@ Provides information on IE and Census versions running on the device The following fields are available: +- **App�aiserRunEndTimeStamp** No content is currently available. - **AppraiserEnterpriseErrorCode** The error code of the last Appraiser enterprise run. - **AppraiserErrorCode** The error code of the last Appraiser run. - **AppraiserRunEndTimeStamp** The end time of the last Appraiser run. @@ -1874,8 +1876,10 @@ This event sends data about the BIOS and startup embedded in the device, to help The following fields are available: +- **Firmware�anufacturer** No content is currently available. - **FirmwareManufacturer** Represents the manufacturer of the device's firmware (BIOS). - **FirmwareReleaseDate** Represents the date the current firmware was released. +- **FirmwareRele�seDate** No content is currently available. - **FirmwareType** Represents the firmware type. The various types can be unknown, BIOS, UEFI. - **FirmwareVersion** Represents the version of the current firmware. @@ -1888,6 +1892,7 @@ The following fields are available: - **DeviceSampleRate** The telemetry sample rate assigned to the device. - **EnablePreviewBuilds** Used to enable Windows Insider builds on a device. +- **EnablePrevi�wBuilds** No content is currently available. - **FlightIds** A list of the different Windows Insider builds on this device. - **FlightingBranchName** The name of the Windows Insider branch currently used by the device. - **IsFlightsDisabled** Represents if the device is participating in the Windows Insider program. @@ -2251,6 +2256,7 @@ The following fields are available: - **AppStoreAutoUpdate** Retrieves the Appstore settings for auto upgrade. (Enable/Disabled). - **AppStoreAutoUpdateMDM** Retrieves the App Auto Update value for MDM: 0 - Disallowed. 1 - Allowed. 2 - Not configured. Default: [2] Not configured - **AppStoreAutoUpdatePolicy** Retrieves the Microsoft Store App Auto Update group policy setting +- **AppStoreAutoUpd�te** No content is currently available. - **DelayUpgrade** Retrieves the Windows upgrade flag for delaying upgrades. - **OSAssessmentFeatureOutOfDate** How many days has it been since a the last feature update was released but the device did not install it? - **OSAssessmentForFeatureUpdate** Is the device is on the latest feature update? @@ -2731,6 +2737,7 @@ The following fields are available: - **CanCollectOsTelemetry** True if we can collect diagnostic data telemetry, false otherwise. - **CanCollectWindowsAnalyticsEvents** True if we can collect Windows Analytics data, false otherwise. - **CanPerformDiagnosticEscalations** True if we can perform diagnostic escalation collection, false otherwise. +- **CanPerformiagnosticEscalations** No content is currently available. - **CanPerformTraceEscalations** True if we can perform trace escalation collection, false otherwise. - **CanPerfotmDiagnosticEscalations** No content is currently available. - **CanReportScenarios** True if we can report scenario completions, false otherwise. @@ -2776,56 +2783,43 @@ The following fields are available: - **CompositionRenderedSec** No content is currently available. - **CompressedBytesUploaded** Number of compressed bytes uploaded. - **ConsumerDroppedCount** Number of events dropped at consumer layer of telemetry client. +- **CriticaDataThrottleDroppedCount** No content is currently available. - **CriticalDataDbDroppedCount** Number of critical data sampled events dropped at the database layer. - **CriticalDataThrottleDroppedCount** The number of critical data sampled events that were dropped because of throttling. -- **CriticalDt2eDbDroppedCount** No content is currently available. -- **CriticalDt2eThrottleDroppedCount** No content is currently available. - **CriticalOverflowEntersCounter** Number of times critical overflow mode was entered in event DB. -- **CrrancalDataDbDroppedCount** No content is currently available. -- **CrrancalDataThrottleDroppedCount** No content is currently available. -- **CrrancalOverflowEntersCounter** No content is currently available. - **DbCriticalDroppedCount** Total number of dropped critical events in event DB. -- **DbCrrancalDroppedCount** No content is currently available. - **DbDroppedCount** Number of events dropped due to DB fullness. - **DbDroppedFailureCount** Number of events dropped due to DB failures. - **DbDroppedFullCount** Number of events dropped due to DB fullness. - **DecodingDroppedCount** Number of events dropped due to decoding failures. -- **Decoding刁刁刁刁刁刁刁刁刁刁刁刁** No content is currently available. - **EnteringCriticalOverflowDroppedCounter** Number of events dropped due to critical overflow mode being initiated. -- **EnteringCrrancalOverflowDroppedCounter** No content is currently available. - **EtwDroppedBufferCount** Number of buffers dropped in the UTC ETW session. - **EtwDroppedBuffertorFlags** No content is currently available. - **EtwDroppedCount** Number of events dropped at ETW layer of telemetry client. -- **Eve~tStoreResetSizeSum** No content is currently available. - **EventSequence** No content is currently available. - **EventsPersistedCount** Number of events that reached the PersistEvent stage. +- **EventStoreLhfetimeResetCounter** No content is currently available. - **EventStoreLifetimeResetCounter** Number of times event DB was reset for the lifetime of UTC. - **EventStoreResetCounter** Number of times event DB was reset. - **EventStoreResetSizeSum** Total size of event DB across all resets reports in this instance. -- **EventStOreResetSizeSum** No content is currently available. - **EventSubStoreResetCounter** Number of times event DB was reset. - **EventSubStoreResetSizeSum** Total size of event DB across all resets reports in this instance. - **EventsUploaded** Number of events uploaded. - **Flags** Flags indicating device state such as network state, battery state, and opt-in state. - **FullTriggerBufferDroppedCount** Number of events dropped due to trigger buffer being full. -- **FullTriggerBuvferDroppedCount** No content is currently available. - **GameInputSec** No content is currently available. - **HeartBeatSequenceNumber** The sequence number of this heartbeat. - **InteractiveTimeoutPeriodMS** No content is currently available. - **InvalidHttpCodeCount** Number of invalid HTTP codes received from contacting Vortex. -- **InvalidHttpCodECount** No content is currently available. - **LastAgentConnectionError** Last non-timeout error encountered in the host/agent channel. - **LastEventSizeOffender** Event name of last event which exceeded max event size. +- **LastInvalhdHttpCode** No content is currently available. - **LastInvalidHttpCode** Last invalid HTTP code received from Vortex. - **MaxActiveAgentConnectionCount** The maximum number of active agents during this heartbeat timeframe. -- **MaxIn]seScenarioCounter** No content is currently available. - **MaxInUseScenarioCounter** Soft maximum number of scenarios loaded by UTC. -- **MaxInUseScenarioCountev** No content is currently available. - **PreviousHeartBeatTime** Time of last heartbeat event (allows chaining of events). - **PrivacyBlockedCount** The number of events blocked due to privacy settings or tags. -- **Repe`tedUploadFailureDropped** No content is currently available. - **RepeatedUploadFailureDropped** Number of events lost due to repeated upload failures for a single buffer. -- **SettingsHttpAtsempts** No content is currently available. - **SettingsHttpAttempts** Number of attempts to contact OneSettings service. - **SettingsHttpFailures** The number of failures from contacting the OneSettings service. - **SinceFirstInteractivityMS** No content is currently available. @@ -2834,28 +2828,17 @@ The following fields are available: - **TargetAsId** No content is currently available. - **ThrottledDroppedCount** Number of events dropped due to throttling of noisy providers. - **TopUploaderErrors** List of top errors received from the upload endpoint. +- **TopUploaderErross** No content is currently available. - **UploaderDroppedCount** Number of events dropped at the uploader layer of telemetry client. - **UploaderErrorCount** Number of errors received from the upload endpoint. - **ViewFlags** No content is currently available. -- **VodtexFailuresTimeout** No content is currently available. -- **VodtexHttpAttempts** No content is currently available. -- **VodtexHttpFailures4xx** No content is currently available. -- **VodtexHttpFailures5xx** No content is currently available. -- **VodtexHttpResponseFailures** No content is currently available. -- **VodtexHttpResponsesWithDroppedEvents** No content is currently available. - **VortexFailuresTimeout** The number of timeout failures received from Vortex. -- **VortexHttpAtsempts** No content is currently available. - **VortexHttpAttempts** Number of attempts to contact Vortex. -- **VortexHttpeReponseFailures** No content is currently available. -- **VortexHttpeReponsesWithDroppedEvents** No content is currently available. - **VortexHttpFailures4xx** Number of 400-499 error codes received from Vortex. - **VortexHttpFailures5xx** Number of 500-599 error codes received from Vortex. -- **VortexHttpFailures5xz** No content is currently available. - **VortexHttpResponseFailures** Number of Vortex responses that are not 2XX or 400. - **VortexHttpResponsesWithDroppedEvents** Number of Vortex responses containing at least 1 dropped event. -- **VortexHttpResponsesWythDroppedEvents** No content is currently available. - **WindowFlags** No content is currently available. -- **刁刁刁刁刁merDroppedCoᕵnt** No content is currently available. ### TelClientSynthetic.HeartBeat_Aria_5 @@ -3460,21 +3443,19 @@ The following fields are available: - **AdapterTypeValue** The numeric value indicating the type of Graphics adapter. - **aiSeqId** The event sequence ID. -- **bootAd** No content is currently available. +- **B2ightnessVersionViaDDI** No content is currently available. - **bootId** The system boot ID. - **BrightnessVersionViaDDI** The version of the Display Brightness Interface. -- **CompupePreemptionLevel** No content is currently available. - **ComputePreemptionLevel** The maximum preemption level supported by GPU for compute payload. -- **ComputePreeMptionLevel** No content is currently available. +- **Dedic`tedSystemMemoryB** No content is currently available. +- **DedicatedSystemMemorqB** No content is currently available. - **DedicatedSystemMemoryB** The amount of system memory dedicated for GPU use (in bytes). -- **DedicatedViddoMemoryB** No content is currently available. - **DedicatedVideoMemoryB** The amount of dedicated VRAM of the GPU (in bytes). -- **DedicatedVidmoMemoryB** No content is currently available. -- **DedicatedVifeoMemoryB** No content is currently available. - **DisplayAdapterLuid** The display adapter LUID. - **DriverDate** The date of the display driver. - **DriverRank** The rank of the display driver. - **DriverVersion** The display driver version. +- **DX10UM@FilePath** No content is currently available. - **DX10UMDFilePath** The file path to the location of the DirectX 10 Display User Mode Driver in the Driver Store. - **DX11UMDFilePath** The file path to the location of the DirectX 11 Display User Mode Driver in the Driver Store. - **DX12UMDFilePath** The file path to the location of the DirectX 12 Display User Mode Driver in the Driver Store. @@ -3483,7 +3464,6 @@ The following fields are available: - **GPUPreemptionLevel** The maximum preemption level supported by GPU for graphics payload. - **GPURevisionID** The GPU revision ID. - **GPUVendorID** The GPU vendor ID. -- **IntarfaceId** No content is currently available. - **InterfaceId** The GPU interface ID. - **IsDisplayDevice** Does the GPU have displaying capabilities? - **IsHwSchSupported** Indicates whether the adapter supports hardware scheduling. @@ -3492,16 +3472,15 @@ The following fields are available: - **IsLDA** Is the GPU comprised of Linked Display Adapters? - **IsMiracastSupported** Does the GPU support Miracast? - **IsMismatchLDA** Is at least one device in the Linked Display Adapters chain from a different vendor? -- **IsMismat-hLDA** No content is currently available. - **IsMPOSupported** Does the GPU support Multi-Plane Overlays? - **IsMsMiracastSupported** Are the GPU Miracast capabilities driven by a Microsoft solution? - **IsPostAdapter** Is this GPU the POST GPU in the device? - **IsRemovable** TRUE if the adapter supports being disabled or removed. +- **IsRenderDdvice** No content is currently available. - **IsRenderDevice** Does the GPU have rendering capabilities? - **IsSoftwareDevice** Is this a software implementation of the GPU? -- **KMDF** No content is currently available. - **KMDFilePath** The file path to the location of the Display Kernel Mode Driver in the Driver Store. -- **MeasureEnablad** No content is currently available. +- **MeastreEnabled** No content is currently available. - **MeasureEnabled** Is the device listening to MICROSOFT_KEYWORD_MEASURES? - **MsHybridDiscrete** Indicates whether the adapter is a discrete adapter in a hybrid configuration. - **NumVidPnSources** The number of supported display output sources. @@ -3511,8 +3490,7 @@ The following fields are available: - **SubVendorID** The GPU sub vendor ID. - **TelemetryEnabled** Is the device listening to MICROSOFT_KEYWORD_TELEMETRY? - **TelInvEvntTrigger** What triggered this event to be logged? Example: 0 (GPU enumeration) or 1 (DxgKrnlTelemetry provider toggling) -- **TelINvEvntTrigger** No content is currently available. -- **TmlemetryEnabled** No content is currently available. +- **Tel�nvEvntTrigger** No content is currently available. - **version** The event version. - **WDDMVersion** The Windows Display Driver Model version. @@ -3601,39 +3579,35 @@ This event sends data about crashes for both native and managed applications, to The following fields are available: - **AppName** The name of the app that has crashed. -- **AppSassionGuid** No content is currently available. - **AppSessionGqid** No content is currently available. +- **AppSessionGui`** No content is currently available. - **AppSessionGuid** GUID made up of process ID and is used as a correlation vector for process instances in the telemetry backend. -- **AppTimestamp** No content is currently available. - **AppTimeStamp** The date/time stamp of the app. +- **AppVarsion** No content is currently available. - **AppVersion** The version of the app that has crashed. -- **ExcaptionCode** No content is currently available. - **ExceptionCode** The exception code returned by the process that has crashed. - **ExceptionOffset** The address where the exception had occurred. - **Flags** Flags indicating how reporting is done. For example, queue the report, do not offer JIT debugging, or do not terminate the process after reporting. - **FriendlyAppName** The description of the app that has crashed, if different from the AppName. Otherwise, the process name. - **IsFatal** True/False to indicate whether the crash resulted in process termination. - **ModName** Exception module name (e.g. bar.dll). -- **ModTimaStamp** No content is currently available. +- **ModPimeStamp** No content is currently available. +- **ModTimeSpamp** No content is currently available. - **ModTimeStamp** The date/time stamp of the module. -- **ModVarsion** No content is currently available. - **ModVersion** The version of the module that has crashed. -- **PackageFullNama** No content is currently available. +- **PackaceRelativeAppId** No content is currently available. - **PackageFullName** Store application identity. +- **PackageRelativeAppHd** No content is currently available. - **PackageRelativeAppId** Store application identity. - **ProcessArchitecture** Architecture of the crashing process, as one of the PROCESSOR_ARCHITECTURE_* constants: 0: PROCESSOR_ARCHITECTURE_INTEL. 5: PROCESSOR_ARCHITECTURE_ARM. 9: PROCESSOR_ARCHITECTURE_AMD64. 12: PROCESSOR_ARCHITECTURE_ARM64. -- **ProcessArinetecture** No content is currently available. - **ProcessCreateTime** The time of creation of the process that has crashed. +- **ProcessI`** No content is currently available. - **ProcessId** The ID of the process that has crashed. +- **ReportAd** No content is currently available. - **ReportId** A GUID used to identify the report. This can used to track the report across Watson. -- **TargepAsId** No content is currently available. - **TargetAppId** The kernel reported AppId of the application being reported. - **TargetAppVer** The specific version of the application being reported -- **TargetAppVr** No content is currently available. - **TargetAsId** The sequence number for the hanging process. -- **TarSetAppId** No content is currently available. -- **TarSetAppVer** No content is currently available. -- **TarSetAsId** No content is currently available. ## Feature update events @@ -4089,7 +4063,6 @@ The following fields are available: - **ProductVersion** The product version that is included in the driver file. - **Service** The name of the service that is installed for the device. - **WdfVersion** The Windows Driver Framework version. -- **YmageSize** No content is currently available. ### Microsoft.Windows.Inventory.Core.InventoryDriverBinaryRemove @@ -4609,6 +4582,7 @@ The following fields are available: - **BootApplicationId** This field tells us what the OS Loader Application Identifier is. - **BootAttemptCount** The number of consecutive times the boot manager has attempted to boot into this operating system. - **BootSequence** The current Boot ID, used to correlate events related to a particular boot session. +- **BootSequenft** No content is currently available. - **BootStatusPolicy** Identifies the applicable Boot Status Policy. - **BootType** Identifies the type of boot (e.g.: "Cold", "Hiber", "Resume"). - **EventTimestamp** Seconds elapsed since an arbitrary time point. This can be used to identify the time difference in successive boot attempts being made. @@ -4968,8 +4942,9 @@ Scan process event on Windows Update client. See the EventScenario field for spe The following fields are available: -- **Ä7G§ Date: Wed, 3 Apr 2019 21:33:38 +0000 Subject: [PATCH 108/724] Merged PR 15091: Push to live to fix case issues --- ...ermissions-microsoft-store-for-business.md | 4 +- ...-reference-microsoft-store-for-business.md | 4 +- .../connect-to-remote-aadj-pc.md | 4 +- .../mdm/assignedaccess-csp.md | 1 + .../mdm/policy-csp-restrictedgroups.md | 16 +- .../mdm/policy-csp-storage.md | 21 ++- .../mdm/policy-csp-system.md | 4 +- ...and-centennial-app-policy-configuration.md | 3 + .../guidelines-for-assigned-access-app.md | 2 + windows/deployment/deploy-m365.md | 6 +- ...prepare-for-windows-deployment-with-mdt.md | 2 +- .../images/{m365da.PNG => m365da.png} | Bin windows/deployment/images/wada.png | Bin 0 -> 228785 bytes windows/deployment/update/waas-morenews.md | 25 ++- .../update/waas-servicing-differences.md | 2 +- .../update/windows-analytics-get-started.md | 2 +- .../deployment/update/windows-as-a-service.md | 24 +-- .../demonstrate-deployment-on-vm.md | 2 +- .../windows-autopilot/enrollment-status.md | 4 +- .../windows-autopilot/troubleshooting.md | 6 +- .../windows-autopilot-requirements-network.md | 7 +- .../credential-guard-manage.md | 3 + .../credential-guard-requirements.md | 2 +- .../hello-hybrid-aadj-sso-cert.md | 6 +- .../hello-hybrid-aadj-sso.md | 2 +- .../hello-planning-guide.md | 10 +- .../microsoft-defender-atp-mac.md | 175 ++++++++++-------- ...tch-up-scans-windows-defender-antivirus.md | 2 +- .../reqs-wd-app-guard.md | 2 +- ...ows-defender-advanced-threat-protection.md | 4 +- ...ows-defender-advanced-threat-protection.md | 12 +- ...ows-defender-advanced-threat-protection.md | 2 +- .../attack-surface-reduction-exploit-guard.md | 23 +++ .../enable-attack-surface-reduction.md | 3 + .../network-protection-exploit-guard.md | 12 +- 35 files changed, 234 insertions(+), 163 deletions(-) rename windows/deployment/images/{m365da.PNG => m365da.png} (100%) create mode 100644 windows/deployment/images/wada.png diff --git a/store-for-business/roles-and-permissions-microsoft-store-for-business.md b/store-for-business/roles-and-permissions-microsoft-store-for-business.md index 2b6e890314..48a7bcf332 100644 --- a/store-for-business/roles-and-permissions-microsoft-store-for-business.md +++ b/store-for-business/roles-and-permissions-microsoft-store-for-business.md @@ -81,6 +81,6 @@ This table lists the roles and their permissions. >You need to be a Global Administrator, or have the Billing account owner role to access **Permissions**.  2. Select **Manage**, and then select **Permissions**. -3. On **Roles**, or **Purchasing roles**, select **Assing roles**. +3. On **Roles**, or **Purchasing roles**, select **Assign roles**. 4. Enter a name, choose the role you want to assign, and select **Save**. - If you don't find the name you want, you might need to add people to your Azure AD directory. For more information, see [Manage user accounts](manage-users-and-groups-microsoft-store-for-business.md). \ No newline at end of file + If you don't find the name you want, you might need to add people to your Azure AD directory. For more information, see [Manage user accounts](manage-users-and-groups-microsoft-store-for-business.md). diff --git a/store-for-business/settings-reference-microsoft-store-for-business.md b/store-for-business/settings-reference-microsoft-store-for-business.md index fa03ac4ff7..8109fc1389 100644 --- a/store-for-business/settings-reference-microsoft-store-for-business.md +++ b/store-for-business/settings-reference-microsoft-store-for-business.md @@ -24,8 +24,8 @@ The Microsoft Store for Business and Education has a group of settings that admi | Private store | Update the name for your private store. The new name will be displayed on a tab in the Store. For more information, see [Manage private store settings](manage-private-store-settings.md). | **Settings - Distribute** | | Offline licensing | Configure whether or not to make offline-licensed apps available in the Microsoft Store for Business and Education. For more information, see [Distribute offline apps](distribute-offline-apps.md). | **Settings - Shop** | | Allow users to shop | Configure whether or not people in your organization or school can see and use the shop function in Store for Business or Store for Education. For more information, see [Allow users to shop](acquire-apps-microsoft-store-for-business.md#allow-users-to-shop). | **Settings - Shop** | -| Make everyone a Basic Purchaser | Allow everyone in your organization to automatically become a Basic Purchaser. This allows them to purchase apps and manage them. For more information, see [Make everyone a Basic Purchaser](https://docs.microsoft.com/education/windows/education-scenarios-store-for-business#basic-purchaser-role).
**Make everyone a Basic Purchaser** is only available in Microsoft Store for Education. | **Settings - Shop** | -| App request | Configure whether or not people in your organization can request apps for admins to purchase. For more information, see [Distribute offline apps](acquire-apps-microsoft-store-for-business.md). | **Settings - Distribute** | +| Make everyone a Basic Purchaser | Allow everyone in your organization to automatically become a Basic Purchaser. This allows them to purchase apps and manage them. For more information, see [Make everyone a Basic Purchaser](https://docs.microsoft.com/education/windows/education-scenarios-store-for-business#basic-purchaser-role). | **Settings - Shop** | +| App request | Configure whether or not people in your organization can request apps for admins to purchase. For more information, see [Distribute offline apps](acquire-apps-microsoft-store-for-business.md). | **Settings - Shop** | | Management tools | Management tools that are synced with Azure AD are listed on this page. You can choose one to use for managing app updates and distribution. For more information, see [Configure MDM provider](configure-mdm-provider-microsoft-store-for-business.md). | **Settings - Distribute** | | Device Guard signing | Use the Device Guard signing portal to add unsigned apps to a code integrity policy, or to sign code integrity policies. For more information, see [Device Guard signing portal](device-guard-signing-portal.md). | **Settings - Devices** | | Permissions | Manage permissions for your employees. For more information, see [Roles and permissions in the Microsoft Store for Business and Education](roles-and-permissions-microsoft-store-for-business.md). | **Permissions - Roles**, **Permissions - Purchasing roles**, and **Permissions - Blocked basic purchasers** | diff --git a/windows/client-management/connect-to-remote-aadj-pc.md b/windows/client-management/connect-to-remote-aadj-pc.md index 3042e56449..7812898ee3 100644 --- a/windows/client-management/connect-to-remote-aadj-pc.md +++ b/windows/client-management/connect-to-remote-aadj-pc.md @@ -41,7 +41,7 @@ From its release, Windows 10 has supported remote connections to PCs that are jo >[!NOTE] >You can specify individual Azure AD accounts for remote connections by having the user sign in to the remote device at least once and then running the following PowerShell cmdlet: > - >`net localgroup "Remote Desktop Users" /add "AzureAD\FirstnameLastname"`, where *FirstnameLastname* is the name of the user profile in C:\Users\, which is created based on DisplayName attribute in Azure AD. + >`net localgroup "Remote Desktop Users" /add "AzureAD\the-UPN-attribute-of-your-user"`, where *FirstnameLastname* is the name of the user profile in C:\Users\, which is created based on DisplayName attribute in Azure AD. > >In Windows 10, version 1709, the user does not have to sign in to the remote device first. > @@ -50,7 +50,7 @@ From its release, Windows 10 has supported remote connections to PCs that are jo 4. Enter **Authenticated Users**, then click **Check Names**. If the **Name Not Found** window opens, click **Locations** and select this PC. >[!TIP] - >When you connect to the remote PC, enter your account name in this format: `AzureADName\YourAccountName`. + >When you connect to the remote PC, enter your account name in this format: `AzureAD UPN`. The local PC must either be domain-joined or Azure AD-joined. The local PC and remote PC must be in the same Azure AD tenant. ## Supported configurations diff --git a/windows/client-management/mdm/assignedaccess-csp.md b/windows/client-management/mdm/assignedaccess-csp.md index e6004a22a5..13f0987eca 100644 --- a/windows/client-management/mdm/assignedaccess-csp.md +++ b/windows/client-management/mdm/assignedaccess-csp.md @@ -895,6 +895,7 @@ Status Get + diff --git a/windows/client-management/mdm/policy-csp-restrictedgroups.md b/windows/client-management/mdm/policy-csp-restrictedgroups.md index 271a9a0054..9b75fbd479 100644 --- a/windows/client-management/mdm/policy-csp-restrictedgroups.md +++ b/windows/client-management/mdm/policy-csp-restrictedgroups.md @@ -50,6 +50,12 @@ ms.date: 03/15/2018
![step one](../images/one.png)![set up device](../images/set-up-device.png)

Enter a name for the device.

(Optional) Select a license file to upgrade Windows 10 to a different edition. [See the permitted upgrades.](https://technet.microsoft.com/itpro/windows/deploy/windows-10-edition-upgrades)

Toggle **Yes** or **No** to **Configure devices for shared use**. This setting optimizes Windows 10 for shared use scenarios. [Learn more about shared PC configuration.](../set-up-shared-or-guest-pc.md)

You can also select to remove pre-installed software from the device.
![device name, upgrade to enterprise, shared use, remove pre-installed software](../images/set-up-device-details-desktop.png)
![step two](../images/two.png) ![set up network](../images/set-up-network.png)

Toggle **On** or **Off** for wireless network connectivity. If you select **On**, enter the SSID, the network type (**Open** or **WPA2-Personal**), and (if **WPA2-Personal**) the password for the wireless network.
![Enter network SSID and type](../images/set-up-network-details-desktop.png)
![step three](../images/three.png) ![account management](../images/account-management.png)

Enable account management if you want to configure settings on this page.

You can enroll the device in Active Directory, enroll in Azure Active Directory, or create a local administrator account on the device

To enroll the device in Active Directory, enter the credentials for a least-privileged user account to join the device to the domain.

Before you use a Windows Configuration Designer wizard to configure bulk Azure AD enrollment, [set up Azure AD join in your organization](https://docs.microsoft.com/azure/active-directory/active-directory-azureadjoin-setup). The **maximum number of devices per user** setting in your Azure AD tenant determines how many times the bulk token that you get in the wizard can be used. To enroll the device in Azure AD, select that option and enter a friendly name for the bulk token you will get using the wizard. Set an expiration date for the token (maximum is 30 days from the date you get the token). Click **Get bulk token**. In the **Let's get you signed in** window, enter an account that has permissions to join a device to Azure AD, and then the password. Click **Accept** to give Windows Configuration Designer the necessary permissions.

To create a local administrator account, select that option and enter a user name and password.

**Important:** If you create a local account in the provisioning package, you must change the password using the **Settings** app every 42 days. If the password is not changed during that period, the account might be locked out and unable to sign in.
![join Active Directory, Azure AD, or create a local admin account](../images/account-management-details.png)
![step three](../images/three.png) ![account management](../images/account-management.png)

Enable account management if you want to configure settings on this page.

You can enroll the device in Active Directory, enroll in Azure Active Directory, or create a local administrator account on the device

To enroll the device in Active Directory, enter the credentials for a least-privileged user account to join the device to the domain.

Before you use a Windows Configuration Designer wizard to configure bulk Azure AD enrollment, [set up Azure AD join in your organization](https://docs.microsoft.com/azure/active-directory/active-directory-azureadjoin-setup). The **maximum number of devices per user** setting in your Azure AD tenant determines how many times the bulk token that you get in the wizard can be used. To enroll the device in Azure AD, select that option and enter a friendly name for the bulk token you will get using the wizard. Set an expiration date for the token (maximum is 180 days from the date you get the token). Click **Get bulk token**. In the **Let's get you signed in** window, enter an account that has permissions to join a device to Azure AD, and then the password. Click **Accept** to give Windows Configuration Designer the necessary permissions.

To create a local administrator account, select that option and enter a user name and password.

**Important:** If you create a local account in the provisioning package, you must change the password using the **Settings** app every 42 days. If the password is not changed during that period, the account might be locked out and unable to sign in.
![join Active Directory, Azure AD, or create a local admin account](../images/account-management-details.png)
![step four](../images/four.png) ![add applications](../images/add-applications.png)

You can install multiple applications, both Windows desktop applications (Win32) and Universal Windows Platform (UWP) apps, in a provisioning package. The settings in this step vary according to the application that you select. For help with the settings, see [Provision PCs with apps](provision-pcs-with-apps.md).
![add an application](../images/add-applications-details.png)
![step five](../images/five.png) ![add certificates](../images/add-certificates.png)

To provision the device with a certificate, click **Add a certificate**. Enter a name for the certificate, and then browse to and select the certificate to be used.
![add a certificate](../images/add-certificates-details.png)
![finish](../images/finish.png)

You can set a password to protect your provisioning package. You must enter this password when you apply the provisioning package to a device.
![Protect your package](../images/finish-details.png)
+Footnote: + +- 1 - Added in Windows 10, version 1607. +- 2 - Added in Windows 10, version 1703. +- 3 - Added in Windows 10, version 1709. +- 4 - Added in Windows 10, version 1803. @@ -132,15 +138,7 @@ Here is an example:


Take note: -* You must include the local administrator in the administrators group or the policy will fail +* You should include the local administrator while modifying the administrators group to prevent accidental loss of access * Include the entire UPN after AzureAD -Footnote: - -- 1 - Added in Windows 10, version 1607. -- 2 - Added in Windows 10, version 1703. -- 3 - Added in Windows 10, version 1709. -- 4 - Added in Windows 10, version 1803. - - diff --git a/windows/client-management/mdm/policy-csp-storage.md b/windows/client-management/mdm/policy-csp-storage.md index 42dc77dd56..2760176424 100644 --- a/windows/client-management/mdm/policy-csp-storage.md +++ b/windows/client-management/mdm/policy-csp-storage.md @@ -33,6 +33,9 @@ ms.date: 01/14/2019
Storage/ConfigStorageSenseCloudContentDehydrationThreshold
+
+ Storage/ConfigStorageSenseDownloadsCleanupThreshold +
Storage/ConfigStorageSenseGlobalCadence
@@ -160,7 +163,7 @@ If you do not configure this policy setting, Storage Sense is turned off by defa ADMX Info: - GP English name: *Allow Storage Sense* - GP name: *SS_AllowStorageSenseGlobal* -- GP path: *SOFTWARE/Policies/Microsoft/Windows/StorageSense* +- GP path: *System/Storage Sense* - GP ADMX file name: *StorageSense.admx* @@ -228,7 +231,7 @@ If you do not configure this policy setting, Storage Sense will delete the user ADMX Info: - GP English name: *Allow Storage Sense Temporary Files cleanup* - GP name: *SS_AllowStorageSenseTemporaryFilesCleanup* -- GP path: *System/StorageSense* +- GP path: *System/Storage Sense* - GP ADMX file name: *StorageSense.admx* @@ -296,7 +299,7 @@ If you disable or do not configure this policy setting, then Storage Sense will ADMX Info: - GP English name: *Configure Storage Sense Cloud Content dehydration threshold* - GP name: *SS_ConfigStorageSenseCloudContentDehydrationThreshold* -- GP path: *System/StorageSense* +- GP path: *System/Storage Sense* - GP ADMX file name: *StorageSense.admx* @@ -350,11 +353,11 @@ ADMX Info: -When Storage Sense runs, it can delete files in the user’s Downloads folder if they have been there for over a certain amount of days. +When Storage Sense runs, it can delete files in the user’s Downloads folder if they haven’t been opened for more than a certain number of days. If the Storage/AllowStorageSenseGlobal policy is disabled, then this policy does not have any effect. -If you enable this policy setting, you must provide the minimum age threshold (in days) of a file in the Downloads folder before Storage Sense will delete it. Supported values are: 0–365. +If you enable this policy setting, you must provide the number of days since a file in the Downloads folder has been opened before Storage Sense will delete it. Supported values are: 0–365. If you set this value to zero, Storage Sense will not delete files in the user’s Downloads folder. The default is 0, or never deleting files in the Downloads folder. @@ -365,7 +368,7 @@ If you disable or do not configure this policy setting, then Storage Sense will ADMX Info: - GP English name: *Configure Storage Storage Downloads cleanup threshold* - GP name: *SS_ConfigStorageSenseDownloadsCleanupThreshold* -- GP path: *System/StorageSense* +- GP path: *System/Storage Sense* - GP ADMX file name: *StorageSense.admx* @@ -438,8 +441,8 @@ If you do not configure this policy setting, then the Storage Sense cadence is s ADMX Info: - GP English name: *Configure Storage Sense cadence* -- GP name: *RemovableDisks_DenyWrite_Access_2* -- GP path: *SOFTWARE/Policies/Microsoft/Windows/StorageSense* +- GP name: *SS_ConfigStorageSenseGlobalCadence* +- GP path: *System/Storage Sense* - GP ADMX file name: *StorageSense.admx* @@ -507,7 +510,7 @@ If you disable or do not configure this policy setting, Storage Sense will delet ADMX Info: - GP English name: *Configure Storage Sense Recycle Bin cleanup threshold* - GP name: *SS_ConfigStorageSenseRecycleBinCleanupThreshold* -- GP path: *System/StorageSense* +- GP path: *System/Storage Sense* - GP ADMX file name: *StorageSense.admx* diff --git a/windows/client-management/mdm/policy-csp-system.md b/windows/client-management/mdm/policy-csp-system.md index e1751117bd..16bfa23ec7 100644 --- a/windows/client-management/mdm/policy-csp-system.md +++ b/windows/client-management/mdm/policy-csp-system.md @@ -681,11 +681,13 @@ ADMX Info: -Specifies whether to allow the user to factory reset the phone by using control panel and hardware key combination. +Specifies whether to allow the user to factory reset the device by using control panel and hardware key combination. Most restricted value is 0. +> [!TIP] +> This policy is also applicable to Windows 10 and not exclusive to phone. The following list shows the supported values: orted values: diff --git a/windows/client-management/mdm/win32-and-centennial-app-policy-configuration.md b/windows/client-management/mdm/win32-and-centennial-app-policy-configuration.md index eb942f3643..543252e8f2 100644 --- a/windows/client-management/mdm/win32-and-centennial-app-policy-configuration.md +++ b/windows/client-management/mdm/win32-and-centennial-app-policy-configuration.md @@ -47,6 +47,9 @@ When the ADMX policies are imported, the registry keys to which each policy is w - software\policies\microsoft\vba\security\ - software\microsoft\onedrive +> [!Warning] +> Some operating system components have built in functionality to check devices for domain membership. MDM enforces the configured policy values only if the devices are domain joined, otherwise it does not. However, you can still import ADMX files and set ADMX-backed policies regardless of whether the device is domain joined or non-domain joined. + ## Ingesting an app ADMX file The following ADMX file example shows how to ingest a Win32 or Desktop Bridge app ADMX file and set policies from the file. The ADMX file defines eight policies. diff --git a/windows/configuration/guidelines-for-assigned-access-app.md b/windows/configuration/guidelines-for-assigned-access-app.md index 06a64d0755..fdbc8f522a 100644 --- a/windows/configuration/guidelines-for-assigned-access-app.md +++ b/windows/configuration/guidelines-for-assigned-access-app.md @@ -49,6 +49,8 @@ In Windows 10, version 1803 and later, you can install the **Kiosk Browser** app >[!NOTE] >Kiosk Browser supports a single tab. If a website has links that open a new tab, those links will not work with Kiosk Browser. Kiosk Browser does not support .pdfs. +> +>Kiosk Browser cannot access intranet websites. **Kiosk Browser** must be downloaded for offline licensing using Microsoft Store For Business. You can deploy **Kiosk Browser** to devices running Windows 10, version 1803 (Pro, Business, Enterprise, and Education). diff --git a/windows/deployment/deploy-m365.md b/windows/deployment/deploy-m365.md index 9803bd8551..1c5fe6c645 100644 --- a/windows/deployment/deploy-m365.md +++ b/windows/deployment/deploy-m365.md @@ -34,10 +34,10 @@ For Windows 10 deployment, Microsoft 365 includes a fantastic deployment advisor You can check out the Microsoft 365 deployment advisor and other resources for free! Just follow the steps below. -1. Obtain a free EMS 90-day trial by visiting the following link. Provide your email address and answer a few simple questions. - - [Free Trial - Enterprise Mobility + Security](https://www.microsoft.com/cloud-platform/enterprise-mobility-security-trial) +>[!NOTE] +>If you have not run a setup guide before, you will see the **Prepare your environment** guide first. This is to make sure you have basics covered like domain verification and a method for adding users. At the end of the "Prepare your environment" guide, there will be a **Ready to continue** button that sends you to the original guide that was selected. +1. [Obtain a free M365 trial](https://docs.microsoft.com/office365/admin/try-or-buy-microsoft-365). 2. Check out the [Microsoft 365 deployment advisor](https://portal.office.com/onboarding/Microsoft365DeploymentAdvisor#/). 3. Also check out the [Windows Analytics deployment advisor](https://portal.office.com/onboarding/WindowsAnalyticsDeploymentAdvisor#/). This advisor will walk you through deploying [Upgrade Readiness](https://docs.microsoft.com/windows/deployment/upgrade/manage-windows-upgrades-with-upgrade-readiness), [Update Compliance](https://docs.microsoft.com/windows/deployment/update/update-compliance-monitor), and [Device Health](https://docs.microsoft.com/windows/deployment/update/device-health-monitor). diff --git a/windows/deployment/deploy-windows-mdt/prepare-for-windows-deployment-with-mdt.md b/windows/deployment/deploy-windows-mdt/prepare-for-windows-deployment-with-mdt.md index c96216fab7..de0cd33bf5 100644 --- a/windows/deployment/deploy-windows-mdt/prepare-for-windows-deployment-with-mdt.md +++ b/windows/deployment/deploy-windows-mdt/prepare-for-windows-deployment-with-mdt.md @@ -48,7 +48,7 @@ These steps assume that you have the MDT01 member server installed and configure 3. User State Migration Tool (USMT) >[!IMPORTANT] - >Starting with Windows 10, version 1809, Windows PE is released separately from the AFK. See [Download and install the Windows ADK](https://docs.microsoft.com/windows-hardware/get-started/adk-install) for more information. + >Starting with Windows 10, version 1809, Windows PE is released separately from the ADK. See [Download and install the Windows ADK](https://docs.microsoft.com/windows-hardware/get-started/adk-install) for more information. ## Install MDT diff --git a/windows/deployment/images/m365da.PNG b/windows/deployment/images/m365da.png similarity index 100% rename from windows/deployment/images/m365da.PNG rename to windows/deployment/images/m365da.png diff --git a/windows/deployment/images/wada.png b/windows/deployment/images/wada.png new file mode 100644 index 0000000000000000000000000000000000000000..1c715e8f0e798159119d8bcd2f6eeed2844e286a GIT binary patch literal 228785 zcmbrleLU0q|397_IUOfD$2+94bGq_=zr&KmnC(=jobwhc9V9HRT3IgFVr-+FQU_a( zlaaA5PDw78<|^hYM%a>>i40@IFw8FO!hWmszWlzwpWo;9yZ!#ajT^Vu{dIrb?+?%C z(-gJef%(BMn5~hZk_JQkKZ3Wl@K=9c)GuQ_@}~} zwd=_T&&6#f`#b8^zxvwnr-EMdvmoxLD**S6*FXC@=h&Xe z`LYiZ`kBZdUrBcEtpAzy&2dAwHDkEYMc7cNATV9|(Hl3vvnWk{)nTQmW#&pR^F?@J zViQKZgQ}606!Db~OA$>{4+7!>M{D-LOeE#BY4Mql2)Z=%`IkdwhUCOPfrLemOfZ z)P(w)n2m1P2b8)F+(-Kku>k>PF@W&|Fw!0q(-qah3R#_;l)Va@i&GJY)a%`rJBIvVS?(yh$sX1{|VkGfk z27cel*quNfALV}T3em(XGGYMHB^$joP*RmVxN`&!wzQWzCHt3waR=uBi?oQFg3p=V zU_^1M7@uUutTshO$~k;lpWhy{xGx2xgF*ZtUs#q)fq*gtP`{D3Nt@B>*cCJ{@&t-H z5`enXJ|_WpSML>m2Kk{7xdH!?H!@7P{3YTo6*_5g8ynC`S<9|igYDRD=Bimo)%r11 z-Cmk6>#xtinf(DRcNZfsl#pt*Q` zxJ?5)0uWCEJaa}aI~GM=%^xy*&j7j?o=YZbRavyAerUIJn;JJcG&m=P97QrOD+|q1 z+^9fL%gPB&!=kEa;i>~m8XZ?C!4jYUG{}xdRTZt3lL*1sy9g@Ds{YBd+2 z+tjCqT#xon_u|)yJ-d^9x1*Iec@4=wZ>NSsJNXnvNcmPY*{9S+2uEC_oKUJ{SLbGEi z6cetvFE)WOmoV`Y%SUw#zF8V_!L;NfzOk*{?x;#mi;Uq%0xy+z0z?oIZ;@`(wlALg zmvNpc{>uE0TBmCCb7W)Xa>`OcYAknrn|PaFlx?=@YLB>TQ$bQcPDdg%L)U%Ga;i|! zH87qzhc_6ZMDrzfddIVyJ}AD(Vlwm?3qAfRw^~Te$xj%k3Z4(%3@{ywA9>#Da@@4@ z=ZJI1;=b%ihr(6ip>KV{V3BaQiw_l-!~SggJKOsxe0J8vlHh03j0oe=7fljcR{N-D zAXw!EgY-tmCGE5wvS*^gboOG55cnK4WTW=!15T)3BK@}w!|G2n}ixg{-ZO64t$4|*@(a-{c(HjA2g zmax&rb#qj?Y}c)PW7pq|u-cbc>4DwG?<{Ku51-tw4lnCwWKeOzT5q&*V?b?am*6qX z6X3(LQjSHj(qM?Y!+!I-VCre)F(6hCpmG?tV0K05x#4vLXSF4tknZkB{1?bL~yEB5E1OJA5gLiDs3 zVVv$61>v*Oi-nUZ>D7A3uFOM{egwr1zIOA)*c~!~QCeqr)KNVDt!U&L191k)ij0pX zM`C~wu$(y}-#F2~cH%H`K6lL-@c1j36Y-#fhM24Ean55lC-aJ^OfI?^{k;_e&sfpu znU&%mM}_Su%#JB+%QM$DxH5jzrH1M74V!2fZAUP8y|zM0gJNeueamIW{(O z?PH*Gq090f+YbD;k8yVTh6Pm;PWZr^FPG7Lz1b9FN=moW2V`;EKjYjKlkdGJ*B=O? z&xopb#ot9Q+_GF^=DAtQ_6(&T>@nqQkvRVSkRk-jR9L z_FsHa(SeVtfU~}zqBoq=xkOuO3#7_s<1z2^XD27`%p)_R@f}=R^4s;OF2$POxtOrl zrGu(R66D?gaBbM0k@CrBg zNlnY$f`+s95x#%eg)9229v6|aHcw8Txo?`x$_k0%-*;9cnj<}?kaN%y>9%<*QsG#_ zsEKK10ny=PK12O|m|HdT7lINC+$VRtRP`Sos`nu1;PsQTes|Eg@*BL9LJIzShM{Uk z6qjY5WXSG3wqUn0#4elZ747RtmnsY6uxrn{#LR!t>PE&^xbusN^|1`LqSXAgkTW{r z&88)I;KF8C;BqpE+w7O@gOYt zXhxw?NZ6(I7I-Z^-GtHb=YsU+q9f;$52otMsST1}+WjoBp`W$Ke>HgXBf zEvFhiPY$aeumQC6^5PxF83*BiIx2yrxX3qf&e~W8rBefRH36CFO?A^IAt~pxel_Y0 zx%=7T>q9JfjWr7WaG-%MXFR&HBUO3dydX!)w9;*~4So)-a1|Z{vJ|qnO;CPO zVVFNTxD4lM)*M@Udn=VT)BOk(JUe}`_m>s{NZY#HmuajcC)1z`>bWfRSkP4)%{b}) zG84V7iDhKp!8-E3&#rVW52+~;Lt9WK9WgDD4T%EXTtFPr!g{*uK8?UU`=757@2Zi3kBDEQJwYQ1-Z?80Bq zt%~IbE;&mE*`6mxIrada-0B+?~ zPN26^-j{YYSg)d_Vb-fV!rZQ&NQ+*$zpw#5shrVg;2Cu?xB0q&f*S6pH~K~PyQTeA zRJZ@Tg=2%N>#!afTx7lWp4=R)d8y)_hfCn!NJ3?rrU?ScJWfUm<2G{G+vf7Mt5kBt zgShGGEe({_=Vxdj;Y!~iI5%_K+tHH<&Hz4-0^&I zeLgNrP*maT0qaI)NHo`6VjdKlZy2m8LL~ufx&Th!klo{&tzvM_fA<{LxAR}5t$dHV z0%iW1)?HWMEC0bX2ql^O2Vd_`lZ59FLaD1z!vy#&P4OibEDb_jQB6lT?PnlfHZ*=0 zF_5?8Vg?lY0K^Rz|LULQZ@cGhb8+weo{}tyG+;-xJ?DZAqpti_mnE2>nte$)uvy^I z6uJrUo$>#FbbpU#tfZxiuKP1zWarkTYt}nZ{pAzVn%ui7!66!SHy9(ljcP!I^&1bw z2NmuqfaOHqMSJwZe$-CSI6u(dM4Zd?M}}oWw4CQistA)E6Na^4>cxEUVN4H~RQPs_ z(qi#BrK|H1W9#bQ)y&VlA7w`F^ZK&$2@$Y&1I2jj$GmYLvb)fG6+&e?lrdbeb1Qn2 z73LRr(I&^0rgyF9N6O8OOX>0QuBGmBMwl_BU#gv5Y23X?>)@T)Pdo95@%n5a!y@X= zHlg>(7Esw*R(GOBR7>y(X35nu2{nH0^lHx_=(g8fMKaBCUDez49GL71X(Ei8?A{00 zJ-VR(EuYZuw>ZAJ@49fd?-VR4ymx+fV9HH6SvkapFsAkS^V@CZY;#oMk#idMgJPwE zcoS}rcH!ai%I|`3_J3V36>?4^GUn-VK`To6j0^E$^@3 zB?y;}3*d zO$5bc^cwd55_+EVhPqsI)7SC<4gWA(WMFwPbboLAPo*ZsjuX};Wk-0%*xrh z>s3Z$*X>UK5Qdux$i#qeHH4h*xI;_YH2mg3ePucZ22iJB?R|vnn&x_M@-tBUK?3p& za&BoIR3t+bGD9a1m%h&)MUx7P(2nf3zrPXcFBQc-f;KFEYkr$hX2dbn%&yw0R4_i$ zh$#4u0qHR^D+Oy*zrMH{#}gzS&1_3(8Hm5tHK^DqT`|8Dz_Nl_z8Lcr4HuJFA@Dl` z0rNNNtfRk8N_nh%lkai0q@(s_SwOix{#Gn1M^yRp>K?@5k6zyFUiH{+HryA-%D(7yw4Q_5@nfjlT>}_`{RX$dyN#7~HjSg`8LOg#GwW&!B5WY6FeTcxCvV~7uo3Ul4rQu z0B1LSH4L)M2|0e>tY^(<`DS!j&Jf>wR!eO{q8HX}?(Y0{QANsWnLE(hK9-(k!< za8)0?M8`Y-3s^(|n=e*2kBgR?@3W=%g61Jn=0b=Uz{{4$ZvbPsR*0lBfQ2UmpO}gG zEeGGcW;>SncD+SvlIcj|tn6E>1d3&9bVf^nW+%v;)&Q9_8e2SlO2*zNqQW^%KZi8q zXECN0v`#{?#9H+2_QNXb7yc15|4QO1HTDBH@Z{pUuGbmbT zB;|)tqCt~5wwN69p2!i63?O~^l&0EizA?&(JN%`!q>3nX>iDg;-dp+X%D5n{_oC5l znNsc~vi$n4_9Wkhb-1%6wt>ibH=M}qiG3x((Qx7W(l8Ko3e0aiwK35lASl|m>_F4Y zE@V?rp9!CQV%bCg@Os$f2r|#v_jgBT3SU;s@pg>#nnf?nIu}JRI6)WFB$Tnm0qe(Y zY=Uai9AGHQ!cQjQRi4yNO0YPCHjB26D>g247DiQlXO*a43R#D>4Yryp2Lip1h#>#frnqk<+ zNFqLkU6r+Zd3*?l8c$H7vn*`{ewpkuw#FnQ_Vp>(7{}=(&6KkU>^u(v?G~=)i5^rR zc38x@vT(~nP4>wU!#HfgA1@kqc%!IKJqfthmH8}Y!Jt(|U|0-)OrNOInWN_lRKLUy=ZgC&9PM%8!tATYt z4QJH@3<-mRlc2hnHpTkN3Y)?JOJJ;xrtmT+cggS9Aju!I)-Bmn508@2Z|3MkfBO!&F?06u{egEuOyr-k=SMTAh zMA2o+>SXUy2G3@UyeN5b&SHmt{rF7RBU47VK}QRdw7oQ>^#V(SJ+%RKE?Bj>+|Sr! z$_KZMm$)2FqiR>W;@wE2cA`r0fb>pJF`Z>q0u_BrP8`Ga(h7=e;IjbZJ%j4GvvBd! zJc1Z>zKIi`Dc!sr0jStPU#T8-LXRwX!2gIPS?z-1g{5!d=KGh(oZY2EAoNOWQ3r1J zWGbed2m=edWvx~j?Jg}0O6+zFG_XsO7&5zy9I&|d`Ch+q#SuhJFNIN8U%scXapg2;rJJA64KKfRB`paW=}D@!>>4L8AHzE4DJOk!>oc z+w!5p+ehTy_(3-_r`7(t38(4fsWRoX$+8EvFj)O8R-X%`UeF|2aB1ZzB{-5$kri(+ zj6yIFHt2AeDa`U0dQDtfecM5sKh+w5?6=8y$y3ei$^%N;*4wq-+PE9Ot#w07CeP@i zn`Ne${XOW6W>L(xafFMzytYJ-iV>TOcB8?C zs~I+C>cf(z_>pb3SRcyTmYKg0eoF>3n|2q2%tpri-0c%GlCfJb!ngU(0Zrn2_?0R~ zs%;P3y7nUyy0CW%^s_dQ8{v#}xJG!E35tE_x0AG`gKKR^4L%q17ZABV!`Y8zjZctM zu@3hM_RDUUJYBDSf`Tu=FN)GM9J@)Cl{NwC$aJRC1mWoXJ4WtqigY@d$aIvhd|3U4 zNu<7&}5%7Hg#0ajwbufClsF3 zEzb#^0bIc;=A~xP11&EpYR--A%m&Yb%{&z{$yF`7T!5t9@0m&vI$wj74jShKJxE1R z=E#BvRa{LVUzS_|JI6{j2-~aLUSOHYxUzC&r-gE#^vhH#GevWZEtkYa^^7RqML8MzfY!B4r{W~}=((rdjY4ecG|Uw3;zl4yh9utJ~om_A{$w`7B3 znc(-ZGHik*e3aS1pVIaw0k1iJO+xQn8TGraP7n)Y{?&2cuGzLnROdlAL$3vTChu#?|;;^ZwW)Rw?AHF zC{uw=b3)|5u^|B~_>?0ke8(X?Tkoq6Iu7rQjYX~JMpVz%f0~N)f$`SecXr^uYZ?`C zp#a|*4rcH;cE2*eK%g?S{T!TXeflR7v;_}5+ZRlw9p|IFBR;4r~&=mYvZDz(@0=k z5D|1hc4v~-$_o}u`g?!rI5l;W94qWP{n$)5o!+$99x&|Yz&^72!Isa1?)Vl zz~-RgMP?K#v{?a(I}@>OgPmRni?|*@u-MsRHpy`{bgu4LX5&Ek_2KNw4hl^bTA?pJ z%WMtDW8WZtJ3y-Xm?EZ@0`tKr8iDi!emk~wZ#CC#mGgD#n<^d8bq*vqQeTMOp1dn8 zy~%57kz`m!5IlXxeTql^CYr7NI-VzfbRKqJ;^^?iu4w;fI}_?=W>h1nq={A=BG zHwZT%dgRnZ7-t`rPW;I;y=httOTL~?b-Y#R@UtTfz4$uMdlT03eCGT;8ilSYzIYa9 z8QE)su=kuqXOxSRH@pXQ0vb%3v^tG;?pc3@GG6qk*yNU@`>$>H^*L0}Aj70!h#a(u zLhE#TIpgtEf5X0N!^oKr$KjYi@ELc?=U0EWwmdVH@xfT$@{|SLD2jrLcQL5ZCrt57dE7Q?;ZxLRrq zh9jEO;Id0nm-r%E;nK|GX!tpon2zntw@)Rxvr9vx1*Y)sH6#wF@Kecsu12!$IJLT| zjG1T@FH>c}=jkV0oCA>5#cEQ*WAp11qR5c1ax zX~hL*W76@@Mq_==M9_q1{eg#V^J#1gubx^%`{ngiOWehjq?Mag7;Y|v@;!U~?9008 zbhd62PJP6}$E)`p?e-faEWO$BQGMkX`^XJYiy*R7t#+a);-P{jN?!Oyhs-sC+ncmZ zE^yi)jC4koq=@v9%V9h|sjm>HNKeE?*dm)uE8#RpRnCQ^TepyZ#u2ZxlT@}P?ng~* z(WRpHT?uQkVJCOE3b1Qf7M0}}QAC=b9;Aq>336xSc!i4EfWMAoufD4cvxuXRNo6-5 zWHB$!bsrIE-mR~-T)bJ#_|ss+t!r~YiOcBWeI4%(j}jYX*BZ_6%}^d^ z$nFFh2$q7Gqig_0y)}sHu3lJvze3}7POXN|;ZE9#s?XhYM|0;&zv~WJ4*6RxkTYSp zTG)*b*NdFCb$Ab=?s=~`S(fxN)UVab+iVr^SPUsTi3}C~%1&Ge9c}wrK@SeG^_*RU zu1r=6C!gW*6!DVrcu$2kh3bO-|kE zNiFny79ReKH5j29?hcuq%Z};m#<6G$XJcmWY^h%XJ{}vX3PMftsKvXkL5s7|XK05C zz^H2h4=y-HA%rRFgAUNUlDZK~;mMEkXxx`mb}xKrRaJ2?_idK}5RU$Es; zUixq@c#Lp7-E1<+QE{`5bC-GXN=3$0=>VT*ifN8mx>8BfwQbFL($t+72ba8$5B>k3&uZC2WC zm9W;cS~%PDNvG_#xlhbedhv7SYqaX*H>0|*ztO$)gbp5bSmUM-oCvXUst)_&&889C zZ3mJ!?L&lV2GU!@LwOE+4I-+FRN<%J8riGr7rVQUjBT$7aCB*RSln*jP2B~Vd;1~< zf)Y+RfsWf9KRfVZRnkh$V4DEESL&SXc@Slqu>sGqJIh1d%83Z{rX{K&1{n_k5 ztl`qF8)e&KUeSKn&+t%y&Fjk&F|W1-qzNWN-YkDxx%|J+MNJ(fhL5PN#oM}P>|Q)Y zL%xhB;(szL+0pTQ$3Ibc6ETxj6)+)84dlv)HhfZNj`UmUwGj4CkpHXozfg zQ*)KkV%@<#WNQnDb_57lf5qX_t*I)Tq@>BvjQLt^YY`DXH(@dn925#JeQ#+0x*Ynz z;_B(i3-&J&SLWs|3FR+84R|d+*;ajS#hdI>1f3kLepS0oK4#3bTp-!;sBOu(IX}&N z(VTe8s{|b5ECgeN?SXKamUMaoHN=w>2M_~n5U=an>*8lrlEExUY+;kO{zpD)JNO_@ zp=x3@-BkC2006J1-zz)6O`b9N+lL*u$^gv!Gz*B=U!U?{w4d-MJ^67Gd@l!dOc?## zB@J{NWx6Nrr=+u)I{+Y2Mp?anTBR`!aVCv^Ajx*^DT(kt71-&NkpxF*e-T)n&hNa> zTDnk+mR-1(Igba{du=C{gh4+9$^C=NHqRU9Ute<#};= zZSyDNS3*3$pSP2l#7!1U5PxFawh}iSY2@(+Hsv$FWYq!RKVkk_GAeFZ9&umsj$eVx zBEDw2Ia!u6J0hDUofPyNg0M2}+I5J+^+bAW2}^C8lVn3twA}}K@)j_BqY+diKM}P1 zXtn~0m-Kbb6x}lh--?x>N~3WxybbWrBl;B=65?=2mjJ#Y>{)LwT;lckS&284F3+;d z@h6980E&W3Wvl7+xzi6~4vwysS z?0Go@Th4S zgPcGMRwI|{JR^P;2UE@OEPb$zTtJFuFgyIdJc+cmGK8Wzz#ss27TnPx*Sqn`d{est z+eV+cGWM8>My5FbHoyq56aC5*zLbcZyw97$HxGhqb7KWakTjk7u#{i{V1M=)dcfpkl5ZH%mERwX4C7lzFUHOG zKkp9KpZ|HY*=&7NrhaXl>{%8I&2y%@26rop|s~Bg`qw~9g>M@m^T?<+hwpMVB;Fihw z4JCrMCEzu}SNS0}?9O{Ojkp9EPXs7;Y)L`MLB;PJwH-kvo1oW=$s@GxG5a9K4gtqHuxfgRn2k;Bao zZLsJIQWYGFN4=dv3{X$2kCbT~p~9M#E>Xe*%|j21rab5O<4N%D_E0QZSoL(XLeapy zc2@zVP`A#c3T&Y-l|zFGffbCw84+^5wZ(672KPj$EAZUsB1!wyp;P~Nu~INW%&eL; ze2>Q`(ElbIqR9cViYI(q5AShepzqe$(WJX9I)YI9xWZ}!`lQ}YLxFtjtEwQ`<$()& zsMoH@^hnnMLlkgRl;0Kk zpKQscVnqI7F~NzcWF3T(=>NX~UX#rx6|Bj`)Z|lpEm18YS1#}$=j9-uC3;o5or@IG zn&Y7!$~ETdRn8%9rA!+;cEWITpd`+!u*q7e;%wO38fhXbY4AEE^QA1=es zp%!}X)MZ*tBRmfT5$^?$qfc|6ER>4g3YTuduB9$pQRw03zU2R8 zxA%R&(>1<=C!jFB7{F*8N&KXc`yksD2}SLr*4uP?_^Gb~d7@lHH5uOqMF34h&S<9A zOP`d0&e1e8u(+D252{DwN3OuufMEDY04!|#@(uZx-FI%m&~B#gBkR&%G`l5Zx3j4y zk4@^TnA;`AOwgB69L9=NrjvNKZQpy}KnG*QGjxS}EFkgej~suO8*$hWY4bodj;X`R z_V5>x5q*lUOPAPx@kcd{O20NMbt$6WZ8{~U5*Gx|W`^_9n>3FGZ}L@i$wcUPpE>@y z{?hGa`#%{o&utF~6Sw~EMCX;;U89{GPCil+kl7F-DW>xssfddp7c#DNcssd~^2+Ic zDaNt*$556F9>dw$dHK4)MA}nFR7@`s75Gad$7+XS+U_41?;SL=1UL6u*|N4>6-G~7 zrwdoim&pGIb#6hhh-+sGb%>T=fax0_{8I`m6nk428hQrqOrtVO!b` z@YrE;VCnHEVRWUO2?LBdF;Wo;d zLKN0Fk(KECXbHf^DF(2kU&IB+DD>k17Ad}{rZ=&3%vg`GFE-$=Pj`P09(%Mggy1v* zSq!Oto!Z}c?hmp>jT!7W(pXOC8LH^Hj(1N#Ao&GCywqs9yXF(&uE`ObhGic?O8v?D zQ611=Qp9{sw(ZmJfbW3k^gqYhJ?jLTGt{wVMPDB$~=&IVkh=OLW4mhkdOjS!A&%T|PX8?gl?m!`M!r=C4JJLDkp;PlWqtZqj__wdutq-{$PD7J zG1S_T(J85O0dCchk-gM-OhGe)DTPt$euL_0ktnq~XuTWKz#8_nOm{ zymsfU?0BeRwbYC#YVR{qLW0<_CyFYL^owaRT)*UzDkda1x**VGZZJYct>uA)V;%5S@rAJB_;T)9&$PbDhJhH?VEk8d_Bv=tsL76UeP#8g;6|Af z2x*XBkLfG7QYN?U3eoKH(>?~_RJV(b?UeyN-rive%M)m2k!41|vHciSzFjA>LGn*?bvef>v{pA9j2FlGsjl>zx{`U9-WRo6X#NMg#VntpE? z;C$4u=ZWcqCthpTV02tFREa+(i}L4QuUNgWo1JYlgW{gvL_Vy+DKCsiWW^|9ngw8q zU@ed#7yqJOOeLK<)&x{#0UcnLK=e3GZ4bQ`Dw=d=wR;QZOhWdyvl-mH!9crTB~9x) z*lU-nESmGgi591)rZ~^^wfKzaC|8T=M)$eFx>9nITD<^feExY9Z}iGd0G9DRB*c{l zuTLDV(FjVSRd8LG=2zM>p>Lg1K4^St<^<5x!Oxeql!4CRsM~jozb?Lqra%jWlioZO zBX*t4CoCAF3$oc(nR{7`=J}R?0AVA(C2RXGI;1!c$^dXI*hSwo4K0j+Mf*-N5Z=VP zfR7{Ys$fy-d&d2Dyx>x3*6Q;V{M@+Hx`>p<`Rn((6YExNB>RO4l|pCSH}p6tZs%mD zzizKd<{rWoocu-x5IgQ~RJa8f_EtZ?4C!f|f7S)ji5%FQcwWW8gx_wy`${0SPjUFr zDgbSomr?-`_Xxs*^_W307*|*7k76^!l#{oM*6xslPOZHjm~St3IR0w3$`XIlm=9jf z7>YWfMg&!R*1#0T2k4|1dwXc(38WAQ6w=iy66?8|xO`vWG(TDozj*Kc$OwwXi1x6?v zxHBmY>b#Kr^0diV52jIJg8M{p0lcFn%KmK_3UxJgkNyzrE>+FGZfntnQ+2DlBQyRw_VioW zp(v$UCj0Y`3aE^6Az3F2Z+FG7gxSc&AzXcpX?eD%xEla<*^cVnT0-;d7-HJepVi=8 znn&f$Z!R>3sEB05#m3+)=E2UaqCy1f3Mr#6Cecyg96u6Y`JjBbeUR=M_j+Q?izH3DIr0pt z8CT<>2FP+TFmb`(7*uq$K=1&8L;tTz&0V{EW-ijKG=$szM3Ml$$Sv7|1^DKEyoCRY z$SURxrJDk%G$R208;5_x+~K?d`vU#SJg45uXkQomz!a%urYDvtPPmeC34y%Ye zCX2&QZ0SB^j@OP#UgddpD6pE(D0St@({+k_tLwGJ${68oS-0t2N8@K<9m~3< zfr=ESn+&+3;l_kROZZyP;=k^0hQuaR1OCT=k1)3Zz!v z41|NI?X7jUH9xGztd;~KEZvP7DCv3s=n=h$={j_oZQ!=-c;l&QH)Nps@)3CtbnyZE z9xf`qzI0b~0lkMYNmhI!>&?cfl>C^3Qq?2j3J^2U-<<)D1Jrg z-;#D7qP~Ug>uciu1#7PW&=JX%^s*#Q!gW8b}PB<`l@cHV9ql;?D*mkAv zS9atHGJUeF>VPco@l*7=NZY`=1%yrDW;8C&H#8knxUQUJJdG%;HXJ2%e3*SagZ|a> z9~g68hg1DB-SJmBJL{`O<`GsqMCXqsC*^q;;J?Nv#St5+;95u&w}{1f)o=j6fd9$4 zRB@0Xd&F-1Rb8U^n*m6Kx85^r3ps15`*q8ux+3+^Z{T%aqiVuzC4rDP_{&@#e(WH1 z&+3Q;=Ct>yJIbF5j&L`AJF3+*g{6W(C@eW$hro8f^NLdlr@rS-)X;zQoUCNwj9&?+SV4t zO*Za6`R^o^F(Gve(l*~uL2tW*qD9Q;Gp{E5LNDrOFq#>k%;0~y5`SP4Uy<$3|F)U- z`IkLDW%^kuRy~cn&G=dDnV+RH@bWw9PA37P7vqqFJZ~U!zWAsbF%V%l?Q8&JAB63A z+bi`dfiqE;oI#*OC>V#W&{s_USLZAjeZPZy|B-ryh6L z_XIkCHj^yxn22`?W{h^cr!Nk}za#S6`6`{_mc*N-GQXp7M=Ck%uQp8jgev$>*LJ5D zI3~)EoILl|67vcwZ4F)?llJ+W*1F|GplF`MXC*Q}aQ+UK>SMwTO>c_hge|K<$-Vc? zm?LQy#s^_qjmEoT0D3Jv>*fy=A~+$EQwRz=cRf9)uJ*o3u5#_g0lYyGUB5(^PJSI> z6hfSVoJ^yF!#Azw3(rDDdQ=SclTH_CDs+)AAa>mS=wI#ascRmpVdvm~b9O!=A-}iY@WX-GV z|8t2>?X~HEly%Qd{o5_GsuR>t`*R;oz!HU!vCsZrF=Yu5Gieo2@qlFZrRzXfm-#T8 z*TBHcE@lp#FT>&<2DsT>k-*IkK1{7ij#EzeKi^>ix#U;4w&HeLi<`C-VlDRCF(=AQ zG9hrtAy2bo(=)D&pF0u2H8+z7mzb6}N%%)l>8g1bFU>0>I^=<5!uDZ~(J70c^4YCd z9NxUht=D9r3<5T#mzVf{$lyPNtDv`ps|LyzACDFg;SO+(cloPY_D$GVy+KNP?i|3P zsKBKzau2L}X#OIw`Od^q-{b}7>P$RjHn33Zp>R>-Z%~*<3CF(2*R=t`$IV*16$xTH zW48+1V7S|n!t5Cd%jYe7>eZl*Jf;E;mM)qc(Y2nqc6JS0j=iFlo=K^##Xw_#cMYY= zs!b1fT`awq?LFTBEQrIbUGTgl8vA3zmwLD=@uHc4kr`2$7hnE*$T->Yo8HI)%K^k` zRB1mq1YsNVsMe~AK{;Rp4O#Gu;gCMA8h=`;3~5Jv+^H;FrA6KW0L7~hKT&U*bofJy z!^gc(p{&e5EgCodn2TF7i6D*KH?LM8bw%aM0a)E~+FFles4T2gRX)fjOmx-+kK@=c zU!w@iJPtR#z7y*Rl%37oNEv3ap{lL@qPL}mLv2c42ZryT>cZB(D8%$-^2qLIM-hAq zTPNF|c=m(u{e<($>-w= zXCW*CVD45^K*g^(KP5GIR;9)AkGk-BJOU@?{O`kF%OtIvxt8OM{b}aXc2z@QTt#>m zQ*8!Vgr4^e@>l$|!+N+G@-qz`cjo%XEm%djG3-Exi6edHu}|2fGDtOE!cLUEa-a9X z#4W#;J0GZsE^x;oTu!5G;m@|PHV&(kqKf||#?yS6YRE5FLT_E&O_FFPX~i<-{cfpO zCgT5a$lupYDfqutmFKS*QMlG(qN=YyR_Wgv^J({W+VQ;CyBoU3oC+evEcCI92%t|3< z_5}%N8;$9}&iSYIYAE8ld-z5E8pDj+Kp1O;ITOESDqecV2uuI9<(%i`uol-B6x6=o zx?TC@bSr4h(nM|B2oFxkVietckD$fJ(%-(?KVet{gLddnIgBiH)c+i^C<|;-PNa=0 zt_PpLkmYO{a6P?PS@$e`6mD#|KhM%${%cXRq#(V7$i|&c!7SK!J~xDE%2$!U8PU=? za5V;=Jh^J#ldN!v_UL~{2JifTXnXUhCeL;KU!+Ja3bh^yB7@Z`dmoWV5g`motyQ`= z3M!QuB1VmZGDU-R6NW$rw~o9BJ*>-t<09EKUa&84PR*^IP;z$5#VgX5)3ahgVAwpjj9v*5>` z2*b4bQAQy=(b_A#3!7%&dhT4Xw6t@{($GRP@hU83nZN57z54^^@%_rJ-3?Co;Z{W( z!qE0^DFGrj+K>4397J_X={9#GB+_zyRo(23S9&$=wczl^px%#-OjN3b(o4a#T6;$J zJwaZX170HyaW!a!0;Cu@VQ%_x*iWOb=zyz>hG+I-fBgth`Fj;~dUTl{SEOceV^;qX4ei({sjVe^!H!^3L94eEx?+%$Czn*UsW>7Dk zHLwI;Jg}SYTN~e3wPvO1F4`d!?d*u)7V8RG=Xm4o7i@J9cB#eWT|UyhZnGXyKgY>= zhxh#^GkjK?5JD&fJj45ZUR=q5D7(*1`+t&+FXlz2itBurwu$v7&LHpMYb@7QP5a^N zEk7XwqPIHgcp=5;#A;8ng#n zDu(sALtwv?^+WiN|K;V&b6IG)Ctdd@sI>#(T&Y8>kbJRFpR_k3CHJ}y=#7bP?QRt7 z?~2UEm(InEErfIw!*gUTmNVK&EnJg}7~r~HU<>sIAI4mr3jZ+Z;t|N|1B9cwK)Zc6 za54z->oMat9WopKbx%5!rktl98;LMUFP{VY#FC)P$#4=a$O8{o>E4rS2wB3rHPSbNT~ z^Zk{PaZQ+uq<+2C>C%{Ukf_#Y?x7WbdqJRjtS#&PB5TI`LZPA-9oVc;`cbUVpd51%Uo19b#|7TTuQ155V_e!`nY#$qzs*Dze9I#B}}3v86AwkU|QfayYsu9IWoqhAdO zfgY{`+UEAbfzi6r$ZoPIDDhqNW@y@7bpb;Z+P|m2tbM4mJaySiKg$=xv!?8j=2PaP z>oQE31fv+s`VqFK+a8i$(ht?}8x~KT#UZ+QqByf7<5a^OJ+%H=zO}QdD^TI2X=7|i zy#ZZ<3<(X>NX+f!#T(K{&fRZ^*w!hf`sTxrKpjS(1W6g2eq@t3_SF8+NdCOZ%S(yh z)bbT?Vn6tcfLpx{K|0p>vH^opwX~P42vaxoO6YScuL_srVL0ly{xK1&pSYiONm*>| z;{IJdFPhLA<|0xok~J&|@Kjq5a_R;KBmnfiM>=|$RcUl!G2hbp= zR(A8rv2XKfvbN#OA*~a#p3MsjTVSl~n0ax1s6}DBku1elF9HFtlIBS9N+9a5kX>7wVbwokt^}()MYv3=rxh_NJpwf4AlO@ zordVp^=#m{6;09jq&uC|o6mFtOL(r0Pqy#8p4tH3EZ&1Ltz8rmziTs(y&vCe71s>{ zA%KyFgiW8Yd_!vo~S$bs*Izu>iAAQAv>$SQUh zh2T^t;5UUjsfMpVF&waw6@6Jwloz?eDB7KImrIenPa<;svMI1aNbFX8(QbE~B(r7V zWXN$Ve)Y#`j)1MGFQt^vjwfHYdfOfsYE?PL!Kz`)yTm)0RQ<(8zNWy{?1j$iaeBy| zgJqHY zn!>I}*DkZWzF7OJB=xlgqqu|!ldQN$p7766?XSaoW_IMA2>iut(!Q_Wd8vyQa~XIC z9jR<>3)-6hj|>aodg>>p%aG)5wS(}nl3H6;M9d=(S@o=s+smNSfR-6!LDPqIKEev)AF(uAO#nS=D2pnoQL3sL0-QbU4}gA@--` znVQDGr&pUCN_}(-9XXiWs3?Q_vQelsSnqv_|1^2ybcrXx=1BBC%bu*dJpi4pvQjBc zKKW4O=iPH(u$Q0NQNK5xb3k!e$VDg5$xejGems|B%K0wG19CgcTan+U?#nChU&<*AzO|F0kbJW zgc=QFXwUOBEh3Cjd$KOt?CtCDfeN(>cTL<^E4lh?HxesZuo#nuA4oUG$Xk&eFvTLy zuXY_kYno#=2-+`^2+(i~pw+Qo-t{b_AJ%`BU*H zOw0SvC5d@G!Tg)8mqVA{`}!oqKXEP>vwD}O=E)H5ce9b3es>xIcO$^scVhNtId&w6 z#L7!`q0V=@I>7Ioz)nl2)Rdvi=!>25F@jE{l@kj$1Bope_&#U26UH!VELm~{9ZJ4< zY1wBTZ+qR*6SDjr+<-Rr(LVoS+r7GG^69x`%~&br0mIwWIO+jhHECwHI!+|`3PDRo zT(Fd$K+CoEOg@(FTpXEM`-#Gr7-o)Y+NF3#4mxcb4jxS+g&d$i+&h1$7dGTOKR6@`H)kSzQEWt25J#Eua2BB6al zM{3Y$`Q`D~tBt-KtYTv&Wp)lX0*-z`Z{yVr#;p$4V6dK(NakYchI?dJCbDg!S9+yC z)i>5pkO2vm%;c95jhSue5v;lv>Vk+&k8ORn@I96lfaMj#heaA$d{2cH-xao>)EDnP zR}}`+;#)_$1uxB5kZordf3{0USLjUAwPrhCl-f@k=ZbBW zl$5RcDDp>RY58t3tJ_{AG}DU&gq4_risV?4a0LN(Ub5s^FtKNSB<6-MDnNbl>q7%I zd9s)FNdG@(XQyQI$-hhv`E4O~uajglF7RIeU0{A_!`8Mv?cAhZ*u5;2y$oG=(gwA1 z0qTJ-<7>0&5lgc#V7)mK_ULSHFmVpI;6hAPcvcdZ-%l1%m&E*mrCxKKFJ3c34M-$`=Tz!N20H^)+6%NKTGUyP^QJO2?36+ zv|*1a;^*^-?|LkZy3wDaZ3z~k9eAYECY!&lH})v58>3e@@{x*wWCJf6pQq0#k@~@4 z7pd3l(rfZSKiV8(uP=fsaSAa`JfLNl*nBqrlnv;1-h=4n3Pa+ub{I~;_NPjHYFVn9 z?xz&|<6WRApMpY7ShTm{RiDld%xr=l{ZemMo0AAT)7wv>FDW#%Ytr!cn~c4_Xrmbsc~#+2sRP&z-b)u0{>r0%Lx)x@H|4TpEu)mP{jmOdjZVs* z_~kNM9BGGC#eF_~&qRN$c1nO9icr$MtEU92#@uxCb@C9dfDf7^IO^- z#mVWZyW{U~=iUf)dDVAOLv9M@g04Y{cTLP#gEiZ05m%t#s6x#gX)=@VY6AHPL9zOl8|c0$*o|lByya zfG)Z}C=eXz$Ov@j6|*{^8%3F~tk11|^Pxs)zUpYl9mil8xOR1FqSKEXzb$-nrDjyN z{wV{zn^|+V-nh2X2>w=d!5w}tJ~9C!UOt_rre4K^Akc^L(!Y`xJLdfI^f}%q`W`Vs z!AYowRdxKJr*4>rrKR{~!(>JkWQBx2XDKSqL!39ODT7>JJxxYWOv+c^)iwe}_Dw49 znKt^fHg7%@1Vu?9;Q69HYWt38duXwNiF|(CzbCD`Hckbn{KgzSx5z=`m~!+fvR)MY z`9((j=p-r&4NFe&9Y^+Io@YT6Ysb`u##{f%yuYx>!vP?zHO62s=VyM*^ark_D@RkR zd#GYRaM7>1hSgXw)m$T%;?hX+KiLp#(SWJ0Fz5M(0np=C`yf`eq-g|eBbqMkpq8e~ z+qYV*Eqzl!M^mwvA2x5qiwwO~42*pv8yyr~Mz}Cq*|?mD9qU9I@So<8)XxN(%&mR* zy>K3*?4ytW-1q=KdrsB7)QhZ<2V}24cYvVJDYj?zSA4v4W=Ef|-}TVxg#dt-RoWGh z@T+AlzBNq9DfFmbr^Z2dKFv7c7+E0ueUIjhZY2q)N6Is^h8Xb?oP=Q*qgA!+uNmEq z3`0Te4x-&R4Cg7Z@uPXQkz`F(^s3{)oT~zOeL0a_KY`KQH0Xb7$t`VZBVT2JtQIG53;kG?+@l4xn4ojg@Xq+U+KCH^874!n^As%5 z#A*dv@gYp<>MdlB<%&EnH$W=(s<+&<)dp^elc74*4gE)5G-3W|kg3m|6;0!rwr}@h zl}Qxebpp+@tNw!DsQd(CUh+dbMh?c_?K~cbYar)Brh4y~q&pd6g_@NrO-CmA&a@X#wdA1&Sd0JPqfAjIDSNA+gKaFuWXXkqiyT5 zaKiz^Pc^QDLJ#z^cUw@tpjX?O!+fA!GwK$v13JE=XB`NlMKM>S%~NbZAw zhU>csjYFth{0B^VjndA*b?j{y`b7=e?2?@jUNhx96B#kMynVqYQSX6){)qo3vq$5i z5dXUMSN1ndc(8XJaK0e{y&1FAEK^6!(HEpmD|r{?1|?F*3Eyj`Nmu(IC zE7MGjr@t}JVQH-M?&S6Ob4=7ik5VW%$2gA}`1Nays>~Su8BKB*^0t1lIix}~z#E{y z+xuFIN5Q6%`yb*Gv&&p^sM8((En9Ufju0xe*PH_{6wP-Q)+Fw4Zo-WZ|E9txD2?HT zs>0n?3$t<0J*o>>G=4N!e6-6kzUzVWv*TEgrFE3IV4Ut z$0qQ<<+Z2RmN#C#8C_s<1QtSFVZUo9i}&h>CYyxm9=tGPJy!l78XaQj$dNLtm;Tj} zG#APnPOd3ev3=bbfqhq8z(e^txAn%f$MIHlsO)Qb$f~)T6~QkN)h6l2mjB_xyG;SE z9Ym_WRPMrio507igu$Og^aYs$Ot@8Rfi!p_%+%Uf@!YMjFK1x>?@pZ3A|iJ3cAx58 zQCPC?W4Bt~D9afOj9mBA-4&7=_vk=QT)JV-Z$*s81rc^rcrOA@CJUTSYxgsC8NMHf z&a8;{xnlk3)k?CU#-iA;~A(+X3^5>Jok~6u5}2Q-q%PoKSkug8vzB1 z4y*9|IP=J`E0Kc3O-62A6iQUuMsxQ8VQ zT16<)>UQcyg7?~hgQvtAl|VN0h$B%?y9Z!7MAZ*6@3K0oIApPE4hI0luQrT60tr7i z2&eWw{qLlMM-OapdvV4?uZ(T;_YLP0Xg9H2?rxKPYYn=X7dn4u77~j|fdxrh8`x0c zd@oML*8ums)gtDcyHmHqyR%RO3hRki-Ww;YVa``Nf>r>RnCyb9qV-iptt5})zjQ72 zXE|X7g3yBYPd|q3s zCrX{K=;}2pX_r7@J}pz4PZ`Y9Y|7oPpSqD>%E&lo^g{yOa_3N5(z~?=U5E+exh@o6 zqZanVfBl-Q3GJzh`3C{MH4ULwUcP8}Zk%eB^AfrIXnCReT$x^)2-JaE&VXwsJmLf@ zR8`MlmXT5J$kcf8q>eu$(*k)9ic$L@_ZwH7;Mm7iN^7`xW|DP!8j!GJ6_T{#<1zp^}qFIQjq-0tM!gJE47&8iTMl8V7;p4h&@WRr5}SGQ06 z89%YRcGYLm&VC%aB{P~lMZbmAWcEL8Mf^x+9-gC7e=kxgJ8%G?q(G0E3OfH_jzA0> zxF;3QObv)P0Z0vLtE2fOb&+e&eg|&k9VtCzzB-q*d+2CK215N~+HgVMLxH zPseI(z+O4cXF%{WOO_BP|3X{odn;gPm_Dc3zbvz~PqW)7Oa7fu#Qvwdk?7T!F7x_S zIby^jvI#XFJ=w;uY{$-9zu;4J$h~gN*-8F#Uov0%sQ)QMbHk3XyZ<-|pM%T6XYVdb z<^*XOP@pRhugfeCa201QC!y75#WnyOMi?|y4Y<4*jq=9}+U4H>pD?K;MtGWsnBwV< z<}dmw5x2vf-y>oyPwGmAsfg54vlnf#_t!8n@bLLe2g~rdFZwe6#1E29ZTbj^0nW&t zYxDCEOZdz5xB?QQ3nX-8-*jWCrah#qa~?;3HV)N~jGL zK$pZ*4>1oT3uV>%-G5@&0EJ~B2uE45kFDko^M2wqFXG~!>+22Y+_L4R0PLCz=Bfh0 zV;7kDuYZNX4Dtth(nIU{j%3*_Yc`f?6NJqv*e^VfO7C7Xo;SK@(RQ=_}8%9 z`7Uxt+V1D(h9?ckK;Qnq*qYsj(__QnKA!z_fvr0y+n{HTZ|@yB=m8aZKh{6MG{KX^ z-vspCTw_0tXjYH^Z$wQz^p_}7&nw$7eHintgW`T;37eY#XUtL#6KTTuMjJM+`u=H-X^ znJ+#2q_^3-{ziz^Y>83(!~w&rY`sWJ;YAqe`mzee=4A?^F8Qz8At;!)}v3Cu&m`1VQOJ|bBnpUOJahrsM86l2VWnj zwt6%^-HqF8%xPvRw|2GnH~-V{M(HSAxPF2kh$%CCxE-H?t}MP>03hSW))&&zS2Q|d zR&UpH{goZwA@C;;t7#^VidjFdM$~o=Op3LvU4JNDbSAkLFN+i9?U*)KwiV%PM+X)V zg*BQ==sbOjjA8b|R7JFhh@hH+f zcm3JbbxYHx@W-zVM5z_v>wHij{qsen3IX3dw``rx+%l=I*o!E{Cix0^k@NGf!Ztf# z3*@h7OFZL2j^*-6l#?V+;Uo!J2 z2Q7M!`2z^C2Ax1qBGroZ=5JZ}qR6Ht-t~7ZJ$p3Do2Hx5Jz-*@DE?;t+c2wjBI2Og z`61n(TqJcilpoYzuC|SNuVm}hO1IL;Q|lDNDkzA{w{D8mH;S|RTo0grZ;x9Xxfc3J z-ROWZA2s>jp*cBu8NNJ#i9Qt+U2pEcX>(qxUZi;H6ndIBw{}V1jdBtR?V(X2!R~L)KVb z{Al$`VywzU*VQWSEz)dXMiw3Ny01+VVbb{f+Dhl&UnE?|tJ^hbS`am{Y zr4!ECGE7XMqXn*vQP%}6q59$phOgqYe`Dm$#=Exe@Z(~>{;SUvX_rjT7TyRni7OBT zl1_bs>b@#+jngF|%|cI7$lSB77u;p-i005l-9oVtYr;HG(S1Fzt~IOi?G&18Kgh)X zEqLqPq8GTkiLz#zTszZHSyUkI#cM}ODNyK&&8 z>!>x6I^JK7Kyl8FAZb@G{rbU64?ROxUUrHkG&m|*VXRsgKWupPqE$2hA2 zq@C_um1k!gd&eBLX}#%ix%=CHO}GSvs$(5WY)=Ap=nJh5z=!*AX-6l zXAkMsHPX3E9Ph`YZlEBao~XpWq=0#fxVG)x7KQGj7GMw}uD5Ka) zdu9-s0z9Sqde0>fZU2KC)Gzy+LlB1N)6#8-wv6Y*95_s}MoXuXw_D?D$4Zw{0sugD z(>8^k2k0xGTi2ePVjX1yxcOAQUl{o|lw&#Z!M)mO#1kvPs<_4?Z&~j4$~)5*L%0kT z1C|BNIJGjX%qm{g#=$KWa>}#qY=MW9dZa4;+^~0L5Gk~Jv_;jhzGpJs$Z}2m5HG68 zndup58|?$id$D`b`Rj7eK$cVaxzLB)ob@Z{#7K?}Hy%V%Cf1`6Q@p!-R-gOYg)ny9 zx8cEygMK5=KRw7*xAh(Or?8a3thvL`Z0qs`SLoQnGC@c)9NCfe#jJ z5D7{!jzK7g-TTg}z8+Gnt8iAdj3Y#C$qu$cNKVA8c%*!EHzH(esvU8UI+KfxiyIBx zSvK3g#pal~`3g5EATl`YEkeiGzRV{LZ7al%2LI3a2+#do$a7itXy7cp0D!;d&*3^6 z-#c0R9(B97z+cwHsmQ#~KE!3HvgC3iy9Ps-_yo?0UZ8EEOkqkEdl)+Rb}gBqB97o0 zod%9nuJm5+{W=Hnh%>YBY>~Ji!-Zcee4w2&<20Wx%ZfQ$xTb1+=1XTbNFsXbc5wOe zB^zAHlL?473xh8D<{`kt^7J z|MDLA(muH2ornE%u8kLO)36zTQCUVasPp23Rme1A(zupz{Dm1)o$=>p8 zeScDm@9|&EMtr^JJ&pL3kY!Zj7j7+DAP1kiAHs+|t5B;uk9J?*axiK#!MX*OyQ$OB z;OxDc!&bN2{*P1&>1ed(2kg53dmUNx#dSOG($UzZhhgeIU*(w)D{Pl-zV^!A>-q#8 z3o>anX5Cf9SyaksDZ|I^c;Sn8^_RyBbi$oID@vW&q{m8m-D_jb3~KOC*EuJ^l&5Zr_iQUJ7X}&Nde6gE1!me~HCl!e*zuNnRp#;X2Z&Rk z&n?pR8ff3l-pJQ09LOZ&Yk5ln=X-wyOrZN)0vWT{%lYp3rfxDS6LkZ)>9D+patxtH zH>n{ZY9hB`DTG6%+>WX(Ax;hR7bQJn?#4yL{2e|SYs?q_SP03s6ZsaQg0qp2SySR> z8z8=dDKq8A_I}+rHr;x&oGLR8Y5I0?Ld-^+e9XOJ#y3+m&1*R~hXW+L^Y*x0U2Rwo zQDh2y<6cGD1~_E+{!Sk^ix zTU|pw%+29oTVG85HqWag{l4b3Uk&0`HV3d;X})18CpOzx5sM-stL~1Z3nO_UngSy| zC+6$P7af7#JCQI^K!|}Yuji2~EGpY>18wtUBwg5g+1XrSG+>e|xkf73<`cs5yQ$E zUvXxpmi~)1!|J_S?h;w&8;2yDtUVZ~NIkw`z~g83P8>0%@WK0Y!VOsiigjjl*`S`@ ziYe0gIIWC2CfcrAkp-I?V{zJj zp3wPm%KP}7f0G3Bd)CU@s*dDQ8Qyg!t(RL*Wz`ga!;0rs^_c~?=i8>o&pL!{irmpM zg_%n0=253<|7KKw--MN$d3UsEJ*nD^2b8%_I-0QT>aTf+7gBt{>z9%>7OQeHS+_cG zslQDs9=#E_RB15>g1sK46gICHEbJ7>M*HKg6jqba1=fbr?YaMAL8bw^w$W78l)4S~ zI3X!HOKH!y*XL$PYc|GVVBCx{5~s8sStBSQ3>V)(u$KE9BJ?vPPOWPLt4!z0Yo}cM zVrT5Ed{yt3#HWh`m7B>rZ^4E=Qw?B8!9drFSv>ZzSq=8^oMyp-M@Eydv+0eEPmd6Z z7q&>REXR1);ZMfP+B94~a3|WV2a_UTXv>#B`d^x2A1bZ;5sq)DUAp^<6U(lp%f+=K zP=y|SqoU{O{B)4{NqqU7MkRLtzLf2)Jdq8s8y0lH$<8t7W*gW?162BvmincgS;qE} zRvSe4v#2`j;?>7yJq^3d&e(z61C&u(_8^Py)uaCeeFcP@f$2Bqlgq3WU&jkCi-|PK zqjrh!`1L(RB0UThjEd;DpF12{iyD#*y1)?fmLZ!sBb=ZLcWzW~c7xO6=HU$5?R0l5 zQFE60>V8dIg&|?Mvlk>A@9zlid5biF#C5k-`wuo}If@WDa??qYOYqq2?OI;6pyURr zd@*D?v+WzPFM6(b4~1MFYng3Ldz%cFSAVm*uWGg=EL8BsPjNz%;iw23Z}Hn<@`4`V z>a@a}JlzIKg|Jg|&6-vnKbm&fPkjF3+PO*Qr>Y07y#Y(iYg;cq_4S&02|AF)qVd(A z^nGQbJGpEx|2Z2NL~hEPAk~%rhfq`_MOQY?)-9M(xCTT;mhJpUD5ft{6tyMhTwi;&c$Oub$#d>N z?c)DTml?n=keg)uO6wUYri-sr0v|k+ zjzz^)1!{gB#)p(OEI4$3VSwfEdU&#n7*B(93L4D zyDjhs>=b!s$+yj1k;jXK<9JuLhCaW1;Xd^RcL&B7dysy%4HT}L$}-7N%zR8r6cn-* z9t8Wj#DC*~3JiP>9(&#A9o<9xYba$}xXFFyZpGPXk+nfPV%#PfH&3C$NG|=YgF}H! zkps|Ua)`T%@U{^B%UrSf&dY5>qPz1Ay4Xd@tm2{a@ZM%SPXHtozWMlUrY0 zA4##2BzwawAem$gMHMx_57(0jvkycz`562gH(33A)BaJH%i%QM5a( zW-S2lG=-I6@;w}QX?wq&d8^lJ))Gbo_XVe>OFk8=>ta{(5D=QjCLzWK+UtJee{5>W z)gNwlU}|33FP3)eO2xT%qu{-u@OSy-3~o${`Wi-Ez5}k zNqzUfeH)~uS0dkDnh`g_NZ*6XEmt2OUx%-m_m)FnADjkWt|KJBWXA`|)bQwm2488j zTqD;~Yn+x;0`*#a)Y{-FQYIuDnCt|hJi+{uNthHg5UYXUeCB<_Sp}gLfe6Mt0>58iz=A_<_N8)am zRmNCupy;&HjeH(8YsHF_PF%Grcsu0c230-cOcX~3gt3l#T;(l1@V%nG0g20xUaX_5 zjX^L_V(SoSU^nymZF^>q`@KFYkYApi<-o{m+k$E{}PHxxpZ|$eM>yi6`LLj)*2K$9-g*q9i7|3aAE)iyUJ;xmn=>&$G!`YD#BEXR^o`wbMAm#3-JTujUgLfC z%hlK4JJwS|r<7-k-t@5G{2XOUX>{_VPcVetx}>?uPUayIK5!-FgsQWym+nJS`nT+{ zBWzcsVoT1^dPtEbf(Ww|MDhaDmaUaz3JGM|?0KZM;6&`qX4$e~2bp46Y)|9D%P$4! zPo44z<6X z3L*(3XR*DD<~nFs-?b0zEAwWh27tvZ(}8}`XB^ah>?qJQD>83%f;qYIre2G)QBokT zXuJ+^fR(e4jzTwHTPbDG0Z~?#F`9YPy@oci-b`ER1a0!JTssN3@fh{`7)E4MWab>c zN#teLE&SGCAHX&iEtxfW!qdQIvmCj}(IFi}<2MPc$6$^a-9%Gvgh;viz z0{gh>Jh$@!kqJ=jVt#85BS4QF&ls#aa$-G{nX1h?W3}IwH@UFe0wng zav|*-7g)&rE9hKVermLnv?r_E-R*>+S26Yq;2CpXm3l2YMy<|82xmM(+Kp1~KCr3f z&OaeLq(-%B$yaE3d*h6w_haPSkpg`nJ_Oug!sG_;HtMb*k8z-{uyZ zXyU&UrY+~29D=zo^(xRpU6nE#%7Oqpo_#e)!5Y=L#4`tvz@na-J3_{m_oSn3BWHV` z8A4Slr4ri|j4nSYhZ9*B@|{&-|L64gyPeVuhxgH>c=nB#c*+Ak7)`b-oNhEcL%YLE z_q;yv4_)u#si|G?6rcG*_-7z1**%A>%Ve=>NQEhYT=G;X#+H+mO3=RUm9#x z&RZYyv|q52uf^-Ahdks)!#_tFRGN`5gZxR`TF3e8t?UgWylV8CX2qo}V~pB-?4?WX zeZ9JERb%!THRbF%5NtV-?xgobZguNMZvR-or_B|CHE1-*Q`KAey8yZ&AN5z!_n&0N zg7D>Z#SJ@sE&hpPFjPQy*fC*LqZ!l_iaktn9*ZTtGYtc%MW7~vfyt4Y_&%STY??KoOMx` zdIq)k0dZ8tl(oDp7t0d(Y!&0ZVE7M(cQ(b)JByoX#|t_}=Ih)yfXJc4(|ONfo0gsG zzO`a+ln%(tE{l@%YQ5uCZR?k?mV^mOlAGZnkpIdys{-DQSJvSGPd%_O)uTUTsSBy^ zosRWykFpGTvv_!wxg>}aCQaEGvQKZlQU#zEzp$4i#jE7$n3)&b6-BSR8!iWYl7pwO zY-c8OZ6C8yAo>g3YrC8pr|TAuD&?+eG+*`!8xrF&>dzCA0IelCOdH6N!j#p$GhtUp z$XhR{+{llr%@fe~P*zlPezcBkMJHl4VJ;##x*FhX!9RC|hHnzfeUO{uLp?ZPT9`b( z_BDG-WWxM${)__M>q{A}c2d0#_XYC61$5OX!|4+u4%SbhzmTBl%kY(y`a=DN`F$@> zApr~$?_>0te@Dode^Trt-*vqY9wSnz+lV%B^bcN|1HHw6oM4RA z59avW`~E{KL2zOjBnQo1No$j5Lv8D-A(f;w4B**{s}tLoIgSDhD)1dsbNkz|s)EuD zu!?_pdzB3!Z!gYJIk(}6W#OYo4_>9uw579?A_`gpnRw|qVEk52qG>RYXK}c%{i3b+ z&UCs2FyuKifHJY=bswvAvX#>=ecJQnFT?l0lH+O+Jir-4_dR=+fE=|~O_s#xxoX`YxDXlM*hR=x^mi2*2-&Fy0)8 zKZGf=E#eO*zVx9h)?6beoxKcVWvsW7(|rqLHm^~2NNN`!j2NHz1;egdSOkAb)R`1- zeQ&++;RY=Iwk6zPv;vAMBvcl4d;=+0_I7jK6lt;>)HJAFG*Jd;zixK_3fQeg%Fb19 zZI0i|ezwDJJHSa`vbJAqqe)!3cWO;!QQs>&Fm4~NtIf4{@CqhX|6|vQa*c=gLy5*p z4$R%Kx_+a1z>biPCuntwgsE`RssrdI+Ymc`t}7jsql6qYjH42N=9QHwg%VxdiUr#+ zFogQ^QCGu#J3e&xl+O;(@g;+NJ%|^G+X(H`Icpdju+&RQ`sX#WpI!wX_2ldQ_@Aczr+?tzxIhdT z_<^jn9-RO@Zhs?HQ*Bum0O)tGD1RuiTJ+jol8BAe&(yAp71y|tfgaC6&0>INyfQ*@ zp)reMcMf8{cS%-PcI>KZhTW+rRo*xJ*!%-eCOC^b5ZQPd)MBmY8loWe{$!VqK*B$u zhV#y(mkFx|sJ#|st`_DR+GOh9zk^bv-Cjh%*U8W8hu|P{rfjD}G}C$9#!JO3>sTFX zR-<)6npfKQ`y*Cc&34B1Ycr)+R>#*Xo>;&g?9F}<9@efkoBkGNjW#q3NO9WlK!Cc_ zy~z@*W9Qt}t~wxGz$e=z_ueUHL8XAss?yLU8G9dTd~G-TX|UBBUci#DT`Jr~V4>o0u6iAR*1JA!VwhvWFWz;uO@L>`mP(v0JuC!__ z)e+vJ6*rs3bO52SZtro(tB_ZF!mOAq;Ii;>H}j?YE2|L5A(K~5febSbB2xIc|0%aR z63}NOxQ^uZO!lMpyii?XX!>7K-@vFYlQsaP?>=>8pJNUhP~Z({zUVwVqeX~Ym|YW! z0xaaaJzpTn^I9bpkOGoqHyg~hVDA@DRQ|UlnB$|U)DP7qIx!atp#t%woRmWCJ72JX z@^l^bCuC#Ag@^NqXULubeQyQln4V+|L3gQZWGnL&eFEu*x(3Ze1mShgTk4(N2m#ey z-^tb-P6;Ce625KEa;&2`7o3>gn!fBAf)FFu2eT68rqus`$k#qu_JaMP86|QjY3W^-a(Nc zThX<_3~}Q`5x!!8cG8it@fE>7N?J7l56g!wgF)3f_0?X*Z1@|-4!<KMsL_3KFCa)K30HpY@+V*w|M+0WDTi}UZWle(?aS8KR_4lRo zH#--cnp1a}ts9knMf{6O;1JRFKifF)**P-*A7royUDC*RS7H|3%uTQZ&!@xm=Vxb5 zxP@dx*;GdGYu_G({!d&JZ+|Q+zvHHG;L<1ASDKpVO;25>*0KR*VtqpX? z-9hFVcD0vVAsRxw``exZ+UO8-Osscqc@FIen84QzxUVyHCh|4)LBR8eYZN|Q?{r;c zQpe;`_wvyeDb5BzS-gJ${f{*|6-`CFa#ugps}l7e+{(aO_v>(q(%7)UJKJQyv+zf$ z`rIdNps?2~+zS-nLU2NdX>I)Wvswf2`pW4!Fh&PoOVqczsuos&9~oB}we7Nuu$p|n zD5}NzDtm$7{i&x1=;CMan%?@VjFhDAcLpI?iDJDCzQj_>YuMkX;|EFzsD9w}-mu4S zSPHX_KG>6b#L-eOt<3&z5o5c!@$H4t=5~G1@qnJDXsvD&>WlbShr|I#3c1>V73h)nuW-2Jqf^fw zdc6JF26DX6CwI{ejmnJndrQP>|A#-Ogsb{a=TD_WkTNq#~D|CYuq z$2Ov|%D`Fef0;1+>yuM_DM2?m8^BCD410p&mPd4XcajtX*!&ZZ$1}pKZ!x#%IhE^9 z+ti^RUx!{I$c66wqqwuZk}tOnncv2)I|T4Zr%Jsj&7aM6oS_8O#M6x_IEn5M7f7q7 zWp9)uO+yOGXdI7MU;(xG*m*GjPT1PHS&Xi={N1g{1VK^x^?77W-;1iXQ|5@_eZ__s zM{-$a-n4f34QwH^f(SX6`Y&TX`Ss9VduyimAS5^H;wFIMKnr0$A?xM1dbv(od(hHfFS0`W)%IYGg#RMR9p zth1nPl-Y({?4hjLURReykN?l;U1#v*C$em~D4-7-Y$CW4=-#e+<1!m(U9Z#qd}o%X?MY`}tiw|HmklQ!!gft23PwN*Mr z@#UwSD5O_28;nzHNW1Cc*^ahucfGta;6nGk$(8%Y7v;b(fvP4;d7Ydu!xk-T%K;y1 z{_wB8*DbT1-&*})MU~b~^GolsPYrx`xzC9Ju?##R4g?}=KgOIY{F49!Ea2D1@_+t) zNadvHx9%}v+oFg8lF=P7O~3PiBErqL9lr8$6+mQ5A*qk{{8cvk>!`!#Ok$Jo;(RVeL_A6RQ{%49Qb-QS+pr{ec(EM>1jJqLP)`r@u?@^&u1Db=+>&bxf>L)#a$8GegXh`2F?e|9&Ex_t%GU4 z;_kNm#6S~dh~uDql^34$9Q7KTxNP-27%a0C0-krY{0y7pCvJO+8aLE8lE61Of=}wT z?K`Ho1Za;?y$v1)r`hMOh<85M$iRaRJMe z+#pTG1;s=~K_x{*K;ZYbnfsoZd-;7oJs#Cx<@G-2T-W=&&vnl0sUG>@ze-oV-xj6! ztAF0KcH;-r3lqOQ&Fh6Srvrm0{5Dz^jA5O@K7!5k%X0lppOMCNpJbTT)v7AA81o^-ku_Hl z()n4biK%&_xWW-%Xj!!QrVvyUx_tYJByMxC#2+2)gKwi+K27=a4zV1)@Nd_$wv_;x|AJ312|vVxYa%%AB(f&1cqPiW}Wt;L(2o0mR| zT7{KM-#)~SJCP@z9o6a;AQWh<(g4AmjImH&0|QbvL7}U+1w@Pl=%P4*aOrcwv$2L7 zMoH?MBE5Po>d&Il-6_RwuRz-QOIJ+@Mplf^@mv-AB<~m}5tKCRb<^xrcWcH4#F!Yg zd?O3iYt*RM6MU(okXXZFXLB#9BZz~|v09^J6;#*_nDV^YvQe+915!SGv?_YMif=se z%0bZbtW-z4xo?fsj9@oi=I|o0iK+MOb52`avmwG9QhH6x<3RP0Ja1rF5PvuT9LUym zdszHz-*6PuJelu!uBT7`Ovf{vuh++WX|SjiL|wTuRfn0%$I}ljmV`<2ou4j+4k^o-%Bp& z#Rr4Wsu58Bt_HN_zREpff3B#GXNJC+==XY3#LjCe&&gxgWpW%YAlmt15p6=vC59UH z1YBy^Q1oP>6o?%&^7TCarJl^|ibAdE{=_1OW_S4Jjpgi!VDi4r5)&~>%oQ&=5+EPCE2u~Tq$B*F>kfBQVl=`s(_6&;_x3bL^vq4CIpPvRn z)K!d-b&-+sVdY2KKRt8T8G4zsv{g$WHegNEE{#RDopPNCqH z10E0gymnPc*eNr=Q9L~ks$oL>f%PDlvO_QRXChP*^N^;CtFb*BhliVL$s8+a?_@LMYHiQYoitPjh~pdo*n8sQ}>gF?u~UHzM$wPJF*qm#K(2a=aye( zWih12n@}y_J1O-WbQ3`aU|pB^N4(RcfD4JDSewI$dE@m#^*N5oul2wE;;z z%6?wHHqA@bx``p=d=qK5fW6Z6uDH?IBBV1DQp$+3tdf{7PH@u>xrx@y^#3w_*nAk6 zDW!FHkDBq1{Z2!C1lEilWPBR?9!Qc?{Xff$v#i$L+w$TmZCY@g=hsli{Q!(eaF}aE z``2|pug=j}?CbpqNED}3G>43&9wQ#I#xT#|BZ;I&&U1%Uym*_!T;00~IrQUvGYMwH z`OwjmcA-ZLn%yw>b@kyqj9V4ou#vtPTlNEI(a2%FOCGIz3=QyD5oWQjHb2RZ&&FvD z-xM7Umk&b^G*8s`U}Mrj2v!=LpO>c%dGiPN@F!=y4o-d{pLR&P4=)Da|4&q7P~tWa z&$6p3@^NS)7RIGiy4rMv0kRWU>=dZZpv#N8-bj^1yva zW2oTixcmm@ZI#}Ky8Ft{bJcQ442aENZ+ljT=VRFX0;XNBQ7}=@K`l20!&zU?OVIQ7 zui27&$c@^;rX%g4?}&oY;&mUfmz0IpsMoh?+DoBI!wjIh7OLV z_(uI|`9epKL)73Z2mz6HZ~7OJJiyPlq~rL1yMlG(z<_aum>`kIC050+=Ph53Y^z0s_e;D$rE zX3TDaE5KT^{ANv%QM18^S6neND^1FYn{Z2)SXFv9NB2J0B&!tC`|SHZM2{=%0!Y#m zR&aZ_cNT5zh0%h*Kk%@b!z@I@4k%th@BRhC`kvb%_^96e$N!s*c?{4Lrq4wlhG3B1 zI$Y~ymw?ZLiQO~t%xC0!Lz7Nwy(9bOmSA%$0J)nOWEyOy)afI`{)u4KHGXR*0()q0 zbr!rjHgS)r&gQ)tSDC^aFt-!?*E1!I1hF?Z;CvdL@+UI(?~LF%qnZDcgH|bj0AjJf zaX1;Rn0Rhf9lnZK_Z16LJUE9t2TMG37Kms(;i@sqFC?1Yyx8i+@>v8ugE0udT4ox} zgOC5apO{3Ph=_7MP?=A2)qhhbd+YpxKBMwvWvhEaqgIfrKVXfv1)BqmV))6Jv6+Hn zT68-gC6zKpaikfCy;Zo-x$dnl?GyrCa7z%;yy{ewC=v9=2u&;#-!J7M9LnqVv5>mm z+pZ#~?W-g^JONJaSm<1q9+Lh>iy8&6CSlX3hPXeDKFHNW&RyjLiKK3+4i)}W*wlkh ztqNg`34c4xxl`T~yKWPEp|WW}Fr>l!lNW$2Wqn~1MHd4~$b_wCT$a|06L^$;!ayPA zr`BI)M&~HzWsBE*mwlf3=UGb_DwO)5c)IYoziJ@P>>na+Jq(_rmr5}e&gx$2x$`d0 zRo_s%!hHDor^@ZR=Wc8rdp71jQol$1i}_ClM1!A?RO4^#)=QQuEv~H9;G@h!HiLXq zo;SvQ-o4gE5A5G}`N)^h|E)h;n_RYeSe>u6cw*BVOQ4JNLbgpfzwXhKb%1okNuc)x z0@^LPj-LN0F8)sA^#{oRR8-O5K6my-eY+rz^*j{y|Pmp=f? zw|$C+?Q}(%C%$9GNd&pSGq!eo?AA~mO?>6w<(PROr@yO(h!G?9Z{V4bUVd^1{MfXm z2M-?|5_x_6~iH_9Gv{8e(-e)rTZ{$LqsA zGy>6!q2To+fx8wfzB(b^{^D)Ri`BNevFo$6Uz+|Rc7H}79#?&@}1pl<}N z*4+kcJJ6i0U2}LvS!3;c$gtm}Lz<0>lGLZSV2FLJTdIc->fAv@Jxim`m=FeS6L0|s zY(iS0{WKkc`r1xblR`etl<&juK?B0arRJ9jhX{^@V8w*P`j>KWoE@7o@hnP}kX)4{ zNXEEnMYj(bB(Ur)7hQncZ8$Qdr`l{nRko7_SqfV(ozk`~x9Yt#^+1xmB?^2&6Zpx8 z1IA@vC%rRh7jSzfje+?dPoadtxfEHFo^D)8q@XaO?)UnoEk2T^@5{51IZS1pMtbZ- zypo7O6UPn&bE|L`qg8^^I(SCMsjxfC!pgsUq_a-(Z__t~`HWj!DPA;2xEGY~d2QiiTY zG-dRuZ;I}~3-*D)=IxovGeDAcOIhFjA5z|8On_mX>d=a&#vS3moe8$5FfSqi#1ERbOP&&^g7 zyMp^_iJGEtOU<}y8IVSbLbgvO-I1L?^-)}%*$?kfnp#ShF4`I)R64_cJ}<$ZoTRAY zQ#^JM%9YQ_yB^yIZI>psrO7|D_*{OkW@J>1M%Wl{WTyCG$}IkYLik#I<_MZbqim7J zMhl@NtP6ucb zhvoElX&3#fQ0Xr(Y!;o`jr_aFU|XJ|`n6D~wn`Q^`U(~C3fj!~W_{!Cd;`VuJw2eu zmiflWD69K{F)I%}F_SU_AIaUhPIljr`}{E^Opkd33;c9Q)D@uR-+R5V(eB{mPzuo1 z@X6vH5O!?n_-Zl{EW08nyb~+US7#~rDW{Cxg2Oex+>Z)-8;aaG+MQf>D$R~25fOca z_V~%8MyeHs!OUw%TzBXOn9E&HMlUn7w-Whit7Uso-^pki)%Cj_2nIycge8vyZ?6Hs}6$>Xkih zy7R6*#Al+Lx$CT>(MT=Kox=pqB)xxI!s60Sm}a?nfb$}T2l{hi_klEP=L3RUV6#*SRukg2EMN>eBd2t)6xi=gc9{|h8%KW}I z&>ySIF9nZwuabFio~A1sX678M<{va(0R7hpf1`zly8MrYeW?D8Wsd+%5(x_fY4Hpw z$!+#aCH3mgP4P)(i91uUFH>5}l|^6`HtBSOR7s;MZgqPn$|RZuvut~1Y)G}<{vwo1 z9(YCiRV`&}5NZR!TFkq&mmQFwLprA=#fZ(r?|OE#Q5%HI0aA}z)|6djr+EiLb>rjD zjhu@n>Bh^iy?OpPfV-8MmA1jg6t=rp1GO>Lrb)l2B%C5G6`}StWNi;IE}E!VbyDLE zpS|MB*HCY4HC6PI(Q|rU3#S;mm`(@D{HoaZI~UMu;iGd5&5#(1-2hz5G7{+{zS`ta zSKT{pYhew6Gmo|}YVXvMp%zlo*GCZxuOA!EFd6!O@srfJDAUX4`#8&zchN)Sa78^W z{Fgorw9l{SE{KwO%zHJ{BGLc#R&@fW$v13$ohr4q$B}O^wo04+s)-A?%wF5xWT^e9 z+l*9^(pWR;t6gvxx)ADmX6%hYp?p*)?pH7~n2p#XvkxX?Vb#Wy%yc);!V-;?BPp?x-SqQkmTF~@|y%JKxRT5h|l`?^Ucnsf#JYT16sF5hbCVxmtAod*%o_- z4jW)`88M4rXDP2%%f2lFHaVapN7jvF2G1H~)wHxI?ca0TivjL3bkFk3xzDbywb#D9 z`9tbUWJ9VTa2J;nb%GZp_+@g#YY=)G9@Ihm$&PU2h@zAB z^P%~H&GFa=zL;#|nhVnHV)SWXAVnVk2!O%x!fiCL=apD#J62zLP@=ZmRt>tsJ`c&d z)Xz%>VrkaE9WS1;Z6xla3Ix+bB2B4O0qsbypc7YK2$nOmY=*?i?I8Dxlm=|0l19^1-X(flEC+DDq*X zP6POdFlb`Y%y%<=>rsCFS<*n{j7{{yR$&OkY!mRcUfahHVt1dr!rXK2l+jUU3}Jp? zx?n}4AJtmKKRYz?diY33jvcFIa+zm6V?~E`OKpNo_hQN>;WVse+TxM+E-RY zX-VBSVVm;wzCi&maK7+B=xd2zPW^{>u}?de?RRtGF35-f@@aF!z=4>)t}@!LGRxpH zEXPDS8H{n13eY}QQI`yjr6C=;jcm$u7Q|!ApKf)7gP5oMd+lt1%rY34!&+S-X_^JE zP^50>@a=*-V#0xf|7t&wPPOK_;~$&go#5MlGH(EBl#2(FCIN`<7t-zDV=g@r3pOn^ z09WN3iMx*a%C_1rYD@epkA_c7@#|aiWEOX%A%|DQC{nLbgN4ruy^+pda2ES)RgdcX zvJQyCo9C*GYG?1LuE3=yP$xRx3%qFf6869%7xdca$Z2Ape7dk1g3GNbi-`a_%s+y- zE`mMneqZlSL0EfnsPl`7|INM9)y5yom3JRHySPrV_!JWQ=k|cz5+%`z+tmCaZm9xcNCVkU}EVGABSmT$U0hli0W#gGVKG)@9B;{@MH@VsoYjD?W^+uk3qxZ=; z@S^sAou1ASCs5j^4(-;?G>`sA_42V&?R+5XV6HKts$9&C=k;jRzP4A>AH3i8*u-A( z+`PP*p&MZrI4uSydftbWokODa@>|CJ8u}|!RS!GDJ=3F-ihJg@N4UIM%?}d*4O#F7 z1gX9U25WeMfdZuIBo5U*I#;qfBE?5(Fj%9D^Z!(L(L!~5En2Egw>Z3# zzcEBj=0)P{dW&Qv{j1-zC-XYJX7%S*i}QGZoju(lRhiizZ|*%O$$m*Q1SJ2*5+W;v zJs+7Ce0BGJkc3A5;sNq>Kl=}S#mb`pLrDL3k^;7gqLFTyKQsdxlrkprkT$xDp7^aF zdMuXcI&c0+fg~?>X&&9p8##chv$TUAUCD!b*$l&F$G~LvDd?f%8Ma|x_fkykNZDOozd;6oVUt2po8!0mYv4Qs42L$2!YsH9f{vJwAc1s(!IEu*iNL zAmgpojQ_VJsTXsNs58rWx| zdk#fk>?v(ycXfYj;8@nu}(63I9UEkj7ya-nCveXsni5 z_1a{KEp;wQ>b07vO8%d@B_E-4T zfL!=zaCaS`HC$r`yIwPLeQn*R=dN@#*+`a(odcld+OfZ^%z7;SVslsZ40CSFhxr5Y z3WfZaGubk|N@})US=6JRYu915oAgZK(J}k zu^R_rM&d>Mj<5-bbw-JJExLvrsd$C_3P3(}z2lS4HjHPpcE&74F?v|(36@t~unk!U z9-BXXBhbTGDT4UlyicjoBmab4@WLi-{|cv_u+&#W(SiN#>)4Vm-R?P5?fopN`bu(% zzs;QjO-=E)WMXgb-49Pb>C(eMul_lIX3=5jH(){apH3f{>eUV$@3WbI&n!U`7z zgH)+gJ0scC=eSj_n=0o+HDCbGbXA;E@;mwns7vubF&>FNDY$F5+`b|74e#K3iRxM| zt>TvzfmD%t!E4eOH+KVH2*MJy{#wRJjl?w39JC?{A|AbOJBVntQx^^BL8CQc?gbXW zI2;0y00u~9&--%0dP!-(2oi7|4CGY&W&5h&#eK5?hUt)m?^O;@-bLcup_AFKJ_Ix8 z-m>8$Fi^X?m@3Wt=B&wxEmZ2DXHPzoUjrXb5L*1bekjq znBPObJPmN89urJ*bs39otu2L>1ecuvQL-7nnoB+e1yY7-$n_V%qOFV00(3Qk2mpOC zAU2K|#hTNhX)!(t09>sv(kOQaQa<~l%WTufA_yS8s=4Z?$)39ctBF1%Zpy)ubfm`l%Ewac#d&sQ;prJ1`{$oVxJ)NZ~MMZ}7%CMsDfM z4q_0NaAgM)VO6D#m2SuOq_IyTv9pTQwSwT##eFRHQ1{OV#C|Kq8HEXO!Va}zWr1|!5un8=3$q;xY@Do#%?agEwE(Ap zR|TdT!H_inkZ5K8AIvewVPFuiI5)5yxWT0E$0bwF!RkEWueiNDE&)842Y!W z-W9DGE(!Q*mW7}GJ%Dq#*uS&w{zdNkAP&%Q0FZ6vu4uHW>fhvK`MyL-3~<_Ps4_vJ z7cjZ*qB$$TnY*iaw3%ff2erhE%{*{ORay^6ug2?@F3F>Nu36pDj*>Q^fZs7wGj|7u z*JJ)UM4PNvMW0?64^n}sCKF9hENrBh_brc~0Czi?MvK}2(MJP?>3R7#%%o6Exz8Vl zh8YpO-pq-HyD$2GnW@z~a7by(?t;tTvAZ8_x2=o}FCD~-v6IT9M7z=H_i8pglX=`6 zUqxYh^7ws{#Wlqq!MJQo#nM9-{#<#v#i$7k^VZ!anP_ohcA<%3{@d0fR^1MHg5|Rc z;gvedPXg_=7^FWSE-|gu$>??}y%9MT<}D&py23o@@2Mb0^^W(TaSnd;C z)3Kl1gBv0-i`qeJWr+~xQeG?D3?h;GCrgo=A9|#ph3bXRloCI73_zIoZnV*Q1;Xd% z|7cqsI+KryMwemSvyg6~^$1}RG_m%ra*!Y2AkF4y)EO{!K%vufJp!-j{CSig_nEZ+ zq-HIO~Mu?f%sPZ2Z(k}L2l+A$6!&F8>9$wXD@ z6|ESR4hhHZ8r(_kHzx8%(B?>B%m$*oG89OZtm?Hje}nv<<+EI&=>3=IfsxJEadVQS z@GOI8nMj80ZX>fs$F1l%Ya+a*(Z5zLpZ0TDP;IQ}9R^xLqS0Z}!t3m@)yrL`Adxc& z_Qj>Y%HH&D%Y`IVRtaX-x|OmFEa3}tM+~d}rE;@oQ{F&X3lOr9NUQng@BIOQy{IM^ zeV1QEJ}q*N3PcN5Y&bchSiHQ_1@Yjo!Uaf>7d-Ng;Mac%7kE3nR5VW@O;NV82bA8K zdmpzKKnheoF&F&So51fDxjS+b&;Q>elqV=ZKJ4|h%?|x>6Ma-@VU& z8SH6T&8E>E{0EiQr~Y{eHHdzA$PR7Yk$BbKcF-03;k(X9m3I^6=YFH^RKTlVCEStzTG6!c1FMd{)xRMRy8$hN#{=O zGR8bGh9lNkx@@*Z<|F#Oe(kvCrR%>ohkjV}joF)P=g^_4l=`!qQ;c|!`s?<{@?#;* z`n}gixGuqi^u?_|g9>-UW$-IG*X)nybJ)l=pT&g>(=76}4;ew_-IuN)i?hrhNmJr4 zt#?#UT8{Fa70+U>m^*x@s%{W|qYrtL^|Y_dH9ff~z(lNv7F9%H-*aAFF=)%H3AHfH zbO|UWerINbpFGBOMf$5dL*)~(Qem_KGP-X%*a&txjT&adZ|m{vt<1oBNrqpi^^9sG z7ryA%>f_acV}R+s#Bu{&2RbGp4gPdSD(pVL`5E3V9U&c@jsy!b>#%86my@eQ-6N;7 z^9SdaT8d6<=cQPSRzVCc}{W$ZzcYQMDanN zW3e5Xch@i4M4ryKYVHd#xp53=rU>9~3rVcEvwEOa#9r!W!lb|02Sk5`cNIvzzdO4= z-2=pAV1|Y zeuveDcp-H@bq{&7w&UqEgEy4+;!;#+BX_?4cscg_a(UUQZf+K_{@H)CsT391@j?So zU_TmE)i-Ww+w5mg|J#bAq~1Nkp5hh*Tjeq+CzJ@Bmbd|{sxc|j{xFwXY!j=wOlsZ% zQ9|+O=8NC`vg1%#?`m}QfV!s<(cSZEzDrBG3KT{6zR>}!bSW>_9^P8o_zGN=!x?SJ zCu!QJYVkd-+SLBi&{cdOt52WVc0%v}Q~ z+?rlJ9XZU^u!nhT`@M&Pho7;d4_ZkGb-~3pCE&NKNpW9X9$}7;ntgHI$w}wI*Dkle zZ9Ts&ioo1F{_5-B{1ETA!QDuoZ2`v`99UOypRwwI<%Q$l{=?%m)C=vPhE zB80<<8GDNfn_{WJ^}@G--JtymQj8659+!D)RA{ z_(Y^%sNJl6#%)xj`PTGNpIKzU6drd^;a_7k&b9R<>_m~>@|=V0ap*e9sNF2`WKbSk zRpN`nF?)%c5Dar3Q*xQXA_^l8dB(J1a@uYqea1(wa1PtA+?v1i&-I6uvG8Prcin`Y7i>Ec~g@TAmQc2Zuk=G@Th zGoB>PYEo=|5pD0d#?~{*T)dNLtZrl+^c)6lRpyBh5v7;u93){J-J*;kVplbz*+n1& zsSdGZHs*|-t}?Mjl29ikFfk#%2zoYA5D&`av*r?Lfuso%^9J&BPKRhXvOdK64ZmLmYIqv>>?> z`LF)Dcr3S80w;=QOEp)EOA=jf7ti`tWfUdkv16oFJ$_o^f>6S40v;cusf#k*y9nm+ zxo4-)<8Tij zBQZo!vml=A0|`TxeqWD}Yvj$o>{#Sztso-rDmTY)8qs#wJXQnt9nNPrw7KKgFODYK9M>Ju#Y2HX-h zj~y!Fr^*Qy6DY$B+_>ca7|J0ahRugi%``TT_$UVQ;Mv0QYGhpiDZ7;BFdW((BdL*< zx-n-U83Am}J$7ij`vbhkB~%^Y>aODjzY&$Uo#*0`lc3$9o-w(}xUA?iPPcnPuVoAH zmAh$R$I0$_i8kU2pN zaVJqrR@~0Uk4bh&&P@C>U{ZId@e%aCBH9_wHW{-nyPzvks=%SteS(#J8~R;9P65Xc z*RDdCv!e612b5CThTHo>A1EQkw;^1fD8{M+@p9*I=l?-}igjGA0 zIJ#To+_`X%)`uS3B?WEw zm*>_fmy@oSFwcZ4mddJ$eR}-D%3il(OGtpA_`Z<8fzK^M%YZNVEB!Hu)Ed{{^#^S+ZaZ9ken2zwm%58(CPGFL~o#+SxUr+|f?+Xo3Im4*_p8M1X#u6$JP zc8ON*hO{-}+~gc7oQUCahB&(yo8k>DP<~-64;i+<)TL0Vo71Q&Q9{Dlxek=l?7_42 zxD3jyRX(|QpJ-o#NNT{;k%k1AJLO|lvogbX)OG@-_lOB91ps` z=_GJIo8UqlpIaU-2zy+a)>RTwY`CfaBFTq#MSqho-nAHEjTnOEG=?VTIpNcgH32zH zsaNGDo)gyUa_vxFZ9Hixb|{?b7s=c!uW1s^B&a_jwO(9MKt9xG@SNSS&;%o9Pi#BN zQdcBwBYx4my!J0<+!UrB*!bdW>(5iIbHgkxntdS0jXBK)r``VEyO%)z}5yDR+%p1#N{#mZ<4wmm`LJ9UPo z?k?Qa!kvyG5Teph)^_2Ffqm4@9jDGPcjXq}>p1Jslgk`h+@?>VuvLhY(|FXbVn+Cc zwPY-&1$ZA+vzf$PhMnh}$J-f+F6$9-ISrifO`oa;H#ea4QK;vrcv-U2quJ{Ofsu8; zzzzAMb({l3_TI{#g=mNUY0Biz!%31X`K|*qQTv*|r5d_3S~K7G&hO+_1~Qg^9f%5# zo&m?_4eSr_C^3}eiQG`;{JhNi8e4PNAf~mvWAMW1CMsPvQY|<$sPq_&_AO+-u561B zyNB!%)2n0iI5Buvf@p6($XP&TT62y|-3CJsL7PR==akkLazlPZ;>mjA?pcV8X-Q$2 z=O&WAm5Lx0=kz;#IlIP-E4EKpDt|+xRr!qJ^AXui5KcJ3`!;oRja9E@@%YWS+^ZB= z%=X(cC&3=3JMh-nAwj}@zNFcx6MOk>xmek8$~9yEPll2Dh5LWZtt3o(Fj9HhMP1Q@ zd=HE5O#}`iE60X4+jss}~~* zj&3naI=q|Mz4-b0r!D)^AM}p>U~vR2UD|y?>#U{nGm;4tNQGu!7$g?WLB4b!Ld_o9 zHXJB~H0|n%NyUNLlBOD`6DV^BqH>;+87L2McmiQ|3=k|9Whu@O@+{J!buIvoahQ+E zO9vG(i%F_dp6sYWC~ao0!~}}(IFvaN&{ZepzE`_@3vMKymX*xg9}iL*k)r+f&H_)2 z#7Tt4NkPA$wnQ+~oFbeddt7nFFn-W7Z3Z0Z3zpX0E@j-VHE#(^<$?8;;Xn31f$z$_ zR}zO|gu@eBKTVr>+UjThV|b1etv^SQaGH5Pi@bF!67I00Vzv#AV^&6+R`KiZ;T>Z# zunNz@G2^6|%@X6H!MO>vz-4tQkhJvhG4MSTqI{lKjiW(aJDBBOoIO8^@$_+S6||1a zP5&ce@kWPdtWFw4ZVylE_hsTLme+3w1`GnOD)RJ{z}w#hSFZd;@Tg`C6*x${C%ChI zvxLVTRYD@7h5SncGpJmy;!sl0O=G)& zFFB$UIh*3b?Q4_k#|*aL+)6m_M=WCDRO3_|qfAWHRnKgFT0|J%SpG~kn5_Cs# zC?Wi|4=bI^Qu;U7IN=dxSRb!&sZDr!d3IrZ1h=HZo~X2sE3UX-TEDanPW&w!C?b@r zv15BDkdvNvj>swqGp$=tqu`R`9q6eogv=P0vy~Jx(@uL8)=qj zpULq^@ZTWO`!i5~KKR`OhWMaM+<^X@`ZXDgd%kUoW*oVPpP-l{_sq(U~yIATnwET0~SmlJwZ#D%*Fy0F#R5Q^K*&bbTE|Y1`_7%o$7wvUuw#;W| zmsZNQNNQ3CpM-tCV-1-oH~4) z9-}V0Q_g>K$a7s#t=OwH{GI2_K=*xGaph@7gAzBelc$} zr*_XS8K^fjztk;U&^=dzoqk=MQ0`S#$LSg{AAAzg6H6-0R`_v5&oK1mFQXz>`F8#) zqfT>3e z3lgSY+~1>+ufu^!m8wswhQu{YuuDu;KA)oDN7@u>sN=>n)#H9`iEavqcVc@I*QINDuhyJKh@RoBIid~W}4BJu*(PiVR=4#S{#d_ZbNH+wxTggBsR*JC_*Xg*UkGzU4NedD_Gy&eD()(Wk=$zlc(Elj;ZM4m8W@L<*FVOo8hZ(8U2 z#5J4b+tN2IGt^VYm(a4|Ma*ZB>g9EKS(+2i6IW^|w&Eq?nrakI&@b}@pgY-&KO=VE z?e_Ne-x_b|#7!;D@ng78NnQj!B1LsbuM2y|y3SF4gPc6d9YB_=1 z`Dfd+(2;g*OVx+lDvC=`UNEhlcXhqa6JtXBH<+=VpyI-sz(4)8$}@dxYU;9LVe0bO zo4bn05k8-PiA`{zs^vrt4OcIp$fcg~Y**b21hUhEoUQMBU>5-g4zKu6%WYw|-|?or z?_{MGth*-79-buoTeiosEr4t|F;Y+ra~o<7H6W4&2@4QYffM0Cv&4YvfS14$F`){b zDvgg~NnDl6(?oM_h}^o=qf2P>ECj1BxHvqW`ehcQfYwtvZ!ZnS5)ZU7A1Of4rJw2} z^&5mKiROD|!KC+yVSuF)=SwpJA)VoM;%(v{oaDO+{u^g}Ouw21%Q&0&-R9d`4lEQ| z{Z2Gx0RX|LV6o!x+(`4F&w5cid|Qr3lnw5y`0@qqDZR#ixYe~@4S_w#O7p(t?tc48 zQ5vg`hv_0YD7#?l9?vdK3GO9L8n<{BTrzlvdM>np<034%Y`Q4Bx9R7PpQVx0pn&2u z9*-f`3F&cBTchT@V$TYERW(SaNgdqe^$iZ>ms|}*41%oDnNpH0u)+OK~YRTn!=WqH$N?heUg=Oa#%TA zYf(SnYBJUS;6TjDn5KQne6uqjH1&XTyI}^sqCT|N0Df-;;DYMhfO(AiKq# zp>L*p8n4gis@sM@B&9~Q#ie&<=1^Rfz=Pz>F6u&#$A}x<+Bt6$qjAC<_MB}qN?WSI zGgL~2*O+rl6h{r)kyx0o&rV~Obl2Sz5_qCy+(_oIWBD;ZUlcTc(MSCa(0 zp9Q^hk9qJEw%le>MO;PVXFT@S-!y!2pr+!1?+!sWKO_-SH5AF0mEx1iaY>4o>@w)L|RXclbx9tsheg>QrA%e6P$bm?*vuh&uj$sI1kRriSUD%!bNKF zx9L^VM+&)Oir1I9XWBkZ<}jA%R0vs^!=_3XF+Hgt7a^#EfTi0x^6Fo)LY2}*a(kujZY7Mhmq$F5tS>BH78r3jGFF)1RnzO z$&j9LNlUg`Y_aU`Pgl4=i~0MnO8*g*cr}xm2#b&jInt;hFo~J{o5Q%MiR&e!Oi{Zv zbBnN0{pov)kO0P`MZr6UngcYg^7BGUyRrT?7MZGM@I>_hfgLWZokg(Rhr$J~DYKqK z(WG&Q;xgj0bXC^r505P~ORce*d9u(L%m1cxV+A6#;3t=)60@DI7}}#rM9gx$$&&=L z?U~F9(2UG0>sEi;hg4N7$Gx6K-M%+XJe*En&R}-otLg&upIZlqza40gxzu=e{G7uc z?wC)4VMVL0`9u>qqZHDyt3XDFRx`rqBbEml&Uok?HI_6+-38)fWSVnUiK3>~W6PAw3O}WtLhE}?@N;A1ViWaT~A`N+W2@VVHhJDda`zxdWNB@nsS6H zT;KWF? z#ljcdO8mLVqX_a=PLu=AqgeHtLV>c%yDS~1^b4yudN^FpRwlW&x)+1L&8vP?&l$w>n(%{MKN1`zaTx;2uq3 zQ5#!ip#jcpXuUe!99d=UT}o+n^}T(eOgU6k(*YMWL+~DZ_@0HM7H4e81jUdCCOeQW znDe2OQ|!zg>dRJALk$Vid@)S4)V&Bcksi7r-|(}uU?>Jw8b5UYgSs|}vmYDuVc@f~ zI8re~%L}ys!D}N?mkmR_Gef@q`@%70ugwclO;SE++>72E{eV$l-8B(8rK8y2O1l5( z5e>=d?_ z;#iSoU-@OlaL=m?Gtn4p2j2Ilz32Tl+KGJ*gwQ5*b0W93^RR+5&~!ayq`4r*`yY1f z09epeodrj*@sGpiY_tqWUic1qcJwrr(iL_rVy`N`%317d=0BOdEA_sXftp2eN zI3arR9TD}^;Re&Guu_#(Z2{C0(e|!Jd`J~gx&jWUCf_F!ZOAV7dIZ{Bo~_{}ake#h zkOEmAQ!#mB74Shq6e7xPS(2wNg)CZYHfSqST+2hZjCQReWXk1J&3tG|<>SFgM^Gc}1t+}wBeKBf6 zwYPj}jI0b}m2k_&t4KJ2?4D2`PAa*-L4T7sb13$7s_$*^EF=R5JdO&wWxj5jp{|=uh+Kjl;)L(3X9?nHP2df%YIc9 z$VIWs=0EE;$u7_{gz?eABC1CN;V^Q%0E;bXf|yT*BxUQsqOYU_*5pL% zN+w_H9WHQrm{1%peu+Jj>c}|a=8v+rfpf#_d%ekyncgMO3vLLFF9q2pqzV((^r`Zn z?MgZINQcbb3V2Y9<8aJNoy(V5ajTS?jr$@~Tb){@qQLa}S`Ap{d*&L|y1+;W9=P1V9jJ*ZE1Fm>biAbH;T3G+Oa{eH3BJDLi zMZ~1kFFuNImsn2aHN_vS!<-%}!Zg=2krywgJwBJo)2q=tiH-cB;BE88I_Rj^qvbBI z&y}OtgG8}EugzMwJRVlO5T7QgpW-ePQYB-8?=PB(dnDTpi37r_4deCWF^>}LlMv>Q zs6zq=N3QX>;8pdEDjxq0;RZS!bhR~p$R5Uxvv;(dwf|gJNJV2(6?A~=8<*yRYgVFj zv-u)Dc808APA=VYyD6S5d1xTrGog+*?_NZ09Vn8F5+sPZ?Cv7?2iqRW|Hs~&hc$Jr zZR71}k9Jb)L95KiT0lUdL1cy;Cn#f-S*El^6bJ!B2oOS&o@48PkW`U5Bt;C!7*VDK zNNg1%V`Pj%AeBf`5+Q~VLdd|k>1j`U-uJw}-}m?TeSdLXz_s^YYd`B*&$^%czIWzl z%NCTAZO7=EToa_7HE~p4C*YJBkT~KW{2BnCAtP}^#9jCc&%e9HblFa^Ia8&bA3m08aRF$d*I|Xx_}tyCK;?v z&PyV3S~Wv~xrS3>>h5}pCu_Py!EvT(Nt}_{w(GW!UwAj~*jz(5o_`D-3wg;TIC|H# z$SlO26S_ln%ezR+zJiiwe-;BRv*96BoLx1-yjY^z7MAt#k-fT`eDBL=X0DuA+$9<~ zVrXPp{#Lz@LGL}V{y0?8>sjhT-!YSz?5zmJjqVSl?g%Zyu=9r#zo}ow8-E|yP@-^O2@-or+y7vjGa7r+zqMMFqFysjySA`=G3tdorpZB+w>#Ad!KVt0 zlQnZ=xGFDWM>F^e_LQ1Mzb(a_BKx=^&30?roZCFJx_uCzG3>#tPC^x5s}FbQ%GH;k zLuVI-D|7i0B(4o-GF{Dif7p;C!iF`g>T}3GLUKd5zvxt4;i>+r-BG89>0;3Xc|XM_9bQ?o1+E5|ALJ&KCajzWXe3jjneIf5oZBbE~rXSEuFKxk2%>>t5H8ZMeW=X-Q<> zni6Q+lYRpY?WpineK~Gdao}w47qF7AhoL$h0aR0~Su%Ydea-8{s(I+zQP0iSqe`U! zp}Z3A`IQ7@S1Dum)tQQ)&X`F%VapMV?SB0%LA(~+dp<^52W`{EvK{8&cS7FD}QBE>vuP z%ExBtpm)KWKSJ;N0N4;ZmUP*_p4Z~H37DUw4>!o|KRK9F?q zs8K1g3&3&C#7_9|I@U&~Z%oO4=2o!mwY~eKJxvjD1`&-olQ3*9Zy8h5;9u6s38K_f ze=16@Zl5b5`ePA>jm1KXqmlbUL}{LB7RKYjjnVkn)&xaIsy7On4l#c4=}7e$qs7d+sj6N4xm&T8 ze{Bq8!)27)uGvqF$gbY1x&s$!j;p+1^Ny_@3p1qC-{dmc=?{I^Sp%ak^tznx5`fY4 zi5!0eYqPMSsKPB^2V`e&%0SD*)XGj`AJ$%SL)g=PouOvzHEYPmo5;z1!iYGJ?a7*K z1q`HHBX^wk*nYFLf)o-9s#1D*f!niV=P?C`C{Xv^B=^6FCvuZ3I$3=pA&f;jZqp`CO2q2N{7fpUvf5$Ir`lzt zI>#|Qwq&*P!6uceVN7ejYY~IY#KEXO+@TBBpYT?_;wh3A?n>z)`oRS~wcv}Q0YwN~ z?S?cf%Hw!V_UxnprHyURzPGFihUoEf`^|bMz4n{h9Wnje;^v6*NYa%rds5pj z==@&xCBD9>_pTnJDH>hu`p)0oxPH#K)+q+TT&^dch3Hf3>`tV158Nv{zn09(8R^ra zXZq57M;5=px>Eq~K-$Jd6W3-M#XWAH_?zF5I1te%J5&wb-g1+BX2Y=n-A29KK=Q=} z)=8^XJgIvgLLWsUAWoWUdZA1UU3^%*e$tAPqLMOgYh;J?LI|NIRk|UKyGH+jWO;uB zXYQx}lCip@xm^Yqyk5>4T2RL8MT8U*D%q<|f%#NTKA}d=@vrT13aPG2x>Hrp;+xnR zR!2Pse{50FINEy5sDis_1uu}?01^CA@AnGvjk)&IS!M>bY>$0v*Vuba@Fatv+s)D4 zgca;br1D1T#f;%&ghiGCO*62<^0+!`q;>< z7dzifdn>X9Ag)XJv=7;x0;S7(dOefP3i^4$?#s3mg?9fbe4t0I#R_to&3TfIPrJ9| z$&r>lfx&aN3#@F<0FUqmN#`dhFuXE2b!d0b^eqXa8$2oO>{J05C-Pc$ zv!5CR0CpRu5dOoJQ{Btn2<}a)VoZ5+zI=cL`?YTQY31Bm5&c<1#pdE>gcG*<_R*i< z6x3EcLu)D}Yaj93LDnz6yD|6o_|be6UvbLX-g&!)r_y%UDM%$=Q+BaSqz1rMkD@~u z>z1Wl`pcYrS08De8ShP8Y!*wke+R_#xNYHCq-Sh{r)*jij%`$UK!1rQ>@#N6IOi`K ze-QU2Q@^~-^BR12O)#$vZ5j&cwHUTobkCo(7e?@Y)Q!mbBdVOO{0eiYl*EkOyz`YQ z?`(jk*fGKbP((F=mIuYiA$cSLint&4PM9}r*qc1lqG#*t6q1X*h@XmAOe2V|@T$|} zbbRl_`GOw~q0TCqO%IZ1?ze)wC9&;q#C-U6u_$3!;keA)EC%ASX1n;}d zCHY{9sP(AC0zBtnH^q;7^_uuEG*mO5zFYNWD=#%3{;M0g?$e_eYs#^FdZ^6o2Ot z4zbf*7d!{NTUoD;c}$^Y?!>d6W`zq#q}f8$ z3blUmUglhgKpmvpztQZ8?V73^ydbO8wZ{|T0wc}DQ9+XVjlh>1F7;!1;=Yy*ekjK2 zTi{R*Ff{_c^aa0%mzUt{SQnJX8k_6lHx9hS`am{qKB0HTJ6xS5s&0t;rMFf>ZFmZf zSHCl+`=#zU(z@Uu>Wa;q;Bw;=OY7US3RLEjgYsSL11h7u)2P4Q{^%{ko1>9Me>W^R ztGm?RVsjfVd{Cl>8-%{Y(BkC*ihKE{UL=rA`eCffsS) z{90dTH{QD?oA5L1{_)RNu%~$wsC)Sgb&T9>_kb!=siw3bUuC{FSXO!Q*Z4??(LPy1 zRSdyv-t7c}6c)rMoRW_*&I}2^Rb7~$KEaslkRa*FoR)I;<+cp3y#SY->eBZFHpr#R z;}o!u%?edXfgS$BT>LyHWEQ&{6OD3#qJUzY%B`5&Od|t(Mrpw!_b}q#`z8J*gh$xU~QSbIrCoOYDV+S+I#ckbf>91q%R3S zfJhyJpYTPX3yVtb23EGdj6+j)Ox?Oo2Pi&s6=IcF_Z5!oGWlLXX@$5F)C_oLiMc=7@P9TdxFD;Xs4Aq!9dksNq3qNrqX%noUiFJKJ&14{J`DQJ056 zqNUfNIBputsw1rL7(cU2_JSeFg2uRyNST~$I?)weJaPkOYTwq=u7GvpSDec)IE{r) zXFTlxqyVTN-T+|tlzgLTIFRUPJ3<3k9-a}E_KI;)RX|_0TZ=!|A&fR0?hi6#Irt%d zZvSYao?Sn42GJv7Bxt82i{w!%XYWQ)>aZXRB5KW#nMAbuIiO~g2YqJx=ozQ3q!x}l zTs;PX2YJrXt+Ly^YuO2VW+s-NDk{HF>3-0)Rn;>|T$~c*^kDb0V&1{eH7aC_yerYy zrx^E0=y%~im(m#$#wc9jJhw}(zpl#j6ZkI|=5l*Iij;xo@$$Y17I@F&RQ(6KvvID( zy3iTIM8sn0p3P^?43m=lzz>=#D&F~2WMtg1ap3T2Vd(Sct#{sU$Vt^t?=Nx;x2&Cs zvNdYMcpBX`JGcNpbfG%z2_{s;`B=PSq()-$H-zh*g#K4Zy8Si~0WtFG3EaNdq@X3~ z;B9zFzv`SxMYVkShN?)E5#uU(XuVhJy;Mp^TkKZd?d~K#+ixBc6A_H}pyb91h56ad zF5c279+N`#s_Rj?c76ZB<-%@Ap%@E}!Qqx@EL8*o+$8Z@SXlA83p5H_xTw|gL0D5a zgvODijZIgqE!W~JtsZXF$+R6C*Jps9AlH3Lo899xX~FZfTjpJO;MW_I<5grv57tb0 zg{pFk<5}Kwg??qvb2cIru4WvUv?{!+7jJ&!ZjUVoA-3jVC?{#K7IujTodc*J__gf| z>SP7)Lb=3g(C_3z$6P`?Vgh|f&bo>{#7 z`9~tz!ly^StRuwm%;gI3E9ovB!~W82#$;JMl;l{=u^sBZ#28Ne+%x)=_Ha1)*UdIEE?uE|dh;N9mU-#ri5YE}=bCTC6RqxLz1ll1^*vj$LyH=IbZA>y z&)XFjoCe6XUj2yvZ8TbLMgA>Lc51(6&D6697+%k1f2Rikfi{d^9bqVgEctWL1l-3L2id#kN>eL}{OX)foO=M6q8zDVPRH9!=YAkS}&#bJDu zf9gzzDz4J@g$KHs_iVo`413eJDch?CP;{;l2?CA~ko3bNu>(qz5hN7_u=har zq^={F&AF3&x)3B9Q^8o?Gui^na;PBX;IL)6Wb~)7Xd3IC$eP7YmLntC-Pzne2~UcM z^`?gzXFB{f;ji1OLFM0_Wh5mDgO_5QPF5!w1&&P_u%W*6FwT57;w|Ss_~7f+@+0Ff zyzl#!wL4`byw$Z-S}-THf=nh4Lrpom38XYQsT}g)?MB(=Y!9R_$2Rro^KJLnnym0e znk}-1DKEw=&Uf1-96!vHa*!A1*Cbp7G_fO1L{~3dQ!viql5+YY)H!x=ZTt~)dwqMs zT=uTT_r+lS>cwfqtU1e`PgE6bk;r7u;s!HWTWM`hCA6rNt-JZvCsc2P9?@fMPv+D0 z0*K(axZh{C!Qn0c&8vTobn{}XxmSyxq?fbhby1OK;TxNnU*GqVswOYP zE{Cs`e-kwKq)j4wwnZV?HBmygay3gL{O)X{XEJ?L&ePM~YVh=zj4+lx{JsyBvX!6tp^ICcI(2$s!1*HnU%*!C{d&hj6Hw z=4#GzP73Oy)P~iTjqX-rRmg^kTTS~wsjPEa>57=! zuoO*PX=G8-r>W!6CZY-WzFYGyuqk z_SIfVZ~!YSWp}%lfwLtetYO;RW^yl9^kOqy7Sh+wJF_Uv*Ia_eh9fI&%?r5*5AMj> zS)3P#*r1j0C;$}#QK#Ize?}){Z*HI5zd*Ssb*PKRb+jrZn;rf|1~Mz-u4I474cBl= z!&tD#9O{<%<{sYmm+AjTsx7+m(ah3J2QR_CjsSACu{SpCn!(%B%1#D;|MkZ0YX0CO z5nZo0A9kpSZx(x(he=SgmeF4HyQRa_exY?Ol2h-RvMxgTjCZsJ zNy!_L8O>3s_GzcDY5TK!;yR2Ds=G=Nd=5OaWEf3+U~MdWM@Ri&b+uV$s#LRX&S#6i zXtD3}Us`{cdDlf`|LcMRe&qipr#u3(WOvn(mr%uX*|p+GPq!CNayKg2fh~#Ge4TiA zQi>T|gt$bMr|2}}NYVWp6zHVI@K^6}U0YV&Kmx|{zgpW|2$fk0a2P!28}nVkxsRY+=gs&FIKDyS`)UnE}&E)FU}3jE2bChj>BI!MDO= zVSIB%JdwIFNsePXeOsYh_k9&k9l6R|e#)^(O6>E6%(D;pnd6mNkVYPt7Z z9794y(-epyS8h7%t_de5YeqQV-P8A!oG(-`V)|TRhufRtP_KR;s*NZ)m82?1&UP>B zev>OY<-#a{3iwwEsoXkci$w=0=TZ$`$b*S~vPr4CNDcd^@Up5?Gc8a96wf5$i$fuY zMNhm8lasshbrf4s{i;d>aB011)7mCKm-mGSdV9sj0i`xu$Bhk)kcN<0GhHcW-S*1KzOnmN<(K(R*71h0+k<5-*;lM2Y{V zxxVfGyu-KBo==GMW2`VzOHNb$GRmS&BqN`!6vk~G5UQoMQVHC;|IMW58Dn~wXL*kt z-?E|!$iuLxz3( zK!jN9V;XU|UFdO3yz<;-Zbc6pQoNEs4+l6vi;)zW7q@~dLyn-D2eOxiF(VNa$t`g~ zUy?_r5*yc#deU~xd#STV3gXasEBiabY%DQQWD08^#}jfJ=syk`cbpD#}=%E|9<}TR-%5-CakLlMt??yYJEPzyCJ)3!$F4moX{P1SrXlC@b zR)jk3VLCM~OdK5voTogajzNTgyZaB#u{6F)AjR zyeBZAEtUyrs{k&y7)2B#f1%*cyMegaOYUo&PEE?AjrBbWJj}iP1+tqXTJc)J%$xb4 z7IbG@xC}FKyPueYbNNJJvEU+N&Y0~JFCFW<@<0;oRWj&u@%6(AqAJ{shknLS_Ky{% zg*p!0`RbFvF9GN&=@zVIV!z6DIpQ6k%lGlYq25)~VY86i-Ve{Vlp1KxpQv9Nv%ELJ zUv2G|)MkXy{mYm|+Ki_Ba4-UXvO_5mO_?;wbcnJ>Nym$s@`u{bnt53>fNjed{Dnz# z!F>IZLY_wAaJd0Vfd=>BQo~Mc_NYam`u;9+ll0*q>EUlx|6MOKFBnX$ImdY0s@J0; zapa~)#A`*Qiqn2K*ANBb<)Kbv?35f&3@g`;6Ca}-;}nHvNNPt<% z0dZin8q`dS2S82@Drpg*fNUt|a~NblnNfsYd%1_DB3X)`u3;-0`SCTDbcVTdxaQ)sneeW@mF$~!G& zdNu4tlrRzTdf=O-((Wcql%jpU-kpncC`I(Si86cQ!g3lpZShB7(~KwxwmxtU@PG{O z37h(W(>R7ON4+kYSJw~E)GwhH71GX`V#U16B+gUV)+F0C`MBpV(s0L1uvv^2@x1@-!{tgfB{M z$VV?ovlV!*MQ@Cl0YNm~q}%sOt2#Nor6`TEq4jokDN0!S97+(=108^3EMxW}YIs|7 z!aL6qq>x3P%r6gJmR4Y$cK7|#la#8NjqhA$C|^E?WcVZcD$N2&RgMi z?YtFjlYCa%a66;Ro1dju)C(Z zbz4B9aFA`LsJQ%Iw|`&JTZQmPg}XnY&V>#IyO-Z~8jX+3Uto-qLuP9#21^^5JNj~W zT8kJ0RAiJuT?~`();q7Lc8kx>>Xt*I69A(99DmKFD2j*d?atzm>A^TPe*n!=cn~NC z3+VZ{(2ePA(@9jXm&|%Z>{T?<)=gYc&QrpY$?@uL^?#Kh)FJdD%X7fd47C_jhH&EZ zp#!Rzkp}8USR8EU^t<6RmUjYui!8=@3Af`15XR+UL*BLdVc@snD91IPyzdKyVS|I| z>{L``Z9=qn^2L;_?l7hu#FiF zxgU#rOBq1_J-G;3=nR8?L*!bU8DIKvz7_7spl_GifRkOc*5~VPG3uFQy`Rj zsd6KXVgWR9-%XX)#TG0rr?vH5$j1O$;BP7$WFN1w+%VH{Te|YIbT}b=uoW>(Ybmdd zNIHFRT5RXnGSzL0;$dtOK63W~l{n?1k5sE?oYpJgGVHMGWdAcXUq#vQ9D%{`uNAoc zuv_W60rCDpsZCEat$lg3v(^LfMVM;cGsr8Hn7>;ep_4y0q;-l>?)I?}#B>;27(QpN z2#p{PJePs&+GHEq^~{y9KIY2SAVnhG*^%qu#>uJjWH_F?z$z7E?sR9VIG!Q}0|IJV z^dPB@MNsz0-X2`q*tqhGs7?QsS^DJEGyuoIlyMd93mz&=zQ1_|>3DGS+B_^DcPrk@ zyA4M1+YBDH|FkzI3K;|-?MPp#J4Z30N$Yd5Cx)>(n3N&lgMo#d&ldVN*DoEW^Dx6q zz_WHaJ1)L?q{B}Z65OcoK4kxe;$A+_rewaH3*M*5EdunF*h@oO0ya#&txv*h5{H(4 zj>Uo)85(rrW7H=@wPRiN1w*X?nWtx-r+XcERoSmC+{mDKAh^Z+~{rgO}o zywZJ~dV$cxNyPCg=m*{g?l9;VEuQ~UuU4=6pUZFvdf{HaPTm=6r&P$O-v+-{aAOC- z@U|<2OisHf!jQ1m=fO2t5STBkWZQVcT)E0yPnyWx`7aS(%ZBQ2Pn9x)SP}%8d+V*u zRo_#`Lp!-3^9H{`%(9|1ILSH!D+l#?`L<-|gCGmaHyVL7Dp}eoq^!gg&DGwGWKmuz z_KBbV79Bw>D^624SX9?+Qq%%AEAd;3=2ZWe;21TUgQWcT&}ad;dtM^UTrhhuGGY-# zT+Ho@Y3reuic3jhw5^Z`_+920>Cp$sbyakY5b4TMx{&6BSrJMO3>jzAfF~)QmzrxF zElIuu1-!|Y?&h)o_r$*~zyCw$I2tGoHZKXm6P>H(xsB^rE62<++U-sET&RBFKPSV^ z)U%}#^6K&kINFb=^9h_hqLPwY0W+kr{S}oCV8qu`mdWGd(iw-d%GQ*@p_JjKTEwvq zPJ2K|*@H?3762lc90vU;g!8wxLN<~ZJ|nQ=Pm_iPiGP}DT`Odjk6*ZdmnkNpss5F= zC2H3cs{c}mA{-%(%B$l-bgTyOsR$Z94M&=Ui3C>q>T2214y;l`BHcp8kU({M*jMdw zLj`ET_%FCqIYhZ`cqy9Z6$$t#mBdmjFOb3C$xqe;n4U+~5}pU>%Idq8$Sza5W)8At zm35eVpqIG-O+1SPKormyQ37y=A{RhPBA4w=D_#k=a1^RJYN!DG-RxR+>`7nLy3rI2 zJ0Wb#@@zl$PqAn_U`hilSN0q>tbWO4DOx%G&AmPjGfeD6BTWipHuh1bN80v;Pyyc% z5JdU>BG9AKEd8L}KH ziKsePAv$;{xUua*!!q`OsLo7tm~@uF_Ut6kHub6&kuYY>_%~VBZwg%l4pX3Xu`8Y{ zS#Z4@*-^ZrR&gVGh1|%JW)Ag-VvV9DT&Hjx44Y-wnnW0)bc$J=Ty+(t#hzK2^8=ER zw517Sq9P-Ab^!iSVjw}!HB2MTCWYW>q3jGN25|ObOpuZ006g4#tcL^u@vk3xcG-J0U6#DGrw@YeJcleRROc>EBE z$K&DTon!-&0Biei?`(uL>S_aHtLnF~bFWPWU2+!Zi+1WeqmJ{}H+9@08hkcDsh412&^V~b~&y~nE z-vXv0>urk-I5-J_dz9X$goKqz1ORkKO$arLpJUODq*AfkePqB6l{=AkDbD300cycV00(ulfOv zGtOsCH&qK9;e&`+wb$k?l`*|;U@amu zN|&h>BuA)sV#SHwujny5&1+u3OJFfFskYIyVukdA!wc5Ug}D{3s|pop0fqi%sL zZFJVNN+Zev%{k|^N8NhI)pNx5{i!{!o;?2S-}3oSRNG3FwAr3a*3fL@#kEnYZeiB zFRVxs2E#}Aq8gSwvyb$ekU%B+m{-3KBo8(#ZV4t2BE&@l-QZ0v)*cxowz1ry5ktW< z9wbRB(B$4UX(F}N@nGdST6KMH5wTZJ^p#)i(ag)fiCn9<6|gVf?G$)$HNgStGn;|c zCcxvdH-(YD=z_C+lskpH)QOr9D`VUuT$BHQnyEYs=*fhbgVb^9la_E3sTbfA7?bKw z4;ATHmdOpvJx^RK8%kdZ^RX%ukTaFT`N^xzLfP9rMh*t5dCK_KV1T`XnaaUwldcwTp1h(`RT{EC&HTU;k5hzEm7^^;zL>(F2g(uv>j%oLb)bIxK?4W$#f{h%wMS z-&9R$uE$6b;Cr|x^L(OnGlSXTVpooZ_8nVs?Fljgn6}G+z2jDt`6bNB;CI?3bN=LU zMxL+NNM{yzH%fuY{RlYY2SbN!hpl_H&&94yzvKj~W+}khL9J`Q0065F@tMU)6Itn9 zIR=XNumdU-nZmwT2NcgG@waBYEX_$M3$M*e9d;Lzy%p)ulH46d$b#G;x&db^PCdf& zP>iMS;4+n_{9Y4N^%rqQbNnsR(dAjx6Mn9l`DM*S@x(rbAIc8|Uc&_05&@6Ek?T^X zsaS5}1-|vWVTxr^?p%pEX)q4Gpwapx*#H-W2Jj(B{TyLTl0~i_I0Y-s(c10CJl%Fv z+diRrn~5TuYsm4->wm9RZM@^hjq9T}&ERCou2LHd-SMM(STLiiezY@Xo)(zvT zf-wNC=Z5NrtRWjx2N^T4Otp;&j)mpQ7@;228Kn3gSIWp}PM^r6yo%JlgvZnP8z+tX z7+eOrC$G*7TzYHzpX)M~epacz+*}Hf34%GbIWblv2V4bc@i|blnlCHmU`JfSg8|9z;b3VqE!NWihHjD}tYx@i3^ zE*&T#hOVh#(%M70qpQE_DD>(DYMNYJ1U&2mFIK%7?>g#>k*rxvcs^he!v~RoLZ3j|%z@=HcH;TmjZ z^p^r|u#}&jTGXW2PruBq5TKC!JpRd!eHaq-v1tEoqORN{PX7gPjt*KMgQ zSqOL#Y-xGFP)D8j8OqUMc8i}?2}&>Qx@$%CzRsSvw`?KvW%%{ z+^{sw(_#7?Ef>*0P?P#{px0SZXS|q-)s8oQe)V2#R`EN_}2e97YDV$ z6%mAMH&=a3J9IvKH>-w`n{QjS1D>4hjU#;?bRoJ9e9MeCd~djY+5s;#4~ixXrL-xx z2TjKI$==PZ>qMD!>@KgM+95jIHO3Dk5)gO8l~bzOObQFof}2(FJfZphPtkR?*tX)C zf$K1#S+whsNr5i9S5Zrd<>9N<@Lu(2O?A3O?Guz3Y$GkjQKF^j=F^9Z3^>w_MYn;U zC(#AU>35r#-+?NaZ00@*OEmXJcXsn8eV{-^k{ws6y--7#TN3@j+L>G8!5NU5)JWPs z_2%LaEgSEgo7`f-=L|iR;38Q93^-sgJnj1UYru}452Ns| zApkOx8gm%DvqZhiuOO^UjHTCi{mZp%P@J)-_R}E)xqIms>CAx*@R<_4QFd)WcEcpZGYrzVFd4FisC=n`h8I=d*Z7aGdyYu-{yFO;T-k%XaH)Tx#I zDr>vC<;|zaXds;3`(UxK*(voK269NZgqnPkF@g(>iKz2{7Cz5p!-BQvKG9Sfh%?-| zVIEVkXcRUkpRvT<+^f++i{=Vvj2axcsyI(?+M3uyHjFC0Igydoi!hF6^=5v^R%%)?xsU|3bwa7Jwgb6p< z2Lq;EWrmt3r-~VQ9N^%TO1c5+C{ZY&o8(46PHYZD&oCws)-T?lQJR&5Y}&wLMrceP zdzT3?<#qfx-LgVvGC9kmH;-}VBgy{k3J>Zu5KTQLr3Q-mIH2)jWI*#O`RA1TtN(~e zqZc|;>jb!B*g%*kF=Q4OH3;L^cHZ4c-_-Mryqt*)_8x^vGsnZ0cmw3Cc!edoB7-^< zF}*P0P~QPGPG;N)5*5gO`B*$)X{SP8Z_&EMZ&ZdN^}x}QGJsuXs@)MPtP zXdSruS4`df1`KHjln(0Ii>@^>lR}rt+1fUbK3txEy+SRE<6=_(ISFcQM>7L8A2YHT z7O@CJ9vxE>Z}XqLJ$;*V>3!8mYI%h3BW%vSmsh6!LGl|1Z9z zSE6MznS&aG6Yn);{O(EvFe%)w?lff{{!0JpH&;&lPOy0Et?HouXQro0+3!_Vef)>t zKe`vzC25Mykt=L zpa0?V2a0_M9QXX23n|(UV1E6mJ^kK}Z=2sOv5N&}^2^^x8k6?>_>b&kFf!!xr@wjj zL8$)RZ_XfZz13-U$dGyYJw?{LtK-8y#!) zXFn>J|K7HLP4E6+?j7|)B%8JxUyVWCt%dq;_jmQoxFikrd_7N8_Udn~u`|2P3daK6 z6xmiR8C&LyQhHq&=M(8Q^3N|=yr~lk9wGa~R#f70eJ4Vsmnz9S0+}@<9 z#(T1Gc9r}!Z?`VQVN)F+F)IxJ`g6jl@_Sma174X?HDqBJ7!neal%DQT>4vtc^uRo5 zGO!Bz>o?8+m=_0aIl3qr6XFnR2rdrvyFJrSIaTL>-g&2Jvy!dq{%*v1yF2&xQkAE@ zY09?N$o!;kU77q9*usALeB1#b0(h5;{rcA@3%|{oKI2_DR14z}Y1KZYnu9*XyVtK@ zkCOGM%z)uOrMlwutF9A(DX%}yOX)f(Zae?hufhdj@cEzqGRwINRWWw_E<4W|Yl=Ge zQaOBKca6Nt6u+Fc{!!=#Ah$gPdDuu8eJJHu2jIIKDe34x>in@JiP| zn7n>{wq|P>2R|aZ1LdID!hpQT|}e`DLgz5W0znh6D&H)E_ncHWz`rM;=eq zs&T{8irTTEzn?Ded+GjGHILOZ)tEMalw}wflF1Y zl?~MYercB>LG)DZQ9N0-9=VYO@`)<6Tyt`g4^3tKd~^7QLxH+P2pe{AKlN(1-R5@`x|&e)TSslGE0 zL5Ue{d(MA+S`i^Ib#rw+N2pEgKM!OJk3~g2x5`+(L+FXM2MOybZduGWo`0<%@S-!ggqUjNe{qiT zb7|AQowPc8ffIppugyG&GgqEGBm`2>^NOV8*A-2SHPZmpJ_#`+DIVpNlv zXHs*|)&A+fdFp4AM_Ps#U(Z|}@4XOYI4SPPwOcB8_WAs!rkwe*yS8Jj1x+LS!Kne` z!+5*pNWo+W{P9#q)#5nD!+_X>*rw8f|MdOY@!;=V_poIVbfPC_<-A+^t1m|XIO<&4 z@BF=dx2@3Mab2y^w*pIREu>Wp-58D^Y3Fp*+(7rml;dlZtCA|yOxs;G2C6-Mr%oy! zJxt1tBhUc3(?!zV7fE5Fv2RUDG|#e|-LZX_W}%>?6w93QJF43L>H>wUbI}Mw`$lUO z!<)M~H-o&RIFAgpS7ZfFvoUunvB*u-V$;lrn2yaLx7LL-R%x=rvbVb}P0dvO5}4$Q zRkIMFfUhabeJ?tHL)OH7Ax3D;a2BSAUZXi2a0QXQI_b5|(dgKbZ{tL=Cr?iOHp)Ep zuf{IG+U9-u%K!`1U5MF-{p~RO!ggK#%Qx?)aU7SwI&me!P~}*(PxmVAhPo!nM;Mkm z_$DAJ^YzGyk#dPkkdxs>;Ip-!2Xdp!pJUtm_a-Q^w9)R<@U@v}|ItGf|D(oTJd&k$ zs4u!}qj3a&FZvZk8AX#?$W8n1-KBjzEGR20+j0-w(3}Jjb{m=f8g?5dF#W$av`2@w zw(-$7rR)yv1vlh9SINAzY%9qJ5*)8yPKt3j;O;G~%2;77v)TczjmC2{+P3>I>Yx1= zo4PkyflF9Nv2MZnW%JedZz{c{4=bHQkm%lEk73(>8Cs*j@M5V4;VX6WI|%Dc#O zLSsR)_k!4s{IINP@yz}ZDP`Z7I{c!WJF5%h*Lj~#;lV+4i8rsh_)kEE@!0;4cc=Vv z_j^Nv_1FifXmg2V#`%IzI_s-WG3|07^umcNwUG)n)A4IHb~!C4myI~Xc{0LwRvlcN z7_Dib8dlZ`;I~w45$BRW7qYmz@p(nysHHzTE75~W9Koz^> zd3Gy!zAIyU#=UPs`RNFI+NHGbhi_82VcMN9zXu-T2A0`gd(N0tJs7$~pA*SGg~DSe zbV*}r-%~E0x~ec7UR%=xaI`p@o}MZ@LJ_t>Y8FMim*+U@s*EpR*CvgSaw1S8J*phH zjk4%Z^k(NBZ$*6olxjQJf1s!Slyhe*bygiExI?6wEZcU4uC-^F2MBCld~7F42A+<3 z@0Yue#T}dt1}mJ)-&96Kkicv@!|5e@N(zO?P0nJNOwTi~?%6w7aN4Zm+4dt8XQD6VQwjF67 zi?6$!1r2;BA_UlQ+7+KXn|2@Ts(4)Z2xT=^wxgp6HTp%eb&S18Rwxh@>K{{kVqOm_ z>n`GNO|kD+Kfn6SZ_giiRWXpQ;?yx$l%{1p2bRLKX?xnkGDc)*_T>E)H^_%qc|NMK zNe9B^v&^5ypB~o@33PPRv<=I#ImuL@F4VTOrp+fi%FF^@ZY&B% z40xCK^QYFpxlWZ2Z9N|zFe}HIwW;)1pfW@$>uuUXy?6f7!GZHt=a>kmuWiTA$wV-`2~C5zM4 z#>3D3@w@I*{$#hX4ILmX%Rqu4A4W$EYYPMw?j;wT?B?70zDiqA{*pjdt(4m%nh&Ei zXWW)RxH#G@2o0%uQ9b;==jw^+Lh+S|6s}ns5jQHzJieru73O?@b0T>EF-3%Tsw2*H zpClxfgGOjJSa^dlvxC8uz+j*zG za5;O21$IL8g)F!9h$-{7HN7LI6~u-QNJ#{^4}ksNz)}Oc9_Uk>d^OGx$8D=G9Cc06 zAG#L&qYgd**(a#5)U7REnNl4SV{U|q>t6L%ra2k`@9~0uqkq=JE=3=;5eNNhoCnmu zk1hXuqWof5psKwb9W97`5pNd=eppk=YZ`Kldp%woF|KWD)xAva=^O9K$nkMo8C7%I zb=6czh{0@lrc7B~#ZjM;%zXYk6=S1EKIC>R74M?G0|N)*{WF=D4iBfmhcOu` zC^ya8Ddx|tZoD(`*@p$g}M!A~xB+a&+@pe&|_ZXEsx2={zhD z(n6xgU*aLBt8b16KhnmQtBs-7N0I`PnrX?U!~T_B3r>%>?-kkqVOi(f{Su#ab=O+I zBjVtt7R%;60Z;J|YUZL*DZA}|vG?9lO{MGGurr>KaV+RqP!KrkC@KOXO=`x90wF2_ zN=Z}{3@t+FA<1|w9Hps?nxvuNJpHQ*^IGB~?-_d67Py9Vdm01#oQ&}fKS@mO*T_LJ5 zeZsIe%cb1S^0v26cAksY$|)x|oC8jDKkujMf;nPARY1e&mGG3crJlRcCYL`Ny`{j>ywV zr3Ue8l7_c~^eVU7tQRlsKn!RxRuu?-NpA<+E$K$bpS06EHu0ubD;si>`37lpc$Rc- z)q2Y6M#QskD6gaeyuag;X2@+SVD*GUQYz-cQu>>2qXTWVAQ{8);@y~PF~?f zEIAny>`*Noh8_wIB3;T19PBkd_QsD9AJ#69X)vg+^apOArDpI?pxZrR4J<{e!U_#A|};(Q88#+dQhyDr4;$YD1(*^YB=?h|!TZGEaUj%?~li{XPf zZ(<+E8_hZ9yZ_uJHyT22%`qGmyhW#<8c(GF4D8&1$v}@@W$E}bD!0sfW|JgSAlSS6 zueNCqcJ+aS4-58;1K;bk@#=x*ycGw&1uc!wI~l)u@hSBCn`Qg9 zXJ=SOrZoae=g05}Z$nBtTZ`Gc3U>~4B$2+*keYr0~bZSB=_QvKgyNqSW zkZ)xHr~hiLzhX(w=T1>!S!sL!aowphzxuN;*iz@o4L~NyDY<=R1K6o`34S@ue#o#7 zP{7Won_C)ar`})D|8H6FyXM+p|G41L1O1CE3jEg8wpc%r814l9oP2sU5=AxmWO{g~ z-cDV_8(A3499yuTyN2YSXiYTq{g0?@2BhMu8h*#}oX@SLvY~|tuA}zU^Qd)v$DT z`Y?PVpPZviO@NjJD%4;D09gSLoYzl`dLS0w0sQOFV^z9zF9tgkK$Ee=Bq0eexi0K1 zcDDE}mEfr_y)HD%=AuDqm~-DPu32yd&MLQ<%NLHi*wq|UvTftbuK7x-&P%l+{e9~^ zyr9gpi`@%$aajxAey#I;ngdZfaDG9s;{Nc0+-vd1m)nLJ(kx+OYN(O+!ryPU!gl0X zUj+tzyM;q^ATL~^0tpYRni7^DZmQ~fwEQEc8Ig}yObOZ8{>K{M;Klm~%&{GK5RlHN zZn8dUp0((uW}cwAdsYi?_cQ=@qwKAf__ z$YcKF3DQjyg2@icKbPiZy5I4|^Rvk?b%yX2C9XL22*{BJYDLBPuP9IpF}{aumA&9* z0?)j++Ak4Ci8F=^CgGOLqxtawkivWKmkGd(XLvgNiJrZzJZCwjoPfEio?aL;_DD3x z9R3ro?mSs0nIK>T{QbxIE7Ko7=C8I7`*g@AYVx!ilqk7*bLq8Ci`$^9QoC_vQ3t_+ zAZ-{&P7p8)FsYB@$c;-rFZyFPq7RR^m=F4V1ahbK($#g!2kU0>B&CyZvMD zC&F)^xv;nr$u9;WzSnNlozSHkY~zamxX$V?C*1XKtV52!Nw`^QP+GTmR?__cgXmes<{} z%;iUb;Y-Z2bV%#JZI{a77;V`bG8p8x2gT(DU^d$e$7lQpK7BzOYpCo<2mzTT#?jPJ z#DVGKyueIyt_4kOt)V>N0KLuJb>3;H;} zv;jD2if;coarCZSC~Sk7x%%zjOxdDEFS|!$;^rR0#t?GlB)?E=WsY;bN}7@J_UnT# zQQ3>VT`dV8FJ#9(z6l~#D#p2qwmls>ZZwFMKKw`$Vd+~S(9<29_0P69OY1kmHC(o& z=I+aEPeE^)t#dfYJlE{9|&JJ$>m0_5t??ixD&18k}KKJh{d{$K!8^60zFiM42neH~p zjWGi!qs?@6nK|vc*}*zB8Ls?e6y@{OnK%ZQHgctCJD`%a6RDBh+6ZAij`o3c72bYh zY~WNjhEp}WsSzkX5l7fCHsoiB9I~pSlXt?wHg+t#753F8y53?u-IiUFQq+@5mv}&& z_==jFk-~P0tzdVLd~jVmtPVJx{7udj3s~gJ4i5_ETwSe1V35pU;awY$Ro$NGJ;swk z$+oql$>wX?K3+PSKLJ_r`HMUg_9w%Tk|mebwyFuPykQW}t+MOvX2foZQ728G>182) zf{{Ds-ngUyI-sK~)IGy0H6iy1JvZq)gQ!wwoPUE;CK!oGEjXxeVmB1W$e{HV^_at_ z&)S5+dSJzjAUpz05n17$PzUxEJ~+D`wn=r;f4zyavIA(+7wt|N#EeUG!MtBn2@!LL zgk1*1rX|M`qI&1;afK>Qilk7~?@dz@nrUUA)=y(~KQ9>l%XDr`zjVyR_|?2cqUmo~ zQ~SEg;IF6U8V3=RZJ~QC4c{)+@5`C&g7&K-v{TVPL?(evGyJXCY{AWb*HApeSk;%t zyEIeTtQ!JTd7)BkV+T)~2&!ck?PfZNsqxnCSa3v)MU;1IfHD*t^DHC@_Kef-{*G5v z+3k>BmWayU=u7;Mvq#$$Bdz)&iOoLB?i+0VGBAWQME?@)3x%};FVSgxJ-eo6D7}+c z@&i6)YOfl~G%P_`_C=8@WW}R7hj%vQN!74stfG<14yk?y323-^6AXuW!an5kMh=l1 zM)zX*;4~#@y9)xGuzu$0lrcK)S)IbW4dijn=067WscqVoElI{3=~N}|#ZZH7KELLR z_WXvmR5V9NRolNf`UT_&P^JJ7ltNKo?ialt`RE}^S-{@SIem2`YGdxQjc=D-I*%~x z7)TMa8k86gBEE9&VZ@91{xPSarDL;UMyV2J?9Z{r)ZocE-DY$|$FeED9;wC;4bX^A z3l?jU=k>nDyz6Z0@{d=NU~YSVL+O0=4x7!ezy|401&K`^n&^)e_>|;k&WyR_vbDj} zkp4W3k?wAxiN{pzEeKs?h1J4%SvF|bbE6lVq)Jei67&y3=XXxLn07H(X<<1xa42%c zdS#w}1p221um1RS^@@+%Hj=k%zf}D0@-AnQ#UWmgi*%r|K2qq%2PtK>wz_BD7$(Ya zRf5XlcD54=B)wIYuu+S&|~M>%}=iToBP)3$o_%K4NJeBl1W^?u6GFX=IJW#KY2%uIOGfJ-*c zCdWT2)RoS+Cv4Hcdr5c!`4Bxu2F(Shg3gLMF{s~X%VLM(Ytf4 zSBHw1QE0+mEgFm2DjAcmSunh>jC$9qEVAa~q882*jRIjraQ>(TK)za8O&>!hb5U^r zE!5z?dn{QZ+Zn}|ANQQT*eE*VrM6?w=!ytL%&rY6GVh^TlVSWW(2$Q+jC7+nq#X$ zBn#hXG7fDL(6FN;XD;H%)z6AJmr@Y^-Zqn!uZzoMAl*h_H2};%h8`&_5PEpBN8yyk zY}Wt)s?=h~Zl2=0cQPs$zWPY+7x=1KZeNiv`I%{+)*gD=t*xayRuRVMlYAWnVk`Pm zGF&RWFLZ_Fhl6cq{nP3%2*e7w>_$jPd8{<6$J+Y&=mp(lNEyIPjfNQkGmcWTbG+=n z?3IyoMhT(L{NUV6u%^B;+hx{cajO@+{`c9woJkHM-)paGWPiRlalq?M4S)z}#QrcV zjcAtDEf-i}xYGbzL72JR(AYMea=%HQj24hlF=r}7NL~`zGbRgfe57gHg6IBrg75{5 z-UCdU84DvthPDD!D|Fn>)Gnjl9y`&X3_7Qr?w|MI+J>04%2z<7h1Ikf@=V%G^|l$6 zr`)H=lZjcRh>v|0hJ14Hbx&t~z~mco9!%_C@S5Kj?%-J^D?4RM94$6({?N9TYlqfyL1aj57@K(NknJ9`;5mD7N4u@b2}MU&cElx0Um>=% zpRZVE7iRb1HN6dRh_wyK{D=Qx^uNeGy53u18TPn-#8K$IqAbJA93J3qAknH>^&yZ! zZF=px02s6y6UuUXZmSmq)J*#h)<(3X2!TGz)dN|suI4Q(%yhV*Av;*mQ$M(+so29N z%5x{7;D?T`ei?n_gnnmV1ZFY~?r6%tU!f{0Ggpjf9F#wdkbWqOh*BSF!Eylr_yKAH zik8^7PhaDhKjZ^vj)tWG>t8Pgve5K1)@2OHtHKE0n|AYB9*#H9 zVbI&kvYOxIfXlrdGE&630jtzI44|`f8Am(51m=S95NynDs%73(K|bghg*p=?XdDAp9wK0EKB3b ztH9JuU!MFPs@;Qu$-?hAa?s$nb=15SJdt}fVFfDtTN1VC<oQYCw*Hh)#XZHdkgLI`qw~ z(l~`H30X!!*v-j#IN{C6>oczvbPI)^)8L6v($2w}ICrngr(G-bk6N*#qNQ&<^IVD3 z`&bf(kQ&U(Z%Fl`-!48-ABxTM?XZg5HV~!pknNq-+CTd`7m7ojG*#m(D!b~X&9Gz9 z*iQm@lfa}<3wAFLqT`@CUKj04Sp`*m)XctfdGNOdnEayFU%w`L2Z^5}gm+16Ha;Bc z1d>5r%*?9@`nWsq1`NFqjbIM72fcT018$&T0|w4p>>Q*Ow!Y;$K&3wsm5*z0Ofta+x_d>+ZmjdGDy>kQ{RS5-dKs>kx2)#yj|ZtE&3Gn%G~QtE zfrAf{TK*V(%`d~hUM)*vXCb|ytTBrWfG)3Ru|Si9>Hek z25vF@$A9~+i*$m@las7yeP|8(z;({bqXBfGS#`Q#wf1ITdw+T>-YeH*aNdBYPwaFf z(>1IJ1U-`Npy-MY?Wue5t`b)(R)sM-yb1JJA<3>RdXmGEerN?xFKW}nlsr#h(gss8 zCLstGvN51(%6FoTL7>SC0_Y>{e8P%sS)mSne7pFD<|&H!LlBx|D;X6Q?c$4??Q>c6 zJM9~$7xQk!$ye|e<5gWhi``7odqObdLlNSTJcPR!dKe5JG_ZP%&5VBS>_TW%Z-d%t zj_`_3cBKb9Gt^7mQZXb$6|;U?08TGDz2qwZp}So%R~1oI`}vR4+*<45YI^r@ zxA0wZF>PD}+gXv3)@KeRZ3Q?FqLYT}g?i+%Sgf0erRK>YEjqzr$5r9PC}X1uB?up&GF7wybC-@lehm2Z(|$efm7o@U*)+emiOH{JjI>j7p4w8 z--Z6X6;fdJ-oUPLzDTpsy_kO#W&$?1&9fYM$j6XO&s;gV4QMLWCOX^=^{K4z+$kQN3ZM@bUkpvrN2*anq%un$9)v ztkv!9cyog_$r6;f9Byhd0KEhvI=nbt-gtgOi%#vMcM>cy&ukdcgu`S-J?4@20$_KM zaq7aC&adHB0sD($nHTtd$A;PlD69T zvgY5(wGL#Ak@0BWMD!_zKJ&D1!QtaNw80zL5WS4$^H8Drf{9tQ94MaPSm?})O!9e~sX^goX}8YPNDubC>3AUu&Ky#vzBBHT=dxr9 zVJ`(+U>fUL&~3%K7fOottrI^?pmDA2@KCwPfJQ~PvEP#XYgHJjefpqxSB`$~UI>Awk6}s`xiCFV_(y5Q9{2@Vn6O)IUEw)FA57Y+Cvs=Rauww{PzrNv4E? zi#-Oj^-%dsm;VY9L=W*-Lw_5!#8M|O^z#g^faZ&Yvt`@$PIoRZNezpv^K1H^z0C(p zo_61hH5tC98LaFfF8hz?x8^UfFS8;y9;n0%I4vJq6J_nazjn#Npre|lfN?;bZ-ATJ zF}$d>Y)e5LjXovYjpk1u@V|r}C zCi5v8v!$`-lA?bQorw;bX?bDUhq;7b3 zNov71JC}hW-~!if&ktvFz$TbS!B2bq1NF-z!yxZ1x#u>vv9F7eujZXSv3oupv%YrehmKX+3=lwC-TU!+&1)RVRqv~NJ=-hAbS#2YLg-^#mM>_JEk z@kz?E!}&We>mhoOzM7&a*MekyZ@^6`f^9w=azXo8VNK_};wH2Z(9bPwKNIY(LE$US zLY<6Pa-d;&_fkk|{AG79MOiZZL_j=iDFUjC4ytVaUJDxq9M6(sPuMv>y>H_yT|i5e zE(QFA$@@jnNWje`SQX@^DSTh@u7ZxSrM=1ad5i4tLzN#i=uf+?3N&DoA=@GR!Fzhj zZniP*-vrCTRA42QbT@?6l~;Y@PYiltBOP3f>j}bp66*1Q9(f{?s@gf{BTc5zO7
OZ32HN2#=R?{gEj-1jnQ-Co?q8n*CbBJVPPO`fH_yqH(LY(i?$t1o}& z#!H^vS)4LaCS+R0@3EhsGZF1G{`M`uz5OO#kDzAS=U_gM5eYh;#HZkon$PO3?1hpQ zJc$;}#l#7M-DWTBY=jSLggyZ-U+=b3#>LH}nD71lEEtKJta~0ruiQ}i9E$Fl7s|QB zsTDI2&t##}Mk1l)ZS@MEwL;ACC9}lG8pUNqk~A<5(_}zT0|nM;?Vo5FiC1vxHxl?R zRxM)<2)}+OW)N1l!0zU7ZW#)eXqf3AS9>TLRs4I>eXJZKZ%p<0RJzeyaJS z(sjNv9ZV&vA+^;X(=ogNwK{F5j&+ltNKlAuJ66uaVLu+>ZO*!u738Wb2ewfi|1YsJO5GA(vwgWH6$twPVO{pU}qpEKO%vex; zen?S~Y2RRk=6BW8Lz4Hi`x#VTRlUBe4vDSGd@G;njwQnZ>uQ*2{Wtr8@3aQs6Apj# zed?-+uNgq8IY0`YTKjDeE&8MWLH#3sXOMhGzd&HHo&I*2BW;AxYJKVQe|yZzMogXL zDDnqWY=+x{=lxk{VF=D7A2exW8*W|jzh6;>Ep6=d?QQIbS{#1*U$G1zv-mQWWdia0 z9~b=g?1wKT%6uEUGWzjioFySkjnLO}c0UG`!EI$~O-uHCn-N_0D~F#zV-Z7~0yK4< zwM@+Yb{T^qh079HN7EpKX;Eu|PW-0QX8IxBVva14OUud=3}!Sl+VO;v{cUVfZRVtx zq3=E%$90nn0A^>fB=ZTk{Jt_!ye|+ZhX)8o8+`#FIx-J8Z#E3BxEKXsYg~E@I)Ogm zBKy9Z0;(t0IcP@k11O6jk6U(CH>zs0;`o5X`3|eDF^%CFgg7Q6d)65|wP3SyQb2Kz z0mL7`lOZ?E#ZHZ?Tn+klxPC~bDvJ)EeusmPqedqfwVLbC_9{DmG(5UsO8!7kE&|wI zQvkh|o?LHb<)(u&Aj_x`@q!87z{8e^qUlTk6v%T903bk?vL#|Rw;cS*CmY32Hm@zR zU<0s$Kk1%vZj8Mysdx|RBvWWBaq7nc380Lc3acmXz zh)+WnZzb!4l+)5#j=9cqH+*6~u9=nv^ji6tw{ZYzqI*7qu_B4M!Fn!}x+{tCL7n{)W01PU#9c*fVJ z(Lh($Bq=;wy}GxvwbuuQ&9>_wY0o_xK)M6ct=m2oJ6YMD?MS)BImeWv5q4lkP)9*+ zwUd941>35sa2bmwjLF`y@qOYRY_vT9p#_R*T?|^izR`xqaoSO7$!)Vr&0y=k@iywf zqko;TE897hh_=KAv|B=0c_GVLw~;afTQ15!$VNWj!`aYYh|~cMpr-)^c*EwS7befX%TMxQm%Ywu~YCWGMs z+xXW5y&?fnTs@5FZ}tP39lv$s!H#Tl5Dh5V_*8xN)RHLx;}g8$`q-#wa>iCJQ8smP zkC$)rl#;;J`S-FcG9Clpf6!)EsTFWZb?8B}hUPQqFrU))phs#wECT3d29g*8fGbDV zN<2eSXZ?UAC>wXG05V-ipx1Kt0cUIvS#{r*e)FJf=Fv2J{3>YL%FxOdv}JB=JO(Oj zVP|8+O(pKrE@{y_avO;Eu1Zh^f34IqU&}#oBbzP?j2SU|>=HSMJ*Q0ocGyy%`4gnU z6`(p_D2)Zt{&wJJ6VrGipchso!_VwpCCetCn;du*@hCykTXObvdt-@)RS@+m>xP@WgQef~S@zrtcJ7n9Q>!#F;a zHr!Ey@`)#mXmE;KELa=jq%I_w28a{By~$$%nEiIf#OSP-#t%(ZO%DG$V;axaU)#X|NZ)ewoB(eQ>S+9pWfH$z>?%eP~l2)#p&o7Axe&y-l zJp_a-nm{U2fV-t=cZ?|z43J)%0-$cc)zsWbq)b~ElBTI8&F`;Wrhl+wcm?-Tmnz{m zQJnxk9fBhpz>didHax>{Uu^qZ*Y;=~LYabyFSh=$KdHiDiEqr^n4Kg3ev~mC$ePV8 z*g5RtOfo=En(AFJDpHBL&5Q#b!3~x5{5w=I+s8&6-xILn?3i()L?`bJ^e0Iy@J9Q# zfzWeGsNvtNN{k>Hex(0X8@m>5Qkc(HaDI*Bmk%x(qqVU=YjeJ9V*~YUoqK^tkUg#K z*4e4m%yUj7L6?+yD(-9~aG9`!9_Q&biS4EZ@zbK;Yx8D+pr_ zomX-Am;c6-k7Bv}VQ>0d&RH#laL#N@Pfe4f5tywZ{Ba#0=e^R`rlai510C|I4MRw{ z)O!%ESeIu$9oZ%h2_#N;(rqeTk8sr=u<1_v5z^-cY>|*J#dBya z3c2Faa2!C_B<|@1*v6IS$J8vIH$WR2WJfWIA1njjjxax~)z94WU#3&7lx$HXpRxU& zDe&&PZL~2$*DL~HJ{wAk5yy=xdh7=0g0tZ(xxj{}mo|{`5@w|F%EC3ZVLl&1c)j1H z0{Lu-;b_H&SQ?CwN_cJc_5_$l^7PjXrSCPdf(sJ$bWG7GP($m z!8VgzwAk|I_$Kp9vL-)xPs^iAor5@6-H^M56#APj%SS`1*=a0aeB-0qlNl24sqiR) z0-g7+(FiM{luO@!As9v zFoih677L=8bwr>dq7|ow)O$RouZWK$Jm-Yt$hm$wP6URQwCnEQjCL)D2<>jb3JwWQ zjr(LX70DF=d41J@-wj4)Hy$^L96Q$;ne~P)qs?eIn438E&&+fb4l`Nc*#ipSniGQ@ zKqCy0Ay(`MBt>3?yrf8EDm1^TwHIp`xqR@RF*w+jkEuAjh1j^Yv0gG2#d_Na5m`{Z zz0y{uR>LxV%>aLP09pvJTpr^#nvO6-e8PBUGe~eKdm#FmgSY@$H_1WN+_1qWqV285 zziDIvRmfNBY_lo0fJw9UUTMLBJ7u_%aqXcPV_n5`p?Rf%YHmB&8-jF$`%g0Aft#O9b@nNBQlR&ZJjF*Ef?41r35kkekgB9(ChQjEwRoj)Y~~S zQg?(ytOz=oD%ewHomiGxL9TfVZZkDnOru0N9W797qZ zCw~!sV}R&2z|{(c-7=*rq0yf!gtZaPq|qy*pCA7UJEY{V!oZNR`;BTtxN87|GVmP{>8w@ZC}J+)QNmx4E(!^|9>lI|G)R~Q^hFy$PCBjD^(5@dEfZEZ;_2V;eZJJ74TOX=Bfb~ z8`V`5u%?^;ZbMZQODiO@I}ziT%*gwIf*rTEgFpV=E)jL71NG`6ko-t?KcIK4zvvbx z)?}2JTjg0m&2doePYH7RhMy{jY1P9PY8=0(a-yM?AA}pSl{7TV2!y_s6AHoA-?8 zBs$lVy($sT{G=(Da=ODB_jpc(jet>5_Ml~ zC3~(muvs#F{UGl{Q_wBsX{PFPU&M5T+1b$TR8k{g(5J2FGgKl0nXp~wYNRDK6lmqX z(?Km1sbUWUCKNVYS)eZPA0=c(aArEIZ%a^sm@dl=8ni2yU9}T%JVBc8%QDNic~%E$Y@y;jwZ?CJW~tI;x@cs>gzd|Cu_y=gn1E@ zn#+)AVOh#h;0uO>I)F2Ue$5lLL9pn;v^A08PU_IAm%#ue#JT$}3`cJPD|rbolukf( zb6fy@8LtubBBmhb89WYVqx|)p+(_REMXs`@LNBv`Y+L)Ku0Z^HX6sxT%*N)v$mI3> zkxSNp-EQhMKaWDb!%|#Q8N@}0#21q{t25xZ7p`M|;g(+$>ycY>TPy>!GqPe?K#9*WvD>SsVB-x{jS~r z8--NH_y(fyCo1+0jA?384p!y`)AdWfS76w<*1^89d0ZIo_ zWrzbF%d-MLdeoaSYcU&KerU~iGbU}QG8S6^C=m;MJ0_1J9iH*3=^xz0k9E(q+W}W@J~9wl zE~dw1kBxiJ`}{Lv+uvYBfW$6EBkyRMY$YKP^Q_zF53Dc*Y(~JH_CK!9|9Cra&n_Ch z{@j3YlimDOYor+=E0L(LLV-0oX9a%AL|}T4j=pvC5UO(C~%}+dcaQv{&1a zxBWuksvw7tK-SDMIJoIy@m~?tM?i21Se#(%d&U+TX!!V9n|eSVJccBvN2xsG)58(v zA_6YeT(>n?$qEN71liPIU3YtfbU5odfJb>tkH<|EQQ`jYJ&>*c$dfkf!cq5SJ*nHX zmjlI_{~-eXnht6M2?g6(LuXhVY*P(Xf~TTzl}wd?G~E;c5cDWQ`gtJPB+PKd7P3Sn z8_1=vPR*cSR;~x`?+&8nQJP-^b-ujUDJBKJrUZMgPqxzI-zEnV!m=y zmCAJs_So;5IzS}G+#cuzlx`YvPk+e-YXxonksaGn?*M6;HQ&AE@O4u(6=?GTKty29 zKuq>&nKI(6^YDSMf~#h8ucs2j!8sppW)#*!_(M|z+l^BDNvwrH@0g$fZC5-Nyz}>9 zYU>4HUu#rL%h&jg2F zJsTt`E1MsHd7p6XG1*VNw{46P4cdnbhI2GwA7>q1UFv@_v~x6*JalX@ws{^%>)^Ic z^kMk<@5*iU_-_Yc;9)`df0@u#@mxNj(@P*Tf%={5nWnz93ia-Q1|_uu>be^tUC(^e zM2Nhj8ROS#&8uZP@Q!|oHA;_}F_1~`+w6S|1Zm&HTjaI6` zGyQ-L(Zfp(^agrH8&lQw`jRhIvQY&BH)=T%>BbuXuAN=}KF@zDgqLfSpbgvI+FzzW$Ex*3?Z|E?UEDs6#PqNer*(;|`$HPRQSw zMBo~u17mgH>R^B}kpGQ+wf=u@+x0(>|D7HDKhQGmf9C#w=Kc@G^Z&PId;fLkbjeb5 zZEmkRaH-(0hVyF;?q35Az#aVWgC**;8{~Z!aB2W7)QdAJ?6U|usmD^xvEkv-1fr@v zTWAYo500Pysh*sN37`fPrYRWogS`Z{Frve;em)zO%p-6dD8MYO`rAB*nSmRLrRy%K4Whr z9Vt;w6VKO0uSe}poaf&?M^Ir=u<6LLrhkFf5Zn5F#rxL;bqz`{du7RRNr!jA6>;6iO6VqM34*c>sT(iK_y-qo7^VOGR*~#^od$Y6jvZ)MId;EL zUKReNG`+k>s44F#>{ze5f{NX(jQ4#7dh%@55(}gT73Ny{ULU$dGE5m&KD>~n?0iA1 z*~KV&X>mrZ4Qu)#RT4Oj*v9H$oP}gy^`V95EFOV8OMhZ8YrQ{{#ie<%b-Ps|rhI8K zNrEcDu&ZhsR7div#p?w8)O3oIshWcL=~?4T^zl0GIyyPE9?~^CJ=Krt(H=*-+4OKW zRa~_ZeTNmzuvb36J0xDb=;bYSXT3ipqsLW_p<*gtApH$yre^5Pmap0w#x?u!UKY&6WQgw!xD1VIt_cS&$F2C|4-ICSc2kFFx zuPE&pWhZ2k8A%gU14i>~R3_OlH)u{)^>$Ql6+YDexxCmw0n+#U%-+>!kws25d@lN4 zyuUG_RN144A=KgP9G11lgM67CUWaA;?+buSbcszbL2eTHE2kxZF7fQ!uhMOGv&)Fc zcd9T#mGWGMVzG&g;>7^DD)isKhb!@~1*&rdNw$N6e2wg&0+m_>pc;UyKKY@vtgixS8(!6q1#~dh*i4KF5)OvHDFb3R}R>K47*#b+IKD{rj zvI7BJMS%i3UNPcxkK;psqBvBLI)TD4CBjjt@O`Upi6dOSy}_FU|QU+Z$YLT^gfjBi`== z3)J*(E2{>P$8lH(FUlH*?|`H>kU;=Pg*HiAK#K)@;!zcH@KHzPWF053*p@u8YO7#6 zlz2W46kI+EJ%eHKuh%`evibf?V(dpRUI0 z7?`;jtY8OCcM#86UDb6?MaTLSyVDir59b7B=nZJbO;m;*BD$fGyNTMD*DBsGi5HRx zFNP&1>!D2d7n7Xs?W5TJb?*)!X0D5aB;bN z9PJ3p@&vbP$breyym!cca|&B5J|(v1D+l};TlE6=P0yk$GAofU<_=&a$ecTDtw62P zJ0j*r_GCG{XX2E`s??pZ;vkdm27!_p^>FwdF_siiU5+Z?UJM<^2Z7x#P@rjeLQZL9 zF|xdujV*{h7|bf;3a(ky5u?R9zG81oaL5vJDL|R;u6G?pkq#4wgA=kPk?aw_`X>yb zcCH_u00`r*~mC#?z?W(JH;b&Y~Si@!}obn)r;%< ztLuCNHzI%huG#YVuB4xy|EjUPkakoneb0r$eNI=doz(pK_S~;d8*eAMyZ^+N>ic(4 z;*v}`nL$&LdbZ+zt~hZ6tuLtEniEq(ao8&E8?Gtkzm923bgtOOeYHtHLI;g@EkN&u zw#SH0^th*6q1)dnwj&AW*A{GaS+uBk3G`s}%})8@RTtL1F#4dADBLq>e~6$lJo6kQ zc*t5V)cn{K6Fa7-U)4Gh7OPr9ZI~(26UnSrw(H~uk{=bnFe7Eb%}QH|k0Dvp)TXnZ z0pbTBQVJqmx-J$mboGNL&(&c$lI}2@oH>_2X~@8D%Bb|>PmK|eZ+RZZixeef$Av$m zY}i>Zv$_!b&!7E_qHlkYF|#{OI|WvmhRtavyt$95+=HzIIc?-A6V?xt`1x%S1iEZR@O;H+IcT#-V!0+^AGhULP#|AX>=@O9!RlUByrGlUlX&o)&!)Tq}9+ zP+wiv{h*_u-MGH`bEA#ea?W?-*-u^F<2A(YJ5_LsqYS^t0TDQS2(!Bmx)sUwK3wf+ z*3)x@Vi1IgTHF0^Hi98qXD zN-iv)%eyH-ha^>CZ#0mfWj(^?fbilLMP2-uBHz^vOM?=ZTyUAK`MjCw$=nmX8m7M@ z%^o{9cVI6%Wv%b)^z+UaC&m)Hwe)N18!L6wWKqiGsCf$$Kd-!rAXstlvQT~fWMoG3 zzz3I*@`Cw2(t+;AnJ}NwcmM@4^>a2$xLMn1bdi+go$KkQv92zPCVgbWn;!O`aF*qW zD=@Afj&IC}>X<(lXoXLRBFi6DA!nz;noDoSn3`Gc2nI(flWgAW9s8zEJu9urBRYQN)0R@}W9+dWpflt&q;bdzQ63F8GG0hf(fZ*hFje?*K`?KRyc znnO0$T!OWlp3yH@vIJF5s$q{E*V7M&Q*5!0xFiR0Wo1`0r1zP8@uJ^sZ!$W4x0qvB z|KrT{;1x3u4A~cwKoIhG0=;_$dE?0k50rFia_mLmJh?SC{4~k*jwQ2Edxy@N^xPER zJQMrvE8R>_`n5Zh&rG~SbUxNxu?v=OnMJ>^7ZR|gWFnaA&>bttOpVOiinJTWB15-O zJ?EYb+w$BV>xswR^oxU6)%dwZUJ&DQaGxjFoSINbD%o4h9ol>s$8B#%*~3!08Te}z z45nc+)51QFh?K^SSDMY>&(iIO52ZCp<(0}YiAoE;@N`8Zjw|cj)`*N zFy>2pY{Rl>qbV)D;O0Jo;adWp|2A;{ZvXfe5X$07PsrJ(;I=?qT5d_^F3x!8r0-}` zBAMX$NaWHsHSuOgGO8>&X6~stCsERdDeYJ??01o#gI!%&cq=R4?SWuq!X&2FNq}PJ zgax%OA*~(hZ6moRr9)ip;w;63=Yz9v)@rH7<;V9`y|d3z+$DLW5XSSX{QMD#w*C<= zCHxIjx69UnJY#!MA28;^A35zhjgGX=?UwCg({2U=xiO*hKs01o2Gr`3o_NT!*FmPupMWu&ZHc_OGrjoOw{v zvqDqA+iXwOW!LP$ZH@JndOl2Pzcc$B#({5)YP&$gRHSrg0|> zN;{J({vh2_m2zlP;*aQdoxT>y`ei#xobPG|CcRtUD%V~WR zAEgg+Z0TtbzlnWtp2ssq)yGB)>tiR1dfFy&*lDD}+h(I7$^n^anz&Zs;u6>F6TKz= z*{2f{MkmAe)0@8WO|yfotF9GI^bS~mdPDDjamC~ZIHir0qPH>i>B?>4AulQ|Ox&2J zH$rxCFuCCV0y%#b>eL*)^#O5mC*_7*$2-WjP+T>S*?>3b(OizCDg7KY6!7@h?fom^ zSBKpW+rPbcwoBM6aAdN2M7Rj;w#A^b7;=%D_4l&5UyP8wA-Aec6=IJV2JNU8PlYL|J?UD-ue}<+own#+( zP{vQ03wr8hF6)zbP^(YP4R=5+;bccU{d=tUh0WOw)tL-R>8*zqUB%tu&#I%}N2S_O zq?riRxnb#(CyL$($hwK7o>7U}8%y%#;G8ym9-rqa^74J(1FvAamL`X&4cDOcec?NF zw}aWt31vXLHE5*=0R}oobTD!BKVLG5JT9`X+fvG2JglvYGJ&<^%xof}=fo!WOoJTz zk)7xKLS{?kPXb?+2fWc~rAQUqhjW67ex{$^2JTuP@Oj(YqdhmIef_s5f3|F!HVY}g zm2t6jC6$$qO$k}*n|5P-Acq+}Zujhj_4qOA4SVjaLpeLxVM{aRec^jD4_TFx)dQak zLd7etk3vem3D%lSS@xiLvemXMxv7mH^i&$X@LWjOc8A1_{h&jk%SLZt z>9NyclgyF+&7YfR%UGq4iRb(vFD#12RP6i+D0nd zU!&y{KOI}@65xK-Q==32!j4&rHKw4e3kcc}o5;4i*zueq%S~C8U1b`J7ELc-VB6ej zP2tjvJDe4VFb`5R`=r#8*iP2iD_;kBhDJzVCRqA`6`L%$tRHehbF9U(%oS}i{AO{y z;xqeU&pyQaH@Mx!TgjFVyqb0B7JuFLIQNp$X`hfjfE?%5ql z17w;za?Hpz>jXyvY)4HNx_ z)~8JQqq;&BwvE7-Uq$62H0BPAh}i5_~~sNQPl>;on5fB z3CD2z4Ze-`NIo|Z6k*>3uxck!As;FKi@o=bYC7H8hUc7lMrXzmj$)-+K}A8tgqko8 zDk4HaK$NN?AcP_%w2&~41rd^nh?D>sMF>682`!^QLJN_W&=CRz2q8d7LP+~EXU;SF zeCzr9`__8b`!_4x<+t~~_ult)UH9$ojPCPRq$o`IV~rXQ&0eBPCs28N62jJb1ZT?4 zllmxYxLNk^;$9MHRo~ZIGOlUixx8&LG-JOPE%$lDB$Asa!*ISg>EL~t%vwf2hPEUc_QB!lWvGgS>%h(#GU zJzd%TMwE1@3msU~UOpZ$79M#QfFm+f&(Oc`Zs~N5K2dY}vUs zWBjN>`uZ{0%*#HYL@Ppat|p%qb(*gTp>eMQK#fm9Ky$0KOusHntG({siEXU0j=0h! zk6*lA-Dz>O5H)Tl5P|cWmq_SKhv&S<>*&WR9BGf`Vp1d?VvSnsL)uMtmmJ8qw6neH zw89)cRi_e)UbuPDA(Aru4wAoFuXs1LFc;>zbzy9!8KMlibyI79M@fpwEVbiO#*W08Z5WDUZ;|Yzk z*gdLfRl=ArjhW*<{1&C8l0HQ( zMxh1xX+DBFC0TrK7V6O{oI%t_a_99^!#$0*?j6il%KBd1tI-Jj=O0i0Fj4R|-~U8- z(|GZ|?8x_(KR!epmcG?%S!AZe;J^4sIK?*vVBRS7B7*h-d&UOH9klMnPOzpXr6(uFkX1I=YtleJG_-oh z*e3BtwtBm1V$8^=_%wM^u`qBTINJ)ZO_|RQ|8k35@|CsL{t}=$QgC}}_MApT)p#^1JiLJ=Vot;!B>>sGEq`OvF64T<^f(bW6k5QNQmDI@}nqT>)+XvC0N3g5L zDCBu=xM7e>)}5lhoUEswDw5<+68=qpo^TIx;43wV;ji3qM5*>*x+lIM(?2(JzHn@K z$-*G}UBEkS#Kg^4dCZ1`uOpP$1KG&;0oi*!M(1TPQOu`2)!zXAv~%syeUTKqep$0! zP`D_ykBJOxG`M_bB2?y*zjDH3e95<94f-skZ$K*qh;^22MR(TFTkgu=dvWW!o+QH) z24V}hHsTC?ba?=9;hCD;w;qLzSr-1aq#!NSXxkJsl za@`Jum>AjHaWQ#)l6lj|3ru0&ENvuo-Hb?HTMRp%VB1r+a_5@rJn=WApn9Eq+LC>AdP#OVGN;q#7Zg19tykr~Fg=Q>%PvpX)JPWiJ_eKO7v@5y z9EU0Gp}!7p?&)-rabnfD=USR3J(@pac83`1%{a}q{vP)%awk83nd2oCM^wC)6>TLI zinIl_+B4%!$=iiAL2~FhgQOC%v4+)p&8Fpf{Ta5J!FD6ll;2hf#o>D znhpOMMO_G$R6--vcl$TFrNV|_(++d}V{YU>68-z%1nnBms5j|@*YddSmuTs=?{IGX zU`{dfq%ez?knijTYw8{k>li2!(%Eyvk3qogiHG<3co@e29mn4fMDLt9{tIvag%{2p zf&*B6?{9U^opeh!wJ`LH}sm<_zm1B`*eDA8KH_-7U5Eypc41N&U=1md!KcdT{_2 z)U>6FK6nx?HcgFZ*7u-#(o*Ykm)zNHgD@~~?u!*JtAADb*j^o2Fs`@lRQOn7)-^lF z&X9XQgdN3uF^%HLz7B7(sV%KF18(GjsMmIYq`;~Y@6>JCe(4+STY!OQYKn@w*u?qI zWh68e03eGGvcmfXmjllQ1YX84T}*)G)&|$v*ag_WoVvDc#IZo;Z>U79%EVwG?x?5x zbLAxV#IO(4j+4e3Mc|pIQuz5nHO8=%D`GrfDsOBx)kM`K26$liBwP~x9ld@vd;XOf zr49C6$Gz2^_3ghivEXl1`(yFJbc&B9{(ST@{@#$HW(#)W*Zve6W_V&$o1UZogPD3` z>?_3X8nS#4aQI%0vn=eAawvVyO(;OTI9+JZE|Cme&Y4 zWW0!gehJOPS61K{?4U8+yXApG#udSvxkF!;^j}|=^iQ$XME1A!se>q&zyJPg5cBK2 z&IvdBU-eb9koGLd>A$6#zX??P5;Y$p-pCzm;y&(PIlVWx zMfwuA6il!GPxIj02X(9xrZ*#nir1*Y;Ge8?CcXl={A%;-S8*t*vtUt?r&Yg1FU6dX zhoF@{et4L2Cej@45fAn4C}RUvAQ! zO)w$xyvv)Y1jgh6q?u%yOkHghdhOs!mj|Zhyv}ZgRDh69T}^_>L!+5d@{p^@H66L0 zq>hCPV=SizCgoG7@=h$#4zaWg1|3v!#jIf?)AkSV*sGtQ!&y&#r#6}qun>Z?)XnF+<2NMJ1g00W_(Q0j33a#rGy~X0*r5R@V`y{XweX9D4E82?%1vc z{vlpcM|ct?W0y>SuxN~5`y0 zd0C+PsPx-IW?f=I0FC327E=gRwn1hMPu@^#wBF=Z*-g)!>mb{ZW_W>xRLPqEuqo7I8g8MBkBptSJd!?FEr| zq5<7f-g4&@tj$}hg*qW?FF7i|EJh9Tol)OA4<&cwJ>U=&6oYG1=(LD*h1tbq-H? zy!L9|Ba^7Ow0^*WRO~#X$en(kx~Lz>k!B@rUe35%xn zU+NUzm+r6s2J&p=Wj9N*Ja`?1NN42(@AGR4d z&itHb@jV8&PIJM8nPidvbkVv@xTwNBYbe_`<8t5; zS|YUlmpX^ctasO4kcd6#HXT=JYS@RKLb++!;doM-Z+5^0_Zd{Uhu@r^-KLghOuAD)F&@ zo+oD{WEO4*ByiL36)TIR4~jiH4j6ld0GV%OmQ0ryS{X&z92Jy{%bzHNWCg}69X7Ot zsTOX)CZ9lB#)O?2W97AzbT?@UB>? z|CrQs8G zA2<{sp&uofdAoYTH!d4*b_`5snR=>LY{zZhiN35MoaL-e=zA$|kB>BL`iu@a_2**d zNm54eQH2&sL=3#tAu`1fp}G+%7RP?o!uuRH^Vi@too<9DBvHS0y?9cwSz?k_%UY@c z|ErEd>N@yoD;)CC4;Mu)H5Wxh)0!bqX;UvLip}(r4B5=wbVG_Z9j8A}auck4Rp|qN znh8NehMTy&;(u&$U2rpR`G}vtYzb2HHGo#}>}>UVZx!vyRI}XGxSrd&`k9CPHo8&- z=Wkd1FXNVqVXo9;_!(6kGo{gVQO}AeoRiPt{{3}yEp)+wuqqe zSG?V~=+6*Bvnd+YSGLS+l1LWh9AFsaXuLdSDoS|sYghed+3c^1!lSWC^vmX_W~60A zrARzOU6sKJ31VCX8ThjQSu;zGVC-FE&Ub-4euR;pHJ?ik();tvVldL0u?`SQ(i*?@ zvXP?t)eOJ+@3fganh%vB7uIkt-l>WMcPsUQ+^YPkFiu37_K1qJyLwdc*^u@meLVD} zegZA-$O?ZIl3j89&yOeHAnQ&G+e?yr*k~a+)Ges>CQxTZ1NEj+Ofa^lM(#-|4d1=_#=y37SZs45Pek;w^_yM}cDj zO~N;B)9JmNWx9~3k1*yMEn{1`6GkCVES|HuTdBq@n4ftkAvi&&+Wy$=KC3lkDoPQc zEcG9&)lGh1hg`k8*;9uso^KMT?*B;o(+4(Jg&((**4?8e+X+uxJdsBwtDXB>(_3Ut zn^a}5olz5Vr_BI<(L~EG@zr|K0%~>gJ}U${?YlXes?Xy46Sk8c><&s6TS%Cz1+H+{ zKXZrpEfIUVOdolwX$vb)9sA5bhL|w|AO~C_tgQdlX7suV$X&Vcb>iwG4Rlb}E@dcA zhXUW#p$81B-0y|vs}a$wqtI!MkenArqrwqvi^SBloyNcmR*mwfmT-j z*k>)g{_l=ECM1dw`8YN2!Gmb^GVphbSUCORg7J$P6Qt(}H^@haaqf}2F&_o!uXpxL zJL~MSE79Y;iC&SCQPHA1$;#lm=A1d0C(07ue34*{jZ6lNG(5^)M82;sul=~<8NLpi zuADqA*b9@I;Mp~nrV81^$bA+a$=ENqu>Gp8y3L##iE>)E!A-;&B@ z`enq+`WV6ysOXZ%e)obE5T3|Q2P`6HM%SZF>g)Z86F#M#R~uN>M0T$y7@zyZ13}Jc zj?5is4#W>T<06Go`}U*0sxA`*w!u16=k;XAfB!u|_R6cpBLm}C!S4_KK`Wp*Hv7(^ zB& z#^ira61iA~g7#|jy~aX|;{9v?$1Iyj#~xNyb(88nhnnx4VXT*p#ay7Z_k!kUpdtyO zh6eyQvvNT3G$YOZtnT)yqx$^tWu@>Iz#OAbZ_0Aod}QeI;y;VU^75^SHO8_>`P0Rer)!y*Tz{EZI0SyI8`GejR>N zltD&+bZIueVX(x2S!Hjf)rb4+v~7zoZ8pW6QVyM*7kAX_ECw+s6xGTDYH8e@9G!FX zKwvB`?|@vii84_=vKyle9CkG{NpC5HIot!aeJF*R%NsMgjk~_H%jUfwpBnX*q}QhL z8fW{}Acaj<6N?QKf{@aKQ(Qf-yGeqYV_{2MW&R^3qsN%;USs%hXojwb+)FMkOXk8>qw#!6Nyot zcJmJB?l6}D=ikmSJd(yGovOW?2EBy2ak8jo7-*Qw%-c6CZ6EbTVPmU!uQ*m~4NUF` zZH>SkIRpqPM4c)a0Q9YPeMVObKOuvaAV) z?Di|_ln4(X{FRMb>@=%ocETQzslkX|obE&unmcQilp3%>#`8)}1Bb9J2grHNa$Ao#G zK4rcLy}@R?%8E-<(G`)|(zM`%q#xkwPGuL5Gjn&Tr9V?Os>!t{uCMq|GY+^FkMA9n zX~fX(sBlPh!}yk~)gWn0vl0;_$Qw51iQk^+M~@ORvnfrp@E7Z5y|_}jwCyW5d=#Fy zY;RO7``~PTY!+J(T^7>Iw1qW=q+zp0b(cV@D{<}nn(<8rkw!CjAciD3NA$8n`I|J^ zK}4U-A*#YBy7^7nb(iN)Pz25WwFQi3J+@Wc&z%-^XqP>1gRRLGq*=SI0j*SJRnu*P z585=X?K=v~slpc+_v#R99)x_|BuvO`m^_(zY>qr0|S_-$P%9q^fP@x&sWmXDAz zOR$UWgYyh~T1_pQc`7$0^+4+i-k6Y+5SaJLunv;_yY~TyNb*{0>V-z_rC?9B2E^sD zhAd!YvN)1yxK_m!Wh6W9^^QTe88u8KHI?6T*`-2J_d951Hbo{9+V3c{3Bu7?XS5$; z$9nFD;&zraQ&XlNAAb<)P2kt5xvaeuEAye5l~oH)k@qYpjPOW0ax|8}CTTD3A);R) zjA)Rcgo|U@L8f~8^O7VLJLf1)hUr=dJVR6|XaIO~4r=7sUdNk4n38$GV z&E>Y;jSi9w0!NLz)HP5wDXA%-l%~dRy1v)ZQGFk5pe#%F~)bH6|=^1^tewh7ImUZBk z+ELSO9z9a3*|o_dwtHtk|{e1l&0$tROo8DB!`(U_KZqx`U&g@GUwy_m(j zdX{<1wKa!n-Cey|C)Idh75?=6r(x5(0RZlC23`VdD1!)K_l}OeV*HJsu;A zy{NSj$Hwt5Y`F?Xc==avKKF1V-&_8aI8mqBg6fSegZr18V_g>MLTSMXtd;Qwzzalgo*yHu69%>qJ9!K?j zLNq@;Mj1$5a)Z#4KnQ#=G-wI) zZj;Y6efnYGSj;A}tvhB?34ZlWPYHyc66XZ8BKw=ccRa8tmVP=BevzBLd#^+sZ2467RlHW#2v zY9<&4PX@il`~(qkm2g)z-JGkGCfeF1XXV@+P^^40`UD6a65cW>Dola)(`0cJI|?_} zB1h5j+nvd0nCLf2y2JlC>lboZG`YCZi>P5W+1i9>U4d>{0-wgTRQvbl8uv@KAKuj{ zUq&Vke~#-~i0LYL^{sam?HU!hR99z7F<-KdA9-hXh;^&q6id3u@$Rw>@zRB$4ip-M z1W}SPs$Q7Nu|7Q685BdL!>^H#u`Ai21jP>|!zX>5vFpz}GHL5GngpAb& zylX{KWPi1b{tY1;`#|i3y;JLZFy0(9ifu5Otbe$pA8cs}w66Q3an~u0ML%MBIvr&{ zax>6z%a5N12rET6Vot=fybYELg^QP1t?D+_Xx-#98tebKZt>ulWIJ}$%0ao`!i2Ww z!G>5sNlDM7sY>wDk99GH&^lif_fc7A-TA1E&`+uOTW(2#o?5$f^a4CuCv%BJAYKHk zb?mK*S!LFVz{s+lYsE`H8}_h$>}Q9yXIvN|_pBwmV_HTmZ2G6gY5vPhhBIW{s@z~p zH^*B;a79cRS6$pgUrP}Oy%1ihNm#|xExcS#X;;CH3klw5{KrNF;ir`Pdq*K|`&D4) z?74&!q<)*<_#rOHBr@o!!de`N7b1An@){VJ3=u-m#X-4qaBM6|vO-sU0ofyKPI6<%5h&Lhu2O zOTmM==~GH_cY}(5iBG7h0^Vl453Tfc$Lh@F99XvI^^b1I-|BM!rBw|%&9BE^D`5cF z8A&x0MRm_BeUm*xQnj|%;IV4W_?n9KTU*43w8`8Xez9ky2ZcCvLO*l(9LpvLb5XbD z$%h+rsor>IR5Pw86GzGo;FOZkE%#Dap)ZQHf2?Wlg!my?jcO1dym#uFw;tZPETW%K zVbTlk-kH|xAKxS`!wex)%yrm(P}Ul|dD4$*TU%K&f|KKkVP!hkCOeT2XvvrdrLxZLF|I|T2#|=5szYS zC78?~VjmqDprui)0@McgFoG}aeH5eNj4%?sM^@8*@S{BwFgo$6B*fSG)Fp)F)eN;1 zxVMVYTk~M8bN%(741_Osr5KrVwQ(4}X@9Owa4da0l=rS>i+nl=S2I+OOT4r-QV6|$ z*Zh-d?yAr`m1tMvez{jlF(Vf|w!mEzG&>L6N8EvI!fn8vs`GPZTok#&<} z5FQM#=%BcoL~Nva=PBFfjCQOy$m6ZD7y_ceIrZ*{su48DJqB=mQBgXqn8s*QXMZ2& z4E=h$wl;hC9l(%SS*zPPzg$j6SX2{sF>N#~its7nw~VURf(-q}nlveXMXd|E9Zk1h zf>RAGD;HN63fGB~-H8)VO?0a%lKSdE2nA0AwI`zn_%kDc0>T2lr-@s*9JUlp43c`z z-PUlyT6$5g26>qPmlrpk(5SydyTb)%Wk(=eif6u|o3>Cz=Wv)Xk`3BuGKFZ2$X>@A0-#LaMQ;@rzxKFUcT{8We0Xi+7@_nG1)AMpeN3%?OD3PV z!*TNty4!1Yso$T!XTmc0p2XB?#R+7xW(2=Rxi~YTeL!H#yBMqvPlBjaID(Cx6kz6_ zp(u>G5YNbHig*X`Zpi_SM=xvrr#+m~wD~FFBS<)&H!IYN9nERPyp+l}^HvU2$}0i= z)YftP*>CN%r#3fG)>E&#P&VLK_cYe$!SF`_(^HLItse_pNwxR$u zOnjn8p6)+fLRfphn-bWw&Ze(DKUW|y63^9Vv>(Uy7tG{ky}lcFfb%}Y?iEQpGR58I z2+~>l!(h}QUk_ixL%r=Ee=afN>IypnZ~1dg7vr}9Mkt#<8&%o84I9h5ySu_P%&x7$ ze6ld{*=TE~Zg_DE=^Axtt#qd9p>0ECpaz*?bs0Bk@wwCnV5a_HT@U8dn9awM2}i{i zr}}1ZUQyeJWD(ZQL`Q=RWiFw1%+dIu_#)}+MN_LEny1_+gG!eruB2WUO&8e#xZhH- z2PwX5(N|%8#cPKvrY3wh*Zt;34k;|Issa1lzxPA^ z1%b_oeU6$Bx+m`=cB-B{9Qz`>=7s{AXNAsrmX?@5N=Q4ZCJ&f&=j>_B_sX3x)&9kA zJVX*~X;L>C)rLN(RtnkW6As2N@l7ea^DM5187zG=I5|jpnY+2Xn^D|4GWnX253I@Z zq1|b{=}c)?&QY_hJOfI~h^8ByhNBv;_B?HFZ0Ls#tP}C*#_}^XA<=yVFvq{maOV_; zvU$%?(Aql#;YVHyog$;x0>^GKCOfi&9HBexR-A&Ub7k6NpGF-Q$^%ORMvHzh!xwv? zP!#f%NR5y7CZoITT9Z*gzqMx_4~wR+pi?V`Uc!PmS}X@M9is+n(?aLm=!a);2n`s$ z){I~9p4lLK4rV_}PS3@40C(inuAIWzx&zlo23rdU=$ z4!Wt5xW{qvQJ)DHGdV?WTVcdn0Eo0-y|`%*-`r~d5pG1!P3M7Hjw0+W3n# zWtl1U1u&&KMN>`l1nhdr8K9zMv;FX!idK=?e7n3?A&kQ5QuoCMH7`XEGMhC#I7!r` zoR7Ih8EqAz{<`3!#HZI=ij5aXD`8m(%{@^-Bi~Av)5#8UW#D4F{Tr0S__zAA7F8{V&<>?ArV>{ zF|r8nTYfqE9*<(Vqh3MbjmVv;k&!^EyOuU5xx?65*z~w49&-oN3tWWW(YCNIy|Y_o z`z@VRnWDxmX|%m-N`D&fxzB5$o<2r6d2aYtj!k<(XfUC%)+3bcdNTCN6#QgF#}C@C zO@mV|qhINZv~Kt}^J={Bvf8eW^og^SGi#bB@0Ii&?F0DarWI#}1>Rr`88bR7E{`dA zEK3=il(5of#4C{XJ=>TVP1e%z)t=GI8g&evhVb^y6a%13>}>S7@M60qg@7tj_93ZY zA16Zi%lKuWP)Z!##cbGSg^1CDK5CBN$y_)8wDx{04QCix&~zhoF|*3HZJaSZTV7mN z)D#l|)27eHE(L0E-t&#ib@{BJ$9)>ooDvYs_EjjbLXGn*!vF!kX?A7+Xy;|A65A}! zzTL@sSo-FrVGYL7&oa<-j#rxqxV1Fg9ZC~SyWby70lO>-djrguJ~7@tE@zCe#V^>w zy-wM)O}R^PCwbek_;LrkxZ_tb-s${HRE$&0<${?KX@uY^1@5ImQn^mqFbqx!4eS{^ zplMLoRTG7{vLMk#Y|{t-ppkGQ4BY^18+WF?3zNsj>EREm9L?N;Wt!JjLfC;@RTpeg zve%|Vd_#ILcxCVrnIP=aF@%f^mTDzcxwz^EIS~hC$4=oIL>y3(ejZq-w)N(#3sEJn z#emw&0aMk%20&&Wd9u;2c)Sp?9PO+Ce^mNjOP*)|tA}|+w{-Fx7PMY4L!~`j1JU7w(r5GG z<>P}>qVQV*+rN2T)yf#(_$hp82cyZW%xl~7(ZzJL@oys^g6g$!OU>D;4VDw&!+fFB` zU%pM=O)V(tj@hg2d|v<#kK}u?3AffHo9i*CpDk)NVjLw)y)(v zA7c#}>E?IeTv=uV(&zP;HATp#CBNnM)5YL41zqL={&&$1cvmbkA$2m`V_jMGyoD%E zwEA!647a?Sj2k|Knt~v0TK3s8O+b+nH_US!8^S?~nPI^J{b+)XC1ZJR=^5{$VcmI@ zPx!5c4#A?RWA0_n-A4&`_^eY67Pmftp!*dpAgqH_q&fMoZ+})%FpT!wAvL|2(t4<% z%kM{3l7dF0`$_TybO%LhU5rnUTbzW<`4W2el1R&ck$AY}Ndwi+I5J1A*e)DERm&<; z1H`N0&PGN+`%u0^ZJhl6>A1HhBcG^i5vzVU{ks3{3T+}LH0xdSv!}&UUeBWqYCmy4 zjRDl~;Z->gB6E7)fN+tZ}V`?}>@CA8W?)fvee*KUBn}SsS^SE!o?h$)i3kcw{ zk-tpouIzF3SbbW9odV5P3(7@DB+ql_{@2^%k{A8SWeRBAn*i0?8}nI;K2tqCZk-Mc zZe}E5NdwgJb!*={A#&?Gin0HP#^c{(U%qO2L!Nk#WfrbO4zB`e2vrMx%YrA-@N@-? z9}^!aOC_Z#AxifX?W8B!Q{uauz<7b^`d4VnZ~ne+{F4B7$m9pB?f*t*uA?gzBE44A zpFbb!a>(9!cwC8+uzmVI^+Sh=hd0<}SviV1OT0bbOWmCm5nK@cCyaBu+lj6qjv=L% z(;>EnJZS~veV$XztiYK#T7q%y_@&4Stc-w7W^;6UbRPj_?C zR&{53(sm!vkpSY~33+qUb=+dvLaf3}ti z_8Z0qK10ZkUqdv>+R?ptMBlZB`c;{L7qHLLdEHu4neObxwhC|?MF;}rsZgR%92cHB&gHHK!#(6B_fVuuHTro)rwfjSlD#0&&`MErd;ojxe$|1p*@)<5`dBorcHG2-U`V5x|`_ zpgB;H63z~{O*UH6c_VrDHY|WGEa?@!@P^XzcI|Dob1_6~?_;j@>0wm}+qSF5*cR3c zV6L7%SwzD8>+Iyng>XyJG(9m&FU>oa_Bywklt?Nzu{E1gVdYqASrkFYb;1urjAzql zT}CHGVMlm(QiErXaxyTa+m0ZI>K}SzOfn5S4BB2`FyMb2u8X zvH_s=Gt!Q60jh7A`GF65k2^vy#mDNshr)qF2F~JLnd#t!NBzMVNt^?DV2KFDjuVh1 zHHVr{=+Nxpxu%@d8`-aRIuuJUp*E08yfVvP5xrq$iRn41h^cm86PUL1=Fd$xnK*@j z*Rj8?!H}!zA*ULQOqgorE4Il+Uk(g3Vs;2aw3~AfQy0lijT*pg7E!leZ5)oA(N45=ZMO48CRwpLwIY&x;U#( zDn*>YJ5)G}&-s!1&h%nNF>j$xA@s}Jrn0Jo0+({uqIl!4Twn10S^II6wU*oj(D+u$ zTB-?0sK)X`v?6P7lr@Wfoz!o>K}-!T5ms%;7H%dnVk}HF6TvlH8?-Vd2XSiOlWMs! zqk`0^RUfmc-Gx)pSsTaUhl?aj_CO!34?4gtPFg{iQSxFPu8`j)Mi_dM;za^83R(t9`3Krb?QA69((U}k9(Og zvgxV7!i-pv-7YlOn;Ay2$FDw@nF^ax0twg}^VvC^mahE{(T>ct z^uW_)SI~(gZsgLtjvA(Ru*rh;{`QNagBV-)vGv@Kh34QIzr9x0F54rKb9o0aPBGoc z#H}0feOhxdZ)O4*;3y%iwzeRhcT8EtPQcEDNNs1?1 zj|i(nw9j2nsPj{;gR1t3bcDE?_BXMH_a;wY>c?7&v~Qi;ZwAW!6uzzo;e4u$HUUF( za^+zd;+iV7ieDip>RIE9;MO_V_KqIM(9pPROpja;eEYZ&4d|(fMy1&zuQ{3ft+Pj0 z1|O*D%R!w9$kS4H@Xo$5?eGBTp}gf)!6G_m)1byQjZlsW!%&0jPNR#|p+gC&l&11A zO48KZhMt833{!mA8R0;UF6WbJP?MVhOpsG!AzfZnXz5iH3$e*QzJ_Y4xij*|Bz%W$ zEu`Fle|-ceu;;(y!)0gycUVuz3m94;Ky??F$soB$&e58d>WiD7$xc;kag=>T(*DNZ z(s_H*-|7;u6%_>@R;RSpX4~*|?v_z1?r~%AIel_VK)H8(WnMm{3|Dj~4_*%Jk2aJ0 z5>DMfYC6f9jHx2S&zKli&#xmiYRhr&h#-!=w_yyn#!s z*_tMQ0@YC?C0?^gf<3C9`t`hUU6LA->>Ct%Hl(z;8GaCW2G~(iG)!$?8wk0lvV%F- zWH4xokf(aYJQtGt6T`Cz%ex-YDFMMcrb?i2090yyKI{}vU)p5>2d1r=TK$ty@E8mg zc3dm-CA*Jp?j+<$I-=`q8(9y3e{Pjmd*qRIS?v9h4KBDkd_N zi%6xy4V|2FIa$lbqh!}X6-Gg&og&G{_0)MMjZf7aPrZ9v(0z`KD9x-TsOs$3=tNJ~ ztC6Z}r^beXZN+r1SZ5t8+}+U7zG8~q-*_YUXjM4ezs*izNz;<+GRvL%R+mkEV4RHR zK)q$QQa+{3ONAHEWR(j)3e-yT`o)Xmcx>btt8ON@FbpuNfJ#)Xa&A-{K-wADvB~a5 zTacdwrl#NJflRr<(oI2SU%2DQk(%1 zrK-RiL~eUYx(SG{s#f*E#Rr=AdJl`;i0js*X~M4!ALai9TW+T*tZX^3t=ekqg@nWC zWh_cOy(O;M*D3bm-mPb~6S!2^Gt&ciIph+78{y1#PRbhlI=NvzG?n-BeDivKs`=z9 z$!Z8$R1+zhcsda%=I(H%fzIwoxQ(dC90Q)=sJ&cdN-9S7V3weWf)SZ3^7-N4y8ZnWL}Sn+ zeG=io`S!KewPexaK*L>Sw{J768E5g%emQzNXitxwEe$b?fo$dA`;F~o+bg^Plcl>H zv`*~$G>J3-F@a+{@}?b4XwAHE;nZ4$e!&N zV4UKK7yZe+y#<+*U*WLa^(5xUK$f0r{9%?Swd_G02MvJImyL`(#m6$%T!si)>=6xz zHEu*cJS?iT?Fd3EHm{baiK@8Bb;~l^`zX2ef({1N#P1;kQfEHZGR)-po@V8O?8G`( z_OLbuWcK5^%e-ssBBuSi2aSeQ5^O=OdZ&aDrRC|GwA@lsjY@ren;csAj)QUsjSdtQP zzOjmo-jh!b9)0~I&$pT}O*&jzQ6U~#8;vpo`c@rR_XXj*qPwBc^$nFnm5urHsbA zBT;hK7b@zPY^@=1PI+H%tOeW6c8pA~^pD>^ubpENmX{sxQ8!fY$bQt-G`Tgvbgvsk z)<}uu{Fb30WDE}6$|2=SQCvw{A@@=m{95~| z6bh`o7-5Pn&MrI_TOC%033^vjS=AQ(eqg?%w~m=Yja#s1yCFM`@g@n=3mu-^q=~X1 z1!8=~nKK}An1hZAuVtmLSUK`{6>YGF(fk+WlF@(h${;K3*E{KgCgB2hbgZp_?nVI< zATg@@(=twoG1n#*d6yj5k@fW}Hn|kztgXmGXntu5u_IhN;-1>QWGBwBsXieARU{QZsW`obDDYQ!+Izw~~|;kra0X=bk3b zJu`Dbq%wDf)KF28DHn19a>bn#6%myX1(C%s&GNbX;lBTa@AXUi=<)EnuJ_}d_jTUq zoY(V|kLNZQuT}A+n0t=tZ{Ka4XsIya9+;!eN`qS5!bboUJbpz~# zb0bj5p;s%sOxZQ|!!tu|y1rZ&c5{VQb#{tRvP0Ng2)VXQ9UtD6Q|fN_HjNe^=sEvk z?W8dObz5~Gc=|r;ne6%6eJRZ}r`ZgISsEmKsROLXoONxZEvqOpTR;3M&-sJy1X+cl zYTC?>)6l<3Nw-=LN`7XN#2gAMlZ=8-Hrx=9eY(eWS6q@OuS5^{V+fESv1HjMFTA{87i=5CboC*ug;joO*A*a@^mufUYrSa9nb*!d%bi+RjqQz&+%CMB(Lr7p)4xFlaPR zgM5a()THg>g}4o_0y2DUhejj2P{#h#FGNP{mL_H?T_vFPQYKK*7?s>KqRP3fZtk88V*Pg{mBRp{}}O%V|f6K9eWUkd3& z!voqg?kxt7L9T#nle5Eb>arc}YWLM(piE;^w;_gsEeFw!hTq=N_-JQ`t!DkUXBa1+ z7@J|ENSKl62E0-&ODVB7`%F{$RM_$M?nKg>k0LD(p?TM#erz;YCBA}Yhsj~P;)-l( zZYB_EZpk-Yh;>oYe#f_(m<3av&SPn z74qIQQiq|-c#1b>wA}6SRGcfqE2$Dyidt6F1!LNFT7TPx78gyl;6l2|Lg{XL?FMd$ zLhPse=uzelx>2q*&rEhap9DvqG^uY<9+5W9c)EM2!oyEcSTS%Fd?3Y7Ra2Fq?PTIK z+n$)nuV|^`jJxn6k2F4iI6>m|C!Yd{`UPIqin`#3Xm{Gb+d`Rj>ni)LSi#rlqE%I9ktQ4;fm z7`G##x_RV3Fj5DPTO`>^zlLGh5>AX@1`CpX#44bLX zzRNt)|7=ks+s2XA-;2@cb*5fnwVo~F+!`rLJEq~g<2AICd|$$MvH?<#ZB))(2sL(_ z&kK@Y@<_p3#_7fPnhsuf6rvB7*f{h{g`ey3Tyfd0Ds=1Li=+6L{qR3~Q&6%Wm3c|^ zy6Gub!Hp;CX~iJ{y>-JK;MXrDGaq^~+f0ndl#gzX6TRT|i}{P?>{*~-Na+zt-gqJK zjtZs1M78DEKx|1b`VIUV%k5RrfyWUC35>7qmA~&lIsB1*_O@cKLTd)d7|qXAFLh)) zZ*H66%)#tMORT~=6%Dhv67{Ok9xU6`!BwiW+8vEP8^_8w@~=6>yuWC=<}qsOXgd6r z1v-9B1Wy*gf`LVApNop$?yQ^M;jxCR@ox?L<4{UJ# zIUE3T^#0?U*Uo|mb8LCns6GeSiF0_3IFrqT0C6`qa_j#s#xMGR>2JNB*L$llku#jn z?|^{alW^wXg9osukSPWrLZPBBLQgdrT0n%CCy{Hs_dZBj+2?_N=Z>c3x|g}5JLwrz zvOx5f>f=LBg4c?;t8=5jeXVr`{jY--HMVp}8=q2J7=leM*C7jHI%a8o~bbsHu? z(kFJrt(O=Xh-`Mt=NHiOn0tnPh-byGp=ss*P`kh#TBBS21GOsrUqPoYt>ib{H2D{_ zP;~mBCWp6NrIC@g{9%d3D%UI50|Z)G1!I59oO)3b*P@3Rt`wuEOV->%f=%PPJ#$N> zmK{O8SY+CaEf$($W5My(MXTiNz*9nszSVr!IPmKwauE7 zvaCp{VzmLENe?!|VL``Mrl}92Hl3&5Y1FqiO|HiwjbpjVjMjHZv-hnCIR~rN!e`+xJed>%3 z$hPF{g|$ferMCQ#0B8l&)9i}F{b~byKXNrGa4R=Hi0)5izNICm-g_nX@J@#anj0v6 zbFjl^m`9qUJ2W14=)U^OLTP`+8Ijiu#2cdb?~uSpu;%4-V0YDL-ZH6i8TcJJ+DckE zvbsD&Rcj>^|CYe>GMf1->8*u6lF;>TC3)BlEpbJ{`-=L4$neF7i-)CGKGl9QOa1Cb z2F8CGhefnP=llEMgU>{@_l6UEi;;(Oyh|$)Q8NN?V!!2#fU3HA0$MKT)ZzY_)bxi{?GN-*07x4tgaJft_I(Y8`NsXvaH#3w%KCZ6`*(H)%FJ+bKO=kmds4lAu zi~mUQ2~CaBk#Va>V?UoXjMpZ}7gv(aS|vQ2Z7MD9-ef@^@cnt8#@#5^k>0sV*6noy zaPoU>)FSUaecv$Ivk@pq@t+&lp`w>4^aOmY+_vG1TzHC(v}_LL7FQsuYLY)nZML6{ z`)a{X{k2}_qD36-cptJTFly5+PJJ>=fu~@nn!P`1s2hDqdd^d#l)i>fmXZSIS_FzZ z>%YIqe>XXzR)q-ssPr_oY3)XoGz0v8GiH;Z;K-D`H$$z|-Olv8FK^Kd25h)QG3~x+ zasS{y zhPQ~qIE9~#nS{<2TzdKi!SLU-x=c(~eJi~nN=HH6z{fw7w5ZAJ?NE(VSf>JryhTe3 z^=UNLSy;q=51T;fFBnlL#-*fv%Nw6#Ste%pc{1 z`9rFICAouXs+QSw#)*{s!}{#)w_sccA1vG{*-8kSlFqIYWT)!RD%q&0YN z21I?X1^(6qkltJGS=7Zc41L7XE&qX0{Kw(H`R4CX5_f$vS~&6`iaGdsG9hmI?7z(J z%jFa`g;S8LbDM?RNtEYkG7PopFE*xQkp|X+=eA(xOjoPV0}WzH#z~6Lga2W!UPaBC zEs|O8)Tb8h-zXK;JM+jwpoL+^MFm`^^$0dyf?1#g$O_MiInw+EQxK^YZPCo4jR2#k zZEdH&5F8kr0<#GP@8s*pmZbd|F}a-}$4bi{d@{XTf+ib!T5MBNKyWZ{&A#L25GroO;3Xv5E%HG{pQ&y0sNGpFd}&0^yg=1Qa?fcxb(wkV;}vKC~|SGV~; z_QA=lJ}L4lRI&CvAV6~x{)N)BQfCX$C5jP$;6Ws;8wIkv>uU`P8?^+ft}F}a z9X2>SZ36`du`^CQ%S_-|uQ0w~9jxVMKHJF~60`CD^;&wiDsEcML+b_;*xw|!p(avc zVO24+d&(HwpuQaQN&NY#72t@1>+lC3#!bO>z$YYV-ybnQ21|e;jc}44cu6e`I0Lpt z8cEmAW8vsV^an=Ey4uvB2feA0apJ3&{O0eqjC4e)x5UiqDj-bF)knY3!1S1pBzBCr zckn$xZTtbsA z(%70cD)u)QSFC{1+Oa5(Zi>R?Wp3W#9R}Isu?vl3!xI+@NFh`OR_VXG9{h$pNboKJ zpP&-EoG@k2j5dm`&BS|sfgG_E9~Tm%m1n(iwU#L9D>PF8$dHE8UXbA<4@2_4VCj-d zs~h$yd{WsKDV0niMP5523T5{<|G8F5x?lV))mv(yKniulgZcDzcGsWD|3=T1kk?dsn@^oa@`(LxGD?W-GA zp9{%Io!HNrjMj;0+28|_9cx4J+y$t$XH30uGqPD$d)&A zL`y&$`~SA?$){8Yr5EdtZLZSBrWA?*O`M$Pwi5ZRt&|7^U$HF#eQ}g2tUP2{`@72j z+9r0mTS1==O}J#Ol9yGI!&f4-4}L#V_wCa^*$GE7j`Phu zt}%c#x{G75c0%jJ!Uyb{h#%9Gm0NH1y{2JYwv?=}4=)@O*U8|0$JiE_Lg#7&VV7Ve zmGYt@b1HvKSphueEr!pfy`*Q2z!BO`jP)frju1(~limn|t{)-lm=Tr1UaU0`OhG|s zJg&8c=clL52C?$UAvVy*u-eU_vqLi$*6B-qYbJxQGwTlxl_ZHQ20xWybLp2S>je{+ zw+*Jm&Bbihdu@brRP;Is<-|aQs2~<;nJ)R=VrC|Gk`3!1ib=a>SqDHJgip-@)|qFQ z&w~tPV9c=;`o+k{L&j?s`HaYMv(mq+pf%SN^zg{bb?2MTRcLKEUi65hJ|*gRZAm2s zU=L2bGxMra+H)UHVIIfIQWwi;7^`KG>By&8I{!_`Dei#9Y%`|?8QVN)ZV*%Z#*OjY zlB^F5zV(#8{ez6y;^f6Qd2F`m;fuROyMEq-K2^7X6gJzYbLUNQ?UA2i;&xlCtYoAS zdD^rMz~wip494<-EhM$^^H3PA;#bpM01_ z*8Z*`y(n(}WgH8U;n&sQZfE@4{+(xP{>zT~f>!9DBC>#c{q*n!b*;+aHX(6u@5urLXqG7b&USo z*5@xJwIS!bH+k~G2KYk)5Y3ih;uoNAk zz5OoG)O)lFIuAN3y9wLc^YGtE0Tv>tNgY_JSa@2707o!-Rn-3o2` zP@BCyq!RU}Pi&in7+DK6)CITZxP8!Ea`!MzB-M?iW#@!z3`a!~ohYxuP{(Z!)Z$rq z(I-nSE~NP&{cK?SGA4Xj-I@4tK5A@Z7pOoPAOFuTN>CgE*TH8l4odWw7#5F9b2J}; zR0ToI(|~1gdU}i*o|RIT9n#nfT4+umoA=;*j26W%!B2^t#S65oB|T9u(bb#y>M^0SQ!r)yt*TWx7q3I)k5S#Dm}PUNh+@l?t6$ve9E9Svi8YK5=>K zA0v)!#4LFilWusTLxw^w&$};}ANSa5gGn>Cu0NWG${Xd1!r?Wah=lz9QIVGBmW=Lr z{YM5uqT`Z#dM6Nt2|8W38m-}dTjLcBY#mw5(r54cf)XdBmEkU88~sVv!{)bETV|Vk zEv1&i)g(|AJnrKW;c3DPucz#WHE5nCAkp9wb;HyszsBJs?-=BrcfDyUXy}mgI%-cW zW*f$h&|;;VX62FIa+_Vg?v*wu(U@4tA35t&wXsW5D!7Wt-pF?enLO&#)o~oX$Qib> za$C%-e^RFx_hSptlFZ`2t#76vb;zdbnaJR8ezZ(ji^eYh_S#v1?Z9=WbU_f6^=gSGhZ(x4iA7mvE z&l#-7m)?tf+Hx~F^yAD#8zOW6)fkU(&x_X^_bW4S-r0OI4x!49mDLjqqWuqsW`9Jb zo901S&uX_^$+i)_+NtAaDJ-6BYM2q}SCL#(nnjq7h`Y{NqDuRj+ase%sV{4Z>Lw`q z&;?(bnF#;~D*%>s9l7>be(qkbVyxowlOQF*uAk;%dAahtj^jasRA4jB%Y2Ujp*y`xA?*&LA6%N~j7H9@ko@a)@<4Wvx2y#eS76lU4{QJ1HO!5}vxf zd$M(uR(E&2!w~ma1uGtW+OQLlC!P-HJEhpI7?mkHeAAsV_MCduuCx4wp_`KJeo(KF zQ!NKpa+3&t20}m2j!7%E_>i^Jc|%D`Yh$|nL!`}Hwr_Qw6$CST7w@~pf?S+98Hl{` zYlBJUXn^6yzr8zte##oFO#dzMp!R^ho&D$(xa=s_;3*yI?4lar@Cp=fM@JP1Ld^ zk5yyR8^XO6vx}qW8I>S%iXE8!d2|`WfHVyy^L1Uh#%cZbW zO*XUYN`8@jBUE5xM{8gGnTP^5Ev&g)>O`t~`I@#|};YqVT?_{k_i(N?NUnC8=JL7>wvC;VB%MXC5KURo8&- z%Gs~WvP{*%cckN#?Jz_18Zg;=3>;1&mP9iHq3NZ_p4*7jgHRiFpnH z%#Gbv#W&@b?Pr7f96gwIS{l`65wjrQBM0on3SDg9L{3=jbo1PImkU>q#nq(UW6x(# zI1eJ!vhP~6`_i^=Hu8Ii40PT{5IP1N(ozSRr2Fl~hpUXj^K-{erVW@F&3fb=?pTs` zDSO!J3_UpUS8?lok^XbyZ7Naus8{*4-Gp!gY5xh}cq8+wC+&J`8#@w)t1HT%qR6l z)$4Er+wMM1Tqh!E9o~2+qY7z2zADXPD2=nHI4z3=CuR|z2JMZo)8zQ{JSW&gx|V0@ z2XcCVuZ;?XrIX`&*Mff3Sq{I}_smELXYDn`4@KzmqSGqq)nrOPXwEI77&)Mxsb)wE z)V7HenD@-S^wOTx($lSi9t&SKedE)1C%D<)pdbyar@RwcOJEN_?U0z%3Sm#S_&pru z1rcsap0BR4;A_*1Zd2mIHQJzEdcGN26-c>PkmPU^ELlJE45|~q&189)Q{@x|IU49m z@y~!Jvlc!rhWzotxkjROI4w^N#Axy6bi9J4;OVK67ehS~4)xYE)%pl2QYmF3yzxSiVL+$tubMZ81L>L@uUq@-(sdg zn*f2@Nd=+DtHxd^t4B3@dAJlnHYxBD2U2#*#MY2S5zv-RZWtW~SC@bNygBle`YqCaNwgT^Q}@ z+8qCkI8lE9I`%AG9pb#ik`nIt@>105cjJTSgsVfP(FK^~(20zpu$Vq6KgQxIw92>U z+xM3Oy4Pz7l$k&s145h*F4*gXO&?t*=df2ex69(LWoV;+Ff>dY8Go%;xK!KXn&W=k zs@eUu1$zCT4qsJct%jBAc1NENW{x+ZKP^(pPhg82AJ?@r!FT4KGZfu{1yypnI!{MC zJxL=P3XA#vI;1Cca!?PpYAg_(k6(r5aILL>@LEd9d=w%OCVm)q1DN_&L9fO%Sb$SI!Bi#Q-0K7!1T7#D2yP8)LRqoo@p!bQ)5<{XHoy>vJRCEQ)wWWPeboO{s{=O2f0%cdHaNhsWkE|{q2LF z7OR`LR(fr7R!hbea=;WN4)=jqmYl(VA{jE(`3S&!%j%Xh6t*huWxuJ-sq72el1y_K#Gv!#B zL!E=-0OYZ{v%gQB0MsR=Q=20#&LFNbr8znm@>ACPxp}2wDyS6k2Y8D7RBI!3#dXPW zy0pD)>KI&cRy&SAUkk7h-(XZLAFxG0oz4oFr4q+gi!xbm0qnXYJG^V?#L$`N|1dEv zq!27}4=xjT^lUn)anxSwIKw#hJg^|!)~No&Joj08yDrgj*_Co_$UVHp|E*7^ zQCKP4?kTzOUo6Ctx%WVZqiRAR^F#q@-b9?!*&YSxHm9E+&Xn%vb7T%IXOxwR(Z&qr za(jD4+2fS%&+wXKRT@E8Ee2cad<*X{S}f>a*4WxN8YJ1;ax65~3SDDvwCp|i#mt>s ze*Y`){pU>TadaU`Zw`$`?$1#1ojiZb(sbdCWL_f(sp=@0 zUJZDm$k%M``cbxB>@+L`hs6erm_f;R#J!5NJ8lJ~- z_i$8|?5Pb&P0B?qAHAAiGIzx$OC@tPq?TU+w<@Y(3T8@0RsGq%A3f*W3}10uvBo#B z$w!<)iH{%-PVjuV6U{hK> zwMN%oa_=7qU)EXV?M6kh#O^$B)X0dLdn=I8k>_ki009g99*pS zTDN6Yt}V=qxu?MPHcydsPic9+7UR%sJUTs})0ugJs~(_P?~ZlJFOM-{xsopRRhQ+N zK+2m-Lp0GB>o7*R1K{*olRHaSb7Iz}ONGx7uL)}?gIjjC^}EwiKJ={wMl*IYKQ;6) z^bMgf_QB~0Mz!N>B!Z+PRDI@I!du8R4F?SKLeon}b1Hy_lU#M@g9u#uJZh4iKC87VsX-kytm<| z?_63IWX{qa;!jS3>>h^!v7vZbxko(H=2^u%AoL3KIjYTtJ|lR1l#Iad1-G0NJL9WB z6XuZv%@#JasK}r<{cT0UbHlHu2QxdCw0^yavQP2$P#Lt;G@eb!gMc8=8diXKobVIp z{vxI<{AzP!?pS{nVFqkwh_8>(v8g2rL!DR)z#N-mj<4b7nai)b-MEryw8`!aK(x_S z%2rJ3s6Bj9i&Nl|7EW}en-*+l_y_%%Y9m2zm=rA4=scJB2Y&2u98k{x3)b+5d7G@9 zj~6`ghu!CYdt>tG;LbC&YbvTM-yY%a*RrIxUNT{(+0}TV0n!UAvAj!@ocY)%h$z4Z z{>;NZwzd0l4T08@(iZWHLvfDxyjnfkhuk<KnyOnI|O&~k6xrAlVvJ-ZYV z^84p1-hLQoHD8BGd!36fT9S`&S7Zfg1i$D-U69UFl5IMZY;J@v)H17HX%W;Psj^Ap z_f{L50NhRn(AR%4(Drvevi`B4BK}0nNW=kW-Hzv7%nNSX(=RqAUtS<&>x`LJ!UoVO ziM?((NJQ*F*@D##svF_ianlbmdGE*KdL!js{CiC`?K8*lW+o*;gMuPC$9#`X-?O0P zH-z$+Ln5hOG55sSi$IIn(Yc#AL-xiUaGISBVE!$UAXtjJz+j!VjNk2yAlc}L*UG80 zzb7LtpW}A-;Vw_wt3PF5VLISKE8nJNh-1ox74xCT=4MRZf5B_3uzla$a=g}K=@AQO z!J3i2#&;-P+;^s`t-mFK*!F~$+>*y-AsWt_Kurxoq?RfIYk^Zv+bk*j_hN0; z#Q-}kJj*;7j*HlbS3ERp2V@uX8Lo z>1_k6Y?`@I462-!2EH$OoM}ix9n}VgvrP05VY_BIBC2hp?r#Yn7f+x>QEZtOV zTW)F8_&A%mF4nAl1O98?$Cv4gbyr(n7NPIy3ggFY9?!&`8_MgSSl!^S7-mqnTq2uJ zTBoP=Y@wdUX)AY_IOVDQ!)A6)A#y-Jhy(F1+L-T=%)XR9ILtt6Aftc2iaoeL{6yBW zbUCZ~nAt)+k#-)}>pGXhEiyz?s>XDYU3YT~wTDxvzph*#Os+O@UaW=GLM=ZWR(1kz zWdG8&)ywTl3}zHak5B7Ve0Fvt3M*)E9?%M$c&K=Se?r)yVraNU99v_=hs3_oO~e+=oLTaP!u);g(`PHM)%^`bv?^vfy0uL0X%;#z}}tKAq+_E&^Xrn<`A z!(!7MttEwIUs@Qc9oe)$>z0nZ7wpCMUWU^0ZNBR#s2MT7zoo74yt$t@`ua!kPe*uu zi+SaQ$1D1YiQF(!%9{T*&b+Yc7X(HfA9_QQ8!*>7pg1|lv#yYZ=U*-iT1Q%lBLq4_ z3=#ODrS{HZ*6^R%g{f1WOdv z5>$Y1dy;;RcuTtoS>Dw8JV{Dp4Ef zIYDm)NwkpkU(2+04Tg06Jn}tAyho8MP`bB<0n$Irh9{8W|BNeK9*yJLgSfwx6FH*~)?3js%GW-(T_bi3Gp zEjeaPM)pP7YK%qmylJW^yEn?~NE+&^35{0YQGL`DZ6lKJVEg{5Xk|@;uNm5^zP1e@ zJZJy9y^%5N&s%4c?o0piwsiBFcB+r!VeNvgJ0M0pM4g?s;M{#_L2k0*kLQujxaI3| z|IK7CD*dOa>wm$wzyGRY`L~XriFx{k89~$?KQhZow-iLU2cwLnavSX*d|Egu+oJg| zRURQwyyU5i;2r0z|68rA$@ys>xh7;IY<-1S_2%2yA3CX@>_6#-em$k(KfM6XzG$*j zpKgHRJKcK$^26}|_NQlmwGj@wbif9Z$*%pKF#rVJhwfZr&^m8>2{ zoRqxp>^*00{x~%3M+H_q{$VTYL6gSVcM-kCdNm}Y=WNQCPRw02*P^MjM$f}*(a#z* zweUrub*-^D;QQWpcZYM|U=He+Qw2otQ&pH`Tf3>12LRENFfAZsM$D|J`~A;3p(Myl zdOH;tIc6DIf>$jeMl8vZ>!EOfs4zSOQd4fXX`RV<0Viuwy-(7*{29YusI3k}%UYxb zt)HG^FXYp6JB)Lq0IS^KZIK%z^@Po6YoFk;dS7^>8OB4#w&X5HV)B!hcP@y|JXmJ< zxZAKpg zM=9MNfPGxbz@XTh&Rea8K{f>quv7e{#gK+4lFF)N>4xJRgu2cshtm(_Zx=A=a8%u5 z!)NyIuAxTN-l}j$Qh9JQV&fk}(a^?zy6V_ppJA(G8<{wHiC2j_{-VMh?Lh;kR|?H7 zLyy!cV5Q|Yg{3x*y;8zPO^-<&HOjVRKJSl(*wPev-fQ#xU@qvkY&uBfTa&5c8~Nf& z15K&VB4Y91Ysxd>76SJC&A{0d*qgep+d-r)5#HCT#&dmy7>QxJzrYA-FgXGdiYL1b z`?9xh7BTa1uGx>_Wo7vu$g0k@u>Ii`2x5y41`1=3kH(~m6?P$?6+g;nJC0{BWlopE zb0J5D(uWX}ywv4C7vnQL5e80gjaXP{7R2S2!ecWOczDw}dP%Z{n!${gxs2NYUDLJJ3TwP#lqqb)9iCqb_i z%6zhzKyc#RpT8))S$Cx|BQ0*>^7zk!ovta-WOs`Ucn9G&SoBl>ed{#%Dzy@IdVn<> zj~wUBrmsVL#0qABpv zF@uhz3E9J9&k`ig_ppc;YrZ@^l~?R*O~QJZ`TeZPFuL6MDvcHFsKrf7+&CrgLQ-2_ zjTF)=wCm4K%%E0cM~>2tP|c4^GWTomkri0Roe7g$3;>%EK&F${Z`>KBJEA zvZF}T&s)vvB^m4NTd)9}uVybc8wJX9&O7@I!D9=cdJ{27e0_AzW3S1kjCunG(Uisa)a{!5S6>O_ zGTV^Smx@=_aQ3-aPXvTfl)O5$93++JE96OTqAbB^ zbxIh(mEoV*8Cgde1^aRbd+)TKcB7E+M=Thlg~;A&*lbL#`sJK)^NkX`{dWYPJzloH zm9?`$s7NCh9)BlNenE3KpifIf4Q^9S%x^Asx2L6do7{CXu$9&#P;)j=>9A!@MI< z{`7c1-Efl^KKkIA*O61uv7Q`r+gO>G{*^K3ojbUeV`|n9{arMvWIIiEM4dUiW%XEZ z(!T-Tl#w+HZB_UZ;pZjfXwI#-JON!*)gqJfO#eGgRVR-Q;NFv2=bM;+sl0iPohx&^ z^#FGx*shXXbXX2>;3^*=Mr-sSABKkrBKH)5GlBBp;Q`l}3{n;}!*FH#2b9(1^_7a{ z!-j^-F~LOfh(^wkU+^c|PCDT8D7xmLAtH@6dkGwTCL}$i+n2T8*wpz$rZxHmx}AzA z6P2A;*4t8py9%0buHOd*3zsQb$fQ?39jC@l!WOTTH1>*A_OJjJDpc#-{Skn(4p&QU z*g|fQLY1j?remlWw=Zk=M71~X^T$3OB>Xk>LM3#uqM_)#Dlz#UIev=(*eYBW-sLf61t405cM!v(u&oq#jwySP~}p!@TAwi%!gxqs*Bu0a&(ChbI@u!+<@E_ zT|g^*&&TIFL)_lF(fScx2XjU-W4brmtM*nL(4l{;OUsM4TH=mIQp1qXWL@2Rj9*f! zO?c3>2|ya`>|kD<{@VJL*vvfdFx1$(3gU{DYPIqP77WTOzBX*`Mh;d^t@?*16Q|t1 zv8VNnr(_`JNIA5+uG{2diLiano)KMRSHLjoH85swm?=j_pOtsXJh8>J^BN@>140kPG4arTA&VM$1{xIV(0ay*2Z;;4>nxpnIoI zE*9vBwsLu$4>FB%a&%oVCU9T688kiBClO!8+)V&$ci%;>kQh*@X~?x_?&==Jz7?_8 zHoC{(;tnY7W&XGwim!aMa(e>+D@@~c@B`+$eW%UuEL4u3)O_L7(n%}v$O&orsl_v4bQ-q$TQ9jLG7>DCMHFGKZ0%6xT)o_jjx zTV+_=Rq9n|^2_0|I%KP+*|n-ybZm-ijLrO6lij&7WDulr*fx!Bo4tKvsIF_DrXeXZ z61rOett^-IL0F>o#(v#@yj&P=_dN1rG;j)T1|D!0Vk!tIPqtNByLv$@PA_Dcb-JF+ z%DnC4Op!GRY?u9}Ek*~~itG@jNb91lPutKyHlZ--q3?TBS6wGy+{BxZ$CPfmUhx_B z?xMn4FR?%OecQxPa5!$jW$kuVH4)ndybaiE3%2FJ>+3ynYgirseHyL7={q6sNAXe< zlk1dA!hZ%ibip0c+G7sXTm9W=u6Juvs!zEMX$G!52UW#~h})`$k8rc8gZBzQa?(V? zHta>`n2J+I*Q zzh(>|EG>1f3v;55%|tDc>&d_Os;MkkyTT7j{0=tf9MzQlBNF&9&$!kHRfb%hei3d- zaMwI3xoXqDW~^2pc7K4qa05k^K+D1!tA(*VJ_J4*9G9ABmIbt!+t6KF6JBMd<{X`v z%&7&Ac|SCs8}gt(<82GDmn*;-K})Abbje|XMSCf!Mugcp=QD~7OvO?Z?7FsBemQWz zMV;fE32Vu$&y&}2ap8n5tR>8izb8PailalcxG7*SUO@<1C6#3- zwrc#edKJT>6ZFFkW)4z>iwM|QGi)34dB!2p1l{uazNQlA^k18qJ>uM43w)kM$WW0@ zx1}NK68;!RqaR}owX*;B9CFIE47UF)c*pcesty{bTyN)oNpyX;F0L`ZA zj@{naVQM$o7=&e4s6Omp&l?KMY__}+9acJIj<}`(`_OsdHMejGqg-6_IJZ6dWuKL^ zs^S|)4_861xD5E!Ee#qHl3_e- zY_5D9ubvHfY)c)dY63!n^2mL~<<-_7w*F!CcY=TUkr(f2@L5LnUyh#}KQ+_PR6lfU z>;*-p5kaiZiX(d58<-mZ2@LIv7(mb_8gv&!gc_oiwGDt;@wCxFoG?t7q4G^Y%NyjA z+#J1u{9IYPN}xg)w7Gia!a0`}drpG35~-u?B71oK#f{SGtnjP0?Hiq*9IV~zor>>N zB~oM7Z7Thk%~Fie_dr?bF!c)HL&JyYVCZET2YdjgyZrohKP_bXxNLs{$kMz_gxl<19k9~ij)_Mq0XL-OmT+Mpw(vF?lEn5%cRs(3iqmNwF*UasDoGFI;LI6 z)N)5`wFV;4>(~+YI&)zI0?+rhkBcYll-Yc7j&%>Q@6!ASHufzA*Gb{RZ_ZMa3AI>H zvs}p+_h@nGs6W*~)1oAtFvZLu$DwdA6O>LRzszy`yl8dr-jdR? z3x$`84=i0ZQg>076op`tIdEetUZxJs6X_ok<@6xUCM%gK6a6!jhj>^~Z-kydts*5e z)2Tiq=ml)-b^2kHuAOCe06qlMyVORS1RLB01<6Q#4c>-u?m~7*xNjxn>|!R@G!59+ z>E>`!r^8LRC6HDLOZ?I2mM%5c5{@|V9{N%2y{}tmGXJ%rQ<>jXZe^x23h=T^oQ|`2 zHa8S3CfqRZ#Zh27@EO5Y_nm7JsIju?^$jD*uK zmO=x2EuOD_Kn?<2m#G`Mo`c~Tmn~y33NJW;LC?5NEgs0N8}rE&?NjP+d|kM?`ODj0 zfuS~c2~&gIT1FYM6VG;3fpqYD1LaTii*N5|cPV-e>LO}n+l6I<QqtQ$QCF zUr_WDz5VGp~G`17iOfsA3NSa+ASL`S2f@VW@>+ z6IsBEHRvvThVDaSyIIe<`a)cj@?MoCJg)G!x3;oMQ2&LcL-#d-=73=vG+^g|*nXbt zWy20aNf0N>rGu7Pu)$c8ou-mS@KSZlfYG%L7yUB#`{ksiSP&wQd6V5n8#uRAadE@# z0pn=X3}N9d;rS2^gSU|ZLV0bAasn{i;qs`7`(WKDf&-vQKkPrL*=kV?RlSF{CUx=@ z(=%=dt}iSxrUrkuteclUnAVdOB%eb<%MZ-GCivpWrtM|*>^(-cQERVOOng*3X?tqr zn_K$!!LVt8UYXN$f4JFSiJ1?TiXO#?b9Lv5m$@1vPZdOv#+O;>M~!;r{FR>%!FJsu zf6QfUM=m!sf^MT1wP+4Q#BFY-$>_VJl0x{M4lPyuZ?UDFh)#`=Y*iBZby``f;(tKo zm~W1=Zj`*|zkHtm3tJy z5Cr;AdZMd<;N!eDuIU_+g*-V1@29qTwU^Z~Y!c8y$Ux*NzX_5S$R|6w*N~DHg*j;t zUI}y(fJ4<4m8Tfo=n?jXj_Tni#hI;$1~R_sYyt+|UCO(S&aF3Q`z&WrigiZY&G7Zle~T#!!>0b zR@1E0sW5T1?q1I+4An~UAE*NsRP46GEzmn^#^O@kM7I~+rbp5gQ{^gI$3<^8!ckQ3 zeSQ_jjDg#;$$Y|)leY*m%HY24nxQUYIw==Ug)X*P8pct1Qhh|4JghFs!dstXVjML6 z@YO)1D^_v-`1fO?X1Y=_d{na*wdP{sC@epSj_I*D4Nx|hpmPS+tirK@?Nx;pN?w_q z2didY_@3!5HxNFR;6GXa+bF0*2|sx@0>~cy={nPgGi-Wi=?r_YgMKUC6MY6Hj19lc z?;|E5UNgEPSoJIq&2EmnUrj+6V9?^4>4?CakzVM7Nj`S7PY1E=kIceawxHX<3zm>F z(c)qsdal8x?j*A$w$^l5oR*r&$Wll1M%*1SDmH@$feCLAz0t*2aTsdkmS}>MNd4IqzbP}y6J^2KeDd)RG8$6;YA%AGwsIQ zrLb#kJ37>Px{#@4XNj0ysf;s!ke737;WiENSOBZjd5Wne*Pg8V;C_}YaQl&xmIAGc z#cutpqrUdbEYR;pv?kgC6Db2b_4+0T;*G*1e^mLwX6{f`cb>x?rpHWxctLfWbrxqoU+e8XYc)bGlH*AluGa=i$nHAZ!7Noqr~f?L0nY= z2-zRIF|iPLsV^k5=oXa9Wv!>fVnpnx&uwG-D-Spq-(!H*mB}$RzLn(W@b_tkKXeBrw(T!o1@>&JVialYA-}yfbZyUDhx{h9C5(NGp{FbJ*ULmHQ}tvjYGq4 zYEBM-N3OdSa?2Njfb+-cWhDO~BYEEfS))-UhA?n_C0mjOl*%AwM4A*H;^= zw1rZ3^d#T2{>8NqAJ{4ZaF5V$&o`Ea)cUwSZ8M%~2}g%pS=q<>Vy@Fba0e>!GkW%3 zmO)mQBe2zsRyGaI-L#zV{jjQ9vfRl z74$X_t2dfY{yO%#@9BO8$Rw4NLsX9S{gu|=ITl+UUH3V2_r45@1`pz~aA#h3kp!*@ zm}=Bq&L=a513zh>cFy8Thes}r)uy~?wMCTH_P3fZDXcHGUsy~G1Nf=4PMAuVU{+Hj zu;_b@Cgg;x%5;_b)P-*{;7u4wNM zwso}?3SOv}IQdwKNKDY9aBBP9*mY z`#SVluR}_0^EeB7Mabjho)+&iNc2BI1#X?t{<)Cpv}@nQBJoS$-Mw$bAKfm9Nnlkz4Mz~%`J7L z)9m-+yFa|2kD@ZpE~K}vJ6-SJw(Wv~q=5U2w8S2K@w1@E=9y-weKq z?E0aGHw|><=GH>}zROn3C*fyKC!qFr21hz*jA$+^B=WXI@?%BI=@o$qhQ(!;r9Qkw zB-mUgKRAHun0%w?7GmW#61p7!!l=v@4uVeBmmPMS@PZ(wFaZq5x;G}We6MP}8G(FY z`~GSs%tsjCmId!2AE#LK*8d(K$ZaCOuV8RU%zrm6`8_KAPwPS6pHRJHonFVZ_B*3Y z3)PEZ!>D^mR5nc;WSdx9-KJoJePi06%}M<>*?FReR>@;H6z}ZKn^PNZK>-*-6%K31n78-D3=@_*HX1J)zrEUF|8Td24NJ( zpHzyD_CN0Ap-?zxG9gT=gGKCBU-Wo@mqJ3Iq_4=mZm){&KtQuQf=GI)^v~O#nr{sB;`A=nNmFLuI)OTa{br4`P-73i zMOXZJ?HhBV_Q*IXT=@-^5eBXe-8*A@M4|Mb@44;mHxSy^`yB*ww@FsZ58pm)+qZe- zY7QV)$mV`YQl$<7_|Id0JN3`p`(Lvp|2%%%KlU3mukR{NRxsFFGRE3$O z6yR>13KLmlCIkIbhy>0N`K3p7#x>-873P1Mz#;!fSf2CizPfs0MlF>1)`Qu+&cvCD z2%M}jt4s%rTPLoNK5{We%2+lEbW#V)a@gz`5cj)Q+kCG&BT>vS)L(Sl%v4m0qD)ME zV-~l`{k1+B(mfi$EjQf;M)4YoBx3qV-f61Up1W!L;WmOzd9?9L!XuE`Y6p-t!YK2A zXmcEAel0~txR__SZZGrPKEQ~vG%7WANKzTz_Tj_jlNzGFp;z+xQsy(q?s88c$Lq)v znGafv$$u?sTZ-1#2|~_Flu(6aTqNj@h@-+mC3K?2C!q)v5N&P@0Bsa!%p@CNP1a|J zY@#q*^S}mzn+C6X{T%LgnneP$z89lW}O&26MHekelHt|KmN8n9|xMYEoA?jo2jP!O%X`p?l zwEhdZQzrG7pHdJ15) z6Cmt~oiQ(G$Rn6up zx(C{Hj6<|0*`LmP`Wx2ECz=ou2DRepL)LYmOY3bdIHqkKhL-H;#+ekO@OfJF3T$bj@lhGB$8 zhWi&jYeO=f&@JV}2Zz&f0nr%=#s{aluNcoI z9IeK+O&Pad!6g4f?92zX%xBHE$9Y3KZG_l|+i>D5o1fsMk2u~0T0l`vL59;-9KPZ`~}Fq}5uC#AF*OmAY`cFG`@(zm>mnyCyGjPOVc!$tyN@*m~&S4&7F z??f_F`txXv|8?&PSM)g9geP1or%idS`kYu?=Q!m0#V&gJT-DZ?qWbGk>X<^HTJO?x zn|KBy+8?bpJI&wiwdGK$<-!ff$&Xk^WaQmGZC`OXYB~z}&ya0P`P-*iEo)IiaN0Fy zbW9?(6eqc@YdE9zp}kvi>n_yBQVOoZp-jt9--i=$`Ycu8uc{ehpGvM`qQ-{V5K?y*; z3T!nohPd zCas60S6dHFb9u5KZ8Ff`XZwq%o7NxbZq8ND6li$OkGDx+X@&k#&g-H6V&i>cp-*6$ zgfc_koRpBmcmRTCnb8e2X9ZWiS^J2>kDUSAXG;Twp>Yy`*)wu$6_0xqV})hT5B$SR z8avdRoah=vtqfE+5y)nS5WaRT(C^ARVmd?$?KFsPL+A@TCF@RrT~D;tObP*hwX>6E z|4i9pFCY0tRNrFf(sdJze|S$+fNvQe`B)E>QKE1OlIu_H7f`f{5~an<8vjhw_hEmX zT*(J}3!VSQt95g^cW2Z$~29zY?V?wrBxO z5oNdQuK6a9Gn&igt6r{m+w0+cKbiRr)!a|Vy%;`su*t8ju_|E6=9+o37IHsSoVSCi zn+)qUxv`=h(ag&#|F2Pu{5$jR4sV`f^L%^#PJ<~Se5U7y?q=7}Ou9zht6&0oz?czd zw|-}nmEgK}YZl`c)Y*R)6D75^{I4aERSD}Qw{DhAbQz(9n`3|m$@lwbRK8(R-Mz`; zO3bv*%4jf)i!d` zG-kahovDz@mQib@Xbfs0WsLbx*Fr}^lh?yTH=iV$G(PjSjCiF}l~juq;g6g{-w98c>GO0J=6U6w9>DNY>Cyl70VH^Rtla{>HE=$g=;j zf$0Y7l1ueBz4D(!$CTa~WF7B|#AHYrbKBPP87*?yv2Id@p_1_?^D7DME2j&hWBfNf zj`7?id^!ISeO_XvaS{a9l5Nmec2EM+C-P6%g`WIxts_`t{MUYl(uDD6%W!z9cWGj+Wugg4E8mAICJF_Fdc z=6Y`j48!U9YnvbmqG?N@^3nBkolK;tkkHA-b|D4Pz-Jjc71954)AqXA45}akrW=w; z;rgU=-@f<14*(KZLnN^OSZj`uGu~KK`6w`co!)An>$02CxFsPKTIjTaOu~Czb$T*p z=6Y;rfQSZXu8Ph_p!m;hZhwORb1B@~T$K@@%7|TLJI|OS1(us%R3xZF7XNE6bh3eA zM-4?wXK=Q=}}e7x};Z z1}XZVA-8{5!86_&00gn~(nA`nUg29)2fg=N67AD$3~@O4m0ts{;)b z0m{$XD6G%gL0_3wrsZ|ZA;E*KhPzeFH3A=w{b?{aY5n6@kw8P;m)S0-?o9U=o1G|j z>pz-Yt*4R4qahKJV1E_k`z02KIrDC_BFzmIOH@Gk@=jo zmOn6PY=PeU_^2048?&w#$`So$Ow%c4KwOU(V9Z%{#5ull_V)WET`Ozulbj1uWBK0Y zEPYzYj6TxsT&utJ?cnl7QKvt7H%WFN_C0vv!oGCeze>TLla8F031}AH9|~VfM?9_l zi4_~g|IS@TS$x5i6;g}aAn#!a?J_@Xu|iL0*9N?l>=;G^BF3*u*=IN*zuV#$6fuI* zd@LYqB4ZrhV6)r?e^1z6EAt{B_DF^9r7+OnD>R_D2En-FsL@KUZfQf*0Nzi4^TWRP ze!8bPSc|?9*QzqY|i)a#x?Mmv7ycCQ5wwZPj(`Ex;PRz8de43c4`Dhfrpec zdna&!wmaY46gk%@Z-fY{Z_bOK1n)exSl)Vp<)_AFqtyUOhNZU`B3-#dWJ)mada@kNUX(G0d{2bWJnF$M$ zkz{I>&{amnN=*qaqk1?g+?IlFTdj{w|NII$!Tro%7f-F%c|`obw8cCpzFIYk5`>fm*J0CwHhATgY3!2Ifl#F&pMQw z7-{N-ALE@ejI%PjRioU}5-rz?t~x2ujW3qkMrpgKax;xM_UIVQ&!f7=TyV<+Hi=4T z5{iybKTXlSXEMCtpxDv69A2B!13tc$j6fcAZZuEHZ3$6S;9TUF3VkO^(={3`!-(u* zn%i)frLd=WFL9 zU+19AXZ?>SE&KA6va%KpEkT||cFqc4M#mVKehXVuNf{;QCcpK87$USZ;*|I;2Px)F zRREOsX1#bU-Nd)hvj(|}z@&D))nyDUcGGG!cOO4u*?7sN1gaTVtQ+uJ&DHj-Ho-_K zA_LmI`I6NG;bb;HSdX$ozv=-H~WZ+7Q4x%l)LNyUJtwHBF<-Jf;GL}PL9qFOWiMboBo zx6rvA0gj;Xt(cdXKl91R8&+c!TjoJayl0#4>52UX$!DFHoHC4PSzt+>IjpPkqYBOC zblAlvgPW0uhJykUyH+0JG)!_S?)0lGT7gr2sn7>Sx9z}`z$7G|({nE$CsFJ??t|87 zT}d4HsmGrYaz#4cs;OVa?-Fx}%C9{#=7;WNIyUd$U;EC(bD(?WZz<#0H^V}aBu`Mb zwNj(ILmQc*4P`uFrF639UqNn@e+qAJvkC!K>bwm?zGD3n)VHLjlg6aV(v(wVc}FcK z^Y~Ig0KB^D(uHb)k8=P3udvnN-g0@jNuO19U17C*>d;iAH{_7cW+X@nSm-b&^;@Ln zbW2i}K5^&a07y0Jnm1+&cp6N931V73v)FnI0(nzTz?Twy%u5_lZJn|i&ANz5+{LhE zNnlqe2F*6LPJW=^cfqr~qqeP~qV193L}pi*U)Y_PIHGNd(P_kbI^R_yW-7jDja#vxI1nu+_PCxK zZa}3}jS=0LcH?s$1&2#pa4|5t?D&Cd8NQT9mfmCdu2*CvR;CF!|t`cmt`LwY31c%U) z$S?tozn{}1!9OKJ3A{wnO}!PGtSiUxPmKA5<+)>H1524B&<8H(w4<(}M>WPLvB=OS ziuek8B%qiWqW;>V0Cphb?w+c6CQK<;oLbiXx)h-RPAO3-RQ9th@s6)83%*Cpg89k;e+DSNrwA(J3{TIo8;~BB@W{-YcZdD#coBnQXN{g zRWR)*R&73+EyGLgsvjR}SH0sWM@gIoLF<{?-o~%04Z9)XG^xPY& zbrP>YIvIlo1Cu*mr=XZAE+WLEoC*+91rH&aSqIDLj`u$y1RcK+qm$ez(es<}KA zyD5(y;+q}WCyRi#_2gyT48h;h&&+V9cWT`+d6pz{*0~0?m4BrCLmx_Q?2EvlwXSZe z^21m_d$l9Ok@k^Wtz>HiM1|EAyXZyaGyScIBO6v-tXQX$D6 z0jr4zH}AfbJXDvbTPyMdMP?HUWd~|P>b**gyuSs65B&5r{fB(pTy+^z!M0Q>TWsvix3?Q0o|aghFRn@@%hzy^%(3 z2J-Pz{=V%-)UuUS&gV-h(KQM6kDG`({VCPBb-hGtS4$kLkmjV&>!b(l=qb)>coO5e zQY{OHmu0CS%i^QkSM3D>sZEHh%i#k6oeSHst#<;-hk&`%GtGoZJ?i)=%F;?wCmdO| z*R3TJKF*QPtSoL>4AtXUIIj=5!53lEh;TsRA=Fej;si>Ee&r9pH@qJ7=o0sJg@jkdlMRye{0erqb!IvFo_RhrXJ9%zJIkoYEo1-FK}w$%^D(%{(>&TK zk(wc7-wk{ew6dZ?8eyL-+8_v=X`S8IoT_hM*p-d)K}UA6#+LQKLmxA}2GjjtXMnVj z{n<6%CWxN&5|4{ERmXKyB5v!AU6h_Se6j(nlBj@XK8xo#j2=)HZ9rB$Shwn_6kyk5FfvxH5E6ep#H{Wbi+VhuYH`O=05yCuK;Fln z%L=8OzAjo(aBb`!j;K+7+ai_vjCG&3sI=dn_2utXoqt8S&1`IYHL>72Rv{*oatR{)PsGY#HYbM-^q>5H=Of z(pSi8Rki143-bHYUYgcbhd~yKHWI=z6LP!4@OehW`U`I3m}4guVTQKCH;6@wk4L`8 zT}BG=v}@a!9Z&-%MZI!*uFq(7?jBz!pf^-`lOyqRd*!~*uz@_Sue)BXz;zm`e&uhA zJSL%-nbY1|u3Voo(w??c%+lH(e?E!uv0&!WVDU0Nk6c(uyCriz!l^;M6in)`X3AkA zP@5`V9+x)n=k;73OeE%Qc_VGhEte;FiEPx9?6Rp#tH7<7yQ&K}2+V5lese;kavtDm zykX(ADb*`C(oPVoD}M$$Cv0qlMdC*f4f8IAxasmsSm%#YQi8{s$~w_7k{6ZGeVLM4y~GomYMf>|u4^1zS>9UVTR5>Rg58jb}WAxa{xB_0XPVE>Uv#H4FgXafK1Iec-&WAwW2^78KRz zUXg3Vqs8^=L!qRiXiIsGx(ACi12Enwb3C@FslIU`!Di`vTp&PX1>NC#g%7LPin8L| zXux|fE0g37|E@_z^!LZM|9j^t@j0XLhBEr;x8?New$MmXcaEMP4=N(yzPGQcCU2(k_xn;05M((5&`q53_Ax3tLQHR>OFT|)I{-TiAFf|f>4 zuTcv@OPLQ3XBP>r>PTX)<=AVkFZJl`s#d3$alE!vQ^na#mja{lnIi6W@mWz1e!j8? zAH|jkPU75fPauh*Ox1@OX2XFh^@Gy{NLo)?MRX6<%-G!3N8H}1ZHKOIDu?XL89=$q z2N3bWE1`Acp*E!C56pp~+t=%0fi`p}{r$G;D9iD=nbE^C#9ARhICQXBhXU@fz2%+@fH8 zei=PmxO{toHw2~2jq#QuZy;=_4a7pCOq}+GT8!e5xZ7o1MD3(J>xRM}!@bUutVLJz zrkx6LrzXxy7r<_qZ*6_Im}p4VHI}SNW1lb3!4O->Q#VRy?Sv{Is~7a(tj>#` z9fwsg(u0-mHY)wR)U}DFqTmY~V-wIGuY<=W8=n(hvhiidxkj@K9YY+s3-$-4R7g;P z7Wd{|K2=l>O$>7POaI6`I_5CnjA!WqGGc7&ZVcm3>1nCIxvO4ArHfu0mH(l`l{N0C z^$jDQ>R)&rW)NG90P7>^!Y6D=Fuh9i*Wsxioissu9`3HNe&MzrgGoEQKb#*9V(0?ugk>5)qQ9rP5Mt8}LBx)RZw zaS9!OCTq;vn=BV0*jDVv@j$PiBhIzHNjSbFxDHu9F=ad`Q%<6u{ycU}<`g>0$gj-e zT(r@;ixF0mO#j%j1CwU+^u>)Viy6~Q1B7g1c0_un7PngswZ*I*DfBp61V&u2(SmZU zI!9j=kEgnAabxO1nxc+u!@gnPiU-A^5o!SJLV-~YYhuhuBc`hMm`O>k zrIGU>GqrhP%Oszmm-|1I>Pui=t!7R|PitP6Bgnq%E>lbpclo2N47-Ac6erxL@o z`5WPvjm_^&)dZmzJkArn;ca>lknKPU?|LX^f^9#b);Or%qd)iEHSfd{)2#h!W*s(Z z^#`0=1L{s@N1Jm}#%B3Ln9|5YVLcI6RQEjB`cCWx>s(;G(z*eXAhw(QQQxg@$FaeR zq6o!AD7)$GbcM(^a5eZR)8UY_;q;S^_J)8cb~iT2Rf*&P1ZNSWe67aK%g<0iWwiCw zyEV|nKPipVd|epd4Cc9|&Y1#N0=rSn%fwjt)Z#6cH(a}MpFX{%$4NcH@eQQk#j%u^ z-%ZX8n4%*HcL{c38WG;>>ic394J!M4fh+@LZ+5OpR=G#Ky+t@-3*8zbsH8WrA_knr zZxJ(3l{YRTE?(@~w*6;~RL%Q)zBjn|^L1(J3Az1>2~Os(t$=fFqaF{^4ml@#?lt!) z`rI*%q*_B&}5bV-gjxWcPF@ly^`!NF3 zBwDhs<#@syIm-8w^?sTa_jA1On3P?94Rv)>S^y65Q?u<&>pG3yDm#5mqO@*7{nR_{ z^}4wM?g<;z^VA$o6^(d)YHDd}tTAJF{8{L(2*_GX(HhJQxb<1x?pbBjbm^w=ac-4U zp{|r(-LeK1zj|Q+mg?C8b$Gmqg&!j70Vjf{LBbAEQh9xxO1~D`MxDDi z$L$yIm}YwYCc?bl)*<3@BJm7LgSB~fb?MhI%w33glXj()L)5CAyLh!=bx_Do$S{a{ z>eM!PNjEableB)UaLb$uvB6Sq$XS>@zm%_TmAk7AcISA=0+(~0bs zjKRqBL!w{s)%-r9WuGdrS{!KTD>kA5tz`?722M9xr_XG9WL4m967G9hm+Iu*m>LYy zjDg#(m?ERE@-o-XwiD|JQKh!xEAGlEoaM2dZ z*fm68f6i+;jH1Ovh4CptKi9+V^6HPZ2p%}0z?-pvRjq1#$t($s)Be2%VP|7#b6~(H zp~o>_8}eMYxoJw+7Fc;`2URZvozmo%t`LSO)v{3U+yxnWay7p7fymD~2QiQuPKbco z7h42lw|uWCw5~pf=F<(%D5U0|nA#nlkTOv2H=SgLNhw6t#@?>O3{#Jhb>^GG5O8c& zorksL67!nDJtMPe>`~6~0lnR6ZJ{A~`m*#(X#6re*9cD!t4qkeS3;ur0rD3(vkvE> zh`sFayNrM)?Mt+L#YI?e>2TxcAB|N!tb+*mw3lHv__Kr?ohJl8gKwkIttvwig=cza zQOq}-s6KlvnZlP`wK|nn476l*T|R`&t~OltN93f9W)S)L?RAcZ@3su7kByeXd2W~1 zb7yv|6HS{p5A zg5H{h+^d;qU*2bNsM+KMx7Kaq!+nJ$gm(oc`S4 z0Q%@Tufv4_LTtnKj@EbUhNkh4clUl$I^IW~8g@;^Et1^^=W6!!iw%$#W|(~Ur}u6S zb6LN5l?^{42l*qE^9|m#R*82}12Py-8sG8`TJEJ2W`9thUj86`X|pr5sc+rv@U}z0 zZ5JBu*j63%>$Hyjz%$-8ABP`8fx904ta}=B?N6gofWhU9s$s`}*qNMTV3vw&E{0^_ z2D>1P-yl}j0gnn2!22~9ZBp?w;0$lvgqF@-%I3-Kj>Lq@q&*Xr)POGA0S2qzPfQFE zB24EFo_~Gc_rCb!)GYVYht^N+*R+2-^XN}Be%pO*Az1vO;pZ4$^B>Qe!yCTHT!dfb zzU})EhN+4j4#|0KcD-`Xl=?^El+}-vI|$c6@Fz|>u4x6nI(mHke(Qiy*roF0d+&Ts zu|H%nb_+t7znOJ=TnRkXdJ%EXQG_IoLliUfwRn5=ThZUaTk*x zz77WBgZ|vRzYqA^wP!T-ZE}}cc41P~iSI5VWq)5*RaAevO?pQv?*5}M)1}Kt#_Xk8 z%0C62GYyHmi2VHIHX`Ms(}{1>AuN^tHAKMRi<;}Dn9ss*gV6Vv{xZq$UX+Sk=Q!Y; z&+opKq5Jp8$DSR!@@;(D7Jn%i{}W60XwA>xq|j|k)&FZue#&|N>0@>6QgX_@Ni)$! z@80qYYK=)jKc*&qaM>QpA80He@vN_DaT?Ko`;7Il`~3Oy%_I6d6;#E6`DcAJXx^ZF zUkw}$l#2H^V)7dk#!VIcPtHXGfV+2qIO-)vpJkV`D{ygy6YUgeANbjWsL7SH&`srs zvy79%#%33nwFc$+_4ui9=_HK0FES3{uk^v6)0$!Fj+34@?yHQ*{w2aDX}%9z$W5Hm zLvsYY*6bAIN)~%kesuRb@4H!fsFI}r?!Wx2Yrekw?tw4Y()3!^^pe9G?`t!6*BNvg z&-;X2@PkC}%!D>ay~?=Odc^pB#VY=l9$g2-iTRK!P&>w8C`Mg)#F+bWO@vF$4&sK9 z8N9w37PFmfu{_+^q=Q-XMJ`k6pMP&5deU{Ci}WvXTO$H4vnmZ}L&hdJnTqH8$iHVs zf9?2Yl;=YHKC0T4hevDH_8`_egj4FL5FZ}nM+*(z#TUNkJ#XMS)@OOz)3lcK0AW{B9#*m8* zA%<}9Slp{QHqECjDg01=s=_{-ldxB2b+OE3&hK`lt8=01R9zuOUM{(?K z8-o5R!BI_1)&;0CW$YKwOOY)X=af<(Sfsbavg<63FV=bmgI+aGZ=g&J+)k zka0#x?3*Gi%(^|?9$vNtOVV?w$OaC@*0_pyHOf0}-MrUd$JSS%I(3;cTVC__(Ta>^ z)3rPGW}SIq-K3um+xWD8WY*yh4ua>$$mv<$|g!*ZLa;w#4NP$R^zI38Q~nb za9o9zx*{B;ka#5nje7w|+XCn?)Zd{CKG|_R!I_@2np88H%egHNs;=nJJ0Zw@Hx}_K z?;M0-N9yJT1C6f&!lieXBm_njUx~9dk<{3J2b2C`u5t!e3|KTQ3L5Z>sJvY6a|g%) z8R{$uwdh7~nwwe{A$^UvbYu^8kNiWBEgawb&>{%{kCS zhhr8ZEk`NEHcxWfzoykdqyJe3I_)y1{I=VIv?B3u)5#=2$@uyb^QCVo-3xGc0#9`4 zj_%tq^C&%PrNV^Q9^T(LH zgw>}Nc=4K%mvR%bzS1cHBd}%_-u84JNq>g(Ry3Kihh6*J^9bmj%e&O^C%*9~Eau7CCr`G-*{L;?hl0O8k(VYDNSRh;^HBcrEj4 z;K5dCT?wtThI_z((TTVz^OMJgL6H*aUBsk9X@Rmy!kILjgG}w#$f&;TJn4J5vK>Z+ zO%^fftv?I)sprLvs=g+bk8whqWXj-~oZI+2J+PNuwi;56QW=3)GE2^7VJ2p|A2fFtQ?j6V(`_KB%}m*ceq8-gi!%y}lH<1-(TcU*y}xF4Yd2>}tGD zJ)m5_5_FT+GCdTe+}-pH|6JsngH{_S1(O4UT!^JKwf?@I+aMlaJyy=XL?2&bsTV7(4|f&}3~cJgr-@x}<5eWOT+UDX$!6SlC%Ccc z<}v3d0E==y(|04A7$vK|p`UcjCG$4b{IBhK-<91tMn?s=>}E_Rwa_tfG8mrJf;7{8 zV5ymA>O756!$@ZD!p$O?U^w8-b{{yU?d{m9qrC}CcdQ3B^T#;dD>#^9XL^@zG}Rq1 zcahIwj#UZ}!I{}JhE!;UoJ;8m|7w?baJ+k+#TlB{pSU${93*0ibDYx4wR7?(bc{Ri z^boO{X5Pga9^u5+4s=YSM4s6SMiEEL1Ik~h)ziG^+PG7li7DP9nbptox3w>>{%YL^ zm&nwUWE0+v7LJ)q#?&Z(wurWW)#Wy;=W~Q#!xlF3jhvrJL&c>FQ_-n7?}sAQvdnzD zD&zfgn~%57hZ}b~U`-;*X4u`7 zlsf(Zbg|b0oYAQ)=q5cnf&i&)P*vYJG9AL+u)1mYj&|zs|D4shLCWJd`%-YO?|K7C z0m{*eI_Gt`wgf*xQyX{U4W#TYg%_YuB(sSfPi@b%L&JH05(y;64#N0Lmpw_Ub3!R% zg&g<2ShLGRUYAy;Wl6g7sh+FlVcjVtG{W}GyLBEDFbJ*c(ZOZn$W3gIddlJHLZ3Yz zt6KM5&ih(RL~62O-4prq$GPts3rCz%VR!Dr2Yy|>8rBu-8{pA*o={xr{ZSXT9j8s$ z6f@RVezw|k!^q0P79eNW3=G)Qw@)%Ps4{9uu?fM5)*?1KXUk*x_tAiK#&l!>OB;HG8x?<)uHn3OIEYv+Whf5R zNBavS$-9O(-6v}R)h3QaD=mQPfH$(DOq}}~F<~^Uf!U>MJ~l3|9y02QMa!-4sVtBK zXO%mb%Xv3#v5Y2)tbhw9=PfAL$Lsgnb zPR$YP*-}Ee8vs***7{Z-RK11d2BnO@+#9X7AM8?E98hzR zrEnIrmT-;idcPIyy;}WSKp}t69r(!yV2|b2;Ffb#Cu$RCzW&%o24{$^mQ_g z^`eI~0>T^2M(*v}{Jynux6Feu2ZkJ24{p{!1fLZgfL4se4aF}Cm=GaOeO02p*i^en z?5pqYEE(=o2Nv!Em>T_|sF9VSJ`k0oCvn){Pr4s&0zKo!{_OPA%Fd;a4pHK_j;|0G zhX8}^QXZ6JS4WQV{!}$7>Xz7{cA3SFrj-V)+a>H_8~qCAhssX{C;w%UKGIGKE;=Uy zuPzunWXOSkiLVWmCbY$?e-WHHRhOXal}UM|OxUfm*wWXc5-3yQ=^mHEw#45`6+P$Q zLy9+lJ$JsU;z+E0XW@W};|01|c;|XdYZ4|G9W7_G(qX8q6=FvQ)$U|j)3pRuy!unI zg|a5xKrp)8SsqDt`^9rRMSAW*C}T5KDqG_~hw*OcQh%wTxpJj6J90LF$ey3b<&Hku z67kmN1dmUnXB@~)Q6N{BrUXA3Z@P(d|KM34bQ4k!JB5tRPSB4&(S(s$C~C#h98bB@ z-fmh;6y~!gxhTjQngVgg5=OiS9v@7&hYP5x{8*h4VCY^U)ar2huFFR03b0 zxtM!)h!UIty%IMPeMe92Ale+|(?N_jf8WZ zvjJkxt&Y#49WKk&-P})`?ucV5zLST!@m(2C7OI#^a`soB>r`*^%VO^YugbnAG+Vq2 zy1brDHM|4N+ZnyC*wMl*!^o*6^wvvsO*gL?4+^6)Ptwb1l-p3>P6EwtzHABDULgSd zx_Z#J!a|3$VDxhpe=fdWUIL@sjGPFDWM`&UFnmdIQEQN8_tne# zIQ(Poa1!+#ZThY`Ret3Bd}9@e_TN?-rdUnlakkHd-QCo9PvJb^=@YpgGu0-{dU7*uFDtRD%BNZ7t+$ zuOIbb^qSk<3%61G1bT)S2{cz!+XHHBSSb`*8cs^lO*X0iM8&Q8!WKYn)IrCH<1)Y0 zKF)qJ`C@%3pw)Z%fV`*2UN)k4r~2IiI|u;V8jc-_As5-;cOzvv_n*5B?LbE6FWIi{ z*U~`)K8GyoAWyohjdn{80KdUM{^#Oh++a3(bfff-cB$eVnRk%prKdADgKobQ|5-0@ zyg-6o1@fc@LvO!bR4WGXm*Tnb>w6ynwkgb}PRVsg5B-`RThh9P?sv?3Q-RYgSi5{_ zrBG$^qBq5~a5?w2<=xjZs{J!zUE;(`N%SD0FF8hULvl=QIZM1!w)kb5xq+F#?}n<1 zN`u~A%1j(m2i6=plEXn(H+(ZpU0q*C(eCnxY*#cBh3Pjty3XT1(jz3gyA472Pd z{AlN;Y@6?A!`l1J9TE?ZQ)$63r!^KG^g{x%9;oU~JEWCkE3!G+h$64oO{@*T4SNPz zQ4p%-&{X?D;4NoId^*iG8?eN?Oeib{<6kq>ZGc<(Ed6W!YHk+~>FtjwNC(#KSY)Ln z*sP+?MLmWu>5uWb12<@W$2q^n*thmaIoKi3n4NQN2{Sy_KYupF7d}2&$LtYZN-dR7 zOSoyJq)r;d7Jm+t#rv`!-@-2;k+l$w8nS8f4#LYIJzn5uyFevkZmHb`h2N58E3hntotg_87&_9ST8s9*f>Ks%?k}Nfo zL61DIm1EVU4I{s^xHePC9l_!4`)BE65sXf&YQ=+@;tl}K1_Lz z4?Duz4)+W&H}?7uM$f9Hw*sAW*WL%jxa3ggW7+9OM#_^9&T=}>cx?Zqj820 z#|<^vQ9&umrH!##hvWvV#=>%`cWw;JM4Z9^l{M0w|LB7*t0`gV&WxnwPiAZo!HPYV zlthywx(0u}4io%yS@T24W&U@EsnTK0p7#xJrC2u1cYBwWGgY_!U+leiRMXk^@I5o$ z(HR?dI*b*SE+uqE8DT7liu9&LY6u7cLJM)m5mX2fL3$abNsXa}5J((_&=QauNxQAndovdYEZmC4`Mcx`o1{*WLJ_0`l3n($ZB8ns(SVZohKYjBnOI&0k2VaUhp; zoIg_lV&`$(Ly(fH`lkGgmD2jOqe!c*nXH}OL1NvZXPB;ji#G0}w$qGKoBYdcT;?xN`)60c;yWSib)a26|(R1izE zv8JbLyIai6w|pED4zAC9^2M)zQX39+4#s~Igu+@N-5?m!^4FDa;g_sVL^-@u0Z;+T zu26n+1R2KtDwB|p-%K**CaBPCkZ_Dck2$Ol7BN*e(stmVw2o=5>>B1_TFqcbFJZz3 zk57Qa;-Th<Tt8q{x zeom~w1@u??yL%W#_2xFtDJ$>f@+&Vft?xk(HH+s}z4H^k#QFaIDztGz%$Uu>@jIXk z^cB5>1fH(atI%%>#0hf92uHTD2aw&kXl3jy zUbL|bx)i6(JPKW!vF20gJn!X3VdtDw_^Yq*GkLH8H__JRS~A@{Cbq3IS76*fpeU(K z7&#=GP!7rlsy+W=1pb~UCi68?)G1`t7G92UeU49Ui~HVXV5f&LW^v_P=&Xx0^&tQZ ze3ww39VmDKuCnCv!=RH7xojI7+R2viv1W0Ap5?(!dd?Vw;;@YtoNYF=ty~cEL@B>s zAe=yy7iZ!W1^5c>L;uDC{}s=Hy7NZTqUTC?L3@(*ptHs(Y>KqchTP0yE}vn?A1ruN zyg+7ZHWU@unRilmF*v+v@ zD0*idN$r!Ccc3;~=~ExF!Xr`hbb*^b!6<5!!RhJ|_34ISj?&Zhh)4b@n5FSsAP(b! zpA;{+fCA@cBl#SUjfNQMJ1BuLIeKFoi2bfcS;otm(-^Ph2d;tGsq@f^uE0>RQUmJkE69=qM140sMdThiHMTx|(c;)DFu_}wkY59R>p$b1cy+PMY9e%m1*IkJ<15}#&j%Xx`oSL=mR zgAq0GMMz>#H456_&%w5|$s83~fIrtj(+$yn@MC=kWmVdlJPYcQIrVUYNd- ze+2bQU93&kb%DzVo|k`?az;`+JYsC&sQ@QEbyNKJc)n`+Xdt=$JjmbxDO66FlVt8> zx|oM`tDD|w6_u?;H;N>^N#4Ppw#JzZvU-~2h|Yjc_LY9|D06dNNN;e++br^9B=si1 zH+S$yg3R>V9DiCoD6a|)(()AV{zZT*`7cj@WPT`&&q+E&>e=yr`fD`WD!-UQjK{nY zbtH%J2X*p?XSO_Ia3m{Mhdg#EXa2q3UQdKp`ehT`l?hOqXn7h~Txy&UyVQcD#RICc zV47vCk48uyK|iGt4jBQSth1~Vjm9s7lql7SC`p|5nvY+p5<$DO430YkimhoWnO(Hy zQCj*ZyKwquv0XX=+>^vd+j;6W*O-@kiu{hw%M$4~yN?|2zuI#FmF#YXQ_fULD9&B* z;CW5^0gDojmz#6(bB{%H>+*p`jzjVOOiJ}b^;`AWa(s2nw15J+m`!SAf0|`qeFgj| z>s)|anE>s30?kb z=H}Oe($)@SW;(WxhRay%kGLw!`-!*iJbI&TFX^J4e&ZbQ({>L$BcN0TA+&Z(U5K&KGg z08|{F=WNfl6FxWJT*`UODoY~2{6bV?e|#|Wq2mYe^^s&6_s?&kbe$k9(;e&1$}(Q6 zNnm@#g2?Ko5t3cq`3%%NxFiXMv!G)a^6(qUl5NzQPt|dtmHXxPn1%P4#f~c)RkOu2 zOB7m9H!T#f!C?gAS$WaoT~IodLhI}0vgvtb^59KzY*0Vgy?GulzIl)d^?<0jM^Kt4 z#)RlA1ctcc(b8LJRf7lY$QV0kcbq^-7k6=}j8+IcGhaNc8=)>Rjs<8|#n;>CCrBa- z`kA%JgIdF9f`{m%os|59js7KU+uxIK_{7IE8KlIRy*db`_2glv@yqWb zp`6~jn_D#%O_}(Zh3CStegJh0QyKoyEV3upV5tmO638!UqlY+DM`37VtZX()SrK3f z6uWbgLGWp@xHN(N?j8#*k|?Z|oiK>-4#Z!oqArci-pn8%%%b>N(E_Z`if$NfG#?#l-#ae&3x*YS>bSI z{dT|>Zu;D)YIKk! z|7BAUx~Bf8Ez(qOdULgHJd#^2d}BVYKX&E3Fb;s+mvT|g`#NIpF~l)kl|w~-M(DTe zq!+v2T+Z&;r~`86rOM?r2QFDRs$&|jpIO;(w5HLt;Vy49k9Gui>^#6gwPksH-CN=s z?{1+b+wVRlc@u``tv@pG83vqi3QUnXv%Y%K#!1eFhZ(P_+zzoxW}c1ePJ?KKysi0C zL0UhagAw}}nxmSFD$Bdcw{-5v_=?j) z#;!Ya9))%n5%j7nn*N7AlwP3tF!Tzy_TGU7{qU50!X{sK@K%POPDVrx$>;HH1-J@& zBp)y_x|Uk%M=Z5=c=O$0vG;_An|WLP<`darpJUxO7xW@Yq?NKoHG%+Cbq^W#XE!iE zC>oI>?la8hI$$+O&?doH4JIM-Vd`pAMv$Mn?IXifW`dc|BCnh87)<+oJgO%cB-2#syDbFkW8g-MUe`b9BM+R=zq* z&u%S8O;hzvGqij3F#-u&SVU*8BF-PI>4xj0wzD#bFZN${B4|GO;W8KJKbA+t=f6zv zYuL!~>Yg6&>{sj z{k$?aXoPR9{`iC1#?`fIU5y%>y|^A^vdVcxsY-+Ey;~E=?cK_xn76Hyc0aEPcgI*vy)hC3Hr_|FNNXQ^K5y zT%dpJafZfcchf7AzKt|atcan?;CzLsJK^H0{M&P69 zWwE%CVl&R%Z5~2Y6Dn`gWuXi2VC)WSSWE+5bam5p{ots5q;*|3H+nAl4O?CX)zWs$ zy3(ZJ)PEiu6lJ)S?6@|i$Oy}n{amQM7r4jXaQwW5eFgzi9GL{({+vlC6dB5$4~a^y5XqULt=m(S;W|1Rq2Ls)3QZ9>AtWMGViu6$6_$*v5R4 zG!o?7eOp`>vECV4@oclWqLZBBDY~7P?bug0fKCuUF^PI;`nbYkE~3PMS%0N*H7eFS zS~uZ~K7Bli_Wq&;Z;nitttvCoQF@AUUmTDBcpdL;S)b>-re;%U@? zay+FSD+62)p`B3Qu{FHXNn+goysP($U&U#My4xFZ0#%~id=JJZM1A!_WnZv`5oUry4R`8n>g?+Ui6=l1ZvS5LjP&5Yy60B~;b^MR;YAgt|at)N`lYJ_|4&3{ga{Qx+)##Zh{ znyfV9b#boO4ae$B{2^ZUd(N^dyplOH1p{tBnr5Sglwt3 z=22n4dkS4;K4R8$pKXJJoQ-=(i*8Em1}h=ckysb=f0AG=+2hu7ai=wr^y)H+zGg6| zvNGl)mII&miVKEW`T5*A4XIJGO6N<8D0Y`2C$JHaGm14HBWnzW?QwHIRvh*y6}T}$ z(TpIsJPGxhdYoXIv*KcuR}W5=W%-*~E6N_tvWxzM*!jf8dE|w1*xFQAxeKqL^yP$o zS{m(&H3%M3J7b@o?uxrDIaT^a))_TMr>=hY^SQjVL|1TSqZg14uGEl__zTwv^_Nr! zlNX<_cH$?Qbvu|{w1v&rjSJguX;R7OXgv3kug{tB4Yv*}TITy03!QO<7G`g51iO*N z-3aVPdyWZQ%W;wLLHr@iC|MxO={U3)c_)tY8aIxEyh`f+h4R6Gx$E{uvj6+`F@o}Y zPas|qZy?r*9XhXd16Y(9Jnd3uZ^otCr9K|Z7@ofpygKM7Y>?#f+RGJVC!Bh4evr*K z?BQXoZrq*n>IpwYerBHMZg;m03-qI9e}&Bm90Qd;i(>1fmdad0m%zOIxoOjvnAe%x z$ra6iNN$}n1V8W4pmg!udmdlagj6o?RgMY^oK{No4eD9 zfcbQ<5T2*$jzoYpdWv#~aXVIG!he@>Opnf5yXdhr~%>{tvm+>G= z+D211TZZVK$)xl+jr1BW%tqHWdu<1ONcZh0zJKy%g20$kM)qJ`8F*gbzxCPozNp92 z-<*gzT>dQ=YMxmwFb>rw_qe6T?}+aTbjk%8M_&tc@AguTH|K;ORwB^_w^TIZfZ}eI z41)3Nzk2}VLZM89Klr3C+HPUd%(U;lpld?;HPFG&GpPKM$HTkE`0O5f+hmnaUrs4 z;TvEE)E0C7i52TyvAKQYS2{WI>l1&T56RqO8XvLOx2_7v)EO$>mNW7EW`=`~`-4jJ zxZQR()81*O83W&g`^C%JU7#SXm-TMubI!+S!-{d@ zkD)|vhbYMO_nb0S8ZC^xvYsG?6HiB-oDVM#6X_rHG@ll_G7K`yeH~79fd?s;=_Ljw zx=g?EEQrpjp4D?o*(9GnkD4ofiISZCUFCQOFL&DoSXz&EbdsH+|4^8*@YVjw*+Uu~ zMd?p_)}OT*z^}JN)J)q{SUZg8woRPXFFq;N9$9gNbBm-8&RtfhSUSRUuIo?Geh_>9 z@l@3!y}!k_x? z_xbWi&kO?*DQ+fx(izU4FqpPV^LNju9vJ#Yqcn4lakVtu>qPN}T_(RRWo_ZLmL1Dt zd%6(sC^c$@5l)45-@fX(`x(bmVQ;cD5PTl{$Oi;05V=fu{m3AcdDK;IX8B2lbNz>| zxV^i$p0>zEe`^79=^Zosfii}X8idio3jQ`PT;sJn28kgon`p1vc;pOD1v+bMT*Gwak4B@bIvpt2?q^xa03KF83L7-PDk_e4 zzFGm8iX2W&4@s@%gAR8e2cZhF-_1l-%`i1bHtoYSP5__25biO27mPvL;Z0Bbi~tcQ zgSw-!L~H7LOnXS$b>>mG=Mid7+YV;4;h-?RpG;c9M#Odnf! zj193Jc!BF~9@v?^G`fx^gqt)wgf?xBf-@xa@lD|QnR*q9tP@rl_0Wl2a*lD7c;xji z$Q7c)gJzvnLgQxW2EspR%}QX@uI;4+B)H{7DG%^cOr}|nujT-=aE(a3fb`P*b?glw zuM(4IrN)u1F-U)4M&SvbwMik*Z_GH7A?j`_2VF?_yMwR<-SFl-a`f}QVCzwb#B#Yy zIosw8`}64md51OU%znNmvMWUYW>~_i9Fic2#IiPf=1WUdu+C=H{;=4N42wjk$mL;Y z=48%|je~OvVS(A`vATW;S}7rnx7dZA5q$7+W@!E$*nHMpgunUNz3JV9gzdZL&Oh0B z9)~}9q(gK2!M&nHg*G+$2ga!YaD{=FJp61?XtKszX+kFDo3X_<(k}t#UFUze);4RK z%1XHYy&qofocWMzJ$l=lR*lFX=8mG2g*8)3?qlZ^&jU7fSEqwaZS*Yj2P#zW50OdmT6U3AcbXSgWa)#flC z{eyCHAskYb+~jtD)}!qZ|Jt!~QlQHo zRb#rpaSNgl{sRA}rYX5XX(z+1->6n6DoNK#>@kSUadf^-oR zT_mJ9O4sE@#(p^7GCp!j9`DmEQL;_Ly-(a-W$S^0&Q3+fY>_^}f z7}yKG{9mu1*))L~4Xqh~=}D!l5u@on4x?bRD~)j>raIfBjoy@%cn17Tv2D?RW09#qhj)Y?*Z{oypD*k>l1zXVWY zdi4B>^-}}U7|ZDsJrP8`KjWDB7P_6CXvSy~Q&G`jleB)G$KjZ46ik(W&`7`u@97})G0d1SPh94e!0gorm zO)a6$vMz2|`AIS`&hVjv z1ZmqCiLt}_y7Z7AnTFpYxwWPc?N=-!IQ`HabYpR|M@pC|SD zprw+7GErwYnzDi=Y74vUsn*-}cJz|B)0oq;40kUas)10i*OL&)Ge$igjaHSSdE|(& zt`(U)tv|FxuyI7XqzmbBbrcQ8xQ1$CsV5ndUgd+Yf8H~RJwjRJg0$7r1zT*h)L-;HvW=u)OgE!=&Fau_074aWwowdNX9vbbnWRJ^31} zB3Ae3!^#&rkKfnhWkjy<#>8BcS@d)iGupPI$f||IVzTIGUJ|BiyJeMA? zf1zT;@G)5r(dvj?ckGYnm>ZWwy`5rZh=8W8Y2%KS3hTfN@G@9hLIokTLaAj`B{gYV z7S(=Amo>$5_@h(dMdYqU^4+??Q*MzQN4+^Ysidb1ZTlj}r_l9uBdOyRt4B1F3nmOB zv&?u)0eF0nw)qHwR6_i3ij39>Z%Np_9MN#+ca4=W>3x&;@r0W^=l0)QMrYA# zw{tVnS8theieo@w$FX0fdAyv@#;oOX$S19o!qOefrB`Wo@M$S6l0z)Sg0>yKbh|TIb@{5dYN){< zaZHevBqV!a<6|oPUYzMcH)}|S}k!c4F9)31sXm&o*uN>Cvkl>nl^A!AIy0vvNzs!QeIpycs=>Ugzsc0B z&M55a?wCS)VfpcPffmi7vHq|du@ai&g=5W9l<(J8civ`713Olf*C4hVoUYq45au8{pIq#k^mInG z1;~54N2B`1j&rg{m$f4HR^S~+R#ljfJ>GVqH4hAm?0`btxv}NiiYK#;WTfe41iH$v zoYkJwZpe&&!#_SmY`2YE+_iNmJk2C(G9#*I2vj&$F3MfRJWkQI38|b?Z1UeVus+R< zCP79|w5WxY3_aK4JWlBw-x=J3ox!HCPVrkGxm@7htN<;HjRM`M=%8G4Q+v1K5c>@F zkIl)9<%Ylzv7ZOx5ll|-u3dDsbPveBc=cBW03B+C3Ndd94#m#ayv+0435FBh=V)+- zkzZVox@Z09mQ09SjaA!v=2Q$SAo%vuQlmH zj|Lt8DQ|0!CQ2izAy5o>f(tPeJ%jW*ORMt3a*Q;z2{Eu~r5A;(LGTJ1*Y<^UH)2`v zA)n?Y<*%XykKLoDUkZsGs@@~vVWMdm``yHwhf3j^nPF^*O)i9?SJ5%TaP?7AM6Z9|1L;2wo$@qztM;d1z08fChtmfc-*@vA zRRDsxkt^~B-!1eBXH9QH$NAl!86T$V-H&nY@B=&T{4&_J0+z7r@<@%;wiTC=vW--{dJa9@z%Exn+E3+_EF4idIDzN=}F=KT3X^#i8N zSBdcu7(fO*Jp{F>-u?Uc(AOHX#Nl0BK#t3X&j;_<-LoI{15+SzA>Zq8X^^L+(>8y@ zxts5XipSv|hitAYGSRyFgR$_x+A#)2>3eL$7(m|=cd!x;>L}bk#8KFCckvY#AH6e+ zFyb)dx$*0f7{r}Az@gz;>NPIL)Mw4#>%FV(uG7bDS+RVbJ!a2S#Pn{M?kACoFK1_w z-5SoCZVezLFA%D+I0ztvV7Jpg`;Nn%u*<1VP;pvnCUuGR92a?tt3RMgMps2wSMBdy zShcQLQmxDuHyUIK3I(YUq{tauFhFrvfm){%e-dhb;oti^LqgH3*cZ5P+SXn+t+eCh zPN!$jaJRf7f#Ok1u%y6Hx%SI#oUiQBx{ITcYufYLpecQXOE*^kwz|bIrgxDS)18-$ zJpepq+vp!%ksG8?kWILCGe1!~&h^An9kx=rK=hwZMF}0Abf#eN48)jgCwA-N-^xOD z-cdZs+1c5*RNbpEub`3n)-AV~x~a&ff+ttK@0eN|xvM6tfZWO2;CB1%;6>xqNdf(B;(xV}6=}#ehxj&5lYhU30I? zV7%_lBDDXhTEZs2Dk&e%bBqCp!P2XgFbS1C8$7t`7RQ!TV{x(l8}aDurrF@hDg7k1 z?y{zL*#uwwKMJeV_s8(!=UR^U3I$_XkMY*(PUa54>F`dDQa9%|Z)#PhzfO?3Iwt$< z+i&{~7j0$h5TW!V8sJX3wyf3hyLPZ5V5`7nucvS4dBWlG;srD4!rrF^zumj=B=PQVv;E?ouRgK$>N#3)sp2o+`M(Lce^oO0|DHSi zA(Xi+@l!j8sLJ!6A)dZ7@NdLxxyr+*WSSgdYtZOh>N@h=cO zv6Z93rH&~bW-Ko7WYO!$Q33aG&KqOd4YO;bEQlciH`-5xh<39VckX3vm;{j=)I`6T zHoO7pKII5v)frauUcsA>nlX}0@+3x`OulxyqIc@UP>13f zcF0Q-eMNwd#gA7Sb}wZq-`0ZvrTWDmQ@cJ?8vuk7eWKm!^xf0bK?OR^f68ejs(4lY zV$1d^#oqD2kk>CKjt`N1la6n_2KsY;$15=5{*F~^!SW-QUhS=o!v*^ao|SM;vg3m8RtUumBd;i@X>?6u5W9 zZwb6`LS8ua^n(>n(y>+lZcl0+K071Kq-aXL6#JG`ll-6yNIR&&9kmAoD~?}I2Fs|N zE)G@dz2i(?J&%iZFT(5Co+lT$$FqYm@aNNVj_4L3c{WVgXmM?*_)oBFadMV(}w z#LBi8s#Rv!?(#ZZ97sPu$kM$OpnhLra0*<@bS=_AC)aKUATO+JTyNwWUEB#we8%dE zpLZbu=C2rz31;g=AJ@!UZ#wC{=C^>-7XSSCkOQM>37t0O! zx>ro&&lKsQ8JOzBkf)cA|1eZ|`T&d~46du{SJ3R~KMEmS&n;P|IxHp#$84GEl~+02 zB3}&98(`0Ybs^e9Zd_+wu-S@|!vn{arj_UV2Zm69?(NAvPv@ySgeTKFOc{QwPNJ(7 zHg1QOoq0t`P~h#aL%pmw8h8ISH!pAh%&P{?YP@>11H)?_W_)u;t(>)8OqDOTLHZo4naK!t&@Xkd&B4UrKKvWU3wbNU zgUOFE8tQYBxZ8~!PLyKe>IDR&&>ywoCM0xw}nj~DyVM=dvFH_mOEjq9%70XW)H+6GCjiNPn+7{iv1Hn<8i?`acq zQ6^=)Nih5*$AP!uR)*d|AT&0F(ML?SdUib&IvkKk7f(%NQ?&hKM5`uhIa0p_a7r8G z9$|GElXGO)?K>j>tZJ>2bGc~&>cmB;EGAH%nN?-6X>@5>FR|ThAtoFg->I4?%1G|+ zcPQN@!+$y?SB@4>R z`T4Ue_k&pH8h&VwU{eapL2k#8VOa@$;{BN5TjRfzeF~~z`tJ6aYq!i6hhwkclQsdX z9N{5B&yW%M-rh^+YfcQA?d2hIN`THVhi%czX)X4HJHRj){1x(PZ9k-oDEC0!igEmA z%P3+$iwP=T|5=OM`)AueQ6U=8qg)2lPA9sW++R1-&<>}))EsA1H7dP+bx)98jUIy+ zgy(Fyt^^lD7Cn3}_$A?y?1tQ)s-&fjtB2S1R|`sXZ6Le-ly#=B9s%wIX{6{6d-$fL z4K8j2R?2jqAGOlIQWS} z*2%3; zx0dec=UD;KdFlOe&PLlEkQZEPTY^jDblN=w-cB9hha{pG3mUc|un}7sQx_lu>8QZm zGCj6a&)rBfM{dIHsYeYn*y&!@TSE7f>u#CS#`$iF$|)KSAib{G%S^w@O7o%B-uyQT zxd25791auSHn1Oz{XtsH39UGDx=p=kYOiVfp@TKQ?|~Rz$qho1BJ0Ir)WyS+Su3@k z5jwuVB61x#6#G{;;@!EMf8$h(yOv&8XqmmaKRta8#BI19eYW1PSmWKJ*qyJ>Pc@=0 z`@N~ytgUQpSJVjPD`GTn3-ObW?+=fyTG9_rc!t_}yBF#wVP+GS*3lQ5ejrp3vM@>4 zimT)ZrhAw}t=D^+Lnqu^Yf;~^-XgI3rDrUZ2TdCHlpEea7Rm0Jy4<#%l|OK*bsusN zl+|*4UfxhTE-nkY-$pw~38*ywoqN^f&;136lmI0Qv{wuEk!N$#LC+j5!ZTCKt(nn+ zsqM(@*z(9wLY;qN5Th?6L8TnUD&_4qyfHHpBqnBTrQDb~Ron4R;;c!Bc*-!RxHrAT z?O}`@a7VSF{cV;r^LTDSS<1{0sVdx))4v@p+GQj_Ehy(Tduhz941YP>;M(&@>_-02H5bhRLUs{0lj6Z|H7>O2yhkDhx#PE31opOoq>`NKF!f*uH%mhrjXHR% zX-#H1vQ+=+BMAStG<&L%0e-?;y{_$oZUN6S&$KJuRp1AS_C7tIU5u7}KeyN0?-nJr#y` zyLSb86{R{DCXu}MTXlSw0Fi>-1{>8ut^%uW2xcc&1&^oJ@Luf~0%BwRp52$T;nbZN zdN(!-Ry1|c%l9WegA~E@4nA*^>!HtSuFrPdvdjb6IHre_^2C;lDJDbDTyHarWqQg> zJ&cssyZ2v^OE7_RH)67PP1~DZ^us5@!aeF#OBf ze0A=#arbrMcl*Ct%^^*HJ$$|qB}I_GNOVyi^V`xNXZq<_iu-Jw{_E}Q+$+LMFz64A zZEA<6tZ@--$9wc1f2Ich`YgwUwW`8)=qBukP9}y5LAj#B$hi^oPlTQKSnO<2_?X{poRE>M$9K?- znKz3d{Em!e;f7;)g*0>idNRj+0P*M zBS$*22}~Lv<>9{D(|8Ne*0z z4Xt!ag43WuY`(VyL-Q27(?j90)4xV<#9a%&8!GDjmQS*Q2V^y;fXrpn@{RRb(^rn?~oYs zf1$rL!rH)j_&qxZG)2DsxtnjbZY5+*fbvm6jWY!-wrU9-n(s1`5Bu}V#!Z^O2Z+lb zp6gl_(Vc8W~>t2#q~D!g{-fNt>8*pg!aw7aCNaO9i>= zk^d(`3Q{gXHn=DWh&PnwVzgc+B;><`h^T8yXW$=z1*z<606hdAdAoVuDiim|h8r{< zAJ$u^xz)12m&rTlIzB&?#N~bAqmcOyN$Rp85#IB z-v5$K8-LHH`7D7_rA$LRavK_E@Gs}<22z;)g+h5n`Dt-PHJ%(Tqfw8w`fB(W?KrLvu2pFesb8cWKNeHaPQwRm1N?4 z!l+Kz8*#Kqh`7T<(>Sf7`MH z`*rUM$@ChVP{K3glogJ6h#-ibj0&l+x@E$`+~YU{XnbXT_T{|0@739FI?xKQ2}(SF z;0smw#F4xG2op0TwBmb=vJ{Fi_V>|(Z}!)*F`@A*y_{(o2v9r(GY_xa#3V>xEwK@` zNa($S{&I6|2@~~c(SQH5pL~(`2Ne0`Dm~buf^=Gf(-*|qcyN!oI|8%AL%2|vO9Lwd8&h5giygG;pOeGhNZissA3e;>j{2Au4 z>&4f?F=dDul|UJnu8LdPX35dX~i?I@GnYZKBl-sdG^a5fw6w9=xdb6iFm zfay}FG6*2HX8vZ2h7FG)Ss}{MN{u&DX_aQtZIvc38RCtV_;A5DEP_}JU_WKT{j#vY zl}Y;MYuIYG&41I}!#o%0dP~%VDv};1W%`nVk1D>s-pq+zTa*l@#G%@+rhFAF)-a72 zY0i-CDK(RjKk1%L(KHiCui^*D*DqbO(JYqJD4gkNyKD$^9OK>b4C7&>h51q~tWMo3Y~U|d3CB$||6h#O7gO$&^AyTHK&X$Lb74{)l%n5=7M`-$SZ9I(tQEGH9EN${ z(e=#gC0WiR*r15K13*LY%|oO;V&8~1t~)c6qB*S;YC5tC8?E#S@gB4MK&>~6x$6U-s4?@^u*rl8!( zC|?i{+y2ixxMnQ(7Z><@9IJpyOILp9&2cUYgK{k7*&y?=P|YUTSO8@%ZOj1HA?gYm zT*O0qMJtG=ab^(xj!JCEEvgJc5KS}3FOJ6w!uWMS$v8X{W#O2Al!(~_78Z{KW%>r#0wGz1GN(0!)f4;H%<_C>$Yz$ zBAdAkFMd2cr~cF@x6=DT{Imr28c2NRu)YI=bqc}E`HSJza{K81`1Ao;5X18`mMK{w zEtWv@y&mIbTar#ocO(Fevfu$6C~HyE3X0h98Ixp#BTzZluUy7?J}DtO8A0t{VMvm zzn~Bm34mjhbwuP{r5kH%>?zhKmafg;_A88v$!4fNO?Lp?rq{_fI#V9DO|4mHSJ-He zSG%|k#+CWgeWoSp|EoM{&Vj(LTJ)HFc_$<{VV8MqzhxVnRVX@s?|#Erb>Nkvsn3Gd z0)KWZo!UpHZZ3|;taGSoo9@gs>Kbn$M}RxFv*)Jn3FN({?9c(3x>>DW2u^%6!5gO|ixvv~fT`6Ls(R(*F z6hF)OZpUZq-#VE{5-}?Y5crbxW(RBqzELo`W~vNl0=%p^8wjL-(;p);d2{q#aTA#t zt%v4v8|LWhuoExZ(p^%P2DXBteJYZ?Zo~azw*qqyOZ&l(@V}{U5QihO+(}s^trDh+LXn%A^qKE@RrnXQBgsW7exMI&{(7VT z*Cm#un$Zqok-n-m1b`g_q_S{V1|5#_1tq=TXw8+Y})|@YBi%{TA+_ z=U2C2-@(h-+g~VP{;h!nUo_DEII~=~LYW=$lvt^&q5A8!(+KCFtKo4zFpU4CewE_`4)BRaeH)dJr|kUaDV8yiCa|s17b`)^=kn57 zN5)BtCu$%I*+K;Urf-PCZ8ANT-|?{$tN9n9C+)+cX4G zH(wfu!$)2o%#xHA-)|YLMXnohAs1+S@ZI}1axX2uGCJz=#RGiY(0rE}D8N}l@N(yZ z_en<3RbO-Hi4zRY*-!DJ_h0ynW08yv`Ss`v9`q|04=05rfQO&!plK-?=WC$v5xs#( zu~~Q^U~$TL#i32O`Z?jn@nQ`w^iQ+W_1(a_ncP!ZtC>m^$f@i%HQ5z2=+lFc*iuAI zw~G-ZzTieSwPj3}>yULfcwseI>&X788ttFP z@a4lwbL;)kc}DOoRz~1E2!}!nwBiS11_c%50dLZf0(i2Imu)y7`GU8{aG#;|a?x@L zMV)xPiUW*1lUOk1brNv;1nLiyXPLU^iCNeT!WT0A$U^i2h<6ytkLLj{I9|k3T&4EeSmqC=Rr#G_!bl-G4lj@f^(1o7a;d zMy+UxJ&;IRU*)w@qe%3MK=po;MQscDOv_3+Kv#Z`+o<;;E`@R`qqcGLty!)I-MNJ2 z=-#iT-0M@Rizy{#Y+e4%yYE0InIux-3tcv8A_&g`E|P$>P1E-J^YN0h>X!l|!^&f8 z6+2;^6K3q9qMxD_f9(9Y2cDUDC}_atd@)kf?={AnvO!L4dol2@+MNw|D*Sw8p%acH z8|sMiwrUc+Hpz~Stb^^$NF1TYVD~y)un#N@cr$i>u$?`f@*C z*!_MNP0@p^b9GPZF*oS1Gq{$tiI%1WWPj|hUxP9tbC>ngZYc;aNFaNa43tx(kJuk# zPoc~p{xHN%yntLQ?{oq_i8CymiOMV9nEs}yt0u2xBBzlb!&*+bZ z=-KF`TQE3p*cbFTRWPK$CB1I3EQS=z3`%W>I@@RWc{>$rB#~P3N=;AuJ^D$9561!W z#m1N!0tI^<@WC*6AD1pVh}kO!4&f|Zgo5js9S$g2@%=)pUEWl@_ z$@pN;>=%>i0{cMA=fsUg(yiZ&{)hdVN%HX13ar%dA$qSr?RwVa->+1*?&#;%ZV>46 zn_Td}w%E%4@w&o#Ru%Mu`8eq?FpzWud=bhh%>x3*!{a@(SA$Ukm%%|;*siHz@R(73 zy(<&tk9MXgru;{*G6+Hmi*AuYcwuFGOb=4<^@b@wL9)}1^cusb3bNMO1G5Gv;DA)& z>c1e4nVEiWeyLG0xv$+SbYyZun&h-Kjkop|Q%Hyh!QL^v7ck*C5cXfS%inBj%onXz#Ra%GVm)qfZ3rikP~`z>Qcazo}Lpo zqB&W0l;p`+H?mgQ!pp`LxR8CtS(f29Z;yX&=H|Z7yOnJrokW%`3(9`p`5kR2mmqee z#QVjBZ@En@N15YpWnw79aivIf43iU1^3eW&*n97&rnC3oS4YP(sMta3SW!WW^qNr= zMgdWgCM8M)q(%rWKoT3GQliocWt1j0(rXeGA@qopKnO$$BtRetA%RqG(3#P5f8XCZ z_pEi-J^x((fwd4npX|^6?EUQL{eE80C2OII!j)QzU_h83+bR3wzqDNc^Tu7pm5n{; zuC)ntT3hM?S2^wy__Q}mM_bcWv6NdJXX`>y2b($zLs`F_6_R5|9SZqt&*oGsbxM)J6LL!~A4&Qc@N38JBSdVzo&j`=@E(aO>aj_2AG!Zk3m?+|2wJ{ zcTd=8xRHk5O8dzn*0te#sBV~>qM$#E4Oo2YSmWXXfMy#;uH1PQJ!;{R$tNeE7Q>3W zmB_k9HK%JdnL~fzB69xO^h-}a%)Jr)R-pavJDl&^h3`VY%Lt){zdb6_vJ52&*h2UG z+2QC1j;Qp!F@dmE_${EAo;mtdc%(dPD9JIB^P~dWRQz6WzVbh%H~q~U{Y0A*YVYWl zsWpnD6bxLBDZs2^RkHpv=mB~8770bav81|HfBM}2CL`_GqqU_ohWs&P*^KZRB6{ymBtc3Aed4%z0HoK~?( zxFTI~)-<%aW3g3G9Y>P3*0BTKkQ`fI;^sxFW_<vXK-=mq$9*7905g8^iA6RV0jv7ybN^EY?{A*g>z!7g z$vwGRHpy4-ws)`Fkr=wkeL8IT_Kx5kDV9@Zmu#4;J3^T{0TG&Y3Ww#pWYI0eOSVnC-23AcvhMBJS^)Bp+qiav&6LB;-~F}|znq3D`S^8ZB?fmq zqN_}@je6`LW%vb9D@B(XdxalQ3L0}~)z-6W0gvE0`trb(0{4&%*I=f4INi?X){sD` zRLgy<*oZ(ZWWUc5M@D`DSk5 z_Zq$Z23SyJc%?e+fP#`)Vansu8B>`zpB$?9k|+qEJ)VFISHadaU@h#CBQ1lTA|5Vj zy~=o^pDE5u)I4P6x}>)dAZxzg)7EvR8>j{R=b${IfiSKg*0=r%*0gS&*7sG_-=_EO ztmXNeZ#G?E)oLGvp{`fJ%Uav!5-G+Rl=d0?oJPJ6OLMMP^Q^>g`4CdUX>ZwS?0IKW zqISIY9AZK@hKXw;M`p0hXAHG9owx3!lyA;9S}!fP8JRG+fI55{UBCc_RT ztK-WoQyaZ^_+?%!zb@ZwMluI>{WPl^AAHXZT-Td4Gc?$eekd-DPjEueMdNDXnKHGy zVqU!vVIt}QchrdMzTcSHR2QeDmyjMOZ7P`s$dqT|uMfDyN#0)=i74=Usufh-;1ORaaDy7PCV;{Uk8?qcaSO4Pka^Tglha2mT^*!(lMuLG-zBh2Q`T@7<;Ku;VaN`!j_S|L zxQfgVTgTo5ry<%S+K85g59I2F{9@g+CW|s~ubj6= z%KtBC`ompo<%IvAQ*8gAsM-0i32^#YICm{MY#=E`UWG7i8n>rs{PfZO1x{wn#1z|) z;$XK&Pr-beN0+;tnDzE$#0J_WqhPUS`Yw36Tf1>Caj7L*muyNYT)eZ?#3x!~CS9A> zs9{3u(YQ`svYHt76`#Rv^Nr3|`spJ7Mj*(B;AUa>10SXZAiNU;A2}}BK*g?f8HjwA z`>5!K=pILRiF|ASIY}LWl+{Hbn`W?x$s3e~i2q$_ zJM?2Wh0@TcG&uT6tT8xwaNm7&O6fsunpX)I4%l~zsdNA7K6bFj+r^B{xBHfrS-LR4 zOqiS4#Bich>%ljqSegY>Suzt6JrllcRQCnT=?`8GnJ!KiOSb?(#g|LYNF)HqEi>eb z8F1E$uibXQ#H3S$kX{%+3fPD=|DYDcNN+^XFtAbxpA^M)u%#Z`<$mgF?-~iO5U&ud zNFLJqZ2LrRGO0aEYThxOnavhl!tC*+NohDK|o_LyJjkg15y?pYIdxiZs1- zlEM67twS~*`x71{CidaiVL#&*xvvb__pXGj`=&HhYa%?;8$e6NnuG>`fa(YN&w^y8 zg_w(4ptf-X+X6req66eujkTJQb1b%1ZDi0WY;uXugcJ+J6xJt-C5?IWehoeiB{~RX zCUzDp$W&(Lo%PMeaXr>BtL?HmI4sXhdpR$fawkPV9Z{^8x`az6XErgJ!XB3~MFgK!+;uC=VNyUghKNJVimhB=0_#|5krl$+po1v^*G-QWNaC(8Ty(LRuxn{ps0swJ5Za z$D3M}Xr3(aTz%C0gpW8;8M>Nn(!dCl+zlq@yH$>R5K=Iokc+_|+@xnmpen3F; zaVO_Y6ZW39!McPNefaOB?5m+ry&BI+Y6~`;iz~4?3zfR(kMD4LQGz=RO z4x*v+cd*h@xe+48tTkBe6d7RT`QOUe6kJ&0*MT-64XkdbST{ZxSCMuNg#$ErC%QLG zV^_bX^Qi@38FyoY&|!Il#q_sLyOjnMwY6G5uj70FO@ZVMI|r!HC97e`Fuz zVfkNbiR715`%$aP$UmyNjZ2^1m)$&!3f7?Eu1^F041k+zJZelux&{_RP#r8`g0bM` z&IDvyK2wF)vIh{NI9BJ)!My%YK^3H6nM|<8F~)FyNzl;{Gyu^Hn{Lxz)}_OJ5)l&$ ztM9%+v!9CTrF=+AF^3_BIb*2)2PR#CktOQ7AR{C zyb~SodPk|ue{}~{?9lP&PA_*!gZ-QX5Hp?Dh}0yj^Qe@bG_hAHoHgF?- zFh&Ny10-H1FoC1S_6(^4bRF8bf|(qj0RaM7XL`vPDD9PD(30)4t{OQ=cWkxIC6c>+ znPuUXX~@J#0U1{xDO@ruu3>5^Myvl}GG5R_8fVsgY%`5H}HY-CY%>7FN*c2oA) z1MU>SgUX&lnuY9XAAeY1?J~%(0Vnd`2htXasjat0o;Os7=(nzn63I_egw7_xVCOp8 zCBc!_+BKN8_bha_h8(7?E1+znmGvEC5fiO%VJ?h6@Q2 z)YjWw6ozQQZ<*7HZbZu)(wST5h-70)ySeNJT3KXWw;?=9{Er*>oQ3Vn<~LQ7{^pnS z`S0W`%@r{b-53E`Gk+M>vD!M{kDbx~IfDPkCv%>Cx;5>2XO+ z34 zoSP2mySdNDWOG`=wE)-3$tKNI&`8;zlR^9UVAYAAWF8BLTk~j1+Hyk@Gd?d+i^m>$ ztm5SgVdUAZ8px&MDn`?kpmeKtZRp922MRNg~*J+I4btpi7WaYAE|!zrMxp< z*)$qh+cPQq#$ZjHZMy9H zT;D{;&(iJ)tKzvB+WHd0j^DI2r z@_rG}>rrSTEh7y_GqEIAq}!Z;Zir~dKSL2aEK6yAlrJifG=lkjt)uuRTVLB}M56&! zKfNWK{Xfq2Xlbq8dp1-OjAnKBC!L`wqH{MTyAMG>RSd_rWdt^oZ!b}Uf!QcHyOQug zUDF0sdn1Shn%HPlF0ZM&t5?^5WD5)Rl)?OJYYsEHj3Ib)-4VLbAgDTcuOyB~4>#+80U(xkS0_3q#^Nwd1_ ze!cg5OY^PgH*>NR&JnWG9d_fN=b~fsnC%V;lXuNFvC~Yh{5hS_pSc6S}IY z30^s%oQnIEs`&3M+yML#4meLunmbeS%#z{c^4?Vx?q2Kbj<~{4#IJT6iYU6>_^%r5 zF&742_B7&Da}TnVevQ}}I0!OGE+1cnSO#9132hV1#VBcp^DW;E2l^iZ8qD zY-qRM8rZ!>B`YTf6k0a@0k=fO_uh6=PPT zeD0|M>0;xTUJulaF0pd9HSf>HkHO~}oevk@oLXfTGfbs>>W#Ci^RYPFq`rrx+iRZ> zqFZMIi}*3+Y6T0MLH&vrMDuxqcdXXB=Try#GOC>|z$9xxz}9Gk;M<~7QRZw=b$k4@ z&URaj(dB=~^ltr+u0JH@`}HXT1)oIsZ_r;xvnQBRbS08F7N_Iu;Zz2v&U4+lewb3ERDdU9SN|Z39DDzhDiNM_0@|BUD`oK zysg_Z_t?o=5A<|p?)z!TMc*^kYq=Jy7pL6oezA-r{Vb^ruPv4aL$rC?9;R&cn%^R> z!qT3cu)Ivfz!yzISDtHnIQEI|XlGq67dd1G;61WBw?xSq&$@PW2*TE!9PEXK@V`;7 zsqSYy6+@!u5$|1UJ2+QayYcG>_D-)FxZT})_a{e|`dYbT&IUhGc;CX%VM)U6x6D|s z@`&!EH|}LUPdH?O_M#RkX!OZY$e|ro3F&g8;xN{H*RQGje@+PIe7o_tV#mQ2Ord`9 zl{#4(xc_q|nt!5;!jz`XW4#Tua8BMrofB_A{N3T{+hdfD5@&pS--#E2=k~JIM_B`k z^Vlrz){$+#9g=|AEOI^Yoq=6?e9~g(B5U-qQor>~zs5e0s!ZRsM&{;HzYi}V3JL{`D5lxJlUDr0xBB;~ z8|k>T69wI8n~kn{{H3LmQ^T(&cp2F#W?m`f?cBt;6L}{2;57e4i;I@Jd;H=;q>({% z9FHUe-OY+U*`szG2&lyNf(sS`meBGIPCwS%zg@&R8@xn1p$i_~v4(wLExZ3{mM*Ch zds8&_VH|I_49cWDxuP7`@@3_IWJJ#DtE~nJTv>c2&kwXknCl+lCECAuB?CoV(c47a zF`D%At$!=f?_IBj@YMK)WoS+n&(z`b3T-Pn~- z?+Kky30;pHkr_*Sc=A4?@Pw)+{5GHHnxEv*e~`qV#VsKQleUp=Ox4g_wN@L@Oyh*KdvOQl zu2o000~FK|BfK-e=BP_2c^SJGd6?zfzbmoiO?Pu(YHTo|P?f+1^b*&2iKcySR zy_^sJ^JK)||H*VVMt@sjzJ58k4ER!p3RVbFE2Nh8n8=Y73{eUIYJ8rMQ%$ku>a9^_ zuDfp;&E(vVOFCLxRdEF{^A(@6=1`645(nI_fvtN(lf)f3#O+bWIblOCZq21Cry5-- zJH%~5GAo}gPY!qwghqc{b@9)?({pN=E^jHp=MIQ_Uqi0e){a94U5r_SL*~I2d_eU&H3TJh!Nv$GV(QFrI1U_Hgm}~55 zkfyKEQ@W%bQaiTi1HJm*(EEt={7bxyokTr900aA!$|>>7MAqP-V-l^T?Y(7w)`sOe z(F0;y;eB)mOtzQ3L2wA{L^dya!jbD&%TAcHp}RYV%g53wQ9{on;wi@ zl8qD0))dc2T#aSMo9l8DoOw?%Niu>kWfEN2E#XGPl% zjl424vb@=(K&;b*pK*P=d~H*!LYf2z?l;ft&RG4ZQ!m*V^Pp}^g_Hxs1#ySSzikde zp~=9*iU+wl1iuhn@j3m@A>_%%bG1Y|>UXYtv19<)yy zY@Nj~3b22nakgpkRj5P4r>L*9`feeSxX#W=w!iArZdO#rpV*LQejRDU1?X$^pg|X| zN)%eI`@SAHIojis(b?qkwr2R!SRAV)lf~gIyecn$(WRMzn=w8gw&OU4AkA0!5MCA& zamN|Eyn?ZAb}_;YNBG^_O3)YSkHE*Cp!aaEFKa|%FNRZU$=!@Rs6vT<1THR4kn~-LZ%NxmuC6pjHBZ+urnKv_N9ZgIOVIY)&>cDl*6T zV7S`-*-fo2&uND$BK?QHKzv=ZB0}cs?{wAU@C4v+6agA8${;Z!?zxawBSZp?!z@-q z#U6fVwpyOaQhj2!6F(v5OWj71z8i|K*+l@ZRCguu>hY_dC@8t$g}j5I&>3aCd@`Mw z<97q+Pkcy6ot&3gAU9+-r4SfU*d?+{kjbO0<;WgST~pX43x}rr43dn|A0nio8^^_zPU1=PEk* zd(*mnDm1F285*mW6<{*Gs-6Plz&^)=+5(hgwNn)LqoBFk>`IfPjjiRyy7qBz?e z=8_c?V5`NNQ|A<#b>rf!x;5jVvj&NQv%7rydMXi$Rnpwu^s|-bEh{dnkRYr81PH;D zb^qb*4C&HBgj=0AV#CweMjs(NV0qjNAY0**|3f{b!})IA%Zek%=~v70dO*Uuc59W# zS`fW#j!R*drx%bBUY^Zdc^h=t%cuxe<3DY5eZ1U%wG-k(Yr74e%*iXv<`fQ|$CHEn zGh_#`ek1M>tJ@^@+;mmRRbJ%pJ(9@B_373%t4BGIhvnvRTy8)g^r>F|^(4@2hg)`W zu%Tki^*#^d^L&5U`5xt#5U#U$I^ylvj?PGF8>eHszE%ViTc2Tm)62jzFQV&YUoE#j zNg@Z3R(UnUTW#r?arO$F=@t*u0#!r*{OT@BRZ*U0gk*UWwlxuVau=5-y2eoZD$7RK z8EozrSlnW0-Pf}dkY6=^byt>+V%5N>wo+>$zJb+Spt`P}G9--eY-RY4m!qE{vGIm; z#Y{sedM8o8`%1c^vTG6{|BVvzJV~FpQeRlVB^GnJwF7it+K>>_^~uyizga zAZp58RHcoy91!`<=%R2jix`_EZ?ZKbQEN9qPy5Qan>EmEb!4j zMEuPMekxeOj$zOOH^r18gA|7}2!XCi^u3T|AbnTtn9a#~1#Psnsf%@n#mm5Xct7k( zK%~(HM=2Y4*=iFQvwNbUgZxzc!eCMRu(u0#5u#XmJtf?F1(b(znr+ng&n)&!8{4eU ztz(xTARYoB7{XMAi?>@XSjl3}vCsIQfdjANLwlyH{YadWm@IoQ^sm41 zBaRcT{9DK$KJ;JbBn?23Fb>9FTO*fcqfw1-T&b*otsf(F#SccvAAILrdDr;?*7$D+ z4nw9v)-KtcwS4j2Yxc47o5ysI&HYt>0{;|fn3+vr6>D%NYHsj&bJ^e0K~m;&;ON zc=TcFi9xAyNxDYQdFeq@=$BH|3ilmq;=8@DyvlCQ**S{Ja&Z0QwYSzTu@WYO) zrBnuXcM(%FZXg3JW8U=~u9B}z+uhkBeTeBFTXXTa8t%z~*b`kZn*eN?3F@@I473Ot z9DPmnE7Y-}=1b%SqIpYpixXaHN8S|Io{FvkC2_2cd%75ZfnIZ*grQRf^vEe=MPoP_ z3pv;|<9$hs?WjK`-eaVRYIIk(AXAws}yyBzz9pk>c!Q=e7 zK|O--vY4Meqh08Akd?t)k5Qaym|L$8K&l|;`i6AugnA7W|7`Z|L2;34>&gj(f(lsI z6&WXeN$ug46Xo!5CO7!P^8A`Trg+FHTp@7wqxJ4Tv140ru1>Niske5_aL+ECa$A~$ z<$dH9?$;Lil_Z3lY|*fTh2Crxw@(U!j1@JMt?IbVW=X-ar^5@ixBE>-iW!88O7$@T z!PKZgjYqMK@;SykJ5lvhqE0%dT(Oxn$w|U`>V#(>gVG#56c@Wuv~8vcN&&4ah7SCbl8|slzp=QX&vqK{(4EHn*trRqWK97 zunm%q+X-&4EAl&E6SDsTGsqT@-}L)Y#zRp;#V3WT+mNE=^Nl+Op(B%yw9;4em^(0E z_@aLXaeKSbB)0fZ$Ubqe(0)jXg3^YE(AN!)KtDJe@-$wzW?sR5@@8ML^ATuQA?WMH z@og(mJN(%$yG)(2>(jj3FCx<)2PUP2kDUgO3MLFBtK~bqB*U>uBzXGiedhCeJbjCd z2f^e+1#FG-8n|;(43_mrCf#X(bx~m0I?|#9$>`7T zgcGgC>UbTnfub;?DB?KbS4GoEz;*n|!K--SuED1E(wRmB64rPddvRqGAsD1qeT!c! zgXY?l#tkhWOb#lEoUOtp;eyZ~2#-ZbEvbE80^{=iy?*C17UmbPuSADiGmH;C;h$5a#MXkh|n;>%$t=u%6l5%FBg1_{$>E1FSC#- zGo8#l<7nWYimN`YNqjb6;Kl!R*mhOaGfMiMJ%_5vzjAV$vyUsgypr^+bZ^&Z<_`KL zP9!guR8`_kc&w&f+xy-NT$tU(-h*B^v@5#`C8a2Q@9-Q0eZGXd(IG{+JCBY(h*NQql=?$o(npY3Lhi~o$7^TcBYl1RO*V%xW7JAa!5cTRW;#pdoaSU=E8cPK z9y`Qw3npnMiGCiPUiizFcF@( zm76L_*}EN`9sT2)4sgM{SeNzp%ms;|=;wS}G(Z3hzvWQp@>|j6$>#DrHVc!0%nl4? zck(}_=BTNa=4qqH^lq(s$qk#ZwlNR;7{}_rhJO(Fd|H4(_gh2_lpR#F@wr9I^CWEC z#Q8JoHYoOaax~6@yLSSV2AOxvj#S<4n1yy6G?6d%L=H1<%q3)~dwc>%X4J3)Xg)ii z=rd4|i@Ja`M$lNGYIDTF7xYiA1y!zIu4ce}lXZuNN!vg3`{)IAZMH^4V-1ckc>k1J zNHp_NsN7q8a_b(2 z0^!6$-a}Y=DLC%A(z}n?nRZlH^B+#iJAft@6+D`Ho#Z0s*fJVV^l~FGM)0=)gIPQA z@6%-syO}zH_o)3#9=*x-Ap7fl9^Tp5oU(j#pA-O{);K49XOo7tUu9+h& znXtn<@$LMj;D$R54!lL;%_V(3%5T7exPdlDgOvBOuY>%#(n7xb@%%C2fuj653D6Ux z3Fyq=K@E1;sC~{7P z)wP2=AlAHq1fFBIi|Z$hVcqJf7uZH;X+|#ZM10bbe&W`Jnz`5vr3qLOZaZiKjNNNS)}nS z=oE~5`7xZtZ8J)NTpNiOxeIOBN6Y7t74l zIQ>rMQ^qk!ZMOBv54_;L4BZuMT!4|=DnlSk%@Zu!u<<2Q z&sEns)UrsSbC!sRg%BI~#GOcKEQqW0#{Vk9f37w_{eDb3}MF_)(xAQx>QA!lBWjftx<(U2+=Q zWiWqaelc)9Hh(LwbvEJECFB>!;`y@S z!MDczJ5G2aAf!g)9>};-GJx*eE+~zUGDJkUZCgXZj;=tVGEUI4K$F`G)x=cm6&h;$ z>PC!E>Yhl-ay4{S;!n}5{u`JnE{GHJWMAXs?$l`EeOsH<(82uFK9La(RKQSw@zt!D z8Sy#p4|ZEy@hiRn5amr9}MAGs|~P72d%bqV^4 zp@!y%t>H~q?;ab?_*9RA+2=x}QHl_gEZPGvG=_OYvqMI|8zlnTc!jpYi5N0 zd?j@%{K7M7^z#}2ePr6Vx=UlAe^ zTKX(dn|2R=SAevS{}(BS*CMYt{s1%hE3#Tz>wNXJF@oJ75_1uCLNs zr39K6ux&!!7_ey>p@yY+z*`Lp_4)#2OBRg1w%Ij4YO+g9J<~_h-As%z+-Gg@8P;XY zqqYpf8>wH+#s);leo)7QedY6dWtc}MA%{GxV8m6TTx3 zqTF)Dq}C^V@fb_}W5@@{)ko!nr#A5a3QwFnff?NG1HO)T16VOjjIWTD4$=(l!-0}7 zIcHKW*p9z^DFv@Yh~9ZD*cHk}Ox;Xg20CgghY%(=5}EpGU`yN?UiADrPhCg>PL? zEsb=U63i#iO8Hk60zWxK-{w3cSXZQYIEWL9t#He>Wv7N?T;7xjRqn2Ejcht4*pY#9 z>}ut;h3&<{%ikzcz)(b|Gm0MQrN*UpXIKQE{CgiV*uS_&N;F&=DY<}ED>4hkc$5Pp zDBsQC%qKI3_DSpIVu9|Ly*2v)OpJ}4K%p!}*Ek}U_)%oC9LG_mTpZg{rVz98-lc(C z=i+NjLj&w6(2)-T!inY!qg8&Hs3k_~_wt7TxSyP3#w0~>KBg3N3~`XPq7(@=GJ2w9 zO`49m$$E7et9Lu@FtFqn;_264Y{G4>ATz7Bm+zSw%LOd;4F}aahg&jyVO^NNh`FA#z9ww& z)~JO(*zb%ur)Y1{g)<}_K`AZu1=A|wCFEdYr^y7==`W@^e*d_b_wBYjposPU@S^*K zQ3iU>p_zWBgt{D^(I_THD4RqdUu2i;@{7gHQH!X9u!nd*ClF!MK%}!LVx`%A}6QRXtovoY> zw=U@-`q)Vt+~|Pqp9~C$fq;mKEQ!hCtbS0N@!{phtjdy+mu}0qAmVkPjTE*BIjE4p z7H@Kl%g9p@`;~5rNs(OcJajS47Ct}?>AKrt4u-?ZGl0%cX^{GYTk#c`%W*_8Lgr47 zDgRjZNy+KDo5+0njntH$-nS&LBBO$qLFW(BGXZ=<*!ucoH@EkN?c*73XYE;VqWeiX zB_pxR?}L3I38BWdf5d8lrT9|wM~zM@W(7HG;^vGNQ(;hps*DHK`@MukWH2ww=wi{r zoY_}^ccmP>OfN~ zb4;gnXY&k_=Ss=i2MvC z=z%wLf)qkc@G3nU{}vpsX$9^%fCHdL+fOoU*jH&_zlwZeavbIL4TA#M$($Nnb-PCR zqR_eqf)G2lNWvibRIbw_=o7Nw}fTaEbIRS^+-VZ@}{LMGHV`w-QK zG_8%k%#CNc*fP>|Uf*6mJE|ICle2tPCRFp0-svWwNBjvzO-1zCffRA?^2L5|PeX{A z{2AvQmBHWYO`rfT?nmz4%d98C0|pNzB}N^ngJ;<8O;7wf-#c7T@*C^m{#Jg(uciL- zeD58+wN1fS58KN~pZR@;^l;1P@|kMSSw&?Cqj96J4^8@Xg1b(`+M8nZV`NjNkWu=NsGA|UAMmo9YoGQ3c0TZNlW9=%b z^ol0ebKSNR=aLHRCb@s{Yg!pRO`B(PTZ7}F=j4ZRu}b211eTUr0G9&+t6?(qL^<3E zr@Ku=2!mI}o7+NVi2WeZL!I7!_C<6-8PdoD@W>UXD(QX7sA#n=SqPnNqi5SE1y?`} zyqpx2TH2t4Jq{KNkxHHJ@sCL1*Wf2xXrj6RruJ)R^8t1==Uzd#y}erh1-=heYp_Az z4r7;+B~hWF{6VAIF6$PqfHC6~hL6Z?Ro~{a@Oxug% z&B~F(E%(G#2S2S>7<#ZToG{@tL^1gbPu$bx#zESSEg8i?ia|kxo z!Q=z%Uts(zNl)rd_UpMJ)2PA1_6F^fp>_zXwBv-p!JR~FWD?r6w&%=+v@y>)y*vk) z3iQR%;E@2IFV80zMjAWl0VdY<#{&IlWW3(?WSe6p3$JBVc9pIrV_KXYM#dY$!h6m< z>8O=101!2L7FkuX)=2PttuJ%mqJzBYLU?IGOyd*tCbO_0_=nU$Rc=J-y3>&=v`eXYU|A_uN2H z#Ays37jh?lZtrl^xzzmwjO9r5yc9Y?Sqr+cks8<=0m)&Mf<2*Z_IBcVg!ui)~;_(sUuF^ z6diiF|Lji^_&+r>Qet%Kzm`n#@4vT0PQ`6`8TJ28aoI~_PoIHPYNzUx;&=;9!8GLrkqBD@!J) zV0-ZiFy?!c45jz_sO$}xs`_jSd58}~e&r6M%lEuzIZ$K<7(*rlaV9{{GhTH|I9B0E zmyhh+v1TcMcCU7=;FA=anob!D>NHoaAD|2(eRSYs16HeJ(BA^$ZZPsJ{HNQT_)VU* zZse;=wZ)#x>D6>=#rAIQjPl2mB>b8jo(k%#w=~y>fS)ad= zdPFz4=}e7tDREIw+IBx?p}Q{m-NpxrVh93`0J2PP`$YE%J=yw%xx_WZ8Z@!ln$!~a-?5Iwzqh8y5_DlU~Lr6_Dy-T3Yh~g;wyQ>mlR&duIUlC6@LkFbr zLnMbIEk+MIQG)rePe&!)G$e|f7$hJ^SNT)jqsA1oH;thde|v*x)qadx*0|arQ4DL= zRC6AR4-E(|QVWtjcJDS2xEIKl>MIUe3?ouL2XnA1-tT|q*ARM!67XkRIA<}z&w&ay zu%%zGYgy((kMPlP(E~-LQxwJd)&W)~w5+_s8L$f^KjQ6DaFSpD9GDG>VE$^_hjc_H z&>ecLKA=jhnlDW#=jdXe9w44Zkj)R;Z$C^dlyiC!v(v#yf!~dn^cm?#AE8~P-xMSH zlettsRF;0BzHa>`yf5+Ml4GH)Wl5=M=JQJA8!^4hePPH)$#punRwQlLjt}sUu0H~5X)xiO zL~Nkfjcu+_OIy{NcRih-Thft(5NR@GR-9V|()zX#i6Y_&M9-BuhW3~Us`T6^eLkwj z(mI5;AdoMdwl~5zdgvyeDW2aMZ|1SDIcJn86VrIzG=i#(d@$@QXa8r8mdqzpKbgo8 z>6k1hV`PvZ7e~%Wngi|dA1r@O^+Wt>W2ia&_iV{ubFJ;7ed`{P@*##jx1rhc_8YaU z1;IHdE-MzQl}T(kC}*L1#3}!-+i~oj07K)NauP>vd?A9ATk96vnS|MVtj;ouW@Y z>|ceB0z1!!O^5X~ZhF><2|H?ZmG?`tHc!y<7IR=66>!Sf zBi>3-XVF{dbFFq{%)o2Wz{IW>otlD4`5=fjn&RREEF!MPKPT9hHCwYz%)e00{}jGd>PHd8!SwZ%R%-{cd+no~ zDNQ|=^s4wmPwV!D5|OP*EO*Al4HfBs;Gk+w);@7#x*cvyVeQ1j1)FX!hr&0{J-c%9 zIZmqS6f3k94ese8-tynQ&!)wahE@+@iT^Oj9|rw<=B9q*4Sn0FKDzEwJ?CT7VF47> zsJ@kS$<?nN?3{U%@#Dn5uy=4YKv9zcmi&%UTRz6y@@+c2q9i@!yn^W z(QSt;+)Nx5#-;5hTgwoCcd_AXSOb8p%JyY)n;JM!*YmEwMI4R0d1vf^ z@j@z!3%W%YX=G^3Sil`T@e@38@~&i z<6ocrLkrZWA$#G$;8R4{rFt%kpmCA@5>fVd2w?NmWRqR`bt!%J74(Z6=H~7#)Rwvx zrdlLJV#3|y37YWd<%O`WdM>^jr;Q!EyZ+Ge1IK1oo-OR0kwU*gqKf_8a#?a6=#D3? z4ipv2dimuNeve`UDsr-GFD2GzIt>PpEhqX$WNw6Js_5*($s=!rx`=czC#X|n5n7bW z=Ajs$M}lD28ENt?VcUlz)Cp+9TpYO|;6TJ+0?q5r*!_E9B^kLI+h|?V5&2CPx8lcL zx8vrv_YfG)i%=;ck|=RyWimB47lN5v+znii3rdgfHcc$xsS6DKoqVFg%5@a z!r1a9Y9|tEb-e5~`zmE}h{u!ir$@)Q%2WK`CePw3$F>`d32Z&|zmLz`^=m!Yx3Jct zBhsGVqzZ(;b~4?9!ZloWk(8v~3C}a~a?1vA{(X4Mg%*i{aW`%WPE43o4MJZlk0~BC zX4R;x4n@ZZFs=994;_)3+TKdAN!JqC~>k1>B6h*Nr=rMo=193xK12RjuF|$Z=#=)eyp^VSrZ2fUg$~I#MHKm zvPyaarffcx(q0ehd`OIUObW$uQ5@=lRGWd2^DUqHw+G}wwgyZIIu;h$SNF0KIQu|4 zjpZEk>%ubf01ueya){l%dfAIRmW&J7H#pIyalCb10lFfCwA* zgFtGI`Rx(aY#;e3ZZ8kpHass=EDA=+Wv3V+{+Wf%KSo(1ckAz7s%6<|HA{53`KCXPxW2Upoq7oBDtvLp zQAVPEVdrg-{}D!)k$pf(^5Y8!v`(~S{P~GJ=yT|H*G6UQq=v*JleR!v!)NG6Y2!Yt zm-xlElnS2~bRxj3c|)=_jh9YAZo954}SM}9hhRh96oX!-!ng^82Z8MUu;v%+Twf<`Oid5~kB#q8ma z(0N)8WaQc85WT#Y0OVMco`?vUYw4!pzhlm+D|*?t`!BT44zUQzMU}`zI3Yg)wYQm@@XIC zPa@DZD@2~5AK!8?jJ~jFk^KnKi1n_f`IQjmfWvYPEZsx2nWHoRP%GZP`>_`MGGzbT zrgM+HhUB;1*MHGyx=su^)y&3F8viP7DU zi4Bd*FIh}wB<4#NhUe5cddO!k(3mjH&MO$JHw^E{@qL3gWAb8_Br_bqgU!U)N|9;nX|8-wK{^7dx4ZPNKyq@Fn;C3Ho z_k}~F7zIM!fp&uc6@#G9{4|RE!#(-j#XO!s*fNXIV`7{PE=^8xzckheKIrlmi+WmZ zoF8F%Yr_xH&ivP}&kEaM$o<*4&a-L9`Pu={2Z;_4xIt_E(}RCvQU`yn&<*KOM#LGw zHe{e=F$*+8cEbmm3FqeUg#GlDv1k5iITV8JF8p;L@6H;s$bguLV!tU%xHantZ?f+6 zx`Z7=6F`HF*G>kg4MadA;H>2b(qhLYd0U}cIr|tMr{;eC1_TxTv(DC2Ihfi|Y^>XfQ^#@b6wMr$Z zfTKVIJ0`8e^Rx^sXmRsu*_EAJDMjk;|T73;X1o zEwDC*G29ugzE1vhbL}KiuZkw3|M)YE$C08~O z(@Ud=ClUIOy7|QjFEr5ciD67Nr;ImhDK?Q*ye5RpAI;!jt;OofJg*Pi_|B234J6Zr zu;Ni+0c1NN?sJ3p|Ilv^DRKZOW&gp==%CSwvY@YB->V6=K6TijM?$#mnQ+yAeDD}-?G)a`yU?;u6<1q!~v zdtH89m;A0W5WiR`Moxyc_ zJs>RPPmp!pp5f5{6<&eAo5`89p0`4>iEQ7x=xN`1kz_1I*#_1?&P06Ef*9&RdWEDQ zi_VAeLZ~=mWaVU6$oxFhXMRLT2yj{|`v>w#*jk>Gft)^XhP2t+&%u=Z4~!C7kMXcg z9t(G(y-+Tl1KrKG))Chm1B08DWD3U!C7#l~M(S`ZDp6KJAts+EF64e#JSc=}3HL>% zJ>XQW43O|o#*XGQ;S?3!N}B1MUT#L!1wGCE;{=dK8;1%%4e8Ma}`{%p#P z=BCcW&I#cntdM_!1R#>l5!~0CYz6r?aM%Cg5biEYBLE+n7%A7`edj8Kp|{0N7zH5) zHm5`@jZOn2;2YDqo@GJ>S}W8E^ZzR(16G?5DPE}`w_-WT2j}0Ig)Q}Tp>&aohiG&Y-!^3PIfXdKdE{mnLxeURSt`4$znia5pO|AGLuAryC#XAO~tYeI5E5?MT@F~z~OZ}jj3O_?e548E{|Aelev-W zL5}H-gm3I-kNW1t*A_DCiTrLpBMJMM$mxboY$Ex7N5U6l2~B@O(2W)V0@g?!#SW|! zKaC^V{jUg-*j*t8kLMbfT#1;k_>&TbHf2dKB1JFgdH@=xhbn6-Pp4u{gc$#Lq{D19 zt?o}Mi>+2sP-Z}v*e0xwR~^7fqy1D#EU}&z7Q|5PAIP|deKL)wHA~raVZ^K~$+Jno zK)4X&cGelr4}em-GahwrPysv=CNz0(ZAI1Mb3%RfLSmAQ%+L=HLpab+u77og>q5C- z^r2jI2vsW=X@wCYufSXR^SuGJj&=3y*7(2A-gUd4Kfz$SVDm;clMmXqVEAu&JVYZo zELEbRcb(rs5}VW)bqXZFAGQYJ8`;xx>|7ych1ReTw4qXA{lWLGHWTREngQO^Upj}fBz=(A$#-D);EVSe9ko^!?u zI`^`1JOo-xS;$xbpFMG#G6eRmLxzI8WP4Yk3wgzsNc0sWLOq;6;6Q8b09Y-NY>5Im!A8}Zgy7s;E6xh3K8TfQsQZ6H zWEeWM44hx2FS52HDXUB4G~#+1oFv2+Xu=B0@lws0sqZ!y<)Irs!VvCa84!p$#AP1< z?pUH9FmFE>{rAOu^Q5i*h4xJh8d$QJXid_ZB+3dALDs*b9T>n$$N9`1gnFdj>dO#r zbm=daEFpmomc^KIrOsM&X3y!9+g*Ftmfu67nZB z8i9CMMDH%aE9RY_@M=73Wg4ln!9os~<$kT`if7reQ;lTjFq%aFqS-8*1oZ^6(mf;A zh$}4M(&F-UI(AKLqlpjP7~U9cH}u(a4@ejW9G~LXdrq*VqKPzHu0}6c`P<&wKYnU0 z-SUz0cOK#G&947<;0N0CZwA=Z<3zz~?Kp9b1?A@9d{4k9NK_a_m$(zoJ{UbATtAZe zJ>Nt4dN@eRPyXCb0=lUESLpO%jRZfL zu0qC(v2hr<-&XpkgZO*n-`&K~hsY{p0JHsYd3raI0~XTKbQ2}aoQQ%AU%C@wv8Y?G z>lH^GpyMid@j8_z7$Ew8cpBk)N?K-i?$`&kljZ)ay1{op*VUUvf%3`~7AuPHem!-@ z@2&S~P}HtxQ3v+m#0x)7ynFiYUk7eJ-uir>*z3rDZCCV3{QNs=6uer$>P#tNl|hMj zQsfER!LoQld*$$w6WyMd-pL2ipZ&7upDCXUR=iRhdk%ivLYPPy>{YKgK;$SSlYLh+ zu&USW?%oRXJ@+$y;HLs%3%Y?2Dnnn$cW!Oe|0PldGlvndko8a^Y#4ha+lIE1V5HK4 z{k$e@USfyp7ZSIPuPa^9p$t98>xY#3xmC}-B^>9&KL0a>E$0sW#~7;og`Y%6OKAl^ z8@?RnawaMG=VvEvU-|%qW6cx}qBz^*dXy8Y(nfYk8ne|_kTC2oO%nU(>93u_3l?uP zn4rEtHE`x_HzNaMoK*pbLF);qQ<*4Z(CVi(vFbuck&+-NiI_PVEvIUT8jMhI5& zX%Px#kAR$Zn{_P1J_dTNlc)g}hT2A7EZo@gGiu|#1H$&|&7J$r?0H^F2)%I_COq8G zdMG_m-aP#~eg+t%gwJi*J++>Z2B}n2Q)a9 zXgGp|0(IGUps`jpd&aQKzd~s?NGLBGbf6zaIfC{wxdT1J;Hz9QbWg0QV_g#r6Fm~n zR4P!cYhHVGw`#^f}xr$R6dk-s>mVvS~ZXsM}DUkZ>e0@(}* z_`!^7Z^BTgc7w}5JMjBp>z})8Q&mEyD?>>(4yLWTDo$vLhb9QoMN_v$8W%| zK916|SNQ7DUruDqb~~#+N!tgqU8vUoHTa&u+E5g*QPN3lUyG)Tm{WfegxEh&BGc!p_mGjV0(A7vP6*Et;~_=)hVXb_^%CU0^z{^uQVk5^f=;}+iu~Whb-SC1@0= zhl#0HAHK3-=au9HOfceD1}Q`bdG{5Ek^GX{*1f4aG{BOmbw*f%@qPg(4fx zLXJa9gTSx5kW)-e5RZMi{hxvV{#IyFVUM?`Vsp!r)55M;cBd5t2wU6F@0fLiHw&V5 z;U}0j&iM~qoPlYtU+>wfDqiu-pkY*7-4GVEv}S)jOfxZ{!*9CW$|)o59{MaKbOg!? zz9l;*iaQO-hBzcq&l|X<^29$RN2>a)u&kycNmMFM)nC?xQaQBFVrrPe28{c^*kBk5 z3;8}(g9Nk5Y#*O!=`=7_ND+XY_z(M#x+$I+L1g54*Tw@7!nwH|J=N2eC(dbXyemBI zsSXc7^%_`H*FMyV78|Bydp{txm56mnYfcQiRhjoTf!|F$CNKx`Z&3a?#FQy))v z6CZiqYk%!Ba<8X46=|Xh4_CdJ;*GIh@D`A_d&QTG+>~G*Xq&jqPtb(tZfpl_&eJ1B z)2q@?YW2CS4SO(9I-p;jv8hv#a6a`fc^vsu9y162!JZH@jBkqET&J24Ye7uvY3@#O zxJt=@g;~puQgX4&g}`%g6A<(1_4wY+IZHlM@jYjD(2g_D%E0=eTFRq@NIFQJt%L30 zBarD zfjuUtU_Z2fRRqvO{-|Fz@2J`{n|p_OLE~4o{$8T7;!;ttlMrnAg65aB{yw;s7TqE( z<#yWpJioa09F#)WfQy~p^-QVPAnh*TZI25Msv|*zs^QCbW442>hwR{X1H%V8i7vq0 zIK3=6kJSAj8`@%mk#0DBOCo%>S{lFh6CK?JwN0I>bE1>jcFSkv`16T}u0{lmbK-K1| z2&)(NrT!=Us_y^rIFn07A`;KR_g_AE?4Pj-QM!c?H-DSU{|NU4{$-#4Z;uxV&KPdl z0!uKydg<=}=12d}<6Dyd`=b7zmHGe8%GfF&nOIEKhE@d&RmMk8=}k9AtmxnFsSy5p z(~;fuDzm5OCM1RaPP|8OnHfm1N-9Wms1#nBk~93k6)s+KFVnaLW4jiD-1an0u1 z3f=iBqthEMt#--!jrvMUHVnOUyd?hq)R)8 zAj7W8F>mQmGL~Ur*vXgF1^$qH{eK+8>n|LCCm^pRy}Ubljo0=o6WS`i^cg`q;y#bNz(WrwKg&*{TS>>vL11^s`kmaN;oPcDVX?RoX~8K>U0q~`T8 zUS-$6B(*GE?e^BWwWPU#?M*dQaStXJ6|WQG=AU#cmRyZV@}s*Uq)NBHU(6T~Pc&H1 z1V^+{Ojaj8QpR*4C&sAnLbM~b(sztX&MvE@#Dv_7vrV3*{h0ZWAIIC_5dm!9so8Ge z#_zm|7Y>u1_Pq_fN)xdOj-m5oHsJi2X+li>R%Rs47b)4jv1k&3B32QWbo`qNV)N{> zKP>s2qJHoZ@|)GvZ=-hFz?Pky@%#lpFxR8;jqKR#{Ue7eW#Qru-ZAe|jT%V?0Jk4L+Y zoB~)_A`G)Sdmj<@M8sD|jL-9}9=_=aH5>0P?>SYNuTZEuZdP-gdR=krdKmBv(^;1i z=Tlzf4?z@5-xM@yA2_jb`_p?wD&%b0!BxBSu`whYxyvKqA_@#s0`gUhkT%YWa&+b3 zlt~dov8E#Q$!Qo}LK;wI(oqUIGy3dB)Y+n#h(=1L?b{98AC|oP^k2JVH~Ng)q3JL%?iFQLB?ljnWA+S1I zL!@sEImWszHV%c_-G_W(|89oPa}f!ENJM4hG$@nO_(`5=cEl{_Z8A zpW`=B{*3m)qy|j@G7H9G6Q|ia-^?+tGVs31N33T)lbXd|cOEw>P1SteI|W{qCUiVg z4PCzC!>lawiU?Sr>!)RL>L)X5yX40Fh)%Rt_e}M1)A;MxmR_(gKJIl`ctHNcNLi$K z_k=30_1hCi)IM+A(WUKTS(c=G7pX5Osk?_0_s6|)J~w>bUedzMt5rNYOX4K;7(|UR zR`Vb*NEI=%=QSBgIfC_R=qPh@f;o@*18c+D#-t9-7Jj~M)Sy|Bx9S{8qQzk+^a?K# z2qRDrOnnAub5ZDb4s9MJdJK>eUXP7LXd1la?a>iB2VFij^?dR|Cr^cDIRS4eJBvmY=ItK# zOYz>f7D?zjSm2!m>`YvK8H+ZhZ66d9w%grz`vbk3yvtW|FD|O{DH_!Zavz{r8m9Im zM;&EDDiY1a*wJf!{DDj!mv7Ur*`r#EL44k_H^jRKSi3%$YWQ?U&YsY+Pkr@fI=zgN z?1X%!e?C;MmUSxjxO2zx>)x&+_~JH;=Jfg&$u|um+*g9;KgJqb{P2eIS3^FPfCy&< zqJRZlEOlUMcBY{?x?C1EqsBNDk=8GMP=K1I{1aj?s=p3rzdvDRZ(Cy^gXiv$B65y#!$?Ol0VzchB-Vi=&_o@c~^ zdP8fczF+BItbW`dU{l|y3pmG1eZ0Bk$KE) zW$PV_F)I3c=zN$b0mjF8s2*AH&o*ArNY;FojGiTE-ik=hbv^*~Q;bm?<;nR0od~KS z>+6oYw%;n=Iq@zZCtX88nUoyszF;*UN*(szm$tq*+;;1gN{Y!vLg7gmU5#6!EF;Q0{SK_3I2Gc=aC_UhQI%f2wJ*3$`fiDtn|8&HQWjWX%DAfC8{+k* z!)twAFH&L^L{}gpX6jtbU9h>$LzH7FU{!e!2R5p2MON)qSDZ7+3-H7LP?Y&gx0Ltq zul**pEP z{U~Fo6m^mIy2EqN%a^;SMz+*h48VOxgKlDq^%GZyi<{+_%q9v+F0I}iycn2zUHBQ#w}7*7bW#~Eo5__}o2 z@an@?YBCC4E=k(8cu!=24ly+#5+AW@r4*bg8v<;BfYm$Cb~+w9>D{$lzn=~KX~|p~ zHb%fDw@6g&J-l1IER*giW>GvxSG;&l3vpKhDCC^PzH4#QU=?w`tOs;Ts{XMfK$3B; z(#UJI$&=~cZ zj|nTU3~#eWC@S7zL&{=}jO4V&C&2*T`U)sy(rlRjNj`krfc)-$3sXUrMk> z4<~i1wqJ9?rbxW)BfM&3jtv;3)b9tTrpb|=PseCY!A{@E$h&$Y)EICUyMH;oeuhv4 zlId8@S0&bE3}`Wrp`uo^Wk9M}d(xNzeEWT{-5^rexpCndo3SlU<^r&PN<%Lqp}<9B~e_Ce7v#C4pa1m8l%uN( z3Y$!i@KYjfJT|DD=6rEv21LCcx-pi5s9e^u2cPxZL-Lk|ybk$sJN~Nv*M(i?O2!21 z6|ZTmloqLF_$@|aHqjYI(`FC2^ct{PAC`vcyO1XO$j%8Hwj!E|X&lVpXM|6@6vF+* z-e`OlJ~5dFt>38dnd)+^=$~9&dz}+K{ApeP+mYJE#}vo)_qrQ-Mw64GhD&(uweMlI z-;8$Cyj0_m_Kzb?&i@{X@g>r_(K9a4d`=@CKS^^Co9Jv6MRl2QooAMZ(vX>t9BS7) z)dP5Q0;O7%7CdM|8gxM8Y{l*+S=22Ni0^I^xU88*lV9 zSE%C>r#?41-rv_U8;37wZi#ZVy+KZuJR9WG&mWLu;{ZL9C1 z^XG&UW?qaNg2a-fgPhk zQ7+FTM%!Z&Audl$S4$R*aB-|CT>DU8zaFKSd5 zM31vw^k^fXXphp@`=4c6FhTfN+krvt-gW*{U7^t4rGB>r zPQ73?d{WzH(VsogvbvC|-zt7>T}o7Wd3g{&!B3NY?Cw<2%qOjXYi}_47Go%=8-LWb zl~&^G3zb?mjV+g;e)-&(mr{So7&s&zUvT@j^I93E-}il9BzbV#azR*NM%@wAoZ~Pw z=u+?qGC&nmFx!Q>dHzxKe$|}0Ve}JVm5Hpcoy4KscJWeO%t>GX)XWX#r4iJp&GR_q zwoh~5s~-_^td@;FJwdd&sBYru{VE7Agc$4(YOg_NMumH-vTojDG3H zUoUUOq3!(SDHW$9hSS{*TUd6`FL2y?IS!BIF?T&7z!*8bkysnIJ z&bATK(CkZUz-x*_@T>8iCsJy^ylQo%Napxli3*^zIgTs?WSiwA`Yt|>c_v1o%95I3 zp%&edB<9^09IR4&L3eQ{HWtkI5en}S@D*_~VKC*kX>)>@En&uCI*xb9+c_!^ylbLm(}}EWmxfS=SeI^>sK93gAOn5_ zAaH44w>Lhfn?r|Q=uYI}>f>WkUBliGwWLLVW`=CIzBYOuT`a6c`FlV6udE3!nQDDp zKIOd5k5hPX+C^Y~z73icajxmB>97Az(&dT&wVgW$ibGcGG{k%Y5X6-_KO^rQOg3Uw zXmt&T%`C9VG3C=_Uryb8WtrhfSnc;RqX`6Zl04+C)qcvh)|dO%V@CN}ErI_5w1|C^u>Xea<_5}+Ge2tMPX4!Wc*d;+ zvT(7-Rh@>s1eiux5^rM6+b8hbbEm0Oe;($s^%5spFyRDkcO#%cfjVb?+Ozn2q` zjVlfHzDx@AE z;O^8oEOWlY;cg06ElF>Y)*VH$C7{i0hFeEUuB6r0r|cGrd1iHoNyZ~)nvj1WnGSC~ zi}2ECwuG_!qlZ)Te8eXG`J$6=pM`W`WZ1@Ga6p=3l}FbFS6afzs+( zF9E6Bk#Z;!)DPd_3ubAz{qWy5r~4xikH004fVX$~hP6078r(`tk8E9>w0}4S^O=0A zyMd3Sm2Jg$1zwSX?5?Fh-uO0dRj&|OCneiPZ4CbUe*Am(5+C;)nI0Adn~|h4WxL1$|^BI0C7nc91ghW8|wCFdvhScdD4QB+*MwJ@4{P%Zr^TO$b(CY@( zLqKiNb@TD;Owf;D+2$Bc|IXwTAPz9aqHp?Qf}8Z0=ag$%2wygFTf_WVal?$e_UcGx z_+%Q^ix>OrDTmFE{doPTR9KJ~Qm5SfZ)Q!s4Wm`GqKqM41Jc@F zx@C9eH9^Fa9omZQaB1CA{k|0c1~=2;B2_(n;wxZef-W)<4rmMMlC1R_&l!tkolzu? zztpZFQgP36GmV-9w?>oxW%C3%G;J7?>Tf^mn>(eFFWa~goK94zkdK0deoq(s`zgkoE|^vo-B?@47+Hr+bsUuH`DjB!@H1e$AG4d~b9=XEHFz_64($ zJ2A%!)4Zn0CZ2Q`0Wqd(uO_Z%o}gDNtm_UeU`0z$lGbaD55_kVZI0LpyS!DeBNRw* zg8-hs2S=Rsq`2j*V=N16u?7RSt(Bans<*faqOJK(nmrFG8Z8%w3HN5$uRe!Fj`=!G zLH~)WzrDx*5v>{z&EBS zQwz_99m|@4x2-BL^lJyAhjpBFgNX_BUl#Q72nSF2YM4s7aU*$P7{%C_QR%1} zGwYZnu#1QLC}~ZGh1+p1pjADv&~yX$FW2sEX^kU762Dc}M;8VIBrjp^6)Fz%umYL; z4F)#2jZnz|%&Bh>xI|f2)C!w*KA+pz&8_dG8*!vM(;Wvb*4cT8@b=cr%WTU0%!4+? zX0+-43QPdpJury)mshe`1atlAvWtYlqkd6}o8YKaQsgtnj-+++$6w)30yeG%KZP5g z8}eI$Uo>q}nVXyo$#Ppk8R#=OO3W$Im(io{+Cz(r2UH$JCwqD8Hn`tRL!(Mpoh8y5 z?P26nRiauEJI+qIC8Y{xuFR%z=fjk#Pl~FwYO~75d5t+sjb3_&`Eg8t)Q~TV{n`JK zq^i>BmU+|K#&U+=W02QWhY{{y8!;k}Bo#UO?%M=;L#Bhgp5GYTOx#dm(0;@T5({-+ zKk0UJSgm<&9EDI~$RF`S_biYoD*B&Phw z!RUPtN4*_p{E=%=HxTa0cpx+NB{ybb=ZSWM-*d4=rUH{v)Oyn1c}S1*!t)=+TXe^QR+0XL-tyyTj1i8{|6rWveNMVclTE zc8(HnCmw8gagdwqmk+slo3x;>dcpbODtQdeB3YqQin)@Vs37My=ah`dA>w7iFbo!uDp z&XA;ylk=~hd)HAtZ<283#S`tzw+zP>SV3pmYnKoBJ}e_{EUqWQ+^=kpN>2h=8-38f zZJ62azI4wDa2pktac5QcbPS|;{Dz%hXRu1)By?LBNg-4j-PL~(8ICfpp7WRe_ToK&D<5DI7M9u^&XQ#(-{*|LlR`?f_6!` zZzM!&VL|7NN2n*v&AByn!O-3N@`Rsxe4y1-AJMI8xhO2lCH^D(1BcUe0q)_`(WtNY zrn8b7WGfYWYU#v0)zaJnOa6MtxQ*`f8wE>iMBkgP%j*~P)xvCNV zEwA9U*)5*YZ_E;B&-Ud-;)cEs`PM^LaZGMVgTeM=cJh$P;-taMc=j)aY0_Hb)C&Xa zyW+}8#12nNGQIK_V`-NXPtg@LId@2V@o=N;vaIKqKWGHBY}$ML>$sscgSRe=ZQ==} zCx#1}cQotYbHNU=$)5B*MGw4-19l+??Qz=T17<@5K7dp?p4UF3WDAb(X$y*TrP!~Y zrPI|P@m`m^vLY*3AUKobLjyf+zvEK)gn$ z2HAmO?M|Et;h>@Q3VP9E>FouTBSJzU)U@iDJX4~??3y)D=yf+I=g@!U+sDri#R~UD zwsMuPSP1BqgC7>=+{0n_sReJsNDYTs9Y)?s%Po*qRU=jPSzx;-+j)@vvF?k>6HKi$ z{%L6X-z?kPHmlT;5FniV~rtJcSW(59OPMRs6gcLt;?(?P8lIXQl6bY1ri+&OI(v~QB9!gqyv|ABD5x-=~x^~bXlKA zC&H-u$d2%4tJ${TytUf zz`h{c7>T4oLE)Vh#OnTPa7R`-u}?quHcIg~cv>E_#Qz988+X%x<~2nn>kxH>1S{|Y zP)c591sl@qhnr+2TYPD;RRr~^$I6)}4YzRvmMtsD!I=EUKpn&Dm`cGFRHlU_xFXR? zx=m+(WOpAVZ%oA#zK5CJ(SfSUc*d=c@w0Va)rzt!y>_V&a~ip^_^LOkA9;8*^A(jU z?k2gM*#T0fNG$DtLAZU$0=45Miwc+b?zWJ$Vd?Bt%uBYpn^=}6nXe-sSGE%LX6EBV zqJNiiOmRAV&JY12={=UdhM6X|^#{(Df6IE3G3(YGf-X}~Cts{pp(G60sPmQL$OWHb zOQ$97wWPjD6kWY_0RH(NfC9b~1MHM9^Nou+Ojf;sxF6MHq?zwO@eO4|RtNSMMf)Jh zYU?sbORn9unROV;0|UB%!%FS(RGZtO%bd}xcL;0%#d>-#X+B*Xd{DduXq;sGj}myh zzi~ev+qnncO>AL`K3@?FpGi8-xRD=(!DT~l3XJZm^i zi%fnvF~;l?SIDz)OucUkPOoXW5%e&7oLA!q3y6^<8SD9p^w$lpDFqq7L32f2vtj2S zoM-Ft8sItP#5E5`0>zG>3 z4WbWrJDnp-#DZ$f#>63>?HP7?+=rgP9(6=ciAKJ6xl~Z~n0T^k>hj&q6ru(^yD`eL zEJ4PmKWGM|K3(pb6xNj0V4)Fsz}?@xra*_P#dbxb;Ox+P08*vK<@6@Qq@3lWyFpX2$uIcXUGR%p790S*ezW0!YhP`-f%>kvz-OZN zoJa4_4CH>urL`VkuF7bHz2HhsNs{MC(()hLud**Y%P)n4@&FH)!_nRD2IgSF@%z$- zf&DvBG2@g5FPrgdAIsjF)%gZDpJQ6(O`%}2Pxaf2U5&0AO^4LJ+@7$xR?ENB^KnSR zI!t#)%?=DI3s%WNDZd&|M%{sltGdB(Ct1-A!%-4F%VIK`2#{U3f<(|ti+8rICnUWy zD+r)L)@icORwt+W-Gw{hrCevupR&`fFN>NdF+kTivIUaZQ;DA)pWT(U4n~ULkmG>M z=ZDUTc7YPWM+n~Md=Pa{i~JbOtfL)~o>Z#@cTh*@v|e6FSFAhB#_G$^>2?dwc?4K( zb}a*v%l@NG1zEZVc8$Z3R#G{#@4GvmES@gAFhv%$qm5CSz!P!2$C<0QR#A#0%el;w zE_lb3$(Tn}5RSD}v#d8Dq?|()k0w<^)E=f(7DO+_RjY`vYNzK{wc$<=)XATm^2FRRNDnr_Y?YZ(+3qL7bH7o`{`^FQ zY=5Rg$5W}&Z+C^>%T*kvkM9na!JVhX$7HO!Ek+iILTF?RvfzvfSJkzXA=BlZoS15R z8HgLPi&01b&GO7}H&)9cG-CQs%wjAOfEt;@_ul(YtR!E%i|o6%h?5?pyiLJI4f!HsI;pxFwYwdGb)qwDttVt*LhwV7n{Qdy#)8*nnF^img| zVx4(lU+X*Eo9-+RT994%`t>!x;*n0j0mn)mCDdUw-nUhja=Bd!ciy!ZM6LG8Brs@$ z7ltLyuKMrcEJosdM=5P}N`4x%tx=X-6Gq=hkvI5z(wx5lYawtg`1-ZSP1YWa&}-!VvV81n7{3wGYnzE2+@+jZXDehmc~u zM2yA2QJ4)gaU^x@KBY*0ac84gf8Aouw(|sYih~3qMIrVdD-)?DV?$8$@NGGiK z<4cg0ydS4)+<*s8>ebv|Oq90w8;Z5Mx1#l44*zsT2HlO1VPD-~AA?Nln~Z|{PQ?IQ zLES2{cyY_vx6y^TbN>3Bn|Jx@Vg-dS%>3bt&K>DZ*uig4?<;}3k)ewh@WCZda}W&; z9O(gS{=?|rSMp86R$!1&aLQHGpN$MiNAYjrB)H%X7jvd|0jP_Yw93#~cQ}9_Ft5>y z3o23tcfYO+dRm5mjlEye6UBG)s0mvy#SGFS$pM6+ zVn3QS{}@^kkuMP8lFOf0iC(kaa1~^kr_}qG^puWs zUHK$n8lxxpbk@*x8mO6rT~Df57n6J~$NzZ7HF8X;^SYn7-!@P9FUDiyfVo~3bF}CN zdUSa zt|l+w3vJ%f;3(zF>BukSy92RUpkkzUs!avia{||x)G91IVr4|20mlIH85TN; zQ?=W!Bd)Y_jZ4BBAB#}O#MC?G9VjB&gAfT^9NxYR$mecv59Wm2ewZ{<_X&TyH6heD z%~yy2*5fQ+!Qt53$rvv?aYk zx=1uXqRnTPw=LX=i4&jp8%z(_gA>H?e8;3_FI*2&r>I+J#6GJ$=32>NIbguP+udVJC`rV%w_p)Y}UkVmczXfH!Py}uxI|~a$=;2l4!ZXr`vF%t(_3908FrQ{} zI`Q6)&(>@cE78PXiY8h@bnHy@&9$+YgqYqeB1bBlS@O2pmpH|+=r)-|Q8J4k|55MPTM#0N{&&}6qEqB>Ju)MtupWQb;pu`a@z2IZH-`#Ragkf5 zuDy2jyM^X6AzQl*OmD_%f%zSmF0JmqG>Bb4KFecnXxtTC0w&r7third96Mbgih0Tq zd-c*l&rO#HIVafC52)I9p!w@F)S`S8W#czb&P66fJ#43Ji&KId#}f3SLfzfN;NWy! zeDxQQX2VS-l|@a+3)Y!$yV6*dc8rHTNX%%DZ)`%a7H{Q zhmzv{g6#<^19{@QRxhesa}92<{~-}Qek4f+P^H26(9R^_UIu)@B?fejpMpr0Tv=yMHA{rIbc%ILETLf=cy`yRUg7ciQ>LC01p!oa0uCe>GW6 zSpiBtv4i#yQe6r20e5pk)MG4Xi#?E|vRGAIM?!lXbG#JOqTls~yrC5&od~nqYu%}9NtJ{P(C2D`tm_;+Ii=7$ucBRnO zZ2B%A$Dh*>CtqCBNC+1;)^`O|mZuWLoXXgUH;b{Z=|e0V zP89VNteU3rS}w+B=?_m)PJQ2HL~wMRFjgkXu*4PO<~|0trAMGk!8Y~8oEx=P%fDHL z=wCfxlaQvkOFuBbJTXkIl*(@_5TivGu*_vWd{bsclG(IT;< zNT(XCcQX3KjB3~X7MQ`+fWEMSkl@en_1dq&M1%oQ^irgY;XIn>7w0%b$-7nqhzjUj z&2GsUumrhjd&M^6eP>RAwJvO!Xk^ICE!aL(ktxQ!1X(ecEs}T5dSJanvP$W7C0_FQ zfW=*i_&W1Jo6MY<^#g8J{~`jpnJHwozk1SYkuB@|1(pxiAdtpLtyb_5Jb-}&t^)Jl z?{ViC$98P_STV5v%dTRJu5Ej5B|*%TH2&uf&W1Y9 zqsz^&zE4#zOT=vHz@1%G;w+~A-sSaYW#za{qOj%n?H_3AruArHp{456GtC=fb|m(W z<6F`_?g?V#XW`l%+v;a?I_DPzFkKNLL;T|`T6autMKA)KjQuzrmCd0dwZ7{LW}4|S zq^p7Xr$1GEhTGl}(ozYV%YA`^DOe=kUn`8|SS#rMrs^9gBD+^cD#~FZc%$GUXE^L} zm3Ple^otMTij`I|v)92Aq;q+mo%epn#a0bL?vn7#frSTx8p_2P%IyTWHz`paKWIN; zJ9s9Rs_hBVl0`nORMmo$RF|r+7avPL(hi*BT-mb)w>8LOn*Wfs6S4P-ixBtn(_BI4 z)LP|SRoTTD0!5OnQgVTGPY_(GWk6ZuhxNVHt+in`9z4FTtxWyASNh|fdx9Y$1*fp` zblj$z?CTjEoUK-rB!zHQzMhw@RlFAG4Ec92o-;mdt@8PrZp)B zz!K}6?r}at#rECtKUZR?-hYs3GkeX|!BD(j{b_jlJJA1C+zrA}-Ag?w8S6}y{??1|He@};8C^jSeMu^_I zrL!ZcPt{{UvwSu^voK}vHkF5Bh2(4u+TQPb491yqf|gZfg9SAAHq1o0TOYnxqQS zjIN05861rhzB*8~3_o8u^}gjQR@jZ~70b%XtXZfa4UuZ5-edDS3rs6n#gx<**V1eW zaa@xw?B>e9ww!YPNNA+Rp%h-a+upF06YgG5sOvE?_JpU}%DTn=-tX2mA>N?d)n~`t zd1HoNk#TpelB@?)Bl~xDcZhdEf;`^QWMYd?Cr(x@J#I7j%S*rU_xE4{Ur5M4E1~9# z8tyMad%Hr1oRH!qv?XIm^JXdfH`b_jdQ~L)Z9Ok2k|ozc&K~Z`Cv{O#6c?9YZP&-z z6yDTjWnhNN&t?hY*Et|y1H?-dmd01 z7Y~wJ4-btNH(P*E?ro(R;A>5^b9E=6*;#o3K3%xOBc9hfqozEn+q&CVmow{JhpalZ zD=$oG$m7U!3jugM{dVOYh7G7vv)?+pP0^6~@hHlD!3@Maw-S0oBB=6NQr4WBC7Is0 z4&NF-!v!_i9jGe59p+kais?wv*_<_#UpBKeieGiC&4*V6`p3{QMD2Em4gar3&N zJ!YWFj>62ummls(O1icz1bUXeZI1>WQ9+o7`(!Rz(l8p#=Oxa9ts%*cw6k+}H+!$# zy=hM?du;QuMV|i5RH|BMn3}r{A-mF&K7O-qJE_OPw`sbpcJlEbg{;I$Bl?2La*)H808B!Po32 z`zGjPJ-d&?c>;`)5_(TN;Gr&MkD?J*??zUW6^TQd5Nr=;=!9DgzPg@FHd2vPxYjkQ zit1dIKJ*tf(M0{P>7Ld=G?NNs=N4NQv_45?#V>{#3bti=llt%vWWf}_<;m`yS`c@_f zc;y4pyCwY-byrK+Lju-M!-(9aUK!fWc>@d#uUo(Hh;6;HM4(6q!}KC>k_2=smqQV$ z_qYTBQx<@HC$jAGz?I<-xpj0|8a;r9?o?tXzE5RA!WUa0JODEo3SU&~8lGSnK!m6VduOBEG8b#I-t zY;Ny;C^orzy6`noHKN(8MCvT~%0Y)d$~n%(u_)~4)0w8{Q<6>wf5^m~m@;UKfyPpD z;)!nP0PE~4g;MQV>K4ZWRu>+pPpSw+y|~6aiEL&iUozOwc=zeDH8#x}dvFJ%Z0SH^ z@qIJwPFATy(z}r<%HA-9wR-n>TY}L}D3)~zx+l~B;A;Dm8J(HsS~pT-%rA^m=hQHl z4_-2Em4a{ebBnICoz)k*&hYKK`?r6utE6LGgNK zaYtlKrXCG;^QW=It=;h-19jZGqt-;FC5MgUXn~3=h5;J1S8no`?EU1`B&Y8V!gPE* z9aln5#jtBgw;iJIdgVGG8sFw}v0G*xCnW?T^%7uLq)hxptIT?Squ^D~_l*_LY=QBSM!o%{7YuAyUO=ukGl*5MBL|*Tn0&n@5ZE z15Sn%i!T?CBhHmIbiah)qG+>HXZcz zR=(-6knD8()Y<)sPuq0GpuI-+W$`WAOO4y(BCgI4b2N_9UuL;%+1*yP)aQowbDVID z9Xpw4o`lm93uu18=0%gw36&ai=k*f5I$X}o zQ%_YbB9NsId7SVIxutsCFdtMOg=}iyf5*m|D)DBg|MqC)g{eef|U0Q ztOW6gJ)3q|)X~l9Pw&Rdcc}O$HT=Flcbm7X?QSS!R>P!s(Uw&@u4Wt_F~4pXF5%~8 zU$W?!{AP~ym}*EWRC(xFNZLIj^52!5U%_%b#BGyJ5VxqE@tYof40r^w=W0v5JKxjF>QOaYTNX zQ%z;)p}uyZfkM+8HETK3_iBh9@;>gECG-Y-m}IKui{EbT zKKTCUSYxPXhv|`GneyY@!bK%Fw2ef+xzo*du{NCnois4Dw;&l;oJ@XqTXr)9jxM7%50-bEotg6pX0A3gyf5f)^(k?y83lbZ@;e^;!ZAnshmAkNiCQh zU=o9o)-<|+FJ^usl*pgK`KuxTzu%>HZ@SL=(FRu`UZ+ zs2-`8=6n&Lv59 zUbLxr7Z{<~IyU4FWxXJaW zr_!=+l|S`J4?P!YAv>cNO#&Udv1n%@br^ekt~EeB9o97Y_G)|*CI84QlCFLJgzE+O zo7cG3DpQNE;ebtF_z? z0pn$jtqbC{7~k4fX$X}z3<+o)1S62+4ox%7DzJeN#60h17aMq8}=q@^& zW3B;%mX)4om`0RcG#xz17)gUk>n}8%TaSb8)Uv31>UhIj28R|{oINw3b7|ZQX_O2X zr7PH4!>_6+RkdtBp_F}oa2}t}!tfU`To9AP=&>zWd9V&VfIFCEAAD^ew~NRz4Z6Y7 z0v;*3bbzGkENL&5uRm+Mj?7yGBjh4rR1IdExNj|_iR~A3{wBK{LYdH8eH3>03y(J} zNo2klAMWJn(t^2bifJL3?bsTpS)VdIkwR<0JB9XC@+iqgcu69sutB#LgH)`g?+<&| z$LT^dP=8PmR7FfsZ7z!6+{;-ZC#Yg4=?N>-F(JpIdV0g{)8pgbjfye!u_wCvmcfXW zvq@5N*hh0SXPVlR((iX%eYSLrR-vO&mVD|UbC!ezb@}g8xss5C>%pqxk~9#eHb#@i zF#IsHVA7QAJ8eQQooZAY)@>fG+#aIXakqkXj9WD47wDrY369Yx${0MZ z4RZeIsX^Ia?Od9CB1vp5KPdMRbjI4fw1hwbfm@YYnl}6 zlk2u&Jv|@^#zNj2Cud;s!gSkRV}$n_j})HFh#AR~VD$awlOifvd=BXeSUV1em8&FD z9Xp>axk`=*t)CnTGOehA6U8@Avf-xE<||4Fd4ouHFF|_a-A0^tED-Ph0cKVxOwYB> z5k|V3-VjJ5@v4WTV35+sx*9un{9LGuxs0()wJ z*r0zE>B%CTVs=8%U-!~S7*E6IT8oq1L;J`lZ0#f#ttz(pJ3MmY9Bp_wnZK zgDHibj+U~Ti2I+fUdk|;m}wtBZfJHPwB+%1Gn1TN=Pcdk+Rg}Jnf9#nthM8_I=bb3 zuT3={YJRZne@-1OWqDR;?=|=OX}Fc>fxds+%J=OXEjCBJt5b9JQl;|iqx?VS({VCV zw()tZ`1z9C`X@!8l#oTnBlbnv&#Jx`pgKdN@oYy+Wv|@nk|T-`HPn-7xUzJ%!v*aG zC;iXc?&Fl+6b;LaL;N_Q3eZ8VeAhnD8%Vz^Ico8sPc6Md9k}L>xOyX@vMWlU`ih9X z`^+!zp&(6_R5crzY#q-C&KQYJ6(Z9A- z-Hz?VUL+S8FFE**X6|UXEiPVT@4O9dsx2UwIGc0&#&bFQi6rf%h`foO%{+-Vq0P)N z#k~w>@kj&rYc)v2wp+&pM>MwaW!Rd0UR1BA*Lk@KBL>SX_GV$qW7fY!ir8p)ooiA9 zICdzXY&sv1Vr2>H0X@1*A=lfg_X_mi$Z&HHy7JIKBwQmTUD@AY_m;xAho7VP_gwLx zx=xDi<2dC;?fFioSH8X}IfI{SA_PnG4?SXerj(W`BWxjg$21Y!>*j2oJDuJyotf6Y zUmjAJj`>qSf8A828eS){9P}=YhRX*A6@B|s-ZwUCDkTSh)1ab)urg2=YgUc8nP+MY zk)rqhY8rnKK|7^4VE>Jp`%lyQGnytR1JR~6B;C{D4Uoa@p^Q}vErXFkY{NBhL# zh&LQNIi~*3t#6$@lO*G9@_?J}TsZb^de*_0jzVU!wIY{O_Z-II&!pZHYyXhE8=BD1 zNdX5Gn8PW)4no&d>1zqp>AJtu5&^mBva}f$vhd1f_l^sNUtZ{_h+ZBT(iF5J^{F1% z*F3C>NLnQEsgUqjp0?c1se z`iD~tW88SVJ`5&AW%iiuWb&esKDij z1Pr4RXofB2Z*&CEwZCk{uUaJbN2+Sb${L|cTRjaonIJ}ST?+M<3`6^%aiy5;jY2ERVEj-YSbCF5k6|>a&C#nK3X)l zj7njKu@Gc@GzBPEUmLUfX$(%VU^*1lP zji2u`9&9=%L=TZ&e0pz3mILu&Ll~*y756d=v^oQIx`*Z}?A8YpG2#wOCXVm!oE%+R zq;?Tcd-!>wb)<@Kd0AMLVRs{&j^?f&06gZ!tgI4_L%eQ`2(2Gk0|ttf_~c{+XUXqXqGR^1-w=( zEszFe)epw|=ePb6MnN7o-5wMgQtGBjkD8)@m%eWEBGQ>UET>kXe$RllLd$9SVk+FH z$*@h1lf5L=|JBbs!X2w-UG5b(XVez-@&p5vEHX|uq#qG2{KKg`sMmQ!h0@o@QCP26 zNl<9_d--9VtdiGvGr1}QQ(k@=wzA`+inrGeD^#&O!*-`%3{{FLA(p~oZ#?Z(6zit; zGTUWyuNnnRDMDf(#|R;5J%dgI^Bw=G+~m;jY`HW-U5SH`pJ_MINU8<7ev`rUcE zzS73mEV`GjRRPs+?}k@hq`mTXy-G&jX+2=O=2zB0tEYbIf3n)2xcmc;^UjG)#z1T+ z&|+zhp|L2#R*3kmsp0El=ThaxEX;?Kyssh%JIUF^aKO0H^&6K9Fq+j7$3=;2Z6J=F z>laPJRXNJzVq137IwfKFuj6fGzenY?#h!8&_$~OB+w*TbZ}tI~7>(9I z*JCbqDm4HX3`=_n*_cYQl%ie&(|#ax-c#GmU4=a8J%2NKSq0JhF4;&$V4oErZjUaX zdX_s)BZ$>S+9t&IiOXP1Bi!)cMsM9Jdb-rBsFNCcRcE=^faXA4A9mrK08I8joaHSW z_+_>8dHIPfxd-5YNMIX0p>yKr?E4LUYO_Yy(O=fe2Zl+x%}(v*@_Ba){&I7KOJP`D zzUzzA#Gtuh7Rhq=KZkFN!4I~B{t?cBd>>`IIUM9{M@w=%{a`Bi?sR&@vA{Z6#F0{tke+_6a`P_&i9>lZ@}9 zy6qFJRP*U_H0b)%apa})Q;AMRf~Vtvf7~`B%5dNWr1Qd@o~~2qb2X_qkmmtvop*fX zv3O3V(8QMR-#P5TwOp`D1+56>ZbZOm&cG4I$?#9kdJ7ECYCSnlT`k8Gp-q{dA3-W_S%=+tN_GF>i=pup5$h;VAs$x8>Av7w4KO1Uap zhsgBD(D}OQPCwx$9C6yIDA4CJSSd6E1COT-xU-lmkLl4dUzUjmX)F4N?G7+({ol29 zb(h(%a(m&4@y#Bem&0>5rD>en4_%PVjaWvr2}OW``ok$^mWY0Ff}%h=CL7SuPIY>m zzs?J7BXFF^0l#IB_je28h-yy<5F$>)I%QETIcSHo^B?66lpWu-hA$?YnA;8T`cLmz zIQTNph-SrFOcKF^F|2nSt#4nEgicK8NE1J61kdQvrzc41Qgh(C!2$Y#vbk`a{wk5DPb=!_?4uAA_$+fm zy(Ie5h0wFMiiT;4nFm_kAJ=~??vf1Ay_x3RyIZuDgiaEi&@jZmz!>g(6X$sa)|;4q zcG&NNM&fprnsZL@Acw9}!WJtPjVWVhN{>TNk7{kzqIFIAu*((LS%0bZ!8+prQRY6O z_hZ#pg|Nb}?YLti>Pnj83C74=(c-CeW$ z*T$9YOvCkB>RWH9m^8_)x`}A)?wMTU4>l?4=&1*Nk$W3rSmuWnH zTvHiYai?4dE*X?!<@8*t>WyN!EW<>RJg1@_!usf#QdEP!YL=)dFBIW}JA2krN^wGD z{h8m#+7#ob$*n9KPZC4~y4&3r9$~puOX78ulgb~Tvej>^d+jMOQ2Mg_mv%19tK2hcRV+YuC+%w|PA(`hCIe z<*e>GtFjB%CZ6*Hb3>QKj7?TU)se^`#TJ!R_-?EG0Gm`0J>$%Y>=D(r`XG6daln^E zjX30pDW!J4@;Y)&0t=;zb?SLikkK$1y(QT!@m!NWIoJhkcj zwfv9i{ph{t`nBfz>%GE_#QTXv1eU8Ej3@>pNc5i~=qnzCSYK{gXvz}LGnycS{n&(= zh2|3Beu)jt_AfXz836Op?lZ^Td3u;{+n58}woyRmaKy`aCv#gR@lQYjaWUjy7{VfX~|>C7W-l{?Rivr z_0!%|k`C=|xSLqZF+VYAOW29e`dgtnDu!8PJN81Sj`{Y*=OyU{I#nu^{ZEroQ$UF4bGCZsR#D0`+Sc6@ewJIUQYt34t^69;U9mXc)0C{U8Ts;$D{G4??^_0Yrdfo*reo+6aHbQCI(UlN z4W`$Eh~YiLC4}8%`kQ@=&|Fc^E(ntr>%(j^*Y@S3S8K=pzgZ(j2X6Av)4O@|0<=G% z==Wa^!E6E2iEzVhAGX3pX||(K2;U3%2XRNP0dNo(DWc~S;XIT91LcCP*Z1RpAwcTh zc{;vG0SDjTAsRpQ5W;wMcd%^rC)mR(l;VC5?$4h^YqrnozX9*8V7XQs_2jvT`I?3? zehV??Zl@){jddcV-aNfdRz5-XxL)HW=Y2yb=1sTDxAR(`hV@_X(#eGcBrs}M*4)^4 zh0H4y+r<1P;xuqr3o*}8v0|k3H1tTAbo$%@td^Ze!4;pDG}JHC3anEXNw=IU>zBM1 zJV~eC4Ik^g&RxI3^6Wx1qb*Mt^@d9&D`lx)n<5J zfLgc$w~gH?COZMJeh+@7%wjeDMU?}@uurj1re*gZhF4D?-dwv&f9s-0w{%JCv0LD4 z?H&M(!-EzH!OTtwPx!>L!l)?*w9g-)xmk2h5Y37CkrqbShm2*06~#6Y3xK#>h8)VX znb;sb96pQGLP4 z`bN<31C^2nH?5KkW@RLBWclbNxXSz2xpAkag~JMidmchVO?6Zgm1SjQd3JEAQur&9 z`kc@w#;6?;_td4;xf?TIEMdfygASD$ndaV-iiiJ-O>fOw&FIot&MvK1F_SRzcHZA# zSeEnINW%AUWPa?TTX5I4LbojXRg0i4L*b?8ZwwLT6|tKKIYpD znF>Y#5VHFtxq+CwYu8Z$6cuI`^-0kJ7?BIPLqwqgb?Q|^SWi1OJ;10YPz@pCGd8t@ zxW-=6rO`ccL?bkxLc5bY_xarU=z^bu#YRE>sWx@X}0c4MhQ$8))3=fx~Dj~h#YBPjH~ zy3emmT8}AzGsGSaN<%i9DSj;ChCY)>UL2X0$J`@6heGr_eCtF%uC>}(H0RTgoq)#O z=t)+Q)iQ5WQO3pSU~iR$=LYQ?y5Z^6_L_3Fq42a`HjH1t`ur4oc)GbfbHt>Vo3b|yOn%V-62!g7L_R-t&|LGTNvSY-omJMOu&)mb!H9<= zgngK`hvOmg{%*7ZtOoO2Vbecozce&u%7vAU5w!&bBwN8K z+&Xq1jKC}x0M1|0x(4&LW-TS}VA1CR-CxRkh^&NqK!mdOIpu5!|B}<_Zqa7Bu5Pku znt*6nsbJ4b?>`Ob{8E^~>%{%{fu4S5fztJd5VY{}#ZRr+hq5HEJs}~IG zQ+eG}XA!rvNn+2^<5ZS&EL4g}qj#YOR9i`kVI0k%)#0_D(y=-FmbZ)&rt!-U5-Xgm z1dUcL8;EmDt!8&*0jN}2PYtcFSYoQck?7<11@$f zj~yJ$5qRl5VaO!b8VN2jWM9427iDJ5iyrL?(8Dqnyw6mNR2)Cwu4e-i^e=#as{$N5>7F$h(^<~D7m@gPRHgZ8tJ9@WR`OG zWq7wcUG{d#Tlp^EoTRO#Z1XM+d)Uh7@fs%F0h+KWcwG)}MA!aV!6Qz$cl40yd{ktZoXS_ja2_k-&x8buc8GKit)j;j2_D=mQ@l z_z`)R*!ZZd;ChB)1`L53@&O+Roj!${&Gc^NNC!fif^xGU;oZ7H-<~vtF%+2yC&#Jj zXOcbx6Z%&xh%kho5@@W&y}?V*r6IQXe#4QeoVu0;8;q z<8jAD8oG>xBAIK~VO=QLxIk<4R_se))BKh682O*wGyg68 zHsNJ3as5SB-JPNaZ{tKwy&0a*!f*^)Zf)wLBD1bqkd|2p4ii}jf}rnAz(YDKgIW7$ z>zWhm6j1mXpW1bB{1_)Go(6C_-K7VPY_8~^KmWpH!RD8rj|Z**tjPsE03|e0XbeI? z?x1|r>B{_lG@dvL0Ov64i@KI(dwEXdgi;WvS3OLD5J(vEp?3@5&?kPV2mNfFjhp&0p$LAZ(7OQiO*^BwG7`e`tCva$T!{vW^1*e zPcv_6r8rs&CXQ%q=1#X>z@ZaEm>zSm+D>|Cziwqdoutq;r%3ia)VYlo)(}_m%g8|D zLJ-J_xou!{;g#u#^K_1O?afu)H$T{ee?+*!bSKeAcFc5{*Fp{J3T$)3fDLC?)dO$3 z$zEyrIA_@-r^X!8jiojE0&G77H36IfK&7T zgu&Y+`~@)9Oz6_^uV}{*nDPP;ME7fr4=dvqb+wP{;1l4>TdMsZXhTVW8yJi7W$vI- zkoJKh5-KL6*MjcOGk6zJ*4h!s)!LH?;V)(*ol^t zIqFQPEE3Cmgdly$Nkm4BIl-of%@Ug;W@*_gFb(r}2@-hE%(}}@m)+u3V*Yi`Y-I6j zBJ;ug#c`nS#Y2&LU$2N)Bxo{FzsiG9SWFo={cMm}uT+|?v~EEz10g5`d*Z~bPnf2* z&rENsB(0=cq#l8Xrj5+@k^!RULNIFai4$$5!-|$E7kj3#mjl1a`xEf^C!ury4}1On zcfuT)_KZHw^<#-mR}L=(iUXynWJ^Q0Ri|UZrk?gIw7ne(@EI6#AW$@QbEKGLx()N8 zgGdop;ZHtwElK7%R1!R+Sf8IxPYJ{O%r!(qw5Xa8Oz8})oU2IrWv~gx8C3UA`)#)K z@c$rUK62K5N8~c;xQ2{s2JQLWYMtzD`cFQZ2$2aip{s;QIvB57$}$B+M@lTsB^;lH z5vipwJWd#*ZikIm1G5$+a7}2=aif+6q%Qv^dto~hg`x*AVrOA{5xmSMpT)JU%&t@F z2;U!JrT;n=7TUC6--+4ox+}EDPJyw7Tk&4Ji4d+0U$-v10K?pH!wUli_Jo&6_C!hi z1^*F-DHvau_GngN5!ayafN6G$pbt#L4lv`~EH@zZS$~6Df0+2c0Di>(JJP7iB?iiL zTq@Y36#mJZw(RsNDQ_Ia{RGVBt8q%ijf8*SQL>h@crM5%KuuH+;AM6ImXmdhZulS& z5c5?NVjG8gfYpQbb?54QaW9*g%hBvOVK2gQt=zztjz{=K|Br)`eWfXoX$FF3zUv~> z(c>G4>jr$I#jtS-E3C^oPk!Jiv*|LbUZ3B7G;cmIXp~Eub|8rQ>boYJ*5u$Z*o{78 zS9QGpSD&u}kyn5OG)dFQ!ua|Ur}a?5Sy@hJuBV~evoH>XG);ZaH0&4hb9$BX{+G9f0twO9fn7$6!D)FeH_qU0hk8Fm7pA4x4o ze>nV`W!wOZ^8E6H2G%N;@RekfF|&ccjb?MkyaCUXlGwC)!(17jss|%MtJ`KS1F7m` zJq;KDsQ`9Qjy01C`RHBi4&!Bi9D?Rz!dEn5tJbkTs6!ML)VHJsT8SX4K{zb!ZnR(g zu`;@o7QMUPzfS?}I+AfvfrfWK+~8E@fo=RuIp%rw(V|?Tr%O+cZu{J{a-^HkEGp)* zQj@w`SV6pmr{|C9KuIy1px)6p;a&_J3RTA_gST+k&|F%=B@`arnT`0|2;5^`aJNpY zYBKGm0vK;Est1UMxhLSeYqwCO2_t+Ln4~R>-v`s5>aM#}3}#mVMJiG!$Q6(n4+`k_|b78A`)^E~u*Qjh*L8Kgg{SWDds>uz;j^-)l# z>!Ex;Wb;WEU?YE!+#6md)IA)B)$_kCyd@j}*dZ@Wiv-m~!^9D9ql7|1YY5>N=iE|Ikq!MVdBKmXA8sjF& zoQUw;24;eTX(cE%980g#rD_eo{xtxE9svDHs~3JOJi1m3M7TfEw4}@GvtpDQR>wS( z>VFfQH5eP*gCj}vzC}B$tfvnOLtC*0h!9DdvX5%s4-iln_3!S+h)Xz#`spSX^%rJK zUITs@fhHhCzZH5SmjI{TC^Sqe*q2wapua2KEB^5vCh}8#v#qpf-Wg4^Rxe?)pK@IF zQ*qq5_E<;jyA+iYa0+QHKS%Svf!Bv8ZOcE8K?PHFIc>k}%i{9Qp%fxjW!8}8(DS@4aVmOV@TVbJRDmNzc&lCUw( z`(4Nijx7~?y{MvM2PF-M5?X;kftlf>uo-GizhR>6r@NMrtUB#gAV=r#9-Xn;S?H|H z)??4BF=vZ%f15haJ}dsAc=PBfZ31KuA8;*e>nFbfJg*Qlh`seD`{D~@lx^e% z4;gio(0?0Vi1ds58?n7*i^ospi{gOAP>h#i=|FQa4~lWiWbPcF=jDys%MS;S`4{R>})1*`R#y6?6(N8W)ZB-y{ zm51@8jP#*Ejk(@k-vhaTk6*}beDO(@`|I9z*cJ?s&&2~OVKZQZJKp^r#r)5kr}seT zvcbh084){UCc+t}8}?iN3}uJ|I7Bzd_*8DAY|py=%)*9_ZUb~A&84=^qo~gO>QN_}EVz6G{TM4__7ooe`io1zls_Et#pQ{6I zcRPv6B@09bE2rkfu7oNFYuPxKL5m@vs^|Z@F@b3>8jQmU>AIPP#u$rHk40TSMKBsJ zx~@8W=-sXHQM<1A>lR+SDdhaaosXR4Xi6t%QSQ7ImDifa5#yA><*dks(Ii#>h|e>Hk1 zx%`}d>M5s_QgYHj*qG;3-WAQLl-x0~U9ABLl)md`rgfcdmeW81#Ac6*xivg$+KWjD`C@%x75^S1{&-lCwWVL?97eeet)lCU$2Ye737?_EU~u>0egq0 z6~&ADI76&KV3&#h=U{EFDRFc8ZCOpJeeBivIYNfzu2Y#L@>p-3*x{|YAlt<^|vLY1Hy4xNl!ygFI3rU z)mB!YwuRqL@qQ)774yq!xl#(U=v*y-Sxl8Ps17pwn*Ovwz6b5Bqwl6z%*p?^o;l&1 zRH9Vw+1jSgf=i z@+<%e>3gVm+rZf6jQqD8PjS>T5Y2b>aILle1#Xypl16fvFzF;E0WV6;??prdOPnqkMtm{-Pk_tsw!nNGUm15|hCLiXLY9vM>Vk9x^CkPs zdjn&q5TQVV%!}#T7s9R~3T=Mj^MT84*2JYndpCc_j?xP4pm_83_;PAV)%QsyqT%lL zw!frft$cQ5#E0dlApay6G~k#&(H=Mme0tms_d|_++2ZZ78ni0 zX%!WHka;$T_SCdoIY~9v)J_}XEF^)|HU9I&mL|8HENzIimg0NqlIyxSDS(#a^6_?n zwX?uE?u+!%mXy`4F{pMUq^Hxt6v&_*@By0?GFK9Ll-z(7;9B zUOv5-tVC8ix3l!of6d#QQM}OJq``F`2utxxA>hGa?@dzIkPby&eEIr z_|!Gn2=bGvUF%E=^uv_{GBrL4mOZM^3%tEPT`GZhL0ENV2yb57qA_RD&e9pQdh(ws zZ2MWpj`&6nDiCSC6I;;Kazg(yw>EzHfb(UCqj5^eITH^pskpDTrdN~^2J_`Hjn{zP zwe#hkf2wnA-1Mmaz1!9XK+X*JB925_%o{nPpoI9lR4T0ua2h?0+p|x|{+9H%VO5N&gN4@-Pc{4f zBZ+j?gHv~vLr9vh?&u5-Ocx&omg3jLFaLA7^PcJO>`h!$&RlS$4q6W^u#~%6O$9YJK{xWv{ps}N>;a!CVU?F$9 zS(;O$a}63?=A+JR*R}E5>GHEV*Yq=>7J?LSw&67{#?5 z&cf7VdJSE7KH7R}@n;4|ao>&kQI7C*=hN7MJsSrg{>ncy@|P|Ix*hY9%A7r&m3{KS z|Nf>GHt=e(uQn57lpxWbu-)EmBf2r>KV_@P(Wk(XxJLTMtvNXYd}`|ylroNnhXp$( z7-#4u{8!QOe>A*Tei8GPn)l}7ARC>$`P;v0lx%qCjVat9sT5FI);wn^F}i_5fh zcTL;3X(g2nq%Dy2*1l}p*m&1&{pSU}smQ*9O@v^9iuGZ%W)c0s-0-Cs_Izbe<09CP zOy@5dA*O!Kw1I!s=R}u3J0L?XL~xOOjdMGXKKS+fkDz`&N1rFMGh(z-xA$d*C1MsJd*6FMv~cuB`(Il1tI@S=M+P$y b&lmZi^5(;*%Pk)^X36-1+4-__F8BWrV*R-u literal 0 HcmV?d00001 diff --git a/windows/deployment/update/waas-morenews.md b/windows/deployment/update/waas-morenews.md index 60c1580556..59ac096f8d 100644 --- a/windows/deployment/update/waas-morenews.md +++ b/windows/deployment/update/waas-morenews.md @@ -14,7 +14,28 @@ ms.topic: article Here's more news about [Windows as a service](windows-as-a-service.md): \ No newline at end of file + diff --git a/windows/deployment/update/waas-servicing-differences.md b/windows/deployment/update/waas-servicing-differences.md index 5db6f96bc8..20a86bd384 100644 --- a/windows/deployment/update/waas-servicing-differences.md +++ b/windows/deployment/update/waas-servicing-differences.md @@ -53,7 +53,7 @@ This cumulative update model for Windows 10 has helped provide the Windows ecosy - [Updates for the .NET Framework](https://blogs.msdn.microsoft.com/dotnet/2016/10/11/net-framework-monthly-rollups-explained/) are NOT included in the Windows 10 LCU. They are separate packages with different behaviors depending on the version of .NET Framework being updated, and on which OS. As of October 2018, .NET Framework updates for Windows 10 will be separate and have their own cumulative update model. - For Windows 10, available update types vary by publishing channel: - For customers using Windows Server Update Services (WSUS) and for the Update Catalog, several different updates types for Windows 10 are rolled together for the core OS in a single LCU package, with exception of Servicing Stack Updates. - - Servicing Stack Updates (SSU) are available for download from the Update Catalog and can be imported through WSUS, but will not be automatically synced. (See this example for Windows 10, version 1709) For more information on Servicing Stack Updates, please see this blog. + - Servicing Stack Updates (SSU) are available for download from the Update Catalog and can be imported through WSUS. Servicing Stack Updates (SSU) will be synced automatically (See this example for Windows 10, version 1709). Learn more about [Servicing Stack Updates](https://docs.microsoft.com/windows/deployment/update/servicing-stack-updates). - For customers connecting to Windows Update, the new cloud update architecture uses a database of updates which break out all the different update types, including Servicing Stack Updates (SSU) and Dynamic Updates (DU). The update scanning in the Windows 10 servicing stack on the client automatically takes only the updates that are needed by the device to be completely up to date. - Windows 7 and other legacy operating systems have cumulative updates that operate differently than in Windows 10 (see next section). diff --git a/windows/deployment/update/windows-analytics-get-started.md b/windows/deployment/update/windows-analytics-get-started.md index e5432caaa9..f0ee52dd38 100644 --- a/windows/deployment/update/windows-analytics-get-started.md +++ b/windows/deployment/update/windows-analytics-get-started.md @@ -151,7 +151,7 @@ When you run the deployment script, it initiates a full scan. The daily schedule ### Distribute the deployment script at scale -Use a software distribution system such as System Center Configuration Manager to distribute the Upgrade Readiness deployment script at scale. For more information, see [New version of the Upgrade Analytics Deployment Script available](https://blogs.technet.microsoft.com/upgradeanalytics/2016/09/20/new-version-of-the-upgrade-analytics-deployment-script-available/) on the Upgrade Readiness blog. For information on how to deploy PowerShell scripts by using Windows Intune, see [Manage PowerShell scripts in Intune for Windows 10 devices](https://docs.microsoft.com/intune/intune-management-extension). +Use a software distribution system such as System Center Configuration Manager to distribute the Upgrade Readiness deployment script at scale. For more information, see [Upgrade Readiness deployment script](https://docs.microsoft.com/windows/deployment/upgrade/upgrade-readiness-deployment-script). For information on how to deploy PowerShell scripts by using Windows Intune, see [Manage PowerShell scripts in Intune for Windows 10 devices](https://docs.microsoft.com/intune/intune-management-extension). ### Distributing policies at scale There are a number of policies that can be centrally managed to control Windows Analytics device configuration. All of these policies have *preference* registry key equivalents that can be set by using the deployment script. Policy settings override preference settings if both are set. diff --git a/windows/deployment/update/windows-as-a-service.md b/windows/deployment/update/windows-as-a-service.md index f49645a75a..624b72ef06 100644 --- a/windows/deployment/update/windows-as-a-service.md +++ b/windows/deployment/update/windows-as-a-service.md @@ -25,34 +25,12 @@ Everyone wins when transparency is a top priority. We want you to know when upda The latest news: [See more news](waas-morenews.md). You can also check out the [Windows 10 blog](https://techcommunity.microsoft.com/t5/Windows-10-Blog/bg-p/Windows10Blog). diff --git a/windows/deployment/windows-autopilot/demonstrate-deployment-on-vm.md b/windows/deployment/windows-autopilot/demonstrate-deployment-on-vm.md index 85eae673e8..59fa406a68 100644 --- a/windows/deployment/windows-autopilot/demonstrate-deployment-on-vm.md +++ b/windows/deployment/windows-autopilot/demonstrate-deployment-on-vm.md @@ -28,7 +28,7 @@ In this topic you'll learn how to set-up a Windows Autopilot deployment for a Vi ## Prerequisites These are the thing you'll need on your device to get started: -* Installation media for the latest version of Windows 10 Professional or Enterprise (ISO file) +* Installation media for the [latest version of Windows 10 Professional or Enterprise (ISO file)](https://www.microsoft.com/software-download/windows10) * Internet access (see [Network connectivity requirements](https://docs.microsoft.com/windows/deployment/windows-autopilot/windows-autopilot#network-connectivity-requirements)) * Hypervisor needs to be unoccupied, or used by Hyper-V, as we will be using Hyper-V to create the Virtual Machine diff --git a/windows/deployment/windows-autopilot/enrollment-status.md b/windows/deployment/windows-autopilot/enrollment-status.md index 89e9a585ba..d2e6471454 100644 --- a/windows/deployment/windows-autopilot/enrollment-status.md +++ b/windows/deployment/windows-autopilot/enrollment-status.md @@ -62,7 +62,7 @@ The following types of policies and installations are not tracked: ## More information For more information on configuring the Enrollment Status page, see the [Microsoft Intune documentation](https://docs.microsoft.com/intune/windows-enrollment-status).
-For details about the underlying implementation, see the [FirstSyncStatus details in the DMClient CSP docuementation](https://docs.microsoft.com/windows/client-management/mdm/dmclient-csp).
+For details about the underlying implementation, see the [FirstSyncStatus details in the DMClient CSP documentation](https://docs.microsoft.com/windows/client-management/mdm/dmclient-csp).
For more information about blocking for app installation: - [Blocking for app installation using Enrollment Status Page](https://blogs.technet.microsoft.com/mniehaus/2018/12/06/blocking-for-app-installation-using-enrollment-status-page/). -- [Support Tip: Office C2R installation is now tracked during ESP](https://techcommunity.microsoft.com/t5/Intune-Customer-Success/Support-Tip-Office-C2R-installation-is-now-tracked-during-ESP/ba-p/295514). \ No newline at end of file +- [Support Tip: Office C2R installation is now tracked during ESP](https://techcommunity.microsoft.com/t5/Intune-Customer-Success/Support-Tip-Office-C2R-installation-is-now-tracked-during-ESP/ba-p/295514). diff --git a/windows/deployment/windows-autopilot/troubleshooting.md b/windows/deployment/windows-autopilot/troubleshooting.md index 70fa92e2a5..0d365a9cac 100644 --- a/windows/deployment/windows-autopilot/troubleshooting.md +++ b/windows/deployment/windows-autopilot/troubleshooting.md @@ -85,10 +85,12 @@ On Windows 10 version 1703 and above, ETW tracing can be used to capture detaile The most common issue joining a device to Azure AD is related to Azure AD permissions. Ensure [the correct configuration is in place](windows-autopilot-requirements-configuration.md) to allow users to join devices to Azure AD. Errors can also happen if the user has exceeded the number of devices that they are allowed to join, as configured in Azure AD. -Error code 801C0003 will typically be reported on an error page titled "Something went wrong." This error means that the Azure AD join failed. +Error code 801C0003 will typically be reported on an error page titled "Something went wrong". This error means that the Azure AD join failed. ### Troubleshooting Intune enrollment issues See [this knowledge base article](https://support.microsoft.com/help/4089533/troubleshooting-windows-device-enrollment-problems-in-microsoft-intune) for assistance with Intune enrollment issues. Common issues include incorrect or missing licenses assigned to the user or too many devices enrolled for the user. -Error code 80180018 will typiclaly be reported on an error page titled "Something went wrong." This error means that the MDM enrollment failed. +Error code 80180018 will typically be reported on an error page titled "Something went wrong". This error means that the MDM enrollment failed. + +If Autopilot Reset fails immediately with an error "Ran into trouble. Please sign in with an administrator account to see why and reset manually," see [Troubleshoot Autopilot Reset](https://docs.microsoft.com/education/windows/autopilot-reset#troubleshoot-autopilot-reset) for more help. diff --git a/windows/deployment/windows-autopilot/windows-autopilot-requirements-network.md b/windows/deployment/windows-autopilot/windows-autopilot-requirements-network.md index dc3de62a1b..f2b2c19fb8 100644 --- a/windows/deployment/windows-autopilot/windows-autopilot-requirements-network.md +++ b/windows/deployment/windows-autopilot/windows-autopilot-requirements-network.md @@ -26,7 +26,12 @@ Windows Autopilot depends on a variety of internet-based services; access to the In environments that have more restrictive internet access, or for those that require authentication before internet access can be obtained, additional configuration may be required to whitelist access to the needed services. For additional details about each of these services and their specific requirements, review the following details: -- **Windows Autopilot Deployment Service (and Windows Activation).**  After a network connection is in place, each Windows 10 device will contact the Windows Autopilot Deployment Service using the same services used for Windows Activation. See the following link for details: +- **Windows Autopilot Deployment Service (and Windows Activation).**  After a network connection is in place, each Windows 10 device will contact the Windows Autopilot Deployment Service. With Windows 10 builds 18204 and above, the following URLs are used: + + - https://ztd.dds.microsoft.com + - https://cs.dds.microsoft.com + + For all supported Windows 10 releases, Windows Autopilot also uses Windows Activation services. See the following link for details: - diff --git a/windows/security/identity-protection/credential-guard/credential-guard-manage.md b/windows/security/identity-protection/credential-guard/credential-guard-manage.md index d46ed8851c..0edce00395 100644 --- a/windows/security/identity-protection/credential-guard/credential-guard-manage.md +++ b/windows/security/identity-protection/credential-guard/credential-guard-manage.md @@ -177,6 +177,9 @@ To disable Windows Defender Credential Guard, you can use the following set of p > [!NOTE] > The PC must have one-time access to a domain controller to decrypt content, such as files that were encrypted with EFS. If you want to turn off both Windows Defender Credential Guard and virtualization-based security, run the following bcdedit command after turning off all virtualization-based security Group Policy and registry settings: bcdedit /set {0cb3b571-2f2e-4343-a879-d86a476d7215} loadoptions DISABLE-LSA-ISO,DISABLE-VBS +> [!NOTE] +> Credential Guard and Device Guard are not currently supported when using Azure IaaS VMs. These options will be made available with future Gen 2 VMs. + For more info on virtualization-based security and Windows Defender Device Guard, see [Windows Defender Device Guard deployment guide](/windows/device-security/device-guard/device-guard-deployment-guide). diff --git a/windows/security/identity-protection/credential-guard/credential-guard-requirements.md b/windows/security/identity-protection/credential-guard/credential-guard-requirements.md index 68c7ae9ccb..01d5a2d5a7 100644 --- a/windows/security/identity-protection/credential-guard/credential-guard-requirements.md +++ b/windows/security/identity-protection/credential-guard/credential-guard-requirements.md @@ -39,7 +39,7 @@ To provide basic protections against OS level attempts to read Credential Manage The Virtualization-based security requires: - 64-bit CPU - CPU virtualization extensions plus extended page tables -- Windows hypervisor +- Windows hypervisor (does not require Hyper-V Windows Feature to be installed) ### Windows Defender Credential Guard deployment in virtual machines diff --git a/windows/security/identity-protection/hello-for-business/hello-hybrid-aadj-sso-cert.md b/windows/security/identity-protection/hello-for-business/hello-hybrid-aadj-sso-cert.md index c7fd156e98..5ea3bbbae9 100644 --- a/windows/security/identity-protection/hello-for-business/hello-hybrid-aadj-sso-cert.md +++ b/windows/security/identity-protection/hello-for-business/hello-hybrid-aadj-sso-cert.md @@ -131,9 +131,9 @@ Sign-in a domain controller or management workstations with _Domain Admin_ equiv 5. In the content pane, right-click the **NDES Service Rights** Group Policy object and click **Edit**. 6. In the navigation pane, expand **Policies** under **Computer Configuration**. 7. Expand **Windows Settings > Security Settings > Local Policies**. Select **User Rights Assignments**. -8. In the content pane, double-click **Allow log on locally**. Select **Define these policy settings**. and click **OK**. Click **Add User or Group...**. In the **Add User or Group** dialog box, click **Browse**. In the **Select Users, Computers, Service Accounts, or Groups** dialog box, type **Administrators;Backup Operators;DOMAINNAME\NDESSvc;Users** where **DOMAINNAME** is the NetBios name of the domain (Example CONTOSO\NDESSvc) in **User and group names**. Click **OK** twice. -9. In the content pane, double-click **Log on as a batch job**. Select **Define these policy settings**. and click **OK**. Click **Add User or Group...**. In the **Add User or Group** dialog box, click **Browse**. In the **Select Users, Computers, Service Accounts, or Groups** dialog box, type **Administrators;Backup Operators;DOMAINNAME\NDESSvc;Performance Log Users** where **DOMAINNAME** is the NetBios name of the domain (Example CONTOSO\NDESSvc) in **User and group names**. Click **OK** twice. -10. In the content pane, double-click **Log on as a batch job**. Select **Define these policy settings**. and click **OK**. Click **Add User or Group...**. In the **Add User or Group** dialog box, click **Browse**. In the **Select Users, Computers, Service Accounts, or Groups** dialog box, type **NT SERVICE\ALL SERVICES;DOMAINNAME\NDESSvc** where **DOMAINNAME** is the NetBios name of the domain (Example CONTOSO\NDESSvc) in **User and group names**. Click **OK** three times. +8. In the content pane, double-click **Allow log on locally**. Select **Define these policy settings** and click **OK**. Click **Add User or Group...**. In the **Add User or Group** dialog box, click **Browse**. In the **Select Users, Computers, Service Accounts, or Groups** dialog box, type **Administrators;Backup Operators;DOMAINNAME\NDESSvc;Users** where **DOMAINNAME** is the NetBios name of the domain (Example CONTOSO\NDESSvc) in **User and group names**. Click **OK** twice. +9. In the content pane, double-click **Log on as a batch job**. Select **Define these policy settings** and click **OK**. Click **Add User or Group...**. In the **Add User or Group** dialog box, click **Browse**. In the **Select Users, Computers, Service Accounts, or Groups** dialog box, type **Administrators;Backup Operators;DOMAINNAME\NDESSvc;Performance Log Users** where **DOMAINNAME** is the NetBios name of the domain (Example CONTOSO\NDESSvc) in **User and group names**. Click **OK** twice. +10. In the content pane, double-click **Log on as a service**. Select **Define these policy settings** and click **OK**. Click **Add User or Group...**. In the **Add User or Group** dialog box, click **Browse**. In the **Select Users, Computers, Service Accounts, or Groups** dialog box, type **NT SERVICE\ALL SERVICES;DOMAINNAME\NDESSvc** where **DOMAINNAME** is the NetBios name of the domain (Example CONTOSO\NDESSvc) in **User and group names**. Click **OK** three times. 11. Close the **Group Policy Management Editor**. ### Configure security for the NDES Service User Rights Group Policy object diff --git a/windows/security/identity-protection/hello-for-business/hello-hybrid-aadj-sso.md b/windows/security/identity-protection/hello-for-business/hello-hybrid-aadj-sso.md index ed400300f7..2bfa7ac0bd 100644 --- a/windows/security/identity-protection/hello-for-business/hello-hybrid-aadj-sso.md +++ b/windows/security/identity-protection/hello-for-business/hello-hybrid-aadj-sso.md @@ -30,7 +30,7 @@ Enterprises can use either a key or a certificate to provide single-sign on for When using a key, the on-premises environment needs an adequate distribution of Windows Server 2016 domain controllers relative to your existing authentication and the number of users included in your Windows Hello for Business deployment. Read the [Planning an adequate number of Windows Server 2016 Domain Controllers for Windows Hello for Business deployments](hello-adequate-domain-controllers.md) to learn more. -When using a certificate, the on-premises environment can use Windows Server 2008 R2 and later domain controllers, which removes the Windows Server 2016 domain controller requirement. However, single-sign on using a key requires additional infrastructure to issue a certificate when the user enrolls for Windows Hello for Business. Azure AD joined devices enroll certificates using Microsoft Intune or a compatible Mobile Device Management (MDM). Microsoft Intune and Windows Hello for Business use the Network Device Enrollment Services (NDES) role and support Microsoft Intune connector. +When using a certificate, the on-premises environment can use Windows Server 2008 R2 and later domain controllers, which removes the Windows Server 2016 domain controller requirement. However, single-sign on using a certificate requires additional infrastructure to issue a certificate when the user enrolls for Windows Hello for Business. Azure AD joined devices enroll certificates using Microsoft Intune or a compatible Mobile Device Management (MDM). Microsoft Intune and Windows Hello for Business use the Network Device Enrollment Services (NDES) role and support Microsoft Intune connector. To deploy single sign-on for Azure AD joined devices using keys, read and follow [Configure Azure AD joined devices for On-premises Single-Sign On using Windows Hello for Business](hello-hybrid-aadj-sso-base.md). To deploy single sign-on for Azure AD joined devices using certificates, read and follow [Configure Azure AD joined devices for On-premises Single-Sign On using Windows Hello for Business](hello-hybrid-aadj-sso-base.md) and then [Using Certificates for AADJ On-premises Single-sign On](hello-hybrid-aadj-sso-cert.md). diff --git a/windows/security/identity-protection/hello-for-business/hello-planning-guide.md b/windows/security/identity-protection/hello-for-business/hello-planning-guide.md index b95f3a6b88..04dc168342 100644 --- a/windows/security/identity-protection/hello-for-business/hello-planning-guide.md +++ b/windows/security/identity-protection/hello-for-business/hello-planning-guide.md @@ -75,9 +75,9 @@ It’s fundamentally important to understand which deployment model to use for a A deployment's trust type defines how each Windows Hello for Business client authenticates to the on-premises Active Directory. There are two trust types: key trust and certificate trust. -The key trust type does not require issuing authentication certificates to end users. Users authenticate using a hardware-bound key created during an in-box provisioning experience, which requires an adequate distribution of Windows Server 2016 domain controllers relative to your existing authentication and the number of users included in your Windows Hello for Business deployment. Read the [Planning an adequate number of Windows Server 2016 Domain Controllers for Windows Hello for Business deployments](hello-adequate-domain-controllers.md) to learn more. +The key trust type does not require issuing authentication certificates to end users. Users authenticate using a hardware-bound key created during the built-in provisioning experience. This requires an adequate distribution of Windows Server 2016 domain controllers relative to your existing authentication and the number of users included in your Windows Hello for Business deployment. Read the [Planning an adequate number of Windows Server 2016 Domain Controllers for Windows Hello for Business deployments](hello-adequate-domain-controllers.md) to learn more. -The certificate trust type issues authentication certificates to end users. Users authenticate using a certificate requested using a hardware-bound key created during the in-box provisioning experience. Unlike key trust, certificate trust does not require Windows Server 2016 domain controllers. Users can authenticate using their certificate to any Windows Server 2008 R2 or later domain controller. +The certificate trust type issues authentication certificates to end users. Users authenticate using a certificate requested using a hardware-bound key created during the built-in provisioning experience. Unlike key trust, certificate trust does not require Windows Server 2016 domain controllers. Users can authenticate using their certificate to any Windows Server 2008 R2 or later domain controller. #### Device registration @@ -85,11 +85,11 @@ All devices included in the Windows Hello for Business deployment must go throug #### Key registration -The in-box Windows Hello for Business provisioning experience creates a hardware bound asymmetric key pair as their user’s credentials. The private key is protected by the device’s security modules; however, the credential is a user key (not a device key). The provisioning experience registers the user’s public key with the identity provider. For cloud only and hybrid deployments, the identity provider is Azure Active Directory. For on-premises deployments, the identity provider is the on-premises server running Windows Server 2016 Active Directory Federation Services (AD FS) role. +The built-in Windows Hello for Business provisioning experience creates a hardware bound asymmetric key pair as their user’s credentials. The private key is protected by the device’s security modules; however, the credential is a user key (not a device key). The provisioning experience registers the user’s public key with the identity provider. For cloud only and hybrid deployments, the identity provider is Azure Active Directory. For on-premises deployments, the identity provider is the on-premises server running Windows Server 2016 Active Directory Federation Services (AD FS) role. #### Multifactor authentication -The goal of Windows Hello for Business is to move organizations away from passwords by providing them a strong credential that provides easy two-factor authentication. The in-box provisioning experience accepts the user’s weak credentials (username and password) as the first factor authentication; however, the user must provide a second factor of authentication before Windows provisions a strong credential. +The goal of Windows Hello for Business is to move organizations away from passwords by providing them a strong credential that provides easy two-factor authentication. The built-in provisioning experience accepts the user’s weak credentials (username and password) as the first factor authentication; however, the user must provide a second factor of authentication before Windows provisions a strong credential. Cloud only and hybrid deployments provide many choices for multi-factor authentication. On-premises deployments must use a multi-factor authentication that provides an AD FS multi-factor adapter to be used in conjunction with the on-premises Windows Server 2016 AD FS server role. Organizations can use the on-premises Azure Multi-factor Authentication server, or choose from several third parties (Read [Microsoft and third-party additional authentication methods](https://docs.microsoft.com/windows-server/identity/ad-fs/operations/configure-additional-authentication-methods-for-ad-fs#microsoft-and-third-party-additional-authentication-methods) for more information). >[!NOTE] @@ -105,7 +105,7 @@ Cloud only and hybrid deployments provide many choices for multi-factor authenti #### Directory synchronization -Hybrid and on-premises deployments use directory synchronization, however, each for a different purpose. Hybrid deployments use Azure Active Directory Connect to synchronize Active Directory identities or credentials between itself and Azure Active Directory. This helps enable single sign-on to Azure Active Directory and its federated components. +Hybrid and on-premises deployments use directory synchronization, however, each for a different purpose. Hybrid deployments use Azure Active Directory Connect to synchronize Active Directory identities or credentials between itself and Azure Active Directory. This helps enable single sign-on to Azure Active Directory and its federated components. On-premises deployments use directory synchronization to import users from Active Directory to the Azure MFA Server, which sends data to the Azure MFA cloud service to perform the verification. ### Management diff --git a/windows/security/threat-protection/windows-defender-antivirus/microsoft-defender-atp-mac.md b/windows/security/threat-protection/windows-defender-antivirus/microsoft-defender-atp-mac.md index 9b5f2b9057..15865ca9fa 100644 --- a/windows/security/threat-protection/windows-defender-antivirus/microsoft-defender-atp-mac.md +++ b/windows/security/threat-protection/windows-defender-antivirus/microsoft-defender-atp-mac.md @@ -34,37 +34,34 @@ You should also have access to Windows Defender Security Center. Microsoft Defender ATP for Mac system requirements: - macOS version: 10.14 (Mojave), 10.13 (High Sierra), 10.12 (Sierra) - Disk space during preview: 1GB -- The following URLs must be accessible from the Mac device: - - ```https://cdn.x.cp.wd.microsoft.com/ ```
- - ```https://eu-cdn.x.cp.wd.microsoft.com/ ```
- - ```https://wu-cdn.x.cp.wd.microsoft.com/ ```
- - ```https://x.cp.wd.microsoft.com/ ```
- - ```https://asia.x.cp.wd.microsoft.com/ ```
- - ```https://australia.x.cp.wd.microsoft.com/ ```
- - ```https://europe.x.cp.wd.microsoft.com/ ```
- - ```https://unitedkingdom.x.cp.wd.microsoft.com/ ```
- - ```https://unitedstates.x.cp.wd.microsoft.com/ ```
+ +After you've enabled the service, you may need to configure your network or firewall to allow outbound connections between it and your endpoints. + +The following table lists the services and their associated URLs that your network must be able to connect to. You should ensure there are no firewall or network filtering rules that would deny access to these URLs, or you may need to create an **allow** rule specifically for them: + +| Service | Description | URL | +| -------------- |:------------------------------------:| --------------------------------------------------------------------:| +| ATP | Advanced threat protection service | `https://x.cp.wd.microsoft.com/`, `https://*.x.cp.wd.microsoft.com/` | + +To test that a connection is not blocked, open `https://x.cp.wd.microsoft.com/api/report` and `https://wu-cdn.x.cp.wd.microsoft.com/` in a browser, or run the following command in Terminal: + +``` + mavel-mojave:~ testuser$ curl 'https://x.cp.wd.microsoft.com/api/report' + OK +``` + +We recommend to keep [System Integrity Protection](https://support.apple.com/en-us/HT204899) ([Wiki](https://en.wikipedia.org/wiki/System_Integrity_Protection)) enabled (default setting) on client machines. +SIP is a built-in macOS security feature that prevents low-level tampering with the OS. ## Installation and configuration overview There are various methods and deployment tools that you can use to install and configure Microsoft Defender ATP for Mac. In general you'll need to take the following steps: -- [Register macOS devices](#register-macos-devices) with Windows Defender ATP -- Deploy Microsoft Defender ATP for Mac using any of the following deployment methods and tools: + - [Register macOS devices](#register-macos-devices) with Windows Defender ATP + - Deploy Microsoft Defender ATP for Mac using any of the following deployment methods and tools: - [Microsoft Intune based deployment](#microsoft-intune-based-deployment) - [JAMF based deployment](#jamf-based-deployment) - [Manual deployment](#manual-deployment) -## Register macOS devices -To onboard your devices for Microsoft Defender ATP for Mac, you must register the devices with Windows Defender ATP and provide consent to submit telemetry. - -Use the following URL to give consent to submit telemetry: ```https://login.microsoftonline.com/common/oauth2/authorize?prompt=consent&client_id=f9eb614c-7a8e-422a-947d-2059e657d855&response_type=code&sso_reload=true``` - -> [!NOTE] -> You may get an error that a page on ```https://ppe.fresno.wd.microsoft.com``` cannot be opened. Disregard the error as it does not affect the onboarding process. - - -![App registration permission screenshot](images/MDATP_1_RegisterApp.png) - ## Deploy Microsoft Defender ATP for Mac Use any of the supported methods to deploy Microsoft Defender ATP for Mac @@ -72,11 +69,11 @@ Use any of the supported methods to deploy Microsoft Defender ATP for Mac ### Download installation and onboarding packages Download the installation and onboarding packages from Windows Defender Security Center: -1. In Windows Defender Security Center, go to **Settings > Machine Management > Onboarding**. -2. In Section 1 of the page, set operating system to **Linux, macOS, iOS or Android** and Deployment method to **Mobile Device Management / Microsoft Intune**. -3. In Section 2 of the page, click **Download installation package**. Save it as wdav.pkg to a local directory. -4. In Section 2 of the page, click **Download onboarding package**. Save it as WindowsDefenderATPOnboardingPackage.zip to the same directory. -5. Download IntuneAppUtil from https://docs.microsoft.com/en-us/intune/lob-apps-macos. +1. In Windows Defender Security Center, go to **Settings > Machine Management > Onboarding**. +2. In Section 1 of the page, set operating system to **Linux, macOS, iOS or Android** and Deployment method to **Mobile Device Management / Microsoft Intune**. +3. In Section 2 of the page, select **Download installation package**. Save it as wdav.pkg to a local directory. +4. In Section 2 of the page, select **Download onboarding package**. Save it as WindowsDefenderATPOnboardingPackage.zip to the same directory. +5. Download IntuneAppUtil from https://docs.microsoft.com/en-us/intune/lob-apps-macos. ![Windows Defender Security Center screenshot](images/MDATP_2_IntuneAppUtil.png) @@ -97,7 +94,7 @@ Download the installation and onboarding packages from Windows Defender Security inflating: jamf/WindowsDefenderATPOnboarding.plist mavel-macmini:Downloads test$ ``` -7. Make IntuneAppUtil an executable: +7. Make IntuneAppUtil an executable: ```mavel-macmini:Downloads test$ chmod +x IntuneAppUtil``` @@ -124,10 +121,12 @@ You need no special provisioning for a Mac machine beyond a standard [Company Po ![Confirm device management screenshot](images/MDATP_3_ConfirmDeviceMgmt.png) -2. Click the **Continue** button, and your Management Profile is displayed as verified: +Select Open System Preferences, locate Management Profile on the list and select the **Approve...** button. Your Management Profile would be displayed as **Verified**: ![Management profile screenshot](images/MDATP_4_ManagementProfile.png) +2. Select the **Continue** button and complete the enrollment. + You can enroll additional machines. Optionally, you can do it later, after system configuration and application package are provisioned. 3. In Intune, open the **Manage > Devices > All devices** blade. You'll see your machine: @@ -135,17 +134,17 @@ You can enroll additional machines. Optionally, you can do it later, after syste ![Add Devices screenshot](images/MDATP_5_allDevices.png) ### Create System Configuration profiles -1. In Intune open the **Manage > Device configuration** blade. Click **Manage > Profiles > Create Profile**. -2. Choose a name for the profile. Change **Platform=macOS**, **Profile type=Custom**. Click **Configure**. -3. Open the configuration profile and upload intune/kext.xml. This file was created during the Generate settings step above. -4. Click **OK**. +1. In Intune open the **Manage > Device configuration** blade. Select **Manage > Profiles > Create Profile**. +2. Choose a name for the profile. Change **Platform=macOS**, **Profile type=Custom**. Select **Configure**. +3. Open the configuration profile and upload intune/kext.xml. This file was created during the Generate settings step above. +4. Select **OK**. ![System configuration profiles screenshot](images/MDATP_6_SystemConfigurationProfiles.png) -5. **Click Manage > Assignments**. In the **Include** tab, click **Assign to All Users & All devices**. -7. Repeat these steps with the second profile. -8. Create Profile one more time, give it a name, upload the intune/WindowsDefenderATPOnboarding.xml file. -9. Click **Manage > Assignments**. In the Include tab, click **Assign to All Users & All devices**. +5. Select **Manage > Assignments**. In the **Include** tab, select **Assign to All Users & All devices**. +7. Repeat these steps with the second profile. +8. Create Profile one more time, give it a name, upload the intune/WindowsDefenderATPOnboarding.xml file. +9. Select **Manage > Assignments**. In the Include tab, select **Assign to All Users & All devices**. After Intune changes are propagated to the enrolled machines, you'll see it on the **Monitor > Device status** blade: @@ -153,24 +152,24 @@ After Intune changes are propagated to the enrolled machines, you'll see it on t ### Publish application -1. In Intune, open the **Manage > Client apps** blade. Click **Apps > Add**. -2. Select **App type=Other/Line-of-business app**. -3. Select **file=wdav.pkg.intunemac**. Click **OK** to upload. -4. Click **Configure** and add the required information. -5. Use **macOS Sierra 10.12** as the minimum OS. Other settings can be any other value. +1. In Intune, open the **Manage > Client apps** blade. Select **Apps > Add**. +2. Select **App type=Other/Line-of-business app**. +3. Select **file=wdav.pkg.intunemac**. Select **OK** to upload. +4. Select **Configure** and add the required information. +5. Use **macOS Sierra 10.12** as the minimum OS. Other settings can be any other value. ![Device status blade screenshot](images/MDATP_8_IntuneAppInfo.png) -6. Click **OK** and **Add**. +6. Select **OK** and **Add**. ![Device status blade screenshot](images/MDATP_9_IntunePkgInfo.png) -7. It will take a while to upload the package. After it's done, click the name and then go to **Assignments** and **Add group**. +7. It will take a while to upload the package. After it's done, select the name and then go to **Assignments** and **Add group**. ![Client apps screenshot](images/MDATP_10_ClientApps.png) 8. Change **Assignment type=Required**. -9. Click **Included Groups**. Select **Make this app required for all devices=Yes**. Click **Select group to include** and add a group that contains the users you want to target. Select **OK** and **Save**. +9. Select **Included Groups**. Select **Make this app required for all devices=Yes**. Select **Select group to include** and add a group that contains the users you want to target. Select **OK** and **Save**. ![Intune assignments info screenshot](images/MDATP_11_Assignments.png) @@ -179,7 +178,7 @@ After Intune changes are propagated to the enrolled machines, you'll see it on t ![Intune device status screenshot](images/MDATP_12_DeviceInstall.png) ### Verify client machine state -1. After the configuration profiles are deployed to your machines, on your Mac device, open **System Preferences > Profiles**. +1. After the configuration profiles are deployed to your machines, on your Mac device, open **System Preferences > Profiles**. ![System Preferences screenshot](images/MDATP_13_SystemPreferences.png) ![System Preferences Profiles screenshot](images/MDATP_14_SystemPreferencesProfiles.png) @@ -187,9 +186,9 @@ After Intune changes are propagated to the enrolled machines, you'll see it on t 2. Verify the three profiles listed there: ![Profiles screenshot](images/MDATP_15_ManagementProfileConfig.png) -3. The **Management Profile** should be the Intune system profile. -4. wdav-config and wdav-kext are system configuration profiles that we added in Intune. -5. You should also see the Microsoft Defender icon in the top-right corner: +3. The **Management Profile** should be the Intune system profile. +4. wdav-config and wdav-kext are system configuration profiles that we added in Intune. +5. You should also see the Microsoft Defender icon in the top-right corner: ![Microsoft Defender icon in status bar screenshot](images/MDATP_Icon_Bar.png) @@ -200,10 +199,10 @@ You need to be familiar with JAMF administration tasks, have a JAMF tenant, and ### Download installation and onboarding packages Download the installation and onboarding packages from Windows Defender Security Center: -1. In Windows Defender Security Center, go to **Settings > Machine Management > Onboarding**. -2. In Section 1 of the page, set operating system to **Linux, macOS, iOS or Android** and Deployment method to **Mobile Device Management / Microsoft Intune**. -3. In Section 2 of the page, click **Download installation package**. Save it as wdav.pkg to a local directory. -4. In Section 2 of the page, click **Download onboarding package**. Save it as WindowsDefenderATPOnboardingPackage.zip to the same directory. +1. In Windows Defender Security Center, go to **Settings > Machine Management > Onboarding**. +2. In Section 1 of the page, set operating system to **Linux, macOS, iOS or Android** and Deployment method to **Mobile Device Management / Microsoft Intune**. +3. In Section 2 of the page, select **Download installation package**. Save it as wdav.pkg to a local directory. +4. In Section 2 of the page, select **Download onboarding package**. Save it as WindowsDefenderATPOnboardingPackage.zip to the same directory. ![Windows Defender Security Center screenshot](images/MDATP_2_IntuneAppUtil.png) @@ -244,15 +243,15 @@ The configuration profile contains one custom settings payload that includes: #### Approved Kernel Extension To approve the kernel extension: -1. In **Computers > Configuration Profiles** click **Options > Approved Kernel Extensions**. -2. Use **UBF8T346G9** for Team Id. +1. In **Computers > Configuration Profiles** select **Options > Approved Kernel Extensions**. +2. Use **UBF8T346G9** for Team Id. ![Approved kernel extensions screenshot](images/MDATP_17_approvedKernelExtensions.png) #### Configuration Profile's Scope Configure the appropriate scope to specify the machines that will receive this configuration profile. -In the Configuration Profiles, click **Scope > Targets**. Select the appropriate Target computers. +Open Computers -> Configuration Profiles, select **Scope > Targets**. Select the appropriate Target computers. ![Configuration profile scope screenshot](images/MDATP_18_ConfigurationProfilesScope.png) @@ -283,7 +282,7 @@ You need no special provisioning for a macOS computer beyond the standard JAMF E > [!NOTE] > After a computer is enrolled, it will show up in the Computers inventory (All Computers). -1. Open the machine details, from **General** tab, and make sure that **User Approved MDM** is set to **Yes**. If it's set to No, the user needs to open **System Preferences > Profiles** and click **Approve** on the MDM Profile. +1. Open the machine details, from **General** tab, and make sure that **User Approved MDM** is set to **Yes**. If it's set to No, the user needs to open **System Preferences > Profiles** and select **Approve** on the MDM Profile. ![MDM approve button screenshot](images/MDATP_21_MDMProfile1.png) ![MDM screenshot](images/MDATP_22_MDMProfileApproved.png) @@ -384,10 +383,10 @@ This script returns 0 if Microsoft Defender ATP is registered with the Windows D ### Download installation and onboarding packages Download the installation and onboarding packages from Windows Defender Security Center: -1. In Windows Defender Security Center, go to **Settings > Machine Management > Onboarding**. -2. In Section 1 of the page, set operating system to **Linux, macOS, iOS or Android** and Deployment method to **Mobile Device Management / Microsoft Intune**. -3. In Section 2 of the page, click **Download installation package**. Save it as wdav.pkg to a local directory. -4. In Section 2 of the page, click **Download onboarding package**. Save it as WindowsDefenderATPOnboardingPackage.zip to the same directory. +1. In Windows Defender Security Center, go to **Settings > Machine Management > Onboarding**. +2. In Section 1 of the page, set operating system to **Linux, macOS, iOS or Android** and Deployment method to **Local script**. +3. In Section 2 of the page, select **Download installation package**. Save it as wdav.pkg to a local directory. +4. In Section 2 of the page, select **Download onboarding package**. Save it as WindowsDefenderATPOnboardingPackage.zip to the same directory. ![Windows Defender Security Center screenshot](images/MDATP_2_IntuneAppUtil.png) @@ -407,13 +406,11 @@ Download the installation and onboarding packages from Windows Defender Security ### Application installation To complete this process, you must have admin privileges on the machine. -1. Download the wdav.pkg from: https://fresno.blob.core.windows.net/preview/macos/wdav.pkg. - -2. Navigate to the downloaded wdav.pkg in Finder and open it. +1. Navigate to the downloaded wdav.pkg in Finder and open it. ![App install screenshot](images/MDATP_28_AppInstall.png) -3. Click **Continue**, agree with the License terms, and enter the password when prompted. +2. Select **Continue**, agree with the License terms, and enter the password when prompted. ![App install screenshot](images/MDATP_29_AppInstallLogin.png) @@ -422,7 +419,7 @@ To complete this process, you must have admin privileges on the machine. ![App install screenshot](images/MDATP_30_SystemExtension.png) -4. Click **Open Security Preferences** or **Open System Preferences > Security & Privacy**. Click **Allow**: +3. Select **Open Security Preferences** or **Open System Preferences > Security & Privacy**. Select **Allow**: ![Security and privacy window screenshot](images/MDATP_31_SecurityPrivacySettings.png) @@ -430,10 +427,10 @@ To complete this process, you must have admin privileges on the machine. The installation will proceed. > [!NOTE] -> If you don't click **Allow**, the installation will fail after 5 minutes. You can restart it again at any time. +> If you don't select **Allow**, the installation will fail after 5 minutes. You can restart it again at any time. ### Client configuration -1. Copy wdav.pkg and WindowsDefenderATPOnboarding.py to the machine where you deploy Microsoft Defender ATP for Mac. +1. Copy wdav.pkg and WindowsDefenderATPOnboarding.py to the machine where you deploy Microsoft Defender ATP for Mac. The client machine is not associated with orgId. Note that the orgid is blank. @@ -442,14 +439,14 @@ The installation will proceed. uuid : 69EDB575-22E1-53E1-83B8-2E1AB1E410A6 orgid : ``` -2. Install the configuration file on a client machine: +2. Install the configuration file on a client machine: ``` mavel-mojave:wdavconfig testuser$ python WindowsDefenderATPOnboarding.py Generating /Library/Application Support/Microsoft/Defender/com.microsoft.wdav.atp.plist ... (You may be required to enter sudos password) ``` -3. Verify that the machine is now associated with orgId: +3. Verify that the machine is now associated with orgId: ``` mavel-mojave:wdavconfig testuser$ /Library/Extensions/wdavkext.kext/Contents/Resources/Tools/wdavconfig.py @@ -472,17 +469,45 @@ Or, from a command line: ## Known issues - Microsoft Defender ATP is not yet optimized for performance or disk space. -- Centrally managed uninstall using Intune/JAMF is still in development. To uninstall (as a workaround) an uninstall action has to be completed on each client device). +- Centrally managed uninstall using Intune is still in development. To uninstall (as a workaround) a manual uninstall action has to be completed on each client device). - Geo preference for telemetry traffic is not yet supported. Cloud traffic (definition updates) routed to US only. - Full Windows Defender ATP integration is not yet available - Not localized yet - There might be accessibility issues +## Collecting diagnostic information +If you can reproduce a problem, please increase the logging level, run the system for some time, and restore the logging level to the default. + +1) Increase logging level: +``` + mavel-mojave:~ testuser$ mdatp log-level --verbose + Creating connection to daemon + Connection established + Operation succeeded +``` + +2) Reproduce the problem + +3) Run `mdatp --diagnostic` to backup Defender ATP's logs. The command will print out location with generated zip file. + + ``` + mavel-mojave:~ testuser$ mdatp --diagnostic + Creating connection to daemon + Connection established + "/Library/Application Support/Microsoft/Defender/wdavdiag/d85e7032-adf8-434a-95aa-ad1d450b9a2f.zip" + ``` + +4) Restore logging level: +``` + mavel-mojave:~ testuser$ mdatp log-level --info + Creating connection to daemon + Connection established + Operation succeeded +``` + + ### Installation issues If an error occurs during installation, the installer will only report a general failure. The detailed log is saved to /Library/Logs/Microsoft/wdav.install.log. If you experience issues during installation, send us this file so we can help diagnose the cause. You can also contact _**xplatpreviewsupport@microsoft.com**_ for support on onboarding issues. For feedback on the preview, contact: _**mdatpfeedback@microsoft.com**_. - - - diff --git a/windows/security/threat-protection/windows-defender-antivirus/scheduled-catch-up-scans-windows-defender-antivirus.md b/windows/security/threat-protection/windows-defender-antivirus/scheduled-catch-up-scans-windows-defender-antivirus.md index b22dc34733..9a451f585c 100644 --- a/windows/security/threat-protection/windows-defender-antivirus/scheduled-catch-up-scans-windows-defender-antivirus.md +++ b/windows/security/threat-protection/windows-defender-antivirus/scheduled-catch-up-scans-windows-defender-antivirus.md @@ -75,7 +75,7 @@ Location | Setting | Description | Default setting (if not configured) Scan | Specify the scan type to use for a scheduled scan | Quick scan Scan | Specify the day of the week to run a scheduled scan | Specify the day (or never) to run a scan. | Never Scan | Specify the time of day to run a scheduled scan | Specify the number of minutes after midnight (for example, enter **60** for 1 am). | 2 am -Root | Randomize scheduled task times | Randomize the start time of the scan to any interval from 0 to 4 hours, or to any interval plus or minus 30 minutes for non-Windows Defender Antivirus scans. This can be useful in VM or VDI deployments. | Enabled +Root | Randomize scheduled task times |In Windows Defender Antivirus: Randomize the start time of the scan to any interval from 0 to 4 hours.
In FEP/SCEP: randomize to any interval plus or minus 30 minutes. This can be useful in VM or VDI deployments. | Enabled **Use PowerShell cmdlets to schedule scans:** diff --git a/windows/security/threat-protection/windows-defender-application-guard/reqs-wd-app-guard.md b/windows/security/threat-protection/windows-defender-application-guard/reqs-wd-app-guard.md index 2f08cd9670..fc2f274410 100644 --- a/windows/security/threat-protection/windows-defender-application-guard/reqs-wd-app-guard.md +++ b/windows/security/threat-protection/windows-defender-application-guard/reqs-wd-app-guard.md @@ -36,6 +36,6 @@ Your environment needs the following software to run Windows Defender Applicatio |Software|Description| |--------|-----------| -|Operating system|Windows 10 Enterprise edition, version 1709 or higher
Windows 10 Professional edition, version 1803| +|Operating system|Windows 10 Enterprise edition, version 1709 or higher
Windows 10 Professional edition, version 1803 or higher
Windows 10 Education edition, version 1709 or higher
Windows 10 Pro Education edition, version 1803 or higher| |Browser|Microsoft Edge and Internet Explorer| |Management system
(only for managed devices)|[Microsoft Intune](https://docs.microsoft.com/intune/)

**-OR-**

[System Center Configuration Manager](https://docs.microsoft.com/sccm/)

**-OR-**

[Group Policy](https://technet.microsoft.com/library/cc753298(v=ws.11).aspx)

**-OR-**

Your current company-wide 3rd party mobile device management (MDM) solution. For info about 3rd party MDM solutions, see the documentation that came with your product.| diff --git a/windows/security/threat-protection/windows-defender-atp/manage-allowed-blocked-list-windows-defender-advanced-threat-protection.md b/windows/security/threat-protection/windows-defender-atp/manage-allowed-blocked-list-windows-defender-advanced-threat-protection.md index c11ff2b24d..150cd87e78 100644 --- a/windows/security/threat-protection/windows-defender-atp/manage-allowed-blocked-list-windows-defender-advanced-threat-protection.md +++ b/windows/security/threat-protection/windows-defender-atp/manage-allowed-blocked-list-windows-defender-advanced-threat-protection.md @@ -57,7 +57,9 @@ On the top navigation you can: >[!NOTE] ->Blocking IPs, domains, or URLs is currently available on limited preview only. This requires sending your custom list to [network protection](https://docs.microsoft.com/windows/security/threat-protection/windows-defender-exploit-guard/enable-network-protection) to be enforeced. While the option is not yet generally available, it will only be used when identified during an investigation. +>Blocking IPs, domains, or URLs is currently available on limited preview only. +>This requires sending your custom list to [network protection](https://docs.microsoft.com/windows/security/threat-protection/windows-defender-exploit-guard/enable-network-protection) to be enforced which is an option that will be generally available soon. +>As it is not yet generally available, when Automated investigations finds this indicator during an investigation it will use the allowed/block list as the basis of its decision to automatically remediate (blocked list) or skip (allowed list) the entity. ## Manage indicators diff --git a/windows/security/threat-protection/windows-defender-atp/respond-file-alerts-windows-defender-advanced-threat-protection.md b/windows/security/threat-protection/windows-defender-atp/respond-file-alerts-windows-defender-advanced-threat-protection.md index 5334c052ed..e5f643f908 100644 --- a/windows/security/threat-protection/windows-defender-atp/respond-file-alerts-windows-defender-advanced-threat-protection.md +++ b/windows/security/threat-protection/windows-defender-atp/respond-file-alerts-windows-defender-advanced-threat-protection.md @@ -15,7 +15,6 @@ manager: dansimp audience: ITPro ms.collection: M365-security-compliance ms.topic: article -ms.date: 04/24/2018 --- # Take response actions on a file @@ -109,13 +108,17 @@ You can roll back and remove a file from quarantine if you’ve determined that You can prevent further propagation of an attack in your organization by banning potentially malicious files or suspected malware. If you know a potentially malicious portable executable (PE) file, you can block it. This operation will prevent it from being read, written, or executed on machines in your organization. >[!IMPORTANT] ->- This feature is available if your organization uses Windows Defender Antivirus and Cloud–based protection is enabled. For more information, see [Manage cloud–based protection](../windows-defender-antivirus/deploy-manage-report-windows-defender-antivirus.md).

+>- This feature is available if your organization uses Windows Defender Antivirus and Cloud–based protection is enabled. For more information, see [Manage cloud–based protection](../windows-defender-antivirus/deploy-manage-report-windows-defender-antivirus.md). +>- The Antimalware client version must be 4.18.1901.x or later. >- This feature is designed to prevent suspected malware (or potentially malicious files) from being downloaded from the web. It currently supports portable executable (PE) files, including _.exe_ and _.dll_ files. The coverage will be extended over time. >- This response action is available for machines on Windows 10, version 1703 or later. +>- The allow or block function cannot be done on files if the file's classification exists on the device's cache prior to the allow or block action. + + >[!NOTE] > The PE file needs to be in the machine timeline for you to be able to take this action. - +>- There may be a couple of minutes of latency between the time the action is taken and the actual file being blocked. ### Enable the block file feature Before you can block files, you'll need to enable the feature. @@ -149,6 +152,9 @@ Before you can block files, you'll need to enable the feature. When the file is blocked, there will be a new event in the machine timeline.
+>[!NOTE] +>-If a file was scanned before the action was taken, it may take longer to be effective on the device. + **Notification on machine user**:
When a file is being blocked on the machine, the following notification is displayed to inform the user that the file was blocked: diff --git a/windows/security/threat-protection/windows-defender-atp/response-actions-windows-defender-advanced-threat-protection.md b/windows/security/threat-protection/windows-defender-atp/response-actions-windows-defender-advanced-threat-protection.md index 6e0c39fbf7..bc0073bf43 100644 --- a/windows/security/threat-protection/windows-defender-atp/response-actions-windows-defender-advanced-threat-protection.md +++ b/windows/security/threat-protection/windows-defender-atp/response-actions-windows-defender-advanced-threat-protection.md @@ -31,7 +31,7 @@ ms.date: 11/12/2017 You can take response actions on machines and files to quickly respond to detected attacks so that you can contain or reduce and prevent further damage caused by malicious attackers in your organization. >[!NOTE] -> These response actions are only available for machines on Windows 10, version 1703 or higher. +> The machine related response actions are only available for machines on Windows 10 (version 1703 or higher), Windows Server, version 1803 and Windows Server 2019. ## In this section Topic | Description diff --git a/windows/security/threat-protection/windows-defender-exploit-guard/attack-surface-reduction-exploit-guard.md b/windows/security/threat-protection/windows-defender-exploit-guard/attack-surface-reduction-exploit-guard.md index a799cf3c7d..2e78745404 100644 --- a/windows/security/threat-protection/windows-defender-exploit-guard/attack-surface-reduction-exploit-guard.md +++ b/windows/security/threat-protection/windows-defender-exploit-guard/attack-surface-reduction-exploit-guard.md @@ -36,6 +36,29 @@ Triggered rules display a notification on the device. You can [customize the not For information about configuring attack surface reduction rules, see [Enable attack surface reduction rules](enable-attack-surface-reduction.md). +## Review attack surface reduction events in Windows Event Viewer + +You can review the Windows event log to view events that are created when attack surface reduction rules fire: + +1. Download the [Exploit Guard Evaluation Package](https://aka.ms/mp7z2w) and extract the file *cfa-events.xml* to an easily accessible location on the machine. + +2. Type **Event Viewer** in the Start menu to open the Windows Event Viewer. + +3. Click **Import custom view...** on the left panel, under **Actions**. + +4. Select the file *cfa-events.xml* from where it was extracted. Alternatively, [copy the XML directly](event-views-exploit-guard.md). + +5. Click **OK**. + +This will create a custom view that filters to only show the following events related to controlled folder access: + +Event ID | Description +-|- +5007 | Event when settings are changed +1121 | Event when rule fires in Block-mode +1122 | Event when rule fires in Audit-mode + + ## Attack surface reduction rules The following sections describe each of the 15 attack surface reduction rules. This table shows their corresponding GUIDs, which you use if you're configuring the rules with Group Policy or PowerShell. If you use System Center Configuration Manager or Microsoft Intune, you do not need the GUIDs: diff --git a/windows/security/threat-protection/windows-defender-exploit-guard/enable-attack-surface-reduction.md b/windows/security/threat-protection/windows-defender-exploit-guard/enable-attack-surface-reduction.md index c89bbdc0fa..d499b7c268 100644 --- a/windows/security/threat-protection/windows-defender-exploit-guard/enable-attack-surface-reduction.md +++ b/windows/security/threat-protection/windows-defender-exploit-guard/enable-attack-surface-reduction.md @@ -36,6 +36,9 @@ You can exclude files and folders from being evaluated by most attack surface re You can specify individual files or folders (using folder paths or fully qualified resource names) but you can't specify which rules the exclusions apply to. +>[!IMPORTANT] The rule **Block executable files from running unless they meet a prevalence, age, or trusted list criterion** with GUID 01443614-cd74-433a-b99e-2ecdc07bfc25, it's owned by microsoft and is not specified by admins. It uses Microsoft CLoud's Protection to update its trusted list regularly. +>You can specify individual files or folders (using folder paths or fully qualified resource names) but you can't specify which rules or exclusions apply to. + ASR rules support environment variables and wildcards. For information about using wildcards, see [Use wildcards in the file name and folder path or extension exclusion lists](https://docs.microsoft.com/windows/security/threat-protection/windows-defender-antivirus/configure-extension-file-exclusions-windows-defender-antivirus#use-wildcards-in-the-file-name-and-folder-path-or-extension-exclusion-lists). The following procedures for enabling ASR rules include instructions for how to exclude files and folders. diff --git a/windows/security/threat-protection/windows-defender-exploit-guard/network-protection-exploit-guard.md b/windows/security/threat-protection/windows-defender-exploit-guard/network-protection-exploit-guard.md index 3f018f31f7..8ffcfaf3cd 100644 --- a/windows/security/threat-protection/windows-defender-exploit-guard/network-protection-exploit-guard.md +++ b/windows/security/threat-protection/windows-defender-exploit-guard/network-protection-exploit-guard.md @@ -53,17 +53,11 @@ You can query Windows Defender ATP data by using [Advanced hunting](https://docs You can review the Windows event log to see events that are created when network protection blocks (or audits) access to a malicious IP or domain: -1. Download the [Exploit Guard Evaluation Package](https://aka.ms/mp7z2w) and extract the file *np-events.xml* to an easily accessible location on the machine. +1. [Copy the XML directly](event-views-exploit-guard.md). -1. Type **Event viewer** in the Start menu to open the Windows Event Viewer. +2. Click **OK**. -2. On the left panel, under **Actions**, click **Import custom view...** - -3. Navigate to the Exploit Guard Evaluation Package, and select the file *np-events.xml*. Alternatively, [copy the XML directly](event-views-exploit-guard.md). - -4. Click **OK**. - -5. This will create a custom view that filters to only show the following events related to network protection: +3. This will create a custom view that filters to only show the following events related to network protection: Event ID | Description -|- From 47b4e679f043e33f5f00d8343d3a73196439b559 Mon Sep 17 00:00:00 2001 From: =?UTF-8?q?Dani=20Halfin=20=F0=9F=93=AC=F0=9F=94=A8?= Date: Wed, 3 Apr 2019 21:44:57 +0000 Subject: [PATCH 109/724] Merged PR 15093: sync from public into live --- windows/deployment/images/wada.PNG | Bin 0 -> 228785 bytes 1 file changed, 0 insertions(+), 0 deletions(-) create mode 100644 windows/deployment/images/wada.PNG diff --git a/windows/deployment/images/wada.PNG b/windows/deployment/images/wada.PNG new file mode 100644 index 0000000000000000000000000000000000000000..1c715e8f0e798159119d8bcd2f6eeed2844e286a GIT binary patch literal 228785 zcmbrleLU0q|397_IUOfD$2+94bGq_=zr&KmnC(=jobwhc9V9HRT3IgFVr-+FQU_a( zlaaA5PDw78<|^hYM%a>>i40@IFw8FO!hWmszWlzwpWo;9yZ!#ajT^Vu{dIrb?+?%C z(-gJef%(BMn5~hZk_JQkKZ3Wl@K=9c)GuQ_@}~} zwd=_T&&6#f`#b8^zxvwnr-EMdvmoxLD**S6*FXC@=h&Xe z`LYiZ`kBZdUrBcEtpAzy&2dAwHDkEYMc7cNATV9|(Hl3vvnWk{)nTQmW#&pR^F?@J zViQKZgQ}606!Db~OA$>{4+7!>M{D-LOeE#BY4Mql2)Z=%`IkdwhUCOPfrLemOfZ z)P(w)n2m1P2b8)F+(-Kku>k>PF@W&|Fw!0q(-qah3R#_;l)Va@i&GJY)a%`rJBIvVS?(yh$sX1{|VkGfk z27cel*quNfALV}T3em(XGGYMHB^$joP*RmVxN`&!wzQWzCHt3waR=uBi?oQFg3p=V zU_^1M7@uUutTshO$~k;lpWhy{xGx2xgF*ZtUs#q)fq*gtP`{D3Nt@B>*cCJ{@&t-H z5`enXJ|_WpSML>m2Kk{7xdH!?H!@7P{3YTo6*_5g8ynC`S<9|igYDRD=Bimo)%r11 z-Cmk6>#xtinf(DRcNZfsl#pt*Q` zxJ?5)0uWCEJaa}aI~GM=%^xy*&j7j?o=YZbRavyAerUIJn;JJcG&m=P97QrOD+|q1 z+^9fL%gPB&!=kEa;i>~m8XZ?C!4jYUG{}xdRTZt3lL*1sy9g@Ds{YBd+2 z+tjCqT#xon_u|)yJ-d^9x1*Iec@4=wZ>NSsJNXnvNcmPY*{9S+2uEC_oKUJ{SLbGEi z6cetvFE)WOmoV`Y%SUw#zF8V_!L;NfzOk*{?x;#mi;Uq%0xy+z0z?oIZ;@`(wlALg zmvNpc{>uE0TBmCCb7W)Xa>`OcYAknrn|PaFlx?=@YLB>TQ$bQcPDdg%L)U%Ga;i|! zH87qzhc_6ZMDrzfddIVyJ}AD(Vlwm?3qAfRw^~Te$xj%k3Z4(%3@{ywA9>#Da@@4@ z=ZJI1;=b%ihr(6ip>KV{V3BaQiw_l-!~SggJKOsxe0J8vlHh03j0oe=7fljcR{N-D zAXw!EgY-tmCGE5wvS*^gboOG55cnK4WTW=!15T)3BK@}w!|G2n}ixg{-ZO64t$4|*@(a-{c(HjA2g zmax&rb#qj?Y}c)PW7pq|u-cbc>4DwG?<{Ku51-tw4lnCwWKeOzT5q&*V?b?am*6qX z6X3(LQjSHj(qM?Y!+!I-VCre)F(6hCpmG?tV0K05x#4vLXSF4tknZkB{1?bL~yEB5E1OJA5gLiDs3 zVVv$61>v*Oi-nUZ>D7A3uFOM{egwr1zIOA)*c~!~QCeqr)KNVDt!U&L191k)ij0pX zM`C~wu$(y}-#F2~cH%H`K6lL-@c1j36Y-#fhM24Ean55lC-aJ^OfI?^{k;_e&sfpu znU&%mM}_Su%#JB+%QM$DxH5jzrH1M74V!2fZAUP8y|zM0gJNeueamIW{(O z?PH*Gq090f+YbD;k8yVTh6Pm;PWZr^FPG7Lz1b9FN=moW2V`;EKjYjKlkdGJ*B=O? z&xopb#ot9Q+_GF^=DAtQ_6(&T>@nqQkvRVSkRk-jR9L z_FsHa(SeVtfU~}zqBoq=xkOuO3#7_s<1z2^XD27`%p)_R@f}=R^4s;OF2$POxtOrl zrGu(R66D?gaBbM0k@CrBg zNlnY$f`+s95x#%eg)9229v6|aHcw8Txo?`x$_k0%-*;9cnj<}?kaN%y>9%<*QsG#_ zsEKK10ny=PK12O|m|HdT7lINC+$VRtRP`Sos`nu1;PsQTes|Eg@*BL9LJIzShM{Uk z6qjY5WXSG3wqUn0#4elZ747RtmnsY6uxrn{#LR!t>PE&^xbusN^|1`LqSXAgkTW{r z&88)I;KF8C;BqpE+w7O@gOYt zXhxw?NZ6(I7I-Z^-GtHb=YsU+q9f;$52otMsST1}+WjoBp`W$Ke>HgXBf zEvFhiPY$aeumQC6^5PxF83*BiIx2yrxX3qf&e~W8rBefRH36CFO?A^IAt~pxel_Y0 zx%=7T>q9JfjWr7WaG-%MXFR&HBUO3dydX!)w9;*~4So)-a1|Z{vJ|qnO;CPO zVVFNTxD4lM)*M@Udn=VT)BOk(JUe}`_m>s{NZY#HmuajcC)1z`>bWfRSkP4)%{b}) zG84V7iDhKp!8-E3&#rVW52+~;Lt9WK9WgDD4T%EXTtFPr!g{*uK8?UU`=757@2Zi3kBDEQJwYQ1-Z?80Bq zt%~IbE;&mE*`6mxIrada-0B+?~ zPN26^-j{YYSg)d_Vb-fV!rZQ&NQ+*$zpw#5shrVg;2Cu?xB0q&f*S6pH~K~PyQTeA zRJZ@Tg=2%N>#!afTx7lWp4=R)d8y)_hfCn!NJ3?rrU?ScJWfUm<2G{G+vf7Mt5kBt zgShGGEe({_=Vxdj;Y!~iI5%_K+tHH<&Hz4-0^&I zeLgNrP*maT0qaI)NHo`6VjdKlZy2m8LL~ufx&Th!klo{&tzvM_fA<{LxAR}5t$dHV z0%iW1)?HWMEC0bX2ql^O2Vd_`lZ59FLaD1z!vy#&P4OibEDb_jQB6lT?PnlfHZ*=0 zF_5?8Vg?lY0K^Rz|LULQZ@cGhb8+weo{}tyG+;-xJ?DZAqpti_mnE2>nte$)uvy^I z6uJrUo$>#FbbpU#tfZxiuKP1zWarkTYt}nZ{pAzVn%ui7!66!SHy9(ljcP!I^&1bw z2NmuqfaOHqMSJwZe$-CSI6u(dM4Zd?M}}oWw4CQistA)E6Na^4>cxEUVN4H~RQPs_ z(qi#BrK|H1W9#bQ)y&VlA7w`F^ZK&$2@$Y&1I2jj$GmYLvb)fG6+&e?lrdbeb1Qn2 z73LRr(I&^0rgyF9N6O8OOX>0QuBGmBMwl_BU#gv5Y23X?>)@T)Pdo95@%n5a!y@X= zHlg>(7Esw*R(GOBR7>y(X35nu2{nH0^lHx_=(g8fMKaBCUDez49GL71X(Ei8?A{00 zJ-VR(EuYZuw>ZAJ@49fd?-VR4ymx+fV9HH6SvkapFsAkS^V@CZY;#oMk#idMgJPwE zcoS}rcH!ai%I|`3_J3V36>?4^GUn-VK`To6j0^E$^@3 zB?y;}3*d zO$5bc^cwd55_+EVhPqsI)7SC<4gWA(WMFwPbboLAPo*ZsjuX};Wk-0%*xrh z>s3Z$*X>UK5Qdux$i#qeHH4h*xI;_YH2mg3ePucZ22iJB?R|vnn&x_M@-tBUK?3p& za&BoIR3t+bGD9a1m%h&)MUx7P(2nf3zrPXcFBQc-f;KFEYkr$hX2dbn%&yw0R4_i$ zh$#4u0qHR^D+Oy*zrMH{#}gzS&1_3(8Hm5tHK^DqT`|8Dz_Nl_z8Lcr4HuJFA@Dl` z0rNNNtfRk8N_nh%lkai0q@(s_SwOix{#Gn1M^yRp>K?@5k6zyFUiH{+HryA-%D(7yw4Q_5@nfjlT>}_`{RX$dyN#7~HjSg`8LOg#GwW&!B5WY6FeTcxCvV~7uo3Ul4rQu z0B1LSH4L)M2|0e>tY^(<`DS!j&Jf>wR!eO{q8HX}?(Y0{QANsWnLE(hK9-(k!< za8)0?M8`Y-3s^(|n=e*2kBgR?@3W=%g61Jn=0b=Uz{{4$ZvbPsR*0lBfQ2UmpO}gG zEeGGcW;>SncD+SvlIcj|tn6E>1d3&9bVf^nW+%v;)&Q9_8e2SlO2*zNqQW^%KZi8q zXECN0v`#{?#9H+2_QNXb7yc15|4QO1HTDBH@Z{pUuGbmbT zB;|)tqCt~5wwN69p2!i63?O~^l&0EizA?&(JN%`!q>3nX>iDg;-dp+X%D5n{_oC5l znNsc~vi$n4_9Wkhb-1%6wt>ibH=M}qiG3x((Qx7W(l8Ko3e0aiwK35lASl|m>_F4Y zE@V?rp9!CQV%bCg@Os$f2r|#v_jgBT3SU;s@pg>#nnf?nIu}JRI6)WFB$Tnm0qe(Y zY=Uai9AGHQ!cQjQRi4yNO0YPCHjB26D>g247DiQlXO*a43R#D>4Yryp2Lip1h#>#frnqk<+ zNFqLkU6r+Zd3*?l8c$H7vn*`{ewpkuw#FnQ_Vp>(7{}=(&6KkU>^u(v?G~=)i5^rR zc38x@vT(~nP4>wU!#HfgA1@kqc%!IKJqfthmH8}Y!Jt(|U|0-)OrNOInWN_lRKLUy=ZgC&9PM%8!tATYt z4QJH@3<-mRlc2hnHpTkN3Y)?JOJJ;xrtmT+cggS9Aju!I)-Bmn508@2Z|3MkfBO!&F?06u{egEuOyr-k=SMTAh zMA2o+>SXUy2G3@UyeN5b&SHmt{rF7RBU47VK}QRdw7oQ>^#V(SJ+%RKE?Bj>+|Sr! z$_KZMm$)2FqiR>W;@wE2cA`r0fb>pJF`Z>q0u_BrP8`Ga(h7=e;IjbZJ%j4GvvBd! zJc1Z>zKIi`Dc!sr0jStPU#T8-LXRwX!2gIPS?z-1g{5!d=KGh(oZY2EAoNOWQ3r1J zWGbed2m=edWvx~j?Jg}0O6+zFG_XsO7&5zy9I&|d`Ch+q#SuhJFNIN8U%scXapg2;rJJA64KKfRB`paW=}D@!>>4L8AHzE4DJOk!>oc z+w!5p+ehTy_(3-_r`7(t38(4fsWRoX$+8EvFj)O8R-X%`UeF|2aB1ZzB{-5$kri(+ zj6yIFHt2AeDa`U0dQDtfecM5sKh+w5?6=8y$y3ei$^%N;*4wq-+PE9Ot#w07CeP@i zn`Ne${XOW6W>L(xafFMzytYJ-iV>TOcB8?C zs~I+C>cf(z_>pb3SRcyTmYKg0eoF>3n|2q2%tpri-0c%GlCfJb!ngU(0Zrn2_?0R~ zs%;P3y7nUyy0CW%^s_dQ8{v#}xJG!E35tE_x0AG`gKKR^4L%q17ZABV!`Y8zjZctM zu@3hM_RDUUJYBDSf`Tu=FN)GM9J@)Cl{NwC$aJRC1mWoXJ4WtqigY@d$aIvhd|3U4 zNu<7&}5%7Hg#0ajwbufClsF3 zEzb#^0bIc;=A~xP11&EpYR--A%m&Yb%{&z{$yF`7T!5t9@0m&vI$wj74jShKJxE1R z=E#BvRa{LVUzS_|JI6{j2-~aLUSOHYxUzC&r-gE#^vhH#GevWZEtkYa^^7RqML8MzfY!B4r{W~}=((rdjY4ecG|Uw3;zl4yh9utJ~om_A{$w`7B3 znc(-ZGHik*e3aS1pVIaw0k1iJO+xQn8TGraP7n)Y{?&2cuGzLnROdlAL$3vTChu#?|;;^ZwW)Rw?AHF zC{uw=b3)|5u^|B~_>?0ke8(X?Tkoq6Iu7rQjYX~JMpVz%f0~N)f$`SecXr^uYZ?`C zp#a|*4rcH;cE2*eK%g?S{T!TXeflR7v;_}5+ZRlw9p|IFBR;4r~&=mYvZDz(@0=k z5D|1hc4v~-$_o}u`g?!rI5l;W94qWP{n$)5o!+$99x&|Yz&^72!Isa1?)Vl zz~-RgMP?K#v{?a(I}@>OgPmRni?|*@u-MsRHpy`{bgu4LX5&Ek_2KNw4hl^bTA?pJ z%WMtDW8WZtJ3y-Xm?EZ@0`tKr8iDi!emk~wZ#CC#mGgD#n<^d8bq*vqQeTMOp1dn8 zy~%57kz`m!5IlXxeTql^CYr7NI-VzfbRKqJ;^^?iu4w;fI}_?=W>h1nq={A=BG zHwZT%dgRnZ7-t`rPW;I;y=httOTL~?b-Y#R@UtTfz4$uMdlT03eCGT;8ilSYzIYa9 z8QE)su=kuqXOxSRH@pXQ0vb%3v^tG;?pc3@GG6qk*yNU@`>$>H^*L0}Aj70!h#a(u zLhE#TIpgtEf5X0N!^oKr$KjYi@ELc?=U0EWwmdVH@xfT$@{|SLD2jrLcQL5ZCrt57dE7Q?;ZxLRrq zh9jEO;Id0nm-r%E;nK|GX!tpon2zntw@)Rxvr9vx1*Y)sH6#wF@Kecsu12!$IJLT| zjG1T@FH>c}=jkV0oCA>5#cEQ*WAp11qR5c1ax zX~hL*W76@@Mq_==M9_q1{eg#V^J#1gubx^%`{ngiOWehjq?Mag7;Y|v@;!U~?9008 zbhd62PJP6}$E)`p?e-faEWO$BQGMkX`^XJYiy*R7t#+a);-P{jN?!Oyhs-sC+ncmZ zE^yi)jC4koq=@v9%V9h|sjm>HNKeE?*dm)uE8#RpRnCQ^TepyZ#u2ZxlT@}P?ng~* z(WRpHT?uQkVJCOE3b1Qf7M0}}QAC=b9;Aq>336xSc!i4EfWMAoufD4cvxuXRNo6-5 zWHB$!bsrIE-mR~-T)bJ#_|ss+t!r~YiOcBWeI4%(j}jYX*BZ_6%}^d^ z$nFFh2$q7Gqig_0y)}sHu3lJvze3}7POXN|;ZE9#s?XhYM|0;&zv~WJ4*6RxkTYSp zTG)*b*NdFCb$Ab=?s=~`S(fxN)UVab+iVr^SPUsTi3}C~%1&Ge9c}wrK@SeG^_*RU zu1r=6C!gW*6!DVrcu$2kh3bO-|kE zNiFny79ReKH5j29?hcuq%Z};m#<6G$XJcmWY^h%XJ{}vX3PMftsKvXkL5s7|XK05C zz^H2h4=y-HA%rRFgAUNUlDZK~;mMEkXxx`mb}xKrRaJ2?_idK}5RU$Es; zUixq@c#Lp7-E1<+QE{`5bC-GXN=3$0=>VT*ifN8mx>8BfwQbFL($t+72ba8$5B>k3&uZC2WC zm9W;cS~%PDNvG_#xlhbedhv7SYqaX*H>0|*ztO$)gbp5bSmUM-oCvXUst)_&&889C zZ3mJ!?L&lV2GU!@LwOE+4I-+FRN<%J8riGr7rVQUjBT$7aCB*RSln*jP2B~Vd;1~< zf)Y+RfsWf9KRfVZRnkh$V4DEESL&SXc@Slqu>sGqJIh1d%83Z{rX{K&1{n_k5 ztl`qF8)e&KUeSKn&+t%y&Fjk&F|W1-qzNWN-YkDxx%|J+MNJ(fhL5PN#oM}P>|Q)Y zL%xhB;(szL+0pTQ$3Ibc6ETxj6)+)84dlv)HhfZNj`UmUwGj4CkpHXozfg zQ*)KkV%@<#WNQnDb_57lf5qX_t*I)Tq@>BvjQLt^YY`DXH(@dn925#JeQ#+0x*Ynz z;_B(i3-&J&SLWs|3FR+84R|d+*;ajS#hdI>1f3kLepS0oK4#3bTp-!;sBOu(IX}&N z(VTe8s{|b5ECgeN?SXKamUMaoHN=w>2M_~n5U=an>*8lrlEExUY+;kO{zpD)JNO_@ zp=x3@-BkC2006J1-zz)6O`b9N+lL*u$^gv!Gz*B=U!U?{w4d-MJ^67Gd@l!dOc?## zB@J{NWx6Nrr=+u)I{+Y2Mp?anTBR`!aVCv^Ajx*^DT(kt71-&NkpxF*e-T)n&hNa> zTDnk+mR-1(Igba{du=C{gh4+9$^C=NHqRU9Ute<#};= zZSyDNS3*3$pSP2l#7!1U5PxFawh}iSY2@(+Hsv$FWYq!RKVkk_GAeFZ9&umsj$eVx zBEDw2Ia!u6J0hDUofPyNg0M2}+I5J+^+bAW2}^C8lVn3twA}}K@)j_BqY+diKM}P1 zXtn~0m-Kbb6x}lh--?x>N~3WxybbWrBl;B=65?=2mjJ#Y>{)LwT;lckS&284F3+;d z@h6980E&W3Wvl7+xzi6~4vwysS z?0Go@Th4S zgPcGMRwI|{JR^P;2UE@OEPb$zTtJFuFgyIdJc+cmGK8Wzz#ss27TnPx*Sqn`d{est z+eV+cGWM8>My5FbHoyq56aC5*zLbcZyw97$HxGhqb7KWakTjk7u#{i{V1M=)dcfpkl5ZH%mERwX4C7lzFUHOG zKkp9KpZ|HY*=&7NrhaXl>{%8I&2y%@26rop|s~Bg`qw~9g>M@m^T?<+hwpMVB;Fihw z4JCrMCEzu}SNS0}?9O{Ojkp9EPXs7;Y)L`MLB;PJwH-kvo1oW=$s@GxG5a9K4gtqHuxfgRn2k;Bao zZLsJIQWYGFN4=dv3{X$2kCbT~p~9M#E>Xe*%|j21rab5O<4N%D_E0QZSoL(XLeapy zc2@zVP`A#c3T&Y-l|zFGffbCw84+^5wZ(672KPj$EAZUsB1!wyp;P~Nu~INW%&eL; ze2>Q`(ElbIqR9cViYI(q5AShepzqe$(WJX9I)YI9xWZ}!`lQ}YLxFtjtEwQ`<$()& zsMoH@^hnnMLlkgRl;0Kk zpKQscVnqI7F~NzcWF3T(=>NX~UX#rx6|Bj`)Z|lpEm18YS1#}$=j9-uC3;o5or@IG zn&Y7!$~ETdRn8%9rA!+;cEWITpd`+!u*q7e;%wO38fhXbY4AEE^QA1=es zp%!}X)MZ*tBRmfT5$^?$qfc|6ER>4g3YTuduB9$pQRw03zU2R8 zxA%R&(>1<=C!jFB7{F*8N&KXc`yksD2}SLr*4uP?_^Gb~d7@lHH5uOqMF34h&S<9A zOP`d0&e1e8u(+D252{DwN3OuufMEDY04!|#@(uZx-FI%m&~B#gBkR&%G`l5Zx3j4y zk4@^TnA;`AOwgB69L9=NrjvNKZQpy}KnG*QGjxS}EFkgej~suO8*$hWY4bodj;X`R z_V5>x5q*lUOPAPx@kcd{O20NMbt$6WZ8{~U5*Gx|W`^_9n>3FGZ}L@i$wcUPpE>@y z{?hGa`#%{o&utF~6Sw~EMCX;;U89{GPCil+kl7F-DW>xssfddp7c#DNcssd~^2+Ic zDaNt*$556F9>dw$dHK4)MA}nFR7@`s75Gad$7+XS+U_41?;SL=1UL6u*|N4>6-G~7 zrwdoim&pGIb#6hhh-+sGb%>T=fax0_{8I`m6nk428hQrqOrtVO!b` z@YrE;VCnHEVRWUO2?LBdF;Wo;d zLKN0Fk(KECXbHf^DF(2kU&IB+DD>k17Ad}{rZ=&3%vg`GFE-$=Pj`P09(%Mggy1v* zSq!Oto!Z}c?hmp>jT!7W(pXOC8LH^Hj(1N#Ao&GCywqs9yXF(&uE`ObhGic?O8v?D zQ611=Qp9{sw(ZmJfbW3k^gqYhJ?jLTGt{wVMPDB$~=&IVkh=OLW4mhkdOjS!A&%T|PX8?gl?m!`M!r=C4JJLDkp;PlWqtZqj__wdutq-{$PD7J zG1S_T(J85O0dCchk-gM-OhGe)DTPt$euL_0ktnq~XuTWKz#8_nOm{ zymsfU?0BeRwbYC#YVR{qLW0<_CyFYL^owaRT)*UzDkda1x**VGZZJYct>uA)V;%5S@rAJB_;T)9&$PbDhJhH?VEk8d_Bv=tsL76UeP#8g;6|Af z2x*XBkLfG7QYN?U3eoKH(>?~_RJV(b?UeyN-rive%M)m2k!41|vHciSzFjA>LGn*?bvef>v{pA9j2FlGsjl>zx{`U9-WRo6X#NMg#VntpE? z;C$4u=ZWcqCthpTV02tFREa+(i}L4QuUNgWo1JYlgW{gvL_Vy+DKCsiWW^|9ngw8q zU@ed#7yqJOOeLK<)&x{#0UcnLK=e3GZ4bQ`Dw=d=wR;QZOhWdyvl-mH!9crTB~9x) z*lU-nESmGgi591)rZ~^^wfKzaC|8T=M)$eFx>9nITD<^feExY9Z}iGd0G9DRB*c{l zuTLDV(FjVSRd8LG=2zM>p>Lg1K4^St<^<5x!Oxeql!4CRsM~jozb?Lqra%jWlioZO zBX*t4CoCAF3$oc(nR{7`=J}R?0AVA(C2RXGI;1!c$^dXI*hSwo4K0j+Mf*-N5Z=VP zfR7{Ys$fy-d&d2Dyx>x3*6Q;V{M@+Hx`>p<`Rn((6YExNB>RO4l|pCSH}p6tZs%mD zzizKd<{rWoocu-x5IgQ~RJa8f_EtZ?4C!f|f7S)ji5%FQcwWW8gx_wy`${0SPjUFr zDgbSomr?-`_Xxs*^_W307*|*7k76^!l#{oM*6xslPOZHjm~St3IR0w3$`XIlm=9jf z7>YWfMg&!R*1#0T2k4|1dwXc(38WAQ6w=iy66?8|xO`vWG(TDozj*Kc$OwwXi1x6?v zxHBmY>b#Kr^0diV52jIJg8M{p0lcFn%KmK_3UxJgkNyzrE>+FGZfntnQ+2DlBQyRw_VioW zp(v$UCj0Y`3aE^6Az3F2Z+FG7gxSc&AzXcpX?eD%xEla<*^cVnT0-;d7-HJepVi=8 znn&f$Z!R>3sEB05#m3+)=E2UaqCy1f3Mr#6Cecyg96u6Y`JjBbeUR=M_j+Q?izH3DIr0pt z8CT<>2FP+TFmb`(7*uq$K=1&8L;tTz&0V{EW-ijKG=$szM3Ml$$Sv7|1^DKEyoCRY z$SURxrJDk%G$R208;5_x+~K?d`vU#SJg45uXkQomz!a%urYDvtPPmeC34y%Ye zCX2&QZ0SB^j@OP#UgddpD6pE(D0St@({+k_tLwGJ${68oS-0t2N8@K<9m~3< zfr=ESn+&+3;l_kROZZyP;=k^0hQuaR1OCT=k1)3Zz!v z41|NI?X7jUH9xGztd;~KEZvP7DCv3s=n=h$={j_oZQ!=-c;l&QH)Nps@)3CtbnyZE z9xf`qzI0b~0lkMYNmhI!>&?cfl>C^3Qq?2j3J^2U-<<)D1Jrg z-;#D7qP~Ug>uciu1#7PW&=JX%^s*#Q!gW8b}PB<`l@cHV9ql;?D*mkAv zS9atHGJUeF>VPco@l*7=NZY`=1%yrDW;8C&H#8knxUQUJJdG%;HXJ2%e3*SagZ|a> z9~g68hg1DB-SJmBJL{`O<`GsqMCXqsC*^q;;J?Nv#St5+;95u&w}{1f)o=j6fd9$4 zRB@0Xd&F-1Rb8U^n*m6Kx85^r3ps15`*q8ux+3+^Z{T%aqiVuzC4rDP_{&@#e(WH1 z&+3Q;=Ct>yJIbF5j&L`AJF3+*g{6W(C@eW$hro8f^NLdlr@rS-)X;zQoUCNwj9&?+SV4t zO*Za6`R^o^F(Gve(l*~uL2tW*qD9Q;Gp{E5LNDrOFq#>k%;0~y5`SP4Uy<$3|F)U- z`IkLDW%^kuRy~cn&G=dDnV+RH@bWw9PA37P7vqqFJZ~U!zWAsbF%V%l?Q8&JAB63A z+bi`dfiqE;oI#*OC>V#W&{s_USLZAjeZPZy|B-ryh6L z_XIkCHj^yxn22`?W{h^cr!Nk}za#S6`6`{_mc*N-GQXp7M=Ck%uQp8jgev$>*LJ5D zI3~)EoILl|67vcwZ4F)?llJ+W*1F|GplF`MXC*Q}aQ+UK>SMwTO>c_hge|K<$-Vc? zm?LQy#s^_qjmEoT0D3Jv>*fy=A~+$EQwRz=cRf9)uJ*o3u5#_g0lYyGUB5(^PJSI> z6hfSVoJ^yF!#Azw3(rDDdQ=SclTH_CDs+)AAa>mS=wI#ascRmpVdvm~b9O!=A-}iY@WX-GV z|8t2>?X~HEly%Qd{o5_GsuR>t`*R;oz!HU!vCsZrF=Yu5Gieo2@qlFZrRzXfm-#T8 z*TBHcE@lp#FT>&<2DsT>k-*IkK1{7ij#EzeKi^>ix#U;4w&HeLi<`C-VlDRCF(=AQ zG9hrtAy2bo(=)D&pF0u2H8+z7mzb6}N%%)l>8g1bFU>0>I^=<5!uDZ~(J70c^4YCd z9NxUht=D9r3<5T#mzVf{$lyPNtDv`ps|LyzACDFg;SO+(cloPY_D$GVy+KNP?i|3P zsKBKzau2L}X#OIw`Od^q-{b}7>P$RjHn33Zp>R>-Z%~*<3CF(2*R=t`$IV*16$xTH zW48+1V7S|n!t5Cd%jYe7>eZl*Jf;E;mM)qc(Y2nqc6JS0j=iFlo=K^##Xw_#cMYY= zs!b1fT`awq?LFTBEQrIbUGTgl8vA3zmwLD=@uHc4kr`2$7hnE*$T->Yo8HI)%K^k` zRB1mq1YsNVsMe~AK{;Rp4O#Gu;gCMA8h=`;3~5Jv+^H;FrA6KW0L7~hKT&U*bofJy z!^gc(p{&e5EgCodn2TF7i6D*KH?LM8bw%aM0a)E~+FFles4T2gRX)fjOmx-+kK@=c zU!w@iJPtR#z7y*Rl%37oNEv3ap{lL@qPL}mLv2c42ZryT>cZB(D8%$-^2qLIM-hAq zTPNF|c=m(u{e<($>-w= zXCW*CVD45^K*g^(KP5GIR;9)AkGk-BJOU@?{O`kF%OtIvxt8OM{b}aXc2z@QTt#>m zQ*8!Vgr4^e@>l$|!+N+G@-qz`cjo%XEm%djG3-Exi6edHu}|2fGDtOE!cLUEa-a9X z#4W#;J0GZsE^x;oTu!5G;m@|PHV&(kqKf||#?yS6YRE5FLT_E&O_FFPX~i<-{cfpO zCgT5a$lupYDfqutmFKS*QMlG(qN=YyR_Wgv^J({W+VQ;CyBoU3oC+evEcCI92%t|3< z_5}%N8;$9}&iSYIYAE8ld-z5E8pDj+Kp1O;ITOESDqecV2uuI9<(%i`uol-B6x6=o zx?TC@bSr4h(nM|B2oFxkVietckD$fJ(%-(?KVet{gLddnIgBiH)c+i^C<|;-PNa=0 zt_PpLkmYO{a6P?PS@$e`6mD#|KhM%${%cXRq#(V7$i|&c!7SK!J~xDE%2$!U8PU=? za5V;=Jh^J#ldN!v_UL~{2JifTXnXUhCeL;KU!+Ja3bh^yB7@Z`dmoWV5g`motyQ`= z3M!QuB1VmZGDU-R6NW$rw~o9BJ*>-t<09EKUa&84PR*^IP;z$5#VgX5)3ahgVAwpjj9v*5>` z2*b4bQAQy=(b_A#3!7%&dhT4Xw6t@{($GRP@hU83nZN57z54^^@%_rJ-3?Co;Z{W( z!qE0^DFGrj+K>4397J_X={9#GB+_zyRo(23S9&$=wczl^px%#-OjN3b(o4a#T6;$J zJwaZX170HyaW!a!0;Cu@VQ%_x*iWOb=zyz>hG+I-fBgth`Fj;~dUTl{SEOceV^;qX4ei({sjVe^!H!^3L94eEx?+%$Czn*UsW>7Dk zHLwI;Jg}SYTN~e3wPvO1F4`d!?d*u)7V8RG=Xm4o7i@J9cB#eWT|UyhZnGXyKgY>= zhxh#^GkjK?5JD&fJj45ZUR=q5D7(*1`+t&+FXlz2itBurwu$v7&LHpMYb@7QP5a^N zEk7XwqPIHgcp=5;#A;8ng#n zDu(sALtwv?^+WiN|K;V&b6IG)Ctdd@sI>#(T&Y8>kbJRFpR_k3CHJ}y=#7bP?QRt7 z?~2UEm(InEErfIw!*gUTmNVK&EnJg}7~r~HU<>sIAI4mr3jZ+Z;t|N|1B9cwK)Zc6 za54z->oMat9WopKbx%5!rktl98;LMUFP{VY#FC)P$#4=a$O8{o>E4rS2wB3rHPSbNT~ z^Zk{PaZQ+uq<+2C>C%{Ukf_#Y?x7WbdqJRjtS#&PB5TI`LZPA-9oVc;`cbUVpd51%Uo19b#|7TTuQ155V_e!`nY#$qzs*Dze9I#B}}3v86AwkU|QfayYsu9IWoqhAdO zfgY{`+UEAbfzi6r$ZoPIDDhqNW@y@7bpb;Z+P|m2tbM4mJaySiKg$=xv!?8j=2PaP z>oQE31fv+s`VqFK+a8i$(ht?}8x~KT#UZ+QqByf7<5a^OJ+%H=zO}QdD^TI2X=7|i zy#ZZ<3<(X>NX+f!#T(K{&fRZ^*w!hf`sTxrKpjS(1W6g2eq@t3_SF8+NdCOZ%S(yh z)bbT?Vn6tcfLpx{K|0p>vH^opwX~P42vaxoO6YScuL_srVL0ly{xK1&pSYiONm*>| z;{IJdFPhLA<|0xok~J&|@Kjq5a_R;KBmnfiM>=|$RcUl!G2hbp= zR(A8rv2XKfvbN#OA*~a#p3MsjTVSl~n0ax1s6}DBku1elF9HFtlIBS9N+9a5kX>7wVbwokt^}()MYv3=rxh_NJpwf4AlO@ zordVp^=#m{6;09jq&uC|o6mFtOL(r0Pqy#8p4tH3EZ&1Ltz8rmziTs(y&vCe71s>{ zA%KyFgiW8Yd_!vo~S$bs*Izu>iAAQAv>$SQUh zh2T^t;5UUjsfMpVF&waw6@6Jwloz?eDB7KImrIenPa<;svMI1aNbFX8(QbE~B(r7V zWXN$Ve)Y#`j)1MGFQt^vjwfHYdfOfsYE?PL!Kz`)yTm)0RQ<(8zNWy{?1j$iaeBy| zgJqHY zn!>I}*DkZWzF7OJB=xlgqqu|!ldQN$p7766?XSaoW_IMA2>iut(!Q_Wd8vyQa~XIC z9jR<>3)-6hj|>aodg>>p%aG)5wS(}nl3H6;M9d=(S@o=s+smNSfR-6!LDPqIKEev)AF(uAO#nS=D2pnoQL3sL0-QbU4}gA@--` znVQDGr&pUCN_}(-9XXiWs3?Q_vQelsSnqv_|1^2ybcrXx=1BBC%bu*dJpi4pvQjBc zKKW4O=iPH(u$Q0NQNK5xb3k!e$VDg5$xejGems|B%K0wG19CgcTan+U?#nChU&<*AzO|F0kbJW zgc=QFXwUOBEh3Cjd$KOt?CtCDfeN(>cTL<^E4lh?HxesZuo#nuA4oUG$Xk&eFvTLy zuXY_kYno#=2-+`^2+(i~pw+Qo-t{b_AJ%`BU*H zOw0SvC5d@G!Tg)8mqVA{`}!oqKXEP>vwD}O=E)H5ce9b3es>xIcO$^scVhNtId&w6 z#L7!`q0V=@I>7Ioz)nl2)Rdvi=!>25F@jE{l@kj$1Bope_&#U26UH!VELm~{9ZJ4< zY1wBTZ+qR*6SDjr+<-Rr(LVoS+r7GG^69x`%~&br0mIwWIO+jhHECwHI!+|`3PDRo zT(Fd$K+CoEOg@(FTpXEM`-#Gr7-o)Y+NF3#4mxcb4jxS+g&d$i+&h1$7dGTOKR6@`H)kSzQEWt25J#Eua2BB6al zM{3Y$`Q`D~tBt-KtYTv&Wp)lX0*-z`Z{yVr#;p$4V6dK(NakYchI?dJCbDg!S9+yC z)i>5pkO2vm%;c95jhSue5v;lv>Vk+&k8ORn@I96lfaMj#heaA$d{2cH-xao>)EDnP zR}}`+;#)_$1uxB5kZordf3{0USLjUAwPrhCl-f@k=ZbBW zl$5RcDDp>RY58t3tJ_{AG}DU&gq4_risV?4a0LN(Ub5s^FtKNSB<6-MDnNbl>q7%I zd9s)FNdG@(XQyQI$-hhv`E4O~uajglF7RIeU0{A_!`8Mv?cAhZ*u5;2y$oG=(gwA1 z0qTJ-<7>0&5lgc#V7)mK_ULSHFmVpI;6hAPcvcdZ-%l1%m&E*mrCxKKFJ3c34M-$`=Tz!N20H^)+6%NKTGUyP^QJO2?36+ zv|*1a;^*^-?|LkZy3wDaZ3z~k9eAYECY!&lH})v58>3e@@{x*wWCJf6pQq0#k@~@4 z7pd3l(rfZSKiV8(uP=fsaSAa`JfLNl*nBqrlnv;1-h=4n3Pa+ub{I~;_NPjHYFVn9 z?xz&|<6WRApMpY7ShTm{RiDld%xr=l{ZemMo0AAT)7wv>FDW#%Ytr!cn~c4_Xrmbsc~#+2sRP&z-b)u0{>r0%Lx)x@H|4TpEu)mP{jmOdjZVs* z_~kNM9BGGC#eF_~&qRN$c1nO9icr$MtEU92#@uxCb@C9dfDf7^IO^- z#mVWZyW{U~=iUf)dDVAOLv9M@g04Y{cTLP#gEiZ05m%t#s6x#gX)=@VY6AHPL9zOl8|c0$*o|lByya zfG)Z}C=eXz$Ov@j6|*{^8%3F~tk11|^Pxs)zUpYl9mil8xOR1FqSKEXzb$-nrDjyN z{wV{zn^|+V-nh2X2>w=d!5w}tJ~9C!UOt_rre4K^Akc^L(!Y`xJLdfI^f}%q`W`Vs z!AYowRdxKJr*4>rrKR{~!(>JkWQBx2XDKSqL!39ODT7>JJxxYWOv+c^)iwe}_Dw49 znKt^fHg7%@1Vu?9;Q69HYWt38duXwNiF|(CzbCD`Hckbn{KgzSx5z=`m~!+fvR)MY z`9((j=p-r&4NFe&9Y^+Io@YT6Ysb`u##{f%yuYx>!vP?zHO62s=VyM*^ark_D@RkR zd#GYRaM7>1hSgXw)m$T%;?hX+KiLp#(SWJ0Fz5M(0np=C`yf`eq-g|eBbqMkpq8e~ z+qYV*Eqzl!M^mwvA2x5qiwwO~42*pv8yyr~Mz}Cq*|?mD9qU9I@So<8)XxN(%&mR* zy>K3*?4ytW-1q=KdrsB7)QhZ<2V}24cYvVJDYj?zSA4v4W=Ef|-}TVxg#dt-RoWGh z@T+AlzBNq9DfFmbr^Z2dKFv7c7+E0ueUIjhZY2q)N6Is^h8Xb?oP=Q*qgA!+uNmEq z3`0Te4x-&R4Cg7Z@uPXQkz`F(^s3{)oT~zOeL0a_KY`KQH0Xb7$t`VZBVT2JtQIG53;kG?+@l4xn4ojg@Xq+U+KCH^874!n^As%5 z#A*dv@gYp<>MdlB<%&EnH$W=(s<+&<)dp^elc74*4gE)5G-3W|kg3m|6;0!rwr}@h zl}Qxebpp+@tNw!DsQd(CUh+dbMh?c_?K~cbYar)Brh4y~q&pd6g_@NrO-CmA&a@X#wdA1&Sd0JPqfAjIDSNA+gKaFuWXXkqiyT5 zaKiz^Pc^QDLJ#z^cUw@tpjX?O!+fA!GwK$v13JE=XB`NlMKM>S%~NbZAw zhU>csjYFth{0B^VjndA*b?j{y`b7=e?2?@jUNhx96B#kMynVqYQSX6){)qo3vq$5i z5dXUMSN1ndc(8XJaK0e{y&1FAEK^6!(HEpmD|r{?1|?F*3Eyj`Nmu(IC zE7MGjr@t}JVQH-M?&S6Ob4=7ik5VW%$2gA}`1Nays>~Su8BKB*^0t1lIix}~z#E{y z+xuFIN5Q6%`yb*Gv&&p^sM8((En9Ufju0xe*PH_{6wP-Q)+Fw4Zo-WZ|E9txD2?HT zs>0n?3$t<0J*o>>G=4N!e6-6kzUzVWv*TEgrFE3IV4Ut z$0qQ<<+Z2RmN#C#8C_s<1QtSFVZUo9i}&h>CYyxm9=tGPJy!l78XaQj$dNLtm;Tj} zG#APnPOd3ev3=bbfqhq8z(e^txAn%f$MIHlsO)Qb$f~)T6~QkN)h6l2mjB_xyG;SE z9Ym_WRPMrio507igu$Og^aYs$Ot@8Rfi!p_%+%Uf@!YMjFK1x>?@pZ3A|iJ3cAx58 zQCPC?W4Bt~D9afOj9mBA-4&7=_vk=QT)JV-Z$*s81rc^rcrOA@CJUTSYxgsC8NMHf z&a8;{xnlk3)k?CU#-iA;~A(+X3^5>Jok~6u5}2Q-q%PoKSkug8vzB1 z4y*9|IP=J`E0Kc3O-62A6iQUuMsxQ8VQ zT16<)>UQcyg7?~hgQvtAl|VN0h$B%?y9Z!7MAZ*6@3K0oIApPE4hI0luQrT60tr7i z2&eWw{qLlMM-OapdvV4?uZ(T;_YLP0Xg9H2?rxKPYYn=X7dn4u77~j|fdxrh8`x0c zd@oML*8ums)gtDcyHmHqyR%RO3hRki-Ww;YVa``Nf>r>RnCyb9qV-iptt5})zjQ72 zXE|X7g3yBYPd|q3s zCrX{K=;}2pX_r7@J}pz4PZ`Y9Y|7oPpSqD>%E&lo^g{yOa_3N5(z~?=U5E+exh@o6 zqZanVfBl-Q3GJzh`3C{MH4ULwUcP8}Zk%eB^AfrIXnCReT$x^)2-JaE&VXwsJmLf@ zR8`MlmXT5J$kcf8q>eu$(*k)9ic$L@_ZwH7;Mm7iN^7`xW|DP!8j!GJ6_T{#<1zp^}qFIQjq-0tM!gJE47&8iTMl8V7;p4h&@WRr5}SGQ06 z89%YRcGYLm&VC%aB{P~lMZbmAWcEL8Mf^x+9-gC7e=kxgJ8%G?q(G0E3OfH_jzA0> zxF;3QObv)P0Z0vLtE2fOb&+e&eg|&k9VtCzzB-q*d+2CK215N~+HgVMLxH zPseI(z+O4cXF%{WOO_BP|3X{odn;gPm_Dc3zbvz~PqW)7Oa7fu#Qvwdk?7T!F7x_S zIby^jvI#XFJ=w;uY{$-9zu;4J$h~gN*-8F#Uov0%sQ)QMbHk3XyZ<-|pM%T6XYVdb z<^*XOP@pRhugfeCa201QC!y75#WnyOMi?|y4Y<4*jq=9}+U4H>pD?K;MtGWsnBwV< z<}dmw5x2vf-y>oyPwGmAsfg54vlnf#_t!8n@bLLe2g~rdFZwe6#1E29ZTbj^0nW&t zYxDCEOZdz5xB?QQ3nX-8-*jWCrah#qa~?;3HV)N~jGL zK$pZ*4>1oT3uV>%-G5@&0EJ~B2uE45kFDko^M2wqFXG~!>+22Y+_L4R0PLCz=Bfh0 zV;7kDuYZNX4Dtth(nIU{j%3*_Yc`f?6NJqv*e^VfO7C7Xo;SK@(RQ=_}8%9 z`7Uxt+V1D(h9?ckK;Qnq*qYsj(__QnKA!z_fvr0y+n{HTZ|@yB=m8aZKh{6MG{KX^ z-vspCTw_0tXjYH^Z$wQz^p_}7&nw$7eHintgW`T;37eY#XUtL#6KTTuMjJM+`u=H-X^ znJ+#2q_^3-{ziz^Y>83(!~w&rY`sWJ;YAqe`mzee=4A?^F8Qz8At;!)}v3Cu&m`1VQOJ|bBnpUOJahrsM86l2VWnj zwt6%^-HqF8%xPvRw|2GnH~-V{M(HSAxPF2kh$%CCxE-H?t}MP>03hSW))&&zS2Q|d zR&UpH{goZwA@C;;t7#^VidjFdM$~o=Op3LvU4JNDbSAkLFN+i9?U*)KwiV%PM+X)V zg*BQ==sbOjjA8b|R7JFhh@hH+f zcm3JbbxYHx@W-zVM5z_v>wHij{qsen3IX3dw``rx+%l=I*o!E{Cix0^k@NGf!Ztf# z3*@h7OFZL2j^*-6l#?V+;Uo!J2 z2Q7M!`2z^C2Ax1qBGroZ=5JZ}qR6Ht-t~7ZJ$p3Do2Hx5Jz-*@DE?;t+c2wjBI2Og z`61n(TqJcilpoYzuC|SNuVm}hO1IL;Q|lDNDkzA{w{D8mH;S|RTo0grZ;x9Xxfc3J z-ROWZA2s>jp*cBu8NNJ#i9Qt+U2pEcX>(qxUZi;H6ndIBw{}V1jdBtR?V(X2!R~L)KVb z{Al$`VywzU*VQWSEz)dXMiw3Ny01+VVbb{f+Dhl&UnE?|tJ^hbS`am{Y zr4!ECGE7XMqXn*vQP%}6q59$phOgqYe`Dm$#=Exe@Z(~>{;SUvX_rjT7TyRni7OBT zl1_bs>b@#+jngF|%|cI7$lSB77u;p-i005l-9oVtYr;HG(S1Fzt~IOi?G&18Kgh)X zEqLqPq8GTkiLz#zTszZHSyUkI#cM}ODNyK&&8 z>!>x6I^JK7Kyl8FAZb@G{rbU64?ROxUUrHkG&m|*VXRsgKWupPqE$2hA2 zq@C_um1k!gd&eBLX}#%ix%=CHO}GSvs$(5WY)=Ap=nJh5z=!*AX-6l zXAkMsHPX3E9Ph`YZlEBao~XpWq=0#fxVG)x7KQGj7GMw}uD5Ka) zdu9-s0z9Sqde0>fZU2KC)Gzy+LlB1N)6#8-wv6Y*95_s}MoXuXw_D?D$4Zw{0sugD z(>8^k2k0xGTi2ePVjX1yxcOAQUl{o|lw&#Z!M)mO#1kvPs<_4?Z&~j4$~)5*L%0kT z1C|BNIJGjX%qm{g#=$KWa>}#qY=MW9dZa4;+^~0L5Gk~Jv_;jhzGpJs$Z}2m5HG68 zndup58|?$id$D`b`Rj7eK$cVaxzLB)ob@Z{#7K?}Hy%V%Cf1`6Q@p!-R-gOYg)ny9 zx8cEygMK5=KRw7*xAh(Or?8a3thvL`Z0qs`SLoQnGC@c)9NCfe#jJ z5D7{!jzK7g-TTg}z8+Gnt8iAdj3Y#C$qu$cNKVA8c%*!EHzH(esvU8UI+KfxiyIBx zSvK3g#pal~`3g5EATl`YEkeiGzRV{LZ7al%2LI3a2+#do$a7itXy7cp0D!;d&*3^6 z-#c0R9(B97z+cwHsmQ#~KE!3HvgC3iy9Ps-_yo?0UZ8EEOkqkEdl)+Rb}gBqB97o0 zod%9nuJm5+{W=Hnh%>YBY>~Ji!-Zcee4w2&<20Wx%ZfQ$xTb1+=1XTbNFsXbc5wOe zB^zAHlL?473xh8D<{`kt^7J z|MDLA(muH2ornE%u8kLO)36zTQCUVasPp23Rme1A(zupz{Dm1)o$=>p8 zeScDm@9|&EMtr^JJ&pL3kY!Zj7j7+DAP1kiAHs+|t5B;uk9J?*axiK#!MX*OyQ$OB z;OxDc!&bN2{*P1&>1ed(2kg53dmUNx#dSOG($UzZhhgeIU*(w)D{Pl-zV^!A>-q#8 z3o>anX5Cf9SyaksDZ|I^c;Sn8^_RyBbi$oID@vW&q{m8m-D_jb3~KOC*EuJ^l&5Zr_iQUJ7X}&Nde6gE1!me~HCl!e*zuNnRp#;X2Z&Rk z&n?pR8ff3l-pJQ09LOZ&Yk5ln=X-wyOrZN)0vWT{%lYp3rfxDS6LkZ)>9D+patxtH zH>n{ZY9hB`DTG6%+>WX(Ax;hR7bQJn?#4yL{2e|SYs?q_SP03s6ZsaQg0qp2SySR> z8z8=dDKq8A_I}+rHr;x&oGLR8Y5I0?Ld-^+e9XOJ#y3+m&1*R~hXW+L^Y*x0U2Rwo zQDh2y<6cGD1~_E+{!Sk^ix zTU|pw%+29oTVG85HqWag{l4b3Uk&0`HV3d;X})18CpOzx5sM-stL~1Z3nO_UngSy| zC+6$P7af7#JCQI^K!|}Yuji2~EGpY>18wtUBwg5g+1XrSG+>e|xkf73<`cs5yQ$E zUvXxpmi~)1!|J_S?h;w&8;2yDtUVZ~NIkw`z~g83P8>0%@WK0Y!VOsiigjjl*`S`@ ziYe0gIIWC2CfcrAkp-I?V{zJj zp3wPm%KP}7f0G3Bd)CU@s*dDQ8Qyg!t(RL*Wz`ga!;0rs^_c~?=i8>o&pL!{irmpM zg_%n0=253<|7KKw--MN$d3UsEJ*nD^2b8%_I-0QT>aTf+7gBt{>z9%>7OQeHS+_cG zslQDs9=#E_RB15>g1sK46gICHEbJ7>M*HKg6jqba1=fbr?YaMAL8bw^w$W78l)4S~ zI3X!HOKH!y*XL$PYc|GVVBCx{5~s8sStBSQ3>V)(u$KE9BJ?vPPOWPLt4!z0Yo}cM zVrT5Ed{yt3#HWh`m7B>rZ^4E=Qw?B8!9drFSv>ZzSq=8^oMyp-M@Eydv+0eEPmd6Z z7q&>REXR1);ZMfP+B94~a3|WV2a_UTXv>#B`d^x2A1bZ;5sq)DUAp^<6U(lp%f+=K zP=y|SqoU{O{B)4{NqqU7MkRLtzLf2)Jdq8s8y0lH$<8t7W*gW?162BvmincgS;qE} zRvSe4v#2`j;?>7yJq^3d&e(z61C&u(_8^Py)uaCeeFcP@f$2Bqlgq3WU&jkCi-|PK zqjrh!`1L(RB0UThjEd;DpF12{iyD#*y1)?fmLZ!sBb=ZLcWzW~c7xO6=HU$5?R0l5 zQFE60>V8dIg&|?Mvlk>A@9zlid5biF#C5k-`wuo}If@WDa??qYOYqq2?OI;6pyURr zd@*D?v+WzPFM6(b4~1MFYng3Ldz%cFSAVm*uWGg=EL8BsPjNz%;iw23Z}Hn<@`4`V z>a@a}JlzIKg|Jg|&6-vnKbm&fPkjF3+PO*Qr>Y07y#Y(iYg;cq_4S&02|AF)qVd(A z^nGQbJGpEx|2Z2NL~hEPAk~%rhfq`_MOQY?)-9M(xCTT;mhJpUD5ft{6tyMhTwi;&c$Oub$#d>N z?c)DTml?n=keg)uO6wUYri-sr0v|k+ zjzz^)1!{gB#)p(OEI4$3VSwfEdU&#n7*B(93L4D zyDjhs>=b!s$+yj1k;jXK<9JuLhCaW1;Xd^RcL&B7dysy%4HT}L$}-7N%zR8r6cn-* z9t8Wj#DC*~3JiP>9(&#A9o<9xYba$}xXFFyZpGPXk+nfPV%#PfH&3C$NG|=YgF}H! zkps|Ua)`T%@U{^B%UrSf&dY5>qPz1Ay4Xd@tm2{a@ZM%SPXHtozWMlUrY0 zA4##2BzwawAem$gMHMx_57(0jvkycz`562gH(33A)BaJH%i%QM5a( zW-S2lG=-I6@;w}QX?wq&d8^lJ))Gbo_XVe>OFk8=>ta{(5D=QjCLzWK+UtJee{5>W z)gNwlU}|33FP3)eO2xT%qu{-u@OSy-3~o${`Wi-Ez5}k zNqzUfeH)~uS0dkDnh`g_NZ*6XEmt2OUx%-m_m)FnADjkWt|KJBWXA`|)bQwm2488j zTqD;~Yn+x;0`*#a)Y{-FQYIuDnCt|hJi+{uNthHg5UYXUeCB<_Sp}gLfe6Mt0>58iz=A_<_N8)am zRmNCupy;&HjeH(8YsHF_PF%Grcsu0c230-cOcX~3gt3l#T;(l1@V%nG0g20xUaX_5 zjX^L_V(SoSU^nymZF^>q`@KFYkYApi<-o{m+k$E{}PHxxpZ|$eM>yi6`LLj)*2K$9-g*q9i7|3aAE)iyUJ;xmn=>&$G!`YD#BEXR^o`wbMAm#3-JTujUgLfC z%hlK4JJwS|r<7-k-t@5G{2XOUX>{_VPcVetx}>?uPUayIK5!-FgsQWym+nJS`nT+{ zBWzcsVoT1^dPtEbf(Ww|MDhaDmaUaz3JGM|?0KZM;6&`qX4$e~2bp46Y)|9D%P$4! zPo44z<6X z3L*(3XR*DD<~nFs-?b0zEAwWh27tvZ(}8}`XB^ah>?qJQD>83%f;qYIre2G)QBokT zXuJ+^fR(e4jzTwHTPbDG0Z~?#F`9YPy@oci-b`ER1a0!JTssN3@fh{`7)E4MWab>c zN#teLE&SGCAHX&iEtxfW!qdQIvmCj}(IFi}<2MPc$6$^a-9%Gvgh;viz z0{gh>Jh$@!kqJ=jVt#85BS4QF&ls#aa$-G{nX1h?W3}IwH@UFe0wng zav|*-7g)&rE9hKVermLnv?r_E-R*>+S26Yq;2CpXm3l2YMy<|82xmM(+Kp1~KCr3f z&OaeLq(-%B$yaE3d*h6w_haPSkpg`nJ_Oug!sG_;HtMb*k8z-{uyZ zXyU&UrY+~29D=zo^(xRpU6nE#%7Oqpo_#e)!5Y=L#4`tvz@na-J3_{m_oSn3BWHV` z8A4Slr4ri|j4nSYhZ9*B@|{&-|L64gyPeVuhxgH>c=nB#c*+Ak7)`b-oNhEcL%YLE z_q;yv4_)u#si|G?6rcG*_-7z1**%A>%Ve=>NQEhYT=G;X#+H+mO3=RUm9#x z&RZYyv|q52uf^-Ahdks)!#_tFRGN`5gZxR`TF3e8t?UgWylV8CX2qo}V~pB-?4?WX zeZ9JERb%!THRbF%5NtV-?xgobZguNMZvR-or_B|CHE1-*Q`KAey8yZ&AN5z!_n&0N zg7D>Z#SJ@sE&hpPFjPQy*fC*LqZ!l_iaktn9*ZTtGYtc%MW7~vfyt4Y_&%STY??KoOMx` zdIq)k0dZ8tl(oDp7t0d(Y!&0ZVE7M(cQ(b)JByoX#|t_}=Ih)yfXJc4(|ONfo0gsG zzO`a+ln%(tE{l@%YQ5uCZR?k?mV^mOlAGZnkpIdys{-DQSJvSGPd%_O)uTUTsSBy^ zosRWykFpGTvv_!wxg>}aCQaEGvQKZlQU#zEzp$4i#jE7$n3)&b6-BSR8!iWYl7pwO zY-c8OZ6C8yAo>g3YrC8pr|TAuD&?+eG+*`!8xrF&>dzCA0IelCOdH6N!j#p$GhtUp z$XhR{+{llr%@fe~P*zlPezcBkMJHl4VJ;##x*FhX!9RC|hHnzfeUO{uLp?ZPT9`b( z_BDG-WWxM${)__M>q{A}c2d0#_XYC61$5OX!|4+u4%SbhzmTBl%kY(y`a=DN`F$@> zApr~$?_>0te@Dode^Trt-*vqY9wSnz+lV%B^bcN|1HHw6oM4RA z59avW`~E{KL2zOjBnQo1No$j5Lv8D-A(f;w4B**{s}tLoIgSDhD)1dsbNkz|s)EuD zu!?_pdzB3!Z!gYJIk(}6W#OYo4_>9uw579?A_`gpnRw|qVEk52qG>RYXK}c%{i3b+ z&UCs2FyuKifHJY=bswvAvX#>=ecJQnFT?l0lH+O+Jir-4_dR=+fE=|~O_s#xxoX`YxDXlM*hR=x^mi2*2-&Fy0)8 zKZGf=E#eO*zVx9h)?6beoxKcVWvsW7(|rqLHm^~2NNN`!j2NHz1;egdSOkAb)R`1- zeQ&++;RY=Iwk6zPv;vAMBvcl4d;=+0_I7jK6lt;>)HJAFG*Jd;zixK_3fQeg%Fb19 zZI0i|ezwDJJHSa`vbJAqqe)!3cWO;!QQs>&Fm4~NtIf4{@CqhX|6|vQa*c=gLy5*p z4$R%Kx_+a1z>biPCuntwgsE`RssrdI+Ymc`t}7jsql6qYjH42N=9QHwg%VxdiUr#+ zFogQ^QCGu#J3e&xl+O;(@g;+NJ%|^G+X(H`Icpdju+&RQ`sX#WpI!wX_2ldQ_@Aczr+?tzxIhdT z_<^jn9-RO@Zhs?HQ*Bum0O)tGD1RuiTJ+jol8BAe&(yAp71y|tfgaC6&0>INyfQ*@ zp)reMcMf8{cS%-PcI>KZhTW+rRo*xJ*!%-eCOC^b5ZQPd)MBmY8loWe{$!VqK*B$u zhV#y(mkFx|sJ#|st`_DR+GOh9zk^bv-Cjh%*U8W8hu|P{rfjD}G}C$9#!JO3>sTFX zR-<)6npfKQ`y*Cc&34B1Ycr)+R>#*Xo>;&g?9F}<9@efkoBkGNjW#q3NO9WlK!Cc_ zy~z@*W9Qt}t~wxGz$e=z_ueUHL8XAss?yLU8G9dTd~G-TX|UBBUci#DT`Jr~V4>o0u6iAR*1JA!VwhvWFWz;uO@L>`mP(v0JuC!__ z)e+vJ6*rs3bO52SZtro(tB_ZF!mOAq;Ii;>H}j?YE2|L5A(K~5febSbB2xIc|0%aR z63}NOxQ^uZO!lMpyii?XX!>7K-@vFYlQsaP?>=>8pJNUhP~Z({zUVwVqeX~Ym|YW! z0xaaaJzpTn^I9bpkOGoqHyg~hVDA@DRQ|UlnB$|U)DP7qIx!atp#t%woRmWCJ72JX z@^l^bCuC#Ag@^NqXULubeQyQln4V+|L3gQZWGnL&eFEu*x(3Ze1mShgTk4(N2m#ey z-^tb-P6;Ce625KEa;&2`7o3>gn!fBAf)FFu2eT68rqus`$k#qu_JaMP86|QjY3W^-a(Nc zThX<_3~}Q`5x!!8cG8it@fE>7N?J7l56g!wgF)3f_0?X*Z1@|-4!<KMsL_3KFCa)K30HpY@+V*w|M+0WDTi}UZWle(?aS8KR_4lRo zH#--cnp1a}ts9knMf{6O;1JRFKifF)**P-*A7royUDC*RS7H|3%uTQZ&!@xm=Vxb5 zxP@dx*;GdGYu_G({!d&JZ+|Q+zvHHG;L<1ASDKpVO;25>*0KR*VtqpX? z-9hFVcD0vVAsRxw``exZ+UO8-Osscqc@FIen84QzxUVyHCh|4)LBR8eYZN|Q?{r;c zQpe;`_wvyeDb5BzS-gJ${f{*|6-`CFa#ugps}l7e+{(aO_v>(q(%7)UJKJQyv+zf$ z`rIdNps?2~+zS-nLU2NdX>I)Wvswf2`pW4!Fh&PoOVqczsuos&9~oB}we7Nuu$p|n zD5}NzDtm$7{i&x1=;CMan%?@VjFhDAcLpI?iDJDCzQj_>YuMkX;|EFzsD9w}-mu4S zSPHX_KG>6b#L-eOt<3&z5o5c!@$H4t=5~G1@qnJDXsvD&>WlbShr|I#3c1>V73h)nuW-2Jqf^fw zdc6JF26DX6CwI{ejmnJndrQP>|A#-Ogsb{a=TD_WkTNq#~D|CYuq z$2Ov|%D`Fef0;1+>yuM_DM2?m8^BCD410p&mPd4XcajtX*!&ZZ$1}pKZ!x#%IhE^9 z+ti^RUx!{I$c66wqqwuZk}tOnncv2)I|T4Zr%Jsj&7aM6oS_8O#M6x_IEn5M7f7q7 zWp9)uO+yOGXdI7MU;(xG*m*GjPT1PHS&Xi={N1g{1VK^x^?77W-;1iXQ|5@_eZ__s zM{-$a-n4f34QwH^f(SX6`Y&TX`Ss9VduyimAS5^H;wFIMKnr0$A?xM1dbv(od(hHfFS0`W)%IYGg#RMR9p zth1nPl-Y({?4hjLURReykN?l;U1#v*C$em~D4-7-Y$CW4=-#e+<1!m(U9Z#qd}o%X?MY`}tiw|HmklQ!!gft23PwN*Mr z@#UwSD5O_28;nzHNW1Cc*^ahucfGta;6nGk$(8%Y7v;b(fvP4;d7Ydu!xk-T%K;y1 z{_wB8*DbT1-&*})MU~b~^GolsPYrx`xzC9Ju?##R4g?}=KgOIY{F49!Ea2D1@_+t) zNadvHx9%}v+oFg8lF=P7O~3PiBErqL9lr8$6+mQ5A*qk{{8cvk>!`!#Ok$Jo;(RVeL_A6RQ{%49Qb-QS+pr{ec(EM>1jJqLP)`r@u?@^&u1Db=+>&bxf>L)#a$8GegXh`2F?e|9&Ex_t%GU4 z;_kNm#6S~dh~uDql^34$9Q7KTxNP-27%a0C0-krY{0y7pCvJO+8aLE8lE61Of=}wT z?K`Ho1Za;?y$v1)r`hMOh<85M$iRaRJMe z+#pTG1;s=~K_x{*K;ZYbnfsoZd-;7oJs#Cx<@G-2T-W=&&vnl0sUG>@ze-oV-xj6! ztAF0KcH;-r3lqOQ&Fh6Srvrm0{5Dz^jA5O@K7!5k%X0lppOMCNpJbTT)v7AA81o^-ku_Hl z()n4biK%&_xWW-%Xj!!QrVvyUx_tYJByMxC#2+2)gKwi+K27=a4zV1)@Nd_$wv_;x|AJ312|vVxYa%%AB(f&1cqPiW}Wt;L(2o0mR| zT7{KM-#)~SJCP@z9o6a;AQWh<(g4AmjImH&0|QbvL7}U+1w@Pl=%P4*aOrcwv$2L7 zMoH?MBE5Po>d&Il-6_RwuRz-QOIJ+@Mplf^@mv-AB<~m}5tKCRb<^xrcWcH4#F!Yg zd?O3iYt*RM6MU(okXXZFXLB#9BZz~|v09^J6;#*_nDV^YvQe+915!SGv?_YMif=se z%0bZbtW-z4xo?fsj9@oi=I|o0iK+MOb52`avmwG9QhH6x<3RP0Ja1rF5PvuT9LUym zdszHz-*6PuJelu!uBT7`Ovf{vuh++WX|SjiL|wTuRfn0%$I}ljmV`<2ou4j+4k^o-%Bp& z#Rr4Wsu58Bt_HN_zREpff3B#GXNJC+==XY3#LjCe&&gxgWpW%YAlmt15p6=vC59UH z1YBy^Q1oP>6o?%&^7TCarJl^|ibAdE{=_1OW_S4Jjpgi!VDi4r5)&~>%oQ&=5+EPCE2u~Tq$B*F>kfBQVl=`s(_6&;_x3bL^vq4CIpPvRn z)K!d-b&-+sVdY2KKRt8T8G4zsv{g$WHegNEE{#RDopPNCqH z10E0gymnPc*eNr=Q9L~ks$oL>f%PDlvO_QRXChP*^N^;CtFb*BhliVL$s8+a?_@LMYHiQYoitPjh~pdo*n8sQ}>gF?u~UHzM$wPJF*qm#K(2a=aye( zWih12n@}y_J1O-WbQ3`aU|pB^N4(RcfD4JDSewI$dE@m#^*N5oul2wE;;z z%6?wHHqA@bx``p=d=qK5fW6Z6uDH?IBBV1DQp$+3tdf{7PH@u>xrx@y^#3w_*nAk6 zDW!FHkDBq1{Z2!C1lEilWPBR?9!Qc?{Xff$v#i$L+w$TmZCY@g=hsli{Q!(eaF}aE z``2|pug=j}?CbpqNED}3G>43&9wQ#I#xT#|BZ;I&&U1%Uym*_!T;00~IrQUvGYMwH z`OwjmcA-ZLn%yw>b@kyqj9V4ou#vtPTlNEI(a2%FOCGIz3=QyD5oWQjHb2RZ&&FvD z-xM7Umk&b^G*8s`U}Mrj2v!=LpO>c%dGiPN@F!=y4o-d{pLR&P4=)Da|4&q7P~tWa z&$6p3@^NS)7RIGiy4rMv0kRWU>=dZZpv#N8-bj^1yva zW2oTixcmm@ZI#}Ky8Ft{bJcQ442aENZ+ljT=VRFX0;XNBQ7}=@K`l20!&zU?OVIQ7 zui27&$c@^;rX%g4?}&oY;&mUfmz0IpsMoh?+DoBI!wjIh7OLV z_(uI|`9epKL)73Z2mz6HZ~7OJJiyPlq~rL1yMlG(z<_aum>`kIC050+=Ph53Y^z0s_e;D$rE zX3TDaE5KT^{ANv%QM18^S6neND^1FYn{Z2)SXFv9NB2J0B&!tC`|SHZM2{=%0!Y#m zR&aZ_cNT5zh0%h*Kk%@b!z@I@4k%th@BRhC`kvb%_^96e$N!s*c?{4Lrq4wlhG3B1 zI$Y~ymw?ZLiQO~t%xC0!Lz7Nwy(9bOmSA%$0J)nOWEyOy)afI`{)u4KHGXR*0()q0 zbr!rjHgS)r&gQ)tSDC^aFt-!?*E1!I1hF?Z;CvdL@+UI(?~LF%qnZDcgH|bj0AjJf zaX1;Rn0Rhf9lnZK_Z16LJUE9t2TMG37Kms(;i@sqFC?1Yyx8i+@>v8ugE0udT4ox} zgOC5apO{3Ph=_7MP?=A2)qhhbd+YpxKBMwvWvhEaqgIfrKVXfv1)BqmV))6Jv6+Hn zT68-gC6zKpaikfCy;Zo-x$dnl?GyrCa7z%;yy{ewC=v9=2u&;#-!J7M9LnqVv5>mm z+pZ#~?W-g^JONJaSm<1q9+Lh>iy8&6CSlX3hPXeDKFHNW&RyjLiKK3+4i)}W*wlkh ztqNg`34c4xxl`T~yKWPEp|WW}Fr>l!lNW$2Wqn~1MHd4~$b_wCT$a|06L^$;!ayPA zr`BI)M&~HzWsBE*mwlf3=UGb_DwO)5c)IYoziJ@P>>na+Jq(_rmr5}e&gx$2x$`d0 zRo_s%!hHDor^@ZR=Wc8rdp71jQol$1i}_ClM1!A?RO4^#)=QQuEv~H9;G@h!HiLXq zo;SvQ-o4gE5A5G}`N)^h|E)h;n_RYeSe>u6cw*BVOQ4JNLbgpfzwXhKb%1okNuc)x z0@^LPj-LN0F8)sA^#{oRR8-O5K6my-eY+rz^*j{y|Pmp=f? zw|$C+?Q}(%C%$9GNd&pSGq!eo?AA~mO?>6w<(PROr@yO(h!G?9Z{V4bUVd^1{MfXm z2M-?|5_x_6~iH_9Gv{8e(-e)rTZ{$LqsA zGy>6!q2To+fx8wfzB(b^{^D)Ri`BNevFo$6Uz+|Rc7H}79#?&@}1pl<}N z*4+kcJJ6i0U2}LvS!3;c$gtm}Lz<0>lGLZSV2FLJTdIc->fAv@Jxim`m=FeS6L0|s zY(iS0{WKkc`r1xblR`etl<&juK?B0arRJ9jhX{^@V8w*P`j>KWoE@7o@hnP}kX)4{ zNXEEnMYj(bB(Ur)7hQncZ8$Qdr`l{nRko7_SqfV(ozk`~x9Yt#^+1xmB?^2&6Zpx8 z1IA@vC%rRh7jSzfje+?dPoadtxfEHFo^D)8q@XaO?)UnoEk2T^@5{51IZS1pMtbZ- zypo7O6UPn&bE|L`qg8^^I(SCMsjxfC!pgsUq_a-(Z__t~`HWj!DPA;2xEGY~d2QiiTY zG-dRuZ;I}~3-*D)=IxovGeDAcOIhFjA5z|8On_mX>d=a&#vS3moe8$5FfSqi#1ERbOP&&^g7 zyMp^_iJGEtOU<}y8IVSbLbgvO-I1L?^-)}%*$?kfnp#ShF4`I)R64_cJ}<$ZoTRAY zQ#^JM%9YQ_yB^yIZI>psrO7|D_*{OkW@J>1M%Wl{WTyCG$}IkYLik#I<_MZbqim7J zMhl@NtP6ucb zhvoElX&3#fQ0Xr(Y!;o`jr_aFU|XJ|`n6D~wn`Q^`U(~C3fj!~W_{!Cd;`VuJw2eu zmiflWD69K{F)I%}F_SU_AIaUhPIljr`}{E^Opkd33;c9Q)D@uR-+R5V(eB{mPzuo1 z@X6vH5O!?n_-Zl{EW08nyb~+US7#~rDW{Cxg2Oex+>Z)-8;aaG+MQf>D$R~25fOca z_V~%8MyeHs!OUw%TzBXOn9E&HMlUn7w-Whit7Uso-^pki)%Cj_2nIycge8vyZ?6Hs}6$>Xkih zy7R6*#Al+Lx$CT>(MT=Kox=pqB)xxI!s60Sm}a?nfb$}T2l{hi_klEP=L3RUV6#*SRukg2EMN>eBd2t)6xi=gc9{|h8%KW}I z&>ySIF9nZwuabFio~A1sX678M<{va(0R7hpf1`zly8MrYeW?D8Wsd+%5(x_fY4Hpw z$!+#aCH3mgP4P)(i91uUFH>5}l|^6`HtBSOR7s;MZgqPn$|RZuvut~1Y)G}<{vwo1 z9(YCiRV`&}5NZR!TFkq&mmQFwLprA=#fZ(r?|OE#Q5%HI0aA}z)|6djr+EiLb>rjD zjhu@n>Bh^iy?OpPfV-8MmA1jg6t=rp1GO>Lrb)l2B%C5G6`}StWNi;IE}E!VbyDLE zpS|MB*HCY4HC6PI(Q|rU3#S;mm`(@D{HoaZI~UMu;iGd5&5#(1-2hz5G7{+{zS`ta zSKT{pYhew6Gmo|}YVXvMp%zlo*GCZxuOA!EFd6!O@srfJDAUX4`#8&zchN)Sa78^W z{Fgorw9l{SE{KwO%zHJ{BGLc#R&@fW$v13$ohr4q$B}O^wo04+s)-A?%wF5xWT^e9 z+l*9^(pWR;t6gvxx)ADmX6%hYp?p*)?pH7~n2p#XvkxX?Vb#Wy%yc);!V-;?BPp?x-SqQkmTF~@|y%JKxRT5h|l`?^Ucnsf#JYT16sF5hbCVxmtAod*%o_- z4jW)`88M4rXDP2%%f2lFHaVapN7jvF2G1H~)wHxI?ca0TivjL3bkFk3xzDbywb#D9 z`9tbUWJ9VTa2J;nb%GZp_+@g#YY=)G9@Ihm$&PU2h@zAB z^P%~H&GFa=zL;#|nhVnHV)SWXAVnVk2!O%x!fiCL=apD#J62zLP@=ZmRt>tsJ`c&d z)Xz%>VrkaE9WS1;Z6xla3Ix+bB2B4O0qsbypc7YK2$nOmY=*?i?I8Dxlm=|0l19^1-X(flEC+DDq*X zP6POdFlb`Y%y%<=>rsCFS<*n{j7{{yR$&OkY!mRcUfahHVt1dr!rXK2l+jUU3}Jp? zx?n}4AJtmKKRYz?diY33jvcFIa+zm6V?~E`OKpNo_hQN>;WVse+TxM+E-RY zX-VBSVVm;wzCi&maK7+B=xd2zPW^{>u}?de?RRtGF35-f@@aF!z=4>)t}@!LGRxpH zEXPDS8H{n13eY}QQI`yjr6C=;jcm$u7Q|!ApKf)7gP5oMd+lt1%rY34!&+S-X_^JE zP^50>@a=*-V#0xf|7t&wPPOK_;~$&go#5MlGH(EBl#2(FCIN`<7t-zDV=g@r3pOn^ z09WN3iMx*a%C_1rYD@epkA_c7@#|aiWEOX%A%|DQC{nLbgN4ruy^+pda2ES)RgdcX zvJQyCo9C*GYG?1LuE3=yP$xRx3%qFf6869%7xdca$Z2Ape7dk1g3GNbi-`a_%s+y- zE`mMneqZlSL0EfnsPl`7|INM9)y5yom3JRHySPrV_!JWQ=k|cz5+%`z+tmCaZm9xcNCVkU}EVGABSmT$U0hli0W#gGVKG)@9B;{@MH@VsoYjD?W^+uk3qxZ=; z@S^sAou1ASCs5j^4(-;?G>`sA_42V&?R+5XV6HKts$9&C=k;jRzP4A>AH3i8*u-A( z+`PP*p&MZrI4uSydftbWokODa@>|CJ8u}|!RS!GDJ=3F-ihJg@N4UIM%?}d*4O#F7 z1gX9U25WeMfdZuIBo5U*I#;qfBE?5(Fj%9D^Z!(L(L!~5En2Egw>Z3# zzcEBj=0)P{dW&Qv{j1-zC-XYJX7%S*i}QGZoju(lRhiizZ|*%O$$m*Q1SJ2*5+W;v zJs+7Ce0BGJkc3A5;sNq>Kl=}S#mb`pLrDL3k^;7gqLFTyKQsdxlrkprkT$xDp7^aF zdMuXcI&c0+fg~?>X&&9p8##chv$TUAUCD!b*$l&F$G~LvDd?f%8Ma|x_fkykNZDOozd;6oVUt2po8!0mYv4Qs42L$2!YsH9f{vJwAc1s(!IEu*iNL zAmgpojQ_VJsTXsNs58rWx| zdk#fk>?v(ycXfYj;8@nu}(63I9UEkj7ya-nCveXsni5 z_1a{KEp;wQ>b07vO8%d@B_E-4T zfL!=zaCaS`HC$r`yIwPLeQn*R=dN@#*+`a(odcld+OfZ^%z7;SVslsZ40CSFhxr5Y z3WfZaGubk|N@})US=6JRYu915oAgZK(J}k zu^R_rM&d>Mj<5-bbw-JJExLvrsd$C_3P3(}z2lS4HjHPpcE&74F?v|(36@t~unk!U z9-BXXBhbTGDT4UlyicjoBmab4@WLi-{|cv_u+&#W(SiN#>)4Vm-R?P5?fopN`bu(% zzs;QjO-=E)WMXgb-49Pb>C(eMul_lIX3=5jH(){apH3f{>eUV$@3WbI&n!U`7z zgH)+gJ0scC=eSj_n=0o+HDCbGbXA;E@;mwns7vubF&>FNDY$F5+`b|74e#K3iRxM| zt>TvzfmD%t!E4eOH+KVH2*MJy{#wRJjl?w39JC?{A|AbOJBVntQx^^BL8CQc?gbXW zI2;0y00u~9&--%0dP!-(2oi7|4CGY&W&5h&#eK5?hUt)m?^O;@-bLcup_AFKJ_Ix8 z-m>8$Fi^X?m@3Wt=B&wxEmZ2DXHPzoUjrXb5L*1bekjq znBPObJPmN89urJ*bs39otu2L>1ecuvQL-7nnoB+e1yY7-$n_V%qOFV00(3Qk2mpOC zAU2K|#hTNhX)!(t09>sv(kOQaQa<~l%WTufA_yS8s=4Z?$)39ctBF1%Zpy)ubfm`l%Ewac#d&sQ;prJ1`{$oVxJ)NZ~MMZ}7%CMsDfM z4q_0NaAgM)VO6D#m2SuOq_IyTv9pTQwSwT##eFRHQ1{OV#C|Kq8HEXO!Va}zWr1|!5un8=3$q;xY@Do#%?agEwE(Ap zR|TdT!H_inkZ5K8AIvewVPFuiI5)5yxWT0E$0bwF!RkEWueiNDE&)842Y!W z-W9DGE(!Q*mW7}GJ%Dq#*uS&w{zdNkAP&%Q0FZ6vu4uHW>fhvK`MyL-3~<_Ps4_vJ z7cjZ*qB$$TnY*iaw3%ff2erhE%{*{ORay^6ug2?@F3F>Nu36pDj*>Q^fZs7wGj|7u z*JJ)UM4PNvMW0?64^n}sCKF9hENrBh_brc~0Czi?MvK}2(MJP?>3R7#%%o6Exz8Vl zh8YpO-pq-HyD$2GnW@z~a7by(?t;tTvAZ8_x2=o}FCD~-v6IT9M7z=H_i8pglX=`6 zUqxYh^7ws{#Wlqq!MJQo#nM9-{#<#v#i$7k^VZ!anP_ohcA<%3{@d0fR^1MHg5|Rc z;gvedPXg_=7^FWSE-|gu$>??}y%9MT<}D&py23o@@2Mb0^^W(TaSnd;C z)3Kl1gBv0-i`qeJWr+~xQeG?D3?h;GCrgo=A9|#ph3bXRloCI73_zIoZnV*Q1;Xd% z|7cqsI+KryMwemSvyg6~^$1}RG_m%ra*!Y2AkF4y)EO{!K%vufJp!-j{CSig_nEZ+ zq-HIO~Mu?f%sPZ2Z(k}L2l+A$6!&F8>9$wXD@ z6|ESR4hhHZ8r(_kHzx8%(B?>B%m$*oG89OZtm?Hje}nv<<+EI&=>3=IfsxJEadVQS z@GOI8nMj80ZX>fs$F1l%Ya+a*(Z5zLpZ0TDP;IQ}9R^xLqS0Z}!t3m@)yrL`Adxc& z_Qj>Y%HH&D%Y`IVRtaX-x|OmFEa3}tM+~d}rE;@oQ{F&X3lOr9NUQng@BIOQy{IM^ zeV1QEJ}q*N3PcN5Y&bchSiHQ_1@Yjo!Uaf>7d-Ng;Mac%7kE3nR5VW@O;NV82bA8K zdmpzKKnheoF&F&So51fDxjS+b&;Q>elqV=ZKJ4|h%?|x>6Ma-@VU& z8SH6T&8E>E{0EiQr~Y{eHHdzA$PR7Yk$BbKcF-03;k(X9m3I^6=YFH^RKTlVCEStzTG6!c1FMd{)xRMRy8$hN#{=O zGR8bGh9lNkx@@*Z<|F#Oe(kvCrR%>ohkjV}joF)P=g^_4l=`!qQ;c|!`s?<{@?#;* z`n}gixGuqi^u?_|g9>-UW$-IG*X)nybJ)l=pT&g>(=76}4;ew_-IuN)i?hrhNmJr4 zt#?#UT8{Fa70+U>m^*x@s%{W|qYrtL^|Y_dH9ff~z(lNv7F9%H-*aAFF=)%H3AHfH zbO|UWerINbpFGBOMf$5dL*)~(Qem_KGP-X%*a&txjT&adZ|m{vt<1oBNrqpi^^9sG z7ryA%>f_acV}R+s#Bu{&2RbGp4gPdSD(pVL`5E3V9U&c@jsy!b>#%86my@eQ-6N;7 z^9SdaT8d6<=cQPSRzVCc}{W$ZzcYQMDanN zW3e5Xch@i4M4ryKYVHd#xp53=rU>9~3rVcEvwEOa#9r!W!lb|02Sk5`cNIvzzdO4= z-2=pAV1|Y zeuveDcp-H@bq{&7w&UqEgEy4+;!;#+BX_?4cscg_a(UUQZf+K_{@H)CsT391@j?So zU_TmE)i-Ww+w5mg|J#bAq~1Nkp5hh*Tjeq+CzJ@Bmbd|{sxc|j{xFwXY!j=wOlsZ% zQ9|+O=8NC`vg1%#?`m}QfV!s<(cSZEzDrBG3KT{6zR>}!bSW>_9^P8o_zGN=!x?SJ zCu!QJYVkd-+SLBi&{cdOt52WVc0%v}Q~ z+?rlJ9XZU^u!nhT`@M&Pho7;d4_ZkGb-~3pCE&NKNpW9X9$}7;ntgHI$w}wI*Dkle zZ9Ts&ioo1F{_5-B{1ETA!QDuoZ2`v`99UOypRwwI<%Q$l{=?%m)C=vPhE zB80<<8GDNfn_{WJ^}@G--JtymQj8659+!D)RA{ z_(Y^%sNJl6#%)xj`PTGNpIKzU6drd^;a_7k&b9R<>_m~>@|=V0ap*e9sNF2`WKbSk zRpN`nF?)%c5Dar3Q*xQXA_^l8dB(J1a@uYqea1(wa1PtA+?v1i&-I6uvG8Prcin`Y7i>Ec~g@TAmQc2Zuk=G@Th zGoB>PYEo=|5pD0d#?~{*T)dNLtZrl+^c)6lRpyBh5v7;u93){J-J*;kVplbz*+n1& zsSdGZHs*|-t}?Mjl29ikFfk#%2zoYA5D&`av*r?Lfuso%^9J&BPKRhXvOdK64ZmLmYIqv>>?> z`LF)Dcr3S80w;=QOEp)EOA=jf7ti`tWfUdkv16oFJ$_o^f>6S40v;cusf#k*y9nm+ zxo4-)<8Tij zBQZo!vml=A0|`TxeqWD}Yvj$o>{#Sztso-rDmTY)8qs#wJXQnt9nNPrw7KKgFODYK9M>Ju#Y2HX-h zj~y!Fr^*Qy6DY$B+_>ca7|J0ahRugi%``TT_$UVQ;Mv0QYGhpiDZ7;BFdW((BdL*< zx-n-U83Am}J$7ij`vbhkB~%^Y>aODjzY&$Uo#*0`lc3$9o-w(}xUA?iPPcnPuVoAH zmAh$R$I0$_i8kU2pN zaVJqrR@~0Uk4bh&&P@C>U{ZId@e%aCBH9_wHW{-nyPzvks=%SteS(#J8~R;9P65Xc z*RDdCv!e612b5CThTHo>A1EQkw;^1fD8{M+@p9*I=l?-}igjGA0 zIJ#To+_`X%)`uS3B?WEw zm*>_fmy@oSFwcZ4mddJ$eR}-D%3il(OGtpA_`Z<8fzK^M%YZNVEB!Hu)Ed{{^#^S+ZaZ9ken2zwm%58(CPGFL~o#+SxUr+|f?+Xo3Im4*_p8M1X#u6$JP zc8ON*hO{-}+~gc7oQUCahB&(yo8k>DP<~-64;i+<)TL0Vo71Q&Q9{Dlxek=l?7_42 zxD3jyRX(|QpJ-o#NNT{;k%k1AJLO|lvogbX)OG@-_lOB91ps` z=_GJIo8UqlpIaU-2zy+a)>RTwY`CfaBFTq#MSqho-nAHEjTnOEG=?VTIpNcgH32zH zsaNGDo)gyUa_vxFZ9Hixb|{?b7s=c!uW1s^B&a_jwO(9MKt9xG@SNSS&;%o9Pi#BN zQdcBwBYx4my!J0<+!UrB*!bdW>(5iIbHgkxntdS0jXBK)r``VEyO%)z}5yDR+%p1#N{#mZ<4wmm`LJ9UPo z?k?Qa!kvyG5Teph)^_2Ffqm4@9jDGPcjXq}>p1Jslgk`h+@?>VuvLhY(|FXbVn+Cc zwPY-&1$ZA+vzf$PhMnh}$J-f+F6$9-ISrifO`oa;H#ea4QK;vrcv-U2quJ{Ofsu8; zzzzAMb({l3_TI{#g=mNUY0Biz!%31X`K|*qQTv*|r5d_3S~K7G&hO+_1~Qg^9f%5# zo&m?_4eSr_C^3}eiQG`;{JhNi8e4PNAf~mvWAMW1CMsPvQY|<$sPq_&_AO+-u561B zyNB!%)2n0iI5Buvf@p6($XP&TT62y|-3CJsL7PR==akkLazlPZ;>mjA?pcV8X-Q$2 z=O&WAm5Lx0=kz;#IlIP-E4EKpDt|+xRr!qJ^AXui5KcJ3`!;oRja9E@@%YWS+^ZB= z%=X(cC&3=3JMh-nAwj}@zNFcx6MOk>xmek8$~9yEPll2Dh5LWZtt3o(Fj9HhMP1Q@ zd=HE5O#}`iE60X4+jss}~~* zj&3naI=q|Mz4-b0r!D)^AM}p>U~vR2UD|y?>#U{nGm;4tNQGu!7$g?WLB4b!Ld_o9 zHXJB~H0|n%NyUNLlBOD`6DV^BqH>;+87L2McmiQ|3=k|9Whu@O@+{J!buIvoahQ+E zO9vG(i%F_dp6sYWC~ao0!~}}(IFvaN&{ZepzE`_@3vMKymX*xg9}iL*k)r+f&H_)2 z#7Tt4NkPA$wnQ+~oFbeddt7nFFn-W7Z3Z0Z3zpX0E@j-VHE#(^<$?8;;Xn31f$z$_ zR}zO|gu@eBKTVr>+UjThV|b1etv^SQaGH5Pi@bF!67I00Vzv#AV^&6+R`KiZ;T>Z# zunNz@G2^6|%@X6H!MO>vz-4tQkhJvhG4MSTqI{lKjiW(aJDBBOoIO8^@$_+S6||1a zP5&ce@kWPdtWFw4ZVylE_hsTLme+3w1`GnOD)RJ{z}w#hSFZd;@Tg`C6*x${C%ChI zvxLVTRYD@7h5SncGpJmy;!sl0O=G)& zFFB$UIh*3b?Q4_k#|*aL+)6m_M=WCDRO3_|qfAWHRnKgFT0|J%SpG~kn5_Cs# zC?Wi|4=bI^Qu;U7IN=dxSRb!&sZDr!d3IrZ1h=HZo~X2sE3UX-TEDanPW&w!C?b@r zv15BDkdvNvj>swqGp$=tqu`R`9q6eogv=P0vy~Jx(@uL8)=qj zpULq^@ZTWO`!i5~KKR`OhWMaM+<^X@`ZXDgd%kUoW*oVPpP-l{_sq(U~yIATnwET0~SmlJwZ#D%*Fy0F#R5Q^K*&bbTE|Y1`_7%o$7wvUuw#;W| zmsZNQNNQ3CpM-tCV-1-oH~4) z9-}V0Q_g>K$a7s#t=OwH{GI2_K=*xGaph@7gAzBelc$} zr*_XS8K^fjztk;U&^=dzoqk=MQ0`S#$LSg{AAAzg6H6-0R`_v5&oK1mFQXz>`F8#) zqfT>3e z3lgSY+~1>+ufu^!m8wswhQu{YuuDu;KA)oDN7@u>sN=>n)#H9`iEavqcVc@I*QINDuhyJKh@RoBIid~W}4BJu*(PiVR=4#S{#d_ZbNH+wxTggBsR*JC_*Xg*UkGzU4NedD_Gy&eD()(Wk=$zlc(Elj;ZM4m8W@L<*FVOo8hZ(8U2 z#5J4b+tN2IGt^VYm(a4|Ma*ZB>g9EKS(+2i6IW^|w&Eq?nrakI&@b}@pgY-&KO=VE z?e_Ne-x_b|#7!;D@ng78NnQj!B1LsbuM2y|y3SF4gPc6d9YB_=1 z`Dfd+(2;g*OVx+lDvC=`UNEhlcXhqa6JtXBH<+=VpyI-sz(4)8$}@dxYU;9LVe0bO zo4bn05k8-PiA`{zs^vrt4OcIp$fcg~Y**b21hUhEoUQMBU>5-g4zKu6%WYw|-|?or z?_{MGth*-79-buoTeiosEr4t|F;Y+ra~o<7H6W4&2@4QYffM0Cv&4YvfS14$F`){b zDvgg~NnDl6(?oM_h}^o=qf2P>ECj1BxHvqW`ehcQfYwtvZ!ZnS5)ZU7A1Of4rJw2} z^&5mKiROD|!KC+yVSuF)=SwpJA)VoM;%(v{oaDO+{u^g}Ouw21%Q&0&-R9d`4lEQ| z{Z2Gx0RX|LV6o!x+(`4F&w5cid|Qr3lnw5y`0@qqDZR#ixYe~@4S_w#O7p(t?tc48 zQ5vg`hv_0YD7#?l9?vdK3GO9L8n<{BTrzlvdM>np<034%Y`Q4Bx9R7PpQVx0pn&2u z9*-f`3F&cBTchT@V$TYERW(SaNgdqe^$iZ>ms|}*41%oDnNpH0u)+OK~YRTn!=WqH$N?heUg=Oa#%TA zYf(SnYBJUS;6TjDn5KQne6uqjH1&XTyI}^sqCT|N0Df-;;DYMhfO(AiKq# zp>L*p8n4gis@sM@B&9~Q#ie&<=1^Rfz=Pz>F6u&#$A}x<+Bt6$qjAC<_MB}qN?WSI zGgL~2*O+rl6h{r)kyx0o&rV~Obl2Sz5_qCy+(_oIWBD;ZUlcTc(MSCa(0 zp9Q^hk9qJEw%le>MO;PVXFT@S-!y!2pr+!1?+!sWKO_-SH5AF0mEx1iaY>4o>@w)L|RXclbx9tsheg>QrA%e6P$bm?*vuh&uj$sI1kRriSUD%!bNKF zx9L^VM+&)Oir1I9XWBkZ<}jA%R0vs^!=_3XF+Hgt7a^#EfTi0x^6Fo)LY2}*a(kujZY7Mhmq$F5tS>BH78r3jGFF)1RnzO z$&j9LNlUg`Y_aU`Pgl4=i~0MnO8*g*cr}xm2#b&jInt;hFo~J{o5Q%MiR&e!Oi{Zv zbBnN0{pov)kO0P`MZr6UngcYg^7BGUyRrT?7MZGM@I>_hfgLWZokg(Rhr$J~DYKqK z(WG&Q;xgj0bXC^r505P~ORce*d9u(L%m1cxV+A6#;3t=)60@DI7}}#rM9gx$$&&=L z?U~F9(2UG0>sEi;hg4N7$Gx6K-M%+XJe*En&R}-otLg&upIZlqza40gxzu=e{G7uc z?wC)4VMVL0`9u>qqZHDyt3XDFRx`rqBbEml&Uok?HI_6+-38)fWSVnUiK3>~W6PAw3O}WtLhE}?@N;A1ViWaT~A`N+W2@VVHhJDda`zxdWNB@nsS6H zT;KWF? z#ljcdO8mLVqX_a=PLu=AqgeHtLV>c%yDS~1^b4yudN^FpRwlW&x)+1L&8vP?&l$w>n(%{MKN1`zaTx;2uq3 zQ5#!ip#jcpXuUe!99d=UT}o+n^}T(eOgU6k(*YMWL+~DZ_@0HM7H4e81jUdCCOeQW znDe2OQ|!zg>dRJALk$Vid@)S4)V&Bcksi7r-|(}uU?>Jw8b5UYgSs|}vmYDuVc@f~ zI8re~%L}ys!D}N?mkmR_Gef@q`@%70ugwclO;SE++>72E{eV$l-8B(8rK8y2O1l5( z5e>=d?_ z;#iSoU-@OlaL=m?Gtn4p2j2Ilz32Tl+KGJ*gwQ5*b0W93^RR+5&~!ayq`4r*`yY1f z09epeodrj*@sGpiY_tqWUic1qcJwrr(iL_rVy`N`%317d=0BOdEA_sXftp2eN zI3arR9TD}^;Re&Guu_#(Z2{C0(e|!Jd`J~gx&jWUCf_F!ZOAV7dIZ{Bo~_{}ake#h zkOEmAQ!#mB74Shq6e7xPS(2wNg)CZYHfSqST+2hZjCQReWXk1J&3tG|<>SFgM^Gc}1t+}wBeKBf6 zwYPj}jI0b}m2k_&t4KJ2?4D2`PAa*-L4T7sb13$7s_$*^EF=R5JdO&wWxj5jp{|=uh+Kjl;)L(3X9?nHP2df%YIc9 z$VIWs=0EE;$u7_{gz?eABC1CN;V^Q%0E;bXf|yT*BxUQsqOYU_*5pL% zN+w_H9WHQrm{1%peu+Jj>c}|a=8v+rfpf#_d%ekyncgMO3vLLFF9q2pqzV((^r`Zn z?MgZINQcbb3V2Y9<8aJNoy(V5ajTS?jr$@~Tb){@qQLa}S`Ap{d*&L|y1+;W9=P1V9jJ*ZE1Fm>biAbH;T3G+Oa{eH3BJDLi zMZ~1kFFuNImsn2aHN_vS!<-%}!Zg=2krywgJwBJo)2q=tiH-cB;BE88I_Rj^qvbBI z&y}OtgG8}EugzMwJRVlO5T7QgpW-ePQYB-8?=PB(dnDTpi37r_4deCWF^>}LlMv>Q zs6zq=N3QX>;8pdEDjxq0;RZS!bhR~p$R5Uxvv;(dwf|gJNJV2(6?A~=8<*yRYgVFj zv-u)Dc808APA=VYyD6S5d1xTrGog+*?_NZ09Vn8F5+sPZ?Cv7?2iqRW|Hs~&hc$Jr zZR71}k9Jb)L95KiT0lUdL1cy;Cn#f-S*El^6bJ!B2oOS&o@48PkW`U5Bt;C!7*VDK zNNg1%V`Pj%AeBf`5+Q~VLdd|k>1j`U-uJw}-}m?TeSdLXz_s^YYd`B*&$^%czIWzl z%NCTAZO7=EToa_7HE~p4C*YJBkT~KW{2BnCAtP}^#9jCc&%e9HblFa^Ia8&bA3m08aRF$d*I|Xx_}tyCK;?v z&PyV3S~Wv~xrS3>>h5}pCu_Py!EvT(Nt}_{w(GW!UwAj~*jz(5o_`D-3wg;TIC|H# z$SlO26S_ln%ezR+zJiiwe-;BRv*96BoLx1-yjY^z7MAt#k-fT`eDBL=X0DuA+$9<~ zVrXPp{#Lz@LGL}V{y0?8>sjhT-!YSz?5zmJjqVSl?g%Zyu=9r#zo}ow8-E|yP@-^O2@-or+y7vjGa7r+zqMMFqFysjySA`=G3tdorpZB+w>#Ad!KVt0 zlQnZ=xGFDWM>F^e_LQ1Mzb(a_BKx=^&30?roZCFJx_uCzG3>#tPC^x5s}FbQ%GH;k zLuVI-D|7i0B(4o-GF{Dif7p;C!iF`g>T}3GLUKd5zvxt4;i>+r-BG89>0;3Xc|XM_9bQ?o1+E5|ALJ&KCajzWXe3jjneIf5oZBbE~rXSEuFKxk2%>>t5H8ZMeW=X-Q<> zni6Q+lYRpY?WpineK~Gdao}w47qF7AhoL$h0aR0~Su%Ydea-8{s(I+zQP0iSqe`U! zp}Z3A`IQ7@S1Dum)tQQ)&X`F%VapMV?SB0%LA(~+dp<^52W`{EvK{8&cS7FD}QBE>vuP z%ExBtpm)KWKSJ;N0N4;ZmUP*_p4Z~H37DUw4>!o|KRK9F?q zs8K1g3&3&C#7_9|I@U&~Z%oO4=2o!mwY~eKJxvjD1`&-olQ3*9Zy8h5;9u6s38K_f ze=16@Zl5b5`ePA>jm1KXqmlbUL}{LB7RKYjjnVkn)&xaIsy7On4l#c4=}7e$qs7d+sj6N4xm&T8 ze{Bq8!)27)uGvqF$gbY1x&s$!j;p+1^Ny_@3p1qC-{dmc=?{I^Sp%ak^tznx5`fY4 zi5!0eYqPMSsKPB^2V`e&%0SD*)XGj`AJ$%SL)g=PouOvzHEYPmo5;z1!iYGJ?a7*K z1q`HHBX^wk*nYFLf)o-9s#1D*f!niV=P?C`C{Xv^B=^6FCvuZ3I$3=pA&f;jZqp`CO2q2N{7fpUvf5$Ir`lzt zI>#|Qwq&*P!6uceVN7ejYY~IY#KEXO+@TBBpYT?_;wh3A?n>z)`oRS~wcv}Q0YwN~ z?S?cf%Hw!V_UxnprHyURzPGFihUoEf`^|bMz4n{h9Wnje;^v6*NYa%rds5pj z==@&xCBD9>_pTnJDH>hu`p)0oxPH#K)+q+TT&^dch3Hf3>`tV158Nv{zn09(8R^ra zXZq57M;5=px>Eq~K-$Jd6W3-M#XWAH_?zF5I1te%J5&wb-g1+BX2Y=n-A29KK=Q=} z)=8^XJgIvgLLWsUAWoWUdZA1UU3^%*e$tAPqLMOgYh;J?LI|NIRk|UKyGH+jWO;uB zXYQx}lCip@xm^Yqyk5>4T2RL8MT8U*D%q<|f%#NTKA}d=@vrT13aPG2x>Hrp;+xnR zR!2Pse{50FINEy5sDis_1uu}?01^CA@AnGvjk)&IS!M>bY>$0v*Vuba@Fatv+s)D4 zgca;br1D1T#f;%&ghiGCO*62<^0+!`q;>< z7dzifdn>X9Ag)XJv=7;x0;S7(dOefP3i^4$?#s3mg?9fbe4t0I#R_to&3TfIPrJ9| z$&r>lfx&aN3#@F<0FUqmN#`dhFuXE2b!d0b^eqXa8$2oO>{J05C-Pc$ zv!5CR0CpRu5dOoJQ{Btn2<}a)VoZ5+zI=cL`?YTQY31Bm5&c<1#pdE>gcG*<_R*i< z6x3EcLu)D}Yaj93LDnz6yD|6o_|be6UvbLX-g&!)r_y%UDM%$=Q+BaSqz1rMkD@~u z>z1Wl`pcYrS08De8ShP8Y!*wke+R_#xNYHCq-Sh{r)*jij%`$UK!1rQ>@#N6IOi`K ze-QU2Q@^~-^BR12O)#$vZ5j&cwHUTobkCo(7e?@Y)Q!mbBdVOO{0eiYl*EkOyz`YQ z?`(jk*fGKbP((F=mIuYiA$cSLint&4PM9}r*qc1lqG#*t6q1X*h@XmAOe2V|@T$|} zbbRl_`GOw~q0TCqO%IZ1?ze)wC9&;q#C-U6u_$3!;keA)EC%ASX1n;}d zCHY{9sP(AC0zBtnH^q;7^_uuEG*mO5zFYNWD=#%3{;M0g?$e_eYs#^FdZ^6o2Ot z4zbf*7d!{NTUoD;c}$^Y?!>d6W`zq#q}f8$ z3blUmUglhgKpmvpztQZ8?V73^ydbO8wZ{|T0wc}DQ9+XVjlh>1F7;!1;=Yy*ekjK2 zTi{R*Ff{_c^aa0%mzUt{SQnJX8k_6lHx9hS`am{qKB0HTJ6xS5s&0t;rMFf>ZFmZf zSHCl+`=#zU(z@Uu>Wa;q;Bw;=OY7US3RLEjgYsSL11h7u)2P4Q{^%{ko1>9Me>W^R ztGm?RVsjfVd{Cl>8-%{Y(BkC*ihKE{UL=rA`eCffsS) z{90dTH{QD?oA5L1{_)RNu%~$wsC)Sgb&T9>_kb!=siw3bUuC{FSXO!Q*Z4??(LPy1 zRSdyv-t7c}6c)rMoRW_*&I}2^Rb7~$KEaslkRa*FoR)I;<+cp3y#SY->eBZFHpr#R z;}o!u%?edXfgS$BT>LyHWEQ&{6OD3#qJUzY%B`5&Od|t(Mrpw!_b}q#`z8J*gh$xU~QSbIrCoOYDV+S+I#ckbf>91q%R3S zfJhyJpYTPX3yVtb23EGdj6+j)Ox?Oo2Pi&s6=IcF_Z5!oGWlLXX@$5F)C_oLiMc=7@P9TdxFD;Xs4Aq!9dksNq3qNrqX%noUiFJKJ&14{J`DQJ056 zqNUfNIBputsw1rL7(cU2_JSeFg2uRyNST~$I?)weJaPkOYTwq=u7GvpSDec)IE{r) zXFTlxqyVTN-T+|tlzgLTIFRUPJ3<3k9-a}E_KI;)RX|_0TZ=!|A&fR0?hi6#Irt%d zZvSYao?Sn42GJv7Bxt82i{w!%XYWQ)>aZXRB5KW#nMAbuIiO~g2YqJx=ozQ3q!x}l zTs;PX2YJrXt+Ly^YuO2VW+s-NDk{HF>3-0)Rn;>|T$~c*^kDb0V&1{eH7aC_yerYy zrx^E0=y%~im(m#$#wc9jJhw}(zpl#j6ZkI|=5l*Iij;xo@$$Y17I@F&RQ(6KvvID( zy3iTIM8sn0p3P^?43m=lzz>=#D&F~2WMtg1ap3T2Vd(Sct#{sU$Vt^t?=Nx;x2&Cs zvNdYMcpBX`JGcNpbfG%z2_{s;`B=PSq()-$H-zh*g#K4Zy8Si~0WtFG3EaNdq@X3~ z;B9zFzv`SxMYVkShN?)E5#uU(XuVhJy;Mp^TkKZd?d~K#+ixBc6A_H}pyb91h56ad zF5c279+N`#s_Rj?c76ZB<-%@Ap%@E}!Qqx@EL8*o+$8Z@SXlA83p5H_xTw|gL0D5a zgvODijZIgqE!W~JtsZXF$+R6C*Jps9AlH3Lo899xX~FZfTjpJO;MW_I<5grv57tb0 zg{pFk<5}Kwg??qvb2cIru4WvUv?{!+7jJ&!ZjUVoA-3jVC?{#K7IujTodc*J__gf| z>SP7)Lb=3g(C_3z$6P`?Vgh|f&bo>{#7 z`9~tz!ly^StRuwm%;gI3E9ovB!~W82#$;JMl;l{=u^sBZ#28Ne+%x)=_Ha1)*UdIEE?uE|dh;N9mU-#ri5YE}=bCTC6RqxLz1ll1^*vj$LyH=IbZA>y z&)XFjoCe6XUj2yvZ8TbLMgA>Lc51(6&D6697+%k1f2Rikfi{d^9bqVgEctWL1l-3L2id#kN>eL}{OX)foO=M6q8zDVPRH9!=YAkS}&#bJDu zf9gzzDz4J@g$KHs_iVo`413eJDch?CP;{;l2?CA~ko3bNu>(qz5hN7_u=har zq^={F&AF3&x)3B9Q^8o?Gui^na;PBX;IL)6Wb~)7Xd3IC$eP7YmLntC-Pzne2~UcM z^`?gzXFB{f;ji1OLFM0_Wh5mDgO_5QPF5!w1&&P_u%W*6FwT57;w|Ss_~7f+@+0Ff zyzl#!wL4`byw$Z-S}-THf=nh4Lrpom38XYQsT}g)?MB(=Y!9R_$2Rro^KJLnnym0e znk}-1DKEw=&Uf1-96!vHa*!A1*Cbp7G_fO1L{~3dQ!viql5+YY)H!x=ZTt~)dwqMs zT=uTT_r+lS>cwfqtU1e`PgE6bk;r7u;s!HWTWM`hCA6rNt-JZvCsc2P9?@fMPv+D0 z0*K(axZh{C!Qn0c&8vTobn{}XxmSyxq?fbhby1OK;TxNnU*GqVswOYP zE{Cs`e-kwKq)j4wwnZV?HBmygay3gL{O)X{XEJ?L&ePM~YVh=zj4+lx{JsyBvX!6tp^ICcI(2$s!1*HnU%*!C{d&hj6Hw z=4#GzP73Oy)P~iTjqX-rRmg^kTTS~wsjPEa>57=! zuoO*PX=G8-r>W!6CZY-WzFYGyuqk z_SIfVZ~!YSWp}%lfwLtetYO;RW^yl9^kOqy7Sh+wJF_Uv*Ia_eh9fI&%?r5*5AMj> zS)3P#*r1j0C;$}#QK#Ize?}){Z*HI5zd*Ssb*PKRb+jrZn;rf|1~Mz-u4I474cBl= z!&tD#9O{<%<{sYmm+AjTsx7+m(ah3J2QR_CjsSACu{SpCn!(%B%1#D;|MkZ0YX0CO z5nZo0A9kpSZx(x(he=SgmeF4HyQRa_exY?Ol2h-RvMxgTjCZsJ zNy!_L8O>3s_GzcDY5TK!;yR2Ds=G=Nd=5OaWEf3+U~MdWM@Ri&b+uV$s#LRX&S#6i zXtD3}Us`{cdDlf`|LcMRe&qipr#u3(WOvn(mr%uX*|p+GPq!CNayKg2fh~#Ge4TiA zQi>T|gt$bMr|2}}NYVWp6zHVI@K^6}U0YV&Kmx|{zgpW|2$fk0a2P!28}nVkxsRY+=gs&FIKDyS`)UnE}&E)FU}3jE2bChj>BI!MDO= zVSIB%JdwIFNsePXeOsYh_k9&k9l6R|e#)^(O6>E6%(D;pnd6mNkVYPt7Z z9794y(-epyS8h7%t_de5YeqQV-P8A!oG(-`V)|TRhufRtP_KR;s*NZ)m82?1&UP>B zev>OY<-#a{3iwwEsoXkci$w=0=TZ$`$b*S~vPr4CNDcd^@Up5?Gc8a96wf5$i$fuY zMNhm8lasshbrf4s{i;d>aB011)7mCKm-mGSdV9sj0i`xu$Bhk)kcN<0GhHcW-S*1KzOnmN<(K(R*71h0+k<5-*;lM2Y{V zxxVfGyu-KBo==GMW2`VzOHNb$GRmS&BqN`!6vk~G5UQoMQVHC;|IMW58Dn~wXL*kt z-?E|!$iuLxz3( zK!jN9V;XU|UFdO3yz<;-Zbc6pQoNEs4+l6vi;)zW7q@~dLyn-D2eOxiF(VNa$t`g~ zUy?_r5*yc#deU~xd#STV3gXasEBiabY%DQQWD08^#}jfJ=syk`cbpD#}=%E|9<}TR-%5-CakLlMt??yYJEPzyCJ)3!$F4moX{P1SrXlC@b zR)jk3VLCM~OdK5voTogajzNTgyZaB#u{6F)AjR zyeBZAEtUyrs{k&y7)2B#f1%*cyMegaOYUo&PEE?AjrBbWJj}iP1+tqXTJc)J%$xb4 z7IbG@xC}FKyPueYbNNJJvEU+N&Y0~JFCFW<@<0;oRWj&u@%6(AqAJ{shknLS_Ky{% zg*p!0`RbFvF9GN&=@zVIV!z6DIpQ6k%lGlYq25)~VY86i-Ve{Vlp1KxpQv9Nv%ELJ zUv2G|)MkXy{mYm|+Ki_Ba4-UXvO_5mO_?;wbcnJ>Nym$s@`u{bnt53>fNjed{Dnz# z!F>IZLY_wAaJd0Vfd=>BQo~Mc_NYam`u;9+ll0*q>EUlx|6MOKFBnX$ImdY0s@J0; zapa~)#A`*Qiqn2K*ANBb<)Kbv?35f&3@g`;6Ca}-;}nHvNNPt<% z0dZin8q`dS2S82@Drpg*fNUt|a~NblnNfsYd%1_DB3X)`u3;-0`SCTDbcVTdxaQ)sneeW@mF$~!G& zdNu4tlrRzTdf=O-((Wcql%jpU-kpncC`I(Si86cQ!g3lpZShB7(~KwxwmxtU@PG{O z37h(W(>R7ON4+kYSJw~E)GwhH71GX`V#U16B+gUV)+F0C`MBpV(s0L1uvv^2@x1@-!{tgfB{M z$VV?ovlV!*MQ@Cl0YNm~q}%sOt2#Nor6`TEq4jokDN0!S97+(=108^3EMxW}YIs|7 z!aL6qq>x3P%r6gJmR4Y$cK7|#la#8NjqhA$C|^E?WcVZcD$N2&RgMi z?YtFjlYCa%a66;Ro1dju)C(Z zbz4B9aFA`LsJQ%Iw|`&JTZQmPg}XnY&V>#IyO-Z~8jX+3Uto-qLuP9#21^^5JNj~W zT8kJ0RAiJuT?~`();q7Lc8kx>>Xt*I69A(99DmKFD2j*d?atzm>A^TPe*n!=cn~NC z3+VZ{(2ePA(@9jXm&|%Z>{T?<)=gYc&QrpY$?@uL^?#Kh)FJdD%X7fd47C_jhH&EZ zp#!Rzkp}8USR8EU^t<6RmUjYui!8=@3Af`15XR+UL*BLdVc@snD91IPyzdKyVS|I| z>{L``Z9=qn^2L;_?l7hu#FiF zxgU#rOBq1_J-G;3=nR8?L*!bU8DIKvz7_7spl_GifRkOc*5~VPG3uFQy`Rj zsd6KXVgWR9-%XX)#TG0rr?vH5$j1O$;BP7$WFN1w+%VH{Te|YIbT}b=uoW>(Ybmdd zNIHFRT5RXnGSzL0;$dtOK63W~l{n?1k5sE?oYpJgGVHMGWdAcXUq#vQ9D%{`uNAoc zuv_W60rCDpsZCEat$lg3v(^LfMVM;cGsr8Hn7>;ep_4y0q;-l>?)I?}#B>;27(QpN z2#p{PJePs&+GHEq^~{y9KIY2SAVnhG*^%qu#>uJjWH_F?z$z7E?sR9VIG!Q}0|IJV z^dPB@MNsz0-X2`q*tqhGs7?QsS^DJEGyuoIlyMd93mz&=zQ1_|>3DGS+B_^DcPrk@ zyA4M1+YBDH|FkzI3K;|-?MPp#J4Z30N$Yd5Cx)>(n3N&lgMo#d&ldVN*DoEW^Dx6q zz_WHaJ1)L?q{B}Z65OcoK4kxe;$A+_rewaH3*M*5EdunF*h@oO0ya#&txv*h5{H(4 zj>Uo)85(rrW7H=@wPRiN1w*X?nWtx-r+XcERoSmC+{mDKAh^Z+~{rgO}o zywZJ~dV$cxNyPCg=m*{g?l9;VEuQ~UuU4=6pUZFvdf{HaPTm=6r&P$O-v+-{aAOC- z@U|<2OisHf!jQ1m=fO2t5STBkWZQVcT)E0yPnyWx`7aS(%ZBQ2Pn9x)SP}%8d+V*u zRo_#`Lp!-3^9H{`%(9|1ILSH!D+l#?`L<-|gCGmaHyVL7Dp}eoq^!gg&DGwGWKmuz z_KBbV79Bw>D^624SX9?+Qq%%AEAd;3=2ZWe;21TUgQWcT&}ad;dtM^UTrhhuGGY-# zT+Ho@Y3reuic3jhw5^Z`_+920>Cp$sbyakY5b4TMx{&6BSrJMO3>jzAfF~)QmzrxF zElIuu1-!|Y?&h)o_r$*~zyCw$I2tGoHZKXm6P>H(xsB^rE62<++U-sET&RBFKPSV^ z)U%}#^6K&kINFb=^9h_hqLPwY0W+kr{S}oCV8qu`mdWGd(iw-d%GQ*@p_JjKTEwvq zPJ2K|*@H?3762lc90vU;g!8wxLN<~ZJ|nQ=Pm_iPiGP}DT`Odjk6*ZdmnkNpss5F= zC2H3cs{c}mA{-%(%B$l-bgTyOsR$Z94M&=Ui3C>q>T2214y;l`BHcp8kU({M*jMdw zLj`ET_%FCqIYhZ`cqy9Z6$$t#mBdmjFOb3C$xqe;n4U+~5}pU>%Idq8$Sza5W)8At zm35eVpqIG-O+1SPKormyQ37y=A{RhPBA4w=D_#k=a1^RJYN!DG-RxR+>`7nLy3rI2 zJ0Wb#@@zl$PqAn_U`hilSN0q>tbWO4DOx%G&AmPjGfeD6BTWipHuh1bN80v;Pyyc% z5JdU>BG9AKEd8L}KH ziKsePAv$;{xUua*!!q`OsLo7tm~@uF_Ut6kHub6&kuYY>_%~VBZwg%l4pX3Xu`8Y{ zS#Z4@*-^ZrR&gVGh1|%JW)Ag-VvV9DT&Hjx44Y-wnnW0)bc$J=Ty+(t#hzK2^8=ER zw517Sq9P-Ab^!iSVjw}!HB2MTCWYW>q3jGN25|ObOpuZ006g4#tcL^u@vk3xcG-J0U6#DGrw@YeJcleRROc>EBE z$K&DTon!-&0Biei?`(uL>S_aHtLnF~bFWPWU2+!Zi+1WeqmJ{}H+9@08hkcDsh412&^V~b~&y~nE z-vXv0>urk-I5-J_dz9X$goKqz1ORkKO$arLpJUODq*AfkePqB6l{=AkDbD300cycV00(ulfOv zGtOsCH&qK9;e&`+wb$k?l`*|;U@amu zN|&h>BuA)sV#SHwujny5&1+u3OJFfFskYIyVukdA!wc5Ug}D{3s|pop0fqi%sL zZFJVNN+Zev%{k|^N8NhI)pNx5{i!{!o;?2S-}3oSRNG3FwAr3a*3fL@#kEnYZeiB zFRVxs2E#}Aq8gSwvyb$ekU%B+m{-3KBo8(#ZV4t2BE&@l-QZ0v)*cxowz1ry5ktW< z9wbRB(B$4UX(F}N@nGdST6KMH5wTZJ^p#)i(ag)fiCn9<6|gVf?G$)$HNgStGn;|c zCcxvdH-(YD=z_C+lskpH)QOr9D`VUuT$BHQnyEYs=*fhbgVb^9la_E3sTbfA7?bKw z4;ATHmdOpvJx^RK8%kdZ^RX%ukTaFT`N^xzLfP9rMh*t5dCK_KV1T`XnaaUwldcwTp1h(`RT{EC&HTU;k5hzEm7^^;zL>(F2g(uv>j%oLb)bIxK?4W$#f{h%wMS z-&9R$uE$6b;Cr|x^L(OnGlSXTVpooZ_8nVs?Fljgn6}G+z2jDt`6bNB;CI?3bN=LU zMxL+NNM{yzH%fuY{RlYY2SbN!hpl_H&&94yzvKj~W+}khL9J`Q0065F@tMU)6Itn9 zIR=XNumdU-nZmwT2NcgG@waBYEX_$M3$M*e9d;Lzy%p)ulH46d$b#G;x&db^PCdf& zP>iMS;4+n_{9Y4N^%rqQbNnsR(dAjx6Mn9l`DM*S@x(rbAIc8|Uc&_05&@6Ek?T^X zsaS5}1-|vWVTxr^?p%pEX)q4Gpwapx*#H-W2Jj(B{TyLTl0~i_I0Y-s(c10CJl%Fv z+diRrn~5TuYsm4->wm9RZM@^hjq9T}&ERCou2LHd-SMM(STLiiezY@Xo)(zvT zf-wNC=Z5NrtRWjx2N^T4Otp;&j)mpQ7@;228Kn3gSIWp}PM^r6yo%JlgvZnP8z+tX z7+eOrC$G*7TzYHzpX)M~epacz+*}Hf34%GbIWblv2V4bc@i|blnlCHmU`JfSg8|9z;b3VqE!NWihHjD}tYx@i3^ zE*&T#hOVh#(%M70qpQE_DD>(DYMNYJ1U&2mFIK%7?>g#>k*rxvcs^he!v~RoLZ3j|%z@=HcH;TmjZ z^p^r|u#}&jTGXW2PruBq5TKC!JpRd!eHaq-v1tEoqORN{PX7gPjt*KMgQ zSqOL#Y-xGFP)D8j8OqUMc8i}?2}&>Qx@$%CzRsSvw`?KvW%%{ z+^{sw(_#7?Ef>*0P?P#{px0SZXS|q-)s8oQe)V2#R`EN_}2e97YDV$ z6%mAMH&=a3J9IvKH>-w`n{QjS1D>4hjU#;?bRoJ9e9MeCd~djY+5s;#4~ixXrL-xx z2TjKI$==PZ>qMD!>@KgM+95jIHO3Dk5)gO8l~bzOObQFof}2(FJfZphPtkR?*tX)C zf$K1#S+whsNr5i9S5Zrd<>9N<@Lu(2O?A3O?Guz3Y$GkjQKF^j=F^9Z3^>w_MYn;U zC(#AU>35r#-+?NaZ00@*OEmXJcXsn8eV{-^k{ws6y--7#TN3@j+L>G8!5NU5)JWPs z_2%LaEgSEgo7`f-=L|iR;38Q93^-sgJnj1UYru}452Ns| zApkOx8gm%DvqZhiuOO^UjHTCi{mZp%P@J)-_R}E)xqIms>CAx*@R<_4QFd)WcEcpZGYrzVFd4FisC=n`h8I=d*Z7aGdyYu-{yFO;T-k%XaH)Tx#I zDr>vC<;|zaXds;3`(UxK*(voK269NZgqnPkF@g(>iKz2{7Cz5p!-BQvKG9Sfh%?-| zVIEVkXcRUkpRvT<+^f++i{=Vvj2axcsyI(?+M3uyHjFC0Igydoi!hF6^=5v^R%%)?xsU|3bwa7Jwgb6p< z2Lq;EWrmt3r-~VQ9N^%TO1c5+C{ZY&o8(46PHYZD&oCws)-T?lQJR&5Y}&wLMrceP zdzT3?<#qfx-LgVvGC9kmH;-}VBgy{k3J>Zu5KTQLr3Q-mIH2)jWI*#O`RA1TtN(~e zqZc|;>jb!B*g%*kF=Q4OH3;L^cHZ4c-_-Mryqt*)_8x^vGsnZ0cmw3Cc!edoB7-^< zF}*P0P~QPGPG;N)5*5gO`B*$)X{SP8Z_&EMZ&ZdN^}x}QGJsuXs@)MPtP zXdSruS4`df1`KHjln(0Ii>@^>lR}rt+1fUbK3txEy+SRE<6=_(ISFcQM>7L8A2YHT z7O@CJ9vxE>Z}XqLJ$;*V>3!8mYI%h3BW%vSmsh6!LGl|1Z9z zSE6MznS&aG6Yn);{O(EvFe%)w?lff{{!0JpH&;&lPOy0Et?HouXQro0+3!_Vef)>t zKe`vzC25Mykt=L zpa0?V2a0_M9QXX23n|(UV1E6mJ^kK}Z=2sOv5N&}^2^^x8k6?>_>b&kFf!!xr@wjj zL8$)RZ_XfZz13-U$dGyYJw?{LtK-8y#!) zXFn>J|K7HLP4E6+?j7|)B%8JxUyVWCt%dq;_jmQoxFikrd_7N8_Udn~u`|2P3daK6 z6xmiR8C&LyQhHq&=M(8Q^3N|=yr~lk9wGa~R#f70eJ4Vsmnz9S0+}@<9 z#(T1Gc9r}!Z?`VQVN)F+F)IxJ`g6jl@_Sma174X?HDqBJ7!neal%DQT>4vtc^uRo5 zGO!Bz>o?8+m=_0aIl3qr6XFnR2rdrvyFJrSIaTL>-g&2Jvy!dq{%*v1yF2&xQkAE@ zY09?N$o!;kU77q9*usALeB1#b0(h5;{rcA@3%|{oKI2_DR14z}Y1KZYnu9*XyVtK@ zkCOGM%z)uOrMlwutF9A(DX%}yOX)f(Zae?hufhdj@cEzqGRwINRWWw_E<4W|Yl=Ge zQaOBKca6Nt6u+Fc{!!=#Ah$gPdDuu8eJJHu2jIIKDe34x>in@JiP| zn7n>{wq|P>2R|aZ1LdID!hpQT|}e`DLgz5W0znh6D&H)E_ncHWz`rM;=eq zs&T{8irTTEzn?Ded+GjGHILOZ)tEMalw}wflF1Y zl?~MYercB>LG)DZQ9N0-9=VYO@`)<6Tyt`g4^3tKd~^7QLxH+P2pe{AKlN(1-R5@`x|&e)TSslGE0 zL5Ue{d(MA+S`i^Ib#rw+N2pEgKM!OJk3~g2x5`+(L+FXM2MOybZduGWo`0<%@S-!ggqUjNe{qiT zb7|AQowPc8ffIppugyG&GgqEGBm`2>^NOV8*A-2SHPZmpJ_#`+DIVpNlv zXHs*|)&A+fdFp4AM_Ps#U(Z|}@4XOYI4SPPwOcB8_WAs!rkwe*yS8Jj1x+LS!Kne` z!+5*pNWo+W{P9#q)#5nD!+_X>*rw8f|MdOY@!;=V_poIVbfPC_<-A+^t1m|XIO<&4 z@BF=dx2@3Mab2y^w*pIREu>Wp-58D^Y3Fp*+(7rml;dlZtCA|yOxs;G2C6-Mr%oy! zJxt1tBhUc3(?!zV7fE5Fv2RUDG|#e|-LZX_W}%>?6w93QJF43L>H>wUbI}Mw`$lUO z!<)M~H-o&RIFAgpS7ZfFvoUunvB*u-V$;lrn2yaLx7LL-R%x=rvbVb}P0dvO5}4$Q zRkIMFfUhabeJ?tHL)OH7Ax3D;a2BSAUZXi2a0QXQI_b5|(dgKbZ{tL=Cr?iOHp)Ep zuf{IG+U9-u%K!`1U5MF-{p~RO!ggK#%Qx?)aU7SwI&me!P~}*(PxmVAhPo!nM;Mkm z_$DAJ^YzGyk#dPkkdxs>;Ip-!2Xdp!pJUtm_a-Q^w9)R<@U@v}|ItGf|D(oTJd&k$ zs4u!}qj3a&FZvZk8AX#?$W8n1-KBjzEGR20+j0-w(3}Jjb{m=f8g?5dF#W$av`2@w zw(-$7rR)yv1vlh9SINAzY%9qJ5*)8yPKt3j;O;G~%2;77v)TczjmC2{+P3>I>Yx1= zo4PkyflF9Nv2MZnW%JedZz{c{4=bHQkm%lEk73(>8Cs*j@M5V4;VX6WI|%Dc#O zLSsR)_k!4s{IINP@yz}ZDP`Z7I{c!WJF5%h*Lj~#;lV+4i8rsh_)kEE@!0;4cc=Vv z_j^Nv_1FifXmg2V#`%IzI_s-WG3|07^umcNwUG)n)A4IHb~!C4myI~Xc{0LwRvlcN z7_Dib8dlZ`;I~w45$BRW7qYmz@p(nysHHzTE75~W9Koz^> zd3Gy!zAIyU#=UPs`RNFI+NHGbhi_82VcMN9zXu-T2A0`gd(N0tJs7$~pA*SGg~DSe zbV*}r-%~E0x~ec7UR%=xaI`p@o}MZ@LJ_t>Y8FMim*+U@s*EpR*CvgSaw1S8J*phH zjk4%Z^k(NBZ$*6olxjQJf1s!Slyhe*bygiExI?6wEZcU4uC-^F2MBCld~7F42A+<3 z@0Yue#T}dt1}mJ)-&96Kkicv@!|5e@N(zO?P0nJNOwTi~?%6w7aN4Zm+4dt8XQD6VQwjF67 zi?6$!1r2;BA_UlQ+7+KXn|2@Ts(4)Z2xT=^wxgp6HTp%eb&S18Rwxh@>K{{kVqOm_ z>n`GNO|kD+Kfn6SZ_giiRWXpQ;?yx$l%{1p2bRLKX?xnkGDc)*_T>E)H^_%qc|NMK zNe9B^v&^5ypB~o@33PPRv<=I#ImuL@F4VTOrp+fi%FF^@ZY&B% z40xCK^QYFpxlWZ2Z9N|zFe}HIwW;)1pfW@$>uuUXy?6f7!GZHt=a>kmuWiTA$wV-`2~C5zM4 z#>3D3@w@I*{$#hX4ILmX%Rqu4A4W$EYYPMw?j;wT?B?70zDiqA{*pjdt(4m%nh&Ei zXWW)RxH#G@2o0%uQ9b;==jw^+Lh+S|6s}ns5jQHzJieru73O?@b0T>EF-3%Tsw2*H zpClxfgGOjJSa^dlvxC8uz+j*zG za5;O21$IL8g)F!9h$-{7HN7LI6~u-QNJ#{^4}ksNz)}Oc9_Uk>d^OGx$8D=G9Cc06 zAG#L&qYgd**(a#5)U7REnNl4SV{U|q>t6L%ra2k`@9~0uqkq=JE=3=;5eNNhoCnmu zk1hXuqWof5psKwb9W97`5pNd=eppk=YZ`Kldp%woF|KWD)xAva=^O9K$nkMo8C7%I zb=6czh{0@lrc7B~#ZjM;%zXYk6=S1EKIC>R74M?G0|N)*{WF=D4iBfmhcOu` zC^ya8Ddx|tZoD(`*@p$g}M!A~xB+a&+@pe&|_ZXEsx2={zhD z(n6xgU*aLBt8b16KhnmQtBs-7N0I`PnrX?U!~T_B3r>%>?-kkqVOi(f{Su#ab=O+I zBjVtt7R%;60Z;J|YUZL*DZA}|vG?9lO{MGGurr>KaV+RqP!KrkC@KOXO=`x90wF2_ zN=Z}{3@t+FA<1|w9Hps?nxvuNJpHQ*^IGB~?-_d67Py9Vdm01#oQ&}fKS@mO*T_LJ5 zeZsIe%cb1S^0v26cAksY$|)x|oC8jDKkujMf;nPARY1e&mGG3crJlRcCYL`Ny`{j>ywV zr3Ue8l7_c~^eVU7tQRlsKn!RxRuu?-NpA<+E$K$bpS06EHu0ubD;si>`37lpc$Rc- z)q2Y6M#QskD6gaeyuag;X2@+SVD*GUQYz-cQu>>2qXTWVAQ{8);@y~PF~?f zEIAny>`*Noh8_wIB3;T19PBkd_QsD9AJ#69X)vg+^apOArDpI?pxZrR4J<{e!U_#A|};(Q88#+dQhyDr4;$YD1(*^YB=?h|!TZGEaUj%?~li{XPf zZ(<+E8_hZ9yZ_uJHyT22%`qGmyhW#<8c(GF4D8&1$v}@@W$E}bD!0sfW|JgSAlSS6 zueNCqcJ+aS4-58;1K;bk@#=x*ycGw&1uc!wI~l)u@hSBCn`Qg9 zXJ=SOrZoae=g05}Z$nBtTZ`Gc3U>~4B$2+*keYr0~bZSB=_QvKgyNqSW zkZ)xHr~hiLzhX(w=T1>!S!sL!aowphzxuN;*iz@o4L~NyDY<=R1K6o`34S@ue#o#7 zP{7Won_C)ar`})D|8H6FyXM+p|G41L1O1CE3jEg8wpc%r814l9oP2sU5=AxmWO{g~ z-cDV_8(A3499yuTyN2YSXiYTq{g0?@2BhMu8h*#}oX@SLvY~|tuA}zU^Qd)v$DT z`Y?PVpPZviO@NjJD%4;D09gSLoYzl`dLS0w0sQOFV^z9zF9tgkK$Ee=Bq0eexi0K1 zcDDE}mEfr_y)HD%=AuDqm~-DPu32yd&MLQ<%NLHi*wq|UvTftbuK7x-&P%l+{e9~^ zyr9gpi`@%$aajxAey#I;ngdZfaDG9s;{Nc0+-vd1m)nLJ(kx+OYN(O+!ryPU!gl0X zUj+tzyM;q^ATL~^0tpYRni7^DZmQ~fwEQEc8Ig}yObOZ8{>K{M;Klm~%&{GK5RlHN zZn8dUp0((uW}cwAdsYi?_cQ=@qwKAf__ z$YcKF3DQjyg2@icKbPiZy5I4|^Rvk?b%yX2C9XL22*{BJYDLBPuP9IpF}{aumA&9* z0?)j++Ak4Ci8F=^CgGOLqxtawkivWKmkGd(XLvgNiJrZzJZCwjoPfEio?aL;_DD3x z9R3ro?mSs0nIK>T{QbxIE7Ko7=C8I7`*g@AYVx!ilqk7*bLq8Ci`$^9QoC_vQ3t_+ zAZ-{&P7p8)FsYB@$c;-rFZyFPq7RR^m=F4V1ahbK($#g!2kU0>B&CyZvMD zC&F)^xv;nr$u9;WzSnNlozSHkY~zamxX$V?C*1XKtV52!Nw`^QP+GTmR?__cgXmes<{} z%;iUb;Y-Z2bV%#JZI{a77;V`bG8p8x2gT(DU^d$e$7lQpK7BzOYpCo<2mzTT#?jPJ z#DVGKyueIyt_4kOt)V>N0KLuJb>3;H;} zv;jD2if;coarCZSC~Sk7x%%zjOxdDEFS|!$;^rR0#t?GlB)?E=WsY;bN}7@J_UnT# zQQ3>VT`dV8FJ#9(z6l~#D#p2qwmls>ZZwFMKKw`$Vd+~S(9<29_0P69OY1kmHC(o& z=I+aEPeE^)t#dfYJlE{9|&JJ$>m0_5t??ixD&18k}KKJh{d{$K!8^60zFiM42neH~p zjWGi!qs?@6nK|vc*}*zB8Ls?e6y@{OnK%ZQHgctCJD`%a6RDBh+6ZAij`o3c72bYh zY~WNjhEp}WsSzkX5l7fCHsoiB9I~pSlXt?wHg+t#753F8y53?u-IiUFQq+@5mv}&& z_==jFk-~P0tzdVLd~jVmtPVJx{7udj3s~gJ4i5_ETwSe1V35pU;awY$Ro$NGJ;swk z$+oql$>wX?K3+PSKLJ_r`HMUg_9w%Tk|mebwyFuPykQW}t+MOvX2foZQ728G>182) zf{{Ds-ngUyI-sK~)IGy0H6iy1JvZq)gQ!wwoPUE;CK!oGEjXxeVmB1W$e{HV^_at_ z&)S5+dSJzjAUpz05n17$PzUxEJ~+D`wn=r;f4zyavIA(+7wt|N#EeUG!MtBn2@!LL zgk1*1rX|M`qI&1;afK>Qilk7~?@dz@nrUUA)=y(~KQ9>l%XDr`zjVyR_|?2cqUmo~ zQ~SEg;IF6U8V3=RZJ~QC4c{)+@5`C&g7&K-v{TVPL?(evGyJXCY{AWb*HApeSk;%t zyEIeTtQ!JTd7)BkV+T)~2&!ck?PfZNsqxnCSa3v)MU;1IfHD*t^DHC@_Kef-{*G5v z+3k>BmWayU=u7;Mvq#$$Bdz)&iOoLB?i+0VGBAWQME?@)3x%};FVSgxJ-eo6D7}+c z@&i6)YOfl~G%P_`_C=8@WW}R7hj%vQN!74stfG<14yk?y323-^6AXuW!an5kMh=l1 zM)zX*;4~#@y9)xGuzu$0lrcK)S)IbW4dijn=067WscqVoElI{3=~N}|#ZZH7KELLR z_WXvmR5V9NRolNf`UT_&P^JJ7ltNKo?ialt`RE}^S-{@SIem2`YGdxQjc=D-I*%~x z7)TMa8k86gBEE9&VZ@91{xPSarDL;UMyV2J?9Z{r)ZocE-DY$|$FeED9;wC;4bX^A z3l?jU=k>nDyz6Z0@{d=NU~YSVL+O0=4x7!ezy|401&K`^n&^)e_>|;k&WyR_vbDj} zkp4W3k?wAxiN{pzEeKs?h1J4%SvF|bbE6lVq)Jei67&y3=XXxLn07H(X<<1xa42%c zdS#w}1p221um1RS^@@+%Hj=k%zf}D0@-AnQ#UWmgi*%r|K2qq%2PtK>wz_BD7$(Ya zRf5XlcD54=B)wIYuu+S&|~M>%}=iToBP)3$o_%K4NJeBl1W^?u6GFX=IJW#KY2%uIOGfJ-*c zCdWT2)RoS+Cv4Hcdr5c!`4Bxu2F(Shg3gLMF{s~X%VLM(Ytf4 zSBHw1QE0+mEgFm2DjAcmSunh>jC$9qEVAa~q882*jRIjraQ>(TK)za8O&>!hb5U^r zE!5z?dn{QZ+Zn}|ANQQT*eE*VrM6?w=!ytL%&rY6GVh^TlVSWW(2$Q+jC7+nq#X$ zBn#hXG7fDL(6FN;XD;H%)z6AJmr@Y^-Zqn!uZzoMAl*h_H2};%h8`&_5PEpBN8yyk zY}Wt)s?=h~Zl2=0cQPs$zWPY+7x=1KZeNiv`I%{+)*gD=t*xayRuRVMlYAWnVk`Pm zGF&RWFLZ_Fhl6cq{nP3%2*e7w>_$jPd8{<6$J+Y&=mp(lNEyIPjfNQkGmcWTbG+=n z?3IyoMhT(L{NUV6u%^B;+hx{cajO@+{`c9woJkHM-)paGWPiRlalq?M4S)z}#QrcV zjcAtDEf-i}xYGbzL72JR(AYMea=%HQj24hlF=r}7NL~`zGbRgfe57gHg6IBrg75{5 z-UCdU84DvthPDD!D|Fn>)Gnjl9y`&X3_7Qr?w|MI+J>04%2z<7h1Ikf@=V%G^|l$6 zr`)H=lZjcRh>v|0hJ14Hbx&t~z~mco9!%_C@S5Kj?%-J^D?4RM94$6({?N9TYlqfyL1aj57@K(NknJ9`;5mD7N4u@b2}MU&cElx0Um>=% zpRZVE7iRb1HN6dRh_wyK{D=Qx^uNeGy53u18TPn-#8K$IqAbJA93J3qAknH>^&yZ! zZF=px02s6y6UuUXZmSmq)J*#h)<(3X2!TGz)dN|suI4Q(%yhV*Av;*mQ$M(+so29N z%5x{7;D?T`ei?n_gnnmV1ZFY~?r6%tU!f{0Ggpjf9F#wdkbWqOh*BSF!Eylr_yKAH zik8^7PhaDhKjZ^vj)tWG>t8Pgve5K1)@2OHtHKE0n|AYB9*#H9 zVbI&kvYOxIfXlrdGE&630jtzI44|`f8Am(51m=S95NynDs%73(K|bghg*p=?XdDAp9wK0EKB3b ztH9JuU!MFPs@;Qu$-?hAa?s$nb=15SJdt}fVFfDtTN1VC<oQYCw*Hh)#XZHdkgLI`qw~ z(l~`H30X!!*v-j#IN{C6>oczvbPI)^)8L6v($2w}ICrngr(G-bk6N*#qNQ&<^IVD3 z`&bf(kQ&U(Z%Fl`-!48-ABxTM?XZg5HV~!pknNq-+CTd`7m7ojG*#m(D!b~X&9Gz9 z*iQm@lfa}<3wAFLqT`@CUKj04Sp`*m)XctfdGNOdnEayFU%w`L2Z^5}gm+16Ha;Bc z1d>5r%*?9@`nWsq1`NFqjbIM72fcT018$&T0|w4p>>Q*Ow!Y;$K&3wsm5*z0Ofta+x_d>+ZmjdGDy>kQ{RS5-dKs>kx2)#yj|ZtE&3Gn%G~QtE zfrAf{TK*V(%`d~hUM)*vXCb|ytTBrWfG)3Ru|Si9>Hek z25vF@$A9~+i*$m@las7yeP|8(z;({bqXBfGS#`Q#wf1ITdw+T>-YeH*aNdBYPwaFf z(>1IJ1U-`Npy-MY?Wue5t`b)(R)sM-yb1JJA<3>RdXmGEerN?xFKW}nlsr#h(gss8 zCLstGvN51(%6FoTL7>SC0_Y>{e8P%sS)mSne7pFD<|&H!LlBx|D;X6Q?c$4??Q>c6 zJM9~$7xQk!$ye|e<5gWhi``7odqObdLlNSTJcPR!dKe5JG_ZP%&5VBS>_TW%Z-d%t zj_`_3cBKb9Gt^7mQZXb$6|;U?08TGDz2qwZp}So%R~1oI`}vR4+*<45YI^r@ zxA0wZF>PD}+gXv3)@KeRZ3Q?FqLYT}g?i+%Sgf0erRK>YEjqzr$5r9PC}X1uB?up&GF7wybC-@lehm2Z(|$efm7o@U*)+emiOH{JjI>j7p4w8 z--Z6X6;fdJ-oUPLzDTpsy_kO#W&$?1&9fYM$j6XO&s;gV4QMLWCOX^=^{K4z+$kQN3ZM@bUkpvrN2*anq%un$9)v ztkv!9cyog_$r6;f9Byhd0KEhvI=nbt-gtgOi%#vMcM>cy&ukdcgu`S-J?4@20$_KM zaq7aC&adHB0sD($nHTtd$A;PlD69T zvgY5(wGL#Ak@0BWMD!_zKJ&D1!QtaNw80zL5WS4$^H8Drf{9tQ94MaPSm?})O!9e~sX^goX}8YPNDubC>3AUu&Ky#vzBBHT=dxr9 zVJ`(+U>fUL&~3%K7fOottrI^?pmDA2@KCwPfJQ~PvEP#XYgHJjefpqxSB`$~UI>Awk6}s`xiCFV_(y5Q9{2@Vn6O)IUEw)FA57Y+Cvs=Rauww{PzrNv4E? zi#-Oj^-%dsm;VY9L=W*-Lw_5!#8M|O^z#g^faZ&Yvt`@$PIoRZNezpv^K1H^z0C(p zo_61hH5tC98LaFfF8hz?x8^UfFS8;y9;n0%I4vJq6J_nazjn#Npre|lfN?;bZ-ATJ zF}$d>Y)e5LjXovYjpk1u@V|r}C zCi5v8v!$`-lA?bQorw;bX?bDUhq;7b3 zNov71JC}hW-~!if&ktvFz$TbS!B2bq1NF-z!yxZ1x#u>vv9F7eujZXSv3oupv%YrehmKX+3=lwC-TU!+&1)RVRqv~NJ=-hAbS#2YLg-^#mM>_JEk z@kz?E!}&We>mhoOzM7&a*MekyZ@^6`f^9w=azXo8VNK_};wH2Z(9bPwKNIY(LE$US zLY<6Pa-d;&_fkk|{AG79MOiZZL_j=iDFUjC4ytVaUJDxq9M6(sPuMv>y>H_yT|i5e zE(QFA$@@jnNWje`SQX@^DSTh@u7ZxSrM=1ad5i4tLzN#i=uf+?3N&DoA=@GR!Fzhj zZniP*-vrCTRA42QbT@?6l~;Y@PYiltBOP3f>j}bp66*1Q9(f{?s@gf{BTc5zO7
OZ32HN2#=R?{gEj-1jnQ-Co?q8n*CbBJVPPO`fH_yqH(LY(i?$t1o}& z#!H^vS)4LaCS+R0@3EhsGZF1G{`M`uz5OO#kDzAS=U_gM5eYh;#HZkon$PO3?1hpQ zJc$;}#l#7M-DWTBY=jSLggyZ-U+=b3#>LH}nD71lEEtKJta~0ruiQ}i9E$Fl7s|QB zsTDI2&t##}Mk1l)ZS@MEwL;ACC9}lG8pUNqk~A<5(_}zT0|nM;?Vo5FiC1vxHxl?R zRxM)<2)}+OW)N1l!0zU7ZW#)eXqf3AS9>TLRs4I>eXJZKZ%p<0RJzeyaJS z(sjNv9ZV&vA+^;X(=ogNwK{F5j&+ltNKlAuJ66uaVLu+>ZO*!u738Wb2ewfi|1YsJO5GA(vwgWH6$twPVO{pU}qpEKO%vex; zen?S~Y2RRk=6BW8Lz4Hi`x#VTRlUBe4vDSGd@G;njwQnZ>uQ*2{Wtr8@3aQs6Apj# zed?-+uNgq8IY0`YTKjDeE&8MWLH#3sXOMhGzd&HHo&I*2BW;AxYJKVQe|yZzMogXL zDDnqWY=+x{=lxk{VF=D7A2exW8*W|jzh6;>Ep6=d?QQIbS{#1*U$G1zv-mQWWdia0 z9~b=g?1wKT%6uEUGWzjioFySkjnLO}c0UG`!EI$~O-uHCn-N_0D~F#zV-Z7~0yK4< zwM@+Yb{T^qh079HN7EpKX;Eu|PW-0QX8IxBVva14OUud=3}!Sl+VO;v{cUVfZRVtx zq3=E%$90nn0A^>fB=ZTk{Jt_!ye|+ZhX)8o8+`#FIx-J8Z#E3BxEKXsYg~E@I)Ogm zBKy9Z0;(t0IcP@k11O6jk6U(CH>zs0;`o5X`3|eDF^%CFgg7Q6d)65|wP3SyQb2Kz z0mL7`lOZ?E#ZHZ?Tn+klxPC~bDvJ)EeusmPqedqfwVLbC_9{DmG(5UsO8!7kE&|wI zQvkh|o?LHb<)(u&Aj_x`@q!87z{8e^qUlTk6v%T903bk?vL#|Rw;cS*CmY32Hm@zR zU<0s$Kk1%vZj8Mysdx|RBvWWBaq7nc380Lc3acmXz zh)+WnZzb!4l+)5#j=9cqH+*6~u9=nv^ji6tw{ZYzqI*7qu_B4M!Fn!}x+{tCL7n{)W01PU#9c*fVJ z(Lh($Bq=;wy}GxvwbuuQ&9>_wY0o_xK)M6ct=m2oJ6YMD?MS)BImeWv5q4lkP)9*+ zwUd941>35sa2bmwjLF`y@qOYRY_vT9p#_R*T?|^izR`xqaoSO7$!)Vr&0y=k@iywf zqko;TE897hh_=KAv|B=0c_GVLw~;afTQ15!$VNWj!`aYYh|~cMpr-)^c*EwS7befX%TMxQm%Ywu~YCWGMs z+xXW5y&?fnTs@5FZ}tP39lv$s!H#Tl5Dh5V_*8xN)RHLx;}g8$`q-#wa>iCJQ8smP zkC$)rl#;;J`S-FcG9Clpf6!)EsTFWZb?8B}hUPQqFrU))phs#wECT3d29g*8fGbDV zN<2eSXZ?UAC>wXG05V-ipx1Kt0cUIvS#{r*e)FJf=Fv2J{3>YL%FxOdv}JB=JO(Oj zVP|8+O(pKrE@{y_avO;Eu1Zh^f34IqU&}#oBbzP?j2SU|>=HSMJ*Q0ocGyy%`4gnU z6`(p_D2)Zt{&wJJ6VrGipchso!_VwpCCetCn;du*@hCykTXObvdt-@)RS@+m>xP@WgQef~S@zrtcJ7n9Q>!#F;a zHr!Ey@`)#mXmE;KELa=jq%I_w28a{By~$$%nEiIf#OSP-#t%(ZO%DG$V;axaU)#X|NZ)ewoB(eQ>S+9pWfH$z>?%eP~l2)#p&o7Axe&y-l zJp_a-nm{U2fV-t=cZ?|z43J)%0-$cc)zsWbq)b~ElBTI8&F`;Wrhl+wcm?-Tmnz{m zQJnxk9fBhpz>didHax>{Uu^qZ*Y;=~LYabyFSh=$KdHiDiEqr^n4Kg3ev~mC$ePV8 z*g5RtOfo=En(AFJDpHBL&5Q#b!3~x5{5w=I+s8&6-xILn?3i()L?`bJ^e0Iy@J9Q# zfzWeGsNvtNN{k>Hex(0X8@m>5Qkc(HaDI*Bmk%x(qqVU=YjeJ9V*~YUoqK^tkUg#K z*4e4m%yUj7L6?+yD(-9~aG9`!9_Q&biS4EZ@zbK;Yx8D+pr_ zomX-Am;c6-k7Bv}VQ>0d&RH#laL#N@Pfe4f5tywZ{Ba#0=e^R`rlai510C|I4MRw{ z)O!%ESeIu$9oZ%h2_#N;(rqeTk8sr=u<1_v5z^-cY>|*J#dBya z3c2Faa2!C_B<|@1*v6IS$J8vIH$WR2WJfWIA1njjjxax~)z94WU#3&7lx$HXpRxU& zDe&&PZL~2$*DL~HJ{wAk5yy=xdh7=0g0tZ(xxj{}mo|{`5@w|F%EC3ZVLl&1c)j1H z0{Lu-;b_H&SQ?CwN_cJc_5_$l^7PjXrSCPdf(sJ$bWG7GP($m z!8VgzwAk|I_$Kp9vL-)xPs^iAor5@6-H^M56#APj%SS`1*=a0aeB-0qlNl24sqiR) z0-g7+(FiM{luO@!As9v zFoih677L=8bwr>dq7|ow)O$RouZWK$Jm-Yt$hm$wP6URQwCnEQjCL)D2<>jb3JwWQ zjr(LX70DF=d41J@-wj4)Hy$^L96Q$;ne~P)qs?eIn438E&&+fb4l`Nc*#ipSniGQ@ zKqCy0Ay(`MBt>3?yrf8EDm1^TwHIp`xqR@RF*w+jkEuAjh1j^Yv0gG2#d_Na5m`{Z zz0y{uR>LxV%>aLP09pvJTpr^#nvO6-e8PBUGe~eKdm#FmgSY@$H_1WN+_1qWqV285 zziDIvRmfNBY_lo0fJw9UUTMLBJ7u_%aqXcPV_n5`p?Rf%YHmB&8-jF$`%g0Aft#O9b@nNBQlR&ZJjF*Ef?41r35kkekgB9(ChQjEwRoj)Y~~S zQg?(ytOz=oD%ewHomiGxL9TfVZZkDnOru0N9W797qZ zCw~!sV}R&2z|{(c-7=*rq0yf!gtZaPq|qy*pCA7UJEY{V!oZNR`;BTtxN87|GVmP{>8w@ZC}J+)QNmx4E(!^|9>lI|G)R~Q^hFy$PCBjD^(5@dEfZEZ;_2V;eZJJ74TOX=Bfb~ z8`V`5u%?^;ZbMZQODiO@I}ziT%*gwIf*rTEgFpV=E)jL71NG`6ko-t?KcIK4zvvbx z)?}2JTjg0m&2doePYH7RhMy{jY1P9PY8=0(a-yM?AA}pSl{7TV2!y_s6AHoA-?8 zBs$lVy($sT{G=(Da=ODB_jpc(jet>5_Ml~ zC3~(muvs#F{UGl{Q_wBsX{PFPU&M5T+1b$TR8k{g(5J2FGgKl0nXp~wYNRDK6lmqX z(?Km1sbUWUCKNVYS)eZPA0=c(aArEIZ%a^sm@dl=8ni2yU9}T%JVBc8%QDNic~%E$Y@y;jwZ?CJW~tI;x@cs>gzd|Cu_y=gn1E@ zn#+)AVOh#h;0uO>I)F2Ue$5lLL9pn;v^A08PU_IAm%#ue#JT$}3`cJPD|rbolukf( zb6fy@8LtubBBmhb89WYVqx|)p+(_REMXs`@LNBv`Y+L)Ku0Z^HX6sxT%*N)v$mI3> zkxSNp-EQhMKaWDb!%|#Q8N@}0#21q{t25xZ7p`M|;g(+$>ycY>TPy>!GqPe?K#9*WvD>SsVB-x{jS~r z8--NH_y(fyCo1+0jA?384p!y`)AdWfS76w<*1^89d0ZIo_ zWrzbF%d-MLdeoaSYcU&KerU~iGbU}QG8S6^C=m;MJ0_1J9iH*3=^xz0k9E(q+W}W@J~9wl zE~dw1kBxiJ`}{Lv+uvYBfW$6EBkyRMY$YKP^Q_zF53Dc*Y(~JH_CK!9|9Cra&n_Ch z{@j3YlimDOYor+=E0L(LLV-0oX9a%AL|}T4j=pvC5UO(C~%}+dcaQv{&1a zxBWuksvw7tK-SDMIJoIy@m~?tM?i21Se#(%d&U+TX!!V9n|eSVJccBvN2xsG)58(v zA_6YeT(>n?$qEN71liPIU3YtfbU5odfJb>tkH<|EQQ`jYJ&>*c$dfkf!cq5SJ*nHX zmjlI_{~-eXnht6M2?g6(LuXhVY*P(Xf~TTzl}wd?G~E;c5cDWQ`gtJPB+PKd7P3Sn z8_1=vPR*cSR;~x`?+&8nQJP-^b-ujUDJBKJrUZMgPqxzI-zEnV!m=y zmCAJs_So;5IzS}G+#cuzlx`YvPk+e-YXxonksaGn?*M6;HQ&AE@O4u(6=?GTKty29 zKuq>&nKI(6^YDSMf~#h8ucs2j!8sppW)#*!_(M|z+l^BDNvwrH@0g$fZC5-Nyz}>9 zYU>4HUu#rL%h&jg2F zJsTt`E1MsHd7p6XG1*VNw{46P4cdnbhI2GwA7>q1UFv@_v~x6*JalX@ws{^%>)^Ic z^kMk<@5*iU_-_Yc;9)`df0@u#@mxNj(@P*Tf%={5nWnz93ia-Q1|_uu>be^tUC(^e zM2Nhj8ROS#&8uZP@Q!|oHA;_}F_1~`+w6S|1Zm&HTjaI6` zGyQ-L(Zfp(^agrH8&lQw`jRhIvQY&BH)=T%>BbuXuAN=}KF@zDgqLfSpbgvI+FzzW$Ex*3?Z|E?UEDs6#PqNer*(;|`$HPRQSw zMBo~u17mgH>R^B}kpGQ+wf=u@+x0(>|D7HDKhQGmf9C#w=Kc@G^Z&PId;fLkbjeb5 zZEmkRaH-(0hVyF;?q35Az#aVWgC**;8{~Z!aB2W7)QdAJ?6U|usmD^xvEkv-1fr@v zTWAYo500Pysh*sN37`fPrYRWogS`Z{Frve;em)zO%p-6dD8MYO`rAB*nSmRLrRy%K4Whr z9Vt;w6VKO0uSe}poaf&?M^Ir=u<6LLrhkFf5Zn5F#rxL;bqz`{du7RRNr!jA6>;6iO6VqM34*c>sT(iK_y-qo7^VOGR*~#^od$Y6jvZ)MId;EL zUKReNG`+k>s44F#>{ze5f{NX(jQ4#7dh%@55(}gT73Ny{ULU$dGE5m&KD>~n?0iA1 z*~KV&X>mrZ4Qu)#RT4Oj*v9H$oP}gy^`V95EFOV8OMhZ8YrQ{{#ie<%b-Ps|rhI8K zNrEcDu&ZhsR7div#p?w8)O3oIshWcL=~?4T^zl0GIyyPE9?~^CJ=Krt(H=*-+4OKW zRa~_ZeTNmzuvb36J0xDb=;bYSXT3ipqsLW_p<*gtApH$yre^5Pmap0w#x?u!UKY&6WQgw!xD1VIt_cS&$F2C|4-ICSc2kFFx zuPE&pWhZ2k8A%gU14i>~R3_OlH)u{)^>$Ql6+YDexxCmw0n+#U%-+>!kws25d@lN4 zyuUG_RN144A=KgP9G11lgM67CUWaA;?+buSbcszbL2eTHE2kxZF7fQ!uhMOGv&)Fc zcd9T#mGWGMVzG&g;>7^DD)isKhb!@~1*&rdNw$N6e2wg&0+m_>pc;UyKKY@vtgixS8(!6q1#~dh*i4KF5)OvHDFb3R}R>K47*#b+IKD{rj zvI7BJMS%i3UNPcxkK;psqBvBLI)TD4CBjjt@O`Upi6dOSy}_FU|QU+Z$YLT^gfjBi`== z3)J*(E2{>P$8lH(FUlH*?|`H>kU;=Pg*HiAK#K)@;!zcH@KHzPWF053*p@u8YO7#6 zlz2W46kI+EJ%eHKuh%`evibf?V(dpRUI0 z7?`;jtY8OCcM#86UDb6?MaTLSyVDir59b7B=nZJbO;m;*BD$fGyNTMD*DBsGi5HRx zFNP&1>!D2d7n7Xs?W5TJb?*)!X0D5aB;bN z9PJ3p@&vbP$breyym!cca|&B5J|(v1D+l};TlE6=P0yk$GAofU<_=&a$ecTDtw62P zJ0j*r_GCG{XX2E`s??pZ;vkdm27!_p^>FwdF_siiU5+Z?UJM<^2Z7x#P@rjeLQZL9 zF|xdujV*{h7|bf;3a(ky5u?R9zG81oaL5vJDL|R;u6G?pkq#4wgA=kPk?aw_`X>yb zcCH_u00`r*~mC#?z?W(JH;b&Y~Si@!}obn)r;%< ztLuCNHzI%huG#YVuB4xy|EjUPkakoneb0r$eNI=doz(pK_S~;d8*eAMyZ^+N>ic(4 z;*v}`nL$&LdbZ+zt~hZ6tuLtEniEq(ao8&E8?Gtkzm923bgtOOeYHtHLI;g@EkN&u zw#SH0^th*6q1)dnwj&AW*A{GaS+uBk3G`s}%})8@RTtL1F#4dADBLq>e~6$lJo6kQ zc*t5V)cn{K6Fa7-U)4Gh7OPr9ZI~(26UnSrw(H~uk{=bnFe7Eb%}QH|k0Dvp)TXnZ z0pbTBQVJqmx-J$mboGNL&(&c$lI}2@oH>_2X~@8D%Bb|>PmK|eZ+RZZixeef$Av$m zY}i>Zv$_!b&!7E_qHlkYF|#{OI|WvmhRtavyt$95+=HzIIc?-A6V?xt`1x%S1iEZR@O;H+IcT#-V!0+^AGhULP#|AX>=@O9!RlUByrGlUlX&o)&!)Tq}9+ zP+wiv{h*_u-MGH`bEA#ea?W?-*-u^F<2A(YJ5_LsqYS^t0TDQS2(!Bmx)sUwK3wf+ z*3)x@Vi1IgTHF0^Hi98qXD zN-iv)%eyH-ha^>CZ#0mfWj(^?fbilLMP2-uBHz^vOM?=ZTyUAK`MjCw$=nmX8m7M@ z%^o{9cVI6%Wv%b)^z+UaC&m)Hwe)N18!L6wWKqiGsCf$$Kd-!rAXstlvQT~fWMoG3 zzz3I*@`Cw2(t+;AnJ}NwcmM@4^>a2$xLMn1bdi+go$KkQv92zPCVgbWn;!O`aF*qW zD=@Afj&IC}>X<(lXoXLRBFi6DA!nz;noDoSn3`Gc2nI(flWgAW9s8zEJu9urBRYQN)0R@}W9+dWpflt&q;bdzQ63F8GG0hf(fZ*hFje?*K`?KRyc znnO0$T!OWlp3yH@vIJF5s$q{E*V7M&Q*5!0xFiR0Wo1`0r1zP8@uJ^sZ!$W4x0qvB z|KrT{;1x3u4A~cwKoIhG0=;_$dE?0k50rFia_mLmJh?SC{4~k*jwQ2Edxy@N^xPER zJQMrvE8R>_`n5Zh&rG~SbUxNxu?v=OnMJ>^7ZR|gWFnaA&>bttOpVOiinJTWB15-O zJ?EYb+w$BV>xswR^oxU6)%dwZUJ&DQaGxjFoSINbD%o4h9ol>s$8B#%*~3!08Te}z z45nc+)51QFh?K^SSDMY>&(iIO52ZCp<(0}YiAoE;@N`8Zjw|cj)`*N zFy>2pY{Rl>qbV)D;O0Jo;adWp|2A;{ZvXfe5X$07PsrJ(;I=?qT5d_^F3x!8r0-}` zBAMX$NaWHsHSuOgGO8>&X6~stCsERdDeYJ??01o#gI!%&cq=R4?SWuq!X&2FNq}PJ zgax%OA*~(hZ6moRr9)ip;w;63=Yz9v)@rH7<;V9`y|d3z+$DLW5XSSX{QMD#w*C<= zCHxIjx69UnJY#!MA28;^A35zhjgGX=?UwCg({2U=xiO*hKs01o2Gr`3o_NT!*FmPupMWu&ZHc_OGrjoOw{v zvqDqA+iXwOW!LP$ZH@JndOl2Pzcc$B#({5)YP&$gRHSrg0|> zN;{J({vh2_m2zlP;*aQdoxT>y`ei#xobPG|CcRtUD%V~WR zAEgg+Z0TtbzlnWtp2ssq)yGB)>tiR1dfFy&*lDD}+h(I7$^n^anz&Zs;u6>F6TKz= z*{2f{MkmAe)0@8WO|yfotF9GI^bS~mdPDDjamC~ZIHir0qPH>i>B?>4AulQ|Ox&2J zH$rxCFuCCV0y%#b>eL*)^#O5mC*_7*$2-WjP+T>S*?>3b(OizCDg7KY6!7@h?fom^ zSBKpW+rPbcwoBM6aAdN2M7Rj;w#A^b7;=%D_4l&5UyP8wA-Aec6=IJV2JNU8PlYL|J?UD-ue}<+own#+( zP{vQ03wr8hF6)zbP^(YP4R=5+;bccU{d=tUh0WOw)tL-R>8*zqUB%tu&#I%}N2S_O zq?riRxnb#(CyL$($hwK7o>7U}8%y%#;G8ym9-rqa^74J(1FvAamL`X&4cDOcec?NF zw}aWt31vXLHE5*=0R}oobTD!BKVLG5JT9`X+fvG2JglvYGJ&<^%xof}=fo!WOoJTz zk)7xKLS{?kPXb?+2fWc~rAQUqhjW67ex{$^2JTuP@Oj(YqdhmIef_s5f3|F!HVY}g zm2t6jC6$$qO$k}*n|5P-Acq+}Zujhj_4qOA4SVjaLpeLxVM{aRec^jD4_TFx)dQak zLd7etk3vem3D%lSS@xiLvemXMxv7mH^i&$X@LWjOc8A1_{h&jk%SLZt z>9NyclgyF+&7YfR%UGq4iRb(vFD#12RP6i+D0nd zU!&y{KOI}@65xK-Q==32!j4&rHKw4e3kcc}o5;4i*zueq%S~C8U1b`J7ELc-VB6ej zP2tjvJDe4VFb`5R`=r#8*iP2iD_;kBhDJzVCRqA`6`L%$tRHehbF9U(%oS}i{AO{y z;xqeU&pyQaH@Mx!TgjFVyqb0B7JuFLIQNp$X`hfjfE?%5ql z17w;za?Hpz>jXyvY)4HNx_ z)~8JQqq;&BwvE7-Uq$62H0BPAh}i5_~~sNQPl>;on5fB z3CD2z4Ze-`NIo|Z6k*>3uxck!As;FKi@o=bYC7H8hUc7lMrXzmj$)-+K}A8tgqko8 zDk4HaK$NN?AcP_%w2&~41rd^nh?D>sMF>682`!^QLJN_W&=CRz2q8d7LP+~EXU;SF zeCzr9`__8b`!_4x<+t~~_ult)UH9$ojPCPRq$o`IV~rXQ&0eBPCs28N62jJb1ZT?4 zllmxYxLNk^;$9MHRo~ZIGOlUixx8&LG-JOPE%$lDB$Asa!*ISg>EL~t%vwf2hPEUc_QB!lWvGgS>%h(#GU zJzd%TMwE1@3msU~UOpZ$79M#QfFm+f&(Oc`Zs~N5K2dY}vUs zWBjN>`uZ{0%*#HYL@Ppat|p%qb(*gTp>eMQK#fm9Ky$0KOusHntG({siEXU0j=0h! zk6*lA-Dz>O5H)Tl5P|cWmq_SKhv&S<>*&WR9BGf`Vp1d?VvSnsL)uMtmmJ8qw6neH zw89)cRi_e)UbuPDA(Aru4wAoFuXs1LFc;>zbzy9!8KMlibyI79M@fpwEVbiO#*W08Z5WDUZ;|Yzk z*gdLfRl=ArjhW*<{1&C8l0HQ( zMxh1xX+DBFC0TrK7V6O{oI%t_a_99^!#$0*?j6il%KBd1tI-Jj=O0i0Fj4R|-~U8- z(|GZ|?8x_(KR!epmcG?%S!AZe;J^4sIK?*vVBRS7B7*h-d&UOH9klMnPOzpXr6(uFkX1I=YtleJG_-oh z*e3BtwtBm1V$8^=_%wM^u`qBTINJ)ZO_|RQ|8k35@|CsL{t}=$QgC}}_MApT)p#^1JiLJ=Vot;!B>>sGEq`OvF64T<^f(bW6k5QNQmDI@}nqT>)+XvC0N3g5L zDCBu=xM7e>)}5lhoUEswDw5<+68=qpo^TIx;43wV;ji3qM5*>*x+lIM(?2(JzHn@K z$-*G}UBEkS#Kg^4dCZ1`uOpP$1KG&;0oi*!M(1TPQOu`2)!zXAv~%syeUTKqep$0! zP`D_ykBJOxG`M_bB2?y*zjDH3e95<94f-skZ$K*qh;^22MR(TFTkgu=dvWW!o+QH) z24V}hHsTC?ba?=9;hCD;w;qLzSr-1aq#!NSXxkJsl za@`Jum>AjHaWQ#)l6lj|3ru0&ENvuo-Hb?HTMRp%VB1r+a_5@rJn=WApn9Eq+LC>AdP#OVGN;q#7Zg19tykr~Fg=Q>%PvpX)JPWiJ_eKO7v@5y z9EU0Gp}!7p?&)-rabnfD=USR3J(@pac83`1%{a}q{vP)%awk83nd2oCM^wC)6>TLI zinIl_+B4%!$=iiAL2~FhgQOC%v4+)p&8Fpf{Ta5J!FD6ll;2hf#o>D znhpOMMO_G$R6--vcl$TFrNV|_(++d}V{YU>68-z%1nnBms5j|@*YddSmuTs=?{IGX zU`{dfq%ez?knijTYw8{k>li2!(%Eyvk3qogiHG<3co@e29mn4fMDLt9{tIvag%{2p zf&*B6?{9U^opeh!wJ`LH}sm<_zm1B`*eDA8KH_-7U5Eypc41N&U=1md!KcdT{_2 z)U>6FK6nx?HcgFZ*7u-#(o*Ykm)zNHgD@~~?u!*JtAADb*j^o2Fs`@lRQOn7)-^lF z&X9XQgdN3uF^%HLz7B7(sV%KF18(GjsMmIYq`;~Y@6>JCe(4+STY!OQYKn@w*u?qI zWh68e03eGGvcmfXmjllQ1YX84T}*)G)&|$v*ag_WoVvDc#IZo;Z>U79%EVwG?x?5x zbLAxV#IO(4j+4e3Mc|pIQuz5nHO8=%D`GrfDsOBx)kM`K26$liBwP~x9ld@vd;XOf zr49C6$Gz2^_3ghivEXl1`(yFJbc&B9{(ST@{@#$HW(#)W*Zve6W_V&$o1UZogPD3` z>?_3X8nS#4aQI%0vn=eAawvVyO(;OTI9+JZE|Cme&Y4 zWW0!gehJOPS61K{?4U8+yXApG#udSvxkF!;^j}|=^iQ$XME1A!se>q&zyJPg5cBK2 z&IvdBU-eb9koGLd>A$6#zX??P5;Y$p-pCzm;y&(PIlVWx zMfwuA6il!GPxIj02X(9xrZ*#nir1*Y;Ge8?CcXl={A%;-S8*t*vtUt?r&Yg1FU6dX zhoF@{et4L2Cej@45fAn4C}RUvAQ! zO)w$xyvv)Y1jgh6q?u%yOkHghdhOs!mj|Zhyv}ZgRDh69T}^_>L!+5d@{p^@H66L0 zq>hCPV=SizCgoG7@=h$#4zaWg1|3v!#jIf?)AkSV*sGtQ!&y&#r#6}qun>Z?)XnF+<2NMJ1g00W_(Q0j33a#rGy~X0*r5R@V`y{XweX9D4E82?%1vc z{vlpcM|ct?W0y>SuxN~5`y0 zd0C+PsPx-IW?f=I0FC327E=gRwn1hMPu@^#wBF=Z*-g)!>mb{ZW_W>xRLPqEuqo7I8g8MBkBptSJd!?FEr| zq5<7f-g4&@tj$}hg*qW?FF7i|EJh9Tol)OA4<&cwJ>U=&6oYG1=(LD*h1tbq-H? zy!L9|Ba^7Ow0^*WRO~#X$en(kx~Lz>k!B@rUe35%xn zU+NUzm+r6s2J&p=Wj9N*Ja`?1NN42(@AGR4d z&itHb@jV8&PIJM8nPidvbkVv@xTwNBYbe_`<8t5; zS|YUlmpX^ctasO4kcd6#HXT=JYS@RKLb++!;doM-Z+5^0_Zd{Uhu@r^-KLghOuAD)F&@ zo+oD{WEO4*ByiL36)TIR4~jiH4j6ld0GV%OmQ0ryS{X&z92Jy{%bzHNWCg}69X7Ot zsTOX)CZ9lB#)O?2W97AzbT?@UB>? z|CrQs8G zA2<{sp&uofdAoYTH!d4*b_`5snR=>LY{zZhiN35MoaL-e=zA$|kB>BL`iu@a_2**d zNm54eQH2&sL=3#tAu`1fp}G+%7RP?o!uuRH^Vi@too<9DBvHS0y?9cwSz?k_%UY@c z|ErEd>N@yoD;)CC4;Mu)H5Wxh)0!bqX;UvLip}(r4B5=wbVG_Z9j8A}auck4Rp|qN znh8NehMTy&;(u&$U2rpR`G}vtYzb2HHGo#}>}>UVZx!vyRI}XGxSrd&`k9CPHo8&- z=Wkd1FXNVqVXo9;_!(6kGo{gVQO}AeoRiPt{{3}yEp)+wuqqe zSG?V~=+6*Bvnd+YSGLS+l1LWh9AFsaXuLdSDoS|sYghed+3c^1!lSWC^vmX_W~60A zrARzOU6sKJ31VCX8ThjQSu;zGVC-FE&Ub-4euR;pHJ?ik();tvVldL0u?`SQ(i*?@ zvXP?t)eOJ+@3fganh%vB7uIkt-l>WMcPsUQ+^YPkFiu37_K1qJyLwdc*^u@meLVD} zegZA-$O?ZIl3j89&yOeHAnQ&G+e?yr*k~a+)Ges>CQxTZ1NEj+Ofa^lM(#-|4d1=_#=y37SZs45Pek;w^_yM}cDj zO~N;B)9JmNWx9~3k1*yMEn{1`6GkCVES|HuTdBq@n4ftkAvi&&+Wy$=KC3lkDoPQc zEcG9&)lGh1hg`k8*;9uso^KMT?*B;o(+4(Jg&((**4?8e+X+uxJdsBwtDXB>(_3Ut zn^a}5olz5Vr_BI<(L~EG@zr|K0%~>gJ}U${?YlXes?Xy46Sk8c><&s6TS%Cz1+H+{ zKXZrpEfIUVOdolwX$vb)9sA5bhL|w|AO~C_tgQdlX7suV$X&Vcb>iwG4Rlb}E@dcA zhXUW#p$81B-0y|vs}a$wqtI!MkenArqrwqvi^SBloyNcmR*mwfmT-j z*k>)g{_l=ECM1dw`8YN2!Gmb^GVphbSUCORg7J$P6Qt(}H^@haaqf}2F&_o!uXpxL zJL~MSE79Y;iC&SCQPHA1$;#lm=A1d0C(07ue34*{jZ6lNG(5^)M82;sul=~<8NLpi zuADqA*b9@I;Mp~nrV81^$bA+a$=ENqu>Gp8y3L##iE>)E!A-;&B@ z`enq+`WV6ysOXZ%e)obE5T3|Q2P`6HM%SZF>g)Z86F#M#R~uN>M0T$y7@zyZ13}Jc zj?5is4#W>T<06Go`}U*0sxA`*w!u16=k;XAfB!u|_R6cpBLm}C!S4_KK`Wp*Hv7(^ zB& z#^ira61iA~g7#|jy~aX|;{9v?$1Iyj#~xNyb(88nhnnx4VXT*p#ay7Z_k!kUpdtyO zh6eyQvvNT3G$YOZtnT)yqx$^tWu@>Iz#OAbZ_0Aod}QeI;y;VU^75^SHO8_>`P0Rer)!y*Tz{EZI0SyI8`GejR>N zltD&+bZIueVX(x2S!Hjf)rb4+v~7zoZ8pW6QVyM*7kAX_ECw+s6xGTDYH8e@9G!FX zKwvB`?|@vii84_=vKyle9CkG{NpC5HIot!aeJF*R%NsMgjk~_H%jUfwpBnX*q}QhL z8fW{}Acaj<6N?QKf{@aKQ(Qf-yGeqYV_{2MW&R^3qsN%;USs%hXojwb+)FMkOXk8>qw#!6Nyot zcJmJB?l6}D=ikmSJd(yGovOW?2EBy2ak8jo7-*Qw%-c6CZ6EbTVPmU!uQ*m~4NUF` zZH>SkIRpqPM4c)a0Q9YPeMVObKOuvaAV) z?Di|_ln4(X{FRMb>@=%ocETQzslkX|obE&unmcQilp3%>#`8)}1Bb9J2grHNa$Ao#G zK4rcLy}@R?%8E-<(G`)|(zM`%q#xkwPGuL5Gjn&Tr9V?Os>!t{uCMq|GY+^FkMA9n zX~fX(sBlPh!}yk~)gWn0vl0;_$Qw51iQk^+M~@ORvnfrp@E7Z5y|_}jwCyW5d=#Fy zY;RO7``~PTY!+J(T^7>Iw1qW=q+zp0b(cV@D{<}nn(<8rkw!CjAciD3NA$8n`I|J^ zK}4U-A*#YBy7^7nb(iN)Pz25WwFQi3J+@Wc&z%-^XqP>1gRRLGq*=SI0j*SJRnu*P z585=X?K=v~slpc+_v#R99)x_|BuvO`m^_(zY>qr0|S_-$P%9q^fP@x&sWmXDAz zOR$UWgYyh~T1_pQc`7$0^+4+i-k6Y+5SaJLunv;_yY~TyNb*{0>V-z_rC?9B2E^sD zhAd!YvN)1yxK_m!Wh6W9^^QTe88u8KHI?6T*`-2J_d951Hbo{9+V3c{3Bu7?XS5$; z$9nFD;&zraQ&XlNAAb<)P2kt5xvaeuEAye5l~oH)k@qYpjPOW0ax|8}CTTD3A);R) zjA)Rcgo|U@L8f~8^O7VLJLf1)hUr=dJVR6|XaIO~4r=7sUdNk4n38$GV z&E>Y;jSi9w0!NLz)HP5wDXA%-l%~dRy1v)ZQGFk5pe#%F~)bH6|=^1^tewh7ImUZBk z+ELSO9z9a3*|o_dwtHtk|{e1l&0$tROo8DB!`(U_KZqx`U&g@GUwy_m(j zdX{<1wKa!n-Cey|C)Idh75?=6r(x5(0RZlC23`VdD1!)K_l}OeV*HJsu;A zy{NSj$Hwt5Y`F?Xc==avKKF1V-&_8aI8mqBg6fSegZr18V_g>MLTSMXtd;Qwzzalgo*yHu69%>qJ9!K?j zLNq@;Mj1$5a)Z#4KnQ#=G-wI) zZj;Y6efnYGSj;A}tvhB?34ZlWPYHyc66XZ8BKw=ccRa8tmVP=BevzBLd#^+sZ2467RlHW#2v zY9<&4PX@il`~(qkm2g)z-JGkGCfeF1XXV@+P^^40`UD6a65cW>Dola)(`0cJI|?_} zB1h5j+nvd0nCLf2y2JlC>lboZG`YCZi>P5W+1i9>U4d>{0-wgTRQvbl8uv@KAKuj{ zUq&Vke~#-~i0LYL^{sam?HU!hR99z7F<-KdA9-hXh;^&q6id3u@$Rw>@zRB$4ip-M z1W}SPs$Q7Nu|7Q685BdL!>^H#u`Ai21jP>|!zX>5vFpz}GHL5GngpAb& zylX{KWPi1b{tY1;`#|i3y;JLZFy0(9ifu5Otbe$pA8cs}w66Q3an~u0ML%MBIvr&{ zax>6z%a5N12rET6Vot=fybYELg^QP1t?D+_Xx-#98tebKZt>ulWIJ}$%0ao`!i2Ww z!G>5sNlDM7sY>wDk99GH&^lif_fc7A-TA1E&`+uOTW(2#o?5$f^a4CuCv%BJAYKHk zb?mK*S!LFVz{s+lYsE`H8}_h$>}Q9yXIvN|_pBwmV_HTmZ2G6gY5vPhhBIW{s@z~p zH^*B;a79cRS6$pgUrP}Oy%1ihNm#|xExcS#X;;CH3klw5{KrNF;ir`Pdq*K|`&D4) z?74&!q<)*<_#rOHBr@o!!de`N7b1An@){VJ3=u-m#X-4qaBM6|vO-sU0ofyKPI6<%5h&Lhu2O zOTmM==~GH_cY}(5iBG7h0^Vl453Tfc$Lh@F99XvI^^b1I-|BM!rBw|%&9BE^D`5cF z8A&x0MRm_BeUm*xQnj|%;IV4W_?n9KTU*43w8`8Xez9ky2ZcCvLO*l(9LpvLb5XbD z$%h+rsor>IR5Pw86GzGo;FOZkE%#Dap)ZQHf2?Wlg!my?jcO1dym#uFw;tZPETW%K zVbTlk-kH|xAKxS`!wex)%yrm(P}Ul|dD4$*TU%K&f|KKkVP!hkCOeT2XvvrdrLxZLF|I|T2#|=5szYS zC78?~VjmqDprui)0@McgFoG}aeH5eNj4%?sM^@8*@S{BwFgo$6B*fSG)Fp)F)eN;1 zxVMVYTk~M8bN%(741_Osr5KrVwQ(4}X@9Owa4da0l=rS>i+nl=S2I+OOT4r-QV6|$ z*Zh-d?yAr`m1tMvez{jlF(Vf|w!mEzG&>L6N8EvI!fn8vs`GPZTok#&<} z5FQM#=%BcoL~Nva=PBFfjCQOy$m6ZD7y_ceIrZ*{su48DJqB=mQBgXqn8s*QXMZ2& z4E=h$wl;hC9l(%SS*zPPzg$j6SX2{sF>N#~its7nw~VURf(-q}nlveXMXd|E9Zk1h zf>RAGD;HN63fGB~-H8)VO?0a%lKSdE2nA0AwI`zn_%kDc0>T2lr-@s*9JUlp43c`z z-PUlyT6$5g26>qPmlrpk(5SydyTb)%Wk(=eif6u|o3>Cz=Wv)Xk`3BuGKFZ2$X>@A0-#LaMQ;@rzxKFUcT{8We0Xi+7@_nG1)AMpeN3%?OD3PV z!*TNty4!1Yso$T!XTmc0p2XB?#R+7xW(2=Rxi~YTeL!H#yBMqvPlBjaID(Cx6kz6_ zp(u>G5YNbHig*X`Zpi_SM=xvrr#+m~wD~FFBS<)&H!IYN9nERPyp+l}^HvU2$}0i= z)YftP*>CN%r#3fG)>E&#P&VLK_cYe$!SF`_(^HLItse_pNwxR$u zOnjn8p6)+fLRfphn-bWw&Ze(DKUW|y63^9Vv>(Uy7tG{ky}lcFfb%}Y?iEQpGR58I z2+~>l!(h}QUk_ixL%r=Ee=afN>IypnZ~1dg7vr}9Mkt#<8&%o84I9h5ySu_P%&x7$ ze6ld{*=TE~Zg_DE=^Axtt#qd9p>0ECpaz*?bs0Bk@wwCnV5a_HT@U8dn9awM2}i{i zr}}1ZUQyeJWD(ZQL`Q=RWiFw1%+dIu_#)}+MN_LEny1_+gG!eruB2WUO&8e#xZhH- z2PwX5(N|%8#cPKvrY3wh*Zt;34k;|Issa1lzxPA^ z1%b_oeU6$Bx+m`=cB-B{9Qz`>=7s{AXNAsrmX?@5N=Q4ZCJ&f&=j>_B_sX3x)&9kA zJVX*~X;L>C)rLN(RtnkW6As2N@l7ea^DM5187zG=I5|jpnY+2Xn^D|4GWnX253I@Z zq1|b{=}c)?&QY_hJOfI~h^8ByhNBv;_B?HFZ0Ls#tP}C*#_}^XA<=yVFvq{maOV_; zvU$%?(Aql#;YVHyog$;x0>^GKCOfi&9HBexR-A&Ub7k6NpGF-Q$^%ORMvHzh!xwv? zP!#f%NR5y7CZoITT9Z*gzqMx_4~wR+pi?V`Uc!PmS}X@M9is+n(?aLm=!a);2n`s$ z){I~9p4lLK4rV_}PS3@40C(inuAIWzx&zlo23rdU=$ z4!Wt5xW{qvQJ)DHGdV?WTVcdn0Eo0-y|`%*-`r~d5pG1!P3M7Hjw0+W3n# zWtl1U1u&&KMN>`l1nhdr8K9zMv;FX!idK=?e7n3?A&kQ5QuoCMH7`XEGMhC#I7!r` zoR7Ih8EqAz{<`3!#HZI=ij5aXD`8m(%{@^-Bi~Av)5#8UW#D4F{Tr0S__zAA7F8{V&<>?ArV>{ zF|r8nTYfqE9*<(Vqh3MbjmVv;k&!^EyOuU5xx?65*z~w49&-oN3tWWW(YCNIy|Y_o z`z@VRnWDxmX|%m-N`D&fxzB5$o<2r6d2aYtj!k<(XfUC%)+3bcdNTCN6#QgF#}C@C zO@mV|qhINZv~Kt}^J={Bvf8eW^og^SGi#bB@0Ii&?F0DarWI#}1>Rr`88bR7E{`dA zEK3=il(5of#4C{XJ=>TVP1e%z)t=GI8g&evhVb^y6a%13>}>S7@M60qg@7tj_93ZY zA16Zi%lKuWP)Z!##cbGSg^1CDK5CBN$y_)8wDx{04QCix&~zhoF|*3HZJaSZTV7mN z)D#l|)27eHE(L0E-t&#ib@{BJ$9)>ooDvYs_EjjbLXGn*!vF!kX?A7+Xy;|A65A}! zzTL@sSo-FrVGYL7&oa<-j#rxqxV1Fg9ZC~SyWby70lO>-djrguJ~7@tE@zCe#V^>w zy-wM)O}R^PCwbek_;LrkxZ_tb-s${HRE$&0<${?KX@uY^1@5ImQn^mqFbqx!4eS{^ zplMLoRTG7{vLMk#Y|{t-ppkGQ4BY^18+WF?3zNsj>EREm9L?N;Wt!JjLfC;@RTpeg zve%|Vd_#ILcxCVrnIP=aF@%f^mTDzcxwz^EIS~hC$4=oIL>y3(ejZq-w)N(#3sEJn z#emw&0aMk%20&&Wd9u;2c)Sp?9PO+Ce^mNjOP*)|tA}|+w{-Fx7PMY4L!~`j1JU7w(r5GG z<>P}>qVQV*+rN2T)yf#(_$hp82cyZW%xl~7(ZzJL@oys^g6g$!OU>D;4VDw&!+fFB` zU%pM=O)V(tj@hg2d|v<#kK}u?3AffHo9i*CpDk)NVjLw)y)(v zA7c#}>E?IeTv=uV(&zP;HATp#CBNnM)5YL41zqL={&&$1cvmbkA$2m`V_jMGyoD%E zwEA!647a?Sj2k|Knt~v0TK3s8O+b+nH_US!8^S?~nPI^J{b+)XC1ZJR=^5{$VcmI@ zPx!5c4#A?RWA0_n-A4&`_^eY67Pmftp!*dpAgqH_q&fMoZ+})%FpT!wAvL|2(t4<% z%kM{3l7dF0`$_TybO%LhU5rnUTbzW<`4W2el1R&ck$AY}Ndwi+I5J1A*e)DERm&<; z1H`N0&PGN+`%u0^ZJhl6>A1HhBcG^i5vzVU{ks3{3T+}LH0xdSv!}&UUeBWqYCmy4 zjRDl~;Z->gB6E7)fN+tZ}V`?}>@CA8W?)fvee*KUBn}SsS^SE!o?h$)i3kcw{ zk-tpouIzF3SbbW9odV5P3(7@DB+ql_{@2^%k{A8SWeRBAn*i0?8}nI;K2tqCZk-Mc zZe}E5NdwgJb!*={A#&?Gin0HP#^c{(U%qO2L!Nk#WfrbO4zB`e2vrMx%YrA-@N@-? z9}^!aOC_Z#AxifX?W8B!Q{uauz<7b^`d4VnZ~ne+{F4B7$m9pB?f*t*uA?gzBE44A zpFbb!a>(9!cwC8+uzmVI^+Sh=hd0<}SviV1OT0bbOWmCm5nK@cCyaBu+lj6qjv=L% z(;>EnJZS~veV$XztiYK#T7q%y_@&4Stc-w7W^;6UbRPj_?C zR&{53(sm!vkpSY~33+qUb=+dvLaf3}ti z_8Z0qK10ZkUqdv>+R?ptMBlZB`c;{L7qHLLdEHu4neObxwhC|?MF;}rsZgR%92cHB&gHHK!#(6B_fVuuHTro)rwfjSlD#0&&`MErd;ojxe$|1p*@)<5`dBorcHG2-U`V5x|`_ zpgB;H63z~{O*UH6c_VrDHY|WGEa?@!@P^XzcI|Dob1_6~?_;j@>0wm}+qSF5*cR3c zV6L7%SwzD8>+Iyng>XyJG(9m&FU>oa_Bywklt?Nzu{E1gVdYqASrkFYb;1urjAzql zT}CHGVMlm(QiErXaxyTa+m0ZI>K}SzOfn5S4BB2`FyMb2u8X zvH_s=Gt!Q60jh7A`GF65k2^vy#mDNshr)qF2F~JLnd#t!NBzMVNt^?DV2KFDjuVh1 zHHVr{=+Nxpxu%@d8`-aRIuuJUp*E08yfVvP5xrq$iRn41h^cm86PUL1=Fd$xnK*@j z*Rj8?!H}!zA*ULQOqgorE4Il+Uk(g3Vs;2aw3~AfQy0lijT*pg7E!leZ5)oA(N45=ZMO48CRwpLwIY&x;U#( zDn*>YJ5)G}&-s!1&h%nNF>j$xA@s}Jrn0Jo0+({uqIl!4Twn10S^II6wU*oj(D+u$ zTB-?0sK)X`v?6P7lr@Wfoz!o>K}-!T5ms%;7H%dnVk}HF6TvlH8?-Vd2XSiOlWMs! zqk`0^RUfmc-Gx)pSsTaUhl?aj_CO!34?4gtPFg{iQSxFPu8`j)Mi_dM;za^83R(t9`3Krb?QA69((U}k9(Og zvgxV7!i-pv-7YlOn;Ay2$FDw@nF^ax0twg}^VvC^mahE{(T>ct z^uW_)SI~(gZsgLtjvA(Ru*rh;{`QNagBV-)vGv@Kh34QIzr9x0F54rKb9o0aPBGoc z#H}0feOhxdZ)O4*;3y%iwzeRhcT8EtPQcEDNNs1?1 zj|i(nw9j2nsPj{;gR1t3bcDE?_BXMH_a;wY>c?7&v~Qi;ZwAW!6uzzo;e4u$HUUF( za^+zd;+iV7ieDip>RIE9;MO_V_KqIM(9pPROpja;eEYZ&4d|(fMy1&zuQ{3ft+Pj0 z1|O*D%R!w9$kS4H@Xo$5?eGBTp}gf)!6G_m)1byQjZlsW!%&0jPNR#|p+gC&l&11A zO48KZhMt833{!mA8R0;UF6WbJP?MVhOpsG!AzfZnXz5iH3$e*QzJ_Y4xij*|Bz%W$ zEu`Fle|-ceu;;(y!)0gycUVuz3m94;Ky??F$soB$&e58d>WiD7$xc;kag=>T(*DNZ z(s_H*-|7;u6%_>@R;RSpX4~*|?v_z1?r~%AIel_VK)H8(WnMm{3|Dj~4_*%Jk2aJ0 z5>DMfYC6f9jHx2S&zKli&#xmiYRhr&h#-!=w_yyn#!s z*_tMQ0@YC?C0?^gf<3C9`t`hUU6LA->>Ct%Hl(z;8GaCW2G~(iG)!$?8wk0lvV%F- zWH4xokf(aYJQtGt6T`Cz%ex-YDFMMcrb?i2090yyKI{}vU)p5>2d1r=TK$ty@E8mg zc3dm-CA*Jp?j+<$I-=`q8(9y3e{Pjmd*qRIS?v9h4KBDkd_N zi%6xy4V|2FIa$lbqh!}X6-Gg&og&G{_0)MMjZf7aPrZ9v(0z`KD9x-TsOs$3=tNJ~ ztC6Z}r^beXZN+r1SZ5t8+}+U7zG8~q-*_YUXjM4ezs*izNz;<+GRvL%R+mkEV4RHR zK)q$QQa+{3ONAHEWR(j)3e-yT`o)Xmcx>btt8ON@FbpuNfJ#)Xa&A-{K-wADvB~a5 zTacdwrl#NJflRr<(oI2SU%2DQk(%1 zrK-RiL~eUYx(SG{s#f*E#Rr=AdJl`;i0js*X~M4!ALai9TW+T*tZX^3t=ekqg@nWC zWh_cOy(O;M*D3bm-mPb~6S!2^Gt&ciIph+78{y1#PRbhlI=NvzG?n-BeDivKs`=z9 z$!Z8$R1+zhcsda%=I(H%fzIwoxQ(dC90Q)=sJ&cdN-9S7V3weWf)SZ3^7-N4y8ZnWL}Sn+ zeG=io`S!KewPexaK*L>Sw{J768E5g%emQzNXitxwEe$b?fo$dA`;F~o+bg^Plcl>H zv`*~$G>J3-F@a+{@}?b4XwAHE;nZ4$e!&N zV4UKK7yZe+y#<+*U*WLa^(5xUK$f0r{9%?Swd_G02MvJImyL`(#m6$%T!si)>=6xz zHEu*cJS?iT?Fd3EHm{baiK@8Bb;~l^`zX2ef({1N#P1;kQfEHZGR)-po@V8O?8G`( z_OLbuWcK5^%e-ssBBuSi2aSeQ5^O=OdZ&aDrRC|GwA@lsjY@ren;csAj)QUsjSdtQP zzOjmo-jh!b9)0~I&$pT}O*&jzQ6U~#8;vpo`c@rR_XXj*qPwBc^$nFnm5urHsbA zBT;hK7b@zPY^@=1PI+H%tOeW6c8pA~^pD>^ubpENmX{sxQ8!fY$bQt-G`Tgvbgvsk z)<}uu{Fb30WDE}6$|2=SQCvw{A@@=m{95~| z6bh`o7-5Pn&MrI_TOC%033^vjS=AQ(eqg?%w~m=Yja#s1yCFM`@g@n=3mu-^q=~X1 z1!8=~nKK}An1hZAuVtmLSUK`{6>YGF(fk+WlF@(h${;K3*E{KgCgB2hbgZp_?nVI< zATg@@(=twoG1n#*d6yj5k@fW}Hn|kztgXmGXntu5u_IhN;-1>QWGBwBsXieARU{QZsW`obDDYQ!+Izw~~|;kra0X=bk3b zJu`Dbq%wDf)KF28DHn19a>bn#6%myX1(C%s&GNbX;lBTa@AXUi=<)EnuJ_}d_jTUq zoY(V|kLNZQuT}A+n0t=tZ{Ka4XsIya9+;!eN`qS5!bboUJbpz~# zb0bj5p;s%sOxZQ|!!tu|y1rZ&c5{VQb#{tRvP0Ng2)VXQ9UtD6Q|fN_HjNe^=sEvk z?W8dObz5~Gc=|r;ne6%6eJRZ}r`ZgISsEmKsROLXoONxZEvqOpTR;3M&-sJy1X+cl zYTC?>)6l<3Nw-=LN`7XN#2gAMlZ=8-Hrx=9eY(eWS6q@OuS5^{V+fESv1HjMFTA{87i=5CboC*ug;joO*A*a@^mufUYrSa9nb*!d%bi+RjqQz&+%CMB(Lr7p)4xFlaPR zgM5a()THg>g}4o_0y2DUhejj2P{#h#FGNP{mL_H?T_vFPQYKK*7?s>KqRP3fZtk88V*Pg{mBRp{}}O%V|f6K9eWUkd3& z!voqg?kxt7L9T#nle5Eb>arc}YWLM(piE;^w;_gsEeFw!hTq=N_-JQ`t!DkUXBa1+ z7@J|ENSKl62E0-&ODVB7`%F{$RM_$M?nKg>k0LD(p?TM#erz;YCBA}Yhsj~P;)-l( zZYB_EZpk-Yh;>oYe#f_(m<3av&SPn z74qIQQiq|-c#1b>wA}6SRGcfqE2$Dyidt6F1!LNFT7TPx78gyl;6l2|Lg{XL?FMd$ zLhPse=uzelx>2q*&rEhap9DvqG^uY<9+5W9c)EM2!oyEcSTS%Fd?3Y7Ra2Fq?PTIK z+n$)nuV|^`jJxn6k2F4iI6>m|C!Yd{`UPIqin`#3Xm{Gb+d`Rj>ni)LSi#rlqE%I9ktQ4;fm z7`G##x_RV3Fj5DPTO`>^zlLGh5>AX@1`CpX#44bLX zzRNt)|7=ks+s2XA-;2@cb*5fnwVo~F+!`rLJEq~g<2AICd|$$MvH?<#ZB))(2sL(_ z&kK@Y@<_p3#_7fPnhsuf6rvB7*f{h{g`ey3Tyfd0Ds=1Li=+6L{qR3~Q&6%Wm3c|^ zy6Gub!Hp;CX~iJ{y>-JK;MXrDGaq^~+f0ndl#gzX6TRT|i}{P?>{*~-Na+zt-gqJK zjtZs1M78DEKx|1b`VIUV%k5RrfyWUC35>7qmA~&lIsB1*_O@cKLTd)d7|qXAFLh)) zZ*H66%)#tMORT~=6%Dhv67{Ok9xU6`!BwiW+8vEP8^_8w@~=6>yuWC=<}qsOXgd6r z1v-9B1Wy*gf`LVApNop$?yQ^M;jxCR@ox?L<4{UJ# zIUE3T^#0?U*Uo|mb8LCns6GeSiF0_3IFrqT0C6`qa_j#s#xMGR>2JNB*L$llku#jn z?|^{alW^wXg9osukSPWrLZPBBLQgdrT0n%CCy{Hs_dZBj+2?_N=Z>c3x|g}5JLwrz zvOx5f>f=LBg4c?;t8=5jeXVr`{jY--HMVp}8=q2J7=leM*C7jHI%a8o~bbsHu? z(kFJrt(O=Xh-`Mt=NHiOn0tnPh-byGp=ss*P`kh#TBBS21GOsrUqPoYt>ib{H2D{_ zP;~mBCWp6NrIC@g{9%d3D%UI50|Z)G1!I59oO)3b*P@3Rt`wuEOV->%f=%PPJ#$N> zmK{O8SY+CaEf$($W5My(MXTiNz*9nszSVr!IPmKwauE7 zvaCp{VzmLENe?!|VL``Mrl}92Hl3&5Y1FqiO|HiwjbpjVjMjHZv-hnCIR~rN!e`+xJed>%3 z$hPF{g|$ferMCQ#0B8l&)9i}F{b~byKXNrGa4R=Hi0)5izNICm-g_nX@J@#anj0v6 zbFjl^m`9qUJ2W14=)U^OLTP`+8Ijiu#2cdb?~uSpu;%4-V0YDL-ZH6i8TcJJ+DckE zvbsD&Rcj>^|CYe>GMf1->8*u6lF;>TC3)BlEpbJ{`-=L4$neF7i-)CGKGl9QOa1Cb z2F8CGhefnP=llEMgU>{@_l6UEi;;(Oyh|$)Q8NN?V!!2#fU3HA0$MKT)ZzY_)bxi{?GN-*07x4tgaJft_I(Y8`NsXvaH#3w%KCZ6`*(H)%FJ+bKO=kmds4lAu zi~mUQ2~CaBk#Va>V?UoXjMpZ}7gv(aS|vQ2Z7MD9-ef@^@cnt8#@#5^k>0sV*6noy zaPoU>)FSUaecv$Ivk@pq@t+&lp`w>4^aOmY+_vG1TzHC(v}_LL7FQsuYLY)nZML6{ z`)a{X{k2}_qD36-cptJTFly5+PJJ>=fu~@nn!P`1s2hDqdd^d#l)i>fmXZSIS_FzZ z>%YIqe>XXzR)q-ssPr_oY3)XoGz0v8GiH;Z;K-D`H$$z|-Olv8FK^Kd25h)QG3~x+ zasS{y zhPQ~qIE9~#nS{<2TzdKi!SLU-x=c(~eJi~nN=HH6z{fw7w5ZAJ?NE(VSf>JryhTe3 z^=UNLSy;q=51T;fFBnlL#-*fv%Nw6#Ste%pc{1 z`9rFICAouXs+QSw#)*{s!}{#)w_sccA1vG{*-8kSlFqIYWT)!RD%q&0YN z21I?X1^(6qkltJGS=7Zc41L7XE&qX0{Kw(H`R4CX5_f$vS~&6`iaGdsG9hmI?7z(J z%jFa`g;S8LbDM?RNtEYkG7PopFE*xQkp|X+=eA(xOjoPV0}WzH#z~6Lga2W!UPaBC zEs|O8)Tb8h-zXK;JM+jwpoL+^MFm`^^$0dyf?1#g$O_MiInw+EQxK^YZPCo4jR2#k zZEdH&5F8kr0<#GP@8s*pmZbd|F}a-}$4bi{d@{XTf+ib!T5MBNKyWZ{&A#L25GroO;3Xv5E%HG{pQ&y0sNGpFd}&0^yg=1Qa?fcxb(wkV;}vKC~|SGV~; z_QA=lJ}L4lRI&CvAV6~x{)N)BQfCX$C5jP$;6Ws;8wIkv>uU`P8?^+ft}F}a z9X2>SZ36`du`^CQ%S_-|uQ0w~9jxVMKHJF~60`CD^;&wiDsEcML+b_;*xw|!p(avc zVO24+d&(HwpuQaQN&NY#72t@1>+lC3#!bO>z$YYV-ybnQ21|e;jc}44cu6e`I0Lpt z8cEmAW8vsV^an=Ey4uvB2feA0apJ3&{O0eqjC4e)x5UiqDj-bF)knY3!1S1pBzBCr zckn$xZTtbsA z(%70cD)u)QSFC{1+Oa5(Zi>R?Wp3W#9R}Isu?vl3!xI+@NFh`OR_VXG9{h$pNboKJ zpP&-EoG@k2j5dm`&BS|sfgG_E9~Tm%m1n(iwU#L9D>PF8$dHE8UXbA<4@2_4VCj-d zs~h$yd{WsKDV0niMP5523T5{<|G8F5x?lV))mv(yKniulgZcDzcGsWD|3=T1kk?dsn@^oa@`(LxGD?W-GA zp9{%Io!HNrjMj;0+28|_9cx4J+y$t$XH30uGqPD$d)&A zL`y&$`~SA?$){8Yr5EdtZLZSBrWA?*O`M$Pwi5ZRt&|7^U$HF#eQ}g2tUP2{`@72j z+9r0mTS1==O}J#Ol9yGI!&f4-4}L#V_wCa^*$GE7j`Phu zt}%c#x{G75c0%jJ!Uyb{h#%9Gm0NH1y{2JYwv?=}4=)@O*U8|0$JiE_Lg#7&VV7Ve zmGYt@b1HvKSphueEr!pfy`*Q2z!BO`jP)frju1(~limn|t{)-lm=Tr1UaU0`OhG|s zJg&8c=clL52C?$UAvVy*u-eU_vqLi$*6B-qYbJxQGwTlxl_ZHQ20xWybLp2S>je{+ zw+*Jm&Bbihdu@brRP;Is<-|aQs2~<;nJ)R=VrC|Gk`3!1ib=a>SqDHJgip-@)|qFQ z&w~tPV9c=;`o+k{L&j?s`HaYMv(mq+pf%SN^zg{bb?2MTRcLKEUi65hJ|*gRZAm2s zU=L2bGxMra+H)UHVIIfIQWwi;7^`KG>By&8I{!_`Dei#9Y%`|?8QVN)ZV*%Z#*OjY zlB^F5zV(#8{ez6y;^f6Qd2F`m;fuROyMEq-K2^7X6gJzYbLUNQ?UA2i;&xlCtYoAS zdD^rMz~wip494<-EhM$^^H3PA;#bpM01_ z*8Z*`y(n(}WgH8U;n&sQZfE@4{+(xP{>zT~f>!9DBC>#c{q*n!b*;+aHX(6u@5urLXqG7b&USo z*5@xJwIS!bH+k~G2KYk)5Y3ih;uoNAk zz5OoG)O)lFIuAN3y9wLc^YGtE0Tv>tNgY_JSa@2707o!-Rn-3o2` zP@BCyq!RU}Pi&in7+DK6)CITZxP8!Ea`!MzB-M?iW#@!z3`a!~ohYxuP{(Z!)Z$rq z(I-nSE~NP&{cK?SGA4Xj-I@4tK5A@Z7pOoPAOFuTN>CgE*TH8l4odWw7#5F9b2J}; zR0ToI(|~1gdU}i*o|RIT9n#nfT4+umoA=;*j26W%!B2^t#S65oB|T9u(bb#y>M^0SQ!r)yt*TWx7q3I)k5S#Dm}PUNh+@l?t6$ve9E9Svi8YK5=>K zA0v)!#4LFilWusTLxw^w&$};}ANSa5gGn>Cu0NWG${Xd1!r?Wah=lz9QIVGBmW=Lr z{YM5uqT`Z#dM6Nt2|8W38m-}dTjLcBY#mw5(r54cf)XdBmEkU88~sVv!{)bETV|Vk zEv1&i)g(|AJnrKW;c3DPucz#WHE5nCAkp9wb;HyszsBJs?-=BrcfDyUXy}mgI%-cW zW*f$h&|;;VX62FIa+_Vg?v*wu(U@4tA35t&wXsW5D!7Wt-pF?enLO&#)o~oX$Qib> za$C%-e^RFx_hSptlFZ`2t#76vb;zdbnaJR8ezZ(ji^eYh_S#v1?Z9=WbU_f6^=gSGhZ(x4iA7mvE z&l#-7m)?tf+Hx~F^yAD#8zOW6)fkU(&x_X^_bW4S-r0OI4x!49mDLjqqWuqsW`9Jb zo901S&uX_^$+i)_+NtAaDJ-6BYM2q}SCL#(nnjq7h`Y{NqDuRj+ase%sV{4Z>Lw`q z&;?(bnF#;~D*%>s9l7>be(qkbVyxowlOQF*uAk;%dAahtj^jasRA4jB%Y2Ujp*y`xA?*&LA6%N~j7H9@ko@a)@<4Wvx2y#eS76lU4{QJ1HO!5}vxf zd$M(uR(E&2!w~ma1uGtW+OQLlC!P-HJEhpI7?mkHeAAsV_MCduuCx4wp_`KJeo(KF zQ!NKpa+3&t20}m2j!7%E_>i^Jc|%D`Yh$|nL!`}Hwr_Qw6$CST7w@~pf?S+98Hl{` zYlBJUXn^6yzr8zte##oFO#dzMp!R^ho&D$(xa=s_;3*yI?4lar@Cp=fM@JP1Ld^ zk5yyR8^XO6vx}qW8I>S%iXE8!d2|`WfHVyy^L1Uh#%cZbW zO*XUYN`8@jBUE5xM{8gGnTP^5Ev&g)>O`t~`I@#|};YqVT?_{k_i(N?NUnC8=JL7>wvC;VB%MXC5KURo8&- z%Gs~WvP{*%cckN#?Jz_18Zg;=3>;1&mP9iHq3NZ_p4*7jgHRiFpnH z%#Gbv#W&@b?Pr7f96gwIS{l`65wjrQBM0on3SDg9L{3=jbo1PImkU>q#nq(UW6x(# zI1eJ!vhP~6`_i^=Hu8Ii40PT{5IP1N(ozSRr2Fl~hpUXj^K-{erVW@F&3fb=?pTs` zDSO!J3_UpUS8?lok^XbyZ7Naus8{*4-Gp!gY5xh}cq8+wC+&J`8#@w)t1HT%qR6l z)$4Er+wMM1Tqh!E9o~2+qY7z2zADXPD2=nHI4z3=CuR|z2JMZo)8zQ{JSW&gx|V0@ z2XcCVuZ;?XrIX`&*Mff3Sq{I}_smELXYDn`4@KzmqSGqq)nrOPXwEI77&)Mxsb)wE z)V7HenD@-S^wOTx($lSi9t&SKedE)1C%D<)pdbyar@RwcOJEN_?U0z%3Sm#S_&pru z1rcsap0BR4;A_*1Zd2mIHQJzEdcGN26-c>PkmPU^ELlJE45|~q&189)Q{@x|IU49m z@y~!Jvlc!rhWzotxkjROI4w^N#Axy6bi9J4;OVK67ehS~4)xYE)%pl2QYmF3yzxSiVL+$tubMZ81L>L@uUq@-(sdg zn*f2@Nd=+DtHxd^t4B3@dAJlnHYxBD2U2#*#MY2S5zv-RZWtW~SC@bNygBle`YqCaNwgT^Q}@ z+8qCkI8lE9I`%AG9pb#ik`nIt@>105cjJTSgsVfP(FK^~(20zpu$Vq6KgQxIw92>U z+xM3Oy4Pz7l$k&s145h*F4*gXO&?t*=df2ex69(LWoV;+Ff>dY8Go%;xK!KXn&W=k zs@eUu1$zCT4qsJct%jBAc1NENW{x+ZKP^(pPhg82AJ?@r!FT4KGZfu{1yypnI!{MC zJxL=P3XA#vI;1Cca!?PpYAg_(k6(r5aILL>@LEd9d=w%OCVm)q1DN_&L9fO%Sb$SI!Bi#Q-0K7!1T7#D2yP8)LRqoo@p!bQ)5<{XHoy>vJRCEQ)wWWPeboO{s{=O2f0%cdHaNhsWkE|{q2LF z7OR`LR(fr7R!hbea=;WN4)=jqmYl(VA{jE(`3S&!%j%Xh6t*huWxuJ-sq72el1y_K#Gv!#B zL!E=-0OYZ{v%gQB0MsR=Q=20#&LFNbr8znm@>ACPxp}2wDyS6k2Y8D7RBI!3#dXPW zy0pD)>KI&cRy&SAUkk7h-(XZLAFxG0oz4oFr4q+gi!xbm0qnXYJG^V?#L$`N|1dEv zq!27}4=xjT^lUn)anxSwIKw#hJg^|!)~No&Joj08yDrgj*_Co_$UVHp|E*7^ zQCKP4?kTzOUo6Ctx%WVZqiRAR^F#q@-b9?!*&YSxHm9E+&Xn%vb7T%IXOxwR(Z&qr za(jD4+2fS%&+wXKRT@E8Ee2cad<*X{S}f>a*4WxN8YJ1;ax65~3SDDvwCp|i#mt>s ze*Y`){pU>TadaU`Zw`$`?$1#1ojiZb(sbdCWL_f(sp=@0 zUJZDm$k%M``cbxB>@+L`hs6erm_f;R#J!5NJ8lJ~- z_i$8|?5Pb&P0B?qAHAAiGIzx$OC@tPq?TU+w<@Y(3T8@0RsGq%A3f*W3}10uvBo#B z$w!<)iH{%-PVjuV6U{hK> zwMN%oa_=7qU)EXV?M6kh#O^$B)X0dLdn=I8k>_ki009g99*pS zTDN6Yt}V=qxu?MPHcydsPic9+7UR%sJUTs})0ugJs~(_P?~ZlJFOM-{xsopRRhQ+N zK+2m-Lp0GB>o7*R1K{*olRHaSb7Iz}ONGx7uL)}?gIjjC^}EwiKJ={wMl*IYKQ;6) z^bMgf_QB~0Mz!N>B!Z+PRDI@I!du8R4F?SKLeon}b1Hy_lU#M@g9u#uJZh4iKC87VsX-kytm<| z?_63IWX{qa;!jS3>>h^!v7vZbxko(H=2^u%AoL3KIjYTtJ|lR1l#Iad1-G0NJL9WB z6XuZv%@#JasK}r<{cT0UbHlHu2QxdCw0^yavQP2$P#Lt;G@eb!gMc8=8diXKobVIp z{vxI<{AzP!?pS{nVFqkwh_8>(v8g2rL!DR)z#N-mj<4b7nai)b-MEryw8`!aK(x_S z%2rJ3s6Bj9i&Nl|7EW}en-*+l_y_%%Y9m2zm=rA4=scJB2Y&2u98k{x3)b+5d7G@9 zj~6`ghu!CYdt>tG;LbC&YbvTM-yY%a*RrIxUNT{(+0}TV0n!UAvAj!@ocY)%h$z4Z z{>;NZwzd0l4T08@(iZWHLvfDxyjnfkhuk<KnyOnI|O&~k6xrAlVvJ-ZYV z^84p1-hLQoHD8BGd!36fT9S`&S7Zfg1i$D-U69UFl5IMZY;J@v)H17HX%W;Psj^Ap z_f{L50NhRn(AR%4(Drvevi`B4BK}0nNW=kW-Hzv7%nNSX(=RqAUtS<&>x`LJ!UoVO ziM?((NJQ*F*@D##svF_ianlbmdGE*KdL!js{CiC`?K8*lW+o*;gMuPC$9#`X-?O0P zH-z$+Ln5hOG55sSi$IIn(Yc#AL-xiUaGISBVE!$UAXtjJz+j!VjNk2yAlc}L*UG80 zzb7LtpW}A-;Vw_wt3PF5VLISKE8nJNh-1ox74xCT=4MRZf5B_3uzla$a=g}K=@AQO z!J3i2#&;-P+;^s`t-mFK*!F~$+>*y-AsWt_Kurxoq?RfIYk^Zv+bk*j_hN0; z#Q-}kJj*;7j*HlbS3ERp2V@uX8Lo z>1_k6Y?`@I462-!2EH$OoM}ix9n}VgvrP05VY_BIBC2hp?r#Yn7f+x>QEZtOV zTW)F8_&A%mF4nAl1O98?$Cv4gbyr(n7NPIy3ggFY9?!&`8_MgSSl!^S7-mqnTq2uJ zTBoP=Y@wdUX)AY_IOVDQ!)A6)A#y-Jhy(F1+L-T=%)XR9ILtt6Aftc2iaoeL{6yBW zbUCZ~nAt)+k#-)}>pGXhEiyz?s>XDYU3YT~wTDxvzph*#Os+O@UaW=GLM=ZWR(1kz zWdG8&)ywTl3}zHak5B7Ve0Fvt3M*)E9?%M$c&K=Se?r)yVraNU99v_=hs3_oO~e+=oLTaP!u);g(`PHM)%^`bv?^vfy0uL0X%;#z}}tKAq+_E&^Xrn<`A z!(!7MttEwIUs@Qc9oe)$>z0nZ7wpCMUWU^0ZNBR#s2MT7zoo74yt$t@`ua!kPe*uu zi+SaQ$1D1YiQF(!%9{T*&b+Yc7X(HfA9_QQ8!*>7pg1|lv#yYZ=U*-iT1Q%lBLq4_ z3=#ODrS{HZ*6^R%g{f1WOdv z5>$Y1dy;;RcuTtoS>Dw8JV{Dp4Ef zIYDm)NwkpkU(2+04Tg06Jn}tAyho8MP`bB<0n$Irh9{8W|BNeK9*yJLgSfwx6FH*~)?3js%GW-(T_bi3Gp zEjeaPM)pP7YK%qmylJW^yEn?~NE+&^35{0YQGL`DZ6lKJVEg{5Xk|@;uNm5^zP1e@ zJZJy9y^%5N&s%4c?o0piwsiBFcB+r!VeNvgJ0M0pM4g?s;M{#_L2k0*kLQujxaI3| z|IK7CD*dOa>wm$wzyGRY`L~XriFx{k89~$?KQhZow-iLU2cwLnavSX*d|Egu+oJg| zRURQwyyU5i;2r0z|68rA$@ys>xh7;IY<-1S_2%2yA3CX@>_6#-em$k(KfM6XzG$*j zpKgHRJKcK$^26}|_NQlmwGj@wbif9Z$*%pKF#rVJhwfZr&^m8>2{ zoRqxp>^*00{x~%3M+H_q{$VTYL6gSVcM-kCdNm}Y=WNQCPRw02*P^MjM$f}*(a#z* zweUrub*-^D;QQWpcZYM|U=He+Qw2otQ&pH`Tf3>12LRENFfAZsM$D|J`~A;3p(Myl zdOH;tIc6DIf>$jeMl8vZ>!EOfs4zSOQd4fXX`RV<0Viuwy-(7*{29YusI3k}%UYxb zt)HG^FXYp6JB)Lq0IS^KZIK%z^@Po6YoFk;dS7^>8OB4#w&X5HV)B!hcP@y|JXmJ< zxZAKpg zM=9MNfPGxbz@XTh&Rea8K{f>quv7e{#gK+4lFF)N>4xJRgu2cshtm(_Zx=A=a8%u5 z!)NyIuAxTN-l}j$Qh9JQV&fk}(a^?zy6V_ppJA(G8<{wHiC2j_{-VMh?Lh;kR|?H7 zLyy!cV5Q|Yg{3x*y;8zPO^-<&HOjVRKJSl(*wPev-fQ#xU@qvkY&uBfTa&5c8~Nf& z15K&VB4Y91Ysxd>76SJC&A{0d*qgep+d-r)5#HCT#&dmy7>QxJzrYA-FgXGdiYL1b z`?9xh7BTa1uGx>_Wo7vu$g0k@u>Ii`2x5y41`1=3kH(~m6?P$?6+g;nJC0{BWlopE zb0J5D(uWX}ywv4C7vnQL5e80gjaXP{7R2S2!ecWOczDw}dP%Z{n!${gxs2NYUDLJJ3TwP#lqqb)9iCqb_i z%6zhzKyc#RpT8))S$Cx|BQ0*>^7zk!ovta-WOs`Ucn9G&SoBl>ed{#%Dzy@IdVn<> zj~wUBrmsVL#0qABpv zF@uhz3E9J9&k`ig_ppc;YrZ@^l~?R*O~QJZ`TeZPFuL6MDvcHFsKrf7+&CrgLQ-2_ zjTF)=wCm4K%%E0cM~>2tP|c4^GWTomkri0Roe7g$3;>%EK&F${Z`>KBJEA zvZF}T&s)vvB^m4NTd)9}uVybc8wJX9&O7@I!D9=cdJ{27e0_AzW3S1kjCunG(Uisa)a{!5S6>O_ zGTV^Smx@=_aQ3-aPXvTfl)O5$93++JE96OTqAbB^ zbxIh(mEoV*8Cgde1^aRbd+)TKcB7E+M=Thlg~;A&*lbL#`sJK)^NkX`{dWYPJzloH zm9?`$s7NCh9)BlNenE3KpifIf4Q^9S%x^Asx2L6do7{CXu$9&#P;)j=>9A!@MI< z{`7c1-Efl^KKkIA*O61uv7Q`r+gO>G{*^K3ojbUeV`|n9{arMvWIIiEM4dUiW%XEZ z(!T-Tl#w+HZB_UZ;pZjfXwI#-JON!*)gqJfO#eGgRVR-Q;NFv2=bM;+sl0iPohx&^ z^#FGx*shXXbXX2>;3^*=Mr-sSABKkrBKH)5GlBBp;Q`l}3{n;}!*FH#2b9(1^_7a{ z!-j^-F~LOfh(^wkU+^c|PCDT8D7xmLAtH@6dkGwTCL}$i+n2T8*wpz$rZxHmx}AzA z6P2A;*4t8py9%0buHOd*3zsQb$fQ?39jC@l!WOTTH1>*A_OJjJDpc#-{Skn(4p&QU z*g|fQLY1j?remlWw=Zk=M71~X^T$3OB>Xk>LM3#uqM_)#Dlz#UIev=(*eYBW-sLf61t405cM!v(u&oq#jwySP~}p!@TAwi%!gxqs*Bu0a&(ChbI@u!+<@E_ zT|g^*&&TIFL)_lF(fScx2XjU-W4brmtM*nL(4l{;OUsM4TH=mIQp1qXWL@2Rj9*f! zO?c3>2|ya`>|kD<{@VJL*vvfdFx1$(3gU{DYPIqP77WTOzBX*`Mh;d^t@?*16Q|t1 zv8VNnr(_`JNIA5+uG{2diLiano)KMRSHLjoH85swm?=j_pOtsXJh8>J^BN@>140kPG4arTA&VM$1{xIV(0ay*2Z;;4>nxpnIoI zE*9vBwsLu$4>FB%a&%oVCU9T688kiBClO!8+)V&$ci%;>kQh*@X~?x_?&==Jz7?_8 zHoC{(;tnY7W&XGwim!aMa(e>+D@@~c@B`+$eW%UuEL4u3)O_L7(n%}v$O&orsl_v4bQ-q$TQ9jLG7>DCMHFGKZ0%6xT)o_jjx zTV+_=Rq9n|^2_0|I%KP+*|n-ybZm-ijLrO6lij&7WDulr*fx!Bo4tKvsIF_DrXeXZ z61rOett^-IL0F>o#(v#@yj&P=_dN1rG;j)T1|D!0Vk!tIPqtNByLv$@PA_Dcb-JF+ z%DnC4Op!GRY?u9}Ek*~~itG@jNb91lPutKyHlZ--q3?TBS6wGy+{BxZ$CPfmUhx_B z?xMn4FR?%OecQxPa5!$jW$kuVH4)ndybaiE3%2FJ>+3ynYgirseHyL7={q6sNAXe< zlk1dA!hZ%ibip0c+G7sXTm9W=u6Juvs!zEMX$G!52UW#~h})`$k8rc8gZBzQa?(V? zHta>`n2J+I*Q zzh(>|EG>1f3v;55%|tDc>&d_Os;MkkyTT7j{0=tf9MzQlBNF&9&$!kHRfb%hei3d- zaMwI3xoXqDW~^2pc7K4qa05k^K+D1!tA(*VJ_J4*9G9ABmIbt!+t6KF6JBMd<{X`v z%&7&Ac|SCs8}gt(<82GDmn*;-K})Abbje|XMSCf!Mugcp=QD~7OvO?Z?7FsBemQWz zMV;fE32Vu$&y&}2ap8n5tR>8izb8PailalcxG7*SUO@<1C6#3- zwrc#edKJT>6ZFFkW)4z>iwM|QGi)34dB!2p1l{uazNQlA^k18qJ>uM43w)kM$WW0@ zx1}NK68;!RqaR}owX*;B9CFIE47UF)c*pcesty{bTyN)oNpyX;F0L`ZA zj@{naVQM$o7=&e4s6Omp&l?KMY__}+9acJIj<}`(`_OsdHMejGqg-6_IJZ6dWuKL^ zs^S|)4_861xD5E!Ee#qHl3_e- zY_5D9ubvHfY)c)dY63!n^2mL~<<-_7w*F!CcY=TUkr(f2@L5LnUyh#}KQ+_PR6lfU z>;*-p5kaiZiX(d58<-mZ2@LIv7(mb_8gv&!gc_oiwGDt;@wCxFoG?t7q4G^Y%NyjA z+#J1u{9IYPN}xg)w7Gia!a0`}drpG35~-u?B71oK#f{SGtnjP0?Hiq*9IV~zor>>N zB~oM7Z7Thk%~Fie_dr?bF!c)HL&JyYVCZET2YdjgyZrohKP_bXxNLs{$kMz_gxl<19k9~ij)_Mq0XL-OmT+Mpw(vF?lEn5%cRs(3iqmNwF*UasDoGFI;LI6 z)N)5`wFV;4>(~+YI&)zI0?+rhkBcYll-Yc7j&%>Q@6!ASHufzA*Gb{RZ_ZMa3AI>H zvs}p+_h@nGs6W*~)1oAtFvZLu$DwdA6O>LRzszy`yl8dr-jdR? z3x$`84=i0ZQg>076op`tIdEetUZxJs6X_ok<@6xUCM%gK6a6!jhj>^~Z-kydts*5e z)2Tiq=ml)-b^2kHuAOCe06qlMyVORS1RLB01<6Q#4c>-u?m~7*xNjxn>|!R@G!59+ z>E>`!r^8LRC6HDLOZ?I2mM%5c5{@|V9{N%2y{}tmGXJ%rQ<>jXZe^x23h=T^oQ|`2 zHa8S3CfqRZ#Zh27@EO5Y_nm7JsIju?^$jD*uK zmO=x2EuOD_Kn?<2m#G`Mo`c~Tmn~y33NJW;LC?5NEgs0N8}rE&?NjP+d|kM?`ODj0 zfuS~c2~&gIT1FYM6VG;3fpqYD1LaTii*N5|cPV-e>LO}n+l6I<QqtQ$QCF zUr_WDz5VGp~G`17iOfsA3NSa+ASL`S2f@VW@>+ z6IsBEHRvvThVDaSyIIe<`a)cj@?MoCJg)G!x3;oMQ2&LcL-#d-=73=vG+^g|*nXbt zWy20aNf0N>rGu7Pu)$c8ou-mS@KSZlfYG%L7yUB#`{ksiSP&wQd6V5n8#uRAadE@# z0pn=X3}N9d;rS2^gSU|ZLV0bAasn{i;qs`7`(WKDf&-vQKkPrL*=kV?RlSF{CUx=@ z(=%=dt}iSxrUrkuteclUnAVdOB%eb<%MZ-GCivpWrtM|*>^(-cQERVOOng*3X?tqr zn_K$!!LVt8UYXN$f4JFSiJ1?TiXO#?b9Lv5m$@1vPZdOv#+O;>M~!;r{FR>%!FJsu zf6QfUM=m!sf^MT1wP+4Q#BFY-$>_VJl0x{M4lPyuZ?UDFh)#`=Y*iBZby``f;(tKo zm~W1=Zj`*|zkHtm3tJy z5Cr;AdZMd<;N!eDuIU_+g*-V1@29qTwU^Z~Y!c8y$Ux*NzX_5S$R|6w*N~DHg*j;t zUI}y(fJ4<4m8Tfo=n?jXj_Tni#hI;$1~R_sYyt+|UCO(S&aF3Q`z&WrigiZY&G7Zle~T#!!>0b zR@1E0sW5T1?q1I+4An~UAE*NsRP46GEzmn^#^O@kM7I~+rbp5gQ{^gI$3<^8!ckQ3 zeSQ_jjDg#;$$Y|)leY*m%HY24nxQUYIw==Ug)X*P8pct1Qhh|4JghFs!dstXVjML6 z@YO)1D^_v-`1fO?X1Y=_d{na*wdP{sC@epSj_I*D4Nx|hpmPS+tirK@?Nx;pN?w_q z2didY_@3!5HxNFR;6GXa+bF0*2|sx@0>~cy={nPgGi-Wi=?r_YgMKUC6MY6Hj19lc z?;|E5UNgEPSoJIq&2EmnUrj+6V9?^4>4?CakzVM7Nj`S7PY1E=kIceawxHX<3zm>F z(c)qsdal8x?j*A$w$^l5oR*r&$Wll1M%*1SDmH@$feCLAz0t*2aTsdkmS}>MNd4IqzbP}y6J^2KeDd)RG8$6;YA%AGwsIQ zrLb#kJ37>Px{#@4XNj0ysf;s!ke737;WiENSOBZjd5Wne*Pg8V;C_}YaQl&xmIAGc z#cutpqrUdbEYR;pv?kgC6Db2b_4+0T;*G*1e^mLwX6{f`cb>x?rpHWxctLfWbrxqoU+e8XYc)bGlH*AluGa=i$nHAZ!7Noqr~f?L0nY= z2-zRIF|iPLsV^k5=oXa9Wv!>fVnpnx&uwG-D-Spq-(!H*mB}$RzLn(W@b_tkKXeBrw(T!o1@>&JVialYA-}yfbZyUDhx{h9C5(NGp{FbJ*ULmHQ}tvjYGq4 zYEBM-N3OdSa?2Njfb+-cWhDO~BYEEfS))-UhA?n_C0mjOl*%AwM4A*H;^= zw1rZ3^d#T2{>8NqAJ{4ZaF5V$&o`Ea)cUwSZ8M%~2}g%pS=q<>Vy@Fba0e>!GkW%3 zmO)mQBe2zsRyGaI-L#zV{jjQ9vfRl z74$X_t2dfY{yO%#@9BO8$Rw4NLsX9S{gu|=ITl+UUH3V2_r45@1`pz~aA#h3kp!*@ zm}=Bq&L=a513zh>cFy8Thes}r)uy~?wMCTH_P3fZDXcHGUsy~G1Nf=4PMAuVU{+Hj zu;_b@Cgg;x%5;_b)P-*{;7u4wNM zwso}?3SOv}IQdwKNKDY9aBBP9*mY z`#SVluR}_0^EeB7Mabjho)+&iNc2BI1#X?t{<)Cpv}@nQBJoS$-Mw$bAKfm9Nnlkz4Mz~%`J7L z)9m-+yFa|2kD@ZpE~K}vJ6-SJw(Wv~q=5U2w8S2K@w1@E=9y-weKq z?E0aGHw|><=GH>}zROn3C*fyKC!qFr21hz*jA$+^B=WXI@?%BI=@o$qhQ(!;r9Qkw zB-mUgKRAHun0%w?7GmW#61p7!!l=v@4uVeBmmPMS@PZ(wFaZq5x;G}We6MP}8G(FY z`~GSs%tsjCmId!2AE#LK*8d(K$ZaCOuV8RU%zrm6`8_KAPwPS6pHRJHonFVZ_B*3Y z3)PEZ!>D^mR5nc;WSdx9-KJoJePi06%}M<>*?FReR>@;H6z}ZKn^PNZK>-*-6%K31n78-D3=@_*HX1J)zrEUF|8Td24NJ( zpHzyD_CN0Ap-?zxG9gT=gGKCBU-Wo@mqJ3Iq_4=mZm){&KtQuQf=GI)^v~O#nr{sB;`A=nNmFLuI)OTa{br4`P-73i zMOXZJ?HhBV_Q*IXT=@-^5eBXe-8*A@M4|Mb@44;mHxSy^`yB*ww@FsZ58pm)+qZe- zY7QV)$mV`YQl$<7_|Id0JN3`p`(Lvp|2%%%KlU3mukR{NRxsFFGRE3$O z6yR>13KLmlCIkIbhy>0N`K3p7#x>-873P1Mz#;!fSf2CizPfs0MlF>1)`Qu+&cvCD z2%M}jt4s%rTPLoNK5{We%2+lEbW#V)a@gz`5cj)Q+kCG&BT>vS)L(Sl%v4m0qD)ME zV-~l`{k1+B(mfi$EjQf;M)4YoBx3qV-f61Up1W!L;WmOzd9?9L!XuE`Y6p-t!YK2A zXmcEAel0~txR__SZZGrPKEQ~vG%7WANKzTz_Tj_jlNzGFp;z+xQsy(q?s88c$Lq)v znGafv$$u?sTZ-1#2|~_Flu(6aTqNj@h@-+mC3K?2C!q)v5N&P@0Bsa!%p@CNP1a|J zY@#q*^S}mzn+C6X{T%LgnneP$z89lW}O&26MHekelHt|KmN8n9|xMYEoA?jo2jP!O%X`p?l zwEhdZQzrG7pHdJ15) z6Cmt~oiQ(G$Rn6up zx(C{Hj6<|0*`LmP`Wx2ECz=ou2DRepL)LYmOY3bdIHqkKhL-H;#+ekO@OfJF3T$bj@lhGB$8 zhWi&jYeO=f&@JV}2Zz&f0nr%=#s{aluNcoI z9IeK+O&Pad!6g4f?92zX%xBHE$9Y3KZG_l|+i>D5o1fsMk2u~0T0l`vL59;-9KPZ`~}Fq}5uC#AF*OmAY`cFG`@(zm>mnyCyGjPOVc!$tyN@*m~&S4&7F z??f_F`txXv|8?&PSM)g9geP1or%idS`kYu?=Q!m0#V&gJT-DZ?qWbGk>X<^HTJO?x zn|KBy+8?bpJI&wiwdGK$<-!ff$&Xk^WaQmGZC`OXYB~z}&ya0P`P-*iEo)IiaN0Fy zbW9?(6eqc@YdE9zp}kvi>n_yBQVOoZp-jt9--i=$`Ycu8uc{ehpGvM`qQ-{V5K?y*; z3T!nohPd zCas60S6dHFb9u5KZ8Ff`XZwq%o7NxbZq8ND6li$OkGDx+X@&k#&g-H6V&i>cp-*6$ zgfc_koRpBmcmRTCnb8e2X9ZWiS^J2>kDUSAXG;Twp>Yy`*)wu$6_0xqV})hT5B$SR z8avdRoah=vtqfE+5y)nS5WaRT(C^ARVmd?$?KFsPL+A@TCF@RrT~D;tObP*hwX>6E z|4i9pFCY0tRNrFf(sdJze|S$+fNvQe`B)E>QKE1OlIu_H7f`f{5~an<8vjhw_hEmX zT*(J}3!VSQt95g^cW2Z$~29zY?V?wrBxO z5oNdQuK6a9Gn&igt6r{m+w0+cKbiRr)!a|Vy%;`su*t8ju_|E6=9+o37IHsSoVSCi zn+)qUxv`=h(ag&#|F2Pu{5$jR4sV`f^L%^#PJ<~Se5U7y?q=7}Ou9zht6&0oz?czd zw|-}nmEgK}YZl`c)Y*R)6D75^{I4aERSD}Qw{DhAbQz(9n`3|m$@lwbRK8(R-Mz`; zO3bv*%4jf)i!d` zG-kahovDz@mQib@Xbfs0WsLbx*Fr}^lh?yTH=iV$G(PjSjCiF}l~juq;g6g{-w98c>GO0J=6U6w9>DNY>Cyl70VH^Rtla{>HE=$g=;j zf$0Y7l1ueBz4D(!$CTa~WF7B|#AHYrbKBPP87*?yv2Id@p_1_?^D7DME2j&hWBfNf zj`7?id^!ISeO_XvaS{a9l5Nmec2EM+C-P6%g`WIxts_`t{MUYl(uDD6%W!z9cWGj+Wugg4E8mAICJF_Fdc z=6Y`j48!U9YnvbmqG?N@^3nBkolK;tkkHA-b|D4Pz-Jjc71954)AqXA45}akrW=w; z;rgU=-@f<14*(KZLnN^OSZj`uGu~KK`6w`co!)An>$02CxFsPKTIjTaOu~Czb$T*p z=6Y;rfQSZXu8Ph_p!m;hZhwORb1B@~T$K@@%7|TLJI|OS1(us%R3xZF7XNE6bh3eA zM-4?wXK=Q=}}e7x};Z z1}XZVA-8{5!86_&00gn~(nA`nUg29)2fg=N67AD$3~@O4m0ts{;)b z0m{$XD6G%gL0_3wrsZ|ZA;E*KhPzeFH3A=w{b?{aY5n6@kw8P;m)S0-?o9U=o1G|j z>pz-Yt*4R4qahKJV1E_k`z02KIrDC_BFzmIOH@Gk@=jo zmOn6PY=PeU_^2048?&w#$`So$Ow%c4KwOU(V9Z%{#5ull_V)WET`Ozulbj1uWBK0Y zEPYzYj6TxsT&utJ?cnl7QKvt7H%WFN_C0vv!oGCeze>TLla8F031}AH9|~VfM?9_l zi4_~g|IS@TS$x5i6;g}aAn#!a?J_@Xu|iL0*9N?l>=;G^BF3*u*=IN*zuV#$6fuI* zd@LYqB4ZrhV6)r?e^1z6EAt{B_DF^9r7+OnD>R_D2En-FsL@KUZfQf*0Nzi4^TWRP ze!8bPSc|?9*QzqY|i)a#x?Mmv7ycCQ5wwZPj(`Ex;PRz8de43c4`Dhfrpec zdna&!wmaY46gk%@Z-fY{Z_bOK1n)exSl)Vp<)_AFqtyUOhNZU`B3-#dWJ)mada@kNUX(G0d{2bWJnF$M$ zkz{I>&{amnN=*qaqk1?g+?IlFTdj{w|NII$!Tro%7f-F%c|`obw8cCpzFIYk5`>fm*J0CwHhATgY3!2Ifl#F&pMQw z7-{N-ALE@ejI%PjRioU}5-rz?t~x2ujW3qkMrpgKax;xM_UIVQ&!f7=TyV<+Hi=4T z5{iybKTXlSXEMCtpxDv69A2B!13tc$j6fcAZZuEHZ3$6S;9TUF3VkO^(={3`!-(u* zn%i)frLd=WFL9 zU+19AXZ?>SE&KA6va%KpEkT||cFqc4M#mVKehXVuNf{;QCcpK87$USZ;*|I;2Px)F zRREOsX1#bU-Nd)hvj(|}z@&D))nyDUcGGG!cOO4u*?7sN1gaTVtQ+uJ&DHj-Ho-_K zA_LmI`I6NG;bb;HSdX$ozv=-H~WZ+7Q4x%l)LNyUJtwHBF<-Jf;GL}PL9qFOWiMboBo zx6rvA0gj;Xt(cdXKl91R8&+c!TjoJayl0#4>52UX$!DFHoHC4PSzt+>IjpPkqYBOC zblAlvgPW0uhJykUyH+0JG)!_S?)0lGT7gr2sn7>Sx9z}`z$7G|({nE$CsFJ??t|87 zT}d4HsmGrYaz#4cs;OVa?-Fx}%C9{#=7;WNIyUd$U;EC(bD(?WZz<#0H^V}aBu`Mb zwNj(ILmQc*4P`uFrF639UqNn@e+qAJvkC!K>bwm?zGD3n)VHLjlg6aV(v(wVc}FcK z^Y~Ig0KB^D(uHb)k8=P3udvnN-g0@jNuO19U17C*>d;iAH{_7cW+X@nSm-b&^;@Ln zbW2i}K5^&a07y0Jnm1+&cp6N931V73v)FnI0(nzTz?Twy%u5_lZJn|i&ANz5+{LhE zNnlqe2F*6LPJW=^cfqr~qqeP~qV193L}pi*U)Y_PIHGNd(P_kbI^R_yW-7jDja#vxI1nu+_PCxK zZa}3}jS=0LcH?s$1&2#pa4|5t?D&Cd8NQT9mfmCdu2*CvR;CF!|t`cmt`LwY31c%U) z$S?tozn{}1!9OKJ3A{wnO}!PGtSiUxPmKA5<+)>H1524B&<8H(w4<(}M>WPLvB=OS ziuek8B%qiWqW;>V0Cphb?w+c6CQK<;oLbiXx)h-RPAO3-RQ9th@s6)83%*Cpg89k;e+DSNrwA(J3{TIo8;~BB@W{-YcZdD#coBnQXN{g zRWR)*R&73+EyGLgsvjR}SH0sWM@gIoLF<{?-o~%04Z9)XG^xPY& zbrP>YIvIlo1Cu*mr=XZAE+WLEoC*+91rH&aSqIDLj`u$y1RcK+qm$ez(es<}KA zyD5(y;+q}WCyRi#_2gyT48h;h&&+V9cWT`+d6pz{*0~0?m4BrCLmx_Q?2EvlwXSZe z^21m_d$l9Ok@k^Wtz>HiM1|EAyXZyaGyScIBO6v-tXQX$D6 z0jr4zH}AfbJXDvbTPyMdMP?HUWd~|P>b**gyuSs65B&5r{fB(pTy+^z!M0Q>TWsvix3?Q0o|aghFRn@@%hzy^%(3 z2J-Pz{=V%-)UuUS&gV-h(KQM6kDG`({VCPBb-hGtS4$kLkmjV&>!b(l=qb)>coO5e zQY{OHmu0CS%i^QkSM3D>sZEHh%i#k6oeSHst#<;-hk&`%GtGoZJ?i)=%F;?wCmdO| z*R3TJKF*QPtSoL>4AtXUIIj=5!53lEh;TsRA=Fej;si>Ee&r9pH@qJ7=o0sJg@jkdlMRye{0erqb!IvFo_RhrXJ9%zJIkoYEo1-FK}w$%^D(%{(>&TK zk(wc7-wk{ew6dZ?8eyL-+8_v=X`S8IoT_hM*p-d)K}UA6#+LQKLmxA}2GjjtXMnVj z{n<6%CWxN&5|4{ERmXKyB5v!AU6h_Se6j(nlBj@XK8xo#j2=)HZ9rB$Shwn_6kyk5FfvxH5E6ep#H{Wbi+VhuYH`O=05yCuK;Fln z%L=8OzAjo(aBb`!j;K+7+ai_vjCG&3sI=dn_2utXoqt8S&1`IYHL>72Rv{*oatR{)PsGY#HYbM-^q>5H=Of z(pSi8Rki143-bHYUYgcbhd~yKHWI=z6LP!4@OehW`U`I3m}4guVTQKCH;6@wk4L`8 zT}BG=v}@a!9Z&-%MZI!*uFq(7?jBz!pf^-`lOyqRd*!~*uz@_Sue)BXz;zm`e&uhA zJSL%-nbY1|u3Voo(w??c%+lH(e?E!uv0&!WVDU0Nk6c(uyCriz!l^;M6in)`X3AkA zP@5`V9+x)n=k;73OeE%Qc_VGhEte;FiEPx9?6Rp#tH7<7yQ&K}2+V5lese;kavtDm zykX(ADb*`C(oPVoD}M$$Cv0qlMdC*f4f8IAxasmsSm%#YQi8{s$~w_7k{6ZGeVLM4y~GomYMf>|u4^1zS>9UVTR5>Rg58jb}WAxa{xB_0XPVE>Uv#H4FgXafK1Iec-&WAwW2^78KRz zUXg3Vqs8^=L!qRiXiIsGx(ACi12Enwb3C@FslIU`!Di`vTp&PX1>NC#g%7LPin8L| zXux|fE0g37|E@_z^!LZM|9j^t@j0XLhBEr;x8?New$MmXcaEMP4=N(yzPGQcCU2(k_xn;05M((5&`q53_Ax3tLQHR>OFT|)I{-TiAFf|f>4 zuTcv@OPLQ3XBP>r>PTX)<=AVkFZJl`s#d3$alE!vQ^na#mja{lnIi6W@mWz1e!j8? zAH|jkPU75fPauh*Ox1@OX2XFh^@Gy{NLo)?MRX6<%-G!3N8H}1ZHKOIDu?XL89=$q z2N3bWE1`Acp*E!C56pp~+t=%0fi`p}{r$G;D9iD=nbE^C#9ARhICQXBhXU@fz2%+@fH8 zei=PmxO{toHw2~2jq#QuZy;=_4a7pCOq}+GT8!e5xZ7o1MD3(J>xRM}!@bUutVLJz zrkx6LrzXxy7r<_qZ*6_Im}p4VHI}SNW1lb3!4O->Q#VRy?Sv{Is~7a(tj>#` z9fwsg(u0-mHY)wR)U}DFqTmY~V-wIGuY<=W8=n(hvhiidxkj@K9YY+s3-$-4R7g;P z7Wd{|K2=l>O$>7POaI6`I_5CnjA!WqGGc7&ZVcm3>1nCIxvO4ArHfu0mH(l`l{N0C z^$jDQ>R)&rW)NG90P7>^!Y6D=Fuh9i*Wsxioissu9`3HNe&MzrgGoEQKb#*9V(0?ugk>5)qQ9rP5Mt8}LBx)RZw zaS9!OCTq;vn=BV0*jDVv@j$PiBhIzHNjSbFxDHu9F=ad`Q%<6u{ycU}<`g>0$gj-e zT(r@;ixF0mO#j%j1CwU+^u>)Viy6~Q1B7g1c0_un7PngswZ*I*DfBp61V&u2(SmZU zI!9j=kEgnAabxO1nxc+u!@gnPiU-A^5o!SJLV-~YYhuhuBc`hMm`O>k zrIGU>GqrhP%Oszmm-|1I>Pui=t!7R|PitP6Bgnq%E>lbpclo2N47-Ac6erxL@o z`5WPvjm_^&)dZmzJkArn;ca>lknKPU?|LX^f^9#b);Or%qd)iEHSfd{)2#h!W*s(Z z^#`0=1L{s@N1Jm}#%B3Ln9|5YVLcI6RQEjB`cCWx>s(;G(z*eXAhw(QQQxg@$FaeR zq6o!AD7)$GbcM(^a5eZR)8UY_;q;S^_J)8cb~iT2Rf*&P1ZNSWe67aK%g<0iWwiCw zyEV|nKPipVd|epd4Cc9|&Y1#N0=rSn%fwjt)Z#6cH(a}MpFX{%$4NcH@eQQk#j%u^ z-%ZX8n4%*HcL{c38WG;>>ic394J!M4fh+@LZ+5OpR=G#Ky+t@-3*8zbsH8WrA_knr zZxJ(3l{YRTE?(@~w*6;~RL%Q)zBjn|^L1(J3Az1>2~Os(t$=fFqaF{^4ml@#?lt!) z`rI*%q*_B&}5bV-gjxWcPF@ly^`!NF3 zBwDhs<#@syIm-8w^?sTa_jA1On3P?94Rv)>S^y65Q?u<&>pG3yDm#5mqO@*7{nR_{ z^}4wM?g<;z^VA$o6^(d)YHDd}tTAJF{8{L(2*_GX(HhJQxb<1x?pbBjbm^w=ac-4U zp{|r(-LeK1zj|Q+mg?C8b$Gmqg&!j70Vjf{LBbAEQh9xxO1~D`MxDDi z$L$yIm}YwYCc?bl)*<3@BJm7LgSB~fb?MhI%w33glXj()L)5CAyLh!=bx_Do$S{a{ z>eM!PNjEableB)UaLb$uvB6Sq$XS>@zm%_TmAk7AcISA=0+(~0bs zjKRqBL!w{s)%-r9WuGdrS{!KTD>kA5tz`?722M9xr_XG9WL4m967G9hm+Iu*m>LYy zjDg#(m?ERE@-o-XwiD|JQKh!xEAGlEoaM2dZ z*fm68f6i+;jH1Ovh4CptKi9+V^6HPZ2p%}0z?-pvRjq1#$t($s)Be2%VP|7#b6~(H zp~o>_8}eMYxoJw+7Fc;`2URZvozmo%t`LSO)v{3U+yxnWay7p7fymD~2QiQuPKbco z7h42lw|uWCw5~pf=F<(%D5U0|nA#nlkTOv2H=SgLNhw6t#@?>O3{#Jhb>^GG5O8c& zorksL67!nDJtMPe>`~6~0lnR6ZJ{A~`m*#(X#6re*9cD!t4qkeS3;ur0rD3(vkvE> zh`sFayNrM)?Mt+L#YI?e>2TxcAB|N!tb+*mw3lHv__Kr?ohJl8gKwkIttvwig=cza zQOq}-s6KlvnZlP`wK|nn476l*T|R`&t~OltN93f9W)S)L?RAcZ@3su7kByeXd2W~1 zb7yv|6HS{p5A zg5H{h+^d;qU*2bNsM+KMx7Kaq!+nJ$gm(oc`S4 z0Q%@Tufv4_LTtnKj@EbUhNkh4clUl$I^IW~8g@;^Et1^^=W6!!iw%$#W|(~Ur}u6S zb6LN5l?^{42l*qE^9|m#R*82}12Py-8sG8`TJEJ2W`9thUj86`X|pr5sc+rv@U}z0 zZ5JBu*j63%>$Hyjz%$-8ABP`8fx904ta}=B?N6gofWhU9s$s`}*qNMTV3vw&E{0^_ z2D>1P-yl}j0gnn2!22~9ZBp?w;0$lvgqF@-%I3-Kj>Lq@q&*Xr)POGA0S2qzPfQFE zB24EFo_~Gc_rCb!)GYVYht^N+*R+2-^XN}Be%pO*Az1vO;pZ4$^B>Qe!yCTHT!dfb zzU})EhN+4j4#|0KcD-`Xl=?^El+}-vI|$c6@Fz|>u4x6nI(mHke(Qiy*roF0d+&Ts zu|H%nb_+t7znOJ=TnRkXdJ%EXQG_IoLliUfwRn5=ThZUaTk*x zz77WBgZ|vRzYqA^wP!T-ZE}}cc41P~iSI5VWq)5*RaAevO?pQv?*5}M)1}Kt#_Xk8 z%0C62GYyHmi2VHIHX`Ms(}{1>AuN^tHAKMRi<;}Dn9ss*gV6Vv{xZq$UX+Sk=Q!Y; z&+opKq5Jp8$DSR!@@;(D7Jn%i{}W60XwA>xq|j|k)&FZue#&|N>0@>6QgX_@Ni)$! z@80qYYK=)jKc*&qaM>QpA80He@vN_DaT?Ko`;7Il`~3Oy%_I6d6;#E6`DcAJXx^ZF zUkw}$l#2H^V)7dk#!VIcPtHXGfV+2qIO-)vpJkV`D{ygy6YUgeANbjWsL7SH&`srs zvy79%#%33nwFc$+_4ui9=_HK0FES3{uk^v6)0$!Fj+34@?yHQ*{w2aDX}%9z$W5Hm zLvsYY*6bAIN)~%kesuRb@4H!fsFI}r?!Wx2Yrekw?tw4Y()3!^^pe9G?`t!6*BNvg z&-;X2@PkC}%!D>ay~?=Odc^pB#VY=l9$g2-iTRK!P&>w8C`Mg)#F+bWO@vF$4&sK9 z8N9w37PFmfu{_+^q=Q-XMJ`k6pMP&5deU{Ci}WvXTO$H4vnmZ}L&hdJnTqH8$iHVs zf9?2Yl;=YHKC0T4hevDH_8`_egj4FL5FZ}nM+*(z#TUNkJ#XMS)@OOz)3lcK0AW{B9#*m8* zA%<}9Slp{QHqECjDg01=s=_{-ldxB2b+OE3&hK`lt8=01R9zuOUM{(?K z8-o5R!BI_1)&;0CW$YKwOOY)X=af<(Sfsbavg<63FV=bmgI+aGZ=g&J+)k zka0#x?3*Gi%(^|?9$vNtOVV?w$OaC@*0_pyHOf0}-MrUd$JSS%I(3;cTVC__(Ta>^ z)3rPGW}SIq-K3um+xWD8WY*yh4ua>$$mv<$|g!*ZLa;w#4NP$R^zI38Q~nb za9o9zx*{B;ka#5nje7w|+XCn?)Zd{CKG|_R!I_@2np88H%egHNs;=nJJ0Zw@Hx}_K z?;M0-N9yJT1C6f&!lieXBm_njUx~9dk<{3J2b2C`u5t!e3|KTQ3L5Z>sJvY6a|g%) z8R{$uwdh7~nwwe{A$^UvbYu^8kNiWBEgawb&>{%{kCS zhhr8ZEk`NEHcxWfzoykdqyJe3I_)y1{I=VIv?B3u)5#=2$@uyb^QCVo-3xGc0#9`4 zj_%tq^C&%PrNV^Q9^T(LH zgw>}Nc=4K%mvR%bzS1cHBd}%_-u84JNq>g(Ry3Kihh6*J^9bmj%e&O^C%*9~Eau7CCr`G-*{L;?hl0O8k(VYDNSRh;^HBcrEj4 z;K5dCT?wtThI_z((TTVz^OMJgL6H*aUBsk9X@Rmy!kILjgG}w#$f&;TJn4J5vK>Z+ zO%^fftv?I)sprLvs=g+bk8whqWXj-~oZI+2J+PNuwi;56QW=3)GE2^7VJ2p|A2fFtQ?j6V(`_KB%}m*ceq8-gi!%y}lH<1-(TcU*y}xF4Yd2>}tGD zJ)m5_5_FT+GCdTe+}-pH|6JsngH{_S1(O4UT!^JKwf?@I+aMlaJyy=XL?2&bsTV7(4|f&}3~cJgr-@x}<5eWOT+UDX$!6SlC%Ccc z<}v3d0E==y(|04A7$vK|p`UcjCG$4b{IBhK-<91tMn?s=>}E_Rwa_tfG8mrJf;7{8 zV5ymA>O756!$@ZD!p$O?U^w8-b{{yU?d{m9qrC}CcdQ3B^T#;dD>#^9XL^@zG}Rq1 zcahIwj#UZ}!I{}JhE!;UoJ;8m|7w?baJ+k+#TlB{pSU${93*0ibDYx4wR7?(bc{Ri z^boO{X5Pga9^u5+4s=YSM4s6SMiEEL1Ik~h)ziG^+PG7li7DP9nbptox3w>>{%YL^ zm&nwUWE0+v7LJ)q#?&Z(wurWW)#Wy;=W~Q#!xlF3jhvrJL&c>FQ_-n7?}sAQvdnzD zD&zfgn~%57hZ}b~U`-;*X4u`7 zlsf(Zbg|b0oYAQ)=q5cnf&i&)P*vYJG9AL+u)1mYj&|zs|D4shLCWJd`%-YO?|K7C z0m{*eI_Gt`wgf*xQyX{U4W#TYg%_YuB(sSfPi@b%L&JH05(y;64#N0Lmpw_Ub3!R% zg&g<2ShLGRUYAy;Wl6g7sh+FlVcjVtG{W}GyLBEDFbJ*c(ZOZn$W3gIddlJHLZ3Yz zt6KM5&ih(RL~62O-4prq$GPts3rCz%VR!Dr2Yy|>8rBu-8{pA*o={xr{ZSXT9j8s$ z6f@RVezw|k!^q0P79eNW3=G)Qw@)%Ps4{9uu?fM5)*?1KXUk*x_tAiK#&l!>OB;HG8x?<)uHn3OIEYv+Whf5R zNBavS$-9O(-6v}R)h3QaD=mQPfH$(DOq}}~F<~^Uf!U>MJ~l3|9y02QMa!-4sVtBK zXO%mb%Xv3#v5Y2)tbhw9=PfAL$Lsgnb zPR$YP*-}Ee8vs***7{Z-RK11d2BnO@+#9X7AM8?E98hzR zrEnIrmT-;idcPIyy;}WSKp}t69r(!yV2|b2;Ffb#Cu$RCzW&%o24{$^mQ_g z^`eI~0>T^2M(*v}{Jynux6Feu2ZkJ24{p{!1fLZgfL4se4aF}Cm=GaOeO02p*i^en z?5pqYEE(=o2Nv!Em>T_|sF9VSJ`k0oCvn){Pr4s&0zKo!{_OPA%Fd;a4pHK_j;|0G zhX8}^QXZ6JS4WQV{!}$7>Xz7{cA3SFrj-V)+a>H_8~qCAhssX{C;w%UKGIGKE;=Uy zuPzunWXOSkiLVWmCbY$?e-WHHRhOXal}UM|OxUfm*wWXc5-3yQ=^mHEw#45`6+P$Q zLy9+lJ$JsU;z+E0XW@W};|01|c;|XdYZ4|G9W7_G(qX8q6=FvQ)$U|j)3pRuy!unI zg|a5xKrp)8SsqDt`^9rRMSAW*C}T5KDqG_~hw*OcQh%wTxpJj6J90LF$ey3b<&Hku z67kmN1dmUnXB@~)Q6N{BrUXA3Z@P(d|KM34bQ4k!JB5tRPSB4&(S(s$C~C#h98bB@ z-fmh;6y~!gxhTjQngVgg5=OiS9v@7&hYP5x{8*h4VCY^U)ar2huFFR03b0 zxtM!)h!UIty%IMPeMe92Ale+|(?N_jf8WZ zvjJkxt&Y#49WKk&-P})`?ucV5zLST!@m(2C7OI#^a`soB>r`*^%VO^YugbnAG+Vq2 zy1brDHM|4N+ZnyC*wMl*!^o*6^wvvsO*gL?4+^6)Ptwb1l-p3>P6EwtzHABDULgSd zx_Z#J!a|3$VDxhpe=fdWUIL@sjGPFDWM`&UFnmdIQEQN8_tne# zIQ(Poa1!+#ZThY`Ret3Bd}9@e_TN?-rdUnlakkHd-QCo9PvJb^=@YpgGu0-{dU7*uFDtRD%BNZ7t+$ zuOIbb^qSk<3%61G1bT)S2{cz!+XHHBSSb`*8cs^lO*X0iM8&Q8!WKYn)IrCH<1)Y0 zKF)qJ`C@%3pw)Z%fV`*2UN)k4r~2IiI|u;V8jc-_As5-;cOzvv_n*5B?LbE6FWIi{ z*U~`)K8GyoAWyohjdn{80KdUM{^#Oh++a3(bfff-cB$eVnRk%prKdADgKobQ|5-0@ zyg-6o1@fc@LvO!bR4WGXm*Tnb>w6ynwkgb}PRVsg5B-`RThh9P?sv?3Q-RYgSi5{_ zrBG$^qBq5~a5?w2<=xjZs{J!zUE;(`N%SD0FF8hULvl=QIZM1!w)kb5xq+F#?}n<1 zN`u~A%1j(m2i6=plEXn(H+(ZpU0q*C(eCnxY*#cBh3Pjty3XT1(jz3gyA472Pd z{AlN;Y@6?A!`l1J9TE?ZQ)$63r!^KG^g{x%9;oU~JEWCkE3!G+h$64oO{@*T4SNPz zQ4p%-&{X?D;4NoId^*iG8?eN?Oeib{<6kq>ZGc<(Ed6W!YHk+~>FtjwNC(#KSY)Ln z*sP+?MLmWu>5uWb12<@W$2q^n*thmaIoKi3n4NQN2{Sy_KYupF7d}2&$LtYZN-dR7 zOSoyJq)r;d7Jm+t#rv`!-@-2;k+l$w8nS8f4#LYIJzn5uyFevkZmHb`h2N58E3hntotg_87&_9ST8s9*f>Ks%?k}Nfo zL61DIm1EVU4I{s^xHePC9l_!4`)BE65sXf&YQ=+@;tl}K1_Lz z4?Duz4)+W&H}?7uM$f9Hw*sAW*WL%jxa3ggW7+9OM#_^9&T=}>cx?Zqj820 z#|<^vQ9&umrH!##hvWvV#=>%`cWw;JM4Z9^l{M0w|LB7*t0`gV&WxnwPiAZo!HPYV zlthywx(0u}4io%yS@T24W&U@EsnTK0p7#xJrC2u1cYBwWGgY_!U+leiRMXk^@I5o$ z(HR?dI*b*SE+uqE8DT7liu9&LY6u7cLJM)m5mX2fL3$abNsXa}5J((_&=QauNxQAndovdYEZmC4`Mcx`o1{*WLJ_0`l3n($ZB8ns(SVZohKYjBnOI&0k2VaUhp; zoIg_lV&`$(Ly(fH`lkGgmD2jOqe!c*nXH}OL1NvZXPB;ji#G0}w$qGKoBYdcT;?xN`)60c;yWSib)a26|(R1izE zv8JbLyIai6w|pED4zAC9^2M)zQX39+4#s~Igu+@N-5?m!^4FDa;g_sVL^-@u0Z;+T zu26n+1R2KtDwB|p-%K**CaBPCkZ_Dck2$Ol7BN*e(stmVw2o=5>>B1_TFqcbFJZz3 zk57Qa;-Th<Tt8q{x zeom~w1@u??yL%W#_2xFtDJ$>f@+&Vft?xk(HH+s}z4H^k#QFaIDztGz%$Uu>@jIXk z^cB5>1fH(atI%%>#0hf92uHTD2aw&kXl3jy zUbL|bx)i6(JPKW!vF20gJn!X3VdtDw_^Yq*GkLH8H__JRS~A@{Cbq3IS76*fpeU(K z7&#=GP!7rlsy+W=1pb~UCi68?)G1`t7G92UeU49Ui~HVXV5f&LW^v_P=&Xx0^&tQZ ze3ww39VmDKuCnCv!=RH7xojI7+R2viv1W0Ap5?(!dd?Vw;;@YtoNYF=ty~cEL@B>s zAe=yy7iZ!W1^5c>L;uDC{}s=Hy7NZTqUTC?L3@(*ptHs(Y>KqchTP0yE}vn?A1ruN zyg+7ZHWU@unRilmF*v+v@ zD0*idN$r!Ccc3;~=~ExF!Xr`hbb*^b!6<5!!RhJ|_34ISj?&Zhh)4b@n5FSsAP(b! zpA;{+fCA@cBl#SUjfNQMJ1BuLIeKFoi2bfcS;otm(-^Ph2d;tGsq@f^uE0>RQUmJkE69=qM140sMdThiHMTx|(c;)DFu_}wkY59R>p$b1cy+PMY9e%m1*IkJ<15}#&j%Xx`oSL=mR zgAq0GMMz>#H456_&%w5|$s83~fIrtj(+$yn@MC=kWmVdlJPYcQIrVUYNd- ze+2bQU93&kb%DzVo|k`?az;`+JYsC&sQ@QEbyNKJc)n`+Xdt=$JjmbxDO66FlVt8> zx|oM`tDD|w6_u?;H;N>^N#4Ppw#JzZvU-~2h|Yjc_LY9|D06dNNN;e++br^9B=si1 zH+S$yg3R>V9DiCoD6a|)(()AV{zZT*`7cj@WPT`&&q+E&>e=yr`fD`WD!-UQjK{nY zbtH%J2X*p?XSO_Ia3m{Mhdg#EXa2q3UQdKp`ehT`l?hOqXn7h~Txy&UyVQcD#RICc zV47vCk48uyK|iGt4jBQSth1~Vjm9s7lql7SC`p|5nvY+p5<$DO430YkimhoWnO(Hy zQCj*ZyKwquv0XX=+>^vd+j;6W*O-@kiu{hw%M$4~yN?|2zuI#FmF#YXQ_fULD9&B* z;CW5^0gDojmz#6(bB{%H>+*p`jzjVOOiJ}b^;`AWa(s2nw15J+m`!SAf0|`qeFgj| z>s)|anE>s30?kb z=H}Oe($)@SW;(WxhRay%kGLw!`-!*iJbI&TFX^J4e&ZbQ({>L$BcN0TA+&Z(U5K&KGg z08|{F=WNfl6FxWJT*`UODoY~2{6bV?e|#|Wq2mYe^^s&6_s?&kbe$k9(;e&1$}(Q6 zNnm@#g2?Ko5t3cq`3%%NxFiXMv!G)a^6(qUl5NzQPt|dtmHXxPn1%P4#f~c)RkOu2 zOB7m9H!T#f!C?gAS$WaoT~IodLhI}0vgvtb^59KzY*0Vgy?GulzIl)d^?<0jM^Kt4 z#)RlA1ctcc(b8LJRf7lY$QV0kcbq^-7k6=}j8+IcGhaNc8=)>Rjs<8|#n;>CCrBa- z`kA%JgIdF9f`{m%os|59js7KU+uxIK_{7IE8KlIRy*db`_2glv@yqWb zp`6~jn_D#%O_}(Zh3CStegJh0QyKoyEV3upV5tmO638!UqlY+DM`37VtZX()SrK3f z6uWbgLGWp@xHN(N?j8#*k|?Z|oiK>-4#Z!oqArci-pn8%%%b>N(E_Z`if$NfG#?#l-#ae&3x*YS>bSI z{dT|>Zu;D)YIKk! z|7BAUx~Bf8Ez(qOdULgHJd#^2d}BVYKX&E3Fb;s+mvT|g`#NIpF~l)kl|w~-M(DTe zq!+v2T+Z&;r~`86rOM?r2QFDRs$&|jpIO;(w5HLt;Vy49k9Gui>^#6gwPksH-CN=s z?{1+b+wVRlc@u``tv@pG83vqi3QUnXv%Y%K#!1eFhZ(P_+zzoxW}c1ePJ?KKysi0C zL0UhagAw}}nxmSFD$Bdcw{-5v_=?j) z#;!Ya9))%n5%j7nn*N7AlwP3tF!Tzy_TGU7{qU50!X{sK@K%POPDVrx$>;HH1-J@& zBp)y_x|Uk%M=Z5=c=O$0vG;_An|WLP<`darpJUxO7xW@Yq?NKoHG%+Cbq^W#XE!iE zC>oI>?la8hI$$+O&?doH4JIM-Vd`pAMv$Mn?IXifW`dc|BCnh87)<+oJgO%cB-2#syDbFkW8g-MUe`b9BM+R=zq* z&u%S8O;hzvGqij3F#-u&SVU*8BF-PI>4xj0wzD#bFZN${B4|GO;W8KJKbA+t=f6zv zYuL!~>Yg6&>{sj z{k$?aXoPR9{`iC1#?`fIU5y%>y|^A^vdVcxsY-+Ey;~E=?cK_xn76Hyc0aEPcgI*vy)hC3Hr_|FNNXQ^K5y zT%dpJafZfcchf7AzKt|atcan?;CzLsJK^H0{M&P69 zWwE%CVl&R%Z5~2Y6Dn`gWuXi2VC)WSSWE+5bam5p{ots5q;*|3H+nAl4O?CX)zWs$ zy3(ZJ)PEiu6lJ)S?6@|i$Oy}n{amQM7r4jXaQwW5eFgzi9GL{({+vlC6dB5$4~a^y5XqULt=m(S;W|1Rq2Ls)3QZ9>AtWMGViu6$6_$*v5R4 zG!o?7eOp`>vECV4@oclWqLZBBDY~7P?bug0fKCuUF^PI;`nbYkE~3PMS%0N*H7eFS zS~uZ~K7Bli_Wq&;Z;nitttvCoQF@AUUmTDBcpdL;S)b>-re;%U@? zay+FSD+62)p`B3Qu{FHXNn+goysP($U&U#My4xFZ0#%~id=JJZM1A!_WnZv`5oUry4R`8n>g?+Ui6=l1ZvS5LjP&5Yy60B~;b^MR;YAgt|at)N`lYJ_|4&3{ga{Qx+)##Zh{ znyfV9b#boO4ae$B{2^ZUd(N^dyplOH1p{tBnr5Sglwt3 z=22n4dkS4;K4R8$pKXJJoQ-=(i*8Em1}h=ckysb=f0AG=+2hu7ai=wr^y)H+zGg6| zvNGl)mII&miVKEW`T5*A4XIJGO6N<8D0Y`2C$JHaGm14HBWnzW?QwHIRvh*y6}T}$ z(TpIsJPGxhdYoXIv*KcuR}W5=W%-*~E6N_tvWxzM*!jf8dE|w1*xFQAxeKqL^yP$o zS{m(&H3%M3J7b@o?uxrDIaT^a))_TMr>=hY^SQjVL|1TSqZg14uGEl__zTwv^_Nr! zlNX<_cH$?Qbvu|{w1v&rjSJguX;R7OXgv3kug{tB4Yv*}TITy03!QO<7G`g51iO*N z-3aVPdyWZQ%W;wLLHr@iC|MxO={U3)c_)tY8aIxEyh`f+h4R6Gx$E{uvj6+`F@o}Y zPas|qZy?r*9XhXd16Y(9Jnd3uZ^otCr9K|Z7@ofpygKM7Y>?#f+RGJVC!Bh4evr*K z?BQXoZrq*n>IpwYerBHMZg;m03-qI9e}&Bm90Qd;i(>1fmdad0m%zOIxoOjvnAe%x z$ra6iNN$}n1V8W4pmg!udmdlagj6o?RgMY^oK{No4eD9 zfcbQ<5T2*$jzoYpdWv#~aXVIG!he@>Opnf5yXdhr~%>{tvm+>G= z+D211TZZVK$)xl+jr1BW%tqHWdu<1ONcZh0zJKy%g20$kM)qJ`8F*gbzxCPozNp92 z-<*gzT>dQ=YMxmwFb>rw_qe6T?}+aTbjk%8M_&tc@AguTH|K;ORwB^_w^TIZfZ}eI z41)3Nzk2}VLZM89Klr3C+HPUd%(U;lpld?;HPFG&GpPKM$HTkE`0O5f+hmnaUrs4 z;TvEE)E0C7i52TyvAKQYS2{WI>l1&T56RqO8XvLOx2_7v)EO$>mNW7EW`=`~`-4jJ zxZQR()81*O83W&g`^C%JU7#SXm-TMubI!+S!-{d@ zkD)|vhbYMO_nb0S8ZC^xvYsG?6HiB-oDVM#6X_rHG@ll_G7K`yeH~79fd?s;=_Ljw zx=g?EEQrpjp4D?o*(9GnkD4ofiISZCUFCQOFL&DoSXz&EbdsH+|4^8*@YVjw*+Uu~ zMd?p_)}OT*z^}JN)J)q{SUZg8woRPXFFq;N9$9gNbBm-8&RtfhSUSRUuIo?Geh_>9 z@l@3!y}!k_x? z_xbWi&kO?*DQ+fx(izU4FqpPV^LNju9vJ#Yqcn4lakVtu>qPN}T_(RRWo_ZLmL1Dt zd%6(sC^c$@5l)45-@fX(`x(bmVQ;cD5PTl{$Oi;05V=fu{m3AcdDK;IX8B2lbNz>| zxV^i$p0>zEe`^79=^Zosfii}X8idio3jQ`PT;sJn28kgon`p1vc;pOD1v+bMT*Gwak4B@bIvpt2?q^xa03KF83L7-PDk_e4 zzFGm8iX2W&4@s@%gAR8e2cZhF-_1l-%`i1bHtoYSP5__25biO27mPvL;Z0Bbi~tcQ zgSw-!L~H7LOnXS$b>>mG=Mid7+YV;4;h-?RpG;c9M#Odnf! zj193Jc!BF~9@v?^G`fx^gqt)wgf?xBf-@xa@lD|QnR*q9tP@rl_0Wl2a*lD7c;xji z$Q7c)gJzvnLgQxW2EspR%}QX@uI;4+B)H{7DG%^cOr}|nujT-=aE(a3fb`P*b?glw zuM(4IrN)u1F-U)4M&SvbwMik*Z_GH7A?j`_2VF?_yMwR<-SFl-a`f}QVCzwb#B#Yy zIosw8`}64md51OU%znNmvMWUYW>~_i9Fic2#IiPf=1WUdu+C=H{;=4N42wjk$mL;Y z=48%|je~OvVS(A`vATW;S}7rnx7dZA5q$7+W@!E$*nHMpgunUNz3JV9gzdZL&Oh0B z9)~}9q(gK2!M&nHg*G+$2ga!YaD{=FJp61?XtKszX+kFDo3X_<(k}t#UFUze);4RK z%1XHYy&qofocWMzJ$l=lR*lFX=8mG2g*8)3?qlZ^&jU7fSEqwaZS*Yj2P#zW50OdmT6U3AcbXSgWa)#flC z{eyCHAskYb+~jtD)}!qZ|Jt!~QlQHo zRb#rpaSNgl{sRA}rYX5XX(z+1->6n6DoNK#>@kSUadf^-oR zT_mJ9O4sE@#(p^7GCp!j9`DmEQL;_Ly-(a-W$S^0&Q3+fY>_^}f z7}yKG{9mu1*))L~4Xqh~=}D!l5u@on4x?bRD~)j>raIfBjoy@%cn17Tv2D?RW09#qhj)Y?*Z{oypD*k>l1zXVWY zdi4B>^-}}U7|ZDsJrP8`KjWDB7P_6CXvSy~Q&G`jleB)G$KjZ46ik(W&`7`u@97})G0d1SPh94e!0gorm zO)a6$vMz2|`AIS`&hVjv z1ZmqCiLt}_y7Z7AnTFpYxwWPc?N=-!IQ`HabYpR|M@pC|SD zprw+7GErwYnzDi=Y74vUsn*-}cJz|B)0oq;40kUas)10i*OL&)Ge$igjaHSSdE|(& zt`(U)tv|FxuyI7XqzmbBbrcQ8xQ1$CsV5ndUgd+Yf8H~RJwjRJg0$7r1zT*h)L-;HvW=u)OgE!=&Fau_074aWwowdNX9vbbnWRJ^31} zB3Ae3!^#&rkKfnhWkjy<#>8BcS@d)iGupPI$f||IVzTIGUJ|BiyJeMA? zf1zT;@G)5r(dvj?ckGYnm>ZWwy`5rZh=8W8Y2%KS3hTfN@G@9hLIokTLaAj`B{gYV z7S(=Amo>$5_@h(dMdYqU^4+??Q*MzQN4+^Ysidb1ZTlj}r_l9uBdOyRt4B1F3nmOB zv&?u)0eF0nw)qHwR6_i3ij39>Z%Np_9MN#+ca4=W>3x&;@r0W^=l0)QMrYA# zw{tVnS8theieo@w$FX0fdAyv@#;oOX$S19o!qOefrB`Wo@M$S6l0z)Sg0>yKbh|TIb@{5dYN){< zaZHevBqV!a<6|oPUYzMcH)}|S}k!c4F9)31sXm&o*uN>Cvkl>nl^A!AIy0vvNzs!QeIpycs=>Ugzsc0B z&M55a?wCS)VfpcPffmi7vHq|du@ai&g=5W9l<(J8civ`713Olf*C4hVoUYq45au8{pIq#k^mInG z1;~54N2B`1j&rg{m$f4HR^S~+R#ljfJ>GVqH4hAm?0`btxv}NiiYK#;WTfe41iH$v zoYkJwZpe&&!#_SmY`2YE+_iNmJk2C(G9#*I2vj&$F3MfRJWkQI38|b?Z1UeVus+R< zCP79|w5WxY3_aK4JWlBw-x=J3ox!HCPVrkGxm@7htN<;HjRM`M=%8G4Q+v1K5c>@F zkIl)9<%Ylzv7ZOx5ll|-u3dDsbPveBc=cBW03B+C3Ndd94#m#ayv+0435FBh=V)+- zkzZVox@Z09mQ09SjaA!v=2Q$SAo%vuQlmH zj|Lt8DQ|0!CQ2izAy5o>f(tPeJ%jW*ORMt3a*Q;z2{Eu~r5A;(LGTJ1*Y<^UH)2`v zA)n?Y<*%XykKLoDUkZsGs@@~vVWMdm``yHwhf3j^nPF^*O)i9?SJ5%TaP?7AM6Z9|1L;2wo$@qztM;d1z08fChtmfc-*@vA zRRDsxkt^~B-!1eBXH9QH$NAl!86T$V-H&nY@B=&T{4&_J0+z7r@<@%;wiTC=vW--{dJa9@z%Exn+E3+_EF4idIDzN=}F=KT3X^#i8N zSBdcu7(fO*Jp{F>-u?Uc(AOHX#Nl0BK#t3X&j;_<-LoI{15+SzA>Zq8X^^L+(>8y@ zxts5XipSv|hitAYGSRyFgR$_x+A#)2>3eL$7(m|=cd!x;>L}bk#8KFCckvY#AH6e+ zFyb)dx$*0f7{r}Az@gz;>NPIL)Mw4#>%FV(uG7bDS+RVbJ!a2S#Pn{M?kACoFK1_w z-5SoCZVezLFA%D+I0ztvV7Jpg`;Nn%u*<1VP;pvnCUuGR92a?tt3RMgMps2wSMBdy zShcQLQmxDuHyUIK3I(YUq{tauFhFrvfm){%e-dhb;oti^LqgH3*cZ5P+SXn+t+eCh zPN!$jaJRf7f#Ok1u%y6Hx%SI#oUiQBx{ITcYufYLpecQXOE*^kwz|bIrgxDS)18-$ zJpepq+vp!%ksG8?kWILCGe1!~&h^An9kx=rK=hwZMF}0Abf#eN48)jgCwA-N-^xOD z-cdZs+1c5*RNbpEub`3n)-AV~x~a&ff+ttK@0eN|xvM6tfZWO2;CB1%;6>xqNdf(B;(xV}6=}#ehxj&5lYhU30I? zV7%_lBDDXhTEZs2Dk&e%bBqCp!P2XgFbS1C8$7t`7RQ!TV{x(l8}aDurrF@hDg7k1 z?y{zL*#uwwKMJeV_s8(!=UR^U3I$_XkMY*(PUa54>F`dDQa9%|Z)#PhzfO?3Iwt$< z+i&{~7j0$h5TW!V8sJX3wyf3hyLPZ5V5`7nucvS4dBWlG;srD4!rrF^zumj=B=PQVv;E?ouRgK$>N#3)sp2o+`M(Lce^oO0|DHSi zA(Xi+@l!j8sLJ!6A)dZ7@NdLxxyr+*WSSgdYtZOh>N@h=cO zv6Z93rH&~bW-Ko7WYO!$Q33aG&KqOd4YO;bEQlciH`-5xh<39VckX3vm;{j=)I`6T zHoO7pKII5v)frauUcsA>nlX}0@+3x`OulxyqIc@UP>13f zcF0Q-eMNwd#gA7Sb}wZq-`0ZvrTWDmQ@cJ?8vuk7eWKm!^xf0bK?OR^f68ejs(4lY zV$1d^#oqD2kk>CKjt`N1la6n_2KsY;$15=5{*F~^!SW-QUhS=o!v*^ao|SM;vg3m8RtUumBd;i@X>?6u5W9 zZwb6`LS8ua^n(>n(y>+lZcl0+K071Kq-aXL6#JG`ll-6yNIR&&9kmAoD~?}I2Fs|N zE)G@dz2i(?J&%iZFT(5Co+lT$$FqYm@aNNVj_4L3c{WVgXmM?*_)oBFadMV(}w z#LBi8s#Rv!?(#ZZ97sPu$kM$OpnhLra0*<@bS=_AC)aKUATO+JTyNwWUEB#we8%dE zpLZbu=C2rz31;g=AJ@!UZ#wC{=C^>-7XSSCkOQM>37t0O! zx>ro&&lKsQ8JOzBkf)cA|1eZ|`T&d~46du{SJ3R~KMEmS&n;P|IxHp#$84GEl~+02 zB3}&98(`0Ybs^e9Zd_+wu-S@|!vn{arj_UV2Zm69?(NAvPv@ySgeTKFOc{QwPNJ(7 zHg1QOoq0t`P~h#aL%pmw8h8ISH!pAh%&P{?YP@>11H)?_W_)u;t(>)8OqDOTLHZo4naK!t&@Xkd&B4UrKKvWU3wbNU zgUOFE8tQYBxZ8~!PLyKe>IDR&&>ywoCM0xw}nj~DyVM=dvFH_mOEjq9%70XW)H+6GCjiNPn+7{iv1Hn<8i?`acq zQ6^=)Nih5*$AP!uR)*d|AT&0F(ML?SdUib&IvkKk7f(%NQ?&hKM5`uhIa0p_a7r8G z9$|GElXGO)?K>j>tZJ>2bGc~&>cmB;EGAH%nN?-6X>@5>FR|ThAtoFg->I4?%1G|+ zcPQN@!+$y?SB@4>R z`T4Ue_k&pH8h&VwU{eapL2k#8VOa@$;{BN5TjRfzeF~~z`tJ6aYq!i6hhwkclQsdX z9N{5B&yW%M-rh^+YfcQA?d2hIN`THVhi%czX)X4HJHRj){1x(PZ9k-oDEC0!igEmA z%P3+$iwP=T|5=OM`)AueQ6U=8qg)2lPA9sW++R1-&<>}))EsA1H7dP+bx)98jUIy+ zgy(Fyt^^lD7Cn3}_$A?y?1tQ)s-&fjtB2S1R|`sXZ6Le-ly#=B9s%wIX{6{6d-$fL z4K8j2R?2jqAGOlIQWS} z*2%3; zx0dec=UD;KdFlOe&PLlEkQZEPTY^jDblN=w-cB9hha{pG3mUc|un}7sQx_lu>8QZm zGCj6a&)rBfM{dIHsYeYn*y&!@TSE7f>u#CS#`$iF$|)KSAib{G%S^w@O7o%B-uyQT zxd25791auSHn1Oz{XtsH39UGDx=p=kYOiVfp@TKQ?|~Rz$qho1BJ0Ir)WyS+Su3@k z5jwuVB61x#6#G{;;@!EMf8$h(yOv&8XqmmaKRta8#BI19eYW1PSmWKJ*qyJ>Pc@=0 z`@N~ytgUQpSJVjPD`GTn3-ObW?+=fyTG9_rc!t_}yBF#wVP+GS*3lQ5ejrp3vM@>4 zimT)ZrhAw}t=D^+Lnqu^Yf;~^-XgI3rDrUZ2TdCHlpEea7Rm0Jy4<#%l|OK*bsusN zl+|*4UfxhTE-nkY-$pw~38*ywoqN^f&;136lmI0Qv{wuEk!N$#LC+j5!ZTCKt(nn+ zsqM(@*z(9wLY;qN5Th?6L8TnUD&_4qyfHHpBqnBTrQDb~Ron4R;;c!Bc*-!RxHrAT z?O}`@a7VSF{cV;r^LTDSS<1{0sVdx))4v@p+GQj_Ehy(Tduhz941YP>;M(&@>_-02H5bhRLUs{0lj6Z|H7>O2yhkDhx#PE31opOoq>`NKF!f*uH%mhrjXHR% zX-#H1vQ+=+BMAStG<&L%0e-?;y{_$oZUN6S&$KJuRp1AS_C7tIU5u7}KeyN0?-nJr#y` zyLSb86{R{DCXu}MTXlSw0Fi>-1{>8ut^%uW2xcc&1&^oJ@Luf~0%BwRp52$T;nbZN zdN(!-Ry1|c%l9WegA~E@4nA*^>!HtSuFrPdvdjb6IHre_^2C;lDJDbDTyHarWqQg> zJ&cssyZ2v^OE7_RH)67PP1~DZ^us5@!aeF#OBf ze0A=#arbrMcl*Ct%^^*HJ$$|qB}I_GNOVyi^V`xNXZq<_iu-Jw{_E}Q+$+LMFz64A zZEA<6tZ@--$9wc1f2Ich`YgwUwW`8)=qBukP9}y5LAj#B$hi^oPlTQKSnO<2_?X{poRE>M$9K?- znKz3d{Em!e;f7;)g*0>idNRj+0P*M zBS$*22}~Lv<>9{D(|8Ne*0z z4Xt!ag43WuY`(VyL-Q27(?j90)4xV<#9a%&8!GDjmQS*Q2V^y;fXrpn@{RRb(^rn?~oYs zf1$rL!rH)j_&qxZG)2DsxtnjbZY5+*fbvm6jWY!-wrU9-n(s1`5Bu}V#!Z^O2Z+lb zp6gl_(Vc8W~>t2#q~D!g{-fNt>8*pg!aw7aCNaO9i>= zk^d(`3Q{gXHn=DWh&PnwVzgc+B;><`h^T8yXW$=z1*z<606hdAdAoVuDiim|h8r{< zAJ$u^xz)12m&rTlIzB&?#N~bAqmcOyN$Rp85#IB z-v5$K8-LHH`7D7_rA$LRavK_E@Gs}<22z;)g+h5n`Dt-PHJ%(Tqfw8w`fB(W?KrLvu2pFesb8cWKNeHaPQwRm1N?4 z!l+Kz8*#Kqh`7T<(>Sf7`MH z`*rUM$@ChVP{K3glogJ6h#-ibj0&l+x@E$`+~YU{XnbXT_T{|0@739FI?xKQ2}(SF z;0smw#F4xG2op0TwBmb=vJ{Fi_V>|(Z}!)*F`@A*y_{(o2v9r(GY_xa#3V>xEwK@` zNa($S{&I6|2@~~c(SQH5pL~(`2Ne0`Dm~buf^=Gf(-*|qcyN!oI|8%AL%2|vO9Lwd8&h5giygG;pOeGhNZissA3e;>j{2Au4 z>&4f?F=dDul|UJnu8LdPX35dX~i?I@GnYZKBl-sdG^a5fw6w9=xdb6iFm zfay}FG6*2HX8vZ2h7FG)Ss}{MN{u&DX_aQtZIvc38RCtV_;A5DEP_}JU_WKT{j#vY zl}Y;MYuIYG&41I}!#o%0dP~%VDv};1W%`nVk1D>s-pq+zTa*l@#G%@+rhFAF)-a72 zY0i-CDK(RjKk1%L(KHiCui^*D*DqbO(JYqJD4gkNyKD$^9OK>b4C7&>h51q~tWMo3Y~U|d3CB$||6h#O7gO$&^AyTHK&X$Lb74{)l%n5=7M`-$SZ9I(tQEGH9EN${ z(e=#gC0WiR*r15K13*LY%|oO;V&8~1t~)c6qB*S;YC5tC8?E#S@gB4MK&>~6x$6U-s4?@^u*rl8!( zC|?i{+y2ixxMnQ(7Z><@9IJpyOILp9&2cUYgK{k7*&y?=P|YUTSO8@%ZOj1HA?gYm zT*O0qMJtG=ab^(xj!JCEEvgJc5KS}3FOJ6w!uWMS$v8X{W#O2Al!(~_78Z{KW%>r#0wGz1GN(0!)f4;H%<_C>$Yz$ zBAdAkFMd2cr~cF@x6=DT{Imr28c2NRu)YI=bqc}E`HSJza{K81`1Ao;5X18`mMK{w zEtWv@y&mIbTar#ocO(Fevfu$6C~HyE3X0h98Ixp#BTzZluUy7?J}DtO8A0t{VMvm zzn~Bm34mjhbwuP{r5kH%>?zhKmafg;_A88v$!4fNO?Lp?rq{_fI#V9DO|4mHSJ-He zSG%|k#+CWgeWoSp|EoM{&Vj(LTJ)HFc_$<{VV8MqzhxVnRVX@s?|#Erb>Nkvsn3Gd z0)KWZo!UpHZZ3|;taGSoo9@gs>Kbn$M}RxFv*)Jn3FN({?9c(3x>>DW2u^%6!5gO|ixvv~fT`6Ls(R(*F z6hF)OZpUZq-#VE{5-}?Y5crbxW(RBqzELo`W~vNl0=%p^8wjL-(;p);d2{q#aTA#t zt%v4v8|LWhuoExZ(p^%P2DXBteJYZ?Zo~azw*qqyOZ&l(@V}{U5QihO+(}s^trDh+LXn%A^qKE@RrnXQBgsW7exMI&{(7VT z*Cm#un$Zqok-n-m1b`g_q_S{V1|5#_1tq=TXw8+Y})|@YBi%{TA+_ z=U2C2-@(h-+g~VP{;h!nUo_DEII~=~LYW=$lvt^&q5A8!(+KCFtKo4zFpU4CewE_`4)BRaeH)dJr|kUaDV8yiCa|s17b`)^=kn57 zN5)BtCu$%I*+K;Urf-PCZ8ANT-|?{$tN9n9C+)+cX4G zH(wfu!$)2o%#xHA-)|YLMXnohAs1+S@ZI}1axX2uGCJz=#RGiY(0rE}D8N}l@N(yZ z_en<3RbO-Hi4zRY*-!DJ_h0ynW08yv`Ss`v9`q|04=05rfQO&!plK-?=WC$v5xs#( zu~~Q^U~$TL#i32O`Z?jn@nQ`w^iQ+W_1(a_ncP!ZtC>m^$f@i%HQ5z2=+lFc*iuAI zw~G-ZzTieSwPj3}>yULfcwseI>&X788ttFP z@a4lwbL;)kc}DOoRz~1E2!}!nwBiS11_c%50dLZf0(i2Imu)y7`GU8{aG#;|a?x@L zMV)xPiUW*1lUOk1brNv;1nLiyXPLU^iCNeT!WT0A$U^i2h<6ytkLLj{I9|k3T&4EeSmqC=Rr#G_!bl-G4lj@f^(1o7a;d zMy+UxJ&;IRU*)w@qe%3MK=po;MQscDOv_3+Kv#Z`+o<;;E`@R`qqcGLty!)I-MNJ2 z=-#iT-0M@Rizy{#Y+e4%yYE0InIux-3tcv8A_&g`E|P$>P1E-J^YN0h>X!l|!^&f8 z6+2;^6K3q9qMxD_f9(9Y2cDUDC}_atd@)kf?={AnvO!L4dol2@+MNw|D*Sw8p%acH z8|sMiwrUc+Hpz~Stb^^$NF1TYVD~y)un#N@cr$i>u$?`f@*C z*!_MNP0@p^b9GPZF*oS1Gq{$tiI%1WWPj|hUxP9tbC>ngZYc;aNFaNa43tx(kJuk# zPoc~p{xHN%yntLQ?{oq_i8CymiOMV9nEs}yt0u2xBBzlb!&*+bZ z=-KF`TQE3p*cbFTRWPK$CB1I3EQS=z3`%W>I@@RWc{>$rB#~P3N=;AuJ^D$9561!W z#m1N!0tI^<@WC*6AD1pVh}kO!4&f|Zgo5js9S$g2@%=)pUEWl@_ z$@pN;>=%>i0{cMA=fsUg(yiZ&{)hdVN%HX13ar%dA$qSr?RwVa->+1*?&#;%ZV>46 zn_Td}w%E%4@w&o#Ru%Mu`8eq?FpzWud=bhh%>x3*!{a@(SA$Ukm%%|;*siHz@R(73 zy(<&tk9MXgru;{*G6+Hmi*AuYcwuFGOb=4<^@b@wL9)}1^cusb3bNMO1G5Gv;DA)& z>c1e4nVEiWeyLG0xv$+SbYyZun&h-Kjkop|Q%Hyh!QL^v7ck*C5cXfS%inBj%onXz#Ra%GVm)qfZ3rikP~`z>Qcazo}Lpo zqB&W0l;p`+H?mgQ!pp`LxR8CtS(f29Z;yX&=H|Z7yOnJrokW%`3(9`p`5kR2mmqee z#QVjBZ@En@N15YpWnw79aivIf43iU1^3eW&*n97&rnC3oS4YP(sMta3SW!WW^qNr= zMgdWgCM8M)q(%rWKoT3GQliocWt1j0(rXeGA@qopKnO$$BtRetA%RqG(3#P5f8XCZ z_pEi-J^x((fwd4npX|^6?EUQL{eE80C2OII!j)QzU_h83+bR3wzqDNc^Tu7pm5n{; zuC)ntT3hM?S2^wy__Q}mM_bcWv6NdJXX`>y2b($zLs`F_6_R5|9SZqt&*oGsbxM)J6LL!~A4&Qc@N38JBSdVzo&j`=@E(aO>aj_2AG!Zk3m?+|2wJ{ zcTd=8xRHk5O8dzn*0te#sBV~>qM$#E4Oo2YSmWXXfMy#;uH1PQJ!;{R$tNeE7Q>3W zmB_k9HK%JdnL~fzB69xO^h-}a%)Jr)R-pavJDl&^h3`VY%Lt){zdb6_vJ52&*h2UG z+2QC1j;Qp!F@dmE_${EAo;mtdc%(dPD9JIB^P~dWRQz6WzVbh%H~q~U{Y0A*YVYWl zsWpnD6bxLBDZs2^RkHpv=mB~8770bav81|HfBM}2CL`_GqqU_ohWs&P*^KZRB6{ymBtc3Aed4%z0HoK~?( zxFTI~)-<%aW3g3G9Y>P3*0BTKkQ`fI;^sxFW_<vXK-=mq$9*7905g8^iA6RV0jv7ybN^EY?{A*g>z!7g z$vwGRHpy4-ws)`Fkr=wkeL8IT_Kx5kDV9@Zmu#4;J3^T{0TG&Y3Ww#pWYI0eOSVnC-23AcvhMBJS^)Bp+qiav&6LB;-~F}|znq3D`S^8ZB?fmq zqN_}@je6`LW%vb9D@B(XdxalQ3L0}~)z-6W0gvE0`trb(0{4&%*I=f4INi?X){sD` zRLgy<*oZ(ZWWUc5M@D`DSk5 z_Zq$Z23SyJc%?e+fP#`)Vansu8B>`zpB$?9k|+qEJ)VFISHadaU@h#CBQ1lTA|5Vj zy~=o^pDE5u)I4P6x}>)dAZxzg)7EvR8>j{R=b${IfiSKg*0=r%*0gS&*7sG_-=_EO ztmXNeZ#G?E)oLGvp{`fJ%Uav!5-G+Rl=d0?oJPJ6OLMMP^Q^>g`4CdUX>ZwS?0IKW zqISIY9AZK@hKXw;M`p0hXAHG9owx3!lyA;9S}!fP8JRG+fI55{UBCc_RT ztK-WoQyaZ^_+?%!zb@ZwMluI>{WPl^AAHXZT-Td4Gc?$eekd-DPjEueMdNDXnKHGy zVqU!vVIt}QchrdMzTcSHR2QeDmyjMOZ7P`s$dqT|uMfDyN#0)=i74=Usufh-;1ORaaDy7PCV;{Uk8?qcaSO4Pka^Tglha2mT^*!(lMuLG-zBh2Q`T@7<;Ku;VaN`!j_S|L zxQfgVTgTo5ry<%S+K85g59I2F{9@g+CW|s~ubj6= z%KtBC`ompo<%IvAQ*8gAsM-0i32^#YICm{MY#=E`UWG7i8n>rs{PfZO1x{wn#1z|) z;$XK&Pr-beN0+;tnDzE$#0J_WqhPUS`Yw36Tf1>Caj7L*muyNYT)eZ?#3x!~CS9A> zs9{3u(YQ`svYHt76`#Rv^Nr3|`spJ7Mj*(B;AUa>10SXZAiNU;A2}}BK*g?f8HjwA z`>5!K=pILRiF|ASIY}LWl+{Hbn`W?x$s3e~i2q$_ zJM?2Wh0@TcG&uT6tT8xwaNm7&O6fsunpX)I4%l~zsdNA7K6bFj+r^B{xBHfrS-LR4 zOqiS4#Bich>%ljqSegY>Suzt6JrllcRQCnT=?`8GnJ!KiOSb?(#g|LYNF)HqEi>eb z8F1E$uibXQ#H3S$kX{%+3fPD=|DYDcNN+^XFtAbxpA^M)u%#Z`<$mgF?-~iO5U&ud zNFLJqZ2LrRGO0aEYThxOnavhl!tC*+NohDK|o_LyJjkg15y?pYIdxiZs1- zlEM67twS~*`x71{CidaiVL#&*xvvb__pXGj`=&HhYa%?;8$e6NnuG>`fa(YN&w^y8 zg_w(4ptf-X+X6req66eujkTJQb1b%1ZDi0WY;uXugcJ+J6xJt-C5?IWehoeiB{~RX zCUzDp$W&(Lo%PMeaXr>BtL?HmI4sXhdpR$fawkPV9Z{^8x`az6XErgJ!XB3~MFgK!+;uC=VNyUghKNJVimhB=0_#|5krl$+po1v^*G-QWNaC(8Ty(LRuxn{ps0swJ5Za z$D3M}Xr3(aTz%C0gpW8;8M>Nn(!dCl+zlq@yH$>R5K=Iokc+_|+@xnmpen3F; zaVO_Y6ZW39!McPNefaOB?5m+ry&BI+Y6~`;iz~4?3zfR(kMD4LQGz=RO z4x*v+cd*h@xe+48tTkBe6d7RT`QOUe6kJ&0*MT-64XkdbST{ZxSCMuNg#$ErC%QLG zV^_bX^Qi@38FyoY&|!Il#q_sLyOjnMwY6G5uj70FO@ZVMI|r!HC97e`Fuz zVfkNbiR715`%$aP$UmyNjZ2^1m)$&!3f7?Eu1^F041k+zJZelux&{_RP#r8`g0bM` z&IDvyK2wF)vIh{NI9BJ)!My%YK^3H6nM|<8F~)FyNzl;{Gyu^Hn{Lxz)}_OJ5)l&$ ztM9%+v!9CTrF=+AF^3_BIb*2)2PR#CktOQ7AR{C zyb~SodPk|ue{}~{?9lP&PA_*!gZ-QX5Hp?Dh}0yj^Qe@bG_hAHoHgF?- zFh&Ny10-H1FoC1S_6(^4bRF8bf|(qj0RaM7XL`vPDD9PD(30)4t{OQ=cWkxIC6c>+ znPuUXX~@J#0U1{xDO@ruu3>5^Myvl}GG5R_8fVsgY%`5H}HY-CY%>7FN*c2oA) z1MU>SgUX&lnuY9XAAeY1?J~%(0Vnd`2htXasjat0o;Os7=(nzn63I_egw7_xVCOp8 zCBc!_+BKN8_bha_h8(7?E1+znmGvEC5fiO%VJ?h6@Q2 z)YjWw6ozQQZ<*7HZbZu)(wST5h-70)ySeNJT3KXWw;?=9{Er*>oQ3Vn<~LQ7{^pnS z`S0W`%@r{b-53E`Gk+M>vD!M{kDbx~IfDPkCv%>Cx;5>2XO+ z34 zoSP2mySdNDWOG`=wE)-3$tKNI&`8;zlR^9UVAYAAWF8BLTk~j1+Hyk@Gd?d+i^m>$ ztm5SgVdUAZ8px&MDn`?kpmeKtZRp922MRNg~*J+I4btpi7WaYAE|!zrMxp< z*)$qh+cPQq#$ZjHZMy9H zT;D{;&(iJ)tKzvB+WHd0j^DI2r z@_rG}>rrSTEh7y_GqEIAq}!Z;Zir~dKSL2aEK6yAlrJifG=lkjt)uuRTVLB}M56&! zKfNWK{Xfq2Xlbq8dp1-OjAnKBC!L`wqH{MTyAMG>RSd_rWdt^oZ!b}Uf!QcHyOQug zUDF0sdn1Shn%HPlF0ZM&t5?^5WD5)Rl)?OJYYsEHj3Ib)-4VLbAgDTcuOyB~4>#+80U(xkS0_3q#^Nwd1_ ze!cg5OY^PgH*>NR&JnWG9d_fN=b~fsnC%V;lXuNFvC~Yh{5hS_pSc6S}IY z30^s%oQnIEs`&3M+yML#4meLunmbeS%#z{c^4?Vx?q2Kbj<~{4#IJT6iYU6>_^%r5 zF&742_B7&Da}TnVevQ}}I0!OGE+1cnSO#9132hV1#VBcp^DW;E2l^iZ8qD zY-qRM8rZ!>B`YTf6k0a@0k=fO_uh6=PPT zeD0|M>0;xTUJulaF0pd9HSf>HkHO~}oevk@oLXfTGfbs>>W#Ci^RYPFq`rrx+iRZ> zqFZMIi}*3+Y6T0MLH&vrMDuxqcdXXB=Try#GOC>|z$9xxz}9Gk;M<~7QRZw=b$k4@ z&URaj(dB=~^ltr+u0JH@`}HXT1)oIsZ_r;xvnQBRbS08F7N_Iu;Zz2v&U4+lewb3ERDdU9SN|Z39DDzhDiNM_0@|BUD`oK zysg_Z_t?o=5A<|p?)z!TMc*^kYq=Jy7pL6oezA-r{Vb^ruPv4aL$rC?9;R&cn%^R> z!qT3cu)Ivfz!yzISDtHnIQEI|XlGq67dd1G;61WBw?xSq&$@PW2*TE!9PEXK@V`;7 zsqSYy6+@!u5$|1UJ2+QayYcG>_D-)FxZT})_a{e|`dYbT&IUhGc;CX%VM)U6x6D|s z@`&!EH|}LUPdH?O_M#RkX!OZY$e|ro3F&g8;xN{H*RQGje@+PIe7o_tV#mQ2Ord`9 zl{#4(xc_q|nt!5;!jz`XW4#Tua8BMrofB_A{N3T{+hdfD5@&pS--#E2=k~JIM_B`k z^Vlrz){$+#9g=|AEOI^Yoq=6?e9~g(B5U-qQor>~zs5e0s!ZRsM&{;HzYi}V3JL{`D5lxJlUDr0xBB;~ z8|k>T69wI8n~kn{{H3LmQ^T(&cp2F#W?m`f?cBt;6L}{2;57e4i;I@Jd;H=;q>({% z9FHUe-OY+U*`szG2&lyNf(sS`meBGIPCwS%zg@&R8@xn1p$i_~v4(wLExZ3{mM*Ch zds8&_VH|I_49cWDxuP7`@@3_IWJJ#DtE~nJTv>c2&kwXknCl+lCECAuB?CoV(c47a zF`D%At$!=f?_IBj@YMK)WoS+n&(z`b3T-Pn~- z?+Kky30;pHkr_*Sc=A4?@Pw)+{5GHHnxEv*e~`qV#VsKQleUp=Ox4g_wN@L@Oyh*KdvOQl zu2o000~FK|BfK-e=BP_2c^SJGd6?zfzbmoiO?Pu(YHTo|P?f+1^b*&2iKcySR zy_^sJ^JK)||H*VVMt@sjzJ58k4ER!p3RVbFE2Nh8n8=Y73{eUIYJ8rMQ%$ku>a9^_ zuDfp;&E(vVOFCLxRdEF{^A(@6=1`645(nI_fvtN(lf)f3#O+bWIblOCZq21Cry5-- zJH%~5GAo}gPY!qwghqc{b@9)?({pN=E^jHp=MIQ_Uqi0e){a94U5r_SL*~I2d_eU&H3TJh!Nv$GV(QFrI1U_Hgm}~55 zkfyKEQ@W%bQaiTi1HJm*(EEt={7bxyokTr900aA!$|>>7MAqP-V-l^T?Y(7w)`sOe z(F0;y;eB)mOtzQ3L2wA{L^dya!jbD&%TAcHp}RYV%g53wQ9{on;wi@ zl8qD0))dc2T#aSMo9l8DoOw?%Niu>kWfEN2E#XGPl% zjl424vb@=(K&;b*pK*P=d~H*!LYf2z?l;ft&RG4ZQ!m*V^Pp}^g_Hxs1#ySSzikde zp~=9*iU+wl1iuhn@j3m@A>_%%bG1Y|>UXYtv19<)yy zY@Nj~3b22nakgpkRj5P4r>L*9`feeSxX#W=w!iArZdO#rpV*LQejRDU1?X$^pg|X| zN)%eI`@SAHIojis(b?qkwr2R!SRAV)lf~gIyecn$(WRMzn=w8gw&OU4AkA0!5MCA& zamN|Eyn?ZAb}_;YNBG^_O3)YSkHE*Cp!aaEFKa|%FNRZU$=!@Rs6vT<1THR4kn~-LZ%NxmuC6pjHBZ+urnKv_N9ZgIOVIY)&>cDl*6T zV7S`-*-fo2&uND$BK?QHKzv=ZB0}cs?{wAU@C4v+6agA8${;Z!?zxawBSZp?!z@-q z#U6fVwpyOaQhj2!6F(v5OWj71z8i|K*+l@ZRCguu>hY_dC@8t$g}j5I&>3aCd@`Mw z<97q+Pkcy6ot&3gAU9+-r4SfU*d?+{kjbO0<;WgST~pX43x}rr43dn|A0nio8^^_zPU1=PEk* zd(*mnDm1F285*mW6<{*Gs-6Plz&^)=+5(hgwNn)LqoBFk>`IfPjjiRyy7qBz?e z=8_c?V5`NNQ|A<#b>rf!x;5jVvj&NQv%7rydMXi$Rnpwu^s|-bEh{dnkRYr81PH;D zb^qb*4C&HBgj=0AV#CweMjs(NV0qjNAY0**|3f{b!})IA%Zek%=~v70dO*Uuc59W# zS`fW#j!R*drx%bBUY^Zdc^h=t%cuxe<3DY5eZ1U%wG-k(Yr74e%*iXv<`fQ|$CHEn zGh_#`ek1M>tJ@^@+;mmRRbJ%pJ(9@B_373%t4BGIhvnvRTy8)g^r>F|^(4@2hg)`W zu%Tki^*#^d^L&5U`5xt#5U#U$I^ylvj?PGF8>eHszE%ViTc2Tm)62jzFQV&YUoE#j zNg@Z3R(UnUTW#r?arO$F=@t*u0#!r*{OT@BRZ*U0gk*UWwlxuVau=5-y2eoZD$7RK z8EozrSlnW0-Pf}dkY6=^byt>+V%5N>wo+>$zJb+Spt`P}G9--eY-RY4m!qE{vGIm; z#Y{sedM8o8`%1c^vTG6{|BVvzJV~FpQeRlVB^GnJwF7it+K>>_^~uyizga zAZp58RHcoy91!`<=%R2jix`_EZ?ZKbQEN9qPy5Qan>EmEb!4j zMEuPMekxeOj$zOOH^r18gA|7}2!XCi^u3T|AbnTtn9a#~1#Psnsf%@n#mm5Xct7k( zK%~(HM=2Y4*=iFQvwNbUgZxzc!eCMRu(u0#5u#XmJtf?F1(b(znr+ng&n)&!8{4eU ztz(xTARYoB7{XMAi?>@XSjl3}vCsIQfdjANLwlyH{YadWm@IoQ^sm41 zBaRcT{9DK$KJ;JbBn?23Fb>9FTO*fcqfw1-T&b*otsf(F#SccvAAILrdDr;?*7$D+ z4nw9v)-KtcwS4j2Yxc47o5ysI&HYt>0{;|fn3+vr6>D%NYHsj&bJ^e0K~m;&;ON zc=TcFi9xAyNxDYQdFeq@=$BH|3ilmq;=8@DyvlCQ**S{Ja&Z0QwYSzTu@WYO) zrBnuXcM(%FZXg3JW8U=~u9B}z+uhkBeTeBFTXXTa8t%z~*b`kZn*eN?3F@@I473Ot z9DPmnE7Y-}=1b%SqIpYpixXaHN8S|Io{FvkC2_2cd%75ZfnIZ*grQRf^vEe=MPoP_ z3pv;|<9$hs?WjK`-eaVRYIIk(AXAws}yyBzz9pk>c!Q=e7 zK|O--vY4Meqh08Akd?t)k5Qaym|L$8K&l|;`i6AugnA7W|7`Z|L2;34>&gj(f(lsI z6&WXeN$ug46Xo!5CO7!P^8A`Trg+FHTp@7wqxJ4Tv140ru1>Niske5_aL+ECa$A~$ z<$dH9?$;Lil_Z3lY|*fTh2Crxw@(U!j1@JMt?IbVW=X-ar^5@ixBE>-iW!88O7$@T z!PKZgjYqMK@;SykJ5lvhqE0%dT(Oxn$w|U`>V#(>gVG#56c@Wuv~8vcN&&4ah7SCbl8|slzp=QX&vqK{(4EHn*trRqWK97 zunm%q+X-&4EAl&E6SDsTGsqT@-}L)Y#zRp;#V3WT+mNE=^Nl+Op(B%yw9;4em^(0E z_@aLXaeKSbB)0fZ$Ubqe(0)jXg3^YE(AN!)KtDJe@-$wzW?sR5@@8ML^ATuQA?WMH z@og(mJN(%$yG)(2>(jj3FCx<)2PUP2kDUgO3MLFBtK~bqB*U>uBzXGiedhCeJbjCd z2f^e+1#FG-8n|;(43_mrCf#X(bx~m0I?|#9$>`7T zgcGgC>UbTnfub;?DB?KbS4GoEz;*n|!K--SuED1E(wRmB64rPddvRqGAsD1qeT!c! zgXY?l#tkhWOb#lEoUOtp;eyZ~2#-ZbEvbE80^{=iy?*C17UmbPuSADiGmH;C;h$5a#MXkh|n;>%$t=u%6l5%FBg1_{$>E1FSC#- zGo8#l<7nWYimN`YNqjb6;Kl!R*mhOaGfMiMJ%_5vzjAV$vyUsgypr^+bZ^&Z<_`KL zP9!guR8`_kc&w&f+xy-NT$tU(-h*B^v@5#`C8a2Q@9-Q0eZGXd(IG{+JCBY(h*NQql=?$o(npY3Lhi~o$7^TcBYl1RO*V%xW7JAa!5cTRW;#pdoaSU=E8cPK z9y`Qw3npnMiGCiPUiizFcF@( zm76L_*}EN`9sT2)4sgM{SeNzp%ms;|=;wS}G(Z3hzvWQp@>|j6$>#DrHVc!0%nl4? zck(}_=BTNa=4qqH^lq(s$qk#ZwlNR;7{}_rhJO(Fd|H4(_gh2_lpR#F@wr9I^CWEC z#Q8JoHYoOaax~6@yLSSV2AOxvj#S<4n1yy6G?6d%L=H1<%q3)~dwc>%X4J3)Xg)ii z=rd4|i@Ja`M$lNGYIDTF7xYiA1y!zIu4ce}lXZuNN!vg3`{)IAZMH^4V-1ckc>k1J zNHp_NsN7q8a_b(2 z0^!6$-a}Y=DLC%A(z}n?nRZlH^B+#iJAft@6+D`Ho#Z0s*fJVV^l~FGM)0=)gIPQA z@6%-syO}zH_o)3#9=*x-Ap7fl9^Tp5oU(j#pA-O{);K49XOo7tUu9+h& znXtn<@$LMj;D$R54!lL;%_V(3%5T7exPdlDgOvBOuY>%#(n7xb@%%C2fuj653D6Ux z3Fyq=K@E1;sC~{7P z)wP2=AlAHq1fFBIi|Z$hVcqJf7uZH;X+|#ZM10bbe&W`Jnz`5vr3qLOZaZiKjNNNS)}nS z=oE~5`7xZtZ8J)NTpNiOxeIOBN6Y7t74l zIQ>rMQ^qk!ZMOBv54_;L4BZuMT!4|=DnlSk%@Zu!u<<2Q z&sEns)UrsSbC!sRg%BI~#GOcKEQqW0#{Vk9f37w_{eDb3}MF_)(xAQx>QA!lBWjftx<(U2+=Q zWiWqaelc)9Hh(LwbvEJECFB>!;`y@S z!MDczJ5G2aAf!g)9>};-GJx*eE+~zUGDJkUZCgXZj;=tVGEUI4K$F`G)x=cm6&h;$ z>PC!E>Yhl-ay4{S;!n}5{u`JnE{GHJWMAXs?$l`EeOsH<(82uFK9La(RKQSw@zt!D z8Sy#p4|ZEy@hiRn5amr9}MAGs|~P72d%bqV^4 zp@!y%t>H~q?;ab?_*9RA+2=x}QHl_gEZPGvG=_OYvqMI|8zlnTc!jpYi5N0 zd?j@%{K7M7^z#}2ePr6Vx=UlAe^ zTKX(dn|2R=SAevS{}(BS*CMYt{s1%hE3#Tz>wNXJF@oJ75_1uCLNs zr39K6ux&!!7_ey>p@yY+z*`Lp_4)#2OBRg1w%Ij4YO+g9J<~_h-As%z+-Gg@8P;XY zqqYpf8>wH+#s);leo)7QedY6dWtc}MA%{GxV8m6TTx3 zqTF)Dq}C^V@fb_}W5@@{)ko!nr#A5a3QwFnff?NG1HO)T16VOjjIWTD4$=(l!-0}7 zIcHKW*p9z^DFv@Yh~9ZD*cHk}Ox;Xg20CgghY%(=5}EpGU`yN?UiADrPhCg>PL? zEsb=U63i#iO8Hk60zWxK-{w3cSXZQYIEWL9t#He>Wv7N?T;7xjRqn2Ejcht4*pY#9 z>}ut;h3&<{%ikzcz)(b|Gm0MQrN*UpXIKQE{CgiV*uS_&N;F&=DY<}ED>4hkc$5Pp zDBsQC%qKI3_DSpIVu9|Ly*2v)OpJ}4K%p!}*Ek}U_)%oC9LG_mTpZg{rVz98-lc(C z=i+NjLj&w6(2)-T!inY!qg8&Hs3k_~_wt7TxSyP3#w0~>KBg3N3~`XPq7(@=GJ2w9 zO`49m$$E7et9Lu@FtFqn;_264Y{G4>ATz7Bm+zSw%LOd;4F}aahg&jyVO^NNh`FA#z9ww& z)~JO(*zb%ur)Y1{g)<}_K`AZu1=A|wCFEdYr^y7==`W@^e*d_b_wBYjposPU@S^*K zQ3iU>p_zWBgt{D^(I_THD4RqdUu2i;@{7gHQH!X9u!nd*ClF!MK%}!LVx`%A}6QRXtovoY> zw=U@-`q)Vt+~|Pqp9~C$fq;mKEQ!hCtbS0N@!{phtjdy+mu}0qAmVkPjTE*BIjE4p z7H@Kl%g9p@`;~5rNs(OcJajS47Ct}?>AKrt4u-?ZGl0%cX^{GYTk#c`%W*_8Lgr47 zDgRjZNy+KDo5+0njntH$-nS&LBBO$qLFW(BGXZ=<*!ucoH@EkN?c*73XYE;VqWeiX zB_pxR?}L3I38BWdf5d8lrT9|wM~zM@W(7HG;^vGNQ(;hps*DHK`@MukWH2ww=wi{r zoY_}^ccmP>OfN~ zb4;gnXY&k_=Ss=i2MvC z=z%wLf)qkc@G3nU{}vpsX$9^%fCHdL+fOoU*jH&_zlwZeavbIL4TA#M$($Nnb-PCR zqR_eqf)G2lNWvibRIbw_=o7Nw}fTaEbIRS^+-VZ@}{LMGHV`w-QK zG_8%k%#CNc*fP>|Uf*6mJE|ICle2tPCRFp0-svWwNBjvzO-1zCffRA?^2L5|PeX{A z{2AvQmBHWYO`rfT?nmz4%d98C0|pNzB}N^ngJ;<8O;7wf-#c7T@*C^m{#Jg(uciL- zeD58+wN1fS58KN~pZR@;^l;1P@|kMSSw&?Cqj96J4^8@Xg1b(`+M8nZV`NjNkWu=NsGA|UAMmo9YoGQ3c0TZNlW9=%b z^ol0ebKSNR=aLHRCb@s{Yg!pRO`B(PTZ7}F=j4ZRu}b211eTUr0G9&+t6?(qL^<3E zr@Ku=2!mI}o7+NVi2WeZL!I7!_C<6-8PdoD@W>UXD(QX7sA#n=SqPnNqi5SE1y?`} zyqpx2TH2t4Jq{KNkxHHJ@sCL1*Wf2xXrj6RruJ)R^8t1==Uzd#y}erh1-=heYp_Az z4r7;+B~hWF{6VAIF6$PqfHC6~hL6Z?Ro~{a@Oxug% z&B~F(E%(G#2S2S>7<#ZToG{@tL^1gbPu$bx#zESSEg8i?ia|kxo z!Q=z%Uts(zNl)rd_UpMJ)2PA1_6F^fp>_zXwBv-p!JR~FWD?r6w&%=+v@y>)y*vk) z3iQR%;E@2IFV80zMjAWl0VdY<#{&IlWW3(?WSe6p3$JBVc9pIrV_KXYM#dY$!h6m< z>8O=101!2L7FkuX)=2PttuJ%mqJzBYLU?IGOyd*tCbO_0_=nU$Rc=J-y3>&=v`eXYU|A_uN2H z#Ays37jh?lZtrl^xzzmwjO9r5yc9Y?Sqr+cks8<=0m)&Mf<2*Z_IBcVg!ui)~;_(sUuF^ z6diiF|Lji^_&+r>Qet%Kzm`n#@4vT0PQ`6`8TJ28aoI~_PoIHPYNzUx;&=;9!8GLrkqBD@!J) zV0-ZiFy?!c45jz_sO$}xs`_jSd58}~e&r6M%lEuzIZ$K<7(*rlaV9{{GhTH|I9B0E zmyhh+v1TcMcCU7=;FA=anob!D>NHoaAD|2(eRSYs16HeJ(BA^$ZZPsJ{HNQT_)VU* zZse;=wZ)#x>D6>=#rAIQjPl2mB>b8jo(k%#w=~y>fS)ad= zdPFz4=}e7tDREIw+IBx?p}Q{m-NpxrVh93`0J2PP`$YE%J=yw%xx_WZ8Z@!ln$!~a-?5Iwzqh8y5_DlU~Lr6_Dy-T3Yh~g;wyQ>mlR&duIUlC6@LkFbr zLnMbIEk+MIQG)rePe&!)G$e|f7$hJ^SNT)jqsA1oH;thde|v*x)qadx*0|arQ4DL= zRC6AR4-E(|QVWtjcJDS2xEIKl>MIUe3?ouL2XnA1-tT|q*ARM!67XkRIA<}z&w&ay zu%%zGYgy((kMPlP(E~-LQxwJd)&W)~w5+_s8L$f^KjQ6DaFSpD9GDG>VE$^_hjc_H z&>ecLKA=jhnlDW#=jdXe9w44Zkj)R;Z$C^dlyiC!v(v#yf!~dn^cm?#AE8~P-xMSH zlettsRF;0BzHa>`yf5+Ml4GH)Wl5=M=JQJA8!^4hePPH)$#punRwQlLjt}sUu0H~5X)xiO zL~Nkfjcu+_OIy{NcRih-Thft(5NR@GR-9V|()zX#i6Y_&M9-BuhW3~Us`T6^eLkwj z(mI5;AdoMdwl~5zdgvyeDW2aMZ|1SDIcJn86VrIzG=i#(d@$@QXa8r8mdqzpKbgo8 z>6k1hV`PvZ7e~%Wngi|dA1r@O^+Wt>W2ia&_iV{ubFJ;7ed`{P@*##jx1rhc_8YaU z1;IHdE-MzQl}T(kC}*L1#3}!-+i~oj07K)NauP>vd?A9ATk96vnS|MVtj;ouW@Y z>|ceB0z1!!O^5X~ZhF><2|H?ZmG?`tHc!y<7IR=66>!Sf zBi>3-XVF{dbFFq{%)o2Wz{IW>otlD4`5=fjn&RREEF!MPKPT9hHCwYz%)e00{}jGd>PHd8!SwZ%R%-{cd+no~ zDNQ|=^s4wmPwV!D5|OP*EO*Al4HfBs;Gk+w);@7#x*cvyVeQ1j1)FX!hr&0{J-c%9 zIZmqS6f3k94ese8-tynQ&!)wahE@+@iT^Oj9|rw<=B9q*4Sn0FKDzEwJ?CT7VF47> zsJ@kS$<?nN?3{U%@#Dn5uy=4YKv9zcmi&%UTRz6y@@+c2q9i@!yn^W z(QSt;+)Nx5#-;5hTgwoCcd_AXSOb8p%JyY)n;JM!*YmEwMI4R0d1vf^ z@j@z!3%W%YX=G^3Sil`T@e@38@~&i z<6ocrLkrZWA$#G$;8R4{rFt%kpmCA@5>fVd2w?NmWRqR`bt!%J74(Z6=H~7#)Rwvx zrdlLJV#3|y37YWd<%O`WdM>^jr;Q!EyZ+Ge1IK1oo-OR0kwU*gqKf_8a#?a6=#D3? z4ipv2dimuNeve`UDsr-GFD2GzIt>PpEhqX$WNw6Js_5*($s=!rx`=czC#X|n5n7bW z=Ajs$M}lD28ENt?VcUlz)Cp+9TpYO|;6TJ+0?q5r*!_E9B^kLI+h|?V5&2CPx8lcL zx8vrv_YfG)i%=;ck|=RyWimB47lN5v+znii3rdgfHcc$xsS6DKoqVFg%5@a z!r1a9Y9|tEb-e5~`zmE}h{u!ir$@)Q%2WK`CePw3$F>`d32Z&|zmLz`^=m!Yx3Jct zBhsGVqzZ(;b~4?9!ZloWk(8v~3C}a~a?1vA{(X4Mg%*i{aW`%WPE43o4MJZlk0~BC zX4R;x4n@ZZFs=994;_)3+TKdAN!JqC~>k1>B6h*Nr=rMo=193xK12RjuF|$Z=#=)eyp^VSrZ2fUg$~I#MHKm zvPyaarffcx(q0ehd`OIUObW$uQ5@=lRGWd2^DUqHw+G}wwgyZIIu;h$SNF0KIQu|4 zjpZEk>%ubf01ueya){l%dfAIRmW&J7H#pIyalCb10lFfCwA* zgFtGI`Rx(aY#;e3ZZ8kpHass=EDA=+Wv3V+{+Wf%KSo(1ckAz7s%6<|HA{53`KCXPxW2Upoq7oBDtvLp zQAVPEVdrg-{}D!)k$pf(^5Y8!v`(~S{P~GJ=yT|H*G6UQq=v*JleR!v!)NG6Y2!Yt zm-xlElnS2~bRxj3c|)=_jh9YAZo954}SM}9hhRh96oX!-!ng^82Z8MUu;v%+Twf<`Oid5~kB#q8ma z(0N)8WaQc85WT#Y0OVMco`?vUYw4!pzhlm+D|*?t`!BT44zUQzMU}`zI3Yg)wYQm@@XIC zPa@DZD@2~5AK!8?jJ~jFk^KnKi1n_f`IQjmfWvYPEZsx2nWHoRP%GZP`>_`MGGzbT zrgM+HhUB;1*MHGyx=su^)y&3F8viP7DU zi4Bd*FIh}wB<4#NhUe5cddO!k(3mjH&MO$JHw^E{@qL3gWAb8_Br_bqgU!U)N|9;nX|8-wK{^7dx4ZPNKyq@Fn;C3Ho z_k}~F7zIM!fp&uc6@#G9{4|RE!#(-j#XO!s*fNXIV`7{PE=^8xzckheKIrlmi+WmZ zoF8F%Yr_xH&ivP}&kEaM$o<*4&a-L9`Pu={2Z;_4xIt_E(}RCvQU`yn&<*KOM#LGw zHe{e=F$*+8cEbmm3FqeUg#GlDv1k5iITV8JF8p;L@6H;s$bguLV!tU%xHantZ?f+6 zx`Z7=6F`HF*G>kg4MadA;H>2b(qhLYd0U}cIr|tMr{;eC1_TxTv(DC2Ihfi|Y^>XfQ^#@b6wMr$Z zfTKVIJ0`8e^Rx^sXmRsu*_EAJDMjk;|T73;X1o zEwDC*G29ugzE1vhbL}KiuZkw3|M)YE$C08~O z(@Ud=ClUIOy7|QjFEr5ciD67Nr;ImhDK?Q*ye5RpAI;!jt;OofJg*Pi_|B234J6Zr zu;Ni+0c1NN?sJ3p|Ilv^DRKZOW&gp==%CSwvY@YB->V6=K6TijM?$#mnQ+yAeDD}-?G)a`yU?;u6<1q!~v zdtH89m;A0W5WiR`Moxyc_ zJs>RPPmp!pp5f5{6<&eAo5`89p0`4>iEQ7x=xN`1kz_1I*#_1?&P06Ef*9&RdWEDQ zi_VAeLZ~=mWaVU6$oxFhXMRLT2yj{|`v>w#*jk>Gft)^XhP2t+&%u=Z4~!C7kMXcg z9t(G(y-+Tl1KrKG))Chm1B08DWD3U!C7#l~M(S`ZDp6KJAts+EF64e#JSc=}3HL>% zJ>XQW43O|o#*XGQ;S?3!N}B1MUT#L!1wGCE;{=dK8;1%%4e8Ma}`{%p#P z=BCcW&I#cntdM_!1R#>l5!~0CYz6r?aM%Cg5biEYBLE+n7%A7`edj8Kp|{0N7zH5) zHm5`@jZOn2;2YDqo@GJ>S}W8E^ZzR(16G?5DPE}`w_-WT2j}0Ig)Q}Tp>&aohiG&Y-!^3PIfXdKdE{mnLxeURSt`4$znia5pO|AGLuAryC#XAO~tYeI5E5?MT@F~z~OZ}jj3O_?e548E{|Aelev-W zL5}H-gm3I-kNW1t*A_DCiTrLpBMJMM$mxboY$Ex7N5U6l2~B@O(2W)V0@g?!#SW|! zKaC^V{jUg-*j*t8kLMbfT#1;k_>&TbHf2dKB1JFgdH@=xhbn6-Pp4u{gc$#Lq{D19 zt?o}Mi>+2sP-Z}v*e0xwR~^7fqy1D#EU}&z7Q|5PAIP|deKL)wHA~raVZ^K~$+Jno zK)4X&cGelr4}em-GahwrPysv=CNz0(ZAI1Mb3%RfLSmAQ%+L=HLpab+u77og>q5C- z^r2jI2vsW=X@wCYufSXR^SuGJj&=3y*7(2A-gUd4Kfz$SVDm;clMmXqVEAu&JVYZo zELEbRcb(rs5}VW)bqXZFAGQYJ8`;xx>|7ych1ReTw4qXA{lWLGHWTREngQO^Upj}fBz=(A$#-D);EVSe9ko^!?u zI`^`1JOo-xS;$xbpFMG#G6eRmLxzI8WP4Yk3wgzsNc0sWLOq;6;6Q8b09Y-NY>5Im!A8}Zgy7s;E6xh3K8TfQsQZ6H zWEeWM44hx2FS52HDXUB4G~#+1oFv2+Xu=B0@lws0sqZ!y<)Irs!VvCa84!p$#AP1< z?pUH9FmFE>{rAOu^Q5i*h4xJh8d$QJXid_ZB+3dALDs*b9T>n$$N9`1gnFdj>dO#r zbm=daEFpmomc^KIrOsM&X3y!9+g*Ftmfu67nZB z8i9CMMDH%aE9RY_@M=73Wg4ln!9os~<$kT`if7reQ;lTjFq%aFqS-8*1oZ^6(mf;A zh$}4M(&F-UI(AKLqlpjP7~U9cH}u(a4@ejW9G~LXdrq*VqKPzHu0}6c`P<&wKYnU0 z-SUz0cOK#G&947<;0N0CZwA=Z<3zz~?Kp9b1?A@9d{4k9NK_a_m$(zoJ{UbATtAZe zJ>Nt4dN@eRPyXCb0=lUESLpO%jRZfL zu0qC(v2hr<-&XpkgZO*n-`&K~hsY{p0JHsYd3raI0~XTKbQ2}aoQQ%AU%C@wv8Y?G z>lH^GpyMid@j8_z7$Ew8cpBk)N?K-i?$`&kljZ)ay1{op*VUUvf%3`~7AuPHem!-@ z@2&S~P}HtxQ3v+m#0x)7ynFiYUk7eJ-uir>*z3rDZCCV3{QNs=6uer$>P#tNl|hMj zQsfER!LoQld*$$w6WyMd-pL2ipZ&7upDCXUR=iRhdk%ivLYPPy>{YKgK;$SSlYLh+ zu&USW?%oRXJ@+$y;HLs%3%Y?2Dnnn$cW!Oe|0PldGlvndko8a^Y#4ha+lIE1V5HK4 z{k$e@USfyp7ZSIPuPa^9p$t98>xY#3xmC}-B^>9&KL0a>E$0sW#~7;og`Y%6OKAl^ z8@?RnawaMG=VvEvU-|%qW6cx}qBz^*dXy8Y(nfYk8ne|_kTC2oO%nU(>93u_3l?uP zn4rEtHE`x_HzNaMoK*pbLF);qQ<*4Z(CVi(vFbuck&+-NiI_PVEvIUT8jMhI5& zX%Px#kAR$Zn{_P1J_dTNlc)g}hT2A7EZo@gGiu|#1H$&|&7J$r?0H^F2)%I_COq8G zdMG_m-aP#~eg+t%gwJi*J++>Z2B}n2Q)a9 zXgGp|0(IGUps`jpd&aQKzd~s?NGLBGbf6zaIfC{wxdT1J;Hz9QbWg0QV_g#r6Fm~n zR4P!cYhHVGw`#^f}xr$R6dk-s>mVvS~ZXsM}DUkZ>e0@(}* z_`!^7Z^BTgc7w}5JMjBp>z})8Q&mEyD?>>(4yLWTDo$vLhb9QoMN_v$8W%| zK916|SNQ7DUruDqb~~#+N!tgqU8vUoHTa&u+E5g*QPN3lUyG)Tm{WfegxEh&BGc!p_mGjV0(A7vP6*Et;~_=)hVXb_^%CU0^z{^uQVk5^f=;}+iu~Whb-SC1@0= zhl#0HAHK3-=au9HOfceD1}Q`bdG{5Ek^GX{*1f4aG{BOmbw*f%@qPg(4fx zLXJa9gTSx5kW)-e5RZMi{hxvV{#IyFVUM?`Vsp!r)55M;cBd5t2wU6F@0fLiHw&V5 z;U}0j&iM~qoPlYtU+>wfDqiu-pkY*7-4GVEv}S)jOfxZ{!*9CW$|)o59{MaKbOg!? zz9l;*iaQO-hBzcq&l|X<^29$RN2>a)u&kycNmMFM)nC?xQaQBFVrrPe28{c^*kBk5 z3;8}(g9Nk5Y#*O!=`=7_ND+XY_z(M#x+$I+L1g54*Tw@7!nwH|J=N2eC(dbXyemBI zsSXc7^%_`H*FMyV78|Bydp{txm56mnYfcQiRhjoTf!|F$CNKx`Z&3a?#FQy))v z6CZiqYk%!Ba<8X46=|Xh4_CdJ;*GIh@D`A_d&QTG+>~G*Xq&jqPtb(tZfpl_&eJ1B z)2q@?YW2CS4SO(9I-p;jv8hv#a6a`fc^vsu9y162!JZH@jBkqET&J24Ye7uvY3@#O zxJt=@g;~puQgX4&g}`%g6A<(1_4wY+IZHlM@jYjD(2g_D%E0=eTFRq@NIFQJt%L30 zBarD zfjuUtU_Z2fRRqvO{-|Fz@2J`{n|p_OLE~4o{$8T7;!;ttlMrnAg65aB{yw;s7TqE( z<#yWpJioa09F#)WfQy~p^-QVPAnh*TZI25Msv|*zs^QCbW442>hwR{X1H%V8i7vq0 zIK3=6kJSAj8`@%mk#0DBOCo%>S{lFh6CK?JwN0I>bE1>jcFSkv`16T}u0{lmbK-K1| z2&)(NrT!=Us_y^rIFn07A`;KR_g_AE?4Pj-QM!c?H-DSU{|NU4{$-#4Z;uxV&KPdl z0!uKydg<=}=12d}<6Dyd`=b7zmHGe8%GfF&nOIEKhE@d&RmMk8=}k9AtmxnFsSy5p z(~;fuDzm5OCM1RaPP|8OnHfm1N-9Wms1#nBk~93k6)s+KFVnaLW4jiD-1an0u1 z3f=iBqthEMt#--!jrvMUHVnOUyd?hq)R)8 zAj7W8F>mQmGL~Ur*vXgF1^$qH{eK+8>n|LCCm^pRy}Ubljo0=o6WS`i^cg`q;y#bNz(WrwKg&*{TS>>vL11^s`kmaN;oPcDVX?RoX~8K>U0q~`T8 zUS-$6B(*GE?e^BWwWPU#?M*dQaStXJ6|WQG=AU#cmRyZV@}s*Uq)NBHU(6T~Pc&H1 z1V^+{Ojaj8QpR*4C&sAnLbM~b(sztX&MvE@#Dv_7vrV3*{h0ZWAIIC_5dm!9so8Ge z#_zm|7Y>u1_Pq_fN)xdOj-m5oHsJi2X+li>R%Rs47b)4jv1k&3B32QWbo`qNV)N{> zKP>s2qJHoZ@|)GvZ=-hFz?Pky@%#lpFxR8;jqKR#{Ue7eW#Qru-ZAe|jT%V?0Jk4L+Y zoB~)_A`G)Sdmj<@M8sD|jL-9}9=_=aH5>0P?>SYNuTZEuZdP-gdR=krdKmBv(^;1i z=Tlzf4?z@5-xM@yA2_jb`_p?wD&%b0!BxBSu`whYxyvKqA_@#s0`gUhkT%YWa&+b3 zlt~dov8E#Q$!Qo}LK;wI(oqUIGy3dB)Y+n#h(=1L?b{98AC|oP^k2JVH~Ng)q3JL%?iFQLB?ljnWA+S1I zL!@sEImWszHV%c_-G_W(|89oPa}f!ENJM4hG$@nO_(`5=cEl{_Z8A zpW`=B{*3m)qy|j@G7H9G6Q|ia-^?+tGVs31N33T)lbXd|cOEw>P1SteI|W{qCUiVg z4PCzC!>lawiU?Sr>!)RL>L)X5yX40Fh)%Rt_e}M1)A;MxmR_(gKJIl`ctHNcNLi$K z_k=30_1hCi)IM+A(WUKTS(c=G7pX5Osk?_0_s6|)J~w>bUedzMt5rNYOX4K;7(|UR zR`Vb*NEI=%=QSBgIfC_R=qPh@f;o@*18c+D#-t9-7Jj~M)Sy|Bx9S{8qQzk+^a?K# z2qRDrOnnAub5ZDb4s9MJdJK>eUXP7LXd1la?a>iB2VFij^?dR|Cr^cDIRS4eJBvmY=ItK# zOYz>f7D?zjSm2!m>`YvK8H+ZhZ66d9w%grz`vbk3yvtW|FD|O{DH_!Zavz{r8m9Im zM;&EDDiY1a*wJf!{DDj!mv7Ur*`r#EL44k_H^jRKSi3%$YWQ?U&YsY+Pkr@fI=zgN z?1X%!e?C;MmUSxjxO2zx>)x&+_~JH;=Jfg&$u|um+*g9;KgJqb{P2eIS3^FPfCy&< zqJRZlEOlUMcBY{?x?C1EqsBNDk=8GMP=K1I{1aj?s=p3rzdvDRZ(Cy^gXiv$B65y#!$?Ol0VzchB-Vi=&_o@c~^ zdP8fczF+BItbW`dU{l|y3pmG1eZ0Bk$KE) zW$PV_F)I3c=zN$b0mjF8s2*AH&o*ArNY;FojGiTE-ik=hbv^*~Q;bm?<;nR0od~KS z>+6oYw%;n=Iq@zZCtX88nUoyszF;*UN*(szm$tq*+;;1gN{Y!vLg7gmU5#6!EF;Q0{SK_3I2Gc=aC_UhQI%f2wJ*3$`fiDtn|8&HQWjWX%DAfC8{+k* z!)twAFH&L^L{}gpX6jtbU9h>$LzH7FU{!e!2R5p2MON)qSDZ7+3-H7LP?Y&gx0Ltq zul**pEP z{U~Fo6m^mIy2EqN%a^;SMz+*h48VOxgKlDq^%GZyi<{+_%q9v+F0I}iycn2zUHBQ#w}7*7bW#~Eo5__}o2 z@an@?YBCC4E=k(8cu!=24ly+#5+AW@r4*bg8v<;BfYm$Cb~+w9>D{$lzn=~KX~|p~ zHb%fDw@6g&J-l1IER*giW>GvxSG;&l3vpKhDCC^PzH4#QU=?w`tOs;Ts{XMfK$3B; z(#UJI$&=~cZ zj|nTU3~#eWC@S7zL&{=}jO4V&C&2*T`U)sy(rlRjNj`krfc)-$3sXUrMk> z4<~i1wqJ9?rbxW)BfM&3jtv;3)b9tTrpb|=PseCY!A{@E$h&$Y)EICUyMH;oeuhv4 zlId8@S0&bE3}`Wrp`uo^Wk9M}d(xNzeEWT{-5^rexpCndo3SlU<^r&PN<%Lqp}<9B~e_Ce7v#C4pa1m8l%uN( z3Y$!i@KYjfJT|DD=6rEv21LCcx-pi5s9e^u2cPxZL-Lk|ybk$sJN~Nv*M(i?O2!21 z6|ZTmloqLF_$@|aHqjYI(`FC2^ct{PAC`vcyO1XO$j%8Hwj!E|X&lVpXM|6@6vF+* z-e`OlJ~5dFt>38dnd)+^=$~9&dz}+K{ApeP+mYJE#}vo)_qrQ-Mw64GhD&(uweMlI z-;8$Cyj0_m_Kzb?&i@{X@g>r_(K9a4d`=@CKS^^Co9Jv6MRl2QooAMZ(vX>t9BS7) z)dP5Q0;O7%7CdM|8gxM8Y{l*+S=22Ni0^I^xU88*lV9 zSE%C>r#?41-rv_U8;37wZi#ZVy+KZuJR9WG&mWLu;{ZL9C1 z^XG&UW?qaNg2a-fgPhk zQ7+FTM%!Z&Audl$S4$R*aB-|CT>DU8zaFKSd5 zM31vw^k^fXXphp@`=4c6FhTfN+krvt-gW*{U7^t4rGB>r zPQ73?d{WzH(VsogvbvC|-zt7>T}o7Wd3g{&!B3NY?Cw<2%qOjXYi}_47Go%=8-LWb zl~&^G3zb?mjV+g;e)-&(mr{So7&s&zUvT@j^I93E-}il9BzbV#azR*NM%@wAoZ~Pw z=u+?qGC&nmFx!Q>dHzxKe$|}0Ve}JVm5Hpcoy4KscJWeO%t>GX)XWX#r4iJp&GR_q zwoh~5s~-_^td@;FJwdd&sBYru{VE7Agc$4(YOg_NMumH-vTojDG3H zUoUUOq3!(SDHW$9hSS{*TUd6`FL2y?IS!BIF?T&7z!*8bkysnIJ z&bATK(CkZUz-x*_@T>8iCsJy^ylQo%Napxli3*^zIgTs?WSiwA`Yt|>c_v1o%95I3 zp%&edB<9^09IR4&L3eQ{HWtkI5en}S@D*_~VKC*kX>)>@En&uCI*xb9+c_!^ylbLm(}}EWmxfS=SeI^>sK93gAOn5_ zAaH44w>Lhfn?r|Q=uYI}>f>WkUBliGwWLLVW`=CIzBYOuT`a6c`FlV6udE3!nQDDp zKIOd5k5hPX+C^Y~z73icajxmB>97Az(&dT&wVgW$ibGcGG{k%Y5X6-_KO^rQOg3Uw zXmt&T%`C9VG3C=_Uryb8WtrhfSnc;RqX`6Zl04+C)qcvh)|dO%V@CN}ErI_5w1|C^u>Xea<_5}+Ge2tMPX4!Wc*d;+ zvT(7-Rh@>s1eiux5^rM6+b8hbbEm0Oe;($s^%5spFyRDkcO#%cfjVb?+Ozn2q` zjVlfHzDx@AE z;O^8oEOWlY;cg06ElF>Y)*VH$C7{i0hFeEUuB6r0r|cGrd1iHoNyZ~)nvj1WnGSC~ zi}2ECwuG_!qlZ)Te8eXG`J$6=pM`W`WZ1@Ga6p=3l}FbFS6afzs+( zF9E6Bk#Z;!)DPd_3ubAz{qWy5r~4xikH004fVX$~hP6078r(`tk8E9>w0}4S^O=0A zyMd3Sm2Jg$1zwSX?5?Fh-uO0dRj&|OCneiPZ4CbUe*Am(5+C;)nI0Adn~|h4WxL1$|^BI0C7nc91ghW8|wCFdvhScdD4QB+*MwJ@4{P%Zr^TO$b(CY@( zLqKiNb@TD;Owf;D+2$Bc|IXwTAPz9aqHp?Qf}8Z0=ag$%2wygFTf_WVal?$e_UcGx z_+%Q^ix>OrDTmFE{doPTR9KJ~Qm5SfZ)Q!s4Wm`GqKqM41Jc@F zx@C9eH9^Fa9omZQaB1CA{k|0c1~=2;B2_(n;wxZef-W)<4rmMMlC1R_&l!tkolzu? zztpZFQgP36GmV-9w?>oxW%C3%G;J7?>Tf^mn>(eFFWa~goK94zkdK0deoq(s`zgkoE|^vo-B?@47+Hr+bsUuH`DjB!@H1e$AG4d~b9=XEHFz_64($ zJ2A%!)4Zn0CZ2Q`0Wqd(uO_Z%o}gDNtm_UeU`0z$lGbaD55_kVZI0LpyS!DeBNRw* zg8-hs2S=Rsq`2j*V=N16u?7RSt(Bans<*faqOJK(nmrFG8Z8%w3HN5$uRe!Fj`=!G zLH~)WzrDx*5v>{z&EBS zQwz_99m|@4x2-BL^lJyAhjpBFgNX_BUl#Q72nSF2YM4s7aU*$P7{%C_QR%1} zGwYZnu#1QLC}~ZGh1+p1pjADv&~yX$FW2sEX^kU762Dc}M;8VIBrjp^6)Fz%umYL; z4F)#2jZnz|%&Bh>xI|f2)C!w*KA+pz&8_dG8*!vM(;Wvb*4cT8@b=cr%WTU0%!4+? zX0+-43QPdpJury)mshe`1atlAvWtYlqkd6}o8YKaQsgtnj-+++$6w)30yeG%KZP5g z8}eI$Uo>q}nVXyo$#Ppk8R#=OO3W$Im(io{+Cz(r2UH$JCwqD8Hn`tRL!(Mpoh8y5 z?P26nRiauEJI+qIC8Y{xuFR%z=fjk#Pl~FwYO~75d5t+sjb3_&`Eg8t)Q~TV{n`JK zq^i>BmU+|K#&U+=W02QWhY{{y8!;k}Bo#UO?%M=;L#Bhgp5GYTOx#dm(0;@T5({-+ zKk0UJSgm<&9EDI~$RF`S_biYoD*B&Phw z!RUPtN4*_p{E=%=HxTa0cpx+NB{ybb=ZSWM-*d4=rUH{v)Oyn1c}S1*!t)=+TXe^QR+0XL-tyyTj1i8{|6rWveNMVclTE zc8(HnCmw8gagdwqmk+slo3x;>dcpbODtQdeB3YqQin)@Vs37My=ah`dA>w7iFbo!uDp z&XA;ylk=~hd)HAtZ<283#S`tzw+zP>SV3pmYnKoBJ}e_{EUqWQ+^=kpN>2h=8-38f zZJ62azI4wDa2pktac5QcbPS|;{Dz%hXRu1)By?LBNg-4j-PL~(8ICfpp7WRe_ToK&D<5DI7M9u^&XQ#(-{*|LlR`?f_6!` zZzM!&VL|7NN2n*v&AByn!O-3N@`Rsxe4y1-AJMI8xhO2lCH^D(1BcUe0q)_`(WtNY zrn8b7WGfYWYU#v0)zaJnOa6MtxQ*`f8wE>iMBkgP%j*~P)xvCNV zEwA9U*)5*YZ_E;B&-Ud-;)cEs`PM^LaZGMVgTeM=cJh$P;-taMc=j)aY0_Hb)C&Xa zyW+}8#12nNGQIK_V`-NXPtg@LId@2V@o=N;vaIKqKWGHBY}$ML>$sscgSRe=ZQ==} zCx#1}cQotYbHNU=$)5B*MGw4-19l+??Qz=T17<@5K7dp?p4UF3WDAb(X$y*TrP!~Y zrPI|P@m`m^vLY*3AUKobLjyf+zvEK)gn$ z2HAmO?M|Et;h>@Q3VP9E>FouTBSJzU)U@iDJX4~??3y)D=yf+I=g@!U+sDri#R~UD zwsMuPSP1BqgC7>=+{0n_sReJsNDYTs9Y)?s%Po*qRU=jPSzx;-+j)@vvF?k>6HKi$ z{%L6X-z?kPHmlT;5FniV~rtJcSW(59OPMRs6gcLt;?(?P8lIXQl6bY1ri+&OI(v~QB9!gqyv|ABD5x-=~x^~bXlKA zC&H-u$d2%4tJ${TytUf zz`h{c7>T4oLE)Vh#OnTPa7R`-u}?quHcIg~cv>E_#Qz988+X%x<~2nn>kxH>1S{|Y zP)c591sl@qhnr+2TYPD;RRr~^$I6)}4YzRvmMtsD!I=EUKpn&Dm`cGFRHlU_xFXR? zx=m+(WOpAVZ%oA#zK5CJ(SfSUc*d=c@w0Va)rzt!y>_V&a~ip^_^LOkA9;8*^A(jU z?k2gM*#T0fNG$DtLAZU$0=45Miwc+b?zWJ$Vd?Bt%uBYpn^=}6nXe-sSGE%LX6EBV zqJNiiOmRAV&JY12={=UdhM6X|^#{(Df6IE3G3(YGf-X}~Cts{pp(G60sPmQL$OWHb zOQ$97wWPjD6kWY_0RH(NfC9b~1MHM9^Nou+Ojf;sxF6MHq?zwO@eO4|RtNSMMf)Jh zYU?sbORn9unROV;0|UB%!%FS(RGZtO%bd}xcL;0%#d>-#X+B*Xd{DduXq;sGj}myh zzi~ev+qnncO>AL`K3@?FpGi8-xRD=(!DT~l3XJZm^i zi%fnvF~;l?SIDz)OucUkPOoXW5%e&7oLA!q3y6^<8SD9p^w$lpDFqq7L32f2vtj2S zoM-Ft8sItP#5E5`0>zG>3 z4WbWrJDnp-#DZ$f#>63>?HP7?+=rgP9(6=ciAKJ6xl~Z~n0T^k>hj&q6ru(^yD`eL zEJ4PmKWGM|K3(pb6xNj0V4)Fsz}?@xra*_P#dbxb;Ox+P08*vK<@6@Qq@3lWyFpX2$uIcXUGR%p790S*ezW0!YhP`-f%>kvz-OZN zoJa4_4CH>urL`VkuF7bHz2HhsNs{MC(()hLud**Y%P)n4@&FH)!_nRD2IgSF@%z$- zf&DvBG2@g5FPrgdAIsjF)%gZDpJQ6(O`%}2Pxaf2U5&0AO^4LJ+@7$xR?ENB^KnSR zI!t#)%?=DI3s%WNDZd&|M%{sltGdB(Ct1-A!%-4F%VIK`2#{U3f<(|ti+8rICnUWy zD+r)L)@icORwt+W-Gw{hrCevupR&`fFN>NdF+kTivIUaZQ;DA)pWT(U4n~ULkmG>M z=ZDUTc7YPWM+n~Md=Pa{i~JbOtfL)~o>Z#@cTh*@v|e6FSFAhB#_G$^>2?dwc?4K( zb}a*v%l@NG1zEZVc8$Z3R#G{#@4GvmES@gAFhv%$qm5CSz!P!2$C<0QR#A#0%el;w zE_lb3$(Tn}5RSD}v#d8Dq?|()k0w<^)E=f(7DO+_RjY`vYNzK{wc$<=)XATm^2FRRNDnr_Y?YZ(+3qL7bH7o`{`^FQ zY=5Rg$5W}&Z+C^>%T*kvkM9na!JVhX$7HO!Ek+iILTF?RvfzvfSJkzXA=BlZoS15R z8HgLPi&01b&GO7}H&)9cG-CQs%wjAOfEt;@_ul(YtR!E%i|o6%h?5?pyiLJI4f!HsI;pxFwYwdGb)qwDttVt*LhwV7n{Qdy#)8*nnF^img| zVx4(lU+X*Eo9-+RT994%`t>!x;*n0j0mn)mCDdUw-nUhja=Bd!ciy!ZM6LG8Brs@$ z7ltLyuKMrcEJosdM=5P}N`4x%tx=X-6Gq=hkvI5z(wx5lYawtg`1-ZSP1YWa&}-!VvV81n7{3wGYnzE2+@+jZXDehmc~u zM2yA2QJ4)gaU^x@KBY*0ac84gf8Aouw(|sYih~3qMIrVdD-)?DV?$8$@NGGiK z<4cg0ydS4)+<*s8>ebv|Oq90w8;Z5Mx1#l44*zsT2HlO1VPD-~AA?Nln~Z|{PQ?IQ zLES2{cyY_vx6y^TbN>3Bn|Jx@Vg-dS%>3bt&K>DZ*uig4?<;}3k)ewh@WCZda}W&; z9O(gS{=?|rSMp86R$!1&aLQHGpN$MiNAYjrB)H%X7jvd|0jP_Yw93#~cQ}9_Ft5>y z3o23tcfYO+dRm5mjlEye6UBG)s0mvy#SGFS$pM6+ zVn3QS{}@^kkuMP8lFOf0iC(kaa1~^kr_}qG^puWs zUHK$n8lxxpbk@*x8mO6rT~Df57n6J~$NzZ7HF8X;^SYn7-!@P9FUDiyfVo~3bF}CN zdUSa zt|l+w3vJ%f;3(zF>BukSy92RUpkkzUs!avia{||x)G91IVr4|20mlIH85TN; zQ?=W!Bd)Y_jZ4BBAB#}O#MC?G9VjB&gAfT^9NxYR$mecv59Wm2ewZ{<_X&TyH6heD z%~yy2*5fQ+!Qt53$rvv?aYk zx=1uXqRnTPw=LX=i4&jp8%z(_gA>H?e8;3_FI*2&r>I+J#6GJ$=32>NIbguP+udVJC`rV%w_p)Y}UkVmczXfH!Py}uxI|~a$=;2l4!ZXr`vF%t(_3908FrQ{} zI`Q6)&(>@cE78PXiY8h@bnHy@&9$+YgqYqeB1bBlS@O2pmpH|+=r)-|Q8J4k|55MPTM#0N{&&}6qEqB>Ju)MtupWQb;pu`a@z2IZH-`#Ragkf5 zuDy2jyM^X6AzQl*OmD_%f%zSmF0JmqG>Bb4KFecnXxtTC0w&r7third96Mbgih0Tq zd-c*l&rO#HIVafC52)I9p!w@F)S`S8W#czb&P66fJ#43Ji&KId#}f3SLfzfN;NWy! zeDxQQX2VS-l|@a+3)Y!$yV6*dc8rHTNX%%DZ)`%a7H{Q zhmzv{g6#<^19{@QRxhesa}92<{~-}Qek4f+P^H26(9R^_UIu)@B?fejpMpr0Tv=yMHA{rIbc%ILETLf=cy`yRUg7ciQ>LC01p!oa0uCe>GW6 zSpiBtv4i#yQe6r20e5pk)MG4Xi#?E|vRGAIM?!lXbG#JOqTls~yrC5&od~nqYu%}9NtJ{P(C2D`tm_;+Ii=7$ucBRnO zZ2B%A$Dh*>CtqCBNC+1;)^`O|mZuWLoXXgUH;b{Z=|e0V zP89VNteU3rS}w+B=?_m)PJQ2HL~wMRFjgkXu*4PO<~|0trAMGk!8Y~8oEx=P%fDHL z=wCfxlaQvkOFuBbJTXkIl*(@_5TivGu*_vWd{bsclG(IT;< zNT(XCcQX3KjB3~X7MQ`+fWEMSkl@en_1dq&M1%oQ^irgY;XIn>7w0%b$-7nqhzjUj z&2GsUumrhjd&M^6eP>RAwJvO!Xk^ICE!aL(ktxQ!1X(ecEs}T5dSJanvP$W7C0_FQ zfW=*i_&W1Jo6MY<^#g8J{~`jpnJHwozk1SYkuB@|1(pxiAdtpLtyb_5Jb-}&t^)Jl z?{ViC$98P_STV5v%dTRJu5Ej5B|*%TH2&uf&W1Y9 zqsz^&zE4#zOT=vHz@1%G;w+~A-sSaYW#za{qOj%n?H_3AruArHp{456GtC=fb|m(W z<6F`_?g?V#XW`l%+v;a?I_DPzFkKNLL;T|`T6autMKA)KjQuzrmCd0dwZ7{LW}4|S zq^p7Xr$1GEhTGl}(ozYV%YA`^DOe=kUn`8|SS#rMrs^9gBD+^cD#~FZc%$GUXE^L} zm3Ple^otMTij`I|v)92Aq;q+mo%epn#a0bL?vn7#frSTx8p_2P%IyTWHz`paKWIN; zJ9s9Rs_hBVl0`nORMmo$RF|r+7avPL(hi*BT-mb)w>8LOn*Wfs6S4P-ixBtn(_BI4 z)LP|SRoTTD0!5OnQgVTGPY_(GWk6ZuhxNVHt+in`9z4FTtxWyASNh|fdx9Y$1*fp` zblj$z?CTjEoUK-rB!zHQzMhw@RlFAG4Ec92o-;mdt@8PrZp)B zz!K}6?r}at#rECtKUZR?-hYs3GkeX|!BD(j{b_jlJJA1C+zrA}-Ag?w8S6}y{??1|He@};8C^jSeMu^_I zrL!ZcPt{{UvwSu^voK}vHkF5Bh2(4u+TQPb491yqf|gZfg9SAAHq1o0TOYnxqQS zjIN05861rhzB*8~3_o8u^}gjQR@jZ~70b%XtXZfa4UuZ5-edDS3rs6n#gx<**V1eW zaa@xw?B>e9ww!YPNNA+Rp%h-a+upF06YgG5sOvE?_JpU}%DTn=-tX2mA>N?d)n~`t zd1HoNk#TpelB@?)Bl~xDcZhdEf;`^QWMYd?Cr(x@J#I7j%S*rU_xE4{Ur5M4E1~9# z8tyMad%Hr1oRH!qv?XIm^JXdfH`b_jdQ~L)Z9Ok2k|ozc&K~Z`Cv{O#6c?9YZP&-z z6yDTjWnhNN&t?hY*Et|y1H?-dmd01 z7Y~wJ4-btNH(P*E?ro(R;A>5^b9E=6*;#o3K3%xOBc9hfqozEn+q&CVmow{JhpalZ zD=$oG$m7U!3jugM{dVOYh7G7vv)?+pP0^6~@hHlD!3@Maw-S0oBB=6NQr4WBC7Is0 z4&NF-!v!_i9jGe59p+kais?wv*_<_#UpBKeieGiC&4*V6`p3{QMD2Em4gar3&N zJ!YWFj>62ummls(O1icz1bUXeZI1>WQ9+o7`(!Rz(l8p#=Oxa9ts%*cw6k+}H+!$# zy=hM?du;QuMV|i5RH|BMn3}r{A-mF&K7O-qJE_OPw`sbpcJlEbg{;I$Bl?2La*)H808B!Po32 z`zGjPJ-d&?c>;`)5_(TN;Gr&MkD?J*??zUW6^TQd5Nr=;=!9DgzPg@FHd2vPxYjkQ zit1dIKJ*tf(M0{P>7Ld=G?NNs=N4NQv_45?#V>{#3bti=llt%vWWf}_<;m`yS`c@_f zc;y4pyCwY-byrK+Lju-M!-(9aUK!fWc>@d#uUo(Hh;6;HM4(6q!}KC>k_2=smqQV$ z_qYTBQx<@HC$jAGz?I<-xpj0|8a;r9?o?tXzE5RA!WUa0JODEo3SU&~8lGSnK!m6VduOBEG8b#I-t zY;Ny;C^orzy6`noHKN(8MCvT~%0Y)d$~n%(u_)~4)0w8{Q<6>wf5^m~m@;UKfyPpD z;)!nP0PE~4g;MQV>K4ZWRu>+pPpSw+y|~6aiEL&iUozOwc=zeDH8#x}dvFJ%Z0SH^ z@qIJwPFATy(z}r<%HA-9wR-n>TY}L}D3)~zx+l~B;A;Dm8J(HsS~pT-%rA^m=hQHl z4_-2Em4a{ebBnICoz)k*&hYKK`?r6utE6LGgNK zaYtlKrXCG;^QW=It=;h-19jZGqt-;FC5MgUXn~3=h5;J1S8no`?EU1`B&Y8V!gPE* z9aln5#jtBgw;iJIdgVGG8sFw}v0G*xCnW?T^%7uLq)hxptIT?Squ^D~_l*_LY=QBSM!o%{7YuAyUO=ukGl*5MBL|*Tn0&n@5ZE z15Sn%i!T?CBhHmIbiah)qG+>HXZcz zR=(-6knD8()Y<)sPuq0GpuI-+W$`WAOO4y(BCgI4b2N_9UuL;%+1*yP)aQowbDVID z9Xpw4o`lm93uu18=0%gw36&ai=k*f5I$X}o zQ%_YbB9NsId7SVIxutsCFdtMOg=}iyf5*m|D)DBg|MqC)g{eef|U0Q ztOW6gJ)3q|)X~l9Pw&Rdcc}O$HT=Flcbm7X?QSS!R>P!s(Uw&@u4Wt_F~4pXF5%~8 zU$W?!{AP~ym}*EWRC(xFNZLIj^52!5U%_%b#BGyJ5VxqE@tYof40r^w=W0v5JKxjF>QOaYTNX zQ%z;)p}uyZfkM+8HETK3_iBh9@;>gECG-Y-m}IKui{EbT zKKTCUSYxPXhv|`GneyY@!bK%Fw2ef+xzo*du{NCnois4Dw;&l;oJ@XqTXr)9jxM7%50-bEotg6pX0A3gyf5f)^(k?y83lbZ@;e^;!ZAnshmAkNiCQh zU=o9o)-<|+FJ^usl*pgK`KuxTzu%>HZ@SL=(FRu`UZ+ zs2-`8=6n&Lv59 zUbLxr7Z{<~IyU4FWxXJaW zr_!=+l|S`J4?P!YAv>cNO#&Udv1n%@br^ekt~EeB9o97Y_G)|*CI84QlCFLJgzE+O zo7cG3DpQNE;ebtF_z? z0pn$jtqbC{7~k4fX$X}z3<+o)1S62+4ox%7DzJeN#60h17aMq8}=q@^& zW3B;%mX)4om`0RcG#xz17)gUk>n}8%TaSb8)Uv31>UhIj28R|{oINw3b7|ZQX_O2X zr7PH4!>_6+RkdtBp_F}oa2}t}!tfU`To9AP=&>zWd9V&VfIFCEAAD^ew~NRz4Z6Y7 z0v;*3bbzGkENL&5uRm+Mj?7yGBjh4rR1IdExNj|_iR~A3{wBK{LYdH8eH3>03y(J} zNo2klAMWJn(t^2bifJL3?bsTpS)VdIkwR<0JB9XC@+iqgcu69sutB#LgH)`g?+<&| z$LT^dP=8PmR7FfsZ7z!6+{;-ZC#Yg4=?N>-F(JpIdV0g{)8pgbjfye!u_wCvmcfXW zvq@5N*hh0SXPVlR((iX%eYSLrR-vO&mVD|UbC!ezb@}g8xss5C>%pqxk~9#eHb#@i zF#IsHVA7QAJ8eQQooZAY)@>fG+#aIXakqkXj9WD47wDrY369Yx${0MZ z4RZeIsX^Ia?Od9CB1vp5KPdMRbjI4fw1hwbfm@YYnl}6 zlk2u&Jv|@^#zNj2Cud;s!gSkRV}$n_j})HFh#AR~VD$awlOifvd=BXeSUV1em8&FD z9Xp>axk`=*t)CnTGOehA6U8@Avf-xE<||4Fd4ouHFF|_a-A0^tED-Ph0cKVxOwYB> z5k|V3-VjJ5@v4WTV35+sx*9un{9LGuxs0()wJ z*r0zE>B%CTVs=8%U-!~S7*E6IT8oq1L;J`lZ0#f#ttz(pJ3MmY9Bp_wnZK zgDHibj+U~Ti2I+fUdk|;m}wtBZfJHPwB+%1Gn1TN=Pcdk+Rg}Jnf9#nthM8_I=bb3 zuT3={YJRZne@-1OWqDR;?=|=OX}Fc>fxds+%J=OXEjCBJt5b9JQl;|iqx?VS({VCV zw()tZ`1z9C`X@!8l#oTnBlbnv&#Jx`pgKdN@oYy+Wv|@nk|T-`HPn-7xUzJ%!v*aG zC;iXc?&Fl+6b;LaL;N_Q3eZ8VeAhnD8%Vz^Ico8sPc6Md9k}L>xOyX@vMWlU`ih9X z`^+!zp&(6_R5crzY#q-C&KQYJ6(Z9A- z-Hz?VUL+S8FFE**X6|UXEiPVT@4O9dsx2UwIGc0&#&bFQi6rf%h`foO%{+-Vq0P)N z#k~w>@kj&rYc)v2wp+&pM>MwaW!Rd0UR1BA*Lk@KBL>SX_GV$qW7fY!ir8p)ooiA9 zICdzXY&sv1Vr2>H0X@1*A=lfg_X_mi$Z&HHy7JIKBwQmTUD@AY_m;xAho7VP_gwLx zx=xDi<2dC;?fFioSH8X}IfI{SA_PnG4?SXerj(W`BWxjg$21Y!>*j2oJDuJyotf6Y zUmjAJj`>qSf8A828eS){9P}=YhRX*A6@B|s-ZwUCDkTSh)1ab)urg2=YgUc8nP+MY zk)rqhY8rnKK|7^4VE>Jp`%lyQGnytR1JR~6B;C{D4Uoa@p^Q}vErXFkY{NBhL# zh&LQNIi~*3t#6$@lO*G9@_?J}TsZb^de*_0jzVU!wIY{O_Z-II&!pZHYyXhE8=BD1 zNdX5Gn8PW)4no&d>1zqp>AJtu5&^mBva}f$vhd1f_l^sNUtZ{_h+ZBT(iF5J^{F1% z*F3C>NLnQEsgUqjp0?c1se z`iD~tW88SVJ`5&AW%iiuWb&esKDij z1Pr4RXofB2Z*&CEwZCk{uUaJbN2+Sb${L|cTRjaonIJ}ST?+M<3`6^%aiy5;jY2ERVEj-YSbCF5k6|>a&C#nK3X)l zj7njKu@Gc@GzBPEUmLUfX$(%VU^*1lP zji2u`9&9=%L=TZ&e0pz3mILu&Ll~*y756d=v^oQIx`*Z}?A8YpG2#wOCXVm!oE%+R zq;?Tcd-!>wb)<@Kd0AMLVRs{&j^?f&06gZ!tgI4_L%eQ`2(2Gk0|ttf_~c{+XUXqXqGR^1-w=( zEszFe)epw|=ePb6MnN7o-5wMgQtGBjkD8)@m%eWEBGQ>UET>kXe$RllLd$9SVk+FH z$*@h1lf5L=|JBbs!X2w-UG5b(XVez-@&p5vEHX|uq#qG2{KKg`sMmQ!h0@o@QCP26 zNl<9_d--9VtdiGvGr1}QQ(k@=wzA`+inrGeD^#&O!*-`%3{{FLA(p~oZ#?Z(6zit; zGTUWyuNnnRDMDf(#|R;5J%dgI^Bw=G+~m;jY`HW-U5SH`pJ_MINU8<7ev`rUcE zzS73mEV`GjRRPs+?}k@hq`mTXy-G&jX+2=O=2zB0tEYbIf3n)2xcmc;^UjG)#z1T+ z&|+zhp|L2#R*3kmsp0El=ThaxEX;?Kyssh%JIUF^aKO0H^&6K9Fq+j7$3=;2Z6J=F z>laPJRXNJzVq137IwfKFuj6fGzenY?#h!8&_$~OB+w*TbZ}tI~7>(9I z*JCbqDm4HX3`=_n*_cYQl%ie&(|#ax-c#GmU4=a8J%2NKSq0JhF4;&$V4oErZjUaX zdX_s)BZ$>S+9t&IiOXP1Bi!)cMsM9Jdb-rBsFNCcRcE=^faXA4A9mrK08I8joaHSW z_+_>8dHIPfxd-5YNMIX0p>yKr?E4LUYO_Yy(O=fe2Zl+x%}(v*@_Ba){&I7KOJP`D zzUzzA#Gtuh7Rhq=KZkFN!4I~B{t?cBd>>`IIUM9{M@w=%{a`Bi?sR&@vA{Z6#F0{tke+_6a`P_&i9>lZ@}9 zy6qFJRP*U_H0b)%apa})Q;AMRf~Vtvf7~`B%5dNWr1Qd@o~~2qb2X_qkmmtvop*fX zv3O3V(8QMR-#P5TwOp`D1+56>ZbZOm&cG4I$?#9kdJ7ECYCSnlT`k8Gp-q{dA3-W_S%=+tN_GF>i=pup5$h;VAs$x8>Av7w4KO1Uap zhsgBD(D}OQPCwx$9C6yIDA4CJSSd6E1COT-xU-lmkLl4dUzUjmX)F4N?G7+({ol29 zb(h(%a(m&4@y#Bem&0>5rD>en4_%PVjaWvr2}OW``ok$^mWY0Ff}%h=CL7SuPIY>m zzs?J7BXFF^0l#IB_je28h-yy<5F$>)I%QETIcSHo^B?66lpWu-hA$?YnA;8T`cLmz zIQTNph-SrFOcKF^F|2nSt#4nEgicK8NE1J61kdQvrzc41Qgh(C!2$Y#vbk`a{wk5DPb=!_?4uAA_$+fm zy(Ie5h0wFMiiT;4nFm_kAJ=~??vf1Ay_x3RyIZuDgiaEi&@jZmz!>g(6X$sa)|;4q zcG&NNM&fprnsZL@Acw9}!WJtPjVWVhN{>TNk7{kzqIFIAu*((LS%0bZ!8+prQRY6O z_hZ#pg|Nb}?YLti>Pnj83C74=(c-CeW$ z*T$9YOvCkB>RWH9m^8_)x`}A)?wMTU4>l?4=&1*Nk$W3rSmuWnH zTvHiYai?4dE*X?!<@8*t>WyN!EW<>RJg1@_!usf#QdEP!YL=)dFBIW}JA2krN^wGD z{h8m#+7#ob$*n9KPZC4~y4&3r9$~puOX78ulgb~Tvej>^d+jMOQ2Mg_mv%19tK2hcRV+YuC+%w|PA(`hCIe z<*e>GtFjB%CZ6*Hb3>QKj7?TU)se^`#TJ!R_-?EG0Gm`0J>$%Y>=D(r`XG6daln^E zjX30pDW!J4@;Y)&0t=;zb?SLikkK$1y(QT!@m!NWIoJhkcj zwfv9i{ph{t`nBfz>%GE_#QTXv1eU8Ej3@>pNc5i~=qnzCSYK{gXvz}LGnycS{n&(= zh2|3Beu)jt_AfXz836Op?lZ^Td3u;{+n58}woyRmaKy`aCv#gR@lQYjaWUjy7{VfX~|>C7W-l{?Rivr z_0!%|k`C=|xSLqZF+VYAOW29e`dgtnDu!8PJN81Sj`{Y*=OyU{I#nu^{ZEroQ$UF4bGCZsR#D0`+Sc6@ewJIUQYt34t^69;U9mXc)0C{U8Ts;$D{G4??^_0Yrdfo*reo+6aHbQCI(UlN z4W`$Eh~YiLC4}8%`kQ@=&|Fc^E(ntr>%(j^*Y@S3S8K=pzgZ(j2X6Av)4O@|0<=G% z==Wa^!E6E2iEzVhAGX3pX||(K2;U3%2XRNP0dNo(DWc~S;XIT91LcCP*Z1RpAwcTh zc{;vG0SDjTAsRpQ5W;wMcd%^rC)mR(l;VC5?$4h^YqrnozX9*8V7XQs_2jvT`I?3? zehV??Zl@){jddcV-aNfdRz5-XxL)HW=Y2yb=1sTDxAR(`hV@_X(#eGcBrs}M*4)^4 zh0H4y+r<1P;xuqr3o*}8v0|k3H1tTAbo$%@td^Ze!4;pDG}JHC3anEXNw=IU>zBM1 zJV~eC4Ik^g&RxI3^6Wx1qb*Mt^@d9&D`lx)n<5J zfLgc$w~gH?COZMJeh+@7%wjeDMU?}@uurj1re*gZhF4D?-dwv&f9s-0w{%JCv0LD4 z?H&M(!-EzH!OTtwPx!>L!l)?*w9g-)xmk2h5Y37CkrqbShm2*06~#6Y3xK#>h8)VX znb;sb96pQGLP4 z`bN<31C^2nH?5KkW@RLBWclbNxXSz2xpAkag~JMidmchVO?6Zgm1SjQd3JEAQur&9 z`kc@w#;6?;_td4;xf?TIEMdfygASD$ndaV-iiiJ-O>fOw&FIot&MvK1F_SRzcHZA# zSeEnINW%AUWPa?TTX5I4LbojXRg0i4L*b?8ZwwLT6|tKKIYpD znF>Y#5VHFtxq+CwYu8Z$6cuI`^-0kJ7?BIPLqwqgb?Q|^SWi1OJ;10YPz@pCGd8t@ zxW-=6rO`ccL?bkxLc5bY_xarU=z^bu#YRE>sWx@X}0c4MhQ$8))3=fx~Dj~h#YBPjH~ zy3emmT8}AzGsGSaN<%i9DSj;ChCY)>UL2X0$J`@6heGr_eCtF%uC>}(H0RTgoq)#O z=t)+Q)iQ5WQO3pSU~iR$=LYQ?y5Z^6_L_3Fq42a`HjH1t`ur4oc)GbfbHt>Vo3b|yOn%V-62!g7L_R-t&|LGTNvSY-omJMOu&)mb!H9<= zgngK`hvOmg{%*7ZtOoO2Vbecozce&u%7vAU5w!&bBwN8K z+&Xq1jKC}x0M1|0x(4&LW-TS}VA1CR-CxRkh^&NqK!mdOIpu5!|B}<_Zqa7Bu5Pku znt*6nsbJ4b?>`Ob{8E^~>%{%{fu4S5fztJd5VY{}#ZRr+hq5HEJs}~IG zQ+eG}XA!rvNn+2^<5ZS&EL4g}qj#YOR9i`kVI0k%)#0_D(y=-FmbZ)&rt!-U5-Xgm z1dUcL8;EmDt!8&*0jN}2PYtcFSYoQck?7<11@$f zj~yJ$5qRl5VaO!b8VN2jWM9427iDJ5iyrL?(8Dqnyw6mNR2)Cwu4e-i^e=#as{$N5>7F$h(^<~D7m@gPRHgZ8tJ9@WR`OG zWq7wcUG{d#Tlp^EoTRO#Z1XM+d)Uh7@fs%F0h+KWcwG)}MA!aV!6Qz$cl40yd{ktZoXS_ja2_k-&x8buc8GKit)j;j2_D=mQ@l z_z`)R*!ZZd;ChB)1`L53@&O+Roj!${&Gc^NNC!fif^xGU;oZ7H-<~vtF%+2yC&#Jj zXOcbx6Z%&xh%kho5@@W&y}?V*r6IQXe#4QeoVu0;8;q z<8jAD8oG>xBAIK~VO=QLxIk<4R_se))BKh682O*wGyg68 zHsNJ3as5SB-JPNaZ{tKwy&0a*!f*^)Zf)wLBD1bqkd|2p4ii}jf}rnAz(YDKgIW7$ z>zWhm6j1mXpW1bB{1_)Go(6C_-K7VPY_8~^KmWpH!RD8rj|Z**tjPsE03|e0XbeI? z?x1|r>B{_lG@dvL0Ov64i@KI(dwEXdgi;WvS3OLD5J(vEp?3@5&?kPV2mNfFjhp&0p$LAZ(7OQiO*^BwG7`e`tCva$T!{vW^1*e zPcv_6r8rs&CXQ%q=1#X>z@ZaEm>zSm+D>|Cziwqdoutq;r%3ia)VYlo)(}_m%g8|D zLJ-J_xou!{;g#u#^K_1O?afu)H$T{ee?+*!bSKeAcFc5{*Fp{J3T$)3fDLC?)dO$3 z$zEyrIA_@-r^X!8jiojE0&G77H36IfK&7T zgu&Y+`~@)9Oz6_^uV}{*nDPP;ME7fr4=dvqb+wP{;1l4>TdMsZXhTVW8yJi7W$vI- zkoJKh5-KL6*MjcOGk6zJ*4h!s)!LH?;V)(*ol^t zIqFQPEE3Cmgdly$Nkm4BIl-of%@Ug;W@*_gFb(r}2@-hE%(}}@m)+u3V*Yi`Y-I6j zBJ;ug#c`nS#Y2&LU$2N)Bxo{FzsiG9SWFo={cMm}uT+|?v~EEz10g5`d*Z~bPnf2* z&rENsB(0=cq#l8Xrj5+@k^!RULNIFai4$$5!-|$E7kj3#mjl1a`xEf^C!ury4}1On zcfuT)_KZHw^<#-mR}L=(iUXynWJ^Q0Ri|UZrk?gIw7ne(@EI6#AW$@QbEKGLx()N8 zgGdop;ZHtwElK7%R1!R+Sf8IxPYJ{O%r!(qw5Xa8Oz8})oU2IrWv~gx8C3UA`)#)K z@c$rUK62K5N8~c;xQ2{s2JQLWYMtzD`cFQZ2$2aip{s;QIvB57$}$B+M@lTsB^;lH z5vipwJWd#*ZikIm1G5$+a7}2=aif+6q%Qv^dto~hg`x*AVrOA{5xmSMpT)JU%&t@F z2;U!JrT;n=7TUC6--+4ox+}EDPJyw7Tk&4Ji4d+0U$-v10K?pH!wUli_Jo&6_C!hi z1^*F-DHvau_GngN5!ayafN6G$pbt#L4lv`~EH@zZS$~6Df0+2c0Di>(JJP7iB?iiL zTq@Y36#mJZw(RsNDQ_Ia{RGVBt8q%ijf8*SQL>h@crM5%KuuH+;AM6ImXmdhZulS& z5c5?NVjG8gfYpQbb?54QaW9*g%hBvOVK2gQt=zztjz{=K|Br)`eWfXoX$FF3zUv~> z(c>G4>jr$I#jtS-E3C^oPk!Jiv*|LbUZ3B7G;cmIXp~Eub|8rQ>boYJ*5u$Z*o{78 zS9QGpSD&u}kyn5OG)dFQ!ua|Ur}a?5Sy@hJuBV~evoH>XG);ZaH0&4hb9$BX{+G9f0twO9fn7$6!D)FeH_qU0hk8Fm7pA4x4o ze>nV`W!wOZ^8E6H2G%N;@RekfF|&ccjb?MkyaCUXlGwC)!(17jss|%MtJ`KS1F7m` zJq;KDsQ`9Qjy01C`RHBi4&!Bi9D?Rz!dEn5tJbkTs6!ML)VHJsT8SX4K{zb!ZnR(g zu`;@o7QMUPzfS?}I+AfvfrfWK+~8E@fo=RuIp%rw(V|?Tr%O+cZu{J{a-^HkEGp)* zQj@w`SV6pmr{|C9KuIy1px)6p;a&_J3RTA_gST+k&|F%=B@`arnT`0|2;5^`aJNpY zYBKGm0vK;Est1UMxhLSeYqwCO2_t+Ln4~R>-v`s5>aM#}3}#mVMJiG!$Q6(n4+`k_|b78A`)^E~u*Qjh*L8Kgg{SWDds>uz;j^-)l# z>!Ex;Wb;WEU?YE!+#6md)IA)B)$_kCyd@j}*dZ@Wiv-m~!^9D9ql7|1YY5>N=iE|Ikq!MVdBKmXA8sjF& zoQUw;24;eTX(cE%980g#rD_eo{xtxE9svDHs~3JOJi1m3M7TfEw4}@GvtpDQR>wS( z>VFfQH5eP*gCj}vzC}B$tfvnOLtC*0h!9DdvX5%s4-iln_3!S+h)Xz#`spSX^%rJK zUITs@fhHhCzZH5SmjI{TC^Sqe*q2wapua2KEB^5vCh}8#v#qpf-Wg4^Rxe?)pK@IF zQ*qq5_E<;jyA+iYa0+QHKS%Svf!Bv8ZOcE8K?PHFIc>k}%i{9Qp%fxjW!8}8(DS@4aVmOV@TVbJRDmNzc&lCUw( z`(4Nijx7~?y{MvM2PF-M5?X;kftlf>uo-GizhR>6r@NMrtUB#gAV=r#9-Xn;S?H|H z)??4BF=vZ%f15haJ}dsAc=PBfZ31KuA8;*e>nFbfJg*Qlh`seD`{D~@lx^e% z4;gio(0?0Vi1ds58?n7*i^ospi{gOAP>h#i=|FQa4~lWiWbPcF=jDys%MS;S`4{R>})1*`R#y6?6(N8W)ZB-y{ zm51@8jP#*Ejk(@k-vhaTk6*}beDO(@`|I9z*cJ?s&&2~OVKZQZJKp^r#r)5kr}seT zvcbh084){UCc+t}8}?iN3}uJ|I7Bzd_*8DAY|py=%)*9_ZUb~A&84=^qo~gO>QN_}EVz6G{TM4__7ooe`io1zls_Et#pQ{6I zcRPv6B@09bE2rkfu7oNFYuPxKL5m@vs^|Z@F@b3>8jQmU>AIPP#u$rHk40TSMKBsJ zx~@8W=-sXHQM<1A>lR+SDdhaaosXR4Xi6t%QSQ7ImDifa5#yA><*dks(Ii#>h|e>Hk1 zx%`}d>M5s_QgYHj*qG;3-WAQLl-x0~U9ABLl)md`rgfcdmeW81#Ac6*xivg$+KWjD`C@%x75^S1{&-lCwWVL?97eeet)lCU$2Ye737?_EU~u>0egq0 z6~&ADI76&KV3&#h=U{EFDRFc8ZCOpJeeBivIYNfzu2Y#L@>p-3*x{|YAlt<^|vLY1Hy4xNl!ygFI3rU z)mB!YwuRqL@qQ)774yq!xl#(U=v*y-Sxl8Ps17pwn*Ovwz6b5Bqwl6z%*p?^o;l&1 zRH9Vw+1jSgf=i z@+<%e>3gVm+rZf6jQqD8PjS>T5Y2b>aILle1#Xypl16fvFzF;E0WV6;??prdOPnqkMtm{-Pk_tsw!nNGUm15|hCLiXLY9vM>Vk9x^CkPs zdjn&q5TQVV%!}#T7s9R~3T=Mj^MT84*2JYndpCc_j?xP4pm_83_;PAV)%QsyqT%lL zw!frft$cQ5#E0dlApay6G~k#&(H=Mme0tms_d|_++2ZZ78ni0 zX%!WHka;$T_SCdoIY~9v)J_}XEF^)|HU9I&mL|8HENzIimg0NqlIyxSDS(#a^6_?n zwX?uE?u+!%mXy`4F{pMUq^Hxt6v&_*@By0?GFK9Ll-z(7;9B zUOv5-tVC8ix3l!of6d#QQM}OJq``F`2utxxA>hGa?@dzIkPby&eEIr z_|!Gn2=bGvUF%E=^uv_{GBrL4mOZM^3%tEPT`GZhL0ENV2yb57qA_RD&e9pQdh(ws zZ2MWpj`&6nDiCSC6I;;Kazg(yw>EzHfb(UCqj5^eITH^pskpDTrdN~^2J_`Hjn{zP zwe#hkf2wnA-1Mmaz1!9XK+X*JB925_%o{nPpoI9lR4T0ua2h?0+p|x|{+9H%VO5N&gN4@-Pc{4f zBZ+j?gHv~vLr9vh?&u5-Ocx&omg3jLFaLA7^PcJO>`h!$&RlS$4q6W^u#~%6O$9YJK{xWv{ps}N>;a!CVU?F$9 zS(;O$a}63?=A+JR*R}E5>GHEV*Yq=>7J?LSw&67{#?5 z&cf7VdJSE7KH7R}@n;4|ao>&kQI7C*=hN7MJsSrg{>ncy@|P|Ix*hY9%A7r&m3{KS z|Nf>GHt=e(uQn57lpxWbu-)EmBf2r>KV_@P(Wk(XxJLTMtvNXYd}`|ylroNnhXp$( z7-#4u{8!QOe>A*Tei8GPn)l}7ARC>$`P;v0lx%qCjVat9sT5FI);wn^F}i_5fh zcTL;3X(g2nq%Dy2*1l}p*m&1&{pSU}smQ*9O@v^9iuGZ%W)c0s-0-Cs_Izbe<09CP zOy@5dA*O!Kw1I!s=R}u3J0L?XL~xOOjdMGXKKS+fkDz`&N1rFMGh(z-xA$d*C1MsJd*6FMv~cuB`(Il1tI@S=M+P$y b&lmZi^5(;*%Pk)^X36-1+4-__F8BWrV*R-u literal 0 HcmV?d00001 From 7e8dabe0e770bb33e7eb1a44c1b455fa04530afa Mon Sep 17 00:00:00 2001 From: Brian Lich Date: Thu, 4 Apr 2019 08:50:23 -0700 Subject: [PATCH 110/724] new build 4/4/2019 8:50 AM --- ...ndows-diagnostic-events-and-fields-1903.md | 224 +++++++++--------- 1 file changed, 112 insertions(+), 112 deletions(-) diff --git a/windows/privacy/basic-level-windows-diagnostic-events-and-fields-1903.md b/windows/privacy/basic-level-windows-diagnostic-events-and-fields-1903.md index e28e119c2b..a0330d713f 100644 --- a/windows/privacy/basic-level-windows-diagnostic-events-and-fields-1903.md +++ b/windows/privacy/basic-level-windows-diagnostic-events-and-fields-1903.md @@ -13,7 +13,7 @@ manager: dansimp ms.collection: M365-security-compliance ms.topic: article audience: ITPro -ms.date: 04/03/2019 +ms.date: 04/04/2019 --- @@ -4040,24 +4040,24 @@ The following fields are available: ### Microsoft.Windows.DriverInstall.NewDevInstallDeviceStart -No content is currently available. +This event sends data about the driver that the new driver installation is replacing. The following fields are available: -- **DeviceInstanceId** No content is currently available. -- **FirstInstallDate** No content is currently available. -- **LastDriverDate** No content is currently available. -- **LastDriverInbox** No content is currently available. -- **LastDriverInfName** No content is currently available. -- **LastDriverVersion** No content is currently available. -- **LastFirmwareDate** No content is currently available. -- **LastFirmwareRevision** No content is currently available. -- **LastFirmwareVersion** No content is currently available. -- **LastInstallDate** No content is currently available. -- **LastMatchingDeviceId** No content is currently available. -- **LastProblem** No content is currently available. -- **LastProblemStatus** No content is currently available. -- **LastSubmissionId** No content is currently available. +- **DeviceInstanceId** The unique identifier of the device in the system. +- **FirstInstallDate** The first time a driver was installed on this device. +- **LastDriverDate** Date of the driver that is being replaced. +- **LastDriverInbox** Indicates whether the previous driver was included with Windows. +- **LastDriverInfName** Name of the INF file (the setup information file) of the driver being replaced. +- **LastDriverVersion** The version of the driver that is being replaced. +- **LastFirmwareDate** The date of the last firmware reported from the EFI System Resource Table (ESRT). +- **LastFirmwareRevision** The last firmware revision number reported from EFI System Resource Table (ESRT). +- **LastFirmwareVersion** The last firmware version reported from the EFI System Resource Table (ESRT). +- **LastInstallDate** The date a driver was last installed on this device. +- **LastMatchingDeviceId** The hardware ID or compatible ID that Windows last used to install the device instance. +- **LastProblem** The previous problem code that was set on the device. +- **LastProblemStatus** The previous problem code that was set on the device. +- **LastSubmissionId** The driver submission identifier of the driver that is being replaced. ### Microsoft.Windows.PBR.BitLockerWipeFinished @@ -4078,9 +4078,9 @@ This event sends data on the Windows Recovery Environment (WinRE) boot, which ca The following fields are available: -- **BsdSummaryInfo** No content is currently available. -- **sessionID** No content is currently available. -- **timestamp** No content is currently available. +- **BsdSummaryInfo** Summary of the last boot. +- **sessionID** The ID of the push-button reset session. +- **timestamp** The timestamp of the boot state. ### Microsoft.Windows.PBR.ClearTPMStarted @@ -4089,24 +4089,24 @@ This event sends basic data about the recovery operation on the device to allow The following fields are available: -- **sessionID** No content is currently available. -- **timestamp** No content is currently available. +- **sessionID** The ID for this push-button restart session. +- **timestamp** The time when the Trusted Platform Module will be erased. ### Microsoft.Windows.PBR.ClientInfo -No content is currently available. +This event indicates whether push-button reset (PBR) was initiated while the device was online or offline. The following fields are available: -- **name** No content is currently available. -- **sessionID** No content is currently available. -- **timestamp** No content is currently available. +- **name** Name of the user interface entry point. +- **sessionID** The ID of this push-button reset session. +- **timestamp** The time when this event occurred. ### Microsoft.Windows.PBR.Completed -No content is currently available. +This event sends data about the recovery operation on the device to allow for investigation. The following fields are available: @@ -4116,29 +4116,29 @@ The following fields are available: ### Microsoft.Windows.PBR.DataVolumeCount -No content is currently available. +This event provides the number of additional data volumes that the push-button reset operation has detected. The following fields are available: -- **count** No content is currently available. -- **sessionID** No content is currently available. -- **timestamp** No content is currently available. +- **count** The number of attached data drives. +- **sessionID** The ID of this push-button reset session. +- **timestamp** Time the event occurred. ### Microsoft.Windows.PBR.DiskSpaceRequired -No content is currently available. +This event sends the peak disk usage required for the push-button reset operation. The following fields are available: -- **numBytes** No content is currently available. -- **sessionID** No content is currently available. -- **timestamp** No content is currently available. +- **numBytes** The number of bytes required for the reset operation. +- **sessionID** The ID of this push-button reset session. +- **timestamp** Time the event occurred. ### Microsoft.Windows.PBR.EnterAPI -No content is currently available. +This event is sent at the beginning of each push-button reset (PRB) operation. The following fields are available: @@ -4149,7 +4149,7 @@ The following fields are available: ### Microsoft.Windows.PBR.EnteredOOBE -No content is currently available. +This event is sent when the initial installation of the device starts after completion of the push-button reset operation. The following fields are available: @@ -4159,7 +4159,7 @@ The following fields are available: ### Microsoft.Windows.PBR.LeaveAPI -No content is currently available. +This event is sent when the push-button reset operation is complete. The following fields are available: @@ -4167,12 +4167,12 @@ The following fields are available: - **errorCode** Error code if an error occurred during the API call. - **sessionID** The ID of this push-button reset session. - **success** Indicates whether the API call was successful. -- **timestamp** No content is currently available. +- **timestamp** Timestamp of this push-button reset event. ### Microsoft.Windows.PBR.OEMExtensionFinished -No content is currently available. +This event is sent when the OEM extensibility scripts have completed. The following fields are available: @@ -4188,7 +4188,7 @@ The following fields are available: ### Microsoft.Windows.PBR.OEMExtensionStarted -No content is currently available. +This event is sent when the OEM extensibility scripts start to execute. The following fields are available: @@ -4201,7 +4201,7 @@ The following fields are available: ### Microsoft.Windows.PBR.OperationExecuteFinished -No content is currently available. +This event is sent at the end of a push-button reset (PBR) operation. The following fields are available: @@ -4216,7 +4216,7 @@ The following fields are available: ### Microsoft.Windows.PBR.OperationExecuteStarted -No content is currently available. +This event is sent at the beginning of a push-button reset operation. The following fields are available: @@ -4230,7 +4230,7 @@ The following fields are available: ### Microsoft.Windows.PBR.OperationQueueConstructFinished -No content is currently available. +This event is sent when construction of the operation queue for push-button reset is finished. The following fields are available: @@ -4242,7 +4242,7 @@ The following fields are available: ### Microsoft.Windows.PBR.OperationQueueConstructStarted -No content is currently available. +This event is sent when construction of the operation queue for push-button reset is started. The following fields are available: @@ -4252,7 +4252,7 @@ The following fields are available: ### Microsoft.Windows.PBR.PBRClearRollBackEntry -No content is currently available. +This event is sent when the push-button reset operation clears the rollback entry. Push-button reset cannot rollback after this point. The following fields are available: @@ -4261,7 +4261,7 @@ The following fields are available: ### Microsoft.Windows.PBR.PBRClearTPMFailed -No content is currently available. +This event is sent when there was a failure while clearing the Trusted Platform Module (TPM). The following fields are available: @@ -4270,7 +4270,7 @@ The following fields are available: ### Microsoft.Windows.PBR.PBRCreateNewSystemReconstructionFailed -No content is currently available. +This event is sent when the push-button reset operation fails to construct a new copy of the operating system. The following fields are available: @@ -4284,7 +4284,7 @@ The following fields are available: ### Microsoft.Windows.PBR.PBRCreateNewSystemReconstructionSucceed -No content is currently available. +This event is sent when the push-button reset operation succeeds in constructing a new copy of the operating system. The following fields are available: @@ -4296,7 +4296,7 @@ The following fields are available: ### Microsoft.Windows.PBR.PBRDriverInjectionFailed -No content is currently available. +This event is sent when the driver injection fails. The following fields are available: @@ -4305,7 +4305,7 @@ The following fields are available: ### Microsoft.Windows.PBR.PBRFailed -No content is currently available. +This event is sent when the push-button reset operation fails and rolls back to the previous state. The following fields are available: @@ -4316,7 +4316,7 @@ The following fields are available: ### Microsoft.Windows.PBR.PBRFinalizeNewSystemFailed -No content is currently available. +This event is sent when the push-button reset operation fails to finalize the new system. The following fields are available: @@ -4329,7 +4329,7 @@ The following fields are available: ### Microsoft.Windows.PBR.PBRFinalizeNewSystemSucceed -No content is currently available. +This event is sent when the push-button reset operation succeeds in finalizing the new system. The following fields are available: @@ -4338,7 +4338,7 @@ The following fields are available: ### Microsoft.Windows.PBR.PBRFinalUserSelection -No content is currently available. +This event is sent when the user makes the final selection in the user interface. The following fields are available: @@ -4352,7 +4352,7 @@ The following fields are available: ### Microsoft.Windows.PBR.PBRFormatOSVolumeFailed -No content is currently available. +This event is sent when the operation to format the operating system volume fails during push-button reset (PBR). The following fields are available: @@ -4362,17 +4362,17 @@ The following fields are available: ### Microsoft.Windows.PBR.PBRFormatOSVolumeSucceed -No content is currently available. +This event is sent when the operation to format the operating system volume succeeds during push-button reset (PBR). The following fields are available: -- **JustDeleteFiles** No content is currently available. -- **SessionID** No content is currently available. +- **JustDeleteFiles** Indicates whether disk formatting was skipped. +- **SessionID** The ID of this push-button reset session. ### Microsoft.Windows.PBR.PBRInstallWinREFailed -No content is currently available. +This event sends basic data about the recovery operation failure on the device to allow investigation. The following fields are available: @@ -4381,7 +4381,7 @@ The following fields are available: ### Microsoft.Windows.PBR.PBRIOCTLErasureSucceed -No content is currently available. +This event is sent when the erasure operation succeeds during push-button reset (PBR). The following fields are available: @@ -4718,7 +4718,7 @@ The following fields are available: ### Microsoft.Windows.PBR.SessionCreated -No content is currently available. +This event returns data when the PRB (Push Button Reset) session is created at the beginning of the UI (user interface) process. The following fields are available: @@ -4728,7 +4728,7 @@ The following fields are available: ### Microsoft.Windows.PBR.SessionResumed -No content is currently available. +This event returns data when the PRB (Push Button Reset) session is resumed after reboots. The following fields are available: @@ -4738,7 +4738,7 @@ The following fields are available: ### Microsoft.Windows.PBR.SessionSaved -No content is currently available. +This event returns data when the PRB (Push Button Reset) session is suspended between reboots. The following fields are available: @@ -4748,18 +4748,18 @@ The following fields are available: ### Microsoft.Windows.PBR.SetupExecuteFinished -No content is currently available. +This event returns data when the PBR (Push Button Reset) setup finishes. The following fields are available: -- **sessionID** No content is currently available. +- **sessionID** The ID of this push-button reset session. - **systemState** Information about the system state of the Setup Platform operation. - **timestamp** The timestamp of this push-button reset event. ### Microsoft.Windows.PBR.SetupExecuteStarted -No content is currently available. +This event returns data when the PBR (Push Button Reset) setup starts. The following fields are available: @@ -4769,7 +4769,7 @@ The following fields are available: ### Microsoft.Windows.PBR.SetupFinalizeStarted -No content is currently available. +This event returns data when the Finalize operation is completed by setup during PBR (Push Button Reset). The following fields are available: @@ -4779,7 +4779,7 @@ The following fields are available: ### Microsoft.Windows.PBR.SetupOperationFailed -No content is currently available. +This event returns data when a PRB (Push Button Reset) setup operation fails. The following fields are available: @@ -4792,7 +4792,7 @@ The following fields are available: ### Microsoft.Windows.PBR.SystemInfoField -No content is currently available. +This event returns data about the device when the user initiates the PBR UI (Push Button Reset User Interface), to ensure the appropriate reset options are shown to the user. The following fields are available: @@ -4804,7 +4804,7 @@ The following fields are available: ### Microsoft.Windows.PBR.SystemInfoListItem -No content is currently available. +This event returns data about the device when the user initiates the PBR UI (Push Button Reset User Interface), to ensure the appropriate options can be shown to the user. The following fields are available: @@ -4817,7 +4817,7 @@ The following fields are available: ### Microsoft.Windows.PBR.SystemInfoSenseFinished -No content is currently available. +This event returns data when System Info Sense is finished. The following fields are available: @@ -4829,7 +4829,7 @@ The following fields are available: ### Microsoft.Windows.PBR.SystemInfoSenseStarted -No content is currently available. +This event returns data when System Info Sense is started. The following fields are available: @@ -4839,7 +4839,7 @@ The following fields are available: ### Microsoft.Windows.PBR.UserAcknowledgeCleanupWarning -No content is currently available. +This event returns data when the user acknowledges the cleanup warning pop-up after PRB (Push Button Reset) is complete. The following fields are available: @@ -4849,7 +4849,7 @@ The following fields are available: ### Microsoft.Windows.PBR.UserCancel -No content is currently available. +This event returns data when the user confirms they wish to cancel PBR (Push Button Reset) from the user interface. The following fields are available: @@ -4860,7 +4860,7 @@ The following fields are available: ### Microsoft.Windows.PBR.UserConfirmStart -No content is currently available. +This event returns data when the user confirms they wish to reset their device and PBR (Push Button Reset) begins. The following fields are available: @@ -4870,7 +4870,7 @@ The following fields are available: ### Microsoft.Windows.PBR.WinREInstallFinished -No content is currently available. +This event returns data when WinRE (Windows Recovery) installation is complete. The following fields are available: @@ -4882,7 +4882,7 @@ The following fields are available: ### Microsoft.Windows.PBR.WinREInstallStarted -No content is currently available. +This event returns data when WinRE (Windows Recovery) installation starts. The following fields are available: @@ -4903,11 +4903,11 @@ The following fields are available: ### Microsoft.Windows.Security.WSC.GetCallerViaWdsp -No content is currently available. +This event returns data if the registering product EXE (executable file) does not allow COM (Component Object Model) impersonation. The following fields are available: -- **callerExe** No content is currently available. +- **callerExe** The registering product EXE that does not support COM impersonation. ### Microsoft.Windows.SysReset.FlightUninstallCancel @@ -4957,7 +4957,7 @@ This event is sent when users have actions that will block the uninstall of the ### Microsoft.Windows.SysReset.IndicateLCUWasUninstalled -No content is currently available. +This event is sent when the registry indicates that the latest cumulative Windows update package has finished uninstalling. The following fields are available: @@ -5049,30 +5049,30 @@ The following fields are available: ### Microsoft.Windows.UEFI.ESRT -No content is currently available. +This event sends basic data during boot about the firmware loaded or recently installed on the machine. This helps to keep Windows up to date. The following fields are available: -- **DriverFirmwareFilename** No content is currently available. -- **DriverFirmwarePolicy** No content is currently available. -- **DriverFirmwareStatus** No content is currently available. -- **DriverFirmwareVersion** No content is currently available. +- **DriverFirmwareFilename** The firmware file name reported by the device hardware key. +- **DriverFirmwarePolicy** The optional version update policy value. +- **DriverFirmwareStatus** The firmware status reported by the device hardware key. +- **DriverFirmwareVersion** The firmware version reported by the device hardware key. - **FirmareLastAttemptVersion** No content is currently available. -- **FirmwareId** No content is currently available. -- **FirmwareLastAttemptStatus** No content is currently available. -- **FirmwareLastAttemptVersion** No content is currently available. -- **FirmwareType** No content is currently available. -- **FirmwareVersion** No content is currently available. -- **InitiateUpdate** No content is currently available. -- **LastAttemptDate** No content is currently available. -- **LastAttemptStatus** No content is currently available. -- **LastAttemptVersion** No content is currently available. -- **LowestSupportedFirmwareVersion** No content is currently available. -- **MaxRetryCount** No content is currently available. -- **PartA_PrivTags** No content is currently available. -- **RetryCount** No content is currently available. -- **Status** No content is currently available. -- **UpdateAttempted** No content is currently available. +- **FirmwareId** The UEFI (Unified Extensible Firmware Interface) identifier. +- **FirmwareLastAttemptStatus** The reported status of the most recent firmware installation attempt, as reported by the EFI System Resource Table (ESRT). +- **FirmwareLastAttemptVersion** The version of the most recent attempted firmware installation, as reported by the EFI System Resource Table (ESRT). +- **FirmwareType** The UEFI (Unified Extensible Firmware Interface) type. +- **FirmwareVersion** The UEFI (Unified Extensible Firmware Interface) version as reported by the EFI System Resource Table (ESRT). +- **InitiateUpdate** Indicates whether the system is ready to initiate an update. +- **LastAttemptDate** The date of the most recent attempted firmware installation. +- **LastAttemptStatus** The result of the most recent attempted firmware installation. +- **LastAttemptVersion** The version of the most recent attempted firmware installation. +- **LowestSupportedFirmwareVersion** The oldest (lowest) version of firmware supported. +- **MaxRetryCount** The maximum number of retries, defined by the firmware class key. +- **PartA_PrivTags** The privacy tags associated with the firmware. +- **RetryCount** The number of attempted installations (retries), reported by the driver software key. +- **Status** The status returned to the PnP (Plug-and-Play) manager. +- **UpdateAttempted** Indicates if installation of the current update has been attempted before. ### Microsoft.Xbox.XamTelemetry.AppActivationError @@ -7197,22 +7197,22 @@ The following fields are available: ### Microsoft.Windows.Update.Orchestrator.DetectionActivity -No content is currently available. +This event returns data about detected updates, as well as the types of update (optional or recommended). This data helps keep Windows up to date. The following fields are available: -- **applicableUpdateIdList** No content is currently available. -- **applicableUpdateList** No content is currently available. -- **durationInSeconds** No content is currently available. -- **expeditedMode** No content is currently available. -- **networkCostPolicy** No content is currently available. -- **scanTriggerSource** No content is currently available. -- **scenario** No content is currently available. -- **scenarioReason** No content is currently available. -- **seekerUpdateIdList** No content is currently available. -- **seekerUpdateList** No content is currently available. -- **services** No content is currently available. -- **wilActivity** No content is currently available. See [wilActivity](#wilactivity). +- **applicableUpdateIdList** The list of update identifiers. +- **applicableUpdateList** The list of available updates. +- **durationInSeconds** The amount of time (in seconds) it took for the event to run. +- **expeditedMode** Indicates whether Expedited Mode is on. +- **networkCostPolicy** The network cost. +- **scanTriggerSource** Indicates whether the scan is Interactive or Background. +- **scenario** The result code of the event. +- **scenarioReason** The reason for the result code (scenario). +- **seekerUpdateIdList** The list of “seeker” update identifiers. +- **seekerUpdateList** The list of “seeker” updates. +- **services** The list of services that were called during update. +- **wilActivity** The activity results. See [wilActivity](#wilactivity). ### Microsoft.Windows.Update.Orchestrator.DisplayNeeded From 4da8a329980776d021f3e37abdaf4c16c2939a6c Mon Sep 17 00:00:00 2001 From: Brian Lich Date: Thu, 4 Apr 2019 08:50:29 -0700 Subject: [PATCH 111/724] new build 4/4/2019 8:50 AM --- ...ndows-diagnostic-events-and-fields-1703.md | 2 +- ...ndows-diagnostic-events-and-fields-1709.md | 2 +- ...ndows-diagnostic-events-and-fields-1803.md | 2 +- ...ndows-diagnostic-events-and-fields-1809.md | 426 ++++++++++++++++-- 4 files changed, 401 insertions(+), 31 deletions(-) diff --git a/windows/privacy/basic-level-windows-diagnostic-events-and-fields-1703.md b/windows/privacy/basic-level-windows-diagnostic-events-and-fields-1703.md index b1c005dbbe..c029cc311a 100644 --- a/windows/privacy/basic-level-windows-diagnostic-events-and-fields-1703.md +++ b/windows/privacy/basic-level-windows-diagnostic-events-and-fields-1703.md @@ -13,7 +13,7 @@ manager: dansimp ms.collection: M365-security-compliance ms.topic: article audience: ITPro -ms.date: 04/03/2019 +ms.date: 04/04/2019 --- diff --git a/windows/privacy/basic-level-windows-diagnostic-events-and-fields-1709.md b/windows/privacy/basic-level-windows-diagnostic-events-and-fields-1709.md index ab77c90805..8fdeaa71a6 100644 --- a/windows/privacy/basic-level-windows-diagnostic-events-and-fields-1709.md +++ b/windows/privacy/basic-level-windows-diagnostic-events-and-fields-1709.md @@ -13,7 +13,7 @@ manager: dansimp ms.collection: M365-security-compliance ms.topic: article audience: ITPro -ms.date: 04/03/2019 +ms.date: 04/04/2019 --- diff --git a/windows/privacy/basic-level-windows-diagnostic-events-and-fields-1803.md b/windows/privacy/basic-level-windows-diagnostic-events-and-fields-1803.md index db64dc298d..f7b9ceb9f0 100644 --- a/windows/privacy/basic-level-windows-diagnostic-events-and-fields-1803.md +++ b/windows/privacy/basic-level-windows-diagnostic-events-and-fields-1803.md @@ -13,7 +13,7 @@ manager: dansimp ms.collection: M365-security-compliance ms.topic: article audience: ITPro -ms.date: 04/03/2019 +ms.date: 04/04/2019 --- diff --git a/windows/privacy/basic-level-windows-diagnostic-events-and-fields-1809.md b/windows/privacy/basic-level-windows-diagnostic-events-and-fields-1809.md index f398e84056..ee4dd734aa 100644 --- a/windows/privacy/basic-level-windows-diagnostic-events-and-fields-1809.md +++ b/windows/privacy/basic-level-windows-diagnostic-events-and-fields-1809.md @@ -13,7 +13,7 @@ manager: dansimp ms.collection: M365-security-compliance ms.topic: article audience: ITPro -ms.date: 04/03/2019 +ms.date: 04/04/2019 --- @@ -1775,7 +1775,6 @@ The following fields are available: - **WmdrmInUse** WmdrmIndicators AND dismissible block in setup was not dismissed. - **WmdrmNonPermanent** Indicates if the system has any files with non-permanent licenses. - **WmdrmPurchased** Indicates if the system has any files with permanent licenses. -- **聗mdrmNonPermanent** No content is currently available. ### Microsoft.Windows.Appraiser.General.WmdrmRemove @@ -1966,9 +1965,7 @@ The following fields are available: - **MEID** Represents the Mobile Equipment Identity (MEID). MEID is a worldwide unique phone ID assigned to CDMA phones. MEID replaces electronic serial number (ESN), and is equivalent to IMEI for GSM and WCDMA phones. Microsoft does not have access to mobile operator billing data so collecting this data does not expose or identify the user. - **MNC0** Retrieves the Mobile Network Code (MNC). It used with the Mobile Country Code (MCC) to uniquely identify a mobile network operator. The two fields represent phone with dual sim coverage. - **MNC1** Retrieves the Mobile Network Code (MNC). It used with the Mobile Country Code (MCC) to uniquely identify a mobile network operator. The two fields represent phone with dual sim coverage. -- **Mobi�eOperatorNetwork1** No content is currently available. - **MobileOperatorBilling** Represents the telephone company that provides services for mobile phone users. -- **MobileOperatorCommercia�ized** No content is currently available. - **MobileOperatorCommercialized** Represents which reseller and geography the phone is commercialized for. This is the set of values on the phone for who and where it was intended to be used. For example, the commercialized mobile operator code AT&T in the US would be ATT-US. - **MobileOperatorNetwork0** Represents the operator of the current mobile network that the device is used on. (AT&T, T-Mobile, Vodafone). The two fields represent phone with dual sim coverage. - **MobileOperatorNetwork1** Represents the operator of the current mobile network that the device is used on. (AT&T, T-Mobile, Vodafone). The two fields represent phone with dual sim coverage. @@ -2728,20 +2725,15 @@ Fired by UTC at startup to signal what data we are allowed to collect. The following fields are available: -- **CanAddMsagoMsTelemetry** No content is currently available. - **CanAddMsaToMsTelemetry** True if we can add MSA PUID and CID to telemetry, false otherwise. -- **CanCollactAnyTelemetry** No content is currently available. - **CanCollectAnyTelemetry** True if we are allowed to collect partner telemetry, false otherwise. - **CanCollectCoreTelemetry** True if we can collect CORE/Basic telemetry, false otherwise. - **CanCollectHeartbeats** True if we can collect heartbeat telemetry, false otherwise. - **CanCollectOsTelemetry** True if we can collect diagnostic data telemetry, false otherwise. - **CanCollectWindowsAnalyticsEvents** True if we can collect Windows Analytics data, false otherwise. - **CanPerformDiagnosticEscalations** True if we can perform diagnostic escalation collection, false otherwise. -- **CanPerformiagnosticEscalations** No content is currently available. - **CanPerformTraceEscalations** True if we can perform trace escalation collection, false otherwise. -- **CanPerfotmDiagnosticEscalations** No content is currently available. - **CanReportScenarios** True if we can report scenario completions, false otherwise. -- **Can䁃ollectCoreTelemetry** No content is currently available. - **PreviousPermissions** Bitmask of previous telemetry state. - **TransitionFromEverythingOff** True if we are transitioning from all telemetry being disabled, false otherwise. @@ -2769,18 +2761,9 @@ This event sends data about the health and quality of the diagnostic data from t The following fields are available: - **AgentConnectionErrorsCount** Number of non-timeout errors associated with the host/agent channel. -- **AggregationFlags** No content is currently available. -- **AggregationPeriodMS** No content is currently available. -- **AudioInMS** No content is currently available. -- **AudioOutMS** No content is currently available. -- **BackgroundMouseSec** No content is currently available. -- **BitPeriodMS** No content is currently available. - **CensusExitCode** The last exit code of the Census task. - **CensusStartTime** Time of last Census run. - **CensusTaskEnabled** True if Census is enabled, false otherwise. -- **CompositionDirtyGeneratedSec** No content is currently available. -- **CompositionDirtyPropagatedSec** No content is currently available. -- **CompositionRenderedSec** No content is currently available. - **CompressedBytesUploaded** Number of compressed bytes uploaded. - **ConsumerDroppedCount** Number of events dropped at consumer layer of telemetry client. - **CriticaDataThrottleDroppedCount** No content is currently available. @@ -2794,9 +2777,7 @@ The following fields are available: - **DecodingDroppedCount** Number of events dropped due to decoding failures. - **EnteringCriticalOverflowDroppedCounter** Number of events dropped due to critical overflow mode being initiated. - **EtwDroppedBufferCount** Number of buffers dropped in the UTC ETW session. -- **EtwDroppedBuffertorFlags** No content is currently available. - **EtwDroppedCount** Number of events dropped at ETW layer of telemetry client. -- **EventSequence** No content is currently available. - **EventsPersistedCount** Number of events that reached the PersistEvent stage. - **EventStoreLhfetimeResetCounter** No content is currently available. - **EventStoreLifetimeResetCounter** Number of times event DB was reset for the lifetime of UTC. @@ -2807,9 +2788,7 @@ The following fields are available: - **EventsUploaded** Number of events uploaded. - **Flags** Flags indicating device state such as network state, battery state, and opt-in state. - **FullTriggerBufferDroppedCount** Number of events dropped due to trigger buffer being full. -- **GameInputSec** No content is currently available. - **HeartBeatSequenceNumber** The sequence number of this heartbeat. -- **InteractiveTimeoutPeriodMS** No content is currently available. - **InvalidHttpCodeCount** Number of invalid HTTP codes received from contacting Vortex. - **LastAgentConnectionError** Last non-timeout error encountered in the host/agent channel. - **LastEventSizeOffender** Event name of last event which exceeded max event size. @@ -2822,23 +2801,17 @@ The following fields are available: - **RepeatedUploadFailureDropped** Number of events lost due to repeated upload failures for a single buffer. - **SettingsHttpAttempts** Number of attempts to contact OneSettings service. - **SettingsHttpFailures** The number of failures from contacting the OneSettings service. -- **SinceFirstInteractivityMS** No content is currently available. -- **SpeechRecognitionSec** No content is currently available. -- **SummaryRound** No content is currently available. -- **TargetAsId** No content is currently available. - **ThrottledDroppedCount** Number of events dropped due to throttling of noisy providers. - **TopUploaderErrors** List of top errors received from the upload endpoint. - **TopUploaderErross** No content is currently available. - **UploaderDroppedCount** Number of events dropped at the uploader layer of telemetry client. - **UploaderErrorCount** Number of errors received from the upload endpoint. -- **ViewFlags** No content is currently available. - **VortexFailuresTimeout** The number of timeout failures received from Vortex. - **VortexHttpAttempts** Number of attempts to contact Vortex. - **VortexHttpFailures4xx** Number of 400-499 error codes received from Vortex. - **VortexHttpFailures5xx** Number of 500-599 error codes received from Vortex. - **VortexHttpResponseFailures** Number of Vortex responses that are not 2XX or 400. - **VortexHttpResponsesWithDroppedEvents** Number of Vortex responses containing at least 1 dropped event. -- **WindowFlags** No content is currently available. ### TelClientSynthetic.HeartBeat_Aria_5 @@ -4800,6 +4773,403 @@ The following fields are available: - **objectCount** The count of the number of objects that are being transferred. +### Microsoft.Windows.Remediation.Applicable + +This event indicates a remedial plug-in is applicable if/when such a plug-in is detected. This is used to ensure Windows is up to date. + +The following fields are available: + +- **AllowAutoUpdateExists** No content is currently available. +- **AllowAutoUpdateProviderSetExists** No content is currently available. +- **AppraiserBinariesValidResult** Indicates whether plug-in was appraised as valid. +- **AppraiserRegistryValidResult** Indicates whether the registry entry checks out as valid. +- **AppraiserTaskRepairDisabled** No content is currently available. +- **AppraiserTaskValid** No content is currently available. +- **AUOptionsExists** No content is currently available. +- **CTACTargetingAttributesInvalid** No content is currently available. +- **CTACVersion** No content is currently available. +- **CV** Correlation vector +- **DataStoreSizeInBytes** No content is currently available. +- **DateTimeDifference** The difference between local and reference clock times. +- **DateTimeSyncEnabled** Indicates whether the datetime sync plug-in is enabled. +- **daysSinceInstallThreshold** No content is currently available. +- **daysSinceInstallValue** No content is currently available. +- **DaysSinceLastSIH** The number of days since the most recent SIH executed. +- **DaysToNextSIH** The number of days until the next scheduled SIH execution. +- **DetectConditionEnabled** No content is currently available. +- **DetectedCondition** Indicates whether detect condition is true and the perform action will be run. +- **DetectionFailedReason** No content is currently available. +- **DiskFreeSpaceBeforeSedimentPackInMB** No content is currently available. +- **DiskSpaceBefore** No content is currently available. +- **EditionIdFixCorrupted** No content is currently available. +- **EscalationTimerResetFixResult** No content is currently available. +- **EvalAndReportAppraiserRegEntries** Indicates the EvalAndReportAppraiserRegEntriesFailed event failed. +- **FixedEditionId** No content is currently available. +- **FlightRebootTime** No content is currently available. +- **ForcedRebootToleranceDays** No content is currently available. +- **FreeSpaceRequirement** No content is currently available. +- **GlobalEventCounter** Client side counter that indicates ordering of events sent by the remediation system. +- **HResult** The HRESULT for detection or perform action phases of the plugin. +- **installDateValue** No content is currently available. +- **IsAppraiserLatestResult** The HRESULT from the appraiser task. +- **IsConfigurationCorrected** Indicates whether the configuration of SIH task was successfully corrected. +- **IsEscalationTimerResetFixNeeded** No content is currently available. +- **IsForcedModeEnabled** No content is currently available. +- **IsHomeSku** No content is currently available. +- **IsRebootForcedMode** No content is currently available. +- **IsServiceHardeningEnabled** No content is currently available. +- **IsServiceHardeningNeeded** No content is currently available. +- **isThreshold** No content is currently available. +- **IsUsoRebootPending** No content is currently available. +- **IsUsoRebootPendingInUpdateStore** No content is currently available. +- **IsUsoRebootTaskEnabled** No content is currently available. +- **IsUsoRebootTaskExists** No content is currently available. +- **IsUsoRebootTaskValid** No content is currently available. +- **LastHresult** The HRESULT for detection or perform action phases of the plugin. +- **LastRebootTaskRunResult** No content is currently available. +- **LastRebootTaskRunTime** No content is currently available. +- **LastRun** The date of the most recent SIH run. +- **LPCountBefore** No content is currently available. +- **NextCheck** No content is currently available. +- **NextRebootTaskRunTime** No content is currently available. +- **NextRun** Date of the next scheduled SIH run. +- **NoAutoUpdateExists** No content is currently available. +- **NumberOfDaysStuckInReboot** No content is currently available. +- **OriginalEditionId** No content is currently available. +- **PackageVersion** The version of the current remediation package. +- **PluginName** Name of the plugin specified for each generic plugin event. +- **ProductType** No content is currently available. +- **QualityUpdateSedimentFunnelState** No content is currently available. +- **QualityUpdateSedimentJsonSchemaVersion** No content is currently available. +- **QualityUpdateSedimentLastRunSeconds** No content is currently available. +- **QualityUpdateSedimentLocalStartTime** No content is currently available. +- **QualityUpdateSedimentLocaltTime** No content is currently available. +- **QualityUpdateSedimentTargetedPlugins** No content is currently available. +- **QualityUpdateSedimentTargetedTriggers** No content is currently available. +- **RegkeysExist** No content is currently available. +- **Reload** True if SIH reload is required. +- **RemediationAutoUAAcLineStatus** No content is currently available. +- **RemediationAutoUAAutoStartCount** No content is currently available. +- **RemediationAutoUACalendarTaskEnabled** No content is currently available. +- **RemediationAutoUACalendarTaskExists** No content is currently available. +- **RemediationAutoUACalendarTaskTriggerEnabledCount** No content is currently available. +- **RemediationAutoUADaysSinceLastTaskRunTime** No content is currently available. +- **RemediationAutoUAGetCurrentSize** No content is currently available. +- **RemediationAutoUAIsInstalled** No content is currently available. +- **RemediationAutoUALastTaskRunResult** No content is currently available. +- **RemediationAutoUAMeteredNetwork** No content is currently available. +- **RemediationAutoUATaskEnabled** No content is currently available. +- **RemediationAutoUATaskExists** No content is currently available. +- **RemediationAutoUATasksStalled** No content is currently available. +- **RemediationAutoUATaskTriggerEnabledCount** No content is currently available. +- **RemediationAutoUAUAExitCode** No content is currently available. +- **RemediationAutoUAUAExitState** No content is currently available. +- **RemediationAutoUAUserLoggedIn** No content is currently available. +- **RemediationAutoUAUserLoggedInAdmin** No content is currently available. +- **RemediationCorruptionRepairBuildNumber** No content is currently available. +- **RemediationCorruptionRepairCorruptionsDetected** No content is currently available. +- **RemediationCorruptionRepairDetected** No content is currently available. +- **RemediationDeliverToastBuildNumber** No content is currently available. +- **RemediationDeliverToastDetected** No content is currently available. +- **RemediationDeliverToastDeviceExcludedNation** No content is currently available. +- **RemediationDeliverToastDeviceFreeSpaceInMB** No content is currently available. +- **RemediationDeliverToastDeviceHomeSku** No content is currently available. +- **RemediationDeliverToastDeviceIncludedNation** No content is currently available. +- **RemediationDeliverToastDeviceProSku** No content is currently available. +- **RemediationDeliverToastDeviceSystemDiskSizeInMB** No content is currently available. +- **RemediationDeliverToastGeoId** No content is currently available. +- **RemediationDeviceSkuId** No content is currently available. +- **RemediationGetCurrentFolderExist** No content is currently available. +- **RemediationNoisyHammerAcLineStatus** Event that indicates the AC Line Status of the machine. +- **RemediationNoisyHammerAutoStartCount** The number of times hammer auto-started. +- **RemediationNoisyHammerCalendarTaskEnabled** Event that indicates Update Assistant Calendar Task is enabled. +- **RemediationNoisyHammerCalendarTaskExists** Event that indicates an Update Assistant Calendar Task exists. +- **RemediationNoisyHammerCalendarTaskTriggerEnabledCount** Event that indicates calendar triggers are enabled in the task. +- **RemediationNoisyHammerDaysSinceLastTaskRunTime** The number of days since the most recent hammer task ran. +- **RemediationNoisyHammerGetCurrentSize** Size in MB of the $GetCurrent folder. +- **RemediationNoisyHammerIsInstalled** TRUE if the noisy hammer is installed. +- **RemediationNoisyHammerLastTaskRunResult** The result of the last hammer task run. +- **RemediationNoisyHammerMeteredNetwork** TRUE if the machine is on a metered network. +- **RemediationNoisyHammerTaskEnabled** Indicates whether the Update Assistant Task (Noisy Hammer) is enabled. +- **RemediationNoisyHammerTaskExists** Indicates whether the Update Assistant Task (Noisy Hammer) exists. +- **RemediationNoisyHammerTasksStalled** No content is currently available. +- **RemediationNoisyHammerTaskTriggerEnabledCount** Indicates whether counting is enabled for the Update Assistant (Noisy Hammer) task trigger. +- **RemediationNoisyHammerUAExitCode** The exit code of the Update Assistant (Noisy Hammer) task. +- **RemediationNoisyHammerUAExitState** The code for the exit state of the Update Assistant (Noisy Hammer) task. +- **RemediationNoisyHammerUserLoggedIn** TRUE if there is a user logged in. +- **RemediationNoisyHammerUserLoggedInAdmin** TRUE if there is the user currently logged in is an Admin. +- **RemediationNotifyUserFixIssuesBoxStatusKey** No content is currently available. +- **RemediationNotifyUserFixIssuesBuildNumber** No content is currently available. +- **RemediationNotifyUserFixIssuesDetected** No content is currently available. +- **RemediationNotifyUserFixIssuesDiskSpace** No content is currently available. +- **RemediationNotifyUserFixIssuesFeatureUpdateBlocked** No content is currently available. +- **RemediationNotifyUserFixIssuesFeatureUpdateInProgress** No content is currently available. +- **RemediationNotifyUserFixIssuesIsUserAdmin** No content is currently available. +- **RemediationNotifyUserFixIssuesIsUserLoggedIn** No content is currently available. +- **RemediationProgramDataFolderSizeInMB** No content is currently available. +- **RemediationProgramFilesFolderSizeInMB** No content is currently available. +- **RemediationShellDeviceEducationSku** No content is currently available. +- **RemediationShellDeviceEnterpriseSku** No content is currently available. +- **RemediationShellDeviceFeatureUpdatesPaused** No content is currently available. +- **RemediationShellDeviceHomeSku** No content is currently available. +- **RemediationShellDeviceIsAllowedSku** No content is currently available. +- **RemediationShellDeviceManaged** TRUE if the device is WSUS managed or Windows Updated disabled. +- **RemediationShellDeviceNewOS** TRUE if the device has a recently installed OS. +- **RemediationShellDeviceProSku** No content is currently available. +- **RemediationShellDeviceQualityUpdatesPaused** No content is currently available. +- **RemediationShellDeviceSccm** TRUE if the device is managed by SCCM (Microsoft System Center Configuration Manager). +- **RemediationShellDeviceSetupMutexInUse** No content is currently available. +- **RemediationShellDeviceWuRegistryBlocked** No content is currently available. +- **RemediationShellDeviceZeroExhaust** TRUE if the device has opted out of Windows Updates completely. +- **RemediationTargetMachine** Indicates whether the device is a target of the specified fix. +- **RemediationTaskHealthAutochkProxy** True/False based on the health of the AutochkProxy task. +- **RemediationTaskHealthChkdskProactiveScan** True/False based on the health of the Check Disk task. +- **RemediationTaskHealthDiskCleanup_SilentCleanup** True/False based on the health of the Disk Cleanup task. +- **RemediationTaskHealthMaintenance_WinSAT** True/False based on the health of the Health Maintenance task. +- **RemediationTaskHealthServicing_ComponentCleanupTask** True/False based on the health of the Health Servicing Component task. +- **RemediationTaskHealthUSO_ScheduleScanTask** True/False based on the health of the USO (Update Session Orchestrator) Schedule task. +- **RemediationTaskHealthWindowsUpdate_ScheduledStartTask** True/False based on the health of the Windows Update Scheduled Start task. +- **RemediationTaskHealthWindowsUpdate_SihbootTask** True/False based on the health of the Sihboot task. +- **RemediationUHServiceDisabledBitMap** No content is currently available. +- **RemediationUHServiceNotExistBitMap** No content is currently available. +- **RemediationUsersFolderSizeInMB** No content is currently available. +- **RemediationWindows10UpgradeFolderExist** No content is currently available. +- **RemediationWindows10UpgradeFolderSizeInMB** No content is currently available. +- **RemediationWindowsAppsFolderSizeInMB** No content is currently available. +- **RemediationWindowsBtFolderSizeInMB** No content is currently available. +- **RemediationWindowsFolderSizeInMB** No content is currently available. +- **RemediationWindowsServiceProfilesFolderSizeInMB** No content is currently available. +- **Result** This is the HRESULT for Detection or Perform Action phases of the plugin. +- **RunTask** TRUE if SIH task should be run by the plug-in. +- **StorageSenseDiskCompresserEstimateInMB** No content is currently available. +- **StorageSenseHelloFaceRecognitionFodCleanupEstimateInByte** No content is currently available. +- **StorageSenseRestorePointCleanupEstimateInMB** No content is currently available. +- **StorageSenseUserDownloadFolderCleanupEstimateInByte** No content is currently available. +- **TimeServiceNTPServer** The URL for the NTP time server used by device. +- **TimeServiceStartType** The startup type for the NTP time service. +- **TimeServiceSyncDomainJoined** True if device domain joined and hence uses DC for clock. +- **TimeServiceSyncType** Type of sync behavior for Date & Time service on device. +- **uninstallActiveValue** No content is currently available. +- **UpdateApplicabilityFixerTriggerBitMap** No content is currently available. +- **UpdateRebootTime** No content is currently available. +- **usoScanHoursSinceLastScan** No content is currently available. +- **usoScanPastThreshold** No content is currently available. +- **WindowsHiberFilSysSizeInMegabytes** No content is currently available. +- **WindowsInstallerFolderSizeInMegabytes** No content is currently available. +- **WindowsPageFileSysSizeInMegabytes** No content is currently available. +- **WindowsSoftwareDistributionFolderSizeInMegabytes** No content is currently available. +- **WindowsSwapFileSysSizeInMegabytes** No content is currently available. +- **WindowsSxsFolderSizeInMegabytes** No content is currently available. + + +### Microsoft.Windows.Remediation.Completed + +This event enables completion tracking of a process that remediates issues preventing security and quality updates. + +The following fields are available: + +- **ActionName** Name of the action to be completed by the plug-in. +- **AppraiserTaskMissing** TRUE if the Appraiser task is missing. +- **branchReadinessLevel** Branch readiness level policy. +- **cloudControlState** Value indicating whether the shell is enabled on the cloud control settings. +- **CV** The Correlation Vector. +- **DiskFreeSpaceAfterSedimentPackInMB** No content is currently available. +- **DiskFreeSpaceBeforeSedimentPackInMB** No content is currently available. +- **ForcedAppraiserTaskTriggered** TRUE if Appraiser task ran from the plug-in. +- **GlobalEventCounter** Client-side counter that indicates ordering of events sent by the active user. +- **hasRolledBack** Indicates whether the client machine has rolled back. +- **hasUninstalled** Indicates whether the client machine has uninstalled a later version of the OS. +- **hResult** The result of the event execution. +- **HResult** The result of the event execution. +- **installDate** The value of installDate registry key. Indicates the install date. +- **isNetworkMetered** Indicates whether the client machine has uninstalled a later version of the OS. +- **LatestState** The final state of the plug-in component. +- **MicrosoftCompatibilityAppraiser** The name of the component targeted by the Appraiser plug-in. +- **PackageVersion** The package version for the current Remediation. +- **PluginName** The name of the plug-in specified for each generic plug-in event. +- **QualityUpdateSedimentExecutedPlugins** No content is currently available. +- **QualityUpdateSedimentFunnelState** No content is currently available. +- **QualityUpdateSedimentJsonSchemaVersion** No content is currently available. +- **QualityUpdateSedimentLocalEndTime** No content is currently available. +- **QualityUpdateSedimentLocaltTime** No content is currently available. +- **QualityUpdateSedimentMatchedTriggers** No content is currently available. +- **QualityUpdateSedimentModelExecutionSeconds** No content is currently available. +- **recoveredFromTargetOS** No content is currently available. +- **RemediationBatteryPowerBatteryLevel** Indicates the battery level at which it is acceptable to continue operation. +- **RemediationBatteryPowerExitDueToLowBattery** True when we exit due to low battery power. +- **RemediationBatteryPowerOnBattery** True if we allow execution on battery. +- **RemediationConfigurationTroubleshooterIpconfigFix** TRUE if IPConfig Fix completed successfully. +- **RemediationConfigurationTroubleshooterNetShFix** TRUE if network card cache reset ran successfully. +- **RemediationCorruptionRepairCorruptionsDetected** No content is currently available. +- **RemediationCorruptionRepairCorruptionsFixed** No content is currently available. +- **RemediationCorruptionRepairPerformActionSuccessful** No content is currently available. +- **remediationExecution** Remediation shell is in "applying remediation" state. +- **RemediationHibernationMigrated** TRUE if hibernation was migrated. +- **RemediationHibernationMigrationSucceeded** TRUE if hibernation migration succeeded. +- **RemediationNGenDiskSpaceRestored** No content is currently available. +- **RemediationNGenMigrationSucceeded** No content is currently available. +- **RemediationShellHasUpgraded** TRUE if the device upgraded. +- **RemediationShellMinimumTimeBetweenShellRuns** Indicates the time between shell runs exceeded the minimum required to execute plugins. +- **RemediationShellRunFromService** TRUE if the shell driver was run from the service. +- **RemediationShellSessionIdentifier** Unique identifier tracking a shell session. +- **RemediationShellSessionTimeInSeconds** Indicates the time the shell session took in seconds. +- **RemediationShellTaskDeleted** Indicates that the shell task has been deleted so no additional sediment pack runs occur for this installation. +- **RemediationUpdateServiceHealthRemediationResult** The result of the Update Service Health plug-in. +- **RemediationUpdateTaskHealthRemediationResult** The result of the Update Task Health plug-in. +- **RemediationUpdateTaskHealthTaskList** A list of tasks fixed by the Update Task Health plug-in. +- **RemediationUSORebootRequred** No content is currently available. +- **Result** The HRESULT for Detection or Perform Action phases of the plug-in. +- **RunCount** No content is currently available. +- **RunResult** The HRESULT for Detection or Perform Action phases of the plug-in. +- **ServiceHardeningExitCode** The exit code returned by Windows Service Repair. +- **ServiceHealthEnabledBitMap** List of services updated by the plugin. +- **ServiceHealthInstalledBitMap** List of services installed by the plugin. +- **StorageSenseDiskCompresserTotalInMB** No content is currently available. +- **StorageSenseHelloFaceRecognitionFodCleanupTotalInByte** No content is currently available. +- **StorageSenseRestorePointCleanupTotalInMB** No content is currently available. +- **StorageSenseUserDownloadFolderCleanupTotalInByte** No content is currently available. +- **systemDriveFreeDiskSpace** Indicates the free disk space on system drive in MBs. +- **systemUptimeInHours** Indicates the amount of time the system in hours has been on since the last boot. +- **uninstallActive** TRUE if previous uninstall has occurred for current OS +- **usoScanDaysSinceLastScan** The number of days since the last USO (Update Session Orchestrator) scan. +- **usoScanInProgress** TRUE if a USO (Update Session Orchestrator) scan is in progress, to prevent multiple simultaneous scans. +- **usoScanIsAllowAutoUpdateKeyPresent** TRUE if the AllowAutoUpdate registry key is set. +- **usoScanIsAllowAutoUpdateProviderSetKeyPresent** TRUE if AllowAutoUpdateProviderSet registry key is set. +- **usoScanIsAuOptionsPresent** TRUE if Auto Update Options registry key is set. +- **usoScanIsFeatureUpdateInProgress** TRUE if a USO (Update Session Orchestrator) scan is in progress, to prevent multiple simultaneous scans. +- **usoScanIsNetworkMetered** TRUE if the device is currently connected to a metered network. +- **usoScanIsNoAutoUpdateKeyPresent** TRUE if no Auto Update registry key is set/present. +- **usoScanIsUserLoggedOn** TRUE if the user is logged on. +- **usoScanPastThreshold** TRUE if the most recent USO (Update Session Orchestrator) scan is past the threshold (late). +- **usoScanType** The type of USO (Update Session Orchestrator) scan: "Interactive" or "Background". +- **windows10UpgraderBlockWuUpdates** Event to report the value of Windows 10 Upgrader BlockWuUpdates Key. +- **windowsEditionId** Event to report the value of Windows Edition ID. +- **windowsUpgradeRecoveredFromRs4** Event to report the value of the Windows Upgrade Recovered key. + + +### Microsoft.Windows.Remediation.Started + +This event reports whether a plug-in started, to help ensure Windows is up to date. + +The following fields are available: + +- **CV** Correlation vector. +- **GlobalEventCounter** Client side counter which indicates ordering of events sent by this user. +- **PackageVersion** Current package version of Remediation. +- **PluginName** Name of the plugin specified for each generic plugin event. +- **QualityUpdateSedimentFunnelState** No content is currently available. +- **QualityUpdateSedimentJsonSchemaVersion** No content is currently available. +- **QualityUpdateSedimentLastRunSeconds** No content is currently available. +- **QualityUpdateSedimentLocaltTime** No content is currently available. +- **QualityUpdateSedimentMatchedTriggers** No content is currently available. +- **QualityUpdateSedimentSelectedPlugins** No content is currently available. +- **QualityUpdateSedimentTargetedPlugins** No content is currently available. +- **QualityUpdateSedimentTargetedTriggers** No content is currently available. +- **Result** This is the HRESULT for detection or perform action phases of the plugin. +- **RunCount** The number of times the remediation event started (whether it completed successfully or not). + + +### Microsoft.Windows.SedimentLauncher.Applicable + +Indicates whether a given plugin is applicable. + +The following fields are available: + +- **CV** Correlation vector. +- **DetectedCondition** Boolean true if detect condition is true and perform action will be run. +- **FileVersion** No content is currently available. +- **GlobalEventCounter** Client side counter which indicates ordering of events sent by this user. +- **IsHashMismatch** No content is currently available. +- **IsSelfUpdateEnabledInOneSettings** True if self update enabled in Settings. +- **IsSelfUpdateNeeded** True if self update needed by device. +- **PackageVersion** Current package version of Remediation. +- **PluginName** Name of the plugin specified for each generic plugin event. +- **Result** This is the HRESULT for detection or perform action phases of the plugin. + + +### Microsoft.Windows.SedimentLauncher.Completed + +Indicates whether a given plugin has completed its work. + +The following fields are available: + +- **CV** Correlation vector. +- **FailedReasons** Concatenated list of failure reasons. +- **GlobalEventCounter** Client side counter which indicates ordering of events sent by this user. +- **PackageVersion** Current package version of Remediation. +- **PluginName** Name of the plugin specified for each generic plugin event. +- **Result** This is the HRESULT for detection or perform action phases of the plugin. +- **SedLauncherExecutionResult** HRESULT for one execution of the Sediment Launcher. + + +### Microsoft.Windows.SedimentLauncher.Started + +This event indicates that a given plug-in has started. + +The following fields are available: + +- **CV** Correlation vector. +- **GlobalEventCounter** Client side counter which indicates ordering of events sent by this user. +- **PackageVersion** Current package version of Remediation. +- **PluginName** Name of the plugin specified for each generic plugin event. +- **Result** This is the HRESULT for detection or perform action phases of the plugin. + + +### Microsoft.Windows.SedimentService.Applicable + +This event indicates whether a given plug-in is applicable. + +The following fields are available: + +- **CV** Correlation vector. +- **DetectedCondition** Determine whether action needs to run based on device properties. +- **FileVersion** No content is currently available. +- **GlobalEventCounter** Client side counter which indicates ordering of events sent by this user. +- **IsHashMismatch** No content is currently available. +- **IsSelfUpdateEnabledInOneSettings** Indicates if self update is enabled in One Settings. +- **IsSelfUpdateNeeded** Indicates if self update is needed. +- **PackageVersion** Current package version of Remediation. +- **PluginName** Name of the plugin. +- **Result** This is the HRESULT for detection or perform action phases of the plugin. + + +### Microsoft.Windows.SedimentService.Completed + +This event indicates whether a given plug-in has completed its work. + +The following fields are available: + +- **CV** Correlation vector. +- **FailedReasons** List of reasons when the plugin action failed. +- **GlobalEventCounter** Client side counter which indicates ordering of events sent by this user. +- **PackageVersion** Current package version of Remediation. +- **PluginName** Name of the plugin specified for each generic plugin event. +- **Result** This is the HRESULT for detection or perform action phases of the plugin. +- **SedimentServiceCheckTaskFunctional** True/False if scheduled task check succeeded. +- **SedimentServiceCurrentBytes** Number of current private bytes of memory consumed by sedsvc.exe. +- **SedimentServiceKillService** True/False if service is marked for kill (Shell.KillService). +- **SedimentServiceMaximumBytes** Maximum bytes allowed for the service. +- **SedimentServiceRanShell** No content is currently available. +- **SedimentServiceRetrievedKillService** True/False if result of One Settings check for kill succeeded - we only send back one of these indicators (not for each call). +- **SedimentServiceShellRunHResult** No content is currently available. +- **SedimentServiceStopping** True/False indicating whether the service is stopping. +- **SedimentServiceTaskFunctional** True/False if scheduled task is functional. If task is not functional this indicates plugins will be run. +- **SedimentServiceTotalIterations** Number of 5 second iterations service will wait before running again. + + +### Microsoft.Windows.SedimentService.Started + +This event indicates a specified plug-in has started. This information helps ensure Windows is up to date. + +The following fields are available: + +- **CV** The Correlation Vector. +- **GlobalEventCounter** The client-side counter that indicates ordering of events. +- **PackageVersion** The version number of the current remediation package. +- **PluginName** Name of the plugin specified for each generic plugin event. +- **Result** This is the HRESULT for Detection or Perform Action phases of the plugin. + + ## Privacy consent logging events ### Microsoft.Windows.Shell.PrivacyConsentLogging.PrivacyConsentCompleted From f8d890ccb8d8dd95d4fee53a1881a6f4e472d759 Mon Sep 17 00:00:00 2001 From: Brian Lich Date: Fri, 5 Apr 2019 09:51:05 -0700 Subject: [PATCH 112/724] new build 4/5/2019 9:51 AM --- ...ndows-diagnostic-events-and-fields-1903.md | 96 +++++++++---------- 1 file changed, 48 insertions(+), 48 deletions(-) diff --git a/windows/privacy/basic-level-windows-diagnostic-events-and-fields-1903.md b/windows/privacy/basic-level-windows-diagnostic-events-and-fields-1903.md index a0330d713f..44cb7ab443 100644 --- a/windows/privacy/basic-level-windows-diagnostic-events-and-fields-1903.md +++ b/windows/privacy/basic-level-windows-diagnostic-events-and-fields-1903.md @@ -13,7 +13,7 @@ manager: dansimp ms.collection: M365-security-compliance ms.topic: article audience: ITPro -ms.date: 04/04/2019 +ms.date: 04/05/2019 --- @@ -3943,28 +3943,28 @@ The following fields are available: - **ContainerId** An identifier that uniquely groups the functional devices associated with a single-function or multifunction device. - **DeviceInstanceId** The unique identifier for this instance of the device. - **EndpointDevnodeId** The IMMDevice identifier of the associated devnode. -- **endpointEffectClsid** No content is currently available. -- **endpointEffectModule** No content is currently available. +- **endpointEffectClsid** The COM Class Identifier (CLSID) for the endpoint effect audio processing object. +- **endpointEffectModule** Module name for the endpoint effect audio processing object. - **EndpointFormFactor** The enumeration value for the form factor of the endpoint device (for example speaker, microphone, remote network device). - **endpointID** The unique identifier for the audio endpoint. - **endpointInstanceId** The unique identifier for the software audio endpoint. Used for joining to other audio event. - **Flow** Indicates whether the endpoint is capture (1) or render (0). -- **globalEffectClsid** No content is currently available. -- **globalEffectModule** No content is currently available. +- **globalEffectClsid** COM Class Identifier (CLSID) for the legacy global effect audio processing object. +- **globalEffectModule** Module name for the legacy global effect audio processing object. - **HWID** The hardware identifier for the endpoint. - **IsBluetooth** Indicates whether the device is a Bluetooth device. -- **isFarField** No content is currently available. +- **isFarField** A flag indicating whether the microphone endpoint is capable of hearing far field audio. - **IsSideband** Indicates whether the device is a sideband device. - **IsUSB** Indicates whether the device is a USB device. - **JackSubType** A unique ID representing the KS node type of the endpoint. -- **localEffectClsid** No content is currently available. -- **localEffectModule** No content is currently available. +- **localEffectClsid** The COM Class Identifier (CLSID) for the legacy local effect audio processing object. +- **localEffectModule** Module name for the legacy local effect audio processing object. - **MicArrayGeometry** Describes the microphone array, including the microphone position, coordinates, type, and frequency range. See [MicArrayGeometry](#micarraygeometry). -- **modeEffectClsid** No content is currently available. -- **modeEffectModule** No content is currently available. +- **modeEffectClsid** The COM Class Identifier (CLSID) for the mode effect audio processing object. +- **modeEffectModule** Module name for the mode effect audio processing object. - **persistentId** A unique ID for this endpoint which is retained across migrations. -- **streamEffectClsid** No content is currently available. -- **streamEffectModule** No content is currently available. +- **streamEffectClsid** The COM Class Identifier (CLSID) for the stream effect audio processing object. +- **streamEffectModule** Module name for the stream effect audio processing object. ### Microsoft.Windows.DriverInstall.DeviceInstall @@ -4390,7 +4390,7 @@ The following fields are available: ### Microsoft.Windows.PBR.PBRLayoutImageFailed -No content is currently available. +This event is sent when push-button reset fails to create a new image of Windows. The following fields are available: @@ -4399,7 +4399,7 @@ The following fields are available: ### Microsoft.Windows.PBR.PBRLayoutImageSucceed -No content is currently available. +This event is sent when push-button reset succeeds in creating a new image of Windows. The following fields are available: @@ -4408,7 +4408,7 @@ The following fields are available: ### Microsoft.Windows.PBR.PBROEM1Failed -No content is currently available. +This event is sent when the first OEM extensibility operation is successfully completed. The following fields are available: @@ -4421,14 +4421,14 @@ The following fields are available: ### Microsoft.Windows.PBR.PBROEM2Failed -No content is currently available. +This event is sent when the second OEM extensibility operation is successfully completed. The following fields are available: -- **HRESULT** The result code for the error that occurred while running the OEM extensibility script. -- **Parameters** The parameters to the OEM extensibility script. +- **HRESULT** The result error code from the OEM extensibility script. +- **Parameters** The parameters that were passed to the OEM extensibility script. - **PBRType** The type of push-button reset. -- **ScriptName** The path to the push-button reset script. +- **ScriptName** The path to the OEM extensibility script. - **SessionID** The ID of the push-button reset session. @@ -4488,16 +4488,16 @@ The following fields are available: ### Microsoft.Windows.PBR.PBRReachedOOBE -No content is currently available. +This event returns data when the PBR (Push Button Reset) process reaches the OOBE (Out of Box Experience). The following fields are available: -- **SessionID** No content is currently available. +- **SessionID** The ID of this push-button reset session. ### Microsoft.Windows.PBR.PBRReconstructionInitiated -No content is currently available. +This event returns data when a PBR (Push Button Reset) reconstruction operation begins. The following fields are available: @@ -4506,7 +4506,7 @@ The following fields are available: ### Microsoft.Windows.PBR.PBRRequirementChecks -No content is currently available. +This event returns data when PBR (Push Button Reset) requirement checks begin. The following fields are available: @@ -4518,7 +4518,7 @@ The following fields are available: ### Microsoft.Windows.PBR.PBRRequirementChecksFailed -No content is currently available. +This event returns data when PBR (Push Button Reset) requirement checks fail. The following fields are available: @@ -4527,28 +4527,28 @@ The following fields are available: - **ErrorType** The type of error that occurred during the requirement checks phase of the push-button reset operation. - **PBRImageVersion** The image version of the push-button reset tool. - **PBRRecoveryStrategy** The recovery strategy for this phase of push-button reset. -- **PBRStartedFrom** No content is currently available. -- **PBRType** No content is currently available. +- **PBRStartedFrom** Identifies the push-button reset entry point. +- **PBRType** The type of push-button reset specified by the user interface. - **SessionID** The ID of this push-button reset session. ### Microsoft.Windows.PBR.PBRRequirementChecksPassed -No content is currently available. +This event returns data when PBR (Push Button Reset) requirement checks are passed. The following fields are available: -- **OSVersion** No content is currently available. -- **PBRImageType** No content is currently available. +- **OSVersion** The OS version installed on the device. +- **PBRImageType** The push-button reset image type. - **PBRImageVersion** The version of the push-button reset image. -- **PBRRecoveryStrategy** No content is currently available. -- **PBRStartedFrom** No content is currently available. +- **PBRRecoveryStrategy** The push-button reset recovery strategy. +- **PBRStartedFrom** Identifies the push-button reset entry point. - **SessionID** The ID of this push-button reset session. ### Microsoft.Windows.PBR.PBRRestoreLicenseFailed -No content is currently available. +This event sends basic data about recovery operation failure on the device. This data allows investigation to help keep Windows and PBR (Push Button Reset) up to date. The following fields are available: @@ -4557,18 +4557,18 @@ The following fields are available: ### Microsoft.Windows.PBR.PBRSucceed -No content is currently available. +This event returns data when PBR (Push Button Reset) succeeds. The following fields are available: -- **OSVersion** No content is currently available. +- **OSVersion** The OS version installed on the device. - **PBRType** The type of push-button reset. - **SessionID** The ID of this push-button reset session. ### Microsoft.Windows.PBR.PBRUserCancelled -No content is currently available. +This event returns data when the user cancels the PBR (Push Button Reset) from the UI (user interface). The following fields are available: @@ -4579,18 +4579,18 @@ The following fields are available: ### Microsoft.Windows.PBR.PBRVersionsMistmatch -No content is currently available. +This event returns data when there is a version mismatch for WinRE (Windows Recovery) and the OS. The following fields are available: -- **OSVersion** No content is currently available. +- **OSVersion** The OS version installed on the device. - **REVersion** The version of Windows Recovery Environment (WinRE). - **SessionID** The ID of this push-button reset session. ### Microsoft.Windows.PBR.PBRWinREInstallationFailed -No content is currently available. +This event returns data when the WinRE (Windows Recovery) installation fails. The following fields are available: @@ -4599,7 +4599,7 @@ The following fields are available: ### Microsoft.Windows.PBR.PhaseFinished -No content is currently available. +This event returns data when a phase of PBR (Push Button Reset) has completed. The following fields are available: @@ -4623,7 +4623,7 @@ The following fields are available: ### Microsoft.Windows.PBR.ReconstructionInfo -No content is currently available. +This event returns data about the PBR (Push Button Reset) reconstruction. The following fields are available: @@ -4631,13 +4631,13 @@ The following fields are available: - **numPackagesFailed** The number of packages that failed during the reconstruction operation of push-button reset. - **sessionID** The ID of this push-button reset session. - **slowMode** The mode of reconstruction. -- **targetVersion** No content is currently available. +- **targetVersion** The target version of the OS for the reconstruction. - **timestamp** The timestamp of this push-button reset event. ### Microsoft.Windows.PBR.ResetOptions -No content is currently available. +This event returns data about the PBR (Push Button Reset) reset options selected by the user. The following fields are available: @@ -4651,7 +4651,7 @@ The following fields are available: ### Microsoft.Windows.PBR.RetryQueued -No content is currently available. +This event returns data about the retry count when PBR (Push Button Reset) is restarted due to a reboot. The following fields are available: @@ -4662,7 +4662,7 @@ The following fields are available: ### Microsoft.Windows.PBR.ReturnedToOldOS -No content is currently available. +This event returns data after PBR (Push Button Reset) has completed the rollback. The following fields are available: @@ -4672,7 +4672,7 @@ The following fields are available: ### Microsoft.Windows.PBR.ReturnTaskSchedulingFailed -No content is currently available. +This event returns data when there is a failure scheduling a boot into WinRE (Windows Recovery). The following fields are available: @@ -4684,7 +4684,7 @@ The following fields are available: ### Microsoft.Windows.PBR.RollbackFinished -No content is currently available. +This event returns data when the PBR (Push Button Reset) rollback completes. The following fields are available: @@ -4696,7 +4696,7 @@ The following fields are available: ### Microsoft.Windows.PBR.RollbackStarted -No content is currently available. +This event returns data when the PBR (Push Button Reset) rollback begins. The following fields are available: @@ -4706,7 +4706,7 @@ The following fields are available: ### Microsoft.Windows.PBR.ScenarioNotSupported -No content is currently available. +This event returns data when the PBR (Push Button Reset) scenario selected is not supported on the device. The following fields are available: From 340015dd795a8e38b34239bae0222a23f7bb1a42 Mon Sep 17 00:00:00 2001 From: Brian Lich Date: Fri, 5 Apr 2019 09:51:11 -0700 Subject: [PATCH 113/724] new build 4/5/2019 9:51 AM --- .../basic-level-windows-diagnostic-events-and-fields-1703.md | 2 +- .../basic-level-windows-diagnostic-events-and-fields-1709.md | 2 +- .../basic-level-windows-diagnostic-events-and-fields-1803.md | 2 +- .../basic-level-windows-diagnostic-events-and-fields-1809.md | 2 +- 4 files changed, 4 insertions(+), 4 deletions(-) diff --git a/windows/privacy/basic-level-windows-diagnostic-events-and-fields-1703.md b/windows/privacy/basic-level-windows-diagnostic-events-and-fields-1703.md index c029cc311a..b935c25c38 100644 --- a/windows/privacy/basic-level-windows-diagnostic-events-and-fields-1703.md +++ b/windows/privacy/basic-level-windows-diagnostic-events-and-fields-1703.md @@ -13,7 +13,7 @@ manager: dansimp ms.collection: M365-security-compliance ms.topic: article audience: ITPro -ms.date: 04/04/2019 +ms.date: 04/05/2019 --- diff --git a/windows/privacy/basic-level-windows-diagnostic-events-and-fields-1709.md b/windows/privacy/basic-level-windows-diagnostic-events-and-fields-1709.md index 8fdeaa71a6..ded2f5807f 100644 --- a/windows/privacy/basic-level-windows-diagnostic-events-and-fields-1709.md +++ b/windows/privacy/basic-level-windows-diagnostic-events-and-fields-1709.md @@ -13,7 +13,7 @@ manager: dansimp ms.collection: M365-security-compliance ms.topic: article audience: ITPro -ms.date: 04/04/2019 +ms.date: 04/05/2019 --- diff --git a/windows/privacy/basic-level-windows-diagnostic-events-and-fields-1803.md b/windows/privacy/basic-level-windows-diagnostic-events-and-fields-1803.md index f7b9ceb9f0..d65b1aae10 100644 --- a/windows/privacy/basic-level-windows-diagnostic-events-and-fields-1803.md +++ b/windows/privacy/basic-level-windows-diagnostic-events-and-fields-1803.md @@ -13,7 +13,7 @@ manager: dansimp ms.collection: M365-security-compliance ms.topic: article audience: ITPro -ms.date: 04/04/2019 +ms.date: 04/05/2019 --- diff --git a/windows/privacy/basic-level-windows-diagnostic-events-and-fields-1809.md b/windows/privacy/basic-level-windows-diagnostic-events-and-fields-1809.md index ee4dd734aa..21218c05f5 100644 --- a/windows/privacy/basic-level-windows-diagnostic-events-and-fields-1809.md +++ b/windows/privacy/basic-level-windows-diagnostic-events-and-fields-1809.md @@ -13,7 +13,7 @@ manager: dansimp ms.collection: M365-security-compliance ms.topic: article audience: ITPro -ms.date: 04/04/2019 +ms.date: 04/05/2019 --- From 0d311c247214de1813c7d1c160d2569448faf660 Mon Sep 17 00:00:00 2001 From: Greg Lindsay Date: Fri, 5 Apr 2019 10:51:49 -0700 Subject: [PATCH 114/724] 1903 --- .../windows-10-1903-removed-features.md | 50 +++++++++++++++++++ 1 file changed, 50 insertions(+) create mode 100644 windows/deployment/planning/windows-10-1903-removed-features.md diff --git a/windows/deployment/planning/windows-10-1903-removed-features.md b/windows/deployment/planning/windows-10-1903-removed-features.md new file mode 100644 index 0000000000..1204493c7c --- /dev/null +++ b/windows/deployment/planning/windows-10-1903-removed-features.md @@ -0,0 +1,50 @@ +--- +title: Windows 10, version 1809 - Features that have been removed +description: Learn about features that will be removed or deprecated in Windows 10, version 1809, or a future release +ms.prod: w10 +ms.mktglfcycl: plan +ms.localizationpriority: medium +ms.sitesec: library +author: lizap +ms.author: elizapo +ms.date: 11/16/2018 +ms.topic: article +--- +# Features removed or planned for replacement starting with Windows 10, version 1809 + +> Applies to: Windows 10, version 1809 + +Each release of Windows 10 adds new features and functionality; we also occasionally remove features and functionality, usually because we've added a better option. Here are the details about the features and functionalities that we removed in Windows 10, version 1809. + +> [!TIP] +> - You can get early access to Windows 10 builds by joining the [Windows Insider program](https://insider.windows.com) - this is a great way to test feature changes. +> - Have questions about other releases? Check out the information for [Windows 10, version 1803](windows-10-1803-removed-features.md), [Windows 10, version 1709](windows-10-fall-creators-deprecation.md), and [Windows 10, version 1703](windows-10-creators-update-deprecation.md). + +**The list is subject to change and might not include every affected feature or functionality.** + +## Features we removed in this release + +We're removing the following features and functionalities from the installed product image in Windows 10, version 1809. Applications or code that depend on these features won't function in this release unless you use an alternate method. + +|Feature |Instead you can use...| +|-----------|-------------------- +|Business Scanning, also called Distributed Scan Management (DSM)|We're removing this secure scanning and scanner management capability - there are no devices that support this feature.| +|[FontSmoothing setting](https://docs.microsoft.com/windows-hardware/customize/desktop/unattend/microsoft-windows-shell-setup-visualeffects-fontsmoothing) in unattend.xml|The FontSmoothing setting let you specify the font antialiasing strategy to use across the system. We've changed Windows 10 to use [ClearType](https://docs.microsoft.com/typography/cleartype/) by default, so we're removing this setting as it is no longer necessary. If you include this setting in the unattend.xml file, it'll be ignored.| +|Hologram app|We've replaced the Hologram app with the [Mixed Reality Viewer](https://support.microsoft.com/help/4041156/windows-10-mixed-reality-help). If you would like to create 3D word art, you can still do that in Paint 3D and view your art in VR or Hololens with the Mixed Reality Viewer.| +|limpet.exe|We're releasing the limpet.exe tool, used to access TPM for Azure connectivity, as open source.| +|Phone Companion|When you update to Windows 10, version 1809, the Phone Companion app will be removed from your PC. Use the **Phone** page in the Settings app to sync your mobile phone with your PC. It includes all the Phone Companion features.| +|Future updates through [Windows Embedded Developer Update](https://docs.microsoft.com/previous-versions/windows/embedded/ff770079\(v=winembedded.60\)) for Windows Embedded Standard 7-SP1 (WES7-SP1) and Windows Embedded Standard 8 (WES8)|We’re no longer publishing new updates to the WEDU server. Instead, you may secure any new updates from the [Microsoft Update Catalog](http://www.catalog.update.microsoft.com/Home.aspx). [Learn how](https://techcommunity.microsoft.com/t5/Windows-Embedded/Change-to-the-Windows-Embedded-Developer-Update/ba-p/285704) to get updates from the catalog.| + +## Features we’re no longer developing + +We're no longer actively developing these features and may remove them from a future update. Some features have been replaced with other features or functionality, while others are now available from different sources. + +If you have feedback about the proposed replacement of any of these features, you can use the [Feedback Hub app](https://support.microsoft.com/help/4021566/windows-10-send-feedback-to-microsoft-with-feedback-hub-app). + +|Feature |Instead you can use...| +|-----------|---------------------| +|Companion device dynamic lock APIS|The companion device framework (CDF) APIs enable wearables and other devices to unlock a PC. In Windows 10, version 1709, we introduced [Dynamic Lock](https://docs.microsoft.com/windows/security/identity-protection/hello-for-business/hello-features#dynamic-lock), including an inbox method using Bluetooth to detect whether a user is present and lock or unlock the PC. Because of this, and because third party partners didn't adopt the CDF method, we're no longer developing CDF Dynamic Lock APIs.| +|OneSync service|The OneSync service synchronizes data for the Mail, Calendar, and People apps. We've added a sync engine to the Outlook app that provides the same synchronization.| +|Snipping Tool|The Snipping Tool is an application included in Windows 10 that is used to capture screenshots, either the full screen or a smaller, custom "snip" of the screen. In Windows 10, version 1809, we're [introducing a new universal app, Snip & Sketch](https://blogs.windows.com/windowsexperience/2018/05/03/announcing-windows-10-insider-preview-build-17661/#8xbvP8vMO0lF20AM.97), that provides the same screen snipping abilities, as well as additional features. You can launch Snip & Sketch directly and start a snip from there, or just press WIN + Shift + S. Snip & Sketch can also be launched from the “Screen snip” button in the Action Center. We're no longer developing the Snipping Tool as a separate app but are instead consolidating its functionality into Snip & Sketch.| + + From 48dc74dcae78953369130cb7bdf33eafde7a9456 Mon Sep 17 00:00:00 2001 From: Greg Lindsay Date: Fri, 5 Apr 2019 11:14:02 -0700 Subject: [PATCH 115/724] draft 1903 --- .../windows-10-1903-removed-features.md | 39 +++++++++---------- 1 file changed, 19 insertions(+), 20 deletions(-) diff --git a/windows/deployment/planning/windows-10-1903-removed-features.md b/windows/deployment/planning/windows-10-1903-removed-features.md index 1204493c7c..9c64a28119 100644 --- a/windows/deployment/planning/windows-10-1903-removed-features.md +++ b/windows/deployment/planning/windows-10-1903-removed-features.md @@ -1,24 +1,22 @@ --- -title: Windows 10, version 1809 - Features that have been removed -description: Learn about features that will be removed or deprecated in Windows 10, version 1809, or a future release +title: Windows 10, version 1903 - Features that have been removed +description: Learn about features that will be removed or deprecated in Windows 10, version 1903, or a future release ms.prod: w10 ms.mktglfcycl: plan ms.localizationpriority: medium ms.sitesec: library -author: lizap -ms.author: elizapo -ms.date: 11/16/2018 +author: greg-lindsay +ms.author: greglin ms.topic: article --- -# Features removed or planned for replacement starting with Windows 10, version 1809 +# Features removed or planned for replacement starting with Windows 10, version 1903 -> Applies to: Windows 10, version 1809 +> Applies to: Windows 10, version 1903 -Each release of Windows 10 adds new features and functionality; we also occasionally remove features and functionality, usually because we've added a better option. Here are the details about the features and functionalities that we removed in Windows 10, version 1809. + +
Each release of Windows 10 adds new features and functionality; we also occasionally remove features and functionality, usually because we've added a better option. Here are the details about the features and functionalities that we removed in Windows 10, version 1903. You can get early access to Windows 10 builds by joining the [Windows Insider program](https://insider.windows.com) - this is a great way to test feature changes. +
-> [!TIP] -> - You can get early access to Windows 10 builds by joining the [Windows Insider program](https://insider.windows.com) - this is a great way to test feature changes. -> - Have questions about other releases? Check out the information for [Windows 10, version 1803](windows-10-1803-removed-features.md), [Windows 10, version 1709](windows-10-fall-creators-deprecation.md), and [Windows 10, version 1703](windows-10-creators-update-deprecation.md). **The list is subject to change and might not include every affected feature or functionality.** @@ -28,12 +26,11 @@ We're removing the following features and functionalities from the installed pro |Feature |Instead you can use...| |-----------|-------------------- -|Business Scanning, also called Distributed Scan Management (DSM)|We're removing this secure scanning and scanner management capability - there are no devices that support this feature.| -|[FontSmoothing setting](https://docs.microsoft.com/windows-hardware/customize/desktop/unattend/microsoft-windows-shell-setup-visualeffects-fontsmoothing) in unattend.xml|The FontSmoothing setting let you specify the font antialiasing strategy to use across the system. We've changed Windows 10 to use [ClearType](https://docs.microsoft.com/typography/cleartype/) by default, so we're removing this setting as it is no longer necessary. If you include this setting in the unattend.xml file, it'll be ignored.| -|Hologram app|We've replaced the Hologram app with the [Mixed Reality Viewer](https://support.microsoft.com/help/4041156/windows-10-mixed-reality-help). If you would like to create 3D word art, you can still do that in Paint 3D and view your art in VR or Hololens with the Mixed Reality Viewer.| -|limpet.exe|We're releasing the limpet.exe tool, used to access TPM for Azure connectivity, as open source.| -|Phone Companion|When you update to Windows 10, version 1809, the Phone Companion app will be removed from your PC. Use the **Phone** page in the Settings app to sync your mobile phone with your PC. It includes all the Phone Companion features.| -|Future updates through [Windows Embedded Developer Update](https://docs.microsoft.com/previous-versions/windows/embedded/ff770079\(v=winembedded.60\)) for Windows Embedded Standard 7-SP1 (WES7-SP1) and Windows Embedded Standard 8 (WES8)|We’re no longer publishing new updates to the WEDU server. Instead, you may secure any new updates from the [Microsoft Update Catalog](http://www.catalog.update.microsoft.com/Home.aspx). [Learn how](https://techcommunity.microsoft.com/t5/Windows-Embedded/Change-to-the-Windows-Embedded-Developer-Update/ba-p/285704) to get updates from the catalog.| +|xxxxx|yyyyy| +|xxxxx|yyyyy| +|xxxxx|yyyyy| +|xxxxx|yyyyy| +|xxxxx|yyyyy| ## Features we’re no longer developing @@ -43,8 +40,10 @@ If you have feedback about the proposed replacement of any of these features, yo |Feature |Instead you can use...| |-----------|---------------------| -|Companion device dynamic lock APIS|The companion device framework (CDF) APIs enable wearables and other devices to unlock a PC. In Windows 10, version 1709, we introduced [Dynamic Lock](https://docs.microsoft.com/windows/security/identity-protection/hello-for-business/hello-features#dynamic-lock), including an inbox method using Bluetooth to detect whether a user is present and lock or unlock the PC. Because of this, and because third party partners didn't adopt the CDF method, we're no longer developing CDF Dynamic Lock APIs.| -|OneSync service|The OneSync service synchronizes data for the Mail, Calendar, and People apps. We've added a sync engine to the Outlook app that provides the same synchronization.| -|Snipping Tool|The Snipping Tool is an application included in Windows 10 that is used to capture screenshots, either the full screen or a smaller, custom "snip" of the screen. In Windows 10, version 1809, we're [introducing a new universal app, Snip & Sketch](https://blogs.windows.com/windowsexperience/2018/05/03/announcing-windows-10-insider-preview-build-17661/#8xbvP8vMO0lF20AM.97), that provides the same screen snipping abilities, as well as additional features. You can launch Snip & Sketch directly and start a snip from there, or just press WIN + Shift + S. Snip & Sketch can also be launched from the “Screen snip” button in the Action Center. We're no longer developing the Snipping Tool as a separate app but are instead consolidating its functionality into Snip & Sketch.| +|xxxxx|yyyyy| +|xxxxx|yyyyy| +|xxxxx|yyyyy| +|xxxxx|yyyyy| +|xxxxx|yyyyy| From 951414f2328339a2683823fc5d65b7f93e1e42f2 Mon Sep 17 00:00:00 2001 From: Greg Lindsay Date: Fri, 5 Apr 2019 11:15:29 -0700 Subject: [PATCH 116/724] draft 1903 --- windows/deployment/planning/TOC.md | 24 +++++++++++++----------- 1 file changed, 13 insertions(+), 11 deletions(-) diff --git a/windows/deployment/planning/TOC.md b/windows/deployment/planning/TOC.md index cf1fef543a..0e2810b1b7 100644 --- a/windows/deployment/planning/TOC.md +++ b/windows/deployment/planning/TOC.md @@ -3,17 +3,13 @@ ## [Windows 10 deployment considerations](windows-10-deployment-considerations.md) ## [Windows 10 compatibility](windows-10-compatibility.md) ## [Windows 10 infrastructure requirements](windows-10-infrastructure-requirements.md) -## [Windows 10, version 1809 - Features removed or planned for replacement](windows-10-1809-removed-features.md) -## [Windows 10, version 1803 - Features removed or planned for replacement](windows-10-1803-removed-features.md) -## [Fall Creators update (version 1709) - deprecated features](windows-10-fall-creators-deprecation.md) -## [Creators update (version 1703) - deprecated features](windows-10-creators-update-deprecation.md) -## [Windows To Go: feature overview](windows-to-go-overview.md) -### [Best practice recommendations for Windows To Go](best-practice-recommendations-for-windows-to-go.md) -### [Deployment considerations for Windows To Go](deployment-considerations-for-windows-to-go.md) -### [Prepare your organization for Windows To Go](prepare-your-organization-for-windows-to-go.md) -### [Security and data protection considerations for Windows To Go](security-and-data-protection-considerations-for-windows-to-go.md) -### [Windows To Go: frequently asked questions](windows-to-go-frequently-asked-questions.md) +## Features removed or planned for replacement +### [Windows 10, version 1809](windows-10-1809-removed-features.md) +### [Windows 10, version 1803](windows-10-1803-removed-features.md) +### [Windows 10, version 1709](windows-10-fall-creators-deprecation.md) +### [Windows 10, version 1703](windows-10-creators-update-deprecation.md) + ## [Application Compatibility Toolkit (ACT) Technical Reference](act-technical-reference.md) ### [SUA User's Guide](sua-users-guide.md) #### [Using the SUA Wizard](using-the-sua-wizard.md) @@ -39,4 +35,10 @@ ##### [Testing Your Application Mitigation Packages](testing-your-application-mitigation-packages.md) #### [Using the Sdbinst.exe Command-Line Tool](using-the-sdbinstexe-command-line-tool.md) ### [Compatibility Fixes for Windows 10, Windows 8, Windows 7, and Windows Vista](compatibility-fixes-for-windows-8-windows-7-and-windows-vista.md) -## [Change history for Plan for Windows 10 deployment](change-history-for-plan-for-windows-10-deployment.md) \ No newline at end of file + +## [Windows To Go: feature overview](windows-to-go-overview.md) +### [Best practice recommendations for Windows To Go](best-practice-recommendations-for-windows-to-go.md) +### [Deployment considerations for Windows To Go](deployment-considerations-for-windows-to-go.md) +### [Prepare your organization for Windows To Go](prepare-your-organization-for-windows-to-go.md) +### [Security and data protection considerations for Windows To Go](security-and-data-protection-considerations-for-windows-to-go.md) +### [Windows To Go: frequently asked questions](windows-to-go-frequently-asked-questions.md) \ No newline at end of file From 50a5845de1e3d74ca21e0e74660456f84f6fa757 Mon Sep 17 00:00:00 2001 From: Greg Lindsay Date: Fri, 5 Apr 2019 12:25:59 -0700 Subject: [PATCH 117/724] draft 1903-1 --- .openpublishing.redirection.json | 10 ++++++++++ windows/deployment/planning/TOC.md | 5 +++-- ...recation.md => windows-10-1703-removed-features.md} | 0 ...recation.md => windows-10-1709-removed-features.md} | 0 4 files changed, 13 insertions(+), 2 deletions(-) rename windows/deployment/planning/{windows-10-creators-update-deprecation.md => windows-10-1703-removed-features.md} (100%) rename windows/deployment/planning/{windows-10-fall-creators-deprecation.md => windows-10-1709-removed-features.md} (100%) diff --git a/.openpublishing.redirection.json b/.openpublishing.redirection.json index ab677cc666..d559d7bc35 100644 --- a/.openpublishing.redirection.json +++ b/.openpublishing.redirection.json @@ -13944,5 +13944,15 @@ "redirect_url": "/windows/security/threat-protection/windows-defender-atp/threat-analytics", "redirect_document_id": true }, +{ +"source_path": "windows/deployment/planning/windows-10-fall-creators-deprecation.md", +"redirect_url": "/windows/deployment/planning/windows-10-1709-removed-features", +"redirect_document_id": true +}, +{ +"source_path": "windows/deployment/planning/windows-10-creators-update-deprecation.md", +"redirect_url": "/windows/deployment/planning/windows-10-1703-removed-features", +"redirect_document_id": true +} ] } diff --git a/windows/deployment/planning/TOC.md b/windows/deployment/planning/TOC.md index 0e2810b1b7..0496ee97d5 100644 --- a/windows/deployment/planning/TOC.md +++ b/windows/deployment/planning/TOC.md @@ -5,10 +5,11 @@ ## [Windows 10 infrastructure requirements](windows-10-infrastructure-requirements.md) ## Features removed or planned for replacement +### [Windows 10, version 1903](windows-10-1903-removed-features.md) ### [Windows 10, version 1809](windows-10-1809-removed-features.md) ### [Windows 10, version 1803](windows-10-1803-removed-features.md) -### [Windows 10, version 1709](windows-10-fall-creators-deprecation.md) -### [Windows 10, version 1703](windows-10-creators-update-deprecation.md) +### [Windows 10, version 1709](windows-10-1709-removed-features.md) +### [Windows 10, version 1703](windows-10-1703-removed-features.md) ## [Application Compatibility Toolkit (ACT) Technical Reference](act-technical-reference.md) ### [SUA User's Guide](sua-users-guide.md) diff --git a/windows/deployment/planning/windows-10-creators-update-deprecation.md b/windows/deployment/planning/windows-10-1703-removed-features.md similarity index 100% rename from windows/deployment/planning/windows-10-creators-update-deprecation.md rename to windows/deployment/planning/windows-10-1703-removed-features.md diff --git a/windows/deployment/planning/windows-10-fall-creators-deprecation.md b/windows/deployment/planning/windows-10-1709-removed-features.md similarity index 100% rename from windows/deployment/planning/windows-10-fall-creators-deprecation.md rename to windows/deployment/planning/windows-10-1709-removed-features.md From c9908489ea7c0e29a643ca73ca85a515308d755e Mon Sep 17 00:00:00 2001 From: Greg Lindsay Date: Fri, 5 Apr 2019 12:31:00 -0700 Subject: [PATCH 118/724] draft 1903-2 --- windows/deployment/planning/windows-10-1903-removed-features.md | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/windows/deployment/planning/windows-10-1903-removed-features.md b/windows/deployment/planning/windows-10-1903-removed-features.md index 9c64a28119..35b56b17dc 100644 --- a/windows/deployment/planning/windows-10-1903-removed-features.md +++ b/windows/deployment/planning/windows-10-1903-removed-features.md @@ -14,7 +14,7 @@ ms.topic: article > Applies to: Windows 10, version 1903 -
Each release of Windows 10 adds new features and functionality; we also occasionally remove features and functionality, usually because we've added a better option. Here are the details about the features and functionalities that we removed in Windows 10, version 1903. You can get early access to Windows 10 builds by joining the [Windows Insider program](https://insider.windows.com) - this is a great way to test feature changes. +
roadmapEach release of Windows 10 adds new features and functionality; we also occasionally remove features and functionality, usually because we've added a better option. Here are the details about the features and functionalities that we removed in Windows 10, version 1903. You can get early access to Windows 10 builds by joining the [Windows Insider program](https://insider.windows.com) - this is a great way to test feature changes.
From ef1ab22ea3b3a253a572313c8d5f6b3388002b2b Mon Sep 17 00:00:00 2001 From: Brian Lich Date: Fri, 5 Apr 2019 13:31:12 -0700 Subject: [PATCH 119/724] new build 4/5/2019 1:31 PM --- ...ndows-diagnostic-events-and-fields-1903.md | 942 +++++++++--------- 1 file changed, 478 insertions(+), 464 deletions(-) diff --git a/windows/privacy/basic-level-windows-diagnostic-events-and-fields-1903.md b/windows/privacy/basic-level-windows-diagnostic-events-and-fields-1903.md index 44cb7ab443..451bee2d3f 100644 --- a/windows/privacy/basic-level-windows-diagnostic-events-and-fields-1903.md +++ b/windows/privacy/basic-level-windows-diagnostic-events-and-fields-1903.md @@ -1518,6 +1518,74 @@ The following fields are available: - **AppraiserVersion** The version of the Appraiser file that is generating the events. +## Audio endpoint events + +### MicArrayGeometry + +This event provides information about the layout of the individual microphone elements in the microphone array. + +The following fields are available: + +- **MicCoords** The location and orientation of the microphone element. +- **usFrequencyBandHi** The high end of the frequency range for the microphone. +- **usFrequencyBandLo** The low end of the frequency range for the microphone. +- **usMicArrayType** The type of the microphone array. +- **usNumberOfMicrophones** The number of microphones in the array. +- **usVersion** The version of the microphone array specification. +- **wHorizontalAngleBegin** The horizontal angle of the start of the working volume (reported as radians times 10,000). +- **wHorizontalAngleEnd** The horizontal angle of the end of the working volume (reported as radians times 10,000). +- **wVerticalAngleBegin** The vertical angle of the start of the working volume (reported as radians times 10,000). +- **wVerticalAngleEnd** The vertical angle of the end of the working volume (reported as radians times 10,000). + + +### MicCoords + +This event provides information about the location and orientation of the microphone element. + +The following fields are available: + +- **usType** The type of microphone. +- **wHorizontalAngle** The horizontal angle of the microphone (reported as radians times 10,000). +- **wVerticalAngle** The vertical angle of the microphone (reported as radians times 10,000). +- **wXCoord** The x-coordinate of the microphone. +- **wYCoord** The y-coordinate of the microphone. +- **wZCoord** The z-coordinate of the microphone. + + +### Microsoft.Windows.Audio.EndpointBuilder.DeviceInfo + +This event logs the successful enumeration of an audio endpoint (such as a microphone or speaker) and provides information about the audio endpoint. + +The following fields are available: + +- **BusEnumeratorName** The name of the bus enumerator (for example, HDAUDIO or USB). +- **ContainerId** An identifier that uniquely groups the functional devices associated with a single-function or multifunction device. +- **DeviceInstanceId** The unique identifier for this instance of the device. +- **EndpointDevnodeId** The IMMDevice identifier of the associated devnode. +- **endpointEffectClsid** The COM Class Identifier (CLSID) for the endpoint effect audio processing object. +- **endpointEffectModule** Module name for the endpoint effect audio processing object. +- **EndpointFormFactor** The enumeration value for the form factor of the endpoint device (for example speaker, microphone, remote network device). +- **endpointID** The unique identifier for the audio endpoint. +- **endpointInstanceId** The unique identifier for the software audio endpoint. Used for joining to other audio event. +- **Flow** Indicates whether the endpoint is capture (1) or render (0). +- **globalEffectClsid** COM Class Identifier (CLSID) for the legacy global effect audio processing object. +- **globalEffectModule** Module name for the legacy global effect audio processing object. +- **HWID** The hardware identifier for the endpoint. +- **IsBluetooth** Indicates whether the device is a Bluetooth device. +- **isFarField** A flag indicating whether the microphone endpoint is capable of hearing far field audio. +- **IsSideband** Indicates whether the device is a sideband device. +- **IsUSB** Indicates whether the device is a USB device. +- **JackSubType** A unique ID representing the KS node type of the endpoint. +- **localEffectClsid** The COM Class Identifier (CLSID) for the legacy local effect audio processing object. +- **localEffectModule** Module name for the legacy local effect audio processing object. +- **MicArrayGeometry** Describes the microphone array, including the microphone position, coordinates, type, and frequency range. See [MicArrayGeometry](#micarraygeometry). +- **modeEffectClsid** The COM Class Identifier (CLSID) for the mode effect audio processing object. +- **modeEffectModule** Module name for the mode effect audio processing object. +- **persistentId** A unique ID for this endpoint which is retained across migrations. +- **streamEffectClsid** The COM Class Identifier (CLSID) for the stream effect audio processing object. +- **streamEffectModule** Module name for the stream effect audio processing object. + + ## Census events ### Census.App @@ -2652,6 +2720,101 @@ This event is a low latency health alert that is part of the 4Nines device healt +## Driver installation events + +### Microsoft.Windows.DriverInstall.DeviceInstall + +This critical event sends information about the driver installation that took place. + +The following fields are available: + +- **ClassGuid** The unique ID for the device class. +- **ClassLowerFilters** The list of lower filter class drivers. +- **ClassUpperFilters** The list of upper filter class drivers. +- **CoInstallers** The list of coinstallers. +- **ConfigFlags** The device configuration flags. +- **DeviceConfigured** Indicates whether this device was configured through the kernel configuration. +- **DeviceInstanceId** The unique identifier of the device in the system. +- **DeviceStack** The device stack of the driver being installed. +- **DriverDate** The date of the driver. +- **DriverDescription** A description of the driver function. +- **DriverInfName** Name of the INF file (the setup information file) for the driver. +- **DriverInfSectionName** Name of the DDInstall section within the driver INF file. +- **DriverPackageId** The ID of the driver package that is staged to the driver store. +- **DriverProvider** The driver manufacturer or provider. +- **DriverUpdated** Indicates whether the driver is replacing an old driver. +- **DriverVersion** The version of the driver file. +- **EndTime** The time the installation completed. +- **Error** Provides the WIN32 error code for the installation. +- **ExtensionDrivers** List of extension drivers that complement this installation. +- **FinishInstallAction** Indicates whether the co-installer invoked the finish-install action. +- **FinishInstallUI** Indicates whether the installation process shows the user interface. +- **FirmwareDate** The firmware date that will be stored in the EFI System Resource Table (ESRT). +- **FirmwareRevision** The firmware revision that will be stored in the EFI System Resource Table (ESRT). +- **FirmwareVersion** The firmware version that will be stored in the EFI System Resource Table (ESRT). +- **FirstHardwareId** The ID in the hardware ID list that provides the most specific device description. +- **FlightIds** A list of the different Windows Insider builds on the device. +- **GenericDriver** Indicates whether the driver is a generic driver. +- **Inbox** Indicates whether the driver package is included with Windows. +- **InstallDate** The date the driver was installed. +- **LastCompatibleId** The ID in the hardware ID list that provides the least specific device description. +- **LegacyInstallReasonError** The error code for the legacy installation. +- **LowerFilters** The list of lower filter drivers. +- **MatchingDeviceId** The hardware ID or compatible ID that Windows used to install the device instance. +- **NeedReboot** Indicates whether the driver requires a reboot. +- **OriginalDriverInfName** The original name of the INF file before it was renamed. +- **ParentDeviceInstanceId** The device instance ID of the parent of the device. +- **PendedUntilReboot** Indicates whether the installation is pending until the device is rebooted. +- **Problem** Error code returned by the device after installation. +- **ProblemStatus** The status of the device after the driver installation. +- **SecondaryDevice** Indicates whether the device is a secondary device. +- **ServiceName** The service name of the driver. +- **SetupMode** Indicates whether the driver installation took place before the initial installation of the device was completed. +- **StartTime** The time when the installation started. +- **SubmissionId** The driver submission identifier assigned by the Windows Hardware Development Center. +- **UpperFilters** The list of upper filter drivers. + + +### Microsoft.Windows.DriverInstall.NewDevInstallDeviceEnd + +This event sends data about the driver installation once it is completed. + +The following fields are available: + +- **DeviceInstanceId** The unique identifier of the device in the system. +- **DriverUpdated** Indicates whether the driver was updated. +- **Error** The Win32 error code of the installation. +- **FlightId** The ID of the Windows Insider build the device received. +- **InstallDate** The date the driver was installed. +- **InstallFlags** The driver installation flags. +- **RebootRequired** Indicates whether a reboot is required after the installation. +- **RollbackPossible** Indicates whether this driver can be rolled back. +- **WuTargetedHardwareId** No content is currently available. +- **WuUntargetedHardwareId** No content is currently available. + + +### Microsoft.Windows.DriverInstall.NewDevInstallDeviceStart + +This event sends data about the driver that the new driver installation is replacing. + +The following fields are available: + +- **DeviceInstanceId** The unique identifier of the device in the system. +- **FirstInstallDate** The first time a driver was installed on this device. +- **LastDriverDate** Date of the driver that is being replaced. +- **LastDriverInbox** Indicates whether the previous driver was included with Windows. +- **LastDriverInfName** Name of the INF file (the setup information file) of the driver being replaced. +- **LastDriverVersion** The version of the driver that is being replaced. +- **LastFirmwareDate** The date of the last firmware reported from the EFI System Resource Table (ESRT). +- **LastFirmwareRevision** The last firmware revision number reported from EFI System Resource Table (ESRT). +- **LastFirmwareVersion** The last firmware version reported from the EFI System Resource Table (ESRT). +- **LastInstallDate** The date a driver was last installed on this device. +- **LastMatchingDeviceId** The hardware ID or compatible ID that Windows last used to install the device instance. +- **LastProblem** The previous problem code that was set on the device. +- **LastProblemStatus** The previous problem code that was set on the device. +- **LastSubmissionId** The driver submission identifier of the driver that is being replaced. + + ## DxgKernelTelemetry events ### DxgKrnlTelemetry.GPUAdapterInventoryV2 @@ -3899,166 +4062,35 @@ The following fields are available: - **WFD2Supported** Indicates if the Miracast receiver supports WFD2 protocol. -## Other events +## Privacy consent logging events -### MicArrayGeometry +### Microsoft.Windows.Shell.PrivacyConsentLogging.PrivacyConsentCompleted -This event provides information about the layout of the individual microphone elements in the microphone array. +This event is used to determine whether the user successfully completed the privacy consent experience. The following fields are available: -- **MicCoords** The location and orientation of the microphone element. -- **usFrequencyBandHi** The high end of the frequency range for the microphone. -- **usFrequencyBandLo** The low end of the frequency range for the microphone. -- **usMicArrayType** The type of the microphone array. -- **usNumberOfMicrophones** The number of microphones in the array. -- **usVersion** The version of the microphone array specification. -- **wHorizontalAngleBegin** The horizontal angle of the start of the working volume (reported as radians times 10,000). -- **wHorizontalAngleEnd** The horizontal angle of the end of the working volume (reported as radians times 10,000). -- **wVerticalAngleBegin** The vertical angle of the start of the working volume (reported as radians times 10,000). -- **wVerticalAngleEnd** The vertical angle of the end of the working volume (reported as radians times 10,000). +- **presentationVersion** Which display version of the privacy consent experience the user completed +- **privacyConsentState** The current state of the privacy consent experience +- **settingsVersion** Which setting version of the privacy consent experience the user completed +- **userOobeExitReason** The exit reason of the privacy consent experience -### MicCoords +### Microsoft.Windows.Shell.PrivacyConsentLogging.PrivacyConsentStatus -This event provides information about the location and orientation of the microphone element. +Event tells us effectiveness of new privacy experience. The following fields are available: -- **usType** The type of microphone. -- **wHorizontalAngle** The horizontal angle of the microphone (reported as radians times 10,000). -- **wVerticalAngle** The vertical angle of the microphone (reported as radians times 10,000). -- **wXCoord** The x-coordinate of the microphone. -- **wYCoord** The y-coordinate of the microphone. -- **wZCoord** The z-coordinate of the microphone. +- **isAdmin** whether the person who is logging in is an admin +- **isExistingUser** whether the account existed in a downlevel OS +- **isLaunching** Whether or not the privacy consent experience will be launched +- **isSilentElevation** whether the user has most restrictive UAC controls +- **privacyConsentState** whether the user has completed privacy experience +- **userRegionCode** The current user's region setting -### Microsoft.Windows.Audio.EndpointBuilder.DeviceInfo - -This event logs the successful enumeration of an audio endpoint (such as a microphone or speaker) and provides information about the audio endpoint. - -The following fields are available: - -- **BusEnumeratorName** The name of the bus enumerator (for example, HDAUDIO or USB). -- **ContainerId** An identifier that uniquely groups the functional devices associated with a single-function or multifunction device. -- **DeviceInstanceId** The unique identifier for this instance of the device. -- **EndpointDevnodeId** The IMMDevice identifier of the associated devnode. -- **endpointEffectClsid** The COM Class Identifier (CLSID) for the endpoint effect audio processing object. -- **endpointEffectModule** Module name for the endpoint effect audio processing object. -- **EndpointFormFactor** The enumeration value for the form factor of the endpoint device (for example speaker, microphone, remote network device). -- **endpointID** The unique identifier for the audio endpoint. -- **endpointInstanceId** The unique identifier for the software audio endpoint. Used for joining to other audio event. -- **Flow** Indicates whether the endpoint is capture (1) or render (0). -- **globalEffectClsid** COM Class Identifier (CLSID) for the legacy global effect audio processing object. -- **globalEffectModule** Module name for the legacy global effect audio processing object. -- **HWID** The hardware identifier for the endpoint. -- **IsBluetooth** Indicates whether the device is a Bluetooth device. -- **isFarField** A flag indicating whether the microphone endpoint is capable of hearing far field audio. -- **IsSideband** Indicates whether the device is a sideband device. -- **IsUSB** Indicates whether the device is a USB device. -- **JackSubType** A unique ID representing the KS node type of the endpoint. -- **localEffectClsid** The COM Class Identifier (CLSID) for the legacy local effect audio processing object. -- **localEffectModule** Module name for the legacy local effect audio processing object. -- **MicArrayGeometry** Describes the microphone array, including the microphone position, coordinates, type, and frequency range. See [MicArrayGeometry](#micarraygeometry). -- **modeEffectClsid** The COM Class Identifier (CLSID) for the mode effect audio processing object. -- **modeEffectModule** Module name for the mode effect audio processing object. -- **persistentId** A unique ID for this endpoint which is retained across migrations. -- **streamEffectClsid** The COM Class Identifier (CLSID) for the stream effect audio processing object. -- **streamEffectModule** Module name for the stream effect audio processing object. - - -### Microsoft.Windows.DriverInstall.DeviceInstall - -This critical event sends information about the driver installation that took place. - -The following fields are available: - -- **ClassGuid** The unique ID for the device class. -- **ClassLowerFilters** The list of lower filter class drivers. -- **ClassUpperFilters** The list of upper filter class drivers. -- **CoInstallers** The list of coinstallers. -- **ConfigFlags** The device configuration flags. -- **DeviceConfigured** Indicates whether this device was configured through the kernel configuration. -- **DeviceInstanceId** The unique identifier of the device in the system. -- **DeviceStack** The device stack of the driver being installed. -- **DriverDate** The date of the driver. -- **DriverDescription** A description of the driver function. -- **DriverInfName** Name of the INF file (the setup information file) for the driver. -- **DriverInfSectionName** Name of the DDInstall section within the driver INF file. -- **DriverPackageId** The ID of the driver package that is staged to the driver store. -- **DriverProvider** The driver manufacturer or provider. -- **DriverUpdated** Indicates whether the driver is replacing an old driver. -- **DriverVersion** The version of the driver file. -- **EndTime** The time the installation completed. -- **Error** Provides the WIN32 error code for the installation. -- **ExtensionDrivers** List of extension drivers that complement this installation. -- **FinishInstallAction** Indicates whether the co-installer invoked the finish-install action. -- **FinishInstallUI** Indicates whether the installation process shows the user interface. -- **FirmwareDate** The firmware date that will be stored in the EFI System Resource Table (ESRT). -- **FirmwareRevision** The firmware revision that will be stored in the EFI System Resource Table (ESRT). -- **FirmwareVersion** The firmware version that will be stored in the EFI System Resource Table (ESRT). -- **FirstHardwareId** The ID in the hardware ID list that provides the most specific device description. -- **FlightIds** A list of the different Windows Insider builds on the device. -- **GenericDriver** Indicates whether the driver is a generic driver. -- **Inbox** Indicates whether the driver package is included with Windows. -- **InstallDate** The date the driver was installed. -- **LastCompatibleId** The ID in the hardware ID list that provides the least specific device description. -- **LegacyInstallReasonError** The error code for the legacy installation. -- **LowerFilters** The list of lower filter drivers. -- **MatchingDeviceId** The hardware ID or compatible ID that Windows used to install the device instance. -- **NeedReboot** Indicates whether the driver requires a reboot. -- **OriginalDriverInfName** The original name of the INF file before it was renamed. -- **ParentDeviceInstanceId** The device instance ID of the parent of the device. -- **PendedUntilReboot** Indicates whether the installation is pending until the device is rebooted. -- **Problem** Error code returned by the device after installation. -- **ProblemStatus** The status of the device after the driver installation. -- **SecondaryDevice** Indicates whether the device is a secondary device. -- **ServiceName** The service name of the driver. -- **SetupMode** Indicates whether the driver installation took place before the initial installation of the device was completed. -- **StartTime** The time when the installation started. -- **SubmissionId** The driver submission identifier assigned by the Windows Hardware Development Center. -- **UpperFilters** The list of upper filter drivers. - - -### Microsoft.Windows.DriverInstall.NewDevInstallDeviceEnd - -This event sends data about the driver installation once it is completed. - -The following fields are available: - -- **DeviceInstanceId** The unique identifier of the device in the system. -- **DriverUpdated** Indicates whether the driver was updated. -- **Error** The Win32 error code of the installation. -- **FlightId** The ID of the Windows Insider build the device received. -- **InstallDate** The date the driver was installed. -- **InstallFlags** The driver installation flags. -- **RebootRequired** Indicates whether a reboot is required after the installation. -- **RollbackPossible** Indicates whether this driver can be rolled back. -- **WuTargetedHardwareId** No content is currently available. -- **WuUntargetedHardwareId** No content is currently available. - - -### Microsoft.Windows.DriverInstall.NewDevInstallDeviceStart - -This event sends data about the driver that the new driver installation is replacing. - -The following fields are available: - -- **DeviceInstanceId** The unique identifier of the device in the system. -- **FirstInstallDate** The first time a driver was installed on this device. -- **LastDriverDate** Date of the driver that is being replaced. -- **LastDriverInbox** Indicates whether the previous driver was included with Windows. -- **LastDriverInfName** Name of the INF file (the setup information file) of the driver being replaced. -- **LastDriverVersion** The version of the driver that is being replaced. -- **LastFirmwareDate** The date of the last firmware reported from the EFI System Resource Table (ESRT). -- **LastFirmwareRevision** The last firmware revision number reported from EFI System Resource Table (ESRT). -- **LastFirmwareVersion** The last firmware version reported from the EFI System Resource Table (ESRT). -- **LastInstallDate** The date a driver was last installed on this device. -- **LastMatchingDeviceId** The hardware ID or compatible ID that Windows last used to install the device instance. -- **LastProblem** The previous problem code that was set on the device. -- **LastProblemStatus** The previous problem code that was set on the device. -- **LastSubmissionId** The driver submission identifier of the driver that is being replaced. - +## Push Button Reset events ### Microsoft.Windows.PBR.BitLockerWipeFinished @@ -4890,323 +4922,6 @@ The following fields are available: - **timestamp** The timestamp for this push-button reset event. -### Microsoft.Windows.Security.WSC.DatastoreMigratedVersion - -This event provides information about the datastore migration and whether it was successful. - -The following fields are available: - -- **datastoreisvtype** The product category of the datastore. -- **datastoremigrated** The version of the datastore that was migrated. -- **status** The result code of the migration. - - -### Microsoft.Windows.Security.WSC.GetCallerViaWdsp - -This event returns data if the registering product EXE (executable file) does not allow COM (Component Object Model) impersonation. - -The following fields are available: - -- **callerExe** The registering product EXE that does not support COM impersonation. - - -### Microsoft.Windows.SysReset.FlightUninstallCancel - -This event indicates the customer has cancelled uninstallation of Windows. - - - -### Microsoft.Windows.SysReset.FlightUninstallError - -This event sends an error code when the Windows uninstallation fails. - -The following fields are available: - -- **ErrorCode** Error code for uninstallation failure. - - -### Microsoft.Windows.SysReset.FlightUninstallReboot - -This event is sent to signal an upcoming reboot during uninstallation of Windows. - - - -### Microsoft.Windows.SysReset.FlightUninstallStart - -This event indicates that the Windows uninstallation has started. - - - -### Microsoft.Windows.SysReset.FlightUninstallUnavailable - -This event sends diagnostic data when the Windows uninstallation is not available. - -The following fields are available: - -- **AddedProfiles** Indicates that new user profiles have been created since the flight was installed. -- **MissingExternalStorage** Indicates that the external storage used to install the flight is not available. -- **MissingInfra** Indicates that uninstall resources are missing. -- **MovedProfiles** Indicates that the user profile has been moved since the flight was installed. - - -### Microsoft.Windows.SysReset.HasPendingActions - -This event is sent when users have actions that will block the uninstall of the latest quality update. - - - -### Microsoft.Windows.SysReset.IndicateLCUWasUninstalled - -This event is sent when the registry indicates that the latest cumulative Windows update package has finished uninstalling. - -The following fields are available: - -- **errorCode** The error code if there was a failure during uninstallation of the latest cumulative Windows update package. - - -### Microsoft.Windows.SysReset.LCUUninstall - -This event is sent when the latest cumulative Windows update was uninstalled on a device. - -The following fields are available: - -- **errorCode** An error that occurred while the Windows update package was being uninstalled. -- **packageName** The name of the Windows update package that is being uninstalled. -- **removalTime** The amount of time it took to uninstall the Windows update package. - - -### Microsoft.Windows.SysReset.PBRBlockedByPolicy - -This event is sent when a push-button reset operation is blocked by the System Administrator. - -The following fields are available: - -- **PBRBlocked** Reason the push-button reset operation was blocked. -- **PBRType** The type of push-button reset operation that was blocked. - - -### Microsoft.Windows.SysReset.PBREngineInitFailed - -This event signals a failed handoff between two recovery binaries. - -The following fields are available: - -- **Operation** Legacy customer scenario. - - -### Microsoft.Windows.SysReset.PBREngineInitSucceed - -This event signals successful handoff between two recovery binaries. - -The following fields are available: - -- **Operation** Legacy customer scenario. - - -### Microsoft.Windows.SysReset.PBRFailedOffline - -This event reports the error code when recovery fails. - -The following fields are available: - -- **HRESULT** Error code for the failure. -- **PBRType** The recovery scenario. -- **SessionID** The unique ID for the recovery session. - - -### Microsoft.Windows.SystemReset.EsimPresentCheck - -This event is sent when a device is checked to see whether it has an embedded SIM (eSIM). - -The following fields are available: - -- **errorCode** Any error that occurred while checking for the presence of an embedded SIM. -- **esimPresent** Indicates whether an embedded SIM is present on the device. -- **sessionID** The ID of this session. - - -### Microsoft.Windows.SystemReset.PBRCorruptionRepairOption - -This event sends corruption repair diagnostic data when the PBRCorruptionRepairOption encounters a corruption error. - -The following fields are available: - -- **cbsSessionOption** The corruption repair configuration. -- **errorCode** The error code encountered. -- **meteredConnection** Indicates whether the device is connected to a metered network (wired or WiFi). -- **sessionID** The globally unique identifier (GUID) for the session. - - -### Microsoft.Windows.SystemReset.RepairNeeded - -This event provides information about whether a system reset needs repair. - -The following fields are available: - -- **repairNeeded** Indicates whether there was corruption in the system reset which needs repair. -- **sessionID** The ID of this push-button reset session. - - -### Microsoft.Windows.UEFI.ESRT - -This event sends basic data during boot about the firmware loaded or recently installed on the machine. This helps to keep Windows up to date. - -The following fields are available: - -- **DriverFirmwareFilename** The firmware file name reported by the device hardware key. -- **DriverFirmwarePolicy** The optional version update policy value. -- **DriverFirmwareStatus** The firmware status reported by the device hardware key. -- **DriverFirmwareVersion** The firmware version reported by the device hardware key. -- **FirmareLastAttemptVersion** No content is currently available. -- **FirmwareId** The UEFI (Unified Extensible Firmware Interface) identifier. -- **FirmwareLastAttemptStatus** The reported status of the most recent firmware installation attempt, as reported by the EFI System Resource Table (ESRT). -- **FirmwareLastAttemptVersion** The version of the most recent attempted firmware installation, as reported by the EFI System Resource Table (ESRT). -- **FirmwareType** The UEFI (Unified Extensible Firmware Interface) type. -- **FirmwareVersion** The UEFI (Unified Extensible Firmware Interface) version as reported by the EFI System Resource Table (ESRT). -- **InitiateUpdate** Indicates whether the system is ready to initiate an update. -- **LastAttemptDate** The date of the most recent attempted firmware installation. -- **LastAttemptStatus** The result of the most recent attempted firmware installation. -- **LastAttemptVersion** The version of the most recent attempted firmware installation. -- **LowestSupportedFirmwareVersion** The oldest (lowest) version of firmware supported. -- **MaxRetryCount** The maximum number of retries, defined by the firmware class key. -- **PartA_PrivTags** The privacy tags associated with the firmware. -- **RetryCount** The number of attempted installations (retries), reported by the driver software key. -- **Status** The status returned to the PnP (Plug-and-Play) manager. -- **UpdateAttempted** Indicates if installation of the current update has been attempted before. - - -### Microsoft.Xbox.XamTelemetry.AppActivationError - -This event indicates whether the system detected an activation error in the app. - -The following fields are available: - -- **ActivationUri** Activation URI (Uniform Resource Identifier) used in the attempt to activate the app. -- **AppId** The Xbox LIVE Title ID. -- **AppUserModelId** The AUMID (Application User Model ID) of the app to activate. -- **Result** The HResult error. -- **UserId** The Xbox LIVE User ID (XUID). - - -### Microsoft.Xbox.XamTelemetry.AppActivity - -This event is triggered whenever the current app state is changed by: launch, switch, terminate, snap, etc. - -The following fields are available: - -- **AppActionId** The ID of the application action. -- **AppCurrentVisibilityState** The ID of the current application visibility state. -- **AppId** The Xbox LIVE Title ID of the app. -- **AppPackageFullName** The full name of the application package. -- **AppPreviousVisibilityState** The ID of the previous application visibility state. -- **AppSessionId** The application session ID. -- **AppType** The type ID of the application (AppType_NotKnown, AppType_Era, AppType_Sra, AppType_Uwa). -- **BCACode** The BCA (Burst Cutting Area) mark code of the optical disc used to launch the application. -- **DurationMs** The amount of time (in milliseconds) since the last application state transition. -- **IsTrialLicense** This boolean value is TRUE if the application is on a trial license. -- **LicenseType** The type of licensed used to authorize the app (0 - Unknown, 1 - User, 2 - Subscription, 3 - Offline, 4 - Disc). -- **LicenseXuid** If the license type is 1 (User), this field contains the XUID (Xbox User ID) of the registered owner of the license. -- **ProductGuid** The Xbox product GUID (Globally-Unique ID) of the application. -- **UserId** The XUID (Xbox User ID) of the current user. - - -### Value - -This event returns data about Mean Time to Failure (MTTF) for Windows devices. It is the primary means of estimating reliability problems in Basic Diagnostic reporting with very strong privacy guarantees. Since Basic Diagnostic reporting does not include system up-time, and since that information is important to ensuring the safe and stable operation of Windows, the data provided by this event provides that data in a manner which does not threaten a user’s privacy. - -The following fields are available: - -- **Algorithm** The algorithm used to preserve privacy. -- **DPRange** The upper bound of the range being measured. -- **DPValue** The randomized response returned by the client. -- **Epsilon** The level of privacy to be applied. -- **HistType** The histogram type if the algorithm is a histogram algorithm. -- **PertProb** The probability the entry will be Perturbed if the algorithm chosen is “heavy-hitters”. - - -### WheaProvider.WheaErrorRecord - -This event collects data about common platform hardware error recorded by the Windows Hardware Error Architecture (WHEA) mechanism. - -The following fields are available: - -- **creatorId** The unique identifier for the entity that created the error record. -- **CreatorId** The unique identifier for the entity that created the error record. -- **errorFlags** Any flags set on the error record. -- **ErrorFlags** Any flags set on the error record. -- **notifyType** The unique identifier for the notification mechanism which reported the error to the operating system. -- **NotifyType** The unique identifier for the notification mechanism which reported the error to the operating system. -- **partitionId** The unique identifier for the partition on which the hardware error occurred. -- **PartitionId** The unique identifier for the partition on which the hardware error occurred. -- **platformId** The unique identifier for the platform on which the hardware error occurred. -- **PlatformId** The unique identifier for the platform on which the hardware error occurred. -- **record** A collection of binary data containing the full error record. -- **Record** A collection of binary data containing the full error record. -- **recordId** The identifier of the error record. -- **RecordId** The identifier of the error record. -- **sectionFlags** The flags for each section recorded in the error record. -- **SectionFlags** The flags for each section recorded in the error record. -- **SectionSeverity** The severity of each individual section. -- **sectionTypes** The unique identifier that represents the type of sections contained in the error record. -- **SectionTypes** The unique identifier that represents the type of sections contained in the error record. -- **severityCount** The severity of each individual section. -- **timeStamp** The error time stamp as recorded in the error record. -- **TimeStamp** The error time stamp as recorded in the error record. - - -### wilActivity - -This event provides a Windows Internal Library context used for Product and Service diagnostics. - -The following fields are available: - -- **callContext** The function where the failure occurred. -- **currentContextId** The ID of the current call context where the failure occurred. -- **currentContextMessage** The message of the current call context where the failure occurred. -- **currentContextName** The name of the current call context where the failure occurred. -- **failureCount** The number of failures for this failure ID. -- **failureId** The ID of the failure that occurred. -- **failureType** The type of the failure that occurred. -- **fileName** The file name where the failure occurred. -- **function** The function where the failure occurred. -- **hresult** The HResult of the overall activity. -- **lineNumber** The line number where the failure occurred. -- **message** The message of the failure that occurred. -- **module** The module where the failure occurred. -- **originatingContextId** The ID of the originating call context that resulted in the failure. -- **originatingContextMessage** The message of the originating call context that resulted in the failure. -- **originatingContextName** The name of the originating call context that resulted in the failure. -- **threadId** The ID of the thread on which the activity is executing. - - -## Privacy consent logging events - -### Microsoft.Windows.Shell.PrivacyConsentLogging.PrivacyConsentCompleted - -This event is used to determine whether the user successfully completed the privacy consent experience. - -The following fields are available: - -- **presentationVersion** Which display version of the privacy consent experience the user completed -- **privacyConsentState** The current state of the privacy consent experience -- **settingsVersion** Which setting version of the privacy consent experience the user completed -- **userOobeExitReason** The exit reason of the privacy consent experience - - -### Microsoft.Windows.Shell.PrivacyConsentLogging.PrivacyConsentStatus - -Event tells us effectiveness of new privacy experience. - -The following fields are available: - -- **isAdmin** whether the person who is logging in is an admin -- **isExistingUser** whether the account existed in a downlevel OS -- **isLaunching** Whether or not the privacy consent experience will be launched -- **isSilentElevation** whether the user has most restrictive UAC controls -- **privacyConsentState** whether the user has completed privacy experience -- **userRegionCode** The current user's region setting - - ## Sediment events ### Microsoft.Windows.Sediment.Info.DetailedState @@ -5754,6 +5469,175 @@ The following fields are available: - **ValidityWindowInDays** The validity window that's in effect when verifying the timestamp. +## System reset events + +### Microsoft.Windows.SysReset.FlightUninstallCancel + +This event indicates the customer has cancelled uninstallation of Windows. + + + +### Microsoft.Windows.SysReset.FlightUninstallError + +This event sends an error code when the Windows uninstallation fails. + +The following fields are available: + +- **ErrorCode** Error code for uninstallation failure. + + +### Microsoft.Windows.SysReset.FlightUninstallReboot + +This event is sent to signal an upcoming reboot during uninstallation of Windows. + + + +### Microsoft.Windows.SysReset.FlightUninstallStart + +This event indicates that the Windows uninstallation has started. + + + +### Microsoft.Windows.SysReset.FlightUninstallUnavailable + +This event sends diagnostic data when the Windows uninstallation is not available. + +The following fields are available: + +- **AddedProfiles** Indicates that new user profiles have been created since the flight was installed. +- **MissingExternalStorage** Indicates that the external storage used to install the flight is not available. +- **MissingInfra** Indicates that uninstall resources are missing. +- **MovedProfiles** Indicates that the user profile has been moved since the flight was installed. + + +### Microsoft.Windows.SysReset.HasPendingActions + +This event is sent when users have actions that will block the uninstall of the latest quality update. + + + +### Microsoft.Windows.SysReset.IndicateLCUWasUninstalled + +This event is sent when the registry indicates that the latest cumulative Windows update package has finished uninstalling. + +The following fields are available: + +- **errorCode** The error code if there was a failure during uninstallation of the latest cumulative Windows update package. + + +### Microsoft.Windows.SysReset.LCUUninstall + +This event is sent when the latest cumulative Windows update was uninstalled on a device. + +The following fields are available: + +- **errorCode** An error that occurred while the Windows update package was being uninstalled. +- **packageName** The name of the Windows update package that is being uninstalled. +- **removalTime** The amount of time it took to uninstall the Windows update package. + + +### Microsoft.Windows.SysReset.PBRBlockedByPolicy + +This event is sent when a push-button reset operation is blocked by the System Administrator. + +The following fields are available: + +- **PBRBlocked** Reason the push-button reset operation was blocked. +- **PBRType** The type of push-button reset operation that was blocked. + + +### Microsoft.Windows.SysReset.PBREngineInitFailed + +This event signals a failed handoff between two recovery binaries. + +The following fields are available: + +- **Operation** Legacy customer scenario. + + +### Microsoft.Windows.SysReset.PBREngineInitSucceed + +This event signals successful handoff between two recovery binaries. + +The following fields are available: + +- **Operation** Legacy customer scenario. + + +### Microsoft.Windows.SysReset.PBRFailedOffline + +This event reports the error code when recovery fails. + +The following fields are available: + +- **HRESULT** Error code for the failure. +- **PBRType** The recovery scenario. +- **SessionID** The unique ID for the recovery session. + + +### Microsoft.Windows.SystemReset.EsimPresentCheck + +This event is sent when a device is checked to see whether it has an embedded SIM (eSIM). + +The following fields are available: + +- **errorCode** Any error that occurred while checking for the presence of an embedded SIM. +- **esimPresent** Indicates whether an embedded SIM is present on the device. +- **sessionID** The ID of this session. + + +### Microsoft.Windows.SystemReset.PBRCorruptionRepairOption + +This event sends corruption repair diagnostic data when the PBRCorruptionRepairOption encounters a corruption error. + +The following fields are available: + +- **cbsSessionOption** The corruption repair configuration. +- **errorCode** The error code encountered. +- **meteredConnection** Indicates whether the device is connected to a metered network (wired or WiFi). +- **sessionID** The globally unique identifier (GUID) for the session. + + +### Microsoft.Windows.SystemReset.RepairNeeded + +This event provides information about whether a system reset needs repair. + +The following fields are available: + +- **repairNeeded** Indicates whether there was corruption in the system reset which needs repair. +- **sessionID** The ID of this push-button reset session. + + +## UEFI events + +### Microsoft.Windows.UEFI.ESRT + +This event sends basic data during boot about the firmware loaded or recently installed on the machine. This helps to keep Windows up to date. + +The following fields are available: + +- **DriverFirmwareFilename** The firmware file name reported by the device hardware key. +- **DriverFirmwarePolicy** The optional version update policy value. +- **DriverFirmwareStatus** The firmware status reported by the device hardware key. +- **DriverFirmwareVersion** The firmware version reported by the device hardware key. +- **FirmareLastAttemptVersion** No content is currently available. +- **FirmwareId** The UEFI (Unified Extensible Firmware Interface) identifier. +- **FirmwareLastAttemptStatus** The reported status of the most recent firmware installation attempt, as reported by the EFI System Resource Table (ESRT). +- **FirmwareLastAttemptVersion** The version of the most recent attempted firmware installation, as reported by the EFI System Resource Table (ESRT). +- **FirmwareType** The UEFI (Unified Extensible Firmware Interface) type. +- **FirmwareVersion** The UEFI (Unified Extensible Firmware Interface) version as reported by the EFI System Resource Table (ESRT). +- **InitiateUpdate** Indicates whether the system is ready to initiate an update. +- **LastAttemptDate** The date of the most recent attempted firmware installation. +- **LastAttemptStatus** The result of the most recent attempted firmware installation. +- **LastAttemptVersion** The version of the most recent attempted firmware installation. +- **LowestSupportedFirmwareVersion** The oldest (lowest) version of firmware supported. +- **MaxRetryCount** The maximum number of retries, defined by the firmware class key. +- **PartA_PrivTags** The privacy tags associated with the firmware. +- **RetryCount** The number of attempted installations (retries), reported by the driver software key. +- **Status** The status returned to the PnP (Plug-and-Play) manager. +- **UpdateAttempted** Indicates if installation of the current update has been attempted before. + + ## Update events ### Update360Telemetry.Revert @@ -6421,6 +6305,20 @@ The following fields are available: - **ReportId** WER Report Id associated with this bug check (used for finding the corresponding report archive in Watson). +### Value + +This event returns data about Mean Time to Failure (MTTF) for Windows devices. It is the primary means of estimating reliability problems in Basic Diagnostic reporting with very strong privacy guarantees. Since Basic Diagnostic reporting does not include system up-time, and since that information is important to ensuring the safe and stable operation of Windows, the data provided by this event provides that data in a manner which does not threaten a user’s privacy. + +The following fields are available: + +- **Algorithm** The algorithm used to preserve privacy. +- **DPRange** The upper bound of the range being measured. +- **DPValue** The randomized response returned by the client. +- **Epsilon** The level of privacy to be applied. +- **HistType** The histogram type if the algorithm is a histogram algorithm. +- **PertProb** The probability the entry will be Perturbed if the algorithm chosen is “heavy-hitters”. + + ## Windows Error Reporting MTT events ### Microsoft.Windows.WER.MTT.Denominator @@ -6432,6 +6330,60 @@ The following fields are available: - **Value** Standard UTC emitted DP value structure See [Value](#value). +## Windows Hardware Error Architecture events + +### WheaProvider.WheaErrorRecord + +This event collects data about common platform hardware error recorded by the Windows Hardware Error Architecture (WHEA) mechanism. + +The following fields are available: + +- **creatorId** The unique identifier for the entity that created the error record. +- **CreatorId** The unique identifier for the entity that created the error record. +- **errorFlags** Any flags set on the error record. +- **ErrorFlags** Any flags set on the error record. +- **notifyType** The unique identifier for the notification mechanism which reported the error to the operating system. +- **NotifyType** The unique identifier for the notification mechanism which reported the error to the operating system. +- **partitionId** The unique identifier for the partition on which the hardware error occurred. +- **PartitionId** The unique identifier for the partition on which the hardware error occurred. +- **platformId** The unique identifier for the platform on which the hardware error occurred. +- **PlatformId** The unique identifier for the platform on which the hardware error occurred. +- **record** A collection of binary data containing the full error record. +- **Record** A collection of binary data containing the full error record. +- **recordId** The identifier of the error record. +- **RecordId** The identifier of the error record. +- **sectionFlags** The flags for each section recorded in the error record. +- **SectionFlags** The flags for each section recorded in the error record. +- **SectionSeverity** The severity of each individual section. +- **sectionTypes** The unique identifier that represents the type of sections contained in the error record. +- **SectionTypes** The unique identifier that represents the type of sections contained in the error record. +- **severityCount** The severity of each individual section. +- **timeStamp** The error time stamp as recorded in the error record. +- **TimeStamp** The error time stamp as recorded in the error record. + + +## Windows Security Center events + +### Microsoft.Windows.Security.WSC.DatastoreMigratedVersion + +This event provides information about the datastore migration and whether it was successful. + +The following fields are available: + +- **datastoreisvtype** The product category of the datastore. +- **datastoremigrated** The version of the datastore that was migrated. +- **status** The result code of the migration. + + +### Microsoft.Windows.Security.WSC.GetCallerViaWdsp + +This event returns data if the registering product EXE (executable file) does not allow COM (Component Object Model) impersonation. + +The following fields are available: + +- **callerExe** The registering product EXE that does not support COM impersonation. + + ## Windows Store events ### Microsoft.Windows.StoreAgent.Telemetry.AbortedInstallation @@ -7591,6 +7543,31 @@ The following fields are available: - **wuDeviceid** The Windows Update device GUID. +### wilActivity + +This event provides a Windows Internal Library context used for Product and Service diagnostics. + +The following fields are available: + +- **callContext** The function where the failure occurred. +- **currentContextId** The ID of the current call context where the failure occurred. +- **currentContextMessage** The message of the current call context where the failure occurred. +- **currentContextName** The name of the current call context where the failure occurred. +- **failureCount** The number of failures for this failure ID. +- **failureId** The ID of the failure that occurred. +- **failureType** The type of the failure that occurred. +- **fileName** The file name where the failure occurred. +- **function** The function where the failure occurred. +- **hresult** The HResult of the overall activity. +- **lineNumber** The line number where the failure occurred. +- **message** The message of the failure that occurred. +- **module** The module where the failure occurred. +- **originatingContextId** The ID of the originating call context that resulted in the failure. +- **originatingContextMessage** The message of the originating call context that resulted in the failure. +- **originatingContextName** The name of the originating call context that resulted in the failure. +- **threadId** The ID of the thread on which the activity is executing. + + ## Windows Update mitigation events ### Microsoft.Windows.Mitigation.AccountTraceLoggingProvider.General @@ -7845,4 +7822,41 @@ This event signals the completion of the setup process. It happens only once dur +## XBOX events + +### Microsoft.Xbox.XamTelemetry.AppActivationError + +This event indicates whether the system detected an activation error in the app. + +The following fields are available: + +- **ActivationUri** Activation URI (Uniform Resource Identifier) used in the attempt to activate the app. +- **AppId** The Xbox LIVE Title ID. +- **AppUserModelId** The AUMID (Application User Model ID) of the app to activate. +- **Result** The HResult error. +- **UserId** The Xbox LIVE User ID (XUID). + + +### Microsoft.Xbox.XamTelemetry.AppActivity + +This event is triggered whenever the current app state is changed by: launch, switch, terminate, snap, etc. + +The following fields are available: + +- **AppActionId** The ID of the application action. +- **AppCurrentVisibilityState** The ID of the current application visibility state. +- **AppId** The Xbox LIVE Title ID of the app. +- **AppPackageFullName** The full name of the application package. +- **AppPreviousVisibilityState** The ID of the previous application visibility state. +- **AppSessionId** The application session ID. +- **AppType** The type ID of the application (AppType_NotKnown, AppType_Era, AppType_Sra, AppType_Uwa). +- **BCACode** The BCA (Burst Cutting Area) mark code of the optical disc used to launch the application. +- **DurationMs** The amount of time (in milliseconds) since the last application state transition. +- **IsTrialLicense** This boolean value is TRUE if the application is on a trial license. +- **LicenseType** The type of licensed used to authorize the app (0 - Unknown, 1 - User, 2 - Subscription, 3 - Offline, 4 - Disc). +- **LicenseXuid** If the license type is 1 (User), this field contains the XUID (Xbox User ID) of the registered owner of the license. +- **ProductGuid** The Xbox product GUID (Globally-Unique ID) of the application. +- **UserId** The XUID (Xbox User ID) of the current user. + + From f3d14e5b74018749b57b5261419bb3642f7b0ecf Mon Sep 17 00:00:00 2001 From: Brian Lich Date: Fri, 5 Apr 2019 13:31:18 -0700 Subject: [PATCH 120/724] new build 4/5/2019 1:31 PM --- ...ndows-diagnostic-events-and-fields-1703.md | 2 +- ...ndows-diagnostic-events-and-fields-1709.md | 2 +- ...ndows-diagnostic-events-and-fields-1803.md | 34 +++++++++---------- 3 files changed, 19 insertions(+), 19 deletions(-) diff --git a/windows/privacy/basic-level-windows-diagnostic-events-and-fields-1703.md b/windows/privacy/basic-level-windows-diagnostic-events-and-fields-1703.md index b935c25c38..68fa2f43f7 100644 --- a/windows/privacy/basic-level-windows-diagnostic-events-and-fields-1703.md +++ b/windows/privacy/basic-level-windows-diagnostic-events-and-fields-1703.md @@ -2954,7 +2954,7 @@ The following fields are available: - **winInetError** The HResult of the operation. -## Other events +## Privacy logging notification events ### Microsoft.Windows.Shell.PrivacyNotifierLogging.PrivacyNotifierCompleted diff --git a/windows/privacy/basic-level-windows-diagnostic-events-and-fields-1709.md b/windows/privacy/basic-level-windows-diagnostic-events-and-fields-1709.md index ded2f5807f..535e3032d6 100644 --- a/windows/privacy/basic-level-windows-diagnostic-events-and-fields-1709.md +++ b/windows/privacy/basic-level-windows-diagnostic-events-and-fields-1709.md @@ -3142,7 +3142,7 @@ The following fields are available: - **winInetError** The HResult of the operation. -## Other events +## Privacy logging notification events ### Microsoft.Windows.Shell.PrivacyNotifierLogging.PrivacyNotifierCompleted diff --git a/windows/privacy/basic-level-windows-diagnostic-events-and-fields-1803.md b/windows/privacy/basic-level-windows-diagnostic-events-and-fields-1803.md index d65b1aae10..880d63e219 100644 --- a/windows/privacy/basic-level-windows-diagnostic-events-and-fields-1803.md +++ b/windows/privacy/basic-level-windows-diagnostic-events-and-fields-1803.md @@ -4184,23 +4184,6 @@ The following fields are available: - **winInetError** The HResult of the operation. -## Other events - -### Microsoft.Windows.Shell.PrivacyNotifierLogging.PrivacyNotifierCompleted - -No content is currently available. - -The following fields are available: - -- **cleanupTask** No content is currently available. -- **cleanupTaskResult** No content is currently available. -- **deviceEvaluated** No content is currently available. -- **deviceImpacted** No content is currently available. -- **modalAction** No content is currently available. -- **modalResult** No content is currently available. -- **resetSettingsResult** No content is currently available. - - ## Privacy consent logging events ### Microsoft.Windows.Shell.PrivacyConsentLogging.PrivacyConsentCompleted @@ -4260,6 +4243,23 @@ The following fields are available: - **threadId** The ID of the thread the activity was run on. +## Privacy logging notification events + +### Microsoft.Windows.Shell.PrivacyNotifierLogging.PrivacyNotifierCompleted + +No content is currently available. + +The following fields are available: + +- **cleanupTask** No content is currently available. +- **cleanupTaskResult** No content is currently available. +- **deviceEvaluated** No content is currently available. +- **deviceImpacted** No content is currently available. +- **modalAction** No content is currently available. +- **modalResult** No content is currently available. +- **resetSettingsResult** No content is currently available. + + ## Remediation events ### Microsoft.Windows.Remediation.Applicable From 7e5f1d273a1ec897b234e43c65c63bedb5df4004 Mon Sep 17 00:00:00 2001 From: Greg Lindsay Date: Fri, 5 Apr 2019 13:34:30 -0700 Subject: [PATCH 121/724] draft 1903-3 --- .../windows-10-1703-removed-features.md | 12 ++++++------ .../windows-10-1709-removed-features.md | 15 +++++++-------- .../windows-10-1903-removed-features.md | 17 ++++++++--------- 3 files changed, 21 insertions(+), 23 deletions(-) diff --git a/windows/deployment/planning/windows-10-1703-removed-features.md b/windows/deployment/planning/windows-10-1703-removed-features.md index 9a87eca2b0..45bac44358 100644 --- a/windows/deployment/planning/windows-10-1703-removed-features.md +++ b/windows/deployment/planning/windows-10-1703-removed-features.md @@ -1,6 +1,6 @@ --- -title: Windows 10 Creators Update Deprecated Features -description: Learn about features that were removed in Windows 10 Creators Update (version 1703) +title: Windows 10, version 1703 removed features +description: Learn about features that were removed in Windows 10, version 1703 ms.prod: w10 ms.mktglfcycl: plan ms.localizationpriority: medium @@ -9,15 +9,15 @@ author: lizap ms.date: 10/09/2017 ms.topic: article --- -# Features that are removed or deprecated in Windows 10 Creators Update +# Features that are removed or deprecated in Windows 10, version 1703 -> Applies to: Windows 10 +> Applies to: Windows 10, version 1703 -The following features and functionalities in the Windows 10 Creators Update edition (Windows 10, version 1703) have either been removed from the product in the current release (*Removed*) or are not in active development and are planned for potential removal in subsequent releases (*Deprecated*). +The following features and functionalities in the Windows 10 Creators Update edition (Windows 10, version 1703) have either been removed from the product in the current release (*Removed*) or are not in active development and are planned for potential removal in subsequent releases. This list is intended for IT professionals who are updating operating systems in a commercial environment. The plan and list are subject to change and may not include every deprecated feature or functionality. For more details about a listed feature or functionality and its replacement, see the documentation for that feature. -| Feature | Removed | Deprecated | +| Feature | Removed | Not actively developed | |------------|---------|------------| |Apndatabase.xml is being replaced by the COSA database. Therefore, some constructs will no longer function. This includes Hardware ID, incoming SMS messaging rules in mobile apps, a list of privileged apps in mobile apps, autoconnect order, APN parser, and CDMAProvider ID. | | X | |Apps Corner| | X | diff --git a/windows/deployment/planning/windows-10-1709-removed-features.md b/windows/deployment/planning/windows-10-1709-removed-features.md index cdb6eeb98d..d4796ebda4 100644 --- a/windows/deployment/planning/windows-10-1709-removed-features.md +++ b/windows/deployment/planning/windows-10-1709-removed-features.md @@ -1,25 +1,24 @@ --- -title: Windows 10 Fall Creators Update Deprecated Features -description: Learn about features that will be removed in Windows 10 Fall Creators Update (version 1709) +title: Windows 10, version 1709 removed features +description: Learn about features that will be removed in Windows 10, version 1709 ms.prod: w10 ms.mktglfcycl: plan ms.localizationpriority: medium ms.sitesec: library -author: lizap -ms.date: 10/30/2018 +author: greg-lindsay ms.topic: article --- -# Features that are removed or deprecated in Windows 10 Fall Creators Update +# Features that are removed or deprecated in Windows 10, version 1709 -> Applies to: Windows 10 +> Applies to: Windows 10, version 1709 -The following features and functionalities in the Windows 10 Fall Creators Update (Windows 10, version 1709) are either removed from the product in the current release (*Removed*) or are not in active development and might be removed in future releases (*Deprecated*). +The following features and functionalities in the Windows 10, version 1709 are either removed from the product in the current release (*Removed*) or are not in active development and might be removed in future releases. This list is intended to help customers consider these removals and deprecations for their own planning. The list is subject to change and may not include every deprecated feature or functionality. For more information about a listed feature or functionality and its replacement, see the documentation for that feature. You can also follow the provided links in this table to see additional resources.  -| Feature | Removed | Deprecated | +| Feature | Removed | Not actively developed | |----------|---------|------------| |**3D Builder app**
No longer installed by default. Consider using Print 3D and Paint 3D in its place. However, 3D Builder is still available for download from the Windows Store. | X | | |**Apndatabase.xml**
For more information about the replacement database, see the following Hardware Dev Center articles:
[MO Process to update COSA](/windows-hardware/drivers/mobilebroadband/planning-your-apn-database-submission)
[COSA FAQ](/windows-hardware/drivers/mobilebroadband/cosa---faq) | X | | diff --git a/windows/deployment/planning/windows-10-1903-removed-features.md b/windows/deployment/planning/windows-10-1903-removed-features.md index 35b56b17dc..0aa2e0bfad 100644 --- a/windows/deployment/planning/windows-10-1903-removed-features.md +++ b/windows/deployment/planning/windows-10-1903-removed-features.md @@ -13,20 +13,19 @@ ms.topic: article > Applies to: Windows 10, version 1903 - -
roadmapEach release of Windows 10 adds new features and functionality; we also occasionally remove features and functionality, usually because we've added a better option. Here are the details about the features and functionalities that we removed in Windows 10, version 1903. You can get early access to Windows 10 builds by joining the [Windows Insider program](https://insider.windows.com) - this is a great way to test feature changes. -
+Each release of Windows 10 adds new features and functionality; occasionally we also remove features and functionality, usually because we've added a better option. Here are the details about the features and functionalities that we removed in Windows 10, version 1903. +A great way to test feature changes is to join the [Windows Insider program](https://insider.windows.com), where you can get early access to new Windows 10 builds. **The list is subject to change and might not include every affected feature or functionality.** -## Features we removed in this release +## Features we removed or will remove soon -We're removing the following features and functionalities from the installed product image in Windows 10, version 1809. Applications or code that depend on these features won't function in this release unless you use an alternate method. +The following features and functionalities are removed from the installed product image for Windows 10, version 1903, or are planned for removal in an upcoming release. Applications or code that depend on these features won't function in this release unless you use another method. -|Feature |Instead you can use...| +|Feature |Removed or pending removal|Details| |-----------|-------------------- -|xxxxx|yyyyy| +|Cortana will be removed from Windows 10 in all non-English/US markets. Cortana will still be available for en-us markets. |Pending removal|A new Cortana UWP app is being developed. Precise dates for release not yet available.| |xxxxx|yyyyy| |xxxxx|yyyyy| |xxxxx|yyyyy| @@ -38,9 +37,9 @@ We're no longer actively developing these features and may remove them from a fu If you have feedback about the proposed replacement of any of these features, you can use the [Feedback Hub app](https://support.microsoft.com/help/4021566/windows-10-send-feedback-to-microsoft-with-feedback-hub-app). -|Feature |Instead you can use...| +|Feature |Details| |-----------|---------------------| -|xxxxx|yyyyy| +|Windows To Go|Windows To Go is no longer being developed. The feature does not support feature updates and therefore does not enable you to stay current. It also requires a specific type of USB that is no longer supported by many OEM vendors.| |xxxxx|yyyyy| |xxxxx|yyyyy| |xxxxx|yyyyy| From 0692dcca4f7fc51d6809f304a26b58378032dcf4 Mon Sep 17 00:00:00 2001 From: Greg Lindsay Date: Fri, 5 Apr 2019 16:16:49 -0700 Subject: [PATCH 122/724] draft 1903-4 --- .../windows-10-1903-removed-features.md | 27 ++++++++----------- 1 file changed, 11 insertions(+), 16 deletions(-) diff --git a/windows/deployment/planning/windows-10-1903-removed-features.md b/windows/deployment/planning/windows-10-1903-removed-features.md index 0aa2e0bfad..262f6dcd60 100644 --- a/windows/deployment/planning/windows-10-1903-removed-features.md +++ b/windows/deployment/planning/windows-10-1903-removed-features.md @@ -13,23 +13,23 @@ ms.topic: article > Applies to: Windows 10, version 1903 -Each release of Windows 10 adds new features and functionality; occasionally we also remove features and functionality, usually because we've added a better option. Here are the details about the features and functionalities that we removed in Windows 10, version 1903. +Each release of Windows 10 adds new features and functionality; occasionally we also remove features and functionality, usually because we've added a better option. Below are the details about the features and functionalities that we removed in Windows 10, version 1903. **The list below is subject to change and might not include every affected feature or functionality.** -A great way to test feature changes is to join the [Windows Insider program](https://insider.windows.com), where you can get early access to new Windows 10 builds. - -**The list is subject to change and might not include every affected feature or functionality.** +**Note**: Join the [Windows Insider program](https://insider.windows.com) to get early access to new Windows 10 builds and test these changes yourself. ## Features we removed or will remove soon The following features and functionalities are removed from the installed product image for Windows 10, version 1903, or are planned for removal in an upcoming release. Applications or code that depend on these features won't function in this release unless you use another method. -|Feature |Removed or pending removal|Details| -|-----------|-------------------- +|Feature |Status|Details| +|-----------|--------------------|--------- |Cortana will be removed from Windows 10 in all non-English/US markets. Cortana will still be available for en-us markets. |Pending removal|A new Cortana UWP app is being developed. Precise dates for release not yet available.| -|xxxxx|yyyyy| -|xxxxx|yyyyy| -|xxxxx|yyyyy| -|xxxxx|yyyyy| +|XDDM-based Remote Desktop driver|Removed|The default driver for remote desktop was switched to the IDD for a single-user scenarios. We plan to use IDD as default for all use cases and anounce deprecation of XP Display Driver Model (XDDM) based RD fdriver| +|Desktop messaging app doesn't offer messages sync |Removed|The messaging app on Desktop has a sync feature that can be used to sync SMS text messages received from Windows Mobile and keep a copy of them on the Desktop. We will be removing the messaging app from Desktop devices in a future release. When sync is removed, you will only be able to access messages from the device that received the message.| +|Print 3D app|Removed|The Print 3D app will no longer be installed automatically in a future release of Windows. It will remain available for download from the Store. To 3D print objects on a new Windows devices, you must first install the app (1P or 3P app) from the Store.| +|My People / People|Pending removal|The **My People** experience will be removed in a future release.| +|UCS log collection tool|Pending removal|The UCS log collection tool is being replaced by the Feedback hub| +|Wi-Fi WEP and TKIP|Removed|Wi-Fi networks that are secured with passwords using older WEP and TKIP protocals are not as secure as those secured with new protocols such as WPA, WPA2, and soon WPA3. In this release, connecting to WEP or TKIP network will show a warning message that the network is not secure. In a future release any connection to a Wi-Fi network using these old protocols will be disallowed. | ## Features we’re no longer developing @@ -39,10 +39,5 @@ If you have feedback about the proposed replacement of any of these features, yo |Feature |Details| |-----------|---------------------| -|Windows To Go|Windows To Go is no longer being developed. The feature does not support feature updates and therefore does not enable you to stay current. It also requires a specific type of USB that is no longer supported by many OEM vendors.| -|xxxxx|yyyyy| -|xxxxx|yyyyy| -|xxxxx|yyyyy| -|xxxxx|yyyyy| - +|Windows To Go|Windows To Go is no longer being developed.

The feature does not support feature updates and therefore does not enable you to stay current. It also requires a specific type of USB that is no longer supported by many OEMs.| From 11ae2c3f71a0d29d8e8cad5915266a31b7cd7c6c Mon Sep 17 00:00:00 2001 From: botmoto <42125490+botmoto@users.noreply.github.com> Date: Sun, 7 Apr 2019 16:23:10 -0700 Subject: [PATCH 123/724] Update credential-guard-manage.md --- .../credential-guard-manage.md | 20 +++++++++++++------ 1 file changed, 14 insertions(+), 6 deletions(-) diff --git a/windows/security/identity-protection/credential-guard/credential-guard-manage.md b/windows/security/identity-protection/credential-guard/credential-guard-manage.md index 0edce00395..c5e98ffb47 100644 --- a/windows/security/identity-protection/credential-guard/credential-guard-manage.md +++ b/windows/security/identity-protection/credential-guard/credential-guard-manage.md @@ -20,6 +20,7 @@ ms.date: 03/01/2019 **Applies to** - Windows 10 - Windows Server 2016 +- Windows Server 2019 Prefer video? See [Windows Defender Credential Guard Deployment](https://mva.microsoft.com/en-us/training-courses/deep-dive-into-credential-guard-16651?l=sRcyvLJyC_3304300474) in the Deep Dive into Windows Defender Credential Guard video series. @@ -150,9 +151,13 @@ To disable Windows Defender Credential Guard, you can use the following set of p 1. If you used Group Policy, disable the Group Policy setting that you used to enable Windows Defender Credential Guard (**Computer Configuration** -> **Administrative Templates** -> **System** -> **Device Guard** -> **Turn on Virtualization Based Security**). 2. Delete the following registry settings: - HKEY\_LOCAL\_MACHINE\\System\\CurrentControlSet\\Control\\LSA\LsaCfgFlags - - HKEY\_LOCAL\_MACHINE\\Software\\Policies\\Microsoft\\Windows\\DeviceGuard\\EnableVirtualizationBasedSecurity - - HKEY\_LOCAL\_MACHINE\\Software\\Policies\\Microsoft\\Windows\\DeviceGuard\\RequirePlatformSecurityFeatures - + - HKEY\_LOCAL\_MACHINE\\Software\\Policies\\Microsoft\\Windows\\DeviceGuard\\LsaCfgFlags +> [!NOTE] +> If you also wish to disable virtualization-based security delete the following registry settings: +```syntax +HKEY\_LOCAL\_MACHINE\\Software\\Policies\\Microsoft\\Windows\\DeviceGuard\\EnableVirtualizationBasedSecurity +HKEY\_LOCAL\_MACHINE\\Software\\Policies\\Microsoft\\Windows\\DeviceGuard\\RequirePlatformSecurityFeatures +``` > [!IMPORTANT] > If you manually remove these registry settings, make sure to delete them all. If you don't remove them all, the device might go into BitLocker recovery. @@ -164,9 +169,8 @@ To disable Windows Defender Credential Guard, you can use the following set of p bcdedit /create {0cb3b571-2f2e-4343-a879-d86a476d7215} /d "DebugTool" /application osloader bcdedit /set {0cb3b571-2f2e-4343-a879-d86a476d7215} path "\EFI\Microsoft\Boot\SecConfig.efi" bcdedit /set {bootmgr} bootsequence {0cb3b571-2f2e-4343-a879-d86a476d7215} - bcdedit /set {0cb3b571-2f2e-4343-a879-d86a476d7215} loadoptions DISABLE-LSA-ISO,DISABLE-VBS + bcdedit /set {0cb3b571-2f2e-4343-a879-d86a476d7215} loadoptions DISABLE-LSA-ISO bcdedit /set {0cb3b571-2f2e-4343-a879-d86a476d7215} device partition=X: - bcdedit /set hypervisorlaunchtype off mountvol X: /d ``` @@ -175,7 +179,11 @@ To disable Windows Defender Credential Guard, you can use the following set of p 4. Alternatively, you can disable the virtualization-based security features to turn off Windows Defender Credential Guard. > [!NOTE] -> The PC must have one-time access to a domain controller to decrypt content, such as files that were encrypted with EFS. If you want to turn off both Windows Defender Credential Guard and virtualization-based security, run the following bcdedit command after turning off all virtualization-based security Group Policy and registry settings: bcdedit /set {0cb3b571-2f2e-4343-a879-d86a476d7215} loadoptions DISABLE-LSA-ISO,DISABLE-VBS +> The PC must have one-time access to a domain controller to decrypt content, such as files that were encrypted with EFS. If you want to turn off both Windows Defender Credential Guard and virtualization-based security, run the following bcdedit commands after turning off all virtualization-based security Group Policy and registry settings: +```syntax +bcdedit /set {0cb3b571-2f2e-4343-a879-d86a476d7215} loadoptions DISABLE-LSA-ISO,DISABLE-VBS +bcdedit /set vsmlaunchtype off +``` > [!NOTE] > Credential Guard and Device Guard are not currently supported when using Azure IaaS VMs. These options will be made available with future Gen 2 VMs. From 573f21284ce3d693bbf5e4d985513290c4c4e81f Mon Sep 17 00:00:00 2001 From: botmoto <42125490+botmoto@users.noreply.github.com> Date: Sun, 7 Apr 2019 19:15:27 -0700 Subject: [PATCH 124/724] Update credential-guard-manage.md Formatting Update credential-guard-manage.md --- .../credential-guard-manage.md | 24 ++++++++----------- 1 file changed, 10 insertions(+), 14 deletions(-) diff --git a/windows/security/identity-protection/credential-guard/credential-guard-manage.md b/windows/security/identity-protection/credential-guard/credential-guard-manage.md index c5e98ffb47..e02b561b04 100644 --- a/windows/security/identity-protection/credential-guard/credential-guard-manage.md +++ b/windows/security/identity-protection/credential-guard/credential-guard-manage.md @@ -152,16 +152,13 @@ To disable Windows Defender Credential Guard, you can use the following set of p 2. Delete the following registry settings: - HKEY\_LOCAL\_MACHINE\\System\\CurrentControlSet\\Control\\LSA\LsaCfgFlags - HKEY\_LOCAL\_MACHINE\\Software\\Policies\\Microsoft\\Windows\\DeviceGuard\\LsaCfgFlags -> [!NOTE] -> If you also wish to disable virtualization-based security delete the following registry settings: -```syntax -HKEY\_LOCAL\_MACHINE\\Software\\Policies\\Microsoft\\Windows\\DeviceGuard\\EnableVirtualizationBasedSecurity -HKEY\_LOCAL\_MACHINE\\Software\\Policies\\Microsoft\\Windows\\DeviceGuard\\RequirePlatformSecurityFeatures -``` +3. If you also wish to disable virtualization-based security delete the following registry settings: + - HKEY\_LOCAL\_MACHINE\\Software\\Policies\\Microsoft\\Windows\\DeviceGuard\\EnableVirtualizationBasedSecurity + - HKEY\_LOCAL\_MACHINE\\Software\\Policies\\Microsoft\\Windows\\DeviceGuard\\RequirePlatformSecurityFeatures > [!IMPORTANT] > If you manually remove these registry settings, make sure to delete them all. If you don't remove them all, the device might go into BitLocker recovery. -3. Delete the Windows Defender Credential Guard EFI variables by using bcdedit. From an elevated command prompt, type the following commands: +4. Delete the Windows Defender Credential Guard EFI variables by using bcdedit. From an elevated command prompt, type the following commands: ``` syntax mountvol X: /s @@ -174,16 +171,15 @@ HKEY\_LOCAL\_MACHINE\\Software\\Policies\\Microsoft\\Windows\\DeviceGuard\\Requi mountvol X: /d ``` -2. Restart the PC. -3. Accept the prompt to disable Windows Defender Credential Guard. -4. Alternatively, you can disable the virtualization-based security features to turn off Windows Defender Credential Guard. +5. Restart the PC. +6. Accept the prompt to disable Windows Defender Credential Guard. +7. Alternatively, you can disable the virtualization-based security features to turn off Windows Defender Credential Guard. > [!NOTE] > The PC must have one-time access to a domain controller to decrypt content, such as files that were encrypted with EFS. If you want to turn off both Windows Defender Credential Guard and virtualization-based security, run the following bcdedit commands after turning off all virtualization-based security Group Policy and registry settings: -```syntax -bcdedit /set {0cb3b571-2f2e-4343-a879-d86a476d7215} loadoptions DISABLE-LSA-ISO,DISABLE-VBS -bcdedit /set vsmlaunchtype off -``` + + bcdedit /set {0cb3b571-2f2e-4343-a879-d86a476d7215} loadoptions DISABLE-LSA-ISO,DISABLE-VBS + bcdedit /set vsmlaunchtype off > [!NOTE] > Credential Guard and Device Guard are not currently supported when using Azure IaaS VMs. These options will be made available with future Gen 2 VMs. From 9eab9e5e2868ede66accadbb88059bd3ffe9dc8f Mon Sep 17 00:00:00 2001 From: Brian Lich Date: Mon, 8 Apr 2019 08:27:05 -0700 Subject: [PATCH 125/724] new build 4/8/2019 8:27 AM --- ...l-windows-diagnostic-events-and-fields-1903.md | 15 +++++++-------- 1 file changed, 7 insertions(+), 8 deletions(-) diff --git a/windows/privacy/basic-level-windows-diagnostic-events-and-fields-1903.md b/windows/privacy/basic-level-windows-diagnostic-events-and-fields-1903.md index 451bee2d3f..92e4aa33bf 100644 --- a/windows/privacy/basic-level-windows-diagnostic-events-and-fields-1903.md +++ b/windows/privacy/basic-level-windows-diagnostic-events-and-fields-1903.md @@ -13,7 +13,7 @@ manager: dansimp ms.collection: M365-security-compliance ms.topic: article audience: ITPro -ms.date: 04/05/2019 +ms.date: 04/07/2019 --- @@ -2769,7 +2769,7 @@ The following fields are available: - **ProblemStatus** The status of the device after the driver installation. - **SecondaryDevice** Indicates whether the device is a secondary device. - **ServiceName** The service name of the driver. -- **SetupMode** Indicates whether the driver installation took place before the initial installation of the device was completed. +- **SetupMode** Indicates whether the driver installation took place before the Out Of Box Experience (OOBE) was completed. - **StartTime** The time when the installation started. - **SubmissionId** The driver submission identifier assigned by the Windows Hardware Development Center. - **UpperFilters** The list of upper filter drivers. @@ -2789,8 +2789,8 @@ The following fields are available: - **InstallFlags** The driver installation flags. - **RebootRequired** Indicates whether a reboot is required after the installation. - **RollbackPossible** Indicates whether this driver can be rolled back. -- **WuTargetedHardwareId** No content is currently available. -- **WuUntargetedHardwareId** No content is currently available. +- **WuTargetedHardwareId** Indicates that the driver was installed because the device hardware ID was targeted by the Windows Update. +- **WuUntargetedHardwareId** Indicates that the driver was installed because Windows Update performed a generic driver update for all devices of that hardware class. ### Microsoft.Windows.DriverInstall.NewDevInstallDeviceStart @@ -3956,7 +3956,7 @@ The following fields are available: - **LastCompatibleId** The ID in the hardware ID list that provides the least specific device description. - **Legacy** Indicates whether the driver is a legacy driver. - **NeedReboot** Indicates whether the driver requires a reboot. -- **SetupMode** Indicates whether the device configuration occurred during the initial installation of the device. +- **SetupMode** Indicates whether the device configuration occurred during the Out Of Box Experience (OOBE). - **StatusCode** The NTSTATUS of device configuration operation. @@ -4181,7 +4181,7 @@ The following fields are available: ### Microsoft.Windows.PBR.EnteredOOBE -This event is sent when the initial installation of the device starts after completion of the push-button reset operation. +This event is sent when the push-button reset (PRB) process enters the Out Of Box Experience (OOBE). The following fields are available: @@ -4644,7 +4644,7 @@ The following fields are available: ### Microsoft.Windows.PBR.PhaseStarted -No content is currently available. +This event is sent when a phase of the push-button reset (PBR) operation starts. The following fields are available: @@ -5620,7 +5620,6 @@ The following fields are available: - **DriverFirmwarePolicy** The optional version update policy value. - **DriverFirmwareStatus** The firmware status reported by the device hardware key. - **DriverFirmwareVersion** The firmware version reported by the device hardware key. -- **FirmareLastAttemptVersion** No content is currently available. - **FirmwareId** The UEFI (Unified Extensible Firmware Interface) identifier. - **FirmwareLastAttemptStatus** The reported status of the most recent firmware installation attempt, as reported by the EFI System Resource Table (ESRT). - **FirmwareLastAttemptVersion** The version of the most recent attempted firmware installation, as reported by the EFI System Resource Table (ESRT). From dd585ea017d4d5a4c42b374594b816babf4754ba Mon Sep 17 00:00:00 2001 From: Brian Lich Date: Mon, 8 Apr 2019 08:27:15 -0700 Subject: [PATCH 126/724] new build 4/8/2019 8:27 AM --- .../basic-level-windows-diagnostic-events-and-fields-1703.md | 2 +- .../basic-level-windows-diagnostic-events-and-fields-1709.md | 2 +- .../basic-level-windows-diagnostic-events-and-fields-1803.md | 2 +- 3 files changed, 3 insertions(+), 3 deletions(-) diff --git a/windows/privacy/basic-level-windows-diagnostic-events-and-fields-1703.md b/windows/privacy/basic-level-windows-diagnostic-events-and-fields-1703.md index 68fa2f43f7..98a6fb916a 100644 --- a/windows/privacy/basic-level-windows-diagnostic-events-and-fields-1703.md +++ b/windows/privacy/basic-level-windows-diagnostic-events-and-fields-1703.md @@ -13,7 +13,7 @@ manager: dansimp ms.collection: M365-security-compliance ms.topic: article audience: ITPro -ms.date: 04/05/2019 +ms.date: 04/07/2019 --- diff --git a/windows/privacy/basic-level-windows-diagnostic-events-and-fields-1709.md b/windows/privacy/basic-level-windows-diagnostic-events-and-fields-1709.md index 535e3032d6..ccd32531ba 100644 --- a/windows/privacy/basic-level-windows-diagnostic-events-and-fields-1709.md +++ b/windows/privacy/basic-level-windows-diagnostic-events-and-fields-1709.md @@ -13,7 +13,7 @@ manager: dansimp ms.collection: M365-security-compliance ms.topic: article audience: ITPro -ms.date: 04/05/2019 +ms.date: 04/07/2019 --- diff --git a/windows/privacy/basic-level-windows-diagnostic-events-and-fields-1803.md b/windows/privacy/basic-level-windows-diagnostic-events-and-fields-1803.md index 880d63e219..e0f05d671e 100644 --- a/windows/privacy/basic-level-windows-diagnostic-events-and-fields-1803.md +++ b/windows/privacy/basic-level-windows-diagnostic-events-and-fields-1803.md @@ -13,7 +13,7 @@ manager: dansimp ms.collection: M365-security-compliance ms.topic: article audience: ITPro -ms.date: 04/05/2019 +ms.date: 04/07/2019 --- From cb62bd8a7f39966e10068a696fa0445cf1fe4792 Mon Sep 17 00:00:00 2001 From: Jeanie Decker Date: Mon, 8 Apr 2019 08:53:16 -0700 Subject: [PATCH 127/724] remove ms.date from new/updated topics for 19H1 --- windows/configuration/wcd/wcd-cellular.md | 1 - windows/configuration/wcd/wcd-changes.md | 1 - windows/configuration/wcd/wcd-deviceupdatecenter.md | 1 - windows/configuration/wcd/wcd-oobe.md | 1 - windows/configuration/wcd/wcd-policies.md | 1 - windows/configuration/wcd/wcd-privacy.md | 1 - windows/configuration/wcd/wcd-storaged3inmodernstandby.md | 1 - windows/configuration/wcd/wcd-time.md | 1 - windows/configuration/wcd/wcd-wlan.md | 1 - 9 files changed, 9 deletions(-) diff --git a/windows/configuration/wcd/wcd-cellular.md b/windows/configuration/wcd/wcd-cellular.md index 9c292c9e3d..fdee985945 100644 --- a/windows/configuration/wcd/wcd-cellular.md +++ b/windows/configuration/wcd/wcd-cellular.md @@ -8,7 +8,6 @@ author: jdeckerMS ms.localizationpriority: medium ms.author: jdecker ms.topic: article -ms.date: 05/21/2019 --- # Cellular (Windows Configuration Designer reference) diff --git a/windows/configuration/wcd/wcd-changes.md b/windows/configuration/wcd/wcd-changes.md index 571f137000..684114268a 100644 --- a/windows/configuration/wcd/wcd-changes.md +++ b/windows/configuration/wcd/wcd-changes.md @@ -8,7 +8,6 @@ author: jdeckerMS ms.localizationpriority: medium ms.author: jdecker ms.topic: article -ms.date: 05/21/2019 --- # Changes to settings in Windows Configuration Designer diff --git a/windows/configuration/wcd/wcd-deviceupdatecenter.md b/windows/configuration/wcd/wcd-deviceupdatecenter.md index 09f2af4d12..e8431b2555 100644 --- a/windows/configuration/wcd/wcd-deviceupdatecenter.md +++ b/windows/configuration/wcd/wcd-deviceupdatecenter.md @@ -8,7 +8,6 @@ author: jdeckerMS ms.localizationpriority: medium ms.author: jdecker ms.topic: article -ms.date: 05/21/2019 --- # DeviceUpdateCenter (Windows Configuration Designer reference) diff --git a/windows/configuration/wcd/wcd-oobe.md b/windows/configuration/wcd/wcd-oobe.md index 31af250386..f36cfa5e0f 100644 --- a/windows/configuration/wcd/wcd-oobe.md +++ b/windows/configuration/wcd/wcd-oobe.md @@ -8,7 +8,6 @@ author: jdeckerMS ms.localizationpriority: medium ms.author: jdecker ms.topic: article -ms.date: 05/21/2019 --- # OOBE (Windows Configuration Designer reference) diff --git a/windows/configuration/wcd/wcd-policies.md b/windows/configuration/wcd/wcd-policies.md index a2098f93b8..e1c039a10c 100644 --- a/windows/configuration/wcd/wcd-policies.md +++ b/windows/configuration/wcd/wcd-policies.md @@ -8,7 +8,6 @@ author: jdeckerMS ms.localizationpriority: medium ms.author: jdecker ms.topic: article -ms.date: 05/21/2019 --- # Policies (Windows Configuration Designer reference) diff --git a/windows/configuration/wcd/wcd-privacy.md b/windows/configuration/wcd/wcd-privacy.md index ad2a699688..1e754ef32f 100644 --- a/windows/configuration/wcd/wcd-privacy.md +++ b/windows/configuration/wcd/wcd-privacy.md @@ -8,7 +8,6 @@ author: jdeckerMS ms.localizationpriority: medium ms.author: jdecker ms.topic: article -ms.date: 05/21/2019 --- # Privacy (Windows Configuration Designer reference) diff --git a/windows/configuration/wcd/wcd-storaged3inmodernstandby.md b/windows/configuration/wcd/wcd-storaged3inmodernstandby.md index a866ee0dab..64f3ae3dc7 100644 --- a/windows/configuration/wcd/wcd-storaged3inmodernstandby.md +++ b/windows/configuration/wcd/wcd-storaged3inmodernstandby.md @@ -8,7 +8,6 @@ author: jdeckerMS ms.localizationpriority: medium ms.author: jdecker ms.topic: article -ms.date: 09/06/2017 --- # StorageD3InModernStandby (Windows Configuration Designer reference) diff --git a/windows/configuration/wcd/wcd-time.md b/windows/configuration/wcd/wcd-time.md index b81a6d8f1c..c0ff2212ce 100644 --- a/windows/configuration/wcd/wcd-time.md +++ b/windows/configuration/wcd/wcd-time.md @@ -8,7 +8,6 @@ author: jdeckerMS ms.localizationpriority: medium ms.author: jdecker ms.topic: article -ms.date: 05/21/2019 --- # Time diff --git a/windows/configuration/wcd/wcd-wlan.md b/windows/configuration/wcd/wcd-wlan.md index 1064831115..141a45bb7f 100644 --- a/windows/configuration/wcd/wcd-wlan.md +++ b/windows/configuration/wcd/wcd-wlan.md @@ -8,7 +8,6 @@ author: jdeckerMS ms.localizationpriority: medium ms.author: jdecker ms.topic: article -ms.date: 10/02/2018 --- # WLAN (reference) From a68ff2a38a744ea04a9972bbc4d22e9d4ff3be80 Mon Sep 17 00:00:00 2001 From: Liza Poggemeyer Date: Mon, 8 Apr 2019 16:04:57 +0000 Subject: [PATCH 128/724] Merged PR 15135: Edge launch --- browsers/edge/docfx.json | 4 +- browsers/edge/microsoft-edge-faq.md | 98 +++-------- devices/surface-hub/TOC.md | 4 + .../surface-hub/change-history-surface-hub.md | 10 +- .../surface-hub/device-reset-surface-hub.md | 2 +- devices/surface-hub/images/35mm.png | Bin 0 -> 1138 bytes devices/surface-hub/images/analog.png | Bin 0 -> 1104 bytes devices/surface-hub/images/caution.PNG | Bin 0 -> 2331 bytes devices/surface-hub/images/dport.png | Bin 0 -> 609 bytes devices/surface-hub/images/dportio.png | Bin 0 -> 1222 bytes devices/surface-hub/images/dportout.png | Bin 0 -> 374 bytes devices/surface-hub/images/hdmi.png | Bin 0 -> 1324 bytes devices/surface-hub/images/iec.png | Bin 0 -> 434 bytes devices/surface-hub/images/key-55.png | Bin 0 -> 1516 bytes .../images/replacement-port-55.PNG | Bin 0 -> 43578 bytes .../images/replacement-port-84.PNG | Bin 0 -> 52031 bytes devices/surface-hub/images/rj11.png | Bin 0 -> 1499 bytes devices/surface-hub/images/rj45.png | Bin 0 -> 1041 bytes devices/surface-hub/images/sh-55-bottom.png | Bin 0 -> 25149 bytes .../surface-hub/images/sh-55-clearance.png | Bin 0 -> 19076 bytes devices/surface-hub/images/sh-55-front.png | Bin 0 -> 16796 bytes .../surface-hub/images/sh-55-hand-rear.png | Bin 0 -> 17531 bytes devices/surface-hub/images/sh-55-hand.png | Bin 0 -> 28506 bytes devices/surface-hub/images/sh-55-rear.png | Bin 0 -> 20653 bytes devices/surface-hub/images/sh-55-top.png | Bin 0 -> 17654 bytes devices/surface-hub/images/sh-84-bottom.png | Bin 0 -> 74514 bytes .../surface-hub/images/sh-84-clearance.png | Bin 0 -> 14090 bytes devices/surface-hub/images/sh-84-front.png | Bin 0 -> 21697 bytes devices/surface-hub/images/sh-84-hand-top.png | Bin 0 -> 17780 bytes devices/surface-hub/images/sh-84-hand.png | Bin 0 -> 14288 bytes devices/surface-hub/images/sh-84-rear.png | Bin 0 -> 46378 bytes devices/surface-hub/images/sh-84-side.png | Bin 0 -> 5139 bytes devices/surface-hub/images/sh-84-top.png | Bin 0 -> 20000 bytes devices/surface-hub/images/sh-84-wall.png | Bin 0 -> 23028 bytes devices/surface-hub/images/ssd-click.PNG | Bin 0 -> 25222 bytes devices/surface-hub/images/ssd-lift-door.PNG | Bin 0 -> 58267 bytes devices/surface-hub/images/ssd-location.PNG | Bin 0 -> 31147 bytes devices/surface-hub/images/ssd-lock-tab.PNG | Bin 0 -> 45795 bytes devices/surface-hub/images/ssd-pull-tab.PNG | Bin 0 -> 49119 bytes devices/surface-hub/images/switch.png | Bin 0 -> 873 bytes devices/surface-hub/images/usb.png | Bin 0 -> 1064 bytes devices/surface-hub/images/vga.png | Bin 0 -> 641 bytes ...$rface-hub-site-readiness-guide-en-us.docx | Bin 0 -> 162 bytes devices/surface-hub/index.md | 2 +- devices/surface-hub/manage-surface-hub.md | 1 + ...sically-install-your-surface-hub-device.md | 2 +- devices/surface-hub/surface-hub-downloads.md | 4 +- .../surface-hub/surface-hub-recovery-tool.md | 5 +- .../surface-hub-site-readiness-guide.md | 135 +++++++++++++++ .../surface-hub-ssd-replacement.md | 52 ++++++ .../surface-hub/surface-hub-technical-55.md | 151 +++++++++++++++++ .../surface-hub/surface-hub-technical-84.md | 157 ++++++++++++++++++ devices/surface-hub/surface-hub.yml | 2 +- ...-as-part-of-a-windows-deploymentmbam-25.md | 4 +- .../microsoft-store-for-business-overview.md | 2 +- .../remove-provisioned-apps-during-update.md | 15 +- .../client-management/mdm/policy-csp-start.md | 14 ++ .../mdm/policy-csp-storage.md | 4 +- windows/client-management/mdm/vpnv2-csp.md | 6 +- windows/deployment/deploy-m365.md | 2 +- .../deploy-a-windows-10-image-using-mdt.md | 2 +- .../windows-10-enterprise-faq-itpro.md | 4 +- .../deployment/update/windows-as-a-service.md | 1 + windows/deployment/upgrade/log-files.md | 2 +- .../windows-autopilot/existing-devices.md | 4 +- .../windows-autopilot-requirements.md | 28 +++- .../create-wip-policy-using-sccm.md | 13 +- .../attack-surface-reduction-exploit-guard.md | 7 +- .../enable-attack-surface-reduction.md | 3 +- 69 files changed, 618 insertions(+), 122 deletions(-) create mode 100644 devices/surface-hub/images/35mm.png create mode 100644 devices/surface-hub/images/analog.png create mode 100644 devices/surface-hub/images/caution.PNG create mode 100644 devices/surface-hub/images/dport.png create mode 100644 devices/surface-hub/images/dportio.png create mode 100644 devices/surface-hub/images/dportout.png create mode 100644 devices/surface-hub/images/hdmi.png create mode 100644 devices/surface-hub/images/iec.png create mode 100644 devices/surface-hub/images/key-55.png create mode 100644 devices/surface-hub/images/replacement-port-55.PNG create mode 100644 devices/surface-hub/images/replacement-port-84.PNG create mode 100644 devices/surface-hub/images/rj11.png create mode 100644 devices/surface-hub/images/rj45.png create mode 100644 devices/surface-hub/images/sh-55-bottom.png create mode 100644 devices/surface-hub/images/sh-55-clearance.png create mode 100644 devices/surface-hub/images/sh-55-front.png create mode 100644 devices/surface-hub/images/sh-55-hand-rear.png create mode 100644 devices/surface-hub/images/sh-55-hand.png create mode 100644 devices/surface-hub/images/sh-55-rear.png create mode 100644 devices/surface-hub/images/sh-55-top.png create mode 100644 devices/surface-hub/images/sh-84-bottom.png create mode 100644 devices/surface-hub/images/sh-84-clearance.png create mode 100644 devices/surface-hub/images/sh-84-front.png create mode 100644 devices/surface-hub/images/sh-84-hand-top.png create mode 100644 devices/surface-hub/images/sh-84-hand.png create mode 100644 devices/surface-hub/images/sh-84-rear.png create mode 100644 devices/surface-hub/images/sh-84-side.png create mode 100644 devices/surface-hub/images/sh-84-top.png create mode 100644 devices/surface-hub/images/sh-84-wall.png create mode 100644 devices/surface-hub/images/ssd-click.PNG create mode 100644 devices/surface-hub/images/ssd-lift-door.PNG create mode 100644 devices/surface-hub/images/ssd-location.PNG create mode 100644 devices/surface-hub/images/ssd-lock-tab.PNG create mode 100644 devices/surface-hub/images/ssd-pull-tab.PNG create mode 100644 devices/surface-hub/images/switch.png create mode 100644 devices/surface-hub/images/usb.png create mode 100644 devices/surface-hub/images/vga.png create mode 100644 devices/surface-hub/images/~$rface-hub-site-readiness-guide-en-us.docx create mode 100644 devices/surface-hub/surface-hub-site-readiness-guide.md create mode 100644 devices/surface-hub/surface-hub-ssd-replacement.md create mode 100644 devices/surface-hub/surface-hub-technical-55.md create mode 100644 devices/surface-hub/surface-hub-technical-84.md diff --git a/browsers/edge/docfx.json b/browsers/edge/docfx.json index c0761e7192..58807f7d8a 100644 --- a/browsers/edge/docfx.json +++ b/browsers/edge/docfx.json @@ -19,9 +19,7 @@ "ROBOTS": "INDEX, FOLLOW", "ms.technology": "microsoft-edge", "ms.topic": "article", - "ms.author": "shortpatti", - "ms.date": "04/05/2017", - "feedback_system": "GitHub", + "feedback_system": "GitHub", "feedback_github_repo": "MicrosoftDocs/windows-itpro-docs", "feedback_product_url": "https://support.microsoft.com/help/4021566/windows-10-send-feedback-to-microsoft-with-feedback-hub-app", "_op_documentIdPathDepotMapping": { diff --git a/browsers/edge/microsoft-edge-faq.md b/browsers/edge/microsoft-edge-faq.md index f989f0e5c8..e3a128b0ac 100644 --- a/browsers/edge/microsoft-edge-faq.md +++ b/browsers/edge/microsoft-edge-faq.md @@ -1,96 +1,52 @@ --- title: Microsoft Edge - Frequently Asked Questions (FAQs) for IT Pros description: Answers to frequently asked questions about Microsoft Edge features, integration, support, and potential problems. -author: shortpatti -ms.author: pashort +author: lizap +ms.author: elizapo ms.prod: edge -ms.topic: reference +ms.topic: article ms.mktglfcycl: general ms.sitesec: library ms.localizationpriority: medium -ms.date: 11/05/2018 --- # Frequently Asked Questions (FAQs) for IT Pros >Applies to: Microsoft Edge on Windows 10 and Windows 10 Mobile -**Q: Why is the Sync settings option under Settings \> Accounts \> Sync your settings permanently disabled? +## How can I get the next major version of Microsoft Edge, based on Chromium? +In December 2018, Microsoft [announced](https://blogs.windows.com/windowsexperience/2018/12/06/microsoft-edge-making-the-web-better-through-more-open-source-collaboration/#8jv53blDvL6TIKuS.97) our intention to adopt the Chromium open source project in the development of Microsoft Edge on the desktop, to create better web compatibility for our customers and less fragmentation of the web for all web developers. You can get more information at the [Microsoft Edge Insiders site](https://www.microsoftedgeinsider.com/). -**A:** In the Windows 10 Anniversary Update, domain-joined users who connected their Microsoft Account (MSA) could roam settings and data between Windows devices. A group policy to prevent users from connecting their MSAs exists, but this setting also prevents users from easily accessing their personal Microsoft services. Enterprises can still enable Enterprise State Roaming with Azure Active Directory. +## What’s the difference between Microsoft Edge and Internet Explorer 11? How do I know which one to use? +Microsoft Edge is the default browser for all Windows 10 devices. It’s built to be highly compatible with the modern web. For some enterprise web apps and a small set of sites that were built to work with older technologies like ActiveX, [you can use Enterprise Mode](emie-to-improve-compatibility.md) to automatically send users to Internet Explorer 11. ->In a nutshell, any fresh install of Windows 10 Creators Update or higher does not support funtionality if it's under an Active Directory, but works for Azure Active Directory. +For more information on how Internet Explorer and Microsoft Edge work together to support your legacy web apps, while still defaulting to the higher security and modern experiences enabled by Microsoft Edge, see [Legacy apps in the enterprise](https://blogs.windows.com/msedgedev/2017/04/07/legacy-web-apps-enterprise/#RAbtRvJSYFaKu2BI.97). -**Q: What is the size of the local storage for Microsoft Edge overall and per domain?** +## Does Microsoft Edge work with Enterprise Mode? +[Enterprise Mode](https://docs.microsoft.com/internet-explorer/ie11-deploy-guide/enterprise-mode-overview-for-ie11) helps you run many legacy web applications with better backward compatibility. You can configure both Microsoft Edge and Internet Explorer to use the same Enterprise Mode Site List, switching seamlessly between browsers to support both modern and legacy web apps. -**A:** The limits are 5MB per subdomain, 10MB per domain, and 50MB total. +## How do I customize Microsoft Edge and related settings for my organization? +You can use Group Policy or Microsoft Intune to manage settings related to Microsoft Edge, such as security settings, folder redirection, and preferences. See [Group Policy and Mobile Device Management (MDM) settings for Microsoft Edge](/group-policies/index.md) for a list of policies currently available for Microsoft Edge and configuration information. Note that the preview release of Chromium-based Microsoft Edge might not include management policies or other enterprise functionality; our focus during the preview is modern browser fundamentals. -**Q: What is the difference between Microsoft Edge and Internet Explorer 11? How do I know which one to use?** +## Is Adobe Flash supported in Microsoft Edge? +Adobe Flash is currently supported as a built-in feature of Microsoft Edge on PCs running Windows 10. In July 2017, Adobe announced that Flash support will end after 2020. With this change to Adobe support, we’ve started to phase Flash out of Microsoft Edge by adding the [Configure the Adobe Flash Click-to-Run setting group policy](/available-policies.md#configure-the-adobe-flash-click-to-run-setting) - this lets you control which websites can run Adobe Flash content. -**A:** Microsoft Edge is the default browser for all Windows 10 devices. It is built to be highly compatible with the modern web. For some enterprise web apps and a small set of sites on the web that were built to work with older technologies like ActiveX, [you can use Enterprise Mode](https://docs.microsoft.com/microsoft-edge/deploy/emie-to-improve-compatibility) to automatically send users to Internet Explorer 11 for those sites. +To learn more about Microsoft’s plan for phasing Flash out of Microsoft Edge and Internet Explorer, see [The End of an Era — Next Steps for Adobe Flash](https://blogs.windows.com/msedgedev/2017/07/25/flash-on-windows-timeline/#3Bcc3QjRw0l7XsZ4.97) (blog article). -For more information on how Internet Explorer and Microsoft Edge can work together to support your legacy web apps, while still defaulting to the higher bar for security and modern experiences enabled by Microsoft Edge, see [Legacy apps in the enterprise](https://blogs.windows.com/msedgedev/2017/04/07/legacy-web-apps-enterprise/#RAbtRvJSYFaKu2BI.97). +## Does Microsoft Edge support ActiveX controls or BHOs like Silverlight or Java? +No. Microsoft Edge doesn’t support ActiveX controls and BHOs like Silverlight or Java. If you’re running web apps that use ActiveX controls, x-ua-compatible headers, or legacy document modes, you need to keep running them in IE11. IE11 offers additional security, manageability, performance, backward compatibility, and standards support. -**Q: Does Microsoft Edge work with Enterprise Mode?** +## How often will Microsoft Edge be updated? +In Windows 10, we’re delivering Windows as a service, updated on a cadence driven by quality and the availability of new features. Microsoft Edge security updates are released every two to four weeks, while bigger feature updates are included in the Windows 10 releases on a semi-annual cadence. -**A:** [Enterprise Mode](https://docs.microsoft.com/internet-explorer/ie11-deploy-guide/enterprise-mode-overview-for-ie11) offers better backward compatibility and enables customers to run many legacy web applications. Microsoft Edge and Internet Explorer can be configured to use the same Enterprise Mode Site List, switching seamlessly between browsers to support both modern and legacy web apps. +## How can I provide feedback on Microsoft Edge? +Microsoft Edge is an evergreen browser - we’ll continue to evolve both the web platform and the user interface with regular updates. To send feedback on user experience, or on broken or malicious sites, use the **Send Feedback** option under the ellipses icon (**...**) in the Microsoft Edge toolbar. +## Will Internet Explorer 11 continue to receive updates? +We’re committed to keeping Internet Explorer a supported, reliable, and safe browser. Internet Explorer is still a component of Windows and follows the support lifecycle of the OS on which it’s installed. For details, see [Lifecycle FAQ - Internet Explorer](https://support.microsoft.com/help/17454/). While we continue to support and update Internet Explorer, the latest features and platform updates will only be available in Microsoft Edge. -**Q: I have Windows 10, but I don’t seem to have Microsoft Edge. Why?** - -**A:** Long-Term Servicing Branch (LTSB) versions of Windows, including Windows Server 2016 and Windows Server 2019, don't include Microsoft Edge or many other Universal Windows Platform (UWP) apps. These apps and their services are frequently updated with new functionality and can't be supported on systems running LTSB operating systems. For customers who require the LTSB for specialized devices, we recommend using Internet Explorer 11. - -**Q: How do I get the latest Canary/Beta/Preview version of Microsoft Edge?** - -**A:** You can access the latest preview version of Microsoft Edge by updating to the latest Windows 10 preview via the [Windows Insider Program](https://insider.windows.com/). To run the preview version of Microsoft Edge on a stable version of Windows 10 (or any other OS), you can download a [Virtual Machine](https://developer.microsoft.com/microsoft-edge/tools/vms/windows/) that we provide or use the upcoming RemoteEdge service. - -**Q: How do I customize Microsoft Edge and related settings for my organization?** - -**A:** You can use Group Policy or Microsoft Intune to manage settings related to Microsoft Edge, such as security settings, folder redirection, and preferences. See [Group Policy and Mobile Device Management (MDM) settings for Microsoft Edge](https://docs.microsoft.com/microsoft-edge/deploy/group-policies/index) for a list of available policies for Microsoft Edge and configuration combinations. - -**Q: Is Adobe Flash supported in Microsoft Edge?** - -**A:** Currently, Adobe Flash is supported as a built-in feature of Microsoft Edge on devices running the desktop version of Windows 10. In July 2017, Adobe announced that Flash will no longer be supported after 2020. With Adobe no longer supporting Flash after 2020, Microsoft has started to phase out Flash from Microsoft Edge by adding the [Configure the Adobe Flash Click-to-Run setting](available-policies.md#configure-the-adobe-flash-click-to-run-setting) group policy giving you a way to control the list of websites that have permission to run Adobe Flash content. - - - -To learn more about Microsoft’s plan for phasing out Flash from Microsoft Edge and Internet Explorer, see [The End of an Era — Next Steps for Adobe Flash]( https://blogs.windows.com/msedgedev/2017/07/25/flash-on-windows-timeline/#3Bcc3QjRw0l7XsZ4.97) (blog article). - - -**Q: Does Microsoft Edge support ActiveX controls or BHOs like Silverlight or Java?** - -**A:** No. Microsoft Edge does not support ActiveX controls and BHOs such as Silverlight or Java. If you are running web apps that continue to use ActiveX controls, x-ua-compatible headers, or legacy document modes, you need to keep running them in IE11. IE11 offers additional security, manageability, performance, backward compatibility, and modern standards support. - - -**Q: How often will Microsoft Edge be updated?** - -**A:** In Windows 10, we are delivering Windows as a service, updated on a cadence driven by quality and the availability of new features. Microsoft Edge security updates are released every two to four weeks, and the bigger feature updates are currently pushed out with the Windows 10 releases on a semi-annual cadence. - -**Q: How can I provide feedback on Microsoft Edge?** - -**A:** Microsoft Edge is an evergreen browser and we will continue to evolve both the web platform and the user interface with regular updates. To send feedback on user experience, or on broken or malicious sites, you can use the **Send Feedback** option under the ellipses icon (**...**) in the Microsoft Edge toolbar. You can also provide feedback through the [Microsoft Edge Dev Twitter](https://twitter.com/MSEdgeDev) account. - -**Q: Will Internet Explorer 11 continue to receive updates?** - -**A:** We will continue to deliver security updates to Internet Explorer 11 through its supported lifespan. To ensure consistent behavior across Windows versions, we will evaluate Internet Explorer 11 bugs for servicing on a case by case basis. The latest features and platform updates will only be available in Microsoft Edge. - -**Q: I loaded a web page and Microsoft Edge sent me to Internet Explorer - what happened?** - -**A:** In some cases, Internet Explorer loads automatically for sites that still rely on legacy technologies such as ActiveX. For more information, read [Legacy web apps in the enterprise](https://blogs.windows.com/msedgedev/2017/04/07/legacy-web-apps-enterprise/#uHpbs94kAaVsU1qB.97). - -**Q: Why is Do Not Track (DNT) off by default in Microsoft Edge?** - -**A:** When Microsoft first set the Do Not Track setting to “On” by default in Internet Explorer 10, industry standards had not yet been established. We are now making this default change as the World Wide Web Consortium (W3C) formalizes industry standards to recommend that default settings allow customers to actively indicate whether they want to enable DNT. As a result, DNT will not be enabled by default in upcoming versions of Microsoft’s browsers, but we will provide customers with clear information on how to turn this feature on in the browser settings should you wish to do so. - -**Q: How do I find out what version of Microsoft Edge I have?** - -**A:** Open Microsoft Edge. In the upper right corner click the ellipses icon (**…**), and then click **Settings**. Look in the **About this app** section to find your version. - -**Q: What is Microsoft EdgeHTML?** - -**A:** Microsoft EdgeHTML is the new web rendering engine that powers the Microsoft Edge web browser and Windows 10 web app platform, and that helps web developers build and maintain a consistent site across all modern browsers. The Microsoft EdgeHTML engine also helps to defend against hacking through support for the W3C standard for [Content Security Policy (CSP)](https://developer.microsoft.com/microsoft-edge/platform/documentation/dev-guide/security/content-Security-Policy), which can help web developers defend their sites against cross-site scripting attacks, and support for the [HTTP Strict Transport Security (HSTS)](https://developer.microsoft.com/microsoft-edge/platform/documentation/dev-guide/security/HSTS/) security feature (IETF-standard compliant), which helps ensure that connections to important sites, such as to your bank, are always secured. - -**Q: Will Windows 7 or Windows 8.1 users get Microsoft Edge or the new Microsoft EdgeHTML rendering engine?** - -**A:** No. Microsoft Edge has been designed and built to showcase Windows 10 features like Cortana, and is built on top of the Universal Windows Platform. +## How do I find out what version of Microsoft Edge I have? +In the upper right corner of Microsoft Edge, click the ellipses icon (**...**), and then click **Settings**. Look in the **About Microsoft Edge** section to find your version. +## What is Microsoft EdgeHTML? +Microsoft EdgeHTML is the web rendering engine that powers the current Microsoft Edge web browser and Windows 10 web app platform. (As opposed to *Microsoft Edge, based on Chromium*.) diff --git a/devices/surface-hub/TOC.md b/devices/surface-hub/TOC.md index d24333f170..a264981b50 100644 --- a/devices/surface-hub/TOC.md +++ b/devices/surface-hub/TOC.md @@ -2,6 +2,7 @@ ## [What's new in Windows 10, version 1703 for Surface Hub?](surfacehub-whats-new-1703.md) ## [Differences between Surface Hub and Windows 10 Enterprise](differences-between-surface-hub-and-windows-10-enterprise.md) ## [Prepare your environment for Microsoft Surface Hub](prepare-your-environment-for-surface-hub.md) +### [Surface Hub Site Readiness Guide](surface-hub-site-readiness-guide.md) ### [Physically install Microsoft Surface Hub](physically-install-your-surface-hub-device.md) ### [Create and test a device account](create-and-test-a-device-account-surface-hub.md) #### [Online deployment](online-deployment-surface-hub-device-accounts.md) @@ -41,10 +42,13 @@ ### [Enable 802.1x wired authentication](enable-8021x-wired-authentication.md) ### [Using a room control system](use-room-control-system-with-surface-hub.md) ### [Using the Surface Hub Recovery Tool](surface-hub-recovery-tool.md) +### [Surface Hub SSD replacement](surface-hub-ssd-replacement.md) ## [PowerShell for Surface Hub](appendix-a-powershell-scripts-for-surface-hub.md) ## [How Surface Hub addresses Wi-Fi Direct security issues](surface-hub-wifi-direct.md) ## [Top support solutions for Surface Hub](support-solutions-surface-hub.md) ## [Troubleshoot Microsoft Surface Hub](troubleshoot-surface-hub.md) ## [Troubleshoot Miracast on Surface Hub](miracast-troubleshooting.md) ## [Useful downloads for Surface Hub administrators](surface-hub-downloads.md) +## [Technical information for 55” Microsoft Surface Hub](surface-hub-technical-55.md) +## [Technical information for 84” Microsoft Surface Hub ](surface-hub-technical-84.md) ## [Change history for Surface Hub](change-history-surface-hub.md) \ No newline at end of file diff --git a/devices/surface-hub/change-history-surface-hub.md b/devices/surface-hub/change-history-surface-hub.md index 836ff19136..10ae4ecd42 100644 --- a/devices/surface-hub/change-history-surface-hub.md +++ b/devices/surface-hub/change-history-surface-hub.md @@ -7,7 +7,6 @@ ms.sitesec: library author: jdeckerms ms.author: jdecker ms.topic: article -ms.date: 07/12/2018 ms.localizationpriority: medium --- @@ -15,6 +14,15 @@ ms.localizationpriority: medium This topic lists new and updated topics in the [Surface Hub Admin Guide]( surface-hub-administrators-guide.md). +## April 2019 + +New or changed topic | Description +--- | --- +[Surface Hub Site Readiness Guide](surface-hub-site-readiness-guide.md) | New; previously available for download only +[Technical information for 55” Microsoft Surface Hub](surface-hub-technical-55.md) | New; previously available for download and on [Surface Hub Tech Spec](https://support.microsoft.com/help/4483539/surface-hub-tech-spec) +[Technical information for 84” Microsoft Surface Hub ](surface-hub-technical-84.md) | New; previously available for download and on [Surface Hub Tech Spec](https://support.microsoft.com/help/4483539/surface-hub-tech-spec) +[Surface Hub SSD replacement](surface-hub-ssd-replacement.md) | New; previously available for download only + ## July 2018 New or changed topic | Description diff --git a/devices/surface-hub/device-reset-surface-hub.md b/devices/surface-hub/device-reset-surface-hub.md index 7fce01ab55..f562b84288 100644 --- a/devices/surface-hub/device-reset-surface-hub.md +++ b/devices/surface-hub/device-reset-surface-hub.md @@ -76,7 +76,7 @@ If the device account gets into an unstable state or the Admin account is runnin On rare occasions, a Surface Hub may encounter an error while cleaning up user and app data at the end of a session. When this happens, the device will automatically reboot and try again. But if this operation fails repeatedly, the device will be automatically locked to protect user data. To unlock it, you must reset or recover the device from [Windows RE](https://technet.microsoft.com/library/cc765966.aspx). -1. From the welcome screen, toggle the Surface Hub's power switch 3 times. Wait a few seconds between each toggle. See the [Surface Hub Site Readiness Guide (PDF)](https://download.microsoft.com/download/3/8/8/3883E991-DFDB-4E70-8D28-20B26045FC5B/Surface-Hub-Site-Readiness-Guide_EN.pdf) for help with locating the power switch. +1. From the welcome screen, toggle the Surface Hub's power switch 3 times. Wait a few seconds between each toggle. See the [Surface Hub Site Readiness Guide (PDF)](surface-hub-site-readiness-guide.md) for help with locating the power switch. 2. The device should automatically boot into Windows RE. 3. After the Surface Hub enters Windows RE, select **Recover from the cloud**. (Optionally, you can choose **Reset**, however **Recover from the cloud** is the recommended approach.) diff --git a/devices/surface-hub/images/35mm.png b/devices/surface-hub/images/35mm.png new file mode 100644 index 0000000000000000000000000000000000000000..7a414337b6f71d27b11fae75511ad4c03f9ea7c7 GIT binary patch literal 1138 zcmV-&1daQNP)Px#1ZP1_K>z@;j|==^1poj532;bRa{vGi!~g&e!~vBn4jTXf1P4h(K~z{r?U&0d zeNhz0FCx!E-p_$&7*Gs|i9bL}hDt<2N|G}2h%!*b$izFPl#!S)Vnh@nk_npvyyog^!r>CdX-``KArKOabno4PDX?%s1m6g%p;2_=J-iqk2;gHIL>+5T3Yipyh zurRV%EQXetm`FW6J#>G6&-Z>7(_+<2xV5##75pd)!XqOiDJm+8!o$OD#&dIXX?uH{ zb9|;HOo>HeEI(LZUuQ8=fV;apRaaNj;^HDNH|*~2jw?SqJ4>~-wdCdHrNjpZ2h-~6 zD(Cu>U{hkHQ1oYXbhI*Ya&j`QtgP_Z?(QyM^_ZWZr<9Zw<-W|!OuD?h6r=VrU0G04 zQlddPoCxnba%Hgmetv$O!^6Xac6N5yul`eNOmDENswzcnS67$tT7eks zc#LIbWzp5ul^C%CF;Z}6XQz^J2)^6>B=yzfY{u*%9x;kBX` zb9{VEK|w(rhqL(R=0;a2Fcgc!{^{w7o}Zt&64I8Jm&wP+hbPF-&u1TEWgL1oK0aO% z3+wCa6IpG^$;sguH#avrI5-eqTMWgbFR@W#V`DXjY9hIllM{u8hEhU80*i}_i&MeX9Y1jsOH%Pj>yA?6T#l^yF1)}9?(B9rIyzi*< z78VvNdGIC%Oo=rDM@&FK08fI-3=9m25o=|!qh4e@6UmRlW*o|TVlBcZ?{VnK6rGkJP? zYJ?aWTA-t&L)>lMl>baD*xcOYwvaC-dWO#&R9$|~0HZ!t<501Zv$Hdro13HF-d>GO zPfydu#f6CaIt~^4*$SD(;gyww)x!0BX87GkKLv~B7fDT_!4cMr9{>OV07*qoM6N<$ Ef|o%gssI20 literal 0 HcmV?d00001 diff --git a/devices/surface-hub/images/analog.png b/devices/surface-hub/images/analog.png new file mode 100644 index 0000000000000000000000000000000000000000..1f1666903bb3c0c53ecf9e78a7a24442835d8433 GIT binary patch literal 1104 zcmV-W1h4yvP)Px#1ZP1_K>z@;j|==^1poj532;bRa{vGi!~g&e!~vBn4jTXf1La9XK~zXf&6Y_h zc2O9|uW>=LKx{0C3>j96g%mp*g@uK+vXMlJ9ady2GbKW?l5r;si4fUQ6pB*jDdY2< z|KpzXo_pVW4d3Sbe)aU;^PFe8XL#;w{1=dokB<+Qx3@R`{SMf@zrUL!kN;0_EkNh` z`kEFO7inT*f+i;?S;oi5X=`iCwD?3O{%LaHSb*gG{G6(*t0^`%7KUCD7#K)-d3iKD zJ8OFU?(KnyBO*C4H8tg!I4&-ZA|oTc^u@)+TrkkL1JAnH5x$0DueznB#S%O-Gm{1e z255PCnJzCc>EPgi=H}*jb;85Lm0ea=7F}Fia147)c~0!BBmArd;LT;gpr9b?>guAG zmlvLMVsCGcw?X>k=H}A<{XNei=E=zkpCLK6BYX@4)d4J_T=vk=P@12gXFZTb>LPi3 ze58Vc0#!s^U7a~Y)Y#ZarKP3(toulipH~3X*4C;ZgM)*tbK5(KoV&ff13NJt3n z@9(p|xw)Bj?d|P6wj<`mtN?o(9UaZaX=!Qn^z_6ASRJ`SPUr>VHu(7Xa10~{NQ`lC za4@Z}ud_}E`MH3ZnHe^OjEs!%q+A*NezgiZsi~S0FuS|EEz;A|!;+AYz;RMiQfO#sh_5HcQc6ln_{?|} zFg7;E21!XtbaQjVlRz4R^73*^FgKCgppSK3LqmfZQ7Ztg6_0p>tE(%X)RTj%sw(pH z^CN$Me@8)Q3@>x|*6A6&F%gR>tuFVhWwm3ee?HF@|kzZOTCY{^St8zP?goVj{=D-hgT>+bH3^%9}~Ea3V1nUa%}*$^ig_ZsNe%nl0EKgDR*@Q27{#>-$F6%|E?hli}w z5p#wi1EBf97=rzlAdy@R9r)>8G$tlSB|APoW_?pr6YCZh7Iy8o*TknL~sECaSrgN_`=DA5HuWoy0O1l zk-r7`9Sg8metLRJ)6>)Z9q8-pqut$IOUsrA`L{S0AeZjDPce{J@w=sVgA4d~7{(vZ W2q~>));EU$0000Px#1ZP1_K>z@;j|==^1poj532;bRa{vGi!vFvd!vV){sAK>D2(U>+K~z{r%~ySJ z6y+J;+q=EXCC4Rqmp~Fe0wi$Bh0j=raSDZLp*C8j7H0~z)eh2@))uFZXj>pM(_yHN zNNW+)1V)8o=}?d_N2q{7EKn;Igph(j7)m6EN$&Q(_jdQ!-@8XbouTGB{NsD`WV3hg zKJV{&p5ODak|Zt17f1N#|6QhO!Y~Zznu%1xKvvTzDVT-{=-eQ#NK!IldtU37!DO>3 z%BRR0=aJUV^ZP^&OqO6w0YtO*=d%U|!$bRo$MYkMHlgdn8wTQulXzqI&#CiKTVZ@;ePvyDt07KE~cQeJX@BlLjP0zrf!QoGjpyl;OR8~0Pmi+kgG&kOE zT?j4RO)iP>rL9oryYd7hqLg#FP87PHhMv~&-qC0Ayf48RFs~%t|yO`2N;dqO)xwLG7OQy3_5#eD^@>$JN(58s>&s_of(7PcoFvQ8jC=I zgsN%9CWf>>*=G6c98W4=BQwa-Nh9J@cP%4af_AkWDX+F3d z5*9D3!rnbWY*;-O=i0{O;rXRd`2F1Z6*zoo3Bi!aOaO!4H4GNT&wvqxyn!kYFtkb& z))7!PiH}bI2`g6Ij#8(L2_YLcZErwnv4k>*j5}_Vap2G_l#)Z`0R=5BUq?sB4ia7v znMN@it&-J;hWxX>xV{DkLj?v?S!6~}Pdom+>pN(eScDS0gcsM8qUE(wa40soBn1Jl zj1y<3;;E%WQOx_syUVb@^+|H<66;QqI#?`uHk$~cur}n7^{)ZJ7<8-fNH!D4i4(8j z@ueYn$%|QEQ4qc|6g#$$f>J2K!O)cX?dS?mMf>T|sIRiYTO#A>XTE{9k6vZnVePTN zP}r}S215DgfDu3R|CqbcX+eqw?CO!aYcWVz(hU z+77j+0dche&#fEjoGBPyn(BE{G-y9fgJBQpbM$zWGiBhAJ3b zDlwbtkWih-#BDftHiU{Y8{2^$bG~ImB<4pVCP7WO@!H10D5iHNH56gno(B-=JLf)m4t!jRo|Mgr6=NgLmIsMKEH-5FK3@E6%)0m;^UC5O9M? zLy^wx&@AT{F7Cq0XGMXNQ9VM&@#8@bQ!+GFA|T<3YD}n;;h|@iJW)x$R3ICbp+{{< zMT@X==LnR0?Ffx7#Fp)i=VZxmMnpn7W=BjNj(Oj7Ai!*TepNYQkqQ_DV+ha1C3HpnSn!b7 zY7^goXgFFAFDG}x&{(@Nx@Ki--|7dW@gq`Bj0u?}foZ*HKf4}J{bm}9n936;C}=xB zihPh^Mr@QEn7CSq^KC)AzNs2lu6fxY3!z5}2*`mnJ=06>9DH{;Mv+&Q0SDG@xC7@| z2(wxiX|@WHEPbmVj2IWi9A|J|(e)^mevGZ#zKbc711M2sto~gwB1~CLb-?IVV9-07 zYDc7}9P3^ff(PeS;?1{85sNDXkvWFR>5Pr>!w>(6CzsWs#3|vc(~EK8axK)9gX!!*ChD?6kYWlSe7gpLL3Vf) zA4ZeNo#7fJ<1*3_A34Q+^i)DE!TYC1AXsfjsmG2LE2rS(nKuxp(fZB62;z#|H`#-( zh0ma6<6Q`jDL|Q5!sgADh{Sz}C32zBq6#xcWRnfMca*`$qUV;~s2n2W;=gN*#5F=Ekj^r*woo$y2D^GQl?v<7Qm zo&*oQJz-n`yZ^F~zjat(vTPOoV8qO!X`Sq{k74e-8WgeD3@WstKIForS_dYMrHE_2 z9piAPsmwX-d*=yEZt%d*2mI_SB}{7%MGV{jOFW-IZePV$nyYk1^adE~JxA}vKii(cD_dq@P4i^@p*e&X){n)yTalI^ zr55X&g@h>ecyWC#*0$8))y)m~*T;K!u4=v3^n=kd?4*K7;`Ks{!N{m=Oi`wM_pON@ zq4enqldxB*_ZmmpUe5U{%SevE;+3W!%ojtJ<3IW{Z87%-i&g*t002ovPDHLkV1mCF BUY7s> literal 0 HcmV?d00001 diff --git a/devices/surface-hub/images/dport.png b/devices/surface-hub/images/dport.png new file mode 100644 index 0000000000000000000000000000000000000000..2842f96ad499628bbe8e42acd0709dd56552dac8 GIT binary patch literal 609 zcmV-n0-pVeP)Px#1ZP1_K>z@;j|==^1poj532;bRa{vGi!vFvd!vV){sAK>D0rp8mK~zXf?NvQX z!%!6M`e>T3mv5XDbZ{sRf`f~QKR|Gmiim?CdFWRIpsYAycI3(}Bn{#sSyG?5qDpaU2HQ2VT19uMR9X@@&7>2Pat+K$zlJEO* z6h#Tc5Tt94>AuMM2W2h_>Pf3COw()zeh`znZQ3{7vQDf5+NODm{4;dvm|I+#lM;px z^a8HqmKpo8=XtTt^ko@V0){Q{NiIu)PVR*09*ny(lm*UVAqWCttZCY+3@d@$HXVg! zSXVMs2o!WUX3QCnAQI8F(P(T_tI62Vj4cr_AX<1qVtCOZD%z8BO8gl+i7{Gr@49YZ z&~f`@7zRQtM(pEvFHgsz+%L+ds&PN8*XxTyRDrRIVf;#g3?ZhxFCm8U8&$6hQ3b|~ zk!+#8Eu7~*5$kiRmZnAGE2CNOCH*{=Xh6;fr-JNWVHdDoz>NcvHDWw;d@3J(&+kCAiwAlz vC?s-}@jRi|MeaNPfDWWpg$fm>fm-bc4Gj$Tn2P;;00000NkvXXu0mjfbKL)@ literal 0 HcmV?d00001 diff --git a/devices/surface-hub/images/dportio.png b/devices/surface-hub/images/dportio.png new file mode 100644 index 0000000000000000000000000000000000000000..02bf145d60cfa37eedbdfa38e9e35a27ee1ea1c5 GIT binary patch literal 1222 zcmV;%1UdVOP)Px#1ZP1_K>z@;j|==^1poj532;bRa{vGi!~g&e!~vBn4jTXf1Y1c&K~z{r%~we% zcTp5Klp$inPNqUp5{Z%|3qzE(m0@M6C`l2LxhNTnSlO6onMv7MSt%)V$VxJt@B7{F zo#(#iz4srUzWnNR@4M&TbAIo3{OBjXzP_fty*;|Tyi`W)!)=0$mzNjX+S;P}`g)3v zjwYmaOiT>5w6xIC(Gk7AzA7`_gCRjghd&|r^?>t^jt)vlNFZNdUqMVS{{H@yn3zai zU0rl=aGQZ01X*$Z*R5l>FKG_LGTiJd3iKA zI4JDs0e|qT_x+8ap4ijV6OE6LQ$w~HL>?d_%h{(c%7 z8WN--_)KVdOnzp;80+P6c|Ovmudk2V+S;hQyPGa9E))h|FeLb!U`UWdj20n(etxE# zn;W{ly)~7)yF0qSzt=qL3$;GKoq-`i&I2Y`P*6Y-5fKy_8EGm}QBkU(9->W4OQYiA zVp?5YrN_rd#ky-SjUc}*S}wqLBq=G0mY0`>O;_MB2SE_USa!x`#i+dSvyslv&rfVR zh8zepm=cs1GC?D!&Is1X^>AuxO0lf7#K+V`}@iab2!{2fIfl?3k!;d zC@wBej2TH)Rh1f{tgI|C1{-XrwzgL2tl-ioW|0XdCnsxk_=Nl!5iO1qqKGk>U{O(# z_%*P?j}ininE<4xr$@}g{SnWy9@n=2N{}7PBsx1g#XLk(KQA{o_x}@=$w8Kumc+dE z^>xiWw1tI*4u7m%+9WK_Zj#c{QZ+&)B_(1EZSwGZ=}Djnz0o zUNNi)$`Te9CVr9_oPXS!!H^&p$plkUQZ&w-jUd+HIKydjc6O$$AW?dddrZz{g7TX| zPEJll!9}q}{#{*NsYVYE55*Y%JD^8-fvl{oi2qy}{Nikz`&O{rBrHa-(&-`3)30%4 k!<67}!QWK*&G7K}1JyMTCRiB3s{jB107*qoM6N<$f>+-#od5s; literal 0 HcmV?d00001 diff --git a/devices/surface-hub/images/dportout.png b/devices/surface-hub/images/dportout.png new file mode 100644 index 0000000000000000000000000000000000000000..4b6bb876636cb85c09ceef50398dcd17813377fd GIT binary patch literal 374 zcmV-+0g3*JP)Px#1ZP1_K>z@;j|==^1poj532;bRa{vGi!vFvd!vV){sAK>D0Sie)K~zXf?bJ_8 z0zn*y@uk3yLa#yJK_Cd;I)u_OL(jbk2@hSvH_$<(PC<0*D&Bnoy@n1}q$df%p6@tQ zy5gT@c00`jA8?jsez>a>g+if_PnQ_rF-6+1j;)O`&%g|2Z0rlV@eWrWdU%1p@i(+* z6Y2;Di;sVOLN`^-%D)^wpgk{ifw~yt(5!53u)E2(<-zB=K+n*+V^+2#g9|9_aEb}E z=e51ow`)0rY2U#oa2xs^HopNc-Jl?U)ROLMazTKcPx#1ZP1_K>z@;j|==^1poj532;bRa{vGi!~g&e!~vBn4jTXf1i?u}K~!i%?N~`K zG+h)ng^-YthcXH&T#A0?OUhH#|sZZSm5L1!^ZdbcRGF*vahQ#904(9 zx(j_AoWH%jDd%sN&rnzn!hvK$GYez|Ifgqh%a6FPudj5(yj_{24ES>_o;OpTgH;}7 zVG-cF;fa_(0j>uZ)mbRF0t7faI};ll8)AEVTWoD@(fQHQk;C9OH#cH)b5rc>>=5C* zySpo1US7oG<0FkBChN`+_B@Y+g99zoUtC{bi}m$&(%DuO$63N3*L!<=t7Z7C30Cmo z;i2vN*bcSQ!*q|WuC5l?f@LNrCsT2(Fg`wR@CyhCpqsL`wr0>A(bw0P$iD*v14Tte zh1lEM(=rM%Ha2GIqaRc0JTCuEPfr&uEiK~e>WcC_Jw1uk)Kohgu(Gm}bQz|Ft*WXr z1c;1`6nA%bnuQwri)8Na?~CQ-Wu@i{qoSg0tJf^&cQH3NmsTwH@%Z?7gI-ovM)Qzi zTG*PJ8bg4Xm>6+?f3I1np<1yZimNC-jhz5RsCS zLgX01!NE42;{*i-*>u<@BqWf=cATrdy`6Hwj`J{GDy$qlE-p?}%`rVaZI_gZZNLiH zzn-6;iFnZI+0)ZQapd_lH#d{7>Sh)d6_KADub`m7V3(GbW@mG9azZzSbguZPH{URv&&zLPxfRHXK>17hR{?+a<#_IbW2(OJgR%~CUMsRK`^&&@ zIldlxd%$#$Wn&JCqbh(S$Ud&d(1YX1)Xz~r&SQMkQ}ze-P>or^w6I>d2XA3L1aDzI ig#X$wFTNi>K7Rlj3$`l8pR@G<0000Px#1ZP1_K>z@;j|==^1poj532;bRa{vGi!vFvd!vV){sAK>D0Y^zhK~zXf?UX?) zML`&bXJKJsZ)u^d{1s)Pq?D4Col;VYQk0d&T_`J(jgZ1@|V=QMM>>Nazo zJ7M9i=ggVu`@VO+Ih_eVp?7$KOSrCtweH~q!Y!P@Tx1cJT4Js>W?>uLc({TYU(hn_ z!VVbl9n3M;8cB~nY-s^j!N4(SD|4-}-poRH@S%b29XqL{vp6;eH(*;j*U~{8yGLXP zgBYAfN=gP_j_6MqbRs2X4Mt!M&SBhz9=RsHGR8G?%vD)~N!X0|UQ)mKticp)fIAx0 zz*uw4RapaDb~i^b;X*;i7;8>C(&9&+2LJBSW|o&R#+sAV*I>^{B^}1GYcLPqMO!Wm zDQoyWRAX=f={D75A3Ux$m}`xsJ0H*B&tn(f<%37pP&AJJs%R#i~ z`qkU5HeT%?&%q~<+<#Vae;)@Opi6ElY z3_5I_AXOJV6z|OAZbUhm=rx}M_GZrW=>CoJkg!4qHRkthwuhx&7lJZZob^*DsI+uWUatCXe8EdU3(D42t0IV6zEz7$Z zw|%OcC5{VQ+&qdo@QSu5M%^%{L1VB5zn}$5%LL*eG5gnPbPCz)T_TYVk8n5lR==sZ8xI zOim9(n4A5rZZ`d*4yQ)57sSLGbme$TGjLQZzrM?xsDLeZt1Y+qs5KQO&_@aC7g5xe zN$=BF{YQj<=t z+zEVornlkF26Gz+Sz3KuRA7Kau2U+RRD6s{-$>!7NVCC8jlI&ghx%+C7sQ zMZOU1R`6L7mX=0NU`OkjN1e>lb`GW3doRh$X*%aS(NDFejz#s2lUqto*W3xs$n-|r z>gCPtJZ<3EFzO&i>PwvSjn4QBliz30QKi`&aX7z5+icncNX+?>z6b&^b6umSD+H7A z*=&9%?VQnE8LS2NyQd7lzl1AZZk){DRu?tNbIKh3Z z4N%auOGamup*1+?jP?K9}UiNoocZAMeIwNUMm1ln*LO_h^Qws0gS?x8&&V!4MG@1(cE=QX6Klc;K6J)=FwhAW%^RHOY(|_@2`Ffu0)(MAvxs2i)TH)dB>{>3Mip z>AAP@+5~xxNFAmseB| z-jsG$*Y6~G49m$aCM_oU2^tEPC|D=QTkoyLOB^Rk6rJKuj{?WCeuhvp2^v;9PyfWq z=$uk9@;?9iB<)TJm0I<4xXIZUXFusZLQyU8{rd@{FXt05^6v-0r5g}lbitor0j^v^ z!pRA>s)YK}T-?4F=uliu9&+pXMq(oT?FX`a;i*+Wjo7hN65eppmYh;qS3JgRBztU?k2%`q;QhDTc--V`r(RO`XT}*PNPOAImeKw@k!4@X;W%vr zhnVIMSL3wx5t*gGE~#cn4C-=2!gWlLWsNGhrATGEhl&Rc^!uI=|_5 zQ47b4vyb(X$th8XIMNdk>pAYyLLjabcvVV1ILQfHp5o2@{^>OxdxEwJa@T$K1I+W_ z0e-*!6uDP2_enMD9+Qzc?Nv$sydTToMr!{qtgoV`0h)f;z@hAS@oTD9W_e$CeP4Vg z7I?-G9Vap!0VW&+cTii&t1uo#?oU+zE(h}igY$s;g>nXXOA6H;%(x$|Rb=B%_9{kd z=3@;+rP3Ox9JKkMq8l|k-R^rM*4gIa(l^=tR*R|(E4{Lt#sW`|#dQC1)3{4bDGZL? zxb8tgJUQM7%%)_xnb8Hq$r*W$SW2%g&kPrtV;MB$KJGZq{CbOMV$|t`4{uk<_yHR$ ztNwV+i9PM|-#xvdVM|Q_Q&q1PtCm9;LpgkHh;14HpBkvX(8{b9Hug7PbxP`%+vy~9 ziuG7{VdjAMQl*#MgpWE@Ol+GP4Ydy_rGisV<@bhX9j4LNsYppkrbGG2%{5@N;u|P9 zJJ(6f14AZ($NW0{```>FV{bF405E8iLFbRNIoT=gQ=$AiMjpQnN{vzB?v7RSv4`?U z3%$TtlHw?XzT-#>Fg!Y#?or_B5w7I%Vv?JB0x$^d=5!+#Ou-hpzakOk43c40IJ7w2 ze#0I9poKHgA8HRCl{2THI&^4C@nib>F%ZmEWxyNPod1=MScnWkEe26=d@eIDjYQ>& zw=Tw8CERwXoPLe}5+>M=Kms#Vj702jzhz?&0#iif>(9Y%9`B_A-LwN<#3kJ=dvuVB2DKTUyW+xZ| zGsU3PFWBOSeo_l1#p>JU)L2Nl&b7J|`cxKg7~m6}>JD9HewFmzq0Us39J#&`0STxh z{w}b(!0$LcK>3F34oVkIt6S1ZRcTru5BfxUvCXrdF9kAr#k6rGV2>$hJop~0fLdd! zKe*Qo>DX<*&&o~%u0yyg?&fIB`){U{t`|1aNf*o?z6cYDy<+0O#YPA3Fgo#}H|1Wm zFX@Us2Dhh#aieewN2^gCs95*SsRqP|Wn7mF;R+##8+W|!C3fLv?mpRfrhgOfWCoBf zsQA7|Hn7t6yt&BTUl6dH`&|$G2ADvugsTZ$!NQxCJtm-kK%HX2GQCBl?GEb?h9y}W zJ%J}~9K(n{(77q%iVAAAK6gnL5oXAjIf+|Cke>#bj6xH^H6-@ir56r^g$MN+#oT=Lj}mPzsp$Ea&E4HD4MAZQCS) z&QCpOs2I+}d@1QGi+6UAE z#%!JEFAOtMplBE>=ey5+)o<&kAx2|As&I^KiO-X=inNUT1vF5Kcm3>G5^rjpoL4b! zN#n4*uBHUXt(NpmR*lmYCbF^lZ#MWmG$M^TRyz!ax2x_x(kp`y6@ZFl4bKUW46z#0 zhRmY_{wwB_>JC8)5P#H-QD%r7=1wm8EwGO4TB#;ai>s;F(kv%);b96ikB*2+lU_^` zv+J}evLS-x(MoKXdt%@>XEmwBlXqs)tw$c~F=RBv*Gqxw6lr18!)j@S9wPz|J52On zDkLcC7pA~Di^tC&fbYR6(f6-XqRkvp91K`ONG%^7y0u`l@^;j^dd{fZFvAk05wCrb3ts3sr6fI-)c6u+w_mjBVa$6p=l@KSqu$$}Uj1AcHz6Ur2Fog@PX0 zd0A@yZ5V1fzYd}4!AwwuUnPpH!;Qr3UIlgoF+`e~=o+S(N%sU%vEEj#_2{*ZtT4Pq zGn#N#g;`d?v@?(?(jMEB^sbV-kE_i$l4~vfHfp^l)9=d;UG1e123^9uzG0pqCJLg* z-19=y_dOrkfWrHvJnqH*O16T&0j0Jb{-a_D<`!yGy$SjzyG*-8O}j8^SCHJ0#n4HI z>1`d^xK%$Ztm>r1iKc$yYeL#)LMO5HhDKKhU)!U|2a-({jl(^(NJ^6IMe4tM4-qs< zhLpr%1c_!FnFbil)CUk_k4=L=!YoXn`~lDx zx*BgYNUCY`{{~-434;i`F`j?XFGpr+QE2~YY$^Kd{D>lHntp_nZ1W#>c(6MqQzeLO z?QOc*bqI#bK9nv)BDUmX@Xfufrf0lZ2{F`tua4Z-YITm5T3_UiLsjKlYzf_-;(C}^ zaa9Ua>nd3Ogc6<6c_DEhxKQLRPJ|N}c1UIec>}5}K35*Cb39kv@daFQOL2pm!uxtP z>D*p)rll>HZu~0MN`YA6LzV=IqUt zd<&&7ybV#^{pj^^sB2!UM|m#VU0%Vg<&y6)(nTCnhh7lYzgRUOfif|ol>T>}_QlG` ziNr@>;tZEc8Wb!jZaiU>G0s34Ecv~9e(qls@FWd=n~KQKBx9!Prn!_iz&V<&JzDmE zKhy?BT9RayBUH)QTgbM^LVMYY;?eNG4*;&Jtp+Y|)5q$FvpE-vOg8%+6}`a4)OzM~ zyF~u{&8x0aJVgKW@-jQPV{a|y*yg`Xeu6HCr}F9e%l;0j!K5O6*E35fao4DHG7m&w zGeilh?71MbJvt;9>$7fMYOZ^_kDcqD+Kp5^IlZ`+Gw*t6sJ{5$Rm9*? zC{l3L12&ddF*$l@2^|VQD1O=DM7_(|M*t(mk>rH`5-)Hm8IplV{qb3$-|*G2aFNp)0Pafe{yLXumz z_?Uf3rc=O9B7(5ghp#(YU)g;674|QmJsNNauWI3#_Bfm3xYnQ=uXU%`)?M&5ll@JVhx8rDfZo-&8g z*#51S)X(7x3zhDzX(}1V^islWwLJld2>E?=*^Od@QL~n0tmoLq=kihCvC^hkgY2$= zl6#{TSX{;j$w~2@*H<0-5iM7piuFd_OS($xarSkV0WH-(FAU~auYKGb^~06+)E#9X z@1;i5$t^{?FPW)ia7V}haBG|rAFZjOVV&w`EVDtP#xm*{C+F8sXHoH=NKWh=9q~FJ z3=sx2Pt|+0QH{h+{!*3L^XoL-yUHepyGs~uFE}yijRyU>i z4tB(_Lsun-oo7o=pjR_JhQ_$^O4f;pHIG46yS!S*@`8$!*8=f@8&Kiz!3_cxqc_55e%kM3pdt(t7ZXPbL02$EKkmWXVo^F!vf{lB-5s~Cnr`ljc{X0JY zmRhy0zXO3R`QbBl`pqNcKd#pu?c8X&cGs70$FHX14jV=5OXl#v0njm;U;sn%xwq%PSyh_Ey}H^h(@w z`~{+Ocnd*#5oS#Xlk@GY>`ZancsFY#XSQ`iEDRE+QPaUME7DQa-=1q#rEP%hDs4`% zv-Sy6+jgpJ(q@TvELq!={viI^Z?#He)U5znY_*MgNHH%5qS27rnsZhn$5j4?T;F+)l3<_vj0=p}-*=y^rwWo%=m}hu${<=g~=@6!DAXVnmoI{WcFfeiH{^^J& z5xi(8-i+H|;&Pm=;wgz551`sk)48Se2(=?^Q_EE3o*k;Xy-tT*yBrtLQi>qA88q@b zF71DmYeCBbXBw^O%_tgbFcO}+k{}H#WIX>JQZgmO^?u)({eq<8O1Sdt$j0if?ROCm zgInqS_~I-5U_a*-C&5$*ksvcPvlR4GP<`*K=1-!uX_hZSRa1PIa||cDm{R|RY{zQk z1ho+HDs<0VO|BV${%IdtJJ4?jQcHrm?ArU%77o8mfI?7ME5!;ThN#{PgKIv(CdKoL z+iej!nXwPk`7Ve>59S7|JU69i1^e1GLTT8NpmeOCptKwbN>9Z;=eixF7wueKqQYDT zbssf!O_x%Y$mR!^Sz#8uY<4Q&3eB0lRy2%jEAfU+MhG8}zYe+fA&ibWdZ)$Bv{$q^ z)0|bwk4503`O*1`QQMW$rYi;+K+Y6Mc5T0nUr2Q7j!RZNoQtX&r@HXBX*qs)HlT9^ zBk$>uS~4VxBXXaB)yS?t*)72DjX43y0_iylU_u~#*FOslPr9@u_tPCsSeWSzpW<2BkqS8SVmY5$_OvNTS4V?=aD>{W)R`ITA%YO>8`JAz(V^- zG*74%FTTdjeH}|wGMQ7Wxf%dD*kZykNtIr9jF`1bJih5r(k02bG^r5R2QY4l<&(ZE zhE_bu?$3Ul5Ld9Arw1*Bg1}?Gp|@w0T6*cfUB{#*7^!)!7Qo2(m(+p}&S*2J^Tfpu zy+EYLa(GV#x$pkg$v)!+*GhU6&iD>s#m-GR#7GXC2A4Lo+GSYA>Pdd!RJ;bMGJ~s9 zK)feJK$?}OKEs96jKdr;vAQqbl5&*iO94j93RTxgCu<>GxtQX&&~w!o;K%U5tEvLk z>w)jd;UX63YWtr;{;k`4e?pRf#mIlF2|sKe;gEwr0uX!@hwoBa4cmDdwm{Mr0w68B z;q<1%03(S7Qc{ZIhl=4BVOm^H?&OpAGd^;wXvxXg?T~F2Rgn35IFjp9X(&W6-`iuSae_{I%O?O5o0O%)=W>nymxVH;*>IrnRtA*~sTUiUBg{FE}e?0i{m+4!6 zdsfFNm&6J=eda#mg#r&%Js|}CU9c}OImR-i&Bl`Z5t2^8VswCl%5Aoqn0iLj8-gjU zxflVujMeAOD<8E*0K8*&M?<@R zLG50<$JAVuhI*Wlrydlw{NQg3G{DH%3uAm{L!?tUn5xO}0vL%50D!`Tc34&gj={dA zJ{|lek69H1{Gnc`pTk9a(-LrF&>PT24~!0lpFD!3503pA)e{^_(>BFcsTrWF2Y!j+ z&~{Yj4J6$fyAfw7ng=8Z1i)T(cz{4j;)rK5GjF(yt%fTK94K#f)c>vP@n^HqmLi~9 z4s{z3`7mSAT0ajq9gbH8usDe5&>O3FAac4A7dKl z{gl&n7D2wB(A|aPw zd)W|JK?UG*C{z&SDoQv70?{+L3^My=5M+$1Rd)nGo>b&NM$T(b?{=zhKzr?Mj*~J1 z`1mv|nWmBhEm>LXHyiC=iOJc$WItC#q9*02t%zK)d?)Zl^!D0a3E1rtv@x1*{vn<{P zWQ+|iupf|6>id=Hk44y#oh~c`4pqM;54le<92cfOnV96>LKkd|v)6lHB~{?_8y9AGqWIQ&-Mem9an zoYRcbNIlHYi`YMU#ROk;v)sxlCL`XAFo0yHc#ndRaN`NO19Afe4q3;dQi5nlCavVS zR3QB@&vdxl@@My*u8J(4Zg?1 zxBqUI`(&#cRafU`haOj(VvMnt0|0Byi-$e#yJVdrlk3JyjkphEIu3 zRRVxgqTx9(`FDB*o&pK=jj{jMJV58ycbGb*+QKI+qPqIGI|@GEe60J0^}R}VLvZLq zL&eF(KrT?F7#CCTke4HEwC@Z8LYS61==+X$llFSd`(-`eeptV7+176EIN+caDCHH$ zgC0VsYhSzmgr1E)02s1BdhI~pU4qScNRf#nS%sClOME3x3KYUD-dIZNxW4a#IMMv{ zcme}@EMVG#|4v&UL1HJdM`c0aoJa#20VRG8kcF4_H773kR^U#e`fq2aq;UAmZQwt^ zWOzOQOr5U=upl_jdlVy3L2B7P_4G zcQX$GYZSnh?RvT$r?RcZe6*o>JFlo&pJlag)nhWq+H{S%6mpK$o3;{a7VJc#>s@4x zJL@XXT7fc=@ezZd(4Vxi8o_Mua<<=AEq#Hw86OF3j8ugVGJ>oZuXu6(z+HIaIxXR6 z_@-v_C$%-aiNn;k?;cZ^B^iH{s65LTLxZ+AjY9EII<}}02a;(OUC5{E+#RnzPRQgP9Fx!vN)`bZbJs-6i zTl<4(B#=;3$nKZlQ}hRAWEVql7NB;ec%bSE?oerQ2v&@5`^2-C2vyDXj~F5{wYH5_ zhvE-1MqE1tbPn}o0T@ct%836S5H*yH zjCD>=`N%y-6E8AC#{4ZT_xlgulV4*%|C4&gbP)i(!F}N5PgD?$zmO4$4+`ptw!{vT zlTYe0__>b=nw?J3hcQ1?>*w5PUEKM%SOPe5RO=2d-K9$usDX?>;u)LZ6^_>k%; z-h#Q~Z;VfXVdY^54V)4?LXp*Lo~=Xk&TfTPxq0Pneu74+B|v*&^ z?`ws54C?U&(m4T_w0EWoW!VF&&Ed-Jv5i7a!2(M@_?0P2=YKT3&>He1rokV+343;l z&aCmFBStE|{=B|_|Ej~YwnAf1o>M@coVd;HQ$Ft6!Jq9UR^rATM;$K`Xfav-$!lIq zyJIU#^tSYtc5s`i~o%Up!ZhSklVVeqI&BOCfr~IRABl!F>S9&AM2C*>%hH} z${rSJ2*uI{$&A)np_w|JXi7yetgjF+#?u%27ua*b0lN}|kHVz44CEUjP`d67M#nBt zY7O~MqmLy=>wZ>~mT?pP02`1T#PEUtNtrVFAc$|u3Fs2?NNXt#11WyK*85a!jz;ph ze;~KfZz)NAzH7DnlPr(7tTz&i^<6TxWWWsCi;q-F|@!r0Ws^;Q;w@k3pw{F=qXwqd9E2G@9LwjEgEI= z<3P`=mbTdcCcOn^uMP!@S=c}Kdkl$j339@Jts^yK*b(?boFmA{LwDaP14 zbhCD=`6@t_92v*}t-=n<)+tV@ux?9%&T&rm;9F2JzK zvCibnuaPnGo1n#$s0G_o?Ze&*@veFtb8mg`_oj4}U*{v^HbOiDwC zGKp=`LR@Lk(R#HLR1|oYMgq{aLEY`XH}rgCS<+P?&#)P|lL&nvZMn8`B@N%G7fx5w z?ZIUkn3ZY3`k;6w^5U@D#|otX9(%q?jQr+ecgykKm}18xY|ZJ(kNO-Wt1e>T^wgmmr4U-=9paj|ClouZTQg0>T0&OaTYGVJ`Qo8tvELnw6p?{ZIbXtuhC~*oib@a@UKN$h{`z#zPC3p;u^z)Z= zCRk=3SFhyz^#g{4C`X`Kc0WDdx6Ui^J!ldN5a|Gv)BuT8QRq44tIVpk;wX5kcaui! z6v*eAHPkmI^+ALt#zp`01i}nQFam^PQ7Hw$w9qfsBZuwN{{w`22Of|U%9Q98Nkb$T zU&!`B)6I;KE5@Z{4(YP${dLk$nlY3EO&FG*1fO3IZg#b8mM$dN%^zzonm8+w@1?Zq zHvt|F>7Cqyy4aJWnJ|1g?nH8}WTTF8bL`N;td?P%M*k?-ph>JsuC!glBn7?oDI3%V zWZ0-U>HTrH0{=^1S@8;~S*a)Kcy7+a2MK1cS^8o1($>cLHR$%!*$732WB~2s0r=Z9 zb#i*LaoP{?kXwYJ2qgbbMcr;*DX{mg3n?}>dYIgT{6~!(fp~J{{@vvP$bn^b1x#loaq*BH3tl-2NsO`G>Fw<7ros33S29I1m5FEU4JyOkwx!6 z1sM_Y0b^Wdn=KtoY>sWn=RHAP4;tY1`=^L|lu-TvfJ7QlB2 z${%;SvFBy|0di^%04qyRXvJ~nK}%+LEX(NhUcLT>=17QSzU9{leagz(VFg`Krjx!t z0f2^3d21%DnC8_>f$qk2Y6wXO;{iKDJ6}N( zm?e)5`n|I66>^3l^}(6E)o-nMG(rF@6~$yIY<7YFJm29643MF}kL>ux>RGkHse}pL zfB@TPpZzfXUOJ_FVK8)XTTqP?L(!YViFpR9{b6*BK-HxkB2_brG%lPswD@?hpQ&y$ zgrECR81r!KV9hB|7J0m4(nBgMKnhfUOihiqPLb{y0Ttsq4KCOai{HyipDQ+iBA4yO zmh3{Sw>KVLLsWDk$G3R0vQLlgRaS2QDOQ>cK;EJ~KAf)4n$?iH&H3HgWaMWUO)Er_ zHnl751xoEUSJU;WYwf z?5-=P&uHMy95iwcddo`0UR%so*v%o4fZ5m64?Ny=+P1sL;CHV(>t!u8}Mj zF9=wrXx8swt=;@V^=C!`c7PD@QLdA!o*8seQ>f@4PoB?0a*0-#o$BB4VFrk#IC9w3Y07JV1W0qq97sYR4bkQpg#o-vQptb^$46N~ zm;qG4Sn)1bv63ZP4RJPZIg8fbr0l)15igaf1zYxxWN{13B`$K^zR1H@@ll0%u5Lr`^Ih(sQzu~ zi}=ge9a80AsIYrHhkC19%iQw?TvQoR>N2J|mXbl1sK$Y%68ZHL}`qPusvWllMwC9X+EXsYlV39&m0_6ByshWo5qMFvn0 z%F;dl3UFRgS**R*oMV=8MzP(p8#V8G3JzW>6z`Hvj% z48HKA^G8uedHsz066|nJVcI3o^H|AwcCK^h`Xcpsj~nO%B7-K#sQDxJ7xhk#`yv9O z7l1V(09H1|<2fG191FHj9rJPZBuh^>SEfyB2edLLJhf-O%C+UX5{rBLv&?J#4ezbN z#AwA28QbKoZ2h2{%9<*TDjZu;A5T+(#B^9HcqngRlNNG@Z&HG8!w`jcAK%x%Gkvg^ zUyBBO9y^!Eur2R}LpJ`|I#Y{Gc#)33^EUyjN1R~YL4P;yOzHT&H#z#c3Rb-fi<25% zyrgnuIAfEl%C_bf`0HtQ4wNubZxtA2De0H#?_alHmtzS|VOs;3AzATlq+CdwO7p^{< zdpVRFP(AKFv8*>y%eOb7yHROByiw@3zowT}=%4)4^4Bac2Cjg3kBs^_WRxku{JFe_ z4`*{|(--Zw>IZqf@Yy_E9Ou7d2_l#3E0iXHmPAB0@8&ks0(zrj&&??cDSg%};h7@> z<>NA(FNCi}w$Mtm7Qe1}?6~UDn=RP<&=gHCTy|G=t_eAz$@ccn_%$d?Ia+l##^Sf-92R?bhU%&mzKei@QCj+*)a8{x+ZRk~Xa z-3K7e3&}X$JBjwcU;j1Z2D&B#J9i(@i5HYcIWnO-!R7^3E>d6k!snl>W}t$U;u5hb zd+QF>6Lg3Yoc+hL%g{>DRU=x@wL;+QML zPP!Hh7U=O1HYp3I8)2EYQ#(V{{L%IJ6=Z^1N7T`p;_YPTnKmDWI?axQUs380d9)pQ z3jI9W5%GX!_gCk*`Ztn$6HltYtz>P)NUa;-0-E0sY5LGM(ew*W24YR6;`WP%lt>$S zK#9>jYNoJl^`Gi&Lx3cRf>_K`pfJrU8(vSU1J!ZHP4}zq(A$|dF5!MZ0V#eF|rBTb$ zYa+cZ?{6%DkRoR1rK@N2Nq0wIG3+MEPF0L9+btA?egCn%taX(w1}LVfaT_B>HYbC7 z24{xnkfX#EajhT)zd@9k>G$6pg=Zyylo8?&H~wV?{}ph=c4bOg)(j)+&64CI3wfc# zmcSb<_XKp;$iK~!(Ii3e$I_RI%_b(3B*Ch=Po1l0j?e6?vR3tkVm_I;FG5v>Z4zU| zneYkG*@}c=o+T&ei*uQupzeV_X}i^#9LqqI0#E`&SpMQAj6J8Y=@atkmMlQEmOZqH z2ajXq3w^EPJ^R{C`1Yh_QZIz{q#O=@_o}4UWbOnk(BjoX&zkTn%%uVF=QjFntUeF- z*4xc>$q!IcTI9~BrbcGTJSk|*b7gTYlC-iR2Tk6S&i2=ljc`wol z(Duekd~sosL|rz0w>lB4qD8?UC;NFiK!H^-RD|tyk;S_6xhd!q@DtRfbvhC``b!Ap zphg3-;&?CNE{|7{A92np8a6W0#^@0w564YiQ+7@E@*M_qP>AyHkYz?eh^vR`0;Rub zHy_qx>-XsN^C^hGIDPcu@?_U}ahVhL(^ZsQ%|8 zJz1}1gtbK%1;$j5UN)XG!*m@(RZeL6aKFtdOLp2Ou66atg#^WpV!pf@+eOqE6@g_n zNWLdCEGy#3{dB)iT$!AtaPn3oGa_Jh7H=-*{}1vDnawT^&H~>HjKM`{IR=yj64J#o zSiUV9iNISp_vlcEZ+Q(pxi0LqB%5HI!lmot;|c`sMKQv%Ggb59smd(*#yg_f+r8^JugVvU};!J;fbRh6@YK zI+l+tXw^=p+lJQN-MKjo%x&H{G4ZTE0#hpJQrdGPe6I>nu(8i6i8SNTcatUHtRjoC zcgkZF2NE+ZDRG!2dvRvgLi56AXcIH@3dFG5p6mUw5p?86oc>LtfF>BQT&VRo|EK?)ko9_vp#f{B68R-Z`#`fO{W(amp z&TJ|c5Qs*G#Xe!ub)F_PP}zWy-o9M>%HD*vYzAecT|xy!bP{kl#o*Tt?Vh;qGSPOKNfrgV;L?fn@Kxcze*zxe!%d(eUHPlY3-naWQNxo;-3&I>2%eS*?-9QoPm?V!`;HFu**T0;`izx z?!Ok~-zh%6sFIvz+^a)-r9m8`ptpN7)F4>)SnDlN_cGE&BWyRn!m5hC+XoXT}LXL#wRwdSc%z+o=oBUN-EhL#%rH*VGHacnGNWx@sHgG@zhPkY#Jo#f4 zOdPQEg9M417!;jTyGlWbry-CNMsk;US)+nMNb$EI6I9(BMGIRV6OllpDwrZQj6GJ~ zUnT`OU{L%Bx0j6WDXA!%Z#OA12>jn&3nb=!6*iBAWjM~cqY$GP(`(Av$EjBp(b-Y) zyTlg7IwE39bCs_3Ii#!AC1z}?6euyxG`XO$UR!id$_G{nNwHIIzWqM#(9FK{*V$>x zP#rErTWQnaSeDwi2AgQjkQmNj&O+-aG{Pg@sNr|DOrsnSt|uV0^qMq)@8%g|w_E}f zxYU@D{e=^u2E>Y%`sjZ@*{snDIQsydj4v8ZQ!DgA`(t2^tFFz6&~*{Q-Pq)lbk2^w2;_HgJ3xKu@%kvHDjbdUXrZn5 z&IpQcpZv;6>z!hOX|p4b8Fdd`ZyfRT57q7Ml2+YP6K^Y81L}-*9;UVPu$G0dcLjE` z85&gI?7F3*AZo-aY-)Nk=_0liCbwIi(&OPdU1aBgQb5s+VF5d9Q8v9d**Da6pA|2g zqe{1(#D({i?gEulFAt5T60Dl#Sj`}{+YKoSXpQ7>O7+?R;sm?be5hZp^+?`K zD>a4D>Y4#?phRqHc0n)Mpz8lN@#E%fDHJ;Ov+;}kzKeca#OUVoQv@0@*lGye$R=Ctsm{vFU(y{t=PT)O&pjpqjj(Tt;kyL0_l~JbZ_YMLznP%~3C%1DhGuRlhh~W==Q=}a3&y_{ zLSfL0y~>eQAKYlB<;`mzSWE-^$~tGHJTsS{ ziP5tHqZCq=QafHEcE-7fXow&sbi^L?LXpXepIe|J@{~gHkz2rutPhv`ncJ-`J1Mp- zrYQUI_-^yqRP(lEUiJ+~RrDV6?U-ewl*I+bDinPJ&xwr+vYf`-_0B-Ud9KFem+Iv* zOBftrhm1cvK}GX;=B2q#My1oHPCZep?iK5UG{lWCONXth({P$Y-e`x49&|y<6(1Hv z&Z0}Q1YGpdRkXQA>ih(7Xi20)KrrD42su3AXF;AY?$h$&cEMqZVSCqherX$n$1ZR# ztj%wMe+aVO{<5a)kaN#DE*uE;*XkRedd%oB{B*9jHX=jVhk`hLz%`ZG^nm*GLW5Hv zb#p$Lp{88qE(zfBTe>#ZE35rC-i0Jn#J1)Pux)w5zrs{t68T?nevZdtc>0n2` z=BZUDT7h4CEFuIRrogmwSXV3dOU>4_QzO74W0GGS?j`2$%ZiN5Hq$e>MI28~bL@G? zB}%Pqcwadg8Jj=v^{7bBR-yE^$;iB&iJp{40Cug5)NEF;XcpHQL0UJh4~G2u-Czvl znFOhs0_<}t;x{r@=`1ku{iSly+tu5a^J}OwSwqbKHsNfkB-%M-74M6O3ZZd8j%-JaLHuDiPICmy+(QP z^YWTPx$f1(erjUDePtAapVO@r*H7=0mR@^&r6UuSvRMhaSE@=n;%7!L#(N2T(03#} z6!BW_DcV7odawd?VXM^2jv2W_KUUOk@lT;v?M&07c>&x5#5P z)unH+19CkJ0Xz~*YP$oS2MvetU$c|bymGDD9Xtn5_0O75UrSf|b>@AvCRxPyqYD&- zg?}UU4IR?fg(`(y2(kZmA?vs4dJ>OykvR|shB*))n3pg@99pWsdhBd|gQ^$XY?$|Z z`FTKcQ%gj7_gvOmO9qW!bC=k9r%mHyr05k5!qvxYW~GhSdM?lMp3coC9{y%deeV_3 zsQvMl6x%Wbhx6nV)mI&#OCY)J?*g$*0?fnal8^>dpJ7H77U&ROo|0&Dgd(S`D3!Ho zZ7rSp!rlK9qLLMIWv}dAd)-oNX)EU2)_Z-?4;>xB);CA+T`e15+#Jb%u0{sG!3?7(IWC4>f7UVvS= z=7@nDq?v8MPsD+fgkhNL9V1}%;rPiNHdXp7_4AMMNq`u)V|>3JmILwuTD^HY1ajgH->D$9(GS!PEso*kKqVC;5IvU^WUdI7d;)6LH|u9-F0ckcM9oSSpE5 z@5WyFkxh?n2B$BRIiz~ea|Xi8x1ZZ91kJ=nqIlKE025% z<91SB$o~^~+(I>c>TyA15PbiFRsD29j9;MZzdcRu+h80Nrfovd!@Lr>ezO_O3yL)j zK+&z2V|tgHkl$8Cx(Af>3DRcEn&7(|{H2>;k^^cuk?>a+kCm0H`lU!AwJmczGkK5} zPw#heDik)c5z*(jV^|*R^)X%PK08(y|Btes2$Qa9ga565qYB-V`_hEy!Cs(g;qWYD z{9vq;pfHbRq=qds`z24hp`8v2zkz8uKJ(Q-Hu8UK*A*~BmG29H^~B22fE7D<@%2zie5JIKAk6AFqQ){&?FnM zLw$aG7FkRIA|&4Ibz|j)-y<=%5`KTGd#M0wO;G@~Ye~U5;rEVgA}lg?f;ma1dtS%8 zLyNgO(V?Y~T8r(Jjv|jrR8d&6yw~SOn4A2*v0*BfhPYfT$}P~}kUAox#`)wv!$Y?R zSPBAJw#B)Z9?#;8eG!A_+B-mt%dbV<p;91|3teMt(%fdbsi} zH$Pz_@4HP$d5iF_x!w07tHnjJwRy?%-bus|QEe^Wh;283K?vp&BIoFxiXQ}1kR3(@ zpcMCHs;viQXTpTXnfnYdp&_{TT3qGN3(eqMv1T^&k0REt!*z~q^?BN6W~Y^`I{_zQ zhy6VP#>XckLj45`CS3bo7H_xEsyt*|dM92p(Rn`2HL~;8qM(jVzEtyKnS_^cS z<@}%5X*vKl^?)6PO5bY)?l6tUL{>N_W9e&n?!Cr&F-ti5fNbC#^OxULTuh@%s`SI1 z_f^i(j0VCS$1A(TJKRP^N}eXide>~k$A3rqTRq-OM8MZO(?`gfTe%$dB~4tG7?xH( zPmf?1SFYqMySy!qDw-pEjgmo>Me}PM-hfTDsRiglW34tKdt@!n{cK%zR53Y3t36Mt zv;U$zfKjgd@xAjwnEO|Hg~kPfpy@K2vYbtz4&*VTsc3UJ7f&Sf{&sbn`usUVuqNV} zQ%$y`4~1}<|LXHiZAP>q@z8)$23Hg(vjdP23&&d;So%Q1EDb0oxW`NwC2*;Lqd;DGQ!da=EuI!uRagGtpPp-#kR zUc6^BrXQ6#s2r1-1v;^31kU$mGb~YvEBb=URm|ExD!gfwLx)eA^x3{bet6pJR`GT z8vNw>REiH1YEH4#_wjTgH79eF&%HMBDL9(L)b@7898|%mYZ5{m} zo~cJC9T1=HF0sQI7C0m3`DCl&r~-SrYChs7IKgI0T{`kW<*;^fLP z&Shv<@(2ISy`L}-K4?|p*pB+}9>c3il#42e{U^F$6Ko2($DjL2lgBu&h{tirgfG_9 z=f%s+iTJ{M0Ruj+Gd6MmuiUN~U;P?Ed2{Bb#o2!(Km^pu#4~G(s}#2v;bL`;M*QzvUKm9Y@Yj5n!JdC-tn!Ba?4$)+}jj&-y&5PHWJRXUz{2r1xQcQek=OHaW@S z$DKERME}`+)e`@z8%tu5<{!pIjZg|P{IO5L3LiENa3=thk#8@8b<;5MLibQ|m)!r* zuq{O!H-8r-2*1e?dA_O=%!Pr%o4dasEjFv4Oo1M)Zpp=R)Iz2xqd2Gf-O%KixAR6~ z4-pM|C*j?nYNaEB&3%UWS#CAD=w3%XcLwp$bbh3^`KP3N(8=^&Cy6X8#qWLq>dNPV z5#lS(ULy+RUnn;2X8zskurzItV$>@2gPPhNtEIn#tTy6IkLzLPynl_DQv%YE63GD@Fe9$lCSEcghM`r7D%9O220H zCKSV!_?CHPOE^4b$K$;8U0PY$9Q!XFPQj#C>KmOZ+k%@ha#H&Zb-4k+@un=m2q7bc zyPt~q!e(FGHn5;*ET3&DmNM?XljlQoUd?1KM=q?K$pj{91@bvuAE5dL2Hc?Hrv*%_ ztMw>F*Vhw%xRY+f|HIK)hBf)Nad=}g6bTU}Mk;^0VRR}AA}!M0Al(f^1Vmb-rKCZ+ zySo|f=x!K2!uRq0wBy+4d(WQxx_;;R+o?>y@!3j9*3G9m8b6aQb*UbVp;7%70S040 ze1lC@jz6Aa-uc=z{x(pf-j{Eka~ArT>$p;6aH9?NiFb<_mG}H!TJtDLctTf6M546> z?a+=Z%Bc)KGPs{mXQ`N%=CkKp{PXwzZfNNy4HD93v34o?912=37qlYthaV~NKvD;K z{*x4%-VwvW9FM&SM1LTiI=kGwH^NL>h^LF6*J~jOp`0lsv&&;=r>=yGfzwL@5xUMP zRbz=}6KyeT$mkW5iDleOL#W(pesUaCJstPona1Z|U4GHVb267iFyxxCNf>Xw04<^j97 zGeas(7vpnj!E4CUKQrRuiLEglOfmC>7v*JW9!kgB+{2(nC7hoI7@D06W zRD+Gmg;7+b%G^3!?L4LCIj!^9>$&&-?iI^!rc>qp20Kv1!NDJ+UMgh6o^A9-bd;%) zhQMB`ss>80#l3g+yFRUck~Z~+mg0^*Ysv$sYzn!?s~%-_C#$H=uZeuV&8xpJ}#V=^R&7y%Q9s4a5^XSLio_X%Cvf)|tYqSO$s*8U=yQaAP zvmjK1-Z~y<+Zjtfu&g#x_VM}?1b&z46UO5wpwRG4Gh8SOmaa=L82ttNY|7$Y2MLM9 z%E%8tU}7?~4;Q{8Q7qxMe;yIh_J#tg)JlV-4HUEhAdSM<(x-zrz$-V8HFw;>}??`dn&`QrUzdJoQ zh;s>q>i#Y_$LR7WbL7K7v5s)zT+~av*12=u4&1+*9<$!JZ&C{LQY7qFM%Jly*brDZ z4S2^B;40iOF-d6+c?QVOi}HcOqOCy4MYIrJn;rVF_I~`o_=ZV6J2V7@*3l0N?yfwh!!HH5N^}Q67UT#}D6|BTXlKV-f$Hyo_l^<6W5)O>RxUw% zwctd4rFyP4Q0P^hqa`Shd`!S&4AEpdGb>a5ns4t)7bXM@Snn4Zb7)HZKVlXeWU{fR zmpJitOp2=IIq{Tk_4j=c+T!o-jB^$QlYiywouEheEbsj^ zTbMn7nV~=L>SP`N8G5?ykWA7BAwiUaykXx6zJ{;XKIq4Xe7LPPUI962ZI=4bL!M^v zq&*gq_bZovL#5=bE}@dUD!n!JvqV@f%VkH9YPIb4lYP1vH9>};{KU5dDVvQ*vCjCe zr1;MI#{Ib$kMi6DTCOfQlCnDSJd?&BIgCOy)i{UI07pGas_|Gp@^=I)71UH{A?D#E z#P?>u(VlUej#0}+)KBK#wO4GzSA)_l1plLI=Z+rbM&O3j4=q-L>rRQtGOzbI-c@p~ zL0ba6y8`O|x>hD1EIUPQnM7(81pYLgCiz7z#AEHd@3VG;zhk+4K@lk}6pyUX6w#o+ zNZizX@f<4e&0{TXVYoD^$$y|6XCE`Ij`sw7LqKTBxEOJyW?y|?bN$lIUEtFx>elTj z=Q)w>pm*kZRGs#Qr#qWMG0M9WjU$7KQOc|q+droJf4t@NQ8XVd#LzXVoagvYV;F}p zt-t-B9iNO*>;nv^Z>wzG^9=Jb3mXuotM$kaXWe&IGF=#Q_EvjuW0X35rwZ>O?T|*m zBSe&WADHvb_Uv(t_>u5-JAtN$hF64Gybsv(=2!=jmdY=?VC0n@x+8-lTfwA_a@oA^QjF_?7$c{B`mH`^NMk@Cm`QQ(+{1c(PU0Lgc?IM-D8+EzM zeXbI0Er>fK?N4E^BnB{=zEhb(*GaA0%G{0Z60`f9;@|DZ%zNxpO^&l6go+xvp04+J zI*l2lvTAaT;9Jmxw!RPf(!a9C%Rx4?_K4VTl(gju!_KKsmUlfhY&fYvYnF{k@sVu8 z<)9iO60ZKJiiHXoYKY5K9nFR2hRJK#r2m9BcqHd4C9|bV-yZ@H82j95$?VOdnX%au zqm5F(kAaEc!rBbZc=sTj+l`9ifo825b31yI)YG8xINc5ttk#YNtGv|H7MhCaSXo8% z^l2IEA@h+=Ib5z(kPAP3Lk}lkJ7^|B(5o}%G83Q3K!oy$XM?;rRPoOd(~NMhi2S{k zO5!T^FHr8ol$3_b8)|Pe1SApSK7gBV0vlr=zQN~0?s9Edh*}VW%nC-9DV@I2RY?x$ zQ%5T$_m$ebq>`7{4-CF6ZQ4yfyOg0(a$j<`$DDThD-eoah4?7Ma8)DU0oVuLx$o^! z<+eKYBG@3O^z zSfOc(Ud!L*9+g6z{w+uwZod^dQ7N~?$P9grrE<`qL5Q|3hZ$g;78AB=`!#*PD@eQX zVEOKX#$@CybNc-xlO>Ypm{Pp%&${mPsE7BbAKuJFSXB93gzDVoLuyI{5tIb@2EdQj zzQLdN$n(J!h$};>MK15QYkz=#f;wX~6QrNI)d8t^E?zMY78;wrQ#XUV48ciuCE3RxkinD{b7N$M+sy2+%+(1U_C zfJ2#Y@|Tjb(03l@OX_6z`-2MWRN^mf7Pr3qhxWUi^UZ8P{U^tJFY5B_P2>Cw2?2-= zD-y&8dzq|?z!C&K;3G3{AuO*jIXc;*I>H^a`PN!OR(3{hPRRb_GBAjp(rx2?B!Hfj z^8WpGGAS~&S%odq_ddmS5*&$0W@yP&^&|hYYea8 zpepYkT8?6jG{nl~_C@;f4NH;5V)37TtEJrAe46!#o{0+^Ru0)Y0+bL!r2R4(@(KK= z8nHK9eOkuJ5y*SJ4H*^-oPyHv?Uo9!W#@gt&pKlcgx zdQsTocA}N9-+Ho&_jg(jF%-_%OwJp` z*UxwcMV58_Adhy#d_8HB>@a7*BP-D?l(^-ELAFXNI!*YIDU-kv_Y}L?puK&a#6Xq^ zzcjgqO_E~+kZ=X*QdPNj!+mOIyN&=)lR~=BBtw>-w3ZC{J6`W>F-aO)3mO`B11=EY zZ}O4&)m}6&;=fdafqLHp8Ezq@K+AP89vaw@+ONAwSwFr4dt<__fL!3HfaUTpt8!eQ zL?a)wn$o-|`M;s?8_Fd)3Cc$GWQ$nU33ma}Of276ma$q-7+3DVF;U<|-wI@6jHnZd zAX-CqWEGMR8xtc3tnH%R79I1dHVawRjKcE#S$}n?m2nTw2>$b8;LQS~6$QhP;j_=3 z>>!#(#ejvk9g*7xZr5?w$`8k6n(h19;w8H%A}-ib<)iKBlB6dY*k7$^s~pXf+5+Sx z%e@!bjD#Pq)OPa5KTgmxPudS|MpAhbE}z;pA#eS3g+F;B?Imqb3T;dbCp?TLzd@1D z3CVXq?vGJ!LMd#bMLy1R;E?Moqo|O0HO8Z_DF*QrVD2j^K4T+&f1^2JKDUuBWilc5 zo-9p!}ItoWsdmr$7QkLs^KS` zDxWGfy#vUu9A&c+?Lb?8C7+=2dH4?Qp&iV@%e?-s)DxR<%yKcZS zHK#rc?IZNvrW5*2E+L}2m_9UIFh=Ne+-bGR>BBsumi#JNoX1P4WneJ6QtvRziyn{7 z&XZmbL490wi(t}72EA!J3;f5?dW^lOAIWFs1}uoXU`S!r!~YM&V3$Hy>5W+sHam9JWUG$`rT~ab1msLM&!=}k zCQqw}U~J}-r@+NA_HvkNQ`P4xpQXY9Wltu#yFf3}45jppD37RsmYCEGdrd^kiWKYe zw4ruAebG05qu1D&7I6zqn+uInR)QwCt;=$f)ggYA!jk?`KKw6+zzGb2FCivdY1PWSEPxnY&YEZiYerp;{9AQ;0zqI@JfNenNXZc)!ayyX@<&=y z79`I!>b^+Zje{ZRw2HBo>q(_6st5;z4mPm zXWQIbkbZ^0XnV&gNtZXmRfhx8cC zjz0QU+3ciaHl&Ek(HQTYxVm@-1Wea28(jKQrPuWUu93F!0EAq-R{qjEk)t=&HU*X_BH`S^-oQ%v;S)a7PiNryoT~$q ztQ-NO%3;Xy;CUmuaz_8g6k%8fI%Zp$?K*gt@rq=7GKoTY)(V5yCTU_rnFodwLD{Bc zA@x`1#1}qVzxZTD56*abnI>t#9NbKA@82i1zeAx1c9b*7^2@cTXq{J8MH$l0z4Vp* zZ>KMJ(rf128mn}%*IP946=`nALXb0CSJKZ9Uti-!N2!B4mg#-{AbxQ2woSXnqiYiO zk7AJxRI#l_NBOK&ty%irN5{k$J>KUQ_$49i2A}JBFGUPLq?;PXuh*NSRlLsnF&-I5-{m;^6Z-yy;APKhtKxXd>loU^BzYftI@Qm!WOIPe zfOq~3HYvrEeD8e*8ua9YSE(g*%uXfIm?S7^YGdyaFiCsdGF>KCS@o*eujl!gM)ABb(L<6B zHcA>GS`F?iuKzpIz4q$@gdG%C03H|G7E~xG=aL`tQMA16x>3 zg4J5B@)6BI4&>u9el(dbzWy3=Q^!7mgj!fwL7>wD`I;`_{h+P8WwLt~9a40UDvbnn zjDWiw*iL+2ifO}JO*Zprw3JT=u}t6OxBh2C zoY!Sdy(f)HSvKog?n$nVWj}(Jh8_+c)rmUms`&$`R6VX`u{yZ8x&nw5%WX+-O(^V` zP1}E@Q4ZQzcv}c>2uC{G$=6nJ>fpz-YCx_&P0_ONpG<*Xa{i)zdxvY-ZlkD^s9M}PJEn^qn5SEg4W_)xqR%Usa~^H3kS03}GH^z(TBA->o{}+d2<;H)F zu9HTNTy$yg!mhGoBzWri+S^HzNtXM?>j6j0V=ZqhCnaKB`Is>OmA9G^w=_Sik2x%A zlAQrTq&a@`#yb!v!Lcj#>dk-#T6~vgSi~N>aN)eh^F}aSs`6~S=M6Jpy{WLMStB5 z$L?KqA55iRbSL<=TwR+s7l;%z%F{UY)L^j;HNts$99SQ+@S1KpV5UjDO#!zwR14_M@x74XDz4iMwhC7A=k|4qx6hd)(Pz2K$MSV9b$^37500H! zcCAr5jnb*X^5yY*2jl$(lVoWV{PYG}`-_;3i?(Bs8nQ&>C>YTAC+&sh;=lR6VLlH8IR0ZaA*{j-uP~8*O(T2#`gT8I}I)!o`(H(rPq!v)6;%3fDx}2gs59t|NmL)d*o<(3& zHO{aD@GOHFi%`2kp^L+=i72peyf@ywqix^@buuWB=P!o)pkERnuh1Q^A34nfV0dM4 zgf#9l#HatMZEZX``^KOBa@L&#HC6q=y<=U+@iZ{3u^`BNlPCM5&~0xBUe?ISf2 zzEzd2NygCw@2-nC6Jw8buHW9jQ_3E9PF9vHg8RgaOwnCKKw}?-GmPgx3T6^T_{1<2 z(Wtv2T4I&Ng{%|$Ot{?hhY@xKL|c0eg+8hRTS;3tLiX~;KVp>1g|@TwAN>)O?y-dU zseaO&P*XyPUt3#U@;>+AeRVv?=^J&=gkg3ges~`s?)urh{{bzBMZCDxQ-emz1Cs&A znG8Y)$n0t`E^&CB&`Y>Ga53r^L~IKf_WC2l-Htp2(szqdH@Fy|)b}Eq9!8|_l(yl7 zKf!LGC%fK#gk3xKlX|X+{xo)6Lh*VlyT%J7}j3AJOOwTdjeL^`|DUWQoTb+Gvw^}dz7IIS|!zV?_Q&G4b zrV(KmB5JMX$S04T<*dSl!c>07Wv!b!UC#e65g0>uuJ$PQET?s(P?C@`;F#mU%ipu6 zTk=re;7s(vXsZY?zj)it<3Pjzv?-^BbH@PAkqVsTle4R}zwZFXSkE)qhQV6sXHOJm z49zflN(=RZQN(VeG>J}$+q+3)ROiCM;(aT|SQ5JjuS7$g_b{a}>9UwZz8D$^V1e|u zE!Xi@!+bL%$?+g>qXFVv(MJljwh_odK&tKmSOA=nfL|%zt^}%oBN+0{BY9rRAYf)@R-{*0x_EAI^_F*rQli6Cj1r*~?y9SGM_h*z;Wxyt z7gg$2A5C41o7B>{x+A)6A8F}u3z9vf`~bp$e9zamcdx%Zk~4iG<7{z6aNKKGPfGRx zQ|DY6-kDkx)oAt$P#jAr5lk`z)67>?x~-pNDu;Nisq1WUR6>l$LTj{3{|rQi$5*f$ zpdn}DXXD0mU4+M)+UpvE=Ul%yt`x$gSwE%VBGzg*=S) z9md}XW#%gO=(t1pwRGB!X-if0coh;~5kb7$9*7 zBoy1`8tI2Yb;2Y?;^Rstju_ijJEi5*{J!jtZ zPvoFy{C*3Mn@ZmUw<$u^$VRBIBmUzu=oxnY;Bs+=i8tzC0os9uho+bp^ObBOT{(Y# zX7yMyt)Gw=kt}z99>P!!UuSsZcS;( zJD9+GvOuSxz7sr}ICVYW1C&Rq%_IW;Ea>#&+oXtk-7spvfcI2};DW1sB!nFQckRkW zT-MrG4+<*lwO@LSQ!f0_r&LkC4CWc;sFQX}5TiWRquiJb{Ki`}EAN;$@b^6dVDM@B ze%Dh#O$2A2#Qn~wClo*YkNhg+mNF6=|}xCG`?(i zH%p`009DQ$atDa<>1iG~wU;L~J3aKY(%H4zu|F(Ko5D$0cBr%`>Z_DcyMa!)NP`Oz z%r?w}uFozwJU8{2*BtW)8>jfMNudKe>1E+KEjSbj$jya_>HyX zXY~SuRF&Js`DCfXSEP?$W$)86F^O9*^PPlE)PpyPl1p8MRMh^rq4nZcQS-lj!{g=S zl=@&7+a{B&p62$;Vy&&5oFRV%-gE}`%R;u-*$=+E;4;oDG~*#k>mJ+#9R_`Y&kur& z;Fi2>Z^?fIh`Am5mDW$s3yq#}a+8y`IP4uLQzGJWdX#*3d3R#dKl$*jY$lNT|7+qe~|X_+HIA2fYdan>zQe@?h&1m=!D=rAJnvwU@cJS(Xo zuP}Bym==Hi2V4Ft-aP}!`X@`_*0ca>e1o!Aspb~(S}i}Tizgl*57O~OGY@bL{I~j_ zhytgA!6enZflsf5Nwk6~f?GC=1;Wy5M-OS^v7#Yl~^ zJyw#+D22_k-24M+<=C2aF{?8zsrO4~>9Wpu#)h!6`^BAkS;ToV0e!SK2Bs$`g zAdF`i%~730{@OW)yz?{=GQ5|fP8E+prMfSs2Fw96#N_*%B~oV?Vun=z%6|G59DH&8 zmJyag*!#59rvhgzO&Zn$bPmKsHhJ;|_WhFtoB6XZ#hUvkV%|5x%!na!&hxvJ*W;vz zyLb7-#j8%5eLXJocm~qrRyzp%KF4zRp}MsSJF1E~XJ2!weF1;R%-Ru-s^B(*#YVL$ zUP`kOg0_4a#i$WW8rAOj0=&;v@cpIzvD`@eAsDiAGb}nrt~<$mIC?_@QIo%4zt;C_?_m zA}ZbOtsI+ts{)G+x8TZ`Saercz_XK-Wvr}S2VdHWBd!3pYw04XHNU?Q!VL_AlAe(B zcz1%ivJ@TEvg*BkS+jGMRh3UHgTep=Hb&|lhxeh}pZS7|{2|pmxeDeoj|axvR>y^;S$Zp@Zh8SDar8%A@#Pr0k_F#?W@L#n>uJnEqax zM(jnP`z3mO40()CEzHKbH!-qDcTld1))` zW|_)&DddBVyEtPrde^n9i1XX@)d40~e zav!j}&=2F^6vt~4WpKePS>K9wBthpFxKq^LG_|lNj=&?_!Zc&0 z!r-Ma-by}`UJxmYWvJii#OR`rFpl(?jwUG)CLutTLlCQ;*^*6ODRTjMU+9jEyjDZ~ z&AA}|f#LQ|G3cYeY9t!eWAE$iUN>}+Z+u879Xa>Ozj<7rl8)o8sPAcaL^@0#>wTwp z{iHSLkEDkO-&gUAS>ja0b7gNJ=FEC}4pb~P$NbaSd6M4W>l{%BcwPe@mvHJZ$)QI77SsT4JJb6&RR+AY}( zOxr$6n*M2ODk9E3M-m~swl!T_%!kHb?QFAMcK_C}unZmC80riTjzNif|lKR!kdnspF zJ@@(WZ9VIG%MHztw#Q{z!${B6o2ra)jy=!S+9n#o{F6Ip4cGcSr5lj=BzK#pc)?nE z>F6@SneR!M!9cRO*#<5xV~2udT*7TA&vT{qq_9(2JXt)c$pI$eH4ZmE zE}h6Hf)olu^T3_KxkhR^dR5=-GYgH9nYH+xVa$`)xJSVcGf}}e%L+ZTi`+!Z{>=1ZZuUwmx?V>a>%E^rn$e(X~RY870|AlN=%5!YfULW#2^RaYc{? zmsbGnzi`jW$dUSfIOPwxu<(>o&Qh}s9MFVf&(fT)zGYK@Cz}5`47M2w@zQ_0NI|>z z)9m+v1XRP-^lxEH5sqYv+f$gxd9a8f&VOFP*K0jd4JI9uI(?=5y`^3~htKLPcHzZk zUQ*DCojoiz%g2(R5G-zn;CDHmNKQ`@T6yXnujrhbRjEHKl2N+5&0pyWNS*i2}xHznN9-cEcM?xYVL1nNJ)9>I&u3 zu8Z05=i7cn{due^^vD2pe%8-f;UR6pLbDMO_M55%^Z;D8UE8;WN7*dmGJD)4F{$?( zm^M5dBMqz%SU^y-9hs+HKh{#*0392xkw&;R(>x(0?=m}o?L~QCF4p#7)%m$Hum)Bs zGo`uvj(O_K@7^}**HQ=n8Bf$VeblQz;5F~H8g2Xk8$R-IB7VH&(;x8SswbDbIY`nC z5uTeKzvLV{(=XIVWXOT3&yQUNFVCL8U4O8dSpITF&$WvL>e~5b8Hk<+s|9vM7p~${ ztMKKo@Dvt)QR^h*ws{BJcp}{`6#_4@nKKVbMdDi9M2nvQkoa$W@MV+0bJ2Y$~0&MbsRLZ5NdF9 zU--F_<5uqe;H*{9pDyAKT)WrCmbSG5q z)cX1!ZeazR#8X*Cz`5yKcSq@L@A{!{0+XAbCwR=_zZSpCb*^UYMwokQFq-xJCZ5tF z_Ys?^Cy&0%ojXlw9C=Rm5cD z8=du@EeHDN4@sEachbOa^Ca$s7X1GPdRl*30;=DXONcKQE+vK0eOX054#{(Tf)NML zG#l4?!t3_XRTVR4>X%@P8zM&=`nLMinZ?r9u#JQbJ;=uW%~ASbKgg!7f^#B6o)-rX zjnlX0I<3c%A}j!-VvuUITdKf? z5F2cqVD@J_#U&Obky-DaY{NieBS5|kAO`EqV%`>^s^7s7;LzO({u_((-LDNBDxpyp<*OEPt)_C4n?t*Xba z9Ke_*1M5_%xx&(_99z=#oZ;Hp-YYt!OZrcsqrvoba@`>Jziq0lfzDpp8ScSVPpt6q`~;ooYEB_bj3iHrhvI)fSy;r8}jSoH-Y3E;}xn z+XnXw$}wW?Vk%qq3aAiYF|wC7FJ6AxO<$*a)8y`FV&grULFgV|bx*x3~Qkt|oD68iRqP?B5i>*C^#dm6L2KP_Fud zC32Z7W#Ku2ovsHdk)!hQ{;7h|)3X{D4lv{+OoQ?HkDAd88>OeVp{1_`Q71{GLy6TP zKnbagG#+R|e%_kiM^1!alj7&8m@h-F!bw%iOy-8kCpvN zX?bhnQ(NoyFFEv`57h2lHgWgkm%$N*R9ku(4PB)W@qrr*)5Vzn)Sf0QbbxBHjBr4W zIMX$z_QH)tDv&Gw=wgmp2Q<(%vkuTSgsKKi`_YUXdFdyWylUs4FuJA2vT%Yo`7*mv zuRc^7Pc^K^7|!HaC2q~tE6s)xh8 zWhXaf0`TP|jsVpWw|_{5XZQA>ZUx_czLizF%ZBg)Oal+k8z0jccheVi3P0E(7ok|* zfSW9ieOKm831f90983uLdeJfuky9;M@E~oAlOeKbM5+2IatvztDuNg{^k>e-N3>iW z#3C`^;~<7oR_MOv#hDm}8!>S-M1xTlCzBo|O>W6AP32L$?qARKyDFx}*@ldLK96Bw zD(}Yrs%il_!=5$y9ulvVI^&PVIpz*JO*2@ensW4-No%1`&=Vi#o@u%si0AaRUWCs8 zOxEa(L>-n-NcLL+6eGTt$zWC6EIl%MyaRSi0=Th1P6@ICAEsud9)?p%*3WR;pVAD+ z-T88VH46GzE7Sfq^CCE?{aNrpdkNAQHiR!P%yVN8;2&^}U+&+#DX1Q{N%3pf37**W zqzCAGEwOUw@la5PydrB?NJr%zCOF0$#QX8CB> z?_E)HWyXZxrIf>qhrl*?WL+OP*-b#&6a$bi(v-p?r2E3Da)VC)%07U~NoGJRdk&P) zC=TxYYS${jdc}XR_fhKRDa0AnV(4devk&>fSmFmDQhVsOLv1odbPr1#KO$%@C+g?^ zE-!i3VvppUhFx6g@ZoB-MSLnR6IH8bTyEi_dZpd+&~sRokZ{iInixI8GYMb+6`;nyfT*Z$Txc_ZOyQWEk z1#S@2K(S|&&C?S_f^8(jFGVhsv1-vjL-9^~zo|}+wB*a`c!L=Cg`KVGrQCr7f1zsc zpJtUHhJQ7X8a#8E1KtoU$3Hfb{Bs2ILm~D#H4ITL;=TbM0omKm-Q;%xviY)6ZZ=Cv z8w>e5@S`DeJMH71R}|7gbwa+qwjVcNZiCwZF-KOSW@yT4n8FDNVJ`MKmMv#{d@Vj8O7*ap>Ez^`-_J1I0`-^R2V0D2kG;?q^2xmxaC) z%e&SHdS564+5~p20VP@%K1OM?A59Cvy)Y~{(NljMfE^*X63i18HpF`>e=! z-ji#>+sHhC)QMT(DVBXIac;ICyjO`3FJizH2yYWp7hC)vJU)9!l`Tdom-k#lOYCla z1~Q?sb#H~~X?mRP8O)XfwJo!UHS}l0-PRV6eQNyjkHaYwg2Rc_At?M3<)dX5VrbM; z88vQcb%;@SXWRt2HT8tfgv)_oRUF>3!ORHr(+(teUs50(6-QksM7A^yM!$r*t zhlFXlu8>tbW1=(TJ(7n)v?L*dmOot1icRsRd)AZo>~x)tKEKwFMF1U9p8EQ{4{vfS zn$;E6g}<&gb`LdS=X?t!d1WzRb9rXR8p)$^KMx&)_F;eB`_@cM3~fy!l5Q5C5<+SB zk3W|YPCSQ~vmUu&UT2KHBJdo@?q4>46uUWTKUj=PgtEw$waCdK^K2$dQPYL+FKq1t zKge$eTh0%T)-m9-0;SzZu=wr|Ob&JT1&A02v7ALyy!*?W!s6=9^rwPB%&jJmZCuUr zcGjwUpL*@g>9-xK!A5kq`xH>=y7_zObb~Y_GPe}ClggUS-(#H#y*(IY+T}g4?8++* z7o766$_&Cf1Bp{6i_hH8YW(H^`*MR-ENkAaqwr@bF+d1s59MeX?&$SjjKIL8DlPp^cvx_d((2;q?j^gR z(bU;q&a~2Lq&73YzS}|78H^&Q-GoFAQus|Gdtf;r>v;BCZ}zJ=UrTIEa8!n|`>2MA zGQ7^32{$MgD-rw*PL>+>87&{E=AjbZY<48g_(DJEs5Wx2qJZ9A9cDQ7!4_5e{v-im7Ez{kXaHv5VYxA705RfWXo^l4uM!_#CFszBBp zoz3LXe55{deC!t1##>X@iGRloD# zMqC+6(=y$XmcqvP4rgk$15&cE4UIM>#%FCxA-RDQ?Q^YpongrMc%@zMn=*@dYnRW9 z*bTbPv^Iv}bMJc$wY5W@Ce90h@HM#vNa)2NWB;^%rvqA&aS#=J2j&3)H3Qs6Ro4EUhD)8!2N3$(4WY@PZ#kle7^c z&uSo74p#*!SAjG(KNll5^t>_2H;efcD*S$Xr73*A2yIH;$F&ZGjb0Jw5tuiw+Uc4& zJ{{+};*pUV8#_Ry8q9Gbyadu%ZA8pggFL1-jE5$JZ<2O@U;be)@k(T+#&)>lnE9D>%Ul)gA8*%7saiW;oH;524UC_@j6H-Rs~6AJ@ZOApy_caGo%S`hI_TH#3DS z8EeT#oLO|%kV(d)O+{AXoft){a?w4V4#gJiHWL`?x&YF4HB9hekl5{B@6@=S0yN3& zZAZ&Z8xs+3>bBhb-OlCs*3c^4tEXAWz^ikinULvEXWl(b7qKFpq;{=aZ3POIr6V2u zb2SDo3K&tHJpQ(=rFCN=BQD zF%}H_;j6$UuL|PY*qJ${?s4kG;frOEZ98g`en`JmbtOcs4q2Q)x%2fFH&Xby=gh5s zD*Fx#BaRo4tZK${0vgX2Y$ggzDo2FX?(|tDI@7pQZ>KLNPrRDsUH>2oTK4j)^@!oV z+rVNo_EkM5i#jw#Y$gI1k4eInDGeuzN`#}eboe20VvP8C&>V}cE5Y?ugwLaT$4ZKu zF{94YiP|&a$nK%v8uc2#z-d_5k0@^PEfU=6l(O zg}100taCl}=gtIQ8IQ8CFMB^ZV-`(SS3>~Z1-D#d0u?ZMb#2>WKw;}r>&F|IM-WBwl0cqJ)77cCBl)|$ zB4w-9dxZF4wq&{(72>Jq8l1G4hU;P5Hk%7m<^eJZ#JP`h1O!6#8Jq*Jo6tfq`MMys zVHBJ7Lh6n$&ca%*^YWe8GcN%0CVHG@*mz z1m3@j@(K0%&bZI5th0H}u6A=PO4z!KHzs3UP;!;V;yE=K%|1cWO4kfjGF^WQP=q;p zc60czmwJGi1Aj;MF4I6b5xK~3uM!)V+CG*=a_p}N%w`;jxs5i{pnwN1k1P%Y<7V2R zizQ?kduFW@EwtPvw(e2h z`&5#)buw^pdydO+2hn(TDx~)gIXdrcyC;s*OznM~eCrySs^h1AO`1^Vu&$JN;I!WU zWA(Rh=>YW;tgA$VuUhCRvjw21WBK(>@8UNxLS;)D+F1XKoxH!6(|+@VIA_Yk}OwLW!y$unkmYF z&6fpUuT5R6ryBBAs+aeM8#H0rsdZBdaYT@{nra(LPJyF}QPOI5QdaiC8}d~8W`||_ z_VVV42`76KPk|2K%1r6@2dwbqXUS~2kpbym?buJ?DQGs~$lzQ1t?g_+Cj7xhijPJR zT=*MAuGWu0f{Xf%BIUv@Au;xjlwZ32`OaTQG_q<*NAO}^mQyaag51-4l$e`qR!r;5Nb+Tb%sn_2(cikPDRR0zS zhVz)!Rz3dxD3HRxV?&_s-tV?Vf-$PXJtMGZ>@+d7cbS7jPJ8!Jw4TAs-_91g3yxQ% z`zs0io?Q7T6R!6C0m|cWF`qVZ|M@S%P^DtYPryB%Ga$MjkL0)FL2M+ZFVJy71kAUIcvG}sVEV9E42o(|CFW%M^@<)PrPR> z{a%Cmv?m(i_TFp9EWQ|huAmGkU3ln5HXS;F)004LJH9SzKL3{`jojq70Jd07)H9;+Bp z>C)}wU3F*k`H~K`>Nz8NGH+A&&BB%4dDHci!Cr|&YVO_a)`33Kl#O66&o2LJqu7NCFz9CIw7Z?p3Wv`Xn_yi_g8- z_>?7$PA_44UR^$tZqylB+w{g|4>TL4xDa(BwT-!luHPyY(V3-1Ia8DHwmHwBfnqDh{=~aY-&EU`Zmp~ z$vR{k8axOc!eV4>2uyF|uJ7GCChNKhN%!|0!wG21X!Y4QUz*>0cc1W~kM1O0Dp4ha z`wm`Ynn@IAs`Q>yjKLfrel>2VeJKg>la3p&HbJ#ckza51^bF21hh21Vxuespq>_FVk_^tPrd_3+WaJ)_Vt+B~v; z2(wDhSN$-$JNs&a4eE%dH+UIICE{grUhK;w{&LWw%~E7Us}#o#=qZkcR1Bkm^Rn1M zP6I(^B`il6&qRbIiQe0KhQolq~d;EssJBXSQ8$BO$(sEeX|=kpeZoRLd#Nr}@X z(gqvx2K0$i-W;FAepNZS7?E0i&y!BJe*s%%r?GRsS}>aVy_Ye^gVXGo_2l7?tAny5 zbn>Sap-?B9ELYy|7R}}!UI4AyIT7{kp*h@TAZk$*a;?a8S(U~C`b8)^CX{BP|3~|j zx1cY-dW!|T)l%Y%wo5#jFYIcl=0@7#?5vKWV&l|&og(k0u>Ph8w(>fmto$M-^HE@6NgM{#^? z?E~q#7^%4c-%AcoElh6Vtwh_XZU5J6m$Ytp-3WauJ5;lw-0(pm8vj#dsG72swFR>q z+N#a(7OmsI?$m~*8^kGId4xxs(`ey)1R3U&`!{=>hb!#o^93WR(F>jF4koGsU z6RfY^Xj&``zmBYBaSJtesl^*dy4hRz^x1pjQK~q{Y1qr}8CgHn3bsZPBC7}?uv6xiM~AX z+W3mgtN=DF)b2`94OE)Ha;&LjmtWe6s9`)?DMJG36bulBWSV4Q?CG+99L!Nrzl4~* zFDYY=JO1XnCxBwpHIokOrxTNs$U3Drt^^Hu$OL)s=-X-_%pef7l33*2!i|1Gkq;xknxQ0(hjKR;t zi!oIZpD(IH9ulAKu);>I+&;SzMF*S-EKu?IhcIMu>i*BDl%>_Az{QSOCz&I$R6px^ zXEwuMeImHJbXPy=PH{H7h_Bxqn$Z(>&7OWeLG`x({M;{Su%420q1EF1c3sxse)l4O z{zG-xOSK${3wdg@Vj&S*WU4*ONTX1u6l!$#6LH!BYyRykdOg!+{XR;vA%5nvvroyL zhG70Lx-{L~HWhlA;2y0?|yn2F)( zl~`{YZ5H&T!ls9WQ(N1Z+2%RS;bmt-5fK}9Cy?aGwe@1SO(R9L>gqjrMY=K5ucKB3 zkoa;>lGX=eejCTjj&(Smjh9jbGVO4Qgv<# zzNk0C8%bkhbD?WlMRPH3YbmD&8KS*E-Y<+4;_7>g$J#ozMuNP(++t#-#4N4-$Wi** zmQP=g)--Mui|skbxA%9{VPp=(Mr1O2%6@UW109eVj`}A*ALThV$2rtYuWfcaA5gVa zmW^*X)h;k1>D(Vpd{&R;T*;B>C}axbnZtH%i}_8T33%}se3K+eebLe5K?Wu~7OElEC|VaL%>Jgr5hlij zoEaJR;u_@M&<#Y}s0ifzYF`E++~YtvV%yDj$J~bayhWndF)B6WnxrR`BJtsi?JA>B zHgP>%(;4fGQU*Gg(h8{8i}J;Q8fP`=fxIMy*Jhbx)IOCQ8^8~qd| zhb==~=}e_qHiqtTQj=X+U0Cc}$u?15#!21u+0-M_1Be8HLTvnctyeyVp$-S5zo1&*Jh{lhdJn%Bas$xbY+lYZDSEoDtn#RUeK6t3< zh{6KDCj1V2`@D4Ed2e~nGOcR^-UR2(ix=_XX?RM*!A!}xXF=a4%I3x&O@B6dbG*~# z2K*t;Cm>mF$ya{=f>l44_qLhfu7Sy!m{82y>m`Yzc`GZv-@ea=f78ZKSNc4GM0$%M>gXvR8|8kAHFlPrehnSTC`k|hCI>033N{YK zaWJbXqJM4No_Hz2KcK>nS=mDOGT6PU{fZKwY>yu7uHiThAS^y>Dw!zHR=$mxrs2CWJ+_)QAwS$f0~zs8$SM}kc+E4hk0Wv@I^{vi6M|8;`T zGQP^Y_2|p=fqPzQmU0}oZ_G^buO(QGLKHGfa2_MDx>RSdimuYurCme-p7v($dlmCS z=f?w&ts?%7%HGsn&-$5AXDfNVyz3PSL9p_A)neOoQSEg$PT?SeWg8P<%h0ghltH!M z3M+VdJwIsNO+@PD3>NaD?&NUX!fkNnVwA_0ffON1QkIrxt9t2*$VH?;B28~YF{ev; z`l?KaHmj1^sx*Xp>*xFC-G`nGGSdxj^S6&+40FvVpiY&&l>%3DR6dCRa9ZsCoP~3} zKhdF4S}=}m-&rS%v5jsX$i!JY|Ga+3v}OAXgX43Imt4-8XbP*|?M}EwUTS9S&&X+C z#k6`C)8f*>@k^#-G}hBkN?KQ>Bk?j5^u=MrhLPW-8!ymT`e^g-UqCJ)4;$ac`N??J z*c|8v6yrS~Fu*IG^caV75U3{$=$Vk32~E!CRc4VYj4tGhi4O{lk+=;)`94lyaPvzg z=f=mv8}pNC8v;l0{a4j7S2jXSWyY$ZAEpEvEu`EPdqS#xnSHsR+KxN#Q6i3t7p_SY z-wLGN7`1{|xDloKpN6ript%|b=>~6Ee2=LZdO1AqZ9ew zb5DQgXpKXtsI=9pA5{vI*yuPsDiGY>OO~~yWY#&BRr!FsK=0cgJZxA(cGp5@OmnhF zV*94tk+oC5$cPoO)gp}6a)exqJVMRZ{`<<~iUkAsXF%ye$}8l~Fr2)<8f9G^Hpr=y zx=h@9Q8$VwJWx+qiU4AVBdUz?5ZR@8{PqFUNMe1d&%wJ$gOi#WKTdR`ec1BUP4Hm@ zDKJ(uefG=xTAY3H^dhOH?o0V^bN|eqv=z!}-OM1Kfj&=!bY`q~T3nBdA2kzS8Sj_W zY_q86seMbh^(y=e$=WC){kS(XjO#5X#%EKwGS|MO<|4qe2onH5S;x>k!13#cGN5bW zi~|UQq+-lTi}t(}y1YVTIYN3OrMPxu$z!8EKkuxg$kZKRFypS57}ZJK-1t0bmfk7a z@xX5le6~-~mYK@&I3U=}SNI`K^-p>is`0(A6r*;BdgO`09(@m6b96!GZR*x;MexSd z2r4t0d;2o_zILvf%KIV4H@2340!J2CO@9a2k#Pa>R&L54d8=MA@2g^{xPh(RI>Kmb7wX(6Bf^Ti>K= z6;m>nKIK7hC@2>+Mj0OC~`dTPyU&&=1(Uew{IQ!*u+pX*}8=p znTT{R3B#ESnZ%mehqz6T(;@L#H5rM`q z3H^rV8lrVu|4Mw6;l6R{|%Aw-(O>2H~wr>fCYq z`+TgOZ7SyO@`dgdouY#@!*z9LtXH6#SLr#QwH#JyZQsG6NpNgI5?itiRrZO zyJylf6&|@Wto%1}o)kLSS*!>48+yMXgpMEqjv<)6NmaT|nlZM;W_9<*StLN+oEjZw=7j>^y#>kpZhdQQHhJyvr2sBJ}GJc zvY+v@c>~8R0p@vV44ogfJ9T7fHPO7ip)ZcEWFuGK2gg3RnZ-1?iAgjLm6jd59w}Gp zm(S(IWRMD`QiNv=KL1s}pU3m6yMAT1(p@F%Q~mLe7(9nlTuq{JU5N3%W4v+bAeiz( zV8Y+fM+4RU@i8fuz_{4FvYlD!gGUzEgI_Dz{L0f0SW|r*IUyQ;x)7V zRW({2Y~^5Y>L~Z-!mpUZ`gu;)^0hJN)w9zo-obomT<+BjQXGCBWG_?L>~bg6A9CMg zG4;4lmKE0*q^zQcWcdw!v`eO1M8vmQI0dpehAWzrO@?tFr~-m(ejzkzC#uC}#G2p$ z$uPvtM4j^4r~D{x5OeA6IPL4m{A3S7gJQ|PAv;le+1b)s%kf7$j*vRFulshkQ|u~e zDE8!-Xd@vef3Wzp{7baC>!WuOS0?<9&D zz_3+(KF~?4CD{)wf{cdCqC0|>*|m|s(3|od1OW2Vu}N{YmOI&FbUR+t^!3|mq&`J= zNq1J7#U&)$oE{8fdO>H7z7~J+zkmmLi;g&AU!p~?wD;hLxj6Ihx!q-9!b-WMZX>rx>7rhHjuchnkFR(s4mOKOo9saR2az z?hieUno~>#k4H|pOQEsbgXZaU%13J+qmGpzbh)BnSVxEqCRe#3K;d-R{4@!G)N?$5 zJIvNT$UE|xSJJR*Tjk=P-vMF+Im*Wb9l}y!NwLZV8xu-Nx-}5=bLWDFA<4`2F`@Mq*qZ_XA|*c2M}Lq zMWfm2v9|8_?i7PtJlIv23lLE>w09_$2b8q3Y&u(&a1v{X^&VS4)os?uX0HuGyo#l$ zEQpm0D${_2J?a4}oASUk-8A+1c^7O-ho(PtPw)|Czv-*Db$QN)^$t32aSFr)B*ua6 z6QQX5M+Z#Kf>Z^9x{(n!-zKlgOU#Y`b^Hv{0AcNd_<25?+tGf|)&jc#fQCev+_<+~;Rwu_JggZ)*>D%~%H=7U3{6Jc z%6LX}m@GP2X>xQ!BtjU0s=w!LYa1)NbC{Rx^e;KLkHx@_-wQjK@G0JIzhCMmHH zktK*=6`jfi?Z-|@@GmU`xudmVEc+tknkuw=k+lz;;_QHzMi))xR+m@MPf~{%5L-B$ zyR1x5W|_AEkbQ}k3A@Y9uL8C30X38x6Q4RoYJ^}kNe$tm^)mL*YM37IM@uqFSKfx2 z?j!9OnS4*IfFnw_Ay4Rtt~4U{oN(Hl5keMxUscT@?#)E?cp>EMHuqjBBG3K$gBG3m z4;p}D__+jSklKM!#s#mO`(B~0l0kbC7h;zRxrI89f~YJth(g$QA=X``f7GI z%W&m`g3d%dX@F;->BDgym-08`56e%jUyFUEYDH{IlJ?_aOSVfwtrGwnEnC9X^7d4_ zPp$&)JaLZ2BpQbVyTPm?O0p6}Ty>>t$5&iPRx!U@5K)6bpu_teaQ39KynFwt)%xj z^%(LuFdr26*`!%PARCC;x9WKsBGs4et(qU6k2O2?PB)6mRq3wz(%a0OCy8)+*`<>iwg)!VOfuyjCm)SxRUp#1JI}cSHpyFAi7zMIAe~>c&7gB9=DJ0p4+O6qQttcXmFJto$O+I zEEr^Kka1ty(SXpK?i+{SJk@3Jsg%iT4BBWx#_266>2iC?eM(WL%w+K|l zB!%DvwX!F(GuKvs`pqyV_;aDDu;kq!5yD#$FS`mFS_*kF*buaJN2h~_T`v#6(IWw2 z*c)~4QQUkd+|6S#_WJwsS_^QH&ov3DqfxA#@Q{njvRFjqvVD zFKxc42qg>p&qDj4jiidCF7whkTxSB`i*3((tVB3Dq`rXE2a?mR4+u$ z?CY0iN)ul!)7$$AbOCLfXHEu!tnvp`{q6A!lc03!4T&VwQH757;tH>eWeG1B$xnx7 zPx00FumsfIo*QcvSHJ2FA$H2vsU4tZ+BLoJ;a*1fI9I#A%9CkB&)~cgup5Y3h)md3 zlmUxzIDHj~*i5f|zNIk6=(XpwIF83qqa=A^I5q0rzrxEe$fDVj?pl0KoK5zCYkW0* zEB5_L4`lxTjwgJ z-e|alA`>Ecl8`F@Maaa42ytp8nSe}-gyWv(lKW6I zj2V|z>Ktuk31->RG~Aak`fKN4&oL~(xA$J>rQn4Iqfr;4S?|bO`?3sW?!&$W*M{%E zx`O{|Y&&@5bhmq?((lo&b$QDc&%@bwr77>cg5$q@5+o6dlATYWc>-}K##K*3bZcwgXD)^54kcbH!P%=^y`AszsJ&2)N6qMA*0{sUe7Wr6vWw>c4+Z~+G z>G7@&R$Xw2hrQ+RBel8d1S7=LPu$t(U6yZ_fP@n?qlA$W{@Q4eizViF{deyiIJLF;}m zuCn7t?B(F?o(@j_*^h4@YyJMWZ8xtK3%a`X|F>A77U#@`m6?9Yw=q#?P2v%ybg)=N zS#etOXNy{LzMfHn)w{L2nLX!rnpUWhchk)=TqA2`*&Xg7vHxEfu1+#lr2cUiX;J=pu9CAgCb`5xvoNE_P)caZ zXx?$6@*cI%VrH0i`JWLaUHJ2QzXJIRx0l8EIl4McL4V7K#wY^m&rt$_+_Kt{)2s=1?HH^FRTqt z7p7->lroQwVXOmfDOkzEIicUHN>n6H7-g?D5g>Y9&N1bX`dUNi_$RV}HEr$mbL!|Nk?qM1s zkU`L(Dr`O&?4Q{5SqMOB)Yuh#Tt;lOBYHteQS5}zOhj$ED=1rCwe(#){+~@20LRyT z9tkXUtG@)f?Z|Szrg+vEe_-$xC?{;*{eC8WNOl`-3&aGp<$sl`ww8QI_Lp-!+FQ44 zc{UbV;OE785O*`X6q%<0o zHQDX0O%VWd`H2yL(^9Vq{+^!W+h;a)X$#~V)-L3;q(7}4KQ%Mk1)XDVGmOKo-Kfq6 z{pr^f*S|Besrd3-9RX?5ri5PLs@R>{Fd;_y^UF&tyHo3j+V6bSqqtK)$9TG(PTD9R z4tun)*;r~#l){_JUX&+tZpaXFVtU)&^2sZ!R^qhfbIl=cjfU7!^-+vbmN*LYjCL4le-+(jZ5tkz6DBa>=6VFL>O9V%})Uag?&Fqr-90jPS z`~EUTr(q4;wInke*=Ew9{tl)+_snn4XN8tOKLlVTUU0W^bGTd4<19DEfv3L<99`Z4 zNwIPWXFMYeVeI%>-;8RzTHHt^L+8<1GRS`Oncj(`GOsXi#6^`^(;aYoqY&8Ao%W3f zG?Ee8_@cVjYZ?3K77?I?5qH+>v}pl)l6w$`B-nF{0srT9WMyOk6<_#M!392!|>S4tgG!*{%b@ zjq)v!S(h_z1psQB4p16!OA>?M9x(DV>xubmza?jWeN8RSGKhCF!l1KENXsx~fEKI1 zX>-jRrzPD@ByCPpYM{J#aK>vtquXnn`AmgMB)Fl1=Zmy!ewAq){P3>Ft=o6#)@0Dj zR(!+s6bBFy_)a?-tUwg!iO<=7laY#8tv<_dvFp}`VD?+huW@5}qQigY66R119d>Te$R-3dXH|dN&9XaO8d;iEfAT z$Dc*XyOdX9FX}g9OLF=RjD=xU8IXVqGfDS2d2nm?!oQ&D+Z*86d?8AR5jvSkRBbJX z_n_|r2zcEM?U}TPvqFdU2TO&7G{kB=4vnJ0z4AZgXnjUWeEzv=kq&7F|~Yge^-R~dqw_*zCf`chL;2k zU|X{7REyZ5VcZS?>&O#r!b3PHd^|EiTUP30o79`9YIMPm*u6w~SJJG;!F87+F%}`v z{$KGGLZVHYtOPBO*0^KkcwBl-#_)t{XWi=RrvKZ!%FHf8(>>Vt@*WM}Hqd tRYzaIxWy!5@*6fz&5{=9JGylWMHW|&zLb6R5(0ki-_^cTeA^=U{{d|BO5Okf literal 0 HcmV?d00001 diff --git a/devices/surface-hub/images/replacement-port-84.PNG b/devices/surface-hub/images/replacement-port-84.PNG new file mode 100644 index 0000000000000000000000000000000000000000..45284b4ab9b7f00ae1f3e444396404c75fc241c3 GIT binary patch literal 52031 zcmd43^pXc@c3%)-v7B6^T@AEq2IFIAJ7W7h6h59=4bpQZBt){A^0{{^D5}sFI zBO^T8q;5(OegR!|RGt8e23WTUFGy?@H537W(lAP_1u5Y*g_Ej*D*$k#_0JEm(=q2A z0MIk4rlk1V!*uTo+F;u52ExJcm^p9PsKiNB=u73>Pv}p1*iIkt{(K&#bkLq9X&E3O zL8e~ZL27ASLQVGF`@lJ=P1t?;bvD0d(qqkK55JR?4WUv`kAdNcaH=2H2-BS@OuU@0 z^`Ot0p{+Hp34egE=X+CRT1aVUnwzo;$3^P4})PkW$*kkqBw>l4eHe^OH z3wRvr0FOJ6D@y*m2Ngz0Fm45$qY2Zw}P>) z+!}^;A0UQJe!lUlX4m(wryZo?wo;KvQm#nE`TWev@ms^vx5{-W?TAi)RsO_8~bRQhm>+P=~EF+1aUn zb)9aQ&BO()H88=$DC0ZFMKd{4AUi3t5r1`XUW3xaAJX8%J3?6WcpaLa=cN_@>+{#+ zIW;zEzDZU#=&P9CdP}7S$|&Lv_Ni zo$bldJN=G+t`VV#HDN~q{H-BW7f)D5c8b^iWY6{Zt&fxsR2Oh()xqMyt1c@YA*9V^ zf=U?0aLDMN&9nkV|?fH)o3d3Jdb+;kBf$?#@(-uu8L1A5Grx<`WY z{4&a+HqjR^7W{6%sDA%>6u*|H86G{+dt%Q8*OFh;z|_D5NH&915D~1;*c?Nq6;mZ( zyQQ7T5Xt$tP`R^7oo82@gM`Qmmc~oMP9$H*x#07g(D~^MKiFTocQD!5MI;c7qJPtB z$wthh$E&ku9GeibuVRa)Pis~}z5PGY=J;&>41A8Aehhaa_5E)~LF(R9Snxfc(_^5- zUUY&r^Yw}!0B+P^dh{A2L#4NKh@y+?w)4c@wnsno3Rg!5VYl;(H3L~)RDp5;xEd6V z+S+=RihdnbPl0YcEp((`B#}*V8#jPl94?WTXmb(2$3}b!+GwE!2`%0-j|0Q}A`*bK zqrWmDk1vX#2*D6`xjNaVy{egS;`;=T0eO-G*3=q-iX@NOoZD`Zs)n~|BuW$l7|ma@ zBFP`Gc_K5^NIfFEx(C_4ceR(Bu*bc@_9ilP_PP$;<%sQYjIN^EDy`bt-`AWlcGbuY=6d=i8V67yKH+)xU3F)?P|!^) z-D}aGJS&KnKP%CpE*JjT_dzpTqU!zQi6-1B=}q)wF2%zC*R|C&Ce!1U{5ckdcn$f^ zs97ZFayj^@jcS}M;`@NVeg}{<((`d|aa~$8ot?w*=OBP@Gky0BHEK>W5&+fr{i!yf zY04utLp~oJNeK9S))g|};7N)Ch%~q8HKE6rW5r#X;Xvi*fvVs5)Z<cwIJVzIt!$kn+|LdP!Bx)_B1wdy&FCoKp2uJ4n6O%J+C982H!mr4`UT}c@ ze2xNDYgJuUDS*ucOOZG!e9_$%W%JiB5of`s}I_zo_u^Mu4a zLjH3CGn|AM$Y8z-yDG-N0X&O-Dn*CRX(yIe_rbs(AauIra(2j&8?MM zlFppsYq*Y%Wc>jRuv3><2@}4k( znk0x?J_BC+j#X<`o&UroMFg1X=GCNrF-;F4ep1Cg#V|w;zdCcoyGLj$%f^XQ)Xd#V z3;U#HA~9BzVa{msLEEt6AMK{S4MKs#{hHhdS^`*`$qRtKKx8z60!wu5n0CTl*KwJc z)xR+d6{ca5Gc7ax0_eLu_F(&`!TBz#iXLS^!jnu$K&5b9EBz94#h~K900kmQh%fb& z(L%d2fWX-+u3J15L}@j|;tCvUoC3EX>@vbeO>u3xV#Fx5faim4!Z#KHoV4tlJimWE z3>DA$0#sJ`<`w%PP$rGy(6dT7Eez%d)bRv50B*oF8!<$_qd~kLr7wTc0(}v3HjWZj zJ<)G_RX=9?t?kt>TsaiyLxC!3EX~B*@QSPoP=+V)EMc*DYyO=DvCwsp=6Q3x^zMtR z2H`X<*#I)?`&(Sz3h#}AohtI(Gv=X9g=sYK3?%;*O0mU#R7K^lYwCb=*ic-8mKs@h zl{q-;{)9JhY7td>DsjM5g&80@>q}k`ubbWKomHbxKy}j1@_YWT2Z<=0^?y^Oea<)t zHp9Nv9;4WiqAwXMQXnho3JsHqVLugRsjvt7DzM8)0Fd9bC?Dp0pSngwTBVo-!U1AdE~KM?lq?pfwP_MRjdcd3A^?;T zxU8*dkEoAx`NbuNce z@@B@@xS?C&?;IbeeN`HC&DU4!v1?V-X{8zJ%<56<58Vru*}wM%v#iAXf#EuUKEtDh zC~`K*7|8pT{6w%pTz#2~bR|%x#C%MIlh2O~H(Jj1le?cdJ)L!zQtb;|QOV1?_l`NK zIRKskOu8?)$VBq}kcIMfhO(S6J|kd{cI18F`vgo$Ze$X9v_@ zn_!oG4fd47Zt7TO)3!VMNXAyKUCc>PTLYlxV*ai_rYa)mvLL;n!jWMNHz|h|QO$GfV0p!e=L6^oE-ZZejRy6xhNAstV zAuoGBNj9geHS?vt>YklcVJM$}McKGtXlPlvZ}8Y}-9z1se3&w zJm1oS)s@H%7oaOXj*428swCLf9Bo9CVDc=yvx0i(eV41R(>s|T+_lH7PPO){vG6`= zx&gO=vrlVxIp^&}K&8t`_XpZQoY;3lEWgl_Ovet5it| z{eiwpfl_;!g5?Ue2al4dz4sQZ?-sc_h>j(_60%eMZZEWpHP}X&<8x1pMZwT{Pa6tG zy(6WhR0xEZ3p&re%Z|wdN&zE@pWQe0UMe{C{+#g z&C~8(;ar*2rvlj_{}h`s{<6mHz)Jb zz=@gFE~1HRNN@T-wYnjY{;*z;e7hAP$f^FQzme)@NQJu_(exNF1{2Dc<~Wk2k;w*! zX50TGx!P($z_RUw#gu>J%3T^L31@U#vC}@c(A)U_hH8=|jjJ}eTqoB`Z9}y?XG(P# z&TRf*S>hIkMx7LBq!4CPgniWQI=C!#!|4kq9RT$(5@_kxS_K^seb-`-=AXT^Al{VK z*HMdndYbMBSkQm;e2j`SU&}!vk}MsDUEyHtem6Q(^dzGKP_i=SE?zlJOwUfm$52F0*M>@)vToJ&1_0c$A7C3oBc+TNd ztIibaE}##bJ?frBDVb_3@|(@QB4EL?fk^e&fK=<*Th_K|Andcpti1C8z}}WOgF?}j zK{l3qqU)8@NEn_W58wt6^;XcimuIf?#O(!X(ZH`1e>;iy(@Kv|S&wjaw}w=ZwdJGr z2!DAc=6a{4mJ0X1>Eoa2jcS&TgjPt{`w|iPzrBvU#;M553Shtan>|$eyT9BFKT-zU zOiV*Z>=Bh~!}oq$ol9~5K76DuiSte0ou`5Z$M zEFx^h2G&o`Y;rDHAN5Y6f@e}GR^&4@nmNtMm54{1Q|kB?Lr4XixuEZL>=lKJ*ectL zi6gv-d|%JVB&e#YX-v7DJ>&hpkqYxO=$3I_ZmS>=FJ)cihpgeV!eD0`{zkeKK2R5Hd$d8I0(cVns4MBh zbl=*)TRF-Pgfs(LWE2J(U3L$JZkuvaX6&zVLud%Xyf zgKU4ap4YQJ*T#@$*wNegcN zZj027f5b5L@mOL`aVE}d%|inkus74^Jv@8E^O`u7M2WeTc)v8^%by+96WkPOd*(i@ z;Y5a+_D46I?xZ=}5WMax`@bw0MDnfdcXJHm7msq90|4`=oi~Ixo^%N5RMil26XtSUZgEn zg9RGpEI>M^{w?ImAe<5eXP)O5FlqR!Uv72?Vd&iEo87Q_KQV<&lRa~gzrbZr|0qGo6UjD!L z!s+fc;9kib#T#~gAcn5v3H4wiK$y?tTp`ta)Ms9E_T!9N+~V_MR%FVw;PfcoiSqb6 ziwNU>f7R})_P&3i@^i}cv-FQuKE9(Yl5CyKy`P&efShwtB+_o}Uxv_TyF359sR>C}!&k-T zMCWG|!~S)Yy^rq_sogzaS24U3DUh5>_)yqrl~2Cdp7CAPH~}yCW}2PQs9jO;OiYpw z4Lc3WV|ITa*zL)#GC{t%vNO8r^M#R(xPQ|}1?8SXe5X;~2Gz_|3PGD8I|T>u3U*!Cyf9DH^}m>2R6gstNE*U##&O|iGe z=kA_5G+mu>Pw{Ar)+TsZ9)|=?uI|8`0FB|Juk$M8=s0c-hdtR2oWbt|?&5?vxwm*u z>j|9QHv|NB7xo4*1N+xrej(kf=s%>F6^|7yM^GT*lr{cY%(G*ayk&Xa`RgObpJ!I% zzF+3PhIp%jk+6j3Vz$HD?L-ALl;l~a0z2lFw{qEK`El%O9Vjm!iqZOS9YPj!X^%vP z`k+TrALNN9E|-P5Fh41%x{DC2?P&XkJ^yZ`-m=6#ctMSixo3))V9gSA``~R6DzC7mZC#&K0KAXgB>opnj z=|*MK*YEo`y_`u%XzLHSq}`?VVx}_j^BRyH`o&J~D~Gj&{DQ z7pu)0hRw5${PR(XYISNPY>LQ<9Ba_^v zeYOd=)AS%Jy`5R+BlMjy!dc@NzCkAQH;ubtpkR;$blVKCc4c?+_A@BlCJfAXBV!i6 zXd{0TpHiKvW;I=@s7UU~v?hDV0TU{<4CJ>D`}a`z`aZXujsp z3X_qGDlm81MawWb-9ARu^0^uPBo6o>H%;PqOAA?k;5%ad|1Hz>r_#5Li~IR^{1GRE zU@(Csl_)f<%sVWz>O~H#a3t#%=$E#7sB}&Q*)m^k%n4BY{di!Kpj%{YfQA~EZoK#* zB;bHXoG+qAw6y*tsS%?E^tekEXbYOz_-|78BE3B$7a2O^P%k|9VMJqV^p%#z+}s>w zy)PazUSI%OZVSrI&ll`Zk*lxSyO%;BFI3Lix*vt$PWFF%ksl~-+{-K8S(%+1OqMw( z^~J?mhN}Ic;0%^}QU1PWne+d<%q_S5Y6AUOR{M~mgI>=#Lbuq|gb&dj#h*<|$v`K; zHIOJ-Y;5T=dy6${XJ9qq8Qv56!V-tQTw}gsE(yj!MzS)uMzR?t^&FP(0{JPRqnw8- z(x$n8+4JI?WzrJ@BpKd-h1!i2qt}LfPoh|E2n13L%5|$?+NM^o1 zRjc+!9yYPW6XNK>E42WQ+wv1quItfZ%)YWInBs%_^Vxb)0zXmVywX90{==@K{t#|L z$L7QrD;)Tmjs85kzZ*}~bzRx0bk^sj|Fg!spFQt2<8Y3YDwA=lwaUiH%QGqBRiD>d zD|53}81PWKgI$-!Kewim!4>+IfB!T!N>e&lXq)rM@&I}|rWf1J9_m8SLNMi_EYb%> ze=pI8g2K+BTLBzc^N4*D&$XDXNy{){fN+NAej@FBRY?gj=WQg_4Z!&7o|>i6<7FDa zx3yo@SUb@F_i{{UMe@<6CkYeLcm`i%r{APjG4*2zLa%Us|8VE$zX4{I(S*k|f#8GN zt-%lKawZRe-U{K}!T@d8mKg>H`Nz%d=X{&*kIynng;_m=j!6Q2b+bigT4m~4|Kr~g zkgxeudIOJFz90WaO;0pdsdY4M^`491kniZA`U%rhL)#ma?AUJY{IML(IBl)8)sN8F!U` z(|{>i8TmpW7`s$9eVF7rAaGxR_D9fts&Qv^m*1kmv)HG{OY>vzn6~Gg9RG8_LRTU~ z)kL)97r{Y3Du)9P$crGTROmbA<@aawgnr#;v_7RBL(EGAPn2}jbo5za>D@NnKuJ&A zLkWrUkAAkLr_SrcU>|;%OlT*qS`DJ!OdhspSR;vsYFt}Ihfia93cQU>7sKNkSkpkG zHAR5j20)#LQytG=XO-cmc2<&gE(Voum4^p-e)6L?s&C7KHalLSPuuqg=VRdu`~UX6 z$l~y%yJ$k_Gg2&M#+n-P`T*Mi4RKuwy9WQ+NjwFA(o0PdPN1m3H?4;KnJY&v=9!lM zlRmNFkSNQ% zoW?t~Cp)}hs=;_wV$QbX+q4_w`ZaOJiThm1(FrsaUJ;?0!G^3f1b9{kg&C-`L z_~(T#BlYoqkLu4eC!;}^5Ogs9F`x!}|Ao^ilR%`Pc>I{kwM2*WyccOLBtu{p^d3Uda% zsEUyHd#|3&xe;7D`;qNpg)V}V~+={_!YK5}t z?$dvWs;Zftm~U&XE$R8z^cY1;AvbBxJ7KFJ>~oc=OctbGADhCr4SjjyJMFH{O0|hw z4Rrfj##mK7_N4J;*yt~O1iw)6bZR|T@P%0D;^9Kd_?ZiA`J4F6RR?}PW$QrRP8B_! zT6hATv|Ge>~63{M6fcQz954!7pT&Z98UC{LEM{rmBut;WfAHK4na^uzIxB>?Q z2vSou(x}@@d2+E57Hc2n&bUpF(ti57$k_9IJ@snWhHVbYd+;98cDez^d)EFDxxLYW zu#3Plt4}Lq@UnHKcif>Er-QZ>VmeXhndZxB+hUDk@3|c$p~b(R^NU+tk?C@R92Zegf^`?5K`FmYPzIY&@qoG3&=}Fxai{|K}1TaIM zvDX9>>yzm6`1vJ397A}F&HBP*#dn@h!~Lb*WAqkd=I&Hhlqs`#48X(+*{BoHMmJ7r z?QgCvW%>GZ7qCwM?u28#i-fevSTDoy$;cV@eMjS-AsU zn)_)CxLq4?{fyljQgG87k6AGLGq_NE2iHt4Ut%&VP?X$#Kp=^(*Ta^B_@A@SUk*UC zyblo7ImQ~&e4Ki;I;!kdWOQ#^Ru(e4{JNQb{gIChDzEKoN0rf&yevThg!PbM^|_sR z3Z2J`+SA9p9DKg#$;U%1ol3&&m&EeP{$BX2^X#4CrbYnRJ2(EFeH_bWkWbylv%ME< zf?;~b&dL|B#4t;fG|LV~_j^eDi2NP{A`X8aHOUq3t>HTE9`xh) zE+Ju^1iQ%V?d2CNPw4g#h7~j%yo>^(W2Tq||Hp-Yj;0B#n9y#JZJ0(aB54+3gERT>msS zz$ai%bOJJ^eDbFWcw25${E(BPnJ5L$7c2=^ROl7kk4v<9ZLFXRr}qr{pdOigd}}r- zY0h#+TUJ^^ zwD_gZ#=R4=qt0Dc`#5?ccRu@y0RUj!{SC189NRzUEAXh&b)4zB5+Dzi2yvlW4RW+iJ{MMfIsNm+vVvHGI%8@M8CgpSeajfQgyjY$0W9;hhl0ch*-REL1 z7e##|&d{9{mUT1ZWg!di*-KA&rWhd7yk+Tq2ee)qh~~*aL>xw-No@Cc-vGS zMGAj|TYYt97J1^k)gHTQyPkya1=Tl1E930fe$ArkL(lBa2HAdJ39Dqx?3*=8*J2hp z)KbwwetAjrw+5rp+Qn(0`_%@Js}(9D>q~ChqSL1O8O}AqP0w@2 zqk`F-@?*e5LCGG8!(G;_SGbx-GHNyqp&Y~x#);<$6Pflgt$p2bSrOE#W0mYc_hpyc zP>eqd*tIP6v+Hql>_~#7ueG6wrKX{Tt!IMRUHm~pDuX*ny<7~ClzP=4FE89bxU@c) z6tSMWVccmVRU~k-p4EMF0+5k}{T}F!QVxaA_sQn;cP%{}>_0~)q@0L8$_|@@=0@#f zTi&J2B%l27?AT@18rZ0)bwz%->~}b^9#EsKU(aZdH`&;b9q4zMep=g5W16r|Im@c_ zB=6;MI6nm_#mV&fY_3La{WJZe`Y;ik>w;H3co1k$SHWyh z2EwYw+8yIDgE10IjR5Z__ssP1z?R7qo*2@uxmcBx_G!l#8C4gpb}nBZ^v{i3}< zz}^YoSUalnwuTyp?|k^((09U^aoKFG>A1Cg_j0OF+|hw7b8<2%wO5i8)O1Y0D860! z%4??eN;nXAmu8ynBC2@#$4P@oEJS;~cHQ9Q#Q;9ixTu|yF$PmBXMg7^t@}R-olwXB z39PLR-B|auaUa-0&6;V-oK}3;?#`w=-+GlD^U$+MxGoEt`ASpTGe1phYE}gn0_}SP zzDs|1?-gwNrHMTDuvPBsKNCOY70q57zrL|P?=wCyHzyoUzT2NtNGwN##-@sO!pHqx zCu_?eRdnov2fHn#*N7!g=HgFIs0yqH6RPcJMT`8LiX=g^N!Vr2?)5m5hl4%l*Fk;B z)E9dxDLe1qr`*Zz?}ESAHI(LQDxlrSBz?u0O=>bVIJyhl?xVVX!g$qJR3Q@3`1!I< zfsNRgsaYcd4AL+b0cj-1@<-OzvOT<+BFtrDt_@ ztGC}Y08A?kqLqEUi*Q$A5?%ss?7m#vdFr2}IQD`3=aa7X1%*7IevhgSZM~wF1XXoz zUf*V*q;qwktxI`>{=73b7BnmL$_dM;1>cw~`}{71jX76K2>Vj^s7votFsjzR5Zmwb zY`R5hu0sy$mtX}vu5g`XiYy5qf4QY|^d5E@ES_+rV!FcY8H8z^ovv*I^GqnFP}XH> zXq7))1c?6-Hb@vRG^k&@e!*7m@X_(ywq}Y>vuZT8WbagJ1*Z2ZBp3|Y8R4y& zW^XpD_tG$|-;S%`GSe&8k7uw6pGfvcem6FCy(PhTZDCat@&_&^Vf%J_;DUov(@Nfe z%n8$zx(_QXj`vQ%_C2G=LJAAt{XRBkc}I=KH+HSU(TR1E(<7z!^~`%tLyVkZd8HI6 zBEVS>laSX`RUoFvb{4w6TMcitUk!CW4RG}%LUr2!eVJ5&K6CLlHYMwVHd`(2kjszC zkjvT6kTq;OWMGvE(wSQke7 z_SN+L8{?&LOvrl z{3MjRw4Rdqf&2SK#_)F=y>;ukgL}H!8FJbO!yU7-t;1wTb}H*U)4E<7>o+n~6PxVq zH>}y!{MEVnxZmqK2PKjeF=f&As$jgE5uWz)vFA>~eh2b!4mkPC_?v2MQ|{V8iJjW- zD)Bsfs`(&?bB+VUjDvX0A*}a676vdoL@tW~CD$Z{Q&=b!Ug(b)PSiI769^;bvluvIrz8Uw?lBP_S2x@4y0oRekU-PnzFs-y?Ld&-bG(fpIgsWWqN z_BS3?owp6M6VfoQDp2BDbD(63(_4YofOBxT=Dd#%a0C9+=D3I|176*@COkumMhW_U zRZ5`FhJM-#u%Sm;JqSUnkP<(Rq+mv-slX9|fz%SGMqHvo_%mI#6HFUyUPO-T%H2g{Ih zpH^c=X16oF-pNILH zmg%A0Tq$mEogXQhesV06b&J&f@U6JXc)F1odW>;#H9I}m(NB(CCpqLyPK!hqrP#)9 zl7k-6Op9*o8xJ1<#3FC@aX>E@K}d%%f^(qtZV1Y$q18Df+)-=uHHa`}@a`&qN-$%- zijeUB(jWp#bq7$Q{=J8FOX-gN?ITCwR3vTICAek;znBxKDs#Lc#}`!baQwZc!}KqM zA0Ap)VGUrM)xbj?TOGY%jhOks6q{Xv7^ zT(sh-0Dr3SaYk`ZSeX*yRB+GF1-7E2cMMP^2K{I3b2EIwd%s3(E?IHs3cB#>!cEUK zMxwyTtoapu&RVwL14?&Z&3dx2ek4&H{bGbcw2 z)l9JuF&3~1^Oaq6sYD*-=0U|=5AumN03arz@Ohx`Z(MaigL{gY42^ub&6%@r>CA4V z=8jb>Vy#}xn_Z!(347c0n&%DxZEZ88qQiHf0s>1X`)xzEQ0zm{rTC4Es8E>)Y~IV$ zA5e97Axn9ekgYna&)I{C@pbF#zeP^^sJ2xP31Ph5bILQ3Hs!-hgGOB|2$eT)13TI4R;J=Bls@;H;)M;O(9$ z>!{0I{f{nld5uhnSvb&YAfPO06h&tu{ z`bY1)F|WOo;cHJ1$rp_hG7}t?7xIzlwH2K5-cW1GNvBrE%Dln@VZEc;1UQkrIH}e znQ&j(uc~r)$xQaOQdQSWzN^oP#}0)D;+UWKqG9q<8{AGXE-=+;V|}`TU$k`?hIrbd z%(`b$@))xn6=98Klvq9o_Y4n2XkJ7Vt3~nALoz?CAgG)AvC7HjehF)#j}vE63xX$6 zox+R2ugwaiPQX zZow!OzUU#pD2N}Ps+2TUm4Dg=A=m1-z`jzZOZ$h9v|^TJtc)fbL)9|eO5N)^0LiS45@um zk6cX(D>AsupG`|15exSUQYYezo17eFytioc(W;a9@KWn)HKm@yY%+)ETwj(?BcOmH z25i6E{;q5PdBQD_qdNOw^+d42#n%Ny5Yrt_XA%7#EjvEJR9@|fY|W$7K#Ui(>Z|~? zPiL)iNSGI?&)uttmw1!CujW-z=sxNw!U^)Vcv4o5C;)#IL}xVS_*Pb9H(|Ry7sHJ+ zQKq9YWhENrW#c4$CO*I$)2)xB(7LGdoM0z@;aD@@IXTGPb%qWM(q*l){Mt&b&Friz z^i&9&%i?wyp{a0RUn*Vb`2KvCRvV)bwVvnl1i5MS@AApz4%a@%5#i&oHLb?cOs|N* z`T3K=F*hgG%O`atC=UWNn9TyuV|th${zSG+OyYGXlG~pbh>(`a6aTY z#2v8j`-U^fG{@Dy^k}6stJG2@n=p&K3aa~s)K&>O_}rNpq!Kc9gWYJ^jbvC`rLw45 z(TsTfh0U7eHAfc4p@~<}BbP^JBIkT^oSSX5nnLb8w)T*4;P|do)JWdgiP)W~@K71| zH|}Cg>KY?r_b4%SOtk~`uF|}|3JdA85sa&`AHP*kE?I#`9%}W&9Sy@iIi1Z?-FB_< zbX6U}4iYyvBn^HpAHgbr-`>c&E7gZg>Of*$g!%(k()Z&b@*dI(2yfkWb|XE@C$ZHQcAu znyzknoa~oc(9wi`;BoML!=Wn{C{yjhXL7mmfaCGtL z-{>)>WmDzr7N}Pv*2Ym;RJwXX;5tC-%kJ3EtTPnoggw#*7Vn&P1pgakY`nJ_z3Lcq zp7HGlp3plH&qA2v2}d_xHFJ=W@T=d^o4l%V{w2l{&-eYHZ>2M2JLWTsjP7jn+N8Lb zI9#f9wX|4~GB9=Vo?gATca8qf+1DnLwWNnslMEohtL=id2MuV#P>`vJ-Qf_BM`NbA zMl)GjKqFE1fv}M{e_h{hQ>+oY;O^_SXJnfCpzd_~!?%VM5P4JH~7_?|^F;N`+V93E!$J%~ky_~vppH1{Un zrHO6JjjHpBZvVqcmu82KCHJ(et8{g|>VoZ2_kD^M%lOLs#J8P=nD%9_Bm5m_+^6S$ zV<7PHJp^EMY2DN3b=+h-SA!bSCPj&G*eyOjal8g6QuOx=Bc?Wf@U$qp=rNH8xyLuG zD`N^T(IL6@>Qj6;2v3X>h<&(8OknNhCp;XNVU9utALe@V8_Dkg&lSS_cvE}moU1yA z2ebzktqo4q5)niZNZqr;>dKmSTC0}hLhv*+WID(~YAc}Mea=!sbyn!3h=Hh*q`_wv zr`w4qbx>ATXrI}|(gSr>^;I79r-t@N`!Rykv|Tp?YudQ9CSi%pD_tzr)lFA>?O>=C zr$Gexl1_d(JlncKSI_Y9C&!o7*U3v=Mq*)m4xqPw51X5tIXD#)plfS-bQr`M6Q_af zA}*zV|3R>fYG>$-lU*+VO6ZyBx+>^+q__gp{ii#%Pj|?12mXURnJ~RbKrPChXI0Og zD*(N1b&H;FSeHPJ$X<<3^w@`uS+kvOuubajYe_w4I+i8s19|~cNX7U49VLD!a31#4 zG>z6Pq@EpeF?l*Rs`zH^#h2=t>B81|;9;H}1WA27;Hx{^v_Pc1!nNj~<7`qc9)!{O z3wYC_6N?y`6U*4G!zE2~(49>dIYW;{XJfK>m3N#{jjMP066W=#mPy-tAmI+~3^;6< zjq66;#(6s{z_Ia7QbseO7#%o+@ z_r~y{tEr)cuco26^D{$fdtF2M3HBEmK66H|%S`5&#I2g8Y|$0satlV?GmqR1$-cQF zhsD-2E??QayICzghu+7G6b?2Dnw+c#Z1vF0C(fg1Ew>P67pismVay2f?g{cDA~3u3 zm)Jkx?XMp;a}*(?(ZgF=ET*ZA=+Tia+c4RbMz0N?E!%2vQlm5e7vY^ou)T3b2E0*9 zE}*1)y7yiBBOnp8-4XWuZTx7iN<$7jEGX5xe1ApxJHF)tsi&pzwMKoMmz2+WNrP2y}y{L9E z>%O?##bwNs{t|<56VK7Ww$3oj=EAYV+qX|MajGxv2J(_x1fZ)%k0H61gM@HtIQhk< zW@0R-XV#Lh0ueNep70%YZ7ar&=2HkP|A1LhnCIEIe{R+K6lU8Hb<`xuAV00h)+=dF z=CmV;JpDceue+K0L8hHvNE4T!x7Jei&+nc)kluX1DUxM`^Jr?m4}gBzRr=5AG#$Xr zv{iNyqUajnYj}*edFZV=5dZ@oKnsQv6i)QFP zf`cUJKyCXMn#1~iw}~Gy^>!Wp{8hmUui%ZUFBWXWFa*V`7x*c%$`m^t{2XEFzR%AN zdtwlsPF+FcR=j5f2ip^&B6tPMJbaidTt`iF};Ia#gNkrMv8gNJLO#_C!gaDh7Ca zO!Qe7!@;*rK=(LRAJV0%)ck{QMCaKoGkmECLQ};3%xcMa#Ag&B6RyO~r>@#q)q#~T z@Vf!V9)2L41!Q%KK4iiD zqMq%|uc?SF;bL+InH?9h`HQ;U=^xXH;Q}`|OOnNPE_V`*2(V|9f zNQF#$AP+|bf59yJ8U;|Ha6qmT>(z7#=@<$6wQro5b|81)ImnPk_8O=NyqG@$Mx`O156J2mU6wD zx~)ttK_=u!$A?kxsUSC={xF$+dcM}^bdFF)+6*?9Yk_~Mq5=7uX^u8d_-P(jhp-rx z;(Jv-fD~cZN&S@glLDL?t{{aB1(3((=2nsepET@jKaGDYyB%k`zK-cm#mir7KhM?j z&HE#YRlHI#%Xv684fN$&B1YYi-h|6)??#Zq!WY_xPru;zpaQKMkG+FJx%ArSg##MGA|lQe0@D|%(D1lvV`mILV(y~ zYIboCh4rUq%>jW__jdg@OZ*{iT|XfgU%9rvY6r$*cvQl=7M%kR2K& z@&63rx7V}{laVN#@$jibP3Moy9e8OO`i<`(BcqC*=ZDtcOZI889od$$C2(Y7Uv~!5 z?gxx8m1nL=O%c+>b3?N;xkP%- zb#Dh5SX9R)*MLKz7Df59WyVvY<-KO+wsuz}GUAzLiF*0A^dIFE#Z0W)bBi9ad^eUO zzJn?SyxNx=8Ep7!YA*DExPWnngc=Yz0Px2qrhTG098Fc^Q@9NYtASHTQU=s2j(l3* z8O{h^dt)k1s0@u~=e)R`U+@t{@-=iH972$$L05WH+zSZNmwZ@@K(-$X$#T#2oq?8o z3IIN&?!s}d&*NrwxYCx&1>q>;j~ZvH=m^t_)EXck+?8+?xBp;gev2>_uTIY41&acrcs)*XEhb~V>cov8YJdYdTqchSzeMz7itGBTkl%1^AQhNSB-f3^)_#$ zf?17RI8bO2imTnAZ<6TAn!hVxUAL4h{^K8V%ii&x-%T6aVK84)wug$I=&kILKi@WR zo|bMB;Qn}%vYA{7=xZ^k(gW?{BBw72^p{Hm!8xjZA0E!w6eAus9o9h`_YpRS?Di9g zo>i;mU(0vhL?})-*2+t`3FnkG9(t}usMrDXO0Ow1<>dM+$a-{HKo--UR>9>s9VeFp zkV~!PvG}K7*mVIMWEZlav|^cn+j;Y{s&tDJ#24%5aQT42NUHmx3m$I?%BQ%~>Jnr# zjt6;hR}lG?7NkX9T*s@S@2X~4dDK(!&;A#2SWiQR(>6*RHa<#)%Cd$_KGH}Q6V^x` zjX2%0rs{y|ajK%n0tud`PW0hsz=10q4(0zEG*tm^wM5 z`!uSvwGc;DsHGi8O%CtXr3$a9265-(xQe&!#}9L5aThCAM2DaM4@>7A2=yQT@jDmy zEvpieaf%2bBio%)Ia#4nnGv#y>^mn)QubbVWhG_rP4>>nK6{Td&N?@KpMJmJU->iK z+xz``J)h6V(>dl5?=!Y@a0wJZ6Q#f37-p_cLe-1 zxp3M%gYn_Tpor#AK{cJ%yRK}p+dUuwYrj0GwHxf>gSB><&2*9x;%d}_M%sPT2fSec z4qJgsDKj_1b}~^yP84K-fqeQd+rg-a1kXt%lv;EQ=0`n8aGEJy5Sqy5(i09ZuIkdm zzzG*E-h+kIy8ONskS^@}I~CfTNI{__D1x%aCkz^S_tIsbqXtvrqU$H#*?fug&i z(1rzG!VLl}w8C?hk$9hSiaZy&ypHlZfOm%-#-uA9%-ka-_4{Xk?}MLo>T%e8+HF$) z&NP3p&82?Lyo>K*tqmdYXo5 z#Q$5Ue>xhiL8|I0e>MC5aQsdGS{DV8@N)mGaJI2?brrIAOh`0F-1r)=(ap_*Y92CZ zyu4MP_P9pggw}TLdD*+Gsu{}PqwQ393&S?MKp&}jB1Pm)tzYRxw?6`#_M=)^fg5)_J5_cC*YYJE*TpS*LzBzjSj`J}b9mG$+Y$e=%{=a{H%9 zuHSac@NE}^Nbvu2&R~akAb6RJ++(icH5ef)_mo z&J}}YX;Pj2J&keMp#d)2x{J$N<|KotQXlXE!g1b}-gmyiGd#4DaigJAj+DET zHUWR8LQW)dSwnD}wMf$Zz?%olLUKor=d(sd@-5aL(87+ZlE@~^$W7<(ng>RWp@isNm_Wi3%U{3ykvb79+pan(0E19d7QsSCpmVoHM9_-GZv(v?PFx=ypQ|a2WVCLP^P@ka<=SZGwmBjxy#JMl#7<_gBnhLfC zu{VMruN9DwcT{IFkik52%KBg*j5H83$XUPho>&xt`dO=`#v#&?exjZfYgF@vN3odb zz|U#{$-f(S?$$?JzdKle-;m)oAjo0Z_WGhFY6bWpyO78$2y^^V0s0`1J~p~IMop~U z>_k1F<>LkV&tZBdIy*;sXHdg6W0owQ){nCaYDmeJGtg%~tRn%R73V*r55JX`|F7Ke z$Gmn1&qYW6u&KF;1euC8 z$44+@J#iCdMz8_s4j4V5rmVkZhFW@J+||PuAvoqI(CgixoE4%vWV7CPIeV&2WdV^} z?Bi(kjhBTq_8W}i5D#Ab92@Z|R+MAb;SB~MNy7Wlxt%()5z5-}07gRST1>8reTS|O zlh9gG{%eo7)zIM?f*e1v z-SK+GqWohgDkH=e=j9C!P@B1s@gZwXCi@Um&t&;f!=LZCHzlp%qC0wIlC%(^BO`sx zJ#+guZyb1y*lU{!kqA(r^tBR@R{8$6$w$c**`bVj9kb4w)OSOCY(qVYYzCaO^0vOo z@&PYjRLoa;w7J>l4CyL~{X)F7l9;JoG%+=<(B9a7C?>}fv+c72SsRyxCpcH`f3fR5 zE4J6|ZkepKyd%2@+-4V`gcKIUs|MM{NYvl}_|yh3$*f}0FFQW~84SJ}lGWRtkhvc* z6PaIg{EoQEM$m+vbes+rzYQD8+zz$tofug|5&X=PUTdom0PqvzBjs7pdW-rwnE%cl zyGPC?cY+v}%V%VQHqZXAZJspG+3+m$V&WO~%FFi_)>~y2{c?+_TqtRwZm-+F z1e>#2EBPtl9V8j)jJb0pBsKc$K+MkSq*=->+A-R~yWD=HOC?uAVo87kQOf1~Hv*CO zmVVv8F2sGamMVc2dQ83M6qH8W)_fGJkJ7Z=oxguysgzKEdI?l*H`FHnmYprpSMGc@ zXGN`6z}($auKXKL3?9j;fe#Mey=Sy=+=K^4e#1N?GSI^z)n^Bmuk0SNyU3)kvUc?rng^V<*yIXWf9U{Y1njU?!wo7Q ze2sXc_i_brNrJJ}uxH=wp+7$dIhtsGB^u#+*ejt-njcQ+$zwM*MqT_Sf73tCb)Ss} zqL<}$I06vw6`{C~6@I<0qc(K8SLNy+!|GbaRraM7To6moi6vdBi-ez1QcDU-V7P{~ zx5#&pUn{%+x5uhxGAt1bSA#uqe$JKL#PCD_H}{YvII}K1p=De}Fshzxq=ZIbJA&Na z4QtidL+l4a2m$=lr+<})Odn@+A;+7o-!cSsIdsQ7S9Hu|bDQIR9#3sq;-#CPKUQ|6 zm&{FPQ$z|^6|D_%OswWBZ)+0*2&aQ3{VFl=oj}%D^xZc-XF4i}v2yw@T^sPWTUPO` zOz%FLhI+os)Pp7`HT7)D`V6+neyYCBdN&AaJy3CEX6)UsYL<5BeUR4`+~7rRI5P9& z%*9hrx3Nt;I~88O2ZUOsnk{2*Y~71~*UGuNLy+LnP5XS$ft;(#OS?W#IhfNFgW#C( zdn{v+&7CP97IE{WaK#Tl)>cc&t66q`=IQO`zMUvCO$K&yH7+GMEtgI`&t{+fPxcdZ zAmgu-CW%FoQS~@YMt)ReKtAC=Uo;rqnk_jx`HtzFJhoJ%w-;k^+!AW%L~T~2w$%)! zb0VUtN3Dd1>IMFSz4fc*vevu1xqg4&$tve4I{eL)wZ)gpqLvqjZ;R>G?sH_m&5O|D zj!=XLHN0JGAulcRm}=C$U6ReVwm|oM7+H(bn2CoUoJ8cv^eHKh(r8)&46tYxgm;5% zF{mCjRQQ_(sm?Mj$qe&&bVYG>R#u^gRe7<|Jg)?b?6HWMK(RIVFRRHY}_;^ znJ344{|r%OBS$8TcR5s;Ck6ao$6;lq9xloZLwhIRLYq_{e;ds% z@K_2&y-e?j)w(iFU~7}9Qn=P24_%SwjnP%!T1@xY!(bao@7rZ;7eiI`&gJc$DY9EQ z>vIvTAoDCuTB>5@-|nr+XAmLg^sM1)ra%MZa>;1P>%bN_X9kqvCoB|pW_8SUIsu?q ziLZTesfC-mwJy=S9^Wc_1jb#pzIGo>1YKaO&+F8#vmgC_3Nk^tl`zx&m%@Z8@oG4o zzQ6bC-Ec_q?tQ<*w)v(D440uTEsWpkBU^+njCOdr0C~S3h%l{Gg71p*Ac{*{HFjes zy@t?5ad$8N=+uZ&-#?Y*k0^o+eGLJjPZwD?Rnl$X3XoiNRz=yZg!W#_;dB9Vh(&pG zVAD&@2MS%<=wk04bgGy(nD}t!LS^l8@@O3ne@(Bcw>bD--zzQq@2Gy2g<)CmotIoD ze2)gX6?O`vEb)on-!r#zLioR zqSf$UO1*dcVn&+slCg2?8A3pn&A{mVRE6~M8B$-bwXZ2deVELuvSLuZ{35AAF^JWo zf2>e3;_O5#^hoem0>mwsfEr}A z9V4=$F2tBy_?up3gg@OE_^tYrUYEoFAC+Y~kKgQ!$XX9B%Gxhpup^JT*^Nbh<-(OY z?i@}+KRV>vPPB};O3Xa2&wM0IYG(c;@U8AIUBN|EKQjAv!Ov=m z-zkiqcPK}1JBk>!^F?H^nx1hb(@=LhR#)L`S2xdT zj@fA&0oGI28l1+rgS?W0rCs05w|!vV7*w7)K{6O&wQW;<4U`lhmA|2^9sGnw*-J1_ ziz|EA;5YW0#{2Ksxh{jb$l^VqLkhvi%Xd48i4^`kDSKtFpl?(--8+CZm{1>CPdzBe z7RHhve6=Htl+1N)t6RD(owdqw6;E;xE z*Ntz<@27eY_ga0vO-kx{aNT3&j(*CMb{b1BUj-}gi|^ZYoFfMu_LTaMe=B|cGT1y? zxEC^b2fB@Y0Q0%WV6BnEE{GbIO*#-JyxdR{Tk+FZvRUd<;qSj0L#`~!c;mO3#=`CT zC|T~UB}2_dSIN^cvhLy?UdayF`C&wN{LRiaN!|UG-mVjq$PX-?Z2MHdxQ(e)+nh^1 ziRqJF_$X_PQ=Q=iE7l9I$aTJO++QIGa+oZfaNn>8;as((;}eO#1}W4Ci;a{0FQpWj zhB<2yc^0D-F88=!e+5+}=elHc8N-S^+4gEksozf{#A?zR3h(EzCUs;uDHqxP$&X^a zsJ?DDn0x$RX#MO2i>Tj%O~a>FEwveSRy=mQZY7`CNIA;Zl0Z8p%evj&R);R4BN3Sl zJkc|GL3{1Qyg?VrvP)*&q5oSS&u0tgM(G6xzmu&g=hJvkZk5$Yrp80< z-}}cN6S*nwQ(l=+_c|5wtoquzSV8Bk?H`U@;rJYjrH{ptW8ko7b!O-jYhdDd748?2 z%7F2C-PcXMuGg>|KsBO{(bA$<)C21wEH@WOdFWHGJq@Z$4rE{1t>Y^+6WkUGhGt(7 z2+4}k#m5HXc>$S79g(`-he@bXGaTe37{_F=Ec}24n;(Jy&MSu73YNizD9~lF$l>q& zVf=-NymI!oGFAA|T+YzG=b?7(1utR51)~;T=WVMy&o=9FKa(ONMy%u=Z@@luWo*r( z&etbBZJB(tKbN>+_m@mITajY-TJgQvQ^(05XRCA6ns;jPSAbFX^J>Y@Y{`|Xp`yzx6(~eysf2f;DpPz6Z$Z=Hqz6U}X zmSgHQW7^r{wg#;khwO5&CiOQ*7s)?Oe6-g*%mmZaLw2LrWWzWV&DmDDv3F*^a|YIP zaS?l6ps0OJJ-uCepPb(Vz(nzqZ@@f8ZYj`%*fVa|*pg(|ysR~ZPH2#)G<4&Q)Mk42 z@rl{}rb#wSotIZrVirp8_w?lY-0gAGNl&?RCw;81--1A9dhE~JI{RxYd#PZk%pqKp z;NLE=R)RfwtR$n?2qiS=F`#^|b?{ptm%l>x-&!#E8jsPKjxl9q{~b&aaKZ2g)hlul zRpa4@JwyK-wFaZar&9!ANEwu`-z}rVZ}-Ps5?Q?pC14qrc0!h#OjOjNye8$rikq{j z!6_yZUnL=*2qX-zqJV_{%{hraHe*NEUdP6HT!jB(CmnISa^cW}da|;7cD9cQjKLL1 z$5IV{lvob!57d(X?F`SVrNF>}&!aPkW8sA&O;cl0V^fzvrTSttrVPLdqGHwfu?aD_ zkHB-m&I&q~*y{9~mjK(%IrYIvrczcV*9HR@#$|2`<)Hd;T|_6vrup~}J(0J>-bd-p z@Q!p58^58olSmMxlJsLZ7<{o%7ePGcyrexu%LJ zf1cZ>MQzvg+v_m0ni)F2g0k>D+Vl@>0BEd>NA^C?FWu!`MaktFCK%XV@vq<{M#Y0) zk=~!33~tg5dE9l+`Q0n8E{n;#kSz{OwtToI9aPQZdep11D_el4A9%)GGIt$n@bgJn zd84G3U!yT|5biO}o!^Uk>6w2DJ`q?SpgYFgK)swA`%_iW(}Qyuj<;za~@l_3-q)&8eFrgRp`4j$RaTj4{@pM zaWDQrC#a`ePvD{;ILrs`D)bqaa{9pN1R3RJr95C8e#=NZNmhh6eda8#|E?nA?37-I zj||80Ywy!Zr_(n^&x0Ye9bxc++&UHaxX})m#px%PVZZ<6sH|XX-uNxUpH&{xq82ZfN5BXB3*X~Xhk=4i#MW=0BmY)?Fh+s{t25g4kObd$HW2jMh>g;!CrnuGT zysEYPi`c-Wfl$LixPWlx*Y?!sYBMgThj@-vW!eXEoC|(4S24nDaLw-Io3-6^k#Oc) zVQj2!4=<(Iyyr6XI9+A$S!|;X*cpIYb^tY5&~wD;Tr721T$Z^d>OxMSH5Q_ z(Egz?3^MOMMr__;Mfkt2-fiRV3hRV-FgmynXk<_p;AWfR{clb~uF43pI|ODUV=rx@!a!#9ckANQJQxr1HZ1&?_8r zQmnkvIOO?2`n9(){3~GIV+hG+MY?NrQIl3tc$qUGj5f&htJGoY0Z8iA0Kr}@2qsFMRbo=U=-{BidS%i#;TMbN^|+6%^nmnK zc*MRcQ1?>V-n!~Ns64%B0EDp!TIXsIBEPP|Kbs7bncyn{Ut4pRjF1XkWdxrAOd33M z@0NmW0y7CttcXNBWmS3Td6fhhb+HCq#gaRA)caP!qXXwL5|@y3)Iiwv7+n5B|KA&V z-Do0wZ)fsTrfb(?#voq-HGu2$7IuN_8D10D6Vid=s;%4KA|PEV53895UPQ+MUM2Ic z43qUwvAnASQPzwbX=jMFg!!_%c-B-gi3UN{-N2))7`=(djW-6oW~n|*Newv1-@Ea~ z_|*2kqP1D|7lZXdEO<#?*ID@5fC`=`racxQ^_F4aZ#M;0)XW#No<~H@EI*;hPl~3~ zpUzNkPDnIfbk-~2vX!aLBSks4jA{ce{%qd0IUDcY2jreAJTM=Db(Rz|^g zZx$QaAMjK?hEc{!?r&@K&E@pWPQWn|abpO>MpWZaC zEw014To`$->vA9^Hh5v7J%_>yOS1VjohXF$v<4pW8bh?Y$}D^uYEH+ljXYxaG=IgX zBs)84TK9#5sCaVCEndIoY!8xyd5kW6DYjH3Xn5i8PjO2W<0TJtbfJjh3(>I(#NLiB zfYCH#BSx+B_^t-h^C!MWCSvNF0M$6qTvyEeXnemSOu44Mz<)_=%?ftd6hS9j7sd~&NYpiTB-*L z(my+Q7I(I@NIMien<8@2C zWgF1YQO@&w!QeCG{w!u6!vu1#S}w&%u#3|KgB!6#RjYPk9!*%Ig3{3zk9%`h3i~bSyk~9hPF(x&h&ZP9gH$Ka%j2h`j@kP&M+zDZy)%$b`9EaF+ z)Uv=@YDxdi!TKVrJ@3T!nJ+#j-bXcjI!DufUUpj1@O4v6e_T>ibnE`muZk%Hc%@7A z-11a|S*4TCu-|abkrv;tH~xSu*fq}+R&WzP=7m-5I`uy;yhFbeb$({24KM>Bi1#`t zZ=@VXbop@0lp}{{j(`Dqt71BND8;}L=Y)DYdxvXynanG<6S+r?+2)39*Y3Z^>G7GQ zyuEz#_P|83l#PY9Udb!_9M`v}{7~0+KI>VsuOa7t!}WU_$65uwo=CpVIiOb#wE){6qz*74GIZ)@P7m*(K&bQf(O=7qnxQw2sX${&2wrBSWJL(f8OaaI?XumtN zX*SiP^IoxK>!17YURup>fl==6Xe25AW~%XKUiNY=Yx*q_)15Zsp*CZDk{Ko0D|@E$ zxCpq}YnPX0-J6nSl>-1eZ5RhvtxeYT{e(<5xpWh?87|wjr10LDfgj{|tF?`}TMv-B z)z#TKUxfLv_?W=)a0b*+j*h0o(}IVD{us6txG2{oo~h%d_DwZdB$&wDgRwduP#>CA zKhg`aJ}R;bM*@`i({cmMw?@qTdk-oq-vfW+78bGcr^ ze7Ey|z9Hg6GWDJZ!bN>X4RsYo>JESi)Q}#ctduKKa zr>^^PUAYDS)}+}$4#L9z>blYCZ#O6rd17|(!zgYm=x6YCsrYp7G8aIblR8_IjInwv zT~j{RB`|@1V*WZjqfV+}{xem~IVQDedAnv?JECD_dW|@wD^i}C=`EnaV>UruUDE0f znGz9pk?4<@E|dUPf#qYqbc@0~UY1HrnT7ytlE<7Z#fqEHnO9w$r2rWh^!>r3z@s`u z9rdlt4OI4X=pNfo6};GqEJJilal>OTj<{OVlZGcGj>3vJ?`wHYWiRh}lHIu9ki@#t zj(au*3X@+QC%i4G7_*dk@qT_Q>d)eSkx-a&0|@0vLi&7eUw=@a9?);rQM4nrw?Xk} zB?awtwex&EX4eog?`EaV6{J;ZB$J^CELzN5O5zxX5nC@|)1WYDz%74Nm*df$|7I>hBXHS+T2;^hQTGrCP8Wa0Vucbm?8nL7xbcJ;#RIGuz1NFX7UN0n2 z)ofl8#==KVbC=suJkb)TV--Hqg-~)8m6(IjX*jKEFvh>t_|uxtkT(BYzdwIHhy}+X*i0IFKf2wRQBk5&>TR#GP_Jl;ldevQjb67T8h{SlNrqRGM1kB9b`dnE1g5;0E>D_&BPhi{_{7{&z{UAYx4UxUAv*esu| zM=I@~4nRm_2W~M1nr!U=L7)p{rLVsg-V-A|;58gvWW6w~c+!mkO{ME zdM{e2niIxez$&=)cl5ZaK<;*E@?)av#d~bb%J+QY+7lxM8q((NZP8i14LkVfVrR|W z=jhjx$+{q&MnDVNGMvCJ>S9%PgBQ+qKtNzP%rk#uuYG-DWJ9{36ZWb-lPw$}2T(ez zVB#W!FJP8}0UT>4e!aJs&IHHEW22kyY9){N7`euF$Gzeh%lOMM=Jbm2Q5zL@_V?NL z0?B2jr=hSC`};4jlRo>|U+6c-Jw_R78fU7@@ZDBJAFPaW$~K1^kEh48`^D(2pK zw6Z5;0i##73WNFcHfbM2jbC2c#&wYg2&0AeSaQ+A?`Gvn@7-pVT!`+3V1n?`{kI*? zBe%DcjBlD2e@D(vLr?orFR2|X5h&|I8s3U}4NiMMht*l=;i?PJwy-v+AeBoyuc=q1 z3X*z{TO_ADj1~o`l6?msC|*k+D4cu=Qo`;n?AAB>Im_i9+Zug3xbJheaZH3(SLB*D zl~Q{f(dKe6M;Vzx&O6=%7OVkvH}S{+3QhL(+lLzyn=&<1QFYzDD_xn?FI+{Dn?QvN znpJe-_Nvi25=Nn_6<@O%~Gs6p!E4L6qEUGtn zeQ_f-;sZy2B2>!giCn|K@RWH@g!yohp6bDz%J|Ql>!ugK-BApm^HGDz;^;{qZ0a}X z83%I^2Ss$7Ah?)^W+2mF1{X}D=q$kGsrgQywoSKFR_=ZI@#j6KlQ~B5`etSphS0>+ zX=A%pu|F8st+E0wms%?G8Z+1DslDZtu(}~$mpXCNfa#6yMN+jxzGy$*WBH~4$W^roN;(h&2{y6g675)RowFfW<9ptaG0aUUNy+To#z)9n9+0!|LUapUR z5Y$xed!0eYlb_V}_Y#LSg>PCsYJb}5EV;VSFG#-`)0}k4KXY6n z_#D@cz^*`Dg;eEH=2=grBDwhT!?NRr3>fA0nqekY9`9`>0!8#5wi|QDxDu~Y-{1a2 zs>E^B-3%bE#uT7>>FIxhQ2By>cxBwV0jrXYh3*lB8uZo&y5i&Arct_=VloymQxLgR zI4yDkp=#<%J+aQ19MT2y6hVJ|y7u_Z^$E|Y!%<#ZegJ&@;W!Ex^$>!}=l)wDvBm|- zY_K`_K?jHI=o7lQ2P%AfyF8jhH-=Z##@r`=RXBE*$X=sN zx>u1|<7uuDwI65}=*s&hbNwvJe@-y-@7yEB&R^X{tcvZxZX6czvlJvx;4(K)bXMe|Kw&okq$X-rU@IUPzkEf%deE>t?+Tb zqOkqF)MJ0#4)5UX8>KVTL!URaX%Zrca$i|auv{K4wKyb~+DyCI0rDR99<@5(vqD8N{lY5z#>lVFg;5-rD=lLn1ga zm!si%Dqy>y%BCrPW~Paq6rIbBUaozR+~|xnCM3xQ1ePpJs2}R`a-6LL{v+P#r z*$nU5v#!OsW~z^4wu+S?K}o7Y#IH3&Xt6$ZI=EsCWP$s1=7yzMFtXw#e>IFl{xi4V zD{Az%L}T|u6FI#QW`)X@hT8*BR~;35?OZKPg!uINl{>6TKNr(<%x^A&hE0s~Jjbss z*T?VQAGFxBPO%-yj~jN(M*^EdU+1iZnIk?;^U>1ukuF8l;EOOM2L9uYlcp*&@#H+@ zI5F^d`8R)fPmhc)%VAHi4RHDxqJ7-UG>d*oefO>l z*?e>0vTo{`1MCZd*=FJHq6?+^X}wv8!%+2sVnBO=7_PsvvvxTU>IilB0z0ZDtMVOO z0P#=2R%NKsq8nad67hCe2r_AxS>D7P4!?O0Om*%Bo%=}Fv1zjtr9%B~JUM^dIC;e( zf_0g7DrXNW!oB9oXkJ>>+t$BE&FV440%{ka6T!sdWecg>|fEWRC@cw7XSNc!)x%6?#Wr_ za`oDRW=MqE41zL*IQS1j;WiyJp*yZGq3Y$ZR*6&qC?@S2Dl z1rFiLNDXU)#ntwyZ4pJ4+?LODB#xVA@ykmEv#nJ_5}jMJk`Q%^dpY6$467vagZkrs5j#)~0sdTm!@=E-nP`?BO) zTtBWaJ3`f5%evyGozWqeRc@)xLfJ#WEIx({8cN;HwYDsL$XY3I{j<37 zaGqG`01%3Vt|dF2#p_) z7_TBXfUbg(4>pCoKq-bA>_8$#%>FqhA`@uPdh9RofmLh{1E-=Mf&CrNj~|M6pqM_U z$X8^2Dt`2z_f$ZGYS@qIPZqd-v>zz_J*?dEY&!Pz$FXf+V*I{T3G!qNY`|zh@a#{0 z3QRa_P~!O1`02f_l^>Kb;<&>W#OH1qigCcpkwJt64aKf(T5i49yuL8~M(EZp@Q&TW z7Cq_@gIoXO-$@069BoV~RWXY|*&Ypj61kv-A3-vXr{(73Xc7NbFt z+$$`T%IzdG*8GGLr&F84LQi6_$Ip_+0##uA6E=Q#V4YH-1VF!y32atf`=IjGcnN@l z;1f?5n)j%(8~I7{KUw@ACG(3f;^wLM`eqK_)gNpaacW{)-GM*l%YE9c@Wubi{iKg8 zi~QB_?)}qCs(&BoV|58Tfl^))hUW;BSP$Z-EUr|OL^)?A_!n#>V!r!N@`5|J&J81) z@ZynMbETABSIb$u*1fDX?PWe;r-zLDH3~ujWSuUwuT|b(PVvMPT~!}LrG28|U>6VC zo_Z@e7Qv*7O085GXPu5z40QZE^F8{oW!Gv*|74-(33^fgc$=)>+u$m;uOLqA zS{jc{Z98_e+V@u~&s4SPSv4_V2*WJgF0d1~cueCMOj37h!_&>|Q7u0YGU6oGa5Pf`Ip)Ag1oMi;@;JR zT%IoKrYqzkN#FUJpZ1q{4sbd@uAvd+1H_nNo|GX>g0W|`7;^e72+?0w4~+!F1Ev;Rd$vV5o`(^%Xi#78AdtZFfcz zP)8Z}2fa-AdVb!`dRnZ9m2@cgdR)}VtO;8i9B2y37TCkE5WjGvysyBIBkzsW5by;O z)WB+>%hH{mc;XAaQp!3~)kHf&M?`I_wzh>-@BD+iCUw*m3cb6LQy$u6Xw1cgy#9d| zW=0BQqXQ{;zTKR_3<^A8>BfBUkOU$o>RoXur_VyYTRMJs|FKI{O@u?g2m2bCyE5-^ z9dU?87DxSj)^pV?%=o*vyo*wiX6YKh*AR9^hjj#!uA!wF#kSNpTW+Mz=M-^>Oi z5X>FsG|^r%vjS_%p1(d+FwzHW*Ok7ZcRupf%Qx|H#5pJx`jIec9mW$}4E zbz(USQ~#RHY4+jP!thxQ>Pd9Ywl!nRy+%%S%cOQ58!&?y4JU7&Y323|5^`|URBj8Q zwv4};OU6a0a@&P_#mjanYj@>MgK~joC0^qP6}sIZHXSfy%C%Yd)v?d9JKo0~Dg%4DL6oDbU&3gRtx$!lPF*PafveNa zq}1vbk~Zl4ML69D+7S&c#_NrtcY!WNY(vUhraxnqnLqni!d8hH{!dt_zs>j4%@4=- z5FWE%jrYW-?kF~#F0uMeT(VLywm-Em&Vp0DZ7w^!F@LSOZ zhVtDj-T0@n(nkWDWr5U$irrwgZd&97eFx(qY*uVm!hD>r{-Auad$~6~>f-jzft8!n zj|j;hf8v26GU6H!=FCnG`ujGfe(MQ=4&`p6s~7g~2=27WO6px!k4TO_yaJcttzX_O z?av~Jq{y(=uRBT7p{79-Kl1^tbue|@&PL)i8UQ$8QsY^sMcvaA_rq*v=}B-}Re$DD z-O3;0Y@Jt@#thZfSA)-D#*;R^76m2f68snI8D_92fz1T(Ny-{8DKUo)e+E-Ivs~>c?UBcMexCUBvd>QQR@1Vj3#{^x@$7I*G%(5Lh z{QcQyo|)qA*K^bDjH>{pW|r*U9Soe;lo2OO07mh9VgFT~P|&URquw5$ese-qL(#!R zW4>$<`B?{;=);+#xAjnqQ&J}f>uGQ2iBRI|&uZaW8-fzDU6t`lmfZAI|`!`+m&LAij0L#1GORJ{_)^ zcnc&j4jrMW(K;$g<>>)4DOQU&vRL-cj7-0OCNT#1H1P#A@2^i^Tk|WtzE-o_CLiBh zH=fkGKK(S{^_Q7L(JU5*y)imIzo`k2@g>fz?dL-kjx^~T0j_*Y$6p(pEWy# zdM6tqt*Dz!DsOx_>ki*}Oen6z_9j7f($m^fcP8N1Q6;wAiSD&B`xq%dbaJ@`nvcAk zd0)w&0X(5+ns~f8GX9eRAHrALpv@1Xtq!dX!Dz2ZJ;Lc)SkhR@nqj|c8vJC+aE+~B zb=-o6FaWv?P@;$cp;Ov3mZKtKl^#kOwWtmQ)>CW)Kc0wv(t)WxxR?V6-mU%Du3M>l z++#Q=;GR~qpklFY+{nqTHs?6lkoDu{Jf`~D%h&Jde$Xwt{r>!?3am{|jR(ix z8ULZTKA){)p2^GRKV@hxVfKoBdMa9|Y*nAF?b0k~9`JXF_}t0vUAZskYuT?8VOt-g ze!KI@1LpHr1BsLh4yzss(10aNWA9xSwqLSH?s0bD@%!R&>E>yy-lR{#cP~w-u_ub_ zHBh1XQDN>W5AzvGaomMff$QRV(nk5BmrlLV0)bQcNXgW$L0!Y$li51k= zB0WQxxeZ8XPp|X8vmd<{c5AR)4|t!#*+fHm0)*&L?`qI=wP6Xqd?BUJ%$?}se|DRRyshhU z2G8gFPhYRV4L|vO?I{}ntjTC!KtO;jjI9@~Vpy^k^=&`4_fNo&5Z5s3vj_snv zk)WB{g9i_-?cm22X?5i6wjlm9|V>w zvbTcZZlxd_P_2a>QWC_C(9gb+pz;zup*a5^VhKLldk4B{bQttXSA9Zboin-~gwl3N z#`T}#m7-Q!DOJFcbHl(dDu;coO;~=yL-4LW(wAKCmO=Yl6b-S5EN~x;ue_HMXV#OM z_IyfEXoJGs`nK35EvoYV{JR1_LiVUfG(rHoa{UbX3(Z)~)Nz;x{jQ4snc$W?I+G?C z1YF?c2hZ1PWUixh7sn!@;*zUCW6FNZcF%OHu~KyP>s+oE!Wu-;weBOCJ)CTSE`zQ6 z6`V`=c#UFye(u_87UNJ{f_Zdbuemsz^yMk;aYdlL#?+; zH+Yi*fsM27;$@%Xmv+NDcYG`+T3y~T>}KIrx-r^1tO9~1^eG>G_Bec=1E53|>rC_}{QZ?^wK7Ak zoN3rQ$3B4MucwuhZaEnrGx(l!EPo}Kj-<)lYReB`U*3=SEPfsK;Vb3&E$7+uoi1@~ z1+2Xu{K;n{&&xJ`q~__1=pDthptQwCl?yHL;=S*AUJk7UbW0SBw3o61`>fP93#^>z z3ui~t3;VfL0uRHg!!NRv6GBShNDmYh8xj1ytbLMt-$1kYhE8L_ljW5ss@w7|_-DiJ zLWCGSeCmdytD=7E1xG-btW&p!dv1==_2kZt6F`?F@7Fn4S~x%lS{K*hq%#O1#w~i} z&hIY`HYz$Sk2)Iip6u>|Uq^8kKD^C4IP=lL!N;k%GMI6|_5#LG(f@lLp^hK|%BSI6 zPzye z38K`$eg8pM-28m0g^F3bz69; zXllo#a4SJ-MWa5eefoCSoG5m$O|`2@e5#dgcRV+6`j)FBi@BD zPcJ?3RirCbK8l(8E56N56v>e$5m1kyj`o4@E4N{P;G~_#K*$jKbj#>)Lsn>KM(N3q zvKtSlBR@=(zwd>`oZsF}4?(QmhfgT(u{mCdkB}4FMKx~O11V(KX%Psuc^KXib1iPO za4Pb2GY)LR@EUW)PepBeq`>z{6xnSi@4E-M4&?90S@EXcnRO@ZJ+H!Wy&q7w?ip17 zcYE#^O$ZCP0i|_PWhHnOtKYJ|Ue&ge@m5{`9(q4m#dCAD$Eqvydfl$i{DPd2-ul#o zh|aWfUZPGvPO{XAWo*3gKvNZ7x9a#)>FzRg zFrBkOoHC<@kNRM;s}@DnF|U+hJ=_Fo?qx4|d+ey3_X}N)A}$qVZJ*eEZRI_o2a&$P z{kgcwuu59}H7VRD)L~K%U~$3ky?`Dw~r?I%O28j77#^8z4^vgD)rrq|>)B-NU!OY#y z-&V4OWxUBi*MsTjCe7esRSW2B5#^drno`{Gg9cftl-L)uU0TlbPyQB${_$E!+AHDR zow5KPU>72KXH$t6LaHy`QneH`uK#Lnu(-Y6VEbDdIrx{9e4l4*k&jJHkI9b#Xc1|YO6GzQ<(=~%>ueUih9pQ5WJz3@e zjjxMaAJ+`jkk8B(Ma1f)|yQluLL8IT4+q+7bAq(%%%8l>aUA>BDh zH%Leg9RmXl-NVdt`~98sf8N3i_PyD$_FC)uT*&UDogx_~22p|NRbO;w=JM~yO)!no zgIy6~h2w|Qtx*Haj+s?%naN$>N7lP%*~v9@PT)eQ{`-*sjT&HBBWvY{07nAG##wen|n!6UNW*K2re#a_w= zk<$M|n9sZ$unbOn!(pPtAe1xvL2LO5-kGOMcHihc+>-oeZ$EZXc8JBLf&|p?>0;Kh zqPnI%iA^Dk)Oa($!rx*uoJKttmr{>AlG&whLQApQsxIylg41aNh1p#xW-TScL|Qlt zAM0>Y#q>wvLGVsr;oQH<_c(|+>;KJu+%4Di(<>uuGA)bCiuX}~nodXxx2IIST4|I) zVpQr=$;d%Fa(ZD-HMpy`)Zww;B$K{e`m3#7^h~>?nn5kArze6e1Llkv&WvkDY@vs< zQVT`^j4{I(Sr50=@58H~MPyMJb%CPNH!rKEKzoB@^4@04HzKK5^PL@C$ zfv4}!BXPqsNX|IT);~WYxKg+7;E$2!4U+lJS1(G?W#09T3JN&KDD2zCZ847vtvqfy zZ8~EA-s;C}>=ckYrsMHSb|<9sl378~NQqIDHEE`)@pC-;B$>=1v~%L_WBo5qWX;D` z`FwA}n)OYW^pS?2o6wfdp9#qYoZq&&3MWhNcXB+I9~lrr+Byse{q=Gg5m9}Z7q3U3 z3fXwGxMq{=74?x^FXWnP+}0E#rh1N7ODkeW^H?~H#%x8F;9F~a2Pah#rv0hB^lGDJ z1QBS(n$q^>ir=uAn^Dfub?$vK-tTk98EZ4tRCH-Yb2Y>#pV`-8>ovVkLB@+V`tvvE zleJAxW2}wv+W-7CPWfYyk~Vp+<+B#1F7Zw$ui?0a@7Pb3=|)}3&O>1A_&BOWklw_S zM?8+^qVr)iyXnyLUWn^WhQ7IM2p z%=+SSIfLqc>aX3HU$on#)uBAmrjnywKuc247cvdoEKhCapnasZWQDQhvd6@h+U`)_ z*%cx^Lmp%ESBRE%_-rW4Wnn$UjYCKt(PZ=#Q7SuX$(^_la^V_bcI)A58 zW+{5iLtpE{rbF4YOm3gjF5ZQcRjzg9%B@7{bbVX=*L?An{F3EuzjV2&pNj<J>`jEr3kWxISk(H7oLo2e5S*+DU$rewFd zE)1IRoUQOgC5J9re!dEkJN@T0vBE$9XSqf8?x6#8v`+jSeUgPm|CoN4_XueuEq1d~ z?|SM}cp0FWw7b=s@^mg9S2%{pm7TPtr!Wv@zMB>TkvuBDqn=k|iECf++wSbe* zO;aS-$1P3mEpqb)BzQsKd-me1U8j46>5ipt7w3h|QrfVKf9&-d)hns%l0Xf*ZfZs8 z!#;VKP$gXlNiwwJ3Gx@{@lUS=abN1f%2-6>U0wmqW`?P+CiRZ8{NPAdsSnQST$2q~~iAsh`^kh zTSxdEz2^$((xX;bZdtxX9Y5>tH*STxoj%(iDc`AIaOR!3dut^3y@$j9+}M%^!sz%b z@y#;HSs5MdBC}<%pjEe@+6Peg>V&8QRVLG6ZoXy<9E;Tl z^21L#HRwzoEo?`s**o*n$*3#>e}I#)B7(-ojzgRqJn^8)?;w>tM%jTfH<{L zuyu#xZST#u+-M(-I%$?Y#)v9=1%gQE(#kKwO)=)UW$TmOLn9hX6}bX6dedW3Ph_JJ zVf=}oq&ULQzc^&zs*RsZezUpCw$P9Fgod8RJplJA)6F3zVOT{8K^`1tsZ^)nUM|iX z*cU06lMY(P&B4EZ7w|HJ_XS+31+TBBF&f)Tm_0`LSGj*X)jC+KKrX)8?7@1S*G*F#cmaT-DS5FeQqR#7igtaP zd!dW*msMlCx7QZp(6J6ggaVh)Wy<%BDxE$D#CFl(`^qOVAUe)^P{1z&HbKidLAwbp z>lKSG1QK>!Kh?Gu_sZq!VClr*invyMys&GaD;WM;9bQ`nm78d{lN`>W)KH-m^s%J# zn%|wsAzlUq&*EMG@%C;h z<4sp*9|zojRc%A>sZ`$sA6!iP^>oD#>+|}7?MP*UvQBq$bgVPpwgVYzVX!k*Mom+w zf1dKL#I$MI(?VlKN z^K&bB=p|uC@(M^4iz`x(kbP@}KDK>A5q&6hsVFl+KA?SS_t}i(2Rc<1$FV6%kb>qc zS0*;I66k*j+?Zo2Z6&bPw`=~$WY=`JVtDN|EBwz^8>dsmQ&qSw*R1SLWT`Fd+%H{U z4v6ChTjaKb)~k#Cv+2>>qZ4h(i5S5EvhjRQwojTBt4mDf1A{adYm=FSYRD1iQJ@M% z8u6+Y{KQOKWNrsnfm0qy3XuWYjb3LJAgu>K@na;%x3+v`Z1Q0Kb8%Ldt2YNNg+K4r z+uiI|v~f0g9@riX7PkK~UQTN8KHZzV*sB>!aMC|tbcxQP;CNiP)3|s1I()A83Xzot zX*yFnVC^Vm2AwOEy1&!bPX1;z7?>pIlBHuXx;Gv z;!wxSB#_mc7GO`t9sTIU(>8=;bZe&4U&tX(ajE=kcUFLUo% zK>F264s}-C?zr@L;t+9dj1hATqBFJ!&YHK2)Cy>he(Dol+u|LuQHqb+-%;*zRS0wF z{T_xtrTFpq{#9&Je>~byL~rlw$Vknxv}{f3?9OOSg*k@%?GyRvH@oB-1I)q`={*uGeHa={4;PCP(dRV%3H{dZhyc%8}NZ7uu9#T_1VvN zcU$t!P)EawrUd&Qh+%>3ioJmuf@_Q8cj<&B9%J%?8UFLdcAH4ciEorq8inm!Ya#)Y zzINz&;fd7A@?pyDM7yiu+{tiS;>qK31AzOL^l|i5#4}KTi{$z#cZw))lI>P7u#Gq- z3AYzaqMF}V(2tSmiT$jL`~Ag~?s}$W)jIC$<4S6+V zQtTP-$6GmT)`Z*J?Jvlyb}lj2(oChnjBT4!5CzL<08E&jKd98B>B#8oXu_rsXX z$p?e)<}Nb4HYu7n$#JcnmA@YSswhzj~8Q35_6HNzm&bL zRci_aY$|lP@?zNu5KZ=3B-IxqC#$itJbQnF@qBxKpKJB?((DhGStIO!|A^eU7}yVV zO?~QXL|`*HIWMY&xRxs2IN7UFAGozJo=-S&?L2ar49}(66f-qEzm!=&jUNh3=W_B= zKlzqmSj&Xg+8b%xax8M^waZBpsn)q9tnxK^HPGk{K@xPfE_oX zT$r97C4ZGryEWx85pJoW2FN~aq^uY1cD5fAPaF^U9%sq0kHjxaF47)aXC{3DjVDbe zr-7H#QAVSTd^v!{Dz7<6GzuqV{xIkYo>-+g| z`ggNB9VyYd2?~s{sb6$*yG-GG1A+|E+aA$I+DzEPq9(vXJo{OptlqU-V0ZQ(9tn$Z?VY*ogr9_Vu9Q+zNmD-dH zag32sQ!%=#G7s;Z5BCWi5{lqz1l=?QrC~NrF^_Hm@dy75GkS$^C#6tcJL;f%KZ?=_ z(neqdTD|=B_SO&im@EHeR94#frnxl2X?ZirIPPTPx+t_&F=L%O7qO)8D}061SpTj% z+X9PwF2E}%Bt3^K{N87}G_df!QhD2XD$ZegFrbD;bKC;FISuS}1vV9ftiY7KzXOuB zo+2!IuIvW+0Fpxnu7?LcGCjV3I~8>1NVbANmX>qd+gme8_7;EUX82uJ^3a>9UDA06yRa*CVjQB{**n@uEf^?>i8h1S`R-)`qG3&rO!gKi&FGfTq|#( z7Fx7awKehiegi!;R^xVpBayUtI3=a=HHl7m2QboU*&3Z+1(AIP>ruu!$2<1Kk2}UO zd3v5hEu=FV(w-iv(heUDzCWL!S%7_iDAwpN^Y-4U_EgKNDYLdZGl|GO)^4Gs_`|P@ z!eLondV;+MM?T_^+J?RYaz9Rif_s1~j18H$o9=j0lYv2o!HaqjSskK3mNp&mq2SvB zVT^Fm;NaO#qP~spC7*@v^`6P^hq439-v7k*OrKldiXZO-0euP&4+r`xQicXj`lrHZ*fR?vD8&2xYZDU6SV+hK`7Ab*3IT9WW<5_>t#cV{&GSbUKcY-j8pb5diqll;9TK?MpzFxjTc~3|$ zVd^dX$LBbnh^cO)#?ltaIs`8cH`w}S}XlSud?;4A%s?W4OF|@MSd`cca>f3 z0j8?J*Tf}cN3V^B?9Q&Xy%6AnDSdi3+0PrvK- zt6hK0=ZW!u^kQtW>;xOOFHVeJRZGb*x^-uZI6G#}yo!GBBo_3NEU5y6>+AEJAVH4^ z_dQ&BCmky64BxKyd~ir{%Yl>_%w0?*i~(PM%6j46&i}HipyC`NG4I+4@>%_zyZ`cuggkTHu9qu;L8hcFyy{0+couL$Z8nBjyUH~F)FwMC zZ>ATucnkK|Gj|c(K4Ea+U02>5M`v5zrn$|l-=12s4-$XhO>Ko-w!j^BCprUpd+kbhXOYRrIHY9n=_)A zq(;P+hz&#H55Z9u%fZW9ZrHt{mgdQ|a)y~xG>+uMpwU(l{=UgXu(CJ7V-F8{zJAj~ z55AwV&QSpHJOP%#kBx5DarPYG=R~QW{jmxp0j-68jJR|aUc|U}(+{g8vYWZEPa zTdtX%sLa_hcMjTb={)ZptrUfD`%Ot+K-keCrbj(kA1<~rIJ=DZ#oN}^KQ#Y${`=8s zsmG}x?I$GSh6=L0qN;h5DmlgCG@&6*X>VH2@7JWpy0tX+43VA7W7g&GLfJN7C?t5i zz^)!(%l8I$G%;GfKk=cn$5lHXIfSAW*z>RtD{`=kmaP(tD2iJ`r3_2o^(}kWZ`0Gd zqaaiaLy$wy4aUxufDy!U=*{idOd=rIw2||nkFlW;hP{DlV9!jkZ}R-Xdd5e8nQ1xp zxCzB)kRFf;ZwLQgHoA3sVfIf63NU|ywP8Gb{x?A!n^-=7(u?!RbA zDJ!w!-FCRQePX>r{A~R!aZH^dqsm|j<8Eqhx}t7Bb$AnOD;t_S%E%>td$CFjLf;bPepOppvV;#?PTDS^NZV!TjUdw%&?60^9LiYvn zxrIkBvQ2{GW&KPyt(5?o)~C|GrOfdMR&S5u1NS08Um-bFLW% z>y#OH5kv5TymlW?5ba5}q4|(4|?=wy=kDpY|7<0Il-Eg`bDN)_9 zjasLB>u$NFa3v%*FM7D!o9lub8{({2K1 zyh#r1?HcJqEO0~yVz@P@V>OdIa4%ELE+6gR+4)k%+lecHuC~Q30kQJ>DzmHpa3m}z;%HLtG+Inu{ zks;?Pw|+eM`BmOWvH=oJhkquMtCaGp)(?xSy^Cd4Qx0cGI+y~)-q|#2%oFYnI6P6_ z^ajXi?mRf2S#CxtpG=75r&uc;Lh!FNO_AzM(kI#^+I(T{Sz}RNjl`{sl>c{7qp%Jp7Mt~re_oLB zuIxf@FO-$Of54ecuwwtHPhYxl*QWdMA6g#`?ue<`=k}&o)0s%AYlVbIc|Wd4eGwUk z)QiK&%*+K|+?15b_{k3-S-TyFQO{O=sX?f%+LjvEBV^FyHhO)k8u zEF0JIUEGD2rGNDBwqZ_wb^@%zfD~KNCR%R--?H3>cQSx&F)h%Zo+si2&NQmGN%=7( z>$H?E!nn-~6%1PR8hh;lumqHuGj-;3F3wBfO>Om~8Ef-rjTPPjN=M~CzLhF-a=yTV z?;&OE-^JnAyZrO2Q^;;DIs3cm8q1k^gY5!EM_;#X4qL_(JFwDJspAG_Cks;ylB@T} z9+G1{@C107f<<5iZ9Svgo-t34EQSAjKMAm*e z9ocYT^Ew`^tAJI9RH#%0bxnU=c3s?k>Jt#qy!vf-GHu!4BSmx0tx6FMklQXgsk6|l z%oy{zxNlYojJZ;j6~_R(#GjYX?!!ES^UBjjE;)90Jn##3NxJ_;!G|LU0f?~<=Z~H{ zjyDXi2~HW~o>A6qA9jU2NRxm@;zjN=JT|c9G?o^rij;Am>W_=^m@k@-!-rJ-s+wAXmRjPN zhF|VQ$l|EYKBS{pYF?xI$d1uB>X6&z(ACc#$v=<}xARk(Ali@;AJ^UCCEW8lVNbP; z1cBC-R-EgpGW1T(Z-UqhFX!f6>CX4^6l!iU{@Uvf0DFjmm53&qHwwUBDHy=vUp&TS zQT$OyWZ($7^hVr>%^LS3CRH77c&c z!VuGBYAER}!LO!t+i59R_$w8(-b&+1u*gLylO?70tEUvR>9ewE&9{{HSKoe?Q(Xfp<2@H$gvw0%8Z%@NL;Gm!6cpXs-)7 zfLttj+pgZAhITeT6nQyK@Qn?cQ@J<}JMTuuY(37pgxpVzRZEg`eUuNTR=tcR*S|^> z_q2i6EHn7E`+C?Go(SJ*L9fl^pk*1Y z8t-B3G-|iaT&l-pjGW04-wX}>O)s9MWGFg>l3#gLzLYF~bcgaF0(&HL?NEAaxKs2R z+eD1}7Uy>Z-2HX&!h1pnGi|9(;E|i+cVZwNzb*R76itX+3p(IK*H?+KYtZ>PTrCK- z1^_lAA-I>pH#h+uCUcWxSk#_;NLK7z@6a!hsW*YYm|5oEnnH>P@it|Y#%Z#j1&H=xU3rUj$i60)RWGs7w0l5LE5PoqRgFp5~pn zwv1AD&}Yoh6EI8{V}!99du&?wRA9iTiWy3n+=}jimNa+#J07IjRBop|`D%V^9?WN) z>Sx~;Em0WpF0c=BsiiY&9D9iHJ>@#E#}AObfTxX_4D+&@|12RFq@LJd2y;_zN_#VtpFO%@cY8_8N$+re%IB5->+1Z%MJCyMXd zKllo^^6{J0R`Lb1D%Tv(tr2KzQ?$b_PXG$cI;~N2WV}&4nh&G24DS z04cK->T^Y!Hrn4(T8+n&_YvbglbNC(bnlGQHe9eU42t z-FpE>ZXOgi` zk~LR8TX3q`5DL5!PbSdikL*lls)2gs1j#9N(xe!u9bXoDfS>Jh4i}Myh3X(;?})7d z%L6s8mr>#53>t#TM(bM@GNwM}t&y*R)kIG)`@h{BAH1@m1ulw&czJgDfS5}a{ zz^94#+}Odt8uB0}xVG_98)6>uWl9x$G?FYOIg*u;HIl4%u9hKJSL%B4ouS-M{XFf{ zOs&y*ie!6K`ofc>wA)OopA(uPP?4Pl*zKw5UG5uzqYC7IRIobGWf*!RYf#9uqf~a4 zt>QYYK01)XS!|7Svv%iPaL;lUmm>&sl9i7gWYI=1W0$eY6}6;aTLYnz+jCB}`I+xd077mMxqT-<1#sp*~`$exU{-hZFh$MC2vnHZE;y0m>9LDc()0OVIc;+l3dMbH4k*$z%7ym_R=)+}mDXtt)Q=&Fm~Rpve!m z;UK5x1&IjV|0W+#{zeD%>H?bVm)$1{VuQiiTA$R1gV8_Hr$NZ6$5#fggJ+NF#eSDX zZ@DiE+f`4mQE!Idto+ELhK*}@r^fzze$_wLF(?YEw4JI>6L;b1=qqS7*Lk!Lq>VU# z`W^LgjI^cLoY29qvm{LyU#EdA^vI;8lboE}1+$;rHu|IVZ>+tPWf3o&f!evsyP zSXp*Crm0CgkJ?QA^>=wqFa3@m`KW{Vhpk%)C90|}wEgHWEuTS)=H>}byt;tzf#0&B zLIA@qXRD7tDD<;o_cHy#UUR238|fL2RUa1Q_?rMs&~%kO(Kq`NXI?|@%F1{7C$;zV ztGsdz`P&al=YfCuw|mcCwve6Oz2 zX8{>xNZX;ARDQ$^sbLKL%H5G1a7X@TZj2hV8Y;B1umzu|=B8A?N;JM~oI#b(C*VcD zo49M@Hb386{6OJ*j}%7_HG!i1y;0HQKX}S*N2BGut?U!`LOv3QiER}yD_)iP6xcUF z!tLQ=3St5kQ#t?l6+2YVImAbk>fTM`5S}Ylg_x?Qa-MmKt%C2MUUaUTJhWHh5$FKQ zgv+7PS?ZJyEerMT-Ha?86II;odKyx(Y!ho0wDsa-^0%u_XRxxLs=8rn3ZuqpRr$KF z(rj^=buab?`5<9V&vPP+=#0T4`)rvY5%`tu0TJIfT2Nw}k7c~A?}}+_`MyH6?7@C( z&F&6Uly^mC`JF+zzwbmPpZP*KR&iIR7>~mUP>CT%jv1d+bqO=9a$m|Jp5c8 zS}+k&9Neyw$n)kSKE*oLCGaGzM`M&3)O_o zo()=awkWTQ{Z&pV_<6C|Cv{$La55+$mfW0eaj8)@vfan<)`fSd!65-xe0NN?{(z;p z3}1Afty6LFkPtJ`qRZyD$-G1LCUb@M1EyGy9QQq#560@<`cHBq! zrPNkSNzMi$tE`uWLti0E7yL2&?&t~+|4T9&iEqaGnz|ii0-o#)18Z1O# z-#PP25TX|ICBUnRpDMKQthvb7UjA=uh zI|vk4;V36UfX6K+DyH4n`FZ3(y(Ac>OJ*qI%f4UDlVTs2ppnXX+P_;)a9!!{JNoDQ zmnbLZCzAs%@wueahEuU0YZJ-CD$2YYkLaCfunkG3sOGy{gi1}RV>#-xDkZqY?;x7{ z5tm6pS4r0ENEO4ve|P*0l<)X54R)1Qeb%?Ij5&9w<}c1tegX;(qi7U<_D#3D24s*I z&_S~xm3_Y>lt@g1b9U=XOBtUGbrwD`SPV>qI%Wg@hZjJoXcASur;6ew-PD3Xn|f%f z1XuqYPydW~PaompxQ;6mm*DR5XZdwmOHxaD>QBDwa`ME>gA(R=6nIR1kY(|Nb>nl9 zHum48cP+|BfHcKk&kSV-l6@gu`ALFbj?t`C&>g2TKx z!SMT@4Rtd6cTgI1XzmF2CY(U{R9fIr_v&g0v%o~#Us~j@FFTJD@xNOa_HCm`kk?-= zSp8F_R1)3v2CX&>qzhNgfzN%LRHw`E2Gz7XuIW6 zc)-P9U(14^%aEY$ovXz9B%bY3UEo+Y^|=0m$;G^7@hYO#euA;G8 z`XIi?oHe+d#EyE)XXW0BmWU$v-F83eZ~qR~_zOcP@VLX??65OmLBK@ywyam|*0{~8 zjhye|9%!@kytqMp<+zva+S8#7ZAnfC*CY>jWh^)Lp@eoGNQ-cNdg~7=awP}dJKEz5 zl$_L5_r&j4O?jFR(XAtFsRhlgiUT!Mj|!&g0Fb8>o(Rs)-(2RfDX4URbHBLM=HZ1} zRO>(?qI?yFr1joR3<~Ixi@RnIt5X}0zi1lE2Le|4*MBMdbCWH+`*%vRD}ZY+(F-`y z5E9~k-La`4vyRNK_`1M?&vVVw=ukefB8nFl6S@J;S$ex`d}?qMh?lkQX!yu2FD%J4 z(AOZ8CEa!{Lc*I9mTvb_7BAE*n4m?(N#VGpyt6_g$0VnHTK36EH(d zH%Lh>aa_Of2X3+eJ|T1URF|TQe|qh7jcSTm5;wJJky@~$FD;MN%!`_ zkM0EK)tt<<{mQo1HczV6jepuy2ce1JkQTqV*S9ZH{1e`O|6gZ&kz2+~9Xo{9e?y}* zEX&;{9afYzm|5 zgjXK^LZeiHe>KR}b&6;O@sh%Gx!ozk&y%|xq|(_Kmt(%dP_w_zxWcH zogmMqp@3b!4|Ra>71t^A@Q)q}xn3-KCpm?*pVw97|82`CPvgag7yaMeJ0ICkFm^7P zt5S17O91*Lk{!(R2X9{m-*!T*3O4|Jsd@=l&V?MVnMkOHQx+r*4{NrHF3bcoJ0rg`Gw@tA-i=<=8Nl_=vzY2eo7pMRE4Dccx@Z_HHjmUM&LAz~ zEYrT-RJ0zC)=%0!6{DWP1|D1lR;Zkr5d62^Ua;NX0DV-(-?x-+pz?(bn)vcS|5;D= z62}PXiPF;-&n<~bvA7b=g*g$8vlWUGH>I+dE1!ERc*z?6H>kl90VcqBnO`5Jn}U3k zaYVUloGWLX_S2+mY5$)Pruj9E1)r_e$Os@Amlr*;4@e1;l1L zkR+T5;vcpdU$Vm<3u3kN#KgYW_k0_`)?@)t+)~(eDMi%vDAfr)9L?;8;$EV4tM_oR zL;vj?v-ZG7V=tpOGp&dfvAY%b=g1+0hF5ZXq=$V2>J3xTCwuR zD;Z4RNu$d*@8w|)zqdcXmk-*mewDN6+5fAsU>hMeY%9$C$P;iBVajJ+e0u!fMoFXa zlLu{tabRRz#6H$*MPQG|?4lX4|xp~}n5 zQ3vrj;ToMOqDwvaWTKiQKVHbgg0BaPFlabV?WkiHfnhENli;**@yIQ>zf zfH7|E6|-9-A_}B7*5p8_t<)Wjy-!FcDmq=(8h<$`Z&tw!`p6LrWg@C<W(l18RfB#$U-8-b7u9U8L$#2-bn8+)MsbmtXynN6{eM1(En4*my9lM$Qe^U(FtO__j>~*=v3#oL`K@(EM3Q!`R zj`lnERtY;SmwV-gE$;2aO2pp5;aFq$L{AmUB?ex22Q@&oc0j_(4|u1Nq3T87KZE`; z+c0pI7F}Fxk6(6mh;E@2?Fs>ytj;_YZF`WVPE&}a&^Q&AKc;G#ap!SZ+Hu_WW7tO! z5@g*$mu(eNxC9{p+iU;Ptizo_ChiybDBmF0A{L|njipo!?~LPgLV`f0?RQpkO7Na! z`k|WGtmmn5B={IAv(nVEGw$KsiRu5p2J(hKhxL|{ zoXBKW``d;tqcS0AO0Kgwt!&O-Z~pAxEmurW*SL!w}w7s{b$TZR01jUW}r0cgz9 zR1k-`0>QXq&I5X~13sJ*&{OEQZW2wL4L*rGJ2W6Xk}77rWSoaMum9QFAj`u6k~0ro zADQP}<26EG#SNLoiBV|InC$=(AP2oBi&bUzo-@n^4AxB^qoO0XL0ogd{!dK|&OOKS z{6EkA&+T=%|hXn1Q8c@tHOyAwj zL*^UmaE(P!Dn}t0gC;D>e=Ltw$ABcy1P(wV3j6}TU?1;LA1<{s4}W$MRF zn$I)l)D@^exDw#U6;?UHkE-y<63dE%>$q{=a){P^q{5Bj2>&%mh;F_ZUh-0dVU!+T zlpis~_bL}rqU3{NCAsJ|>B6p5qOE2+)>H`XdS#bJ}pm3!2b^E6-GiDLZaCd5MV z-89hyJ)|mi8OVbps0}RF{fb;7PpVwkPU+wHQFll2<#o>}sY2CCHjyTzqKL1oz}ir+ z7@LPGicwZBcJgD7`vW*570(_5aq$2Dx7gU)YC5Ma$j)ul#tFBzH0JN-sa(}Z76pB> z)0ROlsdooP&!>OP$NiBe+*(f9eRcEJxOg1k=c*Q`WX~qt$^dFCVXF z)7;1I-!}Tjo^MwFI(=DNAD~pDEIqW9q!o>Uvf2UfnK%FoH*vaII{wj+w_Dy)jsQMT zFyr43TucYGhf#91n~llxLiQ;MR}3@{|K=)+OG|k@y}b)-Mx}V2=4&5ke3($){6bV{ zz-Q7bQD)pCmI0hEc2h-KcC(e{o3mAmi3tG!4ngg2RPfR0-3F}LOErzOT(IqQ!d(i& z)qFh2JBd$YG=2g+qLS4AZ@wm+)$0jprM(=lCjp8rQ<82JAA6NywUx4DMi*^ONBW!m zeXA~W3SPu)+`VgZhD^6!T3IuAvug9^2~;3p=S|5}-v6EKcH)H?KwH=WfTNPu zf6Z&e-5EzDkcqwj8(+Sbh$~r45op?oW1A+fYx*b!1l^MkrZ@BM*dD<^Ax3Ywn_>W2 zo-FWVJAi?qXs?pm?7Y~_pRM6H+YN z?oeqF{4bJ|JR>}nOthRXd863l2h3ppGWK?P83%)N3TSp7?`);HsMCu%LWFHc{bTJt zymMUwb`9-1py2<#nXj;LkFk7%8k@wE@5-x1J^;Zii!BAWAW6{FWU6U&6Mz0yG?Vev zCOYtT*Hq9efyUI|P4YLcYr2@zJG&aepsS%xCWQ}iA?Lc-zfBWbllmnO{$KDm#XKJ3 z$m4%Dtxsb|0exOgsEfC~esMafAvgwpV0#j7>;0(Er6{6iOs)lT zBA;R<-(=Af{=a}w=0zWKkiXPH>q+>7ahz1;c+Px6CLb2rlVM@&`~8@k15;$O@yg!+ zx0{>0tIS{gdc9u%!1;~&Q?*zT0VMuK@sjQ8s+ICLm(>FIdfZ|9m9+G|`Tn10nfRWc znK>DBBk7lxJAXUY%0+u<#ifff7lzy`+!EDb_qFsE@J?xAKZ}Q~W|PBX3SB4Oi_|DS z2RyIssNs^82OH*v9tb(|`uh6!oL3hClk;*9uA2;DNFm@dmqVfEZFc;Hf-acjwvuYjF7LbISb_S5CC1 z&)s+Szr7iPZ`|9~ymCu*5VVgzTi8^E^OB&u%*1cNH64e5F_sXhd5r4ox1-^pGw^U`54M#LS9ah0P^i37*0LyN zqR=M(J9l62zr+n|Pk_qJyA80?8935$ix*az&`1h+{V8}xEoNuY(^I>R;wS(6|F~Rw U$!x7nq6|Rb>FVdQ&MBb@0B>M51poj5 literal 0 HcmV?d00001 diff --git a/devices/surface-hub/images/rj11.png b/devices/surface-hub/images/rj11.png new file mode 100644 index 0000000000000000000000000000000000000000..f044354caac4ff55e69d461bb608a1383fa7f847 GIT binary patch literal 1499 zcmV<11tj{3P)+}I00001b5ch_0Itp) z=>Px#1ZP1_K>z@;j|==^1poj532;bRa{vGi!~g&e!~vBn4jTXf1#n43K~z{r?N>`k zRb3SJ8TrD@OhlcCI8Zcvlr;##K+M-b5iJnKN1{%2;G{`Jk*TGmrl5{AR74^~5DFYP zQq#l~Q6xjfM?S+BKGGfE@~r*udpy_t$x;9R!Q$Ne?X|wU*FJ0Sy{?7$58?l0|5lhy zc7K0gtgfzV-%bbo*na%@p|R$1cz8&@M@L5*V;-tD>@0vEenSt#WEU3~MOavvxP1At zc=P5BahRAYu(`P@s;a6)Vq&6jb#)b2u3RDW^z;<@`T3%+uTS$lPL319B4%Y}k#=cm zDRDfm>Nhtxi=?C^@`FBGdV0EOYikoffBqytezJa1Q4z%;c6WD|IEG=eLqkKt!oq?q zE-sEZh_T@3&!2_AzrXY`GD}NKn%MmOJjHM#h-II&v^3&a7Z@HM7SYksCR#>z=gu9m zu&_We>LLXO2GaP23m3%F(vrp=!!TL=Ad9A?q!7n~-QC^7+1Xi+!;pArXeimGOP5T> zLPA2s+}s?+0=>Pxax5n&hd9>8BD=f0o5cJ0_>eAie0_aQ#=!An@`ByEb&JL@kMG~V z6UQ)2_RE(qQjn7cCMPF_mzS3u!$g{zny54x6B85S@#Dv|vh2sz0et%ON%Gm**%~Wo zuS1W=P_ocoTU*mSgxJ{F5S5jc!p+T1`dz<%UF_`aXdeG0ix+aHWJg9uq!=fAaBv{* z-@h;U+qZ9v<>h4>Gs64#?}dYdgY@t0>?FRwzh83LyNnkvUP%7x)vM%Z4g&)NCW~HD zQlgERCVQqbHcED7WkonSIT2@XZ!ZQ12Z=`s@_uIHvcy|poqPB05r;VD9zJ|X9JG1z z*4EadtE-E6)-wVY&&I}vV*LF4G**b4H*XU6N6FUJ)zL)2<>uxRr%x2$VSGYvZ*L24 zZ*Pk6@bDl`J)k(*Z{NPjvd8{pKnoSci>F6;csRw_+S-bqo*v@PCD~`so=NWAyLZH? zE3YQa91sx^K{2?JwzjrR4nN+ruU@^P(;HlIaWQd#UW>up^XJc{*4wvliTk56PEJlH z4*P;R+;f1@MD!>qD4-ZSJ3HEI?z_(0rg;NN}u@}-PxZEYp)T#|kI z^r_?;8XAZ@OR@n00ThEh38;5CzgfH$ezTdGnZ%t2{@q899!afpeX}hsEs}%aSui#> zCLA3dDdx0faaZ!54GIdPefm4#s>0Sl3_7=&nHl2GFNm6a8>a|~W-Jk_@y zA0IDu^78VCLn$-I$)c@`ii(o_>({S|2Ut_D{p86L>3{d`U5!1b0}3cFFPHqqix)*l zM~60I3Y@})g@w`=`*mt+ipI<}747ZqlE)Q?{b&yL_4V>*z`}q0_)#1A!(_RP0hAYu z!BBeWZ?RuyXJ@JN!XF2eBKyE9Dk?Mu^T`700>NTqV@Vqeg@X+pRYF37iBCpGh8BH{ ze_h6EyNG`e0GH78^t8Bk?V22CLr=?1hiYYIWfaFydt-gFxKD9FsqrxENf#HF6MRfe zj96b^*P@ScrfENq>HFrJ_ z9y}mUzaOistEnr}YqH_&K$F8UYApU7zz4~qGgEOQSp;Iwp_xaE_x0;n;*lsD1LcK% zjLRM6gObPR#>Pgmx3@<=oCq6$ML?g8I~5!>)o}p-muqWlNe_Sd(43&*sHv$jDNlVY zG$SJ;>E2cKfD_58$uLwwn30cO7~nWO+4O$g4x+{6C%2oYL7fZh;;Di)8HQ!7f`v{q z6-Hy~Q{~l(>c{xAI$8EL7pEr2-&OoJ*}n%u`~q;ug~aq|30nXF002ovPDHLkV1hPx#1ZP1_K>z@;j|==^1poj532;bRa{vGi!~g&e!~vBn4jTXf1ExttK~z{ry_U-> zeNhz0FCmXadA}Km6h+}Lpkzo=M#hRf^1fb$3@}4XJcgJk#lR!VD@;rbq$py5B%!c= zeb;aAbN6-5J&#|%-|thaefHjKowM%RYps1V18ES?WtHodD`f%|z<{ zT(iP^(m}Yx;H_v2`4hk&zKfPfw@V*jS2* ziJ|D|Xo`x8;t}(-v@~jMZ57(~apXipLj$>7F3QWxqvGOXDl9DIv8bqs1$))i)k51o zj-05kucyGkK)SlR;<;J@7?YBcsIsz>=T2}OiJ+h$y1BU#E8e7}r2Ic8WF&x^e5t9a z|K154M{sa3SAY>n+KP$_F|&{3Ncj2r(b(7+&Cbr!{QNvEEG*F6+#Jut!^5ens!C|v z$B`2#KU9F3)YjGtZTq-nQ$eO%ad&q|hlhuBbaX_=$H$bLn@b@fA+)->%JYMR1G>Jx z7TV^hx#UtiB0jLOu|Zo~TRPd^-lo01J^t9q$q7qAK>>w@h0)sD8l9e=^4|XbK5cGp zvcLwmc*cl#@9yr>%gc-22??^>D8$GEqjf9s_xCqkKRY`UU;GW{gp9=a_&9ZTc9Pre zrrzFO>gwv^b{r58Kph<&)YsQXJv}|t-Q7)XZEd^{X>V`W*@cFN@&{X5TByIjUt7m` ze}B&(mslodettehL`2a0`@2}N20th{IhlJ3E;S>(jzf$Zi;Ihtk&(eigAOP|h?a~s z?A6uP32hHEGc&x0UZL70CMNR5hP~0zQK9XP&WWk1DK^H<7#|y%?3?POsi~oXfdQ?jV3c=`ufKji zBVi_LBxK0pu#v7Rjg5`0YnhmrmzT7(v_#9x%i5?4)^LXal&CDz^Ye2r9o0q(+O=BN z5}gxvkq$_)i;RL4VCV!&@u#;EX)JXh(h*-a5~(krC4U@=zX#DTj%1sd!Eb1500000 LNkvXXu0mjf<398o literal 0 HcmV?d00001 diff --git a/devices/surface-hub/images/sh-55-bottom.png b/devices/surface-hub/images/sh-55-bottom.png new file mode 100644 index 0000000000000000000000000000000000000000..3d718d1226925614cd376602f0f176627a3577dd GIT binary patch literal 25149 zcmY&9WmH^Ethg^wqzf$WP>Qp-Q`}t_cPLh%i@QV7;>E2{TuNEoot6R%6xSAC+#lcj z@y>ZUXU@#zPI4uaWG1;2tEsL4z@flFLP7#4DavUhA)&xtN;MYh3x=_+_6322?4_+B zgH$_3`S+!RW-qNKjfB+j3HQMg{iV;RsjB<#`T4n{qr=zNHzp?L>({Rn6BBxRdfD08 zc6N4ha&pJV$15u6hx&2W@qo7xMoHNKD_dtzIr-yDJ)b zAtBMt{a29D@|yFJkSu+ao2X>_@Ts19PYrbme+%7EJ5h9Q~jLf6h^pNp~gs#Wb5)g@Bf{q z4J?qO>aGWJ(qj{UdLTuqW^FG$JK+0y9QGzvF#NP(mD#@;VIib=F@I`lu3%`#{Mx@a0d8uKrd3gZ_)LWZpot zmFPPjCG-Q-STD<;8n}r?%6XV>X zGau61&f2s(R0FNm34-654zxHeH%}q+K?er@>XzG1@)l6kOc)MOb8+STQN4$npk3GYktw(ovVnDDd z9e+rvbk{h}?7q1j{@xdx`=8K1L^JQ4XS!BU%ige3CR=&Gnd>>^(CWP02)ySsXI}ZB zF6a2Z?eBoF%c`$^4zuNhjKhdH+s zlcm8z=)b%d!#|n%Y*LQp4j!E&y`l&I62VI4ada{7eZ`8uw!tdft4(39WHZ>0G7008 ziWK4+`%_-Ps@RZ~&@2x*mYQpPcx*XX8a8N3YNYzrgTYbEsF@?~XpYyC@2p+>DGfrs zNV($RiW(DU$tLgr7^(g72Dj($rvCv!S9$kCp*H7pTDL^7Kzm@|$&V+cgAU<;JJrUV z<8RbHC|r|Lyt9eB@_tu z0^r|!l+`F{%Tx@p&&k%r$XUOjcyu3sPchspJ<~Qdv7V5R-p?uZX0*W|bsuK<#YW*# zL6&g|f_nFpwH8%n1axS)+SWEk0QLlxIo8au1)tAh`>6-D z)hj)WLomi5k<_Vecyw>xX>KgL^gSnGbh=?iKrX2jGQr$zE^?yM8J{m|q-u8{mp z4Yu}0*^wl&3W!0SPCm$gS+a1zh0`f@miU>CBdAL{s7vjGy->pQ?=_Z(`1na#Xs((n zQpcPAhiDhFdVgbd59)D1@Q0IA45*BjW0rHZcoJGv}fKW6aiVS=)F0@1dC7Xe$2FduN}4ZsUSFv(%xdTUI#Y0 z3)aLP?{262Rgl|#uFCdhcIPWsFrlXbig)BE%FJlTglM0iV>v_2#l#8z%0^d?V6ApDS`4W zxkaRiF;5H-OB2@e;rpjhEpnr@)Wftm347C|OeV&#Bp`Uudv>tvpI)Iox~4nhdynXzt~9jpHCEo^gB^`MvqM_H55N z!g|51v2eFOfO1HLkWMPl5Ab*3%c>>`*DI*)+@s&db}w^m((^BF4F6gFM|UpaT!?Uj zIQp_i>+otMY>;QwE!#6Z9(eHjr|U0Fo95gPbegOR-{m1_r7I5%F&3C`TtRGRpmm=G zb$?@=Yu0=p_vovxGCOA$YV{ID+dOURP0u4{Ar1MlucJyX_cGGyHBjL1iLQrK4hZ4a zRH%ulY<0bCP<0kZm^Ai5bZi7;8e>Y>^tLQ~0Mp~Jq;H!QTPKUjxXDQ_Cr3>V@Rhr} zK{yT1qtU!67MnJ5jC++XM}VumelcGFR0*q}B5E?Q#6ACRcOC|-UzdYEqoBW;))CHV zi@+%%jO-hi2a-~9ydv}wBuqoMaIfeFb|pwp={_dxur8}QMn#^SdFdJmIv zd)nHI*-cdlnW<+fBvbvvW24*i#6x;Gg>VA8ma-+Jm#NaL9$Vf81wOPfhn`Tnmmn+&%T%vir82Fe}F zU~phbJd%=O#2NmBpqvu^$PE*c$ zuDRE5y&_mB+gBQrVu&0#a%D@Lv?Q?^+P_$q+c1GHOJh3qt4exF3*>sto>n_le%ehpC*$`q zAlqi*E3BJ(YWAbXaU2n-^HO^spAvy-BMwAY7MsrlGzQuWF2%Fxn`kgf<)j?IeffI0sw+8d(jCxT`AjD`azV#YffIIce~ zM)2Rg#Bg>05Lt#^Bbv)|M2_2Ycu9k9U|4_#Qi8?7{8aUii5(( zI^6Q}Pz;IFkaD6coJue0;wO5d)Jg2h(6&gB&%s&|4;1Bf>|+D)LbSL~g|7{woN$Yc z-(HdC{@mY<-s~{ex4bu#8^e*D)C*eBKRnq{CgoPaUI;Vgd3CwZ#s$+!a!uAevj_2; z6P=M(uHHn{J#fA4GvzgWFhq~Lv?7kOxwC7 z2@)?$tK8k6sE>MZwC>e1xS?jRI_f`STKFG}G;M%bvNg64hDAVU z5*FRn360e4igV+#(Di0tz+vwSajKxQ3>5I4;J#k{;3}fCHB;7^y;sd$1R<|fEcA!n zafO2~DZ`X6sZ*taz*l@wnvDg814Ac|ckG0Nv3hbcAjdKeIH)sQN8vQrrQsntk()AC z6q_g-IUOHCFiUKsuxhyuzZd;&E$T#-8wGRSN`Um&o=lAVJwsP_wMVDRr6H=Q#KPD)6WzOO6#~Z+NjO=`cuBL`K zshn9bnlo2d`S2El8XvESzf74)$wH@po(Ue%$>YD*B%TT4?$i2+S3(HGiP^YXeCtUYA>aJ* zq(;-JkN#Xg7>q&1#GzQ5Z_a+ddG5FEOf`7Yr`CU>&wt8D8y7f(BLmii(hx}vzAeVr zv@ixPKkLydN+rFJ1Ca%a0R3Q#BNcyXyqpsJIEZ-EZ!b*#fGyoI(TUYLrhLwnEgQ$^n=-E3c-K`MAF`J9yp}OKp=<<7=aNaCcjOP-Z@HoEY0fJpQnN@_ z$W90p90YqdO`fvK?+l}-2ghgnbj-c8+e$WYo8CsSK~sY~|Kk!?pnLEI)oOD+VT&0`Oy_X%bT6B3 ziiG2M^%VcmP3fK3kEC7+TOs_JVchnf_v@#-uikvyoz>n2p)Y#~0&SGqd2dz^@|}G1 zgQs@m>)r2oP%6rFX|#*`B+e(2ncFiCeNAK^(X}`B43*TnyafA0< zH?TbwuBchy47S`;;ry2PNZ%1z0_G}U=vg)%#=ESd3omdzTi_hZ`u{&m>YfZTA&EuD zKX)M6@~M2Qj9>y!@cnoIkpo9aJHZ+I&vF8WwX5Yw+)p3k)gpf@s|QVE#&9k(`AimJ{?}&t zk%oNhJ%0kFozEj)`8#6jmygyA%-f%eNHNcJ7?v@WQkM%tTE?346CxxJ{K1JDB)3~~ zwtFlgfwuYETW^gh=49fQ+9z7cw`244jcL4Pumiri`)@OJnDp3BU%?qeukvF*!i8*= zX>lpcaA)Q^+F2qRc&)Rh9UF=>M+ctkK-N7gA?goeLbJY{c@6$V z|J87|jiHSB zb4_p2KN;&rrS8LpwkP0B>*f73V|}14ENx}H*Qo3D)KVvH-VIK`f^(2k4 z=rL1K0mQoTW~s1$XPsrk>y4VdkQpVx``XiAt}`3OA1famb|`HGdl&$c_-F2KTR`if z=i(TnopzkmPWeL~Yc*cASR*voMu7@YGSZ}%-o zaPF80@U2@a@vyyG&F|2P;gYmpLD;|cmTLe^NYOtl5l0}z@Us1a4PU{y_T9Ew`9QGO z$0w_E!8gjDre$|oSt7;1G0LT$m3Rz<`&ls^^PnQ~dCz|5(a4M(G8KdGh86FwPjVDJ zBF|V(VfD$w6uT*cf<_O$)Fo|unF)Ymi-B3PFFCNo+WMk{^;d$`x9j%QGTxHp{5m^I zwT-?{d;Ugw!P>H``)PY|`aR}RZ~MfqJGb*aC;OGZb{=NzY2m*KHDO`JW+jr=BD+wy z|C|TMeNJi-dl)YoYi8KQ()xVEGKjti65q6IF|F2!s{1`20V`}csgfiZnB$^z!)Vl2 z<*PRghe0m(-o?bDa`~kM+`aRBJr zW9Kn$w#MNAT?ixlhkV?JXWP+b%f>w11&aMslH;)Ix`FsD0^wLvjs(?ISfPNFXd!K# zhF^F&V;up4_gCwsGJ+Yoq&>3e4P6K8$bI8>qHV=Z9t2u;>qUO`&mN8!@)V+tJ&9fo z%X!P`&K{XTyRBzKF{0Qcy|0ES7LH;zy0A+6_lXBoQ=t|ZG2{ksjv*%MKi=VL2G-XJ zj^LJ{fn^E%k&vN)HVuFwKKO&5*gM})LfsN_WkhPumrqwlee&=(B#1C`7fp0%(o%tm z{+LR~#xy@X;BW+IU%|AKB3LTH@q3w-;O}%`@W9mBFxgmqB-2x@2WiJO54hiwkf)oB zb5kfVVbYzfR&iCup>B5N$U_MMDVp2;uuz0)fAY<}ty=hEYg-~3Gr`{dhN_}`IPwn^ zA9Hq$931b=wFW~utmVF!N6Ohq0xoj<#82H)phq(gBtH=oZVR0afc zyJE{tg&KmOQS$Lwb~q)Yfp%ksY4Vuw7W3&d^-}Gx>UcY!`)5q3Rp`Ax; z`>ZYl$smM71+1G+^r@?Gzw49omzcxyPs=Nm4sRA`q)+n?|Cm72#P(ngYOvt%R#QwQ zO{qiFZygD!Y5vNmuB`0te9&vi4lPDu$;rXX9?aUlgk2=&hxU$5X}zNQ>-q6eu~Fnl zhTs-snK3^zmWlFUULGJ@GVVEn%?j={RHYDd-2vaY(~(SpeH%5lXR8xu`C|Fm>uDZG z;RhwP7)3=C^-dxkd)#coUkww;ZpwnHlbz5&@R*AoD^Mh}-Bb68V!7z6j@@f_O+e8c zD>rr$Q89d^MjQ*qr%_>gef}_bTfYX4IU*uUW2O)6-&`lD5mQlT&D!}P{B}L`pKs;A z0t|65m-G1cxwQJ&gPPg|LmlZ445;vB_LQ|YU0`3loz5)rqt@atpj?s(E_76zu5OCYkVz=!iLnf^3H-OB zV*P3_c+B5=*fA`hG_kb3M_O0~?3295JI*wUwUg*>N5?gB3fd$H^765o8q|MhVSNur z2E*$ags&;^oz6-c>}03q3)<+eI`eohqiY0-Wpuip8utNC*b5iAw_{L7zF)bQZt@-~ z5|JNc8#BgK)VI;0(v+t_NhV8OcCJy}&U^PzDpvFd#C@9O5^rIm zZDJk7*ch4J2c&reDRv(ZnLY&0KZE+4Ijsi8`cFcO-WJt_}^hR2Fbf1%9I+qrQ#HZl6e}&hixGj1TvrWvA)ySza5Tmoyn7o!P+h7U2 z-~O%&rVmSKyj=r;A3lfu$y3jtezmW=dei@<;qWc7ra#Yh7uj;MuUlOP-^Vw3UM}HK z#_=&ixBfeLrrOl{w;}^50Xq5(FMQ5p2XB>PO1O1HdwV5KGn??9qn>=%N5)z=_sM~N7o`D*%nAITRb(YTR(P}Ek92U+&Tu=`S~xhC_m6@eunWg zAf+zge>6dVnvX(FzyNvHfA4HV)(s3yzaFLQW#n?pStm_{`Ap1+z?b58U^Z{@SWf_U zf2O?fag`-JK@oU$SUYw!Npj{!&^CQ}d;Vsgb=R2`=RZ@uyYh=U58qth6a7650a%BBF+nvHWP^ff zJ_LBU{Z?CTwHj`;EH2no>reFM1B~X7Wy9?Bt94E!bUOp8 zr0QGihsi5J$J_6CXHoIf)!KL2{!+TF*8Ds0U=fxl&GQuEGzpagyco-WZ$=M1P>AuZ z4zrwEFht7?LHDB72CbTw@0OGM1?NG_>)}pNthq<5WuXR}t0_sspC_?QmiP~Br$%<^ zF6tbkfa0Nn)I5*qug*iOp2NH}Os|8Xc^*qta`aynvaeaV@G1p9?Y}oU81@r)5m|U* z8E>JF?QO^!;&Q=y6mMW$C?PO7CysmkF9c3|al#X3wXL*W)Jcbt42E~0Y-SHi%} zAbs&t=WhUu!3KbIdTHefD)*=DO-j3na&%`q2EMhtp3!@qyg+QzJu&dj$Uv%_sH0Kf zdkJOEpvI=!)S*I!8{Q4Xog`99Qt(CRI;d5G13Uh%1RLg+%dd?LZprGL|V4 zmRD)IE6{|?*HHR6d_9nwp=9Bs>bOfEcT0>Nz`SFo^A@vl*isI+xwhX?D+1B4~Ayyf~cwxkFjC$WvFN)D|PNJ{49Y~bL$PJn({pw2jYqrr?GWWm) zG*F0`QWc(}b}YARMfn?SGZwtsZZYD_{84}vl2>Sj0fSo^%o9~~ z8A?Zg#Q(#Ua>fF6e)G?+;E)+8vokG>@=J*INQbuT$se13G6eWf#LEYJGw+dk`@T3z z+SJFTUk*WSbzZA$mzV2;_QnsS9vhzSn}Lk|UhyB6{>AwhqG33!nuJ0SEf7x@e4>_q zofU5gL6nSZu6ED9vmH4YR}q$l!^X! z60M~*4<~ou-0SZ|-`#(F@cx%gArz5JJd87FydQTE$;ndvEW`UF)7y3RJbQGQ?W8ZX zljVeL_Zuef>g9?@%K6Chte}V`*TEfBLus{S%0cTnO9VRXK7yHsflPy1x;7zWsL-lBra<5J@9b$cA8r3CWR$U*5!k~Jm%bvK7kwoxIe{MfVx z21K|~=KydJ@-cWjMt=)yR^kDRmaA`TYGL3HuPOcHyH!qZ6}B1Ol1{gphtZ+c3Xi$v z`t+~Rp=*lxvJeibF;CQknh``y8;QGDfHGpNj#7L%()&N7qV~Yvx#uH*)kx_{=2g!= zqT-X?Tc0;5dWQwg-~riOv|1i@7;~H9G)X`01vdw=1S|n)F5IrQvjC0V;Jh|Vl^1#g zGMrnCYN0(bA=WWx1snUi2U3d0pUE@4ekQ#aq@yjkO8{=635+7gdZybq__w|i`vv~k z5wN`BuDagV+JftVF@G12yPq4}g{=4jVm-U!jY5yio$qz~`D;X5dlzBmH%fl_r|J<+ z(6&J?L0O@Vd@TF(_wh8Pz>Fe*FrKw{?sdR+OHnwtIr1?#wG)kyK<9hI-QqxU z`i(os*S8I-p_#V}m^{iqK|n+5@%L8#tzv+3@Us>ZzMsoj~)vz>Ed;-zpWE#+l> zMe>U{v#hc3wuiUsHKEt1=bmURw=7=j_muG)Ag3{hPi$oLC*=RagaZerH1sW-Texk` zpGsj(Robj|Wwe+?i_)IrvdJc7S`d&3KHn6w?PL_?(Bg*&I7YS-#ltLb6W6Hoao+Bv zTGyZ6bf{ww@<+E)EaO5~q2oqWX zUfcya`3^a(0^XebDSa61OOVLE0UCC9(`!LIr1&Q=R3Oi3exodO1%oDb)PB-qKwsfe zwZPpeiC#7r$d^a}0Hxhl7QYAG1+uz5z=C$?;1&9z8Jf7EfLIdE`qf7gAv^(ktU)YA zL!_X$r_!rGGBE>K^)<6aSvLBcnU_y|L2E>)eNOJzP|%bmI3Yf!M__@1EWhxh_l`IX z)OFubb)yUvxjOJ2LH+(^-Zka@B*Cn8t`*>67pwLMx$JWYshDxo+5WK@;Yui9tVc|> zK&NFga4M>Bhs-+Pb8iE$uE7)KaTB+*QX6CkXe?woq1bV41VdGS-%~vGvF0YxEY}M| zr=_vQuQXeJ0;n+!(ZRpNw_I285%`Niw&qLxc~P*ENgjKF0PFu1OR(-L{~WKxM6flG zCcoTcYH>47?3q<#kFts(e56=R!=C-b(Pi}~h~3od2$We5bz}~(2_XCa&kK)yFIcc- z_Vy5UwrEIwVf~%_rk;FeTC6?+NZvRYTjeT%EJwhPB@z?TRT0Z!vaJHE!-&TJk z0jlmMhoE)8L=d4fcRT%wOYTAxz5>|c_m>~hR*&}2A66vKJ5PSXOnhDX2?C-QlS}JA zOhSjabgBR1UMj}Puz5KRV-Mfvw6|q^aXx?Yls5@wIKFo;mYEN2pMKI3u0ei2Sd?7E zO$7d~lUeAxxBq9j=?b6Ry$t)EM1ZR1@y+oeWwhR7a=k9@r!w)5t=vaT1b*y6dm!Na z%j3E9`(D~gYUGPeLgz<%XVBRA@(Bw>c|k(* zk$X;HF6G~f9xj_U+n1vGw(nWpSmYN!v_nCSjM*ifdyUYPKW6;m(Ca0w7kS)BH~Y*8 zf9rvOzJwedgc(U0H5O5bFi^c%HsRdN9oMLjU7>M_%XWRP_s5 zCEZsq*HHJul zs(`I2i*^Tf05L!=FFHQH1Vd`}ZEmuf{$W9pTm!Z_y=ZuOoa;s~7m~kYjVHWKNKGc~ z+ueqS7PNd)WqnMc`8s0THR*5QgW;-llcmr}REBTuWJgD2tQV!-$*s#O*AE{8jbOsN zQUCkB`q0ksL9de^7AQGUeOqqkCdDv=f;P+2lADOJH%$ZSLgpJw!1{-~(GEGNecCk^ zE?;~fa`Ym0MjKtLy;yhP&ov8>TCR#e2oGb?U(SO1s(7yN`vgVH`ZcrJ7hv zF!Q{?owD}hY2ljfYW{M0sel5b*7CHCYUUD#p*Nd@zoNvSEWW!VE74I0)JFzBG(2v! zxrFRotJq8ASK_HXIs6sae{ww{==utr(w$qV22RJs`~CUCwW4=6XX2vO(Rsx!YK7_+ zKGx{cj9D02!twp7wzXt3sx~3i!&Wwb3PS-BPvZ&!(3MP9-(4+-mn>buxGHly75qUW zWko+6zf}iMrYxZRX)dDv@P>;*N@5a2+;YZ}D)%67iXPs9UE>ju<1kFP(m>j0F_HZp zZ)N+fNuSy6xe(%N?xe)!-^IBT`khk_fN!y*W$G^$7Ew?zs$6psvtRMs)MU^^OOjn- z8f=brr1mVC;GpHy-)#e=w>kv~_?2lFE|~@cEyEn-?%3l4=FViqQ`{}}zj6^T$FO&& z$E9-U{ES*!&VHC9UVOlJE7gI-YwaAl{M7mw3HxU{rt*U=Ps;=EODXI&rDKWTAzR6c zq(O)Q1Ka4c`ORs*rGIco(=nr)?Oz{ne9_zmt3uRC3q@#}11Get1uD&}-A2IeRjlY@ z+6=}`SU{)vP_P2xBVQrcS#8}N5&dHUn#xqq1!B}C13Sdi5Ke|jfk5Su&e*Vvc{hR_ zcli%K1V=uvezcUVb4*R4{rmVD8a)I~0C*pNwxeMm#>fTho!YoKpMU+GgC=efjrMxo zs;pG!ABtgDZoZE%0(cxX<#*x;XhqKTeNk?~5fWz|#543Rrrin_rRQ+lcTidvbKulqxZjJW`Jv;uO?hbs2G~95JyzOy?`coWd|rxK3)( z%bi+gl_7H`kV)?$JB+|#0R2ODLpeZ+?kc4Cf}O+z$6F#eb@lp=N(y~s7q6ib!@@ez zuUHZ0j@}liSmNQp+#WQN+&4=FIwumeJNECcge~^G*9o%eb$n&xePb5=5b0qOz$@9) zx9g6noNK`1LtA=Ftv81^{|K(gw-x`!Wg_qaItELR{40Ed^_Kjc_r!_3_x)P~HP!Pu zcwtw@gYG*3%$aL37j4pi#g>S`AM}viFDjr&i4jIpz)05FuT@2eZAfi5XFCo18P$^i zg_jEnN^`DX$eLR9N(Z*w{agS0JiO3&EKHT7SboipZTs7a!?!XHsVO>yljQcsJKw6( zAi^6QXY1{EmpYVoM`i!$>drE}6WP1~twbe>N9r0Sy>4yDi!;oc+-k1%#1w-<5mcov z48Nmqvl2A=u!D#nRV=;4wg9=nR7Uw+vo>7VV5#eqZp0*xVCAzD z5RqedK9%VP0;=*^RDf71jB9;wqva?Bvx%me)Bo<*1`=7?#&rw1nzd0zJs<{et7c>GZl%x9tRm%hM1_X9*~S?(~HHNDckNXm?A7E3=Sqq_7y z>uo%s>xm@_Lp3N0UpXjo4Tae7?f9scku?GIO4LWtK{ z>+AmT@bZRko}B4E`2=sfiyjg+85WCSy2awhCZ-T%d)A`8|^PgnA8VlpRv&UmNk zxNUzfKdd3dP;fo@sq*|}U&YKAPaJYat+G{1rn|b~@)x9sk*5PCT`H$GmJz3cOA4X- z6B%+NGd4Ep9fg}Y2}nF`7+f4>Jr1oOWh3Ck@_>m8zp7()H5>5yWtGld17p~=!hH$5=wBq*PzH&T z)7AmJ!zC=uU47>}w*h?fj6UCxU*5qf!I_}e=G^nQ5ZpN`Neykv!NKclqc~QuEm>W` z{9mKjH-CrlCMd3|<|^dJiz6Rgl-DXn*;3BBX*3H8tfMWiSUwIyy{J~6=WE_D8XMo> z*0N_1(;0ykaaM%_n(<=u=2{h6lDdC0s~OT99s`DUX>w5yUB?%{yae-N?|jykws&sy zlF(c-&p2>oAAYTAgaWqfs6bLaqbcrDsh)1w_`=1PxX7Ru${*awP7jcBHI24UFj)LI z=UNuppWplJVF5Fr6Y*Ic#3{J8LH3{Z12z>&P5i4ON;OM$A6u%gE~-E)Qd~kJ4{FV zrKi4k)AHjX#Xl7wcOU(aUnxIUW`u}|v)Q+1WvEEE05*k6i*awN;QJggIKJ^oU6?$X zdO_xM!u8Txj8cbHZG@S#zf~)%uKT-KW=k?n5;D(MBM0kVAD$WMQ(&vfmoS2w0oE^Allvigz0MH4_C zOGGSiC8JgUe2Qm27WnO+(|6@@v!fNcnvmGY#R3ulN=NRP3-cXVPXAXeO$c+z2?#gq z&ll`E$51^|VxaiV+)<=tx(84zKS3AWTT~|71{h-S=TIiwvDUz)sYc-G^AbUV{!}-* z4nxhsT$&HRE*()DJc*QqzqG>^rk|>^;9+!GTFkX)oPx9l-9cZoMuJqKzCrA|??NdO z)+S7>{=JzqzBf~_XPnmpwprnxe)l{ivO53l|21$-Ej|QouTy2@tA5Ue#Yjz<&({U- z5Rzl+SAWY!K1X53Y|nj}$WWCHy$p8bS=VfhN8jFN8 zMGrRAS!$?I*ww(8OcP>i9UdVAY4XiNhlx|9PIX*bnpudBE2Os38v^;^;*l`+vNz%h ziJbpfNx4$7#CqAbC}Qr?4DTJ|ngBb0t%aOvYrpGz%12_GbF{whnv==-Msy?3GiWr7 zQP?DYuKi_sB#fWiK8gXe=&k&XN`qhq5uBNsY~61fUm$hZG#nP!Ec0v5s{i|p@8L2d z2L8kcO9aXA$=G@0-MDZT|>nXnXPFYVoJBT7RLs;c*AN2mY}){swu! zrF)jKdR}6kod!8}{oGKkJmwU^xKXp`jGQ#A?-aLx$Dj0Ok>{kI)xE=92!7pM`gNPv z-9)y0mq)T;1JL_`>tADkMMGv8T!}od=V5}s#qkIuWdhA`K8OVEu!rkKT3JMmfTQu* z-Cx;XZDw!4dWbs&??s2X<5=nQZ|!3kXNJo;V*c$K%ORumA&I`-7>rE6mB!no*Rv|c zNo5+0C0VH58N$lLb>scZ);?a;FX+hxSZxqSX=w;@RP-jx@hOY6M1UtSYDl&(-z@&B ziG&L~U^3`HLBsZ(%gN|j5-$Phhq&FA6ap#_0j-ps#`H1fxMF7PRiS7O3;h`(LAO=M zv>76S$Hg+Z^+M*fHY$o+#e7_Pf&@ecD0J(JlETN~uFOEDm>m48Oly z&k)f2rR>z4+Ft3MAof4lTcAt zQiY_TL8M=GfcYuL>y=Y~e_=cP?APjv-u`~Uc%Ow!qir-~%%yU1CJLrFk%It_s_@NX z0O~i;5MekIfbGh5PWAo7IZv`zQ{f!wu@mtDjoq{iVa==7jua5Rh@o2V8+LVKOuBI! zmjax{m=>h9pM-;4ErDm1%^2DH+P7GNN-)JJmkmKMG8)O-?Et(LH6?c4ZT6UhM|%X` zit$y^zHYC@CkiqmI0zE4&qw#`1hOAt~8RWP-q_xPdJ3Cik z2W~wm>NgY#I_WEnS%rIKn;!j0*cdAso5ch|-hfrvaeKW~hHPTa5o^ntG}R_(M-uIl z=z-Eh%6oTVSnz;DdT@yq)8S8y+j6+;1oIoWp}|_|za$k>Zh{GH9Xu%mbyA8`Q9uM+ z=uhpkPgu?Zd74vNm@O9wSyMc0*NJ&TyI}27Z(IxJ4|35Tgy_<6=Az#J(v9aQ%`fp} z)aRwaWW8pBv3*f|yZuhzc=DZArMjQECM!Q4rwT+#;kGw~{yYtV1D%W{o8e&O8MUA! z;!)Knv*ZxHS*#3w|Avd+Wd`Y$&Pa8tD!K$f!6=e+1CyJ_b#qh3QrE^IzLHhBH=*#y zdmGNT1IpZq2>lB5D4e&4PMZu9QKpoq`ZdN|ITGr}RoWs~Vc2ZE+-P=!F1kUoGyx57 z6|;x7w}NWI+SV`cV3Gxy$~fbg_1i7ZSevuoMWrICJwJaL;a4hQ#2`Rj#jy;2j}l4p zS_(@A{BBJ8WHQvEY4cF~kXEhn2cq#Nh|Mj9T?V3;%hsu|^*U@@&xIO5(>YKA{hj)%Z%zN1=(NF&EL zZ@1S=$)B>~6sD}G-YaebrDJGwu52c1RJMlL_H>il~w3M9aTjSNmL~#GMc^02^!)9{9)9MZ)YY zlCgv3Ir_ac!satAgK%V_>^NddRYE&*<71|u;ba-$Wex3f#3VD(5_=;uLUbk-=R0Gm zO|~)l5)n38xVDqEdnd9oM=d4$9)o2sCLubI34p^&cR!&X>QmVCLt5)uAQbu@&bW}DgIAfE!JXR4-1=Vkl&jp+XGv5 zNm~`IIEBZ7gyB_B^$@;r4-z^iZOYsui5h}Mn8UZR3{B`!lEZmUdqD$oP69fhs9Fqy zOktc?ujhxCy!s%kv>N*A8kcq~o?WbU2l@pO_L8NgLxp@?cIg56E4>x~yE06;S6EWG0zZ}*t0h)$n~+JVVjMAI*3aCCls+T=T(AWn zfj5LA^twd99Pt{I27@~$BT&#`1jwcXO7$iv3O2-(SAo4>rP=Fg${fKl-Kt_10W932 z|5(lwquLTHq^w5?elgmO^W(b*RjzkjOSz$90V|rJy~-+(r9%;3Fjs2V@kAxEcUx&D z)j=q&I(l9vjnRXeh1tsy4g)v>XQjvI7Cz2;MAz7t52|68oX?71N=|Mni8_jdTLVlr%yo8KOSZWz2VYNZuI$vzP;*_ z3pDpeSmmnkyekQPMaqs)Z-#oT5<;qBBi!H$WtmN}eLWyTCZehS;@nCUUPWuPvZFhE ztw>o)o8yi`{cX&&^eu-R1&W>w?I#aYrq zvrN1t*azRNH=#eB*g`2e>j)NSOJEs%H4;ncz{u|6u1al-cUaJr=*Tu?rn(fL?}x8; zsA$~+6_}t68hpnYYPvQQJ{l4^7jIo5jC`0p>y2;kr8srS%GtR{-ddfcJt*}DSfCp- z^Gt<*(PvYUaQPX*;t-6oT#Ajt&)Hi%hRwGhuI7|iOIC1G#wi9zz1Ed9!=Z(v>Xo;T ze3BBW`1sR{rIZ|FiW|u!o<3gQGX3>Y{A*2QIx~0n0FOCS78a;Y8h{I8{_VaaDGqb< z`EAIrnDj%ow<>ho@2KY{F6~$i$5F#40xb;c{`k(mB8T;E1R{mth z6L*bXq&%j&;33*%V)n=>c)+<9(-3zO4*iChJB1aPHS!|r*629BB~R$}$HOHi!+>R2 z<*pIiI1u99D?e{3*wU;2+M>#|Qwj6jvSg;-_T9|xyYL3?;-8!ZGN(;}T43=Y+O5mSM!pl+DhJMel8xpaC@biWm#IG_JrFN+3+^$;+f9*~kQqY3AvW7e3 z$1#tLblGZT+A}VrQ(*6Y(a+Il9#TDvl(21+VlukDZ`M|MLqCA*EbdZIu)S-VmHo%E z3WikeW&>i6N*doX1DjfbgbDatOJDQUm3ubERn-COm&c~(s-4GeEtoKyO7{T?+U`vT zP&R^(xoM%HE@I&}wZh^ovO9;8X&(>G3qPu1#2ChTOz@b ziv>E{yDSM6RJJMB-NtWOfGhK^%aTS*&Q~Z;B1+Jd&o>p`Tn?hGp#mjRoOtB1=5%tV zTNP+AoWsYI$%@WMKr3;(3XF7M<}jT%p)P4z)!(UH&s7otA^Dx?U-ohO&N-ndj7m{f z#Y*~cgPfuHp6m+PBiLiF(p!#6FVc6sFY`Q@J zqVlO|)esZAgjP3}N-UcAm7|iisUO}^B$ZR}tMr}091JzZ3??dD`)DpyhMO!Qg0E8D znA%-4BhsoA8m5>al8F)VRPqq?eMA4y6QTX$hq}cIjTa(pc`AAxrSri>(y1JTI`7|KwsXC!%=Z`Hn&<~9s)`0Z zr{nQR@!&#}G7#iH`c9u*H}EnLIgfD)1ja2h>XK;JM0*5NX58a-q0E%n_hf=W7avVz zE2FvAtV4s?*g%Dnw|tkJk1rGSx@kG|3SH2cZ627X&N?j16Tf`>u3csAL-RX-OUujy zn=gO8zRsWK{%pf7fc>NiIHXuOLa85R^UXn&a;Ar_n0ORBwrcCOwA_m>JcexKJ|n<6ELDgf43T*H$Gkn?XeR z#>zWaM7Rc)wZ!P&rcAFs5X*4xYXl=i?|rrQR22Jp&y2hu3*z*L~7rrov}it8Pw ze}JfLWhMznYt1b)zH@jP$mz0ouea`o5DX{jA2oR6F^gcfsu8+{gG4@cD#K>#s^4iX zW^Y>_l?wV&F7_4BAO~9mz}xa%ba|oCfd=TNO3wf^->jI=c{-<_%?CGp6@K4=*q}sV zq8xlxynDwL*$8o$@^X#(8L=rb{U5!KdmKL>FlHFLHQi>c;YAISLF#ue)OFYPwnlli z{vlGh6}(hZ_Ev`4t&0ye!)|T;!3x zvrj3Swsr*AUC$)lywQb72giNJ1kc_1slqJx?;kUv*pj$;?Wxs8t5z>m!mYAt@5|@m zd+^fY@*nv4V}p}|U=NQjUkzH1^ z{pB;T>y=DGoV{4B{~^VN_uM?q^CJI`U)|gUpTALjK2vB8(FBCcGyn-wRZs9|#-+cN zKm(`qEaxj?(%>V_8xqK|0b8P0E*VUeL+|eeKIyyQ4KXmui8lE&3t5}AyKu<|@SjYk z$Y{`kZ-z{ay8dI=jq`l&gx~3}soB3I4aG1$(izKZ1Z@+II9qdceL{^^v2y4MXf`su zLv@$V9)n#)5uDWK;OAiXK6vJ!n#Wd8${^_C7*Zl`SNaMZZ&v+gm%%JKWmhzR;@5zw z*JT9#q%c}eBwKtSH{;|9^0ElFN3=*+qSvx){FuPz(P+cGfI=O1?vD8d@5RKhv}Rrk zf-%uWoqC2l;CU(edSrF`!29bi@B4-|5SIr2rS^cR&jBsFMmMHT)+oJt=C(g_i!bN!GNxxc44YWUTThHDV9d6&<4WUVxt4xuY!$JJvIw zx|$Q5N=DNDmw>pL%(FFd-y1{#uL{~{I?4HWOSmni01uO`XP_JR6}O8aOQ&C??W#_X z58e}@Z(G=-HUFmcMGGa1ef?RtPLJD0;qQ8hWn)`?=e*oN`41zS{fI$$uIH&R;XG`$ zK4WnHP5=b+mJaK6vUu-xsC+N~--~`;&V6)a_dw^#IGlP+bMl=d?kUi?i^QSvn7CITTG#~a;fZMj_9q6rJMOthScfL1AG1hU$FMEua zd+r2;G%}LfDGInhssBXqEGJ>=9g*o(f=Ko9;P-shlV9AcO;PZ#xBI2WtAeDe z*UrZ`Bkjk0aCxE`k?K0etDP~bc_PrTo6k1=z~2D+ZgLvVx7(<3nE|P<<~|;$6cpw- z$z%?KCeIq<^X3>$0e-0Vmgcdw$FV=hj?xwBHlGrxtA!{VBg&2W6LJ zAMmQPa91ukre557wNER*u5BeuBg>#4a@-94K~Y!`?L<889&k*aL8-2f`eCE+Janbu zx$X_SS#1JT1sHro?LSU<5>hGzX6z_MUM3HRRMt2^u1O0JP36p}bMGJODSSWVyzkoJ zu1#@>7E1MNI}7kyjhm5pnC+kRm-B*n9SRmr-kWLY&q9zpjwpU!ULN6!Z-{PaDrPg? z9I~5_NQbz*kQc~746X0ojjG|bjsBKl4iQJ2;1wYJIsL4Tn3`;LQME`?n=Xu4*xvnb z-m3Ht1$~0+&Mlnk9!mCiCf{`eZzu{*X^Kyal8Ly)Uf|6j5xqBuC~#HVw${ z7XSy3cQ}^3cS7Dpkd25&Vm+|Kx+s&XEn8lf^1+MC(4@Mx zT}RW|;|_j|dD`on|BbIS5EknA(@=5VzW&+w_`0P@W7FA~{0nWD4i9YI5im3F8o9qr zpV7`gfW8^46rxb;HL3}N%pV$OI9Vx_5IfkDcYIi%Iux7GLTYkzrQG;h(eB~?>Nus z0Jdj9OP{Yl+7seJ@gXLC%Q`^;Y2Xq*v-SI&)=Wg9{U! zG*1bd6-mW2sgJ@!Y=EB|&Z)u~-f{UY^?beHrW)FFC<73{4}=ruA%Q%})24c_6~Wgz zU+>o*ofH12F3uv(aM-LxTENU!I%(^CLdps#5FsfrtQHVsVZipigrbAd6yS?_d*(3Bz(#1BHhh;szfs*JG0EXmNh4dtonS z*&7Sll62n>lR!%KtfN)GB^WZU-l+!E{>Ft4PgwEPd}RL`*@rsOo%{2=@X7w$D1Ku_ zphY<$R>rb2h`#b)A{LJ_#)Q*_-AP<~0>+{-&RJGqPB$LLd9wH}R({qEIUh7@W%^|i zms3VD%{v)qu*%!fjoo3TOM<-)Z}6`x?71PB%zL6uR0M0 zjMld!pLQEgOffvXL%M)|sRtnMD!D?CqPbE*&Kv8I5rU5oY!EfkQoT~T-2r7)C!I^r zVk}P17RT%<9i)ei#% zdH8b?pgyVSn2=MWvbfButjRoxS|kj+|0UfC<$uTn%!}O&Jom9(yBec+&(AFp3Ta$b zPG*WT?VI1%N)uJX;8He))hZiV6aJ@?%>UIte_%W0`S!(b08(mv-7^5yQNae-s*IAl zbQmV%c<5Puh4uQoBO7ibRt|jTJGr!Ay(H9Ga=l6=FuArL;Q}*s#T+7r=F5qt<`8<` z8ljs``0fuZUlq?x@_Z#4Kg0DlAQKwWuF zHX3y$hV>Hu&~1_`oHTt7q?nOkN(!dpncn%B`*nROUVlB$9(F4qwP?(dN5#ALu6;xY z_<3usbu;9scx>~fn`TVSq1S<^wDfC+A*)nuB>%wHFY(`l(O5AFBZ|&uh)b~y!E5&4 zDFH$Peun5+3xSK(fU%KrmOL|xUkzoZk+Bh^mgc<)+$hTx_Y*-Wv^78(fQ@3W?35>fpZ6<=4&4{DyxmUlD@syHF^P6T` zyGHCE>)$W%|7Vbk??Jwn|1X3r>&u{GB+FP`*k85RY?A(M#nvJgceJ1f$)}AfU%s6Z zV1HT~VwFF~7Z5d(y~v*CfQaTjHqy}`u?Zn_iuICRlmkwyfq3T8%<6&G=`#fo-C8V4 zqPKtk9ts+EVrZ-nr7|BRbku>&L~QCTsFkx_gfA8TPE>~GNakQcbjRL-Rfmh`lG4P23PM59wxiA%+ zN&4&C4-^`H&h^));HUD#SbxW{2D6no+R+t=(7F6Z^v|4DVV%EP1k*3pPspL%J_txP z+-)h^Y9=Lo6Jnq4D2yPxG|#|7JJ*{qpP;#jETiL~NzJr5H8l;ER=&;7LURLSjtj7} z*%7pJzFb|>_O@x$E^GW0)TP0b4XM$;6E@~puH(!4eqDZr#uO2)y(0`6SP>xQh@uQ{uP#b|YP9{# zDt47LnE$zdIlg>K_J5Y_PLDQGK`kcKDgeH$gsqN>EW$PVS<)xlTEO6Aq@24)ngFIa zHFwBN{e8hKS>o8!i25>tqC8NS+=#W^MpYGH>zYYTN=04}iIpY*{AV(L6qv^_P*K15 z%~-?PvtSngk|n;W!KVVVM|98TLmBZc(KGv_?~g>|c5WyC?BZDtm76Elw^GlJWe$Wd zXOpssmhDC>!+vU_V5;v0mPYH|80NUgVdSvu~eB6Bn;RAhZFUO~qy)kC38uVDM z^F*bSNK&AxeYOT)IeH~2AWF3|&*GPI2OAqOIHDnCETZ^FaCFLvB#BOht}Gh?daeM( z-wz;#{`_bS*z_omU5JS09=vxC1r=5sTcZ4!awC5FU`x|Fp{$nr^O)_Oj%Ut&!!FRQ?ZiKb+4Jkf%fXxKM)5kjo= zgU0vY5Q1OL20L9qC!)%5xq1MiEL#gVf>`Ts+j^+Z3$v4?@$~;zyGi= z6xTjvC)NI$P(+oa-*{#xhS1p?JriA1;tiQu-=rM&dAR@ogTGGTW3+E*{3 z{INjNG%2kT(hrZ?LF$2rllXt;G|p<%ag#dHAebHfX{#0H9~Lc%#<|PHj}HJ2GLuvb zD&B!}9G=7=U8^tg1^6q!{O?YoU{$)sO-ZJIx5(m*>t{{HYc2C%oYy&R(p})52mP zWzWOc!rak84co(NT0Jw)UOvpLg)LuqWRX(-bAl@0$viE)uMj&S5KPYl3NM#`S5tyc z(gTm`L$Tj&Ix+?L>W#;TRi;)tDhvRC#Q=P&g`(HFqxfV^dS=~Ppen{dZSTm)Uznl# zL{NWa1?kYogNz>TAMUKDeUa-?6@pN<@(J%=PzDN)OCQluZ9N(Pvi46_i$YFaE-%|8zQy&jMNdV%&NQu!kpC;uQYY^ST|ANy z)JmE@vc`L+1r=6Sw6U7F&IRq~AjZ=iI$aa@@G6yz7lz?@xEd-9h+k0Mvj8#OYLeu= z9^=$;^Tpv;UzZc=kt-ECU8?V>JozI&x~cmaZ|9pN?-gpFM`8TnO3(XPNpw>vb|`Zd z7^(8I;^^`aM>mCIZ(J!A-tQ%yGTu*4ki7*2f>}a^wyJz^WNh_8*c*0)Lh~|s2DfK$CA)%Y_`kzsuL1=f zTmn`*E4VX&19BA%nIp=U6H}?mt`Yb{!EJk!r+&IH7KVi~`(UX;=Qk5kU{1^v1X)TC zTaKq1jvD$jS_d`0>K&b;370wb!N>6{Ni%hz?_4UGcDiC{I~oBdMdql}S$@LW)Mw&jUHhlcpQfQ=-h zB1?k0R#Cr3lTWqSVDp>PqlZXa^|wK_RbBaJTRo=%GLvrMvK87$LEjCJAvbxbHqP_ zEB$J7SzY!hr@|0I_oJ+MPwLv-8P-uk3$d6{CeGkdZ+{VzBLjg}SvGqLX=A`zlJ}nw zMdg**;mJeuC!cybZiByP7rfxcJD1Ij(dnn96e6&Gu7Sh6Uq1Px2-k(~621$WK{z}p ziJYw?^Iilyu!qG}wo680W!u)##f2yG-*uH;$s4k=8eF6lSU&grzh&y$;FWt_ zMEoBXNg>!eN<3t2odC}fB=Ny;I(oT`4I!uF17xtgSjBG?Hz__PLF{U{udEXDjmhPQ zN8e!UFZgVu(Db(ttzn!13(v(eicpaDp~DC1A(!vyq;DFnszVkEP*rBPdQZrFx>-BQb#qeBYokJFy@*$JzP6{uOC7@P)0-f7z*gFKE% zP6?X2!xBwzk^5L7QjXnr2OM&PQDAKu{U#V;2Ma2Uh--Qr)viIK=(S=A6D#KQGRhSp_oHpVYi2eOR?GNX24=4yA0f4SCeE%reU}y&amro3Z9! zomm&;5Pv!^0jJ)nk2ww1K}B11P5qR|JSE=de^^|b76PiVHorv*?^a7EjNR|_I~E#ul;EnZ|L5q$OKwMx3^1N!|zd4asEc<<`9^6TjVricU8CglwG%t*~$arLg+D|hu^1apiiy4f;~+03dJ=q`OK7t#X2?c(35{XJ%W-MovuKCr_69+ zYRdh^WuxIzk<*lFNHbm8)7PjUK_qpMNnRhkZJ$1DWSaZw(kV@ZG`Ce4w#?|Hwf zP6wc(FHiV>G?;M_ms()9xOM9J>26214q!d@d#>c(>YC_L@KiSPw;tnEE6T>sD~P*c zejPm_JJ~5q)!PpsettXrOI~Dt>a+0T_N>x5P3*pzsA5j5Rz|^ynJ^&UL*jNK{`g|` zo}1g(k{{`M8_O)8*WQ?a?Ck3j5UJlko|#+{6>piHFG0YzC}IZP4pKVxy4IEj!v@oZ zNhWj~#$G~&r5xf|RyBJ;D^h3^s_noE=mv&;{}6I@?$?Z$q|Xi=5~i=c{w`%b09%}} z0lq|V3UJgUZzWx)EcB>gr}E`p4I(VBN@r)mPB>f)=Tc0SCT_D}%|RiyX5E{hKd}4~ zkcVn!oQ5v1CV49{ij3^+qEO6eJ(g{rq?G)-j!>y0Z)?cGC>!kdLIA7HEl>|jJGTv{ z^CHAyX`gr*+$Ewz5QZ~-Vz}^`5w{lX>u+dQC{IibpEqnHo3&Swvm6x!wV4kMMTIe8 zE?)}L{6i0u^DNabFAMro#9u`kRD{Rcgmhd4ZrLkbt}evZ%A&9D#v#&{4F2gXM_zKn zuo;Z6rWbA^UF?mt0H)g3Wv6^9vAK7;&~P$Wyk)hw^W*DDrxW5iwtL_WPYH3fjPTIM zR~`14BHZj-z?6=LvTjXqMQ9+LqXJ?MWX3;x3k*k7)f^3Px#8;H!=eNWtS~@Yf<{jR z>EKbSpy<*s+@O@(Rup0q&wQEQMjka37&Gk&lG!36m#g=o;X2DOZX%wAifQwElCv%r z1rn~io^&0+yfVjLv8y=QaU>Dzeh2FKa_GqThpnO%jEQ5Ne+J$mE!mhllYbARg$ciL zpKO!J%5~SMqIN24(qi!M+a(4DOZLdaS0@_P96tx!|5_A(8%M(?8~MY9^lA`_wp8tq zzSZ%fO5Xq+{z!-8-!ZSs9>>$`$e$~cSDhhiW-Uv1iCMe;k`bWVVtL$-`P{|+e%;kg zoWZvFZ$)SK99Z5Y@t0YCx(n%=-sh|MqsZPQ3)CwKYzFaMOSi(W+DTOE(TaaBG76y! z?UG0(1tfmQo*wS853S4K^SA$Xs+m?_JJU8SJuZT|kggQjL+HNJ4~F3ad$9^gVvR{84EkTyd@YRF>J6C3>7GtEiqJAahC ziYOwp-3;Gx^kw9q6CEWGQ{OO@v-ZtJ=`Bk5v3!BkN8!jNG*v$d6D7J!N)vcba7{fM zI%txq{@lLhtsm$vxxk{&bXS6047s~sU-j|R3msH8c`96N$aLBf{``24DF;W*W4Diz zad4Sq@R!ce`YqXU8dqP}V6+UCStP%s9@cZ5CA+E35@g#)IhQx&QBRg(Aw)gW*G*L@ zwM*bd{GymSFL`ao7vE~MD}U68U}(pcNP5tU^IO}1_lmFm=H^Fsh5H+x^$?+IW5 z@EP}8JrF50#=@wJ>C>x8@4hiid1>33Nc8OuA<;TKY<_Erx6!`$;WW26y|IyxBy7)> zd&I)^rlL=-gU_S3L*j9%NeZodE3?>!xA5`M9*GIF#U zgG;TWzWAigcfuGB+}(t@AIsbmoQL(evBI`|iB(K&cln9bO*!sf2Iuy`D&XXHei9e^ zgpG8Jp86r;%#8lt^2)R!4mQR2C7F#AoGHj(d-8`(vL1VG!?`wRJPGI6<%HXRW5Tl9 zmUO*^iT%@s9PtVo(>g}I!6P`-09?ZEve61kd%PnVVos|PkIa((?`4$z-t8wpz zh`ceGel0}@lgg5?WSQ( z4`=v4&OUpvp2O{?bpEpZ5xV2tAr^N|(J%j#a~LfknvzZ#*FZ~fu6FGYC5%c>1zjMrb z*1VI|z*YG&&_&s7oMIVf;T?YXSU%82VQC=c@4gTrjKNO1tel0KNOr~Y^J4>R`g-Zek5)V&Q{JOnJZk^h%B_3%aZVkT9ABa$awft8)RPIE8;mv jIn{=Hmfa2zpPx(D8hYL4o8f-Ta7R_?tzzj*v*7;&Q2bEL literal 0 HcmV?d00001 diff --git a/devices/surface-hub/images/sh-55-clearance.png b/devices/surface-hub/images/sh-55-clearance.png new file mode 100644 index 0000000000000000000000000000000000000000..12fc35ec49f38e6d933f780202e7cbfc15013aa9 GIT binary patch literal 19076 zcmdtKcTkgE*Eeba0hKCcA|eV#1)>lLO{CY*n~I>IfFMO_QWT_yEz;0iF^ z=HX8k{9@Jij!N@P_+3B8wUw@gxtZOdT`P6<)P2jW%$JKjb5+5b{3V^a($;?NbG0zm z+kRIPMP|$OHT?$bE1EedGO3xtl<~r78Flqx@ffeY(c9lb`^4~jHNRPjp?iZ9rhk54 z3@(2b)H{CLzd_Of< zT0w)hQXC0znSt^sP3Bc>;pkJ$-uPf(wg6?TaNVG0%;{dJ-U|_@X%Pq<5~3ApeKc2~cJ4!5 zxFBV%P$I9%^Wpd+pz|ezUZ?|pKF?h*9!-vDZP>H86nYU~J6~&dnEt^D(Q+Pir8RGw zyjZ_i^r=%`CyI*9KZ-vPS}inBaK6wvMyDxIm0r8z%pYGrXV=a!RD`f9U7vwv*Mp5t zUTRb(3B)>1Ec+*l@K;1%3N^VI&esab;`rQvBT2!up*76z=^vD0aBn_{#`wL&spk?M zeiw`Cl~ygpFhNdxu;1{l;&VGhR1EM8POx}<=zK~j0BnY`qS>+tB=`HQmr zbyLUdww!<2Zr;<@WwVJ}4(zEMun0PM`6HUimnUxC6>R0^U<`>J%fO0#VuBQYP58bh zC|-Wu;a;95O?Oe?fJ2dut1FU6U5mSEA?0mZ?B7?W(r5;Reid<|eq*#~-`X6I07bWr ziF27hd4I>ZaK+EQ5%Xs3pX>RnZFD6T2FqK5H`0nq+}H&8Rgo zLp2D!;Gy~7_${ug^ zwpI;yT&K~w!E44SN2W2O&($lm;qg6O!beYYVxoYj$l0HC6izvM!tLALq6rtZoy-Hp z&z(kUN|DZY_GA`8Vqfbh?>hgua}rHF)Usp>iFLX$w00I!%u>D@1tH5W`2(v=tgR$R zP-Q02J4`Rx-3q)SZ1q*4Nj%Sk#mHcz126jg z7DC>F;ht@!6|M!N^X<+nBA4U&eOXJDvo)_I8e_q2IaqepoFdZ6jPar_4VQB&I^+y zJv@m^VS;bBue)>y?y@`qj$BgGZ!f z&RE)G$J24EL*L(R>)l`AL37Krj}3iO$oQ!!9^Nb)-9O4YsXDrorR}3&zq8Zk7o~t; z*73DIk=&=?UNkRnyqmKA`H!kG7o3nG+HZ_QV+25)bHXO(pI+{8jE}y14~y}~D@&@E zPXMjuJm9#s_kn5bbi-^mM54u%o?nOg;zP6^M$sp-I#WwI6OO-afAaMx zN*e5aV8JOMzZqw;_Du#LNL#WpSu-Yw?mIcjOnEzO^TfHiP`9eU30@p&1Ho(=hI_j8 zy0waoDU8r(e3z3u{y7;EyG%+JesH2?)!DpNF|u4wtfP0pVR)nKv`KEDLveqNhAMvx zMplxRYv^^9hJCtf4~BAGyEYFn^r;e`?o%^fo9#SBRiWTQpza3vaT+`!uX%qF~d!s2wy1m zhCyN_3@Bf3wLU41ift-Zrpw~d3Mdh6JfHTIznQ*d&Cm9$MKm-ms&K-;CfyvpV&>3b z350r&%BhztggleG!S2{}*((zev^iMB#6lOxbfZRlm(dOZiIUKU8Z({=bP%ukXg{~1 zgmmz?Y88e%_}8lcQMgf^MDDAN#bn4L-Tsl>l5+0Gf|ypP?>!97z;Iq!T#z|FZ?>XM z|FER}mt5z^V~en6e_GqFOPIGW>nOrsH4THgls%Vnn=ma<3=lr+R<>82RD6ffp^{2YFAz-B$> z0mR5h{yb7swTSsfC?!{nhAX?1j~YE3_nbKye%-NbblwJ8CFfz9Ubd?@wI`dN=(55? zYIJsc3UBs>)kK={@}iqO2UQuj&+JR7oRy`X=@H!MG9`Vib2BShcsUbZ+;r2Zm>M)2 znc#$1!pP+_**6bMHreBWngOZr2$r;FyJ!6$=!G??Hp9M{U!BxGE-QdropD-O-}WZ* zTp)Vrm)n#`Wb}I&&d4>-W{%e#f@){qw1gGGFKrP#?%+m6Kj6l1?*~l>paS+LjaiCY zeV-cf!j(dc$e&M>llro028IAjB*pfKBj6*TAz#9JUnabX;cB|j+0=3uO@&kJF)M*({^Nnt9L_`Jw~kp%IMm%> zS&ahi!zInY(eX}kkl5?jAL`L(FzG^B-rL@4IcAfi#W3Lz;nW`?FM_OTsgOoibTJh$ zquo_;rsS89C%=-o>#WWccgB}R^ebx)cQqFQQfuS?wHk+o`IPBtHqPJXw0h>3Z8MnQ z8uA}%RYj2ZosNiHZ3%#;4IGyAG>zGuG*$S->J264b~9a8mA+@^iY29Iwflv>EQh#s zP!AjTI7l%wODU5$2o%RLI>#s2po;q-d`X=NS8S;C zgYBxk*pw8O$NmnK(MfwI-jrM~eJY1JjY*IPO{6$N;as!>iGV-jpM11j^1tjIUgv}} zLo81SbF+zXo6$0)ou_3Q6CTP_e|V>;#Yc;dT?a8D(B-7?9&ZD+!pO384w5WzD990L zqS%1fRV)q8CnzP}%?W!4(5a^K!NSAjQlQb>){og^j+Gb&hl(IWiJIt*inBRN=p z%$q*?jAoLHl=@^uc)w}fz;c?eKcPQ5=~8A~!e_$l2S(?qnHwu>%qy#slp=OW6!K=v$rhgvO%m!~ zmPt#l(ZBlXC5c6%X&4P?lQ<3Qyk(>%0n>=Yen0!8JiyJdUzxSw0p&d4^a>rXj^QrS zLs-o7Q1N}C?fwgTDyP{To_!2yDBFriGGvAaetKt~?|gy$N_$Ma<#fwEnew=bk*nq& zsspp_aja1__j@AFxJ89_0lEs=xVCh3S_9~q9xx@_oYp-FdE!67l$UAhhI$7n?58hb z@-MX%XmcAKBb1-r_bpVCV@Da=`e_+;>8>B3{uG1bUuP=i@D z=7f*%bQN3E#WM-&%7u+eeF&v1!DK-b7^9!KJ+C_jsKCscL(%!&=w=Wc_@#6%^73ur z6D}?ljoljsuGIcv+nxP*6mgRvVL!iuI$V1m`3x!ucJu!+3ev^6fwTzyU#I>|DkA#n zpPIJ)6xM6BrN_)Nw0U^omNm+q5qenC9eUc7YUmos&+_vw-a923A)y@^$)p-t(zI_T z%;a^!?v=FLDQK=lf=E;iBz6s&T@0T$t=?e^kyig0jp~rFnqQeejjZ4w!h)moe9PWl zY@)9s<0-zhO6SM-Xt^Mw?Weo!Wy#;^6NN}pO=jj;9mL!7UFZ-=?G{FDRA4(jIOt|- zi_L!^|Mhx4bIrwRI6LDJODQU8ApW`Cm(ZRst+i`8p;BgrLOfAG8m7xpy^bmyYK9KN z=J&hQ1lfuzY9QzvGXK2#E)`-#d`b-$peS%_qlP#Ku#p`|&nUnl{vVc6yO644&fy4#ld+oA&8(;b=3_)>%J>Bky zt!oy`#BG_t_ zG-}5Ds`}Tu2IF~oj0V}w0ky>VOQ92$tF-RilqNBjYF)$$z(^Yq#rNkMa{xEd3|n?p zVtMQFI7t7U`6aLGGru%AMQLbL6te*Lai8;YRmAqY#s{4d3^!S(L1AhO1UGwGL!NXE zhP$I-;bsmY`{x2V1_1G?3G23eE29|@1O;gRG7zk<9=PKLD%|hvK=AD!0mlaR;0@i} zjTKnitVC1VA5$2Ry#_T2d+wncZ0U%=23^HlOPCCe|Vi%=E#DhCCLwTK{t+P53nzEc#~zZwvts0$vrLw!I9ybBCO zq&op(^eP4Lc=t=hnQPS2Pr)9W_!bB!9||M0M6}e(Guo!4@0S3 z<%3mysjJ=utEy2~JqK3hr>+Xhi&sDiiFc`Qv{P3FE4~FP%zsH;6-eRxRlw6MkfPJu z{|(F3NF#S)c;;NQ`d~mR57h=0z_ms(5<83!zfDs8mpZ!fn26T?ck3CNi^cwW2!5*7 z98eFiAYCtsZxLsn{eS1mnQAq8QFQ+xk6jUO>ZwL@mH7xqYsF59hLy*UzebQ> z6>7(h*B!GyK}m;Y@P%o`1nzj^`*NGqNdvGUS)`NnfgW^e1_}(=6Yiv5l3N&!*@`UG zerAh7Q4s&PN4TiQ?_tOF&_~^5yB(#oD8RKq zJ@>y^&HoFHE(t>3gq8mWcoWt1BdInkj|{cq+`eQ{et=-HQw_T#BH5i2HCXBM(IWC6 z2Lbs$18mMf*;<1dZN5>Ta-tnTrh4{r-*)=QhwuVjR^6jp+f( z*1s#dZbS_&RQCi($cMK>5v>d(%>Qy>v%`{B6I4QOPziCvj%zc30zCh;BXC*3c3qTU@#yLCFLj_0JAaG~=~7?Ydao z{p}pFHI4(ySl+T)`h`URTjF-Z79Fg)mMFG&<^$OBWF9koQ6o4%>v%GR%#gQnb>LWD z*iK3CWdxK`CN}+XwLqVGI^^^JIy6Fk{50(VZLU1rVOh0=32qW^+Z$dYR1D=GDN9=6l#t6Ad;jKfh)!~?FZEJm**n4|P2r>9`m4v(*O}pj z-ia=P{_a(LQABGvhx{B#Oy|}>dR`?p8ejVi!lftxqIWRRg=_;LdPs_xIsEt_1? z{`a#`bQT*WC@4cnuTdD_MnUU?c4m87Levn#{?|n2I6_)=csS79(Gtkp@$po>f2MA| zMKhq8X9ZOfL58|;S`T7<-gfSu{5NyfSX=G!O@K6caIIW!RF1)Ud}IC>Ie;sLys&ry zM^Jqh=rxi{(w($sOL+hNF1=)#&hpD*#k0ue`r@xt?>Y3(hWvSZihxSt3+!!`BWzUD zctSlofN_l#@}L8raXgKpll%nT9v;RCXlqkTOAg>^z!mkETXUVRV#m40QuP~^KujMI zevwZLGNrdSY0ZXD?)!0S2P-Hd8x={Kpdb(Rrt0%7$iUwAokah}?I|iEL-q02dYUp{ zC4j3OkRy-Wb;ZAh#LDnE>&{L&0;`@m0X*W+U*}&=^A?;e<_)l1hn9pNZ;c+$W>4<>MCApXHh>q3 zi(|Z#D|YLnSXlH@_kk}Rya{~i1_C0XZ4FMZP+NRe-U9WA`pYF?LrW!Q_eplsm=`c4 z4{zK``p+}7hd@>^`{%GES{s}*bYkJL*ArPljz^6Z1U=1Efy3KKOld z-X1G_*{itRHhf%{tWkCp9`fz?MD7SXrJ4!`@E`hXHQ{WazIeb+CB+d>#$iS||4mC0 zBo>Es<3YdI4=}{<=DPF!w>uj_QSEx{)rB$#(e%LDi17+e_-Xz{>KUPz8;TXf+wR1=2RQf15fpd=qtS zmH^Vle~t(cfY+{3<@is4-dCYou>weRLHv#F1qoR`lxha=AhCk3Wno&>y9O~4l%HZv zN@`?gYOb>HjCHo|`=d-fA%u~;rD8fpT%+P{*u=Gi+$On>ar4Zc^;3-hi#oUps>hjB6>-8p!` zLPKYf!*ak$nLJ|ss3+4C&r@ePy{@uKi!k14q%D55{WzNOXe7@7%Jkl;TlSBICS|*C=3!)a++h9|8W!|#cq+Fvw2Epw zcH~`ayz5_@M`bll4Jr-9Qi^R%zC$`9P?YhPKyjDn%w=LQM!?79MZSgN#B>IVB5Hc% z=t`J$B9oaeA{IDXYrkM4xAnf2lZ)6dik4f+X|&r}RrjB1FK#(TFj_es4Zvqu?e%Y&1=0= z>A70kF=#BI>DCavB%ACCmyo{lPyzFWbb3~IR_|jKxx13n+2$pnt$L?k1DduXekabl z{B^}s)#i$chkH+bVCG#S&#(}U78n-;T!0z=Jq!T5JGxh*-UtP({y7N?XQK$gbZG}n z40cBg*Y&*)OU5&E?!VjU5+gbn$E}wYjy@R|@6wJL&vqQReG<*c2`wtzi3n^gqSfgr z^4mg}M3!ht3a*}J0_QJk5WYs#vU%1URWWh8U<~&C{_PX!Fm=)(Y{!gv0`^mFt{5cK z-5{%xCi&!HK-h2r#H8x)5-WY!%3PPyqr#!d+v^D!5BwR}&Qq>zhV8w=RK4B1_-s8& z$@?!1}oVF(EF3jmm81SeXjMi#(_sr`70FeiD78@x2lr`CsE0Nf#CKFDeqvGPr zoJ9B^Grj6|Ta=i{|d=dkxZ1?!8o;jh9l4UlgZ#DWh3&NbleT_cj=55PtjaH(_L& zw}{MTlME40eco)cdq`vWPsSBMHUT`cr6uQIXa}jHSYx-;bKdm=IPVCpDSudkqBwN(nUZ48g z=&lH(r0{ID2|k#8FO~Yf-<BACm*Wv%aT7aj$C+6 zsj32TwW~J*)h^b?Z*kQkd-QA(6*%^LOe@aNq=6n0at0X14bHx$U5R~3aDcc)?Sd@L zR{JMi9}D$x=l>c(QHXWyT>9jZT6z?|Po8_e^$uhU)h};?zc%JziN-qgB^qBitTwLc zuyln&$S@dP2E!%xG?4e*H9iMOHyn%D>MGRuvI>0$@C*s~PJs|5in;_9*6QYDxW!Tu zm@pFo41U>Yca)7Hle@tON>O6hxx*zxS(;bA8-9tPd}ytjg6ucKfMS}}f+ri$O>$If zr-eaM(V4I{TNp}T;QLU#xAL^30<(QrXxa8{ux&iepCcbk4e1LhYvSqeis#H{-xgdk*ckH99= z06`B}NVlaP);4^*No?&VNi;WYCN}rpzIpD(rbO7oKkB(6hU!>IN>NVqL-`ug(SfAA zCMA%texF{0qNShN5<#Cz5Ef{WEo}eoEXokC|9*}t`cG#e7zg_u4BD^sDx zyD_vIG6tG{%dSqqpxOsdQ`-JR#Y^UT{SlN}02u-U*@I=Xql(3v8H|V-|GaquILWf6 zDo`$HaXsOC0A=v{FZ=NP)SDJT@yOk?xJ57VUzeAH^`9Mqhs3Hgc#xpf2($-8Z z_PTZ&3te*G_ph(5Y?J}vyJ0bg_+xn+=Q1UmD4DW<;~I!9yO;12xmIkgkc9SvOCZpg z0^g-Vpi~~ESf<^uTaAT5Q$?l9dUD;3RD4vHdh?wSs0N&drJa*y9^1Z(royB)z*?I$ zsCg&{^f+4JxW4S2DUVBX-Mo2LJgts3S^Y2>D*9lw%>+LvxKtv-Z{A|Qh%;j-g(_&%vL7+PAe)QMS0%9Kq@}dWF_#d!tX+3NuT#$9O zppI2o#|IhV6}WI^E@0f^4Yi;+sPnnDdCV&@t{mtc86Cq{|B11>#ao1i40v)Js1oQ@ zlji%|@{Z8M00X2t(Q{BArsiewwchtaOog+5-)(_qbM=FMZyAdmk_sGifYhOlkBxky zL<{Vn3~|u}y@w=FD%AQvhLGL=MFDX{h+a~AQreIMNNuRz5FeVCb)2&Nhnw22Q>gBY zpp@q_UJs?jRkgc8(Y}{Kg6onVIvqSKN9~^7y_X7!9Tg0jiwQCZhV0|BTc~`g0v7_+ zyhODQrg?c}VC?k*Qa^0*DW-dTP-V`={89yLO{ z^SJF7w-!wuz_Ds))n`ZV&4bOTqU$ZA;nFT%?T6vS^%-+Zjq?0DsBg@}!Yk+a=C|{* z8o^{?dCd5;j_o`vkIjR*=(S0yz_1E&KBTCl*y5F4yGP-05I%dWFyFr0R!MJOMSyd@{8%VZO~^j%4MewnAVh0#FCo)Q>x>wj!++G;vI^pc@j zbqL&|VpV`0L^abzsj{{u%;}|kYRO`yB#dQqb>6TIh^r%gHI6fnc2uV;Kac!o)+lb8 zD%xVM|0^dmHi3Mn&YT(@frxycGoFt;{@_aNYb?2pK5EXKmVNB$g%?WntMd&cT_gw} zr`kV|PrT#l#Y~&L|GM-=me^TrSEAh4ZxM&u0=0roD7BSI)z7T(e{WkYSkY zO7B0ffnkpO4||jPd`+#fzvZX7gh(e8dar5Ah6M-5%>BlntC0eJ^`?uz*;6?~mQ4_uvt& z5~GFie>$7nG}I|2Ki97Nt_R%?COApw&=}=~sjeO`no&hnz~=13+o|Uhm|z~uH5eK$ zl6;L#)Rf&O^wP$=PWAJ$&-k_L5RISAsP^6dmJuETABlKl*GvD>PXCmMCxx2f#sNnN zv)pv@sNv@=!+KGQ7T3-JFQ~S=NmpV`#V(^;faukIo$#!ByZxa$Q>|iIH?oh{olQ)hcOGl*Mjo|>JIMJ!{|~<3@)*w z8Lf18a6|2I_VHG7d8zuP&`W(DMO$bwORj#UkfhwwKQI`Id;eaNJEv)M|JFA# z!|#{rB{Ls{^R$-M)n;*0qOUc-1AVGr4NI6Pj~kR=$^x5d^zLqdW>!Mc=bToC{tJB!|^hCyw5n#5xSlfvydvs)8=A1rX9OmFQOkHqG= z^Yl-d!I-R-rFR1u*70COHrl`|IO1T0!8XAg5^9(rD` zfr0pw-zMmGEIF;OEn{013`Jv+x?)0w)r?00SQe(l=5^@IzehZELQK;fCr z*ztmZgK@@}`ANC~r}QX~_&(`IiHnzy^lE!BPxs3_Fo=rJ;ci~!8quOLL*SS$N49*f z{bG>-YVqMe#Z(Oy@SvBdbC%<@ONqwU!?-`tM{6nBvwd(@A^Ky5@p6kz7Lk!TetVRo zw;Mtb_e+`Kc5TtXi56ebaxL&vn1T5f+`Wnw_GAn4epTj7+a_-3&Yo)}M?3t7cA~Cs zCLqhaMp_t&k^)6c!5p5JD~k=4>QIocdRmc<3!5ycqZ7ra!*&0RuAx4+FjDp!HNJg2 zart-)F+zX)DbBQHP5e$6qgHC>uNKVYiE_WqHFormxW59}?JkU#RyP?q1LHfn@zK#x z;nE=?G5dbDZ}gHh#&HH|9ms(<%p$sYi;&W?h)0;KZfQ1~@USTMFw#mK6_3EVnU|wM zrZ_td)8lrTopm4V{;_yRj>v+^cDaR1v>$d&jfTNw@oB2FOhHJqgm z29G;Nf&p&e|3zBzq(GQ5Tq8-u4fLqqp$LUHHz2NtL|%}6O0&jd2w+J?u>6gaVLCIn zVRe?^$!8$9!AI}shF!!npTvn6J_Iqm^b?`Ma?4xabAGLTJQg$Y`O8GSIjSvWa5{UXSdEIh0Y#@N51nLUJ+eok+X-QjX^U0 zoy{Z`(_QH!qjJvEdu~f-QgJ<^b*taA{@4&0MpB+PX}AVO|G1=q8(k^ozH~~2Ti`hD zz!7ke@Qk;?%=JQlj}I<*>F4h54w&(xRc3vJ$Lx*zJrhO8N_gbcqWo0YXP(>}-mv8F z2&^&pRryxsswzcJbZ)q6T~O?uA=!4?b!}K$pFWeXK*DpflHf=36Ml>y_JQ;FoG;vc z_mloM>ZjV%&HgDHxce&KNSXEUv?(t-?d@XCr>zoam*KU-@bX&zlNz<}*z8miyptks?&mx&h<%VPa@qKS(Z7Z9 zxy8SB4h96-K3@xyc{2WNFfGUyua?10>L@Z|hG)E3`Ai%3C2IzHL8acoKPzJ;zqKQ} zNc5f1#7ut;lhP9#N`AYiz51Yg*j=$9H#tNZ>x6xSYFKURs*MGHt)Z8GwaZHdN^pWN zV%+~Y?l5r$J}6&BHr2;{Y1ZF!!+H|0`QEHH_|~ncn*H-U!W-)S6IGsU+VXM{Gyiz+G7>;%B^RPxGi7h>PfM{tSaDdI`<&n_wk7>v|y}+_FZ<-trRSBGWB37<*O9RJY zk}Ud;i9I94tlMRH13H~Be6`OxHJU?YLjGDR4|?S@PVt1>w2EtNP;$Nz0rQ={Z#t;9 zvqhfp8mj_6UBC@B>zBD06Qm8c*E=_T-P-w5K1MD0Wfq|z#U8=c-c6fo_v-u+?IHa5 zW^;tWbjOG2!d0hK2xYO)-Qej8P*LtGc%~(2T%^S@I9{n&KqAj*!Kn$rz&x{tA z{)}V7EpU+y8klgi-b21_shD|EWx>|^&0jvui_b8Nh>;85f?8G_l{QoAwEW{ z9J4}(7UPj$o;={t4HoW6;t@@r>q$rwZHWov%Uj9+tVq!tREn3InECM0TS2NbOO&Fq z>CiCPqjoiw+}H0;@Sa}#-BNjzGKnzx(N)Fbc>AS6l=O7>25R@n>8nZJ!FY$9;h=Gk zIw5l6&=E-!M45PW|LkhbjXJk7i_v}w*=vYVjOIWiOMn%DT~%Y>3Y95NEE_7xWv)F3 zmu~Cy!_*oL`?+#N^|5ZQlhX-?TSa2$zspEw@oS}|Uf5_WRPWVI^o!tNZvP}{42rzT z{2L~ofjV7Ys_#5=C+t7_4mNATtpKLi_JgNiv*pGK0A)@Tmb8mQqC89ie zC!KP;=74ZxQx-{TPf!KS{;h*a;vS<XYLXmPa(R@}j*ObYhRWxQQ!g@`?=XJ7^Ga@X5?FO0(F|1gVbF^G_ z41p!74;3!g>_7Sjj)n7I)>f>;8)&%nRdVGSr$UbSM9MIMfg4wfvt^X{gQ22*y+jd1 z1)s%254fN4S=}RyhHh}7&n3s;(8tGfqMUk9puM>nZ#~U+E-V^;CxPsjxK*v6{w_|Y zyH(4I5RESPwCu3!WV34@HPc+X_Ky7Hy$2-&%~F24&Eb`JYQwzDd@D!pLgieB9vD+e z4q5hL>$na&?KKPzQRPSBSCfdf>VEUy;@R*#}!0-Qz#hH|6%-dxUhY~azPFf zTkFjGT}(NCtD=zAN}~Zz{VIxbVJPZ#P{N=imPY+vPweZ~Ro8Ok7yeGP+cn8zZoc|Ss6;f3vieNYAXCO|D*ZI^wcxh5R&J)bX07jS z<*+hc{sQUnGV8dO<@~I<+g5KoW_<#yp818Lf_tZnexc_pP3tvZYEPh^;Z#tF6_4cb z)mm?26YA?MNq*f%jo4A^{mOCylYt7mCG8kz;W8|LCG#LdTGg2{zPbEh3YicfM_{|f zDj(Qe$las(tAfRv;J0wAUbiwN@Q@8r<4_Kji{E#&W`Fb(l*$8*^EWm9GG241Y#(m% z7PPZ2+Gg1HV#&LB{ZkDb7+UN6A9da|)v{!4~ zcXl4@W@c^n?`FG;KNM{7f!?;RWyQ_*Pzt&&McZ&|LsMfvKL6SDFRVq>nz@@q%~XE# z>&ecQA|9Hk4iBCTkW@D-<=7?F!XKUYv68ey#1X@K$`_R$5xLBy^6-DZ=X#NEm65PQ z_w~p*6KM_am3P{|jFfk|+d9Ndh#E7WUrc;Ii!07Z;jq?ZFW?(_Q=2L}z{HAFC9W|# zP$ut`@@BVN*1Z@yZPGU1fsqa$Ha_hQlhiy>7e{m6$X{7pv4yb;Pxw zzrLK2blcRVNMnG5zcM__cQx`_vt;$e{h6*R;m7t7PJoW3B=alc1Lq2ghrdv0$pdBK z4L?E4tht!z@VT~gfJDstvRNfvuTewVV!ynxT^F8ImfO8`2OhnNCmbz5Hl19qO{5tn zTitZC03H9bdFjkm>IZX}kK->z5GO@Bj5RXmRzE+|P@OtbVq^vR6=_{g*L#=Q^0nZ+ zS8{|6DrC}-N79J-h^iDZ=`4n5fjSJb2uh0m*J9rKP|`{cV7lxa?L}#SX88P*@MO2t z(&Qn90{yiKj~jKNC)*r?Yt2K=O8d@3Vo`4dhvLq!Q0fg?0i^BwXgU!kY&$(Y3a%5Pg@f?Q3vVOF*F)OnM>{PF$# zj(7d4efs>&&K+_a?$Gsu@=m$|(NsZIW^d?A`ueaxol|9y*iFLJZHFNTm#Ip5%^|fq z|E9A6J(W|KYVJDb^Y9wudW|miA;%qQNdxt#zdrxDRhu2&(nR14u&NtMo0mof!SRhL znTftEqWKyxA8OO-eCGII{s*V-7F# z7&A6L*gAogpLys>P(SUo5U`FrL0>vBBAl$KFgH0`HTS{OhZWuwOE}kIp%EDsBwm& zvpaZhnmi@xGR|&iTx5nnH81C6FX0{ugYlWN6kixTvLr+T_KQnuj_OP$qeZ$AWN0k-b?X6+i^9eXR!JW&36vps#(0k z!SI|(G&1pnd@^;Zkm;8#RqCvF_`0gphvpk>`*SlbLGZ#)fp5#BBM7I;`|td!N%!Ea z3=h3|%VcfNUjw(CR(7m!71N&JbRKbDRwKHU7$4Zu*Ka(O?VbXaJV}P7W`|uJQqm&H zzMWTFI}_C(IFmkr>8>d1R(o31&eQgWKknn^I!@#Lgd=R#9|O46 zy3clAvZ(H^{+0iA#m@$=xn`f1GjFL)eA5W3&Z*^7Gub&2o8FSn(KBkjEG<5P#g?O% zR#`J4A z$bLaqU&$1;iEuDMtlIDV)T++5fgmOdm^cum^MZYM-CKSRRO3c-ahPSFVBv-any+aN zuKn|xe`;umIKojkG?S^cZd{c+b;pV(wj|NjTkY>egL}I@jqe3IyfdZcin^-cHz2^oGje#$KO`xs52@Z3>_ zP|*p~zNd)VvgPPsU+F~`Ewuy!v+l=kPIbKE@NN(&PI>NidtHc8wX4o(c)FNqzX{Lc z8*%4&Tbg4#xADhOB`wOm*4m{jNWpz{t?V~$2V*5s*g0Gy1uVZ&&75#8F+Z~-$yoCn zJ|cnCQJghb|0rp9H3deP=QFO&=#}+-buIN7hs&tp`*D$siK$YtUaOH2+j{uIHCit6 zwFXpxU|UXUMv6n{0;b!%=4Fd_W7=D3YhLlTxa>~GJ*}&qYds0cLrz^meO9Au0$X>$ z1es;e&%0j;mz)pw{+c9yIE%o+aj>`Q#i{Cy>#7xgIpOq4Ieo~vN_I|oQ$`fYrMb5I ziSiI~hnT{avv2@+}RbowT3m&vM+CMV6$ysw`_rRSAj8_0I(*;BRpOMyvvl;|hp zOszT&;3Js%%$9*hGwy;texjRUI+X5PS-J?Q18zQFG+Vpxf4e#}wIUv}7)NSQ1y>s< zZY=g5^8O7*V`Hz&m>4CBAXLf%y3Zh|RsaeGG~}fpGi3Y3eUDZ|+a6xNWZx|Lc1oO0 z@IhDD)1-Z=@8H)DZo8F-T~3_EJYbnu_^=xxy1UZ3NZQ#%JM_qCOWxM59;66$Ny=s{ zKVN;kH&XJdnV7{z1MMF z|GG`UuE%q|bc*(El6+tGLPmHLpZ(*n*p?3gSsx`+%jp|<61-L1DlIh}tv1U$>RF(B z#7)2zb?x7&E9zHo@S^WTGCeph|62AMv-zoN`|B62-hExVIVEquVS6W~!sV5kJ0j&p zpY1(tQD?XO%vK%w5DjPn_QB-Hk;;1BRO0>?yVC#xB{cv5-++NsZ_~kAx1&bu}o5veY(sHCl-8Qwz5vG4_|&oe=&RJ z*08pB_AjMZEvu9aH@wcUC~-o+X}ZeWx@i8UYP=dt=bhA~ub~{pDW-`mR>9bOb=C;* z< zc96uNg!0w5LlSTd;~WD8Wohm2yNbaPq_(d$-5nGSD4l*^A3l?w64Fgj)_=crH2=VT z>7LVQey?#`5*ZVQO z@@J7#q0cFQ}2Oo|L-OW)upM zn8{x4ka!P8uMF6O>f`+Uce8D12@`^xlI#wCRmsUwo@wetw%%)@09i>1-HwD}9q0=& z*$)y(Il%{(aYOWyDKgQHY`N;RTrK2z{ZFRMexOG`8ARCLPkMi%DAHYN82ob7Awzv* Ky)qr-gZ~RClB literal 0 HcmV?d00001 diff --git a/devices/surface-hub/images/sh-55-front.png b/devices/surface-hub/images/sh-55-front.png new file mode 100644 index 0000000000000000000000000000000000000000..e1268ee32808c4cb8588d54ebe699f67c7848077 GIT binary patch literal 16796 zcmd_RXH-*N)GivNH$jjtO+iXRu>gW}EEEALA)!YR1u-C1Iv7x-D2g;eK|w$ukkC6A z6wn|=5Kux9Fw%SPcLjal?>+aPUw52;Cu2A;JA2PH*IaWwYnEq6UNySR%EZqEfk0UG zbT61fAcv3;2$eYl9k{Y_MOy{@q4G4ntPLq_KQ;-z(A?58)Pg{YVwrcY(Sq-ccXcg2 zA&|o#DF3Kh+}_=QK(tQjUC=W3wVQp#+$oOG8W&X+(@g%te(2e!6QML$CWY)fLnjgpN~)`2>|VgV?4fBEMYno!-sg1|qFiCDwP~=67G% z77Tg^VKW^I=Biz1XZAztJ^Q|>7p?x*1=FL|XoKjB=DRNW0r#B7%dRMqn!{JT(U1>{7i)rH668Ltk zKf1vsXFW%6#b%^#&E*js(s^QtQYxp^+R}uh+y1w#=#mkx$HTjZ~^yaJ_3UK5gdYQCqh@ zMlS8xs4TcAeWXH}D_YCdW^KB}=@+j19s2jMf*UD(YH<2@gNvwhmp^y$s6x4+zk0*H zBBt`619UDCY@+W!er5E(iF?*R<^Qm}r^(NsDG?KD~WE~s&eU8G)9;|=-TD_MV?cmhQ{js})t5qv*h1Y*6 zZys0Nxpm30wJ%sZvP)m4Kgwg~@s4(RIIC^h|In~a_3NSaWezxLCl z7ePW^HU2Si=wVGfMCE~}09H^v93mKsqVi%IS45rK~~P z8s^t#=PC&OBRUM7R1DmjITWDy5W)VMnjIEuL>Z_>xUnRG2dciYy?9$&w?ujTrKh?F zftF{-!d5_(lPHmZD}S0vOd1^F$=6Ro1HmD_7Mg7UESm}`JGKQcJ!j}XZ+J@DT==&(bTP-}~ z5IT)HPTM*$3dem0U?INoT~t2YCM0~+xVe>w~;yCy!R={mXS zR;Nz$aim6m?Om56uS39sP|@UDvSWqL&=LIKjoOPD-OTQb&*cvJT<$|yjaxg`(3ZB{W+?F5lGo-I;C?2t7xCOsJW4D z;R;WiWePoc?(Wa`oNPj>8y|`ozPW{BMKs`mj&k72M~k!Addow!h5x71=3cq8_0_ z<%uBAkL}0r3zMU+P8|l86hTJ2zgc1=dlPqUsqifHhmW1pSv)EV(V-#qzsQja!ELmQ z+G0?vyfiM#vT#-UBncH-B=3II!c;yk_#*5O3oDJwE!Dkgw*x&@U+@Es3o#6@egvVcVc0+S)~H_ai&zpR2O{2| zRR%_XK+h(0XX_G~;zfVODQ)c83ST`eeXHtFHf_W4@caKhTw#L^G~M(AT5ujBVE(<{ z>+f6dk?&zCNtn>Wqkf7Ym$mS(X)tB#JI{9!&~(%KK`wbab{OwDhTcGRUSX<3482=^ z?>saYla{|0hA#d!gQr6v4TA`BcO;c-zrVBCaT0Un?=NGK*;GvI*u9a~2laO*S|h&f zsB!!i#}1Rck6Ptn3tiXrWqT9>R5~!}@{0`yfB;*Mb37`w-D4ATd_(VJPzAAVZEed> z1kbN6A;Sm3e8=ww+CJ&hw=_*Pvstr#EWGriweH^XtonB$4$=4VNS|8*&rV$*dlhMTbod>v92NC0_ zSBz?_4(G{|e%#lu_&dL=J?p(f7>ZSxEj;A$XgY)aFQy4$28)Js9=|?)5Jy%FdiU8H zN5k=F!1xv%Fve$cV}6jWfqnS^!KTv*_QzFCX9*tH&tR!&TvS!BR9#v;7kats&=xhO zM?(zBX6kA_L6ydaQAoFCw2;+F%tWg36bRFO4A}Pl+*xPQB>n;Wq+>lr6W`oYAt`J! zRQPg|38}$gp`i?xf{z2MlbV`}dj$9V@%?+{Fj%B?!DuroFpokSD6!`m(k9sk4>K{z zo}!7C;_IcsDA=WC1zIgehTUIqp(9Kw#bNvOQg+hg9&}ds-A+X`j~>;;|1K#-Sq8(j zO8g69c6#-tL)XMtE;)t`L>q+5TKB?iWCPCkoI33CSOhsXevybKX1$?tp(0Fa#AOSc z4avDLRW?`Madq9p^aizD_}#00ATP`AT}t>Qmj|KC!CBih>+Gk&xNPsGNZshoGL)JK zvirS6OrLc6)wEHj32qt}Ufq;>gSgdPxu8jdw1IoFmt%#3o{3HCNEp5J)x`2cDVFB{ zb$E=LkivZn+9y44*6vN~MU7E7CWbUNRSb-Ng)BQ^HGf{rvLcWSwO?d2Y^Gq;0nT*) za*v{KY%shg5(uJ~52J-ObN=CPKX;!~Rj`=-^y=QwCXK-l!FvOX6G#O`cI>7I^6DW% zisGJl{5)h{VB|D={Y7@{i2LZrNP2@5bvA3BFtpD_gPhs1 z&dVHR3$ouEn#aI-IE_DxIB&uAx{aIj1gpl=0@}ZA37_|0nfM-Tj`<5q++u;$14@#@ zh_o3dr^7TZ-*xf9CNBc0?Z&FgO6LN^tmgQHn8DN!5J8KJEqt9-8)qgo!h{s0aoNyK zkxe>lJ8xG&nfgAf)$rJ{76`?ym=kkQ3#ClX?b61$t1mp>BtJ4Id!@eo=5z5*O62;y z_pP>yp0ob49Y5e-zAC`kVaZKn39-@*Z&g2W;R66B;j5}PeIq-f9o(f#2R##v{R1tq z{m(Kl$JSrySkFTqI}KFw5l1EpeSRcC!@BgGSY<8_Llw!aWLp)Q51G8|Qe5tJiJMWD zP>WW@&@THv8RZ*MqjO~9lrBGn>5&^K@!Hu~>}we{bs{mB&EA@?9D8!PIZrAS)piSk z5ocU9Ok3vrF}TfnlD~i>AVVLW=V_dTQ~5Tk=$7eq64{J{TW)b{Isml3h)33$FUBkk zk1-*^@fQM|uwFZ31zPhWa?r!^bMc*~ydnVfKq?n)?!@F*kFPrLi|9mL7t5S<5{-;R zjqtTf#5Gx@v~_iDLuU=S&&1QYxN_&+lIe8LxR09!Hsu%tH!KV|j~+PK-MndGbeJAv zF-r|ez3Ro~^!**Bro0D>j@sye=Su@fg`2>6U^2)>(|+exUD)>0>x)h6M_9Ttkarr@ z7;JIzzgivpTCOwpY+vd^WbgJe^y>9Bt#!6$t%iv?{}}a=#=@>|H%<#AC49C!c>#}7 znlT$Hs73fyLQ%KCsvOs-$2&@cqRxlg&+qy>4h=(bepuCZi8^~Bl3)S0;s^G4$sc!xrvKnf~B_6UE1 zfdjrvg}5iFa1r;+UD*`lA ztJ45TcHbb&j&fk?u zw2b`aX}Se1l+~ky?0)+#n-qrDaKzw2z4@p?M145JAp-y5J@}gollGFh7`VZRzy%i) zDd+iMElg}joR|2k;BS9Ql_Pxc6D`I}z#!`&2 zYHg&#kQoQz?XPUX3t=I5zh2}SG)GTsc_=S7*bXHQ4~++k_sp+-w{8Q=H03$7LY?xJ z!2*7zIdqS^)lTnI^-lq!bvbu{*4ERmFk1AYSW~ykPR6LS&`Cx$n2|_O9~u{(*s&5d8=vvlcsl{B7MjHSXs~1t&2?J=XHP5+Zdcca-oxNHj?I z2+T=f9pal|YK&B=y1&5Cd$&kLFWxorhT2&RnV6<4r265CFOhJatOH;!SR5xNRUBw? z9N9_B4ITDqsTf+6@jVI7jyrSJ(}ixf7vsb%5qjlzJkdID|2%}Jq(RefzOi*h93^06 z7uzy}atD;2uNh`t29apJLhO=f(Ydn+tKG?zw!6hlBwU@MpVWy$5mXj%*g~_w%&rpK zQx=qf&QLG_sLa}7e%_^g+54&bTSJCK#K(hhGLU=2`EV!ATqW zsuu$S@6|`vSwCK-b@}>*0&~7;qmlX%>LR`Z4BRX)!7em>#XPm(ashwx3p;H-BdB;C z1!see>R#C_7?!TE>UT=cF;(BY#T7B3go8-e3dAb6!KpiPg^Z4pkecnjM~8|!2x@y- zFlGD-EfH2^KAYvT>MF098Y!|9}#-AgJBwxQ!@*aQWIO=J- zs!HCu7I@YU=faLv=)Of*qF?qhOxbAB!M|ozW#5}6MkKUUX5d7S@^@2?V&RL*xpOvT z5hUl$JPdi?@+?Soy;b$Aw5l%oB}2DBCQW^d0sQdk1i0f7rsty`6JS5Ss8)tM9b z5l^R<&Mx|=ZkX~l2!&n*IZHa+)g*0>3G!V5I78|=o{g9B>6xa1!58r-ucXsLWh#Jv z)1#uq^YLs_<2Ba>YnNZm2R0JI=N_mo8OCSi#UT}?+IYT_+2+xi%~e_kiwB#+0p(>0!;*hOXSi6wr(U`T<% zf(|S>y8co!cL%~1F3X&iNJ(*k`^{?OcP8vP@3oC=d>3c1xHL@DTG6tYi4#;>rOl%z zVAMS{$UVfIc(;2Otq*LivgRX-yeT*y72DJztA#&3L9lx49q5eOQ8ib79eCBR6q-T@ zlB(`+Mfbj7%AVMrp@CBWy+s9C2(wI-F+e!{m2@20hCw-sAoGi!$gy5wvzJ|Q)Uj7z zar~I@S3AKH)F7{L4b8y}9R%(9lVyb<^Y<5o*c&+h?h6NQ*n03iR!qWuR6(;!{aJam zYC>3!*TT2MX`|N=e+L3)NOtmS`#VzT;;*-9Z@)cH@bBu%()?qGi})1Ue@6*DHtgEM z$+SgDWID9}cgkuC*55C66Pp##-)`us`fG}V(hVQj^;gIS)MGy_i8%=f8}A-?2YCEFSnL0pBjs@(x$2)7=K6)= zq`DckA{O~S;P!VxC(C)6w!IEd zt4ob>JkyvPRj%~xSQZ)=h5o?DkOGr4p9Wj*$4a`Hfoe~v5OBYWJ`DUK#^DW9TxN@i zO)D{>Z{0_qy-dj0iF^Ns_x@`~in%gA;g$mk_rS z?ru6~=waC^0UuAxey-1JM)qzbp3zk^A(D&oCK#6;vT93f8UG^%CW8EZpC}L?3pMtk z)ikEaVIagU9E-Yc9@Eg}!JePTOP)6Ws-o3(y-3r0C?u{_zR;j`1y#WCXLE=4BCp~( zgcw3}tBm}@p^)Ay2aA;$@G@?}sp@R6{-GNLX}zm9_ioB1lFA-8w4N`X@K+E)Qe38V zlb_1UL64xn0ogYp%MinCsPHENfUH^JGvs^h@=9!EP9V9@7KHc@X|9&0oi35M^I!89 z84&bUFM~i&BUheXs8TH!hGIT)pjkN9Y7)<={dSZ^(yE@fmht1-* z&UJ$}LTCSDeWVFKrfDh*|x& zqgpD$q1#mx52C*wr)7mhrI)BN2>^WU&A|boR|uI11?OfR7Z%h^99InST@mbrLr%}= zXrV>Meici0oGxyFUBlHF`@w#>LXWQ7OkD0PAKbBFnCZ4s}YC(yk z@PL#PE_{Sy1ZDD+L#C7eFWl5|!y+HMHQMMtO=Rnc6O4wJ$>^I`=Dbd-Gjd|LDi58N zG;$AEe)rT7i1dpRGzMhk<=Xav?-vJpEu+_$Z+~>DwiN2{*4Hs@TuEjqg@n zhE5Yw{B&;NaBI)~UqY|*t^5yku+lKofsm2nU*fvg%?4inxc;j+JcswP|Gl- zsU?p_kacA|$mdPZ+URna<;8B;of|;o^TTF7iSzP}xoP~rjCQc`q#>Tf6-V3n78R4UBu?kxdDD^jntnsItwFuB?4q3G?}|5K-h1;*PW~eef$7J4_zsDx~1dD-n6_6D|VSKxO% ztT#IJ@5s@;7r>3LI#_>KjI`RB6GgIiBM8-c&Qr|h^q^fNGU=fMbJal$s6T2M?J}o@ z3a+dscU%d2kbVNnvv0jV?O9dW=4;)P!}(m;V3`$eY()IR$X{l+$bW49yy9li!bYO} z_wVSTd86&Ma_RAgoxEAvmm*-wByKED`c?}$Yw^~H{kh;6co6-+A(K3>7l*Ecsy2*e zGNh&1)Wq3dzq~85xpBnfXzX>3;25%qk^AlxwpYt&pwQ94V8W!^!GHFR8Zm>^ot1>I zUpo@~7(RH9tE?(Qbk|G0R(AeGx#hr)&6}X1`m$sGYqc-MEPg0nLSraaDMRt?Z$q>8 z*;jaJpqV&Klel&$_dnHZn~4j8#xrm3wb1*k&BY$S${(6~*V+cRR*W&`b+>1>pEKx4 zDqqYb=4fXwd~TW5UsQ7bar%tQKoUvY_?eK*sU89$`0>c<^rA_6KCfocuiVr}Dg|WA>;dm*#q?UPxuh@@%AC1xry(H5u zMqlmK`Wxpwx24a}&Y(2ORyfHF*VgC|8F$BtG{}@lYD~`mUSkmx5VbA+ zR=0IB33+WlQ6Q;%>-mXKHFy~=gMQ(we8Lz|)$uknVZhdX=U(Kq$o^sS)eJ!)KsBj}TlxR>O+;So@o6+*f zKSR^$b%za5sod1Zcz5kHKH5LR&>bVD2e5#NdzsL*_MlHm7HVh<%2br|7KD^fDJXdI z1Tro&L#YSzYv>&k=5N0{u~a;rT4`vO^x?=sbVkvOa$ra?T8L^SN@Ve#QP9D2+YO5# zXF~eB2N~E4xM5o+~(9vl;D?Pw4^@hZylO|(71>S zWz_0yKJ}=FzE%=JLXTICS}1c;gBCXUO{(2Y{q-^Pb`M&tAWeSy|2%~Fw{tWNny3;V zxL|C$%aAe<1a~)noGujj5vdv4}(PwmSVf;!;S?!U1 zp@zg#LEx}d488h0uRT&5H8)m4^XIu1vqdHDs?A{~F*uX56%EcUx5%lz=9521w^SR^ng&!}ZZs)C=Z#Q+Qat7PE@kHORbe%O;@3DB4k|?+CuZM4B z0%@L%M~B+_OFo`!qaw)1i&x2^OL7U9YYwS^27tua5m;+vmiX#P@%xcoze18n;|5_F zzrMV5x`M6`ub4gkCcTx^bX}x3!Bx!J9I;~8lxIm12+F_tib_f$(%jb?fzahPeSQYF zNsJHJW|6ehAV#4+`T0s5cS6wTPBQa#(r5hWvC^~_ZS?e;(|Yys=sIhYsR8c2#j)yZ zGZskE58H@cn;)DE7Olt5`^*>;tsRb>WWx0D8=JXWsG4K$FU+1&CJ;NS7Ej3p_!^yC z-#X=;_?^{U_Hjk~dDB{~r>FWum6^T{PK2Hy>cq0ji%E+rN;-Otcidm0yO%Y?j< z@#V{_ts%Eyn}#(*vmkawwf0(?7rl$iO_%o_;{EX%zA`FY8kim`4s4QipWB@~19BEJ zUnaYAIx4s4YQ|SDXm@Dgt;RQr1w_X;G=^s^2}^$G%OALR=<{~WsHAtm4JwjO>xtVow%NJ)jBJVmJ?Hh)EON(ddx=N>(%RXf*^Ce+4htYQC6G{>C>t?p~KvXLqM? zF#Dl|bVF^~Ir*KN(q~vrLjvW$ZJfNrDL>|4)-m(KG&P`w$;Fn=4Ke6uJ9t?r${$HR=IZoM@>FIS2^}95qo~VcKI_%BaPD4gY41k&^RpO zqckswuB}iafu17B#&O#$3w-UXB-^AiGKL(~Hbr3S$bxxu8L%uP!YA8u^>{0@FR$xA zP&!?&T>r5GjjEbjqVn)Ne9LXB{9}0>DogQlhpo-D;jjJI%%C}YUoLntn(Y~EFmPq! z>--ZqbLOlaj%7JzJ6sFj3z|~H8DMv=|1<7&>r=mpt&@Q-*T~+c%4IpbHErIT%QB(# zRSkYFN473;U{jCM#Vco3 zv;px%nywo!LCZ$B z-L%jICNezEXCnlACwfG^%2nLWxb-Lb$noit&ldB)`3w z7iu=F7*tuzg>fz7Lcy>)usedh9zjJ7E_ha6JN>El!%SOAA+8p(rK;QSMs_mlV2ZWT_w4m!j&8$_P z7RqF{YSiCTWFlZErzqi0Y%%1DyYV8gwC$K#R=MLX&p{amiwIpGI|-Bi9<*!eAam*N z<-kdK3z_h8W&5gEtq;I)%+IBfF_3*_^7k|)%aK8<_gS>pHThYQ<=qlSi@t5n%r>ns zZ&vk_exvmTJ_OT2kN5}SfYj~D zBHC5VU_NOD7G!)Dy?q6}&BulTfXdE}{W>x~-vLcGm-T7-^e3b3s`Alcbja$iQc?~D zl}?FSI@y+@Z%uwSt=E#D#?1)^N|t4L*F9-vJ#9odJt_RY)qlmYu4@B}L9bXZm*rOvvP81^hq9XV-AEV#+RwS;j7GNPg}zyWZ32RI@OBfw4cn`92G9lhdj? zo25%7#N=i*MW9Ln3f|G0OK*_N1xpyzJ3W2b&6#xlrO$v6L4SfZ*QopH4T-F8Tu5}s z@Rfa?8|XA@s9QdhMZK%Qz9e8JwS6QF42YR*4T0_xXypBxL6puG2ESqe>>0x+Jkk}= zkzcBZDAg59e3#!jFIOj!4zzJ#O(pb=ZkuVhJgP`7n~MTlE$%_KQeZfU2j5pzJ(H|6 z&R7`(ZA>wznmzC16l#JV*qjPPL*m6k-oLrFdWS)%>M;p#*BMDU`e_M=M(p>3k$yExC!45y6`Ns{%zV_=G9v+EzFktZ0qzlgAgug5F|0g4x> z#xN7|PXAt}!@yhW3+yFJPx(!#PO0BvurOZqmDcNO6SC*Z=RUcove*}|`1@*@I38si zwAynehpJ>@7B`f&ld`0XSc&;(-rgICNDge*g=|5S^=mqK{}{39y|}mQ+ew&%*0bl> zaV%r&93`u}2|M&xRqGl{7HH_2~Qi)W)j5 z3qP5!A3^Z}Pb?!!#OG9BX9W_$DSA&#Ju7!sMtAOUR1>Jteo~=pWV?u0%{h_85TSV) z(-UD34g^GtAUh9r02*ZQCFcMURSFNsg)fmS+p*6$Y+#qyVnRsv$RV%yHN(4eB}1F- z_o~OKUONYy7dZumNS1xLN&}r0CQO}2GlNcfvr_>T4KoC_p{lufR2EdT-$3~fx|2OT zVwP!6rD8W+0Mi)4%T}-IQ?R5?wn3Z)dqtQgUrx8M*E|2^F-n3sv|4!Y)xDqZ@6SKF z7+Ssf%J>TBSK;1{zAHmT_N@~yU<_8A&kOsMzvv8{?{w7=|Q(< zn#;JgWJc4M#zmchJDx&>h7d49Kt@FTbo}MY>r@9!qE?O^i-pjYyCuJqz1fW1m=5w) z*o0^-;xM$nj#Nu&Uw7dl5-2Vh2rdNTlg-GDJ`0uY5_ zM=^xN>(4MR1`%%f8gp{m;Bs$*Vp;0_a^zG z+&lv2nzd?}HCuYiKi2Tt5N!Qz)%q87k;E*q)YT^Bhn~TaKhqUaz3LaXLk4ZdD1UnJc4jTnT@YC}Yh1#!N4-wyXUH`471NUauavrqIO!F`QS@S)_LC{z9yI-hh1-+QnU#B4nN84d{Tx z)VfAZKVR551)|(Exkav|-BKHdMAA~wjYazNj21{EU;DgPITMwOY<-77;RF!X3GX*) z$v$Mc_|$}LsmMO*Bv+YsTEgwbYfOo9WqKAyQsTLv-BV2m@XAcxg*2_(9sy482(v~o z?v8}Dq%;uK9`LcLTUv&ABtvp{G{`Q*4_x;8JK@EWKrI$C{FOLf#}AEUm360F^();d zQBVgNoO8qpx3)4_@Mb1djK3?8M$Xl#B&-ROfZc^CO+&qwA$lpC+1{1SVWOMVCThbE zaAZ&0fSMEc=PQ#Os5p@dsX4Mo(8TOgF)5J?HdbDlzG5R$7Q}vDCJ89nv$Z*`4KxG9 zZ0el3@7u>6f5VgbC^GI4_?7=Sl>FVPCw0PRYiJo+fC8Wx2ZHbe&%JM^w&s7jYw+cF z(7OO<3Z;rh@voOV-vb_wI`av!>$l$jLzxCFb;`E*`K!e)t^TD z2J0mAKbi*4sM&97O3tPgG4=Wpho$Isa?k%yc?;-vOgKQ}t*UgqPY05=b*FAg$2$7e zpIRp9Du__J#v9+aWvrv2r*0CqT(Tn9o%qgPWdEUhcjKLikpN&j0YJIG5Yz3zV$1)QrteQnT+(4siQpNiwZ z1u)G0GXUfrR4N_|f@-lFhAj7(Z7cW!9%7~Ku_{UCqcF@LiXj0siUe`OS`#$l8Mq-3 zKpvTrIOyX;^|+E4s30hAz#|2!Y{8JZO8F@z3GmI^fi_$KVP6LTwuibz&#U}@cnPh- zU%C~XM}_Bcqhp{a4S@`HOAwYQ%!<_rz^ycCHy_I1(Ue>b0~G0I&_d*G{u$?GE@NWQXowU~c-O~GVPeCe)eNok zK#yUR_`5l312%5R`%*q_w#1GzLi4HZ&Svk`7n6v5Z_c{!UD#|ZXtG-v-Ebngnc;cE zC_*0|N9tiy&bhHtZGTKh%QS{qY<=@~?rykHunY-yyh-_B{fY(Of_4 zKC`O)e*Z_|`O7d)d%xVYoWMQ(Iz({V$%o}E_o<1(Xc?o}K56dw`2BZ*rKS~g;2o2g zC0g+y-F)GplcRDLw!5d5EzK@7h`t@9$O_VS?NIC`<>fG9)m}B+7z=C`z;z9jd5T}Ps2tBEToQRN9 z1~a=mL(8ii_?Ze)9pNDN{?mxT;s5g@)kW6k1_N#k*9S>BEUH_n+wv6LbF|6&2;S6L zzEbw;Q}6lFExhUzx}2E$%fmbHqtxwB-0%<`qXqCm7|2pkS)<6DJJO0rwxsy50XrUn z+NYAVm)b0~!dd0FF0R%et(-L-HA2GTtsp|TtdsUcC%>Xb`@uO_b!hDRNJ(Bltgf}&cqw{SBVB=*eme~otb0k z>#N$n!+;-wJU&-qfiG<~U%_Sy4@gaPtjNZffa!GDw@_;StbV zt}@(rBiSk7Ak6M9vGIM`{GK27EO^(_UxugQ(6{1?A~OcDbAl;7t;Ov9!M{$bG&v!`v?S&D_pSE-lr$tcMpt=6_p zNy~K4AO67^b&)CHR<0yDvN?hSmPwYk`25wUDN8v)hW1T;oc7V*Z@fR?c!9Cf^2Lyo z3Vm-kNToA{e z<+!(>R$XJ!BZ{(mb}uW@qDVV?}nt<`K|ze1NZ!8#)?NKL6r(dw_`g5 z!=Z@=N~uq#a~hPf`QL`d*@1MFbB0Yk4RroNTnsXbY4eeXX+S{YckVf!cP(BY$QidJ zBcG*9L>Y?eWxJ+YI;k<6%U)>;VwzsdET)zDWDlCsw;l_eq=rB=&*;JcZ$?-r^J)CI zL0#nrXAgFs{}$UT{mwqqElKaQ{0M;Scn&n_RQOcyA0 zV@ChqYB_xBV%`es!MN#K%kLLArd{9eI#>0FB`{kos!Tm1rRl19OAA}@fn*I5dJ}&K zDPQ~YLUZgJ6QpXq6(I`Ulnj*%*hU`SUQ)?@+26f4_`7;%bE;D@w<6!?3mnFSA@^kz zx7f7tcaVb~w5FMCMJ-wZ9UxGLs;fSvFh}s3HG0&cGMvZasFiG4fQFsX_Il>JFiB@= zocOsfy7f!|K8Cmrx3Bhk;SYFndCMwM`l+dJ|5yzky$Z>{(4pSRY{T3MWvefG@knK@JUCj61MD)nWi%V*AVq@IgDeE#=A4~^mcp4cWieDo7UzNcOD+!$ z-Orq%X(xZrVw?-C&zw=Zs-~py#K)AF7Fr`_WRj=$Pn@n&?c1CPW4Gwn6B>j2bYN3K zsf%G3=>!#C^C;Z^^6*_j0S_NdNEM5%hb=?rS63EQTdi-GqGtnt9i`(In<~c4JTq`p z1f0p!V_Ao$Pi-_+{3}gU<4;WxjI@6~W6n-)k|teMpnL&CiR)f0+HtD|o7!i0rnMu+ ztX!w3pC~CQd42h$VYXIT`m^Pm;`6pJW?`v7GtQHbM?sQirv0XuZEho+ z6QGYdTb_NU>i_gX7U65;R^(n(E`$+zzrua!|AbLV$vS7E!lR~h zWzOe0p*LczDI_{&Fr7w@NtBa;U78rYn-}^uu>@slA9mBSD6FFQc4_my8*{C0n=5_F z47PXXooX0oyQ{|pw=($Q6umt=&!Qx4T2RR!So&73`AWYAbCz@aI}={gSH#asfvHE@ z%rmpYXdPN_cibAzwDNk+MIUyJtFm|QD#(h~AR5J3%Wdsbg&s{Xx;>Db7R(%Y0Qu;}Bo%7E`b--chYthm18DU{XJqgq!$^fEM z34h2K8f*eyi7(9zVowgXW7O zbPXh+rSK5}ycyQzC=AEO|0T)B=#o{hn>p0=>V74rSgTLU(kMa7^^%nd%4k-`qgW@7 zjPw%aCt^qOqk{$PJPoR={e}jj&PPeI+HLh8X{CM&%Yg1*_f=k5+9s9zvmiZLggNI% zO?84AyYJ#d9J#Y9Vp?1GAQ3vI$(RrK`yVv~id-#qI{LDa15v!%RmL?W&U*OHKRkZ6 zJ7NBdEWz?u_a~6f^S1Hw@`*K2A20uO!Tjz0@UZUp6ZxcaY`nU&(D5_EkcL?0Vxm)- zl`bXIp&8_OY?@S+tBU4XBdRMB7P5>`PS4tm1(7uGqvX+vqer_5-MgA76VTM#H#yXl@$5awwSm!rK=4pEC@*?e-3W1cZfD+BXd-&d!@w^ zmoYYDOJk2NMAKTa&Z{N+-F-M_7?Y%PkWe-dBkT7sG8Y#7e0nBHY9vTfDjIPDXAqu3 zl~LQt99M_zaBtKJx~&)t`AVq;aB`O4VJadh+PyVY=&u>Js7|}H^a1Wd|LHMTdoTmwh!44+{%(WS}1Lw>W3J zbQ9tJ+PlYxrLK_n?xxJ|hQ40E5Ku!T#IOP_w!b*RNF@nob)J{ zE2r4oFK)Mt$h^%C7*O3CUK9tI7iwR+&^JL%Z}wq|bfWduTnaE^q7TFjwt}Kj(US5d z?4kz28{M#_iVLc56!5X^+yRHluh=%TB9FPGur!~YIcQYEj+Y0NqubvR7{+5z3`HyW zM~rkMYd4p(GiQ}di{ztQU&I(Wmv)2VRI4v3?%#pD6PhQC?p|%?6I>37rkGCHTXymw<523|doB2Gch8zzEkj#rO<~NS1$YfQ$Xo(jm@PII~8@kOqQ0w3i z@@QVwUg=8EXWrW;4Q7Uz4OVHW;=)DY2jS@2&toewiYG(mLh`tsy~^btinu%Y2c?cp zVcoZf&9#`Ng{0Y}Cp@ePVmL-c>2Z%>2+r3gxt4IB@FOfG`aMiqsqI(6-sd1SyEK}6 zcW(QNC?}+Nh#0A%=jnTOLMIoHzW1eQc=fAgD%s^k&Jsm(G{^K&Xrec^tDl5nNiwr3 zJwV(l*)gCYQs9-}k%D~cC=VLd+V2UUJN&`sjkRH(OFllg$pyvPj9OxI`o};su9}Zk zx;IR!O_i+a>`U{g(~PA*vPqYDJc48TWwUUOGQykY2DujVFaJC&M&V))y3%4S;4XY%V0b6aEK;Sf9MLTjlqoyr z)H`ejV&LgbZWIxi3yKzfIj0cNG4PPCva2z7%8LpnRXiqc)9VTr!fqcn{ogz*@bH&| zGi-T0gVem`2s1QiO}n>6s0^(xb2{oUvJs90xf+#y<_Ob~g!I+OQzn~H`r69h+K;1u zM)c0`vVZw$C(w|=*ZNS=cLxtnbrYRY-0v3hy*A>|eN|*L;kbjL3h9c*`FY#Xc%*zslt>G$zc31V)G`(VjR)ikVVON z?0D;5zuq|bZ5qmO(wK8wg^n7PR9A=5Uo`=xF|Zl|cA4-6%llxaOmJhV_Eofmg-3@b z4hHi4z1-#8PPnZWPtwGF&EK+><202XW7~A7xtriD^Fs7VG25o5RFJF@vf@R{Vde0u zPH#mo4{0%uC^E1Ux?^GAz-!buyb&J$+d^*sHd|Y5^}cR#aLqoXfj(2tOH*$lQhVE1 zfXt^$fRTBn9XUu{6_O*t4Y9I4@OekN|Kp>-dDT+dJi6%tn)B=cAY_XhD3N4zL{=R@2Cbur`As>beFH1S7_JHn3O;AzNi&c2|2spz>aM9HjCAJKlQq-`Bc!Nv+I=~{mxt9?Z!tVDAlww^**vr))TDTFe-Bm9SRJW4Pzql+6GBvx z@?UHo#AD6a-|lBhTHTmGPQhl}TTU34_)3qvgA>Q8fT||LT*mh@ODkv*AjB|i8@@8S ztid1^t6?$s`!iVZ3wI)$p+)$^lp$-zP_iB1~i=1f$PDV!8Vifzi`=h>8oUxPbpur<2OqRf|4A+xkVlAo zYK^-~pdPuaew4g=$D(6;5`1!Eo&v-_7Z%<&eC6FFzmPkLCQOh&vtj~p`cU`(Cefd6 zSHqBa+F2CxZv!IT=-?}4dn z!{$8+!vMx>)TkBK|6e0nq8`!HV1h96li4Jy4~X^>6GRI6)7-?^uiMhgY9gzn^EeEd zOU!J2&%Vn$=^!E_WvUBsyt(|ZGF7SpTAus?5G4RCo2E)_)$m{+o2S|pP1c>&=k+*1 z>t!1}<~xhJfBvU}9x=$=fsMV#2O89f|Gvz@uiM8$HiC>deyYv z7-j@$L(h|;`5QF(oQK`TSLhKmh#?1!HGz%bh1S^?GsU)=j_?+{?`jF|=m?QPr9Sk_J@oU!80`9j58ix%AV) z5;H zTJrCBQG+Sn8Dus-I7S*;Qb_>i_pbg@%=X9GzHOXy;VUm02JE`?A+muaH&vG;caKbo zB4tFwiVSM0A28$(2)wx%R4s*6ahT3{gu1`PoFcecp>5Q8->iBuAzk+%h;AcX@q7-~ z%%{;XAAi+lSS}v5_i$oT9mKamtGAHxbY}S{h+lW%CA!wiqH-1i-uwlUV%-0A)7~*- zuhFAl=Y*FF)_wRDymOokKB@WL1K#A2uU1>sHoTO*;xGQ{v~H$^;UPwLc~1@6m%uyE z83=u(YPdJTF#kdJ$q9EN&$YuLjR}a}oo0NS?D7vb*K~s!A**imRy^W^rlZ8+1H&I| z^YioTbG}n_iy@7VoqCn(*bTC-j9tj<$ZVYJas4If26gh41k>1LY9>h7OgFw;%>-jh zsb^fT)TLj{W|`}e(*EfvF+cy~o%7&Wiuwv@@eQ#Y>g(z+NuR^bzG)lygAJe8*kO^3 z;54i5J1K7xXPuujnBQ~xJa^>A!gEuv8WT|7A|({I={lHHZn7C*7rq=p%x%=HFd12_ zpJ#AuiswFU>8`%IRm2r3Sts6ub|2XIpxKimtA^R$CD8$N)$qEqj0F}eZ1ziWAsS*< z?k>AU-IgD5caln%vSX2HmQs@9y}7|dg$K*IN^y7e)oJ@mHM2Mu>-@gAF&65GCb~N6 znT@-Tm@3X`Nf%R9W9n{$W^_&4e&|G>-42zNqU^AeAy#SmjWa^|)TDb=S*rUIX8TTr zhs4W4#-9?9h-vApMxvCJ5sPYDcZ8J=1Ln0Tt#+NH&|K$+TEl%-jr5|~iTG&I1%Efz zxgV}3bE&aHS*c?eq8)k%WS89r-TYyPZg98bN2cQsv1P|ARCt@0Ib4x8y^3rJZvd|< zH7WpmEVvWD)mFEdRH3!dlVYWsKBpY0AbW7(;PT*E#D&qj771z1Z{TIeqlwT*Gx+GD zMM-z3us~y1$1%3U!FwH5n3F0l?7ucDO>gG)Q9ITw@kE2rl6aCwG8=ku+CUE~(jtKMzVIGugeakxx}KkdT?@*$d(CQ1^aCIOww5ONCy?rqy(MY=mT%wf?Blb_Id?YDM>FF z?snQr&Hrxi4&8hwkLQT=FE{B`lH4Nh(2Y1rxOU4}jIrVOpA-(nANTJ()R9Jw>5PbE zcoLgw2b&+EP8i-fM+;f7wC7l{k9kE~M4z4SuIo)GO^_gT$M3c1bIP~<5L}MGX=BkV ziodny^^#WzsB7-W$!|H9Xko-J4mH~y77d*U+nBukTzZ<*x8I%67%%QyJ+CF@cIDw{ zdPR=bPvQoL)}S4bCHBO7tlV6FdF(F@pXrT z#7hz&v6Akcx=3a;hd>L7+0p#fs^h1|S+bZ>c>96mr?xn6_7-YI_z|=yDp1@4kt$wfQUfW{2@Pp0pU8K{ZCd~{+y@z1VY8$S zJmI6P5p^!}WrtDV_j)grJh%^gmzV|O!0Y&9=~G{tH&ujCtj&17JYUgM=8-PK=r&wW-k9g#Y+jbRgffP-tv^`3(YiI@;B^K*Ub;PydcD!4%*bT7YZw#V-9Qm$5eJMdbWWE zB~GDOaAntNbAMM$ed6p!!TlYo{u?n0O4iN8)wnL)i1X!xTL)QMC&R%($SFaK@%u>d z)P0B2=BkeM6>4C5JB$$$g1TpLc)`26v4w+k>rHiK%cztA)?7{1xzq<* z+!|Nb)>qv4gP(KDMx8PO8s7|rWSi7Ln0W0^vbXY8-Bl@=l>HEe@`*z4S)F%Y~t10fmJf@3M*n5i%x-J@1-G?`9JktM=g z%1h36Z~B>jLp;$!ac1E+L}6~wL!l2KAjUQn)JA0i$tr1F0GR3AMKz zQIpWz(lG`1fi6;|2?q+0KGFrobeMhETb=Znb`B4yB=us!;NLFItoMM>&$iW=n*Nj( zbIP_krON<0!MvpzkBxz~oxa)-qBy!HA2{E!@2|icsK>Dtk)ycXx~<;`3ciUGhdTCR!>gKesX!5h7!IkhHTzoc}t+KANsj{`Q^Jr9H&3dCd@Go^oh*kmm3iJtu zbj&5jViciumg6K+_VgV{)^^yOyvjxTf*Lfx>ncJ?Qp?^Q_EHMHR1W0+K3@@kLCA7i zGrUJz?cbpD?r7v8UK|ng^$ySQ*{WR{0JBNRHqUXj?UR=W{m|jNSVqTX*x&bOb@OFw zF^PNA|7`ER$+ZCjEBgNL=7{PJjf6%6HRM1^T){-NxmLUmD*f?{_8u)bK&_jL@+U6# z532yZZ;037-*EV)lW6TXynx-=M83f!0Kvzk0kp3CKRH5FJ}(6`)@41|BHmDu_qlLC z@50pZw10C!M~NaVb)SCZ4zoGqg;c$tH3#>@X_7H-jw}-n_;E;a^ugf{9Z^K0sd6Y4 z_m?)^!ti#?WkRI9@ysZHBgHKo64R7Aw4315aepxaws6dnd^1%~+I*Z-C3DK)K(l9; zn0E;-=!x33^ld!-h!skF)>QnT+Mhp4V7KZNx?K3nf6^qc524P^i>U1I_S{=$N#;&9 z8WdT4?><WM+|zAl91yd#*IUn~MalT0R33DxkJw z`H^yY3w-*@R1ipgIXSJ!_oEsyfEoCM(^zxNT+T~`KdY6FHrAEApbz9Lk^iq(E){>u zJYBEJuk>g2jOYC?$V*%#FLAv^&G`BsG$z>q!Y`eFuFHVr=6@6N|2<3iKT!T>d8{Y> zE6}zCpd|CL`|Qoc=E|h+KzF8lF!^I^mQb$F4XIzQU{$h|A)3DDBA`#_&P@H$B@r9s zyo`YxFB628mhl?dkp6q6chA5KB4_be`9z)~x8Gp7fSTl=;hVs4zjJxNs4KY?BzhTR`@?x|F3xPT8g>o6Uxb`-W>>c(339n*fe!-h)Ko` zQ3pv(s>7hvqG=vATo^6_7yWCpUX&I;^HU_`Yq0YiJBGV;i%pOFn-FGmGx&}*39Deh z-r;u>1Bywl*c6RX-X2n|BLNEjO$=3E6LN)?JbfPWuZtg1&Se)kHV^MT8o`1R#Os{P zkIWX)~bYW9am$G)SabM-I{IuQuX|v5>(Yw`}ENTm?1#{pwd)f zUQD^Xs39aIS4FDCcINJ)p5?}Fw1s`AQjg)6D+so*RfwPskc2O1OQ~!l}jbHs=zrJ;mUI>$JX36gS)bCl( zu2kGKHge*^#@wVMncH}4l+vl7|t*TRba zaSyVuJ-0ena%F3BTHoI}dNj=!F{a`BSPiK6Nam;F=?CRTUulBIjmLkYw$x?s82`sw z`W7f>>hw|#+NT7m`i7|pwwX>h3Ko*zTBW2G%Vv)B>i!c@Nc}6|bO*qV!Uf?%|B3nT zn)P4SMhxAREhDvqne0Qd>mp`iGc{u}Ag-%FpUxm?R3s%cZYEfpx@b$)q+0zJTugNz zx(E1Bcg%hc^@2YZsBUk4TK(f|W$VRMk=yU-TBK)_X6VzU5E|fttLH0_z$m4-KlfB zM6u~m#Is;s>eKjTsGgDdE7zWHCqe@agm1Op;i^ihI{i0 zmrQXqEd=_xt#38e2zun-hZO~k3)HaQC_Lrdfx(zw?J#5ge9G+%8)Xr0K5N&cIz|Q&Eml0 zcLIo-?EEh;3o&hOPG_rUSSpK1Aa67iT==%`TUE*X6fbtV;%9i7Ax>A8j0jdXI@2_- zPs3*PC}kx=>d0m=nFcU}Ai#kL!j2%$U~?24;ckCZ|ag|C4>@ z%ZW*p3zmO0->G}T{9<*DY^FVuKDN%VLVh~rIp+eSZ{+0`4sZLX%xx9%)INkh8_!|H zk{^@S>@<(%M%Z4VN8UIxl*-m8m6b29M}!Iq+JXe*%y{9Ohd?owmew$|kfCUe=lBIL zWrS*Qfc+CeaA0D43ESQ!qCD@$K!KJ*I*7;Q)EstqqEu;q7U=}oa3Om}?%r!FcnWpj$E~QP^O=O=>76u!WRKe)IWE9{U{|E_s4a@uwh&mHow_I_fpsRTa)vdmF!bZ%cIwL^>okb?&LC#e=;zVTNH z%s*GE3vd_M8HKZ>mL;~1#bBXrNjtu~gmK|&e4fK>$z_LpM0)Zat+qptK#|am2C}yF>U8lIB1KYO;D?f>_HseX{ZMuJXKhzDO4tzc9xOH~ z{aa7{4!Wm!bxprmTa@l;BD>Eo7ULQQ&*$6ae7dn1S@YXQaTwdw}_m8uq zn;#z_v5V@B*BLe*Zc5NB@?IFK*k5L=?qR(WBUESK@}#Xmghhib%-59fwwxZS@P5v0 zlj!EHNoRC-N~xJ3B9oL%2h=`@;I+AZBXF-$YEE`h4wq0{Si9(QPsKolM{q3r^jxcd z%j6389W+tYCNR7mTF%Zwaq>C{!4WArr`kNHz+j^$y~zddO(DkWZ1#(ozqk59Qbu?}$#cehgr^md`pHJ>NPxNS{}>Tn#8@l zi>GTH>-@g!sVS$-a|jXa-TA?w#g&}dF}djp*gAJ>4ev%o43xFK%Q1%6H~zwwV~i** zH-U$LXo8p9;^+pbuZUZx7jxMV~!oR!hFfC3vXT zJhws21(%8=K>+&wmGU-e@FQ0M6ra#gzxce>b+j6y2EJ|8+ z(yAdxBc;{vHy;7prHd}a1?yo7moHfz&MBtcAJ5T94olg&4QF!Yp|UZ4W{TAl@70h5 zkU#X*+f_p!X!%7m`-)CEOJH7ktjLhVisdm-Z*M@H>UftpD^O5&AN*k!t0F`bvi;L- zWCpSsef!cbpmaiRa5+){O@hnRBa%RJPi{NH?=S9*{tr;pBToPIzTjV|^2`KGTuN`3 z%aQr7eF(NQjQR^Bz-eIDaTW1*u$Iz>+(;vL!^A(h&mvy~Ju`7*cjK2#MU($^-0-(3 z9q>~Ru1&wknG@OmZD5R1`kzg1saj_Ro}Mz=q@7;Rk2)Q-c|u>9H0L+L2Y}4Kq{DqJdD)qXB!D7L#_chcw$KSQ+(3XOBMYwuT}BQ^cR(^tj&r5*IY5 zA)z@tK}>ch+oTR&LE{Ra%=Xx(b0PlEa77F}0yy!(4%*17m;d!4|DPlU?c)aA%M$!b8rUce45mcN1kgi$UIv4JEjjViQ z0{@XCP;4^eKRlMEU;pNDK2Nbo@xA|LSgZJHy&Yj1{4=8NexcsgQTkDaQKr$&i&7xh0_g$S9#oc6k z>)ZBFm0{mTolO%co)Lh?caE=3k5G6-m}3kx+Vm+<3r)u6tII#BFCbyD?&`2n-2-H` zNq$qHVK_8MGWaeS!5mttX_yf(XQaM}1`vC)86SMd-k?Egg9KM!q6Y$>ZH1ZH(iVyI|3WxYiv5H9*#6yVhdZu)H`#sN`p zp~%vCmwj(_ELfK#51O z?g`!MBjJZnr1`EV&L`(q&$wb9OgxcZwG`HW0>#>@cUnolSJ#5BLF7vRaKJPdl#u@P zz$biE+`a-f1Z%e{wyz;jx#9Yw#Pyu=40Vk2Dv6|P2aeMn;K7E@J+we zhz5d9N08GCSc8bVyy3w-9Z>>)k0{rx<$8rqZ`?aiM4vG?%OoFkE0TBrs)P;{dlEm@ zph0p4H1iT(+`w^74$McLCHhFp$BE6oGeN!Gs`bjHmQN%!SmmQ-o@Mc4slwo-YFYK1 zHj7e*)-1QJ)b!~Wz@8u)+4R{3RQ18N+#!_x8m!Ov8(O@DwJ_^=(Cy0gwQtR*F3tB$ zVarDDH;|p6RF>Abv@$rdvvW{+D2z@eOy;Vow&TDJJvJ)aWc6;DXR6V!a;hF~0psHkdj4lOzMLS>2I)+D`+y)N6-5F!DCv{e z^~>&W7$aPJWu8ww2`uVx;OdC#d0WTHs&_zfaAxy_yt_mO84+!Phew%D7Ic_gp)9iNvJM?nSV9UPGj3<1JB z5?xy8fAHP1AP(xn!ZJPoqyH0wFvJh@{ieb0TtqLud#9K;XW^|U3?sQSF1zhq@_Dj5R?x&) zm&hAgqH!RY;m}3;yhz{Xs+p3D%1YH2rdnr?d9Q$`?&oOb5%WMFJ`aXngNqRnGI7eX zZA&-znx}`*K8V{Pk$WAAgbNSjp=T6PWTy_Aiko9LtC2RK=~@D_RbaXm;^aFZFe z_lr9*>g|1S=4*@c$6tlDp4=MIg@yI4yO_T1;Mv%P78)06D1+s(bmWv0cR%-z86R`D zJ+NPzb?*WwU;r~9!p@QlL>~*hlyFJ71df3h<-V1sui*1f>qUAla}ua>OA~j32`lUO z+EW6lM8@7dU?FeB!Of*;nDGLArN_ljExS=vDW{?JkHe{KaP?Z@r^tFlxOdiL4uV)vW0Bl&W9GJeNYYqWNn-6XhuP0bKOb0u zzdCQO_$Pieo1x`7DqK5PrBEV6(~JlQTw*!d?V45tz*3?lTyAZkJi4}s3voboaADjR z`?Wb97zWm4Pg#+O!R+?Wk(DwPTcv!<}j?$s_;pEO)O;~$! zo}Asmh1?dN|S= z)qx(YYdA(&WV)lTL?@)TFyZlw3d<+q+*c}_NEH2cB;KvC{i4}BlFQe+^4WZvf=5*h z?zGtGVTE&BEIJ~Z1=jolo;fO;J!nxm@#YOLnq$hp9rCE;dA(ma$M^WR=*^zxp4^ux zpVoKV`m(8l*X9}cGRP~B0P0Nax$O4nisCfWc^9Zs4&?)22{J&~Y2QXhViJ9fc{n+79kh^G+P0R0mYfcaIA8&CK#0RN z@0FVmY!6hjwgieLDp%GlCxI>pC+D?)ke*+G-bfc^V8&J>-HoS8N_j{w;Q7UX+)xPl zc}~gKU{N=pug5c3Z#D=JAzgPlr(yliL=mYUYXc&$d4>E0tsrF5lMIn-@jcinQrUXW zxQ;Y~t@^{2e&ZU_9I&3qG#PYyC7JuQ?(NuY`U*}_FP{q$GFfHZ^gI-e7xPzXnjMq|$Ao?rjFNZJ*To6LNE%r3`=uO_^&+T#0*_ z=DU=HbfZl?5Yx@hp5y}iA~{9D#gF_v2yDQPOrUDc_N;yb0Fp-;a}n4*q>~9OP*%3t z8V?b*5ae;q2e>;s&7120Y|yp-C|lAYV+c&5N!QzSm*%_{YO!?l4-3y38`sZ}q4ZOz zgG~G1hIL1`l21&CQWQVSdXV8x7E%Ln+y?OJ{pU{JPZxsutHQdSTmin>uJly>kL<@v{AIWj@9Wluu0BTr0YQ2#MtIb^i07)z>_^!GPPZEc!N=S zgYhe3PKr^WW$nITKzY2{8J1=6X|G$|fF~9v>MDCMM$2NgV(-L)k6mN}Uoq)cXHM^l zuhddHJPmL;rJL?>P&=TXd9f29&L`hT<~UJ(mw%H;wX}abA^p zZsIVsgo+(;k_T|EKhYuKr{PTW@2nd$PV1|=Pb;Y(@sH5b+Yh@fcBfh3&FL~I1-P^v z(Jm-8MFwhn^AjGVG85A?1C*IrddCp-%<@Gpns+Kl@L{j(ZyC>=&ub#`9KN?xN$_#c z<(Hcd`1s7D@+Lq!Zr9{}MQo&|7Upxfv6|n#B0wY z6&01ZR46dAS2G&A?q{Q1lqk?$v~=kzrFN4?ugc?S%0XWe5HOCIfGMS&AkW`2lp*yG zOdOZ_H^ymi&)oJe2w;0UH97!#s948wc&5mCfVFa(lhY_0Uhv#N)u6ldCDS4U+Y)oB zSV3^MIJ@M>Ruc(%dmJPM)VFyxSq4+M_N|6NQ03*Js((>F&H06E&?hyI1LKH=lKAKdk)n@W)3=Z!)0^gH>8X2{c)68s;-q zjI38#@|$-(L!?JX^nud`mD7sbTLlNrP67AdXC4e5c!^!9m0}sUqm9*j^9M4k#eL*= zaW~(5&L~U#7X^o~ByKp9+~yLy6sf2;hBT+@)7vh?Sd`5XDvn@UYD6lVuITS*S!YOU zBk}{f%yls%jI9rrM|Pj?e>R$`U>|!nbH`Z8+JPm%HMh(%J>)HnsbB1E2Yl;R05cmB zC2Kj1x>u_@k7?kT!!3-74YbNW?3a~(-|VwzMV<#hW|P$@J_M5z z9#L?rcnINi`{<&dB-4%xklUJ|UMMbuLqa!~nDyFV*DIPq&QeYRVvPxfF)|71ZZ)ol zF0lyn0;l^e>At@mMz*(`7IXf5(`tDv5VgR0g#YEEN%50w`ux;Umb#L5h^M;J-1X!( zs!s{AX2Kg(5E%+anGs&vSh>&;&&%?43!~bf0^SRX(iiCg+3UFsVf(T6}iV3^;$>p!?1is1g5wCl^`2u@j8P%Ye`MLx)_3a=wII%$@Chv?arP)`A| zV{;pHr@jiUmOhVQNpREU{-M$^P(4VpS*=k>_L&>ab6&Q-rPXje=Q<&sCJAVNPy>|d z)5KHT_aU|L+R!WX>MWaCv>F#4P;`qf2l;fYF?Tt}H)t?DKgUZEb$6?d0xZ{C&o-i( zqZJ@lKZoAD&-8OnaewJzdB0crP!X3P?3K-oZQUE;9U+W(-|}jSCTNg(QR)uTW{}%O zfYqk-5eoA-zZ}Gae`vf=NTH@W_CrNeyEj#|OsMeYyG^j%Mxnl3@UG{JH0d-kfI5yS z4r+b;-mp)3I*dWofS~jbwGGqDJh3@}4jnelm+o<05>ZlH$CHqKTjo!8 zCVV+Syy%NRx@gB%)E^;5g2XkXN6fsF2=1hu$*y~Xi9!+Dd7wiNF}wW z4Ewlj2(|{#%13c!9Ef87LlQ();Qo z#Lpm-6b-R4ta~I=B%AgvuUh-)PeQeKFR-tPavPJeF8-CPJD|PHO%)AhiaMJ9bT03&{S5^W@XCWK}3nE^y6IeVsEoiGfoHj zj^w)LDr8$k@Mdpt#mwojLGqD3-G(#qpe~-6YuHDka2WIVW{V5Gnqv=d(h8*+G8v74 zoi=+;LaP*57L?gkzmvuEjxtpxOhtrRB&Y1om9Gy)srzw0 z+^Myn_iqKT|6BkO%*WTo(qUm0EcUf}#nsaxVzo_lC6nBFVymAOED?AH(7h$K4B2Rh z(qE1{`gzKls>QU$WvMvhhD(?$m5ZsKR-g37*s)cdf;rl^<#5$Bv1TcDz3(I;?vdjp zBDChp_d?I*NFl?WUKTH-U5GU6ld3>bxW&6 z+!TuyAwl{|a<$~Ix8&+j6&ZO4+B|3RjH=qslv~s*)>~PA2FR?cOI7U(x;RW>*9z7bRyMw;~|M` zh*ZP^g@O)*cyUWrX6jDVUv*)yqd0nz{+538?Wo^sTlBFN+>{YQt@$S#i6n*_S2T@I zlboGB3L*+yf~%(QH^colO-JY}i5duy2p%8`ULKNzHVd>GKzVe63Aw8fAjY z+tLoRMAUvWhw*op9SiOOBc;LgOzAGS-wuai>Ef2%=2f1t9+&LKN8kqE=_@T%6PF7b zfr5t0)Gd)Irev=i9%{3hl6d;sY?Bd}J8QvdV$QTuFAJ=`wbG-ExNyVMpOraIx+$d8khNCfxvjN*!E>(o-Bh~3r_Ytf#k}Se6l;p6txcG{u#L)dE1Au@ z7mN(pL`4f@!iU_LVkPM{cmLMTD%LVS0)P_?b)Zf30 zvuv_{%Es$qF*9M?&ttuPdlO+mW+l>{{pMK{fiCv= zAFl6EKkMdGMSPkr%wH2%}5X2(H}7T4gB|ypSgkVsghoSCEx??!|TS^Pn{}DW;t-813okP+_LsN zb?R(8_1`~T-k%?wI`w${w*K{d!49jF3>6Us`;ib4)jPKs&)wl;zxbL)l9p!a`L%QB z^rV-JKSe zs()pA+!QuQFelgJn#xxKV11ylYu1cTv$@!*(v=Wco-H{R7lB-0pSz>AD`I+u;A*~VYe{>#61()>6ao|!(;Y)K}<9Q@P6w`Iw;>&8r# zc_1;2_Lr4f*t#{BZpQ9?n5i@cjRAv6^Q7PM-j~`mRbxk^acfrO3ovgP7Lgbqg>Wmp zG*;+d)$h_EIqlp-EM`ZR@(iPb&?;Hsg{?bq>GJHhU*l`U&j~tq+diwxZq2hAnHPS5G4N(PTY`l0ljq0O9MpF(OkGrVZyY!I0r;z zLem{R^>xJ_jA*l;y+^Y=2eZ-gzZ{}(O>4=>nZ*ddvAZa*yBLj2x((bAnGh&MwQk;@ zp`>dSgJ^)(xFEtd$U*0mXF?`2=!%FdDxzrJjJOtNk(hBq;J%9f$wLR=ZjA_VVVohK zi@MNuh9l~NE@O2%BZ~cT9B|RCY1DUo?xP1>*xObw18wt*0vGnjVCo>*3%MZB`(y;> zd*f0=mWVQ0^+I{>s-)kSaE_iH>}(}cyyeN zbMP)#eaKTuSK5PVuBs<8eS26w%YVz zg(!<$RcA@S^trNjfw8FSQP;!iWa7w^iHE*y zVV*GpE+R48)K$s^F1n1%)a6j1Uf74JOZxB*bxBdwwd+l#t_Xy>NI8&RjBcXv?6`ng)jZyfwMuPlTDdFYYkM;7B|cPF8r&D3k3BIq zC+@8up=Nk~tdQG{nu{mR8pnvlC~YLjS1y^>L6}eGJgL7sim66WP1|QMcph*AEAa)Z zf7#Xp2rFO3sJ|-kKr^DiQt`l|qW)>R{k0CvswC{t8I5zWB5%bPjNdp}Q5F=NB;cA9 zIbN_2x9MTEtBssY9(m5%V|QPwq;Whzc(a^zw-kLr7oy-^sGYxZA2!as5sO&51YWDR z@nr!l{@#X_f9OyC@AI6~?w?qRf0tl&igul+v8)dJ zk}&OAwTJ)Pw*{IqM;?Zrr$;WqytMduoOWeGo`%)`J&pl0=h=}vG0Bo)g&1RYi9RU> zT}_=Q))STgGZ|GC#>;v*c5B)p81xLY#rTZ}T9paYsuKTe#N#P@@Os#w{YNdXu2hV%_vQcW!RBhmGaK=q5X$+{ z1Dqjl$aQt|*R??P@Xhn($n|gBVu1iqYKmEw|UK;@T(TIoFfbEc>bs^KkH|F6PUwjn{re^ z-DJ9o>6I`$-ZF)(fVS`-E`OVA|7Za_?sKJ2Cd`jlxSY*YD$E0KU=PYwDLfBRKZ^9^ zJ=UQFb~f{$BNDNUU*7=ps6rb%Y9YH9`q>&fG$BQEC&bi;YhyYw*o&DEP7k)@bq*}*$<)J5kCbg%?oN@bX^6uDC7&sfM z^mWn|kSxk+`xksXda67$&UvfDZIX1u45=KZ=}yPt6wrI>GU!q}vJ3Xf1hby`flfC4 zIdp@)0qIFL^N{%8F*LdI9q^ogFz^??7td=qtqkJGf=4s|?g7=&O2BRoa zc<*$kzw8{H9p3`mXq?!4JtN9sLM2RcUybUYN?7Q02;U4=qD?kmyxUumKk{D9F?ZZ! zbR_R7RPB^m0K*Bx7(0fbHDji>8YE>iuhPVGezyWnZKd9Wz0f3YTaCh!)>%q!@?}DA zgCa$D!ZBYA=*QD3yTu%S@CGKp5nJ&<$ow>gm$koL^TheZ`rV28M$oAToOyP5y(Mc; zF)xF3j22)%jQqYRl|SpAZAMITl@JA>ofscgV57AnoG2UkI8gK(_a7PXU|>+TqvB}3 z``^>?;?%93@c}k6>vG;y71fZd-Y@k33#uxS@m_)DU$fVCblI?7S2lu8ZGE1#Y3ElCO{=!8!*AC`@ds%#7h% z_!+1*(v=z}*~tq$G|S^yMUKsO&mT~4jByi%h^?bHjQk38D8AJwTB67iVTfl#z;9$C z8==sf7vWy`ku-RZkSo7&w2l?I07k#75d(a=&3?X^#!#miNRxiZH|>2{Hx8;Sl_K^T zr!gVDr6|!b9W&Q^;WQpXogy(BrYs=iXo3To4SRGOuLGiV!I~lSs|%U1K52`dhWL2PeI@xMlMRt~$~>bC|j6cX@jEUsmuHN*N~7lAMf9J+nec-B@=o z8PMlxqv=!?0mcJ#`5bc$As?q6#$t}`$io;tv#>O6>Q?YrU4T@LFyL4=MR;!6SWHJs zQFdU*Yf}xIGhw)cTed8>fSuvYZyC_vjZEXXFLcoYslIzxQDt7b4cLQ(FU+X5-)n@# z*cOIJ1M74KhnBE+e*wSZbea|+-WHqg#(b~o0z&FcSq!jcV-jz4fV-ykSEu$TV z5gqMc5b_T1W@4_@wxn{nmq)y(?!y`XGl-wz&7ZpOo&n2*-M~xZw2Kl>kxYyAPV$xZ zTDPcg49n4!EWimh78~i5l!C?3Q`I0iS{L%PW&gAM@wrPS2Vs9QPJ;E!L`BP3jCdET zB469(ik47kJU{NdTS)*2TF6SNnvp$l${V)04neQmpnxow(LAXXvMJ(_UOK6xK6SErC4$?qYk`Q+;-HGJF3A{%YYy~!@*K<>uu)Iij=^UTRiu&Ha> z%^)Zc>Dxjf0d`6=qomE!uspNCwBa-^GsCu`_Bu^M%#*xCSOd(>{ZJIMrf4!<#Rrmb8+`eg&hTyz z_b0mkvgiGJSXSE5V(~Vs^pL+5`36+SQ>V%h1$*rdUMjpskfn@O(|hP=Hh-lz+-oX2 zK(gHX`1vU>-Ea~1u)HfQ?`IqaZqEI_z&OqD8oc&Gtb|y83Ss5=Ky{nRxU-CV3dyGGa=CnD) zk04b+-(D?&&}*79=uXbY+dS5NIk%p5-(Iaj@S?`=J2w8k7Ir;TOvhs#U??9C&l8(z_EoiS% zKmBlWGPbp@%vqeqgT+MtL*<#agqA0|_0c&Y^A9*7_Spfv>tXNBHrMT48R@*~o5&W~ zu-^eHQ6@{9i>r=q6#S>Tf6`uLAM(P4EyzkRq4VCS{yk2;1@y~lFo*q@m*&zihPC-1 zTd5R;(E*n_R=v`?BgK+`$xYU7EXj+A;X-jx)|gXEQkO7!T(6V%(5IB@ztF65E?vqN z?xDLnIh3~y`D`uvLi1ALwWENKk;f;12*T~b4ar*BYTa)E?Cia~u=A2c_=VIF?6KG9 zJ@cmQBv?c?mdoOTKoFnA(`$b?fBu5Q-^x^<3y|+pwz(7JDJoF*ctpJI%SYs$UrR-@ z$Wn!hv_c@EW*_cS^M7KMBvilhXvn>>YUK^LVZB`X!sHKlQ3JOtFV_02-K4&%OBkQ% zc@sp+*sDQ*&sf2(PM^2+mc_&*?nl4t=n#K~Eto)pjQ3Z^l1;Ww)g*y0s=2I^w#otFjA8oly91P4VOhd1`)+rfwkIG?I>*Mb zv1FwOW-2u}vOLOmf=LBTXortzSnPe<<~J?&v=B4?PhEJnTf|N7bH(yc578KollgJ} z7q@PEx>M1XmcFB)IFLJG0UQ|H@tV!_io&qviH*lHq8L#=q9ytCh6X`-?Ke+OTU-ke zb0h#LN{x>}FM&^WfwIdFOcLy@B(^L73`B)8^+20ej*^C8X;ZgYi?r%59sSHrv`<-< z6n-3`o(SD(<+0MPJg=lGN1aDmI_DdIibsOkgG4ki85 zt5?~UeeV2TRRW1N$kn?znY!@DZV}oq3w4E7ywm$McYw(K-=>Tl zB^AY3~+;7o5yy|S7 zdDeIAQPeQ~>-h}Xvo8S#WIsjJg?OD4@>P|;xUWt-Dt}hM)V)u`X~6%gNyK{o$o4;L z{K90f+>`*2D4Lpu1p)B2offfKCv8`!sp6G7(wOuj!{c=)bMD!6*Yv|Ae4T?(H97An)qQ=Dmq1soyA=Mtf zc*NAT6{H*dSg zw{4v2wpCH)=w(pNi_vcRPjBm104HX_lwf*=l8Wg{o3m1*2IOHWfLRIm#)qZ5(S%!vJ>oAJH5h+!@l`&Skw)DV(82k+Kl%(IyP$1;U# z+l? z6;Bt%3hIBbU=i4Ce5zKdtc5GbJvJ!|L{U+wC+}8cs99!3o)tBZfRRSK+(5Yc&4Ttc zJn>2FjxvQA2`B1>^UaSfMz0xV+92dCXxzKeA6m%Ykxkue#Pr`LgM+1BX87p6D z%m#`kKUNAdm9cn!$5E?p1<0bWgzYEI&%^CAUH1O`>xtPsEIs)j_qinKy#eL>+ac2VSD9lchFMA(LGcTdE8T3>?pU58|d(DpZ;$K$mtI#n$g z&4s1k>}K}H47{mDIQN%~Y|0AI_a#ewyy-iMru~8x+FJaOT`iMo)E|4}nBriaMi7-6 zK??zP;^2Vv6h|~n!T#59it-Rm0GUCttdDbGX#UeTSM#JaX!%YlWYJ9;k(f;4`8rZc^ zH@r&P#s<_fu=vhXJqA9n$3`_PjFbKF<~AiifXUmHXX_eC<L z5ni%JHtNR1l|l0=^{>}2ElTQ~{d#qfXjbullq)jkTE9hPQ8cCYiF;Im-$xQTWCz*R z^pZ+L%=iGaeFr5oU=#9oGhu9!8g#MDpgO0aa|&3E8JX0rUt^W|ds3D3&#zdVb(VB# zd!Cr5fTUmEqA^_kwUB-S5bLO^<&u0eWH33%izYt!ql7XXPta4B-0>kRLGoK{`0g66 zrbP?UaXHDoiZ=^ZYq1Vaa7MKo<#zbut4Kd`2HWlrXwd(kPy0oSSW4KeYqxQ90zK^7 zgoDpS8CRikGNNZ0ZcLQ)*;Uf8#50w&h9uS6rZC?DY)) ztFe8&JVa;PgD=P+R)F(Pm^iA(Ml`L&ML% zLVUq)zH=O`Ih(cpLhzxRfgexI_U+8}1=a*# zxvrqu`s53C312=1u}<8(*{zk(?n*IRoQ;r1+nm6P60I&Wxmc_vF3V++Y(d z1yfsjI&~GhP{t~Z^B*kJ%)^C|?3?;vjfV*oK5EC~6`f5>_WhZBR=rFCIR%0}PVB&f zoXu0X+WAcYN+{t9pIy2en6{M^r4!fuX{A5bgWp9WsHP<4q-FI&~D$d)OYXpCf^(tFWFyE8A-tj1(*4U%bz`=)&X0Aa`2sA4#NrA z1~LoXBd^FSSyRyWwAafuW1T>RhhA5^paWcDh?CXiK0BRDm3>SAH2W|7#*NV-CFl-xp(kuS>8r5Gt|Ay5$0ovgpgruQK6!VK9umx9)&piO9=KKp&n?#3R zln7hW^Gyn~H5ZRjpdbMG`PMGeEVshc2Xtlu5kc(Z;Mn7I^Ov(>DApFt;YnD58rt%iL-eOh+c zY&7y)<^&@Gqdy0%226Li)`AJ8 z7fBXqvn(-mbQ9{ndZw#uB##ym>9(ql$Q0LAf=-Q*54H3eX958hCF+7nM*tHl;dg|( z0ObqrUj8zwmPNfj(k}Dtr>-N6LX400N#f1P5fuPHnw(Ef{`$k(J!n&DKl_B|T)H)3 z|9h-K%O!v-$Hsw(4y#y$RJXRn&w%FCW`BZIasWkbTnz2lqS>y>ZtY$e_$?S#GN=GX z0BQI0e^HJodKirUop>sAB)(ws>U-(JPkFye^3PL@tn)xSrwe&?YYtKO9eEelAL6FW z=f&Ou$S6?X@hj9(P5D?f9ER5xjVE5jsA_is6Zpa3+1e6z^b%3i^x7U~-x@)+&7DV1>49foRa`jp{&H!A_72vn2JU{0Dg}84GR`j7r+$f z3hnI_Oc$nWjlL3`u?x4~&BDMttN{aI|JOi@0Gc1cVVPAngaC$hHpx6CFAHQGTR%I- z-;vrM3YG>o@r4o#iU4(eZ5Aj+I1gA=rz9-`TF%39aELv)HkusM++ft@z6{7{!{fyG zw!-wi$`0*zX&#X&__XoHj3uBz(gKO9Fd&U%Q~7C!iMUi@%25A0peLyE7P3Q{j7Wpi z;JSxUYw~FrKx?hIPcfo`I`&i|E|hJ(v0RBO!@RRcA~(!{mL6*XErtK=ONEDJV)U#x zhvoHps64ulyom_fKSR0q+{|oYyRaSd<{S>2q$L$hJM79zoL1qC$f{fRVRaYIGe;68 zIC1g`dW_ZCK>l_tdI{}dhP=^XC`{;puJ50wP}4^V;&~ce^NNtw%?3rV6u`<-xp#d> z`y{D=LxO7aMyMUV*|(YEAM%#NCF9T8dy|!RTK9=CVR)Ipa27)&8sN^#r|;1ihSf?c zYVC#i&<^*sM18&v$p6}1ONl?(kfz()CX6%l)_%gMJQ-3obMOX<6aqICL$_J`Fh|Wr z{W2*LMr45wpEgw(8SJ*_J9k0d%_!-Eddh;RD{|HSddgcU?U};N^=66-|%stRxo>1uju2&*b;a=VSSjz3D#x4w$MzlS_z*u8)e(pNdi125ZvRghq9#tH@-vta(KA8U?@ zOGFrm(|K{!o9RDr-~xp9S2AMn?H&w9`$qor^VjJiP#&rJ{SilpeK-X6JE$3Nwx;>P z2wzcTWZ^cghqCwhuB$5fctW_rJ5ahfNULQ^IsD99aX@5%oS?OzK?vTOET6Hit}nkf z^B249K+k>XcNK@HQ<@>jDi7{^llynt6HC}Et=5I&|J8@6w$%f}vd`VDPFiUjK^%r> z5}9W}KGDYo80eKSHtE1?DHo#(O#kJTsN5-3Q(A?*_v)`{Y7yhr=>W!uQTzwCxVS8P zI^z@WDSiA3I^unIBr6H#sLJn8JM7uadyi<+6`e4lo@Nw_+=pi*7W-# zhD=p#*oSdmoRB&U4{`?J=0tM-NtPwu?`qOHN<1O%pN!L5CU+l=0+GQoNy_TiSNe!? ztMC7(NYIPCo4IG?3OH102{V1)_tN6fUAuiHx`Z(>-)a1i%c+rB}s$E z?TP{?wu4F^zl5&9uv?ins|dHb|6KU<3ud)9dF?+7atS?EU__c8ltt)5r0J4)7vZ$Ad1*ezpCZ7ZQ+kR%axY7*+y zI3XUj{TsuLSke<{`*T$>dQAEwk>}qftu>}uR)c}1H2fzz*-c)lJhe&_+(-BP-@_1? z6)%rQOv-i7-P`l!Kye9GrTKS02XG*c*!`{DLGFGJ3%ufD6Z>}&V=5c={o8;qwfbZm z<}F+QswK3o(G4iWxv_gKVxOI{f^d&K5MMy_jceJ=7TAkxvEgm5S}~ne34?99j6G+Q zqVxgnecf4MpRYI@wW;#ryPO)()+|OPt#SF=z!A@j+1s$*aXptZ$jVuKJ2qUVgnqd{ zPmB{nFh~0B$pNA-d_pU1A-(|3$C%w5Nmxm{I23r{w#PY$w#P5c-3)5q0D30>NrV9a z8EV`Vlu1nb=3G|)AX!?hWGa8oj*8&;ZU zkzy)8a}?fq8$eVR46;*+|9Cm7vcleFQX=i8LSZF%V0Q@PB7F>m&QehQ9ZskGJJw#7 zAg=hy3xi5+TT-Y3HXzOZJp%{Imx?p!5PJk4Z|u>H%(0?*2^@+O0KN<3pKjA0R$`Jg zkmbgX06;oB#igF$HYG5~CnwGrm9MaKK<{#Bfz$qy@LgRQsL%mw(^lA`w!L5~lMIG? zh(rXMH&4q(?psV)G$5%8;&@kFDvaYr8r8K@zy-?aLE<-KDBN>0?r zrlq2V@41D-t4|zCCIfd#zn0KILr32#&y<6G!)m`-DikVxKh+>28m^X~9}ZZZ z;sFTSX}aMNeu3~ydu1dwQ5#T?rYt*0w$+bHM{dXWDS{Kp*>$d(I28!OO0< zRH>Q`IrgPG&6iamPF&C8Z0Fu=u+7sVdhb@Hcv{0}%aW2Gd}T5m!)_U`#&Le?iGPy@ZxN~h$#ZZOU7)Jc1BsqX z>?*8alNy|HSO|UQao&J}DWYGF#l=Ysw|!3~PAk?Su=`wA!yG08Obox0Ui!T;@%G@~ zxSzs5CF*Si6o5?|bT#K2l|w0#5j~oOP8(3>rWiwasb^l;?54`oEOWrHRXAEM4sx+P%os?axghkBB=#dbM#qk9u#V3IDYPto@GNcx zsFcWmVs!zs+?wUmvMLMBos57sRjzT!LSi4k155c?V#P|jm{@O#`duiH0G)=vRwPt5 z%U@37A^ck2Rnks4Cicb1yp(o=TDgWD4K(;P-Cu;Oi8-Gtl7z=FVB4+J3-WxVGYovBg$x1&3 zsne?~u&nl42ZCHOT?p`gOsX32Ed0h4e$zS&@GTxK*Rs{iN#0rHT~O1jWa4tTv?_r9;kWV8Lqy&+EPP0~qYTF2g@U{|F z=wBHB{Y7jBQ<7nah}qSpyK(t_P2S}6tJ8KndKb}Ss?3zxD@I<+Uz4Iakb}smZB;R% zb4U%7!UmJfc-%vN?=prW*eD;e1$$osUT!&Zf<-U{73;i> zk^VTZJ0qMFU!5XBC^wZJe6s-sYNLgoO*VH=KH!SwwhW_+CE?jz@OpHFhlll03+ny3ltSM>WJ2*>X zXjgCis@o&J-+J)R`ko=amh~Oncl5e;E=M;0*bO&MjI1@Xp8jTwzvg&ol&K9Px9-P( zTBbVLctK)tGoc$<*@@ep&F;avPT=Mg6d^Su$WndeqW z)=``oyp&P;$cTryY-AAW=D>$UguN?OE)DF~R=Rx7w=v>}Db%&fi7X9|NNb+!(m@*G zeXWnBp}c&lLo9(1CatD>)yuL>ASZV{#^_8hr~Z}Em2=QhbJb6mlSwtURrWT`$_MO2 z(T+9rf>S-X`l4b&tgvIJ!JBtw6$#Os-@^tS!1hik;BZ4%iLn z7i&le9HtyQQIn(8jmWwO2}j+jrL%r}l0-6x*lN)8N<#J_0k*8ZN`~hSzs;Nawrkx~ zX&h1Tu+ED|ASA>K51D$w-*)4#bhht#e{O#+NKDdPl1p~e)3Nfd)#tZQ=k}T+iZ&}6 zJPrzc82PK$o1FdXW}g%DlUw|76&uO9OL{;pV!v^FdPMaq6wU#Wj(X%KH%No@NVpkw zIluu&k1#c6v$ z9!@jxMn1;JPCE12S$VaI8B4Y8S}QaAUaP zb3#H(ofD$NNa01MgeNHZ=7SGFK1$o8+*;v%kW`4gBXfVmA<u@~1 zKgSISvz4Sz@=za-JN1c+Ec4vgku&seGZh|ZhRqwev|Jwgk9(anqI4R>?o?&FqZMsm zEXU^0qFK+pA^Zk_+pFFc2S#{e5dTc%8M6=JtH+`*_&;V(#HDbVrf;|Mc|>;%_PtDe z_HwtZ;r7*4eqkB(`{9HD8H8j?l4jDZp^f3ks{+E%ULMl7QE31qD#s-+q%Nt1+WtJ) zYmjd?V3B^>FJiGFTO7SA-@Zc>D0Gr0x#`1xV7xsad z6M)iq>#f?&yrJgEqpenhIe_$#Zt4eQKgPQU&De%)FhD2J^JxtWPzuQkCwS1N` zs?kE42NCyYaPNTTlp_KUcws@ShU!WX@D)I$=OrdOmb8k7gTAP_+Zb*0)Be;u=&p1y zW&w#7wcA!OmG?IIJ6VS|8W}OIXGtqL=60clSa%n?`q$DJARM}k2D*dqg#|r?etWE) zlR+zTzED7Z!$HFIR}v~5&vDZZL->^jHw>;1eZ0fh-Jlq1EfKc#(F2_oa_pqF3muj~ z_&%EloB)p|vb+Ck#I?wgi-3qakNe@%$u3jgV&k497GX1;Kr*bj_(w5&Dv1MvFc8CB zT@a!1m~5~G-XLi3I(h=In={P8)}+$waIJMwdfxkCX@t~VHGLcit^CU|pxlY2z!=1Y zl1t=*81}?dS>35}Bk0TY)JZZF62op1-(=8qZ`df9d+({daSU56g!v)x(>gZGcwW)Z z8egg}j@@@m6m?ta`qlH?uW;wFc|wc2=~N-0DhW`LSsNt{9)WKMBi4i*?&jSi&&orA zRdD5kES_D8Np%Z)2u5J>}^e-%QiJ~>NPc^ z{HBjfZBDP*EF9VXxKhGbX_Q5}X*T3R=e- z-_I(t5-nGn%A_7bxX*|xOyz*AJKtaw%Wq*0N;#s5YX{^CuSM@q*@0?_Tp42?r3J=pYZI&N_y@%`#4!IHtLF z^5TjI&7k6U`AevDv-I)5Lg1d}e)0n1`tjUti4{wq!WGUBRw!6wg_vXJ`hbM0C#2(W`73hpbQ)LP# zHr0F0zkcqB#*9Bb{w#ZVicojd^`{I^t|V9e^PyUfZCA5gCY+yMEW#dt8eoV>A}26L zAfXioh0e<;$N0r&SfAq`X40Tr0HGC`_W#b6aT_|tw1mQ}sbydcGu-T88Om==P^D;$ zf~zo4?7^Y!N3uC?Y`eF6puz$vT&I{yQOQ1v?>yWpM`>(uKPdr-<_x2F<)w`-RU(Ezs3fM(%%^$Ek zEV?`mk0-cg+N}MZj{@FOOLJBym5ORgr2skgT`?^L#_*Mbn;zVw!M}q@yLd?bsv~f z-j-uFmoc0b9dSO0r=7pYhMraF+@68ye9cP~P?W*8{yi+c5oM%9t*U2Ux4rowr2Uu9 z^4;NGr4jS%6>LCHklyFPH4ZnO!C(dZ0Kn+^7h_Qo&3p~22Qu+vRe90zv2wm&SmeZtp)DzaK3;u?5 zKeau_BP^VFOOox^G)CM|N`ENG=kdY$aR5j1v9|NJO#gk_VI&`_q=;`_V|js_+j#>+ zdBVBx#QS0z57W2W1+zo)Ak-RbRrSu!0SQAL+T3X-nX@535c{5zj6fg8+=_mF&vgrp z2gl9*I(dfa=8(@ySc-82?b=YkmtyN$xydqi;QEOmTI?0~I<~ZBhK*36c}kOWmDd}w zGc*f#qhMi6+i<3xcLDIoq#b)Qm<>)sxxGV(DR=G^iYx$3?LVZ zVBjl6pRGRkFyKXjjsk+mig|x4hNi8q_Wjk;zkiMtm38l4xw@pVg^2(~NO~^%X z4-t=y+k0jXl1Dz5m6Rq@+QXssT({~OK?x(1{^=%b=>;P@8yWLFkqzsf3IJ)>&j(s$ zEtLd8agAC>I=i!&1NAF0KK==RPhC3w-<7ZzS?ry8aIfi^uv!bo6LoMw66S8#tnv3t3vJ`nDm zxYIpACTU$xq7;sJ*DatuLf0fivWT|tMqc97JXch-V2GkMeV%T6}doyO-1N&6|L`IR{Oh7S#-&Z zCIZ^XW1hE9(P0DM%==ecc_0y&0f=Rw7b$h0m_=8*Ny#zGNPwukVt*Ekc9TGhpEJlf#Ir4Mz^W0ALY!b0xa}VZD24dEu&s-`-?G!tZV6QAq z{6$`m#G9?r)*ao?9+mi-a|T|Bsw|@ak}cA;YP>KbKGXt~2>ErSw;#>FE}dWF%-qkR zR+}buDqyF~$$#SuzLdqc{ON6z0c_@%EDaDC3;uEQe>kT{i&!m?Xdva|JL=X76&@3w zp(u{GalX{n^vg5Szi>}wH{(9HZf^Ti(YHZV+{F@qI~{u9Egr7RF|XWMKH1Z9*}M4ARPdQJ{dtJ7rX_9|YPt&FiV2-}ywTfeMsx3f3PU>;YL@5cjdiC3J%iP%58x zbr=UUFT_%L&7M6VWPg@C%<|9^zaj zEa)&%X@#w@?@hAzcSE|?#rMyHa)i3vknIautsKkqaFs@#!6_)WV&mgZb*KEEjjCVn z@-x})tjb;lh$*Ag&?mXh<%$A1ZvqbKH!8BlE)&5F=aw5SMw&x8)VX74k2GHZWgK(V z*AOqXgz(t)AJeag77n9@bB@e)Du33x1PG&kK7B3qZXTu3<+OQcl-bh9#g9EF-H()}@0<+Qfx|yxV#bSyQsH^L6+s6``>OtKmS>@GVDQAbr zku3j=ztTZY&eF*!chbZKFU`n@Mpnsza{{gpF1w;QJ41y9M;iPl$A8qrE50we{L$Q& z+j_E4TFu>@{7}CJzEg!*ZGVynuE_Yam7}w?t=x4@_|r(L))BDd8>8~a4~Kpns-+aI zj)Xr_jW38qE5n6rlBesS;vJMGPFHtI(ujDI2PjeQu?`qrl6QRrJZ{je-_khj)UBm4 zuM>klokPR0u`e&C8hhMU#{AhrGP7#k_DNxQKA>RJc(t!#KG?)7EufqgjDic5SSj zhkr1(A!k-QST_?26Wo`G^}D$`BnIgFY~Vrg*ThA|*+#Gom=Z)BsPqTRFl|I2_tkBx za*I|WV1*5%nFzi-UJ~4Ut19DL-66SAR)$0@55U9ufVYNfhYZB@0pRVvsh z*hfD}NlGqXt6tp5N$eHeROOZ@sc|*4#Q8Sy4rUB?@o4uZgI0r>x)izO4fk3zrg8!o zTC23ciTJvw0%biJ$7-vcWVlf0p3BFOe#23Fq2Sc!OCOc-FpxdYShs;LNmZ~J@6Q%Y z?VmqmLjYIWte)q;vIe~U1)TpbuGlg z`6FSMZ&~B4gu;lW;_T>7gO)lQGS@*P-$BLY(9=bev?;AaA~$+Unfj@AuBwQf75Tog zo$Wp7w*I7{OV>ediR4<25n8{GZamx$ zcx$z!D-;t@6({>Wihu$bdNk4htFzz zObiN+3@OEi-G}ImAEJ^eyz8;Pd8-BnI+x!mdTLCiH|Fg*umVKJtt}RSarCnfj?>B! z0)+cP6Il2ot=~DiE)lX%Rp0!a3Enm6SXVT9=qs;Y-`l>}e^osn_nPbBP?uwN;8WxE zd_ln9xb*8`Cn`_a!+BtdOF)BH8XK<&F$5p*q;5oZ^_~qSBd6%(?zE>WfgdxMTA9Jz0 z{YlTIZZiB#NOBJ3;~9jEMNF)l3!zij61)VG+e+{ilNrfsrt=zX^W$ZS!`?*-#Hx(J z&fo;%fpPh&fX3M_&f#w)tOK0jIU2o@DfYlsPBRuN{?Wkq@gM7@Iknu*gPMe?z@@oQ z?dpw6y9w-;FZ;geyqq*%B|9jz4uFFD@=ZA~>aiwKhl zUbr5i&Q?wuwcK?<-S+4N0%a2ZJrg@&5uZQWso9hYmn#Ct?2?(Q>YjRD5BVC$E7ke`zZ}}~q;Ure6 zZUuYObX6?XTuhd^(;oVlZqpFw5MFj3D3CgD90k0%io!5h`<|}2A__Wxy5^;NfIqeJmS)U(vb_DUqak7{~Tls71&3au!5NADnV^^FA57E$;o%Q#qqgn ziB#W?v#UBbcFrHn*AU=b=tBpYrR%zHUaHg$!i`mN<@q|ecu0dy`SE1x$c}hXWhBab$;t)Yfs}zE67xC&WC&s z8D83&n@(FfS(!l7pc=kpRR%jH1D%PQt08P!^KffMwauluUM+Y zSBV}W4kA4c61`@u(jwaPg^`5&et`a7_&>q_n8t~9FJ4Cm%i|4>l zvUwn}+UyW*)mfFxPui7jRqPoyB!Aa`6-bmQ(nnP&suwYmb+UWD`4S$!Y4~yHoP8R@ z_}BLZ>m$EJZ;PuBWZR`O(cn`XEMP;RlTuuxsh`r*<|crs+N zj={m!0p*6d4qfKoCVR})@R&ZM2W~b6`d+2NJfonQ;vD(3sE&(KZZ(B(P^v84iOE69ROX(I@f`5(7oM5{n zxs;(bXxZu-iQM@oa&#>|s62|I5`HdvZ9fn+9aiefhzV$0z3Pp5_N%62lM#`yJViB# zrsc$J>NXSfvK;Do>Q9oQZt$`D8Vt zr^<#m^%6V_M4z%upH8KZhSn!vM(G|ytsXYROT*!{@}8LDwv17&=eC*-jaLA0@xUrR zlNqCO8|{T1MOSH3qYh}5h&%4t1FCw$IAj-=u=o+!chKPu`n}acwsHtw`R_C^iQa8R zZ7`t6aX3qOsi4ptQiv0Cpwxe`fDUjbi##yeNXy1}F^}IL<*bk2(e2npmHR)5Ji4eg z#}y3VvksW1AmSc!nieKyo_A1jd5Ly-1!4ukiS6OrI)``ZqS#HM3(-aezT-0IHdM#P z@IJwrI4F7`uIYe2Pgb9ye5?isMR-_e{(691j7`rA^3LbTK!eqG-D9um3;{zmJvfkw zc*Qq9@B@m=wCY#fdW4m`9G4OVHu+bbo=#E7KS}FSbHVVFrBi`(L`+C3bi{C{Yb_$l zi{@~}|L=HL-wOWBvLYy8M(EIz%(uRn{h~6tb*OIstO-vDV}q=?$^G;_+H@Ave~3gI z;-cG<7}-sWe<4Hw?;#WBggMte?CJe&1Y3Ifo2QbaM_GTHrZydRp;n{u3i{S?9+N+! z<|fK_>=FtzDdbnX*A^M-=vQ?E6;}%6BYS#$q#zK2w?oQ2U0u7iBu7DWNX18gf8x=G zf=44rj_Nwc35?&$wAlZK--fx>%dCgR?#nKESKzkh*X;38Ve$uT-b5? z7e`<7g#+BYj+$1rX8vs+!@9kphw9Zocrcn)JjF?dCd)mHQt;^Q^Fiwlt$-U3fBe@IS ztH`#WO^#yGi}*iR04$9{ zZ)bUK02K6x8Q7G6U$xFA4;>m1_0= z=0rACX%zI)-HoH~1=nQ=L*8GIJ3;?6+iFgLE({ATngP9faj8395AvG$pGb+o62MVi z@$A*0HLp>f(zSB-_9o$ux1lZY6wCS!^5R9Mu8swTrY(hF>5_vz+2v>99+`mz_61sy216m<_yuH-IQi z%EZ=cbHyyRC2Lmk#bOIZzzWxsez;VRuK2HzEWyRQk&ADAZ`Y^bFCrl~6V)s}%`RU@ z)f{+!=H|EAD;av9AzpmwiEYjch$)J^n||e?J36h^H*dL(fq)+ZG-Cq?w+oC1EMRsb-H+K&0IR_v=PBVx?8<2mi7J;IcD zdwrW9*j}ox?COx}rp#;G-n3F2=i&Fg-M;zt>c!*xUb@PD-c11;@?6&Q&Ym#;yShLE|c z38j^sV6KKj4VVk{XsKbxE7j+Ab${OYv>C|PsA|-Kj-uSz>@b-dGfX}iIr$ZDa+poT zPdke(nR#YyMId4Dj7IzhkC)k_Ub8xSMkRUC+yhALD9%hc+HL~1XorGC6Zvl%pH0Z5 zd8X@dMr)3n41^roaMu>SKclXka{VD|R>&i!SQF*&FqFW9Z}2!gnJ(iYZGqsa1)-_WcC8VKw7SHSIh0NC!MG z*#Lc{vF~!tILkE`8f;ysef!R!0NT~E>7G^Ce%N}{QHB~dkG_igz?%wWw_(HUzP~b)T9Hq2LfZ^|AK(Lx^Ly1ADN|N{8k- zw^z#5U84a-)lE|+z-f{8_y3nN(;Wn~8W;NNj!dgEn1v@tR&6>AP40rn7-viITaR58 z@VjPF*YUPlEj%Zy;t?w}y=W`dau?sDzcI2cTULh^=92qE=tCEnpW2?rLP_+SUJU2J zDl750UTtti4;%F-=V(*S@^)U{<_QZ{{~w05%E{=S>^XAQ@YZFrb%Y+d?qZ^=w;$I` zKFPhkyQNT?5v^rpC2w1KO!Xpd&e>BsUOLL6(|kNQsfTIDzrN>Qwk^^vFMxF=`;f$= zEE8Xlk6pdW&qW_L^|896U&DDppc`M$Hx(ZbGKE<;BuW@9C@+i zwV$||@wb#+FHOnM;)>#>6$tb_w8(>e%8Tz7A*SI&(LiXZlBlM8;iEeqe{lov4*t8D ztNX}-G!u@}f|XkgqBnmydnz>KxplfW|05zJJwrkV%JmyrN15WydqYy~&69DJ$|6sx zIy3f}5Oy~^wGqy)Ht;>wsw(dnI4X$UyU75$_-*-p3lxDID z(>G6OsZH~o zBe5{O-B#O{vsw0(g`t}NQHB+)79h5$&&(YnRP8-WI1;7+i+P#ZQr-*Q3GfYD zTs`S%`6gQ=qhFu#<+w==Be_Y`O>KHISXF-Z^oWrXUC%3)-<=YUWvEqi9q7srp$HXR zc13lLW1WG~oq(fyD$>omjLzZpysAI(1+2+^uOjkMy8XYk_ck%6rMAvq@4OZHPB&#J z7`j<}O5V-j`4x4?O7L0&o3_D))BR^9mzZIEw~{KcPp&_{%X-JhH#11w6GhXBBG?=@ zu&Kv}|2QdVUj75}wo_G}T@||<)MZ;zV1hljCb<_@y*AJtS?l&R5LUy;ZKIEz-UWIc z@T~G3WcKl$Vdn>JAJ~RI=jDtAkiF&6hHQ&$0J*@`7-=ozLsS!ZMXlhF9N@V<#>gB=AH(&uU{@9 zf9LDgg(3iESOX&^Wect<%kY|lO7JXl88)yNobxNK#Bn6P;^@Ou9w@@l0s85iN=)g| z_$n@-L_C#<-P*%&j;JmxbWs=Yo^E)s|3Dd=Y5XabMO?GDP{7Ng$FGD{PLcnx@sPaZ zB;9P>R9|y<0)O#|u<{nlEBFn5UUG9N&YIZ4Gbj#at`z)wbwR1StMW~gNw zzXl}tMlB-%H7A4E=76ZnGj%PnA@zsJ6$s!cIg?v98_z<7C6CqxHH?ZO=!ap3=5fG2 zM5SRezP!qEB4V>NlOfB^xLb`&dN^)omQl@yK!bNYn%qbsx~;(M9F^(%r0KA!09!Gw zs`^$*N8}Vu*y4}@0lKj$pVkHV^FON?a_6}cdtr**YsK(^NB!l>bmS#v z!I2M?taurse&U>W%eSQ`or1V<7qX{NOMiEz8;KS)8Dd^R&{hmbBP!jR!A8gy%ZPYK z+!_U~dz9=CKD)Iqioq6=%TI*GF{ZT@i-o0fk*;P@rS3|vizz_pMe(B4PR$iuY(3XU z&OBMphhsGFY%cI_%6aiEv0_PlJ9_Oy&Mxh%-2WMSmdDOkwstHhyb zTXsg$+oEI$SP*E7@-BZA>7A$l{wZA$Qe`&Ud~$Du~v1`rp5HiHZ~Pu9=SUaL>CH0CF2e4w_j~UbbG4Q z_UlGr)|P4ek&}B8Jx0fPT{0|*@1KJ$Rq{9+wGQZbh%dJ|#fj&Jd@9 zvg!6y=01VGcii=14r2!qOWGGq9WntU8p^H67C4$TSh370JfOp8>Og3%zdu~uGCcED zEAd;^i18Q<(l}?SEs*5xjFd?A&c#}cgWq$>qJsf*!l|wVG?y+X@sN6eT~X!`M_~30 zj7Wt8I>B3eH9%jZCBv1P)Wx^t>Lemvcb#L8*9$6`+r6(E(}VS-D@47GSS;zR3b;~= z2z|b~H^QAOeyNyti;Q*(F=~?Cm9Q#LA&lqhy>*mv+59Mbt=84xX)4;@STI_vqn_7o zL~1OA?dSQbZ~i?(4W)2q{=Jq?6aP}tOG7RXr97b=ghzCHwys{+*%ep7eR!vj@q3OTN($YdLL%Qup z7t)%S!`xys)uet*mjFfOqA)?PN{612RsmKKc?6?|r1osps z*X{zdp?&dF)}TRPR^uAt6VK4@qKkrj7RN&Jbc?(NuB3i>LKBog*72GRxbd0jaCIx$ zDkoc@{f3j9SVBJO!K31Ls#XjUba@%EqV+SAY2KsUR97y7bDj*EaLa`-s#ecUG z*f%PK2ZUhUWXnR%$LI7^D_INNZD1^U`9Lq+FQAMlY5BWsOV#}?xK5)%ZyeoC@y%Y^ zjT!TH%-N_PT9W-BN4R4eK}~^JiY?zkK~YvMorhR8%vE$CuEc0L{CR};?_UPBREuv%6TnRI&B{?6LScfrYksn^j~j$RjIuTWzZH^4S9ScRJJb)9bCIUX6~rx9iw?B;+fNoNnCn2l4<>>EOYv z60p8bT%|?=SIi7p=Jt$SolRP!8_Ba)U_5*@m;N&1+0ljWgFcae37F~?l)g0kh#?_| z3w-H{rZZSc<2u`efAqv~qqN||oPP;F$;$BZ0%Fe)tL?tRHk%MNZ7+ufmuwX{1nG8B zph=w14p+Y0S>^M?aMKwdu+-JAzLrCY%MoB|cZCwB)E9)XALs)Hn+<_V23*jj;Pqxb zdn!_ea7%wEYbui30=qQ~CW)>=jtiD_ z!UtIueEUj#-X@%Xfd9H|7?{29Ot5zWufrO}X8BefB^tGV88)OksfMhFp=qL;u9Pl! zloibo=M`Y0&mWuR^K1a+J{cO!NstX_>*z|4xTYf+^D0>Gqn+dyyG?tqMwWP0=K}Zb zEY@nv=qI9uZP9_LV&2S+G=@;3ng`Ci;Ut*+;ll!7*TO_WTZ6pIg&bWh5%YyV;q!MR zjHyIVVSJqD;#UzL4nxdy&%e|+uPdICz1;UVd1!gohT%LSitUO*uS6PvkhNWz%yt-ga%5boizlr?^= z`7XjE$Oz^BdqAKz=M?6*VPM$|IjfYo?!qfx9!(F0;>%+^rBzs6a1L!{KjM$Tw7{pV zE<`pSs?v2lRWAtHJEGd8?84Z~Lo=yw{|pP%-S;F22A9t^C4bo7J{w`bFG(AYo(`Jk zsv6e(;8#D>LDC+2rD4$8S?qJq37SM0FQn`^j)Qf68W)wkJmgI-|3v=LdIup-VA&|dwA`Eiy+32S*tk_dI9}|~ zC$D6KFpqLO5ipeL#$1a^a;O)CI(2nhcu3&-YT7=4@Nq81l(qwP#2Dq=aL^>38tTi~ zdEZf<84S>V$i;U?>^+4N)Sz3jqm4u7S@jVL?1)FVwA|eu)LY2zwW-N>88g$ROi2Rc&vFJTg z|FS;d$@Cr5>m8FNm*2e#mV#4&&T+9&KPHR!(CsCGndvs;WU3PP5Z@`W*d%o zvBFJJhTr}SIpLuqV7!6&{+P&|K)@WkIlW^9T^fv@h)`m1b8a89 zqufYV)H6Z{qsYSJHLPJT|%-pMS(Bbl?JzR$Kft6)g9`T801psf)uHV1+aUUk{lJaF@6zqGiV`-8l(>zTSdt?rYXjM>4) zll>iq@_+1J#U^U78WV1BW(JdV!l1hif21}J81#0~S7aadO>>h^HiYmtff_)qN_w>U z(bxmXQ0=9Te7Ws@i3`?x?pd>0#FLhvK!3MC-EyK|qC4hq>yP2zSm?M~b|e*0Oi%Ux z47@7BmDhDDFzso?U{>{l^@VN`6lw(cGrBy52d=*OLq`HrG%x!FAUK$LbMXb>dd%I2 zSRD%bf>I|-VF`cIOR4VP_aC-PDxla{G_M*XHnW7+0QNC(@=6cid{$$O0~!F1i_`C| z*LIkm%()q2C{nE*K#2DIvvSq^VZlEs%9f6KisA;y#Nbk`{;KpV+<+YuLl=R#45rt^ zGOI4ioDCezH+}_ice4waTtaydF39qIK6uBiJQzKNRO-2)HdsR3NE62SWWIay^AxUR z$$73lptB(?icOFJxjcxzIF^EvmJs3PAMK`H-zWu;#11r+Qp%e&XOLuWBq2U3mz?X3fNnwa(NkKoKLI6v;h1{c_J%2yP zi25aXz3XOV&TD?1Mbt^B`kwi1tO4aIQI!5JoJ`62*I*`O3cP)&$4}^P*=Vrl4G_^=&u35!sXPvg%F6=Tt*V=X#H$^I{cU+ZZaeiR+C^g>7GQRj4ae71+gJ65HKB5&&-55{@&S#4sBE=vc@By`3x zIiof&oEaei0JoEKKTyx~eGA;kQu66t_;zmHFTye@VkzOZxo^p`HTl}cgppkF+T9F4 z%imTf5=UWUk5-%V*?Oi+kpjNYvP6oHRE+-;uQn>#D5p2QPSi_0NATGE~&|!XTIwy!hj21-&ew@0nv$tH3VBte28M zIovWgRN?Jk8`5qtN3sfKvXm}i-$gEUBIHP)pCM+nYbrp--||vg z5#X>3kBr4t3%N2iHXoD~5pYonkz^=K+k)2}{AOmw{L2KhnAa8a{s|K8{nd*!L^!p~n{quIaz2N{8=7N==qmJLRiJzTpeIa4`(;x-g#4W)UY5fw4jOZG#J*mt!(5gY{ z@Qu)|_BTT^Vl>X7Dgn*fMKk83P}M}%f!_xvH=-1&2}A>-CgQr=B|9Nv+;q2r{JG=$ zdi6ObOp6xsa)3Td-DaRHR3KW$Xen$(4^B}WBDHb~cc`u;>V%C3vRJQP_Rx{xgnRCF zpJ86g3*3IH#$~vJ?3>n?8%mjuuQz6j{=j&MQrKlkd97RBDez z&eyW;0t7=2TbGjRr3py>fO^lhbJc8Gjo|N&w*+?3RJjb}%_M?EcKsTdlQ+BSjlk+& zBlR=h4Y*(tk(OY|{>-u^O=a<28RZepp`GbmFJjpTpTW7hy8l81P&uc@=R+#_l1n7T=Zd*u++;m;Xj*J^<9SU1fS%^l zR*MK9PD{UIJ^l5^Z{pm$9ubk4e1VbCJBw%8reI%JhJ26UDEU?Q`R;gB65O@~!$oPZRhS@9tP`M2 zcNLq+MBTnj^6hKn7VQD~N+&+e(`Wp5ZvGBI0a@Rhq@h%-iXvpM&m_!A^%|NkNSB8` zNf~8?7KUGNXtCzMYmanxI2h@0tPW)w8E*-gtx3EP1RfDo_3 z!F=8f_#x8qSSQfZ9UtkI77{Q=Th&i;SPj+L^_y$!Mn9Zf5psUs|nswx7ZZM z&RGk}P#iNX^4jh$_ik&}rfX@&jF+fx^VdE0!!}2UA5O09c}~^;9Ne7vjoS;(wwUGc z({l}`Ci_%w$x$CFL!~rJ)PU9Z~e=+=5tmj5;CPI?nfd1ytcGf(8=VV_#J7aSW zgvp^z>4Zs!Vv*B+f~S#myDn6C;(kGR-eS8eN5P^o=D|;Md6oGkO}F;eTRSkK~+;YgQ%i4adax%*4uS z)LJ0xK&hQ?ykZJRH;;ZC>qQZ~VjVI@ogd-HwG`hmPX3tfoV;Dq!LX0Ta))`B7D%ck zl=4fS<_Q`d$QXyml+@P_%>2<0Dey--dE6QL4jlecNS2tX6Maf|e4$xKti=0> zXD(w;r+V_V!maclii-U`BCAq8SbbtbAd$yW(a!0T<}B5(oF?hQ_)CGbDZOfQzG3Qa z97W*VfYP>mo?1vvDUh)p2nT)^MD__1@RL|cV6)&CRW7sPGyZ3MPzCTYG zx}}5bag0Ke0oR@vgVUHpj7s?L8Gnj6a24$PVJ8wYqvd`u;LiW*Z;=_nm7q!?B4kEh z%1mU*cx~)ywlZr|?tM({U^6Ev6`}hh{=Z_8jFI;%ii~=#s>J%eV5iEYQ}V~xma&;9 z*_ARWCKGoc_@|?h0aG|H@PBOqu*N(_2wjcom0ve|8+3iu0dMzGhVh=p_J;#6MncOt ziAQ&zi#ej>Qk<%TS~P~I|DZ2wm2v&;210Mh?a|#b8_!HJ z?Gozf!s(Cu$lY)0-*4ULK;e<(D@LhZ(u3Vg{*v{+u>WS@)8u`RHYl}1=!6BpUTX80 zL0U5H+%%r7^MCIV^$lr0!*8Lk*!;DNRf(pmTxL_LnK}MnA6*2c9zTfw#ckPn2dAsp zB@>ZQAQMUFH_88@_6gsQgti~Z`0rfGrT7@-uTIw({x=PGYXBLUJ!4Efmop_Sb)k1W zk`~m*;T8#=E~5oPSLqV37&b~pp!x{I{wVanYDCW3Tz4tDBlYfT$$+F2t9TKcRDy2S zMO)(Nl24M9MHc_fmZN_8%1(iL=G48^CX;Ve9PJ|#93sNhOHtg8#r_-VoCcCa{jak& z5_Sm!Qu&3R;w7XLjaR%5inpCSYHPWtPV>l!*>tkj@;g*+aU$#!s|MwWmHc<=1aZ{k zrZ7KC|IvfL6C0aym{>o`m>SrIud3gWaxn*fwe#0Z?{{RPU?$Q7N literal 0 HcmV?d00001 diff --git a/devices/surface-hub/images/sh-55-rear.png b/devices/surface-hub/images/sh-55-rear.png new file mode 100644 index 0000000000000000000000000000000000000000..840b941e03c64b39309eebb4ebbcb36c05df14b0 GIT binary patch literal 20653 zcmd?Rc{r49_&;o4%2G)sB&Afymh7gIN{ULx*r$+nNQ`}rc%qQ96(%Ly7{)fTi%7kEbDrntyzY5=OaChG zuEV>Sn3#BVuU)>w#KZytKF7E?fGhh4F@C@wX7@W+FEQogM5cf*Y<3rKUSwh_jM=?$ zj~)2V{qUNJI};OM!`6ox>zZxD#B}SD?&XVjy)7yIyyyU$#US-u*!K%BW3%oEUFYV% zQw}+N6M6S?9{dZ_si4K4n$vkr28`-! zRUt6zIhEXii>M_yIDVU!yOIl6i*8)?Lj-88_~T`r=Bk&qoG7I$mUG>$Udw&t;j$yk z>xjXLTA~)Y>ROzH?*I6&gDd8UrtjD&HYVudqCRkwpU6T)nrhYrNa@C9L^uvlpD@s* zb|rqViU0kqM}JxnW6i*CY4Tgyz}EE+?X?qLx@y&f#A$6*V6Gr2ctV<}&3jWFV?T$j za7(a__Z@jEndY<5EV((-ey*ixmLL)!4%6>nq3VFXsMVCk=RXDI5!yM=!`t?v z`En4#hwMy@tvIBe#v03Of2;-N*2Dy4fP(y_WS;S-1XFY0crA`P3YG5H*K&yec+*?` z6zV3+mpl5sD{kyjfpn_!T*;xhSu^EONjE;`D5Pgx2K5W9_Crd=9PKjl1kF^5E!r@U zD@&`{H*3I3w_{D{Sh%RS5UHxLmDLl zq9yV{!lWD>%jNC}p>Y?)RMz<&uA6kniTT#ncAVLfX{81&pka;m!8h(h9l*uCW! z@xSKU&!a!hi{f(4b86=A5B^}J02l{O92zi*$xL9BDnL_1v>wLh1166z9kEGyr;;A` zeQQxGnDvl0TWh9W_pT@0xn;jj&`rOvysyBT>Wiv8ij!&lTh<9^Y9uq6=MXw0-g|v2 z%PIia0?&6=N5VpV$2@f_Jbx`rh#eweSujQn#LzBt{ZK0ZYw1=`c>U*+mOP{`U}MBK zKat8h`VOJb_Hdfc*AyRg&Li%NAP9Fxy)|t_;4>;j(1RMK=c9+j6r!zFR#etgH#lkdl6SIeP2eT|%^Au^ zggsRT#V7{1uFRFKFQORn;7voRz6`PVpbcX)I*R1B2}f=Yd8*KbM>~Rw2J#Rq{5gFG zi(Q>3$Y#`h#xCM!0L>TosGhxn`{Io^xq&{=@2`~3Gd-&3mvK!sZVRY^5buta`wGRQ z6*I#V5V@-cj8}9im>XYFKf#DI4{uMELTS;)``1QTzedy{ikdlw0Wtlh=UdUSPxSVm_ z{WoN-Ylnvtzkm2PX*fPpJU&_Qk=JxHb_wWj&ZUu$@$HS*1Ty^P_p-E5V2{Q!>m8=- zV+F6*f1D0(JUH2Nah8@=d|2OG394)SCHTbi2X$)hR$Y;UpJ`WJ22y2rcD}6 zS?`gd!ZvWkT~UNuFtHLvf!jw}6VAP6CbJwu&jRMi4q)Lo9>~GEU^q7Tgv^e_3MP&` z^@%;`f%ZtskdL@_km-eP$(SR<@ac#N%l)jx-K!=qK!~Dg_xn22_z?M>$L(-0;Wz3= zIL`#V3#NP-ynN2aLRo9Ve>~-Qmm|oXmB<^!m$#ewH9k3rwx(J~3;3kAh!3f8v`NE=W!WQj1^OZD;5VCS+5r#<5QyJUz0U7 z{5bMZAkMSH6D83v@rm8*K8qE*LF(h{W%X-i$Xc}nFrwBLv^uH`!}DJ{;$D`{HpH4A z!NHid4vtR%rgH3~zW;##tVcGtnFrdPemc9@uFiMZj>%YVK{3Rb!N|=wWKk+uTiL{s zjI}mlI)kyXN^m#EZSBq@cS@3x#rv6^qN%MWK@Xtc`AZMm)Kw@NS2{1&1jo}yBBT(y zYGzFoQ~g9K1T3&l0y5uQ5XVe@;{F)H>hUpU_xB^_6xBkODdE+swT-p4O(j&CLt{{W z8Nr~ePZ?iGO&}e9y&U`QCPsaZ8{(d4hg%16G*uT7jp9y-jDDbn5%!}PB*(p@9MHIPHRa#fF2-3!Wb66MFMLtL5r8wxZ{6* zdt3(r9pC7c(IP%`OAFKUw>C5$Y(=849W7fVKuJzXHCA`sIf1C5|fo7tt43ypr zc3u>#^-+GzOva^1I`v10uU))8&o51DK8RQo%gZ;&H=plaG+9hu92h)iE{o&NH=Vye zHo;Qs^MU+%qD2*fVC9CSa8@2d>(B9*tdmhykKtje2E+hnsoK+@L1!YROsa@4Z+AZt z%U-)F&k!A7MC@4Pn*#P9gMpfo+h(c#c0@5Bp*q1d>UB?xl{h837b`rz! z0#by~(Ip;rETC)LrmbYuC-_jVj@F`)BD6Z#{g{>ZhG4kFZzymQ;>bG=z`!pkXpw`8HvfhK({N_;H6V<-2z&rg zQQ(1G1t4WN@Odw^-AmjrkZKDqAV%a~K|N7v?NK$Av^X@7;HF2j2g3Ld?g_Bmf((0P>oR%tdENYGo&98W0 z_+R&rxH{{6JZ7UKhK`l3Ronzdr2fZfGyE~s_LlOa_w-9Kj%+wBQS1HEjJ;ujJ9rTZrl#yBpT! zsT*ZQH`=tZCGK1M4hZeHTzLaCa^$?&C;LggS;4{g?=V6noX(#pfWi;?g3=lnjhi#9 zri}M{()!9Fe+0WRM-6?}Ai2zqwNPj?P80Y49+MC{ob`a!U3?E{zt@y?F?@xdAP$qWiq~^- zm`Da2r3rr`*U-}Bem|Zn&a(IEb5SxY_-x4DTrRU#ENgXm>}-IXss+s;&V?)U#W=(|wEU`s%S8RA!`ccjLzXInY#% zB*>iR+va4sSXfpyCL?w~saq1^zaUGTnhV;bS@~6}v}_J5P-w1KYya~3y83CFl$zT! zUcpbw^%-8=4%Yi`ZW2klGoy)~ow)qhu9f}Y4+3enq1BzNYFhss<10y5*0I4gzY|y3 zcRr9n8851~GRvx-(41R)ymgDVAqwwHCLZi}IXm%fE~j%lA+HqO9Kp!W<#y^r@Fj<- zb3e-`(r5%_^^TGi(A~^{70Tqn>Xqs_`iug@ob2bSyrMJbH%JSFr4n&vt`(`DwHV`S z6cHqBZnu|2UoB19v$J-_b02Mi=+f6~L`syc?Kfxi2L+@Of&b$u5{&*$h8pFr4nhHg zcO=ou%igpUZUzVqmLy)4Ef?MFAgw3|5NjCIN!P8CR$!%wo??DPGsfbb7IZAoninEe zMmAe4DU^bac@9tdC9+mMK7qPG3z-&_b`U9mrWR^JLy&jMb*_yafbv>Yrw8jK-7mlE z!hfXY&r&sovm7wa-IsgHWq5u)Rtj<>>v^C>#6Q-*Fg=(+qKfAA97NZ7m2$aY{}}D_ ztKq|Z7D39-=l!4LY}(eCo4d+>ksED{loTCGn+Wv;er`@Q$ltdO?%(2<{H+ViJ#)OY1R*uO4!VpOPbpaao)3geEH}ipC&kDKA`S? zXi>d$T|S%w04$I-Z$;OKBUHx%)HB$k|IV9qfN&e#tFeEEX23t zc&C&td?Wr&iIB^nnODsf zI9lxglP{=fr)TFHqwC}r-35`gBk{7IBya8Q;j*Geb~kSA@;b4Uz>U@UGJstwNo96Q z@r`o5CWgL+2x}i?j8;Oz&Sbg~qE=*~w$JkLK1`z~*;ad-Wu%TZ6P`;n+M4FNDtnd| zf+mU7RT{NDbHmKMmid$=~!BFhFvv$iijAJ)gNO z%duZdDl}T2uPtxXcrI^EWjp%PE`H>jrn8d@&z^>D;1l+Up5=gY;Ripf!q_F3Cc#uA(dOMU<|;YpOInH1?%g*bSSB z@W>~1KX1uRW7$Jcwd_x|NkGgep$oWt(<298S$>f>m+zyFEiiT+Xkbgf$SVMjY?%dDp{X2{irqISRb;$HbS(vM2YZO&ceMvk=7>8-kVo5myeLW+7Iag(U*X z=`Y|f1uh*JY`$L;W&2zGeXg^?jn;>~H|ra&Ow{jMRp=4X-5%_=t0>iQ;ZK{P8T(9v ztNqWj|1tZbj~$JI1-%89M&|l&*3TsT9y7UB!fo&49{ET&ws%z%=dJdc%ql`6DjcO88_``9gl>t{*mn4aa@rGtwScMGLg#6#y> z6~}B9|MZ?CDHxzpvA8b@`Yj5_nqSzxN=^~y2!$0mdHCc-%MD)kk zyFBc9hZEN4AVTQn7G1cKWZXH<9UTie zSzM4C$TIOPz^;FRn`zTK=BO#dO^YLc2Bm=E$SWUPhVt4N{y}FM>leX|UiquM4Zd)v zGk*dGTWL>rr?da~{_i|v^ldPl+oAQ(y8Ulc1i)neZ)YX{n=S!Pq^3*|!A%8Unar)u z6+|da94TRaXvWf`yBCAj+#N2=`+Ri9~J(jr#qYvunwCyEFuyb_tAoq580<%?RtD=Jh)i6P3;1|jB(+iGAC7wvsxtc#t}vR2-6@Y6u^m&rwoaFQGJ16 zMrulegYoCRq*q(lX4YC)=<3k&as~=5>b|62VuByj+YJGIi-ZNv{gb?C4xFzRv0UTi z4EK`BYKg}ukQ%7&`M;#6{(dC4NW~;F-9NnfOe-K6qh_C>O5<72XzD#B2C|hh_0KK?b3P zM1VvHAk_foYLA*R5s^FC(hJZu2NCYL=l&~^X4;JLNnbbpAL@|rM_N@!RNbmOlz-Z; zY=|6%Y#uBtAWgfLtQ%Ci846mBWQJ#IX4t=^;QUyKBIM-aKnLh|ufJKVsmsOu+DT1z zpCTH!*@!|0wAyk_heOR!%TLQm%Ux^JXnlwiwEDRc@LbA+H5Tu~&fp?~$_Q4j)SIYP zpSR>!d)n~K;Q&_#LowRG8xc-sbZ05t%X9~R)S!>qHe=T8Iib13m|1Da&32bpfm{zDO`3xcu*ha-bx+*2d$@UrED8)zIpM9jW%MRS$# zQ%UTllQAs<_<%C+!HpAtt&Dr9= z>5kki280fMAUFCj3P~d-SCO;V0OMAX{P=pU7PB4?P7!8^d~`8y9(QLnlDg$LIr2|H z3+GJ40)~uKyMvAR*G*Z#8idF}aJ%nDGpQROUHTjF{DUBJhZJ4 zrz3=(P0_2nKUi+`mMVAmoQ!$(s^**zexkp|LLK)M)E%imiC4H}JQvI80rGud%mh|g zT}P=RGzY6XuZdzLg8ipVx?P_$BlGQ|;b(z@0yg-=hePPD7S(wi7*Q(J6%P=)Lfa{L z!u>kOG{4z$D>}d}1Whed`o>a*3I(l-cN*!&D&s1`x$L*x{?LR`7nJ z2znec_|E(B8TD0~>p*G&Kty-Uo0lo^LQEsm-^oM!4PzS2L5m)i#6v(!yvZsrYPI2s zYn6{z4M4@la~8IJ+M39j!>mM2s)|PUw4rin#r^Ih=$?U!Hh?Z)<)m$v`Zl&zE)pUH z7*$*bYWax=vQD|g^F0r;ce}KA7uH2KXd@08rQMlF&fA(vZg=%8+|@zjz?)p`Fe@t1 zz{l0Xj{c+WBTPpu2~?^C|7Lu%w|0Sk24}}G)v5M=Xv7>Pt5@V+s-*>#MFPT z7^q54El$|1HoO3JM($Z|A88OfjPHE4)-s-#Wo0ai^@sb5Dxb3&=v=lsJIV-@T8>&F z`WyuP2yYTIW&4>vkIX$-yV?k%zwWMTvM$W=6=A#qZ)*Dl*~4hP4^oZ4W!bLQI_d;n z*o@VBA5EKb`5x4JhJGzK+PX&iWldHzvawuwthQkzWu~Fah#e>c#M``HFXL!RHJdM6 z`Lx*s_79$u`GekC<#~KHrjZzccx?0R$w1cV%2Qec-Z-iEgz;pK0O0()B zL5ilEdUO_evk&agXMTI58r3ss{^`==6K8EjYBL^wDcV4l2KK7C%=lxUSs#js9_4Jh zn>d-}IPuOW>Svm-$ZGilqiyJu%0y@R*v7=h2Q<-b&Fh)`DBoK0qZyU6C)@3Y)Xf6? zklmPfL94I8{#NT=r6c#7=bWC*IW~scgR%&<1JlN(*Zr&prU&gCeFsR9V?u%56f*6r zieogxBN17n<9#|jZZ4%M<&gWjFp3MJ=E{-x6xcUYF%5;ax?k``hMPPDH!g@?+Gf@) z4G7kOBBr}d-RmS~avDQLg!U$ELmJov9NV?Cf82R!7D3X97_m!cCMz7;E&-<=XC;2- zfvhZHhlNc=7u}!Q@<0*+GX#pNQzAm>lMm`DvOs(rms(exIr!`G3amt1x$TOZ+SR{@ z#9Axr*?O>l%>-!6vs0v-_!6un4_L7_b~s74VzIb27%l|VlY!DJ?gg{ceU3c8@aTp` zl=qPi@zwu)EF{8ULD`1?(|>d*q{gR_O!IQ)xH|f;c`#~-h5SJ?LfhL%8yf;DrFK1d zcrGx(Ex+$YD(IIgeh6+Wve#3DkC(b3y}0Yod^|ih?tvNTY3&^mr09n97{?)v4>IaS zi#vsJkLcBl*FKIc?+yxKpiqxyMNHXBx9t1(F6;9Y34BNBhL46vy2qX0mwzf%`B%TM z#KH<3b?m_EMcOU5zUA(QsAld5v95nzDl1#hz??-F6~GZRx0%KF;6Xy9?IXcb{uR~p zP;9R0WD&8YK5 zY&56**GRC#v4axk>vpf3cB;I8+gz`g$iU!qr*f#D%zw%o?3*rg=2$WP&nE+|k#jvf zv!(wW=IX`O^|qnVorR}GH)LUaT@*hawEAlzCXQUSbFLuuxSF(D{^?5z+fc4Jt};Wr zc?oyBuTY@!Z>v8e9wipZe;PNxWfYQW-XqBXnbrYdo;-F~miHNeWDcC3symC6-ya9M ziw`$O&kDJV)YK9RNIcU3Nx5|_!$MtK$GWbJvi0 zz8Z5RU>!I`gVjpi=zFdyIWREI`{tsB%8rpZ+0{92#L+aZV;VpM(1#xzkH#P zpNJ)KI=Sub*`4DRfZM)%4zID;YF83Wz3Muc-!DE9R;%kR`b!A_6+r~Tr%#eDoZYjr z?)8HbReXO74E``6KJgi-F|`8Xl73I6fBk0!XybHQsFT+h)%gUlRkctT`_2Il;EX`t z__z003zpO&vMN7PR=%l>t@Y4BLpMEmH_!G2l9-xBYh1MrAXlP~ZaePL&*e=Pve z@MiM1T25ZMO zB$lp^1LFpAOi8SuG~?}5PKtKjdPmz^aQ$}Fpt__|RYmXvG4-XHD=?5|u*#ncG@@1js3r3pd*2W% z!kI9fGYi~XEI^1HDnqUIwYINDbcqC5S(!w5Ih6c02ODcHJ3DZ|X$x@xTNXA87z3>4 zi&<4iD-VQhoox?z5D~zP-x9oF9Pq8$%D=8#exJU2KD6QjkP1KG$fL?{Ydl($kI|gc z0&o-$9@LqNZJYc=&uE>XbiU2h0ziHw3!#bF9bGM}{1nZT1r%QYKd<}iAcF!Gvv&im z&cDSdvTBAW0;RgP*5Fbt&%d@-B|?N#eY)kx#L4YzJ4>k@9SWFZ^1nu`@k6DmjL-rs z&C!32_{bxXnsNeg9%lOSzlP!S#cg#241mi2`?|L-QViI@|7fp416Vn4fGgy889)ta z%C6i zvOLJN=2FV45-Jc1=;PimeE;0ra4fH0BJz& z;BRR_Gk-s%GSD$lblX|bx;w6s?jy>jzBFL@0Sb6qkvq==i6AS06HEZz0E!dtPA?GqXnQ;l3 zrump;x`<&P%QetMV#Hk8iAF0i^V;{^`20_bjB4KuFzUq7Hr9l;)rsGqdiqoN9yhMX zdMr1@&|GJpkq-D{#6L=`hOB5CXK{({Uwky?aIM}nX3V~fLwX!}Q5qXc$)bnJ$VEG7 zlaxx?nzds_yO>)BB{YJ5ty}Ut#S_^Q&z6jfxeh%eec*?fo812{zV9!`q@e)V${y}} zMwqDcJ}00jcuqQti$|_;Thoo?qB*hBE&J-c+vF&cpXXnjMV2(se914}O5#^a`o%)E z8@_ijlPyq|l|o&~Ky72o6!6;WhHCC=baU0~_HPXfF4`O%&$)Q2q@6+zC1C%RVZ`})w^Db~2yv_OKl$gF}Ul<4Rq8SM- z3Y2)l#&Y>7&p)kC$BSLsMG9d%ZVAwa@Jf@byqC)z*~7VSy^ykntCzEYU3Hh|q_oJg zPFu%2y)yYA8#mU{fCUHK!M0s7%#jEfRoRSA0ecK>8Xz|_2qZn~I`Xt;CP5C}a*Hcx z-&;(ZVFUgwoseqbSa%(*tAb>fA|*IvmvNayk4a%lIr1u;>y4L~k^HZLSsg@A+pWu% zt^1)EF38%>X=@at5*&mgyb3gus*QjT{Ic>zNmKd@a8ND*I7#MCZv=0eB9&j|avcf4 zTJGJ$#iBiY|4Tk5mI|x9)L601o)wl>$Sft!Re~?lj{j*?a7?~cWvOh^aaB#HZo1nF z)LCFp)k6i=5UgCNVr3)EC%Q5&+M+6(ol}j8g zMK$K>_cdVq?#5E7!%@o%{U`RAH#zIgtk2#Nd!};0S!}NNYB`o5sBnRdVz${DOkN&q(y{fb-l>MXDKsHfPVNb znhSJ?*2vlUY`_Aev@$G(a%MK{D0U&Y-KLNV)aVCI3t?Gx=g~FBgH!-#H)lMFJJ~e3Zy}>onsVc(4$_5`d*wG+Q_zK5Tu;=2_!Hm@rTZtZ$T04d_3@ zV#q7~wx3O;FN^CUTPBPPrgW;%KVP3p(_g**SBnNApFUj>XG`<4FnM!_Wdidy2Ttn( z;{l~^>jJ}`XZ*be_mt^k)-&Lo!{K}$$}TRCALi-Jl$^t8F5v(bq4zHQ_L9aWP2YFT zocO`>B--4q@4+c3rLTZ-=xul zY(%9s{;UbsVTxqS@O?&h)9?sH-(Z0#d00ZoNdD3hzpVguZ92k~UJb78nVvA47n|Bd z6M_bSVT1$c^D+pShl{s7zIb$z>a`y?V5Zno8Q`w`VD`tCcnt^`O0#FzXsny{w`FtY z-SAqKlXQS{b9m1W(k9Qb0)?~pR#$R?Gk)E`5?+#ZQd)}VcinqkQGG1&ySrdUZO6Va zAvM@z<^t`>ItS})41Bi4xS;8CKBZR>-4t%nC%MX#d<;sUkCa+kSPMIV%6_i@RJ>X@ zU3M{-kq)Ne98!UF`E~DU)&n6>GpCQkm_OO z(XqdQdrx`AE2cud!EXZk9p^h8v#eN&`4r~#cQ|b(5kKk~E>-RH(WKx~r`kH&je>hT z?wolyK--qpg^xfyIae&}O8wgQ_Q3@v@xRQ~>+N`LI%4h2cr_I+WUY*ojCCs@-AAO*qJ#4j@DF@5;@&HmCc5V24kW>x@ZoRGt z^-g=aZ1?gcvCMbwU(YQXi~}!y+?;Vk8pC#)xH?ngfAzQ9lpfOd7U(eZ=Li^7B=ib+ zljH8j%}ca;=g#6uGjx+C5WnVP&@_PKJ9-+DlGySe+KuOj@MTEt$K3Y z$>lV#?BLD-2ft63{Th|53l&J%w#S-PvOe54WCKLaPf6?cNM(##7r@eQ#0*x^Yzkbc z^I)-ZAFl~fRA9OhaT5o|-tVoUA6c}q$XkgGXv3U+VqHmDjsAow<_C08_sYs6tKr0| zgnfI+BI6b}L|QLty6{M5H`5XZ%+G5C?PqJKp<7~J7^4d+Sp;AN*p?PO8UvS>;k(SM zbJKq;n(e*ht$CRjq8;)SS6%zK@nZyA_%(HU&63vl-29lMU(O3Gg}3K3>&0cnuhxJO zl|ue<`R055r;SAOImC^V6rTH(vB$AVv*?OlNa`)2y$)+$(Cm>m@Dd&fMot_s?}JViQF8om?==? zjeist8nDbRP5j2GHa^D+M&s0ENGaB_0s2F&OVTf)NwDeA&9_ZGX_7o;>(8Q{ z-*>D0x&V)1>(#eCSr|~5XA$Dl2KQ;;h)!c+_VfaMDJ;#mmFpIFo@TUJ{zG|#pvL@x z5fMkp7PJX@|3Lq}z}Jd4ZELMgeuXokIBKm3SYnR1vWOJ5vl|IM6IvnK^2$=!Q&Y z_bs!+w3?f`ad&|*W%92G7I2fBQdo5I(K`*=1su|Qn7FPyvp(#|be)SNh=!z574rFa zYXe=_7tA{4FF9ALH8Hd#pz}4e2C`Tsa=|^1Q>#QN2z)$x@stQ8h^IzZ*kmFL@!kpF?Px&;r8>B2(gssDSj-vy1 zgUh96WtXPJ*r0fa`9rZ)Jm= z(h}LXl!AGh8HO`rb56l5WIdX8r%C?oaYBSiq>nw)1=Ns?dszLLJ;82MfuH;U@lDJu z+G5k^T3iOs)sb5H_in|k*X_W`T8ydY5tGe_z)NAjUjqZsV*RH*%Mm5H2o1~o-J^%c zW3OI72Lfo&OR&>xqugbVqUYd00uQL2KJu3j40sC*V7+wXz{d>43JiGd%r{@nYlw@O zWa=AS7>;*SLfZt|_zr4~DxwZB|K)>~7R!@0P??B-_;Sn-I7I~_zog`7&CJ(mUDPzd z6p$_#ie_UY@7HK|zp+jteYnf(3`gYTq%Fwm#zkMinyW8{g@v7AVG{Mq>~vGCW;7pA zTi0TuhGZcuNp_}mMU|?8;m5;;Es`H?Xg!vhc59Ym9$c!eZ-VPRmO=M&K$bV~axDu- zo>^;Q_RW!;Mrt-*x!Wo7JSe(>w=2r!eb?yt? zd{9wtm1N5T^qy$PRp>w%yPSrnPdJT&Y*}$^*Co*hP4g(7p3#kG>7GTcm|&#`)$|EA z%#(nYd9h*(V8gRHu5zn6v0P|(%UaBAD7YwYABx#`!25Z6uu+!4KF2q$m9kKnSz5Q2 zJrBjY>+Q?oin;6-#nct;o@mB-tG+(K?dEyei`mO!pW1Spmo!v78oLoEAp^}GomHm+ zA=VyJKGd!BBy+aqJvE7=AwB{k55FvElZ+GR2yYwCD{6S0cx~J^$)+f#o`s-S4e%Y3kepaEZ2XAb@%S*eu&4rM%i* zTfXbXN2LTa+gD{@{$bMpH1GfAzY_sgQ|lW+wxpv8X%`=%k)~zw7?0#>= zyXPgRb>nd6ED7P&#f0>bVvf9=LtCe>j&kJnb3v>N%%5yK7yyrwu0W1LGeRd4dLvv1 zv$(`R$;gl6VM+->*2oH;Mdwc0&9$=lmHjXsj9WG(9pme4277}U=-Smgcefuut*SR6S6y`&iQJs@PD{<}uJs&v+haKBMLdm>F}&Y5wMt!_r*r z9$!5c-m*&aWGrUAe2}b_k+B$PCN%);h+2(LA=GbtT)XmQNlQ17Je?<7iujgb)DBOU zUG`D7`>uH-;QYF8ziyb=MRT?&iaJX* zsegMVW{fP~irM#A!GHxk$TzBBAo@V7FWsWau(!$l=}7#V(}h{ej_M}ErXUe=sPIr& z*^7^kaZ;z0Qijr*ow}D#B%x=`pS+`Jvl0u9(HPMfm@)bcCd#%qV&-b~<9IiRH^U{m ze$Lk8S*VKVH(HEzEF)&rw^zfH{ZJ-#I9UIU+thdNTh#M+#T<_uMn8Jvbm~V2B~P6e z7u#M&&?B+Mh4CcViZHWPvK-jwsQ_9m;_a;kHnqC5V$Xx|QI(T3HtMIs$%O?lg_NPs z3$4aw@(AHY+e%+rbgG1|Z?H$6cE@dF4~97vDwJ!9y13oT1!1=6yqDMO^xmc)%A^!B z?=CSUJy3yJTh$$_>l)+Mf^Rz3eJ#vXap}deNn?~cX%whAtQdz~Ccthy{9f7*_3gX& zaZC9bQ3=7N6vxi=eQ3-R2=E=L46hrx4#|HFxD8atU1q5=Yi?ue^1FX-xQxXYS9yQ< z=vV%z)JfbxZc@K-TaQ)VqL!_Cm#||)x?%jAY>Pi9*#iaSRHC1eV|<$IXv>;$_s{s( zMh)KapIoV$ww7v2F#v3O*Pf%38~pSIpETL{;CSpwi6rOU0(lWr@PM#Fn0OfVhl#NR z?QYD2YkU0vGIS{b9Fsu#J~&s}GyR9z!y#^AFT&o!xD3sQcO}@VTGE1*_A?-i^mMzt zu%-xepToPJ$4OYQtGNcEYPAS&+|1Lz_^DC87hRvchQ$^6_^OW5^pz>Y?QpjiWG$s} z!6C+>q)|b-<=o?|0UaCpqz8FfIK4udY|`bi>)+0nBvOzh)dRE_Ad60G;c2%vwcIdu zoAn;+fXR(R?v;uycerCzBOHNv)oAka)X+Ng1@2rKN+IAB^fsHY#80-xB0iCde0k=m zF#(Nzd__DVp)0+ZBcg%*o_+V|4j`J^fqTa<=DAE9n%T^Up=jLEw~2yqKYmSO1dczP zY-eG+2GlR@2G)HPs%KwH=o*Le#YQW3eCw7vtu&b-P{54ztl(Cu_th-tK=sp*TMwmo?9XLAKEV~bA% z5dh2`)=sq?*BRlU;|uAFMgLU*45hXDC;1(;_{fhhtngw<4hON94C2v#?&q;V;t|v2C$z*|0J$ zZeML<^t4gYAHm6ik-<8g`VlGZpH}-UQxDQBzPVa8%AC*43P>n0eiz<{gw)jDJXlGr zylLT80Mdtwnt*7x5sDJ!ffR5CDB(k#L_eRBiwlGfC*~3k*>3xA4NqwAduU@P)&r zT4uTW@2BnRyra!ByOFW*J zrW7~GnU*IN%?+vSBWEqvxTvq&O6Z!RU;tCC0#6H66P4|xUFXC-YPHJxQ2gNIKzKv@ z`g_dnsPjd#RUBm9_MuYOvhc%lAm##0+p=N}E}}wfJg24W{(3v6P*asJn^a#?BYK8} z_osferGN4V_NxU&zS>2qbJ~xG@*Ys|EBzOIO5rT}saXhpAb=h{LlH22M9uOfem_Po z2%D*ROz>JF+~UMnaUU+JB<}(*AE$I%H>iY{S$xV}EUG7T*YJd zOxwW7HTnJbA^fl_kD22y#J+tI8#`rUu>8iD<qEBMg(=tz%UZ$&iJ+@iZ?IVpkiW&Z8+XYYB80UyMX9()V_%s;1c;5@*mn3kHy z=NP**jqKWM9N=l;06=YpZ~4u{udtdzuDfubhCjcm0rw*hTtrdpD^@3PWDAjrbUbzZjR%NC;MnS7jlZiUMK4ZS9!2 zYur^HvhpzHh8sH&0`m^td*ktWKYxEl!_B(ulBtrhorRsJ?HC%U z)HR=XYAp{;DIcBcMjUr7KG15)5)G$4G%m}U);8l} zw=EhdNgQPzFCaB8u^mgW4O;l@o$!8I;K!nkFPfh&|AC^-LcH~{ZIJgz5*1-c)UnlU z#crr(wqpG-)vkzp%Zk`%0i%m3T9PMLq*lA{rNoqUhW5?3Z{LpuJif{c@yO>X=JCFX zZQ6hz7CkC@KUF#PBhv5<|t-A}`dZShK`1MtC$iZMk?O>B0*begd4BZqavNlM4B1Vncdl zzF>kD6%igNe(n&nHqB5-fn^@bC*$YYJChUWtc#+gGzne15U4h%(YIzGA4&$x=Ue(P zQ!?Mrs1HX*D~Q?N`Lky$VGT?$I+!Byb)x2#~bl88YMw2L&jba@n`sgidK8Hdr{_(Hs=O)}K7 zi4go%0Uku7kh^ck^d^mZUGoD{GxmC}ds**7Z*uhznn3omgvr-igxo_|}7yvHr!d2Y}3w3ifq{mw& z=xdzMA2M^{M-<2{snXOn5PoDyv8Ea zos~{Q(2rW8nn8!3?5T$x%{&p?Ua0WB?4=~)Y8ulK6KrfC=@B`HBX0wy8R?@abMGmY z+9}ZGSV%X?92m(p;3?>tt&eT_aehz{ltJ?;mxfIV)3mrV=MKfiTD{ z;7mZ!4JVQ|jOt0jw*%vGh@XUZG7Bi|3!gN1nrJTJ>Et%#RxFo!HMMrU%^?PUnMJrI z7%p(x*W*X)8~xWS+#DvdEkp{`cO2jgTe|fTw#98<6nc+f5G!W7JkW!?lJ&4k)g%tLNDzto}_1XNR9Xsr=5Bm^VrT3pF>j~`R5Qcb+< zVoRSg_-_NhZX!_Q{bAqhj-187Q*{y<1j==@Fpefg^F&lj`*5e{*4u&fKpvR}jLU8j z5(~Kg>c9#OTO-LtC5!aQYDK^hI<@|q9P&$RY?PBweoBzigP<*jRLSGDN3=&|)k%?` zX?$K>pEC4Y76MM}Z+8&5Gx?VgR!%e!sKl{;(#XrY&WU$YTS&jJM(UPD*d|2-FFndO z)BygVBQSH(ltAS{6^LDMoAAEkKZHNN3A3$JUmw-Lr9`GYs5+9i2vB*+i`ne zj^%qc`Lth9lErDW@6?GT5{>ET0C#l=&`8{*kOL~$b z)YdN|f3*vFg|0@Ut4Tm@#meptgqd~WUF^+r;0htua*;*9`-~n zb=X-TNwO2teX9)F!tse->xnE&WFB_4T6wY%ijN_J{XPQ+7-P z*o7yhfpW_f(-zJ7t0wX%)s^|6bs%_7VcuzlTF8tYnrAW$k~|ZWq;i1t>gs-;dxMKf zTxakxEG@SFs6I;&Y8Diu2BlXKJ$+JG$Uow9W6a)C){~yDe|fT>q@j!nq1>kf(R_vl z-a?Hi!c2xxRc`~Nz$eL13ZLxEf`@yJZ{Rn=_Vg9tKkv#sahYIS=V>cib@H=BR~P;X z<;}YL;V9SxQp7TlpYVQM1~?mZ5ZfyYW+Z@F`F-t{Fe!dflyS=AtTcgyedx#Y)PNXx zcSPv}v4kSBH?RwQJvz!8FJld`$-#~Bk-jG~YhhQeF)enk6+34V>VRW7>F>38Q|28c zhqH1?hSYS_EazxM{msS&xUg4qplju^Mm2K$spSZ_2q>+L{bZjtVnNa&mh?=!$8x*? zaW((1F--(K`Wui>Iy?h{rc{r&+?*b{Rbsm!-20}wd~5^df>INZitvFj@xFJ*|DX9s zC~7QOoMt!8+x?tP>F-sy)DAZP6uOf2`}T%E>l&t(F5k4?_SVa0x4!7Emp8ZN&S>AJ z^-UkR4(9x>zFj$X$9o=6{l2C-`SiZ4=bvBrIZ+_edAf>c)(eNG z%-$E)@fTjIhg?Y%*mucKi$jo8NN2O|o-etd=1th35A5{!@J1y3|FvOy!t}=*eAj&| z__HlBejBUK2g|on;>UGNHie#^y-lHl5-%ng%dh`?RrHwZ zgewL|D%ynK2+1fdOpUL2$sD$1@0R^%fk)3|>~BwrFT1O@_HW z=>r@w08aQ$+QKTUrl>8eDQhz~&FYfWh80pCS?%ZkoS7al*-S;@@}AK>}zM=zIJ#=&vM>dr|j|%Z(Nf&z4rX` zNeMa03)DN?sMNeB4}ne_O9* zo@QTW-&L~~=z&wY>owQ6A=k0gVrLfV eS6%$i&v&Kf&-a)6@woqh`+hvGYumMRcAa>=&hvH7xt`BOz0_7Azt4Cd4-b!AO;zbN9^M^8 z+~=Rfgt%83hlD-c8@~H%mFIZn!_3>b3j#X@Ed@Nhs(4bg)jixbiHoX{J02cI$G;Q5 z$N8rX9-dN+nv%jBAM^bMl1e8df4b98^hq8P**c2yFFpevP=QEd->N=HB*+hwCj&+i zCK1nlAdcklTK%0z%|yvVR@8;BQkm@%7o?59Hbcg@AwR2bZLI9cP_dv}xBh$@8K5wVpGw}xHL!QGQPyYSZ zDV*a~t`PNE;%@Dni)It+eO2?q!&ZATR^r~iF>^Vu;JDrtWb=MSIk4?~&cQ-Fn{Z-# z6{E22>mcPB7!#2TC^{pNl67G0M=$=k=x}rRA&%DeKbWrPvD$j%n-KKU{>_*8ReT;? zQ4RMr<=m?ol2@c&Dd=d&iUV&#t>M3&>bxzETg;{%MZ?c)8h~Ms8Iqd7hJhmX5Ufs_ z7vff7;XS|JqH|)CilKJovy>(8B5-FBa{4EaXZN1e!cxUeEZL~hJFb{pqYy;)fj#qI z6!x>1g7EFQ{nonqxpS2;6*hI7vjmSj zHbB1CYDz#sf}!tIZ;8ea6TUz4`To;wnp=F;gJMTxA$3W?XJWfP7H zHEl8<;~S5LVYCb~h!`@vX;Ms_vy*EGpljY6hrM6r7q_fdv#{!$&7fv3ai7kg(G%&w zFoqZt>u=p`#N|B~d{^B`Kz-EJbT2@_w{>0p4N&PdVdCS2CxD13QRn0shdwsB>%*hU zPqG(oNbZ)LiR-p`m0UXsPjYv&F6+$qVS;cZ!C+j*#BKVg-JpcW2l7iTggOZw|d`PW+K+lWY@OqqfY2)3cSiuBAc*bNQzl$ZRS?$k5P3!!#h!r zv><4<_1Q$~!ja^wzoFvwKlaMTC{WzY@D3}YC*=xzsu^W-P5>HDS)ZeZvS7-hg;1jQ zQi50q2M_-KHm0Tb0(zeT^&uc~5WAs*i+lQ~Ae*Sv(oJRZon3-yw`xy=YU)z{o6<^_ zAaZ|hA<^z%zHqI#2mFIZA@^d2ll!D45hH?E;Swp}igopLi3y`g#FTyN|_r2?vOA0SMIgMX=NsaU=jQh&I{~EJoeY5WZB@C9qyU!_ja52y1 zp?S-rRJpdUALIpS(uRe$WOY1)+aCDT->tXX>mECGHJ&@Xe*n#8YrqfE?#mo;$_31s z*Nw}~FY>E%XDJvrIZoY*n`?r3tOugq4qd-2X^l+yPx?YaUHfjO`iOPDtlhaD2r7N& zX^Ie{ERL~^a}8zIf--$aL)W+`kh3k_J3%y>SclAKMp_QiehWIg_*NQm2GQSA$X6x8 z<6J9){iN}{F-4CFc5TDee?}j3i4Zo}%f38c%-afFTKU^ABlFl7Sajmeo|(@h@+ zn%BCX4T=!aywAw=aYQnE!es|1ZXW^~reXbooQAd%#NR|f`OaD=Uh?0b&2+sW)=!4I z13C>9SVpQ)Hkx5xx!n$k;J&GMVS>*LUu8-SQH4sDIoiwtbDuFQ?Wq<_dU|8hortzA zC1R1xW3Ee6VCD!CRy;lh+f-(;tb+%9AIlyYyt~*a8U?hk<(PT@*mm}aEI&m_n2$KZ zbuXsu3#`BOe3Dv#QM|dZ#&g7OED{tFo#)_P2SoBr?x$K_hdBq%4`A!bTEh;NWl_I@ zC(#W0i(gE(=?fg2JZ1WAOZBs>n4s_5dnkb7K4$hWtZ?4dc!`m@M4Q+{5DB_BJCdD@;981Gu< zz$6h;(?E>)` zICsE(ikA{|)=tYQ%WwBrW?EMp9wCeeoB7`(NJG?L8}St!z>2?CBW3AU`ehDP)=DdR zk};>SM$d54Co-Cm&3j+uE?DgH=ex%dEntSyjBt~Kct`?F0XF_}dW{x3CEPOk_?U9( z4FlA<ZkKrpB7WPes+cDJ+tRe<$I-0ehjszvxyRhD%@;&OyUYQSO*axi18~R4w)RN9n{m9!jw{(!w)g9Dr3$gtd~(hbwgFh@KO&g+Yex zO-R3+#dOsNQ6`k%ku%iP;P2XvHFGnI#Ha2Z9Vscn*vY_FXAy7u3p80o)YHXQF=C{Y z-KFd^-{(K__lVf}Sl0S5zkJU3riM+NkW*V82d7_Ye>ZWM7|6y3V5tv+uW3=%8f^vZ zJ*lSaW!1~0t1;>U*qs{+UCMb@I(EaSPO-FT>x^M!IZ;X=*ySK6KD-*pkKLTFXrFK% zl%*dp9yVK*?T9=~Uk0vQcje^J_8bgKd+nlK`LU_y?rQq)fsA@2ObXj1OEwnOPC6M| zBUGhO{YvrbJQNkqbS4N!9sGknmvqC0c+WfT5g8Xe{DvUT*z7NL?Ao_X2q}tSiuP3I zk1KTtt+-Zn8dQ7Uk&+htU1sBv^0fTPC5?KJTVJjPiq>v@KqCcfp}(4++!pwtCF}BU z68K=&k#e4dPI?`a{&KD4nU(j(w(akM95_$-ugKWEPf^TNFV)6>Mg1m0@KuZC5Qce= zI2oNuu`B9c7_wWJJLD$PbA__LJ0A}$ov-yb)A0}`l{oD2jnxhn8tmDEkn!d=+}p*0A9+vvTW_EaCk2?(82lkU1VZAR!ZxP=G<3P# zhnM8xgwKZ;ADCh+xLXE&{oQ`{OR^c-%2~nDmAMy0Tz0d68P|W;@p)6y{M~l6q$aen zIx%r|=2sqjB`O!t)KKBSXh1En47Wk**d28L?RRtxXfKz#qH`jFZ<|-G`xn%q7s4&e z{IQA=yB@6RUd_-jx=(_N7019VQqmlmw(3q{XCc%+bUC$4L!&ZeIsA8Lpp5TQ*H@Q> z$^99N{5|iB<`~Vdg3r%4f~q&kd#uvE_b3~a6{~(bE>dKXENx34`ID_o1(aeg+Hzs0{}|M;%$)ff`!u(Ey$x~xI6H9UEaE5ufTrqn)Q<8!6HZ&r)1 zkIrQjNWUiNNaUUlt!hifhhVtX{g7r(0)Arihhdhop?am$xsFV8AuXq~Q0P%O2n<~x zVJ%wbT@@C(3bBJJ9GMa$?uS6`)erQFwT)Gtz29|VwBTy-{fmblVJ=!O!AD$EjW~ra zH&TYs5-7M>1$ag237C8#vTF}fi3QiJ^Q5dJ4G^IJrRrRct7DR=fxP6b;I{J4%= zBw?2K6e#C8gXH^0(y3+44eimtsDWAJAsTGBI)*Ig96tkrOV))2uS_2z@EetBye>0d-L-X$0|iRVQ_XT?zS#g~BOIBR*r$8Mw-^`J^u2s4p3! z#?{eDARiyLHjF~XHL*|>E(-!Tm5Y?<#pU6;@Va9sH5fpM08xdUiO5&Bt>A_ML4~L}|5Xt+^pSHl zvH7E*fG9u*A)@eKj><{w(|KO%eqMfug|L^+2$oH`9WN<;zn z45Y7z;*GfJf~28e{Ikc8%Vu@CoayB*#N(Jl-m6>CA_YYVne|(8F4+^@u20=C1w)*5+(hG7uWM-Z3Ufp`;4X!!7ZJQ5*D+75RDFD2xciM zt0ds~2s@2E`qyNHuMbB}f0DZqqzl03N-s`)KpLFKm22U9eDv-p_-Ieuhw73>BgnST zneS>i$-P8)tlLU8KJiM~Miu0w#dIoU9b<8X;cD{wf5WD*JVr0aBZE)!g%0WZu z>6B^*_|4nWqggt5APR4V=&zj7(XU>Ev=%c|eCj3qJrYTBwFdm_B6+4ZS3Hc<@ShTjZStZU)^-HyYvAuf5g6_AKw0AU~zdBG-8 z9^UjpTRV~_M6kHfg`LFZ(6stb}H3w9*U2-dNvi>4Jj78)>$8TB-h23Iyr7?oM0DQAmHQCfq6fY z<~Zv*yMqQ}tg$oN#pKqT{-7MHeZexl10UMQN|p=NJOu=rb<_v{eHw(B%PDoOtz}_p zPn;}UlRRH?IxxHFuO44%`ime6mBlOJ5&oGzuXSD?mR+wB<_lGlnLqyvK}I__KD)4G zN9b%|)2R1vdeVGc{}MqA-}}sN=un6bhEz}xiKrTpnQ9@w*=pX!u6pNCY-N5f@Q1q>Yk^vW9_$o5M(xVM z73>~`uDWqhzogP{Sxqw6dE#=_E=4I`;bNWC_xgn`rQ zcL;G$?yhm#YKq;)zWteVwih~5_e#AOeScu6wenQ0_);p!mP-@HYrp03ho@Y~-}O(A zqoBq=tA}MaNL8S#AQZk-!V`=LH%0> zgZz)TeW1G+sfK2k5gMA$_kw-ZZtM<3pq0*nr%=*&Ql+Zz0b?N9?29^qji^=`)n>Fu zjTz9^(gA`t`>d-r($6g4t>|4x~ z>$bzIezzW>y_mj-27C3mGMp6LW>c?4oL1kw0D1H&LLx*hi!3nP5Id=^j^LYoWa^TT zqLW$M{;;;B7rH)p+6i*7p)=PxlEWggQlN+#e2ijq>;_vC1)Vu)N5%Ec8sc= z?}|a2-VgTZvr7$FN&>zPp;XVj6q3ETS3$Yw?$7rpN@l^o`p@q;3-^nHZE1#)yYPuW zu4If-sXSBzEret`;@tN3RbqSgUs^ZRb)M*t%*>`;(y0g8MQyAK^Hn|VI?Ofw!MW2} z-WF?fPmwWz#9#*`CE$?(Yh3ld$Qqk8*hkVDkR8aRZo*>tZPc7udrXNS$ zB$od;keFa5nSw10Im%X#-#n@q+NB2kj`fVirJHjXtp1Dv6;Ph6c2wjC}oYOf3SuVuYu#rXAXhCbz#>Db_NHLS#BE^EWFc8`W*3CyQr2e znjNK9-{mI{>8)$&&L+2C7SE+L6ufAD>D(JvwZ{W_WVfF#wBf+)h;26}r-I15=f}Py z!OmsKRm5}9@93BrXH)4fCE~EW^-?*pY7NZ)YH?>Rmv@x=D?n8QJ1536Rty*$$wiF{ zm2UAd?c>d!E%#Tncwyhr%~dvRuUP<73|1C%y{==$AAt|fh-`U-Yb{#LM^%U?#f&Vt0x&+rE|jfPEdG8wk2sm+MThbmnX)UQB<;&v4YDSw z29jB}56csOJhelMKWq8eLs*kJ;Fd>YCFJiY))+w#@TG2i&;hv5LiA> zlsgVZ+}nO7M5uc}DC{S=#=%I)ftiR`Fk>y1;sb6c>cCT|y2qQ{M3&W)b3p^m!k6ly zhk2^GJUTjVs-)HIaP%{=MPQyHa{`MmRkx)&TurT|H(mT4wH|!O+(;D%K==kM9}LFI z%N{vWrQ67AURskUksMX4HDX{n*x-`T)R-Lh5Wr zR$Z?S=U%^lcpWa@rRA^7op;;IBe5ZzCHf|)t9 zr*Q_&ku8u1TiOG69;Bp7Qn75`-G80aRS1aIVf`#bK;x>gR{-?=Q!yDO7ygKz^pxNJ zhf1!vR|)uv22%S-_z!DJXaK)(V7QRu{Eqq!-IQU3O<$;+{6wAqM!|?br|u06to|3p z_JOMwR_RTl#ayiI9CcFY$45Y`Iz5r$xy4r%sImpgx8JjBN$u|eT!soQB5& zSBn4>vEqgM{>ymV6NG2Jp4Nj&`p3Iq)X$-@!e9=54^D$_3QyaXsfP*-j6GW~BgUMv z?%IzArIv`QaMywMmCYFZok<-{SaL#TJdA$no(X?Fe@Jk5skyV$3h%L`{UgQ#wezA< zQ=U6<6B0#gN^s7D_$Sr;znjFAE-=2P?Rmm;t%E^Or!b@Jt>AX@bC+qFc%~TlU`p%q^ z_}RjbENoT2VIsC#zMhhH`@A5!_s@5M!kU5CI4|p0p3~AqSB@)hFid3QlQ%wQpkJQA zZ|A8%SyJnzaf{P@iu$eeu3F+UvvwjpYA`IXZR@Fs15l}{j=?boXutK@JkZ4cO_0Zh z`ls4&S>&hf zFBr0y-cdKSEf>iAJ&=nj0oo%y*!=XfD1~h;za|g`Y8Z`GwAE5=^yb$3&m`K>u-suA zLGi_p<(t;&*^e4%cCy;Y`0xs^#Y>GAf5inOVG@VI*PE+PQf5ro6l~YaJ%|_RnWgRu5cZiDWg~)6)zUsi9!Fg-X1;gjQ4m1 zQ0g(vv+(PE6|7IWO-VSbE56fz_Zw!gqJGXs-SoP?O~V3G=*5vG;}F`d;7GYL^|ve% z0|8xAV^_!DZI8uIR=H7AtSDE0jZ)2&8`65V<-PNAF4i3f#XcqE{6sby{$uYZTHRI+ z7V9E*^I}VgI#E)+@YO1$XR+aBWAnAMSv8 zPd6P$Li23>yJFv&TuRj$Ts*%tQw!YvMZvXC*pO=Z8Gk>Qud42ka|FF6@Ge5svbU!A zX%M*_;r;9>wg8fl!gT_n~d06A9V$G}k4tWRpSFka8q91<F8Bp*pB;Q4M<*8pXC=gk*Z{V)}!EqyGv7P(7ah4gBg=R8i`PXYYiXRYZRP#(%b?S}SohBp6T> zTICvijCc)KlBU6$5kDMVs(WG!CHtz2~KCT|+H z-@Z8Nw4xk!CGV8VCj5vu!Jb1zSa8-SpD%IAIN|AWw^;23kEkU5OHC)KT>L9vk~D2= zyaaIQuzDq#6d|_>%WwdFq!^~BHpCY1B^_!GDkN3pVV-1}A$j<`QqyBDMq%XBUX;Z% zda^o}gZ>fApDm?FVu&QV?Wgwi==Bb+_oz|vl#M`Y0mm0NR2ZockeqGQPpCv_Bad@( zsRG2p{$)ev2N1+!$#1W!*&b;F+d4rV{X4zRiEJ7^p z!3TwES#zmq78-$D4Ho|3Fa*qRUE#_C*NIF7P=m^kfqWI#AulRKQ|JH>%g1~s@28#m ztHsjP zBQQc>RB3!~#ksnHBK8%wf4BUl#E$;_>Z>??RIR5ILW3|g0->hzB*ET>@o!aKrs(eS&x-Qfk6 zrQfz9yN+?(hElN#?FBaSHItJBzvV4CD9ty;(w}aRKlTu(X+Vq@*oZvWCQGqQ5btAp zKo-=mA0X9$|A%18gpx48Pm2O&si)=RIzV>^kt@THLWaW4twq%SIEp-ZOfTYTBA|*!c#H>*{w!`A@^V<8 zp!Ug`)hCJXem`{MxeY@z5DR&sT#rb%_o_dJY>>R3BcJNe%ogi?@>BY5nwRa5?;77G zyep#lf|mwfowsYiuIXU-M?hXG_%$vz@@kwpQXUHG(KOY6`7K#oD3j=EuN+xx=9k)t zqJp6Q&}sUda*lEP*>XCfHloq#Y$>f?vjiH=-!*b5DbKpH!Dod6r=*VInNh|W>1?GB zc1*M?!*su_J}^fnojd7ri#mQ~aVyMairYLo2lLve7^k}gZh9{tV~IixhT+z zAR@hbsB)pVuhe+@@O#@Y@@=9yuU!#_nq;CgE&!@nAocV0>tcDhs6ziK{!4F^fW>v* z=_7+P4M@|G%V`DVy}?`|x`bx`cfm)pC&~;&DHYSh*V$?E762ndD_ZzEo!o2$}m4;bHw1=gV^4LwDoF3(c>81v>c8 z@w^@QXe#m7{QlT9e{^qJ)k~K500d1$|KuZbW^T3h&forOK26`p3kns#b$W{H$g8Hs zEvr@WsIm0Pf9+Jw#Gl0bS#uP@MgPXrGJ9O!>3RON<+@sr<)f@PtGx40YtO&_>STC? zJpB6H<}@V;g$TFFZBHp3W2rV0@+%RNGj%dEZr!`zeaP@upMF+{*Y14HiQWJ_PLc>M zQv0qJ{aG)A9&cUGPP})_0q+O$JQTJ^$?yEYZzEgI*~OP>gpECLl@9Vb)QM$E9%1(E z542?+n6Uz=N^ri*Rz2$cu&+2uhu+qSL*kQ0GUCNzV_(H}0?(B`#XQ+5YIo7H2%Va% zc7%O&RR-GWmG9l}piYhrpxr$rSA6x0k*E1aB0d1y$tLtAF;Nl}BjO^OAb_AfWM zwRTL53$(6GXkVVUUxZoX@ILu#3;i1{)487_k;R`ExVi)mWqmbjs-N(38mThM&Sj$c z{2eXiw7BPZZn@?6vnY;D@L$Exi9M;dq#pB5Aof&;1bq_eqw~h3WVDsePXHxo;4-S2 zn0y^KUGaAIdxV}Vvc0M?QN~g!6@80g+yb}l_QI?mCvv^!wzp^n0{dEhCNm`y@BzXe zK0dEhv>s?Bb$=huyxuv{Zw>s~iF;n`ALVGXnRCkIs#@GP)`6Fei^!8gXOHbgpY7g_ z%#&}h*^eH?>Rv~?YG(fExKt6Yan-_{>VQ{3`mAM?&syRr zPlSQpM79HPaZcfGJlnFe_watTrD;rRY<>Ab!i%7dRN$2^T{pmWya(<>sj_nFZXJTj z7wnDq=gJ=#>xhu~0PwKqT-BY9Z1H;)fBgci`sj((Hf4oZzEGVC7dgY!!#dwc<8_V?VVb4Wz{)7-~*m9jqD|)CqkK$`egv?4ZPaWRY_(1ax`Q$gihLsTd@XuV>bKgh3fRB(teHb~ z9`rxgW5C;#@hv4ho&}~GM5`WV;sKc6%-F7WnOMfwpJ_L?_{^w$rAES z^7a*v9H3k1H&~>kl?tbtHcs0iu!4BGHdU`#w zCfwE8UR{27@7^pO%s=^)j3`vt@wYnTbH1Um?>a8YfbC?JEBQed)VWlPA0?zO%>24@ zyI~v2*WbG^26Sw8bVB}kj;=4knoDH*})L2KaPL28AA~Y!!%kiOKiD4VtZxKjb zQJzuf>j@g#p}|*;c;}xJ43)uCT-w%W#`mdHlmIX-n+Ew z0ZVUFg296GQmup8Ia58^<>wl## z6l{W8g0Lx!aev&Uq?2|Xopxg3k+$FVXxLn;J3#;VfzHhN({dV8@DxnJn4bk_adY!HxUeiAtEk2YDO>TZR~lzXAsFRnc{ z;U_P^a25l|cW7-r#rFPjbnx4*2Yt#7WqZf&)8QmggVhIghT*AlCKVFOiE*%h96i9| zKQ`X(^(!;k^}QeSi`hY!w?}o;<~4rx3Wf(|#ZgpmJK};@)Dz~+G+8=Y%MXbq)^6mD zBZ}KS@*PsmS~theIM^LmbGjYA*BIGX@8g}%diEmoE@lNs{i#Q{1o9V&uH{`Q=jlE& zu;F{(LoFk9untiOw48i}eN39#M`dE zo`L$;GY-9ieb%e=Y!d@=euTAi89H;aXnl$%_L+I6(Ae4mhNIa8Ji+?mMOPi$iv^Bf zIm^7~oNN4v(Dt_ZHt(c{)0=h@bUb|8#)WAkH^x!60uvTx?3dkp>; zVT7WNM{RxV(*8^5SV0i-?bx5ao}~wd()9-=1f$K`S=;h>p7h%jBAkgD(UT^2Ngs7& z09m$fpD^*EcS=^d)|J= zUy%SmD-NJZSII7}-LRMQ@Y25AwRCNtM*`k@C6;EX?YiT;Dm*Vb7U15ls-A#qMP>+I z;wy!iEkT%moOqde_mQu@IS76Ec*NuD(I@68otDA*K9`m|9;KN6mO=->*h=(+a(<6h zNWB-)h2Xd&r%%ty=iHf^ASf`erXyW&AlHj4m*9<5jGhq5o1n)#KpK zJ~sbULl6yQpOAbuBUW`iX;lHy7{3WJBsU2ge!|co93?D#+}^=jV%!DGV11GjQ)al? zpY>!8nyk8B{#KGE4g!-f5#F!FiPB~9!y=V;gn^x+&?hEtg z+>TRNX1VpCBvo~lvHoikwR`eRggJ-Xm(n+C@6tS| zs*DyR*0{R0v=ZY17KqBNo1K{r`b)lRI5ZWbIhc}E%0$QH7LvXm-oy0r7!P|Zr#M826cn^ z_1%atCw>~g?`z^GyZF&~WFfXF6}Gr2U2AGWOt&}(7Dsob^fHH~=4}TE8Xt#fv{EFnr?aZV}s%2jqf72hf{VC*}VJ?eqGj7MiTcy}xjq}SZ_ zC;!Nju|3Im(++#qGM)SWPo9|i#i9)AZ}_dtX4@2PHS#zAN)FjS1Sth3ouykLSM!r( zU)M!DzmR?B6LQgyE`;+xAh2XTA%`MA9+$}%l*){*4b51XzLisKqkIh2k+?NaHDhz; zG%j#4pS9x*xc`H_T)M)XCBGMs!!6(ad9sY;WspnI{eGv?#Vk&T9!YN2LekIDhTGeh zMaOs>(^E_Mu8odO{Y&|rhRe)pUqZ>KlzQ(^X#uY7I~lcuac!MA1rc6!5@k8_hU6KeRp$^ z=1g%95hxF@RCFU@d$X7V^RaY5%Gk)&?AR{043V1G-)CujY{6kfoTXQ8KI`YSml)A!^0P=kX_sclrkN;fMqrkuy#S$A#IT^X zaoJmM-5J8#Iu5sj!3&uds@ir5mw=x`63)z$r&dkPk(H}e(Hl%MBl-N)vo!oLIm&Bk z^#I8SiN2bvno%B&)H+)P2$Yr1^dtZ#D+>_BkZ*nc3efyUaIwQd-B^-NI{4VJerQvd zcaF}j_PRAT-MLl=_~i`oChXUWiQb}=*kRO&V#eB2xz#`#!<0(@b%)!(7H*l1-l2WK z@2-c&$ymu+S!PmCu&Q=rYhC$uN?@?ERhYMM=}k$`$`KPBH`y=Cay-_*bRCAa1FBzN zv~h;-eU-S{X)4S#>r*9lpN+584wle{9Dy#>D~qo7d>>by_JzvY?#*U~N;uN%*M(VJ z6jxji#kJZZ!)KaKOucEP5}uJ~oMtj6_7-;P7EaO{%Q3z+Q!qh-V@^X29@Qn`!Fu(?^+bYwI}`Qq7+&-A_>i^sHKgFnI@ z5t+a3SpD=gb6?aJT={%o6^N!}6YY(PTJnTUXxazwdvo3=9;!v!fNZ9}ukJb9#5R}> zw6JO~t@6XnSEO7+o9LVp>W~G{`GZu;)Z3XH50*I6EPuD(^TKxnN{rUrDOS0i@1oY& zaw=x#z-iBr9@9_n#P%r2xi+h;<`@LfpS^D4NVFcUuk{8{C*DwPK!Jy;!CY=kqiHQs z2N30h*)zx=;io!(6wCcNXEFqA`hJAgWO;=TCVQwNJw<>wDh1D`8g1dBO`~?^nwP4- z7dzoeiEb(%31{8FWfGNZxqFQk5gb6C+{lEY*30yf!otC|qZ_eBJ~RKOzx#L>=QWEG z=jah6x6N8?C+#BjsrWtDUQ;}z?`;%DmY%rEWpK_UIET1}{3q4?sV+wD{IBLzncOY# zA6H%?Y=rN!XfE)MZ*{u|O}ez89Gi6Oa|ixE^_JLYwg5TEIz-kSU72UKF-XPazGVj3 zg}-Fud68bPR|+B7M7^8ryC@Qq2ZG;RSz_sZ+XoHU6e;#+P0RroM&Ub^65;VB_LdTX zNRI#X2=|>EZoXu@M|cNHBrzdh|z+ub@55coO;7E9E*?>D^MoDPbG< z`Q^K;%8@5Pq6<9i;RzvuVf`B`a)N;#r7F>Z^fYM59ta-D02Bx1{^+ml4Kiz~aeCg!g*un*rF7#Lr~qMawMRe_b}u zV@?=S*WM_=Zy=ZV;bPlFgZV4Wa5byee<>&6y{q{k9SQnv=|1z;h1rk+A@P*re>6F^ z2A%Y^0QViaV-Auj))uo%4UMcGl#ZfZ3Gj7k{cLsZ*gO2|CYt< zbdd?W>BMbH=jI<#f0MY`m%p;

u4!)iw&>rhJtOD$rsF|>_WADk+oTKP9E)|>L~r+ zb8Fayau5$J`658Hrn~4(XH)b0Q5_IM6}nqmH{W=N@IovJO7Gj6;zcU&0|*Fn9ir&U z1tf8D4Bp7ZNLFPs@ot3QH(@~{eXu^56gRM;3VntJcIkqR&ejhg%-q5&ZsbF;{#WQA zM{>ntb^^knFlzA2-~(MvD5x;M_N48PQ72cr%K3jl!@hAN-&A_@Ls%(r;SM+rRU`@< zlH!&Np3QsjnSd-J)UY!<+|Asd_8fYN4QzE;W!>h>Q4aHNlVJ7BsCqIJIW?2$N&Rpo z?na7U-$K#IYmz;bv=DU^69ZSKSM43+Gk@25wjxb@A>u}+hN=xErXE1;o z`{ihP8vQ9>qcisdNR(Dsl470R2|G$DpkN z(*n8_r^>iOWC_{J?$K+X9Wfr&tp?_0l|L-iAPJoa zj64J6*T!e%ZwyN}OzZ__Bw1VX6N~fIs`?R8w+@&24*J0uAL7eY(G)vYJ(mb>!_XlK z5(t2x8JoTt{X+j*dapXvC6?Z_n{J=igg_13H`Y#$U_mU4Kl+t~(n%eK3EmtCc%Lbr z*Brr(B)%m7hQkqJ_`|wip|XqlxpjncjktDg6#J624@K?l2zE0D z@u#twp6$22Kr)UChiALjgZncfT7Q8K<|HA;R)9fPRXvyngH_u7bN>{HTfCU0rw+JTWm`^9|5>k%NVYP~-VvwUF{d zY`Bk{Vmt4&08!;?6RHEuZYe&Y^)+QFKbP57;-`=^*B6iu>Rslh zw2X>{){HSL1oL#`XIxGrni%U$@?9+*0z{ua?F~ZqF(gd=W~U?*kg$>I@9KH?>x|CGuTx$t@q78P=-YnJ|ahXzU}CEzAarRT|kwyD&3Ys%OV!su`;=R!j-=GrE2{5 z)vrPpz^ICehN0*UeeM>_m04F_jRQ=(Ue{w*@=0Sp&ueRW{H3dr#1@lsMeDAVfKWfLky z!ZYH{*|ZXp(HMdIuu~&eJM=J0Hqyy;O%PiGozCXPqt>0Sg2A2$FbUT1<&0-URY6@0 zJp;+pCt&I7^eZFpR^v?VK9lBk@_dj(9^5grJ(Bp4umtJlY5x?MvjKRM=(&ZNTO*aZ z+F!izboM{HunAg{eb3*tzJ$Aa`wssIzh>it2pf>RHu?e{X-|zlZ03J460VF#sy6iz z*ZxehEajfJkuCPNAE24Lc-}Q7LOL(G|Eu**rH*3j*t?P>deRe>W(ky${B^S;769*a zud{}NTg)sFF}GI0^nJ8hhtzv*#H;fw*M)9dgA@{L3u;(+Qr=EJfo!Wk|6ZysUr8SK zwbCMcV-57uMX6MNoAv(a(9q+R5ppd#h!!tt;hC-eQN*3mb#CO{N#%R{kO$&<2q%sd z>vs{OggHgJ*_^Z=+ysOWd3 z{ju3&$TJyOKIW=K-n#8_yo^LMC2F8Ae|4HZIp)r4xzgZ_Z%tH3z7at5+U-F#dDItN z)pKjuY#tdRwDEVXFH@^8@8oSWZ&|bRTaKpf%6{A-nNe>n^0WAx_>iDvFssgUtF(?J zaG0Q*a)IpTs!yl&ub)6i=sm%cup!`JvEsdXtTzr4M$ak%nvMpg;_<1lRHN>wz9gC> z4+l-FF#`GgxsRV!6kujusfw8g_;Wmrp2a4W)8|nGSEnB{N!`w!5McG!?7H&m0dG(W zEu3JDzO07!X0|e-GL!)6+55yO@`#Nr%E?@qWGL@s5!STVDs{KP3@sWf^-VZuJ$mY? z!jnQ=Jb%jdX$z(vy|<)g7>#Zp>`Dvfe#PHsIy>VtgRN%0B-F-Q^6OmQ;z!zC_N|*g zlZ_g6iArae8!DPh?f+=!CRi}%Vw0@QC>Mur-qBQAseQ-$=5zm=YYiCJ{0BO z9pFvOe+Uro&YEGJQ*3(@51N?2;T(OUdkNCV{VI%7*~2n~&cPCz_=kru=HHogJ7p4q zS#}OaPy1oZ8ccEd_)ce@Q_;gs&)y@D1L9EWXwL=r1>gT@h27D@*3rCuO`ULsV-wuF zw@yG)_6%F}2C-*HS+_nIPu3D8~WTolL!IQf>&C+b2gc$BkhmJ^u2{+rH3^e&;8Va#lLU{sRM-(WPFUY;>mcBcK~w+6%6BHwOM21ac)yRf zfrrl!TAr${DBnQ}za>Ir2|niq>}@Qh+V$8rRcPVM-xJNN|4B4xG*Rn8KZ=am4=FWY z;Q@?(eZ_JcFujJ5K3@z9x+m!C=qb1%}If#XbUqfAXlo1mnjY_%PJ zAjUa~&pX6lY<=?d0jTbclLRyD>NSJWS>q%zbLrb)2+f@apreW14~pY`QK)&bu$qw|3Mc<2i`P%Kn?eaeli8r*bODlTY$yh8qt_4m(Fo3MPG zdmDwNDJZ92& z>ILcMm}yFT04EqudtN}6X5Ls&9foGcp{w9WVu}-M&AC7IdY8_f>_BYlQjTD{*UWq- zl5ZyO!rM~w9l!nNcO8MR%RgMkd%dpDlS6+}Z220&ySe%Lt?m=-4e|fm^UX5YZo`1m zL9k0Y1Lo+pMgs-dhm~i_;3n)QIeMj|?OD#eKY$*qIJ8jd5EknX;*47y*#8U*cI%Xj za8de@A9$WlgU#gCo`Pn|{I9pV$^%#*B9dxZ`$2ch0R6=-gV5}AuY6`9k!H9cC`BKA z`b^!kZ*k<%RyoYA*@f=+p4Vhk2+_Zv{Q@EJp&MEXC)g6*ien2{eKPSJYR8QYifniG zv6z96H;*keb+KK`bz~-)yK(itqt07wNnPNv;5({kFs_OFig#~4<@)6{D4p4G0o$u7 z?h*=QeZah9nG6=I4&{&!1`Iv~OMY!XRO5I`rV*|R)XbTbwsvc+e|1m zy-*dy(kEkBp19>e_hieNc`^8V-15sw+GZg?>Jqzr&A> zqYU8bXXOY(&r*^YxhMo2rYU_D*Nqk4ugXB=1MK*Y#_o2~af zwhr@FhnirUO2<%`L+HD6$58^+XZ;u=lU{Y8V&v%-AAbRN`X4D#wc_VHK)nUl+3&e7 zt>3oa=)SZ{8P-oPO2;$$Ws#VQ>2q0`K7_hO09EFDv6xxRgBv)c?(>gAemx~wE}K*GwS{~R zzx8v(5uL-TPGqVs*`E|U&5z$+GvTw#gadddsflM zEeT|j6%^_`AUa7zN?iWn{p3=}5n)9lpH*rK)ZCPUbnWbGm`xKFk3}l!XcKM=sBExi zHtR;-^h>Xv=-->~lcxS5G>4aDKTZe;h$vpOy(YC1A?-?}tlpj}zy zBmNS{aH2eo?tJhME+sVuZTxA-ke_I&)l9%+7MVN8jpWt*UeJlEDarhL=!$XlW3487 zVSb|>ETUq%os~0D(+!Z55NLE>e?Vvy{9c5#Yf6ux08oKLoxx$sLmvZfiM2wWwM6BIFb*@>L81*d{%59~+79ZZar)rnCsK?3xRO81#762fiy zb~cO4nDdWyf0)gLZ@wyp@cpp$E8PPa&i5guPb={4XopGo77D@E>_iggH=YVc_)GO0 zecuSTDG5FxY{E+_^fOBpxRf;HI)A&(h9Bzk)&5D1B5b5r2)5pOc8>1B zj)E=4UrP`vfAlu{gC#GAg{*l$cxhBk2s5&@vSG2FzbX|hSq%95Ja+E-w9w{>YUcU! zXRkomh4ERiZdkBpIne6QM5~yit7bx-uJ1xABNez|{ei*0(370rW<}CXYU!u-`G-A} zH4hRLevzx+QW$3x9vFV_2Yy`8Las@lHJGLgn0ZSdJb66Ysvud-xr4?w?ZU7KQ^K{; z*$k&vJ}%x-sDqMx_2)b55!pkH0(8yqvHFs24PIp>pNh%^+f{PZ!ReAuJ9kxJiX}}A zt0uCVjO;6X4(n?48=Z3>QG7*RL8*V20Kb6yke4S&)#@}*5u;jr5sg*8lqZU9yEk-R}n-Y9$ zNtIT~$|td-JCJkogBsl|%5sKaaA0f(n=$0PG!|+{N265~O4K1SNgT zp}t!~50jUhu}Yab;nS(Vd^%Bw0Qi|zVXuT^lG(g^l?)<0Ps|&gH*qGEj3VRhYPd4(qU-4V6PN$}#wVbdd`w6&ugK!- zx^BUb=7!mR4*gmc`DxppXK=|D>z!z3zFbskGqP7_9{w0ek*ke77^tHh(lLsdy-zBk z8^Ik-HI~!~06&(WaL!jgIDdDB)_`qu=JE%Bx}mzs92#zqRVbh7wTmzaY8u8yQe<|X4~CGkfYM*w~!X2J3O zPLQ+-u`?(smt|uKm;G7^%Yb(g?K_cl*8t{bRc3 zlZvxeoa;X}ohR!t<_v?%?t`n2#ElEuv0@d`6%{KdhRgD>A4HXpUkV0POpfE7xM5F8 zz@1Ggq+Uql@89?!jurDD=n2!kE+cNWopT+vSIOzZl@-Uhxyf1J5U}*SV%xE&Vx@& z3HCmAk4-7_+4GeFxeTNgw(=foP2fJ)bXNwV@x!Okj#0;S*p@_y$t)5v0alln6%CR8 zl*~2Jv7hyZ7}}AN<(1d8_$n$Rjx&YTbREKf*(eG+>|yUp#c3*+k*g2U761uU&cIzd zo_{L0A-$Zp3lqA?s`}wSnYGpCS$R6wpdl_eQEOSg(|J>vSN)DjoBCtH^{GDQ?ue0Q zGHqu*k6A#|{oe)sxd*Lk-Ld4UV8@YY13+zKPP&3yVs>Gh+&!1Kh9Ux++1FyO+MDI- zzZU{xy9gicRoUa1N-$+aYMA2Cd}MMQVPfHp_yVM9?fT5@T}1xVP=P7p0Eo;p!dUVz zHOA9DtHkNYc>mVM1As62!0QvP+e$zPHPZ z+nX|T@lljBY>zvIavw#pXKj_yeVCazZgR2qe*t?c?0B+ABm>m;Z3CWM-1W>a*`K`S zVWTwCba$;!pN!2;V1h ze_$_%eUR`nm?(?qHkdN;--%@ybnl+@?7N)ZSr7i>;lB?+++YOli) z9^fZ5X)6hQ%cHSdzoM;Out0io9p~g3lC}Jjj6ke&aoi>ZE!$RDw!$I&(KGwf?7DI2 zq%fD0vD^+33pJb7dI@JA(p%5^_LRqzp)9;klq7#4E0>8j^U3+aI&G1UdO)$ zZtV_$l}czByK&rPoT4@z$sxD4=#(qw3RmWISDMk*3vj26e}A!4I%oFgKGTCgmrFTS zFk9smIx6X`T?2`Rx7ifm9VtEwhCI}rQFe?cU*ojqote(}YV1z%OAwJK03>i%p{fXhx=5?(`DcGzH5 zP<&(a(4~{`QYRBVsqQFC;5B8nUOX8()%JW!la!>&@()>{6eVWNQ%4LiE{A z%V5{UCpI4JGjyssw&Hh8Wm z`C}Z!Z+922o4T(q%Wf}M>-;fwS&J-JLH&J^wP+D>Mm zzsD~ay}$3LYQ83FS$$E2s>!q`G*kUZr|$}xZHpyq_`$A)w`b(PfbD=i^V3TQ2@?m< zD1koyGNUH_wgVa?XJ61F-HP#O(DQk!4VNaKIHj*jE5vcvrx}V#-sGV0@BFPXGDT2Q z9&I;QqGse-ZEgsd2%}gJ+-Gy6mL6RcG_2qMeO`HcoiyB2PjU`M55`1Nt<`}gPP$rw z{+-N&Szm=@KaEU!lrGeinrmjMsbNm^k)CUFrmj!7um?{|z?#({wt>cmS?dk&K zZfIe$R@qwlz*Kx%m#@qzK5~AZHfy8&aoGtTGV%4cpZo3esQx?w!v*0L(^xu(y_2!{ zEPK+ki$cAy0z2~t2OvJwb@|D>}uJa z5P&wztR%m&dm-vDVKKS7w)FR1*s!d0zf6go z-0D3~4;QKXo$Zwr^!vW1A9F0r=DxtXp|C#zm9zzJl$*|M8SmW)7LsZ@4$Fy^Kd#z) z<}#I#|0^QFn0^7jRQozyZl{~w?9eH7Exk>6P|Og4r@3$2Qecl^|5GXp(4+Yv??f~h zbj=)DK)5Qdr?&~`vnbO$L6`g1pIdXmM;C4}{%t$2)Oc=hutTmW{frBV5{WlfV#MrF z>%5s`0ot#*M#_$5LP@b*LE~lhw@jhddaSwCguVQtq@E<#^8&Ohxq3HsESCiSw_X0{ zq<9Ytn_>zw7BDRf4DcH34P8Z#>RsNEdu5WGm+F(&@9ai%99EWX*2dlcrV_?7XoA7> zT&JiP#GucpWTRmTue-yMzP+*gYQgR*dQ0Jn$c^mudrN;VMGb-p~rbQWW=S@k_i!aYMdb&iRyhp*DZKkVZjSV;r07rExa1uHyaw zLZ5IEXYSoupNEiI|0RvqH=IhrsEIBG|910df=k?{Uz@DxkaMk!;)7fji)oHmy%z&<~?~rg4x1S;x(u1{r zkYLDTws0ybn||HBBo|R4MBCMw z8oK&CF?8QMdh6+)SRr*iPl-2_2lqmt+v$I%RpKJ+K2)3+DTZolC&VBn){mt$YxU$u z9UBS7uUpaM9ts3u<$DJ|MDHQHzpxI+G}Ky(63|Jhq39I%Q>S!#*ceHpUhFIzV?DR4S+RqR8By%DtxQmL0QlFWY;9W>M7I|k zVwe<3C;)qjW&eAxxuAziG*^}VETfz7Dj+j;!jv&&vd`Q-^YiVt47(iOUgNrio=qn| zyc

L2GYt?a?L@Qy4u}XZ2BEDk$+lb-f+GAgtFQ#jkoowhbDftxjk{)g-kDk z86@~=d0hC+3%+O;u%KNNDGD66E)n{S)+A^5WJ_74E=9Q}7Q=U)hmY&nVxpMKP9Cwv z+*M!6W3L=7S2f(F-u57{T>t_K&9a~;v~F?@yG9QExD4`!vw%(0LEh7+N}hMz zYXGRFX!KbDALDw0ZWDS>#c8R)$k8;an!MHm;#G$GdksLIHlf*LZ81P*YHEj3d=E(nM=#FC{#SaW73E|QizlYZZIE*){t6grN z1Awm1x#lkG1wfuH7T`uai23E4EOg4;0-K>+_G&V8XYs|WKgY?80SDKwDZ$BoK_euM ztrgCmt3pwdF<%=U!mV{^j=P%JzFg|5JvA@5{5YA?beqtIcF8ZdDkj{4TrT4Md6C&k3OQ|A%A&y{noa`eT%<;EaC zGb!rTa^^{SoS+ITIAqe3QT+C#?PhYo7z6RQqdl4wbA13@9$jt-v8-PU<~(_HS=n~v zelzHJ-2`=tyU1a=%*iR;j7Od&;}=$}(FbL@eDbKRQN_zxvJm?5j%e-DZnzNK@Oszx zP0UTTt8%X4U4?%r{7KT+Uh5k6Cb>*=*JJbx$h>(5<$R*rXQfbMBl&T(MZ){%I7A@9 zX~75bDMiekhOCgx)v4#1K~&GJ2o5BosZeUxbAEQp&E(EczJS5pc>w?h7O1H&vVz=j zEkK9Ywj+o|9I)WDlP(^eRJZGO__&0gBIhOTOzr{8&N>H2`ql2<%`RY0vXphnQ7G)| z&1=}#_xvUB;y*HMz1NkOY^9i(N<1^hey zXmI@Fwp7#{p`DH~Z|YQH=>vmzc6j~lnqSlEAFF&V=|&q_x9nT+^-@_z7HI_cT~^d{Mr(@?|QaPT{VEdl&Sb}E`d2d`kq zl?mx&YG3SG4`hFnY6=^T>!CaiCF5)^C0+Twt{$G0*xGpN{8y-3RYrWAg6(a4kvcg+ z`f0S|?T)@oKz*Z3A1Zy&`g^6Fy`8Ls1dr%3SMo1jgGWhk_r>%mIBB73Jx-sU{^XcX z=ERb|Vp@Sqg*QLTxIJ#t#E**CIsuUF6)S&Y;7mmhb%k4LSn~omJL1AjNRpI@ zo9VfrZcp!lAn|0DRl2;~>diVZ2K_3j9HYVYoP@xg$w>kQ(92OjtGH2y?Z1FU`EMlq z*{m0Q{tzz5p~jJa$)<*=H|9HbXiDcfdls6T8^#z5hv%*?*azh)IrNdCv)wF<+bfCi zpLF~>BNCe|QaG6xGh9EoC;A~Sb?14;!~4Pr-M}Vdx9O}R<*vh4FWB$T@LhrY={9r# z_IZjwegf6lOu`fA2{Et4{RLQg10MejQROOf1)}n&I>Z^ zCH$@NE(Lcw>(N73e};%cbSGof9<*H+w*eJKR6H3Mj6n)B?}2$ko9Te-ae-KuO-k}3 zo0sNAxAVAGZ*aKZj&3HlT9gi%=3WVr!EE zx9sPW4COtoYfZx}J2W8?V9g-t6URpO_{MCP=a^%d5bsni5e`N$V_sOn_LgN_yZR>_ zEy3fObi2-SotM)Bf#i~$n$C=1n_dpJn4|_k1uy93EP;?7M{D*@e#Zvx?Y@ z+Tu2Jq-&{l+D6#aSsFG;AbvD83X#|ed3ZFs5JzM?^nV>K$LArP_p8JY{{^W08hSAO zc$`9WEt%@i2`}W)5e$8knGuMAu9-FCjbcQ5?+-W*-v|@pf8V;^M9RlBT z(e?Q*YP?7FgyBQNOgaKD*6Ar6WeK)xU%!CGAklrA9;2dgTNyf#3o98j_rsiG#h{{X zi5&8^jB;gq^JR&we0OU@`X37%mGp6FC!!KllyC}u!*$_K(YFj5TH3fCN@|-a+zMi|=|0?#@$-1BD0viu0s*jvoX>VO1kGA!Hgvpyog{K?! z%M{j70u@5@-CO}aYxTMD;Ax(6@~7KxwR$x68$s2aD)NQRif;1kfWQ)=b^(09@#isx z6#9Go(`7a(bXu{5vHUg2y{1#7(PdA zX|GK?9R_-o8c}>gC`Hdr8DU$u@(<4%b_|~rgXQQdEXO2_*uc3yMzExIpz)yTo!&$h z7H3qXMgjTjSCH1Wo>Bh`!P}p9Iy4lc5ej1*>(P6HzUh9Ah)87g#OJ(h{)!$AU2KWFF(-@ zW@xS0>!L#We0h9cAm%LzXYUp;AT_FD2r$J4QE4R+@2?0{@6j*U?{Luv1 zjyIr}__?@x|HWc7^dw4$dr1%Cn0Q}jislU^A-ol74lSV<4p?=Pl6Iq$Gx2OByMjYD z-qdDnc_(#G95g7=xq*>RloDrf0`^~9@8xN`WO+W2JE8fZJDX;Q3pXf#Z#JMS;#+PEw!_ZH3X%M-Mrz zC2}7ui=y)z_mX1V<*WwMioF;OIoas&Tr`sKWeykxHy7EoUsirmVNaKp`)OU5Pch3DF^qzxT=( zgymZJR3{j7YBC_4bXz5#SSh5=@RXajBw`+DH*aNEr9kspRanaz$?QT{eg01T3GtjI z@Kt3fWm(5erk6Y2%DfTt_brph87$XUbr@S18h`YmGvc$oyl?04l^v+1wh7bM z`^%M2bhn{JpqZa4r7?#jZoAFGM$^YqOs56(gcki1k61xC7QJJv|Jos?UI^yuW82I* zf!LYWSc*Et6b(vZgI;oJL7Qby`;(gv&34%iWAP9AQLDZuDY;d9oA(Zi-wO`SNOH$Q z`_kQw!l?Jdn0RA#T4E+|V?sYHhBz6*D}FsHoAxUc9#j*-Nm|=wgks~w`{G}cWut>H zV9#(~-R2KCzV$vvibcep z)~w;nmEEm!g1x_m@}tj$1@tqXm{XfaT97Ecammp|$JbT}^6}C@FRz7h=QGye0tvDj zroVzT}t~WL%rNi6#kO8-A{#C$;6#M0OvXU#`pE_ ztAvlhYv(`EhKFO|NNlWlJbOGSZkmPFr0Yk&&{lM^|3xwi>Q*tLLq6s7L){{mA| z+aK;{O~l?>yWv>oOd?5QwB?QHiq<@a{PafsDpW|snN8FSI9aKPlQLm?M}Q&^`==Xr z1wdfbD_V;-ZX^@#)Qo}30(8FU&94sXTW1wxn)MYvJ+9Zs!^}U zy=hG%@k@SVdx;@#Sj+V^;|roMDBd3A3tluT#%! z)9XK__Ad|)TT>8!Lq58$@dgSe8n?9enWXYRo*ANwTI=t9sm`*@QNeG*v(aPtbxdos zfm5_rGr}CJ)T2)r=~Z>`XvIavqYqy51z%)P+$u*se}jFB&AbYsnJ!N2Qk%v1nRxmv z_^anaR9qu97ZYaF=W3_zy6%qO{kN~%dWW}xST9@8a-tPg>3>poqlJPCh*5W%+>44A zIO({2q!#Qw;7xP}UpSes^^*r*K9w^Zd3QZ-D5FS|1maiY(9Ec*Hp4!ESW_hjH{9G@ zjIJT;=d9R}TPva{WukdF8G!ji31I4;_4r4NLBkSG%w#?{CuVQ_fb{i>h0S{~CcmHT zJz!9fT{oHRPBq~3;*$ocnNEQ_)xR_~X1C7J(2Oo(&KqhpU-UG1Av9xagU5F2cAC5v zp9k6)tj&v-taNS{rv<#$F=reU?)viR+2@>>6>q^Z;t64aTLsLl7G&gzbYB#dNkD8c z09{q?HEF{rroB{X^Oha^Mo9 z8txeCr{EWjZ?KXvT;)6kygG%yeOjOx_?f?S3R~6NDS5vzm45x4LL<(F> zF!skEGl&Y*M_0ZoVwTg)5Y);1%1d`{4RDXO?FF&n zx>-@-oig#k*y9VMWcr|9QlkyH)xJho{G;-=p5x8!?$(kqhf6G(>a3=t-O4Oc>1E7> z!#&|qhi?ljGu+y^ z1=^Tv!R$2)x$e;WFc|8bxlU94&d#wJsg;4p=Z7B}){2BuP{$}SL;tI;DJ(c-EQRz1 zNGS(KFLB7!6r_D2RV7gMr8N0|6Og{z!M9F~*J$eCFRFfgR?+;jke6z?vz$@bB6@h@frfR&XfxZ$*B60Pf&rP!;`HD+F5;e?SCJBFzndR2 zwl>^4YP@~eh#alP8N?-h;=O0oBB#1c8{YpcG9`EY6*1{op3GQrQ*{_lwWXr)HqRYv zW8CHatKDp=8(zRsEg(s6EuWTq^EY*z_76$OKXFB#N#2hwnfrK4WcvlShWAR#b*SW; zx6Q}R#0oFC5j#*|VEG5+a-gky7pjkDs%i393oR$(L(BYBCT656 z&TO1)jIL?YrBP|WZkt${sH#K{mZ}GD=L9U|jF4jfv&jSDS9HT3z_o{1=WLy2%A#B~ zDdJa8j_MiwOKVa}2~hkUbK|Lbg>8^EqJ@_m%n@2CeU>oeqJVlM6S$uT zwETUDySKz(i`B<%qUw9oIUZBoI{g#SliAO2MLVq7p^>Fe9>Yym7hkn@P&s{)f1!-4 zQn=X~72fY-W#w()#``E!*Q)bPqIcV<@=$iMBiK&Rq5?Y?iuHMhm8A|lN0?vWtr0lv zmT5@+mzCA&XHjf$vyEJ9`{Xmu9FG^%WB&Ce#ZQ08FoYUi#qC5C4=MkahZ8tw6+=8z zMsmP!m~u@We#hE&qi+Le>7v%2qp_ay)D}4LuI$LWidnB5PJ2queY%}Dekie#^1_!f zWC|^10nZ(wVA)^n(H^!-b}{hJLz0{j+Td%6tqA}23W7{M+8XydyO-x+1nAmO7KXFa z!t3IPlSOOuAdx-qa86A_LCo8N$OQ|phQ&Nz{-sBnX#*eEmwxsOw-76H#ca%&SM?&k zM@PxHuMuUb$zQxRozfsbTUdEuJv#)Ij;&ZpWIwskie+1Lvw{P}a) z*-8Gu5~t+fR1v#(b@CPhOBz|kdvb)wz>?{6l^3zG;-U2ZRc-7H`hnQ;!ngle`9scy z`kB;Q*eKbDSKzk<(QJypxaTNjlpYV6h|q1yjb_GOT+fLY&jY69EOa_tq)UBwj}lB{ zw|~J6)B#>Cd5GE>n8nEHplh0yTaCBY>aKlJzq3@E{O?zq*2h~P$$$>fM;p7U33mi; zWW^^-vziZ{b&isay3WI97xIa}cnr+TX{}l-zHO{KTxE^`Nts%{@gE6G?cPPIsT0>DmPmND*LQthG zpL!@+Oi`n>V*sH3AS#bXUP4~j-{DXWpQC?$1+?nrD|*j)-1}AiTbN3LO-yR2U3;XQCWMK8!g6#nzIWv5#`u!IzKXaSJAvx=zXl;GpKh?)}`nma}4CjrMuLyOj=;bKokqV&E^J)?fu~my2*Q%Zhy@_j)Gu}}00n55xkvr;!$hPH$ zOX=&=2mK2AW1WKsW>Oc1=|7r^d;2*}z^b$0iz_Dz7}KovMJeVOy6Vj=oL|rV3=3Ya zwde37NKpbIpGiwG^o#D!m~78Tz+w$rHtJsNAAjCqr^654a>u})U zN)`nLO2$S}o|q3tQCjivO7cc9qSp`|b{{?oyPBA(GHWQ@yfxrlq!d_5htYd2JXC-% z7Ch(AkYg>oA~b}l`l5Od>EV0QcuVYPg?0HM_rvbyqT{DU^_-17F5163Nd4jK>*v~o zO0S4d+E2U9O=fdxK42lhbBkMUdl7b8i9XvZM+#Vr7OrK<2)y)s)E$EaTJ3~8;#(iH z8E;5w0mGHvi581Lnx{K7=3QuGv+`-0@>{O@;3htl<@P_moXtt>lu0G)DPsw63;ynt zR?~hjRyWZFDL|*W2rqH>U?p}sbLD))p1je?=4igVU&I4J!BIx1X&rc5yja7ZFrI$#lj`S zQtGba}{nKGxnKisv>cl!@t*+y{>nD)!s$$Ym?ctufaPewZ9 z10(7n%eFt82~!g{Yi_8eH-Q+(A%2tld@Y$fV(gdQL^}>91U0=xwosx*c4c$nbwwWWw&j@=b_ivI0D4t2|U8to?*Jc;BDBJKulUgNWvh zfGxcxVl@_TMbl;a=i;YaV_OlISw|u_rrcUHIK>!2$kaq<0nlh3HULfVcc#AYbML#U z*!S8E+InJ5wWk}*8d*j@Ya(Y7W#!d1^zlJ~5;%YR8|$ns9d@IhX2`;~ekoISGOM!w zvJS!`qFCwbm!?Q^tDjt$!TuvY2QZ(OVsgNQ=n;p(kO~q9W0~??2#azoHYyX?-e zfnCff#gb^)Q}%^~J3X`-b_h0D~tsF$mjLteErO3kx?s_LR6vxuNyt0|sAl8GltT8~iV!NR1aCY^IRFoK|UP zA?B>=R~8gNc8=;mB~zTI>=@iY*`SK2CG4N*>HQTEei~}OpC%?z^Y=`1J?IVBl)t;- zhJ;Laz3AcA8WYCUd}`k;glLoRr5OhI9!jrTQDuJ>%S*V?eQ_9-K~3}`^1d+zea|Pv z3xKXe82XklC0f(Zq0PPT{NO@YZe=QB3B@v?+?M1-%#T9XH38T=wY1-}z$EXdbacWQ z`zRsceo?>8F}n1s-mQcii9$AtINT5@27AIW%Sv?S9FT6kfJ666w{9$1^gahGhag~K zwl!`-EilBG2NeQb@2V>GLpOS(+Her26=4v(j<6cP@A|fV+c?T~d8K7kJqCY&()Cjt zQ<9285V!!XBlnv!_xqdB84&&l<`?#Z7r5N~KAgX;)Zl`sLg?Gzh&P@!WXJ$t?jAzG zvlEXUyKuize7Fa2 zy*vrZ&#xUkqf*WPYM$6jH4TYJRvY(2PQ>a3Tf8 z#+0d#E0OHVZsQNc!yjgV9fh1qvM4=%_M1e3ztXgK^L~@-#*Lw18@fPVCVUzBNO_z& zf&XiaD~qSfMK_S=To_;XwJ?L~4ax8gya&#$vMv?WnPIAhvH_0()6P2K(u&@JLMt2g zR|CNNDXxL#G)Lw`;oS|4^ZRo$AlX#%&IZMW&8PI$;sZs<-ZFbo02r;jNt#%kOn&=L zjF>QLy5D0PE0&9~HC6ebav>#F0vQtFLFY!V|5Pw@bdKW>gscY9<_43j4wDZjpNNs@ z$_R>Ueec;o1jUIhTP}lGdvXytxBkQFEXrZ+#-&kMZQjPC*~xWJvki#yZ;1g%s?2kj zR?LFuLK%m2RUc;)=8+L=CU%*sf>f__?J51ih)??6Dr#A>*-QoHudffOZ8``^^mq%6 z+-1*7R`EO*SC+7ml_%DU=t{JXP$u~0W}Ar+cs4>2l?9}z5-e(L_i7mIHQkh1$To{2 zm#b~}(rLeb-zCIDY94au^1cFeiI}XVo+Gx*Uy;EwH_`wBX5{`mMh>5MDv%jd^{|2l z!KjCru>y<}BK&gU4-4;Z-iM3B#1k;E_hHuG8`fT*z~~0L8%mOAj2uGkP(8cyi+dH$@cxTLJ ztsSD$6R+g;s)1)1n-|^)&oZtrWOBPj^O=#J`sC=@O-f9ZkfjYsf3Bv9@stPd@d;R0 zJ9l=DOU{)Dc}|YILyR+wQ%fRC5D`nSj2Ra~^%@R>d1bl_opcQ-F(z&st%Y4qW;d8B-c9-##21`yC}h^&^n57?!#i*v~3LhKYx&=Ezng!l*$*7=dWI%OLS&1#DG%0HDWZXGT z;Iz!J0^gYFSoE(b4zIQ4_! z2HQPv-$QvjE=_FM=zue8=Fy zbwC2P%4nE=+f(oOZe}ze7gDXRCk#^U_}17|p7`q{T4@AmL|Kf8#axtD(C-I@Wg4eQ zaa!oB;)2O_tKHCm#fEe8dRMM}N_v$>A?g7>qc|x-c`+NS_sD=$ZDr|y@Fz$3+wx&L zyESKRaq;VyTj-s<{34DtALKRNGx=DVBo1|<@kc9NH`Dhz;SF?`2iUN4r)$9lsfu9Z zJ6RGW{6~@B>8Q-&#|BQhPgoB+09wr?MhBC-MXDAg z)9QZRc6l+91ak619QR`cDb}sgNU#6C8S<)Ffc};f04~Tg%>f!NP%UV2$k_iZcAQ)+ zLOU5m-c48otf>;&|5wVK!x(i}dKZ8{@ssT<#PZnrzx$1O-`o$rs|i522+6;W zCjY;Bt~GdM;KS1>bD5cZAF%$?d~D2{7}IFU1ceo7xIDOi7g;ye8vsHJtw=k1`QS=r@wf4ufkxUb%jH8(T+i1U__QsIluzSLOZ*ajg$)c|`{(C%Df~7P?|CJ({50Ayk)bc{SyrDM zAB2ae(@^1E8tFa&(}`9Ubf%)t3a+7WFx=xbv6(G}B!Rqt3E?hMPAH3Df!f&yXvrQi zV-N5r$6Ww_Aq(wx*2-_**UqcVJUt8q&l4u&{Fkg6t$ssYy-5&TT%ue%#^^K#37J>q z44AQU_`U81t6D${32Ww)*D4x4=0B^Lm*h-G017KD|0%w5;#r3<`%{7J|5~op3Vs~U z9pIhRv7a(4Z@aPZq~2GXus_d%n68u=*v*w=C?m4k5B+{mO^HW6MH)>#sNTzAqbo zJl$xxdY8Tb5PCvF{$6*AKF!95ShvBNL9w%fvuf7zW|N{-ss~743lGm=87+hUSLfTo zL;Jld3`i3D%rM+g4m+_=|Nk2V-PL3xveO4lY@|s+e+6PVpupvdTcT&(uOM?gm)}w; zTq_^7*JWP|NUz~8Yd#v5BWl21`Yr7XSm0FT$rlOuhWACPtlhQ-o;U-LT2G2!v4(RE3BoUfkaKHf~HSUgedBzR&pl))nI01X&+=LLtB4AeR&DaBnKWxU~7J(9>O?uRx zhH0wNcYE(tf3)4T2*4U}HTo~O(4p!#0I@wj1Ej=*D|oBx-oE7qC`0z6+q@Dv1C~rF zg(Qc?7O0y~A4wM<=AOS$)FhymKJ%Ku0SWw_!Judw)hZAFbV!lt2&wPmo}(^eoiPgw zByr{jZzf6NTZ;zLe2=Q42~MMHG44-Gf5Z~9m`&Il+v|aYEuHc@8m9YQc*QZ`UCAF( ziUz}l-xUw+WI|o^`=p+UK%cF;I_|6Ar}$Y@JDcVwNivUT5{#WLhrWFE{*EuRyb58G zl&{}Nt+~HSqOG;%b0l=ypOUbfQNooZZ|Jv=aC;5R&oqORcRBJ;4G1dG6Jckcj@}YY z4TTk2ab8EdkySjvHEU0)aPRlJsNiM*1Ln|0-t-pWO)Ek1>#<(6SF-SaHE!ckyi!c{ zMMcD5CB@CH0aCzFg#2(%aT-;0d4nZZ06PO=3j=_9AKTp#Z26CBG?#qNJzSij;RUn^nKA< zcRO#bcS!kn-w_}RHUDg`_AoRl9hgy)=1s5mmy7u^GF~1)1~nvw?7X@>%BU4|4V!3I z(3_8+-t12qd=;t>4$O)+v%CNf!yRbY zI?s91D8T6(6?C_OF5unYAHJ*q+h5v$&2L8fxAoO~^&jqzhjJN>FaYn4_~)*gmTHl* HMezRv#Mhv* literal 0 HcmV?d00001 diff --git a/devices/surface-hub/images/ssd-lift-door.PNG b/devices/surface-hub/images/ssd-lift-door.PNG new file mode 100644 index 0000000000000000000000000000000000000000..d395ce91aa37584bebf27dcf34106b2a275a7678 GIT binary patch literal 58267 zcmXt9Wmp?+(?tRV4<0;7ix+nbPFvh54#m9`C{R3D@fLS0uEmSH7Hx4W#oaB)7oPX} zeh?D4cC&lmvomMTITN9#qJWDs8r{~!-I7r#eB`p5NJR!ZxW@xd}i zhOe&vtH-zMP-t2JUzP5rH^BvKxK@13#lChG3OY~`U#=9Wh>ax+{G}%I8nnv+WR=^9 z?S&`;`GGJfJp=$W<=h_k9OA8XxXN11NOiLsOZA%FKF??yUny(6)<0&2cRVycU8U&f zsxcE|g>?I`8%SCXC$MN1Dy8zs;r#zQ%EEA|RG$C-Vbv2w7;N&mY4VDAEYRe>&m?1c zWVD<5E)#~Yf{AuZEG3g8Pp1uG-w{#8#0KL2!2x^wZK+Lu01V_0QQ%qsO!4?1xVL`_2Q>#-_f5 zx@i@Al#&6-hiOUQmY0e19Km3S&EPz_bq2T3m|GSvyg3`*tfLZ+{PiSX@-DyP-pOmk zpy3P_2groMYkqJNW5My=h*0scLTF$EocGoUR5HBtBe4 zJAcl{{O*4f=AZHa?|AZIzyN5QT?a%BdGvK;f_FIUZa~IW#7=wX#gDzl=T#qmtJd4* z*nIX|XYw=m$fsN`b_cPnnx&Fqg*;$xm<|(jGdo~D*i1c@86DbDvf8=L(%wykSv}pv zKFt9%2!fXd6_KI?`Ds{C3y{<`Uzs45*P1EArTajq@uxP!#{dX(hrQuHio@ILQS6ZJ zM>)iP#N-lMN{FNdXFu*{I|YTr3E!XeENY=hB~02mi?P*;G5DhvKp$nEaMW+^waySj$y?Ra?z;ueO)*w#cmQX1e8x|K1#&@%G%%KYUR4!GZ+8^z5l%+$$7w$ z&^O!hcqxGPv6n!B??VyQp<%TjOyF<7V7se9MsY@>j|kDzdAS;MIaA$V7EOxa?uGy` zh=Mgm`QdiCETuM9 zhfzrv@)-Lk8gX@Z6G{IIYbi(*A(qw%Yf_mJmez#2+@ee@Q14g)GWkU`^bl$|J&+8Xdy_e zcvM*QVvs*4oRWz9;kMPHPJ+ikj#7=%(B9ILYmL7&_!C_mtFg-+$u zKI~kzp%tj!2BCgs7y7jj+^%v%YrghHEYy$`ajt=--hg0fv$DY%0hGV!f=yECDnMbO z%>>Pbom$#VQXMj&R2^pXIB_sT5{FvdN&tG-MUXA}G;WNZKn0BPDh=hD4$$MR$xM8O zx3HPO5-nw>5DtQX*x&K;j3%ITxgu`f@hXJ#vzZ0pos~N-PXGWm*jyw96oYRGb_n}y zi>?Z{z?Y9#+N*aj-ZCOfarK#23{^P$?&~ml|B^Zy*i%E~GhdrnO+=nGQ<&IImmgG| zY-q#G!ERLOU)-Hsu9lw_1!#FyBg`r31BXRmUOmr#t(6~C1ZXcv1Z1{9H z>s-Wqby*NDm0K->*d09zX>_e0SyYC{-m~_aSas-lQr_1stIM#rsekyz>2m0xfV(Fz z+B~G0SO}0bmp*U?vQf>b`C8&!DL78#>wh;)ipYLZ{xm{sR%It4f^G?ANY*{$!A-fW zVPz%{dp@Drx2f6WA&2h`LJ~JcLnwf2dxCNqOtFzR&-N?ett9@s2V3>D zx%S%U@QQAX5tOv%PP};Sz{7HbJ`QKEkt^gXcR=)9Y3E&5g*0XTt5Nr1L~%O4%{rdv zdF2v_JsQF-d4*+hy2#qpv4+NZL+y8j-oIW;9d+BreDY*Y)}lv*2Mj7f%eEF!P>vJ2 zXYTH+ul9q2AeP}9^Lcye?uOO+t zH<82~Dj(5NAd$j2BS`~ghMTOb$WB{p$S2R1u~|LC(OK z`CiU;VOxguz&0h$S&os$liv%qkQfA~$0DY8|58eR9OG@Oy=ICTEQNCox9C z0DSD(0sl270Y8uj(#u8(jFe|%mdIeG*brzGu4H;F*d7wg4OkHY_K?2jSkO-pytC84 z+`4M)@Lil=U-3@-om*jA9;2FDRVMy>v8_|j(3Jhi;^>;t;#7he%$D62@L|GuOKM3e zRo$G6^d^rhsmmv%Pzxs=WQ)_R?i9FtC)e>cg@vmaaZ@@1k-V&z^97Rf zt~wu07(7#EDdVH!yUY>QXTf`cQtzMDZqvxEG~Nn6ccZS>y%i5V>Ryb#hp9JDNxa|!hJ8F=! zrdj2Pt9ix&E(hP(N!L`Fh~G6-Bf`3w5*#^_%eAFy=E<$|$|ta+D%tcMY zv-X85>QAF|E*C8#7he$+Tac!_~&ORbHDe_T}_mZG%d?_2YRf$ zPcN%gjYIC$pq8fT-_y%gOTm}J!D@-I!P07n4jd7SErK~Drf+GzHsb61*8;#Ws6GSo zBp5&k9PCbCz29>7hcO8%R=V6yNh`T4~fmsR*mBZp3XX1vGHE3``{P0c+m zE}d-z8W%!bz7BdSlgC;-KYDl<1MThL{OZ%gs&gEQbZ&T8m%v_-+!w?j6&5@}<@{Wi z?|t6@t*Qcp%#7HGv8JC3067GGhGJ)p+QtHJ{+!eAG*TJ-UWAU>jSJVj_|*-?Hc|FX zuRM+o-sc21cV>!U1j_2Z|L?fsC{sFpKJ*#N4DY=XL?hq;wsa;7-i3Wr5h?Lao&Noe z8Y|}aSWNQs5m#J-+={_$#H0~XC!<9BbLZUDp9Vx%Tw}zK#D$qh!ydl+Pa*I1IX`YW zJAKZb76#Ly_K4^(6E~nAS`R1m=TzGd7QafI5<#UFC#eaJ`LR>&@xoyhW@s6WUY?K1 z9YNGV>fJ~VD>Qx99Gndz+}7KpDdl|{1`ae|5XZ9ds2YNz){bK9OAjPNi7 z5`T#!jrRpSYW>yoA>1c3`Uazr1W)q*L>}iinI^U{Lyz_Y`OI@y)YH2a|-*NM8BRs36QWzDzN!`00P*3IT7S&IPTxd!H}?E4L-#RXymBU{|x z*}p4lt~75{7&~;xeGTDF$1h=RWcIpupY>i|z2JsuMG3*59^jeKP+{4=KQ_H$Rx0|7 z%CM6IGDZB0TXz2{kNUEDl@*UVA{8Ms3xai4%u;u*Nzeqi_2N6HV-Wv7o?%;TrzPjp zxACm1p9I!SmT7)@{4Q(iV|+V{E`KGt9fJ2!e1jzfANrhdMqvcSnkBjq=gXaXOG(JK z>4^H5!O43t~$*WTHAv&{^-uO=5;EM4TpQ@&;KYXr7K5g zqFU+KHq&oEP4g5XYM(Ho7Yc$G@1Tya`~8XjwD1#bZt94&UP;4&VsYtVL?^zmB$9W` zboVjpyPNu2M>R~jK{o4C!=j>hGUjeNk9`UE4)3dR(!RQ{W^;LPVlCDoC+Q}O@mUfU z!E5o`pT8WPYF)*C7-1nWx3wTlFSR1w24iFKxy_qbSD^l*bwZ~vQ-NITv_O8E@bVH} z7|NU(_SgTf=wxFDjfICU=H22&N3)3*tt6TmCMqoXWZ>WkLvb;I`~~_@hISb2`?{=BuZ(0XZ+O&HPojhAeXD>*6 zY1`NfRNs7B=dPzXsp;o8U0zdZ+w?%6A zjjw;=>Wpi89Sgu(Xk8K9Ky_D8&%V*I_aPN31C+YW9pkoGBef#ccrAFD`nvtP&05ua z>f1sxn;QjvQ|!#z#k8t3{T-%VAGJY z(~qeMPUhJ3MgLsd#7YR_T^m77}mYEq>iRzMOUGs!s}IXnjE0#k|+`+eUQY zi`dRs^Xye2J}l%D zi7Ok@IN;MPok^dGVdm^fb(na0{A*3Muk%4yT@}bC-(d~ooSWaJZfo` z+;P82Ir4UMo<$m`9YHyCP!|Ttm2zbvANE!~EL8Eg)Dbs!JRGLC(TU;T5d4{QDK%X- z`#TFdvo{{}Oe3d2rEXJsVl%lN7Ty}f453H=C!Yl%$U62t_Mznd^ry`D&tn))^*>|d zcjKqI_`bytCSjkIDf(s`lp^u}kWXXHP(bU{u#J73FS@#1**w#yD_1YSI6YjI8~qe*aQ$+ z?zK12SY5T2hMCdX*JOv@PTtJeo02tO5xkHB#|~5WXf7*H ztTQ#Qz2EVzA1^4Z29c!XT}W8Kf&^D|=(kT9+hRq(Sp08#XjeXMdleF`4XOH_h0>Ne z^>X)iJ`iP{z;sOFJlrPe_H2{yBF&Z!J#iLQr&{*HPsX2oR?f33mZFMj;d28Gp2OH) zTwvZ`J4Sa~a<(BwYdQQ6647-+;Z>hXHAO>s_C{PtAXP=9!=PXm97?2uuV$ZCFO63J zh)AHd0OenctB98bfdj))k>%PfE0F)b_&n~G8Prs0F5ALo<=i0^l8!M%&cm?}7GXJx@j5)tNibU3(pZh%%o;DkYNX(X_LnmWvWtt-E3&7-#0< zaAXFY@->g6!A6%Vj^uO?UYZH9Y+wZyJ$D8glOEU>@hdol1rwvn4Cq@#+G%neD%{s3 zTPf0V5->TRHUD*S5`T{m<1ueKGV5pnu$>qF<%(m-0)-!nTQIAEb@b?~wi}pw-v|O} zIU?&h3W-0%m|+1%y0XZ~4UVqVXWALO9P~#fcT>p=X|(QWxqOa!6_W>-jxHTi2CqA$ z2Me>`X~W6`Z(2%|@3ibOTE~&PeC%V2FL58GfjA4HzL)e;4CQ#=W65GK7DeTT9TOqZ znpPbA=sBGqQS`o}u|<~h-Pfq~2Z3c}wo2+qg{HuI#4N^HMQ2fc&TO`G_&d|{7NbYR z=8_w0v;GgWi)nbQ=8;2>2u}D1Cd{}vkz9~YMLg@W+`7J^N(F~e$rfWS(j{@Vy<+XD zH2pVf0h1>E0F|54{zS=lWwugwH&|D$gDNV0U zj*9)xc*8^P;d4XNIT--~O@-#&mBdP9Czt9K#X6s*j1RGSj%vQvVl>!`QW29OCGC5OFS7AnJ(g{U@qnR0(#YERZtI|S+$jyUJ14wr z2A9t6ZJvO+2wlFTm*QZMi2r&7QzaU=DNknHO*VpLiykfG)Ty=Z)jf1`2X%o1%c6!YV$`gkY~K+8;bA|5Oq=x_mPK#z&|i)%5 z-dMeHM3tcqs0lIb(pq{>gLT&XrgxX1bqCKNTS>O13Vtq6<)(sc=5jn~q&Qy#ltWgT z4dCB|WY31k#Y|ZnqP4qaC6)tXI<(6BKaC7YtMInf#m6E}R&y>0I#oH3hTfKPN%}7Z zwhg(i2)o~Jx#d zN{h*v3|}#|#w%V=u(aR(sd5_czt?*Ko49!TK53@17ts!dN9VAVlTLXWpynORZ{_{P zw5^UNFgtmL+HN>-w||&3E8Qg6#CMV(a`bP0z_&w+qG)u%4u|g^LwrZd5hIZ32eH#Q zmM2O%fe+ufG8A)KEM+<`%J@O`#nC_QIhuqQ8W7c*%Z=tgXB6xoT)wjz*ETy2beP>awjcKBQ$MKPdDv#~*el~`G4CS65M8#Q8zgF*+i3(ICnP`=t_U&E}KFY5uv)R@ubGAYee=T>v3 z)t&Z3l?1h|OO>Hf^a;G(nXk0DL$<9gDLWEk;G+5G!Lq4`fT_% zI7agEMjq=oQA>D?*x8^??C(@6r7h!uY!RI~>Os%hI3&&B_IUHUEP?E@ioXr4@AgTw zC8gSN%yT+Cyj!a4V#OGhT103_2Q>@~lHFpb_K3&I zn?7ACG34PVX|ASXw${WZO%m=!*RSO`9Dh6*Pg5JB67G`WN+1_Jlc%{ge{tCPi~$>{ zX+|kmPC}z?DQ=sYiKIKn;{qDnFDnjPaKfbqgSI1i8Z0O*r!IE!K}gk-67Qjzr5-Kt z34bfbqbyT_MAH$k17=EW{0c8A9Goj@AZZDAxJl(B1O5B(Wt)iXrlaeh^p2WV31FA% zVIa3l)tMfj`D$6v3X6u>$5&c!uRbxcM>duxwT&a_^_VZldNd%^eDS?@8{CBW*e7tj z)$iSfSQ_jnwA+7QWXVfxc?*evTiX)X&5o~T*W1dkOaSZ2Tx-ww@y^FJj_^mEkk@R> zBIcOTzbFAC>FKb832;I59x#8Ga;B#HNU8&~E`SugWtajq4}KMlq=|`cvmjD|f}GXv zRkWsh?{;a%gu&s(bEQ@-r=xl&#Luk)ZsT&TdB`lZ5D?4|Ct{_sATtNgd()sZXX0z+#W$_YYjQq2i)SI7%7zPV%1~P1j^Y5Fx`65g3~JM!q7O8ekS6ieNLG zv#ni~M2N4q^5!&MKMMUBV#oK*PgvFASxn8LOV`Qix?RJNoZA{<07D8pB#Y(SVPXWm zV?kVB1<0P&%0^-1+nY+ywtXtEISb<+T&+gv7pk(CmA`Q;)_b{cl8OfY0{-5k46K<)fEQDobRm(QS)p#_^EBf4|-C2RrbvCX*d)jyyMy@;G(0_JZZyTpxHBR90$6lnd>) zxZB{*Ps?E^9Yus?lH5A(%-gw!;@ad_yU{1FJGgbKutq{YE8y68MNd@lhOfE52q!>( zs6-3gjl3L@zv*fBZV5-H*9{i8_L@+```4PCD^~biRy1-M$96jLPz)0KS-Zs)EgA1Q z6l;pPGl$xa+^ckK9i8Wo9X=#VE!()ajb#t3>&x0h!320)^$$!rct3`U4cmM53KZU& zk_fDqX@1n+jz`URy4}Jmq}t+M!qQFg5CxxRdTphy`n6Df`^bammM0}kX`KJX`6Y)9g~NwK3+9CYyMCy*`{--ywgcrNMG7`xeY;&1n_|T`=maJ zzZPbWyVkTa0ii|~9Y7{9aoDmr+38f==@~%NUK>KG{fmPU)nm0ym8{1SP=_-$zLNNk!q+1lP}Pp_PfT z{F>9B-pp~a>2+ak?!TNPCkEgg8VCa)I%zr9>JhedN!@23R7af^qQ^TO>+zJc*R*@3 zCgXX|6pNN|C_ru`-&?P7pOq`jr{J0Fx5o+kZ_Po9U}VRdcm}?bY{Xi7tOfH9h7#Du z=zd4nj3_q4Pg}4}%t5W`&X|zGDi`K5v6T?cU$VhVVu_mRV#JrmGu-?ox_Ubn?Is*m zEnbWETa3-DbWGH8>fGyGO=vKTm$3X#ZZ7DEXC&`BJGAE~dVxB;{v1UZl0qNwyuP<_ z*JD|(DuL9%VFna^+A;~_J&k0$jojl{hC#UXqFhJHq?3SbuXQF-Y%t31e+5S)phSxg zZ7V{nspd;HHAtk8xwwpDM#DBFwMuwTs4RG%a%ac=Y;a!L*?StdBJk{~48h{P994QT z$Ll{4Aq9A8w)_pS4IbpY-IA5|vJyvD?s{u{_O;>WEyi8eb*uGJ3BW96L0!IZ6_#9` zY#F*+o1#&4Tx_tfRuGZIXt!VEt*u9MF@0v7uKg-J@Gh5qs*xVtU^k@71R|E4>qS~?^0a(!xzZ{prspOO8#bjkb%Iv zj*~gN==sjmCwj&92?j&16m!ihZyd^*43KhaO7g8EgU0X z*6BPbs~>BgAD-<1Y1mO;|E#ZMzVvPkNvdQSshF30P#BWI_=+GNz z^e?F{KfyF&jZ>(#7#coxq-n_ZkXXnkY^>-Z`M zk$*+s8Yn=n-%zsX7NzX(si+Unsw_y9qZ?TFoVas)jud4a!xu3>H9~mC%R4>a;LL5~6PoswPB+8yzsX8C z)T?(9`O#K&pT++;u9`1_g4Ad!IVkE031J!buw);h!O*zJZnE|X#cIwa;m^z{hAWKO zbKDDs5jDyeBvqf}((_)^eCVkZJ6i5Qm?0d`8yeX9SAIkUa)E+i*A0zr74CNc0^FR2 z(#qeJu(rT^h4n+loXvBb*XL9T@qyr9$9k)+iaV=^y#!?LqNn@+T2|@W{;M+p+qD39 z5t?MXFAHjcVL*p4aKI&+-gk9oWxz{Hx(z=5L^ATpE~>iWI;^u3nYY`)@IA zu#w3wrCM3yFo4{7Wt>dBgvkh%bBlWn}|n>g_f~P(Uvo8Wb!<{%tFV2_3K?B}nl2%u7(@7Lve+ zb=!Z?&9yNZ&bxAsOFW*&3Ys~8`NbEA=F5jg(0kB~!D>#+{ljJQ$&v`w3}-0nEa_Em z=fL)=xgKD-w77C)r_`Y5;VxbH=9YMi>Uxt6rbL z>4kR1YKK?Q_jVQ!CR3I)<^7zAC{OgpFp1kTWDeyo4OCjMQIed!qhTOvxL6qK zd?izB>WI>!bpNjKbt>c7Nr|d&=`Vc-^oAjQKEqzq>)gtnT3fUOz@RRPxM!=_FB%Qg z++vB=>4ONYHfe=*Q0(b5BV zmj%>+)C>CyB{v~{SSRb4I|F#b&tBSIjrn6^Qwtt|7$_)Y?^sm5-uP5ffl#l$4z&5V zpiMK#7s2odgSqhb-_-J!2Od`aac&wF-6 z@Sph)mw)evVD2Ahp2vWN>?!}r;%EhAy>LQv?ZHnR@E~O^QZm|kpWz6NjQe7wM~yHK zQmq#og8=e%TdC2Y16G7FZe{BCKLS74dsV`IC4e%3s^{0wG>K(Jby7MS--}5~d#=`G zrXk9GG-*&q@EX{%;2xn_nHV?}x7o0T2YI|_OkoL+t6UaX_dci@XgG9*ePxN8x;T`m zlLG{x&n!t?wryvz;A__LwbzM~r{Kc3i+M1I%=Gid&QsX~$#?q1NA`=K`R zGawU$n#cn;jOOC70sI|QWaUB$eN!IZwFjLCAQV0Czs9NLlN2S)q6K5uNc1~EaorRi z809zhD`Q}@Tv`^mNu)MlMme)_aKg;W06ZI3~MC#E=bl&G|$I1X$$jxf4*+& z9fhD0vH&V@?gXhCb=td}9~YUAK>nbKof-F0kR42^ve`tJ=)<=Q&=M&&z3TYqE#7qb zzH<=3OP1p}(+xi^{Mm%*&_d`fN=iphTIfHU7kN)8SR|09qj3bp&YPRf>^|yL zdG!u?x|)2#wl*A@gGkEp$Un6J>86VF1k-mr^TM|e5%g^T!v=8>R%U8H`H+T;l>9tA z<-P?xZX~-38|se<_rIFa0HcYOAHNIqxlFK5i9l0#K6)3RYIx`rvS~&V#*1QT>nDU0 z%c{kY2c5k|5RRc~;z904xKd*fz|_|Z@?Qv^9C+~QRptS;|NUvS9=RoXh>!eQ%P`rM zEt%o1YlXd${l5(vk1P6)Ueyfta;=rYKtHqcBjO|s$2fuEv41Rcmeq%&m#v7sU}rEK zzZX1QV{DsNm29hzp9@}b={YP-2ksVVdM_Dp6;CJV`Wi!U&xUMWW8|+gTAB`zyCmG- zq3(m4RE1g`do{`LzzMdD4>B_tyOKXh(RNjh^wBj0b*U{}O#m1CdogJK4fxn>j#D~v z1&7b#(SBLuw8=Pjr23z*gBV4_{&k6vjd>m}(iQsn_Wz!1B#ji?QF%WR@5D&8A`!m5 zRTVjl>=`6(D9VBKU?5d@Ug+6qURkeMcun^qwjap^5$Y4su{$)oDxJ>b4;kxQ>~)aH zru{;M9eFOFx!2uv_KE~ShB^-qG)E44_lWXTJi^Np1C2TvsdeXDkG`=%^r8wGt z^(avE8|tBY$Cs$$wDDqUlPXZc*<&$0--Up3AGD^sD(ZvHa7D4p$ zhyT;^?#~)W^>Sz_w$;Z_w$vq`%QejjiF0Zk&%yv!+FD;iO#+CWbRJi5;cs@%o#J|28wzXf%mPJ>xvvw1sjWL zFE!?;<$dE>(%Cek2J{{`g_nyBa0JeB31(M3PB}fwJpOFWV04z=)|U20QLImYo+9-f z!|&L4e=r_iA9;Rhf2^QPO3b<#C;iZ(FtOR_87?i6m0%0ABt$iEt3{>Xl!$VU-9Ywf zQ=?umAcoZ{T_8k8L~$o1rdt-Y$^1M92C{(5z+ot!O9+CJt?$)s>WSmX*=VjXt0L=L z{L|eCX{cfaO8+|gdRxrS{s3sWN86e)x`gw{HqF8H1=nbH3#&=kqwI}>Dd8)Gxr2#< zn^7#EA1DKzW~rsIzGi?c6OQk`39|6G#uAZ*I?Z5~%!zBA zA#kDn%|Y|H=q9&j;e&(ysPg?a@1apl3^&a?%iIGn2+6m&?4%4Tf~h@v4trN(NIi_?&rR#J=H zWgjq|%p;g(?OE|Vk?VFxN&E-qyWs{oZ3$M8nT`8C?ibIwI*UkcZ&C!UK@y%dU`kD_ zN(2k?u1xn?s9n$z>P}dTJV_@^LC9<3??AhCAa!vm8v@kZi?rF+!ufdl-7KE)uK!5b zhL0cTFKZU%Q>OmeJ-}E1qC`rx>My2kAW)Aoa1Ei#NRV7r8ICn@A}S{EWCgR1*SGNV z%Q#Rlkab@lXlF@a&Naiti8Y*+F;PS*`-L`7GRiFnA4wC09$cq9f^J^Noia= z&L^;!gdh&pIzPd9n^dB8|`f``@k#m zds{EDvb^H;R7}@{7-V#Y0B`~BKX^qrLjVEpD)4H|_Jclj3!;=AfAb6)L<$xQ7JuRp zASK)6G`59Xc=7adDT{_&+K*sa57U~VKW{d3`Lb-))*L3)2S(nHrZUK@x=Ft}owW2_ znRw$V7VSPJu*N^>IcxEhVcq5tRPsbAD!1X7rCBvfwXr*FI><&qV4bD9BD^MceE7#; zv;B7;zL?ix!6trEoZ|<2e7m*#+kvar zZSg8hCXc9~m8ZvRXCT+CJ0HQ=6qNZb1_TvQ;sI#`aJOgz!fA)F-(gG(Xf-qheMrBL zpzU;8xuva;8SES}zWOoKUN6P;O2m(x#nhko>(^>RYuZWr9E9eD^Sid3L+z;Ns_tk9 zK43aG=7Fsk;9U?qBRS%^|0&8){94J!ZCNE-JQU~b#`af=x6R)siNpW2HnZtgP~nv12A^JitU>6~ zkHs*4t241)=(~jU8%0(5N{{k_(XhFL+fobdb&lA2PU{XE$wKSs-?k1wJBpGxWZz@@ zaAbd;?^NaiIBD`HlCCmpp%0xr5d2VtTX#9APBqn64u^5ZF!vIjG=llQ2Fs1PSP^7y z)sOu2lqCHsdPkl;dRWAhcL zY7YXIy7SA>;Q~&55T3^d#qph|XRSp5c9syaCXb?|U=vGr3!rAt+pf=_LcpZ znn!`-|9U)Bc5i*~7z2id$2M9tvU|}oio6SJ$bM@gdoSdvgr+0$^&xMjhytwB8x^#r zXLyBTaf`Ly6cbliv#kl<8t};d>~4Pl@o-iKe0p>8#RzAT27<{4^ypV}CvpI2BM2vL zfps#e%z7m9RWI?T{}geiVRUDqcMc>g4T;?jsXF-){I2=N)p?6? zMvLrr6ktS~ReSse+=TynP2y=lsasL#AeBN23;6Q9b-{JGm2=-c>`wIRGw)!qB~(%t zWNWhi-K3BoX&*1n{^6r4p2rsuN;o@ogM-Sy6P0EHW-(QM51)L{fryLtrF2+;-C9Us zfQv!V$LHh?HEK`q1aJ4HNRncj2M-2v2t3pbT98;{(V?*tY7_IUeH)X&WWf{YyS>R-?&#E^u@@p!_}^6;;UD}SZ6)4dA@^0&jxkLG3_*Y$71zh znEHPugA0Uok-OCWDiu)OKDB<8t7Q57YgRx z3(F~b7Q7XSgCj(?s$RK zI7c?PJahRqgHPOGhgaBqlVK=l#8GXln9mL3I&BK zlKblI$ai*$d<*Vf4T3T}%(h?EE58lG(GLe#AU836mchxpyEgHgdu3gh!pYZfvYK5T zyF3eih=r_{ycYX_Mytj1rhtwMN$O*qzhzp5VMt#P>7X{{wAF@SlVG?Ea7iJKlkg71 zmvV|l34jbsZ+and)cED5mMAJDwFyado&4gs0s9hR0uQbkU1q~UBf|-ij%`v$UiR7Y zKi)?8<0YgSo^m@(NTR-58sj|7RZ6ztZgPj#Tqv21il6w~%<@vFUTYn+Gvt^}GlEm~ z=HAC-aM1&1=fnLAv23JA$tm4M3Aj;`<1jqV*>k9oyxt?{w_OyHwVn^zm+B92xE-hN z)8j~k%n3gPe40?108gCkxM=ocQ1^(mGhdk5@WSfKp6+yRtNblzTXNxt5X)izoquc8 zqU&)k@awj=n(atg+HDA6$j24@wnwFFm8F)a7b=hQw|Njh{tF)fPMC3BsaI_6tCyZT z&IgLUN%jPFXtQ3I1@*QJ=!q0f6#0frJd}l-Jp>lmmYMpGX4kah*(5aiEd8UIC2dHx zs;>S;TK=rLJIaaY{;Yh-;A0CcM}~}6)ZCQN5ZzyKtrJEPIQEc)$Mh zgaH-M)AIRhz4QJG!&x0VX5;a3P&+N~hTqE5n6XlZF+-v~Qo1{7<$nVa1_J#&82ty` zDMoR6x{1+k?~f){h~MiSw5aC4-Bi9gZSidRlEQQdQJxZkdHOEkQ+yQ^|0)Q~yWYe8 z0DTcdrIwl=$pqseTMe!rc287ZPi+b^!k$r2(Kvb0|12a^7MP~ABYZraS8@yJ@VRH% ztT9Aqh7CeRM{;ihBXFv`CuL$B&}Fd2Ngy(ZCQ{S=hyj@Rv*(ZNKeJ&uwUqo(Pny#)>@|iGn1lSaW_Hn)=H{MoxWZ|8Ab4n z5oWF*x*B7rBQb+;@~`LTAB@zi&5a`*`poRe1dQQK$v}!McIfzFF=!^x{^2#(;?FA#{}YU8 zEf^z5IvB`Q#BIfDrq>YC?WaJ1xCcxqO5WYaRY@j?AKxbjQlp9w{U0+|Z!;UV0@fJB zFelw#U`*l&O?T=j+oP3}SHsuz$Gvr?b0CU!D5R7N@oT-p??}#n@}Y+#D+h@I%~1Rh zf*|~M+~1FlQdAK!-GE1rc)@y$go3oCNC2Qfjs7Lxh0qg1Jg&x`C$?-TU`67Gw$W4< zrRNCVL3z;csy5rPJ8Nt0nVS=RAi(r~9^&;u*i`=jI+n=`H3}$QU3z)C1E}6(NGo>z zi2i(SsWc6oAxHT0sbmo^#7RiFWgYYY)3!jg2%Q7UczTQ(@Z6TQPqwgE8fws2HA8E2 zXdF=;p2QgkV3Cjd?tP${MC5@u3V|}x+>j|Jf3$Q~Ull0ElH6?K!}Ces|98^xxWMw8 zU#0eChlk%V><~;3t^NmNu@7tZ!M9sTW^!DWM6bi4WS)Sq>K8WOSG#+aaNj>b!vnYf zvlYeQDzx=yx8ncROCpe{!0omgp_gVDqx%%nEd_nv1bow2J`^aDdTIxPpm)f(vAgs^ zFcgQ>$d<+uEyQ<@(fg*o)9)}(6+RS;jL(BGepKnyigBSvyUi~wfIKJQSw!xk2H!(m10+-7!kG~ID-cz2UO;0R+Ao7DKt zBXUJJ-oU#r&+;xu=F}7s>X8Iu5~;3)bdlO~5yI*b&P-(K7EHOcCOTZ9Hh26Sn+H5f zFTjB!PJ*<}XD**flk(bS z4%^gYKG1#MJP&f9R0B6fJUwDmMr`-BsvUxVO~6AJL5wY@$K?rEyKwH^Y70DQp>SaQ z3b<%0dJsArWS|uO)XP9qbIQ%KHl|DLtF-%g-SO1uyD0w80O#46Zs0ZO7RJj`#ZJRP zjEC|ZC4YzKLwGs(EB#zYZY0(`t{&9EspG0b?q`< zb1D?(TsldJ#}_e)Ep0|7HE8p(d7<>vCYwofNhP(%h5_<}xmfp<4g5U&>9fH%Xx~u| z1Qt+jNv1w%_#jqDw&c1m>E7XqnO%L~%Oo*5MwW9&X2m(!9GkwfoU&UaGlm!nZr~sg z9<)yUju^^Ov86yY(OzX`(ISU(5;6dqC`WA!9d zkS{RR7S9RV1WiW_>sa$Ox-fs8vZtg9b})NU5y7b{BCS97JpO0xi5UKGKQzCNy3up7 zVMSK|Hal#q7lT-N`Ttfve$sj^9chLf6crxG5S)3huqN+9R7Y^1HA&@Sk)B_LuW>o> zDE3l1tE2Lf=&TOa14j&@9y*s^MxERqzxf6cn?@-_dfZTbEbt|t@>!$pC{#i;YKHUf zIDAqEyd!+*f-UpEC~OxT|CPnIZzAT~MxV3Me<{v`fWpv&@kZ6nlxA@OxqGnniuPfW zmf!3(kmv`jdh+N0@pPtvP`=;)pAGj|XOPA|V?>Iw6JZPul{F=$WGPG8O15k>V`O9- zt+I||f&e@~z9@BhSudE#EK>)hu$=ly=27n4Qvph3%3tLl^a zfc%~G6w|&EgGAhYFtJKK5Y+cxs`uSZ(+|=O&}ND@7G5+X!=I-=bAV3fx_(A-7>>gXV}%$)YuAYCRW}P?~d>AGjM$pkK(NNOwABDa>Ss1 zxn|OYtXT8s%&V)!!O43&(gWy#}8DsRc4us}x(5FN8?caOgbk%@d!))ZJBGM}Gz3Fq_Hy7LTys1>a^q3;1$*5E z5He7KywuJ6u3%vy+8}h5EgPM!N?MUO*!YxZh+Pkh>1>JtyxIYsTq?>xUG)dL2H*_b z5HKs3>$0s`dhp7V2NtF(rr`7_i{At5Xe481k`})CyDhO$EZlgijxC-wG2F_du85qw z$E0^ZX=Pw4GeVa>#os3joWmi`?bosO2G{BTE)3Esd|^WMkw+s_qS`CYdRC~Bz(6}A zibIHlFvH zu_(#hR1jX(WrxXwFkQj?*B*SK0m;7VcN0foFw9ZB@kQim8-CK?cPEn3wUa+AMX6{7 zI%}xW5;3y=Gtnpf$0&cG`=n^lVb4bV+?ZS=b4*WH%_P(X{YV8d$;%!*{|g;^Aba$nmlv};pWpTvH*;LUUpd<@LqJZ{ zgtT3A=q}ew5o%AMR*p8I7V!aO@oRek7kf^xXmur2^$eC12dmW$KedC`&eH`|Tpw8| z#CW3x$A%Lh&9~O=um^o`XicuY>4!>;E{oRm<9d^1g(0u|@%u)FhxbdUvp+<(kcroY z`S(g&jzVHFg}MYqKu@`0a<2i>@EfoOI7@q${A9vR@NT+TnU~MTMvpAK zUtw$T+|Yo}v)d7wn?285+3<-$+(OBt+Ls&RsBQP9Un4VrgHG%2Dr6P{fAj$N&jYfar2#h??_? zHKhk3ILGLSA(N4W$9>m-MR#M;?`vO)kPD6I9}u@wi{+v5fVSx@Bz@D$188KhU|t+ zls7Gzq&`y6EzK*Hv6;Jkd_6!?1=xXkc(RZ6!j~2j%}mTXqnf###y#w_54~3 z_H`@v;*CsL$N5k@Z94li^b(?O%)>vM$u-RZJP$^A(w*CE zPL9`F20Dw7yg7gIhdh7k2mIs}iZ1ZZl%bm=>x$p9ihyg$51kC^)v8%3|E zYV&e^mT~K9>VYaSXnqZFuGw9AlholIZA%w?<0AAv4GOx|a0$LOtXNRNsx zL2SYmTVy4!oz&=RxJ1&S{k-<*h~VS8PGR=PP4>S{f=Em% zKITKa+s^uO@MeD^Q@###t&z*Q21_h1LnRJx*L22v_q==K_$9qofmOvCn$-V>C=$>VeQYp>PIUKM zn~z{^rPj@0aogt}#uQuF%_Z$Y)F*xJ71Jhd=H9co8Ze=8JYsty+6YuIh#_ThSA?im z`y~+nZV~bB?_-+&m@Y z^p$6-5JSCJO%548=0MVo=*^9!Mir?}36A*18Jkb&hi*tloVZ%R>$wf!!1fhIy6v1zs)4w(yY`AZZE zy}pPO2sYii>PX9K-*10CQKIIzxzE)B04CfUg+Z-$;lI!YPdR#hWP7^#lz1vLRbLC$ z?QXte-HOC?Ja5inP-VEHB5D8Kl>P?WcI$Njs*<%SzmVoI<@c8=S{V(no3t};nCetaMkC*48S62_J8|!kWX*f1st)=L#unoAWOu22D z#ymv&B+ZGmQ$(*f0+Ck%=ba8Ck`O#XVKWA@&w zESZ0Q9I?p;YsDL-IUd-}FlvsfDKCep_@2L9cQ9KWTrccL`+%JAZU5uVUX7;ChUA?c z&fI2aEx$nvgPR%kKCD%rc7I<>#6{W>r$-u`>YV62gcEI=?IGfasop^~jZJb{GWgUEy7lmx+1Wr6l>r_yJ`fHC~&b2J|`D)z3f#VbiUx;+G z4EtlFMXQ~BZPanT!Z8dUAJr}#B9%QOrq~VKLtBs*I(XI?T0=Pb@yaD1-uwvBaN+iIKX{rhcvbs`9Zgw^hShPfhH8(dAQrk$?DS0 zu+?uvEL*>J##ga5t5k1#!Np1s{@xoy1lcZuC_DmS8+UzHh=IlUtX$x!p>&?LJ8xjM zT-}9irucJ~D{kJ(@`1Eo1DfNQV3p-?h0ng4^$&-=+mQ}bWonO%UO>I3DgFxatJ}kV zr$>6cA6DT|y;4Bl0ZLJVxxf zgSA}y)+`2QuM+fM&S$-T9k13ng8llQ2nA#HL(T_0U9aD2sRn5HLw2|Fc0ny}XFpqn z-yayU7Wm?(SEDE5v)A@-Loz9O(_oKgqXX*;>r59(RK#4=X&Y6+B1H&a1XD=iLmp`juF_e=S*MJDI96 zJZla9wunGej(Ed7bk9AI8O8%-7VG5q z)Mo0b(3$PayOL8wJ9`D_sp}QrFnG=-HwR}FDjy*gA6c`H9zE~U!~z@|9x%!dut0pn zpP3ynQ@LFm%)7NM6O;r!i=bQzFvKFtU>4%JU$Z1p?I04!b@l1tFpu{a>k`NjLm{py zgbY1)k~3@qC@@6Ab*dKV_=LV7P1p6*?W~Kww~f^`S`4dlGhUv$s3821ZzY_Ko|^&C zAJMlEsyLqvJFYlLGO?ICbfMB>I00dUOql+aK%Uf;R9|yUav+pqU%JatZ%#RWsH+^8 zWNlW?Y24LcvluqweOWX-Qww-0qk4;^hJ58+kW#L?p@u1YC z#`aGGgYT@3OjfYHr86Hid#>(Sc;2DVJ_Tc$xgM@Hy`ygHF}&Iz?L@bN?ye0bI}nb# z>!H3V2z5c(lKMe)Vu0-a=pKPzcS{uht4Th*ee>mk$1jrljvcy@R6flt*FJD1UDq(z z=3Br0&8Zy@kfBzNQK=S&JO(~yaL_rtXi;%_2i{GFynE&$cL<~jX|a+7u3xtxNDtQ< zTk@71tgnJC3&LUgIoF6iM?({g_?_sreJiaR0Y?M(y+qzX%z}A$h@V!Xb;e?BF<2#? z|89CGWLT~E=LpD`2~Fj;+Ko90KzxUrzK78{w}4nRG52_Vun%7DrY@9+etB+D;g`bu zSLDVCzHG+czdf-JO!9 zN|7_6jBmX{n9-(oeg0I+Md0z@)|;Tl+C17V;hyd4xtm8^iRuh4f8&g9M()tojk(VS zV71+9@;_Fj@(clavf)7%-W{o(3z;d<8ZKOxL*1Oy@m|xpnhDWdD%}$=mOMi5@Vyc( zZrU^_Ic`uFCuYFfXs8@O&kGjJk6k`o zT~;af;Oz-%(}P|2Zq5rYHcfrKP!U=R%RH_FR_yMYU?cLsJ*}sQN(p82=LLnj)vLF` z!2+A@p-(OwZFBe0nJ9oq%p=+XeD>-k(Gu&!-zbG*0Tg@EQL~d+T1&s5iA-wvEs&6; z_d9Uu_nB9>zJ65cX$iAC1hzmT-?{&Xt~_8(>Za{?^0;rl|412qp|&IHP!E5`r&U!_ z)64ET4)eo9(K(;`W|Jn3rWQgfUeAlJl!6A*tE3X!a`Aed)1QP%c{tA;^*gf7M2Nd= zeu|fyU!7@uJw~P2>y_o+d($03hr-Z*diP=tyYv#RIT1R62m^EeQ;z0zm&jk4lQT%4 zR#~YeH)aY7Mq{3%5?ivUj}z}IqhMX^9I?4xm#@J?D#aitNYot)}YKX z!3mL`BjVV(@~d~FTOuP6YoJZCw>m3Qv z1(s)*-*3Xs^ENV{oKDGhsuKRMyr;`~3ib7E>FO**xuv&rprUA*OS0-9j`0Pg_XwKK z7|!t4$LY=Q%x3PJ*%dWZ<;Bn8^DFV5W}q1}MNZ|7BlLlw#Vz+1SgQdA)@Mu`< zl5ebYdh25n%$^sS7zpxQ#2Y?5Aao>IJ_fkYdf!~%ZAx?qGFA?nNKxLNM^|4LnES~( zdYdIuwW0pnI!^=0JCVEB5NiimAUt%>(|~=|3i)r)@L|rWZu}1$xnRfp-r`wjHtB6O za!%;JZ5!8?FFJ58Xs3i-pWFF;V)2Z_2pQ_I7=O3G7o)6_$;8Res@o!~7w2v~TFu^< z!k6p+r~B*J_TOg)wGYxSBD+e{ZyXd}6$jJH0N(UhM}oQb_V2nSrFuRNOr9d>>f6TwaSL~tcaC=2=CH;bzJ+C<%Y>fcd{Lx88M6_?9L#RGc%XYcsthK zj!Fc}{CWeQVsQL6*TF9TStmQV(;buaGDyH5o(FE}{!Ku`Gf)fLRc-bvR32S@8&KlVg-s-D6fu1swzJ{)GY z^m*0N1{U$xB%){gegqplHh7+A0N#)+IagER-UT~-$(&cgG()L-Ki(d1K5s`i?b|YN z^^ASP4+W`3YOyDxe}Q=-yMC;Qpru%=8YcZlJd;TIxdN5;W0KN~Ty8_U3WT)#Ye(wf z*W&aG?*zsjS}Ei3KiwzN_xo?#!RhgMUa#of@&w0NMl3njk#9l;U9zZlmTLJn17x98 z-0V)X^HY9knd%gWS?@J$FiX2vuCV;}TWyiK8y2vCZJ>@!ME0NJug5GzV?S6_usQg#pQUo3U5!@cD%FzF(44@9(@J8 z2X^mj2Gdi1y8K+W&*CF~ttPZh_W-9mkEEfRD{#|qjpRuRnFvvGxM^Gnk5=UW?BIt# znqKuC29}7J?_LS%XmoCCo_YP?kBETa)rM>$=~UjB>J>n94lss&)1Y=&@2y+^ARa9n z|EoJ&nZ&D@AoNg~{}``xQw$^VR!`3Pp)ps7?r08>m0O)+3mAUZZIBK&+P-gaW5ll+ z^j94lOlm(68_RZ)Z9aJYcB*gsWh6!|F}T&`{CDUz(s=FW;G^T&z9_JcUhIN$*Kx)l zIuDN)M=$97Vjl!%i?KGm{Fy4!<{eYa?j*G`$i#%X5vr)_M)U(hM_xrQa~xgE zxabYL8aDFiggF6nF0`2SywvuA*6$j}1a5`lj zN2EiuTjptp%~(xwfxQOJ5tDoWUe9PM&QwQFZ4+kV8VV1iEKE(B(N3P%pX9tk8yUkq z2rVe?L9SomIUd=>3jWzwJzamPdLK$~rTuTTQp}H)QMx$nKw|yP)QMOlh5U&0 zQM9}1dLoihf;zRHr-h1UaAd8T2=|#>&aXuaH)s%PkULhN!f1lVAy~-(=)xnb%(F}y zhR)?>0@}t=OXA>L!r*V|;>YEy$9R^LbK`ZN2Rn&h>^A-z%m@ki(AN1mK_*}nsQHW9`8uR!4lCM}2n22|25KuvLt^E;fyQhqXXZn%O*Cguwy2eM_#3g>!y?j-7 znh3Jc>0ko+)X*eV0EM3Gl+w0l+{x^~%HCX<=#tEE3I8Ds2~iV<|~q3@&{+ z73ooK6COQ$#bJKVeZ7Up!VkluYzk880x%;%A>=2PM{ z^oxqGU616PZ}e*Y!7CZtJiqCe>@^yW>l^p^%{v6+q7#NSpVC@8ZUo7DH*mNM|9p{?zeOKE`eH6fG`mPbp`^z@ zoY{=Oj8q!6HnqD(_p_#OkuLuGc#ypY@={Pyj6BT5o=n3cM1*D3=;mXe<26uA=cKw@ zO~p@X+Oo4j+PmxjJ59cuyBL2v35q{*4TeGtiiLS3wxlVqUW@{KsEry#{qV&K0r}Pb z&uRf%lgQ!oz&sMRyEdnXr<)tG8F@YkLkSN-&kySIv&OY3M1vd^X%>OyR2K}pP=2Se zyEfF27o}j2zz-2od97^Xi-_f-QzCQRRZ6H{{DzY}(Dn0A-I}4a{I{XOw?RGDCK?*G zf9;x_wsI>sQ1{vopA<5kb|6quc8vAnJ#me``-Em8aZhrj@WN5=d}hZGh-)Um#dtnopXCusMqYyEipUiad1 zU0yKG#^h8kMvlN@cjIm#4Pe9mEts$N(dgcTL?DzO{Suyb+jN&60;X}?C?f1!SZcj*pN1(e{k^bcJ>IK%enc{v&Lzf|!pr@A~vx@GE; z#*ttpc9@b56GEQFp z*<)krWiK)dBXGKNzwBRVbxTshm|dtkK5*milgT2(nPWzyaoig|o%>Ib%^s7QdymUP zL>Z5MR97sZtN}ETl=`RxtXH7H5KzreHGnBkO80#5-%Qgbl>~g30uq1tCpDYDOE0|8&8>?d^GO>?yrs-1j zss5yqpy^<jY?h!;-S-r<_ZLNM&xgI|tluH3zQgI10)Y+oM20$ZHD%mBW+n>9 z`hN0Rx&Yf7Hz+Es4l#wOI&O0G=SupnKM*)_PWUQ!^C6Cuz4o?I3YqtYTd*rP>@>lU z#6H*+$uzvGYmdP8-0Yx@J@@Ytsfe+$EspM>zf!ldj~2eX_TCna`_R74#cE3zy4mwn z{XjWPkb%yi<#m=FG(3UP|D|B*0qao%-#tbRQK2CMG#tGxJtoUPh$kb!g`pKK}G%HFC)Q051k25Z-eq_nxoJ<5x4aJI-cx~LSb zYA_c{HrV}X;7!$xK75QUn8ELMgWHAlO*wH?Kx=#H@fDuc{M|{FPGRGnd9l%OwnyWp z)wDg9E^Bwqx$JP8$c+=?TQPP1K)Ga>`uOGMe--bh6xg(`*(BLd6$NiJ+*aZ~hMh4@ z$_%So0X+5#^Q)Fc{j1*k=E9|R+e>#NG74pGFPdFImhb8a+={rpM(QEeAPzXW%g&@i zYV)uSL)rS}+B!b?q%qJ&^IySQBB&I}fINo9g zYIq_!JhFGS_7VK<+Tf~w{t$+mL)y4y9MSH*A=-x{GwE=dq}k`6hNYIooJ@nkJ-=t* zJ$ujZpHX@86uZuV6FW?GVVxAxmt8Ix2C4kW^2NxXjhfpK`98`m7F+u&w6L6vf<9+4 z5Ywf{BPTBcLJxY#t8;&4$@E2aUL3-d>LJO)8x~8Eqx3?cS(L0J*Dav4 z;1rs|FE5qI_cQfG!FfEB|0Ft5*%a3{4m-d-d&m4U~_3-Bv??TxRk=INTAx!kHh2deCPW@TF@{Zc^3JAfs}2Gt|@uJ9$}&U zPbtC;$I&65A8=B*zw>htA5M^O>7V@*bT(wgLojZ8QUjqIs4i>~koHX=mn_{YR~f;^ zUyt3vSZ&zrl6iw}1KJ1cRX(Xh=<)NXFW>j!#twgVOw^S=G4@CU(d&Sfq%+h6*M&fX z&iXDm&0*$fDOCts=Z#nKP7YPtx zu-FxLb)&sdg&xuklyQ@{K^j}!5tf2uEO52+y`lZS{8SrPFhw@N?_xw z5B?K>l3>eA2-SKCKEmm3f_unAmguMrE5wbPfZ;#WQbemvjF>ZmEY(yjgTjTXg6&cg zxtz?*8{@i6NQ>Y0kVkQjL(l|ncLR5Lp9Tl^;*8+mJaZs?e)Hhk0w@=++;ADic~QKQ z$~d-<>nHs3%l7Ta_A+B9CJo$pH;E28;~YrFxj@Gs-*sr9(yOQxtm1}EqDIi$w2F|a zcBzHo>&+q?=py~lanbjB)r-&MkvK%~e6zC+q)fD&?*|*QDG8$g&FSL5gvJw$^URg^ z2s%Z819r-Mtb*js%Mi3`w`P8=#E9*msTW7imLawux{mfIIVR=20hZ`_`#@92Q6*t+ z_R@S4NfM8TUM@OnFJ3F(I%}rf=9p`dx&S&}T|wkcn3qvdGzwBLHAa?LUr6#%TZps@ zyuZNKIP`;URDXWhh*(8Gg|W6>?A4Wj=_oLszvjW&x-+OZ^5^t%F_;*K7;IRhc)i2f zXbu_FJ_oWawAQvqHEHCCjE%l~Wm^mPR}f?KF6K)L(;DM@?{-XjfGg)Pd*$@w6+^-9}C;A(rXRLV$ydNzIqydI1HU5`>_`+iJo=2pp*kQ_fEgHYZgtwKOO z>8jvMdi%ZLcEbLE^D>lcZ|XL-%#5%I()S{D0Xj?xf;))?+ivX{Y^+&o?Jp&t$LYQe zNUuNSthF{6alqNYjSKU;bp9e~8^;m+gwi0ial(5>Z)1W(EOQt>@E{V? z?JAZimA|3(i%h5l)nH=5%drN%N;F3-_gtYg;izZ&P0JUKlhBA+Imf0=NW&l?4W;`A zS~9DtrAP_#<;Fw_td7W`l6z56*WqQn{Awlq4OHW9{xSq$opdc7w))k)5{FJ!$i`m2Gu$IITv27u{pAW+WIl5Wm!~M*K2#t0+&%eQ#VV(z%_% z%d?t>Ct!v_+}+ijKzkhWXWY=T7p$A#6t0Bu;%FmBg<}r|py^y~(7G8JSmg6|Kyh{1Q?qT@wZ*FpPqRa_v`HcW_3hqfE()uVg0vzhm_S~>F|rr*+bZTG$iMiEDVP&Zu^B7q3J=*+?S)7CcH8|_^j_C-nGzd z?;dY7HpG<2sXYQQ&OVWI;(Yf_RpofmA42*GoG1zdy2~Swn`BF_>lEy89KQhDP-%Su zPGT@%hrDa_xb66!fHpCkUAAmM8)nWzAk*JcHQ&nz;PpoyI7VCm4|NrNqxP!Al755o+0~MJ%x~NU(?}m*YjFch{NkiYekWNZL8a@9-sNVUS(5qe`y7P?vqR0Qj$s#Mv`|Krf6j zLfXme7IR9MM&_=~wB(BaR!(>xOdUQApbL{ukLqicRg0gG|11xuxepeoAgOoN=8 zyRY$Pv0MVWGsS$W9g&xcwgodjP-)sq2vst6K}{@L@v1Qq1wVV9i$-}!cCCjQb))Hs zy4;KJO#SHAOW^5PQR-ik1%Z0*9JV_egn6wPG5C`wdJPKx+pTPqRTcLiEkWBT5HbW_%o#{%^ zq%UFzRT&3yzcJ1TDv9Y0!F$UKkpS`E_JNE780;}aE)5xQ8HPqZOqA@`anHs=&GSRr zBd%la!bYSc40S>;L2<fbvc z>i+K?z?{oi$E-=B!_ojyleF9N6+ zxyxZXeL#$({4^ph3Hve>h!Lk7bRM-Ub8n%N+Y{i#VesBN1uIE@j&0NxUI3-lC8LPI zddwULPpDt2!SOst|7Cg*(ncA_>0ObLbH=89o8FYpn+ZyCvPq!JfV4D&E^0;RM8@XNMwzb#0!R4bUR5u$d&iCBlo0^~^LQG{ctK!U z))*Ubi+2|M;C?Vn{oiY+3P@c+X9q{bLgRnLGm&04&^$iiOzb9blPVTN;GNNT6o6tu z*D!-)5@WTtm6;S;gySk|2*^kAam14+^Ef?q!Sc@8tYCuUQat=T6^OXbH%gxvVKcY! z2g?vc9fGKtJh(f&Waq{m%;hi&>oE~iYQJAtB>G>#CEt-$QQnmEG#BVwHJO5Cn_-1M zqQ^730W7*_7g6UG-NQ14jWG{T^DADK5QI0YISw~FXd@~swXrd-*lE5J%&E|^y#}`; zjv9HdN4Yohfle__=Z;sBz6NqLdPYI+dnIlN>$?1V<5}_ls(cM1=r`Ji53P%jh3T6b zSBfpV{hj`^4FT1%Xca6Yz9asf`M%_}#Ev)gj{LzIeQ1VtRXRXg&Jb$0UEA_`1_{X% z&)+Io{CT#HlPry%+l~vf;U2;w=$uNlg|H`8!`GQgbz>EN$i@fK0Obv0i690CYiCj` zYeqo{61cqqhm2F5bf2Z~EmK?)iBXxon=U?dJGAoS;cxfjC(HE?aIyMV4o%Act9pI@ zcLMf=q8AY1s{`Uy;!kZ@;ybBzCj5X@Ks>o>UlvmgPE5{{>F|K&&*F>23Obt8v;HbJ zq+ur$e9Pp>BnqLNoa9;`(#=D=RmO|ZsSq8l=4y~~7X=)4?HE&ki4A>*#{4Q{T)Nw( z31oYOkzIp8_DJ;K7J&iS@79}4+ay1JhR`A**(`lLWlM^lq#;`FokBD`HJ%uivLrwu zj5L1MxUyH!dcVX?_I3^c@aDv0E;5&8#yub)0}IvqCK@OneDSsPAZ0USZ-G zNi{OYI2PqhAPA++fR$-+JnjSv56KgbTSA^(>l87bW+c_IiZUK^Dz`l1*_TG}0S|huLisIdi*NPP^uyUZ-H}Rfrh!dhQ!kp0$CK<Lj%hWZ7s>T#85T5f|a2euocf!}b!!<2v#D-cY`;{c>{&Qj@F`)EX7K*Jj; zyILbZ1DtP|aSNYt)3jYp6~juzhax9D)&35R5qS_%M#^HpyKSw03;m!;u>kNC=nUEZ ztX3`I&IMS7_fg2gGzcKnHz}fGNCfPuXLVG?9+ihqVsn;WZ>JKMnmz8&YS&pm!8*^3 z^zNv%D@bV9as}tIoONXnhH!Pu2%ebv=dJ{6k?H9-S`r;`UHKh$$%Xf&`pv(`@dxlPA&uI@G7N1WG)~rpL$S|pEo-nYye6eTPO+MNZhOM|!IETmf_*_9bVOgk^FQtZzNdmb|9A>+Q6)+SkR zUYz1Eb)0Z`3VCr_h#_PH6;Tu1oJqM$uxfl7IE|HaqU&m%URk0l2l5?(tPOTzDrIaC zRsM))nc29y(zBo}dh=Cj#Kxltk8it@>+>6Iajj`&S+g3AF!Vs+ z6xMr8JI(|=0JEcXA5LaQT@KtuWQLrtpCE3fW(6*?h=Wn zeDrdC0(g&*jr>BzHvg!u+cpy$~GNzcI?Yb>M&@ zkBz4i>mCPiHd4!tp!>GHL*$=akYbE5?rGVW*D+?L`Km0*&J-qVJ(p|EA773#%n3v= zO&|C^IR<9p90-al1rlKCj&9f$>L`PB%B%}CD3`QDkB|L4Voq_n?*Ym0tOBK5!H!(# zR9dt+oYG;i`ittY87xelGb5(%H*yyTf)+IdM6bvje4N{2*&iF~AOHeCK>B>kZyl;F+;-(`b8JNN|cCmxdS zcr#Jsuk!|86p*y+DKHFL{Xz3yfp!mGAA1B`uxX zwHL?ov1ccPxx%uThg$7>0TWU;5ewh8uv3`U=LgF%wAFtFRDMNuUgbOLZu9z$S@PUQ z&W__g2yZd6atZhYnQ;sT>?5WHFx6HSJB)Z~P5g$Y>jTu}B;9z35~PG_J_MsATuA0e zm9wx8q=Dh9&E_ElBPZ(|4QPYV-W0eK4S+b08q}fVLU)pMX{3~=VUMY&hy0!fzqUgq zsm3cOzIIHKqxBj)?7!Ej3y!1QFWU-AjE!`Y+4(D%U@bvL5eOY;el5-5{p$_v&AAFY z8jDDxW?)dgJ!|SP(mZLBw1DH>#>K_A#*dpD`kMH<-GQB>cdVvKXIO9WWG<9`giyf7 zOX-!nc@6Z;awb2$Qeb1`@F~YXgfz6|sNnN*yo_}7NrM3gxsrUL$A;dD#xu`=a%Xo8 zdtT^613Dj-B4L_(V^6~0%HeqRJ=`z&y}a4&Itf$MwkgD_Dpd+A9QKR}*yrGiRR_jD z?onJ-yBZikphNd);!gGnGEL!5u^3b%Q=pNYiO}%Z8lAQ0!a>S-%Yf}M&QAoOFVRYC zQ|oQQ+o4U)X;Bo6W;oQ?38ZAT-imsOryJzqU%C-wLVq$FKIUpfi$p2z8y1Pz_eoM{ zBuLqrYA1q4H;wgyZ|^k0o_a>_66E;Zx`0aym)<=aie3aO&|+mV>}1Fn>-5*u6eBtL zlQi)={%ye+QfO5@19-(iG$fCFGBl=B(7I5m`e{X&7@TKARR;{PC{0~N^$Jo?1)G(0 z&mDbKzQco)0f&88ZqT^`9C96f9e$2I1Geo~5dM^?rx+_#_#Dcm&} zOPTx(sZ*owjds_22Wr5z3Jn9WW|Zs4cyHZUV9RQLy;41+NzW`M2HoQQc^Xs(=Wnsc zN{$k!$~UG^*-2hE5K4Q>SfrHNKS!SXH{5-mie>YBhY&t=%7+kB2-Gaqk&jZf1-N+^ zniIqrJVd>5ihaNg47E2WY!1a8erqyf?&62c1-z+;d|YMeib^gSL@TwMD`ANM=zKZJ zxH%ien29R=E|CXyH~0aX(6vr2tVOWa%=@~r>zPV1hRx(HJRC{1_xq#=6`FIlz@1$XJ=xwt=m2{S{U~1haJ_Q?$ZGCx-F0y~^eI;Az%RZJt)wvr`3ckdQ;E-#)+geol?Sh@spf>m3Rbyhh zuL&=py1bTPBA2H2Cll1miTnD9Q5{hvbnxT13B3qoChVNE&V+Dq{0lL`p5_Lv}X?My+g@j$S4tznRGTCp@vjkg>8e1xre+c;EOQ zrBM87vhNnPQHzu#$ z$r!A#bboD0$KwNd7h>(5thTyc>92nCit*2zA8ed&Or2<$yqEsm{RAzb{yYq9q|4ME zkhEqN)co}f zjhRBHP7e*?dA8-tJa`o`GbZz3)~jbgELJ-5~KryNf#uLW<}6~A~Y>S3wQBCohN;zKzR6VOouv3 z9c25dS0u>Er4^o~N8kX^zT~d%6Ag#9D-}Xu5K>b!ybTd?;}))Zk*o6a9*^Rm@bGuZ(;Cp@w;f$dIu?x0OxdRARo^#bveN5`NGfzUPLqd$+LceC?x2g_Bnv3G91( zSEbf(;<20NXr=<~LMd5g0KNu}K|h;XPO;yZZ#-tK>TjfXJb70>fqm6)_5QnRv>-x_ zGWJI_o9Kv22oOe<{qTUyRIf_bDj>kho)|pGle(WOelANit5==|H5}QS-RMI^W*6tw zhrm*M!I3X&4+xCq#KE}LetbuKIFdNc6?Zo(8kKC@oYZ6@6@0nc^}5S^bY#MfLr|?Q zwQ{p`f)Z1i~js&Cov^a?L>Jt?=7;a0H39#>|)clunjVycl z#3;ySK81Gyq^Q0iTP83k0f=Q491KebZTUPs)BpOi0j87RuR&g}%3A^44H=Am#mJOC zIP9KuQG$}Dj@Bce%ZX-KD2@}X_l6As`dp&ukEAIC5LhM@z}dl@Oa)X%G#kmc>ZC{U zd_R`Ctc!0msg)=gwS{tgtV!~+6RzT%4SB!S3!$u`^Wug!cj1pW%ZgO*OVYKRu|CM{ zw9`}POf6c5&TInn?)>BFM-BPiIn5NXP!tjMWW>O$fo%`6wP>;Xjuv4>efAk8njQy9 z6j>RT?B3Oz$S*05R&cQ)S_3TGpYC%<@wt>s+sC-g zI51UsXmc~$doEXl3`rr+$V?rlsBwaI6D4Ji`ooLal;$dqAz7)R;JM_>i?I)xZ#jvl zLWuyD*d3Oc`2x6Zc|>qGV`KgZ?`+84`q`Fv(Ct{AWN;%YIqawSa328bs+A0~lU15P@AWaAv#@0nV?ciHZqX}%yUo~u{2dAL^Rz*{RjId;qu#KA;G|GZRFT|F9* zCgGktWiSh+OlM#NIual3H2*)At~`+G|NlD{b8qB6wwYTZDRRv@lRHGYi_l5##2mwf z+#xadksOsm?zNodE=O`Ka^{$OW`67Q{r$Z^w)ftz*X#LsJ)e(*q44ir{z%SQuU{{8 zteLJ;;q-V|3d`-)`}io=Ed;baX)MNjwsnP$fkxmw4ZN%d8}4aCbf&ap0e|WK0!GBy z2Pf&Nplie23%h#W%0-JvwGo9HQsH27bYezjOKEEejl9zEHtd21w@9ssUdjh1RFtB! z_={=r;2s%7=6kX#dzGbq(7#h%;R!>*`@keeKVO;4 zsK|7%Q)(nA>eY*$0UUJ&cey(Howdbb?vu;xwX|PbG5%j5x<@MK2xP>~ z*+>Ize}ltotvq8G1>Ji9@A{;(!RB;4BGW>dJa4d(wP#~31r)gZkThWEBl*=#F#D$z zs>l|^jQLD&s8jIs1bS{%6vKCFDvOD5AE!ru`G$5g;Zen8o?>uMQB+hYRxe-Frial3 ziu1A`qc1U^K`-k=rn1%R=9GjmP-`|6e)D8z^AhnzOu?$*;v+YNUTgk8xGK*UH3%F+ z0oh>d)dDHStl0jpy4YTO9PQ6m*B24<^Id z@^||2x^}L(y7JN`xCjX-$Ms3Sev2rxo9TZ*kyp4DA=+iy1(H5Fje)Wc^%1ca? z-$6jsstY8ru+DtQ^FK0ymXZ3T|0+gBPba%P`m*PJ6G6Ahpgv>}GS-I771E>s(x>ba z_IkunsWB9~j_PsLhCMLSd#;022QIv_!Ky8=#s4^8$0OdsMeSA$^vifO0QXsZ@uGuB zIE)8D>4{yfr}dm4#jZ*}VE&8ZYv=tK3xWqQQj9JuaM~s>R6mI4gCMOt7Q|$MHx9|; z?K96mBV{sR-%`nZde<=pbr4#|r)~u0$@T-RRu>07xZ*DVg~hQr6#t{bB@WVn0?=kK zuH+8vPZ0#o<*^`LTI6sI;byM3wp;nP^1$pOZ6t28%qR|XbdR)5o|^rR4u89pk0$Dz zF$;U}5?^E#7?b65dYb#NAhoxDs?=v#Y{{-1}I% zLir|Xy(bQS&M4Kv@>rhAGF!1)4OV*Q*^M4drPmPj5~v`9ne~3*KY*CSN9CYw(*pDQ zlmLq%hlY;474}i)dM>^zPvX?vk724X(YDXfJY*>`aSMg`@PSD_>2`>XfDz_H%MN0J zF5aLmqxhXw`5U+n-MP!`vdeC*^xvXBK+B>)78nIjL6zdNW1Fu|FcwKkR z3r3-8COYNotxJHW)Pfa8gU-+>oAO7i^zl$EOYod(5CF3@S8R-2Q4hb##0xr`V4u>fZdwDS2caiz~j)M}j8wU>do*$DFf5M15*x0@#X zmOBF8310Z=F*gTem_&U;%?#s_+dlw9P|!pTHuAZH=Qjm~h+&OLkz1~jw>Ya|Ut8e? zF>V_-80Q-?5)c2puJ! z8cfshM_ERO8{H3tbeA68j0}u)Vmk)jVPga{&4-#>TJx|a$LiQ)>E|CvM-8`o13bBg zoQF7v7zR56ea4C?Bs>r2FOxdd zwd9$`Mh5{jNpnr!3<=*rO!$a7enmXYMP>K-9opq@UYrp{FaDX!Z3{v$yxG{_1Q=1s zD+4JTrfJHY~ofZ+?(_<&sX>T&3ptMglz%`D(^N|URgMnW3 zFFhV)tF58J76`T1(23xg2^p-p#K6aS69Q$oW+i(6W#D!dVwiU|noc>h&5H=fcr^wk zU5^62{dOg3vgDMZsh#0&lLG{OfaSzSM^?-%qK-{hpcb~-A5@53mrDmLH``z ztD;xw%+g3zkLBNJjLrWC*nKK|)GZFiHi5brxk65)3vvZ;?iiewFF4%9y;{#~(+H$5 zyf=tIgA(q87aA&=BqC=4mpe^$cHrF-qv{3;t~QX)hY#o&bX=iaWrAMJUhFB1;V+-L z8VRT{ZvV_YNnsqM8Mc!F8>y@-<$?l#z@0?alV&`zz`1wH^mgT=wi|`cllWj-*3V^b z9gP%2?2X$x(J4!-FFzI3#C&~GR$ez?8TX%l^;(MgsN*LqMB&}!0MRb}^|;af2Tu1$cM^EBO_(!zNwj~+!r({wy6bUYUZ^1j?rp#wa@(g#CA zImNkaWLf873`7BO_y&dzKU@o^8+1H^C`78gWV+A_bE1udnOA^)iaHQ zk=IZ^S7E^nZqcPVt}S*4ba;5H;6SH3~W^)PBkLc<|Ki z%I-l7UQS=@|9?2(CMM5QFoxrAmsli@_t#i$AZ&c)?_GsgD#e1-v*-8|H>jWT}aZz+c1;70XZFPZdm=v19tTO$JK z*Fke-5UZW=Xz8iCNAK4UZ4`^XLIw(;9;X73>8)PRKXv0DOtDo32G zRBy7ubO2;0)-oP*jlcCDwIii^KV@c^V6#tUo87Ww@UM0M|AioDSDIEq-Rhm1qc?;6wZ$PdE>9evhasc3yryU1+-vwE?*rgMXJO6ObO$JzEH(>HPlGN zlnXdcX1E*9kngj^b(*xk^9AW!d=sez0s|s`os&D;7P_G`<)sSb_0_u-i|<6ce?A+R z$JN8t98qC^JeT)36(4j6E`o{jIf~oX%a%#5kLYNAjd!5)wqq(<6nj&*$%4XL+&D{R zBS{dh&g6=vjQ?wOsAB2Z%Xz)H#@I&9fDe8o>i`Qh2jAdo%hc_D-aa)beC03|fD5dzJ12h@ZhB zF4-N_vJU4(F&4fAw|mDuO&j-uyQMEFb8A^pLK`_-2ePy3BnInWOrO*X!tgWo#{j%hcV~pjVHJXNGdksI~7Z>Kv(2e@>grGz3$ND zr)$4>kuIB#tB~>u3Fr^aV6oMk3ZendcVz|RLO${*SYY7;RltXLDzPe& zhY^%iyB}6{icjwelnj6Oj|<>Nv62|58Ya3TU%Derk2de0dCC4$taay{19Xvj9vKay zUko9pJeH;KFCmz&k_CL$v2MZ?I+#kU$ zfe3EW5zPXrmNQ+Wed7W(G61#?J6XUpW2kk5aAzT%MrLBrakymN6V-aiS8rYdK zz7)*AWOnbzplf@V!%6qr{~U=c@!fG-66jy6)^W;HE+)8sP5-9EHyNU|*sb*HZAES+Hh$_h>XUJXhJ4RL^oo3eVA2%)~1S0K`jVK0KK8^jCH!!)= zST3b1e)%0Ow?ZBijw!IZNZ-?bI4=r|Ket@r%>uL#V)Y{vQA$RV7IfK61@X|vFOi|x zjwDdvBQZhU`RCW+Rm0IG4a}V)QBW%0#6BUSKJHvEKY{M3@B-@9g2%@3;dyTBaFYZ3 zyjM*d&NU6@`e6Osnu zU6dG)7dvu=gK?Va`-ZOBkp z)lqjkXga>Ef>Bu^H}FT~Xzy)?q1J&P6!ixYb%}3ixD*`CRvnXGu+C!35NEq5wk3W25BbJi~VRHZdG4UnWk{pgGtoMO{Qz;Achcw z-=7f&Bx5aoc2JkKh1LgfG@WeEaBn^EpW~3jQc=xK=5#V0WogsCO~ifIqmf6Z>HqiI|6q)0+n9O8M>Wo35aMBH5n8Koi?!Uv#5y{ z4WtM;e|Z-kalK>N(X;;%e)hY_xxZ0I{tP2MKQ*5Kw4lP6mz7L%P7<9(y5Rz6c)A3? zj9vzjQ2G?8z^~}P(LaQsXH|rMz=s6fhx5&GvEn6B!VE7U+eQ<>X93J*oQdqIMPGkK zhi?1LE_tW4cz6yIpethBjBZe-c+XW!G=gA1z0{eF>&!kebUpVbr0~8t@QHZU43znw zQQE-UE~qtYpaLxgO3{nWBb6Zl;Fi%%ada1Hh{m)#B_1`Q5@W7#bx{Bzwd{ec;Yl&g zK=$7)tSOKFB^4z~-e2ill%q-cWt_ zkvC=Q5?-nW3~<;;VNRgD;n(5zuUO}~1NP?xi+3D(xQQzOj>}*mrcqV^^zmGdn!P@# z@F51`wvw+@cBw#gD5P0jfKNs0e)ur!E{5)gjyZ_;<{4k3^Y^_?uWUIqNmx)e*KFqU zo_Dp_=mr)eW%~1cEq96d3uyodIEI& z1JY3Iqt@5}K!}E>{tcf4W$em^@8A3Ok~7?Q^W{?uu`~HBp5KR;c3$gJigMzWELyB< zG``eL|DgYwq#E?^k65;EV7==hdT6fe)O=2W#q~hnYat<`Y0D!bMM5R(Oz~+o19-@r ztXFX6DRPAGFW7X9G!?GV$)22h2aX6xc=(e1D3DmPW64{>l)PWI}ql5-u_2d4ihX&Yq5AV+Z2` zV+%+DfB$~L$?k3ou<>*eb5G-*je_uMHm@Suw;k+{xNdLf@RRN?+d-Jvf8FQRZ=mu_ z$(UPu&%j@3NVhF`DGI+#j>mrr>^zGN~2lV{_f>x(_mND!B^9GxYZUir-uvrVMAB}0ycwze?FN3r=Guvl&_zU03 z!;U`iB!U@lzQSbsG;kl}-TFFfs3#O_@7_r9`~Kos1;)HO{ZGp_@Sk-U%ZXci#^LVZ zlils4(~u4IKX)$f?(q-@&&E=v&!2=Y|7KkI`2;9Du{V3^6lNW8#O0eCx;dHN@D}IU zbhn|VDLHS(Y{O}C7~L^;0-9NDrQ)@cicVERZ%1Eu?Y70e2(>#gee{TRI#N4H_@HTj z=zs%vW}W%uV)&huyE++u*T|vcEt|N1hY)nsBSX*3urEy62G(RTU(QfBiZF@Uc_q9_ zLbJ0-XZkN2(cmTJ+v!YLzHIhk>Qb1dO+DuK6#`evzyuFp^UzOG@j&RxzUC2MyHrGMmfuA;9*zlUw2zj5a^U z9gvxQAv+hx=e6o`)pkA~Pt3>N%int#lc{uzi+=g{W{8Wk{&HzgNMs@)P#E@2wDtir0p+tQ-@%Y7Cke`y04k5iT;mQmS1s} z7xxv_yt0fd6p*D4gkMwd@%P#8z9j!SU;>jEwm2<&w%8)C5h=$A1Vu$Th=#Xkvme6E zDUToR#*5OZx7#G6xVtkcbo6*20TKGMRki)OBPf`ttJ4=OH##AV2fjqqaMpu8qppcm zh}k}r3rd)u;28kfOwYAGzbba^G~2<%*+)@PgnB#U;u+t9ng$)kxb;TqS0_P(T!F-{ zi|~-WNOA^U8FxDWWR~KrZjRNl{OveC@K<07`PQ$G-dm&6t0;boi1%GO_I=%GHgI%dUx@P-+(=PT2>JWA!0Tgv79qI@A?#&5 zV;A@Awd@*9<%h4Y#F1qMtd(i0yr-tWmRd=yw7t^0gVWl03<;LXo0hX% zymi;6ZP{TVfT#u#%&zhwI5}U93tr~e7a?S6G4f!W8+l`WCbNQQK1m~`r;j(a(8O-g zfseD(1Q_i%WR0 zHsF8)`>JAoMxKLM+QEC??dsuMVO6asrwf%;TWKG^zU@w45Y?Cy3}{9|+f#%B^tB0X zyYH%IP+98w6Mb-RqYfLr5FBNZuXmn5Dy0zwTz#(o`H=?5U)%dE22xZQRmHZ-dn^Qq zeB~cem)1~2{8CNsu<+~5|6)G<_bi3A#Oey1C4n7&B$K?*Y>sq}p{wlg^RRN;4+u>~ zX^GrQ4Y|ZbP40}))36N+n8RW|<+qi_JxPDOd<@)OqV$nKwA#I5AdlM{^Mv$p zdyTO!p7YI=wO_}zxKYm)$SyN6HKvI#LdxZdDw&b`8XQEx-;&3LSfx!U~>(otYYZKO>GjKowjsmfV@IsQo)% zFjc0S86YvY3vx^!6+U}>>|1!PSFYS6a4y*?{;YBMb~?y%-uiHQpZ8~&P#i$kf1fuo z_^=i#S;4P7-PP(Tr?DlEH!7@DL7ow+WR1;}rVtEY9)78=`kKj?X`~4xg4i&<$C%k@ zG}HxnCC2+w^(h8&AXk~Hf!4xBAxr6n3VVbXi*9Y{8=BqZxx=-Q-nEe6N!^jwGkise z&MnCkJu19-Eu3!{busO8%>f0;e!>+pUwifZ^FEh6E2h4T)A(p}y9psX{0khQ0r|P@ zwCt?^eUjx&oNQ>Bxr}gtLU=+b$^53~dyi|B3A?P!Vy3lL{|e#W^2T51X?C5YGhi#v z06bpkeY+^CN{QegxO#s9-uXgBw)sNCPLxZ3lnO0gi&~_VX&yiazCP=%GA8<|77-!dzo*~GVVM*Hhr@94lb_A23y5OPW!ezb1^lt9v z;IsJlzjJtxmal~F`Qd+ix-@j48P6VJOM3hN9V7y%UP8j0}mdmBe0*^1@}`d{{6bw%rBHH{R3{b*(a9k>eqN!wHvOOC7h{bOGR zuGQhM3);vHF2<`ZKdo~P%&^7ni_J)Dd299=dn_b(;T0F?ew$L77+*qs7m+V7m0`Y| z*I2KT#zyzOBYur<1|?z*7GUgznhPe4>$BSt`G$&fs#=!Qjni>qJRIyrEjDoxEBi_UWupsL?K z7dDqi(HAgN?Y;f?HNU++dc?Ez{s-R^+;fNSs&9`?LJJ0mFB5U^=A{A<)T&WH6E)3c zDmqwTdo5wiJ1|C2HEeoXe~P=k-sI#C6RM~FvTj9u0##!pZm6c-(_7h+hxw$o?cAzw zU_r7Gsmss$8eY}4r()Kxq+q-(SW3J1k#~w}4|5P%<^e7=aJQRSoY!mT?YEe$ZE;8$ zqAGXjKO;C?F^OL4i)%s6aCCBo8&Ol(`nom*2Q&SM<>=J?5`B@hk6yN5x<&cFOiifP zU~HCphUU84m<4q;+Iy!L`Yxuu?=w2=^%gvNQI|N^ez;=NBrRM{OW=blxxf6H!NP6f z>RKhPm<|x%-msmLa5Q);{WS(Mwt*=!U24hdlqF;|nBbk&Tx+~Uqv4vp}}zEG1e zZ+fh+1hf#rKjkfGv7MhZdllN_vT1|FEAb+=V_SLhSwdMUsPJP&1=1Pd%}leLd#*XF z#uQuSB;z)#)5;!Vx>9-&RGV}&WZT-aWZvyPknUJkk;=Wk8uw&WRpMx%I=1}l7~)_x zLWyAbsX7kzDJ_m-)$Y#;DD4|;Q}fbfDIWCOzG5Rbz!=Va1NW}t5|b`*Q%-TraK%iW zJG`%D%LO%)2-}lA$`0LXJBV}I``SEF>|{MNw%2Fy6Q=g&#FFd#(hNHM)A%3F1Dq3H ze^#f$$VBJx&|)XMQOdk#`h8ZTx82lx>PQHUsurTCn2@qz#NfN zpP)Y?9)``-R(S_q?0@904=MkO>3+cEPt?C>KppDnvu0$NPiWZMYh4xK{*hkn7*k96 z&N#pQs4tP5@%{~W|1ym9gGh|52slgD_zggU+s(rsb|81TP^M7XSkH#xHP>mAN3u)G zRq*B5?{&o_-){6nTM+L{2j4k6A~*UZE0SVmxqdCL*M2<_x6yjr?yxoV)b=L+;v36D z7GWDyNbyjkpP6Rk0Z!@K;d&@iRFSK6c*nVivr}FcXrF+|xJ-+6`yq~UgDGv6SiF;3 zuKwpj^G`!kU#t0d8Q_I2#3J5&v#idZeaG(C$bokj`3xiQCc}dLu_YHMre1$9t9gw7 zAfKmbm`;%0!!^ohhilRnXWiw?HNDgA7nq3oaPfh7l)*Gbx~JZ3+e9c$idx|^#U4`d zcV+Noa9SH?rdAb72Kp{=5+qk7TE6JsoW7U4GJC}THzpYDW1P^q6`kt^U3^P5Qm?R-BZYd-0+?J4g%K(CbZG2{O%jT}D zi4WFBXb392mHWspo#7sF$|@ai9gKhO!fN9fV_4Vg8V-IaBpAdR6Xpw3b5}+*GW+^? z7{$PKO2^T>**Lj~)W{&38ux5a?-rro%N%Z@E3dYVdJ6p7C>jMJo)^L2oT@XW`bs~b zn9S_0ET3$di#WxUnjS@p^fJQFhLjU;)dMd4SV1FYQH+m^Z#@g`)AF@bow)d|uyEMR z3$U7USjE<3L@X8WHwh={PZK&bwR{)&Cg-w(pGcWoC9}AE8rf>(Rn03@x}?lu&}LN~ zg4;SiHq>uP+w7NMl4abx<}8iYGI8eo#mkrAKSOeyHI%7XTYaUCL|4`hA?{XT=v2K` zr<>$V7E3Kg4^~X}f^tSL=PkEV0V_Y4za)<_ZaV#z)-B!uYp*|sKV_5({O~|X&8vz9xORfY&MYsa2tF~Z@s6%?W#MHHiV@|%2agp$0qzp94<;LSdi}1C<9@IM>b-l}8rbp6_fk)93EGDO`g5R)IvzbZ< zqS?T*U9ZVTi~`qTF{do^R3J6vG7W&zBPDOirJ_nko?%!cuUxI5GaRxl@;G<7SNrmE zdm?G(eMRBdqbE|2d;RU=Q;xVTfL;=EifGIVBGLkS&FG6$O+0OMdW64swotwD_4DgbJnL)ycr234q$M=x;qbm>QI9W4 zPl>9?^XFG1`-}^!>VU7hq(qXe#c282)=i(tgOK@ACK(5hGcW;J>G^l%z9zy!HThL= zbzACP1CsqTDPQ>E7l-WLVnh94=o=62Xvgo;A()h<8>_zm&WN7hV~7W)(l~9sR(SSz zH@xFX|4q>-r9I^nBxOu{0#*m)^LTB3FO+%@GF2A-?KI<3!^Y^qiFC(NDJQEwqM{va zbn=!1wTAR1>JH<|@Hp%W zw&KZ)0QS`s|B$Zav365js5WgK=wd!yN$@Y@?$j3)nV&Vfc^j%?qo$XklW4gZ2fUh+ zD#s*$jY3D2F0S}st6U5L#I#S#pkiKg16?TG+6VE)&*1ORs_T}5NpVoX=7enyi(-x< zmB>h3ZQt^!(F6r$-u!d>1>S0ss4Y0#eI^COi=;P(G{~vxzTu89=5z|aJ;&TBH&_bi zKuL0=HxIj=``p;$b3?bgP>XIV&_2VNtIQfTeHOG2-B1aQ+#7x3_th55igo-`VARSE zl1cH7bLn?uR=X*Mmt!auz0Ju{B^BV{Vl~;IxWi(;sgmjJ}x)#e}9Q-VTjYp+2vlhkYT#iy_g2eOcj z-=3>%-*T7M-C1p#iRIz84x>yT;>TjzTC_&n_VT8p$#XX_)?_W;;fEo56)-?HrAH`-*c((+P2EFh24v-=%U- zGSuBTdm&9*d&+*^2ZB(}vY=ygaQ3Oy+|Skr}DpH`+z51-P@=LJ`Us{OJ6OzSdp6+dH&NBVcQwUv!Le)FTr!6g09#*B+` z_1-`%XXwZZ;u}+YD^_}@D?U!kP{|CaY~1^ zVLNfBBd@fx3P!Xi!Tj^EjRgRL#|Um8Rzc6x{-x7Z2l9opdEI-QeC6Z`5&E1I6Bbsd z9c4L&-Wo^m*E9MaI70s99D+ZRxfm4~vR$T^XBQNjd#&xfhl9!yJDQv1wj{*5xSxC0 z=?HYD&o%^VXlz7s_-V^Y4m>j6Ul||cKdBV5kmcFKmqOkNZ_G2$9R9R8fi z38p(8KmKnasC(t9#%Z$r_OcjQ<7uN{#SI^=6NOvFgS}CIKu9?rdg0R}nBO7X z&-#Lma?G8X7^grT-F^v{eMG#e6i*K;zXK@|#0|-N-}j=vqGzHobYp_I<`mqaeB*Xn zFY-|KtYGzA1&+q@2$4Qd(!B|W1(s$(Y(n0a>#d=7{XNakK5AHtK zm%$a^yauAA8Kne>m-!JO^Sv5@NAhCX4ex$b*bY=kHYGUC(-WgLy+nxTPiR~k9>iir zO^=Bv&QqxVovj^>J=@;*;3gg=c{Ehs-+EZdL%9X zYxPV`u9*fObxDYnIAjW#PW^K||G1kvUp%1@Ej1m|(MsVysQ>L~C%7sFgMX{RM5>k?KX+Oo#F{4bA)uXg(Gprt(E;D<$t{t$wCLnRPuQ}(}`&$=vdJ)j6u~q zJ)dpXwp|yRTec9}PG(?yKd~66Jm-8oh7Nh57Q#PrdyBBiE)MjezO!%*DZ?4(()s>~ z{qBHI2=o1MeOH5ItwtI0OuJ$gSv5=Q)HrFNWDKtFB%I@(ZBzy7o$G-=)bAna=L?Um z>hD^R!3?hwN8%(0G1VgA_!8KPYaD{)FxhJ~Gz*VJ9#dXiRyLm^n20f;DTCsDrp5g( zzWV-;#ggB7s(SagKE6jP=l;a1$Mj_L zDpm$6IN&7y`2lx+)DW#xg%5s_n3+0u74Xh9br=9d^MV@IBZn*4J3t=KJSpIOH5r?j zs`*H(pzN%}y7F6Z%VA~Q(rwCbJ&W+8bp9kf$+T<7`pX|XBHt;?WnS6Q3&?g#qHCrY zoIR#g{{V3$p-o907b<01M>LT5*gRA-B|Xj<8_nftK5G}MXz3rrf+K_02{kSJih-FQ zRz%$sPy88-rB&6hc$-jz%ZlC=rzTu{{0}?i!vpKJd+5aF(3i}QN?MxEY#aabvyByc zwxx5MdzRplv%Irsi4uzu5QwCOmIOKP9&xFghrGUMsyUe&v=O&rFTu@xfX7ge3OgRI zdQyD;{-kyC1SQ&-7|5@@zKz6wH#@-utqWeNT4Qov-&@3JavuV6w4)(!ixo#8++|a7 zy38XR+9Aw%|4X88PA@19JQ_?JB;TL+%FSPMskb^YTW4@9Gh0P`&>9@Et20XBnZV!< zh_y9FRWcl8^Qfto5S%Avp2>DVS{k!i2gfCl(A;ho-Tie!yjt0B2 z=p$+!fnM{h5JKE3KEv*YVyxPV-J%f*v9`t@IAQGkWNGGN^!cOgcajrFpV16X>Wk58 zk`Ur`bY;!*Jr1Tlexm$F-&L^)^5<}pGIh(EO7kkf|5iPcb$raLn=oyD<=>ntA_S-u zZvmsdzN!hie4tx~df+)L9aagJ-*KMn+n>=n)gUF!K^{)}FD{8)cTHm8x&ZslWchCx zLVxfeR8UeMXswsk&gx(Y*WrHASb-6WZHx^L?yAKon61;wUJ?Dg(X@QMifcFkZ)*%x z4}X1*Vj#fn;_Xpx$HJQIBKOAUlH8erq*S-;i=lXwvy@}_?pC6M<#vi9$Bi@68L6yy zFS$wK78Pl7?3!E6ch}|kj$56ueB!GOC4;tcl~!_$9yB6gwtBSJP<9W$TulZ3=v#Hw z)442jz27RIQawis)4KET5#O@|Z&!g_LQ3BDd#;!|w*Hh&yK_K9rb}96);>v9w#{3Lg{YXUM_f zY;d;_MQ0{$qMOoU`^Sd`s0bE|sn)?=)`JzrBX3Iygz2S<_VsxFNGbM{xHkRM(KvbZ z7%#1IbP=+`@K)_PN{hL==Hw7xP+Jg1M`pK*2vdvzA^(iHz?DdPvobSb&f4=V7GA!O zAvC#6`7Cm-MEc&=Lb@8ZVJlraKI^em`UJnryGS&XRZptV7wM2rh+8)#1S(1_G#83k z+uU11#cKX}9yb23o9UiGkY+r-S_lpJ1E?jK7}$Ja)g#(o&B*{J=!okF3n;|e(}l`O znMFlOLW}wi5cA!TOmp4WblZqCqHbo4Fmt)=Q&!oSUPWF8`jPC5BP8c8w?nxGPq}y% zq+e(2Aqv9K+3G{~k7|-QQ{;14+gag-H*>snH&g6r8!^aomiJn|jO%>7kx*h?Or&j< z3Q!Nf*k+V(^8V`QHj>qyzGv;dJoC?@{b_Wi56A~&_ZA8?(~`G;whrjVN##*U1GY_1 zYW>nU!&l$fTsvZtljp#y_%8KTH~Q2P*WM&%6GZ)=tzwrb7S#Tqc}2CJTAH(Rhj3A% zRE@gAgBS#{$r`9HCh44$KYG5!;?=JNeMo}`bpFik!Lp7THMuoSlUK(owc>;e52SZ~ zdiPJg@vmTGvYrALo)4R{!}|B7YB2~H|6ty}i2oe=z@)t-Im3?3{JhmKscmc5D;%Vj|-G=#xKo$M;{Oi9*uDxR#vY_?`D#Wg)p$Ei+F|5ZG921 z>$`D%$WJLM^WqZJ9TR~*pe%-gwjsdCE^uBS&R zs2*5LmvVN$ zy}uB1O5{DgWI4ZTN`nZg4V8@}31(ed=q6FTAGOQk=spIr_ey1(?b`Jlbc?Uk`WX$r z_GGxMllW~M^B72rd5t7^_y`rsgd~%0Hbqe^eFK8mrOk*rO5C2*H8p}$i1_7*#$^K) zk?^KjSudlM6j(-H>?d0p>1{o1#&7X>di1r~g-lMXrE~eKCI!ye?svm+m5fYokIt+M zxko%H`)%5O@x{Jvl={o6PsKDbxd)uOS|4usQd~1&2IEQ29%EsIp5%llIizr{uf5;3 zTP^rl+!kklLbNd#cp5JHs)R=UP4M`r)Q% zY`@c=NPkWHy06AJ)0j5lG8e2*zZjK2Je&Nc&Zv>6tqj~~=2*hvJC817;I(N4#LtO&eNX}pEteQ;1 zKas2_RCxQWx{HBGh*bwL=@@YSz?*1R$ zo?B%UaZp@9utti7R@XY<G9(v&mB(sNq6Ex!~oH{-`Ba}wY7D(rzvt}5s@!aF|H zZU`rXVAS7GR!DS5rTdf^3v_VpGk8>^eXD7I+KV(9z}Z)l*a2WP>u= zu&Q`e+0K%43wOL5w7%LvQMIkaU959w?oDByHet@;J%~^EG_@2HsvNJeScN{zFY(p& zD>|@|2NI5DZXl+d62(p5Svt|ylI2kmwJysioh!8*^^A%Cq`^U#3 z41>hsa2DmfNUV@s0()kLdCJ_aM_;wD1xyCtOLy!hd0PPeGG{8HJLrztA>!=6)ae9^ zNw;j3UAp4SL)~I*Ie$yOw-vjqLaUwUiBjpdm&4slX!4@zceV4r$#lVr5KSW~8+H!U z$ja#(m(Gi=zmrx}3XjtYp|E&T&l8 z6pB^dm{w&~Vrsa@8|Q6@XNeLhQYI!XI6 zw(aIL!#Sq77y3GEcT0OuY5!zAs}Ul;;lGdkKzgR}aHQ*lV!+ElOARdF7@fhB532Km z-~+vU$Za?AwN-Y7(s1);8@rL%g*Zf#GxV+SRH|)oOr-^_}y#pucUPQI>yJdNg^k1IC4SCA5Tv zqQdg{jsdw>D@g48WEeZQ)*oijAN89ti|zL&>Xm>}z8N`TFw(`2*ZxE5b~$e@EE6gX zcmaQ^l$=_b2V=SwIgCXn_?Zwak40NKXV4smXR`iaa#g$tt-lD?u-A0cjpJS_oKfNr zCx1Irz*&TQ?CYOipOuU6%hB9-oNycHdH&ShLa@>v!_ka+Rc~-cu1%n=tK3}R%a)OJ z9J{QYM}d|1uH5TgY}Gq+E&4&F8!x%H3A;(J6V)>;Fd>Rt4Ga&v=A2M^$t^$S64Sam z6py5+>W@Y1QsXoOlA#qEBSJDf3`lCfXC6ZZTc2)tREw2GanhDKbrplDp4s&kDFc%a zI+c>2Bu=^j7E*%~(s%p$Ltbc#Fn(XZKAhEE2+dplxc|c3?w5_-@&1^;umm9EM!jf$ zx${n3=t+d~Ww`@Kjr1ANgA<#v&72L9*fSW6dZdn*$w(Omen>EK8oJ(ka34r*yjuk* z^hvrqY1H#U3_oC>7Cn zQ&>7BlO{a~OTF<~)0iq1PJGoCjV7gj{T>H(sLbm93~L!ru7cE0go(*ZujJC|itD)) z8$ha5##`N(O(*lKyDm%;>DG}?d}=R%1i)W0Kvm4^uG{WaMg5Hz5YSb5y<7(l6X{-y zZT6p6zlcQ%^BN=BEbP^p&KOU`OQ(tR@M4v$Q>L5k;{Es4FP{dm;;ljIEP*V>;n_dI zwTG$xu8(>m^`5m)c#zUXw>xK8zG;i$6QKzkYJH*eM>dYy{}k;3e5(LMwI;HXEWY zAj)WYO`X}Z>hjyy?NUVZnx9nbLm18a1BaSL$t+~?09B3bF^j)?PNLCIOo7YpA9x5^ z!Vd=ld?kd70FKu2J-4kS>6`mFqk1iIL}K$gTwpKdgzq0!-lgG2_AgXdxB)mWci&AbNo@3ShsHyHppXEpmhKSdB*)C_NdzOV2@G?3P0P{GmleaO&oYF{HT4xnaHGQ; z``GfD8?QzO!(lY6bc(lXTFeTXu2hl}J0M#0j0OsnjU&^=&%M*%h+_F%^ zv>#TqkY>?&InVWsO4b9;-WbyV_NOVf2c0L6$2!T|aolX{W43&l@^ma^u`srrlE{gP zfo`eN(vnKsam@O>I5X6AABpJoq8_7 zR@5w16d(GaXP23N*;!-c{09ry!HeOb>*QEdexOP2*D0Bh&gwu_c6m_Q$Ewz4>)ocQ z9ILi1Fd*C`x4te86}o`a9_rA;xo#DNnIv2`<>?KFgl{G{{>h<=3teXv2z$1>!n{kr zzW*?qp#N#YYJ683n6SIdw)YvcI`kkpBS!mLI4Zfm2NEKQPT>zMBN-l2VB=%@CvsOJ z8drYzGKa~9TCW&8`Fa?k6QHvEA)+IxE6=shZ^YnQe0VPlmY-%N_u6@!!!3sP-N7D4 zIzsJL21wCwwp_ISb-E({udXwXhpLPJco@bqn2}|yGlQZcYqB%OR!O2oDU7jJwk%`G zSOzm?iAs@dMaxr(Qpi4pBt!Hd`;sL)!wkmw-RXIHe!qWy^ViJ1=brQZe$PGM*W7c@ z`MgKv%nDApe|V4NT-0#LK>z%;fOR@J4HbE|H|;{cNC`EEvNkgFgH!4uS;ItIh4r$U z3~HEjrc^pqYMW*pe`+^W!IP<6^0NLDhAZRn6U`sIS+=dSmoyHUA)XJOu|H2R_b8Ts z5yM3F6y4pZ4{9PJ0wtnFq2tIKerF6RN3P}UT8@n?r?8yj8;!<+4I>9{EGB4iXPkCU zAR|3^xyGT(F3%=v7{9`rPLotke%|z21(0FyyupKC)WS1w+_TJZ*msh6`t;D%{BJ1M zc+s8XS|)>sFyRQ`d8mJPgug)K9&!4ViNLv@AGS`qejX1cM(^}S=j^mZGh0$u*tqfqsk>gdDd`c0 zI+~CQ}e)L*re~qId}j%g}i;zh2B4XgeT}H2Y=yMgk)}?4!Iv+dXN*3{k;94USzW zfSBiY83naZQ^RdfSasL{Q(dMNf(5JKgRtiG>0*90dg(h!_qXJaab7#o+yXm0P)gv> zj+%J>k+TK2_D1h4b&>c$T4Pf=Jn8Bo_ROTHv62a?5~^wyGw`cHD2Bjjx!r_XeiX?H zm}?UZQxl9DEc{|XsHAsT4`kToa2n{N0s~LN`EKtP52Kmjm2qRgWaYjUNSfw(0;#ib z?0LSAijSSXprGwAJury+X3`>;`}1^D;Iq*Yr~~y`n&B)eb-2h7JL9LNNT|tcL$jXR z*dwZgMjkxaosU4^0i0zXcrX>UjwgT36)vcL-;JuC*uNf|Z!R9}jDZJArd<=$r$7uf zJ2RyM;L1?z7rm=$^e7|97XDkkYJqpmxZLN^uSSagg9^-Fk!>=S`6+-j94d_tRFkKk z4ly$nxU^Skv!Xv(^r-9T8Ev$f+XvhR&Eh*B{)-(m4)f?MI7>RC|l-uxmWxH z+QCyBW!rMvDNOrfRuCp&wJ~Us*6>a7RY4?@u@}s;CVotIt)S;dyWig?IQa^5*)PG= zn$n^|>Z8+y0{f3M%#di{5FfMwU(Z|)yFC4tc)fOb6o{Bi%A9+oxCsPV+V%l zPmp$b@^b|Xa-~Nlt%3P;JLY>Z_SgvfZ3yQ>u;pZNkBNL?EVl^vW}c<;H&R@CLg}=o zFC?%VGbMz=*#|@^afTbmLuB3BolDMEVIpHIymb%0Ydu@zPk$Ru>%FTnMrp}>UyyKcjhoHC(ZKgAl zwk+hP7E1Dq7#q*+M1kZhKJaf;eotQ~yVOL36wIMK;l_ytmrFKycu%Q&@cin7_v}L| zMnbPUCBP&FksIOuf-66tHR-*1j+KWT76yr;L#jNvk_aJ67BPWx8eH;Ai(EEwBSH9f5L!JIJdFb)nVBisGR?4m2xQSYrF7-XcTXcID26cZXBNI8bNee4kJ(M!NL-m8g3RUb_N;fB%q{GDl!L^AR!qi(2Rb_m z(4+I--9Ium^sZf9`!LXlkSCNXF#BW^C1_E{cCYbcsz_#t^7=K#1A-7OX~1IZD=T`d zZP-6*lYN)fT-^Iy#g$P_qU$pYhH|;rHwwzLw^0$E_q}TJR(jWlm*fUhOKS>D(3Dw? zDYdW%jCJ^$L9&z=G>o~j?AZ>q%jkdrcYw;Y;{+4mJ-R^!_I9AOF9^) ztnn!sAJx!X>a%C-9ho|~T_a6<-sbsa?95^K-y9w=$d?P@8&6&**CuYnm3B$H7fL4g zXK|Lh7V64iZBYs*=smBVwrkqUNo)8gYS_y_7CeFxg6KDBcw8dZ=81+!FRkeu`l{x} zU{A*~u!7>vr$E^&_=qq+^-=vE5yAHkWv8{z7+7d~Vti#(hcch4U96D9QDYFeZtZOB z^Mv@ZNa6~?)ks*AcS%DBPIdhe0{kN*YR{BfR!b)O1xrPFeXIMj{i0)^?!CN{tjL+h z*{-^!ofBJ;G}bzNs~^|S%5=f`5nuQ5^$lF9#(Lwmno2H8~7DP|F-K;@Z}+ zte3ngjWxO<)TnzBwUIDzHvt*QuOqNGabqI!V^;K{5e|RQ7)Qmn?LuYgH(N5DX6BZc zW$DL&O_l@O{ZHu6S~7=*N92YDCt4SmC94kHM%{UXtR)LPhH~z8Kjjte-VQT7-%`dDtg?!(^;1jlQ#Rg8H$P3zE*Ldf^qlsN~mRX%|OmpdIe44 zbCU_{tyb^|=3{fNaJu@$l4oDL?dlC+!S7Ub+YLy~P^}*=G{UAPJHq%CF~7QbUMRgn z5S7aglJM4znLPSpdD3v5oD-kc?lzF#Hi+2DEd-598g==#>dCrYApAu55R0~aNly@V zbj6=hjYk+@n&ePL!bb(KZRgIac3;Z+#jnZzK@2j)gL81(5gjRIe+&YrTKvc0kHh*0qO^%U_1ZM*;ScJqvg*U$KiAX*Ycc3tkmSV-#y}2>(N5)z$ zT!4>4$zP#H8Ukq#H0Tbaw@W_h1?~ZTFNE*PuK=FP_{#ERZG^WibW-!9 zQ#u7|o&e-DMyPhM*jvr3g*CvBC%FJ`qCjq;793AffLZmp$W7qlxO?&bBiX?ibE z?U91hE#lk*;ag|7lH&E63F}OGY;o{4;}Dp-{{VIFuoUjEUWgB;%v^PauMcrWI9W2fIXyY&CJU>GOyU>%9VBBxMjglPz^Izaqx~%w8bKgBA1)e zpCd6|IS{^>mRqnzFh~;)O@l)^@7R5x3rgH^$Kp-pP6B_cIt9uX+>`^v`B=C21;gM^ zaaGoaB)CA(X~%oJJ3g)r>aufj*r5yB&6G=`&28AzZ~^~x_{;N2d+J)q1J&?md>1^4 zzT6+G4)HpgU#pAuSAybMNb9n&GOYt7tdu|%SGbACeM^X|ie?f8aHL+-V7tKXf)Y7e z%~AYj>FQyONRYG5rpEnd3%ATv3+$_) zp~KDNM)%JrQA*Za6ai3mIuI)P`lZtAj-t(!M-q+IyntiQ$q8WGm?}R-wwtq^$Qq1J zy7}5mQ}yk0L$!8c4+D?;Pc`64*4Rq;A<}|t`w~UBdDZ{2`u$w?CSVIUmG+SOwD@aa z+$Id@x8u-grR59eJ}^B>iO|aMn>4zEr;ilTtiVoL6j|7;F%zn&%abGCu%@w{@bd}4 zR{@T1K)S+oS9?!)*8=?O$J#uRY#~VxnI)`1A15$X1NpTQu)2_`K{N6P9DZhWSwn4byGupgDmn=PARF|G0^-8W{2% zp+}7ztpY$`Lo6qk7$jr?$TmTHxrEq;+GR>~fhzFpyXT|V&wEK!)N^|R@anojUbMK} zN5n_9d7*m%_8{eV)WqX>AMq0CxkG@a`Jlm?Z z2E@S9cH`@Ijo;l^49bg~XljHKhkdblfC&wRpZ^3HyZ3q;E-mLm09(T5wT5~~+I#L& zE!vY313<@%T}6>XQ@tK{yz$tQ@+2V1`R&~yK#)I0v`3V3g$>C8%G^)oWwQ1>VGEwi zCd^CoT?iw~REVShi`zF1Q9uBUgdi~HFHP(B&I7#Jh33QYfFXYW*O0rP5-N8;xiCNV zZ&IUKA3QXg8iMGXE`3q0+ial~wlMW#u;_lk?fZnR%5F(^0cdqj`Wzlr_ zx2`4-Nk_OmEogp4>`mCGeqq+Aa0lS|cG+&d+-pjwFP6^M&S$&cVz+m6kaIxv&Gn3z z?Q&b4qz_)h-TU1K+_3(Cih!}0z0m6cBiqCHPyizq9Qyj|<(I%~Z!;LNhK*(dyjKC> zHTI@6*~i)UnWsc$tA!_??Dp?7jLS?hyT5ehoVm1@nVzbJ=x�S>Fr zb(CMGdcU~{W(CWtGs+5s3ZsK`Y9gqiE%H1FHNvsX%9r2Ve+r;I8?*!PlC`gXLD>VM z8jfh?Xa9CeEw`)($PhhMcXbh`ME-!>t+5h~FcFrYjAd4Qf9?0(I5+q~)u0F9n14Ys zTNn(88be%uFcQfp9MMViqyyykANQ*UMpzpQ?Ew6Am$i_SzJfz+_X*M)I`fEeg+uE= z5x?!QJMVeGdZ*5bwYjq=)7YbC42jAq5~F?S-D!KnJZ{j|%V7i>OgJ1|@L|1UJx-!} zbpATf_I%>eYOI1_ph=Isj5h7zeZ*!u!Y6!Ed6M`@=_S91rpIv{`-T{aOT801DnS^N z@HC-eOnRnTeBW=c09=Ot^mzY-L8@LrX@$9+qbYQ@d!> zZ->=X4XfFzUF5&f9e2+rXlAkXnGz_maYC@<#jm7+i_;O)1|yXVRnK4*?H-46MMRuSO!vX(Yo!)mK%3)cQy*IDoxE`5J&$JZH2X6xBTc4^ z17d{Btz-h5=C7Qu`Z3Q5q?q|BAS?0&<{Oa_BtVt~8NNMN$C`TwK&`4(O}1_*zxpTX zQpyW35Z-{Rd{9mYt~%O@x}H`FkZ&sXxA#e|aY2c^Mw6qYXa-5TGCzDd*J)PI6SdH8~Ura(Ufg`oUZ1IIiTOo!W0gT|q!T6n!$^$;y?#{$ea| z7#X>CZN^w##1iQ(@d~qi6PpC%Yr57Yz@cXyclx5wDZ(h2;JQ%{HZJ+um|62DHQ$hi zooS5)$cIv_-G!VlCnhgJtw=nGitAn06PDZ=;^qNAxhw|x{CX0UX_n?I=!w67f>~pm zx({CLrzvt7fwn@YMP*h$-n{E>z4Os;=pzDw_}mqw@_5f!Ukg=OSE%c&CSi{_tEBjW-?_K@Bpgl zk;hjQ&niyTit%g~0FqLhf{3OWAqJDF5>exPODZkCRV`Y6k8b#Jh3PIh$u4`n=WQg@M}uh4%GpQPp}>BEwX%?30G3K5=v3$05Iu(Ycslr8Dmz%>G-m zdHscSG}W8)5woEI{ZP~=D#~a*or@E>%7aW)_y$0v@`X6plmj4WG~PVeVEJgkt@_%( zqQ9u@rIuEwC_g^r;pL^YPxh?|$gJ$H;b_$NEQ+c5MGM_B#=b9)z~;OGTZ%AaBcq~+ zAVoz@?6=RKj{)n-E?p{&N_It#rA_LaH?_4L4-5;-lo#;5CDf#);=cxgp0TNvX@OZx z;_gv1W*fKvH>hQf;}tUp>o*mIc!>(o!)j^{iAES0jMK%%<%I!9scCQw$RNJq`}eaC zonq&j-oIomR-dlzh4L!mG~MqOi^VkF&>qi;ZXp5=l z5aG|F$GDq;_VC@(HN5kSVPW%?^9}?CN_HEKXn*A>4qmg>y9lMG%Rof*Wn%pxjR(Jg-QhhbXdymK6n<7xOYfd^O*d)N%_e+Q%Me^Lv zP`E;_>>LWxT4QS0RTN|AhVXSv%~R`6pr7~R=Ysi&jWvB4Knc0!?6~($4E8l|S`EBi zvyzF=vXtswh>fq_~0w)}C^?A7o);6EpMi4Pt; zaP#$54FPWG45l5NOtyYvZoUVMp`d;~Sz26Vc`JoK1_n^NWkYGauIsN~w$JYF&yw>0 zbF@I3W16CGk)rI^RA@i3pm^%HNxF(i`}LBMC5akmwXdqDzuT^2fV3r_5{E-wG2O(8 z2-E5G?pJru`tCE?FV6D_IAsssKYgvs;#Tr1zL`K{!&W;@KICa^eSU> zQ*WP~vx|$8m)5ZDDk#wIpNPX{1ik>yx%v3KfJ1oriIQf&n-Y;9otb$)6I%6YU?BVF zZ7*IRtB|#YIy~_B^1i-4<;2D@CZ*A-zCcjrnBUYqQyx_0blcdii zc5HcxfT`NwHMvtM{p<++J3P%j?%j8d{Ju;@Hu8-YhG;T8uvefqH@sy literal 0 HcmV?d00001 diff --git a/devices/surface-hub/images/ssd-location.PNG b/devices/surface-hub/images/ssd-location.PNG new file mode 100644 index 0000000000000000000000000000000000000000..9b774456b1b8fe0dba14454fde47c11251b3092c GIT binary patch literal 31147 zcmbrlgvuDT(&z>P+qQ3zCbCT#| z3;aTI*N~HXRyjd=06d`BNGeM{dsY*Nb!UbOJY%?g)OUaO47c~`8)?wF#PZoQ@AvXD zl3HJlPu4Kn-+u6fox0@9D@9MfVqp0!qmCkJou7+6l1nS9&V)oDNv5U7^?B@HkSgOV z^^aOF@_!)NXkoMBsd1ANFw3~Sf04vBLYo*(>LdY4GFo&v%B&0jyY8FQc6fH(y;i(; zc=#)@;#0#RA^?WKEeoPWfBGVXT&os*jDP(hlK72A0a_8h!vFjCNB4sN-w!pRGgMxy z>i)MY&`K5Y>+QZhaYV~unaTZU&voxT?G!^ddC!xE1)U~nfUh&`|1;z7Os&=EF9YX} zhSrt|KUI!|MqwIr^GRew=9x7V~H z)_r|#qMs(<$pmr^?qx&Q{+DytdpRaq{+CO0#S-@ihxf3+K+iq`IW1?uEsC=H%ay8S z$ELMk_XsFNcn75U%jEH9p@W`Og&u=Z;4IdwJ%8Dy7pE*-?AUD1g8D4=(0kI?xM3?+ zLh&L_J9{bgU- z!h`|loe<2wnF<#N$xP9OQ)-;l3{uZw8UG9Vd^Rpn^={cV-?H5MZi~i53?3in_w8ZG z$8t_vx5D^lCWXmjlGcs|>;ZgGcaSE~@8Y~zLJXrIT;gtH?kwl=?(k1AUgg83^JC-9 zE#&d`{86CeKzYvO@xr7St@>oHD!^02y{31pMSwLhWFhx zcalEeByQ^@6!Fd$2gTnx299WEC!ox!h@5~X8crHlbdD;TjBCxu2`7E#>wdj$T6HTL z+D!SG^%6ux(=}>*S*t>KZgQ5s5Z!lVjA%Vyi$+#F*$AgGzMqx2pPkx2ru09bp7Vv? zu7kaSAG-d3p3{^(+(RGz8N@GZ;#o+&m>fZx8ol6<9hsyclL6=SCZ0M9p` z`;JDPdiaUld{PWio_$`x%s76!%`71l6G@hk!TFX2gdHV>aUr`ZDCAn#Phy}IcqR~- zSpNRs`?Gk&D84q?%Li~c^`{fS+2!E$o_lO5R<~8TC(AEfFiEXI>Rw}nU<>GY&w1+>;!N| zdP!niwD6smRbM|4B1aST=ABrrvNWs&|C?{>Y!HSI(TDH8b@o=|$sOW_DG6!n%;6or zx+rTrSA9HJO?+WW<+DkYlZwp@TG9&CSIN`29^2?yjOSJmK?B zlCH`EePyiBZtCF(TNQgN@;Dm^ouSus(tE-^;iGFlJH7Fbj8YpNgXW2KUszVT618nb z!@L5kx>=^Rp1|rJJNSQ+Bhrl&BrLFYj2Ye-Yuv`L1rs1{t8#@L>Av z1)h=ya`PM>tLp=SL@w+-#Y@?53HubpG50L^$mR6;QcBSy(lj?y(1U$Eg}^~qH61-O z)E;_Il87YHpluOtNC`!Qdq8%o^3A^fuus>M5$XiLOtk^r0FtIabAAHWC zMMBPmtA2Z2r^;htRi<&kG!S}7pAgNgk;)VQ>(7 zLV>^shVe+oH~$?qJTiQe3KG>UHJLo^9^48ah&wJDs+6TO{|3KjT*ba8a1J30cqK{*(W40hL+Jy1WnC-yb6`A_-0J4#XTK|w#ztFt* z4+cCly`kVF9`XPBT6%9V0UwOakFohmXRP33N^JXslCbLnyNaxpc?6ryou0>19{)57 z?kr0teVc2u{x3}695jV2b)aZ+qoJWstlKF#hX4YC&>9Lemk#sm$cFIXmuRB%#mDbc zvudM5Z$zp*cLmZIEHcBtxfwUVQ16dS@=uUrK$XNt>E4vgnE00v-hTBpO;R+6EzU8m zoNPZn7+08O{FgxV@DFKh?$v*gJc(Lbc;LgwXwExPz_Av#pIhzL#B=$CyxTbXvg$f` z@nnzu7&5b^P&#b)wuTeR_&v+`Zj-dwRV_{OZU{Rs!aPw(F_~Q+uP;6-zu0x1y2Ak5YsEin$eld467{0?vTh3PZP=ZyzUNCUSX)j z%S5u@qQuJ@F>_pFC)u_9K;}C8!rmwQK%hbo)hvDE+#uasNZB^(CM&ZThl6t#8%r6I zc%92KC==TVhpzm)~g2vj=iVG*($u=k%xR+^wy|Z z)>^c)(Gz%zr+jtW0#prlOsZv-n#<1VKdTPU?PRaFnRv!QMSH45hr^U^ro`>xhDAy4 zJF>T3pS5xXt$#=G3s1J&c(U3>shbYJ9zx$MR7|4KB=+X11Gk!z+|)u(ESifTH)TXYGEKdFR(#Uov;JXZ}XHX7y~=)^8XSE#n|TG z-kS`5m#8Jcmx?IEsnM9haLhXqp&43Ww^IVV5QGNo7=<6DZ7wmIJRO$b63ynF{U6XO9_lyDYbPjcO2CAZ%CiM_(r3 z9e=*u^^jN);RT~yYi=NuImQ0z+}R|=f4|UQ9VYZvR`gboC2mB$!_aC}CQ#LvusKd& z`XQE^3=6zM-(eaP?YrPca+@P&wbk(#W7z>-)qX!+qRy z$2C4o|a6|oyQ6su&feQ zf4<<`L;5~|0M|=w$C>T)|IlaNEIvSujl_(EqzlUie6GG`Ipn&S+|5Aw8w?v~?=~5V z#JJxKH?g{8JcOD&*M_fs#;U_y33H|loVh^=v%sr7RL*bzyw!n^^)qqxsu}5z*e|?J zPsHS`(29U@C+ zeZHyl8^6skvV5#8nOrTKjJ3yF(2}cm+VguwjNIv=GS=hJ$)uJIO1!~tS3iAAv{l%? z+n0T$YW}MLZ&`-exwRKDlkNU9&V-D4|EL=trnuDz zkuiQLhf9TS$DwujqCLIacLWur#!ZM3dh`K8zM@DHqLv1_eD>AjWv+lG==2AStmZ`i^{(((_ z)NV(}7cocH;eXzpmP?Hdp=D+I`0}t=n~k#7Ro@z6l2E|IQOB_nOlI*j*?aG#+B8S( z&F8;RF+Z9s;S(_C zVI-KsDa)tCil1cHK}hv-v*dw*k08_I6L;(h*+rx_hY%jN%?|@cyw+5@)>M`qI}!z- zlMt_i=G^GQLTpmjC?D9x1U_5IfQd!@;*si3q;H7d6nfm|=bu~CJ0GW`s3gH;(&;j2 zY+kSFD3#t+CCRT~cykCAdMz{cag{CDh@Yip!>=6yEAMX>ASxut)?Q*=Gau6X2FJE_ zz4mvj{y4L$_Okn&=pb=W(Tv44IO?5X7w&t{VI8sjQy-z}hW|7E;i044QJ9HVPThhS zF)8*ivyIQ4gW@DI{U9x z9&7!`ip z5Oi~MR0VsJ11`ZmZ znN_A7of`4-VBM+ndN=zJSbja0tiXrs(v-X@HIu?9e$+%R_hO~F=Obx$jbW$ek%>3k z9;MTqS-=|grk8&yloDb0!S=>pek5)Cw&OCU8e95q56OhH$C%m$ot=twET(kR4|Lcu zF1lq~g9R%xo3>h-^FF{^9SxNXPfQBwFZ8%G@9ujJ&G##5bH$FtkQP2JcPl(Y!|L6a z6u>Vtb*!2snXsMpKMGTrLn?G{7|!_gKl*2C{*;uU)#<5AfUILD!kyco zlG$nrIq=3ZvdTMOLFprG6(Zrd;96McEz<&uXMy|+A&Gcqsv(0Ise>yfGxbz0oB6X{ zSUi5!UN5anh;9y95L=dn-Yct=P%$jVyi&f%cxjy<3xW}3&VS{FuK%D(Tz%_zaR(M; z&0|*i0PJr`o;%Z@-ZN!Pyg9#(JBua#uz zy}3ULrY6w5KeZN}9^8DMc9gbl`tEguHy)_v6o*~9Dfa0r{TtJ%CAs|$V6k0?1l zHvru!w~*~*=J#y!IGzt?r{j4SI%!SZh)4-@H;%$)Y8-Qmojh{w{eoNWs&VJe%<#vm zlj9~dg#)uF{k|@n?#zGZ{Vj}vZA0*JJ=muvkc8>(o%)#gNb7`-JZU{DUDb2&nlMmm z_(tx1w=)ITJ1o^6UTwvxVy^TyEGZ6U!+91L-M+{c9J?2B>en*(hZOeI;A1w#H9ZDr zR-Fd;-AN|EaHSFai zQoWfJgpVnBh4;DN_b0;%*J-fy5AJ)!N9ZJe`iR>u-mkgu+7oJLM>JPJ6*Wux!W}=N zg}UGPU7N13Ah9T3XN+1v;xsr!(tMW4!>&gX;X1-E@;jT%AcMkiIsFSKv_g&^BNOo! zG^z<7GR9X9h_U-Y{!kth*w5Eq3T=I!No1ZfkNDfP`{>uniU`g}htaFQ%*vf9tNIxv z@TM}u>VXAj()W8Gy_@1L>+GRI$=Vzr))9CC|AMnOy-k6Imj_Uiy+kRk{Zws5Qb){R zGvN-uOk)G%!@pWKM^-r=l4RORQ=bR6_ij=uqce&jZya<~X^7{YV>7PKa!u+~Mej)! zzB92{jFYv-zpk^;(yE%b(R>#xH$M1aLjiJy=bk$R z=Yn1Q4unXgsOKPbh^o^AQiaUjB=y1HkhVs30ZV%e-R5jjM)4zLKQ+A{9e4<1;m7(7 zZ}aixZ^JeIaUk>S1zmlw3KDa+j}w;N$3YOs4E8D^kb6 zyyhmYG(nh5HSc(d?%y8S{Ps)0E3|oq@(@_KXMm1#R=xj`{E`F5mu1wC@yJR`dgng* z(wY1M!Iz5-x-%z{^6&F1@|e)?;RUU$E|gFx!X*8xq-E5U%?BuQ)L*OkbyGMsga2=I z0N$hR!^L#n7>o%I*O=y}L5MKC0IIr2-iY^TwSl#0H{pUj?k7+_@_xIn4iMaoZd>!f zuTC~2F*3}o5?*4_1Ml-G-ZGwf?r5Gs0KR-e0$XqYw)uVrb`1ch0XR>=kF>Erjv|I+ z#bdZS?1Y8bxKBu|={ve?cxy;lR2%MFi_KRl)SaHpIeu=c2X{{73M}$+H2xm7@ULAn zp&3Ea0xuQpKB0Z);3r3UDmah3gFsu8r*=FET0pm_MFJgflwJPhd+es!Txw0giol^W zq>!tA4~7r87`8e#vNRgqV33ER`v;E#>E zxBKC0we2yXc~u>k%h|1OisOM?;^BKu2Y?Bbd?ivgyUG5hHD8SZCVpDZIy{I4d61g< zSMMzfsNU~qj&xy!ipgZoh&3-0)g{pEkkmniv%meP1kQzpAmLWvRKK2<{sms17Ka|AtQM)*C4s82hzl_uD6-l)K;NKuV zV2fl-hn)Q{gqfIE;=dC6AWV&CRhFUVFm-NyCt6^k)&m244q$Ap|7Wv-Qww9vTep#A z`>KvefjMGiRdP*_iXT%{|9KM{*z$!4m?1WP>RI7C$Xi^Y?Vo&GC#9(oq8Q#N|5HORm(M9sk#T%AUmIwLF7a zFOER@`rWR;lL=f~6MfZ_fe&Y5FY8>$4Ool%`(g#&WX*o|A9-!^^Xb@@5rQwXC?RT&ec2T`B?kkj%#u92$&8aW!^ zsXuN#s(fB?nyg7LHLOR2MDOz@V=LxAq<_r1T!8>A@-zx-v;kt|2sOg;n{Ur?SsE`K zB~#P<26B0Au^CGVz~?~tlZX-d6jw2hzBWJ#5Nfx?U)}O!-m!N6piLz?|CH(jeYkAm z)UCez3!wD?!ztQ+y6?lIXC9s4-tz~7lo53wRd#Aujk6wh- zk)rBV9<8KJ?D0{Kr@7&oQeN6=r2HU5MzDUm|bC8v($WLVcE+2yQvpfgxEwD zU+KBbeKpOt`9~<=AZ2S_(2i7Q<$unPm(FuQfL?A}hQ|lo%;x9>-Y*0ijm6QXzHFX& zML;Mw%%W8qH659MhPr{gD>~kO!l5oNF zHeai?Sby({UnTsmfnI1jzmYAC^-p!P_`EiyqkM574wKumhZLfgXA4jtibq2on=h+A zcB*;vjWn9vAL<^ok@EqQt@RV&51l^6rwHbeRE#oxLL8P=WfyI=NLnP`MX@^^!TJ)v zeq`0gbN|}>5WsDg7Xzrhfdt0Hx)A!uDy8Fe(6qV9jI?%{%tRi|L zZK@c%5qvN3VNafgKxx(W@Z`pC>e+|{+ceN*ay^PPmb#@je$VL7?5>44?=g#n=`e}k zBnA%gnF9x?!o43s&2cT2-A1z!P3&20BDUP?u%7Zl*} z+@-hdb5(O?az)z0>`-2i^n_~)npoux?Gr-jZz;?zD%@}f$R8WWYhr60Mu5n6YPn7J zWD7^jc7o+R{Ld3rphG8613(qJ&OWmlkz`Y<{)X`{S=nUMSb3Fq@`;TGAx6D|%x1D5 zhri7zVg$+avPs$H_+QFfT(LKI8bR|PQ!cZj`WZl4<-(Tm{Ca;nt$9DLtU<_}<9s)< zZdv`KVTc+g36X3RcK9?Fvh0HAx7vz{C7+{;#8F%?ssa46yFEI-M{7ZDRx7Ot+L4Ee z^8vra{vS+E!hH$u(*&~lFMv~}@bLlmsM0A*{jHYX7@ZtXR>+6t^UuflXf>odmhrt{ zl$Ddc4fqt5WZxmkKTFhsy3xJD%mtUJtJ2i^7!%brNn7UtC3Fd&bz>RTn!UVn`Eyq8 zF=nnpd0eFN6f?m3uP18F+V!K==e+_0lkHFyW3T8#pat96Iqv;iP$Ve_3%%8FA7@=Opq7 z7gotoW+|lsz0LdaWvI3L(M%>Hr_MR1i|)q{I`SZA4LibA$da|h<{Ks5p98pUF@IV5PGZu z`De0;Wy|J?$9w9eJ7lyEvIrX9W1&By7ts63ZVlbXH3;P7e!L7&s*9N=;H$d(V6_~ z2AJTpZ~iZY3erP%R3n&H-R>+?c-6sI;(9zk~pq7P6xs~%aj`Vio+c}C?F}fWI$?=VC zoRE(9gL@|run)IhOptRwrOs^k>%a%W%mwGYp<7EhKOA~?0e81FEPH4RFy8Ljg!-?2$*xEao=woBt?a1E0)yl-2 zN%uE@F5H`)14ki}etYhM1O7XRKQNgf-{D)|N+0RN*1v3fZI8YWez<$*$Ja(d{c<+6 zkBt(eMiZJHFCl0C-e0ni5$dE0Va0GE(G2jGA1?IglPwEEhe6WPX;4QJ1?KFpoA)pk zV;6_9Jz78U`vcYD`(v0h`PEI`zT*=vIw$e4B~jGQ)QBr__wV+sSHuliCnkv_Sie6I z=9ciPSt2rXCO4KS>7j7$ztWw%Q22=RHLS_)PwJh+#E!A@t2Y>o-hW$Gb;ZMv;Px)C zzXqKpUWd?di)|u0`uoAaJGoyDNmv(=40!syCosy9$#^;HH1-g7wQ}*pn)bEd0X?$~ zPbCVo>xlWz`Vk`jjJUk6<+v?yWv)V>#apgi>3Ru-cg+Yp6QZo@9=^S5+?L}w3TTV1 z-D|pc3xAg*eO(%O3!f6dI9ir?yfmiNgfPWtK{NI)oWxW)QYPpo-S0Q_5ZYBowZTpg zZ(+xYlVFw0_6zr`7e}5A?WH;Nf$qSZ^$P*Rn|lEMU1TWoc-j89BLH_YF$W5D_Z}S_ z;=J94PHeP#(+n;ZRRqT5~1+ ze>iyQKn(IDR1w+%fxKBGTd0$-%pA?-&EZ-E*F)Nw#?3+d!Ix8G9pzd+9``C6JPM(^ zbZ6lO_&gil8<;`vqwJjh*Ac%Ar>u&$+(SVOu9#e%YL)QY(D#t|5igt&+kjQ=+MGN2Frrp_PwL-F5G!RUDl0p%bPE`#T>D6I}VYw z{7vDB(@3}HM?;Q8WBu?pP)|&I)g6Ozr*XZ+PKmDzSgpu7&471Tf6nTxzG3|r9~GfNQcC{X-BOe?n3>#1&IQw@mI6M ziXE@gjo)XyC@FE%+&t__fo;r5)*LqQMA{j_n-gC(`H|ZMHTb$=F-N0loPxgo7ijjd zxF>i&95}QlvM%{ zWZkeI9tR$oFM-BvIKDF+cb|Y;%%o$_u%*%+7m+c!ap#@m7k##S=W1A)c*cF0(Aw2h)k4nFM-?d&+ef zqN!Y1gx|r*TSayYz+0&h(biW@bniI9}585mRzXgW-WR4I_dO8PwJD zt~;b((R}IG&pmNSIBCM6m@x{{{TW!#+_O@CnzUlBDvpMJ0yF=0`*4VQ^(~^fJ?==@ znWLID-UqdK^UrEB8-3`QXWh48n^8o>19b~>zWLD0WaI;C;@6WK&Ttj0tho5SixK(W zU2k|@Yv6)sCUjyJIwcs`$#l1J_El%^yYHwst~clm`O?*irt+~3aR=VPn?m~piG_?- z-8o!~is$)ZXR<*uqHV?ouOWDXj}r(3sL4`gjwbay?1OiiZb)S*cYKpOPREV{{bMq7 zOMBP59gfE^%z=hG5iG{}NTASTPqN2pM$(qbRgYjJ zZOl`AKd+rTS8h74cd-quz%qOUxGfGs$;~4%%zS@Xfu=a!vd;9M@3k$wzj{0AnGI@s za`*Pc)~=-Dbw#n9ER*#;Xtr*r2#m}oQ{BjWC#f`h=4w;~_bNnX!VA%h7o9sZRQvvb z>z55&C`*-keiXEIwBYFsBtazz>arhSfx`R0rpu1~+=6L1UJ8$xi< z=oPLuK`UWbH*LRP4I}OhI(<`GoMv)IVRueD%<3ssNU#QDfl@q-YQs({#rkb%wtP#) z0>}iwFT7FDPV8(L#4WjJt zsAtgadHXU6A|9si{}aM%E8t%yghy!t+rJ&~C~^}qmDu5LdK@}~SvL&{~^NjK8jdPjeYgF63{Zpjv z;FDjNk%5=CMR!5szfJxuCK`J!9_1aESTk zh@ZFumU^I9iSAE*mQ$cuqd#l{)5aJEgjYJ-s<`k=3-+P%!CMkEug6j(vb75}po1`< z>?_3MZQvs;0DKO}KRNgvgmPBnpp{8+bf$+dTVd=1m;oybp76S6@r^y0`!!38@x6G~ z=;{5W=8dDo%aT18r%n^flJUyYKv?-QWpjk^AV6W)rA*pEA4E?em4OR^2>QU^ao+pm zYR32E6U79jdtm!{5#6B++b6&GjI$}r>236p8>%^6^TU0tTA;|L^KyZ6uO}kX0#~57 zlebrafe*mEdDFmzAih^^XY)Dz+!xS?7{AzulWXS(ldAk1*dX^kQD$Eu~{C2=T{Du$WGJdtpAmr1gs25j1Dtf;r& zx~>5EX;NmKkRcoNevc|Cz~*m2`~rhJMxm=39U#(ubiV*JyF3wu^9;Puv0aN3?e0{pf%{!Wi5vlJH`_`h%T>bk{tdg+Gs_gJ3R3G{OelH?nzCc&~u} z2JWP$v_F)TX-r24$lKJmqq3R6*FZ7T$TRjQd;Mmv4aF-D45O=l61R#I$;(+K6{q5yHP`?A6Fnpfun<05^TuW z`BxHHlnRjez?9h1$F_$RE)JlKa9(77G}udf8H`7cBqYE3oDHXJl&gBV9yKcV#)e$& zK`-%lVw!_L{Ql@$Nt6FVVIxHT3b*!KI!kcDF8m0`xZdjmBm%A7hP$)wD$p+N{$BKB_S#Zf*0vl`rLjoPwNX{)0MIR zS-Culx4}SCfMGaiv2zbf%xVn<1Awsg*?|9+-rexEGjX@?A;r8+Zba*5P+Rvu_Tw5m z|K&VuPe<-H65F%YGegT&@IL+;C}C&-MAq(CD{YE(?Gj83<~{j5R%|1LXr?3egO!hi z|B9d?z|2NZAlk?2z2z7>G_xnHa!I-8oIxp#mrUXxIA!j7b>{S5Jhg(`0* zLlXYPS6XD12nV_Q{GIgMhdiplayc3x!K6+Xk zu~-3U*gfRH?`+3TH<}G}zC2F2g{Jeg9`C8_W`e3wnUs<)?Z_7_$IPzx__F;e(UfBV zX7z(;Gk4ca%)9SlL(SHL9%!>6slq;gDN&E64^~JNX8Qo4=4@ZH)G)Rj^18#)f0nPl zME?p_JiM^VXvTexH7bGST3Pnusj;MdyN06Y$xihcf*xleT_lgBZpmtV@%NfFZ-dnl zIapw=buU9H7Mw7<^PcDb##tQkg5-0lm_hYhg(r@=#w22yG!4TXy+s2d36Y8+PU_Mt zZjIJO?g88^1D@o}^<#R6CaN5Iue|rD7Q)k#ZIlk)F^r{u%DEtuDs6`~hp2se1uaP% z5>BQA1=;nmDm5|4f*{(W7V1#5`lCtHCj}S>GYmscKyJ5hu|`7-U`Tbzom^v@uj6 z#x4DI@pp-u@a3XKV!s@iW9_*4EBBZuWw&e=JbjK`@XIx1q+q;cGYXX^q@D0;RxR=3 zYkO3YHQmjk9%EL{WZaprMBdo1A%#Ju=OOPBE7v1Ef54%)fG(eINMC}ySIO>{{m&8; z9cXuCR-Y*)*e4s84TK`{vciaXQ=eGj(42}vhdbt%51O^29h$;mbdX#IMUW|pkMV$lhwpa-#liFZ=Ss{TLcT`&ZaL;_JFOO}fcdqtpfJtMpqcU5 zC^MedO41{)UqC@)cSUe~h$Jk;rIsm$wBi{k7UKcU{_{20HkrCbgAXjPls4CT4}Eq2 zx!(?(Nt#S}Z9&lSjFJd@d4@OLa4W#;vb^OiRRq_!7np@6IEUAjqiU=~Ixa9Bnj@-u z`+~*^yB_CYMZ%kvbn_tLv05qi?c~?4I7czA!W>jhqWR-i8=9)TeE$@gtasAd4N8=g z_ma^xI9950CqgIK!7|d(3FI#o<|TO;g5UWCwxcK{CrL*CROd-wQtdtZ+VO&Q5zaQR z`?xoWD8Ra2NbESAh%d>_rwTUM%#*MV(j3nSStL-YkiG!>=2mZzdmr zT|#A4vZgDsth>bS=!_Ni(lrC1 zs`1W$kGPbogBk3m_`U?EZ-jk#{>!Y$T<*=#K(4<7xt~R{4_m-3?FznE6oxpmOw>Ax zVjN!B{_iuk6A5;oZtKIZ0^$tf66*w5xo@rtEsBt063lRWo$q(ndFV-EIJyZ7H6=|C zxa+3g#F2osk&g9|Bn@S%;fs=z z4{jf3$|#_t@~odo5S9#H0DYU*8TOhdSTH4+K25X> zBU}EJlEetUgy==O?2nH#cCQ*JE$tcYtDGC_C;7HoJY#<&ky~7Ot)W$8Y~$oGCkxQi zF=0`C{qwz)n)L+IzSU6@rw>We&XXe>l};(NI4psp8waR7g?jotcW31ZN+*lO-_2^R zhrh}+CO_h}#f%suk)#<|8yK)*dLX`5!Pg#Fz7Dzspte_>2}Io18-~14QLV3^H2f+q zW`M(Z=Sz|;WJ>}w6q<24!meeB)x_m9466`anK;DPm>@#LH6A|qjB%di-@G+Q_0bP) zr(l>o&VSzZY1t}`!4HG+k%ph21H{f?SDpaIHt{ytqtN$<}B9OZIOy4ng z&+L#pb0wzMwR}Y67Y&3aFfgG9;!J2do>#^=!@tjPHM|U?MGuoKe(#5m+X9@5@)o6Z zye%?WxL{(X=Tcm@b@!0^4jfxl9rjM2ytTOWPXr3cdugt8Bp)fHE&5XI4*T?!j_`_* za1z%O-WO3)Dc+(;>i*keSnZADO(m&cV)F4^vZnZ}$>|>Pin-x6sIqx8lDHvJ+RFfI zJALNOLuh1fy%>6{43~=QhY*Y(VQ*6T*fW{h_dCK}@R)GQiXu>r;*c>cwnV-H>Gqr^ zbAF*t$jrC^G}HX;D|%A2;`3))J^JdseFaZ>jFGu;BW=;V2qs`WInsS!Ge%B}DLFo8 zY}HTxi@ssDli3&6^c3EkxO^&~Kd`(tYONQ3xZ0WxSD0?tC}#LrP)I#?{FHKV5adgH z*N;hEg`gycF%GjUNxM8v4Si?kjXGsvTJ1Win-e91ovky_p^gwwuyA?}|1?r6p) zmcD8KJPZs2^d8wfWN#aoKo0;#C6ea9R?;k2h(?w|^<|L`2j(fX#)Ym>{kq1*O$Qsx zhD%=WXNYyp7?H`ujJV{~%Mf+rk4>ZB+O1#LnYW00;sR_XKfbO{dbH%In@m`i~2v;4jJ>QbQheO zk^kj-XZ*DCxzFul1hTZ|@BSNCAA!ZdC;N&yeG&hCa5&SW?Lzx@f}&5P<@xVlz(oOr ztr{SrG`=JHflj3M8PHL(JK+UY{vqx8O<~2I%1~rd=M>4?^rTZlU<6ezdO`gYt@hF; z{j6;sGWyc=hmbYnD9GOfHUV-l$KjPVJ#PatOFh*sOVQdVXO`mgNyPfHY*)N_NxP5S zaR8{21W@0L{rUDh64)K2|6UT3e=A&58mlz4WKT4IQL7UCY;mhdCp2MO7Nf8+jGjII zwM>^Rh2!ru0e^fDKI&4rKv3yZ!+(BCp$y{Y=m-JS$g^YvCC(AZO2Av5;GPWqKF z{ZV$tNvjk+49-PyuZloLt^jIJNm6{dxVos)vrd1Q?DWkVW=9X{52bzKV$G)tV?Y|?`d{$Q0 zlS2}IZWf|ZkdpO)4SqJb?BgaV%)kZ5677%m5H@eEWLn9H-c7Go{Crq`c&zWJALJKkhETkI69IV;eNd|Iff`v1kTae}$Edu(=WP>dZk^!Htk?WHJd)Ac6ua z%EJx3z^~-I&b_MgRS{=-&ol{4-=;G7No!#{e#pZM3Z2T|C4JpxQZDjJiSWDXH69FL zd;3q6^Vb_HDJxu`#Jt2qSEWQ?23Hp=T&G@Q_S8ZJ$(^Y=;yzlIjptTkF?4aJ8rw@L zPj{z7lrWeuw?ZQfjY3PSk$+f?m!q3o{VdY3k&@>OujRAW_vvyqb@J`TGXDA61MBn4 zUTR=41ZiqMPnybAY81!(x)SWjy}9`rb)eK+wsPGGfgSv!pIxJD2YK(f_ zf2!aA|Asw}ku94;_TF-=jAN4#*&LD)iBL9K;n*Ydm}Qm~GO{-j%H9fztm1n;yAxOID8=XpJ@>v=ua{eHi8`&ky2#{Y;fR`Rme!)OOm_;yO;e;GI;wwf3IJsabXc5IyQ&yLe0`78KP zC+sqOT6Qet*2c89wc!5_Qrom#NZ$e|GK$W7i=`(hkuqv3%?Wz7ju=9rmf5N-oOT3E zl`fh?Gewz}h_nB9&hbY>YBL(hZAJ<&nF1Mtx|{Ao^mUGJ+F@H*b(# zZ^1y0KWuXBA|s%?x+#{dki5S&eJ@26GWzrWg7m93_zjUvJ?mxxM9GXymcXy&CN3_5!=yDZoWEHt4|Wkd{S@kidkaDj^GASCwrfN*c_w5TJIs>~m;v zUAvB9exFXIyfQgWX1VZYmF=D(P=Gtn1CCp97BtcMcHeI!9uP9Q+R`!>s98*fV3Fq? z{;6+kDVEI8%qA$hLS;*5m@F8=jyFhEgP4fo|2!@`rRclzbrrBg$G zgE|yC`^6ppk@H!+{S^*`9)vA^Pa5d_H0Hit%ny;XVX3d)wq-E1P|42h+X&veI{7{?ry)0%WM%=dlOdhHyZz zw)jG(#*ly^+65XIZ$;U&oTR*<96%)?+(<^79OB@SZR|yvj4@D>2TcOM*ct6j; zfsVHE^?vV#&lWXYI>vr6iY(R+OFSHl4-`!g3J)c?xVZX+SrG84gSII$4S+e(B^Y z#_kXR(*W>MACKp-x+sEWYtrW?yfO4%!$6fJu|mB|pPq3H7%l&EWCDzPTOmApJP_F- z5HAz&`2sB6k)diWiWPBH|D{uUvHRqWx&OY0?-Jp|v_W^)Nyvp|rj>lMp>uJ?w&*;1 z>4vA!n5G4aefVZKG!#zSNwwM3Tn8WRMX*V{f#3MKp6Rw*8sjjb96Da#di2&A`~s5c z$yR$$7zJB&@(dGXJx-el*mlY|H#BADxRZ!Y>-wdebXdRJ)wJjMl{M}wwJnE1qA6P0 zp_u7s1JK(6rl8IgdnZK^E)#XD`mk%pQ))~bbID4ly`MPN)gpKR#3a|HWL#afwBo3k zanB;#-!3lsYLV#mIGNovA~r~8<-OO|cuv2QI8qsokM~(5$9Fi*Z)>S1s4<>N`7DcxOM0x!=O_DZAIC%Qt(kJNlK@{Idmdiah-TcUZ0 zNGu@(QdJaI6m@UUManZ_J+a;l5i?M$hCUHQ@u)J-+K9Ueb+$6&O%d7Ckc%IV3OoNB zYuxC*MRK>$=W{1ECEpJ7-$<}Xl)?z#c&WlocmJW>nJXa1pL_EGIn;!0k45gLER%6~q?&0*@ZNx&#a ze=UcW@xy?lG+#+i?oG2oM){ zylrPa@lVi^-YU!~bK*i8!trJM%v)lUFQkM$F}FroQWEi+LPPRAo+Q}VT7S#EgU1ma zQf5#;@3*rIPDd&t@>%oNbk`X2Biq7FNKnUfRsQ#&$n&!NY*D?uLqN`wO^-_7@n0<( zq`5VLqoV4NLc!g*^&7YS!O2U$nDb3Fg(eCLFW6niV?ef)H0HpQR-38CdqxsH{+XT1 zCgyo3_#`YXAl8r3n07{qZeon%JCMJ}%CxLg_vB@6$IPfH-gkEv-MLq1(#{20X`_0G`G?sIf3Jk}*T70SkwfQ#^<7(S~`L9J0C*G10NrSA}!Sh zeC<-Qg@NMM>?;Z?tbZ_#jyya`ZdnazSKkcB3-oX}fBK$AvL2^HYc3GP_=l7#GN@(5 zR#hj7W_mNA3{Z>MGJpzBDgu@!54op|@E2JPw>f!e2)KbuLMp*c>B`=oiQ=szvK?m_ z436G5>CG0SDoRfQPWU50_7(U!=eLM@xqfP4VA0QI}A z&JW`+CRj$qOtR?ktKSUY%f2|s9hORL;<@Yw|RpYZU1D_C*>&|a_OJAv;(G%{_;N-(6v%rq`w4fWg%14l6u~>33RBq36G*>6UjO(h-enioNIe!UXYzi4Z<@c+~hGOx`W@ zZ-{(S%sPuSU_tZR*MKq%W?q+Gj>Vu(rMw7%Ukt@0?3|pD3mjd6kej-m$4>c542SL0 z~OCjZn|4F zAvXO$gl~jGsa27>MB?=G`)YPW*kG9WdHm%`ynz#l5;1!9JR8PGn>@%c-9$*!2tAY4 zp7G&qb8N@nw6Jc=1gWUIJgP*B?07H|(WVc5EaZs3!Za@VUr}Q$MADs3x~YUhnOhE_ z_h|Qckg>XF(9n|<(u)k*)mkdjRES>UbR0kBHRK;Pj`* z3t|<$dtXr-U)U8Q#r(?gb5a1qETbWnr{dlm*RSLWIz5l)6IH|Jho-Bi{1b-wMU|kJ!HxBT zUXFFS_YsT*uOm-p^M+ENZ$s+kJ!r)U^b+tnT0J0BiN?@{w>M?{N~v^A@lQpSg^u64 z{~!U)U9Q8O)cv{1907|gHv~}|vIbNNii)0qNUXfu(Gy2e!T5I7jq3~l&1f>Yk$={( zn?&S?7Y>AvJ~mX6fCd{c(oC{pcbLTsyMWY_khb4|zkdayNp;X`iWil#o(aE z{AfMj?dz#6zx6F-jo$bG1fUA|sr)H}LZIJgdIvs5nS#o|G-*v(b26Z+p1pKbuiHPpbAMu zNOrlyACFJs7eTxr)YFWmSNaaIH?apDLn8u}-x1G-k3@#if2PH6YshsqS^46|$^nHX zNhThP9`Vl~kPBFNVI9vnzNtHT=XZq3e7ya?(KtB8Fk%UHb7|R}>mge)7%?amG)N1x z%e!|gYW_ZC_E#IATi)jyWDgZ%GD2N~Xr26DG`sUveN2Cbg!rQ%Gw?a01eV(lC0F1` zuqQU9N#eEtDjB(rk}gPn04;;{x14*d!=Le>LNT&EDpQxdzWi#mHGN-^mA601=$4F# zxPJ>>09n7JW&Wq>7;U(E7Ww6mkqh4RuNvv%BsOz`IzD3ALMDOMDmJtnXUznAOuTJ) zgjU;LgWF*C?n0=SZ1sPdetr#&;e;gb#&sV~i_906QfffVU;Q%InDoH? z@~raGna@4LvbA4XN5O#=+qHv%kDum=$4M8qtL=7Ocyy90XpxJmQ1L^0Z+A4~j#lVW z_=PI`K}`7vjqpM7gpGp)EzzO%El`+?jSqM=!j6z=BeNcbA_9sklWlL)7tyvpSG%1! z)o(&{8~XGJT#Ky*ad7iN6~~}N4FZf7>v4)q??Dm}`kVa7BHbo%94CqOML&b84}%}| zma^UW3c)8K#LyHnMbqZm-(#=z@&W}PKps3KHVhXSke|m{tz(wXy78n7UPA+-W zHACZyU(KF88=jVT58}XyGIUfogYZNYJ3>wI8lR&+w3;mPS>5HaM#RC)ogKD#T9hZQ zA7(H|-n_9qav+gWUpt4=&(hGx6ToI5@T)unp@aWraDLGs{VjnRf-cJg!1)x;>okOti7 zLbre&^S((3ymwoq3xg6tHIfQX$^7I@0`(G1Xzq_(ZLMJJ+eNO5qm;g7twowm?hmWW zg0x>sUWw}Huy|!+jNulZeH`j4W*2!|LO#QB|0#3oMAVBo4A zixqsiwFYsdK7*&R7@YAv0~xLc`Wt~gCU&RgC#{=q1i|xPkg#7dNt2Gj9W->bqlJV^ zh$9{=vHV3Jp0MrPjZ!JMzQ;D=fgZ*3`;NG2B3ul8J9o`doYI%p*=_t&&uYW-^6Hax z7Z*qyWU-x<}equl5r2jq=3uYDkzyu-5j8DN%i$PSVHI zA-C2SWal6ot}iA6cH_IEiy2-|8&do#idwf-sj(`>;hkC{m_?-9i(d?>O+}?ko5)+U z+)qvaU;*vmToPNW#li2NGlKnPO)D$Lr29m_Ak-JtNxo;jGr~fibJN<2O*s#~hwN;X z?LAcrL!Ek@jY3a9?35mBu(=(V%TY zWG_!g++_C)Ikd3euZ~{*u$8M~u&m8fY}ab=#TK&=9NAsXG=V1CKe}KtEbPH|ZplL+ zOFChIm85PUfNlj6e?_+&t!prj#gN=3cQ;bK9~k+=b*>i}5&~%v0p*@Z2}%#VSV`yry@H2Ui(3`uG}}Hm~Qk3i9Y%BA4&N`ZGbDeSsK(= zR0=}bIY8>7WGmdd-6%8_D={yLU&KFEfuExDbjCh))oDQ346M>hN0hnaIOvP~VWy$} zxt0XfJy#!m|2)nSp7bRX>aghGYw-_->PjC?8W`Bww%#rxV#KvQvq&coS)*tXXsJqT zVyp{ON%cNCY=uB>4`Q0!E7ox)4v7xQ8?|(16U;O4ujCnkOO5%>{FU4ZCwpQR$e5zv0aeQ!^0WugD1c0fnQw5)W%W)G zerm`owDb{@vy|5BYd=tXXQfpNRen6GDU(oh7DQ2416+Wh+WnacKnuv%zP`fIc|JQ) zCbQd6P>jWy>VSZ&`>k0fUZ#SPVwwqZKBIV3gz;xTv16?bL_k2Y6;^-H>r+IAe1H{1 zXKGN3+>!FkjJ-%q{aARVl)+==iE;=X_vm3v4e!;`;kExEnHG32G>pw|6lbuvB84oR z)hQZ^sa0N(mOmS%l5&4ct(p1*5ES}Qe<4a##;N?4s0d=~;w;_d4_lqNM^}BdLN^}38SN{6N^ALotoyCOk46FiB|$dSu22j2Rcg>}q^IkRi znuZqj6P8-bEt3l%2(-!lvJaC^rjcmE(nY@URUaq*)vIt7^~wsA<1gly>8uP*Dj@>E z(0aZTne%Ar*Zudw#}yM@MKL=sHf2%(#**|b7eMMZ{HPi5dwXd&p@q+(nYNkyWS_@= zU(%#sxdNl7Oq0h!gGu)dCZOviei($?kvC)J$Z#FR&m-Mf+=Ppe+-$z(3Pd5_l|cC) zBCv?)zZy!_z=~>^riODv-F5^3zHOo@x#;Ia%vca671MuWIXU#}d&~%EVPtR?dXW)o zpZEE_2Z5;($h%xCkKR1W;LbY)R+csmjCq(M{ER`=F8)~;n?9T6tUR^6a_x0P{qVhS z3o8J^NNFe7HGY}PO1+_Sd+Uh6th;VD)cf-fyp+4FSn`5#FDE{*57h!~UQz2$p0Y(h zIR>rtr%VY4(0(@$!|aq7!lSLWYh}zI#K@0+|Zp zW42PPtQwOZ`f;rsat17Bo%4Oa8yU5iP$}X{IBFKHd0LaDj(V=Z`xq)w@$7L5!4`qy zjzK|$?A)^#%8BXD^W{E2E~Q}wS}lP?E|y8W%gTzV^SXA#_T2p(x%z{j^y_TWkDuN2 zEf-2nm44SMJhYFUy`TBENk1-N;UT zUQRv`_vN>dSsS-gU;gSpvLrwMl|xo38iIS>iR?6VgvpkP@eAXkMYfzOIi{$fZ{vRg zB?DaUu2Scf@|GSNd6Mn9e9+^9SGMA}(kRPCCraC*OL};*D%4#o9*pAnI;r4JR5jLU zZ~Efg;XudHQZ9tcPFg4SD5uAX5vtJh)7N4V#`>k6zmlGD&p1;Kka~li^Na&CS?hXk zvdvu9nH)QzqtG&apd$~aWfM-Z(~E20TZA4f$dA~tB^S4-+Z~tZF!ZymP>qG@Zk8-1 z8=G-QRi2{H4sHnbb!lt$v%!dYIT`dcdx(Nb7u?aL3u+ZL9Gr)o#jdx!lj|%Q2K2## z(UFdDR1%r?E3EbJSA}D|v;^tl^%b{66IeuIQ?x_&Y+H_|?%Wn(+NL$0)Ki{f7bL=v z_>4%4&Jego`hMdu@s~Kz576>2V_Fqbtoqo~$My^@mC_@7#`5MPu6>Ock;!s{1gzdw zEpP*~L~r%z1W;ZlTu!;(IB3A5Mo)Kr+GGL@Ds z&>9xE08++84)GTv2gz{V`{+1R%hwXK5{%-fE0-ZA3;5<#w+o~?X~SsW++$aD5!?jvSJNbl@ zXYI=-N@ASVM>VHIB-jf(pq5twVlhUzF5i<4E3+;KXCi1At(x6d#1g9~b3fc0dt=9D z`{@LH?jRR+r}QIxoWGBC&_BLy7^8Z&@5wRZh=6S1VB-==ckRLSxlp@(2(fsHF-V|S zrQ1zB{{HIW>g=s6OsCLDeE+ayh>*X5`Ls>2+Ouo@Q_r|v88;ySo2d!kyJ^eRpDvYH zmaST@EZ7Wx7(SYFfG#F7yd7etD=PYT#>5c>u2zP1A>r!8V?xR?WMAxd-jTMoz3eGWN7?>)&yMIF;R7e3nAp7=c? zEOiXL*?m?zN3)EVq3RaJl+~XPqDR&CQSu$X3L_ve@Km?C%wkeLDja@IQbWHFKg5m+vJB0z?;3{R)R z#5;`H`OBK8$Dj;G(C_k^{ojGyLF7Qyf|CnxJ=m>C)d@}eL{X6Gfq5wD;)&ct-1y|I z&+5-z^n+%+yP7@woC}H9C5LMakJ+Zy>4Mq1pg77hT0Q`!hsP0kuX|HdFFuOdCUSqN zaA;hamkc==HTiZ)3cF)~iXv(yBc1&>@dS2zRS69547Q}0v~mq+BPmvNMF(?9(TC)XP**S0r2BjYyUPfmz+8Qle@yWY?`W_LPFK7-EES3B@VmJBYzrr~=N$^I;m@;=UvF z;`GYjp7|041)ScYT`6`hwNBxzO_B_KLR6fX85;kJB@Lr%63bHAdbS;_c$Xk!hMm_p z6k$L!E#9oBQ_Ow%^1vnmnO9$#81yQ1O{B-0yZvki$Ir_(S2*kGq5s@V>?Yz#&Cc9! z86R1nzPA1@y)EIfp24bf$BmBIegfTEi7GgJE3UX@&PcVV5>R46xuX%FIVs3nMTdIw zo;rLIEnFC$(ez*D(|6`MbyJ^A!vmTNmNNwcYF8GYZ~QhmbBJh{TD1<`*!DcW zL&YFL)#0nFXNbrwZ!wa9pf^9?uTP{?h3PhJVKR3gDn!my9_oh&3BM~3{FOXdVcRZ* zor>*DBiVpoz970=q;8^c;vyCne>c9+urWTwUN$3COx>+i9nVKQ)?3sGtDc}{;g#cu zqBXY+W&57xucA2xD8qeao21RvlCPPnwx#k;!*1A*=D2Kt_7%w(y`B*@83!b4g&`M z#e8rcgTf*%(aP8o5srBWmjQTEe5ThAS(oY|Th&(vquroBMccJ$wS;d}F& z+{#-GllZ3}dwNjq5onw`uEvB#n1^6S6U|kbrSzM@h(enB_E`z{RuEyY@><#qaj?E5$@l@eL z-+$pc-zgLSeJ7fHAo0`Vf7pC@R0vw(^^uX!g4(57*zJOwvA>6wj`J_>Tn(s{0{U@J z$<_a&iNfMnN?KqQM%zjx%S@-eYJP7|4lychXsq((jdsnp*q4Em0>zrzvE3b-VSIS& zO7`do^}qbdwE)E!oVjl-fO>W|@Bl`1BjGI(nT8F)0g@-V9s~Q($xb(QR68tPKK)9^ z%}f;0m*EB#F6nI7R=?KK8M_ab2+F90+~;`&PS(LWhpw&a^qL$;l|O7WWx`Wbp@DOq zJ)A~AKy3fkM!f8$w<~Mpim2_=QcI}~^Suv;{J~Z%L~|KYYCxBVGXy=`j)84xNWud3 zCgfL;;MdflD_F+8w38$5J}ROX<+(BFTWu4lJiJ9+k2?=V|qnEj5s=F zhEHnPi2hkO!(KVx$=c?>4`JG5juR+V`Tgu~Rw2Y49LzMdNx5AWaLB+Rq~Z&;6w~-LaquGUrVl@b>8w1Oi*;XTYE_rRXU8BU!Ad?5UE^(EBc5| zNE0jCg+eL%pWaMnSMb!)wPe@Vwq!#D;Bpp+3_aQ;tzfCW8t^um-_H<3ThI6`I%Z8gjT}Cy)%HSx57zeB5x^4?OIwW7@ zb%`@OIbt7||3!lh${Si!JL8bak-$#Sd@zY&tA9c-?&ur1A+s>!(o!tL$CKBk(-$Mr z-w>Pb#?VB}jVEu);|@uj32JWMO&>zS$pnJmq|CNqn9&tgRv*@j<&R1&cjUgK^zb0bO$IM9+_(asN@FEfI5`(318y^thCjo}wTVr|^U zv1_av0w{*Az}#S|E@9tP0t-kZZjc}}@%=I$hvus~Av%KyU2^A$%5@+c_T8lsyr^`Z z*RRji#ii3-`rro%BTTfN9Hx^0?@9keqDC?ePP;m}mDqxYnU;4g06Sqh0N!&9pCfNH zibk(4lZ5Qr4mX(wKtw@5Cf)HJPe>6S*$UwW3gk3(amo(h@1o>J=TT zNo;=qo#Ez{=s19hwS%lZcAVTFCjGwLwW}d1cfaDgRi}S}&cS$JR@HTp~t&jTM*#cPjbu z{W&aF;YPD-Pfxix+upLXZ3k}&{KUue zZ)sS*qP9u?b&)E@Z+xqMJ=42bwONvN{u2Nkv|i*jP?oWiae zz7EBviUd&`w2tVK!b)FgNHffj z_dv^D?@|{x4DS22^R}_9Pq%LQe1BE1+s-j@^zkLQ6UvL-giS0iC)SG9N^XIj?77z0 zX!X1r@#{C2(cA(DYUyM?9B%Zu)=JRrRI0l5RlE{G2aD;rpNTkvSzj>qkAkM2D`O_3nrb8swUa4jzOG<&hTC)2XCwzeDTG5|(+>)NnaeKZ~ z(3XONGw(?~wIWq@4t+n5f{xHldkXvtxyDh{Bhe{dJ|OvbZt`)JLqHufihnbr>+9U6c2vP)>TLC^ z608$$Bb+*h4*hYL$L1erm9crQeJkAmH_2BL-oF+fhq(Cg(H4>Rx_nQD2=bEsbDX+y znz4&;*}gbe&heQwAkg!Dsz11$Qc{5Jz>O$#Vg; zh^G)ea4sn(&e&n}vEkmJH*y!=Ozo{BH!>-60J?_LC9Z0Zrw@tS*7)4E-jCNNfnA!| zdXQXMi0H^#uw!w52ap^xrffv-*Sa4H^d23CYWDDPu3m4K#GCq)Ai;x>Ydh}Khm)irjq`(Yyw*N-Y+ z1Z;mTS>+qu`aZzaX0(135Yg_N*#ScsFnIQ|^od!~pl^ATCcJ4Q&40Ku7!2kas?I$T zT2#Dv&Mdf{JsLJjo5YnB78aULWqDL~ABhHFX$fzBZ`tiNY~I;z!y8FEAdPe*SNbwP z23T=Ui!|3&adOx^chSVB=je862?n^7FvcW) z>TO_#IpIiAEV}7&ZwG7_M%rBisp`QXfeejMT^`2TkBjG`cEigld<0#E;Yqg&y#^0( z$}KN ztz;s4(AcK5U-(DN%q9_AU>j>Qkr;@P6(|a8mvL=;PPW|4UA@ukm7XkJt|o5V3M3!7 zZ`aEra?5%}1OGAY7CNw!Csn$~$+GWyG zq{MVA+>8rYt*D=`C8Cq7k)cEw6^veTov5t}^&R}0 zq|nb}Z7TiPSJ5%tY4T+4mJ6T^R}(evC}ggt=SVFk{5tLG8Vrz+}Ogi1lpi2RDMs#^Fb>K(!qoj z{!4~se-CbhR=m#HYf)XTmjtjKo!d8rFtR01<7s5(bQ0Rt1UaOcumMi@xy)d^Cl{De zW=F?O&fY+?CwXH@_y3WEg)G}n=+=l<@h5|VSf^>$${fP}a6GkDl$e${I7c|bs54S( zLDb#P$G=KBP=FD4E%kE|K3*bpLmwHD%JI2l3;|1NYB}q%ML!ekr@@NE%AqPJ%Iyoy zm0Y1kAL9dS`V_^T+Y3Q|dwp+q!owfqW5$JQu?9l+WPMn1+A9=A$mVjE=kGTr0c? zuyb^B4%Blt>mnQL)2E+d9PQ#hD zN3$ME&$pT$al1Sy4WOr7z85j}58k;A-(x*jY5ASKR{<{mtJnsji|XFzKkJXpR%SE? zl6A|t^0$Db-CI1arOBZ{{ntj~%2DADvG38Ef6{S_w;6^r`lyuHG3dmDRj; z2zQd~%5fq%Hg|rhrh;9x#DsNDvf?vJs#q4pjEJ!AOXMhB%H}k*wBfR6$wlbRV}4n3 zVGkgNnQZFoMhZtiX_3e3{+nAYD4gf{DMM7`_>=B9@Af-|1qAHh=|zANa!JOOJY}4d z`-_kF0|QHPZ&mXd(UmG^VrXoVrg5v3_vkKft!erg|q}={Cd$n5A ztTu(@E1?T2;-jsnFHVdJmwdPFadSps66LUghPbe$c+RDTt#7V(X&lQFn?78gu6M#; zu6T=^+zWpnGt;)vB#!s4$X1rOA|pJp`BUvt^PQ@TO)qkdzX}`Vs;WjOD|9vUkihft z&U}<$HudE&i#dcVD!wH|WlNAJs&fXgr^Z($QWBI_mOKHcN=KyFUHhWZoj$$Ie}Q*( z@o-gab)A1`I62{}bPmpn;nD3};K+jD(uAR8A^Ie^d1X z4XymDn$x|XK;_Z2Zn-1}2noDS;kU?8o`4Em+Ys_IOl>cW)iK9@S4??o!R4BV7(9Ic zjO}DqSezcos&-(u~zVU*9G;VSBg#qSA(<}}Y= zFvG?^oD;t0W!Z-;E^&JeHG? zMW0`;P85;sDJ)a0ohZcYzLD;DFzvQ0zxT62s;~XBk7t(i9q$*J=;AP z5YW+UBOXit)tNErMmNpuvVV@8=AhKTu4nf=TgvMBIJhc>NAUc6v6K7>8QF^vE6JMO z`&F>cnB$FVpJ^H_IYy>KW}+R+k!mm4N!`)8-4HHQlHyXX41Au=v0qUzD=WK+8X+ZI z>!hopbnS^APyLew#u8j>8m^shdbFX|(mdhb8jOjJB{Jj!%BB42gpBcu+}?ugtUhoY z#fbb#4|tx4-nQsqn09bpk0K2w#HzQfjY5#x^n|oSu;9kb_(O8J0;|H#dPR6?^lHTM zF1>ClwF>IT>)4lJ5^Pk%uB@^7 zWqrmwmMi}9g91JBlP7vUCl-+xai9F{xV|aEz3J8wD-!TVB_VhbN%sTyGe-1y zb4D~U@zG2bq26}Gpi0hl8TdcOFO6_-&vnFxS~2DjY4>A=@y_r5tmEbSIJxo!4%Ip_ zs9);5!WyRgYEsYa!=sr`RkP{Il6dl~iev^mKtcL8ja-SMRk*me0vyvz(gA5}Z-a^m zJx#47?ivt*ErqW632Fd!Kb-aZZD&T_AS)q>F%=5QRq_O$hImlm#p!_I7-?{NWrz*l z{G%MjhW!r0^1Z<0=9_s*`AR}~55dK*Wg`K*Prj5E=Sah#`cGMswls>_q;CPpH4}FM zy-HI?k1n#Cc_P-&xGF0pnU)Q<;4}ngcofbi@?Mlw2!G-1(8MnoCZ!f$zJE${PpUzC zaiMMWH=+vXk4(}C_8px*0`uT&th*Y^RZQpAR&?Rddt~MlLKF7%{uN%t9)1FsGW_qN u-B*;Txc{F&yxMdLuH@A5&ZH{NF3WPXRu_=!;4bBB*VI+CmER$(g8v`nW=&!M literal 0 HcmV?d00001 diff --git a/devices/surface-hub/images/ssd-lock-tab.PNG b/devices/surface-hub/images/ssd-lock-tab.PNG new file mode 100644 index 0000000000000000000000000000000000000000..17c11dc7a22ffeaaeee48f35e0a7babc825ca01e GIT binary patch literal 45795 zcmeFZ2UJtrx&|t}H&N+e0kP1eD@{d3HYF-HI)Vrh2%QjGD1stQK>;ZNQNRXB4ZRns z5h69AH)#P9Ae4~2756^p?Q{0Id*gZIopHy#cMQu=mus#$=U=}6`%CyWLmduQLDqfy z_HpQ5y>w&WK3c|o`)Hudz_0s8-iH_iztOng(7CuTw@Y{q_yfJ&1%nIw_T|U0k?t`7 ze`ayHYV5vmA7=ygCryjGbbE;Kx66?-IDl-5}W4Ykm-&xP& zwFP^gh1FX9`aAGf2AN0X_<_Ir^-OBvxyO;Ivq}RI_%f%m6UW|{S+Dli=R3M4{;N}=z^9wMh(m5}wgK<>!xP0TXHY$rSv{4<$Bq2m@P|;<-uQY&dPZsB zX+OVd;2nQ>!elei4s2lrwuoDKuXz?0VP~lhy9XSJeq^-j#FO`wmgy$^&XiJXk!E4_ z${{gJ>Lb#A9fgW{?-lcOH*cn;R5leJ(ws3)>c5%PFYfmN1f0PjAIKsxOf=*Wu%u=+ z^+W!!%pcw%i>Q?22)YmfJpD7PWCYRh9@B${WiA};h?q9@{&#NfbxZnXU|%tL|7tIP zxc$WlNm+eutFIZr)Bj85Ly-1AbG3DKOk&vY=^>m++i)`rskF+=5r+)W^`UJ2Z4uMZ z&IsMCbpf`Rcq!u^`?;RXC=vxDj(!N-O2SLa6317j)qYzqIL}T!1E&o+n}3t6ahv`H z`u+7|L$o-c7;a!W=#IT3CvrjW8sjL$+&Huz&si3xgsG&Lir zu1jqhYoDF!m9#yI!UXIr_4jyToDx#_+L0?s_f68qDNZGW4{|u(hDXi7!zf6wFkpcg zS~yD%?6<6+KH+T+%bGloaV+f2(ru4;e_D)?@*;cUopG{bfv%Bpzm(wXr1gOoO)qJl zeIA|5Nk87oe3$wD!@f77>+irmQ^&;4E}=iT0%qZK9z)%2>Y;58vj-rxrDWqrCG&tg zd$k_=I|~+v_sAopxLTSMfMb!2(W5t;u;)$CCV@V>;mxwf8~NY27xd^j<9jeQaJmgvwQi4N0uzCXD|#HnRU2 zB?_zk?`hkN6y>a}8yl`o{eSSd|7W*<(y#wd5;=RT+Qu*VyI0ze@i$c7tp=lO9}sgUsgH^Lxq&nJIKE=)2RaNziw10t8>N}QHTXDP+&frZbZ+$MJX{f?abM5? zU!iO+wBTUA;z(yX5!6@-;!649*C};e0iS)pYm1#T;DUY8?gN}Va#~{} zKgKhHPxdxc&bnzAwE{QLi z@w_fZ>N9oDx&4`VpqszvYlJAVw8dZt_)PE(0Jq;33+AU)V!3D((hYcBcXL9@iA_mP zr=F}Oz&oRwjv3AmiA%zrU}w%O(TT1EW>r@$`!B1#l&ooYR{UmSo&)Zw4cv%=k)3ZO z0zwp*Mw+?;^681oA`=OU8mr+T{jP}Vn0B>|0h{EDMJ=Mf@6`A+=^5Afx#_tNf2lOo z+Fg4<=Tk{oj9Uhtvc{yi+AMgwVncg+3QdsFe& z)+Y0=w9gsX4(U&~F1HA~>l^W*UMcA0d{i72z}I(ttxW2pnmy!zvbxn@`c>wA3~)i3EvpBQwgFOKK|phX`-~ApVHu= zzt|BGrDNr?QpW_E_Ixh&u}0JcK}G-nRa8?XpI!cdaZK7Mv zYdnQ+;H9Zh)p6Q5X> zZCrGwAsoF?F}jQE_fT-nnw3SVwiawJyq-1&Lc9Mm5L^hhEOohO6yqKy1Hg zZ_h;QfBdKf_N>1AZ5QKQVAF~Q=SlZfngjIX_ej6S1;(+-0LH)4KVH zy=QTjE-jspY^hMN-M+iP>Mn7RWNNs5)8DFA3C@_yJqK1hCn1-9ZLxGRx-*@x%<(*m z2CC(9Ht2bZJYahZw%b4b`Gv>fXH%gTfasOq!avfYkO;}=5=9yGj^*`knKy+WM}0m! z{lZ9pVO+2DZ)dG3XLYS@cNtEZxy|RK;}H5br&i8BG@t$rhk}y)%kQ2em9S2C-Y0Ih zWT#l$^#tSgLMr|62Rh?7D&qJwN_8@FhCQ`{QyjE88LgHpu+pjEP~>wi>sxK$9L$R& zsO>VJ`F#^E%X))yr)_}IFj^0)>(&t)Rvg<|LRxy*?Euk6(q?MC_p(W!MZ!e_qZl%m@)ELx@dy>_}Q~S zbSHYKN?$nc_AHbqh&kjitS6^N_%@5mT*(}j3Fu{FoJIIT&{bl-U!LE-T7DpLmpEDz zetS;h87$YLs+{G}ruoe1apT+YSHYK6T<# zTFXf#xkN2^fYGeGPO#KtskqC(J8c@9eWjV9&vS;l3^~}nh2=v8VYOi$gtu{q5Apo{ zhxfW)UyIUd(nN$TqAg@rw-8Iyob$bp(c&Wk(^%xYTm?n@)=hI5a~dCyc$DmcS);OD z^K^8Kv~C9WZ=#f+;#?>SB(39u@GIHd!@qbydFtd57xubmyQY6H3saevp6Q1g9R&3@3j4}rw0!g9)qQ7MA8U~}CzDqhQWC-I1XaMn zsY?dg^}9TNBo$$+wz(e?>lE^vgwv=!4{kz#C<;zL7%RgN7JN~be%M$Y`vkUM7yrS` zf?@Gjd;Zs}n=xiBAWS<2j1F(DsQbsSnnkYn%+I<4##Gr=hqj7uO|u;hk;c>kw#8BC zZ-(v3xs&Q1G}jaBMG%7ga#8A#S4@IuK)}w$<*OLU_{hB|6$^YKTvB=YYC5zJC3)3q z-(k<~o=m;o-_E^KHD=XDy(UaKbo#R+6QJ7#PS^g<3J&PvDW#Qn1H{y!oGTqP5Qo=t zn>`~%z3VxqYwRv($5Y(9z%#nyW$iK*iXg4G+4YuTiT90nZTs+2e@0pAdJEdf@Co}a z=A-fNP0MaQA9Ng{h(@c1&V_j9Q{P|3Sf=^_52N;!u{I6(Fv^WV{=AK-KRp0%JvcvK(XTC-( zncUf--axk(H~&hFR1I+Xf-S%CwHim|4o|!ldNS+uSk3ITxH($~!WVZ|I>Xk&tR%fw z{$U@m*++!Gva2^>S>sjoW*^p_Z(YKIo2Q2ilm{EXl}1oy-t6L7CQNwcIU^kQj4@x`9v+7)&>QSZ6|hF6mPm8EpS*9*z=jp8YPWlUeRp-EP_#|v&dwyM2is=F?6w!(|EeXk^5;s&XcK8@=2%Ai4dRa(dsu0d4=b4AJ zT;)Ir2F%}Zm@rkq5Jc0TN3wmQtNK@V?c~es)$BWgc1(|I0JscR{H4>@RBuw|hm>2l zCd!L`5^r}Na9Pv4o@k)^?a5OaLP0@1*G_; zF$aJQ`$6y$pVS6kQQI(c`mu3(0l*%din9}tlWji4&2P_OvIjML(MC|dEW^i5|ET6n zbVOKEOOM04Tk@wM8p6GRj)blDe?D%yMl`d)fiF&yWWzLZx$~9j;aBk=KIT50X*e&y zc&-bfp;j(heP0l6^5;jO<5eMOe&4AB-JoKl~5kb%29C zk>Atb=Y~{`ECRzMz*Wmzc!K-r(#gB=lGdx|W;s-_p9Lb_X(o2af+hc82D*r zSvTBKG6p{-!fJxQipbm%bjLT@ok9(82w1Dk7gVbMCsgm_ymfwE0XSw z9ZagABjVyE*^3D+N8A4zlb=)%VO@sS>?o~gYe_?4-I=KK=P6TNr*gXb8<*LG-v$t6 z54Ou2|K5(ip{0YIo;sqVp8s`pi)^Pem7XSM~u^Uviv42&tm?(G?r#!tF*bO0{Qaf1eTMARv$cg58y z0j!p)AEyg`T00nyXFVJ#f6 z8Qh25AR5r^x3dYn>Xcp-SzZ@$`S*hLM2(66-Y>|SMG~-KMtS^{whzaB%}eE#ovs)s zqzG*YC+y66(?8{af6L$ACIjE+6+XQUHk4I z&X@hc_-($L(+>ge#)6r#aYbH&h1T1R??RAz*=aLQ%fH4xaW514``pVCfF)zD%-p`r z=tBsW_-&)8clSsG`7NSqP6D>Cq<-fvex*0Gf6yB>AcUzQfA=qM3|^lfnmn^h0fGf8 z2VrCdd%mAAZV*8)<`LeyQ(?2GV;?5cGny%nRp_@%FwPtMJebSuouA013ODw7?VD$? zYpFGn1^U1D(A~9xxR>k3DXj`0zVVq~J0OMdm%e_4p%x%GoO#jv=~v$77IvNc82xBL9|5OyZVf!xRoa_qXgxt2-I zdXJS2zkF;1w%&Ie;8KoHD|Pd>XoIKFA5#1hbtF)(A9Qz|uxqdTlu+U9$5!Voh(G?* z1b~+=^uP8#;Gdw*1C3twGARj7$-%ddX$gXT?n%PJXjm7_4CpzqG^rosZwhkn5qkJ>~YhnvV)x?7*3@~J}YY(T1H%mlS9#TX@rIDDYyjNCQWz}r`w z4<=sIZ$GRpBXO-x@5qQhaX1;an$8))EXN&y|FJonMwx^M))ReSWvF{Yus$y2(ewuc zsn6<74&{M#!PU)WlS`BJR^x)=97fXCX1#AS7DRdcHiPP3-mw^5Yr{(=mBi&JgFORI z_{f~Ve1oQ3eb_#f)u}RC$>*vjfpnRHw&6-Na)ZH;}eCI?#fAFkRxEp10F8Z>iiG{xZ zYRW-(d7h^ZL+^q8>B11C77^NNfRjxq##{GfiL|(v1;%lbXZ3H<($O*)7Tp!?nkn}A z__6$343nt0mAiZ$+N}Y&h*{oMvPirdvXs8dTbYNWgrX78hgL<hoJHi_;-lR5fr2MfQ24n&2Wtg* z_P!Yg-8D`ZVj}y<%>L6*X70Pj^L7R%sbWt9qxXfz#kdIk6Lh*BL^H7%EFy!fvGB%yaYlx4(Qp`HMv0EA*mgzYugR^<6|?@CAXhV!mtn8Y#rwRBlhfP%1TZVw zXCP934!KwVDF)%=|C*|Y)Z$QKIDc9^KDebwed@_Vy;(%;f)n|eV#^*#ykDjTuC;j6 z`dF70>1uZ>!67z9-%v?Ft{?#$Y=|oGa+CZgq`<~rswuIooX-8*M&HF>Y#+Olq0btx z?7Rn5gcetyWG#(|q30&nBa%r$S+||}_ z;UXETN6p9|V~pZv!IKK` zs>Y1l;Q6)|^?oH#D7q!E!!_vzke^NlEtbamwY$zz@K z68`eSSbp7jlD)R-U=n2CkGIn1HLQnNX05qf7(y-zOraBXV zgaPC+OgqKDoiYiedHh%W5={HJyJtTc7baayKe%77E)LA1TEB%gy1de`UQNk4`k6F( ziZL`4IY4&aPd7$JJ{7$Vp_4r_(`jxIkeUpD7-AC(yKU;${uhs|O*hj{)>}fhHUP8s z?Pa!kEGFIPAa%uLRvx71m%lAJ+oXH6+TBb0$XC|z%(2#@%~n6}v{J1a*I2Os6)K(q ziT3zhylCv}ev#_`Y|w6pCL^wYy9a2HgN6PA9qO>DZoc^$`t8mqqGHF7 z!h?=Zf>wf6Sz!c9rYFl_{FO=-r$6!r-GwsZ(8d5%NqEDMbt%@Ll zr@gK~T2Qa$fIA(0GSnR9w33USnb>;`Q^#Y!Mq4%m_OLarmT>UJRwGz(HsRrKXZ{~4 z^8&I*a%VCsE|J9&_}Z7_{Wo*RjOtKu=X^!~YmwV0nS zt^417>i&S({^8MKUScLTtg{FTf68%v|y7u3+SoOc{ zssCS%=>PxazyF3Z{NJ_wPq`Lq3E1~1$D$K|6nxZxEaLPR6c*TiuAu(=ng20m`~PPN zf3ln62h1)|kMG7aH_OS!JCE-@M)*(nIsBiY+k36+Z28PqmjWB77Rd#=dGB!#^wk?cBR%S-mxCKhtJX{ZSI#9Vq6y`R<6A(!}E&@E0x-r78RAwwI75{4`|i>SJNI zC#EGH?@i0^hnp67=bIL}yjI&B3mFb#N_cBv<4mtJy^-SD-W@U5kT|t`YckH2-pO0>&4PF<_&^f4XH+t{Q2VKF@Tn=~r_v#w-Yljy#ZSJT* zH-wQ^WE#j|Y$onY11D56%{x|&f+b*I-Z2|Tcr|d~mJt*`V%wccYlDw)=ua#ybHv3T z-d%qg(%e;1>Qpl1W743fqA|Sdi_=6eRn1yJHY^IUDS!z06JM!4d^B5O8<9{tt(Ty5 z&bs#=?)$NrhaTAZUfhf84Sw^wk`+cE&B0XPjX_+cdzX{PYA9dXX_<=3?zmk4j0$r3 z0v3(fzDZ26)4=R@x+5knHiP*}`Knezabgx^H{$%AssKpi1ei!{zP97CDZ!iqq#;{h9mX=RpV zd;+c?Iy@aftQalRBCp2a;N)3&U(q%+d(V`}>X8#xDOvB z?)=b`mK%30+J*MoLZvJgV3}_nnyld4RTLCT&*;0X)NW3hTEHT!*K>*miI$Y@ejJTvdpP&bwOd@^XC+%D6*yhS~o73&;%>u^k1&wtfqWUt+qEtNzJ)Dr3B!ZtCNjhN9S%z;#p%evZN@S|PD9|?U2 z*j|GQvF#QAaiH{=jkWZ^NI`jyKKl*)zk2IN@VQD0G0w+uxQX{S`-ZLV1(0AcxKiGYh+H|%j zx@v?tZp=_Q?b3ezTJ6#k9bqqTh4g1<7__##W3WP_D~!<14-Hrv!Uj}Q6kh4uuwcw%m}Y6ZT_e zbj!Xd-)x+6dbhrAJ(yY*wRf%c9<}TJa0{>)P{&|e(Fct}jHq+Fku#UC@|nB5-uWh} zHH`xb)w7Dr7!U88U~(tO23+u}uIDeVZ9Td(JuiQql0UrXEetb>*O;671b!v%@4TW#40zXD&% z&WOs=q07?$juvX?nC16$Vm*<^`JeSmE*GE;aa-^mBpLxxm1$Kp&+6^@sg3g0Nm&#P zbPj-L-vl#7ZPg^g{o?b80&JaG*1xLIjBkFagzF*AX6v?BEj&qE6~&A>Cqs zEs@)!y;i5=;4*O;yLl~;|GxLo`|R>O|Mia!CJLspVLd&}JJhz%#fW}9kik`B0>@;3 zqo$DXd(+ic_u0B?ccPQ%U2zQtwWZG?zS~A=ed?dS;5V&+9@4Sjde!$7TCb{4c-Qz7 zoqU+yW(VFmK>=V4nw~*iucah0r;@WAoY6&X&De0-%mk zoAYdAC)SAwzEDTAgMtE`H@?GSj)EMpZt;;(!I{pjScj91x9?>_{g#>Hv&IUV*kpPm5&DK1vqYK%*= zJ7BLX__I4csiNgPx{LL~V0Vv-d-T1sE2nOF-pNZG{9P*QUD~fR3HBzyW~8>4r-w%h zHxP%oUDPHlwI&5{Dm7c31B^EUgj709sl75AO?z{_(_;enOVwmA;t|&Y&!SQ_qlCLt zv)!9?=oI4Z>q5nh0BUXW4gfO&N{LfDUed@jRhe&ZEV*Z=tZ`-IQstzffn04IJ1np} zz@6wxA$7sMD7&MSVMS}F*z6rJXlvm|Q`CXuR~UnN@G&RbhqaV2mQvUSVH7YC)Q;76o))KO zU-ycM;#Ty5EI#7?_Zos#%&->}wS%eg)Y=(D>2tgmzjx#Ajh|4r7i|h0lPq4w3W)QK zOX1GtTL!ooIB7B|{>wjI%wF*S4R1zaQID}8NcIvmQ5j)1cjDUSSPglhs6{CI=LPWi z0tu*4?2VLsrpH9js0Kk+sZAE4v7i8aT-Ngf#Q>Avrh!n6=w8^F0&f}1YV1;R3j*ED z+c5yPBNhoE=5hQC46#yCY4Lxb3$izlUB2Q6%s2qf?Jzs51*N=SiAx$UB&j!W(P?9Uh#7n5pPlTw$QS>BFRjh3ppndD(-_zp%%y2G;P?a$u=2^^zJVn&VyGC&?L zm82ayAa&0B^-k>$rD+$43{BAG*wo`rq@ur%Mai26Y7)Fu3o11}E)<44sj>SWYX!YAV%Yh1jY?%(Im>Z2PG~isjL1zVJ^?u6Y)Dh?#G#+$0jyR7oF+}jmxH-cyn0_BCo|8J0wm)^Z{`j^1 z9aJE{blVif#=J4$pXH0^P5U0Oflf0V<`v5lj!KaDnWNjNBlx$*O1#-;MFcOOJ^%5x z=={h=AF>SSh=n?sgp>bqs{le}pf^TD_IeJPRUUuUXV=H~XJeM!3BcDTt2oa;Z+2^` zi+;15VBx1rpw||4(APdXzwJ>)t>py1mUpsZJ1QA|hwDdY)n864Qs9FFT(W`h>T`Pf zHGbjhc{w5iTGO&igj0w~@%I3oVTp_9(~HAX{esRU5LU_%GiCkX$IX^*LB}Q5_kvVr z#_r^r%{@R3`3|AkSlGQ~>Zm;5PIG_FnUXW}Lth(v-d0i_MfWBZ?%`}@VefYaLGY5} zl8ENc(E^|hau1ri5IakuqSB>uf(*KOzssOi@6(sK2Fivr6ll#qg(smZ@`u!@B zk=s|Ft~$Q4i9R=!V^)pzr|gVc##ML;s=(Xj_aqU9ZFzU|>z9;mnr~jK9SF`IaS7RJ zk`2hu>Vx9Y6!J1IHbTY=3iOF2rL4ZsYj!ZR-WuHuQ~9*zrQ*E){J`WEIq6PKd71B| zt*rmtw~8b6!1V#ut9x6!K2AraRP2D6cU@?wy|0$*$?>B!?x7o&QT?TB zFEN03UoEDT&R~Wsdv$tL$pEl^Y3i|Z5$U+Pp9qW^a5liL0o<09k>y_EkyG#iAY)VJ zKBMoeS=TC=^1Yfky!;`m9y7Y34E+MI^&c&F=aW*rf7J%{xlyh4lTbpZO5U$Ko+8le zuq)p`KLap}bi^EI|MsehX<2B+Vo{-QpQV;jYD?*s18i>u@T+<;A0VV$HZBD68%|0G z`K1Qn)xLz}k;Uqb;=K1!^>9)Pyfic7Pz9I&infE>#Cr#AUcdl|(}p0cr*j;thdYs5 za?0ZX0X3%S>cddJp|CUp|~|8ko(6N z%`5@S&!brX;V!ks?;Ec)vd5_x7w@_7Yrr1LmeZ~Si3Y}0>}BAYiFeWc)rpyocu`sw z){SAi+#O(Q#)Kxo@mIhF8JNb8Me`)^stS=4h&Aw>(Th!@`9d>IiYH^LH{mq{>Zz*< zH6&a22b4JA+kr+~t%qGWEzfqzVc$`LC~+tm;)a5c5QgK@HpQX1!P(L`(W*Vt>MMtl zl;qi1&%lhhtA5(j-Z-gT!f%`5^9#pnV`03iu;0HnEk3F+9{Gh+}3ARKfj zzZ0eb@CKTz`7tV!9QR@OxAdHofoV?n{(4kPE*jrO*Y$8WTOdP%dMBjzn$jP63L${- zCe$L*D5P13holPLs3w(avL|urdc#nBqOv}q4hC&;)$5(k<+GZ^GTfud7-vCO07Ivjs%N8q8_%eAltG^stwP4>oGCO+#T~`M?6sV%`?U=>)16=whGe>7UZ+ejD6ZH(345s z5VXA!-7FbT?VBy2NnrH;M99|>L#K=r3M9+dSpw}#rQ46{@@w*3Xar}cOxzYNz*2ed z)DjVv&);F=LD!#H>6K(FJGbN4_Tq$_vot)WUqf);9bY+&($i5Vod_3ryz&L|Uc)H| zz82`|9F0>0AZ&2Un0l9=#I(Jib!&YbYFp05Z7^2C;9Bi49c3$xayIHY#YWSK zh11n|jO32;Wa`pNXF=4b2ZBo@g0gkwZ;u00NpjWjD-FZ<9_K#9d3>F5HqNT{{_9W@ z)H)ky#|xmu0ABj5=g+&yIgk1epQel-MAOph=3fcA;OKwjaB_Wtv>6 zQnfmhMH~yEZ0F6B03SY@yOpQWRHEJg?d2ZA@E0WNsH0=!NC5^0vUjjejPa7@Mt6*% z!_=;#t~QUJ|B7N;CENHEFUU;|QseK=GTv^v9V_|2tli>wLQ+2Y|zt6g(zJJ-@QeQ6T+< zdn2~>L~Z-YvE+PuyA&@Ug30&0vO#H$=mKH&ys>7!;Q{s1@6>#@X!N&c_cAM_`2$5% z*h+TQoKhaRS)_7h*-}pWbNZbirqljArlS^d3Yvg^d@}m$v}t8p3x!<{>rQ+Hh#l^{ z>h#;V-e&neZ~dNYjXmWv;Hy-Cse;^90v#5f6SLUBXU(QN>__Fc2N7@GF&k9GtCJJ6 zkH-#e-l>_t)rsb<<=vKsJ0dd(!s6_wS8jeiGovN?0rPEt8RAMhQ!89H z-sQ*I@m`g!<9RHC8=+Jaqns+OqgtrqXwc@~8WFz{XQT}; z>{4}qXfYY9OewL&|K)AZZg&y1Ov>+r-SrR@N7`Uo#AjmavY*{hCY|2o8LBj%RIgFE z8^c4gONC`67tdN4Erfd|pJ~`7sEvY6IJH>#@P3l%80 za=1t;_R*@bpe^pGcWac2vfXOsnbqcQ%FwHdW{2?Fv9N`-0swor&ce6RY2|t{#nQ;yeto5QQ^)Se=GpPH`3sBY zgsVVYJ714J;hwsCS=Rd=;S&RnKn&TZiNrj>yq8psZP5;?zrJf8*I}tScW(>H<^Lts zo3v_h&1Fy`p%mngH_Acze(mc7fvU#CfMEn{OWoyp{7aU!!TpunN}T~SH*`(+D3@kp zFoc227!6wz219C&&7Rd*E`wv(9pj$*#y&*=ZNp9}Ok4I<2gReZ&&=Ma14>FFX0F#) zz6+n_{yNZp?r88nJQYxv5v;e4v?q_94`x81R<=<7UBbd&{2yxr zZ{VJe39w=rTfJjtfg%<)B`1vhmTq#1!=G0i^h+Wr$uwcWyq&(g!P<8|d5Gso3IpgULaN7-@_txnFtt^Y8|49vDGED9 zMLH26NbM~Sia@mRr4&p4;72xh@*pGTUzNHC0%kFz0t_d_oDt!*J1j-(krJ;;qPFHz zwVV)eZeJ(QFNJ2y+p};8u6nGXzQ+IiC{_VM_CP+Ie%-mRY1nS@9P9lqu#Cb=V5S!N zh$i_p0AYZsdK~PBq)om(VKxN%vyk4a6YoL5^xEcWS>uBHNkx^3K)u5%#j@OE?ry6h zxyZcKwmn`67|VeFG?Dby&!o3mRxGvEKogEeb@P z4!Z5jNsn*mm=wnskp_x@w5&zJG1eMWiAukoU8m=A=6AtTe!3&2qvcP)yH}W>i_J8> zHE<_FxeWD{t=0s(KY+41o{y?LRH{F=_9B^`m02H$jE8is_U zsvpTf)x{`wg5OkUKL+$7w$T@>es%Fm10Zp( zz%b<(^~?E{i6pQXWwXVuJ1ZG7uRQ8UkfIJz9s@=`wo45?ym`dAuv0mzWW;CTJ;g}8 z(hmY;R3QMrzWfQutU`unRhNKimk{bi1%TA&t}g*I z`8sXs1nIyl+{XwgH6pfKfM{ouckIW}PlE^euR^D%6IASwiUR@MhmS6^BsjTz>o!Ml&UFD&beBA3dak)&9hKF|JS`N6@Zw<6Ksyc~2acZ&U zv-r?RmzG<#{g9XoCA$}ju;gBI)F{7NDnl}_DgOvF$w-?eL^@dQJB~6Ki@)r1t5jV3 z{7RbEPJ4U0HQ)$rUtKbX;p>6UH(;i;j#B6@b+)$q@m9mw<&@{ZD856T0wDdABk~${ z(=o6P8*GT^TKbGyT1qHb|3udZ)r#4%3}Rp*X$L#2*$IsY7hb+xj8v<}J$AbvMv=+vz>w43?V30CK3TI6fnHyRTZMwOk4x~~|u*J`Hg1UuEy z+&|k+OfYZU_?pGh6mV(H1PE|KrhiPkRx;qr=Q5TYeT=^_xNvkva-qR1Jv&U@>D*SD ztsUk_$+4Y=G_8dr8k**zT*8%$Hht~O7v?iuj909E?a{w1C&>C>FCwO`guv*>J#As1 zA}$XpN3HL76SlX8Z;N_AL^n;z(qV$|zaTCL2#B>1gckVc$!|QpJC2Dd^(MATax8?- zrY=*cVI0io zk8t^X#%$&b88F-)cYE^P|Lpxad7yq!6J15|Uv@58mJJ}Y5wo>sU~k=|&e*SM1+0nT zM1Z_!#X^)9pQWGcO+Isv=YX!cCo=+Q z*{SZFZf3sE`oovJb(Y@ap*VnWaVTNJ#4Ol*NXx^6KT$_o-Lgw@y~1nHeOOrQsj4xj z;MtN+7Ri*aQZ~tV@05oaLo7WC3t|#yfKg_~5pjN57tHA1I&O+8o-)(Ef7Z5KIaT#( z2FrebF+t}N6m>G`2P4C?O`Sj`^|<|gX63tD&CfQ`sXp`X(TUXYEgtLa96l^;z4^;vijLGT3VctP$Mc|+C_M@oQWm*`u2aYjE7t|mgetWnY1lv2&4C zUGRH~_H`yB=nXOS@oU-FW$|a7M=IZ`9#4pjUNH7unpPg%bTxQ3CL1SPau#_(eq$V4 zhyp`S`Zcvv>W0ZxnBMbJ`UM8om^1N-*r$UZZ5bW_HTkvz_;Mk)0wS%k)e3@W-c!|^tj)NWb?^1{>BEzY z8zchCGU9T5#Jhc9mko@w7V)j5#{09(5`qAt*v&Q&;>D7-2+7mg_pC(CcwhVy(tKm` zl0Ik}^=h0t7;gFIw|ZU=`;@DF;jAHT;jEkUAM+rm{JcxLfeDiphxne3(IQymJTtCO zj9L34l+Jl89Y1h^HHs@^0^^R-NVZMiZ~H3oIF>2N{>1>(3ob$4Hu|0Lr`2q-8Nxiw z*G_VOx(@yveY1LK?KQKZG1G>$=*FYSH%(Q^-0{_k$Mlu-X}(dXgf|!n*%`#_ zh}BrozILy-k%iJHPWvSk^x7r^qf8HWmhS5dvU+^w$z-VfY+k#nYl=%`TPbr_kFh8% z#A*AQuyaS8Rh(0u&u0ym&s$aPKA%AkIug5YlBMV{j|%F~=?W|yWppgy$kYj2w=S!< zeIm`vad3fFkGtLHT35rIwfau zaU`*)lV-GZ^VbczPe=+s7N-0B0;;Jb;bx#Y(69*$tTc?aQ_eG$=}nh6Q|g-61?A1SELjs2?Zf6zeG|PPtQ> zr%tnKe>pnNBWx#dlU>p80P882E~}Lp71kt_!^Ef5i~2TCv_fB9Jo%D?qqsRdQT76J zJBJ{1bw|`gOHN~sNeSiKT5p|XTePg^oyzxDWn2FtBV7EL>$HNjcl#pT7Cuq zsO6i{^rrMu!ffMfNhcB%AFMs&cI@G8EV-u!_?-#;6mYxLkAG3G}5Ldu2`k2PeksV zD9O{FHu;sWqVtirGMQ#Ks#($pOV$G1NbaOo<>yP25%RjVSJJ<%(eo~vwh8UTm%o@) zZYBstuDo#0%0xPa=s1p*2r&dOb!er-I0GrQCk%XJf)Q+88mOw(^*rYd4(OpT?#D<@ z`}OqO-9<*W;UhitLW{E^Is~&~>&%_U2{n~vneNyPTr9QGz}`yEt}7+0wh*ma`(4?l z#nt87s=ZotYU3bp|2o+5tx)PO!C}uK+MLQ69sIHsG&66C%OTzIdx!&9g4sEJ$`8)H zT7emKuti&NRinSVFkT34zX0Oqm9Ktx^{&@U>&D@)R%Q0*Pju`o7RI!N1NW+M%CReH zC7tH2i@VoTS&dVGq)gjZ)89&Yc7xrV4c0~-up6*_hrE5o# zL$f=^F65;)Kg#H~(Gb7(rhapjyQzN~S{IYGM=IZmZ3pq3Hy3Tzqt81J0`}H|8Aa z$xM?DHI+Wzxd(L| z+1gmPJhlooY%nh-4~Fro`#25iyx`m5lf3#uC@XxG{>a+)wRlyT6Uo92QgojC){l9% zNxV6?-J#Is(GnRSk?RMqc|=1OLNgmZRNnhWzDxVDchY!H8pY2Y8RB((*RqBr3n0Ww zWSIeB<@(`H0@KQP-6d!5U7;kk1CI(9g`}yOQ~>lmeR}0tScHOrmuR;N6SLi+q3Aa> z2{P`dbWZV|GC!qz3NGk-R0I50TQ{gyr<`&!@}}FRqyxS&rYM~5axrds zM!4K?ezJ2-aZFghBYCN#Ae7_PaY2`^dS><&8=*qW_ltMM!0OganNQYV`zF%8upK{t zocpcW7v&yRgPR*tH6EyfR8=AHLKDw*mM;<<)keCXHQuL_=B(Q<83$*7!lwp4+P!#r z7Q{CxktTYe*Rjb20O3gbNQhKOEqk~$D?rjNcGm*S4rw^W$lG@@+IcaWTL8g>HN(g0W5b!l9k`^H@tx zr&j~;4laaEn7WUaF(0_{zDZQJnGvYYJ@UHU7YQC8PSqpeW|^oN?ek;A{VsYUF_qK0 zL8IF<$SZbneCH7LI!SLcjsvr<)HuAcGO~0@WeX6ah4WUmJ{>?WT*VkLLc5?*^KhxP z5cf)}1WmB@JnuZ+5Nny=A&61qDuDFO+~gZHvyeRSp#yE~>!(MR5VbdgSvMr7BTE9e zj7r|=l}272wDpO9H9gzgRsc~)Yyr(H^CNzQWULXwFICO&o6MO*K^BaHu;$}(sxOx6 zY@aGzA&eKdRx;0hzP>Bx5cB_ZcGgi`oyW>)ml8~u@97`*t~5Y2&c<^_U)OyX0%Gu68%RHp z%L4H{h)~8S5CvmlBQL$1#3D|Uk{tU?PlCsRhZhn8f1kf5-h_XnAU}{E*d1}c;IZ_I zx&jwSo8!Hzx#e0op2ZQJu-3yF7aZ0LHW~d z9A=qS5;mTqCe|Y}#kzjF`2d0s|8X&UFN3xfeK^4!nPc?09IKjTEXIjtKs*{YkjYq7 z(8z$6W?HfsRR{t&pz3x{J-x9JL+*vE*l$eC8rOBWX9#H6*N^(V^-xejx+uSa7@&;s zx67#lj9Y_L?A(!>d^*o8%P?df?@+k6*qXKU>(>kV=^lIbAI(}yOk)5!OYpHYodl)N z<~l=`5y>1L0f_4AjjIO1$B?4~egE&O7lV#|)l`juTCRC);ig;U(+4f~KT4H$B1(|2SMR=? zoy6sTX`>RFwcViGuN&oa8vN>U5v7?k?QSQ#?V?^|@kZNS^wqR68t%mC?YW$t)w$H% zZ$Vff&vPOf`s*ZxTwhfQs$)fz-!|GLi)iyCHxWfXBh0Ydc=tfBDlQfBM>#JSAMk5X}2R<=&s)%RYb{ptKYIttp<$q5ANUTxSvc?$|NbG2 zWo9VFx1b0(pW^{hDyA|Re%_T67L3Nii*#KGHN$WwB+}H36Wy`uA;LR0M8POL+EwhN z;+4#j(f(#F&8bO>TfBz*7Ad6qc0~4V>`UQ1X?}l@mrr4Q$@{|NqBt8mUNqz^K21H& zR^3Ix)0=L0lQ$#Zeuu0+e*7Q@JKAzJAV28+F%v@`L+l^CmJ+4Q>#7;O*{uP4a$WMW zy~l6Mc+T0|9xT+Ws;t30z?zUkoY*Bq)I0QW*dPw-~j4`ML_?EqFM;9{g zupc|&STTWoQKt_)D%bM;YMitZsR4U&SgQ2f&?I{%3Ces*jb_2+q=)Csmq{J~%Z(s? zXj8BcK@cMXWo&jSBdoEB;#o;AKYgiqnfD&AgrMuz%9vLobtsL!=b;-CJlAG+GI;6B zuJmQ=Qxva$2z=_`cRKc%H^uBuJz-U_+m$LNST9zDDm6C=9$H)TDf*b6l8Kyb=XrAV zi|EaU`7NgQNF&V2J!fir$j5jF-sRn+q|tQd+I+r|sMF8oeqSXl*Egle91|ik0QxVj zbKf$x@tyYxrO{Br7Fk@Yf;SdE)z^=9j?f2ls-1p?+?y6}6|xQ{Sd+xIEoU)7Zs)O+ z6)LjozRcGoF>BfNao^b_RA%*9n^mscomJ@IiC2ksB{3lHy9erx z*D`YsEGQv>RJQ_I?ShpRKt`U}d!Zoc46<=Jw8dFJa^kE~+sbiisLn?@{8QBB#&)F{!^?nsl!U|q0G$~!M7 zlOrmUKyos)WR`2$A!QqAt4ltGLQ2;EBfys6EhE z4VviP@4VWoY0zTI2*@~qY%QQ0VJ1;{orRsFoZ6pZX`acCXBo1HYK-<;u$2i4%yKSI zmIo`l_y&$t;`TJCNqV@hHTz3nf|*TBeCrzXox?2){Z>Rbr_IHzot9^$lEfxM7`iCf z`37PYBD_@6Um5D5_lwWTfhgoskK=(;HObR90$~ZXgm3wq>sM#j)Q2;qR&_y>mOiwI zZfwOD4QTg_I>FA*<*!@$6tj0P0-WtCnzs0Cp$DY{gyA8BxhO2( z+SE;SO0tK?od@}NV_RfDr+2HlJ~M1Fs{TBwUZqC$u+`mX7Eh$^qVak`&ChNLp;SCt zyw|RBUpNPpXC@1fMJ!oY1&TRMi>P(Q!#vEOrkC9_4k+mSr5nHL?^);YJ>Dx%Ay9 z$aE4lhF@VOu{EGtC!O0uR_l}XTTEP0D2KltHTZ>3+OTLPcNKjpmp;8W(ex&oF9=x9 z^ffN08#!*LJm7bUfRnK3G2b^dJJr zG!zsjD$GHVWDDX>NpyjouZ!;lwG5BcRnB8No(J2hY)d!m2y+y;Z1l~X-4{%_%3i;# zc2THrS?{JOKND`b52(4Co8jyS_wtv)hoM{eOOE@^gCD(#(G=Ih>#`kz0<|v%Pw`mc zG3E)6mA3VbCkm2q`jgiAXk{K=N07*&-no|-m?Wn~aR>u0-4L&mv?-TxhIqbjB zP5t%E|DtiT{4BrFSqTCC{`H5_8<60r7phD;R!kEKj_3yYnfJ!z%Pcb#GMZx?NriM0 za4n08Zy-&8bg)UHX&waAs2EvLsQBxA=0FY#C~fw(}vV5F2Vx41=QF!<>G z;picdjqn5!46RzrrD14+=Q?xQiTKHI$n<)dQ*wg_pr+|?Z8R$(E>swq_mvqaB^veV z5Q-S@j31Xc2F_fl2{VMyccr5U7oQH_=-q$~p=f}0Qt9bop4qYvNlT^FH23cF^Xe?P z4i(8jWlmC)sIO%;#b~V*Gq{`^&*5ouhAu|-jx+EjoHr3HW z-4tznmRLFPWl_`2W%=ONdPRbq@PlR!1OEMBmo}({vF6asB%(@{W^RoIS&SVkNvNND zhq*_hhac8cL$f5Q@+Ciu#Ln4A)2N6p$cmQJN>J{Uv|`wo&v7!$+!rk0?q{#+F^@xJ3Z4Fy{ zyVrEOzv5j<{Pbng(6=jj@Q*_CYdIDEkKKg`1Yj6>FSfu&!ANW&AqrM4#rzPC7>ZeT zK@|@z&49G1^bv3olHoQ+>7C0z=yl90I?Psxd(s_q?#sbKb3;?+$4I0#s#Q5+qFwp{ z@d5X+>*=JDL-l*YYe-AAx?r!%_l&b5nOBz~R+niC1{9rC_!z;sDW(lh-Aq%x)9zdp zWVF!^y(i+)v~$|tLZV3eBHSf}NTaQJcz8q>^SE2hw{L}M97M}5&1-L zJyYWfS`O-6D=0y9HZa-wW%0E$Z-uPL1=v4H->ae%Bt=s?b=N#+)yqdVyX&{ibk0wW zt7IDqhUI z8BXn{brYam%`@;F*xn#lfwH$HX4#x%fA5CBuTU?F(&4@w9DX_>K7k>)dox_wQzN+S zM<^q~c9t?+eJAQ5>VP#_%Kjl%4EllE;%Nf1NwBDg<#!dA69 zSwzqEs9k=rBdkX5pf%D6@x-yO}A;1U#FXveVhhos-ky;74%AaIE zkwcX&>QsLpSWszJ;$#vE!9$8Bif+n{6%FUi%3`fP`B3_Sp}qfY_8`P2sRlhcA|$BG z5)~VSj2)uvAe(5J(5(n!Cu&1W=7c?AjmCJ8tpGD-A9`l}?VVo7nVjoZ)y>Pv){B!`wLN41Y7EdKLzu6?sDCoA@VMJ5(&4>k3!}) z)1Da+Xw@B*qD?CRc^2JniE|?lNQ089qg{9vH#(Fd>lukvvE3W7YLjd2t?HbcgZt<~ zk>@NK%d1c|jU!v@OKlBsky}$WQZ|u>D>}&(DR*@rYhqPN8ls?XeK9faH57HBiU`m& zf5Mk77(vVhE0VC6PGjrGoRdXCrJ{sYhQ&@iT&{-7Yo|#PYFaDbH z&PWOR0H*%scn4)`^cxemjAlzOTov*y1E}X5mBDD(l(=wQ*p$4U**Nc{{^YOx+R(V+ zE*q!`P)qPZ@Adr_O#gdMd@Doy;d^E4A!~73vByw40kDR63~2xL)3)lRyef@S$D-7L zJ;jA~=!WNEEjv8je#rgsgh(Kb&L|qU<#{db4<(QY$zoplWNV)9obcUZruM~Oi4X>ncyu;{IM6naqou^v6jJ(;M6n5?>BSY+X0`+^1b1&8 zX#!{lNEz_Gx7-OzWVxtM3YdyyPW{cP^n|e)$(WPDqbyd0q?E-(QtzG|9dF9;ww`j~ z_>n4u!hb(qOLI6TAl<>9%mM3artP_AqC5)5^0qiMHMkn@ zlA977hoxghi_N9*lc)pX0e*5$VEMMHtvSyu$%QH6XkABGj{u6(WV1ess9drhu&9s2 zlV^> za#_WVW^l{bSy}Ad%&}vqa~^g&U#XTZg@=kK!N$GCZHVQ z`{}%`Mrs}8oPsaK6~K8GkL`(0+U3MRc8> z$Q6UU&A8Ebtai(fU$`1^bGqZEOH15RTSS~R+YQa@V>`!lJv+82hXv@QSNR!Mkzm;#*4`c17Rb`_`dlGcW2G}#z&1r~-|=GV z9cpaoi+W*sE({_t9_5k^OR3!r>>)yvs=A4zQ8G4-9s>u~R^tlOR#GM%IEIzZPwTUu ztl}o1D&)K2lY4WPdcNzQ@!N9x@L=M(r)=(kfgEb>WvNzRk-bZJhjSpYuax8W@AQ@^p&e6%F$Q zJs(}Dmx=`IiKVgDEgYXWMc`C=B80|+D|ktupWlh5PmcC8e!%=7SEwxm8b(&3;Ktxw67&3^S}MvxN~(;F zX7!yWjWL!zBs*I@>ER_QKA3Qb+(Mf1LDGRPuO!diYeGeNu-BN0HYV$|sRZ2Q$SWmL zKm#n=P>9&kGO3se8mu=n3mrD3qH=vRmNiD?ZJ>B9vel>PrZ>x%{K~qjTVFjXvS-u zRhn7?5<7ty$r#D0?wm|e)!jEAZiueqU8vM4*7~M^Ic2g24PDR^Eu7|gk~rm-JXV9d zkd~hweX*5)_0o*GomIa}YIj-$8C|7eZ^6I_AxXH>B|ZB#atu8bLxy^%(`8xKT-9ql zW=k{aQ9lMA&PmBoUSM%nb&fqe+MXdbz3!&<*lE7P=N4WEh=_qy0XTw>k=PEeu zT4Q6xPPph|seftM@|LBkfl^cdd9iv)3A;tSXVs$>4v|w=?E^l?S@eEBx>=>1L!YrY z9g)5w{TSwL>L6)OaX&+{h{tKtxky3KkmLTN0gr9;ZE^JxPYHp!SoxXAcJ6pxFX^PU7SqjabCkCsQ>Sem8V2*Q_FNQ}YgU_me&SOg4?-joio zGD_$PY=f+bN*4tX-yo8Sa!*k-iNb8u*k~R0)yTN{^L$6BC@j6 zmri(TzCBb7mo5)eRS(KDd8AsG#mAlVlx5qS6MS;V<#>=K6c9>uGK|U6yHTwa$*7Q% z=glqAW(5(G)e{#R+%ax7`BD&8TOTs_%mmkB#pXa<7o zT&R*XI9xbAB*>z{oPG74 z?wTqAO8G>x$hT;f*#p5RK$Tb6b-%r_^MTK`I8eLtat5OM^hWk*7wxoe^h)PdDTQdI zDg8A&_k{UG@GW2Q$A|Es$Ds`2drE}L3`$MC&N3QE*D~rgPu{UxMhm#5r+CNa1-P^} zn;BaN7PY8OL|1W7z&*9`FVz>MTW83ZtJKmc&VV3fR2l%p%1HVWZ$i zv&Z%)*jN;Dc_Fj|3dJ)781ko`mXq#UveJ85vA}L%B+6!3x)fOwucU@$j|@EbYo#xy zkHy@Gv?kHz)bp;e;BW;NnrYdPP+&uST#K{HH$9hzW}So(kxJonBp!%*%ikMo-*L6l z!G9T;%zNuWv?CY7X!W};$WDY4L)*F2)7Z{-Xc{O~C_yoyoqjbIDX4B|3&K8+L`y`I zE{mO~T2nD#+fYg`h)j@m(7yF>H8MD`B zz*LmFco#M!ejQ~VTtz$w9S9E1UVDNrr%c%Ah;X*+@!Y0>BKKe|eJDv|Z~J~*0FMt1 zsrEFggtd0W`kodHs<_wKLRr8j-l(3Ft&ei+x_&SNfC6DxkL|t^!E&?|nYX6HNSCLe zL-&qxb%~E&FZt#|t2BK3W+Z!pvR+oGCow{WB#^4qXX~|7mr;k^O+hg#z~NHL{Km&K zYo??1#N#31p!d6)VU>5B8uqD7>;B$&(;{f@T-0a0uOs&>VD7>-<&^HPpj` z(gX-DqG2F3^Tfi7kS9Ek*FmI2d`q0+q>45#OLsq{SvM9wIr6&94URa=BXm9_N!BhE z6*qgFZJR4S_q^lN)h_|lmIB@I_7f#W)_;y8+Pf_$B*a9 zp%K+K70A{_GDVF|i-|yv2@Tw`nHH-~5oc)^K-Pz9>Q2zC^FIqdvuqxVQ;b!Lx?l}V zfP{zn_60t)s$V&MuSY%^xW|o5GZ(lgUqGW?{)i+H50d-<9|cqcxK!nZIZ$Ha*3K;YKfk zKG8PuTJRg!!~EOjG&6n6>>7J{ItkG-cFSBZ#d4+|bT^VqyXrVHquWi~Y)g||okh`4 zn1vh~H3X9E*r`|qF|ykz=Zt5_@C-PXMvhs65$X)x#QQRgrJ1E&1OGDQa<$v9<$j-w z;SCM{gAfJ;3?3}7EAYvKhh#$W>7+*S-6}<@ri@o5#Aa4i@fabPpW1Wp3qb2%ZQI8m&BA6cpR_S0c%(7FFJurs2o%N`aMop znn}**Lf652Oo8Aw5xm0PT4yt{bb7j5KE*>-eN!q~1(F?LHBZVhH^wm{T^)=0%tr9Z z5Ct45rwZmX!#zeVN7(h4IH?EvQE)eFPn%tfry{qM9g)3;beW3eTPeXwO%q)8h;^Ag z&ob9eYIZTx{up5seI*(qfow`A0qloYy~~tx1OOB?*SA-FcXr|^lKqr!JUwDElye!~ zNoPe4Yz#@uLz}+wJ@wlA={e@{msNX*PqS(|p|8`1`C8rC(k#R{I%urM3`mqulJ~f- zQ!CMT9jP#gfC3J zNv)_I85RgS_Hijzc2(8IjTO}?e3G=YP)5*1j$0O=gS)bYw;}@8T9Mx+fD)V(ucR=% zMNivWxp5=XxN8VU%{)7%#sTAjh*BhQz0H7nDOXXk$Re6bym#MNTPfMWmSF11=(Enm z)(09WB~IQzO#x4m>6VRY)3or505Svil5oVV{A7K{TJK`HV_6hQ0iH* zdGL2OnQ76=EIS>@bh8UY!2euhx`C9Whd-HD!W+$C45y>HXw*bX#p~U>C9F_=igPlz z2gt%L&Mzyo*ZDPjnU1j(r~OoiD+e0k(;Ir54R-8mb^^sKyO{@Ez)He9)FkWs?J`Dm ziurKUJiaZRI7HplM4AURdTdQ$F5C*wu3^v^C7pZWd>3b9*pmEsdYFqs!rIO%NEMoz zrH5$b=_{Zs+%KRrpHrfGMYneT=9|(R>4kQ0&0DO_Qu=A5*=8W}AIDTNv(uo7OoSmi zQN)Zr$KE`pT1N}7lFRElQYRpV^){cru`{|#NGA=C zVUzXF!k5SmcBk7emn%0<`VyaCPKGI0z^!@Q>4+9QQv&?fEH;{(Q z1V|T2UocNi$qOok+pLIT9-2s4pNfu@MwN1;Q!IrX-B~rgEm>y7=fzj{v&yWDBJGXa zOmukWO=0r3L_4%Cm?1FYof~6BNmX&%vI(4o9{)-1g*@wU?!{b{T>OT;q4^l0{4mJ^ z)wrju8v4tgMDi_u*g z2I)X!hetWytsmoCW-nQDnObmR!(_!QBt8t&iCsxro$qc8J>W(?lzh;+fGXg=*tOR* z#Z?6$*u0rmcoEU9DVHZdoa4h(Z2Db{P5=2h2IM*xZuw=} z@30-=lh)%p!CZ!O9qP6zz9XN`T!$?`!kF7Eiq9cMgK;zDmq%0GEI8I|jp%?tN~>o) zlEjMNbFH@djZ+%m#9*A!U1#|YUyU|v9uT&kh?~o@@aolDS2h5(xEW9lkg^K%{r=+* zR30Gppds8*)~yq)VC_T>!?ZvY5|;#gJV=m+FBWvi^jmAvRc05d9vTM88tc}X=B(>@ zwP_Kp$JSowT6eS-EgTB*t;NS)#$vV;&>!t0k=kLe-4Y$ja%bQtD=2YIKz1eh*c(>!k zko&6}5nWlV=g3Z{cP0JhC%*S-Jh<27p?m#Tqq49AG;3nYT__9}s5NV@wYe_*AJa2% zAeK(e#FY9&9@JOxW{Scp?l1o=xiGnwTlNK2!!D|dJF45IV&@xCdcVYKx1kZS2BRf; z3eiz7j-eqTXN7rIp5jkF1BundLxsN1?&GXKaQD$`Ti^3{rYQ_pPgl=ayW8KARqzar zS#wzn%IR+Z>7BYMniI-x$7`dg95IKtWluDkce!MPu;Gv;N^=`L$k>cr!b-qo!Bj_( z5~=p~O<#QqlU#qV6RY^j2ZN_&^*hP`;C%u+>UkXwU9@mTu zU#6Pv(tci$k0^>c$m_C3c};93E)oB-MQygmkB*(+b+4!J`(igk{l?Z+>b(r9#)n(W zCiR0^>Zf|u9pjvBCi@qUc-*&?V2%x{@JJZPZ4m>D*Q{gnG6kLMp>BDbOu^M*r18zF z?*9M;12uvUG=*-#V@+}tgHU)r!9VkV`nFj)i?``6l9 z*(Qb~JG*{?u_{Y8C}vI$uSKQ8$oZU8fVL-1eIyDqN?jc=f@jQk&)s|5PvjXiO=v?oqZ}mCq_?^NzL{* zwKc$IW_dZKAo|ylGJ{r4IEscPElEq5>T@k8L5+A)u8qK(JE5b7tkJPvMDEI+VrB^@ z{iVeV5H|{eWCNyxp5*ttOHz$Ui`!-^4jT(0tn!ax>uq5DLY?4o?yXB4mcB*dD(Ia{ADvrFb|x41_WN- zrI`V3{uN?|-DD0cue2vFPqUgjnMg(FTY*fEKYmTkpk-_XZTd|1rUqEch?JQQjEa&K^!7-fv8U z;&z=nWazYs+<)*K8KveheIz!bNKp1Myb8nXs6UJm!cC+DZj0lq_)CAaXO1cz;T}`= ziRw_eF4YzB*_B@7<6^4UHR*ce{UA5k=K)mUL?=UP(}b7J zhlwFm+SGSa1ztdYBjt493BbnI=d*#mZQLhE7=^taU)C6saF><(5`ECQ_yc4t3U zjCaybbl%KH+cwP5@027-V78rb-{;Xo`BCVPvL0M6rKT*g##*uRB7P&ec;V3(`EIVO zeXgIfm3l*;1(G}VF;h0GbE^JLj~kxH7PrF7i;XKUjxV1UxtKR%vSl)kWsE7KG?680+GjQMX@!3ShLcQ7-_j8N7?}+}oNjvP`Neme?h5@mRlGfETrYk8S)y5+gn|IBTv^JI=v@ z4X6_iMKW55%mLk)5L<{%(Y+5Z*<)Mnv##Y#&{Eo>O*2mSLw{yvj~Tt=+)Kll~qczYA@+hnd*l z-*8rU52Wv|?V{!2hjqZ$r?h+Ol1D7}jsmcz&4mLS&~egpnd|Z6!(sragOO3|L5$m5 z&y>?kRs2&#PA_k#Eup+H-kU*w|NA@OZrSCpor^Ne3{7xGANITwm_Gmv1%y7nf20&# zCbVjgCyv}I(sHDBaeL7;EU_0#J-=NLYvav3B(`Jcu?EQB%Mp{_#5J9bp0?}uwF|;I$u%Lm9Xq3JvdfdYpp^8JYlq<+2)wweA$g8aB=DRV*xMcv>tRPFt2_FG#)_b`Og_ z@3`E|Zh7@?U;StB@qk?`-O7q}L1>9rniitL@;2jb?I#TL(R(M3;-kVN-|M+WXt7XD zk#k_1VS)7W8eVG3dZ%|LakSMsNnKg`1Mi;1mwAR;WW!xQqLZZ zl6g-SYdFua%{aiItuWbE$1%RAfQ!4rl|2BAuW)LD#X`qVS>j<2>tW;&!xm)6L@%rE z-|;j0Zn<5F7u+^JsgLxxZ%?G|bnKUVSoe7m9rU-$ekYkrf&d-#&g-Jz-!tUCMtkA7 z2$s>ERr~v~bWz0$zWmydYq&|s!HeK>rO9BVAmmULavp~i8S34ij6u)EZ@nE6o=j%b zij1%u0R6YxA%J(&oh%bTf7$zVp2rU`ow&QT+CvJ2A-k?EIrq^1u#31}e^gs1vfxww z=4w1=62kQ^Rp8R^1rJhw)P%o(6$o(Q!l3Ky?dprQ^`Nc{!eN@;jMcE7>*1Y zD6(g_umQl_W$p%GT)K&qo&N-Uu@}{%hK6#A<|Jk^+J=*$L|L{lniJRB=@?++hewAsTv45qsSq^X-|C=xy_@A9b zE#O{ZDCM)8F=+L(f4$;ADZM}UAc@IRXA?RL9dzfswSdBOoTC+w{6z=GuYODK(5zAY<|M;1fV}}4(BetR2JQ<881Gr*=mPG{ujQs z59gs@7osVt>Mu63)fB!sCbxXp$N2m7leUA;te@JYz zE?Q)lm>C!bxzs#n`?Kf#QnPlQlorJNz8GKOeYS0LdFxvF z>+jUitNxEIP6l4lyPK1e<9`raI?r>&i2|L`vWy7X>9SaM;zn7n)^`RAaO_ye*JSdITo zwpV|QLF=k{!m$qM-fdpo{w?C~Bevj^hDHSZqR$pc^wgfg zpO0?*?-l>oOLw<}wyEE@)-Sld$p4Gk{F4nl>zU(H2TU&Y7?Ov9gA8*1j|Klhn9L$z z+zkWv0A%F{p{2$~?w9%v_V9s*_gLaQAi>|^u3HXz#XzfZBz}un%lzcLh}?Q$m{PEF zV{Qc4<=I2Z^%kuQqBF#aZ+`6}B_Zs05f48(v1d62Ws1Enegj}KvP4h2mr;OeRnPYm!Gz#0N^=ux) zVLxX53q+4pGnFevrZBKi3FMX^qI3DoL*MM0)6Yc-{pw3y^Q4<=00wFybF36D{jpQD z&f;jev-o0r2u`N$_Up}|-`-H(9Hcbr`Q~KK6A>mx2Vg`R>1_ueF=0vT5;H`D-U( z&9mFc=>lCtGRjN+SK^WH_OOG%(Ln+Na8xF*7M{=DT;@7sH7YsjeyI1oSn!w~znw)m z|G8VShPcPHP{s8%5V!wYZ?lTp9LNd10f;U}J08aNCz}bKi*F7VAUjA>wiQZ3jZV5&-gvBB3r{f+uJ!+&M}zp6h6%n~fIejls4Td0ttdx&Po(J-zJ`tW-wC=y zdc%!S=-zgIcIBo$v|fJ-c&7~_b;5XBApHh^c3Lw?+gLZX<1XN%Q2W{MLg-fp@NQ2O zB!>@c>L?BZ7Az8m%aE)vIy9rK&b%i%5xwlO7s(DTltWQos{B)9U!suwkNepFIJqAd zfe9bLpbMa|p_CkY82{2}AN5oak+n7cx>Yv9Qv+qmD}k{I`6U~m;>dl;<~dP72X~)$ ze(JGX*;60M(_9CvI`9}*{q4)1Ou?uA-I!~_m~qpRD+kTLH1`VU%#nK?GnQj*kc;Oy zN*}b26{%zjEM1;#isbri;-fD%_a2~Oz6{E%4M;`r`t-rW@OJuf@`jMjI5Fu_J16&G z6t!pgFJ4g`lad#a)&nWtVl`Q&;n89;VNf*TLTN&UT=;iIkU8vptaU)a@+S0rM|`=K zQnGX015rN7sImDXpQs{WM{(z_ruIuO_j!&8=kYV?#iU+VRBpyYB$lB7`E}GcLmM!7&qI1zb6;is(&+N%A}dj9 zkFz9e4004FqH{GKHU1BlGr*Bek_XEnP{e)z>2)3*gaO5$_F+G{vyz??zjsOsp!qJG zfdqH)#dz002@#7IIWE1lSg}6q%nMx<#*LG%e7`h@em>+I9s}%TQVhsM7F=~|zdkb% z@?d}a4{v7H_S2W{ANa~Qd!L`5_=_5<{*&>exaqJR2jI-MVbITS!Ikp=LHA=B|76rO zy8xVmIxZ&1wb#P+|I2~sCwI;gY`!qB5XE}F72hgMOh7`g(eXg1&;8wkukTjck&+%1AE+P!|CHp_f&wBbNDes&NOwt$lF}+lr%303l|-9Py>aP2kUjF3$|zuUxs^iu<|R;au?Q z$`yo%%2WB5KBn90_>B)0lTYNvj;B05<;Fx|T&|tI=59gB7I$6WzN1|b`0>I0F1gZU zMN$ey5*k7CYuAa`UIq~b@g-f6SCl7Q`JRn9EU)j+-tjBeKoR~j@s>EgkU>qC<-<0& zH#XjIjbYE^u&Z0(_sn55xL=+{jAmxjH~izHx)=tQ@^~Wt=aV>o3+c5M=Je;o2c?hP z9=J90=VJnkdz6+V-X`F^c zVU_rzL-2EYV#+GLQKOG5MHCe;(K#{tK%o|8SYh7GvDJ9kXL;$r^rJsh4v{3~y~AN3 zPBC@Yv~#Af;k2QJnJm6JSif=03TcKt*H0AFA&fNEm8F*QPvq(eX9}zv2M_nAjXOan zR*+7xZLyW6vjXmzwgD0TB_|s@+(TYAdOm^j&WBEKmqe9wr%hB@OJ&cvG#y8wOapyE z1ls@cJOmcKixgC5*ltTeLEVcfoaa*G8it;cs2?iqc;&4Ck5EH`{_}9jLbjFUQ>8WI zm8X}hvf`hFhX3Pf*t1M5=j=sBchs#>lm4do_2Il2UuW5k=PZIEy})};PN8VN9FClV`%OLjsm9LXrh8_*wP*5E!1-dwJ1TkDrp~)^ zf-Tj{Kh87vBTdSmWBqwvWUUiN&BMkIuyoIT&yee4&Q@!$whp~hK+}G^O)Q+krCGm= z4(i9}VV^B9JKhNH1pcY9CUUzvk{^Uka$3rCglEM6!&1o>!v+sq=pY__Lv#Sj#LF@6 zX?rdO#Xl}WvZvPA1M0_aKH8JqjKbe|#=;EAw#B{s5!_)4eKy0upq9TpOIZT83-<## zpbQ%lH-$f|@^buT-G%_due;O{nqIf0 z9;4(ZuCcn2Anh;x$lG(dw-5OtXR6TQtw%de4h@6tPK-8N3}Kg{)#qr>C^%L z=b2i6rxLRCc5>g5^H zf81)Jls?jt5O*#Ue}?%AhWnsOB1 z7=IvohfO_&0(o0%i}Z;4d^yx*_0)lo}?E&X^*OsMD6uB zfA$qe^^67KW5XM=6ndlEZscWgqI4)U8?)P7*Ye8Ty z5aO{mmlwj3)Y4eF$?AM(e>6Rxb8>>ag*Od7m_z0{==t9;$@G>kT!;c$!WO@!+=?D$+AwlFHOk4s{MYO7PReXL7Y34+kgYb0Eo(^Le~;>PuRX*` zb-JMA8`lfR+FyJeqY=1N^^0NUI^z7x)Q7jIs$WzfDnB3$lDuhJ{uJT=QXFc66?r>* zlE-|{{AL%GTD;sm2{laS+l=3rOR4F_8~F}2@1O^+L0y_tetp}}V4?aSxx8W9pyII4 z$?&nz(PFGj&FNt#R{GQP)-t~4LhiIAAR5BEWLp!B-Bh5M2K$sxHoXQ_+5R)OZD0RK zMz3Xn?bd*x%hsu|9{*I{TCN=|l3z*NcKp{v3C~b+cV>8mfOF%1JNV#4st(oqGHXEU z`~S*+GhSQOW2VR@hS66mzc-4@7*%pD^b>!NP-^sqp0c(0?=|B`$#_rAG|{JgN*2`e zri1>Egd=Xz(Ra8?Owk2#dSZv#r zhyPToKXhbiXU2((P2d3`D6_a;$1 z+~}mb35&T%pBsap|Ed|^5peYzqqCUHj$<485cgLR{C^(HDV3*|u_ffL^bmoPNraKe zEp6OQYiNn6CpEK4LZG*uXB1d)5Mq5rPBZ=c3fiHjD-T%)+q&x?uApQ4?Ad>Z5UG`| zG0&}=)~QQ%?!h-I7BnH}!_Vv(w*U2P@1*Yn_gu#)p=7r~vut z|2*DiO|Yd>om1_0jnfATuxc1)G-__B;9nPfiQa{nr3FsfBArydIBVvdzWRx$I(&ES zKuNEOfCv8vsGGVi_G~~JbRU{~HpE26{V#{fb9i%_9Uh4!rlO*cji$-x^c`#wEmjEy z{HF4MyuQuvmg_^g$QqF243!byyaROIdI$R}oN3-G1NyHBQJ;9~e(+1*GUdE`!+Y{`A(D6QtnXQ5K+nHC zQzez-R6sJ>TXC~>bhiBlm1k}?&HuQVh8Byb#WiD=v_JR*)>V-pzCcyztHG}eoxh5s z2u%bWvCD z0y)7Ip;Jz<7~g&j6zTKd!7*oRcDY_Lsd}bR_32LOoG0z&@@{=&5>TLAJLU1~*{tg6 zo$H!!Wq{>$Z`>FwH-EXjNyNUQ;Qz(mAY=h(@#f$6zaA@BcY~le&7yMj%AKfFR(b%y zAd|25B`agqk-836A@&rUzqMvQFj0TcvKCIyWurIZYC%f0(;$ z7dJ6#1fY{~@9~k2CbucNNdM9PF$1ixCqr;pRM713tUvB<--pAS*P-wOOZ|pCyZWM_ z;c|i8-`!=*PVhkVm~!>)(=xNvC5bq?qoOBzWrZ^}L|RMau$_kD>zl@#SW>*M;Sfi% zLmZZq4{QCD`~C8i;OuNI+$O^h@qpDsGVU_9LUMT#Jvm6>Y@+3WT{gqya!W6BYI0_r zkL2SGMqF2Nt)m3Y67|ztmjJu>@F59x7y)M;(4IyH#s~? zbUB4UgXsHx+Jz%M%}yV%*ATDtdIwb2Y5HH1m(^TA;{rz_O3kW}f z>a*jXnaYrXYFvGkzJ3#chF(}S%GnYbNtqMN`x`amJqMnsw2~(+1iDN8z=gI54T3_l z_2p14U59+lOw-FnIZRHmicYs;o66QxI&75^KSFQ>8UGlak}a@Cmmhj6ANGXTq?91u zD``o{s_jI#+~3M?#!`t{$G#~?H(2I^vYa52^P+I4%7fnC*e^5n*#q>Euk& zmvAa3bf@w()L6H<@QrB??yBo|Chen`u%{g?%9cQa0Nz6$HSdh2Cd!oKnIn9{8u^)1 zC$cM^9X3aU*R@;GdYi9&4+>!2nEk^+etr_kG{>5Wyzw`irTBOUnnVpCr}||M$c?bZ z57HegiL&REAS3n6y%2T^dgn%0=-Emtb*fW?t=BlvRz${#O%|{l0Mna9#O1OhFdgBi z_jDMfi2IG1!(Kp4lo;N8RM3Sk%Ql_{-;o`k!A1-BxsZujwA}DcvzI3D+%IgI$UkQ6 z{45TPcwCYAa!W!EDbY4+>3a7(e!O$~+20KsYfpI$Je!}IymqE$+yWM%@$#pgGxiL< z3nS~Ro%4c8B@}Z>==Mj|Q~2lGzvhB;BdPI~nY)keGSh^tQZnm35EDuADC2 zU0_U+wjGkQ5|)KHMe;Ku)lh-Z~Xm7eWHvZ z4W}>Xc?`dgTXi}}yEv-yxXzuni%*YyJe>1^Z(e`(cBGuif53GVjdq6c^93F%Iz@CK ziK!`3sb6xJSZ|ost)zfc^$cqAjCEa#GN|1-Pc_D-fh%&_ozTDq^yMMr>96w0rW50h zS>AyCV$hspkq9d=&v`WEJ87H$NZx9zTh;7*=*7J+BzCn&Gn1D?$_OwFbG}Ipv|Cl_ z250l2rF(Jr+d<+^$djdbO|JzB+o5m2|FTCSMZ=)~%LQWTA-}77H|w*zmSy|*N09kM z`0qZCYYRVY1*&RdJz43|l(tU5w!P^h-qX-~t7aESekv)o>DigpFXa+bzg9{fubr|m zVO&&ioOlpRpY~-qr=R`_Tv@MM7$*2aD>7!zSa^+RMbbpm*vl>hl@4LT*bpku5{~=s zG%l1-XHu$NS11x;`-ZzUHpCQq7L+RdyhQeds-Q`k+ z5i`tX;zD*fqn)@^#|>o-|6hk-zMD+2uy-$P($5wa-r+OS>=VMqkK5+^AtzO_>I3j9 zltndH$_HOWs$*kB_u3QN$IrgBhXBy0Dm}U?8bm)1-cxy>4e4fsaO z0=;YI7MI9N2Y-4Vw^(J;#ZvlOuqsHBWt`*P1oe6jJ=E$kg?a~3ur?Fn?pjV zc+X=%etYsxPSk|Y+d-rVKTDWI-qohdTz>jtrYM5Oi}YQtS^wrxWG42=MtqGBnu|S= z0+3)qj~NyiBOD{~XHkLPm};}eQNp`?Y!Yq@#eaNpT$Jbb!B72?HFV>QkS-TL;RZ0obBS&Ouw63ba;H?iXjBxsEyRRnB|Drj4K>FAI`LMAdQ!hO93(> zrF9Qxc+^1-%mtjLBYD;D9Ptk1+nIffD^7|qElkZ}yabzci)G-;{L1Z+jV^X-U_g9F$v<)-4svR_{|<#f`23nE_du7w zI{JOQnz4!pf_e!BXR}^857>K$ALX}G-ys@jdN5i`1-V>gN=HxQ)V*js9 z*%_x!cLJ($&P^#?ru}^Kkz01F4Ee=`A280xI^(+$|H-&xt>AU{ke9YlvcjWSc9bNzC{$Cvf(A8oN&x>dP_G+I)}!roZOIfrQfVH>#y z2jh9~6M1Hz8GAF3|Cy?p8#a+J@~_-6d+yppWZ1zN;BiqGe+W#>c2LMEzWP@qfz4K9 z-N-%|utJ!5D^Bz>`i9*6>0*v8^Ai6Ouuqs&aZK0|Ul}{cEcx}kux_Sp_@y1e+d=PC zmrcJP&0F6dKfsO4?Vw9Cc_q@S@nEb_z)N+3OYKQZN>03|WbM!n#!aOjLHydnRSLIx zov_v{@fbF|RL4r&{bDn;9d6n>Lx6`Bc6{$Q_!QkR)+kmNx0&k<@!QWk?Dt;PZ-V^E z4$kO;CMNfh7fvDqWg9Yu`;fisOgun0wpOU{=lqr;hqn1?8*K>~(28F8ko->(JfQC? z^I`m*7#<%|Wa1AFFhlxRDXyVORNM$sE(EYS!4A z1vsuiWs1JYyF#8O4pHaIOihD7x=X*4-!E)^bXn1AV#a;#k^6b{No9^<5+^;hoEojO zk2W-32<7+BCYMhY4;v^RuOwm&t}>X9a&eDg&(@!9aOJJRXY|S1G&4t%W3A2sYh0M} z&IN=LE`(Xr18>QWOHRorY(YUokW?-$DQjp#g9xVn|};W`*(r(U1=o)8h|oG zRNF$)vFme@o3j!vT}$3XhCZ7 z%LJ>w*Q|IMw!sf!-nTVjNmTid+tEmIrQLLETo<;9CYo`Jrl|3?Bxs7<-Wrv{hC@!n z7Y3f(@tj}zho>1isPIHHDv?_9!&7fOiHJ%O>b*x4eDlXdau6GpoI_OFA|XknCPUvK zu*p&)jVD8FRAa~4JQ(%ut$br0WbMU&k{NZxLE=J(rN)M(Q1w({PD^?v5=o1Zx zFZusAh_(gumAa|Gz$V@EE6XRCihzi{z^@J_iN}tKNMRbD<#5M;hEKMf3hn-*@&FT$ zn*~Y1*ugsxgC4stebm)L2jxKNB&ce4MZ}q%?R(uqeX4EzC8}!%?7CoVEBGw-{N0?F zTwWe-oIYp!-9ZcvQfvIqv<-OKP0LcX6je5TZY(vr#JB5#YWlO!uNzo0pj3qqBGD)G z@p#(#Pyi|vr;`MMQ*sg|zG+{4)<2Im{c32O&9L)9srT z45$aqGveH5<}qg|_f@4E4yUr(vh1Cq!1a7&LHquWDTlNs^&ogyY|a$*R3|;V_?%dG zT3L!UyIf_0E;178oM6Xd$b?i!(=@-ndL%Gk)UD+^v?+tXS?a0KIkoZ44--{CFjqzqlwUgcd68@XG=znu*BsxtN-reNi%x>wA&6$=Ms$m0n?p zS9Xo3-BB_uHqo99a5bNl-^-|8y?4QRDx`fDzvLI>%x!ciglG7U-s* zy1Vq#r+(b`)C^l)PC4ZaORtK{+ti|amfjAOoLH~QK3IG1sdS5SX+na6-Z1fU3{?{_ zejO=^Xmpvk+_cR1(O^>FAC2*YKD5v}eCmOw=J7~1CpEf(3L)2ULD`V%aR=SAX+8Pq zCw&V@1RCW5HK&mEhD{^dQ#J7`;WH40i`tDhfwp2Ys5JM;VNI#t2p$Wk%E5MIxa?{3 zTEQ#qxkeeGX<*4^Ta~f@AachbmTkGXykSxls#77c_@O1S>4%D2Is`fMlAn6>*QAQe?m<7UN{f>NbWmy{>WmZUx*uZpSa_PXg>7RVUqUQWxsJ@ib zx)-qY!s*q)D9Gv8n-k%g$suOk7!P{L=>Pkw_yRp{N96`9ZvRIao#+x2Rc)_J^I3?< z@j18cLU~QQcDx46Djh#i6&9_MBABaH#fA%*`fj#2jSKl-W@6SezY>FRZl-%qAu^vb zzc0dF)%xMzR^?~7J@*^9yUB{(NJQMjEz>zzls}-R9Z{maeGt&_Ru5G`eujVKROfG4 z?W|GbX8JBqtkjA@?do{mj_m&IwTnZ(>nHY zYziB#Ct-%gcEi(ZS{(AG!0o(TcQtn%508##U0QEBnN5kq=Wiib z~eeevJ2uS(8Z^_-fe6geNP_xg5RAEmu@Gm=__PS_J z+DuF&PVcxdM={TG?)xQ;MZf;|C$~*+eS7%MKYFIu-}HgnVHuus=z&rc&}q}Ml$>@@ zu*{V;EH*y?2qbmXpf;^1qkkEq)Gc_PWKFr#ukE(g)M;!=UlTXIXsZQq3kEWuRI$?@ zMkctN21JRmV7uZV3wA2I4O{7Day4en=C;aIyEZw8Freuro9jp`+Z9ivkPbx6K_F1& z;)MRMj3p12Ve%n_Ykt+K6sLS1nVH`g+%VJiJLyB}1Gc66l0ycaX29;&tty^R+^)Lh z>h9t9*%#UO;|>p7x5cYG?I0X&)=WP&y=`S*3_Bys22f=|iVua*_k zojG3+?&I+? zZ2ZRCse2cS$;Al7j&b` z0J!_U9$uAQ4t4fFtZ+h7LF}rJN-G}_Rlm3~=u|uA7-T`oDW*AkqWS7_GWYAS^$m4o zuojL~wYAoEpGjyn0A;wc61MR9~_wGkJNMqzna})o#;+p|z2m zz*d#!MPuzk}F#QG!sn+zn@IQ zUi~W24R25V04#QR!UBDn#ieWo6}C=m{29sEcE52>^b_Or*2J@^yPbW{(9QF_7_9HZxu1-5qex7_yv_Gb@Bi20N-?P$H!c-(c809C-JY9=ap4m5l zfwQM409a}_bZ1?aI`|O5&63Y_kahhw$8FiYtk~Y3QQdhmD!ZDk8*R^3feIf?kRQJp z+7V~PKJoe;k_%kZk=8Ffu$7_LduqvqE=YY)J;euW_}FV_v9{zOf!im*KyS$w?JsT{ zDL8q3;{Rl3m+rm)(ty-LjAQSQKhd`j@H@;wfWv%@tmOkik(q49cI6&hRcP|!Sb>eC z?8Olg+KHM8>(u(8ySZ$3)go8pUmpd*)CK4S!#{LWU2>jz8YvbP`rO@E*d(#B;)Z`w z;h*-kVGr6!w94Qh7WQ9n;E(w>DOyG^Px#0uMb)t3V~QwCazOqjKA8sl7;zla^{)jo z87|YVmLY?PFzkF`y>L)6*-V`5!R!5WX9&y(1)E)7Y2`Dms7R8r%qyOs^Bgm=v^x`A z4Sy2VYHxbH;gxM`yLquO!f<`#xuxJyH*x)h${0SV*lx7^>I*U> zU@SC~rT5R6H}L}d{p8H2z-RKWD7Fyt_6oiw#*uNk#15O}eteWf-2K{OrKR%9&461x zvhoiUIMyL+o`R0&{0GY8OfgxqIUR--Oz9P+1ov1H3-&c$vgAk_|}EQP12oVOOD9$z~f>s11qtv zvsLKk0MP%Yseh*us4ngkp-=!C)?N)Ru9pu)5QfqLg*aBpBn(XuOaXeldEZxj(ZL_K z5sM!MV2FwLyoe(Pf%W8O4H05h^MLyyBR-rAf*~fvS}rnK{a@^>I~8jQ!}6$7KB)N9 z396K)FmJLd&3Q5DW(tSxw~RUB!&>fN`&lA)k=$QbUpZ3e)Hoj|cuk9qK=%xHLZ^|f z1FH+X)Ixk?cKRGDzS$Jzu+go%3XI!c#P@_X8gyW(j9yR8r#Zv zqU$CuxER$r&^97;G=208`jDTE$*kVZYKqO`LqDy8PNQc`6t5^X+as0|0y=d0d#)gr zYZgp~ljpXwc^*oR@kVU9f=bn)JDS%X03&{f`=rmWC~!2B%372eK)*V&1T=#jt93nu z0ylhqhC2U@4M;4VV7h>8lIi%oocjKMhfh&Brw(PUeF_9_tgG|Bdeh;0l0R6g|7QdJIXA_lB{fyO&N zU4%^MY|rN9kNCJxW6+|{z4-VKYhI?k&I=rjG8M6Q`MgyTDBI5MY+?zHlJiT{PPM96 zT^Tlbo(yvU>Uld)8|9LOo?0T z+PaaFN@B;q>N7&@B1OiAUT)Dxe-PS>$g>K|b?1I`^60PwSEpe{hKo7M(-- zT!8iVEw%ylL`vk1Cn_KEsELVgGeeqJlV56lMah@Wo}U#&r;tbKSv0DTM!+v z#%Q=lWnzxNUvnpr8HzBPJ?{%(YBlbe$}kq3jd$g8Kcx^9KsC28rA28rD_U&`1C?tLN>yefzC z<-49)yQqN#SnsTj+pC4wTO9IgMTh?*$LA^i# zdcs$&E@A>%_!$SY_TKVoKFrt^G9)JIWrh&d`Fo3aAJ9J`m)60qx%W_(@IJ<@1uL>1 zshW0U-@iRj4oP$p%itCH;GqRpt-Z&sPgV{O2-=EnKA6nYd`y378D;7->YYVg#RP0- zLFX@SD#e|3P|Y0N6UL`%&Rr=;jC=jSPGorKyV|v{XAvvrA+c>OZy)x(01tX%pf`ta zt&y+HKZ#&j3BNV+p0ir(kWC)g2q!oR-U6xO>)M}Q9^AXwt~EhGV#q3k zcbx>-Wa)#dBYCO>53sNn2dBXolZCD86v}QUJ9lP&nR_k&lZ+&Vb?(}d@;QS1XCFO9 zKYvaDZT~{>WC_Nmhw$uvwc2s&5ICgZzNy%qm$Ebm)WAOWL@@P+1!|kzU+PJP^cMlV z;=F5T(!O$w@2>>Ijvxervkh6}=U`nn>zMK3L#Y$`0NC*ZDsU}S8i%;>&n0+20ioZx$ClE07A+MaF(W2$-JcZDoam5A|$6M*AP!j-L)9WF9Lv z*W!jPJkhUP=knWX0J-+h#LZwg$IQ$eq%9PnV;O!83@$Ec0&>2a*yD1@OvKEK;<$Ub zsGSJG0z!_>lfj4ndeL7gxljISQLo0q%aAxdNuvq9a?|aGaRYtX&-k~WJJ>F;-O2wl zP^;X@o5AyDxwKf_!4{Jnrs96>E8Vs2a{~U}8%Og49%^9oSl;V4TTSx6_Q;&Vi*UEG8H0A(Q>Gd=hnYF+fX8e~mT?|oe!vD!5@{sr(OZ}#I|ANSESXJrLU0a|FprYgI`Y=3j95qWhI%^TW) z4Hj=;E2B~RBb?w90!f9T4HHzvY7VLJa1MJ+}_P)}hoGwrVIuLP41@7f3G3Zt_MaVYu3JAMh;k7Jp=87=nm-x+)e z54q(1*=L`UuO$zEC4Qe2kGUoqk*zqGsiY`B9Zs|==+W)2mdo~VfSb!A-5kIG=*|uC zmU-Jxxhv1}8~H=72)-h}X4mkZUevH#*pBw2!goW8mIDklbeS+Jj~wrHm#n=zLGb(V zKgr|XR+b?o=hj$>R@+d>Zr#z)$=Z@Uapd%FAPTndUQa#A5mg4?*myPHdE8PZ$Ls30 zpE@VKAUt_XQf=Y#A-`;QC}EyP#!#U0Nz>WiIoZXE4(spr<#^Pak03(cUz%JxqvB%lZD8a+Z1k7)PauxI3*^nSUt~x(JnTd(vq}!|#9F>n)(Ps;^Ib zb-*LrjHyx^rv0APIj`w1Y@wYxN|BYMY87t$9&m+z zjLioMbnUCJ@4r&2KBbY*Gfc@_Hbo}9GZ^_mw!>9DCAr8PVvG|x#U=8XE}WBeor=n= z0(=!lmEIf^M9|?rce%#{_e*Gp=T`ZUT9tJFIx1Z5 zd@X02%|GQAZH4t*1jGSa^PjBa#4qF5&KF+WS*r-HOc_CsR=eFC%fZCsHF4Q%1mg4O zUIrr!cc|+3>c=ghubYFwfCk5@zgcGaTYS{q<%&29=egim>2HIMmx+b(?9?zmL+xp7 zlv(s?tS35bn7F^lNctkMJApD2vy>mngkDq58U3&WtbhSd?HyzQYIe1Tx)Dbh><>7p za!MKDovTN>Hehm?&fXK_Zwa_wfXj1pI%JkolyD6Xpql%KV89ADo3luwV^?n)XHh=HA z02Cz%*RM0;zNa@vikgYGC`aG~Tq185_4OQcUp^(_&5>eLiwmo3zhy8*j?Wp~n2O6+P%8mjG< zv-$4XowoU|nHb11*-QPW409raH!Gp*Ip2t6VL({Or_znrPI-h9ZNyfhW>ll*Mt6yw zJSwXreD*%#B2}=*kupVW(nSHbf)q)g!<^KzaKgMlwlWRMXXR<6Y~?i?PZgn&#^t!& zmU+=IR&N8}3nGrhOfKZUI>kvZodGyuKZq8R$~bS}y6|ll=e|@emhx_a{MJ@4xucPZ@)hw@ZCooP_Nd@RsGKx9dcg9pD;G3b4T|YkW{>#e562rtVlN?d5 z(tE{b^(*s$auRmBE+gkj&s!nA%w$v@2q}7Ln3UE%IS@Gos7r6o$?w>*{!s${i9pfiNx! zwB650w_zm`@fO1W!nSOxxbrcb$rUsnaITZd7b~;z+Iz0n#I1`1dSLSB{X-7v=RCX^ zD!@n_ecUTS}DPO*so)x{=4OwT4dZ>y76Cm`mGv?;o|)$wwIb%YY0|${sSa%kXuCpW<*UWOi*0=#!^$?^nP;V6;GhKG@2M15 zQsN9_h?=dMthmc`kqKr`6ZY2GYrMuN?+E@0f0Bg!Fe%s<*_W+WvOB6E+ZFHGEY3My zvTvzQjnHwQRzl>v3ns10ZD$C*h0>q%Wf+MCCvX^7z&?7SL%Q(J0dkib$YHfVRh%m$ zU?~BQ=WoK3#L#hVg*-@&)qDG&ipGYpq_gr#RZ_BV6I`r$BTmVw-6!@K)4Bz;C2^)r zd=S7;?j)23J8vJw@iOw`T#9s&%-Aj`CERZkm|G*xm-#yg)F|c8=K%(X!_eJrKvYN= zNms^X(R$o643V}!C(#eKc?I=s3X8zvb~S1f7TT~McZ+`o84thx@VEEI)0SYwOMiF3 zxTm4Zzmq4wlf%-kOk`iX+v+z(iyiWA#Uep);rPYq9~hOa-A3i_u)aEFsw^FX1Bk|3 z@0r`<^Sn~3ETQwy;)O(YR=x-c)uxiw?;#u_M1q9fCq48RiR(>6)niv|#iX*jQjw1; z4)MKb*QtKhtpXyAvBP_QJ2fzJ&?sL`nSQE){Ki%y;;Tt<`XJY3*n&Z)=&ip?gSr(Q z&J7n}{1Zyw%NwablWQ~Hoh_3Dgr>a}R6Y*);kI+!B+s1p`)!NxGBY8zL~^^ldi9LtsWn)Da&5Y z15&k1OAoHNdqFp9X5QGd+x1x9sxN9$@=;T1*qPjnjE|MeHjseW=v!vg4r?F*uAY(q ziEyT?s1emlg{aG8W_i>C3Xp4fdO@{6drI=JC^Sxa{GN6cEYZ>=Jx}5euhV-ecARB>ocid)2b%ptxK*J zC7u00ywSB^%2eGalT)Rum$Th-plP>m-obbJZgJ8F?~9jb-TP&>-Rtv11iy2?piK4e z*he`bW_k@*GRVco1tjmxDD&+~{9USL#Zq%Q^fbCo=r|nPMT)kS_*}3K%gys!%MQmw zeqyt+`*FC^>u$^sCQe$68rMh?Xr2%&SdF&$lS`lIX3WWW%{3*7xL%w*vkD|@+AK%F zJwERb&7fSy05$-_&Ugb?OZx)G>|%0knyw9T4)ER)muLLjn_I^t0)>h!fr;?#Z6~QF z=i0W>Oz|GkL^xX8W=xS9?%ReE)JL+-k+E^xa0asN3fQXohiQ#TMgRR<0V>I+Xm~Us zWGwOGQw~*GN!p8wB{=!YuU}4nl%Sm_@nXScq&w3K&0qO&F0+;}XTPppODIWCeV;?* z%MkU&3Nb$qqtEYmg4ez+KDi^?mJVqZN36$|Zt9JfkjMR)^&jpFQ0($HJ#4U>&4uvz7 zUnw5=4B#YGW@fBp{a*lT)gNBh_w0dbV^P}L*jky*IRl1`IE?!>8vm^L2|ezFV>6ZZkxw_eAZK?n6+cyA6};vZ^R9 zs-4CxiJc@%BZ~m24{)ExbB=3oE@e^4{S7H=D(o2&D``#+EwTC;=$~HxYU$Fs9`w(% zBfQsg{wC3CPanUQlK4lI^9brtYZIysT73ai^x@sjDOu^R{0J0SOl5Vea_s(+r4}wl z58R1Ms^FA7bbTn~pxcq)e)MsH^_c?*9~;3fw*$OarSaEg=>0gz7T%Ml1uK5YQHoU@oT4BX0_VBri%F1(-ve%%wX%$FU)zf z8TA}?78Tje7Z9GhP*q|z2JH13nylmiI+xQti5(Pr5puZ?n-8NmzB&(VHEF7NthP+u z7JS>uL89I=ayLmA@_2Sa^5!i5erze|a*`37&bur2v>kS}(X4s(XK(e|Eq$}q9P00g z+O~W(l>7q=AN)ysG!&Z5w?9s}phbg&uehtvxeX$nx*KYZ{h^0`-AHHJGdm?%QiWje zYUF4uB>o@ zi49%_TifeZ9&8^v0^rsD4;K6OJ2|lZ3Nysf3T>C;wOK@vx?50PnJtx*DtDB9r~YE7 zq|t_ZCL?gew(QQY-QZg@ObB3AsR_tsAJlTR-+}A}lUc`bR}s?79?Zwp4US9G)9+pc zfBm_j@p^&b?C&CTS0L>Q-Nd)B5)o4G;8`xHj-KeeKO)}U@Uv$oSMTRn>V$Hxnvm*d zJo>s9eIo^yUhNe%xR&4vSB3&Tw`O4iH`Hpx8F+Iby9)6+51oC0vYsb#-kB5Gs$c2` z+r-IskpNL(HE%8?!G>gpNiHQ8W%sMmFmwZ$_A^wS&a z>-l;X&%Io3`Mj;LrhSvdgnsTyW>5wEGvT;G{OdUGTxN7NOLk1#4sR9owsF zjIZo7z4MEXqz>x)xL!&fFYz`8&|oaWRnejyA^UF>ql5o%O7%0%L&2*Vyt0CmVh_Vd zB{bSeYDa63PCHyb3g&u+C#vv;c(cE=!fl@s=sqo0W6W>D-8$6P1?C^}>1&?+!AQxi zi@uG3W|Z*BvjpbdA#|sE#-QMsz>0F??`imp8}Ny$q=CY|#5PU`IvCD&w|7pH(Uvle zTj-6Hp2<4KCOolN{9nubN*?n6H#$~2ml0D>E>D-pUqIs=rCL&jz_G3w*L`u1i8{pV zY`xjn`_W>S8DjA1$IZimjl1pwXWb*FK5Kx)+_tV-vOk=l=_ox*KvEmqZr(WsiuIV6 zH;M}oD;PUfC)N>3riKtbfZ60mrW{q3Ty?9y-|T9@^yRJ&jv%h-;cqx>j4PzdkZ-VT zVu4tb7cZ)>?Ik5*N3A!hb!6tdPpZ@tWB4A-q#pmOp_X~;Ob9ityOR;ARYOUw+sZA? z41xOO#xsJod747rdjS7R{#up2_nmux!rlmspVaDC1B6=|ThDSuKa1|;j^-*gkPA>o zp(FB3%sqcrY`qu3KQh7lMcW>CDfa^FfJiSjYV=yf>}aKZLy+dMLE#o38BV4(rjcJ| zQ*s5PB!?zE8luq++rYeN{7fkQLy)C1I7#W@U$5|!2$|ve;|o`MGjK$TA=YbNxVz@s zVN@AScEZJdPkcUc1`w>}!9nU@Ubi1@?vYkC^>o9p&6VD-sty=7L_an4G=f(>F&9d2 z2CqMned{~E8GOqBtq=wXqB;FWaJicS5u8$ZW2|JSP>WsJSo?hoy@U?oqn;P{A=dIEE+(iL~>M4pfWN^jpD-i{a|Rm|jx zP*6hBt(q5anG8oWM#>4*Cf_@b%C0Y}~D&Wx{(3pTDkvb@3>0Zj8*6HfN4kETU6U{3e$nFobFGnU zS?91P``<@=+YVf?bNYZ+P{DMKQU;)yB|FLQP+($e8HkgRSVDN)qVk<6K$9K^)2DP0 z)9K^^(Fn?H#A{>zHAU@|zt5vunyI8nnzKp@bC3A(N0~=0NMhLV;Wh+_pKLEJ(vx)XbtrQqzzXJ8|`PxHY3rD^~N2;iOro zhpa!C2qSVr^C^gSXeD~vPu4%iuFOs}Bu&!!A5IhP^9n~i603)B1Am(tk~?%?CC>1k zaxR+hbQq)qUh(pph;_N)J7X?3A7Qx($4{5dQ@)GAu@d_ooiYU+bsAj1UsV$xoWeDX z8rWtGb^0{y;#lF|f@=nOu+)l*%-*7Wqyj~zo)rn6l%S`|YdU}I0~!5*;K}nJ*$V4G zBVW9-V_MmNn0s zZdk@`h=l(5yI+L~M;iu$Ri zQtNwFQ<}?UpSLU3-GL~X-)Fy|?nO=v1@_)c>&{CKUDY~JG^S2HMj=KVK{DOhu;?{v z8zN#88LpI6uCq@#GM(gc4<)Xl%)^jwAjF`eXh}vH>;OV#eN~zq!k0BOe>Q|bq@T;* zk|OrgH{0-yxr4Vr!rg|OMs!GUelm684?ihw5TjEc^Y^LcgVERWCT_K6PrBhaooW2Yflt?mkcx`JZ^|cUuXZ;>nAWtCXHSF;7gThPmd?dpIiu8+oUO&W> z(P{A`UaQnPOG^Tp^Qoi#r%@BI)tS?bewP|=ID*q`0LZvLU^ZZzsT5MdWsjaeEPkW+GW%5~;%6Z0_CZ{Z#A&MTO_f7`JG!Z5;{9V}Hzid2>4}gti!uWx8%&e2Pl7 z`r!jwrg!EBFe^-fZqc#5c->K1cb@SjKrqYVFavx77kv)$5s}6uPos%n_+Awgs|FgmbCP1Kz7tXp@c|115_{Za20my1XnQ8zO&5BLA}fGiIqd?OT@`)+==6 z+jRW)UjH5@6=$0jWkeD8s|dD-EYc`rga#bP5R7O(xFT|NCRWMM<@_`Ja4i0H zfXmF_njgw-eSP}CAl-LH)uj^S6E+5Y{mf?+Bb!;2 z9uyQgVmxVr)@suXL1J8=EL_p(fP*^m{%!hi)(kU`QvSTA=@q{EkxRzF8j^~ITltV5fvj~jkvb!GY{XQQBSL*KmJ1?$YzYCMqKaEo?4oMx!$ zpnvMSwXb%^k&xl-ca3SA7NGTF=Ym&r-I4lVXNM9rW%lk`lI-0>$Ms?b2-*Zdm?tdQ zQ+-NQm_8MMR3{N=Hh2J%f!<+(`;{>_1)U$-qiT{Z1Wxv;P1}Q&W_))abt$-LHTsWs z2I}Xcyli|=#-}{}>+T)MlA=_RE=~k;z4>c^_K|ARd}JaV(7pGCuQRf~vDWXPW=1#b z)CMFvO*JAbJroTS;l-U@)5_B8g(X#Gt(^#Pjx2k3<$ifv6N;BJ_4Fp*3@xbLU%s9m zB4ATrN?wUq8=ouhLLOjC!acXdR*Gj+pN{4Rw&)tfpq*8#Pg}a9!K@OSCAl%TPU*bo z;$40bJrsDD6D=!gkN0Ft6bV0ZX{bKPHEn#Py#=^ozA-rMKeD~fbmaZEQtUsZ&at?D z%=KvEmOF`z4QO??*aY@K9HsROfPm}jt>*Sj4H|3gXXDnRtxUmMoGT(FA}Ru1@UL0U*R@#CF4@8XCDarYmxcDRJ<#iwic(JNXK_{QFZ>uR?qOiVd_CC2{R-V=Lt8xG;Md80GLxV%z5>O{ zjnZoVP!t5&;W-XnLD&K z->Ij}V2d%9?>0YH-=Uhh-lw9Dtp!J72^w*{QlHK-KLAMdGq=`jtW{?XWG1D4-zzic zQ)>#fQBh$*G)O$KaLGl2c!89 zc&8$37YD9Jb9K->Ni0fgUw5Cy7bd-0jGWs0;`#U^GIHwbE~~K9v4(rL^HC{5R|-52C3n zm{0ABWOAwRSd`3t+(%Y=P5DfjoC3>%J9K`#+N@CGcV^(8grA%)g-dgKW(xOlJpyd( z07>J|O3>vp4VIdX##O$Ns?x*F*Mu5pE}_HIDB1mAXY?$Hq;@QpbrtnWRM4?i;4)Z# zjW~_~6^39QzgU(h7-gKJ)(i$Iqt-ov2X6ybAMu7a` z@P?8K?Y&FEgCt;Qs5=0w%u?5bh?_4dZ^DLMs9L_@*kNlNf%0lZB$vr1@9mT@K`V}f zK%nM^fB={rvGyaw)9KnO`C5FJ6mt5x%*vJ1T+D05vRjIe?* zTnfNeSLZ@y6TGb}Bfeq1LZem4N|rzrCvK|=VE?|eE9Tt(L+{Z#Fncem*EL*y->yhY zt@i7?fQlECx_sr8>8l7XtT25JLT71;zKsrzUv(5Z;R%-#=vWi@x93>JxASO&<>XXf zL=N=+=-8IBvcj#>mb{s6jf*QlMkt5!O16UZZDjhaE_>Fd2)ml`KIuw?9YXb?6$478 znj}QuZ>vcyUF3O+1*|`)O(VqB@GWDB18~gGf@Kk2-dtE?M`=Sn*D4@egm(-ljw1aA zg2UF><#Xl<`h z=`uyo^>4nTO0I52H9cZ&!@jOf%lR{elY=o$AeuiiACZoU>q{5G(BWyDwABCG1~z2{0L5bxIkV564S3zEf>FE*u^4n9xhf zv;Ekm8$r(ajwg<-nTqT8X}=fC1ypGNHPm}hQ6(EkF{wEKVyQ5Nra9N7n5@nuTfe+^okarI zvb->8UN!~US~)@A`<;_wIhHud^c?<2U7v?7Q&9`Tfp|^pZYY8=t=}uGhp|7s6J9fz zA}vNG>)+OGHtEJ=z-{F-kT&&$z&+aFS>6?*XEl`nK8}=)u0%S|c~Ovz{7|tu-c5Gz zekscd6197w#6fl$^AK}Is9?bBg@>)XYwyMB40l7Qn@)?&rkq8{XJ0HL1tn`|9%>iC z#Qc5<2={jGos>2QJ-nk7iuICKNhCCOr^#dD^%%PMi01n3eP9?p{#5AJdvK786VN`} zWORm4q zFy>rq<y-spDCQs5x1jK z_O~@R-TK5`{qQ=Ky3e3Tu1jfcdTa--`MiXa#Y*h%kq(Lf(2YJw1M~Su zbKO2YPj1$5s*1X$Igg(qfUOv%H6i72CFkJdlHVYb-J3?VQgIT5Q3>UF%+pa zf0V)i2PT#Sj)jA3vI^g9iDb<*qyf=JX})q{%B|a>iN^G}Mu%ynDx9F+@X^WI7f-71 zB7$xj*eLTmylZ3dx<6zb;P=`RE=G=lD45?_&2YLdb5QpAD**gZBVUwStZxhW?Uj7* zyXN@l@M0vMI$>`x@L#2MU~65f>UFQmD8x=Vfw|LDz;u@S}b@bfy?|@u(ph}kS*CmH&*1tEdCz@D#qV(JJLR>EeB7^YBlO?I zxNp72TnF4W%Wqh)m7oBkQ?&+gKrvDyADLLeF@*_+_y~u~NjVPwe#$s;Bvt}+> z^RYNx4c$T6Va;ijIX=&Id}(i4i5Z|KME@Z`+B2{^tn3+`Rl_{Y|1hd%@(@1llMejHOC;DvXVr{f$r`4 zR1t0KSnGYsJ_?gb;ot^~#fsjxsgD z$^zJtPP*5Rtu~bXk{ghVe!wRIW>;kR&y5elxF4UjHde|?n&8uTG`62i$%fLSAd`Q-%tBkIZE87XkneXR`xnHj2zOu(S-SBW zjpp2<5MpKJ(@tey*J2>B^{OQliuO_JYHtVL>6@d&R$T6wb)lVaW&YpxUNCmyQC1!d zxs`e1JOq1K0)*vN6;n+o_4tH({A7l=9)B$!MO8RC_nl4qt{WVV?tFh3MAVs9J@{2O zYdcZfvK^3*jz1Fib`&GqYn6?wR#b|fceg`&7=B88zcX@>a4g#W&wj699r+&Mk} z=y72-t7~WiY`6vl`tm87km#5P!@Bp}-iW!4J1Yxb6X)H7`H&W1Ra&-sa>Xka8=<|B z^~2r*Mx7q=M4xFO#Q-xJP@+c1p|K^ghWVk ze^`3cm6kO0PHjh&Nz!cw;i+MAu<@NB8ns!?$l!Zt5FG=4@%gy~6Olaq6Ul0kk5AOa zcFLv$WV)|g9{yedz@R=%T#&xciA)SYRd-(BDyg(mbLVSSPgN{1+7b5%U_9`GwEvFR zfA^c9&b02Wv?Vm=6G~k{ZhX(WJ{MB`%JJ@k7-DprA+i40;z-%4Bf{FD)JC{ZHoy9- z*h(GsZL2TC#A&idtaRG`;9y)|%?@n&L~?OHfh799H_L9o_q4;VRz;MX=F;1tHvh;; z!BMi@462iWLn{8!6v&5MNQed{bdSYG`!`Ti_n({@bv&4S=1&Uu7gCz%n@J{nyAO;W zgcZZ%<5REO@JnG52Q574UP+H@zM`2RV0rVGC;Nx@eL;0PH{T`3_Bu(G-ma;WKHrL6 z7j@{ep2lC`{dGRk{;mymWW**Prqd)OeK zzxh$u{Rh*}7i{v^+g6vpOM!du|I$QMzmSJssiEw&L+NcwSjM(dsYNn&7W~pqjWG*~ zY-^piT7vGj?&$gaT3rWg?~iE&=!Xu}N_L%HeM}mT>TbZ>;N|Giyjq_a=!OHtmkw)y z9^u@ z3wkiyV)X~MjOx)*(y=40i&HQVuevQg)4hvsaK-9K$>}yuPR1{JyRKo3(3d@*?O^)+ z_giKAjdTX+Qy$EV7U1*0hP9&m3($8z;i&1cKJ5>en&ac*<0hxn67jDif5;Il{WIgR zS!$C+1>^J;olX=NQy8)xx*Z=J+os=XzUh7bE>QIatjZI#o2aiE`O-GXcg`6Q*}09+ zvo8~-KtF+`kfY-M4+sH*9eMbk7axhzv<}A{vMlG75efq+-#X9~zFv#(H5X!w%e`sGW{ z=rJ>0Fv@>Dtw~*mA8625zQ?klIeuBfbc(~daTau5MtHj9e}!}Y3%6e!dmD^LrHnVt zH}|I_(*Z?dzt84WbXebzuexQBG1r7p?q{>X_Zv++z;g`C(IM%YvqAq0KSpr-US6BJ z4;9Oo(iC~9EPEVmoO?SyF?yv1-FD9{OOU#mzj;Vym(-(sF~qDA9RxLKq+YO-jpl$k{MaX}VxNEBxuE{!zS%gu|K)+aAQt_TChl|la~?q|Oqj^* z8PEMXb}g0dmJ^GgCb!}9rZ@E%O@5)f-Ls5Y#~!pa%2B6ryoSc=>_$IG?f4SL>_3|H zYZkcvs$BQ$QH7?EBP1S3e?%W_T6oRRbvNV`dieKD_;+_7e9eVkJ~teWJnPWs>IpIF z#*k_am}9O`i`};WLI=05aDn8&NVf-OcZY>{YUs5zETp{W@y`cJY6&sDQywt_ys;`|-jeWcf202^1#Vw9s(k{Jw+R4pP z>E_Q?f;Pz>M!Mn)2g+LakdfnTwRUc10w(5jENf_!8&M-oErRK#WNuZ2H6z#i_C0b?I$A4i z9jjnI918jH!ZjKao8?pByi0nwUp`vD z$eLCXXnNskWIj#5P*Cj{5j5WcDSs15e|BmT-r?dn}>`azV}Jz zOUL2O2Le{uO_&YDMhd6GsTt&<9igiDsXb$3)y`eo=ISikdfIHqc7N zyGx2tGz=-qM~WI_gi}oWG_xAeFE-Bj-%;JCOTMro*>81(JWsU!;)TJ^m&_2)8hfLsdm# zX!m!+csK5+Xyd>aDP66)X{`Ayoq}?xq0Pa+nND4&zQCp8_5oU>x$$k4G#m~=i@__7 zHf%MsStxe??>(&M)gm3cEE_?LA+c1MxA5hH5w5WM+mxJv+vEKaUmZ5u8>OGI?{|rO zUT!hh>`o6r)zNMV^%t7U{^l#%`b&Xeto9(MFr}3lOLq|MzkXkKk zeeCLeK)okTI=4<$Ndl{xy*GoI(E#$Qt{{`)CLr)Y57x%a&>VP<@f=|ey( zq(46V(!7*98Pi%kHhVfjo9F3odf=apvL0n(D=~USu!eYdLXsCdJMQW7Y4ms|pnr<6 zxx3D}d zlqQwbM1dThN0=`43$pquh+N;B?*MczknvrWFqiPoD4r|%XKz(VXh(7 zl3&&jq>pl@{G+YUeqy0i z0jvx^@2V9J7HGBOYK;Fu&iQ>;z&3-wzEzT6zL8_ya?L5(CMvO_khUV1&hLXjm=Qep zA~Nh$-md|uT70xj^4QbxlswxqF#@299_*YzisUYTa2r>7DM=an<&l2Ft(R9Wc8Wu= z1(y=D`^kXu!1k$BrVK7#k==l;^-uxiZufa&ot~rKWn>N2WKVXHS1@RdoeHB>rd=a4 zYfvP5SC>Pg2HR3+MVG6p)ax!8fmJt~4I(MuY#hP1 zJEp)M@vfg#?wg&14_(I?El&T%D!qx`{2GBGICdpAT5fPjAq{C*!`9&~SH%(lb_&**sCOk*wa!x6 z&q{~KVBF@D`x{D7w6{5hvI*=b`zVg4zR2NFjCvy@p8<22Y@{dqB@rqzRMJQ4&WKQPAdh0 zYN%6f;jFB0*CT=#F5ozM=_IdN)qe&Mv^qEpiXFJib5ft+g+#rRonXbpemuabscX;1 zk6noMoA30;aanedBT5a=n`cXu3jJSC;lYo%#fx2E-kM0J=9Djx#ut@@LSAtl-sERR zw-{vzv0wS~A^ENhHMm=w{qzG7iVNMTaE;(o%^PhVF92)~mr1z}ToN?HP82;tke>>UicCb;p!T%`I zG=P$`EwG?Jvxf6|&?lbAtR~ZLT%cyS0EM|nYKnY6yUYO%t$FLGbk@A@?&q5o2rONB zxfEU%F3L;GE!vs~JLpdG|9rpq2Lt530)&;?XjUpE`ljzfJOy6VU^27Iz!CZUMpuli6X?kUlr||@pqUnEwTCPSk+XKF*P{Pl zucwt}D@M@!IfB6t9&rZ<3_tYiF_^P$y=A9@TZS`a9rOX>xPZJnA$h~*{UP{%n^qF) z<5`gM^+q5}|9ce914>k`00xdL8pN~yIcRUF&Xr8CT9WbiU3tclGDS`y)z za#w{@ls-pvDLW+CHwDS`>qp2VL+DLAbFfWOOWweeiGY&LmftGpQiK4OyaAAkZ`}Hy ztMQj#^4E|8K8whnkTK5QF1%xlM6TYpoI;sZ8U*^$Zo?P|7*NF@L+pd>0HmGapR1qG z^2H>9ZF}~mr*R)>-@jXI+phe-UToN^8jJ1*8IR0etIqGw1orr@EP+-clq|5_`N8{& zQ+Ez3W>D%#+ci7Sua=+mJDVuqZ-;!)#No6HMDj(A+qKJG`gGlXhJsO5eYY^#hbS+} z=O=!j8Nd7t2~*lQ1&FDFZ1Y$VuS?o~Laa|g+-RKQe#KdR+*i(|sm@sQ|<|A7wE3g zJh4$&5 z*hXQ5$PPbPja~;mF_vx}+?4W+ZldH2K(#$saKg47-IOorBK#%ASgt;$1s%zzXmU&o zHCvY-LEFgmKl#`9;aPgLlw}hIDVk?UY%*jjPuz5LG5h$edS}G|TF5xWtjsTjQHE`M z0Y=~2=)LpcxmwAO|DLZUF$-<->&gGR5I|98xbgLtls2k;7|INkmag7y? zT!b_zd;Y-DR5~DV5^KwzZMphToUqLk|Jig}jVg#68{Lhql9^ufy$HIbqyK%)Vp9=Z zB-HmSD>`Q8^NZKQ#<+sjdr1dY6`?8j6!25dr|+ea2EN~ax|0s@4x_KcaNFZ>5Sw1Q z_{L8j^#sb|z^|e|jI0|plKQ&0R^gkI@%kYV ziFImDA>+;U3}~@afG{wM10@8P>-08_{&uTxFYV3RgX!cg+z2jfTAh4e06G8T0&mT3 zoqm08j0wv(O^r*rrJ&1gvJQg!z`KDUR*;IS1T2aJn4N*X6d8WsCQe1of7~C2)5}Xhc!mpTy^WqlG5MZnPtO5 zvI}l;1OXl)d83TYX?=B|JH#P1*eL0C&7w0aJZ$LJJ~Yw78AE@KUQZ%aM)nFkPn8#D zdB6b*i~pB3>`Qs%@o=As_IbZlyZY}-OKY0pnfj5epM6L2%e`Lw6IMlHDGKga{-vTu&3bPAY+Iz;2eEM$Y^!PNyV@m0i)(EQsw1K z>G?Wl^6eb7>FJLQpQU1lAox~Y_#a2hZv7`x@$jK9DQFkY_OKXw9(#$F^}B&E-fbG} zV1}C0SIgyNq<-(!_hhw}yZ7$DBrce!@aOa^OW$zMR)C;Uh5P~wE zgC;{ydY=r(Q9ZIzZPhj7)Pd~A4sn1W7oYI}&viAFCF0~U-*!U&b@2-|9WP=~Y2#%F;#lvug#rTF^NzkeFJ3{Qt5QKx2O z(Jl%#@(&h)WEukkxF%AV-MSC$c!)!Ea2nqGO-Lx?*ft7HzN4Dxi~Hvpr=HA{BRQBU z5ch`>^**R-dD;bHwcJHuVt2AqyAcG)B&kA9ROANNH9WBh!mLHVzCscz86_gyp0 zZaW9*+4sj8U^p5BqjrY<>2CdBKg#LZa{aD)fUMS+P)a@9cj)k6iR2%$J;%Wh`yz;x z>*D){Ialot$Sb%(h1>ewlqXxw#E!-|GuRo}Sg!~uxQyri$9$N2G8FHQ@O=y)TU5H? zJm=)&nS+aXwJaaO`!=g6JZ}VD#ekgZ^ z>p~0VVLL=5CQb;D!IkSl6VMq>bO0Xubob`}t)BJI7rD-Vt0(02MN1)*3))Z7(r%Q8-aKpGCFxk*39w#zJ!KJs z|A7DaKYL(7s?q*~9GlG(@kR0H|J@RK*z)R*ePLcj`puc^lqsmrXyQb{x;qtwPL0%h zC=F@?5`AHunC`~-pFjW3PLnH*<@6NK_)-M)p`P&O2K$4p$)rEKbNnNv{#72rE@C4w z3^ghb&bLvb&GJ89E_F>BV{Lu-uoj0M7rnpMr;{-}X6Dpg?i{_^1o(Tj5;*g4pXhdA z6gh6u$ivq%UB_;LmeJ5kz&?9a-9~OwHS}jofXgSL9GJG4=ScVmk{RU}Nkkp$`}X%Z zs~;>(4K_mCc7RcWt9kb)_ACrrt8S&M5u8-?8b066XbERT<l+FtpcI3Pya{qk`e^||Cr)qioJnAQp%yntO zHJufka0YBXBe;zl?n2>Uv)WGOJn;9}g6@SQwG#+NUyIQpX)M`lK5n6Qp*#Hte1|Xn z|9kX@rXM_(lSRvB96cX?tcr z_sHN70!I9-@2v4=M8TJ5QtS2mYkG{`3}?ml%A*-Cv3h?W-lE7aWANSC!KxTa z#t)!0PR9Z}<$IOVG!aMH@pEVQg3ltXMMuDr!xtEH`g`+PIjx6o*!Rm_0-4_*Our`k z3^577^!=l^#6K1if#)k(-YZeg2b6^|*-RfI-g3imIQ_DEKH7H0kqtpO0|0?Q)bbrn z9a-TD=_A^vSZa`mrV!8k+jGM7mMZs#6#w-(L!SNV-4?`{iD%I29;V<1poJ7~*=u`6 z%}rCJX2eU-vaL@4+k*ezEt=8S$D%AXq~y?BC3s?U+{6DD0D;6eS7YI2!o9P9zb5*t zXk(=En_*}y#0uCd@kYGBbbjdG4Hg*ZY=q(9Fv|U;w2fSg!>)_yZQ6=)t>@Qt(RX=8P`tLa9tfJ|wjgN8oivSaa zhIfxV z2DZMPFw}VH@-U5R{(GFDF&=ctP{TRena!eft+Jc2`Ufb?_Ti_?6$l&~W*4S}-I05E z`vipeXCGsN?QHm{ax*R-4s5t@8M8g=$%U%t*kUY!j9Z&C*Ep^i=N{=G>uFd(G5 zcAH15O&U8UkSzJlG`$JPd{`m|x%`BA_2#YVy|}4x{4!SkXK&6e-fXW_<~)l#28uoV zuN;8xP=PJM`wr$P75cf+#HkK+y4j_K+vvI|k%xcRBey!gB5OZ+=j<~wlA&FOpQm|e zv5zpg4Y!yc>nbKKbFOFbODC@S2hi- zFo!uYQ+H2iWkX`Ql*@Zf?|r(3fbGQtU!mGzJ4dDk+7`6y^qw|+59#HpNvo@z6UYu2$2gsb0o1fBCUNcS^lC1XxcPoQL#@(ciuXf;ZMo7YgI> z!xuRwnP_Gn)rLG~Omp0cTcnS!;(thUSf&<8=I+fzFqXr7K-UXIf-BmGufU_kUR-&b zBB*f~c#n1s9WQ+bmbbTO>8wtJ)T2Zz3^h`GJD`dbtm%(}Z{X8j=f^r^gZ|et z%=yN-yB{; zvHarwd99W?BMVLHTlN&4=(k^B3%Z|ZbkAI6@gd{vPX=rhRbQ>tzy5m7G?r(;L#;Qh zNuCcY69fKc)E%ftX)(Stf4>k&+Abbut~V3Znvq!?JWzGk&W?O-o*D{|=Q+x!pn zo6d4=*;9jYy7hJMjB3m+m(6D;B4Q=?k=iss=#@_lC=xV3I)vzPos?eY#Jp1rtXs$! zSEt_nd#+aSjQ;LL?h~b9U2#Z(_hHAddZ#Pq;Bx?$&s+=HcnzcaV1oP}yOCB(WTJ)} zv=P@BU8R~CI`QLkW{0q*85Q~w;la-vZ}z!-*bvXZ9>_++O5Y`^jaVxu8H0absj#`UvmAlGwK%M>MS!mJuRXF*wXd!zDTbcYk?s)=ZpIdGO;v9I8K+s=SJmR%hrDm+Ue z1ydbLjQm8@QasS@Uqsnc9TD+0+O$uG{`hJnGa@LACb5%9B4dQz7c+{&{ct+G!Mh-W ze0nEmr4hM@BgP#prF9+hKn)Y-{PiohUv4Axt8FOHwQv!eUQ3^h?3Kl@87orInbam7 zmg`Db;}3lwNp2O#AjYm~qG2}}inJ2s>KyWZs?<_ieRk0Z%H-`NQwVV^X6ca2rLFe| zvU*4PDOcCu1^EwYMM(cDc>AMP)~@?HloauWX4$oJacsrtXP6v=H=)K9o{B<0kxau= zVA0|qi2nZkYN+CQ2*Z}2&N73!2q?fSXRscQ=o;n|2jb5uN??$oBd+-TloL-)Sp&CR4Nq6g`e$H|g|ct2Yb+Xh!>xtb~FT;zj3@lV*>{9n>RZ`fS@kG3Jtv%^6%GIJTj!`FwKIp^LX-2fQDsjX}J)iPcwa z9i7AyY9=Qylr?q*BRh^g{q zJ+r5!6qu%oBXeR&mZT8Zgmftx@rYTuGgefg`(i;Wa1tNyFTM=J6<=aH8CE~B;+8IA zF#AV7O|?85D_Pf6>Nry=-hXz1M9;LJwVtMnYVHS>)|?pDtsPly5_pP0L27)*-)hkB z4;V`lGCPY;1^Qj7uW#85&(Zrv`}RekPl=Ss2yu9QloI;T zx9i5m@4TS%-E6rNJA6P|F?t+-@hW`F?zH&{t%HWIaUmis}qU}>_EUJDHMJy(Ro3)B7DgN`kBIWzFZH3ST>;3Ut z(z6milIM7zSZJ=VH}Y?L0C|GkkCTzZi-hpU1a9(l_oP%UBT_kzKA1}2EIotHcn_!# zK7XPOpU1|biI1^>;G_r;-D_nb_Hx{pMI%&Gy^c|+&qO-B4sldU8DzX?bzfxvnT%>^ zc)o|cLOfEHCy}o%Je1i}GCuSL^Ic*bOWikf81fN^79!jpAM*#}3~|DBXyTP$#EZZe zF($5>urqI>xv6tO#33fcg#j-JOBZKvx@qw+5~wCON=ya`(L@BTI5xH4lVX@8>+P;k zYfk)B9*ZbL{MzCDqut+Z;CR6z|07G%5HN-yGkk?>H~pUvNzq?dSNM zm_l3>hLCo`P8rtuo&?6oVD8J_uFr=HN4JO|7slBu@T`2}ZOtaX%o{IZ%G;vbv_4!v zX|^HXY(yz|Uv*Zd(h4s2R|iIshh1xxPj_sQQ7+F4HZY>Q=daqND%H7%!{sg7s`lgI zeSROwu~yMW`&DJ-I*P5piO{u<+5pKTLC066QVJP9o9jz&W~El|*?u14O%j=8ndxyi zp&&CcW2O?WHYO&COzK?7V`^&r*{?_ZlE@I9Mb?syo;)%!Ci7%-Mqjsb1f%tqoL&@j ztJfoiI7H;;?FzY(1RlqI#z7oqLQN8`nz*GSL%9)a?#K|#_Kr{9jgK(n6k7excCaSG zsRd?K3S$ttue;Awd>MVv&LhOPx~iG2%&JmZta?Y#E#be2^KP#$yk&+;;dzC1H!#zA z)go_SB%7j3cy7^<*2pae-afc?go_Z~2w&7%SiSjoo(Q;15V$S+)MTh{vpCK`KkH-B z!8s@uX0^@Nq`yse;p-zwRc4%Dki@qh=+0KI!=qUKL(k>0&vZ@Z+p_C<26g>=b0g30Wzvfmz;znteHKg)v0Txl5#gt)txXDa zEePzHVDpEyGELzsBm{1n{`V#oB$yuPh1LmqN)FN16KE@TmWKqt+zt1o-l`t4E}BU_ zeR*QRVJuTAYCI=hS<2eirgWX?2Zd$ZJ*Q%tgy(gHVhiCNdp~f~ylO*L=^R0bR<9M} z+iBrFpdj$g!HkWCQ7SRc>k$_>=}pntPDQrD@1LzP4_I1l3IZfM5;NJ(v|q`d7JPY? z?PYOS6sMjJX-24W>We8+cbA3OhggtXPUHUmGem|C2|aPgT}lK7`g5-Hqu})rN|O7& zDv5JAxM}ckk%*+=t#>IQh**4Pp3H>Jf(cJzkxxgVIjvXdnet?bX*$l`w}W&b+6RI2 z@_~!93@&Vqp3{Af)>7wX=N2?j6Z3E}}cZA$0?^ zp+8@hvAGhj?&(n<=6~U5yP`|U%*~`JgXkN09+delwx2W1bvnQ2DunA92!KXG3D2cHT3g zQ8*dT8@DoQ-XvTw-uAogAi;V>-502YJj6bbKgGI0sZD%W_ z9y@(YR8>e2k@Lf1wlI?zA!cBq553oo#pFe)m?qirOe^R_o0##gHtO*V-+MoY>Tpc!F|a zOg^AmVaN{!Cd<=LH(zf{Chk|15k zaPQgMM|Xpe6nGcUwr@I3*?d4QAAEbvjfru`CgHU1DwTxy?E?l*Cr#gtITGqd>#JJF zBi5``l2ZgzOjuq{I&*HmQwWyDPopdB3=r~>8Rh99i7>Be~kCxjO~|7EV`uRuvmpP3+s<<{p{5TTXBB#C^4cEoigLB^69>7!M|DzR-hNeebx z4A*(JSggB#+jbQhPv1w8bsXxJGrEXooow}_hupedDjIu29D8md zjp`5J82VcC1?&n0PeDc)joE-WC)GWODO81-=+jn(is9{#uaFSUJ@a3(SWLkYGnPNS zs1iB#oMvAWD(9*CNOC6;CKF$eFV1IjD)^9TXLMI#|JnIF*ZaLaAd=JRUTi|((x+x+ zpFQ+eP1i&V2}X}hM|?WM5#;WH&0yVCYE+24y;Tq!8Jl=mK5{4{QJ+bu;_ut|i@w$W z!k1Vg(ws&2Ml87mVV}&0pQ3EgJ&Zw24Rvzg9$(Vo#xp$QrN0*;z&DE^Ji3nF`c%<9 zPbTN3`3DyPmL6r{q3%OZc8^#2dOowsuIUD(PIbOR{<;+xTntL2JoOakbDA_e8e19# zf?Yyk7!%>HnHzZ8FzG4LX`O4+#xp^UtR5f1!AatVWDL^JL2EcYcP(9PV75BAFQmq%$!OBcFOGVR(rWYRGY%22*HF zUXRV+%*46BLe&||<9+|bSCC3Qwq`=VsbbSe$>%qLsWrpESNNt|^V_3G z{XgVi#2o}J?QF%Dt7r{xf6Has{K4$7I&ZCW+MZ3A`AEfv`8xzhe2zO}@$>BG>g-Sz ziFhR|swbW1za{X0aA>;x*ot@jHvM!XaM9e}Bo)zXss21+oHfY5Cz~b_=+Rm0v_mPa zx!Iu|p=-`HC1QoH>2I~eM4J%1Ma!f$gY)|T6?f+GP=D{=mv!u8>?LDg(?pA88U~Sl zuk1o8vJ_b|jI|k&8B54MMf534*<~G5NJS+}Wet-kjKna^{T_Y3_xE?-kMFmS`>)$$ z9{w0J-tTkH`qy1kW8t^QTV~uWO(EfN=#vs2J!_@~U7@)B)5vY0w5NK- zWiD#kubE?}I$n8FVbNM_`cq8>HJpR0$>!m6XPQ%`|Gr>U!}J%D>eb@Fx2zQPg51Co zQ6U-HAg>EQS@ZBpZ-kW27p=ydYcGQOAt2lq9Cq2P@80~;5RQEfna3wuP8WhNbMYO6 zk^HA_uFHRS7p(P&FQnypPoJor{dNMFX-P=0vbxGa&1g)gm5HQ;AZY4V|8lH)HmkAP z3r!~U34(I|*ArJkGDD{y3+#d1H32iBeVX9SEs|3H23)XoY3GRzPn^b6t! z3ix`Wy{j|m8k$R_nFS#U5x#nQN&)%FfOP$HuCHIuKrE}_y{OK8V~5gAh(FNuHMG$- z_cM)c0wCULj)1pmctf|ihzy+P@9e6-K4U)0-#wBrUPz~r?=MvYimh7=eCv+9Bzx%S z^|SqMK*cpfc@p4WY-DVTC_ATRQeSlA1yoz@TTg13YM6)3aC!}5rN-}!%akCH8m<&s zu13N^nNbWXq50kHJ{9mvOL~_8pPJ(tIj}>;no~Iw^#C!h|0-{SVC(hBUgy5r>Cn2T z@zLp7sr)kVX2I5g>%z>eIf243X0{8oNzSb11hQ4bXMP?+*b*MY6?Oo?n%PlNsk6hx#%@&i~)foL2o*2_KV z2+2Y3mw-yZaxhi~6O}0_6Dc^Dh*W-w4wJDnPnDRz(QZUCx=-A5UhqkjUT2|A;&^c< z3|5eKs6?GO(K*3#%Kf@zAL%gV(I%&mS(xh`sU9=htS~7nOAz9d<4JpWlrx4O7g&`= zo|OMI&kEs%3b6?m#8h=lG>GuMEor=I(*$*kwo#Q>{CEw~&C~79;CQ6kK|;1}eZP-G zd|Q|f2hJ4!@71&hkLPd>etSwbU|W4CVDD2}K-9{q1L>}D8PF;Cz8Ho0a90&CX!0G}(JMhLlv@v-8Y zb3@Ckg4O8hL-@1Gg{3#Usa%){n>m}qfMu_X1LcNwh;WfV@@^#CwxBC=s1nf_lNxC~Ta7||E%GI4L^ zoGavGY@R;hjtjGU#Fj>F3x(hpEVa_kFs!>DsVg+DfdkqR8gTjDS{wsxB`hKy(atuGpefqV|EW27A1BaKF zy~LY3M$POg>KX4|qP|(*uDV@Q0Y}#Er!do1V{dQLLHJdLn#>?sGGYHZ*gpy2hP7{tM>&C;Vdy&?c7+Cv$o|@ zh*^;VbF-SPbxER&GK5Qfb& ziXztchBsB}Zg++n!=;YfT`TLL^@=!;j}rrKh7m!X+k*#$vzM6r^fGM3zrWV#27x!gR-!9!z)Ty8O1% zQhL42z`DRA`a1jT)NGMhih*mXS}KlX$nSuC!A#bhWY|0$t5wh^P(cL|w!|2w&ff zn-O#IPXoWP`XqzbNiyfJ!Cd9eZ@%Ul#uU25+*&Vj@2C#4goq{HY-P*WZ)0CR75l4l zwF9Fs9c!RVluyB$j`RejN`bnL87*IFHZ{2wMQ`BO5WIp00+&WM#>1<**4xxRbV!Nm zluD*GhL+IuKQ=`Ur1X7&$dPL}M)Rx~KO!^*P<5dVhvX$ur9${+*+RXar-LA#@8H6G z6lsb+-6`5AgPOS>BEaqA2*U)OCwE|%GLhGCd^eF8hL?BcJL z5ckTnud{>AP%9~yPTH9}GscVcbbD*I!vyXeB@ndd!{uZ-Yw)49{_tOpCJ=0r-$VZE`yW=bf=K#l;)PDVt$gVUGX%g^GgdVa#ru|v76})YI(8dec5yXi@*w&l$+Pj zvycjw8tZkgSxw|ywd>h6;`)|dfe@DysVaS5^FD3fjs9(n00~mMUl)b=_P-OO%C13u zGi#pptA|)tZAs|k3w^9hXvM;0cGy7@}9riI3k?}#EeS^{!#+T zf~Q?J>ef@h)~%{e^LsvX;Lmz+#Ku*ni=O8QvEeMze!~@ALC&J_U7Z;LrHdS;xL3%g zY@uFp3?_|@6Uj%% zlU(@wj>2V+-uM|CHqn?Um@oQFa?1)C7h!$B^!dP<;|r_JZYq+)7HWBVY~@YG(25UK zhR=;TRi?Lxs{0ds%JqObhZwRPXJAB}%qyv6o@&=Uk zNALA!q4C04_C!E0QDIr;N>m|BVl1n9qDhnpf&4SZ$|DOQ=j2EpP5qjvIrY2^x|rbm zMtiY&3cXE68~#0QhR|DCrrO0wlg6n3>#Rp*ZE{ml4FNFt7&b?i-j%Ca&esxqosZ&; zg;{ugrawJ6bGjqrNS~(pm{)?uIQv}2D+elg$kul1MwkX_gJ1mFq#NujVp6NzUWputssst-ZaFeo81+d=Hy78IH{DF$x+f5jd?J8 zYN`lb`95yS2(2VwAea8cCk0Y#kRx+R2J2!e^MD#7YH}QM)}#Wfx&8U@V6wTn$TI;0 z83_TosRmK!OYWIJI=jfB?Vj9yX4w*(B^O+{K^X7B_5(3{fyiT7cnmztua)d6HR;=q z1OdZBc%Z;_%IjLj#Z`5t3iAEpQ|)}k_ZDv%tf%5oat?+{nCz83f|!gW`r@^#E7qa_ zW9oO&0k9Rl>Gsl}leXWx$w1w|yQ32qTazNS{C(xNRO@u4(3PIke($CF>tC!6z^M;< zLK|)dm;r%Ch+~@G8dDR_fP*l(Z#tsX-K-;TUaM}1nVzdiFS+F6)mMDdAbrl=Je^okQ^(ol} zX9YQ?SDI612(h_k0JlFZ8Vq$+g3F7iT)s$<>*6q!SXy4*^JrETOdU3s88jvFrmx789x}-3Trf@`Z z#I_1Y+21d|hvdaD$5SK?@|(@W6B5wSR?Q#!K+=a88xuviH9|*cl`zj{fTLy8VojLB zdFx25@7oHRqXYO-k*IJ>=gKqDz*Oi1_W6FnQpkfbCYXY~q|W;lZ((9GeLo(O&S9fbqCD zZ?DDZ7(O)UWRa->aU2zl5uJptFnO)Z*|=giM6j29{NZwXue5Z@PGy1xZV<7$3CqLm z{Fa=?P_VfkGn930`T|55yZ?OJp(=i~#-2CQ9bC>`Fg9+JT(}}E9dcrA(vwBbDn|j- z+g9KS5$-cRf74f4;Jo%!mljB?FFtT(iggN4(wC_b7cIhfp6r%8u+Bt{K8@vJm$nEC z9exG)z>pM(P!~ygx&3hZ`jcE79ayP?S&F-BJl01SqsR{yN$yk~Kuo3rdTt`SVIm)I zjaT24@-HvMAy>{E5B^+vsAK}jbX3yDg~@NFA`f#6HraWYiasClF8pqAyT&|cs7BjI z)+chx>5CJ=_;|+Kji_mHIQMvAtFU8A157Q75L-Vn&e2h%V2pS{AJ%t`IT@vz#qXO- z;hcg>PkbV4s|ZE_f#&Dcc<;0>K})!3?2Mb@*Bce~lksN^r!vV3Zlx3M-)p2Qfw{rD zyfBTvl$aCSTY(`<##gQrC4pEH+Yf;ziz1?-YiITQTe{n)&*M>eT9xfOw)zM*Oremx zWh-98*wj^|B)6X|;=W2{O9<-D8&+&s%pGKxj7Oe7C$s#M}*=t#UEs z8?HjoXVLxV@3+)Bf!n;8KBvbUpL4V~;=JXC5F3+CU^aO){G6IGrgVj*%bA*{#R+Hc z6%=9H4;AvNx*cfDZQs6Wv1cq)W%$T<{c&R+Y1gRYFW_~CxVbn#EkK!l^R+|!%9gak zK;F4K3+4egZ1<51(c5L7-0MlO)`qZ8pT0Z*CICYbj;2)kMpse8y!TM}P z)2ZD(!KaUSi8Zy_9uE}aIT7=!UFU(jfJ$~S3&KppQ1@a5UH@w)*>e@iK23jNm0`u{)ao3E z*DtO|T*tHK8#uaXm7BzbqAE5n2&m=C1e&%GE_-UN_ zlYlh#!7dQA%egY>W&26H{>g0S{cGU97F3|5l$kD)<;g6%LZ1F5YRa?yOa%+Aul92< z5G9qtGOLu+=S*vKbs2dq2)RL^z|_ZuU{mJftWFBcsoAnARZDQpSZ>cWi|khiP&)@K z=hV-<be&#o`Z8^vGw!SUoH*H=;uIKVdrfarPrS*@k}Ns&UiM~-1PsdZP!`?W@+na7HLkaZL%#t18RN)%+r%`*o!&InwNQUhPT z-nU-vB66WwcQV#L9T~%n*ZCFm0|X%Ul1sJC&8gC54m#|;kHklT2W{i~QnN&a^BL7D zGB6#N#6+5K{BIIn0&vDCLc}@zrQU@{9=ZHPzEPt|yV}LRU zgM!QclwRdVICECg(V(f`H~KZoQg}W+)Q3P+8N2wGNV^$hTSCwy*Tq7k6SY?zR}s?a zD=XuIYyA0VpZC?5XGLs)MrK(o$RoaySh8j?6iQeVdWKf~bU?2U7D!jAa~O_zX%XeQ zNZ=um7iYEf!#PHSi`CPwe*w4 zrjt8HSxy=){o*~QXFxip)soReeIUA(Eev~bGK@z#PXfJe%60R3%=fwz1Kz=%FU7}yBL2eAZ(-q-Jt-fy;C zb^4u*bD`0VFKQM__}lQ)&0$V)YKN|F<3bw8$W4-VGupe zjy3J%xBmzkWTdYGDCmDx)g19N0tB6M^ADI22gEZCd6q@CD8KuDr>X|1({2WuGpz-vhE4Ch}um!*nB1Ql?`JbEo+TtSgP+#UaIN&;nLTSH&O<7irB8zSMTVd{f~pB-^{lKul??`BTrj(cYjMFjl*GIZjVms zOOG)Kn*ZFfirN4Pk8S0y_hwpFvlkDPQOmwF=sPLWjh`GC{iOcy9AO{_7yuSnggnI@ z$|W3dZm9ZRcmlPH#^fz{sd*ifatBn2cYh59jfir|t0Vy=B7Rpr=Dgr#?qw+BYwp$C z^_%?iPlJ+_pNzQp3{jqVh59!U^`9QyC+{o%A3kjBEAu{J-xN?(v71Ng`I|U?M7CLL zi^9{H-G0TQJP`#*qpA??+SBpbUKJKacjokdM3nFki@11r1dr^W0Y&?R(qiUFZt zhS4c7e+Qyy^8}m!&+mIUB&_m6K3?vaxBaA8%vUPdm(xw^9e8Nl^*HfBah>HKm%r1( zd`U+ng8Pv`8PFAL_>8jU)veThel@AS2lG!x)Hz*21JX0sWdrHdLi)&S^$P|SEtV>q z2W&9!6Ln^@J)I{#Cy5DfS8Nzp{=;^}b3!5o5CrY^m@lsn$t^k@nvt+NmsC7>6BNYP zCINu40UZh#wER3X%&G3mz{zL44A?E>A^-z6JlNbzx;FBUyBD#jQ;W9LnM8(@wJIKl zjWvhAeOt>s#4^b8z~OFfOe3amlkBvE@}47wIsyagSNO+g;80oMI#BCrzx>J@Q5^;l zzRyX744;2fnLB^kVhcxK$9c4@4ysz5m@BqM@$AfO4|r|FMtR}tWA9TOMll1wIR7|# z4}SfRqm#3uakHF^}Jz?YarCueBl;Jw4uaeBe}p|?x6X@ zpF{6Ldm_bNKVDg=MeLx$Nnr(yx?HOtIyuQ{sZ>ClR(xjN^U432-xEOf zOWXQ_0C#?0krca4%hyw|YqbthYa`y!`UbXpy%S0~ceXbF-nm~?D`=R{=0Dhq-bL@Y zZ9pA36Fba*0=XR`%U&6j^n#yqLvS+y#G2Q2?e@=Ajkb^%$>KjGSaa=5Xqy|84m*R& zxh$k~PVjDts;93E_rvdkf3*4l)kptMNHu_z zw(uY&mIuRO(X9>-IKH>hw|``9J7g+(2{QW-7kG-Vr*CcYery%9!3a({a04P*ZRYV% z2Jd)>6Z{`-Z=p%4oPm$$_T3Gy9td_4&+}WN_OkV;a@kT5+bD;H(QO2 z8#M5jp@9MGUirV8+QnQPXkGKH4qG$7^Ebe+yRh8veq^KMDsi4=L*`J~xJu<^%| zC&PkgAV8gn095Ed+moXqm&~VEhup@mUdKT7|JaBf2jUxJr#zS89Kbt&W6}Pb zu`u9=88jHXkmVBFe9C7BkNc1Jb7-UK&fR)V|1xcw*dIG#$KSB3-~TvsrZUkvbX^^I z!}ibK48dRfT-rOg-FMEFst)%1g9a75yO+}aue9rYWroC~6nAki7TUvM9Tkbr-s|~) zd@2D`0sy9+`0nm^$)}EXa~%xe?{+azHJxsPS|kj>yVyl9X6^s^)}jF3xMTkUJQ={! z6Z*3kR@Tc`p4bdvi*GkQs95UVMGKl1+|9jahn{}1#Nq%l@h*DkAj1$$lQ#tx^4~b_ zzgcbn&6T`9LO7Z_GNeiB+HI>t7!J$-?+;`411hbv*+)|&0W8nII-ilNelBdz)a}H# zVGlosIM09d&k20mVu=ftiB|yY8enk!?o{NH{Y`{@f4@2!3B!D&{k%Ib`4Iho|IKva nqlY#Ltk0tk{3<4nJg0Mr4a!hmd#EE!z>o1M3xf(h_t^ghK63i3 literal 0 HcmV?d00001 diff --git a/devices/surface-hub/images/switch.png b/devices/surface-hub/images/switch.png new file mode 100644 index 0000000000000000000000000000000000000000..5ea0d219094158590973475a5e8f80e8d2e5c448 GIT binary patch literal 873 zcmV-v1D5=WP)Px#1ZP1_K>z@;j|==^1poj532;bRa{vGi!~g&e!~vBn4jTXf0{%%vK~z{r?U%nx za$yw5`%ObcKZdAi5yYX0Xsf}Xz>J8NAjMS(TB1d%t)@gMX|5>$071wh5+f>TatOf? zf(FqjT$~Eh^SIN8($DzN!AKKg7;r#rZJ~gho0nW_K06x;_v9U4u`1qiTG1Ud|^z^g@CwYH=pQ^@W z7%-R1!N|yn0&sYE7}Du9rS!`%;LgsD0#5Sw_BN&T%Mf5PnS`F69u^MW*ViZBY$GxR zxU#asf|c9pbW&QMbOT;qUP5zoa|xuYs|$QSAMEb#LT_(x>2n-AS65fGs&?rD#1S$* zJzau89~~W06~xcw@N;u>y2p+#z{A5s863L&26=pZgpQ65S^fC6u%X=7u9&7d6)2c@)0Ghiqb zlD(PVy|}n2a>Zg1*4Eb847#PI1#WL|MOKS60p|007#|;J8%kbYUKZKc*H>{5a~a7C z3ky&v6hyw7GyxtQ9I%bbZM9m(tb2KRQN8{opPil2?&_)vh<_2Y*~~Wi?&s%cam08B zbM@2%sB}XC=S`845Ml}PXr>3Uh{r#O*%f$lXQE?lod31CXPEJlB7!1P1!~~mB zb083)?s6#r@f%0Aq5LmAI5-HIOok}FqyW6QxL`N<33LCdDgf~&aJgJCKR++7q@S?e zZil6%C3tvvAc`-s&tN0zKcG?leKs3eO-+9Q{yDE^hoTc>00000NkvXXu0mjf!1R-c literal 0 HcmV?d00001 diff --git a/devices/surface-hub/images/usb.png b/devices/surface-hub/images/usb.png new file mode 100644 index 0000000000000000000000000000000000000000..a743c6b63459d018f76cff300739072d9129921a GIT binary patch literal 1064 zcmV+@1lRkCP)Px#1ZP1_K>z@;j|==^1poj532;bRa{vGi!~g&e!~vBn4jTXf1HDN^K~z{r)mBR= zbx{<)u4i6(3nh<8N(_XMOiWBEj{!<1Mp9-s$_PVAF;N&QGZayz3``{Qh)~{dN(jsU zt^cfJ-*b<;*S-FqufEPcYp;Fw`u1LD?QQw>AP?g0?Tz{R`l?y};^pNWYSkhskEM(fay2+dlJk1s)Y3czk@M!^1;5K0apd?(R~4em-Ht!N9;k znxCK7yxoJ_0wisKi;D|tYipydtSk=H$H#|hwOaYz%gak|*Votc7ch(;viyja#9=Z9xRdq>JN2(eok9kTO61`^;7-t@9(LosE7kgPEMwsogKCtfq$W^ ztBX22J85xoQL{P+NyMy3{Y!p zD_vh-YZk}F(FKf+jp+fSS_s89GBU#H0-`L+%E!jW($dlruh#ADE$%p4Q*VmUKA|jan{{FfhZKN9PQBhG87Z=AV7!wmi;o;#F z85zmXuMp>j8be-Q9?i_maJGPm-Dv^VKb0dWD2RfCgDE5=gabp+m)p*=0d?b~a5-O>w;PKj>w2bad1%03(NnhWI*wA00$n-tk19E-WnYB=FD7%;ZXj zR8ak0A+8EYo) z>v0|Z{r%M3+)SsZr<%nP7Re>x?Cgvh8yhJ)I+_E(v#F_x&jmnLZU*Ut2>b*1Mny#h zA7+5eg{RpKRUke%3M?L0aXhg@%T*h^ne8wiz)# zK2AM7J$77KS>Zl)9<&jk+1%f98x>4XPg6iZ0E=j8Y2gKt!w|ugl$3Cv%HG~yZM1Xv zHUY9)6B83$RS+DiS4v6>Gc`5Up-h5a6PH1siC^MIwsn)v$I;SbNJ^1B(>D4XM|a``3(Pc i2Rwn_FW`5>VtEJLzDkurMQo1%0000Px#1ZP1_K>z@;j|==^1poj532;bRa{vGi!~g&e!~vBn4jTXf0v1U`K~z{r?Uqf; z0Z|mky>G3^2e9)6Y(#m<+QJIOLWGEgmFz6+d)> z&rC)!X3Apz^>60>yK~QP?o2aB_tk8{Y8b&foen=v zr_)qZ5^g*mgV}7RiQ#aVvQQ{QW4vp(+YNz0fb94C-!i+-;c)Ql;p6P}dOTdAP@tMj zFT-KJTCFJiMA2yUDO^6E=VtxsWjK?`1hd(UvQHF=MAU(sPN$T8A|V`p88o<8rNPOS z1}9gl!72TnQxtB!UQ_mo*dGELfVbf+7K;cj7!2}@#bPn2R4Py^mELx-ScG!93{Iz$ zU+>u;g7tJFxY1}t+l>?PXN~gtd^Bd=iju~6xZCaW<4h()HJL!)~{u#+7B&YL#l@&ONkDm&=9vD{T6(Q^mgOa5zA-*@SpJ4#{K^QmGUjgXSu}h?b`Hqc79jg+4o@6N+^X(r&x-TSqH};^pY#IbK=Lbq>{Htf!15ed1meVi HYCz%ucHJka literal 0 HcmV?d00001 diff --git a/devices/surface-hub/index.md b/devices/surface-hub/index.md index f91b3e81bf..82f19b1a90 100644 --- a/devices/surface-hub/index.md +++ b/devices/surface-hub/index.md @@ -46,7 +46,7 @@ In some ways, adding your new Surface Hub is just like adding any other Microsof | [Top support solutions for Surface Hub](support-solutions-surface-hub.md) | These are the top Microsoft Support solutions for common issues experienced using Surface Hub. | | [Troubleshoot Microsoft Surface Hub](troubleshoot-surface-hub.md) | Troubleshoot common problems, including setup issues, Exchange ActiveSync errors. | | [Troubleshoot Miracast on Surface Hub](miracast-troubleshooting.md) | Learn how to resolve Miracast issues. | -| [Useful downloads for Surface Hub administrators](surface-hub-downloads.md) | This topic provides links to useful Surface Hub documents, such as product datasheets, the site readiness guide, and user's guide. | +| [Useful downloads for Surface Hub administrators](surface-hub-downloads.md) | This topic provides links to useful Surface Hub documents. | | [Change history for Surface Hub](change-history-surface-hub.md) | This topic lists new and updated topics in the Surface Hub documentation library. | diff --git a/devices/surface-hub/manage-surface-hub.md b/devices/surface-hub/manage-surface-hub.md index da29b06c9d..3761627ee5 100644 --- a/devices/surface-hub/manage-surface-hub.md +++ b/devices/surface-hub/manage-surface-hub.md @@ -41,6 +41,7 @@ Learn about managing and updating Surface Hub. [Enable 802.1x wired authentication](enable-8021x-wired-authentication.md) | 802.1x Wired Authentication MDM policies have been enabled on Surface Hub devices. | [Using a room control system](https://technet.microsoft.com/itpro/surface-hub/use-room-control-system-with-surface-hub) | Room control systems can be used with your Microsoft Surface Hub.| [Using the Surface Hub Recovery Tool](surface-hub-recovery-tool.md) | Use the Surface Hub Recovery Tool to re-image the Surface Hub SSD. +[Surface Hub SSD replacement](surface-hub-ssd-replacement.md) | Learn how to remove and replace the solid state drive in your Surface Hub. ## Related topics diff --git a/devices/surface-hub/physically-install-your-surface-hub-device.md b/devices/surface-hub/physically-install-your-surface-hub-device.md index f750d07a4f..9c22a5b744 100644 --- a/devices/surface-hub/physically-install-your-surface-hub-device.md +++ b/devices/surface-hub/physically-install-your-surface-hub-device.md @@ -15,7 +15,7 @@ ms.localizationpriority: medium # Physically install Microsoft Surface Hub -The Microsoft Surface Hub Readiness Guide will help make sure that your site is ready for the installation. You can download the Guide from the [Microsoft Download Center](https://go.microsoft.com/fwlink/?LinkId=718144). It includes planning information for both the 55" and 84" devices, as well as info on moving the Surface Hub from receiving to the installation location, mounting options, and a list of what's in the box. +The [Microsoft Surface Hub Readiness Guide](surface-hub-site-readiness-guide.md) will help make sure that your site is ready for the installation. It includes planning information for both the 55" and 84" devices, as well as info on moving the Surface Hub from receiving to the installation location, mounting options, and a list of what's in the box. You may also want to check out the Unpacking Guide. It will show you how to unpack the devices efficiently and safely. There are two guides, one for the 55" and one for the 84". A printed version of the Unpacking Guide is attached to the outside front of each unit's shipping crate. diff --git a/devices/surface-hub/surface-hub-downloads.md b/devices/surface-hub/surface-hub-downloads.md index 689358891c..fd4d2c9332 100644 --- a/devices/surface-hub/surface-hub-downloads.md +++ b/devices/surface-hub/surface-hub-downloads.md @@ -12,16 +12,14 @@ ms.localizationpriority: medium # Useful downloads for Microsoft Surface Hub -This topic provides links to useful Surface Hub documents, such as product datasheets, the site readiness guide, and user's guide. +This topic provides links to useful Surface Hub documents, such as product datasheets and user's guide. | Link | Description | | --- | --- | -| [Surface Hub Site Readiness Guide (PDF)](https://download.microsoft.com/download/3/8/8/3883E991-DFDB-4E70-8D28-20B26045FC5B/Surface-Hub-Site-Readiness-Guide_EN.pdf) | Make sure your site is ready for Surface Hub, including structural and power requirements, and get technical specs for Surface Hub. [Watch the video (opens in a pop-up media player)](http://compass.xbox.com/assets/27/aa/27aa7dd7-7cb7-40ea-9bd6-c7de0795f68c.mov?n=04.07.16_installation_video_01_site_readiness.mov) | | [Surface Hub Setup Guide (English, French, Spanish) (PDF)](https://download.microsoft.com/download/0/1/6/016363A4-8602-4F01-8281-9BE5C814DC78/Setup-Guide_EN-FR-SP.pdf) | Get a quick overview of how to set up the environment for your new Surface Hub. | | [Surface Hub Quick Reference Guide (PDF)](https://download.microsoft.com/download/9/E/E/9EE660F8-3FC6-4909-969E-89EA648F06DB/Surface%20Hub%20Quick%20Reference%20Guide_en-us.pdf) | Use this quick reference guide to get information about key features and functions of the Surface Hub. | | [Surface Hub User Guide (PDF)](https://download.microsoft.com/download/3/6/B/36B6331E-0C63-4E71-A05D-EE88D05081F8/surface-hub-user-guide-en-us.pdf) | Learn how to use Surface Hub in scheduled or ad-hoc meetings. Invite remote participants, use the built-in tools, save data from your meeting, and more. | | [Surface Hub Replacement PC Drivers](https://www.microsoft.com/download/details.aspx?id=52210) | The Surface Hub Replacement PC driver set is available for those customers who have chosen to disable the Surface Hub’s internal PC and use an external computer with their 84” or 55” Surface Hub. This download is meant to be used with the Surface Hub Admin Guide , which contains further details on configuring a Surface Hub Replacement PC. | -| [Surface Hub SSD Replacement Guide (PDF)](https://download.microsoft.com/download/1/F/2/1F202254-7156-459F-ABD2-39CF903A25DE/surface-hub-ssd-replacement-guide_en-us.pdf) | Learn how to replace the solid state drive (SSD) for the 55- and 84-inch Surface Hub. | | [Microsoft Surface Hub Rollout and Adoption Success Kit (ZIP)](https://download.microsoft.com/download/F/A/3/FA3ADEA4-4966-456B-8BDE-0A594FD52C6C/Surface_Hub_Adoption_Kit_Final_0519.pdf) | Best practices for generating awareness and implementing change management to maximize adoption, usage, and benefits of Microsoft Surface Hub. The Rollout and Adoption Success Kit zip file includes the Rollout and Adoption Success Kit detailed document, Surface Hub presentation, demo guidance, awareness graphics, and more. | | [Unpacking Guide for 84-inch Surface Hub (PDF)](https://download.microsoft.com/download/5/2/B/52B4007E-D8C8-4EED-ACA9-FEEF93F6055C/84_Unpacking_Guide_English_French-Spanish.pdf) | Learn how to unpack your 84-inch Surface Hub efficiently and safely. [Watch the video (opens in a pop-up media player)](http://compass.xbox.com/assets/75/2b/752b73dc-6e9d-4692-8ba1-0f9fc03bff6b.mov?n=04.07.16_installation_video_03_unpacking_84.mov) | | [Unpacking Guide for 55-inch Surface Hub (PDF)](https://download.microsoft.com/download/2/E/7/2E7616A2-F936-4512-8052-1E2D92DFD070/55_Unpacking_Guide_English-French-Spanish.PDF) | Learn how to unpack your 55-inch Surface Hub efficiently and safely. [Watch the video (opens in a pop-up media player)](http://compass.xbox.com/assets/a9/d6/a9d6b4d7-d33f-4e8b-be92-28f7fc2c06d7.mov?n=04.07.16_installation_video_02_unpacking_55.mov) | diff --git a/devices/surface-hub/surface-hub-recovery-tool.md b/devices/surface-hub/surface-hub-recovery-tool.md index e6e0eeb5c1..866a2de12f 100644 --- a/devices/surface-hub/surface-hub-recovery-tool.md +++ b/devices/surface-hub/surface-hub-recovery-tool.md @@ -16,7 +16,7 @@ ms.localizationpriority: medium The [Microsoft Surface Hub Recovery Tool](https://www.microsoft.com/download/details.aspx?id=52210) helps you re-image your Surface Hub Solid State Drive (SSD) using a Windows 10 desktop device, without calling support or replacing the SSD. With this tool, you can reimage an SSD that has an unknown Administrator password, boot errors, was unable to complete a cloud recovery, or for a device that has an older version of the operating system. The tool will not fix physically damaged SSDs. -To re-image the Surface Hub SSD using the Recovery Tool, you'll need to remove the SSD from the Surface Hub, connect the drive to the USB-to-SATA cable, and then connect the cable to the desktop PC on which the Recovery Tool is installed. For more information on how to remove the existing drive from your Surface Hub, please refer to the [Surface Hub SSD Replacement Guide (PDF)](https://download.microsoft.com/download/1/F/2/1F202254-7156-459F-ABD2-39CF903A25DE/surface-hub-ssd-replacement-guide_en-us.pdf). +To re-image the Surface Hub SSD using the Recovery Tool, you'll need to remove the SSD from the Surface Hub, connect the drive to the USB-to-SATA cable, and then connect the cable to the desktop PC on which the Recovery Tool is installed. For more information on how to remove the existing drive from your Surface Hub, see [Surface Hub SSD replacement](surface-hub-ssd-replacement.md). >[!IMPORTANT] >Do not let the device go to sleep or interrupt the download of the image file. @@ -73,7 +73,8 @@ Install Surface Hub Recovery Tool on the host PC. ![Download the image?](images/shrt-download.png) -5. When the download is complete, the tool instructs you to connect an SSD drive. If the tool is unable to locate the attached drive, there is a good chance that the cable being used is not reporting the name of the SSD to Windows. The imaging tool must find the name of the drive as "LITEON L CH-128V2S USB Device" before it can continue. For more information on how to remove the existing drive from your Surface Hub, please refer to the [Surface Hub SSD Replacement Guide (PDF)](https://download.microsoft.com/download/1/F/2/1F202254-7156-459F-ABD2-39CF903A25DE/surface-hub-ssd-replacement-guide_en-us.pdf). +5. When the download is complete, the tool instructs you to connect an SSD drive. If the tool is unable to locate the attached drive, there is a good chance that the cable being used is not reporting the name of the SSD to Windows. The imaging tool must find the name of the drive as "LITEON L CH-128V2S USB Device" before it can continue. For more information on how to remove the existing drive from your Surface Hub, see [Surface Hub SSD replacement](surface-hub-ssd-replacement.md). + ![Connect SSD](images/shrt-drive.png) diff --git a/devices/surface-hub/surface-hub-site-readiness-guide.md b/devices/surface-hub/surface-hub-site-readiness-guide.md new file mode 100644 index 0000000000..2d6c5d82de --- /dev/null +++ b/devices/surface-hub/surface-hub-site-readiness-guide.md @@ -0,0 +1,135 @@ +--- +title: Surface Hub Site Readiness Guide +description: Use this Site Readiness Guide to help plan your Surface Hub installation. +ms.prod: surface-hub +ms.sitesec: library +author: jdeckerms +ms.author: jdecker +ms.topic: article +ms.localizationpriority: medium +--- + +# Surface Hub Site Readiness Guide + +Use this Site Readiness Guide to help plan your Surface Hub installation. In this guide, you’ll find: +- Site readiness topics +- Detailed hardware specifications on power, ports, and cables +- Recommendations for moving and storage +- Links to guidance on unpacking and mounting + +## Site readiness planning + +The room needs to be large enough to provide good viewing angles, but small enough for the microphones to pick up clear signals from the people in the room. Most rooms that are about 22 feet (seven meters) long will provide a good meeting experience. In the conference area, mount Surface Hub where: + +- Everyone in the room can see it. +- People can reach all four edges of the touchscreen. +- The screen is not in direct sunlight, which could affect viewing or damage the screen. +- Ventilation openings are not blocked. +- Microphones are not affected by noise sources, such as fans or vents. +You can find more details in the [55” Microsoft Surface Hub technical information](surface-hub-technical-55.md) or [84” Microsoft Surface Hub technical information](surface-hub-technical-84.md) sections. For cleaning, care, and safety information, see the mounting guides and user guide at http://www.microsoft.com/surface/support/surface-hub. + +### Hardware considerations + +Surface Hub arrives with: +- Two Microsoft Surface Hub pens +- A Microsoft wireless keyboard, customized for Surface Hub +- A 9-foot NEMA 5-15P (US Standard) to C13 power cable + +You’ll need to provide: +- Cat-5e or Cat-6 network cables +- Display cables (optional) +- Audio cable (optional) +- Type A to B USB cable (optional) + +For details about cable ports, see the [55” Microsoft Surface Hub technical information](surface-hub-technical-55.md) or [84” Microsoft Surface Hub technical information](surface-hub-technical-84.md) sections. For details about cables, see [Wired Connect](#wired). + +Microsoft Surface Hub has an internal PC and does not require an external computer system. + +For power recommendations, see [55” Microsoft Surface Hub technical information](surface-hub-technical-55.md) or [84” Microsoft Surface Hub technical information](surface-hub-technical-84.md). For power cable safety warnings, see the mounting guides at http://www.microsoft.com/surface/support/surface-hub. + +### Data and other connections + +To use Surface Hub, you need an active Ethernet port and a standard power outlet. In addition, you may want to: + +- Equip the conference table for Wired Connect. +- Expand the wall outlet configuration to include: + - Additional AC outlets + - Ethernetports + - Audio ports + - Video ports (DisplayPort, HDMI, VGA, etc.) + + +## When Surface Hub arrives + +Surface Hub is large and heavy, so let Receiving know when it will arrive and what they should do to handle it safely. For details on the packing weights and other specifications, see [55” Microsoft Surface Hub technical information](surface-hub-technical-55.md) or [84” Microsoft Surface Hub technical information](surface-hub-technical-84.md). + +Consider the following: +- Wait to unpack Surface Hub from the shipping container until you’ve moved it to the conference area where you plan to install it. +- Make sure your loading dock can accept a shipment on a pallet and hold it securely until it can be installed. +- Check for local labor union rules that would require you to use union labor to unload or move Surface Hub. +- Do not leave Surface Hub in a hot or humid environment. As with any computer-based or display equipment, heat and humidity can damage Surface Hub. The recommended storage temperatures are 32°F to 95°F with a relative humidity of less than 70 percent. + +### Moving Surface Hub + +Before you move Surface Hub, make sure that all the doorways, thresholds, hallways, and elevators are big enough to accommodate it. For information on the dimensions and weight of your Surface Hub in its shipping container, see [55” Microsoft Surface Hub technical information](surface-hub-technical-55.md) or [84” Microsoft Surface Hub technical information](surface-hub-technical-84.md). + +### Unpacking Surface Hub + +For unpacking information, refer to the unpacking guide included in the shipping container. You can open the unpacking instructions before you open the shipping container. These instructions can also be found here: http://www.microsoft.com/surface/support/surface-hub + +>[!IMPORTANT] +>Retain and store all Surface Hub shipping materials—including the pallet, container, and screws—in case you need to ship Surface Hub to a new location or send it +for repairs. For the 84” Surface Hub, retain the lifting handles. + +### Lifting Surface Hub + +The 55” Surface Hub requires two people to safely lift and mount. The 84” Surface Hub requires four people to safely lift and mount. Those assisting must be able to lift 70 pounds to waist height. Review the unpacking and mounting guide for details on lifting Surface Hub. You can find it at http://www.microsoft.com/surface/support/surface-hub. + +## Mounting and setup + +See the [Technical information]() section, or your mounting guide at http://www.microsoft.com/surface/support/surface-hub, for detailed instructions. + +There are three ways to mount your Surface Hub: + +- **Wall mount**: Lets you permanently hang Surface Hub on a conference space wall. +- **Floor support mount**: Supports Surface Hub on the floor while it is permanently anchored to a conference space wall. +- **Rolling stand**: Supports Surface Hub and lets you move it to other conference locations. For links to guides that provide details about each mounting method, including building requirements, see http://www.microsoft.com/surface/support/surface-hub. + + +## The Connect experience + +Connect lets people project their laptop, tablet, or phone to the Surface Hub screen. Connect allows wireless or wired connection types. + +#### Wireless connect + +Since wireless connect is based on Miracast, you don’t need cables or additional setup planning to use it. Your users can load Miracast on most Miracast-enabled Windows 8.1 and Windows 10 devices. Then they can project their display from their computer or phone to the Surface Hub screen. + + +#### Wired connect + +With wired connect, a cable transmits information from computers, tablets, or phones to Surface Hub. There are three video cable options, and they all use the same USB 2.0 cable. The cable bundle can include one or all of these connection options. + +- DisplayPort (DisplayPort cable + USB 2.0 cable) +- HDMI (HDMI cable + USB 2.0 cable) +- VGA (VGA cable + 3.5mm audio cable + USB 2.0 cable) + +For example, to provide audio, video, and touchback capability to all three video options, your Wired Connect cable bundle must include: + +- A DisplayPort cable +- An HDMI cable +- A VGA cable +- A USB 2.0 cable +- A 3.5mm cable + +When you create your wired connect cable bundles, check the [55” Microsoft Surface Hub technical information](surface-hub-technical-55.md) or [84” Microsoft Surface Hub technical information](surface-hub-technical-84.md) sections for specific technical and physical details and port locations for each type of Surface Hub. Make the cables long enough to reach from Surface Hub to where the presenter will sit or stand. + +For details on Touchback and Inkback, see the user guide at http://www.microsoft.com/surface/support/surface-hub. + + + +## See also + +[Watch the video (opens in a pop-up media player)][http://compass.xbox.com/assets/27/aa/27aa7dd7-7cb7-40ea-9bd6-c7de0795f68c.mov?n=04.07.16_installation_video_01_site_readiness.mov) + + + diff --git a/devices/surface-hub/surface-hub-ssd-replacement.md b/devices/surface-hub/surface-hub-ssd-replacement.md new file mode 100644 index 0000000000..277ceef816 --- /dev/null +++ b/devices/surface-hub/surface-hub-ssd-replacement.md @@ -0,0 +1,52 @@ +--- +title: Surface Hub SSD replacement +description: Learn how to replace the solid state drive in a Surface Hub. +ms.prod: surface-hub +ms.sitesec: library +author: jdeckerms +ms.author: jdecker +ms.topic: article +ms.localizationpriority: medium +--- + +# Surface Hub SSD replacement + +You might need to remove the solid state drive (SSD) from your Surface Hub so that you can reimage it using the [Surface Hub Recovery Tool](surface-hub-recovery-tool.md) or because you've been sent a replacement drive. You would reimage your SSD when the operating system is no longer bootable, such as from a Windows update failure, BitLocker issues, reset failure, or hardware failure. + + +>[!WARNING] +>Make sure the Surface Hub is turned off at the AC switch. + +1. Locate the SSD compartment door on the rear, upper portion of the Surface Hub in the locations illustrated below. The door is identifiable as it doesn't have open ventilation slots. + + ![SSD compartment door](images/ssd-location.png) + + *Surface Hub hard drive locations* + +2. Locate the locking tab on the hard drive compartment door. On the Surface Hub 55, the locking tab will be located on the left-hand side of the door. On the Surface Hub 84, it will be on the right-hand side as shown in the illustration. + + ![SSD compartment locking tab](images/ssd-lock-tab.png) + + *Locking tab on hard drive compartment door* + +3. Lift open the compartment door to access the hard drive. + + ![Lift](images/ssd-lift-door.png) + + *Lift compartment door* + +4. Locate the pull tab, which may be partially hidden under the rear cover. Pull on the tab to eject the hard drive from the compartment. + + ![Pull](images/ssd-pull-tab.png) + + *Pull tab* + +5. Slide the replacement drive into place until you hear it click. + + ![Slide in drive](images/ssd-click.png) + + *Slide replacement drive into place* + +6. Close the compartment door. + +7. Apply power to the Surface Hub. diff --git a/devices/surface-hub/surface-hub-technical-55.md b/devices/surface-hub/surface-hub-technical-55.md new file mode 100644 index 0000000000..bfcca2c16f --- /dev/null +++ b/devices/surface-hub/surface-hub-technical-55.md @@ -0,0 +1,151 @@ +--- +title: Technical information for 55" Surface Hub +description: Specifications for the 55" Surface Hub +ms.prod: surface-hub +ms.sitesec: library +author: jdeckerms +ms.author: jdecker +ms.topic: article +ms.localizationpriority: medium +--- + +# Technical information for 55" Surface Hub + +## Measurements + +| +--- | --- +Pricing | Starting at $8,999 +Size | 31.75” x 59.62” x 3.38” (806.4mm x 1514.3mm x 85.8mm) +Storage/RAM | SSD 128GB with 8GB RAM +Processor | 4th Generation Intel® Core™ i5 +Graphics | Intel® HD 4600 +Ports | **Internal PC**
• (1) USB 3.0 (bottom) + (1) USB 3.0 (side access)
• (2) USB 2.0
• Ethernet 1000 Base-T
• DisplayPort
• Video Output
• 3.5mm Stereo Out
• RJ11 Connector for system-level control
**Alternate PC**
• (2) USB 2.0 type B output
• Connection for Camera, Sensors, Microphone, Speakers
• (1) DisplayPort Video Input
**Guest PC**
• DisplayPort Video Input
• HDMI Video Input
• VGA Video Input
• 3.5mm Stereo Input
• (1) USB 2.0 type B Touchback™ Output +Sensors | (2) Passive Infrared Presence Sensors, Ambient Light Sensors +Speakers | (2) Front-facing stereo speakers +Microphone | High-Performance, 4-Element Array +Camera | (2) Wide angle HD cameras 1080p @ 30fps +Pen | (2) Powered, active, subpixel accuracy +Physical side buttons | Power, Input Select, Volume, Brightness +Software | Windows 10 + Office (Word, PowerPoint, Excel) +What’s in the box | • Surface Hub 55”
• (2) Surface Hub Pens
• Power Cable
• Setup Guide
• Start Guide
• Safety and Warranty documents
• Wireless All-in-One Keyboard +Mounting features | 4X VESA standard, 400mm x 400mm plus 1150mm x 400mm pattern, 8X M6 X 1.0 threaded mounting locations +Display height from floor | Recommended height of 55 inches (139.7 cm) to center of screen +Product weight | Approx. 105 lb. (47.6 kg) without accessories +Product shipping weight | Approx. 150 lb. (68 kg) +Product dimensions HxWxD | 31.63 x 59.62 x 3.2 inches (80.34 x 151.44 x 8.14 cm) +Product shipping dimensions HxWxD | 43 x 65 x 20 inches (109 x 165 x 51 cm) +Product thickness | Touch surface to mounting surface: ≤ 2.4 inches (6 cm) +Orientation | Landscape only. Display cannot be used in a portrait orientation. +BTU | 1706 BTU/h +Image resolution | 1920 x 1080 +Frame rate | 120Hz +EDID preferred timing, replacement PC | 1920 x 1080, 120Hz vertical refresh +EDID preferred timing, wired connect | 1920 x 1080, 60Hz vertical refresh +Input voltage | (50/60Hz) 110/230v nominal, 90-265v max +Input power, operating | 500W max +Input power, standby | 5W nominal + + +## Replacement PC connections + +Connector and location | Label | Description +--- | --- | --- +Switch, bottom I/O | ![](images/switch.png) | Switches the function between using internal PC or external PC. +Display port, bottom I/O | ![](images/dport.png) | Provides input for replacement PC. +USB type B, bottom I/O | ![](images/usb.png) | Provides USB connection for replacement PC to internal peripherals. +USB type B, bottom I/O | ![](images/usb.png) | Provides USB connection for integrated hub. + + +## Wired connect connections + +Connector and location | Label | Description +--- | --- | --- +Display port, bottom I/O | ![](images/dportio.png) | Provides input for wired connect PC. +HDMI, bottom I/O | ![](images/hdmi.png) | Provides HDMI input for wired connect PC. +VGA, bottom I/O | ![](images/vga.png) | Provides VGA input for wired connect PC. +3.5mm, bottom I/O | ![](images/35mm.png) | Provides analog audio input. +USB type B, bottom I/O | ![](images/usb.png) | Provides USB connection for video ingest touchback. + +## Additional connections + +Connector and location | Label | Description +--- | --- | --- +USB type A, side I/O | ![](images/usb.png) | Provides 1 USB 3.0 connection for USB devices. Wake-on USB capable. +USB type A, bottom I/O with blue insulator | ![](images/usb.png) | Provides USB 3.0 connection. +3.5mm, bottom I/O | ![](images/analog.png) | Provides analog audio out. +Display port, bottom I/O | ![](images/dportout.png) | Provides mirrored video out function to another display. +IEC/EN60320-C13 receptable with hard switch | ![](images/iec.png) | Provides AC input and compliance with EU power requirements. +RJ45, bottom I/O | ![](images/rj45.png) | Connects to Ethernet. +RJ11, bottom I/O | ![](images/rj11.png) | Connects to room control systems. + + + + + + + +## Diagrams of ports and clearances + +***Top view of 55" Surface Hub*** + +![](images/sh-55-top.png) + +--- + + +***Front view of 55" Surface Hub*** + +![](images/sh-55-front.png) + + +--- + +***Bottom view of 55" Surface Hub*** + +![](images/sh-55-bottom.png) + + +--- + +***Replacement PC ports on 55" Surface Hub*** + +![](images/sh-55-rpc-ports.png) + + +--- + +***Keypad on right side of 55" Surface Hub*** + +![](images/key-55.png) + + +--- + +***Rear view of 55" Surface Hub*** + +![](images/sh-55-rear.png) + + +--- + +***Clearances for 55" Surface Hub*** + +![](images/sh-55-clearance.png) + +--- + + +***Front and bottom handholds and clearances for 55" Surface Hub*** + +![](images/sh-55-hand.png) + + +--- + + +***Rear handholds and clearances for 55" Surface Hub*** + +![](images/sh-55-hand-rear.png) + + diff --git a/devices/surface-hub/surface-hub-technical-84.md b/devices/surface-hub/surface-hub-technical-84.md new file mode 100644 index 0000000000..b4c17e178c --- /dev/null +++ b/devices/surface-hub/surface-hub-technical-84.md @@ -0,0 +1,157 @@ +--- +title: Technical information for 84" Surface Hub +description: Specifications for the 84" Surface Hub +ms.prod: surface-hub +ms.sitesec: library +author: jdeckerms +ms.author: jdecker +ms.topic: article +ms.localizationpriority: medium +--- + +# Technical information for 84" Surface Hub + +## Measurements + +| +--- | --- +Pricing | Starting at $21,999 +Size | 46.12” x 86.7” x 4.15” (1171.5mm x 2202.9mm x 105.4mm) +Storage/RAM | SSD 128GB with 8GB RAM +Processor | 4th Generation Intel® Core™ i7 +Graphics | NVIDIA Quadro K2200 +Ports | **Internal PC**
• (1) USB 3.0 (bottom) + (1) USB 3.0 (side access)
• (4) USB 2.0
• Ethernet 1000 Base-T
• DisplayPort Video Output
• 3.5mm Stereo Out
• RJ11 Connector for system-level control
**Alternate PC**
• (2) USB 2.0 type B output
• connection for Camera, Sensors, Microphone, Speakers
• (2) DisplayPort Video Input
**Guest PC**
• DisplayPort Video Input
• HDMI Video Input
• VGA Video Input
• 3.5mm Stereo Input
• (1) USB 2.0 type B Touchback™ Output +Sensors | (2) Passive Infrared Presence Sensors, Ambient Light Sensors +Speakers | (2) Front-facing stereo speakers +Microphone | High-Performance, 4-Element Array +Camera | (2) Wide angle HD cameras 1080p @ 30fps +Pen | (2) Powered, active, subpixel accuracy +Physical side buttons | Power, Input Select, Volume, Brightness +Software | Windows 10 + Office (Word, PowerPoint, Excel) +What’s in the box | • Surface Hub 84”
• (2) Surface Hub Pens
• Power Cable
• Setup Guide
• Safety and Warranty documents
• Wireless All-in-One Keyboard +Mounting features | 4X VESA standard, 1200mm x 600mm pattern, 8X M8 X 1.25 threaded mounting locations +Display height from floor | Recommended height of 54 inches (139.7 cm) to center of screen +Product weight | Approx. 280 lb. (127 kg.) +Product shipping weight | Approx. 580 lb. (263 kg.) +Product dimensions HxWxD | 46 x 86.9 x 4.1 inches (116.8 x 220.6 x 10.4 cm) +Product shipping dimensions HxWxD | 66.14 x 88.19 x 24.4 inches (168 x 224 x 62 cm) +Product thickness | Touch surface to mounting surface: ≤ 3.1 inches (7.8 cm) +Orientation | Landscape only. Display cannot be used in a portrait orientation. +BTU | 3070.8 BTU/h +Image resolution | 3840 x 2160 +Frame rate | 120Hz +Contrast Ratio | 1400:1 +EDID preferred timing, replacement PC | 3840 x 2140, 120Hz vertical refresh +EDID preferred timing, wired connect | 1920 x 1080, 60Hz vertical refresh +Input voltage | 110/230v nominal, 90-265v max +Input power, operating | 900W max +Input power, standby | 5W nominal, 1-10W max + + +## Replacement PC connections + +Connector and location | Label | Description +--- | --- | --- +Switch, bottom I/O | ![](images/switch.png) | Switches the function between using internal PC or external PC. +Display port, bottom I/O | ![](images/dport.png) | Provides input for replacement PC. +Display port, bottom I/O | ![](images/dport.png) | Provides second input for replacement PC. +USB type B, bottom I/O | ![](images/usb.png) | Provides USB connection for replacement PC to internal peripherals. +USB type B, bottom I/O | ![](images/usb.png) | Provides USB connection for integrated hub. + + +## Wired connect connections + +Connector and location | Label | Description +--- | --- | --- +Display port, bottom I/O | ![](images/dportio.png) | Provides input for wired connect PC. +HDMI, bottom I/O | ![](images/hdmi.png) | Provides HDMI input for wired connect PC. +VGA, bottom I/O | ![](images/vga.png) | Provides VGA input for wired connect PC. +3.5mm, bottom I/O | ![](images/35mm.png) | Provides analog audio input. +USB type B, bottom I/O | ![](images/usb.png) | Provides USB connection for video ingest touchback. + +## Additional connections + +Connector and location | Label | Description +--- | --- | --- +USB type A, side I/O | ![](images/usb.png) | Provides 1 USB 3.0 connection for USB devices. Wake-on USB capable. +USB type A, bottom I/O with blue insulator | ![](images/usb.png) | Provides USB 3.0 connection. +3.5mm, bottom I/O | ![](images/analog.png) | Provides analog audio out. +Display port, bottom I/O | ![](images/dportout.png) | Provides mirrored video out function to another display. +IEC/EN60320-C13 receptable with hard switch | ![](images/iec.png) | Provides AC input and compliance with EU power requirements. +RJ45, bottom I/O | ![](images/rj45.png) | Connects to Ethernet. +RJ11, bottom I/O | ![](images/rj11.png) | Connects to room control systems. + + + + + + + +## Diagrams of ports and clearances + +***Top view of 84" Surface Hub*** + +![](images/sh-84-top.png) + +--- + + +***Front view of 84" Surface Hub*** + +![](images/sh-84-front.png) + + +--- + +***Bottom view of 84" Surface Hub*** + +![](images/sh-84-bottom.png) + + +--- + +***Replacement PC ports on 84" Surface Hub*** + +![](images/sh-84-rpc-ports.png) + + + +--- + +***Rear view of 84" Surface Hub*** + +![](images/sh-84-rear.png) + + +--- + +***Clearances for 84" Surface Hub*** + +![](images/sh-84-clearance.png) + +--- + + +***Removable lifting handles on 84” Surface Hub *** + +![](images/sh-84-hand.png) + + +--- + + +***Wall mount threads on back of 84” Surface Hub *** + +![](images/sh-84-wall.png) + +--- +***Lifting handles in top view of 84” Surface Hub*** + +![](images/sh-84-hand-top.png) + +--- +***Side view of 84” Surface Hub*** + +![](images/sh-84-side.png) + + diff --git a/devices/surface-hub/surface-hub.yml b/devices/surface-hub/surface-hub.yml index 0a9e948ca5..dac70e8f37 100644 --- a/devices/surface-hub/surface-hub.yml +++ b/devices/surface-hub/surface-hub.yml @@ -34,7 +34,7 @@ sections: - type: markdown text: " Prepare to deploy Surface Hub in your organization. Explore site readiness, assembly, configuration, and Exchange and ActiveSync policies.
- +

**Get ready for Surface Hub**
Explore the steps you'll need to take to set up Surface Hub.
Surface Hub Site Readiness Guide (PDF, 1.48 MB)
Unpacking guides

**Assembly for Surface Hub**
Learn how to assemble your Surface Hub.
Surface Hub Setup Guide (PDF, 1.43 MB)
Mounting and assembling guides

**Prepare your environment**
Learn about setup dependencies and account requirements.
Prepare your environment
Create and test a device account

**Get ready for Surface Hub**
Explore the steps you'll need to take to set up Surface Hub.
Surface Hub Site Readiness Guide (PDF, 1.48 MB)
Unpacking guides

**Assembly for Surface Hub**
Learn how to assemble your Surface Hub.
Surface Hub Setup Guide (PDF, 1.43 MB)
Mounting and assembling guides

**Prepare your environment**
Learn about setup dependencies and account requirements.
Prepare your environment
Create and test a device account
" - title: Deploy diff --git a/mdop/mbam-v25/how-to-enable-bitlocker-by-using-mbam-as-part-of-a-windows-deploymentmbam-25.md b/mdop/mbam-v25/how-to-enable-bitlocker-by-using-mbam-as-part-of-a-windows-deploymentmbam-25.md index 7c9ec9ded2..703010dfa2 100644 --- a/mdop/mbam-v25/how-to-enable-bitlocker-by-using-mbam-as-part-of-a-windows-deploymentmbam-25.md +++ b/mdop/mbam-v25/how-to-enable-bitlocker-by-using-mbam-as-part-of-a-windows-deploymentmbam-25.md @@ -14,7 +14,7 @@ ms.date: 04/23/2017 # How to Enable BitLocker by Using MBAM as Part of a Windows Deployment -This topic explains how to enable BitLocker on an end user's computer by using MBAM as part of your Windows imaging and deployment process. If you see a black screen at restart (after Install phase concludes) indicating that the drive cannot be unlocked, see [Windows versions prior Windows 10 build 1511 fail to start after "Setup Windows and Configuration Manager" step when Pre-Provision BitLocker is used with Windows PE 10.0.586.0 (1511)](https://blogs.technet.microsoft.com/system_center_configuration_manager_operating_system_deployment_support_blog/2016/03/30/windows-versions-prior-windows-10-build-1511-fail-to-start-after-setup-windows-and-configuration-manager-step-when-pre-provision-bitlocker-is-used-with-windows-pe-10-0-586-0-1511/). +This topic explains how to enable BitLocker on an end user's computer by using MBAM as part of your Windows imaging and deployment process. If you see a black screen at restart (after Install phase concludes) indicating that the drive cannot be unlocked, see [Earlier Windows versions don't start after "Setup Windows and Configuration Manager" step if Pre-Provision BitLocker is used with Windows 10, version 1511](https://support.microsoft.com/en-us/help/4494799/earlier-windows-versions-don-t-start-after-you-use-pre-provision-bitlo). **Prerequisites:** @@ -330,4 +330,4 @@ Here are a list of common error messages: ## Got a suggestion for MBAM? - Add or vote on suggestions [here](http://mbam.uservoice.com/forums/268571-microsoft-bitlocker-administration-and-monitoring). -- For MBAM issues, use the [MBAM TechNet Forum](https://social.technet.microsoft.com/Forums/home?forum=mdopmbam). \ No newline at end of file +- For MBAM issues, use the [MBAM TechNet Forum](https://social.technet.microsoft.com/Forums/home?forum=mdopmbam). diff --git a/store-for-business/microsoft-store-for-business-overview.md b/store-for-business/microsoft-store-for-business-overview.md index 276c980fae..0bf1fdc2d4 100644 --- a/store-for-business/microsoft-store-for-business-overview.md +++ b/store-for-business/microsoft-store-for-business-overview.md @@ -360,7 +360,7 @@ Customers in these markets can use Microsoft Store for Business and Education to - Ukraine ### Support to only manage products -Customers in these markets can use Microsoft Store for Business and Education only to manage products that they've purchased from other channels. For example, they might have purchased products through Volume Licensing Service Center. However, they can't purhcase apps directly from Microsoft Store for Business and Education. +Customers in these markets can use Microsoft Store for Business and Education only to manage products that they've purchased from other channels. For example, they might have purchased products through Volume Licensing Service Center. However, they can't purchase apps directly from Microsoft Store for Business and Education. - Puerto Rico This table summarize what customers can purchase, depending on which Microsoft Store they are using. diff --git a/windows/application-management/remove-provisioned-apps-during-update.md b/windows/application-management/remove-provisioned-apps-during-update.md index 489c97927a..b41972de75 100644 --- a/windows/application-management/remove-provisioned-apps-during-update.md +++ b/windows/application-management/remove-provisioned-apps-during-update.md @@ -17,17 +17,20 @@ When you update a computer running Windows 10, version 1703 or 1709, you might s >[!NOTE] >* This issue only occurs after a feature update (from one version to the next), not monthly updates or security-related updates. >* This only applies to first-party apps that shipped with Windows 10. This doesn't apply to third-party apps, Microsoft Store apps, or LOB apps. +>* This issue can occur whether you removed the app using `Remove-appxprovisionedpackage` or `Get-AppxPackage -allusers | Remove-AppxPackage -Allusers`. -To remove a provisioned app, you need to remove the provisioning package. The apps might reappear if you removed the packages in one of the following ways: +To remove a provisioned app, you need to remove the provisioning package. The apps might reappear if you [removed the packages](https://docs.microsoft.com/powershell/module/dism/remove-appxprovisionedpackage) in one of the following ways: * If you removed the packages while the wim file was mounted when the device was offline. * If you removed the packages by running a PowerShell cmdlet on the device while Windows was online. Although the apps won't appear for new users, you'll still see the apps for the user account you signed in as. -When you remove a provisioned app, we create a registry key that tells Windows not to reinstall or update that app the next time Windows is updated. If the computer isn't online when you deprovision the app, then we don't create that registry key. (This behavior is fixed in Windows 10, version 1803. If you're running Windows 10, version 1709, apply the latest security update to fix it.) +When you [remove a provisioned app](https://docs.microsoft.com/powershell/module/dism/remove-appxprovisionedpackage), we create a registry key that tells Windows not to reinstall or update that app the next time Windows is updated. If the computer isn't online when you deprovision the app, then we don't create that registry key. (This behavior is fixed in Windows 10, version 1803. If you're running Windows 10, version 1709, apply the latest security update to fix it.) + >[!NOTE] >If you remove a provisioned app while Windows is online, it's only removed for *new users*—the user that you signed in as will still have that provisioned app. That's because the registry key created when you deprovision the app only applies to new users created *after* the key is created. This doesn't happen if you remove the provisioned app while Windows is offline. + To prevent these apps from reappearing at the next update, manually create a registry key for each app, then update the computer. ## Create registry keys for deprovisioned apps @@ -38,7 +41,7 @@ Use the following steps to create a registry key: 2. Create a .reg file to generate a registry key for each app. Use [this list of Windows 10, version 1709 registry keys](#registry-keys-for-provisioned-apps) as your starting point. 1. Paste the list of registry keys into Notepad (or a text editor). 2. Remove the registry keys belonging to the apps you want to keep. For example, if you want to keep the Bing Weather app, delete this registry key: - ``` + ```yaml HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Appx\A ppxAllUserStore\Deprovisioned\Microsoft.BingWeather_8wekyb3d8bbwe] ``` 3. Save the file with a .txt extension, then right-click the file and change the extension to .reg. @@ -158,3 +161,9 @@ Windows Registry Editor Version 5.00 [HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Appx\AppxAllUserStore\Deprovisioned\Microsoft.ZuneVideo_8wekyb3d8bbwe] ``` + + + +[Get-AppxPackage](https://docs.microsoft.com/powershell/module/appx/get-appxpackage) +[Get-AppxPackage -allusers](https://docs.microsoft.com/powershell/module/appx/get-appxpackage) +[Remove-AppxPackage](https://docs.microsoft.com/powershell/module/appx/remove-appxpackage) diff --git a/windows/client-management/mdm/policy-csp-start.md b/windows/client-management/mdm/policy-csp-start.md index bbbecfc8b2..ee31dd0aa6 100644 --- a/windows/client-management/mdm/policy-csp-start.md +++ b/windows/client-management/mdm/policy-csp-start.md @@ -666,6 +666,13 @@ The following list shows the supported values: Enabling this policy prevents context menus from being invoked in the Start Menu. + +The following list shows the supported values: + +- 0 (default) – False (Do not disable). +- 1 - True (disable). + + ADMX Info: - GP English name: *Disable context menus in the Start Menu* @@ -1091,6 +1098,13 @@ Added in Windows 10, version 1709. Enabling this policy removes the people icon Value type is integer. + +The following list shows the supported values: + +- 0 (default) – False (do not hide). +- 1 - True (hide). + + ADMX Info: - GP English name: *Remove the People Bar from the taskbar* diff --git a/windows/client-management/mdm/policy-csp-storage.md b/windows/client-management/mdm/policy-csp-storage.md index 2760176424..101a8715e5 100644 --- a/windows/client-management/mdm/policy-csp-storage.md +++ b/windows/client-management/mdm/policy-csp-storage.md @@ -288,7 +288,7 @@ When Storage Sense runs, it can dehydrate cloud-backed content that hasn’t bee If the Storage/AllowStorageSenseGlobal policy is disabled, then this policy does not have any effect. -If you enable this policy setting, you must provide the number of days since a cloud-backed file has been opened before Storage Sense will dehydrate it. Supported values are: 0–365. +If you enable this policy setting, you must provide the minimum number of days a cloud-backed file can remain unopened before Storage Sense dehydrates it. Supported values are: 0–365. If you set this value to zero, Storage Sense will not dehydrate any cloud-backed content. The default value is 0, which never dehydrates cloud-backed content. @@ -357,7 +357,7 @@ When Storage Sense runs, it can delete files in the user’s Downloads folder if If the Storage/AllowStorageSenseGlobal policy is disabled, then this policy does not have any effect. -If you enable this policy setting, you must provide the number of days since a file in the Downloads folder has been opened before Storage Sense will delete it. Supported values are: 0–365. +If you enable this policy setting, you must provide the minimum number of days a file can remain unopened before Storage Sense deletes it from the Downloads folder. Supported values are: 0-365. If you set this value to zero, Storage Sense will not delete files in the user’s Downloads folder. The default is 0, or never deleting files in the Downloads folder. diff --git a/windows/client-management/mdm/vpnv2-csp.md b/windows/client-management/mdm/vpnv2-csp.md index 4142e8244f..b57e6e3f98 100644 --- a/windows/client-management/mdm/vpnv2-csp.md +++ b/windows/client-management/mdm/vpnv2-csp.md @@ -151,7 +151,7 @@ If set to True, this DomainName rule will trigger the VPN By default, this value is false. -Value type is bool. Persistent +Value type is bool.
**VPNv2/***ProfileName***/DomainNameInformationList/***dniRowId***/Persistent** Added in Windows 10, version 1607. A boolean value that specifies if the rule being added should persist even when the VPN is not connected. Value values: @@ -624,10 +624,10 @@ Profile example SplitTunnel - + .contoso.com 10.5.5.5 - + %ProgramFiles%\Internet Explorer\iexplore.exe diff --git a/windows/deployment/deploy-m365.md b/windows/deployment/deploy-m365.md index 1c5fe6c645..67561a162b 100644 --- a/windows/deployment/deploy-m365.md +++ b/windows/deployment/deploy-m365.md @@ -52,7 +52,7 @@ Examples of these two deployment advisors are shown below. ![Microsoft 365 deployment advisor](images/m365da.png) ## Windows Analytics deployment advisor example -![Windows Analytics deployment advisor](images/wada.png) + ## M365 Enterprise poster diff --git a/windows/deployment/deploy-windows-mdt/deploy-a-windows-10-image-using-mdt.md b/windows/deployment/deploy-windows-mdt/deploy-a-windows-10-image-using-mdt.md index c75048f117..1750d67101 100644 --- a/windows/deployment/deploy-windows-mdt/deploy-a-windows-10-image-using-mdt.md +++ b/windows/deployment/deploy-windows-mdt/deploy-a-windows-10-image-using-mdt.md @@ -488,7 +488,7 @@ Like the MDT Build Lab deployment share, the MDT Production deployment share nee   ## Step 8: Deploy the Windows 10 client image -These steps will walk you throug the process of using task sequences to deploy Windows 10 images through a fully automated process. First, you need to add the boot image to Windows Deployment Services (WDS) and then start the deployment. In contrast with deploying images from the MDT Build Lab deployment share, we recommend using the Pre-Installation Execution Environment (PXE) to start the full deployments in the datacenter, even though you technically can use an ISO/CD or USB to start the process. +These steps will walk you through the process of using task sequences to deploy Windows 10 images through a fully automated process. First, you need to add the boot image to Windows Deployment Services (WDS) and then start the deployment. In contrast with deploying images from the MDT Build Lab deployment share, we recommend using the Pre-Installation Execution Environment (PXE) to start the full deployments in the datacenter, even though you technically can use an ISO/CD or USB to start the process. ### Configure Windows Deployment Services diff --git a/windows/deployment/planning/windows-10-enterprise-faq-itpro.md b/windows/deployment/planning/windows-10-enterprise-faq-itpro.md index bebac9fa94..cd611c67ef 100644 --- a/windows/deployment/planning/windows-10-enterprise-faq-itpro.md +++ b/windows/deployment/planning/windows-10-enterprise-faq-itpro.md @@ -109,7 +109,7 @@ To find out which version of Windows 10 is right for your organization, you can ### How will people in my organization adjust to using Windows 10 Enterprise after upgrading from Windows 7 or Windows 8.1? -Windows 10 combines the best aspects of the user experience from Windows 8.1 and Windows 7 to make using Windows simple and straightforward. Users of Windows 7 will find the Start menu in the same location as they always have. In the same place, users of Windows 8.1 will find the live tiles from their Start screen, accessible by the Start button in the same way as they were accessed in Windows 8.1. To help you make the transition a seamless one, download the [Windows 10 for Business Onboarding Kit](https://blogs.technet.microsoft.com/windowsitpro/2016/06/28/windows-10-for-business-onboarding-kit/) and see our [end user readiness](https://technet.microsoft.com/windows/dn621092) resources. +Windows 10 combines the best aspects of the user experience from Windows 8.1 and Windows 7 to make using Windows simple and straightforward. Users of Windows 7 will find the Start menu in the same location as they always have. In the same place, users of Windows 8.1 will find the live tiles from their Start screen, accessible by the Start button in the same way as they were accessed in Windows 8.1. To help you make the transition a seamless one, download the [Windows 10 Adoption Planning Kit](https://info.microsoft.com/Windows10AdoptionPlanningKit) and see our [end user readiness](https://technet.microsoft.com/windows/dn621092) resources. ### How does Windows 10 help people work with applications and data across a variety of devices? @@ -127,4 +127,4 @@ Use the following resources for additional information about Windows 10. - If you are an IT professional or if you have a question about administering, managing, or deploying Windows 10 in your organization or business, visit the [Windows 10 IT Professional forums](https://social.technet.microsoft.com/forums/home?category=windows10itpro) on TechNet. - If you are an end user or if you have a question about using Windows 10, visit the [Windows 10 forums on Microsoft Community](https://answers.microsoft.com/windows/forum/windows_10). - If you are a developer or if you have a question about making apps for Windows 10, visit the [Windows Desktop Development forums](https://social.msdn.microsoft.com/forums/en-us/home?category=windowsdesktopdev) or [Windows and Windows phone apps forums](https://social.msdn.microsoft.com/forums/en-us/home?category=windowsapps) on MSDN. -- If you have a question about Internet Explorer, visit the [Internet Explorer forums](https://social.technet.microsoft.com/forums/ie/en-us/home) on TechNet. \ No newline at end of file +- If you have a question about Internet Explorer, visit the [Internet Explorer forums](https://social.technet.microsoft.com/forums/ie/en-us/home) on TechNet. diff --git a/windows/deployment/update/windows-as-a-service.md b/windows/deployment/update/windows-as-a-service.md index 624b72ef06..0b1327b761 100644 --- a/windows/deployment/update/windows-as-a-service.md +++ b/windows/deployment/update/windows-as-a-service.md @@ -25,6 +25,7 @@ Everyone wins when transparency is a top priority. We want you to know when upda The latest news:

    +
  • Improving the Windows 10 update experience with control, quality and transparency - April 4, 2019
  • Windows 10, version 1809 designated for broad deployment - March 28, 2019
  • Data, insights and listening to improve the customer experience - March 6, 2019
  • Getting to know the Windows update history pages - February 21, 2019
  • diff --git a/windows/deployment/upgrade/log-files.md b/windows/deployment/upgrade/log-files.md index 1e62227e0d..289b0b5793 100644 --- a/windows/deployment/upgrade/log-files.md +++ b/windows/deployment/upgrade/log-files.md @@ -55,7 +55,7 @@ Event logs: Generic rollbacks (0xC1900101) or unexpected reboots. ## Log entry structure -A setupact.log or setuperr.log entry includes the following elements: +A setupact.log or setuperr.log (files are located at C:\Windows) entry includes the following elements:
    1. The date and time - 2016-09-08 09:20:05. diff --git a/windows/deployment/windows-autopilot/existing-devices.md b/windows/deployment/windows-autopilot/existing-devices.md index 643cfeb6bd..0996810392 100644 --- a/windows/deployment/windows-autopilot/existing-devices.md +++ b/windows/deployment/windows-autopilot/existing-devices.md @@ -20,7 +20,7 @@ ms.topic: article Modern desktop management with Windows Autopilot enables you to easily deploy the latest version of Windows 10 to your existing devices. The apps you need for work can be automatically installed. Your work profile is synchronized, so you can resume working right away. -This topic describes how to convert Windows 7 domain-joined computers to Azure Active Directory-joined computers running Windows 10 by using Windows Autopilot. +This topic describes how to convert Windows 7 or Windows 8.1 domain-joined computers to Azure Active Directory-joined computers running Windows 10 by using Windows Autopilot. ## Prerequisites @@ -278,7 +278,7 @@ Next, ensure that all content required for the task sequence is deployed to dist ### Complete the client installation process -1. Open the Software Center on the target Windows 7 client computer. You can do this by clicking Start and then typing **software** in the search box, or by typing the following at a Windows PowerShell or command prompt: +1. Open the Software Center on the target Windows 7 or Windows 8.1 client computer. You can do this by clicking Start and then typing **software** in the search box, or by typing the following at a Windows PowerShell or command prompt: ``` C:\Windows\CCM\SCClient.exe diff --git a/windows/deployment/windows-autopilot/windows-autopilot-requirements.md b/windows/deployment/windows-autopilot/windows-autopilot-requirements.md index fc304b4020..358e9fefd8 100644 --- a/windows/deployment/windows-autopilot/windows-autopilot-requirements.md +++ b/windows/deployment/windows-autopilot/windows-autopilot-requirements.md @@ -22,16 +22,26 @@ Windows Autopilot depends on specific capabilities available in Windows 10, Azur - Windows 10 version 1703 (semi-annual channel) or higher is required. - The following editions are supported: - - Pro - - Pro Education - - Pro for Workstations - - Enterprise - - Education + - Windows 10 Pro + - Windows 10 Pro Education + - Windows 10 Pro for Workstations + - Windows 10 Enterprise + - Windows 10 Education + - Windows 10 Enterprise 2019 LTSC + + - If you're using Autopilot for Surface devices, note that only the following Surface devices support Autopilot: + - Surface Go + - Surface Go with LTE Advanced + - Surface Pro (5th gen) + - Surface Pro with LTE Advanced (5th gen) + - Surface Pro 6 + - Surface Laptop (1st gen) + - Surface Laptop 2 + - Surface Studio (1st gen) + - Surface Studio 2 + - Surface Book 2 -- Windows 10 Enterprise 2019 LTSC is also supported. - -See the following topics for details on licensing, network, and configuration requirements: -- [Licensing requirements](windows-autopilot-requirements-licensing.md) +See the following topics for details on network and configuration requirements: - [Networking requirements](windows-autopilot-requirements-network.md) - [Configuration requirements](windows-autopilot-requirements-configuration.md) - For details about specific configuration requirements to enable user-driven Hybrid Azure Active Directory join for Windows Autopilot, see [Intune Connector (preview) language requirements](intune-connector.md). This requirement is a temporary workaround, and will be removed in the next release of Intune Connector. diff --git a/windows/security/information-protection/windows-information-protection/create-wip-policy-using-sccm.md b/windows/security/information-protection/windows-information-protection/create-wip-policy-using-sccm.md index 2783e1edb2..101b9976ad 100644 --- a/windows/security/information-protection/windows-information-protection/create-wip-policy-using-sccm.md +++ b/windows/security/information-protection/windows-information-protection/create-wip-policy-using-sccm.md @@ -14,7 +14,7 @@ manager: dansimp audience: ITPro ms.collection: M365-security-compliance ms.topic: conceptual -ms.date: 02/26/2019 +ms.date: 04/05/2019 --- # Create and deploy a Windows Information Protection (WIP) policy using System Center Configuration Manager @@ -95,7 +95,7 @@ If you don't know the publisher or product name, you can find them for both desk **To find the Publisher and Product Name values for Store apps without installing them** -1. Go to the [Microsoft Store for Business](https://go.microsoft.com/fwlink/p/?LinkID=722910) website, and find your app. For example, Microsoft OneNote. +1. Go to the [Microsoft Store for Business](https://businessstore.microsoft.com/store) website, and find your app. For example, Microsoft OneNote. >[!NOTE] @@ -505,16 +505,11 @@ After you've finished configuring your policy, you can review all of your info o After you’ve created your WIP policy, you'll need to deploy it to your organization's devices. For info about your deployment options, see these topics: - [Operations and Maintenance for Compliance Settings in Configuration Manager](https://go.microsoft.com/fwlink/p/?LinkId=708224) -- [How to Create Configuration Baselines for Compliance Settings in Configuration Manager]( https://go.microsoft.com/fwlink/p/?LinkId=708225) +- [How to Create Configuration Baselines for Compliance Settings in Configuration Manager](https://go.microsoft.com/fwlink/p/?LinkId=708225) -- [How to Deploy Configuration Baselines in Configuration Manager]( https://go.microsoft.com/fwlink/p/?LinkId=708226) +- [How to Deploy Configuration Baselines in Configuration Manager](https://go.microsoft.com/fwlink/p/?LinkId=708226) ## Related topics -- [System Center Configuration Manager and Endpoint Protection (Version 1606)](https://go.microsoft.com/fwlink/p/?LinkId=717372) - -- [TechNet documentation for Configuration Manager](https://go.microsoft.com/fwlink/p/?LinkId=691623) - -- [Manage mobile devices with Configuration Manager and Microsoft Intune](https://go.microsoft.com/fwlink/p/?LinkId=691624) - [How to collect Windows Information Protection (WIP) audit event logs](collect-wip-audit-event-logs.md) diff --git a/windows/security/threat-protection/windows-defender-exploit-guard/attack-surface-reduction-exploit-guard.md b/windows/security/threat-protection/windows-defender-exploit-guard/attack-surface-reduction-exploit-guard.md index 2e78745404..e16b905b59 100644 --- a/windows/security/threat-protection/windows-defender-exploit-guard/attack-surface-reduction-exploit-guard.md +++ b/windows/security/threat-protection/windows-defender-exploit-guard/attack-surface-reduction-exploit-guard.md @@ -175,7 +175,12 @@ This rule blocks the following file types from launching unless they either meet >[!NOTE] >You must [enable cloud-delivered protection](https://docs.microsoft.com/en-us/windows/security/threat-protection/windows-defender-antivirus/enable-cloud-protection-windows-defender-antivirus) to use this rule. -Intune name: Executables that don't meet a prevalence, age, or trusted list criteria +>[!IMPORTANT] +>The rule **Block executable files from running unless they meet a prevalence, age, or trusted list criterion** with GUID 01443614-cd74-433a-b99e-2ecdc07bfc25 is owned by Microsoft and is not specified by admins. It uses cloud-delivered protection to update its trusted list regularly. +> +>You can specify individual files or folders (using folder paths or fully qualified resource names) but you can't specify which rules or exclusions apply to. + +Intune name: Executables that don't meet a prevalence, age, or trusted list criteria. SCCM name: Block executable files from running unless they meet a prevalence, age, or trusted list criteria diff --git a/windows/security/threat-protection/windows-defender-exploit-guard/enable-attack-surface-reduction.md b/windows/security/threat-protection/windows-defender-exploit-guard/enable-attack-surface-reduction.md index 469f6ba57b..c5d238cf59 100644 --- a/windows/security/threat-protection/windows-defender-exploit-guard/enable-attack-surface-reduction.md +++ b/windows/security/threat-protection/windows-defender-exploit-guard/enable-attack-surface-reduction.md @@ -37,7 +37,7 @@ You can exclude files and folders from being evaluated by most attack surface re You can specify individual files or folders (using folder paths or fully qualified resource names) but you can't specify which rules the exclusions apply to. >[!IMPORTANT] ->The rule **Block executable files from running unless they meet a prevalence, age, or trusted list criterion** with GUID 01443614-cd74-433a-b99e-2ecdc07bfc25, it's owned by microsoft and is not specified by admins. It uses Microsoft CLoud's Protection to update its trusted list regularly. You can specify individual files or folders (using folder paths or fully qualified resource names) but you can't specify which rules or exclusions apply to. +>The rule **Block executable files from running unless they meet a prevalence, age, or trusted list criterion** with GUID 01443614-cd74-433a-b99e-2ecdc07bfc25 is owned by Microsoft and is not specified by admins. It uses cloud-delivered protection to update its trusted list regularly. ASR rules support environment variables and wildcards. For information about using wildcards, see [Use wildcards in the file name and folder path or extension exclusion lists](https://docs.microsoft.com/windows/security/threat-protection/windows-defender-antivirus/configure-extension-file-exclusions-windows-defender-antivirus#use-wildcards-in-the-file-name-and-folder-path-or-extension-exclusion-lists). @@ -179,3 +179,4 @@ Value: c:\path|e:\path|c:\Whitelisted.exe - [Reduce attack surfaces with attack surface reduction rules](attack-surface-reduction-exploit-guard.md) - [Evaluate attack surface reduction](evaluate-attack-surface-reduction.md) +- [Enable cloud-delivered protection](https://docs.microsoft.com/windows/security/threat-protection/windows-defender-antivirus/enable-cloud-protection-windows-defender-antivirus) From 03d24fad2d232e17851a51ba9f5b872d829fd6d6 Mon Sep 17 00:00:00 2001 From: botmoto <42125490+botmoto@users.noreply.github.com> Date: Sun, 7 Apr 2019 16:23:10 -0700 Subject: [PATCH 129/724] Update credential-guard-manage.md Update credential-guard-manage.md Formatting Update credential-guard-manage.md --- .../credential-guard-manage.md | 20 +++++++++++-------- 1 file changed, 12 insertions(+), 8 deletions(-) diff --git a/windows/security/identity-protection/credential-guard/credential-guard-manage.md b/windows/security/identity-protection/credential-guard/credential-guard-manage.md index 0edce00395..e02b561b04 100644 --- a/windows/security/identity-protection/credential-guard/credential-guard-manage.md +++ b/windows/security/identity-protection/credential-guard/credential-guard-manage.md @@ -20,6 +20,7 @@ ms.date: 03/01/2019 **Applies to** - Windows 10 - Windows Server 2016 +- Windows Server 2019 Prefer video? See [Windows Defender Credential Guard Deployment](https://mva.microsoft.com/en-us/training-courses/deep-dive-into-credential-guard-16651?l=sRcyvLJyC_3304300474) in the Deep Dive into Windows Defender Credential Guard video series. @@ -150,13 +151,14 @@ To disable Windows Defender Credential Guard, you can use the following set of p 1. If you used Group Policy, disable the Group Policy setting that you used to enable Windows Defender Credential Guard (**Computer Configuration** -> **Administrative Templates** -> **System** -> **Device Guard** -> **Turn on Virtualization Based Security**). 2. Delete the following registry settings: - HKEY\_LOCAL\_MACHINE\\System\\CurrentControlSet\\Control\\LSA\LsaCfgFlags + - HKEY\_LOCAL\_MACHINE\\Software\\Policies\\Microsoft\\Windows\\DeviceGuard\\LsaCfgFlags +3. If you also wish to disable virtualization-based security delete the following registry settings: - HKEY\_LOCAL\_MACHINE\\Software\\Policies\\Microsoft\\Windows\\DeviceGuard\\EnableVirtualizationBasedSecurity - HKEY\_LOCAL\_MACHINE\\Software\\Policies\\Microsoft\\Windows\\DeviceGuard\\RequirePlatformSecurityFeatures - > [!IMPORTANT] > If you manually remove these registry settings, make sure to delete them all. If you don't remove them all, the device might go into BitLocker recovery. -3. Delete the Windows Defender Credential Guard EFI variables by using bcdedit. From an elevated command prompt, type the following commands: +4. Delete the Windows Defender Credential Guard EFI variables by using bcdedit. From an elevated command prompt, type the following commands: ``` syntax mountvol X: /s @@ -164,18 +166,20 @@ To disable Windows Defender Credential Guard, you can use the following set of p bcdedit /create {0cb3b571-2f2e-4343-a879-d86a476d7215} /d "DebugTool" /application osloader bcdedit /set {0cb3b571-2f2e-4343-a879-d86a476d7215} path "\EFI\Microsoft\Boot\SecConfig.efi" bcdedit /set {bootmgr} bootsequence {0cb3b571-2f2e-4343-a879-d86a476d7215} - bcdedit /set {0cb3b571-2f2e-4343-a879-d86a476d7215} loadoptions DISABLE-LSA-ISO,DISABLE-VBS + bcdedit /set {0cb3b571-2f2e-4343-a879-d86a476d7215} loadoptions DISABLE-LSA-ISO bcdedit /set {0cb3b571-2f2e-4343-a879-d86a476d7215} device partition=X: - bcdedit /set hypervisorlaunchtype off mountvol X: /d ``` -2. Restart the PC. -3. Accept the prompt to disable Windows Defender Credential Guard. -4. Alternatively, you can disable the virtualization-based security features to turn off Windows Defender Credential Guard. +5. Restart the PC. +6. Accept the prompt to disable Windows Defender Credential Guard. +7. Alternatively, you can disable the virtualization-based security features to turn off Windows Defender Credential Guard. > [!NOTE] -> The PC must have one-time access to a domain controller to decrypt content, such as files that were encrypted with EFS. If you want to turn off both Windows Defender Credential Guard and virtualization-based security, run the following bcdedit command after turning off all virtualization-based security Group Policy and registry settings: bcdedit /set {0cb3b571-2f2e-4343-a879-d86a476d7215} loadoptions DISABLE-LSA-ISO,DISABLE-VBS +> The PC must have one-time access to a domain controller to decrypt content, such as files that were encrypted with EFS. If you want to turn off both Windows Defender Credential Guard and virtualization-based security, run the following bcdedit commands after turning off all virtualization-based security Group Policy and registry settings: + + bcdedit /set {0cb3b571-2f2e-4343-a879-d86a476d7215} loadoptions DISABLE-LSA-ISO,DISABLE-VBS + bcdedit /set vsmlaunchtype off > [!NOTE] > Credential Guard and Device Guard are not currently supported when using Azure IaaS VMs. These options will be made available with future Gen 2 VMs. From c37e9090ec403646b1ff558804d6c60e436ca4de Mon Sep 17 00:00:00 2001 From: Brian Lich Date: Tue, 9 Apr 2019 08:38:06 -0700 Subject: [PATCH 130/724] new build 4/9/2019 8:38 AM --- .../basic-level-windows-diagnostic-events-and-fields-1903.md | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/windows/privacy/basic-level-windows-diagnostic-events-and-fields-1903.md b/windows/privacy/basic-level-windows-diagnostic-events-and-fields-1903.md index 92e4aa33bf..34823fd12d 100644 --- a/windows/privacy/basic-level-windows-diagnostic-events-and-fields-1903.md +++ b/windows/privacy/basic-level-windows-diagnostic-events-and-fields-1903.md @@ -13,7 +13,7 @@ manager: dansimp ms.collection: M365-security-compliance ms.topic: article audience: ITPro -ms.date: 04/07/2019 +ms.date: 04/09/2019 --- From 2c3b8fdf79507321990e18f920f6988faf0e1034 Mon Sep 17 00:00:00 2001 From: Brian Lich Date: Tue, 9 Apr 2019 08:38:15 -0700 Subject: [PATCH 131/724] new build 4/9/2019 8:38 AM --- ...ndows-diagnostic-events-and-fields-1703.md | 2 +- ...ndows-diagnostic-events-and-fields-1709.md | 2 +- ...ndows-diagnostic-events-and-fields-1803.md | 2 +- ...ndows-diagnostic-events-and-fields-1809.md | 263 +++++++----------- 4 files changed, 105 insertions(+), 164 deletions(-) diff --git a/windows/privacy/basic-level-windows-diagnostic-events-and-fields-1703.md b/windows/privacy/basic-level-windows-diagnostic-events-and-fields-1703.md index 98a6fb916a..f49cb11ad8 100644 --- a/windows/privacy/basic-level-windows-diagnostic-events-and-fields-1703.md +++ b/windows/privacy/basic-level-windows-diagnostic-events-and-fields-1703.md @@ -13,7 +13,7 @@ manager: dansimp ms.collection: M365-security-compliance ms.topic: article audience: ITPro -ms.date: 04/07/2019 +ms.date: 04/09/2019 --- diff --git a/windows/privacy/basic-level-windows-diagnostic-events-and-fields-1709.md b/windows/privacy/basic-level-windows-diagnostic-events-and-fields-1709.md index ccd32531ba..4481851e43 100644 --- a/windows/privacy/basic-level-windows-diagnostic-events-and-fields-1709.md +++ b/windows/privacy/basic-level-windows-diagnostic-events-and-fields-1709.md @@ -13,7 +13,7 @@ manager: dansimp ms.collection: M365-security-compliance ms.topic: article audience: ITPro -ms.date: 04/07/2019 +ms.date: 04/09/2019 --- diff --git a/windows/privacy/basic-level-windows-diagnostic-events-and-fields-1803.md b/windows/privacy/basic-level-windows-diagnostic-events-and-fields-1803.md index e0f05d671e..ff2f76bd70 100644 --- a/windows/privacy/basic-level-windows-diagnostic-events-and-fields-1803.md +++ b/windows/privacy/basic-level-windows-diagnostic-events-and-fields-1803.md @@ -13,7 +13,7 @@ manager: dansimp ms.collection: M365-security-compliance ms.topic: article audience: ITPro -ms.date: 04/07/2019 +ms.date: 04/09/2019 --- diff --git a/windows/privacy/basic-level-windows-diagnostic-events-and-fields-1809.md b/windows/privacy/basic-level-windows-diagnostic-events-and-fields-1809.md index 21218c05f5..21821ed181 100644 --- a/windows/privacy/basic-level-windows-diagnostic-events-and-fields-1809.md +++ b/windows/privacy/basic-level-windows-diagnostic-events-and-fields-1809.md @@ -13,7 +13,7 @@ manager: dansimp ms.collection: M365-security-compliance ms.topic: article audience: ITPro -ms.date: 04/05/2019 +ms.date: 04/08/2019 --- @@ -1741,8 +1741,6 @@ The following fields are available: - **PCFP** An ID for the system calculated by hashing hardware identifiers. - **PerfBackoff** Indicates if the run was invoked with logic to stop running when a user is present. Helps to understand why a run may have a longer elapsed time than normal. - **PerfBackoffInsurance** Indicates if appraiser is running without performance backoff because it has run with perf backoff and failed to complete several times in a row. -- **PerfBnDroff** No content is currently available. -- **PerfBnDroffInsurance** No content is currently available. - **RunAppraiser** Indicates if Appraiser was set to run at all. If this if false, it is understood that data events will not be received from this device. - **RunDate** The date that the telemetry run was stated, expressed as a filetime. - **RunGeneralTel** Indicates if the generaltel.dll component was run. Generaltel collects additional telemetry on an infrequent schedule and only from machines at telemetry levels higher than Basic. @@ -1807,7 +1805,6 @@ Provides information on IE and Census versions running on the device The following fields are available: -- **App�aiserRunEndTimeStamp** No content is currently available. - **AppraiserEnterpriseErrorCode** The error code of the last Appraiser enterprise run. - **AppraiserErrorCode** The error code of the last Appraiser run. - **AppraiserRunEndTimeStamp** The end time of the last Appraiser run. @@ -1875,10 +1872,8 @@ This event sends data about the BIOS and startup embedded in the device, to help The following fields are available: -- **Firmware�anufacturer** No content is currently available. - **FirmwareManufacturer** Represents the manufacturer of the device's firmware (BIOS). - **FirmwareReleaseDate** Represents the date the current firmware was released. -- **FirmwareRele�seDate** No content is currently available. - **FirmwareType** Represents the firmware type. The various types can be unknown, BIOS, UEFI. - **FirmwareVersion** Represents the version of the current firmware. @@ -1891,7 +1886,6 @@ The following fields are available: - **DeviceSampleRate** The telemetry sample rate assigned to the device. - **EnablePreviewBuilds** Used to enable Windows Insider builds on a device. -- **EnablePrevi�wBuilds** No content is currently available. - **FlightIds** A list of the different Windows Insider builds on this device. - **FlightingBranchName** The name of the Windows Insider branch currently used by the device. - **IsFlightsDisabled** Represents if the device is participating in the Windows Insider program. @@ -2253,7 +2247,6 @@ The following fields are available: - **AppStoreAutoUpdate** Retrieves the Appstore settings for auto upgrade. (Enable/Disabled). - **AppStoreAutoUpdateMDM** Retrieves the App Auto Update value for MDM: 0 - Disallowed. 1 - Allowed. 2 - Not configured. Default: [2] Not configured - **AppStoreAutoUpdatePolicy** Retrieves the Microsoft Store App Auto Update group policy setting -- **AppStoreAutoUpd�te** No content is currently available. - **DelayUpgrade** Retrieves the Windows upgrade flag for delaying upgrades. - **OSAssessmentFeatureOutOfDate** How many days has it been since a the last feature update was released but the device did not install it? - **OSAssessmentForFeatureUpdate** Is the device is on the latest feature update? @@ -2748,7 +2741,6 @@ The following fields are available: - **CensusStartTime** Returns timestamp corresponding to last successful census run. - **CensusTaskEnabled** Returns Boolean value for the census task (Enable/Disable) on client machine. - **LastConnectivityLossTime** Retrieves the last time the device lost free network. -- **LastGonnectivityLossTime** No content is currently available. - **NetworkState** Retrieves the network state: 0 = No network. 1 = Restricted network. 2 = Free network. - **NoNetworkTime** Retrieves the time spent with no network (since the last time) in seconds. - **RestrictedNetworkTime** Retrieves the time spent on a metered (cost restricted) network in seconds. @@ -2766,7 +2758,6 @@ The following fields are available: - **CensusTaskEnabled** True if Census is enabled, false otherwise. - **CompressedBytesUploaded** Number of compressed bytes uploaded. - **ConsumerDroppedCount** Number of events dropped at consumer layer of telemetry client. -- **CriticaDataThrottleDroppedCount** No content is currently available. - **CriticalDataDbDroppedCount** Number of critical data sampled events dropped at the database layer. - **CriticalDataThrottleDroppedCount** The number of critical data sampled events that were dropped because of throttling. - **CriticalOverflowEntersCounter** Number of times critical overflow mode was entered in event DB. @@ -2779,7 +2770,6 @@ The following fields are available: - **EtwDroppedBufferCount** Number of buffers dropped in the UTC ETW session. - **EtwDroppedCount** Number of events dropped at ETW layer of telemetry client. - **EventsPersistedCount** Number of events that reached the PersistEvent stage. -- **EventStoreLhfetimeResetCounter** No content is currently available. - **EventStoreLifetimeResetCounter** Number of times event DB was reset for the lifetime of UTC. - **EventStoreResetCounter** Number of times event DB was reset. - **EventStoreResetSizeSum** Total size of event DB across all resets reports in this instance. @@ -2792,7 +2782,6 @@ The following fields are available: - **InvalidHttpCodeCount** Number of invalid HTTP codes received from contacting Vortex. - **LastAgentConnectionError** Last non-timeout error encountered in the host/agent channel. - **LastEventSizeOffender** Event name of last event which exceeded max event size. -- **LastInvalhdHttpCode** No content is currently available. - **LastInvalidHttpCode** Last invalid HTTP code received from Vortex. - **MaxActiveAgentConnectionCount** The maximum number of active agents during this heartbeat timeframe. - **MaxInUseScenarioCounter** Soft maximum number of scenarios loaded by UTC. @@ -2803,7 +2792,6 @@ The following fields are available: - **SettingsHttpFailures** The number of failures from contacting the OneSettings service. - **ThrottledDroppedCount** Number of events dropped due to throttling of noisy providers. - **TopUploaderErrors** List of top errors received from the upload endpoint. -- **TopUploaderErross** No content is currently available. - **UploaderDroppedCount** Number of events dropped at the uploader layer of telemetry client. - **UploaderErrorCount** Number of errors received from the upload endpoint. - **VortexFailuresTimeout** The number of timeout failures received from Vortex. @@ -3416,19 +3404,15 @@ The following fields are available: - **AdapterTypeValue** The numeric value indicating the type of Graphics adapter. - **aiSeqId** The event sequence ID. -- **B2ightnessVersionViaDDI** No content is currently available. - **bootId** The system boot ID. - **BrightnessVersionViaDDI** The version of the Display Brightness Interface. - **ComputePreemptionLevel** The maximum preemption level supported by GPU for compute payload. -- **Dedic`tedSystemMemoryB** No content is currently available. -- **DedicatedSystemMemorqB** No content is currently available. - **DedicatedSystemMemoryB** The amount of system memory dedicated for GPU use (in bytes). - **DedicatedVideoMemoryB** The amount of dedicated VRAM of the GPU (in bytes). - **DisplayAdapterLuid** The display adapter LUID. - **DriverDate** The date of the display driver. - **DriverRank** The rank of the display driver. - **DriverVersion** The display driver version. -- **DX10UM@FilePath** No content is currently available. - **DX10UMDFilePath** The file path to the location of the DirectX 10 Display User Mode Driver in the Driver Store. - **DX11UMDFilePath** The file path to the location of the DirectX 11 Display User Mode Driver in the Driver Store. - **DX12UMDFilePath** The file path to the location of the DirectX 12 Display User Mode Driver in the Driver Store. @@ -3449,11 +3433,9 @@ The following fields are available: - **IsMsMiracastSupported** Are the GPU Miracast capabilities driven by a Microsoft solution? - **IsPostAdapter** Is this GPU the POST GPU in the device? - **IsRemovable** TRUE if the adapter supports being disabled or removed. -- **IsRenderDdvice** No content is currently available. - **IsRenderDevice** Does the GPU have rendering capabilities? - **IsSoftwareDevice** Is this a software implementation of the GPU? - **KMDFilePath** The file path to the location of the Display Kernel Mode Driver in the Driver Store. -- **MeastreEnabled** No content is currently available. - **MeasureEnabled** Is the device listening to MICROSOFT_KEYWORD_MEASURES? - **MsHybridDiscrete** Indicates whether the adapter is a discrete adapter in a hybrid configuration. - **NumVidPnSources** The number of supported display output sources. @@ -3463,7 +3445,6 @@ The following fields are available: - **SubVendorID** The GPU sub vendor ID. - **TelemetryEnabled** Is the device listening to MICROSOFT_KEYWORD_TELEMETRY? - **TelInvEvntTrigger** What triggered this event to be logged? Example: 0 (GPU enumeration) or 1 (DxgKrnlTelemetry provider toggling) -- **Tel�nvEvntTrigger** No content is currently available. - **version** The event version. - **WDDMVersion** The Windows Display Driver Model version. @@ -3552,11 +3533,8 @@ This event sends data about crashes for both native and managed applications, to The following fields are available: - **AppName** The name of the app that has crashed. -- **AppSessionGqid** No content is currently available. -- **AppSessionGui`** No content is currently available. - **AppSessionGuid** GUID made up of process ID and is used as a correlation vector for process instances in the telemetry backend. - **AppTimeStamp** The date/time stamp of the app. -- **AppVarsion** No content is currently available. - **AppVersion** The version of the app that has crashed. - **ExceptionCode** The exception code returned by the process that has crashed. - **ExceptionOffset** The address where the exception had occurred. @@ -3564,19 +3542,13 @@ The following fields are available: - **FriendlyAppName** The description of the app that has crashed, if different from the AppName. Otherwise, the process name. - **IsFatal** True/False to indicate whether the crash resulted in process termination. - **ModName** Exception module name (e.g. bar.dll). -- **ModPimeStamp** No content is currently available. -- **ModTimeSpamp** No content is currently available. - **ModTimeStamp** The date/time stamp of the module. - **ModVersion** The version of the module that has crashed. -- **PackaceRelativeAppId** No content is currently available. - **PackageFullName** Store application identity. -- **PackageRelativeAppHd** No content is currently available. - **PackageRelativeAppId** Store application identity. - **ProcessArchitecture** Architecture of the crashing process, as one of the PROCESSOR_ARCHITECTURE_* constants: 0: PROCESSOR_ARCHITECTURE_INTEL. 5: PROCESSOR_ARCHITECTURE_ARM. 9: PROCESSOR_ARCHITECTURE_AMD64. 12: PROCESSOR_ARCHITECTURE_ARM64. - **ProcessCreateTime** The time of creation of the process that has crashed. -- **ProcessI`** No content is currently available. - **ProcessId** The ID of the process that has crashed. -- **ReportAd** No content is currently available. - **ReportId** A GUID used to identify the report. This can used to track the report across Watson. - **TargetAppId** The kernel reported AppId of the application being reported. - **TargetAppVer** The specific version of the application being reported @@ -3698,7 +3670,6 @@ This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedevic The following fields are available: -- **HiddenAr`** No content is currently available. - **HiddenArp** Indicates whether a program hides itself from showing up in ARP. - **InstallDate** The date the application was installed (a best guess based on folder creation date heuristics). - **InstallDateArpLastModified** The date of the registry ARP key for a given application. Hints at install date but not always accurate. Passed as an array. Example: 4/11/2015 00:00:00 @@ -3707,15 +3678,12 @@ The following fields are available: - **InventoryVersion** The version of the inventory file generating the events. - **Language** The language code of the program. - **MsiPackageCode** A GUID that describes the MSI Package. Multiple 'Products' (apps) can make up an MsiPackage. -- **MsiPqckageCode** No content is currently available. - **MsiProductCode** A GUID that describe the MSI Product. - **Name** The name of the application. -- **OSVersionAtI~stallTi}e** No content is currently available. - **OSVersionAtInstallTime** The four octets from the OS version at the time of the application's install. - **PackageFullName** The package full name for a Store application. - **ProgramInstanceId** A hash of the file IDs in an app. - **Publisher** The Publisher of the application. Location pulled from depends on the 'Source' field. -- **RootDibPath** No content is currently available. - **RootDirPath** The path to the root directory where the program was installed. - **Source** How the program was installed (for example, ARP, MSI, Appx). - **StoreAppType** A sub-classification for the type of Microsoft Store app, such as UWP or Win8StoreApp. @@ -3924,8 +3892,6 @@ This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedevic The following fields are available: -- **** No content is currently available. -- **€** No content is currently available. - **BusReportedDescription** The description of the device reported by the bux. - **Class** The device setup class of the driver loaded for the device. - **ClassGuid** The device class unique identifier of the driver package loaded on the device. @@ -3939,8 +3905,6 @@ The following fields are available: - **DriverId** The unique identifier for the installed driver. - **DriverName** The name of the driver image file. - **DriverPackageStrongName** The immediate parent directory name in the Directory field of InventoryDriverPackage. -- **DriverPackageStrongName** No content is currently available. -- **DriverV** No content is currently available. - **DriverVerDate** The date associated with the driver installed on the device. - **DriverVerVersion** The version number of the driver installed on the device. - **Enumerator** Identifies the bus that enumerated the device. @@ -4581,6 +4545,19 @@ The following fields are available: - **UserInputTime** The amount of time the loader application spent waiting for user input. +## Migration events + +### Microsoft.Windows.MigrationCore.MigObjectCountKFSys + +This event returns data about the count of the migration objects across various phases during feature update. + +The following fields are available: + +- **knownFoldersSys[i]** The predefined folder path locations. +- **migDiagSession->CString** Identifies the phase of the upgrade where migration happens. +- **objectCount** The count of the number of objects that are being transferred. + + ## Miracast events ### Microsoft.Windows.Cast.Miracast.MiracastSessionEnd @@ -4760,19 +4737,61 @@ The following fields are available: - **winInetError** The HResult of the operation. -## Other events +## Privacy consent logging events -### Microsoft.Windows.MigrationCore.MigObjectCountKFSys +### Microsoft.Windows.Shell.PrivacyConsentLogging.PrivacyConsentCompleted -This event returns data about the count of the migration objects across various phases during feature update. +This event is used to determine whether the user successfully completed the privacy consent experience. The following fields are available: -- **knownFoldersSys[i]** The predefined folder path locations. -- **migDiagSession->CString** Identifies the phase of the upgrade where migration happens. -- **objectCount** The count of the number of objects that are being transferred. +- **presentationVersion** Which display version of the privacy consent experience the user completed +- **privacyConsentState** The current state of the privacy consent experience +- **settingsVersion** Which setting version of the privacy consent experience the user completed +- **userOobeExitReason** The exit reason of the privacy consent experience +### Microsoft.Windows.Shell.PrivacyConsentLogging.PrivacyConsentStatus + +Event tells us effectiveness of new privacy experience. + +The following fields are available: + +- **isAdmin** whether the person who is logging in is an admin +- **isExistingUser** whether the account existed in a downlevel OS +- **isLaunching** Whether or not the privacy consent experience will be launched +- **isSilentElevation** whether the user has most restrictive UAC controls +- **privacyConsentState** whether the user has completed privacy experience +- **userRegionCode** The current user's region setting + + +### wilActivity + +This event provides a Windows Internal Library context used for Product and Service diagnostics. + +The following fields are available: + +- **callContext** The function where the failure occurred. +- **currentContextId** The ID of the current call context where the failure occurred. +- **currentContextMessage** The message of the current call context where the failure occurred. +- **currentContextName** The name of the current call context where the failure occurred. +- **failureCount** The number of failures for this failure ID. +- **failureId** The ID of the failure that occurred. +- **failureType** The type of the failure that occurred. +- **fileName** The file name where the failure occurred. +- **function** The function where the failure occurred. +- **hresult** The HResult of the overall activity. +- **lineNumber** The line number where the failure occurred. +- **message** The message of the failure that occurred. +- **module** The module where the failure occurred. +- **originatingContextId** The ID of the originating call context that resulted in the failure. +- **originatingContextMessage** The message of the originating call context that resulted in the failure. +- **originatingContextName** The name of the originating call context that resulted in the failure. +- **threadId** The ID of the thread on which the activity is executing. + + +## Remediation events + ### Microsoft.Windows.Remediation.Applicable This event indicates a remedial plug-in is applicable if/when such a plug-in is detected. This is used to ensure Windows is up to date. @@ -5069,6 +5088,46 @@ The following fields are available: - **RunCount** The number of times the remediation event started (whether it completed successfully or not). +## Sediment events + +### Microsoft.Windows.Sediment.Info.DetailedState + +This event is sent when detailed state information is needed from an update trial run. + +The following fields are available: + +- **Data** Data relevant to the state, such as what percent of disk space the directory takes up. +- **Id** Identifies the trial being run, such as a disk related trial. +- **ReleaseVer** The version of the component. +- **State** The state of the reporting data from the trial, such as the top-level directory analysis. +- **Time** The time the event was fired. + + +### Microsoft.Windows.Sediment.Info.Error + +This event indicates an error in the updater payload. This information assists in keeping Windows up to date. + +The following fields are available: + +- **FailureType** The type of error encountered. +- **FileName** The code file in which the error occurred. +- **HResult** The failure error code. +- **LineNumber** The line number in the code file at which the error occurred. +- **ReleaseVer** The version information for the component in which the error occurred. +- **Time** The system time at which the error occurred. + + +### Microsoft.Windows.Sediment.Info.PhaseChange + +The event indicates progress made by the updater. This information assists in keeping Windows up to date. + +The following fields are available: + +- **NewPhase** The phase of progress made. +- **ReleaseVer** The version information for the component in which the change occurred. +- **Time** The system time at which the phase chance occurred. + + ### Microsoft.Windows.SedimentLauncher.Applicable Indicates whether a given plugin is applicable. @@ -5170,99 +5229,6 @@ The following fields are available: - **Result** This is the HRESULT for Detection or Perform Action phases of the plugin. -## Privacy consent logging events - -### Microsoft.Windows.Shell.PrivacyConsentLogging.PrivacyConsentCompleted - -This event is used to determine whether the user successfully completed the privacy consent experience. - -The following fields are available: - -- **presentationVersion** Which display version of the privacy consent experience the user completed -- **privacyConsentState** The current state of the privacy consent experience -- **settingsVersion** Which setting version of the privacy consent experience the user completed -- **userOobeExitReason** The exit reason of the privacy consent experience - - -### Microsoft.Windows.Shell.PrivacyConsentLogging.PrivacyConsentStatus - -Event tells us effectiveness of new privacy experience. - -The following fields are available: - -- **isAdmin** whether the person who is logging in is an admin -- **isExistingUser** whether the account existed in a downlevel OS -- **isLaunching** Whether or not the privacy consent experience will be launched -- **isSilentElevation** whether the user has most restrictive UAC controls -- **privacyConsentState** whether the user has completed privacy experience -- **userRegionCode** The current user's region setting - - -### wilActivity - -This event provides a Windows Internal Library context used for Product and Service diagnostics. - -The following fields are available: - -- **callContext** The function where the failure occurred. -- **currentContextId** The ID of the current call context where the failure occurred. -- **currentContextMessage** The message of the current call context where the failure occurred. -- **currentContextName** The name of the current call context where the failure occurred. -- **failureCount** The number of failures for this failure ID. -- **failureId** The ID of the failure that occurred. -- **failureType** The type of the failure that occurred. -- **fileName** The file name where the failure occurred. -- **function** The function where the failure occurred. -- **hresult** The HResult of the overall activity. -- **lineNumber** The line number where the failure occurred. -- **message** The message of the failure that occurred. -- **module** The module where the failure occurred. -- **originatingContextId** The ID of the originating call context that resulted in the failure. -- **originatingContextMessage** The message of the originating call context that resulted in the failure. -- **originatingContextName** The name of the originating call context that resulted in the failure. -- **threadId** The ID of the thread on which the activity is executing. - - -## Sediment events - -### Microsoft.Windows.Sediment.Info.DetailedState - -This event is sent when detailed state information is needed from an update trial run. - -The following fields are available: - -- **Data** Data relevant to the state, such as what percent of disk space the directory takes up. -- **Id** Identifies the trial being run, such as a disk related trial. -- **ReleaseVer** The version of the component. -- **State** The state of the reporting data from the trial, such as the top-level directory analysis. -- **Time** The time the event was fired. - - -### Microsoft.Windows.Sediment.Info.Error - -This event indicates an error in the updater payload. This information assists in keeping Windows up to date. - -The following fields are available: - -- **FailureType** The type of error encountered. -- **FileName** The code file in which the error occurred. -- **HResult** The failure error code. -- **LineNumber** The line number in the code file at which the error occurred. -- **ReleaseVer** The version information for the component in which the error occurred. -- **Time** The system time at which the error occurred. - - -### Microsoft.Windows.Sediment.Info.PhaseChange - -The event indicates progress made by the updater. This information assists in keeping Windows up to date. - -The following fields are available: - -- **NewPhase** The phase of progress made. -- **ReleaseVer** The version information for the component in which the change occurred. -- **Time** The system time at which the phase chance occurred. - - ## Setup events ### SetupPlatformTel.SetupPlatformTelActivityEvent @@ -6840,7 +6806,6 @@ This event is sent at the end of an app install or update to help keep Windows u The following fields are available: - **CatalogId** The name of the product catalog from which this app was chosen. -- **FailddRetry** No content is currently available. - **FailedRetry** Indicates whether the installation or update retry was successful. - **HResult** The HResult code of the operation. - **PFN** The Package Family Name of the app that is being installed or updated. @@ -7046,7 +7011,6 @@ The following fields are available: - **background** Is the download a background download? - **bytesFromCacheServer** Bytes received from a cache host. - **bytesFromCDN** The number of bytes received from a CDN source. -- **bytesFromG2oupPeers** No content is currently available. - **bytesFromGroupPeers** The number of bytes received from a peer in the same domain group. - **bytesFromIntPeers** The number of bytes received from peers not in the same LAN or in the same domain group. - **bytesFromLinkLocalPeers** The number of bytes received from local peers. @@ -7055,7 +7019,6 @@ The following fields are available: - **bytesRequested** The total number of bytes requested for download. - **cacheServerConnectionCount** Number of connections made to cache hosts. - **cdnConnectionCount** The total number of connections made to the CDN. -- **cdnErrorCkdes** No content is currently available. - **cdnErrorCodes** A list of CDN connection errors since the last FailureCDNCommunication event. - **cdnErrorCounts** The number of times each error in cdnErrorCodes was encountered. - **cdnIp** The IP address of the source CDN. @@ -7063,20 +7026,14 @@ The following fields are available: - **dataSourcesTotal** Bytes received per source type, accumulated for the whole session. - **dataSourcEsTotal** No content is currently available. - **doErrorCode** The Delivery Optimization error code that was returned. -- **doErrorCohe** No content is currently available. - **downlinkBps** The maximum measured available download bandwidth (in bytes per second). - **downlinkUsageBps** The download speed (in bytes per second). - **downloadMode** The download mode used for this file download session. - **downloadModeReason** Reason for the download. - **downloadModeSrc** Source of the DownloadMode setting (KvsProvider = 0, GeoProvider = 1, GeoVerProvider = 2, CpProvider = 3, DiscoveryProvider = 4, RegistryProvider = 5, GroupPolicyProvider = 6, MdmProvider = 7, SettingsProvider = 8, InvalidProviderType = 9). -- **downloadodel** No content is currently available. -- **downloadodelSrc** No content is currently available. -- **downlo�dMode** No content is currently available. -- **downlwadModeSvc** No content is currently available. - **experimentId** When running a test, this is used to correlate with other events that are part of the same test. - **expiresAt** The time when the content will expire from the Delivery Optimization Cache. - **fileID** The ID of the file being downloaded. -- **fileSaze** No content is currently available. - **fileSize** The size of the file being downloaded. - **gCurMemoryStreamBytes** Current usage for memory streaming. - **gMaxMemoryStreamBytes** Maximum usage for memory streaming. @@ -7086,20 +7043,15 @@ The following fields are available: - **isVpn** Is the device connected to a Virtual Private Network? - **jobID** Identifier for the Windows Update job. - **lanConnectionCount** The total number of connections made to peers in the same LAN. -- **larConnectionCount** No content is currently available. - **linkLocalConnectionCount** The number of connections made to peers in the same Link-local network. - **numPeers** The total number of peers used for this download. - **numPeersLocal** The total number of local peers used for this download. -- **nUrConnectionCount** No content is currently available. -- **nUrIp** No content is currently available. -- **precefinedCallerName** No content is currently available. - **predefinedCallerName** The name of the API Caller. - **restrictedUpload** Is the upload restricted? - **routeToCacheServer** The cache server setting, source, and value. - **sessionID** The ID of the download session. - **totalTimeMs** Duration of the download (in seconds). - **updateID** The ID of the update being downloaded. -- **uphinkUsag,Bps** No content is currently available. - **uplinkBps** The maximum measured available upload bandwidth (in bytes per second). - **uplinkUsageBps** The upload speed (in bytes per second). - **usedMemoryStream** TRUE if the download is using memory streaming for App downloads. @@ -7118,7 +7070,6 @@ The following fields are available: - **fileID** The ID of the file being paused. - **isVpn** Is the device connected to a Virtual Private Network? - **jobID** Identifier for the Windows Update job. -- **precefinedCallerName** No content is currently available. - **predefinedCallerName** The name of the API Caller object. - **reasonCode** The reason for pausing the download. - **routeToCacheServer** The cache server setting, source, and value. @@ -7133,7 +7084,6 @@ This event sends data describing the start of a new download to enable Delivery The following fields are available: - **background** Indicates whether the download is happening in the background. -- **bytesReqeested** No content is currently available. - **bytesRequested** Number of bytes requested for the download. - **cdnUrl** The URL of the source Content Distribution Network (CDN). - **costFlags** A set of flags representing network cost. @@ -7144,8 +7094,6 @@ The following fields are available: - **downloadMode** The download mode used for this file download session (CdnOnly = 0, Lan = 1, Group = 2, Internet = 3, Simple = 99, Bypass = 100). - **downloadModeReason** Reason for the download. - **downloadModeSrc** Source of the DownloadMode setting (KvsProvider = 0, GeoProvider = 1, GeoVerProvider = 2, CpProvider = 3, DiscoveryProvider = 4, RegistryProvider = 5, GroupPolicyProvider = 6, MdmProvider = 7, SettingsProvider = 8, InvalidProviderType = 9). -- **downloadodel** No content is currently available. -- **downloadodelSrc** No content is currently available. - **errorCode** The error code that was returned. - **experimentId** ID used to correlate client/services calls that are part of the same test during A/B testing. - **fileID** The ID of the file being downloaded. @@ -7157,7 +7105,6 @@ The following fields are available: - **isVpn** Indicates whether the device is connected to a Virtual Private Network. - **jobID** The ID of the Windows Update job. - **peerID** The ID for this delivery optimization client. -- **precefinedCallerName** No content is currently available. - **predefinedCallerName** Name of the API caller. - **routeToCacheServer** Cache server setting, source, and value. - **sessionID** The ID for the file download session. @@ -7181,7 +7128,6 @@ The following fields are available: - **experimentId** When running a test, this is used to correlate with other events that are part of the same test. - **fileID** The ID of the file being downloaded. - **httpStatusCode** The HTTP status code returned by the CDN. -- **isHeadRepuest** No content is currently available. - **isHeadRequest** The type of HTTP request that was sent to the CDN. Example: HEAD or GET - **peerType** The type of peer (LAN, Group, Internet, CDN, Cache Host, etc.). - **requestOffset** The byte offset within the file in the sent request. @@ -7635,19 +7581,14 @@ This event indicates that the update is no longer applicable to this device. The following fields are available: -- **_]TlgCV__** No content is currently available. - **EventPublishedTime** Time when this event was generated. - **flightID** The specific ID of the Windows Insider build. -- **flkghtID** No content is currently available. - **inapplicableReason** The reason why the update is inapplicable. -- **qevisionLumber** No content is currently available. - **revisionNumber** Update revision number. - **updateId** Unique Windows Update ID. - **updateScenarioType** Update session type. - **UpdateStatus** Last status of update. -- **upgateId** No content is currently available. - **UUPFallBackConfigured** Indicates whether UUP fallback is configured. -- **UUPFallBackConfigused** No content is currently available. - **wuDeviceid** Unique Device ID. From d38f75054d7a8e7093602aa084ee616c3da3870d Mon Sep 17 00:00:00 2001 From: Beth Levin Date: Tue, 9 Apr 2019 15:55:37 -0700 Subject: [PATCH 132/724] added new redirects --- .openpublishing.redirection.json | 7 ++++++- 1 file changed, 6 insertions(+), 1 deletion(-) diff --git a/.openpublishing.redirection.json b/.openpublishing.redirection.json index ab677cc666..ff7e5c472d 100644 --- a/.openpublishing.redirection.json +++ b/.openpublishing.redirection.json @@ -1047,7 +1047,12 @@ }, { "source_path": "windows/threat-protection/windows-defender-atp/manage-alerts-windows-defender-advanced-threat-protection.md", -"redirect_url": "/windows/security/threat-protection/windows-defender-atp/manage-alerts-windows-defender-advanced-threat-protection", +"redirect_url": "/windows/security/threat-protection/microsoft-defender-atp/manage-alerts", +"redirect_document_id": true +}, +{ +"source_path": "windows/security/threat-protection/windows-defender-atp/manage-alerts-windows-defender-advanced-threat-protection.md", +"redirect_url": "/windows/security/threat-protection/microsoft-defender-atp/manage-alerts", "redirect_document_id": true }, { From 2c847b994aa04b920b23aa258ab61f562a7f3f3c Mon Sep 17 00:00:00 2001 From: Brian Lich Date: Wed, 10 Apr 2019 07:58:08 -0700 Subject: [PATCH 133/724] new build 4/10/2019 7:58 AM --- ...el-windows-diagnostic-events-and-fields-1903.md | 14 +++++++------- 1 file changed, 7 insertions(+), 7 deletions(-) diff --git a/windows/privacy/basic-level-windows-diagnostic-events-and-fields-1903.md b/windows/privacy/basic-level-windows-diagnostic-events-and-fields-1903.md index 34823fd12d..bd6c4e2161 100644 --- a/windows/privacy/basic-level-windows-diagnostic-events-and-fields-1903.md +++ b/windows/privacy/basic-level-windows-diagnostic-events-and-fields-1903.md @@ -13,7 +13,7 @@ manager: dansimp ms.collection: M365-security-compliance ms.topic: article audience: ITPro -ms.date: 04/09/2019 +ms.date: 04/10/2019 --- @@ -4466,7 +4466,7 @@ The following fields are available: ### Microsoft.Windows.PBR.PBRPostApplyFailed -No content is currently available. +This event returns data indicating the failure of the reset/recovery process after the operating system files are restored. The following fields are available: @@ -4475,7 +4475,7 @@ The following fields are available: ### Microsoft.Windows.PBR.PBRPostApplyFinished -No content is currently available. +This event returns data indicating the completion of the reset/recovery process after the operating system files are restored. The following fields are available: @@ -4484,7 +4484,7 @@ The following fields are available: ### Microsoft.Windows.PBR.PBRPostApplyStarted -No content is currently available. +This event returns data indicating the start of the reset/recovery process after the operating system files are restored. The following fields are available: @@ -4493,7 +4493,7 @@ The following fields are available: ### Microsoft.Windows.PBR.PBRPreApplyFailed -No content is currently available. +This event returns data indicating the failure of the reset/recovery process before the operating system files are restored. The following fields are available: @@ -4502,7 +4502,7 @@ The following fields are available: ### Microsoft.Windows.PBR.PBRPreApplyFinished -No content is currently available. +This event returns data indicating the completion of the reset/recovery process before the operating system files are restored. The following fields are available: @@ -4511,7 +4511,7 @@ The following fields are available: ### Microsoft.Windows.PBR.PBRPreApplyStarted -No content is currently available. +This event returns data indicating the start of the reset/recovery process before the operating system files are restored. The following fields are available: From e9d5f1efa1a143e25d58bde7338313248efd2cd1 Mon Sep 17 00:00:00 2001 From: Brian Lich Date: Wed, 10 Apr 2019 07:58:14 -0700 Subject: [PATCH 134/724] new build 4/10/2019 7:58 AM --- ...ndows-diagnostic-events-and-fields-1703.md | 6 +- ...ndows-diagnostic-events-and-fields-1709.md | 6 +- ...ndows-diagnostic-events-and-fields-1803.md | 6 +- ...ndows-diagnostic-events-and-fields-1809.md | 63 ++++++------------- 4 files changed, 27 insertions(+), 54 deletions(-) diff --git a/windows/privacy/basic-level-windows-diagnostic-events-and-fields-1703.md b/windows/privacy/basic-level-windows-diagnostic-events-and-fields-1703.md index f49cb11ad8..cc4a260492 100644 --- a/windows/privacy/basic-level-windows-diagnostic-events-and-fields-1703.md +++ b/windows/privacy/basic-level-windows-diagnostic-events-and-fields-1703.md @@ -13,7 +13,7 @@ manager: dansimp ms.collection: M365-security-compliance ms.topic: article audience: ITPro -ms.date: 04/09/2019 +ms.date: 04/10/2019 --- @@ -2975,7 +2975,7 @@ The following fields are available: ### Microsoft.Windows.Remediation.Applicable -This event indicates a remedial plug-in is applicable if/when such a plug-in is detected. This is used to ensure Windows is up to date. +This event indicates whether a remediation plug-in is applicable, to help keep Windows up to date. A remediation plug-in addresses issues on the system that prevent the device from receiving security and quality updates. The following fields are available: @@ -3059,7 +3059,7 @@ The following fields are available: ### Microsoft.Windows.Remediation.Completed -This event enables completion tracking of a process that remediates issues preventing security and quality updates. +This event is sent when a remediation plug-in has completed, to help keep Windows up to date. A remediation plug-in addresses issues on the system that prevent the device from receiving security and quality updates. The following fields are available: diff --git a/windows/privacy/basic-level-windows-diagnostic-events-and-fields-1709.md b/windows/privacy/basic-level-windows-diagnostic-events-and-fields-1709.md index 4481851e43..aef6875c51 100644 --- a/windows/privacy/basic-level-windows-diagnostic-events-and-fields-1709.md +++ b/windows/privacy/basic-level-windows-diagnostic-events-and-fields-1709.md @@ -13,7 +13,7 @@ manager: dansimp ms.collection: M365-security-compliance ms.topic: article audience: ITPro -ms.date: 04/09/2019 +ms.date: 04/10/2019 --- @@ -3163,7 +3163,7 @@ The following fields are available: ### Microsoft.Windows.Remediation.Applicable -This event indicates a remedial plug-in is applicable if/when such a plug-in is detected. This is used to ensure Windows is up to date. +This event indicates whether a remediation plug-in is applicable, to help keep Windows up to date. A remediation plug-in addresses issues on the system that prevent the device from receiving security and quality updates. The following fields are available: @@ -3266,7 +3266,7 @@ The following fields are available: ### Microsoft.Windows.Remediation.Completed -This event enables completion tracking of a process that remediates issues preventing security and quality updates. +This event is sent when a remediation plug-in has completed, to help keep Windows up to date. A remediation plug-in addresses issues on the system that prevent the device from receiving security and quality updates. The following fields are available: diff --git a/windows/privacy/basic-level-windows-diagnostic-events-and-fields-1803.md b/windows/privacy/basic-level-windows-diagnostic-events-and-fields-1803.md index ff2f76bd70..1b2f1c8932 100644 --- a/windows/privacy/basic-level-windows-diagnostic-events-and-fields-1803.md +++ b/windows/privacy/basic-level-windows-diagnostic-events-and-fields-1803.md @@ -13,7 +13,7 @@ manager: dansimp ms.collection: M365-security-compliance ms.topic: article audience: ITPro -ms.date: 04/09/2019 +ms.date: 04/10/2019 --- @@ -4264,7 +4264,7 @@ The following fields are available: ### Microsoft.Windows.Remediation.Applicable -This event indicates a remedial plug-in is applicable if/when such a plug-in is detected. This is used to ensure Windows is up to date. +This event indicates whether a remediation plug-in is applicable, to help keep Windows up to date. A remediation plug-in addresses issues on the system that prevent the device from receiving security and quality updates. The following fields are available: @@ -4368,7 +4368,7 @@ The following fields are available: ### Microsoft.Windows.Remediation.Completed -This event enables completion tracking of a process that remediates issues preventing security and quality updates. +This event is sent when a remediation plug-in has completed, to help keep Windows up to date. A remediation plug-in addresses issues on the system that prevent the device from receiving security and quality updates. The following fields are available: diff --git a/windows/privacy/basic-level-windows-diagnostic-events-and-fields-1809.md b/windows/privacy/basic-level-windows-diagnostic-events-and-fields-1809.md index 21821ed181..a5e90b5538 100644 --- a/windows/privacy/basic-level-windows-diagnostic-events-and-fields-1809.md +++ b/windows/privacy/basic-level-windows-diagnostic-events-and-fields-1809.md @@ -13,7 +13,7 @@ manager: dansimp ms.collection: M365-security-compliance ms.topic: article audience: ITPro -ms.date: 04/08/2019 +ms.date: 04/10/2019 --- @@ -4794,7 +4794,7 @@ The following fields are available: ### Microsoft.Windows.Remediation.Applicable -This event indicates a remedial plug-in is applicable if/when such a plug-in is detected. This is used to ensure Windows is up to date. +This event indicates whether a remediation plug-in is applicable, to help keep Windows up to date. A remediation plug-in addresses issues on the system that prevent the device from receiving security and quality updates. The following fields are available: @@ -4802,13 +4802,13 @@ The following fields are available: - **AllowAutoUpdateProviderSetExists** No content is currently available. - **AppraiserBinariesValidResult** Indicates whether plug-in was appraised as valid. - **AppraiserRegistryValidResult** Indicates whether the registry entry checks out as valid. -- **AppraiserTaskRepairDisabled** No content is currently available. -- **AppraiserTaskValid** No content is currently available. -- **AUOptionsExists** No content is currently available. +- **AppraiserTaskRepairDisabled** Task repair performed by the appraiser plugin is disabled. +- **AppraiserTaskValid** Indicates that the appraiser task is valid. +- **AUOptionsExists** Indicates whether the Automatic Update option exist. - **CTACTargetingAttributesInvalid** No content is currently available. - **CTACVersion** No content is currently available. - **CV** Correlation vector -- **DataStoreSizeInBytes** No content is currently available. +- **DataStoreSizeInBytes** Size of the data store, in bytes. - **DateTimeDifference** The difference between local and reference clock times. - **DateTimeSyncEnabled** Indicates whether the datetime sync plug-in is enabled. - **daysSinceInstallThreshold** No content is currently available. @@ -4983,7 +4983,7 @@ The following fields are available: ### Microsoft.Windows.Remediation.Completed -This event enables completion tracking of a process that remediates issues preventing security and quality updates. +This event is sent when a remediation plug-in has completed, to help keep Windows up to date. A remediation plug-in addresses issues on the system that prevent the device from receiving security and quality updates. The following fields are available: @@ -5019,9 +5019,9 @@ The following fields are available: - **RemediationBatteryPowerOnBattery** True if we allow execution on battery. - **RemediationConfigurationTroubleshooterIpconfigFix** TRUE if IPConfig Fix completed successfully. - **RemediationConfigurationTroubleshooterNetShFix** TRUE if network card cache reset ran successfully. -- **RemediationCorruptionRepairCorruptionsDetected** No content is currently available. -- **RemediationCorruptionRepairCorruptionsFixed** No content is currently available. -- **RemediationCorruptionRepairPerformActionSuccessful** No content is currently available. +- **RemediationCorruptionRepairCorruptionsDetected** Number of corruptions detected on the device. +- **RemediationCorruptionRepairCorruptionsFixed** Number of detected corruptions that were fixed on the device. +- **RemediationCorruptionRepairPerformActionSuccessful** Indicates whether corruption repair was successful on the device. - **remediationExecution** Remediation shell is in "applying remediation" state. - **RemediationHibernationMigrated** TRUE if hibernation was migrated. - **RemediationHibernationMigrationSucceeded** TRUE if hibernation migration succeeded. @@ -5036,9 +5036,9 @@ The following fields are available: - **RemediationUpdateServiceHealthRemediationResult** The result of the Update Service Health plug-in. - **RemediationUpdateTaskHealthRemediationResult** The result of the Update Task Health plug-in. - **RemediationUpdateTaskHealthTaskList** A list of tasks fixed by the Update Task Health plug-in. -- **RemediationUSORebootRequred** No content is currently available. +- **RemediationUSORebootRequred** Indicates whether a reboot is determined to be required by calling the Update Service Orchestrator (USO). - **Result** The HRESULT for Detection or Perform Action phases of the plug-in. -- **RunCount** No content is currently available. +- **RunCount** The number of times the plugin has executed. - **RunResult** The HRESULT for Detection or Perform Action phases of the plug-in. - **ServiceHardeningExitCode** The exit code returned by Windows Service Repair. - **ServiceHealthEnabledBitMap** List of services updated by the plugin. @@ -5136,9 +5136,9 @@ The following fields are available: - **CV** Correlation vector. - **DetectedCondition** Boolean true if detect condition is true and perform action will be run. -- **FileVersion** No content is currently available. +- **FileVersion** The version of the data-link library (DLL) that will be applied by the self-update process. - **GlobalEventCounter** Client side counter which indicates ordering of events sent by this user. -- **IsHashMismatch** No content is currently available. +- **IsHashMismatch** Indicates whether the hash is a mismatch. - **IsSelfUpdateEnabledInOneSettings** True if self update enabled in Settings. - **IsSelfUpdateNeeded** True if self update needed by device. - **PackageVersion** Current package version of Remediation. @@ -5182,9 +5182,9 @@ The following fields are available: - **CV** Correlation vector. - **DetectedCondition** Determine whether action needs to run based on device properties. -- **FileVersion** No content is currently available. +- **FileVersion** The version of the dynamic-link library (DLL) that will be applied by the self-update process. - **GlobalEventCounter** Client side counter which indicates ordering of events sent by this user. -- **IsHashMismatch** No content is currently available. +- **IsHashMismatch** Indicates whether the hash is a mismatch. - **IsSelfUpdateEnabledInOneSettings** Indicates if self update is enabled in One Settings. - **IsSelfUpdateNeeded** Indicates if self update is needed. - **PackageVersion** Current package version of Remediation. @@ -5208,9 +5208,9 @@ The following fields are available: - **SedimentServiceCurrentBytes** Number of current private bytes of memory consumed by sedsvc.exe. - **SedimentServiceKillService** True/False if service is marked for kill (Shell.KillService). - **SedimentServiceMaximumBytes** Maximum bytes allowed for the service. -- **SedimentServiceRanShell** No content is currently available. +- **SedimentServiceRanShell** Indicates whether the shell was run by the service. - **SedimentServiceRetrievedKillService** True/False if result of One Settings check for kill succeeded - we only send back one of these indicators (not for each call). -- **SedimentServiceShellRunHResult** No content is currently available. +- **SedimentServiceShellRunHResult** The HRESULT returned when the shell was run by the service. - **SedimentServiceStopping** True/False indicating whether the service is stopping. - **SedimentServiceTaskFunctional** True/False if scheduled task is functional. If task is not functional this indicates plugins will be run. - **SedimentServiceTotalIterations** Number of 5 second iterations service will wait before running again. @@ -5263,10 +5263,8 @@ This service retrieves events generated by SetupPlatform, the engine that drives The following fields are available: -- **CroupName** No content is currently available. - **FieldName** Retrieves the event name/data point. Examples: InstallStartTime, InstallEndtime, OverallResult etc. - **GroupName** Retrieves the groupname the event belongs to. Example: Install Information, DU Information, Disk Space Information etc. -- **Valqe** No content is currently available. - **Value** Retrieves the value associated with the corresponding event name (Field Name). For example: For time related events this will include the system time. @@ -5278,9 +5276,6 @@ Scan process event on Windows Update client. See the EventScenario field for spe The following fields are available: -- **9ctivityMatchingId** No content is currently available. -- **9llowCachedResults** No content is currently available. -- **9pplicableUpdateInfo** No content is currently available. - **ActivityMatchingId** Contains a unique ID identifying a single CheckForUpdates session from initialization to completion. - **AllowCachedResults** Indicates if the scan allowed using cached results. - **ApplicableUpdateInfo** Metadata for the updates which were detected as applicable @@ -5320,18 +5315,15 @@ The following fields are available: - **HomeMobileOperator** The mobile operator that the device was originally intended to work with. - **IntentPFNs** Intended application-set metadata for atomic update scenarios. - **IPVersion** Indicates whether the download took place over IPv4 or IPv6 -- **IsWTfBEnabled** No content is currently available. - **IsWUfBDualScanEnabled** Indicates if Windows Update for Business dual scan is enabled on the device. - **IsWUfBEnabled** Indicates if Windows Update for Business is enabled on the device. - **IsWUfBFederatedScanDisabled** Indicates if Windows Update for Business federated scan is disabled on the device. - **MetadataIntegrityMode** The mode of the update transport metadata integrity check. 0-Unknown, 1-Ignoe, 2-Audit, 3-Enforce -- **MetadataYntegrityMode** No content is currently available. - **MSIError** The last error that was encountered during a scan for updates. - **NetworkConnectivityDetected** Indicates the type of network connectivity that was detected. 0 - IPv4, 1 - IPv6 - **NumberOfApplicableUpdates** The number of updates which were ultimately deemed applicable to the system after the detection process is complete - **NumberOfApplicationsCategoryScanEvaluated** The number of categories (apps) for which an app update scan checked - **NumberOfLoop** The number of round trips the scan required -- **NumberOfNewUpdatesFòomServiceSync** No content is currently available. - **NumberOfNewUpdatesFromServiceSync** The number of updates which were seen for the first time in this scan - **NumberOfUpdatesEvaluated** The total number of updates which were evaluated as a part of the scan - **NumFailedMetadataSignatures** The number of metadata signatures checks which failed for new metadata synced down. @@ -5360,7 +5352,6 @@ The following fields are available: - **TargetMetadataVersion** For self-initiated healing, this is the target version of the SIH engine to download (if needed). If not, the value is null. - **TotalNumMetadataSignatures** The total number of metadata signatures checks done for new metadata that was synced down. - **WebServiceRetryMethods** Web service method requests that needed to be retried to complete operation. -- **WEDeviceID** No content is currently available. - **WUDeviceID** The unique identifier of a specific device, used to identify how many devices are encountering success or a particular issue. @@ -5401,14 +5392,11 @@ Download process event for target update on Windows Update client. See the Event The following fields are available: -- **ActimeDownloadTime** No content is currently available. -- **ActiveDown¬oadTime** No content is currently available. - **ActiveDownloadTime** How long the download took, in seconds, excluding time where the update wasn't actively being downloaded. - **AppXBlockHashFailures** Indicates the number of blocks that failed hash validation during download of the app payload. - **AppXBlockHashValidationFailureCount** A count of the number of blocks that have failed validation after being downloaded. - **AppXDownloadScope** Indicates the scope of the download for application content. - **AppXScope** Indicates the scope of the app download. -- **AppXU3s8aHashFailures** No content is currently available. - **BiosFamily** The family of the BIOS (Basic Input Output System). - **BiosName** The name of the device BIOS. - **BiosReleaseDate** The release date of the device BIOS. @@ -5428,7 +5416,6 @@ The following fields are available: - **CDNCountryCode** Two letter country abbreviation for the Content Distribution Network (CDN) location. - **CDNId** ID which defines which CDN the software distribution client downloaded the content from. - **ClientVersion** The version number of the software distribution client. -- **ClientVersion€WUDeviceID** No content is currently available. - **CommonProps** A bitmask for future flags associated with the Windows Update client behavior. - **ConnectTime** Indicates the cumulative amount of time (in seconds) it took to establish the connection for all updates in an update bundle. - **CurrentMobileOperator** The mobile operator the device is currently connected to. @@ -5440,11 +5427,9 @@ The following fields are available: - **EventScenario** Indicates the purpose for sending this event: whether because the software distribution just started downloading content; or whether it was cancelled, succeeded, or failed. - **EventType** Identifies the type of the event (Child, Bundle, or Driver). - **ExtendedStatusCode** Secondary error code for certain scenarios where StatusCode wasn't specific enough. -- **FdightBuildNumber** No content is currently available. - **FeatureUpdatePause** Indicates whether feature OS updates are paused on the device. - **FlightBranch** The branch that a device is on if participating in flighting (pre-release builds). - **FlightBuildNumber** If this download was for a flight (pre-release build), this indicates the build number of that flight. -- **FlighTBuildNumber** No content is currently available. - **FlightId** The specific ID of the flight (pre-release build) the device is getting. - **FlightRing** The ring (speed of getting builds) that a device is on if participating in flighting (pre-release builds). - **HandlerType** Indicates what kind of content is being downloaded (app, driver, windows patch, etc.). @@ -5461,7 +5446,6 @@ The following fields are available: - **PackageFullName** The package name of the content. - **PhonePreviewEnabled** Indicates whether a phone was opted-in to getting preview builds, prior to flighting (pre-release builds) being introduced. - **PostDnldTime** Time (in seconds) taken to signal download completion after the last job completed downloading the payload. -- **ppXBlockHashFailures** No content is currently available. - **ProcessName** The process name of the application that initiated API calls, in the event where CallerApplicationName was not provided. - **QualityUpdatePause** Indicates whether quality OS updates are paused on the device. - **Reason** A 32-bit integer representing the reason the update is blocked from being downloaded in the background. @@ -5470,14 +5454,12 @@ The following fields are available: - **RelatedCV** The Correlation Vector that was used before the most recent change to a new Correlation Vector. - **RepeatFailCount** Indicates whether this specific content has previously failed. - **RepeatFailFlag** Indicates whether this specific content previously failed to download. -- **RevisionN´mber** No content is currently available. - **RevisionNumber** The revision number of the specified piece of content. - **ServiceGuid** A unique identifier for the service that the software distribution client is installing content for (Windows Update, Microsoft Store, etc). - **Setup360Phase** Identifies the active phase of the upgrade download if the current download is for an Operating System upgrade. - **ShippingMobileOperator** The mobile operator linked to the device when the device shipped. - **SizeCalcTime** Time (in seconds) taken to calculate the total download size of the payload. - **StatusCode** Indicates the result of a Download event (success, cancellation, failure code HResult). -- **StatusCodeÀExtendedStatusCode** No content is currently available. - **SystemBIOSMajorRelease** Major version of the BIOS. - **SystemBIOSMinorRelease** Minor version of the BIOS. - **TargetGroupId** For drivers targeted to a specific device model, this ID indicates the distribution group of devices receiving that driver. @@ -5492,7 +5474,6 @@ The following fields are available: - **UpdatEImportance** No content is currently available. - **UsedDO** Indicates whether the download used the Delivery Optimization (DO) service. - **UsedSystemVolume** Indicates whether the content was downloaded to the device's main system storage drive, or an alternate storage drive. -- **WUDeviceHD** No content is currently available. - **WUDeviceID** The unique identifier of a specific device, used to identify how many devices are encountering success or a particular issue. @@ -5554,8 +5535,6 @@ This event sends tracking data about the software distribution client installati The following fields are available: -- **œßæ½ßüØÆÔîÐck** No content is currently available. -- **2À@=2§3F'™+ck** No content is currently available. - **BiosFamily** The family of the BIOS (Basic Input Output System). - **BiosName** The name of the device BIOS. - **BiosReleaseDate** The release date of the device BIOS. @@ -5582,7 +5561,6 @@ The following fields are available: - **EventType** Possible values are Child, Bundle, or Driver. - **ExtendedErrorCode** The extended error code. - **ExtendedStatusCode** Secondary error code for certain scenarios where StatusCode is not specific enough. -- **ExtendEdStatusCode** No content is currently available. - **FeatureUpdatePause** Indicates whether feature OS updates are paused on the device. - **FlightBranch** The branch that a device is on if participating in the Windows Insider Program. - **FlightBuildNumber** If this installation was for a Windows Insider build, this is the build number of that build. @@ -5740,7 +5718,6 @@ The following fields are available: - **ApplicableUpdateInfo** Metadata for the updates which were detected as applicable. - **CallerApplicationName** The name provided by the caller who initiated API calls into the software distribution client. - **IntentPFNs** Intended application-set metadata for atomic update scenarios. -- **ItentPFNs** No content is currently available. - **NumberOfApplicableUpdates** The number of updates ultimately deemed applicable to the system after the detection process is complete. - **RelatedCV** The previous Correlation Vector that was used before swapping with a new one. - **ServiceGuid** An ID that represents which service the software distribution client is connecting to (Windows Update, Microsoft Store, etc.). @@ -5866,7 +5843,6 @@ The following fields are available: - **PackageCountTotalExpress** Total number of express packages. - **PackageCountTotalPSFX** The total number of PSFX packages. - **PackageExpressType** Type of express package. -- **PackageSizeCanonicad** No content is currently available. - **PackageSizeCanonical** Size of canonical packages in bytes. - **PackageSizeDiff** Size of diff packages in bytes. - **PackageSizeExpress** Size of express packages in bytes. @@ -6632,7 +6608,6 @@ This event is sent after the license is acquired when a product is being install The following fields are available: -- **AcgregatedPackageFullNames** No content is currently available. - **AggregatedPackageFullNames** Includes a set of package full names for each app that is part of an atomic set. - **AttemptNumber** The total number of attempts to acquire this product. - **CategoryId** The identity of the package or packages being installed. @@ -6733,7 +6708,6 @@ The following fields are available: - **ClientAppId** The identity of the app that initiated this operation. - **HResult** The result code of the last action performed. - **IsApplicability** Is this request to only check if there are any applicable packages to install? -- **IsInteractime** No content is currently available. - **IsInteractive** Is this user requested? - **IsOnline** Is the request doing an online check? @@ -7024,7 +6998,6 @@ The following fields are available: - **cdnIp** The IP address of the source CDN. - **cdnUrl** Url of the source Content Distribution Network (CDN). - **dataSourcesTotal** Bytes received per source type, accumulated for the whole session. -- **dataSourcEsTotal** No content is currently available. - **doErrorCode** The Delivery Optimization error code that was returned. - **downlinkBps** The maximum measured available download bandwidth (in bytes per second). - **downlinkUsageBps** The download speed (in bytes per second). From 61224eba217beb356a32d829c296658cf3d49a95 Mon Sep 17 00:00:00 2001 From: Beth Levin Date: Wed, 10 Apr 2019 10:39:43 -0700 Subject: [PATCH 135/724] path update --- .openpublishing.redirection.json | 35 ++++++++++++++++--- ...ows-defender-advanced-threat-protection.md | 10 +++--- 2 files changed, 34 insertions(+), 11 deletions(-) diff --git a/.openpublishing.redirection.json b/.openpublishing.redirection.json index ff7e5c472d..068c8c88fa 100644 --- a/.openpublishing.redirection.json +++ b/.openpublishing.redirection.json @@ -856,28 +856,53 @@ "redirect_document_id": true }, { +"source_path": "windows/security/threat-protection/windows-defender-atp/advanced-features-windows-defender-advanced-threat-protection.md", +"redirect_url": "/windows/security/threat-protection/microsoft-defender-atp/advanced-features", +"redirect_document_id": true +}, +{ "source_path": "windows/threat-protection/windows-defender-atp/advanced-features-windows-defender-advanced-threat-protection.md", -"redirect_url": "/windows/security/threat-protection/windows-defender-atp/advanced-features-windows-defender-advanced-threat-protection", +"redirect_url": "/windows/security/threat-protection/microsoft-defender-atp/advanced-features", +"redirect_document_id": false +}, +{ +"source_path": "windows/security/threat-protection/windows-defender-atp/alerts-queue-windows-defender-advanced-threat-protection.md", +"redirect_url": "/windows/security/threat-protection/microsoft-defender-atp/alerts-queue", "redirect_document_id": true }, { "source_path": "windows/threat-protection/windows-defender-atp/alerts-queue-windows-defender-advanced-threat-protection.md", -"redirect_url": "/windows/security/threat-protection/windows-defender-atp/alerts-queue-windows-defender-advanced-threat-protection", +"redirect_url": "/windows/security/threat-protection/microsoft-defender-atp/alerts-queue", +"redirect_document_id": true +}, +{ +"source_path": "windows/security/threat-protection/windows-defender-atp/api-portal-mapping-windows-defender-advanced-threat-protection.md", +"redirect_url": "/windows/security/threat-protection/microsoft-defender-atp/api-portal-mapping", "redirect_document_id": true }, { "source_path": "windows/threat-protection/windows-defender-atp/api-portal-mapping-windows-defender-advanced-threat-protection.md", -"redirect_url": "/windows/security/threat-protection/windows-defender-atp/api-portal-mapping-windows-defender-advanced-threat-protection", +"redirect_url": "/windows/security/threat-protection/microsoft-defender-atp/api-portal-mapping", +"redirect_document_id": true +}, +{ +"source_path": "windows/security/threat-protection/windows-defender-atp/assign-portal-access-windows-defender-advanced-threat-protection.md", +"redirect_url": "/windows/security/threat-protection/microsoft-defender-atp/assign-portal-access", "redirect_document_id": true }, { "source_path": "windows/threat-protection/windows-defender-atp/assign-portal-access-windows-defender-advanced-threat-protection.md", -"redirect_url": "/windows/security/threat-protection/windows-defender-atp/assign-portal-access-windows-defender-advanced-threat-protection", +"redirect_url": "/windows/security/threat-protection/microsoft-defender-atp/assign-portal-access", +"redirect_document_id": true +}, +{ +"source_path": "windows/security/threat-protection/windows-defender-atp/check-sensor-status-windows-defender-advanced-threat-protection.md", +"redirect_url": "/windows/security/threat-protection/microsoft-defender-atp/check-sensor-status", "redirect_document_id": true }, { "source_path": "windows/threat-protection/windows-defender-atp/check-sensor-status-windows-defender-advanced-threat-protection.md", -"redirect_url": "/windows/security/threat-protection/windows-defender-atp/check-sensor-status-windows-defender-advanced-threat-protection", +"redirect_url": "/windows/security/threat-protection/microsoft-defender-atp/check-sensor-status", "redirect_document_id": true }, { diff --git a/windows/security/threat-protection/windows-defender-atp/manage-suppression-rules-windows-defender-advanced-threat-protection.md b/windows/security/threat-protection/windows-defender-atp/manage-suppression-rules-windows-defender-advanced-threat-protection.md index 1ec412b1f3..9b89a258e4 100644 --- a/windows/security/threat-protection/windows-defender-atp/manage-suppression-rules-windows-defender-advanced-threat-protection.md +++ b/windows/security/threat-protection/windows-defender-atp/manage-suppression-rules-windows-defender-advanced-threat-protection.md @@ -22,21 +22,19 @@ ms.date: 04/24/2018 **Applies to:** - - [Windows Defender Advanced Threat Protection (Windows Defender ATP)](https://go.microsoft.com/fwlink/p/?linkid=2069559) - - >Want to experience Windows Defender ATP? [Sign up for a free trial.](https://www.microsoft.com/en-us/WindowsForBusiness/windows-atp?ocid=docs-wdatp-suppressionrules-abovefoldlink) -There might be scenarios where you need to suppress alerts from appearing in the portal. You can create suppression rules for specific alerts that are known to be innocuous such as known tools or processes in your organization. For more information on how to suppress alerts, see [Suppress alerts](manage-alerts-windows-defender-advanced-threat-protection.md#suppress-alerts). +There might be scenarios where you need to suppress alerts from appearing in the portal. You can create suppression rules for specific alerts that are known to be innocuous such as known tools or processes in your organization. For more information on how to suppress alerts, see [Suppress alerts](manage-alerts-windows-defender-advanced-threat-protection.md). You can view a list of all the suppression rules and manage them in one place. You can also turn an alert suppression rule on or off. ## Turn a suppression rule on or off + 1. In the navigation pane, select **Settings** > **Alert suppression**. The list of suppression rules that users in your organization have created is displayed. -2. Select a rule by clicking on the check-box beside the rule name. +2. Select a rule by clicking on the check-box beside the rule name. 3. Click **Turn rule on** or **Turn rule off**. @@ -47,5 +45,5 @@ You can view a list of all the suppression rules and manage them in one place. Y 2. Click on a rule name. Details of the rule is displayed. You'll see the rule details such as status, scope, action, number of matching alerts, created by, and date when the rule was created. You can also view associated alerts and the rule conditions. ## Related topics -- [Manage alerts](manage-alerts-windows-defender-advanced-threat-protection.md) +- [Manage alerts](manage-alerts-windows-defender-advanced-threat-protection.md) \ No newline at end of file From 72bb5b050586e4c18ca48b69e00cbb99d6f0af77 Mon Sep 17 00:00:00 2001 From: Joey Caparas Date: Wed, 10 Apr 2019 13:49:48 -0700 Subject: [PATCH 136/724] change folder name to mdatp from wdatp --- .../TOC.md | 0 ...defender-advanced-threat-protection-new.md | 0 ...ows-defender-advanced-threat-protection.md | 0 ...ows-defender-advanced-threat-protection.md | 0 ...ows-defender-advanced-threat-protection.md | 0 ...ows-defender-advanced-threat-protection.md | 0 ...lerts-queue-endpoint-detection-response.md | 0 ...ows-defender-advanced-threat-protection.md | 0 ...defender-advanced-threat-protection-new.md | 0 .../api-hello-world.md | 0 ...ows-defender-advanced-threat-protection.md | 0 .../apis-intro.md | 0 ...ows-defender-advanced-threat-protection.md | 0 ...ows-defender-advanced-threat-protection.md | 0 ...ows-defender-advanced-threat-protection.md | 0 ...ows-defender-advanced-threat-protection.md | 0 ...ows-defender-advanced-threat-protection.md | 0 ...defender-advanced-threat-protection-new.md | 0 ...ows-defender-advanced-threat-protection.md | 0 ...ows-defender-advanced-threat-protection.md | 0 ...ows-defender-advanced-threat-protection.md | 0 .../configure-attack-surface-reduction.md | 0 ...ows-defender-advanced-threat-protection.md | 0 ...ows-defender-advanced-threat-protection.md | 0 ...ows-defender-advanced-threat-protection.md | 0 ...ows-defender-advanced-threat-protection.md | 0 ...ows-defender-advanced-threat-protection.md | 0 ...ows-defender-advanced-threat-protection.md | 0 ...ows-defender-advanced-threat-protection.md | 0 ...ows-defender-advanced-threat-protection.md | 0 ...ows-defender-advanced-threat-protection.md | 0 .../configure-microsoft-threat-experts.md | 0 ...ows-defender-advanced-threat-protection.md | 0 ...ows-defender-advanced-threat-protection.md | 0 ...ows-defender-advanced-threat-protection.md | 0 ...ows-defender-advanced-threat-protection.md | 0 ...ows-defender-advanced-threat-protection.md | 0 ...defender-advanced-threat-protection-new.md | 0 .../custom-detection-rules.md | 0 ...ows-defender-advanced-threat-protection.md | 0 ...ows-defender-advanced-threat-protection.md | 0 ...ows-defender-advanced-threat-protection.md | 0 ...ows-defender-advanced-threat-protection.md | 0 ...defender-advanced-threat-protection-new.md | 0 .../deprecate.md | 0 ...ows-defender-advanced-threat-protection.md | 0 ...ows-defender-advanced-threat-protection.md | 0 ...ows-defender-advanced-threat-protection.md | 0 .../evaluate-atp.md | 0 ...ows-defender-advanced-threat-protection.md | 0 ...ows-defender-advanced-threat-protection.md | 0 .../exposed-apis-create-app-nativeapp.md | 0 .../exposed-apis-create-app-webapp.md | 0 .../exposed-apis-full-sample-powershell.md | 0 .../exposed-apis-list.md | 0 .../exposed-apis-odata-samples.md | 0 ...defender-advanced-threat-protection-new.md | 0 ...defender-advanced-threat-protection-new.md | 0 ...defender-advanced-threat-protection-new.md | 0 ...ows-defender-advanced-threat-protection.md | 0 ...defender-advanced-threat-protection-new.md | 0 ...defender-advanced-threat-protection-new.md | 0 ...defender-advanced-threat-protection-new.md | 0 ...defender-advanced-threat-protection-new.md | 0 ...defender-advanced-threat-protection-new.md | 0 ...defender-advanced-threat-protection-new.md | 0 ...defender-advanced-threat-protection-new.md | 0 ...ows-defender-advanced-threat-protection.md | 156 ++--- ...defender-advanced-threat-protection-new.md | 0 ...defender-advanced-threat-protection-new.md | 0 ...defender-advanced-threat-protection-new.md | 0 ...defender-advanced-threat-protection-new.md | 0 ...defender-advanced-threat-protection-new.md | 0 ...defender-advanced-threat-protection-new.md | 0 ...defender-advanced-threat-protection-new.md | 0 ...defender-advanced-threat-protection-new.md | 0 ...defender-advanced-threat-protection-new.md | 0 ...defender-advanced-threat-protection-new.md | 0 ...ows-defender-advanced-threat-protection.md | 152 ++--- ...defender-advanced-threat-protection-new.md | 0 ...defender-advanced-threat-protection-new.md | 0 ...defender-advanced-threat-protection-new.md | 0 ...defender-advanced-threat-protection-new.md | 0 ...defender-advanced-threat-protection-new.md | 0 ...ows-defender-advanced-threat-protection.md | 152 ++--- ...defender-advanced-threat-protection-new.md | 0 ...ows-defender-advanced-threat-protection.md | 166 ++--- ...defender-advanced-threat-protection-new.md | 0 .../get-started.md | 0 ...defender-advanced-threat-protection-new.md | 0 ...defender-advanced-threat-protection-new.md | 0 ...defender-advanced-threat-protection-new.md | 0 ...defender-advanced-threat-protection-new.md | 0 .../images/1.png | Bin .../images/AH_icon.png | Bin .../images/AR_icon.png | Bin .../images/ASR_icon.png | Bin .../images/EDR_icon.jpg | Bin .../images/EDR_icon.png | Bin .../images/Failed.png | Bin .../images/MTE_icon.jpg | Bin .../images/MTE_icon.png | Bin .../images/NGP_icon.jpg | Bin .../images/NGP_icon.png | Bin .../images/No threats found.png | Bin .../images/Partially investigated.png | Bin .../images/Partially remediated.png | Bin .../images/Pending.png | Bin .../images/Remediated.png | Bin .../images/Running.png | Bin .../images/SS_icon.png | Bin .../images/TVM_icon.png | Bin .../images/Terminated by system.png | Bin .../images/WDATP-components.png | Bin .../images/active-alerts-tile.png | Bin .../images/active-threat-icon.png | Bin .../images/advanced-features.png | Bin .../images/advanced-hunting-query-example.PNG | Bin .../images/advanced-hunting-save-query.PNG | Bin .../images/alert-details.png | Bin .../images/alert-icon.png | Bin .../images/alerts-q-bulk.png | Bin .../images/alerts-queue-list.png | Bin .../images/alerts-queue-numbered.png | Bin .../images/analysis-results.png | Bin .../images/api-jwt-ms.png | Bin .../images/api-tenant-id.png | Bin .../atp-Application-Guard-events-icon.png | Bin .../images/atp-Device-Guard-events-icon.png | Bin .../images/atp-ETW-event-icon.png | Bin .../images/atp-Exploit-Guard-events-icon.png | Bin .../images/atp-File-path-icon.png | Bin .../images/atp-Firewall-events-icon.png | Bin .../images/atp-O365-admin-portal-customer.png | Bin .../images/atp-Other-events-icon.png | Bin .../images/atp-Smart-Screen-events-icon.png | Bin .../atp-access-token-modification-icon.png | Bin .../images/atp-action-block-file.png | Bin .../atp-action-center-app-restriction.png | Bin .../atp-action-center-package-collection.png | Bin .../images/atp-action-center-restrict-app.png | Bin .../images/atp-action-center-with-info.png | Bin .../images/atp-actions-action-center.png | Bin ...-actions-collect-investigation-package.png | Bin .../images/atp-actions-isolate-machine.png | Bin .../images/atp-actions-manage-tags.png | Bin .../atp-actions-release-from-isolation.png | Bin .../atp-actions-release-from-isoloation.png | Bin .../atp-actions-remove-app-restrictions.png | Bin .../atp-actions-restrict-app-execution.png | Bin .../images/atp-actions-run-av.png | Bin .../images/atp-active-investigations-tile.png | Bin .../images/atp-actor-alert.png | Bin .../images/atp-actor-report.png | Bin .../images/atp-actor.png | Bin .../images/atp-add-application-name.png | Bin .../images/atp-add-application.png | Bin .../images/atp-add-intune-policy.png | Bin .../images/atp-advanced-hunting-query.png | Bin .../atp-advanced-hunting-results-filter.PNG | Bin .../atp-advanced-hunting-results-set.png | Bin .../images/atp-advanced-hunting.png | Bin .../images/atp-alert-details.png | Bin .../images/atp-alert-mgt-pane.png | Bin .../images/atp-alert-page.png | Bin .../images/atp-alert-process-tree.png | Bin .../images/atp-alert-source.png | Bin .../images/atp-alert-status.png | Bin .../images/atp-alert-timeline-numbered.png | Bin .../images/atp-alert-timeline.png | Bin .../images/atp-alert-view.png | Bin .../images/atp-alerts-group.png | Bin .../images/atp-alerts-q.png | Bin .../images/atp-alerts-queue-user.png | Bin .../images/atp-alerts-queue.png | Bin .../images/atp-alerts-related-to-file.png | Bin .../images/atp-alerts-related-to-machine.PNG | Bin .../images/atp-alerts-selected.png | Bin .../images/atp-alerts-tile.png | Bin .../images/atp-alertsq1.png | Bin .../images/atp-alertsq2.png | Bin .../images/atp-analyze-auto-ir.png | Bin .../images/atp-app-restriction.png | Bin .../images/atp-application-information.png | Bin .../images/atp-approve-reject-action.png | Bin .../images/atp-appsource.png | Bin .../images/atp-auto-investigation-pending.png | Bin .../images/atp-auto-investigations-list.png | Bin ...tp-automated-investigations-statistics.png | Bin .../images/atp-av-scan-action-center.png | Bin .../images/atp-av-scan-notification.png | Bin .../images/atp-azure-api-access.png | Bin .../images/atp-azure-assign-role.png | Bin .../images/atp-azure-atp-app.png | Bin .../images/atp-azure-atp-machine-user.png | Bin .../images/atp-azure-atp-machine.png | Bin .../images/atp-azure-create.png | Bin .../images/atp-azure-intune-category.png | Bin .../images/atp-azure-intune-configure.png | Bin ...p-azure-intune-create-policy-configure.png | Bin .../atp-azure-intune-create-policy-name.png | Bin .../images/atp-azure-intune-create-policy.png | Bin .../atp-azure-intune-create-profile.png | Bin .../images/atp-azure-intune-create.png | Bin .../images/atp-azure-intune-device-config.png | Bin .../images/atp-azure-intune-save-policy.png | Bin .../images/atp-azure-intune-save.png | Bin .../images/atp-azure-intune-select-group.png | Bin .../atp-azure-intune-settings-configure.png | Bin .../images/atp-azure-intune.png | Bin .../images/atp-azure-license-icon.png | Bin .../images/atp-azure-new-app.png | Bin .../images/atp-azure-required-permissions.png | Bin .../images/atp-azure-select-permissions.png | Bin .../images/atp-azure-ui-user-access.png | Bin .../images/atp-billing-licenses.png | Bin .../images/atp-billing-subscriptions.png | Bin .../images/atp-block-file-confirm.png | Bin .../images/atp-block-file.png | Bin .../images/atp-blockfile.png | Bin .../atp-cloud-discovery-dashboard-menu.png | Bin .../atp-collect-investigation-package.png | Bin .../images/atp-command-line-icon.png | Bin .../images/atp-community-center.png | Bin .../atp-conditional-access-numbered.png | Bin .../images/atp-conditional-access.png | Bin .../images/atp-confirm-isolate.png | Bin .../images/atp-create-dashboard.png | Bin .../images/atp-create-suppression-rule.png | Bin .../images/atp-custom-oma-uri.png | Bin .../images/atp-custom-ti-mapping.png | Bin .../images/atp-daily-machines-reporting.png | Bin .../atp-dashboard-security-analytics-9.png | Bin .../atp-dashboard-security-analytics-full.png | Bin .../atp-dashboard-security-analytics.png | Bin .../images/atp-data-not-available.png | Bin .../images/atp-data-ready.png | Bin .../images/atp-data-retention-policy.png | Bin .../images/atp-delete-query.png | Bin .../images/atp-detailed-actor.png | Bin .../images/atp-disableantispyware-regkey.png | Bin .../images/atp-download-connector.png | Bin .../images/atp-enable-security-analytics.png | Bin .../images/atp-example-email-notification.png | Bin .../atp-export-machine-timeline-events.png | Bin .../images/atp-file-action.png | Bin .../images/atp-file-creation-icon.png | Bin .../images/atp-file-details.png | Bin .../images/atp-file-in-org.png | Bin .../images/atp-file-information.png | Bin .../images/atp-file-observed-icon.png | Bin .../images/atp-filter-advanced-hunting.png | Bin ...rd-endpoints-warning-before-atp-access.png | Bin .../images/atp-final-preference-setup.png | Bin .../images/atp-geographic-location-setup.png | Bin .../images/atp-get-data.png | Bin .../images/atp-gpo-proxy1.png | Bin .../images/atp-gpo-proxy2.png | Bin .../images/atp-image.png | Bin .../images/atp-improv-opps-9.png | Bin .../images/atp-improv-opps.png | Bin .../images/atp-improv-ops.png | Bin .../images/atp-incident-details-page.png | Bin .../images/atp-incident-details.png | Bin .../images/atp-incident-evidence-tab.png | Bin .../images/atp-incident-graph-details.png | Bin .../images/atp-incident-graph-tab.png | Bin .../images/atp-incident-graph.png | Bin .../atp-incident-investigations-tab.png | Bin .../images/atp-incident-machine-tab.png | Bin .../images/atp-incident-queue.png | Bin ...ncidents-alerts-incidentlinkedbyreason.png | Bin .../atp-incidents-alerts-linkedbytooltip.png | Bin .../images/atp-incidents-alerts-reason.png | Bin .../images/atp-incidents-alerts-tooltip.png | Bin .../images/atp-incidents-mgt-pane.png | Bin .../images/atp-industry-information.png | Bin .../images/atp-intune-add-oma.png | Bin .../images/atp-intune-add-policy.png | Bin .../images/atp-intune-assignments.png | Bin .../images/atp-intune-configure.png | Bin .../images/atp-intune-create-policy.png | Bin .../images/atp-intune-custom.png | Bin .../images/atp-intune-deploy-policy.png | Bin .../images/atp-intune-group.png | Bin .../images/atp-intune-manage-deployment.png | Bin .../images/atp-intune-new-policy.png | Bin .../images/atp-intune-oma-uri-setting.png | Bin .../images/atp-intune-policy-name.png | Bin .../images/atp-intune-save-deployment.png | Bin .../images/atp-intune-save-policy.png | Bin ...tp-investigation-package-action-center.png | Bin .../images/atp-isolate-machine.png | Bin .../images/atp-licensing-azure-portal.png | Bin .../images/atp-loading.png | Bin .../images/atp-logo-icon.png | Bin .../images/atp-machine-actions-undo.png | Bin .../images/atp-machine-actions.png | Bin .../images/atp-machine-details-view.png | Bin .../images/atp-machine-details-view2.png | Bin .../images/atp-machine-health-details.png | Bin .../images/atp-machine-health.png | Bin .../images/atp-machine-icon.png | Bin .../atp-machine-investigation-package.png | Bin .../images/atp-machine-isolation.png | Bin .../atp-machine-timeline-details-panel.png | Bin .../images/atp-machine-timeline-export.png | Bin .../images/atp-machine-timeline-filter.png | Bin .../images/atp-machine-timeline.png | Bin .../images/atp-machine-view-ata.png | Bin .../atp-machines-active-threats-tile.png | Bin .../images/atp-machines-at-risk.png | Bin .../atp-machines-list-misconfigured.png | Bin .../images/atp-machines-list-view.png | Bin .../images/atp-machines-list-view2.png | Bin .../images/atp-machines-timeline.png | Bin .../images/atp-machines-view-list.png | Bin .../images/atp-main-portal.png | Bin .../images/atp-manage-tags.png | Bin .../images/atp-mapping 3.png | Bin .../images/atp-mapping1.png | Bin .../images/atp-mapping2.png | Bin .../images/atp-mapping3.png | Bin .../images/atp-mapping4.png | Bin .../images/atp-mapping5.png | Bin .../images/atp-mapping6.png | Bin .../images/atp-mapping7.png | Bin .../images/atp-mcas-settings.png | Bin .../images/atp-mdm-onboarding-package.png | Bin .../images/atp-memory-allocation-icon.png | Bin .../images/atp-mma-properties.png | Bin .../images/atp-mma.png | Bin .../images/atp-module-load-icon.png | Bin .../images/atp-ms-secure-score-9.png | Bin .../images/atp-ms-secure-score.png | Bin .../atp-network-communications-icon.png | Bin .../images/atp-new-alerts-list.png | Bin .../images/atp-new-suppression-rule.png | Bin .../images/atp-no-network-connection.png | Bin .../images/atp-no-subscriptions-found.png | Bin .../atp-not-authorized-to-access-portal.png | Bin .../images/atp-notification-action.png | Bin .../atp-notification-collect-package.png | Bin .../images/atp-notification-file.png | Bin .../images/atp-notification-isolate.png | Bin .../images/atp-notification-restrict.png | Bin .../images/atp-notifications.png | Bin .../images/atp-observed-in-organization.png | Bin .../images/atp-observed-machines.png | Bin .../images/atp-oma-uri-values.png | Bin ...ard-endpoints-WDATP-portal-border-test.png | Bin .../atp-onboard-endpoints-WDATP-portal.png | Bin ...p-onboard-endpoints-run-detection-test.png | Bin .../images/atp-onboard-endpoints.png | Bin .../images/atp-onboard-mdm.png | Bin .../images/atp-org-score.png | Bin .../images/atp-org-sec-score.png | Bin .../images/atp-organization-size.png | Bin .../images/atp-pending-actions-auto-ir.png | Bin .../images/atp-pending-actions-file.png | Bin .../images/atp-pending-actions-list.png | Bin .../images/atp-pending-actions-multiple.png | Bin .../atp-pending-actions-notification.png | Bin .../images/atp-permissions-applications.png | Bin .../images/atp-portal-sensor.png | Bin .../images/atp-portal-welcome-screen.png | Bin .../images/atp-portal.png | Bin .../images/atp-powerbi-accept.png | Bin .../images/atp-powerbi-consent.png | Bin .../images/atp-powerbi-extension.png | Bin .../images/atp-powerbi-get-data.png | Bin .../images/atp-powerbi-importing.png | Bin .../images/atp-powerbi-navigator.png | Bin .../images/atp-powerbi-options.png | Bin .../images/atp-powerbi-preview.png | Bin .../atp-powershell-command-run-icon.png | Bin .../images/atp-preferences-setup.png | Bin .../images/atp-preview-experience.png | Bin .../images/atp-preview-features.png | Bin .../images/atp-process-event-icon.png | Bin .../images/atp-process-injection.png | Bin .../images/atp-process-tree.png | Bin .../images/atp-refresh-token.png | Bin .../images/atp-region-control-panel.png | Bin .../images/atp-registry-event-icon.png | Bin .../images/atp-remediated-alert.png | Bin .../images/atp-remove-blocked-file.png | Bin .../images/atp-rename-incident.png | Bin .../images/atp-respond-action-icon.png | Bin .../images/atp-restrict-app.png | Bin .../images/atp-run-av-scan.png | Bin .../images/atp-running-script.png | Bin .../images/atp-sample-custom-ti-alert.png | Bin .../images/atp-save-query.png | Bin .../images/atp-save-tag.png | Bin .../images/atp-sec-coverage.png | Bin .../images/atp-sec-ops-1.png | Bin .../images/atp-sec-ops-dashboard.png | Bin .../atp-security-analytics-dashboard.png | Bin .../atp-security-analytics-view-machines.png | Bin .../atp-security-analytics-view-machines2.png | Bin .../images/atp-security-controls-9.png | Bin .../images/atp-security-controls.png | Bin .../images/atp-security-coverage.png | Bin .../images/atp-security-improvements.png | Bin .../images/atp-security-score-over-time-9.png | Bin .../images/atp-security-score-over-time.png | Bin .../images/atp-sensor-filter.png | Bin .../atp-sensor-health-filter-resized.png | Bin .../images/atp-sensor-health-filter-tile.png | Bin .../images/atp-sensor-health-filter.png | Bin .../images/atp-sensor-health-nonav.png | Bin .../images/atp-sensor-health-tile.png | Bin .../atp-server-offboarding-workspaceid.png | Bin .../atp-server-onboarding-workspaceid.png | Bin .../images/atp-server-onboarding.png | Bin .../images/atp-services.png | Bin .../images/atp-settings-aip.png | Bin .../images/atp-settings-powerbi.png | Bin .../images/atp-setup-complete.png | Bin .../images/atp-setup-incomplete.png | Bin .../atp-setup-permissions-wdatp-portal.png | Bin .../images/atp-shared-queries.png | Bin .../images/atp-siem-integration.png | Bin .../images/atp-siem-mapping1.png | Bin .../images/atp-siem-mapping13.png | Bin .../images/atp-siem-mapping2.png | Bin .../images/atp-siem-mapping3.png | Bin .../images/atp-siem-mapping4.png | Bin .../images/atp-signer-icon.png | Bin .../images/atp-simulate-custom-ti.png | Bin .../images/atp-stop-quarantine-file.png | Bin .../images/atp-stop-quarantine.png | Bin .../images/atp-stopnquarantine-file.png | Bin .../images/atp-subscription-expired.png | Bin .../images/atp-suppression-rules.png | Bin .../images/atp-suspicious-activities-tile.png | Bin .../images/atp-tag-management.png | Bin .../images/atp-task-manager.png | Bin .../images/atp-threat-intel-api.png | Bin .../images/atp-threat-protection-reports.png | Bin .../images/atp-thunderbolt-icon.png | Bin .../images/atp-tile-sensor-health.png | Bin .../images/atp-time-zone.png | Bin .../images/atp-undo-isolation.png | Bin .../images/atp-unsigned-file-icon.png | Bin .../images/atp-user-details-pane.png | Bin .../images/atp-user-details-view-azureatp.png | Bin .../images/atp-user-details-view-tdp.png | Bin .../images/atp-user-details-view.png | Bin .../images/atp-user-details.png | Bin .../images/atp-user-view-ata.png | Bin .../images/atp-users-at-risk.png | Bin .../images/atp-verify-passive-mode.png | Bin .../atp-windows-cloud-instance-creation.png | Bin .../atp-windows-defender-av-events-icon.png | Bin .../images/atp.png | Bin .../images/azure-data-discovery.png | Bin .../images/cloud-apps.png | Bin .../images/cloud-discovery.png | Bin .../images/components.png | Bin .../images/creating-account.png | Bin .../images/dashboard.png | Bin .../images/detection-icon.png | Bin .../images/enable_siem.png | Bin .../images/filter-log.png | Bin .../images/io.png | Bin ...ws-defender-advanced-threat-protection.png | Bin .../images/machine-reports.png | Bin .../images/machines-active-threats-tile.png | Bin .../images/machines-at-risk-tile.png | Bin .../images/machines-at-risk.png | Bin .../images/machines-list.png | Bin .../images/machines-reporting-tile.png | Bin .../images/menu-icon.png | Bin .../images/ms-flow-choose-action.png | Bin .../images/ms-flow-define-action.png | Bin .../images/ms-flow-e2e.png | Bin .../images/ms-flow-insert-db.png | Bin .../images/ms-flow-parse-json.png | Bin .../images/ms-flow-read-db.png | Bin .../images/mss.png | Bin .../images/nativeapp-add-permission.png | Bin .../images/nativeapp-add-permissions-end.png | Bin .../images/nativeapp-create.png | Bin .../images/nativeapp-decoded-token.png | Bin .../images/nativeapp-get-appid.png | Bin .../images/nativeapp-select-permissions.png | Bin .../images/new-secure-score-dashboard.png | Bin .../images/new-ssot.png | Bin .../images/no-threats-found.png | Bin .../images/no_threats_found.png | Bin .../images/not-remediated-icon.png | Bin .../images/office-scc-label.png | Bin .../images/overview.png | Bin .../images/partially-investigated.png | Bin .../images/partially_investigated.png | Bin .../images/partially_remediated.png | Bin .../images/power-bi-create-advanced-query.png | Bin .../images/power-bi-create-blank-query.png | Bin .../images/power-bi-edit-credentials.png | Bin .../images/power-bi-edit-data-privacy.png | Bin .../images/power-bi-open-advanced-editor.png | Bin .../images/power-bi-query-results.png | Bin .../power-bi-set-credentials-anonymous.png | Bin ...bi-set-credentials-organizational-cont.png | Bin ...ower-bi-set-credentials-organizational.png | Bin .../images/power-bi-set-data-privacy.png | Bin .../images/remediated-icon.png | Bin .../images/rules-legend.png | Bin .../images/run-as-admin.png | Bin .../images/save-query.png | Bin .../images/sccm-deployment.png | Bin .../images/sec-ops-dashboard.png | Bin .../images/securescore.png | Bin .../images/settings.png | Bin .../images/setup-preferences.png | Bin .../images/setup-preferences2.png | Bin .../images/siem_details.png | Bin .../images/ss1.png | Bin .../images/ssot.png | Bin .../images/status-tile.png | Bin .../images/submit-file.png | Bin .../images/ta.png | Bin .../images/terminated-by-system.png | Bin .../images/terminated_by_system.png | Bin .../images/threat-analytics-report.png | Bin .../images/top-recommendations.png | Bin .../images/wdatp-pillars.png | Bin .../images/wdatp-pillars2.png | Bin .../images/wdsc.png | Bin .../images/webapp-add-permission-2.png | Bin .../images/webapp-add-permission-end.png | Bin .../webapp-add-permission-readalerts.png | Bin .../images/webapp-add-permission.png | Bin .../images/webapp-app-id1.png | Bin .../images/webapp-create-key.png | Bin .../images/webapp-create.png | Bin .../images/webapp-decoded-token.png | Bin .../images/webapp-edit-multitenant.png | Bin .../images/webapp-edit-settings.png | Bin .../images/webapp-get-appid.png | Bin .../images/webapp-grant-permissions.png | Bin .../images/webapp-select-permission.png | Bin .../images/webapp-validate-token.png | Bin .../images/welcome1.png | Bin .../images/win10-endpoint-users.png | Bin .../images/windefatp-sc-qc-diagtrack.png | Bin .../images/windefatp-sc-query-diagtrack.png | Bin .../images/windefatp-sc-query.png | Bin .../windefatp-utc-console-autostart.png | Bin ...ender-system-guard-boot-time-integrity.png | Bin ...system-guard-validate-system-integrity.png | Bin .../images/windows-defender-system-guard.png | Bin .../improverequestperformance-new.md | 0 .../incidents-queue.md | 0 ...nformation-protection-in-windows-config.md | 0 ...ormation-protection-in-windows-overview.md | 0 ...defender-advanced-threat-protection-new.md | 0 ...ows-defender-advanced-threat-protection.md | 0 ...ows-defender-advanced-threat-protection.md | 0 ...ows-defender-advanced-threat-protection.md | 0 ...ows-defender-advanced-threat-protection.md | 0 ...ows-defender-advanced-threat-protection.md | 0 ...ows-defender-advanced-threat-protection.md | 0 ...ows-defender-advanced-threat-protection.md | 0 ...defender-advanced-threat-protection-new.md | 0 ...defender-advanced-threat-protection-new.md | 0 ...defender-advanced-threat-protection-new.md | 0 ...ows-defender-advanced-threat-protection.md | 0 ...ows-defender-advanced-threat-protection.md | 0 ...ows-defender-advanced-threat-protection.md | 0 ...ows-defender-advanced-threat-protection.md | 0 ...defender-advanced-threat-protection-new.md | 0 ...defender-advanced-threat-protection-new.md | 0 .../machineactionsnote.md | 0 ...ows-defender-advanced-threat-protection.md | 0 ...ows-defender-advanced-threat-protection.md | 0 ...ows-defender-advanced-threat-protection.md | 0 ...ows-defender-advanced-threat-protection.md | 0 ...ows-defender-advanced-threat-protection.md | 0 ...ows-defender-advanced-threat-protection.md | 0 ...ows-defender-advanced-threat-protection.md | 0 .../manage-edr.md | 0 ...ows-defender-advanced-threat-protection.md | 0 ...ows-defender-advanced-threat-protection.md | 0 .../management-apis.md | 0 .../microsoft-cloud-app-security-config.md | 0 ...icrosoft-cloud-app-security-integration.md | 0 .../microsoft-threat-experts.md | 0 ...ows-defender-advanced-threat-protection.md | 0 ...ows-defender-advanced-threat-protection.md | 0 ...defender-advanced-threat-protection-new.md | 0 ...ows-defender-advanced-threat-protection.md | 0 ...ows-defender-advanced-threat-protection.md | 0 ...ows-defender-advanced-threat-protection.md | 0 .../onboard.md | 0 .../overview-attack-surface-reduction.md | 0 .../overview-custom-detections.md | 0 .../overview-endpoint-detection-response.md | 0 .../overview-hardware-based-isolation.md | 0 ...ows-defender-advanced-threat-protection.md | 0 ...ows-defender-advanced-threat-protection.md | 0 .../overview.md | 0 ...ows-defender-advanced-threat-protection.md | 0 ...defender-advanced-threat-protection-new.md | 0 ...ows-defender-advanced-threat-protection.md | 0 ...ows-defender-advanced-threat-protection.md | 0 ...ows-defender-advanced-threat-protection.md | 0 .../prerelease.md | 0 ...ows-defender-advanced-threat-protection.md | 0 ...ows-defender-advanced-threat-protection.md | 0 ...ows-defender-advanced-threat-protection.md | 0 ...ows-defender-advanced-threat-protection.md | 0 ...ows-defender-advanced-threat-protection.md | 0 ...ows-defender-advanced-threat-protection.md | 0 ...ows-defender-advanced-threat-protection.md | 0 ...ows-defender-advanced-threat-protection.md | 0 ...defender-advanced-threat-protection-new.md | 0 .../run-advanced-query-api.md | 0 .../run-advanced-query-sample-ms-flow.md | 0 ...dvanced-query-sample-power-bi-app-token.md | 0 ...vanced-query-sample-power-bi-user-token.md | 0 .../run-advanced-query-sample-powershell.md | 0 .../run-advanced-query-sample-python.md | 0 ...defender-advanced-threat-protection-new.md | 0 ...ows-defender-advanced-threat-protection.md | 0 ...ows-defender-advanced-threat-protection.md | 0 ...ows-defender-advanced-threat-protection.md | 0 ...ows-defender-advanced-threat-protection.md | 0 ...defender-advanced-threat-protection-new.md | 0 ...ows-defender-advanced-threat-protection.md | 0 .../threat-analytics.md | 0 ...ows-defender-advanced-threat-protection.md | 0 .../threat-protection-integration.md | 0 ...ows-defender-advanced-threat-protection.md | 0 ...defender-advanced-threat-protection-new.md | 0 ...ows-defender-advanced-threat-protection.md | 0 ...ows-defender-advanced-threat-protection.md | 0 ...ows-defender-advanced-threat-protection.md | 0 ...ows-defender-advanced-threat-protection.md | 624 +++++++++--------- ...ows-defender-advanced-threat-protection.md | 0 .../troubleshoot-wdatp.md | 0 ...ows-defender-advanced-threat-protection.md | 0 ...defender-advanced-threat-protection-new.md | 0 ...defender-advanced-threat-protection-new.md | 0 ...defender-advanced-threat-protection-new.md | 0 .../use-apis.md | 0 ...ows-defender-advanced-threat-protection.md | 0 ...ows-defender-advanced-threat-protection.md | 0 ...ows-defender-advanced-threat-protection.md | 0 ...defender-advanced-threat-protection-new.md | 0 .../view-incidents-queue.md | 0 .../whats-new-in-windows-defender-atp.md | 0 ...ows-defender-advanced-threat-protection.md | 0 .../windows-defender-security-center-atp.md | 0 656 files changed, 625 insertions(+), 625 deletions(-) rename windows/security/threat-protection/{windows-defender-atp => microsoft-defender-atp}/TOC.md (100%) rename windows/security/threat-protection/{windows-defender-atp => microsoft-defender-atp}/add-or-remove-machine-tags-windows-defender-advanced-threat-protection-new.md (100%) rename windows/security/threat-protection/{windows-defender-atp => microsoft-defender-atp}/advanced-features-windows-defender-advanced-threat-protection.md (100%) rename windows/security/threat-protection/{windows-defender-atp => microsoft-defender-atp}/advanced-hunting-best-practices-windows-defender-advanced-threat-protection.md (100%) rename windows/security/threat-protection/{windows-defender-atp => microsoft-defender-atp}/advanced-hunting-reference-windows-defender-advanced-threat-protection.md (100%) rename windows/security/threat-protection/{windows-defender-atp => microsoft-defender-atp}/advanced-hunting-windows-defender-advanced-threat-protection.md (100%) rename windows/security/threat-protection/{windows-defender-atp => microsoft-defender-atp}/alerts-queue-endpoint-detection-response.md (100%) rename windows/security/threat-protection/{windows-defender-atp => microsoft-defender-atp}/alerts-queue-windows-defender-advanced-threat-protection.md (100%) rename windows/security/threat-protection/{windows-defender-atp => microsoft-defender-atp}/alerts-windows-defender-advanced-threat-protection-new.md (100%) rename windows/security/threat-protection/{windows-defender-atp => microsoft-defender-atp}/api-hello-world.md (100%) rename windows/security/threat-protection/{windows-defender-atp => microsoft-defender-atp}/api-portal-mapping-windows-defender-advanced-threat-protection.md (100%) rename windows/security/threat-protection/{windows-defender-atp => microsoft-defender-atp}/apis-intro.md (100%) rename windows/security/threat-protection/{windows-defender-atp => microsoft-defender-atp}/assign-portal-access-windows-defender-advanced-threat-protection.md (100%) rename windows/security/threat-protection/{windows-defender-atp => microsoft-defender-atp}/attack-simulations-windows-defender-advanced-threat-protection.md (100%) rename windows/security/threat-protection/{windows-defender-atp => microsoft-defender-atp}/automated-investigations-windows-defender-advanced-threat-protection.md (100%) rename windows/security/threat-protection/{windows-defender-atp => microsoft-defender-atp}/basic-permissions-windows-defender-advanced-threat-protection.md (100%) rename windows/security/threat-protection/{windows-defender-atp => microsoft-defender-atp}/check-sensor-status-windows-defender-advanced-threat-protection.md (100%) rename windows/security/threat-protection/{windows-defender-atp => microsoft-defender-atp}/collect-investigation-package-windows-defender-advanced-threat-protection-new.md (100%) rename windows/security/threat-protection/{windows-defender-atp => microsoft-defender-atp}/community-windows-defender-advanced-threat-protection.md (100%) rename windows/security/threat-protection/{windows-defender-atp => microsoft-defender-atp}/conditional-access-windows-defender-advanced-threat-protection.md (100%) rename windows/security/threat-protection/{windows-defender-atp => microsoft-defender-atp}/configure-arcsight-windows-defender-advanced-threat-protection.md (100%) rename windows/security/threat-protection/{windows-defender-atp => microsoft-defender-atp}/configure-attack-surface-reduction.md (100%) rename windows/security/threat-protection/{windows-defender-atp => microsoft-defender-atp}/configure-conditional-access-windows-defender-advanced-threat-protection.md (100%) rename windows/security/threat-protection/{windows-defender-atp => microsoft-defender-atp}/configure-email-notifications-windows-defender-advanced-threat-protection.md (100%) rename windows/security/threat-protection/{windows-defender-atp => microsoft-defender-atp}/configure-endpoints-gp-windows-defender-advanced-threat-protection.md (100%) rename windows/security/threat-protection/{windows-defender-atp => microsoft-defender-atp}/configure-endpoints-mdm-windows-defender-advanced-threat-protection.md (100%) rename windows/security/threat-protection/{windows-defender-atp => microsoft-defender-atp}/configure-endpoints-non-windows-windows-defender-advanced-threat-protection.md (100%) rename windows/security/threat-protection/{windows-defender-atp => microsoft-defender-atp}/configure-endpoints-sccm-windows-defender-advanced-threat-protection.md (100%) rename windows/security/threat-protection/{windows-defender-atp => microsoft-defender-atp}/configure-endpoints-script-windows-defender-advanced-threat-protection.md (100%) rename windows/security/threat-protection/{windows-defender-atp => microsoft-defender-atp}/configure-endpoints-vdi-windows-defender-advanced-threat-protection.md (100%) rename windows/security/threat-protection/{windows-defender-atp => microsoft-defender-atp}/configure-endpoints-windows-defender-advanced-threat-protection.md (100%) rename windows/security/threat-protection/{windows-defender-atp => microsoft-defender-atp}/configure-microsoft-threat-experts.md (100%) rename windows/security/threat-protection/{windows-defender-atp => microsoft-defender-atp}/configure-mssp-support-windows-defender-advanced-threat-protection.md (100%) rename windows/security/threat-protection/{windows-defender-atp => microsoft-defender-atp}/configure-proxy-internet-windows-defender-advanced-threat-protection.md (100%) rename windows/security/threat-protection/{windows-defender-atp => microsoft-defender-atp}/configure-server-endpoints-windows-defender-advanced-threat-protection.md (100%) rename windows/security/threat-protection/{windows-defender-atp => microsoft-defender-atp}/configure-siem-windows-defender-advanced-threat-protection.md (100%) rename windows/security/threat-protection/{windows-defender-atp => microsoft-defender-atp}/configure-splunk-windows-defender-advanced-threat-protection.md (100%) rename windows/security/threat-protection/{windows-defender-atp => microsoft-defender-atp}/create-alert-by-reference-windows-defender-advanced-threat-protection-new.md (100%) rename windows/security/threat-protection/{windows-defender-atp => microsoft-defender-atp}/custom-detection-rules.md (100%) rename windows/security/threat-protection/{windows-defender-atp => microsoft-defender-atp}/custom-ti-api-windows-defender-advanced-threat-protection.md (100%) rename windows/security/threat-protection/{windows-defender-atp => microsoft-defender-atp}/data-retention-settings-windows-defender-advanced-threat-protection.md (100%) rename windows/security/threat-protection/{windows-defender-atp => microsoft-defender-atp}/data-storage-privacy-windows-defender-advanced-threat-protection.md (100%) rename windows/security/threat-protection/{windows-defender-atp => microsoft-defender-atp}/defender-compatibility-windows-defender-advanced-threat-protection.md (100%) rename windows/security/threat-protection/{windows-defender-atp => microsoft-defender-atp}/delete-ti-indicator-by-id-windows-defender-advanced-threat-protection-new.md (100%) rename windows/security/threat-protection/{windows-defender-atp => microsoft-defender-atp}/deprecate.md (100%) rename windows/security/threat-protection/{windows-defender-atp => microsoft-defender-atp}/enable-custom-ti-windows-defender-advanced-threat-protection.md (100%) rename windows/security/threat-protection/{windows-defender-atp => microsoft-defender-atp}/enable-secure-score-windows-defender-advanced-threat-protection.md (100%) rename windows/security/threat-protection/{windows-defender-atp => microsoft-defender-atp}/enable-siem-integration-windows-defender-advanced-threat-protection.md (100%) rename windows/security/threat-protection/{windows-defender-atp => microsoft-defender-atp}/evaluate-atp.md (100%) rename windows/security/threat-protection/{windows-defender-atp => microsoft-defender-atp}/event-error-codes-windows-defender-advanced-threat-protection.md (100%) rename windows/security/threat-protection/{windows-defender-atp => microsoft-defender-atp}/experiment-custom-ti-windows-defender-advanced-threat-protection.md (100%) rename windows/security/threat-protection/{windows-defender-atp => microsoft-defender-atp}/exposed-apis-create-app-nativeapp.md (100%) rename windows/security/threat-protection/{windows-defender-atp => microsoft-defender-atp}/exposed-apis-create-app-webapp.md (100%) rename windows/security/threat-protection/{windows-defender-atp => microsoft-defender-atp}/exposed-apis-full-sample-powershell.md (100%) rename windows/security/threat-protection/{windows-defender-atp => microsoft-defender-atp}/exposed-apis-list.md (100%) rename windows/security/threat-protection/{windows-defender-atp => microsoft-defender-atp}/exposed-apis-odata-samples.md (100%) rename windows/security/threat-protection/{windows-defender-atp => microsoft-defender-atp}/files-windows-defender-advanced-threat-protection-new.md (100%) rename windows/security/threat-protection/{windows-defender-atp => microsoft-defender-atp}/find-machine-info-by-ip-windows-defender-advanced-threat-protection-new.md (100%) rename windows/security/threat-protection/{windows-defender-atp => microsoft-defender-atp}/find-machines-by-ip-windows-defender-advanced-threat-protection-new.md (100%) rename windows/security/threat-protection/{windows-defender-atp => microsoft-defender-atp}/fix-unhealhty-sensors-windows-defender-advanced-threat-protection.md (100%) rename windows/security/threat-protection/{windows-defender-atp => microsoft-defender-atp}/get-alert-info-by-id-windows-defender-advanced-threat-protection-new.md (100%) rename windows/security/threat-protection/{windows-defender-atp => microsoft-defender-atp}/get-alert-related-domain-info-windows-defender-advanced-threat-protection-new.md (100%) rename windows/security/threat-protection/{windows-defender-atp => microsoft-defender-atp}/get-alert-related-files-info-windows-defender-advanced-threat-protection-new.md (100%) rename windows/security/threat-protection/{windows-defender-atp => microsoft-defender-atp}/get-alert-related-ip-info-windows-defender-advanced-threat-protection-new.md (100%) rename windows/security/threat-protection/{windows-defender-atp => microsoft-defender-atp}/get-alert-related-machine-info-windows-defender-advanced-threat-protection-new.md (100%) rename windows/security/threat-protection/{windows-defender-atp => microsoft-defender-atp}/get-alert-related-user-info-windows-defender-advanced-threat-protection-new.md (100%) rename windows/security/threat-protection/{windows-defender-atp => microsoft-defender-atp}/get-alerts-windows-defender-advanced-threat-protection-new.md (100%) rename windows/security/threat-protection/{windows-defender-atp => microsoft-defender-atp}/get-cvekbmap-collection-windows-defender-advanced-threat-protection.md (95%) rename windows/security/threat-protection/{windows-defender-atp => microsoft-defender-atp}/get-domain-related-alerts-windows-defender-advanced-threat-protection-new.md (100%) rename windows/security/threat-protection/{windows-defender-atp => microsoft-defender-atp}/get-domain-related-machines-windows-defender-advanced-threat-protection-new.md (100%) rename windows/security/threat-protection/{windows-defender-atp => microsoft-defender-atp}/get-domain-statistics-windows-defender-advanced-threat-protection-new.md (100%) rename windows/security/threat-protection/{windows-defender-atp => microsoft-defender-atp}/get-file-information-windows-defender-advanced-threat-protection-new.md (100%) rename windows/security/threat-protection/{windows-defender-atp => microsoft-defender-atp}/get-file-related-alerts-windows-defender-advanced-threat-protection-new.md (100%) rename windows/security/threat-protection/{windows-defender-atp => microsoft-defender-atp}/get-file-related-machines-windows-defender-advanced-threat-protection-new.md (100%) rename windows/security/threat-protection/{windows-defender-atp => microsoft-defender-atp}/get-file-statistics-windows-defender-advanced-threat-protection-new.md (100%) rename windows/security/threat-protection/{windows-defender-atp => microsoft-defender-atp}/get-ip-related-alerts-windows-defender-advanced-threat-protection-new.md (100%) rename windows/security/threat-protection/{windows-defender-atp => microsoft-defender-atp}/get-ip-related-machines-windows-defender-advanced-threat-protection-new.md (100%) rename windows/security/threat-protection/{windows-defender-atp => microsoft-defender-atp}/get-ip-statistics-windows-defender-advanced-threat-protection-new.md (100%) rename windows/security/threat-protection/{windows-defender-atp => microsoft-defender-atp}/get-kbinfo-collection-windows-defender-advanced-threat-protection.md (95%) rename windows/security/threat-protection/{windows-defender-atp => microsoft-defender-atp}/get-machine-by-id-windows-defender-advanced-threat-protection-new.md (100%) rename windows/security/threat-protection/{windows-defender-atp => microsoft-defender-atp}/get-machine-log-on-users-windows-defender-advanced-threat-protection-new.md (100%) rename windows/security/threat-protection/{windows-defender-atp => microsoft-defender-atp}/get-machine-related-alerts-windows-defender-advanced-threat-protection-new.md (100%) rename windows/security/threat-protection/{windows-defender-atp => microsoft-defender-atp}/get-machineaction-object-windows-defender-advanced-threat-protection-new.md (100%) rename windows/security/threat-protection/{windows-defender-atp => microsoft-defender-atp}/get-machineactions-collection-windows-defender-advanced-threat-protection-new.md (100%) rename windows/security/threat-protection/{windows-defender-atp => microsoft-defender-atp}/get-machinegroups-collection-windows-defender-advanced-threat-protection.md (95%) rename windows/security/threat-protection/{windows-defender-atp => microsoft-defender-atp}/get-machines-windows-defender-advanced-threat-protection-new.md (100%) rename windows/security/threat-protection/{windows-defender-atp => microsoft-defender-atp}/get-machinesecuritystates-collection-windows-defender-advanced-threat-protection.md (96%) rename windows/security/threat-protection/{windows-defender-atp => microsoft-defender-atp}/get-package-sas-uri-windows-defender-advanced-threat-protection-new.md (100%) rename windows/security/threat-protection/{windows-defender-atp => microsoft-defender-atp}/get-started.md (100%) rename windows/security/threat-protection/{windows-defender-atp => microsoft-defender-atp}/get-ti-indicators-collection-windows-defender-advanced-threat-protection-new.md (100%) rename windows/security/threat-protection/{windows-defender-atp => microsoft-defender-atp}/get-user-information-windows-defender-advanced-threat-protection-new.md (100%) rename windows/security/threat-protection/{windows-defender-atp => microsoft-defender-atp}/get-user-related-alerts-windows-defender-advanced-threat-protection-new.md (100%) rename windows/security/threat-protection/{windows-defender-atp => microsoft-defender-atp}/get-user-related-machines-windows-defender-advanced-threat-protection-new.md (100%) rename windows/security/threat-protection/{windows-defender-atp => microsoft-defender-atp}/images/1.png (100%) rename windows/security/threat-protection/{windows-defender-atp => microsoft-defender-atp}/images/AH_icon.png (100%) rename windows/security/threat-protection/{windows-defender-atp => microsoft-defender-atp}/images/AR_icon.png (100%) rename windows/security/threat-protection/{windows-defender-atp => microsoft-defender-atp}/images/ASR_icon.png (100%) rename windows/security/threat-protection/{windows-defender-atp => microsoft-defender-atp}/images/EDR_icon.jpg (100%) rename windows/security/threat-protection/{windows-defender-atp => microsoft-defender-atp}/images/EDR_icon.png (100%) rename windows/security/threat-protection/{windows-defender-atp => microsoft-defender-atp}/images/Failed.png (100%) rename windows/security/threat-protection/{windows-defender-atp => microsoft-defender-atp}/images/MTE_icon.jpg (100%) rename windows/security/threat-protection/{windows-defender-atp => microsoft-defender-atp}/images/MTE_icon.png (100%) rename windows/security/threat-protection/{windows-defender-atp => microsoft-defender-atp}/images/NGP_icon.jpg (100%) rename windows/security/threat-protection/{windows-defender-atp => microsoft-defender-atp}/images/NGP_icon.png (100%) rename windows/security/threat-protection/{windows-defender-atp => microsoft-defender-atp}/images/No threats found.png (100%) rename windows/security/threat-protection/{windows-defender-atp => microsoft-defender-atp}/images/Partially investigated.png (100%) rename windows/security/threat-protection/{windows-defender-atp => microsoft-defender-atp}/images/Partially remediated.png (100%) rename windows/security/threat-protection/{windows-defender-atp => microsoft-defender-atp}/images/Pending.png (100%) rename windows/security/threat-protection/{windows-defender-atp => microsoft-defender-atp}/images/Remediated.png (100%) rename windows/security/threat-protection/{windows-defender-atp => microsoft-defender-atp}/images/Running.png (100%) rename windows/security/threat-protection/{windows-defender-atp => microsoft-defender-atp}/images/SS_icon.png (100%) rename windows/security/threat-protection/{windows-defender-atp => microsoft-defender-atp}/images/TVM_icon.png (100%) rename windows/security/threat-protection/{windows-defender-atp => microsoft-defender-atp}/images/Terminated by system.png (100%) rename windows/security/threat-protection/{windows-defender-atp => microsoft-defender-atp}/images/WDATP-components.png (100%) rename windows/security/threat-protection/{windows-defender-atp => microsoft-defender-atp}/images/active-alerts-tile.png (100%) rename windows/security/threat-protection/{windows-defender-atp => microsoft-defender-atp}/images/active-threat-icon.png (100%) rename windows/security/threat-protection/{windows-defender-atp => microsoft-defender-atp}/images/advanced-features.png (100%) rename windows/security/threat-protection/{windows-defender-atp => microsoft-defender-atp}/images/advanced-hunting-query-example.PNG (100%) rename windows/security/threat-protection/{windows-defender-atp => microsoft-defender-atp}/images/advanced-hunting-save-query.PNG (100%) rename windows/security/threat-protection/{windows-defender-atp => microsoft-defender-atp}/images/alert-details.png (100%) rename windows/security/threat-protection/{windows-defender-atp => microsoft-defender-atp}/images/alert-icon.png (100%) rename windows/security/threat-protection/{windows-defender-atp => microsoft-defender-atp}/images/alerts-q-bulk.png (100%) rename windows/security/threat-protection/{windows-defender-atp => microsoft-defender-atp}/images/alerts-queue-list.png (100%) rename windows/security/threat-protection/{windows-defender-atp => microsoft-defender-atp}/images/alerts-queue-numbered.png (100%) rename windows/security/threat-protection/{windows-defender-atp => microsoft-defender-atp}/images/analysis-results.png (100%) rename windows/security/threat-protection/{windows-defender-atp => microsoft-defender-atp}/images/api-jwt-ms.png (100%) rename windows/security/threat-protection/{windows-defender-atp => microsoft-defender-atp}/images/api-tenant-id.png (100%) rename windows/security/threat-protection/{windows-defender-atp => microsoft-defender-atp}/images/atp-Application-Guard-events-icon.png (100%) rename windows/security/threat-protection/{windows-defender-atp => microsoft-defender-atp}/images/atp-Device-Guard-events-icon.png (100%) rename windows/security/threat-protection/{windows-defender-atp => microsoft-defender-atp}/images/atp-ETW-event-icon.png (100%) rename windows/security/threat-protection/{windows-defender-atp => microsoft-defender-atp}/images/atp-Exploit-Guard-events-icon.png (100%) rename windows/security/threat-protection/{windows-defender-atp => microsoft-defender-atp}/images/atp-File-path-icon.png (100%) rename windows/security/threat-protection/{windows-defender-atp => microsoft-defender-atp}/images/atp-Firewall-events-icon.png (100%) rename windows/security/threat-protection/{windows-defender-atp => microsoft-defender-atp}/images/atp-O365-admin-portal-customer.png (100%) rename windows/security/threat-protection/{windows-defender-atp => microsoft-defender-atp}/images/atp-Other-events-icon.png (100%) rename windows/security/threat-protection/{windows-defender-atp => microsoft-defender-atp}/images/atp-Smart-Screen-events-icon.png (100%) rename windows/security/threat-protection/{windows-defender-atp => microsoft-defender-atp}/images/atp-access-token-modification-icon.png (100%) rename windows/security/threat-protection/{windows-defender-atp => microsoft-defender-atp}/images/atp-action-block-file.png (100%) rename windows/security/threat-protection/{windows-defender-atp => microsoft-defender-atp}/images/atp-action-center-app-restriction.png (100%) rename windows/security/threat-protection/{windows-defender-atp => microsoft-defender-atp}/images/atp-action-center-package-collection.png (100%) rename windows/security/threat-protection/{windows-defender-atp => microsoft-defender-atp}/images/atp-action-center-restrict-app.png (100%) rename windows/security/threat-protection/{windows-defender-atp => microsoft-defender-atp}/images/atp-action-center-with-info.png (100%) rename windows/security/threat-protection/{windows-defender-atp => microsoft-defender-atp}/images/atp-actions-action-center.png (100%) rename windows/security/threat-protection/{windows-defender-atp => microsoft-defender-atp}/images/atp-actions-collect-investigation-package.png (100%) rename windows/security/threat-protection/{windows-defender-atp => microsoft-defender-atp}/images/atp-actions-isolate-machine.png (100%) rename windows/security/threat-protection/{windows-defender-atp => microsoft-defender-atp}/images/atp-actions-manage-tags.png (100%) rename windows/security/threat-protection/{windows-defender-atp => microsoft-defender-atp}/images/atp-actions-release-from-isolation.png (100%) rename windows/security/threat-protection/{windows-defender-atp => microsoft-defender-atp}/images/atp-actions-release-from-isoloation.png (100%) rename windows/security/threat-protection/{windows-defender-atp => microsoft-defender-atp}/images/atp-actions-remove-app-restrictions.png (100%) rename windows/security/threat-protection/{windows-defender-atp => microsoft-defender-atp}/images/atp-actions-restrict-app-execution.png (100%) rename windows/security/threat-protection/{windows-defender-atp => microsoft-defender-atp}/images/atp-actions-run-av.png (100%) rename windows/security/threat-protection/{windows-defender-atp => microsoft-defender-atp}/images/atp-active-investigations-tile.png (100%) rename windows/security/threat-protection/{windows-defender-atp => microsoft-defender-atp}/images/atp-actor-alert.png (100%) rename windows/security/threat-protection/{windows-defender-atp => microsoft-defender-atp}/images/atp-actor-report.png (100%) rename windows/security/threat-protection/{windows-defender-atp => microsoft-defender-atp}/images/atp-actor.png (100%) rename windows/security/threat-protection/{windows-defender-atp => microsoft-defender-atp}/images/atp-add-application-name.png (100%) rename windows/security/threat-protection/{windows-defender-atp => microsoft-defender-atp}/images/atp-add-application.png (100%) rename windows/security/threat-protection/{windows-defender-atp => microsoft-defender-atp}/images/atp-add-intune-policy.png (100%) rename windows/security/threat-protection/{windows-defender-atp => microsoft-defender-atp}/images/atp-advanced-hunting-query.png (100%) rename windows/security/threat-protection/{windows-defender-atp => microsoft-defender-atp}/images/atp-advanced-hunting-results-filter.PNG (100%) rename windows/security/threat-protection/{windows-defender-atp => microsoft-defender-atp}/images/atp-advanced-hunting-results-set.png (100%) rename windows/security/threat-protection/{windows-defender-atp => microsoft-defender-atp}/images/atp-advanced-hunting.png (100%) rename windows/security/threat-protection/{windows-defender-atp => microsoft-defender-atp}/images/atp-alert-details.png (100%) rename windows/security/threat-protection/{windows-defender-atp => microsoft-defender-atp}/images/atp-alert-mgt-pane.png (100%) rename windows/security/threat-protection/{windows-defender-atp => microsoft-defender-atp}/images/atp-alert-page.png (100%) rename windows/security/threat-protection/{windows-defender-atp => microsoft-defender-atp}/images/atp-alert-process-tree.png (100%) rename windows/security/threat-protection/{windows-defender-atp => microsoft-defender-atp}/images/atp-alert-source.png (100%) rename windows/security/threat-protection/{windows-defender-atp => microsoft-defender-atp}/images/atp-alert-status.png (100%) rename windows/security/threat-protection/{windows-defender-atp => microsoft-defender-atp}/images/atp-alert-timeline-numbered.png (100%) rename windows/security/threat-protection/{windows-defender-atp => microsoft-defender-atp}/images/atp-alert-timeline.png (100%) rename windows/security/threat-protection/{windows-defender-atp => microsoft-defender-atp}/images/atp-alert-view.png (100%) rename windows/security/threat-protection/{windows-defender-atp => microsoft-defender-atp}/images/atp-alerts-group.png (100%) rename windows/security/threat-protection/{windows-defender-atp => microsoft-defender-atp}/images/atp-alerts-q.png (100%) rename windows/security/threat-protection/{windows-defender-atp => microsoft-defender-atp}/images/atp-alerts-queue-user.png (100%) rename windows/security/threat-protection/{windows-defender-atp => microsoft-defender-atp}/images/atp-alerts-queue.png (100%) rename windows/security/threat-protection/{windows-defender-atp => microsoft-defender-atp}/images/atp-alerts-related-to-file.png (100%) rename windows/security/threat-protection/{windows-defender-atp => microsoft-defender-atp}/images/atp-alerts-related-to-machine.PNG (100%) rename windows/security/threat-protection/{windows-defender-atp => microsoft-defender-atp}/images/atp-alerts-selected.png (100%) rename windows/security/threat-protection/{windows-defender-atp => microsoft-defender-atp}/images/atp-alerts-tile.png (100%) rename windows/security/threat-protection/{windows-defender-atp => microsoft-defender-atp}/images/atp-alertsq1.png (100%) rename windows/security/threat-protection/{windows-defender-atp => microsoft-defender-atp}/images/atp-alertsq2.png (100%) rename windows/security/threat-protection/{windows-defender-atp => microsoft-defender-atp}/images/atp-analyze-auto-ir.png (100%) rename windows/security/threat-protection/{windows-defender-atp => microsoft-defender-atp}/images/atp-app-restriction.png (100%) rename windows/security/threat-protection/{windows-defender-atp => microsoft-defender-atp}/images/atp-application-information.png (100%) rename windows/security/threat-protection/{windows-defender-atp => microsoft-defender-atp}/images/atp-approve-reject-action.png (100%) rename windows/security/threat-protection/{windows-defender-atp => microsoft-defender-atp}/images/atp-appsource.png (100%) rename windows/security/threat-protection/{windows-defender-atp => microsoft-defender-atp}/images/atp-auto-investigation-pending.png (100%) rename windows/security/threat-protection/{windows-defender-atp => microsoft-defender-atp}/images/atp-auto-investigations-list.png (100%) rename windows/security/threat-protection/{windows-defender-atp => microsoft-defender-atp}/images/atp-automated-investigations-statistics.png (100%) rename windows/security/threat-protection/{windows-defender-atp => microsoft-defender-atp}/images/atp-av-scan-action-center.png (100%) rename windows/security/threat-protection/{windows-defender-atp => microsoft-defender-atp}/images/atp-av-scan-notification.png (100%) rename windows/security/threat-protection/{windows-defender-atp => microsoft-defender-atp}/images/atp-azure-api-access.png (100%) rename windows/security/threat-protection/{windows-defender-atp => microsoft-defender-atp}/images/atp-azure-assign-role.png (100%) rename windows/security/threat-protection/{windows-defender-atp => microsoft-defender-atp}/images/atp-azure-atp-app.png (100%) rename windows/security/threat-protection/{windows-defender-atp => microsoft-defender-atp}/images/atp-azure-atp-machine-user.png (100%) rename windows/security/threat-protection/{windows-defender-atp => microsoft-defender-atp}/images/atp-azure-atp-machine.png (100%) rename windows/security/threat-protection/{windows-defender-atp => microsoft-defender-atp}/images/atp-azure-create.png (100%) rename windows/security/threat-protection/{windows-defender-atp => microsoft-defender-atp}/images/atp-azure-intune-category.png (100%) rename windows/security/threat-protection/{windows-defender-atp => microsoft-defender-atp}/images/atp-azure-intune-configure.png (100%) rename windows/security/threat-protection/{windows-defender-atp => microsoft-defender-atp}/images/atp-azure-intune-create-policy-configure.png (100%) rename windows/security/threat-protection/{windows-defender-atp => microsoft-defender-atp}/images/atp-azure-intune-create-policy-name.png (100%) rename windows/security/threat-protection/{windows-defender-atp => microsoft-defender-atp}/images/atp-azure-intune-create-policy.png (100%) rename windows/security/threat-protection/{windows-defender-atp => microsoft-defender-atp}/images/atp-azure-intune-create-profile.png (100%) rename windows/security/threat-protection/{windows-defender-atp => microsoft-defender-atp}/images/atp-azure-intune-create.png (100%) rename windows/security/threat-protection/{windows-defender-atp => microsoft-defender-atp}/images/atp-azure-intune-device-config.png (100%) rename windows/security/threat-protection/{windows-defender-atp => microsoft-defender-atp}/images/atp-azure-intune-save-policy.png (100%) rename windows/security/threat-protection/{windows-defender-atp => microsoft-defender-atp}/images/atp-azure-intune-save.png (100%) rename windows/security/threat-protection/{windows-defender-atp => microsoft-defender-atp}/images/atp-azure-intune-select-group.png (100%) rename windows/security/threat-protection/{windows-defender-atp => microsoft-defender-atp}/images/atp-azure-intune-settings-configure.png (100%) rename windows/security/threat-protection/{windows-defender-atp => microsoft-defender-atp}/images/atp-azure-intune.png (100%) rename windows/security/threat-protection/{windows-defender-atp => microsoft-defender-atp}/images/atp-azure-license-icon.png (100%) rename windows/security/threat-protection/{windows-defender-atp => microsoft-defender-atp}/images/atp-azure-new-app.png (100%) rename windows/security/threat-protection/{windows-defender-atp => microsoft-defender-atp}/images/atp-azure-required-permissions.png (100%) rename windows/security/threat-protection/{windows-defender-atp => microsoft-defender-atp}/images/atp-azure-select-permissions.png (100%) rename windows/security/threat-protection/{windows-defender-atp => microsoft-defender-atp}/images/atp-azure-ui-user-access.png (100%) rename windows/security/threat-protection/{windows-defender-atp => microsoft-defender-atp}/images/atp-billing-licenses.png (100%) rename windows/security/threat-protection/{windows-defender-atp => microsoft-defender-atp}/images/atp-billing-subscriptions.png (100%) rename windows/security/threat-protection/{windows-defender-atp => microsoft-defender-atp}/images/atp-block-file-confirm.png (100%) rename windows/security/threat-protection/{windows-defender-atp => microsoft-defender-atp}/images/atp-block-file.png (100%) rename windows/security/threat-protection/{windows-defender-atp => microsoft-defender-atp}/images/atp-blockfile.png (100%) rename windows/security/threat-protection/{windows-defender-atp => microsoft-defender-atp}/images/atp-cloud-discovery-dashboard-menu.png (100%) rename windows/security/threat-protection/{windows-defender-atp => microsoft-defender-atp}/images/atp-collect-investigation-package.png (100%) rename windows/security/threat-protection/{windows-defender-atp => microsoft-defender-atp}/images/atp-command-line-icon.png (100%) rename windows/security/threat-protection/{windows-defender-atp => microsoft-defender-atp}/images/atp-community-center.png (100%) rename windows/security/threat-protection/{windows-defender-atp => microsoft-defender-atp}/images/atp-conditional-access-numbered.png (100%) rename windows/security/threat-protection/{windows-defender-atp => microsoft-defender-atp}/images/atp-conditional-access.png (100%) rename windows/security/threat-protection/{windows-defender-atp => microsoft-defender-atp}/images/atp-confirm-isolate.png (100%) rename windows/security/threat-protection/{windows-defender-atp => microsoft-defender-atp}/images/atp-create-dashboard.png (100%) rename windows/security/threat-protection/{windows-defender-atp => microsoft-defender-atp}/images/atp-create-suppression-rule.png (100%) rename windows/security/threat-protection/{windows-defender-atp => microsoft-defender-atp}/images/atp-custom-oma-uri.png (100%) rename windows/security/threat-protection/{windows-defender-atp => microsoft-defender-atp}/images/atp-custom-ti-mapping.png (100%) rename windows/security/threat-protection/{windows-defender-atp => microsoft-defender-atp}/images/atp-daily-machines-reporting.png (100%) rename windows/security/threat-protection/{windows-defender-atp => microsoft-defender-atp}/images/atp-dashboard-security-analytics-9.png (100%) rename windows/security/threat-protection/{windows-defender-atp => microsoft-defender-atp}/images/atp-dashboard-security-analytics-full.png (100%) rename windows/security/threat-protection/{windows-defender-atp => microsoft-defender-atp}/images/atp-dashboard-security-analytics.png (100%) rename windows/security/threat-protection/{windows-defender-atp => microsoft-defender-atp}/images/atp-data-not-available.png (100%) rename windows/security/threat-protection/{windows-defender-atp => microsoft-defender-atp}/images/atp-data-ready.png (100%) rename windows/security/threat-protection/{windows-defender-atp => microsoft-defender-atp}/images/atp-data-retention-policy.png (100%) rename windows/security/threat-protection/{windows-defender-atp => microsoft-defender-atp}/images/atp-delete-query.png (100%) rename windows/security/threat-protection/{windows-defender-atp => microsoft-defender-atp}/images/atp-detailed-actor.png (100%) rename windows/security/threat-protection/{windows-defender-atp => microsoft-defender-atp}/images/atp-disableantispyware-regkey.png (100%) rename windows/security/threat-protection/{windows-defender-atp => microsoft-defender-atp}/images/atp-download-connector.png (100%) rename windows/security/threat-protection/{windows-defender-atp => microsoft-defender-atp}/images/atp-enable-security-analytics.png (100%) rename windows/security/threat-protection/{windows-defender-atp => microsoft-defender-atp}/images/atp-example-email-notification.png (100%) rename windows/security/threat-protection/{windows-defender-atp => microsoft-defender-atp}/images/atp-export-machine-timeline-events.png (100%) rename windows/security/threat-protection/{windows-defender-atp => microsoft-defender-atp}/images/atp-file-action.png (100%) rename windows/security/threat-protection/{windows-defender-atp => microsoft-defender-atp}/images/atp-file-creation-icon.png (100%) rename windows/security/threat-protection/{windows-defender-atp => microsoft-defender-atp}/images/atp-file-details.png (100%) rename windows/security/threat-protection/{windows-defender-atp => microsoft-defender-atp}/images/atp-file-in-org.png (100%) rename windows/security/threat-protection/{windows-defender-atp => microsoft-defender-atp}/images/atp-file-information.png (100%) rename windows/security/threat-protection/{windows-defender-atp => microsoft-defender-atp}/images/atp-file-observed-icon.png (100%) rename windows/security/threat-protection/{windows-defender-atp => microsoft-defender-atp}/images/atp-filter-advanced-hunting.png (100%) rename windows/security/threat-protection/{windows-defender-atp => microsoft-defender-atp}/images/atp-final-onboard-endpoints-warning-before-atp-access.png (100%) rename windows/security/threat-protection/{windows-defender-atp => microsoft-defender-atp}/images/atp-final-preference-setup.png (100%) rename windows/security/threat-protection/{windows-defender-atp => microsoft-defender-atp}/images/atp-geographic-location-setup.png (100%) rename windows/security/threat-protection/{windows-defender-atp => microsoft-defender-atp}/images/atp-get-data.png (100%) rename windows/security/threat-protection/{windows-defender-atp => microsoft-defender-atp}/images/atp-gpo-proxy1.png (100%) rename windows/security/threat-protection/{windows-defender-atp => microsoft-defender-atp}/images/atp-gpo-proxy2.png (100%) rename windows/security/threat-protection/{windows-defender-atp => microsoft-defender-atp}/images/atp-image.png (100%) rename windows/security/threat-protection/{windows-defender-atp => microsoft-defender-atp}/images/atp-improv-opps-9.png (100%) rename windows/security/threat-protection/{windows-defender-atp => microsoft-defender-atp}/images/atp-improv-opps.png (100%) rename windows/security/threat-protection/{windows-defender-atp => microsoft-defender-atp}/images/atp-improv-ops.png (100%) rename windows/security/threat-protection/{windows-defender-atp => microsoft-defender-atp}/images/atp-incident-details-page.png (100%) rename windows/security/threat-protection/{windows-defender-atp => microsoft-defender-atp}/images/atp-incident-details.png (100%) rename windows/security/threat-protection/{windows-defender-atp => microsoft-defender-atp}/images/atp-incident-evidence-tab.png (100%) rename windows/security/threat-protection/{windows-defender-atp => microsoft-defender-atp}/images/atp-incident-graph-details.png (100%) rename windows/security/threat-protection/{windows-defender-atp => microsoft-defender-atp}/images/atp-incident-graph-tab.png (100%) rename windows/security/threat-protection/{windows-defender-atp => microsoft-defender-atp}/images/atp-incident-graph.png (100%) rename windows/security/threat-protection/{windows-defender-atp => microsoft-defender-atp}/images/atp-incident-investigations-tab.png (100%) rename windows/security/threat-protection/{windows-defender-atp => microsoft-defender-atp}/images/atp-incident-machine-tab.png (100%) rename windows/security/threat-protection/{windows-defender-atp => microsoft-defender-atp}/images/atp-incident-queue.png (100%) rename windows/security/threat-protection/{windows-defender-atp => microsoft-defender-atp}/images/atp-incidents-alerts-incidentlinkedbyreason.png (100%) rename windows/security/threat-protection/{windows-defender-atp => microsoft-defender-atp}/images/atp-incidents-alerts-linkedbytooltip.png (100%) rename windows/security/threat-protection/{windows-defender-atp => microsoft-defender-atp}/images/atp-incidents-alerts-reason.png (100%) rename windows/security/threat-protection/{windows-defender-atp => microsoft-defender-atp}/images/atp-incidents-alerts-tooltip.png (100%) rename windows/security/threat-protection/{windows-defender-atp => microsoft-defender-atp}/images/atp-incidents-mgt-pane.png (100%) rename windows/security/threat-protection/{windows-defender-atp => microsoft-defender-atp}/images/atp-industry-information.png (100%) rename windows/security/threat-protection/{windows-defender-atp => microsoft-defender-atp}/images/atp-intune-add-oma.png (100%) rename windows/security/threat-protection/{windows-defender-atp => microsoft-defender-atp}/images/atp-intune-add-policy.png (100%) rename windows/security/threat-protection/{windows-defender-atp => microsoft-defender-atp}/images/atp-intune-assignments.png (100%) rename windows/security/threat-protection/{windows-defender-atp => microsoft-defender-atp}/images/atp-intune-configure.png (100%) rename windows/security/threat-protection/{windows-defender-atp => microsoft-defender-atp}/images/atp-intune-create-policy.png (100%) rename windows/security/threat-protection/{windows-defender-atp => microsoft-defender-atp}/images/atp-intune-custom.png (100%) rename windows/security/threat-protection/{windows-defender-atp => microsoft-defender-atp}/images/atp-intune-deploy-policy.png (100%) rename windows/security/threat-protection/{windows-defender-atp => microsoft-defender-atp}/images/atp-intune-group.png (100%) rename windows/security/threat-protection/{windows-defender-atp => microsoft-defender-atp}/images/atp-intune-manage-deployment.png (100%) rename windows/security/threat-protection/{windows-defender-atp => microsoft-defender-atp}/images/atp-intune-new-policy.png (100%) rename windows/security/threat-protection/{windows-defender-atp => microsoft-defender-atp}/images/atp-intune-oma-uri-setting.png (100%) rename windows/security/threat-protection/{windows-defender-atp => microsoft-defender-atp}/images/atp-intune-policy-name.png (100%) rename windows/security/threat-protection/{windows-defender-atp => microsoft-defender-atp}/images/atp-intune-save-deployment.png (100%) rename windows/security/threat-protection/{windows-defender-atp => microsoft-defender-atp}/images/atp-intune-save-policy.png (100%) rename windows/security/threat-protection/{windows-defender-atp => microsoft-defender-atp}/images/atp-investigation-package-action-center.png (100%) rename windows/security/threat-protection/{windows-defender-atp => microsoft-defender-atp}/images/atp-isolate-machine.png (100%) rename windows/security/threat-protection/{windows-defender-atp => microsoft-defender-atp}/images/atp-licensing-azure-portal.png (100%) rename windows/security/threat-protection/{windows-defender-atp => microsoft-defender-atp}/images/atp-loading.png (100%) rename windows/security/threat-protection/{windows-defender-atp => microsoft-defender-atp}/images/atp-logo-icon.png (100%) rename windows/security/threat-protection/{windows-defender-atp => microsoft-defender-atp}/images/atp-machine-actions-undo.png (100%) rename windows/security/threat-protection/{windows-defender-atp => microsoft-defender-atp}/images/atp-machine-actions.png (100%) rename windows/security/threat-protection/{windows-defender-atp => microsoft-defender-atp}/images/atp-machine-details-view.png (100%) rename windows/security/threat-protection/{windows-defender-atp => microsoft-defender-atp}/images/atp-machine-details-view2.png (100%) rename windows/security/threat-protection/{windows-defender-atp => microsoft-defender-atp}/images/atp-machine-health-details.png (100%) rename windows/security/threat-protection/{windows-defender-atp => microsoft-defender-atp}/images/atp-machine-health.png (100%) rename windows/security/threat-protection/{windows-defender-atp => microsoft-defender-atp}/images/atp-machine-icon.png (100%) rename windows/security/threat-protection/{windows-defender-atp => microsoft-defender-atp}/images/atp-machine-investigation-package.png (100%) rename windows/security/threat-protection/{windows-defender-atp => microsoft-defender-atp}/images/atp-machine-isolation.png (100%) rename windows/security/threat-protection/{windows-defender-atp => microsoft-defender-atp}/images/atp-machine-timeline-details-panel.png (100%) rename windows/security/threat-protection/{windows-defender-atp => microsoft-defender-atp}/images/atp-machine-timeline-export.png (100%) rename windows/security/threat-protection/{windows-defender-atp => microsoft-defender-atp}/images/atp-machine-timeline-filter.png (100%) rename windows/security/threat-protection/{windows-defender-atp => microsoft-defender-atp}/images/atp-machine-timeline.png (100%) rename windows/security/threat-protection/{windows-defender-atp => microsoft-defender-atp}/images/atp-machine-view-ata.png (100%) rename windows/security/threat-protection/{windows-defender-atp => microsoft-defender-atp}/images/atp-machines-active-threats-tile.png (100%) rename windows/security/threat-protection/{windows-defender-atp => microsoft-defender-atp}/images/atp-machines-at-risk.png (100%) rename windows/security/threat-protection/{windows-defender-atp => microsoft-defender-atp}/images/atp-machines-list-misconfigured.png (100%) rename windows/security/threat-protection/{windows-defender-atp => microsoft-defender-atp}/images/atp-machines-list-view.png (100%) rename windows/security/threat-protection/{windows-defender-atp => microsoft-defender-atp}/images/atp-machines-list-view2.png (100%) rename windows/security/threat-protection/{windows-defender-atp => microsoft-defender-atp}/images/atp-machines-timeline.png (100%) rename windows/security/threat-protection/{windows-defender-atp => microsoft-defender-atp}/images/atp-machines-view-list.png (100%) rename windows/security/threat-protection/{windows-defender-atp => microsoft-defender-atp}/images/atp-main-portal.png (100%) rename windows/security/threat-protection/{windows-defender-atp => microsoft-defender-atp}/images/atp-manage-tags.png (100%) rename windows/security/threat-protection/{windows-defender-atp => microsoft-defender-atp}/images/atp-mapping 3.png (100%) rename windows/security/threat-protection/{windows-defender-atp => microsoft-defender-atp}/images/atp-mapping1.png (100%) rename windows/security/threat-protection/{windows-defender-atp => microsoft-defender-atp}/images/atp-mapping2.png (100%) rename windows/security/threat-protection/{windows-defender-atp => microsoft-defender-atp}/images/atp-mapping3.png (100%) rename windows/security/threat-protection/{windows-defender-atp => microsoft-defender-atp}/images/atp-mapping4.png (100%) rename windows/security/threat-protection/{windows-defender-atp => microsoft-defender-atp}/images/atp-mapping5.png (100%) rename windows/security/threat-protection/{windows-defender-atp => microsoft-defender-atp}/images/atp-mapping6.png (100%) rename windows/security/threat-protection/{windows-defender-atp => microsoft-defender-atp}/images/atp-mapping7.png (100%) rename windows/security/threat-protection/{windows-defender-atp => microsoft-defender-atp}/images/atp-mcas-settings.png (100%) rename windows/security/threat-protection/{windows-defender-atp => microsoft-defender-atp}/images/atp-mdm-onboarding-package.png (100%) rename windows/security/threat-protection/{windows-defender-atp => microsoft-defender-atp}/images/atp-memory-allocation-icon.png (100%) rename windows/security/threat-protection/{windows-defender-atp => microsoft-defender-atp}/images/atp-mma-properties.png (100%) rename windows/security/threat-protection/{windows-defender-atp => microsoft-defender-atp}/images/atp-mma.png (100%) rename windows/security/threat-protection/{windows-defender-atp => microsoft-defender-atp}/images/atp-module-load-icon.png (100%) rename windows/security/threat-protection/{windows-defender-atp => microsoft-defender-atp}/images/atp-ms-secure-score-9.png (100%) rename windows/security/threat-protection/{windows-defender-atp => microsoft-defender-atp}/images/atp-ms-secure-score.png (100%) rename windows/security/threat-protection/{windows-defender-atp => microsoft-defender-atp}/images/atp-network-communications-icon.png (100%) rename windows/security/threat-protection/{windows-defender-atp => microsoft-defender-atp}/images/atp-new-alerts-list.png (100%) rename windows/security/threat-protection/{windows-defender-atp => microsoft-defender-atp}/images/atp-new-suppression-rule.png (100%) rename windows/security/threat-protection/{windows-defender-atp => microsoft-defender-atp}/images/atp-no-network-connection.png (100%) rename windows/security/threat-protection/{windows-defender-atp => microsoft-defender-atp}/images/atp-no-subscriptions-found.png (100%) rename windows/security/threat-protection/{windows-defender-atp => microsoft-defender-atp}/images/atp-not-authorized-to-access-portal.png (100%) rename windows/security/threat-protection/{windows-defender-atp => microsoft-defender-atp}/images/atp-notification-action.png (100%) rename windows/security/threat-protection/{windows-defender-atp => microsoft-defender-atp}/images/atp-notification-collect-package.png (100%) rename windows/security/threat-protection/{windows-defender-atp => microsoft-defender-atp}/images/atp-notification-file.png (100%) rename windows/security/threat-protection/{windows-defender-atp => microsoft-defender-atp}/images/atp-notification-isolate.png (100%) rename windows/security/threat-protection/{windows-defender-atp => microsoft-defender-atp}/images/atp-notification-restrict.png (100%) rename windows/security/threat-protection/{windows-defender-atp => microsoft-defender-atp}/images/atp-notifications.png (100%) rename windows/security/threat-protection/{windows-defender-atp => microsoft-defender-atp}/images/atp-observed-in-organization.png (100%) rename windows/security/threat-protection/{windows-defender-atp => microsoft-defender-atp}/images/atp-observed-machines.png (100%) rename windows/security/threat-protection/{windows-defender-atp => microsoft-defender-atp}/images/atp-oma-uri-values.png (100%) rename windows/security/threat-protection/{windows-defender-atp => microsoft-defender-atp}/images/atp-onboard-endpoints-WDATP-portal-border-test.png (100%) rename windows/security/threat-protection/{windows-defender-atp => microsoft-defender-atp}/images/atp-onboard-endpoints-WDATP-portal.png (100%) rename windows/security/threat-protection/{windows-defender-atp => microsoft-defender-atp}/images/atp-onboard-endpoints-run-detection-test.png (100%) rename windows/security/threat-protection/{windows-defender-atp => microsoft-defender-atp}/images/atp-onboard-endpoints.png (100%) rename windows/security/threat-protection/{windows-defender-atp => microsoft-defender-atp}/images/atp-onboard-mdm.png (100%) rename windows/security/threat-protection/{windows-defender-atp => microsoft-defender-atp}/images/atp-org-score.png (100%) rename windows/security/threat-protection/{windows-defender-atp => microsoft-defender-atp}/images/atp-org-sec-score.png (100%) rename windows/security/threat-protection/{windows-defender-atp => microsoft-defender-atp}/images/atp-organization-size.png (100%) rename windows/security/threat-protection/{windows-defender-atp => microsoft-defender-atp}/images/atp-pending-actions-auto-ir.png (100%) rename windows/security/threat-protection/{windows-defender-atp => microsoft-defender-atp}/images/atp-pending-actions-file.png (100%) rename windows/security/threat-protection/{windows-defender-atp => microsoft-defender-atp}/images/atp-pending-actions-list.png (100%) rename windows/security/threat-protection/{windows-defender-atp => microsoft-defender-atp}/images/atp-pending-actions-multiple.png (100%) rename windows/security/threat-protection/{windows-defender-atp => microsoft-defender-atp}/images/atp-pending-actions-notification.png (100%) rename windows/security/threat-protection/{windows-defender-atp => microsoft-defender-atp}/images/atp-permissions-applications.png (100%) rename windows/security/threat-protection/{windows-defender-atp => microsoft-defender-atp}/images/atp-portal-sensor.png (100%) rename windows/security/threat-protection/{windows-defender-atp => microsoft-defender-atp}/images/atp-portal-welcome-screen.png (100%) rename windows/security/threat-protection/{windows-defender-atp => microsoft-defender-atp}/images/atp-portal.png (100%) rename windows/security/threat-protection/{windows-defender-atp => microsoft-defender-atp}/images/atp-powerbi-accept.png (100%) rename windows/security/threat-protection/{windows-defender-atp => microsoft-defender-atp}/images/atp-powerbi-consent.png (100%) rename windows/security/threat-protection/{windows-defender-atp => microsoft-defender-atp}/images/atp-powerbi-extension.png (100%) rename windows/security/threat-protection/{windows-defender-atp => microsoft-defender-atp}/images/atp-powerbi-get-data.png (100%) rename windows/security/threat-protection/{windows-defender-atp => microsoft-defender-atp}/images/atp-powerbi-importing.png (100%) rename windows/security/threat-protection/{windows-defender-atp => microsoft-defender-atp}/images/atp-powerbi-navigator.png (100%) rename windows/security/threat-protection/{windows-defender-atp => microsoft-defender-atp}/images/atp-powerbi-options.png (100%) rename windows/security/threat-protection/{windows-defender-atp => microsoft-defender-atp}/images/atp-powerbi-preview.png (100%) rename windows/security/threat-protection/{windows-defender-atp => microsoft-defender-atp}/images/atp-powershell-command-run-icon.png (100%) rename windows/security/threat-protection/{windows-defender-atp => microsoft-defender-atp}/images/atp-preferences-setup.png (100%) rename windows/security/threat-protection/{windows-defender-atp => microsoft-defender-atp}/images/atp-preview-experience.png (100%) rename windows/security/threat-protection/{windows-defender-atp => microsoft-defender-atp}/images/atp-preview-features.png (100%) rename windows/security/threat-protection/{windows-defender-atp => microsoft-defender-atp}/images/atp-process-event-icon.png (100%) rename windows/security/threat-protection/{windows-defender-atp => microsoft-defender-atp}/images/atp-process-injection.png (100%) rename windows/security/threat-protection/{windows-defender-atp => microsoft-defender-atp}/images/atp-process-tree.png (100%) rename windows/security/threat-protection/{windows-defender-atp => microsoft-defender-atp}/images/atp-refresh-token.png (100%) rename windows/security/threat-protection/{windows-defender-atp => microsoft-defender-atp}/images/atp-region-control-panel.png (100%) rename windows/security/threat-protection/{windows-defender-atp => microsoft-defender-atp}/images/atp-registry-event-icon.png (100%) rename windows/security/threat-protection/{windows-defender-atp => microsoft-defender-atp}/images/atp-remediated-alert.png (100%) rename windows/security/threat-protection/{windows-defender-atp => microsoft-defender-atp}/images/atp-remove-blocked-file.png (100%) rename windows/security/threat-protection/{windows-defender-atp => microsoft-defender-atp}/images/atp-rename-incident.png (100%) rename windows/security/threat-protection/{windows-defender-atp => microsoft-defender-atp}/images/atp-respond-action-icon.png (100%) rename windows/security/threat-protection/{windows-defender-atp => microsoft-defender-atp}/images/atp-restrict-app.png (100%) rename windows/security/threat-protection/{windows-defender-atp => microsoft-defender-atp}/images/atp-run-av-scan.png (100%) rename windows/security/threat-protection/{windows-defender-atp => microsoft-defender-atp}/images/atp-running-script.png (100%) rename windows/security/threat-protection/{windows-defender-atp => microsoft-defender-atp}/images/atp-sample-custom-ti-alert.png (100%) rename windows/security/threat-protection/{windows-defender-atp => microsoft-defender-atp}/images/atp-save-query.png (100%) rename windows/security/threat-protection/{windows-defender-atp => microsoft-defender-atp}/images/atp-save-tag.png (100%) rename windows/security/threat-protection/{windows-defender-atp => microsoft-defender-atp}/images/atp-sec-coverage.png (100%) rename windows/security/threat-protection/{windows-defender-atp => microsoft-defender-atp}/images/atp-sec-ops-1.png (100%) rename windows/security/threat-protection/{windows-defender-atp => microsoft-defender-atp}/images/atp-sec-ops-dashboard.png (100%) rename windows/security/threat-protection/{windows-defender-atp => microsoft-defender-atp}/images/atp-security-analytics-dashboard.png (100%) rename windows/security/threat-protection/{windows-defender-atp => microsoft-defender-atp}/images/atp-security-analytics-view-machines.png (100%) rename windows/security/threat-protection/{windows-defender-atp => microsoft-defender-atp}/images/atp-security-analytics-view-machines2.png (100%) rename windows/security/threat-protection/{windows-defender-atp => microsoft-defender-atp}/images/atp-security-controls-9.png (100%) rename windows/security/threat-protection/{windows-defender-atp => microsoft-defender-atp}/images/atp-security-controls.png (100%) rename windows/security/threat-protection/{windows-defender-atp => microsoft-defender-atp}/images/atp-security-coverage.png (100%) rename windows/security/threat-protection/{windows-defender-atp => microsoft-defender-atp}/images/atp-security-improvements.png (100%) rename windows/security/threat-protection/{windows-defender-atp => microsoft-defender-atp}/images/atp-security-score-over-time-9.png (100%) rename windows/security/threat-protection/{windows-defender-atp => microsoft-defender-atp}/images/atp-security-score-over-time.png (100%) rename windows/security/threat-protection/{windows-defender-atp => microsoft-defender-atp}/images/atp-sensor-filter.png (100%) rename windows/security/threat-protection/{windows-defender-atp => microsoft-defender-atp}/images/atp-sensor-health-filter-resized.png (100%) rename windows/security/threat-protection/{windows-defender-atp => microsoft-defender-atp}/images/atp-sensor-health-filter-tile.png (100%) rename windows/security/threat-protection/{windows-defender-atp => microsoft-defender-atp}/images/atp-sensor-health-filter.png (100%) rename windows/security/threat-protection/{windows-defender-atp => microsoft-defender-atp}/images/atp-sensor-health-nonav.png (100%) rename windows/security/threat-protection/{windows-defender-atp => microsoft-defender-atp}/images/atp-sensor-health-tile.png (100%) rename windows/security/threat-protection/{windows-defender-atp => microsoft-defender-atp}/images/atp-server-offboarding-workspaceid.png (100%) rename windows/security/threat-protection/{windows-defender-atp => microsoft-defender-atp}/images/atp-server-onboarding-workspaceid.png (100%) rename windows/security/threat-protection/{windows-defender-atp => microsoft-defender-atp}/images/atp-server-onboarding.png (100%) rename windows/security/threat-protection/{windows-defender-atp => microsoft-defender-atp}/images/atp-services.png (100%) rename windows/security/threat-protection/{windows-defender-atp => microsoft-defender-atp}/images/atp-settings-aip.png (100%) rename windows/security/threat-protection/{windows-defender-atp => microsoft-defender-atp}/images/atp-settings-powerbi.png (100%) rename windows/security/threat-protection/{windows-defender-atp => microsoft-defender-atp}/images/atp-setup-complete.png (100%) rename windows/security/threat-protection/{windows-defender-atp => microsoft-defender-atp}/images/atp-setup-incomplete.png (100%) rename windows/security/threat-protection/{windows-defender-atp => microsoft-defender-atp}/images/atp-setup-permissions-wdatp-portal.png (100%) rename windows/security/threat-protection/{windows-defender-atp => microsoft-defender-atp}/images/atp-shared-queries.png (100%) rename windows/security/threat-protection/{windows-defender-atp => microsoft-defender-atp}/images/atp-siem-integration.png (100%) rename windows/security/threat-protection/{windows-defender-atp => microsoft-defender-atp}/images/atp-siem-mapping1.png (100%) rename windows/security/threat-protection/{windows-defender-atp => microsoft-defender-atp}/images/atp-siem-mapping13.png (100%) rename windows/security/threat-protection/{windows-defender-atp => microsoft-defender-atp}/images/atp-siem-mapping2.png (100%) rename windows/security/threat-protection/{windows-defender-atp => microsoft-defender-atp}/images/atp-siem-mapping3.png (100%) rename windows/security/threat-protection/{windows-defender-atp => microsoft-defender-atp}/images/atp-siem-mapping4.png (100%) rename windows/security/threat-protection/{windows-defender-atp => microsoft-defender-atp}/images/atp-signer-icon.png (100%) rename windows/security/threat-protection/{windows-defender-atp => microsoft-defender-atp}/images/atp-simulate-custom-ti.png (100%) rename windows/security/threat-protection/{windows-defender-atp => microsoft-defender-atp}/images/atp-stop-quarantine-file.png (100%) rename windows/security/threat-protection/{windows-defender-atp => microsoft-defender-atp}/images/atp-stop-quarantine.png (100%) rename windows/security/threat-protection/{windows-defender-atp => microsoft-defender-atp}/images/atp-stopnquarantine-file.png (100%) rename windows/security/threat-protection/{windows-defender-atp => microsoft-defender-atp}/images/atp-subscription-expired.png (100%) rename windows/security/threat-protection/{windows-defender-atp => microsoft-defender-atp}/images/atp-suppression-rules.png (100%) rename windows/security/threat-protection/{windows-defender-atp => microsoft-defender-atp}/images/atp-suspicious-activities-tile.png (100%) rename windows/security/threat-protection/{windows-defender-atp => microsoft-defender-atp}/images/atp-tag-management.png (100%) rename windows/security/threat-protection/{windows-defender-atp => microsoft-defender-atp}/images/atp-task-manager.png (100%) rename windows/security/threat-protection/{windows-defender-atp => microsoft-defender-atp}/images/atp-threat-intel-api.png (100%) rename windows/security/threat-protection/{windows-defender-atp => microsoft-defender-atp}/images/atp-threat-protection-reports.png (100%) rename windows/security/threat-protection/{windows-defender-atp => microsoft-defender-atp}/images/atp-thunderbolt-icon.png (100%) rename windows/security/threat-protection/{windows-defender-atp => microsoft-defender-atp}/images/atp-tile-sensor-health.png (100%) rename windows/security/threat-protection/{windows-defender-atp => microsoft-defender-atp}/images/atp-time-zone.png (100%) rename windows/security/threat-protection/{windows-defender-atp => microsoft-defender-atp}/images/atp-undo-isolation.png (100%) rename windows/security/threat-protection/{windows-defender-atp => microsoft-defender-atp}/images/atp-unsigned-file-icon.png (100%) rename windows/security/threat-protection/{windows-defender-atp => microsoft-defender-atp}/images/atp-user-details-pane.png (100%) rename windows/security/threat-protection/{windows-defender-atp => microsoft-defender-atp}/images/atp-user-details-view-azureatp.png (100%) rename windows/security/threat-protection/{windows-defender-atp => microsoft-defender-atp}/images/atp-user-details-view-tdp.png (100%) rename windows/security/threat-protection/{windows-defender-atp => microsoft-defender-atp}/images/atp-user-details-view.png (100%) rename windows/security/threat-protection/{windows-defender-atp => microsoft-defender-atp}/images/atp-user-details.png (100%) rename windows/security/threat-protection/{windows-defender-atp => microsoft-defender-atp}/images/atp-user-view-ata.png (100%) rename windows/security/threat-protection/{windows-defender-atp => microsoft-defender-atp}/images/atp-users-at-risk.png (100%) rename windows/security/threat-protection/{windows-defender-atp => microsoft-defender-atp}/images/atp-verify-passive-mode.png (100%) rename windows/security/threat-protection/{windows-defender-atp => microsoft-defender-atp}/images/atp-windows-cloud-instance-creation.png (100%) rename windows/security/threat-protection/{windows-defender-atp => microsoft-defender-atp}/images/atp-windows-defender-av-events-icon.png (100%) rename windows/security/threat-protection/{windows-defender-atp => microsoft-defender-atp}/images/atp.png (100%) rename windows/security/threat-protection/{windows-defender-atp => microsoft-defender-atp}/images/azure-data-discovery.png (100%) rename windows/security/threat-protection/{windows-defender-atp => microsoft-defender-atp}/images/cloud-apps.png (100%) rename windows/security/threat-protection/{windows-defender-atp => microsoft-defender-atp}/images/cloud-discovery.png (100%) rename windows/security/threat-protection/{windows-defender-atp => microsoft-defender-atp}/images/components.png (100%) rename windows/security/threat-protection/{windows-defender-atp => microsoft-defender-atp}/images/creating-account.png (100%) rename windows/security/threat-protection/{windows-defender-atp => microsoft-defender-atp}/images/dashboard.png (100%) rename windows/security/threat-protection/{windows-defender-atp => microsoft-defender-atp}/images/detection-icon.png (100%) rename windows/security/threat-protection/{windows-defender-atp => microsoft-defender-atp}/images/enable_siem.png (100%) rename windows/security/threat-protection/{windows-defender-atp => microsoft-defender-atp}/images/filter-log.png (100%) rename windows/security/threat-protection/{windows-defender-atp => microsoft-defender-atp}/images/io.png (100%) rename windows/security/threat-protection/{windows-defender-atp => microsoft-defender-atp}/images/licensing-windows-defender-advanced-threat-protection.png (100%) rename windows/security/threat-protection/{windows-defender-atp => microsoft-defender-atp}/images/machine-reports.png (100%) rename windows/security/threat-protection/{windows-defender-atp => microsoft-defender-atp}/images/machines-active-threats-tile.png (100%) rename windows/security/threat-protection/{windows-defender-atp => microsoft-defender-atp}/images/machines-at-risk-tile.png (100%) rename windows/security/threat-protection/{windows-defender-atp => microsoft-defender-atp}/images/machines-at-risk.png (100%) rename windows/security/threat-protection/{windows-defender-atp => microsoft-defender-atp}/images/machines-list.png (100%) rename windows/security/threat-protection/{windows-defender-atp => microsoft-defender-atp}/images/machines-reporting-tile.png (100%) rename windows/security/threat-protection/{windows-defender-atp => microsoft-defender-atp}/images/menu-icon.png (100%) rename windows/security/threat-protection/{windows-defender-atp => microsoft-defender-atp}/images/ms-flow-choose-action.png (100%) rename windows/security/threat-protection/{windows-defender-atp => microsoft-defender-atp}/images/ms-flow-define-action.png (100%) rename windows/security/threat-protection/{windows-defender-atp => microsoft-defender-atp}/images/ms-flow-e2e.png (100%) rename windows/security/threat-protection/{windows-defender-atp => microsoft-defender-atp}/images/ms-flow-insert-db.png (100%) rename windows/security/threat-protection/{windows-defender-atp => microsoft-defender-atp}/images/ms-flow-parse-json.png (100%) rename windows/security/threat-protection/{windows-defender-atp => microsoft-defender-atp}/images/ms-flow-read-db.png (100%) rename windows/security/threat-protection/{windows-defender-atp => microsoft-defender-atp}/images/mss.png (100%) rename windows/security/threat-protection/{windows-defender-atp => microsoft-defender-atp}/images/nativeapp-add-permission.png (100%) rename windows/security/threat-protection/{windows-defender-atp => microsoft-defender-atp}/images/nativeapp-add-permissions-end.png (100%) rename windows/security/threat-protection/{windows-defender-atp => microsoft-defender-atp}/images/nativeapp-create.png (100%) rename windows/security/threat-protection/{windows-defender-atp => microsoft-defender-atp}/images/nativeapp-decoded-token.png (100%) rename windows/security/threat-protection/{windows-defender-atp => microsoft-defender-atp}/images/nativeapp-get-appid.png (100%) rename windows/security/threat-protection/{windows-defender-atp => microsoft-defender-atp}/images/nativeapp-select-permissions.png (100%) rename windows/security/threat-protection/{windows-defender-atp => microsoft-defender-atp}/images/new-secure-score-dashboard.png (100%) rename windows/security/threat-protection/{windows-defender-atp => microsoft-defender-atp}/images/new-ssot.png (100%) rename windows/security/threat-protection/{windows-defender-atp => microsoft-defender-atp}/images/no-threats-found.png (100%) rename windows/security/threat-protection/{windows-defender-atp => microsoft-defender-atp}/images/no_threats_found.png (100%) rename windows/security/threat-protection/{windows-defender-atp => microsoft-defender-atp}/images/not-remediated-icon.png (100%) rename windows/security/threat-protection/{windows-defender-atp => microsoft-defender-atp}/images/office-scc-label.png (100%) rename windows/security/threat-protection/{windows-defender-atp => microsoft-defender-atp}/images/overview.png (100%) rename windows/security/threat-protection/{windows-defender-atp => microsoft-defender-atp}/images/partially-investigated.png (100%) rename windows/security/threat-protection/{windows-defender-atp => microsoft-defender-atp}/images/partially_investigated.png (100%) rename windows/security/threat-protection/{windows-defender-atp => microsoft-defender-atp}/images/partially_remediated.png (100%) rename windows/security/threat-protection/{windows-defender-atp => microsoft-defender-atp}/images/power-bi-create-advanced-query.png (100%) rename windows/security/threat-protection/{windows-defender-atp => microsoft-defender-atp}/images/power-bi-create-blank-query.png (100%) rename windows/security/threat-protection/{windows-defender-atp => microsoft-defender-atp}/images/power-bi-edit-credentials.png (100%) rename windows/security/threat-protection/{windows-defender-atp => microsoft-defender-atp}/images/power-bi-edit-data-privacy.png (100%) rename windows/security/threat-protection/{windows-defender-atp => microsoft-defender-atp}/images/power-bi-open-advanced-editor.png (100%) rename windows/security/threat-protection/{windows-defender-atp => microsoft-defender-atp}/images/power-bi-query-results.png (100%) rename windows/security/threat-protection/{windows-defender-atp => microsoft-defender-atp}/images/power-bi-set-credentials-anonymous.png (100%) rename windows/security/threat-protection/{windows-defender-atp => microsoft-defender-atp}/images/power-bi-set-credentials-organizational-cont.png (100%) rename windows/security/threat-protection/{windows-defender-atp => microsoft-defender-atp}/images/power-bi-set-credentials-organizational.png (100%) rename windows/security/threat-protection/{windows-defender-atp => microsoft-defender-atp}/images/power-bi-set-data-privacy.png (100%) rename windows/security/threat-protection/{windows-defender-atp => microsoft-defender-atp}/images/remediated-icon.png (100%) rename windows/security/threat-protection/{windows-defender-atp => microsoft-defender-atp}/images/rules-legend.png (100%) rename windows/security/threat-protection/{windows-defender-atp => microsoft-defender-atp}/images/run-as-admin.png (100%) rename windows/security/threat-protection/{windows-defender-atp => microsoft-defender-atp}/images/save-query.png (100%) rename windows/security/threat-protection/{windows-defender-atp => microsoft-defender-atp}/images/sccm-deployment.png (100%) rename windows/security/threat-protection/{windows-defender-atp => microsoft-defender-atp}/images/sec-ops-dashboard.png (100%) rename windows/security/threat-protection/{windows-defender-atp => microsoft-defender-atp}/images/securescore.png (100%) rename windows/security/threat-protection/{windows-defender-atp => microsoft-defender-atp}/images/settings.png (100%) rename windows/security/threat-protection/{windows-defender-atp => microsoft-defender-atp}/images/setup-preferences.png (100%) rename windows/security/threat-protection/{windows-defender-atp => microsoft-defender-atp}/images/setup-preferences2.png (100%) rename windows/security/threat-protection/{windows-defender-atp => microsoft-defender-atp}/images/siem_details.png (100%) rename windows/security/threat-protection/{windows-defender-atp => microsoft-defender-atp}/images/ss1.png (100%) rename windows/security/threat-protection/{windows-defender-atp => microsoft-defender-atp}/images/ssot.png (100%) rename windows/security/threat-protection/{windows-defender-atp => microsoft-defender-atp}/images/status-tile.png (100%) rename windows/security/threat-protection/{windows-defender-atp => microsoft-defender-atp}/images/submit-file.png (100%) rename windows/security/threat-protection/{windows-defender-atp => microsoft-defender-atp}/images/ta.png (100%) rename windows/security/threat-protection/{windows-defender-atp => microsoft-defender-atp}/images/terminated-by-system.png (100%) rename windows/security/threat-protection/{windows-defender-atp => microsoft-defender-atp}/images/terminated_by_system.png (100%) rename windows/security/threat-protection/{windows-defender-atp => microsoft-defender-atp}/images/threat-analytics-report.png (100%) rename windows/security/threat-protection/{windows-defender-atp => microsoft-defender-atp}/images/top-recommendations.png (100%) rename windows/security/threat-protection/{windows-defender-atp => microsoft-defender-atp}/images/wdatp-pillars.png (100%) rename windows/security/threat-protection/{windows-defender-atp => microsoft-defender-atp}/images/wdatp-pillars2.png (100%) rename windows/security/threat-protection/{windows-defender-atp => microsoft-defender-atp}/images/wdsc.png (100%) rename windows/security/threat-protection/{windows-defender-atp => microsoft-defender-atp}/images/webapp-add-permission-2.png (100%) rename windows/security/threat-protection/{windows-defender-atp => microsoft-defender-atp}/images/webapp-add-permission-end.png (100%) rename windows/security/threat-protection/{windows-defender-atp => microsoft-defender-atp}/images/webapp-add-permission-readalerts.png (100%) rename windows/security/threat-protection/{windows-defender-atp => microsoft-defender-atp}/images/webapp-add-permission.png (100%) rename windows/security/threat-protection/{windows-defender-atp => microsoft-defender-atp}/images/webapp-app-id1.png (100%) rename windows/security/threat-protection/{windows-defender-atp => microsoft-defender-atp}/images/webapp-create-key.png (100%) rename windows/security/threat-protection/{windows-defender-atp => microsoft-defender-atp}/images/webapp-create.png (100%) rename windows/security/threat-protection/{windows-defender-atp => microsoft-defender-atp}/images/webapp-decoded-token.png (100%) rename windows/security/threat-protection/{windows-defender-atp => microsoft-defender-atp}/images/webapp-edit-multitenant.png (100%) rename windows/security/threat-protection/{windows-defender-atp => microsoft-defender-atp}/images/webapp-edit-settings.png (100%) rename windows/security/threat-protection/{windows-defender-atp => microsoft-defender-atp}/images/webapp-get-appid.png (100%) rename windows/security/threat-protection/{windows-defender-atp => microsoft-defender-atp}/images/webapp-grant-permissions.png (100%) rename windows/security/threat-protection/{windows-defender-atp => microsoft-defender-atp}/images/webapp-select-permission.png (100%) rename windows/security/threat-protection/{windows-defender-atp => microsoft-defender-atp}/images/webapp-validate-token.png (100%) rename windows/security/threat-protection/{windows-defender-atp => microsoft-defender-atp}/images/welcome1.png (100%) rename windows/security/threat-protection/{windows-defender-atp => microsoft-defender-atp}/images/win10-endpoint-users.png (100%) rename windows/security/threat-protection/{windows-defender-atp => microsoft-defender-atp}/images/windefatp-sc-qc-diagtrack.png (100%) rename windows/security/threat-protection/{windows-defender-atp => microsoft-defender-atp}/images/windefatp-sc-query-diagtrack.png (100%) rename windows/security/threat-protection/{windows-defender-atp => microsoft-defender-atp}/images/windefatp-sc-query.png (100%) rename windows/security/threat-protection/{windows-defender-atp => microsoft-defender-atp}/images/windefatp-utc-console-autostart.png (100%) rename windows/security/threat-protection/{windows-defender-atp => microsoft-defender-atp}/images/windows-defender-system-guard-boot-time-integrity.png (100%) rename windows/security/threat-protection/{windows-defender-atp => microsoft-defender-atp}/images/windows-defender-system-guard-validate-system-integrity.png (100%) rename windows/security/threat-protection/{windows-defender-atp => microsoft-defender-atp}/images/windows-defender-system-guard.png (100%) rename windows/security/threat-protection/{windows-defender-atp => microsoft-defender-atp}/improverequestperformance-new.md (100%) rename windows/security/threat-protection/{windows-defender-atp => microsoft-defender-atp}/incidents-queue.md (100%) rename windows/security/threat-protection/{windows-defender-atp => microsoft-defender-atp}/information-protection-in-windows-config.md (100%) rename windows/security/threat-protection/{windows-defender-atp => microsoft-defender-atp}/information-protection-in-windows-overview.md (100%) rename windows/security/threat-protection/{windows-defender-atp => microsoft-defender-atp}/initiate-autoir-investigation-windows-defender-advanced-threat-protection-new.md (100%) rename windows/security/threat-protection/{windows-defender-atp => microsoft-defender-atp}/investigate-alerts-windows-defender-advanced-threat-protection.md (100%) rename windows/security/threat-protection/{windows-defender-atp => microsoft-defender-atp}/investigate-domain-windows-defender-advanced-threat-protection.md (100%) rename windows/security/threat-protection/{windows-defender-atp => microsoft-defender-atp}/investigate-files-windows-defender-advanced-threat-protection.md (100%) rename windows/security/threat-protection/{windows-defender-atp => microsoft-defender-atp}/investigate-incidents-windows-defender-advanced-threat-protection.md (100%) rename windows/security/threat-protection/{windows-defender-atp => microsoft-defender-atp}/investigate-ip-windows-defender-advanced-threat-protection.md (100%) rename windows/security/threat-protection/{windows-defender-atp => microsoft-defender-atp}/investigate-machines-windows-defender-advanced-threat-protection.md (100%) rename windows/security/threat-protection/{windows-defender-atp => microsoft-defender-atp}/investigate-user-windows-defender-advanced-threat-protection.md (100%) rename windows/security/threat-protection/{windows-defender-atp => microsoft-defender-atp}/is-domain-seen-in-org-windows-defender-advanced-threat-protection-new.md (100%) rename windows/security/threat-protection/{windows-defender-atp => microsoft-defender-atp}/is-ip-seen-org-windows-defender-advanced-threat-protection-new.md (100%) rename windows/security/threat-protection/{windows-defender-atp => microsoft-defender-atp}/isolate-machine-windows-defender-advanced-threat-protection-new.md (100%) rename windows/security/threat-protection/{windows-defender-atp => microsoft-defender-atp}/licensing-windows-defender-advanced-threat-protection.md (100%) rename windows/security/threat-protection/{windows-defender-atp => microsoft-defender-atp}/machine-groups-windows-defender-advanced-threat-protection.md (100%) rename windows/security/threat-protection/{windows-defender-atp => microsoft-defender-atp}/machine-reports-windows-defender-advanced-threat-protection.md (100%) rename windows/security/threat-protection/{windows-defender-atp => microsoft-defender-atp}/machine-tags-windows-defender-advanced-threat-protection.md (100%) rename windows/security/threat-protection/{windows-defender-atp => microsoft-defender-atp}/machine-windows-defender-advanced-threat-protection-new.md (100%) rename windows/security/threat-protection/{windows-defender-atp => microsoft-defender-atp}/machineaction-windows-defender-advanced-threat-protection-new.md (100%) rename windows/security/threat-protection/{windows-defender-atp => microsoft-defender-atp}/machineactionsnote.md (100%) rename windows/security/threat-protection/{windows-defender-atp => microsoft-defender-atp}/machines-view-overview-windows-defender-advanced-threat-protection.md (100%) rename windows/security/threat-protection/{windows-defender-atp => microsoft-defender-atp}/manage-alerts-windows-defender-advanced-threat-protection.md (100%) rename windows/security/threat-protection/{windows-defender-atp => microsoft-defender-atp}/manage-allowed-blocked-list-windows-defender-advanced-threat-protection.md (100%) rename windows/security/threat-protection/{windows-defender-atp => microsoft-defender-atp}/manage-auto-investigation-windows-defender-advanced-threat-protection.md (100%) rename windows/security/threat-protection/{windows-defender-atp => microsoft-defender-atp}/manage-automation-allowed-blocked-list-windows-defender-advanced-threat-protection.md (100%) rename windows/security/threat-protection/{windows-defender-atp => microsoft-defender-atp}/manage-automation-file-uploads-windows-defender-advanced-threat-protection.md (100%) rename windows/security/threat-protection/{windows-defender-atp => microsoft-defender-atp}/manage-automation-folder-exclusions-windows-defender-advanced-threat-protection.md (100%) rename windows/security/threat-protection/{windows-defender-atp => microsoft-defender-atp}/manage-edr.md (100%) rename windows/security/threat-protection/{windows-defender-atp => microsoft-defender-atp}/manage-incidents-windows-defender-advanced-threat-protection.md (100%) rename windows/security/threat-protection/{windows-defender-atp => microsoft-defender-atp}/manage-suppression-rules-windows-defender-advanced-threat-protection.md (100%) rename windows/security/threat-protection/{windows-defender-atp => microsoft-defender-atp}/management-apis.md (100%) rename windows/security/threat-protection/{windows-defender-atp => microsoft-defender-atp}/microsoft-cloud-app-security-config.md (100%) rename windows/security/threat-protection/{windows-defender-atp => microsoft-defender-atp}/microsoft-cloud-app-security-integration.md (100%) rename windows/security/threat-protection/{windows-defender-atp => microsoft-defender-atp}/microsoft-threat-experts.md (100%) rename windows/security/threat-protection/{windows-defender-atp => microsoft-defender-atp}/minimum-requirements-windows-defender-advanced-threat-protection.md (100%) rename windows/security/threat-protection/{windows-defender-atp => microsoft-defender-atp}/mssp-support-windows-defender-advanced-threat-protection.md (100%) rename windows/security/threat-protection/{windows-defender-atp => microsoft-defender-atp}/offboard-machine-api-windows-defender-advanced-threat-protection-new.md (100%) rename windows/security/threat-protection/{windows-defender-atp => microsoft-defender-atp}/offboard-machines-windows-defender-advanced-threat-protection.md (100%) rename windows/security/threat-protection/{windows-defender-atp => microsoft-defender-atp}/onboard-configure-windows-defender-advanced-threat-protection.md (100%) rename windows/security/threat-protection/{windows-defender-atp => microsoft-defender-atp}/onboard-downlevel-windows-defender-advanced-threat-protection.md (100%) rename windows/security/threat-protection/{windows-defender-atp => microsoft-defender-atp}/onboard.md (100%) rename windows/security/threat-protection/{windows-defender-atp => microsoft-defender-atp}/overview-attack-surface-reduction.md (100%) rename windows/security/threat-protection/{windows-defender-atp => microsoft-defender-atp}/overview-custom-detections.md (100%) rename windows/security/threat-protection/{windows-defender-atp => microsoft-defender-atp}/overview-endpoint-detection-response.md (100%) rename windows/security/threat-protection/{windows-defender-atp => microsoft-defender-atp}/overview-hardware-based-isolation.md (100%) rename windows/security/threat-protection/{windows-defender-atp => microsoft-defender-atp}/overview-hunting-windows-defender-advanced-threat-protection.md (100%) rename windows/security/threat-protection/{windows-defender-atp => microsoft-defender-atp}/overview-secure-score-windows-defender-advanced-threat-protection.md (100%) rename windows/security/threat-protection/{windows-defender-atp => microsoft-defender-atp}/overview.md (100%) rename windows/security/threat-protection/{windows-defender-atp => microsoft-defender-atp}/portal-overview-windows-defender-advanced-threat-protection.md (100%) rename windows/security/threat-protection/{windows-defender-atp => microsoft-defender-atp}/post-ti-indicator-windows-defender-advanced-threat-protection-new.md (100%) rename windows/security/threat-protection/{windows-defender-atp => microsoft-defender-atp}/powerbi-reports-windows-defender-advanced-threat-protection.md (100%) rename windows/security/threat-protection/{windows-defender-atp => microsoft-defender-atp}/powershell-example-code-windows-defender-advanced-threat-protection.md (100%) rename windows/security/threat-protection/{windows-defender-atp => microsoft-defender-atp}/preferences-setup-windows-defender-advanced-threat-protection.md (100%) rename windows/security/threat-protection/{windows-defender-atp => microsoft-defender-atp}/prerelease.md (100%) rename windows/security/threat-protection/{windows-defender-atp => microsoft-defender-atp}/preview-settings-windows-defender-advanced-threat-protection.md (100%) rename windows/security/threat-protection/{windows-defender-atp => microsoft-defender-atp}/preview-windows-defender-advanced-threat-protection.md (100%) rename windows/security/threat-protection/{windows-defender-atp => microsoft-defender-atp}/pull-alerts-using-rest-api-windows-defender-advanced-threat-protection.md (100%) rename windows/security/threat-protection/{windows-defender-atp => microsoft-defender-atp}/python-example-code-windows-defender-advanced-threat-protection.md (100%) rename windows/security/threat-protection/{windows-defender-atp => microsoft-defender-atp}/rbac-windows-defender-advanced-threat-protection.md (100%) rename windows/security/threat-protection/{windows-defender-atp => microsoft-defender-atp}/respond-file-alerts-windows-defender-advanced-threat-protection.md (100%) rename windows/security/threat-protection/{windows-defender-atp => microsoft-defender-atp}/respond-machine-alerts-windows-defender-advanced-threat-protection.md (100%) rename windows/security/threat-protection/{windows-defender-atp => microsoft-defender-atp}/response-actions-windows-defender-advanced-threat-protection.md (100%) rename windows/security/threat-protection/{windows-defender-atp => microsoft-defender-atp}/restrict-code-execution-windows-defender-advanced-threat-protection-new.md (100%) rename windows/security/threat-protection/{windows-defender-atp => microsoft-defender-atp}/run-advanced-query-api.md (100%) rename windows/security/threat-protection/{windows-defender-atp => microsoft-defender-atp}/run-advanced-query-sample-ms-flow.md (100%) rename windows/security/threat-protection/{windows-defender-atp => microsoft-defender-atp}/run-advanced-query-sample-power-bi-app-token.md (100%) rename windows/security/threat-protection/{windows-defender-atp => microsoft-defender-atp}/run-advanced-query-sample-power-bi-user-token.md (100%) rename windows/security/threat-protection/{windows-defender-atp => microsoft-defender-atp}/run-advanced-query-sample-powershell.md (100%) rename windows/security/threat-protection/{windows-defender-atp => microsoft-defender-atp}/run-advanced-query-sample-python.md (100%) rename windows/security/threat-protection/{windows-defender-atp => microsoft-defender-atp}/run-av-scan-windows-defender-advanced-threat-protection-new.md (100%) rename windows/security/threat-protection/{windows-defender-atp => microsoft-defender-atp}/run-detection-test-windows-defender-advanced-threat-protection.md (100%) rename windows/security/threat-protection/{windows-defender-atp => microsoft-defender-atp}/secure-score-dashboard-windows-defender-advanced-threat-protection.md (100%) rename windows/security/threat-protection/{windows-defender-atp => microsoft-defender-atp}/security-operations-dashboard-windows-defender-advanced-threat-protection.md (100%) rename windows/security/threat-protection/{windows-defender-atp => microsoft-defender-atp}/service-status-windows-defender-advanced-threat-protection.md (100%) rename windows/security/threat-protection/{windows-defender-atp => microsoft-defender-atp}/stop-and-quarantine-file-windows-defender-advanced-threat-protection-new.md (100%) rename windows/security/threat-protection/{windows-defender-atp => microsoft-defender-atp}/supported-response-apis-windows-defender-advanced-threat-protection.md (100%) rename windows/security/threat-protection/{windows-defender-atp => microsoft-defender-atp}/threat-analytics.md (100%) rename windows/security/threat-protection/{windows-defender-atp => microsoft-defender-atp}/threat-indicator-concepts-windows-defender-advanced-threat-protection.md (100%) rename windows/security/threat-protection/{windows-defender-atp => microsoft-defender-atp}/threat-protection-integration.md (100%) rename windows/security/threat-protection/{windows-defender-atp => microsoft-defender-atp}/threat-protection-reports-windows-defender-advanced-threat-protection.md (100%) rename windows/security/threat-protection/{windows-defender-atp => microsoft-defender-atp}/ti-indicator-windows-defender-advanced-threat-protection-new.md (100%) rename windows/security/threat-protection/{windows-defender-atp => microsoft-defender-atp}/time-settings-windows-defender-advanced-threat-protection.md (100%) rename windows/security/threat-protection/{windows-defender-atp => microsoft-defender-atp}/troubleshoot-custom-ti-windows-defender-advanced-threat-protection.md (100%) rename windows/security/threat-protection/{windows-defender-atp => microsoft-defender-atp}/troubleshoot-onboarding-error-messages-windows-defender-advanced-threat-protection.md (100%) rename windows/security/threat-protection/{windows-defender-atp => microsoft-defender-atp}/troubleshoot-onboarding-windows-defender-advanced-threat-protection.md (98%) rename windows/security/threat-protection/{windows-defender-atp => microsoft-defender-atp}/troubleshoot-siem-windows-defender-advanced-threat-protection.md (100%) rename windows/security/threat-protection/{windows-defender-atp => microsoft-defender-atp}/troubleshoot-wdatp.md (100%) rename windows/security/threat-protection/{windows-defender-atp => microsoft-defender-atp}/troubleshoot-windows-defender-advanced-threat-protection.md (100%) rename windows/security/threat-protection/{windows-defender-atp => microsoft-defender-atp}/unisolate-machine-windows-defender-advanced-threat-protection-new.md (100%) rename windows/security/threat-protection/{windows-defender-atp => microsoft-defender-atp}/unrestrict-code-execution-windows-defender-advanced-threat-protection-new.md (100%) rename windows/security/threat-protection/{windows-defender-atp => microsoft-defender-atp}/update-alert-windows-defender-advanced-threat-protection-new.md (100%) rename windows/security/threat-protection/{windows-defender-atp => microsoft-defender-atp}/use-apis.md (100%) rename windows/security/threat-protection/{windows-defender-atp => microsoft-defender-atp}/use-custom-ti-windows-defender-advanced-threat-protection.md (100%) rename windows/security/threat-protection/{windows-defender-atp => microsoft-defender-atp}/use-windows-defender-advanced-threat-protection.md (100%) rename windows/security/threat-protection/{windows-defender-atp => microsoft-defender-atp}/user-roles-windows-defender-advanced-threat-protection.md (100%) rename windows/security/threat-protection/{windows-defender-atp => microsoft-defender-atp}/user-windows-defender-advanced-threat-protection-new.md (100%) rename windows/security/threat-protection/{windows-defender-atp => microsoft-defender-atp}/view-incidents-queue.md (100%) rename windows/security/threat-protection/{windows-defender-atp => microsoft-defender-atp}/whats-new-in-windows-defender-atp.md (100%) rename windows/security/threat-protection/{windows-defender-atp => microsoft-defender-atp}/windows-defender-advanced-threat-protection.md (100%) rename windows/security/threat-protection/{windows-defender-atp => microsoft-defender-atp}/windows-defender-security-center-atp.md (100%) diff --git a/windows/security/threat-protection/windows-defender-atp/TOC.md b/windows/security/threat-protection/microsoft-defender-atp/TOC.md similarity index 100% rename from windows/security/threat-protection/windows-defender-atp/TOC.md rename to windows/security/threat-protection/microsoft-defender-atp/TOC.md diff --git a/windows/security/threat-protection/windows-defender-atp/add-or-remove-machine-tags-windows-defender-advanced-threat-protection-new.md b/windows/security/threat-protection/microsoft-defender-atp/add-or-remove-machine-tags-windows-defender-advanced-threat-protection-new.md similarity index 100% rename from windows/security/threat-protection/windows-defender-atp/add-or-remove-machine-tags-windows-defender-advanced-threat-protection-new.md rename to windows/security/threat-protection/microsoft-defender-atp/add-or-remove-machine-tags-windows-defender-advanced-threat-protection-new.md diff --git a/windows/security/threat-protection/windows-defender-atp/advanced-features-windows-defender-advanced-threat-protection.md b/windows/security/threat-protection/microsoft-defender-atp/advanced-features-windows-defender-advanced-threat-protection.md similarity index 100% rename from windows/security/threat-protection/windows-defender-atp/advanced-features-windows-defender-advanced-threat-protection.md rename to windows/security/threat-protection/microsoft-defender-atp/advanced-features-windows-defender-advanced-threat-protection.md diff --git a/windows/security/threat-protection/windows-defender-atp/advanced-hunting-best-practices-windows-defender-advanced-threat-protection.md b/windows/security/threat-protection/microsoft-defender-atp/advanced-hunting-best-practices-windows-defender-advanced-threat-protection.md similarity index 100% rename from windows/security/threat-protection/windows-defender-atp/advanced-hunting-best-practices-windows-defender-advanced-threat-protection.md rename to windows/security/threat-protection/microsoft-defender-atp/advanced-hunting-best-practices-windows-defender-advanced-threat-protection.md diff --git a/windows/security/threat-protection/windows-defender-atp/advanced-hunting-reference-windows-defender-advanced-threat-protection.md b/windows/security/threat-protection/microsoft-defender-atp/advanced-hunting-reference-windows-defender-advanced-threat-protection.md similarity index 100% rename from windows/security/threat-protection/windows-defender-atp/advanced-hunting-reference-windows-defender-advanced-threat-protection.md rename to windows/security/threat-protection/microsoft-defender-atp/advanced-hunting-reference-windows-defender-advanced-threat-protection.md diff --git a/windows/security/threat-protection/windows-defender-atp/advanced-hunting-windows-defender-advanced-threat-protection.md b/windows/security/threat-protection/microsoft-defender-atp/advanced-hunting-windows-defender-advanced-threat-protection.md similarity index 100% rename from windows/security/threat-protection/windows-defender-atp/advanced-hunting-windows-defender-advanced-threat-protection.md rename to windows/security/threat-protection/microsoft-defender-atp/advanced-hunting-windows-defender-advanced-threat-protection.md diff --git a/windows/security/threat-protection/windows-defender-atp/alerts-queue-endpoint-detection-response.md b/windows/security/threat-protection/microsoft-defender-atp/alerts-queue-endpoint-detection-response.md similarity index 100% rename from windows/security/threat-protection/windows-defender-atp/alerts-queue-endpoint-detection-response.md rename to windows/security/threat-protection/microsoft-defender-atp/alerts-queue-endpoint-detection-response.md diff --git a/windows/security/threat-protection/windows-defender-atp/alerts-queue-windows-defender-advanced-threat-protection.md b/windows/security/threat-protection/microsoft-defender-atp/alerts-queue-windows-defender-advanced-threat-protection.md similarity index 100% rename from windows/security/threat-protection/windows-defender-atp/alerts-queue-windows-defender-advanced-threat-protection.md rename to windows/security/threat-protection/microsoft-defender-atp/alerts-queue-windows-defender-advanced-threat-protection.md diff --git a/windows/security/threat-protection/windows-defender-atp/alerts-windows-defender-advanced-threat-protection-new.md b/windows/security/threat-protection/microsoft-defender-atp/alerts-windows-defender-advanced-threat-protection-new.md similarity index 100% rename from windows/security/threat-protection/windows-defender-atp/alerts-windows-defender-advanced-threat-protection-new.md rename to windows/security/threat-protection/microsoft-defender-atp/alerts-windows-defender-advanced-threat-protection-new.md diff --git a/windows/security/threat-protection/windows-defender-atp/api-hello-world.md b/windows/security/threat-protection/microsoft-defender-atp/api-hello-world.md similarity index 100% rename from windows/security/threat-protection/windows-defender-atp/api-hello-world.md rename to windows/security/threat-protection/microsoft-defender-atp/api-hello-world.md diff --git a/windows/security/threat-protection/windows-defender-atp/api-portal-mapping-windows-defender-advanced-threat-protection.md b/windows/security/threat-protection/microsoft-defender-atp/api-portal-mapping-windows-defender-advanced-threat-protection.md similarity index 100% rename from windows/security/threat-protection/windows-defender-atp/api-portal-mapping-windows-defender-advanced-threat-protection.md rename to windows/security/threat-protection/microsoft-defender-atp/api-portal-mapping-windows-defender-advanced-threat-protection.md diff --git a/windows/security/threat-protection/windows-defender-atp/apis-intro.md b/windows/security/threat-protection/microsoft-defender-atp/apis-intro.md similarity index 100% rename from windows/security/threat-protection/windows-defender-atp/apis-intro.md rename to windows/security/threat-protection/microsoft-defender-atp/apis-intro.md diff --git a/windows/security/threat-protection/windows-defender-atp/assign-portal-access-windows-defender-advanced-threat-protection.md b/windows/security/threat-protection/microsoft-defender-atp/assign-portal-access-windows-defender-advanced-threat-protection.md similarity index 100% rename from windows/security/threat-protection/windows-defender-atp/assign-portal-access-windows-defender-advanced-threat-protection.md rename to windows/security/threat-protection/microsoft-defender-atp/assign-portal-access-windows-defender-advanced-threat-protection.md diff --git a/windows/security/threat-protection/windows-defender-atp/attack-simulations-windows-defender-advanced-threat-protection.md b/windows/security/threat-protection/microsoft-defender-atp/attack-simulations-windows-defender-advanced-threat-protection.md similarity index 100% rename from windows/security/threat-protection/windows-defender-atp/attack-simulations-windows-defender-advanced-threat-protection.md rename to windows/security/threat-protection/microsoft-defender-atp/attack-simulations-windows-defender-advanced-threat-protection.md diff --git a/windows/security/threat-protection/windows-defender-atp/automated-investigations-windows-defender-advanced-threat-protection.md b/windows/security/threat-protection/microsoft-defender-atp/automated-investigations-windows-defender-advanced-threat-protection.md similarity index 100% rename from windows/security/threat-protection/windows-defender-atp/automated-investigations-windows-defender-advanced-threat-protection.md rename to windows/security/threat-protection/microsoft-defender-atp/automated-investigations-windows-defender-advanced-threat-protection.md diff --git a/windows/security/threat-protection/windows-defender-atp/basic-permissions-windows-defender-advanced-threat-protection.md b/windows/security/threat-protection/microsoft-defender-atp/basic-permissions-windows-defender-advanced-threat-protection.md similarity index 100% rename from windows/security/threat-protection/windows-defender-atp/basic-permissions-windows-defender-advanced-threat-protection.md rename to windows/security/threat-protection/microsoft-defender-atp/basic-permissions-windows-defender-advanced-threat-protection.md diff --git a/windows/security/threat-protection/windows-defender-atp/check-sensor-status-windows-defender-advanced-threat-protection.md b/windows/security/threat-protection/microsoft-defender-atp/check-sensor-status-windows-defender-advanced-threat-protection.md similarity index 100% rename from windows/security/threat-protection/windows-defender-atp/check-sensor-status-windows-defender-advanced-threat-protection.md rename to windows/security/threat-protection/microsoft-defender-atp/check-sensor-status-windows-defender-advanced-threat-protection.md diff --git a/windows/security/threat-protection/windows-defender-atp/collect-investigation-package-windows-defender-advanced-threat-protection-new.md b/windows/security/threat-protection/microsoft-defender-atp/collect-investigation-package-windows-defender-advanced-threat-protection-new.md similarity index 100% rename from windows/security/threat-protection/windows-defender-atp/collect-investigation-package-windows-defender-advanced-threat-protection-new.md rename to windows/security/threat-protection/microsoft-defender-atp/collect-investigation-package-windows-defender-advanced-threat-protection-new.md diff --git a/windows/security/threat-protection/windows-defender-atp/community-windows-defender-advanced-threat-protection.md b/windows/security/threat-protection/microsoft-defender-atp/community-windows-defender-advanced-threat-protection.md similarity index 100% rename from windows/security/threat-protection/windows-defender-atp/community-windows-defender-advanced-threat-protection.md rename to windows/security/threat-protection/microsoft-defender-atp/community-windows-defender-advanced-threat-protection.md diff --git a/windows/security/threat-protection/windows-defender-atp/conditional-access-windows-defender-advanced-threat-protection.md b/windows/security/threat-protection/microsoft-defender-atp/conditional-access-windows-defender-advanced-threat-protection.md similarity index 100% rename from windows/security/threat-protection/windows-defender-atp/conditional-access-windows-defender-advanced-threat-protection.md rename to windows/security/threat-protection/microsoft-defender-atp/conditional-access-windows-defender-advanced-threat-protection.md diff --git a/windows/security/threat-protection/windows-defender-atp/configure-arcsight-windows-defender-advanced-threat-protection.md b/windows/security/threat-protection/microsoft-defender-atp/configure-arcsight-windows-defender-advanced-threat-protection.md similarity index 100% rename from windows/security/threat-protection/windows-defender-atp/configure-arcsight-windows-defender-advanced-threat-protection.md rename to windows/security/threat-protection/microsoft-defender-atp/configure-arcsight-windows-defender-advanced-threat-protection.md diff --git a/windows/security/threat-protection/windows-defender-atp/configure-attack-surface-reduction.md b/windows/security/threat-protection/microsoft-defender-atp/configure-attack-surface-reduction.md similarity index 100% rename from windows/security/threat-protection/windows-defender-atp/configure-attack-surface-reduction.md rename to windows/security/threat-protection/microsoft-defender-atp/configure-attack-surface-reduction.md diff --git a/windows/security/threat-protection/windows-defender-atp/configure-conditional-access-windows-defender-advanced-threat-protection.md b/windows/security/threat-protection/microsoft-defender-atp/configure-conditional-access-windows-defender-advanced-threat-protection.md similarity index 100% rename from windows/security/threat-protection/windows-defender-atp/configure-conditional-access-windows-defender-advanced-threat-protection.md rename to windows/security/threat-protection/microsoft-defender-atp/configure-conditional-access-windows-defender-advanced-threat-protection.md diff --git a/windows/security/threat-protection/windows-defender-atp/configure-email-notifications-windows-defender-advanced-threat-protection.md b/windows/security/threat-protection/microsoft-defender-atp/configure-email-notifications-windows-defender-advanced-threat-protection.md similarity index 100% rename from windows/security/threat-protection/windows-defender-atp/configure-email-notifications-windows-defender-advanced-threat-protection.md rename to windows/security/threat-protection/microsoft-defender-atp/configure-email-notifications-windows-defender-advanced-threat-protection.md diff --git a/windows/security/threat-protection/windows-defender-atp/configure-endpoints-gp-windows-defender-advanced-threat-protection.md b/windows/security/threat-protection/microsoft-defender-atp/configure-endpoints-gp-windows-defender-advanced-threat-protection.md similarity index 100% rename from windows/security/threat-protection/windows-defender-atp/configure-endpoints-gp-windows-defender-advanced-threat-protection.md rename to windows/security/threat-protection/microsoft-defender-atp/configure-endpoints-gp-windows-defender-advanced-threat-protection.md diff --git a/windows/security/threat-protection/windows-defender-atp/configure-endpoints-mdm-windows-defender-advanced-threat-protection.md b/windows/security/threat-protection/microsoft-defender-atp/configure-endpoints-mdm-windows-defender-advanced-threat-protection.md similarity index 100% rename from windows/security/threat-protection/windows-defender-atp/configure-endpoints-mdm-windows-defender-advanced-threat-protection.md rename to windows/security/threat-protection/microsoft-defender-atp/configure-endpoints-mdm-windows-defender-advanced-threat-protection.md diff --git a/windows/security/threat-protection/windows-defender-atp/configure-endpoints-non-windows-windows-defender-advanced-threat-protection.md b/windows/security/threat-protection/microsoft-defender-atp/configure-endpoints-non-windows-windows-defender-advanced-threat-protection.md similarity index 100% rename from windows/security/threat-protection/windows-defender-atp/configure-endpoints-non-windows-windows-defender-advanced-threat-protection.md rename to windows/security/threat-protection/microsoft-defender-atp/configure-endpoints-non-windows-windows-defender-advanced-threat-protection.md diff --git a/windows/security/threat-protection/windows-defender-atp/configure-endpoints-sccm-windows-defender-advanced-threat-protection.md b/windows/security/threat-protection/microsoft-defender-atp/configure-endpoints-sccm-windows-defender-advanced-threat-protection.md similarity index 100% rename from windows/security/threat-protection/windows-defender-atp/configure-endpoints-sccm-windows-defender-advanced-threat-protection.md rename to windows/security/threat-protection/microsoft-defender-atp/configure-endpoints-sccm-windows-defender-advanced-threat-protection.md diff --git a/windows/security/threat-protection/windows-defender-atp/configure-endpoints-script-windows-defender-advanced-threat-protection.md b/windows/security/threat-protection/microsoft-defender-atp/configure-endpoints-script-windows-defender-advanced-threat-protection.md similarity index 100% rename from windows/security/threat-protection/windows-defender-atp/configure-endpoints-script-windows-defender-advanced-threat-protection.md rename to windows/security/threat-protection/microsoft-defender-atp/configure-endpoints-script-windows-defender-advanced-threat-protection.md diff --git a/windows/security/threat-protection/windows-defender-atp/configure-endpoints-vdi-windows-defender-advanced-threat-protection.md b/windows/security/threat-protection/microsoft-defender-atp/configure-endpoints-vdi-windows-defender-advanced-threat-protection.md similarity index 100% rename from windows/security/threat-protection/windows-defender-atp/configure-endpoints-vdi-windows-defender-advanced-threat-protection.md rename to windows/security/threat-protection/microsoft-defender-atp/configure-endpoints-vdi-windows-defender-advanced-threat-protection.md diff --git a/windows/security/threat-protection/windows-defender-atp/configure-endpoints-windows-defender-advanced-threat-protection.md b/windows/security/threat-protection/microsoft-defender-atp/configure-endpoints-windows-defender-advanced-threat-protection.md similarity index 100% rename from windows/security/threat-protection/windows-defender-atp/configure-endpoints-windows-defender-advanced-threat-protection.md rename to windows/security/threat-protection/microsoft-defender-atp/configure-endpoints-windows-defender-advanced-threat-protection.md diff --git a/windows/security/threat-protection/windows-defender-atp/configure-microsoft-threat-experts.md b/windows/security/threat-protection/microsoft-defender-atp/configure-microsoft-threat-experts.md similarity index 100% rename from windows/security/threat-protection/windows-defender-atp/configure-microsoft-threat-experts.md rename to windows/security/threat-protection/microsoft-defender-atp/configure-microsoft-threat-experts.md diff --git a/windows/security/threat-protection/windows-defender-atp/configure-mssp-support-windows-defender-advanced-threat-protection.md b/windows/security/threat-protection/microsoft-defender-atp/configure-mssp-support-windows-defender-advanced-threat-protection.md similarity index 100% rename from windows/security/threat-protection/windows-defender-atp/configure-mssp-support-windows-defender-advanced-threat-protection.md rename to windows/security/threat-protection/microsoft-defender-atp/configure-mssp-support-windows-defender-advanced-threat-protection.md diff --git a/windows/security/threat-protection/windows-defender-atp/configure-proxy-internet-windows-defender-advanced-threat-protection.md b/windows/security/threat-protection/microsoft-defender-atp/configure-proxy-internet-windows-defender-advanced-threat-protection.md similarity index 100% rename from windows/security/threat-protection/windows-defender-atp/configure-proxy-internet-windows-defender-advanced-threat-protection.md rename to windows/security/threat-protection/microsoft-defender-atp/configure-proxy-internet-windows-defender-advanced-threat-protection.md diff --git a/windows/security/threat-protection/windows-defender-atp/configure-server-endpoints-windows-defender-advanced-threat-protection.md b/windows/security/threat-protection/microsoft-defender-atp/configure-server-endpoints-windows-defender-advanced-threat-protection.md similarity index 100% rename from windows/security/threat-protection/windows-defender-atp/configure-server-endpoints-windows-defender-advanced-threat-protection.md rename to windows/security/threat-protection/microsoft-defender-atp/configure-server-endpoints-windows-defender-advanced-threat-protection.md diff --git a/windows/security/threat-protection/windows-defender-atp/configure-siem-windows-defender-advanced-threat-protection.md b/windows/security/threat-protection/microsoft-defender-atp/configure-siem-windows-defender-advanced-threat-protection.md similarity index 100% rename from windows/security/threat-protection/windows-defender-atp/configure-siem-windows-defender-advanced-threat-protection.md rename to windows/security/threat-protection/microsoft-defender-atp/configure-siem-windows-defender-advanced-threat-protection.md diff --git a/windows/security/threat-protection/windows-defender-atp/configure-splunk-windows-defender-advanced-threat-protection.md b/windows/security/threat-protection/microsoft-defender-atp/configure-splunk-windows-defender-advanced-threat-protection.md similarity index 100% rename from windows/security/threat-protection/windows-defender-atp/configure-splunk-windows-defender-advanced-threat-protection.md rename to windows/security/threat-protection/microsoft-defender-atp/configure-splunk-windows-defender-advanced-threat-protection.md diff --git a/windows/security/threat-protection/windows-defender-atp/create-alert-by-reference-windows-defender-advanced-threat-protection-new.md b/windows/security/threat-protection/microsoft-defender-atp/create-alert-by-reference-windows-defender-advanced-threat-protection-new.md similarity index 100% rename from windows/security/threat-protection/windows-defender-atp/create-alert-by-reference-windows-defender-advanced-threat-protection-new.md rename to windows/security/threat-protection/microsoft-defender-atp/create-alert-by-reference-windows-defender-advanced-threat-protection-new.md diff --git a/windows/security/threat-protection/windows-defender-atp/custom-detection-rules.md b/windows/security/threat-protection/microsoft-defender-atp/custom-detection-rules.md similarity index 100% rename from windows/security/threat-protection/windows-defender-atp/custom-detection-rules.md rename to windows/security/threat-protection/microsoft-defender-atp/custom-detection-rules.md diff --git a/windows/security/threat-protection/windows-defender-atp/custom-ti-api-windows-defender-advanced-threat-protection.md b/windows/security/threat-protection/microsoft-defender-atp/custom-ti-api-windows-defender-advanced-threat-protection.md similarity index 100% rename from windows/security/threat-protection/windows-defender-atp/custom-ti-api-windows-defender-advanced-threat-protection.md rename to windows/security/threat-protection/microsoft-defender-atp/custom-ti-api-windows-defender-advanced-threat-protection.md diff --git a/windows/security/threat-protection/windows-defender-atp/data-retention-settings-windows-defender-advanced-threat-protection.md b/windows/security/threat-protection/microsoft-defender-atp/data-retention-settings-windows-defender-advanced-threat-protection.md similarity index 100% rename from windows/security/threat-protection/windows-defender-atp/data-retention-settings-windows-defender-advanced-threat-protection.md rename to windows/security/threat-protection/microsoft-defender-atp/data-retention-settings-windows-defender-advanced-threat-protection.md diff --git a/windows/security/threat-protection/windows-defender-atp/data-storage-privacy-windows-defender-advanced-threat-protection.md b/windows/security/threat-protection/microsoft-defender-atp/data-storage-privacy-windows-defender-advanced-threat-protection.md similarity index 100% rename from windows/security/threat-protection/windows-defender-atp/data-storage-privacy-windows-defender-advanced-threat-protection.md rename to windows/security/threat-protection/microsoft-defender-atp/data-storage-privacy-windows-defender-advanced-threat-protection.md diff --git a/windows/security/threat-protection/windows-defender-atp/defender-compatibility-windows-defender-advanced-threat-protection.md b/windows/security/threat-protection/microsoft-defender-atp/defender-compatibility-windows-defender-advanced-threat-protection.md similarity index 100% rename from windows/security/threat-protection/windows-defender-atp/defender-compatibility-windows-defender-advanced-threat-protection.md rename to windows/security/threat-protection/microsoft-defender-atp/defender-compatibility-windows-defender-advanced-threat-protection.md diff --git a/windows/security/threat-protection/windows-defender-atp/delete-ti-indicator-by-id-windows-defender-advanced-threat-protection-new.md b/windows/security/threat-protection/microsoft-defender-atp/delete-ti-indicator-by-id-windows-defender-advanced-threat-protection-new.md similarity index 100% rename from windows/security/threat-protection/windows-defender-atp/delete-ti-indicator-by-id-windows-defender-advanced-threat-protection-new.md rename to windows/security/threat-protection/microsoft-defender-atp/delete-ti-indicator-by-id-windows-defender-advanced-threat-protection-new.md diff --git a/windows/security/threat-protection/windows-defender-atp/deprecate.md b/windows/security/threat-protection/microsoft-defender-atp/deprecate.md similarity index 100% rename from windows/security/threat-protection/windows-defender-atp/deprecate.md rename to windows/security/threat-protection/microsoft-defender-atp/deprecate.md diff --git a/windows/security/threat-protection/windows-defender-atp/enable-custom-ti-windows-defender-advanced-threat-protection.md b/windows/security/threat-protection/microsoft-defender-atp/enable-custom-ti-windows-defender-advanced-threat-protection.md similarity index 100% rename from windows/security/threat-protection/windows-defender-atp/enable-custom-ti-windows-defender-advanced-threat-protection.md rename to windows/security/threat-protection/microsoft-defender-atp/enable-custom-ti-windows-defender-advanced-threat-protection.md diff --git a/windows/security/threat-protection/windows-defender-atp/enable-secure-score-windows-defender-advanced-threat-protection.md b/windows/security/threat-protection/microsoft-defender-atp/enable-secure-score-windows-defender-advanced-threat-protection.md similarity index 100% rename from windows/security/threat-protection/windows-defender-atp/enable-secure-score-windows-defender-advanced-threat-protection.md rename to windows/security/threat-protection/microsoft-defender-atp/enable-secure-score-windows-defender-advanced-threat-protection.md diff --git a/windows/security/threat-protection/windows-defender-atp/enable-siem-integration-windows-defender-advanced-threat-protection.md b/windows/security/threat-protection/microsoft-defender-atp/enable-siem-integration-windows-defender-advanced-threat-protection.md similarity index 100% rename from windows/security/threat-protection/windows-defender-atp/enable-siem-integration-windows-defender-advanced-threat-protection.md rename to windows/security/threat-protection/microsoft-defender-atp/enable-siem-integration-windows-defender-advanced-threat-protection.md diff --git a/windows/security/threat-protection/windows-defender-atp/evaluate-atp.md b/windows/security/threat-protection/microsoft-defender-atp/evaluate-atp.md similarity index 100% rename from windows/security/threat-protection/windows-defender-atp/evaluate-atp.md rename to windows/security/threat-protection/microsoft-defender-atp/evaluate-atp.md diff --git a/windows/security/threat-protection/windows-defender-atp/event-error-codes-windows-defender-advanced-threat-protection.md b/windows/security/threat-protection/microsoft-defender-atp/event-error-codes-windows-defender-advanced-threat-protection.md similarity index 100% rename from windows/security/threat-protection/windows-defender-atp/event-error-codes-windows-defender-advanced-threat-protection.md rename to windows/security/threat-protection/microsoft-defender-atp/event-error-codes-windows-defender-advanced-threat-protection.md diff --git a/windows/security/threat-protection/windows-defender-atp/experiment-custom-ti-windows-defender-advanced-threat-protection.md b/windows/security/threat-protection/microsoft-defender-atp/experiment-custom-ti-windows-defender-advanced-threat-protection.md similarity index 100% rename from windows/security/threat-protection/windows-defender-atp/experiment-custom-ti-windows-defender-advanced-threat-protection.md rename to windows/security/threat-protection/microsoft-defender-atp/experiment-custom-ti-windows-defender-advanced-threat-protection.md diff --git a/windows/security/threat-protection/windows-defender-atp/exposed-apis-create-app-nativeapp.md b/windows/security/threat-protection/microsoft-defender-atp/exposed-apis-create-app-nativeapp.md similarity index 100% rename from windows/security/threat-protection/windows-defender-atp/exposed-apis-create-app-nativeapp.md rename to windows/security/threat-protection/microsoft-defender-atp/exposed-apis-create-app-nativeapp.md diff --git a/windows/security/threat-protection/windows-defender-atp/exposed-apis-create-app-webapp.md b/windows/security/threat-protection/microsoft-defender-atp/exposed-apis-create-app-webapp.md similarity index 100% rename from windows/security/threat-protection/windows-defender-atp/exposed-apis-create-app-webapp.md rename to windows/security/threat-protection/microsoft-defender-atp/exposed-apis-create-app-webapp.md diff --git a/windows/security/threat-protection/windows-defender-atp/exposed-apis-full-sample-powershell.md b/windows/security/threat-protection/microsoft-defender-atp/exposed-apis-full-sample-powershell.md similarity index 100% rename from windows/security/threat-protection/windows-defender-atp/exposed-apis-full-sample-powershell.md rename to windows/security/threat-protection/microsoft-defender-atp/exposed-apis-full-sample-powershell.md diff --git a/windows/security/threat-protection/windows-defender-atp/exposed-apis-list.md b/windows/security/threat-protection/microsoft-defender-atp/exposed-apis-list.md similarity index 100% rename from windows/security/threat-protection/windows-defender-atp/exposed-apis-list.md rename to windows/security/threat-protection/microsoft-defender-atp/exposed-apis-list.md diff --git a/windows/security/threat-protection/windows-defender-atp/exposed-apis-odata-samples.md b/windows/security/threat-protection/microsoft-defender-atp/exposed-apis-odata-samples.md similarity index 100% rename from windows/security/threat-protection/windows-defender-atp/exposed-apis-odata-samples.md rename to windows/security/threat-protection/microsoft-defender-atp/exposed-apis-odata-samples.md diff --git a/windows/security/threat-protection/windows-defender-atp/files-windows-defender-advanced-threat-protection-new.md b/windows/security/threat-protection/microsoft-defender-atp/files-windows-defender-advanced-threat-protection-new.md similarity index 100% rename from windows/security/threat-protection/windows-defender-atp/files-windows-defender-advanced-threat-protection-new.md rename to windows/security/threat-protection/microsoft-defender-atp/files-windows-defender-advanced-threat-protection-new.md diff --git a/windows/security/threat-protection/windows-defender-atp/find-machine-info-by-ip-windows-defender-advanced-threat-protection-new.md b/windows/security/threat-protection/microsoft-defender-atp/find-machine-info-by-ip-windows-defender-advanced-threat-protection-new.md similarity index 100% rename from windows/security/threat-protection/windows-defender-atp/find-machine-info-by-ip-windows-defender-advanced-threat-protection-new.md rename to windows/security/threat-protection/microsoft-defender-atp/find-machine-info-by-ip-windows-defender-advanced-threat-protection-new.md diff --git a/windows/security/threat-protection/windows-defender-atp/find-machines-by-ip-windows-defender-advanced-threat-protection-new.md b/windows/security/threat-protection/microsoft-defender-atp/find-machines-by-ip-windows-defender-advanced-threat-protection-new.md similarity index 100% rename from windows/security/threat-protection/windows-defender-atp/find-machines-by-ip-windows-defender-advanced-threat-protection-new.md rename to windows/security/threat-protection/microsoft-defender-atp/find-machines-by-ip-windows-defender-advanced-threat-protection-new.md diff --git a/windows/security/threat-protection/windows-defender-atp/fix-unhealhty-sensors-windows-defender-advanced-threat-protection.md b/windows/security/threat-protection/microsoft-defender-atp/fix-unhealhty-sensors-windows-defender-advanced-threat-protection.md similarity index 100% rename from windows/security/threat-protection/windows-defender-atp/fix-unhealhty-sensors-windows-defender-advanced-threat-protection.md rename to windows/security/threat-protection/microsoft-defender-atp/fix-unhealhty-sensors-windows-defender-advanced-threat-protection.md diff --git a/windows/security/threat-protection/windows-defender-atp/get-alert-info-by-id-windows-defender-advanced-threat-protection-new.md b/windows/security/threat-protection/microsoft-defender-atp/get-alert-info-by-id-windows-defender-advanced-threat-protection-new.md similarity index 100% rename from windows/security/threat-protection/windows-defender-atp/get-alert-info-by-id-windows-defender-advanced-threat-protection-new.md rename to windows/security/threat-protection/microsoft-defender-atp/get-alert-info-by-id-windows-defender-advanced-threat-protection-new.md diff --git a/windows/security/threat-protection/windows-defender-atp/get-alert-related-domain-info-windows-defender-advanced-threat-protection-new.md b/windows/security/threat-protection/microsoft-defender-atp/get-alert-related-domain-info-windows-defender-advanced-threat-protection-new.md similarity index 100% rename from windows/security/threat-protection/windows-defender-atp/get-alert-related-domain-info-windows-defender-advanced-threat-protection-new.md rename to windows/security/threat-protection/microsoft-defender-atp/get-alert-related-domain-info-windows-defender-advanced-threat-protection-new.md diff --git a/windows/security/threat-protection/windows-defender-atp/get-alert-related-files-info-windows-defender-advanced-threat-protection-new.md b/windows/security/threat-protection/microsoft-defender-atp/get-alert-related-files-info-windows-defender-advanced-threat-protection-new.md similarity index 100% rename from windows/security/threat-protection/windows-defender-atp/get-alert-related-files-info-windows-defender-advanced-threat-protection-new.md rename to windows/security/threat-protection/microsoft-defender-atp/get-alert-related-files-info-windows-defender-advanced-threat-protection-new.md diff --git a/windows/security/threat-protection/windows-defender-atp/get-alert-related-ip-info-windows-defender-advanced-threat-protection-new.md b/windows/security/threat-protection/microsoft-defender-atp/get-alert-related-ip-info-windows-defender-advanced-threat-protection-new.md similarity index 100% rename from windows/security/threat-protection/windows-defender-atp/get-alert-related-ip-info-windows-defender-advanced-threat-protection-new.md rename to windows/security/threat-protection/microsoft-defender-atp/get-alert-related-ip-info-windows-defender-advanced-threat-protection-new.md diff --git a/windows/security/threat-protection/windows-defender-atp/get-alert-related-machine-info-windows-defender-advanced-threat-protection-new.md b/windows/security/threat-protection/microsoft-defender-atp/get-alert-related-machine-info-windows-defender-advanced-threat-protection-new.md similarity index 100% rename from windows/security/threat-protection/windows-defender-atp/get-alert-related-machine-info-windows-defender-advanced-threat-protection-new.md rename to windows/security/threat-protection/microsoft-defender-atp/get-alert-related-machine-info-windows-defender-advanced-threat-protection-new.md diff --git a/windows/security/threat-protection/windows-defender-atp/get-alert-related-user-info-windows-defender-advanced-threat-protection-new.md b/windows/security/threat-protection/microsoft-defender-atp/get-alert-related-user-info-windows-defender-advanced-threat-protection-new.md similarity index 100% rename from windows/security/threat-protection/windows-defender-atp/get-alert-related-user-info-windows-defender-advanced-threat-protection-new.md rename to windows/security/threat-protection/microsoft-defender-atp/get-alert-related-user-info-windows-defender-advanced-threat-protection-new.md diff --git a/windows/security/threat-protection/windows-defender-atp/get-alerts-windows-defender-advanced-threat-protection-new.md b/windows/security/threat-protection/microsoft-defender-atp/get-alerts-windows-defender-advanced-threat-protection-new.md similarity index 100% rename from windows/security/threat-protection/windows-defender-atp/get-alerts-windows-defender-advanced-threat-protection-new.md rename to windows/security/threat-protection/microsoft-defender-atp/get-alerts-windows-defender-advanced-threat-protection-new.md diff --git a/windows/security/threat-protection/windows-defender-atp/get-cvekbmap-collection-windows-defender-advanced-threat-protection.md b/windows/security/threat-protection/microsoft-defender-atp/get-cvekbmap-collection-windows-defender-advanced-threat-protection.md similarity index 95% rename from windows/security/threat-protection/windows-defender-atp/get-cvekbmap-collection-windows-defender-advanced-threat-protection.md rename to windows/security/threat-protection/microsoft-defender-atp/get-cvekbmap-collection-windows-defender-advanced-threat-protection.md index 4251da56b9..e65b940689 100644 --- a/windows/security/threat-protection/windows-defender-atp/get-cvekbmap-collection-windows-defender-advanced-threat-protection.md +++ b/windows/security/threat-protection/microsoft-defender-atp/get-cvekbmap-collection-windows-defender-advanced-threat-protection.md @@ -1,82 +1,82 @@ ---- -title: Get CVE-KB map API -description: Retrieves a map of CVE's to KB's. -keywords: apis, graph api, supported apis, get, cve, kb -search.product: eADQiWindows 10XVcnh -search.appverid: met150 -ms.prod: w10 -ms.mktglfcycl: deploy -ms.sitesec: library -ms.pagetype: security -ms.author: leonidzh -author: mjcaparas +--- +title: Get CVE-KB map API +description: Retrieves a map of CVE's to KB's. +keywords: apis, graph api, supported apis, get, cve, kb +search.product: eADQiWindows 10XVcnh +search.appverid: met150 +ms.prod: w10 +ms.mktglfcycl: deploy +ms.sitesec: library +ms.pagetype: security +ms.author: leonidzh +author: mjcaparas ms.localizationpriority: medium manager: dansimp audience: ITPro ms.collection: M365-security-compliance -ms.topic: article -ms.date: 10/07/2018 ---- - -# Get CVE-KB map API - -**Applies to:** - -- [Windows Defender Advanced Threat Protection (Windows Defender ATP)](https://go.microsoft.com/fwlink/p/?linkid=2069559) - -Retrieves a map of CVE's to KB's and CVE details. - -## Permissions -User needs read permissions. - -## HTTP request -``` -GET /testwdatppreview/cvekbmap -``` - -## Request headers - -Header | Value -:---|:--- -Authorization | Bearer {token}. **Required**. -Content type | application/json - -## Request body -Empty - -## Response -If successful and map exists - 200 OK. - -## Example - -**Request** - -Here is an example of the request. - -``` -GET https://graph.microsoft.com/testwdatppreview/CveKbMap -Content-type: application/json -``` - -**Response** - -Here is an example of the response. - -``` -HTTP/1.1 200 OK -Content-type: application/json -{ - "@odata.context":"https://graph.microsoft.com/testwdatppreview/$metadata#CveKbMap", - "@odata.count": 4168, - "value": [ - { - "cveKbId": "CVE-2015-2482-3097617", - "cveId": "CVE-2015-2482", - "kbId":"3097617", - "title": "Cumulative Security Update for Internet Explorer", - "severity": "Critical" - }, - … -} - -``` +ms.topic: article +ms.date: 10/07/2018 +--- + +# Get CVE-KB map API + +**Applies to:** + +- [Windows Defender Advanced Threat Protection (Windows Defender ATP)](https://go.microsoft.com/fwlink/p/?linkid=2069559) + +Retrieves a map of CVE's to KB's and CVE details. + +## Permissions +User needs read permissions. + +## HTTP request +``` +GET /testwdatppreview/cvekbmap +``` + +## Request headers + +Header | Value +:---|:--- +Authorization | Bearer {token}. **Required**. +Content type | application/json + +## Request body +Empty + +## Response +If successful and map exists - 200 OK. + +## Example + +**Request** + +Here is an example of the request. + +``` +GET https://graph.microsoft.com/testwdatppreview/CveKbMap +Content-type: application/json +``` + +**Response** + +Here is an example of the response. + +``` +HTTP/1.1 200 OK +Content-type: application/json +{ + "@odata.context":"https://graph.microsoft.com/testwdatppreview/$metadata#CveKbMap", + "@odata.count": 4168, + "value": [ + { + "cveKbId": "CVE-2015-2482-3097617", + "cveId": "CVE-2015-2482", + "kbId":"3097617", + "title": "Cumulative Security Update for Internet Explorer", + "severity": "Critical" + }, + … +} + +``` diff --git a/windows/security/threat-protection/windows-defender-atp/get-domain-related-alerts-windows-defender-advanced-threat-protection-new.md b/windows/security/threat-protection/microsoft-defender-atp/get-domain-related-alerts-windows-defender-advanced-threat-protection-new.md similarity index 100% rename from windows/security/threat-protection/windows-defender-atp/get-domain-related-alerts-windows-defender-advanced-threat-protection-new.md rename to windows/security/threat-protection/microsoft-defender-atp/get-domain-related-alerts-windows-defender-advanced-threat-protection-new.md diff --git a/windows/security/threat-protection/windows-defender-atp/get-domain-related-machines-windows-defender-advanced-threat-protection-new.md b/windows/security/threat-protection/microsoft-defender-atp/get-domain-related-machines-windows-defender-advanced-threat-protection-new.md similarity index 100% rename from windows/security/threat-protection/windows-defender-atp/get-domain-related-machines-windows-defender-advanced-threat-protection-new.md rename to windows/security/threat-protection/microsoft-defender-atp/get-domain-related-machines-windows-defender-advanced-threat-protection-new.md diff --git a/windows/security/threat-protection/windows-defender-atp/get-domain-statistics-windows-defender-advanced-threat-protection-new.md b/windows/security/threat-protection/microsoft-defender-atp/get-domain-statistics-windows-defender-advanced-threat-protection-new.md similarity index 100% rename from windows/security/threat-protection/windows-defender-atp/get-domain-statistics-windows-defender-advanced-threat-protection-new.md rename to windows/security/threat-protection/microsoft-defender-atp/get-domain-statistics-windows-defender-advanced-threat-protection-new.md diff --git a/windows/security/threat-protection/windows-defender-atp/get-file-information-windows-defender-advanced-threat-protection-new.md b/windows/security/threat-protection/microsoft-defender-atp/get-file-information-windows-defender-advanced-threat-protection-new.md similarity index 100% rename from windows/security/threat-protection/windows-defender-atp/get-file-information-windows-defender-advanced-threat-protection-new.md rename to windows/security/threat-protection/microsoft-defender-atp/get-file-information-windows-defender-advanced-threat-protection-new.md diff --git a/windows/security/threat-protection/windows-defender-atp/get-file-related-alerts-windows-defender-advanced-threat-protection-new.md b/windows/security/threat-protection/microsoft-defender-atp/get-file-related-alerts-windows-defender-advanced-threat-protection-new.md similarity index 100% rename from windows/security/threat-protection/windows-defender-atp/get-file-related-alerts-windows-defender-advanced-threat-protection-new.md rename to windows/security/threat-protection/microsoft-defender-atp/get-file-related-alerts-windows-defender-advanced-threat-protection-new.md diff --git a/windows/security/threat-protection/windows-defender-atp/get-file-related-machines-windows-defender-advanced-threat-protection-new.md b/windows/security/threat-protection/microsoft-defender-atp/get-file-related-machines-windows-defender-advanced-threat-protection-new.md similarity index 100% rename from windows/security/threat-protection/windows-defender-atp/get-file-related-machines-windows-defender-advanced-threat-protection-new.md rename to windows/security/threat-protection/microsoft-defender-atp/get-file-related-machines-windows-defender-advanced-threat-protection-new.md diff --git a/windows/security/threat-protection/windows-defender-atp/get-file-statistics-windows-defender-advanced-threat-protection-new.md b/windows/security/threat-protection/microsoft-defender-atp/get-file-statistics-windows-defender-advanced-threat-protection-new.md similarity index 100% rename from windows/security/threat-protection/windows-defender-atp/get-file-statistics-windows-defender-advanced-threat-protection-new.md rename to windows/security/threat-protection/microsoft-defender-atp/get-file-statistics-windows-defender-advanced-threat-protection-new.md diff --git a/windows/security/threat-protection/windows-defender-atp/get-ip-related-alerts-windows-defender-advanced-threat-protection-new.md b/windows/security/threat-protection/microsoft-defender-atp/get-ip-related-alerts-windows-defender-advanced-threat-protection-new.md similarity index 100% rename from windows/security/threat-protection/windows-defender-atp/get-ip-related-alerts-windows-defender-advanced-threat-protection-new.md rename to windows/security/threat-protection/microsoft-defender-atp/get-ip-related-alerts-windows-defender-advanced-threat-protection-new.md diff --git a/windows/security/threat-protection/windows-defender-atp/get-ip-related-machines-windows-defender-advanced-threat-protection-new.md b/windows/security/threat-protection/microsoft-defender-atp/get-ip-related-machines-windows-defender-advanced-threat-protection-new.md similarity index 100% rename from windows/security/threat-protection/windows-defender-atp/get-ip-related-machines-windows-defender-advanced-threat-protection-new.md rename to windows/security/threat-protection/microsoft-defender-atp/get-ip-related-machines-windows-defender-advanced-threat-protection-new.md diff --git a/windows/security/threat-protection/windows-defender-atp/get-ip-statistics-windows-defender-advanced-threat-protection-new.md b/windows/security/threat-protection/microsoft-defender-atp/get-ip-statistics-windows-defender-advanced-threat-protection-new.md similarity index 100% rename from windows/security/threat-protection/windows-defender-atp/get-ip-statistics-windows-defender-advanced-threat-protection-new.md rename to windows/security/threat-protection/microsoft-defender-atp/get-ip-statistics-windows-defender-advanced-threat-protection-new.md diff --git a/windows/security/threat-protection/windows-defender-atp/get-kbinfo-collection-windows-defender-advanced-threat-protection.md b/windows/security/threat-protection/microsoft-defender-atp/get-kbinfo-collection-windows-defender-advanced-threat-protection.md similarity index 95% rename from windows/security/threat-protection/windows-defender-atp/get-kbinfo-collection-windows-defender-advanced-threat-protection.md rename to windows/security/threat-protection/microsoft-defender-atp/get-kbinfo-collection-windows-defender-advanced-threat-protection.md index 1752cd4d91..cfc710240a 100644 --- a/windows/security/threat-protection/windows-defender-atp/get-kbinfo-collection-windows-defender-advanced-threat-protection.md +++ b/windows/security/threat-protection/microsoft-defender-atp/get-kbinfo-collection-windows-defender-advanced-threat-protection.md @@ -1,81 +1,81 @@ ---- -title: Get KB collection API -description: Retrieves a collection of KB's. -keywords: apis, graph api, supported apis, get, kb -search.product: eADQiWindows 10XVcnh -search.appverid: met150 -ms.prod: w10 -ms.mktglfcycl: deploy -ms.sitesec: library -ms.pagetype: security -ms.author: leonidzh -author: mjcaparas +--- +title: Get KB collection API +description: Retrieves a collection of KB's. +keywords: apis, graph api, supported apis, get, kb +search.product: eADQiWindows 10XVcnh +search.appverid: met150 +ms.prod: w10 +ms.mktglfcycl: deploy +ms.sitesec: library +ms.pagetype: security +ms.author: leonidzh +author: mjcaparas ms.localizationpriority: medium manager: dansimp audience: ITPro ms.collection: M365-security-compliance -ms.topic: article -ms.date: 10/07/2018 ---- - -# Get KB collection API - -**Applies to:** - -- [Windows Defender Advanced Threat Protection (Windows Defender ATP)](https://go.microsoft.com/fwlink/p/?linkid=2069559) - -Retrieves a collection of KB's and KB details. - -## Permissions -User needs read permissions. - -## HTTP request -``` -GET /testwdatppreview/kbinfo -``` - -## Request headers - -Header | Value -:---|:--- -Authorization | Bearer {token}. **Required**. -Content type | application/json - -## Request body -Empty - -## Response -If successful - 200 OK. - -## Example - -**Request** - -Here is an example of the request. - -``` -GET https://graph.microsoft.com/testwdatppreview/KbInfo -Content-type: application/json -``` - -**Response** - -Here is an example of the response. - -``` -HTTP/1.1 200 OK -Content-type: application/json -{ - "@odata.context": "https://graph.microsoft.com/testwdatppreview/$metadata#KbInfo", - "@odata.count": 271, - "value":[ - { - "id": "KB3097617 (10240.16549) Amd64", - "release": "KB3097617 (10240.16549)", - "publishingDate": "2015-10-16T21:00:00Z", - "version": "10.0.10240.16549", - "architecture": "Amd64" - }, - … -} +ms.topic: article +ms.date: 10/07/2018 +--- + +# Get KB collection API + +**Applies to:** + +- [Windows Defender Advanced Threat Protection (Windows Defender ATP)](https://go.microsoft.com/fwlink/p/?linkid=2069559) + +Retrieves a collection of KB's and KB details. + +## Permissions +User needs read permissions. + +## HTTP request +``` +GET /testwdatppreview/kbinfo +``` + +## Request headers + +Header | Value +:---|:--- +Authorization | Bearer {token}. **Required**. +Content type | application/json + +## Request body +Empty + +## Response +If successful - 200 OK. + +## Example + +**Request** + +Here is an example of the request. + +``` +GET https://graph.microsoft.com/testwdatppreview/KbInfo +Content-type: application/json +``` + +**Response** + +Here is an example of the response. + +``` +HTTP/1.1 200 OK +Content-type: application/json +{ + "@odata.context": "https://graph.microsoft.com/testwdatppreview/$metadata#KbInfo", + "@odata.count": 271, + "value":[ + { + "id": "KB3097617 (10240.16549) Amd64", + "release": "KB3097617 (10240.16549)", + "publishingDate": "2015-10-16T21:00:00Z", + "version": "10.0.10240.16549", + "architecture": "Amd64" + }, + … +} ``` \ No newline at end of file diff --git a/windows/security/threat-protection/windows-defender-atp/get-machine-by-id-windows-defender-advanced-threat-protection-new.md b/windows/security/threat-protection/microsoft-defender-atp/get-machine-by-id-windows-defender-advanced-threat-protection-new.md similarity index 100% rename from windows/security/threat-protection/windows-defender-atp/get-machine-by-id-windows-defender-advanced-threat-protection-new.md rename to windows/security/threat-protection/microsoft-defender-atp/get-machine-by-id-windows-defender-advanced-threat-protection-new.md diff --git a/windows/security/threat-protection/windows-defender-atp/get-machine-log-on-users-windows-defender-advanced-threat-protection-new.md b/windows/security/threat-protection/microsoft-defender-atp/get-machine-log-on-users-windows-defender-advanced-threat-protection-new.md similarity index 100% rename from windows/security/threat-protection/windows-defender-atp/get-machine-log-on-users-windows-defender-advanced-threat-protection-new.md rename to windows/security/threat-protection/microsoft-defender-atp/get-machine-log-on-users-windows-defender-advanced-threat-protection-new.md diff --git a/windows/security/threat-protection/windows-defender-atp/get-machine-related-alerts-windows-defender-advanced-threat-protection-new.md b/windows/security/threat-protection/microsoft-defender-atp/get-machine-related-alerts-windows-defender-advanced-threat-protection-new.md similarity index 100% rename from windows/security/threat-protection/windows-defender-atp/get-machine-related-alerts-windows-defender-advanced-threat-protection-new.md rename to windows/security/threat-protection/microsoft-defender-atp/get-machine-related-alerts-windows-defender-advanced-threat-protection-new.md diff --git a/windows/security/threat-protection/windows-defender-atp/get-machineaction-object-windows-defender-advanced-threat-protection-new.md b/windows/security/threat-protection/microsoft-defender-atp/get-machineaction-object-windows-defender-advanced-threat-protection-new.md similarity index 100% rename from windows/security/threat-protection/windows-defender-atp/get-machineaction-object-windows-defender-advanced-threat-protection-new.md rename to windows/security/threat-protection/microsoft-defender-atp/get-machineaction-object-windows-defender-advanced-threat-protection-new.md diff --git a/windows/security/threat-protection/windows-defender-atp/get-machineactions-collection-windows-defender-advanced-threat-protection-new.md b/windows/security/threat-protection/microsoft-defender-atp/get-machineactions-collection-windows-defender-advanced-threat-protection-new.md similarity index 100% rename from windows/security/threat-protection/windows-defender-atp/get-machineactions-collection-windows-defender-advanced-threat-protection-new.md rename to windows/security/threat-protection/microsoft-defender-atp/get-machineactions-collection-windows-defender-advanced-threat-protection-new.md diff --git a/windows/security/threat-protection/windows-defender-atp/get-machinegroups-collection-windows-defender-advanced-threat-protection.md b/windows/security/threat-protection/microsoft-defender-atp/get-machinegroups-collection-windows-defender-advanced-threat-protection.md similarity index 95% rename from windows/security/threat-protection/windows-defender-atp/get-machinegroups-collection-windows-defender-advanced-threat-protection.md rename to windows/security/threat-protection/microsoft-defender-atp/get-machinegroups-collection-windows-defender-advanced-threat-protection.md index 412c1bd762..85bfd9945a 100644 --- a/windows/security/threat-protection/windows-defender-atp/get-machinegroups-collection-windows-defender-advanced-threat-protection.md +++ b/windows/security/threat-protection/microsoft-defender-atp/get-machinegroups-collection-windows-defender-advanced-threat-protection.md @@ -1,81 +1,81 @@ ---- -title: Get RBAC machine groups collection API -description: Retrieves a collection of RBAC machine groups. -keywords: apis, graph api, supported apis, get, RBAC, group -search.product: eADQiWindows 10XVcnh -search.appverid: met150 -ms.prod: w10 -ms.mktglfcycl: deploy -ms.sitesec: library -ms.pagetype: security -ms.author: leonidzh -author: mjcaparas +--- +title: Get RBAC machine groups collection API +description: Retrieves a collection of RBAC machine groups. +keywords: apis, graph api, supported apis, get, RBAC, group +search.product: eADQiWindows 10XVcnh +search.appverid: met150 +ms.prod: w10 +ms.mktglfcycl: deploy +ms.sitesec: library +ms.pagetype: security +ms.author: leonidzh +author: mjcaparas ms.localizationpriority: medium manager: dansimp audience: ITPro ms.collection: M365-security-compliance -ms.topic: article -ms.date: 10/07/2018 ---- - -# Get KB collection API - -**Applies to:** - -- [Windows Defender Advanced Threat Protection (Windows Defender ATP)](https://go.microsoft.com/fwlink/p/?linkid=2069559) - -Retrieves a collection of RBAC machine groups. - -## Permissions -User needs read permissions. - -## HTTP request -``` -GET /testwdatppreview/machinegroups -``` - -## Request headers - -Header | Value -:---|:--- -Authorization | Bearer {token}. **Required**. -Content type | application/json - -## Request body -Empty - -## Response -If successful - 200 OK. - -## Example - -**Request** - -Here is an example of the request. - -``` -GET https://graph.microsoft.com/testwdatppreview/machinegroups -Content-type: application/json -``` - -**Response** - -Here is an example of the response. -Field id contains machine group **id** and equal to field **rbacGroupId** in machines info. -Field **ungrouped** is true only for one group for all machines that have not been assigned to any group. This group as usual has name "UnassignedGroup". - -``` -HTTP/1.1 200 OK -Content-type: application/json -{ - "@odata.context":"https://graph.microsoft.com/testwdatppreview/$metadata#MachineGroups", - "@odata.count":7, - "value":[ - { - "id":86, - "name":"UnassignedGroup", - "description":"", - "ungrouped":true}, - … -} +ms.topic: article +ms.date: 10/07/2018 +--- + +# Get KB collection API + +**Applies to:** + +- [Windows Defender Advanced Threat Protection (Windows Defender ATP)](https://go.microsoft.com/fwlink/p/?linkid=2069559) + +Retrieves a collection of RBAC machine groups. + +## Permissions +User needs read permissions. + +## HTTP request +``` +GET /testwdatppreview/machinegroups +``` + +## Request headers + +Header | Value +:---|:--- +Authorization | Bearer {token}. **Required**. +Content type | application/json + +## Request body +Empty + +## Response +If successful - 200 OK. + +## Example + +**Request** + +Here is an example of the request. + +``` +GET https://graph.microsoft.com/testwdatppreview/machinegroups +Content-type: application/json +``` + +**Response** + +Here is an example of the response. +Field id contains machine group **id** and equal to field **rbacGroupId** in machines info. +Field **ungrouped** is true only for one group for all machines that have not been assigned to any group. This group as usual has name "UnassignedGroup". + +``` +HTTP/1.1 200 OK +Content-type: application/json +{ + "@odata.context":"https://graph.microsoft.com/testwdatppreview/$metadata#MachineGroups", + "@odata.count":7, + "value":[ + { + "id":86, + "name":"UnassignedGroup", + "description":"", + "ungrouped":true}, + … +} ``` \ No newline at end of file diff --git a/windows/security/threat-protection/windows-defender-atp/get-machines-windows-defender-advanced-threat-protection-new.md b/windows/security/threat-protection/microsoft-defender-atp/get-machines-windows-defender-advanced-threat-protection-new.md similarity index 100% rename from windows/security/threat-protection/windows-defender-atp/get-machines-windows-defender-advanced-threat-protection-new.md rename to windows/security/threat-protection/microsoft-defender-atp/get-machines-windows-defender-advanced-threat-protection-new.md diff --git a/windows/security/threat-protection/windows-defender-atp/get-machinesecuritystates-collection-windows-defender-advanced-threat-protection.md b/windows/security/threat-protection/microsoft-defender-atp/get-machinesecuritystates-collection-windows-defender-advanced-threat-protection.md similarity index 96% rename from windows/security/threat-protection/windows-defender-atp/get-machinesecuritystates-collection-windows-defender-advanced-threat-protection.md rename to windows/security/threat-protection/microsoft-defender-atp/get-machinesecuritystates-collection-windows-defender-advanced-threat-protection.md index 0de146e30c..55803636b8 100644 --- a/windows/security/threat-protection/windows-defender-atp/get-machinesecuritystates-collection-windows-defender-advanced-threat-protection.md +++ b/windows/security/threat-protection/microsoft-defender-atp/get-machinesecuritystates-collection-windows-defender-advanced-threat-protection.md @@ -1,88 +1,88 @@ ---- -title: Get machines security states collection API -description: Retrieves a collection of machines security states. -keywords: apis, graph api, supported apis, get, machine, security, state -search.product: eADQiWindows 10XVcnh -search.appverid: met150 -ms.prod: w10 -ms.mktglfcycl: deploy -ms.sitesec: library -ms.pagetype: security -ms.author: leonidzh -author: mjcaparas +--- +title: Get machines security states collection API +description: Retrieves a collection of machines security states. +keywords: apis, graph api, supported apis, get, machine, security, state +search.product: eADQiWindows 10XVcnh +search.appverid: met150 +ms.prod: w10 +ms.mktglfcycl: deploy +ms.sitesec: library +ms.pagetype: security +ms.author: leonidzh +author: mjcaparas ms.localizationpriority: medium manager: dansimp audience: ITPro ms.collection: M365-security-compliance -ms.topic: article -ms.date: 10/07/2018 ---- - -# Get Machines security states collection API - -**Applies to:** - -- [Windows Defender Advanced Threat Protection (Windows Defender ATP)](https://go.microsoft.com/fwlink/p/?linkid=2069559) - -Retrieves a collection of machines security states. - -## Permissions -User needs read permissions. - -## HTTP request -``` -GET /testwdatppreview/machinesecuritystates -``` - -## Request headers - -Header | Value -:---|:--- -Authorization | Bearer {token}. **Required**. -Content type | application/json - -## Request body -Empty - -## Response -If successful - 200 OK. - -## Example - -**Request** - -Here is an example of the request. - -``` -GET https://graph.microsoft.com/testwdatppreview/machinesecuritystates -Content-type: application/json -``` - -**Response** - -Here is an example of the response. -Field *id* contains machine id and equal to the field *id** in machines info. - -``` -HTTP/1.1 200 OK -Content-type: application/json -{ - "@odata.context":"https://graph.microsoft.com/testwdatppreview/$metadata#MachineSecurityStates", - "@odata.count":444, - "@odata.nextLink":"https://graph.microsoft.com/testwdatppreview/machinesecuritystates?$skiptoken=[continuation token]", - "value":[ - { - "id":"000050e1b4afeee3742489ede9ad7a3e16bbd9c4", - "build":14393, - "revision":2485, - "architecture":"Amd64", - "osVersion":"10.0.14393.2485.amd64fre.rs1_release.180827-1809", - "propertiesRequireAttention":[ - "AntivirusNotReporting", - "EdrImpairedCommunications" - ] - }, - … - ] -} +ms.topic: article +ms.date: 10/07/2018 +--- + +# Get Machines security states collection API + +**Applies to:** + +- [Windows Defender Advanced Threat Protection (Windows Defender ATP)](https://go.microsoft.com/fwlink/p/?linkid=2069559) + +Retrieves a collection of machines security states. + +## Permissions +User needs read permissions. + +## HTTP request +``` +GET /testwdatppreview/machinesecuritystates +``` + +## Request headers + +Header | Value +:---|:--- +Authorization | Bearer {token}. **Required**. +Content type | application/json + +## Request body +Empty + +## Response +If successful - 200 OK. + +## Example + +**Request** + +Here is an example of the request. + +``` +GET https://graph.microsoft.com/testwdatppreview/machinesecuritystates +Content-type: application/json +``` + +**Response** + +Here is an example of the response. +Field *id* contains machine id and equal to the field *id** in machines info. + +``` +HTTP/1.1 200 OK +Content-type: application/json +{ + "@odata.context":"https://graph.microsoft.com/testwdatppreview/$metadata#MachineSecurityStates", + "@odata.count":444, + "@odata.nextLink":"https://graph.microsoft.com/testwdatppreview/machinesecuritystates?$skiptoken=[continuation token]", + "value":[ + { + "id":"000050e1b4afeee3742489ede9ad7a3e16bbd9c4", + "build":14393, + "revision":2485, + "architecture":"Amd64", + "osVersion":"10.0.14393.2485.amd64fre.rs1_release.180827-1809", + "propertiesRequireAttention":[ + "AntivirusNotReporting", + "EdrImpairedCommunications" + ] + }, + … + ] +} ``` \ No newline at end of file diff --git a/windows/security/threat-protection/windows-defender-atp/get-package-sas-uri-windows-defender-advanced-threat-protection-new.md b/windows/security/threat-protection/microsoft-defender-atp/get-package-sas-uri-windows-defender-advanced-threat-protection-new.md similarity index 100% rename from windows/security/threat-protection/windows-defender-atp/get-package-sas-uri-windows-defender-advanced-threat-protection-new.md rename to windows/security/threat-protection/microsoft-defender-atp/get-package-sas-uri-windows-defender-advanced-threat-protection-new.md diff --git a/windows/security/threat-protection/windows-defender-atp/get-started.md b/windows/security/threat-protection/microsoft-defender-atp/get-started.md similarity index 100% rename from windows/security/threat-protection/windows-defender-atp/get-started.md rename to windows/security/threat-protection/microsoft-defender-atp/get-started.md diff --git a/windows/security/threat-protection/windows-defender-atp/get-ti-indicators-collection-windows-defender-advanced-threat-protection-new.md b/windows/security/threat-protection/microsoft-defender-atp/get-ti-indicators-collection-windows-defender-advanced-threat-protection-new.md similarity index 100% rename from windows/security/threat-protection/windows-defender-atp/get-ti-indicators-collection-windows-defender-advanced-threat-protection-new.md rename to windows/security/threat-protection/microsoft-defender-atp/get-ti-indicators-collection-windows-defender-advanced-threat-protection-new.md diff --git a/windows/security/threat-protection/windows-defender-atp/get-user-information-windows-defender-advanced-threat-protection-new.md b/windows/security/threat-protection/microsoft-defender-atp/get-user-information-windows-defender-advanced-threat-protection-new.md similarity index 100% rename from windows/security/threat-protection/windows-defender-atp/get-user-information-windows-defender-advanced-threat-protection-new.md rename to windows/security/threat-protection/microsoft-defender-atp/get-user-information-windows-defender-advanced-threat-protection-new.md diff --git a/windows/security/threat-protection/windows-defender-atp/get-user-related-alerts-windows-defender-advanced-threat-protection-new.md b/windows/security/threat-protection/microsoft-defender-atp/get-user-related-alerts-windows-defender-advanced-threat-protection-new.md similarity index 100% rename from windows/security/threat-protection/windows-defender-atp/get-user-related-alerts-windows-defender-advanced-threat-protection-new.md rename to windows/security/threat-protection/microsoft-defender-atp/get-user-related-alerts-windows-defender-advanced-threat-protection-new.md diff --git a/windows/security/threat-protection/windows-defender-atp/get-user-related-machines-windows-defender-advanced-threat-protection-new.md b/windows/security/threat-protection/microsoft-defender-atp/get-user-related-machines-windows-defender-advanced-threat-protection-new.md similarity index 100% rename from windows/security/threat-protection/windows-defender-atp/get-user-related-machines-windows-defender-advanced-threat-protection-new.md rename to windows/security/threat-protection/microsoft-defender-atp/get-user-related-machines-windows-defender-advanced-threat-protection-new.md diff --git a/windows/security/threat-protection/windows-defender-atp/images/1.png b/windows/security/threat-protection/microsoft-defender-atp/images/1.png similarity index 100% rename from windows/security/threat-protection/windows-defender-atp/images/1.png rename to windows/security/threat-protection/microsoft-defender-atp/images/1.png diff --git a/windows/security/threat-protection/windows-defender-atp/images/AH_icon.png b/windows/security/threat-protection/microsoft-defender-atp/images/AH_icon.png similarity index 100% rename from windows/security/threat-protection/windows-defender-atp/images/AH_icon.png rename to windows/security/threat-protection/microsoft-defender-atp/images/AH_icon.png diff --git a/windows/security/threat-protection/windows-defender-atp/images/AR_icon.png b/windows/security/threat-protection/microsoft-defender-atp/images/AR_icon.png similarity index 100% rename from windows/security/threat-protection/windows-defender-atp/images/AR_icon.png rename to windows/security/threat-protection/microsoft-defender-atp/images/AR_icon.png diff --git a/windows/security/threat-protection/windows-defender-atp/images/ASR_icon.png b/windows/security/threat-protection/microsoft-defender-atp/images/ASR_icon.png similarity index 100% rename from windows/security/threat-protection/windows-defender-atp/images/ASR_icon.png rename to windows/security/threat-protection/microsoft-defender-atp/images/ASR_icon.png diff --git a/windows/security/threat-protection/windows-defender-atp/images/EDR_icon.jpg b/windows/security/threat-protection/microsoft-defender-atp/images/EDR_icon.jpg similarity index 100% rename from windows/security/threat-protection/windows-defender-atp/images/EDR_icon.jpg rename to windows/security/threat-protection/microsoft-defender-atp/images/EDR_icon.jpg diff --git a/windows/security/threat-protection/windows-defender-atp/images/EDR_icon.png b/windows/security/threat-protection/microsoft-defender-atp/images/EDR_icon.png similarity index 100% rename from windows/security/threat-protection/windows-defender-atp/images/EDR_icon.png rename to windows/security/threat-protection/microsoft-defender-atp/images/EDR_icon.png diff --git a/windows/security/threat-protection/windows-defender-atp/images/Failed.png b/windows/security/threat-protection/microsoft-defender-atp/images/Failed.png similarity index 100% rename from windows/security/threat-protection/windows-defender-atp/images/Failed.png rename to windows/security/threat-protection/microsoft-defender-atp/images/Failed.png diff --git a/windows/security/threat-protection/windows-defender-atp/images/MTE_icon.jpg b/windows/security/threat-protection/microsoft-defender-atp/images/MTE_icon.jpg similarity index 100% rename from windows/security/threat-protection/windows-defender-atp/images/MTE_icon.jpg rename to windows/security/threat-protection/microsoft-defender-atp/images/MTE_icon.jpg diff --git a/windows/security/threat-protection/windows-defender-atp/images/MTE_icon.png b/windows/security/threat-protection/microsoft-defender-atp/images/MTE_icon.png similarity index 100% rename from windows/security/threat-protection/windows-defender-atp/images/MTE_icon.png rename to windows/security/threat-protection/microsoft-defender-atp/images/MTE_icon.png diff --git a/windows/security/threat-protection/windows-defender-atp/images/NGP_icon.jpg b/windows/security/threat-protection/microsoft-defender-atp/images/NGP_icon.jpg similarity index 100% rename from windows/security/threat-protection/windows-defender-atp/images/NGP_icon.jpg rename to windows/security/threat-protection/microsoft-defender-atp/images/NGP_icon.jpg diff --git a/windows/security/threat-protection/windows-defender-atp/images/NGP_icon.png b/windows/security/threat-protection/microsoft-defender-atp/images/NGP_icon.png similarity index 100% rename from windows/security/threat-protection/windows-defender-atp/images/NGP_icon.png rename to windows/security/threat-protection/microsoft-defender-atp/images/NGP_icon.png diff --git a/windows/security/threat-protection/windows-defender-atp/images/No threats found.png b/windows/security/threat-protection/microsoft-defender-atp/images/No threats found.png similarity index 100% rename from windows/security/threat-protection/windows-defender-atp/images/No threats found.png rename to windows/security/threat-protection/microsoft-defender-atp/images/No threats found.png diff --git a/windows/security/threat-protection/windows-defender-atp/images/Partially investigated.png b/windows/security/threat-protection/microsoft-defender-atp/images/Partially investigated.png similarity index 100% rename from windows/security/threat-protection/windows-defender-atp/images/Partially investigated.png rename to windows/security/threat-protection/microsoft-defender-atp/images/Partially investigated.png diff --git a/windows/security/threat-protection/windows-defender-atp/images/Partially remediated.png b/windows/security/threat-protection/microsoft-defender-atp/images/Partially remediated.png similarity index 100% rename from windows/security/threat-protection/windows-defender-atp/images/Partially remediated.png rename to windows/security/threat-protection/microsoft-defender-atp/images/Partially remediated.png diff --git a/windows/security/threat-protection/windows-defender-atp/images/Pending.png b/windows/security/threat-protection/microsoft-defender-atp/images/Pending.png similarity index 100% rename from windows/security/threat-protection/windows-defender-atp/images/Pending.png rename to windows/security/threat-protection/microsoft-defender-atp/images/Pending.png diff --git a/windows/security/threat-protection/windows-defender-atp/images/Remediated.png b/windows/security/threat-protection/microsoft-defender-atp/images/Remediated.png similarity index 100% rename from windows/security/threat-protection/windows-defender-atp/images/Remediated.png rename to windows/security/threat-protection/microsoft-defender-atp/images/Remediated.png diff --git a/windows/security/threat-protection/windows-defender-atp/images/Running.png b/windows/security/threat-protection/microsoft-defender-atp/images/Running.png similarity index 100% rename from windows/security/threat-protection/windows-defender-atp/images/Running.png rename to windows/security/threat-protection/microsoft-defender-atp/images/Running.png diff --git a/windows/security/threat-protection/windows-defender-atp/images/SS_icon.png b/windows/security/threat-protection/microsoft-defender-atp/images/SS_icon.png similarity index 100% rename from windows/security/threat-protection/windows-defender-atp/images/SS_icon.png rename to windows/security/threat-protection/microsoft-defender-atp/images/SS_icon.png diff --git a/windows/security/threat-protection/windows-defender-atp/images/TVM_icon.png b/windows/security/threat-protection/microsoft-defender-atp/images/TVM_icon.png similarity index 100% rename from windows/security/threat-protection/windows-defender-atp/images/TVM_icon.png rename to windows/security/threat-protection/microsoft-defender-atp/images/TVM_icon.png diff --git a/windows/security/threat-protection/windows-defender-atp/images/Terminated by system.png b/windows/security/threat-protection/microsoft-defender-atp/images/Terminated by system.png similarity index 100% rename from windows/security/threat-protection/windows-defender-atp/images/Terminated by system.png rename to windows/security/threat-protection/microsoft-defender-atp/images/Terminated by system.png diff --git a/windows/security/threat-protection/windows-defender-atp/images/WDATP-components.png b/windows/security/threat-protection/microsoft-defender-atp/images/WDATP-components.png similarity index 100% rename from windows/security/threat-protection/windows-defender-atp/images/WDATP-components.png rename to windows/security/threat-protection/microsoft-defender-atp/images/WDATP-components.png diff --git a/windows/security/threat-protection/windows-defender-atp/images/active-alerts-tile.png b/windows/security/threat-protection/microsoft-defender-atp/images/active-alerts-tile.png similarity index 100% rename from windows/security/threat-protection/windows-defender-atp/images/active-alerts-tile.png rename to windows/security/threat-protection/microsoft-defender-atp/images/active-alerts-tile.png diff --git a/windows/security/threat-protection/windows-defender-atp/images/active-threat-icon.png b/windows/security/threat-protection/microsoft-defender-atp/images/active-threat-icon.png similarity index 100% rename from windows/security/threat-protection/windows-defender-atp/images/active-threat-icon.png rename to windows/security/threat-protection/microsoft-defender-atp/images/active-threat-icon.png diff --git a/windows/security/threat-protection/windows-defender-atp/images/advanced-features.png b/windows/security/threat-protection/microsoft-defender-atp/images/advanced-features.png similarity index 100% rename from windows/security/threat-protection/windows-defender-atp/images/advanced-features.png rename to windows/security/threat-protection/microsoft-defender-atp/images/advanced-features.png diff --git a/windows/security/threat-protection/windows-defender-atp/images/advanced-hunting-query-example.PNG b/windows/security/threat-protection/microsoft-defender-atp/images/advanced-hunting-query-example.PNG similarity index 100% rename from windows/security/threat-protection/windows-defender-atp/images/advanced-hunting-query-example.PNG rename to windows/security/threat-protection/microsoft-defender-atp/images/advanced-hunting-query-example.PNG diff --git a/windows/security/threat-protection/windows-defender-atp/images/advanced-hunting-save-query.PNG b/windows/security/threat-protection/microsoft-defender-atp/images/advanced-hunting-save-query.PNG similarity index 100% rename from windows/security/threat-protection/windows-defender-atp/images/advanced-hunting-save-query.PNG rename to windows/security/threat-protection/microsoft-defender-atp/images/advanced-hunting-save-query.PNG diff --git a/windows/security/threat-protection/windows-defender-atp/images/alert-details.png b/windows/security/threat-protection/microsoft-defender-atp/images/alert-details.png similarity index 100% rename from windows/security/threat-protection/windows-defender-atp/images/alert-details.png rename to windows/security/threat-protection/microsoft-defender-atp/images/alert-details.png diff --git a/windows/security/threat-protection/windows-defender-atp/images/alert-icon.png b/windows/security/threat-protection/microsoft-defender-atp/images/alert-icon.png similarity index 100% rename from windows/security/threat-protection/windows-defender-atp/images/alert-icon.png rename to windows/security/threat-protection/microsoft-defender-atp/images/alert-icon.png diff --git a/windows/security/threat-protection/windows-defender-atp/images/alerts-q-bulk.png b/windows/security/threat-protection/microsoft-defender-atp/images/alerts-q-bulk.png similarity index 100% rename from windows/security/threat-protection/windows-defender-atp/images/alerts-q-bulk.png rename to windows/security/threat-protection/microsoft-defender-atp/images/alerts-q-bulk.png diff --git a/windows/security/threat-protection/windows-defender-atp/images/alerts-queue-list.png b/windows/security/threat-protection/microsoft-defender-atp/images/alerts-queue-list.png similarity index 100% rename from windows/security/threat-protection/windows-defender-atp/images/alerts-queue-list.png rename to windows/security/threat-protection/microsoft-defender-atp/images/alerts-queue-list.png diff --git a/windows/security/threat-protection/windows-defender-atp/images/alerts-queue-numbered.png b/windows/security/threat-protection/microsoft-defender-atp/images/alerts-queue-numbered.png similarity index 100% rename from windows/security/threat-protection/windows-defender-atp/images/alerts-queue-numbered.png rename to windows/security/threat-protection/microsoft-defender-atp/images/alerts-queue-numbered.png diff --git a/windows/security/threat-protection/windows-defender-atp/images/analysis-results.png b/windows/security/threat-protection/microsoft-defender-atp/images/analysis-results.png similarity index 100% rename from windows/security/threat-protection/windows-defender-atp/images/analysis-results.png rename to windows/security/threat-protection/microsoft-defender-atp/images/analysis-results.png diff --git a/windows/security/threat-protection/windows-defender-atp/images/api-jwt-ms.png b/windows/security/threat-protection/microsoft-defender-atp/images/api-jwt-ms.png similarity index 100% rename from windows/security/threat-protection/windows-defender-atp/images/api-jwt-ms.png rename to windows/security/threat-protection/microsoft-defender-atp/images/api-jwt-ms.png diff --git a/windows/security/threat-protection/windows-defender-atp/images/api-tenant-id.png b/windows/security/threat-protection/microsoft-defender-atp/images/api-tenant-id.png similarity index 100% rename from windows/security/threat-protection/windows-defender-atp/images/api-tenant-id.png rename to windows/security/threat-protection/microsoft-defender-atp/images/api-tenant-id.png diff --git a/windows/security/threat-protection/windows-defender-atp/images/atp-Application-Guard-events-icon.png b/windows/security/threat-protection/microsoft-defender-atp/images/atp-Application-Guard-events-icon.png similarity index 100% rename from windows/security/threat-protection/windows-defender-atp/images/atp-Application-Guard-events-icon.png rename to windows/security/threat-protection/microsoft-defender-atp/images/atp-Application-Guard-events-icon.png diff --git a/windows/security/threat-protection/windows-defender-atp/images/atp-Device-Guard-events-icon.png b/windows/security/threat-protection/microsoft-defender-atp/images/atp-Device-Guard-events-icon.png similarity index 100% rename from windows/security/threat-protection/windows-defender-atp/images/atp-Device-Guard-events-icon.png rename to windows/security/threat-protection/microsoft-defender-atp/images/atp-Device-Guard-events-icon.png diff --git a/windows/security/threat-protection/windows-defender-atp/images/atp-ETW-event-icon.png b/windows/security/threat-protection/microsoft-defender-atp/images/atp-ETW-event-icon.png similarity index 100% rename from windows/security/threat-protection/windows-defender-atp/images/atp-ETW-event-icon.png rename to windows/security/threat-protection/microsoft-defender-atp/images/atp-ETW-event-icon.png diff --git a/windows/security/threat-protection/windows-defender-atp/images/atp-Exploit-Guard-events-icon.png b/windows/security/threat-protection/microsoft-defender-atp/images/atp-Exploit-Guard-events-icon.png similarity index 100% rename from windows/security/threat-protection/windows-defender-atp/images/atp-Exploit-Guard-events-icon.png rename to windows/security/threat-protection/microsoft-defender-atp/images/atp-Exploit-Guard-events-icon.png diff --git a/windows/security/threat-protection/windows-defender-atp/images/atp-File-path-icon.png b/windows/security/threat-protection/microsoft-defender-atp/images/atp-File-path-icon.png similarity index 100% rename from windows/security/threat-protection/windows-defender-atp/images/atp-File-path-icon.png rename to windows/security/threat-protection/microsoft-defender-atp/images/atp-File-path-icon.png diff --git a/windows/security/threat-protection/windows-defender-atp/images/atp-Firewall-events-icon.png b/windows/security/threat-protection/microsoft-defender-atp/images/atp-Firewall-events-icon.png similarity index 100% rename from windows/security/threat-protection/windows-defender-atp/images/atp-Firewall-events-icon.png rename to windows/security/threat-protection/microsoft-defender-atp/images/atp-Firewall-events-icon.png diff --git a/windows/security/threat-protection/windows-defender-atp/images/atp-O365-admin-portal-customer.png b/windows/security/threat-protection/microsoft-defender-atp/images/atp-O365-admin-portal-customer.png similarity index 100% rename from windows/security/threat-protection/windows-defender-atp/images/atp-O365-admin-portal-customer.png rename to windows/security/threat-protection/microsoft-defender-atp/images/atp-O365-admin-portal-customer.png diff --git a/windows/security/threat-protection/windows-defender-atp/images/atp-Other-events-icon.png b/windows/security/threat-protection/microsoft-defender-atp/images/atp-Other-events-icon.png similarity index 100% rename from windows/security/threat-protection/windows-defender-atp/images/atp-Other-events-icon.png rename to windows/security/threat-protection/microsoft-defender-atp/images/atp-Other-events-icon.png diff --git a/windows/security/threat-protection/windows-defender-atp/images/atp-Smart-Screen-events-icon.png b/windows/security/threat-protection/microsoft-defender-atp/images/atp-Smart-Screen-events-icon.png similarity index 100% rename from windows/security/threat-protection/windows-defender-atp/images/atp-Smart-Screen-events-icon.png rename to windows/security/threat-protection/microsoft-defender-atp/images/atp-Smart-Screen-events-icon.png diff --git a/windows/security/threat-protection/windows-defender-atp/images/atp-access-token-modification-icon.png b/windows/security/threat-protection/microsoft-defender-atp/images/atp-access-token-modification-icon.png similarity index 100% rename from windows/security/threat-protection/windows-defender-atp/images/atp-access-token-modification-icon.png rename to windows/security/threat-protection/microsoft-defender-atp/images/atp-access-token-modification-icon.png diff --git a/windows/security/threat-protection/windows-defender-atp/images/atp-action-block-file.png b/windows/security/threat-protection/microsoft-defender-atp/images/atp-action-block-file.png similarity index 100% rename from windows/security/threat-protection/windows-defender-atp/images/atp-action-block-file.png rename to windows/security/threat-protection/microsoft-defender-atp/images/atp-action-block-file.png diff --git a/windows/security/threat-protection/windows-defender-atp/images/atp-action-center-app-restriction.png b/windows/security/threat-protection/microsoft-defender-atp/images/atp-action-center-app-restriction.png similarity index 100% rename from windows/security/threat-protection/windows-defender-atp/images/atp-action-center-app-restriction.png rename to windows/security/threat-protection/microsoft-defender-atp/images/atp-action-center-app-restriction.png diff --git a/windows/security/threat-protection/windows-defender-atp/images/atp-action-center-package-collection.png b/windows/security/threat-protection/microsoft-defender-atp/images/atp-action-center-package-collection.png similarity index 100% rename from windows/security/threat-protection/windows-defender-atp/images/atp-action-center-package-collection.png rename to windows/security/threat-protection/microsoft-defender-atp/images/atp-action-center-package-collection.png diff --git a/windows/security/threat-protection/windows-defender-atp/images/atp-action-center-restrict-app.png b/windows/security/threat-protection/microsoft-defender-atp/images/atp-action-center-restrict-app.png similarity index 100% rename from windows/security/threat-protection/windows-defender-atp/images/atp-action-center-restrict-app.png rename to windows/security/threat-protection/microsoft-defender-atp/images/atp-action-center-restrict-app.png diff --git a/windows/security/threat-protection/windows-defender-atp/images/atp-action-center-with-info.png b/windows/security/threat-protection/microsoft-defender-atp/images/atp-action-center-with-info.png similarity index 100% rename from windows/security/threat-protection/windows-defender-atp/images/atp-action-center-with-info.png rename to windows/security/threat-protection/microsoft-defender-atp/images/atp-action-center-with-info.png diff --git a/windows/security/threat-protection/windows-defender-atp/images/atp-actions-action-center.png b/windows/security/threat-protection/microsoft-defender-atp/images/atp-actions-action-center.png similarity index 100% rename from windows/security/threat-protection/windows-defender-atp/images/atp-actions-action-center.png rename to windows/security/threat-protection/microsoft-defender-atp/images/atp-actions-action-center.png diff --git a/windows/security/threat-protection/windows-defender-atp/images/atp-actions-collect-investigation-package.png b/windows/security/threat-protection/microsoft-defender-atp/images/atp-actions-collect-investigation-package.png similarity index 100% rename from windows/security/threat-protection/windows-defender-atp/images/atp-actions-collect-investigation-package.png rename to windows/security/threat-protection/microsoft-defender-atp/images/atp-actions-collect-investigation-package.png diff --git a/windows/security/threat-protection/windows-defender-atp/images/atp-actions-isolate-machine.png b/windows/security/threat-protection/microsoft-defender-atp/images/atp-actions-isolate-machine.png similarity index 100% rename from windows/security/threat-protection/windows-defender-atp/images/atp-actions-isolate-machine.png rename to windows/security/threat-protection/microsoft-defender-atp/images/atp-actions-isolate-machine.png diff --git a/windows/security/threat-protection/windows-defender-atp/images/atp-actions-manage-tags.png b/windows/security/threat-protection/microsoft-defender-atp/images/atp-actions-manage-tags.png similarity index 100% rename from windows/security/threat-protection/windows-defender-atp/images/atp-actions-manage-tags.png rename to windows/security/threat-protection/microsoft-defender-atp/images/atp-actions-manage-tags.png diff --git a/windows/security/threat-protection/windows-defender-atp/images/atp-actions-release-from-isolation.png b/windows/security/threat-protection/microsoft-defender-atp/images/atp-actions-release-from-isolation.png similarity index 100% rename from windows/security/threat-protection/windows-defender-atp/images/atp-actions-release-from-isolation.png rename to windows/security/threat-protection/microsoft-defender-atp/images/atp-actions-release-from-isolation.png diff --git a/windows/security/threat-protection/windows-defender-atp/images/atp-actions-release-from-isoloation.png b/windows/security/threat-protection/microsoft-defender-atp/images/atp-actions-release-from-isoloation.png similarity index 100% rename from windows/security/threat-protection/windows-defender-atp/images/atp-actions-release-from-isoloation.png rename to windows/security/threat-protection/microsoft-defender-atp/images/atp-actions-release-from-isoloation.png diff --git a/windows/security/threat-protection/windows-defender-atp/images/atp-actions-remove-app-restrictions.png b/windows/security/threat-protection/microsoft-defender-atp/images/atp-actions-remove-app-restrictions.png similarity index 100% rename from windows/security/threat-protection/windows-defender-atp/images/atp-actions-remove-app-restrictions.png rename to windows/security/threat-protection/microsoft-defender-atp/images/atp-actions-remove-app-restrictions.png diff --git a/windows/security/threat-protection/windows-defender-atp/images/atp-actions-restrict-app-execution.png b/windows/security/threat-protection/microsoft-defender-atp/images/atp-actions-restrict-app-execution.png similarity index 100% rename from windows/security/threat-protection/windows-defender-atp/images/atp-actions-restrict-app-execution.png rename to windows/security/threat-protection/microsoft-defender-atp/images/atp-actions-restrict-app-execution.png diff --git a/windows/security/threat-protection/windows-defender-atp/images/atp-actions-run-av.png b/windows/security/threat-protection/microsoft-defender-atp/images/atp-actions-run-av.png similarity index 100% rename from windows/security/threat-protection/windows-defender-atp/images/atp-actions-run-av.png rename to windows/security/threat-protection/microsoft-defender-atp/images/atp-actions-run-av.png diff --git a/windows/security/threat-protection/windows-defender-atp/images/atp-active-investigations-tile.png b/windows/security/threat-protection/microsoft-defender-atp/images/atp-active-investigations-tile.png similarity index 100% rename from windows/security/threat-protection/windows-defender-atp/images/atp-active-investigations-tile.png rename to windows/security/threat-protection/microsoft-defender-atp/images/atp-active-investigations-tile.png diff --git a/windows/security/threat-protection/windows-defender-atp/images/atp-actor-alert.png b/windows/security/threat-protection/microsoft-defender-atp/images/atp-actor-alert.png similarity index 100% rename from windows/security/threat-protection/windows-defender-atp/images/atp-actor-alert.png rename to windows/security/threat-protection/microsoft-defender-atp/images/atp-actor-alert.png diff --git a/windows/security/threat-protection/windows-defender-atp/images/atp-actor-report.png b/windows/security/threat-protection/microsoft-defender-atp/images/atp-actor-report.png similarity index 100% rename from windows/security/threat-protection/windows-defender-atp/images/atp-actor-report.png rename to windows/security/threat-protection/microsoft-defender-atp/images/atp-actor-report.png diff --git a/windows/security/threat-protection/windows-defender-atp/images/atp-actor.png b/windows/security/threat-protection/microsoft-defender-atp/images/atp-actor.png similarity index 100% rename from windows/security/threat-protection/windows-defender-atp/images/atp-actor.png rename to windows/security/threat-protection/microsoft-defender-atp/images/atp-actor.png diff --git a/windows/security/threat-protection/windows-defender-atp/images/atp-add-application-name.png b/windows/security/threat-protection/microsoft-defender-atp/images/atp-add-application-name.png similarity index 100% rename from windows/security/threat-protection/windows-defender-atp/images/atp-add-application-name.png rename to windows/security/threat-protection/microsoft-defender-atp/images/atp-add-application-name.png diff --git a/windows/security/threat-protection/windows-defender-atp/images/atp-add-application.png b/windows/security/threat-protection/microsoft-defender-atp/images/atp-add-application.png similarity index 100% rename from windows/security/threat-protection/windows-defender-atp/images/atp-add-application.png rename to windows/security/threat-protection/microsoft-defender-atp/images/atp-add-application.png diff --git a/windows/security/threat-protection/windows-defender-atp/images/atp-add-intune-policy.png b/windows/security/threat-protection/microsoft-defender-atp/images/atp-add-intune-policy.png similarity index 100% rename from windows/security/threat-protection/windows-defender-atp/images/atp-add-intune-policy.png rename to windows/security/threat-protection/microsoft-defender-atp/images/atp-add-intune-policy.png diff --git a/windows/security/threat-protection/windows-defender-atp/images/atp-advanced-hunting-query.png b/windows/security/threat-protection/microsoft-defender-atp/images/atp-advanced-hunting-query.png similarity index 100% rename from windows/security/threat-protection/windows-defender-atp/images/atp-advanced-hunting-query.png rename to windows/security/threat-protection/microsoft-defender-atp/images/atp-advanced-hunting-query.png diff --git a/windows/security/threat-protection/windows-defender-atp/images/atp-advanced-hunting-results-filter.PNG b/windows/security/threat-protection/microsoft-defender-atp/images/atp-advanced-hunting-results-filter.PNG similarity index 100% rename from windows/security/threat-protection/windows-defender-atp/images/atp-advanced-hunting-results-filter.PNG rename to windows/security/threat-protection/microsoft-defender-atp/images/atp-advanced-hunting-results-filter.PNG diff --git a/windows/security/threat-protection/windows-defender-atp/images/atp-advanced-hunting-results-set.png b/windows/security/threat-protection/microsoft-defender-atp/images/atp-advanced-hunting-results-set.png similarity index 100% rename from windows/security/threat-protection/windows-defender-atp/images/atp-advanced-hunting-results-set.png rename to windows/security/threat-protection/microsoft-defender-atp/images/atp-advanced-hunting-results-set.png diff --git a/windows/security/threat-protection/windows-defender-atp/images/atp-advanced-hunting.png b/windows/security/threat-protection/microsoft-defender-atp/images/atp-advanced-hunting.png similarity index 100% rename from windows/security/threat-protection/windows-defender-atp/images/atp-advanced-hunting.png rename to windows/security/threat-protection/microsoft-defender-atp/images/atp-advanced-hunting.png diff --git a/windows/security/threat-protection/windows-defender-atp/images/atp-alert-details.png b/windows/security/threat-protection/microsoft-defender-atp/images/atp-alert-details.png similarity index 100% rename from windows/security/threat-protection/windows-defender-atp/images/atp-alert-details.png rename to windows/security/threat-protection/microsoft-defender-atp/images/atp-alert-details.png diff --git a/windows/security/threat-protection/windows-defender-atp/images/atp-alert-mgt-pane.png b/windows/security/threat-protection/microsoft-defender-atp/images/atp-alert-mgt-pane.png similarity index 100% rename from windows/security/threat-protection/windows-defender-atp/images/atp-alert-mgt-pane.png rename to windows/security/threat-protection/microsoft-defender-atp/images/atp-alert-mgt-pane.png diff --git a/windows/security/threat-protection/windows-defender-atp/images/atp-alert-page.png b/windows/security/threat-protection/microsoft-defender-atp/images/atp-alert-page.png similarity index 100% rename from windows/security/threat-protection/windows-defender-atp/images/atp-alert-page.png rename to windows/security/threat-protection/microsoft-defender-atp/images/atp-alert-page.png diff --git a/windows/security/threat-protection/windows-defender-atp/images/atp-alert-process-tree.png b/windows/security/threat-protection/microsoft-defender-atp/images/atp-alert-process-tree.png similarity index 100% rename from windows/security/threat-protection/windows-defender-atp/images/atp-alert-process-tree.png rename to windows/security/threat-protection/microsoft-defender-atp/images/atp-alert-process-tree.png diff --git a/windows/security/threat-protection/windows-defender-atp/images/atp-alert-source.png b/windows/security/threat-protection/microsoft-defender-atp/images/atp-alert-source.png similarity index 100% rename from windows/security/threat-protection/windows-defender-atp/images/atp-alert-source.png rename to windows/security/threat-protection/microsoft-defender-atp/images/atp-alert-source.png diff --git a/windows/security/threat-protection/windows-defender-atp/images/atp-alert-status.png b/windows/security/threat-protection/microsoft-defender-atp/images/atp-alert-status.png similarity index 100% rename from windows/security/threat-protection/windows-defender-atp/images/atp-alert-status.png rename to windows/security/threat-protection/microsoft-defender-atp/images/atp-alert-status.png diff --git a/windows/security/threat-protection/windows-defender-atp/images/atp-alert-timeline-numbered.png b/windows/security/threat-protection/microsoft-defender-atp/images/atp-alert-timeline-numbered.png similarity index 100% rename from windows/security/threat-protection/windows-defender-atp/images/atp-alert-timeline-numbered.png rename to windows/security/threat-protection/microsoft-defender-atp/images/atp-alert-timeline-numbered.png diff --git a/windows/security/threat-protection/windows-defender-atp/images/atp-alert-timeline.png b/windows/security/threat-protection/microsoft-defender-atp/images/atp-alert-timeline.png similarity index 100% rename from windows/security/threat-protection/windows-defender-atp/images/atp-alert-timeline.png rename to windows/security/threat-protection/microsoft-defender-atp/images/atp-alert-timeline.png diff --git a/windows/security/threat-protection/windows-defender-atp/images/atp-alert-view.png b/windows/security/threat-protection/microsoft-defender-atp/images/atp-alert-view.png similarity index 100% rename from windows/security/threat-protection/windows-defender-atp/images/atp-alert-view.png rename to windows/security/threat-protection/microsoft-defender-atp/images/atp-alert-view.png diff --git a/windows/security/threat-protection/windows-defender-atp/images/atp-alerts-group.png b/windows/security/threat-protection/microsoft-defender-atp/images/atp-alerts-group.png similarity index 100% rename from windows/security/threat-protection/windows-defender-atp/images/atp-alerts-group.png rename to windows/security/threat-protection/microsoft-defender-atp/images/atp-alerts-group.png diff --git a/windows/security/threat-protection/windows-defender-atp/images/atp-alerts-q.png b/windows/security/threat-protection/microsoft-defender-atp/images/atp-alerts-q.png similarity index 100% rename from windows/security/threat-protection/windows-defender-atp/images/atp-alerts-q.png rename to windows/security/threat-protection/microsoft-defender-atp/images/atp-alerts-q.png diff --git a/windows/security/threat-protection/windows-defender-atp/images/atp-alerts-queue-user.png b/windows/security/threat-protection/microsoft-defender-atp/images/atp-alerts-queue-user.png similarity index 100% rename from windows/security/threat-protection/windows-defender-atp/images/atp-alerts-queue-user.png rename to windows/security/threat-protection/microsoft-defender-atp/images/atp-alerts-queue-user.png diff --git a/windows/security/threat-protection/windows-defender-atp/images/atp-alerts-queue.png b/windows/security/threat-protection/microsoft-defender-atp/images/atp-alerts-queue.png similarity index 100% rename from windows/security/threat-protection/windows-defender-atp/images/atp-alerts-queue.png rename to windows/security/threat-protection/microsoft-defender-atp/images/atp-alerts-queue.png diff --git a/windows/security/threat-protection/windows-defender-atp/images/atp-alerts-related-to-file.png b/windows/security/threat-protection/microsoft-defender-atp/images/atp-alerts-related-to-file.png similarity index 100% rename from windows/security/threat-protection/windows-defender-atp/images/atp-alerts-related-to-file.png rename to windows/security/threat-protection/microsoft-defender-atp/images/atp-alerts-related-to-file.png diff --git a/windows/security/threat-protection/windows-defender-atp/images/atp-alerts-related-to-machine.PNG b/windows/security/threat-protection/microsoft-defender-atp/images/atp-alerts-related-to-machine.PNG similarity index 100% rename from windows/security/threat-protection/windows-defender-atp/images/atp-alerts-related-to-machine.PNG rename to windows/security/threat-protection/microsoft-defender-atp/images/atp-alerts-related-to-machine.PNG diff --git a/windows/security/threat-protection/windows-defender-atp/images/atp-alerts-selected.png b/windows/security/threat-protection/microsoft-defender-atp/images/atp-alerts-selected.png similarity index 100% rename from windows/security/threat-protection/windows-defender-atp/images/atp-alerts-selected.png rename to windows/security/threat-protection/microsoft-defender-atp/images/atp-alerts-selected.png diff --git a/windows/security/threat-protection/windows-defender-atp/images/atp-alerts-tile.png b/windows/security/threat-protection/microsoft-defender-atp/images/atp-alerts-tile.png similarity index 100% rename from windows/security/threat-protection/windows-defender-atp/images/atp-alerts-tile.png rename to windows/security/threat-protection/microsoft-defender-atp/images/atp-alerts-tile.png diff --git a/windows/security/threat-protection/windows-defender-atp/images/atp-alertsq1.png b/windows/security/threat-protection/microsoft-defender-atp/images/atp-alertsq1.png similarity index 100% rename from windows/security/threat-protection/windows-defender-atp/images/atp-alertsq1.png rename to windows/security/threat-protection/microsoft-defender-atp/images/atp-alertsq1.png diff --git a/windows/security/threat-protection/windows-defender-atp/images/atp-alertsq2.png b/windows/security/threat-protection/microsoft-defender-atp/images/atp-alertsq2.png similarity index 100% rename from windows/security/threat-protection/windows-defender-atp/images/atp-alertsq2.png rename to windows/security/threat-protection/microsoft-defender-atp/images/atp-alertsq2.png diff --git a/windows/security/threat-protection/windows-defender-atp/images/atp-analyze-auto-ir.png b/windows/security/threat-protection/microsoft-defender-atp/images/atp-analyze-auto-ir.png similarity index 100% rename from windows/security/threat-protection/windows-defender-atp/images/atp-analyze-auto-ir.png rename to windows/security/threat-protection/microsoft-defender-atp/images/atp-analyze-auto-ir.png diff --git a/windows/security/threat-protection/windows-defender-atp/images/atp-app-restriction.png b/windows/security/threat-protection/microsoft-defender-atp/images/atp-app-restriction.png similarity index 100% rename from windows/security/threat-protection/windows-defender-atp/images/atp-app-restriction.png rename to windows/security/threat-protection/microsoft-defender-atp/images/atp-app-restriction.png diff --git a/windows/security/threat-protection/windows-defender-atp/images/atp-application-information.png b/windows/security/threat-protection/microsoft-defender-atp/images/atp-application-information.png similarity index 100% rename from windows/security/threat-protection/windows-defender-atp/images/atp-application-information.png rename to windows/security/threat-protection/microsoft-defender-atp/images/atp-application-information.png diff --git a/windows/security/threat-protection/windows-defender-atp/images/atp-approve-reject-action.png b/windows/security/threat-protection/microsoft-defender-atp/images/atp-approve-reject-action.png similarity index 100% rename from windows/security/threat-protection/windows-defender-atp/images/atp-approve-reject-action.png rename to windows/security/threat-protection/microsoft-defender-atp/images/atp-approve-reject-action.png diff --git a/windows/security/threat-protection/windows-defender-atp/images/atp-appsource.png b/windows/security/threat-protection/microsoft-defender-atp/images/atp-appsource.png similarity index 100% rename from windows/security/threat-protection/windows-defender-atp/images/atp-appsource.png rename to windows/security/threat-protection/microsoft-defender-atp/images/atp-appsource.png diff --git a/windows/security/threat-protection/windows-defender-atp/images/atp-auto-investigation-pending.png b/windows/security/threat-protection/microsoft-defender-atp/images/atp-auto-investigation-pending.png similarity index 100% rename from windows/security/threat-protection/windows-defender-atp/images/atp-auto-investigation-pending.png rename to windows/security/threat-protection/microsoft-defender-atp/images/atp-auto-investigation-pending.png diff --git a/windows/security/threat-protection/windows-defender-atp/images/atp-auto-investigations-list.png b/windows/security/threat-protection/microsoft-defender-atp/images/atp-auto-investigations-list.png similarity index 100% rename from windows/security/threat-protection/windows-defender-atp/images/atp-auto-investigations-list.png rename to windows/security/threat-protection/microsoft-defender-atp/images/atp-auto-investigations-list.png diff --git a/windows/security/threat-protection/windows-defender-atp/images/atp-automated-investigations-statistics.png b/windows/security/threat-protection/microsoft-defender-atp/images/atp-automated-investigations-statistics.png similarity index 100% rename from windows/security/threat-protection/windows-defender-atp/images/atp-automated-investigations-statistics.png rename to windows/security/threat-protection/microsoft-defender-atp/images/atp-automated-investigations-statistics.png diff --git a/windows/security/threat-protection/windows-defender-atp/images/atp-av-scan-action-center.png b/windows/security/threat-protection/microsoft-defender-atp/images/atp-av-scan-action-center.png similarity index 100% rename from windows/security/threat-protection/windows-defender-atp/images/atp-av-scan-action-center.png rename to windows/security/threat-protection/microsoft-defender-atp/images/atp-av-scan-action-center.png diff --git a/windows/security/threat-protection/windows-defender-atp/images/atp-av-scan-notification.png b/windows/security/threat-protection/microsoft-defender-atp/images/atp-av-scan-notification.png similarity index 100% rename from windows/security/threat-protection/windows-defender-atp/images/atp-av-scan-notification.png rename to windows/security/threat-protection/microsoft-defender-atp/images/atp-av-scan-notification.png diff --git a/windows/security/threat-protection/windows-defender-atp/images/atp-azure-api-access.png b/windows/security/threat-protection/microsoft-defender-atp/images/atp-azure-api-access.png similarity index 100% rename from windows/security/threat-protection/windows-defender-atp/images/atp-azure-api-access.png rename to windows/security/threat-protection/microsoft-defender-atp/images/atp-azure-api-access.png diff --git a/windows/security/threat-protection/windows-defender-atp/images/atp-azure-assign-role.png b/windows/security/threat-protection/microsoft-defender-atp/images/atp-azure-assign-role.png similarity index 100% rename from windows/security/threat-protection/windows-defender-atp/images/atp-azure-assign-role.png rename to windows/security/threat-protection/microsoft-defender-atp/images/atp-azure-assign-role.png diff --git a/windows/security/threat-protection/windows-defender-atp/images/atp-azure-atp-app.png b/windows/security/threat-protection/microsoft-defender-atp/images/atp-azure-atp-app.png similarity index 100% rename from windows/security/threat-protection/windows-defender-atp/images/atp-azure-atp-app.png rename to windows/security/threat-protection/microsoft-defender-atp/images/atp-azure-atp-app.png diff --git a/windows/security/threat-protection/windows-defender-atp/images/atp-azure-atp-machine-user.png b/windows/security/threat-protection/microsoft-defender-atp/images/atp-azure-atp-machine-user.png similarity index 100% rename from windows/security/threat-protection/windows-defender-atp/images/atp-azure-atp-machine-user.png rename to windows/security/threat-protection/microsoft-defender-atp/images/atp-azure-atp-machine-user.png diff --git a/windows/security/threat-protection/windows-defender-atp/images/atp-azure-atp-machine.png b/windows/security/threat-protection/microsoft-defender-atp/images/atp-azure-atp-machine.png similarity index 100% rename from windows/security/threat-protection/windows-defender-atp/images/atp-azure-atp-machine.png rename to windows/security/threat-protection/microsoft-defender-atp/images/atp-azure-atp-machine.png diff --git a/windows/security/threat-protection/windows-defender-atp/images/atp-azure-create.png b/windows/security/threat-protection/microsoft-defender-atp/images/atp-azure-create.png similarity index 100% rename from windows/security/threat-protection/windows-defender-atp/images/atp-azure-create.png rename to windows/security/threat-protection/microsoft-defender-atp/images/atp-azure-create.png diff --git a/windows/security/threat-protection/windows-defender-atp/images/atp-azure-intune-category.png b/windows/security/threat-protection/microsoft-defender-atp/images/atp-azure-intune-category.png similarity index 100% rename from windows/security/threat-protection/windows-defender-atp/images/atp-azure-intune-category.png rename to windows/security/threat-protection/microsoft-defender-atp/images/atp-azure-intune-category.png diff --git a/windows/security/threat-protection/windows-defender-atp/images/atp-azure-intune-configure.png b/windows/security/threat-protection/microsoft-defender-atp/images/atp-azure-intune-configure.png similarity index 100% rename from windows/security/threat-protection/windows-defender-atp/images/atp-azure-intune-configure.png rename to windows/security/threat-protection/microsoft-defender-atp/images/atp-azure-intune-configure.png diff --git a/windows/security/threat-protection/windows-defender-atp/images/atp-azure-intune-create-policy-configure.png b/windows/security/threat-protection/microsoft-defender-atp/images/atp-azure-intune-create-policy-configure.png similarity index 100% rename from windows/security/threat-protection/windows-defender-atp/images/atp-azure-intune-create-policy-configure.png rename to windows/security/threat-protection/microsoft-defender-atp/images/atp-azure-intune-create-policy-configure.png diff --git a/windows/security/threat-protection/windows-defender-atp/images/atp-azure-intune-create-policy-name.png b/windows/security/threat-protection/microsoft-defender-atp/images/atp-azure-intune-create-policy-name.png similarity index 100% rename from windows/security/threat-protection/windows-defender-atp/images/atp-azure-intune-create-policy-name.png rename to windows/security/threat-protection/microsoft-defender-atp/images/atp-azure-intune-create-policy-name.png diff --git a/windows/security/threat-protection/windows-defender-atp/images/atp-azure-intune-create-policy.png b/windows/security/threat-protection/microsoft-defender-atp/images/atp-azure-intune-create-policy.png similarity index 100% rename from windows/security/threat-protection/windows-defender-atp/images/atp-azure-intune-create-policy.png rename to windows/security/threat-protection/microsoft-defender-atp/images/atp-azure-intune-create-policy.png diff --git a/windows/security/threat-protection/windows-defender-atp/images/atp-azure-intune-create-profile.png b/windows/security/threat-protection/microsoft-defender-atp/images/atp-azure-intune-create-profile.png similarity index 100% rename from windows/security/threat-protection/windows-defender-atp/images/atp-azure-intune-create-profile.png rename to windows/security/threat-protection/microsoft-defender-atp/images/atp-azure-intune-create-profile.png diff --git a/windows/security/threat-protection/windows-defender-atp/images/atp-azure-intune-create.png b/windows/security/threat-protection/microsoft-defender-atp/images/atp-azure-intune-create.png similarity index 100% rename from windows/security/threat-protection/windows-defender-atp/images/atp-azure-intune-create.png rename to windows/security/threat-protection/microsoft-defender-atp/images/atp-azure-intune-create.png diff --git a/windows/security/threat-protection/windows-defender-atp/images/atp-azure-intune-device-config.png b/windows/security/threat-protection/microsoft-defender-atp/images/atp-azure-intune-device-config.png similarity index 100% rename from windows/security/threat-protection/windows-defender-atp/images/atp-azure-intune-device-config.png rename to windows/security/threat-protection/microsoft-defender-atp/images/atp-azure-intune-device-config.png diff --git a/windows/security/threat-protection/windows-defender-atp/images/atp-azure-intune-save-policy.png b/windows/security/threat-protection/microsoft-defender-atp/images/atp-azure-intune-save-policy.png similarity index 100% rename from windows/security/threat-protection/windows-defender-atp/images/atp-azure-intune-save-policy.png rename to windows/security/threat-protection/microsoft-defender-atp/images/atp-azure-intune-save-policy.png diff --git a/windows/security/threat-protection/windows-defender-atp/images/atp-azure-intune-save.png b/windows/security/threat-protection/microsoft-defender-atp/images/atp-azure-intune-save.png similarity index 100% rename from windows/security/threat-protection/windows-defender-atp/images/atp-azure-intune-save.png rename to windows/security/threat-protection/microsoft-defender-atp/images/atp-azure-intune-save.png diff --git a/windows/security/threat-protection/windows-defender-atp/images/atp-azure-intune-select-group.png b/windows/security/threat-protection/microsoft-defender-atp/images/atp-azure-intune-select-group.png similarity index 100% rename from windows/security/threat-protection/windows-defender-atp/images/atp-azure-intune-select-group.png rename to windows/security/threat-protection/microsoft-defender-atp/images/atp-azure-intune-select-group.png diff --git a/windows/security/threat-protection/windows-defender-atp/images/atp-azure-intune-settings-configure.png b/windows/security/threat-protection/microsoft-defender-atp/images/atp-azure-intune-settings-configure.png similarity index 100% rename from windows/security/threat-protection/windows-defender-atp/images/atp-azure-intune-settings-configure.png rename to windows/security/threat-protection/microsoft-defender-atp/images/atp-azure-intune-settings-configure.png diff --git a/windows/security/threat-protection/windows-defender-atp/images/atp-azure-intune.png b/windows/security/threat-protection/microsoft-defender-atp/images/atp-azure-intune.png similarity index 100% rename from windows/security/threat-protection/windows-defender-atp/images/atp-azure-intune.png rename to windows/security/threat-protection/microsoft-defender-atp/images/atp-azure-intune.png diff --git a/windows/security/threat-protection/windows-defender-atp/images/atp-azure-license-icon.png b/windows/security/threat-protection/microsoft-defender-atp/images/atp-azure-license-icon.png similarity index 100% rename from windows/security/threat-protection/windows-defender-atp/images/atp-azure-license-icon.png rename to windows/security/threat-protection/microsoft-defender-atp/images/atp-azure-license-icon.png diff --git a/windows/security/threat-protection/windows-defender-atp/images/atp-azure-new-app.png b/windows/security/threat-protection/microsoft-defender-atp/images/atp-azure-new-app.png similarity index 100% rename from windows/security/threat-protection/windows-defender-atp/images/atp-azure-new-app.png rename to windows/security/threat-protection/microsoft-defender-atp/images/atp-azure-new-app.png diff --git a/windows/security/threat-protection/windows-defender-atp/images/atp-azure-required-permissions.png b/windows/security/threat-protection/microsoft-defender-atp/images/atp-azure-required-permissions.png similarity index 100% rename from windows/security/threat-protection/windows-defender-atp/images/atp-azure-required-permissions.png rename to windows/security/threat-protection/microsoft-defender-atp/images/atp-azure-required-permissions.png diff --git a/windows/security/threat-protection/windows-defender-atp/images/atp-azure-select-permissions.png b/windows/security/threat-protection/microsoft-defender-atp/images/atp-azure-select-permissions.png similarity index 100% rename from windows/security/threat-protection/windows-defender-atp/images/atp-azure-select-permissions.png rename to windows/security/threat-protection/microsoft-defender-atp/images/atp-azure-select-permissions.png diff --git a/windows/security/threat-protection/windows-defender-atp/images/atp-azure-ui-user-access.png b/windows/security/threat-protection/microsoft-defender-atp/images/atp-azure-ui-user-access.png similarity index 100% rename from windows/security/threat-protection/windows-defender-atp/images/atp-azure-ui-user-access.png rename to windows/security/threat-protection/microsoft-defender-atp/images/atp-azure-ui-user-access.png diff --git a/windows/security/threat-protection/windows-defender-atp/images/atp-billing-licenses.png b/windows/security/threat-protection/microsoft-defender-atp/images/atp-billing-licenses.png similarity index 100% rename from windows/security/threat-protection/windows-defender-atp/images/atp-billing-licenses.png rename to windows/security/threat-protection/microsoft-defender-atp/images/atp-billing-licenses.png diff --git a/windows/security/threat-protection/windows-defender-atp/images/atp-billing-subscriptions.png b/windows/security/threat-protection/microsoft-defender-atp/images/atp-billing-subscriptions.png similarity index 100% rename from windows/security/threat-protection/windows-defender-atp/images/atp-billing-subscriptions.png rename to windows/security/threat-protection/microsoft-defender-atp/images/atp-billing-subscriptions.png diff --git a/windows/security/threat-protection/windows-defender-atp/images/atp-block-file-confirm.png b/windows/security/threat-protection/microsoft-defender-atp/images/atp-block-file-confirm.png similarity index 100% rename from windows/security/threat-protection/windows-defender-atp/images/atp-block-file-confirm.png rename to windows/security/threat-protection/microsoft-defender-atp/images/atp-block-file-confirm.png diff --git a/windows/security/threat-protection/windows-defender-atp/images/atp-block-file.png b/windows/security/threat-protection/microsoft-defender-atp/images/atp-block-file.png similarity index 100% rename from windows/security/threat-protection/windows-defender-atp/images/atp-block-file.png rename to windows/security/threat-protection/microsoft-defender-atp/images/atp-block-file.png diff --git a/windows/security/threat-protection/windows-defender-atp/images/atp-blockfile.png b/windows/security/threat-protection/microsoft-defender-atp/images/atp-blockfile.png similarity index 100% rename from windows/security/threat-protection/windows-defender-atp/images/atp-blockfile.png rename to windows/security/threat-protection/microsoft-defender-atp/images/atp-blockfile.png diff --git a/windows/security/threat-protection/windows-defender-atp/images/atp-cloud-discovery-dashboard-menu.png b/windows/security/threat-protection/microsoft-defender-atp/images/atp-cloud-discovery-dashboard-menu.png similarity index 100% rename from windows/security/threat-protection/windows-defender-atp/images/atp-cloud-discovery-dashboard-menu.png rename to windows/security/threat-protection/microsoft-defender-atp/images/atp-cloud-discovery-dashboard-menu.png diff --git a/windows/security/threat-protection/windows-defender-atp/images/atp-collect-investigation-package.png b/windows/security/threat-protection/microsoft-defender-atp/images/atp-collect-investigation-package.png similarity index 100% rename from windows/security/threat-protection/windows-defender-atp/images/atp-collect-investigation-package.png rename to windows/security/threat-protection/microsoft-defender-atp/images/atp-collect-investigation-package.png diff --git a/windows/security/threat-protection/windows-defender-atp/images/atp-command-line-icon.png b/windows/security/threat-protection/microsoft-defender-atp/images/atp-command-line-icon.png similarity index 100% rename from windows/security/threat-protection/windows-defender-atp/images/atp-command-line-icon.png rename to windows/security/threat-protection/microsoft-defender-atp/images/atp-command-line-icon.png diff --git a/windows/security/threat-protection/windows-defender-atp/images/atp-community-center.png b/windows/security/threat-protection/microsoft-defender-atp/images/atp-community-center.png similarity index 100% rename from windows/security/threat-protection/windows-defender-atp/images/atp-community-center.png rename to windows/security/threat-protection/microsoft-defender-atp/images/atp-community-center.png diff --git a/windows/security/threat-protection/windows-defender-atp/images/atp-conditional-access-numbered.png b/windows/security/threat-protection/microsoft-defender-atp/images/atp-conditional-access-numbered.png similarity index 100% rename from windows/security/threat-protection/windows-defender-atp/images/atp-conditional-access-numbered.png rename to windows/security/threat-protection/microsoft-defender-atp/images/atp-conditional-access-numbered.png diff --git a/windows/security/threat-protection/windows-defender-atp/images/atp-conditional-access.png b/windows/security/threat-protection/microsoft-defender-atp/images/atp-conditional-access.png similarity index 100% rename from windows/security/threat-protection/windows-defender-atp/images/atp-conditional-access.png rename to windows/security/threat-protection/microsoft-defender-atp/images/atp-conditional-access.png diff --git a/windows/security/threat-protection/windows-defender-atp/images/atp-confirm-isolate.png b/windows/security/threat-protection/microsoft-defender-atp/images/atp-confirm-isolate.png similarity index 100% rename from windows/security/threat-protection/windows-defender-atp/images/atp-confirm-isolate.png rename to windows/security/threat-protection/microsoft-defender-atp/images/atp-confirm-isolate.png diff --git a/windows/security/threat-protection/windows-defender-atp/images/atp-create-dashboard.png b/windows/security/threat-protection/microsoft-defender-atp/images/atp-create-dashboard.png similarity index 100% rename from windows/security/threat-protection/windows-defender-atp/images/atp-create-dashboard.png rename to windows/security/threat-protection/microsoft-defender-atp/images/atp-create-dashboard.png diff --git a/windows/security/threat-protection/windows-defender-atp/images/atp-create-suppression-rule.png b/windows/security/threat-protection/microsoft-defender-atp/images/atp-create-suppression-rule.png similarity index 100% rename from windows/security/threat-protection/windows-defender-atp/images/atp-create-suppression-rule.png rename to windows/security/threat-protection/microsoft-defender-atp/images/atp-create-suppression-rule.png diff --git a/windows/security/threat-protection/windows-defender-atp/images/atp-custom-oma-uri.png b/windows/security/threat-protection/microsoft-defender-atp/images/atp-custom-oma-uri.png similarity index 100% rename from windows/security/threat-protection/windows-defender-atp/images/atp-custom-oma-uri.png rename to windows/security/threat-protection/microsoft-defender-atp/images/atp-custom-oma-uri.png diff --git a/windows/security/threat-protection/windows-defender-atp/images/atp-custom-ti-mapping.png b/windows/security/threat-protection/microsoft-defender-atp/images/atp-custom-ti-mapping.png similarity index 100% rename from windows/security/threat-protection/windows-defender-atp/images/atp-custom-ti-mapping.png rename to windows/security/threat-protection/microsoft-defender-atp/images/atp-custom-ti-mapping.png diff --git a/windows/security/threat-protection/windows-defender-atp/images/atp-daily-machines-reporting.png b/windows/security/threat-protection/microsoft-defender-atp/images/atp-daily-machines-reporting.png similarity index 100% rename from windows/security/threat-protection/windows-defender-atp/images/atp-daily-machines-reporting.png rename to windows/security/threat-protection/microsoft-defender-atp/images/atp-daily-machines-reporting.png diff --git a/windows/security/threat-protection/windows-defender-atp/images/atp-dashboard-security-analytics-9.png b/windows/security/threat-protection/microsoft-defender-atp/images/atp-dashboard-security-analytics-9.png similarity index 100% rename from windows/security/threat-protection/windows-defender-atp/images/atp-dashboard-security-analytics-9.png rename to windows/security/threat-protection/microsoft-defender-atp/images/atp-dashboard-security-analytics-9.png diff --git a/windows/security/threat-protection/windows-defender-atp/images/atp-dashboard-security-analytics-full.png b/windows/security/threat-protection/microsoft-defender-atp/images/atp-dashboard-security-analytics-full.png similarity index 100% rename from windows/security/threat-protection/windows-defender-atp/images/atp-dashboard-security-analytics-full.png rename to windows/security/threat-protection/microsoft-defender-atp/images/atp-dashboard-security-analytics-full.png diff --git a/windows/security/threat-protection/windows-defender-atp/images/atp-dashboard-security-analytics.png b/windows/security/threat-protection/microsoft-defender-atp/images/atp-dashboard-security-analytics.png similarity index 100% rename from windows/security/threat-protection/windows-defender-atp/images/atp-dashboard-security-analytics.png rename to windows/security/threat-protection/microsoft-defender-atp/images/atp-dashboard-security-analytics.png diff --git a/windows/security/threat-protection/windows-defender-atp/images/atp-data-not-available.png b/windows/security/threat-protection/microsoft-defender-atp/images/atp-data-not-available.png similarity index 100% rename from windows/security/threat-protection/windows-defender-atp/images/atp-data-not-available.png rename to windows/security/threat-protection/microsoft-defender-atp/images/atp-data-not-available.png diff --git a/windows/security/threat-protection/windows-defender-atp/images/atp-data-ready.png b/windows/security/threat-protection/microsoft-defender-atp/images/atp-data-ready.png similarity index 100% rename from windows/security/threat-protection/windows-defender-atp/images/atp-data-ready.png rename to windows/security/threat-protection/microsoft-defender-atp/images/atp-data-ready.png diff --git a/windows/security/threat-protection/windows-defender-atp/images/atp-data-retention-policy.png b/windows/security/threat-protection/microsoft-defender-atp/images/atp-data-retention-policy.png similarity index 100% rename from windows/security/threat-protection/windows-defender-atp/images/atp-data-retention-policy.png rename to windows/security/threat-protection/microsoft-defender-atp/images/atp-data-retention-policy.png diff --git a/windows/security/threat-protection/windows-defender-atp/images/atp-delete-query.png b/windows/security/threat-protection/microsoft-defender-atp/images/atp-delete-query.png similarity index 100% rename from windows/security/threat-protection/windows-defender-atp/images/atp-delete-query.png rename to windows/security/threat-protection/microsoft-defender-atp/images/atp-delete-query.png diff --git a/windows/security/threat-protection/windows-defender-atp/images/atp-detailed-actor.png b/windows/security/threat-protection/microsoft-defender-atp/images/atp-detailed-actor.png similarity index 100% rename from windows/security/threat-protection/windows-defender-atp/images/atp-detailed-actor.png rename to windows/security/threat-protection/microsoft-defender-atp/images/atp-detailed-actor.png diff --git a/windows/security/threat-protection/windows-defender-atp/images/atp-disableantispyware-regkey.png b/windows/security/threat-protection/microsoft-defender-atp/images/atp-disableantispyware-regkey.png similarity index 100% rename from windows/security/threat-protection/windows-defender-atp/images/atp-disableantispyware-regkey.png rename to windows/security/threat-protection/microsoft-defender-atp/images/atp-disableantispyware-regkey.png diff --git a/windows/security/threat-protection/windows-defender-atp/images/atp-download-connector.png b/windows/security/threat-protection/microsoft-defender-atp/images/atp-download-connector.png similarity index 100% rename from windows/security/threat-protection/windows-defender-atp/images/atp-download-connector.png rename to windows/security/threat-protection/microsoft-defender-atp/images/atp-download-connector.png diff --git a/windows/security/threat-protection/windows-defender-atp/images/atp-enable-security-analytics.png b/windows/security/threat-protection/microsoft-defender-atp/images/atp-enable-security-analytics.png similarity index 100% rename from windows/security/threat-protection/windows-defender-atp/images/atp-enable-security-analytics.png rename to windows/security/threat-protection/microsoft-defender-atp/images/atp-enable-security-analytics.png diff --git a/windows/security/threat-protection/windows-defender-atp/images/atp-example-email-notification.png b/windows/security/threat-protection/microsoft-defender-atp/images/atp-example-email-notification.png similarity index 100% rename from windows/security/threat-protection/windows-defender-atp/images/atp-example-email-notification.png rename to windows/security/threat-protection/microsoft-defender-atp/images/atp-example-email-notification.png diff --git a/windows/security/threat-protection/windows-defender-atp/images/atp-export-machine-timeline-events.png b/windows/security/threat-protection/microsoft-defender-atp/images/atp-export-machine-timeline-events.png similarity index 100% rename from windows/security/threat-protection/windows-defender-atp/images/atp-export-machine-timeline-events.png rename to windows/security/threat-protection/microsoft-defender-atp/images/atp-export-machine-timeline-events.png diff --git a/windows/security/threat-protection/windows-defender-atp/images/atp-file-action.png b/windows/security/threat-protection/microsoft-defender-atp/images/atp-file-action.png similarity index 100% rename from windows/security/threat-protection/windows-defender-atp/images/atp-file-action.png rename to windows/security/threat-protection/microsoft-defender-atp/images/atp-file-action.png diff --git a/windows/security/threat-protection/windows-defender-atp/images/atp-file-creation-icon.png b/windows/security/threat-protection/microsoft-defender-atp/images/atp-file-creation-icon.png similarity index 100% rename from windows/security/threat-protection/windows-defender-atp/images/atp-file-creation-icon.png rename to windows/security/threat-protection/microsoft-defender-atp/images/atp-file-creation-icon.png diff --git a/windows/security/threat-protection/windows-defender-atp/images/atp-file-details.png b/windows/security/threat-protection/microsoft-defender-atp/images/atp-file-details.png similarity index 100% rename from windows/security/threat-protection/windows-defender-atp/images/atp-file-details.png rename to windows/security/threat-protection/microsoft-defender-atp/images/atp-file-details.png diff --git a/windows/security/threat-protection/windows-defender-atp/images/atp-file-in-org.png b/windows/security/threat-protection/microsoft-defender-atp/images/atp-file-in-org.png similarity index 100% rename from windows/security/threat-protection/windows-defender-atp/images/atp-file-in-org.png rename to windows/security/threat-protection/microsoft-defender-atp/images/atp-file-in-org.png diff --git a/windows/security/threat-protection/windows-defender-atp/images/atp-file-information.png b/windows/security/threat-protection/microsoft-defender-atp/images/atp-file-information.png similarity index 100% rename from windows/security/threat-protection/windows-defender-atp/images/atp-file-information.png rename to windows/security/threat-protection/microsoft-defender-atp/images/atp-file-information.png diff --git a/windows/security/threat-protection/windows-defender-atp/images/atp-file-observed-icon.png b/windows/security/threat-protection/microsoft-defender-atp/images/atp-file-observed-icon.png similarity index 100% rename from windows/security/threat-protection/windows-defender-atp/images/atp-file-observed-icon.png rename to windows/security/threat-protection/microsoft-defender-atp/images/atp-file-observed-icon.png diff --git a/windows/security/threat-protection/windows-defender-atp/images/atp-filter-advanced-hunting.png b/windows/security/threat-protection/microsoft-defender-atp/images/atp-filter-advanced-hunting.png similarity index 100% rename from windows/security/threat-protection/windows-defender-atp/images/atp-filter-advanced-hunting.png rename to windows/security/threat-protection/microsoft-defender-atp/images/atp-filter-advanced-hunting.png diff --git a/windows/security/threat-protection/windows-defender-atp/images/atp-final-onboard-endpoints-warning-before-atp-access.png b/windows/security/threat-protection/microsoft-defender-atp/images/atp-final-onboard-endpoints-warning-before-atp-access.png similarity index 100% rename from windows/security/threat-protection/windows-defender-atp/images/atp-final-onboard-endpoints-warning-before-atp-access.png rename to windows/security/threat-protection/microsoft-defender-atp/images/atp-final-onboard-endpoints-warning-before-atp-access.png diff --git a/windows/security/threat-protection/windows-defender-atp/images/atp-final-preference-setup.png b/windows/security/threat-protection/microsoft-defender-atp/images/atp-final-preference-setup.png similarity index 100% rename from windows/security/threat-protection/windows-defender-atp/images/atp-final-preference-setup.png rename to windows/security/threat-protection/microsoft-defender-atp/images/atp-final-preference-setup.png diff --git a/windows/security/threat-protection/windows-defender-atp/images/atp-geographic-location-setup.png b/windows/security/threat-protection/microsoft-defender-atp/images/atp-geographic-location-setup.png similarity index 100% rename from windows/security/threat-protection/windows-defender-atp/images/atp-geographic-location-setup.png rename to windows/security/threat-protection/microsoft-defender-atp/images/atp-geographic-location-setup.png diff --git a/windows/security/threat-protection/windows-defender-atp/images/atp-get-data.png b/windows/security/threat-protection/microsoft-defender-atp/images/atp-get-data.png similarity index 100% rename from windows/security/threat-protection/windows-defender-atp/images/atp-get-data.png rename to windows/security/threat-protection/microsoft-defender-atp/images/atp-get-data.png diff --git a/windows/security/threat-protection/windows-defender-atp/images/atp-gpo-proxy1.png b/windows/security/threat-protection/microsoft-defender-atp/images/atp-gpo-proxy1.png similarity index 100% rename from windows/security/threat-protection/windows-defender-atp/images/atp-gpo-proxy1.png rename to windows/security/threat-protection/microsoft-defender-atp/images/atp-gpo-proxy1.png diff --git a/windows/security/threat-protection/windows-defender-atp/images/atp-gpo-proxy2.png b/windows/security/threat-protection/microsoft-defender-atp/images/atp-gpo-proxy2.png similarity index 100% rename from windows/security/threat-protection/windows-defender-atp/images/atp-gpo-proxy2.png rename to windows/security/threat-protection/microsoft-defender-atp/images/atp-gpo-proxy2.png diff --git a/windows/security/threat-protection/windows-defender-atp/images/atp-image.png b/windows/security/threat-protection/microsoft-defender-atp/images/atp-image.png similarity index 100% rename from windows/security/threat-protection/windows-defender-atp/images/atp-image.png rename to windows/security/threat-protection/microsoft-defender-atp/images/atp-image.png diff --git a/windows/security/threat-protection/windows-defender-atp/images/atp-improv-opps-9.png b/windows/security/threat-protection/microsoft-defender-atp/images/atp-improv-opps-9.png similarity index 100% rename from windows/security/threat-protection/windows-defender-atp/images/atp-improv-opps-9.png rename to windows/security/threat-protection/microsoft-defender-atp/images/atp-improv-opps-9.png diff --git a/windows/security/threat-protection/windows-defender-atp/images/atp-improv-opps.png b/windows/security/threat-protection/microsoft-defender-atp/images/atp-improv-opps.png similarity index 100% rename from windows/security/threat-protection/windows-defender-atp/images/atp-improv-opps.png rename to windows/security/threat-protection/microsoft-defender-atp/images/atp-improv-opps.png diff --git a/windows/security/threat-protection/windows-defender-atp/images/atp-improv-ops.png b/windows/security/threat-protection/microsoft-defender-atp/images/atp-improv-ops.png similarity index 100% rename from windows/security/threat-protection/windows-defender-atp/images/atp-improv-ops.png rename to windows/security/threat-protection/microsoft-defender-atp/images/atp-improv-ops.png diff --git a/windows/security/threat-protection/windows-defender-atp/images/atp-incident-details-page.png b/windows/security/threat-protection/microsoft-defender-atp/images/atp-incident-details-page.png similarity index 100% rename from windows/security/threat-protection/windows-defender-atp/images/atp-incident-details-page.png rename to windows/security/threat-protection/microsoft-defender-atp/images/atp-incident-details-page.png diff --git a/windows/security/threat-protection/windows-defender-atp/images/atp-incident-details.png b/windows/security/threat-protection/microsoft-defender-atp/images/atp-incident-details.png similarity index 100% rename from windows/security/threat-protection/windows-defender-atp/images/atp-incident-details.png rename to windows/security/threat-protection/microsoft-defender-atp/images/atp-incident-details.png diff --git a/windows/security/threat-protection/windows-defender-atp/images/atp-incident-evidence-tab.png b/windows/security/threat-protection/microsoft-defender-atp/images/atp-incident-evidence-tab.png similarity index 100% rename from windows/security/threat-protection/windows-defender-atp/images/atp-incident-evidence-tab.png rename to windows/security/threat-protection/microsoft-defender-atp/images/atp-incident-evidence-tab.png diff --git a/windows/security/threat-protection/windows-defender-atp/images/atp-incident-graph-details.png b/windows/security/threat-protection/microsoft-defender-atp/images/atp-incident-graph-details.png similarity index 100% rename from windows/security/threat-protection/windows-defender-atp/images/atp-incident-graph-details.png rename to windows/security/threat-protection/microsoft-defender-atp/images/atp-incident-graph-details.png diff --git a/windows/security/threat-protection/windows-defender-atp/images/atp-incident-graph-tab.png b/windows/security/threat-protection/microsoft-defender-atp/images/atp-incident-graph-tab.png similarity index 100% rename from windows/security/threat-protection/windows-defender-atp/images/atp-incident-graph-tab.png rename to windows/security/threat-protection/microsoft-defender-atp/images/atp-incident-graph-tab.png diff --git a/windows/security/threat-protection/windows-defender-atp/images/atp-incident-graph.png b/windows/security/threat-protection/microsoft-defender-atp/images/atp-incident-graph.png similarity index 100% rename from windows/security/threat-protection/windows-defender-atp/images/atp-incident-graph.png rename to windows/security/threat-protection/microsoft-defender-atp/images/atp-incident-graph.png diff --git a/windows/security/threat-protection/windows-defender-atp/images/atp-incident-investigations-tab.png b/windows/security/threat-protection/microsoft-defender-atp/images/atp-incident-investigations-tab.png similarity index 100% rename from windows/security/threat-protection/windows-defender-atp/images/atp-incident-investigations-tab.png rename to windows/security/threat-protection/microsoft-defender-atp/images/atp-incident-investigations-tab.png diff --git a/windows/security/threat-protection/windows-defender-atp/images/atp-incident-machine-tab.png b/windows/security/threat-protection/microsoft-defender-atp/images/atp-incident-machine-tab.png similarity index 100% rename from windows/security/threat-protection/windows-defender-atp/images/atp-incident-machine-tab.png rename to windows/security/threat-protection/microsoft-defender-atp/images/atp-incident-machine-tab.png diff --git a/windows/security/threat-protection/windows-defender-atp/images/atp-incident-queue.png b/windows/security/threat-protection/microsoft-defender-atp/images/atp-incident-queue.png similarity index 100% rename from windows/security/threat-protection/windows-defender-atp/images/atp-incident-queue.png rename to windows/security/threat-protection/microsoft-defender-atp/images/atp-incident-queue.png diff --git a/windows/security/threat-protection/windows-defender-atp/images/atp-incidents-alerts-incidentlinkedbyreason.png b/windows/security/threat-protection/microsoft-defender-atp/images/atp-incidents-alerts-incidentlinkedbyreason.png similarity index 100% rename from windows/security/threat-protection/windows-defender-atp/images/atp-incidents-alerts-incidentlinkedbyreason.png rename to windows/security/threat-protection/microsoft-defender-atp/images/atp-incidents-alerts-incidentlinkedbyreason.png diff --git a/windows/security/threat-protection/windows-defender-atp/images/atp-incidents-alerts-linkedbytooltip.png b/windows/security/threat-protection/microsoft-defender-atp/images/atp-incidents-alerts-linkedbytooltip.png similarity index 100% rename from windows/security/threat-protection/windows-defender-atp/images/atp-incidents-alerts-linkedbytooltip.png rename to windows/security/threat-protection/microsoft-defender-atp/images/atp-incidents-alerts-linkedbytooltip.png diff --git a/windows/security/threat-protection/windows-defender-atp/images/atp-incidents-alerts-reason.png b/windows/security/threat-protection/microsoft-defender-atp/images/atp-incidents-alerts-reason.png similarity index 100% rename from windows/security/threat-protection/windows-defender-atp/images/atp-incidents-alerts-reason.png rename to windows/security/threat-protection/microsoft-defender-atp/images/atp-incidents-alerts-reason.png diff --git a/windows/security/threat-protection/windows-defender-atp/images/atp-incidents-alerts-tooltip.png b/windows/security/threat-protection/microsoft-defender-atp/images/atp-incidents-alerts-tooltip.png similarity index 100% rename from windows/security/threat-protection/windows-defender-atp/images/atp-incidents-alerts-tooltip.png rename to windows/security/threat-protection/microsoft-defender-atp/images/atp-incidents-alerts-tooltip.png diff --git a/windows/security/threat-protection/windows-defender-atp/images/atp-incidents-mgt-pane.png b/windows/security/threat-protection/microsoft-defender-atp/images/atp-incidents-mgt-pane.png similarity index 100% rename from windows/security/threat-protection/windows-defender-atp/images/atp-incidents-mgt-pane.png rename to windows/security/threat-protection/microsoft-defender-atp/images/atp-incidents-mgt-pane.png diff --git a/windows/security/threat-protection/windows-defender-atp/images/atp-industry-information.png b/windows/security/threat-protection/microsoft-defender-atp/images/atp-industry-information.png similarity index 100% rename from windows/security/threat-protection/windows-defender-atp/images/atp-industry-information.png rename to windows/security/threat-protection/microsoft-defender-atp/images/atp-industry-information.png diff --git a/windows/security/threat-protection/windows-defender-atp/images/atp-intune-add-oma.png b/windows/security/threat-protection/microsoft-defender-atp/images/atp-intune-add-oma.png similarity index 100% rename from windows/security/threat-protection/windows-defender-atp/images/atp-intune-add-oma.png rename to windows/security/threat-protection/microsoft-defender-atp/images/atp-intune-add-oma.png diff --git a/windows/security/threat-protection/windows-defender-atp/images/atp-intune-add-policy.png b/windows/security/threat-protection/microsoft-defender-atp/images/atp-intune-add-policy.png similarity index 100% rename from windows/security/threat-protection/windows-defender-atp/images/atp-intune-add-policy.png rename to windows/security/threat-protection/microsoft-defender-atp/images/atp-intune-add-policy.png diff --git a/windows/security/threat-protection/windows-defender-atp/images/atp-intune-assignments.png b/windows/security/threat-protection/microsoft-defender-atp/images/atp-intune-assignments.png similarity index 100% rename from windows/security/threat-protection/windows-defender-atp/images/atp-intune-assignments.png rename to windows/security/threat-protection/microsoft-defender-atp/images/atp-intune-assignments.png diff --git a/windows/security/threat-protection/windows-defender-atp/images/atp-intune-configure.png b/windows/security/threat-protection/microsoft-defender-atp/images/atp-intune-configure.png similarity index 100% rename from windows/security/threat-protection/windows-defender-atp/images/atp-intune-configure.png rename to windows/security/threat-protection/microsoft-defender-atp/images/atp-intune-configure.png diff --git a/windows/security/threat-protection/windows-defender-atp/images/atp-intune-create-policy.png b/windows/security/threat-protection/microsoft-defender-atp/images/atp-intune-create-policy.png similarity index 100% rename from windows/security/threat-protection/windows-defender-atp/images/atp-intune-create-policy.png rename to windows/security/threat-protection/microsoft-defender-atp/images/atp-intune-create-policy.png diff --git a/windows/security/threat-protection/windows-defender-atp/images/atp-intune-custom.png b/windows/security/threat-protection/microsoft-defender-atp/images/atp-intune-custom.png similarity index 100% rename from windows/security/threat-protection/windows-defender-atp/images/atp-intune-custom.png rename to windows/security/threat-protection/microsoft-defender-atp/images/atp-intune-custom.png diff --git a/windows/security/threat-protection/windows-defender-atp/images/atp-intune-deploy-policy.png b/windows/security/threat-protection/microsoft-defender-atp/images/atp-intune-deploy-policy.png similarity index 100% rename from windows/security/threat-protection/windows-defender-atp/images/atp-intune-deploy-policy.png rename to windows/security/threat-protection/microsoft-defender-atp/images/atp-intune-deploy-policy.png diff --git a/windows/security/threat-protection/windows-defender-atp/images/atp-intune-group.png b/windows/security/threat-protection/microsoft-defender-atp/images/atp-intune-group.png similarity index 100% rename from windows/security/threat-protection/windows-defender-atp/images/atp-intune-group.png rename to windows/security/threat-protection/microsoft-defender-atp/images/atp-intune-group.png diff --git a/windows/security/threat-protection/windows-defender-atp/images/atp-intune-manage-deployment.png b/windows/security/threat-protection/microsoft-defender-atp/images/atp-intune-manage-deployment.png similarity index 100% rename from windows/security/threat-protection/windows-defender-atp/images/atp-intune-manage-deployment.png rename to windows/security/threat-protection/microsoft-defender-atp/images/atp-intune-manage-deployment.png diff --git a/windows/security/threat-protection/windows-defender-atp/images/atp-intune-new-policy.png b/windows/security/threat-protection/microsoft-defender-atp/images/atp-intune-new-policy.png similarity index 100% rename from windows/security/threat-protection/windows-defender-atp/images/atp-intune-new-policy.png rename to windows/security/threat-protection/microsoft-defender-atp/images/atp-intune-new-policy.png diff --git a/windows/security/threat-protection/windows-defender-atp/images/atp-intune-oma-uri-setting.png b/windows/security/threat-protection/microsoft-defender-atp/images/atp-intune-oma-uri-setting.png similarity index 100% rename from windows/security/threat-protection/windows-defender-atp/images/atp-intune-oma-uri-setting.png rename to windows/security/threat-protection/microsoft-defender-atp/images/atp-intune-oma-uri-setting.png diff --git a/windows/security/threat-protection/windows-defender-atp/images/atp-intune-policy-name.png b/windows/security/threat-protection/microsoft-defender-atp/images/atp-intune-policy-name.png similarity index 100% rename from windows/security/threat-protection/windows-defender-atp/images/atp-intune-policy-name.png rename to windows/security/threat-protection/microsoft-defender-atp/images/atp-intune-policy-name.png diff --git a/windows/security/threat-protection/windows-defender-atp/images/atp-intune-save-deployment.png b/windows/security/threat-protection/microsoft-defender-atp/images/atp-intune-save-deployment.png similarity index 100% rename from windows/security/threat-protection/windows-defender-atp/images/atp-intune-save-deployment.png rename to windows/security/threat-protection/microsoft-defender-atp/images/atp-intune-save-deployment.png diff --git a/windows/security/threat-protection/windows-defender-atp/images/atp-intune-save-policy.png b/windows/security/threat-protection/microsoft-defender-atp/images/atp-intune-save-policy.png similarity index 100% rename from windows/security/threat-protection/windows-defender-atp/images/atp-intune-save-policy.png rename to windows/security/threat-protection/microsoft-defender-atp/images/atp-intune-save-policy.png diff --git a/windows/security/threat-protection/windows-defender-atp/images/atp-investigation-package-action-center.png b/windows/security/threat-protection/microsoft-defender-atp/images/atp-investigation-package-action-center.png similarity index 100% rename from windows/security/threat-protection/windows-defender-atp/images/atp-investigation-package-action-center.png rename to windows/security/threat-protection/microsoft-defender-atp/images/atp-investigation-package-action-center.png diff --git a/windows/security/threat-protection/windows-defender-atp/images/atp-isolate-machine.png b/windows/security/threat-protection/microsoft-defender-atp/images/atp-isolate-machine.png similarity index 100% rename from windows/security/threat-protection/windows-defender-atp/images/atp-isolate-machine.png rename to windows/security/threat-protection/microsoft-defender-atp/images/atp-isolate-machine.png diff --git a/windows/security/threat-protection/windows-defender-atp/images/atp-licensing-azure-portal.png b/windows/security/threat-protection/microsoft-defender-atp/images/atp-licensing-azure-portal.png similarity index 100% rename from windows/security/threat-protection/windows-defender-atp/images/atp-licensing-azure-portal.png rename to windows/security/threat-protection/microsoft-defender-atp/images/atp-licensing-azure-portal.png diff --git a/windows/security/threat-protection/windows-defender-atp/images/atp-loading.png b/windows/security/threat-protection/microsoft-defender-atp/images/atp-loading.png similarity index 100% rename from windows/security/threat-protection/windows-defender-atp/images/atp-loading.png rename to windows/security/threat-protection/microsoft-defender-atp/images/atp-loading.png diff --git a/windows/security/threat-protection/windows-defender-atp/images/atp-logo-icon.png b/windows/security/threat-protection/microsoft-defender-atp/images/atp-logo-icon.png similarity index 100% rename from windows/security/threat-protection/windows-defender-atp/images/atp-logo-icon.png rename to windows/security/threat-protection/microsoft-defender-atp/images/atp-logo-icon.png diff --git a/windows/security/threat-protection/windows-defender-atp/images/atp-machine-actions-undo.png b/windows/security/threat-protection/microsoft-defender-atp/images/atp-machine-actions-undo.png similarity index 100% rename from windows/security/threat-protection/windows-defender-atp/images/atp-machine-actions-undo.png rename to windows/security/threat-protection/microsoft-defender-atp/images/atp-machine-actions-undo.png diff --git a/windows/security/threat-protection/windows-defender-atp/images/atp-machine-actions.png b/windows/security/threat-protection/microsoft-defender-atp/images/atp-machine-actions.png similarity index 100% rename from windows/security/threat-protection/windows-defender-atp/images/atp-machine-actions.png rename to windows/security/threat-protection/microsoft-defender-atp/images/atp-machine-actions.png diff --git a/windows/security/threat-protection/windows-defender-atp/images/atp-machine-details-view.png b/windows/security/threat-protection/microsoft-defender-atp/images/atp-machine-details-view.png similarity index 100% rename from windows/security/threat-protection/windows-defender-atp/images/atp-machine-details-view.png rename to windows/security/threat-protection/microsoft-defender-atp/images/atp-machine-details-view.png diff --git a/windows/security/threat-protection/windows-defender-atp/images/atp-machine-details-view2.png b/windows/security/threat-protection/microsoft-defender-atp/images/atp-machine-details-view2.png similarity index 100% rename from windows/security/threat-protection/windows-defender-atp/images/atp-machine-details-view2.png rename to windows/security/threat-protection/microsoft-defender-atp/images/atp-machine-details-view2.png diff --git a/windows/security/threat-protection/windows-defender-atp/images/atp-machine-health-details.png b/windows/security/threat-protection/microsoft-defender-atp/images/atp-machine-health-details.png similarity index 100% rename from windows/security/threat-protection/windows-defender-atp/images/atp-machine-health-details.png rename to windows/security/threat-protection/microsoft-defender-atp/images/atp-machine-health-details.png diff --git a/windows/security/threat-protection/windows-defender-atp/images/atp-machine-health.png b/windows/security/threat-protection/microsoft-defender-atp/images/atp-machine-health.png similarity index 100% rename from windows/security/threat-protection/windows-defender-atp/images/atp-machine-health.png rename to windows/security/threat-protection/microsoft-defender-atp/images/atp-machine-health.png diff --git a/windows/security/threat-protection/windows-defender-atp/images/atp-machine-icon.png b/windows/security/threat-protection/microsoft-defender-atp/images/atp-machine-icon.png similarity index 100% rename from windows/security/threat-protection/windows-defender-atp/images/atp-machine-icon.png rename to windows/security/threat-protection/microsoft-defender-atp/images/atp-machine-icon.png diff --git a/windows/security/threat-protection/windows-defender-atp/images/atp-machine-investigation-package.png b/windows/security/threat-protection/microsoft-defender-atp/images/atp-machine-investigation-package.png similarity index 100% rename from windows/security/threat-protection/windows-defender-atp/images/atp-machine-investigation-package.png rename to windows/security/threat-protection/microsoft-defender-atp/images/atp-machine-investigation-package.png diff --git a/windows/security/threat-protection/windows-defender-atp/images/atp-machine-isolation.png b/windows/security/threat-protection/microsoft-defender-atp/images/atp-machine-isolation.png similarity index 100% rename from windows/security/threat-protection/windows-defender-atp/images/atp-machine-isolation.png rename to windows/security/threat-protection/microsoft-defender-atp/images/atp-machine-isolation.png diff --git a/windows/security/threat-protection/windows-defender-atp/images/atp-machine-timeline-details-panel.png b/windows/security/threat-protection/microsoft-defender-atp/images/atp-machine-timeline-details-panel.png similarity index 100% rename from windows/security/threat-protection/windows-defender-atp/images/atp-machine-timeline-details-panel.png rename to windows/security/threat-protection/microsoft-defender-atp/images/atp-machine-timeline-details-panel.png diff --git a/windows/security/threat-protection/windows-defender-atp/images/atp-machine-timeline-export.png b/windows/security/threat-protection/microsoft-defender-atp/images/atp-machine-timeline-export.png similarity index 100% rename from windows/security/threat-protection/windows-defender-atp/images/atp-machine-timeline-export.png rename to windows/security/threat-protection/microsoft-defender-atp/images/atp-machine-timeline-export.png diff --git a/windows/security/threat-protection/windows-defender-atp/images/atp-machine-timeline-filter.png b/windows/security/threat-protection/microsoft-defender-atp/images/atp-machine-timeline-filter.png similarity index 100% rename from windows/security/threat-protection/windows-defender-atp/images/atp-machine-timeline-filter.png rename to windows/security/threat-protection/microsoft-defender-atp/images/atp-machine-timeline-filter.png diff --git a/windows/security/threat-protection/windows-defender-atp/images/atp-machine-timeline.png b/windows/security/threat-protection/microsoft-defender-atp/images/atp-machine-timeline.png similarity index 100% rename from windows/security/threat-protection/windows-defender-atp/images/atp-machine-timeline.png rename to windows/security/threat-protection/microsoft-defender-atp/images/atp-machine-timeline.png diff --git a/windows/security/threat-protection/windows-defender-atp/images/atp-machine-view-ata.png b/windows/security/threat-protection/microsoft-defender-atp/images/atp-machine-view-ata.png similarity index 100% rename from windows/security/threat-protection/windows-defender-atp/images/atp-machine-view-ata.png rename to windows/security/threat-protection/microsoft-defender-atp/images/atp-machine-view-ata.png diff --git a/windows/security/threat-protection/windows-defender-atp/images/atp-machines-active-threats-tile.png b/windows/security/threat-protection/microsoft-defender-atp/images/atp-machines-active-threats-tile.png similarity index 100% rename from windows/security/threat-protection/windows-defender-atp/images/atp-machines-active-threats-tile.png rename to windows/security/threat-protection/microsoft-defender-atp/images/atp-machines-active-threats-tile.png diff --git a/windows/security/threat-protection/windows-defender-atp/images/atp-machines-at-risk.png b/windows/security/threat-protection/microsoft-defender-atp/images/atp-machines-at-risk.png similarity index 100% rename from windows/security/threat-protection/windows-defender-atp/images/atp-machines-at-risk.png rename to windows/security/threat-protection/microsoft-defender-atp/images/atp-machines-at-risk.png diff --git a/windows/security/threat-protection/windows-defender-atp/images/atp-machines-list-misconfigured.png b/windows/security/threat-protection/microsoft-defender-atp/images/atp-machines-list-misconfigured.png similarity index 100% rename from windows/security/threat-protection/windows-defender-atp/images/atp-machines-list-misconfigured.png rename to windows/security/threat-protection/microsoft-defender-atp/images/atp-machines-list-misconfigured.png diff --git a/windows/security/threat-protection/windows-defender-atp/images/atp-machines-list-view.png b/windows/security/threat-protection/microsoft-defender-atp/images/atp-machines-list-view.png similarity index 100% rename from windows/security/threat-protection/windows-defender-atp/images/atp-machines-list-view.png rename to windows/security/threat-protection/microsoft-defender-atp/images/atp-machines-list-view.png diff --git a/windows/security/threat-protection/windows-defender-atp/images/atp-machines-list-view2.png b/windows/security/threat-protection/microsoft-defender-atp/images/atp-machines-list-view2.png similarity index 100% rename from windows/security/threat-protection/windows-defender-atp/images/atp-machines-list-view2.png rename to windows/security/threat-protection/microsoft-defender-atp/images/atp-machines-list-view2.png diff --git a/windows/security/threat-protection/windows-defender-atp/images/atp-machines-timeline.png b/windows/security/threat-protection/microsoft-defender-atp/images/atp-machines-timeline.png similarity index 100% rename from windows/security/threat-protection/windows-defender-atp/images/atp-machines-timeline.png rename to windows/security/threat-protection/microsoft-defender-atp/images/atp-machines-timeline.png diff --git a/windows/security/threat-protection/windows-defender-atp/images/atp-machines-view-list.png b/windows/security/threat-protection/microsoft-defender-atp/images/atp-machines-view-list.png similarity index 100% rename from windows/security/threat-protection/windows-defender-atp/images/atp-machines-view-list.png rename to windows/security/threat-protection/microsoft-defender-atp/images/atp-machines-view-list.png diff --git a/windows/security/threat-protection/windows-defender-atp/images/atp-main-portal.png b/windows/security/threat-protection/microsoft-defender-atp/images/atp-main-portal.png similarity index 100% rename from windows/security/threat-protection/windows-defender-atp/images/atp-main-portal.png rename to windows/security/threat-protection/microsoft-defender-atp/images/atp-main-portal.png diff --git a/windows/security/threat-protection/windows-defender-atp/images/atp-manage-tags.png b/windows/security/threat-protection/microsoft-defender-atp/images/atp-manage-tags.png similarity index 100% rename from windows/security/threat-protection/windows-defender-atp/images/atp-manage-tags.png rename to windows/security/threat-protection/microsoft-defender-atp/images/atp-manage-tags.png diff --git a/windows/security/threat-protection/windows-defender-atp/images/atp-mapping 3.png b/windows/security/threat-protection/microsoft-defender-atp/images/atp-mapping 3.png similarity index 100% rename from windows/security/threat-protection/windows-defender-atp/images/atp-mapping 3.png rename to windows/security/threat-protection/microsoft-defender-atp/images/atp-mapping 3.png diff --git a/windows/security/threat-protection/windows-defender-atp/images/atp-mapping1.png b/windows/security/threat-protection/microsoft-defender-atp/images/atp-mapping1.png similarity index 100% rename from windows/security/threat-protection/windows-defender-atp/images/atp-mapping1.png rename to windows/security/threat-protection/microsoft-defender-atp/images/atp-mapping1.png diff --git a/windows/security/threat-protection/windows-defender-atp/images/atp-mapping2.png b/windows/security/threat-protection/microsoft-defender-atp/images/atp-mapping2.png similarity index 100% rename from windows/security/threat-protection/windows-defender-atp/images/atp-mapping2.png rename to windows/security/threat-protection/microsoft-defender-atp/images/atp-mapping2.png diff --git a/windows/security/threat-protection/windows-defender-atp/images/atp-mapping3.png b/windows/security/threat-protection/microsoft-defender-atp/images/atp-mapping3.png similarity index 100% rename from windows/security/threat-protection/windows-defender-atp/images/atp-mapping3.png rename to windows/security/threat-protection/microsoft-defender-atp/images/atp-mapping3.png diff --git a/windows/security/threat-protection/windows-defender-atp/images/atp-mapping4.png b/windows/security/threat-protection/microsoft-defender-atp/images/atp-mapping4.png similarity index 100% rename from windows/security/threat-protection/windows-defender-atp/images/atp-mapping4.png rename to windows/security/threat-protection/microsoft-defender-atp/images/atp-mapping4.png diff --git a/windows/security/threat-protection/windows-defender-atp/images/atp-mapping5.png b/windows/security/threat-protection/microsoft-defender-atp/images/atp-mapping5.png similarity index 100% rename from windows/security/threat-protection/windows-defender-atp/images/atp-mapping5.png rename to windows/security/threat-protection/microsoft-defender-atp/images/atp-mapping5.png diff --git a/windows/security/threat-protection/windows-defender-atp/images/atp-mapping6.png b/windows/security/threat-protection/microsoft-defender-atp/images/atp-mapping6.png similarity index 100% rename from windows/security/threat-protection/windows-defender-atp/images/atp-mapping6.png rename to windows/security/threat-protection/microsoft-defender-atp/images/atp-mapping6.png diff --git a/windows/security/threat-protection/windows-defender-atp/images/atp-mapping7.png b/windows/security/threat-protection/microsoft-defender-atp/images/atp-mapping7.png similarity index 100% rename from windows/security/threat-protection/windows-defender-atp/images/atp-mapping7.png rename to windows/security/threat-protection/microsoft-defender-atp/images/atp-mapping7.png diff --git a/windows/security/threat-protection/windows-defender-atp/images/atp-mcas-settings.png b/windows/security/threat-protection/microsoft-defender-atp/images/atp-mcas-settings.png similarity index 100% rename from windows/security/threat-protection/windows-defender-atp/images/atp-mcas-settings.png rename to windows/security/threat-protection/microsoft-defender-atp/images/atp-mcas-settings.png diff --git a/windows/security/threat-protection/windows-defender-atp/images/atp-mdm-onboarding-package.png b/windows/security/threat-protection/microsoft-defender-atp/images/atp-mdm-onboarding-package.png similarity index 100% rename from windows/security/threat-protection/windows-defender-atp/images/atp-mdm-onboarding-package.png rename to windows/security/threat-protection/microsoft-defender-atp/images/atp-mdm-onboarding-package.png diff --git a/windows/security/threat-protection/windows-defender-atp/images/atp-memory-allocation-icon.png b/windows/security/threat-protection/microsoft-defender-atp/images/atp-memory-allocation-icon.png similarity index 100% rename from windows/security/threat-protection/windows-defender-atp/images/atp-memory-allocation-icon.png rename to windows/security/threat-protection/microsoft-defender-atp/images/atp-memory-allocation-icon.png diff --git a/windows/security/threat-protection/windows-defender-atp/images/atp-mma-properties.png b/windows/security/threat-protection/microsoft-defender-atp/images/atp-mma-properties.png similarity index 100% rename from windows/security/threat-protection/windows-defender-atp/images/atp-mma-properties.png rename to windows/security/threat-protection/microsoft-defender-atp/images/atp-mma-properties.png diff --git a/windows/security/threat-protection/windows-defender-atp/images/atp-mma.png b/windows/security/threat-protection/microsoft-defender-atp/images/atp-mma.png similarity index 100% rename from windows/security/threat-protection/windows-defender-atp/images/atp-mma.png rename to windows/security/threat-protection/microsoft-defender-atp/images/atp-mma.png diff --git a/windows/security/threat-protection/windows-defender-atp/images/atp-module-load-icon.png b/windows/security/threat-protection/microsoft-defender-atp/images/atp-module-load-icon.png similarity index 100% rename from windows/security/threat-protection/windows-defender-atp/images/atp-module-load-icon.png rename to windows/security/threat-protection/microsoft-defender-atp/images/atp-module-load-icon.png diff --git a/windows/security/threat-protection/windows-defender-atp/images/atp-ms-secure-score-9.png b/windows/security/threat-protection/microsoft-defender-atp/images/atp-ms-secure-score-9.png similarity index 100% rename from windows/security/threat-protection/windows-defender-atp/images/atp-ms-secure-score-9.png rename to windows/security/threat-protection/microsoft-defender-atp/images/atp-ms-secure-score-9.png diff --git a/windows/security/threat-protection/windows-defender-atp/images/atp-ms-secure-score.png b/windows/security/threat-protection/microsoft-defender-atp/images/atp-ms-secure-score.png similarity index 100% rename from windows/security/threat-protection/windows-defender-atp/images/atp-ms-secure-score.png rename to windows/security/threat-protection/microsoft-defender-atp/images/atp-ms-secure-score.png diff --git a/windows/security/threat-protection/windows-defender-atp/images/atp-network-communications-icon.png b/windows/security/threat-protection/microsoft-defender-atp/images/atp-network-communications-icon.png similarity index 100% rename from windows/security/threat-protection/windows-defender-atp/images/atp-network-communications-icon.png rename to windows/security/threat-protection/microsoft-defender-atp/images/atp-network-communications-icon.png diff --git a/windows/security/threat-protection/windows-defender-atp/images/atp-new-alerts-list.png b/windows/security/threat-protection/microsoft-defender-atp/images/atp-new-alerts-list.png similarity index 100% rename from windows/security/threat-protection/windows-defender-atp/images/atp-new-alerts-list.png rename to windows/security/threat-protection/microsoft-defender-atp/images/atp-new-alerts-list.png diff --git a/windows/security/threat-protection/windows-defender-atp/images/atp-new-suppression-rule.png b/windows/security/threat-protection/microsoft-defender-atp/images/atp-new-suppression-rule.png similarity index 100% rename from windows/security/threat-protection/windows-defender-atp/images/atp-new-suppression-rule.png rename to windows/security/threat-protection/microsoft-defender-atp/images/atp-new-suppression-rule.png diff --git a/windows/security/threat-protection/windows-defender-atp/images/atp-no-network-connection.png b/windows/security/threat-protection/microsoft-defender-atp/images/atp-no-network-connection.png similarity index 100% rename from windows/security/threat-protection/windows-defender-atp/images/atp-no-network-connection.png rename to windows/security/threat-protection/microsoft-defender-atp/images/atp-no-network-connection.png diff --git a/windows/security/threat-protection/windows-defender-atp/images/atp-no-subscriptions-found.png b/windows/security/threat-protection/microsoft-defender-atp/images/atp-no-subscriptions-found.png similarity index 100% rename from windows/security/threat-protection/windows-defender-atp/images/atp-no-subscriptions-found.png rename to windows/security/threat-protection/microsoft-defender-atp/images/atp-no-subscriptions-found.png diff --git a/windows/security/threat-protection/windows-defender-atp/images/atp-not-authorized-to-access-portal.png b/windows/security/threat-protection/microsoft-defender-atp/images/atp-not-authorized-to-access-portal.png similarity index 100% rename from windows/security/threat-protection/windows-defender-atp/images/atp-not-authorized-to-access-portal.png rename to windows/security/threat-protection/microsoft-defender-atp/images/atp-not-authorized-to-access-portal.png diff --git a/windows/security/threat-protection/windows-defender-atp/images/atp-notification-action.png b/windows/security/threat-protection/microsoft-defender-atp/images/atp-notification-action.png similarity index 100% rename from windows/security/threat-protection/windows-defender-atp/images/atp-notification-action.png rename to windows/security/threat-protection/microsoft-defender-atp/images/atp-notification-action.png diff --git a/windows/security/threat-protection/windows-defender-atp/images/atp-notification-collect-package.png b/windows/security/threat-protection/microsoft-defender-atp/images/atp-notification-collect-package.png similarity index 100% rename from windows/security/threat-protection/windows-defender-atp/images/atp-notification-collect-package.png rename to windows/security/threat-protection/microsoft-defender-atp/images/atp-notification-collect-package.png diff --git a/windows/security/threat-protection/windows-defender-atp/images/atp-notification-file.png b/windows/security/threat-protection/microsoft-defender-atp/images/atp-notification-file.png similarity index 100% rename from windows/security/threat-protection/windows-defender-atp/images/atp-notification-file.png rename to windows/security/threat-protection/microsoft-defender-atp/images/atp-notification-file.png diff --git a/windows/security/threat-protection/windows-defender-atp/images/atp-notification-isolate.png b/windows/security/threat-protection/microsoft-defender-atp/images/atp-notification-isolate.png similarity index 100% rename from windows/security/threat-protection/windows-defender-atp/images/atp-notification-isolate.png rename to windows/security/threat-protection/microsoft-defender-atp/images/atp-notification-isolate.png diff --git a/windows/security/threat-protection/windows-defender-atp/images/atp-notification-restrict.png b/windows/security/threat-protection/microsoft-defender-atp/images/atp-notification-restrict.png similarity index 100% rename from windows/security/threat-protection/windows-defender-atp/images/atp-notification-restrict.png rename to windows/security/threat-protection/microsoft-defender-atp/images/atp-notification-restrict.png diff --git a/windows/security/threat-protection/windows-defender-atp/images/atp-notifications.png b/windows/security/threat-protection/microsoft-defender-atp/images/atp-notifications.png similarity index 100% rename from windows/security/threat-protection/windows-defender-atp/images/atp-notifications.png rename to windows/security/threat-protection/microsoft-defender-atp/images/atp-notifications.png diff --git a/windows/security/threat-protection/windows-defender-atp/images/atp-observed-in-organization.png b/windows/security/threat-protection/microsoft-defender-atp/images/atp-observed-in-organization.png similarity index 100% rename from windows/security/threat-protection/windows-defender-atp/images/atp-observed-in-organization.png rename to windows/security/threat-protection/microsoft-defender-atp/images/atp-observed-in-organization.png diff --git a/windows/security/threat-protection/windows-defender-atp/images/atp-observed-machines.png b/windows/security/threat-protection/microsoft-defender-atp/images/atp-observed-machines.png similarity index 100% rename from windows/security/threat-protection/windows-defender-atp/images/atp-observed-machines.png rename to windows/security/threat-protection/microsoft-defender-atp/images/atp-observed-machines.png diff --git a/windows/security/threat-protection/windows-defender-atp/images/atp-oma-uri-values.png b/windows/security/threat-protection/microsoft-defender-atp/images/atp-oma-uri-values.png similarity index 100% rename from windows/security/threat-protection/windows-defender-atp/images/atp-oma-uri-values.png rename to windows/security/threat-protection/microsoft-defender-atp/images/atp-oma-uri-values.png diff --git a/windows/security/threat-protection/windows-defender-atp/images/atp-onboard-endpoints-WDATP-portal-border-test.png b/windows/security/threat-protection/microsoft-defender-atp/images/atp-onboard-endpoints-WDATP-portal-border-test.png similarity index 100% rename from windows/security/threat-protection/windows-defender-atp/images/atp-onboard-endpoints-WDATP-portal-border-test.png rename to windows/security/threat-protection/microsoft-defender-atp/images/atp-onboard-endpoints-WDATP-portal-border-test.png diff --git a/windows/security/threat-protection/windows-defender-atp/images/atp-onboard-endpoints-WDATP-portal.png b/windows/security/threat-protection/microsoft-defender-atp/images/atp-onboard-endpoints-WDATP-portal.png similarity index 100% rename from windows/security/threat-protection/windows-defender-atp/images/atp-onboard-endpoints-WDATP-portal.png rename to windows/security/threat-protection/microsoft-defender-atp/images/atp-onboard-endpoints-WDATP-portal.png diff --git a/windows/security/threat-protection/windows-defender-atp/images/atp-onboard-endpoints-run-detection-test.png b/windows/security/threat-protection/microsoft-defender-atp/images/atp-onboard-endpoints-run-detection-test.png similarity index 100% rename from windows/security/threat-protection/windows-defender-atp/images/atp-onboard-endpoints-run-detection-test.png rename to windows/security/threat-protection/microsoft-defender-atp/images/atp-onboard-endpoints-run-detection-test.png diff --git a/windows/security/threat-protection/windows-defender-atp/images/atp-onboard-endpoints.png b/windows/security/threat-protection/microsoft-defender-atp/images/atp-onboard-endpoints.png similarity index 100% rename from windows/security/threat-protection/windows-defender-atp/images/atp-onboard-endpoints.png rename to windows/security/threat-protection/microsoft-defender-atp/images/atp-onboard-endpoints.png diff --git a/windows/security/threat-protection/windows-defender-atp/images/atp-onboard-mdm.png b/windows/security/threat-protection/microsoft-defender-atp/images/atp-onboard-mdm.png similarity index 100% rename from windows/security/threat-protection/windows-defender-atp/images/atp-onboard-mdm.png rename to windows/security/threat-protection/microsoft-defender-atp/images/atp-onboard-mdm.png diff --git a/windows/security/threat-protection/windows-defender-atp/images/atp-org-score.png b/windows/security/threat-protection/microsoft-defender-atp/images/atp-org-score.png similarity index 100% rename from windows/security/threat-protection/windows-defender-atp/images/atp-org-score.png rename to windows/security/threat-protection/microsoft-defender-atp/images/atp-org-score.png diff --git a/windows/security/threat-protection/windows-defender-atp/images/atp-org-sec-score.png b/windows/security/threat-protection/microsoft-defender-atp/images/atp-org-sec-score.png similarity index 100% rename from windows/security/threat-protection/windows-defender-atp/images/atp-org-sec-score.png rename to windows/security/threat-protection/microsoft-defender-atp/images/atp-org-sec-score.png diff --git a/windows/security/threat-protection/windows-defender-atp/images/atp-organization-size.png b/windows/security/threat-protection/microsoft-defender-atp/images/atp-organization-size.png similarity index 100% rename from windows/security/threat-protection/windows-defender-atp/images/atp-organization-size.png rename to windows/security/threat-protection/microsoft-defender-atp/images/atp-organization-size.png diff --git a/windows/security/threat-protection/windows-defender-atp/images/atp-pending-actions-auto-ir.png b/windows/security/threat-protection/microsoft-defender-atp/images/atp-pending-actions-auto-ir.png similarity index 100% rename from windows/security/threat-protection/windows-defender-atp/images/atp-pending-actions-auto-ir.png rename to windows/security/threat-protection/microsoft-defender-atp/images/atp-pending-actions-auto-ir.png diff --git a/windows/security/threat-protection/windows-defender-atp/images/atp-pending-actions-file.png b/windows/security/threat-protection/microsoft-defender-atp/images/atp-pending-actions-file.png similarity index 100% rename from windows/security/threat-protection/windows-defender-atp/images/atp-pending-actions-file.png rename to windows/security/threat-protection/microsoft-defender-atp/images/atp-pending-actions-file.png diff --git a/windows/security/threat-protection/windows-defender-atp/images/atp-pending-actions-list.png b/windows/security/threat-protection/microsoft-defender-atp/images/atp-pending-actions-list.png similarity index 100% rename from windows/security/threat-protection/windows-defender-atp/images/atp-pending-actions-list.png rename to windows/security/threat-protection/microsoft-defender-atp/images/atp-pending-actions-list.png diff --git a/windows/security/threat-protection/windows-defender-atp/images/atp-pending-actions-multiple.png b/windows/security/threat-protection/microsoft-defender-atp/images/atp-pending-actions-multiple.png similarity index 100% rename from windows/security/threat-protection/windows-defender-atp/images/atp-pending-actions-multiple.png rename to windows/security/threat-protection/microsoft-defender-atp/images/atp-pending-actions-multiple.png diff --git a/windows/security/threat-protection/windows-defender-atp/images/atp-pending-actions-notification.png b/windows/security/threat-protection/microsoft-defender-atp/images/atp-pending-actions-notification.png similarity index 100% rename from windows/security/threat-protection/windows-defender-atp/images/atp-pending-actions-notification.png rename to windows/security/threat-protection/microsoft-defender-atp/images/atp-pending-actions-notification.png diff --git a/windows/security/threat-protection/windows-defender-atp/images/atp-permissions-applications.png b/windows/security/threat-protection/microsoft-defender-atp/images/atp-permissions-applications.png similarity index 100% rename from windows/security/threat-protection/windows-defender-atp/images/atp-permissions-applications.png rename to windows/security/threat-protection/microsoft-defender-atp/images/atp-permissions-applications.png diff --git a/windows/security/threat-protection/windows-defender-atp/images/atp-portal-sensor.png b/windows/security/threat-protection/microsoft-defender-atp/images/atp-portal-sensor.png similarity index 100% rename from windows/security/threat-protection/windows-defender-atp/images/atp-portal-sensor.png rename to windows/security/threat-protection/microsoft-defender-atp/images/atp-portal-sensor.png diff --git a/windows/security/threat-protection/windows-defender-atp/images/atp-portal-welcome-screen.png b/windows/security/threat-protection/microsoft-defender-atp/images/atp-portal-welcome-screen.png similarity index 100% rename from windows/security/threat-protection/windows-defender-atp/images/atp-portal-welcome-screen.png rename to windows/security/threat-protection/microsoft-defender-atp/images/atp-portal-welcome-screen.png diff --git a/windows/security/threat-protection/windows-defender-atp/images/atp-portal.png b/windows/security/threat-protection/microsoft-defender-atp/images/atp-portal.png similarity index 100% rename from windows/security/threat-protection/windows-defender-atp/images/atp-portal.png rename to windows/security/threat-protection/microsoft-defender-atp/images/atp-portal.png diff --git a/windows/security/threat-protection/windows-defender-atp/images/atp-powerbi-accept.png b/windows/security/threat-protection/microsoft-defender-atp/images/atp-powerbi-accept.png similarity index 100% rename from windows/security/threat-protection/windows-defender-atp/images/atp-powerbi-accept.png rename to windows/security/threat-protection/microsoft-defender-atp/images/atp-powerbi-accept.png diff --git a/windows/security/threat-protection/windows-defender-atp/images/atp-powerbi-consent.png b/windows/security/threat-protection/microsoft-defender-atp/images/atp-powerbi-consent.png similarity index 100% rename from windows/security/threat-protection/windows-defender-atp/images/atp-powerbi-consent.png rename to windows/security/threat-protection/microsoft-defender-atp/images/atp-powerbi-consent.png diff --git a/windows/security/threat-protection/windows-defender-atp/images/atp-powerbi-extension.png b/windows/security/threat-protection/microsoft-defender-atp/images/atp-powerbi-extension.png similarity index 100% rename from windows/security/threat-protection/windows-defender-atp/images/atp-powerbi-extension.png rename to windows/security/threat-protection/microsoft-defender-atp/images/atp-powerbi-extension.png diff --git a/windows/security/threat-protection/windows-defender-atp/images/atp-powerbi-get-data.png b/windows/security/threat-protection/microsoft-defender-atp/images/atp-powerbi-get-data.png similarity index 100% rename from windows/security/threat-protection/windows-defender-atp/images/atp-powerbi-get-data.png rename to windows/security/threat-protection/microsoft-defender-atp/images/atp-powerbi-get-data.png diff --git a/windows/security/threat-protection/windows-defender-atp/images/atp-powerbi-importing.png b/windows/security/threat-protection/microsoft-defender-atp/images/atp-powerbi-importing.png similarity index 100% rename from windows/security/threat-protection/windows-defender-atp/images/atp-powerbi-importing.png rename to windows/security/threat-protection/microsoft-defender-atp/images/atp-powerbi-importing.png diff --git a/windows/security/threat-protection/windows-defender-atp/images/atp-powerbi-navigator.png b/windows/security/threat-protection/microsoft-defender-atp/images/atp-powerbi-navigator.png similarity index 100% rename from windows/security/threat-protection/windows-defender-atp/images/atp-powerbi-navigator.png rename to windows/security/threat-protection/microsoft-defender-atp/images/atp-powerbi-navigator.png diff --git a/windows/security/threat-protection/windows-defender-atp/images/atp-powerbi-options.png b/windows/security/threat-protection/microsoft-defender-atp/images/atp-powerbi-options.png similarity index 100% rename from windows/security/threat-protection/windows-defender-atp/images/atp-powerbi-options.png rename to windows/security/threat-protection/microsoft-defender-atp/images/atp-powerbi-options.png diff --git a/windows/security/threat-protection/windows-defender-atp/images/atp-powerbi-preview.png b/windows/security/threat-protection/microsoft-defender-atp/images/atp-powerbi-preview.png similarity index 100% rename from windows/security/threat-protection/windows-defender-atp/images/atp-powerbi-preview.png rename to windows/security/threat-protection/microsoft-defender-atp/images/atp-powerbi-preview.png diff --git a/windows/security/threat-protection/windows-defender-atp/images/atp-powershell-command-run-icon.png b/windows/security/threat-protection/microsoft-defender-atp/images/atp-powershell-command-run-icon.png similarity index 100% rename from windows/security/threat-protection/windows-defender-atp/images/atp-powershell-command-run-icon.png rename to windows/security/threat-protection/microsoft-defender-atp/images/atp-powershell-command-run-icon.png diff --git a/windows/security/threat-protection/windows-defender-atp/images/atp-preferences-setup.png b/windows/security/threat-protection/microsoft-defender-atp/images/atp-preferences-setup.png similarity index 100% rename from windows/security/threat-protection/windows-defender-atp/images/atp-preferences-setup.png rename to windows/security/threat-protection/microsoft-defender-atp/images/atp-preferences-setup.png diff --git a/windows/security/threat-protection/windows-defender-atp/images/atp-preview-experience.png b/windows/security/threat-protection/microsoft-defender-atp/images/atp-preview-experience.png similarity index 100% rename from windows/security/threat-protection/windows-defender-atp/images/atp-preview-experience.png rename to windows/security/threat-protection/microsoft-defender-atp/images/atp-preview-experience.png diff --git a/windows/security/threat-protection/windows-defender-atp/images/atp-preview-features.png b/windows/security/threat-protection/microsoft-defender-atp/images/atp-preview-features.png similarity index 100% rename from windows/security/threat-protection/windows-defender-atp/images/atp-preview-features.png rename to windows/security/threat-protection/microsoft-defender-atp/images/atp-preview-features.png diff --git a/windows/security/threat-protection/windows-defender-atp/images/atp-process-event-icon.png b/windows/security/threat-protection/microsoft-defender-atp/images/atp-process-event-icon.png similarity index 100% rename from windows/security/threat-protection/windows-defender-atp/images/atp-process-event-icon.png rename to windows/security/threat-protection/microsoft-defender-atp/images/atp-process-event-icon.png diff --git a/windows/security/threat-protection/windows-defender-atp/images/atp-process-injection.png b/windows/security/threat-protection/microsoft-defender-atp/images/atp-process-injection.png similarity index 100% rename from windows/security/threat-protection/windows-defender-atp/images/atp-process-injection.png rename to windows/security/threat-protection/microsoft-defender-atp/images/atp-process-injection.png diff --git a/windows/security/threat-protection/windows-defender-atp/images/atp-process-tree.png b/windows/security/threat-protection/microsoft-defender-atp/images/atp-process-tree.png similarity index 100% rename from windows/security/threat-protection/windows-defender-atp/images/atp-process-tree.png rename to windows/security/threat-protection/microsoft-defender-atp/images/atp-process-tree.png diff --git a/windows/security/threat-protection/windows-defender-atp/images/atp-refresh-token.png b/windows/security/threat-protection/microsoft-defender-atp/images/atp-refresh-token.png similarity index 100% rename from windows/security/threat-protection/windows-defender-atp/images/atp-refresh-token.png rename to windows/security/threat-protection/microsoft-defender-atp/images/atp-refresh-token.png diff --git a/windows/security/threat-protection/windows-defender-atp/images/atp-region-control-panel.png b/windows/security/threat-protection/microsoft-defender-atp/images/atp-region-control-panel.png similarity index 100% rename from windows/security/threat-protection/windows-defender-atp/images/atp-region-control-panel.png rename to windows/security/threat-protection/microsoft-defender-atp/images/atp-region-control-panel.png diff --git a/windows/security/threat-protection/windows-defender-atp/images/atp-registry-event-icon.png b/windows/security/threat-protection/microsoft-defender-atp/images/atp-registry-event-icon.png similarity index 100% rename from windows/security/threat-protection/windows-defender-atp/images/atp-registry-event-icon.png rename to windows/security/threat-protection/microsoft-defender-atp/images/atp-registry-event-icon.png diff --git a/windows/security/threat-protection/windows-defender-atp/images/atp-remediated-alert.png b/windows/security/threat-protection/microsoft-defender-atp/images/atp-remediated-alert.png similarity index 100% rename from windows/security/threat-protection/windows-defender-atp/images/atp-remediated-alert.png rename to windows/security/threat-protection/microsoft-defender-atp/images/atp-remediated-alert.png diff --git a/windows/security/threat-protection/windows-defender-atp/images/atp-remove-blocked-file.png b/windows/security/threat-protection/microsoft-defender-atp/images/atp-remove-blocked-file.png similarity index 100% rename from windows/security/threat-protection/windows-defender-atp/images/atp-remove-blocked-file.png rename to windows/security/threat-protection/microsoft-defender-atp/images/atp-remove-blocked-file.png diff --git a/windows/security/threat-protection/windows-defender-atp/images/atp-rename-incident.png b/windows/security/threat-protection/microsoft-defender-atp/images/atp-rename-incident.png similarity index 100% rename from windows/security/threat-protection/windows-defender-atp/images/atp-rename-incident.png rename to windows/security/threat-protection/microsoft-defender-atp/images/atp-rename-incident.png diff --git a/windows/security/threat-protection/windows-defender-atp/images/atp-respond-action-icon.png b/windows/security/threat-protection/microsoft-defender-atp/images/atp-respond-action-icon.png similarity index 100% rename from windows/security/threat-protection/windows-defender-atp/images/atp-respond-action-icon.png rename to windows/security/threat-protection/microsoft-defender-atp/images/atp-respond-action-icon.png diff --git a/windows/security/threat-protection/windows-defender-atp/images/atp-restrict-app.png b/windows/security/threat-protection/microsoft-defender-atp/images/atp-restrict-app.png similarity index 100% rename from windows/security/threat-protection/windows-defender-atp/images/atp-restrict-app.png rename to windows/security/threat-protection/microsoft-defender-atp/images/atp-restrict-app.png diff --git a/windows/security/threat-protection/windows-defender-atp/images/atp-run-av-scan.png b/windows/security/threat-protection/microsoft-defender-atp/images/atp-run-av-scan.png similarity index 100% rename from windows/security/threat-protection/windows-defender-atp/images/atp-run-av-scan.png rename to windows/security/threat-protection/microsoft-defender-atp/images/atp-run-av-scan.png diff --git a/windows/security/threat-protection/windows-defender-atp/images/atp-running-script.png b/windows/security/threat-protection/microsoft-defender-atp/images/atp-running-script.png similarity index 100% rename from windows/security/threat-protection/windows-defender-atp/images/atp-running-script.png rename to windows/security/threat-protection/microsoft-defender-atp/images/atp-running-script.png diff --git a/windows/security/threat-protection/windows-defender-atp/images/atp-sample-custom-ti-alert.png b/windows/security/threat-protection/microsoft-defender-atp/images/atp-sample-custom-ti-alert.png similarity index 100% rename from windows/security/threat-protection/windows-defender-atp/images/atp-sample-custom-ti-alert.png rename to windows/security/threat-protection/microsoft-defender-atp/images/atp-sample-custom-ti-alert.png diff --git a/windows/security/threat-protection/windows-defender-atp/images/atp-save-query.png b/windows/security/threat-protection/microsoft-defender-atp/images/atp-save-query.png similarity index 100% rename from windows/security/threat-protection/windows-defender-atp/images/atp-save-query.png rename to windows/security/threat-protection/microsoft-defender-atp/images/atp-save-query.png diff --git a/windows/security/threat-protection/windows-defender-atp/images/atp-save-tag.png b/windows/security/threat-protection/microsoft-defender-atp/images/atp-save-tag.png similarity index 100% rename from windows/security/threat-protection/windows-defender-atp/images/atp-save-tag.png rename to windows/security/threat-protection/microsoft-defender-atp/images/atp-save-tag.png diff --git a/windows/security/threat-protection/windows-defender-atp/images/atp-sec-coverage.png b/windows/security/threat-protection/microsoft-defender-atp/images/atp-sec-coverage.png similarity index 100% rename from windows/security/threat-protection/windows-defender-atp/images/atp-sec-coverage.png rename to windows/security/threat-protection/microsoft-defender-atp/images/atp-sec-coverage.png diff --git a/windows/security/threat-protection/windows-defender-atp/images/atp-sec-ops-1.png b/windows/security/threat-protection/microsoft-defender-atp/images/atp-sec-ops-1.png similarity index 100% rename from windows/security/threat-protection/windows-defender-atp/images/atp-sec-ops-1.png rename to windows/security/threat-protection/microsoft-defender-atp/images/atp-sec-ops-1.png diff --git a/windows/security/threat-protection/windows-defender-atp/images/atp-sec-ops-dashboard.png b/windows/security/threat-protection/microsoft-defender-atp/images/atp-sec-ops-dashboard.png similarity index 100% rename from windows/security/threat-protection/windows-defender-atp/images/atp-sec-ops-dashboard.png rename to windows/security/threat-protection/microsoft-defender-atp/images/atp-sec-ops-dashboard.png diff --git a/windows/security/threat-protection/windows-defender-atp/images/atp-security-analytics-dashboard.png b/windows/security/threat-protection/microsoft-defender-atp/images/atp-security-analytics-dashboard.png similarity index 100% rename from windows/security/threat-protection/windows-defender-atp/images/atp-security-analytics-dashboard.png rename to windows/security/threat-protection/microsoft-defender-atp/images/atp-security-analytics-dashboard.png diff --git a/windows/security/threat-protection/windows-defender-atp/images/atp-security-analytics-view-machines.png b/windows/security/threat-protection/microsoft-defender-atp/images/atp-security-analytics-view-machines.png similarity index 100% rename from windows/security/threat-protection/windows-defender-atp/images/atp-security-analytics-view-machines.png rename to windows/security/threat-protection/microsoft-defender-atp/images/atp-security-analytics-view-machines.png diff --git a/windows/security/threat-protection/windows-defender-atp/images/atp-security-analytics-view-machines2.png b/windows/security/threat-protection/microsoft-defender-atp/images/atp-security-analytics-view-machines2.png similarity index 100% rename from windows/security/threat-protection/windows-defender-atp/images/atp-security-analytics-view-machines2.png rename to windows/security/threat-protection/microsoft-defender-atp/images/atp-security-analytics-view-machines2.png diff --git a/windows/security/threat-protection/windows-defender-atp/images/atp-security-controls-9.png b/windows/security/threat-protection/microsoft-defender-atp/images/atp-security-controls-9.png similarity index 100% rename from windows/security/threat-protection/windows-defender-atp/images/atp-security-controls-9.png rename to windows/security/threat-protection/microsoft-defender-atp/images/atp-security-controls-9.png diff --git a/windows/security/threat-protection/windows-defender-atp/images/atp-security-controls.png b/windows/security/threat-protection/microsoft-defender-atp/images/atp-security-controls.png similarity index 100% rename from windows/security/threat-protection/windows-defender-atp/images/atp-security-controls.png rename to windows/security/threat-protection/microsoft-defender-atp/images/atp-security-controls.png diff --git a/windows/security/threat-protection/windows-defender-atp/images/atp-security-coverage.png b/windows/security/threat-protection/microsoft-defender-atp/images/atp-security-coverage.png similarity index 100% rename from windows/security/threat-protection/windows-defender-atp/images/atp-security-coverage.png rename to windows/security/threat-protection/microsoft-defender-atp/images/atp-security-coverage.png diff --git a/windows/security/threat-protection/windows-defender-atp/images/atp-security-improvements.png b/windows/security/threat-protection/microsoft-defender-atp/images/atp-security-improvements.png similarity index 100% rename from windows/security/threat-protection/windows-defender-atp/images/atp-security-improvements.png rename to windows/security/threat-protection/microsoft-defender-atp/images/atp-security-improvements.png diff --git a/windows/security/threat-protection/windows-defender-atp/images/atp-security-score-over-time-9.png b/windows/security/threat-protection/microsoft-defender-atp/images/atp-security-score-over-time-9.png similarity index 100% rename from windows/security/threat-protection/windows-defender-atp/images/atp-security-score-over-time-9.png rename to windows/security/threat-protection/microsoft-defender-atp/images/atp-security-score-over-time-9.png diff --git a/windows/security/threat-protection/windows-defender-atp/images/atp-security-score-over-time.png b/windows/security/threat-protection/microsoft-defender-atp/images/atp-security-score-over-time.png similarity index 100% rename from windows/security/threat-protection/windows-defender-atp/images/atp-security-score-over-time.png rename to windows/security/threat-protection/microsoft-defender-atp/images/atp-security-score-over-time.png diff --git a/windows/security/threat-protection/windows-defender-atp/images/atp-sensor-filter.png b/windows/security/threat-protection/microsoft-defender-atp/images/atp-sensor-filter.png similarity index 100% rename from windows/security/threat-protection/windows-defender-atp/images/atp-sensor-filter.png rename to windows/security/threat-protection/microsoft-defender-atp/images/atp-sensor-filter.png diff --git a/windows/security/threat-protection/windows-defender-atp/images/atp-sensor-health-filter-resized.png b/windows/security/threat-protection/microsoft-defender-atp/images/atp-sensor-health-filter-resized.png similarity index 100% rename from windows/security/threat-protection/windows-defender-atp/images/atp-sensor-health-filter-resized.png rename to windows/security/threat-protection/microsoft-defender-atp/images/atp-sensor-health-filter-resized.png diff --git a/windows/security/threat-protection/windows-defender-atp/images/atp-sensor-health-filter-tile.png b/windows/security/threat-protection/microsoft-defender-atp/images/atp-sensor-health-filter-tile.png similarity index 100% rename from windows/security/threat-protection/windows-defender-atp/images/atp-sensor-health-filter-tile.png rename to windows/security/threat-protection/microsoft-defender-atp/images/atp-sensor-health-filter-tile.png diff --git a/windows/security/threat-protection/windows-defender-atp/images/atp-sensor-health-filter.png b/windows/security/threat-protection/microsoft-defender-atp/images/atp-sensor-health-filter.png similarity index 100% rename from windows/security/threat-protection/windows-defender-atp/images/atp-sensor-health-filter.png rename to windows/security/threat-protection/microsoft-defender-atp/images/atp-sensor-health-filter.png diff --git a/windows/security/threat-protection/windows-defender-atp/images/atp-sensor-health-nonav.png b/windows/security/threat-protection/microsoft-defender-atp/images/atp-sensor-health-nonav.png similarity index 100% rename from windows/security/threat-protection/windows-defender-atp/images/atp-sensor-health-nonav.png rename to windows/security/threat-protection/microsoft-defender-atp/images/atp-sensor-health-nonav.png diff --git a/windows/security/threat-protection/windows-defender-atp/images/atp-sensor-health-tile.png b/windows/security/threat-protection/microsoft-defender-atp/images/atp-sensor-health-tile.png similarity index 100% rename from windows/security/threat-protection/windows-defender-atp/images/atp-sensor-health-tile.png rename to windows/security/threat-protection/microsoft-defender-atp/images/atp-sensor-health-tile.png diff --git a/windows/security/threat-protection/windows-defender-atp/images/atp-server-offboarding-workspaceid.png b/windows/security/threat-protection/microsoft-defender-atp/images/atp-server-offboarding-workspaceid.png similarity index 100% rename from windows/security/threat-protection/windows-defender-atp/images/atp-server-offboarding-workspaceid.png rename to windows/security/threat-protection/microsoft-defender-atp/images/atp-server-offboarding-workspaceid.png diff --git a/windows/security/threat-protection/windows-defender-atp/images/atp-server-onboarding-workspaceid.png b/windows/security/threat-protection/microsoft-defender-atp/images/atp-server-onboarding-workspaceid.png similarity index 100% rename from windows/security/threat-protection/windows-defender-atp/images/atp-server-onboarding-workspaceid.png rename to windows/security/threat-protection/microsoft-defender-atp/images/atp-server-onboarding-workspaceid.png diff --git a/windows/security/threat-protection/windows-defender-atp/images/atp-server-onboarding.png b/windows/security/threat-protection/microsoft-defender-atp/images/atp-server-onboarding.png similarity index 100% rename from windows/security/threat-protection/windows-defender-atp/images/atp-server-onboarding.png rename to windows/security/threat-protection/microsoft-defender-atp/images/atp-server-onboarding.png diff --git a/windows/security/threat-protection/windows-defender-atp/images/atp-services.png b/windows/security/threat-protection/microsoft-defender-atp/images/atp-services.png similarity index 100% rename from windows/security/threat-protection/windows-defender-atp/images/atp-services.png rename to windows/security/threat-protection/microsoft-defender-atp/images/atp-services.png diff --git a/windows/security/threat-protection/windows-defender-atp/images/atp-settings-aip.png b/windows/security/threat-protection/microsoft-defender-atp/images/atp-settings-aip.png similarity index 100% rename from windows/security/threat-protection/windows-defender-atp/images/atp-settings-aip.png rename to windows/security/threat-protection/microsoft-defender-atp/images/atp-settings-aip.png diff --git a/windows/security/threat-protection/windows-defender-atp/images/atp-settings-powerbi.png b/windows/security/threat-protection/microsoft-defender-atp/images/atp-settings-powerbi.png similarity index 100% rename from windows/security/threat-protection/windows-defender-atp/images/atp-settings-powerbi.png rename to windows/security/threat-protection/microsoft-defender-atp/images/atp-settings-powerbi.png diff --git a/windows/security/threat-protection/windows-defender-atp/images/atp-setup-complete.png b/windows/security/threat-protection/microsoft-defender-atp/images/atp-setup-complete.png similarity index 100% rename from windows/security/threat-protection/windows-defender-atp/images/atp-setup-complete.png rename to windows/security/threat-protection/microsoft-defender-atp/images/atp-setup-complete.png diff --git a/windows/security/threat-protection/windows-defender-atp/images/atp-setup-incomplete.png b/windows/security/threat-protection/microsoft-defender-atp/images/atp-setup-incomplete.png similarity index 100% rename from windows/security/threat-protection/windows-defender-atp/images/atp-setup-incomplete.png rename to windows/security/threat-protection/microsoft-defender-atp/images/atp-setup-incomplete.png diff --git a/windows/security/threat-protection/windows-defender-atp/images/atp-setup-permissions-wdatp-portal.png b/windows/security/threat-protection/microsoft-defender-atp/images/atp-setup-permissions-wdatp-portal.png similarity index 100% rename from windows/security/threat-protection/windows-defender-atp/images/atp-setup-permissions-wdatp-portal.png rename to windows/security/threat-protection/microsoft-defender-atp/images/atp-setup-permissions-wdatp-portal.png diff --git a/windows/security/threat-protection/windows-defender-atp/images/atp-shared-queries.png b/windows/security/threat-protection/microsoft-defender-atp/images/atp-shared-queries.png similarity index 100% rename from windows/security/threat-protection/windows-defender-atp/images/atp-shared-queries.png rename to windows/security/threat-protection/microsoft-defender-atp/images/atp-shared-queries.png diff --git a/windows/security/threat-protection/windows-defender-atp/images/atp-siem-integration.png b/windows/security/threat-protection/microsoft-defender-atp/images/atp-siem-integration.png similarity index 100% rename from windows/security/threat-protection/windows-defender-atp/images/atp-siem-integration.png rename to windows/security/threat-protection/microsoft-defender-atp/images/atp-siem-integration.png diff --git a/windows/security/threat-protection/windows-defender-atp/images/atp-siem-mapping1.png b/windows/security/threat-protection/microsoft-defender-atp/images/atp-siem-mapping1.png similarity index 100% rename from windows/security/threat-protection/windows-defender-atp/images/atp-siem-mapping1.png rename to windows/security/threat-protection/microsoft-defender-atp/images/atp-siem-mapping1.png diff --git a/windows/security/threat-protection/windows-defender-atp/images/atp-siem-mapping13.png b/windows/security/threat-protection/microsoft-defender-atp/images/atp-siem-mapping13.png similarity index 100% rename from windows/security/threat-protection/windows-defender-atp/images/atp-siem-mapping13.png rename to windows/security/threat-protection/microsoft-defender-atp/images/atp-siem-mapping13.png diff --git a/windows/security/threat-protection/windows-defender-atp/images/atp-siem-mapping2.png b/windows/security/threat-protection/microsoft-defender-atp/images/atp-siem-mapping2.png similarity index 100% rename from windows/security/threat-protection/windows-defender-atp/images/atp-siem-mapping2.png rename to windows/security/threat-protection/microsoft-defender-atp/images/atp-siem-mapping2.png diff --git a/windows/security/threat-protection/windows-defender-atp/images/atp-siem-mapping3.png b/windows/security/threat-protection/microsoft-defender-atp/images/atp-siem-mapping3.png similarity index 100% rename from windows/security/threat-protection/windows-defender-atp/images/atp-siem-mapping3.png rename to windows/security/threat-protection/microsoft-defender-atp/images/atp-siem-mapping3.png diff --git a/windows/security/threat-protection/windows-defender-atp/images/atp-siem-mapping4.png b/windows/security/threat-protection/microsoft-defender-atp/images/atp-siem-mapping4.png similarity index 100% rename from windows/security/threat-protection/windows-defender-atp/images/atp-siem-mapping4.png rename to windows/security/threat-protection/microsoft-defender-atp/images/atp-siem-mapping4.png diff --git a/windows/security/threat-protection/windows-defender-atp/images/atp-signer-icon.png b/windows/security/threat-protection/microsoft-defender-atp/images/atp-signer-icon.png similarity index 100% rename from windows/security/threat-protection/windows-defender-atp/images/atp-signer-icon.png rename to windows/security/threat-protection/microsoft-defender-atp/images/atp-signer-icon.png diff --git a/windows/security/threat-protection/windows-defender-atp/images/atp-simulate-custom-ti.png b/windows/security/threat-protection/microsoft-defender-atp/images/atp-simulate-custom-ti.png similarity index 100% rename from windows/security/threat-protection/windows-defender-atp/images/atp-simulate-custom-ti.png rename to windows/security/threat-protection/microsoft-defender-atp/images/atp-simulate-custom-ti.png diff --git a/windows/security/threat-protection/windows-defender-atp/images/atp-stop-quarantine-file.png b/windows/security/threat-protection/microsoft-defender-atp/images/atp-stop-quarantine-file.png similarity index 100% rename from windows/security/threat-protection/windows-defender-atp/images/atp-stop-quarantine-file.png rename to windows/security/threat-protection/microsoft-defender-atp/images/atp-stop-quarantine-file.png diff --git a/windows/security/threat-protection/windows-defender-atp/images/atp-stop-quarantine.png b/windows/security/threat-protection/microsoft-defender-atp/images/atp-stop-quarantine.png similarity index 100% rename from windows/security/threat-protection/windows-defender-atp/images/atp-stop-quarantine.png rename to windows/security/threat-protection/microsoft-defender-atp/images/atp-stop-quarantine.png diff --git a/windows/security/threat-protection/windows-defender-atp/images/atp-stopnquarantine-file.png b/windows/security/threat-protection/microsoft-defender-atp/images/atp-stopnquarantine-file.png similarity index 100% rename from windows/security/threat-protection/windows-defender-atp/images/atp-stopnquarantine-file.png rename to windows/security/threat-protection/microsoft-defender-atp/images/atp-stopnquarantine-file.png diff --git a/windows/security/threat-protection/windows-defender-atp/images/atp-subscription-expired.png b/windows/security/threat-protection/microsoft-defender-atp/images/atp-subscription-expired.png similarity index 100% rename from windows/security/threat-protection/windows-defender-atp/images/atp-subscription-expired.png rename to windows/security/threat-protection/microsoft-defender-atp/images/atp-subscription-expired.png diff --git a/windows/security/threat-protection/windows-defender-atp/images/atp-suppression-rules.png b/windows/security/threat-protection/microsoft-defender-atp/images/atp-suppression-rules.png similarity index 100% rename from windows/security/threat-protection/windows-defender-atp/images/atp-suppression-rules.png rename to windows/security/threat-protection/microsoft-defender-atp/images/atp-suppression-rules.png diff --git a/windows/security/threat-protection/windows-defender-atp/images/atp-suspicious-activities-tile.png b/windows/security/threat-protection/microsoft-defender-atp/images/atp-suspicious-activities-tile.png similarity index 100% rename from windows/security/threat-protection/windows-defender-atp/images/atp-suspicious-activities-tile.png rename to windows/security/threat-protection/microsoft-defender-atp/images/atp-suspicious-activities-tile.png diff --git a/windows/security/threat-protection/windows-defender-atp/images/atp-tag-management.png b/windows/security/threat-protection/microsoft-defender-atp/images/atp-tag-management.png similarity index 100% rename from windows/security/threat-protection/windows-defender-atp/images/atp-tag-management.png rename to windows/security/threat-protection/microsoft-defender-atp/images/atp-tag-management.png diff --git a/windows/security/threat-protection/windows-defender-atp/images/atp-task-manager.png b/windows/security/threat-protection/microsoft-defender-atp/images/atp-task-manager.png similarity index 100% rename from windows/security/threat-protection/windows-defender-atp/images/atp-task-manager.png rename to windows/security/threat-protection/microsoft-defender-atp/images/atp-task-manager.png diff --git a/windows/security/threat-protection/windows-defender-atp/images/atp-threat-intel-api.png b/windows/security/threat-protection/microsoft-defender-atp/images/atp-threat-intel-api.png similarity index 100% rename from windows/security/threat-protection/windows-defender-atp/images/atp-threat-intel-api.png rename to windows/security/threat-protection/microsoft-defender-atp/images/atp-threat-intel-api.png diff --git a/windows/security/threat-protection/windows-defender-atp/images/atp-threat-protection-reports.png b/windows/security/threat-protection/microsoft-defender-atp/images/atp-threat-protection-reports.png similarity index 100% rename from windows/security/threat-protection/windows-defender-atp/images/atp-threat-protection-reports.png rename to windows/security/threat-protection/microsoft-defender-atp/images/atp-threat-protection-reports.png diff --git a/windows/security/threat-protection/windows-defender-atp/images/atp-thunderbolt-icon.png b/windows/security/threat-protection/microsoft-defender-atp/images/atp-thunderbolt-icon.png similarity index 100% rename from windows/security/threat-protection/windows-defender-atp/images/atp-thunderbolt-icon.png rename to windows/security/threat-protection/microsoft-defender-atp/images/atp-thunderbolt-icon.png diff --git a/windows/security/threat-protection/windows-defender-atp/images/atp-tile-sensor-health.png b/windows/security/threat-protection/microsoft-defender-atp/images/atp-tile-sensor-health.png similarity index 100% rename from windows/security/threat-protection/windows-defender-atp/images/atp-tile-sensor-health.png rename to windows/security/threat-protection/microsoft-defender-atp/images/atp-tile-sensor-health.png diff --git a/windows/security/threat-protection/windows-defender-atp/images/atp-time-zone.png b/windows/security/threat-protection/microsoft-defender-atp/images/atp-time-zone.png similarity index 100% rename from windows/security/threat-protection/windows-defender-atp/images/atp-time-zone.png rename to windows/security/threat-protection/microsoft-defender-atp/images/atp-time-zone.png diff --git a/windows/security/threat-protection/windows-defender-atp/images/atp-undo-isolation.png b/windows/security/threat-protection/microsoft-defender-atp/images/atp-undo-isolation.png similarity index 100% rename from windows/security/threat-protection/windows-defender-atp/images/atp-undo-isolation.png rename to windows/security/threat-protection/microsoft-defender-atp/images/atp-undo-isolation.png diff --git a/windows/security/threat-protection/windows-defender-atp/images/atp-unsigned-file-icon.png b/windows/security/threat-protection/microsoft-defender-atp/images/atp-unsigned-file-icon.png similarity index 100% rename from windows/security/threat-protection/windows-defender-atp/images/atp-unsigned-file-icon.png rename to windows/security/threat-protection/microsoft-defender-atp/images/atp-unsigned-file-icon.png diff --git a/windows/security/threat-protection/windows-defender-atp/images/atp-user-details-pane.png b/windows/security/threat-protection/microsoft-defender-atp/images/atp-user-details-pane.png similarity index 100% rename from windows/security/threat-protection/windows-defender-atp/images/atp-user-details-pane.png rename to windows/security/threat-protection/microsoft-defender-atp/images/atp-user-details-pane.png diff --git a/windows/security/threat-protection/windows-defender-atp/images/atp-user-details-view-azureatp.png b/windows/security/threat-protection/microsoft-defender-atp/images/atp-user-details-view-azureatp.png similarity index 100% rename from windows/security/threat-protection/windows-defender-atp/images/atp-user-details-view-azureatp.png rename to windows/security/threat-protection/microsoft-defender-atp/images/atp-user-details-view-azureatp.png diff --git a/windows/security/threat-protection/windows-defender-atp/images/atp-user-details-view-tdp.png b/windows/security/threat-protection/microsoft-defender-atp/images/atp-user-details-view-tdp.png similarity index 100% rename from windows/security/threat-protection/windows-defender-atp/images/atp-user-details-view-tdp.png rename to windows/security/threat-protection/microsoft-defender-atp/images/atp-user-details-view-tdp.png diff --git a/windows/security/threat-protection/windows-defender-atp/images/atp-user-details-view.png b/windows/security/threat-protection/microsoft-defender-atp/images/atp-user-details-view.png similarity index 100% rename from windows/security/threat-protection/windows-defender-atp/images/atp-user-details-view.png rename to windows/security/threat-protection/microsoft-defender-atp/images/atp-user-details-view.png diff --git a/windows/security/threat-protection/windows-defender-atp/images/atp-user-details.png b/windows/security/threat-protection/microsoft-defender-atp/images/atp-user-details.png similarity index 100% rename from windows/security/threat-protection/windows-defender-atp/images/atp-user-details.png rename to windows/security/threat-protection/microsoft-defender-atp/images/atp-user-details.png diff --git a/windows/security/threat-protection/windows-defender-atp/images/atp-user-view-ata.png b/windows/security/threat-protection/microsoft-defender-atp/images/atp-user-view-ata.png similarity index 100% rename from windows/security/threat-protection/windows-defender-atp/images/atp-user-view-ata.png rename to windows/security/threat-protection/microsoft-defender-atp/images/atp-user-view-ata.png diff --git a/windows/security/threat-protection/windows-defender-atp/images/atp-users-at-risk.png b/windows/security/threat-protection/microsoft-defender-atp/images/atp-users-at-risk.png similarity index 100% rename from windows/security/threat-protection/windows-defender-atp/images/atp-users-at-risk.png rename to windows/security/threat-protection/microsoft-defender-atp/images/atp-users-at-risk.png diff --git a/windows/security/threat-protection/windows-defender-atp/images/atp-verify-passive-mode.png b/windows/security/threat-protection/microsoft-defender-atp/images/atp-verify-passive-mode.png similarity index 100% rename from windows/security/threat-protection/windows-defender-atp/images/atp-verify-passive-mode.png rename to windows/security/threat-protection/microsoft-defender-atp/images/atp-verify-passive-mode.png diff --git a/windows/security/threat-protection/windows-defender-atp/images/atp-windows-cloud-instance-creation.png b/windows/security/threat-protection/microsoft-defender-atp/images/atp-windows-cloud-instance-creation.png similarity index 100% rename from windows/security/threat-protection/windows-defender-atp/images/atp-windows-cloud-instance-creation.png rename to windows/security/threat-protection/microsoft-defender-atp/images/atp-windows-cloud-instance-creation.png diff --git a/windows/security/threat-protection/windows-defender-atp/images/atp-windows-defender-av-events-icon.png b/windows/security/threat-protection/microsoft-defender-atp/images/atp-windows-defender-av-events-icon.png similarity index 100% rename from windows/security/threat-protection/windows-defender-atp/images/atp-windows-defender-av-events-icon.png rename to windows/security/threat-protection/microsoft-defender-atp/images/atp-windows-defender-av-events-icon.png diff --git a/windows/security/threat-protection/windows-defender-atp/images/atp.png b/windows/security/threat-protection/microsoft-defender-atp/images/atp.png similarity index 100% rename from windows/security/threat-protection/windows-defender-atp/images/atp.png rename to windows/security/threat-protection/microsoft-defender-atp/images/atp.png diff --git a/windows/security/threat-protection/windows-defender-atp/images/azure-data-discovery.png b/windows/security/threat-protection/microsoft-defender-atp/images/azure-data-discovery.png similarity index 100% rename from windows/security/threat-protection/windows-defender-atp/images/azure-data-discovery.png rename to windows/security/threat-protection/microsoft-defender-atp/images/azure-data-discovery.png diff --git a/windows/security/threat-protection/windows-defender-atp/images/cloud-apps.png b/windows/security/threat-protection/microsoft-defender-atp/images/cloud-apps.png similarity index 100% rename from windows/security/threat-protection/windows-defender-atp/images/cloud-apps.png rename to windows/security/threat-protection/microsoft-defender-atp/images/cloud-apps.png diff --git a/windows/security/threat-protection/windows-defender-atp/images/cloud-discovery.png b/windows/security/threat-protection/microsoft-defender-atp/images/cloud-discovery.png similarity index 100% rename from windows/security/threat-protection/windows-defender-atp/images/cloud-discovery.png rename to windows/security/threat-protection/microsoft-defender-atp/images/cloud-discovery.png diff --git a/windows/security/threat-protection/windows-defender-atp/images/components.png b/windows/security/threat-protection/microsoft-defender-atp/images/components.png similarity index 100% rename from windows/security/threat-protection/windows-defender-atp/images/components.png rename to windows/security/threat-protection/microsoft-defender-atp/images/components.png diff --git a/windows/security/threat-protection/windows-defender-atp/images/creating-account.png b/windows/security/threat-protection/microsoft-defender-atp/images/creating-account.png similarity index 100% rename from windows/security/threat-protection/windows-defender-atp/images/creating-account.png rename to windows/security/threat-protection/microsoft-defender-atp/images/creating-account.png diff --git a/windows/security/threat-protection/windows-defender-atp/images/dashboard.png b/windows/security/threat-protection/microsoft-defender-atp/images/dashboard.png similarity index 100% rename from windows/security/threat-protection/windows-defender-atp/images/dashboard.png rename to windows/security/threat-protection/microsoft-defender-atp/images/dashboard.png diff --git a/windows/security/threat-protection/windows-defender-atp/images/detection-icon.png b/windows/security/threat-protection/microsoft-defender-atp/images/detection-icon.png similarity index 100% rename from windows/security/threat-protection/windows-defender-atp/images/detection-icon.png rename to windows/security/threat-protection/microsoft-defender-atp/images/detection-icon.png diff --git a/windows/security/threat-protection/windows-defender-atp/images/enable_siem.png b/windows/security/threat-protection/microsoft-defender-atp/images/enable_siem.png similarity index 100% rename from windows/security/threat-protection/windows-defender-atp/images/enable_siem.png rename to windows/security/threat-protection/microsoft-defender-atp/images/enable_siem.png diff --git a/windows/security/threat-protection/windows-defender-atp/images/filter-log.png b/windows/security/threat-protection/microsoft-defender-atp/images/filter-log.png similarity index 100% rename from windows/security/threat-protection/windows-defender-atp/images/filter-log.png rename to windows/security/threat-protection/microsoft-defender-atp/images/filter-log.png diff --git a/windows/security/threat-protection/windows-defender-atp/images/io.png b/windows/security/threat-protection/microsoft-defender-atp/images/io.png similarity index 100% rename from windows/security/threat-protection/windows-defender-atp/images/io.png rename to windows/security/threat-protection/microsoft-defender-atp/images/io.png diff --git a/windows/security/threat-protection/windows-defender-atp/images/licensing-windows-defender-advanced-threat-protection.png b/windows/security/threat-protection/microsoft-defender-atp/images/licensing-windows-defender-advanced-threat-protection.png similarity index 100% rename from windows/security/threat-protection/windows-defender-atp/images/licensing-windows-defender-advanced-threat-protection.png rename to windows/security/threat-protection/microsoft-defender-atp/images/licensing-windows-defender-advanced-threat-protection.png diff --git a/windows/security/threat-protection/windows-defender-atp/images/machine-reports.png b/windows/security/threat-protection/microsoft-defender-atp/images/machine-reports.png similarity index 100% rename from windows/security/threat-protection/windows-defender-atp/images/machine-reports.png rename to windows/security/threat-protection/microsoft-defender-atp/images/machine-reports.png diff --git a/windows/security/threat-protection/windows-defender-atp/images/machines-active-threats-tile.png b/windows/security/threat-protection/microsoft-defender-atp/images/machines-active-threats-tile.png similarity index 100% rename from windows/security/threat-protection/windows-defender-atp/images/machines-active-threats-tile.png rename to windows/security/threat-protection/microsoft-defender-atp/images/machines-active-threats-tile.png diff --git a/windows/security/threat-protection/windows-defender-atp/images/machines-at-risk-tile.png b/windows/security/threat-protection/microsoft-defender-atp/images/machines-at-risk-tile.png similarity index 100% rename from windows/security/threat-protection/windows-defender-atp/images/machines-at-risk-tile.png rename to windows/security/threat-protection/microsoft-defender-atp/images/machines-at-risk-tile.png diff --git a/windows/security/threat-protection/windows-defender-atp/images/machines-at-risk.png b/windows/security/threat-protection/microsoft-defender-atp/images/machines-at-risk.png similarity index 100% rename from windows/security/threat-protection/windows-defender-atp/images/machines-at-risk.png rename to windows/security/threat-protection/microsoft-defender-atp/images/machines-at-risk.png diff --git a/windows/security/threat-protection/windows-defender-atp/images/machines-list.png b/windows/security/threat-protection/microsoft-defender-atp/images/machines-list.png similarity index 100% rename from windows/security/threat-protection/windows-defender-atp/images/machines-list.png rename to windows/security/threat-protection/microsoft-defender-atp/images/machines-list.png diff --git a/windows/security/threat-protection/windows-defender-atp/images/machines-reporting-tile.png b/windows/security/threat-protection/microsoft-defender-atp/images/machines-reporting-tile.png similarity index 100% rename from windows/security/threat-protection/windows-defender-atp/images/machines-reporting-tile.png rename to windows/security/threat-protection/microsoft-defender-atp/images/machines-reporting-tile.png diff --git a/windows/security/threat-protection/windows-defender-atp/images/menu-icon.png b/windows/security/threat-protection/microsoft-defender-atp/images/menu-icon.png similarity index 100% rename from windows/security/threat-protection/windows-defender-atp/images/menu-icon.png rename to windows/security/threat-protection/microsoft-defender-atp/images/menu-icon.png diff --git a/windows/security/threat-protection/windows-defender-atp/images/ms-flow-choose-action.png b/windows/security/threat-protection/microsoft-defender-atp/images/ms-flow-choose-action.png similarity index 100% rename from windows/security/threat-protection/windows-defender-atp/images/ms-flow-choose-action.png rename to windows/security/threat-protection/microsoft-defender-atp/images/ms-flow-choose-action.png diff --git a/windows/security/threat-protection/windows-defender-atp/images/ms-flow-define-action.png b/windows/security/threat-protection/microsoft-defender-atp/images/ms-flow-define-action.png similarity index 100% rename from windows/security/threat-protection/windows-defender-atp/images/ms-flow-define-action.png rename to windows/security/threat-protection/microsoft-defender-atp/images/ms-flow-define-action.png diff --git a/windows/security/threat-protection/windows-defender-atp/images/ms-flow-e2e.png b/windows/security/threat-protection/microsoft-defender-atp/images/ms-flow-e2e.png similarity index 100% rename from windows/security/threat-protection/windows-defender-atp/images/ms-flow-e2e.png rename to windows/security/threat-protection/microsoft-defender-atp/images/ms-flow-e2e.png diff --git a/windows/security/threat-protection/windows-defender-atp/images/ms-flow-insert-db.png b/windows/security/threat-protection/microsoft-defender-atp/images/ms-flow-insert-db.png similarity index 100% rename from windows/security/threat-protection/windows-defender-atp/images/ms-flow-insert-db.png rename to windows/security/threat-protection/microsoft-defender-atp/images/ms-flow-insert-db.png diff --git a/windows/security/threat-protection/windows-defender-atp/images/ms-flow-parse-json.png b/windows/security/threat-protection/microsoft-defender-atp/images/ms-flow-parse-json.png similarity index 100% rename from windows/security/threat-protection/windows-defender-atp/images/ms-flow-parse-json.png rename to windows/security/threat-protection/microsoft-defender-atp/images/ms-flow-parse-json.png diff --git a/windows/security/threat-protection/windows-defender-atp/images/ms-flow-read-db.png b/windows/security/threat-protection/microsoft-defender-atp/images/ms-flow-read-db.png similarity index 100% rename from windows/security/threat-protection/windows-defender-atp/images/ms-flow-read-db.png rename to windows/security/threat-protection/microsoft-defender-atp/images/ms-flow-read-db.png diff --git a/windows/security/threat-protection/windows-defender-atp/images/mss.png b/windows/security/threat-protection/microsoft-defender-atp/images/mss.png similarity index 100% rename from windows/security/threat-protection/windows-defender-atp/images/mss.png rename to windows/security/threat-protection/microsoft-defender-atp/images/mss.png diff --git a/windows/security/threat-protection/windows-defender-atp/images/nativeapp-add-permission.png b/windows/security/threat-protection/microsoft-defender-atp/images/nativeapp-add-permission.png similarity index 100% rename from windows/security/threat-protection/windows-defender-atp/images/nativeapp-add-permission.png rename to windows/security/threat-protection/microsoft-defender-atp/images/nativeapp-add-permission.png diff --git a/windows/security/threat-protection/windows-defender-atp/images/nativeapp-add-permissions-end.png b/windows/security/threat-protection/microsoft-defender-atp/images/nativeapp-add-permissions-end.png similarity index 100% rename from windows/security/threat-protection/windows-defender-atp/images/nativeapp-add-permissions-end.png rename to windows/security/threat-protection/microsoft-defender-atp/images/nativeapp-add-permissions-end.png diff --git a/windows/security/threat-protection/windows-defender-atp/images/nativeapp-create.png b/windows/security/threat-protection/microsoft-defender-atp/images/nativeapp-create.png similarity index 100% rename from windows/security/threat-protection/windows-defender-atp/images/nativeapp-create.png rename to windows/security/threat-protection/microsoft-defender-atp/images/nativeapp-create.png diff --git a/windows/security/threat-protection/windows-defender-atp/images/nativeapp-decoded-token.png b/windows/security/threat-protection/microsoft-defender-atp/images/nativeapp-decoded-token.png similarity index 100% rename from windows/security/threat-protection/windows-defender-atp/images/nativeapp-decoded-token.png rename to windows/security/threat-protection/microsoft-defender-atp/images/nativeapp-decoded-token.png diff --git a/windows/security/threat-protection/windows-defender-atp/images/nativeapp-get-appid.png b/windows/security/threat-protection/microsoft-defender-atp/images/nativeapp-get-appid.png similarity index 100% rename from windows/security/threat-protection/windows-defender-atp/images/nativeapp-get-appid.png rename to windows/security/threat-protection/microsoft-defender-atp/images/nativeapp-get-appid.png diff --git a/windows/security/threat-protection/windows-defender-atp/images/nativeapp-select-permissions.png b/windows/security/threat-protection/microsoft-defender-atp/images/nativeapp-select-permissions.png similarity index 100% rename from windows/security/threat-protection/windows-defender-atp/images/nativeapp-select-permissions.png rename to windows/security/threat-protection/microsoft-defender-atp/images/nativeapp-select-permissions.png diff --git a/windows/security/threat-protection/windows-defender-atp/images/new-secure-score-dashboard.png b/windows/security/threat-protection/microsoft-defender-atp/images/new-secure-score-dashboard.png similarity index 100% rename from windows/security/threat-protection/windows-defender-atp/images/new-secure-score-dashboard.png rename to windows/security/threat-protection/microsoft-defender-atp/images/new-secure-score-dashboard.png diff --git a/windows/security/threat-protection/windows-defender-atp/images/new-ssot.png b/windows/security/threat-protection/microsoft-defender-atp/images/new-ssot.png similarity index 100% rename from windows/security/threat-protection/windows-defender-atp/images/new-ssot.png rename to windows/security/threat-protection/microsoft-defender-atp/images/new-ssot.png diff --git a/windows/security/threat-protection/windows-defender-atp/images/no-threats-found.png b/windows/security/threat-protection/microsoft-defender-atp/images/no-threats-found.png similarity index 100% rename from windows/security/threat-protection/windows-defender-atp/images/no-threats-found.png rename to windows/security/threat-protection/microsoft-defender-atp/images/no-threats-found.png diff --git a/windows/security/threat-protection/windows-defender-atp/images/no_threats_found.png b/windows/security/threat-protection/microsoft-defender-atp/images/no_threats_found.png similarity index 100% rename from windows/security/threat-protection/windows-defender-atp/images/no_threats_found.png rename to windows/security/threat-protection/microsoft-defender-atp/images/no_threats_found.png diff --git a/windows/security/threat-protection/windows-defender-atp/images/not-remediated-icon.png b/windows/security/threat-protection/microsoft-defender-atp/images/not-remediated-icon.png similarity index 100% rename from windows/security/threat-protection/windows-defender-atp/images/not-remediated-icon.png rename to windows/security/threat-protection/microsoft-defender-atp/images/not-remediated-icon.png diff --git a/windows/security/threat-protection/windows-defender-atp/images/office-scc-label.png b/windows/security/threat-protection/microsoft-defender-atp/images/office-scc-label.png similarity index 100% rename from windows/security/threat-protection/windows-defender-atp/images/office-scc-label.png rename to windows/security/threat-protection/microsoft-defender-atp/images/office-scc-label.png diff --git a/windows/security/threat-protection/windows-defender-atp/images/overview.png b/windows/security/threat-protection/microsoft-defender-atp/images/overview.png similarity index 100% rename from windows/security/threat-protection/windows-defender-atp/images/overview.png rename to windows/security/threat-protection/microsoft-defender-atp/images/overview.png diff --git a/windows/security/threat-protection/windows-defender-atp/images/partially-investigated.png b/windows/security/threat-protection/microsoft-defender-atp/images/partially-investigated.png similarity index 100% rename from windows/security/threat-protection/windows-defender-atp/images/partially-investigated.png rename to windows/security/threat-protection/microsoft-defender-atp/images/partially-investigated.png diff --git a/windows/security/threat-protection/windows-defender-atp/images/partially_investigated.png b/windows/security/threat-protection/microsoft-defender-atp/images/partially_investigated.png similarity index 100% rename from windows/security/threat-protection/windows-defender-atp/images/partially_investigated.png rename to windows/security/threat-protection/microsoft-defender-atp/images/partially_investigated.png diff --git a/windows/security/threat-protection/windows-defender-atp/images/partially_remediated.png b/windows/security/threat-protection/microsoft-defender-atp/images/partially_remediated.png similarity index 100% rename from windows/security/threat-protection/windows-defender-atp/images/partially_remediated.png rename to windows/security/threat-protection/microsoft-defender-atp/images/partially_remediated.png diff --git a/windows/security/threat-protection/windows-defender-atp/images/power-bi-create-advanced-query.png b/windows/security/threat-protection/microsoft-defender-atp/images/power-bi-create-advanced-query.png similarity index 100% rename from windows/security/threat-protection/windows-defender-atp/images/power-bi-create-advanced-query.png rename to windows/security/threat-protection/microsoft-defender-atp/images/power-bi-create-advanced-query.png diff --git a/windows/security/threat-protection/windows-defender-atp/images/power-bi-create-blank-query.png b/windows/security/threat-protection/microsoft-defender-atp/images/power-bi-create-blank-query.png similarity index 100% rename from windows/security/threat-protection/windows-defender-atp/images/power-bi-create-blank-query.png rename to windows/security/threat-protection/microsoft-defender-atp/images/power-bi-create-blank-query.png diff --git a/windows/security/threat-protection/windows-defender-atp/images/power-bi-edit-credentials.png b/windows/security/threat-protection/microsoft-defender-atp/images/power-bi-edit-credentials.png similarity index 100% rename from windows/security/threat-protection/windows-defender-atp/images/power-bi-edit-credentials.png rename to windows/security/threat-protection/microsoft-defender-atp/images/power-bi-edit-credentials.png diff --git a/windows/security/threat-protection/windows-defender-atp/images/power-bi-edit-data-privacy.png b/windows/security/threat-protection/microsoft-defender-atp/images/power-bi-edit-data-privacy.png similarity index 100% rename from windows/security/threat-protection/windows-defender-atp/images/power-bi-edit-data-privacy.png rename to windows/security/threat-protection/microsoft-defender-atp/images/power-bi-edit-data-privacy.png diff --git a/windows/security/threat-protection/windows-defender-atp/images/power-bi-open-advanced-editor.png b/windows/security/threat-protection/microsoft-defender-atp/images/power-bi-open-advanced-editor.png similarity index 100% rename from windows/security/threat-protection/windows-defender-atp/images/power-bi-open-advanced-editor.png rename to windows/security/threat-protection/microsoft-defender-atp/images/power-bi-open-advanced-editor.png diff --git a/windows/security/threat-protection/windows-defender-atp/images/power-bi-query-results.png b/windows/security/threat-protection/microsoft-defender-atp/images/power-bi-query-results.png similarity index 100% rename from windows/security/threat-protection/windows-defender-atp/images/power-bi-query-results.png rename to windows/security/threat-protection/microsoft-defender-atp/images/power-bi-query-results.png diff --git a/windows/security/threat-protection/windows-defender-atp/images/power-bi-set-credentials-anonymous.png b/windows/security/threat-protection/microsoft-defender-atp/images/power-bi-set-credentials-anonymous.png similarity index 100% rename from windows/security/threat-protection/windows-defender-atp/images/power-bi-set-credentials-anonymous.png rename to windows/security/threat-protection/microsoft-defender-atp/images/power-bi-set-credentials-anonymous.png diff --git a/windows/security/threat-protection/windows-defender-atp/images/power-bi-set-credentials-organizational-cont.png b/windows/security/threat-protection/microsoft-defender-atp/images/power-bi-set-credentials-organizational-cont.png similarity index 100% rename from windows/security/threat-protection/windows-defender-atp/images/power-bi-set-credentials-organizational-cont.png rename to windows/security/threat-protection/microsoft-defender-atp/images/power-bi-set-credentials-organizational-cont.png diff --git a/windows/security/threat-protection/windows-defender-atp/images/power-bi-set-credentials-organizational.png b/windows/security/threat-protection/microsoft-defender-atp/images/power-bi-set-credentials-organizational.png similarity index 100% rename from windows/security/threat-protection/windows-defender-atp/images/power-bi-set-credentials-organizational.png rename to windows/security/threat-protection/microsoft-defender-atp/images/power-bi-set-credentials-organizational.png diff --git a/windows/security/threat-protection/windows-defender-atp/images/power-bi-set-data-privacy.png b/windows/security/threat-protection/microsoft-defender-atp/images/power-bi-set-data-privacy.png similarity index 100% rename from windows/security/threat-protection/windows-defender-atp/images/power-bi-set-data-privacy.png rename to windows/security/threat-protection/microsoft-defender-atp/images/power-bi-set-data-privacy.png diff --git a/windows/security/threat-protection/windows-defender-atp/images/remediated-icon.png b/windows/security/threat-protection/microsoft-defender-atp/images/remediated-icon.png similarity index 100% rename from windows/security/threat-protection/windows-defender-atp/images/remediated-icon.png rename to windows/security/threat-protection/microsoft-defender-atp/images/remediated-icon.png diff --git a/windows/security/threat-protection/windows-defender-atp/images/rules-legend.png b/windows/security/threat-protection/microsoft-defender-atp/images/rules-legend.png similarity index 100% rename from windows/security/threat-protection/windows-defender-atp/images/rules-legend.png rename to windows/security/threat-protection/microsoft-defender-atp/images/rules-legend.png diff --git a/windows/security/threat-protection/windows-defender-atp/images/run-as-admin.png b/windows/security/threat-protection/microsoft-defender-atp/images/run-as-admin.png similarity index 100% rename from windows/security/threat-protection/windows-defender-atp/images/run-as-admin.png rename to windows/security/threat-protection/microsoft-defender-atp/images/run-as-admin.png diff --git a/windows/security/threat-protection/windows-defender-atp/images/save-query.png b/windows/security/threat-protection/microsoft-defender-atp/images/save-query.png similarity index 100% rename from windows/security/threat-protection/windows-defender-atp/images/save-query.png rename to windows/security/threat-protection/microsoft-defender-atp/images/save-query.png diff --git a/windows/security/threat-protection/windows-defender-atp/images/sccm-deployment.png b/windows/security/threat-protection/microsoft-defender-atp/images/sccm-deployment.png similarity index 100% rename from windows/security/threat-protection/windows-defender-atp/images/sccm-deployment.png rename to windows/security/threat-protection/microsoft-defender-atp/images/sccm-deployment.png diff --git a/windows/security/threat-protection/windows-defender-atp/images/sec-ops-dashboard.png b/windows/security/threat-protection/microsoft-defender-atp/images/sec-ops-dashboard.png similarity index 100% rename from windows/security/threat-protection/windows-defender-atp/images/sec-ops-dashboard.png rename to windows/security/threat-protection/microsoft-defender-atp/images/sec-ops-dashboard.png diff --git a/windows/security/threat-protection/windows-defender-atp/images/securescore.png b/windows/security/threat-protection/microsoft-defender-atp/images/securescore.png similarity index 100% rename from windows/security/threat-protection/windows-defender-atp/images/securescore.png rename to windows/security/threat-protection/microsoft-defender-atp/images/securescore.png diff --git a/windows/security/threat-protection/windows-defender-atp/images/settings.png b/windows/security/threat-protection/microsoft-defender-atp/images/settings.png similarity index 100% rename from windows/security/threat-protection/windows-defender-atp/images/settings.png rename to windows/security/threat-protection/microsoft-defender-atp/images/settings.png diff --git a/windows/security/threat-protection/windows-defender-atp/images/setup-preferences.png b/windows/security/threat-protection/microsoft-defender-atp/images/setup-preferences.png similarity index 100% rename from windows/security/threat-protection/windows-defender-atp/images/setup-preferences.png rename to windows/security/threat-protection/microsoft-defender-atp/images/setup-preferences.png diff --git a/windows/security/threat-protection/windows-defender-atp/images/setup-preferences2.png b/windows/security/threat-protection/microsoft-defender-atp/images/setup-preferences2.png similarity index 100% rename from windows/security/threat-protection/windows-defender-atp/images/setup-preferences2.png rename to windows/security/threat-protection/microsoft-defender-atp/images/setup-preferences2.png diff --git a/windows/security/threat-protection/windows-defender-atp/images/siem_details.png b/windows/security/threat-protection/microsoft-defender-atp/images/siem_details.png similarity index 100% rename from windows/security/threat-protection/windows-defender-atp/images/siem_details.png rename to windows/security/threat-protection/microsoft-defender-atp/images/siem_details.png diff --git a/windows/security/threat-protection/windows-defender-atp/images/ss1.png b/windows/security/threat-protection/microsoft-defender-atp/images/ss1.png similarity index 100% rename from windows/security/threat-protection/windows-defender-atp/images/ss1.png rename to windows/security/threat-protection/microsoft-defender-atp/images/ss1.png diff --git a/windows/security/threat-protection/windows-defender-atp/images/ssot.png b/windows/security/threat-protection/microsoft-defender-atp/images/ssot.png similarity index 100% rename from windows/security/threat-protection/windows-defender-atp/images/ssot.png rename to windows/security/threat-protection/microsoft-defender-atp/images/ssot.png diff --git a/windows/security/threat-protection/windows-defender-atp/images/status-tile.png b/windows/security/threat-protection/microsoft-defender-atp/images/status-tile.png similarity index 100% rename from windows/security/threat-protection/windows-defender-atp/images/status-tile.png rename to windows/security/threat-protection/microsoft-defender-atp/images/status-tile.png diff --git a/windows/security/threat-protection/windows-defender-atp/images/submit-file.png b/windows/security/threat-protection/microsoft-defender-atp/images/submit-file.png similarity index 100% rename from windows/security/threat-protection/windows-defender-atp/images/submit-file.png rename to windows/security/threat-protection/microsoft-defender-atp/images/submit-file.png diff --git a/windows/security/threat-protection/windows-defender-atp/images/ta.png b/windows/security/threat-protection/microsoft-defender-atp/images/ta.png similarity index 100% rename from windows/security/threat-protection/windows-defender-atp/images/ta.png rename to windows/security/threat-protection/microsoft-defender-atp/images/ta.png diff --git a/windows/security/threat-protection/windows-defender-atp/images/terminated-by-system.png b/windows/security/threat-protection/microsoft-defender-atp/images/terminated-by-system.png similarity index 100% rename from windows/security/threat-protection/windows-defender-atp/images/terminated-by-system.png rename to windows/security/threat-protection/microsoft-defender-atp/images/terminated-by-system.png diff --git a/windows/security/threat-protection/windows-defender-atp/images/terminated_by_system.png b/windows/security/threat-protection/microsoft-defender-atp/images/terminated_by_system.png similarity index 100% rename from windows/security/threat-protection/windows-defender-atp/images/terminated_by_system.png rename to windows/security/threat-protection/microsoft-defender-atp/images/terminated_by_system.png diff --git a/windows/security/threat-protection/windows-defender-atp/images/threat-analytics-report.png b/windows/security/threat-protection/microsoft-defender-atp/images/threat-analytics-report.png similarity index 100% rename from windows/security/threat-protection/windows-defender-atp/images/threat-analytics-report.png rename to windows/security/threat-protection/microsoft-defender-atp/images/threat-analytics-report.png diff --git a/windows/security/threat-protection/windows-defender-atp/images/top-recommendations.png b/windows/security/threat-protection/microsoft-defender-atp/images/top-recommendations.png similarity index 100% rename from windows/security/threat-protection/windows-defender-atp/images/top-recommendations.png rename to windows/security/threat-protection/microsoft-defender-atp/images/top-recommendations.png diff --git a/windows/security/threat-protection/windows-defender-atp/images/wdatp-pillars.png b/windows/security/threat-protection/microsoft-defender-atp/images/wdatp-pillars.png similarity index 100% rename from windows/security/threat-protection/windows-defender-atp/images/wdatp-pillars.png rename to windows/security/threat-protection/microsoft-defender-atp/images/wdatp-pillars.png diff --git a/windows/security/threat-protection/windows-defender-atp/images/wdatp-pillars2.png b/windows/security/threat-protection/microsoft-defender-atp/images/wdatp-pillars2.png similarity index 100% rename from windows/security/threat-protection/windows-defender-atp/images/wdatp-pillars2.png rename to windows/security/threat-protection/microsoft-defender-atp/images/wdatp-pillars2.png diff --git a/windows/security/threat-protection/windows-defender-atp/images/wdsc.png b/windows/security/threat-protection/microsoft-defender-atp/images/wdsc.png similarity index 100% rename from windows/security/threat-protection/windows-defender-atp/images/wdsc.png rename to windows/security/threat-protection/microsoft-defender-atp/images/wdsc.png diff --git a/windows/security/threat-protection/windows-defender-atp/images/webapp-add-permission-2.png b/windows/security/threat-protection/microsoft-defender-atp/images/webapp-add-permission-2.png similarity index 100% rename from windows/security/threat-protection/windows-defender-atp/images/webapp-add-permission-2.png rename to windows/security/threat-protection/microsoft-defender-atp/images/webapp-add-permission-2.png diff --git a/windows/security/threat-protection/windows-defender-atp/images/webapp-add-permission-end.png b/windows/security/threat-protection/microsoft-defender-atp/images/webapp-add-permission-end.png similarity index 100% rename from windows/security/threat-protection/windows-defender-atp/images/webapp-add-permission-end.png rename to windows/security/threat-protection/microsoft-defender-atp/images/webapp-add-permission-end.png diff --git a/windows/security/threat-protection/windows-defender-atp/images/webapp-add-permission-readalerts.png b/windows/security/threat-protection/microsoft-defender-atp/images/webapp-add-permission-readalerts.png similarity index 100% rename from windows/security/threat-protection/windows-defender-atp/images/webapp-add-permission-readalerts.png rename to windows/security/threat-protection/microsoft-defender-atp/images/webapp-add-permission-readalerts.png diff --git a/windows/security/threat-protection/windows-defender-atp/images/webapp-add-permission.png b/windows/security/threat-protection/microsoft-defender-atp/images/webapp-add-permission.png similarity index 100% rename from windows/security/threat-protection/windows-defender-atp/images/webapp-add-permission.png rename to windows/security/threat-protection/microsoft-defender-atp/images/webapp-add-permission.png diff --git a/windows/security/threat-protection/windows-defender-atp/images/webapp-app-id1.png b/windows/security/threat-protection/microsoft-defender-atp/images/webapp-app-id1.png similarity index 100% rename from windows/security/threat-protection/windows-defender-atp/images/webapp-app-id1.png rename to windows/security/threat-protection/microsoft-defender-atp/images/webapp-app-id1.png diff --git a/windows/security/threat-protection/windows-defender-atp/images/webapp-create-key.png b/windows/security/threat-protection/microsoft-defender-atp/images/webapp-create-key.png similarity index 100% rename from windows/security/threat-protection/windows-defender-atp/images/webapp-create-key.png rename to windows/security/threat-protection/microsoft-defender-atp/images/webapp-create-key.png diff --git a/windows/security/threat-protection/windows-defender-atp/images/webapp-create.png b/windows/security/threat-protection/microsoft-defender-atp/images/webapp-create.png similarity index 100% rename from windows/security/threat-protection/windows-defender-atp/images/webapp-create.png rename to windows/security/threat-protection/microsoft-defender-atp/images/webapp-create.png diff --git a/windows/security/threat-protection/windows-defender-atp/images/webapp-decoded-token.png b/windows/security/threat-protection/microsoft-defender-atp/images/webapp-decoded-token.png similarity index 100% rename from windows/security/threat-protection/windows-defender-atp/images/webapp-decoded-token.png rename to windows/security/threat-protection/microsoft-defender-atp/images/webapp-decoded-token.png diff --git a/windows/security/threat-protection/windows-defender-atp/images/webapp-edit-multitenant.png b/windows/security/threat-protection/microsoft-defender-atp/images/webapp-edit-multitenant.png similarity index 100% rename from windows/security/threat-protection/windows-defender-atp/images/webapp-edit-multitenant.png rename to windows/security/threat-protection/microsoft-defender-atp/images/webapp-edit-multitenant.png diff --git a/windows/security/threat-protection/windows-defender-atp/images/webapp-edit-settings.png b/windows/security/threat-protection/microsoft-defender-atp/images/webapp-edit-settings.png similarity index 100% rename from windows/security/threat-protection/windows-defender-atp/images/webapp-edit-settings.png rename to windows/security/threat-protection/microsoft-defender-atp/images/webapp-edit-settings.png diff --git a/windows/security/threat-protection/windows-defender-atp/images/webapp-get-appid.png b/windows/security/threat-protection/microsoft-defender-atp/images/webapp-get-appid.png similarity index 100% rename from windows/security/threat-protection/windows-defender-atp/images/webapp-get-appid.png rename to windows/security/threat-protection/microsoft-defender-atp/images/webapp-get-appid.png diff --git a/windows/security/threat-protection/windows-defender-atp/images/webapp-grant-permissions.png b/windows/security/threat-protection/microsoft-defender-atp/images/webapp-grant-permissions.png similarity index 100% rename from windows/security/threat-protection/windows-defender-atp/images/webapp-grant-permissions.png rename to windows/security/threat-protection/microsoft-defender-atp/images/webapp-grant-permissions.png diff --git a/windows/security/threat-protection/windows-defender-atp/images/webapp-select-permission.png b/windows/security/threat-protection/microsoft-defender-atp/images/webapp-select-permission.png similarity index 100% rename from windows/security/threat-protection/windows-defender-atp/images/webapp-select-permission.png rename to windows/security/threat-protection/microsoft-defender-atp/images/webapp-select-permission.png diff --git a/windows/security/threat-protection/windows-defender-atp/images/webapp-validate-token.png b/windows/security/threat-protection/microsoft-defender-atp/images/webapp-validate-token.png similarity index 100% rename from windows/security/threat-protection/windows-defender-atp/images/webapp-validate-token.png rename to windows/security/threat-protection/microsoft-defender-atp/images/webapp-validate-token.png diff --git a/windows/security/threat-protection/windows-defender-atp/images/welcome1.png b/windows/security/threat-protection/microsoft-defender-atp/images/welcome1.png similarity index 100% rename from windows/security/threat-protection/windows-defender-atp/images/welcome1.png rename to windows/security/threat-protection/microsoft-defender-atp/images/welcome1.png diff --git a/windows/security/threat-protection/windows-defender-atp/images/win10-endpoint-users.png b/windows/security/threat-protection/microsoft-defender-atp/images/win10-endpoint-users.png similarity index 100% rename from windows/security/threat-protection/windows-defender-atp/images/win10-endpoint-users.png rename to windows/security/threat-protection/microsoft-defender-atp/images/win10-endpoint-users.png diff --git a/windows/security/threat-protection/windows-defender-atp/images/windefatp-sc-qc-diagtrack.png b/windows/security/threat-protection/microsoft-defender-atp/images/windefatp-sc-qc-diagtrack.png similarity index 100% rename from windows/security/threat-protection/windows-defender-atp/images/windefatp-sc-qc-diagtrack.png rename to windows/security/threat-protection/microsoft-defender-atp/images/windefatp-sc-qc-diagtrack.png diff --git a/windows/security/threat-protection/windows-defender-atp/images/windefatp-sc-query-diagtrack.png b/windows/security/threat-protection/microsoft-defender-atp/images/windefatp-sc-query-diagtrack.png similarity index 100% rename from windows/security/threat-protection/windows-defender-atp/images/windefatp-sc-query-diagtrack.png rename to windows/security/threat-protection/microsoft-defender-atp/images/windefatp-sc-query-diagtrack.png diff --git a/windows/security/threat-protection/windows-defender-atp/images/windefatp-sc-query.png b/windows/security/threat-protection/microsoft-defender-atp/images/windefatp-sc-query.png similarity index 100% rename from windows/security/threat-protection/windows-defender-atp/images/windefatp-sc-query.png rename to windows/security/threat-protection/microsoft-defender-atp/images/windefatp-sc-query.png diff --git a/windows/security/threat-protection/windows-defender-atp/images/windefatp-utc-console-autostart.png b/windows/security/threat-protection/microsoft-defender-atp/images/windefatp-utc-console-autostart.png similarity index 100% rename from windows/security/threat-protection/windows-defender-atp/images/windefatp-utc-console-autostart.png rename to windows/security/threat-protection/microsoft-defender-atp/images/windefatp-utc-console-autostart.png diff --git a/windows/security/threat-protection/windows-defender-atp/images/windows-defender-system-guard-boot-time-integrity.png b/windows/security/threat-protection/microsoft-defender-atp/images/windows-defender-system-guard-boot-time-integrity.png similarity index 100% rename from windows/security/threat-protection/windows-defender-atp/images/windows-defender-system-guard-boot-time-integrity.png rename to windows/security/threat-protection/microsoft-defender-atp/images/windows-defender-system-guard-boot-time-integrity.png diff --git a/windows/security/threat-protection/windows-defender-atp/images/windows-defender-system-guard-validate-system-integrity.png b/windows/security/threat-protection/microsoft-defender-atp/images/windows-defender-system-guard-validate-system-integrity.png similarity index 100% rename from windows/security/threat-protection/windows-defender-atp/images/windows-defender-system-guard-validate-system-integrity.png rename to windows/security/threat-protection/microsoft-defender-atp/images/windows-defender-system-guard-validate-system-integrity.png diff --git a/windows/security/threat-protection/windows-defender-atp/images/windows-defender-system-guard.png b/windows/security/threat-protection/microsoft-defender-atp/images/windows-defender-system-guard.png similarity index 100% rename from windows/security/threat-protection/windows-defender-atp/images/windows-defender-system-guard.png rename to windows/security/threat-protection/microsoft-defender-atp/images/windows-defender-system-guard.png diff --git a/windows/security/threat-protection/windows-defender-atp/improverequestperformance-new.md b/windows/security/threat-protection/microsoft-defender-atp/improverequestperformance-new.md similarity index 100% rename from windows/security/threat-protection/windows-defender-atp/improverequestperformance-new.md rename to windows/security/threat-protection/microsoft-defender-atp/improverequestperformance-new.md diff --git a/windows/security/threat-protection/windows-defender-atp/incidents-queue.md b/windows/security/threat-protection/microsoft-defender-atp/incidents-queue.md similarity index 100% rename from windows/security/threat-protection/windows-defender-atp/incidents-queue.md rename to windows/security/threat-protection/microsoft-defender-atp/incidents-queue.md diff --git a/windows/security/threat-protection/windows-defender-atp/information-protection-in-windows-config.md b/windows/security/threat-protection/microsoft-defender-atp/information-protection-in-windows-config.md similarity index 100% rename from windows/security/threat-protection/windows-defender-atp/information-protection-in-windows-config.md rename to windows/security/threat-protection/microsoft-defender-atp/information-protection-in-windows-config.md diff --git a/windows/security/threat-protection/windows-defender-atp/information-protection-in-windows-overview.md b/windows/security/threat-protection/microsoft-defender-atp/information-protection-in-windows-overview.md similarity index 100% rename from windows/security/threat-protection/windows-defender-atp/information-protection-in-windows-overview.md rename to windows/security/threat-protection/microsoft-defender-atp/information-protection-in-windows-overview.md diff --git a/windows/security/threat-protection/windows-defender-atp/initiate-autoir-investigation-windows-defender-advanced-threat-protection-new.md b/windows/security/threat-protection/microsoft-defender-atp/initiate-autoir-investigation-windows-defender-advanced-threat-protection-new.md similarity index 100% rename from windows/security/threat-protection/windows-defender-atp/initiate-autoir-investigation-windows-defender-advanced-threat-protection-new.md rename to windows/security/threat-protection/microsoft-defender-atp/initiate-autoir-investigation-windows-defender-advanced-threat-protection-new.md diff --git a/windows/security/threat-protection/windows-defender-atp/investigate-alerts-windows-defender-advanced-threat-protection.md b/windows/security/threat-protection/microsoft-defender-atp/investigate-alerts-windows-defender-advanced-threat-protection.md similarity index 100% rename from windows/security/threat-protection/windows-defender-atp/investigate-alerts-windows-defender-advanced-threat-protection.md rename to windows/security/threat-protection/microsoft-defender-atp/investigate-alerts-windows-defender-advanced-threat-protection.md diff --git a/windows/security/threat-protection/windows-defender-atp/investigate-domain-windows-defender-advanced-threat-protection.md b/windows/security/threat-protection/microsoft-defender-atp/investigate-domain-windows-defender-advanced-threat-protection.md similarity index 100% rename from windows/security/threat-protection/windows-defender-atp/investigate-domain-windows-defender-advanced-threat-protection.md rename to windows/security/threat-protection/microsoft-defender-atp/investigate-domain-windows-defender-advanced-threat-protection.md diff --git a/windows/security/threat-protection/windows-defender-atp/investigate-files-windows-defender-advanced-threat-protection.md b/windows/security/threat-protection/microsoft-defender-atp/investigate-files-windows-defender-advanced-threat-protection.md similarity index 100% rename from windows/security/threat-protection/windows-defender-atp/investigate-files-windows-defender-advanced-threat-protection.md rename to windows/security/threat-protection/microsoft-defender-atp/investigate-files-windows-defender-advanced-threat-protection.md diff --git a/windows/security/threat-protection/windows-defender-atp/investigate-incidents-windows-defender-advanced-threat-protection.md b/windows/security/threat-protection/microsoft-defender-atp/investigate-incidents-windows-defender-advanced-threat-protection.md similarity index 100% rename from windows/security/threat-protection/windows-defender-atp/investigate-incidents-windows-defender-advanced-threat-protection.md rename to windows/security/threat-protection/microsoft-defender-atp/investigate-incidents-windows-defender-advanced-threat-protection.md diff --git a/windows/security/threat-protection/windows-defender-atp/investigate-ip-windows-defender-advanced-threat-protection.md b/windows/security/threat-protection/microsoft-defender-atp/investigate-ip-windows-defender-advanced-threat-protection.md similarity index 100% rename from windows/security/threat-protection/windows-defender-atp/investigate-ip-windows-defender-advanced-threat-protection.md rename to windows/security/threat-protection/microsoft-defender-atp/investigate-ip-windows-defender-advanced-threat-protection.md diff --git a/windows/security/threat-protection/windows-defender-atp/investigate-machines-windows-defender-advanced-threat-protection.md b/windows/security/threat-protection/microsoft-defender-atp/investigate-machines-windows-defender-advanced-threat-protection.md similarity index 100% rename from windows/security/threat-protection/windows-defender-atp/investigate-machines-windows-defender-advanced-threat-protection.md rename to windows/security/threat-protection/microsoft-defender-atp/investigate-machines-windows-defender-advanced-threat-protection.md diff --git a/windows/security/threat-protection/windows-defender-atp/investigate-user-windows-defender-advanced-threat-protection.md b/windows/security/threat-protection/microsoft-defender-atp/investigate-user-windows-defender-advanced-threat-protection.md similarity index 100% rename from windows/security/threat-protection/windows-defender-atp/investigate-user-windows-defender-advanced-threat-protection.md rename to windows/security/threat-protection/microsoft-defender-atp/investigate-user-windows-defender-advanced-threat-protection.md diff --git a/windows/security/threat-protection/windows-defender-atp/is-domain-seen-in-org-windows-defender-advanced-threat-protection-new.md b/windows/security/threat-protection/microsoft-defender-atp/is-domain-seen-in-org-windows-defender-advanced-threat-protection-new.md similarity index 100% rename from windows/security/threat-protection/windows-defender-atp/is-domain-seen-in-org-windows-defender-advanced-threat-protection-new.md rename to windows/security/threat-protection/microsoft-defender-atp/is-domain-seen-in-org-windows-defender-advanced-threat-protection-new.md diff --git a/windows/security/threat-protection/windows-defender-atp/is-ip-seen-org-windows-defender-advanced-threat-protection-new.md b/windows/security/threat-protection/microsoft-defender-atp/is-ip-seen-org-windows-defender-advanced-threat-protection-new.md similarity index 100% rename from windows/security/threat-protection/windows-defender-atp/is-ip-seen-org-windows-defender-advanced-threat-protection-new.md rename to windows/security/threat-protection/microsoft-defender-atp/is-ip-seen-org-windows-defender-advanced-threat-protection-new.md diff --git a/windows/security/threat-protection/windows-defender-atp/isolate-machine-windows-defender-advanced-threat-protection-new.md b/windows/security/threat-protection/microsoft-defender-atp/isolate-machine-windows-defender-advanced-threat-protection-new.md similarity index 100% rename from windows/security/threat-protection/windows-defender-atp/isolate-machine-windows-defender-advanced-threat-protection-new.md rename to windows/security/threat-protection/microsoft-defender-atp/isolate-machine-windows-defender-advanced-threat-protection-new.md diff --git a/windows/security/threat-protection/windows-defender-atp/licensing-windows-defender-advanced-threat-protection.md b/windows/security/threat-protection/microsoft-defender-atp/licensing-windows-defender-advanced-threat-protection.md similarity index 100% rename from windows/security/threat-protection/windows-defender-atp/licensing-windows-defender-advanced-threat-protection.md rename to windows/security/threat-protection/microsoft-defender-atp/licensing-windows-defender-advanced-threat-protection.md diff --git a/windows/security/threat-protection/windows-defender-atp/machine-groups-windows-defender-advanced-threat-protection.md b/windows/security/threat-protection/microsoft-defender-atp/machine-groups-windows-defender-advanced-threat-protection.md similarity index 100% rename from windows/security/threat-protection/windows-defender-atp/machine-groups-windows-defender-advanced-threat-protection.md rename to windows/security/threat-protection/microsoft-defender-atp/machine-groups-windows-defender-advanced-threat-protection.md diff --git a/windows/security/threat-protection/windows-defender-atp/machine-reports-windows-defender-advanced-threat-protection.md b/windows/security/threat-protection/microsoft-defender-atp/machine-reports-windows-defender-advanced-threat-protection.md similarity index 100% rename from windows/security/threat-protection/windows-defender-atp/machine-reports-windows-defender-advanced-threat-protection.md rename to windows/security/threat-protection/microsoft-defender-atp/machine-reports-windows-defender-advanced-threat-protection.md diff --git a/windows/security/threat-protection/windows-defender-atp/machine-tags-windows-defender-advanced-threat-protection.md b/windows/security/threat-protection/microsoft-defender-atp/machine-tags-windows-defender-advanced-threat-protection.md similarity index 100% rename from windows/security/threat-protection/windows-defender-atp/machine-tags-windows-defender-advanced-threat-protection.md rename to windows/security/threat-protection/microsoft-defender-atp/machine-tags-windows-defender-advanced-threat-protection.md diff --git a/windows/security/threat-protection/windows-defender-atp/machine-windows-defender-advanced-threat-protection-new.md b/windows/security/threat-protection/microsoft-defender-atp/machine-windows-defender-advanced-threat-protection-new.md similarity index 100% rename from windows/security/threat-protection/windows-defender-atp/machine-windows-defender-advanced-threat-protection-new.md rename to windows/security/threat-protection/microsoft-defender-atp/machine-windows-defender-advanced-threat-protection-new.md diff --git a/windows/security/threat-protection/windows-defender-atp/machineaction-windows-defender-advanced-threat-protection-new.md b/windows/security/threat-protection/microsoft-defender-atp/machineaction-windows-defender-advanced-threat-protection-new.md similarity index 100% rename from windows/security/threat-protection/windows-defender-atp/machineaction-windows-defender-advanced-threat-protection-new.md rename to windows/security/threat-protection/microsoft-defender-atp/machineaction-windows-defender-advanced-threat-protection-new.md diff --git a/windows/security/threat-protection/windows-defender-atp/machineactionsnote.md b/windows/security/threat-protection/microsoft-defender-atp/machineactionsnote.md similarity index 100% rename from windows/security/threat-protection/windows-defender-atp/machineactionsnote.md rename to windows/security/threat-protection/microsoft-defender-atp/machineactionsnote.md diff --git a/windows/security/threat-protection/windows-defender-atp/machines-view-overview-windows-defender-advanced-threat-protection.md b/windows/security/threat-protection/microsoft-defender-atp/machines-view-overview-windows-defender-advanced-threat-protection.md similarity index 100% rename from windows/security/threat-protection/windows-defender-atp/machines-view-overview-windows-defender-advanced-threat-protection.md rename to windows/security/threat-protection/microsoft-defender-atp/machines-view-overview-windows-defender-advanced-threat-protection.md diff --git a/windows/security/threat-protection/windows-defender-atp/manage-alerts-windows-defender-advanced-threat-protection.md b/windows/security/threat-protection/microsoft-defender-atp/manage-alerts-windows-defender-advanced-threat-protection.md similarity index 100% rename from windows/security/threat-protection/windows-defender-atp/manage-alerts-windows-defender-advanced-threat-protection.md rename to windows/security/threat-protection/microsoft-defender-atp/manage-alerts-windows-defender-advanced-threat-protection.md diff --git a/windows/security/threat-protection/windows-defender-atp/manage-allowed-blocked-list-windows-defender-advanced-threat-protection.md b/windows/security/threat-protection/microsoft-defender-atp/manage-allowed-blocked-list-windows-defender-advanced-threat-protection.md similarity index 100% rename from windows/security/threat-protection/windows-defender-atp/manage-allowed-blocked-list-windows-defender-advanced-threat-protection.md rename to windows/security/threat-protection/microsoft-defender-atp/manage-allowed-blocked-list-windows-defender-advanced-threat-protection.md diff --git a/windows/security/threat-protection/windows-defender-atp/manage-auto-investigation-windows-defender-advanced-threat-protection.md b/windows/security/threat-protection/microsoft-defender-atp/manage-auto-investigation-windows-defender-advanced-threat-protection.md similarity index 100% rename from windows/security/threat-protection/windows-defender-atp/manage-auto-investigation-windows-defender-advanced-threat-protection.md rename to windows/security/threat-protection/microsoft-defender-atp/manage-auto-investigation-windows-defender-advanced-threat-protection.md diff --git a/windows/security/threat-protection/windows-defender-atp/manage-automation-allowed-blocked-list-windows-defender-advanced-threat-protection.md b/windows/security/threat-protection/microsoft-defender-atp/manage-automation-allowed-blocked-list-windows-defender-advanced-threat-protection.md similarity index 100% rename from windows/security/threat-protection/windows-defender-atp/manage-automation-allowed-blocked-list-windows-defender-advanced-threat-protection.md rename to windows/security/threat-protection/microsoft-defender-atp/manage-automation-allowed-blocked-list-windows-defender-advanced-threat-protection.md diff --git a/windows/security/threat-protection/windows-defender-atp/manage-automation-file-uploads-windows-defender-advanced-threat-protection.md b/windows/security/threat-protection/microsoft-defender-atp/manage-automation-file-uploads-windows-defender-advanced-threat-protection.md similarity index 100% rename from windows/security/threat-protection/windows-defender-atp/manage-automation-file-uploads-windows-defender-advanced-threat-protection.md rename to windows/security/threat-protection/microsoft-defender-atp/manage-automation-file-uploads-windows-defender-advanced-threat-protection.md diff --git a/windows/security/threat-protection/windows-defender-atp/manage-automation-folder-exclusions-windows-defender-advanced-threat-protection.md b/windows/security/threat-protection/microsoft-defender-atp/manage-automation-folder-exclusions-windows-defender-advanced-threat-protection.md similarity index 100% rename from windows/security/threat-protection/windows-defender-atp/manage-automation-folder-exclusions-windows-defender-advanced-threat-protection.md rename to windows/security/threat-protection/microsoft-defender-atp/manage-automation-folder-exclusions-windows-defender-advanced-threat-protection.md diff --git a/windows/security/threat-protection/windows-defender-atp/manage-edr.md b/windows/security/threat-protection/microsoft-defender-atp/manage-edr.md similarity index 100% rename from windows/security/threat-protection/windows-defender-atp/manage-edr.md rename to windows/security/threat-protection/microsoft-defender-atp/manage-edr.md diff --git a/windows/security/threat-protection/windows-defender-atp/manage-incidents-windows-defender-advanced-threat-protection.md b/windows/security/threat-protection/microsoft-defender-atp/manage-incidents-windows-defender-advanced-threat-protection.md similarity index 100% rename from windows/security/threat-protection/windows-defender-atp/manage-incidents-windows-defender-advanced-threat-protection.md rename to windows/security/threat-protection/microsoft-defender-atp/manage-incidents-windows-defender-advanced-threat-protection.md diff --git a/windows/security/threat-protection/windows-defender-atp/manage-suppression-rules-windows-defender-advanced-threat-protection.md b/windows/security/threat-protection/microsoft-defender-atp/manage-suppression-rules-windows-defender-advanced-threat-protection.md similarity index 100% rename from windows/security/threat-protection/windows-defender-atp/manage-suppression-rules-windows-defender-advanced-threat-protection.md rename to windows/security/threat-protection/microsoft-defender-atp/manage-suppression-rules-windows-defender-advanced-threat-protection.md diff --git a/windows/security/threat-protection/windows-defender-atp/management-apis.md b/windows/security/threat-protection/microsoft-defender-atp/management-apis.md similarity index 100% rename from windows/security/threat-protection/windows-defender-atp/management-apis.md rename to windows/security/threat-protection/microsoft-defender-atp/management-apis.md diff --git a/windows/security/threat-protection/windows-defender-atp/microsoft-cloud-app-security-config.md b/windows/security/threat-protection/microsoft-defender-atp/microsoft-cloud-app-security-config.md similarity index 100% rename from windows/security/threat-protection/windows-defender-atp/microsoft-cloud-app-security-config.md rename to windows/security/threat-protection/microsoft-defender-atp/microsoft-cloud-app-security-config.md diff --git a/windows/security/threat-protection/windows-defender-atp/microsoft-cloud-app-security-integration.md b/windows/security/threat-protection/microsoft-defender-atp/microsoft-cloud-app-security-integration.md similarity index 100% rename from windows/security/threat-protection/windows-defender-atp/microsoft-cloud-app-security-integration.md rename to windows/security/threat-protection/microsoft-defender-atp/microsoft-cloud-app-security-integration.md diff --git a/windows/security/threat-protection/windows-defender-atp/microsoft-threat-experts.md b/windows/security/threat-protection/microsoft-defender-atp/microsoft-threat-experts.md similarity index 100% rename from windows/security/threat-protection/windows-defender-atp/microsoft-threat-experts.md rename to windows/security/threat-protection/microsoft-defender-atp/microsoft-threat-experts.md diff --git a/windows/security/threat-protection/windows-defender-atp/minimum-requirements-windows-defender-advanced-threat-protection.md b/windows/security/threat-protection/microsoft-defender-atp/minimum-requirements-windows-defender-advanced-threat-protection.md similarity index 100% rename from windows/security/threat-protection/windows-defender-atp/minimum-requirements-windows-defender-advanced-threat-protection.md rename to windows/security/threat-protection/microsoft-defender-atp/minimum-requirements-windows-defender-advanced-threat-protection.md diff --git a/windows/security/threat-protection/windows-defender-atp/mssp-support-windows-defender-advanced-threat-protection.md b/windows/security/threat-protection/microsoft-defender-atp/mssp-support-windows-defender-advanced-threat-protection.md similarity index 100% rename from windows/security/threat-protection/windows-defender-atp/mssp-support-windows-defender-advanced-threat-protection.md rename to windows/security/threat-protection/microsoft-defender-atp/mssp-support-windows-defender-advanced-threat-protection.md diff --git a/windows/security/threat-protection/windows-defender-atp/offboard-machine-api-windows-defender-advanced-threat-protection-new.md b/windows/security/threat-protection/microsoft-defender-atp/offboard-machine-api-windows-defender-advanced-threat-protection-new.md similarity index 100% rename from windows/security/threat-protection/windows-defender-atp/offboard-machine-api-windows-defender-advanced-threat-protection-new.md rename to windows/security/threat-protection/microsoft-defender-atp/offboard-machine-api-windows-defender-advanced-threat-protection-new.md diff --git a/windows/security/threat-protection/windows-defender-atp/offboard-machines-windows-defender-advanced-threat-protection.md b/windows/security/threat-protection/microsoft-defender-atp/offboard-machines-windows-defender-advanced-threat-protection.md similarity index 100% rename from windows/security/threat-protection/windows-defender-atp/offboard-machines-windows-defender-advanced-threat-protection.md rename to windows/security/threat-protection/microsoft-defender-atp/offboard-machines-windows-defender-advanced-threat-protection.md diff --git a/windows/security/threat-protection/windows-defender-atp/onboard-configure-windows-defender-advanced-threat-protection.md b/windows/security/threat-protection/microsoft-defender-atp/onboard-configure-windows-defender-advanced-threat-protection.md similarity index 100% rename from windows/security/threat-protection/windows-defender-atp/onboard-configure-windows-defender-advanced-threat-protection.md rename to windows/security/threat-protection/microsoft-defender-atp/onboard-configure-windows-defender-advanced-threat-protection.md diff --git a/windows/security/threat-protection/windows-defender-atp/onboard-downlevel-windows-defender-advanced-threat-protection.md b/windows/security/threat-protection/microsoft-defender-atp/onboard-downlevel-windows-defender-advanced-threat-protection.md similarity index 100% rename from windows/security/threat-protection/windows-defender-atp/onboard-downlevel-windows-defender-advanced-threat-protection.md rename to windows/security/threat-protection/microsoft-defender-atp/onboard-downlevel-windows-defender-advanced-threat-protection.md diff --git a/windows/security/threat-protection/windows-defender-atp/onboard.md b/windows/security/threat-protection/microsoft-defender-atp/onboard.md similarity index 100% rename from windows/security/threat-protection/windows-defender-atp/onboard.md rename to windows/security/threat-protection/microsoft-defender-atp/onboard.md diff --git a/windows/security/threat-protection/windows-defender-atp/overview-attack-surface-reduction.md b/windows/security/threat-protection/microsoft-defender-atp/overview-attack-surface-reduction.md similarity index 100% rename from windows/security/threat-protection/windows-defender-atp/overview-attack-surface-reduction.md rename to windows/security/threat-protection/microsoft-defender-atp/overview-attack-surface-reduction.md diff --git a/windows/security/threat-protection/windows-defender-atp/overview-custom-detections.md b/windows/security/threat-protection/microsoft-defender-atp/overview-custom-detections.md similarity index 100% rename from windows/security/threat-protection/windows-defender-atp/overview-custom-detections.md rename to windows/security/threat-protection/microsoft-defender-atp/overview-custom-detections.md diff --git a/windows/security/threat-protection/windows-defender-atp/overview-endpoint-detection-response.md b/windows/security/threat-protection/microsoft-defender-atp/overview-endpoint-detection-response.md similarity index 100% rename from windows/security/threat-protection/windows-defender-atp/overview-endpoint-detection-response.md rename to windows/security/threat-protection/microsoft-defender-atp/overview-endpoint-detection-response.md diff --git a/windows/security/threat-protection/windows-defender-atp/overview-hardware-based-isolation.md b/windows/security/threat-protection/microsoft-defender-atp/overview-hardware-based-isolation.md similarity index 100% rename from windows/security/threat-protection/windows-defender-atp/overview-hardware-based-isolation.md rename to windows/security/threat-protection/microsoft-defender-atp/overview-hardware-based-isolation.md diff --git a/windows/security/threat-protection/windows-defender-atp/overview-hunting-windows-defender-advanced-threat-protection.md b/windows/security/threat-protection/microsoft-defender-atp/overview-hunting-windows-defender-advanced-threat-protection.md similarity index 100% rename from windows/security/threat-protection/windows-defender-atp/overview-hunting-windows-defender-advanced-threat-protection.md rename to windows/security/threat-protection/microsoft-defender-atp/overview-hunting-windows-defender-advanced-threat-protection.md diff --git a/windows/security/threat-protection/windows-defender-atp/overview-secure-score-windows-defender-advanced-threat-protection.md b/windows/security/threat-protection/microsoft-defender-atp/overview-secure-score-windows-defender-advanced-threat-protection.md similarity index 100% rename from windows/security/threat-protection/windows-defender-atp/overview-secure-score-windows-defender-advanced-threat-protection.md rename to windows/security/threat-protection/microsoft-defender-atp/overview-secure-score-windows-defender-advanced-threat-protection.md diff --git a/windows/security/threat-protection/windows-defender-atp/overview.md b/windows/security/threat-protection/microsoft-defender-atp/overview.md similarity index 100% rename from windows/security/threat-protection/windows-defender-atp/overview.md rename to windows/security/threat-protection/microsoft-defender-atp/overview.md diff --git a/windows/security/threat-protection/windows-defender-atp/portal-overview-windows-defender-advanced-threat-protection.md b/windows/security/threat-protection/microsoft-defender-atp/portal-overview-windows-defender-advanced-threat-protection.md similarity index 100% rename from windows/security/threat-protection/windows-defender-atp/portal-overview-windows-defender-advanced-threat-protection.md rename to windows/security/threat-protection/microsoft-defender-atp/portal-overview-windows-defender-advanced-threat-protection.md diff --git a/windows/security/threat-protection/windows-defender-atp/post-ti-indicator-windows-defender-advanced-threat-protection-new.md b/windows/security/threat-protection/microsoft-defender-atp/post-ti-indicator-windows-defender-advanced-threat-protection-new.md similarity index 100% rename from windows/security/threat-protection/windows-defender-atp/post-ti-indicator-windows-defender-advanced-threat-protection-new.md rename to windows/security/threat-protection/microsoft-defender-atp/post-ti-indicator-windows-defender-advanced-threat-protection-new.md diff --git a/windows/security/threat-protection/windows-defender-atp/powerbi-reports-windows-defender-advanced-threat-protection.md b/windows/security/threat-protection/microsoft-defender-atp/powerbi-reports-windows-defender-advanced-threat-protection.md similarity index 100% rename from windows/security/threat-protection/windows-defender-atp/powerbi-reports-windows-defender-advanced-threat-protection.md rename to windows/security/threat-protection/microsoft-defender-atp/powerbi-reports-windows-defender-advanced-threat-protection.md diff --git a/windows/security/threat-protection/windows-defender-atp/powershell-example-code-windows-defender-advanced-threat-protection.md b/windows/security/threat-protection/microsoft-defender-atp/powershell-example-code-windows-defender-advanced-threat-protection.md similarity index 100% rename from windows/security/threat-protection/windows-defender-atp/powershell-example-code-windows-defender-advanced-threat-protection.md rename to windows/security/threat-protection/microsoft-defender-atp/powershell-example-code-windows-defender-advanced-threat-protection.md diff --git a/windows/security/threat-protection/windows-defender-atp/preferences-setup-windows-defender-advanced-threat-protection.md b/windows/security/threat-protection/microsoft-defender-atp/preferences-setup-windows-defender-advanced-threat-protection.md similarity index 100% rename from windows/security/threat-protection/windows-defender-atp/preferences-setup-windows-defender-advanced-threat-protection.md rename to windows/security/threat-protection/microsoft-defender-atp/preferences-setup-windows-defender-advanced-threat-protection.md diff --git a/windows/security/threat-protection/windows-defender-atp/prerelease.md b/windows/security/threat-protection/microsoft-defender-atp/prerelease.md similarity index 100% rename from windows/security/threat-protection/windows-defender-atp/prerelease.md rename to windows/security/threat-protection/microsoft-defender-atp/prerelease.md diff --git a/windows/security/threat-protection/windows-defender-atp/preview-settings-windows-defender-advanced-threat-protection.md b/windows/security/threat-protection/microsoft-defender-atp/preview-settings-windows-defender-advanced-threat-protection.md similarity index 100% rename from windows/security/threat-protection/windows-defender-atp/preview-settings-windows-defender-advanced-threat-protection.md rename to windows/security/threat-protection/microsoft-defender-atp/preview-settings-windows-defender-advanced-threat-protection.md diff --git a/windows/security/threat-protection/windows-defender-atp/preview-windows-defender-advanced-threat-protection.md b/windows/security/threat-protection/microsoft-defender-atp/preview-windows-defender-advanced-threat-protection.md similarity index 100% rename from windows/security/threat-protection/windows-defender-atp/preview-windows-defender-advanced-threat-protection.md rename to windows/security/threat-protection/microsoft-defender-atp/preview-windows-defender-advanced-threat-protection.md diff --git a/windows/security/threat-protection/windows-defender-atp/pull-alerts-using-rest-api-windows-defender-advanced-threat-protection.md b/windows/security/threat-protection/microsoft-defender-atp/pull-alerts-using-rest-api-windows-defender-advanced-threat-protection.md similarity index 100% rename from windows/security/threat-protection/windows-defender-atp/pull-alerts-using-rest-api-windows-defender-advanced-threat-protection.md rename to windows/security/threat-protection/microsoft-defender-atp/pull-alerts-using-rest-api-windows-defender-advanced-threat-protection.md diff --git a/windows/security/threat-protection/windows-defender-atp/python-example-code-windows-defender-advanced-threat-protection.md b/windows/security/threat-protection/microsoft-defender-atp/python-example-code-windows-defender-advanced-threat-protection.md similarity index 100% rename from windows/security/threat-protection/windows-defender-atp/python-example-code-windows-defender-advanced-threat-protection.md rename to windows/security/threat-protection/microsoft-defender-atp/python-example-code-windows-defender-advanced-threat-protection.md diff --git a/windows/security/threat-protection/windows-defender-atp/rbac-windows-defender-advanced-threat-protection.md b/windows/security/threat-protection/microsoft-defender-atp/rbac-windows-defender-advanced-threat-protection.md similarity index 100% rename from windows/security/threat-protection/windows-defender-atp/rbac-windows-defender-advanced-threat-protection.md rename to windows/security/threat-protection/microsoft-defender-atp/rbac-windows-defender-advanced-threat-protection.md diff --git a/windows/security/threat-protection/windows-defender-atp/respond-file-alerts-windows-defender-advanced-threat-protection.md b/windows/security/threat-protection/microsoft-defender-atp/respond-file-alerts-windows-defender-advanced-threat-protection.md similarity index 100% rename from windows/security/threat-protection/windows-defender-atp/respond-file-alerts-windows-defender-advanced-threat-protection.md rename to windows/security/threat-protection/microsoft-defender-atp/respond-file-alerts-windows-defender-advanced-threat-protection.md diff --git a/windows/security/threat-protection/windows-defender-atp/respond-machine-alerts-windows-defender-advanced-threat-protection.md b/windows/security/threat-protection/microsoft-defender-atp/respond-machine-alerts-windows-defender-advanced-threat-protection.md similarity index 100% rename from windows/security/threat-protection/windows-defender-atp/respond-machine-alerts-windows-defender-advanced-threat-protection.md rename to windows/security/threat-protection/microsoft-defender-atp/respond-machine-alerts-windows-defender-advanced-threat-protection.md diff --git a/windows/security/threat-protection/windows-defender-atp/response-actions-windows-defender-advanced-threat-protection.md b/windows/security/threat-protection/microsoft-defender-atp/response-actions-windows-defender-advanced-threat-protection.md similarity index 100% rename from windows/security/threat-protection/windows-defender-atp/response-actions-windows-defender-advanced-threat-protection.md rename to windows/security/threat-protection/microsoft-defender-atp/response-actions-windows-defender-advanced-threat-protection.md diff --git a/windows/security/threat-protection/windows-defender-atp/restrict-code-execution-windows-defender-advanced-threat-protection-new.md b/windows/security/threat-protection/microsoft-defender-atp/restrict-code-execution-windows-defender-advanced-threat-protection-new.md similarity index 100% rename from windows/security/threat-protection/windows-defender-atp/restrict-code-execution-windows-defender-advanced-threat-protection-new.md rename to windows/security/threat-protection/microsoft-defender-atp/restrict-code-execution-windows-defender-advanced-threat-protection-new.md diff --git a/windows/security/threat-protection/windows-defender-atp/run-advanced-query-api.md b/windows/security/threat-protection/microsoft-defender-atp/run-advanced-query-api.md similarity index 100% rename from windows/security/threat-protection/windows-defender-atp/run-advanced-query-api.md rename to windows/security/threat-protection/microsoft-defender-atp/run-advanced-query-api.md diff --git a/windows/security/threat-protection/windows-defender-atp/run-advanced-query-sample-ms-flow.md b/windows/security/threat-protection/microsoft-defender-atp/run-advanced-query-sample-ms-flow.md similarity index 100% rename from windows/security/threat-protection/windows-defender-atp/run-advanced-query-sample-ms-flow.md rename to windows/security/threat-protection/microsoft-defender-atp/run-advanced-query-sample-ms-flow.md diff --git a/windows/security/threat-protection/windows-defender-atp/run-advanced-query-sample-power-bi-app-token.md b/windows/security/threat-protection/microsoft-defender-atp/run-advanced-query-sample-power-bi-app-token.md similarity index 100% rename from windows/security/threat-protection/windows-defender-atp/run-advanced-query-sample-power-bi-app-token.md rename to windows/security/threat-protection/microsoft-defender-atp/run-advanced-query-sample-power-bi-app-token.md diff --git a/windows/security/threat-protection/windows-defender-atp/run-advanced-query-sample-power-bi-user-token.md b/windows/security/threat-protection/microsoft-defender-atp/run-advanced-query-sample-power-bi-user-token.md similarity index 100% rename from windows/security/threat-protection/windows-defender-atp/run-advanced-query-sample-power-bi-user-token.md rename to windows/security/threat-protection/microsoft-defender-atp/run-advanced-query-sample-power-bi-user-token.md diff --git a/windows/security/threat-protection/windows-defender-atp/run-advanced-query-sample-powershell.md b/windows/security/threat-protection/microsoft-defender-atp/run-advanced-query-sample-powershell.md similarity index 100% rename from windows/security/threat-protection/windows-defender-atp/run-advanced-query-sample-powershell.md rename to windows/security/threat-protection/microsoft-defender-atp/run-advanced-query-sample-powershell.md diff --git a/windows/security/threat-protection/windows-defender-atp/run-advanced-query-sample-python.md b/windows/security/threat-protection/microsoft-defender-atp/run-advanced-query-sample-python.md similarity index 100% rename from windows/security/threat-protection/windows-defender-atp/run-advanced-query-sample-python.md rename to windows/security/threat-protection/microsoft-defender-atp/run-advanced-query-sample-python.md diff --git a/windows/security/threat-protection/windows-defender-atp/run-av-scan-windows-defender-advanced-threat-protection-new.md b/windows/security/threat-protection/microsoft-defender-atp/run-av-scan-windows-defender-advanced-threat-protection-new.md similarity index 100% rename from windows/security/threat-protection/windows-defender-atp/run-av-scan-windows-defender-advanced-threat-protection-new.md rename to windows/security/threat-protection/microsoft-defender-atp/run-av-scan-windows-defender-advanced-threat-protection-new.md diff --git a/windows/security/threat-protection/windows-defender-atp/run-detection-test-windows-defender-advanced-threat-protection.md b/windows/security/threat-protection/microsoft-defender-atp/run-detection-test-windows-defender-advanced-threat-protection.md similarity index 100% rename from windows/security/threat-protection/windows-defender-atp/run-detection-test-windows-defender-advanced-threat-protection.md rename to windows/security/threat-protection/microsoft-defender-atp/run-detection-test-windows-defender-advanced-threat-protection.md diff --git a/windows/security/threat-protection/windows-defender-atp/secure-score-dashboard-windows-defender-advanced-threat-protection.md b/windows/security/threat-protection/microsoft-defender-atp/secure-score-dashboard-windows-defender-advanced-threat-protection.md similarity index 100% rename from windows/security/threat-protection/windows-defender-atp/secure-score-dashboard-windows-defender-advanced-threat-protection.md rename to windows/security/threat-protection/microsoft-defender-atp/secure-score-dashboard-windows-defender-advanced-threat-protection.md diff --git a/windows/security/threat-protection/windows-defender-atp/security-operations-dashboard-windows-defender-advanced-threat-protection.md b/windows/security/threat-protection/microsoft-defender-atp/security-operations-dashboard-windows-defender-advanced-threat-protection.md similarity index 100% rename from windows/security/threat-protection/windows-defender-atp/security-operations-dashboard-windows-defender-advanced-threat-protection.md rename to windows/security/threat-protection/microsoft-defender-atp/security-operations-dashboard-windows-defender-advanced-threat-protection.md diff --git a/windows/security/threat-protection/windows-defender-atp/service-status-windows-defender-advanced-threat-protection.md b/windows/security/threat-protection/microsoft-defender-atp/service-status-windows-defender-advanced-threat-protection.md similarity index 100% rename from windows/security/threat-protection/windows-defender-atp/service-status-windows-defender-advanced-threat-protection.md rename to windows/security/threat-protection/microsoft-defender-atp/service-status-windows-defender-advanced-threat-protection.md diff --git a/windows/security/threat-protection/windows-defender-atp/stop-and-quarantine-file-windows-defender-advanced-threat-protection-new.md b/windows/security/threat-protection/microsoft-defender-atp/stop-and-quarantine-file-windows-defender-advanced-threat-protection-new.md similarity index 100% rename from windows/security/threat-protection/windows-defender-atp/stop-and-quarantine-file-windows-defender-advanced-threat-protection-new.md rename to windows/security/threat-protection/microsoft-defender-atp/stop-and-quarantine-file-windows-defender-advanced-threat-protection-new.md diff --git a/windows/security/threat-protection/windows-defender-atp/supported-response-apis-windows-defender-advanced-threat-protection.md b/windows/security/threat-protection/microsoft-defender-atp/supported-response-apis-windows-defender-advanced-threat-protection.md similarity index 100% rename from windows/security/threat-protection/windows-defender-atp/supported-response-apis-windows-defender-advanced-threat-protection.md rename to windows/security/threat-protection/microsoft-defender-atp/supported-response-apis-windows-defender-advanced-threat-protection.md diff --git a/windows/security/threat-protection/windows-defender-atp/threat-analytics.md b/windows/security/threat-protection/microsoft-defender-atp/threat-analytics.md similarity index 100% rename from windows/security/threat-protection/windows-defender-atp/threat-analytics.md rename to windows/security/threat-protection/microsoft-defender-atp/threat-analytics.md diff --git a/windows/security/threat-protection/windows-defender-atp/threat-indicator-concepts-windows-defender-advanced-threat-protection.md b/windows/security/threat-protection/microsoft-defender-atp/threat-indicator-concepts-windows-defender-advanced-threat-protection.md similarity index 100% rename from windows/security/threat-protection/windows-defender-atp/threat-indicator-concepts-windows-defender-advanced-threat-protection.md rename to windows/security/threat-protection/microsoft-defender-atp/threat-indicator-concepts-windows-defender-advanced-threat-protection.md diff --git a/windows/security/threat-protection/windows-defender-atp/threat-protection-integration.md b/windows/security/threat-protection/microsoft-defender-atp/threat-protection-integration.md similarity index 100% rename from windows/security/threat-protection/windows-defender-atp/threat-protection-integration.md rename to windows/security/threat-protection/microsoft-defender-atp/threat-protection-integration.md diff --git a/windows/security/threat-protection/windows-defender-atp/threat-protection-reports-windows-defender-advanced-threat-protection.md b/windows/security/threat-protection/microsoft-defender-atp/threat-protection-reports-windows-defender-advanced-threat-protection.md similarity index 100% rename from windows/security/threat-protection/windows-defender-atp/threat-protection-reports-windows-defender-advanced-threat-protection.md rename to windows/security/threat-protection/microsoft-defender-atp/threat-protection-reports-windows-defender-advanced-threat-protection.md diff --git a/windows/security/threat-protection/windows-defender-atp/ti-indicator-windows-defender-advanced-threat-protection-new.md b/windows/security/threat-protection/microsoft-defender-atp/ti-indicator-windows-defender-advanced-threat-protection-new.md similarity index 100% rename from windows/security/threat-protection/windows-defender-atp/ti-indicator-windows-defender-advanced-threat-protection-new.md rename to windows/security/threat-protection/microsoft-defender-atp/ti-indicator-windows-defender-advanced-threat-protection-new.md diff --git a/windows/security/threat-protection/windows-defender-atp/time-settings-windows-defender-advanced-threat-protection.md b/windows/security/threat-protection/microsoft-defender-atp/time-settings-windows-defender-advanced-threat-protection.md similarity index 100% rename from windows/security/threat-protection/windows-defender-atp/time-settings-windows-defender-advanced-threat-protection.md rename to windows/security/threat-protection/microsoft-defender-atp/time-settings-windows-defender-advanced-threat-protection.md diff --git a/windows/security/threat-protection/windows-defender-atp/troubleshoot-custom-ti-windows-defender-advanced-threat-protection.md b/windows/security/threat-protection/microsoft-defender-atp/troubleshoot-custom-ti-windows-defender-advanced-threat-protection.md similarity index 100% rename from windows/security/threat-protection/windows-defender-atp/troubleshoot-custom-ti-windows-defender-advanced-threat-protection.md rename to windows/security/threat-protection/microsoft-defender-atp/troubleshoot-custom-ti-windows-defender-advanced-threat-protection.md diff --git a/windows/security/threat-protection/windows-defender-atp/troubleshoot-onboarding-error-messages-windows-defender-advanced-threat-protection.md b/windows/security/threat-protection/microsoft-defender-atp/troubleshoot-onboarding-error-messages-windows-defender-advanced-threat-protection.md similarity index 100% rename from windows/security/threat-protection/windows-defender-atp/troubleshoot-onboarding-error-messages-windows-defender-advanced-threat-protection.md rename to windows/security/threat-protection/microsoft-defender-atp/troubleshoot-onboarding-error-messages-windows-defender-advanced-threat-protection.md diff --git a/windows/security/threat-protection/windows-defender-atp/troubleshoot-onboarding-windows-defender-advanced-threat-protection.md b/windows/security/threat-protection/microsoft-defender-atp/troubleshoot-onboarding-windows-defender-advanced-threat-protection.md similarity index 98% rename from windows/security/threat-protection/windows-defender-atp/troubleshoot-onboarding-windows-defender-advanced-threat-protection.md rename to windows/security/threat-protection/microsoft-defender-atp/troubleshoot-onboarding-windows-defender-advanced-threat-protection.md index 38a88cfe19..0f2789ceb5 100644 --- a/windows/security/threat-protection/windows-defender-atp/troubleshoot-onboarding-windows-defender-advanced-threat-protection.md +++ b/windows/security/threat-protection/microsoft-defender-atp/troubleshoot-onboarding-windows-defender-advanced-threat-protection.md @@ -1,312 +1,312 @@ ---- -title: Troubleshoot Windows Defender ATP onboarding issues -description: Troubleshoot issues that might arise during the onboarding of machines or to the Windows Defender ATP service. -keywords: troubleshoot onboarding, onboarding issues, event viewer, data collection and preview builds, sensor data and diagnostics -search.product: eADQiWindows 10XVcnh -search.appverid: met150 -ms.prod: w10 -ms.mktglfcycl: deploy -ms.sitesec: library -ms.pagetype: security -ms.author: macapara -author: mjcaparas -ms.localizationpriority: medium -manager: dansimp -audience: ITPro -ms.collection: M365-security-compliance -ms.topic: troubleshooting ---- - -# Troubleshoot Windows Defender Advanced Threat Protection onboarding issues - -**Applies to:** -- [Windows Defender Advanced Threat Protection (Windows Defender ATP)](https://go.microsoft.com/fwlink/p/?linkid=2069559) -- Windows Server 2012 R2 -- Windows Server 2016 - - - -You might need to troubleshoot the Windows Defender ATP onboarding process if you encounter issues. -This page provides detailed steps to troubleshoot onboarding issues that might occur when deploying with one of the deployment tools and common errors that might occur on the machines. - -If you have completed the onboarding process and don't see machines in the [Machines list](investigate-machines-windows-defender-advanced-threat-protection.md) after an hour, it might indicate an onboarding or connectivity problem. - -## Troubleshoot onboarding when deploying with Group Policy -Deployment with Group Policy is done by running the onboarding script on the machines. The Group Policy console does not indicate if the deployment has succeeded or not. - -If you have completed the onboarding process and don't see machines in the [Machines list](investigate-machines-windows-defender-advanced-threat-protection.md) after an hour, you can check the output of the script on the machines. For more information, see [Troubleshoot onboarding when deploying with a script](#troubleshoot-onboarding-when-deploying-with-a-script). - -If the script completes successfully, see [Troubleshoot onboarding issues on the machines](#troubleshoot-onboarding-issues-on-the-machine) for additional errors that might occur. - -## Troubleshoot onboarding issues when deploying with System Center Configuration Manager -When onboarding machines using the following versions of System Center Configuration Manager: -- System Center 2012 Configuration Manager -- System Center 2012 R2 Configuration Manager -- System Center Configuration Manager (current branch) version 1511 -- System Center Configuration Manager (current branch) version 1602 - - -Deployment with the above-mentioned versions of System Center Configuration Manager is done by running the onboarding script on the machines. You can track the deployment in the Configuration Manager Console. - -If the deployment fails, you can check the output of the script on the machines. - -If the onboarding completed successfully but the machines are not showing up in the **Machines list** after an hour, see [Troubleshoot onboarding issues on the machine](#troubleshoot-onboarding-issues-on-the-machine) for additional errors that might occur. - -## Troubleshoot onboarding when deploying with a script - -**Check the result of the script on the machine**: -1. Click **Start**, type **Event Viewer**, and press **Enter**. - -2. Go to **Windows Logs** > **Application**. - -3. Look for an event from **WDATPOnboarding** event source. - -If the script fails and the event is an error, you can check the event ID in the following table to help you troubleshoot the issue. -> [!NOTE] -> The following event IDs are specific to the onboarding script only. - -Event ID | Error Type | Resolution steps -:---|:---|:--- -5 | Offboarding data was found but couldn't be deleted | Check the permissions on the registry, specifically ```HKLM\SOFTWARE\Policies\Microsoft\Windows Advanced Threat Protection```. -10 | Onboarding data couldn't be written to registry | Check the permissions on the registry, specifically
      ```HKLM\SOFTWARE\Policies\Microsoft\Windows Advanced Threat```.
      Verify that the script was ran as an administrator. -15 | Failed to start SENSE service |Check the service health (```sc query sense``` command). Make sure it's not in an intermediate state (*'Pending_Stopped'*, *'Pending_Running'*) and try to run the script again (with administrator rights).

      If the machine is running Windows 10, version 1607 and running the command `sc query sense` returns `START_PENDING`, reboot the machine. If rebooting the machine doesn't address the issue, upgrade to KB4015217 and try onboarding again. -15 | Failed to start SENSE service | If the message of the error is: System error 577 has occurred. You need to enable the Windows Defender Antivirus ELAM driver, see [Ensure that Windows Defender Antivirus is not disabled by a policy](#ensure-that-windows-defender-antivirus-is-not-disabled-by-a-policy) for instructions. -30 | The script failed to wait for the service to start running | The service could have taken more time to start or has encountered errors while trying to start. For more information on events and errors related to SENSE, see [Review events and errors using Event viewer](event-error-codes-windows-defender-advanced-threat-protection.md). -35 | The script failed to find needed onboarding status registry value | When the SENSE service starts for the first time, it writes onboarding status to the registry location
      ```HKLM\SOFTWARE\Microsoft\Windows Advanced Threat Protection\Status```.
      The script failed to find it after several seconds. You can manually test it and check if it's there. For more information on events and errors related to SENSE, see [Review events and errors using Event viewer](event-error-codes-windows-defender-advanced-threat-protection.md). -40 | SENSE service onboarding status is not set to **1** | The SENSE service has failed to onboard properly. For more information on events and errors related to SENSE, see [Review events and errors using Event viewer](event-error-codes-windows-defender-advanced-threat-protection.md). -65 | Insufficient privileges| Run the script again with administrator privileges. - -## Troubleshoot onboarding issues using Microsoft Intune -You can use Microsoft Intune to check error codes and attempt to troubleshoot the cause of the issue. - -If you have configured policies in Intune and they are not propagated on machines, you might need to configure automatic MDM enrollment. - -Use the following tables to understand the possible causes of issues while onboarding: - -- Microsoft Intune error codes and OMA-URIs table -- Known issues with non-compliance table -- Mobile Device Management (MDM) event logs table - -If none of the event logs and troubleshooting steps work, download the Local script from the **Machine management** section of the portal, and run it in an elevated command prompt. - -**Microsoft Intune error codes and OMA-URIs**: - - -Error Code Hex | Error Code Dec | Error Description | OMA-URI | Possible cause and troubleshooting steps -:---|:---|:---|:---|:--- -0x87D1FDE8 | -2016281112 | Remediation failed | Onboarding
      Offboarding | **Possible cause:** Onboarding or offboarding failed on a wrong blob: wrong signature or missing PreviousOrgIds fields.

      **Troubleshooting steps:**
      Check the event IDs in the [View agent onboarding errors in the machine event log](#view-agent-onboarding-errors-in-the-machine-event-log) section.

      Check the MDM event logs in the following table or follow the instructions in [Diagnose MDM failures in Windows 10](https://msdn.microsoft.com/library/windows/hardware/mt632120%28v=vs.85%29.aspx). - | | | | Onboarding
      Offboarding
      SampleSharing | **Possible cause:** Windows Defender ATP Policy registry key does not exist or the OMA DM client doesn't have permissions to write to it.

      **Troubleshooting steps:** Ensure that the following registry key exists: ```HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows Advanced Threat Protection```

      If it doesn't exist, open an elevated command and add the key. - | | | | SenseIsRunning
      OnboardingState
      OrgId | **Possible cause:** An attempt to remediate by read-only property. Onboarding has failed.

      **Troubleshooting steps:** Check the troubleshooting steps in [Troubleshoot onboarding issues on the machine](#troubleshoot-onboarding-issues-on-the-machine).

      Check the MDM event logs in the following table or follow the instructions in [Diagnose MDM failures in Windows 10](https://msdn.microsoft.com/library/windows/hardware/mt632120%28v=vs.85%29.aspx). - || | | All | **Possible cause:** Attempt to deploy Windows Defender ATP on non-supported SKU/Platform, particularly Holographic SKU.

      Currently is supported platforms: Enterprise, Education, and Professional.
      Server is not supported. - 0x87D101A9 | -2016345687 |Syncml(425): The requested command failed because the sender does not have adequate access control permissions (ACL) on the recipient. | All | **Possible cause:** Attempt to deploy Windows Defender ATP on non-supported SKU/Platform, particularly Holographic SKU.

      Currently is supported platforms: Enterprise, Education, and Professional. - -
      -**Known issues with non-compliance** - -The following table provides information on issues with non-compliance and how you can address the issues. - -Case | Symptoms | Possible cause and troubleshooting steps -:---|:---|:--- -1 | Machine is compliant by SenseIsRunning OMA-URI. But is non-compliant by OrgId, Onboarding and OnboardingState OMA-URIs. | **Possible cause:** Check that user passed OOBE after Windows installation or upgrade. During OOBE onboarding couldn't be completed but SENSE is running already.

      **Troubleshooting steps:** Wait for OOBE to complete. -2 | Machine is compliant by OrgId, Onboarding, and OnboardingState OMA-URIs, but is non-compliant by SenseIsRunning OMA-URI. | **Possible cause:** Sense service's startup type is set as "Delayed Start". Sometimes this causes the Microsoft Intune server to report the machine as non-compliant by SenseIsRunning when DM session occurs on system start.

      **Troubleshooting steps:** The issue should automatically be fixed within 24 hours. -3 | Machine is non-compliant | **Troubleshooting steps:** Ensure that Onboarding and Offboarding policies are not deployed on the same machine at same time. - -
      -**Mobile Device Management (MDM) event logs** - -View the MDM event logs to troubleshoot issues that might arise during onboarding: - -Log name: Microsoft\Windows\DeviceManagement-EnterpriseDiagnostics-Provider - -Channel name: Admin - -ID | Severity | Event description | Troubleshooting steps -:---|:---|:---|:--- -1819 | Error | Windows Defender Advanced Threat Protection CSP: Failed to Set Node's Value. NodeId: (%1), TokenName: (%2), Result: (%3). | Download the [Cumulative Update for Windows 10, 1607](https://go.microsoft.com/fwlink/?linkid=829760). - -## Troubleshoot onboarding issues on the machine -If the deployment tools used does not indicate an error in the onboarding process, but machines are still not appearing in the machines list in an hour, go through the following verification topics to check if an error occurred with the Windows Defender ATP agent: -- [View agent onboarding errors in the machine event log](#view-agent-onboarding-errors-in-the-machine-event-log) -- [Ensure the diagnostic data service is enabled](#ensure-the-diagnostics-service-is-enabled) -- [Ensure the service is set to start](#ensure-the-service-is-set-to-start) -- [Ensure the machine has an Internet connection](#ensure-the-machine-has-an-internet-connection) -- [Ensure that Windows Defender Antivirus is not disabled by a policy](#ensure-that-windows-defender-antivirus-is-not-disabled-by-a-policy) - - -### View agent onboarding errors in the machine event log - -1. Click **Start**, type **Event Viewer**, and press **Enter**. - -2. In the **Event Viewer (Local)** pane, expand **Applications and Services Logs** > **Microsoft** > **Windows** > **SENSE**. - - > [!NOTE] - > SENSE is the internal name used to refer to the behavioral sensor that powers Windows Defender ATP. - -3. Select **Operational** to load the log. - -4. In the **Action** pane, click **Filter Current log**. - -5. On the **Filter** tab, under **Event level:** select **Critical**, **Warning**, and **Error**, and click **OK**. - - ![Image of Event Viewer log filter](images/filter-log.png) - -6. Events which can indicate issues will appear in the **Operational** pane. You can attempt to troubleshoot them based on the solutions in the following table: - -Event ID | Message | Resolution steps -:---|:---|:--- -5 | Windows Defender Advanced Threat Protection service failed to connect to the server at _variable_ | [Ensure the machine has Internet access](#ensure-the-machine-has-an-internet-connection). -6 | Windows Defender Advanced Threat Protection service is not onboarded and no onboarding parameters were found. Failure code: _variable_ | [Run the onboarding script again](configure-endpoints-script-windows-defender-advanced-threat-protection.md). -7 | Windows Defender Advanced Threat Protection service failed to read the onboarding parameters. Failure code: _variable_ | [Ensure the machine has Internet access](#ensure-the-machine-has-an-internet-connection), then run the entire onboarding process again. -9 | Windows Defender Advanced Threat Protection service failed to change its start type. Failure code: variable | If the event happened during onboarding, reboot and re-attempt running the onboarding script. For more information, see [Run the onboarding script again](configure-endpoints-script-windows-defender-advanced-threat-protection.md).

      If the event happened during offboarding, contact support. -10 | Windows Defender Advanced Threat Protection service failed to persist the onboarding information. Failure code: variable | If the event happened during onboarding, re-attempt running the onboarding script. For more information, see [Run the onboarding script again](configure-endpoints-script-windows-defender-advanced-threat-protection.md).

      If the problem persists, contact support. -15 | Windows Defender Advanced Threat Protection cannot start command channel with URL: _variable_ | [Ensure the machine has Internet access](#ensure-the-machine-has-an-internet-connection). -17 | Windows Defender Advanced Threat Protection service failed to change the Connected User Experiences and Telemetry service location. Failure code: variable | [Run the onboarding script again](configure-endpoints-script-windows-defender-advanced-threat-protection.md). If the problem persists, contact support. -25 | Windows Defender Advanced Threat Protection service failed to reset health status in the registry. Failure code: _variable_ | Contact support. -27 | Failed to enable Windows Defender Advanced Threat Protection mode in Windows Defender. Onboarding process failed. Failure code: variable | Contact support. -29 | Failed to read the offboarding parameters. Error type: %1, Error code: %2, Description: %3 | Ensure the machine has Internet access, then run the entire offboarding process again. -30 | Failed to disable $(build.sense.productDisplayName) mode in Windows Defender Advanced Threat Protection. Failure code: %1 | Contact support. -32 | $(build.sense.productDisplayName) service failed to request to stop itself after offboarding process. Failure code: %1 | Verify that the service start type is manual and reboot the machine. -55 | Failed to create the Secure ETW autologger. Failure code: %1 | Reboot the machine. -63 | Updating the start type of external service. Name: %1, actual start type: %2, expected start type: %3, exit code: %4 | Identify what is causing changes in start type of mentioned service. If the exit code is not 0, fix the start type manually to expected start type. -64 | Starting stopped external service. Name: %1, exit code: %2 | Contact support if the event keeps re-appearing. -68 | The start type of the service is unexpected. Service name: %1, actual start type: %2, expected start type: %3 | Identify what is causing changes in start type. Fix mentioned service start type. -69 | The service is stopped. Service name: %1 | Start the mentioned service. Contact support if persists. - -
      -There are additional components on the machine that the Windows Defender ATP agent depends on to function properly. If there are no onboarding related errors in the Windows Defender ATP agent event log, proceed with the following steps to ensure that the additional components are configured correctly. - - -### Ensure the diagnostic data service is enabled -If the machines aren't reporting correctly, you might need to check that the Windows 10 diagnostic data service is set to automatically start and is running on the machine. The service might have been disabled by other programs or user configuration changes. - -First, you should check that the service is set to start automatically when Windows starts, then you should check that the service is currently running (and start it if it isn't). - -### Ensure the service is set to start - -**Use the command line to check the Windows 10 diagnostic data service startup type**: - -1. Open an elevated command-line prompt on the machine: - - a. Click **Start**, type **cmd**, and press **Enter**. - - b. Right-click **Command prompt** and select **Run as administrator**. - -2. Enter the following command, and press **Enter**: - - ```text - sc qc diagtrack - ``` - - If the service is enabled, then the result should look like the following screenshot: - - ![Result of the sc query command for diagtrack](images/windefatp-sc-qc-diagtrack.png) - - If the `START_TYPE` is not set to `AUTO_START`, then you'll need to set the service to automatically start. - - -**Use the command line to set the Windows 10 diagnostic data service to automatically start:** - -1. Open an elevated command-line prompt on the machine: - - a. Click **Start**, type **cmd**, and press **Enter**. - - b. Right-click **Command prompt** and select **Run as administrator**. - -2. Enter the following command, and press **Enter**: - - ```text - sc config diagtrack start=auto - ``` - -3. A success message is displayed. Verify the change by entering the following command, and press **Enter**: - - ```text - sc qc diagtrack - ``` - -4. Start the service. - - a. In the command prompt, type the following command and press **Enter**: - - ```text - sc start diagtrack - ``` - -### Ensure the machine has an Internet connection - -The Window Defender ATP sensor requires Microsoft Windows HTTP (WinHTTP) to report sensor data and communicate with the Windows Defender ATP service. - -WinHTTP is independent of the Internet browsing proxy settings and other user context applications and must be able to detect the proxy servers that are available in your particular environment. - -To ensure that sensor has service connectivity, follow the steps described in the [Verify client connectivity to Windows Defender ATP service URLs](configure-proxy-internet-windows-defender-advanced-threat-protection.md#verify-client-connectivity-to-windows-defender-atp-service-urls) topic. - -If the verification fails and your environment is using a proxy to connect to the Internet, then follow the steps described in [Configure proxy and Internet connectivity settings](configure-proxy-internet-windows-defender-advanced-threat-protection.md) topic. - -### Ensure that Windows Defender Antivirus is not disabled by a policy -**Problem**: The Windows Defender ATP service does not start after onboarding. - -**Symptom**: Onboarding successfully completes, but you see error 577 when trying to start the service. - -**Solution**: If your machines are running a third-party antimalware client, the Windows Defender ATP agent needs the Windows Defender Early Launch Antimalware (ELAM) driver to be enabled. You must ensure that it's not disabled in system policy. - -- Depending on the tool that you use to implement policies, you'll need to verify that the following Windows Defender policies are cleared: - - - DisableAntiSpyware - - DisableAntiVirus - - For example, in Group Policy there should be no entries such as the following values: - - - `````` - - `````` -- After clearing the policy, run the onboarding steps again. - -- You can also check the following registry key values to verify that the policy is disabled: - - 1. Open the registry ```key HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender```. - 2. Ensure that the value ```DisableAntiSpyware``` is not present. - - ![Image of registry key for Windows Defender Antivirus](images/atp-disableantispyware-regkey.png) - - -## Troubleshoot onboarding issues on a server -If you encounter issues while onboarding a server, go through the following verification steps to address possible issues. - -- [Ensure Microsoft Monitoring Agent (MMA) is installed and configured to report sensor data to the service](configure-server-endpoints-windows-defender-advanced-threat-protection.md#server-mma) -- [Ensure that the server proxy and Internet connectivity settings are configured properly](configure-server-endpoints-windows-defender-advanced-threat-protection.md#server-proxy) - -You might also need to check the following: -- Check that there is a Windows Defender Advanced Threat Protection Service running in the **Processes** tab in **Task Manager**. For example: - - ![Image of process view with Windows Defender Advanced Threat Protection Service running](images/atp-task-manager.png) - -- Check **Event Viewer** > **Applications and Services Logs** > **Operation Manager** to see if there are any errors. - -- In **Services**, check if the **Microsoft Monitoring Agent** is running on the server. For example, - - ![Image of Services](images/atp-services.png) - -- In **Microsoft Monitoring Agent** > **Azure Log Analytics (OMS)**, check the Workspaces and verify that the status is running. - - ![Image of Microsoft Monitoring Agent Properties](images/atp-mma-properties.png) - -- Check to see that machines are reflected in the **Machines list** in the portal. - - -## Licensing requirements -Windows Defender Advanced Threat Protection requires one of the following Microsoft Volume Licensing offers: - - - Windows 10 Enterprise E5 - - Windows 10 Education E5 - - Microsoft 365 Enterprise E5 which includes Windows 10 Enterprise E5 - -For more information, see [Windows 10 Licensing](https://www.microsoft.com/en-us/Licensing/product-licensing/windows10.aspx#tab=2). - - ->Want to experience Windows Defender ATP? [Sign up for a free trial.](https://www.microsoft.com/en-us/WindowsForBusiness/windows-atp?ocid=docs-wdatp-troubleshootonboarding-belowfoldlink) - - -## Related topics -- [Troubleshoot Windows Defender ATP](troubleshoot-windows-defender-advanced-threat-protection.md) -- [Onboard machines](onboard-configure-windows-defender-advanced-threat-protection.md) -- [Configure machine proxy and Internet connectivity settings](configure-proxy-internet-windows-defender-advanced-threat-protection.md) - +--- +title: Troubleshoot Windows Defender ATP onboarding issues +description: Troubleshoot issues that might arise during the onboarding of machines or to the Windows Defender ATP service. +keywords: troubleshoot onboarding, onboarding issues, event viewer, data collection and preview builds, sensor data and diagnostics +search.product: eADQiWindows 10XVcnh +search.appverid: met150 +ms.prod: w10 +ms.mktglfcycl: deploy +ms.sitesec: library +ms.pagetype: security +ms.author: macapara +author: mjcaparas +ms.localizationpriority: medium +manager: dansimp +audience: ITPro +ms.collection: M365-security-compliance +ms.topic: troubleshooting +--- + +# Troubleshoot Windows Defender Advanced Threat Protection onboarding issues + +**Applies to:** +- [Windows Defender Advanced Threat Protection (Windows Defender ATP)](https://go.microsoft.com/fwlink/p/?linkid=2069559) +- Windows Server 2012 R2 +- Windows Server 2016 + + + +You might need to troubleshoot the Windows Defender ATP onboarding process if you encounter issues. +This page provides detailed steps to troubleshoot onboarding issues that might occur when deploying with one of the deployment tools and common errors that might occur on the machines. + +If you have completed the onboarding process and don't see machines in the [Machines list](investigate-machines-windows-defender-advanced-threat-protection.md) after an hour, it might indicate an onboarding or connectivity problem. + +## Troubleshoot onboarding when deploying with Group Policy +Deployment with Group Policy is done by running the onboarding script on the machines. The Group Policy console does not indicate if the deployment has succeeded or not. + +If you have completed the onboarding process and don't see machines in the [Machines list](investigate-machines-windows-defender-advanced-threat-protection.md) after an hour, you can check the output of the script on the machines. For more information, see [Troubleshoot onboarding when deploying with a script](#troubleshoot-onboarding-when-deploying-with-a-script). + +If the script completes successfully, see [Troubleshoot onboarding issues on the machines](#troubleshoot-onboarding-issues-on-the-machine) for additional errors that might occur. + +## Troubleshoot onboarding issues when deploying with System Center Configuration Manager +When onboarding machines using the following versions of System Center Configuration Manager: +- System Center 2012 Configuration Manager +- System Center 2012 R2 Configuration Manager +- System Center Configuration Manager (current branch) version 1511 +- System Center Configuration Manager (current branch) version 1602 + + +Deployment with the above-mentioned versions of System Center Configuration Manager is done by running the onboarding script on the machines. You can track the deployment in the Configuration Manager Console. + +If the deployment fails, you can check the output of the script on the machines. + +If the onboarding completed successfully but the machines are not showing up in the **Machines list** after an hour, see [Troubleshoot onboarding issues on the machine](#troubleshoot-onboarding-issues-on-the-machine) for additional errors that might occur. + +## Troubleshoot onboarding when deploying with a script + +**Check the result of the script on the machine**: +1. Click **Start**, type **Event Viewer**, and press **Enter**. + +2. Go to **Windows Logs** > **Application**. + +3. Look for an event from **WDATPOnboarding** event source. + +If the script fails and the event is an error, you can check the event ID in the following table to help you troubleshoot the issue. +> [!NOTE] +> The following event IDs are specific to the onboarding script only. + +Event ID | Error Type | Resolution steps +:---|:---|:--- +5 | Offboarding data was found but couldn't be deleted | Check the permissions on the registry, specifically ```HKLM\SOFTWARE\Policies\Microsoft\Windows Advanced Threat Protection```. +10 | Onboarding data couldn't be written to registry | Check the permissions on the registry, specifically
      ```HKLM\SOFTWARE\Policies\Microsoft\Windows Advanced Threat```.
      Verify that the script was ran as an administrator. +15 | Failed to start SENSE service |Check the service health (```sc query sense``` command). Make sure it's not in an intermediate state (*'Pending_Stopped'*, *'Pending_Running'*) and try to run the script again (with administrator rights).

      If the machine is running Windows 10, version 1607 and running the command `sc query sense` returns `START_PENDING`, reboot the machine. If rebooting the machine doesn't address the issue, upgrade to KB4015217 and try onboarding again. +15 | Failed to start SENSE service | If the message of the error is: System error 577 has occurred. You need to enable the Windows Defender Antivirus ELAM driver, see [Ensure that Windows Defender Antivirus is not disabled by a policy](#ensure-that-windows-defender-antivirus-is-not-disabled-by-a-policy) for instructions. +30 | The script failed to wait for the service to start running | The service could have taken more time to start or has encountered errors while trying to start. For more information on events and errors related to SENSE, see [Review events and errors using Event viewer](event-error-codes-windows-defender-advanced-threat-protection.md). +35 | The script failed to find needed onboarding status registry value | When the SENSE service starts for the first time, it writes onboarding status to the registry location
      ```HKLM\SOFTWARE\Microsoft\Windows Advanced Threat Protection\Status```.
      The script failed to find it after several seconds. You can manually test it and check if it's there. For more information on events and errors related to SENSE, see [Review events and errors using Event viewer](event-error-codes-windows-defender-advanced-threat-protection.md). +40 | SENSE service onboarding status is not set to **1** | The SENSE service has failed to onboard properly. For more information on events and errors related to SENSE, see [Review events and errors using Event viewer](event-error-codes-windows-defender-advanced-threat-protection.md). +65 | Insufficient privileges| Run the script again with administrator privileges. + +## Troubleshoot onboarding issues using Microsoft Intune +You can use Microsoft Intune to check error codes and attempt to troubleshoot the cause of the issue. + +If you have configured policies in Intune and they are not propagated on machines, you might need to configure automatic MDM enrollment. + +Use the following tables to understand the possible causes of issues while onboarding: + +- Microsoft Intune error codes and OMA-URIs table +- Known issues with non-compliance table +- Mobile Device Management (MDM) event logs table + +If none of the event logs and troubleshooting steps work, download the Local script from the **Machine management** section of the portal, and run it in an elevated command prompt. + +**Microsoft Intune error codes and OMA-URIs**: + + +Error Code Hex | Error Code Dec | Error Description | OMA-URI | Possible cause and troubleshooting steps +:---|:---|:---|:---|:--- +0x87D1FDE8 | -2016281112 | Remediation failed | Onboarding
      Offboarding | **Possible cause:** Onboarding or offboarding failed on a wrong blob: wrong signature or missing PreviousOrgIds fields.

      **Troubleshooting steps:**
      Check the event IDs in the [View agent onboarding errors in the machine event log](#view-agent-onboarding-errors-in-the-machine-event-log) section.

      Check the MDM event logs in the following table or follow the instructions in [Diagnose MDM failures in Windows 10](https://msdn.microsoft.com/library/windows/hardware/mt632120%28v=vs.85%29.aspx). + | | | | Onboarding
      Offboarding
      SampleSharing | **Possible cause:** Windows Defender ATP Policy registry key does not exist or the OMA DM client doesn't have permissions to write to it.

      **Troubleshooting steps:** Ensure that the following registry key exists: ```HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows Advanced Threat Protection```

      If it doesn't exist, open an elevated command and add the key. + | | | | SenseIsRunning
      OnboardingState
      OrgId | **Possible cause:** An attempt to remediate by read-only property. Onboarding has failed.

      **Troubleshooting steps:** Check the troubleshooting steps in [Troubleshoot onboarding issues on the machine](#troubleshoot-onboarding-issues-on-the-machine).

      Check the MDM event logs in the following table or follow the instructions in [Diagnose MDM failures in Windows 10](https://msdn.microsoft.com/library/windows/hardware/mt632120%28v=vs.85%29.aspx). + || | | All | **Possible cause:** Attempt to deploy Windows Defender ATP on non-supported SKU/Platform, particularly Holographic SKU.

      Currently is supported platforms: Enterprise, Education, and Professional.
      Server is not supported. + 0x87D101A9 | -2016345687 |Syncml(425): The requested command failed because the sender does not have adequate access control permissions (ACL) on the recipient. | All | **Possible cause:** Attempt to deploy Windows Defender ATP on non-supported SKU/Platform, particularly Holographic SKU.

      Currently is supported platforms: Enterprise, Education, and Professional. + +
      +**Known issues with non-compliance** + +The following table provides information on issues with non-compliance and how you can address the issues. + +Case | Symptoms | Possible cause and troubleshooting steps +:---|:---|:--- +1 | Machine is compliant by SenseIsRunning OMA-URI. But is non-compliant by OrgId, Onboarding and OnboardingState OMA-URIs. | **Possible cause:** Check that user passed OOBE after Windows installation or upgrade. During OOBE onboarding couldn't be completed but SENSE is running already.

      **Troubleshooting steps:** Wait for OOBE to complete. +2 | Machine is compliant by OrgId, Onboarding, and OnboardingState OMA-URIs, but is non-compliant by SenseIsRunning OMA-URI. | **Possible cause:** Sense service's startup type is set as "Delayed Start". Sometimes this causes the Microsoft Intune server to report the machine as non-compliant by SenseIsRunning when DM session occurs on system start.

      **Troubleshooting steps:** The issue should automatically be fixed within 24 hours. +3 | Machine is non-compliant | **Troubleshooting steps:** Ensure that Onboarding and Offboarding policies are not deployed on the same machine at same time. + +
      +**Mobile Device Management (MDM) event logs** + +View the MDM event logs to troubleshoot issues that might arise during onboarding: + +Log name: Microsoft\Windows\DeviceManagement-EnterpriseDiagnostics-Provider + +Channel name: Admin + +ID | Severity | Event description | Troubleshooting steps +:---|:---|:---|:--- +1819 | Error | Windows Defender Advanced Threat Protection CSP: Failed to Set Node's Value. NodeId: (%1), TokenName: (%2), Result: (%3). | Download the [Cumulative Update for Windows 10, 1607](https://go.microsoft.com/fwlink/?linkid=829760). + +## Troubleshoot onboarding issues on the machine +If the deployment tools used does not indicate an error in the onboarding process, but machines are still not appearing in the machines list in an hour, go through the following verification topics to check if an error occurred with the Windows Defender ATP agent: +- [View agent onboarding errors in the machine event log](#view-agent-onboarding-errors-in-the-machine-event-log) +- [Ensure the diagnostic data service is enabled](#ensure-the-diagnostics-service-is-enabled) +- [Ensure the service is set to start](#ensure-the-service-is-set-to-start) +- [Ensure the machine has an Internet connection](#ensure-the-machine-has-an-internet-connection) +- [Ensure that Windows Defender Antivirus is not disabled by a policy](#ensure-that-windows-defender-antivirus-is-not-disabled-by-a-policy) + + +### View agent onboarding errors in the machine event log + +1. Click **Start**, type **Event Viewer**, and press **Enter**. + +2. In the **Event Viewer (Local)** pane, expand **Applications and Services Logs** > **Microsoft** > **Windows** > **SENSE**. + + > [!NOTE] + > SENSE is the internal name used to refer to the behavioral sensor that powers Windows Defender ATP. + +3. Select **Operational** to load the log. + +4. In the **Action** pane, click **Filter Current log**. + +5. On the **Filter** tab, under **Event level:** select **Critical**, **Warning**, and **Error**, and click **OK**. + + ![Image of Event Viewer log filter](images/filter-log.png) + +6. Events which can indicate issues will appear in the **Operational** pane. You can attempt to troubleshoot them based on the solutions in the following table: + +Event ID | Message | Resolution steps +:---|:---|:--- +5 | Windows Defender Advanced Threat Protection service failed to connect to the server at _variable_ | [Ensure the machine has Internet access](#ensure-the-machine-has-an-internet-connection). +6 | Windows Defender Advanced Threat Protection service is not onboarded and no onboarding parameters were found. Failure code: _variable_ | [Run the onboarding script again](configure-endpoints-script-windows-defender-advanced-threat-protection.md). +7 | Windows Defender Advanced Threat Protection service failed to read the onboarding parameters. Failure code: _variable_ | [Ensure the machine has Internet access](#ensure-the-machine-has-an-internet-connection), then run the entire onboarding process again. +9 | Windows Defender Advanced Threat Protection service failed to change its start type. Failure code: variable | If the event happened during onboarding, reboot and re-attempt running the onboarding script. For more information, see [Run the onboarding script again](configure-endpoints-script-windows-defender-advanced-threat-protection.md).

      If the event happened during offboarding, contact support. +10 | Windows Defender Advanced Threat Protection service failed to persist the onboarding information. Failure code: variable | If the event happened during onboarding, re-attempt running the onboarding script. For more information, see [Run the onboarding script again](configure-endpoints-script-windows-defender-advanced-threat-protection.md).

      If the problem persists, contact support. +15 | Windows Defender Advanced Threat Protection cannot start command channel with URL: _variable_ | [Ensure the machine has Internet access](#ensure-the-machine-has-an-internet-connection). +17 | Windows Defender Advanced Threat Protection service failed to change the Connected User Experiences and Telemetry service location. Failure code: variable | [Run the onboarding script again](configure-endpoints-script-windows-defender-advanced-threat-protection.md). If the problem persists, contact support. +25 | Windows Defender Advanced Threat Protection service failed to reset health status in the registry. Failure code: _variable_ | Contact support. +27 | Failed to enable Windows Defender Advanced Threat Protection mode in Windows Defender. Onboarding process failed. Failure code: variable | Contact support. +29 | Failed to read the offboarding parameters. Error type: %1, Error code: %2, Description: %3 | Ensure the machine has Internet access, then run the entire offboarding process again. +30 | Failed to disable $(build.sense.productDisplayName) mode in Windows Defender Advanced Threat Protection. Failure code: %1 | Contact support. +32 | $(build.sense.productDisplayName) service failed to request to stop itself after offboarding process. Failure code: %1 | Verify that the service start type is manual and reboot the machine. +55 | Failed to create the Secure ETW autologger. Failure code: %1 | Reboot the machine. +63 | Updating the start type of external service. Name: %1, actual start type: %2, expected start type: %3, exit code: %4 | Identify what is causing changes in start type of mentioned service. If the exit code is not 0, fix the start type manually to expected start type. +64 | Starting stopped external service. Name: %1, exit code: %2 | Contact support if the event keeps re-appearing. +68 | The start type of the service is unexpected. Service name: %1, actual start type: %2, expected start type: %3 | Identify what is causing changes in start type. Fix mentioned service start type. +69 | The service is stopped. Service name: %1 | Start the mentioned service. Contact support if persists. + +
      +There are additional components on the machine that the Windows Defender ATP agent depends on to function properly. If there are no onboarding related errors in the Windows Defender ATP agent event log, proceed with the following steps to ensure that the additional components are configured correctly. + + +### Ensure the diagnostic data service is enabled +If the machines aren't reporting correctly, you might need to check that the Windows 10 diagnostic data service is set to automatically start and is running on the machine. The service might have been disabled by other programs or user configuration changes. + +First, you should check that the service is set to start automatically when Windows starts, then you should check that the service is currently running (and start it if it isn't). + +### Ensure the service is set to start + +**Use the command line to check the Windows 10 diagnostic data service startup type**: + +1. Open an elevated command-line prompt on the machine: + + a. Click **Start**, type **cmd**, and press **Enter**. + + b. Right-click **Command prompt** and select **Run as administrator**. + +2. Enter the following command, and press **Enter**: + + ```text + sc qc diagtrack + ``` + + If the service is enabled, then the result should look like the following screenshot: + + ![Result of the sc query command for diagtrack](images/windefatp-sc-qc-diagtrack.png) + + If the `START_TYPE` is not set to `AUTO_START`, then you'll need to set the service to automatically start. + + +**Use the command line to set the Windows 10 diagnostic data service to automatically start:** + +1. Open an elevated command-line prompt on the machine: + + a. Click **Start**, type **cmd**, and press **Enter**. + + b. Right-click **Command prompt** and select **Run as administrator**. + +2. Enter the following command, and press **Enter**: + + ```text + sc config diagtrack start=auto + ``` + +3. A success message is displayed. Verify the change by entering the following command, and press **Enter**: + + ```text + sc qc diagtrack + ``` + +4. Start the service. + + a. In the command prompt, type the following command and press **Enter**: + + ```text + sc start diagtrack + ``` + +### Ensure the machine has an Internet connection + +The Window Defender ATP sensor requires Microsoft Windows HTTP (WinHTTP) to report sensor data and communicate with the Windows Defender ATP service. + +WinHTTP is independent of the Internet browsing proxy settings and other user context applications and must be able to detect the proxy servers that are available in your particular environment. + +To ensure that sensor has service connectivity, follow the steps described in the [Verify client connectivity to Windows Defender ATP service URLs](configure-proxy-internet-windows-defender-advanced-threat-protection.md#verify-client-connectivity-to-windows-defender-atp-service-urls) topic. + +If the verification fails and your environment is using a proxy to connect to the Internet, then follow the steps described in [Configure proxy and Internet connectivity settings](configure-proxy-internet-windows-defender-advanced-threat-protection.md) topic. + +### Ensure that Windows Defender Antivirus is not disabled by a policy +**Problem**: The Windows Defender ATP service does not start after onboarding. + +**Symptom**: Onboarding successfully completes, but you see error 577 when trying to start the service. + +**Solution**: If your machines are running a third-party antimalware client, the Windows Defender ATP agent needs the Windows Defender Early Launch Antimalware (ELAM) driver to be enabled. You must ensure that it's not disabled in system policy. + +- Depending on the tool that you use to implement policies, you'll need to verify that the following Windows Defender policies are cleared: + + - DisableAntiSpyware + - DisableAntiVirus + + For example, in Group Policy there should be no entries such as the following values: + + - `````` + - `````` +- After clearing the policy, run the onboarding steps again. + +- You can also check the following registry key values to verify that the policy is disabled: + + 1. Open the registry ```key HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender```. + 2. Ensure that the value ```DisableAntiSpyware``` is not present. + + ![Image of registry key for Windows Defender Antivirus](images/atp-disableantispyware-regkey.png) + + +## Troubleshoot onboarding issues on a server +If you encounter issues while onboarding a server, go through the following verification steps to address possible issues. + +- [Ensure Microsoft Monitoring Agent (MMA) is installed and configured to report sensor data to the service](configure-server-endpoints-windows-defender-advanced-threat-protection.md#server-mma) +- [Ensure that the server proxy and Internet connectivity settings are configured properly](configure-server-endpoints-windows-defender-advanced-threat-protection.md#server-proxy) + +You might also need to check the following: +- Check that there is a Windows Defender Advanced Threat Protection Service running in the **Processes** tab in **Task Manager**. For example: + + ![Image of process view with Windows Defender Advanced Threat Protection Service running](images/atp-task-manager.png) + +- Check **Event Viewer** > **Applications and Services Logs** > **Operation Manager** to see if there are any errors. + +- In **Services**, check if the **Microsoft Monitoring Agent** is running on the server. For example, + + ![Image of Services](images/atp-services.png) + +- In **Microsoft Monitoring Agent** > **Azure Log Analytics (OMS)**, check the Workspaces and verify that the status is running. + + ![Image of Microsoft Monitoring Agent Properties](images/atp-mma-properties.png) + +- Check to see that machines are reflected in the **Machines list** in the portal. + + +## Licensing requirements +Windows Defender Advanced Threat Protection requires one of the following Microsoft Volume Licensing offers: + + - Windows 10 Enterprise E5 + - Windows 10 Education E5 + - Microsoft 365 Enterprise E5 which includes Windows 10 Enterprise E5 + +For more information, see [Windows 10 Licensing](https://www.microsoft.com/en-us/Licensing/product-licensing/windows10.aspx#tab=2). + + +>Want to experience Windows Defender ATP? [Sign up for a free trial.](https://www.microsoft.com/en-us/WindowsForBusiness/windows-atp?ocid=docs-wdatp-troubleshootonboarding-belowfoldlink) + + +## Related topics +- [Troubleshoot Windows Defender ATP](troubleshoot-windows-defender-advanced-threat-protection.md) +- [Onboard machines](onboard-configure-windows-defender-advanced-threat-protection.md) +- [Configure machine proxy and Internet connectivity settings](configure-proxy-internet-windows-defender-advanced-threat-protection.md) + diff --git a/windows/security/threat-protection/windows-defender-atp/troubleshoot-siem-windows-defender-advanced-threat-protection.md b/windows/security/threat-protection/microsoft-defender-atp/troubleshoot-siem-windows-defender-advanced-threat-protection.md similarity index 100% rename from windows/security/threat-protection/windows-defender-atp/troubleshoot-siem-windows-defender-advanced-threat-protection.md rename to windows/security/threat-protection/microsoft-defender-atp/troubleshoot-siem-windows-defender-advanced-threat-protection.md diff --git a/windows/security/threat-protection/windows-defender-atp/troubleshoot-wdatp.md b/windows/security/threat-protection/microsoft-defender-atp/troubleshoot-wdatp.md similarity index 100% rename from windows/security/threat-protection/windows-defender-atp/troubleshoot-wdatp.md rename to windows/security/threat-protection/microsoft-defender-atp/troubleshoot-wdatp.md diff --git a/windows/security/threat-protection/windows-defender-atp/troubleshoot-windows-defender-advanced-threat-protection.md b/windows/security/threat-protection/microsoft-defender-atp/troubleshoot-windows-defender-advanced-threat-protection.md similarity index 100% rename from windows/security/threat-protection/windows-defender-atp/troubleshoot-windows-defender-advanced-threat-protection.md rename to windows/security/threat-protection/microsoft-defender-atp/troubleshoot-windows-defender-advanced-threat-protection.md diff --git a/windows/security/threat-protection/windows-defender-atp/unisolate-machine-windows-defender-advanced-threat-protection-new.md b/windows/security/threat-protection/microsoft-defender-atp/unisolate-machine-windows-defender-advanced-threat-protection-new.md similarity index 100% rename from windows/security/threat-protection/windows-defender-atp/unisolate-machine-windows-defender-advanced-threat-protection-new.md rename to windows/security/threat-protection/microsoft-defender-atp/unisolate-machine-windows-defender-advanced-threat-protection-new.md diff --git a/windows/security/threat-protection/windows-defender-atp/unrestrict-code-execution-windows-defender-advanced-threat-protection-new.md b/windows/security/threat-protection/microsoft-defender-atp/unrestrict-code-execution-windows-defender-advanced-threat-protection-new.md similarity index 100% rename from windows/security/threat-protection/windows-defender-atp/unrestrict-code-execution-windows-defender-advanced-threat-protection-new.md rename to windows/security/threat-protection/microsoft-defender-atp/unrestrict-code-execution-windows-defender-advanced-threat-protection-new.md diff --git a/windows/security/threat-protection/windows-defender-atp/update-alert-windows-defender-advanced-threat-protection-new.md b/windows/security/threat-protection/microsoft-defender-atp/update-alert-windows-defender-advanced-threat-protection-new.md similarity index 100% rename from windows/security/threat-protection/windows-defender-atp/update-alert-windows-defender-advanced-threat-protection-new.md rename to windows/security/threat-protection/microsoft-defender-atp/update-alert-windows-defender-advanced-threat-protection-new.md diff --git a/windows/security/threat-protection/windows-defender-atp/use-apis.md b/windows/security/threat-protection/microsoft-defender-atp/use-apis.md similarity index 100% rename from windows/security/threat-protection/windows-defender-atp/use-apis.md rename to windows/security/threat-protection/microsoft-defender-atp/use-apis.md diff --git a/windows/security/threat-protection/windows-defender-atp/use-custom-ti-windows-defender-advanced-threat-protection.md b/windows/security/threat-protection/microsoft-defender-atp/use-custom-ti-windows-defender-advanced-threat-protection.md similarity index 100% rename from windows/security/threat-protection/windows-defender-atp/use-custom-ti-windows-defender-advanced-threat-protection.md rename to windows/security/threat-protection/microsoft-defender-atp/use-custom-ti-windows-defender-advanced-threat-protection.md diff --git a/windows/security/threat-protection/windows-defender-atp/use-windows-defender-advanced-threat-protection.md b/windows/security/threat-protection/microsoft-defender-atp/use-windows-defender-advanced-threat-protection.md similarity index 100% rename from windows/security/threat-protection/windows-defender-atp/use-windows-defender-advanced-threat-protection.md rename to windows/security/threat-protection/microsoft-defender-atp/use-windows-defender-advanced-threat-protection.md diff --git a/windows/security/threat-protection/windows-defender-atp/user-roles-windows-defender-advanced-threat-protection.md b/windows/security/threat-protection/microsoft-defender-atp/user-roles-windows-defender-advanced-threat-protection.md similarity index 100% rename from windows/security/threat-protection/windows-defender-atp/user-roles-windows-defender-advanced-threat-protection.md rename to windows/security/threat-protection/microsoft-defender-atp/user-roles-windows-defender-advanced-threat-protection.md diff --git a/windows/security/threat-protection/windows-defender-atp/user-windows-defender-advanced-threat-protection-new.md b/windows/security/threat-protection/microsoft-defender-atp/user-windows-defender-advanced-threat-protection-new.md similarity index 100% rename from windows/security/threat-protection/windows-defender-atp/user-windows-defender-advanced-threat-protection-new.md rename to windows/security/threat-protection/microsoft-defender-atp/user-windows-defender-advanced-threat-protection-new.md diff --git a/windows/security/threat-protection/windows-defender-atp/view-incidents-queue.md b/windows/security/threat-protection/microsoft-defender-atp/view-incidents-queue.md similarity index 100% rename from windows/security/threat-protection/windows-defender-atp/view-incidents-queue.md rename to windows/security/threat-protection/microsoft-defender-atp/view-incidents-queue.md diff --git a/windows/security/threat-protection/windows-defender-atp/whats-new-in-windows-defender-atp.md b/windows/security/threat-protection/microsoft-defender-atp/whats-new-in-windows-defender-atp.md similarity index 100% rename from windows/security/threat-protection/windows-defender-atp/whats-new-in-windows-defender-atp.md rename to windows/security/threat-protection/microsoft-defender-atp/whats-new-in-windows-defender-atp.md diff --git a/windows/security/threat-protection/windows-defender-atp/windows-defender-advanced-threat-protection.md b/windows/security/threat-protection/microsoft-defender-atp/windows-defender-advanced-threat-protection.md similarity index 100% rename from windows/security/threat-protection/windows-defender-atp/windows-defender-advanced-threat-protection.md rename to windows/security/threat-protection/microsoft-defender-atp/windows-defender-advanced-threat-protection.md diff --git a/windows/security/threat-protection/windows-defender-atp/windows-defender-security-center-atp.md b/windows/security/threat-protection/microsoft-defender-atp/windows-defender-security-center-atp.md similarity index 100% rename from windows/security/threat-protection/windows-defender-atp/windows-defender-security-center-atp.md rename to windows/security/threat-protection/microsoft-defender-atp/windows-defender-security-center-atp.md From 16f21c04d15ecb6ac56b1af4caf6cd7ab0984a1a Mon Sep 17 00:00:00 2001 From: Joey Caparas Date: Wed, 10 Apr 2019 13:51:55 -0700 Subject: [PATCH 137/724] in tp toc - change wdatp/ to mdatp --- windows/security/threat-protection/TOC.md | 426 +++++++++++----------- 1 file changed, 213 insertions(+), 213 deletions(-) diff --git a/windows/security/threat-protection/TOC.md b/windows/security/threat-protection/TOC.md index caec919411..16acd664ab 100644 --- a/windows/security/threat-protection/TOC.md +++ b/windows/security/threat-protection/TOC.md @@ -1,10 +1,10 @@ # [Threat protection](index.md) -## [Windows Defender Advanced Threat Protection](windows-defender-atp/windows-defender-advanced-threat-protection.md) +## [Windows Defender Advanced Threat Protection](microsoft-defender-atp/windows-defender-advanced-threat-protection.md) -### [Overview](windows-defender-atp/overview.md) -#### [Attack surface reduction](windows-defender-atp/overview-attack-surface-reduction.md) -##### [Hardware-based isolation](windows-defender-atp/overview-hardware-based-isolation.md) +### [Overview](microsoft-defender-atp/overview.md) +#### [Attack surface reduction](microsoft-defender-atp/overview-attack-surface-reduction.md) +##### [Hardware-based isolation](microsoft-defender-atp/overview-hardware-based-isolation.md) ###### [Application isolation](windows-defender-application-guard/wd-app-guard-overview.md) ####### [System requirements](windows-defender-application-guard/reqs-wd-app-guard.md) ###### [System integrity](windows-defender-system-guard/system-guard-how-hardware-based-root-of-trust-helps-protect-windows.md) @@ -15,104 +15,104 @@ ##### [Attack surface reduction](windows-defender-exploit-guard/attack-surface-reduction-exploit-guard.md) ##### [Network firewall](windows-firewall/windows-firewall-with-advanced-security.md) #### [Next generation protection](windows-defender-antivirus/windows-defender-antivirus-in-windows-10.md) -#### [Endpoint detection and response](windows-defender-atp/overview-endpoint-detection-response.md) -##### [Security operations dashboard](windows-defender-atp/security-operations-dashboard-windows-defender-advanced-threat-protection.md) +#### [Endpoint detection and response](microsoft-defender-atp/overview-endpoint-detection-response.md) +##### [Security operations dashboard](microsoft-defender-atp/security-operations-dashboard-windows-defender-advanced-threat-protection.md) -##### [Incidents queue](windows-defender-atp/incidents-queue.md) -###### [View and organize the Incidents queue](windows-defender-atp/view-incidents-queue.md) -###### [Manage incidents](windows-defender-atp/manage-incidents-windows-defender-advanced-threat-protection.md) -###### [Investigate incidents](windows-defender-atp/investigate-incidents-windows-defender-advanced-threat-protection.md) +##### [Incidents queue](microsoft-defender-atp/incidents-queue.md) +###### [View and organize the Incidents queue](microsoft-defender-atp/view-incidents-queue.md) +###### [Manage incidents](microsoft-defender-atp/manage-incidents-windows-defender-advanced-threat-protection.md) +###### [Investigate incidents](microsoft-defender-atp/investigate-incidents-windows-defender-advanced-threat-protection.md) ##### Alerts queue -###### [View and organize the Alerts queue](windows-defender-atp/alerts-queue-windows-defender-advanced-threat-protection.md) -###### [Manage alerts](windows-defender-atp/manage-alerts-windows-defender-advanced-threat-protection.md) -###### [Investigate alerts](windows-defender-atp/investigate-alerts-windows-defender-advanced-threat-protection.md) -###### [Investigate files](windows-defender-atp/investigate-files-windows-defender-advanced-threat-protection.md) -###### [Investigate machines](windows-defender-atp/investigate-machines-windows-defender-advanced-threat-protection.md) -###### [Investigate an IP address](windows-defender-atp/investigate-ip-windows-defender-advanced-threat-protection.md) -###### [Investigate a domain](windows-defender-atp/investigate-domain-windows-defender-advanced-threat-protection.md) -###### [Investigate a user account](windows-defender-atp/investigate-user-windows-defender-advanced-threat-protection.md) +###### [View and organize the Alerts queue](microsoft-defender-atp/alerts-queue-windows-defender-advanced-threat-protection.md) +###### [Manage alerts](microsoft-defender-atp/manage-alerts-windows-defender-advanced-threat-protection.md) +###### [Investigate alerts](microsoft-defender-atp/investigate-alerts-windows-defender-advanced-threat-protection.md) +###### [Investigate files](microsoft-defender-atp/investigate-files-windows-defender-advanced-threat-protection.md) +###### [Investigate machines](microsoft-defender-atp/investigate-machines-windows-defender-advanced-threat-protection.md) +###### [Investigate an IP address](microsoft-defender-atp/investigate-ip-windows-defender-advanced-threat-protection.md) +###### [Investigate a domain](microsoft-defender-atp/investigate-domain-windows-defender-advanced-threat-protection.md) +###### [Investigate a user account](microsoft-defender-atp/investigate-user-windows-defender-advanced-threat-protection.md) ##### Machines list -###### [View and organize the Machines list](windows-defender-atp/machines-view-overview-windows-defender-advanced-threat-protection.md) -###### [Manage machine group and tags](windows-defender-atp/machine-tags-windows-defender-advanced-threat-protection.md) -###### [Alerts related to this machine](windows-defender-atp/investigate-machines-windows-defender-advanced-threat-protection.md#alerts-related-to-this-machine) -###### [Machine timeline](windows-defender-atp/investigate-machines-windows-defender-advanced-threat-protection.md#machine-timeline) -####### [Search for specific events](windows-defender-atp/investigate-machines-windows-defender-advanced-threat-protection.md#search-for-specific-events) -####### [Filter events from a specific date](windows-defender-atp/investigate-machines-windows-defender-advanced-threat-protection.md#filter-events-from-a-specific-date) -####### [Export machine timeline events](windows-defender-atp/investigate-machines-windows-defender-advanced-threat-protection.md#export-machine-timeline-events) -####### [Navigate between pages](windows-defender-atp/investigate-machines-windows-defender-advanced-threat-protection.md#navigate-between-pages) +###### [View and organize the Machines list](microsoft-defender-atp/machines-view-overview-windows-defender-advanced-threat-protection.md) +###### [Manage machine group and tags](microsoft-defender-atp/machine-tags-windows-defender-advanced-threat-protection.md) +###### [Alerts related to this machine](microsoft-defender-atp/investigate-machines-windows-defender-advanced-threat-protection.md#alerts-related-to-this-machine) +###### [Machine timeline](microsoft-defender-atp/investigate-machines-windows-defender-advanced-threat-protection.md#machine-timeline) +####### [Search for specific events](microsoft-defender-atp/investigate-machines-windows-defender-advanced-threat-protection.md#search-for-specific-events) +####### [Filter events from a specific date](microsoft-defender-atp/investigate-machines-windows-defender-advanced-threat-protection.md#filter-events-from-a-specific-date) +####### [Export machine timeline events](microsoft-defender-atp/investigate-machines-windows-defender-advanced-threat-protection.md#export-machine-timeline-events) +####### [Navigate between pages](microsoft-defender-atp/investigate-machines-windows-defender-advanced-threat-protection.md#navigate-between-pages) -##### [Take response actions](windows-defender-atp/response-actions-windows-defender-advanced-threat-protection.md) -###### [Take response actions on a machine](windows-defender-atp/respond-machine-alerts-windows-defender-advanced-threat-protection.md) -####### [Collect investigation package](windows-defender-atp/respond-machine-alerts-windows-defender-advanced-threat-protection.md#collect-investigation-package-from-machines) -####### [Run antivirus scan](windows-defender-atp/respond-machine-alerts-windows-defender-advanced-threat-protection.md#run-windows-defender-antivirus-scan-on-machines) -####### [Restrict app execution](windows-defender-atp/respond-machine-alerts-windows-defender-advanced-threat-protection.md#restrict-app-execution) -####### [Remove app restriction](windows-defender-atp/respond-machine-alerts-windows-defender-advanced-threat-protection.md#remove-app-restriction) -####### [Isolate machines from the network](windows-defender-atp/respond-machine-alerts-windows-defender-advanced-threat-protection.md#isolate-machines-from-the-network) -####### [Release machine from isolation](windows-defender-atp/respond-machine-alerts-windows-defender-advanced-threat-protection.md#release-machine-from-isolation) -####### [Check activity details in Action center](windows-defender-atp/respond-machine-alerts-windows-defender-advanced-threat-protection.md#check-activity-details-in-action-center) +##### [Take response actions](microsoft-defender-atp/response-actions-windows-defender-advanced-threat-protection.md) +###### [Take response actions on a machine](microsoft-defender-atp/respond-machine-alerts-windows-defender-advanced-threat-protection.md) +####### [Collect investigation package](microsoft-defender-atp/respond-machine-alerts-windows-defender-advanced-threat-protection.md#collect-investigation-package-from-machines) +####### [Run antivirus scan](microsoft-defender-atp/respond-machine-alerts-windows-defender-advanced-threat-protection.md#run-windows-defender-antivirus-scan-on-machines) +####### [Restrict app execution](microsoft-defender-atp/respond-machine-alerts-windows-defender-advanced-threat-protection.md#restrict-app-execution) +####### [Remove app restriction](microsoft-defender-atp/respond-machine-alerts-windows-defender-advanced-threat-protection.md#remove-app-restriction) +####### [Isolate machines from the network](microsoft-defender-atp/respond-machine-alerts-windows-defender-advanced-threat-protection.md#isolate-machines-from-the-network) +####### [Release machine from isolation](microsoft-defender-atp/respond-machine-alerts-windows-defender-advanced-threat-protection.md#release-machine-from-isolation) +####### [Check activity details in Action center](microsoft-defender-atp/respond-machine-alerts-windows-defender-advanced-threat-protection.md#check-activity-details-in-action-center) -###### [Take response actions on a file](windows-defender-atp/respond-file-alerts-windows-defender-advanced-threat-protection.md) -####### [Stop and quarantine files in your network](windows-defender-atp/respond-file-alerts-windows-defender-advanced-threat-protection.md#stop-and-quarantine-files-in-your-network) -####### [Remove file from quarantine](windows-defender-atp/respond-file-alerts-windows-defender-advanced-threat-protection.md#remove-file-from-quarantine) -####### [Block files in your network](windows-defender-atp/respond-file-alerts-windows-defender-advanced-threat-protection.md#block-files-in-your-network) -####### [Remove file from blocked list](windows-defender-atp/respond-file-alerts-windows-defender-advanced-threat-protection.md#remove-file-from-blocked-list) -####### [Check activity details in Action center](windows-defender-atp/respond-file-alerts-windows-defender-advanced-threat-protection.md#check-activity-details-in-action-center) -####### [Deep analysis](windows-defender-atp/respond-file-alerts-windows-defender-advanced-threat-protection.md#deep-analysis) -####### [Submit files for analysis](windows-defender-atp/respond-file-alerts-windows-defender-advanced-threat-protection.md#submit-files-for-analysis) -####### [View deep analysis reports](windows-defender-atp/respond-file-alerts-windows-defender-advanced-threat-protection.md#view-deep-analysis-reports) -####### [Troubleshoot deep analysis](windows-defender-atp/respond-file-alerts-windows-defender-advanced-threat-protection.md#troubleshoot-deep-analysis) +###### [Take response actions on a file](microsoft-defender-atp/respond-file-alerts-windows-defender-advanced-threat-protection.md) +####### [Stop and quarantine files in your network](microsoft-defender-atp/respond-file-alerts-windows-defender-advanced-threat-protection.md#stop-and-quarantine-files-in-your-network) +####### [Remove file from quarantine](microsoft-defender-atp/respond-file-alerts-windows-defender-advanced-threat-protection.md#remove-file-from-quarantine) +####### [Block files in your network](microsoft-defender-atp/respond-file-alerts-windows-defender-advanced-threat-protection.md#block-files-in-your-network) +####### [Remove file from blocked list](microsoft-defender-atp/respond-file-alerts-windows-defender-advanced-threat-protection.md#remove-file-from-blocked-list) +####### [Check activity details in Action center](microsoft-defender-atp/respond-file-alerts-windows-defender-advanced-threat-protection.md#check-activity-details-in-action-center) +####### [Deep analysis](microsoft-defender-atp/respond-file-alerts-windows-defender-advanced-threat-protection.md#deep-analysis) +####### [Submit files for analysis](microsoft-defender-atp/respond-file-alerts-windows-defender-advanced-threat-protection.md#submit-files-for-analysis) +####### [View deep analysis reports](microsoft-defender-atp/respond-file-alerts-windows-defender-advanced-threat-protection.md#view-deep-analysis-reports) +####### [Troubleshoot deep analysis](microsoft-defender-atp/respond-file-alerts-windows-defender-advanced-threat-protection.md#troubleshoot-deep-analysis) -#### [Automated investigation and remediation](windows-defender-atp/automated-investigations-windows-defender-advanced-threat-protection.md) -##### [Learn about the automated investigation and remediation dashboard](windows-defender-atp/manage-auto-investigation-windows-defender-advanced-threat-protection.md) +#### [Automated investigation and remediation](microsoft-defender-atp/automated-investigations-windows-defender-advanced-threat-protection.md) +##### [Learn about the automated investigation and remediation dashboard](microsoft-defender-atp/manage-auto-investigation-windows-defender-advanced-threat-protection.md) -#### [Secure score](windows-defender-atp/overview-secure-score-windows-defender-advanced-threat-protection.md) -#### [Threat analytics](windows-defender-atp/threat-analytics.md) +#### [Secure score](microsoft-defender-atp/overview-secure-score-windows-defender-advanced-threat-protection.md) +#### [Threat analytics](microsoft-defender-atp/threat-analytics.md) -#### [Advanced hunting](windows-defender-atp/overview-hunting-windows-defender-advanced-threat-protection.md) -##### [Query data using Advanced hunting](windows-defender-atp/advanced-hunting-windows-defender-advanced-threat-protection.md) -###### [Advanced hunting reference](windows-defender-atp/advanced-hunting-reference-windows-defender-advanced-threat-protection.md) -###### [Advanced hunting query language best practices](windows-defender-atp/advanced-hunting-best-practices-windows-defender-advanced-threat-protection.md) -##### [Custom detections](windows-defender-atp/overview-custom-detections.md) -###### [Create custom detections rules](windows-defender-atp/custom-detection-rules.md) +#### [Advanced hunting](microsoft-defender-atp/overview-hunting-windows-defender-advanced-threat-protection.md) +##### [Query data using Advanced hunting](microsoft-defender-atp/advanced-hunting-windows-defender-advanced-threat-protection.md) +###### [Advanced hunting reference](microsoft-defender-atp/advanced-hunting-reference-windows-defender-advanced-threat-protection.md) +###### [Advanced hunting query language best practices](microsoft-defender-atp/advanced-hunting-best-practices-windows-defender-advanced-threat-protection.md) +##### [Custom detections](microsoft-defender-atp/overview-custom-detections.md) +###### [Create custom detections rules](microsoft-defender-atp/custom-detection-rules.md) -#### [Management and APIs](windows-defender-atp/management-apis.md) -##### [Understand threat intelligence concepts](windows-defender-atp/threat-indicator-concepts-windows-defender-advanced-threat-protection.md) -##### [Windows Defender ATP APIs](windows-defender-atp/apis-intro.md) -##### [Managed security service provider support](windows-defender-atp/mssp-support-windows-defender-advanced-threat-protection.md) +#### [Management and APIs](microsoft-defender-atp/management-apis.md) +##### [Understand threat intelligence concepts](microsoft-defender-atp/threat-indicator-concepts-windows-defender-advanced-threat-protection.md) +##### [Windows Defender ATP APIs](microsoft-defender-atp/apis-intro.md) +##### [Managed security service provider support](microsoft-defender-atp/mssp-support-windows-defender-advanced-threat-protection.md) -#### [Microsoft threat protection](windows-defender-atp/threat-protection-integration.md) -##### [Protect users, data, and devices with conditional access](windows-defender-atp/conditional-access-windows-defender-advanced-threat-protection.md) -##### [Microsoft Cloud App Security integration overview](windows-defender-atp/microsoft-cloud-app-security-integration.md) -##### [Information protection in Windows overview](windows-defender-atp/information-protection-in-windows-overview.md) +#### [Microsoft threat protection](microsoft-defender-atp/threat-protection-integration.md) +##### [Protect users, data, and devices with conditional access](microsoft-defender-atp/conditional-access-windows-defender-advanced-threat-protection.md) +##### [Microsoft Cloud App Security integration overview](microsoft-defender-atp/microsoft-cloud-app-security-integration.md) +##### [Information protection in Windows overview](microsoft-defender-atp/information-protection-in-windows-overview.md) -#### [Microsoft Threat Experts](windows-defender-atp/microsoft-threat-experts.md) +#### [Microsoft Threat Experts](microsoft-defender-atp/microsoft-threat-experts.md) -#### [Portal overview](windows-defender-atp/portal-overview-windows-defender-advanced-threat-protection.md) +#### [Portal overview](microsoft-defender-atp/portal-overview-windows-defender-advanced-threat-protection.md) -### [Get started](windows-defender-atp/get-started.md) -#### [What's new in Windows Defender ATP](windows-defender-atp/whats-new-in-windows-defender-atp.md) -#### [Minimum requirements](windows-defender-atp/minimum-requirements-windows-defender-advanced-threat-protection.md) -#### [Validate licensing and complete setup](windows-defender-atp/licensing-windows-defender-advanced-threat-protection.md) -#### [Preview features](windows-defender-atp/preview-windows-defender-advanced-threat-protection.md) -#### [Data storage and privacy](windows-defender-atp/data-storage-privacy-windows-defender-advanced-threat-protection.md) -#### [Assign user access to the portal](windows-defender-atp/assign-portal-access-windows-defender-advanced-threat-protection.md) +### [Get started](microsoft-defender-atp/get-started.md) +#### [What's new in Windows Defender ATP](microsoft-defender-atp/whats-new-in-windows-defender-atp.md) +#### [Minimum requirements](microsoft-defender-atp/minimum-requirements-windows-defender-advanced-threat-protection.md) +#### [Validate licensing and complete setup](microsoft-defender-atp/licensing-windows-defender-advanced-threat-protection.md) +#### [Preview features](microsoft-defender-atp/preview-windows-defender-advanced-threat-protection.md) +#### [Data storage and privacy](microsoft-defender-atp/data-storage-privacy-windows-defender-advanced-threat-protection.md) +#### [Assign user access to the portal](microsoft-defender-atp/assign-portal-access-windows-defender-advanced-threat-protection.md) -#### [Evaluate Windows Defender ATP](windows-defender-atp/evaluate-atp.md) +#### [Evaluate Windows Defender ATP](microsoft-defender-atp/evaluate-atp.md) #####Evaluate attack surface reduction ###### [Hardware-based isolation](windows-defender-application-guard/test-scenarios-wd-app-guard.md) ###### [Application control](windows-defender-application-control/audit-windows-defender-application-control-policies.md) @@ -123,10 +123,10 @@ ###### [Network firewall](windows-firewall/evaluating-windows-firewall-with-advanced-security-design-examples.md) ##### [Evaluate next generation protection](windows-defender-antivirus/evaluate-windows-defender-antivirus.md) -#### [Access the Windows Defender Security Center Community Center](windows-defender-atp/community-windows-defender-advanced-threat-protection.md) +#### [Access the Windows Defender Security Center Community Center](microsoft-defender-atp/community-windows-defender-advanced-threat-protection.md) -### [Configure and manage capabilities](windows-defender-atp/onboard.md) -#### [Configure attack surface reduction](windows-defender-atp/configure-attack-surface-reduction.md) +### [Configure and manage capabilities](microsoft-defender-atp/onboard.md) +#### [Configure attack surface reduction](microsoft-defender-atp/configure-attack-surface-reduction.md) #####Hardware-based isolation ###### [System isolation](windows-defender-system-guard/system-guard-secure-launch-and-smm-protection.md) ###### [Application isolation](windows-defender-application-guard/install-wd-app-guard.md) @@ -213,203 +213,203 @@ ###### [Use the mpcmdrun.exe command line tool to manage next generation protection](windows-defender-antivirus/command-line-arguments-windows-defender-antivirus.md) -#### [Configure Secure score dashboard security controls](windows-defender-atp/secure-score-dashboard-windows-defender-advanced-threat-protection.md) +#### [Configure Secure score dashboard security controls](microsoft-defender-atp/secure-score-dashboard-windows-defender-advanced-threat-protection.md) #### Management and API support -##### [Onboard machines](windows-defender-atp/onboard-configure-windows-defender-advanced-threat-protection.md) -###### [Onboard previous versions of Windows](windows-defender-atp/onboard-downlevel-windows-defender-advanced-threat-protection.md) -###### [Onboard Windows 10 machines](windows-defender-atp/configure-endpoints-windows-defender-advanced-threat-protection.md) -####### [Onboard machines using Group Policy](windows-defender-atp/configure-endpoints-gp-windows-defender-advanced-threat-protection.md) -####### [Onboard machines using System Center Configuration Manager](windows-defender-atp/configure-endpoints-sccm-windows-defender-advanced-threat-protection.md) -####### [Onboard machines using Mobile Device Management tools](windows-defender-atp/configure-endpoints-mdm-windows-defender-advanced-threat-protection.md) -######## [Onboard machines using Microsoft Intune](windows-defender-atp/configure-endpoints-mdm-windows-defender-advanced-threat-protection.md#onboard-machines-using-microsoft-intune) -####### [Onboard machines using a local script](windows-defender-atp/configure-endpoints-script-windows-defender-advanced-threat-protection.md) -####### [Onboard non-persistent virtual desktop infrastructure (VDI) machines](windows-defender-atp/configure-endpoints-vdi-windows-defender-advanced-threat-protection.md) -###### [Onboard servers](windows-defender-atp/configure-server-endpoints-windows-defender-advanced-threat-protection.md) -###### [Onboard non-Windows machines](windows-defender-atp/configure-endpoints-non-windows-windows-defender-advanced-threat-protection.md) -###### [Run a detection test on a newly onboarded machine](windows-defender-atp/run-detection-test-windows-defender-advanced-threat-protection.md) -###### [Run simulated attacks on machines](windows-defender-atp/attack-simulations-windows-defender-advanced-threat-protection.md) -###### [Configure proxy and Internet connectivity settings](windows-defender-atp/configure-proxy-internet-windows-defender-advanced-threat-protection.md) -###### [Troubleshoot onboarding issues](windows-defender-atp/troubleshoot-onboarding-windows-defender-advanced-threat-protection.md) -####### [Troubleshoot subscription and portal access issues](windows-defender-atp/troubleshoot-onboarding-error-messages-windows-defender-advanced-threat-protection.md) +##### [Onboard machines](microsoft-defender-atp/onboard-configure-windows-defender-advanced-threat-protection.md) +###### [Onboard previous versions of Windows](microsoft-defender-atp/onboard-downlevel-windows-defender-advanced-threat-protection.md) +###### [Onboard Windows 10 machines](microsoft-defender-atp/configure-endpoints-windows-defender-advanced-threat-protection.md) +####### [Onboard machines using Group Policy](microsoft-defender-atp/configure-endpoints-gp-windows-defender-advanced-threat-protection.md) +####### [Onboard machines using System Center Configuration Manager](microsoft-defender-atp/configure-endpoints-sccm-windows-defender-advanced-threat-protection.md) +####### [Onboard machines using Mobile Device Management tools](microsoft-defender-atp/configure-endpoints-mdm-windows-defender-advanced-threat-protection.md) +######## [Onboard machines using Microsoft Intune](microsoft-defender-atp/configure-endpoints-mdm-windows-defender-advanced-threat-protection.md#onboard-machines-using-microsoft-intune) +####### [Onboard machines using a local script](microsoft-defender-atp/configure-endpoints-script-windows-defender-advanced-threat-protection.md) +####### [Onboard non-persistent virtual desktop infrastructure (VDI) machines](microsoft-defender-atp/configure-endpoints-vdi-windows-defender-advanced-threat-protection.md) +###### [Onboard servers](microsoft-defender-atp/configure-server-endpoints-windows-defender-advanced-threat-protection.md) +###### [Onboard non-Windows machines](microsoft-defender-atp/configure-endpoints-non-windows-windows-defender-advanced-threat-protection.md) +###### [Run a detection test on a newly onboarded machine](microsoft-defender-atp/run-detection-test-windows-defender-advanced-threat-protection.md) +###### [Run simulated attacks on machines](microsoft-defender-atp/attack-simulations-windows-defender-advanced-threat-protection.md) +###### [Configure proxy and Internet connectivity settings](microsoft-defender-atp/configure-proxy-internet-windows-defender-advanced-threat-protection.md) +###### [Troubleshoot onboarding issues](microsoft-defender-atp/troubleshoot-onboarding-windows-defender-advanced-threat-protection.md) +####### [Troubleshoot subscription and portal access issues](microsoft-defender-atp/troubleshoot-onboarding-error-messages-windows-defender-advanced-threat-protection.md) -##### [Windows Defender ATP API](windows-defender-atp/use-apis.md) -###### [Get started with Windows Defender ATP APIs](windows-defender-atp/apis-intro.md) -####### [Hello World](windows-defender-atp/api-hello-world.md) -####### [Get access with application context](windows-defender-atp/exposed-apis-create-app-webapp.md) -####### [Get access with user context](windows-defender-atp/exposed-apis-create-app-nativeapp.md) -###### [APIs](windows-defender-atp/exposed-apis-list.md) +##### [Windows Defender ATP API](microsoft-defender-atp/use-apis.md) +###### [Get started with Windows Defender ATP APIs](microsoft-defender-atp/apis-intro.md) +####### [Hello World](microsoft-defender-atp/api-hello-world.md) +####### [Get access with application context](microsoft-defender-atp/exposed-apis-create-app-webapp.md) +####### [Get access with user context](microsoft-defender-atp/exposed-apis-create-app-nativeapp.md) +###### [APIs](microsoft-defender-atp/exposed-apis-list.md) -####### [Advanced Hunting](windows-defender-atp/run-advanced-query-api.md) +####### [Advanced Hunting](microsoft-defender-atp/run-advanced-query-api.md) -####### [Alert](windows-defender-atp/alerts-windows-defender-advanced-threat-protection-new.md) -######## [List alerts](windows-defender-atp/get-alerts-windows-defender-advanced-threat-protection-new.md) -######## [Create alert](windows-defender-atp/create-alert-by-reference-windows-defender-advanced-threat-protection-new.md) -######## [Update Alert](windows-defender-atp/update-alert-windows-defender-advanced-threat-protection-new.md) -######## [Get alert information by ID](windows-defender-atp/get-alert-info-by-id-windows-defender-advanced-threat-protection-new.md) -######## [Get alert related domains information](windows-defender-atp/get-alert-related-domain-info-windows-defender-advanced-threat-protection-new.md) -######## [Get alert related file information](windows-defender-atp/get-alert-related-files-info-windows-defender-advanced-threat-protection-new.md) -######## [Get alert related IPs information](windows-defender-atp/get-alert-related-ip-info-windows-defender-advanced-threat-protection-new.md) -######## [Get alert related machine information](windows-defender-atp/get-alert-related-machine-info-windows-defender-advanced-threat-protection-new.md) -######## [Get alert related user information](windows-defender-atp/get-alert-related-user-info-windows-defender-advanced-threat-protection-new.md) +####### [Alert](microsoft-defender-atp/alerts-windows-defender-advanced-threat-protection-new.md) +######## [List alerts](microsoft-defender-atp/get-alerts-windows-defender-advanced-threat-protection-new.md) +######## [Create alert](microsoft-defender-atp/create-alert-by-reference-windows-defender-advanced-threat-protection-new.md) +######## [Update Alert](microsoft-defender-atp/update-alert-windows-defender-advanced-threat-protection-new.md) +######## [Get alert information by ID](microsoft-defender-atp/get-alert-info-by-id-windows-defender-advanced-threat-protection-new.md) +######## [Get alert related domains information](microsoft-defender-atp/get-alert-related-domain-info-windows-defender-advanced-threat-protection-new.md) +######## [Get alert related file information](microsoft-defender-atp/get-alert-related-files-info-windows-defender-advanced-threat-protection-new.md) +######## [Get alert related IPs information](microsoft-defender-atp/get-alert-related-ip-info-windows-defender-advanced-threat-protection-new.md) +######## [Get alert related machine information](microsoft-defender-atp/get-alert-related-machine-info-windows-defender-advanced-threat-protection-new.md) +######## [Get alert related user information](microsoft-defender-atp/get-alert-related-user-info-windows-defender-advanced-threat-protection-new.md) -####### [Machine](windows-defender-atp/machine-windows-defender-advanced-threat-protection-new.md) -######## [List machines](windows-defender-atp/get-machines-windows-defender-advanced-threat-protection-new.md) -######## [Get machine by ID](windows-defender-atp/get-machine-by-id-windows-defender-advanced-threat-protection-new.md) -######## [Get machine log on users](windows-defender-atp/get-machine-log-on-users-windows-defender-advanced-threat-protection-new.md) -######## [Get machine related alerts](windows-defender-atp/get-machine-related-alerts-windows-defender-advanced-threat-protection-new.md) -######## [Add or Remove machine tags](windows-defender-atp/add-or-remove-machine-tags-windows-defender-advanced-threat-protection-new.md) -######## [Find machines by IP](windows-defender-atp/find-machines-by-ip-windows-defender-advanced-threat-protection-new.md) +####### [Machine](microsoft-defender-atp/machine-windows-defender-advanced-threat-protection-new.md) +######## [List machines](microsoft-defender-atp/get-machines-windows-defender-advanced-threat-protection-new.md) +######## [Get machine by ID](microsoft-defender-atp/get-machine-by-id-windows-defender-advanced-threat-protection-new.md) +######## [Get machine log on users](microsoft-defender-atp/get-machine-log-on-users-windows-defender-advanced-threat-protection-new.md) +######## [Get machine related alerts](microsoft-defender-atp/get-machine-related-alerts-windows-defender-advanced-threat-protection-new.md) +######## [Add or Remove machine tags](microsoft-defender-atp/add-or-remove-machine-tags-windows-defender-advanced-threat-protection-new.md) +######## [Find machines by IP](microsoft-defender-atp/find-machines-by-ip-windows-defender-advanced-threat-protection-new.md) -####### [Machine Action](windows-defender-atp/machineaction-windows-defender-advanced-threat-protection-new.md) -######## [List Machine Actions](windows-defender-atp/get-machineactions-collection-windows-defender-advanced-threat-protection-new.md) -######## [Get Machine Action](windows-defender-atp/get-machineaction-object-windows-defender-advanced-threat-protection-new.md) -######## [Collect investigation package](windows-defender-atp/collect-investigation-package-windows-defender-advanced-threat-protection-new.md) -######## [Get investigation package SAS URI](windows-defender-atp/get-package-sas-uri-windows-defender-advanced-threat-protection-new.md) -######## [Isolate machine](windows-defender-atp/isolate-machine-windows-defender-advanced-threat-protection-new.md) -######## [Release machine from isolation](windows-defender-atp/unisolate-machine-windows-defender-advanced-threat-protection-new.md) -######## [Restrict app execution](windows-defender-atp/restrict-code-execution-windows-defender-advanced-threat-protection-new.md) -######## [Remove app restriction](windows-defender-atp/unrestrict-code-execution-windows-defender-advanced-threat-protection-new.md) -######## [Run antivirus scan](windows-defender-atp/run-av-scan-windows-defender-advanced-threat-protection-new.md) -######## [Offboard machine](windows-defender-atp/offboard-machine-api-windows-defender-advanced-threat-protection-new.md) -######## [Stop and quarantine file](windows-defender-atp/stop-and-quarantine-file-windows-defender-advanced-threat-protection-new.md) -######## [Initiate investigation (preview)](windows-defender-atp/initiate-autoir-investigation-windows-defender-advanced-threat-protection-new.md) +####### [Machine Action](microsoft-defender-atp/machineaction-windows-defender-advanced-threat-protection-new.md) +######## [List Machine Actions](microsoft-defender-atp/get-machineactions-collection-windows-defender-advanced-threat-protection-new.md) +######## [Get Machine Action](microsoft-defender-atp/get-machineaction-object-windows-defender-advanced-threat-protection-new.md) +######## [Collect investigation package](microsoft-defender-atp/collect-investigation-package-windows-defender-advanced-threat-protection-new.md) +######## [Get investigation package SAS URI](microsoft-defender-atp/get-package-sas-uri-windows-defender-advanced-threat-protection-new.md) +######## [Isolate machine](microsoft-defender-atp/isolate-machine-windows-defender-advanced-threat-protection-new.md) +######## [Release machine from isolation](microsoft-defender-atp/unisolate-machine-windows-defender-advanced-threat-protection-new.md) +######## [Restrict app execution](microsoft-defender-atp/restrict-code-execution-windows-defender-advanced-threat-protection-new.md) +######## [Remove app restriction](microsoft-defender-atp/unrestrict-code-execution-windows-defender-advanced-threat-protection-new.md) +######## [Run antivirus scan](microsoft-defender-atp/run-av-scan-windows-defender-advanced-threat-protection-new.md) +######## [Offboard machine](microsoft-defender-atp/offboard-machine-api-windows-defender-advanced-threat-protection-new.md) +######## [Stop and quarantine file](microsoft-defender-atp/stop-and-quarantine-file-windows-defender-advanced-threat-protection-new.md) +######## [Initiate investigation (preview)](microsoft-defender-atp/initiate-autoir-investigation-windows-defender-advanced-threat-protection-new.md) -####### [Indicators (preview)](windows-defender-atp/ti-indicator-windows-defender-advanced-threat-protection-new.md) -######## [Submit Indicator](windows-defender-atp/post-ti-indicator-windows-defender-advanced-threat-protection-new.md) -######## [List Indicators](windows-defender-atp/get-ti-indicators-collection-windows-defender-advanced-threat-protection-new.md) -######## [Delete Indicator](windows-defender-atp/delete-ti-indicator-by-id-windows-defender-advanced-threat-protection-new.md) +####### [Indicators (preview)](microsoft-defender-atp/ti-indicator-windows-defender-advanced-threat-protection-new.md) +######## [Submit Indicator](microsoft-defender-atp/post-ti-indicator-windows-defender-advanced-threat-protection-new.md) +######## [List Indicators](microsoft-defender-atp/get-ti-indicators-collection-windows-defender-advanced-threat-protection-new.md) +######## [Delete Indicator](microsoft-defender-atp/delete-ti-indicator-by-id-windows-defender-advanced-threat-protection-new.md) ####### Domain -######## [Get domain related alerts](windows-defender-atp/get-domain-related-alerts-windows-defender-advanced-threat-protection-new.md) -######## [Get domain related machines](windows-defender-atp/get-domain-related-machines-windows-defender-advanced-threat-protection-new.md) -######## [Get domain statistics](windows-defender-atp/get-domain-statistics-windows-defender-advanced-threat-protection-new.md) -######## [Is domain seen in organization](windows-defender-atp/is-domain-seen-in-org-windows-defender-advanced-threat-protection-new.md) +######## [Get domain related alerts](microsoft-defender-atp/get-domain-related-alerts-windows-defender-advanced-threat-protection-new.md) +######## [Get domain related machines](microsoft-defender-atp/get-domain-related-machines-windows-defender-advanced-threat-protection-new.md) +######## [Get domain statistics](microsoft-defender-atp/get-domain-statistics-windows-defender-advanced-threat-protection-new.md) +######## [Is domain seen in organization](microsoft-defender-atp/is-domain-seen-in-org-windows-defender-advanced-threat-protection-new.md) -####### [File](windows-defender-atp/files-windows-defender-advanced-threat-protection-new.md) -######## [Get file information](windows-defender-atp/get-file-information-windows-defender-advanced-threat-protection-new.md) -######## [Get file related alerts](windows-defender-atp/get-file-related-alerts-windows-defender-advanced-threat-protection-new.md) -######## [Get file related machines](windows-defender-atp/get-file-related-machines-windows-defender-advanced-threat-protection-new.md) -######## [Get file statistics](windows-defender-atp/get-file-statistics-windows-defender-advanced-threat-protection-new.md) +####### [File](microsoft-defender-atp/files-windows-defender-advanced-threat-protection-new.md) +######## [Get file information](microsoft-defender-atp/get-file-information-windows-defender-advanced-threat-protection-new.md) +######## [Get file related alerts](microsoft-defender-atp/get-file-related-alerts-windows-defender-advanced-threat-protection-new.md) +######## [Get file related machines](microsoft-defender-atp/get-file-related-machines-windows-defender-advanced-threat-protection-new.md) +######## [Get file statistics](microsoft-defender-atp/get-file-statistics-windows-defender-advanced-threat-protection-new.md) ####### IP -######## [Get IP related alerts](windows-defender-atp/get-ip-related-alerts-windows-defender-advanced-threat-protection-new.md) -######## [Get IP related machines](windows-defender-atp/get-ip-related-machines-windows-defender-advanced-threat-protection-new.md) -######## [Get IP statistics](windows-defender-atp/get-ip-statistics-windows-defender-advanced-threat-protection-new.md) -######## [Is IP seen in organization](windows-defender-atp/is-ip-seen-org-windows-defender-advanced-threat-protection-new.md) +######## [Get IP related alerts](microsoft-defender-atp/get-ip-related-alerts-windows-defender-advanced-threat-protection-new.md) +######## [Get IP related machines](microsoft-defender-atp/get-ip-related-machines-windows-defender-advanced-threat-protection-new.md) +######## [Get IP statistics](microsoft-defender-atp/get-ip-statistics-windows-defender-advanced-threat-protection-new.md) +######## [Is IP seen in organization](microsoft-defender-atp/is-ip-seen-org-windows-defender-advanced-threat-protection-new.md) -####### [User](windows-defender-atp/user-windows-defender-advanced-threat-protection-new.md) -######## [Get user related alerts](windows-defender-atp/get-user-related-alerts-windows-defender-advanced-threat-protection-new.md) -######## [Get user related machines](windows-defender-atp/get-user-related-machines-windows-defender-advanced-threat-protection-new.md) +####### [User](microsoft-defender-atp/user-windows-defender-advanced-threat-protection-new.md) +######## [Get user related alerts](microsoft-defender-atp/get-user-related-alerts-windows-defender-advanced-threat-protection-new.md) +######## [Get user related machines](microsoft-defender-atp/get-user-related-machines-windows-defender-advanced-threat-protection-new.md) ###### How to use APIs - Samples ####### Advanced Hunting API -######## [Schedule advanced Hunting using Microsoft Flow](windows-defender-atp/run-advanced-query-sample-ms-flow.md) -######## [Advanced Hunting using PowerShell](windows-defender-atp/run-advanced-query-sample-powershell.md) -######## [Advanced Hunting using Python](windows-defender-atp/run-advanced-query-sample-python.md) -######## [Create custom Power BI reports](windows-defender-atp/run-advanced-query-sample-power-bi-app-token.md) +######## [Schedule advanced Hunting using Microsoft Flow](microsoft-defender-atp/run-advanced-query-sample-ms-flow.md) +######## [Advanced Hunting using PowerShell](microsoft-defender-atp/run-advanced-query-sample-powershell.md) +######## [Advanced Hunting using Python](microsoft-defender-atp/run-advanced-query-sample-python.md) +######## [Create custom Power BI reports](microsoft-defender-atp/run-advanced-query-sample-power-bi-app-token.md) ####### Multiple APIs -######## [PowerShell](windows-defender-atp/exposed-apis-full-sample-powershell.md) -####### [Using OData Queries](windows-defender-atp/exposed-apis-odata-samples.md) +######## [PowerShell](microsoft-defender-atp/exposed-apis-full-sample-powershell.md) +####### [Using OData Queries](microsoft-defender-atp/exposed-apis-odata-samples.md) #####Windows updates (KB) info -###### [Get KbInfo collection](windows-defender-atp/get-kbinfo-collection-windows-defender-advanced-threat-protection.md) +###### [Get KbInfo collection](microsoft-defender-atp/get-kbinfo-collection-windows-defender-advanced-threat-protection.md) #####Common Vulnerabilities and Exposures (CVE) to KB map -###### [Get CVE-KB map](windows-defender-atp/get-cvekbmap-collection-windows-defender-advanced-threat-protection.md) +###### [Get CVE-KB map](microsoft-defender-atp/get-cvekbmap-collection-windows-defender-advanced-threat-protection.md) ##### API for custom alerts -###### [Enable the custom threat intelligence application](windows-defender-atp/enable-custom-ti-windows-defender-advanced-threat-protection.md) -###### [Use the threat intelligence API to create custom alerts](windows-defender-atp/use-custom-ti-windows-defender-advanced-threat-protection.md) -###### [Create custom threat intelligence alerts](windows-defender-atp/custom-ti-api-windows-defender-advanced-threat-protection.md) -###### [PowerShell code examples](windows-defender-atp/powershell-example-code-windows-defender-advanced-threat-protection.md) -###### [Python code examples](windows-defender-atp/python-example-code-windows-defender-advanced-threat-protection.md) -###### [Experiment with custom threat intelligence alerts](windows-defender-atp/experiment-custom-ti-windows-defender-advanced-threat-protection.md) -###### [Troubleshoot custom threat intelligence issues](windows-defender-atp/troubleshoot-custom-ti-windows-defender-advanced-threat-protection.md) +###### [Enable the custom threat intelligence application](microsoft-defender-atp/enable-custom-ti-windows-defender-advanced-threat-protection.md) +###### [Use the threat intelligence API to create custom alerts](microsoft-defender-atp/use-custom-ti-windows-defender-advanced-threat-protection.md) +###### [Create custom threat intelligence alerts](microsoft-defender-atp/custom-ti-api-windows-defender-advanced-threat-protection.md) +###### [PowerShell code examples](microsoft-defender-atp/powershell-example-code-windows-defender-advanced-threat-protection.md) +###### [Python code examples](microsoft-defender-atp/python-example-code-windows-defender-advanced-threat-protection.md) +###### [Experiment with custom threat intelligence alerts](microsoft-defender-atp/experiment-custom-ti-windows-defender-advanced-threat-protection.md) +###### [Troubleshoot custom threat intelligence issues](microsoft-defender-atp/troubleshoot-custom-ti-windows-defender-advanced-threat-protection.md) -##### [Pull alerts to your SIEM tools](windows-defender-atp/configure-siem-windows-defender-advanced-threat-protection.md) -###### [Enable SIEM integration](windows-defender-atp/enable-siem-integration-windows-defender-advanced-threat-protection.md) -###### [Configure Splunk to pull alerts](windows-defender-atp/configure-splunk-windows-defender-advanced-threat-protection.md) -###### [Configure HP ArcSight to pull alerts](windows-defender-atp/configure-arcsight-windows-defender-advanced-threat-protection.md) -###### [Windows Defender ATP SIEM alert API fields](windows-defender-atp/api-portal-mapping-windows-defender-advanced-threat-protection.md) -###### [Pull alerts using SIEM REST API](windows-defender-atp/pull-alerts-using-rest-api-windows-defender-advanced-threat-protection.md) -###### [Troubleshoot SIEM tool integration issues](windows-defender-atp/troubleshoot-siem-windows-defender-advanced-threat-protection.md) +##### [Pull alerts to your SIEM tools](microsoft-defender-atp/configure-siem-windows-defender-advanced-threat-protection.md) +###### [Enable SIEM integration](microsoft-defender-atp/enable-siem-integration-windows-defender-advanced-threat-protection.md) +###### [Configure Splunk to pull alerts](microsoft-defender-atp/configure-splunk-windows-defender-advanced-threat-protection.md) +###### [Configure HP ArcSight to pull alerts](microsoft-defender-atp/configure-arcsight-windows-defender-advanced-threat-protection.md) +###### [Windows Defender ATP SIEM alert API fields](microsoft-defender-atp/api-portal-mapping-windows-defender-advanced-threat-protection.md) +###### [Pull alerts using SIEM REST API](microsoft-defender-atp/pull-alerts-using-rest-api-windows-defender-advanced-threat-protection.md) +###### [Troubleshoot SIEM tool integration issues](microsoft-defender-atp/troubleshoot-siem-windows-defender-advanced-threat-protection.md) ##### Reporting -###### [Create and build Power BI reports using Windows Defender ATP data](windows-defender-atp/powerbi-reports-windows-defender-advanced-threat-protection.md) -###### [Threat protection reports](windows-defender-atp/threat-protection-reports-windows-defender-advanced-threat-protection.md) -###### [Machine health and compliance reports](windows-defender-atp/machine-reports-windows-defender-advanced-threat-protection.md) +###### [Create and build Power BI reports using Windows Defender ATP data](microsoft-defender-atp/powerbi-reports-windows-defender-advanced-threat-protection.md) +###### [Threat protection reports](microsoft-defender-atp/threat-protection-reports-windows-defender-advanced-threat-protection.md) +###### [Machine health and compliance reports](microsoft-defender-atp/machine-reports-windows-defender-advanced-threat-protection.md) ##### Role-based access control -###### [Manage portal access using RBAC](windows-defender-atp/rbac-windows-defender-advanced-threat-protection.md) -####### [Create and manage roles](windows-defender-atp/user-roles-windows-defender-advanced-threat-protection.md) -####### [Create and manage machine groups](windows-defender-atp/machine-groups-windows-defender-advanced-threat-protection.md) -######## [Create and manage machine tags](windows-defender-atp/machine-tags-windows-defender-advanced-threat-protection.md) +###### [Manage portal access using RBAC](microsoft-defender-atp/rbac-windows-defender-advanced-threat-protection.md) +####### [Create and manage roles](microsoft-defender-atp/user-roles-windows-defender-advanced-threat-protection.md) +####### [Create and manage machine groups](microsoft-defender-atp/machine-groups-windows-defender-advanced-threat-protection.md) +######## [Create and manage machine tags](microsoft-defender-atp/machine-tags-windows-defender-advanced-threat-protection.md) -##### [Configure managed security service provider (MSSP) support](windows-defender-atp/configure-mssp-support-windows-defender-advanced-threat-protection.md) +##### [Configure managed security service provider (MSSP) support](microsoft-defender-atp/configure-mssp-support-windows-defender-advanced-threat-protection.md) -#### [Configure and manage Microsoft Threat Experts capabilities](windows-defender-atp/configure-microsoft-threat-experts.md) +#### [Configure and manage Microsoft Threat Experts capabilities](microsoft-defender-atp/configure-microsoft-threat-experts.md) #### Configure Microsoft threat protection integration -##### [Configure conditional access](windows-defender-atp/configure-conditional-access-windows-defender-advanced-threat-protection.md) -##### [Configure Microsoft Cloud App Security integration](windows-defender-atp/microsoft-cloud-app-security-config.md) -##### [Configure information protection in Windows](windows-defender-atp/information-protection-in-windows-config.md) +##### [Configure conditional access](microsoft-defender-atp/configure-conditional-access-windows-defender-advanced-threat-protection.md) +##### [Configure Microsoft Cloud App Security integration](microsoft-defender-atp/microsoft-cloud-app-security-config.md) +##### [Configure information protection in Windows](microsoft-defender-atp/information-protection-in-windows-config.md) -#### [Configure Windows Defender Security Center settings](windows-defender-atp/preferences-setup-windows-defender-advanced-threat-protection.md) +#### [Configure Windows Defender Security Center settings](microsoft-defender-atp/preferences-setup-windows-defender-advanced-threat-protection.md) ##### General -###### [Update data retention settings](windows-defender-atp/data-retention-settings-windows-defender-advanced-threat-protection.md) -###### [Configure alert notifications](windows-defender-atp/configure-email-notifications-windows-defender-advanced-threat-protection.md) -###### [Enable and create Power BI reports using Windows Defender Security center data](windows-defender-atp/powerbi-reports-windows-defender-advanced-threat-protection.md) -###### [Enable Secure score security controls](windows-defender-atp/enable-secure-score-windows-defender-advanced-threat-protection.md) -###### [Configure advanced features](windows-defender-atp/advanced-features-windows-defender-advanced-threat-protection.md) +###### [Update data retention settings](microsoft-defender-atp/data-retention-settings-windows-defender-advanced-threat-protection.md) +###### [Configure alert notifications](microsoft-defender-atp/configure-email-notifications-windows-defender-advanced-threat-protection.md) +###### [Enable and create Power BI reports using Windows Defender Security center data](microsoft-defender-atp/powerbi-reports-windows-defender-advanced-threat-protection.md) +###### [Enable Secure score security controls](microsoft-defender-atp/enable-secure-score-windows-defender-advanced-threat-protection.md) +###### [Configure advanced features](microsoft-defender-atp/advanced-features-windows-defender-advanced-threat-protection.md) ##### Permissions -###### [Use basic permissions to access the portal](windows-defender-atp/basic-permissions-windows-defender-advanced-threat-protection.md) -###### [Manage portal access using RBAC](windows-defender-atp/rbac-windows-defender-advanced-threat-protection.md) -####### [Create and manage roles](windows-defender-atp/user-roles-windows-defender-advanced-threat-protection.md) -####### [Create and manage machine groups](windows-defender-atp/machine-groups-windows-defender-advanced-threat-protection.md) -######## [Create and manage machine tags](windows-defender-atp/machine-tags-windows-defender-advanced-threat-protection.md) +###### [Use basic permissions to access the portal](microsoft-defender-atp/basic-permissions-windows-defender-advanced-threat-protection.md) +###### [Manage portal access using RBAC](microsoft-defender-atp/rbac-windows-defender-advanced-threat-protection.md) +####### [Create and manage roles](microsoft-defender-atp/user-roles-windows-defender-advanced-threat-protection.md) +####### [Create and manage machine groups](microsoft-defender-atp/machine-groups-windows-defender-advanced-threat-protection.md) +######## [Create and manage machine tags](microsoft-defender-atp/machine-tags-windows-defender-advanced-threat-protection.md) ##### APIs -###### [Enable Threat intel](windows-defender-atp/enable-custom-ti-windows-defender-advanced-threat-protection.md) -###### [Enable SIEM integration](windows-defender-atp/enable-siem-integration-windows-defender-advanced-threat-protection.md) +###### [Enable Threat intel](microsoft-defender-atp/enable-custom-ti-windows-defender-advanced-threat-protection.md) +###### [Enable SIEM integration](microsoft-defender-atp/enable-siem-integration-windows-defender-advanced-threat-protection.md) #####Rules -###### [Manage suppression rules](windows-defender-atp/manage-suppression-rules-windows-defender-advanced-threat-protection.md) -###### [Manage automation allowed/blocked lists](windows-defender-atp/manage-automation-allowed-blocked-list-windows-defender-advanced-threat-protection.md) -###### [Manage allowed/blocked lists](windows-defender-atp/manage-allowed-blocked-list-windows-defender-advanced-threat-protection.md) -###### [Manage automation file uploads](windows-defender-atp/manage-automation-file-uploads-windows-defender-advanced-threat-protection.md) -###### [Manage automation folder exclusions](windows-defender-atp/manage-automation-folder-exclusions-windows-defender-advanced-threat-protection.md) +###### [Manage suppression rules](microsoft-defender-atp/manage-suppression-rules-windows-defender-advanced-threat-protection.md) +###### [Manage automation allowed/blocked lists](microsoft-defender-atp/manage-automation-allowed-blocked-list-windows-defender-advanced-threat-protection.md) +###### [Manage allowed/blocked lists](microsoft-defender-atp/manage-allowed-blocked-list-windows-defender-advanced-threat-protection.md) +###### [Manage automation file uploads](microsoft-defender-atp/manage-automation-file-uploads-windows-defender-advanced-threat-protection.md) +###### [Manage automation folder exclusions](microsoft-defender-atp/manage-automation-folder-exclusions-windows-defender-advanced-threat-protection.md) #####Machine management -###### [Onboarding machines](windows-defender-atp/onboard-configure-windows-defender-advanced-threat-protection.md) -###### [Offboarding machines](windows-defender-atp/offboard-machines-windows-defender-advanced-threat-protection.md) +###### [Onboarding machines](microsoft-defender-atp/onboard-configure-windows-defender-advanced-threat-protection.md) +###### [Offboarding machines](microsoft-defender-atp/offboard-machines-windows-defender-advanced-threat-protection.md) -##### [Configure Windows Defender Security Center time zone settings](windows-defender-atp/time-settings-windows-defender-advanced-threat-protection.md) +##### [Configure Windows Defender Security Center time zone settings](microsoft-defender-atp/time-settings-windows-defender-advanced-threat-protection.md) -### [Troubleshoot Windows Defender ATP](windows-defender-atp/troubleshoot-wdatp.md) +### [Troubleshoot Windows Defender ATP](microsoft-defender-atp/troubleshoot-wdatp.md) ####Troubleshoot sensor state -##### [Check sensor state](windows-defender-atp/check-sensor-status-windows-defender-advanced-threat-protection.md) -##### [Fix unhealthy sensors](windows-defender-atp/fix-unhealhty-sensors-windows-defender-advanced-threat-protection.md) -##### [Inactive machines](windows-defender-atp/fix-unhealhty-sensors-windows-defender-advanced-threat-protection.md#inactive-machines) -##### [Misconfigured machines](windows-defender-atp/fix-unhealhty-sensors-windows-defender-advanced-threat-protection.md#misconfigured-machines) -##### [Review sensor events and errors on machines with Event Viewer](windows-defender-atp/event-error-codes-windows-defender-advanced-threat-protection.md) +##### [Check sensor state](microsoft-defender-atp/check-sensor-status-windows-defender-advanced-threat-protection.md) +##### [Fix unhealthy sensors](microsoft-defender-atp/fix-unhealhty-sensors-windows-defender-advanced-threat-protection.md) +##### [Inactive machines](microsoft-defender-atp/fix-unhealhty-sensors-windows-defender-advanced-threat-protection.md#inactive-machines) +##### [Misconfigured machines](microsoft-defender-atp/fix-unhealhty-sensors-windows-defender-advanced-threat-protection.md#misconfigured-machines) +##### [Review sensor events and errors on machines with Event Viewer](microsoft-defender-atp/event-error-codes-windows-defender-advanced-threat-protection.md) -#### [Troubleshoot Windows Defender ATP service issues](windows-defender-atp/troubleshoot-windows-defender-advanced-threat-protection.md) -##### [Check service health](windows-defender-atp/service-status-windows-defender-advanced-threat-protection.md) +#### [Troubleshoot Windows Defender ATP service issues](microsoft-defender-atp/troubleshoot-windows-defender-advanced-threat-protection.md) +##### [Check service health](microsoft-defender-atp/service-status-windows-defender-advanced-threat-protection.md) ####Troubleshoot attack surface reduction ##### [Network protection](windows-defender-exploit-guard/troubleshoot-np.md) From 7a6786be072fde8b79a97bac47fe715872ae6689 Mon Sep 17 00:00:00 2001 From: Joey Caparas Date: Wed, 10 Apr 2019 14:02:15 -0700 Subject: [PATCH 138/724] remove -windows-defender-advanced-threat-protection --- windows/security/threat-protection/TOC.md | 146 +++++++++--------- ...ft-defender-advanced-threat-protection.md} | 0 2 files changed, 73 insertions(+), 73 deletions(-) rename windows/security/threat-protection/microsoft-defender-atp/{windows-defender-advanced-threat-protection.md => microsoft-defender-advanced-threat-protection.md} (100%) diff --git a/windows/security/threat-protection/TOC.md b/windows/security/threat-protection/TOC.md index 16acd664ab..316afb72b1 100644 --- a/windows/security/threat-protection/TOC.md +++ b/windows/security/threat-protection/TOC.md @@ -1,6 +1,6 @@ # [Threat protection](index.md) -## [Windows Defender Advanced Threat Protection](microsoft-defender-atp/windows-defender-advanced-threat-protection.md) +## [Windows Defender Advanced Threat Protection](microsoft-defender-atp/microsoft-defender-advanced-threat-protection.md) ### [Overview](microsoft-defender-atp/overview.md) #### [Attack surface reduction](microsoft-defender-atp/overview-attack-surface-reduction.md) @@ -110,7 +110,7 @@ #### [Validate licensing and complete setup](microsoft-defender-atp/licensing-windows-defender-advanced-threat-protection.md) #### [Preview features](microsoft-defender-atp/preview-windows-defender-advanced-threat-protection.md) #### [Data storage and privacy](microsoft-defender-atp/data-storage-privacy-windows-defender-advanced-threat-protection.md) -#### [Assign user access to the portal](microsoft-defender-atp/assign-portal-access-windows-defender-advanced-threat-protection.md) +#### [Assign user access to the portal](microsoft-defender-atp/assign-portal-access.md) #### [Evaluate Windows Defender ATP](microsoft-defender-atp/evaluate-atp.md) #####Evaluate attack surface reduction @@ -123,7 +123,7 @@ ###### [Network firewall](windows-firewall/evaluating-windows-firewall-with-advanced-security-design-examples.md) ##### [Evaluate next generation protection](windows-defender-antivirus/evaluate-windows-defender-antivirus.md) -#### [Access the Windows Defender Security Center Community Center](microsoft-defender-atp/community-windows-defender-advanced-threat-protection.md) +#### [Access the Windows Defender Security Center Community Center](microsoft-defender-atp/community.md) ### [Configure and manage capabilities](microsoft-defender-atp/onboard.md) #### [Configure attack surface reduction](microsoft-defender-atp/configure-attack-surface-reduction.md) @@ -213,26 +213,26 @@ ###### [Use the mpcmdrun.exe command line tool to manage next generation protection](windows-defender-antivirus/command-line-arguments-windows-defender-antivirus.md) -#### [Configure Secure score dashboard security controls](microsoft-defender-atp/secure-score-dashboard-windows-defender-advanced-threat-protection.md) +#### [Configure Secure score dashboard security controls](microsoft-defender-atp/secure-score-dashboard.md) #### Management and API support -##### [Onboard machines](microsoft-defender-atp/onboard-configure-windows-defender-advanced-threat-protection.md) -###### [Onboard previous versions of Windows](microsoft-defender-atp/onboard-downlevel-windows-defender-advanced-threat-protection.md) -###### [Onboard Windows 10 machines](microsoft-defender-atp/configure-endpoints-windows-defender-advanced-threat-protection.md) -####### [Onboard machines using Group Policy](microsoft-defender-atp/configure-endpoints-gp-windows-defender-advanced-threat-protection.md) -####### [Onboard machines using System Center Configuration Manager](microsoft-defender-atp/configure-endpoints-sccm-windows-defender-advanced-threat-protection.md) -####### [Onboard machines using Mobile Device Management tools](microsoft-defender-atp/configure-endpoints-mdm-windows-defender-advanced-threat-protection.md) -######## [Onboard machines using Microsoft Intune](microsoft-defender-atp/configure-endpoints-mdm-windows-defender-advanced-threat-protection.md#onboard-machines-using-microsoft-intune) -####### [Onboard machines using a local script](microsoft-defender-atp/configure-endpoints-script-windows-defender-advanced-threat-protection.md) -####### [Onboard non-persistent virtual desktop infrastructure (VDI) machines](microsoft-defender-atp/configure-endpoints-vdi-windows-defender-advanced-threat-protection.md) -###### [Onboard servers](microsoft-defender-atp/configure-server-endpoints-windows-defender-advanced-threat-protection.md) -###### [Onboard non-Windows machines](microsoft-defender-atp/configure-endpoints-non-windows-windows-defender-advanced-threat-protection.md) -###### [Run a detection test on a newly onboarded machine](microsoft-defender-atp/run-detection-test-windows-defender-advanced-threat-protection.md) -###### [Run simulated attacks on machines](microsoft-defender-atp/attack-simulations-windows-defender-advanced-threat-protection.md) -###### [Configure proxy and Internet connectivity settings](microsoft-defender-atp/configure-proxy-internet-windows-defender-advanced-threat-protection.md) -###### [Troubleshoot onboarding issues](microsoft-defender-atp/troubleshoot-onboarding-windows-defender-advanced-threat-protection.md) -####### [Troubleshoot subscription and portal access issues](microsoft-defender-atp/troubleshoot-onboarding-error-messages-windows-defender-advanced-threat-protection.md) +##### [Onboard machines](microsoft-defender-atp/onboard-configure.md) +###### [Onboard previous versions of Windows](microsoft-defender-atp/onboard-downlevel.md) +###### [Onboard Windows 10 machines](microsoft-defender-atp/configure-endpoints.md) +####### [Onboard machines using Group Policy](microsoft-defender-atp/configure-endpoints-gp.md) +####### [Onboard machines using System Center Configuration Manager](microsoft-defender-atp/configure-endpoints-sccm.md) +####### [Onboard machines using Mobile Device Management tools](microsoft-defender-atp/configure-endpoints-mdm.md) +######## [Onboard machines using Microsoft Intune](microsoft-defender-atp/configure-endpoints-mdm.md#onboard-machines-using-microsoft-intune) +####### [Onboard machines using a local script](microsoft-defender-atp/configure-endpoints-script.md) +####### [Onboard non-persistent virtual desktop infrastructure (VDI) machines](microsoft-defender-atp/configure-endpoints-vdi.md) +###### [Onboard servers](microsoft-defender-atp/configure-server-endpoints.md) +###### [Onboard non-Windows machines](microsoft-defender-atp/configure-endpoints-non-windows.md) +###### [Run a detection test on a newly onboarded machine](microsoft-defender-atp/run-detection-test.md) +###### [Run simulated attacks on machines](microsoft-defender-atp/attack-simulations.md) +###### [Configure proxy and Internet connectivity settings](microsoft-defender-atp/configure-proxy-internet.md) +###### [Troubleshoot onboarding issues](microsoft-defender-atp/troubleshoot-onboarding.md) +####### [Troubleshoot subscription and portal access issues](microsoft-defender-atp/troubleshoot-onboarding-error-messages.md) ##### [Windows Defender ATP API](microsoft-defender-atp/use-apis.md) ###### [Get started with Windows Defender ATP APIs](microsoft-defender-atp/apis-intro.md) @@ -316,43 +316,43 @@ #####Windows updates (KB) info -###### [Get KbInfo collection](microsoft-defender-atp/get-kbinfo-collection-windows-defender-advanced-threat-protection.md) +###### [Get KbInfo collection](microsoft-defender-atp/get-kbinfo-collection.md) #####Common Vulnerabilities and Exposures (CVE) to KB map -###### [Get CVE-KB map](microsoft-defender-atp/get-cvekbmap-collection-windows-defender-advanced-threat-protection.md) +###### [Get CVE-KB map](microsoft-defender-atp/get-cvekbmap-collection.md) ##### API for custom alerts -###### [Enable the custom threat intelligence application](microsoft-defender-atp/enable-custom-ti-windows-defender-advanced-threat-protection.md) -###### [Use the threat intelligence API to create custom alerts](microsoft-defender-atp/use-custom-ti-windows-defender-advanced-threat-protection.md) -###### [Create custom threat intelligence alerts](microsoft-defender-atp/custom-ti-api-windows-defender-advanced-threat-protection.md) -###### [PowerShell code examples](microsoft-defender-atp/powershell-example-code-windows-defender-advanced-threat-protection.md) -###### [Python code examples](microsoft-defender-atp/python-example-code-windows-defender-advanced-threat-protection.md) -###### [Experiment with custom threat intelligence alerts](microsoft-defender-atp/experiment-custom-ti-windows-defender-advanced-threat-protection.md) -###### [Troubleshoot custom threat intelligence issues](microsoft-defender-atp/troubleshoot-custom-ti-windows-defender-advanced-threat-protection.md) +###### [Enable the custom threat intelligence application](microsoft-defender-atp/enable-custom-ti.md) +###### [Use the threat intelligence API to create custom alerts](microsoft-defender-atp/use-custom-ti.md) +###### [Create custom threat intelligence alerts](microsoft-defender-atp/custom-ti-api.md) +###### [PowerShell code examples](microsoft-defender-atp/powershell-example-code.md) +###### [Python code examples](microsoft-defender-atp/python-example-code.md) +###### [Experiment with custom threat intelligence alerts](microsoft-defender-atp/experiment-custom-ti.md) +###### [Troubleshoot custom threat intelligence issues](microsoft-defender-atp/troubleshoot-custom-ti.md) -##### [Pull alerts to your SIEM tools](microsoft-defender-atp/configure-siem-windows-defender-advanced-threat-protection.md) -###### [Enable SIEM integration](microsoft-defender-atp/enable-siem-integration-windows-defender-advanced-threat-protection.md) -###### [Configure Splunk to pull alerts](microsoft-defender-atp/configure-splunk-windows-defender-advanced-threat-protection.md) -###### [Configure HP ArcSight to pull alerts](microsoft-defender-atp/configure-arcsight-windows-defender-advanced-threat-protection.md) -###### [Windows Defender ATP SIEM alert API fields](microsoft-defender-atp/api-portal-mapping-windows-defender-advanced-threat-protection.md) -###### [Pull alerts using SIEM REST API](microsoft-defender-atp/pull-alerts-using-rest-api-windows-defender-advanced-threat-protection.md) -###### [Troubleshoot SIEM tool integration issues](microsoft-defender-atp/troubleshoot-siem-windows-defender-advanced-threat-protection.md) +##### [Pull alerts to your SIEM tools](microsoft-defender-atp/configure-siem.md) +###### [Enable SIEM integration](microsoft-defender-atp/enable-siem-integration.md) +###### [Configure Splunk to pull alerts](microsoft-defender-atp/configure-splunk.md) +###### [Configure HP ArcSight to pull alerts](microsoft-defender-atp/configure-arcsight.md) +###### [Windows Defender ATP SIEM alert API fields](microsoft-defender-atp/api-portal-mapping.md) +###### [Pull alerts using SIEM REST API](microsoft-defender-atp/pull-alerts-using-rest-api.md) +###### [Troubleshoot SIEM tool integration issues](microsoft-defender-atp/troubleshoot-siem.md) ##### Reporting -###### [Create and build Power BI reports using Windows Defender ATP data](microsoft-defender-atp/powerbi-reports-windows-defender-advanced-threat-protection.md) -###### [Threat protection reports](microsoft-defender-atp/threat-protection-reports-windows-defender-advanced-threat-protection.md) -###### [Machine health and compliance reports](microsoft-defender-atp/machine-reports-windows-defender-advanced-threat-protection.md) +###### [Create and build Power BI reports using Windows Defender ATP data](microsoft-defender-atp/powerbi-reports.md) +###### [Threat protection reports](microsoft-defender-atp/threat-protection-reports.md) +###### [Machine health and compliance reports](microsoft-defender-atp/machine-reports.md) ##### Role-based access control -###### [Manage portal access using RBAC](microsoft-defender-atp/rbac-windows-defender-advanced-threat-protection.md) -####### [Create and manage roles](microsoft-defender-atp/user-roles-windows-defender-advanced-threat-protection.md) -####### [Create and manage machine groups](microsoft-defender-atp/machine-groups-windows-defender-advanced-threat-protection.md) -######## [Create and manage machine tags](microsoft-defender-atp/machine-tags-windows-defender-advanced-threat-protection.md) +###### [Manage portal access using RBAC](microsoft-defender-atp/rbac.md) +####### [Create and manage roles](microsoft-defender-atp/user-roles.md) +####### [Create and manage machine groups](microsoft-defender-atp/machine-groups.md) +######## [Create and manage machine tags](microsoft-defender-atp/machine-tags.md) -##### [Configure managed security service provider (MSSP) support](microsoft-defender-atp/configure-mssp-support-windows-defender-advanced-threat-protection.md) +##### [Configure managed security service provider (MSSP) support](microsoft-defender-atp/configure-mssp-support.md) #### [Configure and manage Microsoft Threat Experts capabilities](microsoft-defender-atp/configure-microsoft-threat-experts.md) @@ -360,56 +360,56 @@ #### Configure Microsoft threat protection integration -##### [Configure conditional access](microsoft-defender-atp/configure-conditional-access-windows-defender-advanced-threat-protection.md) +##### [Configure conditional access](microsoft-defender-atp/configure-conditional-access.md) ##### [Configure Microsoft Cloud App Security integration](microsoft-defender-atp/microsoft-cloud-app-security-config.md) ##### [Configure information protection in Windows](microsoft-defender-atp/information-protection-in-windows-config.md) -#### [Configure Windows Defender Security Center settings](microsoft-defender-atp/preferences-setup-windows-defender-advanced-threat-protection.md) +#### [Configure Windows Defender Security Center settings](microsoft-defender-atp/preferences-setup.md) ##### General -###### [Update data retention settings](microsoft-defender-atp/data-retention-settings-windows-defender-advanced-threat-protection.md) -###### [Configure alert notifications](microsoft-defender-atp/configure-email-notifications-windows-defender-advanced-threat-protection.md) -###### [Enable and create Power BI reports using Windows Defender Security center data](microsoft-defender-atp/powerbi-reports-windows-defender-advanced-threat-protection.md) -###### [Enable Secure score security controls](microsoft-defender-atp/enable-secure-score-windows-defender-advanced-threat-protection.md) -###### [Configure advanced features](microsoft-defender-atp/advanced-features-windows-defender-advanced-threat-protection.md) +###### [Update data retention settings](microsoft-defender-atp/data-retention-settings.md) +###### [Configure alert notifications](microsoft-defender-atp/configure-email-notifications.md) +###### [Enable and create Power BI reports using Windows Defender Security center data](microsoft-defender-atp/powerbi-reports.md) +###### [Enable Secure score security controls](microsoft-defender-atp/enable-secure-score.md) +###### [Configure advanced features](microsoft-defender-atp/advanced-features.md) ##### Permissions -###### [Use basic permissions to access the portal](microsoft-defender-atp/basic-permissions-windows-defender-advanced-threat-protection.md) -###### [Manage portal access using RBAC](microsoft-defender-atp/rbac-windows-defender-advanced-threat-protection.md) -####### [Create and manage roles](microsoft-defender-atp/user-roles-windows-defender-advanced-threat-protection.md) -####### [Create and manage machine groups](microsoft-defender-atp/machine-groups-windows-defender-advanced-threat-protection.md) -######## [Create and manage machine tags](microsoft-defender-atp/machine-tags-windows-defender-advanced-threat-protection.md) +###### [Use basic permissions to access the portal](microsoft-defender-atp/basic-permissions.md) +###### [Manage portal access using RBAC](microsoft-defender-atp/rbac.md) +####### [Create and manage roles](microsoft-defender-atp/user-roles.md) +####### [Create and manage machine groups](microsoft-defender-atp/machine-groups.md) +######## [Create and manage machine tags](microsoft-defender-atp/machine-tags.md) ##### APIs -###### [Enable Threat intel](microsoft-defender-atp/enable-custom-ti-windows-defender-advanced-threat-protection.md) -###### [Enable SIEM integration](microsoft-defender-atp/enable-siem-integration-windows-defender-advanced-threat-protection.md) +###### [Enable Threat intel](microsoft-defender-atp/enable-custom-ti.md) +###### [Enable SIEM integration](microsoft-defender-atp/enable-siem-integration.md) #####Rules -###### [Manage suppression rules](microsoft-defender-atp/manage-suppression-rules-windows-defender-advanced-threat-protection.md) -###### [Manage automation allowed/blocked lists](microsoft-defender-atp/manage-automation-allowed-blocked-list-windows-defender-advanced-threat-protection.md) -###### [Manage allowed/blocked lists](microsoft-defender-atp/manage-allowed-blocked-list-windows-defender-advanced-threat-protection.md) -###### [Manage automation file uploads](microsoft-defender-atp/manage-automation-file-uploads-windows-defender-advanced-threat-protection.md) -###### [Manage automation folder exclusions](microsoft-defender-atp/manage-automation-folder-exclusions-windows-defender-advanced-threat-protection.md) +###### [Manage suppression rules](microsoft-defender-atp/manage-suppression-rules.md) +###### [Manage automation allowed/blocked lists](microsoft-defender-atp/manage-automation-allowed-blocked-list.md) +###### [Manage allowed/blocked lists](microsoft-defender-atp/manage-allowed-blocked-list.md) +###### [Manage automation file uploads](microsoft-defender-atp/manage-automation-file-uploads.md) +###### [Manage automation folder exclusions](microsoft-defender-atp/manage-automation-folder-exclusions.md) #####Machine management -###### [Onboarding machines](microsoft-defender-atp/onboard-configure-windows-defender-advanced-threat-protection.md) -###### [Offboarding machines](microsoft-defender-atp/offboard-machines-windows-defender-advanced-threat-protection.md) +###### [Onboarding machines](microsoft-defender-atp/onboard-configure.md) +###### [Offboarding machines](microsoft-defender-atp/offboard-machines.md) -##### [Configure Windows Defender Security Center time zone settings](microsoft-defender-atp/time-settings-windows-defender-advanced-threat-protection.md) +##### [Configure Windows Defender Security Center time zone settings](microsoft-defender-atp/time-settings.md) ### [Troubleshoot Windows Defender ATP](microsoft-defender-atp/troubleshoot-wdatp.md) ####Troubleshoot sensor state -##### [Check sensor state](microsoft-defender-atp/check-sensor-status-windows-defender-advanced-threat-protection.md) -##### [Fix unhealthy sensors](microsoft-defender-atp/fix-unhealhty-sensors-windows-defender-advanced-threat-protection.md) -##### [Inactive machines](microsoft-defender-atp/fix-unhealhty-sensors-windows-defender-advanced-threat-protection.md#inactive-machines) -##### [Misconfigured machines](microsoft-defender-atp/fix-unhealhty-sensors-windows-defender-advanced-threat-protection.md#misconfigured-machines) -##### [Review sensor events and errors on machines with Event Viewer](microsoft-defender-atp/event-error-codes-windows-defender-advanced-threat-protection.md) +##### [Check sensor state](microsoft-defender-atp/check-sensor-status.md) +##### [Fix unhealthy sensors](microsoft-defender-atp/fix-unhealhty-sensors.md) +##### [Inactive machines](microsoft-defender-atp/fix-unhealhty-sensors.md#inactive-machines) +##### [Misconfigured machines](microsoft-defender-atp/fix-unhealhty-sensors.md#misconfigured-machines) +##### [Review sensor events and errors on machines with Event Viewer](microsoft-defender-atp/event-error-codes.md) -#### [Troubleshoot Windows Defender ATP service issues](microsoft-defender-atp/troubleshoot-windows-defender-advanced-threat-protection.md) -##### [Check service health](microsoft-defender-atp/service-status-windows-defender-advanced-threat-protection.md) +#### [Troubleshoot Windows Defender ATP service issues](microsoft-defender-atp/troubleshoot.md) +##### [Check service health](microsoft-defender-atp/service-status.md) ####Troubleshoot attack surface reduction ##### [Network protection](windows-defender-exploit-guard/troubleshoot-np.md) diff --git a/windows/security/threat-protection/microsoft-defender-atp/windows-defender-advanced-threat-protection.md b/windows/security/threat-protection/microsoft-defender-atp/microsoft-defender-advanced-threat-protection.md similarity index 100% rename from windows/security/threat-protection/microsoft-defender-atp/windows-defender-advanced-threat-protection.md rename to windows/security/threat-protection/microsoft-defender-atp/microsoft-defender-advanced-threat-protection.md From 552ea6dcb0d88a6b5aa31108077af251ca1c708e Mon Sep 17 00:00:00 2001 From: Joey Caparas Date: Wed, 10 Apr 2019 14:34:39 -0700 Subject: [PATCH 139/724] remove -wdatp, update all file names --- windows/security/threat-protection/TOC.md | 210 +++++++++--------- ...n-new.md => add-or-remove-machine-tags.md} | 0 ...eat-protection.md => advanced-features.md} | 0 ....md => advanced-hunting-best-practices.md} | 0 ...ction.md => advanced-hunting-reference.md} | 0 ...reat-protection.md => advanced-hunting.md} | 0 ...d-threat-protection.md => alerts-queue.md} | 0 ...ced-threat-protection-new.md => alerts.md} | 0 ...at-protection.md => api-portal-mapping.md} | 0 ...-protection.md => assign-portal-access.md} | 0 ...at-protection.md => attack-simulations.md} | 0 ...tection.md => automated-investigations.md} | 0 ...eat-protection.md => basic-permissions.md} | 0 ...t-protection.md => check-sensor-status.md} | 0 ...ew.md => collect-investigation-package.md} | 0 ...nced-threat-protection.md => community.md} | 0 ...ed-threat-protection.md => conditional.md} | 0 ...at-protection.md => configure-arcsight.md} | 0 ...ion.md => configure-conditional-access.md} | 0 ...on.md => configure-email-notifications.md} | 0 ...rotection.md => configure-endpoints-gp.md} | 0 ...otection.md => configure-endpoints-mdm.md} | 0 ....md => configure-endpoints-non-windows.md} | 0 ...tection.md => configure-endpoints-sccm.md} | 0 ...ction.md => configure-endpoints-script.md} | 0 ...otection.md => configure-endpoints-vdi.md} | 0 ...t-protection.md => configure-endpoints.md} | 0 ...rotection.md => configure-mssp-support.md} | 0 ...tection.md => configure-proxy-internet.md} | 0 ...ction.md => configure-server-endpoints.md} | 0 ...threat-protection.md => configure-siem.md} | 0 ...reat-protection.md => configure-splunk.md} | 0 ...on-new.md => create-alert-by-reference.md} | 0 ...-threat-protection.md => custom-ti-api.md} | 0 ...otection.md => data-retention-settings.md} | 0 ...-protection.md => data-storage-privacy.md} | 0 ...rotection.md => defender-compatibility.md} | 0 ...on-new.md => delete-ti-indicator-by-id.md} | 0 ...reat-protection.md => enable-custom-ti.md} | 0 ...t-protection.md => enable-secure-score.md} | 0 ...otection.md => enable-siem-integration.md} | 0 ...eat-protection.md => event-error-codes.md} | 0 ...-protection.md => experiment-custom-ti.md} | 0 ...nced-threat-protection-new.md => files.md} | 0 ...tion-new.md => find-machine-info-by-ip.md} | 0 ...otection-new.md => find-machines-by-ip.md} | 0 ...protection.md => fix-unhealhty-sensors.md} | 0 ...tection-new.md => get-alert-info-by-id.md} | 0 ...ew.md => get-alert-related-domain-info.md} | 0 ...new.md => get-alert-related-files-info.md} | 0 ...on-new.md => get-alert-related-ip-info.md} | 0 ...w.md => get-alert-related-machine-info.md} | 0 ...-new.md => get-alert-related-user-info.md} | 0 ...threat-protection-new.md => get-alerts.md} | 0 ...otection.md => get-cvekbmap-collection.md} | 0 ...on-new.md => get-domain-related-alerts.md} | 0 ...-new.md => get-domain-related-machines.md} | 0 ...ection-new.md => get-domain-statistics.md} | 0 ...tection-new.md => get-file-information.md} | 0 ...tion-new.md => get-file-related-alerts.md} | 0 ...on-new.md => get-file-related-machines.md} | 0 ...otection-new.md => get-file-statistics.md} | 0 ...ection-new.md => get-ip-related-alerts.md} | 0 ...tion-new.md => get-ip-related-machines.md} | 0 ...protection-new.md => get-ip-statistics.md} | 0 ...protection.md => get-kbinfo-collection.md} | 0 ...protection-new.md => get-machine-by-id.md} | 0 ...ion-new.md => get-machine-log-on-users.md} | 0 ...n-new.md => get-machine-related-alerts.md} | 0 ...ion-new.md => get-machineaction-object.md} | 0 ...ew.md => get-machineactions-collection.md} | 0 ...ion.md => get-machinegroups-collection.md} | 0 ...reat-protection-new.md => get-machines.md} | 0 ...> get-machinesecuritystates-collection.md} | 0 ...otection-new.md => get-package-sas-uri.md} | 0 ...new.md => get-ti-indicators-collection.md} | 0 ...tection-new.md => get-user-information.md} | 0 ...tion-new.md => get-user-related-alerts.md} | 0 ...on-new.md => get-user-related-machines.md} | 0 ...ew.md => initiate-autoir-investigation.md} | 0 ...at-protection.md => investigate-alerts.md} | 0 ...at-protection.md => investigate-domain.md} | 0 ...eat-protection.md => investigate-files.md} | 0 ...protection.md => investigate-incidents.md} | 0 ...threat-protection.md => investigate-ip.md} | 0 ...-protection.md => investigate-machines.md} | 0 ...reat-protection.md => investigate-user.md} | 0 ...ection-new.md => is-domain-seen-in-org.md} | 0 ...at-protection-new.md => is-ip-seen-org.md} | 0 ...t-protection-new.md => isolate-machine.md} | 0 ...nced-threat-protection.md => licensing.md} | 0 ...threat-protection.md => machine-groups.md} | 0 ...hreat-protection.md => machine-reports.md} | 0 ...d-threat-protection.md => machine-tags.md} | 0 ...ed-threat-protection-new.md => machine.md} | 0 ...eat-protection-new.md => machineaction.md} | 0 ...rotection.md => machines-view-overview.md} | 0 ...-threat-protection.md => manage-alerts.md} | 0 ...tion.md => manage-allowed-blocked-list.md} | 0 ...ection.md => manage-auto-investigation.md} | 0 ...manage-automation-allowed-blocked-list.md} | 0 ...n.md => manage-automation-file-uploads.md} | 0 ...=> manage-automation-folder-exclusions.md} | 0 ...reat-protection.md => manage-incidents.md} | 0 ...tection.md => manage-suppression-rules.md} | 0 ...-protection.md => minimum-requirements.md} | 0 ...d-threat-protection.md => mssp-support.md} | 0 ...tection-new.md => offboard-machine-api.md} | 0 ...eat-protection.md => offboard-machines.md} | 0 ...eat-protection.md => onboard-configure.md} | 0 ...eat-protection.md => onboard-downlevel.md} | 0 ...reat-protection.md => overview-hunting.md} | 0 ...protection.md => overview-secure-score.md} | 0 ...hreat-protection.md => portal-overview.md} | 0 ...protection-new.md => post-ti-indicator.md} | 0 ...hreat-protection.md => powerbi-reports.md} | 0 ...otection.md => powershell-example-code.md} | 0 ...eat-protection.md => preferences-setup.md} | 0 ...reat-protection.md => preview-settings.md} | 0 ...vanced-threat-protection.md => preview.md} | 0 ...ction.md => pull-alerts-using-rest-api.md} | 0 ...t-protection.md => python-example-code.md} | 0 ...-advanced-threat-protection.md => rbac.md} | 0 ...t-protection.md => respond-file-alerts.md} | 0 ...rotection.md => respond-machine-alerts.md} | 0 ...reat-protection.md => response-actions.md} | 0 ...tion-new.md => restrict-code-execution.md} | 0 ...hreat-protection-new.md => run-av-scan.md} | 0 ...at-protection.md => run-detection-test.md} | 0 ...rotection.md => secure-score-dashboard.md} | 0 ...on.md => security-operations-dashboard.md} | 0 ...threat-protection.md => service-status.md} | 0 ...ion-new.md => stop-and-quarantine-file.md} | 0 ...otection.md => supported-response-apis.md} | 0 ...ection.md => threat-indicator-concepts.md} | 0 ...ection.md => threat-protection-reports.md} | 0 ...reat-protection-new.md => ti-indicator.md} | 0 ...-threat-protection.md => time-settings.md} | 0 ...rotection.md => troubleshoot-custom-ti.md} | 0 ...troubleshoot-onboarding-error-messages.md} | 0 ...otection.md => troubleshoot-onboarding.md} | 0 ...hoot-wdatp.md => troubleshoot-overview.md} | 0 ...eat-protection.md => troubleshoot-siem.md} | 0 ...d-threat-protection.md => troubleshoot.md} | 0 ...protection-new.md => unisolate-machine.md} | 0 ...on-new.md => unrestrict-code-execution.md} | 0 ...reat-protection-new.md => update-alert.md} | 0 ...-threat-protection.md => use-custom-ti.md} | 0 ...r-advanced-threat-protection.md => use.md} | 0 ...ced-threat-protection.md => user-roles.md} | 0 ...anced-threat-protection-new.md => user.md} | 0 ...=> whats-new-in-microsoft-defender-atp.md} | 0 152 files changed, 105 insertions(+), 105 deletions(-) rename windows/security/threat-protection/microsoft-defender-atp/{add-or-remove-machine-tags-windows-defender-advanced-threat-protection-new.md => add-or-remove-machine-tags.md} (100%) rename windows/security/threat-protection/microsoft-defender-atp/{advanced-features-windows-defender-advanced-threat-protection.md => advanced-features.md} (100%) rename windows/security/threat-protection/microsoft-defender-atp/{advanced-hunting-best-practices-windows-defender-advanced-threat-protection.md => advanced-hunting-best-practices.md} (100%) rename windows/security/threat-protection/microsoft-defender-atp/{advanced-hunting-reference-windows-defender-advanced-threat-protection.md => advanced-hunting-reference.md} (100%) rename windows/security/threat-protection/microsoft-defender-atp/{advanced-hunting-windows-defender-advanced-threat-protection.md => advanced-hunting.md} (100%) rename windows/security/threat-protection/microsoft-defender-atp/{alerts-queue-windows-defender-advanced-threat-protection.md => alerts-queue.md} (100%) rename windows/security/threat-protection/microsoft-defender-atp/{alerts-windows-defender-advanced-threat-protection-new.md => alerts.md} (100%) rename windows/security/threat-protection/microsoft-defender-atp/{api-portal-mapping-windows-defender-advanced-threat-protection.md => api-portal-mapping.md} (100%) rename windows/security/threat-protection/microsoft-defender-atp/{assign-portal-access-windows-defender-advanced-threat-protection.md => assign-portal-access.md} (100%) rename windows/security/threat-protection/microsoft-defender-atp/{attack-simulations-windows-defender-advanced-threat-protection.md => attack-simulations.md} (100%) rename windows/security/threat-protection/microsoft-defender-atp/{automated-investigations-windows-defender-advanced-threat-protection.md => automated-investigations.md} (100%) rename windows/security/threat-protection/microsoft-defender-atp/{basic-permissions-windows-defender-advanced-threat-protection.md => basic-permissions.md} (100%) rename windows/security/threat-protection/microsoft-defender-atp/{check-sensor-status-windows-defender-advanced-threat-protection.md => check-sensor-status.md} (100%) rename windows/security/threat-protection/microsoft-defender-atp/{collect-investigation-package-windows-defender-advanced-threat-protection-new.md => collect-investigation-package.md} (100%) rename windows/security/threat-protection/microsoft-defender-atp/{community-windows-defender-advanced-threat-protection.md => community.md} (100%) rename windows/security/threat-protection/microsoft-defender-atp/{conditional-access-windows-defender-advanced-threat-protection.md => conditional.md} (100%) rename windows/security/threat-protection/microsoft-defender-atp/{configure-arcsight-windows-defender-advanced-threat-protection.md => configure-arcsight.md} (100%) rename windows/security/threat-protection/microsoft-defender-atp/{configure-conditional-access-windows-defender-advanced-threat-protection.md => configure-conditional-access.md} (100%) rename windows/security/threat-protection/microsoft-defender-atp/{configure-email-notifications-windows-defender-advanced-threat-protection.md => configure-email-notifications.md} (100%) rename windows/security/threat-protection/microsoft-defender-atp/{configure-endpoints-gp-windows-defender-advanced-threat-protection.md => configure-endpoints-gp.md} (100%) rename windows/security/threat-protection/microsoft-defender-atp/{configure-endpoints-mdm-windows-defender-advanced-threat-protection.md => configure-endpoints-mdm.md} (100%) rename windows/security/threat-protection/microsoft-defender-atp/{configure-endpoints-non-windows-windows-defender-advanced-threat-protection.md => configure-endpoints-non-windows.md} (100%) rename windows/security/threat-protection/microsoft-defender-atp/{configure-endpoints-sccm-windows-defender-advanced-threat-protection.md => configure-endpoints-sccm.md} (100%) rename windows/security/threat-protection/microsoft-defender-atp/{configure-endpoints-script-windows-defender-advanced-threat-protection.md => configure-endpoints-script.md} (100%) rename windows/security/threat-protection/microsoft-defender-atp/{configure-endpoints-vdi-windows-defender-advanced-threat-protection.md => configure-endpoints-vdi.md} (100%) rename windows/security/threat-protection/microsoft-defender-atp/{configure-endpoints-windows-defender-advanced-threat-protection.md => configure-endpoints.md} (100%) rename windows/security/threat-protection/microsoft-defender-atp/{configure-mssp-support-windows-defender-advanced-threat-protection.md => configure-mssp-support.md} (100%) rename windows/security/threat-protection/microsoft-defender-atp/{configure-proxy-internet-windows-defender-advanced-threat-protection.md => configure-proxy-internet.md} (100%) rename windows/security/threat-protection/microsoft-defender-atp/{configure-server-endpoints-windows-defender-advanced-threat-protection.md => configure-server-endpoints.md} (100%) rename windows/security/threat-protection/microsoft-defender-atp/{configure-siem-windows-defender-advanced-threat-protection.md => configure-siem.md} (100%) rename windows/security/threat-protection/microsoft-defender-atp/{configure-splunk-windows-defender-advanced-threat-protection.md => configure-splunk.md} (100%) rename windows/security/threat-protection/microsoft-defender-atp/{create-alert-by-reference-windows-defender-advanced-threat-protection-new.md => create-alert-by-reference.md} (100%) rename windows/security/threat-protection/microsoft-defender-atp/{custom-ti-api-windows-defender-advanced-threat-protection.md => custom-ti-api.md} (100%) rename windows/security/threat-protection/microsoft-defender-atp/{data-retention-settings-windows-defender-advanced-threat-protection.md => data-retention-settings.md} (100%) rename windows/security/threat-protection/microsoft-defender-atp/{data-storage-privacy-windows-defender-advanced-threat-protection.md => data-storage-privacy.md} (100%) rename windows/security/threat-protection/microsoft-defender-atp/{defender-compatibility-windows-defender-advanced-threat-protection.md => defender-compatibility.md} (100%) rename windows/security/threat-protection/microsoft-defender-atp/{delete-ti-indicator-by-id-windows-defender-advanced-threat-protection-new.md => delete-ti-indicator-by-id.md} (100%) rename windows/security/threat-protection/microsoft-defender-atp/{enable-custom-ti-windows-defender-advanced-threat-protection.md => enable-custom-ti.md} (100%) rename windows/security/threat-protection/microsoft-defender-atp/{enable-secure-score-windows-defender-advanced-threat-protection.md => enable-secure-score.md} (100%) rename windows/security/threat-protection/microsoft-defender-atp/{enable-siem-integration-windows-defender-advanced-threat-protection.md => enable-siem-integration.md} (100%) rename windows/security/threat-protection/microsoft-defender-atp/{event-error-codes-windows-defender-advanced-threat-protection.md => event-error-codes.md} (100%) rename windows/security/threat-protection/microsoft-defender-atp/{experiment-custom-ti-windows-defender-advanced-threat-protection.md => experiment-custom-ti.md} (100%) rename windows/security/threat-protection/microsoft-defender-atp/{files-windows-defender-advanced-threat-protection-new.md => files.md} (100%) rename windows/security/threat-protection/microsoft-defender-atp/{find-machine-info-by-ip-windows-defender-advanced-threat-protection-new.md => find-machine-info-by-ip.md} (100%) rename windows/security/threat-protection/microsoft-defender-atp/{find-machines-by-ip-windows-defender-advanced-threat-protection-new.md => find-machines-by-ip.md} (100%) rename windows/security/threat-protection/microsoft-defender-atp/{fix-unhealhty-sensors-windows-defender-advanced-threat-protection.md => fix-unhealhty-sensors.md} (100%) rename windows/security/threat-protection/microsoft-defender-atp/{get-alert-info-by-id-windows-defender-advanced-threat-protection-new.md => get-alert-info-by-id.md} (100%) rename windows/security/threat-protection/microsoft-defender-atp/{get-alert-related-domain-info-windows-defender-advanced-threat-protection-new.md => get-alert-related-domain-info.md} (100%) rename windows/security/threat-protection/microsoft-defender-atp/{get-alert-related-files-info-windows-defender-advanced-threat-protection-new.md => get-alert-related-files-info.md} (100%) rename windows/security/threat-protection/microsoft-defender-atp/{get-alert-related-ip-info-windows-defender-advanced-threat-protection-new.md => get-alert-related-ip-info.md} (100%) rename windows/security/threat-protection/microsoft-defender-atp/{get-alert-related-machine-info-windows-defender-advanced-threat-protection-new.md => get-alert-related-machine-info.md} (100%) rename windows/security/threat-protection/microsoft-defender-atp/{get-alert-related-user-info-windows-defender-advanced-threat-protection-new.md => get-alert-related-user-info.md} (100%) rename windows/security/threat-protection/microsoft-defender-atp/{get-alerts-windows-defender-advanced-threat-protection-new.md => get-alerts.md} (100%) rename windows/security/threat-protection/microsoft-defender-atp/{get-cvekbmap-collection-windows-defender-advanced-threat-protection.md => get-cvekbmap-collection.md} (100%) rename windows/security/threat-protection/microsoft-defender-atp/{get-domain-related-alerts-windows-defender-advanced-threat-protection-new.md => get-domain-related-alerts.md} (100%) rename windows/security/threat-protection/microsoft-defender-atp/{get-domain-related-machines-windows-defender-advanced-threat-protection-new.md => get-domain-related-machines.md} (100%) rename windows/security/threat-protection/microsoft-defender-atp/{get-domain-statistics-windows-defender-advanced-threat-protection-new.md => get-domain-statistics.md} (100%) rename windows/security/threat-protection/microsoft-defender-atp/{get-file-information-windows-defender-advanced-threat-protection-new.md => get-file-information.md} (100%) rename windows/security/threat-protection/microsoft-defender-atp/{get-file-related-alerts-windows-defender-advanced-threat-protection-new.md => get-file-related-alerts.md} (100%) rename windows/security/threat-protection/microsoft-defender-atp/{get-file-related-machines-windows-defender-advanced-threat-protection-new.md => get-file-related-machines.md} (100%) rename windows/security/threat-protection/microsoft-defender-atp/{get-file-statistics-windows-defender-advanced-threat-protection-new.md => get-file-statistics.md} (100%) rename windows/security/threat-protection/microsoft-defender-atp/{get-ip-related-alerts-windows-defender-advanced-threat-protection-new.md => get-ip-related-alerts.md} (100%) rename windows/security/threat-protection/microsoft-defender-atp/{get-ip-related-machines-windows-defender-advanced-threat-protection-new.md => get-ip-related-machines.md} (100%) rename windows/security/threat-protection/microsoft-defender-atp/{get-ip-statistics-windows-defender-advanced-threat-protection-new.md => get-ip-statistics.md} (100%) rename windows/security/threat-protection/microsoft-defender-atp/{get-kbinfo-collection-windows-defender-advanced-threat-protection.md => get-kbinfo-collection.md} (100%) rename windows/security/threat-protection/microsoft-defender-atp/{get-machine-by-id-windows-defender-advanced-threat-protection-new.md => get-machine-by-id.md} (100%) rename windows/security/threat-protection/microsoft-defender-atp/{get-machine-log-on-users-windows-defender-advanced-threat-protection-new.md => get-machine-log-on-users.md} (100%) rename windows/security/threat-protection/microsoft-defender-atp/{get-machine-related-alerts-windows-defender-advanced-threat-protection-new.md => get-machine-related-alerts.md} (100%) rename windows/security/threat-protection/microsoft-defender-atp/{get-machineaction-object-windows-defender-advanced-threat-protection-new.md => get-machineaction-object.md} (100%) rename windows/security/threat-protection/microsoft-defender-atp/{get-machineactions-collection-windows-defender-advanced-threat-protection-new.md => get-machineactions-collection.md} (100%) rename windows/security/threat-protection/microsoft-defender-atp/{get-machinegroups-collection-windows-defender-advanced-threat-protection.md => get-machinegroups-collection.md} (100%) rename windows/security/threat-protection/microsoft-defender-atp/{get-machines-windows-defender-advanced-threat-protection-new.md => get-machines.md} (100%) rename windows/security/threat-protection/microsoft-defender-atp/{get-machinesecuritystates-collection-windows-defender-advanced-threat-protection.md => get-machinesecuritystates-collection.md} (100%) rename windows/security/threat-protection/microsoft-defender-atp/{get-package-sas-uri-windows-defender-advanced-threat-protection-new.md => get-package-sas-uri.md} (100%) rename windows/security/threat-protection/microsoft-defender-atp/{get-ti-indicators-collection-windows-defender-advanced-threat-protection-new.md => get-ti-indicators-collection.md} (100%) rename windows/security/threat-protection/microsoft-defender-atp/{get-user-information-windows-defender-advanced-threat-protection-new.md => get-user-information.md} (100%) rename windows/security/threat-protection/microsoft-defender-atp/{get-user-related-alerts-windows-defender-advanced-threat-protection-new.md => get-user-related-alerts.md} (100%) rename windows/security/threat-protection/microsoft-defender-atp/{get-user-related-machines-windows-defender-advanced-threat-protection-new.md => get-user-related-machines.md} (100%) rename windows/security/threat-protection/microsoft-defender-atp/{initiate-autoir-investigation-windows-defender-advanced-threat-protection-new.md => initiate-autoir-investigation.md} (100%) rename windows/security/threat-protection/microsoft-defender-atp/{investigate-alerts-windows-defender-advanced-threat-protection.md => investigate-alerts.md} (100%) rename windows/security/threat-protection/microsoft-defender-atp/{investigate-domain-windows-defender-advanced-threat-protection.md => investigate-domain.md} (100%) rename windows/security/threat-protection/microsoft-defender-atp/{investigate-files-windows-defender-advanced-threat-protection.md => investigate-files.md} (100%) rename windows/security/threat-protection/microsoft-defender-atp/{investigate-incidents-windows-defender-advanced-threat-protection.md => investigate-incidents.md} (100%) rename windows/security/threat-protection/microsoft-defender-atp/{investigate-ip-windows-defender-advanced-threat-protection.md => investigate-ip.md} (100%) rename windows/security/threat-protection/microsoft-defender-atp/{investigate-machines-windows-defender-advanced-threat-protection.md => investigate-machines.md} (100%) rename windows/security/threat-protection/microsoft-defender-atp/{investigate-user-windows-defender-advanced-threat-protection.md => investigate-user.md} (100%) rename windows/security/threat-protection/microsoft-defender-atp/{is-domain-seen-in-org-windows-defender-advanced-threat-protection-new.md => is-domain-seen-in-org.md} (100%) rename windows/security/threat-protection/microsoft-defender-atp/{is-ip-seen-org-windows-defender-advanced-threat-protection-new.md => is-ip-seen-org.md} (100%) rename windows/security/threat-protection/microsoft-defender-atp/{isolate-machine-windows-defender-advanced-threat-protection-new.md => isolate-machine.md} (100%) rename windows/security/threat-protection/microsoft-defender-atp/{licensing-windows-defender-advanced-threat-protection.md => licensing.md} (100%) rename windows/security/threat-protection/microsoft-defender-atp/{machine-groups-windows-defender-advanced-threat-protection.md => machine-groups.md} (100%) rename windows/security/threat-protection/microsoft-defender-atp/{machine-reports-windows-defender-advanced-threat-protection.md => machine-reports.md} (100%) rename windows/security/threat-protection/microsoft-defender-atp/{machine-tags-windows-defender-advanced-threat-protection.md => machine-tags.md} (100%) rename windows/security/threat-protection/microsoft-defender-atp/{machine-windows-defender-advanced-threat-protection-new.md => machine.md} (100%) rename windows/security/threat-protection/microsoft-defender-atp/{machineaction-windows-defender-advanced-threat-protection-new.md => machineaction.md} (100%) rename windows/security/threat-protection/microsoft-defender-atp/{machines-view-overview-windows-defender-advanced-threat-protection.md => machines-view-overview.md} (100%) rename windows/security/threat-protection/microsoft-defender-atp/{manage-alerts-windows-defender-advanced-threat-protection.md => manage-alerts.md} (100%) rename windows/security/threat-protection/microsoft-defender-atp/{manage-allowed-blocked-list-windows-defender-advanced-threat-protection.md => manage-allowed-blocked-list.md} (100%) rename windows/security/threat-protection/microsoft-defender-atp/{manage-auto-investigation-windows-defender-advanced-threat-protection.md => manage-auto-investigation.md} (100%) rename windows/security/threat-protection/microsoft-defender-atp/{manage-automation-allowed-blocked-list-windows-defender-advanced-threat-protection.md => manage-automation-allowed-blocked-list.md} (100%) rename windows/security/threat-protection/microsoft-defender-atp/{manage-automation-file-uploads-windows-defender-advanced-threat-protection.md => manage-automation-file-uploads.md} (100%) rename windows/security/threat-protection/microsoft-defender-atp/{manage-automation-folder-exclusions-windows-defender-advanced-threat-protection.md => manage-automation-folder-exclusions.md} (100%) rename windows/security/threat-protection/microsoft-defender-atp/{manage-incidents-windows-defender-advanced-threat-protection.md => manage-incidents.md} (100%) rename windows/security/threat-protection/microsoft-defender-atp/{manage-suppression-rules-windows-defender-advanced-threat-protection.md => manage-suppression-rules.md} (100%) rename windows/security/threat-protection/microsoft-defender-atp/{minimum-requirements-windows-defender-advanced-threat-protection.md => minimum-requirements.md} (100%) rename windows/security/threat-protection/microsoft-defender-atp/{mssp-support-windows-defender-advanced-threat-protection.md => mssp-support.md} (100%) rename windows/security/threat-protection/microsoft-defender-atp/{offboard-machine-api-windows-defender-advanced-threat-protection-new.md => offboard-machine-api.md} (100%) rename windows/security/threat-protection/microsoft-defender-atp/{offboard-machines-windows-defender-advanced-threat-protection.md => offboard-machines.md} (100%) rename windows/security/threat-protection/microsoft-defender-atp/{onboard-configure-windows-defender-advanced-threat-protection.md => onboard-configure.md} (100%) rename windows/security/threat-protection/microsoft-defender-atp/{onboard-downlevel-windows-defender-advanced-threat-protection.md => onboard-downlevel.md} (100%) rename windows/security/threat-protection/microsoft-defender-atp/{overview-hunting-windows-defender-advanced-threat-protection.md => overview-hunting.md} (100%) rename windows/security/threat-protection/microsoft-defender-atp/{overview-secure-score-windows-defender-advanced-threat-protection.md => overview-secure-score.md} (100%) rename windows/security/threat-protection/microsoft-defender-atp/{portal-overview-windows-defender-advanced-threat-protection.md => portal-overview.md} (100%) rename windows/security/threat-protection/microsoft-defender-atp/{post-ti-indicator-windows-defender-advanced-threat-protection-new.md => post-ti-indicator.md} (100%) rename windows/security/threat-protection/microsoft-defender-atp/{powerbi-reports-windows-defender-advanced-threat-protection.md => powerbi-reports.md} (100%) rename windows/security/threat-protection/microsoft-defender-atp/{powershell-example-code-windows-defender-advanced-threat-protection.md => powershell-example-code.md} (100%) rename windows/security/threat-protection/microsoft-defender-atp/{preferences-setup-windows-defender-advanced-threat-protection.md => preferences-setup.md} (100%) rename windows/security/threat-protection/microsoft-defender-atp/{preview-settings-windows-defender-advanced-threat-protection.md => preview-settings.md} (100%) rename windows/security/threat-protection/microsoft-defender-atp/{preview-windows-defender-advanced-threat-protection.md => preview.md} (100%) rename windows/security/threat-protection/microsoft-defender-atp/{pull-alerts-using-rest-api-windows-defender-advanced-threat-protection.md => pull-alerts-using-rest-api.md} (100%) rename windows/security/threat-protection/microsoft-defender-atp/{python-example-code-windows-defender-advanced-threat-protection.md => python-example-code.md} (100%) rename windows/security/threat-protection/microsoft-defender-atp/{rbac-windows-defender-advanced-threat-protection.md => rbac.md} (100%) rename windows/security/threat-protection/microsoft-defender-atp/{respond-file-alerts-windows-defender-advanced-threat-protection.md => respond-file-alerts.md} (100%) rename windows/security/threat-protection/microsoft-defender-atp/{respond-machine-alerts-windows-defender-advanced-threat-protection.md => respond-machine-alerts.md} (100%) rename windows/security/threat-protection/microsoft-defender-atp/{response-actions-windows-defender-advanced-threat-protection.md => response-actions.md} (100%) rename windows/security/threat-protection/microsoft-defender-atp/{restrict-code-execution-windows-defender-advanced-threat-protection-new.md => restrict-code-execution.md} (100%) rename windows/security/threat-protection/microsoft-defender-atp/{run-av-scan-windows-defender-advanced-threat-protection-new.md => run-av-scan.md} (100%) rename windows/security/threat-protection/microsoft-defender-atp/{run-detection-test-windows-defender-advanced-threat-protection.md => run-detection-test.md} (100%) rename windows/security/threat-protection/microsoft-defender-atp/{secure-score-dashboard-windows-defender-advanced-threat-protection.md => secure-score-dashboard.md} (100%) rename windows/security/threat-protection/microsoft-defender-atp/{security-operations-dashboard-windows-defender-advanced-threat-protection.md => security-operations-dashboard.md} (100%) rename windows/security/threat-protection/microsoft-defender-atp/{service-status-windows-defender-advanced-threat-protection.md => service-status.md} (100%) rename windows/security/threat-protection/microsoft-defender-atp/{stop-and-quarantine-file-windows-defender-advanced-threat-protection-new.md => stop-and-quarantine-file.md} (100%) rename windows/security/threat-protection/microsoft-defender-atp/{supported-response-apis-windows-defender-advanced-threat-protection.md => supported-response-apis.md} (100%) rename windows/security/threat-protection/microsoft-defender-atp/{threat-indicator-concepts-windows-defender-advanced-threat-protection.md => threat-indicator-concepts.md} (100%) rename windows/security/threat-protection/microsoft-defender-atp/{threat-protection-reports-windows-defender-advanced-threat-protection.md => threat-protection-reports.md} (100%) rename windows/security/threat-protection/microsoft-defender-atp/{ti-indicator-windows-defender-advanced-threat-protection-new.md => ti-indicator.md} (100%) rename windows/security/threat-protection/microsoft-defender-atp/{time-settings-windows-defender-advanced-threat-protection.md => time-settings.md} (100%) rename windows/security/threat-protection/microsoft-defender-atp/{troubleshoot-custom-ti-windows-defender-advanced-threat-protection.md => troubleshoot-custom-ti.md} (100%) rename windows/security/threat-protection/microsoft-defender-atp/{troubleshoot-onboarding-error-messages-windows-defender-advanced-threat-protection.md => troubleshoot-onboarding-error-messages.md} (100%) rename windows/security/threat-protection/microsoft-defender-atp/{troubleshoot-onboarding-windows-defender-advanced-threat-protection.md => troubleshoot-onboarding.md} (100%) rename windows/security/threat-protection/microsoft-defender-atp/{troubleshoot-wdatp.md => troubleshoot-overview.md} (100%) rename windows/security/threat-protection/microsoft-defender-atp/{troubleshoot-siem-windows-defender-advanced-threat-protection.md => troubleshoot-siem.md} (100%) rename windows/security/threat-protection/microsoft-defender-atp/{troubleshoot-windows-defender-advanced-threat-protection.md => troubleshoot.md} (100%) rename windows/security/threat-protection/microsoft-defender-atp/{unisolate-machine-windows-defender-advanced-threat-protection-new.md => unisolate-machine.md} (100%) rename windows/security/threat-protection/microsoft-defender-atp/{unrestrict-code-execution-windows-defender-advanced-threat-protection-new.md => unrestrict-code-execution.md} (100%) rename windows/security/threat-protection/microsoft-defender-atp/{update-alert-windows-defender-advanced-threat-protection-new.md => update-alert.md} (100%) rename windows/security/threat-protection/microsoft-defender-atp/{use-custom-ti-windows-defender-advanced-threat-protection.md => use-custom-ti.md} (100%) rename windows/security/threat-protection/microsoft-defender-atp/{use-windows-defender-advanced-threat-protection.md => use.md} (100%) rename windows/security/threat-protection/microsoft-defender-atp/{user-roles-windows-defender-advanced-threat-protection.md => user-roles.md} (100%) rename windows/security/threat-protection/microsoft-defender-atp/{user-windows-defender-advanced-threat-protection-new.md => user.md} (100%) rename windows/security/threat-protection/microsoft-defender-atp/{whats-new-in-windows-defender-atp.md => whats-new-in-microsoft-defender-atp.md} (100%) diff --git a/windows/security/threat-protection/TOC.md b/windows/security/threat-protection/TOC.md index 316afb72b1..caca71920d 100644 --- a/windows/security/threat-protection/TOC.md +++ b/windows/security/threat-protection/TOC.md @@ -16,81 +16,81 @@ ##### [Network firewall](windows-firewall/windows-firewall-with-advanced-security.md) #### [Next generation protection](windows-defender-antivirus/windows-defender-antivirus-in-windows-10.md) #### [Endpoint detection and response](microsoft-defender-atp/overview-endpoint-detection-response.md) -##### [Security operations dashboard](microsoft-defender-atp/security-operations-dashboard-windows-defender-advanced-threat-protection.md) +##### [Security operations dashboard](microsoft-defender-atp/security-operations-dashboard.md) ##### [Incidents queue](microsoft-defender-atp/incidents-queue.md) ###### [View and organize the Incidents queue](microsoft-defender-atp/view-incidents-queue.md) -###### [Manage incidents](microsoft-defender-atp/manage-incidents-windows-defender-advanced-threat-protection.md) -###### [Investigate incidents](microsoft-defender-atp/investigate-incidents-windows-defender-advanced-threat-protection.md) +###### [Manage incidents](microsoft-defender-atp/manage-incidents.md) +###### [Investigate incidents](microsoft-defender-atp/investigate-incidents.md) ##### Alerts queue -###### [View and organize the Alerts queue](microsoft-defender-atp/alerts-queue-windows-defender-advanced-threat-protection.md) -###### [Manage alerts](microsoft-defender-atp/manage-alerts-windows-defender-advanced-threat-protection.md) -###### [Investigate alerts](microsoft-defender-atp/investigate-alerts-windows-defender-advanced-threat-protection.md) -###### [Investigate files](microsoft-defender-atp/investigate-files-windows-defender-advanced-threat-protection.md) -###### [Investigate machines](microsoft-defender-atp/investigate-machines-windows-defender-advanced-threat-protection.md) -###### [Investigate an IP address](microsoft-defender-atp/investigate-ip-windows-defender-advanced-threat-protection.md) -###### [Investigate a domain](microsoft-defender-atp/investigate-domain-windows-defender-advanced-threat-protection.md) -###### [Investigate a user account](microsoft-defender-atp/investigate-user-windows-defender-advanced-threat-protection.md) +###### [View and organize the Alerts queue](microsoft-defender-atp/alerts-queue.md) +###### [Manage alerts](microsoft-defender-atp/manage-alerts.md) +###### [Investigate alerts](microsoft-defender-atp/investigate-alerts.md) +###### [Investigate files](microsoft-defender-atp/investigate-files.md) +###### [Investigate machines](microsoft-defender-atp/investigate-machines.md) +###### [Investigate an IP address](microsoft-defender-atp/investigate-ip.md) +###### [Investigate a domain](microsoft-defender-atp/investigate-domain.md) +###### [Investigate a user account](microsoft-defender-atp/investigate-user.md) ##### Machines list -###### [View and organize the Machines list](microsoft-defender-atp/machines-view-overview-windows-defender-advanced-threat-protection.md) -###### [Manage machine group and tags](microsoft-defender-atp/machine-tags-windows-defender-advanced-threat-protection.md) -###### [Alerts related to this machine](microsoft-defender-atp/investigate-machines-windows-defender-advanced-threat-protection.md#alerts-related-to-this-machine) -###### [Machine timeline](microsoft-defender-atp/investigate-machines-windows-defender-advanced-threat-protection.md#machine-timeline) -####### [Search for specific events](microsoft-defender-atp/investigate-machines-windows-defender-advanced-threat-protection.md#search-for-specific-events) -####### [Filter events from a specific date](microsoft-defender-atp/investigate-machines-windows-defender-advanced-threat-protection.md#filter-events-from-a-specific-date) -####### [Export machine timeline events](microsoft-defender-atp/investigate-machines-windows-defender-advanced-threat-protection.md#export-machine-timeline-events) -####### [Navigate between pages](microsoft-defender-atp/investigate-machines-windows-defender-advanced-threat-protection.md#navigate-between-pages) +###### [View and organize the Machines list](microsoft-defender-atp/machines-view-overview.md) +###### [Manage machine group and tags](microsoft-defender-atp/machine-tags.md) +###### [Alerts related to this machine](microsoft-defender-atp/investigate-machines.md#alerts-related-to-this-machine) +###### [Machine timeline](microsoft-defender-atp/investigate-machines.md#machine-timeline) +####### [Search for specific events](microsoft-defender-atp/investigate-machines.md#search-for-specific-events) +####### [Filter events from a specific date](microsoft-defender-atp/investigate-machines.md#filter-events-from-a-specific-date) +####### [Export machine timeline events](microsoft-defender-atp/investigate-machines.md#export-machine-timeline-events) +####### [Navigate between pages](microsoft-defender-atp/investigate-machines.md#navigate-between-pages) -##### [Take response actions](microsoft-defender-atp/response-actions-windows-defender-advanced-threat-protection.md) -###### [Take response actions on a machine](microsoft-defender-atp/respond-machine-alerts-windows-defender-advanced-threat-protection.md) -####### [Collect investigation package](microsoft-defender-atp/respond-machine-alerts-windows-defender-advanced-threat-protection.md#collect-investigation-package-from-machines) -####### [Run antivirus scan](microsoft-defender-atp/respond-machine-alerts-windows-defender-advanced-threat-protection.md#run-windows-defender-antivirus-scan-on-machines) -####### [Restrict app execution](microsoft-defender-atp/respond-machine-alerts-windows-defender-advanced-threat-protection.md#restrict-app-execution) -####### [Remove app restriction](microsoft-defender-atp/respond-machine-alerts-windows-defender-advanced-threat-protection.md#remove-app-restriction) -####### [Isolate machines from the network](microsoft-defender-atp/respond-machine-alerts-windows-defender-advanced-threat-protection.md#isolate-machines-from-the-network) -####### [Release machine from isolation](microsoft-defender-atp/respond-machine-alerts-windows-defender-advanced-threat-protection.md#release-machine-from-isolation) -####### [Check activity details in Action center](microsoft-defender-atp/respond-machine-alerts-windows-defender-advanced-threat-protection.md#check-activity-details-in-action-center) +##### [Take response actions](microsoft-defender-atp/response-actions.md) +###### [Take response actions on a machine](microsoft-defender-atp/respond-machine-alerts.md) +####### [Collect investigation package](microsoft-defender-atp/respond-machine-alerts.md#collect-investigation-package-from-machines) +####### [Run antivirus scan](microsoft-defender-atp/respond-machine-alerts.md#run-windows-defender-antivirus-scan-on-machines) +####### [Restrict app execution](microsoft-defender-atp/respond-machine-alerts.md#restrict-app-execution) +####### [Remove app restriction](microsoft-defender-atp/respond-machine-alerts.md#remove-app-restriction) +####### [Isolate machines from the network](microsoft-defender-atp/respond-machine-alerts.md#isolate-machines-from-the-network) +####### [Release machine from isolation](microsoft-defender-atp/respond-machine-alerts.md#release-machine-from-isolation) +####### [Check activity details in Action center](microsoft-defender-atp/respond-machine-alerts.md#check-activity-details-in-action-center) -###### [Take response actions on a file](microsoft-defender-atp/respond-file-alerts-windows-defender-advanced-threat-protection.md) -####### [Stop and quarantine files in your network](microsoft-defender-atp/respond-file-alerts-windows-defender-advanced-threat-protection.md#stop-and-quarantine-files-in-your-network) -####### [Remove file from quarantine](microsoft-defender-atp/respond-file-alerts-windows-defender-advanced-threat-protection.md#remove-file-from-quarantine) -####### [Block files in your network](microsoft-defender-atp/respond-file-alerts-windows-defender-advanced-threat-protection.md#block-files-in-your-network) -####### [Remove file from blocked list](microsoft-defender-atp/respond-file-alerts-windows-defender-advanced-threat-protection.md#remove-file-from-blocked-list) -####### [Check activity details in Action center](microsoft-defender-atp/respond-file-alerts-windows-defender-advanced-threat-protection.md#check-activity-details-in-action-center) -####### [Deep analysis](microsoft-defender-atp/respond-file-alerts-windows-defender-advanced-threat-protection.md#deep-analysis) -####### [Submit files for analysis](microsoft-defender-atp/respond-file-alerts-windows-defender-advanced-threat-protection.md#submit-files-for-analysis) -####### [View deep analysis reports](microsoft-defender-atp/respond-file-alerts-windows-defender-advanced-threat-protection.md#view-deep-analysis-reports) -####### [Troubleshoot deep analysis](microsoft-defender-atp/respond-file-alerts-windows-defender-advanced-threat-protection.md#troubleshoot-deep-analysis) +###### [Take response actions on a file](microsoft-defender-atp/respond-file-alerts.md) +####### [Stop and quarantine files in your network](microsoft-defender-atp/respond-file-alerts.md#stop-and-quarantine-files-in-your-network) +####### [Remove file from quarantine](microsoft-defender-atp/respond-file-alerts.md#remove-file-from-quarantine) +####### [Block files in your network](microsoft-defender-atp/respond-file-alerts.md#block-files-in-your-network) +####### [Remove file from blocked list](microsoft-defender-atp/respond-file-alerts.md#remove-file-from-blocked-list) +####### [Check activity details in Action center](microsoft-defender-atp/respond-file-alerts.md#check-activity-details-in-action-center) +####### [Deep analysis](microsoft-defender-atp/respond-file-alerts.md#deep-analysis) +####### [Submit files for analysis](microsoft-defender-atp/respond-file-alerts.md#submit-files-for-analysis) +####### [View deep analysis reports](microsoft-defender-atp/respond-file-alerts.md#view-deep-analysis-reports) +####### [Troubleshoot deep analysis](microsoft-defender-atp/respond-file-alerts.md#troubleshoot-deep-analysis) -#### [Automated investigation and remediation](microsoft-defender-atp/automated-investigations-windows-defender-advanced-threat-protection.md) -##### [Learn about the automated investigation and remediation dashboard](microsoft-defender-atp/manage-auto-investigation-windows-defender-advanced-threat-protection.md) +#### [Automated investigation and remediation](microsoft-defender-atp/automated-investigations.md) +##### [Learn about the automated investigation and remediation dashboard](microsoft-defender-atp/manage-auto-investigation.md) -#### [Secure score](microsoft-defender-atp/overview-secure-score-windows-defender-advanced-threat-protection.md) +#### [Secure score](microsoft-defender-atp/overview-secure-score.md) #### [Threat analytics](microsoft-defender-atp/threat-analytics.md) -#### [Advanced hunting](microsoft-defender-atp/overview-hunting-windows-defender-advanced-threat-protection.md) -##### [Query data using Advanced hunting](microsoft-defender-atp/advanced-hunting-windows-defender-advanced-threat-protection.md) -###### [Advanced hunting reference](microsoft-defender-atp/advanced-hunting-reference-windows-defender-advanced-threat-protection.md) -###### [Advanced hunting query language best practices](microsoft-defender-atp/advanced-hunting-best-practices-windows-defender-advanced-threat-protection.md) +#### [Advanced hunting](microsoft-defender-atp/overview-hunting.md) +##### [Query data using Advanced hunting](microsoft-defender-atp/advanced-hunting.md) +###### [Advanced hunting reference](microsoft-defender-atp/advanced-hunting-reference.md) +###### [Advanced hunting query language best practices](microsoft-defender-atp/advanced-hunting-best-practices.md) ##### [Custom detections](microsoft-defender-atp/overview-custom-detections.md) ###### [Create custom detections rules](microsoft-defender-atp/custom-detection-rules.md) #### [Management and APIs](microsoft-defender-atp/management-apis.md) -##### [Understand threat intelligence concepts](microsoft-defender-atp/threat-indicator-concepts-windows-defender-advanced-threat-protection.md) +##### [Understand threat intelligence concepts](microsoft-defender-atp/threat-indicator-concepts.md) ##### [Windows Defender ATP APIs](microsoft-defender-atp/apis-intro.md) -##### [Managed security service provider support](microsoft-defender-atp/mssp-support-windows-defender-advanced-threat-protection.md) +##### [Managed security service provider support](microsoft-defender-atp/mssp-support.md) #### [Microsoft threat protection](microsoft-defender-atp/threat-protection-integration.md) -##### [Protect users, data, and devices with conditional access](microsoft-defender-atp/conditional-access-windows-defender-advanced-threat-protection.md) +##### [Protect users, data, and devices with conditional access](microsoft-defender-atp/conditional-access.md) ##### [Microsoft Cloud App Security integration overview](microsoft-defender-atp/microsoft-cloud-app-security-integration.md) ##### [Information protection in Windows overview](microsoft-defender-atp/information-protection-in-windows-overview.md) @@ -100,16 +100,16 @@ -#### [Portal overview](microsoft-defender-atp/portal-overview-windows-defender-advanced-threat-protection.md) +#### [Portal overview](microsoft-defender-atp/portal-overview.md) ### [Get started](microsoft-defender-atp/get-started.md) -#### [What's new in Windows Defender ATP](microsoft-defender-atp/whats-new-in-windows-defender-atp.md) -#### [Minimum requirements](microsoft-defender-atp/minimum-requirements-windows-defender-advanced-threat-protection.md) -#### [Validate licensing and complete setup](microsoft-defender-atp/licensing-windows-defender-advanced-threat-protection.md) -#### [Preview features](microsoft-defender-atp/preview-windows-defender-advanced-threat-protection.md) -#### [Data storage and privacy](microsoft-defender-atp/data-storage-privacy-windows-defender-advanced-threat-protection.md) +#### [What's new in Windows Defender ATP](microsoft-defender-atp/whats-new-in-microsoft-defender-atp.md) +#### [Minimum requirements](microsoft-defender-atp/minimum-requirements.md) +#### [Validate licensing and complete setup](microsoft-defender-atp/licensing.md) +#### [Preview features](microsoft-defender-atp/preview.md) +#### [Data storage and privacy](microsoft-defender-atp/data-storage-privacy.md) #### [Assign user access to the portal](microsoft-defender-atp/assign-portal-access.md) #### [Evaluate Windows Defender ATP](microsoft-defender-atp/evaluate-atp.md) @@ -243,65 +243,65 @@ ####### [Advanced Hunting](microsoft-defender-atp/run-advanced-query-api.md) -####### [Alert](microsoft-defender-atp/alerts-windows-defender-advanced-threat-protection-new.md) -######## [List alerts](microsoft-defender-atp/get-alerts-windows-defender-advanced-threat-protection-new.md) -######## [Create alert](microsoft-defender-atp/create-alert-by-reference-windows-defender-advanced-threat-protection-new.md) -######## [Update Alert](microsoft-defender-atp/update-alert-windows-defender-advanced-threat-protection-new.md) -######## [Get alert information by ID](microsoft-defender-atp/get-alert-info-by-id-windows-defender-advanced-threat-protection-new.md) -######## [Get alert related domains information](microsoft-defender-atp/get-alert-related-domain-info-windows-defender-advanced-threat-protection-new.md) -######## [Get alert related file information](microsoft-defender-atp/get-alert-related-files-info-windows-defender-advanced-threat-protection-new.md) -######## [Get alert related IPs information](microsoft-defender-atp/get-alert-related-ip-info-windows-defender-advanced-threat-protection-new.md) -######## [Get alert related machine information](microsoft-defender-atp/get-alert-related-machine-info-windows-defender-advanced-threat-protection-new.md) -######## [Get alert related user information](microsoft-defender-atp/get-alert-related-user-info-windows-defender-advanced-threat-protection-new.md) +####### [Alert](microsoft-defender-atp/alerts.md) +######## [List alerts](microsoft-defender-atp/get-alerts.md) +######## [Create alert](microsoft-defender-atp/create-alert-by-reference.md) +######## [Update Alert](microsoft-defender-atp/update-alert.md) +######## [Get alert information by ID](microsoft-defender-atp/get-alert-info-by-id.md) +######## [Get alert related domains information](microsoft-defender-atp/get-alert-related-domain-info.md) +######## [Get alert related file information](microsoft-defender-atp/get-alert-related-files-info.md) +######## [Get alert related IPs information](microsoft-defender-atp/get-alert-related-ip-info.md) +######## [Get alert related machine information](microsoft-defender-atp/get-alert-related-machine-info.md) +######## [Get alert related user information](microsoft-defender-atp/get-alert-related-user-info.md) -####### [Machine](microsoft-defender-atp/machine-windows-defender-advanced-threat-protection-new.md) -######## [List machines](microsoft-defender-atp/get-machines-windows-defender-advanced-threat-protection-new.md) -######## [Get machine by ID](microsoft-defender-atp/get-machine-by-id-windows-defender-advanced-threat-protection-new.md) -######## [Get machine log on users](microsoft-defender-atp/get-machine-log-on-users-windows-defender-advanced-threat-protection-new.md) -######## [Get machine related alerts](microsoft-defender-atp/get-machine-related-alerts-windows-defender-advanced-threat-protection-new.md) -######## [Add or Remove machine tags](microsoft-defender-atp/add-or-remove-machine-tags-windows-defender-advanced-threat-protection-new.md) -######## [Find machines by IP](microsoft-defender-atp/find-machines-by-ip-windows-defender-advanced-threat-protection-new.md) +####### [Machine](microsoft-defender-atp/machine.md) +######## [List machines](microsoft-defender-atp/get-machines.md) +######## [Get machine by ID](microsoft-defender-atp/get-machine-by-id.md) +######## [Get machine log on users](microsoft-defender-atp/get-machine-log-on-users.md) +######## [Get machine related alerts](microsoft-defender-atp/get-machine-related-alerts.md) +######## [Add or Remove machine tags](microsoft-defender-atp/add-or-remove-machine-tags.md) +######## [Find machines by IP](microsoft-defender-atp/find-machines-by-ip.md) -####### [Machine Action](microsoft-defender-atp/machineaction-windows-defender-advanced-threat-protection-new.md) -######## [List Machine Actions](microsoft-defender-atp/get-machineactions-collection-windows-defender-advanced-threat-protection-new.md) -######## [Get Machine Action](microsoft-defender-atp/get-machineaction-object-windows-defender-advanced-threat-protection-new.md) -######## [Collect investigation package](microsoft-defender-atp/collect-investigation-package-windows-defender-advanced-threat-protection-new.md) -######## [Get investigation package SAS URI](microsoft-defender-atp/get-package-sas-uri-windows-defender-advanced-threat-protection-new.md) -######## [Isolate machine](microsoft-defender-atp/isolate-machine-windows-defender-advanced-threat-protection-new.md) -######## [Release machine from isolation](microsoft-defender-atp/unisolate-machine-windows-defender-advanced-threat-protection-new.md) -######## [Restrict app execution](microsoft-defender-atp/restrict-code-execution-windows-defender-advanced-threat-protection-new.md) -######## [Remove app restriction](microsoft-defender-atp/unrestrict-code-execution-windows-defender-advanced-threat-protection-new.md) -######## [Run antivirus scan](microsoft-defender-atp/run-av-scan-windows-defender-advanced-threat-protection-new.md) -######## [Offboard machine](microsoft-defender-atp/offboard-machine-api-windows-defender-advanced-threat-protection-new.md) -######## [Stop and quarantine file](microsoft-defender-atp/stop-and-quarantine-file-windows-defender-advanced-threat-protection-new.md) -######## [Initiate investigation (preview)](microsoft-defender-atp/initiate-autoir-investigation-windows-defender-advanced-threat-protection-new.md) +####### [Machine Action](microsoft-defender-atp/machineaction.md) +######## [List Machine Actions](microsoft-defender-atp/get-machineactions-collection.md) +######## [Get Machine Action](microsoft-defender-atp/get-machineaction-object.md) +######## [Collect investigation package](microsoft-defender-atp/collect-investigation-package.md) +######## [Get investigation package SAS URI](microsoft-defender-atp/get-package-sas-uri.md) +######## [Isolate machine](microsoft-defender-atp/isolate-machine.md) +######## [Release machine from isolation](microsoft-defender-atp/unisolate-machine.md) +######## [Restrict app execution](microsoft-defender-atp/restrict-code-execution.md) +######## [Remove app restriction](microsoft-defender-atp/unrestrict-code-execution.md) +######## [Run antivirus scan](microsoft-defender-atp/run-av-scan.md) +######## [Offboard machine](microsoft-defender-atp/offboard-machine-api.md) +######## [Stop and quarantine file](microsoft-defender-atp/stop-and-quarantine-file.md) +######## [Initiate investigation (preview)](microsoft-defender-atp/initiate-autoir-investigation.md) -####### [Indicators (preview)](microsoft-defender-atp/ti-indicator-windows-defender-advanced-threat-protection-new.md) -######## [Submit Indicator](microsoft-defender-atp/post-ti-indicator-windows-defender-advanced-threat-protection-new.md) -######## [List Indicators](microsoft-defender-atp/get-ti-indicators-collection-windows-defender-advanced-threat-protection-new.md) -######## [Delete Indicator](microsoft-defender-atp/delete-ti-indicator-by-id-windows-defender-advanced-threat-protection-new.md) +####### [Indicators (preview)](microsoft-defender-atp/ti-indicator.md) +######## [Submit Indicator](microsoft-defender-atp/post-ti-indicator.md) +######## [List Indicators](microsoft-defender-atp/get-ti-indicators-collection.md) +######## [Delete Indicator](microsoft-defender-atp/delete-ti-indicator-by-id.md) ####### Domain -######## [Get domain related alerts](microsoft-defender-atp/get-domain-related-alerts-windows-defender-advanced-threat-protection-new.md) -######## [Get domain related machines](microsoft-defender-atp/get-domain-related-machines-windows-defender-advanced-threat-protection-new.md) -######## [Get domain statistics](microsoft-defender-atp/get-domain-statistics-windows-defender-advanced-threat-protection-new.md) -######## [Is domain seen in organization](microsoft-defender-atp/is-domain-seen-in-org-windows-defender-advanced-threat-protection-new.md) +######## [Get domain related alerts](microsoft-defender-atp/get-domain-related-alerts.md) +######## [Get domain related machines](microsoft-defender-atp/get-domain-related-machines.md) +######## [Get domain statistics](microsoft-defender-atp/get-domain-statistics.md) +######## [Is domain seen in organization](microsoft-defender-atp/is-domain-seen-in-org.md) -####### [File](microsoft-defender-atp/files-windows-defender-advanced-threat-protection-new.md) -######## [Get file information](microsoft-defender-atp/get-file-information-windows-defender-advanced-threat-protection-new.md) -######## [Get file related alerts](microsoft-defender-atp/get-file-related-alerts-windows-defender-advanced-threat-protection-new.md) -######## [Get file related machines](microsoft-defender-atp/get-file-related-machines-windows-defender-advanced-threat-protection-new.md) -######## [Get file statistics](microsoft-defender-atp/get-file-statistics-windows-defender-advanced-threat-protection-new.md) +####### [File](microsoft-defender-atp/files.md) +######## [Get file information](microsoft-defender-atp/get-file-information.md) +######## [Get file related alerts](microsoft-defender-atp/get-file-related-alerts.md) +######## [Get file related machines](microsoft-defender-atp/get-file-related-machines.md) +######## [Get file statistics](microsoft-defender-atp/get-file-statistics.md) ####### IP -######## [Get IP related alerts](microsoft-defender-atp/get-ip-related-alerts-windows-defender-advanced-threat-protection-new.md) -######## [Get IP related machines](microsoft-defender-atp/get-ip-related-machines-windows-defender-advanced-threat-protection-new.md) -######## [Get IP statistics](microsoft-defender-atp/get-ip-statistics-windows-defender-advanced-threat-protection-new.md) -######## [Is IP seen in organization](microsoft-defender-atp/is-ip-seen-org-windows-defender-advanced-threat-protection-new.md) +######## [Get IP related alerts](microsoft-defender-atp/get-ip-related-alerts.md) +######## [Get IP related machines](microsoft-defender-atp/get-ip-related-machines.md) +######## [Get IP statistics](microsoft-defender-atp/get-ip-statistics.md) +######## [Is IP seen in organization](microsoft-defender-atp/is-ip-seen-org.md) -####### [User](microsoft-defender-atp/user-windows-defender-advanced-threat-protection-new.md) -######## [Get user related alerts](microsoft-defender-atp/get-user-related-alerts-windows-defender-advanced-threat-protection-new.md) -######## [Get user related machines](microsoft-defender-atp/get-user-related-machines-windows-defender-advanced-threat-protection-new.md) +####### [User](microsoft-defender-atp/user.md) +######## [Get user related alerts](microsoft-defender-atp/get-user-related-alerts.md) +######## [Get user related machines](microsoft-defender-atp/get-user-related-machines.md) ###### How to use APIs - Samples @@ -400,7 +400,7 @@ ##### [Configure Windows Defender Security Center time zone settings](microsoft-defender-atp/time-settings.md) -### [Troubleshoot Windows Defender ATP](microsoft-defender-atp/troubleshoot-wdatp.md) +### [Troubleshoot Windows Defender ATP](microsoft-defender-atp/troubleshoot-overview.md) ####Troubleshoot sensor state ##### [Check sensor state](microsoft-defender-atp/check-sensor-status.md) ##### [Fix unhealthy sensors](microsoft-defender-atp/fix-unhealhty-sensors.md) diff --git a/windows/security/threat-protection/microsoft-defender-atp/add-or-remove-machine-tags-windows-defender-advanced-threat-protection-new.md b/windows/security/threat-protection/microsoft-defender-atp/add-or-remove-machine-tags.md similarity index 100% rename from windows/security/threat-protection/microsoft-defender-atp/add-or-remove-machine-tags-windows-defender-advanced-threat-protection-new.md rename to windows/security/threat-protection/microsoft-defender-atp/add-or-remove-machine-tags.md diff --git a/windows/security/threat-protection/microsoft-defender-atp/advanced-features-windows-defender-advanced-threat-protection.md b/windows/security/threat-protection/microsoft-defender-atp/advanced-features.md similarity index 100% rename from windows/security/threat-protection/microsoft-defender-atp/advanced-features-windows-defender-advanced-threat-protection.md rename to windows/security/threat-protection/microsoft-defender-atp/advanced-features.md diff --git a/windows/security/threat-protection/microsoft-defender-atp/advanced-hunting-best-practices-windows-defender-advanced-threat-protection.md b/windows/security/threat-protection/microsoft-defender-atp/advanced-hunting-best-practices.md similarity index 100% rename from windows/security/threat-protection/microsoft-defender-atp/advanced-hunting-best-practices-windows-defender-advanced-threat-protection.md rename to windows/security/threat-protection/microsoft-defender-atp/advanced-hunting-best-practices.md diff --git a/windows/security/threat-protection/microsoft-defender-atp/advanced-hunting-reference-windows-defender-advanced-threat-protection.md b/windows/security/threat-protection/microsoft-defender-atp/advanced-hunting-reference.md similarity index 100% rename from windows/security/threat-protection/microsoft-defender-atp/advanced-hunting-reference-windows-defender-advanced-threat-protection.md rename to windows/security/threat-protection/microsoft-defender-atp/advanced-hunting-reference.md diff --git a/windows/security/threat-protection/microsoft-defender-atp/advanced-hunting-windows-defender-advanced-threat-protection.md b/windows/security/threat-protection/microsoft-defender-atp/advanced-hunting.md similarity index 100% rename from windows/security/threat-protection/microsoft-defender-atp/advanced-hunting-windows-defender-advanced-threat-protection.md rename to windows/security/threat-protection/microsoft-defender-atp/advanced-hunting.md diff --git a/windows/security/threat-protection/microsoft-defender-atp/alerts-queue-windows-defender-advanced-threat-protection.md b/windows/security/threat-protection/microsoft-defender-atp/alerts-queue.md similarity index 100% rename from windows/security/threat-protection/microsoft-defender-atp/alerts-queue-windows-defender-advanced-threat-protection.md rename to windows/security/threat-protection/microsoft-defender-atp/alerts-queue.md diff --git a/windows/security/threat-protection/microsoft-defender-atp/alerts-windows-defender-advanced-threat-protection-new.md b/windows/security/threat-protection/microsoft-defender-atp/alerts.md similarity index 100% rename from windows/security/threat-protection/microsoft-defender-atp/alerts-windows-defender-advanced-threat-protection-new.md rename to windows/security/threat-protection/microsoft-defender-atp/alerts.md diff --git a/windows/security/threat-protection/microsoft-defender-atp/api-portal-mapping-windows-defender-advanced-threat-protection.md b/windows/security/threat-protection/microsoft-defender-atp/api-portal-mapping.md similarity index 100% rename from windows/security/threat-protection/microsoft-defender-atp/api-portal-mapping-windows-defender-advanced-threat-protection.md rename to windows/security/threat-protection/microsoft-defender-atp/api-portal-mapping.md diff --git a/windows/security/threat-protection/microsoft-defender-atp/assign-portal-access-windows-defender-advanced-threat-protection.md b/windows/security/threat-protection/microsoft-defender-atp/assign-portal-access.md similarity index 100% rename from windows/security/threat-protection/microsoft-defender-atp/assign-portal-access-windows-defender-advanced-threat-protection.md rename to windows/security/threat-protection/microsoft-defender-atp/assign-portal-access.md diff --git a/windows/security/threat-protection/microsoft-defender-atp/attack-simulations-windows-defender-advanced-threat-protection.md b/windows/security/threat-protection/microsoft-defender-atp/attack-simulations.md similarity index 100% rename from windows/security/threat-protection/microsoft-defender-atp/attack-simulations-windows-defender-advanced-threat-protection.md rename to windows/security/threat-protection/microsoft-defender-atp/attack-simulations.md diff --git a/windows/security/threat-protection/microsoft-defender-atp/automated-investigations-windows-defender-advanced-threat-protection.md b/windows/security/threat-protection/microsoft-defender-atp/automated-investigations.md similarity index 100% rename from windows/security/threat-protection/microsoft-defender-atp/automated-investigations-windows-defender-advanced-threat-protection.md rename to windows/security/threat-protection/microsoft-defender-atp/automated-investigations.md diff --git a/windows/security/threat-protection/microsoft-defender-atp/basic-permissions-windows-defender-advanced-threat-protection.md b/windows/security/threat-protection/microsoft-defender-atp/basic-permissions.md similarity index 100% rename from windows/security/threat-protection/microsoft-defender-atp/basic-permissions-windows-defender-advanced-threat-protection.md rename to windows/security/threat-protection/microsoft-defender-atp/basic-permissions.md diff --git a/windows/security/threat-protection/microsoft-defender-atp/check-sensor-status-windows-defender-advanced-threat-protection.md b/windows/security/threat-protection/microsoft-defender-atp/check-sensor-status.md similarity index 100% rename from windows/security/threat-protection/microsoft-defender-atp/check-sensor-status-windows-defender-advanced-threat-protection.md rename to windows/security/threat-protection/microsoft-defender-atp/check-sensor-status.md diff --git a/windows/security/threat-protection/microsoft-defender-atp/collect-investigation-package-windows-defender-advanced-threat-protection-new.md b/windows/security/threat-protection/microsoft-defender-atp/collect-investigation-package.md similarity index 100% rename from windows/security/threat-protection/microsoft-defender-atp/collect-investigation-package-windows-defender-advanced-threat-protection-new.md rename to windows/security/threat-protection/microsoft-defender-atp/collect-investigation-package.md diff --git a/windows/security/threat-protection/microsoft-defender-atp/community-windows-defender-advanced-threat-protection.md b/windows/security/threat-protection/microsoft-defender-atp/community.md similarity index 100% rename from windows/security/threat-protection/microsoft-defender-atp/community-windows-defender-advanced-threat-protection.md rename to windows/security/threat-protection/microsoft-defender-atp/community.md diff --git a/windows/security/threat-protection/microsoft-defender-atp/conditional-access-windows-defender-advanced-threat-protection.md b/windows/security/threat-protection/microsoft-defender-atp/conditional.md similarity index 100% rename from windows/security/threat-protection/microsoft-defender-atp/conditional-access-windows-defender-advanced-threat-protection.md rename to windows/security/threat-protection/microsoft-defender-atp/conditional.md diff --git a/windows/security/threat-protection/microsoft-defender-atp/configure-arcsight-windows-defender-advanced-threat-protection.md b/windows/security/threat-protection/microsoft-defender-atp/configure-arcsight.md similarity index 100% rename from windows/security/threat-protection/microsoft-defender-atp/configure-arcsight-windows-defender-advanced-threat-protection.md rename to windows/security/threat-protection/microsoft-defender-atp/configure-arcsight.md diff --git a/windows/security/threat-protection/microsoft-defender-atp/configure-conditional-access-windows-defender-advanced-threat-protection.md b/windows/security/threat-protection/microsoft-defender-atp/configure-conditional-access.md similarity index 100% rename from windows/security/threat-protection/microsoft-defender-atp/configure-conditional-access-windows-defender-advanced-threat-protection.md rename to windows/security/threat-protection/microsoft-defender-atp/configure-conditional-access.md diff --git a/windows/security/threat-protection/microsoft-defender-atp/configure-email-notifications-windows-defender-advanced-threat-protection.md b/windows/security/threat-protection/microsoft-defender-atp/configure-email-notifications.md similarity index 100% rename from windows/security/threat-protection/microsoft-defender-atp/configure-email-notifications-windows-defender-advanced-threat-protection.md rename to windows/security/threat-protection/microsoft-defender-atp/configure-email-notifications.md diff --git a/windows/security/threat-protection/microsoft-defender-atp/configure-endpoints-gp-windows-defender-advanced-threat-protection.md b/windows/security/threat-protection/microsoft-defender-atp/configure-endpoints-gp.md similarity index 100% rename from windows/security/threat-protection/microsoft-defender-atp/configure-endpoints-gp-windows-defender-advanced-threat-protection.md rename to windows/security/threat-protection/microsoft-defender-atp/configure-endpoints-gp.md diff --git a/windows/security/threat-protection/microsoft-defender-atp/configure-endpoints-mdm-windows-defender-advanced-threat-protection.md b/windows/security/threat-protection/microsoft-defender-atp/configure-endpoints-mdm.md similarity index 100% rename from windows/security/threat-protection/microsoft-defender-atp/configure-endpoints-mdm-windows-defender-advanced-threat-protection.md rename to windows/security/threat-protection/microsoft-defender-atp/configure-endpoints-mdm.md diff --git a/windows/security/threat-protection/microsoft-defender-atp/configure-endpoints-non-windows-windows-defender-advanced-threat-protection.md b/windows/security/threat-protection/microsoft-defender-atp/configure-endpoints-non-windows.md similarity index 100% rename from windows/security/threat-protection/microsoft-defender-atp/configure-endpoints-non-windows-windows-defender-advanced-threat-protection.md rename to windows/security/threat-protection/microsoft-defender-atp/configure-endpoints-non-windows.md diff --git a/windows/security/threat-protection/microsoft-defender-atp/configure-endpoints-sccm-windows-defender-advanced-threat-protection.md b/windows/security/threat-protection/microsoft-defender-atp/configure-endpoints-sccm.md similarity index 100% rename from windows/security/threat-protection/microsoft-defender-atp/configure-endpoints-sccm-windows-defender-advanced-threat-protection.md rename to windows/security/threat-protection/microsoft-defender-atp/configure-endpoints-sccm.md diff --git a/windows/security/threat-protection/microsoft-defender-atp/configure-endpoints-script-windows-defender-advanced-threat-protection.md b/windows/security/threat-protection/microsoft-defender-atp/configure-endpoints-script.md similarity index 100% rename from windows/security/threat-protection/microsoft-defender-atp/configure-endpoints-script-windows-defender-advanced-threat-protection.md rename to windows/security/threat-protection/microsoft-defender-atp/configure-endpoints-script.md diff --git a/windows/security/threat-protection/microsoft-defender-atp/configure-endpoints-vdi-windows-defender-advanced-threat-protection.md b/windows/security/threat-protection/microsoft-defender-atp/configure-endpoints-vdi.md similarity index 100% rename from windows/security/threat-protection/microsoft-defender-atp/configure-endpoints-vdi-windows-defender-advanced-threat-protection.md rename to windows/security/threat-protection/microsoft-defender-atp/configure-endpoints-vdi.md diff --git a/windows/security/threat-protection/microsoft-defender-atp/configure-endpoints-windows-defender-advanced-threat-protection.md b/windows/security/threat-protection/microsoft-defender-atp/configure-endpoints.md similarity index 100% rename from windows/security/threat-protection/microsoft-defender-atp/configure-endpoints-windows-defender-advanced-threat-protection.md rename to windows/security/threat-protection/microsoft-defender-atp/configure-endpoints.md diff --git a/windows/security/threat-protection/microsoft-defender-atp/configure-mssp-support-windows-defender-advanced-threat-protection.md b/windows/security/threat-protection/microsoft-defender-atp/configure-mssp-support.md similarity index 100% rename from windows/security/threat-protection/microsoft-defender-atp/configure-mssp-support-windows-defender-advanced-threat-protection.md rename to windows/security/threat-protection/microsoft-defender-atp/configure-mssp-support.md diff --git a/windows/security/threat-protection/microsoft-defender-atp/configure-proxy-internet-windows-defender-advanced-threat-protection.md b/windows/security/threat-protection/microsoft-defender-atp/configure-proxy-internet.md similarity index 100% rename from windows/security/threat-protection/microsoft-defender-atp/configure-proxy-internet-windows-defender-advanced-threat-protection.md rename to windows/security/threat-protection/microsoft-defender-atp/configure-proxy-internet.md diff --git a/windows/security/threat-protection/microsoft-defender-atp/configure-server-endpoints-windows-defender-advanced-threat-protection.md b/windows/security/threat-protection/microsoft-defender-atp/configure-server-endpoints.md similarity index 100% rename from windows/security/threat-protection/microsoft-defender-atp/configure-server-endpoints-windows-defender-advanced-threat-protection.md rename to windows/security/threat-protection/microsoft-defender-atp/configure-server-endpoints.md diff --git a/windows/security/threat-protection/microsoft-defender-atp/configure-siem-windows-defender-advanced-threat-protection.md b/windows/security/threat-protection/microsoft-defender-atp/configure-siem.md similarity index 100% rename from windows/security/threat-protection/microsoft-defender-atp/configure-siem-windows-defender-advanced-threat-protection.md rename to windows/security/threat-protection/microsoft-defender-atp/configure-siem.md diff --git a/windows/security/threat-protection/microsoft-defender-atp/configure-splunk-windows-defender-advanced-threat-protection.md b/windows/security/threat-protection/microsoft-defender-atp/configure-splunk.md similarity index 100% rename from windows/security/threat-protection/microsoft-defender-atp/configure-splunk-windows-defender-advanced-threat-protection.md rename to windows/security/threat-protection/microsoft-defender-atp/configure-splunk.md diff --git a/windows/security/threat-protection/microsoft-defender-atp/create-alert-by-reference-windows-defender-advanced-threat-protection-new.md b/windows/security/threat-protection/microsoft-defender-atp/create-alert-by-reference.md similarity index 100% rename from windows/security/threat-protection/microsoft-defender-atp/create-alert-by-reference-windows-defender-advanced-threat-protection-new.md rename to windows/security/threat-protection/microsoft-defender-atp/create-alert-by-reference.md diff --git a/windows/security/threat-protection/microsoft-defender-atp/custom-ti-api-windows-defender-advanced-threat-protection.md b/windows/security/threat-protection/microsoft-defender-atp/custom-ti-api.md similarity index 100% rename from windows/security/threat-protection/microsoft-defender-atp/custom-ti-api-windows-defender-advanced-threat-protection.md rename to windows/security/threat-protection/microsoft-defender-atp/custom-ti-api.md diff --git a/windows/security/threat-protection/microsoft-defender-atp/data-retention-settings-windows-defender-advanced-threat-protection.md b/windows/security/threat-protection/microsoft-defender-atp/data-retention-settings.md similarity index 100% rename from windows/security/threat-protection/microsoft-defender-atp/data-retention-settings-windows-defender-advanced-threat-protection.md rename to windows/security/threat-protection/microsoft-defender-atp/data-retention-settings.md diff --git a/windows/security/threat-protection/microsoft-defender-atp/data-storage-privacy-windows-defender-advanced-threat-protection.md b/windows/security/threat-protection/microsoft-defender-atp/data-storage-privacy.md similarity index 100% rename from windows/security/threat-protection/microsoft-defender-atp/data-storage-privacy-windows-defender-advanced-threat-protection.md rename to windows/security/threat-protection/microsoft-defender-atp/data-storage-privacy.md diff --git a/windows/security/threat-protection/microsoft-defender-atp/defender-compatibility-windows-defender-advanced-threat-protection.md b/windows/security/threat-protection/microsoft-defender-atp/defender-compatibility.md similarity index 100% rename from windows/security/threat-protection/microsoft-defender-atp/defender-compatibility-windows-defender-advanced-threat-protection.md rename to windows/security/threat-protection/microsoft-defender-atp/defender-compatibility.md diff --git a/windows/security/threat-protection/microsoft-defender-atp/delete-ti-indicator-by-id-windows-defender-advanced-threat-protection-new.md b/windows/security/threat-protection/microsoft-defender-atp/delete-ti-indicator-by-id.md similarity index 100% rename from windows/security/threat-protection/microsoft-defender-atp/delete-ti-indicator-by-id-windows-defender-advanced-threat-protection-new.md rename to windows/security/threat-protection/microsoft-defender-atp/delete-ti-indicator-by-id.md diff --git a/windows/security/threat-protection/microsoft-defender-atp/enable-custom-ti-windows-defender-advanced-threat-protection.md b/windows/security/threat-protection/microsoft-defender-atp/enable-custom-ti.md similarity index 100% rename from windows/security/threat-protection/microsoft-defender-atp/enable-custom-ti-windows-defender-advanced-threat-protection.md rename to windows/security/threat-protection/microsoft-defender-atp/enable-custom-ti.md diff --git a/windows/security/threat-protection/microsoft-defender-atp/enable-secure-score-windows-defender-advanced-threat-protection.md b/windows/security/threat-protection/microsoft-defender-atp/enable-secure-score.md similarity index 100% rename from windows/security/threat-protection/microsoft-defender-atp/enable-secure-score-windows-defender-advanced-threat-protection.md rename to windows/security/threat-protection/microsoft-defender-atp/enable-secure-score.md diff --git a/windows/security/threat-protection/microsoft-defender-atp/enable-siem-integration-windows-defender-advanced-threat-protection.md b/windows/security/threat-protection/microsoft-defender-atp/enable-siem-integration.md similarity index 100% rename from windows/security/threat-protection/microsoft-defender-atp/enable-siem-integration-windows-defender-advanced-threat-protection.md rename to windows/security/threat-protection/microsoft-defender-atp/enable-siem-integration.md diff --git a/windows/security/threat-protection/microsoft-defender-atp/event-error-codes-windows-defender-advanced-threat-protection.md b/windows/security/threat-protection/microsoft-defender-atp/event-error-codes.md similarity index 100% rename from windows/security/threat-protection/microsoft-defender-atp/event-error-codes-windows-defender-advanced-threat-protection.md rename to windows/security/threat-protection/microsoft-defender-atp/event-error-codes.md diff --git a/windows/security/threat-protection/microsoft-defender-atp/experiment-custom-ti-windows-defender-advanced-threat-protection.md b/windows/security/threat-protection/microsoft-defender-atp/experiment-custom-ti.md similarity index 100% rename from windows/security/threat-protection/microsoft-defender-atp/experiment-custom-ti-windows-defender-advanced-threat-protection.md rename to windows/security/threat-protection/microsoft-defender-atp/experiment-custom-ti.md diff --git a/windows/security/threat-protection/microsoft-defender-atp/files-windows-defender-advanced-threat-protection-new.md b/windows/security/threat-protection/microsoft-defender-atp/files.md similarity index 100% rename from windows/security/threat-protection/microsoft-defender-atp/files-windows-defender-advanced-threat-protection-new.md rename to windows/security/threat-protection/microsoft-defender-atp/files.md diff --git a/windows/security/threat-protection/microsoft-defender-atp/find-machine-info-by-ip-windows-defender-advanced-threat-protection-new.md b/windows/security/threat-protection/microsoft-defender-atp/find-machine-info-by-ip.md similarity index 100% rename from windows/security/threat-protection/microsoft-defender-atp/find-machine-info-by-ip-windows-defender-advanced-threat-protection-new.md rename to windows/security/threat-protection/microsoft-defender-atp/find-machine-info-by-ip.md diff --git a/windows/security/threat-protection/microsoft-defender-atp/find-machines-by-ip-windows-defender-advanced-threat-protection-new.md b/windows/security/threat-protection/microsoft-defender-atp/find-machines-by-ip.md similarity index 100% rename from windows/security/threat-protection/microsoft-defender-atp/find-machines-by-ip-windows-defender-advanced-threat-protection-new.md rename to windows/security/threat-protection/microsoft-defender-atp/find-machines-by-ip.md diff --git a/windows/security/threat-protection/microsoft-defender-atp/fix-unhealhty-sensors-windows-defender-advanced-threat-protection.md b/windows/security/threat-protection/microsoft-defender-atp/fix-unhealhty-sensors.md similarity index 100% rename from windows/security/threat-protection/microsoft-defender-atp/fix-unhealhty-sensors-windows-defender-advanced-threat-protection.md rename to windows/security/threat-protection/microsoft-defender-atp/fix-unhealhty-sensors.md diff --git a/windows/security/threat-protection/microsoft-defender-atp/get-alert-info-by-id-windows-defender-advanced-threat-protection-new.md b/windows/security/threat-protection/microsoft-defender-atp/get-alert-info-by-id.md similarity index 100% rename from windows/security/threat-protection/microsoft-defender-atp/get-alert-info-by-id-windows-defender-advanced-threat-protection-new.md rename to windows/security/threat-protection/microsoft-defender-atp/get-alert-info-by-id.md diff --git a/windows/security/threat-protection/microsoft-defender-atp/get-alert-related-domain-info-windows-defender-advanced-threat-protection-new.md b/windows/security/threat-protection/microsoft-defender-atp/get-alert-related-domain-info.md similarity index 100% rename from windows/security/threat-protection/microsoft-defender-atp/get-alert-related-domain-info-windows-defender-advanced-threat-protection-new.md rename to windows/security/threat-protection/microsoft-defender-atp/get-alert-related-domain-info.md diff --git a/windows/security/threat-protection/microsoft-defender-atp/get-alert-related-files-info-windows-defender-advanced-threat-protection-new.md b/windows/security/threat-protection/microsoft-defender-atp/get-alert-related-files-info.md similarity index 100% rename from windows/security/threat-protection/microsoft-defender-atp/get-alert-related-files-info-windows-defender-advanced-threat-protection-new.md rename to windows/security/threat-protection/microsoft-defender-atp/get-alert-related-files-info.md diff --git a/windows/security/threat-protection/microsoft-defender-atp/get-alert-related-ip-info-windows-defender-advanced-threat-protection-new.md b/windows/security/threat-protection/microsoft-defender-atp/get-alert-related-ip-info.md similarity index 100% rename from windows/security/threat-protection/microsoft-defender-atp/get-alert-related-ip-info-windows-defender-advanced-threat-protection-new.md rename to windows/security/threat-protection/microsoft-defender-atp/get-alert-related-ip-info.md diff --git a/windows/security/threat-protection/microsoft-defender-atp/get-alert-related-machine-info-windows-defender-advanced-threat-protection-new.md b/windows/security/threat-protection/microsoft-defender-atp/get-alert-related-machine-info.md similarity index 100% rename from windows/security/threat-protection/microsoft-defender-atp/get-alert-related-machine-info-windows-defender-advanced-threat-protection-new.md rename to windows/security/threat-protection/microsoft-defender-atp/get-alert-related-machine-info.md diff --git a/windows/security/threat-protection/microsoft-defender-atp/get-alert-related-user-info-windows-defender-advanced-threat-protection-new.md b/windows/security/threat-protection/microsoft-defender-atp/get-alert-related-user-info.md similarity index 100% rename from windows/security/threat-protection/microsoft-defender-atp/get-alert-related-user-info-windows-defender-advanced-threat-protection-new.md rename to windows/security/threat-protection/microsoft-defender-atp/get-alert-related-user-info.md diff --git a/windows/security/threat-protection/microsoft-defender-atp/get-alerts-windows-defender-advanced-threat-protection-new.md b/windows/security/threat-protection/microsoft-defender-atp/get-alerts.md similarity index 100% rename from windows/security/threat-protection/microsoft-defender-atp/get-alerts-windows-defender-advanced-threat-protection-new.md rename to windows/security/threat-protection/microsoft-defender-atp/get-alerts.md diff --git a/windows/security/threat-protection/microsoft-defender-atp/get-cvekbmap-collection-windows-defender-advanced-threat-protection.md b/windows/security/threat-protection/microsoft-defender-atp/get-cvekbmap-collection.md similarity index 100% rename from windows/security/threat-protection/microsoft-defender-atp/get-cvekbmap-collection-windows-defender-advanced-threat-protection.md rename to windows/security/threat-protection/microsoft-defender-atp/get-cvekbmap-collection.md diff --git a/windows/security/threat-protection/microsoft-defender-atp/get-domain-related-alerts-windows-defender-advanced-threat-protection-new.md b/windows/security/threat-protection/microsoft-defender-atp/get-domain-related-alerts.md similarity index 100% rename from windows/security/threat-protection/microsoft-defender-atp/get-domain-related-alerts-windows-defender-advanced-threat-protection-new.md rename to windows/security/threat-protection/microsoft-defender-atp/get-domain-related-alerts.md diff --git a/windows/security/threat-protection/microsoft-defender-atp/get-domain-related-machines-windows-defender-advanced-threat-protection-new.md b/windows/security/threat-protection/microsoft-defender-atp/get-domain-related-machines.md similarity index 100% rename from windows/security/threat-protection/microsoft-defender-atp/get-domain-related-machines-windows-defender-advanced-threat-protection-new.md rename to windows/security/threat-protection/microsoft-defender-atp/get-domain-related-machines.md diff --git a/windows/security/threat-protection/microsoft-defender-atp/get-domain-statistics-windows-defender-advanced-threat-protection-new.md b/windows/security/threat-protection/microsoft-defender-atp/get-domain-statistics.md similarity index 100% rename from windows/security/threat-protection/microsoft-defender-atp/get-domain-statistics-windows-defender-advanced-threat-protection-new.md rename to windows/security/threat-protection/microsoft-defender-atp/get-domain-statistics.md diff --git a/windows/security/threat-protection/microsoft-defender-atp/get-file-information-windows-defender-advanced-threat-protection-new.md b/windows/security/threat-protection/microsoft-defender-atp/get-file-information.md similarity index 100% rename from windows/security/threat-protection/microsoft-defender-atp/get-file-information-windows-defender-advanced-threat-protection-new.md rename to windows/security/threat-protection/microsoft-defender-atp/get-file-information.md diff --git a/windows/security/threat-protection/microsoft-defender-atp/get-file-related-alerts-windows-defender-advanced-threat-protection-new.md b/windows/security/threat-protection/microsoft-defender-atp/get-file-related-alerts.md similarity index 100% rename from windows/security/threat-protection/microsoft-defender-atp/get-file-related-alerts-windows-defender-advanced-threat-protection-new.md rename to windows/security/threat-protection/microsoft-defender-atp/get-file-related-alerts.md diff --git a/windows/security/threat-protection/microsoft-defender-atp/get-file-related-machines-windows-defender-advanced-threat-protection-new.md b/windows/security/threat-protection/microsoft-defender-atp/get-file-related-machines.md similarity index 100% rename from windows/security/threat-protection/microsoft-defender-atp/get-file-related-machines-windows-defender-advanced-threat-protection-new.md rename to windows/security/threat-protection/microsoft-defender-atp/get-file-related-machines.md diff --git a/windows/security/threat-protection/microsoft-defender-atp/get-file-statistics-windows-defender-advanced-threat-protection-new.md b/windows/security/threat-protection/microsoft-defender-atp/get-file-statistics.md similarity index 100% rename from windows/security/threat-protection/microsoft-defender-atp/get-file-statistics-windows-defender-advanced-threat-protection-new.md rename to windows/security/threat-protection/microsoft-defender-atp/get-file-statistics.md diff --git a/windows/security/threat-protection/microsoft-defender-atp/get-ip-related-alerts-windows-defender-advanced-threat-protection-new.md b/windows/security/threat-protection/microsoft-defender-atp/get-ip-related-alerts.md similarity index 100% rename from windows/security/threat-protection/microsoft-defender-atp/get-ip-related-alerts-windows-defender-advanced-threat-protection-new.md rename to windows/security/threat-protection/microsoft-defender-atp/get-ip-related-alerts.md diff --git a/windows/security/threat-protection/microsoft-defender-atp/get-ip-related-machines-windows-defender-advanced-threat-protection-new.md b/windows/security/threat-protection/microsoft-defender-atp/get-ip-related-machines.md similarity index 100% rename from windows/security/threat-protection/microsoft-defender-atp/get-ip-related-machines-windows-defender-advanced-threat-protection-new.md rename to windows/security/threat-protection/microsoft-defender-atp/get-ip-related-machines.md diff --git a/windows/security/threat-protection/microsoft-defender-atp/get-ip-statistics-windows-defender-advanced-threat-protection-new.md b/windows/security/threat-protection/microsoft-defender-atp/get-ip-statistics.md similarity index 100% rename from windows/security/threat-protection/microsoft-defender-atp/get-ip-statistics-windows-defender-advanced-threat-protection-new.md rename to windows/security/threat-protection/microsoft-defender-atp/get-ip-statistics.md diff --git a/windows/security/threat-protection/microsoft-defender-atp/get-kbinfo-collection-windows-defender-advanced-threat-protection.md b/windows/security/threat-protection/microsoft-defender-atp/get-kbinfo-collection.md similarity index 100% rename from windows/security/threat-protection/microsoft-defender-atp/get-kbinfo-collection-windows-defender-advanced-threat-protection.md rename to windows/security/threat-protection/microsoft-defender-atp/get-kbinfo-collection.md diff --git a/windows/security/threat-protection/microsoft-defender-atp/get-machine-by-id-windows-defender-advanced-threat-protection-new.md b/windows/security/threat-protection/microsoft-defender-atp/get-machine-by-id.md similarity index 100% rename from windows/security/threat-protection/microsoft-defender-atp/get-machine-by-id-windows-defender-advanced-threat-protection-new.md rename to windows/security/threat-protection/microsoft-defender-atp/get-machine-by-id.md diff --git a/windows/security/threat-protection/microsoft-defender-atp/get-machine-log-on-users-windows-defender-advanced-threat-protection-new.md b/windows/security/threat-protection/microsoft-defender-atp/get-machine-log-on-users.md similarity index 100% rename from windows/security/threat-protection/microsoft-defender-atp/get-machine-log-on-users-windows-defender-advanced-threat-protection-new.md rename to windows/security/threat-protection/microsoft-defender-atp/get-machine-log-on-users.md diff --git a/windows/security/threat-protection/microsoft-defender-atp/get-machine-related-alerts-windows-defender-advanced-threat-protection-new.md b/windows/security/threat-protection/microsoft-defender-atp/get-machine-related-alerts.md similarity index 100% rename from windows/security/threat-protection/microsoft-defender-atp/get-machine-related-alerts-windows-defender-advanced-threat-protection-new.md rename to windows/security/threat-protection/microsoft-defender-atp/get-machine-related-alerts.md diff --git a/windows/security/threat-protection/microsoft-defender-atp/get-machineaction-object-windows-defender-advanced-threat-protection-new.md b/windows/security/threat-protection/microsoft-defender-atp/get-machineaction-object.md similarity index 100% rename from windows/security/threat-protection/microsoft-defender-atp/get-machineaction-object-windows-defender-advanced-threat-protection-new.md rename to windows/security/threat-protection/microsoft-defender-atp/get-machineaction-object.md diff --git a/windows/security/threat-protection/microsoft-defender-atp/get-machineactions-collection-windows-defender-advanced-threat-protection-new.md b/windows/security/threat-protection/microsoft-defender-atp/get-machineactions-collection.md similarity index 100% rename from windows/security/threat-protection/microsoft-defender-atp/get-machineactions-collection-windows-defender-advanced-threat-protection-new.md rename to windows/security/threat-protection/microsoft-defender-atp/get-machineactions-collection.md diff --git a/windows/security/threat-protection/microsoft-defender-atp/get-machinegroups-collection-windows-defender-advanced-threat-protection.md b/windows/security/threat-protection/microsoft-defender-atp/get-machinegroups-collection.md similarity index 100% rename from windows/security/threat-protection/microsoft-defender-atp/get-machinegroups-collection-windows-defender-advanced-threat-protection.md rename to windows/security/threat-protection/microsoft-defender-atp/get-machinegroups-collection.md diff --git a/windows/security/threat-protection/microsoft-defender-atp/get-machines-windows-defender-advanced-threat-protection-new.md b/windows/security/threat-protection/microsoft-defender-atp/get-machines.md similarity index 100% rename from windows/security/threat-protection/microsoft-defender-atp/get-machines-windows-defender-advanced-threat-protection-new.md rename to windows/security/threat-protection/microsoft-defender-atp/get-machines.md diff --git a/windows/security/threat-protection/microsoft-defender-atp/get-machinesecuritystates-collection-windows-defender-advanced-threat-protection.md b/windows/security/threat-protection/microsoft-defender-atp/get-machinesecuritystates-collection.md similarity index 100% rename from windows/security/threat-protection/microsoft-defender-atp/get-machinesecuritystates-collection-windows-defender-advanced-threat-protection.md rename to windows/security/threat-protection/microsoft-defender-atp/get-machinesecuritystates-collection.md diff --git a/windows/security/threat-protection/microsoft-defender-atp/get-package-sas-uri-windows-defender-advanced-threat-protection-new.md b/windows/security/threat-protection/microsoft-defender-atp/get-package-sas-uri.md similarity index 100% rename from windows/security/threat-protection/microsoft-defender-atp/get-package-sas-uri-windows-defender-advanced-threat-protection-new.md rename to windows/security/threat-protection/microsoft-defender-atp/get-package-sas-uri.md diff --git a/windows/security/threat-protection/microsoft-defender-atp/get-ti-indicators-collection-windows-defender-advanced-threat-protection-new.md b/windows/security/threat-protection/microsoft-defender-atp/get-ti-indicators-collection.md similarity index 100% rename from windows/security/threat-protection/microsoft-defender-atp/get-ti-indicators-collection-windows-defender-advanced-threat-protection-new.md rename to windows/security/threat-protection/microsoft-defender-atp/get-ti-indicators-collection.md diff --git a/windows/security/threat-protection/microsoft-defender-atp/get-user-information-windows-defender-advanced-threat-protection-new.md b/windows/security/threat-protection/microsoft-defender-atp/get-user-information.md similarity index 100% rename from windows/security/threat-protection/microsoft-defender-atp/get-user-information-windows-defender-advanced-threat-protection-new.md rename to windows/security/threat-protection/microsoft-defender-atp/get-user-information.md diff --git a/windows/security/threat-protection/microsoft-defender-atp/get-user-related-alerts-windows-defender-advanced-threat-protection-new.md b/windows/security/threat-protection/microsoft-defender-atp/get-user-related-alerts.md similarity index 100% rename from windows/security/threat-protection/microsoft-defender-atp/get-user-related-alerts-windows-defender-advanced-threat-protection-new.md rename to windows/security/threat-protection/microsoft-defender-atp/get-user-related-alerts.md diff --git a/windows/security/threat-protection/microsoft-defender-atp/get-user-related-machines-windows-defender-advanced-threat-protection-new.md b/windows/security/threat-protection/microsoft-defender-atp/get-user-related-machines.md similarity index 100% rename from windows/security/threat-protection/microsoft-defender-atp/get-user-related-machines-windows-defender-advanced-threat-protection-new.md rename to windows/security/threat-protection/microsoft-defender-atp/get-user-related-machines.md diff --git a/windows/security/threat-protection/microsoft-defender-atp/initiate-autoir-investigation-windows-defender-advanced-threat-protection-new.md b/windows/security/threat-protection/microsoft-defender-atp/initiate-autoir-investigation.md similarity index 100% rename from windows/security/threat-protection/microsoft-defender-atp/initiate-autoir-investigation-windows-defender-advanced-threat-protection-new.md rename to windows/security/threat-protection/microsoft-defender-atp/initiate-autoir-investigation.md diff --git a/windows/security/threat-protection/microsoft-defender-atp/investigate-alerts-windows-defender-advanced-threat-protection.md b/windows/security/threat-protection/microsoft-defender-atp/investigate-alerts.md similarity index 100% rename from windows/security/threat-protection/microsoft-defender-atp/investigate-alerts-windows-defender-advanced-threat-protection.md rename to windows/security/threat-protection/microsoft-defender-atp/investigate-alerts.md diff --git a/windows/security/threat-protection/microsoft-defender-atp/investigate-domain-windows-defender-advanced-threat-protection.md b/windows/security/threat-protection/microsoft-defender-atp/investigate-domain.md similarity index 100% rename from windows/security/threat-protection/microsoft-defender-atp/investigate-domain-windows-defender-advanced-threat-protection.md rename to windows/security/threat-protection/microsoft-defender-atp/investigate-domain.md diff --git a/windows/security/threat-protection/microsoft-defender-atp/investigate-files-windows-defender-advanced-threat-protection.md b/windows/security/threat-protection/microsoft-defender-atp/investigate-files.md similarity index 100% rename from windows/security/threat-protection/microsoft-defender-atp/investigate-files-windows-defender-advanced-threat-protection.md rename to windows/security/threat-protection/microsoft-defender-atp/investigate-files.md diff --git a/windows/security/threat-protection/microsoft-defender-atp/investigate-incidents-windows-defender-advanced-threat-protection.md b/windows/security/threat-protection/microsoft-defender-atp/investigate-incidents.md similarity index 100% rename from windows/security/threat-protection/microsoft-defender-atp/investigate-incidents-windows-defender-advanced-threat-protection.md rename to windows/security/threat-protection/microsoft-defender-atp/investigate-incidents.md diff --git a/windows/security/threat-protection/microsoft-defender-atp/investigate-ip-windows-defender-advanced-threat-protection.md b/windows/security/threat-protection/microsoft-defender-atp/investigate-ip.md similarity index 100% rename from windows/security/threat-protection/microsoft-defender-atp/investigate-ip-windows-defender-advanced-threat-protection.md rename to windows/security/threat-protection/microsoft-defender-atp/investigate-ip.md diff --git a/windows/security/threat-protection/microsoft-defender-atp/investigate-machines-windows-defender-advanced-threat-protection.md b/windows/security/threat-protection/microsoft-defender-atp/investigate-machines.md similarity index 100% rename from windows/security/threat-protection/microsoft-defender-atp/investigate-machines-windows-defender-advanced-threat-protection.md rename to windows/security/threat-protection/microsoft-defender-atp/investigate-machines.md diff --git a/windows/security/threat-protection/microsoft-defender-atp/investigate-user-windows-defender-advanced-threat-protection.md b/windows/security/threat-protection/microsoft-defender-atp/investigate-user.md similarity index 100% rename from windows/security/threat-protection/microsoft-defender-atp/investigate-user-windows-defender-advanced-threat-protection.md rename to windows/security/threat-protection/microsoft-defender-atp/investigate-user.md diff --git a/windows/security/threat-protection/microsoft-defender-atp/is-domain-seen-in-org-windows-defender-advanced-threat-protection-new.md b/windows/security/threat-protection/microsoft-defender-atp/is-domain-seen-in-org.md similarity index 100% rename from windows/security/threat-protection/microsoft-defender-atp/is-domain-seen-in-org-windows-defender-advanced-threat-protection-new.md rename to windows/security/threat-protection/microsoft-defender-atp/is-domain-seen-in-org.md diff --git a/windows/security/threat-protection/microsoft-defender-atp/is-ip-seen-org-windows-defender-advanced-threat-protection-new.md b/windows/security/threat-protection/microsoft-defender-atp/is-ip-seen-org.md similarity index 100% rename from windows/security/threat-protection/microsoft-defender-atp/is-ip-seen-org-windows-defender-advanced-threat-protection-new.md rename to windows/security/threat-protection/microsoft-defender-atp/is-ip-seen-org.md diff --git a/windows/security/threat-protection/microsoft-defender-atp/isolate-machine-windows-defender-advanced-threat-protection-new.md b/windows/security/threat-protection/microsoft-defender-atp/isolate-machine.md similarity index 100% rename from windows/security/threat-protection/microsoft-defender-atp/isolate-machine-windows-defender-advanced-threat-protection-new.md rename to windows/security/threat-protection/microsoft-defender-atp/isolate-machine.md diff --git a/windows/security/threat-protection/microsoft-defender-atp/licensing-windows-defender-advanced-threat-protection.md b/windows/security/threat-protection/microsoft-defender-atp/licensing.md similarity index 100% rename from windows/security/threat-protection/microsoft-defender-atp/licensing-windows-defender-advanced-threat-protection.md rename to windows/security/threat-protection/microsoft-defender-atp/licensing.md diff --git a/windows/security/threat-protection/microsoft-defender-atp/machine-groups-windows-defender-advanced-threat-protection.md b/windows/security/threat-protection/microsoft-defender-atp/machine-groups.md similarity index 100% rename from windows/security/threat-protection/microsoft-defender-atp/machine-groups-windows-defender-advanced-threat-protection.md rename to windows/security/threat-protection/microsoft-defender-atp/machine-groups.md diff --git a/windows/security/threat-protection/microsoft-defender-atp/machine-reports-windows-defender-advanced-threat-protection.md b/windows/security/threat-protection/microsoft-defender-atp/machine-reports.md similarity index 100% rename from windows/security/threat-protection/microsoft-defender-atp/machine-reports-windows-defender-advanced-threat-protection.md rename to windows/security/threat-protection/microsoft-defender-atp/machine-reports.md diff --git a/windows/security/threat-protection/microsoft-defender-atp/machine-tags-windows-defender-advanced-threat-protection.md b/windows/security/threat-protection/microsoft-defender-atp/machine-tags.md similarity index 100% rename from windows/security/threat-protection/microsoft-defender-atp/machine-tags-windows-defender-advanced-threat-protection.md rename to windows/security/threat-protection/microsoft-defender-atp/machine-tags.md diff --git a/windows/security/threat-protection/microsoft-defender-atp/machine-windows-defender-advanced-threat-protection-new.md b/windows/security/threat-protection/microsoft-defender-atp/machine.md similarity index 100% rename from windows/security/threat-protection/microsoft-defender-atp/machine-windows-defender-advanced-threat-protection-new.md rename to windows/security/threat-protection/microsoft-defender-atp/machine.md diff --git a/windows/security/threat-protection/microsoft-defender-atp/machineaction-windows-defender-advanced-threat-protection-new.md b/windows/security/threat-protection/microsoft-defender-atp/machineaction.md similarity index 100% rename from windows/security/threat-protection/microsoft-defender-atp/machineaction-windows-defender-advanced-threat-protection-new.md rename to windows/security/threat-protection/microsoft-defender-atp/machineaction.md diff --git a/windows/security/threat-protection/microsoft-defender-atp/machines-view-overview-windows-defender-advanced-threat-protection.md b/windows/security/threat-protection/microsoft-defender-atp/machines-view-overview.md similarity index 100% rename from windows/security/threat-protection/microsoft-defender-atp/machines-view-overview-windows-defender-advanced-threat-protection.md rename to windows/security/threat-protection/microsoft-defender-atp/machines-view-overview.md diff --git a/windows/security/threat-protection/microsoft-defender-atp/manage-alerts-windows-defender-advanced-threat-protection.md b/windows/security/threat-protection/microsoft-defender-atp/manage-alerts.md similarity index 100% rename from windows/security/threat-protection/microsoft-defender-atp/manage-alerts-windows-defender-advanced-threat-protection.md rename to windows/security/threat-protection/microsoft-defender-atp/manage-alerts.md diff --git a/windows/security/threat-protection/microsoft-defender-atp/manage-allowed-blocked-list-windows-defender-advanced-threat-protection.md b/windows/security/threat-protection/microsoft-defender-atp/manage-allowed-blocked-list.md similarity index 100% rename from windows/security/threat-protection/microsoft-defender-atp/manage-allowed-blocked-list-windows-defender-advanced-threat-protection.md rename to windows/security/threat-protection/microsoft-defender-atp/manage-allowed-blocked-list.md diff --git a/windows/security/threat-protection/microsoft-defender-atp/manage-auto-investigation-windows-defender-advanced-threat-protection.md b/windows/security/threat-protection/microsoft-defender-atp/manage-auto-investigation.md similarity index 100% rename from windows/security/threat-protection/microsoft-defender-atp/manage-auto-investigation-windows-defender-advanced-threat-protection.md rename to windows/security/threat-protection/microsoft-defender-atp/manage-auto-investigation.md diff --git a/windows/security/threat-protection/microsoft-defender-atp/manage-automation-allowed-blocked-list-windows-defender-advanced-threat-protection.md b/windows/security/threat-protection/microsoft-defender-atp/manage-automation-allowed-blocked-list.md similarity index 100% rename from windows/security/threat-protection/microsoft-defender-atp/manage-automation-allowed-blocked-list-windows-defender-advanced-threat-protection.md rename to windows/security/threat-protection/microsoft-defender-atp/manage-automation-allowed-blocked-list.md diff --git a/windows/security/threat-protection/microsoft-defender-atp/manage-automation-file-uploads-windows-defender-advanced-threat-protection.md b/windows/security/threat-protection/microsoft-defender-atp/manage-automation-file-uploads.md similarity index 100% rename from windows/security/threat-protection/microsoft-defender-atp/manage-automation-file-uploads-windows-defender-advanced-threat-protection.md rename to windows/security/threat-protection/microsoft-defender-atp/manage-automation-file-uploads.md diff --git a/windows/security/threat-protection/microsoft-defender-atp/manage-automation-folder-exclusions-windows-defender-advanced-threat-protection.md b/windows/security/threat-protection/microsoft-defender-atp/manage-automation-folder-exclusions.md similarity index 100% rename from windows/security/threat-protection/microsoft-defender-atp/manage-automation-folder-exclusions-windows-defender-advanced-threat-protection.md rename to windows/security/threat-protection/microsoft-defender-atp/manage-automation-folder-exclusions.md diff --git a/windows/security/threat-protection/microsoft-defender-atp/manage-incidents-windows-defender-advanced-threat-protection.md b/windows/security/threat-protection/microsoft-defender-atp/manage-incidents.md similarity index 100% rename from windows/security/threat-protection/microsoft-defender-atp/manage-incidents-windows-defender-advanced-threat-protection.md rename to windows/security/threat-protection/microsoft-defender-atp/manage-incidents.md diff --git a/windows/security/threat-protection/microsoft-defender-atp/manage-suppression-rules-windows-defender-advanced-threat-protection.md b/windows/security/threat-protection/microsoft-defender-atp/manage-suppression-rules.md similarity index 100% rename from windows/security/threat-protection/microsoft-defender-atp/manage-suppression-rules-windows-defender-advanced-threat-protection.md rename to windows/security/threat-protection/microsoft-defender-atp/manage-suppression-rules.md diff --git a/windows/security/threat-protection/microsoft-defender-atp/minimum-requirements-windows-defender-advanced-threat-protection.md b/windows/security/threat-protection/microsoft-defender-atp/minimum-requirements.md similarity index 100% rename from windows/security/threat-protection/microsoft-defender-atp/minimum-requirements-windows-defender-advanced-threat-protection.md rename to windows/security/threat-protection/microsoft-defender-atp/minimum-requirements.md diff --git a/windows/security/threat-protection/microsoft-defender-atp/mssp-support-windows-defender-advanced-threat-protection.md b/windows/security/threat-protection/microsoft-defender-atp/mssp-support.md similarity index 100% rename from windows/security/threat-protection/microsoft-defender-atp/mssp-support-windows-defender-advanced-threat-protection.md rename to windows/security/threat-protection/microsoft-defender-atp/mssp-support.md diff --git a/windows/security/threat-protection/microsoft-defender-atp/offboard-machine-api-windows-defender-advanced-threat-protection-new.md b/windows/security/threat-protection/microsoft-defender-atp/offboard-machine-api.md similarity index 100% rename from windows/security/threat-protection/microsoft-defender-atp/offboard-machine-api-windows-defender-advanced-threat-protection-new.md rename to windows/security/threat-protection/microsoft-defender-atp/offboard-machine-api.md diff --git a/windows/security/threat-protection/microsoft-defender-atp/offboard-machines-windows-defender-advanced-threat-protection.md b/windows/security/threat-protection/microsoft-defender-atp/offboard-machines.md similarity index 100% rename from windows/security/threat-protection/microsoft-defender-atp/offboard-machines-windows-defender-advanced-threat-protection.md rename to windows/security/threat-protection/microsoft-defender-atp/offboard-machines.md diff --git a/windows/security/threat-protection/microsoft-defender-atp/onboard-configure-windows-defender-advanced-threat-protection.md b/windows/security/threat-protection/microsoft-defender-atp/onboard-configure.md similarity index 100% rename from windows/security/threat-protection/microsoft-defender-atp/onboard-configure-windows-defender-advanced-threat-protection.md rename to windows/security/threat-protection/microsoft-defender-atp/onboard-configure.md diff --git a/windows/security/threat-protection/microsoft-defender-atp/onboard-downlevel-windows-defender-advanced-threat-protection.md b/windows/security/threat-protection/microsoft-defender-atp/onboard-downlevel.md similarity index 100% rename from windows/security/threat-protection/microsoft-defender-atp/onboard-downlevel-windows-defender-advanced-threat-protection.md rename to windows/security/threat-protection/microsoft-defender-atp/onboard-downlevel.md diff --git a/windows/security/threat-protection/microsoft-defender-atp/overview-hunting-windows-defender-advanced-threat-protection.md b/windows/security/threat-protection/microsoft-defender-atp/overview-hunting.md similarity index 100% rename from windows/security/threat-protection/microsoft-defender-atp/overview-hunting-windows-defender-advanced-threat-protection.md rename to windows/security/threat-protection/microsoft-defender-atp/overview-hunting.md diff --git a/windows/security/threat-protection/microsoft-defender-atp/overview-secure-score-windows-defender-advanced-threat-protection.md b/windows/security/threat-protection/microsoft-defender-atp/overview-secure-score.md similarity index 100% rename from windows/security/threat-protection/microsoft-defender-atp/overview-secure-score-windows-defender-advanced-threat-protection.md rename to windows/security/threat-protection/microsoft-defender-atp/overview-secure-score.md diff --git a/windows/security/threat-protection/microsoft-defender-atp/portal-overview-windows-defender-advanced-threat-protection.md b/windows/security/threat-protection/microsoft-defender-atp/portal-overview.md similarity index 100% rename from windows/security/threat-protection/microsoft-defender-atp/portal-overview-windows-defender-advanced-threat-protection.md rename to windows/security/threat-protection/microsoft-defender-atp/portal-overview.md diff --git a/windows/security/threat-protection/microsoft-defender-atp/post-ti-indicator-windows-defender-advanced-threat-protection-new.md b/windows/security/threat-protection/microsoft-defender-atp/post-ti-indicator.md similarity index 100% rename from windows/security/threat-protection/microsoft-defender-atp/post-ti-indicator-windows-defender-advanced-threat-protection-new.md rename to windows/security/threat-protection/microsoft-defender-atp/post-ti-indicator.md diff --git a/windows/security/threat-protection/microsoft-defender-atp/powerbi-reports-windows-defender-advanced-threat-protection.md b/windows/security/threat-protection/microsoft-defender-atp/powerbi-reports.md similarity index 100% rename from windows/security/threat-protection/microsoft-defender-atp/powerbi-reports-windows-defender-advanced-threat-protection.md rename to windows/security/threat-protection/microsoft-defender-atp/powerbi-reports.md diff --git a/windows/security/threat-protection/microsoft-defender-atp/powershell-example-code-windows-defender-advanced-threat-protection.md b/windows/security/threat-protection/microsoft-defender-atp/powershell-example-code.md similarity index 100% rename from windows/security/threat-protection/microsoft-defender-atp/powershell-example-code-windows-defender-advanced-threat-protection.md rename to windows/security/threat-protection/microsoft-defender-atp/powershell-example-code.md diff --git a/windows/security/threat-protection/microsoft-defender-atp/preferences-setup-windows-defender-advanced-threat-protection.md b/windows/security/threat-protection/microsoft-defender-atp/preferences-setup.md similarity index 100% rename from windows/security/threat-protection/microsoft-defender-atp/preferences-setup-windows-defender-advanced-threat-protection.md rename to windows/security/threat-protection/microsoft-defender-atp/preferences-setup.md diff --git a/windows/security/threat-protection/microsoft-defender-atp/preview-settings-windows-defender-advanced-threat-protection.md b/windows/security/threat-protection/microsoft-defender-atp/preview-settings.md similarity index 100% rename from windows/security/threat-protection/microsoft-defender-atp/preview-settings-windows-defender-advanced-threat-protection.md rename to windows/security/threat-protection/microsoft-defender-atp/preview-settings.md diff --git a/windows/security/threat-protection/microsoft-defender-atp/preview-windows-defender-advanced-threat-protection.md b/windows/security/threat-protection/microsoft-defender-atp/preview.md similarity index 100% rename from windows/security/threat-protection/microsoft-defender-atp/preview-windows-defender-advanced-threat-protection.md rename to windows/security/threat-protection/microsoft-defender-atp/preview.md diff --git a/windows/security/threat-protection/microsoft-defender-atp/pull-alerts-using-rest-api-windows-defender-advanced-threat-protection.md b/windows/security/threat-protection/microsoft-defender-atp/pull-alerts-using-rest-api.md similarity index 100% rename from windows/security/threat-protection/microsoft-defender-atp/pull-alerts-using-rest-api-windows-defender-advanced-threat-protection.md rename to windows/security/threat-protection/microsoft-defender-atp/pull-alerts-using-rest-api.md diff --git a/windows/security/threat-protection/microsoft-defender-atp/python-example-code-windows-defender-advanced-threat-protection.md b/windows/security/threat-protection/microsoft-defender-atp/python-example-code.md similarity index 100% rename from windows/security/threat-protection/microsoft-defender-atp/python-example-code-windows-defender-advanced-threat-protection.md rename to windows/security/threat-protection/microsoft-defender-atp/python-example-code.md diff --git a/windows/security/threat-protection/microsoft-defender-atp/rbac-windows-defender-advanced-threat-protection.md b/windows/security/threat-protection/microsoft-defender-atp/rbac.md similarity index 100% rename from windows/security/threat-protection/microsoft-defender-atp/rbac-windows-defender-advanced-threat-protection.md rename to windows/security/threat-protection/microsoft-defender-atp/rbac.md diff --git a/windows/security/threat-protection/microsoft-defender-atp/respond-file-alerts-windows-defender-advanced-threat-protection.md b/windows/security/threat-protection/microsoft-defender-atp/respond-file-alerts.md similarity index 100% rename from windows/security/threat-protection/microsoft-defender-atp/respond-file-alerts-windows-defender-advanced-threat-protection.md rename to windows/security/threat-protection/microsoft-defender-atp/respond-file-alerts.md diff --git a/windows/security/threat-protection/microsoft-defender-atp/respond-machine-alerts-windows-defender-advanced-threat-protection.md b/windows/security/threat-protection/microsoft-defender-atp/respond-machine-alerts.md similarity index 100% rename from windows/security/threat-protection/microsoft-defender-atp/respond-machine-alerts-windows-defender-advanced-threat-protection.md rename to windows/security/threat-protection/microsoft-defender-atp/respond-machine-alerts.md diff --git a/windows/security/threat-protection/microsoft-defender-atp/response-actions-windows-defender-advanced-threat-protection.md b/windows/security/threat-protection/microsoft-defender-atp/response-actions.md similarity index 100% rename from windows/security/threat-protection/microsoft-defender-atp/response-actions-windows-defender-advanced-threat-protection.md rename to windows/security/threat-protection/microsoft-defender-atp/response-actions.md diff --git a/windows/security/threat-protection/microsoft-defender-atp/restrict-code-execution-windows-defender-advanced-threat-protection-new.md b/windows/security/threat-protection/microsoft-defender-atp/restrict-code-execution.md similarity index 100% rename from windows/security/threat-protection/microsoft-defender-atp/restrict-code-execution-windows-defender-advanced-threat-protection-new.md rename to windows/security/threat-protection/microsoft-defender-atp/restrict-code-execution.md diff --git a/windows/security/threat-protection/microsoft-defender-atp/run-av-scan-windows-defender-advanced-threat-protection-new.md b/windows/security/threat-protection/microsoft-defender-atp/run-av-scan.md similarity index 100% rename from windows/security/threat-protection/microsoft-defender-atp/run-av-scan-windows-defender-advanced-threat-protection-new.md rename to windows/security/threat-protection/microsoft-defender-atp/run-av-scan.md diff --git a/windows/security/threat-protection/microsoft-defender-atp/run-detection-test-windows-defender-advanced-threat-protection.md b/windows/security/threat-protection/microsoft-defender-atp/run-detection-test.md similarity index 100% rename from windows/security/threat-protection/microsoft-defender-atp/run-detection-test-windows-defender-advanced-threat-protection.md rename to windows/security/threat-protection/microsoft-defender-atp/run-detection-test.md diff --git a/windows/security/threat-protection/microsoft-defender-atp/secure-score-dashboard-windows-defender-advanced-threat-protection.md b/windows/security/threat-protection/microsoft-defender-atp/secure-score-dashboard.md similarity index 100% rename from windows/security/threat-protection/microsoft-defender-atp/secure-score-dashboard-windows-defender-advanced-threat-protection.md rename to windows/security/threat-protection/microsoft-defender-atp/secure-score-dashboard.md diff --git a/windows/security/threat-protection/microsoft-defender-atp/security-operations-dashboard-windows-defender-advanced-threat-protection.md b/windows/security/threat-protection/microsoft-defender-atp/security-operations-dashboard.md similarity index 100% rename from windows/security/threat-protection/microsoft-defender-atp/security-operations-dashboard-windows-defender-advanced-threat-protection.md rename to windows/security/threat-protection/microsoft-defender-atp/security-operations-dashboard.md diff --git a/windows/security/threat-protection/microsoft-defender-atp/service-status-windows-defender-advanced-threat-protection.md b/windows/security/threat-protection/microsoft-defender-atp/service-status.md similarity index 100% rename from windows/security/threat-protection/microsoft-defender-atp/service-status-windows-defender-advanced-threat-protection.md rename to windows/security/threat-protection/microsoft-defender-atp/service-status.md diff --git a/windows/security/threat-protection/microsoft-defender-atp/stop-and-quarantine-file-windows-defender-advanced-threat-protection-new.md b/windows/security/threat-protection/microsoft-defender-atp/stop-and-quarantine-file.md similarity index 100% rename from windows/security/threat-protection/microsoft-defender-atp/stop-and-quarantine-file-windows-defender-advanced-threat-protection-new.md rename to windows/security/threat-protection/microsoft-defender-atp/stop-and-quarantine-file.md diff --git a/windows/security/threat-protection/microsoft-defender-atp/supported-response-apis-windows-defender-advanced-threat-protection.md b/windows/security/threat-protection/microsoft-defender-atp/supported-response-apis.md similarity index 100% rename from windows/security/threat-protection/microsoft-defender-atp/supported-response-apis-windows-defender-advanced-threat-protection.md rename to windows/security/threat-protection/microsoft-defender-atp/supported-response-apis.md diff --git a/windows/security/threat-protection/microsoft-defender-atp/threat-indicator-concepts-windows-defender-advanced-threat-protection.md b/windows/security/threat-protection/microsoft-defender-atp/threat-indicator-concepts.md similarity index 100% rename from windows/security/threat-protection/microsoft-defender-atp/threat-indicator-concepts-windows-defender-advanced-threat-protection.md rename to windows/security/threat-protection/microsoft-defender-atp/threat-indicator-concepts.md diff --git a/windows/security/threat-protection/microsoft-defender-atp/threat-protection-reports-windows-defender-advanced-threat-protection.md b/windows/security/threat-protection/microsoft-defender-atp/threat-protection-reports.md similarity index 100% rename from windows/security/threat-protection/microsoft-defender-atp/threat-protection-reports-windows-defender-advanced-threat-protection.md rename to windows/security/threat-protection/microsoft-defender-atp/threat-protection-reports.md diff --git a/windows/security/threat-protection/microsoft-defender-atp/ti-indicator-windows-defender-advanced-threat-protection-new.md b/windows/security/threat-protection/microsoft-defender-atp/ti-indicator.md similarity index 100% rename from windows/security/threat-protection/microsoft-defender-atp/ti-indicator-windows-defender-advanced-threat-protection-new.md rename to windows/security/threat-protection/microsoft-defender-atp/ti-indicator.md diff --git a/windows/security/threat-protection/microsoft-defender-atp/time-settings-windows-defender-advanced-threat-protection.md b/windows/security/threat-protection/microsoft-defender-atp/time-settings.md similarity index 100% rename from windows/security/threat-protection/microsoft-defender-atp/time-settings-windows-defender-advanced-threat-protection.md rename to windows/security/threat-protection/microsoft-defender-atp/time-settings.md diff --git a/windows/security/threat-protection/microsoft-defender-atp/troubleshoot-custom-ti-windows-defender-advanced-threat-protection.md b/windows/security/threat-protection/microsoft-defender-atp/troubleshoot-custom-ti.md similarity index 100% rename from windows/security/threat-protection/microsoft-defender-atp/troubleshoot-custom-ti-windows-defender-advanced-threat-protection.md rename to windows/security/threat-protection/microsoft-defender-atp/troubleshoot-custom-ti.md diff --git a/windows/security/threat-protection/microsoft-defender-atp/troubleshoot-onboarding-error-messages-windows-defender-advanced-threat-protection.md b/windows/security/threat-protection/microsoft-defender-atp/troubleshoot-onboarding-error-messages.md similarity index 100% rename from windows/security/threat-protection/microsoft-defender-atp/troubleshoot-onboarding-error-messages-windows-defender-advanced-threat-protection.md rename to windows/security/threat-protection/microsoft-defender-atp/troubleshoot-onboarding-error-messages.md diff --git a/windows/security/threat-protection/microsoft-defender-atp/troubleshoot-onboarding-windows-defender-advanced-threat-protection.md b/windows/security/threat-protection/microsoft-defender-atp/troubleshoot-onboarding.md similarity index 100% rename from windows/security/threat-protection/microsoft-defender-atp/troubleshoot-onboarding-windows-defender-advanced-threat-protection.md rename to windows/security/threat-protection/microsoft-defender-atp/troubleshoot-onboarding.md diff --git a/windows/security/threat-protection/microsoft-defender-atp/troubleshoot-wdatp.md b/windows/security/threat-protection/microsoft-defender-atp/troubleshoot-overview.md similarity index 100% rename from windows/security/threat-protection/microsoft-defender-atp/troubleshoot-wdatp.md rename to windows/security/threat-protection/microsoft-defender-atp/troubleshoot-overview.md diff --git a/windows/security/threat-protection/microsoft-defender-atp/troubleshoot-siem-windows-defender-advanced-threat-protection.md b/windows/security/threat-protection/microsoft-defender-atp/troubleshoot-siem.md similarity index 100% rename from windows/security/threat-protection/microsoft-defender-atp/troubleshoot-siem-windows-defender-advanced-threat-protection.md rename to windows/security/threat-protection/microsoft-defender-atp/troubleshoot-siem.md diff --git a/windows/security/threat-protection/microsoft-defender-atp/troubleshoot-windows-defender-advanced-threat-protection.md b/windows/security/threat-protection/microsoft-defender-atp/troubleshoot.md similarity index 100% rename from windows/security/threat-protection/microsoft-defender-atp/troubleshoot-windows-defender-advanced-threat-protection.md rename to windows/security/threat-protection/microsoft-defender-atp/troubleshoot.md diff --git a/windows/security/threat-protection/microsoft-defender-atp/unisolate-machine-windows-defender-advanced-threat-protection-new.md b/windows/security/threat-protection/microsoft-defender-atp/unisolate-machine.md similarity index 100% rename from windows/security/threat-protection/microsoft-defender-atp/unisolate-machine-windows-defender-advanced-threat-protection-new.md rename to windows/security/threat-protection/microsoft-defender-atp/unisolate-machine.md diff --git a/windows/security/threat-protection/microsoft-defender-atp/unrestrict-code-execution-windows-defender-advanced-threat-protection-new.md b/windows/security/threat-protection/microsoft-defender-atp/unrestrict-code-execution.md similarity index 100% rename from windows/security/threat-protection/microsoft-defender-atp/unrestrict-code-execution-windows-defender-advanced-threat-protection-new.md rename to windows/security/threat-protection/microsoft-defender-atp/unrestrict-code-execution.md diff --git a/windows/security/threat-protection/microsoft-defender-atp/update-alert-windows-defender-advanced-threat-protection-new.md b/windows/security/threat-protection/microsoft-defender-atp/update-alert.md similarity index 100% rename from windows/security/threat-protection/microsoft-defender-atp/update-alert-windows-defender-advanced-threat-protection-new.md rename to windows/security/threat-protection/microsoft-defender-atp/update-alert.md diff --git a/windows/security/threat-protection/microsoft-defender-atp/use-custom-ti-windows-defender-advanced-threat-protection.md b/windows/security/threat-protection/microsoft-defender-atp/use-custom-ti.md similarity index 100% rename from windows/security/threat-protection/microsoft-defender-atp/use-custom-ti-windows-defender-advanced-threat-protection.md rename to windows/security/threat-protection/microsoft-defender-atp/use-custom-ti.md diff --git a/windows/security/threat-protection/microsoft-defender-atp/use-windows-defender-advanced-threat-protection.md b/windows/security/threat-protection/microsoft-defender-atp/use.md similarity index 100% rename from windows/security/threat-protection/microsoft-defender-atp/use-windows-defender-advanced-threat-protection.md rename to windows/security/threat-protection/microsoft-defender-atp/use.md diff --git a/windows/security/threat-protection/microsoft-defender-atp/user-roles-windows-defender-advanced-threat-protection.md b/windows/security/threat-protection/microsoft-defender-atp/user-roles.md similarity index 100% rename from windows/security/threat-protection/microsoft-defender-atp/user-roles-windows-defender-advanced-threat-protection.md rename to windows/security/threat-protection/microsoft-defender-atp/user-roles.md diff --git a/windows/security/threat-protection/microsoft-defender-atp/user-windows-defender-advanced-threat-protection-new.md b/windows/security/threat-protection/microsoft-defender-atp/user.md similarity index 100% rename from windows/security/threat-protection/microsoft-defender-atp/user-windows-defender-advanced-threat-protection-new.md rename to windows/security/threat-protection/microsoft-defender-atp/user.md diff --git a/windows/security/threat-protection/microsoft-defender-atp/whats-new-in-windows-defender-atp.md b/windows/security/threat-protection/microsoft-defender-atp/whats-new-in-microsoft-defender-atp.md similarity index 100% rename from windows/security/threat-protection/microsoft-defender-atp/whats-new-in-windows-defender-atp.md rename to windows/security/threat-protection/microsoft-defender-atp/whats-new-in-microsoft-defender-atp.md From 91bf200c2bbe2825c97642fd156a8ee1e6c98f6f Mon Sep 17 00:00:00 2001 From: Joey Caparas Date: Wed, 10 Apr 2019 14:50:43 -0700 Subject: [PATCH 140/724] remove all instances of wdatp within topics --- .../microsoft-defender-atp/TOC.md | 360 +++++++++--------- .../add-or-remove-machine-tags.md | 4 +- .../advanced-features.md | 28 +- .../advanced-hunting-best-practices.md | 12 +- .../advanced-hunting-reference.md | 12 +- .../advanced-hunting.md | 14 +- .../microsoft-defender-atp/alerts-queue.md | 30 +- .../microsoft-defender-atp/alerts.md | 4 +- .../microsoft-defender-atp/api-hello-world.md | 14 +- .../api-portal-mapping.md | 26 +- .../microsoft-defender-atp/apis-intro.md | 30 +- .../assign-portal-access.md | 12 +- .../attack-simulations.md | 18 +- .../automated-investigations.md | 6 +- .../basic-permissions.md | 6 +- .../check-sensor-status.md | 24 +- .../collect-investigation-package.md | 4 +- .../microsoft-defender-atp/community.md | 14 +- .../microsoft-defender-atp/conditional.md | 12 +- .../configure-arcsight.md | 24 +- .../configure-conditional-access.md | 20 +- .../configure-email-notifications.md | 22 +- .../configure-endpoints-gp.md | 18 +- .../configure-endpoints-mdm.md | 18 +- .../configure-endpoints-non-windows.md | 18 +- .../configure-endpoints-sccm.md | 22 +- .../configure-endpoints-script.md | 16 +- .../configure-endpoints-vdi.md | 14 +- .../configure-endpoints.md | 10 +- .../configure-microsoft-threat-experts.md | 14 +- .../configure-mssp-support.md | 16 +- .../configure-proxy-internet.md | 40 +- .../configure-server-endpoints.md | 58 +-- .../microsoft-defender-atp/configure-siem.md | 34 +- .../configure-splunk.md | 22 +- .../create-alert-by-reference.md | 4 +- .../custom-detection-rules.md | 4 +- .../microsoft-defender-atp/custom-ti-api.md | 14 +- .../data-retention-settings.md | 14 +- .../data-storage-privacy.md | 30 +- .../defender-compatibility.md | 18 +- .../delete-ti-indicator-by-id.md | 2 +- .../microsoft-defender-atp/deprecate.md | 2 +- .../enable-custom-ti.md | 10 +- .../enable-secure-score.md | 12 +- .../enable-siem-integration.md | 20 +- .../microsoft-defender-atp/evaluate-atp.md | 12 +- .../event-error-codes.md | 96 ++--- .../experiment-custom-ti.md | 20 +- .../exposed-apis-create-app-nativeapp.md | 30 +- .../exposed-apis-create-app-webapp.md | 34 +- .../exposed-apis-full-sample-powershell.md | 12 +- .../exposed-apis-list.md | 12 +- .../exposed-apis-odata-samples.md | 12 +- .../microsoft-defender-atp/files.md | 6 +- .../find-machine-info-by-ip.md | 4 +- .../find-machines-by-ip.md | 4 +- .../fix-unhealhty-sensors.md | 28 +- .../get-alert-info-by-id.md | 4 +- .../get-alert-related-domain-info.md | 4 +- .../get-alert-related-files-info.md | 4 +- .../get-alert-related-ip-info.md | 4 +- .../get-alert-related-machine-info.md | 4 +- .../get-alert-related-user-info.md | 4 +- .../microsoft-defender-atp/get-alerts.md | 8 +- .../get-cvekbmap-collection.md | 2 +- .../get-domain-related-alerts.md | 4 +- .../get-domain-related-machines.md | 4 +- .../get-domain-statistics.md | 4 +- .../get-file-information.md | 4 +- .../get-file-related-alerts.md | 4 +- .../get-file-related-machines.md | 4 +- .../get-file-statistics.md | 4 +- .../get-ip-related-alerts.md | 4 +- .../get-ip-related-machines.md | 4 +- .../get-ip-statistics.md | 4 +- .../get-kbinfo-collection.md | 2 +- .../get-machine-by-id.md | 4 +- .../get-machine-log-on-users.md | 4 +- .../get-machine-related-alerts.md | 4 +- .../get-machineaction-object.md | 4 +- .../get-machineactions-collection.md | 8 +- .../get-machinegroups-collection.md | 2 +- .../microsoft-defender-atp/get-machines.md | 8 +- .../get-machinesecuritystates-collection.md | 2 +- .../get-package-sas-uri.md | 4 +- .../microsoft-defender-atp/get-started.md | 32 +- .../get-ti-indicators-collection.md | 2 +- .../get-user-information.md | 4 +- .../get-user-related-alerts.md | 4 +- .../get-user-related-machines.md | 4 +- .../microsoft-defender-atp/incidents-queue.md | 10 +- ...nformation-protection-in-windows-config.md | 12 +- ...ormation-protection-in-windows-overview.md | 30 +- .../initiate-autoir-investigation.md | 4 +- .../investigate-alerts.md | 22 +- .../investigate-domain.md | 22 +- .../investigate-files.md | 22 +- .../investigate-incidents.md | 10 +- .../microsoft-defender-atp/investigate-ip.md | 20 +- .../investigate-machines.md | 28 +- .../investigate-user.md | 24 +- .../is-domain-seen-in-org.md | 4 +- .../microsoft-defender-atp/is-ip-seen-org.md | 4 +- .../microsoft-defender-atp/isolate-machine.md | 4 +- .../microsoft-defender-atp/licensing.md | 30 +- .../microsoft-defender-atp/machine-groups.md | 8 +- .../microsoft-defender-atp/machine-reports.md | 6 +- .../microsoft-defender-atp/machine.md | 10 +- .../microsoft-defender-atp/machineaction.md | 4 +- .../machineactionsnote.md | 2 +- .../machines-view-overview.md | 10 +- .../microsoft-defender-atp/manage-alerts.md | 26 +- .../manage-allowed-blocked-list.md | 4 +- .../manage-auto-investigation.md | 2 +- .../manage-automation-allowed-blocked-list.md | 4 +- .../manage-automation-file-uploads.md | 4 +- .../manage-automation-folder-exclusions.md | 4 +- .../manage-incidents.md | 6 +- .../manage-suppression-rules.md | 6 +- .../microsoft-defender-atp/management-apis.md | 24 +- .../microsoft-cloud-app-security-config.md | 10 +- ...icrosoft-cloud-app-security-integration.md | 12 +- ...oft-defender-advanced-threat-protection.md | 46 +-- .../microsoft-threat-experts.md | 4 +- .../minimum-requirements.md | 16 +- .../microsoft-defender-atp/mssp-support.md | 10 +- .../offboard-machine-api.md | 6 +- .../offboard-machines.md | 10 +- .../onboard-configure.md | 46 +-- .../onboard-downlevel.md | 28 +- .../microsoft-defender-atp/onboard.md | 12 +- .../overview-attack-surface-reduction.md | 6 +- .../overview-custom-detections.md | 4 +- .../overview-endpoint-detection-response.md | 8 +- .../overview-hardware-based-isolation.md | 4 +- .../overview-hunting.md | 2 +- .../overview-secure-score.md | 2 +- .../microsoft-defender-atp/overview.md | 20 +- .../microsoft-defender-atp/portal-overview.md | 22 +- .../post-ti-indicator.md | 2 +- .../microsoft-defender-atp/powerbi-reports.md | 50 +-- .../powershell-example-code.md | 6 +- .../preferences-setup.md | 4 +- .../preview-settings.md | 20 +- .../microsoft-defender-atp/preview.md | 18 +- .../pull-alerts-using-rest-api.md | 40 +- .../python-example-code.md | 6 +- .../microsoft-defender-atp/rbac.md | 14 +- .../respond-file-alerts.md | 16 +- .../respond-machine-alerts.md | 10 +- .../response-actions.md | 8 +- .../restrict-code-execution.md | 4 +- .../run-advanced-query-api.md | 12 +- .../run-advanced-query-sample-ms-flow.md | 4 +- ...dvanced-query-sample-power-bi-app-token.md | 2 +- ...vanced-query-sample-power-bi-user-token.md | 4 +- .../run-advanced-query-sample-powershell.md | 6 +- .../run-advanced-query-sample-python.md | 6 +- .../microsoft-defender-atp/run-av-scan.md | 4 +- .../run-detection-test.md | 11 +- .../secure-score-dashboard.md | 24 +- .../security-operations-dashboard.md | 22 +- .../microsoft-defender-atp/service-status.md | 12 +- .../stop-and-quarantine-file.md | 4 +- .../supported-response-apis.md | 10 +- .../threat-analytics.md | 6 +- .../threat-indicator-concepts.md | 16 +- .../threat-protection-integration.md | 16 +- .../threat-protection-reports.md | 8 +- .../microsoft-defender-atp/ti-indicator.md | 2 +- .../microsoft-defender-atp/time-settings.md | 22 +- .../troubleshoot-custom-ti.md | 10 +- .../troubleshoot-onboarding-error-messages.md | 18 +- .../troubleshoot-onboarding.md | 62 +-- .../troubleshoot-overview.md | 10 +- .../troubleshoot-siem.md | 18 +- .../microsoft-defender-atp/troubleshoot.md | 20 +- .../unisolate-machine.md | 4 +- .../unrestrict-code-execution.md | 4 +- .../microsoft-defender-atp/update-alert.md | 4 +- .../microsoft-defender-atp/use-apis.md | 12 +- .../microsoft-defender-atp/use-custom-ti.md | 6 +- .../microsoft-defender-atp/use.md | 8 +- .../microsoft-defender-atp/user-roles.md | 6 +- .../view-incidents-queue.md | 4 +- .../whats-new-in-microsoft-defender-atp.md | 44 +-- .../windows-defender-security-center-atp.md | 8 +- 188 files changed, 1409 insertions(+), 1410 deletions(-) diff --git a/windows/security/threat-protection/microsoft-defender-atp/TOC.md b/windows/security/threat-protection/microsoft-defender-atp/TOC.md index e8ea7a0740..0dc76f0fa0 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/TOC.md +++ b/windows/security/threat-protection/microsoft-defender-atp/TOC.md @@ -1,4 +1,4 @@ -# [Windows Defender Advanced Threat Protection](windows-defender-advanced-threat-protection.md) +# [Microsoft Defender Advanced Threat Protection](microsoft-defender-advanced-threat-protection.md) ## [Overview](overview.md) ### [Attack surface reduction](overview-attack-surface-reduction.md) @@ -14,82 +14,82 @@ #### [Network firewall](../windows-firewall/windows-firewall-with-advanced-security.md) ### [Next generation protection](../windows-defender-antivirus/windows-defender-antivirus-in-windows-10.md) ### [Endpoint detection and response](overview-endpoint-detection-response.md) -#### [Security operations dashboard](security-operations-dashboard-windows-defender-advanced-threat-protection.md) +#### [Security operations dashboard](security-operations-dashboard.md) #### [Incidents queue](incidents-queue.md) ##### [View and organize the Incidents queue](view-incidents-queue.md) -##### [Manage incidents](manage-incidents-windows-defender-advanced-threat-protection.md) -##### [Investigate incidents](investigate-incidents-windows-defender-advanced-threat-protection.md) +##### [Manage incidents](manage-incidents.md) +##### [Investigate incidents](investigate-incidents.md) #### Alerts queue -##### [View and organize the Alerts queue](alerts-queue-windows-defender-advanced-threat-protection.md) -##### [Manage alerts](manage-alerts-windows-defender-advanced-threat-protection.md) -##### [Investigate alerts](investigate-alerts-windows-defender-advanced-threat-protection.md) -##### [Investigate files](investigate-files-windows-defender-advanced-threat-protection.md) -##### [Investigate machines](investigate-machines-windows-defender-advanced-threat-protection.md) -##### [Investigate an IP address](investigate-ip-windows-defender-advanced-threat-protection.md) -##### [Investigate a domain](investigate-domain-windows-defender-advanced-threat-protection.md) -##### [Investigate a user account](investigate-user-windows-defender-advanced-threat-protection.md) +##### [View and organize the Alerts queue](alerts-queue.md) +##### [Manage alerts](manage-alerts.md) +##### [Investigate alerts](investigate-alerts.md) +##### [Investigate files](investigate-files.md) +##### [Investigate machines](investigate-machines.md) +##### [Investigate an IP address](investigate-ip.md) +##### [Investigate a domain](investigate-domain.md) +##### [Investigate a user account](investigate-user.md) #### Machines list -##### [View and organize the Machines list](machines-view-overview-windows-defender-advanced-threat-protection.md) -##### [Manage machine group and tags](machine-tags-windows-defender-advanced-threat-protection.md) -##### [Alerts related to this machine](investigate-machines-windows-defender-advanced-threat-protection.md#alerts-related-to-this-machine) -##### [Machine timeline](investigate-machines-windows-defender-advanced-threat-protection.md#machine-timeline) -###### [Search for specific events](investigate-machines-windows-defender-advanced-threat-protection.md#search-for-specific-events) -###### [Filter events from a specific date](investigate-machines-windows-defender-advanced-threat-protection.md#filter-events-from-a-specific-date) -###### [Export machine timeline events](investigate-machines-windows-defender-advanced-threat-protection.md#export-machine-timeline-events) -###### [Navigate between pages](investigate-machines-windows-defender-advanced-threat-protection.md#navigate-between-pages) +##### [View and organize the Machines list](machines-view-overview.md) +##### [Manage machine group and tags](machine-tags.md) +##### [Alerts related to this machine](investigate-machines.md#alerts-related-to-this-machine) +##### [Machine timeline](investigate-machines.md#machine-timeline) +###### [Search for specific events](investigate-machines.md#search-for-specific-events) +###### [Filter events from a specific date](investigate-machines.md#filter-events-from-a-specific-date) +###### [Export machine timeline events](investigate-machines.md#export-machine-timeline-events) +###### [Navigate between pages](investigate-machines.md#navigate-between-pages) -#### [Take response actions](response-actions-windows-defender-advanced-threat-protection.md) -##### [Take response actions on a machine](respond-machine-alerts-windows-defender-advanced-threat-protection.md) -###### [Collect investigation package](respond-machine-alerts-windows-defender-advanced-threat-protection.md#collect-investigation-package-from-machines) -###### [Run antivirus scan](respond-machine-alerts-windows-defender-advanced-threat-protection.md#run-windows-defender-antivirus-scan-on-machines) -###### [Restrict app execution](respond-machine-alerts-windows-defender-advanced-threat-protection.md#restrict-app-execution) -###### [Remove app restriction](respond-machine-alerts-windows-defender-advanced-threat-protection.md#remove-app-restriction) -###### [Isolate machines from the network](respond-machine-alerts-windows-defender-advanced-threat-protection.md#isolate-machines-from-the-network) -###### [Release machine from isolation](respond-machine-alerts-windows-defender-advanced-threat-protection.md#release-machine-from-isolation) -###### [Check activity details in Action center](respond-machine-alerts-windows-defender-advanced-threat-protection.md#check-activity-details-in-action-center) +#### [Take response actions](response-actions.md) +##### [Take response actions on a machine](respond-machine-alerts.md) +###### [Collect investigation package](respond-machine-alerts.md#collect-investigation-package-from-machines) +###### [Run antivirus scan](respond-machine-alerts.md#run-windows-defender-antivirus-scan-on-machines) +###### [Restrict app execution](respond-machine-alerts.md#restrict-app-execution) +###### [Remove app restriction](respond-machine-alerts.md#remove-app-restriction) +###### [Isolate machines from the network](respond-machine-alerts.md#isolate-machines-from-the-network) +###### [Release machine from isolation](respond-machine-alerts.md#release-machine-from-isolation) +###### [Check activity details in Action center](respond-machine-alerts.md#check-activity-details-in-action-center) -##### [Take response actions on a file](respond-file-alerts-windows-defender-advanced-threat-protection.md) -###### [Stop and quarantine files in your network](respond-file-alerts-windows-defender-advanced-threat-protection.md#stop-and-quarantine-files-in-your-network) -###### [Remove file from quarantine](respond-file-alerts-windows-defender-advanced-threat-protection.md#remove-file-from-quarantine) -###### [Block files in your network](respond-file-alerts-windows-defender-advanced-threat-protection.md#block-files-in-your-network) -###### [Remove file from blocked list](respond-file-alerts-windows-defender-advanced-threat-protection.md#remove-file-from-blocked-list) -###### [Check activity details in Action center](respond-file-alerts-windows-defender-advanced-threat-protection.md#check-activity-details-in-action-center) -###### [Deep analysis](respond-file-alerts-windows-defender-advanced-threat-protection.md#deep-analysis) -###### [Submit files for analysis](respond-file-alerts-windows-defender-advanced-threat-protection.md#submit-files-for-analysis) -###### [View deep analysis reports](respond-file-alerts-windows-defender-advanced-threat-protection.md#view-deep-analysis-reports) -###### [Troubleshoot deep analysis](respond-file-alerts-windows-defender-advanced-threat-protection.md#troubleshoot-deep-analysis) +##### [Take response actions on a file](respond-file-alerts.md) +###### [Stop and quarantine files in your network](respond-file-alerts.md#stop-and-quarantine-files-in-your-network) +###### [Remove file from quarantine](respond-file-alerts.md#remove-file-from-quarantine) +###### [Block files in your network](respond-file-alerts.md#block-files-in-your-network) +###### [Remove file from blocked list](respond-file-alerts.md#remove-file-from-blocked-list) +###### [Check activity details in Action center](respond-file-alerts.md#check-activity-details-in-action-center) +###### [Deep analysis](respond-file-alerts.md#deep-analysis) +###### [Submit files for analysis](respond-file-alerts.md#submit-files-for-analysis) +###### [View deep analysis reports](respond-file-alerts.md#view-deep-analysis-reports) +###### [Troubleshoot deep analysis](respond-file-alerts.md#troubleshoot-deep-analysis) -### [Automated investigation and remediation](automated-investigations-windows-defender-advanced-threat-protection.md) -#### [Learn about the automated investigation and remediation dashboard](manage-auto-investigation-windows-defender-advanced-threat-protection.md) +### [Automated investigation and remediation](automated-investigations.md) +#### [Learn about the automated investigation and remediation dashboard](manage-auto-investigation.md) -### [Secure score](overview-secure-score-windows-defender-advanced-threat-protection.md) +### [Secure score](overview-secure-score.md) ### [Threat analytics](threat-analytics.md) -### [Advanced hunting](overview-hunting-windows-defender-advanced-threat-protection.md) -#### [Query data using Advanced hunting](advanced-hunting-windows-defender-advanced-threat-protection.md) -##### [Advanced hunting reference](advanced-hunting-reference-windows-defender-advanced-threat-protection.md) -##### [Advanced hunting query language best practices](advanced-hunting-best-practices-windows-defender-advanced-threat-protection.md) +### [Advanced hunting](overview-hunting.md) +#### [Query data using Advanced hunting](advanced-hunting.md) +##### [Advanced hunting reference](advanced-hunting-reference.md) +##### [Advanced hunting query language best practices](advanced-hunting-best-practices.md) #### [Custom detections](overview-custom-detections.md) #####[Create custom detections rules](custom-detection-rules.md) ### [Management and APIs](management-apis.md) -#### [Understand threat intelligence concepts](threat-indicator-concepts-windows-defender-advanced-threat-protection.md) -#### [Windows Defender ATP APIs](apis-intro.md) -#### [Managed security service provider support](mssp-support-windows-defender-advanced-threat-protection.md) +#### [Understand threat intelligence concepts](threat-indicator-concepts.md) +#### [Microsoft Defender ATP APIs](apis-intro.md) +#### [Managed security service provider support](mssp-support.md) ### [Microsoft Threat Protection](threat-protection-integration.md) -#### [Protect users, data, and devices with conditional access](conditional-access-windows-defender-advanced-threat-protection.md) +#### [Protect users, data, and devices with conditional access](conditional-access.md) #### [Microsoft Cloud App Security in Windows overview](microsoft-cloud-app-security-integration.md) #### [Information protection in Windows overview](information-protection-in-windows-overview.md) @@ -98,18 +98,18 @@ ### [Microsoft Threat Experts](microsoft-threat-experts.md) -### [Portal overview](portal-overview-windows-defender-advanced-threat-protection.md) +### [Portal overview](portal-overview.md) ## [Get started](get-started.md) -### [What's new in Windows Defender ATP](whats-new-in-windows-defender-atp.md) -### [Minimum requirements](minimum-requirements-windows-defender-advanced-threat-protection.md) -### [Validate licensing and complete setup](licensing-windows-defender-advanced-threat-protection.md) -### [Preview features](preview-windows-defender-advanced-threat-protection.md) -### [Data storage and privacy](data-storage-privacy-windows-defender-advanced-threat-protection.md) -### [Assign user access to the portal](assign-portal-access-windows-defender-advanced-threat-protection.md) +### [What's new in Microsoft Defender ATP](whats-new-in-microsoft-defender-atp.md) +### [Minimum requirements](minimum-requirements.md) +### [Validate licensing and complete setup](licensing.md) +### [Preview features](preview.md) +### [Data storage and privacy](data-storage-privacy.md) +### [Assign user access to the portal](assign-portal-access.md) -### [Evaluate Windows Defender ATP](evaluate-atp.md) +### [Evaluate Microsoft Defender ATP](evaluate-atp.md) ####Evaluate attack surface reduction ##### [Hardware-based isolation](../windows-defender-application-guard/test-scenarios-wd-app-guard.md) ##### [Application control](../windows-defender-application-control/audit-windows-defender-application-control-policies.md) @@ -120,7 +120,7 @@ ##### [Network firewall](../windows-firewall/evaluating-windows-firewall-with-advanced-security-design-examples.md) #### [Evaluate next generation protection](../windows-defender-antivirus/evaluate-windows-defender-antivirus.md) -### [Access the Windows Defender Security Center Community Center](community-windows-defender-advanced-threat-protection.md) +### [Access the Windows Defender Security Center Community Center](community.md) ## [Configure and manage capabilities](onboard.md) ### [Configure attack surface reduction](configure-attack-surface-reduction.md) @@ -210,29 +210,29 @@ ##### [Use the mpcmdrun.exe command line tool to manage next generation protection](../windows-defender-antivirus/command-line-arguments-windows-defender-antivirus.md) -### [Configure Secure score dashboard security controls](secure-score-dashboard-windows-defender-advanced-threat-protection.md) +### [Configure Secure score dashboard security controls](secure-score-dashboard.md) ### Management and API support -#### [Onboard machines](onboard-configure-windows-defender-advanced-threat-protection.md) -##### [Onboard previous versions of Windows](onboard-downlevel-windows-defender-advanced-threat-protection.md) -##### [Onboard Windows 10 machines](configure-endpoints-windows-defender-advanced-threat-protection.md) -###### [Onboard machines using Group Policy](configure-endpoints-gp-windows-defender-advanced-threat-protection.md) -###### [Onboard machines using System Center Configuration Manager](configure-endpoints-sccm-windows-defender-advanced-threat-protection.md) -###### [Onboard machines using Mobile Device Management tools](configure-endpoints-mdm-windows-defender-advanced-threat-protection.md) -####### [Onboard machines using Microsoft Intune](configure-endpoints-mdm-windows-defender-advanced-threat-protection.md#onboard-machines-using-microsoft-intune) -###### [Onboard machines using a local script](configure-endpoints-script-windows-defender-advanced-threat-protection.md) -###### [Onboard non-persistent virtual desktop infrastructure (VDI) machines](configure-endpoints-vdi-windows-defender-advanced-threat-protection.md) -##### [Onboard servers](configure-server-endpoints-windows-defender-advanced-threat-protection.md) -##### [Onboard non-Windows machines](configure-endpoints-non-windows-windows-defender-advanced-threat-protection.md) -##### [Run a detection test on a newly onboarded machine](run-detection-test-windows-defender-advanced-threat-protection.md) -##### [Run simulated attacks on machines](attack-simulations-windows-defender-advanced-threat-protection.md) -##### [Configure proxy and Internet connectivity settings](configure-proxy-internet-windows-defender-advanced-threat-protection.md) -##### [Troubleshoot onboarding issues](troubleshoot-onboarding-windows-defender-advanced-threat-protection.md) -###### [Troubleshoot subscription and portal access issues](troubleshoot-onboarding-error-messages-windows-defender-advanced-threat-protection.md) +#### [Onboard machines](onboard-configure.md) +##### [Onboard previous versions of Windows](onboard-downlevel.md) +##### [Onboard Windows 10 machines](configure-endpoints.md) +###### [Onboard machines using Group Policy](configure-endpoints-gp.md) +###### [Onboard machines using System Center Configuration Manager](configure-endpoints-sccm.md) +###### [Onboard machines using Mobile Device Management tools](configure-endpoints-mdm.md) +####### [Onboard machines using Microsoft Intune](configure-endpoints-mdm.md#onboard-machines-using-microsoft-intune) +###### [Onboard machines using a local script](configure-endpoints-script.md) +###### [Onboard non-persistent virtual desktop infrastructure (VDI) machines](configure-endpoints-vdi.md) +##### [Onboard servers](configure-server-endpoints.md) +##### [Onboard non-Windows machines](configure-endpoints-non-windows.md) +##### [Run a detection test on a newly onboarded machine](run-detection-test.md) +##### [Run simulated attacks on machines](attack-simulations.md) +##### [Configure proxy and Internet connectivity settings](configure-proxy-internet.md) +##### [Troubleshoot onboarding issues](troubleshoot-onboarding.md) +###### [Troubleshoot subscription and portal access issues](troubleshoot-onboarding-error-messages.md) -#### [Windows Defender ATP API](use-apis.md) -##### [Get started with Windows Defender ATP APIs](apis-intro.md) +#### [Microsoft Defender ATP API](use-apis.md) +##### [Get started with Microsoft Defender ATP APIs](apis-intro.md) ###### [Hello World](api-hello-world.md) ###### [Get access with application context](exposed-apis-create-app-webapp.md) ###### [Get access with user context](exposed-apis-create-app-nativeapp.md) @@ -240,65 +240,65 @@ ###### [Advanced Hunting](run-advanced-query-api.md) -###### [Alert](alerts-windows-defender-advanced-threat-protection-new.md) -####### [List alerts](get-alerts-windows-defender-advanced-threat-protection-new.md) -####### [Create alert](create-alert-by-reference-windows-defender-advanced-threat-protection-new.md) -####### [Update Alert](update-alert-windows-defender-advanced-threat-protection-new.md) -####### [Get alert information by ID](get-alert-info-by-id-windows-defender-advanced-threat-protection-new.md) -####### [Get alert related domains information](get-alert-related-domain-info-windows-defender-advanced-threat-protection-new.md) -####### [Get alert related file information](get-alert-related-files-info-windows-defender-advanced-threat-protection-new.md) -####### [Get alert related IPs information](get-alert-related-ip-info-windows-defender-advanced-threat-protection-new.md) -####### [Get alert related machine information](get-alert-related-machine-info-windows-defender-advanced-threat-protection-new.md) -####### [Get alert related user information](get-alert-related-user-info-windows-defender-advanced-threat-protection-new.md) +###### [Alert](alerts.md) +####### [List alerts](get-alerts.md) +####### [Create alert](create-alert-by-reference.md) +####### [Update Alert](update-alert.md) +####### [Get alert information by ID](get-alert-info-by-id.md) +####### [Get alert related domains information](get-alert-related-domain-info.md) +####### [Get alert related file information](get-alert-related-files-info.md) +####### [Get alert related IPs information](get-alert-related-ip-info.md) +####### [Get alert related machine information](get-alert-related-machine-info.md) +####### [Get alert related user information](get-alert-related-user-info.md) -###### [Machine](machine-windows-defender-advanced-threat-protection-new.md) -####### [List machines](get-machines-windows-defender-advanced-threat-protection-new.md) -####### [Get machine by ID](get-machine-by-id-windows-defender-advanced-threat-protection-new.md) -####### [Get machine log on users](get-machine-log-on-users-windows-defender-advanced-threat-protection-new.md) -####### [Get machine related alerts](get-machine-related-alerts-windows-defender-advanced-threat-protection-new.md) -####### [Add or Remove machine tags](add-or-remove-machine-tags-windows-defender-advanced-threat-protection-new.md) -####### [Find machines by IP](find-machines-by-ip-windows-defender-advanced-threat-protection-new.md) +###### [Machine](machine.md) +####### [List machines](get-machines.md) +####### [Get machine by ID](get-machine-by-id.md) +####### [Get machine log on users](get-machine-log-on-users.md) +####### [Get machine related alerts](get-machine-related-alerts.md) +####### [Add or Remove machine tags](add-or-remove-machine-tags.md) +####### [Find machines by IP](find-machines-by-ip.md) -###### [Machine Action](machineaction-windows-defender-advanced-threat-protection-new.md) -####### [List Machine Actions](get-machineactions-collection-windows-defender-advanced-threat-protection-new.md) -####### [Get Machine Action](get-machineaction-object-windows-defender-advanced-threat-protection-new.md) -####### [Collect investigation package](collect-investigation-package-windows-defender-advanced-threat-protection-new.md) -####### [Get investigation package SAS URI](get-package-sas-uri-windows-defender-advanced-threat-protection-new.md) -####### [Isolate machine](isolate-machine-windows-defender-advanced-threat-protection-new.md) -####### [Release machine from isolation](unisolate-machine-windows-defender-advanced-threat-protection-new.md) -####### [Restrict app execution](restrict-code-execution-windows-defender-advanced-threat-protection-new.md) -####### [Remove app restriction](unrestrict-code-execution-windows-defender-advanced-threat-protection-new.md) -####### [Run antivirus scan](run-av-scan-windows-defender-advanced-threat-protection-new.md) -####### [Offboard machine](offboard-machine-api-windows-defender-advanced-threat-protection-new.md) -####### [Stop and quarantine file](stop-and-quarantine-file-windows-defender-advanced-threat-protection-new.md) -####### [Initiate investigation (preview)](initiate-autoir-investigation-windows-defender-advanced-threat-protection-new.md) +###### [Machine Action](machineaction.md) +####### [List Machine Actions](get-machineactions-collection.md) +####### [Get Machine Action](get-machineaction-object.md) +####### [Collect investigation package](collect-investigation-package.md) +####### [Get investigation package SAS URI](get-package-sas-uri.md) +####### [Isolate machine](isolate-machine.md) +####### [Release machine from isolation](unisolate-machine.md) +####### [Restrict app execution](restrict-code-execution.md) +####### [Remove app restriction](unrestrict-code-execution.md) +####### [Run antivirus scan](run-av-scan.md) +####### [Offboard machine](offboard-machine-api.md) +####### [Stop and quarantine file](stop-and-quarantine-file.md) +####### [Initiate investigation (preview)](initiate-autoir-investigation.md) -###### [Indicators (preview)](ti-indicator-windows-defender-advanced-threat-protection-new.md) -####### [Submit Indicator](post-ti-indicator-windows-defender-advanced-threat-protection-new.md) -####### [List Indicators](get-ti-indicators-collection-windows-defender-advanced-threat-protection-new.md) -####### [Delete Indicator](delete-ti-indicator-by-id-windows-defender-advanced-threat-protection-new.md) +###### [Indicators (preview)](ti-indicator.md) +####### [Submit Indicator](post-ti-indicator.md) +####### [List Indicators](get-ti-indicators-collection.md) +####### [Delete Indicator](delete-ti-indicator-by-id.md) ###### Domain -####### [Get domain related alerts](get-domain-related-alerts-windows-defender-advanced-threat-protection-new.md) -####### [Get domain related machines](get-domain-related-machines-windows-defender-advanced-threat-protection-new.md) -####### [Get domain statistics](get-domain-statistics-windows-defender-advanced-threat-protection-new.md) -####### [Is domain seen in organization](is-domain-seen-in-org-windows-defender-advanced-threat-protection-new.md) +####### [Get domain related alerts](get-domain-related-alerts.md) +####### [Get domain related machines](get-domain-related-machines.md) +####### [Get domain statistics](get-domain-statistics.md) +####### [Is domain seen in organization](is-domain-seen-in-org.md) -###### [File](files-windows-defender-advanced-threat-protection-new.md) -####### [Get file information](get-file-information-windows-defender-advanced-threat-protection-new.md) -####### [Get file related alerts](get-file-related-alerts-windows-defender-advanced-threat-protection-new.md) -####### [Get file related machines](get-file-related-machines-windows-defender-advanced-threat-protection-new.md) -####### [Get file statistics](get-file-statistics-windows-defender-advanced-threat-protection-new.md) +###### [File](files.md) +####### [Get file information](get-file-information.md) +####### [Get file related alerts](get-file-related-alerts.md) +####### [Get file related machines](get-file-related-machines.md) +####### [Get file statistics](get-file-statistics.md) ###### IP -####### [Get IP related alerts](get-ip-related-alerts-windows-defender-advanced-threat-protection-new.md) -####### [Get IP related machines](get-ip-related-machines-windows-defender-advanced-threat-protection-new.md) -####### [Get IP statistics](get-ip-statistics-windows-defender-advanced-threat-protection-new.md) -####### [Is IP seen in organization](is-ip-seen-org-windows-defender-advanced-threat-protection-new.md) +####### [Get IP related alerts](get-ip-related-alerts.md) +####### [Get IP related machines](get-ip-related-machines.md) +####### [Get IP statistics](get-ip-statistics.md) +####### [Is IP seen in organization](is-ip-seen-org.md) -###### [User](user-windows-defender-advanced-threat-protection-new.md) -####### [Get user related alerts](get-user-related-alerts-windows-defender-advanced-threat-protection-new.md) -####### [Get user related machines](get-user-related-machines-windows-defender-advanced-threat-protection-new.md) +###### [User](user.md) +####### [Get user related alerts](get-user-related-alerts.md) +####### [Get user related machines](get-user-related-machines.md) ##### How to use APIs - Samples ###### Advanced Hunting API @@ -312,36 +312,36 @@ #### API for custom alerts -##### [Enable the custom threat intelligence application](enable-custom-ti-windows-defender-advanced-threat-protection.md) -##### [Use the threat intelligence API to create custom alerts](use-custom-ti-windows-defender-advanced-threat-protection.md) -##### [Create custom threat intelligence alerts](custom-ti-api-windows-defender-advanced-threat-protection.md) -##### [PowerShell code examples](powershell-example-code-windows-defender-advanced-threat-protection.md) -##### [Python code examples](python-example-code-windows-defender-advanced-threat-protection.md) -##### [Experiment with custom threat intelligence alerts](experiment-custom-ti-windows-defender-advanced-threat-protection.md) -##### [Troubleshoot custom threat intelligence issues](troubleshoot-custom-ti-windows-defender-advanced-threat-protection.md) +##### [Enable the custom threat intelligence application](enable-custom-ti.md) +##### [Use the threat intelligence API to create custom alerts](use-custom-ti.md) +##### [Create custom threat intelligence alerts](custom-ti-api.md) +##### [PowerShell code examples](powershell-example-code.md) +##### [Python code examples](python-example-code.md) +##### [Experiment with custom threat intelligence alerts](experiment-custom-ti.md) +##### [Troubleshoot custom threat intelligence issues](troubleshoot-custom-ti.md) -#### [Pull alerts to your SIEM tools](configure-siem-windows-defender-advanced-threat-protection.md) -##### [Enable SIEM integration](enable-siem-integration-windows-defender-advanced-threat-protection.md) -##### [Configure Splunk to pull alerts](configure-splunk-windows-defender-advanced-threat-protection.md) -##### [Configure HP ArcSight to pull alerts](configure-arcsight-windows-defender-advanced-threat-protection.md) -##### [Windows Defender ATP SIEM alert API fields](api-portal-mapping-windows-defender-advanced-threat-protection.md) -##### [Pull alerts using SIEM REST API](pull-alerts-using-rest-api-windows-defender-advanced-threat-protection.md) -##### [Troubleshoot SIEM tool integration issues](troubleshoot-siem-windows-defender-advanced-threat-protection.md) +#### [Pull alerts to your SIEM tools](configure-siem.md) +##### [Enable SIEM integration](enable-siem-integration.md) +##### [Configure Splunk to pull alerts](configure-splunk.md) +##### [Configure HP ArcSight to pull alerts](configure-arcsight.md) +##### [Microsoft Defender ATP SIEM alert API fields](api-portal-mapping.md) +##### [Pull alerts using SIEM REST API](pull-alerts-using-rest-api.md) +##### [Troubleshoot SIEM tool integration issues](troubleshoot-siem.md) #### Reporting -##### [Create and build Power BI reports using Windows Defender ATP data](powerbi-reports-windows-defender-advanced-threat-protection.md) -##### [Threat protection reports](threat-protection-reports-windows-defender-advanced-threat-protection.md) -##### [Machine health and compliance reports](machine-reports-windows-defender-advanced-threat-protection.md) +##### [Create and build Power BI reports using Microsoft Defender ATP data](powerbi-reports.md) +##### [Threat protection reports](threat-protection-reports.md) +##### [Machine health and compliance reports](machine-reports.md) #### Role-based access control -##### [Manage portal access using RBAC](rbac-windows-defender-advanced-threat-protection.md) -###### [Create and manage roles](user-roles-windows-defender-advanced-threat-protection.md) -###### [Create and manage machine groups](machine-groups-windows-defender-advanced-threat-protection.md) -####### [Create and manage machine tags](machine-tags-windows-defender-advanced-threat-protection.md) +##### [Manage portal access using RBAC](rbac.md) +###### [Create and manage roles](user-roles.md) +###### [Create and manage machine groups](machine-groups.md) +####### [Create and manage machine tags](machine-tags.md) -#### [Configure managed security service provider (MSSP) support](configure-mssp-support-windows-defender-advanced-threat-protection.md) +#### [Configure managed security service provider (MSSP) support](configure-mssp-support.md) @@ -349,56 +349,56 @@ ### [Configure and manage Microsoft Threat Experts capabilities](configure-microsoft-threat-experts.md) ### Configure Microsoft Threat Protection integration -#### [Configure conditional access](configure-conditional-access-windows-defender-advanced-threat-protection.md) +#### [Configure conditional access](configure-conditional-access.md) #### [Configure Microsoft Cloud App Security in Windows](microsoft-cloud-app-security-config.md) ####[Configure information protection in Windows](information-protection-in-windows-config.md) -### [Configure Windows Defender Security Center settings](preferences-setup-windows-defender-advanced-threat-protection.md) +### [Configure Windows Defender Security Center settings](preferences-setup.md) #### General -##### [Update data retention settings](data-retention-settings-windows-defender-advanced-threat-protection.md) -##### [Configure alert notifications](configure-email-notifications-windows-defender-advanced-threat-protection.md) -##### [Enable and create Power BI reports using Windows Security app data](powerbi-reports-windows-defender-advanced-threat-protection.md) -##### [Enable Secure score security controls](enable-secure-score-windows-defender-advanced-threat-protection.md) -##### [Configure advanced features](advanced-features-windows-defender-advanced-threat-protection.md) +##### [Update data retention settings](data-retention-settings.md) +##### [Configure alert notifications](configure-email-notifications.md) +##### [Enable and create Power BI reports using Windows Security app data](powerbi-reports.md) +##### [Enable Secure score security controls](enable-secure-score.md) +##### [Configure advanced features](advanced-features.md) #### Permissions -##### [Use basic permissions to access the portal](basic-permissions-windows-defender-advanced-threat-protection.md) -##### [Manage portal access using RBAC](rbac-windows-defender-advanced-threat-protection.md) -###### [Create and manage roles](user-roles-windows-defender-advanced-threat-protection.md) -###### [Create and manage machine groups](machine-groups-windows-defender-advanced-threat-protection.md) -####### [Create and manage machine tags](machine-tags-windows-defender-advanced-threat-protection.md) +##### [Use basic permissions to access the portal](basic-permissions.md) +##### [Manage portal access using RBAC](rbac.md) +###### [Create and manage roles](user-roles.md) +###### [Create and manage machine groups](machine-groups.md) +####### [Create and manage machine tags](machine-tags.md) #### APIs -##### [Enable Threat intel](enable-custom-ti-windows-defender-advanced-threat-protection.md) -##### [Enable SIEM integration](enable-siem-integration-windows-defender-advanced-threat-protection.md) +##### [Enable Threat intel](enable-custom-ti.md) +##### [Enable SIEM integration](enable-siem-integration.md) ####Rules -##### [Manage suppression rules](manage-suppression-rules-windows-defender-advanced-threat-protection.md) -##### [Manage automation allowed/blocked lists](manage-automation-allowed-blocked-list-windows-defender-advanced-threat-protection.md) -##### [Manage allowed/blocked lists](manage-allowed-blocked-list-windows-defender-advanced-threat-protection.md) -##### [Manage automation file uploads](manage-automation-file-uploads-windows-defender-advanced-threat-protection.md) -##### [Manage automation folder exclusions](manage-automation-folder-exclusions-windows-defender-advanced-threat-protection.md) +##### [Manage suppression rules](manage-suppression-rules.md) +##### [Manage automation allowed/blocked lists](manage-automation-allowed-blocked-list.md) +##### [Manage allowed/blocked lists](manage-allowed-blocked-list.md) +##### [Manage automation file uploads](manage-automation-file-uploads.md) +##### [Manage automation folder exclusions](manage-automation-folder-exclusions.md) ####Machine management -##### [Onboarding machines](onboard-configure-windows-defender-advanced-threat-protection.md) -##### [Offboarding machines](offboard-machines-windows-defender-advanced-threat-protection.md) +##### [Onboarding machines](onboard-configure.md) +##### [Offboarding machines](offboard-machines.md) -#### [Configure Windows Security app time zone settings](time-settings-windows-defender-advanced-threat-protection.md) +#### [Configure Windows Security app time zone settings](time-settings.md) -## [Troubleshoot Windows Defender ATP](troubleshoot-wdatp.md) +## [Troubleshoot Microsoft Defender ATP](troubleshoot-overview.md) ###Troubleshoot sensor state -#### [Check sensor state](check-sensor-status-windows-defender-advanced-threat-protection.md) -#### [Fix unhealthy sensors](fix-unhealhty-sensors-windows-defender-advanced-threat-protection.md) -#### [Inactive machines](fix-unhealhty-sensors-windows-defender-advanced-threat-protection.md#inactive-machines) -#### [Misconfigured machines](fix-unhealhty-sensors-windows-defender-advanced-threat-protection.md#misconfigured-machines) -#### [Review sensor events and errors on machines with Event Viewer](event-error-codes-windows-defender-advanced-threat-protection.md) +#### [Check sensor state](check-sensor-status.md) +#### [Fix unhealthy sensors](fix-unhealhty-sensors.md) +#### [Inactive machines](fix-unhealhty-sensors.md#inactive-machines) +#### [Misconfigured machines](fix-unhealhty-sensors.md#misconfigured-machines) +#### [Review sensor events and errors on machines with Event Viewer](event-error-codes.md) -### [Troubleshoot Windows Defender ATP service issues](troubleshoot-windows-defender-advanced-threat-protection.md) -#### [Check service health](service-status-windows-defender-advanced-threat-protection.md) +### [Troubleshoot Microsoft Defender ATP service issues](troubleshoot.md) +#### [Check service health](service-status.md) ###Troubleshoot attack surface reduction #### [Network protection](../windows-defender-exploit-guard/troubleshoot-np.md) diff --git a/windows/security/threat-protection/microsoft-defender-atp/add-or-remove-machine-tags.md b/windows/security/threat-protection/microsoft-defender-atp/add-or-remove-machine-tags.md index 5ab62122e6..106306a8c5 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/add-or-remove-machine-tags.md +++ b/windows/security/threat-protection/microsoft-defender-atp/add-or-remove-machine-tags.md @@ -20,14 +20,14 @@ ms.topic: article **Applies to:** -- Windows Defender Advanced Threat Protection (Windows Defender ATP) +- Microsoft Defender Advanced Threat Protection (Microsoft Defender ATP) [!include[Prerelease information](prerelease.md)] - Adds or remove tag to a specific machine. ## Permissions -One of the following permissions is required to call this API. To learn more, including how to choose permissions, see [Use Windows Defender ATP APIs](apis-intro.md) +One of the following permissions is required to call this API. To learn more, including how to choose permissions, see [Use Microsoft Defender ATP APIs](apis-intro.md) Permission type | Permission | Permission display name :---|:---|:--- diff --git a/windows/security/threat-protection/microsoft-defender-atp/advanced-features.md b/windows/security/threat-protection/microsoft-defender-atp/advanced-features.md index df2d4cbab8..98b6b36f1f 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/advanced-features.md +++ b/windows/security/threat-protection/microsoft-defender-atp/advanced-features.md @@ -1,6 +1,6 @@ --- -title: Configure advanced features in Windows Defender ATP -description: Turn on advanced features such as block file in Windows Defender Advanced Threat Protection. +title: Configure advanced features in Microsoft Defender ATP +description: Turn on advanced features such as block file in Microsoft Defender Advanced Threat Protection. keywords: advanced features, settings, block file, automated investigation, auto-resolve, skype, azure atp, office 365, azure information protection, intune search.product: eADQiWindows 10XVcnh search.appverid: met150 @@ -17,14 +17,14 @@ ms.collection: M365-security-compliance ms.topic: article --- -# Configure advanced features in Windows Defender ATP +# Configure advanced features in Microsoft Defender ATP **Applies to:** -- [Windows Defender Advanced Threat Protection (Windows Defender ATP)](https://go.microsoft.com/fwlink/p/?linkid=2069559) +- [Microsoft Defender Advanced Threat Protection (Microsoft Defender ATP)](https://go.microsoft.com/fwlink/p/?linkid=2069559) ->Want to experience Windows Defender ATP? [Sign up for a free trial.](https://www.microsoft.com/en-us/WindowsForBusiness/windows-atp?ocid=docs-wdatp-advancedfeats-abovefoldlink) +>Want to experience Microsoft Defender ATP? [Sign up for a free trial.](https://www.microsoft.com/en-us/WindowsForBusiness/windows-atp?ocid=docs-wdatp-advancedfeats-abovefoldlink) -Depending on the Microsoft security products that you use, some advanced features might be available for you to integrate Windows Defender ATP with. +Depending on the Microsoft security products that you use, some advanced features might be available for you to integrate Microsoft Defender ATP with. Use the following advanced features to get better protected from potentially malicious files and gain better insight during security investigations: @@ -69,7 +69,7 @@ The integration with Azure Advanced Threat Protection allows you to pivot direct >[!NOTE] >You'll need to have the appropriate license to enable this feature. -### Enable the Windows Defender ATP integration from the Azure ATP portal +### Enable the Microsoft Defender ATP integration from the Azure ATP portal To receive contextual machine integration in Azure ATP, you'll also need to enable the feature in the Azure ATP portal. 1. Login to the [Azure portal](https://portal.atp.azure.com/) with a Global Administrator or Security Administrator role. @@ -88,10 +88,10 @@ When you enable this feature, you'll be able to incorporate data from Office 365 >[!NOTE] >You'll need to have the appropriate license to enable this feature. -To receive contextual machine integration in Office 365 Threat Intelligence, you'll need to enable the Windows Defender ATP settings in the Security & Compliance dashboard. For more information, see [Office 365 Threat Intelligence overview](https://support.office.com/en-us/article/Office-365-Threat-Intelligence-overview-32405DA5-BEE1-4A4B-82E5-8399DF94C512). +To receive contextual machine integration in Office 365 Threat Intelligence, you'll need to enable the Microsoft Defender ATP settings in the Security & Compliance dashboard. For more information, see [Office 365 Threat Intelligence overview](https://support.office.com/en-us/article/Office-365-Threat-Intelligence-overview-32405DA5-BEE1-4A4B-82E5-8399DF94C512). ## Microsoft Threat Experts -This feature is currently on public preview. When you enable this feature, you'll receive targeted attack notifications from Microsoft Threat Experts through your Windows Defender ATP portal's alerts dashboard and via email if you configure it. +This feature is currently on public preview. When you enable this feature, you'll receive targeted attack notifications from Microsoft Threat Experts through your Microsoft Defender ATP portal's alerts dashboard and via email if you configure it. >[!NOTE] >This feature will be available with an E5 license for [Enterprise Mobility + Security](https://www.microsoft.com/cloud-platform/enterprise-mobility-security) on machines running Windows 10 version 1809 or later. @@ -99,7 +99,7 @@ This feature is currently on public preview. When you enable this feature, you'l ## Microsoft Cloud App Security -Enabling this setting forwards Windows Defender ATP signals to Microsoft Cloud App Security to provide deeper visibility into cloud application usage. Forwarded data is stored and processed in the same location as your Cloud App Security data. +Enabling this setting forwards Microsoft Defender ATP signals to Microsoft Cloud App Security to provide deeper visibility into cloud application usage. Forwarded data is stored and processed in the same location as your Cloud App Security data. >[!NOTE] >This feature is available with an E5 license for [Enterprise Mobility + Security](https://www.microsoft.com/cloud-platform/enterprise-mobility-security) on machines running Windows 10 version 1809 or later. @@ -111,14 +111,14 @@ Turning this setting on forwards signals to Azure Information Protection, giving ## Microsoft Intune connection This feature is only available if you have an active Microsoft Intune (Intune) license. -When you enable this feature, you'll be able to share Windows Defender ATP device information to Intune and enhance policy enforcement. +When you enable this feature, you'll be able to share Microsoft Defender ATP device information to Intune and enhance policy enforcement. >[!NOTE] ->You'll need to enable the integration on both Intune and Windows Defender ATP to use this feature. +>You'll need to enable the integration on both Intune and Microsoft Defender ATP to use this feature. ## Preview features -Learn about new features in the Windows Defender ATP preview release and be among the first to try upcoming features by turning on the preview experience. +Learn about new features in the Microsoft Defender ATP preview release and be among the first to try upcoming features by turning on the preview experience. You'll have access to upcoming features which you can provide feedback on to help improve the overall experience before features are generally available. @@ -130,5 +130,5 @@ You'll have access to upcoming features which you can provide feedback on to hel ## Related topics - [Update data retention settings](data-retention-settings-windows-defender-advanced-threat-protection.md) - [Configure alert notifications](configure-email-notifications-windows-defender-advanced-threat-protection.md) -- [Enable and create Power BI reports using Windows Defender ATP data](powerbi-reports-windows-defender-advanced-threat-protection.md) +- [Enable and create Power BI reports using Microsoft Defender ATP data](powerbi-reports-windows-defender-advanced-threat-protection.md) - [Enable Secure Score security controls](enable-secure-score-windows-defender-advanced-threat-protection.md) diff --git a/windows/security/threat-protection/microsoft-defender-atp/advanced-hunting-best-practices.md b/windows/security/threat-protection/microsoft-defender-atp/advanced-hunting-best-practices.md index 6c0c82d32d..34401ec9b1 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/advanced-hunting-best-practices.md +++ b/windows/security/threat-protection/microsoft-defender-atp/advanced-hunting-best-practices.md @@ -1,5 +1,5 @@ --- -title: Advanced hunting best practices in Windows Defender ATP +title: Advanced hunting best practices in Microsoft Defender ATP description: Learn about Advanced hunting best practices such as what filters and keywords to use to effectively query data. keywords: advanced hunting, best practices, keyword, filters, atp query, query atp data, intellisense, atp telemetry, events, events telemetry, azure log analytics search.product: eADQiWindows 10XVcnh @@ -18,16 +18,16 @@ ms.topic: conceptual ms.date: 04/24/2018 --- -# Advanced hunting query best practices Windows Defender ATP +# Advanced hunting query best practices Microsoft Defender ATP **Applies to:** -- [Windows Defender Advanced Threat Protection (Windows Defender ATP)](https://go.microsoft.com/fwlink/p/?linkid=2069559) +- [Microsoft Defender Advanced Threat Protection (Microsoft Defender ATP)](https://go.microsoft.com/fwlink/p/?linkid=2069559) ->Want to experience Windows Defender ATP? [Sign up for a free trial.](https://www.microsoft.com/en-us/WindowsForBusiness/windows-atp?ocid=docs-wdatp-bestpractices-abovefoldlink) +>Want to experience Microsoft Defender ATP? [Sign up for a free trial.](https://www.microsoft.com/en-us/WindowsForBusiness/windows-atp?ocid=docs-wdatp-bestpractices-abovefoldlink) ## Performance best practices The following best practices serve as a guideline of query performance best practices and for you to get faster results and be able to run complex queries. @@ -42,7 +42,7 @@ The following best practices serve as a guideline of query performance best prac ### Unique Process IDs Process IDs are recycled in Windows and reused for new processes and therefore can't serve as a unique identifier for a specific process. -To address this issue, Windows Defender ATP created the time process. To get a unique identifier for a process on a specific machine, use the process ID together with the process creation time. +To address this issue, Microsoft Defender ATP created the time process. To get a unique identifier for a process on a specific machine, use the process ID together with the process creation time. So, when you join data based on a specific process or summarize data for each process, you'll need to use a machine identifier (either MachineId or ComputerName), a process ID (ProcessId or InitiatingProcessId) and the process creation time (ProcessCreationTime or InitiatingProcessCreationTime) @@ -92,7 +92,7 @@ ProcessCreationEvents | where CanonicalCommandLine contains "stop" and CanonicalCommandLine contains "MpsSvc" ``` ->Want to experience Windows Defender ATP? [Sign up for a free trial.](https://www.microsoft.com/en-us/WindowsForBusiness/windows-atp?ocid=docs-wdatp-bestpractices-belowfoldlink) +>Want to experience Microsoft Defender ATP? [Sign up for a free trial.](https://www.microsoft.com/en-us/WindowsForBusiness/windows-atp?ocid=docs-wdatp-bestpractices-belowfoldlink) diff --git a/windows/security/threat-protection/microsoft-defender-atp/advanced-hunting-reference.md b/windows/security/threat-protection/microsoft-defender-atp/advanced-hunting-reference.md index 467af897d1..fe8f545929 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/advanced-hunting-reference.md +++ b/windows/security/threat-protection/microsoft-defender-atp/advanced-hunting-reference.md @@ -1,5 +1,5 @@ --- -title: Advanced hunting reference in Windows Defender ATP +title: Advanced hunting reference in Microsoft Defender ATP description: Learn about Advanced hunting table reference such as column name, data type, and description keywords: advanced hunting, atp query, query atp data, intellisense, atp telemetry, events, events telemetry, azure log analytics, column name, data type, description search.product: eADQiWindows 10XVcnh @@ -18,16 +18,16 @@ ms.topic: article ms.date: 06/01/2018 --- -# Advanced hunting reference in Windows Defender ATP +# Advanced hunting reference in Microsoft Defender ATP **Applies to:** -- [Windows Defender Advanced Threat Protection (Windows Defender ATP)](https://go.microsoft.com/fwlink/p/?linkid=2069559) +- [Microsoft Defender Advanced Threat Protection (Microsoft Defender ATP)](https://go.microsoft.com/fwlink/p/?linkid=2069559) ->Want to experience Windows Defender ATP? [Sign up for a free trial.](https://www.microsoft.com/en-us/WindowsForBusiness/windows-atp?ocid=docs-wdatp-advancedhuntingref-abovefoldlink) +>Want to experience Microsoft Defender ATP? [Sign up for a free trial.](https://www.microsoft.com/en-us/WindowsForBusiness/windows-atp?ocid=docs-wdatp-advancedhuntingref-abovefoldlink) ## Advanced hunting column reference @@ -99,7 +99,7 @@ To effectively build queries that span multiple tables, you need to understand t | ProcessIntegrityLevel | string | Integrity level of the newly created process. Windows assigns integrity levels to processes based on certain characteristics, such as if they were launched from an internet downloaded. These integrity levels influence permissions to resources. | | ProcessTokenElevation | string | Token type indicating the presence or absence of User Access Control (UAC) privilege elevation applied to the newly created process | | Protocol | string | IP protocol used, whether TCP or UDP | -| PublicIP | string | Public IP address used by the onboarded machine to connect to the Windows Defender ATP service. This could be the IP address of the machine itself, a NAT device, or a proxy. | +| PublicIP | string | Public IP address used by the onboarded machine to connect to the Microsoft Defender ATP service. This could be the IP address of the machine itself, a NAT device, or a proxy. | | RegistryKey | string | Registry key that the recorded action was applied to | | RegistryValueData | string | Data of the registry value that the recorded action was applied to | | RegistryValueName | string | Name of the registry value that the recorded action was applied to | @@ -115,7 +115,7 @@ To effectively build queries that span multiple tables, you need to understand t | Table | string | Table that contains the details of the event | | TunnelingType | string | Tunneling protocol, if the interface is used for this purpose, for example 6to4, Teredo, ISATAP, PPTP, SSTP, and SSH | ->Want to experience Windows Defender ATP? [Sign up for a free trial.](https://www.microsoft.com/en-us/WindowsForBusiness/windows-atp?ocid=docs-wdatp-advancedhuntingref-belowfoldlink) +>Want to experience Microsoft Defender ATP? [Sign up for a free trial.](https://www.microsoft.com/en-us/WindowsForBusiness/windows-atp?ocid=docs-wdatp-advancedhuntingref-belowfoldlink) ## Related topic - [Query data using Advanced hunting](advanced-hunting-windows-defender-advanced-threat-protection.md) diff --git a/windows/security/threat-protection/microsoft-defender-atp/advanced-hunting.md b/windows/security/threat-protection/microsoft-defender-atp/advanced-hunting.md index 2665b31d0e..4d711a8fff 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/advanced-hunting.md +++ b/windows/security/threat-protection/microsoft-defender-atp/advanced-hunting.md @@ -1,6 +1,6 @@ --- -title: Query data using Advanced hunting in Windows Defender ATP -description: Learn about Advanced hunting in Windows Defender ATP and how to query ATP data. +title: Query data using Advanced hunting in Microsoft Defender ATP +description: Learn about Advanced hunting in Microsoft Defender ATP and how to query ATP data. keywords: advanced hunting, atp query, query atp data, intellisense, atp telemetry, events, events telemetry, azure log analytics search.product: eADQiWindows 10XVcnh search.appverid: met150 @@ -18,9 +18,9 @@ ms.topic: article ms.date: 08/15/2018 --- -# Query data using Advanced hunting in Windows Defender ATP +# Query data using Advanced hunting in Microsoft Defender ATP ->Want to experience Windows Defender ATP? [Sign up for a free trial.](https://www.microsoft.com/en-us/WindowsForBusiness/windows-atp?ocid=docs-wdatp-advancedhunting-abovefoldlink) +>Want to experience Microsoft Defender ATP? [Sign up for a free trial.](https://www.microsoft.com/en-us/WindowsForBusiness/windows-atp?ocid=docs-wdatp-advancedhunting-abovefoldlink) To get you started in querying your data, you can use the basic or Advanced query examples that have some preloaded queries for you to understand the basic query syntax. @@ -33,7 +33,7 @@ A typical query starts with a table name followed by a series of operators separ In the following example, we start with the table name **ProcessCreationEvents** and add piped elements as needed. -![Image of Windows Defender ATP Advanced hunting query](images/advanced-hunting-query-example.png) +![Image of Microsoft Defender ATP Advanced hunting query](images/advanced-hunting-query-example.png) First, we define a time filter to review only records from the previous seven days. @@ -127,7 +127,7 @@ The result set has several capabilities to provide you with effective investigat - Columns that return entity-related objects, such as Machine name, Machine ID, File name, SHA1, User, IP, and URL, are linked to their entity pages in Windows Defender Security Center. - You can right-click on a cell in the result set and add a filter to your written query. The current filtering options are **include**, **exclude** or **advanced filter**, which provides additional filtering options on the cell value. These cell values are part of the row set. -![Image of Windows Defender ATP Advanced hunting result set](images/atp-advanced-hunting-results-filter.png) +![Image of Microsoft Defender ATP Advanced hunting result set](images/atp-advanced-hunting-results-filter.png) ## Filter results in Advanced hunting In Advanced hunting, you can use the advanced filter on the output result set of the query. @@ -146,7 +146,7 @@ The filter selections will resolve as an additional query term and the results w Check out the [Advanced hunting repository](https://github.com/Microsoft/WindowsDefenderATP-Hunting-Queries). Contribute and use example queries shared by our customers. ->Want to experience Windows Defender ATP? [Sign up for a free trial.](https://www.microsoft.com/en-us/WindowsForBusiness/windows-atp?ocid=docs-wdatp-advancedhunting-belowfoldlink) +>Want to experience Microsoft Defender ATP? [Sign up for a free trial.](https://www.microsoft.com/en-us/WindowsForBusiness/windows-atp?ocid=docs-wdatp-advancedhunting-belowfoldlink) ## Related topic - [Advanced hunting reference](advanced-hunting-reference-windows-defender-advanced-threat-protection.md) diff --git a/windows/security/threat-protection/microsoft-defender-atp/alerts-queue.md b/windows/security/threat-protection/microsoft-defender-atp/alerts-queue.md index fb04442da2..86249293b6 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/alerts-queue.md +++ b/windows/security/threat-protection/microsoft-defender-atp/alerts-queue.md @@ -1,6 +1,6 @@ --- -title: View and organize the Windows Defender ATP Alerts queue -description: Learn about how the Windows Defender ATP alerts queues work, and how to sort and filter lists of alerts. +title: View and organize the Microsoft Defender ATP Alerts queue +description: Learn about how the Microsoft Defender ATP alerts queues work, and how to sort and filter lists of alerts. keywords: alerts, queues, alerts queue, sort, order, filter, manage alerts, new, in progress, resolved, newest, time in queue, severity, time period, microsoft threat experts alerts search.product: eADQiWindows 10XVcnh search.appverid: met150 @@ -18,14 +18,14 @@ ms.topic: article ms.date: 04/24/2018 --- -# View and organize the Windows Defender Advanced Threat Protection Alerts queue +# View and organize the Microsoft Defender Advanced Threat Protection Alerts queue **Applies to:** -- [Windows Defender Advanced Threat Protection (Windows Defender ATP)](https://go.microsoft.com/fwlink/p/?linkid=2069559) +- [Microsoft Defender Advanced Threat Protection (Microsoft Defender ATP)](https://go.microsoft.com/fwlink/p/?linkid=2069559) ->Want to experience Windows Defender ATP? [Sign up for a free trial.](https://www.microsoft.com/en-us/WindowsForBusiness/windows-atp?ocid=docs-wdatp-alertsq-abovefoldlink) +>Want to experience Microsoft Defender ATP? [Sign up for a free trial.](https://www.microsoft.com/en-us/WindowsForBusiness/windows-atp?ocid=docs-wdatp-alertsq-abovefoldlink) The **Alerts queue** shows a list of alerts that were flagged from machines in your network. By default, the queue displays alerts seen in the last 30 days in a grouped view, with the most recent alerts showing at the top of the list, helping you see the most recent alerts first. @@ -55,14 +55,14 @@ Informational
      (Grey) | Informational alerts are those that might not be con #### Understanding alert severity -It is important to understand that the Windows Defender Antivirus (Windows Defender AV) and Windows Defender ATP alert severities are different because they represent different scopes. +It is important to understand that the Windows Defender Antivirus (Windows Defender AV) and Microsoft Defender ATP alert severities are different because they represent different scopes. The Windows Defender AV threat severity represents the absolute severity of the detected threat (malware), and is assigned based on the potential risk to the individual machine, if infected. -The Windows Defender ATP alert severity represents the severity of the detected behavior, the actual risk to the machine but more importantly the potential risk to the organization. +The Microsoft Defender ATP alert severity represents the severity of the detected behavior, the actual risk to the machine but more importantly the potential risk to the organization. So, for example: -- The severity of a Windows Defender ATP alert about a Windows Defender AV detected threat that was completely prevented and did not infect the machine is categorized as "Informational" because there was no actual damage incurred. +- The severity of a Microsoft Defender ATP alert about a Windows Defender AV detected threat that was completely prevented and did not infect the machine is categorized as "Informational" because there was no actual damage incurred. - An alert about a commercial malware was detected while executing, but blocked and remediated by Windows Defender AV, is categorized as "Low" because it may have caused some damage to the individual machine but poses no organizational threat. - An alert about malware detected while executing which can pose a threat not only to the individual machine but to the organization, regardless if it was eventually blocked, may be ranked as "Medium" or "High". - Suspicious behavioral alerts which were not blocked or remediated will be ranked "Low", "Medium" or "High" following the same organizational threat considerations. @@ -94,11 +94,11 @@ Use this filter to focus on alerts that are related to high profile threats. You ## Related topics -- [Manage Windows Defender Advanced Threat Protection alerts](manage-alerts-windows-defender-advanced-threat-protection.md) -- [Investigate Windows Defender Advanced Threat Protection alerts](investigate-alerts-windows-defender-advanced-threat-protection.md) -- [Investigate a file associated with a Windows Defender ATP alert](investigate-files-windows-defender-advanced-threat-protection.md) -- [Investigate machines in the Windows Defender ATP Machines list](investigate-machines-windows-defender-advanced-threat-protection.md) -- [Investigate an IP address associated with a Windows Defender ATP alert](investigate-ip-windows-defender-advanced-threat-protection.md) -- [Investigate a domain associated with a Windows Defender ATP alert](investigate-domain-windows-defender-advanced-threat-protection.md) -- [Investigate a user account in Windows Defender ATP](investigate-user-windows-defender-advanced-threat-protection.md) +- [Manage Microsoft Defender Advanced Threat Protection alerts](manage-alerts-windows-defender-advanced-threat-protection.md) +- [Investigate Microsoft Defender Advanced Threat Protection alerts](investigate-alerts-windows-defender-advanced-threat-protection.md) +- [Investigate a file associated with a Microsoft Defender ATP alert](investigate-files-windows-defender-advanced-threat-protection.md) +- [Investigate machines in the Microsoft Defender ATP Machines list](investigate-machines-windows-defender-advanced-threat-protection.md) +- [Investigate an IP address associated with a Microsoft Defender ATP alert](investigate-ip-windows-defender-advanced-threat-protection.md) +- [Investigate a domain associated with a Microsoft Defender ATP alert](investigate-domain-windows-defender-advanced-threat-protection.md) +- [Investigate a user account in Microsoft Defender ATP](investigate-user-windows-defender-advanced-threat-protection.md) diff --git a/windows/security/threat-protection/microsoft-defender-atp/alerts.md b/windows/security/threat-protection/microsoft-defender-atp/alerts.md index da5c717e31..d2fdf0726f 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/alerts.md +++ b/windows/security/threat-protection/microsoft-defender-atp/alerts.md @@ -18,11 +18,11 @@ ms.topic: article # Alert resource type **Applies to:** -- [Windows Defender Advanced Threat Protection (Windows Defender ATP)](https://go.microsoft.com/fwlink/p/?linkid=2069559) +- [Microsoft Defender Advanced Threat Protection (Microsoft Defender ATP)](https://go.microsoft.com/fwlink/p/?linkid=2069559) [!include[Prereleaseinformation](prerelease.md)] -Represents an alert entity in Windows Defender ATP. +Represents an alert entity in Microsoft Defender ATP. # Methods Method|Return Type |Description diff --git a/windows/security/threat-protection/microsoft-defender-atp/api-hello-world.md b/windows/security/threat-protection/microsoft-defender-atp/api-hello-world.md index 9ee1dafbb9..a1fdedb347 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/api-hello-world.md +++ b/windows/security/threat-protection/microsoft-defender-atp/api-hello-world.md @@ -16,12 +16,12 @@ ms.collection: M365-security-compliance ms.topic: article --- -# Windows Defender ATP API - Hello World +# Microsoft Defender ATP API - Hello World **Applies to:** -- [Windows Defender Advanced Threat Protection (Windows Defender ATP)](https://go.microsoft.com/fwlink/p/?linkid=2069559) +- [Microsoft Defender Advanced Threat Protection (Microsoft Defender ATP)](https://go.microsoft.com/fwlink/p/?linkid=2069559) -> Want to experience Windows Defender ATP? [Sign up for a free trial.](https://www.microsoft.com/WindowsForBusiness/windows-atp?ocid=docs-wdatp-exposedapis-abovefoldlink) +> Want to experience Microsoft Defender ATP? [Sign up for a free trial.](https://www.microsoft.com/WindowsForBusiness/windows-atp?ocid=docs-wdatp-exposedapis-abovefoldlink) ## Get Alerts using a simple PowerShell script @@ -50,7 +50,7 @@ For the App registration stage, you must have a Global administrator role in you ![Image of Create application window](images/webapp-create.png) -4. Allow your App to access Windows Defender ATP and assign it 'Read all alerts' permission: +4. Allow your App to access Microsoft Defender ATP and assign it 'Read all alerts' permission: - Click **Settings** > **Required permissions** > **Add**. @@ -184,6 +184,6 @@ You’re all done! You have just successfully: ## Related topic -- [Windows Defender ATP APIs](exposed-apis-list.md) -- [Access Windows Defender ATP with application context](exposed-apis-create-app-webapp.md) -- [Access Windows Defender ATP with user context](exposed-apis-create-app-nativeapp.md) \ No newline at end of file +- [Microsoft Defender ATP APIs](exposed-apis-list.md) +- [Access Microsoft Defender ATP with application context](exposed-apis-create-app-webapp.md) +- [Access Microsoft Defender ATP with user context](exposed-apis-create-app-nativeapp.md) \ No newline at end of file diff --git a/windows/security/threat-protection/microsoft-defender-atp/api-portal-mapping.md b/windows/security/threat-protection/microsoft-defender-atp/api-portal-mapping.md index 4520b214d1..aeb28a277e 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/api-portal-mapping.md +++ b/windows/security/threat-protection/microsoft-defender-atp/api-portal-mapping.md @@ -1,5 +1,5 @@ --- -title: Windows Defender ATP alert API fields +title: Microsoft Defender ATP alert API fields description: Understand how the alert API fields map to the values in Windows Defender Security Center keywords: alerts, alert fields, fields, api, fields, pull alerts, rest api, request, response search.product: eADQiWindows 10XVcnh @@ -18,17 +18,17 @@ ms.topic: article ms.date: 10/16/2017 --- -# Windows Defender ATP SIEM alert API fields +# Microsoft Defender ATP SIEM alert API fields **Applies to:** -- [Windows Defender Advanced Threat Protection (Windows Defender ATP)](https://go.microsoft.com/fwlink/p/?linkid=2069559) +- [Microsoft Defender Advanced Threat Protection (Microsoft Defender ATP)](https://go.microsoft.com/fwlink/p/?linkid=2069559) ->Want to experience Windows Defender ATP? [Sign up for a free trial.](https://www.microsoft.com/en-us/WindowsForBusiness/windows-atp?ocid=docs-wdatp-apiportalmapping-abovefoldlink) +>Want to experience Microsoft Defender ATP? [Sign up for a free trial.](https://www.microsoft.com/en-us/WindowsForBusiness/windows-atp?ocid=docs-wdatp-apiportalmapping-abovefoldlink) Understand what data fields are exposed as part of the alerts API and how they map to Windows Defender Security Center. @@ -37,7 +37,7 @@ Understand what data fields are exposed as part of the alerts API and how they m The following table lists the available fields exposed in the alerts API payload. It shows examples for the populated values and a reference on how data is reflected on the portal. -The ArcSight field column contains the default mapping between the Windows Defender ATP fields and the built-in fields in ArcSight. You can download the mapping file from the portal when you enable the SIEM integration feature and you can modify it to match the needs of your organization. For more information, see [Enable SIEM integration in Windows Defender ATP](enable-siem-integration-windows-defender-advanced-threat-protection.md). +The ArcSight field column contains the default mapping between the Microsoft Defender ATP fields and the built-in fields in ArcSight. You can download the mapping file from the portal when you enable the SIEM integration feature and you can modify it to match the needs of your organization. For more information, see [Enable SIEM integration in Microsoft Defender ATP](enable-siem-integration-windows-defender-advanced-threat-protection.md). Field numbers match the numbers in the images below. @@ -47,12 +47,12 @@ Field numbers match the numbers in the images below. | 1 | AlertTitle | name | A dll was unexpectedly loaded into a high integrity process without a UAC prompt | Value available for every alert. | | 2 | Severity | deviceSeverity | Medium | Value available for every alert. | | 3 | Category | deviceEventCategory | Privilege Escalation | Value available for every alert. | -| 4 | Source | sourceServiceName | WindowsDefenderATP | Windows Defender Antivirus or Windows Defender ATP. Value available for every alert. | +| 4 | Source | sourceServiceName | WindowsDefenderATP | Windows Defender Antivirus or Microsoft Defender ATP. Value available for every alert. | | 5 | MachineName | sourceHostName | liz-bean | Value available for every alert. | | 6 | FileName | fileName | Robocopy.exe | Available for alerts associated with a file or process. | | 7 | FilePath | filePath | C:\Windows\System32\Robocopy.exe | Available for alerts associated with a file or process. | -| 8 | UserDomain | sourceNtDomain | contoso | The domain of the user context running the activity, available for Windows Defender ATP behavioral based alerts. | -| 9 | UserName | sourceUserName | liz-bean | The user context running the activity, available for Windows Defender ATP behavioral based alerts. | +| 8 | UserDomain | sourceNtDomain | contoso | The domain of the user context running the activity, available for Microsoft Defender ATP behavioral based alerts. | +| 9 | UserName | sourceUserName | liz-bean | The user context running the activity, available for Microsoft Defender ATP behavioral based alerts. | | 10 | Sha1 | fileHash | 5b4b3985339529be3151d331395f667e1d5b7f35 | Available for alerts associated with a file or process. | | 11 | Md5 | deviceCustomString5 | 55394b85cb5edddff551f6f3faa9d8eb | Available for Windows Defender AV alerts. | | 12 | Sha256 | deviceCustomString6 | 9987474deb9f457ece2a9533a08ec173a0986fa3aa6ac355eeba5b622e4a43f5 | Available for Windows Defender AV alerts. | @@ -72,7 +72,7 @@ Field numbers match the numbers in the images below. | | InternalIPv6List | No mapping | fd30:0000:0000:0001:ff4e:003e:0009:000e, FE80:CD00:0000:0CDE:1257:0000:211E:729C | List of IPV6 internal IPs for active network interfaces. | | Internal field | LastProcessedTimeUtc | No mapping | 2017-05-07T01:56:58.9936648Z | Time when event arrived at the backend. This field can be used when setting the request parameter for the range of time that alerts are retrieved. | | | Not part of the schema | deviceVendor | | Static value in the ArcSight mapping - 'Microsoft'. | -| | Not part of the schema | deviceProduct | | Static value in the ArcSight mapping - 'Windows Defender ATP'. | +| | Not part of the schema | deviceProduct | | Static value in the ArcSight mapping - 'Microsoft Defender ATP'. | | | Not part of the schema | deviceVersion | | Static value in the ArcSight mapping - '2.0', used to identify the mapping versions. @@ -92,8 +92,8 @@ Field numbers match the numbers in the images below. ## Related topics -- [Enable SIEM integration in Windows Defender ATP](enable-siem-integration-windows-defender-advanced-threat-protection.md) -- [Configure Splunk to pull Windows Defender ATP alerts](configure-splunk-windows-defender-advanced-threat-protection.md) -- [Configure ArcSight to pull Windows Defender ATP alerts](configure-arcsight-windows-defender-advanced-threat-protection.md) -- [Pull Windows Defender ATP alerts using REST API](pull-alerts-using-rest-api-windows-defender-advanced-threat-protection.md) +- [Enable SIEM integration in Microsoft Defender ATP](enable-siem-integration-windows-defender-advanced-threat-protection.md) +- [Configure Splunk to pull Microsoft Defender ATP alerts](configure-splunk-windows-defender-advanced-threat-protection.md) +- [Configure ArcSight to pull Microsoft Defender ATP alerts](configure-arcsight-windows-defender-advanced-threat-protection.md) +- [Pull Microsoft Defender ATP alerts using REST API](pull-alerts-using-rest-api-windows-defender-advanced-threat-protection.md) - [Troubleshoot SIEM tool integration issues](troubleshoot-siem-windows-defender-advanced-threat-protection.md) diff --git a/windows/security/threat-protection/microsoft-defender-atp/apis-intro.md b/windows/security/threat-protection/microsoft-defender-atp/apis-intro.md index d05ecd0f1b..1b042e2d4c 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/apis-intro.md +++ b/windows/security/threat-protection/microsoft-defender-atp/apis-intro.md @@ -1,6 +1,6 @@ --- -title: Windows Defender Advanced Threat Protection API overview -description: Learn how you can use APIs to automate workflows and innovate based on Windows Defender ATP capabilities +title: Microsoft Defender Advanced Threat Protection API overview +description: Learn how you can use APIs to automate workflows and innovate based on Microsoft Defender ATP capabilities keywords: apis, api, wdatp, open api, windows defender atp api, public api, supported apis, alerts, machine, user, domain, ip, file, advanced hunting, query search.product: eADQiWindows 10XVcnh ms.prod: w10 @@ -16,33 +16,33 @@ ms.collection: M365-security-compliance ms.topic: conceptual --- -# Windows Defender ATP API overview +# Microsoft Defender ATP API overview **Applies to:** -- [Windows Defender Advanced Threat Protection (Windows Defender ATP)](https://go.microsoft.com/fwlink/p/?linkid=2069559) +- [Microsoft Defender Advanced Threat Protection (Microsoft Defender ATP)](https://go.microsoft.com/fwlink/p/?linkid=2069559) -> Want to experience Windows Defender ATP? [Sign up for a free trial.](https://www.microsoft.com/en-us/WindowsForBusiness/windows-atp?ocid=docs-wdatp-exposedapis-abovefoldlink) +> Want to experience Microsoft Defender ATP? [Sign up for a free trial.](https://www.microsoft.com/en-us/WindowsForBusiness/windows-atp?ocid=docs-wdatp-exposedapis-abovefoldlink) -Windows Defender ATP exposes much of its data and actions through a set of programmatic APIs. Those APIs will enable you to automate workflows and innovate based on Windows Defender ATP capabilities. The API access requires OAuth2.0 authentication. For more information, see [OAuth 2.0 Authorization Code Flow](https://docs.microsoft.com/en-us/azure/active-directory/develop/active-directory-v2-protocols-oauth-code). +Microsoft Defender ATP exposes much of its data and actions through a set of programmatic APIs. Those APIs will enable you to automate workflows and innovate based on Microsoft Defender ATP capabilities. The API access requires OAuth2.0 authentication. For more information, see [OAuth 2.0 Authorization Code Flow](https://docs.microsoft.com/en-us/azure/active-directory/develop/active-directory-v2-protocols-oauth-code). In general, you’ll need to take the following steps to use the APIs: - Create an AAD application - Get an access token using this application -- Use the token to access Windows Defender ATP API +- Use the token to access Microsoft Defender ATP API -You can access Windows Defender ATP API with **Application Context** or **User Context**. +You can access Microsoft Defender ATP API with **Application Context** or **User Context**. - **Application Context: (Recommended)**
      Used by apps that run without a signed-in user present. for example, apps that run as background services or daemons. - Steps that need to be taken to access Windows Defender ATP API with application context: + Steps that need to be taken to access Microsoft Defender ATP API with application context: 1. Create an AAD Web-Application. 2. Assign the desired permission to the application, for example, 'Read Alerts', 'Isolate Machines'. 3. Create a key for this Application. 4. Get token using the application with its key. - 5. Use the token to access Windows Defender ATP API + 5. Use the token to access Microsoft Defender ATP API For more information, see [Get access with application context](exposed-apis-create-app-webapp.md). @@ -50,16 +50,16 @@ You can access Windows Defender ATP API with **Application Context** or **User C - **User Context:**
      Used to perform actions in the API on behalf of a user. - Steps that needs to be taken to access Windows Defender ATP API with application context: + Steps that needs to be taken to access Microsoft Defender ATP API with application context: 1. Create AAD Native-Application. 2. Assign the desired permission to the application, e.g 'Read Alerts', 'Isolate Machines' etc. 3. Get token using the application with user credentials. - 4. Use the token to access Windows Defender ATP API + 4. Use the token to access Microsoft Defender ATP API For more information, see [Get access with user context](exposed-apis-create-app-nativeapp.md). ## Related topics -- [Windows Defender ATP APIs](exposed-apis-list.md) -- [Access Windows Defender ATP with application context](exposed-apis-create-app-webapp.md) -- [Access Windows Defender ATP with user context](exposed-apis-create-app-nativeapp.md) \ No newline at end of file +- [Microsoft Defender ATP APIs](exposed-apis-list.md) +- [Access Microsoft Defender ATP with application context](exposed-apis-create-app-webapp.md) +- [Access Microsoft Defender ATP with user context](exposed-apis-create-app-nativeapp.md) \ No newline at end of file diff --git a/windows/security/threat-protection/microsoft-defender-atp/assign-portal-access.md b/windows/security/threat-protection/microsoft-defender-atp/assign-portal-access.md index bc87a4503f..227c780e28 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/assign-portal-access.md +++ b/windows/security/threat-protection/microsoft-defender-atp/assign-portal-access.md @@ -1,6 +1,6 @@ --- title: Assign user access to Windows Defender Security Center -description: Assign read and write or read only access to the Windows Defender Advanced Threat Protection portal. +description: Assign read and write or read only access to the Microsoft Defender Advanced Threat Protection portal. keywords: assign user roles, assign read and write access, assign read only access, user, user roles, roles search.product: eADQiWindows 10XVcnh search.appverid: met150 @@ -23,11 +23,11 @@ ms.date: 11/28/2018 **Applies to:** - Azure Active Directory - Office 365 -- [Windows Defender Advanced Threat Protection (Windows Defender ATP)](https://go.microsoft.com/fwlink/p/?linkid=2069559) +- [Microsoft Defender Advanced Threat Protection (Microsoft Defender ATP)](https://go.microsoft.com/fwlink/p/?linkid=2069559) ->Want to experience Windows Defender ATP? [Sign up for a free trial.](https://www.microsoft.com/en-us/WindowsForBusiness/windows-atp?ocid=docs-wdatp-assignaccess-abovefoldlink) +>Want to experience Microsoft Defender ATP? [Sign up for a free trial.](https://www.microsoft.com/en-us/WindowsForBusiness/windows-atp?ocid=docs-wdatp-assignaccess-abovefoldlink) -Windows Defender ATP supports two ways to manage permissions: +Microsoft Defender ATP supports two ways to manage permissions: - **Basic permissions management**: Set permissions to either full access or read-only. - **Role-based access control (RBAC)**: Set granular permissions by defining roles, assigning Azure AD user groups to the roles, and granting the user groups access to machine groups. For more information on RBAC, see [Manage portal access using role-based access control](rbac-windows-defender-advanced-threat-protection.md). @@ -35,13 +35,13 @@ Windows Defender ATP supports two ways to manage permissions: > [!NOTE] >If you have already assigned basic permissions, you may switch to RBAC anytime. Consider the following before making the switch: ->- Users with full access (users that are assigned the Global Administrator or Security Administrator directory role in Azure AD), are automatically assigned the default Windows Defender ATP administrator role, which also has full access. Additional Azure AD user groups can be assigned to the Windows Defender ATP administrator role after switching to RBAC. Only users assigned to the Windows Defender ATP administrator role can manage permissions using RBAC. +>- Users with full access (users that are assigned the Global Administrator or Security Administrator directory role in Azure AD), are automatically assigned the default Microsoft Defender ATP administrator role, which also has full access. Additional Azure AD user groups can be assigned to the Microsoft Defender ATP administrator role after switching to RBAC. Only users assigned to the Microsoft Defender ATP administrator role can manage permissions using RBAC. >- Users that have read-only access (Security Readers) will lose access to the portal until they are assigned a role. Note that only Azure AD user groups can be assigned a role under RBAC. >- After switching to RBAC, you will not be able to switch back to using basic permissions management. ->Want to experience Windows Defender ATP? [Sign up for a free trial.](https://www.microsoft.com/en-us/WindowsForBusiness/windows-atp?ocid=docs-wdatp-portalaccess-belowfoldlink) +>Want to experience Microsoft Defender ATP? [Sign up for a free trial.](https://www.microsoft.com/en-us/WindowsForBusiness/windows-atp?ocid=docs-wdatp-portalaccess-belowfoldlink) ## Related topic - [Use basic permissions to access the portal](basic-permissions-windows-defender-advanced-threat-protection.md) diff --git a/windows/security/threat-protection/microsoft-defender-atp/attack-simulations.md b/windows/security/threat-protection/microsoft-defender-atp/attack-simulations.md index a86ee0b027..9b4ee1c082 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/attack-simulations.md +++ b/windows/security/threat-protection/microsoft-defender-atp/attack-simulations.md @@ -1,6 +1,6 @@ --- -title: Experience Windows Defender ATP through simulated attacks -description: Run the provided attack scenario simulations to experience how Windows Defender ATP can detect, investigate, and respond to breaches. +title: Experience Microsoft Defender ATP through simulated attacks +description: Run the provided attack scenario simulations to experience how Microsoft Defender ATP can detect, investigate, and respond to breaches. keywords: wdatp, test, scenario, attack, simulation, simulated, diy, windows defender advanced threat protection search.product: eADQiWindows 10XVcnh search.appverid: met150 @@ -18,23 +18,23 @@ ms.topic: article ms.date: 11/20/2018 --- -# Experience Windows Defender ATP through simulated attacks +# Experience Microsoft Defender ATP through simulated attacks **Applies to:** -- [Windows Defender Advanced Threat Protection (Windows Defender ATP)](https://go.microsoft.com/fwlink/p/?linkid=2069559) +- [Microsoft Defender Advanced Threat Protection (Microsoft Defender ATP)](https://go.microsoft.com/fwlink/p/?linkid=2069559) ->Want to experience Windows Defender ATP? [Sign up for a free trial.](https://www.microsoft.com/en-us/WindowsForBusiness/windows-atp?ocid=docs-wdatp-attacksimulations-abovefoldlink) +>Want to experience Microsoft Defender ATP? [Sign up for a free trial.](https://www.microsoft.com/en-us/WindowsForBusiness/windows-atp?ocid=docs-wdatp-attacksimulations-abovefoldlink) >[!TIP] ->- Learn about the latest enhancements in Windows Defender ATP: [What's new in Windows Defender ATP](https://cloudblogs.microsoft.com/microsoftsecure/2018/11/15/whats-new-in-windows-defender-atp/). ->- Windows Defender ATP demonstrated industry-leading optics and detection capabilities in the recent MITRE evaluation. Read: [Insights from the MITRE ATT&CK-based evaluation](https://cloudblogs.microsoft.com/microsoftsecure/2018/12/03/insights-from-the-mitre-attack-based-evaluation-of-windows-defender-atp/). +>- Learn about the latest enhancements in Microsoft Defender ATP: [What's new in Microsoft Defender ATP](https://cloudblogs.microsoft.com/microsoftsecure/2018/11/15/whats-new-in-windows-defender-atp/). +>- Microsoft Defender ATP demonstrated industry-leading optics and detection capabilities in the recent MITRE evaluation. Read: [Insights from the MITRE ATT&CK-based evaluation](https://cloudblogs.microsoft.com/microsoftsecure/2018/12/03/insights-from-the-mitre-attack-based-evaluation-of-windows-defender-atp/). -You might want to experience Windows Defender ATP before you onboard more than a few machines to the service. To do this, you can run controlled attack simulations on a few test machines. After running the simulated attacks, you can review how Windows Defender ATP surfaces malicious activity and explore how it enables an efficient response. +You might want to experience Microsoft Defender ATP before you onboard more than a few machines to the service. To do this, you can run controlled attack simulations on a few test machines. After running the simulated attacks, you can review how Microsoft Defender ATP surfaces malicious activity and explore how it enables an efficient response. ## Before you begin @@ -62,7 +62,7 @@ Read the walkthrough document provided with each attack scenario. Each document >Simulation files or scripts mimic attack activity but are actually benign and will not harm or compromise the test machine. ->Want to experience Windows Defender ATP? [Sign up for a free trial.](https://www.microsoft.com/en-us/WindowsForBusiness/windows-atp?ocid=docs-wdatp-attacksimulations-belowfoldlink) +>Want to experience Microsoft Defender ATP? [Sign up for a free trial.](https://www.microsoft.com/en-us/WindowsForBusiness/windows-atp?ocid=docs-wdatp-attacksimulations-belowfoldlink) ## Related topics diff --git a/windows/security/threat-protection/microsoft-defender-atp/automated-investigations.md b/windows/security/threat-protection/microsoft-defender-atp/automated-investigations.md index 8968b3b2cf..78375524ed 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/automated-investigations.md +++ b/windows/security/threat-protection/microsoft-defender-atp/automated-investigations.md @@ -20,12 +20,12 @@ ms.date: 12/04/2018 # Overview of Automated investigations ->Want to experience Windows Defender ATP? [Sign up for a free trial.](https://www.microsoft.com/en-us/WindowsForBusiness/windows-atp?ocid=docs-wdatp-automated-investigations-abovefoldlink) +>Want to experience Microsoft Defender ATP? [Sign up for a free trial.](https://www.microsoft.com/en-us/WindowsForBusiness/windows-atp?ocid=docs-wdatp-automated-investigations-abovefoldlink) -The Windows Defender ATP service has a wide breadth of visibility on multiple machines. With this kind of optics, the service generates a multitude of alerts. The volume of alerts generated can be challenging for a typical security operations team to individually address. +The Microsoft Defender ATP service has a wide breadth of visibility on multiple machines. With this kind of optics, the service generates a multitude of alerts. The volume of alerts generated can be challenging for a typical security operations team to individually address. -To address this challenge, Windows Defender ATP uses Automated investigations to significantly reduce the volume of alerts that need to be investigated individually. The Automated investigation feature leverages various inspection algorithms, and processes used by analysts (such as playbooks) to examine alerts and take immediate remediation action to resolve breaches. This significantly reduces alert volume, allowing security operations experts to focus on more sophisticated threats and other high value initiatives. +To address this challenge, Microsoft Defender ATP uses Automated investigations to significantly reduce the volume of alerts that need to be investigated individually. The Automated investigation feature leverages various inspection algorithms, and processes used by analysts (such as playbooks) to examine alerts and take immediate remediation action to resolve breaches. This significantly reduces alert volume, allowing security operations experts to focus on more sophisticated threats and other high value initiatives. The Automated investigations list shows all the investigations that have been initiated automatically and shows other details such as its status, detection source, and the date for when the investigation was initiated. diff --git a/windows/security/threat-protection/microsoft-defender-atp/basic-permissions.md b/windows/security/threat-protection/microsoft-defender-atp/basic-permissions.md index 7dc172d03f..ebb98886d3 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/basic-permissions.md +++ b/windows/security/threat-protection/microsoft-defender-atp/basic-permissions.md @@ -1,6 +1,6 @@ --- title: Use basic permissions to access Windows Defender Security Center -description: Assign read and write or read only access to the Windows Defender Advanced Threat Protection portal. +description: Assign read and write or read only access to the Microsoft Defender Advanced Threat Protection portal. keywords: assign user roles, assign read and write access, assign read only access, user, user roles, roles search.product: eADQiWindows 10XVcnh search.appverid: met150 @@ -21,9 +21,9 @@ ms.topic: article **Applies to:** - Azure Active Directory -- [Windows Defender Advanced Threat Protection (Windows Defender ATP)](https://go.microsoft.com/fwlink/p/?linkid=2069559) +- [Microsoft Defender Advanced Threat Protection (Microsoft Defender ATP)](https://go.microsoft.com/fwlink/p/?linkid=2069559) ->Want to experience Windows Defender ATP? [Sign up for a free trial.](https://www.microsoft.com/en-us/WindowsForBusiness/windows-atp?ocid=docs-wdatp-basicaccess-abovefoldlink) +>Want to experience Microsoft Defender ATP? [Sign up for a free trial.](https://www.microsoft.com/en-us/WindowsForBusiness/windows-atp?ocid=docs-wdatp-basicaccess-abovefoldlink) Refer to the instructions below to use basic permissions management. diff --git a/windows/security/threat-protection/microsoft-defender-atp/check-sensor-status.md b/windows/security/threat-protection/microsoft-defender-atp/check-sensor-status.md index 007cfbede6..453a7575ed 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/check-sensor-status.md +++ b/windows/security/threat-protection/microsoft-defender-atp/check-sensor-status.md @@ -1,5 +1,5 @@ --- -title: Check the health state of the sensor in Windows Defender ATP +title: Check the health state of the sensor in Microsoft Defender ATP description: Check the sensor health on machines to identify which ones are misconfigured, inactive, or are not reporting sensor data. keywords: sensor, sensor health, misconfigured, inactive, no sensor data, sensor data, impaired communications, communication search.product: eADQiWindows 10XVcnh @@ -18,21 +18,21 @@ ms.topic: article ms.date: 04/24/2018 --- -# Check sensor health state in Windows Defender ATP +# Check sensor health state in Microsoft Defender ATP **Applies to:** -- [Windows Defender Advanced Threat Protection (Windows Defender ATP)](https://go.microsoft.com/fwlink/p/?linkid=2069559) +- [Microsoft Defender Advanced Threat Protection (Microsoft Defender ATP)](https://go.microsoft.com/fwlink/p/?linkid=2069559) ->Want to experience Windows Defender ATP? [Sign up for a free trial.](https://www.microsoft.com/en-us/WindowsForBusiness/windows-atp?ocid=docs-wdatp-checksensor-abovefoldlink) +>Want to experience Microsoft Defender ATP? [Sign up for a free trial.](https://www.microsoft.com/en-us/WindowsForBusiness/windows-atp?ocid=docs-wdatp-checksensor-abovefoldlink) -The sensor health tile provides information on the individual machine’s ability to provide sensor data and communicate with the Windows Defender ATP service. It reports how many machines require attention and helps you identify problematic machines and take action to correct known issues. +The sensor health tile provides information on the individual machine’s ability to provide sensor data and communicate with the Microsoft Defender ATP service. It reports how many machines require attention and helps you identify problematic machines and take action to correct known issues. There are two status indicators on the tile that provide information on the number of machines that are not reporting properly to the service: -- **Misconfigured** - These machines might partially be reporting sensor data to the Windows Defender ATP service and might have configuration errors that need to be corrected. -- **Inactive** - Machines that have stopped reporting to the Windows Defender ATP service for more than seven days in the past month. +- **Misconfigured** - These machines might partially be reporting sensor data to the Microsoft Defender ATP service and might have configuration errors that need to be corrected. +- **Inactive** - Machines that have stopped reporting to the Microsoft Defender ATP service for more than seven days in the past month. Clicking any of the groups directs you to Machines list, filtered according to your choice. @@ -40,16 +40,16 @@ Clicking any of the groups directs you to Machines list, filtered according to y You can also download the entire list in CSV format using the **Export to CSV** feature. For more information on filters, see [View and organize the Machines list](machines-view-overview-windows-defender-advanced-threat-protection.md). You can filter the health state list by the following status: -- **Active** - Machines that are actively reporting to the Windows Defender ATP service. -- **Misconfigured** - These machines might partially be reporting sensor data to the Windows Defender ATP service but have configuration errors that need to be corrected. Misconfigured machines can have either one or a combination of the following issues: +- **Active** - Machines that are actively reporting to the Microsoft Defender ATP service. +- **Misconfigured** - These machines might partially be reporting sensor data to the Microsoft Defender ATP service but have configuration errors that need to be corrected. Misconfigured machines can have either one or a combination of the following issues: - **No sensor data** - Machines has stopped sending sensor data. Limited alerts can be triggered from the machine. - **Impaired communications** - Ability to communicate with machine is impaired. Sending files for deep analysis, blocking files, isolating machine from network and other actions that require communication with the machine may not work. -- **Inactive** - Machines that have stopped reporting to the Windows Defender ATP service. +- **Inactive** - Machines that have stopped reporting to the Microsoft Defender ATP service. You can view the machine details when you click on a misconfigured or inactive machine. You’ll see more specific machine information when you click the information icon. -![Windows Defender ATP sensor filter](images/atp-machine-health-details.png) +![Microsoft Defender ATP sensor filter](images/atp-machine-health-details.png) In the **Machines list**, you can download a full list of all the machines in your organization in a CSV format. @@ -57,4 +57,4 @@ In the **Machines list**, you can download a full list of all the machines in yo >Export the list in CSV format to display the unfiltered data. The CSV file will include all machines in the organization, regardless of any filtering applied in the view itself and can take a significant amount of time to download, depending on how large your organization is. ## Related topic -- [Fix unhealthy sensors in Windows Defender ATP](fix-unhealhty-sensors-windows-defender-advanced-threat-protection.md) +- [Fix unhealthy sensors in Microsoft Defender ATP](fix-unhealhty-sensors-windows-defender-advanced-threat-protection.md) diff --git a/windows/security/threat-protection/microsoft-defender-atp/collect-investigation-package.md b/windows/security/threat-protection/microsoft-defender-atp/collect-investigation-package.md index 70fb7fe34a..133ce6e86c 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/collect-investigation-package.md +++ b/windows/security/threat-protection/microsoft-defender-atp/collect-investigation-package.md @@ -19,7 +19,7 @@ ms.date: 12/08/2017 # Collect investigation package API **Applies to:** -- Windows Defender Advanced Threat Protection (Windows Defender ATP) +- Microsoft Defender Advanced Threat Protection (Microsoft Defender ATP) [!include[Prereleaseinformation](prerelease.md)] @@ -28,7 +28,7 @@ Collect investigation package from a machine. [!include[Machine actions note](machineactionsnote.md)] ## Permissions -One of the following permissions is required to call this API. To learn more, including how to choose permissions, see [Use Windows Defender ATP APIs](apis-intro.md) +One of the following permissions is required to call this API. To learn more, including how to choose permissions, see [Use Microsoft Defender ATP APIs](apis-intro.md) Permission type | Permission | Permission display name :---|:---|:--- diff --git a/windows/security/threat-protection/microsoft-defender-atp/community.md b/windows/security/threat-protection/microsoft-defender-atp/community.md index 35ed4d4458..a70adba5f5 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/community.md +++ b/windows/security/threat-protection/microsoft-defender-atp/community.md @@ -1,6 +1,6 @@ --- -title: Access the Windows Defender ATP Community Center -description: Access the Windows Defender ATP Community Center to share experiences, engange, and learn about the product. +title: Access the Microsoft Defender ATP Community Center +description: Access the Microsoft Defender ATP Community Center to share experiences, engange, and learn about the product. keywords: community, community center, tech community, conversation, announcements search.product: eADQiWindows 10XVcnh search.appverid: met150 @@ -19,14 +19,14 @@ ms.date: 04/24/2018 --- -# Access the Windows Defender ATP Community Center +# Access the Microsoft Defender ATP Community Center **Applies to:** -- [Windows Defender Advanced Threat Protection (Windows Defender ATP)](https://go.microsoft.com/fwlink/p/?linkid=2069559) +- [Microsoft Defender Advanced Threat Protection (Microsoft Defender ATP)](https://go.microsoft.com/fwlink/p/?linkid=2069559) -The Windows Defender ATP Community Center is a place where community members can learn, collaborate, and share experiences about the product. +The Microsoft Defender ATP Community Center is a place where community members can learn, collaborate, and share experiences about the product. There are several spaces you can explore to learn about specific information: - Announcements @@ -35,8 +35,8 @@ There are several spaces you can explore to learn about specific information: There are several ways you can access the Community Center: -- In the Windows Defender Security Center navigation pane, select **Community center**. A new browser tab opens and takes you to the Windows Defender ATP Tech Community page. -- Access the community through the [Windows Defender Advanced Threat Protection Tech Community](https://techcommunity.microsoft.com/t5/Windows-Defender-Advanced-Threat/ct-p/WindowsDefenderAdvanced) page +- In the Windows Defender Security Center navigation pane, select **Community center**. A new browser tab opens and takes you to the Microsoft Defender ATP Tech Community page. +- Access the community through the [Microsoft Defender Advanced Threat Protection Tech Community](https://techcommunity.microsoft.com/t5/Windows-Defender-Advanced-Threat/ct-p/WindowsDefenderAdvanced) page You can instantly view and read conversations that have been posted in the community. diff --git a/windows/security/threat-protection/microsoft-defender-atp/conditional.md b/windows/security/threat-protection/microsoft-defender-atp/conditional.md index d3dff32b11..eba91e7d07 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/conditional.md +++ b/windows/security/threat-protection/microsoft-defender-atp/conditional.md @@ -20,11 +20,11 @@ ms.topic: article # Enable conditional access to better protect users, devices, and data **Applies to:** -- [Windows Defender Advanced Threat Protection (Windows Defender ATP)](https://go.microsoft.com/fwlink/p/?linkid=2069559) +- [Microsoft Defender Advanced Threat Protection (Microsoft Defender ATP)](https://go.microsoft.com/fwlink/p/?linkid=2069559) ->Want to experience Windows Defender ATP? [Sign up for a free trial.](https://www.microsoft.com/en-us/WindowsForBusiness/windows-atp?ocid=docs-wdatp-conditionalaccess-abovefoldlink) +>Want to experience Microsoft Defender ATP? [Sign up for a free trial.](https://www.microsoft.com/en-us/WindowsForBusiness/windows-atp?ocid=docs-wdatp-conditionalaccess-abovefoldlink) Conditional access is a capability that helps you better protect your users and enterprise information by making sure that only secure devices have access to applications. @@ -32,7 +32,7 @@ With conditional access, you can control access to enterprise information based You can define security conditions under which devices and applications can run and access information from your network by enforcing policies to stop applications from running until a device returns to a compliant state. -The implementation of conditional access in Windows Defender ATP is based on Microsoft Intune (Intune) device compliance policies and Azure Active Directory (Azure AD) conditional access policies. +The implementation of conditional access in Microsoft Defender ATP is based on Microsoft Intune (Intune) device compliance policies and Azure Active Directory (Azure AD) conditional access policies. The compliance policy is used with conditional access to allow only devices that fulfill one or more device compliance policy rules to access applications. @@ -62,15 +62,15 @@ When the risk is removed either through manual or automated remediation, the dev The following example sequence of events explains conditional access in action: -1. A user opens a malicious file and Windows Defender ATP flags the device as high risk. +1. A user opens a malicious file and Microsoft Defender ATP flags the device as high risk. 2. The high risk assessment is passed along to Intune. In parallel, an automated investigation is initiated to remediate the identified threat. A manual remediation can also be done to remediate the identified threat. 3. Based on the policy created in Intune, the device is marked as not compliant. The assessment is then communicated to Azure AD by the Intune conditional access policy. In Azure AD, the corresponding policy is applied to block access to applications. -4. The manual or automated investigation and remediation is completed and the threat is removed. Windows Defender ATP sees that there is no risk on the device and Intune assesses the device to be in a compliant state. Azure AD applies the policy which allows access to applications. +4. The manual or automated investigation and remediation is completed and the threat is removed. Microsoft Defender ATP sees that there is no risk on the device and Intune assesses the device to be in a compliant state. Azure AD applies the policy which allows access to applications. 5. Users can now access applications. ## Related topic -- [Configure conditional access in Windows Defender ATP](configure-conditional-access-windows-defender-advanced-threat-protection.md) +- [Configure conditional access in Microsoft Defender ATP](configure-conditional-access-windows-defender-advanced-threat-protection.md) diff --git a/windows/security/threat-protection/microsoft-defender-atp/configure-arcsight.md b/windows/security/threat-protection/microsoft-defender-atp/configure-arcsight.md index d418764a45..2b787f64c8 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/configure-arcsight.md +++ b/windows/security/threat-protection/microsoft-defender-atp/configure-arcsight.md @@ -1,5 +1,5 @@ --- -title: Configure HP ArcSight to pull Windows Defender ATP alerts +title: Configure HP ArcSight to pull Microsoft Defender ATP alerts description: Configure HP ArcSight to receive and pull alerts from Windows Defender Security Center keywords: configure hp arcsight, security information and events management tools, arcsight search.product: eADQiWindows 10XVcnh @@ -18,25 +18,25 @@ ms.topic: article ms.date: 12/20/2018 --- -# Configure HP ArcSight to pull Windows Defender ATP alerts +# Configure HP ArcSight to pull Microsoft Defender ATP alerts **Applies to:** -- [Windows Defender Advanced Threat Protection (Windows Defender ATP)](https://go.microsoft.com/fwlink/p/?linkid=2069559) +- [Microsoft Defender Advanced Threat Protection (Microsoft Defender ATP)](https://go.microsoft.com/fwlink/p/?linkid=2069559) ->Want to experience Windows Defender ATP? [Sign up for a free trial.](https://www.microsoft.com/en-us/WindowsForBusiness/windows-atp?ocid=docs-wdatp-configurearcsight-abovefoldlink) +>Want to experience Microsoft Defender ATP? [Sign up for a free trial.](https://www.microsoft.com/en-us/WindowsForBusiness/windows-atp?ocid=docs-wdatp-configurearcsight-abovefoldlink) -You'll need to install and configure some files and tools to use HP ArcSight so that it can pull Windows Defender ATP alerts. +You'll need to install and configure some files and tools to use HP ArcSight so that it can pull Microsoft Defender ATP alerts. ## Before you begin Configuring the HP ArcSight Connector tool requires several configuration files for it to pull and parse alerts from your Azure Active Directory (AAD) application. This section guides you in getting the necessary information to set and use the required configuration files correctly. -- Make sure you have enabled the SIEM integration feature from the **Settings** menu. For more information, see [Enable SIEM integration in Windows Defender ATP](enable-siem-integration-windows-defender-advanced-threat-protection.md). +- Make sure you have enabled the SIEM integration feature from the **Settings** menu. For more information, see [Enable SIEM integration in Microsoft Defender ATP](enable-siem-integration-windows-defender-advanced-threat-protection.md). - Have the file you saved from enabling the SIEM integration feature ready. You'll need to get the following values: - OAuth 2.0 Token refresh URL @@ -107,7 +107,7 @@ The following steps assume that you have completed all the required steps in [Be Browse to the location of the *wdatp-connector.properties* file. The name must match the file provided in the .zip that you downloaded. Refresh Token - You can obtain a refresh token in two ways: by generating a refresh token from the **SIEM settings** page or using the restutil tool.

      For more information on generating a refresh token from the **Preferences setup** , see [Enable SIEM integration in Windows Defender ATP](enable-siem-integration-windows-defender-advanced-threat-protection.md).

      **Get your refresh token using the restutil tool:**
      a. Open a command prompt. Navigate to C:\\*folder_location*\current\bin where *folder_location* represents the location where you installed the tool.

      b. Type: `arcsight restutil token -config` from the bin directory.For example: **arcsight restutil boxtoken -proxy proxy.location.hp.com:8080** A Web browser window will open.

      c. Type in your credentials then click on the password field to let the page redirect. In the login prompt, enter your credentials.

      d. A refresh token is shown in the command prompt.

      e. Copy and paste it into the **Refresh Token** field. + You can obtain a refresh token in two ways: by generating a refresh token from the **SIEM settings** page or using the restutil tool.

      For more information on generating a refresh token from the **Preferences setup** , see [Enable SIEM integration in Microsoft Defender ATP](enable-siem-integration-windows-defender-advanced-threat-protection.md).

      **Get your refresh token using the restutil tool:**
      a. Open a command prompt. Navigate to C:\\*folder_location*\current\bin where *folder_location* represents the location where you installed the tool.

      b. Type: `arcsight restutil token -config` from the bin directory.For example: **arcsight restutil boxtoken -proxy proxy.location.hp.com:8080** A Web browser window will open.

      c. Type in your credentials then click on the password field to let the page redirect. In the login prompt, enter your credentials.

      d. A refresh token is shown in the command prompt.

      e. Copy and paste it into the **Refresh Token** field. @@ -160,11 +160,11 @@ If the `redirect_uri` is a https URL, you'll be redirected to a URL on the local 9. Navigate to **Active channel set** > **New Condition** > **Device** > **Device Product**. -10. Set **Device Product = Windows Defender ATP**. When you've verified that events are flowing to the tool, stop the process again and go to Windows Services and start the ArcSight FlexConnector REST. +10. Set **Device Product = Microsoft Defender ATP**. When you've verified that events are flowing to the tool, stop the process again and go to Windows Services and start the ArcSight FlexConnector REST. You can now run queries in the HP ArcSight console. -Windows Defender ATP alerts will appear as discrete events, with "Microsoft” as the vendor and “Windows Defender ATP” as the device name. +Microsoft Defender ATP alerts will appear as discrete events, with "Microsoft” as the vendor and “Windows Defender ATP” as the device name. ## Troubleshooting HP ArcSight connection @@ -187,7 +187,7 @@ Windows Defender ATP alerts will appear as discrete events, with "Microsoft” a > Verify that the connector is running by stopping the process again. Then start the connector again, and no browser window should appear. ## Related topics -- [Enable SIEM integration in Windows Defender ATP](enable-siem-integration-windows-defender-advanced-threat-protection.md) -- [Configure Splunk to pull Windows Defender ATP alerts](configure-splunk-windows-defender-advanced-threat-protection.md) -- [Pull Windows Defender ATP alerts using REST API](pull-alerts-using-rest-api-windows-defender-advanced-threat-protection.md) +- [Enable SIEM integration in Microsoft Defender ATP](enable-siem-integration-windows-defender-advanced-threat-protection.md) +- [Configure Splunk to pull Microsoft Defender ATP alerts](configure-splunk-windows-defender-advanced-threat-protection.md) +- [Pull Microsoft Defender ATP alerts using REST API](pull-alerts-using-rest-api-windows-defender-advanced-threat-protection.md) - [Troubleshoot SIEM tool integration issues](troubleshoot-siem-windows-defender-advanced-threat-protection.md) diff --git a/windows/security/threat-protection/microsoft-defender-atp/configure-conditional-access.md b/windows/security/threat-protection/microsoft-defender-atp/configure-conditional-access.md index cd442ff5d6..e599ecf7be 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/configure-conditional-access.md +++ b/windows/security/threat-protection/microsoft-defender-atp/configure-conditional-access.md @@ -1,5 +1,5 @@ --- -title: Configure conditional access in Windows Defender ATP +title: Configure conditional access in Microsoft Defender ATP description: keywords: search.product: eADQiWindows 10XVcnh @@ -18,9 +18,9 @@ ms.topic: article ms.date: 09/03/2018 --- -# Configure conditional access in Windows Defender ATP +# Configure conditional access in Microsoft Defender ATP **Applies to:** -- [Windows Defender Advanced Threat Protection (Windows Defender ATP)](https://go.microsoft.com/fwlink/p/?linkid=2069559) +- [Microsoft Defender Advanced Threat Protection (Microsoft Defender ATP)](https://go.microsoft.com/fwlink/p/?linkid=2069559) This section guides you through all the steps you need to take to properly implement conditional access. @@ -45,7 +45,7 @@ There are steps you'll need to take in Windows Defender Security Center, the Int Take the following steps to enable conditional access: - Step 1: Turn on the Microsoft Intune connection from Windows Defender Security Center -- Step 2: Turn on the Windows Defender ATP integration in Intune +- Step 2: Turn on the Microsoft Defender ATP integration in Intune - Step 3: Create the compliance policy in Intune - Step 4: Assign the policy - Step 5: Create an Azure AD conditional access policy @@ -57,10 +57,10 @@ Take the following steps to enable conditional access: 3. Click **Save preferences**. -### Step 2: Turn on the Windows Defender ATP integration in Intune +### Step 2: Turn on the Microsoft Defender ATP integration in Intune 1. Sign in to the [Azure portal](https://portal.azure.com). -2. Select **Device compliance** > **Windows Defender ATP**. -3. Set **Connect Windows 10.0.15063+ devices to Windows Defender Advanced Threat Protection** to **On**. +2. Select **Device compliance** > **Microsoft Defender ATP**. +3. Set **Connect Windows 10.0.15063+ devices to Microsoft Defender Advanced Threat Protection** to **On**. 4. Click **Save**. @@ -80,7 +80,7 @@ Take the following steps to enable conditional access: ### Step 4: Assign the policy 1. In the [Azure portal](https://portal.azure.com), select **All services**, filter on **Intune**, and select **Microsoft Intune**. -2. Select **Device compliance** > **Policies**> select your Windows Defender ATP compliance policy. +2. Select **Device compliance** > **Policies**> select your Microsoft Defender ATP compliance policy. 3. Select **Assignments**. 4. Include or exclude your Azure AD groups to assign them the policy. 5. To deploy the policy to the groups, select **Save**. The user devices targeted by the policy are evaluated for compliance. @@ -96,6 +96,6 @@ Take the following steps to enable conditional access: 6. Select **Enable policy**, and then **Create** to save your changes. -For more information, see [Enable Windows Defender ATP with conditional access in Intune](https://docs.microsoft.com/intune/advanced-threat-protection). +For more information, see [Enable Microsoft Defender ATP with conditional access in Intune](https://docs.microsoft.com/intune/advanced-threat-protection). ->Want to experience Windows Defender ATP? [Sign up for a free trial.](https://www.microsoft.com/en-us/WindowsForBusiness/windows-atp?ocid=docs-wdatp-conditionalaccess-belowfoldlink) +>Want to experience Microsoft Defender ATP? [Sign up for a free trial.](https://www.microsoft.com/en-us/WindowsForBusiness/windows-atp?ocid=docs-wdatp-conditionalaccess-belowfoldlink) diff --git a/windows/security/threat-protection/microsoft-defender-atp/configure-email-notifications.md b/windows/security/threat-protection/microsoft-defender-atp/configure-email-notifications.md index 2d843ca2bd..5352b16859 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/configure-email-notifications.md +++ b/windows/security/threat-protection/microsoft-defender-atp/configure-email-notifications.md @@ -1,6 +1,6 @@ --- -title: Configure alert notifications in Windows Defender ATP -description: Send email notifications to specified recipients to receive new alerts based on severity with Windows Defender ATP on Windows 10 Enterprise, Pro, and Education editions. +title: Configure alert notifications in Microsoft Defender ATP +description: Send email notifications to specified recipients to receive new alerts based on severity with Microsoft Defender ATP on Windows 10 Enterprise, Pro, and Education editions. keywords: email notifications, configure alert notifications, windows defender atp notifications, windows defender atp alerts, windows 10 enterprise, windows 10 education search.product: eADQiWindows 10XVcnh search.appverid: met150 @@ -18,15 +18,15 @@ ms.topic: article ms.date: 10/08/2018 --- -# Configure alert notifications in Windows Defender ATP +# Configure alert notifications in Microsoft Defender ATP **Applies to:** -- [Windows Defender Advanced Threat Protection (Windows Defender ATP)](https://go.microsoft.com/fwlink/p/?linkid=2069559) +- [Microsoft Defender Advanced Threat Protection (Microsoft Defender ATP)](https://go.microsoft.com/fwlink/p/?linkid=2069559) ->Want to experience Windows Defender ATP? [Sign up for a free trial.](https://www.microsoft.com/en-us/WindowsForBusiness/windows-atp?ocid=docs-wdatp-emailconfig-abovefoldlink) +>Want to experience Microsoft Defender ATP? [Sign up for a free trial.](https://www.microsoft.com/en-us/WindowsForBusiness/windows-atp?ocid=docs-wdatp-emailconfig-abovefoldlink) -You can configure Windows Defender ATP to send email notifications to specified recipients for new alerts. This feature enables you to identify a group of individuals who will immediately be informed and can act on alerts based on their severity. +You can configure Microsoft Defender ATP to send email notifications to specified recipients for new alerts. This feature enables you to identify a group of individuals who will immediately be informed and can act on alerts based on their severity. > [!NOTE] > Only users with 'Manage security settings' permissions can configure email notifications. If you've chosen to use basic permissions management, users with Security Administrator or Global Administrator roles can configure email notifications. @@ -55,7 +55,7 @@ You can create rules that determine the machines and alert severities to send em - **Include machine information** - Includes the machine name in the email alert body. >[!NOTE] - > This information might be processed by recipient mail servers that ar not in the geographic location you have selected for your Windows Defender ATP data. + > This information might be processed by recipient mail servers that ar not in the geographic location you have selected for your Microsoft Defender ATP data. - **Machines** - Choose whether to notify recipients for alerts on all machines (Global administrator role only) or on selected machine groups. For more information, see [Create and manage machine groups](machine-groups-windows-defender-advanced-threat-protection.md). - **Alert severity** - Choose the alert severity level. @@ -94,12 +94,12 @@ This section lists various issues that you may encounter when using email notifi **Solution:** Make sure that the notifications are not blocked by email filters: -1. Check that the Windows Defender ATP email notifications are not sent to the Junk Email folder. Mark them as Not junk. -2. Check that your email security product is not blocking the email notifications from Windows Defender ATP. -3. Check your email application rules that might be catching and moving your Windows Defender ATP email notifications. +1. Check that the Microsoft Defender ATP email notifications are not sent to the Junk Email folder. Mark them as Not junk. +2. Check that your email security product is not blocking the email notifications from Microsoft Defender ATP. +3. Check your email application rules that might be catching and moving your Microsoft Defender ATP email notifications. ## Related topics - [Update data retention settings](data-retention-settings-windows-defender-advanced-threat-protection.md) -- [Enable and create Power BI reports using Windows Defender ATP data](powerbi-reports-windows-defender-advanced-threat-protection.md) +- [Enable and create Power BI reports using Microsoft Defender ATP data](powerbi-reports-windows-defender-advanced-threat-protection.md) - [Enable Secure Score security controls](enable-secure-score-windows-defender-advanced-threat-protection.md) - [Configure advanced features](advanced-features-windows-defender-advanced-threat-protection.md) \ No newline at end of file diff --git a/windows/security/threat-protection/microsoft-defender-atp/configure-endpoints-gp.md b/windows/security/threat-protection/microsoft-defender-atp/configure-endpoints-gp.md index a2e8e2a9d2..24f3338a41 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/configure-endpoints-gp.md +++ b/windows/security/threat-protection/microsoft-defender-atp/configure-endpoints-gp.md @@ -1,7 +1,7 @@ --- -title: Onboard Windows 10 machines using Group Policy to Windows Defender ATP +title: Onboard Windows 10 machines using Group Policy to Microsoft Defender ATP description: Use Group Policy to deploy the configuration package on Windows 10 machines so that they are onboarded to the service. -keywords: configure machines using group policy, machine management, configure Windows ATP machines, onboard Windows Defender Advanced Threat Protection machines, group policy +keywords: configure machines using group policy, machine management, configure Windows ATP machines, onboard Microsoft Defender Advanced Threat Protection machines, group policy search.product: eADQiWindows 10XVcnh search.appverid: met150 ms.prod: w10 @@ -24,12 +24,12 @@ ms.date: 04/24/2018 - Group Policy -- [Windows Defender Advanced Threat Protection (Windows Defender ATP)](https://go.microsoft.com/fwlink/p/?linkid=2069559) +- [Microsoft Defender Advanced Threat Protection (Microsoft Defender ATP)](https://go.microsoft.com/fwlink/p/?linkid=2069559) ->Want to experience Windows Defender ATP? [Sign up for a free trial.](https://www.microsoft.com/en-us/WindowsForBusiness/windows-atp?ocid=docs-wdatp-configureendpointsgp-abovefoldlink) +>Want to experience Microsoft Defender ATP? [Sign up for a free trial.](https://www.microsoft.com/en-us/WindowsForBusiness/windows-atp?ocid=docs-wdatp-configureendpointsgp-abovefoldlink) > [!NOTE] @@ -63,9 +63,9 @@ ms.date: 04/24/2018 9. Click **OK** and close any open GPMC windows. >[!TIP] -> After onboarding the machine, you can choose to run a detection test to verify that the machine is properly onboarded to the service. For more information, see [Run a detection test on a newly onboarded Windows Defender ATP machine](run-detection-test-windows-defender-advanced-threat-protection.md). +> After onboarding the machine, you can choose to run a detection test to verify that the machine is properly onboarded to the service. For more information, see [Run a detection test on a newly onboarded Microsoft Defender ATP machine](run-detection-test-windows-defender-advanced-threat-protection.md). -## Additional Windows Defender ATP configuration settings +## Additional Microsoft Defender ATP configuration settings For each machine, you can state whether samples can be collected from the machine when a request is made through Windows Defender Security Center to submit a file for deep analysis. You can use Group Policy (GP) to configure settings, such as settings for the sample sharing used in the deep analysis feature. @@ -84,7 +84,7 @@ You can use Group Policy (GP) to configure settings, such as settings for the sa 4. Click **Policies**, then **Administrative templates**. -5. Click **Windows components** and then **Windows Defender ATP**. +5. Click **Windows components** and then **Microsoft Defender ATP**. 6. Choose to enable or disable sample sharing from your machines. @@ -145,5 +145,5 @@ With Group Policy there isn’t an option to monitor deployment of policies on t - [Onboard Windows 10 machines using Mobile Device Management tools](configure-endpoints-mdm-windows-defender-advanced-threat-protection.md) - [Onboard Windows 10 machines using a local script](configure-endpoints-script-windows-defender-advanced-threat-protection.md) - [Onboard non-persistent virtual desktop infrastructure (VDI) machines](configure-endpoints-vdi-windows-defender-advanced-threat-protection.md) -- [Run a detection test on a newly onboarded Windows Defender ATP machines](run-detection-test-windows-defender-advanced-threat-protection.md) -- [Troubleshoot Windows Defender Advanced Threat Protection onboarding issues](troubleshoot-onboarding-windows-defender-advanced-threat-protection.md) +- [Run a detection test on a newly onboarded Microsoft Defender ATP machines](run-detection-test-windows-defender-advanced-threat-protection.md) +- [Troubleshoot Microsoft Defender Advanced Threat Protection onboarding issues](troubleshoot-onboarding-windows-defender-advanced-threat-protection.md) diff --git a/windows/security/threat-protection/microsoft-defender-atp/configure-endpoints-mdm.md b/windows/security/threat-protection/microsoft-defender-atp/configure-endpoints-mdm.md index 57ba954930..79a5287504 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/configure-endpoints-mdm.md +++ b/windows/security/threat-protection/microsoft-defender-atp/configure-endpoints-mdm.md @@ -1,7 +1,7 @@ --- title: Onboard Windows 10 machines using Mobile Device Management tools description: Use Mobile Device Management tools to deploy the configuration package on machines so that they are onboarded to the service. -keywords: onboard machines using mdm, machine management, onboard Windows ATP machines, onboard Windows Defender Advanced Threat Protection machines, mdm +keywords: onboard machines using mdm, machine management, onboard Windows ATP machines, onboard Microsoft Defender Advanced Threat Protection machines, mdm search.product: eADQiWindows 10XVcnh search.appverid: met150 ms.prod: w10 @@ -23,13 +23,13 @@ ms.date: 12/06/2018 **Applies to:** -- [Windows Defender Advanced Threat Protection (Windows Defender ATP)](https://go.microsoft.com/fwlink/p/?linkid=2069559) +- [Microsoft Defender Advanced Threat Protection (Microsoft Defender ATP)](https://go.microsoft.com/fwlink/p/?linkid=2069559) ->Want to experience Windows Defender ATP? [Sign up for a free trial.](https://www.microsoft.com/en-us/WindowsForBusiness/windows-atp?ocid=docs-wdatp-configureendpointsmdm-abovefoldlink) +>Want to experience Microsoft Defender ATP? [Sign up for a free trial.](https://www.microsoft.com/en-us/WindowsForBusiness/windows-atp?ocid=docs-wdatp-configureendpointsmdm-abovefoldlink) -You can use mobile device management (MDM) solutions to configure machines. Windows Defender ATP supports MDMs by providing OMA-URIs to create policies to manage machines. +You can use mobile device management (MDM) solutions to configure machines. Microsoft Defender ATP supports MDMs by providing OMA-URIs to create policies to manage machines. -For more information on using Windows Defender ATP CSP see, [WindowsAdvancedThreatProtection CSP](https://msdn.microsoft.com/library/windows/hardware/mt723296(v=vs.85).aspx) and [WindowsAdvancedThreatProtection DDF file](https://msdn.microsoft.com/library/windows/hardware/mt723297(v=vs.85).aspx). +For more information on using Microsoft Defender ATP CSP see, [WindowsAdvancedThreatProtection CSP](https://msdn.microsoft.com/library/windows/hardware/mt723296(v=vs.85).aspx) and [WindowsAdvancedThreatProtection DDF file](https://msdn.microsoft.com/library/windows/hardware/mt723297(v=vs.85).aspx). ## Before you begin If you're using Microsoft Intune, you must have the device MDM Enrolled. Otherwise, settings will not be applied successfully. @@ -40,7 +40,7 @@ For more information on enabling MDM with Microsoft Intune, see [Setup Windows D Follow the instructions from [Intune](https://docs.microsoft.com/intune/advanced-threat-protection). -For more information on using Windows Defender ATP CSP see, [WindowsAdvancedThreatProtection CSP](https://msdn.microsoft.com/library/windows/hardware/mt723296(v=vs.85).aspx) and [WindowsAdvancedThreatProtection DDF file](https://msdn.microsoft.com/library/windows/hardware/mt723297(v=vs.85).aspx). +For more information on using Microsoft Defender ATP CSP see, [WindowsAdvancedThreatProtection CSP](https://msdn.microsoft.com/library/windows/hardware/mt723296(v=vs.85).aspx) and [WindowsAdvancedThreatProtection DDF file](https://msdn.microsoft.com/library/windows/hardware/mt723297(v=vs.85).aspx). > [!NOTE] @@ -49,7 +49,7 @@ For more information on using Windows Defender ATP CSP see, [WindowsAdvancedThre >[!TIP] -> After onboarding the machine, you can choose to run a detection test to verify that a machine is properly onboarded to the service. For more information, see [Run a detection test on a newly onboarded Windows Defender ATP machine](run-detection-test-windows-defender-advanced-threat-protection.md). +> After onboarding the machine, you can choose to run a detection test to verify that a machine is properly onboarded to the service. For more information, see [Run a detection test on a newly onboarded Microsoft Defender ATP machine](run-detection-test-windows-defender-advanced-threat-protection.md). ## Offboard and monitor machines using Mobile Device Management tools For security reasons, the package used to Offboard machines will expire 30 days after the date it was downloaded. Expired offboarding packages sent to a machine will be rejected. When downloading an offboarding package you will be notified of the packages expiry date and it will also be included in the package name. @@ -83,5 +83,5 @@ For security reasons, the package used to Offboard machines will expire 30 days - [Onboard Windows 10 machines using System Center Configuration Manager](configure-endpoints-sccm-windows-defender-advanced-threat-protection.md) - [Onboard Windows 10 machines using a local script](configure-endpoints-script-windows-defender-advanced-threat-protection.md) - [Onboard non-persistent virtual desktop infrastructure (VDI) machines](configure-endpoints-vdi-windows-defender-advanced-threat-protection.md) -- [Run a detection test on a newly onboarded Windows Defender ATP machine](run-detection-test-windows-defender-advanced-threat-protection.md) -- [Troubleshoot Windows Defender Advanced Threat Protection onboarding issues](troubleshoot-onboarding-windows-defender-advanced-threat-protection.md) +- [Run a detection test on a newly onboarded Microsoft Defender ATP machine](run-detection-test-windows-defender-advanced-threat-protection.md) +- [Troubleshoot Microsoft Defender Advanced Threat Protection onboarding issues](troubleshoot-onboarding-windows-defender-advanced-threat-protection.md) diff --git a/windows/security/threat-protection/microsoft-defender-atp/configure-endpoints-non-windows.md b/windows/security/threat-protection/microsoft-defender-atp/configure-endpoints-non-windows.md index de556b2903..f431da0f01 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/configure-endpoints-non-windows.md +++ b/windows/security/threat-protection/microsoft-defender-atp/configure-endpoints-non-windows.md @@ -1,7 +1,7 @@ --- -title: Onboard non-Windows machines to the Windows Defender ATP service -description: Configure non-Winodws machines so that they can send sensor data to the Windows Defender ATP service. -keywords: onboard non-Windows machines, macos, linux, machine management, configure Windows ATP machines, configure Windows Defender Advanced Threat Protection machines +title: Onboard non-Windows machines to the Microsoft Defender ATP service +description: Configure non-Winodws machines so that they can send sensor data to the Microsoft Defender ATP service. +keywords: onboard non-Windows machines, macos, linux, machine management, configure Windows ATP machines, configure Microsoft Defender Advanced Threat Protection machines search.product: eADQiWindows 10XVcnh search.appverid: met150 ms.prod: w10 @@ -22,15 +22,15 @@ ms.topic: article - macOS - Linux -- [Windows Defender Advanced Threat Protection (Windows Defender ATP)](https://go.microsoft.com/fwlink/p/?linkid=2069559) +- [Microsoft Defender Advanced Threat Protection (Microsoft Defender ATP)](https://go.microsoft.com/fwlink/p/?linkid=2069559) ->Want to experience Windows Defender ATP? [Sign up for a free trial.](https://www.microsoft.com/en-us/WindowsForBusiness/windows-atp?ocid=docs-wdatp-nonwindows-abovefoldlink) +>Want to experience Microsoft Defender ATP? [Sign up for a free trial.](https://www.microsoft.com/en-us/WindowsForBusiness/windows-atp?ocid=docs-wdatp-nonwindows-abovefoldlink) -Windows Defender ATP provides a centralized security operations experience for Windows as well as non-Windows platforms. You'll be able to see alerts from various supported operating systems (OS) in Windows Defender Security Center and better protect your organization's network. This experience leverages on a third-party security products’ sensor data. +Microsoft Defender ATP provides a centralized security operations experience for Windows as well as non-Windows platforms. You'll be able to see alerts from various supported operating systems (OS) in Windows Defender Security Center and better protect your organization's network. This experience leverages on a third-party security products’ sensor data. -You'll need to know the exact Linux distros and macOS versions that are compatible with Windows Defender ATP for the integration to work. +You'll need to know the exact Linux distros and macOS versions that are compatible with Microsoft Defender ATP for the integration to work. You'll need to take the following steps to onboard non-Windows machines: 1. Turn on third-party integration @@ -55,7 +55,7 @@ You'll need to take the following steps to onboard non-Windows machines: ### Run detection test Create an EICAR test file by saving the string displayed on the portal in an empty text file. Then, introduce the test file to a machine running the third-party antivirus solution. -The file should trigger a detection and a corresponding alert on Windows Defender ATP. +The file should trigger a detection and a corresponding alert on Microsoft Defender ATP. ## Offboard non-Windows machines To effectively offboard the machine from the service, you'll need to disable the data push on the third-party portal first then switch the toggle to off in Windows Defender Security Center. The toggle in the portal only blocks the data inbound flow. @@ -74,4 +74,4 @@ To effectively offboard the machine from the service, you'll need to disable the - [Onboard Windows 10 machines](configure-endpoints-windows-defender-advanced-threat-protection.md) - [Onboard servers](configure-server-endpoints-windows-defender-advanced-threat-protection.md) - [Configure proxy and Internet connectivity settings](configure-proxy-internet-windows-defender-advanced-threat-protection.md) -- [Troubleshooting Windows Defender Advanced Threat Protection onboarding issues](troubleshoot-onboarding-windows-defender-advanced-threat-protection.md) \ No newline at end of file +- [Troubleshooting Microsoft Defender Advanced Threat Protection onboarding issues](troubleshoot-onboarding-windows-defender-advanced-threat-protection.md) \ No newline at end of file diff --git a/windows/security/threat-protection/microsoft-defender-atp/configure-endpoints-sccm.md b/windows/security/threat-protection/microsoft-defender-atp/configure-endpoints-sccm.md index 4d6b519e13..8a91ad835d 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/configure-endpoints-sccm.md +++ b/windows/security/threat-protection/microsoft-defender-atp/configure-endpoints-sccm.md @@ -1,7 +1,7 @@ --- title: Onboard Windows 10 machines using System Center Configuration Manager description: Use System Center Configuration Manager to deploy the configuration package on machines so that they are onboarded to the service. -keywords: onboard machines using sccm, machine management, configure Windows ATP machines, configure Windows Defender Advanced Threat Protection machines, sccm +keywords: onboard machines using sccm, machine management, configure Windows ATP machines, configure Microsoft Defender Advanced Threat Protection machines, sccm search.product: eADQiWindows 10XVcnh search.appverid: met150 ms.prod: w10 @@ -23,16 +23,16 @@ ms.date: 12/11/2018 **Applies to:** -- [Windows Defender Advanced Threat Protection (Windows Defender ATP)](https://go.microsoft.com/fwlink/p/?linkid=2069559) +- [Microsoft Defender Advanced Threat Protection (Microsoft Defender ATP)](https://go.microsoft.com/fwlink/p/?linkid=2069559) - System Center 2012 Configuration Manager or later versions ->Want to experience Windows Defender ATP? [Sign up for a free trial.](https://www.microsoft.com/en-us/WindowsForBusiness/windows-atp?ocid=docs-wdatp-configureendpointssccm-abovefoldlink) +>Want to experience Microsoft Defender ATP? [Sign up for a free trial.](https://www.microsoft.com/en-us/WindowsForBusiness/windows-atp?ocid=docs-wdatp-configureendpointssccm-abovefoldlink) ## Onboard Windows 10 machines using System Center Configuration Manager (current branch) version 1606 -System Center Configuration Manager (SCCM) (current branch) version 1606, has UI integrated support for configuring and managing Windows Defender ATP on machines. For more information, see [Support for Windows Defender Advanced Threat Protection service](https://go.microsoft.com/fwlink/p/?linkid=823682). +System Center Configuration Manager (SCCM) (current branch) version 1606, has UI integrated support for configuring and managing Microsoft Defender ATP on machines. For more information, see [Support for Microsoft Defender Advanced Threat Protection service](https://go.microsoft.com/fwlink/p/?linkid=823682). >[!NOTE] > If you’re using SCCM client version 1606 with server version 1610 or above, you must upgrade the client version to match the server version. @@ -66,10 +66,10 @@ You can use existing System Center Configuration Manager functionality to create a. Choose a predefined device collection to deploy the package to. > [!NOTE] -> Windows Defender ATP doesn't support onboarding during the [Out-Of-Box Experience (OOBE)](https://answers.microsoft.com/en-us/windows/wiki/windows_10/how-to-complete-the-windows-10-out-of-box/47e3f943-f000-45e3-8c5c-9d85a1a0cf87) phase. Make sure users complete OOBE after running Windows installation or upgrading. +> Microsoft Defender ATP doesn't support onboarding during the [Out-Of-Box Experience (OOBE)](https://answers.microsoft.com/en-us/windows/wiki/windows_10/how-to-complete-the-windows-10-out-of-box/47e3f943-f000-45e3-8c5c-9d85a1a0cf87) phase. Make sure users complete OOBE after running Windows installation or upgrading. >[!TIP] -> After onboarding the machine, you can choose to run a detection test to verify that an machine is properly onboarded to the service. For more information, see [Run a detection test on a newly onboarded Windows Defender ATP machine](run-detection-test-windows-defender-advanced-threat-protection.md). +> After onboarding the machine, you can choose to run a detection test to verify that an machine is properly onboarded to the service. For more information, see [Run a detection test on a newly onboarded Microsoft Defender ATP machine](run-detection-test-windows-defender-advanced-threat-protection.md). ### Configure sample collection settings For each machine, you can set a configuration value to state whether samples can be collected from the machine when a request is made through Windows Defender Security Center to submit a file for deep analysis. @@ -128,7 +128,7 @@ Monitoring with SCCM consists of two parts: 1. Confirming the configuration package has been correctly deployed and is running (or has successfully run) on the machines in your network. -2. Checking that the machines are compliant with the Windows Defender ATP service (this ensures the machine can complete the onboarding process and can continue to report data to the service). +2. Checking that the machines are compliant with the Microsoft Defender ATP service (this ensures the machine can complete the onboarding process and can continue to report data to the service). **To confirm the configuration package has been correctly deployed:** @@ -140,11 +140,11 @@ Monitoring with SCCM consists of two parts: 4. Review the status indicators under **Completion Statistics** and **Content Status**. -If there are failed deployments (machines with **Error**, **Requirements Not Met**, or **Failed statuses**), you may need to troubleshoot the machines. For more information see, [Troubleshoot Windows Defender Advanced Threat Protection onboarding issues](troubleshoot-onboarding-windows-defender-advanced-threat-protection.md). +If there are failed deployments (machines with **Error**, **Requirements Not Met**, or **Failed statuses**), you may need to troubleshoot the machines. For more information see, [Troubleshoot Microsoft Defender Advanced Threat Protection onboarding issues](troubleshoot-onboarding-windows-defender-advanced-threat-protection.md). ![SCCM showing successful deployment with no errors](images/sccm-deployment.png) -**Check that the machines are compliant with the Windows Defender ATP service:**
      +**Check that the machines are compliant with the Microsoft Defender ATP service:**
      You can set a compliance rule for configuration item in System Center Configuration Manager to monitor your deployment. This rule should be a *non-remediating* compliance rule configuration item that monitors the value of a registry key on targeted machines. @@ -162,5 +162,5 @@ For more information about System Center Configuration Manager Compliance see [G - [Onboard Windows 10 machines using Mobile Device Management tools](configure-endpoints-mdm-windows-defender-advanced-threat-protection.md) - [Onboard Windows 10 machines using a local script](configure-endpoints-script-windows-defender-advanced-threat-protection.md) - [Onboard non-persistent virtual desktop infrastructure (VDI) machines](configure-endpoints-vdi-windows-defender-advanced-threat-protection.md) -- [Run a detection test on a newly onboarded Windows Defender ATP machine](run-detection-test-windows-defender-advanced-threat-protection.md) -- [Troubleshoot Windows Defender Advanced Threat Protection onboarding issues](troubleshoot-onboarding-windows-defender-advanced-threat-protection.md) +- [Run a detection test on a newly onboarded Microsoft Defender ATP machine](run-detection-test-windows-defender-advanced-threat-protection.md) +- [Troubleshoot Microsoft Defender Advanced Threat Protection onboarding issues](troubleshoot-onboarding-windows-defender-advanced-threat-protection.md) diff --git a/windows/security/threat-protection/microsoft-defender-atp/configure-endpoints-script.md b/windows/security/threat-protection/microsoft-defender-atp/configure-endpoints-script.md index fee63e07dd..9b0d319050 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/configure-endpoints-script.md +++ b/windows/security/threat-protection/microsoft-defender-atp/configure-endpoints-script.md @@ -1,7 +1,7 @@ --- title: Onboard Windows 10 machines using a local script description: Use a local script to deploy the configuration package on machines so that they are onboarded to the service. -keywords: configure machines using a local script, machine management, configure Windows ATP machines, configure Windows Defender Advanced Threat Protection machines +keywords: configure machines using a local script, machine management, configure Windows ATP machines, configure Microsoft Defender Advanced Threat Protection machines search.product: eADQiWindows 10XVcnh search.appverid: met150 ms.prod: w10 @@ -22,14 +22,14 @@ ms.topic: article **Applies to:** -- [Windows Defender Advanced Threat Protection (Windows Defender ATP)](https://go.microsoft.com/fwlink/p/?linkid=2069559) +- [Microsoft Defender Advanced Threat Protection (Microsoft Defender ATP)](https://go.microsoft.com/fwlink/p/?linkid=2069559) ->Want to experience Windows Defender ATP? [Sign up for a free trial.](https://www.microsoft.com/en-us/WindowsForBusiness/windows-atp?ocid=docs-wdatp-configureendpointsscript-abovefoldlink) +>Want to experience Microsoft Defender ATP? [Sign up for a free trial.](https://www.microsoft.com/en-us/WindowsForBusiness/windows-atp?ocid=docs-wdatp-configureendpointsscript-abovefoldlink) -You can also manually onboard individual machines to Windows Defender ATP. You might want to do this first when testing the service before you commit to onboarding all machines in your network. +You can also manually onboard individual machines to Microsoft Defender ATP. You might want to do this first when testing the service before you commit to onboarding all machines in your network. > [!NOTE] > The script has been optimized to be used on a limited number of machines (1-10 machines). To deploy to scale, use other deployment options. For more information on using other deployment options, see [Onboard Window 10 machines](configure-endpoints-windows-defender-advanced-threat-protection.md). @@ -60,11 +60,11 @@ You can also manually onboard individual machines to Windows Defender ATP. You m 5. Press the **Enter** key or click **OK**. -For information on how you can manually validate that the machine is compliant and correctly reports sensor data see, [Troubleshoot Windows Defender Advanced Threat Protection onboarding issues](troubleshoot-onboarding-windows-defender-advanced-threat-protection.md). +For information on how you can manually validate that the machine is compliant and correctly reports sensor data see, [Troubleshoot Microsoft Defender Advanced Threat Protection onboarding issues](troubleshoot-onboarding-windows-defender-advanced-threat-protection.md). >[!TIP] -> After onboarding the machine, you can choose to run a detection test to verify that an machine is properly onboarded to the service. For more information, see [Run a detection test on a newly onboarded Windows Defender ATP endpoint](run-detection-test-windows-defender-advanced-threat-protection.md). +> After onboarding the machine, you can choose to run a detection test to verify that an machine is properly onboarded to the service. For more information, see [Run a detection test on a newly onboarded Microsoft Defender ATP endpoint](run-detection-test-windows-defender-advanced-threat-protection.md). ## Configure sample collection settings For each machine, you can set a configuration value to state whether samples can be collected from the machine when a request is made through Windows Defender Security Center to submit a file for deep analysis. @@ -139,5 +139,5 @@ Monitoring can also be done directly on the portal, or by using the different de - [Onboard Windows 10 machines using System Center Configuration Manager](configure-endpoints-sccm-windows-defender-advanced-threat-protection.md) - [Onboard Windows 10 machines using Mobile Device Management tools](configure-endpoints-mdm-windows-defender-advanced-threat-protection.md) - [Onboard non-persistent virtual desktop infrastructure (VDI) machines](configure-endpoints-vdi-windows-defender-advanced-threat-protection.md) -- [Run a detection test on a newly onboarded Windows Defender ATP machine](run-detection-test-windows-defender-advanced-threat-protection.md) -- [Troubleshoot Windows Defender Advanced Threat Protection onboarding issues](troubleshoot-onboarding-windows-defender-advanced-threat-protection.md) +- [Run a detection test on a newly onboarded Microsoft Defender ATP machine](run-detection-test-windows-defender-advanced-threat-protection.md) +- [Troubleshoot Microsoft Defender Advanced Threat Protection onboarding issues](troubleshoot-onboarding-windows-defender-advanced-threat-protection.md) diff --git a/windows/security/threat-protection/microsoft-defender-atp/configure-endpoints-vdi.md b/windows/security/threat-protection/microsoft-defender-atp/configure-endpoints-vdi.md index 8ee8615f84..be05604d0b 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/configure-endpoints-vdi.md +++ b/windows/security/threat-protection/microsoft-defender-atp/configure-endpoints-vdi.md @@ -1,7 +1,7 @@ --- title: Onboard non-persistent virtual desktop infrastructure (VDI) machines -description: Deploy the configuration package on virtual desktop infrastructure (VDI) machine so that they are onboarded to Windows Defender ATP the service. -keywords: configure virtual desktop infrastructure (VDI) machine, vdi, machine management, configure Windows ATP endpoints, configure Windows Defender Advanced Threat Protection endpoints +description: Deploy the configuration package on virtual desktop infrastructure (VDI) machine so that they are onboarded to Microsoft Defender ATP the service. +keywords: configure virtual desktop infrastructure (VDI) machine, vdi, machine management, configure Windows ATP endpoints, configure Microsoft Defender Advanced Threat Protection endpoints search.product: eADQiWindows 10XVcnh search.appverid: met150 ms.prod: w10 @@ -25,15 +25,15 @@ ms.date: 04/24/2018 ->Want to experience Windows Defender ATP? [Sign up for a free trial.](https://www.microsoft.com/en-us/WindowsForBusiness/windows-atp?ocid=docs-wdatp-configvdi-abovefoldlink) +>Want to experience Microsoft Defender ATP? [Sign up for a free trial.](https://www.microsoft.com/en-us/WindowsForBusiness/windows-atp?ocid=docs-wdatp-configvdi-abovefoldlink) ## Onboard non-persistent virtual desktop infrastructure (VDI) machines -Windows Defender ATP supports non-persistent VDI session onboarding. There might be associated challenges when onboarding VDIs. The following are typical challenges for this scenario: +Microsoft Defender ATP supports non-persistent VDI session onboarding. There might be associated challenges when onboarding VDIs. The following are typical challenges for this scenario: - Instant early onboarding of a short living session - - A session should be onboarded to Windows Defender ATP prior to the actual provisioning. + - A session should be onboarded to Microsoft Defender ATP prior to the actual provisioning. - Machine name persistence - The machine names are typically reused for new sessions. One may ask to have them as a single machine entry while others may prefer to have multiple entries per machine name. @@ -41,7 +41,7 @@ Windows Defender ATP supports non-persistent VDI session onboarding. There might You can onboard VDI machines using a single entry or multiple entries for each machine. The following steps will guide you through onboarding VDI machines and will highlight steps for single and multiple entries. >[!WARNING] -> For environments where there are low resource configurations, the VDI boot proceedure might slow the Windows Defender ATP sensor onboarding. +> For environments where there are low resource configurations, the VDI boot proceedure might slow the Microsoft Defender ATP sensor onboarding. 1. Open the VDI configuration package .zip file (*WindowsDefenderATPOnboardingPackage.zip*) that you downloaded from the service onboarding wizard. You can also get the package from [Windows Defender Security Center](https://securitycenter.windows.com/): @@ -95,6 +95,6 @@ You can onboard VDI machines using a single entry or multiple entries for each m - [Onboard Windows 10 machines using System Center Configuration Manager](configure-endpoints-sccm-windows-defender-advanced-threat-protection.md) - [Onboard Windows 10 machines using Mobile Device Management tools](configure-endpoints-mdm-windows-defender-advanced-threat-protection.md) - [Onboard Windows 10 machines using a local script](configure-endpoints-script-windows-defender-advanced-threat-protection.md) -- [Troubleshoot Windows Defender Advanced Threat Protection onboarding issues](troubleshoot-onboarding-windows-defender-advanced-threat-protection.md) +- [Troubleshoot Microsoft Defender Advanced Threat Protection onboarding issues](troubleshoot-onboarding-windows-defender-advanced-threat-protection.md) diff --git a/windows/security/threat-protection/microsoft-defender-atp/configure-endpoints.md b/windows/security/threat-protection/microsoft-defender-atp/configure-endpoints.md index dc4a53e6ea..69ddf03031 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/configure-endpoints.md +++ b/windows/security/threat-protection/microsoft-defender-atp/configure-endpoints.md @@ -1,6 +1,6 @@ --- -title: Onboard Windows 10 machines on Windows Defender ATP -description: Onboard Windows 10 machines so that they can send sensor data to the Windows Defender ATP sensor +title: Onboard Windows 10 machines on Microsoft Defender ATP +description: Onboard Windows 10 machines so that they can send sensor data to the Microsoft Defender ATP sensor keywords: Onboard Windows 10 machines, group policy, system center configuration manager, mobile device management, local script, gp, sccm, mdm, intune search.product: eADQiWindows 10XVcnh search.appverid: met150 @@ -23,11 +23,11 @@ ms.date: 07/12/2018 **Applies to:** -- [Windows Defender Advanced Threat Protection (Windows Defender ATP)](https://go.microsoft.com/fwlink/p/?linkid=2069559) +- [Microsoft Defender Advanced Threat Protection (Microsoft Defender ATP)](https://go.microsoft.com/fwlink/p/?linkid=2069559) -Machines in your organization must be configured so that the Windows Defender ATP service can get sensor data from them. There are various methods and deployment tools that you can use to configure the machines in your organization. +Machines in your organization must be configured so that the Microsoft Defender ATP service can get sensor data from them. There are various methods and deployment tools that you can use to configure the machines in your organization. The following deployment tools and methods are supported: @@ -46,4 +46,4 @@ Topic | Description [Onboard non-persistent virtual desktop infrastructure (VDI) machines](configure-endpoints-vdi-windows-defender-advanced-threat-protection.md) | Learn how to use the configuration package to configure VDI machines. ->Want to experience Windows Defender ATP? [Sign up for a free trial.](https://www.microsoft.com/en-us/WindowsForBusiness/windows-atp?ocid=docs-wdatp-configureendpoints-belowfoldlink) \ No newline at end of file +>Want to experience Microsoft Defender ATP? [Sign up for a free trial.](https://www.microsoft.com/en-us/WindowsForBusiness/windows-atp?ocid=docs-wdatp-configureendpoints-belowfoldlink) \ No newline at end of file diff --git a/windows/security/threat-protection/microsoft-defender-atp/configure-microsoft-threat-experts.md b/windows/security/threat-protection/microsoft-defender-atp/configure-microsoft-threat-experts.md index 8e6edc791b..0f0180a75a 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/configure-microsoft-threat-experts.md +++ b/windows/security/threat-protection/microsoft-defender-atp/configure-microsoft-threat-experts.md @@ -21,18 +21,18 @@ ms.date: 02/28/2019 # Configure and manage Microsoft Threat Experts capabilities **Applies to:** -- [Windows Defender Advanced Threat Protection (Windows Defender ATP)](https://go.microsoft.com/fwlink/p/?linkid=2069559) +- [Microsoft Defender Advanced Threat Protection (Microsoft Defender ATP)](https://go.microsoft.com/fwlink/p/?linkid=2069559) [!include[Prerelease�information](prerelease.md)] ## Before you begin -To experience the full Microsoft Threat Experts preview capability in Windows Defender ATP, you need to have a valid Premier customer service and support account. However, Premier charges will not be incurred during the preview. +To experience the full Microsoft Threat Experts preview capability in Microsoft Defender ATP, you need to have a valid Premier customer service and support account. However, Premier charges will not be incurred during the preview. -You also need to ensure that you have Windows Defender ATP deployed in your environment with machines enrolled, and not just on a laboratory set-up. +You also need to ensure that you have Microsoft Defender ATP deployed in your environment with machines enrolled, and not just on a laboratory set-up. ## Register to Microsoft Threat Experts preview -If you're already a Windows Defender ATP customer, you can apply for preview through the Windows Defender ATP portal. +If you're already a Microsoft Defender ATP customer, you can apply for preview through the Microsoft Defender ATP portal. 1. From the navigation pane, go to **Settings > General > Advanced features > Threat Experts**. @@ -50,7 +50,7 @@ If you're already a Windows Defender ATP customer, you can apply for preview thr ## Receive targeted attack notification from Microsoft Threat Experts You can receive targeted attack notification from Microsoft Threat Experts through the following: -- The Windows Defender ATP portal's **Alerts** dashboard +- The Microsoft Defender ATP portal's **Alerts** dashboard - Your email, if you choose to configure it To receive targeted attack notifications through email, you need to create an email notification rule. @@ -83,13 +83,13 @@ You can partner with Microsoft Threat Experts who can be engaged directly from w **Step 2: Open a support ticket** >[!NOTE] - >To experience the full Microsoft Threat Experts preview capability in Windows Defender ATP, you need to have a Premier customer service and support account. However, you will not be charged for the Experts-on-demand service during the preview. + >To experience the full Microsoft Threat Experts preview capability in Microsoft Defender ATP, you need to have a Premier customer service and support account. However, you will not be charged for the Experts-on-demand service during the preview. a. In the **New support request** customer support page, select the following from the dropdown menu and then click **Next**:
      **Select the product family**: **Security**
      **Select a product**: **Microsoft Threat Experts**
      - **Select a category that best describes the issue**: **Windows Defender ATP**
      + **Select a category that best describes the issue**: **Microsoft Defender ATP**
      **Select a problem that best describes the issue**: Choose according to your inquiry category
      b. Fill out the fields with the necessary information about the issue and use the auto-generated ID when you open a Customer Services and Support (CSS) ticket. Then, click **Next**.
      diff --git a/windows/security/threat-protection/microsoft-defender-atp/configure-mssp-support.md b/windows/security/threat-protection/microsoft-defender-atp/configure-mssp-support.md index 738c8f0548..3dd2f86f1f 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/configure-mssp-support.md +++ b/windows/security/threat-protection/microsoft-defender-atp/configure-mssp-support.md @@ -1,6 +1,6 @@ --- title: Configure managed security service provider support -description: Take the necessary steps to configure the MSSP integration with Windows Defender ATP +description: Take the necessary steps to configure the MSSP integration with Microsoft Defender ATP keywords: managed security service provider, mssp, configure, integration search.product: eADQiWindows 10XVcnh search.appverid: met150 @@ -21,9 +21,9 @@ ms.date: 09/03/2018 # Configure managed security service provider integration **Applies to:** -- [Windows Defender Advanced Threat Protection (Windows Defender ATP)](https://go.microsoft.com/fwlink/p/?linkid=2069559) +- [Microsoft Defender Advanced Threat Protection (Microsoft Defender ATP)](https://go.microsoft.com/fwlink/p/?linkid=2069559) ->Want to experience Windows Defender ATP? [Sign up for a free trial.](https://www.microsoft.com/en-us/WindowsForBusiness/windows-atp?ocid=docs-mssp-support-abovefoldlink) +>Want to experience Microsoft Defender ATP? [Sign up for a free trial.](https://www.microsoft.com/en-us/WindowsForBusiness/windows-atp?ocid=docs-mssp-support-abovefoldlink) [!include[Prerelease information](prerelease.md)] @@ -39,7 +39,7 @@ The integration will allow MSSPs to take the following actions: - Get email notifications, and - Fetch alerts through security information and event management (SIEM) tools -Before MSSPs can take these actions, the MSSP customer will need to grant access to their Windows Defender ATP tenant so that the MSSP can access the portal. +Before MSSPs can take these actions, the MSSP customer will need to grant access to their Microsoft Defender ATP tenant so that the MSSP can access the portal. Typically, MSSP customers take the initial configuration steps to grant MSSPs access to their Windows Defender Security Central tenant. After access is granted, other configuration steps can be done by either the MSSP customer or the MSSP. @@ -47,7 +47,7 @@ Typically, MSSP customers take the initial configuration steps to grant MSSPs ac In general, the following configuration steps need to be taken: - **Grant the MSSP access to Windows Defender Security Center**
      -This action needs to be done by the MSSP customer. It grants the MSSP access to the MSSP customer's Windows Defender ATP tenant. +This action needs to be done by the MSSP customer. It grants the MSSP access to the MSSP customer's Microsoft Defender ATP tenant. - **Configure alert notifications sent to MSSPs**
      This action can be taken by either the MSSP customer or MSSP. This lets the MSSPs know what alerts they need to address for the MSSP customer. @@ -85,7 +85,7 @@ Granting access to guest user is done the same way as granting access to a user If you're using basic permissions to access the portal, the guest user must be assigned a Security Administrator role in **your** tenant. For more information, see [Use basic permissions to access the portal](basic-permissions-windows-defender-advanced-threat-protection.md). -If you're using role-based access control (RBAC), the guest user must be to added to the appropriate group or groups in **your** tenant. Fore more information on RBAC in Windows Defender ATP, see [Manage portal access using RBAC](rbac-windows-defender-advanced-threat-protection.md). +If you're using role-based access control (RBAC), the guest user must be to added to the appropriate group or groups in **your** tenant. Fore more information on RBAC in Microsoft Defender ATP, see [Manage portal access using RBAC](rbac-windows-defender-advanced-threat-protection.md). >[!NOTE] >There is no difference between the Member user and Guest user roles from RBAC perspective. @@ -147,7 +147,7 @@ Step 3: Whitelist your application on Windows Defender Security Center ### Step 1: Create an application in Azure Active Directory (Azure AD) -You'll need to create an application and grant it permissions to fetch alerts from your customer's Windows Defender ATP tenant. +You'll need to create an application and grant it permissions to fetch alerts from your customer's Microsoft Defender ATP tenant. 1. Sign in to the [Azure AD portal](https://aad.portal.azure.com/). @@ -272,7 +272,7 @@ You'll need to have **Manage portal system settings** permission to whitelist th 5. Click **Authorize application**. -You can now download the relevant configuration file for your SIEM and connect to the Windows Defender ATP API. For more information see, [Pull alerts to your SIEM tools](configure-siem-windows-defender-advanced-threat-protection.md). +You can now download the relevant configuration file for your SIEM and connect to the Microsoft Defender ATP API. For more information see, [Pull alerts to your SIEM tools](configure-siem-windows-defender-advanced-threat-protection.md). - In the ArcSight configuration file / Splunk Authentication Properties file – you will have to write your application key manually by settings the secret value. - Instead of acquiring a refresh token in the portal, use the script from the previous step to acquire a refresh token (or acquire it by other means). diff --git a/windows/security/threat-protection/microsoft-defender-atp/configure-proxy-internet.md b/windows/security/threat-protection/microsoft-defender-atp/configure-proxy-internet.md index 595b8af148..bc9f3d4a50 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/configure-proxy-internet.md +++ b/windows/security/threat-protection/microsoft-defender-atp/configure-proxy-internet.md @@ -1,6 +1,6 @@ --- title: Configure machine proxy and Internet connection settings -description: Configure the Windows Defender ATP proxy and internet settings to enable communication with the cloud service. +description: Configure the Microsoft Defender ATP proxy and internet settings to enable communication with the cloud service. keywords: configure, proxy, internet, internet connectivity, settings, proxy settings, netsh, winhttp, proxy server search.product: eADQiWindows 10XVcnh search.appverid: met150 @@ -21,15 +21,15 @@ ms.topic: article # Configure machine proxy and Internet connectivity settings **Applies to:** -- [Windows Defender Advanced Threat Protection (Windows Defender ATP)](https://go.microsoft.com/fwlink/p/?linkid=2069559) +- [Microsoft Defender Advanced Threat Protection (Microsoft Defender ATP)](https://go.microsoft.com/fwlink/p/?linkid=2069559) ->Want to experience Windows Defender ATP? [Sign up for a free trial.](https://www.microsoft.com/en-us/WindowsForBusiness/windows-atp?ocid=docs-wdatp-configureendpointsscript-abovefoldlink) +>Want to experience Microsoft Defender ATP? [Sign up for a free trial.](https://www.microsoft.com/en-us/WindowsForBusiness/windows-atp?ocid=docs-wdatp-configureendpointsscript-abovefoldlink) -The Windows Defender ATP sensor requires Microsoft Windows HTTP (WinHTTP) to report sensor data and communicate with the Windows Defender ATP service. +The Microsoft Defender ATP sensor requires Microsoft Windows HTTP (WinHTTP) to report sensor data and communicate with the Microsoft Defender ATP service. -The embedded Windows Defender ATP sensor runs in system context using the LocalSystem account. The sensor uses Microsoft Windows HTTP Services (WinHTTP) to enable communication with the Windows Defender ATP cloud service. +The embedded Microsoft Defender ATP sensor runs in system context using the LocalSystem account. The sensor uses Microsoft Windows HTTP Services (WinHTTP) to enable communication with the Microsoft Defender ATP cloud service. The WinHTTP configuration setting is independent of the Windows Internet (WinINet) internet browsing proxy settings and can only discover a proxy server by using the following discovery methods: @@ -38,7 +38,7 @@ The WinHTTP configuration setting is independent of the Windows Internet (WinINe - Web Proxy Auto-discovery Protocol (WPAD) > [!NOTE] -> If you're using Transparent proxy or WPAD in your network topology, you don't need special configuration settings. For more information on Windows Defender ATP URL exclusions in the proxy, see [Enable access to Windows Defender ATP service URLs in the proxy server](#enable-access-to-windows-defender-atp-service-urls-in-the-proxy-server). +> If you're using Transparent proxy or WPAD in your network topology, you don't need special configuration settings. For more information on Microsoft Defender ATP URL exclusions in the proxy, see [Enable access to Microsoft Defender ATP service URLs in the proxy server](#enable-access-to-windows-defender-atp-service-urls-in-the-proxy-server). - Manual static proxy configuration: @@ -46,7 +46,7 @@ The WinHTTP configuration setting is independent of the Windows Internet (WinINe - WinHTTP configured using netsh command – Suitable only for desktops in a stable topology (for example: a desktop in a corporate network behind the same proxy) ## Configure the proxy server manually using a registry-based static proxy -Configure a registry-based static proxy to allow only Windows Defender ATP sensor to report diagnostic data and communicate with Windows Defender ATP services if a computer is not be permitted to connect to the Internet. +Configure a registry-based static proxy to allow only Microsoft Defender ATP sensor to report diagnostic data and communicate with Microsoft Defender ATP services if a computer is not be permitted to connect to the Internet. The static proxy is configurable through Group Policy (GP). The group policy can be found under: - Administrative Templates > Windows Components > Data Collection and Preview Builds > Configure Authenticated Proxy usage for the Connected User Experience and Telemetry Service @@ -87,8 +87,8 @@ netsh winhttp set proxy : ``` For example: netsh winhttp set proxy 10.0.0.6:8080 -## Enable access to Windows Defender ATP service URLs in the proxy server -If a proxy or firewall is blocking all traffic by default and allowing only specific domains through or HTTPS scanning (SSL inspection) is enabled, make sure that the following URLs are not blocked by default. Do not disable security monitoring or inspection of these URLs, but allow them as you would other internet traffic. They permit communication with Windows Defender ATP service in port 80 and 443: +## Enable access to Microsoft Defender ATP service URLs in the proxy server +If a proxy or firewall is blocking all traffic by default and allowing only specific domains through or HTTPS scanning (SSL inspection) is enabled, make sure that the following URLs are not blocked by default. Do not disable security monitoring or inspection of these URLs, but allow them as you would other internet traffic. They permit communication with Microsoft Defender ATP service in port 80 and 443: >[!NOTE] > URLs that include v20 in them are only needed if you have Windows 10, version 1803 or later machines. For example, ```us-v20.events.data.microsoft.com``` is only needed if the machine is on Windows 10, version 1803 or later. @@ -102,12 +102,12 @@ United States | ```us.vortex-win.data.microsoft.com```
      ```us-v20.events.data -If a proxy or firewall is blocking anonymous traffic, as Windows Defender ATP sensor is connecting from system context, make sure anonymous traffic is permitted in the previously listed URLs. +If a proxy or firewall is blocking anonymous traffic, as Microsoft Defender ATP sensor is connecting from system context, make sure anonymous traffic is permitted in the previously listed URLs. -## Windows Defender ATP service backend IP range +## Microsoft Defender ATP service backend IP range If you network devices don't support the URLs white-listed in the prior section, you can use the following information. -Windows Defender ATP is built on Azure cloud, deployed in the following regions: +Microsoft Defender ATP is built on Azure cloud, deployed in the following regions: - \+\ - \+\ @@ -124,11 +124,11 @@ You can find the Azure IP range on [Microsoft Azure Datacenter IP Ranges](https: > As a cloud-based solution, the IP range can change. It's recommended you move to DNS resolving setting. -## Verify client connectivity to Windows Defender ATP service URLs +## Verify client connectivity to Microsoft Defender ATP service URLs -Verify the proxy configuration completed successfully, that WinHTTP can discover and communicate through the proxy server in your environment, and that the proxy server allows traffic to the Windows Defender ATP service URLs. +Verify the proxy configuration completed successfully, that WinHTTP can discover and communicate through the proxy server in your environment, and that the proxy server allows traffic to the Microsoft Defender ATP service URLs. -1. Download the [connectivity verification tool](https://go.microsoft.com/fwlink/p/?linkid=823683) to the PC where Windows Defender ATP sensor is running on. +1. Download the [connectivity verification tool](https://go.microsoft.com/fwlink/p/?linkid=823683) to the PC where Microsoft Defender ATP sensor is running on. 2. Extract the contents of WDATPConnectivityAnalyzer on the machine. @@ -151,7 +151,7 @@ Verify the proxy configuration completed successfully, that WinHTTP can discover 5. Extract the *WDATPConnectivityAnalyzerResult.zip* file created by tool in the folder used in the *HardDrivePath*. 6. Open *WDATPConnectivityAnalyzer.txt* and verify that you have performed the proxy configuration steps to enable server discovery and access to the service URLs.

      -The tool checks the connectivity of Windows Defender ATP service URLs that Windows Defender ATP client is configured to interact with. It then prints the results into the *WDATPConnectivityAnalyzer.txt* file for each URL that can potentially be used to communicate with the Windows Defender ATP services. For example: +The tool checks the connectivity of Microsoft Defender ATP service URLs that Microsoft Defender ATP client is configured to interact with. It then prints the results into the *WDATPConnectivityAnalyzer.txt* file for each URL that can potentially be used to communicate with the Microsoft Defender ATP services. For example: ```text Testing URL : https://xxx.microsoft.com/xxx 1 - Default proxy: Succeeded (200) @@ -161,13 +161,13 @@ The tool checks the connectivity of Windows Defender ATP service URLs that Windo 5 - Command line proxy: Doesn't exist ``` -If at least one of the connectivity options returns a (200) status, then the Windows Defender ATP client can communicate with the tested URL properly using this connectivity method.

      +If at least one of the connectivity options returns a (200) status, then the Microsoft Defender ATP client can communicate with the tested URL properly using this connectivity method.

      -However, if the connectivity check results indicate a failure, an HTTP error is displayed (see HTTP Status Codes). You can then use the URLs in the table shown in [Enable access to Windows Defender ATP service URLs in the proxy server](#enable-access-to-windows-defender-atp-service-urls-in-the-proxy-server). The URLs you'll use will depend on the region selected during the onboarding procedure. +However, if the connectivity check results indicate a failure, an HTTP error is displayed (see HTTP Status Codes). You can then use the URLs in the table shown in [Enable access to Microsoft Defender ATP service URLs in the proxy server](#enable-access-to-windows-defender-atp-service-urls-in-the-proxy-server). The URLs you'll use will depend on the region selected during the onboarding procedure. > [!NOTE] -> When the TelemetryProxyServer is set, in Registry or via Group Policy, Windows Defender ATP will fall back to direct if it can't access the defined proxy. +> When the TelemetryProxyServer is set, in Registry or via Group Policy, Microsoft Defender ATP will fall back to direct if it can't access the defined proxy. ## Related topics - [Onboard Windows 10 machines](configure-endpoints-windows-defender-advanced-threat-protection.md) -- [Troubleshoot Windows Defender Advanced Threat Protection onboarding issues](troubleshoot-onboarding-windows-defender-advanced-threat-protection.md) +- [Troubleshoot Microsoft Defender Advanced Threat Protection onboarding issues](troubleshoot-onboarding-windows-defender-advanced-threat-protection.md) diff --git a/windows/security/threat-protection/microsoft-defender-atp/configure-server-endpoints.md b/windows/security/threat-protection/microsoft-defender-atp/configure-server-endpoints.md index 03df5ce551..b247126bb2 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/configure-server-endpoints.md +++ b/windows/security/threat-protection/microsoft-defender-atp/configure-server-endpoints.md @@ -1,7 +1,7 @@ --- -title: Onboard servers to the Windows Defender ATP service -description: Onboard servers so that they can send sensor data to the Windows Defender ATP sensor. -keywords: onboard server, server, 2012r2, 2016, 2019, server onboarding, machine management, configure Windows ATP servers, onboard Windows Defender Advanced Threat Protection servers +title: Onboard servers to the Microsoft Defender ATP service +description: Onboard servers so that they can send sensor data to the Microsoft Defender ATP sensor. +keywords: onboard server, server, 2012r2, 2016, 2019, server onboarding, machine management, configure Windows ATP servers, onboard Microsoft Defender Advanced Threat Protection servers search.product: eADQiWindows 10XVcnh search.appverid: met150 ms.prod: w10 @@ -16,7 +16,7 @@ ms.collection: M365-security-compliance ms.topic: article --- -# Onboard servers to the Windows Defender ATP service +# Onboard servers to the Microsoft Defender ATP service **Applies to:** @@ -24,14 +24,14 @@ ms.topic: article - Windows Server 2016 - Windows Server, version 1803 - Windows Server, 2019 -- [Windows Defender Advanced Threat Protection (Windows Defender ATP)](https://go.microsoft.com/fwlink/p/?linkid=2069559) +- [Microsoft Defender Advanced Threat Protection (Microsoft Defender ATP)](https://go.microsoft.com/fwlink/p/?linkid=2069559) [!include[Prerelease information](prerelease.md)] ->Want to experience Windows Defender ATP? [Sign up for a free trial.](https://www.microsoft.com/en-us/WindowsForBusiness/windows-atp?ocid=docs-wdatp-configserver-abovefoldlink) +>Want to experience Microsoft Defender ATP? [Sign up for a free trial.](https://www.microsoft.com/en-us/WindowsForBusiness/windows-atp?ocid=docs-wdatp-configserver-abovefoldlink) -Windows Defender ATP extends support to also include the Windows Server operating system, providing advanced attack detection and investigation capabilities, seamlessly through the Windows Defender Security Center console. +Microsoft Defender ATP extends support to also include the Windows Server operating system, providing advanced attack detection and investigation capabilities, seamlessly through the Windows Defender Security Center console. The service supports the onboarding of the following servers: - Windows Server 2012 R2 @@ -40,11 +40,11 @@ The service supports the onboarding of the following servers: - Windows Server 2019 -For a practical guidance on what needs to be in place for licensing and infrastructure, see [Protecting Windows Servers with Windows Defender ATP](https://techcommunity.microsoft.com/t5/What-s-New/Protecting-Windows-Server-with-Windows-Defender-ATP/m-p/267114#M128). +For a practical guidance on what needs to be in place for licensing and infrastructure, see [Protecting Windows Servers with Microsoft Defender ATP](https://techcommunity.microsoft.com/t5/What-s-New/Protecting-Windows-Server-with-Windows-Defender-ATP/m-p/267114#M128). ## Windows Server 2012 R2 and Windows Server 2016 -There are two options to onboard Windows Server 2012 R2 and Windows Server 2016 to Windows Defender ATP: +There are two options to onboard Windows Server 2012 R2 and Windows Server 2016 to Microsoft Defender ATP: - **Option 1**: Onboard through Azure Security Center - **Option 2**: Onboard through Windows Defender Security Center @@ -56,7 +56,7 @@ There are two options to onboard Windows Server 2012 R2 and Windows Server 2016 3. Click **Onboard Servers in Azure Security Center**. -4. Follow the onboarding instructions in [Windows Defender Advanced Threat Protection with Azure Security Center](https://docs.microsoft.com/azure/security-center/security-center-wdatp). +4. Follow the onboarding instructions in [Microsoft Defender Advanced Threat Protection with Azure Security Center](https://docs.microsoft.com/azure/security-center/security-center-wdatp). ### Option 2: Onboard servers through Windows Defender Security Center You'll need to tak the following steps if you choose to onboard servers through Windows Defender Security Center. @@ -67,16 +67,16 @@ You'll need to tak the following steps if you choose to onboard servers through >This step is required only if your organization uses System Center Endpoint Protection (SCEP) and you're onboarding Windows Server 2012 R2. - Turn on server monitoring from Windows Defender Security Center. -- If you're already leveraging System Center Operations Manager (SCOM) or Azure Monitor (formerly known as Operations Management Suite (OMS)), simply attach the Microsoft Monitoring Agent (MMA) to report to your Windows Defender ATP workspace through Multi Homing support. Otherwise, install and configure MMA to report sensor data to Windows Defender ATP as instructed below. For more information, see [Collect log data with Azure Log Analytics agent](https://docs.microsoft.com/azure/azure-monitor/platform/log-analytics-agent). +- If you're already leveraging System Center Operations Manager (SCOM) or Azure Monitor (formerly known as Operations Management Suite (OMS)), simply attach the Microsoft Monitoring Agent (MMA) to report to your Microsoft Defender ATP workspace through Multi Homing support. Otherwise, install and configure MMA to report sensor data to Microsoft Defender ATP as instructed below. For more information, see [Collect log data with Azure Log Analytics agent](https://docs.microsoft.com/azure/azure-monitor/platform/log-analytics-agent). >[!TIP] -> After onboarding the machine, you can choose to run a detection test to verify that it is properly onboarded to the service. For more information, see [Run a detection test on a newly onboarded Windows Defender ATP endpoint](run-detection-test-windows-defender-advanced-threat-protection.md). +> After onboarding the machine, you can choose to run a detection test to verify that it is properly onboarded to the service. For more information, see [Run a detection test on a newly onboarded Microsoft Defender ATP endpoint](run-detection-test-windows-defender-advanced-threat-protection.md). ### Configure and update System Center Endpoint Protection clients >[!IMPORTANT] >This step is required only if your organization uses System Center Endpoint Protection (SCEP) and you're onboarding Windows Server 2012 R2. -Windows Defender ATP integrates with System Center Endpoint Protection to provide visibility to malware detections and to stop propagation of an attack in your organization by banning potentially malicious files or suspected malware. +Microsoft Defender ATP integrates with System Center Endpoint Protection to provide visibility to malware detections and to stop propagation of an attack in your organization by banning potentially malicious files or suspected malware. The following steps are required to enable this integration: - Install the [January 2017 anti-malware platform update for Endpoint Protection clients](https://support.microsoft.com/help/3209361/january-2017-anti-malware-platform-update-for-endpoint-protection-clie) @@ -92,7 +92,7 @@ The following steps are required to enable this integration: 3. Click **Turn on server monitoring** and confirm that you'd like to proceed with the environment set up. When the set up completes, the **Workspace ID** and **Workspace key** fields are populated with unique values. You'll need to use these values to configure the MMA agent. -### Install and configure Microsoft Monitoring Agent (MMA) to report sensor data to Windows Defender ATP +### Install and configure Microsoft Monitoring Agent (MMA) to report sensor data to Microsoft Defender ATP 1. Download the agent setup file: [Windows 64-bit agent](https://go.microsoft.com/fwlink/?LinkId=828603). @@ -109,7 +109,7 @@ Once completed, you should see onboarded servers in the portal within an hour. ### Configure server proxy and Internet connectivity settings - Each Windows server must be able to connect to the Internet using HTTPS. This connection can be direct, using a proxy, or through the [OMS Gateway](https://docs.microsoft.com/azure/log-analytics/log-analytics-oms-gateway). -- If a proxy or firewall is blocking all traffic by default and allowing only specific domains through or HTTPS scanning (SSL inspection) is enabled, make sure that the following URLs are white-listed to permit communication with Windows Defender ATP service: +- If a proxy or firewall is blocking all traffic by default and allowing only specific domains through or HTTPS scanning (SSL inspection) is enabled, make sure that the following URLs are white-listed to permit communication with Microsoft Defender ATP service: Agent Resource | Ports :---|:--- @@ -137,7 +137,7 @@ Supported tools include: For more information, see [Onboard Windows 10 machines](configure-endpoints-windows-defender-advanced-threat-protection.md). Support for Windows Server, version 1803 and Windows 2019 provides deeper insight into activities happening on the server, coverage for kernel and memory attack detection, and enables response actions on Windows Server endpoint as well. -1. Configure Windows Defender ATP onboarding settings on the server. For more information, see [Onboard Windows 10 machines](configure-endpoints-windows-defender-advanced-threat-protection.md). +1. Configure Microsoft Defender ATP onboarding settings on the server. For more information, see [Onboard Windows 10 machines](configure-endpoints-windows-defender-advanced-threat-protection.md). 2. If you’re running a third party antimalware solution, you'll need to apply the following Windows Defender AV passive mode settings and verify it was configured correctly: @@ -162,23 +162,23 @@ Supported tools include: ## Integration with Azure Security Center -Windows Defender ATP integrates with Azure Security Center to provide a comprehensive server protection solution. With this integration Azure Security Center can leverage the power of Windows Defender ATP to provide improved threat detection for Windows Servers. +Microsoft Defender ATP integrates with Azure Security Center to provide a comprehensive server protection solution. With this integration Azure Security Center can leverage the power of Microsoft Defender ATP to provide improved threat detection for Windows Servers. >[!NOTE] >You'll need to have the appropriate license to enable this feature. The following capabilities are included in this integration: -- Automated onboarding - Windows Defender ATP sensor is automatically enabled on Windows Servers that are onboarded to Azure Security Center. For more information on Azure Security Center onboarding, see [Onboarding to Azure Security Center Standard for enhanced security](https://docs.microsoft.com/azure/security-center/security-center-onboarding). +- Automated onboarding - Microsoft Defender ATP sensor is automatically enabled on Windows Servers that are onboarded to Azure Security Center. For more information on Azure Security Center onboarding, see [Onboarding to Azure Security Center Standard for enhanced security](https://docs.microsoft.com/azure/security-center/security-center-onboarding). >[!NOTE] > Automated onboarding is only applicable for Windows Server 2012 R2 and Windows Server 2016. -- Servers monitored by Azure Security Center will also be available in Windows Defender ATP - Azure Security Center seamlessly connects to the Windows Defender ATP tenant, providing a single view across clients and servers. In addition, Windows Defender ATP alerts will be available in the Azure Security Center console. +- Servers monitored by Azure Security Center will also be available in Microsoft Defender ATP - Azure Security Center seamlessly connects to the Microsoft Defender ATP tenant, providing a single view across clients and servers. In addition, Microsoft Defender ATP alerts will be available in the Azure Security Center console. - Server investigation - Azure Security Center customers can access Windows Defender Security Center to perform detailed investigation to uncover the scope of a potential breach >[!IMPORTANT] ->- When you use Azure Security Center to monitor servers, a Windows Defender ATP tenant is automatically created. The Windows Defender ATP data is stored in Europe by default. ->- If you use Windows Defender ATP before using Azure Security Center, your data will be stored in the location you specified when you created your tenant even if you integrate with Azure Security Center at a later time. +>- When you use Azure Security Center to monitor servers, a Microsoft Defender ATP tenant is automatically created. The Microsoft Defender ATP data is stored in Europe by default. +>- If you use Microsoft Defender ATP before using Azure Security Center, your data will be stored in the location you specified when you created your tenant even if you integrate with Azure Security Center at a later time. @@ -187,26 +187,26 @@ You can offboard Windows Server, version 1803 and Windows 2019 in the same metho For other server versions, you have two options to offboard servers from the service: - Uninstall the MMA agent -- Remove the Windows Defender ATP workspace configuration +- Remove the Microsoft Defender ATP workspace configuration >[!NOTE] >Offboarding causes the server to stop sending sensor data to the portal but data from the server, including reference to any alerts it has had will be retained for up to 6 months. ### Uninstall servers by uinstalling the MMA agent -To offboard the server, you can uninstall the MMA agent from the server or detach it from reporting to your Windows Defender ATP workspace. After offboarding the agent, the server will no longer send sensor data to Windows Defender ATP. +To offboard the server, you can uninstall the MMA agent from the server or detach it from reporting to your Microsoft Defender ATP workspace. After offboarding the agent, the server will no longer send sensor data to Microsoft Defender ATP. For more information, see [To disable an agent](https://docs.microsoft.com/azure/log-analytics/log-analytics-windows-agents#to-disable-an-agent). -### Remove the Windows Defender ATP workspace configuration +### Remove the Microsoft Defender ATP workspace configuration To offboard the server, you can use either of the following methods: -- Remove the Windows Defender ATP workspace configuration from the MMA agent +- Remove the Microsoft Defender ATP workspace configuration from the MMA agent - Run a PowerShell command to remove the configuration -#### Remove the Windows Defender ATP workspace configuration from the MMA agent +#### Remove the Microsoft Defender ATP workspace configuration from the MMA agent 1. In the **Microsoft Monitoring Agent Properties**, select the **Azure Log Analytics (OMS)** tab. -2. Select the Windows Defender ATP workspace, and click **Remove**. +2. Select the Microsoft Defender ATP workspace, and click **Remove**. ![Image of Microsoft Monitoring Agen Properties](images/atp-mma.png) @@ -234,5 +234,5 @@ To offboard the server, you can use either of the following methods: - [Onboard Windows 10 machines](configure-endpoints-windows-defender-advanced-threat-protection.md) - [Onboard non-Windows machines](configure-endpoints-non-windows-windows-defender-advanced-threat-protection.md) - [Configure proxy and Internet connectivity settings](configure-proxy-internet-windows-defender-advanced-threat-protection.md) -- [Run a detection test on a newly onboarded Windows Defender ATP machine](run-detection-test-windows-defender-advanced-threat-protection.md) -- [Troubleshooting Windows Defender Advanced Threat Protection onboarding issues](troubleshoot-onboarding-windows-defender-advanced-threat-protection.md) +- [Run a detection test on a newly onboarded Microsoft Defender ATP machine](run-detection-test-windows-defender-advanced-threat-protection.md) +- [Troubleshooting Microsoft Defender Advanced Threat Protection onboarding issues](troubleshoot-onboarding-windows-defender-advanced-threat-protection.md) diff --git a/windows/security/threat-protection/microsoft-defender-atp/configure-siem.md b/windows/security/threat-protection/microsoft-defender-atp/configure-siem.md index 239c4d95db..9c544f5795 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/configure-siem.md +++ b/windows/security/threat-protection/microsoft-defender-atp/configure-siem.md @@ -1,5 +1,5 @@ --- -title: Pull alerts to your SIEM tools from Windows Defender Advanced Threat Protection +title: Pull alerts to your SIEM tools from Microsoft Defender Advanced Threat Protection description: Learn how to use REST API and configure supported security information and events management tools to receive and pull alerts. keywords: configure siem, security information and events management tools, splunk, arcsight, custom indicators, rest api, alert definitions, indicators of compromise search.product: eADQiWindows 10XVcnh @@ -22,42 +22,42 @@ ms.date: 10/16/2017 **Applies to:** -- [Windows Defender Advanced Threat Protection (Windows Defender ATP)](https://go.microsoft.com/fwlink/p/?linkid=2069559) +- [Microsoft Defender Advanced Threat Protection (Microsoft Defender ATP)](https://go.microsoft.com/fwlink/p/?linkid=2069559) ->Want to experience Windows Defender ATP? [Sign up for a free trial.](https://www.microsoft.com/en-us/WindowsForBusiness/windows-atp?ocid=docs-wdatp-configuresiem-abovefoldlink) +>Want to experience Microsoft Defender ATP? [Sign up for a free trial.](https://www.microsoft.com/en-us/WindowsForBusiness/windows-atp?ocid=docs-wdatp-configuresiem-abovefoldlink) ## Pull alerts using security information and events management (SIEM) tools -Windows Defender ATP supports (SIEM) tools to pull alerts. Windows Defender ATP exposes alerts through an HTTPS endpoint hosted in Azure. The endpoint can be configured to pull alerts from your enterprise tenant in Azure Active Directory (AAD) using the OAuth 2.0 authentication protocol for an AAD application that represents the specific SIEM connector installed in your environment. +Microsoft Defender ATP supports (SIEM) tools to pull alerts. Microsoft Defender ATP exposes alerts through an HTTPS endpoint hosted in Azure. The endpoint can be configured to pull alerts from your enterprise tenant in Azure Active Directory (AAD) using the OAuth 2.0 authentication protocol for an AAD application that represents the specific SIEM connector installed in your environment. -Windows Defender ATP currently supports the following SIEM tools: +Microsoft Defender ATP currently supports the following SIEM tools: - Splunk - HP ArcSight To use either of these supported SIEM tools you'll need to: -- [Enable SIEM integration in Windows Defender ATP](enable-siem-integration-windows-defender-advanced-threat-protection.md) +- [Enable SIEM integration in Microsoft Defender ATP](enable-siem-integration-windows-defender-advanced-threat-protection.md) - Configure the supported SIEM tool: - - [Configure Splunk to pull Windows Defender ATP alerts](configure-splunk-windows-defender-advanced-threat-protection.md) - - [Configure HP ArcSight to pull Windows Defender ATP alerts](configure-arcsight-windows-defender-advanced-threat-protection.md) + - [Configure Splunk to pull Microsoft Defender ATP alerts](configure-splunk-windows-defender-advanced-threat-protection.md) + - [Configure HP ArcSight to pull Microsoft Defender ATP alerts](configure-arcsight-windows-defender-advanced-threat-protection.md) -For more information on the list of fields exposed in the alerts API see, [Windows Defender ATP alert API fields](api-portal-mapping-windows-defender-advanced-threat-protection.md). +For more information on the list of fields exposed in the alerts API see, [Microsoft Defender ATP alert API fields](api-portal-mapping-windows-defender-advanced-threat-protection.md). -## Pull Windows Defender ATP alerts using REST API -Windows Defender ATP supports the OAuth 2.0 protocol to pull alerts using REST API. +## Pull Microsoft Defender ATP alerts using REST API +Microsoft Defender ATP supports the OAuth 2.0 protocol to pull alerts using REST API. -For more information, see [Pull Windows Defender ATP alerts using REST API](pull-alerts-using-rest-api-windows-defender-advanced-threat-protection.md). +For more information, see [Pull Microsoft Defender ATP alerts using REST API](pull-alerts-using-rest-api-windows-defender-advanced-threat-protection.md). ## In this section Topic | Description :---|:--- -[Enable SIEM integration in Windows Defender ATP](enable-siem-integration-windows-defender-advanced-threat-protection.md)| Learn about enabling the SIEM integration feature in the **Settings** page in the portal so that you can use and generate the required information to configure supported SIEM tools. -[Configure Splunk to pull Windows Defender ATP alerts](configure-splunk-windows-defender-advanced-threat-protection.md)| Learn about installing the REST API Modular Input app and other configuration settings to enable Splunk to pull Windows Defender ATP alerts. -[Configure HP ArcSight to pull Windows Defender ATP alerts](configure-arcsight-windows-defender-advanced-threat-protection.md)| Learn about installing the HP ArcSight REST FlexConnector package and the files you need to configure ArcSight to pull Windows Defender ATP alerts. -[Windows Defender ATP alert API fields](api-portal-mapping-windows-defender-advanced-threat-protection.md) | Understand what data fields are exposed as part of the alerts API and how they map to Windows Defender Security Center. -[Pull Windows Defender ATP alerts using REST API](pull-alerts-using-rest-api-windows-defender-advanced-threat-protection.md) | Use the Client credentials OAuth 2.0 flow to pull alerts from Windows Defender ATP using REST API. +[Enable SIEM integration in Microsoft Defender ATP](enable-siem-integration-windows-defender-advanced-threat-protection.md)| Learn about enabling the SIEM integration feature in the **Settings** page in the portal so that you can use and generate the required information to configure supported SIEM tools. +[Configure Splunk to pull Microsoft Defender ATP alerts](configure-splunk-windows-defender-advanced-threat-protection.md)| Learn about installing the REST API Modular Input app and other configuration settings to enable Splunk to pull Microsoft Defender ATP alerts. +[Configure HP ArcSight to pull Microsoft Defender ATP alerts](configure-arcsight-windows-defender-advanced-threat-protection.md)| Learn about installing the HP ArcSight REST FlexConnector package and the files you need to configure ArcSight to pull Microsoft Defender ATP alerts. +[Microsoft Defender ATP alert API fields](api-portal-mapping-windows-defender-advanced-threat-protection.md) | Understand what data fields are exposed as part of the alerts API and how they map to Windows Defender Security Center. +[Pull Microsoft Defender ATP alerts using REST API](pull-alerts-using-rest-api-windows-defender-advanced-threat-protection.md) | Use the Client credentials OAuth 2.0 flow to pull alerts from Microsoft Defender ATP using REST API. [Troubleshoot SIEM tool integration issues](troubleshoot-siem-windows-defender-advanced-threat-protection.md) | Address issues you might encounter when using the SIEM integration feature. diff --git a/windows/security/threat-protection/microsoft-defender-atp/configure-splunk.md b/windows/security/threat-protection/microsoft-defender-atp/configure-splunk.md index baf0a25a95..bb3e6d4f5b 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/configure-splunk.md +++ b/windows/security/threat-protection/microsoft-defender-atp/configure-splunk.md @@ -1,5 +1,5 @@ --- -title: Configure Splunk to pull Windows Defender ATP alerts +title: Configure Splunk to pull Microsoft Defender ATP alerts description: Configure Splunk to receive and pull alerts from Windows Defender Security Center. keywords: configure splunk, security information and events management tools, splunk search.product: eADQiWindows 10XVcnh @@ -18,23 +18,23 @@ ms.topic: article ms.date: 10/16/2017 --- -# Configure Splunk to pull Windows Defender ATP alerts +# Configure Splunk to pull Microsoft Defender ATP alerts **Applies to:** -- [Windows Defender Advanced Threat Protection (Windows Defender ATP)](https://go.microsoft.com/fwlink/p/?linkid=2069559) +- [Microsoft Defender Advanced Threat Protection (Microsoft Defender ATP)](https://go.microsoft.com/fwlink/p/?linkid=2069559) ->Want to experience Windows Defender ATP? [Sign up for a free trial.](https://www.microsoft.com/en-us/WindowsForBusiness/windows-atp?ocid=docs-wdatp-configuresplunk-abovefoldlink) +>Want to experience Microsoft Defender ATP? [Sign up for a free trial.](https://www.microsoft.com/en-us/WindowsForBusiness/windows-atp?ocid=docs-wdatp-configuresplunk-abovefoldlink) -You'll need to configure Splunk so that it can pull Windows Defender ATP alerts. +You'll need to configure Splunk so that it can pull Microsoft Defender ATP alerts. ## Before you begin - Install the [REST API Modular Input app](https://splunkbase.splunk.com/app/1546/) in Splunk. -- Make sure you have enabled the **SIEM integration** feature from the **Settings** menu. For more information, see [Enable SIEM integration in Windows Defender ATP](enable-siem-integration-windows-defender-advanced-threat-protection.md) +- Make sure you have enabled the **SIEM integration** feature from the **Settings** menu. For more information, see [Enable SIEM integration in Microsoft Defender ATP](enable-siem-integration-windows-defender-advanced-threat-protection.md) - Have the details file you saved from enabling the **SIEM integration** feature ready. You'll need to get the following values: - OAuth 2 Token refresh URL @@ -107,7 +107,7 @@ You'll need to configure Splunk so that it can pull Windows Defender ATP alerts. Polling Interval - Number of seconds that Splunk will ping the Windows Defender ATP machine. Accepted values are in seconds. + Number of seconds that Splunk will ping the Microsoft Defender ATP machine. Accepted values are in seconds. Set sourcetype @@ -146,8 +146,8 @@ Use the solution explorer to view alerts in Splunk. >```source="rest://windows atp alerts" | spath | dedup _raw | table *``` ## Related topics -- [Enable SIEM integration in Windows Defender ATP](enable-siem-integration-windows-defender-advanced-threat-protection.md) -- [Configure ArcSight to pull Windows Defender ATP alerts](configure-arcsight-windows-defender-advanced-threat-protection.md) -- [Windows Defender ATP alert API fields](api-portal-mapping-windows-defender-advanced-threat-protection.md) -- [Pull Windows Defender ATP alerts using REST API](pull-alerts-using-rest-api-windows-defender-advanced-threat-protection.md) +- [Enable SIEM integration in Microsoft Defender ATP](enable-siem-integration-windows-defender-advanced-threat-protection.md) +- [Configure ArcSight to pull Microsoft Defender ATP alerts](configure-arcsight-windows-defender-advanced-threat-protection.md) +- [Microsoft Defender ATP alert API fields](api-portal-mapping-windows-defender-advanced-threat-protection.md) +- [Pull Microsoft Defender ATP alerts using REST API](pull-alerts-using-rest-api-windows-defender-advanced-threat-protection.md) - [Troubleshoot SIEM tool integration issues](troubleshoot-siem-windows-defender-advanced-threat-protection.md) diff --git a/windows/security/threat-protection/microsoft-defender-atp/create-alert-by-reference.md b/windows/security/threat-protection/microsoft-defender-atp/create-alert-by-reference.md index d20d381975..4d6bed28ef 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/create-alert-by-reference.md +++ b/windows/security/threat-protection/microsoft-defender-atp/create-alert-by-reference.md @@ -20,7 +20,7 @@ ms.date: 12/08/2017 # Create alert from event API **Applies to:** -- Windows Defender Advanced Threat Protection (Windows Defender ATP) +- Microsoft Defender Advanced Threat Protection (Microsoft Defender ATP) [!include[Prereleaseinformation](prerelease.md)] @@ -29,7 +29,7 @@ ms.date: 12/08/2017 Enables using event data, as obtained from the [Advanced Hunting](run-advanced-query-api.md) for creating a new alert entity. ## Permissions -One of the following permissions is required to call this API. To learn more, including how to choose permissions, see [Use Windows Defender ATP APIs](apis-intro.md) +One of the following permissions is required to call this API. To learn more, including how to choose permissions, see [Use Microsoft Defender ATP APIs](apis-intro.md) Permission type | Permission | Permission display name :---|:---|:--- diff --git a/windows/security/threat-protection/microsoft-defender-atp/custom-detection-rules.md b/windows/security/threat-protection/microsoft-defender-atp/custom-detection-rules.md index 4998ae8a80..bb24ba24f8 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/custom-detection-rules.md +++ b/windows/security/threat-protection/microsoft-defender-atp/custom-detection-rules.md @@ -1,5 +1,5 @@ --- -title: Create custom detection rules in Windows Defender ATP +title: Create custom detection rules in Microsoft Defender ATP description: Learn how to create custom detections rules based on advanced hunting queries keywords: create custom detections, detections, advanced hunting, hunt, detect, query search.product: eADQiWindows 10XVcnh @@ -20,7 +20,7 @@ ms.topic: article # Create custom detections rules **Applies to:** -- [Windows Defender Advanced Threat Protection (Windows Defender ATP)](https://go.microsoft.com/fwlink/p/?linkid=2069559) +- [Microsoft Defender Advanced Threat Protection (Microsoft Defender ATP)](https://go.microsoft.com/fwlink/p/?linkid=2069559) 1. In the navigation pane, select **Advanced hunting**. diff --git a/windows/security/threat-protection/microsoft-defender-atp/custom-ti-api.md b/windows/security/threat-protection/microsoft-defender-atp/custom-ti-api.md index bc9982d2ae..552a856b66 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/custom-ti-api.md +++ b/windows/security/threat-protection/microsoft-defender-atp/custom-ti-api.md @@ -1,6 +1,6 @@ --- title: Create custom alerts using the threat intelligence API -description: Create your custom alert definitions and indicators of compromise in Windows Defender ATP using the available APIs in Windows Enterprise, Education, and Pro editions. +description: Create your custom alert definitions and indicators of compromise in Microsoft Defender ATP using the available APIs in Windows Enterprise, Education, and Pro editions. keywords: alert definitions, indicators of compromise, threat intelligence, custom threat intelligence, rest api, api search.product: eADQiWindows 10XVcnh search.appverid: met150 @@ -23,11 +23,11 @@ ms.date: 04/24/2018 **Applies to:** -- [Windows Defender Advanced Threat Protection (Windows Defender ATP)](https://go.microsoft.com/fwlink/p/?linkid=2069559) +- [Microsoft Defender Advanced Threat Protection (Microsoft Defender ATP)](https://go.microsoft.com/fwlink/p/?linkid=2069559) ->Want to experience Windows Defender ATP? [Sign up for a free trial.](https://www.microsoft.com/en-us/WindowsForBusiness/windows-atp?ocid=docs-wdatp-customti-abovefoldlink) +>Want to experience Microsoft Defender ATP? [Sign up for a free trial.](https://www.microsoft.com/en-us/WindowsForBusiness/windows-atp?ocid=docs-wdatp-customti-abovefoldlink) You can define custom alert definitions and indicators of compromise (IOC) using the threat intelligence API. Creating custom threat intelligence alerts allows you to generate specific alerts that are applicable to your organization. @@ -61,7 +61,7 @@ For this URL: Each tenant has a defined quota that limits the number of possible alert definitions, IOCs and another quota for IOCs of Action different than “equals” in the system. If you upload data beyond this quota, you'll encounter an HTTP error status code 507 (Insufficient Storage). ## Request an access token from the token issuing endpoint -Windows Defender ATP Threat Intelligence API uses OAuth 2.0. In the context of Windows Defender ATP, the alert definitions are a protected resource. To issue tokens for ad-hoc, non-automatic operations you can use the **Settings** page and click the **Generate Token** button. However, if you’d like to create an automated client, you need to use the “Client Credentials Grant” flow. For more information, see the [OAuth 2.0 authorization framework](https://tools.ietf.org/html/rfc6749#section-4.4). +Microsoft Defender ATP Threat Intelligence API uses OAuth 2.0. In the context of Microsoft Defender ATP, the alert definitions are a protected resource. To issue tokens for ad-hoc, non-automatic operations you can use the **Settings** page and click the **Generate Token** button. However, if you’d like to create an automated client, you need to use the “Client Credentials Grant” flow. For more information, see the [OAuth 2.0 authorization framework](https://tools.ietf.org/html/rfc6749#section-4.4). For more information about the authorization flow, see [OAuth 2.0 authorization flow](https://docs.microsoft.com/azure/active-directory/develop/active-directory-protocols-oauth-code#oauth-20-authorization-flow). @@ -387,8 +387,8 @@ Upon a successful request the response will be HTTP 204. > As with all OData actions, this action is sending an HTTP POST request not DELETE. -## Windows Defender ATP optional query parameters -The Windows Defender ATP threat intelligence API provides several optional query parameters that you can use to specify and control the amount of data returned in a response. The threat intelligence API supports the following query options: +## Microsoft Defender ATP optional query parameters +The Microsoft Defender ATP threat intelligence API provides several optional query parameters that you can use to specify and control the amount of data returned in a response. The threat intelligence API supports the following query options: Name | Value | Description :---|:---|:-- @@ -411,7 +411,7 @@ The following articles provide detailed code examples that demonstrate how to us ## Related topics - [Understand threat intelligence concepts](threat-indicator-concepts-windows-defender-advanced-threat-protection.md) -- [Enable the custom threat intelligence API in Windows Defender ATP](enable-custom-ti-windows-defender-advanced-threat-protection.md) +- [Enable the custom threat intelligence API in Microsoft Defender ATP](enable-custom-ti-windows-defender-advanced-threat-protection.md) - [PowerShell code examples for the custom threat intelligence API](powershell-example-code-windows-defender-advanced-threat-protection.md) - [Python code examples for the custom threat intelligence API](python-example-code-windows-defender-advanced-threat-protection.md) - [Experiment with custom threat intelligence alerts](experiment-custom-ti-windows-defender-advanced-threat-protection.md) diff --git a/windows/security/threat-protection/microsoft-defender-atp/data-retention-settings.md b/windows/security/threat-protection/microsoft-defender-atp/data-retention-settings.md index 8a393d5b81..76c3d3e1cb 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/data-retention-settings.md +++ b/windows/security/threat-protection/microsoft-defender-atp/data-retention-settings.md @@ -1,5 +1,5 @@ --- -title: Update data retention settings for Windows Defender Advanced Threat Protection +title: Update data retention settings for Microsoft Defender Advanced Threat Protection description: Update data retention settings by selecting between 30 days to 180 days. keywords: data, storage, settings, retention, update search.product: eADQiWindows 10XVcnh @@ -17,18 +17,18 @@ ms.collection: M365-security-compliance ms.topic: conceptual ms.date: 04/24/2018 --- -# Update data retention settings for Windows Defender ATP +# Update data retention settings for Microsoft Defender ATP **Applies to:** -- [Windows Defender Advanced Threat Protection (Windows Defender ATP)](https://go.microsoft.com/fwlink/p/?linkid=2069559) +- [Microsoft Defender Advanced Threat Protection (Microsoft Defender ATP)](https://go.microsoft.com/fwlink/p/?linkid=2069559) ->Want to experience Windows Defender ATP? [Sign up for a free trial.](https://www.microsoft.com/en-us/WindowsForBusiness/windows-atp?ocid=docs-wdatp-gensettings-abovefoldlink) +>Want to experience Microsoft Defender ATP? [Sign up for a free trial.](https://www.microsoft.com/en-us/WindowsForBusiness/windows-atp?ocid=docs-wdatp-gensettings-abovefoldlink) -During the onboarding process, a wizard takes you through the general settings of Windows Defender ATP. After onboarding, you might want to update the data retention settings. +During the onboarding process, a wizard takes you through the general settings of Microsoft Defender ATP. After onboarding, you might want to update the data retention settings. 1. In the navigation pane, select **Settings** > **Data rention**. @@ -42,7 +42,7 @@ During the onboarding process, a wizard takes you through the general settings o ## Related topics - [Update data retention settings](data-retention-settings-windows-defender-advanced-threat-protection.md) -- [Configure alert notifications in Windows Defender ATP](configure-email-notifications-windows-defender-advanced-threat-protection.md) -- [Enable and create Power BI reports using Windows Defender ATP data](powerbi-reports-windows-defender-advanced-threat-protection.md) +- [Configure alert notifications in Microsoft Defender ATP](configure-email-notifications-windows-defender-advanced-threat-protection.md) +- [Enable and create Power BI reports using Microsoft Defender ATP data](powerbi-reports-windows-defender-advanced-threat-protection.md) - [Enable Secure Score security controls](enable-secure-score-windows-defender-advanced-threat-protection.md) - [Configure advanced features](advanced-features-windows-defender-advanced-threat-protection.md) diff --git a/windows/security/threat-protection/microsoft-defender-atp/data-storage-privacy.md b/windows/security/threat-protection/microsoft-defender-atp/data-storage-privacy.md index 67780a3f78..b320ac62c4 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/data-storage-privacy.md +++ b/windows/security/threat-protection/microsoft-defender-atp/data-storage-privacy.md @@ -1,7 +1,7 @@ --- -title: Windows Defender ATP data storage and privacy -description: Learn about how Windows Defender ATP handles privacy and data that it collects. -keywords: Windows Defender ATP data storage and privacy, storage, privacy, licensing, geolocation, data retention, data +title: Microsoft Defender ATP data storage and privacy +description: Learn about how Microsoft Defender ATP handles privacy and data that it collects. +keywords: Microsoft Defender ATP data storage and privacy, storage, privacy, licensing, geolocation, data retention, data search.product: eADQiWindows 10XVcnh search.appverid: met150 ms.prod: w10 @@ -17,20 +17,20 @@ ms.collection: M365-security-compliance ms.topic: conceptual --- -# Windows Defender ATP data storage and privacy +# Microsoft Defender ATP data storage and privacy **Applies to:** -- [Windows Defender Advanced Threat Protection (Windows Defender ATP)](https://wincom.blob.core.windows.net/documents/Windows10_Commercial_Comparison.pdf) +- [Microsoft Defender Advanced Threat Protection (Microsoft Defender ATP)](https://wincom.blob.core.windows.net/documents/Windows10_Commercial_Comparison.pdf) -This section covers some of the most frequently asked questions regarding privacy and data handling for Windows Defender ATP. +This section covers some of the most frequently asked questions regarding privacy and data handling for Microsoft Defender ATP. > [!NOTE] -> This document explains the data storage and privacy details related to Windows Defender ATP. For more information related to Windows Defender ATP and other products and services like Windows Defender Antivirus and Windows 10, see [Microsoft Privacy Statement](https://go.microsoft.com/fwlink/?linkid=827576). See also [Windows 10 privacy FAQ](https://go.microsoft.com/fwlink/?linkid=827577) for more information. +> This document explains the data storage and privacy details related to Microsoft Defender ATP. For more information related to Microsoft Defender ATP and other products and services like Windows Defender Antivirus and Windows 10, see [Microsoft Privacy Statement](https://go.microsoft.com/fwlink/?linkid=827576). See also [Windows 10 privacy FAQ](https://go.microsoft.com/fwlink/?linkid=827577) for more information. -## What data does Windows Defender ATP collect? +## What data does Microsoft Defender ATP collect? -Windows Defender ATP will collect and store information from your configured machines in a customer dedicated and segregated tenant specific to the service for administration, tracking, and reporting purposes. +Microsoft Defender ATP will collect and store information from your configured machines in a customer dedicated and segregated tenant specific to the service for administration, tracking, and reporting purposes. Information collected includes file data (such as file names, sizes, and hashes), process data (running processes, hashes), registry data, network connection data (host IPs and ports), and machine details (such as machine identifiers, names, and the operating system version). @@ -44,10 +44,10 @@ Microsoft uses this data to: Microsoft does not use your data for advertising or for any other purpose other than providing you the service. ## Data protection and encryption -The Windows Defender ATP service utilizes state of the art data protection technologies which are based on Microsoft Azure infrastructure. +The Microsoft Defender ATP service utilizes state of the art data protection technologies which are based on Microsoft Azure infrastructure. -There are various aspects relevant to data protection that our service takes care of. Encryption is one of the most critical and it includes data encryption at rest, encryption in flight, and key management with Key Vault. For more information on other technologies used by the Windows Defender ATP service, see [Azure encryption overview](https://docs.microsoft.com/azure/security/security-azure-encryption-overview). +There are various aspects relevant to data protection that our service takes care of. Encryption is one of the most critical and it includes data encryption at rest, encryption in flight, and key management with Key Vault. For more information on other technologies used by the Microsoft Defender ATP service, see [Azure encryption overview](https://docs.microsoft.com/azure/security/security-azure-encryption-overview). In all scenarios, data is encrypted using 256-bit [AES encyption](https://en.wikipedia.org/wiki/Advanced_Encryption_Standard) at the minimum. @@ -84,12 +84,12 @@ Your data will be kept and will be available to you while the licence is under g ## Can Microsoft help us maintain regulatory compliance? -Microsoft provides customers with detailed information about Microsoft's security and compliance programs, including audit reports and compliance packages, to help customers assess Windows Defender ATP services against their own legal and regulatory requirements. Windows Defender ATP is ISO 27001 certified and has a roadmap for obtaining national, regional and industry-specific certifications. +Microsoft provides customers with detailed information about Microsoft's security and compliance programs, including audit reports and compliance packages, to help customers assess Microsoft Defender ATP services against their own legal and regulatory requirements. Microsoft Defender ATP is ISO 27001 certified and has a roadmap for obtaining national, regional and industry-specific certifications. -Windows Defender ATP for Government (soon to be in preview) is currently undergoing audit for achieving FedRAMP High accreditation as well as Provisional Authorization (PA) at Impact Levels 4 and 5. +Microsoft Defender ATP for Government (soon to be in preview) is currently undergoing audit for achieving FedRAMP High accreditation as well as Provisional Authorization (PA) at Impact Levels 4 and 5. By providing customers with compliant, independently-verified services, Microsoft makes it easier for customers to achieve compliance for the infrastructure and applications they run. -For more information on the Windows Defender ATP ISO certification reports, see [Microsoft Trust Center](https://www.microsoft.com/en-us/trustcenter/compliance/iso-iec-27001). +For more information on the Microsoft Defender ATP ISO certification reports, see [Microsoft Trust Center](https://www.microsoft.com/en-us/trustcenter/compliance/iso-iec-27001). ->Want to experience Windows Defender ATP? [Sign up for a free trial.](https://www.microsoft.com/en-us/WindowsForBusiness/windows-atp?ocid=docs-wdatp-datastorage-belowfoldlink) +>Want to experience Microsoft Defender ATP? [Sign up for a free trial.](https://www.microsoft.com/en-us/WindowsForBusiness/windows-atp?ocid=docs-wdatp-datastorage-belowfoldlink) diff --git a/windows/security/threat-protection/microsoft-defender-atp/defender-compatibility.md b/windows/security/threat-protection/microsoft-defender-atp/defender-compatibility.md index 5050e3dcb1..4d9d0fa3ce 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/defender-compatibility.md +++ b/windows/security/threat-protection/microsoft-defender-atp/defender-compatibility.md @@ -1,6 +1,6 @@ --- -title: Windows Defender Antivirus compatibility with Windows Defender ATP -description: Learn about how Windows Defender works with Windows Defender ATP and how it functions when a third-party antimalware client is used. +title: Windows Defender Antivirus compatibility with Microsoft Defender ATP +description: Learn about how Windows Defender works with Microsoft Defender ATP and how it functions when a third-party antimalware client is used. keywords: windows defender compatibility, defender, windows defender atp search.product: eADQiWindows 10XVcnh search.appverid: met150 @@ -18,24 +18,24 @@ ms.topic: conceptual ms.date: 04/24/2018 --- -# Windows Defender Antivirus compatibility with Windows Defender ATP +# Windows Defender Antivirus compatibility with Microsoft Defender ATP **Applies to:** - Windows Defender -- [Windows Defender Advanced Threat Protection (Windows Defender ATP)](https://go.microsoft.com/fwlink/p/?linkid=2069559) +- [Microsoft Defender Advanced Threat Protection (Microsoft Defender ATP)](https://go.microsoft.com/fwlink/p/?linkid=2069559) ->Want to experience Windows Defender ATP? [Sign up for a free trial.](https://www.microsoft.com/en-us/WindowsForBusiness/windows-atp?ocid=docs-wdatp-defendercompat-abovefoldlink) +>Want to experience Microsoft Defender ATP? [Sign up for a free trial.](https://www.microsoft.com/en-us/WindowsForBusiness/windows-atp?ocid=docs-wdatp-defendercompat-abovefoldlink) -The Windows Defender Advanced Threat Protection agent depends on Windows Defender Antivirus for some capabilities such as file scanning. +The Microsoft Defender Advanced Threat Protection agent depends on Windows Defender Antivirus for some capabilities such as file scanning. >[!IMPORTANT] ->Windows Defender ATP does not adhere to the Windows Defender Antivirus Exclusions settings. +>Microsoft Defender ATP does not adhere to the Windows Defender Antivirus Exclusions settings. -You must configure Security intelligence updates on the Windows Defender ATP machines whether Windows Defender Antivirus is the active antimalware or not. For more information, see [Manage Windows Defender Antivirus updates and apply baselines](../windows-defender-antivirus/manage-updates-baselines-windows-defender-antivirus.md). +You must configure Security intelligence updates on the Microsoft Defender ATP machines whether Windows Defender Antivirus is the active antimalware or not. For more information, see [Manage Windows Defender Antivirus updates and apply baselines](../windows-defender-antivirus/manage-updates-baselines-windows-defender-antivirus.md). If an onboarded machine is protected by a third-party antimalware client, Windows Defender Antivirus on that endpoint will enter into passive mode. @@ -43,4 +43,4 @@ Windows Defender Antivirus will continue to receive updates, and the *mspeng.exe The Windows Defender Antivirus interface will be disabled, and users on the machine will not be able to use Windows Defender Antivirus to perform on-demand scans or configure most options. -For more information, see the [Windows Defender Antivirus and Windows Defender ATP compatibility topic](../windows-defender-antivirus/windows-defender-antivirus-compatibility.md). +For more information, see the [Windows Defender Antivirus and Microsoft Defender ATP compatibility topic](../windows-defender-antivirus/windows-defender-antivirus-compatibility.md). diff --git a/windows/security/threat-protection/microsoft-defender-atp/delete-ti-indicator-by-id.md b/windows/security/threat-protection/microsoft-defender-atp/delete-ti-indicator-by-id.md index 6399e4f311..40d6df11a5 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/delete-ti-indicator-by-id.md +++ b/windows/security/threat-protection/microsoft-defender-atp/delete-ti-indicator-by-id.md @@ -19,7 +19,7 @@ ms.topic: article # Delete Indicator API **Applies to:** -- [Windows Defender Advanced Threat Protection (Windows Defender ATP)](https://go.microsoft.com/fwlink/p/?linkid=2069559) +- [Microsoft Defender Advanced Threat Protection (Microsoft Defender ATP)](https://go.microsoft.com/fwlink/p/?linkid=2069559) [!include[Prereleaseinformation](prerelease.md)] diff --git a/windows/security/threat-protection/microsoft-defender-atp/deprecate.md b/windows/security/threat-protection/microsoft-defender-atp/deprecate.md index fe73a4d416..ac6fe24aed 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/deprecate.md +++ b/windows/security/threat-protection/microsoft-defender-atp/deprecate.md @@ -4,4 +4,4 @@ ms.date: 10/17/2018 >[!WARNING] -> This page documents a feature that will soon be deprecated. For the updated and supported version, see [Use the Windows Defender ATP APIs](use-apis.md). \ No newline at end of file +> This page documents a feature that will soon be deprecated. For the updated and supported version, see [Use the Microsoft Defender ATP APIs](use-apis.md). \ No newline at end of file diff --git a/windows/security/threat-protection/microsoft-defender-atp/enable-custom-ti.md b/windows/security/threat-protection/microsoft-defender-atp/enable-custom-ti.md index 49545c0428..c90107793c 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/enable-custom-ti.md +++ b/windows/security/threat-protection/microsoft-defender-atp/enable-custom-ti.md @@ -1,6 +1,6 @@ --- -title: Enable the custom threat intelligence API in Windows Defender ATP -description: Learn how to setup the custom threat intelligence application in Windows Defender ATP to create custom threat intelligence (TI). +title: Enable the custom threat intelligence API in Microsoft Defender ATP +description: Learn how to setup the custom threat intelligence application in Microsoft Defender ATP to create custom threat intelligence (TI). keywords: enable custom threat intelligence application, custom ti application, application name, client id, authorization url, resource, client secret, access tokens search.product: eADQiWindows 10XVcnh search.appverid: met150 @@ -18,16 +18,16 @@ ms.topic: article ms.date: 04/24/2018 --- -# Enable the custom threat intelligence API in Windows Defender ATP +# Enable the custom threat intelligence API in Microsoft Defender ATP **Applies to:** -- [Windows Defender Advanced Threat Protection (Windows Defender ATP)](https://go.microsoft.com/fwlink/p/?linkid=2069559) +- [Microsoft Defender Advanced Threat Protection (Microsoft Defender ATP)](https://go.microsoft.com/fwlink/p/?linkid=2069559) ->Want to experience Windows Defender ATP? [Sign up for a free trial.](https://www.microsoft.com/en-us/WindowsForBusiness/windows-atp?ocid=docs-wdatp-enablecustomti-abovefoldlink) +>Want to experience Microsoft Defender ATP? [Sign up for a free trial.](https://www.microsoft.com/en-us/WindowsForBusiness/windows-atp?ocid=docs-wdatp-enablecustomti-abovefoldlink) Before you can create custom threat intelligence (TI) using REST API, you'll need to set up the custom threat intelligence application through Windows Defender Security Center. diff --git a/windows/security/threat-protection/microsoft-defender-atp/enable-secure-score.md b/windows/security/threat-protection/microsoft-defender-atp/enable-secure-score.md index c4590d0678..bf2bbbf003 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/enable-secure-score.md +++ b/windows/security/threat-protection/microsoft-defender-atp/enable-secure-score.md @@ -1,5 +1,5 @@ --- -title: Enable Secure Score in Windows Defender ATP +title: Enable Secure Score in Microsoft Defender ATP description: Set the baselines for calculating the score of Windows Defender security controls on the Secure Score dashboard. keywords: enable secure score, baseline, calculation, analytics, score, secure score dashboard, dashboard search.product: eADQiWindows 10XVcnh @@ -23,7 +23,7 @@ ms.date: 04/24/2018 **Applies to:** -- [Windows Defender Advanced Threat Protection (Windows Defender ATP)](https://go.microsoft.com/fwlink/p/?linkid=2069559) +- [Microsoft Defender Advanced Threat Protection (Microsoft Defender ATP)](https://go.microsoft.com/fwlink/p/?linkid=2069559) @@ -40,7 +40,7 @@ Set the baselines for calculating the score of Windows Defender security control ## Related topics - [View the Secure Score dashboard](secure-score-dashboard-windows-defender-advanced-threat-protection.md) -- [Update data retention settings for Windows Defender ATP](data-retention-settings-windows-defender-advanced-threat-protection.md) -- [Configure alert notifications in Windows Defender ATP](configure-email-notifications-windows-defender-advanced-threat-protection.md) -- [Enable and create Power BI reports using Windows Defender ATP data](powerbi-reports-windows-defender-advanced-threat-protection.md) -- [Configure advanced features in Windows Defender ATP](advanced-features-windows-defender-advanced-threat-protection.md) +- [Update data retention settings for Microsoft Defender ATP](data-retention-settings-windows-defender-advanced-threat-protection.md) +- [Configure alert notifications in Microsoft Defender ATP](configure-email-notifications-windows-defender-advanced-threat-protection.md) +- [Enable and create Power BI reports using Microsoft Defender ATP data](powerbi-reports-windows-defender-advanced-threat-protection.md) +- [Configure advanced features in Microsoft Defender ATP](advanced-features-windows-defender-advanced-threat-protection.md) diff --git a/windows/security/threat-protection/microsoft-defender-atp/enable-siem-integration.md b/windows/security/threat-protection/microsoft-defender-atp/enable-siem-integration.md index b3d89ea8d0..a5099be0b4 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/enable-siem-integration.md +++ b/windows/security/threat-protection/microsoft-defender-atp/enable-siem-integration.md @@ -1,5 +1,5 @@ --- -title: Enable SIEM integration in Windows Defender ATP +title: Enable SIEM integration in Microsoft Defender ATP description: Enable SIEM integration to receive alerts in your security information and event management (SIEM) solution. keywords: enable siem connector, siem, connector, security information and events search.product: eADQiWindows 10XVcnh @@ -18,13 +18,13 @@ ms.topic: article ms.date: 12/10/2018 --- -# Enable SIEM integration in Windows Defender ATP +# Enable SIEM integration in Microsoft Defender ATP **Applies to:** -- [Windows Defender Advanced Threat Protection (Windows Defender ATP)](https://go.microsoft.com/fwlink/p/?linkid=2069559) +- [Microsoft Defender Advanced Threat Protection (Microsoft Defender ATP)](https://go.microsoft.com/fwlink/p/?linkid=2069559) ->Want to experience Windows Defender ATP? [Sign up for a free trial.](https://www.microsoft.com/en-us/WindowsForBusiness/windows-atp?ocid=docs-wdatp-enablesiem-abovefoldlink) +>Want to experience Microsoft Defender ATP? [Sign up for a free trial.](https://www.microsoft.com/en-us/WindowsForBusiness/windows-atp?ocid=docs-wdatp-enablesiem-abovefoldlink) Enable security information and event management (SIEM) integration so you can pull alerts from Windows Defender Security Center using your SIEM solution or by connecting directly to the alerts REST API. @@ -66,12 +66,12 @@ Enable security information and event management (SIEM) integration so you can p You can now proceed with configuring your SIEM solution or connecting to the alerts REST API through programmatic access. You'll need to use the tokens when configuring your SIEM solution to allow it to receive alerts from Windows Defender Security Center. -## Integrate Windows Defender ATP with IBM QRadar -You can configure IBM QRadar to collect alerts from Windows Defender ATP. For more information, see [IBM Knowledge Center](https://www.ibm.com/support/knowledgecenter/SS42VS_DSM/c_dsm_guide_MS_Win_Defender_ATP_overview.html?cp=SS42VS_7.3.1). +## Integrate Microsoft Defender ATP with IBM QRadar +You can configure IBM QRadar to collect alerts from Microsoft Defender ATP. For more information, see [IBM Knowledge Center](https://www.ibm.com/support/knowledgecenter/SS42VS_DSM/c_dsm_guide_MS_Win_Defender_ATP_overview.html?cp=SS42VS_7.3.1). ## Related topics -- [Configure Splunk to pull Windows Defender ATP alerts](configure-splunk-windows-defender-advanced-threat-protection.md) -- [Configure HP ArcSight to pull Windows Defender ATP alerts](configure-arcsight-windows-defender-advanced-threat-protection.md) -- [Windows Defender ATP alert API fields](api-portal-mapping-windows-defender-advanced-threat-protection.md) -- [Pull Windows Defender ATP alerts using REST API](pull-alerts-using-rest-api-windows-defender-advanced-threat-protection.md) +- [Configure Splunk to pull Microsoft Defender ATP alerts](configure-splunk-windows-defender-advanced-threat-protection.md) +- [Configure HP ArcSight to pull Microsoft Defender ATP alerts](configure-arcsight-windows-defender-advanced-threat-protection.md) +- [Microsoft Defender ATP alert API fields](api-portal-mapping-windows-defender-advanced-threat-protection.md) +- [Pull Microsoft Defender ATP alerts using REST API](pull-alerts-using-rest-api-windows-defender-advanced-threat-protection.md) - [Troubleshoot SIEM tool integration issues](troubleshoot-siem-windows-defender-advanced-threat-protection.md) diff --git a/windows/security/threat-protection/microsoft-defender-atp/evaluate-atp.md b/windows/security/threat-protection/microsoft-defender-atp/evaluate-atp.md index 6dd9971ceb..85aa0f8290 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/evaluate-atp.md +++ b/windows/security/threat-protection/microsoft-defender-atp/evaluate-atp.md @@ -1,5 +1,5 @@ --- -title: Evaluate Windows Defender Advanced Threat Protection +title: Evaluate Microsoft Defender Advanced Threat Protection description: keywords: search.product: eADQiWindows 10XVcnh @@ -18,12 +18,12 @@ ms.topic: conceptual ms.date: 08/10/2018 --- -# Evaluate Windows Defender ATP -[Windows Defender Advanced Threat Protection (Windows Defender ATP)](https://go.microsoft.com/fwlink/p/?linkid=2069559) is a unified platform for preventative protection, post-breach detection, automated investigation, and response. +# Evaluate Microsoft Defender ATP +[Microsoft Defender Advanced Threat Protection (Microsoft Defender ATP)](https://go.microsoft.com/fwlink/p/?linkid=2069559) is a unified platform for preventative protection, post-breach detection, automated investigation, and response. -You can evaluate Windows Defender Advanced Threat Protection in your organization by [starting your free trial](https://www.microsoft.com/en-us/WindowsForBusiness/windows-atp). +You can evaluate Microsoft Defender Advanced Threat Protection in your organization by [starting your free trial](https://www.microsoft.com/en-us/WindowsForBusiness/windows-atp). -You can also evaluate the different security capabilities in Windows Defender ATP by using the following instructions. +You can also evaluate the different security capabilities in Microsoft Defender ATP by using the following instructions. ## Evaluate attack surface reduction These capabilities help prevent attacks and exploitations from infecting your organization. @@ -40,4 +40,4 @@ Next gen protections help detect and block the latest threats. ## See Also -[Get started with Windows Defender Advanced Threat Protection](get-started.md) \ No newline at end of file +[Get started with Microsoft Defender Advanced Threat Protection](get-started.md) \ No newline at end of file diff --git a/windows/security/threat-protection/microsoft-defender-atp/event-error-codes.md b/windows/security/threat-protection/microsoft-defender-atp/event-error-codes.md index f49caf3929..b6e868da21 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/event-error-codes.md +++ b/windows/security/threat-protection/microsoft-defender-atp/event-error-codes.md @@ -1,7 +1,7 @@ --- title: Review events and errors using Event Viewer -description: Get descriptions and further troubleshooting steps (if required) for all events reported by the Windows Defender ATP service. -keywords: troubleshoot, event viewer, log summary, failure code, failed, Windows Defender Advanced Threat Protection service, cannot start, broken, can't start +description: Get descriptions and further troubleshooting steps (if required) for all events reported by the Microsoft Defender ATP service. +keywords: troubleshoot, event viewer, log summary, failure code, failed, Microsoft Defender Advanced Threat Protection service, cannot start, broken, can't start search.product: eADQiWindows 10XVcnh search.appverid: met150 ms.prod: w10 @@ -25,7 +25,7 @@ ms.date: 05/21/2018 - Event Viewer -- [Windows Defender Advanced Threat Protection (Windows Defender ATP)](https://go.microsoft.com/fwlink/p/?linkid=2069559) +- [Microsoft Defender Advanced Threat Protection (Microsoft Defender ATP)](https://go.microsoft.com/fwlink/p/?linkid=2069559) @@ -34,9 +34,9 @@ You can review event IDs in the [Event Viewer](https://msdn.microsoft.com/librar For example, if machines are not appearing in the **Machines list**, you might need to look for event IDs on the machines. You can then use this table to determine further troubleshooting steps. > [!NOTE] -> It can take several days for machines to begin reporting to the Windows Defender ATP service. +> It can take several days for machines to begin reporting to the Microsoft Defender ATP service. -**Open Event Viewer and find the Windows Defender ATP service event log:** +**Open Event Viewer and find the Microsoft Defender ATP service event log:** 1. Click **Start** on the Windows menu, type **Event Viewer**, and press **Enter**. @@ -46,7 +46,7 @@ For example, if machines are not appearing in the **Machines list**, you might n a. You can also access the log by expanding **Applications and Services Logs** > **Microsoft** > **Windows** > **SENSE** and click on **Operational**. > [!NOTE] - > SENSE is the internal name used to refer to the behavioral sensor that powers Windows Defender ATP. + > SENSE is the internal name used to refer to the behavioral sensor that powers Microsoft Defender ATP. 3. Events recorded by the service will appear in the log. See the following table for a list of events recorded by the service. @@ -60,39 +60,39 @@ For example, if machines are not appearing in the **Machines list**, you might n 1 -Windows Defender Advanced Threat Protection service started (Version ```variable```). +Microsoft Defender Advanced Threat Protection service started (Version ```variable```). Occurs during system start up, shut down, and during onbboarding. Normal operating notification; no action required. 2 -Windows Defender Advanced Threat Protection service shutdown. +Microsoft Defender Advanced Threat Protection service shutdown. Occurs when the machine is shut down or offboarded. Normal operating notification; no action required. 3 -Windows Defender Advanced Threat Protection service failed to start. Failure code: ```variable```. +Microsoft Defender Advanced Threat Protection service failed to start. Failure code: ```variable```. Service did not start. Review other messages to determine possible cause and troubleshooting steps. 4 -Windows Defender Advanced Threat Protection service contacted the server at ```variable```. -Variable = URL of the Windows Defender ATP processing servers.
      +Microsoft Defender Advanced Threat Protection service contacted the server at ```variable```. +Variable = URL of the Microsoft Defender ATP processing servers.
      This URL will match that seen in the Firewall or network activity. Normal operating notification; no action required. 5 -Windows Defender Advanced Threat Protection service failed to connect to the server at ```variable```. -Variable = URL of the Windows Defender ATP processing servers.
      +Microsoft Defender Advanced Threat Protection service failed to connect to the server at ```variable```. +Variable = URL of the Microsoft Defender ATP processing servers.
      The service could not contact the external processing servers at that URL. Check the connection to the URL. See [Configure proxy and Internet connectivity](configure-proxy-internet-windows-defender-advanced-threat-protection.md). 6 -Windows Defender Advanced Threat Protection service is not onboarded and no onboarding parameters were found. +Microsoft Defender Advanced Threat Protection service is not onboarded and no onboarding parameters were found. The machine did not onboard correctly and will not be reporting to the portal. Onboarding must be run before starting the service.
      Check that the onboarding settings and scripts were deployed properly. Try to redeploy the configuration packages.
      @@ -100,14 +100,14 @@ See [Onboard Windows 10 machines](configure-endpoints-windows-defender-advanced- 7 -Windows Defender Advanced Threat Protection service failed to read the onboarding parameters. Failure: ```variable```. +Microsoft Defender Advanced Threat Protection service failed to read the onboarding parameters. Failure: ```variable```. Variable = detailed error description. The machine did not onboard correctly and will not be reporting to the portal. Check that the onboarding settings and scripts were deployed properly. Try to redeploy the configuration packages.
      See [Onboard Windows 10 machines](configure-endpoints-windows-defender-advanced-threat-protection.md). 8 -Windows Defender Advanced Threat Protection service failed to clean its configuration. Failure code: ```variable```. +Microsoft Defender Advanced Threat Protection service failed to clean its configuration. Failure code: ```variable```. **During onboarding:** The service failed to clean its configuration during the onboarding. The onboarding process continues.

      **During offboarding:** The service failed to clean its configuration during the offboarding. The offboarding process finished but the service keeps running. **Onboarding:** No action required.

      **Offboarding:** Reboot the system.
      @@ -115,47 +115,47 @@ See [Onboard Windows 10 machines](configure-endpoints-windows-defender-advanced- 9 -Windows Defender Advanced Threat Protection service failed to change its start type. Failure code: ```variable```. +Microsoft Defender Advanced Threat Protection service failed to change its start type. Failure code: ```variable```. **During onboarding:** The machine did not onboard correctly and will not be reporting to the portal.

      **During offboarding:** Failed to change the service start type. The offboarding process continues. Check that the onboarding settings and scripts were deployed properly. Try to redeploy the configuration packages.
      See [Onboard Windows 10 machines](configure-endpoints-windows-defender-advanced-threat-protection.md). 10 -Windows Defender Advanced Threat Protection service failed to persist the onboarding information. Failure code: ```variable```. +Microsoft Defender Advanced Threat Protection service failed to persist the onboarding information. Failure code: ```variable```. The machine did not onboard correctly and will not be reporting to the portal. Check that the onboarding settings and scripts were deployed properly. Try to redeploy the configuration packages.
      See [Onboard Windows 10 machines](configure-endpoints-windows-defender-advanced-threat-protection.md). 11 -Onboarding or re-onboarding of Windows Defender Advanced Threat Protection service completed. +Onboarding or re-onboarding of Microsoft Defender Advanced Threat Protection service completed. The machine onboarded correctly. Normal operating notification; no action required.
      It may take several hours for the machine to appear in the portal. 12 -Windows Defender Advanced Threat Protection failed to apply the default configuration. +Microsoft Defender Advanced Threat Protection failed to apply the default configuration. Service was unable to apply the default configuration. This error should resolve after a short period of time. 13 -Windows Defender Advanced Threat Protection machine ID calculated: ```variable```. +Microsoft Defender Advanced Threat Protection machine ID calculated: ```variable```. Normal operating process. Normal operating notification; no action required. 15 -Windows Defender Advanced Threat Protection cannot start command channel with URL: ```variable```. -Variable = URL of the Windows Defender ATP processing servers.
      +Microsoft Defender Advanced Threat Protection cannot start command channel with URL: ```variable```. +Variable = URL of the Microsoft Defender ATP processing servers.
      The service could not contact the external processing servers at that URL. Check the connection to the URL. See [Configure proxy and Internet connectivity](configure-proxy-internet-windows-defender-advanced-threat-protection.md). 17 -Windows Defender Advanced Threat Protection service failed to change the Connected User Experiences and Telemetry service location. Failure code: ```variable```. +Microsoft Defender Advanced Threat Protection service failed to change the Connected User Experiences and Telemetry service location. Failure code: ```variable```. An error occurred with the Windows telemetry service. [Ensure the diagnostic data service is enabled](troubleshoot-onboarding-windows-defender-advanced-threat-protection.md#ensure-the-diagnostics-service-is-enabled).
      Check that the onboarding settings and scripts were deployed properly. Try to redeploy the configuration packages.
      @@ -182,7 +182,7 @@ If this error persists after a system restart, ensure all Windows updates have f 25 -Windows Defender Advanced Threat Protection service failed to reset health status in the registry. Failure code: ```variable```. +Microsoft Defender Advanced Threat Protection service failed to reset health status in the registry. Failure code: ```variable```. The machine did not onboard correctly. It will report to the portal, however the service may not appear as registered in SCCM or the registry. Check that the onboarding settings and scripts were deployed properly. Try to redeploy the configuration packages.
      @@ -190,7 +190,7 @@ See [Onboard Windows 10 machines](configure-endpoints-windows-defender-advanced- 26 -Windows Defender Advanced Threat Protection service failed to set the onboarding status in the registry. Failure code: ```variable```. +Microsoft Defender Advanced Threat Protection service failed to set the onboarding status in the registry. Failure code: ```variable```. The machine did not onboard correctly.
      It will report to the portal, however the service may not appear as registered in SCCM or the registry. Check that the onboarding settings and scripts were deployed properly. Try to redeploy the configuration packages.
      @@ -198,15 +198,15 @@ See [Onboard Windows 10 machines](configure-endpoints-windows-defender-advanced- 27 -Windows Defender Advanced Threat Protection service failed to enable SENSE aware mode in Windows Defender Antivirus. Onboarding process failed. Failure code: ```variable```. -Normally, Windows Defender Antivirus will enter a special passive state if another real-time antimalware product is running properly on the machine, and the machine is reporting to Windows Defender ATP. +Microsoft Defender Advanced Threat Protection service failed to enable SENSE aware mode in Windows Defender Antivirus. Onboarding process failed. Failure code: ```variable```. +Normally, Windows Defender Antivirus will enter a special passive state if another real-time antimalware product is running properly on the machine, and the machine is reporting to Microsoft Defender ATP. Check that the onboarding settings and scripts were deployed properly. Try to redeploy the configuration packages.
      See [Onboard Windows 10 machines](configure-endpoints-windows-defender-advanced-threat-protection.md).
      Ensure real-time antimalware protection is running properly. 28 -Windows Defender Advanced Threat Protection Connected User Experiences and Telemetry service registration failed. Failure code: ```variable```. +Microsoft Defender Advanced Threat Protection Connected User Experiences and Telemetry service registration failed. Failure code: ```variable```. An error occurred with the Windows telemetry service. [Ensure the diagnostic data service is enabled](troubleshoot-onboarding-windows-defender-advanced-threat-protection.md#ensure-the-diagnostic-data-service-is-enabled).
      Check that the onboarding settings and scripts were deployed properly. Try to redeploy the configuration packages.
      @@ -220,34 +220,34 @@ See [Onboard Windows 10 machines](configure-endpoints-windows-defender-advanced- 30 -Windows Defender Advanced Threat Protection service failed to disable SENSE aware mode in Windows Defender Antivirus. Failure code: ```variable```. -Normally, Windows Defender Antivirus will enter a special passive state if another real-time antimalware product is running properly on the machine, and the machine is reporting to Windows Defender ATP. +Microsoft Defender Advanced Threat Protection service failed to disable SENSE aware mode in Windows Defender Antivirus. Failure code: ```variable```. +Normally, Windows Defender Antivirus will enter a special passive state if another real-time antimalware product is running properly on the machine, and the machine is reporting to Microsoft Defender ATP. Check that the onboarding settings and scripts were deployed properly. Try to redeploy the configuration packages.
      See [Onboard Windows 10 machines](configure-endpoints-windows-defender-advanced-threat-protection.md)
      Ensure real-time antimalware protection is running properly. 31 -Windows Defender Advanced Threat Protection Connected User Experiences and Telemetry service unregistration failed. Failure code: ```variable```. +Microsoft Defender Advanced Threat Protection Connected User Experiences and Telemetry service unregistration failed. Failure code: ```variable```. An error occurred with the Windows telemetry service during onboarding. The offboarding process continues. [Check for errors with the Windows telemetry service](troubleshoot-onboarding-windows-defender-advanced-threat-protection.md#ensure-the-diagnostic-data-service-is-enabled). 32 -Windows Defender Advanced Threat Protection service failed to request to stop itself after offboarding process. Failure code: %1 +Microsoft Defender Advanced Threat Protection service failed to request to stop itself after offboarding process. Failure code: %1 An error occurred during offboarding. Reboot the machine. 33 -Windows Defender Advanced Threat Protection service failed to persist SENSE GUID. Failure code: ```variable```. +Microsoft Defender Advanced Threat Protection service failed to persist SENSE GUID. Failure code: ```variable```. A unique identifier is used to represent each machine that is reporting to the portal.
      If the identifier does not persist, the same machine might appear twice in the portal. Check registry permissions on the machine to ensure the service can update the registry. 34 -Windows Defender Advanced Threat Protection service failed to add itself as a dependency on the Connected User Experiences and Telemetry service, causing onboarding process to fail. Failure code: ```variable```. +Microsoft Defender Advanced Threat Protection service failed to add itself as a dependency on the Connected User Experiences and Telemetry service, causing onboarding process to fail. Failure code: ```variable```. An error occurred with the Windows telemetry service. [Ensure the diagnostic data service is enabled](troubleshoot-onboarding-windows-defender-advanced-threat-protection.md#ensure-the-diagnostic-data-service-is-enabled).
      Check that the onboarding settings and scripts were deployed properly. Try to redeploy the configuration packages.
      @@ -255,62 +255,62 @@ See [Onboard Windows 10 machines](configure-endpoints-windows-defender-advanced- 35 -Windows Defender Advanced Threat Protection service failed to remove itself as a dependency on the Connected User Experiences and Telemetry service. Failure code: ```variable```. +Microsoft Defender Advanced Threat Protection service failed to remove itself as a dependency on the Connected User Experiences and Telemetry service. Failure code: ```variable```. An error occurred with the Windows telemetry service during offboarding. The offboarding process continues. Check for errors with the Windows diagnostic data service. 36 -Windows Defender Advanced Threat Protection Connected User Experiences and Telemetry service registration succeeded. Completion code: ```variable```. -Registering Windows Defender Advanced Threat Protection with the Connected User Experiences and Telemetry service completed successfully. +Microsoft Defender Advanced Threat Protection Connected User Experiences and Telemetry service registration succeeded. Completion code: ```variable```. +Registering Microsoft Defender Advanced Threat Protection with the Connected User Experiences and Telemetry service completed successfully. Normal operating notification; no action required. 37 -Windows Defender Advanced Threat Protection A module is about to exceed its quota. Module: %1, Quota: {%2} {%3}, Percentage of quota utilization: %4. +Microsoft Defender Advanced Threat Protection A module is about to exceed its quota. Module: %1, Quota: {%2} {%3}, Percentage of quota utilization: %4. The machine has almost used its allocated quota of the current 24-hour window. It’s about to be throttled. Normal operating notification; no action required. 38 -Network connection is identified as low. Windows Defender Advanced Threat Protection will contact the server every %1 minutes. Metered connection: %2, internet available: %3, free network available: %4. +Network connection is identified as low. Microsoft Defender Advanced Threat Protection will contact the server every %1 minutes. Metered connection: %2, internet available: %3, free network available: %4. The machine is using a metered/paid network and will be contacting the server less frequently. Normal operating notification; no action required. 39 -Network connection is identified as normal. Windows Defender Advanced Threat Protection will contact the server every %1 minutes. Metered connection: %2, internet available: %3, free network available: %4. +Network connection is identified as normal. Microsoft Defender Advanced Threat Protection will contact the server every %1 minutes. Metered connection: %2, internet available: %3, free network available: %4. The machine is not using a metered/paid connection and will contact the server as usual. Normal operating notification; no action required. 40 -Battery state is identified as low. Windows Defender Advanced Threat Protection will contact the server every %1 minutes. Battery state: %2. +Battery state is identified as low. Microsoft Defender Advanced Threat Protection will contact the server every %1 minutes. Battery state: %2. The machine has low battery level and will contact the server less frequently. Normal operating notification; no action required. 41 -Battery state is identified as normal. Windows Defender Advanced Threat Protection will contact the server every %1 minutes. Battery state: %2. +Battery state is identified as normal. Microsoft Defender Advanced Threat Protection will contact the server every %1 minutes. Battery state: %2. The machine doesn’t have low battery level and will contact the server as usual. Normal operating notification; no action required. 42 -Windows Defender Advanced Threat Protection WDATP component failed to perform action. Component: %1, Action: %2, Exception Type: %3, Exception message: %4 +Microsoft Defender Advanced Threat Protection WDATP component failed to perform action. Component: %1, Action: %2, Exception Type: %3, Exception message: %4 Internal error. The service failed to start. If this error persists, contact Support. 43 -Windows Defender Advanced Threat Protection WDATP component failed to perform action. Component: %1, Action: %2, Exception Type: %3, Exception Error: %4, Exception message: %5 +Microsoft Defender Advanced Threat Protection WDATP component failed to perform action. Component: %1, Action: %2, Exception Type: %3, Exception Error: %4, Exception message: %5 Internal error. The service failed to start. If this error persists, contact Support. 44 -Offboarding of Windows Defender Advanced Threat Protection service completed. +Offboarding of Microsoft Defender Advanced Threat Protection service completed. The service was offboarded. Normal operating notification; no action required. @@ -342,9 +342,9 @@ See [Onboard Windows 10 machines](configure-endpoints-windows-defender-advanced- ->Want to experience Windows Defender ATP? [Sign up for a free trial.](https://www.microsoft.com/en-us/WindowsForBusiness/windows-atp?ocid=docs-wdatp-eventerrorcodes-belowfoldlink) +>Want to experience Microsoft Defender ATP? [Sign up for a free trial.](https://www.microsoft.com/en-us/WindowsForBusiness/windows-atp?ocid=docs-wdatp-eventerrorcodes-belowfoldlink) ## Related topics - [Onboard Windows 10 machines](configure-endpoints-windows-defender-advanced-threat-protection.md) - [Configure machine proxy and Internet connectivity settings](configure-proxy-internet-windows-defender-advanced-threat-protection.md) -- [Troubleshoot Windows Defender ATP](troubleshoot-onboarding-windows-defender-advanced-threat-protection.md) +- [Troubleshoot Microsoft Defender ATP](troubleshoot-onboarding-windows-defender-advanced-threat-protection.md) diff --git a/windows/security/threat-protection/microsoft-defender-atp/experiment-custom-ti.md b/windows/security/threat-protection/microsoft-defender-atp/experiment-custom-ti.md index 3e8ba14f02..b89eeb886a 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/experiment-custom-ti.md +++ b/windows/security/threat-protection/microsoft-defender-atp/experiment-custom-ti.md @@ -1,6 +1,6 @@ --- title: Experiment with custom threat intelligence alerts -description: Use this end-to-end guide to start using the Windows Defender ATP threat intelligence API. +description: Use this end-to-end guide to start using the Microsoft Defender ATP threat intelligence API. keywords: alert definitions, indicators of compromise, threat intelligence, custom threat intelligence, rest api, api search.product: eADQiWindows 10XVcnh search.appverid: met150 @@ -23,13 +23,13 @@ ms.date: 11/09/2017 **Applies to:** -- [Windows Defender Advanced Threat Protection (Windows Defender ATP)](https://go.microsoft.com/fwlink/p/?linkid=2069559) +- [Microsoft Defender Advanced Threat Protection (Microsoft Defender ATP)](https://go.microsoft.com/fwlink/p/?linkid=2069559) ->Want to experience Windows Defender ATP? [Sign up for a free trial.](https://www.microsoft.com/en-us/WindowsForBusiness/windows-atp?ocid=docs-wdatp-experimentcustomti-abovefoldlink) +>Want to experience Microsoft Defender ATP? [Sign up for a free trial.](https://www.microsoft.com/en-us/WindowsForBusiness/windows-atp?ocid=docs-wdatp-experimentcustomti-abovefoldlink) -With the Windows Defender ATP threat intelligence API, you can create custom threat intelligence alerts that can help you keep track of possible attack activities in your organization. +With the Microsoft Defender ATP threat intelligence API, you can create custom threat intelligence alerts that can help you keep track of possible attack activities in your organization. For more information about threat intelligence concepts, see [Understand threat intelligence concepts](threat-indicator-concepts-windows-defender-advanced-threat-protection.md). @@ -47,7 +47,7 @@ This step will guide you in creating an alert definition and an IOC for a malici 1. Open a Windows PowerShell ISE. -2. Copy and paste the following PowerShell script. This script will upload a sample alert definition and IOC to Windows Defender ATP which you can use to generate an alert. +2. Copy and paste the following PowerShell script. This script will upload a sample alert definition and IOC to Microsoft Defender ATP which you can use to generate an alert. NOTE: Make sure you replace the authUrl, clientId, and clientSecret values with your details which you saved in when you enabled the threat intelligence application. @@ -80,7 +80,7 @@ This step will guide you in creating an alert definition and an IOC for a malici $alertDefinitionPayload = @{ "Name" = "Test Alert" "Severity" = "Medium" - "InternalDescription" = "A test alert used to demonstrate the Windows Defender ATP TI API feature" + "InternalDescription" = "A test alert used to demonstrate the Microsoft Defender ATP TI API feature" "Title" = "Test alert." "UxDescription" = "This is a test alert based on a sample custom alert definition. This alert was triggered manually using a provided test command. It indicates that the Threat Intelligence API has been properly enabled." "RecommendedAction" = "No recommended action for this test alert." @@ -130,9 +130,9 @@ This step will guide you in creating an alert definition and an IOC for a malici ~~~~ ## Step 3: Simulate a custom TI alert -This step will guide you in simulating an event in connection to a malicious IP that will trigger the Windows Defender ATP custom TI alert. +This step will guide you in simulating an event in connection to a malicious IP that will trigger the Microsoft Defender ATP custom TI alert. -1. Open a Windows PowerShell ISE in the machine you onboarded to Windows Defender ATP. +1. Open a Windows PowerShell ISE in the machine you onboarded to Microsoft Defender ATP. 2. Type `Invoke-WebRequest 52.184.197.12` in the editor and click **Run**. This call will generate a network communication event to a Microsoft's dedicated demo server that will raise an alert based on the custom alert definition. @@ -143,7 +143,7 @@ This step will guide you in exploring the custom alert in the portal. 1. Open [Windows Defender Security Center](http://securitycenter.windows.com/) on a browser. -2. Log in with your Windows Defender ATP credentials. +2. Log in with your Microsoft Defender ATP credentials. 3. The dashboard should display the custom TI alert for the victim machine resulting from the simulated attack. @@ -154,7 +154,7 @@ This step will guide you in exploring the custom alert in the portal. ## Related topics - [Understand threat intelligence concepts](threat-indicator-concepts-windows-defender-advanced-threat-protection.md) -- [Enable the custom threat intelligence API in Windows Defender ATP](enable-custom-ti-windows-defender-advanced-threat-protection.md) +- [Enable the custom threat intelligence API in Microsoft Defender ATP](enable-custom-ti-windows-defender-advanced-threat-protection.md) - [Create custom alerts using the threat intelligence API](custom-ti-api-windows-defender-advanced-threat-protection.md) - [PowerShell code examples for the custom threat intelligence API](powershell-example-code-windows-defender-advanced-threat-protection.md) - [Python code examples for the custom threat intelligence API](python-example-code-windows-defender-advanced-threat-protection.md) diff --git a/windows/security/threat-protection/microsoft-defender-atp/exposed-apis-create-app-nativeapp.md b/windows/security/threat-protection/microsoft-defender-atp/exposed-apis-create-app-nativeapp.md index 56c66b472e..f94e8cbf84 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/exposed-apis-create-app-nativeapp.md +++ b/windows/security/threat-protection/microsoft-defender-atp/exposed-apis-create-app-nativeapp.md @@ -1,5 +1,5 @@ --- -title: Use Windows Defender Advanced Threat Protection APIs +title: Use Microsoft Defender Advanced Threat Protection APIs description: Use the exposed data and actions using a set of progammatic APIs that are part of the Microsoft Intelligence Security Graph. keywords: apis, graph api, supported apis, actor, alerts, machine, user, domain, ip, file, advanced hunting, query search.product: eADQiWindows 10XVcnh @@ -17,33 +17,33 @@ ms.topic: article ms.date: 09/03/2018 --- -# Use Windows Defender ATP APIs +# Use Microsoft Defender ATP APIs -**Applies to:** [Windows Defender Advanced Threat Protection (Windows Defender ATP)](https://wincom.blob.core.windows.net/documents/Windows10_Commercial_Comparison.pdf) +**Applies to:** [Microsoft Defender Advanced Threat Protection (Microsoft Defender ATP)](https://wincom.blob.core.windows.net/documents/Windows10_Commercial_Comparison.pdf) -> Want to experience Windows Defender ATP? [Sign up for a free trial.](https://www.microsoft.com/en-us/WindowsForBusiness/windows-atp?ocid=docs-wdatp-exposedapis-abovefoldlink) +> Want to experience Microsoft Defender ATP? [Sign up for a free trial.](https://www.microsoft.com/en-us/WindowsForBusiness/windows-atp?ocid=docs-wdatp-exposedapis-abovefoldlink) [!include[Prerelease information](prerelease.md)] -This page describes how to create an application to get programmatic access to Windows Defender ATP on behalf of a user. +This page describes how to create an application to get programmatic access to Microsoft Defender ATP on behalf of a user. -If you need programmatic access Windows Defender ATP without a user, refer to [Access Windows Defender ATP with application context](exposed-apis-create-app-webapp.md). +If you need programmatic access Microsoft Defender ATP without a user, refer to [Access Microsoft Defender ATP with application context](exposed-apis-create-app-webapp.md). If you are not sure which access you need, read the [Introduction page](apis-intro.md). -Windows Defender ATP exposes much of its data and actions through a set of programmatic APIs. Those APIs will enable you to automate work flows and innovate based on Windows Defender ATP capabilities. The API access requires OAuth2.0 authentication. For more information, see [OAuth 2.0 Authorization Code Flow](https://docs.microsoft.com/en-us/azure/active-directory/develop/active-directory-v2-protocols-oauth-code). +Microsoft Defender ATP exposes much of its data and actions through a set of programmatic APIs. Those APIs will enable you to automate work flows and innovate based on Microsoft Defender ATP capabilities. The API access requires OAuth2.0 authentication. For more information, see [OAuth 2.0 Authorization Code Flow](https://docs.microsoft.com/en-us/azure/active-directory/develop/active-directory-v2-protocols-oauth-code). In general, you’ll need to take the following steps to use the APIs: - Create an AAD application - Get an access token using this application -- Use the token to access Windows Defender ATP API +- Use the token to access Microsoft Defender ATP API -This page explains how to create an AAD application, get an access token to Windows Defender ATP and validate the token. +This page explains how to create an AAD application, get an access token to Microsoft Defender ATP and validate the token. >[!NOTE] -> When accessing Windows Defender ATP API on behalf of a user, you will need the correct App permission and user permission. -> If you are not familiar with user permissions on Windows Defender ATP, see [Manage portal access using role-based access control](rbac-windows-defender-advanced-threat-protection.md). +> When accessing Microsoft Defender ATP API on behalf of a user, you will need the correct App permission and user permission. +> If you are not familiar with user permissions on Microsoft Defender ATP, see [Manage portal access using role-based access control](rbac-windows-defender-advanced-threat-protection.md). >[!TIP] > If you have the permission to perform an action in the portal, you have the permission to perform the action in the API. @@ -162,9 +162,9 @@ Sanity check to make sure you got a correct token: ![Image of token validation](images/nativeapp-decoded-token.png) -## Use the token to access Windows Defender ATP API +## Use the token to access Microsoft Defender ATP API -- Choose the API you want to use - [Supported Windows Defender ATP APIs](exposed-apis-list.md) +- Choose the API you want to use - [Supported Microsoft Defender ATP APIs](exposed-apis-list.md) - Set the Authorization header in the HTTP request you send to "Bearer {token}" (Bearer is the Authorization scheme) - The Expiration time of the token is 1 hour (you can send more then one request with the same token) @@ -182,5 +182,5 @@ Sanity check to make sure you got a correct token: ``` ## Related topics -- [Windows Defender ATP APIs](exposed-apis-list.md) -- [Access Windows Defender ATP with application context](exposed-apis-create-app-webapp.md) \ No newline at end of file +- [Microsoft Defender ATP APIs](exposed-apis-list.md) +- [Access Microsoft Defender ATP with application context](exposed-apis-create-app-webapp.md) \ No newline at end of file diff --git a/windows/security/threat-protection/microsoft-defender-atp/exposed-apis-create-app-webapp.md b/windows/security/threat-protection/microsoft-defender-atp/exposed-apis-create-app-webapp.md index 4d6b21364d..e0800f060b 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/exposed-apis-create-app-webapp.md +++ b/windows/security/threat-protection/microsoft-defender-atp/exposed-apis-create-app-webapp.md @@ -1,5 +1,5 @@ --- -title: Create an app to access Windows Defender ATP without a user +title: Create an app to access Microsoft Defender ATP without a user description: Use the exposed data and actions using a set of progammatic APIs that are part of the Microsoft Intelligence Security Graph. keywords: apis, graph api, supported apis, actor, alerts, machine, user, domain, ip, file, advanced hunting, query search.product: eADQiWindows 10XVcnh @@ -17,28 +17,28 @@ ms.topic: article ms.date: 09/03/2018 --- -# Create an app to access Windows Defender ATP without a user +# Create an app to access Microsoft Defender ATP without a user -**Applies to:** [Windows Defender Advanced Threat Protection (Windows Defender ATP)](https://wincom.blob.core.windows.net/documents/Windows10_Commercial_Comparison.pdf) +**Applies to:** [Microsoft Defender Advanced Threat Protection (Microsoft Defender ATP)](https://wincom.blob.core.windows.net/documents/Windows10_Commercial_Comparison.pdf) -> Want to experience Windows Defender ATP? [Sign up for a free trial.](https://www.microsoft.com/en-us/WindowsForBusiness/windows-atp?ocid=docs-wdatp-exposedapis-abovefoldlink) +> Want to experience Microsoft Defender ATP? [Sign up for a free trial.](https://www.microsoft.com/en-us/WindowsForBusiness/windows-atp?ocid=docs-wdatp-exposedapis-abovefoldlink) [!include[Prerelease information](prerelease.md)] -This page describes how to create an application to get programmatic access to Windows Defender ATP without a user. +This page describes how to create an application to get programmatic access to Microsoft Defender ATP without a user. -If you need programmatic access Windows Defender ATP on behalf of a user, see [Get access wtih user context](exposed-apis-create-app-nativeapp.md) +If you need programmatic access Microsoft Defender ATP on behalf of a user, see [Get access wtih user context](exposed-apis-create-app-nativeapp.md) If you are not sure which access you need, see [Get started](apis-intro.md). -Windows Defender ATP exposes much of its data and actions through a set of programmatic APIs. Those APIs will help you automate workflows and innovate based on Windows Defender ATP capabilities. The API access requires OAuth2.0 authentication. For more information, see [OAuth 2.0 Authorization Code Flow](https://docs.microsoft.com/en-us/azure/active-directory/develop/active-directory-v2-protocols-oauth-code). +Microsoft Defender ATP exposes much of its data and actions through a set of programmatic APIs. Those APIs will help you automate workflows and innovate based on Microsoft Defender ATP capabilities. The API access requires OAuth2.0 authentication. For more information, see [OAuth 2.0 Authorization Code Flow](https://docs.microsoft.com/en-us/azure/active-directory/develop/active-directory-v2-protocols-oauth-code). In general, you’ll need to take the following steps to use the APIs: - Create an AAD application - Get an access token using this application -- Use the token to access Windows Defender ATP API +- Use the token to access Microsoft Defender ATP API -This page explains how to create an AAD application, get an access token to Windows Defender ATP and validate the token. +This page explains how to create an AAD application, get an access token to Microsoft Defender ATP and validate the token. ## Create an app @@ -101,7 +101,7 @@ This page explains how to create an AAD application, get an access token to Wind ![Image of created app id](images/webapp-app-id1.png) -11. **For Windows Defender ATP Partners only** - Set your application to be multi-tenanted +11. **For Microsoft Defender ATP Partners only** - Set your application to be multi-tenanted This is **required** for 3rd party apps (for example, if you create an application that is intended to run in multiple customers tenant). @@ -113,7 +113,7 @@ This page explains how to create an AAD application, get an access token to Wind - Application consent for your multi-tenant App: - You need your application to be approved in each tenant where you intend to use it. This is because your application interacts with Windows Defender ATP application on behalf of your customer. + You need your application to be approved in each tenant where you intend to use it. This is because your application interacts with Microsoft Defender ATP application on behalf of your customer. You (or your customer if you are writing a 3rd party application) need to click the consent link and approve your application. The consent should be done with a user who has admin privileges in the active directory. @@ -199,7 +199,7 @@ Refer to [Get token using Python](run-advanced-query-sample-python.md#get-token) - Open a command window - ​Set CLIENT_ID to your Azure application ID - Set CLIENT_SECRET to your Azure application secret -- Set TENANT_ID to the Azure tenant ID of the customer that wants to use your application to access Windows Defender ATP application +- Set TENANT_ID to the Azure tenant ID of the customer that wants to use your application to access Microsoft Defender ATP application - Run the below command: ``` @@ -217,13 +217,13 @@ You will get an answer of the form: Sanity check to make sure you got a correct token: - Copy/paste into [JWT](https://jwt.ms) the token you get in the previous step in order to decode it - Validate you get a 'roles' claim with the desired permissions -- In the screenshot below you can see a decoded token acquired from an app with permissions to all of Windows Defender ATP's roles: +- In the screenshot below you can see a decoded token acquired from an app with permissions to all of Microsoft Defender ATP's roles: ![Image of token validation](images/webapp-decoded-token.png) -## Use the token to access Windows Defender ATP API +## Use the token to access Microsoft Defender ATP API -- Choose the API you want to use, for more information, see [Supported Windows Defender ATP APIs](exposed-apis-list.md) +- Choose the API you want to use, for more information, see [Supported Microsoft Defender ATP APIs](exposed-apis-list.md) - Set the Authorization header in the Http request you send to "Bearer {token}" (Bearer is the Authorization scheme) - The Expiration time of the token is 1 hour (you can send more then one request with the same token) @@ -241,5 +241,5 @@ Sanity check to make sure you got a correct token: ``` ## Related topics -- [Supported Windows Defender ATP APIs](exposed-apis-list.md) -- [Access Windows Defender ATP on behalf of a user](exposed-apis-create-app-nativeapp.md) \ No newline at end of file +- [Supported Microsoft Defender ATP APIs](exposed-apis-list.md) +- [Access Microsoft Defender ATP on behalf of a user](exposed-apis-create-app-nativeapp.md) \ No newline at end of file diff --git a/windows/security/threat-protection/microsoft-defender-atp/exposed-apis-full-sample-powershell.md b/windows/security/threat-protection/microsoft-defender-atp/exposed-apis-full-sample-powershell.md index 80c3f2dfdf..baa4e06aca 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/exposed-apis-full-sample-powershell.md +++ b/windows/security/threat-protection/microsoft-defender-atp/exposed-apis-full-sample-powershell.md @@ -17,18 +17,18 @@ ms.topic: article ms.date: 09/24/2018 --- -# Windows Defender ATP APIs using PowerShell +# Microsoft Defender ATP APIs using PowerShell **Applies to:** -- [Windows Defender Advanced Threat Protection (Windows Defender ATP)](https://go.microsoft.com/fwlink/p/?linkid=2069559) +- [Microsoft Defender Advanced Threat Protection (Microsoft Defender ATP)](https://go.microsoft.com/fwlink/p/?linkid=2069559) [!include[Prerelease information](prerelease.md)] -Full scenario using multiple APIs from Windows Defender ATP. +Full scenario using multiple APIs from Microsoft Defender ATP. In this section we share PowerShell samples to - Retrieve a token - - Use token to retrieve the latest alerts in Windows Defender ATP + - Use token to retrieve the latest alerts in Microsoft Defender ATP - For each alert, if the alert has medium or high priority and is still in progress, check how many times the machine has connected to suspicious URL. >**Prerequisite**: You first need to [create an app](apis-intro.md). @@ -48,7 +48,7 @@ Set-ExecutionPolicy -ExecutionPolicy Bypass - Run the below > - $tenantId: ID of the tenant on behalf of which you want to run the query (i.e., the query will be run on the data of this tenant) -> - $appId: ID of your AAD app (the app must have 'Run advanced queries' permission to Windows Defender ATP) +> - $appId: ID of your AAD app (the app must have 'Run advanced queries' permission to Microsoft Defender ATP) > - $appSecret: Secret of your AAD app > - $suspiciousUrl: The URL @@ -116,7 +116,7 @@ $response ## Related topic -- [Windows Defender ATP APIs](apis-intro.md) +- [Microsoft Defender ATP APIs](apis-intro.md) - [Advanced Hunting API](run-advanced-query-api.md) - [Advanced Hunting using Python](run-advanced-query-sample-python.md) - [Schedule Advanced Hunting](run-advanced-query-sample-ms-flow.md) diff --git a/windows/security/threat-protection/microsoft-defender-atp/exposed-apis-list.md b/windows/security/threat-protection/microsoft-defender-atp/exposed-apis-list.md index 2be8b96e04..a0676ff144 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/exposed-apis-list.md +++ b/windows/security/threat-protection/microsoft-defender-atp/exposed-apis-list.md @@ -1,6 +1,6 @@ --- -title: Supported Windows Defender Advanced Threat Protection query APIs -description: Learn about the specific supported Windows Defender Advanced Threat Protection entities where you can create API calls to. +title: Supported Microsoft Defender Advanced Threat Protection query APIs +description: Learn about the specific supported Microsoft Defender Advanced Threat Protection entities where you can create API calls to. keywords: apis, supported apis, actor, alerts, machine, user, domain, ip, file, advanced queries, advanced hunting search.product: eADQiWindows 10XVcnh ms.prod: w10 @@ -16,14 +16,14 @@ ms.collection: M365-security-compliance ms.topic: article --- -# Supported Windows Defender ATP query APIs +# Supported Microsoft Defender ATP query APIs **Applies to:** -- Windows Defender Advanced Threat Protection (Windows Defender ATP) +- Microsoft Defender Advanced Threat Protection (Microsoft Defender ATP) ->Want to experience Windows Defender ATP? [Sign up for a free trial.](https://www.microsoft.com/en-us/WindowsForBusiness/windows-atp?ocid=docs-wdatp-supportedapis-abovefoldlink) +>Want to experience Microsoft Defender ATP? [Sign up for a free trial.](https://www.microsoft.com/en-us/WindowsForBusiness/windows-atp?ocid=docs-wdatp-supportedapis-abovefoldlink) ## End Point URI and Versioning @@ -58,4 +58,4 @@ Machines | Run API calls such as find machine information by IP, get machines, g User | Run API calls such as get alert related user information, user information, user related alerts, and user related machines. ## Related topic -- [Windows Defender ATP APIs](apis-intro.md) +- [Microsoft Defender ATP APIs](apis-intro.md) diff --git a/windows/security/threat-protection/microsoft-defender-atp/exposed-apis-odata-samples.md b/windows/security/threat-protection/microsoft-defender-atp/exposed-apis-odata-samples.md index 8892195292..3eb6c6eb6b 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/exposed-apis-odata-samples.md +++ b/windows/security/threat-protection/microsoft-defender-atp/exposed-apis-odata-samples.md @@ -1,6 +1,6 @@ --- -title: OData queries with Windows Defender ATP -description: OData queries with Windows Defender ATP +title: OData queries with Microsoft Defender ATP +description: OData queries with Microsoft Defender ATP keywords: apis, supported apis, odata, query search.product: eADQiWindows 10XVcnh ms.prod: w10 @@ -17,9 +17,9 @@ ms.topic: article ms.date: 11/15/2018 --- -# OData queries with Windows Defender ATP +# OData queries with Microsoft Defender ATP **Applies to:** -- Windows Defender Advanced Threat Protection (Windows Defender ATP) +- Microsoft Defender Advanced Threat Protection (Microsoft Defender ATP) [!include[Prerelease information](prerelease.md)] @@ -242,7 +242,7 @@ Content-type: application/json ### Example 6 -- Get all the Anti-Virus scans that the user Analyst@examples.onmicrosoft.com created using Windows Defender ATP +- Get all the Anti-Virus scans that the user Analyst@examples.onmicrosoft.com created using Microsoft Defender ATP ``` HTTP GET https://api.securitycenter.windows.com/api/machineactions?$filter=requestor eq 'Analyst@WcdTestPrd.onmicrosoft.com' and type eq 'RunAntiVirusScan' @@ -293,4 +293,4 @@ Content-type: application/json ``` ## Related topic -- [Windows Defender ATP APIs](apis-intro.md) +- [Microsoft Defender ATP APIs](apis-intro.md) diff --git a/windows/security/threat-protection/microsoft-defender-atp/files.md b/windows/security/threat-protection/microsoft-defender-atp/files.md index 0491fe98c9..8a89db801c 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/files.md +++ b/windows/security/threat-protection/microsoft-defender-atp/files.md @@ -18,11 +18,11 @@ ms.topic: article # File resource type **Applies to:** -- [Windows Defender Advanced Threat Protection (Windows Defender ATP)](https://go.microsoft.com/fwlink/p/?linkid=2069559) +- [Microsoft Defender Advanced Threat Protection (Microsoft Defender ATP)](https://go.microsoft.com/fwlink/p/?linkid=2069559) [!include[Prerelease information](prerelease.md)] -Represent a file entity in Windows Defender ATP. +Represent a file entity in Microsoft Defender ATP. # Methods Method|Return Type |Description @@ -50,5 +50,5 @@ fileProductName | String | Product name. signer | String | File signer. issuer | String | File issuer. signerHash | String | Hash of the signing certificate. -isValidCertificate | Boolean | Was signing certificate successfully verified by Windows Defender ATP agent. +isValidCertificate | Boolean | Was signing certificate successfully verified by Microsoft Defender ATP agent. diff --git a/windows/security/threat-protection/microsoft-defender-atp/find-machine-info-by-ip.md b/windows/security/threat-protection/microsoft-defender-atp/find-machine-info-by-ip.md index 5e8d10dd1e..da2a070318 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/find-machine-info-by-ip.md +++ b/windows/security/threat-protection/microsoft-defender-atp/find-machine-info-by-ip.md @@ -23,7 +23,7 @@ ms.date: 07/25/2018 **Applies to:** -- Windows Defender Advanced Threat Protection (Windows Defender ATP) +- Microsoft Defender Advanced Threat Protection (Microsoft Defender ATP) Find a machine by internal IP. @@ -32,7 +32,7 @@ Find a machine by internal IP. >The timestamp must be within the last 30 days. ## Permissions -One of the following permissions is required to call this API. To learn more, including how to choose permissions, see [Use Windows Defender ATP APIs](apis-intro.md) +One of the following permissions is required to call this API. To learn more, including how to choose permissions, see [Use Microsoft Defender ATP APIs](apis-intro.md) Permission type | Permission | Permission display name :---|:---|:--- diff --git a/windows/security/threat-protection/microsoft-defender-atp/find-machines-by-ip.md b/windows/security/threat-protection/microsoft-defender-atp/find-machines-by-ip.md index 687f9ab304..d46afc1621 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/find-machines-by-ip.md +++ b/windows/security/threat-protection/microsoft-defender-atp/find-machines-by-ip.md @@ -21,7 +21,7 @@ ms.date: 12/08/2017 **Applies to:** -- Windows Defender Advanced Threat Protection (Windows Defender ATP) +- Microsoft Defender Advanced Threat Protection (Microsoft Defender ATP) [!include[Prereleaseinformation](prerelease.md)] @@ -29,7 +29,7 @@ ms.date: 12/08/2017 - The given timestamp must be in the past 30 days. ## Permissions -One of the following permissions is required to call this API. To learn more, including how to choose permissions, see [Use Windows Defender ATP APIs](apis-intro.md) +One of the following permissions is required to call this API. To learn more, including how to choose permissions, see [Use Microsoft Defender ATP APIs](apis-intro.md) Permission type | Permission | Permission display name :---|:---|:--- diff --git a/windows/security/threat-protection/microsoft-defender-atp/fix-unhealhty-sensors.md b/windows/security/threat-protection/microsoft-defender-atp/fix-unhealhty-sensors.md index f6ed806476..25198b66e2 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/fix-unhealhty-sensors.md +++ b/windows/security/threat-protection/microsoft-defender-atp/fix-unhealhty-sensors.md @@ -1,5 +1,5 @@ --- -title: Fix unhealthy sensors in Windows Defender ATP +title: Fix unhealthy sensors in Microsoft Defender ATP description: Fix machine sensors that are reporting as misconfigured or inactive so that the service receives data from the machine. keywords: misconfigured, inactive, fix sensor, sensor health, no sensor data, sensor data, impaired communications, communication search.product: eADQiWindows 10XVcnh @@ -18,16 +18,16 @@ ms.topic: article ms.date: 10/23/2017 --- -# Fix unhealthy sensors in Windows Defender ATP +# Fix unhealthy sensors in Microsoft Defender ATP **Applies to:** -- [Windows Defender Advanced Threat Protection (Windows Defender ATP)](https://go.microsoft.com/fwlink/p/?linkid=2069559) +- [Microsoft Defender Advanced Threat Protection (Microsoft Defender ATP)](https://go.microsoft.com/fwlink/p/?linkid=2069559) ->Want to experience Windows Defender ATP? [Sign up for a free trial.](https://www.microsoft.com/en-us/WindowsForBusiness/windows-atp?ocid=docs-wdatp-fixsensor-abovefoldlink) +>Want to experience Microsoft Defender ATP? [Sign up for a free trial.](https://www.microsoft.com/en-us/WindowsForBusiness/windows-atp?ocid=docs-wdatp-fixsensor-abovefoldlink) Machines that are categorized as misconfigured or inactive can be flagged due to varying causes. This section provides some explanations as to what might have caused a machine to be categorized as inactive or misconfigured. @@ -39,14 +39,14 @@ An inactive machine is not necessarily flagged due to an issue. The following ac If the machine has not been in use for more than 7 days for any reason, it will remain in an ‘Inactive’ status in the portal. **Machine was reinstalled or renamed**
      -A reinstalled or renamed machine will generate a new machine entity in Windows Defender Security Center. The previous machine entity will remain with an ‘Inactive’ status in the portal. If you reinstalled a machine and deployed the Windows Defender ATP package, search for the new machine name to verify that the machine is reporting normally. +A reinstalled or renamed machine will generate a new machine entity in Windows Defender Security Center. The previous machine entity will remain with an ‘Inactive’ status in the portal. If you reinstalled a machine and deployed the Microsoft Defender ATP package, search for the new machine name to verify that the machine is reporting normally. **Machine was offboarded**
      If the machine was offboarded it will still appear in machines list. After 7 days, the machine health state should change to inactive. **Machine is not sending signals** -If the machine is not sending any signals for more than 7 days to any of the Windows Defender ATP channels for any reason including conditions that fall under misconfigured machines classification, a machine can be considered inactive. +If the machine is not sending any signals for more than 7 days to any of the Microsoft Defender ATP channels for any reason including conditions that fall under misconfigured machines classification, a machine can be considered inactive. Do you expect a machine to be in ‘Active’ status? [Open a support ticket ticket](https://support.microsoft.com/getsupport?wf=0&tenant=ClassicCommercial&oaspworkflow=start_1.0.0.0&locale=en-us&supportregion=en-us&pesid=16055&ccsid=636206786382823561). @@ -62,10 +62,10 @@ This status indicates that there's limited communication between the machine and The following suggested actions can help fix issues related to a misconfigured machine with impaired communications: - [Ensure the machine has Internet connection](troubleshoot-onboarding-windows-defender-advanced-threat-protection.md#troubleshoot-onboarding-issues-on-the-machine)
      - The Window Defender ATP sensor requires Microsoft Windows HTTP (WinHTTP) to report sensor data and communicate with the Windows Defender ATP service. + The Window Defender ATP sensor requires Microsoft Windows HTTP (WinHTTP) to report sensor data and communicate with the Microsoft Defender ATP service. -- [Verify client connectivity to Windows Defender ATP service URLs](configure-proxy-internet-windows-defender-advanced-threat-protection.md#verify-client-connectivity-to-windows-defender-atp-service-urls)
      - Verify the proxy configuration completed successfully, that WinHTTP can discover and communicate through the proxy server in your environment, and that the proxy server allows traffic to the Windows Defender ATP service URLs. +- [Verify client connectivity to Microsoft Defender ATP service URLs](configure-proxy-internet-windows-defender-advanced-threat-protection.md#verify-client-connectivity-to-windows-defender-atp-service-urls)
      + Verify the proxy configuration completed successfully, that WinHTTP can discover and communicate through the proxy server in your environment, and that the proxy server allows traffic to the Microsoft Defender ATP service URLs. If you took corrective actions and the machine status is still misconfigured, [open a support ticket](https://go.microsoft.com/fwlink/?LinkID=761093&clcid=0x409). @@ -74,18 +74,18 @@ A misconfigured machine with status ‘No sensor data’ has communication with Follow theses actions to correct known issues related to a misconfigured machine with status ‘No sensor data’: - [Ensure the machine has Internet connection](troubleshoot-onboarding-windows-defender-advanced-threat-protection.md#troubleshoot-onboarding-issues-on-the-machine)
      - The Window Defender ATP sensor requires Microsoft Windows HTTP (WinHTTP) to report sensor data and communicate with the Windows Defender ATP service. + The Window Defender ATP sensor requires Microsoft Windows HTTP (WinHTTP) to report sensor data and communicate with the Microsoft Defender ATP service. -- [Verify client connectivity to Windows Defender ATP service URLs](configure-proxy-internet-windows-defender-advanced-threat-protection.md#verify-client-connectivity-to-windows-defender-atp-service-urls)
      - Verify the proxy configuration completed successfully, that WinHTTP can discover and communicate through the proxy server in your environment, and that the proxy server allows traffic to the Windows Defender ATP service URLs. +- [Verify client connectivity to Microsoft Defender ATP service URLs](configure-proxy-internet-windows-defender-advanced-threat-protection.md#verify-client-connectivity-to-windows-defender-atp-service-urls)
      + Verify the proxy configuration completed successfully, that WinHTTP can discover and communicate through the proxy server in your environment, and that the proxy server allows traffic to the Microsoft Defender ATP service URLs. - [Ensure the diagnostic data service is enabled](troubleshoot-onboarding-windows-defender-advanced-threat-protection.md#ensure-the-diagnostics-service-is-enabled)
      If the machines aren't reporting correctly, you might need to check that the Windows 10 diagnostic data service is set to automatically start and is running on the endpoint. - [Ensure that Windows Defender Antivirus is not disabled by policy](troubleshoot-onboarding-windows-defender-advanced-threat-protection.md#ensure-that-windows-defender-antivirus-is-not-disabled-by-a-policy)
      -If your machines are running a third-party antimalware client, the Windows Defender ATP agent needs the Windows Defender Antivirus Early Launch Antimalware (ELAM) driver to be enabled. +If your machines are running a third-party antimalware client, the Microsoft Defender ATP agent needs the Windows Defender Antivirus Early Launch Antimalware (ELAM) driver to be enabled. If you took corrective actions and the machine status is still misconfigured, [open a support ticket](https://go.microsoft.com/fwlink/?LinkID=761093&clcid=0x409). ## Related topic -- [Check sensor health state in Windows Defender ATP](check-sensor-status-windows-defender-advanced-threat-protection.md) +- [Check sensor health state in Microsoft Defender ATP](check-sensor-status-windows-defender-advanced-threat-protection.md) diff --git a/windows/security/threat-protection/microsoft-defender-atp/get-alert-info-by-id.md b/windows/security/threat-protection/microsoft-defender-atp/get-alert-info-by-id.md index 3cbd5cc31e..bbd89aa3a9 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/get-alert-info-by-id.md +++ b/windows/security/threat-protection/microsoft-defender-atp/get-alert-info-by-id.md @@ -19,14 +19,14 @@ ms.date: 12/08/2017 # Get alert information by ID API **Applies to:** -- Windows Defender Advanced Threat Protection (Windows Defender ATP) +- Microsoft Defender Advanced Threat Protection (Microsoft Defender ATP) [!include[Prereleaseinformation](prerelease.md)] Retrieves an alert by its ID. ## Permissions -One of the following permissions is required to call this API. To learn more, including how to choose permissions, see [Use Windows Defender ATP APIs](apis-intro.md) +One of the following permissions is required to call this API. To learn more, including how to choose permissions, see [Use Microsoft Defender ATP APIs](apis-intro.md) Permission type | Permission | Permission display name :---|:---|:--- diff --git a/windows/security/threat-protection/microsoft-defender-atp/get-alert-related-domain-info.md b/windows/security/threat-protection/microsoft-defender-atp/get-alert-related-domain-info.md index 5e0a0256ae..1fca507328 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/get-alert-related-domain-info.md +++ b/windows/security/threat-protection/microsoft-defender-atp/get-alert-related-domain-info.md @@ -19,14 +19,14 @@ ms.date: 12/08/2017 # Get alert related domain information API **Applies to:** -- Windows Defender Advanced Threat Protection (Windows Defender ATP) +- Microsoft Defender Advanced Threat Protection (Microsoft Defender ATP) [!include[Prereleaseinformation](prerelease.md)] Retrieves all domains related to a specific alert. ## Permissions -One of the following permissions is required to call this API. To learn more, including how to choose permissions, see [Use Windows Defender ATP APIs](apis-intro.md) +One of the following permissions is required to call this API. To learn more, including how to choose permissions, see [Use Microsoft Defender ATP APIs](apis-intro.md) Permission type | Permission | Permission display name :---|:---|:--- diff --git a/windows/security/threat-protection/microsoft-defender-atp/get-alert-related-files-info.md b/windows/security/threat-protection/microsoft-defender-atp/get-alert-related-files-info.md index a286bb19f9..9bbfea2471 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/get-alert-related-files-info.md +++ b/windows/security/threat-protection/microsoft-defender-atp/get-alert-related-files-info.md @@ -19,14 +19,14 @@ ms.date: 12/08/2017 # Get alert related files information API **Applies to:** -- Windows Defender Advanced Threat Protection (Windows Defender ATP) +- Microsoft Defender Advanced Threat Protection (Microsoft Defender ATP) [!include[Prereleaseinformation](prerelease.md)] Retrieves all files related to a specific alert. ## Permissions -One of the following permissions is required to call this API. To learn more, including how to choose permissions, see [Use Windows Defender ATP APIs](apis-intro.md) +One of the following permissions is required to call this API. To learn more, including how to choose permissions, see [Use Microsoft Defender ATP APIs](apis-intro.md) Permission type | Permission | Permission display name :---|:---|:--- diff --git a/windows/security/threat-protection/microsoft-defender-atp/get-alert-related-ip-info.md b/windows/security/threat-protection/microsoft-defender-atp/get-alert-related-ip-info.md index af24309c36..097a942506 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/get-alert-related-ip-info.md +++ b/windows/security/threat-protection/microsoft-defender-atp/get-alert-related-ip-info.md @@ -19,7 +19,7 @@ ms.date: 12/08/2017 # Get alert related IP information API **Applies to:** -- Windows Defender Advanced Threat Protection (Windows Defender ATP) +- Microsoft Defender Advanced Threat Protection (Microsoft Defender ATP) [!include[Prereleaseinformation](prerelease.md)] @@ -27,7 +27,7 @@ ms.date: 12/08/2017 Retrieves all IPs related to a specific alert. ## Permissions -One of the following permissions is required to call this API. To learn more, including how to choose permissions, see [Use Windows Defender ATP APIs](apis-intro.md) +One of the following permissions is required to call this API. To learn more, including how to choose permissions, see [Use Microsoft Defender ATP APIs](apis-intro.md) Permission type | Permission | Permission display name :---|:---|:--- diff --git a/windows/security/threat-protection/microsoft-defender-atp/get-alert-related-machine-info.md b/windows/security/threat-protection/microsoft-defender-atp/get-alert-related-machine-info.md index 55b0895b5f..67b08cb95f 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/get-alert-related-machine-info.md +++ b/windows/security/threat-protection/microsoft-defender-atp/get-alert-related-machine-info.md @@ -20,14 +20,14 @@ ms.date: 12/08/2017 # Get alert related machine information API **Applies to:** -- Windows Defender Advanced Threat Protection (Windows Defender ATP) +- Microsoft Defender Advanced Threat Protection (Microsoft Defender ATP) [!include[Prereleaseinformation](prerelease.md)] - Retrieves machine that is related to a specific alert. ## Permissions -One of the following permissions is required to call this API. To learn more, including how to choose permissions, see [Use Windows Defender ATP APIs](apis-intro.md) +One of the following permissions is required to call this API. To learn more, including how to choose permissions, see [Use Microsoft Defender ATP APIs](apis-intro.md) Permission type | Permission | Permission display name :---|:---|:--- diff --git a/windows/security/threat-protection/microsoft-defender-atp/get-alert-related-user-info.md b/windows/security/threat-protection/microsoft-defender-atp/get-alert-related-user-info.md index a96ecfe588..13feffeb9e 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/get-alert-related-user-info.md +++ b/windows/security/threat-protection/microsoft-defender-atp/get-alert-related-user-info.md @@ -19,7 +19,7 @@ ms.date: 12/08/2017 # Get alert related user information API **Applies to:** -- Windows Defender Advanced Threat Protection (Windows Defender ATP) +- Microsoft Defender Advanced Threat Protection (Microsoft Defender ATP) [!include[Prereleaseinformation](prerelease.md)] @@ -27,7 +27,7 @@ ms.date: 12/08/2017 Retrieves the user associated to a specific alert. ## Permissions -One of the following permissions is required to call this API. To learn more, including how to choose permissions, see [Use Windows Defender ATP APIs](apis-intro.md) +One of the following permissions is required to call this API. To learn more, including how to choose permissions, see [Use Microsoft Defender ATP APIs](apis-intro.md) Permission type | Permission | Permission display name :---|:---|:--- diff --git a/windows/security/threat-protection/microsoft-defender-atp/get-alerts.md b/windows/security/threat-protection/microsoft-defender-atp/get-alerts.md index 45820ed888..f75ea370fe 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/get-alerts.md +++ b/windows/security/threat-protection/microsoft-defender-atp/get-alerts.md @@ -19,7 +19,7 @@ ms.date: 12/08/2017 # List alerts API **Applies to:** -- Windows Defender Advanced Threat Protection (Windows Defender ATP) +- Microsoft Defender Advanced Threat Protection (Microsoft Defender ATP) [!include[Prereleaseinformation](prerelease.md)] @@ -28,10 +28,10 @@ ms.date: 12/08/2017 - Retrieves a collection of Alerts. - Supports [OData V4 queries](https://www.odata.org/documentation/). - The OData's Filter query is supported on: "Id", "IncidentId", "AlertCreationTime", "Status", "Severity" and "Category". -- See examples at [OData queries with Windows Defender ATP](exposed-apis-odata-samples.md) +- See examples at [OData queries with Microsoft Defender ATP](exposed-apis-odata-samples.md) ## Permissions -One of the following permissions is required to call this API. To learn more, including how to choose permissions, see [Use Windows Defender ATP APIs](apis-intro.md) +One of the following permissions is required to call this API. To learn more, including how to choose permissions, see [Use Microsoft Defender ATP APIs](apis-intro.md) Permission type | Permission | Permission display name :---|:---|:--- @@ -136,4 +136,4 @@ Here is an example of the response. ``` ## Related topics -- [OData queries with Windows Defender ATP](exposed-apis-odata-samples.md) +- [OData queries with Microsoft Defender ATP](exposed-apis-odata-samples.md) diff --git a/windows/security/threat-protection/microsoft-defender-atp/get-cvekbmap-collection.md b/windows/security/threat-protection/microsoft-defender-atp/get-cvekbmap-collection.md index e65b940689..0d1e9286c3 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/get-cvekbmap-collection.md +++ b/windows/security/threat-protection/microsoft-defender-atp/get-cvekbmap-collection.md @@ -22,7 +22,7 @@ ms.date: 10/07/2018 **Applies to:** -- [Windows Defender Advanced Threat Protection (Windows Defender ATP)](https://go.microsoft.com/fwlink/p/?linkid=2069559) +- [Microsoft Defender Advanced Threat Protection (Microsoft Defender ATP)](https://go.microsoft.com/fwlink/p/?linkid=2069559) Retrieves a map of CVE's to KB's and CVE details. diff --git a/windows/security/threat-protection/microsoft-defender-atp/get-domain-related-alerts.md b/windows/security/threat-protection/microsoft-defender-atp/get-domain-related-alerts.md index 2a44ef58e4..5ba64ec4c7 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/get-domain-related-alerts.md +++ b/windows/security/threat-protection/microsoft-defender-atp/get-domain-related-alerts.md @@ -19,7 +19,7 @@ ms.date: 12/08/2017 # Get domain related alerts API **Applies to:** -- Windows Defender Advanced Threat Protection (Windows Defender ATP) +- Microsoft Defender Advanced Threat Protection (Microsoft Defender ATP) [!include[Prereleaseinformation](prerelease.md)] @@ -31,7 +31,7 @@ ms.date: 12/08/2017 Retrieves a collection of alerts related to a given domain address. ## Permissions -One of the following permissions is required to call this API. To learn more, including how to choose permissions, see [Use Windows Defender ATP APIs](apis-intro.md) +One of the following permissions is required to call this API. To learn more, including how to choose permissions, see [Use Microsoft Defender ATP APIs](apis-intro.md) Permission type | Permission | Permission display name :---|:---|:--- diff --git a/windows/security/threat-protection/microsoft-defender-atp/get-domain-related-machines.md b/windows/security/threat-protection/microsoft-defender-atp/get-domain-related-machines.md index c1136545a5..5d423ce391 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/get-domain-related-machines.md +++ b/windows/security/threat-protection/microsoft-defender-atp/get-domain-related-machines.md @@ -19,14 +19,14 @@ ms.date: 12/08/2017 # Get domain related machines API **Applies to:** -- Windows Defender Advanced Threat Protection (Windows Defender ATP) +- Microsoft Defender Advanced Threat Protection (Microsoft Defender ATP) [!include[Prereleaseinformation](prerelease.md)] Retrieves a collection of machines that have communicated to or from a given domain address. ## Permissions -One of the following permissions is required to call this API. To learn more, including how to choose permissions, see [Use Windows Defender ATP APIs](apis-intro.md) +One of the following permissions is required to call this API. To learn more, including how to choose permissions, see [Use Microsoft Defender ATP APIs](apis-intro.md) Permission type | Permission | Permission display name :---|:---|:--- diff --git a/windows/security/threat-protection/microsoft-defender-atp/get-domain-statistics.md b/windows/security/threat-protection/microsoft-defender-atp/get-domain-statistics.md index f4f669e5a2..ae79790f9a 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/get-domain-statistics.md +++ b/windows/security/threat-protection/microsoft-defender-atp/get-domain-statistics.md @@ -19,7 +19,7 @@ ms.date: 12/08/2017 # Get domain statistics API **Applies to:** -- Windows Defender Advanced Threat Protection (Windows Defender ATP) +- Microsoft Defender Advanced Threat Protection (Microsoft Defender ATP) [!include[Prereleaseinformation](prerelease.md)] @@ -27,7 +27,7 @@ ms.date: 12/08/2017 Retrieves the prevalence for the given domain. ## Permissions -One of the following permissions is required to call this API. To learn more, including how to choose permissions, see [Use Windows Defender ATP APIs](apis-intro.md) +One of the following permissions is required to call this API. To learn more, including how to choose permissions, see [Use Microsoft Defender ATP APIs](apis-intro.md) Permission type | Permission | Permission display name :---|:---|:--- diff --git a/windows/security/threat-protection/microsoft-defender-atp/get-file-information.md b/windows/security/threat-protection/microsoft-defender-atp/get-file-information.md index 792f618d5f..35e9289aa3 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/get-file-information.md +++ b/windows/security/threat-protection/microsoft-defender-atp/get-file-information.md @@ -20,7 +20,7 @@ ms.date: 12/08/2017 # Get file information API **Applies to:** -- Windows Defender Advanced Threat Protection (Windows Defender ATP) +- Microsoft Defender Advanced Threat Protection (Microsoft Defender ATP) [!include[Prereleaseinformation](prerelease.md)] @@ -28,7 +28,7 @@ ms.date: 12/08/2017 Retrieves a file by identifier Sha1, Sha256, or MD5. ## Permissions -One of the following permissions is required to call this API. To learn more, including how to choose permissions, see [Use Windows Defender ATP APIs](apis-intro.md) +One of the following permissions is required to call this API. To learn more, including how to choose permissions, see [Use Microsoft Defender ATP APIs](apis-intro.md) Permission type | Permission | Permission display name :---|:---|:--- diff --git a/windows/security/threat-protection/microsoft-defender-atp/get-file-related-alerts.md b/windows/security/threat-protection/microsoft-defender-atp/get-file-related-alerts.md index 46f6a80f2a..5df7bcbdb8 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/get-file-related-alerts.md +++ b/windows/security/threat-protection/microsoft-defender-atp/get-file-related-alerts.md @@ -20,7 +20,7 @@ ms.date: 12/08/2017 # Get file related alerts API **Applies to:** -- Windows Defender Advanced Threat Protection (Windows Defender ATP) +- Microsoft Defender Advanced Threat Protection (Microsoft Defender ATP) [!include[Prereleaseinformation](prerelease.md)] @@ -29,7 +29,7 @@ ms.date: 12/08/2017 Retrieves a collection of alerts related to a given file hash. ## Permissions -One of the following permissions is required to call this API. To learn more, including how to choose permissions, see [Use Windows Defender ATP APIs](apis-intro.md) +One of the following permissions is required to call this API. To learn more, including how to choose permissions, see [Use Microsoft Defender ATP APIs](apis-intro.md) Permission type | Permission | Permission display name :---|:---|:--- diff --git a/windows/security/threat-protection/microsoft-defender-atp/get-file-related-machines.md b/windows/security/threat-protection/microsoft-defender-atp/get-file-related-machines.md index cf9e003f26..389c9e1c36 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/get-file-related-machines.md +++ b/windows/security/threat-protection/microsoft-defender-atp/get-file-related-machines.md @@ -21,14 +21,14 @@ ms.date: 12/08/2017 **Applies to:** -- Windows Defender Advanced Threat Protection (Windows Defender ATP) +- Microsoft Defender Advanced Threat Protection (Microsoft Defender ATP) [!include[Prereleaseinformation](prerelease.md)] - Retrieves a collection of machines related to a given file hash. ## Permissions -One of the following permissions is required to call this API. To learn more, including how to choose permissions, see [Use Windows Defender ATP APIs](apis-intro.md) +One of the following permissions is required to call this API. To learn more, including how to choose permissions, see [Use Microsoft Defender ATP APIs](apis-intro.md) Permission type | Permission | Permission display name :---|:---|:--- diff --git a/windows/security/threat-protection/microsoft-defender-atp/get-file-statistics.md b/windows/security/threat-protection/microsoft-defender-atp/get-file-statistics.md index 17f1f3525d..674203724b 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/get-file-statistics.md +++ b/windows/security/threat-protection/microsoft-defender-atp/get-file-statistics.md @@ -20,7 +20,7 @@ ms.date: 12/08/2017 # Get file statistics API **Applies to:** -- Windows Defender Advanced Threat Protection (Windows Defender ATP) +- Microsoft Defender Advanced Threat Protection (Microsoft Defender ATP) [!include[Prereleaseinformation](prerelease.md)] @@ -31,7 +31,7 @@ ms.date: 12/08/2017 Retrieves the prevalence for the given file. ## Permissions -One of the following permissions is required to call this API. To learn more, including how to choose permissions, see [Use Windows Defender ATP APIs](apis-intro.md) +One of the following permissions is required to call this API. To learn more, including how to choose permissions, see [Use Microsoft Defender ATP APIs](apis-intro.md) Permission type | Permission | Permission display name :---|:---|:--- diff --git a/windows/security/threat-protection/microsoft-defender-atp/get-ip-related-alerts.md b/windows/security/threat-protection/microsoft-defender-atp/get-ip-related-alerts.md index 08817b8e70..41683118e7 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/get-ip-related-alerts.md +++ b/windows/security/threat-protection/microsoft-defender-atp/get-ip-related-alerts.md @@ -20,14 +20,14 @@ ms.date: 12/08/2017 # Get IP related alerts API **Applies to:** -- Windows Defender Advanced Threat Protection (Windows Defender ATP) +- Microsoft Defender Advanced Threat Protection (Microsoft Defender ATP) [!include[Prereleaseinformation](prerelease.md)] Retrieves a collection of alerts related to a given IP address. ## Permissions -One of the following permissions is required to call this API. To learn more, including how to choose permissions, see [Use Windows Defender ATP APIs](apis-intro.md) +One of the following permissions is required to call this API. To learn more, including how to choose permissions, see [Use Microsoft Defender ATP APIs](apis-intro.md) Permission type | Permission | Permission display name :---|:---|:--- diff --git a/windows/security/threat-protection/microsoft-defender-atp/get-ip-related-machines.md b/windows/security/threat-protection/microsoft-defender-atp/get-ip-related-machines.md index e17c0a1457..a1ab48a5a3 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/get-ip-related-machines.md +++ b/windows/security/threat-protection/microsoft-defender-atp/get-ip-related-machines.md @@ -19,7 +19,7 @@ ms.date: 12/08/2017 # Get IP related machines API **Applies to:** -- Windows Defender Advanced Threat Protection (Windows Defender ATP) +- Microsoft Defender Advanced Threat Protection (Microsoft Defender ATP) [!include[Prereleaseinformation](prerelease.md)] @@ -27,7 +27,7 @@ ms.date: 12/08/2017 Retrieves a collection of machines that communicated with or from a particular IP. ## Permissions -One of the following permissions is required to call this API. To learn more, including how to choose permissions, see [Use Windows Defender ATP APIs](apis-intro.md) +One of the following permissions is required to call this API. To learn more, including how to choose permissions, see [Use Microsoft Defender ATP APIs](apis-intro.md) Permission type | Permission | Permission display name :---|:---|:--- diff --git a/windows/security/threat-protection/microsoft-defender-atp/get-ip-statistics.md b/windows/security/threat-protection/microsoft-defender-atp/get-ip-statistics.md index 3c2c965ffb..1a1062304c 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/get-ip-statistics.md +++ b/windows/security/threat-protection/microsoft-defender-atp/get-ip-statistics.md @@ -20,7 +20,7 @@ ms.date: 12/08/2017 # Get IP statistics API **Applies to:** -- Windows Defender Advanced Threat Protection (Windows Defender ATP) +- Microsoft Defender Advanced Threat Protection (Microsoft Defender ATP) [!include[Prereleaseinformation](prerelease.md)] @@ -29,7 +29,7 @@ ms.date: 12/08/2017 Retrieves the prevalence for the given IP. ## Permissions -One of the following permissions is required to call this API. To learn more, including how to choose permissions, see [Use Windows Defender ATP APIs](apis-intro.md) +One of the following permissions is required to call this API. To learn more, including how to choose permissions, see [Use Microsoft Defender ATP APIs](apis-intro.md) Permission type | Permission | Permission display name :---|:---|:--- diff --git a/windows/security/threat-protection/microsoft-defender-atp/get-kbinfo-collection.md b/windows/security/threat-protection/microsoft-defender-atp/get-kbinfo-collection.md index cfc710240a..7617020547 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/get-kbinfo-collection.md +++ b/windows/security/threat-protection/microsoft-defender-atp/get-kbinfo-collection.md @@ -22,7 +22,7 @@ ms.date: 10/07/2018 **Applies to:** -- [Windows Defender Advanced Threat Protection (Windows Defender ATP)](https://go.microsoft.com/fwlink/p/?linkid=2069559) +- [Microsoft Defender Advanced Threat Protection (Microsoft Defender ATP)](https://go.microsoft.com/fwlink/p/?linkid=2069559) Retrieves a collection of KB's and KB details. diff --git a/windows/security/threat-protection/microsoft-defender-atp/get-machine-by-id.md b/windows/security/threat-protection/microsoft-defender-atp/get-machine-by-id.md index 5a6a77b908..57cb51ba8b 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/get-machine-by-id.md +++ b/windows/security/threat-protection/microsoft-defender-atp/get-machine-by-id.md @@ -21,14 +21,14 @@ ms.date: 12/08/2017 **Applies to:** -- Windows Defender Advanced Threat Protection (Windows Defender ATP) +- Microsoft Defender Advanced Threat Protection (Microsoft Defender ATP) [!include[Prereleaseinformation](prerelease.md)] - Retrieves a machine entity by ID. ## Permissions -One of the following permissions is required to call this API. To learn more, including how to choose permissions, see [Use Windows Defender ATP APIs](apis-intro.md) +One of the following permissions is required to call this API. To learn more, including how to choose permissions, see [Use Microsoft Defender ATP APIs](apis-intro.md) Permission type | Permission | Permission display name :---|:---|:--- diff --git a/windows/security/threat-protection/microsoft-defender-atp/get-machine-log-on-users.md b/windows/security/threat-protection/microsoft-defender-atp/get-machine-log-on-users.md index eb0edbe3e4..0315fbb35c 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/get-machine-log-on-users.md +++ b/windows/security/threat-protection/microsoft-defender-atp/get-machine-log-on-users.md @@ -23,11 +23,11 @@ ms.date: 12/08/2017 **Applies to:** -- Windows Defender Advanced Threat Protection (Windows Defender ATP) +- Microsoft Defender Advanced Threat Protection (Microsoft Defender ATP) Retrieves a collection of logged on users. ## Permissions -One of the following permissions is required to call this API. To learn more, including how to choose permissions, see [Use Windows Defender ATP APIs](apis-intro.md) +One of the following permissions is required to call this API. To learn more, including how to choose permissions, see [Use Microsoft Defender ATP APIs](apis-intro.md) Permission type | Permission | Permission display name :---|:---|:--- diff --git a/windows/security/threat-protection/microsoft-defender-atp/get-machine-related-alerts.md b/windows/security/threat-protection/microsoft-defender-atp/get-machine-related-alerts.md index df392f1ef1..19f9e99ebc 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/get-machine-related-alerts.md +++ b/windows/security/threat-protection/microsoft-defender-atp/get-machine-related-alerts.md @@ -23,11 +23,11 @@ ms.date: 12/08/2017 **Applies to:** -- Windows Defender Advanced Threat Protection (Windows Defender ATP) +- Microsoft Defender Advanced Threat Protection (Microsoft Defender ATP) Retrieves a collection of alerts related to a given machine ID. ## Permissions -One of the following permissions is required to call this API. To learn more, including how to choose permissions, see [Use Windows Defender ATP APIs](apis-intro.md) +One of the following permissions is required to call this API. To learn more, including how to choose permissions, see [Use Microsoft Defender ATP APIs](apis-intro.md) Permission type | Permission | Permission display name :---|:---|:--- diff --git a/windows/security/threat-protection/microsoft-defender-atp/get-machineaction-object.md b/windows/security/threat-protection/microsoft-defender-atp/get-machineaction-object.md index 19a78ab6d8..ac88ef7f97 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/get-machineaction-object.md +++ b/windows/security/threat-protection/microsoft-defender-atp/get-machineaction-object.md @@ -21,14 +21,14 @@ ms.date: 12/08/2017 **Applies to:** -- Windows Defender Advanced Threat Protection (Windows Defender ATP) +- Microsoft Defender Advanced Threat Protection (Microsoft Defender ATP) [!include[Prereleaseinformation](prerelease.md)] - Get action performed on a machine. ## Permissions -One of the following permissions is required to call this API. To learn more, including how to choose permissions, see [Use Windows Defender ATP APIs](apis-intro.md) +One of the following permissions is required to call this API. To learn more, including how to choose permissions, see [Use Microsoft Defender ATP APIs](apis-intro.md) Permission type | Permission | Permission display name :---|:---|:--- diff --git a/windows/security/threat-protection/microsoft-defender-atp/get-machineactions-collection.md b/windows/security/threat-protection/microsoft-defender-atp/get-machineactions-collection.md index 4be4316a45..c91a221921 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/get-machineactions-collection.md +++ b/windows/security/threat-protection/microsoft-defender-atp/get-machineactions-collection.md @@ -21,17 +21,17 @@ ms.date: 12/08/2017 **Applies to:** -- Windows Defender Advanced Threat Protection (Windows Defender ATP) +- Microsoft Defender Advanced Threat Protection (Microsoft Defender ATP) [!include[Prereleaseinformation](prerelease.md)] - Gets collection of actions done on machines. - Get MachineAction collection API supports [OData V4 queries](https://www.odata.org/documentation/). - The OData's Filter query is supported on: "Id", "Status", "MachineId", "Type", "Requestor" and "CreationDateTimeUtc". -- See examples at [OData queries with Windows Defender ATP](exposed-apis-odata-samples.md) +- See examples at [OData queries with Microsoft Defender ATP](exposed-apis-odata-samples.md) ## Permissions -One of the following permissions is required to call this API. To learn more, including how to choose permissions, see [Use Windows Defender ATP APIs](apis-intro.md) +One of the following permissions is required to call this API. To learn more, including how to choose permissions, see [Use Microsoft Defender ATP APIs](apis-intro.md) Permission type | Permission | Permission display name :---|:---|:--- @@ -175,4 +175,4 @@ Content-type: application/json ``` ## Related topics -- [OData queries with Windows Defender ATP](exposed-apis-odata-samples.md) +- [OData queries with Microsoft Defender ATP](exposed-apis-odata-samples.md) diff --git a/windows/security/threat-protection/microsoft-defender-atp/get-machinegroups-collection.md b/windows/security/threat-protection/microsoft-defender-atp/get-machinegroups-collection.md index 85bfd9945a..9205fdc61c 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/get-machinegroups-collection.md +++ b/windows/security/threat-protection/microsoft-defender-atp/get-machinegroups-collection.md @@ -22,7 +22,7 @@ ms.date: 10/07/2018 **Applies to:** -- [Windows Defender Advanced Threat Protection (Windows Defender ATP)](https://go.microsoft.com/fwlink/p/?linkid=2069559) +- [Microsoft Defender Advanced Threat Protection (Microsoft Defender ATP)](https://go.microsoft.com/fwlink/p/?linkid=2069559) Retrieves a collection of RBAC machine groups. diff --git a/windows/security/threat-protection/microsoft-defender-atp/get-machines.md b/windows/security/threat-protection/microsoft-defender-atp/get-machines.md index 7e2ad2eaf1..d7104b407e 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/get-machines.md +++ b/windows/security/threat-protection/microsoft-defender-atp/get-machines.md @@ -19,14 +19,14 @@ ms.topic: article # List machines API **Applies to:** -- [Windows Defender Advanced Threat Protection (Windows Defender ATP)](https://go.microsoft.com/fwlink/p/?linkid=2069559) +- [Microsoft Defender Advanced Threat Protection (Microsoft Defender ATP)](https://go.microsoft.com/fwlink/p/?linkid=2069559) [!include[Prereleaseinformation](prerelease.md)] -- Retrieves a collection of machines that have communicated with Windows Defender ATP cloud on the last 30 days. +- Retrieves a collection of machines that have communicated with Microsoft Defender ATP cloud on the last 30 days. - Get Machines collection API supports [OData V4 queries](https://www.odata.org/documentation/). - The OData's Filter query is supported on: "Id", "ComputerDnsName", "LastSeen", "LastIpAddress", "HealthStatus", "OsPlatform", "RiskScore", "MachineTags" and "RbacGroupId". -- See examples at [OData queries with Windows Defender ATP](exposed-apis-odata-samples.md) +- See examples at [OData queries with Microsoft Defender ATP](exposed-apis-odata-samples.md) ## Permissions @@ -127,4 +127,4 @@ Content-type: application/json ``` ## Related topics -- [OData queries with Windows Defender ATP](exposed-apis-odata-samples.md) +- [OData queries with Microsoft Defender ATP](exposed-apis-odata-samples.md) diff --git a/windows/security/threat-protection/microsoft-defender-atp/get-machinesecuritystates-collection.md b/windows/security/threat-protection/microsoft-defender-atp/get-machinesecuritystates-collection.md index 55803636b8..70fec0601d 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/get-machinesecuritystates-collection.md +++ b/windows/security/threat-protection/microsoft-defender-atp/get-machinesecuritystates-collection.md @@ -22,7 +22,7 @@ ms.date: 10/07/2018 **Applies to:** -- [Windows Defender Advanced Threat Protection (Windows Defender ATP)](https://go.microsoft.com/fwlink/p/?linkid=2069559) +- [Microsoft Defender Advanced Threat Protection (Microsoft Defender ATP)](https://go.microsoft.com/fwlink/p/?linkid=2069559) Retrieves a collection of machines security states. diff --git a/windows/security/threat-protection/microsoft-defender-atp/get-package-sas-uri.md b/windows/security/threat-protection/microsoft-defender-atp/get-package-sas-uri.md index 32bc25c9bd..aad27c712c 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/get-package-sas-uri.md +++ b/windows/security/threat-protection/microsoft-defender-atp/get-package-sas-uri.md @@ -19,14 +19,14 @@ ms.date: 12/08/2017 # Get package SAS URI API **Applies to:** -- Windows Defender Advanced Threat Protection (Windows Defender ATP) +- Microsoft Defender Advanced Threat Protection (Microsoft Defender ATP) [!include[Prerelease information](prerelease.md)] Get a URI that allows downloading of an [investigation package](collect-investigation-package-windows-defender-advanced-threat-protection-new.md). ## Permissions -One of the following permissions is required to call this API. To learn more, including how to choose permissions, see [Use Windows Defender ATP APIs](apis-intro.md) +One of the following permissions is required to call this API. To learn more, including how to choose permissions, see [Use Microsoft Defender ATP APIs](apis-intro.md) Permission type | Permission | Permission display name :---|:---|:--- diff --git a/windows/security/threat-protection/microsoft-defender-atp/get-started.md b/windows/security/threat-protection/microsoft-defender-atp/get-started.md index 6086863cb6..f5a6fa236f 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/get-started.md +++ b/windows/security/threat-protection/microsoft-defender-atp/get-started.md @@ -1,6 +1,6 @@ --- -title: Get started with Windows Defender Advanced Threat Protection -description: Learn about the minimum requirements and initial steps you need to take to get started with Windows Defender ATP. +title: Get started with Microsoft Defender Advanced Threat Protection +description: Learn about the minimum requirements and initial steps you need to take to get started with Microsoft Defender ATP. keywords: get started, minimum requirements, setup, subscription, features, data storage, privacy, user access search.product: eADQiWindows 10XVcnh search.appverid: met150 @@ -18,39 +18,39 @@ ms.topic: conceptual ms.date: 11/20/2018 --- -# Get started with Windows Defender Advanced Threat Protection +# Get started with Microsoft Defender Advanced Threat Protection **Applies to:** -- [Windows Defender Advanced Threat Protection (Windows Defender ATP)](https://go.microsoft.com/fwlink/p/?linkid=2069559) +- [Microsoft Defender Advanced Threat Protection (Microsoft Defender ATP)](https://go.microsoft.com/fwlink/p/?linkid=2069559) >[!TIP] ->- Learn about the latest enhancements in Windows Defender ATP: [What's new in Windows Defender ATP](https://cloudblogs.microsoft.com/microsoftsecure/2018/11/15/whats-new-in-windows-defender-atp/). ->- Windows Defender ATP demonstrated industry-leading optics and detection capabilities in the recent MITRE evaluation. Read: [Insights from the MITRE ATT&CK-based evaluation](https://cloudblogs.microsoft.com/microsoftsecure/2018/12/03/insights-from-the-mitre-attack-based-evaluation-of-windows-defender-atp/). +>- Learn about the latest enhancements in Microsoft Defender ATP: [What's new in Microsoft Defender ATP](https://cloudblogs.microsoft.com/microsoftsecure/2018/11/15/whats-new-in-windows-defender-atp/). +>- Microsoft Defender ATP demonstrated industry-leading optics and detection capabilities in the recent MITRE evaluation. Read: [Insights from the MITRE ATT&CK-based evaluation](https://cloudblogs.microsoft.com/microsoftsecure/2018/12/03/insights-from-the-mitre-attack-based-evaluation-of-windows-defender-atp/). -Learn about the minimum requirements and initial steps you need to take to get started with Windows Defender ATP. +Learn about the minimum requirements and initial steps you need to take to get started with Microsoft Defender ATP. -The following capabilities are available across multiple products that make up the Windows Defender ATP platform. +The following capabilities are available across multiple products that make up the Microsoft Defender ATP platform. **Attack surface reduction**
      The attack surface reduction set of capabilities provide the first line of defense in the stack. By ensuring configuration settings are properly set and exploit mitigation techniques are applied, these set of capabilities resist attacks and exploitations. **Next generation protection**
      -To further reinforce the security perimeter of your network, Windows Defender ATP uses next generation protection designed to catch all types of emerging threats. +To further reinforce the security perimeter of your network, Microsoft Defender ATP uses next generation protection designed to catch all types of emerging threats. **Endpoint detection and response**
      Endpoint detection and response capabilities are put in place to detect, investigate, and respond to advanced threats that may have made it past the first two security pillars. **Auto investigation and remediation**
      -In conjunction with being able to quickly respond to advanced attacks, Windows Defender ATP offers automatic investigation and remediation capabilities that help reduce the volume of alerts in minutes at scale. +In conjunction with being able to quickly respond to advanced attacks, Microsoft Defender ATP offers automatic investigation and remediation capabilities that help reduce the volume of alerts in minutes at scale. **Secure score**
      -Windows Defender ATP provides a security posture capability to help you dynamically assess the security state of your enterprise network, identify unprotected systems, and take recommended actions to improve the overall security state of your network. +Microsoft Defender ATP provides a security posture capability to help you dynamically assess the security state of your enterprise network, identify unprotected systems, and take recommended actions to improve the overall security state of your network. **Advanced hunting**
      Advanced hunting allows you to hunt for possible threats across your organization using a powerful search and query tool. You can also create custom detection rules based on the queries you created and surface alerts in Windows Defender Security Center. **Management and APIs**
      -Integrate Windows Defender Advanced Threat Protection into your existing workflows. +Integrate Microsoft Defender Advanced Threat Protection into your existing workflows. **Microsoft threat protection**
      Bring the power of Microsoft Threat Protection to your organization. @@ -60,8 +60,8 @@ Topic | Description :---|:--- [Minimum requirements](minimum-requirements-windows-defender-advanced-threat-protection.md) | Learn about the requirements for onboarding machines to the platform. [Validate licensing and complete setup](licensing-windows-defender-advanced-threat-protection.md) | Get guidance on how to check that licenses have been provisioned to your organization and how to access the portal for the first time. -[Preview features](preview-windows-defender-advanced-threat-protection.md) | Learn about new features in the Windows Defender ATP preview release and be among the first to try upcoming features by turning on the preview experience. -[Data storage and privacy](data-storage-privacy-windows-defender-advanced-threat-protection.md) | Explains the data storage and privacy details related to Windows Defender ATP. +[Preview features](preview-windows-defender-advanced-threat-protection.md) | Learn about new features in the Microsoft Defender ATP preview release and be among the first to try upcoming features by turning on the preview experience. +[Data storage and privacy](data-storage-privacy-windows-defender-advanced-threat-protection.md) | Explains the data storage and privacy details related to Microsoft Defender ATP. [Assign user access to the portal](assign-portal-access-windows-defender-advanced-threat-protection.md) | Set permissions to manage who can access the portal. You can set basic permissions or set granular permissions using role-based access control (RBAC). -[Evaluate Windows Defender ATP](evaluate-atp.md) | Evaluate the various capabilities in Windows Defender ATP and test features out. -[Access the Windows Defender Security Center Community Center](community-windows-defender-advanced-threat-protection.md) | The Windows Defender ATP Community Center is a place where community members can learn, collaborate, and share experiences about the product. \ No newline at end of file +[Evaluate Microsoft Defender ATP](evaluate-atp.md) | Evaluate the various capabilities in Microsoft Defender ATP and test features out. +[Access the Windows Defender Security Center Community Center](community-windows-defender-advanced-threat-protection.md) | The Microsoft Defender ATP Community Center is a place where community members can learn, collaborate, and share experiences about the product. \ No newline at end of file diff --git a/windows/security/threat-protection/microsoft-defender-atp/get-ti-indicators-collection.md b/windows/security/threat-protection/microsoft-defender-atp/get-ti-indicators-collection.md index 837155f677..6fe62b0834 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/get-ti-indicators-collection.md +++ b/windows/security/threat-protection/microsoft-defender-atp/get-ti-indicators-collection.md @@ -20,7 +20,7 @@ ms.date: 12/08/2017 # List Indicators API **Applies to:** -- [Windows Defender Advanced Threat Protection (Windows Defender ATP)](https://go.microsoft.com/fwlink/p/?linkid=2069559) +- [Microsoft Defender Advanced Threat Protection (Microsoft Defender ATP)](https://go.microsoft.com/fwlink/p/?linkid=2069559) [!include[Prereleaseinformation](prerelease.md)] diff --git a/windows/security/threat-protection/microsoft-defender-atp/get-user-information.md b/windows/security/threat-protection/microsoft-defender-atp/get-user-information.md index 75c9bc7f08..ee1b42726f 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/get-user-information.md +++ b/windows/security/threat-protection/microsoft-defender-atp/get-user-information.md @@ -18,14 +18,14 @@ ms.topic: article # Get user information API **Applies to:** -- [Windows Defender Advanced Threat Protection (Windows Defender ATP)](https://go.microsoft.com/fwlink/p/?linkid=2069559) +- [Microsoft Defender Advanced Threat Protection (Microsoft Defender ATP)](https://go.microsoft.com/fwlink/p/?linkid=2069559) [!include[Prerelease information](prerelease.md)] Retrieve a User entity by key (user name). ## Permissions -One of the following permissions is required to call this API. To learn more, including how to choose permissions, see [Use Windows Defender ATP APIs](apis-intro.md) +One of the following permissions is required to call this API. To learn more, including how to choose permissions, see [Use Microsoft Defender ATP APIs](apis-intro.md) Permission type | Permission | Permission display name :---|:---|:--- diff --git a/windows/security/threat-protection/microsoft-defender-atp/get-user-related-alerts.md b/windows/security/threat-protection/microsoft-defender-atp/get-user-related-alerts.md index 6044ca7009..ad8a4ad671 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/get-user-related-alerts.md +++ b/windows/security/threat-protection/microsoft-defender-atp/get-user-related-alerts.md @@ -19,14 +19,14 @@ ms.date: 12/08/2017 # Get user related alerts API **Applies to:** -- Windows Defender Advanced Threat Protection (Windows Defender ATP) +- Microsoft Defender Advanced Threat Protection (Microsoft Defender ATP) [!include[Prereleaseinformation](prerelease.md)] Retrieves a collection of alerts related to a given user ID. ## Permissions -One of the following permissions is required to call this API. To learn more, including how to choose permissions, see [Use Windows Defender ATP APIs](apis-intro.md) +One of the following permissions is required to call this API. To learn more, including how to choose permissions, see [Use Microsoft Defender ATP APIs](apis-intro.md) Permission type | Permission | Permission display name :---|:---|:--- diff --git a/windows/security/threat-protection/microsoft-defender-atp/get-user-related-machines.md b/windows/security/threat-protection/microsoft-defender-atp/get-user-related-machines.md index a3597ff7ac..ee24ebc6e3 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/get-user-related-machines.md +++ b/windows/security/threat-protection/microsoft-defender-atp/get-user-related-machines.md @@ -20,14 +20,14 @@ ms.date: 12/08/2017 # Get user related machines API **Applies to:** -- Windows Defender Advanced Threat Protection (Windows Defender ATP) +- Microsoft Defender Advanced Threat Protection (Microsoft Defender ATP) [!include[Prereleaseinformation](prerelease.md)] Retrieves a collection of machines related to a given user ID. ## Permissions -One of the following permissions is required to call this API. To learn more, including how to choose permissions, see [Use Windows Defender ATP APIs](apis-intro.md) +One of the following permissions is required to call this API. To learn more, including how to choose permissions, see [Use Microsoft Defender ATP APIs](apis-intro.md) Permission type | Permission | Permission display name :---|:---|:--- diff --git a/windows/security/threat-protection/microsoft-defender-atp/incidents-queue.md b/windows/security/threat-protection/microsoft-defender-atp/incidents-queue.md index 1a769c409b..3ac978d6bd 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/incidents-queue.md +++ b/windows/security/threat-protection/microsoft-defender-atp/incidents-queue.md @@ -1,5 +1,5 @@ --- -title: Incidents queue in Windows Defender ATP +title: Incidents queue in Microsoft Defender ATP description: keywords: incidents, aggregate, investigations, queue, ttp search.product: eADQiWindows 10XVcnh @@ -17,14 +17,14 @@ ms.collection: M365-security-compliance ms.topic: conceptual --- -# Incidents in Windows Defender ATP +# Incidents in Microsoft Defender ATP **Applies to:** -- [Windows Defender Advanced Threat Protection (Windows Defender ATP)](https://go.microsoft.com/fwlink/p/?linkid=2069559) +- [Microsoft Defender Advanced Threat Protection (Microsoft Defender ATP)](https://go.microsoft.com/fwlink/p/?linkid=2069559) -When a cybersecurity threat is emerging, or a potential attacker is deploying its tactics, techniques/tools, and procedures (TTPs) on the network, Windows Defender ATP will quickly trigger alerts and launch matching automatic investigations. +When a cybersecurity threat is emerging, or a potential attacker is deploying its tactics, techniques/tools, and procedures (TTPs) on the network, Microsoft Defender ATP will quickly trigger alerts and launch matching automatic investigations. -Windows Defender ATP applies correlation analytics and aggregates all related alerts and investigations into an incident. Doing so helps narrate a broader story of an attack, thus providing you with the right visuals (upgraded incident graph) and data representations to understand and deal with complex cross-entity threats to your organization's network. +Microsoft Defender ATP applies correlation analytics and aggregates all related alerts and investigations into an incident. Doing so helps narrate a broader story of an attack, thus providing you with the right visuals (upgraded incident graph) and data representations to understand and deal with complex cross-entity threats to your organization's network. ## In this section diff --git a/windows/security/threat-protection/microsoft-defender-atp/information-protection-in-windows-config.md b/windows/security/threat-protection/microsoft-defender-atp/information-protection-in-windows-config.md index 9eedb8b8f5..e147c2ee32 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/information-protection-in-windows-config.md +++ b/windows/security/threat-protection/microsoft-defender-atp/information-protection-in-windows-config.md @@ -19,18 +19,18 @@ ms.date: 12/05/2018 # Configure information protection in Windows **Applies to:** -- [Windows Defender Advanced Threat Protection (Windows Defender ATP)](https://go.microsoft.com/fwlink/p/?linkid=2069559) +- [Microsoft Defender Advanced Threat Protection (Microsoft Defender ATP)](https://go.microsoft.com/fwlink/p/?linkid=2069559) [!include[Prerelease information](prerelease.md)] -Learn how you can use Windows Defender ATP to expand the coverage of Windows Information Protection (WIP) to protect files based on their label, regardless of their origin. +Learn how you can use Microsoft Defender ATP to expand the coverage of Windows Information Protection (WIP) to protect files based on their label, regardless of their origin. >[!TIP] -> Read our blog post about how [Windows Defender ATP integrates with Microsoft Information Protection to discover, protect, and monitor sensitive data on Windows devices](https://cloudblogs.microsoft.com/microsoftsecure/2019/01/17/windows-defender-atp-integrates-with-microsoft-information-protection-to-discover-protect-and-monitor-sensitive-data-on-windows-devices/). +> Read our blog post about how [Microsoft Defender ATP integrates with Microsoft Information Protection to discover, protect, and monitor sensitive data on Windows devices](https://cloudblogs.microsoft.com/microsoftsecure/2019/01/17/windows-defender-atp-integrates-with-microsoft-information-protection-to-discover-protect-and-monitor-sensitive-data-on-windows-devices/). ## Prerequisites - Endpoints need to be on Windows 10, version 1809 or later -- You'll need the appropriate license to leverage the Windows Defender ATP and Azure Information Protection integration +- You'll need the appropriate license to leverage the Microsoft Defender ATP and Azure Information Protection integration - Your tenant needs to be onboarded to Azure Information Protection analytics, for more information see, [Configure a Log Analytics workspace for the reports](https://docs.microsoft.comazure/information-protection/reports-aip#configure-a-log-analytics-workspace-for-the-reports) @@ -46,10 +46,10 @@ Learn how you can use Windows Defender ATP to expand the coverage of Windows Inf 4. Repeat for every label that you want to get WIP applied to in Windows. -After completing these steps Windows Defender ATP will automatically identify labeled documents stored on the device and enable WIP on them. +After completing these steps Microsoft Defender ATP will automatically identify labeled documents stored on the device and enable WIP on them. >[!NOTE] ->- The Windows Defender ATP configuration is pulled every 15 minutes. Allow up to 30 minutes for the new policy to take effect and ensure that the endpoint is online. Otherwise, it will not receive the policy. +>- The Microsoft Defender ATP configuration is pulled every 15 minutes. Allow up to 30 minutes for the new policy to take effect and ensure that the endpoint is online. Otherwise, it will not receive the policy. >- Data forwarded to Azure Information Protection is stored in the same location as your other Azure Information Protection data. ## Related topic diff --git a/windows/security/threat-protection/microsoft-defender-atp/information-protection-in-windows-overview.md b/windows/security/threat-protection/microsoft-defender-atp/information-protection-in-windows-overview.md index 976dfff7e4..f594da75a4 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/information-protection-in-windows-overview.md +++ b/windows/security/threat-protection/microsoft-defender-atp/information-protection-in-windows-overview.md @@ -19,56 +19,56 @@ ms.date: 12/05/2018 # Information protection in Windows overview **Applies to:** -- [Windows Defender Advanced Threat Protection (Windows Defender ATP)](https://go.microsoft.com/fwlink/p/?linkid=2069559) +- [Microsoft Defender Advanced Threat Protection (Microsoft Defender ATP)](https://go.microsoft.com/fwlink/p/?linkid=2069559) [!include[Prerelease information](prerelease.md)] Information protection is an integral part of Microsoft 365 Enterprise suite, providing intelligent protection to keep sensitive data secure while enabling productivity in the workplace. -Windows Defender ATP is seamlessly integrated in Microsoft Threat Protection to provide a complete and comprehensive data loss prevention (DLP) solution for Windows devices. This solution is delivered and managed as part of the unified Microsoft 365 information protection suite. +Microsoft Defender ATP is seamlessly integrated in Microsoft Threat Protection to provide a complete and comprehensive data loss prevention (DLP) solution for Windows devices. This solution is delivered and managed as part of the unified Microsoft 365 information protection suite. >[!TIP] -> Read our blog post about how [Windows Defender ATP integrates with Microsoft Information Protection to discover, protect, and monitor sensitive data on Windows devices](https://cloudblogs.microsoft.com/microsoftsecure/2019/01/17/windows-defender-atp-integrates-with-microsoft-information-protection-to-discover-protect-and-monitor-sensitive-data-on-windows-devices/). +> Read our blog post about how [Microsoft Defender ATP integrates with Microsoft Information Protection to discover, protect, and monitor sensitive data on Windows devices](https://cloudblogs.microsoft.com/microsoftsecure/2019/01/17/windows-defender-atp-integrates-with-microsoft-information-protection-to-discover-protect-and-monitor-sensitive-data-on-windows-devices/). -Windows Defender ATP applies two methods to discover and protect data: +Microsoft Defender ATP applies two methods to discover and protect data: - **Data discovery** - Identify sensitive data on Windows devices at risk - **Data protection** - Windows Information Protection (WIP) as outcome of Azure Information Protection label ## Data discovery -Windows Defender ATP automatically discovers files with sensitivity labels on Windows devices when the feature is enabled. You can enable the Azure Information Protection integration feature from Windows Defender Security Center. For more information, see [Configure advanced features](advanced-features-windows-defender-advanced-threat-protection.md#azure-information-protection). +Microsoft Defender ATP automatically discovers files with sensitivity labels on Windows devices when the feature is enabled. You can enable the Azure Information Protection integration feature from Windows Defender Security Center. For more information, see [Configure advanced features](advanced-features-windows-defender-advanced-threat-protection.md#azure-information-protection). ![Image of settings page with Azure Information Protection](images/atp-settings-aip.png) -After enabling the Azure Information Protection integration, data discovery signals are immediately forwarded to Azure Information Protection from the device. When a labeled file is created or modified on a Windows device, Windows Defender ATP automatically reports the signal to Azure Information Protection. +After enabling the Azure Information Protection integration, data discovery signals are immediately forwarded to Azure Information Protection from the device. When a labeled file is created or modified on a Windows device, Microsoft Defender ATP automatically reports the signal to Azure Information Protection. The reported signals can be viewed on the Azure Information Protection - Data discovery dashboard. ### Azure Information Protection - Data discovery dashboard -This dashboard presents a summarized discovery information of data discovered by both Windows Defender ATP and Azure Information Protection. Data from Windows Defender ATP is marked with Location Type - Endpoint. +This dashboard presents a summarized discovery information of data discovered by both Microsoft Defender ATP and Azure Information Protection. Data from Microsoft Defender ATP is marked with Location Type - Endpoint. ![Image of Azure Information Protection - Data discovery](images/azure-data-discovery.png) -Notice the Device Risk column on the right, this device risk is derived directly from Windows Defender ATP, indicating the risk level of the security device where the file was discovered, based on the active security threats detected by Windows Defender ATP. +Notice the Device Risk column on the right, this device risk is derived directly from Microsoft Defender ATP, indicating the risk level of the security device where the file was discovered, based on the active security threats detected by Microsoft Defender ATP. -Clicking the device risk level will redirect you to the device page in Windows Defender ATP, where you can get a comprehensive view of the device security status and its active alerts. +Clicking the device risk level will redirect you to the device page in Microsoft Defender ATP, where you can get a comprehensive view of the device security status and its active alerts. >[!NOTE] ->Windows Defender ATP does not currently report the Information Types. +>Microsoft Defender ATP does not currently report the Information Types. ### Log Analytics -Data discovery based on Windows Defender ATP is also available in [Azure Log Analytics](https://docs.microsoft.com/azure/log-analytics/log-analytics-overview), where you can perform complex queries over the raw data. +Data discovery based on Microsoft Defender ATP is also available in [Azure Log Analytics](https://docs.microsoft.com/azure/log-analytics/log-analytics-overview), where you can perform complex queries over the raw data. For more information on Azure Information Protection analytics, see [Central reporting for Azure Information Protection](https://docs.microsoft.com/azure/information-protection/reports-aip). Open Azure Log Analytics in Azure Portal and open a query builder (standard or classic). -To view Windows Defender ATP data, perform a query that contains: +To view Microsoft Defender ATP data, perform a query that contains: ``` @@ -83,15 +83,15 @@ InformationProtectionLogs_CL ## Data protection -For data to be protected, they must first be identified through labels. Sensitivity labels are created in Office Security and Compliance (SCC). Windows Defender ATP then uses the labels to identify endpoints that need Windows Information Protection (WIP) applied on them. +For data to be protected, they must first be identified through labels. Sensitivity labels are created in Office Security and Compliance (SCC). Microsoft Defender ATP then uses the labels to identify endpoints that need Windows Information Protection (WIP) applied on them. -When you create sensitivity labels, you can set the information protection functionalities that will be applied on the file. The setting that applies to Windows Defender ATP is the Data loss prevention. You'll need to turn on the Data loss prevention and select Enable Windows end point protection (DLP for devices). +When you create sensitivity labels, you can set the information protection functionalities that will be applied on the file. The setting that applies to Microsoft Defender ATP is the Data loss prevention. You'll need to turn on the Data loss prevention and select Enable Windows end point protection (DLP for devices). ![Image of Office 365 Security and Compliance sensitivity label](images/office-scc-label.png) -Once, the policy is set and published, Windows Defender ATP automatically enables WIP for labeled files. When a labeled file is created or modified on a Windows device, Windows Defender ATP automatically detects it and enables WIP on that file if its label corresponds with Office Security and Compliance (SCC) policy. +Once, the policy is set and published, Microsoft Defender ATP automatically enables WIP for labeled files. When a labeled file is created or modified on a Windows device, Microsoft Defender ATP automatically detects it and enables WIP on that file if its label corresponds with Office Security and Compliance (SCC) policy. This functionality expands the coverage of WIP to protect files based on their label, regardless of their origin. diff --git a/windows/security/threat-protection/microsoft-defender-atp/initiate-autoir-investigation.md b/windows/security/threat-protection/microsoft-defender-atp/initiate-autoir-investigation.md index 7e91cf5285..13ed50b836 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/initiate-autoir-investigation.md +++ b/windows/security/threat-protection/microsoft-defender-atp/initiate-autoir-investigation.md @@ -18,7 +18,7 @@ ms.topic: article # Initiate machine investigation API (Preview) **Applies to:** -- [Windows Defender Advanced Threat Protection (Windows Defender ATP)](https://go.microsoft.com/fwlink/p/?linkid=2069559) +- [Microsoft Defender Advanced Threat Protection (Microsoft Defender ATP)](https://go.microsoft.com/fwlink/p/?linkid=2069559) > [!IMPORTANT] > Some information relates to prereleased product which may be substantially modified before it's commercially released. Microsoft makes no warranties, express or implied, with respect to the information provided here. @@ -33,7 +33,7 @@ Initiate AutoIR investigation on a machine. 2. For Automated Investigation limitations, see [Automated Investigation](automated-investigations-windows-defender-advanced-threat-protection.md). ## Permissions -One of the following permissions is required to call this API. To learn more, including how to choose permissions, see [Use Windows Defender ATP APIs](apis-intro.md) +One of the following permissions is required to call this API. To learn more, including how to choose permissions, see [Use Microsoft Defender ATP APIs](apis-intro.md) Permission type | Permission | Permission display name :---|:---|:--- diff --git a/windows/security/threat-protection/microsoft-defender-atp/investigate-alerts.md b/windows/security/threat-protection/microsoft-defender-atp/investigate-alerts.md index 1c60dae5b7..fd445e7665 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/investigate-alerts.md +++ b/windows/security/threat-protection/microsoft-defender-atp/investigate-alerts.md @@ -1,5 +1,5 @@ --- -title: Investigate Windows Defender Advanced Threat Protection alerts +title: Investigate Microsoft Defender Advanced Threat Protection alerts description: Use the investigation options to get details on alerts are affecting your network, what they mean, and how to resolve them. keywords: investigate, investigation, machines, machine, alerts queue, dashboard, IP address, file, submit, submissions, deep analysis, timeline, search, domain, URL, IP search.product: eADQiWindows 10XVcnh @@ -18,15 +18,15 @@ ms.topic: article ms.date: 04/24/2018 --- -# Investigate Windows Defender Advanced Threat Protection alerts +# Investigate Microsoft Defender Advanced Threat Protection alerts **Applies to:** -- [Windows Defender Advanced Threat Protection (Windows Defender ATP)](https://go.microsoft.com/fwlink/p/?linkid=2069559) +- [Microsoft Defender Advanced Threat Protection (Microsoft Defender ATP)](https://go.microsoft.com/fwlink/p/?linkid=2069559) ->Want to experience Windows Defender ATP? [Sign up for a free trial.](https://www.microsoft.com/en-us/WindowsForBusiness/windows-atp?ocid=docs-wdatp-investigatealerts-abovefoldlink) +>Want to experience Microsoft Defender ATP? [Sign up for a free trial.](https://www.microsoft.com/en-us/WindowsForBusiness/windows-atp?ocid=docs-wdatp-investigatealerts-abovefoldlink) Investigate alerts that are affecting your network, understand what they mean, and how to resolve them. @@ -93,12 +93,12 @@ The **Artifact timeline** feature provides an addition view of the evidence that Selecting an alert detail brings up the **Details pane** where you'll be able to see more information about the alert such as file details, detections, instances of it observed worldwide, and in the organization. ## Related topics -- [View and organize the Windows Defender Advanced Threat Protection Alerts queue ](alerts-queue-windows-defender-advanced-threat-protection.md) -- [Manage Windows Defender Advanced Threat Protection alerts](manage-alerts-windows-defender-advanced-threat-protection.md) -- [Investigate a file associated with a Windows Defender ATP alert](investigate-files-windows-defender-advanced-threat-protection.md) -- [Investigate machines in the Windows Defender ATP Machines list](investigate-machines-windows-defender-advanced-threat-protection.md) -- [Investigate an IP address associated with a Windows Defender ATP alert](investigate-ip-windows-defender-advanced-threat-protection.md) -- [Investigate a domain associated with a Windows Defender ATP alert](investigate-domain-windows-defender-advanced-threat-protection.md) -- [Investigate a user account in Windows Defender ATP](investigate-user-windows-defender-advanced-threat-protection.md) +- [View and organize the Microsoft Defender Advanced Threat Protection Alerts queue ](alerts-queue-windows-defender-advanced-threat-protection.md) +- [Manage Microsoft Defender Advanced Threat Protection alerts](manage-alerts-windows-defender-advanced-threat-protection.md) +- [Investigate a file associated with a Microsoft Defender ATP alert](investigate-files-windows-defender-advanced-threat-protection.md) +- [Investigate machines in the Microsoft Defender ATP Machines list](investigate-machines-windows-defender-advanced-threat-protection.md) +- [Investigate an IP address associated with a Microsoft Defender ATP alert](investigate-ip-windows-defender-advanced-threat-protection.md) +- [Investigate a domain associated with a Microsoft Defender ATP alert](investigate-domain-windows-defender-advanced-threat-protection.md) +- [Investigate a user account in Microsoft Defender ATP](investigate-user-windows-defender-advanced-threat-protection.md) diff --git a/windows/security/threat-protection/microsoft-defender-atp/investigate-domain.md b/windows/security/threat-protection/microsoft-defender-atp/investigate-domain.md index 010408840d..14ceae480d 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/investigate-domain.md +++ b/windows/security/threat-protection/microsoft-defender-atp/investigate-domain.md @@ -1,5 +1,5 @@ --- -title: Investigate Windows Defender Advanced Threat Protection domains +title: Investigate Microsoft Defender Advanced Threat Protection domains description: Use the investigation options to see if machines and servers have been communicating with malicious domains. keywords: investigate domain, domain, malicious domain, windows defender atp, alert, URL search.product: eADQiWindows 10XVcnh @@ -17,16 +17,16 @@ ms.collection: M365-security-compliance ms.topic: article ms.date: 04/24/2018 --- -# Investigate a domain associated with a Windows Defender ATP alert +# Investigate a domain associated with a Microsoft Defender ATP alert **Applies to:** -- [Windows Defender Advanced Threat Protection (Windows Defender ATP)](https://go.microsoft.com/fwlink/p/?linkid=2069559) +- [Microsoft Defender Advanced Threat Protection (Microsoft Defender ATP)](https://go.microsoft.com/fwlink/p/?linkid=2069559) ->Want to experience Windows Defender ATP? [Sign up for a free trial.](https://www.microsoft.com/en-us/WindowsForBusiness/windows-atp?ocid=docs-wdatp-investigatedomain-abovefoldlink) +>Want to experience Microsoft Defender ATP? [Sign up for a free trial.](https://www.microsoft.com/en-us/WindowsForBusiness/windows-atp?ocid=docs-wdatp-investigatedomain-abovefoldlink) Investigate a domain to see if machines and servers in your enterprise network have been communicating with a known malicious domain. @@ -60,10 +60,10 @@ The **Most recent observed machinew with URL** section provides a chronological 5. Clicking any of the machine names will take you to that machine's view, where you can continue investigate reported alerts, behaviors, and events. ## Related topics -- [View and organize the Windows Defender Advanced Threat Protection Alerts queue ](alerts-queue-windows-defender-advanced-threat-protection.md) -- [Manage Windows Defender Advanced Threat Protection alerts](manage-alerts-windows-defender-advanced-threat-protection.md) -- [Investigate Windows Defender Advanced Threat Protection alerts](investigate-alerts-windows-defender-advanced-threat-protection.md) -- [Investigate a file associated with a Windows Defender ATP alert](investigate-files-windows-defender-advanced-threat-protection.md) -- [Investigate machines in the Windows Defender ATP Machines list](investigate-machines-windows-defender-advanced-threat-protection.md) -- [Investigate an IP address associated with a Windows Defender ATP alert](investigate-ip-windows-defender-advanced-threat-protection.md) -- [Investigate a user account in Windows Defender ATP](investigate-user-windows-defender-advanced-threat-protection.md) +- [View and organize the Microsoft Defender Advanced Threat Protection Alerts queue ](alerts-queue-windows-defender-advanced-threat-protection.md) +- [Manage Microsoft Defender Advanced Threat Protection alerts](manage-alerts-windows-defender-advanced-threat-protection.md) +- [Investigate Microsoft Defender Advanced Threat Protection alerts](investigate-alerts-windows-defender-advanced-threat-protection.md) +- [Investigate a file associated with a Microsoft Defender ATP alert](investigate-files-windows-defender-advanced-threat-protection.md) +- [Investigate machines in the Microsoft Defender ATP Machines list](investigate-machines-windows-defender-advanced-threat-protection.md) +- [Investigate an IP address associated with a Microsoft Defender ATP alert](investigate-ip-windows-defender-advanced-threat-protection.md) +- [Investigate a user account in Microsoft Defender ATP](investigate-user-windows-defender-advanced-threat-protection.md) diff --git a/windows/security/threat-protection/microsoft-defender-atp/investigate-files.md b/windows/security/threat-protection/microsoft-defender-atp/investigate-files.md index cf4b455f24..3f570b3926 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/investigate-files.md +++ b/windows/security/threat-protection/microsoft-defender-atp/investigate-files.md @@ -1,5 +1,5 @@ --- -title: Investigate Windows Defender Advanced Threat Protection files +title: Investigate Microsoft Defender Advanced Threat Protection files description: Use the investigation options to get details on files associated with alerts, behaviours, or events. keywords: investigate, investigation, file, malicious activity, attack motivation, deep analysis, deep analysis report search.product: eADQiWindows 10XVcnh @@ -17,16 +17,16 @@ ms.collection: M365-security-compliance ms.topic: article ms.date: 04/24/2018 --- -# Investigate a file associated with a Windows Defender ATP alert +# Investigate a file associated with a Microsoft Defender ATP alert **Applies to:** -- [Windows Defender Advanced Threat Protection (Windows Defender ATP)](https://go.microsoft.com/fwlink/p/?linkid=2069559) +- [Microsoft Defender Advanced Threat Protection (Microsoft Defender ATP)](https://go.microsoft.com/fwlink/p/?linkid=2069559) ->Want to experience Windows Defender ATP? [Sign up for a free trial.](https://www.microsoft.com/en-us/WindowsForBusiness/windows-atp?ocid=docs-wdatp-investigatefiles-abovefoldlink) +>Want to experience Microsoft Defender ATP? [Sign up for a free trial.](https://www.microsoft.com/en-us/WindowsForBusiness/windows-atp?ocid=docs-wdatp-investigatefiles-abovefoldlink) Investigate the details of a file associated with a specific alert, behavior, or event to help determine if the file exhibits malicious activities, identify the attack motivation, and understand the potential scope of the breach. @@ -65,10 +65,10 @@ The **Most recent observed machines with the file** section allows you to specif This allows for greater accuracy in defining entities to display such as if and when an entity was observed in the organization. For example, if you’re trying to identify the origin of a network communication to a certain IP Address within a 10-minute period on a given date, you can specify that exact time interval, and see only files that communicated with that IP Address at that time, drastically reducing unnecessary scrolling and searching. ## Related topics -- [View and organize the Windows Defender Advanced Threat Protection Alerts queue ](alerts-queue-windows-defender-advanced-threat-protection.md) -- [Manage Windows Defender Advanced Threat Protection alerts](manage-alerts-windows-defender-advanced-threat-protection.md) -- [Investigate Windows Defender Advanced Threat Protection alerts](investigate-alerts-windows-defender-advanced-threat-protection.md) -- [Investigate machines in the Windows Defender ATP Machines list](investigate-machines-windows-defender-advanced-threat-protection.md) -- [Investigate an IP address associated with a Windows Defender ATP alert](investigate-ip-windows-defender-advanced-threat-protection.md) -- [Investigate a domain associated with a Windows Defender ATP alert](investigate-domain-windows-defender-advanced-threat-protection.md) -- [Investigate a user account in Windows Defender ATP](investigate-user-windows-defender-advanced-threat-protection.md) \ No newline at end of file +- [View and organize the Microsoft Defender Advanced Threat Protection Alerts queue ](alerts-queue-windows-defender-advanced-threat-protection.md) +- [Manage Microsoft Defender Advanced Threat Protection alerts](manage-alerts-windows-defender-advanced-threat-protection.md) +- [Investigate Microsoft Defender Advanced Threat Protection alerts](investigate-alerts-windows-defender-advanced-threat-protection.md) +- [Investigate machines in the Microsoft Defender ATP Machines list](investigate-machines-windows-defender-advanced-threat-protection.md) +- [Investigate an IP address associated with a Microsoft Defender ATP alert](investigate-ip-windows-defender-advanced-threat-protection.md) +- [Investigate a domain associated with a Microsoft Defender ATP alert](investigate-domain-windows-defender-advanced-threat-protection.md) +- [Investigate a user account in Microsoft Defender ATP](investigate-user-windows-defender-advanced-threat-protection.md) \ No newline at end of file diff --git a/windows/security/threat-protection/microsoft-defender-atp/investigate-incidents.md b/windows/security/threat-protection/microsoft-defender-atp/investigate-incidents.md index 47c0edb764..cb3221071a 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/investigate-incidents.md +++ b/windows/security/threat-protection/microsoft-defender-atp/investigate-incidents.md @@ -1,5 +1,5 @@ --- -title: Investigate incidents in Windows Defender ATP +title: Investigate incidents in Microsoft Defender ATP description: See associated alerts, manage the incident, and see alert metadata to help you investigate an incident keywords: investigate, incident, alerts, metadata, risk, detection source, affected machines, patterns, correlation search.product: eADQiWindows 10XVcnh @@ -17,10 +17,10 @@ ms.collection: M365-security-compliance ms.topic: article --- -# Investigate incidents in Windows Defender ATP +# Investigate incidents in Microsoft Defender ATP **Applies to:** -- [Windows Defender Advanced Threat Protection (Windows Defender ATP)](https://go.microsoft.com/fwlink/p/?linkid=2069559) +- [Microsoft Defender Advanced Threat Protection (Microsoft Defender ATP)](https://go.microsoft.com/fwlink/p/?linkid=2069559) Investigate incidents that affect your network, understand what they mean, and collate evidence to resolve them. @@ -57,13 +57,13 @@ Select **Investigations** to see all the automatic investigations launched by th ![Image of investigations tab in incident details page](images/atp-incident-investigations-tab.png) ## Going through the evidence -Windows Defender Advanced Threat Protection automatically investigates all the incidents' supported events and suspicious entities in the alerts, providing you with auto-response and information about the important files, processes, services, and more. This helps quickly detect and block potential threats in the incident. +Microsoft Defender Advanced Threat Protection automatically investigates all the incidents' supported events and suspicious entities in the alerts, providing you with auto-response and information about the important files, processes, services, and more. This helps quickly detect and block potential threats in the incident. Each of the analyzed entities will be marked as infected, remediated, or suspicious. ![Image of evidence tab in incident details page](images/atp-incident-evidence-tab.png) ## Visualizing associated cybersecurity threats -Windows Defender Advanced Threat Protection aggregates the threat information into an incident so you can see the patterns and correlations coming in from various data points. You can view such correlation through the incident graph. +Microsoft Defender Advanced Threat Protection aggregates the threat information into an incident so you can see the patterns and correlations coming in from various data points. You can view such correlation through the incident graph. ### Incident graph The **Graph** tells the story of the cybersecurity attack. For example, it shows you what was the entry point, which indicator of compromise or activity was observed on which machine. etc. diff --git a/windows/security/threat-protection/microsoft-defender-atp/investigate-ip.md b/windows/security/threat-protection/microsoft-defender-atp/investigate-ip.md index cf77b8afb9..0d5a09260c 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/investigate-ip.md +++ b/windows/security/threat-protection/microsoft-defender-atp/investigate-ip.md @@ -17,16 +17,16 @@ ms.collection: M365-security-compliance ms.topic: article ms.date: 04/24/2018 --- -# Investigate an IP address associated with a Windows Defender ATP alert +# Investigate an IP address associated with a Microsoft Defender ATP alert **Applies to:** -- [Windows Defender Advanced Threat Protection (Windows Defender ATP)](https://go.microsoft.com/fwlink/p/?linkid=2069559) +- [Microsoft Defender Advanced Threat Protection (Microsoft Defender ATP)](https://go.microsoft.com/fwlink/p/?linkid=2069559) ->Want to experience Windows Defender ATP? [Sign up for a free trial.](https://www.microsoft.com/en-us/WindowsForBusiness/windows-atp?ocid=docs-wdatp-investigateip-abovefoldlink) +>Want to experience Microsoft Defender ATP? [Sign up for a free trial.](https://www.microsoft.com/en-us/WindowsForBusiness/windows-atp?ocid=docs-wdatp-investigateip-abovefoldlink) Examine possible communication between your machines and external internet protocol (IP) addresses. @@ -67,10 +67,10 @@ Use the search filters to define the search criteria. You can also use the timel Clicking any of the machine names will take you to that machine's view, where you can continue investigate reported alerts, behaviors, and events. ## Related topics -- [View and organize the Windows Defender Advanced Threat Protection Alerts queue ](alerts-queue-windows-defender-advanced-threat-protection.md) -- [Manage Windows Defender Advanced Threat Protection alerts](manage-alerts-windows-defender-advanced-threat-protection.md) -- [Investigate Windows Defender Advanced Threat Protection alerts](investigate-alerts-windows-defender-advanced-threat-protection.md) -- [Investigate a file associated with a Windows Defender ATP alert](investigate-files-windows-defender-advanced-threat-protection.md) -- [Investigate machines in the Windows Defender ATP Machines list](investigate-machines-windows-defender-advanced-threat-protection.md) -- [Investigate a domain associated with a Windows Defender ATP alert](investigate-domain-windows-defender-advanced-threat-protection.md) -- [Investigate a user account in Windows Defender ATP](investigate-user-windows-defender-advanced-threat-protection.md) +- [View and organize the Microsoft Defender Advanced Threat Protection Alerts queue ](alerts-queue-windows-defender-advanced-threat-protection.md) +- [Manage Microsoft Defender Advanced Threat Protection alerts](manage-alerts-windows-defender-advanced-threat-protection.md) +- [Investigate Microsoft Defender Advanced Threat Protection alerts](investigate-alerts-windows-defender-advanced-threat-protection.md) +- [Investigate a file associated with a Microsoft Defender ATP alert](investigate-files-windows-defender-advanced-threat-protection.md) +- [Investigate machines in the Microsoft Defender ATP Machines list](investigate-machines-windows-defender-advanced-threat-protection.md) +- [Investigate a domain associated with a Microsoft Defender ATP alert](investigate-domain-windows-defender-advanced-threat-protection.md) +- [Investigate a user account in Microsoft Defender ATP](investigate-user-windows-defender-advanced-threat-protection.md) diff --git a/windows/security/threat-protection/microsoft-defender-atp/investigate-machines.md b/windows/security/threat-protection/microsoft-defender-atp/investigate-machines.md index 2b9d2d90f5..8ca174ec64 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/investigate-machines.md +++ b/windows/security/threat-protection/microsoft-defender-atp/investigate-machines.md @@ -1,5 +1,5 @@ --- -title: Investigate machines in the Windows Defender ATP Machines list +title: Investigate machines in the Microsoft Defender ATP Machines list description: Investigate affected machines by reviewing alerts, network connection information, adding machine tags and groups, and checking the service health. keywords: machines, tags, groups, endpoint, alerts queue, alerts, machine name, domain, last seen, internal IP, active alerts, threat category, filter, sort, review alerts, network, connection, type, password stealer, ransomware, exploit, threat, low severity, service heatlh search.product: eADQiWindows 10XVcnh @@ -18,12 +18,12 @@ ms.topic: article ms.date: 09/18/2018 --- -# Investigate machines in the Windows Defender ATP Machines list +# Investigate machines in the Microsoft Defender ATP Machines list **Applies to:** -- [Windows Defender Advanced Threat Protection (Windows Defender ATP)](https://go.microsoft.com/fwlink/p/?linkid=2069559) +- [Microsoft Defender Advanced Threat Protection (Microsoft Defender ATP)](https://go.microsoft.com/fwlink/p/?linkid=2069559) ->Want to experience Windows Defender ATP? [Sign up for a free trial.](https://www.microsoft.com/en-us/WindowsForBusiness/windows-atp?ocid=docs-wdatp-investigatemachines-abovefoldlink) +>Want to experience Microsoft Defender ATP? [Sign up for a free trial.](https://www.microsoft.com/en-us/WindowsForBusiness/windows-atp?ocid=docs-wdatp-investigatemachines-abovefoldlink) ## Investigate machines Investigate the details of an alert raised on a specific machine to identify other behaviors or events that might be related to the alert or the potential scope of breach. @@ -71,7 +71,7 @@ The Machine risk tile shows the overall risk assessment of a machine. A machine' If you have enabled the Azure ATP feature and there are alerts related to the machine, you can click on the link that will take you to the Azure ATP page where more information about the alerts are provided. >[!NOTE] ->You'll need to enable the integration on both Azure ATP and Windows Defender ATP to use this feature. In Windows Defender ATP, you can enable this feature in advanced features. For more information on how to enable advanced features, see [Turn on advanced features](advanced-features-windows-defender-advanced-threat-protection.md). +>You'll need to enable the integration on both Azure ATP and Microsoft Defender ATP to use this feature. In Microsoft Defender ATP, you can enable this feature in advanced features. For more information on how to enable advanced features, see [Turn on advanced features](advanced-features-windows-defender-advanced-threat-protection.md). **Machine reporting**
      Provides the last internal IP and external IP of the machine. It also shows when the machine was first and last seen reporting to the service. @@ -92,7 +92,7 @@ This feature also enables you to selectively drill down into events that occurre ![Image of machine timeline with events](images/atp-machines-timeline.png) -Windows Defender ATP monitors and captures suspicious or anomalous behavior on Windows 10 machines and displays the process tree flow in the **Machine timeline**. This gives you better context of the behavior which can contribute to understanding the correlation between events, files, and IP addresses in relation to the machine. +Microsoft Defender ATP monitors and captures suspicious or anomalous behavior on Windows 10 machines and displays the process tree flow in the **Machine timeline**. This gives you better context of the behavior which can contribute to understanding the correlation between events, files, and IP addresses in relation to the machine. ### Search for specific events @@ -114,7 +114,7 @@ Use the search bar to look for specific timeline events. Harness the power of us - Behaviors mode: displays "detections" and selected events of interest - Verbose mode: displays all raw events without aggregation or filtering -- **Event type** - Click the drop-down button to filter by events such as Windows - Windows Defender ATP alerts, Windows Defender Application Guard events, registry events, file events, and others. +- **Event type** - Click the drop-down button to filter by events such as Windows - Microsoft Defender ATP alerts, Windows Defender Application Guard events, registry events, file events, and others. Filtering by event type allows you to define precise queries so that you see events with a specific focus. For example, you can search for a file name, then filter the results to only see Process events matching the search criteria or to only view file events, or even better: to view only network events over a period of time to make sure no suspicious outbound communications go unnoticed. @@ -173,10 +173,10 @@ The details pane enriches the ‘in-context’ information across investigation ## Related topics -- [View and organize the Windows Defender Advanced Threat Protection Alerts queue ](alerts-queue-windows-defender-advanced-threat-protection.md) -- [Manage Windows Defender Advanced Threat Protection alerts](manage-alerts-windows-defender-advanced-threat-protection.md) -- [Investigate Windows Defender Advanced Threat Protection alerts](investigate-alerts-windows-defender-advanced-threat-protection.md) -- [Investigate a file associated with a Windows Defender ATP alert](investigate-files-windows-defender-advanced-threat-protection.md) -- [Investigate an IP address associated with a Windows Defender ATP alert](investigate-ip-windows-defender-advanced-threat-protection.md) -- [Investigate a domain associated with a Windows Defender ATP alert](investigate-domain-windows-defender-advanced-threat-protection.md) -- [Investigate a user account in Windows Defender ATP](investigate-user-windows-defender-advanced-threat-protection.md) +- [View and organize the Microsoft Defender Advanced Threat Protection Alerts queue ](alerts-queue-windows-defender-advanced-threat-protection.md) +- [Manage Microsoft Defender Advanced Threat Protection alerts](manage-alerts-windows-defender-advanced-threat-protection.md) +- [Investigate Microsoft Defender Advanced Threat Protection alerts](investigate-alerts-windows-defender-advanced-threat-protection.md) +- [Investigate a file associated with a Microsoft Defender ATP alert](investigate-files-windows-defender-advanced-threat-protection.md) +- [Investigate an IP address associated with a Microsoft Defender ATP alert](investigate-ip-windows-defender-advanced-threat-protection.md) +- [Investigate a domain associated with a Microsoft Defender ATP alert](investigate-domain-windows-defender-advanced-threat-protection.md) +- [Investigate a user account in Microsoft Defender ATP](investigate-user-windows-defender-advanced-threat-protection.md) diff --git a/windows/security/threat-protection/microsoft-defender-atp/investigate-user.md b/windows/security/threat-protection/microsoft-defender-atp/investigate-user.md index 4260159191..886c34c0f8 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/investigate-user.md +++ b/windows/security/threat-protection/microsoft-defender-atp/investigate-user.md @@ -1,5 +1,5 @@ --- -title: Investigate a user account in Windows Defender ATP +title: Investigate a user account in Microsoft Defender ATP description: Investigate a user account for potential compromised credentials or pivot on the associated user account during an investigation. keywords: investigate, account, user, user entity, alert, windows defender atp search.product: eADQiWindows 10XVcnh @@ -17,15 +17,15 @@ ms.collection: M365-security-compliance ms.topic: article ms.date: 04/24/2018 --- -# Investigate a user account in Windows Defender ATP +# Investigate a user account in Microsoft Defender ATP **Applies to:** -- [Windows Defender Advanced Threat Protection (Windows Defender ATP)](https://go.microsoft.com/fwlink/p/?linkid=2069559) +- [Microsoft Defender Advanced Threat Protection (Microsoft Defender ATP)](https://go.microsoft.com/fwlink/p/?linkid=2069559) ->Want to experience Windows Defender ATP? [Sign up for a free trial.](https://www.microsoft.com/en-us/WindowsForBusiness/windows-atp?ocid=docs-wdatp-investigatgeuser-abovefoldlink) +>Want to experience Microsoft Defender ATP? [Sign up for a free trial.](https://www.microsoft.com/en-us/WindowsForBusiness/windows-atp?ocid=docs-wdatp-investigatgeuser-abovefoldlink) ## Investigate user account entities Identify user accounts with the most active alerts (displayed on dashboard as "Users at risk") and investigate cases of potential compromised credentials, or pivot on the associated user account when investigating an alert or machine to identify possible lateral movement between machines with that user account. @@ -53,7 +53,7 @@ The user entity tile provides details about the user such as when the user was f If you have enabled the Azure ATP feature and there are alerts related to the user, you can click on the link that will take you to the Azure ATP page where more information about the alerts are provided. The Azure ATP tile also provides details such as the last AD site, total group memberships, and login failure associated with the user. >[!NOTE] ->You'll need to enable the integration on both Azure ATP and Windows Defender ATP to use this feature. In Windows Defender ATP, you can enable this feature in advanced features. For more information on how to enable advanced features, see [Turn on advanced features](advanced-features-windows-defender-advanced-threat-protection.md). +>You'll need to enable the integration on both Azure ATP and Microsoft Defender ATP to use this feature. In Microsoft Defender ATP, you can enable this feature in advanced features. For more information on how to enable advanced features, see [Turn on advanced features](advanced-features-windows-defender-advanced-threat-protection.md). **Logged on machines**
      You'll also see a list of the machines that the user logged on to, and can expand these to see details of the logon events on each machine. @@ -85,11 +85,11 @@ You can filter the results by the following time periods: - 6 months ## Related topics -- [View and organize the Windows Defender Advanced Threat Protection Alerts queue ](alerts-queue-windows-defender-advanced-threat-protection.md) -- [Manage Windows Defender Advanced Threat Protection alerts](manage-alerts-windows-defender-advanced-threat-protection.md) -- [Investigate Windows Defender Advanced Threat Protection alerts](investigate-alerts-windows-defender-advanced-threat-protection.md) -- [Investigate a file associated with a Windows Defender ATP alert](investigate-files-windows-defender-advanced-threat-protection.md) -- [Investigate machines in the Windows Defender ATP Machines list](investigate-machines-windows-defender-advanced-threat-protection.md) -- [Investigate an IP address associated with a Windows Defender ATP alert](investigate-ip-windows-defender-advanced-threat-protection.md) -- [Investigate a domain associated with a Windows Defender ATP alert](investigate-domain-windows-defender-advanced-threat-protection.md) +- [View and organize the Microsoft Defender Advanced Threat Protection Alerts queue ](alerts-queue-windows-defender-advanced-threat-protection.md) +- [Manage Microsoft Defender Advanced Threat Protection alerts](manage-alerts-windows-defender-advanced-threat-protection.md) +- [Investigate Microsoft Defender Advanced Threat Protection alerts](investigate-alerts-windows-defender-advanced-threat-protection.md) +- [Investigate a file associated with a Microsoft Defender ATP alert](investigate-files-windows-defender-advanced-threat-protection.md) +- [Investigate machines in the Microsoft Defender ATP Machines list](investigate-machines-windows-defender-advanced-threat-protection.md) +- [Investigate an IP address associated with a Microsoft Defender ATP alert](investigate-ip-windows-defender-advanced-threat-protection.md) +- [Investigate a domain associated with a Microsoft Defender ATP alert](investigate-domain-windows-defender-advanced-threat-protection.md) diff --git a/windows/security/threat-protection/microsoft-defender-atp/is-domain-seen-in-org.md b/windows/security/threat-protection/microsoft-defender-atp/is-domain-seen-in-org.md index 026174d5f5..6ff1bae6e0 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/is-domain-seen-in-org.md +++ b/windows/security/threat-protection/microsoft-defender-atp/is-domain-seen-in-org.md @@ -19,7 +19,7 @@ ms.date: 04/24/2018 # Was domain seen in org **Applies to:** -- Windows Defender Advanced Threat Protection (Windows Defender ATP) +- Microsoft Defender Advanced Threat Protection (Microsoft Defender ATP) [!include[Prereleaseinformation](prerelease.md)] @@ -27,7 +27,7 @@ ms.date: 04/24/2018 Answers whether a domain was seen in the organization. ## Permissions -One of the following permissions is required to call this API. To learn more, including how to choose permissions, see [Use Windows Defender ATP APIs](apis-intro.md) +One of the following permissions is required to call this API. To learn more, including how to choose permissions, see [Use Microsoft Defender ATP APIs](apis-intro.md) Permission type | Permission | Permission display name :---|:---|:--- diff --git a/windows/security/threat-protection/microsoft-defender-atp/is-ip-seen-org.md b/windows/security/threat-protection/microsoft-defender-atp/is-ip-seen-org.md index 8cfb010fc6..08e8c07149 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/is-ip-seen-org.md +++ b/windows/security/threat-protection/microsoft-defender-atp/is-ip-seen-org.md @@ -20,7 +20,7 @@ ms.date: 12/08/2017 # Was IP seen in org **Applies to:** -- Windows Defender Advanced Threat Protection (Windows Defender ATP) +- Microsoft Defender Advanced Threat Protection (Microsoft Defender ATP) [!include[Prereleaseinformation](prerelease.md)] @@ -28,7 +28,7 @@ ms.date: 12/08/2017 Answers whether an IP was seen in the organization. ## Permissions -One of the following permissions is required to call this API. To learn more, including how to choose permissions, see [Use Windows Defender ATP APIs](apis-intro.md) +One of the following permissions is required to call this API. To learn more, including how to choose permissions, see [Use Microsoft Defender ATP APIs](apis-intro.md) Permission type | Permission | Permission display name :---|:---|:--- diff --git a/windows/security/threat-protection/microsoft-defender-atp/isolate-machine.md b/windows/security/threat-protection/microsoft-defender-atp/isolate-machine.md index a09ded139b..1379df6c30 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/isolate-machine.md +++ b/windows/security/threat-protection/microsoft-defender-atp/isolate-machine.md @@ -19,7 +19,7 @@ ms.date: 12/08/2017 # Isolate machine API **Applies to:** -- Windows Defender Advanced Threat Protection (Windows Defender ATP) +- Microsoft Defender Advanced Threat Protection (Microsoft Defender ATP) [!include[Prerelease information](prerelease.md)] @@ -28,7 +28,7 @@ Isolates a machine from accessing external network. [!include[Machine actions note](machineactionsnote.md)] ## Permissions -One of the following permissions is required to call this API. To learn more, including how to choose permissions, see [Use Windows Defender ATP APIs](apis-intro.md) +One of the following permissions is required to call this API. To learn more, including how to choose permissions, see [Use Microsoft Defender ATP APIs](apis-intro.md) Permission type | Permission | Permission display name :---|:---|:--- diff --git a/windows/security/threat-protection/microsoft-defender-atp/licensing.md b/windows/security/threat-protection/microsoft-defender-atp/licensing.md index 9dcb0b6f60..efbcf00dab 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/licensing.md +++ b/windows/security/threat-protection/microsoft-defender-atp/licensing.md @@ -1,6 +1,6 @@ --- -title: Validate licensing provisioning and complete Windows Defender ATP set up -description: Validating licensing provisioning, setting up initial preferences, and completing the user set up for Windows Defender Advanced Threat Protection portal. +title: Validate licensing provisioning and complete Microsoft Defender ATP set up +description: Validating licensing provisioning, setting up initial preferences, and completing the user set up for Microsoft Defender Advanced Threat Protection portal. keywords: license, licensing, account, set up, validating licensing, windows defender atp search.product: eADQiWindows 10XVcnh search.appverid: met150 @@ -16,16 +16,16 @@ audience: ITPro ms.collection: M365-security-compliance ms.topic: article --- -# Validate licensing provisioning and complete set up for Windows Defender ATP +# Validate licensing provisioning and complete set up for Microsoft Defender ATP **Applies to:** -- [Windows Defender Advanced Threat Protection (Windows Defender ATP)](https://go.microsoft.com/fwlink/p/?linkid=2069559) +- [Microsoft Defender Advanced Threat Protection (Microsoft Defender ATP)](https://go.microsoft.com/fwlink/p/?linkid=2069559) ->Want to experience Windows Defender ATP? [Sign up for a free trial.](https://www.microsoft.com/en-us/WindowsForBusiness/windows-atp?ocid=docs-wdatp-validatelicense-abovefoldlink) +>Want to experience Microsoft Defender ATP? [Sign up for a free trial.](https://www.microsoft.com/en-us/WindowsForBusiness/windows-atp?ocid=docs-wdatp-validatelicense-abovefoldlink) ## Check license state @@ -53,11 +53,11 @@ To gain access into which licenses are provisioned to your company, and to check ## Access Windows Defender Security Center for the first time -When accessing [Windows Defender Security Center](https://SecurityCenter.Windows.com) for the first time there will be a setup wizard that will guide you through some initial steps. At the end of the setup wizard there will be a dedicated cloud instance of Windows Defender ATP created. +When accessing [Windows Defender Security Center](https://SecurityCenter.Windows.com) for the first time there will be a setup wizard that will guide you through some initial steps. At the end of the setup wizard there will be a dedicated cloud instance of Microsoft Defender ATP created. 1. Each time you access the portal you will need to validate that you are authorized to access the product. This **Set up your permissions** step will only be available if you are not currently authorized to access the product. - ![Image of Set up your permissions for Windows Defender ATP](images\atp-setup-permissions-wdatp-portal.png) + ![Image of Set up your permissions for Microsoft Defender ATP](images\atp-setup-permissions-wdatp-portal.png) Once the authorization step is completed, the **Welcome** screen will be displayed. @@ -74,9 +74,9 @@ When accessing [Windows Defender Security Center](https://SecurityCenter.Windows 1. **Select data storage location**
      When onboarding the service for the first time, you can choose to store your data in the Microsoft Azure datacenters in the United States, the European Union, or the United Kingdom. Once configured, you cannot change the location where your data is stored. This provides a convenient way to minimize compliance risk by actively selecting the geographic locations where your data will reside. Microsoft will not transfer the data from the specified geolocation. > [!WARNING] - > This option cannot be changed without completely offboarding from Windows Defender ATP and completing a new enrollment process. + > This option cannot be changed without completely offboarding from Microsoft Defender ATP and completing a new enrollment process. - 2. **Select the data retention policy**
      Windows Defender ATP will store data up to a period of 6 months in your cloud instance, however, you have the option to set the data retention period for a shorter timeframe during this step of the set up process. + 2. **Select the data retention policy**
      Microsoft Defender ATP will store data up to a period of 6 months in your cloud instance, however, you have the option to set the data retention period for a shorter timeframe during this step of the set up process. > [!NOTE] > This option can be changed at a later time. @@ -86,7 +86,7 @@ When accessing [Windows Defender Security Center](https://SecurityCenter.Windows > [!NOTE] > The **organization size** question is not related to how many licenses were purchased for your organization. It is used by the service to optimize the creation of the data cluster for your organization. - 4. **Turn on preview features**
      Learn about new features in the Windows Defender ATP preview release and be among the first to try upcoming features by turning on **Preview features**. + 4. **Turn on preview features**
      Learn about new features in the Microsoft Defender ATP preview release and be among the first to try upcoming features by turning on **Preview features**. You'll have access to upcoming features which you can provide feedback on to help improve the overall experience before features are generally available. @@ -104,9 +104,9 @@ When accessing [Windows Defender Security Center](https://SecurityCenter.Windows 5. A dedicated cloud instance of Windows Defender Security Center is being created at this time. This step will take an average of 5 minutes to complete. - ![Image of Windows Defender ATP cloud instance](images\creating-account.png) + ![Image of Microsoft Defender ATP cloud instance](images\creating-account.png) -6. You are almost done. Before you can start using Windows Defender ATP you'll need to: +6. You are almost done. Before you can start using Microsoft Defender ATP you'll need to: - [Onboard Windows 10 machines](configure-endpoints-windows-defender-advanced-threat-protection.md) @@ -115,13 +115,13 @@ When accessing [Windows Defender Security Center](https://SecurityCenter.Windows ![Image of Onboard machines and run detection test](images\atp-onboard-endpoints-run-detection-test.png) > [!IMPORTANT] - > If you click **Start using Windows Defender ATP** before onboarding machines you will receive the following notification: + > If you click **Start using Microsoft Defender ATP** before onboarding machines you will receive the following notification: >![Image of setup imcomplete](images\atp-setup-incomplete.png) -7. After onboarding machines you can click **Start using Windows Defender ATP**. You will now launch Windows Defender ATP for the first time. +7. After onboarding machines you can click **Start using Microsoft Defender ATP**. You will now launch Microsoft Defender ATP for the first time. ![Image of onboard machines](images\atp-onboard-endpoints-WDATP-portal.png) ## Related topics -- [Onboard machines to the Windows Defender Advanced Threat Protection service](onboard-configure-windows-defender-advanced-threat-protection.md) +- [Onboard machines to the Microsoft Defender Advanced Threat Protection service](onboard-configure-windows-defender-advanced-threat-protection.md) - [Troubleshoot onboarding process and portal access issues](troubleshoot-onboarding-error-messages-windows-defender-advanced-threat-protection.md) diff --git a/windows/security/threat-protection/microsoft-defender-atp/machine-groups.md b/windows/security/threat-protection/microsoft-defender-atp/machine-groups.md index d983539915..a932128539 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/machine-groups.md +++ b/windows/security/threat-protection/microsoft-defender-atp/machine-groups.md @@ -1,5 +1,5 @@ --- -title: Create and manage machine groups in Windows Defender ATP +title: Create and manage machine groups in Microsoft Defender ATP description: Create machine groups and set automated remediation levels on them by confiring the rules that apply on the group keywords: machine groups, groups, remediation, level, rules, aad group, role, assign, rank search.product: eADQiWindows 10XVcnh @@ -17,19 +17,19 @@ ms.collection: M365-security-compliance ms.topic: article --- -# Create and manage machine groups in Windows Defender ATP +# Create and manage machine groups in Microsoft Defender ATP **Applies to:** - Azure Active Directory - Office 365 -- [Windows Defender Advanced Threat Protection (Windows Defender ATP)](https://go.microsoft.com/fwlink/p/?linkid=2069559) +- [Microsoft Defender Advanced Threat Protection (Microsoft Defender ATP)](https://go.microsoft.com/fwlink/p/?linkid=2069559) In an enterprise scenario, security operation teams are typically assigned a set of machines. These machines are grouped together based on a set of attributes such as their domains, computer names, or designated tags. -In Windows Defender ATP, you can create machine groups and use them to: +In Microsoft Defender ATP, you can create machine groups and use them to: - Limit access to related alerts and data to specific Azure AD user groups with [assigned RBAC roles](rbac-windows-defender-advanced-threat-protection.md) - Configure different auto-remediation settings for different sets of machines diff --git a/windows/security/threat-protection/microsoft-defender-atp/machine-reports.md b/windows/security/threat-protection/microsoft-defender-atp/machine-reports.md index 86bf166722..77885b5540 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/machine-reports.md +++ b/windows/security/threat-protection/microsoft-defender-atp/machine-reports.md @@ -1,5 +1,5 @@ --- -title: Machine health and compliance report in Windows Defender ATP +title: Machine health and compliance report in Microsoft Defender ATP description: Track machine health state detections, antivirus status, OS platform, and Windows 10 versions using the machine health and compliance report keywords: health state, antivirus, os platform, windows 10 version, version, health, compliance, state search.product: eADQiWindows 10XVcnh @@ -17,10 +17,10 @@ ms.collection: M365-security-compliance ms.topic: article --- -# Machine health and compliance report in Windows Defender ATP +# Machine health and compliance report in Microsoft Defender ATP **Applies to:** -- [Windows Defender Advanced Threat Protection (Windows Defender ATP)](https://wincom.blob.core.windows.net/documents/Windows10_Commercial_Comparison.pdf) +- [Microsoft Defender Advanced Threat Protection (Microsoft Defender ATP)](https://wincom.blob.core.windows.net/documents/Windows10_Commercial_Comparison.pdf) [!include[Prerelease information](prerelease.md)] diff --git a/windows/security/threat-protection/microsoft-defender-atp/machine.md b/windows/security/threat-protection/microsoft-defender-atp/machine.md index 40687ef4f7..c118700037 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/machine.md +++ b/windows/security/threat-protection/microsoft-defender-atp/machine.md @@ -18,7 +18,7 @@ ms.topic: article # Machine resource type **Applies to:** -- [Windows Defender Advanced Threat Protection (Windows Defender ATP)](https://go.microsoft.com/fwlink/p/?linkid=2069559) +- [Microsoft Defender Advanced Threat Protection (Microsoft Defender ATP)](https://go.microsoft.com/fwlink/p/?linkid=2069559) # Methods @@ -36,17 +36,17 @@ Property | Type | Description :---|:---|:--- id | String | [machine](machine-windows-defender-advanced-threat-protection-new.md) identity. computerDnsName | String | [machine](machine-windows-defender-advanced-threat-protection-new.md) fully qualified name. -firstSeen | DateTimeOffset | First date and time where the [machine](machine-windows-defender-advanced-threat-protection-new.md) was observed by Windows Defender ATP. -lastSeen | DateTimeOffset | Last date and time where the [machine](machine-windows-defender-advanced-threat-protection-new.md) was observed by Windows Defender ATP. +firstSeen | DateTimeOffset | First date and time where the [machine](machine-windows-defender-advanced-threat-protection-new.md) was observed by Microsoft Defender ATP. +lastSeen | DateTimeOffset | Last date and time where the [machine](machine-windows-defender-advanced-threat-protection-new.md) was observed by Microsoft Defender ATP. osPlatform | String | OS platform. osVersion | String | OS Version. lastIpAddress | String | Last IP on local NIC on the [machine](machine-windows-defender-advanced-threat-protection-new.md). lastExternalIpAddress | String | Last IP through which the [machine](machine-windows-defender-advanced-threat-protection-new.md) accessed the internet. -agentVersion | String | Version of Windows Defender ATP agent. +agentVersion | String | Version of Microsoft Defender ATP agent. osBuild | Nullable long | OS build number. healthStatus | Enum | [machine](machine-windows-defender-advanced-threat-protection-new.md) health status. Possible values are: "Active", "Inactive", "ImpairedCommunication", "NoSensorData" and "NoSensorDataImpairedCommunication" rbacGroupId | Int | RBAC Group ID. rbacGroupName | String | RBAC Group Name. -riskScore | Nullable Enum | Risk score as evaluated by Windows Defender ATP. Possible values are: 'None', 'Low', 'Medium' and 'High'. +riskScore | Nullable Enum | Risk score as evaluated by Microsoft Defender ATP. Possible values are: 'None', 'Low', 'Medium' and 'High'. aadDeviceId | Nullable Guid | AAD Device ID (when [machine](machine-windows-defender-advanced-threat-protection-new.md) is Aad Joined). machineTags | String collection | Set of [machine](machine-windows-defender-advanced-threat-protection-new.md) tags. \ No newline at end of file diff --git a/windows/security/threat-protection/microsoft-defender-atp/machineaction.md b/windows/security/threat-protection/microsoft-defender-atp/machineaction.md index c4f16727e0..66271b6633 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/machineaction.md +++ b/windows/security/threat-protection/microsoft-defender-atp/machineaction.md @@ -20,7 +20,7 @@ ms.date: 12/08/2017 # MachineAction resource type **Applies to:** -- [Windows Defender Advanced Threat Protection (Windows Defender ATP)](https://go.microsoft.com/fwlink/p/?linkid=2069559) +- [Microsoft Defender Advanced Threat Protection (Microsoft Defender ATP)](https://go.microsoft.com/fwlink/p/?linkid=2069559) [!include[Prereleaseinformation](prerelease.md)] @@ -35,7 +35,7 @@ Method|Return Type |Description [Restrict app execution](restrict-code-execution-windows-defender-advanced-threat-protection-new.md) | [Machine Action](machineaction-windows-defender-advanced-threat-protection-new.md) | Restrict application execution. [Remove app restriction](unrestrict-code-execution-windows-defender-advanced-threat-protection-new.md) | [Machine Action](machineaction-windows-defender-advanced-threat-protection-new.md) | Remove application execution restriction. [Run antivirus scan](run-av-scan-windows-defender-advanced-threat-protection-new.md) | [Machine Action](machineaction-windows-defender-advanced-threat-protection-new.md) | Run an AV scan using Windows Defender (when applicable). -[Offboard machine](offboard-machine-api-windows-defender-advanced-threat-protection-new.md)|[Machine Action](machineaction-windows-defender-advanced-threat-protection-new.md) | Offboard [machine](machine-windows-defender-advanced-threat-protection-new.md) from Windows Defender ATP. +[Offboard machine](offboard-machine-api-windows-defender-advanced-threat-protection-new.md)|[Machine Action](machineaction-windows-defender-advanced-threat-protection-new.md) | Offboard [machine](machine-windows-defender-advanced-threat-protection-new.md) from Microsoft Defender ATP. # Properties Property | Type | Description diff --git a/windows/security/threat-protection/microsoft-defender-atp/machineactionsnote.md b/windows/security/threat-protection/microsoft-defender-atp/machineactionsnote.md index 3f4a20dcbc..ef5a31ec33 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/machineactionsnote.md +++ b/windows/security/threat-protection/microsoft-defender-atp/machineactionsnote.md @@ -3,4 +3,4 @@ ms.date: 08/28/2017 author: zavidor --- >[!Note] -> This page focuses on performing a machine action via API. See [take response actions on a machine](respond-machine-alerts-windows-defender-advanced-threat-protection.md) for more information about response actions functionality via Windows Defender ATP. +> This page focuses on performing a machine action via API. See [take response actions on a machine](respond-machine-alerts-windows-defender-advanced-threat-protection.md) for more information about response actions functionality via Microsoft Defender ATP. diff --git a/windows/security/threat-protection/microsoft-defender-atp/machines-view-overview.md b/windows/security/threat-protection/microsoft-defender-atp/machines-view-overview.md index c94234e9e1..73f5d50ed2 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/machines-view-overview.md +++ b/windows/security/threat-protection/microsoft-defender-atp/machines-view-overview.md @@ -1,5 +1,5 @@ --- -title: View and organize the Windows Defender ATP machines list +title: View and organize the Microsoft Defender ATP machines list description: Learn about the available features that you can use from the Machines list such as sorting, filtering, and exporting the list to enhance investigations. keywords: sort, filter, export, csv, machine name, domain, last seen, internal IP, health state, active alerts, active malware detections, threat category, review alerts, network, connection, malware, type, password stealer, ransomware, exploit, threat, general malware, unwanted software search.product: eADQiWindows 10XVcnh @@ -18,14 +18,14 @@ ms.topic: article ms.date: 09/03/2018 --- -# View and organize the Windows Defender ATP Machines list +# View and organize the Microsoft Defender ATP Machines list **Applies to:** -- [Windows Defender Advanced Threat Protection (Windows Defender ATP)](https://go.microsoft.com/fwlink/p/?linkid=2069559) +- [Microsoft Defender Advanced Threat Protection (Microsoft Defender ATP)](https://go.microsoft.com/fwlink/p/?linkid=2069559) ->Want to experience Windows Defender ATP? [Sign up for a free trial.](https://www.microsoft.com/en-us/WindowsForBusiness/windows-atp?ocid=docs-wdatp-machinesview-abovefoldlink) +>Want to experience Microsoft Defender ATP? [Sign up for a free trial.](https://www.microsoft.com/en-us/WindowsForBusiness/windows-atp?ocid=docs-wdatp-machinesview-abovefoldlink) The **Machines list** shows a list of the machines in your network where alerts were generated. By default, the queue displays machines with alerts seen in the last 30 days. @@ -92,6 +92,6 @@ You can filter the list based on the grouping and tagging that you've added to i ## Related topics -- [Investigate machines in the Windows Defender ATP Machines list](investigate-machines-windows-defender-advanced-threat-protection.md) +- [Investigate machines in the Microsoft Defender ATP Machines list](investigate-machines-windows-defender-advanced-threat-protection.md) diff --git a/windows/security/threat-protection/microsoft-defender-atp/manage-alerts.md b/windows/security/threat-protection/microsoft-defender-atp/manage-alerts.md index fe70b2cba7..85be05b201 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/manage-alerts.md +++ b/windows/security/threat-protection/microsoft-defender-atp/manage-alerts.md @@ -1,5 +1,5 @@ --- -title: Manage Windows Defender Advanced Threat Protection alerts +title: Manage Microsoft Defender Advanced Threat Protection alerts description: Change the status of alerts, create suppression rules to hide alerts, submit comments, and review change history for individual alerts with the Manage Alert menu. keywords: manage alerts, manage, alerts, status, new, in progress, resolved, resolve alerts, suppress, supression, rules, context, history, comments, changes search.product: eADQiWindows 10XVcnh @@ -18,14 +18,14 @@ ms.topic: article ms.date: 09/03/2018 --- -# Manage Windows Defender Advanced Threat Protection alerts +# Manage Microsoft Defender Advanced Threat Protection alerts **Applies to:** -- [Windows Defender Advanced Threat Protection (Windows Defender ATP)](https://go.microsoft.com/fwlink/p/?linkid=2069559) +- [Microsoft Defender Advanced Threat Protection (Microsoft Defender ATP)](https://go.microsoft.com/fwlink/p/?linkid=2069559) ->Want to experience Windows Defender ATP? [Sign up for a free trial.](https://www.microsoft.com/en-us/WindowsForBusiness/windows-atp?ocid=docs-wdatp-managealerts-abovefoldlink) +>Want to experience Microsoft Defender ATP? [Sign up for a free trial.](https://www.microsoft.com/en-us/WindowsForBusiness/windows-atp?ocid=docs-wdatp-managealerts-abovefoldlink) -Windows Defender ATP notifies you of possible malicious events, attributes, and contextual information through alerts. A summary of new alerts is displayed in the **Security operations dashboard**, and you can access all alerts in the **Alerts queue**. +Microsoft Defender ATP notifies you of possible malicious events, attributes, and contextual information through alerts. A summary of new alerts is displayed in the **Security operations dashboard**, and you can access all alerts in the **Alerts queue**. You can manage alerts by selecting an alert in the **Alerts queue** or the **Alerts related to this machine** section of the machine details view. @@ -41,7 +41,7 @@ If an alert is no yet assigned, you can select **Assign to me** to assign the al ## Suppress alerts -There might be scenarios where you need to suppress alerts from appearing in Windows Defender Security Center. Windows Defender ATP lets you create suppression rules for specific alerts that are known to be innocuous such as known tools or processes in your organization. +There might be scenarios where you need to suppress alerts from appearing in Windows Defender Security Center. Microsoft Defender ATP lets you create suppression rules for specific alerts that are known to be innocuous such as known tools or processes in your organization. Suppression rules can be created from an existing alert. They can be disabled and reenabled if needed. @@ -118,10 +118,10 @@ Added comments instantly appear on the pane. ## Related topics - [Manage suppression rules](manage-suppression-rules-windows-defender-advanced-threat-protection.md) -- [View and organize the Windows Defender Advanced Threat Protection Alerts queue ](alerts-queue-windows-defender-advanced-threat-protection.md) -- [Investigate Windows Defender Advanced Threat Protection alerts](investigate-alerts-windows-defender-advanced-threat-protection.md) -- [Investigate a file associated with a Windows Defender ATP alert](investigate-files-windows-defender-advanced-threat-protection.md) -- [Investigate machines in the Windows Defender ATP Machines list](investigate-machines-windows-defender-advanced-threat-protection.md) -- [Investigate an IP address associated with a Windows Defender ATP alert](investigate-ip-windows-defender-advanced-threat-protection.md) -- [Investigate a domain associated with a Windows Defender ATP alert](investigate-domain-windows-defender-advanced-threat-protection.md) -- [Investigate a user account in Windows Defender ATP](investigate-user-windows-defender-advanced-threat-protection.md) +- [View and organize the Microsoft Defender Advanced Threat Protection Alerts queue ](alerts-queue-windows-defender-advanced-threat-protection.md) +- [Investigate Microsoft Defender Advanced Threat Protection alerts](investigate-alerts-windows-defender-advanced-threat-protection.md) +- [Investigate a file associated with a Microsoft Defender ATP alert](investigate-files-windows-defender-advanced-threat-protection.md) +- [Investigate machines in the Microsoft Defender ATP Machines list](investigate-machines-windows-defender-advanced-threat-protection.md) +- [Investigate an IP address associated with a Microsoft Defender ATP alert](investigate-ip-windows-defender-advanced-threat-protection.md) +- [Investigate a domain associated with a Microsoft Defender ATP alert](investigate-domain-windows-defender-advanced-threat-protection.md) +- [Investigate a user account in Microsoft Defender ATP](investigate-user-windows-defender-advanced-threat-protection.md) diff --git a/windows/security/threat-protection/microsoft-defender-atp/manage-allowed-blocked-list.md b/windows/security/threat-protection/microsoft-defender-atp/manage-allowed-blocked-list.md index 150cd87e78..dc313000a3 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/manage-allowed-blocked-list.md +++ b/windows/security/threat-protection/microsoft-defender-atp/manage-allowed-blocked-list.md @@ -20,11 +20,11 @@ ms.topic: article # Manage allowed/blocked lists **Applies to:** -- [Windows Defender Advanced Threat Protection (Windows Defender ATP)](https://go.microsoft.com/fwlink/p/?linkid=2069559) +- [Microsoft Defender Advanced Threat Protection (Microsoft Defender ATP)](https://go.microsoft.com/fwlink/p/?linkid=2069559) [!include[Prerelease information](prerelease.md)] ->Want to experience Windows Defender ATP? [Sign up for a free trial.](https://www.microsoft.com/en-us/WindowsForBusiness/windows-atp?ocid=docs-wdatp-automationexclusionlist-abovefoldlink) +>Want to experience Microsoft Defender ATP? [Sign up for a free trial.](https://www.microsoft.com/en-us/WindowsForBusiness/windows-atp?ocid=docs-wdatp-automationexclusionlist-abovefoldlink) Create indicators that define the detection, prevention, and exclusion of entities. You can define the action to be taken as well as the duration for when to apply the action as well as the scope of the machine group to apply it to. diff --git a/windows/security/threat-protection/microsoft-defender-atp/manage-auto-investigation.md b/windows/security/threat-protection/microsoft-defender-atp/manage-auto-investigation.md index 3b6362ab90..fa2c696f10 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/manage-auto-investigation.md +++ b/windows/security/threat-protection/microsoft-defender-atp/manage-auto-investigation.md @@ -196,4 +196,4 @@ From the panel, you can click on the Open investigation page link to see the inv You also have the option of selecting multiple investigations to approve or reject actions on multiple investigations. ## Related topic -- [Investigate Windows Defender ATP alerts](investigate-alerts-windows-defender-advanced-threat-protection.md) +- [Investigate Microsoft Defender ATP alerts](investigate-alerts-windows-defender-advanced-threat-protection.md) diff --git a/windows/security/threat-protection/microsoft-defender-atp/manage-automation-allowed-blocked-list.md b/windows/security/threat-protection/microsoft-defender-atp/manage-automation-allowed-blocked-list.md index 5afed1e6df..4960840dca 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/manage-automation-allowed-blocked-list.md +++ b/windows/security/threat-protection/microsoft-defender-atp/manage-automation-allowed-blocked-list.md @@ -20,11 +20,11 @@ ms.topic: article # Manage automation allowed/blocked lists **Applies to:** -- [Windows Defender Advanced Threat Protection (Windows Defender ATP)](https://go.microsoft.com/fwlink/p/?linkid=2069559) +- [Microsoft Defender Advanced Threat Protection (Microsoft Defender ATP)](https://go.microsoft.com/fwlink/p/?linkid=2069559) ->Want to experience Windows Defender ATP? [Sign up for a free trial.](https://www.microsoft.com/en-us/WindowsForBusiness/windows-atp?ocid=docs-wdatp-automationexclusionlist-abovefoldlink) +>Want to experience Microsoft Defender ATP? [Sign up for a free trial.](https://www.microsoft.com/en-us/WindowsForBusiness/windows-atp?ocid=docs-wdatp-automationexclusionlist-abovefoldlink) Create a rule to control which entities are automatically incriminated or exonerated during Automated investigations. diff --git a/windows/security/threat-protection/microsoft-defender-atp/manage-automation-file-uploads.md b/windows/security/threat-protection/microsoft-defender-atp/manage-automation-file-uploads.md index 84706f7a5a..baf0ac27bb 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/manage-automation-file-uploads.md +++ b/windows/security/threat-protection/microsoft-defender-atp/manage-automation-file-uploads.md @@ -23,11 +23,11 @@ ms.date: 04/24/2018 **Applies to:** -- [Windows Defender Advanced Threat Protection (Windows Defender ATP)](https://go.microsoft.com/fwlink/p/?linkid=2069559) +- [Microsoft Defender Advanced Threat Protection (Microsoft Defender ATP)](https://go.microsoft.com/fwlink/p/?linkid=2069559) ->Want to experience Windows Defender ATP? [Sign up for a free trial.](https://www.microsoft.com/en-us/WindowsForBusiness/windows-atp?ocid=docs-wdatp-automationefileuploads-abovefoldlink) +>Want to experience Microsoft Defender ATP? [Sign up for a free trial.](https://www.microsoft.com/en-us/WindowsForBusiness/windows-atp?ocid=docs-wdatp-automationefileuploads-abovefoldlink) Enable the content analysis capability so that certain files and email attachments can automatically be uploaded to the cloud for additional inspection in Automated investigation. diff --git a/windows/security/threat-protection/microsoft-defender-atp/manage-automation-folder-exclusions.md b/windows/security/threat-protection/microsoft-defender-atp/manage-automation-folder-exclusions.md index 23133475a4..e63a8c6207 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/manage-automation-folder-exclusions.md +++ b/windows/security/threat-protection/microsoft-defender-atp/manage-automation-folder-exclusions.md @@ -23,11 +23,11 @@ ms.date: 04/24/2018 **Applies to:** -- [Windows Defender Advanced Threat Protection (Windows Defender ATP)](https://go.microsoft.com/fwlink/p/?linkid=2069559) +- [Microsoft Defender Advanced Threat Protection (Microsoft Defender ATP)](https://go.microsoft.com/fwlink/p/?linkid=2069559) ->Want to experience Windows Defender ATP? [Sign up for a free trial.](https://www.microsoft.com/en-us/WindowsForBusiness/windows-atp?ocid=docs-wdatp-automationexclusionfolder-abovefoldlink) +>Want to experience Microsoft Defender ATP? [Sign up for a free trial.](https://www.microsoft.com/en-us/WindowsForBusiness/windows-atp?ocid=docs-wdatp-automationexclusionfolder-abovefoldlink) Automation folder exclusions allow you to specify folders that the Automated investigation will skip. diff --git a/windows/security/threat-protection/microsoft-defender-atp/manage-incidents.md b/windows/security/threat-protection/microsoft-defender-atp/manage-incidents.md index 8b8fa19749..d03aec8131 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/manage-incidents.md +++ b/windows/security/threat-protection/microsoft-defender-atp/manage-incidents.md @@ -1,5 +1,5 @@ --- -title: Manage Windows Defender ATP incidents +title: Manage Microsoft Defender ATP incidents description: Manage incidents by assigning it, updating its status, or setting its classification. keywords: incidents, manage, assign, status, classification, true alert, false alert search.product: eADQiWindows 10XVcnh @@ -18,10 +18,10 @@ ms.topic: article ms.date: 010/08/2018 --- -# Manage Windows Defender ATP incidents +# Manage Microsoft Defender ATP incidents **Applies to:** -- [Windows Defender Advanced Threat Protection (Windows Defender ATP)](https://go.microsoft.com/fwlink/p/?linkid=2069559) +- [Microsoft Defender Advanced Threat Protection (Microsoft Defender ATP)](https://go.microsoft.com/fwlink/p/?linkid=2069559) Managing incidents is an important part of every cybersecurity operation. You can manage incidents by selecting an incident from the **Incidents queue** or the **Incidents management pane**. You can assign incidents to yourself, change the status, classify, rename, or comment on them to keep track of their progress. diff --git a/windows/security/threat-protection/microsoft-defender-atp/manage-suppression-rules.md b/windows/security/threat-protection/microsoft-defender-atp/manage-suppression-rules.md index 9b89a258e4..2e6bbe1507 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/manage-suppression-rules.md +++ b/windows/security/threat-protection/microsoft-defender-atp/manage-suppression-rules.md @@ -1,5 +1,5 @@ --- -title: Manage Windows Defender Advanced Threat Protection suppression rules +title: Manage Microsoft Defender Advanced Threat Protection suppression rules description: Manage suppression rules keywords: manage suppression, rules, rule name, scope, action, alerts, turn on, turn off search.product: eADQiWindows 10XVcnh @@ -22,9 +22,9 @@ ms.date: 04/24/2018 **Applies to:** -- [Windows Defender Advanced Threat Protection (Windows Defender ATP)](https://go.microsoft.com/fwlink/p/?linkid=2069559) +- [Microsoft Defender Advanced Threat Protection (Microsoft Defender ATP)](https://go.microsoft.com/fwlink/p/?linkid=2069559) ->Want to experience Windows Defender ATP? [Sign up for a free trial.](https://www.microsoft.com/en-us/WindowsForBusiness/windows-atp?ocid=docs-wdatp-suppressionrules-abovefoldlink) +>Want to experience Microsoft Defender ATP? [Sign up for a free trial.](https://www.microsoft.com/en-us/WindowsForBusiness/windows-atp?ocid=docs-wdatp-suppressionrules-abovefoldlink) There might be scenarios where you need to suppress alerts from appearing in the portal. You can create suppression rules for specific alerts that are known to be innocuous such as known tools or processes in your organization. For more information on how to suppress alerts, see [Suppress alerts](manage-alerts-windows-defender-advanced-threat-protection.md). diff --git a/windows/security/threat-protection/microsoft-defender-atp/management-apis.md b/windows/security/threat-protection/microsoft-defender-atp/management-apis.md index c0408e9e5f..fd37543f72 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/management-apis.md +++ b/windows/security/threat-protection/microsoft-defender-atp/management-apis.md @@ -21,38 +21,38 @@ ms.date: 09/03/2018 # Overview of management and APIs **Applies to:** -- [Windows Defender Advanced Threat Protection (Windows Defender ATP)](https://go.microsoft.com/fwlink/p/?linkid=2069559) +- [Microsoft Defender Advanced Threat Protection (Microsoft Defender ATP)](https://go.microsoft.com/fwlink/p/?linkid=2069559) ->Want to experience Windows Defender ATP? [Sign up for a free trial.](https://www.microsoft.com/en-us/WindowsForBusiness/windows-atp?ocid=docs-mgt-apis-abovefoldlink) +>Want to experience Microsoft Defender ATP? [Sign up for a free trial.](https://www.microsoft.com/en-us/WindowsForBusiness/windows-atp?ocid=docs-mgt-apis-abovefoldlink) -Windows Defender ATP supports a wide variety of options to ensure that customers can easily adopt the platform. +Microsoft Defender ATP supports a wide variety of options to ensure that customers can easily adopt the platform. -Acknowledging that customer environments and structures can vary, Windows Defender ATP was created with flexibility and granular control to fit varying customer requirements. +Acknowledging that customer environments and structures can vary, Microsoft Defender ATP was created with flexibility and granular control to fit varying customer requirements. -Machine onboarding is fully integrated into System Center Configuration Manager and Microsoft Intune for client machines and Azure Security Center for server machines, providing complete end-to-end experience of configuration, deployment, and monitoring. In addition, Windows Defender ATP supports Group Policy and other third-party tools used for machines management. +Machine onboarding is fully integrated into System Center Configuration Manager and Microsoft Intune for client machines and Azure Security Center for server machines, providing complete end-to-end experience of configuration, deployment, and monitoring. In addition, Microsoft Defender ATP supports Group Policy and other third-party tools used for machines management. -Windows Defender ATP provides fine-grained control over what users with access to the portal can see and do through the flexibility of role-based access control (RBAC). The RBAC model supports all flavors of security teams structure: +Microsoft Defender ATP provides fine-grained control over what users with access to the portal can see and do through the flexibility of role-based access control (RBAC). The RBAC model supports all flavors of security teams structure: - Globally distributed organizations and security teams - Tiered model security operations teams - Fully segregated devisions with single centralized global security operations teams -The Windows Defender ATP solution is built on top of an integration-ready platform: +The Microsoft Defender ATP solution is built on top of an integration-ready platform: - It supports integration with a number of security information and event management (SIEM) solutions and also exposes APIs to fully support pulling all the alerts and detection information into any SIEM solution. - It supports a rich set of application programming interface (APIs) providing flexibility for those who are already heavily invested in data enrichment and automation: - Enriching events coming from other security systems with foot print or prevalence information - Triggering file or machine level response actions through APIs - - Keeping systems in-sync such as importing machine tags from asset management systems into Windows Defender ATP, synchronize alerts and incidents status cross ticketing systems with Windows Defender ATP. + - Keeping systems in-sync such as importing machine tags from asset management systems into Microsoft Defender ATP, synchronize alerts and incidents status cross ticketing systems with Microsoft Defender ATP. An important aspect of machine management is the ability to analyze the environment from varying and broad perspectives. This often helps drive new insights and proper priority identification: - The Secure score dashboard provides metrics based method of prioritizing the most important proactive security measures. -- Windows Defender ATP includes a built-in PowerBI based reporting solution to quickly review trends and details related to Windows Defender ATP alerts and secure score of machines. The platform also supports full customization of the reports, including mashing of Windows Defender ATP data with your own data stream to produce business specific reports. +- Microsoft Defender ATP includes a built-in PowerBI based reporting solution to quickly review trends and details related to Microsoft Defender ATP alerts and secure score of machines. The platform also supports full customization of the reports, including mashing of Microsoft Defender ATP data with your own data stream to produce business specific reports. ## In this section Topic | Description :---|:--- Understand threat intelligence concepts | Learn about alert definitions, indicators of compromise, and other threat intelligence concepts. -Supported Windows Defender ATP APIs | Learn more about the individual supported entities where you can run API calls to and details such as HTTP request values, request headers and expected responses. +Supported Microsoft Defender ATP APIs | Learn more about the individual supported entities where you can run API calls to and details such as HTTP request values, request headers and expected responses. Managed security service provider | Get a quick overview on managed security service provider support. @@ -61,9 +61,9 @@ Managed security service provider | Get a quick overview on managed security ser ## Related topics - [Onboard machines](onboard-configure-windows-defender-advanced-threat-protection.md) - [Enable the custom threat intelligence application](enable-custom-ti-windows-defender-advanced-threat-protection.md) -- [Windows Defender ATP Public API](use-apis.md) +- [Microsoft Defender ATP Public API](use-apis.md) - [Pull alerts to your SIEM tools](configure-siem-windows-defender-advanced-threat-protection.md) -- [Create and build Power BI reports using Windows Defender ATP data](powerbi-reports-windows-defender-advanced-threat-protection.md) +- [Create and build Power BI reports using Microsoft Defender ATP data](powerbi-reports-windows-defender-advanced-threat-protection.md) - [Role-based access control](rbac-windows-defender-advanced-threat-protection.md) diff --git a/windows/security/threat-protection/microsoft-defender-atp/microsoft-cloud-app-security-config.md b/windows/security/threat-protection/microsoft-defender-atp/microsoft-cloud-app-security-config.md index 52627d87be..1256fa301c 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/microsoft-cloud-app-security-config.md +++ b/windows/security/threat-protection/microsoft-defender-atp/microsoft-cloud-app-security-config.md @@ -1,6 +1,6 @@ --- title: Configure Microsoft Cloud App Security integration -description: Learn how to turn on the settings to enable the Windows Defender ATP integration with Microsoft Cloud App Security. +description: Learn how to turn on the settings to enable the Microsoft Defender ATP integration with Microsoft Cloud App Security. keywords: cloud, app, security, settings, integration, discovery, report search.product: eADQiWindows 10XVcnh search.appverid: met150 @@ -21,12 +21,12 @@ ms.date: 10/19/2018 # Configure Microsoft Cloud App Security in Windows **Applies to:** -- [Windows Defender Advanced Threat Protection (Windows Defender ATP)](https://go.microsoft.com/fwlink/p/?linkid=2069559) +- [Microsoft Defender Advanced Threat Protection (Microsoft Defender ATP)](https://go.microsoft.com/fwlink/p/?linkid=2069559) [!include[Prerelease�information](prerelease.md)] -To benefit from Windows Defender Advanced Threat Protection (ATP) cloud app discovery signals, turn on Microsoft Cloud App Security integration. +To benefit from Microsoft Defender Advanced Threat Protection (ATP) cloud app discovery signals, turn on Microsoft Cloud App Security integration. >[!NOTE] @@ -40,7 +40,7 @@ To benefit from Windows Defender Advanced Threat Protection (ATP) cloud app disc ![Advanced features](images/atp-mcas-settings.png) -Once activated, Windows Defender ATP will immediately start forwarding discovery signals to Cloud App Security. +Once activated, Microsoft Defender ATP will immediately start forwarding discovery signals to Cloud App Security. ## View the data collected @@ -50,7 +50,7 @@ Once activated, Windows Defender ATP will immediately start forwarding discovery ![Image of menu to cloud discovery dashboard](images/atp-cloud-discovery-dashboard-menu.png) -3. Select **Win10 Endpoint Users report**, which contains the data coming from Windows Defender ATP. +3. Select **Win10 Endpoint Users report**, which contains the data coming from Microsoft Defender ATP. ![Win10 endpoint users](./images/win10-endpoint-users.png) diff --git a/windows/security/threat-protection/microsoft-defender-atp/microsoft-cloud-app-security-integration.md b/windows/security/threat-protection/microsoft-defender-atp/microsoft-cloud-app-security-integration.md index 6c2400b885..f8990f3871 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/microsoft-cloud-app-security-integration.md +++ b/windows/security/threat-protection/microsoft-defender-atp/microsoft-cloud-app-security-integration.md @@ -1,6 +1,6 @@ --- title: Microsoft Cloud App Security integration overview -description: Windows Defender ATP integrates with Cloud App Security by collecting and forwarding all cloud app networking activities, providing unparalleled visibility to cloud app usage +description: Microsoft Defender ATP integrates with Cloud App Security by collecting and forwarding all cloud app networking activities, providing unparalleled visibility to cloud app usage keywords: cloud, app, networking, visibility, usage search.product: eADQiWindows 10XVcnh search.appverid: met150 @@ -20,7 +20,7 @@ ms.date: 10/18/2018 # Microsoft Cloud App Security in Windows overview **Applies to:** -- [Windows Defender Advanced Threat Protection (Windows Defender ATP)](https://go.microsoft.com/fwlink/p/?linkid=2069559) +- [Microsoft Defender Advanced Threat Protection (Microsoft Defender ATP)](https://go.microsoft.com/fwlink/p/?linkid=2069559) [!include[Prerelease�information](prerelease.md)] @@ -29,17 +29,17 @@ Microsoft Cloud App Security (Cloud App Security) is a comprehensive solution th >[!NOTE] >This feature is available with an E5 license for [Enterprise Mobility + Security](https://www.microsoft.com/cloud-platform/enterprise-mobility-security) on machines running Windows 10 version 1809 or later. -## Windows Defender ATP and Cloud App Security integration +## Microsoft Defender ATP and Cloud App Security integration -Cloud App Security discovery relies on cloud traffic logs being forwarded to it from enterprise firewall and proxy servers. Windows Defender ATP integrates with Cloud App Security by collecting and forwarding all cloud app networking activities, providing unparalleled visibility to cloud app usage. The monitoring functionality is built into the device, providing complete coverage of network activity. +Cloud App Security discovery relies on cloud traffic logs being forwarded to it from enterprise firewall and proxy servers. Microsoft Defender ATP integrates with Cloud App Security by collecting and forwarding all cloud app networking activities, providing unparalleled visibility to cloud app usage. The monitoring functionality is built into the device, providing complete coverage of network activity. The integration provides the following major improvements to the existing Cloud App Security discovery: - Available everywhere - Since the network activity is collected directly from the endpoint, it's available wherever the device is, on or off corporate network, as it's no longer depended on traffic routed through the enterprise firewall or proxy servers. -- Works out of the box, no configuration required - Forwarding cloud traffic logs to Cloud App Security requires firewall and proxy server configuration. With the Windows Defender ATP and Cloud App Security integration, there's no configuration required. Just switch it on in Windows Defender Security Center settings and you're good to go. +- Works out of the box, no configuration required - Forwarding cloud traffic logs to Cloud App Security requires firewall and proxy server configuration. With the Microsoft Defender ATP and Cloud App Security integration, there's no configuration required. Just switch it on in Windows Defender Security Center settings and you're good to go. -- Device context - Cloud traffic logs lack device context. Windows Defender ATP network activity is reported with the device context (which device accessed the cloud app), so you are able to understand exactly where (device) the network activity took place, in addition to who (user) performed it. +- Device context - Cloud traffic logs lack device context. Microsoft Defender ATP network activity is reported with the device context (which device accessed the cloud app), so you are able to understand exactly where (device) the network activity took place, in addition to who (user) performed it. For more information about cloud discovery, see [Working with discovered apps](https://docs.microsoft.com/cloud-app-security/discovered-apps). diff --git a/windows/security/threat-protection/microsoft-defender-atp/microsoft-defender-advanced-threat-protection.md b/windows/security/threat-protection/microsoft-defender-atp/microsoft-defender-advanced-threat-protection.md index 43bb2202f5..4b2be0215b 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/microsoft-defender-advanced-threat-protection.md +++ b/windows/security/threat-protection/microsoft-defender-atp/microsoft-defender-advanced-threat-protection.md @@ -1,7 +1,7 @@ --- -title: Windows Defender Advanced Threat Protection -description: Windows Defender Advanced Threat Protection is an enterprise security platform that helps secops to prevent, detect, investigate, and respond to possible cybersecurity threats related to advanced persistent threats. -keywords: introduction to Windows Defender Advanced Threat Protection, introduction to Windows Defender ATP, cybersecurity, advanced persistent threat, enterprise security, machine behavioral sensor, cloud security, analytics, threat intelligence, attack surface reduction, next generation protection, automated investigation and remediation, microsoft threat experts, secure score, advanced hunting, microsoft threat protection +title: Microsoft Defender Advanced Threat Protection +description: Microsoft Defender Advanced Threat Protection is an enterprise security platform that helps secops to prevent, detect, investigate, and respond to possible cybersecurity threats related to advanced persistent threats. +keywords: introduction to Microsoft Defender Advanced Threat Protection, introduction to Microsoft Defender ATP, cybersecurity, advanced persistent threat, enterprise security, machine behavioral sensor, cloud security, analytics, threat intelligence, attack surface reduction, next generation protection, automated investigation and remediation, microsoft threat experts, secure score, advanced hunting, microsoft threat protection search.product: eADQiWindows 10XVcnh search.appverid: met150 ms.prod: w10 @@ -17,18 +17,18 @@ ms.collection: M365-security-compliance ms.topic: conceptual --- -# Windows Defender Advanced Threat Protection +# Microsoft Defender Advanced Threat Protection ->Want to experience Windows Defender ATP? [Sign up for a free trial.](https://www.microsoft.com/en-us/WindowsForBusiness/windows-atp?ocid=docs-wdatp-main-abovefoldlink) +>Want to experience Microsoft Defender ATP? [Sign up for a free trial.](https://www.microsoft.com/en-us/WindowsForBusiness/windows-atp?ocid=docs-wdatp-main-abovefoldlink) > >For more info about Windows 10 Enterprise Edition features and functionality, see [Windows 10 Enterprise edition](https://www.microsoft.com/WindowsForBusiness/buy). -Windows Defender Advanced Threat Protection is a platform designed to help enterprise networks prevent, detect, investigate, and respond to advanced threats. +Microsoft Defender Advanced Threat Protection is a platform designed to help enterprise networks prevent, detect, investigate, and respond to advanced threats. -Windows Defender ATP uses the following combination of technology built into Windows 10 and Microsoft's robust cloud service: +Microsoft Defender ATP uses the following combination of technology built into Windows 10 and Microsoft's robust cloud service: - **Endpoint behavioral sensors**: Embedded in Windows 10, these sensors - collect and process behavioral signals from the operating system and sends this sensor data to your private, isolated, cloud instance of Windows Defender ATP. + collect and process behavioral signals from the operating system and sends this sensor data to your private, isolated, cloud instance of Microsoft Defender ATP. - **Cloud security analytics**: Leveraging big-data, machine-learning, and @@ -39,12 +39,12 @@ Windows Defender ATP uses the following combination of technology built into Win - **Threat intelligence**: Generated by Microsoft hunters, security teams, and augmented by threat intelligence provided by partners, threat - intelligence enables Windows Defender ATP to identify attacker + intelligence enables Microsoft Defender ATP to identify attacker tools, techniques, and procedures, and generate alerts when these are observed in collected sensor data. -

      Windows Defender ATP

j}jd%5~)DcZNDYQI&LC$NI-e;vPk;PXD@UJ&9W zouctZ76Oy7u>X(TM}Sy3{zEXp>?8yqi7#0sl%qS&2FanW)&H>&|8;L1WvOC1GB9KL zBK4AXi9hDQzG7>TeqKqjqNTD~fq_xGqyHaYTg4m=XauRLVHY=3m5BBK35n)e*bR$C z;K4&RNCOFWsOHNV&Q3 zpuFH`;5{iGz_6Ty4sp{SRRDZk^5u#gs5}W)Jjo`lTij4^8~Ri(C_KYyY~8?|sUJ6q zWwyRPY$!kVxA@txRMr4MQOOvES!UlsTzA{SDun*gH%ai>)03Z!J+_f@Ocr+&?VBQD zuur-5^rMW2sV;Cj9=akeDtP2fz3b?w26rJ~IjZ@XpteT?tv;JT;yXdtJ;-|J?F180LAO3i))sz}-w z+@%vAm2A88{2EB4V+Ri_-N8{vL#q$XvV$W0YS#~_xdO}p#8ZzOQrTRa`877gi6_M< zPV}xBpX{G5zIUj+Wmlke;(R*>YFj&9n1aisFqad*oj3k${5f25qXZ@y!6NH@44@^XlGfk~Rf#&( zUG)|Y!mnAi8`)J{eoS4Ocl3u~moD{E0mn8w_C8vAiE>bHnQO#kNK^aLcI^%`rKts| zY7JXM9i)JH1`g`lk%L;Nm6v=UkvknB|9^{(6^ob;U5+#4 z*=mYQE%r=;^BMzQKZ$CuZ=GKMzScW%o3#;mX8q2d>Pp99I6q+g-G;m;( z=^_jmcP7?%`O54D@S?)uoDRWLUwB>l&P1n-K2&oD)ao{#D?JltF`d)9i!qjcK^AcH zAwaeEfMxz~&|1gL2GCW~=miZC$7?61lI4m$iRU=2!0AWlx}4ac}7owc>1%iafFOr*yd2M zo+iVINv%m8&|nAaXC-O8U$`W`s4T>oJv`P(EdUghg;a3I*))vG-g(#`U~AqlLs74@ z=4$G3kfXcn(WK39C9Gb#6I3dxZGGgiQuZAA1%Qh>D$x;KhPisHeM47JoZt|TrXh+k z>gP=;Ey&4VG`kV_@g{rx?p{N-I~*qgz&L{JyPh@kqn?hn-%?ls`tkbr$l=L{uUV{l z=KCr>>z_E@8ZainYlJxnbOfOb7cNjPgT72=dfwx??2tdAEVU;K*;K%p z>>s8QTo5YZq>!Y)OtYk=jbcedq}d2|6aPUE4*qj+xW~%-e?!PN$N$F?azqvbPKI={ zZaBgI2je~uCC^p=vkz zO+lv90J`>*zUrIP+D*(Nu}c{0LccM%^3p#Thge$q4p;EMx3TAlKA;eu9V!WosV2dZKO40E^~pIT=DVnODBgb9NFHKlHD-=0lT3N zS@JyFQ=a6f?N4}6u%b!jZrsjHe=cnmO|UK2sn3vVS8`xUdT;j{w=-kVb}8r$H92H1 zt{YTka)T9~Fkfa*E6^ibRM=|^%HJD$L8(nqBQ@iJx=4xfQ-DVrX z>~3ndPKtTw!T4a$BRJ=N`(qs}GTM{|E*dZR+Hcz#C;5#3O-^kXq+-4Rv{so`HMy}X z_a``5nChtz(Yo9TqC~g>uRI-BM(XC9$tZf${2$#o7@UQ$`Pd$ZgO>DBC+cmr>+b5y z#VNQECK_PS=PZ0B3kt4WUrRa^x*`Etu=u{bYD%I>|El#zwq*J?eSPyROg`nxI7Cl0 zQel_CtMgW!^2-{zLh)s>Yr4h=f{)?Cy{VDpN$g#%uy@~-gNos4u>#sK$MC3|#)hKu zP{G%jZNmc{{X31M13CVEUaaMh$E6}gz$zOud*|(fGY-H+)%8j0wQlc}^y0ol;VUx` zR==-;?`kkO~nS*97I8NR&Dv{7gZslLxBhXkY;4p_vVhuV}B`o=N;ef^|a71J8 zqQ_kW;6FOdQscd#N6pTj)oc2q=BDXW{O5BjT-3gGo%EPg(2@~~RK2aCb6%^hgp1!W zo(xCjXUf$}Qupf=VSq3*3rHM8SYC_i*G#De%~|;OwxU0-=a*YMe57?c!Td^1yQ_(v zF1JkGqyD|^l_ru_o~&0)+l~Uqa(>)&HFnH{u3JK@(avFdGfD3JhV|r`O4(+J4=f;_ z&EM~W2&-h{IEh0n+kK%UL05Mb z5%oPfF=>6?Ue4n-eZMB#QHoG@)g@bBqW#;$M<<4$U9mx*9y`#N2u{^}AF~WPY$$Q+ zt%4CA96fZyL?hq?$`lIP2}&5SKX_tjEuFvu-|Lqd*7BS)hC68Vm|)^hPW9EM72)^% zpl%d6r&p$E1iwZPCQ+91eEF8;KR|&mX-K7DUbNuCAI#*-dm_np*tS>p+7UC8n>jPP zWVBLKb;y_eOaEMZF3s3D0flR zS(t5bx6dTZ7DhExeYih!9$ek@PZ4x)aOE!w7l#OM8gYaKc(w)|tUyj?;^B=@xu>LbS!)Ikg{qw+G50(%QSH;SH8H{jm`6+Y2P~Z;BL9$FXNUI&@zsos(75=z8N$_~TsblAcpxpw@$6S`SSr5-FW3n2Hu$4A#rWZD@QT)LGkly^0v^@q77kSi z*4SpUkjm9=20mzw3BHo7|6em^?uERn)<`esFjOU3eO%`KYNZ1G*rV|#b+E6Wa=~^9 ztH=yBGw1?kpGIoTsZ%NwBrb?l9M4aIMIg**L#cnY2(hG7?RcE=KIN7K@zwzKI74aO zGS!|swMtZPy2cKYz`b&ntIyQ$gmy8$+>T)LY&HpdBFAsbDfE}2E%>!;ke{Y=^HMi> zq7{3a4T|~CHUv!EjWY|;))ob;pDbyw=$(m^+?Y&0IsBhhl&uZEF=?`Km~7s8-W}l; zEzkE##>>yM-#)iuLOY*+FL2m&%NPDd`A_BVY@Q9=oey%|XA3oH?Hlp#TBq)wI=61V zl1{Q}hV5>Xzslk1`&Y!}Rku7pvQBYsiq!d5esH(G>A}$lGji4>)XT2a_`aIsnuT}k z9E0umZ6|G6bogrNZJ{NLQ@$VgQz-Xi?n7tr$bv$}M~zDb-*NfL|F3*~PjcP&R^`(7YY)8*7ScX)KeK_Wy0FRg@RML( zu*YNil|&y`2W#)lP!R1nX2Lh+=Irvv7k0k(vO4vqIx1|<4&LwgDb}c%zw?kCtnfSkjm%+ZCr_mJ?A#3%M#Zj=AO=+?aWWj_63*b)bsp1VZyhjDzS9`+WMcGH}3++lR@U(U@bD_Ji?jC z#ddI0*7mh&z-9udPtD=FPVP;(Nx$Uent8R44Z*<-32ds8{|xLN8~>|+_;;3|+%m^0 Rz_UsiJYD@<);T3K0RV*ZxqJWs literal 0 HcmV?d00001 diff --git a/devices/surface-hub/images/sh-84-bottom.png b/devices/surface-hub/images/sh-84-bottom.png new file mode 100644 index 0000000000000000000000000000000000000000..d7252537e47296ad9f8fa69feb9b444c84986671 GIT binary patch literal 74514 zcmd43^;?wP7cVT0G=hZW(29hBbT`tX0@4jKbi)8DE!{PgAc%DLAOq43(#_C4bo$Pq z&-Xol!MV;4Trl_Ed*x@Xz4pEr6Q-f2fRFP8=fQ&q_)3bhuOB=>ZASc5U}GYlR51Bx zAbz2^yjGBYP&!Dxh4_GOC8a8b7>dTdF~LB5e(0#E>+;|MK|AsXrOV;F`GW_4zA4E{ zz40{MoyV$YkxLXfB$Sfss1C+&Y;3fgEVebpZ~9VPYNBmGV#)mU+2?F}JR!pN{v{fD zjee8ymkRpFKWx>CzNc{Ke*VI6>9^rg7%-r`2s)TMZ#loo+7O*Lcxzx_;I<9+f2-~B zr&T&fgN-zavD9aNXaAbq|A>6Gmctr#5^`4Kut09eMv4=JoDo6#dDssSx;Kp&-2CVo z0-hkiy&ph~r!HSjw%*P6uLO%uOgM!S&R0F*(5@LKs$G`*N zB7anCh^Koy$=*%mo+IjLhzg8y7OTb#{TfG^`Td1v#zmD3?RZ$aV2I$s%p}Ae$jPn{ zuS!Ds_^&9W@;G%5z3jS+q$dK4GXjcnDRI5tbSDzYj=Tm*9E{E}Bh%GFNKk;`OH8sbG0x@z;#K^k0b`CU%~ z>1?EmicVuO1tB_}hbb`}GGrK1v}KY&5*h}ut(}#eCt%cbIYR#qRex8VXsX|Xh**GT zIYXyvmf%=$@(;l&Im-$8-$*|o5U*=_<*E7jFt6-x9a+5ST6et86Zhe-)iMMx5^Yl$8J;Br^E9g=$DRM zX+tXbRg6Fo5a;qdCOw!Ghn;vf@WvM#%U-YYrXv{xrwXm|dN)SAvS=u@&*6|P7%eGD zlm+${;DGO?+-)m;aUpH;YdHXL9Y{?CuR(-@LI_9@Rv+^RyWzcJPWfDgTeq)_V1QNd zMRA;64?NB)Q1q#JSIpH@XusngQB@sbieMuT=-aXrKs!V5+4GkmfL>6f&pvPF4dqDu~vevaZ{*KqdZL!U(dcnJt@LD2t3gU?zoFL8MgJ5rJ zpUALW=&N=E8PPRUT-@X~Z3+nWXA0eQUdjt}Wt!(+Y(R0(hB@QCLI7(Zm;xGnS`)xZ z0RbNk64`yIg#ZmqBBWsHvL!&8jM_9Dc zQOfU1hiSZj+RPj%S52*4(av7Ef1iG2v87x$$FxH={%Q5whX50zi#j4Mb320Byi%>n zm^~BXHTa_}^0b)wa2avRmH0#mlsg3xE=j0T0;T5bP`dZdlH~cHPe(GPiwR$hbSUVR z&0?t+KYx2;-CZYbNNOrwq`{_wnhWyp7vk?org|Qj1;p%FeXI;{mCjW&rO`Yev&4gG zNsB(aE@Kgoe_aXhh)WR&)^V^@6>K@uadio&B=q)u9a=zoQpGiIs^s^=n12NfX|{Z3 zsB`4nS!TpxQK^14T8geoXZdt8keZ}Y$aUo98NQGZ`X?{B?x!;J+e=!2ZcZT)S-R7D z(XsNqn@{4$zld%<%@hT);--5F0W6U>HKo@H2}68Sl7?GfUe-^%I#-pXjPZP-YDkCu zLN{nrxD}xTO6~wv5XGk_zT4K28RLm$&G8qk>Az}%yKxD~hJ7MTCnk4OyVxf%uc>1M zyy+<6SpaZk7bi2jLUoh+Vrn6G(+5Y3jOq0xk)V{{Rqh#s-XpmPg+hHGW}&)isi7{w z4BnJUV29Y1a9e?l9|b%$CL|Cz=tIZR*};Rf9>>g~>{QiN^KItXMBL6y6Qd8qQe3XU{Z^R~|0?dQShvHmFv^#K z9pPV(gDhS-5FT}OhCjd5@n%Nbl6}U{y8l=jD;VYEC>@Z6FLlL==5v=pL_&A^b>^lV zkw}LWf>Tmo9!@dK`U@0A)t^l(`m5xMWGY@j_gw|WVa7WNdY%_A z9*6xl+EV89D(}d5l-o245RWiVaX-t9n4WV306!-8_QRjtcv9L`qF^zk_hHr~yI_tr z1}lB9wzB+K${{(T9%!O*vXt!ofO+oDx^xj#5XKZZ?tKglTL8eja!UTgzW!c_{ZXgm*LjxHUr{D1|M%c=p()WdaVch)GblV~Vo;^yj3 z-{MAVawxzPx)`-@GfBuD$TYy@ZPbKcj=$CTrNyhyD=PWEw%5B|^mQMDi9KW;6?`W# z!P4XqxBS!#>}F+~og?4 z2_0It6a~5+opkb;+Dw5A%NJ+v*`Sw@g{+?Xt90WW?uVkNM+_ldEE5Z97->EJ8*bcc z5nAO$i(Xn{PsSQ3eF-M(P>2^j0=d!eP|dc`Wct6q-#NP_LZ7~ylz|YNCSClIzIh~6 zN81;sd~~sQLS#cDqW%7Q)Y8x^b5%tquumH-%99DZO!ec|PvP0{6HxVNW%nZV0&fMb zLHOVU)v}k=9(`;r+_U?)R;kqKb{;^Z#{O{g+jTE^FUZcts98|Yt^m?H`EX}}@asm} zSqVUl7p4G!`jfB7r7j9IaKqFA8`Z0e?q}a>{-m>z2Z8C}Aw&+zBI@<7wWE)^29u+X z-9d)9*KVPrq0Z*sdXq`fu1pzzhK$FF@BC^@kGf*;k`>ln?6E7Sf^;d-qzQT%``S|V zqgli>ogi1Q4cBg*y47X;7S8Nw^uo7N%uc+1VW7(dI^kHzG)iqVBD2U?QL>0SlDsG3;eH;ZSnoTuLwLWN%^&rCSgMpke0 zoyvgu2H&>s>lv;nW}30jd5x|&oCR$Njjp+U8?YTo?q_f3RX3sJRDruf0hP{rxK>-yj-Lh`Me06H{E#8m|@OVa+#{9-un4!$x zZ@xaEjoYuclIS+7+^z#6Jmyf-3Nar3(tqaLm-**q`i^=5rg-KqMSrS3oC5?Ii(@)7 zC0b~C(HDN$+a8DmHd z=RuF_?>-@GoyQ(OuUz+> zHYa_WC)ZN7zSd90N`!6xqU}~R$zNd4b;~7dA@$))WgE<@bbFqj8!gQCL7 z%uml7-N~`b$fd=C`;%uH4?BKQO<86nOeSl*2B|=N=E(2BL|mK1QDYT$v>W{AVFfQ5 zvKSV2&CjR!$J~bwf(h4|qkDQ)6QWhzMN`ewdTO6~?e;yy4w{~7t8crNN_}R}qbacs z{rJ-de`07sEO5U1w36b;&N?1*m(et#G4X1Ao-==w+$V(I7gKMSPb_nP#^tHr!s621 z8=l{8n8)eQ_f*Q{u10apW-o;MZl_+FY!Alck#J>x)Wuxc3VHaojrsY+VwyR8B{g}N z$l#g_f0<-p+grF@O;H)d=;he+8KkQ3<$PE{^P>_`RR$(j&~)4Gv(||^a}*FRwdR@W z2Q~DRUoUNB6^K3O%^KC-t#OA$2{5N$YO`sMt%qiN!h42L&xa7F7i_LoyDa7prv zB^sk9UAufXhX?luIUY=r@?;xPR4!=Kjfs4urqKtA4kv!!=*Q$Fp~XWtYXUlUVSbhd zMHZN}F0DLFtHpnKZL1pk8Xqlvs~Nbh6FVEfS~kI=GcLq{zfBP%GPHH`#m~nzvOWxK zuO#EG0Dg7Y@J2Nzn+KLAe_#!eD(4EPZvpZ7tXS|XGsD@H5r;?uNj0%A;%ptSF|wW= zt16kh^B+os6;kD^sG9~OZ{F8gyV@EgHH)2{Ua(4_A56h&7urSWF5}Ut$dHr$ngUOx3+zC2%g!JfR^f7d^Bm2o)Xe61CRO~H#LDQZ zUtny_3Gyc4Qe;ugLfk9L)$7(?2(E8aNj;b>eyqI#cggfz(V>C)B`Ks8pWA25;KX~Z zvo1_1E8|t2+S5k9cd(2x3(g{;x0DgZUwZz$s>jhL?{OxNCotchg+U^kPAutclFjS< zo3c~JKBOzIx4VHYx2}vs;c%42_Z^uH5hjDa@CN;iWwKZ%pNyG%Clwru&-Od4B-Lt} za>HkW)~7M)STX4nTl#ez%ML^Pwd{K@uP3>nedQFtZIBmx)0u|5MO@u2P~h5Yv36hA zvrZ+@taiY=|Dv#0L0`nEV?@3;TZJ+|qBp@pjmAmLf+TrzcZ|?(tp&q-X8~(9>==`I z6}FdF`up)(PbJY>cjL>Yqwbm24}BE<+f@aM0xzUuX2C}aj(IhZSxAB7rRz_~8eyt@ z{Y~Rh)E>$8Xn1m6*{-0v@R3*Mb#?PVnwBqfJ64}0tgv|n_Ip6R-Y%)5rx@G$ffX&o~^OYxdmAWFAvs~L0~XLanwFTQ zHTr8q`HEBM7jo0)j#W7ZFGU6YJ~1WRlY_L;`ciW0W+KLnn=o5n=8iteQT75JL9%`C zLAOP(GH8OBk@0IT+L8vW^F41v{@3DLw-SpDmvO15<5336l;c{4i^@9CMCD94*@5?{ z@Fc|NO-S!|;J%)a!ECq~rjTV6X#NvzO54fz#Ve;y>Zccuq0@v_w61Lel0w#l!331t zl+=_FPCVdG7h8e6JWaN~U=D?;lAG>pUIcm&l`s`uxYLfR9PzdeKM)1|&GD@}(D zwS-kgQ@qL*_5Iqv-JPZ#INrj5-@8*pg86p4(?cZ|OFgAK)~X&a034rHzjG-s5gE0n05nxNNw z4A*(@g=?h;%Z(__5r^6A(5~f*-e4`pa-BcA?qw*kRc7b1Ej-SoX=2f|v=~d;4)I?h zsSdEc8VLZwl&79qBnHzRSFs2$gN&v%INkf>(70@O6fPt619W}A5{jRDwGg4bLSvS= zIb_CO%W(i^x4GnK=*XrRtem(Rs|AlOjYmjZ;m{=Ju7L&B)#gJJW!5fA^!Re)2P4}| z`TFAohs+G4FdkMC4CNYg1#{~wR#bPR@B~pizKg&J*i4JS#G=n6Nu=u<(9!+V@iWv6 zW{`gD%8_*_HDMQ7Z4fR4(-BhJqR=21vN9KBB}mmWg9(XMWpLp*Irs!|57&wtwGZ<^ z!Fd;8d}oJkY$ZN=Nxm2&**?bCm=sd6op_B3D|oyNTh#LJ8rJ&4zEgdcb(|aRj+Uw0 zpHU8hYm{Nv3cEV=7L+zi2E};t^?e$~Fga-}C>s}uvyyE8)IG@viqaIbW<9r<(7vtr zKka+kv*;$ofByNVP+{%lQ642B8f%qrg!rgpR^au*nkz%brzg$|$*hQCbO#`R_RwH$ z_&2ey!i@7CwUq*E3^PG=Jpbl}IW|x5ia+t0$%#~@_CBJm_>&{of` zgsZ9#oBnn2K6t2;5?qc3tu|A09oF{xU?m*F_QA;RssGxT`gk4UvH@PcIvUEml|3|~ zd8Rl0`!S8jpY3k1(VgVoY}@YW%z7+0n{p01_blJMx`x4b%|6Chr~WomsOP0OD=-V= z^ChA)u&+h@+P6O=g`AslZCaei$C=^DZ%z$vhg+;2PGNrf>17#vBol}$TXl+0&LBLj zfR8bbG4kKWP)tmgMEB7$rXuiH+bDT>;3m{UN@`iltIa|J!QrctH!)KEcs(sTrjU=4 zf`9=VKQCMau`~Jbo~{%@BCZCw3nh39sZlD!HR!9lWrQs!rDeaJE0R}eaxQ)#Euf7x zo|MglwQV)#3p*Wz7NiQGzY?@69n9GAOK5WwLLunwj}(4UWfd&rQ)IR=OU`99xyqdp zV9q@=Gk!}iwjFOaoV5K$FFgpBB7{kxDpqKuW~BFo9)bJsYVaaD+M}@?CiD2)8*?5V zo{xvUX3x5{X_#X&sTDs865xN5d_weGHYxs9R|MXO?y2eF$6{wgODkf~#;}MTj$*FM zw~=@I8IT`XlP|)<9*hX>nOZ*0dPkv1A69!3i1xNiJU363WM)o`t;k*e^%fIU%BuPk z|Iv5S3YFJ|Tnz4m9(Hzx;F-rLE5pRRf$9*~hnI&d@vfm@pJDRfljdBNs5Fw`JYM7B z!4niONzD1^w)DzEl03;~KS{0_LUfdo6gI$u5yH?rLR_Q03l zY`jzPNYvCFuWB6Uisd>D99o;&esPP`3+@mI}Mchx~?fUj#xXVms}5`CW!2IC zP#0?@Q3|y+nb(x+!HGF8{@pYipPPjjvFGa^#fr(s5w8I$-tt<*O%lZ7-f)d_hxQKE zzgVHJ_K_nJ)V$2sTGoJT^0s%sXrK$gh%Q|Fl^t%y{hN?6@?&p+jEe+Z7L~$E?Nj_~ zvh&DlCp9q9#)|lF423XQTFug%y*?Ql#@TJu<+lZ;A=S>*y}%4+g%!VXjDmbHHHJ(S z9(%xXN0EdZlX_IbvApwq5haJY=tGCW!w>9@JhO||PgE$GRO`+L>Nto8AOhb=z!WP< zRi9(30uAUtY)exWk)x5>DQVA(Kx4QA;=SCDU(-s~m6p}s{UyhHA9RmX3rZ=xBdpkL`!rb*F6P?PbB;o-1R+hmqEqsT3$UCx{V!$ zUIpzK);xzFsm}uB`#{bbA2c?^VV{h*tt@GLwSS9Ipbr!8eFJTeH((OQqg2HC@eH${ zLTfhz6v;dbyFW%6j@s1zI!#pY1vFoI6TCigyNz2AAxxD@7^h?CHnb*mx-uhJIu#1+ zYGDWl2JzU^RmBgEsh>CnFy3~NkfW;_3}ajt(XEYgjt&#vCgYEkVu}xH4rNjd)f^p(s^9HQ50DX%E~q*0mN`!%adY&*ct^0>oR{nV`7JpavX z5o0al=IDZrwP`hTT8uw@;5v(lzuP>pGF;2u!s!5$;e>@1kY~}CNY&u(zp`n=8RjHr zH&|OfkGXtU|%Y!RnprX}^qkf!0qiLO4BC6N&fS zD!Ll51eYSER5;HSpCd8*FcF-q>F2iMw8|D{jPW_Ce?z;kNvjy->9*oc zo#H~_5UA{DsodWS>(?&rTBS~C^VO1G+jI7#Bln>8-n;g)GfYKQbgx zqKvI6l*|&cv2c^1{z0AuMAS-y$tkY`*Kl=fpKdFQF{oj>bw3CxSr8JnV^v=c@QQ0r zYK{TG`YI@SJD6ATOsT1Ey8FClQcD%Xt;ev?9?8Ca!m9z7d6hs+Ip*GLUer1quOjp3 zM14NB%8grcc0R+TzBQS1XajK_JB`63h+)+=d~0XfS(}NxRV-$ z(3*$Nis$1YQZ+tS3U;wp8}D(lhZv6rAMY!LIyYi<#NV-#>qUB2rUSoK?pXB>zH9PW zGxnGwJ@48-rUEjWmhPW8c;_0K@ zou}~9LZTImx)N>>lt>CoL7sv}ZM3*FmXk4bT;-+h1P0bKI@!noX;Mne&S>J7O}(EO zR4ijD>0hkVwcL82>%kNV^L+c`T{An4Rka*;Re@VQ-`(1u9qOQc27bHaW z4BrWV@Dm!}Yi-QIFzi(j%wo|CzCvm+tAZN0I|Cnp*M~4Y#H;s7j4pxeX+6*2o|ISo zCPN@dvJ9OQfromU)2^%mB1l{~mJx{g!5XCn>8=-@%jMgaZmx9{+uCcQtNPXbz{-q1 zCn}Ky#Xb6xZK_emZCT%q$$yeZIoEftj?&L-9T?(f-;Mh97x7@yVcJu9Pb)Z$p$!pw z$K=Fw;;sE5St7DPVw;uzSV|_G20&HMP{Uxwf#_wAgdAwyDqIjx+({El*5HYvxxXuL z{pDo&%#*wyW;Xr&xI<-%L>qm5kP^?!pG(CagQ0zWKXcR7wc%UQ$7{b0?u_YPxMwM1 ze+|S=9bpd57EaxMN<#lman#&#=p-Efb+qNyPqEFN?)bJkN@dxk60=#L!Qv7MKzcid zbA*$4?uWYl$j9UV%(MY;*dPwa4Xo^n(%ao zT9%@4oOMb>&w`(bcayuXZ~r^F_qPE9^-Gvs-5lL)fq0|3Wj<;K|IY{BLj>LJ#r^~g z$4Y8B8Wft2WWv1d5#<1ph_qM;W$6~W6#rPqunT4c`)WTMZ!n$^BeS~vU@ra2R8lOd zgOT^f^ace@_>gN^qLMX9qV*Q1$AsSD3klW^1hngqRrX#k^q7r}my7x&}_Is6bpIh5LdXPHUmM0a)r)#AZc5Oa}2UjIX8Ida=i15hz zNQM(+@t}&2ww)@6Q3l+lfo-W<5pDwl@VaYHmJY=R`bq+sJo_xGPKbiY{zu{m({%v(w0jpMz`T6rXEmCzV z(YGlo{()m$TVexJKeVuj?Y&c~Qai+@<4r6-(Ri%d@jhQ2aI{PVy-w&_;q~=M_rhOK z-MW^Yv7c_7+**&{N+|O2OG-9RT8R30O|$Z*Q{bt277ObxvD?l3osNt!Hdl z>F;~&h>gYL)n!=#q6W~@!&odK0~$lJd2)`I+~y+5R*2pj3xa4~F;3afRt%&0g8U3; zIu+&?p$bzob7uBj_S5URX99bkggBUXKn*qSN?6@F_CMts=hIAvx)-w^>2hHy=orW!*^WNJav2E z5a`q1#I;u$yJK+RtuDTq9UvY8Q)5~Awj<*IYG*qs1_EsMvqP=~5!NXGw|MPPpZc}E<3dpYF4@ZCtV?m1(h5BCZ|Um)xm56|gG7L#(!r}wuam0* z7ANmehP}MX%S`(CHj?=~P{JaeRbFB=Si zF#pd+@+3v?N@kvQ?-8&fuFC%~G}<)<93~-NL;V$n!WVr+EQff3= zQbSGfzxGCiX8$*}sYnU*SnZ6Qm0$3u@>&#v`BnTWpAt6#0)ZP-iy~))?(EWsn>gI_JB&Z zv4;SxuDgX^>TC5--*d;-7?G~K#l|joWaHeuYfWT{>PQ0W0nMzn*-B2^g$4Fi_VbPD zB}T1x3$ZsZoEG*g#GaeW?6wNQ+AIG2p1R|M-NcB)g$g?wl7s2 z(F%Z-PiZSeYg%oq(bR4~|K~R#0XjhBCHgdIFBqT7o_v;O)pK%+7V!LxxZdFxM0Z5I zax!sIuJIs6YtzNHEJQXmzX^Md~Hs~{CG~T=mMSIA2n+Ae$t8J-9s6wwf^SXvEZ54=^ym$<`S{5 zeX$L)Nw~h0hm1TH9;^K4E(%U`n`utPK3~%&z3xsT^Yv(hI2ndrZ9rD&ZM^BVX!K|c zQ;p47K8N1BAPY>pSwn{EYM58ao`e*6W1|$qZZyC(gkX=%#Px^e;a^#ShQ$U=XP9PY zW`CZToBxTaLkC={buVe74L-cI4lI+=|GX>u(~Bcq+62}0v;8n}qqJ4pzN=DsnJI|% zZ1GX0#5}vf-yBeGjQ!PQFaMyydv`b9a8W_J@sSh6^RPAs?Q?|a*9mK~bzEWD96~p{to@?k1t(g8*I3@(!&+qVt5Qn^-04 z7fFXwSFZ*hkRw-f!>kuuTJ!`RqCF(YX7};-y#Rj1*Q1WR=cTR2kKaApgotNzZIYBY zm`l7sD?Ye*(lNi?^z$BfcqnSZTY0SnT{q*7!-gwcrERKRz8b)TIs_t$YP1m4v95x} zN3VL9BsH_V1H|*o?jIuZ({mPn`#I0wjz0d==pS|$iPl>_W4&O`o>$>A0fsytR@ux6VK)E7c z1a110l8LU9nm+$8Ib5~kmw8v8mF`ob%g?LR9f!wJu4OUNLHct}m6j<4b(j@?U3zRl z!%df~O!28J)3d&CJ)?Q$MZ2EAc*TP%^DJ{mV+*ycDsqMHg)r<3Rrrr3Rco-}p`0lB zYSG#GzP#Ss0w`>baoF6mVJEpmeN1p}wpE_R7=QZJ|r4<7V8`vpPaoj>Wdvxe@5$f&#ctMl&N z6hRA(ofoD~YX$o@t-}1soTWQ{uMS9?1m#pkY@yfE?@3n?V^vW86Tdy2L``s+tKF%E z8x}qg8|wmX$anz0?JN zgr|)Ob44xk@$;WyAKeqxe+Wd^YqKn;83@+z$S>!xxbJ2!H%FE%^X-&v4ru|E=52L? zS?`Rr5teX4nQaR$XQpX_r^k>?gOiHy_p@K^h!82G^Rp^*lwRBv%%$r%%SOg-F*DK@ zUID5mdTEiVoQV9t}H|){!4a-oQu@{N$|=Gk}UQ& zgZKq%Tch{-7@Hx1(wFRTrMa5Zn zr_7>T_g%0FzCHPrcFerwu>&VY`vb06&o;xFMZG@`X zY+7Vf;DFindqndKA~+O)bM;3*Oiny-E}dN-SW1Z3`rTeBl)bO{P;_szB>X9U{-_e= zrb*zE8qoA!&LGV$7xbG&URt)>s`dhkXOWV+=rSx zzDc*k6M0|N?hX%jnZdAfM(E}r)%*GE1VDPdZWjL8Zh6`v%UUKRfGFI7Q{~I~z!im<0x8scXJ z*>tB%@6UZjhC#Wcv0i%Qz&F#Z$Xf;o@_~-AIaZi`i#{^NhZEK&4OsYuUm)swC_{G1 z$gL;wJQ7{+Ply(yC!Z`L{!YOv2H@rjAHikshbUj1je_z(X^y58cdo8)2-O7qQ&nKU4R@apxHqP4CKk zPakScpO6_KDRO_ABwY0bbzeqUPz-SWs)ghtk4B7`wN2BG9m%Q^nUM}7NG;%w$l8&l z({V9o@#U(geD`W+S67|&Ut60Rw@S3Xb@7gPu=me%*mE&`1H5s{Je?05?W=||UEz-av@_r03;_l`)Sobs%NOoMnK zS?jp>kDk*ZL2>}?ZmFOYfy%sQPu*RewjKK-jaLA8+(J%?S=~ zyL<6^vGFf8ZuUa}Na^?~sPB5)mH>fRrE-L1MZtg>R+uQ}Qy5we2&oMYE{1rJgN=A_ z*>uRkJ=gMj>|B>D3Mc;-${eF&M9F`|@dG(A2m^zzeezIf;C!w?4v_<)P)7OLNgT5( z0Bn?nYNA-zCF3tTpkF_hQJzSEUWaocRt2>oO3T*ZPdx|BekFdi_chBv{C5<-zOJ9dHCW-(H>8efVo=Jm!mM;zgIGRTq`_GWrMC8MG^cXCi`h z=f$*3-n%9KQ&%HkXr<|b8}j_jNY}_2p-nQQd?z9H>S4RQdn<+W?EUH>sNyF=TS$cZ zHGppNE5drOItmLi8&xR+R?SFv(}T&o?f|D4!AK8B2+t%_6D-eO2tuNUY!N^(`9?4N zho&7H#9K>y4ThMs2m1s6%J>}j&<>=3>;_t((R+iy!XO15-6DhV4K3hOe&>qfp~LKb z2y5uPTUxznTtB{mh+RODVkc37elW||AB=37T^CIu41qK^;=tav@p7>X3sN9%^p5Sh z4AT2;BW?Z@!dEt|8Lp#7bx6b^_8IgGaq;p?Xx33A(gP7ZGtgVJuVy|k1{^5P3l)Tr zK-DRjXXpvW>EnA>k*;HkCvdH4r8~?Q zAsKx8SO=dN6JbIPZz z{X@KzLSM>}cbujEiw7vf=OH`D`6EdELh@5mGL(W$?`{5(5ktC+ezU}^&O5PxwhtP3 z07)iX55F{rG#~}NWDx#sB)4$|+%e87I&J*R41cC^Vd$s_#7j4iG=%;Oet!4lO%I;e-gKs<~63dg^ZV)T=ZgwaxFY!Q~o&}i%g-AhhEaEPQcpnW`jKZSI} z$&lLF#`Wv5>2(U3J~GKjn}q&U5HK3BI+*>8c+c}@s@i5OX~e{k*7V)E72@RQ@h=UM z1`~l^W({~8FN3_0jtmGLtTb>NRwPu-E)8L;pBsk;BW$^mRZN=Kb^! z-R5o+B5t_?L0quv7^V;^5$8AE12Qb_`9vFBXRIF*mUnA2@ZsV}1DA&`t)`c49A`}< zY_}Gzap5b&LhDkjSGN!0s4w^W7`P9b-d}TkP95`8MTY2|Ie88>p_FS70IKLjM@#xS z(7u#%yzM&m;TJ?ZaS+rJ)o4){Qm>B7Nt(nuW2E~|An4B)BB~CCzv845ju9_FJQbno zPL@G5goDMx@?UtfBI?{!8fA6FpC(DV#x6fRn%}X|b;eC?-CL?5KI))f9&o|zi&;)} zkZ#<6iIkTc;{pVs!}^J_osj{p42;$Y`P}*=cAnR?+M|l>?NoD0)Zseb0e!4X#8TRP zP4sx$8Vx$bCWyDWHp-=Qk_T&JN}XZHdwz|?z_siXP*|M;=2od++i(De*y8pbHw8|5 zdHKfiPC}d323>xMkcm$}_dwKm0T_b>1C@#cAw&@Ks)~)!0rhWXnC~ zmmq2?#O9*^9Gb~7ilxM&)uCQ1UYBn4=q-#FU=&EaJ7jJX=<8+q9u{xj0CbT!a5$V% zbkBD)KsDgO)l~>MMV;S4!p0)EM z#W^9aDO6-doyt&>BO_V48l+-sR%HB|l7hedc;jl69SvT1lWLU=b3X@^akSXxhYszq zEW1V8r|CNb#LFg21Z>8?S>Pj6LJIR2M$#k#h z8TuU%RXeZy3RcF&*<=2tem}yB+yIKJgcn3SsmLQlgJ`2ko9uO~_X4j~?(MT)mEzCu zyvjOyTAI$=Crb6@<_&r6o4)$6KAOZHA#Rp_z@{D>C5C7 zq|<+|;JMjdmAKS2^XjJSa1fYTVn7~#k;=EZZmq7@t((oD}O~3X=($YaC-QvJ| z{AD+a31pCc9ai38+E~W^9Fy$FE^?T{899t0eFPFYFe7~d%R`=?@&^*uM`)@IL9Na0iFfZ8U6YfIFj~h{InotwA@~hSlL(qFOPTrrO zPxrlq#vvm{SM4Z$`dNI!4C1v!#xZa7zB)x5_^L0Kv1@>WR4Fp+`qY9MaQHYsKI#;sF{HREKGqn_Ja@`=l| zWU@X>>Mo9AJo*H`l@%*vbLt?T-B)GHi~wM`2Y7NXAH`xj&Y2C0JY=y`3u1GQ3ie1L z_KOq=Q_@r5m&dbNfpgUuQ3iGOVj#-F23)K9 zyjEcYnCkrP>Ab(@S5@v`Xg$W$M`vwQMP4!$Blh5anjDR2yr4!Vmh79sAu2R5*#m~68k>FTW*N6GOuv#iiMa#iq7FhfWxDC_>$CRx*NK^XQ z!2oL4NG(ohqT-9-EMT}}>a>8M~|s-OyDXJhGl zS^#z)&`2xe`z7=h&D7}CE&ZJnl!LYZxt))*3WA{OFVEIVt12}(RqwQV zijWZ@GGd2CG!wO1JSmvYMa&@CF{FL+Y8k()stfUUZyo`bdouC_^>}Jy^#d|`jwZ}z z^NnsEI6;B}q$|)V@$&zqjd<>u)@e8R%k4d4jwwP00c?v4O|}4x1$EoDpvNDz)WzJ= zt4e!m{Yt4iq0J6=sb{D}4|~ zLT+ZdC|x%C8>`52pqLbWI;=K};uKUaK3@SJ#y+r>;l!RU`72L(@vwNqRZgdu;RJ#b z%E;2t#38^6QSTbmVUWKgy00w|N16wdZC+2dN-RL^C_57+O%8l#9Sr;URQz+Lh*=c> zA75`B7UlN64AkqvB z3>`x=#Jk6HK6QTI>-|r!>tR3pS$pku-|Jp$@A>;Fz6+QJm=mYrCql+Vo)Z&k798U} z$s6Nd%3uzYFgO7jvdlNo>9{wYM zh4Gl&VHof*!hw=ieS-S7^L${`;2aWgJ{ROP-1zr6=ePlTuu(@HSN$xJ|CBU*`R{V3 zAbl0}BRDJSKG?LKVIc_nc8Fqc3=z@*%*5$mGa&*`+>UmgU@&A-xfC}hf=(TXwe(mO zXAADa*AAb%4iA9?y(NzAvw81cqDXNjBuB>JP6yXWyR~*LE(xmTrXa;M%*jJ8akbI9 zvr+bwaFGAojl*SJLsBzW(qA+SiE5( zkc$N;!4xu)k_?otH;1UDW7fF8&U1woiJdCVECqRDxXVc#O{9;~*}2zWPMn!mC(=9d z8j@PQQV7;+1c`d@*9-L(c-awnvDrlc4N76lY{*mB=6(BwUk{oF$T006Q|Q| z;Zg%0@=cVNtZtS*eQu~xaGtQNO*AW2&U7Y~*% zEI{SLtxG0Uo6;F4}u?oR2sKh-qel?BXPHa<1snw&S`>8W01T}@_PfK#{RdO$#3_7~Pzz92@doGD4 z-!!e2yyrwSWY@Gzay^}iw}O;_!;7!R;(5i7_fGk(=?)+uHAUVtM^4|n-Uqy;kshqJ z7(BTbH6g(>qB@zUKqBe84HMUm4(4w_57#aa4tRur|LSzaAKtFo5G39)C|&V>`fT=; zH!ano;=O8bRk({Vj^vuTRLy9*TAFX!n(_zb>3SEqOz-Q7{SghR!G3z^FFxi9H-`*InftWqNp~4Os+ErOaYYkv5~Bxt=&;8| z@z-V$KTV~uHDb@wc6!i!rP0J)sn2hqElJ|+hg3{_tZRpj)>W6}>Pk1+>{AJ970^;r zshI@GW>YDhcaLTtMeRCRD+HS<-x~BU4>_I&l2!2th);sqB#vezH|5t@NCc6oda=N~(dLKl#*Bj$E1xcCd&K5x zOkEf$CE9>1p`J)SBNHK~!`FintkYZ+MaDt)CSL&pFyn8J8k0Wpy+Rd4Iqe5=R-%lB zj>cW>_;!k@IPLyYOI3uaxvzM+^erdJW=@R8-5FS?Qguz4eQ%Es)8Df~bp8}BPT7VA zQcl@2+z~A&oyy8JofzSo7>?O^BTVYJF=Vqo4bzWZg3^BzH8K_*s(rLCxWt+zY&-k7 z>dK>FgYUDAVx}X1KGP)~#D248JQ2GFf?Ejnkd!ZF^=b)CH*d-ymsf9GNJ63s z#8Bzjb!%U3af&Z?3O0MVFvZ7Flmh>*&Ou}~MT>nL(%mGrpFZB+FQF(y92lYo`+*~=Ukvfe8v%2royNC)aUE-~?J_~YQ@S+y#ks_B z)*Jv`f7m0Z zAIzuOh!;3PM{=;s%pT#9$Q@oMgOqxY?*YO${CM1Y6Qsg=`loZLOyz8&BHsNCR6hEB zWA$`& zCv5#~mNDT7;y!1xx)bbQs<|(Jq;=`y%-7spMIwKfmCCduf4}o#lQ3_?$A8ZsWC%J} z-fl%Ri zRGErp+2oYVj~k7GB5^iG1?qmG3?OJVMfZ0B>(B>tBXWr+3!Td=E3z65sUMv8>%`6U z)97!#0HbpI6&O{>D9klWU6msEaOrXK*dv4G_+38cOGi?oRx0AMJH1uiGFIyEzobID zQY^k@j=DQ!P-!p3*_6qWhz$zKw^c;fw&Qwy?@G5}-;MU?f^Yjpms-k@qILTcwuylA=xMvij0IT>`5xAL3`Pj9n zviEf#C_t^$sq0fYSuWPE4rq0&-)DO+z(vD3XhVg#{nZ}0=!o-;{@ACP=8eH7+}Tme zU&q+3K7~v4tzUNC3DrnypC3aH$R)OV!SI%>ajM%W-0lZt^1m(V8t?^WH{i}V=LBdY zdrsq3s2feGE!nu?-NPE?V)X~aNw;_#*m>U!UhRO3pwt#6%2jASM5>b6Kxf!p$ zWK4ziyyN8>L)0(c<0SqcYgQgmhH@D2i#R16TL{2Q=+Df!Ovdoy zsj#QZ1r#foY05s$s0Zda>F~)a&5{A~RdzA3K4-s%grp%DRaiBs5g-gXNVHl)&p zaV+PsT1NDz1oV{fzNugyRgtKdtxq*!oV(A6Rgt!*>t*e(jA)ooS-jyX`#e!uBC~^& z;)!fRc`Exq93#fM5+_0FQL_&+Q3Ykf^^ZA<)02VsE|3_}PB(_(QR~0_*6WYZriC2# z13+d)Kpz6UKJxOhQM*_6u7piP?jPdW98(@vs$@#h+z7Ie;6WUV7$xVww>9<;%Fr&9 zD^Qpvz^jy>c6TXtZ*UBQ_^hHtGp%M8bujxR5h*5mRUi4XZr^;h+Ul+MgTbJGZ`Lm2 zD#LkKQAY(rk_9BJy@g9&ug-gK1X!lTTA)$p8p3G|wme9_F&hyY=0H2#@EzsS@QK!# zAYdcOfZ^N0C_4AIYiQ&pEqdu{C={1&pHA)V=7^0frBl}Jz1>P~?7r(Y~JA9tELc7In=Ss!_ z33KA9ERKG8@tY}0olv8}b1i|!TEv?n6$8IIXT--t?9VMze4o}Qc;Dy9*wF8@A1_(m ztC@8gVs=?eGk^@zT$OBZKpgjb^zgDz>D_D#%6lfOnD)4J!&$NVxc%TQAS2fTNESIG zH~M9cBmbaWd7)dm=HaFXH5yE|Sr8WCvb)(RIAwmC`(<^|JR@i!`OipZiDWB}pL$*i z)*f7$4W+_N|1qHath=Of`7*`{$$-F8(*tPdh7JZMvcM<{)jdfIlFhToFwPl+PKmHf z->KAiYi3;+MpQ;^__5MOq-n2B#?mHK;krU^w;qM_dhSZ>m9XB!P%AI3Sa`^j=9OG& zJMPHJaK}Ao3_?o}jLI8IG}+a{KKjV&rOCbrmnPXptWy3_vsA`N7V;mTr5nhAH0*(H zVx6m0_*gNLLyH`}&SiBo2~5hapP8R@w!Aia$ZPPUQ+yDmFEvZ1HoFGD$>>s}^MN<% zsLBT^^hTi`cld+sAZ~;|l;N-JOSm z6HKk7jEdFI82@WyiaOP`9=Y2q2ogYbX)d28P-lLrQX%6YBA0$KOD@#{YBu}D)L4(1`9EwVUoP+HR}6ZDtKsc5q-er4+yH&?0Zvnci}n6Re?(eP z#+)yz@l%&*$nw1VBmLBt?2L0I+tmE$xnrz`z)OiTf-MIxi@W-WL7U9PW)$vEto!u$ z)J8O{y2cc|C1^V~F!3@}oiz0eTF|G48-qJ*3k9yAjHbifVe}iJ1Ql5eQTsRMGTWj| zs_?xGqHdc1y%@)_0(Saqf-ai$n>B{T3#_b~RyZrnoZM zAaT`Lap@p&o&C6_fG9DSHMp`4iOlP&_MO60N-J9ns|kNGzhSZ<(Xo%IOrS>tZP z1g1SrCi^w%P_1D}K7Oc341%z{lRTT)_+g8%wHLR8Q*G6NiT2{-wN!ixQTA`#_3%d1 ziECD@@g!!1=?%WW`xbXq)H3jh+8C`fMs0M2mfot4H9knvJZGRyY`8Y@IE!QxOS~~U z&d3NPE>ZdBo`>BVt^061&jtmzXmXvkgmC=U9O5B$Oi~_K6^c`4;zeZiONl0hTOf97 zP_tF)p5hd0Q|0oWu(Ixo&Z|(aVp(^;#SuCAE+woQ&kJdGsrNd*l_z?MA~&f}ok91h z^7UxJ$}orR%Vj$^EJ$^+N+g!m`h&*HgtHo;)~N@A5X=o}dR=Oi_mXI$LG`;4KbdyV z{f-GQHKy0@4%BIThE~n@IPmaPKwQVni?~~W{fHXY&Po8cYZ+k1k`jMy##D{Cl&p|^5!Xa3+Z0tCa>{R z`*9&R>U>xdg-u=P5fz7%?~G41UIs)%Z2*%OK=6?NRhQa>CT1#WJ8Dt8SP~^^{n3jy z;+qQOi7&IWg(6^4Quz3>x!dm!gX?Xqd~736d(V)nisG1+E%RHmV40^9p$4shi48?rfg z*G2@zSs{(Y{?OyO2nl?19Z1EV-^3&9GBt6!=_qR4JzcZAYMPMU)( ziKbDa|002!L$HOs8deatQd!cis{g`NKxoJ#Gsj$iq5*r? z`4Xi&EKaG6N)^m6PJVnicrnPiqMgv(FekMD+o^iOdBfy2eqX0^j8}e94;LZTNLT0l zIBrnOlNq!P^Clkb7sN!+iEuOzoL*`7z41oU6rA#(}mK}Qf+FMq^-Q9B>GUZW#mE5Y66lz&QqoCJ8&UP|G#`- zd?@QdDhM^>?>T;CQ7Y=HHgiR#WH?BL6rKIL`pq?CHGiYuW*ggm!FWYK(~oP?C_U+F z@tCk`b_zq%}KHo<$r$Thvn^O0=2sFhHkZ=uYR>kdMs zX1S)Bpa!TJv%mI;=8ubnd;T+b@!+C?k9Hi70Jk(HTb0t*Z|2zF2De(>rW5 zx^@b=;rQ~{oF#I@5)^s-M;Q!Bl+$JZbXzHVfs1^YddD8L)TCYj({C|`Vm+BKq zYje&YV#xGz%IDaz^fl&5FDehB@^Z2Yqn-Y`1b|y%qehfIx6G_WljZNmV5sF)yT8J-7}ZrA;uh}2&q?8$_xvykO)9iLGs=+5wib4cy-tvfA{&w zg7U0^yVO;z_Zs?Q0?%LVt&He`Ttuz^{w7ZjGSW%p?fS~^?rE?fz-^M~yH_Zu;^9Z! z|7LQXghfp2XM&S7p>_>TF#=l(TpR@PMeG)$b@G*>N#um-NBw@p}L7*UOM8 z%S}n4`OPHy{uYrNNdN)i8b5X8f@aBc+Q{6K-m8It9fV>F1%F0 z@SSsD$|m^pox8*Hr@4>L3vQpJ`WAs!zD4llzy6$a4K1hW$A*pgRJLy5WCjNx{Kvq) z@obw9D9?qEf!b&1?OdmN$5JCQk#2(fWB9H);gua3F2>M{g;DdX-M9T@Imi8LV@aXm1{Jd?1p%v@SUQ8p zW*16cjr{pF=Rqd>To&w=o$0(g>3lZImH{XZ%#RP-^i6(Mw)@TZa=Bm`#? zTJ>#}-e-Pn=RUA%vkd^7a<4)>Y-sk3;T{Ymwa?)m&A?ClRhE8ODf#ZLJ`%QGrXke- z@;E!Mwmhqm+q5Z!!k=+Zb~~yjRy0JmH6~;tc2||t8Bytk zikcBy(UQPaH6(Js_;&xOl+7j-7CxcixxBk7(4VQOR}5;u5tl+_SB}f`FBJq&g3dh4 z06+_KNj3+$R}gp;dF%f@Bf>|_HCqM!!6sBKnWK#*veK7dwthP+tYF4l{EKqBJmcOM97*qwhQ zq-S8hF*tT}GZ4ufsqvGv3G`kd^<-v~~^M6cXmunX_+fQ7E@cEwA6C?0Ol<;tW<127L z@p*KD=2?VwP*ZAv*kx}+YSdQ{duRcR143jHgBC``(<-2Uh#T?SN1(IG*;I5U1+NrR z8O2`o9;v_;OK ze^JTs@Gc|OSS=xaBDEhawf%OY*p;LZU!mwtgVjIzf%TVxXl_H}_S@IwjO-d~UD~yh z)_a**Q}24zQv-=TnLL}yCv-NAxFV}3^l|%;l1NmRsIXHJ+zmaY-D)v%(^*0Yp_VZPH*p^m1>5~jX%l{tLpViw;adVfU z+>5#uUF7VXw~_$Va^A2zV_ay#asDeWo4_`61bD>$&u?u3-D4u9wb#s@blhW=p?C6d z_O7_W_LtWiQ9%}nGjbt9sau=D$=Mtl;$f9!juB{U%qWqo$!@MBgEKLTefFFyFAd{{?{}bjj77F!yRd#@VX%E>B1~%dtgfO z0;yaKN$^T_zgqaXM&W6PrN6i)rZYhx#!l%wt6pS7euId#;KXp zTqDe*S%!Zmam*M^*HU>zObSZrC|L8Ya3F_ZpJsrjLG$VmJOpT8z>rT>J%>0dL_~=3 z(seP<<(va7Rtf`{zj}|Aoef(ME3TAr>&kf!$N%GoE!+sH+_ysUX~Dr@#EYwlG>Q=3 z>R4R$WLAU%_CpD8!(MH>FHzq$Ab7cxOdW3aQ<&IR*^=qYHV0F>eT$U?cz2)X?Y1u0 zQFUo?%UQIa`ecsot$%F&{PVV8l!x<%o1Us;cvmYh>xQ8VPL9r=dJsmWob%y;97p; z6XNjPVr!3~Tr!MoGRJ7i1^DDed@rSL`9zz+L>)yOcqcIP|N1)qoe_^IFFJRR4I5%- zpO0^7ypo7UYus>Ev!@+%sNwxHXlc=Ag0D4E#ym~71_=4AX8$spRHJ+B<8KNyXc>$(RrZ1`7>X_(7o#*cWK1HP*)sri1GVrcN zSHj&|OAvGz{?AI4lWd0JRh0Z6DoUyvjmU3=!sOk5+{?$n(+uQAnPB*f9B7CZ_PJ6& zH2O-v!(;+m+y$|KCJ&{P&5E2k>H0NYPsn(OE@%4p?#xy3RK<6Yh!cviNWXSi>U3n- zz2;_K1v8Iis>=m-VY{MS8_OsDPl0dnu{^-q~ImjXPUe#3L!Z+O=I z8=ftL`r|y{hpXdt2K^@uTb;Km@K}HI2VV0IY*(J}gO2~4+tejmuG5P!2DMfhxg29z z!ox@HW7#}{4r5(Uc>ba@(tl&M7%Mzujn@0c&HY%0TmH)VCh;}`^AEvRP5Gg*2|90H z=0?>s+WTtR>4ugarZUvo0aWlFX8EsRK0xYN-V&iCOC!?(R{-^Ud@GeDLE5d|W^=ol zJ~PW0eE;&@5Uv?eQnd)dx8}=Tv8=S7HvxAaq4~1!k2(x=(f(sCTwSQA8Nc80(xaIU z#uEWM8gFb=f0DZM2*WK8Wy=_{hAd6|aDNA`ddczQ$=J-$CeNS0+vXVR*6>URtfap3NUfznY!q2Gs)Q4PD znK*Z}gMdSvpj`f6R0n^2caz0!FQ|VMoPTJn`#z`AwG!_R;Y?a}=(EpmPa3ZQkT6}j8!*yWOK=!u1 zo@A374_YE5Mk$9qPVInk?vs3!QMqb%|LiLvy$*HGDTEH2-haW?JH{xsk~8$u|Ez1) z&#h=E@Q%fcY`1q?Uct5X``2jr{YBApvFpI&2)Rf$er7B8MeZNi>eVOub^JcG!XP*J zzw3})u=hUXH$60*jd+qRUbS)n#&H@{<3Dv1U~4_829^&XX>+dY4@e3*xq-IIrqkS} zT4j(c{pUD;Z%`MNrEZL(RjczT!!4KQ@N*Qp-Q0-m1J%zEPI}Sn%yQKz3dgDyLQ&6# z0(_dat)|V)9Er*ran?I_#i!CcSU@p#;Qh zd?;g|!@iNjc;UM4Sb^xnj>&~ry0zmG2jjNI=g-aHEREj7 zUO`+n?bbIE$(vq^VE*9r|0b6vnb)h1r4FNw*GaI03CH^LY&umo=VlKMY-}joSdzn2 z^V;uAstGMz`*L(Cr{E7_bWc2;J7 zYa#ReDDyyOt)xkIjzfO8U#Z@8(`Uw~80nhJIa>4cd&cfy5^|T0e6=j|)Q)V*XXvYW zHMpGT_~d1@)S@bXnp2~r2e9ok@Ja^F{YjU;%7MOL$U0FZ`t9o(+_c9g2uSC$MAlYv zTLDzQ&L$s@Ivr})_oeM=^VWhCJi9W5OYF*e?r3^;s2gKvRy>o8+_!nZNf>pMzEcfh z+R%(nv;*7W(+#Nm#{yUyv} z>ZnQ0j2{k$jrKs~wo%tDhw2r1_1Hq~&rc7|uQVO+7Ra9tBX0>BZTMnjHs8ZNLfPFV z%YhTjb?juGpLq25F(PIOIo9{{uN{?5t{NYBhci!eBI;|-PdCp8@k?OjF||iAZk`F- zml7s%JSrnhOC|0-17eJMNin9|X)=BOPU&^FF_*yx_NJL-QrIEn|l0#Ym~J5VVIsg!6$=YJNlbe z%ITxJES4Yx0}qGgA_q(68uELYvn70jr;`i!&|a2d3Df92yyjF%*aKSol9*pya+~U> zDP#AK6jm%JqaDi$1(_V4We7H495R^aRHo}mw~YfO_IfsGyp@{2N98 zCx!NCY0@r}BCw*UyP=26XSgNDy}j%_$VYaV08;KQY6WjcrkYY|bYnkb3~lDD6}_pkR&p|$~x&j8-d^1nHyAP2~|C2f~___E~- zDziQhoIQ88N!$I(P!3X!S`C`$1)XfsVuuI&A7lOhYTEF&{`);_x)ev4*aGDh^z0iLQOZ(Ijp_#UstzRfr$lWmN~IZf-}BFAAgOVH4sTFH z_yayID}*-K%Mi{+18uLJD9OKa>uavVy1$^Gixkn)~+rS4mvarQd@D`XgLCrhAO zjFdc_sAonqS>l##X^ZvBTCLm}KzoMnA532!SMZ0Nok*f{VwJeN4<0bGa9s0gUh5OO z=X{37M0w6^rN$ZJ#z+0S1Bf{!w*z*J+{Y}GOg?ZiW;%L#g|#ilT)vUI)bb}Gp!cMl z2qa=_w*q#zUBgT&Xn*^Asvcd*|7tVzFb&J9n{VR!m12TsZDpUMh zQuvF!Z@z6qkcz_3PB?clIoHms7)Y7OZ6VVmfxnGJ-712+w~4wUf+jCRqSzMqXwHbx z1PyftVHV_x+;-&K=j-3O+WMYWj9I3-`D|2UB!0tvF64CSd_!FvU3&ErjkijBgd+8m z))&T*jSb*TmtKc3I`8cfidTp?%mgQU`CEsLd6;-7)Bh_)|BGYj$}+s&T2$Y)^NBT#r-MWxb)s&(tKd=vb zW72Zw>wNlhgoEzg-)4H_LUyfDrV+m*zk$a;^+PsuyjCV+?mInJM{iFlg73Mk%%dSS zcv{ z2E&G1F2ipay? zA5K_6ExorDTl_JXq}!%d(3CR~axO1~9_MmV^hwz1(aOkdai3w3{j#(;amL*r=ui}@o^|~$ zg}8}t=Qsd5M${7~D*cQ(8hth$_b7;{EfKJ<4Ie%pb?2A>NxAOVol9{luSdR*8P6yn z^}?K#8M*GPLPZs?{H^HyD>kF}<;X6&bM7uFPF4_}GNTS1=}0v$_-7Fc^A_fA<-TD} zEYzrO5q5B%=ZThl@l0S=imM(9=-B?0A8y@oI?0`OTh7G9a_jk6+X)p#3O&mH(gqn9 zV{oM7c)869o**9Dn&8H_K^8c8DzAKa4V*+@yFGp_H;@-$9IseKe!2VJ{>Xgff?l8Z z&$>pD6O-W%J)h0G%CYWgS3!*>)SjXP?F*w~`4TU!ezJEf(^=hAy2JJ5Ft6_W(a__i z+X|B+vVcPSx))14?8sb@>htO)$U!0@*m*f{FM|7sVQ^F6)N53dhlBaCmugp!-_W_r^<2gaU!747QfZF zAu6V7Mi*D4EOO+=bu!nYYERc4{oC}f@B#zkk&SrHVY$J3| zvY4l6bGqGdt`zZEd`dDNvzyNEP%10ld-l|M<1;INal=kt$4;}ye0#H$NA1KErIl`A z-2@Zptx*s6mNGl|5^9FmfLD8LJ%1_BjCIp= z*8|*&Inuevs$R73bLY*ZD!~!8iN30aQrG$8-m>+GuEUOA9+*YGkU8 z6vr-65+}Vgj!Jt4|9h99Cg!|@*$gaDE(`nAzGF`|`>)wlRf1uT&pyau3xrlB)*`xM zmeq&k`fhZ{reU-du*9g4_b5WW^4-hzhjc1^TRa8!Kk54@#r)2G^~JbqIL@LPFjBowR8%~@|pJL``{ugwhme1J{LKg({d#* zHUqkify#BmmLnuoaWOSX_9XqG6oe*vhGi!rryg-9dIwsn`6q^)XN<@$PI7NLs?Xcq zPr?v3K;ZV7qQ)89zEf@_@raeAuVP4Ks!Fzaf@n%|ZhT|3`lnok3l%)7)1|r03jBzc zs}amS%D;Z*bmQQJDGewhj8q^C%b1#bC*0>!CmWhqRGV?U+A5`)ZpbAvZXR@J%(4D- zdS*@MfNdF_0?q%@x4)N)n4a}&Y<9yX`dlf1l^WGzEGDG-bW(OQECt7|nu`_Mwuu+9 zCfd|EE2oq{%dDpX89j+kfj*5dey>fcY&*5b5s6>1R;*zza?5C8&9*so z(n6($Hr(RKWkyF{;!8az3A?v34?@?Ng)VMYIiyT?HaH}1`~nxpkyk(uIr~+|#NMtu z(Xb~S5;{Gz;R)0Gv(%1q5kAk_Z*Xx~;m8vpl%9D46rqj`omf%>j8&TKN51w-O@kwY z(dX@}iqT{pnT&@Q-|QG-(9{;P(&k2ClJ!jQ9~r)lwke-Kn~W)~3h{+OZ8xbiZ(>!8 zbwjE);<$>wLea~{JF;bTy-GK!nHF>%EM7-D7G1BG^g2EY#Jw*_fts-Y5?4+ueXGs? z^Wyc;m-cfXR-PbxpHUtxd3SD1rxzG*XzH~balgSmy|)~zi5u+D_Ulc!ch-1y!z@C$ zLh|fRWp&T${+LzfCcHN)RQ%jIcGg3=>b10$w6om7Cl0xbDKv`3^|hciaJ$%V?+YEe zg3AARD6>_5H=8O7;(xL|zkbVhH&!h(2U{sDdVR`o#GYEfc(#^VRr9Kag4UGSP=1tTLYIvSDCLwHe7a zFV`24VK7X!y!|X0jaRgAYBp?lnS9jUHHf3cZ0)Hoq}*uVLe%|1=Fzv&@em_(+j8|* zFRz#$S2^cKG{*OcDLLGLe(rdD2sR{m2k!6yBg^e5owd1o;MyW*m1^*$bbr6H{!}nV zW~0jF-nrcB1uD-sJ0G{3o4!xV!@5d;Jy2pC=7S_ScYYSxCGdX8*m8<-$;3^LCc`FS z2UGPdcOobs!9&eq-{N*lC#cXEEnyj9&GmPqr6d0E&t0;bGg@Z_@VuFLkHu@yiRkqO z)*0#?2P4&qyq>fNX{)1aD|b^Z{Ol^d=lKt5&J@yo!*3Pk7KihsK+*@IH$v+NHfOHP z`7WbXn{CuF))S`{2uHG%4uwQ-D0|~R|>y>K!IMRl; zHK`qh9K`zGn~)OiipSUxNG~9lO1$3}V`XOQFdCno)|X^aMI9S7qfQS;6EaSV-P2MOvR~WvEdznmxa`xu7_dRFI_YYx#+)XkMMcSSL=Eu@gGxh26a;7kKgKu~#)A8pCnSIcb;A zSVuI`_VToYV_l|rGlI2~KNC5#VMB~@^CvEZ`6iN`CoJR#+) z7z5i-ntbLRB~P=rT!cg|0^Zj-w=A#l^URGe7n>XpCQWm#*bf`)5B2RWe|D;+E+cI^ z9E__FFRN4;J~9{m`i-!CTOe>y>rr4f6|r8?uCwX)M^`uo=TCzY#aD4ah3;FK~35qdbU%#o7iRwJMkFwMd=|9hPv^ed-1h$RrZ*u{>+Jx=ij$77}$?u!#D4|Zp8nO-qD?!anvRB6aCO*5*ZZ$C3^rONNvlGVxV z>}_``uXLD8zTm1E`QWQv`?=U%Dm} zx#>5%_1@f^CF1EE&Udcd5G;J4`0?`=iov*C$LsHh6XyT^l+sT%L(`WaQ5R~^Z1r8&%+II|4R zQ$L+I<(|R7A$Mj3amji}OyHZ>W%DFadU@}7kwnRfVkHU*>GDi|@B0U2LW>?zPcJng zGn_x(l8bj6WAxx7Wi8dTP54$~W)ow1y@bg=pN&H_)kxfDF}RaFGdvH*L7qgsyRg89 z>RlZ_j_ks@+R5*1wo+tNK0AE#MFscJ_aoQJ_!|MxX}I>l#Bed)S+_=qtgC9$itex_ zB_qi!y2IQ}F+U=x0hho4r^>+K*Qo>R+H^>AFd9{s>Fj$n>xEt15vM%v9Q3H`n1d@w z^d@fVQ_q%GsVogj81!3^nAEE%r$K1sZ4}5Tv^y=|74oHgX8NX|s$@?R-c8BvhPPcJN8+3xnHZPRA33FQ(6!5qu82k6k5gsiIC{HU zMDMc3M%FGD(uJ_=L3$$QzeTk9-jCgpE$wPqvQ%CWUx(S%?fsUU$ig~(QC!iJwU-EXP|B=reVUJvKa)Xu`t9WL z%Y_^7=Cj_|7F;|@ED9)KRw4*7qZViH%s-!6e?vei$>+M?_{;n0FAvdNp_S>#*aAbN z4in2SR0Q{e5|BH^yfMCL9tb1spxen+-e)%#(gWSgPmMu<$w3uT*4 z#W~}x3x1jB7{Qy-R2YwzZQVilO(R6ZXXy82x4F*~fqsn)1ugbXb^KcOClu})hjhZ$ z*=F`M@#guB-Z3ecU)c7fwB73Ezup}A?fWelhCH<@R0#L<#k$7K(GI=s%lkzQTtAgQ zTGKgqUh6%E#5*&KM2UInC5U?(OK8TJ?&xcGelK$SI*;E^{$gpvgs8$^!0OYXh$;7p zj(X9$RlWJ04eHU98*$`QNRy?*gC4AYML*1WJziae`Fy0<@AldB0n+1zyTsstE)#vD z?Y%ZyD%+9r^u18>cMUIe3#+-0={n{cT89w9^=lq= zXKFsyc%;glS+)u&HN&y@Hok;{lH90G(qia><%4Co`o4B@L8J|zrqoMsRL%Dy+vGOP z>P+!E|4`=Hu7^#6+`;6Iwr+LjGfSgZ6 zRCCKMe%dvHcO}v!^*t3Um$UyyRLp(34yOY_L`?3-%}s1T3w2sF#6WDeyh=EFBJeEJ zacjDg#+cIOhAG2P`eidaknXFSw_cX_Bi|eLYygkigzm#Pj4;K{Gx85!?%m0%4D1#)Ru^gQ_mhWm`B7BX%UJS zSWYY|d5*M2TIFC!7Iv<*kX=qINiyrkYFwQwP~SPMo!%=FCAqkr`>A*aisqu)exd4E zLvzJjxjt5-Y^sSnvCsS{gDLvFUeQYQ^6R~52IHH-_$tX5KT)B4jNi!@V%gaXS5>@+ zdQ{y(m2%WJ0Z^?2B?ZsAyq~EK;t{V)T8vVszo+x?On^d{|3>}!8APY;#_W!HuEZ4g zgJY!LQ3(z0!Mz&aH+fW>L+M4EkVu33+apAI9u04X<|-r|$UZ!u#7PElJ>P%vqrHLW zdQ8EC2SvOGRc&(avglZ)=?7FnyJz^q*$tP0hx6ak+g7N6Jg?T4Opgi%wJ>?8bc5;~ z3&vY&9o!?Fo;(soxt&1b52H37eUOa$p5L$j+9g0WBT{81f`p6|KANk6p2QdpYtO`o zyek|+R&`mVh}dw7*PQdkcXd^CC*2aNDxBq`;N7##TlfGnUpXpJJ*@mP58EGWOSsobKJHm779`W5?CXn8Vqy~obrv|xZDq2UG}HpRuHPnvTBLZQ`aU^{1Kr;I$3|b9ub`MXcYn#^;N$n- zrLg{ihNPeP<;oG>x3|CPURgWUGlBUnS!u#nv@64p@_6NV+LB z8~nlW%bJS(9P5bX;{v+nZsk=3lrg_dc(I@(e(M8jkKHsTWHD-Aa8U~ z`+oZom%K0N0&t)EUJSE$bn#AUP`8aZf*Gi@`1<#gS?vVW-xI!r`tJMxvGvwbQMO^* zuZj{_$e_d!N;61<2#AG9NsDynFiIn>NW&-~phzPfQZjUR4&6f!HSk^Yyla1Z zt#|LgU2E{Z?<CHEwkoMt!muRltt$|eSmqg1hHn@F%o#j(6NK+_I zFs#sybB4|<2oP3c-+i(LO%~KC$xVPk@BcL%{y%S@ z&VSpN!-cGMD)RYhwcBvndLcEq>io{d&7Y z7kQjqFu%{F0?RiroqOjvn@dqZT~szEIepFX@c(OhdGa9e_sQ5r%9HfI|$ZToy)P{v`pl#L&{q+^BJi0@^ z=F;JAbb0XW`-1UjUjlBc);%=iYlg*~_IJNrSU#`)>wW=Qn8dQt1DDMIcKd=y7i#i0 zS^2Cs#lkGzAZH`d)dFgzjWtDtMg%ONsHi0g)NLdIWG2hvG5gV;pk~`3_~h46yS_wc z`_~}HuWxT>LX3hE)a$xAh6mfBO~eCTFBhtXnhU}Zl9Xe>MRV=6|MCCdgPTC6{T1RJ zCZT8bpfW-`;Z?*R^Z~Sky_aV6%Ef z;Mc%w(3%R{l~}bYBG*}3=4Lm!3u9>l>#JQ* ztvG?O001@OF>H9@#oJ}Q&yBmS-~((bL^(|ANQ@3rZB5S6gZ}|}n4e&fJJ}T8UXpqD zyI`Co~v(rWd0!vp^-~!SZ?v!<)9o5njf(6%B4- zSma*+gSh!D7m8Sd31o4W`9_=nE`TI6(m-GZ>^?ibYAx85GMfV2Ho zEo4<<`n1bli~^O!LT{lEJqu#LukP}6a+cZBZaRJKimtJJw?%pV{ts9L^_&)v9go10 z9245$hF<=G?Z`IM4M9CTE?x4wQvSoJB42x_xidj*M(@mI_9$8^NLp~=GAGY4Y~12_ zufj}~OLe0jq>xx!152bV0eh!@3VDGS108|Znt+XHG_jT0xl=0&XwpUmYl0EANzJ_w z>@>pjw~J@DbDA@AF)#_#xt#$El9jUr@}Ir$Uh+fmRq z7%}utz3Crm6kOOwOGFKtskHzN?EG;&aO)ruZi9W);1YMlCJU@WleMreA9HLi4xShx zvHh25W{loQSW03S%~{W^c-T*P$zARGjQ^D=z@?I#Xp=k>+hIv&9?irT=yDw51TkiW zqjiX*f|Y#U54a!D-vkHyu=OMiKFgo3{Pp(oeX)6U2sNXe_7+KS!qDz+#LPW`xk*Vi3?wzIb;p$gHTW(dzMRtXxF9ozSKPwyGBdU=Qb3A@;ny%0HXVmo&L zf92vBv~yFbn^S1jimQX6zVZ-?UunfX@Y9;hjMp2z?N*j5L0>Au`CEf9`tX@Qa5ZCS zO{vY&`>I@AN$(ou=*oD61nA! zVv3T?zCf;kcXW+@+Y0R+aO7fYbY`N4yIrO_Un?J*k^GMiNh1)E&E~l!7+TEVerhN# zkZ-*l%(47uyTwn|cnTU2<2yOhgU6d z>?L3oQ=jmad*auPWI6KEqBBKU4{}r-(`%Qtpn7(di}k>OW>^5MXQCaxyKT^@dNA)( z7^I~l;m*^9TG&UX$yws4Evb65_o1TI(fr3dQOL;$wQNRbbMzXo-p!Mr?&{uYu!N|k z%m#9>w$5K`queGo6Sp*=f3^_DRi$Y-@EJ-gaeiZ*KRAz#c5z1Gt0zNcLR&MDJRLLP z{RQF5GXr6CR1}rUXjgf@R0gG;J2wN%9%R7k%tFn<9jDSjykbDS?gBq^!BRi#N1jx9 zCK5dZ;;fD@kdmNmp5~UTH??+x@XS+`yI~000BZeCPNs<0cWOJ5n%;@zs;NDW?KG6P ztcSRI6{%Fy8+sV$Zt~8hhY8%Khour;7S|XMCAJtOPl>$N$+`(n&>i5l^p@Z7F6IMa6UC{+XkHV%&ynE)nd_1+ieH zer~(Fwxt)RS~T(nbGFxm>OEz6tA8J11Xt%e>U^lMMJG(>H*3LMSE7NQ37+(#S%~96 z(iGdO8q(5;R(QWae>2*n8mbRYSbVu;ykOF9zFjz5k+NKtYE-t}(ik@37VDS?xvnt= zf+m7N7rtjZtryc2nT%6y+haYxasE|Y`@U0zPB`P5Mmr%VM{tt!S}dYqXz*(ThHzb0 zsN%EY;e*J#Be5}?V)e&euLkfCdkgIox3y17E9+}H!J(H&+0M6vUnwAiptlGXRc=x% zbjP@ri1I?cCAvH%YV!65v+nP@f1O(!m+&v;j!@vDjV$IUZV7R62P}0MidoLsMa1@eJiF~hzQTAV-^`po-i6_OICkiQqD}63< zG9o46Yvyw;4@&O)Kh1_SnGws_{9B((Y22^yLdyoc?tl1GAXr3}IwtiVCc>>a&hf7N z%m4|H*znBjZTv5jC`f;rOU4{dinl&{fKZ+>#-%|T4U0B)m`o{#||3fYVMZN!rr|p`=b7=G2UI5FBOaC9#q9u>GL zpGMP|mW(-g`7JOuxs)GOsHdt4T0@XFt|zzX(Dr`oIl6wuNci=kag!f1nBHNMtdU6y z32cI#Pub1rb=U6?=+B;f_)H%weW<%tNn z%bgvh>ikUVurl5<$fE&reEaH+@ONq#aopWnp4M8gS;M@YrKWH0CedY;Xu1__b<|d* z3FlGm_@Og*b5vy3O4*6%@i^p#JIq+!;{jvjMn4eoHamc6g zU!1MKgNNnjoHY$G5o`I0{TZ*kA!{Rv^f#ni=_%3MzGOaaNdqEK#) z=HOWSYR5c1#_BuIG;0~V=e%oFe_oOINcD8!${jt+7P^nTPbekl zl3S*wyM4!UTS?e_wzXu6@v|hd;y<_Eq;vWLx!*S%zbZ~G{cGX1gn75$m$Dx^!z~6d zGhuO^+ui!C%;|f~13(9Tc~8?Qde{^6^j%#rTmD5`r5YbY;_q_W{YU9pmQ#DT*i&Tk z$M}QNFZ`D;S53qT>iRV;xoi#~1HrYR?d!(V=tAeND&!)skyYhE6S>YXxjN{U+IdCQ ze)Q%HE{(l>SVixRxuEIcWc4+$kq(pt`ySKg*Sc1l6Eh-2)k1kQae^w3ULZwM;kRV8 zAPOy3+;AFL*t$_HjzDukkl4viBFv)Yst>(?K)mLJ<(JiU6SCBo%Kn#p8l5@-F(mOV z;$}UA1>bE9<*`4D=5JDL=U-3l+a;pTEi*yvVul|Sj-sRUNoP3CxJ%q_GVb(ANZeNJ zS6QnL&>vt93tWSq%ClccI&K1Q$4qGidfM2vywrnZDqYg{ z*RNOAoNiSYM9Pgu#fXxeF{8 z#$dzUIF7$@*oMgqU(stlb6J-DIHIba{iH=}%cE85yax!+FU!`xa=0WJEJ)cw`bnzP zE=GAytVLfi=(SCI6|K)g>OR+gEf2lw8*MP09sSC;VK$6y-=%ZrT??aw>*fqQW{S7@ z$?npnRHbHnwsht%G=^F{l-%@9-TYj1U$!Hm7?})koQNaG{5fygNK&D5zV>5*nZf5D zj)enFygQdrQn)mR!e%|!+)*w{`9<|>!10cSwFC#t;5>E5O_!_x{Jslj0z;gzRVfoUV>~*-w{Lp-hybk%s))Q1rdYU zhr$khb^Z5(wS9(DtIU4?iD&dQZkHvE8i=Bl(-ij%(w4a{LTbVnb5qhP=)!fRcFWZW zUz#nm*`>nbI>;z@zZ>^?5LhPM4uR{?{qe>O*DvQXoItHPZN8Ev1b?&aW7@*`Tj@6F z&2dxs!8A#fu!P{^7qR8Crz6o(ZVzW4oXTfQOk@YT92_wcOvi3h;1G4r%Z$Iazh}yJ zI@%0vTPe&l#eAPYQh46;gDl^Z!jJeKJB2qC$o*Mo9Q3lOcU5Iu39I|f#*^XOY}jjm zyh4O%e$K)%>hjfBH}1RrO2_^y&vt`@#WRji>;L= zOU7`-y53CE$~@wcGCs=aDgs#HQD@WDvO>#zuAL6pFp-G4_X= zxR>puHyHB1WQ)x%+fR*#hFS?*8NmUwrY z6CEg2eOUQLyVJNTY@EHCRHqz&KxRzQ|J1~IIASmUJHIsV~Cen zH%lmb9e|_I7bC;!yg4#4u7nsWKO=eTvvghY70LWN23<~d5f9R^yJWe*3ctQ?gRBSn ze|T`;H6`T`9+8Ytv-6jverQIa_bK!W?LXgZm%5xIc{_m|cS?8UkL++9AD*IdHNDIw@YXjuK|ATpeN z%A!MGi{*|^Ir(u1gbVE&ZE(=w;H58W)Y!pODR$8L;m+O~ZQ?_sj-x8rK`uX|`GK{A zN!;Vw_NH+D;_vvFk-B&baS9QJwNwo8!j(3isPMa-*t9?X(k+}U-47YkQ5G+w{ePy} z_1;?elsWx@o;xMCcBqGqVkqX_(sy?aBJF1h6HAHQ# z-JfV)azvl7;Zg5{;wgPco~P}`;=CqpiATJ8w)lSIox3G0O{^jTy;v5%iq5%Qr*`eY zPn@G_Kbb{4*kyk=u{sCa8tBu%kwGjYzz&l7a1-i^QUsfN^XRC9hwDC z{c)}J`K>9t@-5HQwUsq-wLAVZ#k+m=GPEm2$|$ENR8GB^Tl#L(rc^L|T!m-3-$<0C zwCHqyU(V>V+viBKY@;=2?tqam&lD3`hK6l^LsNVz8BN>_;b+`38`qP+osYt*q@OqD zYH5m|PLh}ph@SA*CQ?F95+R1>dTjwXUJd|Q2n}Sfp`dTFF!)8oXL<3-8mNreDsYE7 zjtQ1M!?1b$6G_`SA?Uj~z;iA04&;ZPN8G$uta2+h(eZ)TkhZJG)yr*t-xj5@#oA(XhsbZ4tgHM&ii76i>RR+ewO)6tOHOZmlvxyWyYyXj6z}{J<|pByc5!5d6i$yuWDw#3U^IDOMc>p#AM1>O96?LK`Gh`XQe+9A6dod zD?bN5rp?8enq6_I+8%pAE|XcHsc24{uU~i{iRMQ;_UbhQFSD707+%E>MA?=hsbc~- z#d2|e^Il>y)Ua{$k3PG@KNB{8zrQEJC&6>oC70piRmUG96A&YIA*J3A9wpusLQk!M z%fK1yDYpJ%SpkWp6`l2qHVUAs7jikiJg4`}pN z;{`7{Ni$+xSvEiRu7259l92v>LjVhJ>_}s;ap7xVU8UVc-z5euq1NVYw?_H!!7KyNSOZj%`NaVTE+>DV?OaaQH1|)g z?Tph`;}3^Vp&Rw5Zog%VC(fwx#azb1&m>emhKky5h_-*ZR;P&9BvBvPhk5dGW6bTN z4c!JFTKXs6FkDDAq?7`T1e$1K5z{@6nwv?+^5QdvEp&P{lHofOsIvtqaudWyPFx{V zGj>3|og-M{%L&4#RQT#^hRMyQZOtX0u5DrBlxrlGrR`7eNPr$5pPBjPJB!$bEEu9Q z1wQtDr{N{;dvbgAhT*@#--Tm}EHiNfPs^C>KuA)I66(0uD!n9RPaeEkpn{qLHval@ zAnMi0Y%R~s!Cf>{wdz75sL&qwI@qfM;=gl;@MO=9t5VGeayhL@_7vVPaV0|A@{trDqS?GuqrR$1{W6V= z7!cXZ5s1A!rjpWtsHWbGI%0a=r?R+p`}F6xf*gC#UYI}SGH>qXkYWwx8jCBEbF4Hz zdiWcCiBzgiYbfC-qU-)|`_yqTmWm*`YmIGWS^(nl%Jp&2N~AAJ@R94J`-RPAgCDf} z>N0EI<0w1?&WJG&iya$x@uDmnPfP1JT}=Glx#r@x9aQsRqhm&e4QUDKnPD%tFb%~= z&jkCt1F6qGWCwy##JjN03dMXRS-`a1WWk6KgZ>u8!!q?^l~DUr6)mLQD$@RAZw zsqVP?agqJFf2zDPMK7Po&X1e;>D}u%Kbv(T7sX^Naw6C!C)E*UCYl}9T`ZTTS-5PI z1kQ7&O$XYzMZB#bXc3pkvwdV63_SV3hc#U}CMq zW|y4Dfi@9m)n}1$5v8u}?n^*Y1Mze>G^1gVMgH4&L#;bj0$(U zFdZBVstBHODC@!)dW;$eBlbZqWVtmTR7{gNhR@NkVsX+%WvZ0`Z+Si%!G!>kA3g1u zH1U`6)DZQ>Ormjp*0nl&HUE8Lz44gHd){?78$+OEoGDep141K;`x5R48*d_I{(aR% z4k)|Og}$QN3|b+}uHRz9>?t;RIR>bs64Xu^YHkogI&3@L?m**Q9dg=T>+3{GC1e{# z12-5>;I|~c1WON9C%(Xmvsfs2#BjQzjwM@XZMg$<>g5CvRH{+~=wgl>-3}?>q96C*O9P#%oY)H z=soEM0u;O6=Y*6>7<;;X7<~5wK}e3X>?JdQnERf6*^sjR$@N|t^QZZ|Up)y8Q-e0E zuwjP#=@$`YhhjB*rk5_V+52Z|akW@{48uyUimjr(J~{J%JJF-VAb}Fz{3wcCk%R0D z&&Sz43-mG+0RsY{_m;;PX_-KMU5wVeev|<#*ONH8Ha#!1c;E0Fm?4YEuT%H|@`J`8 zs}lGVC6A#%uV*lu*oN|tp>@rzKfm0plRxFViP?mwt~P!lIcyksC|X25(l?VbQEOq6 z6%aq2Q*YdA!BKP2Ki(O=UYqsCLXd?AChy!t2-1s5oNYHn%|6O|xaSvGKzsdhTClZF>+ek~EA_~d~L zN^tm~{O3@j@xiC?%g|ueWW0Pn)Z*N)qW;wAe9=gg^3I`1)Y18R{kgS??F7tsCoB~E z_RYl-Q<(Po4v_fPD8;J!A{HVt*?BC6Vyz$mRLV$mQ-p!y=B{}v|BZHSeN7LAPB+0z z{tj4!#tx5P$s<}q<_Oj1r;Nf>P96W5xy|s=Ph&GrUienc0BU@kKBF_LR02o z5bmd}0&zzuNeM2E11K&;GbW#=J9$g4o31-xyNbj$Niq0&G9~5*2_j&mD6t7>K+a>- zZkHvraT3w}2dzB*?V$iU1>uB01_?ZfXP9MJ(fdI|cyJ%7qCCoNKe zk@?oft^r{XbI#pO*bO`5iQFW$v~hgxrb+{O4NS%IjI1&+!^rPdAg*i{G| zh>TYJydE-?!y@rdmrw5dsjtwbrdxL>Q)6ECj5D-t?Wu_eTEEwk9J*$-T$kDbr8EKO z=DL#yN33pqbeP&kb?XD&;>639CJ(Bjf|tV`5-uQAd&%(QeLSfB6pL{X&+^-{!DWHt zpo^zvX|zG5JteTaF-JGN=fg9vD0H*}OZ-YszhE7Obg*1zAEwjGp}5=h=|Y>JWoy~P zy#;0~1|8ygG{G(kPBs_k7t2B@Hd+c_Zgd!{A#+Jq_l8+?>2tqK4({D{Ysx!h1;xvz zJS=hF=b4?yE(ia^B!CW`8SN`V%){{arsi|A3{Se7g%th?wr5yx zTaah!PI0{2b&W#jyD2og6O17xn4|fqi;Q!tyl)L!jo;8C+$$OsaRLayV+bmB@ELc6 zgy-%4k}~U%VIrkzWxlM?EtEw{uk2*R`XvV9$yvf2dSZOkmGs`UDl4xulbsn|;&i95 zy%W-5te|L7?~;E}-ie^^jBb+arCAuN&7~i4oVx``IOI1EF+dBSZ0~r}x88`{>LN{0Dr zIi6!^b#j$Eo#8mUmM``oCvRajTAGM1caLGvaEU z`gLLqa#d~|7P+5n2m%9l#CB)HPbutg7*gp&m;Oczu-vgU>*{qV4ksfDq7af4NyIEZ z5Et|mdfNE;i8HIk>}0m2aR_jMICEHdFghHdY-4O=jVF|(><8r#Rwlyi`uzc{2(Ion zQQhkafx^k=|E4z{_R)nj$P(@ulZ!M_9?kKD5-!`-P#mI*EEG=;T+M|&@Fk%rp{Dka zobnVU59`MjW#<-BP>E3Vi~fFDTN8jeJ*N=6be0 zPPl?jiP-x0u3tnt6U(V|8uH5C;58aiaGNAISV|$QmA4r57gw|p4Tv{=0kz?`%!{;; z_lOZ78k1|x-OA>ySsRzRU)~UO?$7rw3M^@LTWP<$G`TRTZ4|HyxKwNz8b6jL?zU-{ zur3M1k<1S*njKsvy(XWJz5SsCw(&vo&_xd4hjb&Scm#QcYcI>uIvkkoJ&=|Vh6n>G zDMF6esi~XYWUT^(vdId>aZOu2f!j+1@>Kww@IXU&#q=jh074KV=Rou7L|CUWmm)+| zYOH*NVqv691jCwYeQ6O+EJWLwi!6G$(Nt(EM22Ns8)+=@k9}>DJnJv_#R^%idl(0r)Bpg~%=L{WEi5s|#hkx~V5p5ye$Q zQS~P)yyl@Dnxpj-DW}vSBlI6@pUDgH_a*m%BD)|#32}P+>XW|(DPz5lTyGqv^H02* zJh(PzD-HI+5T^T3*<-cbTHbm0`qQbS!o)vV_kd8d~0)!ve z9_CWF4tEamgE7eTj}P9;+z{&Kj%UfW@++U@NRr=Ddfa$no0Yd}^LbuiEpjU`Lr5Q?~gr7_8f}I|kWd{2bb<-11H+dKW-HlFDAg zQE!6@3tW`cE(gGkoK6un>xj!hIy`o+E&_9K8xAV~*inX93 z(*=@L3PBT#=3QH);>YKo%Uk=yGY%h4G&(rk7$5I&J5KNfNVCDdX7*OBS+<|nUERn1 zntJa&TrA#xJLh9OLJ|(I>d^)rx@YXOpcZ3&xBdwmpwjec)QrCSsUB@AQW~e6AfcE- zbH6oCj5fJZBL;_*_zNxhHnJ%F>?<@!lcG{eENE2Q)p0BlSs^@HnM66{KM4&(wxzF9Jm!PuqOlDpd6FAe_j8g#RXgg*G2&;C47*@qsS^9*i# zaPW_(?1^=dhWtJRRg1$I{mp-x8p<9tGAEW+5o(tdlQft>6u?57tN?CjF*(~#dlykp z4GLs-KlLO7!*XU4kFaOOEk0xgPH#kP-Zs{C5^n?^W~p-{2y?ij`)8D~EmnXoaC@$T zBc67;<^1lP6Gu&KO8@goxGCH;05y3hWX?8b^othU^Q^<@+zGppbC(iz)C}dWb18J& z9G_QM+6xR(l7rxodgXRgx&-|givI!gi0KM9oWxmr58t7_!Z91(byess1v@l}Dp)gd zRiwIQWqqIG4oSuUduhrcJHylNKy8z&G!HzT=yr`?bP8V=xxf5Yocy$TgNdkkGyo@k z@fo*s);9a|L&FXEF-<1P06U+S&MkuJ<<%N*)0fNYZf+B{Vp>V!64sBZ^{Be%O-e35_c2yn8ZB(SbCpt5OE0meC4k zS=6Kj9z@qpK(^`OA?YgEsA*k#PW-%;({BKIN?Io|M#{EXNRL&R1@qAKZXP34(a130 zUaB*Ie$-!I;a81?2fyQ6`YQh;u9~tq1uN_3dq6BCGdAj!P6~Za?L+Z7AYq)ue?wn0 zFrZJTx#J5B5#7itXUztSld5d#*FBm$L`BBX8khEYkEd94y&9$e+pA7lA~kC*--f?j zUEaAztZQLN*?;_^ibq!QtN1IGH0jRx?OoTC61Z`rnW%&9G2_|$3%SmK?fYU$Jf>HzgF0Of4AtIx>-2 z&;fgMyz)3o(ckfd0tt@B+}nM!wHfxb8Y%twb@$si7-=t-b5orJ{%wXNDCxP-fF(aq z>zp`SauQil(7l0&gV9E&3~1h%~M5z)3d9 z!V~2Km?a#M?GYceR6JyUTo##R-p_#;;^Ar;C)yU+D-=|-V~pL&c00Gym^n(x4!cf? zRI|$zl7<51XxL5H1mk@ZcOEk6xSxGs)N<>bm1l$)G*hjr>Fj}DA+wDYQMSDdjAY%MVVxx~P((%wz3>rWlfJla-&L7xRhWbO zzR%hM6_>xw(BbGw6n?|?HE}hpV=}rM_Ew z`~rsfcsUK|7!#U$*E8YoCqnUKr47^G*v%Fxs;J&u-Gjex`dQL_*?N-I>VKN3Y#1_N zcJhzR2^~^|VyvKBj=Z|4o)UsJ3y9B9ENpS^H)zboYAAU~AaE2ZymywA9&lkEqwa>u zHN4EgUZ@N%pUOkKBP91~_3P&m$0gwDkW=q-^Cn50EF9QT#&>HBo|uzF>t%LPFz2jq zeF^pHq+Gl0`LMTL^r<`Ao+_mj=Jz{KCQ<%u@avd`q9}@4mBeNA+oBcl(YF}8S9Ta2 zdQJm~ND*h0^sc*5VU4)W0bBZ(ES>Fc>^mmd1to24>ehg%mIp;p9$=tJJx z(lUZ?T;|}XmdyTk6ZM7s%6Nf7cbK=#UatZ*Vy}tyurM3QE;>KT<8CF0_o*!0wWnnn zzP2uVk`I6P^t0BBKY!fPmxt@zCw!x~Z*4m^t7xkIpDVJRM1A9uDRXCjKK6?%8F}3fnd~zbrOyRBN z5is{Zh=!am+asQr$*r7D98TEFMj6s*rlXP$7MQz;1?Zyhb${LKZe3Irb+XMG+sJD; zHe2Z1NE~}hB&m3x`}5a;5gP&dpvk17!%@~E1=h*aMMbH#)t2wMGn59k zf8!<74WYz;jbXm@yT^n|lErK+OX4HnWetWnhVhvs&7t}+L|rV+@mXqkZCFIX}wd=ns|C8vg(1JXB1RsRZWZX%8>?2;>Gfs zAye~tOCPu4l7wUx#)TG=OxvD*wq_`u{C4z$zjW_gQ>g%aB1kGG+YX-h{toUi_qW_ zXRo8bw=p4zkxd%h$ryv80Q&L>uLa)voM#ccHFBxe=5$0Iq1(cbhL8D2FLA70MD|gk z!txlY*{YC+E~7+uHrgD0+>xZ#YQeWjJzW};*K@SDu!<^pTQvQ=?=%fYN@bL%=C0&} z!fuH*r}CWgnSdugi|ms2pMR^HcsC1vF$i(;ZTWpcu#a|(+EN4jCbhbXxb+!Fgb)ULzgRFJ5XASNNnm~e|sFo$k*B^0pY5lwt)N)YBFE%AhPi3 z^5HNWmN}HU>u3=0SHi;C_WAB8CyswKASdIc@kIAaq;KZlfA(L-FsN)?wZoj8^0@=J z0QBfkbxt~VX9zY)-RewwgVmnMWKGd8DbvfOaQ)MMd#sNA!oq?Ffk-~NPY z3B8B8{-|HT<&~VbB;QIUJq<=41>>%b;qxR9$IyhM4XrD76*yMj)K?2GG;<_BEy^Ua zD%HPArqL!y3yuFGX->@|#bq}ih44BYF0XTy?;%)ao!urKRXT1{aMxre9axk}&ny%T2~^iUGwTdjO&nF#I$dT<-{&*lpe$U(sy z*R5!3nXd7PV_Ix81Xhn*qw_-THSXN!_Z2EkA%$HN?Ke%R%BYd}-WATu>?Bv(mFO)lS3wSr#I&Qd!ZyWBPcx$N z@^+GKGqpk2zmrt|`(SAz8e6p0NUa9PuWD&UqbpGA@>)){bA^8?`nyLeyIt)hTSd3U zZ+a?t(UB9!FtcW>4}NFlvzE*wOMU-#E085ho<>A3$|e+15+EWmLQ!CSUx9Ukz5vf} zdZcRut?PHh1k#rc*Z;2p>ssW%_s8hO?Z=KLSCT(e>g-w0Z`M8(XpV zVG0E27zL@{l`r|D`w)NWWaCpLsi@2IzGZFaP)U@W(Qt}_T(Q*exTy-;|NXF$N z(N<%;@I%uqj{x$fc(CZB*DLk9(=i^8OL{}x@Q)z1Vc93jxc`Cy@4P$G&U-bPber+h z&;=%r<=`iL%a6%wkDsHV@}d*P`Rp_GMctDdvu4}fA-)XeXOE<87rt%uL1D&v+yf%8 zk0r9!!@niUQ;Eri3gtcUZ&*CH8ow#kknh%bZG{cBb(Ge{L$7_JkY^;*3&^Kv{N6z#NH8Q6et?W@P?=KdD&MP z$AWCi>h15#JrTthvH7is{SJk`t?TY%M&t<3oVs53ts9@>k)3h+=kFkx2w|iyQ>RHU z=3YdiNYrmjTTW$zbVN^R8ESuI_3bdtYO!(=EJ{0OCBr@96z{w8ulbbxJle{luk%+n zQ%H72bPwh4W5WkR%gjs3N4hvHj#RM*C+kw;B#Iy%a}bIzCdZKAn2YvSk< z+FHo@s?nRXpTn*0Zq4JiT7-kz1bZ#@iN?y@MxR|D>4N@hw=h7|NlR?Jrf952jM|*w z?~_1Fi8B0J8l5<69<53!p@hA(L+s1FI>bk;G=2_fjfJMFTHt}{pA4iw0v{P6&W~-CCzm%H zcD|p$ujujTr4efedwV3;$^G6J+Xoq*D~VblsTU{DUPre6n_s0jYxs({ZlBp`3YX2< z@s@cNd=D7VMX}e~T8eyDi5fH*e(TZO<(;#uvAyCW#!MACPSQ$W7w?s0aJJtNpo`mz6tLCm?yUk}=~9 zLLl84u>e&o63kjXE#5iDdSEd)gWS+duNY>31+OW4G$@BV53u5Wm^q3h zsgaZ57quOC`BQ;%T<0*h9As#n+PkSzF3@Su_RiCg5`;;@#8kDbDvvbj=~-f`mmzR2I%z4 z5pCfN%lJp5Tmg`Gbt@$FmsfGMe}UzIMa^G3&B8u2?J}=t1k~~oC61ngo)~_L#=o~P z1}1#*qN9^tV>l!k8E**2V5h03NB_%E zGV#0{yg1~T36)$HudS`Mf#42w9F4G1n{1}1u^gv^gJ{4&?FX^aN#j|j&00(JX=CEW zegLiJHs>e%mL2O1!`c@jyQH6qCX`jH^{)|Cf&w3oYbd-=^V9Cl*bQ=Xx)4( zBOb+HHJ$|{PAE>DiSKR_EfRr-Ww7Em-;c5H&ks8qUC=L>nOHReFxO_N*k*0>A@Tx; zG$=m(sk;6ny(_Zf@JsqM{||3utohjau@j-IT9mgBrwsYdP(Vx|oEEoBjJq+>;xqD| zVHO)p{wb%NTDkW4M%#?UXt$hAeJ^;gzKhG0iee?{iwz(~Cz2uJ3k{z`0laX0M%kp3 zy1mX}7K;*LCw7OQAI&3gX7m}IpVnVg_x#?^;!RBb4`4nA{uwvbo9xVrUs1u1#arB5 zaE$VvoCd2!n70Iop4C?$SODs+HsK+E{0F0vJeu{FWiVTxBOt*6xIVmCdJYs`x(ST+ z#WMZ3CdWbMRL0cMg%Hljqd~-$Gn9nPz7s~YQTW0a&#gW%q3u{l!$4EJOsUtE?Rcd-^41Tk%yamDsDt&y^S z&ur%2I?l3f8g}k#RNUg70LEfdLjWuBD0SK)n5bK%rdBoUI>wUSUMv~|0->+*29l+D zR>gQULK#5yJ2khwMyj_`W-yf5RY>p`qd^cvnqrK4VyBA@XHg$7+bR%NKye-pCg!$(3(f1%|aJ?i`kcEGZr>0xa9E1kNdH z(7k)#a+3Psz5C60x;s|4N zhV}R!mb9Mq^U->$g6ur`^+~!`+hAI2<~pX!^sqUv4zYkE_B{?>T|2jui-$dj(+LXt{Ed%m30XzwAy>5SkxT6hhn~tz@Fb&1bN!y69z8)8KF39O2Ji=IFW2O zx(GJ48EXaEZYjVG@pT(Wo*ukd_8y?j0PD)@$CY5^^lb*h4gL=Se|t9C3O}qxSjB}+ zf|#%G5XiiqPO!(z)&u)csLMgtM9OY2=+clUG+QG`3S8eHW8CF)NO)pEZE;*6SV#&6 zN(go}?5euR{r*jn3}4tl2pdi99kc&SHhKFOCAjDfdP^L~wt%=TgiYy?Y5LZ^@1+<2 z0ljayBILr4>W>LWpP3Y|fyiR%i{lJ*0 z;y!K#)gty9psbb#cb^<%fM*xjkqSfm8h>HYM2ZWaa-OmT7uB2p1{W=!46&)W3$`&b5@8poaVYZ-M+<99K!y^yG&xYVU zoy^I#SLKr2%0n~HdI-b9ionig#De29AAv(6QKFt<>U%CZQW;63_unHDFx44NEBFT~ z%WPX9GHSn}E^_@w=FUPzuq-PWaYg(&g~#!yFHSKk(vEKREO|qn*3Xi^B#z(vH^G| z*pwv-QFo(m1w3T=!4Jk;eU@{Ebqj{9fIx%SF-kJO1GjT2pgD+5)`TCMUCbKB zy^|F>_LyA8G7huX=vZk7dYV*5=T!hS2QLEwWwGHj=nZ}m9G1W@uD{f_uM0)Y&^?fQ zVaFwS=i-c8&sYwkytoCB2%k=5V25l|e(`tb;P!00LlrtDV|CT~ui5$Ni*Mn;b6)!o z@zDMPG!_Ij|E-Xdq@yd00O=&)y>WgqAw}z;mtXuuOjseoMtR~x2!8! zew9o5sZDcRjrTGahqktTNQjj{ymybp|6%K^SQ`}y79eg6~BK6|hIUA^|&XO1#``X(p{p9*2B1=7A& zPkT;Ehbe_0F8L!KTdOlQ^tnKD`^7O3b6Fhl?7NoROkIeNJZMj}>jL-ZC(9eZ8+`T9 zAzVjV<|d#OzK|&X(dZku&%IABr4=QdjIwDoGS%uY4|^p)7@A64TXa&hM8!!A-OCr% zKRn08SU4*i z|~H{hCsiEwGkU}dAxd+gR&0C)Qy&<=dILnL%oInWx5?qrdjS+qC`s{G$jc;29PTgiESf)S`oUT z1%9d=J^jmD?+}|5W5Giso7KxF9O>X%U0=-9BAnV=s-;S9*z|>Zf=3vrGKHsO&FbBxUTT|M?+sN4ka47!ttyMjG`=p8miADef~^00bMMGV-a3}A{K zS1h+B&&3J=x=tftqgPR)w+yRhv52oZ%@xvvslOVtfB) z!>mK(9jn)@oOj*Q9vLxoM`o?(m1Z^RP0w4T>@SM9m;vf7z>jh;by|i>Fnv|zZ_L4S z$X8w47hViV^fTVusBy|b`)~8uDy+H14`8tQc(hbS(?b&!>&hMyC&0J|em+I$S2i;g zse3WGWeQmXcW(PRNmhKd1*?Uh#gn}jF(fqQ{O3uiu*+PBHC?%=HT^)xJs$L{$bN#!?;w&|3o`> zU@MJ<1M#4CxsBZjQ&#iOYL|sBnyH4?4Aqx9k;7#qwg8r3+&Ggxr5G3lz#K0s9GBT<>LZ@sy^ZzQ_hjR}_*fZ3V>s_?%T7T4Vb4(xN! zoWR6iiWP0n;iMd)tqI_4X~cec|372^+>+DG@T#2RRg<1+zT#88t%^}2&6)2hach!g0fm%H--%r;{RXTJ~Lq~WSez-_0U!| zRrfZID#n_!BHSXVyCY_+Pym?Py1=qJV#7i8dv`yUO2nc3MEvlRC0pF$cfXqMR(7C@R@D0m%x_-OP6N-H;#r6Y`rA=uzR&k9!D=GNZ-zG1jZcvQ$DsN zLx8!285{@6l?uXD_qifTLa3jM!)Z>V{h!?Y4`Te<^3_`Ud1f?}RY#mMWs$eMeyYG- zM6Y3e3%)nYzi20dZl`f2$|_tp_NX`dzAH1)IPgdn%h_#-vU;IF{)eR6mu3!Y2pNCd zHk~E9GTLhx2@p4+P9msZ&Pnl8IKRxh|6J`Fkh=?SpqR;9<|i=!AL8&IlkgTNU1zO9 zZOzT0MOQvyF*oacWO!KorBShzzkI68r*Fn26MGC+PMfy@IX|vZ&o*!gvGO702UM92a*eIu=Z5qQ4pA697IO@W1&7 zW-$}h@GFoJC#{+&$ilv*dlMzfW+cD+yKx7bB~bu=2|0YAI^Jbhr?z2o)X+D2;j@5i z3U4C%-;fPy=X>1oP6z~FBrO|={oab&t&|0K@p-Mt5VTjhT(u3XiL%j%y9JfFv_$WU z)gAQvx;7~Nw@I=VWxd|F=;Gu=TUfqu0k7Hf5j(n2T`+(Y< z#>rxcv5=gWENn&auak=C$~}$xeU?^!aA!5;^abmMQ#K^09OXgb`GR~d_DTXvG)K95 zd->Wbz13)`@_u#QW$?hC6N7fgmZ8x9PnJS%`iU(hyx;9aNcB-O+|=xf&U}Jgs-V(@ zPRDT|7U(d?o#ka+ly)342AiTyy-Q0=Yt0&9C>dOQDIyq*9P=B-QNilfy~^s&>IrBd z=l|9~|G?>Qdf_!+Xan)wOW=YW5WxqnNyNpM9iq&NG#c~5Ht_cRw)Ln`v1J31*Gpv2 z=?!mWerScGpWd^eeE&H(OP0-dDpB!bTRFSRrB&PFIBwhgRz6PUf7;r=%H@~ZA-7Ba zAtM++FFJrvyCY*q)I-sGyq7B7Oy{|P91l-F>GxHO$b)rp!`N-1_767@r!QGyVPOx_ z^lg&Dc`LK@?Af4v$;E?_jr%9!Kk}N6e3SacXDB9WG0#s1GKT(l5Ofo7%KH|5@zxPD z-=*Ddd=;ZWkqceuRVK{i;{rKs74IyS4@=Sxglg6q3IDV=sh)9Pv;9FLozG}T1}&>1 z^gPRJB}#(4sw0nEP}`$zU|G{0pJTkotqYZ$7t@3#an;I-B_|93+fY9K{|9wHT9G;;u%a=5DhFS{@XQ$p|Mxa$Iep-)?D>hlC)1K2jldcL z^j@|?tR%1x)Fot-LLC*t{!q-AHW8y8g(%UmZnuP8^r_s@R+>szOOKSNerP$rVsbkQ zRM(nV5~nJBFHw6BP8g$sa0&b$+Zej!m$iGtGO`H7Lir~?$hiKxyUkS6B$K?*NjGAzV3 z6L`L7;X}(;)yl<8V|1~mVCwHJnSb8d$c9{#_($GNx$f7!-J5GYnZz>>9oTTNp@8mQ z;k&cMp*7DSzO+r^AvqV&nT$jAJWyX?^FmP;y$JZYeUHv&io0JXyH^w)$17@VF_IDP zRWWSeCFXvreHiOwPDkU~Cs9Es7!@(ytw(cK!qut!%IhS~j&wyBiMO}1cVNa+5dqS8 zT*Aj&w(V8Np{xF$BU%=a0jb;*G39fu;50C4ctc&-V7yWh$@o1!{ zI{b5(oF`sZEklg&I%dU*p%lFV2DU(c5n#ZhqIr0ZJ#kRRO?`6H<77{{&|EIdk>IDW zBY=J}-l<$Aj3j%%A>>H3uEo$ts4cISuhMtxu%hyRh3aoq$cx(X)$isUumfsi-rQz< z6LG`JPpB=e))GQv0*Q6z^Cj4&3c`K3U;fmx5^a0;;pTS9=4Y5o{I1u`gz$!zC-6##kM|1Tn(YGF9yFd&nA3uZm|2meCwB-r!?7|bMEZj0|RvFI*9;bfiBIEkHg)xGB zh=<{*>|wA5{dmJId!vs%>8?0u{u{fq=UD`I_MUiuz~-#c|C$aL3cl8$5I+<$YuvC5 zw{>~>Q)D3ZNR-J)D{3FpvGhdrQ}AcM_<&x8c;-?_D$*kL+9?Zi9V&N5Ad=&a-k}2} z;2~<4_{M^N9}3yPeV@H^^*7e-wA`e2z^f`_FmXMSnn@Bi4Nx}2+!k~!IKHy| z9g-aINB?lh;y+6HZ&Ypj0f$`Mo^;PyzJ)Ok+ldz?;m)k3_|wZlk}}Q!7Ng=0phmc# z%e_ML>1{c|S^GPIwEq=kR&R;fw4+d$e5RtR>My`pD-n!LwhV`35;i^)Z@m>~YcGgB zL0jg}2>pln%pf$Ad+jccFcK?o#TLV!V9%9t&tK_m()Ou1CV6rKo|>8{f*H?-1_y7w zS_YrwJxlS^^hiK?80rmf_G9%D7>-ADB$+|%h+bNS8(RBbdyHE;+(>438Eo!}*xjK2 z*4iVf1rip19IDL`!PMPIr!)j^zzovzwQ!VE`5I7d_;uOyqhTzZFXL1WoU{(ycsAY^ zIc4wx^2we->xI|sdrq7eeQ5aUi21kpN0aZo$vFpW-x?~ejJ_Zp5EnH0gkoY{TQ2_= z#TB4bCK-|lw~fTSx5R7=GS#8D4Bs`KU=%*`{ml#Nuq{Ra_%tKiVJK%x6ckz?yVep_ z?Z26eu0qR-y>RC*>ytv*<0l~;;WBJ~#UPFEw3=(}`fr2R$9x=yjPlQ!^M29cePe zOPqI&a3gW;>?-)X1o#%Fz&v;)z|y%w6aLkjH)0Y-8FAR>=ww<05fK#?e|iM_a}2Lp zyjn?ZOBx(jjCS3= zz{sPzul9j5V%3?l6Be^t__nugf)YpbP}((~w?X}kCW|Bp*6oyRNms+}I+a9tigm@$#*UTn})5Yd?O*o_~V74aTU zaZdL0WNEtQ@YREQV>8Ofe97!3;RMeE9f_sDi8X*00ZR4NE`Q0ww8vEtdzKW7vWmz7vO!;G?51=0HOEgNyLWz9 zcW2WpK~nWaie#vj`#aRbsijTP1TynvrV2|SV7m|F`D*QuF^w(XM4fI z+Il6u!*uH(KrYL#amX)64PpRczvn6gG3`K%AsUrD-`Dl}FEejenM7k&YX{w6QsfZ# zZa7;0S}ckkNIlN1V-{f?>`laCsw*O3WEg>cU&4(zqOrV9uY(9)Rb76)T7*Y{a%lOC z$pKxduf==W9QyjBDeafG0BP}K2mIreKHqhuo_jkUIHp~Rx-oMMbb4D&GX97kld5R@ zj*t&pVLpPcp#z9xjshu=5#jhtynf)#lThVmg^4p}sg@3;;S`z!0b~T#=ijyKG|` zKwaAY{3TiXiCR~q`{w(rEx}8L&I!5W_k~({wZBN~^H$&(v}{Q4?JwiEMvulZ5CZm~ zE&=SZ;0-N~7TzWy)#4HSbP_{{>K8HV{LV}+bmd*pg6+F`x6C@Gh*>*&VyG6*)cH8i zla7o#_SL6%Y)_NKg>ROH;gM^C9m02lAWZS|G6LGr`l0VaY0~KsKGe2MCw<*hhrA`E zW5eE8$LVWN>_BMFg6-zx_djZM<>pAMk4Ke(wTcUlFSheFje z?jj-0JPjwhrGtU&`ClU{Yg-!dP6Xb332YU)wJh1Sen#j71>5~vV$ZhP}K2kjANCV`=^_s2xR zJa-dz0=)uF71gka^`^8ZR?3Yt9!z@f%amkkg8W9t1v6Kpq+5!lm36D7B$`!Y*0cuo zNB9z9+|~*5#aSdo^t>YVkenOKwmBkv4yAzNq*-rBp+hx)%(_SRMYx87cfiD*cO3^S zE9m}gSye{SCh3^%&?;FM;xcf8$=$;tu zs0r^#pWVIWgI4#YuI+UTtdvk8a;&Me8Xh{Zc+VF`T4d}LpCfqJ54yiaa;yUBRMrgh zDc_=REp3n*^;X6)tb(ZnPY*4~mDUj!4LWJZ>^`!+YsUmhbnC2tO&eB3eh&BnGKH5p z!apSi%^GsHtCy+;@W;`%YH;8h7Aje|-|fTz&Ho==#arH|62pZCPAhVC;s*umn4*8$eHCc2@Ny&Og~0dA zV`RZ84CP zbyMNC}vM!hpU z6x?VX<#l0Nx5#M8vT)RLY0~n@GHvH9S_f`ZC3LprA>Z*mXR|cmuGws;^DWrFBlx1t zT+G~9v+6URMW66JVF|OB{x3${s@)vj)fbIa^q-Z!?uW$m1W%o!@fQ8wv4D_S4LLPO zbMr8O*0)-hxwQt)_hucd+Wd9KFOI1EJZ9ZKXQP@(D$+`q=TfXyJguvG7EFQ{(x)U- zSlCh)5B^w)ZVe%TGPfb*@t^@$7i|2sAo_<@v6T@9DV17H%(`3yF&2|-?mzq|>VW?H zN`VWy`E~JWy`Q!nw%4J*w_RmychTS83=R+9v!;FWdug<8aLn%4h#TR=Sz~bBIE@p*MEh@))LaSLkG2YaaV~-HE>ikle(TM$QJ;`jIrVBrui}29A z2zn%p)k`HuUF0s_PJ*1rXkL;8?_qi)3wnY6mL%7;51Xoh$I%1TZgoV&YK2cE=}h{! z`#VFdv?*0-rm_$IU$<|#XB8`_X7_a*inCOt@x8T9#ron13)9F$hinuxcON-qdM}YjF~YD?dgPJ*@;3Is^m0Ng zLFWY0<`1&mW6L&5LCwJRK_n{iWzwBQe5g7K7g!yJWurtDC>&9K!CtyD%I|kdG-En`Hc(0?rYHgVUCr$f?l@<++ybm0=>CggejBA}t6jdwlnAJ> zy$6^R{Cf+{rbJZ8$*ZNUD_hLRA@9~tr1DjO`D-9NWvs`Wv1agii=T^TjVEBqtvA_G zT^u5@T9jiS8*@3#`R-lWR`Jr%D&7K_cJoET(T7To0cuJIkgnVaVs+Z%;nU+1k`sxQ z5nl~oy0*m%7xkqOKuLEhf?9+K21g?8>IWroIJ-0g?q$chGctQE`*$7gpZ5v>842wk zayuc_8&>p`KP^x6P2IkFI&s7#a$z(yz-w7K`OI3GK1=F-hlm|;yzwaK2)u<5Cggi= zqj?z;EpgYQBd10c^kLsZ1g@yS?vW4ZBT2OEy8RM`Pj-ZSFd}uj9f_dv?*^D39#^NlpFkSg;F4dvOTr_~J8Y!RdK{uia{|O>0$(hJ8mRK2SP%JiH=? z7UPu0_=`6D$y?rL9QfnYzqz}+8`3$!$SjDLt~cEFbj7XlDeBKqLAlL8cCX&}4xT4q zJL|0%;Ip1wdJnRAMM=DN5(|-Dlbjc;-@I;}_hRwJkw4R{>F3?n?t}_wVqOlD;&ZVrQYJvqKa#)zm=HdMVZX5P*JS=7($CkEe_WTlg@Yln&M#4;H z?pKjH8a$P&wA9iOewwHB^qO8=EqJMQM^(afskeL7NfEV`yug{dgw(8wDotuu7(h-Z={_g39V z?I&(%o3)e6XB1ZIfxR0$ff&M`=~ZJ|$79w6fV5L;zn(IYO<@mG&| zx;gtGMN%d&gbsa6zr2sJg&z^m`xQv^=-<0$G-x8qP)m$en^Bg0+#s|V>Zs)jc@dIC zzLEn!FZ1`bn{C=d#v3OVs>fz6qo}-gA&iI zI8zgR^XrG+NRzxlT6;Rqd6}8rYPI)3ljc}=WFqegoZs0xf|chE_^jnp(SpIZpPT6a zqKcW$bsb*qwhp&>l^4CGM^+E*4Xa?oMTVo9bmC#6B6dH42|q0jcItD2+&%gE`kMI@ z9)aCkGfgDNk9e_Ytyx>#3~y0hTRAk#`&#Tx*g)ReUPUZB5Daj@@q>E#lb^9pCowyA?5ovNWeR0PV;LZqg0v0 zx~Xe&GhwM{xL%pSw-GZ#I=N;pq7A5z!QgGZ2GxmQx`E&yFm5RtUqw~JJw*A9<`sZL zg`{P;yP2PTZ!DDnmZxDQSdtDqge*i;YxgN|>$#F_K{=qvK32m|=+dH%b%!f`_6yfz z!DeD7gS4{2*P~^&5M4BxnYEk)3B$q&kc?-YpIR=iYxcNz`lnTg`W9W< ztrs{5#3j!DcX1sra7C#J@_56d{TaB;2s#Y+u`vPy-AtUp}8!3d!)i-%hQKJbH-Kku_ymBaSy3MrumTakC(P7D|7ALHH zab&W=xzT|vWFxoc1_2g*{q2bW& zx_4oq?Xa{XGZ5N+W?NGbsvZ91@@%`dsjQM1K8e zHhRS|A-voU7Of4hT8HYwV}3J={rcknj>2s6G*0+F`PZ|KSt!~vGE+0&m#Yedwa9k# z8E9+nUhO;~kb?X_cvwI`?j|g6({QQyd1Uqhg_{qkG+F9Y;yP#j7hlv&_4F<|@XQCx zw}O^b=rVMXI0Q)C&nffLSKM1opO!DlVa8<~<$Uh8{DIzUh!M!PA1&mY zT(k*l@9KvQ;X}HL{#=3&RjQHt3sa%+Q%q!*iDlIZy5NhV<^5+AX;M2~yN1Ab?*&{6o+PhVHblG-II{(o)XQv-GTBbJ8c@w@kx(K}(nTnp1R zB1XjutnBOyy6zX)GoIs$ImG)-{Sqj2m$+Xmr>4Z|{7-UDcFY)pNfI({HY&axejz$; z&$MFl9j9PsMDngaxShu(hITz3vI7G2R-IywZ8Z#;19R#$H+q*AS(uGu_M6W|R;T@k zPN1eSukC4BirrqWdcp;0ng%_-bNJ?3$$jyX1qFhEpB({-X%&-7M~1Ve`o^n17CYBW zLa5Tmg~Bx5Pu}m8gfrFFL7!`eR;Bi%tJA8+EE z$0hmVCOSIW6T5j!5K5tTcJ4G209YW^6BE2~{>Yl*r7%J}9drC@GJziIBmC}n_n|pk zl0-hCC8^I<(KS}qS5YWmU5v~apM$bM&;QWL9hctLWN&bO6qR>11zT$Mv3q8d!MOW* z&9qy;02KTus<9vSH+q0PGf>^wb;u_W<%GXFsfUUobW{uAYnp;H<*LGZ;(@^U+z5M9JZ ztWHd>}yF^Ta4E5)3ud6^qE zX~6;`w&UL5w1gb;l#|kpMmkon2o+^7sGP?Ozt=58#6e3F?w)Cb!BciZHl9pdZ8^gN zJdhAoH75TcNF3>{c8iLFzJWp8_w6mO?Kd%J9G&w>xHggXyrJgkeDB11=*=oibm&r_ z5-;obP>KIi3`(6Ogo<{(5k8B-04kJDn6YwRM4LK=jAzpoS7QeIhRv>ibKWkugKEiI z$slwWU*=y^F@UZx2Yc#;m?(^%rQ}>ckeKk1Ie_@78mP&oJv!cjJqe86B3zgIRRMeX z(pOjS%q^dsMM4hxa?bb(LUJ%Rh1^HpWK>O7KW0SzmFoH*>PRO0rekk#BT#$Lm-$o) zVxt1>VPx*q-DU6FG%piULCJ096{o-=E zJH@cH=~_&tQ_{vVi}vUf1xKRZb=X3DV`J{>h;XJ5*cdrjm7c zs{u-GzB0jUQ^3oduB{0<+i7?f4^ekzwu#f5-l~`wCLjnIu@!XmgBteK;gb7XmOvh6 z)EQ8hy>R&UruxK)LgVeHWE>zfvxNmuk%GdX{Z(t7@a7Ohi=$4PQ4hr%7sPpj9>8r?K_ zHNoEO){?EOBhaQS&+YeL*6fAR$+6j(Zj!HWXCr2{d7n_1Jza@i`s|dJyqx7-9!EAY zbYT$yq@9ytNC&h^wFYHRF;;E;QGXV5Rs_d5t;FEV7Y13a=mcH0{m{ryImMmqHv4wf zk!t=M(UD*v99s7WT(F*1N9Mlo>x Cb6+`Zt-A4Fqs{21%)@sKrZEFOH|H3O6e@LgT!ILgtBwjzco%UsSW=eM|FnAa^PD z8{gTHerG2Nal(A#&Zw_sPJ3dQ6RllQxkk?G2cF2-mk3q$ViRoAPF zJ97QdqVk6JwRu3vb&KrzXFx^Rfi9;0mq+?Nbm2=$gx-c&8Gv?5wpFxc25S_LSuzqKsXfK}7BB=*PdvC}|-|X}v?pe;FV=GGlTs zgNYZX-*RfB)RJEg8P>f zgzs9jI=@g$bd@VAr$2S7=s#vqvyS&x=}4O$a!MXjAg7(mSQ{5zY@5&AtJ+E!E>$p4 zR+Fp<1N(Tl4BF@eYMO?=kD(C=G(XO~*S=Rv0D8#2T7tp;qI0lH42%V-PjRGw>YF2B z*LF<#72+v|Ie0HriR|pAEM*gY#RXQ25Vkfx_?gq6@V%xL2s4@oi}jFMGhkLM4S5yL zDqB|MLHo2C2XWlvH$HifxY#&ssGuJ0TnUWCty+AOo@e|rC&306A9Hl&pQ|L`O}}<) z_)RkEu*`2O73N7A_VT9iVQ&iC)zwv^;5Z;`_k};S+l~-pp+ggi;7zFI$1=if=3qTF zggHVx_jdIB3fP-B2}wNBLWVPLmrtbg!og_P$6@If(1@>t7VyGOfmNkK zen@fB*`-4Wq$?SMeDd$UU>!*4cDR5cP1M3Qp#H1>-McE}bNF%(A1LzUY<3bq0S zHm1&gwuz$j-3a>6n+7Ke(1&oqX2VWt&eqg$R6K~u+2+9brRoO-o!>O!)xa6}9QzzB zmD=pl0o);Dg%e|_c;q-`DCGzH>Cb6E>5TrzLt=wni)HRac~2q%U4#b_BsL%478L>g zeVS2luHGRzNI5{tCk*-Kc{ETdXvMMw6E+jC)L>+KdFa9#>a^$%W`_Q~rQeGeS!N1^*hpl5EKCU#oz zBR^$FVxf<5_oc{-3r@MPq1RRjYFR5fzGCwVW#dRz`*AQkD$_}vbK`6yl7 zS##Kzl?EGbPxXpw4YN*Wdj81$x;fGFqn*{R2;jA=#*b z6??QFug$!qV@YOOicGL*htD%`+ z!n2uIZw@UDC`0b11B!UdIl&Ku&#s2NRE~Z713u1)BHuV+)<1m|s4zono>Rx+5yPn7YL^vGvJOP(lepj~Rk;|m~h@RXv$=W;BF zN{J9HPEx%oe~my9%ygVK&JBK*&Q{<-)2KHRH&oM#Mg`!1L#I0gdm{23kX4ma2LI@j z4;(t(YjuunK!PYV2ezlZ)ZC<7!Hte=CoB@GNJ}315sMFHrdEn;Nuz$BewJx(ta`Zq zeImCQhm50tudz_0IjYOQpbvnHg|d2>JmViGNl0qteHqoW`T{KR^M`jKOQ=XZ@a+Wq z*|^ZzN@_$?q7OQs`Dv^bgJuZ>yHygffibWIMk1-xg~DJ%uDneJ%-3(j9(kV@<&V?vb*V&F%hz4i~h~G z0f9?FkFVPZ{Rd$U>UZC4;zK%YEz}a7jyL3#CE*Cc8K=KS__dwULu2rvHNSbcJ%)B{ z?i+Na=3Lmlm6N^28UHeUKO|Wi*obJtG}rs>JN%g>3=E8RT!(sL+z)z1*Lw7usX;2H z=#t4~x@B8y_k7>b&Gf?D@UmD5&TWegt^YX*<>63Lv83#lBCKZIU-~<%LrA#vo4m5y zQY!_GHBk*1RlhgTV%3bYVp(kO0P=IxWqL6@@(i67t9T{LF@D<#xl3D#lgZi0S&n?lrN!R^gTDL78RP*oSX-$ zeQooc=~_^)N|*hl{7DQl(S2$U16JbuR#2nT_xuboCZTEmj@zFs12j*to5wIGv$KC_wskL@t*TSo^ez(p#n=MDJj z%tpnIrT93X{8(fUTs!UkNoBz&S@l;e)y1fCy!21e9MKoZClM0_*;&ha2i%W;`0Et% z0|$9SHKBsu%80KVliumCKAGin1RTo-oGS*{??MPaddw*^uNJTw4LNH1n<|LfDqmRa zRZtCRoja%3qMzSFhlb~!h(vKbO`Kv!w4}LM*S4jHEBLe9A;`P(wU}-UyqA?*LcL3m z2?CN-d4^l^CwjG3_ONd7QYqUI-S(FQ4B^~Zwc!!pZ%0_TUO3|_JAfeg#M+7(#klT@fod7JvC6q9d5^&YgfEAf7v}abFEXe?^82)+5nMb zBjKvrS#N`~#`z}wr+V?Y0$a0&_~a3u?(E_Rx^HXSZH^EY9;<78mmv!g>Iv{kO2*ni z`0>S17MB(}IVu}rx)oq-4fKE{Hi6|rMx!GD-{IuhG1Hx}Avz|6S@v)PgfvPB#ca6z z6&YPEWSIUR0!Ul5=A5A9$=;#lj)a*gA)*_fob~D+O3AG2h11u1Inc&s&T6yIWG`EU z4cJ~yxWCP#wCXCzwdbET^P^<0HvS!85>hzfix}aw!Z%i~?l5%6h;~)<{YF;;ri^5j zJ1T9N8`EiD90fGr(!70PDl0cKGV);1GK3?U%3V5%(EJe&COy(Bw^6Xv?El8{nr8l-CZ_*pBTRvPs4r9z2=#kqsHcNTynrBE;*PC zBcGpzS1Z|Xpsl@bO(33{DZOJMJlX)sRMd;nYEij8X| z+b0KHb53ee;$?S6o>j`6_w%QorP8PImh!N6mA?9Ik*LhjV^N&oJ#Zd2A!>O$h+|eb z;(WN~tk1}&lI(5b{mtB8A8f=rR$Ul5vcm(9Iq5(Dir)=C8Sqok7=yc?!%t|dM={|i zLE!AV%07vEXfih&Xpk{vUFs$`XjFQce+bGS|-LswSI9coY-# z#6q&dzwb^SEk0DR)zmnmZRp3xTH}*XHCb1IU_rBj^Rn-Aus+vD@{vl+wWO7g!e&%7 z?<20ea>Rec={=n+v+Z-!Bu&))Xdp|F&tvw0Sz%6|=KsmN^hhgIdI-gwI%>q3`&)Vm zIK8mPU(&?(gHqF;bB*bG)C+IK^Rf*!aqcf4s@wxYt%){>&ikQt;`^fMW{t5nvPs^PqZh}5OL;(E_I}x*PIZ3iXThyp*U`@O?%yoLj)gK!P z6V<2iG$Nn-T1UR>tPl)y4lZY|A~^m@7|@tC;VTK8!DuxrC4wey@ssm&puGBJ_O7wa zE)`yDdWAWKOD`OXQ{HF#_4%w<>k~_Q6~CP_Yvp_=5~tB+Gc)e~h$t*!!TYUMb~|P> z89Gpe6wqF4PeG>jv1n1bFykBwS~z{Sjd7$SM;=_d^-LDu3?K%I%Db}iMuzu`?je}G z0BCKPSMRYLLiyuyBIqt6XEpRHxjuIX58BGHRWrD{?!D%rIR+P2q=AVy&f))JI#7Qk zq0g03jju9U#aIAl$8D84DtsV!6FQ6esEV^&4ja+Dh-^7P1!~Z|Uw?>YK=X8oK~$*& z(Os;ETAHQ*E2x+B;BZ9Zm+~M{7{A%H+uR z?z9i@d(7R+xhTCN4dD?Hv!p!wxVkFNJsw0_Klr85w}lIHJL8HrWh5;ONIR?1f4=64 zAq-+28>vIr^yQ-g5;wNEvAHViNf4gNNybLdlflc#eGS@6A^9Pkc*YImxL)BS*pQto zRHHM|Z<=OX7=jLWT_*L8RX^zxnygb=Hd&JylBN#;k9Q#mbI3mSv2#vM~UN|EBhL*xFH%yazQ<*J9JaQ>8! zEJ^oM@9Lb5c*aINOX)h!)u)iH2J{Ch?13ONv{q!iDpna?Kshu>B#*%y zWnr$SrNwLZF)SccaXp_R9YYx9v`QQ0RRDS-Y&E)4qmhq;0G?3*2!RIO&2*cuSZle8 zXu6}kG@Xh5rkrH9A4l#OUgIi8;>94LhS9RS=p%F|$%s|Vh1 zEC@dp6bL`)za(JXJby6}hl;6zb!g-k=d{;^*rhxU)62u-q|6=ZuGA=`G14NZz z{xl%1SOi9_mTFMF>H6g7aIrt{iQWvvH=x1fAY`fNP(~sCIhZo`yvkmFkhOQye(Aky z3lM9NK2}vx$e%a#RXI`c=&uwF2M}THnUau@I1)+yT_FQG{n_5*6ql=dV6A2N3md05 zbRQm+unxg^<^YAHJkF!!Rsf-XP%8Tg<&>+hNUxMUTAeW1MLt6Z{M(vYneKjTld0`D{qi+NZ4 z(Q5QctB36O`FzGBLhnYOS_O|HJJwJ0X(5bklxpO>?n?F>$0>M>zq-u*{qN7Mf<_Tb zt^>ru<&je{nS@xku7Jn%jG+Yvz%ZY{{CS@kJW&BY;7AK9j<~zIFjd3yRft^R7#SM6 zQ~oQ+;E!g5mb*B$U!SSqO2L$wY<7EPLmrCvLjN|G`i-|RxwGctRkIzT2o4LBofa)}w&20+2YCLPPzSI7Z9n68XSzOt**<2EHFiad{ zL>x8=SIP~`50B6MyYz-rho`AQw=xWUsmpaWHBM^AxTX+{RX%^YC;)&lHPS9JI7s<{ z9^?xU>j7MGU@|7PbPnoU*u&9&l;gYL+6*qy?tOj89>5|cH)qPi=s#J`d6{3v_Cd%%f~;DX)xuNRDMr6wdK(CyBD?0|IA+?B$IQj|oLT{>V;thaNl?K20G7Oa1cx z=6p|J3d!rWQ6$M$zVG8(z%+~F|2YaQ4mfS?=Fe8PPy`{;#B z-gfM%sQsbEEouaJEgV^#IsEugd$pk*`?M=6sUv>XPB0VYl(226`X3C3+h%V>M?8i?VMn`t(r zC+~Mbn4&RUTmW@r^0%K|LwA3)Ygo8G#xl|G9w97$2LV+^bH&vjpi2C<9F!bI3UHiX z_Wy`233nwSCibU$+*fK@U~LQ+J4_e`^?4MYm;VUQrD>6BphSal(b?+l(sy9kcY=Uv z@mOGJY;7zTM{o?6j5)A#vu(`b6yO_;3g!{O$qt}@uZW3>_sKv2$F3mG0QF?Tk4d|B zZ;gO(B-~x$_6E2QeUpIt=U|dR6m8$2h%;k4ePnZPN zqhnBJGOK()__21U0%GxqbHTC>+cxI{DHTfnH;!}99zg8euwaa^m#}iu`i0G@7&6dg zsBmmAoIRgFBjR`&P%0m}zqGMHlprc}Ze$hIG{D65{Hmfy-84E8E}D@h;wrwCi+|n$ zy2Q4Eh1m;B?VfhS2k9VEfCjIBW}Sk@%Y37T<<8OUC20SG#uii?!Syn9KZP{oQM(wQ zJ$UG#)YGnh`!?Mw{}tw}u# zsfc+Fh}G3Uy!~cG z;zF@;{VZxK64Ump6F>nn*?B-D?#ULekZ}-k6w00%xk>0!akG)ztOdgrSjn4waQ<8hL3e~+cHz%{|i*|y7b~Mn9u^^kZ$W`a~lWf52 zB40!XK!Z!D49`#4PsHz*>+}i_crmigkN~eh5 z>6{)t?nORpC2K-xKWVR^Uc2Nk$J-CetdrXex9exK3ii90FKH8?wJ?bmfkjQ znWQ@xv5$I674%)`deipW_WJM1_h!UX@s@m`h3r8mf8wl5)jHz;t@*<_* zsn2Hp<4l7F8cf%m?xhEfhd^E0!y4WA8hpL^cLt5|4snC5od{N604!TFIyVW~9Lh&> z7=a&l*SZ|oC;0mZqMz+)EpZ#5wa9L5bv*e5u!UvIK7jkHqba{izz?rYZS#N#i4A|` z@_U8b;O)<$gCk%mKIug=KP%PeQ259uP+5;q@4Y>#)0)uVP;-1JK4W5IV>6b>2W*tJ zB#n}(QjQWZ`eilw%~j-kK)q}aH_+Y3t945Jh_ae@PwE&N{M2OuL_1`16cymR?6_s9KnPuqK+^PO++bIv_Lr`#5i32gQQaZ?GN z3luN@ajVz~tu0D2z?;6)nE*o%3+x4sg6_p%mo$SekX1cF-{%o4tP`eukMCq*l!rQS zi4Qqv;ska_!6)qUb7s|g6*8N;@vn)jB~49GLJ74A(0ix2EoL5}h+%7$Og+q70m#(p z;A{dAF_lWR&7m3!DT|V12eQgADBoRkdG|h=?;R%)hD!WI;>E-8_6fK(JSBm#z*Nw> zIL9Ae7~a012u$h}5)v}2V|wJBV_H{_+(F-zAbuIZAtC&62?6Z8U5l(T%CaR=SC8@H z;C}YeV*-vLn(3bR<|ybtclKwgu$f+%+KNk zgrW{fwICX|bBifZ3wtX?P#}2mJY`d!SFTqgvvlEvTl>43B>VH#>}>~w75MT9Z5r@A zp7}Y0vL}oelNQq!vo6tiQ35?d{bMW)Bt)3_MX$+{ji}f$AO7(Mv02Io&6hw8<(#y| zSU5|ik<|nt52!N33rnyAo4O>K%FXBFf!_hi4+5qvM>t4u*7O7(TS= zx^IfY-iR5DU1iA*DTmXJ5W3&+RN=a_mrknn-wm4AH|r0`ODi9vRevx4AnJ@rA(mcg zZ|&&q7@I3&u8^rSPk4y^^reT@(t;{xcV6CZ`yhhB1flsBRg)frh&714+}BcZnuMFO z=m2(loj}7Nu!i(kVIkYSJFp$`9gn#8=GpUV3%=W7?jX5Lu1vQu zDmb}=^W}6(V#jW$B0tHO=H_hH`(FtN4PAzY+r7DOZG8B@LraeVe)N`T!;6j$zi=Mm0O)K|4V`-t-KeXFsddE{aJU zL}T>4hW^}jm*^rJzxWtui(dC5P(yof`xul+P#F*PFBE6tOhIX2)KzUns32OAB#NWt zs+oy9O5*+{dWEm;Js9(e0of?rAGma!E~Ew3-6P%^q&V_p#2q6r2|W#y_F6Dnraws} zH*!|w20}=t#I#u>!J?REF-)@RXB-OW@Pd9!{?coJhYDyZ5On3yySwMNY~&P8&Y2@|O+8c+tZKj*veY+1%6 zP_7EgRS9^q=HfKcEEmbWKitTWST7`86VZxnF5g*K?^I>!M|L)cu#NFn?D*DLY)q8! zKBJ|}OuloU5vzrm<6xIvZ8tanz}=_CKU9OUG{Yjw^%bLhn*p)2ML?Q4`g1k$lXp~8 z^JHjHZYx0!KWWkq1pe4HtM8#8y`6V%=9v3^En#&%BPRs>k?5@arm#^~=y{;&`p{Tp zY_knJxVeXI9`zTvjC8FjiY{s_-M4QzOwmbQcOP?l6y$6Bp&hB;%RVp)DL45#TrQV3 z-*@Vx%X7qVairI9D+AYRt%~1Nd`P*$Kf=Dn`42356AC7%I;bs`48)1JyH(x25#c`R z2helUd*ZX=dX9J_U4x%>Cfia1|De_3SFqxRtz7kI6-W9tG9xRHb{qWv^|c%9tAU=c zVRJKEbxWja>?5oM%CK1tKSQ} zWZ`;}G5aunQQYtP)JnGiX7t%hN}GW*)XwHiy(&6X&}h*u1L44gkG2|=U7!6)_E-#TS3~>ZJ1_hwp1?td~xg7?Wz61z^xh8 zLExkW6%Qq*N+InqG^bv29#piKcdlSFqFS7{NxdfeE#X~pIxew<<53zRVWB#3Zb0x_ zH);6~yBtrQk;_~rQ6&ytL3P@!n^X2!Na@{=&7?hg75v@(xzs0lW9-4Jqx_q`q9Ghh zt+!9g)*$KCSE>Wu=kJ_+8_kqUuJx0{O+Dj|H$AkA5E$p17fLC50~-|M0bUu>Ec>@W z;e|;L*Uskij&w;A?g&PG0H^{Wx{@e^27AlSPr8qp5RFKC4P!gb97|u?4Z7!tdUl&) zu7z89-H(KUK>g2kt9XSJqY*(gZV&Bid+BrX1HK1VD`D+R;!3|ugvQlx#PbC{Tk45o zJmX>P*DvAabJi_{nrw>`$!_K^Z$qe_sihMC2a(8{CD=x_nD}S{b-G45g+o19nit&TaCdDqur25=5=nt%k8(2ga zsbUt8ru*`{%foI_;f(c-2kW+t>5&z76E=9@QYJK~6paPx%`FHhzJ^hMGq-E$N2*Vb znTL{YdPyzy7)vevQW!nb)G&8DXws)wPCu%^yzl4h?67ALe#<_vpJh1V){>%_I3{2< yGb}em--MBS!3@+Dup15@8UMUWrZ&hTmRMG(vM_WtRr#z0c+eNFI75!X5B?9S93L_O literal 0 HcmV?d00001 diff --git a/devices/surface-hub/images/sh-84-clearance.png b/devices/surface-hub/images/sh-84-clearance.png new file mode 100644 index 0000000000000000000000000000000000000000..8fd0cd2c32368ff02b491429a9600f0d89c39ef1 GIT binary patch literal 14090 zcma)jXIN8Px2{`v)J;@GAV^mN8X$two3KS7f=Cw=YUm;$7^H-%p-GLQD@~e+B81S9 zVn85-wgm+#f|P&|5eOn8#k*Gg&bjA2_uS`vKYVbtImeuHjCZ`FB-X?Tb(BMZW8c1g zNA<7hnC;uQAH8qiA0G}M1n!VD(;oqU{_r(JY40oV7g_`^{&c%^?b5z|l|<-{0|dDK z%jXKlci+Ba?cl#Zy1bt`@7t%8r>}F#BG7L6BedSj#dc-ws92OEVcPaWug21)1Ez)J z-G`6%oVaR$yf}A`E{M@juZzIm6DvLW=_r@?@;hW6^1x`YQvu9f!cR{3VtTTBplp>- z-mieft(bt;;9k|PY~QkmdB!$AcS?RrwaZUt*pAtC(kZdwnw5#HkcR)Ac$)9yd~yBc z=&c;86W<}-+>s*^`pF6jkgLh!rEajYFk#*XDN6A1&Va-sbNKinqM=~)hK+KdPPwe_ zHSx+lTo#|+{Pd^8vJ&n1V5%qURd64=7I^4NMbAE$_<{fI-UN+9sRioQg}kh8CEe(8SY6O8T;;b z9T(^gN#CCOQYg&@aqri;j3Ni>5?!Ql81eZx0WN;YADa9t$dF_^(s^Ya-- zroB*H|LQWCrtie6048*4;o5SX8>4CI?ww)fU%62i7ox%n;7b4H8R@8dU%GC+^vd{N znSls5f3fB*g;G-p6#wRdScejw5>aa&S!|t4)tgQ zIx|*2Jk&%hXXVuq|4r zynb?#grYvR5i@tE&u3`IdQSGYXpf7qeeJC}dqw;P$>QfqfHmaB1;!r)raxI;KNGk8 zYLKWb8kEYl%6N_lUy0pO z``5K^NaRqYG8vSlZ+?Tc``BTYE?v>|{`>N{w_M;@8n`Y=AwJbo{(iRp@k}0{p1t#v z%nM=m9_Cv}c_D_<9W3RN`LsZCZzuQqMWEW67-}m5`UyRYe0pZhUy4Z)@b%RjU>!ntQTj4+hwe4a{~^Y;B$F%AMu z{e*QqtjZ?6D`=E*&r9ihe4C_xa_v77q}{CP+=3lsyYAQ2Sjvvi-B>tE!_4R8Iy#*^ z_7{ng`aZKi=(QSdH#YRim6~pxvTT=LpsYv-pvv(=!m7pmU%m7>EJZFApzjsxw$uC1 z^Awq)LJ|6y*DM7acl0HvsmzSU*xkb86e5q}Q+ZK|goPrF8O6mNtUcWefNs?wuep1! z^>q@G=qFg`(Nmb(#)76f_htbU0imdx)5Utg|3PH@T5sOASw`N($OLNmdVdD02Vt6d zH_W6(;~GML5T+t0S7zb)faP09t2>tKued@;LuJt6XboB8=|po;7XtvsZ(yD^@|3+{ zmc7!@rR}8+RGmsI`G!7IvH19I7}*eZ9#8>PMV!!wBf-Gux{sa{hgZjFEVR2cngY8O^3@d2dsZOhE#9ourT5k4Hs9Yshf$4 zWj#a37FxMD>>rmR%B9s7VDWJ#$wlXUF3ml0Rk2CUJEYgyf8$XAwIIag8B0JsZjg*q zFtojbuyH9ZHNDAFI6dyNjsG)&fg3k;nxuqWv&uY^Bbp*YO%d0ZZ$!;iyQ)~F=D9S` za`sLrGuXOuwM$f*)Q0eBO_~&={O^-{)i8KQzoYbE<(ZZip=L+htyJL)A z|Ly3HYzxp+KZ{#%{gB9hpkf5Y1^I}vEoHhtZlajq-wia|TV3b)>lNGIuu*oo|A9|% zbS&Gdzjt;`7={k%vrTa_m%HJHe0DZ_DC0wVb{~(Fu;E~gTU0H?Sw1@ne6pyg9N$#S zZ{%$R@pukh1u%SmIhFRd&nIXd0it`)r+c(sR0WnjZ?+H~D=)NI%S9jhr)f??R(1Ie zxAD&XnVMj|uL2IE4reav2F_psv#);mo!C^)pY-huZAwp5m6id2rM{rP624ozz4t@j zDPdd(as3hJ^#Rm;f_#7G%{@t0C2joq$kM8*HZbQ)5k9<+yigq6Brj3J`=LDCK3+qL zMKfyH2*|Elu8rB%NfEQ4kQp)3Lo#A4vtB5% zW=u2k>+M;mFaS6^3qGwjL=3TkvgVWgp{*}eceXxBp-_lpLu?OwT_#TGpCct8?a-H+ zkYy#fswjerVm5u9bRcW`9b20YObKuGxvFrpHRv^j6!Cc4aJUpJe4@c!J{4H_P_x*8 zSG2r!3E&L|4H^{M++Kh5n;o4rN<4p2D{?cI#M(lXrQk7Lje+>c!V96GMAbzU>{01U zBRY++=Y9cow8cI$AE?vmJP>B%rDO9^`%y0fKN8;eU4_@VM>qfe1c7$bLzwYAAG}Wb z$#a^hF<>4iH0`*hG1w7Am+SOsn1lkPZiA)PBg8wZ8EBMw_JT}agv(RgDOWWG9Do|2 z1rT(Km1*&D^n|(j6m^8nO5uZHw}FJU&8l4;9X z4&LBCoGV45{YWz#NGS%>3-Y2VO#13IM;n+}l1y=SorWTY@7Y9*g>jy9Xt6p9aV~TY z!=(u;@n$c|0){lP47AI5iJPz_)Ay$ganCwLmFDuLz{>Q8Z;WZRC7#=+1?Vj?M}C4v z<*uIwk%k(;UcT`#yxcEe0dmhaB-2{y_h1vhVTdkfa4e@;e3Ok9aiD1ffy94t_)2BiUG2GcQfoP@j%2K}huF_P zd>1s;QKMIrWUPDpL?!5FuSfHiITTCoI?c^VlUX|n!y=vKkvBt&iA=9 zKK|otbvt6gc7CBI+m0_ECmA8uN-=8jEvQ9zLt&ZZuW zGfz)N%DVuV?%c3%-OQ76FPp#nLf$&+4^@X*jJeJdWzc00X}fg?@NFZbN)-_s=leJ2 zf*$29sM;rP(P#7;W-iVz@KA)tyT#sr*Gy-thbrwvGUK@piAG3UH?2M)AxZRqkCur) z+!0wIN3Y)+JvKC|xlJlAc~`5Yv9O_3R)I_?Q@(2BIGSD3vyHwB?(X~(q-hOKz=`8Z zPImv>TvoNP1HXykl9!>HmPE`Vva87}>LH%K;ljFtPTX(-{>MT~Z5DgA{)YfF79x)f z45fP@>owhlTG@_08{`Rco5JD_jc`5B2x(eGIqygPiQ98vG7ekXdAL$RQ-1dsBxcAi z+n|S%Qe22ctJ+)N2R_CaQ4)?y8>aLVk!Wo1w2yUSgEJiP2z9@ z%J28&>}!u)sU53uqa`I8`9t^rVRyw1C|o9z(Z0cw?Ukl6ms z4w&6a0-rKatDawR;C9XH?S*u1=1o8iLqf!%7CA`cttRkvs%vYXW79S(AD8^JyTQDT zrnW`EIfav7=^PVCAjXDVEmB%kL=T7nakEvB^>s2`Ft&fFNHni%DVi5aA5s?!x0^c< z(PgZ+=e7DnHX=lVRdY#GbnDBfn!NbCGxl5t$uM4t(x$4QFjo=LWwYFa(pqk^fI*$j zkY0(jo9fGUObzhxewCsMIiqFx$VF1V0m1&d0Ik5y+5@+_DnvJi z11Dp_RX+I9F(CU>L+!G|r$SqbP%0z}Px;ej8eo>6RGIm6_ZE8dAmTlTI(f^G1`T%U z*P85L8D_B8NF0q=+U?%pX)7|SG*GpAUUXpe(D{q4dN-xfh3Ny@Y1@_qt)8GMk6ce1 zu}@rgBkgDk^Z>YFrGrtR9KL6N8xtLvlbj4Wy-w1R#O5z52fDvrKX!3l8#39?arJ*0{35uRuLRDJD$nc(LGHASjkDItGR-+Qw z2+CvaS9e&V(S@=+f5aJK;yQtI*TbBmFQ4x}k%}&tL42ygsn2p);;SEYu~Ka?4{sS( z)D5sgdCD{{HqcRI1bT`KuP$5t3_7eya???1zA?W;gOK`Bpn~e~oCtf%DJ?1lp}VJM z?Q|%YW7jfE=050&bZf(s8be$zIS67rmkQnlEs2>s<>8GRLY+?wSoZ7jij$39sM$r> z`!1t-*?AS5LpO@CySC2BgpFpBtS-G(Nj#i?nmO2jT?S&uwFrQ5K%-7Pgdi^Gch960 zpXxbA1onhkGO*ogn_6vnJ|-|EwE>a103RpHSDGB8SUjR}AO z;_kd`t`<~l0`cfd5J|G21 z{7^&|4hTF`KRM`kNJpDIqgS3YiRwn zdP0ZXZ~GxozID)`Vnia4hE4rf1`0#2zt(OKq(A8dzaH8p-D62U1IRdYcGOVqPr-&N z0Xd`aNP^!Ktwc;V$;UK!{u?buY(m{5kEZfli4bV}_$IZs4km^?DYTVxMKEr79ZsAG zRC>%-A7PH+5qODSQi3zJQ9OAB%TT-lWSV%&L}Qzfa_qqPWeyT8)T}1f=B~{#>>uU0` zX;$A8Bzl67{}Q|FA6f9`1N)5hfR6;mEXiRixUfh#dg5%nwbE|^0H?+$=2dcd>-bHP zW|}Rae+d-qNAW>RvQfN^P(ISMnr$Xx6?H=n)1_`cWH|%=pS~=+*zT+eAC``>eT^2pz)XOv1(s(gG@TQ&!9iQ2LmO zXVu5*!a*f2s!4`0F9{BeL5DAk*~god?S-tOVP(5;`#5s0S{{)NRaV^uU5EW6R_`J4 zc$GFkow+Iaj;;fSoO>L9U4EiHj7#&>7#o-jY{>{6UV=_(lW9Tz49PLp7oyQ1ux`)@pV{(0BcnW zg@qpl7NaElV0GkvwpBeDVS5d1oLZ%l-q2O@ndE1}|hpf9^kwXtAs5!w7?;%WouBX1#;GFQJyE0&!=*2z4Mg&P?M(2LxskQ~E zT%uTq*U2BxvMY2|iZdb1ohxeR+uS=YhW7M{)Gd#<!fddE)wzEf zd+sebcNV@950p$cFq^SH-pKOq87JSb0(jj>ZGYyK#e0XNUcNyw13?C4C5<7UKs^J} zZGwyk$$p`c9ko3kp1T6;TYUU%d>1W z;;28jf5iHZgF0V@uW^~No)0FH@@DaGgZHXj^TA$e%6j#P+*VEJmH?F93A}S8&M*GT z*;oF{KkY$!I5;@dC?$h4p5SJRifQpqR~(c?m+0wr$4?DigJ#_PWE#Scy1#@w9Qm7gmAu4;N+yq(-BIw!t|ipiM?xphN})6C!?rkolZ_WI zv9{dPh+#MQN?gK_CHb`?I<>672}F*U1c#Et4cOg>w2ScBBhu(?y>bx^|KH5*$xH0o zXhfH%2GbQy-H#%xB)@`OVAhU+N{r~Th~qakeUK99^^9@o@3W84Q%Vw%fdFh1iC?+x4eWQe}zrowac)UPet4a={-ga z`DO%@X+tdw3E)lU=4e-bZ!(>*Q9vt%5Ah%e=i|9*?~mwy_l{m>(*s@r=3V9j;5Kub z*Qhg9hpKLpQfhZ;v$?{=kp9zk!TTz-YWQoxLRQgrz>O`E3dM$C$nwe=!uOmAl%4u# z{(-AaaoP(pyeP8w1$Mga%4C~E1UU3L^`uk6+@sG49XYec-qA+HSe zzf<%%2@t!02bsM#T-UNu6Hy7Ay;;5P9Kkg(LRShMlO6VRFY>tl40=tFuxj^6@qMfv5?N`U|<9!-9|H`&TA;pJxN-hO{%lkyD0 zbS1^Ji+qj^*CGdg3c8v?VMehb_F$URN@yTyqL9DVYL3v+wY8f64xHHO7p;ECGv0>m zgDdj;2;8xreoLBtJZ%zhM@GbY-vUXyHF3yeTcJH4){LDlqSY6Gsqn?H^KFYYchd8* zcYetvIVMWS121MRrE%T%JKrzIgVd11g@BVj)-o94@AD~hkwk~2&j=nQ0f?*1VZ~?|iA>Q&|oF8$(>W?um^nrYH{f_fOvg?OY zAp7lmu-&wN_s?()TO0)HtWtYFNE`j$Uso1Bf||}n6ForbvzRp`8Ax$85Qgj*>X?yP z0q@PP(&V$Ib<%6FmCg3-MP|(wlf1p7xmA&r^K81?s(R9&YR?0lBVevS{jSVO^!Yey z@#6!;uMSq|)w0Ak_2;$Ja0cKim-tYjdv5aCC+qG8TFXzomTa$6Ztt&sj-8%4ytxNV zxO9{+$o}1tk~YcO09}eWX;ZJo%xx-kb9XcJ`{=@pagkMX`zim0;N9(`Ln1yq%C*8l zE5qZ`z4=&Se$^WAkT)VYFYP@#+~I7oCxz49umZyR9x)8rC@x!QI;c#L^`T4ids>WW z*bgV>2;4YvLY9)D4;^;Nu=Vev`kbhUo1lQB^d$+#`)_^D6edl1M-PowI(12M8J+f5 za;H8XY=#5o2*_Hs)j|U@^ynKXl{m#3hzz>^6wZWwmLj4{6C3+ijCC{zkCez02{nM% za$or;tOCe>gQuewqZjsy-=8%~b9+2}cixojxLYN(rY75VP8v}Drz`@^78o}mE<}|T zMOzMZ5V&drfS~FNP_k?D^Q0R}?M6w7Hd?fZ-_KsN>byaTKCbbHX#I0U9q;eFd8%Zs zO(DGqduQpJE;wmvRw!5^$=SUGl*vVZKb!90iUYvR>?~*OPKf-MFNq`~N>czYEow8Q)9KnNr)JaGP&3faaap3ClxjO9XY3&i9j0<=YNG&Q-h1o(Fqw6K=|tTxx<51! z+_lEHVWfDV5;0tZUHjvoire7S%0bR^XCJfgO~0d&*z35X?>yzIQu7Ep+@GVKS6c*O zzNRtRwp{Bq#f`rupWWRHVcM<)jr0YqO!no>saroJM45}BlmS_)zy6S}w^nF>)N4b2 zTKPAGdG9c4zl8qa<5%W$Wv(h!ezNEv4BABNLBNY~$lRKbNc8B^qmMKg4}QNAc3jQ@ zGofhKVkDDD?rriZ>}`KM-TSltAk)0>o1@% zgtO4v;~4vd9TWL4QIHqZiyd}TfQb!?H^Rz1#Du7~)R%AYAw}^0q_VzF`=t%r{YbR3 znj|X)+$F#FHCWSh1iHyG@2AJBgYktoX3ME+>e~9565bCqBnC@>?JKu^^)+PU{S9AX zb2q3JxxVD2{cP-Q)zkWejZ7=@iFIFvc#ksH;p?G)#xJB^pd`4;poh@^5FlTZehsnb zxZqATuyNAu)*e?xpVbNU5-Is>+m$-TjjEhf2?W+6d_-ECr@|EVgrz1;PlLR`Z80)_ zeNMY!hkrpGGJ@4(?^krkf+Hoi`tyv#2WW8Wpz@G!C_%0FRQN2RU9t07ru@ajYVCtNU zs-%w-#5K>|Yjw6Q(t3*3TCebs&^MzJ6el-zmRc1)8v0Qk#~CGmAvr*Ad+u1mj?G+t z#G1vt3Hf{IU`p<{fwlUy@VA@KY47X{{{ref-i}$DF4p3pFSP>Nexhitx|3bdq0BC> zGL+WOw|Pl11A4a`*4lQ2`SF(W6L&FWip^S6y6CnJLY3z{2j-%dGQCf5asHczSZ8Jz z>uFu-PbFFLZEcWFzRENH z+s~2cqUCqa=`WCaK!r^M^RRx+i*EJ?hzBQbDjRFDa)Gk;HDAn)Fzr9ar8Z+`bQ?h0 zVS%?24<~8m@IAdiB=9ob!oHU6O#zua6l#8Xk`$o#Ap_$ZLpzTlBV@fqsc$?|pX;bP zh9w0uOl9p3L`g360d=i3I#B38*TauSHOr=+1Gg;gkPgsJH9*_NI|%q9(Ler<)LyM1 zDVFd7;QG#iS61;&n_d zPRk@$#t=+JxIY-s(R>e}^#UPk9X^$?+VjhUbQWc)k0C!S*`-*lU1{j`Am73~rc)wA zathv*UTRahdID8S(P1deqrRGdJuvPn3NoOYA2;V#vZn9WKEZ~1%sG*M#jQef7hV*} zpg%q1sc>DUQQJ9!$-L6-BE9|P4%mpeekIqQ=!>4tLqVlU8LH_@s4n7>z#OC2$PqCK^n)6BPju;a*foUPZ9XqAgBI0y>vEtWN4+aLl*OmqWG*|+*R1gcEjv5OqP z4mg^=J}Exrge0qzro%T4aLGQ$_fXhZKGh1)NqV*TA<#b-X%!&m7xmT1K%lK$cr-Z2 zmP-=Pd}uspl;WKODJ_?qRBo30Oj8HWEc70 zHo}lQH|MrM0ZX-*HssZ-B(`HI3M&hywyBatZvuYnWw|{3)u9F{oQ1d-FPKfk7$adzKL9j$9Qd)j!di&IB^lLPASdtPx`TeOK)lJ8X|)H(PnQN|2_@J z3L6$8Bs#Y=Msj*sXjy9*xvw)UQ7XBLf>pfDKP?Nzr;58XOwQ0*?QbQLgw_JJBMB)I zH&4zBD(CnS{1`vEw_p2@&AqL{=j*WSl$eNg2vbjp8e|&@w*ur&{rQ;(6(60Jj!RIs=ufeSg zUxTVJX!7^(>m>Wz(bi(Ezm`^NQcLJPE7mQ2Un+}41dZS zCwI~duQIrhxfvy^ozofD#<}t|%q;fAmdwZ}DyqJ+cuo)W$f39#1!H$zZ5w_8qP85& z+KBHUy#HE#c(Z$qV{5l-GjzOkdPjGn#^hz(by@VzW;xOBs+sqX)8?Wtr)wywU?j}S zFk^QqxqpzquwS zmK4--eDmVeWy31$OW0o4z&CHxWWDJaLu=~eIUY=C+`~47FEMP3YJ>I3-(*{1u{=I;HHg^=Uhv5!fGe zMb*1`GCN~KPWD$=v@PF<@4Ju2FB{3$^<{3p(a=~RZE&_XF>2R?TSJJSLgzHfs&+PQ zjo^&d2G;I;7%?j^^b^S)dE<8cW^W6F!r)po-Oda=x6u7$&)YiQJsUmA0zYbA_Mu`)2bQ1`(t z>fZS&ZL4WQ)HrIAXEc0vG-OWJ#z2F}*o00=hZqk}DQ~G|<}q0Ka@p1rO!`Xuo6OaV zsFNAvjHwe-5jVH@oLg+{jRrz{yfS`0-P%<75{_MB;3qA~ft6Lp+`DJIv3DVS?;a2*Htgi9Ebi>A&TWxJ>DIS9 zps=I_n}3chi2cfnSgG6Dqm67$K5O+pxv+U=%AT>Q^<%Gp#Y1FE(=fqT0I}cYKBDz3 zbH$k43@$@%|8SbbUyL2ac|oO@A;b-}txc+bl}`Fn=<_LWuZbPch(+3+t&J-wU*MVP zF0mC{1I+MEMmW%>+8*~@+)E$~k*@2CSvycI;|Fy)$^jFB@o!vh04k0%86kT!=Xzk< za?i2vC88D^erco+F~g-d8moL((MjeF&9#e++PAggr6Hm~!@~H@t1X1e&J_?r$yJBMo=uph-; zvemU7qi6cO#M)C^Utg-E+3zuAKT-ZnW58Rz4Gi7*-xWWRIlj@@GnhKdn!4W5f`P(T zsx*QurKaFL8BAnl*!R;V3!3bP1^c~C2mVg4UwWuzrz~7n`>?er*yk|#+^Uce6|56j zQRUi7JI|2ynOmo%u3oK0UUJ#GDSh6hd%6lcx=7Ki&59~Y9m0vCqy6TayjB8|w|qq}{o#m-GfvOn8A}}NQer5L50BU8 zZEZXhfB9HZ8oh3^x8HcyzyzZ?#$kxT1tLp`*2=B_jOOih^zW_3=Z>Ijn{GePhWpV{*kp2*z${Q+;t~BV5$LwIO7yMzEIXm60DJj&N{7uoTFX;Myy{HRcPGx|H*MSpz6Bbz8B5!iiImR(tt4Y6If0(f4JYat zPH4?4jgYnt)(l@NLoHXvzEJGD`x#J7R<{Fxtt_J5Gl)xN&lwRTT`dgC|{&va40B-k_$8{s=j0|yi zRWvzh1n6)|)^T{EQuOmM%q3z0qeka6=_jexr3KG`zA$LT8?_!{sO09O z5&nhmRdc7VTEIkVJJyk|4dE`8(oi!ax12A01Ea9*xDZav-qJGQhJ}#mW)Ep}Q#t~k z8g0Q>CLj?}5Q#(}&C{h#tSHY;5iMM{BpI5{TaK9Tm0pi+ zB7aYV>AduK$cq3kh%}LQiukjrmZ01H#PhuUL5#^2%$P~P_0tLe*n&4|2=(5sM&GHi zw!6dETa?KwDKMl6chCH`n^kiw(gWDZb9}%~x}F0%Uo)mJEDR9Zl$PY$)Gg$Fq=J#}Cxa|+N4D;ZeX{A;f#yksZqYtXev;^&TV7}=?l_=eIuigYCDtji8h zJQ);x-xV0g@cZbQ>vpYFhhL_EifFk^3q(`i_{S^2IFJ-;xx-(En}_@biMWc)oi}26`)?-dAl$s`wFEsjX4Ftv+DPkQL9m%>S7n zruf|OJ!_z@r_dT{4=cACacm12Dv!bGnHKF-hNoUgdQ<6*e_WtJR{~n1$DWBb6oYiw zOC*ld#lgZiX8R7ND8E^^mMS(tg`m8Dd?Vd$M8SeZsL z!1cC2_@6^Ji_D)RzHzxEm2vLsXwiDag$l0+gLhUCqG$WyrvBxzUu0N$Bw3yE#GTg6 zg(cclmuBb)c2h0Z<(EqOD>>F0tz>3vLCikZMzp~p_`-7U6=us(TrV~akb);{%lvpF z&r_sKico`rr`v?7P+ZTmHM?~P9uC{e3EVq05Wct0Dfq?iY-Mi;$sF$ez|W+*Jn2Hz z@;a%aO9eVS3xBz-=lCjszsxMTD2;@&Z{#^se!4*X9qM7Dqcu;KDFVxQn{Sr>v{nqw zS78cyVK<<`0UIBCZXTJv7kp_hKlR!2c-@rq`Ne|~_@IV^%(ANfMo0<7>1Q`-MCYq! zCXiho`;-xeff?|SkTMtp`rvsBbtu9*eL^E+a1;3b+CF_< LBb{<>EaCqEAa5?W literal 0 HcmV?d00001 diff --git a/devices/surface-hub/images/sh-84-front.png b/devices/surface-hub/images/sh-84-front.png new file mode 100644 index 0000000000000000000000000000000000000000..8afa0de18b2d1a566806a059ae396a21a5e631e6 GIT binary patch literal 21697 zcmb@uc{r5q8#hk2v4pWkWY11RW#0`#mWoEipoyOBLiUVp>}!^?L?RiCB}=l5$TCG_ zZOBgcE$di*_f*gGeV+IC{`qzsqr*M-eO>2uoy+w(Kj(RiGBMIUOT$S+LPB!(nx6Iz z5|T485)#r|AWGoMzM-Zf@E@t?4P8x=vL3EQ;1_ZSjq4gDBozs?N46Be@6>L37M>&| z^dE>H(hk?x_ee-?nP1b^xb@h2HJi5jo>}1hs<4ROS7!kv3e|Qy?8WOBFTxy1NHv^8 z9O)nInt|9D4bCfm7{U$PB+bjqv6vOgdJD7jKA}3Q~mhu z?L(h(o8}Y2G=acS>E4LvkPpwUJRHh*$$QO>bM{5&)=qO-$t~@9bWiTODbN*G#M_rX za3N&Wis=>xC7d>N-q?%4fOch2yDiS7c{!Hc07WARYqZa$?x(k$Fts(|j;W?MqYtKJ8;b!5j zbuyCmJ-O?janWo$;)N60@<@cQVRi=M^kZSmp*KA6m8MwOIVmOyKCwjj4!x4A_jKB; zPA!cg*K3X!ruw{nN{d68#$xVk-%+MuJ6hh_} z+OM9N7dEhV`Qc=l`t0B3?vneidRggfrMSNUGOV-qziXLLcS$pEzNRNk7h~aa%zN%Q-^w!$^GuhBgFOyh-KIm z*6T4KETB?zwz!$hS>!5|>FF~$axa&A@m~$UUt{k-sq$R5tDnmjv|Z8}KU&pGvkWv| zrQUkgTgtlX5Uy#;{e#M-?Wa;k5cj62N^IY$xWB$V6 z$VK~%6Ts8FPzHsNtFGUVSO_SlFIWOqT?$xYp6`6IWuSkdav?3mtJ1R3sS0Bd}r?S=S&S2?SiinT6133}A#eeW&MXVW{H6Yv^IhB}ylXS}QA zqN!JAQ~Iid@XXJJue_NP{nkqpZr8Ohxl1)9d?a3&z}pnIue_xM34EDtr-@?B;w`oe z!`C<~fe_MK?-_)9dMztRe$QxWr*<_K4@r2vgohxuO^jYO@vREu6Hr?yAR6RbKAK96^RwiGvbg*@8+AwO1w4?fX%$rtnFv~qK$ox>e&i1e zOyz2YvfR5+5w5$HyNH)}it&G0GaZ-KzVR)25gU#VTNEKL`N@{YXjfN#4RiEEwVaQx z(ElJZX;{_TL1I~5^{B8m=YXYM593EA%%pTQd*!VB=Ga3JbRtO`wc!@?i-rBL1#XXNgdMPn4JZgp zIKa>?=Fy~;4^tSU`o3Jmb|W8#6Bha^!#D19KBW5)EuTxEti4O{I5nhA;>G?Yt-RQ1 z1={m93A%YhILtBrDs39|jl~%*^YyZdtUDEqjRL?uL8xyNm09dl9Ph6Oy@E{Q&of8{q&yte>6i1QR*Ot z!Wiusb$DS~tGR}0G&YDCjld;#MM0PyTo49?Y|6arNQ!H30-m0&une7I_qu`gdnne{ zuZIBwI-TZo@|c%55(`?Tu`kAg$rOccII&D*0$3(Z5Cr7RB%z;t?UtC~3t+JQe;zPE zCCT2yDw1p_A9uY{I6c}fuK|KMinQg*(F0-}uUXMcf>WDf6DgKW+MW_p3_KTKrJp1b zLpmKv+0+qaKDYY!Eg?X_-L>tFnYAkoJmz|Ek`*bvurABiw3#byMScXaR6AYUXn$*U zp_^SEkC<||WhT}xgY;D1C-&x91XHl-TZq1D&)--?? zy;9{!L!HK$#1Dk2;}=>!&DXCfR2(7GsZkOBd&Wst8LtJUt+bU+PVBeTrI#6_?pe6g z4{Wx_MYWA8ujNgz1emWieV#)II@#m&gBWCKzeR4rgkZ(aoI*$bbwRkR(SYp4b@m1E za=ua{Xov_j#=bUzF|O^6iagBfEqo;)^V;BeL%tp5n-V(!O0&7h4;Cm$;n~r_-{25L z>&m-#O9|61iFllsP`YvCVE#7ngC-EX3xI8QluHG9&#w%Wicl=wa4nPy-LB&PR^&1& zNr6xQ96C4W0?wDz{V?`AlLxCQ52jg8JL8! zZ_Fjj%T-+D)aL6M`-MS*JP+b)4g)*&xMfoV@#}H8N~+~)HE!B8R%ZkWcDm~)BT^}t ze)A@32PBgS&kj0Vq{{W|QAp1TJ~;?>+iYh)9bC5Fd#5X1Kbu@$ucL|5AK9F-%UbFj z4SDg&=iJj?vb-F2&*3!gYniW~VtpCIUpkD{IB_dUG^<)VJdR1u=25De&4wayHHTtY z{h<&&uQ#29=F!i+&Y1Tpf`;Rk&BqHLJxbP#Ri?ZJB0QcaGJRcq$zD+6YanjK^QNdJ);Bc7fk0?I_PMC9Cya@_sK!^%3VsA8>*|Q}ko$ zd||1EmCALO5zJKNc{!IcpY6|b>mMitsRsgc@#ZYU*8ZzpMoY`A(GO^poNtVX=+CXH z4K$dhy}2s5Zyac>mfXIJYK?!wui1xj>UYOv`Qn3m*2(+&Q^ka}h$n=X3t|rH7UlmJPC2wh4iS{_rPX z{`u8dZDY){S7qk?b`N2X{qCba8!L}4A)81mmECW{O}jkkOvZe2tDg&_)UXm7}Cmef>hA?z2{w_50QBc|ZMsz;+_>C+_mOfNG=9-Z z9Kc@RqD~p)j-)eR#Ih5dbd#&?izbyQ4MjJl9;%dE$B>@t8_X5CaAAI?K1Cw8<4n4PMR0&1?!IM@{ph{SsS1~E!H!f%j$eY^ zZSky?e;hI&{@jbsAd){B#D)W}rG>v82U}12lWy0$Lhf7*FBKoO&66BnbbWbgzo%>r zl}3SQjlW?Lm*1jIAGrTlo_vr4@fPiH1-b60q9feZMXYV=*q zqZrI*;u+voffpAb_-15q>^SgYm(DUj+epjeLD0E^w=&UVYBVA|_3+VMiGx)eFa%gt zn4>fk`un9keQMgRV*FqpZ#e8&j{>)J{xmtvkr9Z{n$_$;a8ifg=&f6vb> z0Xqe6`k>Uj6!^YH{JIfGPCLZIyYHXiH(KZ@{LgK*ydto@cUg?iTEtUz6@jE!HUrTN z1$+GaK{i6lI&V<>T$tnee;%C81v{)7)AY&wmgu4trYQv0tR||Blb_G9H?nRDI9Rw{ zW_8e8VqSXaP{30PK7BHGgpXzwKM|g`diCeBavFSRIa4bJJRE|e!pomk>oq#qB;T{;$T zyA3{l?Wk&AZhb7-W?#JZA@{iS*7q~RPh4mGjzp$U={T(@r~UPU5BFyhPDkd_ZGz-Z zEnN7GR1ap$*`LZ{zMr;`B5k#cz8(k`ZjXAz_`rNbwSy-G>#2n=2>meVRHbtN^de-= zDts=0Vlij(n%y-ZIV2+?{ozYaYxk3~Em&)-jniE@&7Ep`ozHt6n&TsN=d5b8nyynd zno-O4Y{8EidDEt-pW%cUN-AM|I3rrEW+hnqS(;@U{z`ds5A z=~jAbX~=ddaN#6*w}0``3Hx+t8mpZMSCw6RG=paBT5W(N08sktPEQC5Z^X5$V+}BF zjT7Nr)IYS=#%%hnd2icvIP6p7Xdo;iFrP_ni)!Kn0K&QRQ3SRkHxgNW2eUEC4Z z73RL>=ZioR6G7GO%-)RyO}>06(u^S}h!M@RaW#*X8o~lRdW!_hIsecw?3^MK+HbOI zrWUlvcQUn$cU5bN4u2g-d|VL5?=1-1X>l0VI66CxBLbsJJHEdFXqAt=+u+^Um#nEB zMP8!1e^jRZ!<__jD?$wBz13sseXU1+Cf4E34FLI(sMDDX9;!*|IkzPFt3s#T5UYA>K_>muT(jU$FFPYorHHw?Q))HNZDl|-~KiDrWsoR!M+3LZ8F5ZJKDlEJ4566uuRv9 z>Gc`zmv#f{uZ@r}Cun4FA*&e^4I4H<7$(zkiK1i?j0O(+x2M|JcS~F54`XcNwUoOmHR&jT5YPJK z9P5V{_|+yByLMN~rtatnU{NS}Vm=WPZ)!>vAFGa@=Y^FoFFX%9zSM>EYG=KDxyFg_ z8IT4MEv%jQ)926Jlof{v(2&lFdKIf&s~|0#s#O! z4wsD+X(^R7FSJF~eaUV%MnVA0jL$JxBCYEDYEKP6)t3KoxlJ%r5$deDgm&*A5k$zc zPeoC_Z4b;ZvlW_QM6^LPxAZY026WLWtWS}?3(g#|+L#O-K_v7+l^CDjpS3~R9v${- zIIVd%q~Ga-Wtw9vO^a0M#O+3PX7_gZZ#zAdnV;7PLqa#7>5iYxkb+e(1_Fje6ueay z$oA!%IZ%(q6;Ga;D|;83VhjUzGq{A1P!7#edfYDEyaBM#4}biWLh&FJ+zhJlWB+Q- zb@uB;7*{ruZnOS%6)ky8|D0~kSgBffhFQ9uvk=Vg_3t(P_=)Vvo}im`9Q@4HSULS8 z<0@7rf%>F>@3Ug|#(~(Qwddg8ihRe+i&!MNa}nI4#t?I( z*RVn*--CsATMyIr<+s}V7SGsui79#o$!@Tkv#5OKhj~BzGQKNLQ?jtk0fbo~)DpwQ zBSm%H6J>H;v{X(0&?QNvnKl-b=I=#@%dGX2wmErAuaG1r&Yn;IM}pCf(&Zm*N|Oth z;^qNc;>8{&!NKw7nU^4sabKdCi_9-#nFKU`Ta_^Lqp_p=lMQ_4>ti*}cn$M0{Xz>& z7>a{vv6JUi29oX0j5Gxj#2$S+4+d_uH6Qy65UMQ-z#5Rv6@0C$MJ+y%ThU3?!7Gc^ zm>dvcTAMhulFyp*Xmb85b+mO<{IdzVfK1lwEdP9~sDsCS`t&KmM=@LSM}c&8eiZSc ztlt~%NKh{d5NvxBvp-7oICJF+;5v$#C=u}#l`x3z)Nlv@O^>gnx;CuV2;bRklZ`{R z--hsdmjkw1%39B!R4EZKer8K)g_W)t<8k^eB44ku5<7JJK%k!jr`M>OFN(=oMGfH0 zpj^P%jHQ&>8-KM8qMn17OCSFQD7Z2`Vr_09T7+X8Bz^VOdezo;+FOl-0FfI`k;<<= zU&~}&c=4m+dfoMxtwW!iAB3_-=_LYwOd8*3-W1@$IVnfhN7_tUK@Hi8mt-rvj^SlW zExy-AIbD^+)FvuKWhw@HJ>$y37M&vagZvxujIY|nV{+3g?V$n`_?lVJ^K&Xh zZNjXq-uEQ)^MBbq5kvx;7{z*B5-?gu>Ua^>_#qPy#&9G;K;_kri1gFfugLEoAMOad zkEVSNQI!6R>%p|+h)a)sFm0{qfiDj-z-Bf5PV+g2-$ug8E-NeBvHd(`++{C7{Fz_j zHOzZKQxUXCc$aRTx`y7Er)Ao8TbyL$=lk1fG;G5UmUp*i!aCnHURs^fWB;%fCCK;L zw7#(nf;r5=r#M;1@(|VY<6IosqiWsF=OGzQ92H~H6d5wuH}6?H6tzb|gVxc>h?|)A z`X;c1AB${UwP0t3ewGu^PLA7nr)RZ9Qsd;hN9{X;v$1@F5LEDw?>*L_@)v1aqHMz# zE&jG;Fj{MtoECBZ&Acq%vsx$mZurDn;D8yU%#exq}U@ZyQxux;24?O$-` zQEWWbBXkL$*|6QA0m{o_MoOtu?kk#J~4(00+#+kQ{CXtY#)MfD)4 z1XBMha!yVR7S#61EZUK17a{R|eSNFmy_%7VYO=E1{NhY1m%@=x{jO_)gvgSZB%}pK zJs7$TY{n;l59K~uL(fBN9R%8nqe&ZNS8b9082S5zy2=o?B&?X-V-6ZpFc&<8e5E{(?815-8Sc)j?-Iy9zrJLjD#Mc&d#+)7qWFe4H6S3CKtr8 zvj5`itQ?tZ+fUB65OWF2dz=&osH=ZY=MSMW6ct+&bjkzK(CdFZo_PEYQDx71e5agU zRWC@Wv4aQ_zv{Yy+_7#W7)&EjfQv&O{5V%i#bXr-bDj!aF&B*Zlt{jO4P^<24jV$IDo>iEbPWi-{a+x8=YC+U=_;n>$a*XJ z`xv#DB$_-|bhP_+PB^t)4pIbR^5(%8kUJ8;hlmk=DO9y_FBKjYrQ6{c{6b4PqV^2< z_QtC`a|zCSD5RM;+9oQ)5!>qbogd2y+5a-Ujf51tFBKQ%cz5ze2K;ytO7ABx68!A= zz*v4NjM+Mdc`w7s%DtVnh}(O_cD*;P`DjkM`KVJM;nP!giu8oV9n?;fQ%5}aLs*ml z-kMpHQ&tFlYoOOrRqpYMqRnm#8ADw;g|vhO8ibFBn0xqNQW;2}@(iHCjbINd-9NH7 z@3#+*Q5ezCnzubg)u|Hnf zdl`68ccvqcAlc-p&x0|q;k(j@Z*2%~Ef?nJ%RXGWccpf4cuH2K z|7ue1deT(D3~0^Xg_g+MrsCC~{QQdCst9Xl+Zx+MC{vD8o>97b_h5Q@nj*t`ZQIP$ zJ8u5UF-jmlqbp6erJ+xE*1BK87U?BKP{T!=K4CaQpbYe<#VHV_(Kx9FCjq0HhT&4n zJ*dqPVB{FJQ|feUzeT(|@@{h6_2*Zel~49()SgK;Z*_~isxB6!c+8EqP)yl%)AkRq ze|x*!-o%x?=2>UGtnRTLC*!>~cEBl3Ir4obP@!g%LZT|h)1}Fj>RxKE5$5LO9O+O@ z-NIdwkRzplgSu89M?Ibe9OiDVZ$yT&!%b@-~^V|F^F_wPwNqS{J~~wD#=BBk-{agL@OaF<@<>r`>P|-N392vD z{#GsMAwM=6w1Tn+Pe3Iw2aFDLLT8rhHtVR@CZbg?Ma+Mv;nr*k-T$o^&(6Kr(JN1 z#=IFAwjd8kKY9|$OI!hr3+BD;lL-$Ti2g<-e~Bo2BndvKi(~~SmfXDv+p{pW`~y_M zN=)cOJq-UDk9Nzj;0W&4T(G08HKqyUG1slj7>rXNO-~0f3HveSJfRy%np7X)teL#5 z`Mrr_F6v_30)xb-lk%5+7&f6l82}oyUA=iTP~rxF!h2tP2Yh&pJ>)+r8C@Vd2sx<< zI#s%{AY`Wt7f`eHr>{tJa%H&zVaJrtFSZP*o))}) zIJ{oTqy<6EL1vQ=e~P;lNzHs1FO{E#^7dgSm#OaIJ>*f_irJeQnc=fTm)tb5QO;>Q}S~^&t2gd z?WtzZ<2O|wrDtXnhNaTf>}>OTsF_Yf4&1igN9hX5Afs62JSSTVmaD>g<}2zAaihL{ zADxvn{KytIopq>(mctV9u2B9^K)X!n&P4cJ5 z+LR?y5sRFmz+I7O>3ulLWuA*->Bm=$ai~RI)aLi} zFk3`DLw-Q?HS*3~;*Ql3l3ut%jSs!LHgvwoe2_WAA;)%;dDip(q-EBycr^GoOtM=lbuB8d+=A*M(7ndYIuWr@y?zuI(P&~m+%SedJ=wX%w zu+enX<`;$_>rvq*bU@b2gmFkfL3j(P5@6le1 z`_UACFH1p(59GoUS!oNsmf2;#5o_cw-r!pK~9|g~3j5os^T@A}E+6M#92UmFqJ;(fKAC!+aK19MQ z9o}o-D`-^#t#RJNybIFB+*t2yJu1E}o*Hsh0XrQa;qdL=#d@e--ME!1MI^Y4cJU)c zj8|uRkiEyZ-+umkU-@>)_%?cFOs}4!O=T`I!g{CD;C9L9-Fw|Fh9t?RhM#JC*Nfn& z)2I#QZS)63v>dgHw|4RZfRg3@lfXr}i$&bOQf2@>{aPDkeBVt84(?ROZWKZoC_}!; zX%_phZGyKUe{Chb{|@h;MDd6Oa)*y3{Kplv0MGyLm>AjoMUp8{Bp-uVzXXg=ou#?rfPxyhN54DZ!o9k86gxtgh za9UYFKK7{KYZsJqgU`{*tT1)xS_VyQ^Csmi>hyl zzjs5%{Dj?LKHq;=@PS1lI(o1^w?sown)(XFz0!`U>Vp9oXW{CVTHa`FeeS9&Kg=m% zWM&(!n|e$?t-LfAqg*d(MQ=y8Em8z`Z@Al7s&sH2D#hdL5>ryUd*bTt3_gr{9`SF5 z1CDeP(`qWx33?@RR53rWz8((CCX8zs9-I#YQkHw2G2mf)yA(Yp(Pu?;)i2e=$UFkHt# zLi`-RRWsF`6VLZ|hC1j<{Jmu($*-+%D|S3Bx+HZ!-IVvZ7!mm&6R_t(wjX5Nw=iL+ zG5?E2R2Dfm6fTc{V?g~)YJZL|n;T0*AwC+<@AQ2= zTamZrPEg?aWXYN!{aw*P#Wia99joO3^!SkvW}dF>*?xJU_Pr$=e*b;>9?pRq*SfUI*Rz2e+jT@sQ0}l1SBO@@=iUi}z<&jLcC6}rC2$IEHD(N4pZB&bZu+#t= zW@W0Wdb9{)(@auu%U@@y#u^vP#1QlNNxwYj~joD9tA|%zZ9q6~kLBPxlS}8>gc%~E%-iaqLCCF)3tgjJ_Tp_VO*utGUvF? zR!!&qOXlu))2!1XUYG3b?7$j;gl4m2k!ZMbF21smKlPOuR;GSw@c^y(FKJdF-7%N! zZUVGJHgLPS9SfSDS6?L#4oUES&;6tMecwnY;I;oOa^Ie1fxw5_<15oZdq36GZYiKi zyB?#{;(>cj+w*|h+z{@dEkG3$6LWqP{PTS6L=fRqlyJ^|%gx-w0p0IM^Kz$BI1HNB zsY2O(f~{ID74bUwfk|5Qa#_P#JW#7Vz6tdbayQl(Rj&Xzvs|z9XA_$~rQ7=l$08V% zH(Dxe36OS60AM=}ziK)I&=;;Tv8c{<^~A$m4D+3N9Nu9FF3F)kWF|nh&uE^#O!qc z71^~de|R?(O>;GQ0U`>Di)j-9;|K-L`a_Fcg>W-p=dcWBtTNtfc}Q~qHsl`OU!GxE zR$9!fJQy_p`S{%B;HnfH-M0d3Yq7t53B{dN+u^O4tpFN&huH`AS;Nu{5B6mG-7G9d(zf%iFP@(g`r9umklQ;Z zsKGdtjrzL<_Hg1RF;~Ggoc0Ai(;8Cc&sa-v>L)#Qt#;x!N);2|!g+YGf!Ma6s(JVL z)l@n0{eulhT72IzRe(2%G{%@LahHhhcrjkv8RMiW0=sBkj1OWFPum>2Kfn;SK0i2(XNdn9)uPY6tAeQ&<-yg#tQE3o&3`QX?evK~=ZkjmK zV@8gN^)h@Z8T|7g!sKJ(Le=dxU$KX{%emt;(9drf@VxR%Pm^W-Mw!}llVi%Hc5mMT ztqd+uvX_98joOfNh}S=CcXB9bA;#`@7MM>am@%?Vx`sGfiEtxH(UrW z^!K)(69zP_c*bt9z5d{0n7^sxU1HkspaFhh8R)bwM!I0jfzP0;e+SQuf`<#->uhkS zm3Usgx6B_jin_;Q@Q>Hi@8<*Ct>kWW!ase@T$zP9N)!y^_YSJ}C4Pe5FlW&2TX*uX z^t}(WB{wjjtzrj^AWTyI*Kw~yZNoxS;rBA`4)=q0E$Hu!i7|0ue9BPITs<29-ajb% zOxxw|`BKG@9T8)l1}6oe$<2zbb=-TF1>wRX;Tdyjr&ROrt!aDRaTm^MewfV% zKt!c!OToGxa%vjJGGX~8v@F#$pFWSgM-g)~<;_4q#ziFJV8y^N1)l_PqQv^r9SSLA zhX%UlQNwr)`nBnWp#3Q=2~q7-K=l@U(X2pncLw-SSk^dM#L)6iAliNIlvdmE73O46 z#JCl7>%@65G;{z=7_ow){dsp4f7@%fIWXJ9>osdaEU{qM3KZ{MIg7Xg0%>OWcHFDdhFzZPCM?tr>bdU#RTVBzid zh~cukK(!Ag@(Xbck_Gfa_n%%b@CjoW+O$=&ao8y?kMfgeSUCG_Rm#tTvzY^{SbfbJ z#@545i7U;)V_HNPykz4TfP$0KuNJ}^J5pAYWeWycr7%z*89;*$sWnVotj_-iwBM2N z?CYH75wb}#N7uwix2;o0hGvC#UM94)i5{p3NRcJ^K{&Ponj_g?kI5)ou`L}`UKx(S zK?RfNIDgG>zV3yj?t6~D%;(RQ#-d-^?X8WM5ck;dIUKxOv~qj2`Hm@2StXlT_>3-?l^F1rH3t(2fh!sYl zH~}J<4eM8zdd}2My7xzp&(!Ob=^0g#k#vT%=yA3FCv}P88KqAtn7hg*6dI}dI($7QSA2NoSU$Dwf%F=5YBnhFN{Dc#q_IP)T+fr$12?MbBv}J z(cwbis~V?W6X#}UWXghdnt!~CPWV>Wpp|i`D(9Q^ajT4{W8gTks(IUfYi1C2gYx>>b=sWrf3QwiZJAwab$4jD7_SKAfT-sj%l z@`~vpViDA61uTB2o`{1=E^?8E%^Bb7t1|z)&9;X^KnJ=}ugq!XN zy<2jq@|@UcedDx`U_K94fAleWvN_S;EkA(!8ZZS-ok=6P`$GVT)U&>2BkBeyx)XR| z3~rgf#a-r^abC@Q0eUGgM*3HJ`^x8&fAS zo8r1R40OVf?S|ZZ93ZF^qa<{5;X~s@v{E+qa`)Inj)3!N=~0<)0eRINE9W4{6nn5R z7lR!jKFBJAKH^p*)mI;0`s(Q@Vlg?}o#t1e`>gv@);V>akplQ8-+rs>-X73>av6vq zbTm?W0j58mCW;%n_`YE^W+4W%*qfLy!AAy9;a8w;{+QkE+hN0yFyLNxU=DJt*dCov z0@iRSa}+U>08X3u=B>KgQ-Nt9u{yK`j_ZSq<_mZFw24PXPc^kUG0F%4A88_Nh@kya z&ilO*gTb^$3tu4a@UI*xN~fi3_uO=Yo<2r99`D+G`~+y$_Ev3c0uFd#%gq6zP4#3@ zEJp&h4*eGDtzfs-2jm6?lMmV6jjvH!J-W&lUo&0&zuZ!#m1X2ir}mX2 zY1u59_3+Tufb1@yr0t6p+3Lb+9>0g$(7t`AeXq`H{;rU^;%K4ihgIFwlgY~zw0RT! zEblwH$SR(N!W(;{3xDkjKO?&KPM^9S<__|jsffwi>S|fPy6Vn!7308Wq)19_eN}16 zB@r&g+_`?1vb^_TuO! z!(Vg}n9zSdrh1RS+sjk5+gvnq+aD=&ayJ|)jD2S9reP6PN8>JQ*T@?4YbHRcSU*9S zfkxB|L)eh5=5$-A2Dsu4%f)L>GlJBs`(G7`Yd%$tRf=BX374=)u%Vw)w!K?tRWQDL zAY&xCE*K?)3Rp8ol&?~MMb|pfbPh^o333&uz^{YrGO~sjAJqV*M&;pXZPI^W-NqweeaMxA- z?AXE`e9nk+F+TeOXebo5&MS(2cE%0t%f|y>_ik{oNcz>30r(NyVZ5szrjVRD#su^D zq0|)*dqkArsB*nS>PWm7K@HBVfk*UzDvPCL;I`G;&%~of!HpuuJtS zqR%=6u+Qk{=jZ7oVN;wQMEG0^lK`3pz)CYLXtNS?6*25HCSI^8X?`1TG&%061wjQN zaDCJ_)1e;0jG?13GQw0ME=W;%xhN%F2#1@E^B2I6X_J}I)W7j|+mfP{^7lCTk!WZF zF~{GtBt~IEiFf~))cF$==)eLhWw$-RE(xOwvNkVu>GfqI9uQ^PXIg;Og)r3`Kl|1 zo;vI!#kR!W88a5^h{VD~cfshnfT`Ch8E80oRumG%QG8p2ms@oaU)j=w*%nfyjeTksn+nK7pkDkcZmSC<`LJ z*(mY|^=E4sh5)|qLkIb?sh|){l8imV^@Ab7n`kx3{O?k%=T1*WCZCKyEXi`JR(B z>HSCbBM`Ou*akH3eWyD5d-!4s8Wsy8`tvs_nAt)GK$-F02)M4b))8;vVgV+>`l%yX zc>+vD3YOyJ7abUN?^K+F{L4?8o{{oD_3L~6niBaIl``uN$dmL1SY1@gv3XmRx!}iN z;@GpHRkRq<{S5|8XcPvI3|FI`fl$v#Y6TN69bL;@eeKh1=sGqWcPqh9t|RL0+Ld3bM)i7 zGB~g^(I7p8r6D*_cv#10D4TkZ^>zY2+{tm}+d*!f`;G8L%K2juM}KO`Y)8JRVOHb= zX_%^UV&Pal!W1npoxeeq_nh*^4qKL^8U^;;^IDeUbKgo0%n1k78bkl~!NgDhEu#jwGte={YP3`W zZVo%Q@5%nT!gHbLrX&D5ffIEj;jpMq88wuf=g6yJ@v93!!R>A;y!}j@LziXP>jegR zLXsFe2bRW_qjFUhr$Re~RZX!`%n}7u zL2J6mK_vj4UXjl`$p13C&$tO$Jtar&a}>e(jt;O0dO?w2R>Ci$Z&6IW*&hm1{}!iD zyRY2bsMK6y`Gq5(8A{rqWE^tJuk z(boWqP}Z1EV5gKn0NG3z@zm|q{Sxe?d8qTNlMDBvE#p(&3-SX~0h;S3J(qV$GSYi3tGxRYL+CbkNneg%vuw9$xf_L-><+8$1A@0;{Cy-Ohi>W1da4A3?sGXY4 zC{@}{4Eu)K=*z+*pj9RV08;sLhD&Osb{^-_;Zr=GK?>0misf(L18Lmdhk#*9^xYSP zX^{xeE23C!SPsn#cJjYa18-m06|Ex8!pRM)IjGIgx@nf_ScN{G_|@jd#teY9U$Ki= zU%aUEcILbe@(M3tBK<(nlmmjNgg6s3il|F+(2&K|&wSWtH!fboxaI#)fvF&mPnb}H z=7u)5P&*`0yc)?Q!HTJL=nVGSsW724&JD)9o&%ccLA!gVj3pLr2tU&wKLNt$Z;I&G zI4js&NHdb%ZEWJ3J>D{{Lv?Ysn*iASuS_3lhte-Sg;T&!rD{{wZZjIcwSyo4oJgdJ z?1%jT#2))shg>YP#5liUXrTYq+^T1pnFsFTOgDjw=AVGyi2@+=*~m3x`Y>{F62ebk z#u7U z$*X!8%2{G(ED2%L8MOy=%k6Xlt#JRR=;=@Jyx1k?ru%vLRhJ)+6ssmPfxGB|n!^7o z8(%50NLcnKs*#FQ>-$j6R3K6Mdy9Yq2f#eV-?Ghh)_iX*O~cyw=gWUfl1e>9ih8AO zH%&oHSWGl3@+6zSQ*hg|f>8w!n>f;cZ)OXBP)v5;4!GGts9j@ zX{^+ywEtO{tQ5Aj>9JVb5?fm@f8*Hi7UKVC7TBIkZ;@Vj=UNpoVTzlvWDo9#VWov! z{{IUTQOqpSbf5Hw7soD^ZW_Q9c0c|v@<5SZkZIMn4n|`K4eC;6iGa0o^|9#3QLNN` z=ZIQP5rfrzJmsIZJ(4|MFMSQcT=+!-18j;M|1MusoIH|3s9Fbe-@zd_oY|Q^*MD`D zCI2>2nu{=uYQ)16)wWYi{>MZ(RA(0HMKeu>DzCRv=%XDXx>FWhZhE_kGLJnxn)rTJ zg={f0eEFpOCdO@i;sG=+#0%KBGfD#YvD0J|34E&S9&_5lu;+5FLHfjykh`wmW=8Bn zL*GID>+y%zF>Gi+Q2M_G4SRVz_j|5{kQiV!ja<3QHhfJH%rR=6M_eULb`r!r0UBIC z_w=Ze1-AGoBqM-{i3$TI_Qp;JE;sB78${_~+?X17z5%BQ5AnAhJIl< zqCE`%-K(6`cLsaNWw(8DPt=|rO>D^9mpHgIa|#VOzer$Ii~B;W)ebZZ0G{s#beSI_ zKekgXC&Jswy>%pzUVKR5+gI7Zat_^(J&$BGYY^ zk2hm%4EYXMiOuLw$msWVJNppJ!{tD@W^dXE$47Uk(}0E&>f`T$;J!exZ0SKkG2JfU z-7^fYD~PYIYV>Fau$wLqUik6ePQEw%9F21WR9@_Nu|>AC3l9{jQN13Gi12fi0oS`u zbpnRw{sMxld zo}xQBhqVFToW>0jxkeJ94wcZiEOkRRbsls2IXrJOS+JTsj|8W0GqR6)&dN$YYwLd9^?3Vg7n@vOvGw z%d^l>3xHAD6;y&}B)o%ePQ4Uc02N7l!r0lZXkayBIf zTndEQJ9%oS7wytnqukF__)$+2Ks4R*#gZ^wnq&imaQDPa0fDR=T-3Q8wo3bH57K5c zO@0z6&SW=`75St1Avfpzl}PgD!mX1MLuI=-Zz zo+V#yhMC7Quf&E{$TmeT)&=*xDub7{PfKW?3zCERYSO+1y2ciLf=?`le5ju#%c{&f1B&F96@ zedsNB$=w|e(D$C~jFt(Yv2O?J72QYCbBY7s7S&;|>+uHTE9aDlSF?=I%<*(wIdQjM zAh!HesLsq}oSN=3j|?Z+XD3u}9qZi%1fc@EV$kO(_FJUYt!$XqrA5v^u<~1c75uYM zu5mH+wzcmZ_vqtA1DnHP;=6w1P%qo}hlAxO^5lzq0MSOd$!qj%qLf)aN-b(mIcy{x zrp=Q5I@-P6K>FmXSx45!^E&m5TE{7jbsK81TV>~*C4v_puC+Jqr`i>4GL|(4bEcI( zo~PvjZL7KkeveviS@0MRS3QHPquMm}PC9?pscvhjr2PAx0ks{@m5%6cU9MXG@9CnR zeSmK@O@P{}O}%2=FUY%WtAGrp8g$3BkMUw*f>!p&Dtm zM|)!_R6F$+HCr>s2yUa4-lfm`zLVmkpNS2QqyQJi`9dGFA3Nf(D=glJmHbAhl;*iB z90~L*RFeRWn`ccf!XkN_;`ZO;%wC3CR%hk~dtL%c0C%1M7E39@jQ+}~ro9n2WRM4Z z$?7c@aPo%uDhUP9DeL$|278DgpYYr&N4*Mqe}k&lQ9Lf*I>|Wr@arMi13)&!$qh04 zhTY>R2ELq+NSa4(F<1Nde>`QBBzA(6rBbs^Y4nB$i~b+i0SfwZYwr9P;6?(_0oF$X zK;O859D9bI9ci@+8kz}gV_>l2Xcjz9HLK!ebe zN)wFt;}EekUQuvxPvns`PKvrV@2@rkLrUN-N#b30f-qhdiEifbVnd`!I*1K_$)@@f zzdX;kw0Q40))UB>ywg38^{Vu|tJN=))+zv2c#qU0dIa9CU{d=8Uh>FbyX-ee_O6L-rnb0u`JrVZJY*wdI_UoQc-;Yuh>)@sSO z%M@x<=-OO%5q&@>Eisuo<$h0wC4$HMcdncTzVTtQF%id}8EYQ(s8%_TSmU8LOriRk zv;aAGaq4-!dqv1)v*Uh<_)-1k4~*!iCjR0OKaK11PY~+tzKtnn#LuU8Y*0$Q`~mDsZmmkz89k zID!9yt};sGj@nDTH61Bf7$KW5M75>VdhE30a_{SsFIqSk+;8*|x1?2PRbo@=%mODn zj>=HPYMSI8iWPj8O{G)VeTEAqLNgG|epmlNcAC)O^{OFbw(5 z)W7%se)pbx&bjaVocDd6N2@l~nvRh)W_*?;?>cxm$uG+~w&lcS=z&I1A^-NFS?QN_ z0H3bQOmq{g2 zCSRkG|7`$x@Qdh|X%Al>DPk>}JNW7{Lg9^Ic@wK>+PFD0lsYXsVn|PQhRoR^YT)a2 zRatr|q8DVsnl!cD-t8xM|97(J%Ruqiql{pu^eNu*0DM%+RUI6qnr|kHCm6<-_?Y%e zi!>7-RLjqu@z1LyJM)#!)T=CQ6bW2h)GG3#XCF>JD8}%Xulg`8NWYlBd|>h3A@(AF zZS+ZKM$D8mlPzBso=R%J?^$&SD>2Jl2~uUJO!r&mPZN)tntHc?%ZPsamsMtBRLgmF zU=99go1y;U=e|iUzcwsTtE#bcl5Q#((5zs;4bdoWt=U@DNK?XvskO6x@SfhvYzGM{?y(3;PiG#?3n0)E z>$z>S%Ks2>uD#L<75iSUj-(+JGkPNt{W)1B7>kFd8jm8oYJ5fuPf4b&)5m(HU31X1 zyBkorznivRN$NQN*5Y79x>LfQJ)+TS?t9b<_VPDMh;<~y(zmcB!{FNk30$mz+P8!6xJ?5Cs{Et?5lQxz zz057PbmQ$GkkX^*<|9;1JeEHA6n1YIHYXaqWOYB}qU|{wI=BOsO5__YS)Kr`r8Ura zL8pq*;B(OyjW0c?$m0M=fHdMJT#s7IW}kr@GJr~V%uJ~BiDnv{vX4w;J;T>fy99Af zM0O3*%UeFTJ&mAb5s6;{wGG{lxx7cUyeAA~4CliinwrEuAP#J61Db~oS<-EHwA?mt zU%Tq-_*vJi54NM=Aul3#fyK*WHN+`%pQ2j`*?Q{DnjMHHv#HiJw{Q#Z*MAsjNR2Yp zzoSx=BbD*U{h%7w_V=;>`m9tMV|s_X70~v&AhiOimX3_#!x4DF$Po#lN?v#c*s-L7 zGl=lBfNRTZP=>Nc0z^WBeFK3^2M%xqni38Q6^fwE2(-ZrAj`dG{m1;p>+f5Ho-KM{ z)A#`hqCwiCEPO0xj~h@q=5NAfGlzRQ0Vhq82^N{d9d*MmJ-=+`CTc&Ch#yApVuSpFu0ImY+vvXNnScY=!?{|A@cQZ~ym5y|Y2Gp~64&a=Q z{sne*{Z^^o*;S^R15jwW$9$5DVslucucg!Q;_K%k+s+TwzMX?Sj`$E&l1l@3Up#Cf zf51C!w@u@U?o;Y*qmHSvdfE4dbQ(U}!CBkQYa5Fp!;Zu?1+^s~JPK`;AKDhJ6^$na z%ZHqiodX5Y_UPrOBZNoQ-wf%rCEP&W+rCKLBLW~gpV5W|(qwd4uZZ_b3(%Beu#%NO z6e&&CM7bFRW!UPu?2IBMMq~5{EGK;ZR}aygchO;|lgNByza15I_NFb@dk}=w7X>#n zY9V}BA>Ha#M8D+J46Ek(Sd?yU0mKn2bLK%D{j}pOl${@$M%<5PhsG&AmyGYHn8xfzlY%ZUz{Z4h25Cj~(xtEc4#~oR~nch84lbcTFQdDM{6Ys_$7+XW3d4@kRV&9rrH?>C+f}*=8pj0G@;mc_``zmrPnx*V!qicy z>Ez|!g&hS-6@?tdASeCgTLM8a$2~{3;de=}r8{>H7r?t)8=x9wo|t!QtSyVh9nR@p zn)mhi_378gZTR0uSAa ztd0t?sIFs6t9@{N7d@+@x9FAe_}!6psIg+;GiDgO3-)Qr9MUs-?~3Vx?o=G3ug`dQ zZ8t~o{Y0ffziW&j6Mws_y6cAnbbok36dxjZ1S#W*uk{c9W1>gbjWf3so4in^>>NiE zYsV@CRQKI%6OzD@&Qfqa7qwv9Z6xf#>0hg_3Y8tN-uoPkDoYT5>GR?gLl0B@+}C}) z{&?46jUuz-BdA@ZF-B#=sOAkbeZG|<60m+#8ak6{ItaJ%a^s@m1*A2n1@bBaGDh0O zmDR7<>p`R0#~(XF)?uElT~$$-hr-b@7YyDlk1u#=vs4iMa*c&|MJjFxY^xD@X2J+| z&4r$PLrXt*@=#zBSGxnD9G5L1!0p68?#V?wd1W(>{+W}LxyOZ`U}ygRiQ~|K>~VVk zjFOZuRLX3b4dbX-l0A0sa;NJNW+#`7#d0nbIXo=2e0sisIbm{C-$e6cXuP*K)X1iB z?41`l4Dy7#kt0L*cbycMP*)Y8Ix!U$ojW?O-E3%dP2K9jHzy1#4hnvcueo&Y`J%}a1J ze#K>S0mN5iNyE4eQsUetLnX9~d{k7N`L)Lgo!u#=4KMT*amFi^Ett3IP9dRZ8&c?U z84|SiPz0~0L=>_q;E3nCRvAe1=ElC&W;g{qW#1c!G_R;0z-93u^2KaVg4=BhLn(aS z*D$y!u$b5bTQL-LY4By^K=RR)MZL$FKKD6M%IgvLBxoLRC-UAJj#qpddZ>o9VbBWH zV=WWT$ESBnxpqxRLid%M->j}e6BVqho=L(@I(<>UKGMa#UKZNc^!81(-<$8#Q%6Tv zmiOu|2Q8mZ+uyLdt9oDvQ)ZAs{2_)r<)Q#EEyI)gtkp~BqlI5UTg28Bi_}IMmy2~9u z+Oj5ABObCo&#&1owa#HND0Yj{a6tyC7wxIBaygpWvv7Hm|=R74(;4S<9Vs1tO}-~XIX&bQ|zn?2dxnRniqXP%jNH&|U&f#4a{vqz5}5qwaT{q*S3V;%HwAPyG# zdvOX7hTdT~e^QWsR60zvi#~V)lv0s;^r#{n@7Clg`WV+iQP=s=Bf_qKJ{WzV0`o_Y zh=?BPO zBE;jmxD>q|C0?k#2$p4xRDAvayQ|o`TzR-#0lsGbZ~Ob)-BQV;+9iDWGo?y30a)$R zf7>{I=0&ZGr_#dryg{q15C7dT!NiK7SWHyY;@wyc(|=M-sfBz=JM&Th ziRNXBz|#6pkM5UD1jYZ;i5&~Gs0EPA|3#jpDCz&4%HQ7pwZREq>byPNvXQ)UyJfI^ zUR$@+z^^BdZJ_tRfmlAF(23V~8W^s!{5$Wt+zi344w%Lisj_extzrH@n*8vo@w`Iy z(K>b$C)e~&-Q$tJ^)v?7!U!8{|7VatIFne@w^t|W(RBYury5x*o&VWP6ZWqBfAaDu zN_k5pPG#Smj%CK?kAOb-|dV3P2}I6{T7Od`2T85&!t;wUNpx=q0{O=mB^LtTgvr6 z(RUKWR4_>x*c(U#k9Tnf8D{@n9HEip%pw+>ED(X&e9FDeU#T zdC5sdWvz|YCB0kYO5FBwoVrd!uJFOwzuZt{=vLdqOA$fiJzS+fSd($;j2<+f z4FB~ya!!}NXgT)66Fbc$vNuGAXuk`jhk~82;PGzk|4nr}!Dz*e0at@Q+5NzU%>>*cUcRbK{8Ix=K=a0+b znU*8hvNR#kGB4L(%B*RGNONv{olDtpaiTDrz72BU=%EpEUX{LtGw;4%k{s^2$@I5j zJ8j{1LgG%-xf7Q)rkty8vGQu2ylpo3zZj}${XvVU?-MJX^E~+*Y6ky__m=H@J5b_g z&NAKWoc$bQJJi8A;_kez%^rHuw4x$hbG2NKc1U1#z{J))qM_y6n$nTXrmhk-dA21> zrbD6sVOzfVS)spA(@~?X$=6j5qpOcq8^1)!IL`lpgr?E|9BChqLZ|7VQptJ5W4S6( zz*dXA@fpZ-gF4j9A>3mz`>K|6_NK9Raj@OJn~6?C-(|+Y&A=HR zt1Y;l>SpM?l?W8PIjl393sm_x{wkn8+g9fXb3K`;q?zWthVyybP}(09`UjYL{zmtx z_@*W+;JSD#>w`z)<@s#nn*GC8HgZ?CnX@SqEIm}oihC5T86*W z%ZLEWjWD5a-`tuOVh`J!R_>1c5BfsfXPTC4uIjvR>b6)Vu0EWUJzSUl)di+bdERc& zbI1ysAP2gDUnIyByr?j`u%DC z(4y$OaMid!bNT5|_eAH^3Mb>cK#5zElYRy9%0CzQzuPWD+t^OT*TKX`h?|+#^O{o2 ziNLeLcGT5V5bm?aiPWP>8jpjDTp5Xns}Z4_Qem(E4;-1D zVjrioBaol+Ac&5u&9y-&R;Bh9KRSw zH11@DHqNWiPm5yi2QmF(!#6Liw81n1FQJ8jYUgc=wi-sfzMWKrdlf^5^p-yncDL*s z9KRt${NsTFS=qltehY6Um?ded3g>zf{$xG8JsCOvsP>PWn0EPXh%PTnAiGJ1enoAF z($F*=w|XS9lx0`CTE(+-=^5mMTGSci_Rt+xC9wnhrufM`{b!a3&=G0>IG zBeUUeQCDd`XLrZmZGM>BfrxkIT9^iU_vzR})c*g#t~=2E)2TkJEOuZ*#1Sz3+2m-k0p362)^@XmN~Se# z8ubKmAmH5I5Z;~H$KLnb-iDpWPVr4KTtmCP?iR+vvOwFn=WaKf2+^*5sMrbZF<1eT zIw5}exxFZ3&{()Elu-F!3+MT+ZRq@R*5Gy@3vC>&2^3xwE=GL5+xET(o^-Q{JC0)E zG(OxNOISGHgV7PgS=vF~itz7=aB^7EUNSnbj2FPB0~-rF`-9`_nK6$&R&EA6PRpS) zFP9ZZO%{JOoBLTAH0MVAgJa#wfe#NGj~w4G>9U>FJYat}p#GCC(Pk&=?(y7C_*y@j zeBSeTaAmz5)9`vcetCUvec&1mX$I?Rti8PDN6Ta8T=>jq{aj49(e2KeV zf1l;OroG=qAGfbw`+|)ACJU7vv`jDfoP!|cG(p>QsM?ObDDJKykF`#JxNqKah=YUp z@DJvHCpI%nfNyY{(r(Va?e4s1)EyaWv`FL7jsgGCxbaTLd0+N5E#@H2Q8W=oA2g-z z{7wm2HH$Iq*>XKq_V(PT?T;RL`X{Qcc9EvsWDzHcIE=IExKf)BsRqEBm+u>MPnz~$ zU`zy*a`i|PVut!?(x;si24IULeBcC~7i|xBaQ!%-ACf>JwPomx99bkRoum%9c$XqHVO&|74m5H_ugI&UR- zfM$Y{ubjpONDm%b3GB_M#>67quo?Tk@VGa!TpV09S#$o)pF9)^7cVt&Q6Xxqh1nW= zt&^m)Ex#Fw5SvQ|wKjNmO7*e+o2x0rz%paR3=09Ght-ifNg7XD5(2G2&|2WqfcKYom>yXAP!dOZxV;_5| z-WSKwHxsvmrlYH{=HJ?VRa|`fi1-cEAFt_ zeSwHVd2chUg9`um{ellZuU^PLnStIjGcO0_Q5~$fW8)t3X|KyaeIIPWC*|~U|1tqn z%l1T$?R?Cw`-HkBk17WM<`Bc>LVLTZEPLCzH1ad7kv8p2TDMBu$%Q$Aj7o zQf?YLI^Rp&}Moq<2eBLv7jT5a%k-*)~{HNB* z#uexdDHb85+!GUTP9AW*ldY6rZk~Q#ogZ8F2W5OExuds?id$q+el7BTVQ1wT*o{j( zN=w7jD=AC$939o|C|oQl8LT*v8CXzOTx4+FYq~0JDh0eA3B}`D@7aUanzz=ybRxosBb$>TWQ$pvfI#N!n*1JPcJb$LlB|7J8-#?m5Z-65BoB_0Y zW;mTlS&pPF z(K!F%g^TLg+8S4|p3jH4ldnvUUHow^&Q%uy$3{9z%g^0_0q6;M*|9eMaR4gk^MCQP%GotX^^{A(1%{Z zrP?HB_V-i|HvgvWr(VW6~v ziuNF?ePJdgVYI`DU_RKHz;)kx{2%VJyLm~>zYIu@`+$CGdtIfo6t0g`wEwt zJU(_mpPrv*qN}3f#baExvsuj$1iH2>rTB7g>o#i=h?0+}d+w5_`hN8XX41bDFZC6j zP-Y#OXTrOqjXJKEj*JJ0E+UZONzzPAIe0n0pOxL3g+#c9?`ASzd@AMpymilAtHW9+ zLEJBi`^zmq5>>XwpFdl!_llBjOB?c19uz-*yf&mHk=djS|Ev-jfb@I+o)O=`v4^xL z$mu);duZ{1|06(-=5;F&g4QSYWU@E^ff2gJpAHH2v2fIp@jUk#DN;5!=1uFA5qRQG zOyJ|DBFv#(dTVWA+%q#vDI6_OP9a%?%~4D4Z-fm^fv_UAMOF|2LNVH6UgJ`R z$iaM}7oLM1eSf+9oK+C4^C44?w9ahvwq-3z|4`|- z^tW3Fv#v7+Lx5d+-BDH1!_VS$d;ChxYH33kQbg|RiG6?fzZVG3TV-3K!IQ(e4q~t@ zwCEsHfjP>7F6Q|ZL>ap=1GU5zf#1dqXeqJ!~3N~pjA{Z00V-4uIAgJ!VfTviHxaFYl!us=Bl znBv&GS~U>i^W%CAbsF|!CiAxMqmXXY_WTwv-CAgyK81U2Ud}KI2Gx{boVjBI%nNom zF+_=@j%OB*k=MGy=AdFAO8n#x|B!-$eF?SNGFu9#eFHqME~jE=N8&gd=^KznnIFSW z&1g zeqB~^Stj1k=(Gb--!z&rO1h+l)XTR-3v!Mh<8y#^oIhWFqYE$dpffr-T0&Rcd=gor zOS`HT`N4g`6&vZqe*#;jtW_;xyh(y9o+p;kDuV2Mx9A>1IXJ>A#K%{f2KAT8LiuB# zlqvRL%HJ!K((npmIDd05U)rnMOZ^+;&r{oFHr=|Ms-zdOK0UrKy0KUK4Q%X0-V~#&(RSbNDHc$06IrV!PL+a^k z|LIp0nPHRy)L0&C-|=dsMKictveBH0EfmRsc|S`;f08K9V-W62M(zc(pxZ#r5R$zW zvdU87dm(*OPTqn}Fz<@+ce4w&b)8Kxmtui-Vu1aqAfPTDxv^mHWVnk|60%Oma?`2&+Xi zhM%%8z6oV`0x&#=jCh1}$Yu(M!X=wpRxYc6fjailOSVd8rLV*;JBZ$DH4?@D zlsP$1rZjx=>LoS28r?dG#{@%%qQ~U=yU+6CKyD7{s9J_^lSzJ#RROlK$?x|sX!qmLE z6a3K~wjHS*al65BGw9vRpQdr2u<(p|p5CIb<=uRt7?^Bi?|o^c8?EK5K5t!!VLomr z6GuMu{qKz;ddP&aQdbhgUs5jyz_S@3TXFF)}S#- z!>PXaZPlZ;8bsG$t-D)}ww$s03t zgWCf7)VWG{k)q3%PdVJ*tQ!N|97(Rr*OxRC=7oB*_|vqRtCImU)KSjpH0&+T#_!`P zQ{$S$Eq~L^$=BX9vyIe5>m`L9?`p8f?JTi9%W_{V90GQAd*(4|w&`+DL-OM?QLXHf~asG-TZ-~pIoy$#iOJq>G} zpj%!aki3KV*ylz&hs_(k@f?ahG01l&PfoyFDWmmS}u<3 z=@n(&byspEnKtSaYusFY$WD^(+F^$>L9+SmvsuuJOtVY9n-yL*)G?pvPDSW6^AF-B zJ_bEYw%c{VLe@cqp1oj&Znu9aN@{zcpD%4JeVquSEU+~LmCzh@u<+KjZmiN@NR} ztUvSvd@PnrToW%lS^3I;bi7Ra{XV+qM^=;V&-u&W)~oyk4z`$kk!75sPXA>CLML`yul*dqIQw|U~G<0c*Xm(o~`3N9pJf+fkTBk_>7lu zm}y#~>rWr0OhM}{oSU4d6?_{&6AapK_u8rL*1`RbI+ z@5H#Yb;|YrYC9f`gy5RY4_es7uId@B7sdN1wl9Wm>_H6jP@9K`VI%032>>Az2-vfFz-BGTeP zQV~1?a(&m~arFD`djCiZ#wMK?nkcf%yLk2(U9Br_LnepBo)&N&)hs+{+lcyS+Yg3a z?+}$ek7h0sH^c?Oc|~Hvy)T0TwZ0oiMb`1a8?nl4U$7Xm(La0fAd`0%iyOW!WWo=F zSRf+~n&PLQz=azSS}A}@jFlK#S6&DhYyLI8Yp;-*LR+-j$G74pJZ?vel}Y(Oimf31 z;1dcxt)iHGhiB7!$v_Y~qi}^%(pg$ikb_GJJ4jqZ+}Hf?ap)k!8=V<7HZ`4ctf?-a zBEu4LrgW35JL>zmHw^EPeVbG(^TgpDd%| zNWd9^c<+<2w()(XGYuj~zo#owD}{ByPHD1D+JOAq9YR-PRhB84MjqwUmdYHBv=5ws zlXZFeXpn16_`7+=R=!QOzA@kH*hr4F=6*|razZn5pgywBeMj`LyDV2Jp3GOlphlN& zPb!?MXzxuMkL*Ai5E^ZOB!;wHu7`#i2Hnf2vCDYHG67RYt*9rS%*lf>Zl{iunyD}@YyY*U!mn8s?-1$`UhfE8 z_2y*|UCY{VxnEehKd=0m zyDE1`t+UY~x&EDq+2nCK{70tOb9s+;z$dNkL1~uHj|oJQ+DTs0@m$S~!$8jOIXW(* zSZc{`fJ!l-^__I@0`_5Pm;y^}@USyX4ohvRH_5JMUbQ?>T#E*1tXwHG!os*MTKu{` zD=>}8H!##|XHNDt=;$O9C@=-|&sqEZeZ*??92|g{6UGQ=oJxq*vyZ^uwGAAwFYIZ^ z6z|dH(3?DK;LuaA{l&(}A;0{IL-b<^z~MquuouJ35U_x|XPZ3!QEl#e*yb~Br>GuD z>zmMvxEC9apRi0N2NWoq$>#?+-5@?P+AhadcRpj|#Fa@Uy3KIfAJTObZH}LLOH97zjWw3e6g%xtI7Y)xLGI6Z#bHDxOJm@@k){EVH;&V*DE@q{2! z>gSqPW3;uG{oC=X;)mzi#Wcl;nMOl(f z{NhQ$4~7y_mw~Du7W;nR_|dB~!P!VpWk%F%o;5j1EG!Fl)$aKC_ebp9yKLOi z!6H^f%*@1vEs;hPc~2s-{(D=!`PImj zj2N;4)J#YjDv(GMN$T>W4ueQ+hA#TC|I6}qAREu+^_5B-LhPEW6Hzd-zYv8WQJKVc z@ogOku7}U`U4AG%jlS%il*K;UrEnyk3*r~B+K~%FH}PJbl)3`$1~SYtMnN!wjS28O zOBlJl53=O&IyjTWOo=8(yqD8A!DJA@_nq^z^7ysZyw1DPFnp}ucb|wh(ui{i@i{i4 z2{S>PJ%}iwjUSOflPo(kF_<25Qs$201w*K6J8Wp&*HS(U-mvNSz?p6H`ATz z4EK|fJh4m=uhnuy9E0=)hoZkH*mm%S4}&~QPaidMSEf6`{QW%h>Z?r5gU5((e2QG% z?b?$A(%{d1nBlqK<-`INAN)7W00?D&a$A*AD(&oZ;D{GUYp8^fqDYhd)khc37O5EQ?sic9Bm4&RcZX{D!1PzcwUZvZq|rU>qmRXcBWQ8S_3O zHmSQdsh;brEiva9%M?o!c-%iP1Q9jsd}{M_O%oT%j(LIK^v_Z>Fx6E{w-DD%a$XRZ zyo8UD)~(db0$UrtHkyTDJ>@(3wt_JXT&vy_J1sWi$EE2S#t~8?u>5Sdrtgif zPWvUi_BY5M{%S+W-*)Z z3+!?hJ#iw>^ci(x`JM8&o*ocM9CQk}P7Oqk>D*Yl<~M`QJZpnZtJaoy??Sj!p$AB8hY6qUyC%R!d~B{ z<|`oVje38Y{5{gZz7Nx$w>R=~^QS8B+n#KX%_8NEk=b%H20}>IjI`l&zx^ZxAEIAtfg(}>ynd(5 zbHHk(Ips{+gc%KCZJ;p04?~LtJ``mNzH9)C%nFTSUt&1Ycbj$IZfN|xyxH!{I(F-P ztZ4%OFoh9`&o-=>Z;$gajQ=hertNCXwjh{_56czk!J*PQn_hc^UM!LiQ>{Yfrr3ri z;6%`dESt0XIuQMXZnDbNXh#8@gP?3v+|!ve4;7d>&}|*w7%OI5DF_4vD(!dFRWI98Zmv}bou#W*5CDhyv;S5P(I(bytx5>b$ z9JbSj6Dkxb-Kb&nKBo6nK9RNmJ_yLxD|0CJTTD)Xt@ej|MkDAt=)V1;pw7c}%o6w- z5x!pMUQ=01YwBu^A**rXgh)e-s=HUb0Y1{$V|m>iHDmrEk)aL4UW?T$TLrB4JzzXs z&OA_@2dkf~)8kI!rFT#a8ic8#OuGZt?X!m$J?0Gb7RqGiZ%@0xqcdO|{8RFTRmz~g zC#~{LG)%#MDRThKIXK>!R%opuMMgVc`umS#;=2^4Zvz*J($7!b*a-MHDA#4tD>gb z4T8DCzFI+>G5}(f-yYA4()Eiamou25bi0H4Oao*c3#3VIqEPJp)DGUxtPNUIG1H-( zz^_C!Qx1_S;rG3NPk2NbMCQEp;Y_IRD;gV;2cq-s%s_mjh9?}Dp;9`&$O3{>HG}Y7 zX^!-4OXE9lv`hV5tHS5BT%fG@S`oDxvT0iV)7-Cw&?VtcXIgB?Ao69<7nqE{7WO#= zS9B6o<+qN3`Lo0PsX;pNnj=XsfBo=aD6`oD{wS6~Vg)f|_a>0%ceG5%Izt*JWT*>t zmQS8L0p>6`v7_T+kj*C{ZZYveKajd2{Tx zY!1k`PD6WbjAi6D%?>JcEpKGSEi8%BN%ds>MgiUoO<5IAD=c!%JvuT#6UOG!8!0Ns zpMH_VXR!NU^=zo(W2Ceg<4REYc3M%9$M%-~fbTnW>3OF*69PJj#OUSY_V+k@ITFih zLvKYy7v*NnL?=9HdBNg!Yr=`>mrV`Ba0h_*8Y+qnt`!?2My!f%iSHP~fM8OQd7Y`@ zRdNG{UxI$(nyl`hTWZohZ6#WV^xE8y>Ufp5kwHCc9`^C+PIuE-BI4$Q&aRrR+lqGv zNG*@9_h0C^(}8CiXM_*&(aJ6NP&J1hC%F&cp1WdY$eO%2pG%XFskdvo0K#3(qmMqv(2_S2Vcg& zXwNPXLg|Tt6(^b3Mf2Co3%SVPPE5|3dcuy$)SDf)rKnYF71)(J)?OJQRy`_$%d!Zf z_jz-izZWal%;WLHq#Auuya$lB_z~q%3|r#rn~Og-Jj3omYLvlhSnMy?1a{3VqDgMY zA1dy0?$Ux;)ed*_>BA@cbP4nnalHE}46W-9pPfxymdpuQ_APm-$OF$Udg#4zrCUPO9)tbG9S% z4{5zG8p{36^sL#`%p!qwAhVm8x^xrb=DI0a!X7DenO5F=GfoCTyS5>I>j71>*HF-fAHxJr9Y3mXmt<6CNuVVlBm_W|E;IKrp} zuNW!v2#C9S(+;(nidQbtRi;|Rr3}+_YF1JNFa@98&cRp8D~3v2l8trymgD0h!0j z_1m=O(KH<->@kkO?NYib;D7qcXgAjtKq#=D8i9- zG^RQ-Nx3rl!E3W9e3Ii@SsWGiZoOXn7x1MIu9Ulz-wJAiB}97;9LSiS1OR4yy1yQH zQYf)#OK$jnF@$^1CaZEiTrf)Lqw0u(;g?MD03Yf~KfuvL_^?LDE99p1B zkqCRwCmJKaJm`45=hk*`NsG#$+nnUT`&fb3MUvAdTNbou-xsX zqEXfeozL@x^fwL504~OU)lXlP-Z?<_+?tDt%==CnRnI^pzI8{GS>|6JY^!j85C(f* zLo#v7*iqA}D8I7J&nxl}5{*rN)((la>vqr~b71GStMoNHil-E89magdTRW+62g7@9 z#7AOQPN$~mJ?1?g;;V+QfJd@TVPFQxa@TLlq9{6wC3SjL${{9g$<(sKdmo!`cP)R% zcpSt5gEDBIRutV1Jn8Z|3gz30>|YT$f*0DOzDQVaG&tq-ovemmrpX!P^k5=m6tD}0 zmQ?b2U1S0${z8e6^Auqs)PdI%;0e0JsJP{@HuUo;71${Q7wToPR0lCXh01vN4Xw-S;L~w-*5v{4rIqFKr0k$#Hl20-Y=HD)ldA&C zRG95=uC?0A?^z#N>~aW4y(#fX5N64fl=Vtl*#Qb3EoYVkoerKOfWo-@Fvo@=MJBnC zIB|d<(zvH(DyZm^Si!J#oN*-5ld;tS-VmP-bQSIgU7_~WEyoek*3rJnu8Sg2@HwM? z0&py@AlluXtZhj_e{w{dCZw~a$mNpaFt|RlR4p=)i%b5MMK0ld-=ojl{R%gyv0o~2 zyMDI+)@_i24ym;b^$lu%)tlU0+?&0aDL$GS`kuu_dUQYAyQAs1FdkGwus|*bp5JicnvZ^Xy1j0?25KbUYf=tDs!1()7vnOv4$N7BUAqupk&HIuU|Dw3y ztnGbs;PsFgH}Ew5o;Yw@Ujq3kXalm8zE=XBe@^!eQ0wZ8JqU*geMquW<{W2Z>aAQ+ zq-$nS6pf*Ff7}MaLwtJJtEw>1WN}0&+`(;|X36614VH24$QpYnrm*Kp4)^Ow3hP{0 zAkl1wk*;R6py~nH5{X_a?Q8MD7kwaWGtO@Cv)?Dd_cab*0-#d?@0&}*CqE=5P3pGJ zYwkb3aMgu|jy#f?rw--4`shoK9=;u4p53nBzQl;1b@U~42L8%51hwDT3(_8uk!MUT zA7wh~=}{WlEY#PQ#g3#66%UBsz&BS+tr?;~;7cI1(904~8eHShNDVn?e@?at?5$oy zDH+LWmc8W04~A`k4LHVbPPhr~&ttN+@2+Y<%SX>Y8zF3DXo3kY>>Ym2^eOc{4{Tt! z6YZt0_Ux&D-<-|!bjoUpDWy9~>#)HKUq1%+6i{h_0HgqG=)S(5!IOlH9)`{zU7^KL z9>=eagG1CZEI4#n@{Ak{AAgQ1K5Fo901z{no{?y6djRSLLKq1d+e?Y*zDYAoBTC!=^eIPBZ-X zlmc2KF#;BQ<-hB~*<9troV8(eAm^k5c4MqeqzMh*JA)b}z2eF+awmJdR1M%KbBBZi zitu?W{2*H=L3UngWgRjmhHyuL%p`oyuVB0qza`OyPLdAMO`Ds(->DS=ZOy4Je%tu8 z9L^i6_4O}#HwHIN#(C2q30x7AGYJB`i9f(vn}y=nz0XpFBp>)#Fo!b=^isld_>~{C zkngHUYFz-}WAc^63+-vTif_8K2*mfY1u#;(owHk5wC?)*T>|=_|)WqnB{6KjJbiGGyF>Lss=y~4l*5THw>KSEoxwf92 zKo{%7uP5z4k+&Hje-&?p0@sTIf#9uHqqi@%AO_#O2txRLH;<`Ce#UISQF9G;K=$)A z@Bw*qxD;WocOx>u`)-dB&RW=qU6{9nIE*uS0$i{Yf^bLnA~|vS$-s7yp67{utQ!HP z5yzh+8WN=xN@J}(-)MV;@uJ!VGpO@O_G5jXE=Il-*Jfkbu*`YQu21)N40r5v6u=ip z`L2oOETf==YU3}Nm1qV|X>;+Xt_iqg-Iv!4`7}6K#|a+-#>Gq273EexrYmT9A)0i~jgyNR%XQX6`oE4U417h@Mm^=NaER=*^ zau0@iydKGD1iZYG*KcF`Wouxm(s^@;mzH?SZvAnD!E7)I*|D$=q3KTl7$IdA#L#uQ zw!VGjhM?mOC^m-(J}1K2=py?;D$EqhV1CQ{tRLH#m+UbwhI*x8+qR0ypAVrq7Tr4U zbkA(KH~wZCoB0uU7a0GbAc~Rbnz%G|KsEC|LMlQAwJcA0kGVI3vMj8Se}Y*-aJ_Ez z(HMT23B693`0}$uI7UQ3Aj~8es&zU~d6&<*!MjYOr3y}MdT;cc$$tnBbE6D3jl-*&}|5Rl6dJT z=DeaN`c6=}`3~sv-uLx-zXHJ1Np3K7+qIdEA57Jjog&U&HC*)I0r(`Zyk*5kn>KA< z3i-5x{q%UfuG;lFBk6%{kS=6_I}q7(@@)Yo)7jatvzD6W(eHOPnD8>)@HbItavcTN zX0%W5=+tl{e$JveC@gh#=CgXg|Ls7jT=2Q>>HAZowjY89I>-3MkC<(1KI*WE7kSI$ z%d27Yg0I_r*WK8@E(Ge=5eoC;urJKs)T)U+A&GF-kIDGpvzklvP}`>n1`LSoV3D?cDwXN<}{t@%5spEhpg z3mkTVyyfxk=LeaWgfA2xF-hXvU#PE*;Gft-6Q0GcO96eXhZDrwJhRw31h zpo*T$^4~q$dPC-IgU)E-j? zfxAge@U4A$KL*r976)p7GTO(pf8B&Giai3V1EHOI_Ho1Yqv(@-b1AN@Cg4UW-XRUs zL)6f(LnQPOjqK3$LR09oiI7sBcg0J4nS^`H1ZiU=VB?g6I=&hyT7b6N*|_`$R@tP) z7TI+>I732)bx7&G0W)`FN?JE}bNsJnTc*VL{K^49Vn}?IO$32w{B+hwfS$ce%r&02 zgnitFc~A<0e;KZvp}D*VOe0iqAsSG%|7^d+$3jmgurD9OZcLb{rvx;vGh?2+-yDED zk)dHPi@_U${~U9CaLguAyL0eSVN=m5;Hwr{Of;^JA(jx+_@laq5%uzM@)60}&ODxy zR)SYWpy;+LLl$}@E(7N9^rNT7JYOq9heosT@u7y#id;ReO^St2vhY7f$NSIt1a^s8 z*tH7_nOBB(m7`lNEx2u`gOd__QidVCR)v|9yHcRl=G}krbd=ZoMpEn;-3%GLCpH}*!Qea zLJbRy6I!0*WyAIFt4y+HSnL_V(xXTrMy2a3nT+=&?!UtNCq{$cR~FmLzzo@AHe zV*$UXhzS@X#vrc@pBt)e4C$=l!g%cu_zZXOm(>G)xU+>W^U?LxiJB}TmB(FS)Se7Q z`07|?Rn~hz&V6r_(`0+wh4euaE9Cg76b#=y^x5$)$zhM1d*`ghC{H8ogW2Z=xUC)a zP;VC3S0sf!DoRyu8 z{&c5;hn8|NVUkr# zSu^H>*Zh68R#BlS+4kL|7k zzYc32>RYT7sowXMFEU(;{n!X0lsYH@D@yE_nYBEeF@>Ikoh>37PhN8Ro5U)vU8+cZ zD#j9e3hL>8{wZ!i%?n?DPz$n`$p|fx%!VwlQYH4HQJ}S zE%*v1EUH%eFpdq5-i!*$L;mSq zl95ThyUom_y&|vENZw)NETb@!+l=kgXryY}ItElOHHI5xzdcu}6BU2nFg`Rd8?R$G zZZR*fort|-eKioMnqefZhBHGblH%E~N4qQNE_XwbKHt}`P1X`d4r|ka$s3$mFWNdU zGM$BxS0Q2@w>aa>cnnufXNzq^oKii`w^~7k!c1HEMH@u>KTF&0-GRE^^KUr~r_Z%&f-OU9$!Vk%QiR%VV9(*306Lax#Y)vL#j6R zf&OGueq7mv=Eb7udgzQrFcbIgZCqWYe^DKHT{C0;N4J6oiv?5K4Vw{_W7geZUVBV9 zn};>vLUd4z@C6IEtAa)v>h9Mq`;Jn-SMhd&>_9lNll$eC4lF5ZhGrY z2K_d^TbgCdZVlr_gjOFQSqmN`(#M|aeGkIu1|(PA|f6_A$QsA3kmO;RJePADdmrrR#tbY}_J8JVTR zLnYHNI$lEGFEhBgB|xD-7*Vg^X>XDvV`_81L%%gFlIPnd z_b&%W^;@k#3e2NOm)=4ic>?ZNHN!>Obn7>Nan#eAVMZ6@J+ml1I@i>lE}k7f1~ZlG z%Mwr5$<}_o#7>xoBh2392+r{fAoCzADjhzCOU&Ba)ZCM~68Uc2##f{vzRkfA&eekG z*E3wV%C2pg-pv^^T!Uh(ZIZj5QuB6F=xh<=Ndao>NoD|MCSeapTuQ?LL0ZckSJzjkNdw*$G-MW1&)|0R;Hk$dUNBxBC6uQD{w zg-qBN!nU*FhcwT-cfWE&3T>G`CH}tZbym^uw(O;D|GG(Sobm04^0{Z_#LD>f@Az8l zYnSE2C-Ee1db$6{%Ze#C@<0Ak@Sn(DxjcDU^mdKze~5r96YTD?bArE>Y1cknn-HD-=vDp46W%9ge(|X1J?Wn$daLs1F70(Y9{p>V zExS>+Hu391VLyw9cB|J+6Lf-{70_cb=j9{L$GQ(SH>w`he%+IzWatGvtl;(jkG=Uh zm!%?pZ)Ll7{`tANyR#8zCnOztxOgYuKI;{4bS9jSuz0;g@BTk8m1V#)0ZI=qogP=U z-dD>xXA_{@$CCt5Cxxw${nQ0dtQBOX2wkh>=Ul#A0)4(0c ze3UzyEoN`|vS!-5+i2$`@T_@ydb<5P z;I`-+Isg9rJfF$ChP?#Mzu3>5$V>olQJv`FV<-`EdYbO-%4=&PXKz1twNW=0{WJ!i zHQjo(} zLZqSbYTUd_Gqo0XhWf&etdLAd*!txO=pYcJV=O$FA)D)6lDZ~hJ=4Q2JLd0>y*=L) zzi$&XSBD)dqOfa|>4teXW@;&S*#DgTpE-KZwao3Cg@LD|Ffe$!`njxgN@xNAs`+nV literal 0 HcmV?d00001 diff --git a/devices/surface-hub/images/sh-84-hand.png b/devices/surface-hub/images/sh-84-hand.png new file mode 100644 index 0000000000000000000000000000000000000000..3e84a8a434dc1fff8725b8eea55bfabfd52abfcd GIT binary patch literal 14288 zcmdUWc{r49*muvC!@%_<}d+z&M&ht9Y^ZK2?>%3yGn;EjR z@Ut8_a)jOJioW@gBfmqB9Qo}Q^D*F;EtAU{z<?}4kt5~F ztb6uM!1D?3D=^<9M>tv-|9?kkx-RWfyP za2Xai?K2LF4g2hz;(Xpu!&T9ALI(Q*M+^9Ec!wv1lGqLgoEw6sjG&?|l>x;NiN;M>1>MHZZevMd%etUEHIir+g zk0)=WpW3k1=Ku0;|6X`S+Z5}7NXYRP#e^^ead{8z5Qm_v*BT0nF}m^|4yZnq6Y+k~ zSblg~8Gb?eYKnMwi7b?xgT<1E)ALyr&SfqD1dGgELNm7@w49>sw=;LoP1^@HXt7-D z!6Nt|Z*s~|-KJ%)QP2H|S?h{MDdHYy&b`*sCryDNFz<~L-7KyA1nLx6+iBtzhPD;t zH54sof(?EF6{eV8A3NUXB0s6q7eOl@r6XaUI-D)fnmZFL4@bdJ@2l93Z_a^k_UK)j+^)EC0~NTa zFYg!>C4WseWAOUY1!?k`zO+r3pC&2du8*&$nqf!pNX9|ZbHQr(=nG`#zSPbJlU43w z0yeW66YVOgOE{LJ8GZ9bpvml{`dqk0Bge%grq&3jtU zYQ+ogVr7bKxRUyWfK|Jswdvj87DZPmf|m=XXGnakL|wgw43yink+%z3w1hSP2yfd$ z-Jww)R=_>h043+1UT!9hfDB7?tqFB-QC4=yV>&S;U(5+TYmNKsnM0NhPcnIym?P0H z(LS>_I<3$Zp0=7wHgzI47h{1nDtTC=FPk-bhh^hCHRq){EQpUXCLU*`?$Jl^gWbQa zl2=gjSxF|NgAj#~v*?FPeLxG5z_qUI;FOY&Kks(ySx#aZt)hBe+dC$4k z3^l8`r=*dd42Qswv3^jR1W8Un_jptCt$ojQX-iCSe!#g4w9Y(JzA+m6Th|?%(0tbP zeihD^nwf52hXJ=w96p100-je@S8rIx4Lta$l@$MZFy5L+2Vxb797D%v>XfrZ^-m}->kjApeHr&s_UAheU?a}f5X<&AxaTry6{e$9c7-(zc!se|N)m!@uxTH#s zj4(2JG@=c$T@M?eyYYaHBL3nMB@j=JCD6MwRUP6WjrNu0Gu?HjNd@08UQ2(1(xcEa zAa5*rE_$wRKZ|x+R`bzSWrI~$oLw0u6gnfc`ce>r7s3|#DJ=w(jIzfg3s2f^jokZ< zY3>C2=hOO;SF&8&0q=vd=KM=5_qwkK(!GwGU{_yY(wp)SHc}n^s~J#Bp5kiSN@i10 zzE3t%hHYwwayxYT)`9284V&AJ#1y48FO<_nr^2VT_Ll5hBemeaww<94Hj6){#<%X{ z6RK6URZe;^$%XNZDP>>3HO%t4c(BLK-sb1A=X}@+JlP3nWBx-!yYIu!^LrR zuAY2zZpeY?u+(pTSFR!pgSl`-|-}jsqbBgEn%N zAE|^`XQjgHt4LK2b?KV=VuRfA;qJQQ_iT=t5?+iFqR-^otMcrNMg===cuK_uw} z<|D8Axy6I`jUl_~eiy=wTAH)jyb`#xTSLZh^zNss`KVKqi5H>=`L02Qz3zcu+blX? z3>%rifsM8ePK;$DJqWVX9=lk{skz=1I(wb0SuFMuHk#&3c6&4a;!JuIuW*KLu;&NF z(T{#X%ft2ivhN->1aIo7(!+-~w4Y!0+x!|JviVVuQ#;9Lb1ZmC-p$R;st1PiOu{JR z>pi+o-rxayW7ok>t``o{&tUtgTXe5*AH0d@+wVD;U~ z`H@?%w$!@@EgWq_r&SVWW=Ml+WHP&nPMAa84txC`zRoN;D96wApxxOw)?*Y_Ub34; zdhK%{H@R_bYGZS1gY2{Wk|g7E(7>s)^=+chZqr#v1Q|yCzHT^DVB=Ct^O+3A@8e4Q z=WOsv?-D6a19K8x+in6fatEuej{8yBES4h#Q_9HNsv5V>YC*NO#`ZA_&%IM#57vdn$A;hkM@|>i6@fe?Y zPEmY3?N$y^l&AV`MEqGvtg`9yk0>@H2?I1mgRo9nDfGqiFn?(>=5u(yqJaxKJ) zc~of)c(ku(E~~OQrYH!2ywtA3b?ADpF>gc%btPNbhF0Zby4sQ+Nr9^0$_zGs5|I{i? z05v#UDUK-eP%tEF$RPBny8|K~O+i9(BEC(tUJutb28)8S5Fz?~3Yog&oX)4g?p0d0 z$HV&634%4x2F-ht5h!h$z^}Bmcza+%-`Jf8ve~^n-RGa>3sY)$x|3Bk^070C@kq&w z1Rg4VPCVab80M8)X=^xAyMugRwP)k^2|$aOeB{l+*)R9HHBQ(We=LXpOk@r&twrog z!9!#QZ;T0S)ps9o7t6Ay=l(WjS~nV8)iv~_eBv!@W_qzBadLd-C|Wl9R7XP7r_tBh z!G84^H@q(lC(bSyoC`kvw83dzSkWVbgK6#w34#{66IP`$Zm> zr#ACrjO1_o?v5UySMkEH=UI7XY=3%F>Fb6mOvWj>{@GxtjiOr^Remm6oHbqCXh8*r zQ?pv`e_C&jgBzuM_B_QD-(a-~(b~K^4rqeW1qEhP1})!$B2U2Hv6LB?9u|4j*Nh;>)~( zu2Eg*l5?{Tf8j0$qO+~F49}2F*%0hcVvP z1x^UDZoyGxcZf45=ttooCU_Cg8M@Pl4PETe-Ct=(R?8PCvyruQLy!OHyA$yBT?_z& zBHbRLlzO3Y#o9GsXKGm6-(3nbrT*@@xio%oe{tNGqRrd3B@$af zua<;j6P#@Ph)ldF?KqxQTXQ+LY+oZnep#DaJ;8o7PkzsDMe{m#v2k}142?DjRil>z zF}X(HGX}%;jJ8Gkf~G(kPaRv8)fK1&y8Lht+n#T)qp3o{B)E{ct6+8xh&uK7Z0XDK03X`VmJ*~gJk;$ydqQmp$ zyTgkD1KBviGxocNu1JqaA?D-HLw9D&YUeA+jekNCXzZ7{i#YZ7HD_W>kGtM`8xHZE z`GeTnwSV+!eTmwI6#{8jjNX<{o={->mfpdwsN=n! z=$Nd%@hO5+Cv$;zw(&F4!(+ks25w)&b6i6x_ob^O^qOs$5-e8bHZGH4`NMIItd_Px zqO3gFd!whfi%750O}zH_hIof{MYN$9_8CX-M}{LEmCp@toBPI{nQR~&LVt?gEAS!H zM2?BZ^$$uyf%Ij+ZT2jCBH)Wkf9gp=2|PV|`z55;RyICudNa=h#?EfoehnB8F*GRO z3Fy;?9w0QJdH^;SXK#JN!h?;QxfzqJvx%qtoCLnbOJD7_PnZ`d6KgJD4hy2>Xk(6+ zh*ki><(PvcQ#@#$P7*_pH%`V$+v2>&8_6Pp-yR9-GT*>$tu;n<0W$H&yyOPU-fUGC zZSq?t9&ei6nJd$!Gkn4MA=BIj=`6?Xw~u~J^#T-C*;y~9x&j|>47rvFawM9o0uiY9 zFSb0m4+oExPuMZejiqtQU@sK+`Csw0rZu@_pjpX>eee`>fT2fS7{Wv{6&+lXuS&D< zKxWs`!5|=BB%?qG%ey>4WOn7+k%C@JCdkt}Njan$u>go!92BR7eFYafWB=IUoZ~qS z(B&_~r=PU}DzlDkWEogNW0Sn0Pg)`*^mTZVF0J8t+qa^b?F7`Fe|~C}1__kRGo%5n zS>SSb@M84Vb;DCG2ARmiORt1BPN= zQ-H>S&jvoB1;jAHZFnem{xyiL;D3zXiLNmiiud!Q4v;AN1C&eEa97!W(aV<%Rg98E&}ha(GYlnddBEKTQqXlL{+`6ZXUB|s{l6E%X?{2k zKw}e5{8h^AOk~!?t0_Al1BhL}(;geV^ZTD!mH)SE{@>``hPxQZ`(>ahxjO6>a7ej^ zE8y)VH=L8ctz3uVjxA0^i-gkFJZ}>%2o%R5 zsOJ4yLT4qm^3?~e^bS3HB0p!`N$Fd7P>#sU2ilqlYvZ0If)u?GFtrq=GAHih+aS3Z zC66YOq8KkkHt~A#6DGIU+I9^UaQ1N{t_|xuyxVYU=9O1)`MrKF%N-3~16yAFS%hyZ zU}sr_3M@P$`BwTr7ObLPtEuXbajR>Ew}9M7JmWC}>hknf(hDdqDjBhsL=r-0gSdXgF^#8SP;E>oCqN9y#+ckLxiy$byhpqTqtX0xER0Z z9;t2TJ}7CIDq}nNqAP*PZ7YXsy8~S>Hc#BSf7dJW^!#7c$7t9d_e;RL(k*Z*s~0YB zn1|>zZ!E>5%OGm{TkEqPIap;rp5loqwbgYl%lQDqML+!;v8_1+1r#Arz7pHR)FGb&Drp3?caYQk>X{nu9 zrjwoyh?rW6>j(uJQ4`W}z0XgrX#8zOlNwNr@rQS~tZGNWJiJ$f)!$Bw3t`{PmCUiNE-dg0{ zOooZ-z!>o|v7>^8N21#oAv%uST9ZO`I&XiC?gS(#Dky=k^m||=*5|J@2z7d#7QF|YCrnF`qbEW(5&xM30>Jm_I%f^!aY*ftfFzpP_BSI~SlVL*h z4fmUQA*;H{3>;~B4R94%g*k5S>f7^QrC>NEKC%>a9`8W&xV+8SfIeE{Y7?$EM8DO4 zQ~`Iz{in%B1I<4dlyDcN{ys~b+VS|ZdRJeE)~BP&P%;?G zectSWT#NVq*(^&Gu&^aL)!~p8``}AlZ)?u&9nV>6D>)GJBKE?;MQ|Z5ds<1$%S)C) zrC#QhaHHNIuF_C7a5GnO(Cy17x)v<|7AK1_2}??Gcz+s09{`xtILh;_jf>GePxU!o zvqjG{Be+3BF!aY)OO^p?kVpbSy}93?l6+Cl>V6okgCGe2yaEs~VWP^nDCUtzK_j>u zLt_N3lo70zp$X}mgp20hC06BgO*{Hx`bU5f`Ao1i7QZ9)w}Bat!JQ!F`0FeQQ@YRk<4!=Yp7 zrc?L}6*pN2I%J?zxPD)puD}Vp|8_gD1rU zbOEc%8U(TO1pE816)-Cc12Ntl3x*D(|6ZjkF^2brRKPd~^y=Sy;OG7ny-t)?F=F1|Bif zqTE8AD)fEA?5OjunX<+=N-$Whlbsc<1e#hLcV6Ny3DKrCdO!Bp5avWs_9f9*d>#+@ zfHd{d+qB@fh$X8r^Y$wJ!>L-9z&)k~rQ^8H-4g>|E2ou#-H}D-7-qLqCB+oq+`4TM zx$6=AT@s!!e$UH_=S?-uy*k(RUkP6Qc_W9J7X8XXWOxcElo#Wht5WgFUVp>=U7DQ7 zQNRcauN9f&?qj@d7xU`QD!3)zD#>X|B@cg?xFQpKXucLQ(D}Ts@YKgKBi%35%8wU& z1f`E`T+sJ8^{X|I9wu~%HfUiwl#3*9A!9CX8qh>rO&sdz^1*m#Az_SPQbzUPU0r~3 zgD!7RRD=IwBcJ+4zI(wjsPt)?q@xE`I5$S#%eM8FcKM-bEKIE2=dN-VZfdR6j{2q< ztt%I0Hrg5#VyyoDK#Iv&x*agBA5WQ#H5p0hX9?DHe@60Ic#WrcW3`YzT8xxmD)xQX z>zw0KN$ySkC5#l*rsi#<&S{B;)eFspyGJDzOgajVZ|k4M^0`a@#pbe4zZt>i7&`5A z#)DV9dzOx@wbSJ+dp1LH@))Fv1j=ML$PS%7v>EHPaEPl^{GV91+}gYNLRKC~R7J}J zo7Ad>3burznF7p33=-K`?a-=av;Sz8c@^D?!>HP^e&K*=8P*SeV9dSmEjRe;RalDT zpQ!>Hy`Py1+tuRC?x<8mrUt*4{0m$LzFf&-T^K6dWjQh?M;(*Rk&YM3#5(nt)y%CC zrWb}Cs~J$z9BY{ef0xE|wZi}a!j`<^T~~ODD&VxKlPy^+)`^1|tJ8C@jv%ljheMMJuwxf;S)W3@paV4>f2^FYSBn zn)8Xl8tmL9W+jlrKS%!FswAjG);3NBPj{L(=ZNM@bFQAtcO5y^s&K}NNA2RZpIKyk zQ{BGe=FfgXO5KY5e|z~;pVW92niA|q*Yzj0PBuI^I$qMwbVk7mFGUHyx{XP#Ze4Y` zL0+M)F7tz-H-D+}CH&FkU)zOFv68GjeQ9k`lltYZ()?h}nS#A#HHx2u@O1YISe4Zx z^y(AWF7c~pqS?uMk$;%f%!ga(3ZMSRp(Lf8o?U@yRUCPAx$R;Xlj{gMH8UUJ+D&K# z8r~u`e>A%-FsHywHhwUjeD*^IQ=ywZz~=)@k(Vaw&|GIxLA#H>n`Hq$&e+-xtqNC@?<$wxIQTux>X%rB z@RwSt1^%xOw0{}zyYRfz|7@{Dfa5qGur$_9DSQO%Bn-v>INR0Fh_%2*b+`)ypIEO+ zvkvev(mo(u`u$1!Va7V3_Maa8|I;HJfQx^-B9I6DS9|&4_9($>d7P(s*695jsT>rn*2atsY{xjeI@d^G{oxigA z>PqB4{*N+%M=v6OG?I0o9Gzk43FKblMymk$u2V+*e$<)IjkvQ;vhR!L#~}ghv*Uur zV~7u#0NwQdfZZi(h*wBg=przBa~IGQ{ZREuVITt|@W5~!NrVgZYas3t z7#M2(78ryJ;AMo9a4E9kfSN2Rz(&|Ml>#JwFt$u$cwSys4P0BMS$60s0}Z&^l7}MJ z6G`v>eOLbbeqdxvB<1cu1VaV9oV{Ly-oa(|0NVz%AHGTqf@eWW5&#>s)+S3r4@411 zk2>Svu7v;|P}9G{*yNBhui-yCNSbFZMlcy0D|-<&6agaZpTyxbcoSY|waQa$rN8e= zeadCo3;883kdRzM3;f$C$cK6jWEa02+x++Y2gEuBx(oV0x_!mwb8>rUVqFCVA|CVpO^rD<&OkFS()Kt(m(pAiwCTGN;Az_fi@2lBBV?O+~?e; zszInKpxt!_f$*d6P<^ieo*|p>P!p#IFo zmOhYH8K6<0yFd!E1*F|GhLU#*AZA|7B?sN;Fzyv{&N-voO+pIL4}@1(iBThtn%o{5qOyZ0NIfa;bJlf8&8mEu6{DuUP}as zk@3@9)_dw))>_hiat4ijcr^xtF?`?x@{0f0o?o%@jNqa{^H(xysiY#1mEn-R_u1y8 z=-VLoK{XUFFakC5OQHr9dV1|5VEb(oZhJ_W)AwB;1}ic#V}&?}gk=4Af% zHz_DaPnk7CBFHrI)R!+$*IzNuc!fwcUr@rFrKnryMC6%meV3Bv6mk3sr=CCqP)})7 zS^!~j*D4aJ#`Q!m0Y&xW0$i*rh~fLO-izE!@vHIUf4UB*ugqT3VW(_cIl=5Hr&sAl zK{}!bxy*yng22QAaq+3WtxSf*xK?|;{p0U*3N>5|?`_UsrA7YL92*{gn4DCS!rLaa zbXwcCZ`l}p=LHFtPxLL)suMbFQXXAnpLXJ>Ye3y+j@^a>;hji3Gjy)*i!^>_%Mnx+ zY{vG1thB5fU6LvTgq4yUhzKYb-k{y=AEy`QF<5cGK4n*NK!iONNbKrDc|`{~CibNB z9S3I(#rC|8uxZ{$1jzmqPXwP4&u~>+nC{75ma!NNZ!@%1SLwFb-;aL(&VZ0o55%l^ zFjUa!B|HQ~&nK0jtHq>wz>F^+OBifDIK~vO7m0G2_}BD&Y)_9vYUP?wEVx%@L2*^L zfNcNXK_lQhHu*0X1dCe-ISFT*t+=$Ze`Ebe3rwH%a~KF2`0eXkE7Y5|=m5Lr zCOYKX)^>S2mx)(^c3re2=bDwb!`b8$VMmG|j25Im7o5-nZ}`j0v>=A7aayv@JCB&L zw#C3E@4Eg$3YsciT0^qU%U`%ERINx!z)d|AlNS`eyS2jQ&z9P!t=wFl;KMfcfVVN; z`?Z(CY#Oj8&_d{J7i*%5J%qNkX6f^&Zv>QzKTL#yB+}0;@>GAaO<0w(T+Ucea{&i_ zh(TbqM;vQ<_VlysT0E4fUiidVb6Gd)pC*tC4x9s@=8~s7j@L@M2~51<2<|>c2DbV6 z^R%0%BuaJfcd*pNXhQ`#?c!^X8>d9VnBo_Hx9hHsIr!#v3s=jcWhXkgVSS7UG^z4y zTvjieHk+8Vkxnx9UBBH^0>bQdTwGMdgttDxfJy35!I>Ucm&XT*qkgzn22F%QTr4UaQ6l_!H$LDCFbQ0 zH&dXWwsMb&cr~1FE&xM~i~!WPTO5fQ?RkKb6Sd3lv~S1wzplEo@D&J_MJ@n&Frv5h z&B8Ox`LU~--If@a4y~u)53V+3@iV4{-PveZ2gcG(JKv z-lSvQ07#zyHt-7g4XxUwsc4WO2-7BwcPl*1F@NzU|MQ#D|G%9_-NN<6j{Z6TDvKdF zBLV>Gg+D>`G{Bna==^;ygwe&+wi+3Da%ehiWD07+VK5&m0G!aQ~~O}vCz2eS3H^XubpZ$6Zu z5%mL9S1y(T28ZVz_n}@Q03gtmg}L(tKm|a-VeR>577f-J_Xg1l)#d{&Nf;$TOTPEC z#K3B_w-Z(L*p(E^V+Syo`WFB1_l`Z#|DtxG8GjQTanp9gbcsSwCAolTqQoN55@uBB zJm5uwTocRR3P4`THX_@o$WuR^?VX$rljZOh21!PP)Dx~^DQFi>XaYM~`Yr+~t^zkEMxX_|9t zdj@@Qa@(uVJI4F<0-xa>wS#!yBs(Gdg5MzV3nPbNO)o@{1J%6qIyM8MQfJcglFPqn zF=@{}vf^?kbmv*JEs%bHrg@XMZA|<4 zfKyYLx_Wci0CLGipgDHNw6B|G702$V+3KhxbTC9RAbfn2e!mDXkX(6ye>`-0i@U^L zb4H?9L;_$s1FTr00jS6TtR*1U^mGQEwT1vD32=fbRdE1DmMW$8JT{mMSElqo01nGo zOV3hNQ$91rPcoG3qo&pz*P5X+Qxgl&)b*Ld9Y>5({LeNPJt>QQ4F!$~TaMTNtb`{X zwG&&;XC8OxvG@!e_%GenaAXuWYEssL6JPqwJ51?Igdb5U;%Bo9kW*gAZ8?w!^?!t~cQJPq0GKpZ?O>|} z4IFlwQg_(_xWi+=p%FIa&;4VyNa4Khh^wj8h-Y6pc1Ud)wOgsX2b=>FyIl z!GSDmG}I}OAl>^Q=3{uC%+%{b?!q|`&1kXs$x^KM@2FRS4KfHHYFCWJdpEG!qyD)% zqoNrqGd9&F`n@4&-9O&LuFq)EO8;1J;W0pe7F?v=g=&Y2UsNB4G(tYr)hx4g;a=+W5g4x0Xs;&M`5qL(*p%kK!z z7kmfkfWL^7Qq{$GO#z&V8&dNz*POteO?KUsOT?{cI59O-wo^!|AYHx*&N5dG#Sgee zTcrl&_F}W4Gw;!SJw=nD>Pa4Ff~&X0Ujpjy5WQR)&<24dyZrU-&k3>^@;CFw%h6Lq zPFr?FsU2Q)utb2e0xB-Xk6@bt6nv@fbyu!FTrCXblX1x9p|K7Yo7s8wflA#Y?R6xio=oOmzHSf1Os zx3Xg4|N4jKmRN5`l)uzX?a>53C^=Oy!ao92)Z8+WmxFfx*J>E3%uXz>-4 z6iycE1!RqlBSf@r%$`N094TEqk$0pqKV12{m>N*!Eb1*i(l;a|(`L>)c zB+xd}@goHmmfP#W#lo`^#+9OEI}g8CXL59;jTjQ=y}9_+P#?e30+ixm52$YM>6c&U z5{1Jt+Rq8>Uy9U*MQEQePpNwO>CQc+u70Zmrnx1vOPd+gO~5 z_uD08w_DbB7sOo&2AdY@H;Nk-WT3h#Lb;E+!XaH`C2y`9tOM?pc$7P^3o2cP;pl?k zIG(|%yV+`_@YA#(H_-U(Oj# zy+_9c81%$?>xaKqU5a16utV6|cricLu$xb+0c4rmKz>u}e4fAmh*_GKSN1irGQ51U zJi}l?Enp$4^Nvw3$@`^;8N%gu;5~7=8~?=Rq{K)1iWHL=8m1TrSMK|?A+f9(o!|n?0m-6V?Tufcp47k z;3s`o^#oQF#|1)l{zT+p{r+U0(Bwc&hWit7BkQxWu0F`t1NAE@;xf$GMrtol1i>>7 zsON_^TxfO@s6E*Tl#BB`bbB)@G*QF@{9Sd{Mvt})L=K>Fq@$S4O$hK8YpWGFkO>9U zx-$h?Qh|~a#@jy{!D}0&8$gW~(8|dseAj5M-u7;lt~X{3YUSS~j+osM z18US|T4CsHF`I|C7+ren1KF(cuiAA{*(4i904b&9LcW=^tLo?A_kjr;u@Y(gw(5WX zp2EHqr{(h#orTdh&34iEH(m5^M}6S*oSS)hL?ot4Tern`-)X34F0a3-gB~De)cbvu zN8J$-FcB(4?*;)Cf0j`(;d;Z@FK>OBCZb>tfk|G5Nw6>_yycl>a(LR5`Mz1kBgE?W zHGj>||MZ|GN3SM14vNTF@*Gh~jofvL<%?JV=;mh?sC~0slx?WX-eOmCl2{-l7ed{lqmez&4F9onJV&)u8kFNWo@rJ zY)=^1J@V`HsdE$Ws7tbT0sD(x=51^1lq2~Q+hm_YK`V-#0}O^6PVaCGZU46he1yIU zJ*)u->Oy+)XjRii*<0z6t;bRl{eN8;35aS?!P`4G8iLr!EAHNB(v$Ia4#H7`WXA~1 zYJp(;vHJhGF(RM2uGpV>-tMMswClD|n!Sy7!fc?&wzY3#2pZ*inP{{p$VMLQaFY%j z=rtfuRohsqdn%Tl<9sx|hg4Jd(G61t%WZ~E(-A_zWdz*T$?rgEJ8PPNnMx|`Yz4Oy z(O!&AxROZeaNjyZX+N#ilc+KTUCj)S9EHyqU}!6&f6ziMhIoF&Q`X=}a1F{fJ)6?v zJxz8<(d7khpxpnEaqg9k*|y-e27QKBjq=#m;A`JPVJOd=miB)BTix9iR)zq|yZ4?y z9A9v@Gv-;qU{^k1b#=SOP4`FSg`l$Jr{b>5r3ok%dO2x92w@mm_7!Q9+isAOs8-{C zo&1W}{?x~P3xBOE5iIZtF+~YXM>G9KGsxWaLtmJ&ckEfE8Dz05QJzb(nNTiHchczm z6@23Por9eZXg^`PH%m}IX^8hf=`)mG^Zh;Al4OSq@sBA4P}$prMeGk7kdHPQhn5li zL$T_fuaS5=-rRgF)*cVG)l5FIIXC{8fmsvpdcLpxMm5M_cSzm9nfX% z8XQp3$$;rtNzIf2Wv&~SX_T&|vO@T~?vXWusjhAd0;W~^)Crc7o7QZA8-0S%-L%22 z+&%iW8eOc~Y+~nC1q)3-wy64_@6mXE^u@2w{q@s#dGt*Nuy3wskbeW}h&`lb)J;dW zY|huvgf*`xbj?Wm-Ld^8W=0R9?CfC?vxRU{s<>-jIU20`%^iHntQKW9UmH4K& zyq&t7z(~;R=K}UP#>E@mN|eeZZK7e+w+)3S_H1{ZY+t1!kn9PRL5qDh$@otO|LS`u zAOj+1=eDicwL)8p_Q8K3V5fYO9kvDY64N_8_Aw?c6^K!TReGgD$iBcup(&uE8rvk$ z1wKgH_El_n41m^(p(_Id%U~sUadL}E*mf4;jYV`qpN;Y1q7ZDg(+W)#j04Fckk;l1`UDEiYR(+{%$)>}CQDh4 zzWL#z?M>~R-R=59JIxxW*fc;BxDL@xjnpo7xv4J#m*g)Lcx2UJI6cVDEu)tAv(m|q zwtDysDcah)QeHK!9}w8JvGr#@lC15pu4LMT4LbAT+QlNc{cGBa#+JHoAj2i|Fe1R+ zE^A;uv%m$kAjrgp_!CZ#wJ+f_7%^4oMlSu&+rrL8y4+`hc$>ti&du^;wg6tGh=-I# caO@mdwjy1>KgqZU+`>Cz1ToVuy$lckUpkKjvH$=8 literal 0 HcmV?d00001 diff --git a/devices/surface-hub/images/sh-84-rear.png b/devices/surface-hub/images/sh-84-rear.png new file mode 100644 index 0000000000000000000000000000000000000000..5837d4e18560cf399c8b8336bf350f57445f3d2c GIT binary patch literal 46378 zcmaI7bzD^4*FJ243Pab>(hY-ji*$=13_U}KfOLa6bPXXb0z*qUA|NF=bR(UDG~5VC zH~bFX_cxyBc|Y$T;+&at_FjAMwXRjyiF~H1goi_gbL-YEJQZd6=eKU%f!?}x`{M&_ z;G1yD(x1S8x80sAJ-t;iK(hf{+_RC@kiB*56B73Vjs;vle5GvQcIy^?>&?I0ozBIU zw{BH6tH{ghdYf)#-Jc~LtGf>8{pywfKv_HLO+z(3B?O#|%f=3m<-@Go)kH8?E6shF(A*d&Si%sT4TmsRD?R`pbR{oPbE=9b#J^~whVD`5gV=0w$YWvO z9eSV*22%;WfMa)yK*3at;pypL<-xRJukA)os0z0li+vc?iwy3M7`nCBM+~|{@yL7a zMAyFqLqR}!>=269%DhNaVW$vBh3p#$VnrIYkI8|L-Xh80Rk@3hr{XLWatw2dC0C4U zBqR`QLSaV-B=O1o*(z{u86jSG94k&C_T3N{ZT>BpdL5GG%y*Eg!iUP8LeH-133o9j z1f-9l-zxJX1!-@@hs3;bCp2NDN=sM8w-11@jtav~b?rl{^tyzk;jEoXBL(E@;ZLZp zmXs*Gq@KlK?u;veH-|f8|DMoiN={I#O2L{_tm>#UsId^6qs+PljKG?P{t(hVtNkt{ zn@?fA{HPE1sj&uQUW^n@XEmdm__I_dzSO7=OC^#}>5nLJLaU~Xyyu{l8R;Gc4O+WL z*>=;p=Sd z1u$2vk~h@wZ|M@;Nwqh1BC)sszQpT(Idp}}pE0BSb1lf-C?zWWk21lTZ(o|l4#fSf zbKsR>1NY!!V!T$|L>1FCWUDmzGRv{}~g+^e{ty#!Bh$8Dd;FSjE*WX=DBtfVnLY zbys2hs^{;mV&Em}?~2pQ%0+G8JpETpFskY1LrljK&QRRc&Hx3okt*o&=x9$-i9<&oliq#%#P|0BO3 z`9(vS)j5|muauO8y&(HU1YK{OHSFRCA-p3XO=*&KD7?-N>uzh~SNS$EbyBR}1OkfH zPmK=wV78z>o2;1dP=~FUKIL5kGSSC_?PVqF%|b$fMlS&PqoT|ToQ&PeJ~+m zNxBYO*lW_hTSD}lF-T{3(mv4cLnhu1ERwtSW$v`vLW&_IS|e<MijHewwzQgQ&K7;gM_>bl@lt&TEP^=jT2jDTa}ciE_Ful`b#^ zRznb0U`4rMBli!*dRrfFA*$s(4+N@6JbL1&JRXGI-Om+Lgu{p-Sf}c7xEt}jwTg^A zx)7NU~Uz4pw^WfBzG*IJ>wx;*O*9kQK^LzE!@8NT8bAqYuw0+8-ha zz7+=VkjMC+urlEE;oFfrblmz(RPD5vJP6~@wyO4w&0v?|5y6Xz?|6|mZUy$*9~A7h z$4ecLFOiL+rk_l8a?Dz!Z!lM&9&nDC`@6(ITB;+`y5S0Qf?RZ7~0nQgw!q0oGL1IGjVWs zMF5&ck>b{$?T|t$g4YtUw8-09OHEf3xcHcUvEzOaCCjgq6_N?2&LdW$P2I~E2f^#9 zs5N=#s6H5F*wCxr-cCpW{A*R+o7YQGJCW~+zcRMGyi_^xBNB0wmY3=uMO7u)Ru-3b zg&J}M2u4(`b_(6eK@#EycQcr#5pmwz)I}`Gr8z^N&>MY_)t&7O#jztyRSH=i5fM>u zKtA~K8-1wX0}G{X_Fwc}p4`J5(UO0;G$=n9EgaFrWiB;O;c^LBpde_J^Bv;{z!q}I zd44gC7)8gCl@ku>r)tx~1lbP)w4VsLZmWrFF|qm80TDf;ejK4j`c7uVsGa^!Uk zAdx=0NyUo8p^yMeiU~-2EWy>|l@<$G`%kt`-z;S5E8wL!N}HRLkxfmH*Xyi{K z1azv~K`9B?RYL(^-|V6~`b1#K9e-3FOGHxoo8jh>J`B58`7W5ik@^MlS*BjU5+aI{ zyA?u(Lq|}!GG+(pq;~Tk8_yM06XcUHbOTgH@zVT{pt3V&vAybJbpN>t{?pp4w%F17 z!x8XI%o#8@U|p?i@`A6laIMjxyg>dN!*2Z+p0sA8q$7*McGz8Pm&?q^@a)o{3e#pL zko^6Gx-PIVvZkwF_0AuIxaZIHOJ3V>+DvvB+rfE=tWKpB5+z@esfl9Y(kolf%1pio zjNEGb;N08W_@7lW0_HUvte0a>N!2i(#Ec% zD#N|8FL+ycCnDTZNk>ji7z)476k!f7fk(XREeUcsf>AlPhGG$u(=FAZ{ z2NyF8W*3)zTX>}Z{W)F=0V``+*h8jJSr=R$&_mWvh5ozyV}zeT`|e;XZivLTIJgpD zD6j&e)W*5P3E^+x>^{-c275rL4;e1h+ZMWj!EA7>@py4h`r zDne_ChD}xHoU6DVllZ%)kv}<89S7$UO~tML#u?h84r0B}l>fX6-K)R;X|C9id3>pm zB87h99`S@$w9iX=>n;%+aRPy&rR8vsc-9WQrM9X8Cf>GKf-<9h`?g2NDX`7iWgF;M zUk{}lEdcLgjB~3JsxZ?5-H9x-qllH>)Z^rhy63jW%=LP!^PIj=_nk3)Gbz!}Pkdl+ zA@tze6K%CHdWd!_j zx|FfUhCT;0d1JU>MulPb9qA+IXlcSrldA6IkRZl-4fkMmv-euWYdDmq?5#(2FKUZ1 zE%%4+SzX8|ghx?QGf|~#5j!`6I=diy zL#p_FwJr^9qoZ}L$T##!7cu|qSm6LuakuDd`Zcx#792rsLRI3+bR3fN zdg6_;L*Q)9Q!u*%{dMrTdtG4*mfHeVj5+MbbX<3*2={Wb4^_5*ZK2AHtQ}qk6?;G5 zX3IqazPa%T(jg6Sxh5SyiWKj3d003TQ7P7SDF~WXc{vRi2gQ-nzNgio$0V%@mahB*X) z73EuX5%@*27J%r^s}Y(cEI(G+ISeZ?sw8Q-#fD|RxkNRetZyLy9t1J=?6=*!k(SeU#}<` z#7zYs3nXjae2;UZAXbbN&qRo52WWf06uEwmJ-bH|VC^YbeKQ;BqY1#%wz7w_sHGUQ zpPALgOV@OUcnsb~Rb}G+d-U{(I&ri7dBELgI*!u&Pp>>83V;<*{^$2DEO+w(7S0JB=QG{Wa~c?#BbjC%eRQMQYJU-&94P&shU0g!ha#96tV~73IQkm&l1wR zumss`&~(kK84mSp*3^fcO^khN(>MN(hz>Q zJ6ht49dK^F?dLK0jRTyQxFff}+P~@E&64^%ywe`d8Exiy5A&8|YdN*Dgla|kvxl-l zUHj=;_WTr|j8T03?%Ja-JO}%frM}iQmFyip6Z); zj1hgAb?wzwqH$?UsZ?W^A0P{mJCGXk;>-z`&)4ezxtBBX(+I)yWrhFO9;bceI%tTB zXr|j8+E}&jI)q?68Zjq2b>x)mt@qgUJg%8>I=@TVJdMj$HfJP^McW{Z^;ye=j@!`7 z@74DLt~dButxMwwPbp6;h)4HTh|& z`FMQ@VevbkLJykd+sNJ-yG!v#^G9|+sC98H`V17nus*r`s6|D?c74h( ztQv{{otV+hgP5P8CBNkaEd63b#B|%R0_CkgRJxOVYBC%$IM_i2Mbyd`Ug{_(DWrXC zYf2V{w}fzX()s-=xrq(UUyZ%c-?c06TS^JZQOr8uiA(3mBW#G~?T^!YHyBAbZ&#Fc zX2oX2YyQ515YbM5H?OCRa2NT3>Lu4=*mEw{sFUMXyx1T`J7>SgS_g7Nn&~C?L=Q)G zyi%Snmd)nF!3r(7&n8U$wtNJv`_?mn@Kdn=XP~>Xbq{;n9U={uM8P`k?^l~VL!*7V zxQcya9;o@qA*#eoE8T~hdedgQ2t(?!E%|G<#junkq~u*^3T-@T9)aXrW*3VTHsz*Y zr-3{oCQW(a?MC53ijk8_WkLgGnKulb5>?Zs{(_D!ORGDsM%`74X_gH;`bz3}pkMey zTQbUHYA8y_0ihryDe_rg0g;yA3V~KlDgW9HJ_I1BAQzi!ArM_b=%TgQP^<|5;E1lh zcFLx8Oz#qtFg~EdR;z-D%oG!Y%j`Wq7&;)TOCvH3s_lRE+<jO8LCJ`jDy zu{dW*+5ys2&&bF)>Q3jPBYK~j`Gawxg{wwKc`?+aSe&mrT9iK45`9uD@NvF|6d0$I zKIr0J-S^rOY5?alotwlqsBTG5v>Wx0c}F+UK@eml{Lt_c3~_mXzmtnG)3C^>ceQkn ztv1U=MTB>ojUh&t-FIA$|k+ zcRPlTNbhLC@>A{#=`~hA@f|B}SB=Ijx-mDdh?okhv{^_V$q_H!VfbnypGG$9)yi=% zXlea%0=22iE)FES2R6%=jbV(Ti{&Hzq_y$6AYKy;fqk2PNW%I(nEv`*>!R+{v>7$| z^T=BMJ<*UaMeDqb+<{UNjvb==hj%Jm#*hkU_giAM#x6G)rOjH4-kp#<$yJ}B(b4;b zWD>}3q^#dcmfajb2yZKL_)yT>fuz5F20-e^M3*>yD2>^>HUF=7K9ed+BNQ|QtncX1 zrFbTq`-!q`kcaIbIHRt~;0I!nUNp9xe4l{D>EK%*)m#12ml~+k-h= z9Z>AtCQEM#QdZ{g#A7dk`P2=Cl%p{jTv7E8Ur^bX%|0dE*VYJ&V%H6TXdiIXSfklr z72jTBl`p?PKggL6%XF-n+FH*;t`-u&T{s!Q>=}{Lgs+)e)^%~eT7&nVKA-Q?1=8x|*YCa@jB1KaFk+bDQN}H+p$i!T$1RRk!q5x1 zT>E-**e_`!I|lHJEHe&oN#*`5t)@6dpYqJ0+N;j`eb>{K)IsA<=Iv8J%G=UUjA)O~ z=ur$_Y7;y3BdX3joo;psfT2YxP85rG4GNM{Wro&f zxKjqtRT$abBcU}?q|p_3kCztgIt|l7 zd{}yn>Qg`dy}Te%2P<@Of5B7)@*jDW=)f%Yd4yXZamHYFc_-#{OnQlelx3Tr^In7x zOnAS@pvL*&Y4g%3x&;vPLEX1jIwEtlZ6p1rUzFQw-_&8Bz~HiDkNt?*XasgN71uzC zOr&V1sI_)2cCWM@QJe$%!&$`dS+~KhTGy4H{ct>LMTt7m-w}|%-pQD@`4AmN5F%b| zDTP!GF8g0PI6;B!Dx!oV+4^D0Pt-)9IkDpjR29WvZdDWc^Egzztpb-x$&cQ7?r`@) zV(S^!?X5>Z7N`J%?gSLq&%6a}?x?7C}F8hQcVx$W`-K8@4MbLDD#I)EB zU7-z+Bac2?_y6Ux+fHFNT<2zU#a(sSk|+P(XG!Ek{J=z4*5><~Xk!_;9UI4G&Ac4r zfId~7z^I?ro(f*pKpk_!QFRB5{v281H5H?hP z|2T|70lvY?)6{VMK4PELWnj1*&qODrUCZz#+XQHZsgU&-V!#@$no~f{ZI2pN=O0*- z4Gs}78x{2OVu_k{ajRZ6`tY}C*x_@(Z}HP9_T|}* zRsnFwl08ap5XWh3(ja`sx%qMdmz>+yd=|GfA4)MZX>jkrtHXz${LB0NnSQZ?HHtOE z$tIhibt9e8xZlu7w^rmtmw7Y%N$`=F_#jfBD9d{>(t@{s9kr4r;k9ZN`(2cQF^HxU zEwcD18?&gLU${_|Sp~hn*f?_jsMUTBSBT(rIx8K+8JyyT_U0~jM1$+;wZ^e`K#`rb zd?}@5c8{ToZhMqviM2=54qi=HXPb6A)?h^tux%4gK=Qq&DoZvlqf-L7!w#DpaOL>{ z{pRzwRlt2<2}h^FiJSH6B=;o){(!ALc)khIC405KiLRCcOk$7hcL7ur!{(5 zO#zf*Yzq`im{_gR&w~Mb1%8$2gB4KRBu~V^2cXc$0>du#Ov9-1-Q33le82+E;2TJ9 z3xY^Cy@@4Mfe$zUNIszgkyGH|4YYPqV7pL#n5fro03hJtCT)8DhO$f-80Q`k-9W?+ zs0N;OZkPu1lDIdava5!+NoPgw__)Puu03GVY{Hi}7>M2UTzO_UiM63|kN0R*-=^xfwv@&mpYS{KXkOU%$;(P(q#s-p}K;cNOH_kWYV~56@bT zy*T^d!sldQtMzM)Dxk8$!a^-{i-V)iIv!O&AAL@Spiiy3O|o35CEb;jon5=j?_J@d z`@i?&nFbj&)Ka7kO~(b`Yko7S{xeB+%}10$VDKvP4J zn|lY?>*$+Y{oy~`TwI80iIA7dXsv~5&K_xlNecP3xHmJ%AMvzYuI%Mj+l~qbJET47 zCmhb;>`NQ>Zjb#Kuk@t`7X=z;ABqHGBc&)&(RTY>Tm1xJi@k3W?zb>(E;4yaZfV9K zG`o|Jf^ppKC3yCe4-|;%okSM3NfEO9Nx2;zSV>RQ%o+-?apBO5S3=M}8=v{tr|V40 z6U!y==Wh3!;1*)5va=^RBUd%ylmJ$7$zQYjLJvOH?V8Ka?nDYltVSF6!P;AIg3o&b z&=R19=|P&s>#KTTqCLC!m-dheN=M#*dAfiXlrnp4(_7cuR4NK*m2-HDvad0QN^{cf ztFZlbXY^GwIfoN&ACLKqWs#XKE1ffI8zu2MFOwfZM({6f ze#4G9gn3qR9}%9i=JSH|gch{l&k$zSya1E*MREPy&2ea~N@&O+4fFlPe=s9Oq-hvp zhi5S93)Y*4Z9ION6zz<*_4BALo(;PDRiQqc^p80KRfHSWd>{ao9G3vf@Z==&mw(So zq8{h)2EqU)FiX2Dq}wKIpGex59wxwSA|z%10pe!w)FPi2wpsZkLxqaFTy}pKZ~PSz z-nF7-p=!~`_1RzRK$+uzZ1f>XRx&LQE+;*Fp# zzwH{19c@^|yluyWfoYd4r7n5jF8`Ig7`n?Y>Qxf4%VngjGvdjWqk2b9*OQSa!heR^ z8twhViE=k0Y71}Gom)6SQ6D+vTzBM^9(2-Lnpxl`m7 zi!AGfVU91$d`-rGBTKA3n!TA{0n9J~YcFvz7vnU#pyC#?6L$w9Q!8_9uCM>rbiof8 zl=VZ4{O1t)H0}Wv(=M*n*#kWCbyt=5Ghu)!{MVf*Ov@8Hyd(#7+Nw)-O*13DoPEh2 zku^F72mU|q%fJi=iXVQ;azJ~(ERLP7ei&c#xyLIm1M`9LzwK9+iIQ8L#QLF}d^u^0 zI)kHrEXLKLtY!5y?f>gWQpGN^FkE=$YoBeSAbT`wjv26;7eM{(KcHqis<@4_`hY`{ zxQ#nhiqX;(s*yrj#<@t%jgN!fD>Jlcj$P{iZ=mJ0LqneP^uumDgUvrwg{jHxP>j*_ zg7nCC@yOY@u%k1|T-TZQw0r^GRGx*I*a7IP+5+fj#A7H>7E5Ud4SfeRYuFksdfYM~ zqfUmzx`a5=><}l1Y2Wroj2XJutmpLUZos~i+bD@xU~|z$QkPY0qz=@3?ppov6yP#e z0cbUA9}Ms(tI54AD1)h?{``IzB~J_&o94T9sxsIl8h+REo6H*)#y)Z^SDIZbw;0lm z+Luh?K>M83GW>F_duIf55nX6y^L9`(y18cahuVP3;{1EKAnDqBKc~**-qdWFm&5sV zbp|UV)jRxq=g1tR?AFf$F?V3{nK$iVgJRN2%_{Y_uRLYyocU@BXlQiAe$77bNm)(F0bJ+?rChfZt@}F{*jFkgt+-_2OWZ2dHU9TnI>$J zJTH^Ouz&&(mc@I=h-h9;M)mX zn0CStQt}#3d^MOXYpuU0($u?WWEs}F%qo7qK7dILoRJ~P7R?v4*A4$!+u$34yF#zq z@N=Kw=mELRBOjW1>DpgLiA8G-ST+GKc%P@6UbS9LHD1=Lp?3^i<A7F>1gio0v5GwbvRS0+1G0XbO;{2srhW_w<_H0W;4Y*n!CS^flRFu z&1hTHslECZig-gNvm!b8p6eY`YL`#8)L?`1J5Nmd@d3VG<97)Gna?{bC#ILPKYz}i ze_rGKORCV})eo)83B^_8rN)GlbT^IF@&FrUi09xO=B-cGn@r09kzOD1D@er`t&h>J zZJ!36l(PFyeR7Rcmy;yXO_Xe&{cRGzGPW^oQ&|ENGt*v`GZ|C7-4>pr%x)D{dsz*u z1hud1A+LV@g00uMvEUt@^QK#rp8J>4kPO_7x^IOIqmqgLbEv=fK(T! znZS2_$-3>MyebKnbkc-4>1}&!Nxb@oEWIL&eaATk6K~rtnV%! zXP+!bx<5V_^xFFCbf9VHyAQH|g70+Ps%Gl)Xa7up(_dT*G02(NO=&+zYx;f{yxq0) zm|2LbS5y<5xa`5k+2;v*yO3lB?ZnN;FbTb=3JSO@Ta@vBjkYB=7rr^9hB%fY)}-Ej z1Dvex9MCT`;hws1*Sx~XY8LOKKy1nu%_D33t&`oQ9g_x6$8a&XRhl24EIPBlIQ=+d zn$i%AJ6Cf$kr+Dn8T&AHE;}f@bKl5)+=o8m>L+`qX+vC4a*$(C{7J^@&KrDMnFsX; zr*hxx@myxDBKFN>i|BUlyA7OaKpd}-h+L9D(gW~`ImB~K~=2H86?g%dCb;1-wFaG2i+0=Uq=AA*C z6l%$%m7MEh{Wro}W)Bp14(ds1Wbn`Mf;iS^T{T~+VzLhvt$&y>e z**>T5`Q*m{Zn{Jkygu_l_wonfiyvO-K)f$HG3&GnBQp3ka~nw6TvQ+3Jyc{|ub-YAHB z=Acu3wy)kQqcL`pH^!!TxzHTH-q>4-stR-B+I(B(hkuntTHKs;c^rr?SWfpppourp&(7Vs zZ{l~wyFR|=l`e^&@~XxmemTM0f+hQ|(lxIDjj&3}{LwMyJzEg?rP!`q-T36%)Vacp zXHdL@jD+(jK8?+yKXd1PUXI&G0;~B*>>&2F9VJZ4jAiS6WYW^mirm!kW2tqyI*I`B zOP)2Bjf0uLn7Rj*WRX|&*hU%)q5+dN$0^r8J`AQz)#mr^NwH)NNmz$FcD3r!W79SS zvLC;FNwe3wCv{&rkkz00d?_#I3%88_;toQ(^@_@UZ9+eQEoFSqu2daS?us^$4B#pM3}1ExVxH{a&Q^qO2wubTBoXY^v%*Q_H!WC8V8 zk50a_8y&fCbF7VjoAv&9+}>uNPRcTlfDT@hNU>9~-pQ~9vR`6;eXYpToWcU4TGWeD zJ&|s79=J5z@+5KnDbY2#CTSMq;tQ=XtWj}GQ^n3`UXsg4wm&@Oz86gBBjRX%j4a;R z#-v52yIP1EfF4|%YLaibmU$)2-qK3N-S5jWktlrV461he`ozh6l(B+vmz_b z=eOVq%?!y?X-b)4pt7R*)=|s=C#f_4mA@8FwwvYIhkl$p2_kbZ*?U4tT=$=@@GXVa zC8E1L8WMdnC(4&h8_|a^O*`-iBEJ|=$p~o7DCne#A40iT*G>3Y94e3RUcYaxDy|+F z)M#*d;6T2O@3v4syXuYU1{$;yZsD{=L3xhnN0QIQ?cCn=_b#V+jhv~A4|s2mD|H_R zAlIWGXK(UTq>L2py6(HbbEk29zZO!rEB!e}T_iJ=da$o|LttUMarR*K_d7vJ?yUa( z2(DuQwzbHZysf|2wAy8+I#=i@j4EpYF2j+_+7)#{>CODWP>Od1%-P)dDu0vMalk9T z^0@fX$-8y`AqhtNYVpYTq`N1dQb_IhQ!O*U^;G(w?lqaC=g1I;p|fSa;YzQaBOwNj z_1&R!oNV7+yi7S_NPjT+irP+GrS!cUB(BkXRYa}wZFfqAl$_28s1{CdRgGxoy?*^& zluT#SvlIKiSy*KFZ&6kq=`3%h3D~0aV3(+~Uub7Z%o~Mhat}kG1dSyZjz4yXhuf6q zwg$hq19i*dXx^jwDv4&X^2f=y=7}$jmxbMta-;R`7hI_M2*{xf*^p-~)pt0%2^af2 zo6~yT95ohk8jl9Y2b=G76@1sNZ0LqH)dCKvBP#YhV1{6RJ%KjZrAgRvq^+d>&iDAN zB-^HS#i948r{6UZHILdOf^L7qBSN%e8lx!{wPEN&8>L>Go4&ccJ^DjG9co72@v%-A z5xw}6tHg+-^cM;hnQ}cvh2tz|83)Zc4Sm=YE={aVw2iF zq5Tji-VY8K>;hkoXx{{)@-~lZn~HnOc$BQyfu?0+gLXfELAx;03X053S^X%uyeI|* zjk6Aw_NMTRtf3DN~Tnisd|900&*sMbTMX8>wE}hr0`bgv`vTP z>gUKP>ih0e!h*}x(9eh3Lens~BJV>wb@_3VMkJe%7veWV|1hu?aduQL;)IY&0T)-X{?&YW_`^@^2YW& zulm4`K`DNWl&2+Zh<0l6MpY?E0W0usZZGkiqA+4C4Tf%FIO7{?Wt;}>PyU|AS(jk! zd5_1)N$iaf!U2&xb37FS3JWBx>}5LN0hayqE*N}v7N``Jm45dr!!B(!gIxgABw6veQk zr@4f5aH`Gw?@wn@%LQwM>s)cMU?C3A7HRJ%p*d_{M?y|r` zIPEiZ^w$hP+--L&wsrTc@*faed*?V_W+0bQ4Uj&xd4&X^Pq|LrDu0%JULWD*KO);D zj@G6DbJHP*+VA&ksRm1<_X0}tr?GKIbRHtw{XuUD!f@cGB(BHlBBje&EbgjBT;yV<4CkOMo41yhbM=16m;t<7G9Ee`?*M zRV24RR)u?YyNlyh@HVFL!%|H=7d~^VRQDGQ32h8X3w4L>^Wa^*>L=15-=GfAu0=jj zE063n9&5l1cgBT+62@H>#?0$Zkko2XR+HI3u!ONCJe9|BR~?P`?TcE$h8sGs`ub7KEj%rJosla3I{%w1rIJx4%q_) z3TM`b@{lrT>v_#pKmuLdS`>KF9V7+GKB*!PIjXU z)ze+m(y~bKWiEcJ>@@CciYx-1E)przz*8&Vp98#9_&pvh1ZEkn2PNgW@9E;lvz*9O<-SG1<9?Diu; z*`{@_EBW--C!Ho2wc6$qP1lz@&K21_LdD$OEpv0nLk!$C5s& zw1(kjHUo?W+NqCb&3Tsm?`cL+dKKf}=^1JLu1rE0a=s0QJD_dVUf{&S(8@`d2E|!q zNP=h~=qOE!GkW=sjASmrKf33#lCKaO!==egH};$SUN-342d}Ls@8IVkp2hr@ zNn-|-b~QbHYj-A?MpW8rDO@R1i}JhOtRG5AVK7Sc*)Iwi-WMwrQCCLtW+LFn_*eEr zx(W2nbP8USqpX@xAj4S+y4ugaK1*%BSebGIj49=&agtAA>b;P|mhHdyThuH1%M zfdSE_p6e6jwdn8W>+@!09l*)d6g&U*IW_V$g9~fyP0@SbzaAt|O+8udC#7W)e?FXs z5bN&Wsf4$N^*z4w-PS#1YWjHOef zxpMceZ%+BeCdVOzWv{FuSiB89#X5GYIM82A;$huq^VLbX6ajp<%^WMigUY)ON<6d9a z8!TLQb`IF7Yg=LI$0px?fbCG%ke$Nq*QG#V;$CtgTYGGFeQ1VEzI+uyUqqbf7IdY; zmgP=6(R04joXzpF!F{8$G;K~!2*307>7yATc~T!!mu)kbcCzRdana2rEom{s;lhsh zelF(p9?r7ge}$|v`4glfP4_$Kg9P)6l@RTpkdNgGsJMG3(Vd8@<6&WgGNku5(^E$q z1+dlE)yS2o5+W}3767Nd-RI=jsZh@T@_RiY1*twf*NfD#+uahll6sc5t8Fu_Y{G*g z#~^zp=kW7WqLW4d({>poyHstXrtvoq3)_~w+F#mpWbXr4n;0Svn;F&VeGZo<@*uNm z-3<2u1tvqvT%FuM23oBIYyFvC(>J<6$=7tUi0>*e&mRX}-EP>K3s`6g4UZbC-)=hJ zHu9Q;hi5U094!T&jbuCVg<{<6c6XRt`vY*hPoM@VZ!%Als)a*y`)1-!fs>CsjF2^E zzaDS)2XtWIdWA1YtR1<3G~lb2c-0h$yxvbSr^xt}P z&b|NOvA&v+G0r08GDYjtEo%77@DN9?-e13p5{S1N124}K441KSbBWZ(aq&oJtC2UR2 zxy7EW3>g>nvct5^SQzm!ZWjV2vY{n~Hw+p*MRP_mbG!Jtp z=6RYA#~6%XrmS3Ge{wLyA`PN%=ocEv7{kyJ^(x<`*LfNLAywJaXF`2n;y=vMbp+4Z zZ**tX+@gU^H_3l`Cf`{5+xZ-iNXT+DZK%#p+M5nZ>8IINgiA$4SE?=w;Oqn*z4W_O z0@bbR$xuPwufJPxH=^zP09Pa;GhU2s4z{y#ThTLeB=cz+%#xsRlb?U-zOyUVl+f*; z7bv#Z#l+7xd%__~5qavBsU?^PVDLeKC%j2CIVb4)>fPt1c1!KFU4vw1uqe>N-}L(7 zp+AkOG^tW>5G)S)nIvLHHsocV>zP`C;jI3qm4`7mYO#L@5jTt`Rn+xvvV!ctJv2;O zS(HYx;Ps_YRah3IFsKm$8jB``iQQtOLIfqQ1bZl$4W$7NwC{aZDd(`uf$nIGYe@;l_hcdbqyJ|47vgjELB62V-X*{@ znd$tbZV$$weh?zxa;T{Wuks4^Mxykvqm?{H$;U)qJcjDJ><3$c$iI3_M2TWM#72-f zc@gc}86{|u7Pl23w69!XWo3Co;4-u3t2@)B%dEYtB}MNuST}ZsZFvAn?prktyp#(u z19j@sS<5NOtCJ-*DZnj{C;9Ed(6-hs^q%VE$B#`>InhXe)CMk}{ZL1;XUD0!PB}== z;u#B~eX~RhV4zfqm5{lB#%~c_LWkZ*k$jBzCizW)(wCo=KUvMCECYA-&jJlVe^m{< zaR9;6i!q6tyUZ#hAU$A~CJvPGf`FWJlx@hR=j~k=+r`T#^3?PGKzoE4SRhRmfjkgp zWsL#r!?pF-IOKG`dPPjmGz}Ya3jV^{4{N{SH0c5N|2KjZ{S1$`vX?)UCsUz)H*TcNWmSD*)xV;UWK#c%&F$sIc~EY#oqn zbY`S?CP9w*&1O%)yo<#|r8F-Dp^anDdU>gU?s?QrPrDzWWKRlKVo+fZ?}k8B)0nr$ zZ+~8<%CFrGw&I-E2%#*Cx@nsKdo8gq(X*P$ms;!3n#^;+PiIel^660a!Cn9@C7?^+ z3(0_Emww_$B)5a~h=6E&@22(s|Mwk>9im_)dFKPrzf|~nD+3c12{iF+0Ul8YKnP69 z$0LuO`|-O67?d#$!+9I%q7H!sps^ZxRNTjoGT*=4H5ugwdc}=a>z*^u#QwJ&cDjfc zD#aTuurXS|BpPozcK{FF{$(GGg#bu)str64l-x`=tb#mBYcv(L090`ZXd`9uOdIJw zyy0B^OO`?^>`nQh-6?GWC{H>-9D2yed$5aA{U19s27xw2;P(K{x~RLMjq{03q{>Xc z(hF)v^~o4DupJU3rb~1G?;|r&2P|LeA<$?FzBwazU8lz`2VBDk=ilz*Z;(9A4W_u1 z3E}8t-cTY|i5C13S9em&xIhpQ#ZLqWETk{knas^yVgHbLK#kb-_1*F*?M8h^@|-Z7X%$UFi9qS%LOF$|Am zZ_*4k{a-n~Z%xBxzk`=GuSX*#mK0w=A$66t6nF_D&)D7( zJuV4^z?ZH`R!kcKrWKueZb^#pKT2LU4RoQ~BkHDYmO5es@$9?fQ!X6lm_!U5fgx9( zJ0Lt>gHgP7-IWUjNMj^V)2)v{H~Js`jg>AgU^R84qcBRL8}3(rHw=ES$I+;ORJ9Y7 zGNgQyaRXRj@n`8)=ylWJ3Nnaz;~@p>mU(b(BSY6r=+#Uxw^mw%aTDEq@QMoC{1PoN zqN%t4BdWAa?o77#-say%v}9t3O8({75*-p!<%zi_CxDD4*4EN#m>pnl5EqAFp6e7~ zN5#pT4DBR)Ha{`$BgB$XeA1r~m=x~==3Cv|(+)5r>hLv~+repJ157ez-F;~LZ&iQq zztGY8CvYbHH`HE1gjE&n z#xDSfF=|SiO)G>T!&=2jBEjA_*>5j$Djsrmk+~=XV4SDVfFCwzn24d`5`Xa)ntF>4 z*!S1ezKK5sm3bAm$nhYJt z`eC6@;B;0_#Q}T$q{#b#3m(mUlUDY0wWNTOdvA(a{JHK!<@tXe1uQ&P16UrPU)I~3 zO~elMNvj(=1v69N_%|m=2#`Wg^`$>~sQG?Q@>i?94FE@_6IIl$)@84PCkl`>H0O6Ky z4?ytKv;&~*KfsDttq)MmpR4@+Hq?KB`69ZDj;I45nB4I5%z@$l4ui)3#1Uio{~fK| zz`|b`*wCimtfn|X;P}rVH|XvQ5RnlIG6tvh!M_1D|DQnm!3xd39Nbhk8z-B0)*MBh zjj!D5>w#?fZwdc_e$?wC8xI_>FG`-}KEpm|X?#xp-;5OwN$CME^&cS3{1^$aoo>o) z#mOy?7+StvcEDy&a$KSU)YF6!9&xs2+AKHhzkh`bndkD!!qB1!;GzFV)?3F_xozLW z*Q0=vBHhx`Ee$GcIz*7}4gu-ffVzoIcb9IuLFwLfcPJ?hQqm2-h3DLRzxRFru0_==N*e%Fs33s69ZuJV7am zJ6qNDYaN|!8C~%*|GV$+4Z+5KF;itr6^E?8gP6W)eKW5d7*r&z6{p~UnUL%OB~QRe zrnItg13e(nQ2SghQ&sx{61ec{m|N3fn$lk5sead;JWMe|%)2C^!-pZq;<7}qKHVME zy}MU~!h6n7mA-!+5ItpkI%oJ;p%>#u7t~fBm~kx-DB4{-Zv#n$o;3 zlL*ntdh)1%EPfs5@^`)*EBJX|kG z;Xfs1T}v*_?lxdAoF&q(pINk{UEXypIZEdPFrnT|rA_rpp!k*1tu+xi>XMCNdVGa8HZd09HA+($VA2hD6N#|y!IM-4&s8s zpJ&{E8j#~sPP0(k0hpXb`smRh|8-oXiSm^Ymb>TqnpzYnjL@3S*HVP3ypKi}qRA%h zl>}E~4{^lKequEL_U9l!2PNk=S(SoPU{BB#ZM7VGQ=@5G;9~}>-ItV!%0>)_*ycAF z91UfA6mGK)+I#bjR55>@NPBIUceMcw%~j>R$d7I)@Ss#BAcg8}&k_D3VL9i-(7nu= zZj>I^o~t&Ob8Fdy@^354I@~uOEb}*}xgn$m1fuNP)K&&2LNM<5{-t33UDtZ;)>@J%_3p@>8XBTbNBB+#ExIV>1pc{B zv(Gi%HQv)@TCaxS9 zzdUNUsO9W=PW2wt&w9L8qgkcmXFp-mToi<*Z=yw<3~Bp#T(4@?j-dvfS{AA;cNkIuLxPp^z4Ldfy0XTv*|DK~Q+ z8~UETkKi=$`lg&A#&NVUvRoY@cJb`gbTHfdXh_sI+H{_LkfTZ>K$x4#^qkG9i{4RK zAE+z^6AXOLH;un0uP9G7fL+||(Z^Pus!T#iXwY$yRrGV;TXY)oJ|sHxf52!b7b!prD_- zPFc8GMyB?CzpZ>nCnjKpXgvA0A(2432#pRaxnPMpB(hDG0Rx+F1v z{#)mhu+TmB9=^A+`PV%ZL?t2K5AjqhE9d)2hS+#?5=#Aj4q`I4`5afe zj}N51O@`7%eGfCKt}T^zMW+2Pc|GFX^^Sz1Y!^uv!p~bAqTcTse3^Oaaa3q)P%C!`Rt}%#NWL)C@jlnCzP~)%FS72de@z*C?pEvD`iq_u&%g9 z@Zv^F3M-jxL>Da1vpjEi0~}Rz+%*P+_x1Y=9$sIbW-!9~L(m*cJ)r=`t)M7=2AZQ} zOl!Yrxn2?o5`hA@g-^a^#^;92ch@=ftbG-$RiLpp7iqYu*tTt_lZitvdE{AY+I@}wA21|e1Li`3Dz7ligXqU#m5pYGL8K%JJP3ci z^vdn~n#l+9-v6RA68DIrRiT?xBPl`wJ?YDJ29`&n+REMGlK>X^ zF9@XShHBFhOwicjbR}>Ke;?x>F>u{U519s9%&$>SPBF*fBt`fj`~Dl6$rpyv`(&nA zh9?$!nYm9KtoGq;p-M(M4;W4WO8Nh}YC^=rmzacUVGQ#(KyC5AnVf1hsywvohkOG2 z-0UF~JZ=HNT;7EK8wLPq&ZF@dWUI_sVazr_%a#AGyIqvt%O@Z$i;8P0Y$?U|p1`Jndjz4x|;t|AQ2u z0T(JPLOyLH!+=%=)Bsj%5-L9HM5cIJ(KVyNCBW+8y^eM(iQn4mWi zs2G`e=B}KiDtwy69Q{vng0%CYd@AjTL$GcUB%mjRzw2sRJ=gHOoU)(7d zUSLg~Lq{EScY;r$Mi7np$XK;kYW zBSBeu=b-Qh0R;8ez>`fb*=a)p&sMc(xc64KWR~;lrUoPfX}N0zS2xXYS~& z`$Pl1-$8Q!j#!wnU+Y40M`o>dO%{s~O=^Ikjn2WQj2-XoFJu1yn`>JW7ac-!&82~? zH}PqIBq{BJ;bshT?2zH&eRx~sfm#Z=RTzQMgeY0_fH@>!x00O40Lw+8og~787?zGzTcGl|f6JB-*@qTCz$K1n1gD%(JxEF{P9v z;<5k~^w)&c z3#mnaLr#_89HduYrn5?;nOdQ~gFC{^%VzaaHPam$?(er+SG=-%1mGIR=e;{C7^)pL zqzuKyt-QG5mvl|_w8YWaeNP5!W^5(0pJo(=xYXT6JjeS@M|WM5C~y?^Cuey8UGm@L zlu1+@4*>7{R!8W@px8VO9Z>5tOiQG|q9md>EBoNciGBsUZ4WuS;r_*PRTEY50Ors2 zhHU8dAh??x8Y}JErswcAriNNBy282yJF4nN@lu{M6ah;tM^PY`QG;)BX04- z2$PUcGr3!O%B!&*Pr3g~uC~amti%IXWm3O!y`~BU&>;%(@3B^YlluhftezL%l1yc&#|qXdweh z$^2N1SbFJJodlCx$$|pPN2!)~=6Wi!|6OXc2} zhIYD~qKWjOPb8{yK#*|YO;;z`s+bgt!WmVEAtD&`+8|IY4T;>%dwum|#05GKRR~xa za$q|@`-2cwQsMf@O0G(TFzf&$wMd)L4_3u&j*3dL$k8t;;W@>qeR`8vsxnj`g|Uq` zW76vz#0RR;_J|b!yd!162vMlB?gn^j7QbJ>F3?Z^gIW~<&Vl18NY!gq@31iK)Ptij zdJ*KxUQz8@K^a?GCujst&<_lJI{)DXH3ki#teZ^rB&7;|_x4C1dRsn8G+)!LVr3 zv76$65VHml$CW+T67e}y#18l*4d0dwjkkFZFWo^T8rZ^)1#yRxim}wuJq`!>InFvb ze7Hoxb^$QJdH3~ofGe?`%#y8GTuW!-8yP#w|LdqRuoFWk$<^q4-zMyYk^Kl%=K>w^v(K{YTs>`Gn1wgV7?Qc)!mYZ*mOLfFGJ5;e?E&&@^ z+m=~K1o@O>=mCMMBuSURYU9jc5_kI9Y**zgh$3-czPO>sl8X53_FjKXIHfTnG2>K^7NwFbVCCAn=dNO0Nl&?w4+071zliQ% zW|1PU$xst^iHBd~9_o05*6-P@lJJhCxMu$hJAboU7#X)|x5^z^AsBGuA55Pocp=nueN!G5GgEt4$QBKbg(MV`=B7 zuY)&?aJ!aJa7CpIs1f)0Q1*!=$xp4<*%a`(6F>33u0skfmw3a{C2C6K8pE4-LG`2o zKr(r1Dn_i5N-s%r`|x9oms?eiRPPR3zD^j_+-~zIFRKa?1-t*qi|zmB2jkmPK>iPhFRW`KpWocS z-(G>SKViYS`<%&mjq@xVjpbOSqwP&V{^49xjA|baRZI0VXFa`n^vTCO`u;cP}kI}+G03C20c5a z$K_YK$=_uxctAc3Vs%w>JZi`;x4{1GvkP(DQaiWi<#1tkz+jcUDDk}9sm{G)NUQ>G z$Us7hvMzY4GZD4&QbR_psUHRqUm|asi*$H0E+y`P3{82{(31~Nr5dgkYq4Y9X@`Rx ztS0*)#IX4Qcvs#kw_Pmj^RlK>+To*k-`a~`g;awiMZ6@|hT@Eq6p&9K&$ps=o2Kwl zm0X2|*c(Iha9b_!@kx~+@5N7OXO&eX=2jZ|)Q}VrqJkQR)%raDt#5Jcb`W;8g*;Giz?#;V6niRfz!0LU z3abRfx(>(dSmQE*Dv@7Zubmp0YD$4BT&x3?r948LQHBrLODo>DExYpa1NWq>+7?5* zF#P&Pr4I#D&k45K3f-h_tO;PUgFX#U3G5yHfEohpA6Rz6}!M6lto>82UFtHmbB*A3IzT|FudUAO)-p-&jFg=Ug?WfxB^pP1DmqrmhdC zNWb-teFmIgv~wbFU`PG_1$flVh=<3h{g6>%E0`Id=0ILH67lgGjV7E=n-zgY=wD4z zWT|b9MHt~LI5-XdRC4Gs>=?8zH9@DqNNW6nRTy4t9_P^l=L$*ybWx#x(Qfar{z7n= zeGwf~X{4Z2Ccq*@8T*LBQcd-WJxOIIUkKq&8x>FZV7RQ?a}TSWS75 zP8g2#&{8~(cU)HbbYHS!s6}`GJA8R~$O`sW9r-!+ee0u`o1dE4Kpi0rM zXc-_<-Ke;me2E`k`z4K#;@3Pn|K!l}ew1;-dZd!z2}RQUGwrw(b8lz&o-mD>l`HX) z^FJ{;UD$0`+4M>u*PHR&s$(QLUDV6xEjqlb&UL4kYxuYex6fP0?-5*n8o(lt>>iIi zGUe;YbQek+Hwp7$GQNEi^V0WS`(k1sn}MRr*nu9dIWJbMN!gjiWggrXeP;4iomZ>h zqtf2rVx4K{{?37L?+vQG>XN4I=;Ms~#a)(9_hR-ig`5!_6#~GOWU^V(8Tg4tpi#4d z9+gAE1XTsy=gA_^2-G-K9!+)FG1FDZ$_VE5=TwFz#U?t)0y7IFk@18tA}Dc)G1#3g zF`52`glnZfl6Iu=hK>$nmP$li}}@?okc>(mS(;Zkk!r8(VXX^%AuI78$GQ85k+(n14l zZKxH+Z?6vbwnsA2%q`0J)zH(mVwPaw*^yMZCqTDRMvofb^!3WDkZF*A z`pZ}Qv2l(B`D9FW1bk1x2NTaF;gej7_t%6U6SJ_nt5 zkzOuMGpF0@Qv*KB;iso5QDzRuODsxPSI1k-6MRadZ>mvkfQ#&UFtR`!SmAUVBHWJ}e(RMf_u1xg!AAUcd zrZexwj=iri7wmW~#Xg-*NPyo8KPUYT2!cTdT$b)E1b(tsBOPjA!yvTQJeqO-&-HoD zv#(JWd{}?+;46d94+@kzQtXR zf7;z{B?;@`vD4qlLJi{oYJF^^$fG&&QEKr>`V-PqN==O)&5@`1MJ%X6^D;-?{NWDh zk+9ZMDo67U7!oMY0Z|2L_tovzZ3%_!)kyNH#=2kf%YIwLB=r9Mn_5!*_vPYY@fn3PZOIq@y{4Iawr!=KzDV>mDE=^~X7YX-x zW7iJZ&n3x~)P;U56C4RcK-uojcV#|eFFD=wlpl`x5B^ny3OMfeDqLo`95J{N%7g?L z%r7Tq41;R56L>VmiBt#~DzsuWS)4x+tKS}MHzS%)6DyE%8#;d3cO@y{I}~v@L5R^&Z9p5v{7!Y! zQGMydhM?7-@AY|uuYOa5fNAy8da~y>^qpEEw26z}3c`-l2w2qVPT~tj;iwoTghpk| z6TA7u8!-QQSO}NqkzErf5WR$w?1YyP@qw32B`eEt0Z8n?IM0q$-}`uit_h+E>~{X9 zg{~!8$Xyc}J!^oRfwm#QO(`)6MF)LZmsX2vybl~W)|7pl96<)KC5K7aHd`bKXmlMP z+YLvAUGHe9&x7-#!!Q;!+jRF)&ZT%Yq08@OU3n=%@AV1=>^nE(v?1@?%LS_2Ngex% zUr?UE=_!){q4DYfUl32{R02oTxhSiLF(q_qn6&5=0<|l`-(Y8aiz+YDB`64UF$DlS z*cn1f?OpnALkbh9-jXt8`7;pbna3T=2=8y1JDPnSNm81C05LVp`+rN_lof9$tJ z4pX!((uhHD69xhQeUt)*h9f4#ug6Z|dAjS}3A{g>gp67rC>XpY0p^SkNLY73Z>>p5 z-Gc|N?E1SF5$s%NkriG-BSzJBtaN{&yR+MNrfT(@Xu?1u*e3-8k$1aY@vfgSpqL=v z1zOKHUt!on8>}Q81vBwN{?F?!gDlabs;NDJB{8RF1O7=0=mQYVjkjh4`Nbj7bhp+L z%H=Aho!#%XX#aGwGvjO4^5I@K)QyjDi60w(VLu3y>GVl1fWnl{MOD5?xyAYItn7$k z5_Y1E5upr~Z`QN0i>R*c)94Wle@>4elt$)i=4~R(aYShfR&SVytZkCNW|mv>+s)SK z4Fc%R?F3N7y;cw$eU`m~if=C(n!GQYDuB!D@5zlRK%dtL-egI-tMtj<#^66YvZM;0 z1k1L+NvZc;8{awZJ*NeJyaD?!VW@LX;P%I|-$1mg-u;Mov}@!j z=w3FKt!4+A6lnw`?|5+}nFT$ZfF>Pnh)^YDwJX2kjK4dRB@}PRk@I56%}=lIgXdB3_DnDz&3E-WL$4s%!r(?#MEb6WO!F)6!F6plphcH{L0Tg`5blK$I-0t z@iC`q^10Dg@F+`Z1NZ91R;hS7DE$m-uMYYmKC>l~0rRa=WdpG6jwnSv8|FY@RW_Ab zc$Xp-O1!^Q>b+wl+zh(uJhNvi(IR_a@Az0N#~;xsEonU{=nqfFcicgfpF2#4>9g7V ziC=ABE+l%YakA7vJizv8Gq?(%p- z6&#c;fKESfu-xa9#C95S4DQpr4jg4vc9j$AZWj*do1J9#vqqrTE&q7g=gehFuX-8K zF`CVRM!0ZQta7HzsBIF6h8V)J!u-cb7<~yFV|D# zrA<&0!i;~{e-lm8^iH3Byfbnzh(@=ZC4K*3Baj^@d_eKiftl?l$f#gL3tGNmAUPd5 z7ZD`=umfaIwwDbL@d7!mj_yM|eRL<~n{}tfzu&Hcge+b0a(|4~`mY~$>5Dw3 z;(i^6l``#uPNTr^q1owZMEZ6KV2ro^SIZYU#E}qVOzh~C^Dl2+5U_DU4($O!1W!7g z{CpUcWWKk_d^Sq)DVLdnE3Nrk=@vxk21&U zoZEuYn;MGk93qCELn8zXQo)$TY0t7e)AL(q7hGkd;N!098rz z>GqF93MNB-#WbPg-7=FKz)&Km+2=?C^o{0j2N7_jr3lZzaZ2I0HR%KKGYSBLYUGF_K z^0GAIqWh*4A(CBF_3effRbxuR4!*N=zIiv(z}Q(4=)1kFM-Y(QAf!-d1jlLd@|{kM zs<+8kHuQ|DE1cpI>wIjIRY|NTqi@;1@p#f7Tz`S+@p8XYn|=LGRi?#Ysz<`C*Iong z0}m(TvmSRkkUl-&@YxUP>Ma-4S5W%K8#4^J+e(ki8v}#G&8M-XYdww*^hX0v%xay9 zS$ibCa2d~3u7vvsN-S!)W*HEtnv`0*bito|$+AV%5qek?KY`<=6Q|SpQ>t;pt6cah zx4#00pDPVLpB<49HZW{WywbUe#up-5U5mp29?XtuY}Uyl9*!L|gf-iM)+K^n1MQBa zKBqi4X3rqFPJkbV`Amgg1dv{>LvEGZxfb3XNwkQp+c0Y524GXj)xVy898R#qB!?h! zpbQ(mDJZp^@;F>GvkoE)Vp7fdEycj0v40O5E^2TEmsB7g(6S7K@MB#$goVwjp1!K> z8G0&}A%3U^9oFBH2cWOqcJYXI6a&m9b^~jq58-Kdi^TebkunWHJlXMe=_m8VZ58`g_a`Twp@s|z3_CUMGyTc;&|r{xe)tXR*AkhfFQ{8?G|Ug( z+aeqT#J~EtQ+ZQjH8J;|CjQ{pj18%vUG3(pZmlmdI3!!yrdgz^EP-Y z-Ku4fw(XgFeV85ISpZGr#;6i=h7ZkBdlto$wE8(3>jyB%TmHB6mA|+|iw&0qiJshQ zH;ix&zk^9jRBoWLFuAWt?htTX(~ZOzMuBSQQWx{S?N@!={TjXucds<+1;6Y8jV9O6 zv2QPqe%a7W7mSj)nVxc6-4V4ZQRM^3B-t8Cg{T@-*0Q{N6Kl|7eq!m=)Yc8Y$?-$}N>3JY4#W{qF$NTHi) zRgVLRbdYh`4J+cJJblsjWvV!zg7cA7(#buo#p3pFHwp6>Oyb%k|mbk zSj)?MPJHKlaC7t~1c@QUhMSx=JVb@MrDjfC{`n-h%avC!e|%4MckeDzexIR zAYvZFtzUTN>Y7SI3tBLE*a&vLfjBAi6)h!nGHm(Q)x3cFwS0iP+F9(wHVET)w#xd? zN5rg;osQX5nucn}v48-alw;}Gvc+`7ONb);VD2TU@hBfGSUR`@$*kUPA$Y<6g-5l( z#VVyz-!DHiIF;J=E2q9P{A~SmUp^&{kPGl(A`yC9*)WhdG@k#Fc8ADu43PdH5FjMHH*ud6B**6)8ECN9Ha(q_osR^?$NaeH$ZNN#MQ`*}Sh_E|$&6TsB5Uec7iGq% z!v|?8s*-$F>h#);C=_^$x&%a? z8+Y>_dSFW1qAkN6Bn6CwA{^qK5=J~^)~OXUJnHntDcUOn>d!r7+Gp&o%WCW%wsF26 zns83c?TZQ+JRFnWt#c6-Dp{-}Kb+;A^Y9UZd;cm)aah{q-Q-a|Z7h)=dug;eOI5M= z-k#Gg!5*a%)mJ)4D?EpGVPJDXa+@VN_I-nuMF*oJ@l8GaM8jE1vGyg&sBR-_F*<5^ zw$A75mpCL;LLbc^Y0sY_QrA_@8=_>+yF8ihAK$-Bb!#XaN8}eEpBy^ZS(b0S(%M8x zAB;aA3Z}&K7NcumuK*?=hkJl0H#CqgdifEYL^u1OlsSo|jSz7hsIVHFx0))MTQK9_ zRD5bRA}pNNJ`(ZBKyuwSQXGDxaTEl1QT4x3mQMLZfphaL(PfqeIVgQYN8GrK1AgL7 zo9Nks@p9(m^nozN&7on6))vePt?_Zc!1l4>Y`-)lLZ(6bQ%PepiGuLT0_;R@7u%fj zT$|IQndsBU%w}ALq|+kSTLn%_%$>o>AiGCW@2aW4+wJlo$FB{dczwwgzT3dseT9gd zw@h9x;GUw)40ur|Rsiq5P+A}Icj9~JhBKm*XfY=q%-=mbaX$I9HB)bS&=WWJWg@ZB zZrBoQPHB;`_YE-3DGu#8otI!Qn~NzQqS_xC0yiq0PfSi37*%ts2VTDmkw+2>vAh}R z4BPvrobKD#$cpn)`3w68%NE`m2bYD0DWdb}411Ri?@qV4o5T`5#+&6+6HKr64HHa! zDBm@XWg_FFcb|WSp58m{^>Npoyf!U^ZKqfrF2s5mBzT{`DZBO=0%kgwMSjgsoVO3& zYITLYyp38w_ry7uGH+N=Ux<8VV^Y>PA|B-;PSaLxY9K=OPW<#of5V8dDEW57PqrUb zL@@ToCeqM37jI7Mz&#Yyh8}!2WZ+)#fzsTz(m-WDwIJPCavL z`=bhnyK8@J{(Phhaf^EmInsz>ia6TB-iZ0^bgGDKDdz7vzP6}Mzs0TC`Ta%Vme#Vl zLmCO+;qR%eWg_PMb^D1+*d9GVaTfoG{79Una_e_gYGKOCe3@*?=55?7AK+d!E6y`! zVqv~sz8&e1(d`nan48hRCA{rxc9HS2{)7r;*>#T2_w0ss{YV_9GWN9(d{fo3)vAmK zu+AIW4W1)k7P^FNBd|8S^MrYU-N@e+0mWpOOBTdi$AWgr!V%B1llR+ z&U>>)b|R7*uu@v;ZrM+R6_Xk;iH}bWQ|7+!`kJnVrKiuKu9Yht@K^^bzDxl=P+J1^ zn3r&1n6&Sk2T0!*9j=F6qOG=5L1L*g-qvILMtThea^KYVpAqVvF-yA7 zz7xz^rI1*&;vq@){LQTq;yb3=d-aQ?=x&&dm9_OWq#~v$cJJn0eE;&LBgq|5hA;P)Z7w_T~>!nZmU)trjHB76HJvHhHv$c7GY z?yXcW*`aMux`CJ}?5LEjS;N8|rH9zMtbKAOI$vCoUv(+zhpwL8YA#k0gk1Vgo#>S2m z`AVr5;PDN6D>}(7vM8l9yU6!sBn^hrcWH6ZCNvajYqnq`AhGss&bw;K#ri_4Ud=fO z?)%MorX{70L6zFU_w!^-#L;NR{LRa~Vle(SARMPEU69Li!9~IRdv>4ZIUc9r_tPVa zPh4Y+59+D-=@WS^963#wsz@pm-nY66f~S74$f%6F%*n;0sJn*SG_V`^>ci-m7)-F`d~HF};ASXFUXN2HwWi9W+8NS}2DEGdOq zp^e5>dSj9J2de9KWZO<_C&t4k*mbAAilG`YS6VX+-!GlUK2gv$>zN7$WK~Zg@{??h zp=4TUn=$M&g909=dhOKg`Sh8w@cZr!TL=nzVKG3lkopkxu5JR$a-U#z@c=}rz6r!)WQ9oTOIts&yhBx;@y{`5eEZ574?0=ToRg7EQ?-L%=k(3 zO3kc(Y!-MP($0#ZZgyo2H?pU91!1ToL(&5sQ(TWzZe0cFRdnSu-o=5Bq>i7>mD4yB(Ak5^1mOLC&XS2*v892UEH&?X3T3baW8^kl5llm{*tRDWEe@03e-484QJ8CYtAuz61OorN}34h$S@xF()-x|<{e zz+fP<1}s1I^WWxUaw@s~YL0hwS7kws@h4b>4CwbOUCavv&C8a6Bpay0?>NA#64iLK zS2Gql(U~Qf>Hw(PP)3EhG{7k@u`)F`XoChBxR{_d)%3vc{+@TUKOfcqJREbznB+Uv z=$+EfC76>&ffQ1VUoj*zh(=(-{BlAJtA)qe@as=!LQNcNHslui9Fx+Fc~%L{2HoO( zS#_eJ^)p&S#s=>xhBJj1l(REsPgLYTc(sbr9FPME&E3;{^yJdK>YHX3)_%N%yCA*p z@BbDsiB?};vQXl@c}S<&fd#zkS-jYRFR!02R6?((fz4@Ir{|2*qK;0__xjj7TfW1QZr_)FEqtn?Xu<>TqTVEK9d0eH79r~;``)BB7JjPxD;QOa;ZL*FqKk|}y{uY|C z>DLj>>O22yqHsvR=KZ4C*Iq%Is-Qie{qFS;#5ahDu_#BtAi=l&Rm0wUZYXJ<2T|`m zb=P#v;d_aqceanChAnxQu*I2X^6kS~H`pecIL+9$s`cpEm8y0}<~R&O6m-V@udsUl z2iMY#i~+cZXNR9}H*PVfD;Dps+CZQ_dGSm8Qv`@DNrwm%u_(gU_Xi^mpneS#qaa|k73C?*9f zjKW()lZjRr5NwH7P~_uTf5gTjpPU(T04MXLjF64g3C`eqPD-R2xPTP_N%rUytVuN$ zRaf38|7>P3a$)~F4wJ}VS*V4P$WiH#j_0AJcieJ|d^kHPGo;w2Y|^mI)ZN`qy%ua? zxopr?v#xf-8)@RC`e*-Y*C9urtBy-iPa6;vAV;P4J4B?4=)fglgOKx+rxaA`!9Zfl zVNxck(d+)i*5}WCjABkc#f?D2xb}GdcaRz$#UixKbjb=}`Nj6a_JKiPG7BK)TmAmN z{X&Ia@zucJRV=*RlLkz{14C#~O1lz(f<04BI~hsS%9=_sDuf3HqsTvV2wjNVO-rTw4qel_s?zzkpgQTKH{gp8FE1Ng%Q zY)J+`cejuc>GUqwEe6-lkbsELY)2*)kn`EXP#jfuJC<8#O>19cyhKZO7P!CwQ#7K6 zr^xv-u1HpsWxgR1hl^ke4az@n;O zdhx7UUtb5LX3CZoZal!9LT@ZS%nQ{2t<0N*4nI+lmwca+XW+`~^4tAA8m{OF5$xYl zkW-TlOjO+esY(GQ^{e({R%|3G@}OxFeh5tolNN(AuS+(P6hdVhV!k4VhDvuYmFHuACuIp7LsoNu`AI30c)L7`U2x+wkX6GL( zY+*dnWl3G`_@5(+0LLy}$3mJ#sgZ=0c=(&eki7yxbX`btf3MtcVo-fKkScfxAvs8l z?0RqI2i>RM$KX-z0QLm`J>=esH1N5H=aELBeWAo6+*A^|`rVcv#uHT}H3?La<)@%$ zG1SBhuCo-(BIXNtvKnpQm@cWi1RLBh*I6!P$##^G z-n5a`UpAuBIG0woUc|1>*4Sxa#|799H`M^!d;*+O{cl(k2=I?q6AYS8!}#aB$@~IT zc)^Hb0qMaGKoHx-A~Kf_0U{ZZJ3)9Q7NL}k@L$ z`R=3k?ir3l6vI2|)1HmR@D{~1L>Yi1z5_|7kQ-Fs0V|!7_VY3TTsHs!YIY08n8P|| zIz%YRMu~`4Cd>bsK%#-cr4X4ScK%e^#|Mz%g2CK%|BP!)jfp@Kj+dKFy=Px9`>w z?Ei$C0x&ax^qg{4r4WDOn~)SkhG1KZgQB-%hADSy1#T+#i*j*G-ej|+Ehpw5Q- zug+nrI}C?7XE%#(016q3!FjL7+E5CAsj?k6E+MOCS(h2GvVz);at0d%u1JXaU@D2r zUNPS+nVglM{oe})Oj*I8eR6Dxz5GegVMf|WA+b}WyvRoTL&d|>gucK@gv!{1zo+`z z;BcB~FB9-Ly`r3(W(OW7$+WF%)`7EX5k zCg8}%B*fY|H;q^mw4#^+b`+|opyleK^R66aMp?ggiGcQ?+o$hcW|r4@jl(i!v`Uja zF=6va`?*xud=rhejBv0(RsS;OVzATd!x3sh+=$j65gPVFR(JZ$YTFrCX_CNAniG_W z)z&2q`IV2$k{Nb=PGfcg=ga=#RtQcoLZ}JaGE;R$@<`Y|n$Tm|i|UlVWX8H!r$a2W zFa+48+?lBmGQeOPFj?yU(z!PEJ+Yb8m0V210krI^rLd!_(#%J0g=uhD(P zYA6Y-lb707uST*X*h_H5QGo42rj&wk!VLVzpm&d@LvC2D)KI4g-263_cBh+;d^j%p?GwkQNyl#=cdiJ9JB_D?%@~`3=Yq z4T6qzSC#Ko(i%Bz$%?K*b%7jxD#a|-#)&8@{kD>@(kk)(?xoS9?hN_N-4~yRj^;aj zuZ^zYEj8(4XJ;{TA{d)k{sA2wp=hFys>HY778lhrTjQii*Tq~B| zk0DlS^a5fe^0?0}Nz=x^#!Dqt-s1F#!3nv@YP8 z>a3Z^-RD;h_nHB{9bM>*ZT0@%tR;43bYj4Mtr4*ZX%1@0;gPQ-RY<}9;(oGIH+7)y zT(&$>Q`QG$Yfnv}M#STRaw7fgClv zB2(4IoZLt)xOW=~7>>APue~~(R7Q5?7F7mz!7NNw}>O=Bro znSu}kg$_dm1PjP0Mt>3ss0cK?-7L@IVjNQo;>lWjSOd3md%KCjnt^Qn=|5-5Y*)6C z^UHKPn+;tgF=W;7az3u z`=!Bm8_Hasc2J;Au9gm^g_BVot|v>-vjG7GHYB8U>3nL&y;g5e(Hep`v3v6HEBUmJ%7aOq zSVCM*V&|l_W9A_#ScrSJqtgz_2(HS57H<``@y*8@2j3UW&Q%pC{opF_|7CzcBA>NtlT~GG|fr?S#=LJ#|%#iz?4z z%#dMuDQ7l86mg*gaA9uV{MyIvr5Io%9ZHPE;^4K5S~9R&%c%kWtbEq+ zE{PMD`^C>*b;XmuwdNo>IDlxT){SXdq`7=dyf)$<6hjYFHQQ$lJh2})_4hC26~WxS zrvj!92~{O@&SMr*H*#z?a5>LaIB&<@b?7lEu|}gz*uYX@?gf=_ZePb46)5G-O+jXH+XM_=+x1`69Q3kS$X_&2 zSP?^LrEU-3$o!T~=53jQfz*msvPs(SZW0~=UTwrs+~pYq-4sq7suY109gOeIQNcqK z$mL)2Er@S@oP$Iog;2KqBxE#3dCJD-tp9l=zFh^1>;qXh``V2i9X~17l?K_duJru4 zrFkto4WxaYc@<9f`J;n1KL{MH6$p8DkWA5PQ zsI9f?TJb)kxsSvIE7~fV#Hwm3c$Q{a zfUGYpl?UvRihIjA#HT!+eZbmD1WehpTv-^MF+7gBJnNioOeKmBW&VU*Vym@|1l(5> zH%xr{zxtaMNw)6t<_qwNsP9r8l@#>%%-ANZGMk_zwaOKIln*O^E%IQ zPL9X(+_~=SzV7?J?$7o4blmf)2apjDPJ|!)ZYFSUb%hn+rx>z)?U)U1sO=JD2Iu#85R!`No|6k|M7#?rOj707p3zDM3@4OFwMBs6({#7f8`& zLCC~k9I zP6za%VLg~pX?ixVqCuic##v-|chT-sfOH|$vdFu7f5 z<`C4c&v)Q7Qs$u0(@PiR83f!&5)Rt|2$6%BDULQ0@nP3k#kx{lr;U<= zGY_iDV<{wmIAV7ou);)f)f>OFz7PRasXcA{DF|}Bmf4WGa9@Hl7aR1xFu}+$!Hp0^ z=o{c+>B_o6+lb`lZGjD7c9;_EE`KOrtncn2aBtV79?8+*LfxEKeHZJz;L9P=T|6v&TEOF{Az*KA`ixpZ2*|4#mSZR+C4nuO6d_t)yl>mpcrI&9XPBJKd&&Zv-_%KOV=>fEn*1^ z$yH@vdi}<=S8X97p!x^pzzI0|6ge}#cXYS2t|oT?T`)pY&?{eKUpkm4=j zu4UIGjHVq)iegRhow9`A2Pd*>rjO7`G&2lDNmd@ii+*iv&3JJ8<=B0`|@<< zF{SbJd#loPkk!+gGlsS;O=<5HzWi}=3%#l>G##RcLF8fXxp^4580)8g+U_X3H?g3% z@@d;Rw~}0;K3D)H`;qRh&-doJpDp^3gO4_^{4)<5$o+6db7Re?sWK|k^($M=&%g+Q z!empe&FT2s1DT7%T@tNs;uE|>J7{$9+gLVmu_47Wr@>xMul5|8!}u;_^71|5K|{|p zZW{?;vlX()X&{99-UhHT=e!4Wi0mu;0Kx7)t-asA=lws4y=T+-)5;8>W8W$RB@~T5 z;QI}zHn^$r<7QHkdf^_uN$7`P>Httx0s!G@e?2X{72SbQK?x7ExukgpaMzfm?b2z| zvoO176Q!&c6=Y;Jok}vy>!Ps*hGFagU3{#8X8|>-aaPYog2|``2XwzaSp|q2W%a+_DSPy$cQDIT&oXjG zU|2}8-N)GY_`2OXf?8Ib;O1E$#iG)H9Bsiv{k8j(9JA_+;@D9lz-Duc@{0dh_kF7w zpqU0(OeA=Ly>+kJ@z%R^Qaszl}6W@4u;sSJsYz9A7LpGp3rxkYMmsA^7-|z5kR4@*RudTP%&4lgs4TFhk$Mr-;De?tY|Yl zhCaBy#oRdGZ85!kz5Y2^Xm%eO<(5yc<^dF^0kYQ%Z~s2{1~w`H)CJ7zVp}fJbvG%^ zj)mL^Yf~&ppg&*=59ZWtSa;8v7F}oosNW!;)NUI`ZPN9p{In#2jU=s4{6U<{JACW# zW{+Mhn=z-N&?jYDbOfM*{deo-sDdPh(t}sk6VKPv;?PQ@Gay>|8{WGgDyIHS^K<_gu zzy{s1T@Wxx|~iRpdrJ1y~+lVHMx$VZasTdMAN$=kq3SvOLPDNj@HX$l^^m zc0(kgfcWv%gmyJUz{OEzC}N0xS%1i6EzOUiUq83%y3CB;67qrMo{R#TuPFc&QGCEWi>$@_|oi+iUiM(X(n_3^^&=jSh@RjrV_UL_C* z?VjGNT|?MSMW@t@;Sgu-cCB(F{jaZq6fJPhL()`Le#Igb{FKwB5k}`#Fx;*771CNK zh;>vh$q0Cf3O)#>H83^&CC(HNWj+h9{#(qx1z)=*BP$q`U9JGk{ogl_6+<#JRDLla z={0!s6=dr@JkLrgLwT6`zywQi?Bi5H7O0>cy6)#obiXm&3dsKNS7!f^N(888Pq&9m z#S<*|GKrCXe<6FX(L>+B7ZSx*bN`TDOP(J#JygklOZ|2#dP6NMJ$NlAL^KmI`RFdw z+U$HmF5sX*pquVq{d7s618y5wH^GM(Lw%h@XYe79W6LRp0!;F94@gsw^PK}x3y3!BTPLNl zwoNr{1A>b5ZBmn33-o>dEIdpy5Lfaa!{k#WZTWb7IaMB=crbdhH%gdm*f3Li`g zc~o*hjQy~V6RI^PTwNL`zF<<#I((~t_P3|FpU}8#NBE#?_v*%$&ro3DD!=~(VNgh7 zYd;!8-CP|pOiyoSM|=!F5|TU9?f2EYUUp@^oPXcvR8yG%uX@YD@~nMQya*3{&!B7T zw@LOM58Ex6KdM|gP9E)HUWDOETTbu3bOU6+Zzl}1^ct;Xh(@{8DJ){Lj)wfR>S&v5x zc#Wbcy3Gf#r2W6%8FXG9p0dq_zb?KvRo~7*RdliUe!*`L-^m)~`gY-D*BR7rHMUT) zs=QJ2X1$-iVYfqyimf#O6WQcV$TDZ@me^{PIn!O4$lOg;qtXPM@Z|N32PTy)dr=SS z6G6f$gFB#k$L#wtf&h-3X8@Jz=Je}|(mhz}h^s+XA}Qj0r+Ja-_z7p*7CZh^UAKMPS*lM=sk@KEu6YX8UK6t~4}K%5Rlzpn zeG&xK@)Vn$ue~r!$i4_u=sE=T=j2-E_P%-eW&39?K(_4oDCazKz=5!heP=hNlpWT$ z>Zb84)5TWPfMbc!Wy&1Bm8MrZ660D%l{`Pg`*=MWoe+tRqfX?dNglkA(WJDXoT)>Buy#~oWpo#n6F%bYtqa?q+m9q`s)&mBArHH_K# zl-GZ1>cWgO_2iumd@*$ChD+w6e7}w*)IC2<2WmUDy~}rRLU0HG=^Ge}4PQ`)X6K9M z)i@U~zL@Jy9sB`R1cb=hUZAzPo5VtmHv()I7;;HQQiJ2oc(C&d+5Yd(MumOu zO$pwQ{H1cQ5lqN~(3GKBc9LlbTON7P*=;56JI#3GDVD$3mO@JDB zsLJ1r=du<_9}3?1u#mTPPctR4!98O~=qh&zE3@o^NOA=Q-|Y52$bclH(*O+xrQ)ozSono3JC6NXbP!FLU%@ zLhT1GX&HF6qMOP>P7`B2@`cQp*vf>RMUGmBnal_PE4N*O@VPfBuZ^Jgt-rG|evu7O z0ZrQTu3$hF>pV~#eMP6rP0SE}#eT^6<)W0%g{G#0ipJYGsqSY<@3f_e_YY!Bj;`a5 zL=#g@iEDRn)_vdhyG^0*>~-+1(E9CrgkR33dzCP8GjCu+EG+nZ;vS-YUA5DzhMTz2 zxy(yH_0^SZYUlf#23eSwLSnwDB88Qr&u2)ZO6Jlg<-3knl=e$mA|ylaMlZnt4NdeQ zKt$+J%BH;s97m|?wX5-1YwF3vMZF3i#{Rbo2)8Q1s zPZPoFaM!a%ZtkFnU-hBBmJ85z%!f&pK9foXOw?TYq-i$FVVGx(H^p3(tXX!$Xxe3F z%Ky~1yde4Xd%DxQ=YvdpOXd6_@%h{GP6Zy{QYC*3WXN4renl+ ziAGoJeK9}!>RT8WRH-U-s2{6lJhvXXk2=S}5^AQNI0yuN=J`m<02~sYmXLLZR>w<+ zTH{e~4OyDxr_ch9I)6{R|SddWYNTcM`(`K z%}(>?PvttG(9%oxuAy%_p0FP(U93b5;v1LWzzA&vl;6Uan^u&{y53N}Xt~)Z)v@o5 zX-mSpp1^Z9cL`KUhe^HY>2i^q2J7aacK9gIGlm&2#~hYTd`S;uy6jN<6O`Ewl2&@ zi?T5|vezU$B+;9l(TwBwa7a(dLg(jE`vaBD&1FP0(KmHdgGmt9)S6t!+-C82e<-nT zi|Nz!md34G6wyiVpX;bzB1iS8Fjz7>9bLG9 zZ01UT+~JUwY)PTUwHZckMBlR?p@2>uo!Ky#9+LG}A_1!BP#$-S0boiC{;e=eqv~{ZbYzS0LS>sOHh0@U$DHHs(o8xl;o!tHo!Mf! z5X=v!o`E|2q39R%g`c%+c{sjUR9oi^bTu9<|GY`qde=5vfZc@I|iidQ`u7B!ci z363SLWisY3%L_`Hfg&_5J~?xy5@Y80>$^dLI;<>Kqf?DR<#{PgBg*fX0$nOtNS--U zFTR_=?eC=VoFNZUK(dEE)E1;EgU#@fRM|E)QitBS?USW4&Q|4DA|8)FNRj>ra%vt@GrZdyHV{C3<7;vRGpn(|mkLI`7@gbgK{a z-4IVCL`JgzNd~V`X{Vdo`%}E_&dV3D7qexR5_36khbLx2s|r5#J zwATRU#hFZGVaJ>G^67@%vq)?cFK_SHAS6KrTnJut)F5x_iGbpeyF-k-{;A)?qWOcj z3@=VUhf(P#QBFYagsoWR>QV?vzNd>{086bbE0HJ*D`w#U!}tC&b}w7Z}G2*Zc7 zi<;@YTw~SYFcFi?H#l8BnayS#<@Wt1XQwJ3e5n52NowbXrQSyx?{-KW_4LNI4%i&A ztj>Oz)(k>Dt;DPKa3oL=2jAY_vOVg9zwk4^aNtD}c}V+QEqj}V^eNKNU!>Zl3Q#f8 zo^;;X?)KO1hiQHTDd;PN;_|6xm5!4_9Z$@gF9(uTSn}qGnx`q#hn(|=(?^PC@xa=K z7EIGjU;d!|8u$Dh_$EAQm|(FkAln45n@+nd{{W(s*Z{F1`&FeRxN+WissT>gtP6<~ z%ob!up$~BIA^NiGJP|m12@)icI0c%|nh_K+?Y`)xE*my57e1XXquq?7Ylvtj znERDdn@H?Znzcbfv4vYwIFp8@N+gXn8a3(Hu}fB2mn-MM@90MFh1^onq>IwU1n-fx zW2W$Z&-VDY+=JgFDx0tLmDzZZHYA+_>`Hi@L}c2rnK>l zlYIFRiVaJ3e9GH9ae^ZIZh-S^*}wNX^T=E27wkLrM^o^lhfRA+kq=9i(JQR2Rq|Xx z<$i;*RT>m8HlE-R5vXQo9rRtCrOH9Y!$Rii=;v(ipL(SzJ=QZNeEim2XJzyD0A{-B za1aj8E&3au=b83!RmMJZKiR)ck8|=Ml~Oo8$#T=cmwsviSmFFhRbZopgDq3cUXeu!ur0Wb6xt6)9^JDEW+$F^HvTPC#uE!CW{4HUkX6b!c`;&sfQ%M`Ku$nzc-af^N?wqr9KrZnc9YA?IC;cz0s!O z@jWixqfrmo`r9ognw^&_S%VjrB{oh+PvRPQAiL59VaYq;6;DXR5a+KCVWxC0nCA0UpS!Z$7clr#P`hNh z>DVoG#vvlewo(G!mG!#t@7KWSC#Of61k0Wf14Doz0$!evbhB|>2}TMt%dIRVt-5$u zv>vQ~#^BO}8OOo_{!znuF_W~6GC{LY)X4kpONmsJ%R%~;?hj2kczb(Of7Km=qFnWkyH zVxCTy0#XA{VddJaG?YswC1P7oL+5dp9ABFsn%vt{V4jap^3fJm0!U_Ya24($d1sal%BR1Pvwe?4 zh|(6iJRR^{(_9P+#Ok%KT6^5+ylD$S#-mdQ8yTzQ_;Bt_dmua=oU%oF6q2US%50bA z1_{IN$PgV|Df3-YG79SFYh=fsgt+j#zqLt$U4D{>So-FKQ@tN>2R5}3<(B(5MRC|i}jANkmt z1QhGu246&~CXMjRaPQJS=9gouv!O&=g>`f~3OjexX{5`-l&)K`&mje^csBaOco~Lt z&5`VfA6I$Zg|-nUYwYegtN9ETtP1Q>tDwu(GF&qKG_tEZja`EXxBf{syDaEs*3AF4{2QpTVqb=8)ty;Y<;fP?2*u(g?fb?J5Z5bm4$oJ zfKDo^7KeR&>q+d>26`rGi|S|eOt2Yn648N`8}Yu)GB$4-d9qJ67aW{wz%)JECD#K{ zNViVJ;yVbP99EV8U$g$Ba4ev8V%!K3#o>d!UC@v_s!*DrjRy zs($1#`U=Dt5i+y4Bi5W@tu2>NABEz>Lk^030#`>?3I$%_1Qoml<}btdOwW!NVau+8@!gNd``Lq+~ z02jnB3u^~w95iloS866M7#~{}{EJua%q8$$m?#&XPTn);9i0~4CCF`%NYpGYxeO$m z@_qE&H=+}>C-Ll{-@pYj#53*W)@nfpbij2yKku2<9mlvrs^rr$YdCChWLYvi&Gux( z0UY5X{k#)yNA}rB?ce-$y3$&e zp%vmLFk7a(IwF$d4mdhJ^-!rjcni8cwtS8^#aHCl6~%0f;?NvvZRNJ-!<+9dfLRgn z@l=cM>(`fzyb=7nkSoy*9A?WgyrbMjWn#|F!~4+%3pm#Y`=@LNyQB%-xB{LOsK`M7 zW?i)D-nxxdt#YEvFnfNR78CQ<0=7Wl74i=MI`OXisdU9w zQOktsjK|XUl|-eq_eG-u|4g2UJE5GP6vIJ5F5lGx-=R^ir_6EYet+;UeD;5H#y!}G zE{+eKeZ?MD6}_SO>fhsz8-9Fo<6xJ33_8G0B$^9qu!IiQVD(Gl6Q=uvLjgX6cShLb zY2m*+72le^tSJ}>vYG=iLVJx!p*Gpx?|#q=>ndqytBJDtwAsf3y)ZLideZ0fO{a#i zB9%0;+N0tNu>qMs+3#0s4nvN6hM(Xrj_kd`{awk1|IF~*U&DgV_~lO?;%HllbNfhm z*8XA9P*wj57quTMo&3YPqcwD?OXd>LiuY|w$Nw+h8twTc+82k>)wym$u#3v2v|sFT zl9V+aHn_gr88~={IIkbM`ZlNwVv{B^UwMeZM?c_~!8U#n+Svg3b$?3o;p5ovC zK7L!(w~R0>Z?q?|s#6MmtLs}=34`ii!M`8W??{;3y+0B5#jx+#oo+E;Q^y3MlrjOA zMbO#WEnkRYEUJfYofAbia7U(d|4GMne%HxHlhe7GZWG6Kt}p?K0{f^r-bFaJfmqWJ zVujwbkLr+sOqM8`izs*zXy$7jYdwRA;2nTk5dlGKg_6-Bnp$2ghDkXzi6`Y?;XsYR zh{cbn^{*PlSN?;_$KQM?QtXISb9j$A#Baq;D{6hLErik83VioOj=lHTmy2=p82Vs1mHo#wb z|MCuFRAc>WAZ)9EreHd$`L$IQL0v`H_D;5-*3Hyu&9YFXOwE#%yR?m!na=OhC@nrQqT&ha;LcCGTKfGD^KX|=wTZa89jO-XeR&gV z5SWImEXi(eFbDEHoq=Im;Wj_65U3jzWg5tV2+>YYnU_OOjH9Ig&-=pL@B}QME}nzCdg zK<6>p03lLVf8;Y}>qA~r*_gpP7jFvtuz>p~70q7lX9|$C)@KL@5Bp?`_+rs!E#6JB ztOj#ZO`AiZ$fOe=C0)eSc%2uz!tav5KtE<-7TS>pEUJ!o#JdDDQ#R}yy9bK*KwwU8 zv*vl+%62)R{YTkGHpVOS@zLh3b8}y|EnEmsd1H4nx3h6}G z4KF)^raEt5O1$mq6)A+xU=XPV%kx4q;N3S03>>T92Cvqh-B%(1A*|X;g>0sxE=g)a z&4vgw@+(jGmaa87o*tyBS$l=%=K%E3Kp4B>aD94V1pG2;m}LihAM(fBe1Hj``|PC8 z8CC0CuT^0Du;l3{zXT9~j}5fbF1JjFK@1yEaP7+S<3Ev#0$zYG@-qy4-dg-O;#u-K zh?KetP;t@D+x0vm^YfMG&dr;{SFP-hmwWtjLMAM}E30WwyTW%RMd-WUm#I$uo}N8fKNvbF>>Oj zodK$L)Z~PCVhGFnYf)|cy>6Z6wlAsKMx=V1V34pij5Xyr1XnqOwL6;E%zESPZetNd zMhh-|bvOqQYDm{G15EGRWL}Dxa5z6EtJtz5ye7Ec{3Qu|Z1ly0BX)XR$QzF|099g% zW@G|U!?cezV8pUV9YQY1-1ujJ*t7Huw{@q#NL-S;Pin;w=DXz5^4_-oHGO%`y<%;S zA-OeAdF{GJqTo({;G)J>KWLr24f+aDXK9WIxyZ+IRhyy)T?OOvR$tSv{nnztH^%7E zj4VvgB~b4PcN$*$&v*vAJc@hkSI~*e;UyradsOj{h^Y@?H~E<9)ROjye^{+@_KPe< zO)Zq8Rh$l8O$J0Y2W~_^r@uiDJ}0{Zl1b_J%O)%-mQuXlsg&Q>Mx4}zIMu%aDbUp8 zoIW{sj7$AzI*a3NX5P2-A&7a9GJ* z7VZh@#G=QVGTQ22E#M*0u$ekUii_mFoBa$vCWNSGX{=`-u{VUS>-_$IKgUGchQzd0 zVQ>#L&-)eo_RkIYHr>_PZgZP9a||?WZ65#mfxYsy0_B{P=1g66BnaQFob6Wpf%NE7 zc-Bk_7h}Md7>@AY9+N)BWG$yr{h{(|DgMN5O0(sS98;Uj$ACAiPtEZCex{(^v(6ko z^WrJ7rVgPb+-0&@)i5rP8W=n%pil4-GfDNZ^dbxSR+Mx?k&zpq93#c+3+Be~42QRs>CH)%Oi8gVN%J!Rrlh2ut@+8i z6_+e5Zc?lNgsod5xW(E1wR=Pz;#y|lV_JYiIjG^*zgdhWkCEu*0aoN*gHdxVKHcKy zqQ&qqS6?d2xqVYXrWdn=I%`aN!^XV6P=~mc9Q`?792pv22Z;n(d8%o%rs{N`nub%c zxBk;k2{#LyhH40cPC{T)^*=j9i9n0wb5;Q62|3eVF$6^XR=*9a5 z`aw`#k?~TDK6o}tIToGq-Wdqma_{&NztGGm`B>X!+wgS#iND0W_WRm& z-9bZiC8FwN@`bsCP{$DbjSv~*62kdsgib8txfM6C_q7SQvnSxZ!j|l;tz;YJ@X~rRRY#h9*8e9O9W!ewD0_ znRdk(0q0%yc0<${9aBi?2K3kxsy^g)LZ}0MXpcoe>$Y$qr~uy9@xHdL&l#=#@ik95 zS-rR{`;4Vw(#ZO|p@|oEZ*w@*SUqDXbM5~EMulVOmFclC#gd(R(EX2WLTVDf4@ig* z7jFXSjo%lxg7URt*8Igi&grm4;~;(JV|-qJFbjTq)J&xXGn0}%&#}z7Ey!_>J~SI@ z_FbY$Se7=6k$rJWq822z_hx#h-0t~p-iW12*wU)!8avZ0DHm_sB$Du zBWXENaF`wK*0B7hLxo-Hnz@m0j84#X(1kM9lIgE4zBFkfu-l5)MT|zLY435%*_npxIfrNf?bt*SYT6 ztP7ppoGX?D*k_K{}oAygpJn$vCJA6ov0~tjRRdiaoLRP+t#`kP)qW_Ng8!v zGsyV(M}M1=p^XliAYlqHXWoXJ;lqz$BEn;*i$_5PQ$J3`b}?X*Itc6jGz`DMHMrZF z9uCBrUw?*>6&I`VFmuJ9UK?f-s)>Nt#(z@Wn^LMWj$yzMt@hjLE!_5`LG0k_ri*wT zG~V*byR|2loD)87$TVOOZSi&h$!-yKu=1P}mc@e+n~L?A1xyJaUc214$9kS#SPzhF zGvjW)3g{!csVmzCoclRYk)z}q32Zs9IQ z))GDNJirAu04P#cN*$bS6eaq&`0b`Nq?m*)n4iz8_#A%O5lhYt?>T&wGUPOZVpugT zUw_eyA(EZCaWI>(5YF|j2F&RegS&$*?KGlByL!TDb1r+~s%DXX&fW4C<@TWf3<&z{ zR?zn3H-`?35&wq~o^)z04bwB9w z@Wa7QMPUgC14^cUkCOGH={lmQ_VaLzkq$A5gO#)tT370!zIL=pm=B-E<*zaw;4ia6 z?>yS1XBZDCEGHxI5?@Hzv42}-$ilqp#x?}s_gAlI4RmetcgV6AvRckW@z zFeYbUA@=!1sL_#{oM!DVi#Q1i!RXJ!$NdCKvc}det})T%hzUBpNB8JUI;*}7Rls2O zwxA{vRgiE@7CLr>MX78a^!KzN;K4PJdSdxbkpH8(@inGUih9nX_R>z`nW?h;viyqU zxcN}wF#a*fIDY%77P$IT{Mrp^j`vrK^7Al3X6^-8_{|boaOsOU57}mz<^vY??jvt} zjbUssm1~v^Vkj49?=9Z^W)=38jX%^H)Sxbb0G(d#i3f4QX%G8%wCTg=Ee}}&HvJ1= z(|QiD{7Lx}>L5R)+$!hU*TD$L>X2@5n;n*ynxlH~TX-Y{ZHRXVmbm}tm^Nji18w9* zx$7$km8_^jWWM;gXgHOb+rJ7BP9+TNVMyWD6n1#6^=Z2LJzOsvkT4hgYhcl~oYDz; z*vslJ9z{^;v)4O4az>{Cu>{q)V(fNL2Af1Sp_@2;g&<1YV<`a#vjbPJ_>UiZ+y)}I zWB+dLKaM|0c_%A($cb`)VZb{1mJtHc!Gk0@i(w-e4v$u18aq7?5UK4O1 z+|!EV;0UXK^kM+gyunUZduPJnCip$EdxR3l$gge9RXne?f&0rPF5k(|o;FF^2^>`% zJxUinue}sCW&?KLCoKdD^J{YiPLhU}46r#xY{s4;Hco#Fycp%FP1%RQF*C!Yb~M@C);Q&B`MsJ_J($ zYLX&xvN;P^BPe56qj006<-d~ffq|QTE8WcP`z;X+&=c&@v@lRq)C`<88bn1l^J2pR zcy@TuSU}6kaQYFsRw{>!1 zw=)PP&f!7iu|&%!U8!R7cw)%WC&RgSbx1v-cMVZPRyX)h)epyC_Dc~|hpX8BgZ+~z z1b$3ex+Tbm3|j4gV^Q$y4+iFK z)4|QPD>@)q*p&?FKyH-?=g9|v-gW01)uDHd5zvQM<1u3$))x(+%v~T6Lhh33ZHGEt zXq|iD8Yo3~Rdiy@BH<83^}AvJ)W#fwKC}gHuiFdsZcjaSKthwZur}t#PLEa5E@0)| zxQ+v2bGPsQ7}~!q-3Uz>T>9dV(fx)!7?%-M0L{Ar{;m-MN)o<@*SVl}-x4-KRHGX^ zmsS^!+aKvb*zaLLG4GCnfpb4${|J9qR`6kO-JTxyM?eKItPkH|J+VdS-yALZLxnAQ z=i8q#aO=;9ppUVov&~B*-7?3Oxe)cMil&w(eD=kqb#phMOsoW7I-88qO4u$$73ZHw zS5DdWAg!9U{IV!R@@0!T(!vnjty9^Uiq ziD4u?bNZLZe2a>7bhxBTg(}Y~l+|hGUum0V$eUxLh)J^dSXElZh^dDEg@FCHn8*s1 z``>BeBv3WE(wRq28Vmj3_+QQBs!OzWSL8ew|M7|zi8OaTN!6dVZSVAW0e+MeI@p}t?)5k~E0SK6SplyLN&;OdwF?3H_=TpH7Zk+Hj5()j*LqSrVV(6oU3W%R9P<1ZD?qI5->L zcvGmaw3<}cl*{LD5|1jZ`ZZvwcb)lJ!jr`}7~BKtiE8;V&2~FEzx7Lr4c~nD@%_}d zbHf4jYlZf*5yUAzeZHm9rye<8(YLS9G2V+7#Ob_Kp3c7#)L4!!Hm5pueo2~KtVfEf z=aWXV2;6&R9PuqNf3Qo#MBZ$k+1=D|puQk4|FT6zuXy8Cb=&eS=fxorKaGu2f5C~_ zAq}Va4ypUJJ(^R)5tN?h^KHu(lGrrYqC+Uo-VsvIZpDG<>dU7OcZ7qAd`zrBE@)N*f=0ns%=AWj4XYWr!nA`+Z1+zo?9| zz)c)emNqD!$9oe6&YC-y^&VMBWC5fhQ+lDC$d=++FF5rSwnOJDo-}bk*;;!E=Pd0> z<-|~Ye0;?@1L!;DDD@Vq;WY);Qva@4RACf0#Z{GKRf>e4n&oxrLjNFMu=w0n&6Psl zwWp~apWb0b_2y!1^OZSSK4w>jx)=J<2j-(hACJcUbZ3X1%>3*ZZ8KF+%1l(*Rn0J| zEG=VUSQFVM(t6U{#(Pm}hPc^!Pm8U(M!iR+zM~LVP}tRC!OCu#*4ulZr~;7wlVL|z zpAmg;4?q2Jxl4dF14n8+j69z{P}6kT^Yxv6**~S;PmW1%2Hhvn%ZVgk%t%k2m)LAg zeVOt(Ua_#4Yhr+Fl1A*8dX~s1-19ZQgwiphrANhEI$`+(WlxBM&G76lK1r!1c<$&#zmO9}g{T(d4W((u!D@)Ys> zTROH81;u+1Y0gKWxADbn({8y|%Kw+osN_5jGln8$a47xyVQQy4AlT)|H@c6*q#Q zRLKe()8tw~#2Z3Sa c&3WtP^)BrTE9z6sF<5l`)1V{lL)g6k0nYQS=Kufz literal 0 HcmV?d00001 diff --git a/devices/surface-hub/images/sh-84-top.png b/devices/surface-hub/images/sh-84-top.png new file mode 100644 index 0000000000000000000000000000000000000000..badc94af0b509c94cb44999db5e0382bbd4030d5 GIT binary patch literal 20000 zcmd42hgVZi)HbT3fD*bu=vC=mDWMC5-lPQxy-RP>n@A5Ow170J(tDR)Lzf~bRUk+e zC3FmMp#Q+_jRNoVDi6?0xpL_dI)MPpr1465$h?C-?5%BUDjVczy5Q0|@qi zGCnT$cm5Rx5B753>$TFWdo@#Zd)S+Y_Hr6>_wLmv5nwDIVecQiD;s&;yGJze?|Xm5 zt<2`$J&k4+1vx!GvtPM*Z3aWlx4bbgNYh!E6yOerPq-`w$et>alJYp{=>fP}AaxI- z2MX}ZzSa9a3Z#;|PbwIvdid--#qPtX#?jqc_Mgzu>@K9((eIq!64;MR*Yt_BaHE~Z z_r~!mDdE8LH$>3`8}4Fs|G&Q^f}>qG1Gqc&AFM)|lB)d1CDw(|iZy7@f`)5~l%)TZ zAf%MnUDOGNQOZyv;zLyj+TBweI@)9?R z6}`8L^`b8G)l-~QMJM+E-n%L;t!W);G)eu8zRAakmc*WJ9QpT}GPomD`8eL-8HGTOQFSphXYaK%;z|)hi%5h#;Bzq7J+fo)L<)dFo{nu^W zlY^k$oJPCmV^$cRFh{V$1tv(@bDC>{b>@dD#lv{3B zWP+W0W=*|x?-J7?hR}nK&oYsUHN~2EZbOMOKN|XjF4f$5Z$@v zx<$yw+ItBP^o^tkbwoz+d7O*<-@1GV*DI6$=<*BXjTJ$Obp*6Iv}xs$;fL_^y&t6A z`HC$c`f*OMh-+N7u&59Rr_DQO*WRaTL1pW~f!|E4*um31WNf2AF2Ci$kLo!#b?HI* zv1jV0^4JF)AhvpXdQG&Vt}DCs)+33eN~57*zETw~9G{=S>R_u(%P=B7RFM110)yq} zEhW31Ph6QH3++V!VeMDRt<6$r^-j;;Z`0CfzOAAoFXLg{Or~x~9G`vn>P#+Y_@B=u zJgtoX9A_9O!OHPqQ-=WBUvOXclMOwU>o-Tc`w_ihB7r>hb&vsCfUHH6M3inOPGYic zpowS&&{QZ3{u(8emzcgRO`%UE0Ae}=DqfGodrIER|#DVCe95~$qX+L*y zbjc+!TEwdh8aOo)lFuOqMFQ0$_anp-{=uAvbAd{WG?e+Roc6;n_h;&7kAaV)qlknK z+R%H&z$^iJbiF2DC65CuwMR72_k)LIounWX{Zi=3D+>#k%(x1iC1&TjAj>G?kqq01 zk+{y%bs|HAa(P#%R9hsl-|Mlu==io1m&CkDBzW{<%MWLJXin#46pcWgSV&@o z4sGJ7gO4HuP4wXXO~J8#M+pLQykq-j726+}A+Q!S@xIi)eQ#J{ZgpY~?THr=QUb6n zKFXf|r{k5`94_VUKCt~iIb^>nORCc)ckm8=i1P7Vn4!gIZJogfVfEik{cmy8qUD}OIQ8zo@e#8AQj;n`@6Q_V!#$2SxJWVbzB@ON#Eda=ALsPf zhqwPh_+gP@U>siTatx5Idhi2ouJ1zGBU#s6Y5G(jsK-bK!F(1G|IrtG6FdMXt2qt< z>)33eJuBOLkN8>tg|P5PVi}olS13h(>|_p*<^zH31>vvpm6ZY`ZH-MEEY6rss}TB1 zr($>YuC`ZUJU1kR(V)m(UA_^zPagk`{)!z=w4t<_G*mQ{VWq)(7-sd}qh7P-h2SR9 zwCptx4hzp*@>j>GTv7jI!<5DY zaK_^Cs{HEiexLVh^U19-X?5n`} zfBVAgrjt|}{1VrPzffOD3u(p|{U4>u%zMkMrYp@`WS*l$6lVg zQ3rDmLwG0|Na$mCgQAhq_glw04tJc&a5?sqs`-O|>P6v+5Yu!1ynaM9_YP;MIwhHv zoSa>AMK)@B=>N8b%^#GR|EOI(sQyFwD8tuhtgOlv89N;rl*pYAqWBz4!+oh6WV^#} zeyYC5!Iya}p;c8i@blBOQoOUsKJq@b)InuWClev%BUg);0&U^?zh!q?^q_pVDmgqf zKjRqf-J5_BQ@jXi`zeKUlQcHl6Ap+ z?odnV#-Z2YUhuCAf(Ao>SgUjSt^Ej}(x#1g&sDrT$@EF2e;J=UG%!@fk4H!w8zcuj zIy{QO+PcW%-|%6_VKZR`kve2FLcmwvAz+Z%W+Rv`rgdu8f%S@s_CdI9gQ&G1^9?!!sx-OJ zp6Yb$E(%#CLTsGzo`w{z78H!?kImQ&&TK90X9%mf{*M^77P(H}`ey2X?w1Mpc@Dvq z_~ausmqCBVK(41;!jxRXu7?oMghZX+0&e~Dc%p_~jU+qPxb%Eik(T>pv`UftUY#O^ zR1q)iNIWnZRCO4EC-VNVDyJ|>IH^4oBRc-1LEu<`@qLF8E~P)qxGjW?aWVSj0U?r? zNH6_U(HlArwC+xGsY&VJQi8XhbhA7QbvQ;tYoR&ajSQeIZ(U}$F6U5=rR zpV*Sv#}%NQa43*ZPznHeI}AqVy5fUss}dOo=}q~x5mgO@sC@3cMDijgL%cXkgzXB& z8w<tDbYJXc5_tIQwU zAC9XXJ|@130;0w(&fm?ZNPjIgJI&{IT(?tNiPm!u&!a|D7jr>AZ`4}smAA6XdL%`4 z_{j94Xd#4;L2&Cq)3LEJqJ9wK?oGSscrLGR?8@iiB*vcH6-}YG4l%Wn)2BmqQ%F!g zlvUlkAw5AlGFR#fVvpe8O;bUP%Qk2V9XiWviyk;zLq6qvt$(eR*d?UhvNtpm32Q01 zO$L3zh1J}vY^A2h2J%@*5We>p_Pn>u6ZKJ7_W>PZS~z=OT3h7Uoz?c=oIRrJ8G=7o zcN%8$8GDsOou3vr`mREA$=qkHjsf%fZJdYiXKSy%g_p*3rhGz4+Lo4Lzx@bZ= zm8rMR=34N@s!QO-kyL|5wg?_KrpR%w^hS13%(DOeR0J;J{`cgKgO0D5i082U&cQg( z$R9%IFT3=Fs(onYwm9;#I>h69n1D}=rT#a;d>%@w(GBM*{f~eCuEyk}sp?9B?#5QAe&pd+^GP-pf zqX?;mP%C{Ac;?dnXcXxaMmaO14#MLi$ugqn;w^^EmQm1g&!}tg3Tet@D z?=|Tow2?D%`^Ok z$Bqeg6;7gr97t_!YM%~n6iu_RXfcxV^4dCvFsFi~mDq7o_MS(`u?NLJ8pNC&y*Elc zj7*PCw+BCUu^qAVC{Bpggo-fb=!YzL+&`^0D_AEf9rtm*C%*G&*w%u?i;xtNWp*(# zMq2eJ&vByjVlD79fF9J8F3{nB@)L)@^H2Yj&<7zO<|0Fc>06`LNzwHn3k07j?wG*A z7`{P3$k%Si9#N&+z(J>Nd-sidX9-=Xqf&SOfX9@NxCRKTq8{cV86^jwIdO?( zzi^xl@HF{krSyw+9DfsI>+@%q^4$l4I)R-2nHZ8?eFJ`OnImWGFB_Dvr`v*+Y0Xal zzsm71Vh1g7^f0IXe zHKw0u6P?HFQqs=zyq@e5LkA{o}T*F9mQ&>WJ0ZMo!kC30X;hHVEZ0dkB)dR zZ6%kK1hAH|lS4D!^ljlq;=2y^%kf2+-_WD#m*f-|K+tDp7pWEEv@9D&ui$*T`JfGr< z*6lyreGg1Wetk@yAF0hq57GvW@4vNJxNj1$l4(G-GPc>cX#qIpO<;D#>!&j`_&ey> zh$a~4)nkn41$=-qN$v1YjM!}KYVg@Ks{zolI{oUk%xh7{~o5M!sb${2UH!g?Im z0dNUj;_E^L@{|czmstR3T&b=ij280jzA&lCSS|rj`BWU{9{uCd6u3L#yg`iy7st<0 zeu@Bkyn!VSxFnj?FYVmtehPP>+~?Uc$!shG-Ri$+6a>c!Xkkf(w*}L8bQrYvo;JsbwW7taBje- zDpDTdx`tk5%3*3y)fo@re?&7efFNXk0)L*!s-Vbl*Nu;X&0s{#Ne@fo%6jiv`77Fj zU&o9Ac2T zQewM45gAP_fu*)3?l?||!xhWl;^N|n(7xPh+uPgO#YT}9lj$0SuNG7+#WrdIMz{t5 zSW6JBd9#m@2b&X?`C6RrD|n2s=}B2wSbnTmUekGG!}j7WPW+vS=VWzD&=vY?d~LvHNzsx#k%o)>!vedQ|~c72pg53KS!aV%7NA zlDpV=FH1GGt;pG~?)!haACfj#L4?9oe*jsEzuG&7<7)9WE_~?Ja^dGBmQe+WTt}L8 z`~rIZuW+Ikrxp3g;lio`V~Wi1X0AC{07}Rt zlMn0@cEn&~nG2cm%ev+P3wT!@oj#WHr%*!(@&1!rsq0>#{x9x^`rV3mk48GT8%H^M zmOS+Ci`K35asmIhNpI31`C!%bDuE(7yj%{@(o8DG6-^7lvQF&0{ZIF)h?&aZK}!{f zui-jF#x-5otVb353b=6%I;XfEveu;!Ej~o{TpzUmkG()iHJf`@8a^D8gW)X8Qex$(brGV!pf=!T(@OXl6TJ?(eh2Uk`}eWMWuz1*b#_oZV^mE%ivBhmQ4`w-x*^ z;vEH+n)1as9)AT)^rA_tBsXvkW&k`e763DVt9Q+?W&6Rf2IP4MQZPoqPoM@r6_<&X z&~sL9T$Jk2JZ8R67Bt30WM#2!T^7vvKicNver}nwtaGg>4GSN7;LF%IMvhfGOYCq7UU^pify_AX$a@ zCB8v8){z`=DTgVdbOFK{{X*X@UaZMJ%}U@iq5DmyoovUb3VC4MiW^3SB_}Pd2)dvzr79 znPF|r-)wh7UvCwhQK|v%MTZOx!c7A^3wT~z+e!sC#ti7R)>-tuV~meRBKI@n=n|+T zFXQV;9cYhbJr3AVWn@Bps+Jbb`qa_723!@w94XYEVJ=BV{}n!6304 z2d2CiBAyvoK7IMhtZV(~f5f(c#7a!(%j9c*nemfj*RI+THh*Si(N3Dr9_M1gYu+8? zlRl$w3*+GDw;#C$MS`p>EO%|FA?=hOmq9gRp{FiyNE)ID; zdj1j4IG}(8sM>-}Xj!#AZqL73slzy-o0Dz*)zbfPxX<919qIUGrtQmX>^e}&`!@{U zD^*=q569u`HqfV7gPZYlb1&=L1{Dcqj0dY%=?>TK>sBcq0bd%KaAL)7aUDDLc$|G- z5lA0aFc@PfrkLsUB2K6*I-HabJd6~zvHa(QWhQLG2Yv-*H%SZ2rUA` zGOoX7Yl2xM$WcmV%A#E0NyXZklE5xN$i_Sq4szwYfPP3}7Q{k?Tf+=$b>L!%U&8*Ut${-o&Eg zFw?Ix6nDIN+>}m)i3t|<#2KtwPnUZ?{L7@$J*qDg+HARMgtc?Ab`H1tX)5u*f$bsR z(=3`!dFRNF$`nvguOHzyOTT{WlTdL?l>qGsnxMBwsBvC zg%E_6;{`$vnI^LR3G9okPttPkcnZlo+9CRq6H1>n8|0&jc%zBvmnyL9t#lEMo@mKF z3yW&9!Tg~rKLYy_6N;?SgaV#lCdd1f!yMK*j^opP*&m>gEM2xnN*^ z32oE~v*V^@BU(_r$njhq3F^^@pH}XL79Ecirz?0FPV&s-{SU4c+WleG8Cz82dX#Y zN%HBx6yuwJyjs=9Bim2(6QbFSpuul%3uRdt;&{Y65) zsjf(Gz6}qJPDB1^k^2TcP0sF)w5EP>!;`h`(&UFJwZ4`zZgQwE$V;G`_VpYo_CyP; z3am3&W%7Gay0H;Sq3YKb-qeP45No9__h7S36I_pinr&;3FZ)kFf0>03qr(l%=LE@q z=Frz{<*_}V_Rk~T^n-`6#8Zlz1&^ky4#cSL%xOwg-=%Tt)-VX$P55Zzj-8P|S8waC zs&anz^{STatKk~o1qIx(Q$1I|0Nn#VlJb;E3C#Cv9+DfiAM27kdbEjO_D5yN&Uh-; zlb?){B55o}#`Fm8xx61F26&TZMFVk)Umd#bU_M$H*it!mz51m5w!tsX?+q^e4vP9I zu7(nxXiPsREwN>$6GfG+y>2(4216?cCSLAFTuGj~pF= zi?fAJAWD&7%x=H%knroCQC_W;)FEL`nd*p=0_%53EKfHvP4#?z$Khk~{uhLoA!Xf& z#s9g`US4_PZ`4$-gx2@B%Px$r-y62i782h`Oig+_x%GRt6Q?+_CqLUURiBchK|r(1 zowu(tXvb1d*n83usO;e)w*VxEC?{(IE1^&gwfCRsrt1xMQ%?YkEqeB8hD!%37paJD za$=P6*F$#c{5or1`h~HZ{BQ;jl5Jklim#Vx*F?A(67VgcGaV z?xy?>DQ7f#o#E$hyml+sZh*&4OeDL2je};O#GN4}HVNg1{7o|cl!aLm`>WSALq^|Y z^Y&u!KJj_Hh2nShExamsG5gmSyOutOOVn03HB+6JBvpuo9q+MzMQtZlzXjRYcb;NSBQ|nE@LG|L< zp8?|Ep0`&!zS+{j0lr0`yCdu(sQSvAhG??%8VQQT!c?-3u{hObq&$ZcboPt;H1+j>~678j1ooF1o zp>XB9I`8Ns%2*Gv8BZ=0T!DDdACIVt%8QZ_=QR#0qI=3E^HVVT?X|IPV|V2!xACF7 z*fxcYX;et{r6H=Dxtl$Nxw`_yvw(9gcO|2Z@$wAiy&&|+!tjp=n;spEMR@-%_77sd zFier+m9G2~IA)y(9Sc-y*h%}XHtTN`a+(Lv@n(!mlMhCy-gfr?9=m(Da)II_DZfzK z{4}sCLM3{%w;4h+p;gzAYEwh|&_fUeXo1hckqee*ZMwW*s?w<)_T&qH$xU zV0h#-d-eW2b-X$6I7QMxG&{|jFsW;5aPEnl%s>Efj_#f&F&CVDsRD6x3_ zRyj|(>{gbBdbt(vi6#1Ohwza-Cz2`dTrX|Vny>HVx~P7Uj~GIv;r*IEI|p5ll)T8p1W-#1wq|vV=vo>IS~S9sJ79+qUgEvP-P!8-EL@V)9SKk`}1}?@lZFl z{DT;;_Y*bt&>EH5nIotdV+`sh9XiG8nCxYKlh-NE9;bCgVZ(CvBcKS1E|6|BR~^2= zyoVmKqcv*`k14*!9t6OZZ{vrk6!&A*0<~NDM|C?4k-bZ%M{JmsRi-tLHTJb~>-=&N zDWjuDV@U_ckM=xn**R{RNBL9!#-Li`bH=&ZBoKZc1($LCqOm*UG8#udvpt4Kgku+a z?TcKKC2^n4T_f8R(By-pn<^>O$y2{B%TqCn%5SM{Q}V?W9UTbvJ@fmOkXkpt(?SbZ z@U{(N2nGjAA_PP7{IWOOrt;Gq_?cTCbz9EXavJgCkD^U$v^g`MUI)RPbvLwA?{-VU%v-Fb zK1G9)pS0e)~Q><&f zQ``rBMDMGs^RvH=T~{agL3WhEov&!+I~tL?j{WD$Cb{-m3^qWZp)#dgMr)!gVC_Rl zN>mSCSAzGKgqCJ8C~EkpTu9dne6uU%_|Mj4Jl-7JkZEPZE*paZCK!DpAgL4r`m03| zTGD?}uBpWx2+BV=6R;BtA>aF>Ev^&bZL=67%4yDUPm)AwTt)>%%>Bz|XoeFzUFWNW zRIGeT8`(&)3=LME`OZFP0V2BTSf#l z_P*>%o{CL5uIn~9aw}2F^~1kFsI5q`fPr(5)m!t5F^q=B`#t%IZiZLX^#1vhs2*Lk z+Ng;wAoa-UNs{V1(@0D!=j2REE}Lfh8uOTM^b2Cp-UtO>YG5q-ul6?cPTzG5dMi9Q ze>Oq;((Ksz%3oPVV->Y?U&7R1aOtGRMi{B)|L03dL?2|cldc>@$GU1XyRC7fH)>y2 z1B{tdSP51AO}!^*?9sisOP8Xl&?$TD#N0Z(8%ZJyj2(l49wu4xb{s63h|c zJIc6A@}y!#NYjtwY@Rf=dlNlljBK|T%Qxh_`)ktbdb0{TsM4)zGk1rjctHm!h8?z+ z+SEf}`Ru6K?_J6_6s37R2f7}I|Y8-3W655c@@uTT#t;(XrtM;rwVx$ zYDPn2?kEKV@(nR_DR-)lel;%7zPE37#W8Y-^V@bh{87&>x>S2MBCz9s?nM6^+Fr|* z^jX17wav^|H7Pf+rw0>^La#8qT1{KWQ62Dt+ml~6odo4^V|6N0mN#V^U)m{)-Skyd zy8WXzZa4OuWZO4sAN{d^V93lW!TFnn$L1j6ytz=q`YzK}96!enGMI(pE88L6R#c$L zMwCP&?US!c!_p?DhM@WP;U%=;>ma%U+NdeZ7G#szRD@0t|EfaZs1w1a@&53Sz8Ni1 z!rZAxEOXC0SO3_J%j3(x7wzDjT{byJeB}NPT&?p4c2--J{jnRyNpAHA002?TJ_Aw} zo@TlMYj3CF%!_6qV$PtnQ$JZtfN5pth)&dO4s%!iY@fqc!DKdX6cLz=*ncg9DCO|c zc5u%r^#gkva@Kgwj(jNK1?ZjsY*uoq%xg=K`Wo5~AES=WemY$?r>5!~hf-3BZk-(8 z4k-}u>F?cB%Rx!{QLAk62D12bNYVGctT+?IPIly?+7 zO!jivr_!cKN{0M+sHlJ5#iD@C=JAq9ev)b3>sEaR&naPI7g*f#oL3+18K-LeOw_T0 z1bqQ!w^uwA#-j0BGMm#Xd6h+6cf?%fZP+GJYGAa@%^-Q2Tl;>8_K^a7Cca1cLTB$x z8&l5p_dcAoYJh^F9Lp~}gI9`zaL0#!06D4Tx9v!a@Nt}4Y}B_bwKHPh@7=3S8^_7h z37byiA2}_-tgD_UuJEJy5aSMni?be}qZuwLoOq&WczES@x2kDz^nC^To|JKpf!8H> zjVpJb+V05q9Fj>{1muEQs8c2BNuF8GMQ3U`v5bgc=nNY$o#=%kW}kd0#G!gM*OuL(|K}!@${4 z2nbl#3B$Z@5J&ST=fJya2e&sBMg;=abpqYHZq0<2qGqgM_+WXN*T9Iw;F2Nan#%2s zcaB!viuIi0g1+EO`VO`9*#$`cUHw9(_htXGnNbYW4cl5V=Fca`H+uOlQk*N=5(K| zvk+0%B47wS>>5}bp5B^t)29`wXCrMRB$BdwZ3x#C=MMD9B}%a#+91fa^BTJqS+^#; zO{dmHAuWG({Azgj``nnD_0TUCggqVq3t)_vDxz7XGdZ`?bIQg>>3W5VXWB0ft-lt* zGICpedi#u;pC|OWndcGxQM7BE_4PH;-Wh^!E1uNGCP{@+J{f-F34e5zc9Vi`(?Egx zAgh|&7b$_o{Z&a@A-PrP%-1$eBwHCX0pPks{Y%OACi)_mP9FL)Yf0m6t3hJ@m4!Hy z@A(|RHB%T_a&yd=IP-J$aT^&gxEU9Gf3d$+WvPsvM>5saRt-ev+d;v7#n}lc6BIHH<%bkP;s;vumm0vmNFLkG_Z; zQ8xzUbetrIzr~42Tf$`;n!4nLq(UvZo4#KKs?*3+mKrU?EIv%-w&<;GU%W@%2htQO zo!ULz#qedsdko{83Y6G?qZL+(*!xm$p}eL@KihF~t}+sFe}I-V zmvdx#nHP-nt3M+BOkLe_f{7Ro2dq`#l@U_+^)p#5B~L|?(v&Ltl@XH*Doa3V=xuAK@F9}V;8v0W)N)9SwRo&tJ?8qxq-2Nc0{u5cJ> zCb=R2veqwH$3T_p^Li|_&RbA#J^ij{`&N~Y)zmwaPBfR9HMu7}{{G-D4*hq=^hDCv zrSvk0L(vq=;@c$jrSiyxgPwULwZ2VLB4^KfjJjMXE4D<#ZTrr^Utm&g=QR8jK2W=@ z1tw_!xh<41#PNkE(rv|WD*=J*y*3_+ISx&qwers4=vp7Wb6S$K(Mxj5N1N+Q4)2?y z@8p6ELST6^tW@n$nc%|eJxJDmp!wB}*+$?XIm-TFIBBerXI9~Mr&mufJK`_N0DK0< zPhkhb--408gz=2^i1z;!n z%mBCz426x=h3xQ*3NA4kGQg_-6k33v&|fg)%0vPE0eTqs619v6%3ykd zinhePAGN9Z2pVu5Fp`c>Dvuw?_FDz7C{^g3Tu{V8w?=9yVP`UU*4p@vuEc)Op=|TK z0J9HG3z} z5_()X^i(`*PlJV@d^Co^CpEBmR)&?DKMtstBVRMx!;wgpC>o2%ar6X?(R1jcXnK)0 zHo1;2d5?hT9L6cp=|lA()WbNCRea^*KIpzvH{n_0`8}G|I^D6WSWQ4fOcSRx10# z4u{*+>5KwQ>D2q$L*xEd^hpvapt;F(Xufz;J!D?|HIu*%qdm$Xg#h60Xus#&SpIy?nt@77W_Pg z%Eu;`s3RU_Pfsy2HotR+v~?l!@rNknZ}t7zysxq<7NwOg>geY;SA#ks9^IRt=@Tdz zu!%eP?YX0ZhxIs_u@U8<=U;8(cDaUxBahvNLZ8dz-Y;Sf)uq8yT@}a=-ZLum_Em`{ z6$5a9UNZDce%o95sWOH0mtZstY!OVTOQh}(t&)VW4tAt84qeS|GmpPu)fG`!TH%rT zHKP1@E*}xv2~yv423Z*PPi@j zv#tQH1e#jC5y>hv$ZXkJ!RX)KrT_I^lD*YQnJX7=P?WyQ$bV_rw8%L0n{A5*)g~w; zcGpC37Nj=VyQR1RZEsWn$bccW4$CdS0;^40e`0ifOKJVv+g@R!ZPW?s4MqU;3%`S^ z#6VYusGZ9^$~!F#0+lxOa=MI?@0Z3+X8&LHW38ARnJEpSN1OoXEP#fVD7e!r#x z+oak@U|^XyV2{pkf9N)he|}Sro*7f7|MlKd%S5J1vaQ>{z0YDtaylKb75n$O3O8EP zPtS9T(`Ar@wWEn*Sa6!F2B(G-EH2In6qNLZM2tvH2>-U;6L>Ing$lxG^5Fu9>8Gjl z7=d^5@E{1evY8~S(NtK0lC&hZpGbpU!Vcvk%6FHGF_BgrEP6rYRMj?J&N%(hj4adh zr%~_CNc&G3R90VO*o;wLd(T(#D+C7kMumRv1)U78yd_dMV6aK{InDIPPIe(Gl;J&c(*5;4w|`k0=5$h2JhWB zQ9wlwJ6nvFEh&uL`NB1{odP0^0j2J#I?^`sc0Z_I0=3U8KVZv?e;q!}{}ev-Zs3=< zPF^K}_j9)g9T5Hn#qPbh-Of7rY?Ag;G^(N3zjWo%*p8N`5!G=WbWNR6ZImj4C(O1h za?}qe5X{FaqqW6C?vJCE8AYBYIEnL}4j#Gsp3}*e!7-#Xeq5gJJNYhB%Qz;#)qZp5 zQv(}gqzY|^O0Wk782sJ9zTXmrfi=`Wf43!)i}HiVB7erIi%YXF)w6jx(v0T^?ZnPg z&?h1~>KI^>_(f_A8B-X`Rd-&uN@6E*NX!Hhm)I7->Q^sjOjqO-;V1%9SZGK{9p|{O ztE_$}6g+TE0)FhTjqV*Rvto-Ye+JS8KS_-o_Dp?gz~X;m%Q%;lg$MINTPffV zBy(ylbk)_w%#Z-c*WMZV4tfhm-D3qyb_#xRev_>E0ZyE_6$FRhD@A4&+BPMZYc3=U zR(K^MO{C~WohCDnempCHx;EG)b}CS^3s>|a8IFN^^Y9r`uo*J`eA5p?J{+^p@7-fz zkrH(c&Hkw*VaDtE``H;hzd5LhbOgN05n(;30hTVnz%Wo=A^ic5W0nXapAyX+nFTSy z!qKMvhaA+px@}bvR>imo_%~{y#6);Lrx2JWbJ*IH)<1b2(!Qm*6hSIBR-!?junF}9 z$WTSc!yYhitq3Vfzq)PQPGPh~M?PP~Eh~BQJuYz(KiO#=<4<|+kz%z856Y~Rfh%w0AL2+VcU$V8XwUcpqYyQ&aMHbTtZRXdo`$q(me}gQE_31M}>vQ@CzdVf^=f zzba1HFM3Y^S$QA~JXdy`(rA8ol_cRE#70LlB<8*n>#-uf2c<}l2RW&KSyKFpjb)}E zS_y2{RvJy9vDj7*#MTClfi=4g-a^bBt{_2W_8?2Mw%zD60r3WHO|t?b1u(tFw9R{X zbbw`04&Jo^RSYB1T)Xwd@K#xoK-33(Q_6f}KNony!>jjH)Hauth*}l@_`&T1X76LK zU&&EH-@Y!*GP5#Bp^}A=10n)83HSIMXNsT>$LB+D%A6FUUkHrqMm;nyI|c_AAQ28! z``@zoayew2?q%I}0Nat*^cW;rJLm~`?;FkpiU-Naeg(NQ3LGeWvv37x*X1C`767ZH z7PFh(p6H4nBaO%-BxeeEuFCQFd?M4b<_SzsUuW$x+gCGOJp84wJoh%arCFpv%DsB> zFvr6zd2X~oi>?C|nREV}U(JoJi|`~B&ykb1J=Z=}hv+I5uOsIIg^7720B@49W>MkVXjC#oM=0NF=%ytKR$I)Bzr!LqFN-7ue%NKUQd^?3vYTR+B^B0ZAzeH!nMq$+Ve)o>@!@CAw_;kS)oTawyPK{|EF<~z zYCEnmd7@j8h-Zi$vRocq%JG*+Y6D2|8m@xC56u-jyG!;RsW0DHv)SpvoObZAS<3>9 zT6kf>0}*>yDRLPt#+OjR`2vJf8Nt`W>P@~@M3BUMVUFZQO&de!tj*sYfJUN0|DoWsFwuJxcOE( zYpy-h7#69Ow}4HT+Pqc*pk>Z|FBwD zXyU`m%2iso&U&hzL1o2fa&r`Op)jkNdReoy3C6K*_7VJa0$ynZU&yIC!*C>EE5T^* zRZpb6=+7vSbT=C+-b(s7TGGvL;g6fN@;4-6ilk?ifFyX1*}0=YGw3dpQ3@Pf%@Z%$ zzHPmY<^i0vz7XWi>)2>L9S*_nhIQKO{FzqB>!VDPcH9b*H_p2(r-Jz$es{4Pr(K-= zp)`Ui#lke+a+TU+%YT4?e*AG_T7F=ACGv*uU1I*0m7bH?zL3c~SLq*XGMbBcjl74A zBd_*dQh)_mi{aAC+*zSm!#{xQ33*yvnCRTrwSyFJDRTi5uDX_do-HOn5G_3n#sCRd0D~R)(qt4{8S|v@?$E1vfIXr_YuMF zm1n~An*I1Ri#6r#bAkrN1!LgVW-33Y5#2<;VRxq*6t2~OH5*sUp}}ZM+0)>jEosy? zZcL11-*ryveT(~^H&ku>UGRQ?^aGx?XNe%RK9C?QpDbUW&S~s2EbRIbE)Mo0p z3Z+2A&nGpc`n6|BPe@4Oat|a%26zD0=d`v}q{}DJ!%5P|sQ4TKeRamTPw_A7S%Dydut;x8vQcqbHK3YUI8uvA7)o zUC6#E3mX04ywDUhVv2-dm94LJjsbmVSta(m4Pg-8Bsk_w=cf9=~2)C)@P#d`uo9+FLqTgz*m}F`z@~y zmj`2%RQi&fblpZjo~V8PCf+C_5Xuq1UBCm2_u-|R-F#)YHv~BA_b#AK-Lm!&HAi9T zE}|W{l#F<|Y!1MoE6Tqazg$Xqv=AhPM1%#=j~iAFT7GOa2iEM7UPy(i0{lhXwiUyx zWjP4$#yU}2v!nTG%q;ALS0|6E(_Q>i?IA?R#VY%}&uwFh*+aXZmUdg-qAZWbBsCZ= zN0UH5QrLZ(y%$8Dw{~il#*8sbbEzx}c zTrT)Q6s3vCdtAdk5^6}8&+AX|&SS&L+@D>AT`Vj@$!^Irf+9-=yw+jrf+-YMj6)~C z1w#tZN*?X~p}LokW_}{KEbo%jdJ2$FpSp2CcfVlLqI(+JAhiuIeomKA&7wTS3y1)7 z_E#sI(OaMBJ@;hepn=dL=-!9sjzrfIWE!=z~K@#n)euX!-&JJU2j2hmmdwp^yezw)IL*tgD*_+t5 z`vDO8L8&TR<U)Ff0jX@i6@CgUjKnC>U`#FJ@V)CiHI<~Nb50l{U1o0sUl<=;4J zjo7*GNM4uv82|_wTifk@**xLG@oh z7C2=Px(uArCSDVYblOF|C%qfpcbiHLeTO<+lUBg29sLp_GESls_dLOFlnZ_xqT!`% zI+^X4x)nC1Rk4RLhn&tRg}M>4No3leA_y7YG?s#nthcAg%}E^%m86kv76KsUAbKnMVVKtxMZQPU|dEotHUmp=_sW$8Z zhG?WMF}=N1(bQ@|fD_#_pqi?GW{Hp!^T9&hiwO$T4)1pV+OG4CR+r_L zAk6Ux6zsN}+kj)jMD${5dv{S_RJf9m=0PpV6${A7>6y^>6nOM7a?># zJ#w<*%2L!RTHq-% zyeBg2zU#sEY8M)-PUak|pRh-bK1e!$tGgiv?SAaT7Bz{XhH2gCg1+h-(sLDA)%i8~ zDPfP}^*Oc;mv<7wB@}AXsmZRiMQ-#=)o|0tlk%?KB?s5ta>_IsBnAnDVEiZ>Mu02> zF+;PpKiue1{JtYfxYw>W{<)y;ftN6#AB9digf zno%9K@+s>|FBN-$PQ(EpCD|b7^2+oxMr+QfXVh)r^6cAa!10#S>_p3-hMpxPoOLI)%RAnb-TGz4GDN~L7W^l-(hC=CqR{= zXXq<2wOV``lNvHisP@@)<7GRHw`JNL6@lFutB;D385I61Ou#jH{h}|KvV~FUS8#b?U z?M{jpP;jWl0?K}wroKcrhQS77(3{|@f)Kk|Z)I0_a8)F`{mH63aa3Euf8b+Wb3O1* zVAIa5(Xd+gLDrNC6&&{$$lCNq0fn4wuj$nI$Jk;;rQ$){ewkSaOhfqt3U#rK=*P_{BYj0BhU?z5fRPfI~y!*g5mzY{bdzvz)XRf@~pq8_ooJ#Vs&02 zS{v4*#SygxF-E^*&{F9~TT?*2mG+fhX`Tdrz?eK_HxhMi{gW`(Jx+A=#Cu}3YC#)+aWoXSxo&(Uq6d}^T; z?BHFk;pK%$0mmuJH3=V=R^Xp07u3Z`A;q3nQ3zbOW{dh2<-wZT%y6zzg^4gpMTj7} z>%8Bl=#IX!?xks#0A3L*F)i>&mkT!!D3d5R)5bp1ch?-K`Xo9TF|O3m^(1adrGdsI z1X+f(5@S)L{Na!9y?eF0gzJAW@Zs|W(Ee%FxS_CzwIrexk!YH_!vn7G{QZ0{pLGE} z0CsIfQda7OB;9brfjY{b9g{)n8Cqi{1_aB@fz&;@Nf_T`%2rmnKUUq6<+{v?Td)Gb zu*6KMVbQX?pNx^k6-~?_wMGLTxHd8DIM)`KbF)B4S6~|h{?GP({KvKDgW5Gk^C$j6 zRBF7N$0gOBnMgA8a`oA@LLn+M>h7aAyv;M!l2>_6Y`L@~{A#}6 zx1GLQgsCUyx2;v2FjmaJU}r>Mt$h-nBEMzX_)a%-k2)`w(J3Q*j8$U!;@%QHpXp4p zObRM)+%gwU!glpE-4yByB(s73a51x(<2f|4Evs&1!NDhHdldF?ILF}1XI8EvmcQ`` zsyrFV1ZL-gs)En_veb&WS)Vgmu-PiD@zq(wr$dmCSjPO;XY(aO;Z!Hi2TdN{H8BAgC zXtY)%3}s_V=f0{HLOFZy(kf^wb+UOnvQ15Eeya3*jK_r;6Ol^?7>8V~8efkWCZj3y z->hUZ2br=VPE7XVm&NOq&TXBlUgY5aAm#iI4t@){mu~bXh-!+pIssj+SLJC2GqTAQ z>>Zi&>tF>F?oyf2+RXN8(;C%`2^3h+=*`Ct`8JJwpX#oJ`z})gRq)jdbIUJ7hz}-7 zC@3>PMtk0W^7s@Ec1!%0b|BHRT!9`xqTXYwVb{GFTx0A8CFb(wVQQCu?c}(s0Qi^V z9p+yEVnaK^^`8O4$Ub8EdCS$OHfOoH^=FV`la)AM!YR zQ2gY0b#1uaLf2=ni=JS+GR(_mIGF93rsRUwO0Y~*l=0yH&k_3yXoa!&(ulu zz{Y?^g?2QLIAY>88@n_>NcqxE&%%J_`qTaI;XG^fwfglfo6H&~!c#lEPY#WGo&5OP z+dyFQ9YV(HLYqqQT)TJGb1dtbDrOacgLo8m?~Lt#yeMToc5@+Mv>NjPtMK7PB*^a@ zfk0BaxVhBAb!u~7$R^<7@{Rq^P1b|bBldx)an2%C&$`D7*Js>Vr#653n7B)-s!i}i zI)#35e$5H7bFuy){HHr}!DMG#fpym=D9Y~kWK88t7dA|VWv3&Ht@xR$DwRN&_839O zw@b#|)d{hZkx;3Gtts?lGZOKT@o}EOXB4|?lzyv?1q7%=ZOnCf$w>VGf^64g894(- zOaTBxj6*7}>2iv%)peFN>=m*3iPYSinUU>RhZF%nzS2n6SGv50QRvttZuzZqV@_j@6gdzc;dTJ%`Ff{Li+u}#5sWJG^zP!(TX?U@lo7u zFGrTm{j#U*At}O0o1-4FenrtOgQ1e${(XTa9@jlU1vO_$l995ly&YKT?2)j04VN{) z^nabb1WemIU>q8)^j=?XbEI6RkWU()MB<>axyeI3Rn`}DM6MN=ojJ7DACAGBkAs}S zsx>gy0_w%WIf0%4z~wkD?ov5+94^L8{p(9FgJl2=3M)oQQ^MTrKTe zEcJpL#~R?T^E9R5VvuOAHM627ZieJ zquISZQhJdp$YXSQFZ!um6HK6P&Cl!NkfV_e= z3HsPYa1$?eQS{_;Gbx0R=o|AsU#joHqK;S@34b-)MrybJz5#3%IOn_SOY&v-E^{J< zG=h<5eenP}00#xa@zk{gDM{~#L)cHSv%OQG4HZgo2igm2(+EL!UmgTxgx+^nO6Y^1 zC--oqk&!9t+I}+R0^ROthMY(^Z51|D<Y4K(xpn>y@UkY`*}3s za5k$b=vh$rI|+;|#zJC{&nQN|-62cA>wAo*H}Y>Kt)XtkN{H-rDTxRWEIX7}2+Y}| znj5D4Q!QgyKd4tq#OL(r-2J==NUl7V{!=C%4WT(mfa#DJqA*lK6whm?*nBl9VT({V z;#rOTB(T&sbVv|lg=*IsAzt5K$gQE4=*~2dXfu+}K}i?S+ZDNVJtD|%Cvpi-i{X|l z!DT1Xx377&N`6G1*L|6dn$^EcBhYRNOkPa0;2AkzgC@dw?5&Eec<$`bi1#XCsb0I43O15D{=LH2 zByRr}z7P5lNxkI&gKCPW#`9?$g<4^F)+jDlZR(QoqmvO)dXMskW=A)Y$r>TTo7ZOm z0^#u^8Eh?dp(PL3P5|IaoR&QI$zIkEz}cNd?0Cz_*GuL$OZ|zb;&qpk+@@f5z-VWI z3GJs!`f^;{b|vl(P=L;(uJ4C?5uGdc+6<~(2{}fw_%H;CiRTk`3tfCW9I7+RnbWRI3 zc$N5ec=2ELV{?+K62+&ZIgd$*u^)@7^U(;G2cYKqoBv94LYCs^f`=q4ysy?vV(Agj z^LawWa_UQj= Mf!U4n>+rDu0-?OqXaE2J literal 0 HcmV?d00001 diff --git a/devices/surface-hub/images/sh-84-wall.png b/devices/surface-hub/images/sh-84-wall.png new file mode 100644 index 0000000000000000000000000000000000000000..15d2e5a8487ca254a4489ad8aab5b0940b99a9ee GIT binary patch literal 23028 zcmeFZXIPV4w>FAMN2K=-A|RoOAT>zGg@TAmkRGZ60wTRhM}hxlrM!Gew)PKm?lRCb7x_9)+1mbFUcTn< z1HQ_o)dhSFDI)EzPVrCSkMjM7a@X)`enXn*+iTCYswP`YZ`k{0K#4hqyEYJ98pPmM~;Q|mDbrT13(A)`DnKvy)QV1F^GV!EF$xrpp&XxTwWuj8dPYhdoh*8x7ssyXDJ~0r{TSVOruUB6K$UDk zGXmXm|DmQL`&ahMiP9iq_I+bv)Jav0MYME^R=>L*9ca8Sq8^pA>e%?L)WSPQs1TIm z$XsV+^V6(1m>!mxXiOWco1f;W7^xhH7S(Xh5LLOY8y4$RB=Dm> zxLOETMVDAdoGoewogd$$HwsVFrs52)b}?tIe5^{$taEiYO3z#wKs^o-yK0i2_xRU{ zf&I193x)?e-9`ez8@|wN>IeKrjlE~y={WT{qbW*~*pa*O6gvA9rs}!pah(XgfL@T*8mmkE&I`ej1OqEk&_m*a3PmtZ z#n8@uMKYI~no@N3qfu6Pzl*aJT)nWYQC8q$pU288(C4bhE?gS2!`z@Eru56L-wP&a z5`)Hd^NFgpUJ{Y>kLwUjSlZH6T;dYefHar2y)y!BQ4D%_unR4?aYbL>S!%7JO@Mkx z7!m#Dl$(%aF6eZIkE&h!Wq*b6NB1tY=<1g$@WUs5pm^E@@e%8$5S+yGL6oL}Kkx z$DQ0$tWRi=x)=*dh0~)7KIq~f&pw5PJ2E9DCMKUKIe5Y+Kr_p*^vG{eH_5BJ)>I(D zOnvrI|7mTFd7qzJA<#ljN;PeqpAE~_7O;PK&54=ZlE>a3m-TLls%#KG`q!b@bw}pC zbi9Sf4^l1+52@rUEPRRg6#Y>cQD<;Fqvb=?19NU)yyP;Z?oQ_HM`W@7o5aLkvF4Z9 zxw}3*qEyg23A&kQf)|EV7-KOrZV3ZVwuH12giN)2cgIYv&zsY%!hP~>Uk)}NPN<0F z;y(4%*DR~u5>+XhoLH=jaPRN!2G6S!HH4oUv#)y2g`%Vrn|FDJ!5hD3Uj$xZ$;5Bp z&&1UZimAR}qjmqTVItV zvQ#45DDc+{L37T2)NVrOPjWpw9yPUbK&xZPAiYHa^A^wsr#F$ z1-+Mr%AhHH#7Zt zt;xBYNFiG?Z!8gJkga7j2CvqYkrCnKC30!oFa?kpvFkf|NN_ccfxiCYW-rwHy$)+5 zvvBU=2AQ&KG-J|13Li%rso5K`_C^QL|GWF{h=i{%63=a{z>;3lF8719u6-i3wG&YIrZm1=>A>{#;15_!VA;f8#|GKnRUKBf0Vh~X z6`AbQT`{Yg({f@cLP0EWPHfsX$(9!qdwn?|z)u`@=RTmUg~A%R`8zh(K< zcg=Ol8LD8fu{7;3b=sw}1zw6x#`#h*89JqYppq1~6pu~s$MP~n{=3(JccG)X3@h&8 z^F@FSqUz*&Eo&Ic-yasrP$K9H8K`rPic{^~g)DCLKFy05c(HKa&uT)9F->=Wd&1r@ zIAI*MiUuSs(+He=-u)zQ9Osv=mu*gKGA>-nG{af5>egml&<_uH`53}ONbPt2sP0nv z>M%_6ZNiqj{m4^XjWW0eyL5arO`F}&igz7@G2*CYnt@l-slJ`6cc~0i@hrmao{Y=4 zbxx)~nwh>VTzEq2BKoX>Ez7J7m2tOG1g82D{V>aFKdDn?ck(UMYfy}6NW z`mn2{nFS>J!nlB%m4%y7c1bk+o(J9OS$d0rL`L_`dSG$kk^VZ7CAd#wg~-yKevcJN zFEE%@I2f|HCz`3oY1U}5>VbQ3PF^~Ghj%cPn>0ygg57P+8Z6GkM;ZJMYY)QY1ovXZ zsZN-3!^Sw;FQdF(XED)7T>_WV;#e<25+8}^-=vGW+wHiPp3KX7eS4{YF_UETlTwK+Vnfb0|RGB`V4n-_(OsOw%=hlT9sAxUh zM&SMg)BT|jB9>Rd?KeKY3}n+W>OxoUp&8l_ApIGV??i4Zc@pBl#H-P@9xri zEL6UtV`ity9AJ7D?HhP=!91LX*v_J?YeK~c}rOs$E*^R(48j`tkL3B zrmtXb(PCaT5>#}A;CLB*z3zHwlux(QJX4e&X{;c(?X|4@ID5?&s?@GjIF#mHS;2?3rSg?#oe^*2V~`)|;g;0XIn%tf%z%ZBrRY@qlVl~-%)j3k>CaS7Bkvj(#*}X$ zBX*unR6vse;etHux;H1vNc)*Bp@=pkjrK(Q`4SiF6v^-u^w!g}FzU{P@xVU4pN-8# zY|U2nz^Y4jfhc1KC&BArS5+rn*y|FHLF35DKUY@TlmD>b*xu#X+16^So)%H(J9;p;SMgcbiY@4dHh$)R`X+@@*_D)#+mA#K;^bZ zEG?i(6Y+To9HB-`Ce2YSK}JAcu>>j zB(zd|WDQNi#!IB#Z9vsmxdrv^D+6q?W{u~Y;*51r-zJWH&c&UM?UQJHaNx1u1vk6m zOS0D24>;XcS6~!G{Cl%9}LymZ@+>* z#4I;eepFZ&=96wRnX8R55^}iwp_d&M8?N=BSv8+EK`>-krk}`@JYCNjs>5_T&fBeA z(c-L_82`L4auT@Ehk6GM!1652bkDQy(9@a;;ONBV#Dq@hXO8Mn zCxG;>)rf!q$6=FHrkj-tzhD)l-y-@))r*gn%)^t|wy;wVy+-&~)W93_PE;dkbzfFA zn{LAioH43SB-T1T4~GsJQDi%GAmk~lrh7{ff%ly?t%dLe+A;=bZMHZ5pm@41pZMfOCr=2FgSWAA)AA% ziH#<$-_$j>uh8*;Vhzv2(gl9LcGH?I`O!cBE0O))%QP^o%w4!f$(Cg|WS*#7akU#2 z@oVrO28MZ4UIio?D*yrqzKmWm7a2%XyIWt56zY*AU*ZwZ>+ z@M=93>}P$)ZGKJA%ylRPxKHgH=+Emz^}}c*t+&{I^7~JuT3g<|39wMbxt=a$=9z9i zE&*Q{6KkrsRh*Q&u$ZLWM!~sCsUl7<9aCn-lN`|u#_THu%^L&vhUGBK^e?gqg-pZ6 zARn@Y4=eGUb>d&p53S;H4y`Gu;qmH6L(;&R!lV=33r>n`J##3`w1SYG=im}Qu)UM( za_=r;089HqWEG7(gQ?(Binx)2gH`FJ0Wn9`0_15*5&d?>DC!Z;g}67pHOtb~E!4)( zC*oP8J>du0VpNb3c9ckc+-kR;ybx5|72yNdJMDTJ`4mc%^ScrugP!7ZM!EQ9BU;O`38R3ro;V-I=2o_(o7H%G?&%q^rH9yv z5T?^}n=q~S0He%jbi6Iy3b^B15kzC+3|klbG<@){HkXtlX99@P^`Kq(qfV#Ps2P4$a603~3RtestHbt<8D(NHrt! zF1o-x^OO%Se{ZVPzb7EH*iE=Yx^Qpo;6}Aq`oU{x!K7ysms9*2{AV|IbW#!fln}p% z_NcvEvMxsr)v`l=L%~Dg70*hn1WNF3hWxEhLlz8| z58i=myMjLj4R)};vtR5m2$=T`H9{y)8f_7w%p)&)7iS7$+v;f&I<~okwfo1P=!C~;Jsg`2qjO<@DU*6_j{h+dD9OCtC zE|~)oRz7!d*GI}*MrF&y*7<$%q207!($#Q$uAg0$azX9EDgQx2V|Fd>oYJy?D&d7CPV3N>8jfslPLe9U+TtD{?^HC5X}eR zJwIhLSz;0&N27XcDb~BR!|_TBBkbQqNmt%Wx1$Aqhp|$^Z~;@-fd}sDR}alOiSyBB zAeFspQwwyk??2F^>(KInXG)j$CK0ikp*!=M(6m<(MPIYZVSI z)f|k^Zq7qOXolq+oAxP>mc;K3p7OXmf0 zl;O<&zmLtfs9n8wP`v%4OH}P5ZdJ(w6(4XFnfE2qLvvz?k+0x-471pHm?^G8(3PU9 zeKrBfvAcsOKn5M>vu0JcdjlK7?GgE(T0UqIZY^&kJ&oA zV^&>h>xBl&b#PA4mZ6mY^{CFMRHdq8p_T`KHQjDuhis?ahhY`v9G#rRHN_=+3jzDd z@UJlIJ{F(-@ik-|G7iBVxYBd#*1tGRBUNv?=B~mI)q@*uxa&P?6QN^LzQAHOGUN9# z3gwS?QQvb{&`)}5J%7*!zp{e4qor$>G56jNyc*T+(sEHSc&;_hVKY!X+t^#P zaAhp=I{wRZFOzX^c_Md?msWpUNOs5a>*2}pfd07)Uc0J_bs=|t-aYa?UQg4~LC1P1 zAJ0~CQvdUVbXRtlQUCN3b)VE4ejbt zn(X~|aR-T3?g&jk_3)uvyNNftdu@Jky6e06(dFK@d&1Xa)}sGGBQ>7+`2PP?jlj3F)yn%_-c$p(6+@Arj9#Ij8;G>2GdBRv{!1%zK%}FX%GM5y8Ngx^_-+iKEXrl`!{F3jt)j&+T`!yFCO3`ve1M*bk;2&dh zX|geNd+B^Oxl^~v!7MG+B~Hj@_J-2VtM%X|zE)P@Y)6tnLC&N5F2J+oZt7MaY#$gI zY#HL^qmYNPiQ1}z!b>}lGodkIf!Cbj>t>xmga{e@2g3VJN9gfIC@r{|ZoyFQ;b)Ft z(6@DchTr`G9Rhk~4Ko|gLpSC)L=weubLXw(Y{13}a#m-&nIQx78PkKf`e zyV>Tgk3X2oHf7e2-WsE8IsN?0*wUhwVTAzgm*CuUl{DhVo!k?S|KQ9~NfuOzX;~R8@e#87N$%b8C3Lvsa2|{4D{c+7<(5(-hyx}$Ce|M~< zx#fSH*c?aHRs_;8yk|~4=>WmUF{U-J7;%+JZpZ`{?#?u+@vkc^3gh?ByB#3!T~SuW z8X|b1q#8XKnrx?bx_DF7z#-fT0WSw`t}zt_M4f*+#xHLvH>ft#!nPfMbE8FsYr1z) zxkdlah1J@dD!RvySYt4JSO(ScKnO*}C2SYr#w2%oZE-iB970asb3W~Tf61k|{n&m; zFW_Cky;&Kl3JnhRdiMAe`5g(rH|g}N&llhv#VCV`%+cxD<~l6x$cw}Yw-IgnNH2tU zc}M6{Enu?!zb@WZJk>BI?b$y zF@SN;hL$J31vXEpGXKBex6|~c74k%aa)Z>qjAF!PSZ~v28nU&HhTAC0|Kk6dRe_=A z%=K-BSPLLV!zX0!Il`P8G$!?bL9qqpN;cB&MhtAD0qXr$hc(+_B<5#@To3J6wg2_D zam~9PKLcML3rR5*S3R4M1u%XCS_I~iy)Toz$J$wDWcRcGzueYu5<;pTLqK3zJ ziSOjP39J?n(jv*q9nZl;YYsXU@DGq!!p!aMSU#I{v`kN+!JicDoC&j7saWJ8D~*?O zv!*YvUi|u}1ELy2xq?LIn*&r_MS{y|4CX0-*XRy#l5Gg=noQ5%>`p+-mll08 z-_;I{K6pG-Cr#QVVPIVmRXkhU`0_UO@^7l(RmGjP=UWo^rlet`mWJ2K2SJysuWERP z3Lp6;BWf{(S@!GN-#o25f!vC{Y)^#G&+X56BhOrVQ2T^&sK)&Y+@iSU=d-XOD1F4)QRhdbOM=%t6vX zHfUjC_Mfxf3Cqsc9Pm0NA-=-+9jC1DZFlNqU5ffzl)D0*?Vp5Skv~Wu+;Z9ZBkb%o zc^q&!+^ZRYa{x$%U@&jGFyQ+p1`zKBeq7e9!XDkkAAyJkoS{chlXm%rNb6H+wT4IQ z9@m^N%PAHc9z0F8R9?Rom~BK<6t8g7Ofb;8r1e|n`>FFw48=*)^h*`yF_boSRP)k_ zrp!fJdp?4#({kz6m@giMM225TRudZGwxaC$JWdGM?9kfqBt^qHDG_PC!NIS z<9J`7_qsv`h6`eEi?`>Vo0!QsVADikwPg*nk52MCbB&>rTU)O&UxQPw7%uyNl8WMF zwjEN=hb0E|OlR(De!w1CB;#V*5||hXW=S(rvrL~o+8cb1C*`s5=%mFQ!J#%^B2t(b zI|eSe9DWP+IG=!bQV2668kF4DwD(V3&mJi{_9iaqI;8zf*BOn84As|gTJI0Dv%*ht zlD=$XGG?B_4sxJJ{)mJsM~Q|+wbRbhJSNF+Yj-`64aEnmp&tG1ZttWvxqp^@6sUrC ztZOYjtk4JuXDGO=PK{ye)LT9k8&peaNGlYwpi|dtlm)ZkFObdDb|I{_6UX>wp(4_i zLkZTj6Jql^+pl-5kqyc_JE0ycFWa9;ID%|-9SB0DkvBa*j-9>7et2IoKOsHXSvY1U z^!(1*I$=`gjP#*g*xBXTuS_UVm|wauIA~sY!1?S07K?&ak}4(5r;Hbm6{k5NO9UNc z)}6g|fZT`I<}lNVnG!;JQ4%JdkPor#(UEp|;gM;m2sY@G?P6N^Da=az5KZ?%aFwu^RcH)&A!xmSiOd!0m+cS6pplQ5 zxTiUy3^c~PK|OW&1hoS+qo)W6mc+B3g5 zr5M8rb@g)6eh6lo>IoR9%H->M@2I%n zuImoKXSGA8)8aqqITat7kx@XmH6|BaOgHWY6c< zxnEXb1kZVGP*3eWdOO?X^K(3S-o1hqiqUgnU7{V?zzM9tv0#@GBioW4^DxO}gk6}& zjM1{?si~`ZJNIYl`e_{6kq?1i>XPDu!3+<6NvE9Vp*t1Lb4JnO_R2StVq4b8D-Nuv zP1>5r;bYZ>CH87G0^S)Wd12;fQCa8ZeUFZAL~(M<_tfKI6GySk9gq**wb6bF#Dh6# zGds-hF1@OJFpbR6fnMP(<|Qy#^h(Mu+=&tfhV5WF>t|M=@yjf)UWbXZ_BjUNDq&qWg(yahK{$(U*)W9uD6QkGZaEzgF9wHN221^q`INpA=%b7FM$x z+My0e z=-2v_H-)-Yq^DDK=4tpT!zt%plVHy^E28(vXwTGFDSqKW|BK}h=W&A}R0d(+%%2>-*Vt_yDYk9vEEJPw(a#4|6hvIZu#Kfx{C zh?2O^ko?+&0W?N4hH}`+zp@|HmX3U7tP-Y*o5Q^JObk+$3ltN~7%c&*XZQ%EYr&$1 zVT?I@)R~*ol~f#%sx!$F)EUQ&7}A}LO`lo2-8O!EMDK$d_+rIVZeclo3H5VI%5QG# z?oh-mu)Oh*a{w(}+MT(gNS*PJ(j?lf74Q zDy|oMAC*QoYDy_hE*(qWb%)DDMV{7@rKc%lBj2);DLrU^YtBgvDvWJnz`6fQl+xZ_ zVf*-rmebcAK4Q!rK0Z;%;D9^{ANalkJ052oC1Gv!*R(|y@(iVdpMa23hNmEP28iD2 za+JieK9#BrxKt4X?AHIU9sg(Y*8d#Kf4BvRrv68W{-ay|dYZQmK;Uh+4ScS&H~ zf2Uawu({ezk`#Hy$6kML&?CM^LIai|LZ271-{fCq>b0r+Z=)bG?v!CSUoDRT9`8Qi z^7?D9Fm!KBTw71zT$hX9C!GgUc`>zl#tF4JObv>wzxz@*2ZRz}ceb7zp~vIS<47}z<|ZLYDOZv9HGkwpk< zoUP<>ZnH@a!In%uoM87AP)H%MeS*_L`p$;Yo3cWZ-99_Uy4VjaNA|ES%bi$aS+(8} zc%7@dwjIIL9r>wVfOa2s?7tdLW?(0kQbKLG>5bGZ;@6UYwd`P|o`yi1r<<(Mhc+q{ zf*di?DMi(EsFMpNshb6q%RCbaGI@_l(l6XP}^KH7($io<#4tcld4CwjDdAgWYO%WR_zLxMw+LxVi;O;{Fue_9-h zn)|NAHp~VooIQ468HG6sWivQcOsrYdgOTC)CA7;<&E2i~5g3<~pL7(z@(S`xUc~Vv z58p{hzR%MVr^}OCU59=HM_-^7&Rvu~tic|Lqk1eq z*5?FpM6Vv%6Ec1B?^}KMD?eHCOWSGrx>M}ta!HbJKARn7`D<@!!|c#Dn){%2{u%bu z2OI3+w9jQE+12z&;Fv^7|3zM zkE*cRK$d1_D(Rpa3U8>dlRK86&k|G^za&NW{Q)3;v|f^Q&<}-ws6Xr13#RGX{*|~? zT8!t2&A2@!u$oSekUCMyd`=jTccNr8Hpy?yC~*PeUQz9PqsV+;Z!g}6mplgq z%b#UsFu+%jMby-_huA3&eSF>hNe_0g3e9~QnagxO=QuuymK3bED8D+RblF5mHADV0 z^|0v}kg&b0fsjBuATPL|$}m3;6KVz>COK_ykPii(L@?8JtrF^q=j`D9xm&SR1xkLc zOpVb?@;&r1J@i)rwbyg&RUW*D7WC3&UnMFQ9b6fSVfLpv4s9w%ac&pzauBw!(;Np) zrCfxL!WC1#nN3++#{;mA7^IM&x0kJ)uZGdR9A(reu6T`&6Uc^d#=)8% zjYQ^rYf)0xa728_dfv__76>Zh!nw-wWII|wpieA|$*=L~Jc5gj^TyaO0s+$l7&P*5 za{PXn3j+SW<0kOzeJ)iiKHP@d^jB86bqVfHKy6}&v&uctLCB~X9Qr645^E<5Vi>Gy$ zVT!U>LEU23?AKFAFL;<=9X%%De%_62<5^NgKiHbBo$J{;CCnb^7IG(~XY)3hU zc<3Ef|cao^kwUvhPHHB0p1Xsfq{*@k4CC?LbaXb;y@@1a_#Q z8|614IP^73Gu5qY4z|4HSk5;t(MkXjZdvW<$N{-OSgMwh55WWYSSfE1rq$%1;5#f3 zpdzHj6OwiDn|=8sfR&+xh+j!iAoUN6s{D}`^A7+aAi~R9eYHZ4IH}yg2MBahZ4aBa zPZ06$od#uWXq3X=a>`_?il{M`oFo9n!30=~$lFfK%v_{bKpsc9sm*gH*AhrPdTIX& z%n;2@vD%+=l`XW(M!83Al|nrt;n#pr6ru+*tE8fB7X#}wDzv{5!~7RCA#ZQ(CN<{S z@XCui_7XbLIxZm9*h>j>t8BQ5IAbP9toql&d`^#qMcUp2`8(k&7WUVt|GhF0SaV&i z>$?&nNKW$um>c`p{T!dmJN~UiZF){f6^BRi>p(8+y-j7fd{5K!;=e}zPJb|z;=~w1 zlQBqAWrkst#Ax4l#IGD!?b@5$(V1KtzgE@%0ZdTUzLy9E5Hhg)(ox8qOnA7+O=pIl zAz;gT$c$E5G-E_Ir^dg5Wd8+BVdbFp4x7j=7!iq3w*Sg9qyT>Y;g_3i4enyksW~a| zb!}Y-t=HJVuhWI=C^oQ30NuYAM+RxeseBvvdX{}08LSvUE}pEEvL>>)_Q;EMJab!IkHpG@x5kT;xS&olmCTI=8Fl++-&rYF zNJ-%iOmYlsUqW8cNIJH0KsJ~2!aVEHIv_9F$BG4E5UGn{mXB;WF!b#DxwzNC)(8M3Z~o6zCUEi-ycK~QhMlsiz`uy3FLmQ4 zB>~GFKHho9r%6vVA%g)cr2h*R<#rTOetHx$T^M#1QET`01(4wBopS?N>AkRNp3C#D zdhXD>O!-v*NNF@{{U%UebGzd1HHVLE^MvZy_Pt){)NMet3XECq`8kkp(2De2_g`2k zfV~SPD-HMO;Fik!0PY6>sUDvS6$SvEur9vd%|qtf$4GWXNCWsoqH^570DNSq%55dc zeqT>VsgA0i5JsE$ktI!o}bP)`g|`x6gE);n5J$hKT? zD-E|xnWeG<(QuHf_s{{97xHbTqs{F|A3zbz{>WXk`!^b=ob0;>Si77(hF$!bJchMB z(XIfLMxauC-)%v>s6=>VKyqRsPqj?gQBq(^ehbPWYY{R7%aI%+Eq zY1r()cXc~ctp3zm2{hvlmHiETwa2>WG04XXc(eYJ>?}5j{Vn{(5kOhJi{CB&V6BH#v+}STn9B05$3Qhr{qs;nEI+T|s2N1&}xo&mOmbJ3r_59ir8O zmFITKt<>DwZk#1)0qK0GV}UPyaO{0e~0L&#f@WS)hEofed_bIwMsNuXbwD7szo zom{^g&#HM1U#1*%p1jJz*j)O7zzG23iUBfT4tI0?JTaQ!5oOep>wkkEUdS@_+N2xj z1x38JjehH-ms31zn5bh1-P_|6(8c$UfGh*I{xLZH}N8kwF|sNN{$)69OW zQk{2*_w9>FxfHeK@V{YAr7DF660PAne@%4`-5vs4SJl3SFK2#XrZdL;w&Q8`T_xP| z7oigT5?$SW7)x=F+HZvBU(YcB9va0@=*29LsK6h>^ldIEP-C!xj>y(4t50ui5Y!%& zZk*zp3+k3kuN!*nl(fVBb$V9h0eY9A^G42?X#r8SuApc-&s z40EIX)Am`DgEjjYSoBk&t#|R*%(vlB{s4m$QaG0exq8+l)cmg;7$dd;q}fca+EUAd zf1NlsB4ySMwtxtD%M0q+e>qpTNca~7`-KMw~ZdqA_*3l><#z&g~lB`TetlY!)aVYUHma!gW7 zDGm2R7cAVCDal3)sGnj20Gz^YZ8mKGpeleR5;*5DsL$*BUxkD-GH~+?HRwbOmKKUo0Bp{F*wh%E7!ZReejE0-m z5gDjq^p`^YjR+?{D2h=?l*>}<#5zY%j)u2CcjGNpc|%QMP9Kj{>sax>8)km$q>&nv zX$N&6+r5HI(n0{luCZ>|>ZWKZVmAhOSqv!Vz0bJ#89ks{%qaz`I&oK12DQZE@wGM6F z&(5mFv-#ic&pCKw+oTrn-6gkxnnivrdC~si{Lgch^LxAPzhB<>e0D(fvL)?Nv>;&( zyrYZ^GBkHS4R|X6utKx9Kjx=6&&~2);|MQ=C4e{Gd9x{@{Qxxjh;pUxngjjLJDRje z<|!J1Em3I1r{u5(+k4yq886$}fP#UbN3&fX*XGX!JwViBrdfhYFlzup)=H|f{1kNt zg}g?XJD}0)b-}=^Q68Pi!M}Cy+@)rq7*DL4>{l>=qP(Sh{3J~_HDKYln36n&T&*KZ z0qkxBvbBxIz!iYJoCjiK_K@W54bY$w7e7JNI*nDc4XEA)$Q0eI;p51D{F}-!C>d`F z+vtT>l$gC?deR6bh30HmS- zrLaZhO{Sz=YH*`u<@!v~Aq+WrD#^$_mq+HvqRSagm~dnfZaeD1KFYAoe9q&8{iD zXet=yFaJ}Hn2n4m94o$q@?@H<#(uYy-1k8k0d(nvEa_lJWIGkccr5btBo95A0)jmi zf0FvVI+k<{x87IWO;wxs_+mWQv8g@bY5h4OP!WuufPJa)+_4Q?;n;De#&8150r*2D zfeFJ6`}lg=0)o5Q^y{4{l1Z8cq{~tB6&5~apAsE;c8``>jXLaHE2l6{56B5z@gGWW z-}?yFw#R3}t};vE;6M?rg8PPiT3KWzDUj>S(nqXRQX$(xGBUywt-v4=;4`vmW zW$Qn#og+gDRROENu3aVx0K%S*VpiXDbW4+1-d&IeU>*+d{5T+_1@@$HD<(O>be1Dm zalZu6^T$;s99E}(^8!QZ0RXbx?-V{kx$+XI)L}hzK$w+xI5rn$&Dj86CHY8GC_Sc< zpWg|wLP!GO*&iYy5r7~PYM^1bYtDCo#7xhPC8WXIl9o6_BLMopBJ%-p zh7|&$TC8pqRqJg?UkaBck^p3%e^v|Mu5uJ@(&LC$6XL%Ph8oj4bG1`^(r55w&weMj zRgM{mSPN8&*vZbEDofV=H!We|h!OyPoV7ER3; z24+VAX%Gi9B?x{6{dKyjVdU^AA6nE#zmp6tvOf}G1GWpc(JxOt?g1h^~*xZe1sdQ;Lk?VLpA#KR*OnmlGP&nZv=bs%KCVA$IJ-_A1?irFD6&vt39mvKNJXSO+ zPRW%fj#su0F;HLPGtQcT^fcjuB*x^zUF6`JW6P*hx8;;Fk+M}R(%q5h1DEu`H{lb9 z1H0DugXg=XVpJ;2TC|MR(s}(WUmcvlvDoS0B8aeGjr&;3jM4;F=Ef@-r4}?MKhUVB zArLsxK&$a;NxR}s63||!vv2#uqr_ei;PtoxMjhbsXI<_Pos0Dyp-b|?ih>`Gaec0h zrjcUr>Uav)KY8t5{?()pBHfmBsfqCYQnx6!LQx=O5$84kdJyQo(-zlEcXk7sel;Y8 zUY}G5{%jbMNbFI3*$i?WCw{T}j3S805=t%3E?lEoE=sX+eFfjDGaDx&gw+n-?i-W6 zcLl(0vj!T0h)HfLB3s|la4(r8`Fg}9sKBk@J{zj{PSFaSR==b=lb$V2AN3HT^YGV; zfvlU3W6}TLG=QLLL9h|`pos;;&6|hUfdWkDh?|I8s-AHyRI0WhR|^VB!TM)Vl`~Y7 zyOlzoMiUOAXQNqeic;N<`l^0pW0n{%RejY=b(WsJ;Lc`!&4RhNocL0~Ihj#h#^~Zl z5)IIAB7~IMPwu|(mRRdGPTBSv`$kv<=yWpYxmB%Fme|XZ@P@%>V5a7g#)X(TB1+qH7Gp@!5Iv9x!Y zpG0HsS`+0`E_|OK=rEzw*N5V}e^}Pu*r5#tTCTYIJ*H&zWv66(`NXYK7v$_FIHbu) z+iggf!lIfcmrtKmGn~O9(!Io6&cehxl|>t(jISrvVj$HnOCVASUrg;x{{*dZ)i9Etbd9UE<=p}-Hb+=0Tjz}IzI@+ z2x@n%C#1%myz{7Q_+)=?4247XmnvD*Q!ol3{wb1jMsHPPL3G>3F4S{;&uWoaHBcX| z=VK6N9SJsNSuo;fF*KLkx^z#xe*)~F)t7t-+f&O>JK~xy8Vakh04@y#0K!iyH%R-; zDs~OWs0!SFMeoZ}nU`I>kH2Mob|#k@C0q^hy4_2#a?p`08Ki9?8j#@M#60_*TE1cW zO&WK3T(B8%Gu)xmg3+PzXz^Ovl2@$Xfi)YX*|I+Y2bBAo?sq`V-s@yj_@*Is2HJCF z=&HV-?7lrfwHieX>PfaUJ7Y)LTD0qO-1|qUz{2xaiD9{5?2U<`PP(ausZ4Xzx?2yv zogdh*Mfu58TdrfE*12DSE;};OV=}IYd4+-7qLh_QNusXag{5IRUh>_m9jY|e<44;v z#Dn8G!TZ;j)JnBt9LD=r-}>RAt~H*?ERU3KZ3Oy6ko)X>!~W2wAN`;G7c{F?PbfKi z&N&8Vpr}mb_{{^pi|!8Fd^mg^ZsHrM zr@zwqnZwP#C7o&A=8H3-&ovos<0!Dg#~qUtSZ?bO=VbIoT=^GP4G3V z>uS!A<@;_|Pe|39j{PpmLR z$JMw=MG-Jje6~msaEc!}#fpest)VwYt1m+fti0iF>FDz*;rJuv^-8EVxx0s0KY^88 z;Zl);pHLEYsAS>G23^13keR=gSny8%=@)U+hB(7LP+ej8r=bTr^DAlO_6DrNK(hhK za<_q>X(_}?Q~nLv_DRB>emCJcE~k4-w}MR(^2ZIQ7J%ZqQQ#1V)dLf~5~-N4pQ&kM+pTPR2HuKsy9n1}7#-nqEpfplc zoT+CqbHQ)2z7^V*3bS2OoHO7rylOR_dX`wkZ8p}8Qt5j{bXM#ox@+H29M32~h=t2( z6Hg}gqo5v|jaZpuJ_rV?rh~nvM|^*(-lsa5fn?|gv2hWs@FEntR08afOSa~AiAh&- z^3UU}AHMqNMVHn|#1=^FJ~YtsJ$2t2YpVHcR+Jd?08}*S+l)DH_bt4R%qs0QI$MlU8_9vYx3D3fm`c0hYVPIWL10k+9H@91JXUp9LUuqPN9z99<_4_yJM!-O=d|e;xc;92 zq6J<0@Zok55!n>pR*`Gxw-oyWH7Ft?vJITUl52-C%nL?EL_{{j%Zojs21Txp#})HA zLJ<+!9KW~NC)S|I)$!6|A6J7SA|l)2Q;NNy21TxlhZOVSb`cTTBu^^#vKkb*DtJ-u zm)D?(h{(2hXt6id;Kg}!C8F5eY+I7KS%J^Vh_}yh=|DcIOm^) z&o1^0#aajYO~rnu2HyqZfV9U16KP&lgZGxK-wNzI`@`{>g5#Et9mn?Piv3ElUn=%J z#SYPmu(#Z|OOg9?Y2L5c_t&6^h{!fMM_}R1ar&)bz^Nh#^2`b1qTSZxngtfZ=#ZEo zj^l;(W}_lL?=#}+CyF7o5VXDH9YlX*!F$UBi`&{CRf8fTBHM(Qjq^R$GJpo}~-hR`5yPsFf|w1|~9J`0l|r-?AjwtVu& zKKIH2^2AJ3Pb49xu-IqHA$=SV;8;%yra1O2qYWXjXe;~O9&fgX<#w}9y={7kvN(o4 z*dB4YKOyHOd@kJ9etQjyh=^>LZ!7l18k_|}A;z$H<%8F_+IM z_QDzz5fRxgUtH{yYj74ZYZ5{QQH3DDsp3R&z9B#mKY)`Cr_8o+?2sKYOV)ctnIS%C z2lZi5RtO8AeYp)l-nNaA7uxy>XF-8LhIP(bOWO1;B!|?)6n(YXZ?1U*R!Ys4c$l#pGmz^|e z^Q=hD&-M^oL6kwdUU_Z(glTU;e9l8W+os6rX-~}XaV*##$0XN@AR!&wWA-SwA=BFj z>dB%k(nLFRJAn1rk1*ER9?*}uJ;X)1A;f}wOgR436=F|BL_`jNxWakjT(gj38*!}@ z$KjKXc;d3d&ki}9dyk%&XoWz|&-NS_M18&T+WI4HKse`V<6Cn25LJkce0*}9?eT;V zHF;am+lO|)BTclkjVDa`v>{uFx~QLRk(OnzZXjLMMI8G{I+kr(5fKqdgb;|?mLP;z zcF;K6ED&0UpB*ww)_e3EdN}|9F^+F5pdwA|M;jkvnPos)%FDBEKpNH~KkY&| zMcuSJ*G0Y@myfN8h=_EETR$PB0B4G`&W;oZ&w6afA!jGdwg|JFa>5}LLaYF3vsh^J zhqz-KO9Vk~Z;p?$a(=?mHXxka5Q3sj7qsbtHne5tI(u!-`CDQ}3?p4DpxBm=cN-7w zaiGo+Mp1rjXBqhsP*FGANy{?oB7MZM4520>A|eyufP0Rg?ctmQ)|veXag+1)(oWIV zH&s`Lb?TmS?!+SqB45tmmIZAa*r!9nq1Wb?b{p&YcpZcKBQ1H`^4jCw#sk|p4!t@l tKlZWBPdK-=jUylNdAo?*H1F{q|34i-jNRKgIVb=C002ovPDHLkV1k;Ac6tB+ literal 0 HcmV?d00001 diff --git a/devices/surface-hub/images/ssd-click.PNG b/devices/surface-hub/images/ssd-click.PNG new file mode 100644 index 0000000000000000000000000000000000000000..5dfcc57c42834e1a7f6d7088148733b07c89ed25 GIT binary patch literal 25222 zcmeFYWmH>T@HbkaNU`7!#R|ot#X<^2T1v4NiW8gy4KBfJdyzNnE{2{OXmK{gt*#Nuo1xJHI); znR~|B>D6v?$Aog@Ja{DduawJ52w<;Zv_?u)$Vupr@h{}uMk;!E3dwz{Tr zwL$UFM(f%7NYeLo!}RQ?wB~fC>2@{?smeV*Z7}5k}?Go z&Hsim+5dl|>Iax}238nAPWP>jen893<(52lg7U9$><<|W7a9NePi*DbL1(5b=K}^T zfo&z7|MSKFk;nh;=76_2bbBGwmg<11bwK%S)%k7lNFV2r+DY#Rke2*w#q6SHz4uy* zJ#H}zZ4H>+CLNcx40rhIDav7?`K)CR+-+AkSKDwhVW8u3G$3B~Z*I@;Y&Ad4USAcv zRdxiX1Pq63TxmRM=sWc1&sxt)S2MkL^;9R%p-z)v_tJbwx$^KY(Z8b2YcKa~7?uPY zaqFYqTaPl*+?&x%#q~=e3}O!6D3sWwvHvyC{9#g^?fliMc-bnkgGU#S(e34=gArzC z622;0<~guBUgmeg18=?D94IzADbi~GM^!e}ylp9HFtCzr+?tx)yv$jAvFdQMIuL1e zoU7HmA1pWvy1f`O?mo&qYaVdPJW4lTnjZ2y4e*$#$~@s{+(9rdOS!lrHA?1MC3@Uf zJ$7BPr21!eB5M{l-tm?v8+mQ;6q%MSJreZj7%rdu_bMN+m5`y^&V%a>u5)!EvdRC-X3&px(NG1T)7pB$jzOR$wpCupFmVPXb@iCvlF4#Db;f zLeyHCxS%6*-c9Q;2u;ST-G4s?eK%J7c*_hQRXja}G;9_XYj@$B)|V`$Lf|&U*>;BB zJ2j;hHPPa&2hnNbEgP!E4ZDq7xaLm8866Fgb#2!>LBdVAxckxK^YxG4K&^cC0+G{n z7pVG`Bm;d1cZT%n!772qzmNGK9#M#C(R^_EViRr+F>%2WbFI_YkglT*dW6^u`e+k= zJezw0)@vW^yI!}VW2Ce@s#cWTnJ>f|*EZU6#= z&vLUL8XGKd+z4~HJ#~ z`@jAR7sa#kt$2mACwuX7XHSl>qc5k}(br4tzr|~?&*DQC-EQBrxjN6g9pSlvnXgOn z-fggQIh%8Lz=|B+J?puak%n?;^A+9m9P$>coA=t{nZMq3cbGqcyA!+qq?#i2U6(hw zSj3Z=%6xUMBEJW$MJoi=$_Q+>oXw*|+$*+nq4i(fXPuA~61{uAd){qJFFhRi1@`sr z8&;CWttlZ58~JJ4F6d}+_-Y7)z3u>N{*iR? z(7Bg0tw8#uu(;lF=>eI97HH*}I^C%^vAXxnXvk4jh!qG;mu4k>^nIu1``<)u6XWwv z8WL+CrjrXsdmgjj^n1VeezC%VMKsNekE9CI^1X+mKl;ZW_5mqYhCg!lR}`P z4)okL)!JlMB!@f)=tGG1%~Xx?=z^Nw?>Abc~Jws5uD zZRkGd79=}Pr|;5yz2m?V)pF;fit8^{)3TPAwgXM)JT+0nb%e1~^|>6)G8(uO!+@0xW;z3F8@j}{ zs_bayWcS}L|9L9eFb`)Md5hr6`OAqqk_oz?cIjzxX5&edj^|9?MXyB%Nuq~||KvKO z)w={VwtTDB@VyzI<2)8{H&W*2Am=_@7CriPV!vU?*Zyd~i?rBfusz3X``pOa$aIiKq-W8>~K|JySMzePMh6Dt1=!Rwy`#uvQ)oG^Js)Mcdq zfgoHiZ7gPTf66@8u5}O7>Tpz3=4&T9*HRa`cagbAx4R+gbLQ@Uwi;=C^^fORH0$IX~7mlS4z=a04%b1$}bt#!w#XIidPn&J0nw6Y$ge5Ikm& z?3(I2r`zi@7VD_Lx)WnAQ^7f;U9=EW1t?-gpwGjoOEwhWBMnlxe@zeD^BjgqT66nt zo(Rfvn9|!X1Uoi!|JGL!gsl{)urr$bz!$bsCN$4W2=@eK74q{?)Y9l}CYa3&YXY#% zBPcM&6~OppXi%1ZZ(Cvi*9e^rsM*G7#`vb+zk#aP_kF>jVZCCEOxINd2r%avg%wD`vI~q50wgmMFTM;0&4e6H zdP16n^8b2_XQ14GXVPz8Bf+Q+fx# zPtC&k!ZLkLavJrTu4nPgahmUI>z;XHqeYdfPK==m@mSgn`|`6{^qv|{EV;RPCzBk! zlap`I-k9`p*;|j8`y;;0a`;QOqlxS^y7=n&c8_TYnUuHJVf)-8X)zqYf@MNNtdF-JMQQxTq@u)`)4 zcT<~F=mK7#6GTKT7wEEfuv4>^h&%}|*o?wUe5-j z0nXZr|L=9F?SW^ChMtv~5oSPDt`NmXAJ$~O%>pZyf;e7&*MWeN6=(mG!uDulBu{y{ zM&wFcUwkty8*i2Fzr+P2DPLrfSZr2%2m7uxDJ#tJbffPzjc!k?s9R`{UVogfo0-SQ zluztSy@nGt5NdCtI4cU~H*cJ=`WjWzQG>Mya#?T2{AM@L%K$J_;mq-<)R;7$=r#Fn z3+*69qP{=GW>9O%@O0XM;O=(*6hTAV>qRx9Sn|=(u%Ac`0$DywrinK%5r^K~3&74_5PG)~PK(aU%%%;` zT#?A|bYVSzWd$I7nM+xMo|L+%b*~jOa~-_QH}t*68ev)jVZ>U5>)*skw({RS9>sXZ z6sqWyB-P_rXIPx;8B}hB4Uk

+

Microsoft Defender ATP

- @@ -187,7 +187,7 @@ Microsoft Defender ATP alerts will appear as discrete events, with "Microsoft” > Verify that the connector is running by stopping the process again. Then start the connector again, and no browser window should appear. ## Related topics -- [Enable SIEM integration in Microsoft Defender ATP](enable-siem-integration-windows-defender-advanced-threat-protection.md) -- [Configure Splunk to pull Microsoft Defender ATP alerts](configure-splunk-windows-defender-advanced-threat-protection.md) -- [Pull Microsoft Defender ATP alerts using REST API](pull-alerts-using-rest-api-windows-defender-advanced-threat-protection.md) -- [Troubleshoot SIEM tool integration issues](troubleshoot-siem-windows-defender-advanced-threat-protection.md) +- [Enable SIEM integration in Microsoft Defender ATP](enable-siem-integration.md) +- [Configure Splunk to pull Microsoft Defender ATP alerts](configure-splunk.md) +- [Pull Microsoft Defender ATP alerts using REST API](pull-alerts-using-rest-api.md) +- [Troubleshoot SIEM tool integration issues](troubleshoot-siem.md) diff --git a/windows/security/threat-protection/microsoft-defender-atp/configure-email-notifications.md b/windows/security/threat-protection/microsoft-defender-atp/configure-email-notifications.md index 5352b16859..460880caa2 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/configure-email-notifications.md +++ b/windows/security/threat-protection/microsoft-defender-atp/configure-email-notifications.md @@ -31,7 +31,7 @@ You can configure Microsoft Defender ATP to send email notifications to specifie > [!NOTE] > Only users with 'Manage security settings' permissions can configure email notifications. If you've chosen to use basic permissions management, users with Security Administrator or Global Administrator roles can configure email notifications. -You can set the alert severity levels that trigger notifications. You can also add or remove recipients of the email notification. New recipients get notified about alerts encountered after they are added. For more information about alerts, see [View and organize the Alerts queue](alerts-queue-windows-defender-advanced-threat-protection.md). +You can set the alert severity levels that trigger notifications. You can also add or remove recipients of the email notification. New recipients get notified about alerts encountered after they are added. For more information about alerts, see [View and organize the Alerts queue](alerts-queue.md). If you're using role-based access control (RBAC), recipients will only receive notifications based on the machine groups that were configured in the notification rule. Users with the proper permission can only create, edit, or delete notifications that are limited to their machine group management scope. @@ -57,7 +57,7 @@ You can create rules that determine the machines and alert severities to send em >[!NOTE] > This information might be processed by recipient mail servers that ar not in the geographic location you have selected for your Microsoft Defender ATP data. - - **Machines** - Choose whether to notify recipients for alerts on all machines (Global administrator role only) or on selected machine groups. For more information, see [Create and manage machine groups](machine-groups-windows-defender-advanced-threat-protection.md). + - **Machines** - Choose whether to notify recipients for alerts on all machines (Global administrator role only) or on selected machine groups. For more information, see [Create and manage machine groups](machine-groups.md). - **Alert severity** - Choose the alert severity level. 4. Click **Next**. @@ -99,7 +99,7 @@ This section lists various issues that you may encounter when using email notifi 3. Check your email application rules that might be catching and moving your Microsoft Defender ATP email notifications. ## Related topics -- [Update data retention settings](data-retention-settings-windows-defender-advanced-threat-protection.md) -- [Enable and create Power BI reports using Microsoft Defender ATP data](powerbi-reports-windows-defender-advanced-threat-protection.md) -- [Enable Secure Score security controls](enable-secure-score-windows-defender-advanced-threat-protection.md) -- [Configure advanced features](advanced-features-windows-defender-advanced-threat-protection.md) \ No newline at end of file +- [Update data retention settings](data-retention-settings.md) +- [Enable and create Power BI reports using Microsoft Defender ATP data](powerbi-reports.md) +- [Enable Secure Score security controls](enable-secure-score.md) +- [Configure advanced features](advanced-features.md) \ No newline at end of file diff --git a/windows/security/threat-protection/microsoft-defender-atp/configure-endpoints-gp.md b/windows/security/threat-protection/microsoft-defender-atp/configure-endpoints-gp.md index 03ef4fb943..9a81c74448 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/configure-endpoints-gp.md +++ b/windows/security/threat-protection/microsoft-defender-atp/configure-endpoints-gp.md @@ -63,7 +63,7 @@ ms.date: 04/24/2018 9. Click **OK** and close any open GPMC windows. >[!TIP] -> After onboarding the machine, you can choose to run a detection test to verify that the machine is properly onboarded to the service. For more information, see [Run a detection test on a newly onboarded Microsoft Defender ATP machine](run-detection-test-windows-defender-advanced-threat-protection.md). +> After onboarding the machine, you can choose to run a detection test to verify that the machine is properly onboarded to the service. For more information, see [Run a detection test on a newly onboarded Microsoft Defender ATP machine](run-detection-test.md). ## Additional Microsoft Defender ATP configuration settings For each machine, you can state whether samples can be collected from the machine when a request is made through Microsoft Defender Security Center to submit a file for deep analysis. @@ -141,9 +141,9 @@ With Group Policy there isn’t an option to monitor deployment of policies on t ## Related topics -- [Onboard Windows 10 machines using System Center Configuration Manager](configure-endpoints-sccm-windows-defender-advanced-threat-protection.md) -- [Onboard Windows 10 machines using Mobile Device Management tools](configure-endpoints-mdm-windows-defender-advanced-threat-protection.md) -- [Onboard Windows 10 machines using a local script](configure-endpoints-script-windows-defender-advanced-threat-protection.md) -- [Onboard non-persistent virtual desktop infrastructure (VDI) machines](configure-endpoints-vdi-windows-defender-advanced-threat-protection.md) -- [Run a detection test on a newly onboarded Microsoft Defender ATP machines](run-detection-test-windows-defender-advanced-threat-protection.md) -- [Troubleshoot Microsoft Defender Advanced Threat Protection onboarding issues](troubleshoot-onboarding-windows-defender-advanced-threat-protection.md) +- [Onboard Windows 10 machines using System Center Configuration Manager](configure-endpoints-sccm.md) +- [Onboard Windows 10 machines using Mobile Device Management tools](configure-endpoints-mdm.md) +- [Onboard Windows 10 machines using a local script](configure-endpoints-script.md) +- [Onboard non-persistent virtual desktop infrastructure (VDI) machines](configure-endpoints-vdi.md) +- [Run a detection test on a newly onboarded Microsoft Defender ATP machines](run-detection-test.md) +- [Troubleshoot Microsoft Defender Advanced Threat Protection onboarding issues](troubleshoot-onboarding.md) diff --git a/windows/security/threat-protection/microsoft-defender-atp/configure-endpoints-mdm.md b/windows/security/threat-protection/microsoft-defender-atp/configure-endpoints-mdm.md index b4aa4e7b94..01b6ee0ef8 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/configure-endpoints-mdm.md +++ b/windows/security/threat-protection/microsoft-defender-atp/configure-endpoints-mdm.md @@ -49,7 +49,7 @@ For more information on using Microsoft Defender ATP CSP see, [WindowsAdvancedTh >[!TIP] -> After onboarding the machine, you can choose to run a detection test to verify that a machine is properly onboarded to the service. For more information, see [Run a detection test on a newly onboarded Microsoft Defender ATP machine](run-detection-test-windows-defender-advanced-threat-protection.md). +> After onboarding the machine, you can choose to run a detection test to verify that a machine is properly onboarded to the service. For more information, see [Run a detection test on a newly onboarded Microsoft Defender ATP machine](run-detection-test.md). ## Offboard and monitor machines using Mobile Device Management tools For security reasons, the package used to Offboard machines will expire 30 days after the date it was downloaded. Expired offboarding packages sent to a machine will be rejected. When downloading an offboarding package you will be notified of the packages expiry date and it will also be included in the package name. @@ -79,9 +79,9 @@ For security reasons, the package used to Offboard machines will expire 30 days > Offboarding causes the machine to stop sending sensor data to the portal but data from the machine, including reference to any alerts it has had will be retained for up to 6 months. ## Related topics -- [Onboard Windows 10 machines using Group Policy](configure-endpoints-gp-windows-defender-advanced-threat-protection.md) -- [Onboard Windows 10 machines using System Center Configuration Manager](configure-endpoints-sccm-windows-defender-advanced-threat-protection.md) -- [Onboard Windows 10 machines using a local script](configure-endpoints-script-windows-defender-advanced-threat-protection.md) -- [Onboard non-persistent virtual desktop infrastructure (VDI) machines](configure-endpoints-vdi-windows-defender-advanced-threat-protection.md) -- [Run a detection test on a newly onboarded Microsoft Defender ATP machine](run-detection-test-windows-defender-advanced-threat-protection.md) -- [Troubleshoot Microsoft Defender Advanced Threat Protection onboarding issues](troubleshoot-onboarding-windows-defender-advanced-threat-protection.md) +- [Onboard Windows 10 machines using Group Policy](configure-endpoints-gp.md) +- [Onboard Windows 10 machines using System Center Configuration Manager](configure-endpoints-sccm.md) +- [Onboard Windows 10 machines using a local script](configure-endpoints-script.md) +- [Onboard non-persistent virtual desktop infrastructure (VDI) machines](configure-endpoints-vdi.md) +- [Run a detection test on a newly onboarded Microsoft Defender ATP machine](run-detection-test.md) +- [Troubleshoot Microsoft Defender Advanced Threat Protection onboarding issues](troubleshoot-onboarding.md) diff --git a/windows/security/threat-protection/microsoft-defender-atp/configure-endpoints-non-windows.md b/windows/security/threat-protection/microsoft-defender-atp/configure-endpoints-non-windows.md index 11e887fd72..f3d4f3bdce 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/configure-endpoints-non-windows.md +++ b/windows/security/threat-protection/microsoft-defender-atp/configure-endpoints-non-windows.md @@ -71,7 +71,7 @@ To effectively offboard the machine from the service, you'll need to disable the >If you decide to turn on the third-party integration again after disabling the integration, you'll need to regenerate the token and reapply it on machines. ## Related topics -- [Onboard Windows 10 machines](configure-endpoints-windows-defender-advanced-threat-protection.md) -- [Onboard servers](configure-server-endpoints-windows-defender-advanced-threat-protection.md) -- [Configure proxy and Internet connectivity settings](configure-proxy-internet-windows-defender-advanced-threat-protection.md) -- [Troubleshooting Microsoft Defender Advanced Threat Protection onboarding issues](troubleshoot-onboarding-windows-defender-advanced-threat-protection.md) \ No newline at end of file +- [Onboard Windows 10 machines](configure-endpoints.md) +- [Onboard servers](configure-server-endpoints.md) +- [Configure proxy and Internet connectivity settings](configure-proxy-internet.md) +- [Troubleshooting Microsoft Defender Advanced Threat Protection onboarding issues](troubleshoot-onboarding.md) \ No newline at end of file diff --git a/windows/security/threat-protection/microsoft-defender-atp/configure-endpoints-sccm.md b/windows/security/threat-protection/microsoft-defender-atp/configure-endpoints-sccm.md index 509661ca90..4790139b77 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/configure-endpoints-sccm.md +++ b/windows/security/threat-protection/microsoft-defender-atp/configure-endpoints-sccm.md @@ -69,7 +69,7 @@ You can use existing System Center Configuration Manager functionality to create > Microsoft Defender ATP doesn't support onboarding during the [Out-Of-Box Experience (OOBE)](https://answers.microsoft.com/en-us/windows/wiki/windows_10/how-to-complete-the-windows-10-out-of-box/47e3f943-f000-45e3-8c5c-9d85a1a0cf87) phase. Make sure users complete OOBE after running Windows installation or upgrading. >[!TIP] -> After onboarding the machine, you can choose to run a detection test to verify that an machine is properly onboarded to the service. For more information, see [Run a detection test on a newly onboarded Microsoft Defender ATP machine](run-detection-test-windows-defender-advanced-threat-protection.md). +> After onboarding the machine, you can choose to run a detection test to verify that an machine is properly onboarded to the service. For more information, see [Run a detection test on a newly onboarded Microsoft Defender ATP machine](run-detection-test.md). ### Configure sample collection settings For each machine, you can set a configuration value to state whether samples can be collected from the machine when a request is made through Microsoft Defender Security Center to submit a file for deep analysis. @@ -140,7 +140,7 @@ Monitoring with SCCM consists of two parts: 4. Review the status indicators under **Completion Statistics** and **Content Status**. -If there are failed deployments (machines with **Error**, **Requirements Not Met**, or **Failed statuses**), you may need to troubleshoot the machines. For more information see, [Troubleshoot Microsoft Defender Advanced Threat Protection onboarding issues](troubleshoot-onboarding-windows-defender-advanced-threat-protection.md). +If there are failed deployments (machines with **Error**, **Requirements Not Met**, or **Failed statuses**), you may need to troubleshoot the machines. For more information see, [Troubleshoot Microsoft Defender Advanced Threat Protection onboarding issues](troubleshoot-onboarding.md). ![SCCM showing successful deployment with no errors](images/sccm-deployment.png) @@ -158,9 +158,9 @@ Value: “1” For more information about System Center Configuration Manager Compliance see [Get started with compliance settings in System Center Configuration Manager](https://docs.microsoft.com/sccm/compliance/get-started/get-started-with-compliance-settings). ## Related topics -- [Onboard Windows 10 machines using Group Policy](configure-endpoints-gp-windows-defender-advanced-threat-protection.md) -- [Onboard Windows 10 machines using Mobile Device Management tools](configure-endpoints-mdm-windows-defender-advanced-threat-protection.md) -- [Onboard Windows 10 machines using a local script](configure-endpoints-script-windows-defender-advanced-threat-protection.md) -- [Onboard non-persistent virtual desktop infrastructure (VDI) machines](configure-endpoints-vdi-windows-defender-advanced-threat-protection.md) -- [Run a detection test on a newly onboarded Microsoft Defender ATP machine](run-detection-test-windows-defender-advanced-threat-protection.md) -- [Troubleshoot Microsoft Defender Advanced Threat Protection onboarding issues](troubleshoot-onboarding-windows-defender-advanced-threat-protection.md) +- [Onboard Windows 10 machines using Group Policy](configure-endpoints-gp.md) +- [Onboard Windows 10 machines using Mobile Device Management tools](configure-endpoints-mdm.md) +- [Onboard Windows 10 machines using a local script](configure-endpoints-script.md) +- [Onboard non-persistent virtual desktop infrastructure (VDI) machines](configure-endpoints-vdi.md) +- [Run a detection test on a newly onboarded Microsoft Defender ATP machine](run-detection-test.md) +- [Troubleshoot Microsoft Defender Advanced Threat Protection onboarding issues](troubleshoot-onboarding.md) diff --git a/windows/security/threat-protection/microsoft-defender-atp/configure-endpoints-script.md b/windows/security/threat-protection/microsoft-defender-atp/configure-endpoints-script.md index 88cd708b56..d18d805cd6 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/configure-endpoints-script.md +++ b/windows/security/threat-protection/microsoft-defender-atp/configure-endpoints-script.md @@ -32,7 +32,7 @@ ms.topic: article You can also manually onboard individual machines to Microsoft Defender ATP. You might want to do this first when testing the service before you commit to onboarding all machines in your network. > [!NOTE] -> The script has been optimized to be used on a limited number of machines (1-10 machines). To deploy to scale, use other deployment options. For more information on using other deployment options, see [Onboard Window 10 machines](configure-endpoints-windows-defender-advanced-threat-protection.md). +> The script has been optimized to be used on a limited number of machines (1-10 machines). To deploy to scale, use other deployment options. For more information on using other deployment options, see [Onboard Window 10 machines](configure-endpoints.md). ## Onboard machines 1. Open the GP configuration package .zip file (*WindowsDefenderATPOnboardingPackage.zip*) that you downloaded from the service onboarding wizard. You can also get the package from [Microsoft Defender Security Center](https://securitycenter.windows.com/): @@ -60,11 +60,11 @@ You can also manually onboard individual machines to Microsoft Defender ATP. You 5. Press the **Enter** key or click **OK**. -For information on how you can manually validate that the machine is compliant and correctly reports sensor data see, [Troubleshoot Microsoft Defender Advanced Threat Protection onboarding issues](troubleshoot-onboarding-windows-defender-advanced-threat-protection.md). +For information on how you can manually validate that the machine is compliant and correctly reports sensor data see, [Troubleshoot Microsoft Defender Advanced Threat Protection onboarding issues](troubleshoot-onboarding.md). >[!TIP] -> After onboarding the machine, you can choose to run a detection test to verify that an machine is properly onboarded to the service. For more information, see [Run a detection test on a newly onboarded Microsoft Defender ATP endpoint](run-detection-test-windows-defender-advanced-threat-protection.md). +> After onboarding the machine, you can choose to run a detection test to verify that an machine is properly onboarded to the service. For more information, see [Run a detection test on a newly onboarded Microsoft Defender ATP endpoint](run-detection-test.md). ## Configure sample collection settings For each machine, you can set a configuration value to state whether samples can be collected from the machine when a request is made through Microsoft Defender Security Center to submit a file for deep analysis. @@ -122,7 +122,7 @@ For security reasons, the package used to Offboard machines will expire 30 days ## Monitor machine configuration -You can follow the different verification steps in the [Troubleshoot onboarding issues](troubleshoot-onboarding-windows-defender-advanced-threat-protection.md) to verify that the script completed successfully and the agent is running. +You can follow the different verification steps in the [Troubleshoot onboarding issues](troubleshoot-onboarding.md) to verify that the script completed successfully and the agent is running. Monitoring can also be done directly on the portal, or by using the different deployment tools. @@ -135,9 +135,9 @@ Monitoring can also be done directly on the portal, or by using the different de ## Related topics -- [Onboard Windows 10 machines using Group Policy](configure-endpoints-gp-windows-defender-advanced-threat-protection.md) -- [Onboard Windows 10 machines using System Center Configuration Manager](configure-endpoints-sccm-windows-defender-advanced-threat-protection.md) -- [Onboard Windows 10 machines using Mobile Device Management tools](configure-endpoints-mdm-windows-defender-advanced-threat-protection.md) -- [Onboard non-persistent virtual desktop infrastructure (VDI) machines](configure-endpoints-vdi-windows-defender-advanced-threat-protection.md) -- [Run a detection test on a newly onboarded Microsoft Defender ATP machine](run-detection-test-windows-defender-advanced-threat-protection.md) -- [Troubleshoot Microsoft Defender Advanced Threat Protection onboarding issues](troubleshoot-onboarding-windows-defender-advanced-threat-protection.md) +- [Onboard Windows 10 machines using Group Policy](configure-endpoints-gp.md) +- [Onboard Windows 10 machines using System Center Configuration Manager](configure-endpoints-sccm.md) +- [Onboard Windows 10 machines using Mobile Device Management tools](configure-endpoints-mdm.md) +- [Onboard non-persistent virtual desktop infrastructure (VDI) machines](configure-endpoints-vdi.md) +- [Run a detection test on a newly onboarded Microsoft Defender ATP machine](run-detection-test.md) +- [Troubleshoot Microsoft Defender Advanced Threat Protection onboarding issues](troubleshoot-onboarding.md) diff --git a/windows/security/threat-protection/microsoft-defender-atp/configure-endpoints-vdi.md b/windows/security/threat-protection/microsoft-defender-atp/configure-endpoints-vdi.md index 95c0a67fb9..9bcaf00305 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/configure-endpoints-vdi.md +++ b/windows/security/threat-protection/microsoft-defender-atp/configure-endpoints-vdi.md @@ -91,10 +91,10 @@ You can onboard VDI machines using a single entry or multiple entries for each m 8. Use the search function by entering the machine name and select **Machine** as search type. ## Related topics -- [Onboard Windows 10 machines using Group Policy](configure-endpoints-gp-windows-defender-advanced-threat-protection.md) -- [Onboard Windows 10 machines using System Center Configuration Manager](configure-endpoints-sccm-windows-defender-advanced-threat-protection.md) -- [Onboard Windows 10 machines using Mobile Device Management tools](configure-endpoints-mdm-windows-defender-advanced-threat-protection.md) -- [Onboard Windows 10 machines using a local script](configure-endpoints-script-windows-defender-advanced-threat-protection.md) -- [Troubleshoot Microsoft Defender Advanced Threat Protection onboarding issues](troubleshoot-onboarding-windows-defender-advanced-threat-protection.md) +- [Onboard Windows 10 machines using Group Policy](configure-endpoints-gp.md) +- [Onboard Windows 10 machines using System Center Configuration Manager](configure-endpoints-sccm.md) +- [Onboard Windows 10 machines using Mobile Device Management tools](configure-endpoints-mdm.md) +- [Onboard Windows 10 machines using a local script](configure-endpoints-script.md) +- [Troubleshoot Microsoft Defender Advanced Threat Protection onboarding issues](troubleshoot-onboarding.md) diff --git a/windows/security/threat-protection/microsoft-defender-atp/configure-endpoints.md b/windows/security/threat-protection/microsoft-defender-atp/configure-endpoints.md index 69ddf03031..3507beb090 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/configure-endpoints.md +++ b/windows/security/threat-protection/microsoft-defender-atp/configure-endpoints.md @@ -39,11 +39,11 @@ The following deployment tools and methods are supported: ## In this section Topic | Description :---|:--- -[Onboard Windows 10 machines using Group Policy](configure-endpoints-gp-windows-defender-advanced-threat-protection.md) | Use Group Policy to deploy the configuration package on machines. -[Onboard Windows 10 machines using System Center Configuration Manager](configure-endpoints-sccm-windows-defender-advanced-threat-protection.md) | You can use either use System Center Configuration Manager (current branch) version 1606 or System Center Configuration Manager(current branch) version 1602 or earlier to deploy the configuration package on machines. -[Onboard Windows 10 machines using Mobile Device Management tools](configure-endpoints-mdm-windows-defender-advanced-threat-protection.md) | Use Mobile Device Management tools or Microsoft Intune to deploy the configuration package on machine. -[Onboard Windows 10 machines using a local script](configure-endpoints-script-windows-defender-advanced-threat-protection.md) | Learn how to use the local script to deploy the configuration package on endpoints. -[Onboard non-persistent virtual desktop infrastructure (VDI) machines](configure-endpoints-vdi-windows-defender-advanced-threat-protection.md) | Learn how to use the configuration package to configure VDI machines. +[Onboard Windows 10 machines using Group Policy](configure-endpoints-gp.md) | Use Group Policy to deploy the configuration package on machines. +[Onboard Windows 10 machines using System Center Configuration Manager](configure-endpoints-sccm.md) | You can use either use System Center Configuration Manager (current branch) version 1606 or System Center Configuration Manager(current branch) version 1602 or earlier to deploy the configuration package on machines. +[Onboard Windows 10 machines using Mobile Device Management tools](configure-endpoints-mdm.md) | Use Mobile Device Management tools or Microsoft Intune to deploy the configuration package on machine. +[Onboard Windows 10 machines using a local script](configure-endpoints-script.md) | Learn how to use the local script to deploy the configuration package on endpoints. +[Onboard non-persistent virtual desktop infrastructure (VDI) machines](configure-endpoints-vdi.md) | Learn how to use the configuration package to configure VDI machines. >Want to experience Microsoft Defender ATP? [Sign up for a free trial.](https://www.microsoft.com/en-us/WindowsForBusiness/windows-atp?ocid=docs-wdatp-configureendpoints-belowfoldlink) \ No newline at end of file diff --git a/windows/security/threat-protection/microsoft-defender-atp/configure-mssp-support.md b/windows/security/threat-protection/microsoft-defender-atp/configure-mssp-support.md index abe48eeec7..a5a9380158 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/configure-mssp-support.md +++ b/windows/security/threat-protection/microsoft-defender-atp/configure-mssp-support.md @@ -83,9 +83,9 @@ Grant the guest user access and permissions to your Microsoft Defender Security Granting access to guest user is done the same way as granting access to a user who is a member of your tenant. -If you're using basic permissions to access the portal, the guest user must be assigned a Security Administrator role in **your** tenant. For more information, see [Use basic permissions to access the portal](basic-permissions-windows-defender-advanced-threat-protection.md). +If you're using basic permissions to access the portal, the guest user must be assigned a Security Administrator role in **your** tenant. For more information, see [Use basic permissions to access the portal](basic-permissions.md). -If you're using role-based access control (RBAC), the guest user must be to added to the appropriate group or groups in **your** tenant. Fore more information on RBAC in Microsoft Defender ATP, see [Manage portal access using RBAC](rbac-windows-defender-advanced-threat-protection.md). +If you're using role-based access control (RBAC), the guest user must be to added to the appropriate group or groups in **your** tenant. Fore more information on RBAC in Microsoft Defender ATP, see [Manage portal access using RBAC](rbac.md). >[!NOTE] >There is no difference between the Member user and Guest user roles from RBAC perspective. @@ -123,7 +123,7 @@ Use the following steps to obtain the MSSP customer tenant ID and then use the I After access the portal is granted, alert notification rules can to be created so that emails are sent to MSSPs when alerts associated with the tenant are created and set conditions are met. -For more information, see [Create rules for alert notifications](configure-email-notifications-windows-defender-advanced-threat-protection.md#create-rules-for-alert-notifications). +For more information, see [Create rules for alert notifications](configure-email-notifications.md#create-rules-for-alert-notifications). These check boxes must be checked: - **Include organization name** - The customer name will be added to email notifications @@ -272,17 +272,17 @@ You'll need to have **Manage portal system settings** permission to whitelist th 5. Click **Authorize application**. -You can now download the relevant configuration file for your SIEM and connect to the Microsoft Defender ATP API. For more information see, [Pull alerts to your SIEM tools](configure-siem-windows-defender-advanced-threat-protection.md). +You can now download the relevant configuration file for your SIEM and connect to the Microsoft Defender ATP API. For more information see, [Pull alerts to your SIEM tools](configure-siem.md). - In the ArcSight configuration file / Splunk Authentication Properties file – you will have to write your application key manually by settings the secret value. - Instead of acquiring a refresh token in the portal, use the script from the previous step to acquire a refresh token (or acquire it by other means). ## Fetch alerts from MSSP customer's tenant using APIs -For information on how to fetch alerts using REST API, see [Pull alerts using REST API](pull-alerts-using-rest-api-windows-defender-advanced-threat-protection.md). +For information on how to fetch alerts using REST API, see [Pull alerts using REST API](pull-alerts-using-rest-api.md). ## Related topics -- [Use basic permissions to access the portal](basic-permissions-windows-defender-advanced-threat-protection.md) -- [Manage portal access using RBAC](rbac-windows-defender-advanced-threat-protection.md) -- [Pull alerts to your SIEM tools](configure-siem-windows-defender-advanced-threat-protection.md) -- [Pull alerts using REST API](pull-alerts-using-rest-api-windows-defender-advanced-threat-protection.md) +- [Use basic permissions to access the portal](basic-permissions.md) +- [Manage portal access using RBAC](rbac.md) +- [Pull alerts to your SIEM tools](configure-siem.md) +- [Pull alerts using REST API](pull-alerts-using-rest-api.md) diff --git a/windows/security/threat-protection/microsoft-defender-atp/configure-proxy-internet.md b/windows/security/threat-protection/microsoft-defender-atp/configure-proxy-internet.md index bc9f3d4a50..46c3f745a8 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/configure-proxy-internet.md +++ b/windows/security/threat-protection/microsoft-defender-atp/configure-proxy-internet.md @@ -169,5 +169,5 @@ However, if the connectivity check results indicate a failure, an HTTP error is > When the TelemetryProxyServer is set, in Registry or via Group Policy, Microsoft Defender ATP will fall back to direct if it can't access the defined proxy. ## Related topics -- [Onboard Windows 10 machines](configure-endpoints-windows-defender-advanced-threat-protection.md) -- [Troubleshoot Microsoft Defender Advanced Threat Protection onboarding issues](troubleshoot-onboarding-windows-defender-advanced-threat-protection.md) +- [Onboard Windows 10 machines](configure-endpoints.md) +- [Troubleshoot Microsoft Defender Advanced Threat Protection onboarding issues](troubleshoot-onboarding.md) diff --git a/windows/security/threat-protection/microsoft-defender-atp/configure-server-endpoints.md b/windows/security/threat-protection/microsoft-defender-atp/configure-server-endpoints.md index 5150173b16..bdd5095876 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/configure-server-endpoints.md +++ b/windows/security/threat-protection/microsoft-defender-atp/configure-server-endpoints.md @@ -70,7 +70,7 @@ You'll need to tak the following steps if you choose to onboard servers through - If you're already leveraging System Center Operations Manager (SCOM) or Azure Monitor (formerly known as Operations Management Suite (OMS)), simply attach the Microsoft Monitoring Agent (MMA) to report to your Microsoft Defender ATP workspace through Multi Homing support. Otherwise, install and configure MMA to report sensor data to Microsoft Defender ATP as instructed below. For more information, see [Collect log data with Azure Log Analytics agent](https://docs.microsoft.com/azure/azure-monitor/platform/log-analytics-agent). >[!TIP] -> After onboarding the machine, you can choose to run a detection test to verify that it is properly onboarded to the service. For more information, see [Run a detection test on a newly onboarded Microsoft Defender ATP endpoint](run-detection-test-windows-defender-advanced-threat-protection.md). +> After onboarding the machine, you can choose to run a detection test to verify that it is properly onboarded to the service. For more information, see [Run a detection test on a newly onboarded Microsoft Defender ATP endpoint](run-detection-test.md). ### Configure and update System Center Endpoint Protection clients >[!IMPORTANT] @@ -135,9 +135,9 @@ Supported tools include: - System Center Configuration Manager 2012 / 2012 R2 1511 / 1602 - VDI onboarding scripts for non-persistent machines - For more information, see [Onboard Windows 10 machines](configure-endpoints-windows-defender-advanced-threat-protection.md). Support for Windows Server, version 1803 and Windows 2019 provides deeper insight into activities happening on the server, coverage for kernel and memory attack detection, and enables response actions on Windows Server endpoint as well. + For more information, see [Onboard Windows 10 machines](configure-endpoints.md). Support for Windows Server, version 1803 and Windows 2019 provides deeper insight into activities happening on the server, coverage for kernel and memory attack detection, and enables response actions on Windows Server endpoint as well. -1. Configure Microsoft Defender ATP onboarding settings on the server. For more information, see [Onboard Windows 10 machines](configure-endpoints-windows-defender-advanced-threat-protection.md). +1. Configure Microsoft Defender ATP onboarding settings on the server. For more information, see [Onboard Windows 10 machines](configure-endpoints.md). 2. If you’re running a third party antimalware solution, you'll need to apply the following Windows Defender AV passive mode settings and verify it was configured correctly: @@ -231,8 +231,8 @@ To offboard the server, you can use either of the following methods: ``` ## Related topics -- [Onboard Windows 10 machines](configure-endpoints-windows-defender-advanced-threat-protection.md) -- [Onboard non-Windows machines](configure-endpoints-non-windows-windows-defender-advanced-threat-protection.md) -- [Configure proxy and Internet connectivity settings](configure-proxy-internet-windows-defender-advanced-threat-protection.md) -- [Run a detection test on a newly onboarded Microsoft Defender ATP machine](run-detection-test-windows-defender-advanced-threat-protection.md) -- [Troubleshooting Microsoft Defender Advanced Threat Protection onboarding issues](troubleshoot-onboarding-windows-defender-advanced-threat-protection.md) +- [Onboard Windows 10 machines](configure-endpoints.md) +- [Onboard non-Windows machines](configure-endpoints-non-windows.md) +- [Configure proxy and Internet connectivity settings](configure-proxy-internet.md) +- [Run a detection test on a newly onboarded Microsoft Defender ATP machine](run-detection-test.md) +- [Troubleshooting Microsoft Defender Advanced Threat Protection onboarding issues](troubleshoot-onboarding.md) diff --git a/windows/security/threat-protection/microsoft-defender-atp/configure-siem.md b/windows/security/threat-protection/microsoft-defender-atp/configure-siem.md index 1cc071a515..c5e8719018 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/configure-siem.md +++ b/windows/security/threat-protection/microsoft-defender-atp/configure-siem.md @@ -37,27 +37,27 @@ Microsoft Defender ATP currently supports the following SIEM tools: To use either of these supported SIEM tools you'll need to: -- [Enable SIEM integration in Microsoft Defender ATP](enable-siem-integration-windows-defender-advanced-threat-protection.md) +- [Enable SIEM integration in Microsoft Defender ATP](enable-siem-integration.md) - Configure the supported SIEM tool: - - [Configure Splunk to pull Microsoft Defender ATP alerts](configure-splunk-windows-defender-advanced-threat-protection.md) - - [Configure HP ArcSight to pull Microsoft Defender ATP alerts](configure-arcsight-windows-defender-advanced-threat-protection.md) + - [Configure Splunk to pull Microsoft Defender ATP alerts](configure-splunk.md) + - [Configure HP ArcSight to pull Microsoft Defender ATP alerts](configure-arcsight.md) -For more information on the list of fields exposed in the alerts API see, [Microsoft Defender ATP alert API fields](api-portal-mapping-windows-defender-advanced-threat-protection.md). +For more information on the list of fields exposed in the alerts API see, [Microsoft Defender ATP alert API fields](api-portal-mapping.md). ## Pull Microsoft Defender ATP alerts using REST API Microsoft Defender ATP supports the OAuth 2.0 protocol to pull alerts using REST API. -For more information, see [Pull Microsoft Defender ATP alerts using REST API](pull-alerts-using-rest-api-windows-defender-advanced-threat-protection.md). +For more information, see [Pull Microsoft Defender ATP alerts using REST API](pull-alerts-using-rest-api.md). ## In this section Topic | Description :---|:--- -[Enable SIEM integration in Microsoft Defender ATP](enable-siem-integration-windows-defender-advanced-threat-protection.md)| Learn about enabling the SIEM integration feature in the **Settings** page in the portal so that you can use and generate the required information to configure supported SIEM tools. -[Configure Splunk to pull Microsoft Defender ATP alerts](configure-splunk-windows-defender-advanced-threat-protection.md)| Learn about installing the REST API Modular Input app and other configuration settings to enable Splunk to pull Microsoft Defender ATP alerts. -[Configure HP ArcSight to pull Microsoft Defender ATP alerts](configure-arcsight-windows-defender-advanced-threat-protection.md)| Learn about installing the HP ArcSight REST FlexConnector package and the files you need to configure ArcSight to pull Microsoft Defender ATP alerts. -[Microsoft Defender ATP alert API fields](api-portal-mapping-windows-defender-advanced-threat-protection.md) | Understand what data fields are exposed as part of the alerts API and how they map to Microsoft Defender Security Center. -[Pull Microsoft Defender ATP alerts using REST API](pull-alerts-using-rest-api-windows-defender-advanced-threat-protection.md) | Use the Client credentials OAuth 2.0 flow to pull alerts from Microsoft Defender ATP using REST API. -[Troubleshoot SIEM tool integration issues](troubleshoot-siem-windows-defender-advanced-threat-protection.md) | Address issues you might encounter when using the SIEM integration feature. +[Enable SIEM integration in Microsoft Defender ATP](enable-siem-integration.md)| Learn about enabling the SIEM integration feature in the **Settings** page in the portal so that you can use and generate the required information to configure supported SIEM tools. +[Configure Splunk to pull Microsoft Defender ATP alerts](configure-splunk.md)| Learn about installing the REST API Modular Input app and other configuration settings to enable Splunk to pull Microsoft Defender ATP alerts. +[Configure HP ArcSight to pull Microsoft Defender ATP alerts](configure-arcsight.md)| Learn about installing the HP ArcSight REST FlexConnector package and the files you need to configure ArcSight to pull Microsoft Defender ATP alerts. +[Microsoft Defender ATP alert API fields](api-portal-mapping.md) | Understand what data fields are exposed as part of the alerts API and how they map to Microsoft Defender Security Center. +[Pull Microsoft Defender ATP alerts using REST API](pull-alerts-using-rest-api.md) | Use the Client credentials OAuth 2.0 flow to pull alerts from Microsoft Defender ATP using REST API. +[Troubleshoot SIEM tool integration issues](troubleshoot-siem.md) | Address issues you might encounter when using the SIEM integration feature. diff --git a/windows/security/threat-protection/microsoft-defender-atp/configure-splunk.md b/windows/security/threat-protection/microsoft-defender-atp/configure-splunk.md index a59e0fb017..6e5283c7f0 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/configure-splunk.md +++ b/windows/security/threat-protection/microsoft-defender-atp/configure-splunk.md @@ -34,7 +34,7 @@ You'll need to configure Splunk so that it can pull Microsoft Defender ATP alert ## Before you begin - Install the [REST API Modular Input app](https://splunkbase.splunk.com/app/1546/) in Splunk. -- Make sure you have enabled the **SIEM integration** feature from the **Settings** menu. For more information, see [Enable SIEM integration in Microsoft Defender ATP](enable-siem-integration-windows-defender-advanced-threat-protection.md) +- Make sure you have enabled the **SIEM integration** feature from the **Settings** menu. For more information, see [Enable SIEM integration in Microsoft Defender ATP](enable-siem-integration.md) - Have the details file you saved from enabling the **SIEM integration** feature ready. You'll need to get the following values: - OAuth 2 Token refresh URL @@ -146,8 +146,8 @@ Use the solution explorer to view alerts in Splunk. >```source="rest://windows atp alerts" | spath | dedup _raw | table *``` ## Related topics -- [Enable SIEM integration in Microsoft Defender ATP](enable-siem-integration-windows-defender-advanced-threat-protection.md) -- [Configure ArcSight to pull Microsoft Defender ATP alerts](configure-arcsight-windows-defender-advanced-threat-protection.md) -- [Microsoft Defender ATP alert API fields](api-portal-mapping-windows-defender-advanced-threat-protection.md) -- [Pull Microsoft Defender ATP alerts using REST API](pull-alerts-using-rest-api-windows-defender-advanced-threat-protection.md) -- [Troubleshoot SIEM tool integration issues](troubleshoot-siem-windows-defender-advanced-threat-protection.md) +- [Enable SIEM integration in Microsoft Defender ATP](enable-siem-integration.md) +- [Configure ArcSight to pull Microsoft Defender ATP alerts](configure-arcsight.md) +- [Microsoft Defender ATP alert API fields](api-portal-mapping.md) +- [Pull Microsoft Defender ATP alerts using REST API](pull-alerts-using-rest-api.md) +- [Troubleshoot SIEM tool integration issues](troubleshoot-siem.md) diff --git a/windows/security/threat-protection/microsoft-defender-atp/create-alert-by-reference.md b/windows/security/threat-protection/microsoft-defender-atp/create-alert-by-reference.md index 4d6bed28ef..f21867e552 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/create-alert-by-reference.md +++ b/windows/security/threat-protection/microsoft-defender-atp/create-alert-by-reference.md @@ -38,8 +38,8 @@ Delegated (work or school account) | Alert.ReadWrite | 'Read and write alerts' >[!Note] > When obtaining a token using user credentials: ->- The user needs to have at least the following role permission: 'Alerts investigation' (See [Create and manage roles](user-roles-windows-defender-advanced-threat-protection.md) for more information) ->- The user needs to have access to the machine associated with the alert, based on machine group settings (See [Create and manage machine groups](machine-groups-windows-defender-advanced-threat-protection.md) for more information) +>- The user needs to have at least the following role permission: 'Alerts investigation' (See [Create and manage roles](user-roles.md) for more information) +>- The user needs to have access to the machine associated with the alert, based on machine group settings (See [Create and manage machine groups](machine-groups.md) for more information) ## HTTP request ``` diff --git a/windows/security/threat-protection/microsoft-defender-atp/custom-ti-api.md b/windows/security/threat-protection/microsoft-defender-atp/custom-ti-api.md index 8da5ea770d..daf80ba68b 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/custom-ti-api.md +++ b/windows/security/threat-protection/microsoft-defender-atp/custom-ti-api.md @@ -32,7 +32,7 @@ ms.date: 04/24/2018 You can define custom alert definitions and indicators of compromise (IOC) using the threat intelligence API. Creating custom threat intelligence alerts allows you to generate specific alerts that are applicable to your organization. ## Before you begin -Before creating custom alerts, you'll need to enable the threat intelligence application in Azure Active Directory and generate access tokens. For more information, see [Enable the custom threat intelligence application](enable-custom-ti-windows-defender-advanced-threat-protection.md). +Before creating custom alerts, you'll need to enable the threat intelligence application in Azure Active Directory and generate access tokens. For more information, see [Enable the custom threat intelligence application](enable-custom-ti.md). ### Use the threat intelligence REST API to create custom threat intelligence alerts You can call and specify the resource URLs using one of the following operations to access and manipulate a threat intelligence resource: @@ -71,7 +71,7 @@ Make an HTTP POST request to the token issuing endpoint with the following param > The authorization server URL is `https://login.windows.net//oauth2/token`. Replace `` with your Azure Active Directory tenant ID. >[!NOTE] -> The ``, ``, and the `` are all provided to you when enabling the custom threat intelligence application. For more information, see [Enable the custom threat intelligence application](enable-custom-ti-windows-defender-advanced-threat-protection.md). +> The ``, ``, and the `` are all provided to you when enabling the custom threat intelligence application. For more information, see [Enable the custom threat intelligence application](enable-custom-ti.md). ``` @@ -405,14 +405,14 @@ These parameters are compatible with the [OData V4 query language](http://docs.o ## Code examples The following articles provide detailed code examples that demonstrate how to use the custom threat intelligence API in several programming languages: -- [PowerShell code examples](powershell-example-code-windows-defender-advanced-threat-protection.md) -- [Python code examples](python-example-code-windows-defender-advanced-threat-protection.md) +- [PowerShell code examples](powershell-example-code.md) +- [Python code examples](python-example-code.md) ## Related topics -- [Understand threat intelligence concepts](threat-indicator-concepts-windows-defender-advanced-threat-protection.md) -- [Enable the custom threat intelligence API in Microsoft Defender ATP](enable-custom-ti-windows-defender-advanced-threat-protection.md) -- [PowerShell code examples for the custom threat intelligence API](powershell-example-code-windows-defender-advanced-threat-protection.md) -- [Python code examples for the custom threat intelligence API](python-example-code-windows-defender-advanced-threat-protection.md) -- [Experiment with custom threat intelligence alerts](experiment-custom-ti-windows-defender-advanced-threat-protection.md) -- [Troubleshoot custom threat intelligence issues](troubleshoot-custom-ti-windows-defender-advanced-threat-protection.md) +- [Understand threat intelligence concepts](threat-indicator-concepts.md) +- [Enable the custom threat intelligence API in Microsoft Defender ATP](enable-custom-ti.md) +- [PowerShell code examples for the custom threat intelligence API](powershell-example-code.md) +- [Python code examples for the custom threat intelligence API](python-example-code.md) +- [Experiment with custom threat intelligence alerts](experiment-custom-ti.md) +- [Troubleshoot custom threat intelligence issues](troubleshoot-custom-ti.md) diff --git a/windows/security/threat-protection/microsoft-defender-atp/data-retention-settings.md b/windows/security/threat-protection/microsoft-defender-atp/data-retention-settings.md index 76c3d3e1cb..eac5c12814 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/data-retention-settings.md +++ b/windows/security/threat-protection/microsoft-defender-atp/data-retention-settings.md @@ -41,8 +41,8 @@ During the onboarding process, a wizard takes you through the general settings o ## Related topics -- [Update data retention settings](data-retention-settings-windows-defender-advanced-threat-protection.md) -- [Configure alert notifications in Microsoft Defender ATP](configure-email-notifications-windows-defender-advanced-threat-protection.md) -- [Enable and create Power BI reports using Microsoft Defender ATP data](powerbi-reports-windows-defender-advanced-threat-protection.md) -- [Enable Secure Score security controls](enable-secure-score-windows-defender-advanced-threat-protection.md) -- [Configure advanced features](advanced-features-windows-defender-advanced-threat-protection.md) +- [Update data retention settings](data-retention-settings.md) +- [Configure alert notifications in Microsoft Defender ATP](configure-email-notifications.md) +- [Enable and create Power BI reports using Microsoft Defender ATP data](powerbi-reports.md) +- [Enable Secure Score security controls](enable-secure-score.md) +- [Configure advanced features](advanced-features.md) diff --git a/windows/security/threat-protection/microsoft-defender-atp/enable-custom-ti.md b/windows/security/threat-protection/microsoft-defender-atp/enable-custom-ti.md index d450893080..5f4decb253 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/enable-custom-ti.md +++ b/windows/security/threat-protection/microsoft-defender-atp/enable-custom-ti.md @@ -41,16 +41,16 @@ Before you can create custom threat intelligence (TI) using REST API, you'll nee >[!WARNING] >The client secret is only displayed once. Make sure you keep a copy of it in a safe place.
- For more information about getting a new secret see, [Learn how to get a new secret](troubleshoot-custom-ti-windows-defender-advanced-threat-protection.md#learn-how-to-get-a-new-client-secret). + For more information about getting a new secret see, [Learn how to get a new secret](troubleshoot-custom-ti.md#learn-how-to-get-a-new-client-secret). 4. Select **Generate tokens** to get an access and refresh token. You’ll need to use the access token in the Authorization header when doing REST API calls. ## Related topics -- [Understand threat intelligence concepts](threat-indicator-concepts-windows-defender-advanced-threat-protection.md) -- [Create custom alerts using the threat intelligence API](custom-ti-api-windows-defender-advanced-threat-protection.md) -- [PowerShell code examples for the custom threat intelligence API](powershell-example-code-windows-defender-advanced-threat-protection.md) -- [Python code examples for the custom threat intelligence API](python-example-code-windows-defender-advanced-threat-protection.md) -- [Experiment with custom threat intelligence alerts](experiment-custom-ti-windows-defender-advanced-threat-protection.md) -- [Troubleshoot custom threat intelligence issues](troubleshoot-custom-ti-windows-defender-advanced-threat-protection.md) +- [Understand threat intelligence concepts](threat-indicator-concepts.md) +- [Create custom alerts using the threat intelligence API](custom-ti-api.md) +- [PowerShell code examples for the custom threat intelligence API](powershell-example-code.md) +- [Python code examples for the custom threat intelligence API](python-example-code.md) +- [Experiment with custom threat intelligence alerts](experiment-custom-ti.md) +- [Troubleshoot custom threat intelligence issues](troubleshoot-custom-ti.md) diff --git a/windows/security/threat-protection/microsoft-defender-atp/enable-secure-score.md b/windows/security/threat-protection/microsoft-defender-atp/enable-secure-score.md index bf2bbbf003..7d87930ea5 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/enable-secure-score.md +++ b/windows/security/threat-protection/microsoft-defender-atp/enable-secure-score.md @@ -39,8 +39,8 @@ Set the baselines for calculating the score of Windows Defender security control 3. Click **Save preferences**. ## Related topics -- [View the Secure Score dashboard](secure-score-dashboard-windows-defender-advanced-threat-protection.md) -- [Update data retention settings for Microsoft Defender ATP](data-retention-settings-windows-defender-advanced-threat-protection.md) -- [Configure alert notifications in Microsoft Defender ATP](configure-email-notifications-windows-defender-advanced-threat-protection.md) -- [Enable and create Power BI reports using Microsoft Defender ATP data](powerbi-reports-windows-defender-advanced-threat-protection.md) -- [Configure advanced features in Microsoft Defender ATP](advanced-features-windows-defender-advanced-threat-protection.md) +- [View the Secure Score dashboard](secure-score-dashboard.md) +- [Update data retention settings for Microsoft Defender ATP](data-retention-settings.md) +- [Configure alert notifications in Microsoft Defender ATP](configure-email-notifications.md) +- [Enable and create Power BI reports using Microsoft Defender ATP data](powerbi-reports.md) +- [Configure advanced features in Microsoft Defender ATP](advanced-features.md) diff --git a/windows/security/threat-protection/microsoft-defender-atp/enable-siem-integration.md b/windows/security/threat-protection/microsoft-defender-atp/enable-siem-integration.md index 333a44a06f..14f0555964 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/enable-siem-integration.md +++ b/windows/security/threat-protection/microsoft-defender-atp/enable-siem-integration.md @@ -44,7 +44,7 @@ Enable security information and event management (SIEM) integration so you can p > [!WARNING] >The client secret is only displayed once. Make sure you keep a copy of it in a safe place.
- For more information about getting a new secret see, [Learn how to get a new secret](troubleshoot-custom-ti-windows-defender-advanced-threat-protection.md#learn-how-to-get-a-new-client-secret). + For more information about getting a new secret see, [Learn how to get a new secret](troubleshoot-custom-ti.md#learn-how-to-get-a-new-client-secret). ![Image of SIEM integration from Settings menu](images/siem_details.png) @@ -70,8 +70,8 @@ You can now proceed with configuring your SIEM solution or connecting to the ale You can configure IBM QRadar to collect alerts from Microsoft Defender ATP. For more information, see [IBM Knowledge Center](https://www.ibm.com/support/knowledgecenter/SS42VS_DSM/c_dsm_guide_MS_Win_Defender_ATP_overview.html?cp=SS42VS_7.3.1). ## Related topics -- [Configure Splunk to pull Microsoft Defender ATP alerts](configure-splunk-windows-defender-advanced-threat-protection.md) -- [Configure HP ArcSight to pull Microsoft Defender ATP alerts](configure-arcsight-windows-defender-advanced-threat-protection.md) -- [Microsoft Defender ATP alert API fields](api-portal-mapping-windows-defender-advanced-threat-protection.md) -- [Pull Microsoft Defender ATP alerts using REST API](pull-alerts-using-rest-api-windows-defender-advanced-threat-protection.md) -- [Troubleshoot SIEM tool integration issues](troubleshoot-siem-windows-defender-advanced-threat-protection.md) +- [Configure Splunk to pull Microsoft Defender ATP alerts](configure-splunk.md) +- [Configure HP ArcSight to pull Microsoft Defender ATP alerts](configure-arcsight.md) +- [Microsoft Defender ATP alert API fields](api-portal-mapping.md) +- [Pull Microsoft Defender ATP alerts using REST API](pull-alerts-using-rest-api.md) +- [Troubleshoot SIEM tool integration issues](troubleshoot-siem.md) diff --git a/windows/security/threat-protection/microsoft-defender-atp/event-error-codes.md b/windows/security/threat-protection/microsoft-defender-atp/event-error-codes.md index b6e868da21..cf3bab142d 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/event-error-codes.md +++ b/windows/security/threat-protection/microsoft-defender-atp/event-error-codes.md @@ -88,7 +88,7 @@ This URL will match that seen in the Firewall or network activity.
- + @@ -96,14 +96,14 @@ The service could not contact the external processing servers at that URL. +See [Onboard Windows 10 machines](configure-endpoints.md). +See [Onboard Windows 10 machines](configure-endpoints.md). @@ -111,21 +111,21 @@ See [Onboard Windows 10 machines](configure-endpoints-windows-defender-advanced- +See [Onboard Windows 10 machines](configure-endpoints.md). +See [Onboard Windows 10 machines](configure-endpoints.md). +See [Onboard Windows 10 machines](configure-endpoints.md). @@ -151,15 +151,15 @@ It may take several hours for the machine to appear in the portal. - + - +See [Onboard Windows 10 machines](configure-endpoints.md). @@ -186,7 +186,7 @@ If this error persists after a system restart, ensure all Windows updates have f +See [Onboard Windows 10 machines](configure-endpoints.md). @@ -194,23 +194,23 @@ See [Onboard Windows 10 machines](configure-endpoints-windows-defender-advanced- +See [Onboard Windows 10 machines](configure-endpoints.md). - +See [Onboard Windows 10 machines](configure-endpoints.md). @@ -223,14 +223,14 @@ See [Onboard Windows 10 machines](configure-endpoints-windows-defender-advanced- - + @@ -249,9 +249,9 @@ If the identifier does not persist, the same machine might appear twice in the p - +See [Onboard Windows 10 machines](configure-endpoints.md). @@ -345,6 +345,6 @@ See [Onboard Windows 10 machines](configure-endpoints-windows-defender-advanced- >Want to experience Microsoft Defender ATP? [Sign up for a free trial.](https://www.microsoft.com/en-us/WindowsForBusiness/windows-atp?ocid=docs-wdatp-eventerrorcodes-belowfoldlink) ## Related topics -- [Onboard Windows 10 machines](configure-endpoints-windows-defender-advanced-threat-protection.md) -- [Configure machine proxy and Internet connectivity settings](configure-proxy-internet-windows-defender-advanced-threat-protection.md) -- [Troubleshoot Microsoft Defender ATP](troubleshoot-onboarding-windows-defender-advanced-threat-protection.md) +- [Onboard Windows 10 machines](configure-endpoints.md) +- [Configure machine proxy and Internet connectivity settings](configure-proxy-internet.md) +- [Troubleshoot Microsoft Defender ATP](troubleshoot-onboarding.md) diff --git a/windows/security/threat-protection/microsoft-defender-atp/experiment-custom-ti.md b/windows/security/threat-protection/microsoft-defender-atp/experiment-custom-ti.md index b6eee8768f..46b9862de4 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/experiment-custom-ti.md +++ b/windows/security/threat-protection/microsoft-defender-atp/experiment-custom-ti.md @@ -31,14 +31,14 @@ ms.date: 11/09/2017 With the Microsoft Defender ATP threat intelligence API, you can create custom threat intelligence alerts that can help you keep track of possible attack activities in your organization. -For more information about threat intelligence concepts, see [Understand threat intelligence concepts](threat-indicator-concepts-windows-defender-advanced-threat-protection.md). +For more information about threat intelligence concepts, see [Understand threat intelligence concepts](threat-indicator-concepts.md). This article demonstrates an end-to-end usage of the threat intelligence API to get you started in using the threat intelligence API. You'll be guided through sample steps so you can experience how the threat intelligence API feature works. Sample steps include creating alerts definitions and indicators of compromise (IOCs), and examples of how triggered custom TI alerts look like. ## Step 1: Enable the threat intelligence API and obtain authentication details -To use the threat intelligence API feature, you'll need to enable the feature. For more information, see [Enable the custom threat intelligence application](enable-custom-ti-windows-defender-advanced-threat-protection.md). +To use the threat intelligence API feature, you'll need to enable the feature. For more information, see [Enable the custom threat intelligence application](enable-custom-ti.md). This step is required to generate security credentials that you need to use while working with the API. @@ -153,9 +153,9 @@ This step will guide you in exploring the custom alert in the portal. > There is a latency time of approximately 20 minutes between the time a custom TI is introduced and when it becomes effective. ## Related topics -- [Understand threat intelligence concepts](threat-indicator-concepts-windows-defender-advanced-threat-protection.md) -- [Enable the custom threat intelligence API in Microsoft Defender ATP](enable-custom-ti-windows-defender-advanced-threat-protection.md) -- [Create custom alerts using the threat intelligence API](custom-ti-api-windows-defender-advanced-threat-protection.md) -- [PowerShell code examples for the custom threat intelligence API](powershell-example-code-windows-defender-advanced-threat-protection.md) -- [Python code examples for the custom threat intelligence API](python-example-code-windows-defender-advanced-threat-protection.md) -- [Troubleshoot custom threat intelligence issues](troubleshoot-custom-ti-windows-defender-advanced-threat-protection.md) +- [Understand threat intelligence concepts](threat-indicator-concepts.md) +- [Enable the custom threat intelligence API in Microsoft Defender ATP](enable-custom-ti.md) +- [Create custom alerts using the threat intelligence API](custom-ti-api.md) +- [PowerShell code examples for the custom threat intelligence API](powershell-example-code.md) +- [Python code examples for the custom threat intelligence API](python-example-code.md) +- [Troubleshoot custom threat intelligence issues](troubleshoot-custom-ti.md) diff --git a/windows/security/threat-protection/microsoft-defender-atp/exposed-apis-create-app-nativeapp.md b/windows/security/threat-protection/microsoft-defender-atp/exposed-apis-create-app-nativeapp.md index f94e8cbf84..5d6e59a7c2 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/exposed-apis-create-app-nativeapp.md +++ b/windows/security/threat-protection/microsoft-defender-atp/exposed-apis-create-app-nativeapp.md @@ -43,7 +43,7 @@ This page explains how to create an AAD application, get an access token to Micr >[!NOTE] > When accessing Microsoft Defender ATP API on behalf of a user, you will need the correct App permission and user permission. -> If you are not familiar with user permissions on Microsoft Defender ATP, see [Manage portal access using role-based access control](rbac-windows-defender-advanced-threat-protection.md). +> If you are not familiar with user permissions on Microsoft Defender ATP, see [Manage portal access using role-based access control](rbac.md). >[!TIP] > If you have the permission to perform an action in the portal, you have the permission to perform the action in the API. diff --git a/windows/security/threat-protection/microsoft-defender-atp/find-machines-by-ip.md b/windows/security/threat-protection/microsoft-defender-atp/find-machines-by-ip.md index d46afc1621..04009c5fae 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/find-machines-by-ip.md +++ b/windows/security/threat-protection/microsoft-defender-atp/find-machines-by-ip.md @@ -40,8 +40,8 @@ Delegated (work or school account) | Machine.ReadWrite | 'Read and write machine >[!Note] > When obtaining a token using user credentials: ->- The user needs to have at least the following role permission: 'View Data' (See [Create and manage roles](user-roles-windows-defender-advanced-threat-protection.md) for more information) ->- Response will include only machines,that the user have access to, based on machine group settings (See [Create and manage machine groups](machine-groups-windows-defender-advanced-threat-protection.md) for more information) +>- The user needs to have at least the following role permission: 'View Data' (See [Create and manage roles](user-roles.md) for more information) +>- Response will include only machines,that the user have access to, based on machine group settings (See [Create and manage machine groups](machine-groups.md) for more information) ## HTTP request ``` diff --git a/windows/security/threat-protection/microsoft-defender-atp/fix-unhealhty-sensors.md b/windows/security/threat-protection/microsoft-defender-atp/fix-unhealhty-sensors.md index ba0614caa3..5c2458d459 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/fix-unhealhty-sensors.md +++ b/windows/security/threat-protection/microsoft-defender-atp/fix-unhealhty-sensors.md @@ -61,10 +61,10 @@ This status indicates that there's limited communication between the machine and The following suggested actions can help fix issues related to a misconfigured machine with impaired communications: -- [Ensure the machine has Internet connection](troubleshoot-onboarding-windows-defender-advanced-threat-protection.md#troubleshoot-onboarding-issues-on-the-machine)
+- [Ensure the machine has Internet connection](troubleshoot-onboarding.md#troubleshoot-onboarding-issues-on-the-machine)
The Window Defender ATP sensor requires Microsoft Windows HTTP (WinHTTP) to report sensor data and communicate with the Microsoft Defender ATP service. -- [Verify client connectivity to Microsoft Defender ATP service URLs](configure-proxy-internet-windows-defender-advanced-threat-protection.md#verify-client-connectivity-to-windows-defender-atp-service-urls)
+- [Verify client connectivity to Microsoft Defender ATP service URLs](configure-proxy-internet.md#verify-client-connectivity-to-windows-defender-atp-service-urls)
Verify the proxy configuration completed successfully, that WinHTTP can discover and communicate through the proxy server in your environment, and that the proxy server allows traffic to the Microsoft Defender ATP service URLs. If you took corrective actions and the machine status is still misconfigured, [open a support ticket](https://go.microsoft.com/fwlink/?LinkID=761093&clcid=0x409). @@ -73,19 +73,19 @@ If you took corrective actions and the machine status is still misconfigured, [o A misconfigured machine with status ‘No sensor data’ has communication with the service but can only report partial sensor data. Follow theses actions to correct known issues related to a misconfigured machine with status ‘No sensor data’: -- [Ensure the machine has Internet connection](troubleshoot-onboarding-windows-defender-advanced-threat-protection.md#troubleshoot-onboarding-issues-on-the-machine)
+- [Ensure the machine has Internet connection](troubleshoot-onboarding.md#troubleshoot-onboarding-issues-on-the-machine)
The Window Defender ATP sensor requires Microsoft Windows HTTP (WinHTTP) to report sensor data and communicate with the Microsoft Defender ATP service. -- [Verify client connectivity to Microsoft Defender ATP service URLs](configure-proxy-internet-windows-defender-advanced-threat-protection.md#verify-client-connectivity-to-windows-defender-atp-service-urls)
+- [Verify client connectivity to Microsoft Defender ATP service URLs](configure-proxy-internet.md#verify-client-connectivity-to-windows-defender-atp-service-urls)
Verify the proxy configuration completed successfully, that WinHTTP can discover and communicate through the proxy server in your environment, and that the proxy server allows traffic to the Microsoft Defender ATP service URLs. -- [Ensure the diagnostic data service is enabled](troubleshoot-onboarding-windows-defender-advanced-threat-protection.md#ensure-the-diagnostics-service-is-enabled)
+- [Ensure the diagnostic data service is enabled](troubleshoot-onboarding.md#ensure-the-diagnostics-service-is-enabled)
If the machines aren't reporting correctly, you might need to check that the Windows 10 diagnostic data service is set to automatically start and is running on the endpoint. -- [Ensure that Windows Defender Antivirus is not disabled by policy](troubleshoot-onboarding-windows-defender-advanced-threat-protection.md#ensure-that-windows-defender-antivirus-is-not-disabled-by-a-policy)
+- [Ensure that Windows Defender Antivirus is not disabled by policy](troubleshoot-onboarding.md#ensure-that-windows-defender-antivirus-is-not-disabled-by-a-policy)
If your machines are running a third-party antimalware client, the Microsoft Defender ATP agent needs the Windows Defender Antivirus Early Launch Antimalware (ELAM) driver to be enabled. If you took corrective actions and the machine status is still misconfigured, [open a support ticket](https://go.microsoft.com/fwlink/?LinkID=761093&clcid=0x409). ## Related topic -- [Check sensor health state in Microsoft Defender ATP](check-sensor-status-windows-defender-advanced-threat-protection.md) +- [Check sensor health state in Microsoft Defender ATP](check-sensor-status.md) diff --git a/windows/security/threat-protection/microsoft-defender-atp/get-alert-info-by-id.md b/windows/security/threat-protection/microsoft-defender-atp/get-alert-info-by-id.md index bbd89aa3a9..270323aae6 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/get-alert-info-by-id.md +++ b/windows/security/threat-protection/microsoft-defender-atp/get-alert-info-by-id.md @@ -37,8 +37,8 @@ Delegated (work or school account) | Alert.ReadWrite | 'Read and write alerts' >[!Note] > When obtaining a token using user credentials: ->- The user needs to have at least the following role permission: 'View Data' (See [Create and manage roles](user-roles-windows-defender-advanced-threat-protection.md) for more information) ->- The user needs to have access to the machine associated with the alert, based on machine group settings (See [Create and manage machine groups](machine-groups-windows-defender-advanced-threat-protection.md) for more information) +>- The user needs to have at least the following role permission: 'View Data' (See [Create and manage roles](user-roles.md) for more information) +>- The user needs to have access to the machine associated with the alert, based on machine group settings (See [Create and manage machine groups](machine-groups.md) for more information) ## HTTP request ``` diff --git a/windows/security/threat-protection/microsoft-defender-atp/get-alert-related-domain-info.md b/windows/security/threat-protection/microsoft-defender-atp/get-alert-related-domain-info.md index 1fca507328..b61db5a4e3 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/get-alert-related-domain-info.md +++ b/windows/security/threat-protection/microsoft-defender-atp/get-alert-related-domain-info.md @@ -35,8 +35,8 @@ Delegated (work or school account) | URL.Read.All | 'Read URLs' >[!Note] > When obtaining a token using user credentials: ->- The user needs to have at least the following role permission: 'View Data' (See [Create and manage roles](user-roles-windows-defender-advanced-threat-protection.md) for more information) ->- The user needs to have access to the machine associated with the alert, based on machine group settings (See [Create and manage machine groups](machine-groups-windows-defender-advanced-threat-protection.md) for more information) +>- The user needs to have at least the following role permission: 'View Data' (See [Create and manage roles](user-roles.md) for more information) +>- The user needs to have access to the machine associated with the alert, based on machine group settings (See [Create and manage machine groups](machine-groups.md) for more information) ## HTTP request ``` diff --git a/windows/security/threat-protection/microsoft-defender-atp/get-alert-related-files-info.md b/windows/security/threat-protection/microsoft-defender-atp/get-alert-related-files-info.md index 9bbfea2471..de2acd3731 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/get-alert-related-files-info.md +++ b/windows/security/threat-protection/microsoft-defender-atp/get-alert-related-files-info.md @@ -35,8 +35,8 @@ Delegated (work or school account) | File.Read.All | 'Read file profiles' >[!Note] > When obtaining a token using user credentials: ->- The user needs to have at least the following role permission: 'View Data' (See [Create and manage roles](user-roles-windows-defender-advanced-threat-protection.md) for more information) ->- The user needs to have access to the machine associated with the alert, based on machine group settings (See [Create and manage machine groups](machine-groups-windows-defender-advanced-threat-protection.md) for more information) +>- The user needs to have at least the following role permission: 'View Data' (See [Create and manage roles](user-roles.md) for more information) +>- The user needs to have access to the machine associated with the alert, based on machine group settings (See [Create and manage machine groups](machine-groups.md) for more information) ## HTTP request ``` diff --git a/windows/security/threat-protection/microsoft-defender-atp/get-alert-related-ip-info.md b/windows/security/threat-protection/microsoft-defender-atp/get-alert-related-ip-info.md index 097a942506..17b8139faf 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/get-alert-related-ip-info.md +++ b/windows/security/threat-protection/microsoft-defender-atp/get-alert-related-ip-info.md @@ -36,8 +36,8 @@ Delegated (work or school account) | Ip.Read.All | 'Read IP address profiles' >[!Note] > When obtaining a token using user credentials: ->- The user needs to have at least the following role permission: 'View Data' (See [Create and manage roles](user-roles-windows-defender-advanced-threat-protection.md) for more information) ->- The user needs to have access to the machine associated with the alert, based on machine group settings (See [Create and manage machine groups](machine-groups-windows-defender-advanced-threat-protection.md) for more information) +>- The user needs to have at least the following role permission: 'View Data' (See [Create and manage roles](user-roles.md) for more information) +>- The user needs to have access to the machine associated with the alert, based on machine group settings (See [Create and manage machine groups](machine-groups.md) for more information) ## HTTP request ``` diff --git a/windows/security/threat-protection/microsoft-defender-atp/get-alert-related-machine-info.md b/windows/security/threat-protection/microsoft-defender-atp/get-alert-related-machine-info.md index 67b08cb95f..c706b3635e 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/get-alert-related-machine-info.md +++ b/windows/security/threat-protection/microsoft-defender-atp/get-alert-related-machine-info.md @@ -38,8 +38,8 @@ Delegated (work or school account) | Machine.ReadWrite | 'Read and write machine >[!Note] > When obtaining a token using user credentials: ->- The user needs to have at least the following role permission: 'View Data' (See [Create and manage roles](user-roles-windows-defender-advanced-threat-protection.md) for more information) ->- The user needs to have access to the machine associated with the alert, based on machine group settings (See [Create and manage machine groups](machine-groups-windows-defender-advanced-threat-protection.md) for more information) +>- The user needs to have at least the following role permission: 'View Data' (See [Create and manage roles](user-roles.md) for more information) +>- The user needs to have access to the machine associated with the alert, based on machine group settings (See [Create and manage machine groups](machine-groups.md) for more information) ## HTTP request ``` diff --git a/windows/security/threat-protection/microsoft-defender-atp/get-alert-related-user-info.md b/windows/security/threat-protection/microsoft-defender-atp/get-alert-related-user-info.md index 13feffeb9e..1402b61b4e 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/get-alert-related-user-info.md +++ b/windows/security/threat-protection/microsoft-defender-atp/get-alert-related-user-info.md @@ -36,8 +36,8 @@ Delegated (work or school account) | User.Read.All | 'Read user profiles' >[!Note] > When obtaining a token using user credentials: ->- The user needs to have at least the following role permission: 'View Data' (See [Create and manage roles](user-roles-windows-defender-advanced-threat-protection.md) for more information) ->- The user needs to have access to the machine associated with the alert, based on machine group settings (See [Create and manage machine groups](machine-groups-windows-defender-advanced-threat-protection.md) for more information) +>- The user needs to have at least the following role permission: 'View Data' (See [Create and manage roles](user-roles.md) for more information) +>- The user needs to have access to the machine associated with the alert, based on machine group settings (See [Create and manage machine groups](machine-groups.md) for more information) ## HTTP request ``` diff --git a/windows/security/threat-protection/microsoft-defender-atp/get-alerts.md b/windows/security/threat-protection/microsoft-defender-atp/get-alerts.md index f75ea370fe..6fb1bbbf17 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/get-alerts.md +++ b/windows/security/threat-protection/microsoft-defender-atp/get-alerts.md @@ -42,8 +42,8 @@ Delegated (work or school account) | Alert.ReadWrite | 'Read and write alerts' >[!Note] > When obtaining a token using user credentials: ->- The user needs to have at least the following role permission: 'View Data' (See [Create and manage roles](user-roles-windows-defender-advanced-threat-protection.md) for more information) ->- The response will include only alerts that are associated with machines that the user can access, based on machine group settings (See [Create and manage machine groups](machine-groups-windows-defender-advanced-threat-protection.md) for more information) +>- The user needs to have at least the following role permission: 'View Data' (See [Create and manage roles](user-roles.md) for more information) +>- The response will include only alerts that are associated with machines that the user can access, based on machine group settings (See [Create and manage machine groups](machine-groups.md) for more information) ## HTTP request ``` diff --git a/windows/security/threat-protection/microsoft-defender-atp/get-domain-related-alerts.md b/windows/security/threat-protection/microsoft-defender-atp/get-domain-related-alerts.md index 5ba64ec4c7..6e1478cb72 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/get-domain-related-alerts.md +++ b/windows/security/threat-protection/microsoft-defender-atp/get-domain-related-alerts.md @@ -42,8 +42,8 @@ Delegated (work or school account) | Alert.ReadWrite | 'Read and write alerts' >[!Note] > When obtaining a token using user credentials: ->- The user needs to have at least the following role permission: 'View Data' (See [Create and manage roles](user-roles-windows-defender-advanced-threat-protection.md) for more information) ->- Response will include only alerts, associated with machines, that the user have access to, based on machine group settings (See [Create and manage machine groups](machine-groups-windows-defender-advanced-threat-protection.md) for more information) +>- The user needs to have at least the following role permission: 'View Data' (See [Create and manage roles](user-roles.md) for more information) +>- Response will include only alerts, associated with machines, that the user have access to, based on machine group settings (See [Create and manage machine groups](machine-groups.md) for more information) ## HTTP request ``` diff --git a/windows/security/threat-protection/microsoft-defender-atp/get-domain-related-machines.md b/windows/security/threat-protection/microsoft-defender-atp/get-domain-related-machines.md index 5d423ce391..b6ee9ba801 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/get-domain-related-machines.md +++ b/windows/security/threat-protection/microsoft-defender-atp/get-domain-related-machines.md @@ -37,8 +37,8 @@ Delegated (work or school account) | Machine.ReadWrite | 'Read and write machine >[!Note] > When obtaining a token using user credentials: ->- The user needs to have at least the following role permission: 'View Data' (See [Create and manage roles](user-roles-windows-defender-advanced-threat-protection.md) for more information) ->- Response will include only machines that the user can access, based on machine group settings (See [Create and manage machine groups](machine-groups-windows-defender-advanced-threat-protection.md) for more information) +>- The user needs to have at least the following role permission: 'View Data' (See [Create and manage roles](user-roles.md) for more information) +>- Response will include only machines that the user can access, based on machine group settings (See [Create and manage machine groups](machine-groups.md) for more information) ## HTTP request ``` diff --git a/windows/security/threat-protection/microsoft-defender-atp/get-domain-statistics.md b/windows/security/threat-protection/microsoft-defender-atp/get-domain-statistics.md index ae79790f9a..de9444bbd7 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/get-domain-statistics.md +++ b/windows/security/threat-protection/microsoft-defender-atp/get-domain-statistics.md @@ -36,7 +36,7 @@ Delegated (work or school account) | URL.Read.All | 'Read URLs' >[!Note] > When obtaining a token using user credentials: ->- The user needs to have at least the following role permission: 'View Data' (See [Create and manage roles](user-roles-windows-defender-advanced-threat-protection.md) for more information) +>- The user needs to have at least the following role permission: 'View Data' (See [Create and manage roles](user-roles.md) for more information) ## HTTP request ``` diff --git a/windows/security/threat-protection/microsoft-defender-atp/get-file-information.md b/windows/security/threat-protection/microsoft-defender-atp/get-file-information.md index 35e9289aa3..0315a79f79 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/get-file-information.md +++ b/windows/security/threat-protection/microsoft-defender-atp/get-file-information.md @@ -37,7 +37,7 @@ Delegated (work or school account) | File.Read.All | 'Read all file profiles' >[!Note] > When obtaining a token using user credentials: ->- The user needs to have at least the following role permission: 'View Data' (See [Create and manage roles](user-roles-windows-defender-advanced-threat-protection.md) for more information) +>- The user needs to have at least the following role permission: 'View Data' (See [Create and manage roles](user-roles.md) for more information) ## HTTP request diff --git a/windows/security/threat-protection/microsoft-defender-atp/get-file-related-alerts.md b/windows/security/threat-protection/microsoft-defender-atp/get-file-related-alerts.md index 5df7bcbdb8..f3709ad133 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/get-file-related-alerts.md +++ b/windows/security/threat-protection/microsoft-defender-atp/get-file-related-alerts.md @@ -40,8 +40,8 @@ Delegated (work or school account) | Alert.ReadWrite | 'Read and write alerts' >[!Note] > When obtaining a token using user credentials: ->- The user needs to have at least the following role permission: 'View Data' (See [Create and manage roles](user-roles-windows-defender-advanced-threat-protection.md) for more information) ->- Response will include only alerts, associated with machines, that the user have access to, based on machine group settings (See [Create and manage machine groups](machine-groups-windows-defender-advanced-threat-protection.md) for more information) +>- The user needs to have at least the following role permission: 'View Data' (See [Create and manage roles](user-roles.md) for more information) +>- Response will include only alerts, associated with machines, that the user have access to, based on machine group settings (See [Create and manage machine groups](machine-groups.md) for more information) ## HTTP request ``` diff --git a/windows/security/threat-protection/microsoft-defender-atp/get-file-related-machines.md b/windows/security/threat-protection/microsoft-defender-atp/get-file-related-machines.md index 389c9e1c36..599b60b82e 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/get-file-related-machines.md +++ b/windows/security/threat-protection/microsoft-defender-atp/get-file-related-machines.md @@ -39,8 +39,8 @@ Delegated (work or school account) | Machine.ReadWrite | 'Read and write machine >[!Note] > When obtaining a token using user credentials: ->- The user needs to have at least the following role permission: 'View Data' (See [Create and manage roles](user-roles-windows-defender-advanced-threat-protection.md) for more information) ->- Response will include only machines, that the user have access to, based on machine group settings (See [Create and manage machine groups](machine-groups-windows-defender-advanced-threat-protection.md) for more information) +>- The user needs to have at least the following role permission: 'View Data' (See [Create and manage roles](user-roles.md) for more information) +>- Response will include only machines, that the user have access to, based on machine group settings (See [Create and manage machine groups](machine-groups.md) for more information) ## HTTP request ``` diff --git a/windows/security/threat-protection/microsoft-defender-atp/get-file-statistics.md b/windows/security/threat-protection/microsoft-defender-atp/get-file-statistics.md index 674203724b..f828a524f3 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/get-file-statistics.md +++ b/windows/security/threat-protection/microsoft-defender-atp/get-file-statistics.md @@ -40,7 +40,7 @@ Delegated (work or school account) | File.Read.All | 'Read file profiles' >[!Note] > When obtaining a token using user credentials: ->- The user needs to have at least the following role permission: 'View Data' (See [Create and manage roles](user-roles-windows-defender-advanced-threat-protection.md) for more information) +>- The user needs to have at least the following role permission: 'View Data' (See [Create and manage roles](user-roles.md) for more information) ## HTTP request ``` diff --git a/windows/security/threat-protection/microsoft-defender-atp/get-ip-related-alerts.md b/windows/security/threat-protection/microsoft-defender-atp/get-ip-related-alerts.md index 41683118e7..28b400897f 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/get-ip-related-alerts.md +++ b/windows/security/threat-protection/microsoft-defender-atp/get-ip-related-alerts.md @@ -38,8 +38,8 @@ Delegated (work or school account) | Alert.ReadWrite | 'Read and write alerts' >[!Note] > When obtaining a token using user credentials: ->- The user needs to have at least the following role permission: 'View Data' (See [Create and manage roles](user-roles-windows-defender-advanced-threat-protection.md) for more information) ->- Response will include only alerts, associated with machines, that the user have access to, based on machine group settings (See [Create and manage machine groups](machine-groups-windows-defender-advanced-threat-protection.md) for more information) +>- The user needs to have at least the following role permission: 'View Data' (See [Create and manage roles](user-roles.md) for more information) +>- Response will include only alerts, associated with machines, that the user have access to, based on machine group settings (See [Create and manage machine groups](machine-groups.md) for more information) ## HTTP request ``` diff --git a/windows/security/threat-protection/microsoft-defender-atp/get-ip-related-machines.md b/windows/security/threat-protection/microsoft-defender-atp/get-ip-related-machines.md index a1ab48a5a3..a8875b7324 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/get-ip-related-machines.md +++ b/windows/security/threat-protection/microsoft-defender-atp/get-ip-related-machines.md @@ -38,8 +38,8 @@ Delegated (work or school account) | Machine.ReadWrite | 'Read and write machine >[!Note] > When obtaining a token using user credentials: ->- The user needs to have at least the following role permission: 'View Data' (See [Create and manage roles](user-roles-windows-defender-advanced-threat-protection.md) for more information) ->- Response will include only machines, that the user have access to, based on machine group settings (See [Create and manage machine groups](machine-groups-windows-defender-advanced-threat-protection.md) for more information) +>- The user needs to have at least the following role permission: 'View Data' (See [Create and manage roles](user-roles.md) for more information) +>- Response will include only machines, that the user have access to, based on machine group settings (See [Create and manage machine groups](machine-groups.md) for more information) ## HTTP request ``` diff --git a/windows/security/threat-protection/microsoft-defender-atp/get-ip-statistics.md b/windows/security/threat-protection/microsoft-defender-atp/get-ip-statistics.md index 1a1062304c..4fae9d2d61 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/get-ip-statistics.md +++ b/windows/security/threat-protection/microsoft-defender-atp/get-ip-statistics.md @@ -38,7 +38,7 @@ Delegated (work or school account) | Ip.Read.All | 'Read IP address profiles' >[!Note] > When obtaining a token using user credentials: ->- The user needs to have at least the following role permission: 'View Data' (See [Create and manage roles](user-roles-windows-defender-advanced-threat-protection.md) for more information) +>- The user needs to have at least the following role permission: 'View Data' (See [Create and manage roles](user-roles.md) for more information) ## HTTP request ``` diff --git a/windows/security/threat-protection/microsoft-defender-atp/get-machine-by-id.md b/windows/security/threat-protection/microsoft-defender-atp/get-machine-by-id.md index 57cb51ba8b..017460ba7e 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/get-machine-by-id.md +++ b/windows/security/threat-protection/microsoft-defender-atp/get-machine-by-id.md @@ -39,8 +39,8 @@ Delegated (work or school account) | Machine.ReadWrite | 'Read and write machine >[!Note] > When obtaining a token using user credentials: ->- The user needs to have at least the following role permission: 'View Data' (See [Create and manage roles](user-roles-windows-defender-advanced-threat-protection.md) for more information) ->- User needs to have access to the machine, based on machine group settings (See [Create and manage machine groups](machine-groups-windows-defender-advanced-threat-protection.md) for more information) +>- The user needs to have at least the following role permission: 'View Data' (See [Create and manage roles](user-roles.md) for more information) +>- User needs to have access to the machine, based on machine group settings (See [Create and manage machine groups](machine-groups.md) for more information) ## HTTP request diff --git a/windows/security/threat-protection/microsoft-defender-atp/get-machine-log-on-users.md b/windows/security/threat-protection/microsoft-defender-atp/get-machine-log-on-users.md index 0315fbb35c..a4233e222f 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/get-machine-log-on-users.md +++ b/windows/security/threat-protection/microsoft-defender-atp/get-machine-log-on-users.md @@ -36,8 +36,8 @@ Delegated (work or school account) | User.Read.All | 'Read user profiles' >[!Note] > When obtaining a token using user credentials: ->- The user needs to have at least the following role permission: 'View Data' (See [Create and manage roles](user-roles-windows-defender-advanced-threat-protection.md) for more information) ->- Response will include users only if the machine is visible to the user, based on machine group settings (See [Create and manage machine groups](machine-groups-windows-defender-advanced-threat-protection.md) for more information) +>- The user needs to have at least the following role permission: 'View Data' (See [Create and manage roles](user-roles.md) for more information) +>- Response will include users only if the machine is visible to the user, based on machine group settings (See [Create and manage machine groups](machine-groups.md) for more information) ## HTTP request ``` diff --git a/windows/security/threat-protection/microsoft-defender-atp/get-machine-related-alerts.md b/windows/security/threat-protection/microsoft-defender-atp/get-machine-related-alerts.md index 19f9e99ebc..0250ee9a19 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/get-machine-related-alerts.md +++ b/windows/security/threat-protection/microsoft-defender-atp/get-machine-related-alerts.md @@ -38,8 +38,8 @@ Delegated (work or school account) | Alert.ReadWrite | 'Read and write alerts' >[!Note] > When obtaining a token using user credentials: ->- The user needs to have at least the following role permission: 'View Data' (See [Create and manage roles](user-roles-windows-defender-advanced-threat-protection.md) for more information) ->- User needs to have access to the machine, based on machine group settings (See [Create and manage machine groups](machine-groups-windows-defender-advanced-threat-protection.md) for more information) +>- The user needs to have at least the following role permission: 'View Data' (See [Create and manage roles](user-roles.md) for more information) +>- User needs to have access to the machine, based on machine group settings (See [Create and manage machine groups](machine-groups.md) for more information) ## HTTP request ``` diff --git a/windows/security/threat-protection/microsoft-defender-atp/get-machineaction-object.md b/windows/security/threat-protection/microsoft-defender-atp/get-machineaction-object.md index ac88ef7f97..3cb8e46926 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/get-machineaction-object.md +++ b/windows/security/threat-protection/microsoft-defender-atp/get-machineaction-object.md @@ -39,7 +39,7 @@ Delegated (work or school account) | Machine.ReadWrite | 'Read and write machine >[!Note] > When obtaining a token using user credentials: ->- The user needs to have at least the following role permission: 'View Data' (See [Create and manage roles](user-roles-windows-defender-advanced-threat-protection.md) for more information) +>- The user needs to have at least the following role permission: 'View Data' (See [Create and manage roles](user-roles.md) for more information) ## HTTP request ``` diff --git a/windows/security/threat-protection/microsoft-defender-atp/get-machineactions-collection.md b/windows/security/threat-protection/microsoft-defender-atp/get-machineactions-collection.md index c91a221921..9bfc5cab5b 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/get-machineactions-collection.md +++ b/windows/security/threat-protection/microsoft-defender-atp/get-machineactions-collection.md @@ -42,7 +42,7 @@ Delegated (work or school account) | Machine.ReadWrite | 'Read and write machine >[!Note] > When obtaining a token using user credentials: ->- The user needs to have at least the following role permission: 'View Data' (See [Create and manage roles](user-roles-windows-defender-advanced-threat-protection.md) for more information) +>- The user needs to have at least the following role permission: 'View Data' (See [Create and manage roles](user-roles.md) for more information) ## HTTP request ``` diff --git a/windows/security/threat-protection/microsoft-defender-atp/get-machines.md b/windows/security/threat-protection/microsoft-defender-atp/get-machines.md index d7104b407e..6d6a921754 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/get-machines.md +++ b/windows/security/threat-protection/microsoft-defender-atp/get-machines.md @@ -39,8 +39,8 @@ Delegated (work or school account) | Machine.ReadWrite | 'Read and write machine >[!Note] > When obtaining a token using user credentials: ->- The user needs to have at least the following role permission: 'View Data' (See [Create and manage roles](user-roles-windows-defender-advanced-threat-protection.md) for more information) ->- Response will include only machines,that the user have access to, based on machine group settings (See [Create and manage machine groups](machine-groups-windows-defender-advanced-threat-protection.md) for more information) +>- The user needs to have at least the following role permission: 'View Data' (See [Create and manage roles](user-roles.md) for more information) +>- Response will include only machines,that the user have access to, based on machine group settings (See [Create and manage machine groups](machine-groups.md) for more information) ## HTTP request ``` diff --git a/windows/security/threat-protection/microsoft-defender-atp/get-package-sas-uri.md b/windows/security/threat-protection/microsoft-defender-atp/get-package-sas-uri.md index aad27c712c..b4e18b9069 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/get-package-sas-uri.md +++ b/windows/security/threat-protection/microsoft-defender-atp/get-package-sas-uri.md @@ -35,8 +35,8 @@ Delegated (work or school account) | Machine.CollectForensics | 'Collect forensi >[!Note] > When obtaining a token using user credentials: ->- The user needs to have at least the following role permission: 'Alerts Investigation' (See [Create and manage roles](user-roles-windows-defender-advanced-threat-protection.md) for more information) ->- The user needs to have access to the machine, based on machine group settings (See [Create and manage machine groups](machine-groups-windows-defender-advanced-threat-protection.md) for more information) +>- The user needs to have at least the following role permission: 'Alerts Investigation' (See [Create and manage roles](user-roles.md) for more information) +>- The user needs to have access to the machine, based on machine group settings (See [Create and manage machine groups](machine-groups.md) for more information) ## HTTP request ``` diff --git a/windows/security/threat-protection/microsoft-defender-atp/get-started.md b/windows/security/threat-protection/microsoft-defender-atp/get-started.md index cc12829160..f2607a0544 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/get-started.md +++ b/windows/security/threat-protection/microsoft-defender-atp/get-started.md @@ -58,10 +58,10 @@ Bring the power of Microsoft Threat Protection to your organization. ## In this section Topic | Description :---|:--- -[Minimum requirements](minimum-requirements-windows-defender-advanced-threat-protection.md) | Learn about the requirements for onboarding machines to the platform. -[Validate licensing and complete setup](licensing-windows-defender-advanced-threat-protection.md) | Get guidance on how to check that licenses have been provisioned to your organization and how to access the portal for the first time. -[Preview features](preview-windows-defender-advanced-threat-protection.md) | Learn about new features in the Microsoft Defender ATP preview release and be among the first to try upcoming features by turning on the preview experience. -[Data storage and privacy](data-storage-privacy-windows-defender-advanced-threat-protection.md) | Explains the data storage and privacy details related to Microsoft Defender ATP. -[Assign user access to the portal](assign-portal-access-windows-defender-advanced-threat-protection.md) | Set permissions to manage who can access the portal. You can set basic permissions or set granular permissions using role-based access control (RBAC). +[Minimum requirements](minimum-requirements.md) | Learn about the requirements for onboarding machines to the platform. +[Validate licensing and complete setup](licensing.md) | Get guidance on how to check that licenses have been provisioned to your organization and how to access the portal for the first time. +[Preview features](preview.md) | Learn about new features in the Microsoft Defender ATP preview release and be among the first to try upcoming features by turning on the preview experience. +[Data storage and privacy](data-storage-privacy.md) | Explains the data storage and privacy details related to Microsoft Defender ATP. +[Assign user access to the portal](assign-portal-access.md) | Set permissions to manage who can access the portal. You can set basic permissions or set granular permissions using role-based access control (RBAC). [Evaluate Microsoft Defender ATP](evaluate-atp.md) | Evaluate the various capabilities in Microsoft Defender ATP and test features out. -[Access the Microsoft Defender Security Center Community Center](community-windows-defender-advanced-threat-protection.md) | The Microsoft Defender ATP Community Center is a place where community members can learn, collaborate, and share experiences about the product. \ No newline at end of file +[Access the Microsoft Defender Security Center Community Center](community.md) | The Microsoft Defender ATP Community Center is a place where community members can learn, collaborate, and share experiences about the product. \ No newline at end of file diff --git a/windows/security/threat-protection/microsoft-defender-atp/get-user-related-alerts.md b/windows/security/threat-protection/microsoft-defender-atp/get-user-related-alerts.md index ad8a4ad671..0761a2dfb9 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/get-user-related-alerts.md +++ b/windows/security/threat-protection/microsoft-defender-atp/get-user-related-alerts.md @@ -37,8 +37,8 @@ Delegated (work or school account) | Alert.ReadWrite | 'Read and write alerts' >[!Note] > When obtaining a token using user credentials: ->- The user needs to have at least the following role permission: 'View Data' (See [Create and manage roles](user-roles-windows-defender-advanced-threat-protection.md) for more information) ->- Response will include only alerts, associated with machines, that the user have access to, based on machine group settings (See [Create and manage machine groups](machine-groups-windows-defender-advanced-threat-protection.md) for more information) +>- The user needs to have at least the following role permission: 'View Data' (See [Create and manage roles](user-roles.md) for more information) +>- Response will include only alerts, associated with machines, that the user have access to, based on machine group settings (See [Create and manage machine groups](machine-groups.md) for more information) ## HTTP request ``` diff --git a/windows/security/threat-protection/microsoft-defender-atp/get-user-related-machines.md b/windows/security/threat-protection/microsoft-defender-atp/get-user-related-machines.md index ee24ebc6e3..9562240757 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/get-user-related-machines.md +++ b/windows/security/threat-protection/microsoft-defender-atp/get-user-related-machines.md @@ -38,8 +38,8 @@ Delegated (work or school account) | Machine.ReadWrite | 'Read and write machine >[!Note] > When obtaining a token using user credentials: ->- The user needs to have at least the following role permission: 'View Data' (See [Create and manage roles](user-roles-windows-defender-advanced-threat-protection.md) for more information) ->- Response will include only machines that the user can access, based on machine group settings (See [Create and manage machine groups](machine-groups-windows-defender-advanced-threat-protection.md) for more information) +>- The user needs to have at least the following role permission: 'View Data' (See [Create and manage roles](user-roles.md) for more information) +>- Response will include only machines that the user can access, based on machine group settings (See [Create and manage machine groups](machine-groups.md) for more information) ## HTTP request ``` diff --git a/windows/security/threat-protection/microsoft-defender-atp/incidents-queue.md b/windows/security/threat-protection/microsoft-defender-atp/incidents-queue.md index 3ac978d6bd..9ac051b1dd 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/incidents-queue.md +++ b/windows/security/threat-protection/microsoft-defender-atp/incidents-queue.md @@ -32,7 +32,7 @@ Microsoft Defender ATP applies correlation analytics and aggregates all related Topic | Description :---|:--- [View and organize the Incidents queue](view-incidents-queue.md)| See the list of incidents and learn how to apply filters to limit the list and get a more focused view. -[Manage incidents](manage-incidents-windows-defender-advanced-threat-protection.md) | Learn how to manage incidents by assigning it, updating its status, or setting its classification and other actions. -[Investigate incidents](investigate-incidents-windows-defender-advanced-threat-protection.md)| See associated alerts, manage the incident, see alert metadata, and visualizations to help you investigate an incident. +[Manage incidents](manage-incidents.md) | Learn how to manage incidents by assigning it, updating its status, or setting its classification and other actions. +[Investigate incidents](investigate-incidents.md)| See associated alerts, manage the incident, see alert metadata, and visualizations to help you investigate an incident. diff --git a/windows/security/threat-protection/microsoft-defender-atp/information-protection-in-windows-overview.md b/windows/security/threat-protection/microsoft-defender-atp/information-protection-in-windows-overview.md index fad5873fe4..6a3739e714 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/information-protection-in-windows-overview.md +++ b/windows/security/threat-protection/microsoft-defender-atp/information-protection-in-windows-overview.md @@ -38,7 +38,7 @@ Microsoft Defender ATP applies two methods to discover and protect data: ## Data discovery -Microsoft Defender ATP automatically discovers files with sensitivity labels on Windows devices when the feature is enabled. You can enable the Azure Information Protection integration feature from Microsoft Defender Security Center. For more information, see [Configure advanced features](advanced-features-windows-defender-advanced-threat-protection.md#azure-information-protection). +Microsoft Defender ATP automatically discovers files with sensitivity labels on Windows devices when the feature is enabled. You can enable the Azure Information Protection integration feature from Microsoft Defender Security Center. For more information, see [Configure advanced features](advanced-features.md#azure-information-protection). ![Image of settings page with Azure Information Protection](images/atp-settings-aip.png) diff --git a/windows/security/threat-protection/microsoft-defender-atp/initiate-autoir-investigation.md b/windows/security/threat-protection/microsoft-defender-atp/initiate-autoir-investigation.md index 13ed50b836..dbf0d58497 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/initiate-autoir-investigation.md +++ b/windows/security/threat-protection/microsoft-defender-atp/initiate-autoir-investigation.md @@ -26,11 +26,11 @@ ms.topic: article Initiate AutoIR investigation on a machine. >[!Note] -> This page focuses on performing an automated investigation on a machine. See [Automated Investigation](automated-investigations-windows-defender-advanced-threat-protection.md) for more information. +> This page focuses on performing an automated investigation on a machine. See [Automated Investigation](automated-investigations.md) for more information. ## Limitations 1. The number of executions is limited (up to 5 calls per hour). -2. For Automated Investigation limitations, see [Automated Investigation](automated-investigations-windows-defender-advanced-threat-protection.md). +2. For Automated Investigation limitations, see [Automated Investigation](automated-investigations.md). ## Permissions One of the following permissions is required to call this API. To learn more, including how to choose permissions, see [Use Microsoft Defender ATP APIs](apis-intro.md) @@ -42,8 +42,8 @@ Delegated (work or school account) | Alert.ReadWrite | 'Read and write alerts' >[!Note] > When obtaining a token using user credentials: ->- The user needs to have at least the following role permission: 'Alerts Investigation' (See [Create and manage roles](user-roles-windows-defender-advanced-threat-protection.md) for more information) ->- The user needs to have access to the machine, based on machine group settings (See [Create and manage machine groups](machine-groups-windows-defender-advanced-threat-protection.md) for more information) +>- The user needs to have at least the following role permission: 'Alerts Investigation' (See [Create and manage roles](user-roles.md) for more information) +>- The user needs to have access to the machine, based on machine group settings (See [Create and manage machine groups](machine-groups.md) for more information) ## HTTP request ``` diff --git a/windows/security/threat-protection/microsoft-defender-atp/investigate-alerts.md b/windows/security/threat-protection/microsoft-defender-atp/investigate-alerts.md index fd445e7665..275fc11cea 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/investigate-alerts.md +++ b/windows/security/threat-protection/microsoft-defender-atp/investigate-alerts.md @@ -32,14 +32,14 @@ Investigate alerts that are affecting your network, understand what they mean, a Click an alert to see the alert details view and the various tiles that provide information about the alert. -You can also manage an alert and see alert metadata along with other information that can help you make better decisions on how to approach them. You'll also see a status of the automated investigation on the upper right corner. Clicking on the link will take you to the Automated investigations view. For more information, see [Automated investigations](automated-investigations-windows-defender-advanced-threat-protection.md). +You can also manage an alert and see alert metadata along with other information that can help you make better decisions on how to approach them. You'll also see a status of the automated investigation on the upper right corner. Clicking on the link will take you to the Automated investigations view. For more information, see [Automated investigations](automated-investigations.md). ![Image of the alert page](images/atp-alert-view.png) The alert context tile shows the where, who, and when context of the alert. As with other pages, you can click on the icon beside the name or user account to bring up the machine or user details pane. The alert details view also has a status tile that shows the status of the alert in the queue. You'll also see a description and a set of recommended actions which you can expand. -For more information about managing alerts, see [Manage alerts](manage-alerts-windows-defender-advanced-threat-protection.md). +For more information about managing alerts, see [Manage alerts](manage-alerts.md). The alert details page also shows the alert process tree, an incident graph, and an artifact timeline. @@ -93,12 +93,12 @@ The **Artifact timeline** feature provides an addition view of the evidence that Selecting an alert detail brings up the **Details pane** where you'll be able to see more information about the alert such as file details, detections, instances of it observed worldwide, and in the organization. ## Related topics -- [View and organize the Microsoft Defender Advanced Threat Protection Alerts queue ](alerts-queue-windows-defender-advanced-threat-protection.md) -- [Manage Microsoft Defender Advanced Threat Protection alerts](manage-alerts-windows-defender-advanced-threat-protection.md) -- [Investigate a file associated with a Microsoft Defender ATP alert](investigate-files-windows-defender-advanced-threat-protection.md) -- [Investigate machines in the Microsoft Defender ATP Machines list](investigate-machines-windows-defender-advanced-threat-protection.md) -- [Investigate an IP address associated with a Microsoft Defender ATP alert](investigate-ip-windows-defender-advanced-threat-protection.md) -- [Investigate a domain associated with a Microsoft Defender ATP alert](investigate-domain-windows-defender-advanced-threat-protection.md) -- [Investigate a user account in Microsoft Defender ATP](investigate-user-windows-defender-advanced-threat-protection.md) +- [View and organize the Microsoft Defender Advanced Threat Protection Alerts queue ](alerts-queue.md) +- [Manage Microsoft Defender Advanced Threat Protection alerts](manage-alerts.md) +- [Investigate a file associated with a Microsoft Defender ATP alert](investigate-files.md) +- [Investigate machines in the Microsoft Defender ATP Machines list](investigate-machines.md) +- [Investigate an IP address associated with a Microsoft Defender ATP alert](investigate-ip.md) +- [Investigate a domain associated with a Microsoft Defender ATP alert](investigate-domain.md) +- [Investigate a user account in Microsoft Defender ATP](investigate-user.md) diff --git a/windows/security/threat-protection/microsoft-defender-atp/investigate-domain.md b/windows/security/threat-protection/microsoft-defender-atp/investigate-domain.md index 14ceae480d..283772ed84 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/investigate-domain.md +++ b/windows/security/threat-protection/microsoft-defender-atp/investigate-domain.md @@ -60,10 +60,10 @@ The **Most recent observed machinew with URL** section provides a chronological 5. Clicking any of the machine names will take you to that machine's view, where you can continue investigate reported alerts, behaviors, and events. ## Related topics -- [View and organize the Microsoft Defender Advanced Threat Protection Alerts queue ](alerts-queue-windows-defender-advanced-threat-protection.md) -- [Manage Microsoft Defender Advanced Threat Protection alerts](manage-alerts-windows-defender-advanced-threat-protection.md) -- [Investigate Microsoft Defender Advanced Threat Protection alerts](investigate-alerts-windows-defender-advanced-threat-protection.md) -- [Investigate a file associated with a Microsoft Defender ATP alert](investigate-files-windows-defender-advanced-threat-protection.md) -- [Investigate machines in the Microsoft Defender ATP Machines list](investigate-machines-windows-defender-advanced-threat-protection.md) -- [Investigate an IP address associated with a Microsoft Defender ATP alert](investigate-ip-windows-defender-advanced-threat-protection.md) -- [Investigate a user account in Microsoft Defender ATP](investigate-user-windows-defender-advanced-threat-protection.md) +- [View and organize the Microsoft Defender Advanced Threat Protection Alerts queue ](alerts-queue.md) +- [Manage Microsoft Defender Advanced Threat Protection alerts](manage-alerts.md) +- [Investigate Microsoft Defender Advanced Threat Protection alerts](investigate-alerts.md) +- [Investigate a file associated with a Microsoft Defender ATP alert](investigate-files.md) +- [Investigate machines in the Microsoft Defender ATP Machines list](investigate-machines.md) +- [Investigate an IP address associated with a Microsoft Defender ATP alert](investigate-ip.md) +- [Investigate a user account in Microsoft Defender ATP](investigate-user.md) diff --git a/windows/security/threat-protection/microsoft-defender-atp/investigate-files.md b/windows/security/threat-protection/microsoft-defender-atp/investigate-files.md index 3f570b3926..fc752990fc 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/investigate-files.md +++ b/windows/security/threat-protection/microsoft-defender-atp/investigate-files.md @@ -41,9 +41,9 @@ You can get information from the following sections in the file view: - Most recent observed machines with file ## File worldwide and Deep analysis -The file details, malware detection, and prevalence worldwide sections display various attributes about the file. You’ll see actions you can take on the file. For more information on how to take action on a file, see [Take response action on a file](respond-file-alerts-windows-defender-advanced-threat-protection.md). +The file details, malware detection, and prevalence worldwide sections display various attributes about the file. You’ll see actions you can take on the file. For more information on how to take action on a file, see [Take response action on a file](respond-file-alerts.md). -You'll see details such as the file’s MD5, the VirusTotal detection ratio and Windows Defender AV detection if available, and the file’s prevalence worldwide. You'll also be able to [submit a file for deep analysis](respond-file-alerts-windows-defender-advanced-threat-protection.md#deep-analysis). +You'll see details such as the file’s MD5, the VirusTotal detection ratio and Windows Defender AV detection if available, and the file’s prevalence worldwide. You'll also be able to [submit a file for deep analysis](respond-file-alerts.md#deep-analysis). ![Image of file information](images/atp-file-information.png) @@ -65,10 +65,10 @@ The **Most recent observed machines with the file** section allows you to specif This allows for greater accuracy in defining entities to display such as if and when an entity was observed in the organization. For example, if you’re trying to identify the origin of a network communication to a certain IP Address within a 10-minute period on a given date, you can specify that exact time interval, and see only files that communicated with that IP Address at that time, drastically reducing unnecessary scrolling and searching. ## Related topics -- [View and organize the Microsoft Defender Advanced Threat Protection Alerts queue ](alerts-queue-windows-defender-advanced-threat-protection.md) -- [Manage Microsoft Defender Advanced Threat Protection alerts](manage-alerts-windows-defender-advanced-threat-protection.md) -- [Investigate Microsoft Defender Advanced Threat Protection alerts](investigate-alerts-windows-defender-advanced-threat-protection.md) -- [Investigate machines in the Microsoft Defender ATP Machines list](investigate-machines-windows-defender-advanced-threat-protection.md) -- [Investigate an IP address associated with a Microsoft Defender ATP alert](investigate-ip-windows-defender-advanced-threat-protection.md) -- [Investigate a domain associated with a Microsoft Defender ATP alert](investigate-domain-windows-defender-advanced-threat-protection.md) -- [Investigate a user account in Microsoft Defender ATP](investigate-user-windows-defender-advanced-threat-protection.md) \ No newline at end of file +- [View and organize the Microsoft Defender Advanced Threat Protection Alerts queue ](alerts-queue.md) +- [Manage Microsoft Defender Advanced Threat Protection alerts](manage-alerts.md) +- [Investigate Microsoft Defender Advanced Threat Protection alerts](investigate-alerts.md) +- [Investigate machines in the Microsoft Defender ATP Machines list](investigate-machines.md) +- [Investigate an IP address associated with a Microsoft Defender ATP alert](investigate-ip.md) +- [Investigate a domain associated with a Microsoft Defender ATP alert](investigate-domain.md) +- [Investigate a user account in Microsoft Defender ATP](investigate-user.md) \ No newline at end of file diff --git a/windows/security/threat-protection/microsoft-defender-atp/investigate-incidents.md b/windows/security/threat-protection/microsoft-defender-atp/investigate-incidents.md index cb3221071a..cddaa7e5f6 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/investigate-incidents.md +++ b/windows/security/threat-protection/microsoft-defender-atp/investigate-incidents.md @@ -44,10 +44,10 @@ Alerts are grouped into incidents based on the following reasons: ![Image of alerts tab with incident details page showing the reasons the alerts were linked together in that incident](images/atp-incidents-alerts-reason.png) -You can also manage an alert and see alert metadata along with other information. For more information, see [Investigate alerts](investigate-alerts-windows-defender-advanced-threat-protection.md). +You can also manage an alert and see alert metadata along with other information. For more information, see [Investigate alerts](investigate-alerts.md). ### Machines -You can also investigate the machines that are part of, or related to, a given incident. For more information, see [Investigate machines](investigate-machines-windows-defender-advanced-threat-protection.md). +You can also investigate the machines that are part of, or related to, a given incident. For more information, see [Investigate machines](investigate-machines.md). ![Image of machines tab in incident details page](images/atp-incident-machine-tab.png) @@ -77,6 +77,6 @@ You can click the circles on the incident graph to view the details of the malic ## Related topics - [Incidents queue](incidents-queue.md) - [View and organize the Incidents queue](view-incidents-queue.md) -- [Manage incidents](manage-incidents-windows-defender-advanced-threat-protection.md) +- [Manage incidents](manage-incidents.md) diff --git a/windows/security/threat-protection/microsoft-defender-atp/investigate-ip.md b/windows/security/threat-protection/microsoft-defender-atp/investigate-ip.md index 0d5a09260c..fda84c5cce 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/investigate-ip.md +++ b/windows/security/threat-protection/microsoft-defender-atp/investigate-ip.md @@ -67,10 +67,10 @@ Use the search filters to define the search criteria. You can also use the timel Clicking any of the machine names will take you to that machine's view, where you can continue investigate reported alerts, behaviors, and events. ## Related topics -- [View and organize the Microsoft Defender Advanced Threat Protection Alerts queue ](alerts-queue-windows-defender-advanced-threat-protection.md) -- [Manage Microsoft Defender Advanced Threat Protection alerts](manage-alerts-windows-defender-advanced-threat-protection.md) -- [Investigate Microsoft Defender Advanced Threat Protection alerts](investigate-alerts-windows-defender-advanced-threat-protection.md) -- [Investigate a file associated with a Microsoft Defender ATP alert](investigate-files-windows-defender-advanced-threat-protection.md) -- [Investigate machines in the Microsoft Defender ATP Machines list](investigate-machines-windows-defender-advanced-threat-protection.md) -- [Investigate a domain associated with a Microsoft Defender ATP alert](investigate-domain-windows-defender-advanced-threat-protection.md) -- [Investigate a user account in Microsoft Defender ATP](investigate-user-windows-defender-advanced-threat-protection.md) +- [View and organize the Microsoft Defender Advanced Threat Protection Alerts queue ](alerts-queue.md) +- [Manage Microsoft Defender Advanced Threat Protection alerts](manage-alerts.md) +- [Investigate Microsoft Defender Advanced Threat Protection alerts](investigate-alerts.md) +- [Investigate a file associated with a Microsoft Defender ATP alert](investigate-files.md) +- [Investigate machines in the Microsoft Defender ATP Machines list](investigate-machines.md) +- [Investigate a domain associated with a Microsoft Defender ATP alert](investigate-domain.md) +- [Investigate a user account in Microsoft Defender ATP](investigate-user.md) diff --git a/windows/security/threat-protection/microsoft-defender-atp/investigate-machines.md b/windows/security/threat-protection/microsoft-defender-atp/investigate-machines.md index 8ca174ec64..c8a7e86f97 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/investigate-machines.md +++ b/windows/security/threat-protection/microsoft-defender-atp/investigate-machines.md @@ -30,9 +30,9 @@ Investigate the details of an alert raised on a specific machine to identify oth You can click on affected machines whenever you see them in the portal to open a detailed report about that machine. Affected machines are identified in the following areas: -- The [Machines list](investigate-machines-windows-defender-advanced-threat-protection.md) -- The [Alerts queue](alerts-queue-windows-defender-advanced-threat-protection.md) -- The [Security operations dashboard](security-operations-dashboard-windows-defender-advanced-threat-protection.md) +- The [Machines list](investigate-machines.md) +- The [Alerts queue](alerts-queue.md) +- The [Security operations dashboard](security-operations-dashboard.md) - Any individual alert - Any individual file details view - Any IP address or domain details view @@ -49,7 +49,7 @@ The machine details, logged on users, machine risk, and machine reporting sectio **Machine details**
The machine details tile provides information such as the domain and OS of the machine. If there's an investigation package available on the machine, you'll see a link that allows you to download the package. -For more information on how to take action on a machine, see [Take response action on a machine](respond-machine-alerts-windows-defender-advanced-threat-protection.md). +For more information on how to take action on a machine, see [Take response action on a machine](respond-machine-alerts.md). **Logged on users**
@@ -62,7 +62,7 @@ Clicking on the logged on users in the Logged on users tile opens the Users Deta You'll also see details such as logon types for each user account, the user group, and when the account logon occurred. - For more information, see [Investigate user entities](investigate-user-windows-defender-advanced-threat-protection.md). + For more information, see [Investigate user entities](investigate-user.md). **Machine risk**
The Machine risk tile shows the overall risk assessment of a machine. A machine's risk level can be determined using the number of active alerts or by a combination of multiple risks that may increase the risk assessment and their severity levels. You can influence a machine's risk level by resolving associated alerts manually or automatically and also by suppressing an alert. It's also indicators of the active threats that machines could be exposed to. @@ -71,7 +71,7 @@ The Machine risk tile shows the overall risk assessment of a machine. A machine' If you have enabled the Azure ATP feature and there are alerts related to the machine, you can click on the link that will take you to the Azure ATP page where more information about the alerts are provided. >[!NOTE] ->You'll need to enable the integration on both Azure ATP and Microsoft Defender ATP to use this feature. In Microsoft Defender ATP, you can enable this feature in advanced features. For more information on how to enable advanced features, see [Turn on advanced features](advanced-features-windows-defender-advanced-threat-protection.md). +>You'll need to enable the integration on both Azure ATP and Microsoft Defender ATP to use this feature. In Microsoft Defender ATP, you can enable this feature in advanced features. For more information on how to enable advanced features, see [Turn on advanced features](advanced-features.md). **Machine reporting**
Provides the last internal IP and external IP of the machine. It also shows when the machine was first and last seen reporting to the service. @@ -81,7 +81,7 @@ The **Alerts related to this machine** section provides a list of alerts that ar ![Image of alerts related to machine](images/atp-alerts-related-to-machine.png) -This list is a filtered version of the [Alerts queue](alerts-queue-windows-defender-advanced-threat-protection.md), and shows the date when the alert's last activity was detected, a short description of the alert, the user account associated with the alert, the alert's severity, the alert's status in the queue, and who is addressing the alert. +This list is a filtered version of the [Alerts queue](alerts-queue.md), and shows the date when the alert's last activity was detected, a short description of the alert, the user account associated with the alert, the alert's severity, the alert's status in the queue, and who is addressing the alert. You can also choose to highlight an alert from the **Alerts related to this machine** or from the **Machine timeline** section to see the correlation between the alert and its related events on the machine by right-clicking on the alert and selecting **Select and mark events**. This highlights the alert and its related events and helps distinguish them from other alerts and events appearing in the timeline. Highlighted events are displayed in all information levels whether you choose to view the timeline by **Detections**, **Behaviors**, or **Verbose**. @@ -163,7 +163,7 @@ From the list of events that are displayed in the timeline, you can examine the ![Image of machine timeline details pane](images/atp-machine-timeline-details-panel.png) -You can also use the [Artifact timeline](investigate-alerts-windows-defender-advanced-threat-protection.md#artifact-timeline) feature to see the correlation between alerts and events on a specific machine. +You can also use the [Artifact timeline](investigate-alerts.md#artifact-timeline) feature to see the correlation between alerts and events on a specific machine. Expand an event to view associated processes related to the event. Click on the circle next to any process or IP address in the process tree to investigate additional details of the identified processes. This action brings up the **Details pane** which includes execution context of processes, network communications and a summary of meta data on the file or IP address. @@ -173,10 +173,10 @@ The details pane enriches the ‘in-context’ information across investigation ## Related topics -- [View and organize the Microsoft Defender Advanced Threat Protection Alerts queue ](alerts-queue-windows-defender-advanced-threat-protection.md) -- [Manage Microsoft Defender Advanced Threat Protection alerts](manage-alerts-windows-defender-advanced-threat-protection.md) -- [Investigate Microsoft Defender Advanced Threat Protection alerts](investigate-alerts-windows-defender-advanced-threat-protection.md) -- [Investigate a file associated with a Microsoft Defender ATP alert](investigate-files-windows-defender-advanced-threat-protection.md) -- [Investigate an IP address associated with a Microsoft Defender ATP alert](investigate-ip-windows-defender-advanced-threat-protection.md) -- [Investigate a domain associated with a Microsoft Defender ATP alert](investigate-domain-windows-defender-advanced-threat-protection.md) -- [Investigate a user account in Microsoft Defender ATP](investigate-user-windows-defender-advanced-threat-protection.md) +- [View and organize the Microsoft Defender Advanced Threat Protection Alerts queue ](alerts-queue.md) +- [Manage Microsoft Defender Advanced Threat Protection alerts](manage-alerts.md) +- [Investigate Microsoft Defender Advanced Threat Protection alerts](investigate-alerts.md) +- [Investigate a file associated with a Microsoft Defender ATP alert](investigate-files.md) +- [Investigate an IP address associated with a Microsoft Defender ATP alert](investigate-ip.md) +- [Investigate a domain associated with a Microsoft Defender ATP alert](investigate-domain.md) +- [Investigate a user account in Microsoft Defender ATP](investigate-user.md) diff --git a/windows/security/threat-protection/microsoft-defender-atp/investigate-user.md b/windows/security/threat-protection/microsoft-defender-atp/investigate-user.md index 886c34c0f8..69493fe5ec 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/investigate-user.md +++ b/windows/security/threat-protection/microsoft-defender-atp/investigate-user.md @@ -53,14 +53,14 @@ The user entity tile provides details about the user such as when the user was f If you have enabled the Azure ATP feature and there are alerts related to the user, you can click on the link that will take you to the Azure ATP page where more information about the alerts are provided. The Azure ATP tile also provides details such as the last AD site, total group memberships, and login failure associated with the user. >[!NOTE] ->You'll need to enable the integration on both Azure ATP and Microsoft Defender ATP to use this feature. In Microsoft Defender ATP, you can enable this feature in advanced features. For more information on how to enable advanced features, see [Turn on advanced features](advanced-features-windows-defender-advanced-threat-protection.md). +>You'll need to enable the integration on both Azure ATP and Microsoft Defender ATP to use this feature. In Microsoft Defender ATP, you can enable this feature in advanced features. For more information on how to enable advanced features, see [Turn on advanced features](advanced-features.md). **Logged on machines**
You'll also see a list of the machines that the user logged on to, and can expand these to see details of the logon events on each machine. ## Alerts related to this user -This section provides a list of alerts that are associated with the user account. This list is a filtered view of the [Alert queue](alerts-queue-windows-defender-advanced-threat-protection.md), and shows alerts where the user context is the selected user account, the date when the last activity was detected, a short description of the alert, the machine associated with the alert, the alert's severity, the alert's status in the queue, and who is assigned the alert. +This section provides a list of alerts that are associated with the user account. This list is a filtered view of the [Alert queue](alerts-queue.md), and shows alerts where the user context is the selected user account, the date when the last activity was detected, a short description of the alert, the machine associated with the alert, the alert's severity, the alert's status in the queue, and who is assigned the alert. ## Observed in organization This section allows you to specify a date range to see a list of machines where this user was observed logged on to, and the most frequent and least frequent logged on user account on each of these machines. @@ -85,11 +85,11 @@ You can filter the results by the following time periods: - 6 months ## Related topics -- [View and organize the Microsoft Defender Advanced Threat Protection Alerts queue ](alerts-queue-windows-defender-advanced-threat-protection.md) -- [Manage Microsoft Defender Advanced Threat Protection alerts](manage-alerts-windows-defender-advanced-threat-protection.md) -- [Investigate Microsoft Defender Advanced Threat Protection alerts](investigate-alerts-windows-defender-advanced-threat-protection.md) -- [Investigate a file associated with a Microsoft Defender ATP alert](investigate-files-windows-defender-advanced-threat-protection.md) -- [Investigate machines in the Microsoft Defender ATP Machines list](investigate-machines-windows-defender-advanced-threat-protection.md) -- [Investigate an IP address associated with a Microsoft Defender ATP alert](investigate-ip-windows-defender-advanced-threat-protection.md) -- [Investigate a domain associated with a Microsoft Defender ATP alert](investigate-domain-windows-defender-advanced-threat-protection.md) +- [View and organize the Microsoft Defender Advanced Threat Protection Alerts queue ](alerts-queue.md) +- [Manage Microsoft Defender Advanced Threat Protection alerts](manage-alerts.md) +- [Investigate Microsoft Defender Advanced Threat Protection alerts](investigate-alerts.md) +- [Investigate a file associated with a Microsoft Defender ATP alert](investigate-files.md) +- [Investigate machines in the Microsoft Defender ATP Machines list](investigate-machines.md) +- [Investigate an IP address associated with a Microsoft Defender ATP alert](investigate-ip.md) +- [Investigate a domain associated with a Microsoft Defender ATP alert](investigate-domain.md) diff --git a/windows/security/threat-protection/microsoft-defender-atp/is-domain-seen-in-org.md b/windows/security/threat-protection/microsoft-defender-atp/is-domain-seen-in-org.md index 6ff1bae6e0..47ad22f715 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/is-domain-seen-in-org.md +++ b/windows/security/threat-protection/microsoft-defender-atp/is-domain-seen-in-org.md @@ -36,7 +36,7 @@ Delegated (work or school account) | URL.Read.All | 'Read URLs' >[!Note] > When obtaining a token using user credentials: ->- The user needs to have at least the following role permission: 'View Data' (See [Create and manage roles](user-roles-windows-defender-advanced-threat-protection.md) for more information) +>- The user needs to have at least the following role permission: 'View Data' (See [Create and manage roles](user-roles.md) for more information) ## HTTP request ``` diff --git a/windows/security/threat-protection/microsoft-defender-atp/is-ip-seen-org.md b/windows/security/threat-protection/microsoft-defender-atp/is-ip-seen-org.md index 08e8c07149..34b518cee9 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/is-ip-seen-org.md +++ b/windows/security/threat-protection/microsoft-defender-atp/is-ip-seen-org.md @@ -37,7 +37,7 @@ Delegated (work or school account) | Ip.Read.All | 'Read IP address profiles' >[!Note] > When obtaining a token using user credentials: ->- The user needs to have at least the following role permission: 'View Data' (See [Create and manage roles](user-roles-windows-defender-advanced-threat-protection.md) for more information) +>- The user needs to have at least the following role permission: 'View Data' (See [Create and manage roles](user-roles.md) for more information) ## HTTP request ``` diff --git a/windows/security/threat-protection/microsoft-defender-atp/isolate-machine.md b/windows/security/threat-protection/microsoft-defender-atp/isolate-machine.md index 1379df6c30..a83da49e7f 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/isolate-machine.md +++ b/windows/security/threat-protection/microsoft-defender-atp/isolate-machine.md @@ -37,8 +37,8 @@ Delegated (work or school account) | Machine.Isolate | 'Isolate machine' >[!Note] > When obtaining a token using user credentials: ->- The user needs to have at least the following role permission: 'Active remediation actions' (See [Create and manage roles](user-roles-windows-defender-advanced-threat-protection.md) for more information) ->- The user needs to have access to the machine, based on machine group settings (See [Create and manage machine groups](machine-groups-windows-defender-advanced-threat-protection.md) for more information) +>- The user needs to have at least the following role permission: 'Active remediation actions' (See [Create and manage roles](user-roles.md) for more information) +>- The user needs to have access to the machine, based on machine group settings (See [Create and manage machine groups](machine-groups.md) for more information) ## HTTP request @@ -63,7 +63,7 @@ IsolationType | String | Type of the isolation. Allowed values are: 'Full' or 'S **IsolationType** controls the type of isolation to perform and can be one of the following: - Full – Full isolation -- Selective – Restrict only limited set of applications from accessing the network (see [Isolate machines from the network](respond-machine-alerts-windows-defender-advanced-threat-protection.md#isolate-machines-from-the-network) for more details) +- Selective – Restrict only limited set of applications from accessing the network (see [Isolate machines from the network](respond-machine-alerts.md#isolate-machines-from-the-network) for more details) ## Response diff --git a/windows/security/threat-protection/microsoft-defender-atp/licensing.md b/windows/security/threat-protection/microsoft-defender-atp/licensing.md index 1011ef2e74..c2fe9ab390 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/licensing.md +++ b/windows/security/threat-protection/microsoft-defender-atp/licensing.md @@ -108,7 +108,7 @@ When accessing [Microsoft Defender Security Center](https://SecurityCenter.Windo 6. You are almost done. Before you can start using Microsoft Defender ATP you'll need to: - - [Onboard Windows 10 machines](configure-endpoints-windows-defender-advanced-threat-protection.md) + - [Onboard Windows 10 machines](configure-endpoints.md) - Run detection test (optional) @@ -123,5 +123,5 @@ When accessing [Microsoft Defender Security Center](https://SecurityCenter.Windo ![Image of onboard machines](images\atp-onboard-endpoints-WDATP-portal.png) ## Related topics -- [Onboard machines to the Microsoft Defender Advanced Threat Protection service](onboard-configure-windows-defender-advanced-threat-protection.md) -- [Troubleshoot onboarding process and portal access issues](troubleshoot-onboarding-error-messages-windows-defender-advanced-threat-protection.md) +- [Onboard machines to the Microsoft Defender Advanced Threat Protection service](onboard-configure.md) +- [Troubleshoot onboarding process and portal access issues](troubleshoot-onboarding-error-messages.md) diff --git a/windows/security/threat-protection/microsoft-defender-atp/machine-groups.md b/windows/security/threat-protection/microsoft-defender-atp/machine-groups.md index a932128539..bdb50d0354 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/machine-groups.md +++ b/windows/security/threat-protection/microsoft-defender-atp/machine-groups.md @@ -30,14 +30,14 @@ ms.topic: article In an enterprise scenario, security operation teams are typically assigned a set of machines. These machines are grouped together based on a set of attributes such as their domains, computer names, or designated tags. In Microsoft Defender ATP, you can create machine groups and use them to: -- Limit access to related alerts and data to specific Azure AD user groups with [assigned RBAC roles](rbac-windows-defender-advanced-threat-protection.md) +- Limit access to related alerts and data to specific Azure AD user groups with [assigned RBAC roles](rbac.md) - Configure different auto-remediation settings for different sets of machines >[!TIP] > For a comprehensive look into RBAC application, read: [Is your SOC running flat with RBAC](https://techcommunity.microsoft.com/t5/Windows-Defender-ATP/Is-your-SOC-running-flat-with-limited-RBAC/ba-p/320015). As part of the process of creating a machine group, you'll: -- Set the automated remediation level for that group. For more information on remediation levels, see [Use Automated investigation to investigate and remediate threats](automated-investigations-windows-defender-advanced-threat-protection.md). +- Set the automated remediation level for that group. For more information on remediation levels, see [Use Automated investigation to investigate and remediate threats](automated-investigations.md). - Specify the matching rule that determines which machine group belongs to the group based on the machine name, domain, tags, and OS platform. If a machine is also matched to other groups, it is added only to the highest ranked machine group. - Select the Azure AD user group that should have access to the machine group. - Rank the machine group relative to other groups after it is created. @@ -63,7 +63,7 @@ As part of the process of creating a machine group, you'll: - **Full - remediate threats automatically** >[!NOTE] - > For more information on automation levels, see [Understand the Automated investigation flow](automated-investigations-windows-defender-advanced-threat-protection.md#understand-the-automated-investigation-flow). + > For more information on automation levels, see [Understand the Automated investigation flow](automated-investigations.md#understand-the-automated-investigation-flow). - **Description** - **Members** @@ -96,5 +96,5 @@ Machines that are not matched to any groups are added to Ungrouped machines (def ## Related topic -- [Manage portal access using role-based based access control](rbac-windows-defender-advanced-threat-protection.md) -- [Get list of tenant machine groups using Graph API](get-machinegroups-collection-windows-defender-advanced-threat-protection.md) \ No newline at end of file +- [Manage portal access using role-based based access control](rbac.md) +- [Get list of tenant machine groups using Graph API](get-machinegroups-collection.md) \ No newline at end of file diff --git a/windows/security/threat-protection/microsoft-defender-atp/machine-reports.md b/windows/security/threat-protection/microsoft-defender-atp/machine-reports.md index 77885b5540..911ac4adb9 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/machine-reports.md +++ b/windows/security/threat-protection/microsoft-defender-atp/machine-reports.md @@ -81,4 +81,4 @@ For example, to show data about Windows 10 machines with Active sensor health st ## Related topic -- [Threat protection report ](threat-protection-reports-windows-defender-advanced-threat-protection.md) \ No newline at end of file +- [Threat protection report ](threat-protection-reports.md) \ No newline at end of file diff --git a/windows/security/threat-protection/microsoft-defender-atp/machine-tags.md b/windows/security/threat-protection/microsoft-defender-atp/machine-tags.md index 61d6e8a22e..624d4c2542 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/machine-tags.md +++ b/windows/security/threat-protection/microsoft-defender-atp/machine-tags.md @@ -20,9 +20,9 @@ ms.topic: article # Create and manage machine tags Add tags on machines to create a logical group affiliation. Machine group affiliation can represent geographic location, specific activity, importance level and others. -You can create machine groups in the context of role-based access (RBAC) to control who can take specific action or who can see information on a specific machine group or groups by assigning the machine group to a user group. For more information, see [Manage portal access using role-based access control](rbac-windows-defender-advanced-threat-protection.md). +You can create machine groups in the context of role-based access (RBAC) to control who can take specific action or who can see information on a specific machine group or groups by assigning the machine group to a user group. For more information, see [Manage portal access using role-based access control](rbac.md). -You can also use machine groups to assign specific remediation levels to apply during automated investigations. For more information, see [Create and manage machine groups](machine-groups-windows-defender-advanced-threat-protection.md). +You can also use machine groups to assign specific remediation levels to apply during automated investigations. For more information, see [Create and manage machine groups](machine-groups.md). In an investigation, you can filter the Machines list to just specific machine groups by using the Groups filter. diff --git a/windows/security/threat-protection/microsoft-defender-atp/machineactionsnote.md b/windows/security/threat-protection/microsoft-defender-atp/machineactionsnote.md index ef5a31ec33..2e235e713e 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/machineactionsnote.md +++ b/windows/security/threat-protection/microsoft-defender-atp/machineactionsnote.md @@ -3,4 +3,4 @@ ms.date: 08/28/2017 author: zavidor --- >[!Note] -> This page focuses on performing a machine action via API. See [take response actions on a machine](respond-machine-alerts-windows-defender-advanced-threat-protection.md) for more information about response actions functionality via Microsoft Defender ATP. +> This page focuses on performing a machine action via API. See [take response actions on a machine](respond-machine-alerts.md) for more information about response actions functionality via Microsoft Defender ATP. diff --git a/windows/security/threat-protection/microsoft-defender-atp/machines-view-overview.md b/windows/security/threat-protection/microsoft-defender-atp/machines-view-overview.md index 73f5d50ed2..657eac1d96 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/machines-view-overview.md +++ b/windows/security/threat-protection/microsoft-defender-atp/machines-view-overview.md @@ -74,7 +74,7 @@ Filter the list to view specific machines grouped together by the following mach - No sensor data - Impaired communications - For more information on how to address issues on misconfigured machines see, [Fix unhealthy sensors](fix-unhealhty-sensors-windows-defender-advanced-threat-protection.md). + For more information on how to address issues on misconfigured machines see, [Fix unhealthy sensors](fix-unhealhty-sensors.md). - **Inactive** – Machines that have completely stopped sending signals for more than 7 days. @@ -85,13 +85,13 @@ Filter the list to view specific machines that are well configured or require at - **Well configured** - Machines have the Windows Defender security controls well configured. - **Requires attention** - Machines where improvements can be made to increase the overall security posture of your organization. -For more information, see [View the Secure Score dashboard](secure-score-dashboard-windows-defender-advanced-threat-protection.md). +For more information, see [View the Secure Score dashboard](secure-score-dashboard.md). ### Tags You can filter the list based on the grouping and tagging that you've added to individual machines. ## Related topics -- [Investigate machines in the Microsoft Defender ATP Machines list](investigate-machines-windows-defender-advanced-threat-protection.md) +- [Investigate machines in the Microsoft Defender ATP Machines list](investigate-machines.md) diff --git a/windows/security/threat-protection/microsoft-defender-atp/manage-alerts.md b/windows/security/threat-protection/microsoft-defender-atp/manage-alerts.md index 6aafe49de3..4765a373dd 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/manage-alerts.md +++ b/windows/security/threat-protection/microsoft-defender-atp/manage-alerts.md @@ -92,7 +92,7 @@ Create custom rules to control when alerts are suppressed, or resolved. You can 2. The list of suppression rules shows all the rules that users in your organization have created. -For more information on managing suppression rules, see [Manage suppression rules](manage-suppression-rules-windows-defender-advanced-threat-protection.md) +For more information on managing suppression rules, see [Manage suppression rules](manage-suppression-rules.md) ## Change the status of an alert @@ -117,11 +117,11 @@ Added comments instantly appear on the pane. ## Related topics -- [Manage suppression rules](manage-suppression-rules-windows-defender-advanced-threat-protection.md) -- [View and organize the Microsoft Defender Advanced Threat Protection Alerts queue ](alerts-queue-windows-defender-advanced-threat-protection.md) -- [Investigate Microsoft Defender Advanced Threat Protection alerts](investigate-alerts-windows-defender-advanced-threat-protection.md) -- [Investigate a file associated with a Microsoft Defender ATP alert](investigate-files-windows-defender-advanced-threat-protection.md) -- [Investigate machines in the Microsoft Defender ATP Machines list](investigate-machines-windows-defender-advanced-threat-protection.md) -- [Investigate an IP address associated with a Microsoft Defender ATP alert](investigate-ip-windows-defender-advanced-threat-protection.md) -- [Investigate a domain associated with a Microsoft Defender ATP alert](investigate-domain-windows-defender-advanced-threat-protection.md) -- [Investigate a user account in Microsoft Defender ATP](investigate-user-windows-defender-advanced-threat-protection.md) +- [Manage suppression rules](manage-suppression-rules.md) +- [View and organize the Microsoft Defender Advanced Threat Protection Alerts queue ](alerts-queue.md) +- [Investigate Microsoft Defender Advanced Threat Protection alerts](investigate-alerts.md) +- [Investigate a file associated with a Microsoft Defender ATP alert](investigate-files.md) +- [Investigate machines in the Microsoft Defender ATP Machines list](investigate-machines.md) +- [Investigate an IP address associated with a Microsoft Defender ATP alert](investigate-ip.md) +- [Investigate a domain associated with a Microsoft Defender ATP alert](investigate-domain.md) +- [Investigate a user account in Microsoft Defender ATP](investigate-user.md) diff --git a/windows/security/threat-protection/microsoft-defender-atp/manage-allowed-blocked-list.md b/windows/security/threat-protection/microsoft-defender-atp/manage-allowed-blocked-list.md index dc313000a3..c852df752c 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/manage-allowed-blocked-list.md +++ b/windows/security/threat-protection/microsoft-defender-atp/manage-allowed-blocked-list.md @@ -76,7 +76,7 @@ Download the sample CSV to know the supported column attributes. ## Related topics -- [Manage automation allowed/blocked lists](manage-automation-allowed-blocked-list-windows-defender-advanced-threat-protection.md) +- [Manage automation allowed/blocked lists](manage-automation-allowed-blocked-list.md) diff --git a/windows/security/threat-protection/microsoft-defender-atp/manage-auto-investigation.md b/windows/security/threat-protection/microsoft-defender-atp/manage-auto-investigation.md index 92c91b1b6f..24817cb48c 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/manage-auto-investigation.md +++ b/windows/security/threat-protection/microsoft-defender-atp/manage-auto-investigation.md @@ -196,4 +196,4 @@ From the panel, you can click on the Open investigation page link to see the inv You also have the option of selecting multiple investigations to approve or reject actions on multiple investigations. ## Related topic -- [Investigate Microsoft Defender ATP alerts](investigate-alerts-windows-defender-advanced-threat-protection.md) +- [Investigate Microsoft Defender ATP alerts](investigate-alerts.md) diff --git a/windows/security/threat-protection/microsoft-defender-atp/manage-automation-allowed-blocked-list.md b/windows/security/threat-protection/microsoft-defender-atp/manage-automation-allowed-blocked-list.md index 4960840dca..357563de57 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/manage-automation-allowed-blocked-list.md +++ b/windows/security/threat-protection/microsoft-defender-atp/manage-automation-allowed-blocked-list.md @@ -66,6 +66,6 @@ You can define the conditions for when entities are identified as malicious or s ## Related topics -- [Manage automation file uploads](manage-automation-file-uploads-windows-defender-advanced-threat-protection.md) -- [Manage allowed/blocked lists](manage-allowed-blocked-list-windows-defender-advanced-threat-protection.md) -- [Manage automation folder exclusions](manage-automation-folder-exclusions-windows-defender-advanced-threat-protection.md) +- [Manage automation file uploads](manage-automation-file-uploads.md) +- [Manage allowed/blocked lists](manage-allowed-blocked-list.md) +- [Manage automation folder exclusions](manage-automation-folder-exclusions.md) diff --git a/windows/security/threat-protection/microsoft-defender-atp/manage-automation-file-uploads.md b/windows/security/threat-protection/microsoft-defender-atp/manage-automation-file-uploads.md index baf0ac27bb..3a6a4864dc 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/manage-automation-file-uploads.md +++ b/windows/security/threat-protection/microsoft-defender-atp/manage-automation-file-uploads.md @@ -46,5 +46,5 @@ For example, if you add *exe* and *bat* as file or attachment extension names, t ## Related topics -- [Manage automation allowed/blocked lists](manage-automation-allowed-blocked-list-windows-defender-advanced-threat-protection.md) -- [Manage automation folder exclusions](manage-automation-folder-exclusions-windows-defender-advanced-threat-protection.md) \ No newline at end of file +- [Manage automation allowed/blocked lists](manage-automation-allowed-blocked-list.md) +- [Manage automation folder exclusions](manage-automation-folder-exclusions.md) \ No newline at end of file diff --git a/windows/security/threat-protection/microsoft-defender-atp/manage-automation-folder-exclusions.md b/windows/security/threat-protection/microsoft-defender-atp/manage-automation-folder-exclusions.md index e63a8c6207..e6b7c8bd5e 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/manage-automation-folder-exclusions.md +++ b/windows/security/threat-protection/microsoft-defender-atp/manage-automation-folder-exclusions.md @@ -76,5 +76,5 @@ You can specify the file names that you want to be excluded in a specific direct ## Related topics -- [Manage automation allowed/blocked lists](manage-automation-allowed-blocked-list-windows-defender-advanced-threat-protection.md) -- [Manage automation file uploads](manage-automation-file-uploads-windows-defender-advanced-threat-protection.md) +- [Manage automation allowed/blocked lists](manage-automation-allowed-blocked-list.md) +- [Manage automation file uploads](manage-automation-file-uploads.md) diff --git a/windows/security/threat-protection/microsoft-defender-atp/manage-edr.md b/windows/security/threat-protection/microsoft-defender-atp/manage-edr.md index 84835dc6f5..916bbb2776 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/manage-edr.md +++ b/windows/security/threat-protection/microsoft-defender-atp/manage-edr.md @@ -27,6 +27,6 @@ Manage the alerts queue, investigate machines in the machines list, take respons Topic | Description :---|:--- [Alerts queue](alerts-queue-endpoint-detection-response.md)| View the alerts surfaced in Microsoft Defender Security Center. -[Machines list](machines-view-overview-windows-defender-advanced-threat-protection.md) | Learn how you can view and manage the machines list, manage machine groups, and investigate machine related alerts. -[Take response actions](response-actions-windows-defender-advanced-threat-protection.md)| Take response actions on machines and files to quickly respond to detected attacks and contain threats. -[Query data using advanced hunting](advanced-hunting-windows-defender-advanced-threat-protection.md)| Proactively hunt for possible threats across your organization using a powerful search and query tool. \ No newline at end of file +[Machines list](machines-view-overview.md) | Learn how you can view and manage the machines list, manage machine groups, and investigate machine related alerts. +[Take response actions](response-actions.md)| Take response actions on machines and files to quickly respond to detected attacks and contain threats. +[Query data using advanced hunting](advanced-hunting.md)| Proactively hunt for possible threats across your organization using a powerful search and query tool. \ No newline at end of file diff --git a/windows/security/threat-protection/microsoft-defender-atp/manage-incidents.md b/windows/security/threat-protection/microsoft-defender-atp/manage-incidents.md index d03aec8131..31fb4bb075 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/manage-incidents.md +++ b/windows/security/threat-protection/microsoft-defender-atp/manage-incidents.md @@ -60,4 +60,4 @@ Added comments instantly appear on the pane. ## Related topics - [Incidents queue](incidents-queue.md) - [View and organize the Incidents queue](view-incidents-queue.md) -- [Investigate incidents](investigate-incidents-windows-defender-advanced-threat-protection.md) +- [Investigate incidents](investigate-incidents.md) diff --git a/windows/security/threat-protection/microsoft-defender-atp/manage-suppression-rules.md b/windows/security/threat-protection/microsoft-defender-atp/manage-suppression-rules.md index 2e6bbe1507..c0d382b786 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/manage-suppression-rules.md +++ b/windows/security/threat-protection/microsoft-defender-atp/manage-suppression-rules.md @@ -26,7 +26,7 @@ ms.date: 04/24/2018 >Want to experience Microsoft Defender ATP? [Sign up for a free trial.](https://www.microsoft.com/en-us/WindowsForBusiness/windows-atp?ocid=docs-wdatp-suppressionrules-abovefoldlink) -There might be scenarios where you need to suppress alerts from appearing in the portal. You can create suppression rules for specific alerts that are known to be innocuous such as known tools or processes in your organization. For more information on how to suppress alerts, see [Suppress alerts](manage-alerts-windows-defender-advanced-threat-protection.md). +There might be scenarios where you need to suppress alerts from appearing in the portal. You can create suppression rules for specific alerts that are known to be innocuous such as known tools or processes in your organization. For more information on how to suppress alerts, see [Suppress alerts](manage-alerts.md). You can view a list of all the suppression rules and manage them in one place. You can also turn an alert suppression rule on or off. @@ -46,4 +46,4 @@ You can view a list of all the suppression rules and manage them in one place. Y ## Related topics -- [Manage alerts](manage-alerts-windows-defender-advanced-threat-protection.md) \ No newline at end of file +- [Manage alerts](manage-alerts.md) \ No newline at end of file diff --git a/windows/security/threat-protection/microsoft-defender-atp/management-apis.md b/windows/security/threat-protection/microsoft-defender-atp/management-apis.md index fd37543f72..a4fe146a16 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/management-apis.md +++ b/windows/security/threat-protection/microsoft-defender-atp/management-apis.md @@ -59,11 +59,11 @@ Managed security service provider | Get a quick overview on managed security ser ## Related topics -- [Onboard machines](onboard-configure-windows-defender-advanced-threat-protection.md) -- [Enable the custom threat intelligence application](enable-custom-ti-windows-defender-advanced-threat-protection.md) +- [Onboard machines](onboard-configure.md) +- [Enable the custom threat intelligence application](enable-custom-ti.md) - [Microsoft Defender ATP Public API](use-apis.md) -- [Pull alerts to your SIEM tools](configure-siem-windows-defender-advanced-threat-protection.md) -- [Create and build Power BI reports using Microsoft Defender ATP data](powerbi-reports-windows-defender-advanced-threat-protection.md) -- [Role-based access control](rbac-windows-defender-advanced-threat-protection.md) +- [Pull alerts to your SIEM tools](configure-siem.md) +- [Create and build Power BI reports using Microsoft Defender ATP data](powerbi-reports.md) +- [Role-based access control](rbac.md) diff --git a/windows/security/threat-protection/microsoft-defender-atp/microsoft-defender-advanced-threat-protection.md b/windows/security/threat-protection/microsoft-defender-atp/microsoft-defender-advanced-threat-protection.md index 1e661e11f1..8efb9d7b22 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/microsoft-defender-advanced-threat-protection.md +++ b/windows/security/threat-protection/microsoft-defender-atp/microsoft-defender-advanced-threat-protection.md @@ -90,12 +90,12 @@ You can also do advanced hunting to create custom threat intelligence and use a -**[Automated investigation and remediation](automated-investigations-windows-defender-advanced-threat-protection.md)**
+**[Automated investigation and remediation](automated-investigations.md)**
In conjunction with being able to quickly respond to advanced attacks, Microsoft Defender ATP offers automatic investigation and remediation capabilities that help reduce the volume of alerts in minutes at scale. -**[Secure score](overview-secure-score-windows-defender-advanced-threat-protection.md)**
+**[Secure score](overview-secure-score.md)**
Microsoft Defender ATP includes a secure score to help you dynamically assess the security state of your enterprise network, identify unprotected systems, and take recommended actions to improve the overall security of your organization. diff --git a/windows/security/threat-protection/microsoft-defender-atp/minimum-requirements.md b/windows/security/threat-protection/microsoft-defender-atp/minimum-requirements.md index 5a4a309e6f..b9112f5c8c 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/minimum-requirements.md +++ b/windows/security/threat-protection/microsoft-defender-atp/minimum-requirements.md @@ -46,5 +46,5 @@ For more information about licensing requirements for Microsoft Defender ATP pla ## Related topic -- [Validate licensing and complete setup](licensing-windows-defender-advanced-threat-protection.md) -- [Onboard machines](onboard-configure-windows-defender-advanced-threat-protection.md) +- [Validate licensing and complete setup](licensing.md) +- [Onboard machines](onboard-configure.md) diff --git a/windows/security/threat-protection/microsoft-defender-atp/mssp-support.md b/windows/security/threat-protection/microsoft-defender-atp/mssp-support.md index 71bf5122da..07d8cb0e6e 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/mssp-support.md +++ b/windows/security/threat-protection/microsoft-defender-atp/mssp-support.md @@ -41,7 +41,7 @@ Microsoft Defender ATP adds support for this scenario and to allow MSSPs to take ## Related topic -- [Configure managed security service provider integration](configure-mssp-support-windows-defender-advanced-threat-protection.md) +- [Configure managed security service provider integration](configure-mssp-support.md) diff --git a/windows/security/threat-protection/microsoft-defender-atp/offboard-machine-api.md b/windows/security/threat-protection/microsoft-defender-atp/offboard-machine-api.md index d2eff9b682..738b4d31ee 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/offboard-machine-api.md +++ b/windows/security/threat-protection/microsoft-defender-atp/offboard-machine-api.md @@ -37,7 +37,7 @@ Delegated (work or school account) | Machine.Offboard | 'Offboard machine' >[!Note] > When obtaining a token using user credentials: >- The user needs to 'Global Admin' AD role ->- The user needs to have access to the machine, based on machine group settings (See [Create and manage machine groups](machine-groups-windows-defender-advanced-threat-protection.md) for more information) +>- The user needs to have access to the machine, based on machine group settings (See [Create and manage machine groups](machine-groups.md) for more information) ## HTTP request ``` diff --git a/windows/security/threat-protection/microsoft-defender-atp/offboard-machines.md b/windows/security/threat-protection/microsoft-defender-atp/offboard-machines.md index a22fafe295..68ca47d378 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/offboard-machines.md +++ b/windows/security/threat-protection/microsoft-defender-atp/offboard-machines.md @@ -34,14 +34,14 @@ ms.date: 04/24/2018 Follow the corresponding instructions depending on your preferred deployment method. ## Offboard Windows 10 machines - - [Offboard machines using a local script](configure-endpoints-script-windows-defender-advanced-threat-protection.md#offboard-machines-using-a-local-script) - - [Offboard machines using Group Policy](configure-endpoints-gp-windows-defender-advanced-threat-protection.md#offboard-machines-using-group-policy) - - [Offboard machines using System Center Configuration Manager](configure-endpoints-sccm-windows-defender-advanced-threat-protection.md#offboard-machines-using-system-center-configuration-manager) - - [Offboard machines using Mobile Device Management tools](configure-endpoints-mdm-windows-defender-advanced-threat-protection.md#offboard-and-monitor-machines-using-mobile-device-management-tools) + - [Offboard machines using a local script](configure-endpoints-script.md#offboard-machines-using-a-local-script) + - [Offboard machines using Group Policy](configure-endpoints-gp.md#offboard-machines-using-group-policy) + - [Offboard machines using System Center Configuration Manager](configure-endpoints-sccm.md#offboard-machines-using-system-center-configuration-manager) + - [Offboard machines using Mobile Device Management tools](configure-endpoints-mdm.md#offboard-and-monitor-machines-using-mobile-device-management-tools) ## Offboard Servers - - [Offboard servers](configure-server-endpoints-windows-defender-advanced-threat-protection.md#offboard-servers) + - [Offboard servers](configure-server-endpoints.md#offboard-servers) ## Offboard non-Windows machines - - [Offboard non-Windows machines](configure-endpoints-non-windows-windows-defender-advanced-threat-protection.md#offboard-non-windows-machines) + - [Offboard non-Windows machines](configure-endpoints-non-windows.md#offboard-non-windows-machines) diff --git a/windows/security/threat-protection/microsoft-defender-atp/onboard-configure.md b/windows/security/threat-protection/microsoft-defender-atp/onboard-configure.md index 61dc191dc5..7528d22790 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/onboard-configure.md +++ b/windows/security/threat-protection/microsoft-defender-atp/onboard-configure.md @@ -78,7 +78,7 @@ When you run the onboarding wizard for the first time, you must choose where you > [!NOTE] > - You cannot change your data storage location after the first-time setup. -> - Review the [Microsoft Defender ATP data storage and privacy](data-storage-privacy-windows-defender-advanced-threat-protection.md) for more information on where and how Microsoft stores your data. +> - Review the [Microsoft Defender ATP data storage and privacy](data-storage-privacy.md) for more information on where and how Microsoft stores your data. ### Diagnostic data settings @@ -134,7 +134,7 @@ Internet connectivity on machines is required either directly or through proxy. The Microsoft Defender ATP sensor can utilize a daily average bandwidth of 5MB to communicate with the Microsoft Defender ATP cloud service and report cyber data. One-off activities such as file uploads and investigation package collection are not included in this daily average bandwidth. -For more information on additional proxy configuration settings see, [Configure machine proxy and Internet connectivity settings](configure-proxy-internet-windows-defender-advanced-threat-protection.md) . +For more information on additional proxy configuration settings see, [Configure machine proxy and Internet connectivity settings](configure-proxy-internet.md) . Before you onboard machines, the diagnostic data service must be enabled. The service is enabled by default in Windows 10. @@ -146,7 +146,7 @@ You must configure Security intelligence updates on the Microsoft Defender ATP m When Windows Defender Antivirus is not the active antimalware in your organization and you use the Microsoft Defender ATP service, Windows Defender Antivirus goes on passive mode. If your organization has disabled Windows Defender Antivirus through group policy or other methods, machines that are onboarded to Microsoft Defender ATP must be excluded from this group policy. -If you are onboarding servers and Windows Defender Antivirus is not the active antimalware on your servers, you shouldn't uninstall Windows Defender Antivirus. You'll need to configure it to run on passive mode. For more information, see [Onboard servers](configure-server-endpoints-windows-defender-advanced-threat-protection.md). +If you are onboarding servers and Windows Defender Antivirus is not the active antimalware on your servers, you shouldn't uninstall Windows Defender Antivirus. You'll need to configure it to run on passive mode. For more information, see [Onboard servers](configure-server-endpoints.md). For more information, see [Windows Defender Antivirus compatibility](../windows-defender-antivirus/windows-defender-antivirus-compatibility.md). @@ -154,18 +154,18 @@ For more information, see [Windows Defender Antivirus compatibility](../windows- ## Windows Defender Antivirus Early Launch Antimalware (ELAM) driver is enabled If you're running Windows Defender Antivirus as the primary antimalware product on your machines, the Microsoft Defender ATP agent will successfully onboard. -If you're running a third-party antimalware client and use Mobile Device Management solutions or System Center Configuration Manager (current branch) version 1606, you'll need to ensure that the Windows Defender Antivirus ELAM driver is enabled. For more information, see [Ensure that Windows Defender Antivirus is not disabled by policy](troubleshoot-onboarding-windows-defender-advanced-threat-protection.md#ensure-that-windows-defender-antivirus-is-not-disabled-by-a-policy). +If you're running a third-party antimalware client and use Mobile Device Management solutions or System Center Configuration Manager (current branch) version 1606, you'll need to ensure that the Windows Defender Antivirus ELAM driver is enabled. For more information, see [Ensure that Windows Defender Antivirus is not disabled by policy](troubleshoot-onboarding.md#ensure-that-windows-defender-antivirus-is-not-disabled-by-a-policy). ## In this section Topic | Description :---|:--- -[Onboard previous versions of Windows](onboard-downlevel-windows-defender-advanced-threat-protection.md)| Onboard Windows 7 and Windows 8.1 machines to Microsoft Defender ATP. -[Onboard Windows 10 machines](configure-endpoints-windows-defender-advanced-threat-protection.md) | You'll need to onboard machines for it to report to the Microsoft Defender ATP service. Learn about the tools and methods you can use to configure machines in your enterprise. -[Onboard servers](configure-server-endpoints-windows-defender-advanced-threat-protection.md) | Onboard Windows Server 2012 R2 and Windows Server 2016 to Microsoft Defender ATP -[Onboard non-Windows machines](configure-endpoints-non-windows-windows-defender-advanced-threat-protection.md) | Microsoft Defender ATP provides a centralized security operations experience for Windows as well as non-Windows platforms. You'll be able to see alerts from various supported operating systems (OS) in Microsoft Defender Security Center and better protect your organization's network. This experience leverages on a third-party security products' sensor data. -[Run a detection test on a newly onboarded machine](run-detection-test-windows-defender-advanced-threat-protection.md) | Run a script on a newly onboarded machine to verify that it is properly reporting to the Microsoft Defender ATP service. -[Configure proxy and Internet settings](configure-proxy-internet-windows-defender-advanced-threat-protection.md)| Enable communication with the Microsoft Defender ATP cloud service by configuring the proxy and Internet connectivity settings. -[Troubleshoot onboarding issues](troubleshoot-onboarding-windows-defender-advanced-threat-protection.md) | Learn about resolving issues that might arise during onboarding. +[Onboard previous versions of Windows](onboard-downlevel.md)| Onboard Windows 7 and Windows 8.1 machines to Microsoft Defender ATP. +[Onboard Windows 10 machines](configure-endpoints.md) | You'll need to onboard machines for it to report to the Microsoft Defender ATP service. Learn about the tools and methods you can use to configure machines in your enterprise. +[Onboard servers](configure-server-endpoints.md) | Onboard Windows Server 2012 R2 and Windows Server 2016 to Microsoft Defender ATP +[Onboard non-Windows machines](configure-endpoints-non-windows.md) | Microsoft Defender ATP provides a centralized security operations experience for Windows as well as non-Windows platforms. You'll be able to see alerts from various supported operating systems (OS) in Microsoft Defender Security Center and better protect your organization's network. This experience leverages on a third-party security products' sensor data. +[Run a detection test on a newly onboarded machine](run-detection-test.md) | Run a script on a newly onboarded machine to verify that it is properly reporting to the Microsoft Defender ATP service. +[Configure proxy and Internet settings](configure-proxy-internet.md)| Enable communication with the Microsoft Defender ATP cloud service by configuring the proxy and Internet connectivity settings. +[Troubleshoot onboarding issues](troubleshoot-onboarding.md) | Learn about resolving issues that might arise during onboarding. >Want to experience Microsoft Defender ATP? [Sign up for a free trial.](https://www.microsoft.com/en-us/WindowsForBusiness/windows-atp?ocid=docs-wdatp-onboardconfigure-belowfoldlink) diff --git a/windows/security/threat-protection/microsoft-defender-atp/onboard-downlevel.md b/windows/security/threat-protection/microsoft-defender-atp/onboard-downlevel.md index 140c14d487..9e5d1c75b1 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/onboard-downlevel.md +++ b/windows/security/threat-protection/microsoft-defender-atp/onboard-downlevel.md @@ -33,14 +33,14 @@ ms.topic: article Microsoft Defender ATP extends support to include down-level operating systems, providing advanced attack detection and investigation capabilities on supported Windows versions. >[!IMPORTANT] ->This capability is currently in preview. You'll need to turn on the preview features to take advantage of this feature. For more information, see [Preview features](preview-windows-defender-advanced-threat-protection.md). +>This capability is currently in preview. You'll need to turn on the preview features to take advantage of this feature. For more information, see [Preview features](preview.md). To onboard down-level Windows client endpoints to Microsoft Defender ATP, you'll need to: - Configure and update System Center Endpoint Protection clients. - Install and configure Microsoft Monitoring Agent (MMA) to report sensor data to Microsoft Defender ATP as instructed below. >[!TIP] -> After onboarding the machine, you can choose to run a detection test to verify that it is properly onboarded to the service. For more information, see [Run a detection test on a newly onboarded Microsoft Defender ATP endpoint](run-detection-test-windows-defender-advanced-threat-protection.md). +> After onboarding the machine, you can choose to run a detection test to verify that it is properly onboarded to the service. For more information, see [Run a detection test on a newly onboarded Microsoft Defender ATP endpoint](run-detection-test.md). ## Configure and update System Center Endpoint Protection clients >[!IMPORTANT] diff --git a/windows/security/threat-protection/microsoft-defender-atp/onboard.md b/windows/security/threat-protection/microsoft-defender-atp/onboard.md index 582233db3c..f2cbb4cb17 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/onboard.md +++ b/windows/security/threat-protection/microsoft-defender-atp/onboard.md @@ -31,10 +31,10 @@ Topic | Description :---|:--- [Configure attack surface reduction capabilities](configure-attack-surface-reduction.md) | By ensuring configuration settings are properly set and exploit mitigation techniques are applied, these set of capabilities resist attacks and exploitations. [Configure next generation protection](../windows-defender-antivirus/configure-windows-defender-antivirus-features.md) | Configure next generation protection to catch all types of emerging threats. -[Configure Secure score dashboard security controls](secure-score-dashboard-windows-defender-advanced-threat-protection.md) | Configure the security controls in Secure score to increase the security posture of your organization. +[Configure Secure score dashboard security controls](secure-score-dashboard.md) | Configure the security controls in Secure score to increase the security posture of your organization. Configure Microsoft Threat Protection integration| Configure other solutions that integrate with Microsoft Defender ATP. Management and API support| Pull alerts to your SIEM or use APIs to create custom alerts. Create and build Power BI reports. -[Configure Microsoft Defender Security Center settings](preferences-setup-windows-defender-advanced-threat-protection.md) | Configure portal related settings such as general settings, advanced features, enable the preview experience and others. +[Configure Microsoft Defender Security Center settings](preferences-setup.md) | Configure portal related settings such as general settings, advanced features, enable the preview experience and others. diff --git a/windows/security/threat-protection/microsoft-defender-atp/overview-endpoint-detection-response.md b/windows/security/threat-protection/microsoft-defender-atp/overview-endpoint-detection-response.md index 0d954897a9..f529841ee6 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/overview-endpoint-detection-response.md +++ b/windows/security/threat-protection/microsoft-defender-atp/overview-endpoint-detection-response.md @@ -36,8 +36,8 @@ The response capabilities give you the power to promptly remediate threats by ac Topic | Description :---|:--- -[Security operations dashboard](security-operations-dashboard-windows-defender-advanced-threat-protection.md) | Explore a high level overview of detections, highlighting where response actions are needed. +[Security operations dashboard](security-operations-dashboard.md) | Explore a high level overview of detections, highlighting where response actions are needed. [Incidents queue](incidents-queue.md) | View and organize the incidents queue, and manage and investigate alerts. -[Alerts queue](alerts-queue-windows-defender-advanced-threat-protection.md) | View and organize the machine alerts queue, and manage and investigate alerts. -[Machines list](machines-view-overview-windows-defender-advanced-threat-protection.md) | Investigate machines with generated alerts and search for specific events over time. -[Take response actions](response-actions-windows-defender-advanced-threat-protection.md) | Learn about the available response actions and apply them to machines and files. \ No newline at end of file +[Alerts queue](alerts-queue.md) | View and organize the machine alerts queue, and manage and investigate alerts. +[Machines list](machines-view-overview.md) | Investigate machines with generated alerts and search for specific events over time. +[Take response actions](response-actions.md) | Learn about the available response actions and apply them to machines and files. \ No newline at end of file diff --git a/windows/security/threat-protection/microsoft-defender-atp/overview-hunting.md b/windows/security/threat-protection/microsoft-defender-atp/overview-hunting.md index b6d5d31b21..b3aad8c507 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/overview-hunting.md +++ b/windows/security/threat-protection/microsoft-defender-atp/overview-hunting.md @@ -34,7 +34,7 @@ With advanced hunting, you can take advantage of the following capabilities: ## In this section Topic | Description :---|:--- -[Query data using Advanced hunting](advanced-hunting-windows-defender-advanced-threat-protection.md) | Learn how to use the basic or advanced query examples to search for possible emerging threats in your organization. +[Query data using Advanced hunting](advanced-hunting.md) | Learn how to use the basic or advanced query examples to search for possible emerging threats in your organization. [Custom detections](overview-custom-detections.md)| With custom detections, you can create custom queries to monitor events for any kind of behavior such as suspicious or emerging threats. diff --git a/windows/security/threat-protection/microsoft-defender-atp/overview-secure-score.md b/windows/security/threat-protection/microsoft-defender-atp/overview-secure-score.md index f1b31e4f2a..ec0b0550d8 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/overview-secure-score.md +++ b/windows/security/threat-protection/microsoft-defender-atp/overview-secure-score.md @@ -48,7 +48,7 @@ The Office 365 Secure Score looks at your settings and activities and compares t In the example image, the total points for the Windows security controls and Office 365 add up to 602 points. -You can set the baselines for calculating the score of Windows Defender security controls on the Secure score dashboard through the **Settings**. For more information, see [Enable Secure score security controls](enable-secure-score-windows-defender-advanced-threat-protection.md). +You can set the baselines for calculating the score of Windows Defender security controls on the Secure score dashboard through the **Settings**. For more information, see [Enable Secure score security controls](enable-secure-score.md). ## Secure score over time You can track the progression of your organizational security posture over time using this tile. It displays the overall score in a historical trend line enabling you to see how taking the recommended actions increase your overall security posture. @@ -78,5 +78,5 @@ Within the tile, you can click on each control to see the recommended optimizati Clicking the link under the Misconfigured machines column opens up the **Machines list** with filters applied to show only the list of machines where the recommendation is applicable. You can export the list in Excel to create a target collection and apply relevant policies using a management solution of your choice. ## Related topic -- [Threat analytics](threat-analytics-dashboard-windows-defender-advanced-threat-protection.md) -- [Threat analytics for Spectre and Meltdown](threat-analytics-dashboard-windows-defender-advanced-threat-protection.md) +- [Threat analytics](threat-analytics-dashboard.md) +- [Threat analytics for Spectre and Meltdown](threat-analytics-dashboard.md) diff --git a/windows/security/threat-protection/microsoft-defender-atp/overview.md b/windows/security/threat-protection/microsoft-defender-atp/overview.md index 0bfb1b24c9..b9e251ae4d 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/overview.md +++ b/windows/security/threat-protection/microsoft-defender-atp/overview.md @@ -36,12 +36,12 @@ Topic | Description [Attack surface reduction](overview-attack-surface-reduction.md) | Leverage the attack surface reduction capabilities to protect the perimeter of your organization. [Next generation protection](../windows-defender-antivirus/windows-defender-antivirus-in-windows-10.md) | Learn about the antivirus capabilities in Microsoft Defender ATP so you can protect desktops, portable computers, and servers. [Endpoint detection and response](overview-endpoint-detection-response.md) | Understand how Microsoft Defender ATP continuously monitors your organization for possible attacks against systems, networks, or users in your organization and the features you can use to mitigate and remediate threats. -[Automated investigation and remediation](automated-investigations-windows-defender-advanced-threat-protection.md) | In conjunction with being able to quickly respond to advanced attacks, Microsoft Defender ATP offers automatic investigation and remediation capabilities that help reduce the volume of alerts in minutes at scale. -[Secure score](overview-secure-score-windows-defender-advanced-threat-protection.md) | Quickly assess the security posture of your organization, see machines that require attention, as well as recommendations for actions to better protect your organization - all in one place. -[Advanced hunting](overview-hunting-windows-defender-advanced-threat-protection.md) | Use a powerful search and query language to create custom queries and detection rules. +[Automated investigation and remediation](automated-investigations.md) | In conjunction with being able to quickly respond to advanced attacks, Microsoft Defender ATP offers automatic investigation and remediation capabilities that help reduce the volume of alerts in minutes at scale. +[Secure score](overview-secure-score.md) | Quickly assess the security posture of your organization, see machines that require attention, as well as recommendations for actions to better protect your organization - all in one place. +[Advanced hunting](overview-hunting.md) | Use a powerful search and query language to create custom queries and detection rules. [Management and APIs](management-apis.md) | Microsoft Defender ATP supports a wide variety of tools to help you manage and interact with the platform so that you can integrate the service into your existing workflows. [Microsoft Threat Protection](threat-protection-integration.md) | Microsoft security products work better together. Learn about other security capabilities in the Microsoft threat protection stack. -[Portal overview](portal-overview-windows-defender-advanced-threat-protection.md) |Learn to navigate your way around Microsoft Defender Security Center. +[Portal overview](portal-overview.md) |Learn to navigate your way around Microsoft Defender Security Center. diff --git a/windows/security/threat-protection/microsoft-defender-atp/portal-overview.md b/windows/security/threat-protection/microsoft-defender-atp/portal-overview.md index 2a989a87e4..349f685730 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/portal-overview.md +++ b/windows/security/threat-protection/microsoft-defender-atp/portal-overview.md @@ -111,7 +111,7 @@ Icon | Description ## Related topics -- [Understand the Microsoft Defender Advanced Threat Protection portal](use-windows-defender-advanced-threat-protection.md) -- [View the Security operations dashboard](security-operations-dashboard-windows-defender-advanced-threat-protection.md) -- [View the Secure Score dashboard and improve your secure score](secure-score-dashboard-windows-defender-advanced-threat-protection.md) -- [View the Threat analytics dashboard and take recommended mitigation actions](threat-analytics-dashboard-windows-defender-advanced-threat-protection.md) \ No newline at end of file +- [Understand the Microsoft Defender Advanced Threat Protection portal](use.md) +- [View the Security operations dashboard](security-operations-dashboard.md) +- [View the Secure Score dashboard and improve your secure score](secure-score-dashboard.md) +- [View the Threat analytics dashboard and take recommended mitigation actions](threat-analytics-dashboard.md) \ No newline at end of file diff --git a/windows/security/threat-protection/microsoft-defender-atp/powershell-example-code.md b/windows/security/threat-protection/microsoft-defender-atp/powershell-example-code.md index 6847252b33..08b7acca0e 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/powershell-example-code.md +++ b/windows/security/threat-protection/microsoft-defender-atp/powershell-example-code.md @@ -179,9 +179,9 @@ $ioc = ## Related topics -- [Understand threat intelligence concepts](threat-indicator-concepts-windows-defender-advanced-threat-protection.md) -- [Enable the custom threat intelligence API in Microsoft Defender ATP](enable-custom-ti-windows-defender-advanced-threat-protection.md) -- [Create custom alerts using the threat intelligence API](custom-ti-api-windows-defender-advanced-threat-protection.md) -- [Python code examples for the custom threat intelligence API](python-example-code-windows-defender-advanced-threat-protection.md) -- [Experiment with custom threat intelligence alerts](experiment-custom-ti-windows-defender-advanced-threat-protection.md) -- [Troubleshoot custom threat intelligence issues](troubleshoot-custom-ti-windows-defender-advanced-threat-protection.md) +- [Understand threat intelligence concepts](threat-indicator-concepts.md) +- [Enable the custom threat intelligence API in Microsoft Defender ATP](enable-custom-ti.md) +- [Create custom alerts using the threat intelligence API](custom-ti-api.md) +- [Python code examples for the custom threat intelligence API](python-example-code.md) +- [Experiment with custom threat intelligence alerts](experiment-custom-ti.md) +- [Troubleshoot custom threat intelligence issues](troubleshoot-custom-ti.md) diff --git a/windows/security/threat-protection/microsoft-defender-atp/preview-settings.md b/windows/security/threat-protection/microsoft-defender-atp/preview-settings.md index 1e98001f5e..a651cb7907 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/preview-settings.md +++ b/windows/security/threat-protection/microsoft-defender-atp/preview-settings.md @@ -36,9 +36,9 @@ Turn on the preview experience setting to be among the first to try upcoming fea 2. Toggle the setting between **On** and **Off** and select **Save preferences**. ## Related topics -- [Update general settings in Microsoft Defender ATP](data-retention-settings-windows-defender-advanced-threat-protection.md) -- [Turn on advanced features in Microsoft Defender ATP](advanced-features-windows-defender-advanced-threat-protection.md) -- [Configure email notifications in Microsoft Defender ATP](configure-email-notifications-windows-defender-advanced-threat-protection.md) -- [Enable SIEM integration in Microsoft Defender ATP](enable-siem-integration-windows-defender-advanced-threat-protection.md) -- [Enable the custom threat intelligence API in Microsoft Defender ATP](enable-custom-ti-windows-defender-advanced-threat-protection.md) -- [Create and build Power BI reports](powerbi-reports-windows-defender-advanced-threat-protection.md) +- [Update general settings in Microsoft Defender ATP](data-retention-settings.md) +- [Turn on advanced features in Microsoft Defender ATP](advanced-features.md) +- [Configure email notifications in Microsoft Defender ATP](configure-email-notifications.md) +- [Enable SIEM integration in Microsoft Defender ATP](enable-siem-integration.md) +- [Enable the custom threat intelligence API in Microsoft Defender ATP](enable-custom-ti.md) +- [Create and build Power BI reports](powerbi-reports.md) diff --git a/windows/security/threat-protection/microsoft-defender-atp/pull-alerts-using-rest-api.md b/windows/security/threat-protection/microsoft-defender-atp/pull-alerts-using-rest-api.md index 41c78cc6f9..35352f18b7 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/pull-alerts-using-rest-api.md +++ b/windows/security/threat-protection/microsoft-defender-atp/pull-alerts-using-rest-api.md @@ -48,7 +48,7 @@ Use the following method in the Microsoft Defender ATP API to pull alerts in JSO >Microsoft Defender Security Center merges similar alert detections into a single alert. This API pulls alert detections in its raw form based on the query parameters you set, enabling you to apply your own grouping and filtering. ## Before you begin -- Before calling the Microsoft Defender ATP endpoint to pull alerts, you'll need to enable the SIEM integration application in Azure Active Directory (AAD). For more information, see [Enable SIEM integration in Microsoft Defender ATP](enable-siem-integration-windows-defender-advanced-threat-protection.md). +- Before calling the Microsoft Defender ATP endpoint to pull alerts, you'll need to enable the SIEM integration application in Azure Active Directory (AAD). For more information, see [Enable SIEM integration in Microsoft Defender ATP](enable-siem-integration.md). - Take note of the following values in your Azure application registration. You need these values to configure the OAuth flow in your service or daemon app: - Application ID (unique to your application) @@ -202,8 +202,8 @@ HTTP error code | Description 500 | Error in the service. ## Related topics -- [Enable SIEM integration in Microsoft Defender ATP](enable-siem-integration-windows-defender-advanced-threat-protection.md) -- [Configure ArcSight to pull Microsoft Defender ATP alerts](configure-arcsight-windows-defender-advanced-threat-protection.md) -- [Configure Splunk to pull Microsoft Defender ATP alerts](configure-splunk-windows-defender-advanced-threat-protection.md) -- [Microsoft Defender ATP alert API fields](api-portal-mapping-windows-defender-advanced-threat-protection.md) -- [Troubleshoot SIEM tool integration issues](troubleshoot-siem-windows-defender-advanced-threat-protection.md) +- [Enable SIEM integration in Microsoft Defender ATP](enable-siem-integration.md) +- [Configure ArcSight to pull Microsoft Defender ATP alerts](configure-arcsight.md) +- [Configure Splunk to pull Microsoft Defender ATP alerts](configure-splunk.md) +- [Microsoft Defender ATP alert API fields](api-portal-mapping.md) +- [Troubleshoot SIEM tool integration issues](troubleshoot-siem.md) diff --git a/windows/security/threat-protection/microsoft-defender-atp/python-example-code.md b/windows/security/threat-protection/microsoft-defender-atp/python-example-code.md index 09522e6ab2..4cf4e52899 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/python-example-code.md +++ b/windows/security/threat-protection/microsoft-defender-atp/python-example-code.md @@ -184,9 +184,9 @@ with requests.Session() as session: ## Related topics -- [Understand threat intelligence concepts](threat-indicator-concepts-windows-defender-advanced-threat-protection.md) -- [Enable the custom threat intelligence API in Microsoft Defender ATP](enable-custom-ti-windows-defender-advanced-threat-protection.md) -- [Create custom alerts using the threat intelligence API](custom-ti-api-windows-defender-advanced-threat-protection.md) -- [PowerShell code examples for the custom threat intelligence API](powershell-example-code-windows-defender-advanced-threat-protection.md) -- [Experiment with custom threat intelligence alerts](experiment-custom-ti-windows-defender-advanced-threat-protection.md) -- [Troubleshoot custom threat intelligence issues](troubleshoot-custom-ti-windows-defender-advanced-threat-protection.md) +- [Understand threat intelligence concepts](threat-indicator-concepts.md) +- [Enable the custom threat intelligence API in Microsoft Defender ATP](enable-custom-ti.md) +- [Create custom alerts using the threat intelligence API](custom-ti-api.md) +- [PowerShell code examples for the custom threat intelligence API](powershell-example-code.md) +- [Experiment with custom threat intelligence alerts](experiment-custom-ti.md) +- [Troubleshoot custom threat intelligence issues](troubleshoot-custom-ti.md) diff --git a/windows/security/threat-protection/microsoft-defender-atp/rbac.md b/windows/security/threat-protection/microsoft-defender-atp/rbac.md index 1fa86fd35c..2df2a61b56 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/rbac.md +++ b/windows/security/threat-protection/microsoft-defender-atp/rbac.md @@ -43,7 +43,7 @@ Microsoft Defender ATP RBAC is designed to support your tier- or role-based mode - Create custom roles and control what Microsoft Defender ATP capabilities they can access with granularity. - **Control who can see information on specific machine group or groups** - - [Create machine groups](machine-groups-windows-defender-advanced-threat-protection.md) by specific criteria such as names, tags, domains, and others, then grant role access to them using a specific Azure Active Directory (Azure AD) user group. + - [Create machine groups](machine-groups.md) by specific criteria such as names, tags, domains, and others, then grant role access to them using a specific Azure Active Directory (Azure AD) user group. To implement role-based access, you'll need to define admin roles, assign corresponding permissions, and assign Azure AD user groups assigned to the roles. @@ -71,4 +71,4 @@ Someone with a Microsoft Defender ATP Global administrator role has unrestricted ## Related topic -- [Create and manage machine groups in Microsoft Defender ATP](machine-groups-windows-defender-advanced-threat-protection.md) \ No newline at end of file +- [Create and manage machine groups in Microsoft Defender ATP](machine-groups.md) \ No newline at end of file diff --git a/windows/security/threat-protection/microsoft-defender-atp/respond-file-alerts.md b/windows/security/threat-protection/microsoft-defender-atp/respond-file-alerts.md index e2a48992a8..bf1c957ebe 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/respond-file-alerts.md +++ b/windows/security/threat-protection/microsoft-defender-atp/respond-file-alerts.md @@ -261,11 +261,11 @@ HKLM\SOFTWARE\Policies\Microsoft\Windows Advanced Threat Protection Value = 0 – block sample collection Value = 1 – allow sample collection ``` -5. Change the organizational unit through the Group Policy. For more information, see [Configure with Group Policy](configure-endpoints-gp-windows-defender-advanced-threat-protection.md). +5. Change the organizational unit through the Group Policy. For more information, see [Configure with Group Policy](configure-endpoints-gp.md). 6. If these steps do not resolve the issue, contact [winatp@microsoft.com](mailto:winatp@microsoft.com). > [!NOTE] > If the value *AllowSampleCollection* is not available, the client will allow sample collection by default. ## Related topic -- [Take response actions on a machine](respond-machine-alerts-windows-defender-advanced-threat-protection.md) +- [Take response actions on a machine](respond-machine-alerts.md) diff --git a/windows/security/threat-protection/microsoft-defender-atp/respond-machine-alerts.md b/windows/security/threat-protection/microsoft-defender-atp/respond-machine-alerts.md index 16b781e106..f90dd5dda3 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/respond-machine-alerts.md +++ b/windows/security/threat-protection/microsoft-defender-atp/respond-machine-alerts.md @@ -250,4 +250,4 @@ All other related details are also shown, for example, submission time, submitti ![Image of action center with information](images/atp-action-center-with-info.png) ## Related topic -- [Take response actions on a file](respond-file-alerts-windows-defender-advanced-threat-protection.md) +- [Take response actions on a file](respond-file-alerts.md) diff --git a/windows/security/threat-protection/microsoft-defender-atp/response-actions.md b/windows/security/threat-protection/microsoft-defender-atp/response-actions.md index 643f72739e..51b90af80c 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/response-actions.md +++ b/windows/security/threat-protection/microsoft-defender-atp/response-actions.md @@ -36,5 +36,5 @@ You can take response actions on machines and files to quickly respond to detect ## In this section Topic | Description :---|:--- -[Take response actions on a machine](respond-machine-alerts-windows-defender-advanced-threat-protection.md)| Isolate machines or collect an investigation package. -[Take response actions on a file](respond-file-alerts-windows-defender-advanced-threat-protection.md)| Stop and quarantine files or block a file from your network. +[Take response actions on a machine](respond-machine-alerts.md)| Isolate machines or collect an investigation package. +[Take response actions on a file](respond-file-alerts.md)| Stop and quarantine files or block a file from your network. diff --git a/windows/security/threat-protection/microsoft-defender-atp/restrict-code-execution.md b/windows/security/threat-protection/microsoft-defender-atp/restrict-code-execution.md index 81b063e148..6443996f08 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/restrict-code-execution.md +++ b/windows/security/threat-protection/microsoft-defender-atp/restrict-code-execution.md @@ -23,7 +23,7 @@ ms.date: 12/08/2017 [!include[Prereleaseinformation](prerelease.md)] -Restrict execution of all applications on the machine except a predefined set (see [Response machine alerts](respond-machine-alerts-windows-defender-advanced-threat-protection.md) for more information) +Restrict execution of all applications on the machine except a predefined set (see [Response machine alerts](respond-machine-alerts.md) for more information) [!include[Machine actions note](machineactionsnote.md)] @@ -37,8 +37,8 @@ Delegated (work or school account) | Machine.RestrictExecution | 'Restrict code >[!Note] > When obtaining a token using user credentials: ->- The user needs to have at least the following role permission: 'Active remediation actions' (See [Create and manage roles](user-roles-windows-defender-advanced-threat-protection.md) for more information) ->- The user needs to have access to the machine, based on machine group settings (See [Create and manage machine groups](machine-groups-windows-defender-advanced-threat-protection.md) for more information) +>- The user needs to have at least the following role permission: 'Active remediation actions' (See [Create and manage roles](user-roles.md) for more information) +>- The user needs to have access to the machine, based on machine group settings (See [Create and manage machine groups](machine-groups.md) for more information) ## HTTP request ``` diff --git a/windows/security/threat-protection/microsoft-defender-atp/run-advanced-query-api.md b/windows/security/threat-protection/microsoft-defender-atp/run-advanced-query-api.md index d7b2db640d..af4e3a7870 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/run-advanced-query-api.md +++ b/windows/security/threat-protection/microsoft-defender-atp/run-advanced-query-api.md @@ -43,7 +43,7 @@ Delegated (work or school account) | AdvancedQuery.Read | 'Run advanced queries' >[!Note] > When obtaining a token using user credentials: >- The user needs to have 'View Data' AD role ->- The user needs to have access to the machine, based on machine group settings (See [Create and manage machine groups](machine-groups-windows-defender-advanced-threat-protection.md) for more information) +>- The user needs to have access to the machine, based on machine group settings (See [Create and manage machine groups](machine-groups.md) for more information) ## HTTP request ``` @@ -147,6 +147,6 @@ Content-Type: application/json​ ## Related topic - [Microsoft Defender ATP APIs](apis-intro.md) -- [Advanced Hunting from Portal](advanced-hunting-windows-defender-advanced-threat-protection.md) +- [Advanced Hunting from Portal](advanced-hunting.md) - [Advanced Hunting using PowerShell](run-advanced-query-sample-powershell.md) - [Schedule Advanced Hunting](run-advanced-query-sample-ms-flow.md) diff --git a/windows/security/threat-protection/microsoft-defender-atp/run-av-scan.md b/windows/security/threat-protection/microsoft-defender-atp/run-av-scan.md index 470cf1fc02..240efd12ca 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/run-av-scan.md +++ b/windows/security/threat-protection/microsoft-defender-atp/run-av-scan.md @@ -37,8 +37,8 @@ Delegated (work or school account) | Machine.Scan | 'Scan machine' >[!Note] > When obtaining a token using user credentials: ->- The user needs to have at least the following role permission: 'Active remediation actions' (See [Create and manage roles](user-roles-windows-defender-advanced-threat-protection.md) for more information) ->- The user needs to have access to the machine, based on machine group settings (See [Create and manage machine groups](machine-groups-windows-defender-advanced-threat-protection.md) for more information) +>- The user needs to have at least the following role permission: 'Active remediation actions' (See [Create and manage roles](user-roles.md) for more information) +>- The user needs to have access to the machine, based on machine group settings (See [Create and manage machine groups](machine-groups.md) for more information) ## HTTP request ``` diff --git a/windows/security/threat-protection/microsoft-defender-atp/run-detection-test.md b/windows/security/threat-protection/microsoft-defender-atp/run-detection-test.md index 7f80d83213..d9a36f6795 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/run-detection-test.md +++ b/windows/security/threat-protection/microsoft-defender-atp/run-detection-test.md @@ -48,5 +48,5 @@ Run the following PowerShell script on a newly onboarded machine to verify that The Command Prompt window will close automatically. If successful, the detection test will be marked as completed and a new alert will appear in the portal for the onboarded machine in approximately 10 minutes. ## Related topics -- [Onboard Windows 10 machines](configure-endpoints-windows-defender-advanced-threat-protection.md) -- [Onboard servers](configure-server-endpoints-windows-defender-advanced-threat-protection.md) +- [Onboard Windows 10 machines](configure-endpoints.md) +- [Onboard servers](configure-server-endpoints.md) diff --git a/windows/security/threat-protection/microsoft-defender-atp/secure-score-dashboard.md b/windows/security/threat-protection/microsoft-defender-atp/secure-score-dashboard.md index 1ee8334e7a..61f17b701f 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/secure-score-dashboard.md +++ b/windows/security/threat-protection/microsoft-defender-atp/secure-score-dashboard.md @@ -40,7 +40,7 @@ You can take the following actions to increase the overall security score of you - Fix sensor data collection - Fix impaired communications -For more information, see [Fix unhealthy sensors](fix-unhealhty-sensors-windows-defender-advanced-threat-protection.md). +For more information, see [Fix unhealthy sensors](fix-unhealhty-sensors.md). ### Windows Defender Antivirus (Windows Defender AV) optimization For a machine to be considered "well configured", it must comply to a minimum baseline configuration setting. This tile shows you a specific list of actions you must apply on endpoints so that the minimum baseline configuration setting for Windows Defender AV is fulfilled. @@ -82,7 +82,7 @@ This tile shows you the exact number of machines that require the latest securit You can take the following actions to increase the overall security score of your organization: - Install the latest security updates - Fix sensor data collection - - The Microsoft Defender ATP service relies on sensor data collection to determine the security state of a machine. The service will not be able to determine the security state of machines that are not reporting sensor data properly. Therefore, it's important to ensure that sensor data collection is working properly. For more information, see [Fix unhealthy sensors](fix-unhealhty-sensors-windows-defender-advanced-threat-protection.md). + - The Microsoft Defender ATP service relies on sensor data collection to determine the security state of a machine. The service will not be able to determine the security state of machines that are not reporting sensor data properly. Therefore, it's important to ensure that sensor data collection is working properly. For more information, see [Fix unhealthy sensors](fix-unhealhty-sensors.md). For more information, see [Windows Update Troubleshooter](https://support.microsoft.com/help/4027322/windows-windows-update-troubleshooter). @@ -229,7 +229,7 @@ You can take the following actions to increase the overall security score of you - Secure public profile - Verify secure configuration of third-party firewall - Fix sensor data collection - - The Microsoft Defender ATP service relies on sensor data collection to determine the security state of a machine. The service will not be able to determine the security state of machines that are not reporting sensor data properly. Therefore, it's important to ensure that sensor data collection is working properly. For more information, see [Fix unhealthy sensors](fix-unhealhty-sensors-windows-defender-advanced-threat-protection.md). + - The Microsoft Defender ATP service relies on sensor data collection to determine the security state of a machine. The service will not be able to determine the security state of machines that are not reporting sensor data properly. Therefore, it's important to ensure that sensor data collection is working properly. For more information, see [Fix unhealthy sensors](fix-unhealhty-sensors.md). For more information, see [Windows Defender Firewall with Advanced Security](https://docs.microsoft.com/windows/security/identity-protection/windows-firewall/windows-firewall-with-advanced-security). @@ -251,7 +251,7 @@ You can take the following actions to increase the overall security score of you - Resume protection on all drives - Ensure drive compatibility - Fix sensor data collection - - The Microsoft Defender ATP service relies on sensor data collection to determine the security state of a machine. The service will not be able to determine the security state of machines that are not reporting sensor data properly. Therefore, it's important to ensure that sensor data collection is working properly. For more information, see [Fix unhealthy sensors](fix-unhealhty-sensors-windows-defender-advanced-threat-protection.md). + - The Microsoft Defender ATP service relies on sensor data collection to determine the security state of a machine. The service will not be able to determine the security state of machines that are not reporting sensor data properly. Therefore, it's important to ensure that sensor data collection is working properly. For more information, see [Fix unhealthy sensors](fix-unhealhty-sensors.md). For more information, see [Bitlocker](https://docs.microsoft.com/windows/security/information-protection/bitlocker/bitlocker-overview). @@ -274,14 +274,14 @@ You can take the following actions to increase the overall security score of you - Ensure hardware and software prerequisites are met - Turn on Credential Guard - Fix sensor data collection - - The Microsoft Defender ATP service relies on sensor data collection to determine the security state of a machine. The service will not be able to determine the security state of machines that are not reporting sensor data properly. Therefore, it's important to ensure that sensor data collection is working properly. For more information, see [Fix unhealthy sensors](fix-unhealhty-sensors-windows-defender-advanced-threat-protection.md). + - The Microsoft Defender ATP service relies on sensor data collection to determine the security state of a machine. The service will not be able to determine the security state of machines that are not reporting sensor data properly. Therefore, it's important to ensure that sensor data collection is working properly. For more information, see [Fix unhealthy sensors](fix-unhealhty-sensors.md). For more information, see [Manage Windows Defender Credential Guard](https://docs.microsoft.com/windows/security/identity-protection/credential-guard/credential-guard-manage). >Want to experience Microsoft Defender ATP? [Sign up for a free trial.](https://www.microsoft.com/en-us/WindowsForBusiness/windows-atp?ocid=docs-wdatp-sadashboard-belowfoldlink) ## Related topics -- [Overview of Secure score](overview-secure-score-windows-defender-advanced-threat-protection.md) +- [Overview of Secure score](overview-secure-score.md) diff --git a/windows/security/threat-protection/microsoft-defender-atp/security-operations-dashboard.md b/windows/security/threat-protection/microsoft-defender-atp/security-operations-dashboard.md index 97e6cbec7e..ee063018af 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/security-operations-dashboard.md +++ b/windows/security/threat-protection/microsoft-defender-atp/security-operations-dashboard.md @@ -55,9 +55,9 @@ You can view the overall number of active alerts from the last 30 days in your n Each group is further sub-categorized into their corresponding alert severity levels. Click the number of alerts inside each alert ring to see a sorted view of that category's queue (**New** or **In progress**). -For more information see, [Alerts overview](alerts-queue-windows-defender-advanced-threat-protection.md). +For more information see, [Alerts overview](alerts-queue.md). -Each row includes an alert severity category and a short description of the alert. You can click an alert to see its detailed view. For more information see, [Investigate Microsoft Defender Advanced Threat Protection alerts](investigate-alerts-windows-defender-advanced-threat-protection.md) and [Alerts overview](alerts-queue-windows-defender-advanced-threat-protection.md). +Each row includes an alert severity category and a short description of the alert. You can click an alert to see its detailed view. For more information see, [Investigate Microsoft Defender Advanced Threat Protection alerts](investigate-alerts.md) and [Alerts overview](alerts-queue.md). @@ -66,9 +66,9 @@ This tile shows you a list of machines with the highest number of active alerts. ![The Machines at risk tile shows a list of machines with the highest number of alerts, and a breakdown of the severity of the alerts](images/machines-at-risk-tile.png) -Click the name of the machine to see details about that machine. For more information see, [Investigate machines in the Microsoft Defender Advanced Threat Protection Machines list](investigate-machines-windows-defender-advanced-threat-protection.md). +Click the name of the machine to see details about that machine. For more information see, [Investigate machines in the Microsoft Defender Advanced Threat Protection Machines list](investigate-machines.md). -You can also click **Machines list** at the top of the tile to go directly to the **Machines list**, sorted by the number of active alerts. For more information see, [Investigate machines in the Microsoft Defender Advanced Threat Protection Machines list](investigate-machines-windows-defender-advanced-threat-protection.md). +You can also click **Machines list** at the top of the tile to go directly to the **Machines list**, sorted by the number of active alerts. For more information see, [Investigate machines in the Microsoft Defender Advanced Threat Protection Machines list](investigate-machines.md). ## Sensor health The **Sensor health** tile provides information on the individual machine’s ability to provide sensor data to the Microsoft Defender ATP service. It reports how many machines require attention and helps you identify problematic machines. @@ -80,14 +80,14 @@ There are two status indicators that provide information on the number of machin - **Inactive** - Machines that have stopped reporting to the Microsoft Defender ATP service for more than seven days in the past month. -When you click any of the groups, you’ll be directed to machines list, filtered according to your choice. For more information, see [Check sensor state](check-sensor-status-windows-defender-advanced-threat-protection.md) and [Investigate machines](investigate-machines-windows-defender-advanced-threat-protection.md). +When you click any of the groups, you’ll be directed to machines list, filtered according to your choice. For more information, see [Check sensor state](check-sensor-status.md) and [Investigate machines](investigate-machines.md). ## Service health The **Service health** tile informs you if the service is active or if there are issues. ![The Service health tile shows an overall indicator of the service](images/status-tile.png) -For more information on the service health, see [Check the Microsoft Defender ATP service health](service-status-windows-defender-advanced-threat-protection.md). +For more information on the service health, see [Check the Microsoft Defender ATP service health](service-status.md). ## Daily machines reporting @@ -115,7 +115,7 @@ The tile shows you a list of user accounts with the most active alerts and the n ![User accounts at risk tile shows a list of user accounts with the highest number of alerts and a breakdown of the severity of the alerts](images/atp-users-at-risk.png) -Click the user account to see details about the user account. For more information see [Investigate a user account](investigate-user-windows-defender-advanced-threat-protection.md). +Click the user account to see details about the user account. For more information see [Investigate a user account](investigate-user.md). ## Suspicious activities This tile shows audit events based on detections from various security components. @@ -127,8 +127,8 @@ This tile shows audit events based on detections from various security component >Want to experience Microsoft Defender ATP? [Sign up for a free trial.](https://www.microsoft.com/en-us/WindowsForBusiness/windows-atp?ocid=docs-wdatp-secopsdashboard-belowfoldlink) ## Related topics -- [Understand the Microsoft Defender Advanced Threat Protection portal](use-windows-defender-advanced-threat-protection.md) -- [Portal overview](portal-overview-windows-defender-advanced-threat-protection.md) -- [View the Secure Score dashboard and improve your secure score](secure-score-dashboard-windows-defender-advanced-threat-protection.md) -- [View the Threat analytics dashboard and take recommended mitigation actions](threat-analytics-dashboard-windows-defender-advanced-threat-protection.md) +- [Understand the Microsoft Defender Advanced Threat Protection portal](use.md) +- [Portal overview](portal-overview.md) +- [View the Secure Score dashboard and improve your secure score](secure-score-dashboard.md) +- [View the Threat analytics dashboard and take recommended mitigation actions](threat-analytics-dashboard.md) diff --git a/windows/security/threat-protection/microsoft-defender-atp/service-status.md b/windows/security/threat-protection/microsoft-defender-atp/service-status.md index 2a553f0551..31c8a5ee1a 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/service-status.md +++ b/windows/security/threat-protection/microsoft-defender-atp/service-status.md @@ -57,4 +57,4 @@ When an issue is resolved, it gets recorded in the **Status history** tab. The **Status history** tab reflects all the historical issues that were seen and resolved. You'll see details of the resolved issues along with the other information that were included while it was being resolved. ### Related topic -- [View the Security operations dashboard](security-operations-dashboard-windows-defender-advanced-threat-protection.md) +- [View the Security operations dashboard](security-operations-dashboard.md) diff --git a/windows/security/threat-protection/microsoft-defender-atp/stop-and-quarantine-file.md b/windows/security/threat-protection/microsoft-defender-atp/stop-and-quarantine-file.md index 745cdec188..9fde8c8592 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/stop-and-quarantine-file.md +++ b/windows/security/threat-protection/microsoft-defender-atp/stop-and-quarantine-file.md @@ -38,8 +38,8 @@ Delegated (work or school account) | Machine.StopAndQuarantine | 'Stop And Quara >[!Note] > When obtaining a token using user credentials: ->- The user needs to have at least the following role permission: 'Active remediation actions' (See [Create and manage roles](user-roles-windows-defender-advanced-threat-protection.md) for more information) ->- The user needs to have access to the machine, based on machine group settings (See [Create and manage machine groups](machine-groups-windows-defender-advanced-threat-protection.md) for more information) +>- The user needs to have at least the following role permission: 'Active remediation actions' (See [Create and manage roles](user-roles.md) for more information) +>- The user needs to have access to the machine, based on machine group settings (See [Create and manage machine groups](machine-groups.md) for more information) ## HTTP request ``` diff --git a/windows/security/threat-protection/microsoft-defender-atp/threat-analytics.md b/windows/security/threat-protection/microsoft-defender-atp/threat-analytics.md index 534c8fb1d3..f4b1020dc3 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/threat-analytics.md +++ b/windows/security/threat-protection/microsoft-defender-atp/threat-analytics.md @@ -65,5 +65,5 @@ The **Mitigation status** and **Mitigation status over time** shows the endpoint ## Related topics -- [Threat analytics for Spectre and Meltdown](threat-analytics-dashboard-windows-defender-advanced-threat-protection.md) +- [Threat analytics for Spectre and Meltdown](threat-analytics-dashboard.md) diff --git a/windows/security/threat-protection/microsoft-defender-atp/threat-indicator-concepts.md b/windows/security/threat-protection/microsoft-defender-atp/threat-indicator-concepts.md index 5274b81da4..7b758a94bc 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/threat-indicator-concepts.md +++ b/windows/security/threat-protection/microsoft-defender-atp/threat-indicator-concepts.md @@ -39,7 +39,7 @@ Alert definitions are contextual attributes that can be used collectively to ide IOCs are individually-known malicious events that indicate that a network or machine has already been breached. Unlike alert definitions, these indicators are considered as evidence of a breach. They are often seen after an attack has already been carried out and the objective has been reached, such as exfiltration. Keeping track of IOCs is also important during forensic investigations. Although it might not provide the ability to intervene with an attack chain, gathering these indicators can be useful in creating better defenses for possible future attacks. ## Relationship between alert definitions and IOCs -In the context of Microsoft Defender ATP, alert definitions are containers for IOCs and defines the alert, including the metadata that is raised in case of a specific IOC match. Various metadata is provided as part of the alert definitions. Metadata such as alert definition name of attack, severity, and description is provided along with other options. For more information on available metadata options, see [Threat Intelligence API metadata](custom-ti-api-windows-defender-advanced-threat-protection.md#threat-intelligence-api-metadata). +In the context of Microsoft Defender ATP, alert definitions are containers for IOCs and defines the alert, including the metadata that is raised in case of a specific IOC match. Various metadata is provided as part of the alert definitions. Metadata such as alert definition name of attack, severity, and description is provided along with other options. For more information on available metadata options, see [Threat Intelligence API metadata](custom-ti-api.md#threat-intelligence-api-metadata). Each IOC defines the concrete detection logic based on its type and value as well as its action, which determines how it is matched. It is bound to a specific alert definition that defines how a detection is displayed as an alert on the Microsoft Defender ATP console. @@ -51,9 +51,9 @@ Here is an example of an IOC: IOCs have a many-to-one relationship with alert definitions such that an alert definition can have many IOCs that correspond to it. ## Related topics -- [Enable the custom threat intelligence API in Microsoft Defender ATP](enable-custom-ti-windows-defender-advanced-threat-protection.md) -- [Create custom alerts using the threat intelligence API](custom-ti-api-windows-defender-advanced-threat-protection.md) -- [PowerShell code examples for the custom threat intelligence API](powershell-example-code-windows-defender-advanced-threat-protection.md) -- [Python code examples for the custom threat intelligence API](python-example-code-windows-defender-advanced-threat-protection.md) -- [Experiment with custom threat intelligence alerts](experiment-custom-ti-windows-defender-advanced-threat-protection.md) -- [Troubleshoot custom threat intelligence issues](troubleshoot-custom-ti-windows-defender-advanced-threat-protection.md) +- [Enable the custom threat intelligence API in Microsoft Defender ATP](enable-custom-ti.md) +- [Create custom alerts using the threat intelligence API](custom-ti-api.md) +- [PowerShell code examples for the custom threat intelligence API](powershell-example-code.md) +- [Python code examples for the custom threat intelligence API](python-example-code.md) +- [Experiment with custom threat intelligence alerts](experiment-custom-ti.md) +- [Troubleshoot custom threat intelligence issues](troubleshoot-custom-ti.md) diff --git a/windows/security/threat-protection/microsoft-defender-atp/threat-protection-integration.md b/windows/security/threat-protection/microsoft-defender-atp/threat-protection-integration.md index da34c747c5..a532cdc3b6 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/threat-protection-integration.md +++ b/windows/security/threat-protection/microsoft-defender-atp/threat-protection-integration.md @@ -57,7 +57,7 @@ The Skype for Business integration provides s a way for analysts to communicate ## Related topic -- [Protect users, data, and devices with conditional access](conditional-access-windows-defender-advanced-threat-protection.md) +- [Protect users, data, and devices with conditional access](conditional-access.md) diff --git a/windows/security/threat-protection/microsoft-defender-atp/threat-protection-reports.md b/windows/security/threat-protection/microsoft-defender-atp/threat-protection-reports.md index 37eb716bfc..200d9396de 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/threat-protection-reports.md +++ b/windows/security/threat-protection/microsoft-defender-atp/threat-protection-reports.md @@ -79,4 +79,4 @@ For example, to show data about high-severity alerts only: 3. Select **Apply**. ## Related topic -- [Machine health and compliance report](machine-reports-windows-defender-advanced-threat-protection.md) \ No newline at end of file +- [Machine health and compliance report](machine-reports.md) \ No newline at end of file diff --git a/windows/security/threat-protection/microsoft-defender-atp/troubleshoot-custom-ti.md b/windows/security/threat-protection/microsoft-defender-atp/troubleshoot-custom-ti.md index c2d0bdf3c6..497987c490 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/troubleshoot-custom-ti.md +++ b/windows/security/threat-protection/microsoft-defender-atp/troubleshoot-custom-ti.md @@ -56,9 +56,9 @@ If your client secret expires or if you've misplaced the copy provided when you ## Related topics -- [Understand threat intelligence concepts](threat-indicator-concepts-windows-defender-advanced-threat-protection.md) -- [Enable the custom threat intelligence API in Microsoft Defender ATP](enable-custom-ti-windows-defender-advanced-threat-protection.md) -- [Create custom alerts using the threat intelligence API](custom-ti-api-windows-defender-advanced-threat-protection.md) -- [PowerShell code examples for the custom threat intelligence API](powershell-example-code-windows-defender-advanced-threat-protection.md) -- [Python code examples for the custom threat intelligence API](python-example-code-windows-defender-advanced-threat-protection.md) -- [Experiment with custom threat intelligence alerts](experiment-custom-ti-windows-defender-advanced-threat-protection.md) +- [Understand threat intelligence concepts](threat-indicator-concepts.md) +- [Enable the custom threat intelligence API in Microsoft Defender ATP](enable-custom-ti.md) +- [Create custom alerts using the threat intelligence API](custom-ti-api.md) +- [PowerShell code examples for the custom threat intelligence API](powershell-example-code.md) +- [Python code examples for the custom threat intelligence API](python-example-code.md) +- [Experiment with custom threat intelligence alerts](experiment-custom-ti.md) diff --git a/windows/security/threat-protection/microsoft-defender-atp/troubleshoot-onboarding-error-messages.md b/windows/security/threat-protection/microsoft-defender-atp/troubleshoot-onboarding-error-messages.md index 64c4946662..db5503aa11 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/troubleshoot-onboarding-error-messages.md +++ b/windows/security/threat-protection/microsoft-defender-atp/troubleshoot-onboarding-error-messages.md @@ -91,4 +91,4 @@ crl.microsoft.com` ## Related topics -- [Validate licensing provisioning and complete setup for Microsoft Defender ATP](licensing-windows-defender-advanced-threat-protection.md) \ No newline at end of file +- [Validate licensing provisioning and complete setup for Microsoft Defender ATP](licensing.md) \ No newline at end of file diff --git a/windows/security/threat-protection/microsoft-defender-atp/troubleshoot-onboarding.md b/windows/security/threat-protection/microsoft-defender-atp/troubleshoot-onboarding.md index 5993a17f98..b46b9c95ac 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/troubleshoot-onboarding.md +++ b/windows/security/threat-protection/microsoft-defender-atp/troubleshoot-onboarding.md @@ -29,12 +29,12 @@ ms.topic: troubleshooting You might need to troubleshoot the Microsoft Defender ATP onboarding process if you encounter issues. This page provides detailed steps to troubleshoot onboarding issues that might occur when deploying with one of the deployment tools and common errors that might occur on the machines. -If you have completed the onboarding process and don't see machines in the [Machines list](investigate-machines-windows-defender-advanced-threat-protection.md) after an hour, it might indicate an onboarding or connectivity problem. +If you have completed the onboarding process and don't see machines in the [Machines list](investigate-machines.md) after an hour, it might indicate an onboarding or connectivity problem. ## Troubleshoot onboarding when deploying with Group Policy Deployment with Group Policy is done by running the onboarding script on the machines. The Group Policy console does not indicate if the deployment has succeeded or not. -If you have completed the onboarding process and don't see machines in the [Machines list](investigate-machines-windows-defender-advanced-threat-protection.md) after an hour, you can check the output of the script on the machines. For more information, see [Troubleshoot onboarding when deploying with a script](#troubleshoot-onboarding-when-deploying-with-a-script). +If you have completed the onboarding process and don't see machines in the [Machines list](investigate-machines.md) after an hour, you can check the output of the script on the machines. For more information, see [Troubleshoot onboarding when deploying with a script](#troubleshoot-onboarding-when-deploying-with-a-script). If the script completes successfully, see [Troubleshoot onboarding issues on the machines](#troubleshoot-onboarding-issues-on-the-machine) for additional errors that might occur. @@ -71,9 +71,9 @@ Event ID | Error Type | Resolution steps 10 | Onboarding data couldn't be written to registry | Check the permissions on the registry, specifically
```HKLM\SOFTWARE\Policies\Microsoft\Windows Advanced Threat```.
Verify that the script was ran as an administrator. 15 | Failed to start SENSE service |Check the service health (```sc query sense``` command). Make sure it's not in an intermediate state (*'Pending_Stopped'*, *'Pending_Running'*) and try to run the script again (with administrator rights).

If the machine is running Windows 10, version 1607 and running the command `sc query sense` returns `START_PENDING`, reboot the machine. If rebooting the machine doesn't address the issue, upgrade to KB4015217 and try onboarding again. 15 | Failed to start SENSE service | If the message of the error is: System error 577 has occurred. You need to enable the Windows Defender Antivirus ELAM driver, see [Ensure that Windows Defender Antivirus is not disabled by a policy](#ensure-that-windows-defender-antivirus-is-not-disabled-by-a-policy) for instructions. -30 | The script failed to wait for the service to start running | The service could have taken more time to start or has encountered errors while trying to start. For more information on events and errors related to SENSE, see [Review events and errors using Event viewer](event-error-codes-windows-defender-advanced-threat-protection.md). -35 | The script failed to find needed onboarding status registry value | When the SENSE service starts for the first time, it writes onboarding status to the registry location
```HKLM\SOFTWARE\Microsoft\Windows Advanced Threat Protection\Status```.
The script failed to find it after several seconds. You can manually test it and check if it's there. For more information on events and errors related to SENSE, see [Review events and errors using Event viewer](event-error-codes-windows-defender-advanced-threat-protection.md). -40 | SENSE service onboarding status is not set to **1** | The SENSE service has failed to onboard properly. For more information on events and errors related to SENSE, see [Review events and errors using Event viewer](event-error-codes-windows-defender-advanced-threat-protection.md). +30 | The script failed to wait for the service to start running | The service could have taken more time to start or has encountered errors while trying to start. For more information on events and errors related to SENSE, see [Review events and errors using Event viewer](event-error-codes.md). +35 | The script failed to find needed onboarding status registry value | When the SENSE service starts for the first time, it writes onboarding status to the registry location
```HKLM\SOFTWARE\Microsoft\Windows Advanced Threat Protection\Status```.
The script failed to find it after several seconds. You can manually test it and check if it's there. For more information on events and errors related to SENSE, see [Review events and errors using Event viewer](event-error-codes.md). +40 | SENSE service onboarding status is not set to **1** | The SENSE service has failed to onboard properly. For more information on events and errors related to SENSE, see [Review events and errors using Event viewer](event-error-codes.md). 65 | Insufficient privileges| Run the script again with administrator privileges. ## Troubleshoot onboarding issues using Microsoft Intune @@ -155,12 +155,12 @@ If the deployment tools used does not indicate an error in the onboarding proces Event ID | Message | Resolution steps :---|:---|:--- 5 | Microsoft Defender Advanced Threat Protection service failed to connect to the server at _variable_ | [Ensure the machine has Internet access](#ensure-the-machine-has-an-internet-connection). -6 | Microsoft Defender Advanced Threat Protection service is not onboarded and no onboarding parameters were found. Failure code: _variable_ | [Run the onboarding script again](configure-endpoints-script-windows-defender-advanced-threat-protection.md). +6 | Microsoft Defender Advanced Threat Protection service is not onboarded and no onboarding parameters were found. Failure code: _variable_ | [Run the onboarding script again](configure-endpoints-script.md). 7 | Microsoft Defender Advanced Threat Protection service failed to read the onboarding parameters. Failure code: _variable_ | [Ensure the machine has Internet access](#ensure-the-machine-has-an-internet-connection), then run the entire onboarding process again. -9 | Microsoft Defender Advanced Threat Protection service failed to change its start type. Failure code: variable | If the event happened during onboarding, reboot and re-attempt running the onboarding script. For more information, see [Run the onboarding script again](configure-endpoints-script-windows-defender-advanced-threat-protection.md).

If the event happened during offboarding, contact support. -10 | Microsoft Defender Advanced Threat Protection service failed to persist the onboarding information. Failure code: variable | If the event happened during onboarding, re-attempt running the onboarding script. For more information, see [Run the onboarding script again](configure-endpoints-script-windows-defender-advanced-threat-protection.md).

If the problem persists, contact support. +9 | Microsoft Defender Advanced Threat Protection service failed to change its start type. Failure code: variable | If the event happened during onboarding, reboot and re-attempt running the onboarding script. For more information, see [Run the onboarding script again](configure-endpoints-script.md).

If the event happened during offboarding, contact support. +10 | Microsoft Defender Advanced Threat Protection service failed to persist the onboarding information. Failure code: variable | If the event happened during onboarding, re-attempt running the onboarding script. For more information, see [Run the onboarding script again](configure-endpoints-script.md).

If the problem persists, contact support. 15 | Microsoft Defender Advanced Threat Protection cannot start command channel with URL: _variable_ | [Ensure the machine has Internet access](#ensure-the-machine-has-an-internet-connection). -17 | Microsoft Defender Advanced Threat Protection service failed to change the Connected User Experiences and Telemetry service location. Failure code: variable | [Run the onboarding script again](configure-endpoints-script-windows-defender-advanced-threat-protection.md). If the problem persists, contact support. +17 | Microsoft Defender Advanced Threat Protection service failed to change the Connected User Experiences and Telemetry service location. Failure code: variable | [Run the onboarding script again](configure-endpoints-script.md). If the problem persists, contact support. 25 | Microsoft Defender Advanced Threat Protection service failed to reset health status in the registry. Failure code: _variable_ | Contact support. 27 | Failed to enable Microsoft Defender Advanced Threat Protection mode in Windows Defender. Onboarding process failed. Failure code: variable | Contact support. 29 | Failed to read the offboarding parameters. Error type: %1, Error code: %2, Description: %3 | Ensure the machine has Internet access, then run the entire offboarding process again. @@ -238,9 +238,9 @@ The Window Defender ATP sensor requires Microsoft Windows HTTP (WinHTTP) to repo WinHTTP is independent of the Internet browsing proxy settings and other user context applications and must be able to detect the proxy servers that are available in your particular environment. -To ensure that sensor has service connectivity, follow the steps described in the [Verify client connectivity to Microsoft Defender ATP service URLs](configure-proxy-internet-windows-defender-advanced-threat-protection.md#verify-client-connectivity-to-windows-defender-atp-service-urls) topic. +To ensure that sensor has service connectivity, follow the steps described in the [Verify client connectivity to Microsoft Defender ATP service URLs](configure-proxy-internet.md#verify-client-connectivity-to-windows-defender-atp-service-urls) topic. -If the verification fails and your environment is using a proxy to connect to the Internet, then follow the steps described in [Configure proxy and Internet connectivity settings](configure-proxy-internet-windows-defender-advanced-threat-protection.md) topic. +If the verification fails and your environment is using a proxy to connect to the Internet, then follow the steps described in [Configure proxy and Internet connectivity settings](configure-proxy-internet.md) topic. ### Ensure that Windows Defender Antivirus is not disabled by a policy **Problem**: The Microsoft Defender ATP service does not start after onboarding. @@ -271,8 +271,8 @@ If the verification fails and your environment is using a proxy to connect to th ## Troubleshoot onboarding issues on a server If you encounter issues while onboarding a server, go through the following verification steps to address possible issues. -- [Ensure Microsoft Monitoring Agent (MMA) is installed and configured to report sensor data to the service](configure-server-endpoints-windows-defender-advanced-threat-protection.md#server-mma) -- [Ensure that the server proxy and Internet connectivity settings are configured properly](configure-server-endpoints-windows-defender-advanced-threat-protection.md#server-proxy) +- [Ensure Microsoft Monitoring Agent (MMA) is installed and configured to report sensor data to the service](configure-server-endpoints.md#server-mma) +- [Ensure that the server proxy and Internet connectivity settings are configured properly](configure-server-endpoints.md#server-proxy) You might also need to check the following: - Check that there is a Microsoft Defender Advanced Threat Protection Service running in the **Processes** tab in **Task Manager**. For example: @@ -306,7 +306,7 @@ For more information, see [Windows 10 Licensing](https://www.microsoft.com/en-us ## Related topics -- [Troubleshoot Microsoft Defender ATP](troubleshoot-windows-defender-advanced-threat-protection.md) -- [Onboard machines](onboard-configure-windows-defender-advanced-threat-protection.md) -- [Configure machine proxy and Internet connectivity settings](configure-proxy-internet-windows-defender-advanced-threat-protection.md) +- [Troubleshoot Microsoft Defender ATP](troubleshoot.md) +- [Onboard machines](onboard-configure.md) +- [Configure machine proxy and Internet connectivity settings](configure-proxy-internet.md) diff --git a/windows/security/threat-protection/microsoft-defender-atp/troubleshoot-siem.md b/windows/security/threat-protection/microsoft-defender-atp/troubleshoot-siem.md index 7d2a7d86da..1ff99f3d60 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/troubleshoot-siem.md +++ b/windows/security/threat-protection/microsoft-defender-atp/troubleshoot-siem.md @@ -80,8 +80,8 @@ If you encounter an error when trying to enable the SIEM connector application, >Want to experience Microsoft Defender ATP? [Sign up for a free trial.](https://www.microsoft.com/en-us/WindowsForBusiness/windows-atp?ocid=docs-wdatp-troubleshootsiem-belowfoldlink) ## Related topics -- [Enable SIEM integration in Microsoft Defender ATP](enable-siem-integration-windows-defender-advanced-threat-protection.md) -- [Configure ArcSight to pull Microsoft Defender ATP alerts](configure-arcsight-windows-defender-advanced-threat-protection.md) -- [Configure Splunk to pull Microsoft Defender ATP alerts](configure-splunk-windows-defender-advanced-threat-protection.md) -- [Microsoft Defender ATP alert API fields](api-portal-mapping-windows-defender-advanced-threat-protection.md) -- [Pull Microsoft Defender ATP alerts using REST API](pull-alerts-using-rest-api-windows-defender-advanced-threat-protection.md) +- [Enable SIEM integration in Microsoft Defender ATP](enable-siem-integration.md) +- [Configure ArcSight to pull Microsoft Defender ATP alerts](configure-arcsight.md) +- [Configure Splunk to pull Microsoft Defender ATP alerts](configure-splunk.md) +- [Microsoft Defender ATP alert API fields](api-portal-mapping.md) +- [Pull Microsoft Defender ATP alerts using REST API](pull-alerts-using-rest-api.md) diff --git a/windows/security/threat-protection/microsoft-defender-atp/troubleshoot.md b/windows/security/threat-protection/microsoft-defender-atp/troubleshoot.md index b5201a5814..84c7b19ed4 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/troubleshoot.md +++ b/windows/security/threat-protection/microsoft-defender-atp/troubleshoot.md @@ -37,13 +37,13 @@ Make sure that `*.securitycenter.windows.com` is included the proxy whitelist. ## Microsoft Defender ATP service shows event or error logs in the Event Viewer -See the topic [Review events and errors using Event Viewer](event-error-codes-windows-defender-advanced-threat-protection.md) for a list of event IDs that are reported by the Microsoft Defender ATP service. The topic also contains troubleshooting steps for event errors. +See the topic [Review events and errors using Event Viewer](event-error-codes.md) for a list of event IDs that are reported by the Microsoft Defender ATP service. The topic also contains troubleshooting steps for event errors. ## Microsoft Defender ATP service fails to start after a reboot and shows error 577 If onboarding machines successfully completes but Microsoft Defender ATP does not start after a reboot and shows error 577, check that Windows Defender is not disabled by a policy. -For more information, see [Ensure that Windows Defender Antivirus is not disabled by policy](troubleshoot-onboarding-windows-defender-advanced-threat-protection.md#ensure-that-windows-defender-antivirus-is-not-disabled-by-a-policy). +For more information, see [Ensure that Windows Defender Antivirus is not disabled by policy](troubleshoot-onboarding.md#ensure-that-windows-defender-antivirus-is-not-disabled-by-a-policy). ## Known issues with regional formats @@ -73,5 +73,5 @@ When you use Azure Security Center to monitor servers, a Microsoft Defender ATP ## Related topics -- [Troubleshoot Microsoft Defender Advanced Threat Protection onboarding issues](troubleshoot-onboarding-windows-defender-advanced-threat-protection.md) -- [Review events and errors using Event Viewer](event-error-codes-windows-defender-advanced-threat-protection.md) +- [Troubleshoot Microsoft Defender Advanced Threat Protection onboarding issues](troubleshoot-onboarding.md) +- [Review events and errors using Event Viewer](event-error-codes.md) diff --git a/windows/security/threat-protection/microsoft-defender-atp/unisolate-machine.md b/windows/security/threat-protection/microsoft-defender-atp/unisolate-machine.md index 4320d58d31..c1bfd3a410 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/unisolate-machine.md +++ b/windows/security/threat-protection/microsoft-defender-atp/unisolate-machine.md @@ -37,8 +37,8 @@ Delegated (work or school account) | Machine.Isolate | 'Isolate machine' >[!Note] > When obtaining a token using user credentials: ->- The user needs to have at least the following role permission: 'Active remediation actions' (See [Create and manage roles](user-roles-windows-defender-advanced-threat-protection.md) for more information) ->- The user needs to have access to the machine, based on machine group settings (See [Create and manage machine groups](machine-groups-windows-defender-advanced-threat-protection.md) for more information) +>- The user needs to have at least the following role permission: 'Active remediation actions' (See [Create and manage roles](user-roles.md) for more information) +>- The user needs to have access to the machine, based on machine group settings (See [Create and manage machine groups](machine-groups.md) for more information) ## HTTP request ``` diff --git a/windows/security/threat-protection/microsoft-defender-atp/unrestrict-code-execution.md b/windows/security/threat-protection/microsoft-defender-atp/unrestrict-code-execution.md index 9531e39835..9680a57aec 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/unrestrict-code-execution.md +++ b/windows/security/threat-protection/microsoft-defender-atp/unrestrict-code-execution.md @@ -37,8 +37,8 @@ Delegated (work or school account) | Machine.RestrictExecution | 'Restrict code >[!Note] > When obtaining a token using user credentials: ->- The user needs to have at least the following role permission: 'Active remediation actions' (See [Create and manage roles](user-roles-windows-defender-advanced-threat-protection.md) for more information) ->- The user needs to have access to the machine, based on machine group settings (See [Create and manage machine groups](machine-groups-windows-defender-advanced-threat-protection.md) for more information) +>- The user needs to have at least the following role permission: 'Active remediation actions' (See [Create and manage roles](user-roles.md) for more information) +>- The user needs to have access to the machine, based on machine group settings (See [Create and manage machine groups](machine-groups.md) for more information) ## HTTP request ``` diff --git a/windows/security/threat-protection/microsoft-defender-atp/update-alert.md b/windows/security/threat-protection/microsoft-defender-atp/update-alert.md index be7b420a9b..9752745d78 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/update-alert.md +++ b/windows/security/threat-protection/microsoft-defender-atp/update-alert.md @@ -36,8 +36,8 @@ Delegated (work or school account) | Alert.ReadWrite | 'Read and write alerts' >[!Note] > When obtaining a token using user credentials: ->- The user needs to have at least the following role permission: 'Alerts investigation' (See [Create and manage roles](user-roles-windows-defender-advanced-threat-protection.md) for more information) ->- The user needs to have access to the machine associated with the alert, based on machine group settings (See [Create and manage machine groups](machine-groups-windows-defender-advanced-threat-protection.md) for more information) +>- The user needs to have at least the following role permission: 'Alerts investigation' (See [Create and manage roles](user-roles.md) for more information) +>- The user needs to have access to the machine associated with the alert, based on machine group settings (See [Create and manage machine groups](machine-groups.md) for more information) ## HTTP request ``` diff --git a/windows/security/threat-protection/microsoft-defender-atp/use-custom-ti.md b/windows/security/threat-protection/microsoft-defender-atp/use-custom-ti.md index 580beea62a..c8174671cd 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/use-custom-ti.md +++ b/windows/security/threat-protection/microsoft-defender-atp/use-custom-ti.md @@ -35,10 +35,10 @@ You can use the code examples to guide you in creating calls to the custom threa Topic | Description :---|:--- -[Understand threat intelligence concepts](threat-indicator-concepts-windows-defender-advanced-threat-protection.md) | Understand the concepts around threat intelligence so that you can effectively create custom intelligence for your organization. -[Enable the custom threat intelligence application](enable-custom-ti-windows-defender-advanced-threat-protection.md) | Set up the custom threat intelligence application through Microsoft Defender Security Center so that you can create custom threat intelligence (TI) using REST API. -[Create custom threat intelligence alerts](custom-ti-api-windows-defender-advanced-threat-protection.md) | Create custom threat intelligence alerts so that you can generate specific alerts that are applicable to your organization. -[PowerShell code examples](powershell-example-code-windows-defender-advanced-threat-protection.md) | Use the PowerShell code examples to guide you in using the custom threat intelligence API. -[Python code examples](python-example-code-windows-defender-advanced-threat-protection.md) | Use the Python code examples to guide you in using the custom threat intelligence API. -[Experiment with custom threat intelligence alerts](experiment-custom-ti-windows-defender-advanced-threat-protection.md) | This article demonstrates an end-to-end usage of the threat intelligence API to get you started in using the threat intelligence API. -[Troubleshoot custom threat intelligence issues](troubleshoot-custom-ti-windows-defender-advanced-threat-protection.md) | Learn how to address possible issues you might encounter while using the threat intelligence API. +[Understand threat intelligence concepts](threat-indicator-concepts.md) | Understand the concepts around threat intelligence so that you can effectively create custom intelligence for your organization. +[Enable the custom threat intelligence application](enable-custom-ti.md) | Set up the custom threat intelligence application through Microsoft Defender Security Center so that you can create custom threat intelligence (TI) using REST API. +[Create custom threat intelligence alerts](custom-ti-api.md) | Create custom threat intelligence alerts so that you can generate specific alerts that are applicable to your organization. +[PowerShell code examples](powershell-example-code.md) | Use the PowerShell code examples to guide you in using the custom threat intelligence API. +[Python code examples](python-example-code.md) | Use the Python code examples to guide you in using the custom threat intelligence API. +[Experiment with custom threat intelligence alerts](experiment-custom-ti.md) | This article demonstrates an end-to-end usage of the threat intelligence API to get you started in using the threat intelligence API. +[Troubleshoot custom threat intelligence issues](troubleshoot-custom-ti.md) | Learn how to address possible issues you might encounter while using the threat intelligence API. diff --git a/windows/security/threat-protection/microsoft-defender-atp/use.md b/windows/security/threat-protection/microsoft-defender-atp/use.md index 2f1fff7f2e..df066b9b7e 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/use.md +++ b/windows/security/threat-protection/microsoft-defender-atp/use.md @@ -39,9 +39,9 @@ Use the **Threat analytics** dashboard to continually assess and control risk ex Topic | Description :---|:--- -[Portal overview](portal-overview-windows-defender-advanced-threat-protection.md) | Understand the portal layout and area descriptions. -[View the Security operations dashboard](security-operations-dashboard-windows-defender-advanced-threat-protection.md) | The Microsoft Defender ATP **Security operations dashboard** provides a snapshot of your network. You can view aggregates of alerts, the overall status of the service of the machines on your network, investigate machines, files, and URLs, and see snapshots of threats seen on machines. -[View the Secure Score dashboard and improve your secure score](secure-score-dashboard-windows-defender-advanced-threat-protection.md) | The **Secure Score dashboard** expands your visibility into the overall security posture of your organization. From this dashboard, you'll be able to quickly assess the security posture of your organization, see machines that require attention, as well as recommendations for actions to further reduce the attack surface in your organization - all in one place. -[View the Threat analytics dashboard and take recommended mitigation actions](threat-analytics-dashboard-windows-defender-advanced-threat-protection.md) | The **Threat analytics** dashboard helps you continually assess and control risk exposure to Spectre and Meltdown. Use the charts to quickly identify machines for the presence or absence of mitigations. +[Portal overview](portal-overview.md) | Understand the portal layout and area descriptions. +[View the Security operations dashboard](security-operations-dashboard.md) | The Microsoft Defender ATP **Security operations dashboard** provides a snapshot of your network. You can view aggregates of alerts, the overall status of the service of the machines on your network, investigate machines, files, and URLs, and see snapshots of threats seen on machines. +[View the Secure Score dashboard and improve your secure score](secure-score-dashboard.md) | The **Secure Score dashboard** expands your visibility into the overall security posture of your organization. From this dashboard, you'll be able to quickly assess the security posture of your organization, see machines that require attention, as well as recommendations for actions to further reduce the attack surface in your organization - all in one place. +[View the Threat analytics dashboard and take recommended mitigation actions](threat-analytics-dashboard.md) | The **Threat analytics** dashboard helps you continually assess and control risk exposure to Spectre and Meltdown. Use the charts to quickly identify machines for the presence or absence of mitigations. diff --git a/windows/security/threat-protection/microsoft-defender-atp/user-roles.md b/windows/security/threat-protection/microsoft-defender-atp/user-roles.md index 2c305c28e0..fd2f77e7a0 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/user-roles.md +++ b/windows/security/threat-protection/microsoft-defender-atp/user-roles.md @@ -77,5 +77,5 @@ After creating roles, you'll need to create a machine group and provide access t ##Related topic -- [User basic permissions to access the portal](basic-permissions-windows-defender-advanced-threat-protection.md) -- [Create and manage machine groups](machine-groups-windows-defender-advanced-threat-protection.md) \ No newline at end of file +- [User basic permissions to access the portal](basic-permissions.md) +- [Create and manage machine groups](machine-groups.md) \ No newline at end of file diff --git a/windows/security/threat-protection/microsoft-defender-atp/view-incidents-queue.md b/windows/security/threat-protection/microsoft-defender-atp/view-incidents-queue.md index a7d944a061..060b92ef38 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/view-incidents-queue.md +++ b/windows/security/threat-protection/microsoft-defender-atp/view-incidents-queue.md @@ -73,6 +73,6 @@ Use this filter to choose between focusing on incidents flagged as true or false ## Related topics - [Incidents queue](incidents-queue.md) -- [Manage incidents](manage-incidents-windows-defender-advanced-threat-protection.md) -- [Investigate incidents](investigate-incidents-windows-defender-advanced-threat-protection.md) +- [Manage incidents](manage-incidents.md) +- [Investigate incidents](investigate-incidents.md) diff --git a/windows/security/threat-protection/microsoft-defender-atp/whats-new-in-microsoft-defender-atp.md b/windows/security/threat-protection/microsoft-defender-atp/whats-new-in-microsoft-defender-atp.md index 93ec317ca9..d08d240b1c 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/whats-new-in-microsoft-defender-atp.md +++ b/windows/security/threat-protection/microsoft-defender-atp/whats-new-in-microsoft-defender-atp.md @@ -93,7 +93,7 @@ Microsoft Defender ATP is seamlessly integrated in Microsoft Threat Protection t - [Onboard Windows Server 2019](https://docs.microsoft.com/windows/security/threat-protection/windows-defender-atp/configure-server-endpoints-windows-defender-advanced-threat-protection#windows-server-version-1803-and-windows-server-2019)
Microsoft Defender ATP now adds support for Windows Server 2019. You'll be able to onboard Windows Server 2019 in the same method available for Windows 10 client machines. -- [Power BI reports using Microsoft Defender ATP data](powerbi-reports-windows-defender-advanced-threat-protection.md)
+- [Power BI reports using Microsoft Defender ATP data](powerbi-reports.md)
Microsoft Defender ATP makes it easy to create a Power BI dashboard by providing an option straight from the portal. diff --git a/windows/security/threat-protection/microsoft-defender-atp/windows-defender-security-center-atp.md b/windows/security/threat-protection/microsoft-defender-atp/windows-defender-security-center-atp.md index af2106bf2b..89b74b62a0 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/windows-defender-security-center-atp.md +++ b/windows/security/threat-protection/microsoft-defender-atp/windows-defender-security-center-atp.md @@ -27,13 +27,13 @@ Microsoft Defender Security Center is the portal where you can access Microsoft Topic | Description :---|:--- Get started | Learn about the minimum requirements, validate licensing and complete setup, know about preview features, understand data storage and privacy, and how to assign user access to the portal. -[Onboard machines](onboard-configure-windows-defender-advanced-threat-protection.md) | Learn about onboarding client, server, and non-Windows machines. Learn how to run a detection test, configure proxy and Internet connectivity settings, and how to troubleshoot potential onboarding issues. -[Understand the portal](use-windows-defender-advanced-threat-protection.md) | Understand the Security operations, Secure Score, and Threat analytics dashboards as well as how to navigate the portal. +[Onboard machines](onboard-configure.md) | Learn about onboarding client, server, and non-Windows machines. Learn how to run a detection test, configure proxy and Internet connectivity settings, and how to troubleshoot potential onboarding issues. +[Understand the portal](use.md) | Understand the Security operations, Secure Score, and Threat analytics dashboards as well as how to navigate the portal. Investigate and remediate threats | Investigate alerts, machines, and take response actions to remediate threats. API and SIEM support | Use the supported APIs to pull and create custom alerts, or automate workflows. Use the supported SIEM tools to pull alerts from Microsoft Defender Security Center. Reporting | Create and build Power BI reports using Microsoft Defender ATP data. Check service health and sensor state | Verify that the service is running and check the sensor state on machines. -[Configure Microsoft Defender Security Center settings](preferences-setup-windows-defender-advanced-threat-protection.md) | Configure general settings, turn on the preview experience, notifications, and enable other features. -[Access the Microsoft Defender ATP Community Center](community-windows-defender-advanced-threat-protection.md) | Access the Microsoft Defender ATP Community Center to learn, collaborate, and share experiences about the product. -[Troubleshoot service issues](troubleshoot-windows-defender-advanced-threat-protection.md) | This section addresses issues that might arise as you use the Windows Defender Advanced Threat service. +[Configure Microsoft Defender Security Center settings](preferences-setup.md) | Configure general settings, turn on the preview experience, notifications, and enable other features. +[Access the Microsoft Defender ATP Community Center](community.md) | Access the Microsoft Defender ATP Community Center to learn, collaborate, and share experiences about the product. +[Troubleshoot service issues](troubleshoot.md) | This section addresses issues that might arise as you use the Windows Defender Advanced Threat service. From c8594e7e6f47e1e5716859e28d2bdb4ca262182f Mon Sep 17 00:00:00 2001 From: Joey Caparas Date: Wed, 10 Apr 2019 15:12:26 -0700 Subject: [PATCH 143/724] fix index file --- .../change-history-for-threat-protection.md | 5 +- windows/security/threat-protection/index.md | 98 +++++++++---------- .../{conditional.md => conditional-access.md} | 0 3 files changed, 51 insertions(+), 52 deletions(-) rename windows/security/threat-protection/microsoft-defender-atp/{conditional.md => conditional-access.md} (100%) diff --git a/windows/security/threat-protection/change-history-for-threat-protection.md b/windows/security/threat-protection/change-history-for-threat-protection.md index 1deaa652b8..76b8efdb9f 100644 --- a/windows/security/threat-protection/change-history-for-threat-protection.md +++ b/windows/security/threat-protection/change-history-for-threat-protection.md @@ -10,16 +10,15 @@ manager: dansimp audience: ITPro ms.collection: M365-security-compliance ms.topic: conceptual -ms.date: 08/11/2018 ms.localizationpriority: medium --- # Change history for threat protection -This topic lists new and updated topics in the [Windows Defender ATP](windows-defender-atp/windows-defender-advanced-threat-protection.md) documentation. +This topic lists new and updated topics in the [Microsoft Defender ATP](microsoft-defender-atp/microsoft-defender-advanced-threat-protection.md) documentation. ## August 2018 New or changed topic | Description ---------------------|------------ -[Windows Defender Advanced Threat Protection](windows-defender-atp/windows-defender-advanced-threat-protection.md) | Reorganized Windows 10 security topics to reflect the Windows Defender ATP platform. +[Microsoft Defender Advanced Threat Protection](microsoft-defender-atp/microsoft-defender-advanced-threat-protection.md) | Reorganized Windows 10 security topics to reflect the Windows Defender ATP platform. diff --git a/windows/security/threat-protection/index.md b/windows/security/threat-protection/index.md index 44c4ef2a2f..d657ec1311 100644 --- a/windows/security/threat-protection/index.md +++ b/windows/security/threat-protection/index.md @@ -1,7 +1,7 @@ --- title: Threat Protection (Windows 10) -description: Learn how Windows Defender ATP helps protect against threats. -keywords: threat protection, windows defender advanced threat protection, attack surface reduction, next generation protection, endpoint detection and response, automated investigation and response, microsoft threat experts, secure score, advanced hunting +description: Learn how Microsoft Defender ATP helps protect against threats. +keywords: threat protection, Microsoft Defender Advanced Threat Protection, attack surface reduction, next generation protection, endpoint detection and response, automated investigation and response, microsoft threat experts, secure score, advanced hunting search.product: eADQiWindows 10XVcnh ms.prod: w10 ms.mktglfcycl: deploy @@ -12,9 +12,9 @@ ms.localizationpriority: medium --- # Threat Protection -[Windows Defender Advanced Threat Protection (Windows Defender ATP)](https://go.microsoft.com/fwlink/p/?linkid=2069559) is a unified platform for preventative protection, post-breach detection, automated investigation, and response. Windows Defender ATP protects endpoints from cyber threats; detects advanced attacks and data breaches, automates security incidents and improves security posture. +[Microsoft Defender Advanced Threat Protection (Microsoft Defender ATP)](https://go.microsoft.com/fwlink/p/?linkid=2069559) is a unified platform for preventative protection, post-breach detection, automated investigation, and response. Microsoft Defender ATP protects endpoints from cyber threats; detects advanced attacks and data breaches, automates security incidents and improves security posture. -

Windows Defender ATP

+

Microsoft Defender ATP

@@ -71,8 +71,8 @@ Windows Defender ATP uses the following combination of technology built into Win >[!TIP] ->- Learn about the latest enhancements in Windows Defender ATP: [What's new in Windows Defender ATP](https://cloudblogs.microsoft.com/microsoftsecure/2018/11/15/whats-new-in-windows-defender-atp/). ->- Windows Defender ATP demonstrated industry-leading optics and detection capabilities in the recent MITRE evaluation. Read: [Insights from the MITRE ATT&CK-based evaluation](https://cloudblogs.microsoft.com/microsoftsecure/2018/12/03/insights-from-the-mitre-attack-based-evaluation-of-windows-defender-atp/). +>- Learn about the latest enhancements in Microsoft Defender ATP: [What's new in Microsoft Defender ATP](https://cloudblogs.microsoft.com/microsoftsecure/2018/11/15/whats-new-in-windows-defender-atp/). +>- Microsoft Defender ATP demonstrated industry-leading optics and detection capabilities in the recent MITRE evaluation. Read: [Insights from the MITRE ATT&CK-based evaluation](https://cloudblogs.microsoft.com/microsoftsecure/2018/12/03/insights-from-the-mitre-attack-based-evaluation-of-windows-defender-atp/). **[Attack surface reduction](overview-attack-surface-reduction.md)**
The attack surface reduction set of capabilities provide the first line of defense in the stack. By ensuring configuration settings are properly set and exploit mitigation techniques are applied, these set of capabilities resist attacks and exploitations. @@ -80,7 +80,7 @@ The attack surface reduction set of capabilities provide the first line of defen **[Next generation protection](https://docs.microsoft.com/en-us/windows/security/threat-protection/windows-defender-antivirus/windows-defender-antivirus-in-windows-10)**
-To further reinforce the security perimeter of your network, Windows Defender ATP uses next generation protection designed to catch all types of emerging threats. +To further reinforce the security perimeter of your network, Microsoft Defender ATP uses next generation protection designed to catch all types of emerging threats. @@ -91,27 +91,27 @@ You can also do advanced hunting to create custom threat intelligence and use a **[Automated investigation and remediation](automated-investigations-windows-defender-advanced-threat-protection.md)**
-In conjunction with being able to quickly respond to advanced attacks, Windows Defender ATP offers automatic investigation and remediation capabilities that help reduce the volume of alerts in minutes at scale. +In conjunction with being able to quickly respond to advanced attacks, Microsoft Defender ATP offers automatic investigation and remediation capabilities that help reduce the volume of alerts in minutes at scale. **[Secure score](overview-secure-score-windows-defender-advanced-threat-protection.md)**
-Windows Defender ATP includes a secure score to help you dynamically assess the security state of your enterprise network, identify unprotected systems, and take recommended actions to improve the overall security of your organization. +Microsoft Defender ATP includes a secure score to help you dynamically assess the security state of your enterprise network, identify unprotected systems, and take recommended actions to improve the overall security of your organization. **[Microsoft Threat Experts](microsoft-threat-experts.md)**
-Windows Defender ATP's new managed threat hunting service provides proactive hunting, prioritization, and additional context and insights that further empower Security operation centers (SOCs) to identify and respond to threats quickly and accurately. +Microsoft Defender ATP's new managed threat hunting service provides proactive hunting, prioritization, and additional context and insights that further empower Security operation centers (SOCs) to identify and respond to threats quickly and accurately. **[Management and APIs](management-apis.md)**
-Integrate Windows Defender Advanced Threat Protection into your existing workflows. +Integrate Microsoft Defender Advanced Threat Protection into your existing workflows. **[Microsoft Threat Protection](threat-protection-integration.md)**
- Windows Defender ATP is part of the Microsoft Threat Protection solution that helps implement end-to-end security across possible attack surfaces in the modern workplace. Bring the power of Microsoft threat protection to your organization. + Microsoft Defender ATP is part of the Microsoft Threat Protection solution that helps implement end-to-end security across possible attack surfaces in the modern workplace. Bring the power of Microsoft threat protection to your organization. @@ -120,10 +120,10 @@ To help you maximize the effectiveness of the security platform, you can configu Topic | Description :---|:--- -[Overview](overview.md) | Understand the concepts behind the capabilities in Windows Defender ATP so you take full advantage of the complete threat protection platform. -[Get started](get-started.md) | Learn about the requirements of the platform and the initial steps you need to take to get started with Windows Defender ATP. -[Configure and manage capabilities](onboard.md)| Configure and manage the individual capabilities in Windows Defender ATP. -[Troubleshoot Windows Defender ATP](troubleshoot-wdatp.md) | Learn how to address issues that you might encounter while using the platform. +[Overview](overview.md) | Understand the concepts behind the capabilities in Microsoft Defender ATP so you take full advantage of the complete threat protection platform. +[Get started](get-started.md) | Learn about the requirements of the platform and the initial steps you need to take to get started with Microsoft Defender ATP. +[Configure and manage capabilities](onboard.md)| Configure and manage the individual capabilities in Microsoft Defender ATP. +[Troubleshoot Microsoft Defender ATP](troubleshoot-wdatp.md) | Learn how to address issues that you might encounter while using the platform. ## Related topic -[Windows Defender ATP helps detect sophisticated threats](https://www.microsoft.com/itshowcase/Article/Content/854/Windows-Defender-ATP-helps-detect-sophisticated-threats) +[Microsoft Defender ATP helps detect sophisticated threats](https://www.microsoft.com/itshowcase/Article/Content/854/Windows-Defender-ATP-helps-detect-sophisticated-threats) diff --git a/windows/security/threat-protection/microsoft-defender-atp/microsoft-threat-experts.md b/windows/security/threat-protection/microsoft-defender-atp/microsoft-threat-experts.md index 380af8ef33..652eaf3652 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/microsoft-threat-experts.md +++ b/windows/security/threat-protection/microsoft-defender-atp/microsoft-threat-experts.md @@ -1,6 +1,6 @@ --- title: Microsoft Threat Experts -description: Microsoft Threat Experts is the new managed threat hunting service in Windows Defender Advanced Threat Protection (Windows Defender ATP) that provides proactive hunting, prioritization, and additional context and insights that further empower security operations centers (SOCs) to identify and respond to threats quickly and accurately. It provides additional layer of expertise and optics that Microsoft customers can utilize to augment security operation capabilities as part of Microsoft 365. +description: Microsoft Threat Experts is the new managed threat hunting service in Microsoft Defender Advanced Threat Protection (Microsoft Defender ATP) that provides proactive hunting, prioritization, and additional context and insights that further empower security operations centers (SOCs) to identify and respond to threats quickly and accurately. It provides additional layer of expertise and optics that Microsoft customers can utilize to augment security operation capabilities as part of Microsoft 365. keywords: managed threat hunting service, managed threat hunting, MTE, Microsoft Threat Experts search.product: Windows 10 search.appverid: met150 @@ -20,7 +20,7 @@ ms.date: 02/28/2019 # Microsoft Threat Experts **Applies to:** -- [Windows Defender Advanced Threat Protection (Windows Defender ATP)](https://go.microsoft.com/fwlink/p/?linkid=2069559) +- [Microsoft Defender Advanced Threat Protection (Microsoft Defender ATP)](https://go.microsoft.com/fwlink/p/?linkid=2069559) [!include[Prerelease�information](prerelease.md)] diff --git a/windows/security/threat-protection/microsoft-defender-atp/minimum-requirements.md b/windows/security/threat-protection/microsoft-defender-atp/minimum-requirements.md index afd1ba57b5..5a4a309e6f 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/minimum-requirements.md +++ b/windows/security/threat-protection/microsoft-defender-atp/minimum-requirements.md @@ -1,5 +1,5 @@ --- -title: Minimum requirements for Windows Defender ATP +title: Minimum requirements for Microsoft Defender ATP description: Understand the licensing requirements and requirements for onboarding machines to the sercvie keywords: minimum requirements, licensing, comparison table search.product: eADQiWindows 10XVcnh @@ -17,22 +17,22 @@ ms.collection: M365-security-compliance ms.topic: conceptual --- -# Minimum requirements for Windows Defender ATP +# Minimum requirements for Microsoft Defender ATP **Applies to:** -- [Windows Defender Advanced Threat Protection (Windows Defender ATP)](https://go.microsoft.com/fwlink/p/?linkid=2069559) +- [Microsoft Defender Advanced Threat Protection (Microsoft Defender ATP)](https://go.microsoft.com/fwlink/p/?linkid=2069559) There are some minimum requirements for onboarding machines to the service. ->Want to experience Windows Defender ATP? [Sign up for a free trial.](https://www.microsoft.com/en-us/WindowsForBusiness/windows-atp?ocid=docs-wdatp-minreqs-abovefoldlink) +>Want to experience Microsoft Defender ATP? [Sign up for a free trial.](https://www.microsoft.com/en-us/WindowsForBusiness/windows-atp?ocid=docs-wdatp-minreqs-abovefoldlink) >[!TIP] ->- Learn about the latest enhancements in Windows Defender ATP: [What's new in Windows Defender ATP](https://cloudblogs.microsoft.com/microsoftsecure/2018/11/15/whats-new-in-windows-defender-atp/). ->- Windows Defender ATP demonstrated industry-leading optics and detection capabilities in the recent MITRE evaluation. Read: [Insights from the MITRE ATT&CK-based evaluation](https://cloudblogs.microsoft.com/microsoftsecure/2018/12/03/insights-from-the-mitre-attack-based-evaluation-of-windows-defender-atp/). +>- Learn about the latest enhancements in Microsoft Defender ATP: [What's new in Microsoft Defender ATP](https://cloudblogs.microsoft.com/microsoftsecure/2018/11/15/whats-new-in-windows-defender-atp/). +>- Microsoft Defender ATP demonstrated industry-leading optics and detection capabilities in the recent MITRE evaluation. Read: [Insights from the MITRE ATT&CK-based evaluation](https://cloudblogs.microsoft.com/microsoftsecure/2018/12/03/insights-from-the-mitre-attack-based-evaluation-of-windows-defender-atp/). ## Licensing requirements -Windows Defender Advanced Threat Protection requires one of the following Microsoft Volume Licensing offers: +Microsoft Defender Advanced Threat Protection requires one of the following Microsoft Volume Licensing offers: - Windows 10 Enterprise E5 - Windows 10 Education E5 @@ -42,7 +42,7 @@ For more information on the array of features in Windows 10 editions, see [Compa For a detailed comparison table of Windows 10 commercial edition comparison, see the [comparison PDF](https://go.microsoft.com/fwlink/p/?linkid=2069559). -For more information about licensing requirements for Windows Defender ATP platform on Windows Server, see [Protecting Windows Servers with Windows Defender ATP](https://techcommunity.microsoft.com/t5/Windows-Defender-ATP/Protecting-Windows-Server-with-Windows-Defender-ATP/ba-p/267114). +For more information about licensing requirements for Microsoft Defender ATP platform on Windows Server, see [Protecting Windows Servers with Microsoft Defender ATP](https://techcommunity.microsoft.com/t5/Windows-Defender-ATP/Protecting-Windows-Server-with-Windows-Defender-ATP/ba-p/267114). ## Related topic diff --git a/windows/security/threat-protection/microsoft-defender-atp/mssp-support.md b/windows/security/threat-protection/microsoft-defender-atp/mssp-support.md index dfd40d8852..33e5a03df9 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/mssp-support.md +++ b/windows/security/threat-protection/microsoft-defender-atp/mssp-support.md @@ -1,6 +1,6 @@ --- title: Managed security service provider (MSSP) support -description: Understand how Windows Defender ATP integrates with managed security service providers (MSSP) +description: Understand how Microsoft Defender ATP integrates with managed security service providers (MSSP) keywords: mssp, integration, managed, security, service, provider search.product: eADQiWindows 10XVcnh search.appverid: met150 @@ -21,19 +21,19 @@ ms.date: 10/29/2018 # Managed security service provider support **Applies to:** -- [Windows Defender Advanced Threat Protection (Windows Defender ATP)](https://go.microsoft.com/fwlink/p/?linkid=2069559) +- [Microsoft Defender Advanced Threat Protection (Microsoft Defender ATP)](https://go.microsoft.com/fwlink/p/?linkid=2069559) ->Want to experience Windows Defender ATP? [Sign up for a free trial.](https://www.microsoft.com/en-us/WindowsForBusiness/windows-atp?ocid=docs-mssp-support-abovefoldlink) +>Want to experience Microsoft Defender ATP? [Sign up for a free trial.](https://www.microsoft.com/en-us/WindowsForBusiness/windows-atp?ocid=docs-mssp-support-abovefoldlink) Security is recognized as a key component in running an enterprise, however some organizations might not have the capacity or expertise to have a dedicated security operations team to manage the security of their endpoints and network, others may want to have a second set of eyes to review alerts in their network. -To address this demand, managed security service providers (MSSP) offer to deliver managed detection and response (MDR) services on top of Windows Defender ATP. +To address this demand, managed security service providers (MSSP) offer to deliver managed detection and response (MDR) services on top of Microsoft Defender ATP. -Windows Defender ATP adds support for this scenario and to allow MSSPs to take the following actions: +Microsoft Defender ATP adds support for this scenario and to allow MSSPs to take the following actions: - Get access to MSSP customer's Windows Defender Security Center portal - Get email notifications, and diff --git a/windows/security/threat-protection/microsoft-defender-atp/offboard-machine-api.md b/windows/security/threat-protection/microsoft-defender-atp/offboard-machine-api.md index 50855b0351..d2eff9b682 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/offboard-machine-api.md +++ b/windows/security/threat-protection/microsoft-defender-atp/offboard-machine-api.md @@ -18,16 +18,16 @@ ms.topic: article # Offboard machine API **Applies to:** -- [Windows Defender Advanced Threat Protection (Windows Defender ATP)](https://go.microsoft.com/fwlink/p/?linkid=2069559) +- [Microsoft Defender Advanced Threat Protection (Microsoft Defender ATP)](https://go.microsoft.com/fwlink/p/?linkid=2069559) [!include[Prereleaseinformation](prerelease.md)] -Offboard machine from Windows Defender ATP. +Offboard machine from Microsoft Defender ATP. [!include[Machine actions note](machineactionsnote.md)] ## Permissions -One of the following permissions is required to call this API. To learn more, including how to choose permissions, see [Use Windows Defender ATP APIs](apis-intro.md) +One of the following permissions is required to call this API. To learn more, including how to choose permissions, see [Use Microsoft Defender ATP APIs](apis-intro.md) Permission type | Permission | Permission display name :---|:---|:--- diff --git a/windows/security/threat-protection/microsoft-defender-atp/offboard-machines.md b/windows/security/threat-protection/microsoft-defender-atp/offboard-machines.md index 273bfed16c..a22fafe295 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/offboard-machines.md +++ b/windows/security/threat-protection/microsoft-defender-atp/offboard-machines.md @@ -1,6 +1,6 @@ --- -title: Offboard machines from the Windows Defender ATP service -description: Onboard Windows 10 machines, servers, non-Windows machines from the Windows Defender ATP service +title: Offboard machines from the Microsoft Defender ATP service +description: Onboard Windows 10 machines, servers, non-Windows machines from the Microsoft Defender ATP service keywords: offboarding, windows defender advanced threat protection offboarding, windows atp offboarding search.product: eADQiWindows 10XVcnh search.appverid: met150 @@ -18,18 +18,18 @@ ms.topic: conceptual ms.date: 04/24/2018 --- -# Offboard machines from the Windows Defender ATP service +# Offboard machines from the Microsoft Defender ATP service **Applies to:** - macOS - Linux - Windows Server 2012 R2 - Windows Server 2016 -- [Windows Defender Advanced Threat Protection (Windows Defender ATP)](https://go.microsoft.com/fwlink/p/?linkid=2069559) +- [Microsoft Defender Advanced Threat Protection (Microsoft Defender ATP)](https://go.microsoft.com/fwlink/p/?linkid=2069559) ->Want to experience Windows Defender ATP? [Sign up for a free trial.](https://www.microsoft.com/en-us/WindowsForBusiness/windows-atp?ocid=docs-wdatp-offboardmachines-abovefoldlink) +>Want to experience Microsoft Defender ATP? [Sign up for a free trial.](https://www.microsoft.com/en-us/WindowsForBusiness/windows-atp?ocid=docs-wdatp-offboardmachines-abovefoldlink) Follow the corresponding instructions depending on your preferred deployment method. diff --git a/windows/security/threat-protection/microsoft-defender-atp/onboard-configure.md b/windows/security/threat-protection/microsoft-defender-atp/onboard-configure.md index a33cae087b..353ee5e12b 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/onboard-configure.md +++ b/windows/security/threat-protection/microsoft-defender-atp/onboard-configure.md @@ -1,5 +1,5 @@ --- -title: Onboard machines to the Windows Defender ATP service +title: Onboard machines to the Microsoft Defender ATP service description: Onboard Windows 10 machines, servers, non-Windows machines and learn how to run a detection test. keywords: onboarding, windows defender advanced threat protection onboarding, windows atp onboarding, sccm, group policy, mdm, local script, detection test search.product: eADQiWindows 10XVcnh @@ -18,21 +18,21 @@ ms.topic: conceptual ms.date: 11/19/2018 --- -# Onboard machines to the Windows Defender ATP service +# Onboard machines to the Microsoft Defender ATP service **Applies to:** -- [Windows Defender Advanced Threat Protection (Windows Defender ATP)](https://go.microsoft.com/fwlink/p/?linkid=2069559) +- [Microsoft Defender Advanced Threat Protection (Microsoft Defender ATP)](https://go.microsoft.com/fwlink/p/?linkid=2069559) -You need to turn on the sensor to give visibility within Windows Defender ATP. +You need to turn on the sensor to give visibility within Microsoft Defender ATP. -For more information, see [Onboard your Windows 10 machines to Windows Defender ATP](https://www.youtube.com/watch?v=JT7VGYfeRlA&feature=youtu.be). +For more information, see [Onboard your Windows 10 machines to Microsoft Defender ATP](https://www.youtube.com/watch?v=JT7VGYfeRlA&feature=youtu.be). [!include[Prerelease information](prerelease.md)] ->Want to experience Windows Defender ATP? [Sign up for a free trial.](https://www.microsoft.com/en-us/WindowsForBusiness/windows-atp?ocid=docs-wdatp-onboardconfigure-abovefoldlink) +>Want to experience Microsoft Defender ATP? [Sign up for a free trial.](https://www.microsoft.com/en-us/WindowsForBusiness/windows-atp?ocid=docs-wdatp-onboardconfigure-abovefoldlink) ## Licensing requirements -Windows Defender Advanced Threat Protection requires one of the following Microsoft Volume Licensing offers: +Microsoft Defender Advanced Threat Protection requires one of the following Microsoft Volume Licensing offers: - Windows 10 Enterprise E5 - Windows 10 Education E5 @@ -59,7 +59,7 @@ For more information, see [Windows 10 Licensing](https://www.microsoft.com/en-us Machines on your network must be running one of these editions. -The hardware requirements for Windows Defender ATP on machines is the same as those for the supported editions. +The hardware requirements for Microsoft Defender ATP on machines is the same as those for the supported editions. > [!NOTE] > Machines that are running mobile versions of Windows are not supported. @@ -70,15 +70,15 @@ The hardware requirements for Windows Defender ATP on machines is the same as th - Linux >[!NOTE] ->You'll need to know the exact Linux distros and macOS versions that are compatible with Windows Defender ATP for the integration to work. +>You'll need to know the exact Linux distros and macOS versions that are compatible with Microsoft Defender ATP for the integration to work. ### Network and data storage and configuration requirements -When you run the onboarding wizard for the first time, you must choose where your Windows Defender Advanced Threat Protection-related information is stored: in the European Union, the United Kingdom, or the United States datacenter. +When you run the onboarding wizard for the first time, you must choose where your Microsoft Defender Advanced Threat Protection-related information is stored: in the European Union, the United Kingdom, or the United States datacenter. > [!NOTE] > - You cannot change your data storage location after the first-time setup. -> - Review the [Windows Defender ATP data storage and privacy](data-storage-privacy-windows-defender-advanced-threat-protection.md) for more information on where and how Microsoft stores your data. +> - Review the [Microsoft Defender ATP data storage and privacy](data-storage-privacy-windows-defender-advanced-threat-protection.md) for more information on where and how Microsoft stores your data. ### Diagnostic data settings @@ -132,7 +132,7 @@ If the **START_TYPE** is not set to **AUTO_START**, then you'll need to set the #### Internet connectivity Internet connectivity on machines is required either directly or through proxy. -The Windows Defender ATP sensor can utilize a daily average bandwidth of 5MB to communicate with the Windows Defender ATP cloud service and report cyber data. One-off activities such as file uploads and investigation package collection are not included in this daily average bandwidth. +The Microsoft Defender ATP sensor can utilize a daily average bandwidth of 5MB to communicate with the Microsoft Defender ATP cloud service and report cyber data. One-off activities such as file uploads and investigation package collection are not included in this daily average bandwidth. For more information on additional proxy configuration settings see, [Configure machine proxy and Internet connectivity settings](configure-proxy-internet-windows-defender-advanced-threat-protection.md) . @@ -140,11 +140,11 @@ Before you onboard machines, the diagnostic data service must be enabled. The se ## Windows Defender Antivirus configuration requirement -The Windows Defender ATP agent depends on the ability of Windows Defender Antivirus to scan files and provide information about them. +The Microsoft Defender ATP agent depends on the ability of Windows Defender Antivirus to scan files and provide information about them. -You must configure Security intelligence updates on the Windows Defender ATP machines whether Windows Defender Antivirus is the active antimalware or not. For more information, see [Manage Windows Defender Antivirus updates and apply baselines](../windows-defender-antivirus/manage-updates-baselines-windows-defender-antivirus.md). +You must configure Security intelligence updates on the Microsoft Defender ATP machines whether Windows Defender Antivirus is the active antimalware or not. For more information, see [Manage Windows Defender Antivirus updates and apply baselines](../windows-defender-antivirus/manage-updates-baselines-windows-defender-antivirus.md). -When Windows Defender Antivirus is not the active antimalware in your organization and you use the Windows Defender ATP service, Windows Defender Antivirus goes on passive mode. If your organization has disabled Windows Defender Antivirus through group policy or other methods, machines that are onboarded to Windows Defender ATP must be excluded from this group policy. +When Windows Defender Antivirus is not the active antimalware in your organization and you use the Microsoft Defender ATP service, Windows Defender Antivirus goes on passive mode. If your organization has disabled Windows Defender Antivirus through group policy or other methods, machines that are onboarded to Microsoft Defender ATP must be excluded from this group policy. If you are onboarding servers and Windows Defender Antivirus is not the active antimalware on your servers, you shouldn't uninstall Windows Defender Antivirus. You'll need to configure it to run on passive mode. For more information, see [Onboard servers](configure-server-endpoints-windows-defender-advanced-threat-protection.md). @@ -152,7 +152,7 @@ If you are onboarding servers and Windows Defender Antivirus is not the active a For more information, see [Windows Defender Antivirus compatibility](../windows-defender-antivirus/windows-defender-antivirus-compatibility.md). ## Windows Defender Antivirus Early Launch Antimalware (ELAM) driver is enabled -If you're running Windows Defender Antivirus as the primary antimalware product on your machines, the Windows Defender ATP agent will successfully onboard. +If you're running Windows Defender Antivirus as the primary antimalware product on your machines, the Microsoft Defender ATP agent will successfully onboard. If you're running a third-party antimalware client and use Mobile Device Management solutions or System Center Configuration Manager (current branch) version 1606, you'll need to ensure that the Windows Defender Antivirus ELAM driver is enabled. For more information, see [Ensure that Windows Defender Antivirus is not disabled by policy](troubleshoot-onboarding-windows-defender-advanced-threat-protection.md#ensure-that-windows-defender-antivirus-is-not-disabled-by-a-policy). @@ -160,12 +160,12 @@ If you're running a third-party antimalware client and use Mobile Device Managem ## In this section Topic | Description :---|:--- -[Onboard previous versions of Windows](onboard-downlevel-windows-defender-advanced-threat-protection.md)| Onboard Windows 7 and Windows 8.1 machines to Windows Defender ATP. -[Onboard Windows 10 machines](configure-endpoints-windows-defender-advanced-threat-protection.md) | You'll need to onboard machines for it to report to the Windows Defender ATP service. Learn about the tools and methods you can use to configure machines in your enterprise. -[Onboard servers](configure-server-endpoints-windows-defender-advanced-threat-protection.md) | Onboard Windows Server 2012 R2 and Windows Server 2016 to Windows Defender ATP -[Onboard non-Windows machines](configure-endpoints-non-windows-windows-defender-advanced-threat-protection.md) | Windows Defender ATP provides a centralized security operations experience for Windows as well as non-Windows platforms. You'll be able to see alerts from various supported operating systems (OS) in Windows Defender Security Center and better protect your organization's network. This experience leverages on a third-party security products' sensor data. -[Run a detection test on a newly onboarded machine](run-detection-test-windows-defender-advanced-threat-protection.md) | Run a script on a newly onboarded machine to verify that it is properly reporting to the Windows Defender ATP service. -[Configure proxy and Internet settings](configure-proxy-internet-windows-defender-advanced-threat-protection.md)| Enable communication with the Windows Defender ATP cloud service by configuring the proxy and Internet connectivity settings. +[Onboard previous versions of Windows](onboard-downlevel-windows-defender-advanced-threat-protection.md)| Onboard Windows 7 and Windows 8.1 machines to Microsoft Defender ATP. +[Onboard Windows 10 machines](configure-endpoints-windows-defender-advanced-threat-protection.md) | You'll need to onboard machines for it to report to the Microsoft Defender ATP service. Learn about the tools and methods you can use to configure machines in your enterprise. +[Onboard servers](configure-server-endpoints-windows-defender-advanced-threat-protection.md) | Onboard Windows Server 2012 R2 and Windows Server 2016 to Microsoft Defender ATP +[Onboard non-Windows machines](configure-endpoints-non-windows-windows-defender-advanced-threat-protection.md) | Microsoft Defender ATP provides a centralized security operations experience for Windows as well as non-Windows platforms. You'll be able to see alerts from various supported operating systems (OS) in Windows Defender Security Center and better protect your organization's network. This experience leverages on a third-party security products' sensor data. +[Run a detection test on a newly onboarded machine](run-detection-test-windows-defender-advanced-threat-protection.md) | Run a script on a newly onboarded machine to verify that it is properly reporting to the Microsoft Defender ATP service. +[Configure proxy and Internet settings](configure-proxy-internet-windows-defender-advanced-threat-protection.md)| Enable communication with the Microsoft Defender ATP cloud service by configuring the proxy and Internet connectivity settings. [Troubleshoot onboarding issues](troubleshoot-onboarding-windows-defender-advanced-threat-protection.md) | Learn about resolving issues that might arise during onboarding. ->Want to experience Windows Defender ATP? [Sign up for a free trial.](https://www.microsoft.com/en-us/WindowsForBusiness/windows-atp?ocid=docs-wdatp-onboardconfigure-belowfoldlink) +>Want to experience Microsoft Defender ATP? [Sign up for a free trial.](https://www.microsoft.com/en-us/WindowsForBusiness/windows-atp?ocid=docs-wdatp-onboardconfigure-belowfoldlink) diff --git a/windows/security/threat-protection/microsoft-defender-atp/onboard-downlevel.md b/windows/security/threat-protection/microsoft-defender-atp/onboard-downlevel.md index 700436d636..140c14d487 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/onboard-downlevel.md +++ b/windows/security/threat-protection/microsoft-defender-atp/onboard-downlevel.md @@ -1,6 +1,6 @@ --- -title: Onboard previous versions of Windows on Windows Defender ATP -description: Onboard supported previous versions of Windows machines so that they can send sensor data to the Windows Defender ATP sensor +title: Onboard previous versions of Windows on Microsoft Defender ATP +description: Onboard supported previous versions of Windows machines so that they can send sensor data to the Microsoft Defender ATP sensor keywords: onboard, windows, 7, 81, oms, sp1, enterprise, pro, down level search.product: eADQiWindows 10XVcnh search.appverid: met150 @@ -25,35 +25,35 @@ ms.topic: article - Windows 7 SP1 Pro - Windows 8.1 Pro - Windows 8.1 Enterprise -- [Windows Defender Advanced Threat Protection (Windows Defender ATP)](https://go.microsoft.com/fwlink/p/?linkid=2069559) +- [Microsoft Defender Advanced Threat Protection (Microsoft Defender ATP)](https://go.microsoft.com/fwlink/p/?linkid=2069559) ->Want to experience Windows Defender ATP? [Sign up for a free trial.](https://www.microsoft.com/en-us/WindowsForBusiness/windows-atp?ocid=docs-wdatp-downlevel-abovefoldlink) +>Want to experience Microsoft Defender ATP? [Sign up for a free trial.](https://www.microsoft.com/en-us/WindowsForBusiness/windows-atp?ocid=docs-wdatp-downlevel-abovefoldlink) -Windows Defender ATP extends support to include down-level operating systems, providing advanced attack detection and investigation capabilities on supported Windows versions. +Microsoft Defender ATP extends support to include down-level operating systems, providing advanced attack detection and investigation capabilities on supported Windows versions. >[!IMPORTANT] >This capability is currently in preview. You'll need to turn on the preview features to take advantage of this feature. For more information, see [Preview features](preview-windows-defender-advanced-threat-protection.md). -To onboard down-level Windows client endpoints to Windows Defender ATP, you'll need to: +To onboard down-level Windows client endpoints to Microsoft Defender ATP, you'll need to: - Configure and update System Center Endpoint Protection clients. -- Install and configure Microsoft Monitoring Agent (MMA) to report sensor data to Windows Defender ATP as instructed below. +- Install and configure Microsoft Monitoring Agent (MMA) to report sensor data to Microsoft Defender ATP as instructed below. >[!TIP] -> After onboarding the machine, you can choose to run a detection test to verify that it is properly onboarded to the service. For more information, see [Run a detection test on a newly onboarded Windows Defender ATP endpoint](run-detection-test-windows-defender-advanced-threat-protection.md). +> After onboarding the machine, you can choose to run a detection test to verify that it is properly onboarded to the service. For more information, see [Run a detection test on a newly onboarded Microsoft Defender ATP endpoint](run-detection-test-windows-defender-advanced-threat-protection.md). ## Configure and update System Center Endpoint Protection clients >[!IMPORTANT] >This step is required only if your organization uses System Center Endpoint Protection (SCEP). -Windows Defender ATP integrates with System Center Endpoint Protection to provide visibility to malware detections and to stop propagation of an attack in your organization by banning potentially malicious files or suspected malware. +Microsoft Defender ATP integrates with System Center Endpoint Protection to provide visibility to malware detections and to stop propagation of an attack in your organization by banning potentially malicious files or suspected malware. The following steps are required to enable this integration: - Install the [January 2017 anti-malware platform update for Endpoint Protection clients](https://support.microsoft.com/help/3209361/january-2017-anti-malware-platform-update-for-endpoint-protection-clie) - Configure the SCEP client Cloud Protection Service membership to the **Advanced** setting - Configure your network to allow connections to the Windows Defender Antivirus cloud. For more information, see [Allow connections to the Windows Defender Antivirus cloud](https://docs.microsoft.com/windows/security/threat-protection/windows-defender-antivirus/configure-network-connections-windows-defender-antivirus#allow-connections-to-the-windows-defender-antivirus-cloud) -## Install and configure Microsoft Monitoring Agent (MMA) to report sensor data to Windows Defender ATP +## Install and configure Microsoft Monitoring Agent (MMA) to report sensor data to Microsoft Defender ATP ### Before you begin Review the following details to verify minimum system requirements: @@ -77,7 +77,7 @@ Review the following details to verify minimum system requirements: 1. Download the agent setup file: [Windows 64-bit agent](https://go.microsoft.com/fwlink/?LinkId=828603) or [Windows 32-bit agent](https://go.microsoft.com/fwlink/?LinkId=828604). 2. Obtain the workspace ID: - - In the Windows Defender ATP navigation pane, select **Settings > Machine management > Onboarding** + - In the Microsoft Defender ATP navigation pane, select **Settings > Machine management > Onboarding** - Select **Windows 7 SP1 and 8.1** as the operating system - Copy the workspace ID and workspace key @@ -93,7 +93,7 @@ Once completed, you should see onboarded endpoints in the portal within an hour. ### Configure proxy and Internet connectivity settings - Each Windows endpoint must be able to connect to the Internet using HTTPS. This connection can be direct, using a proxy, or through the [OMS Gateway](https://docs.microsoft.com/en-us/azure/log-analytics/log-analytics-oms-gateway). -- If a proxy or firewall is blocking all traffic by default and allowing only specific domains through or HTTPS scanning (SSL inspection) is enabled, make sure that the following URLs are white-listed to permit communication with Windows Defender ATP service: +- If a proxy or firewall is blocking all traffic by default and allowing only specific domains through or HTTPS scanning (SSL inspection) is enabled, make sure that the following URLs are white-listed to permit communication with Microsoft Defender ATP service: Agent Resource | Ports :---|:--- @@ -110,9 +110,9 @@ Agent Resource | Ports ## Offboard client endpoints -To offboard, you can uninstall the MMA agent from the endpoint or detach it from reporting to your Windows Defender ATP workspace. After offboarding the agent, the endpoint will no longer send sensor data to Windows Defender ATP. +To offboard, you can uninstall the MMA agent from the endpoint or detach it from reporting to your Microsoft Defender ATP workspace. After offboarding the agent, the endpoint will no longer send sensor data to Microsoft Defender ATP. ->Want to experience Windows Defender ATP? [Sign up for a free trial.](https://www.microsoft.com/en-us/WindowsForBusiness/windows-atp?ocid=docs-wdatp-downlevele-belowfoldlink) +>Want to experience Microsoft Defender ATP? [Sign up for a free trial.](https://www.microsoft.com/en-us/WindowsForBusiness/windows-atp?ocid=docs-wdatp-downlevele-belowfoldlink) diff --git a/windows/security/threat-protection/microsoft-defender-atp/onboard.md b/windows/security/threat-protection/microsoft-defender-atp/onboard.md index 319d254a8e..9bb3eaa985 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/onboard.md +++ b/windows/security/threat-protection/microsoft-defender-atp/onboard.md @@ -1,6 +1,6 @@ --- -title: Configure and manage Windows Defender ATP capabilities -description: Configure and manage Windows Defender ATP capabilities such as attack surface reduction, next generation protection, and security controls +title: Configure and manage Microsoft Defender ATP capabilities +description: Configure and manage Microsoft Defender ATP capabilities such as attack surface reduction, next generation protection, and security controls keywords: configure, manage, capabilities, attack surface reduction, next generation protection, security controls, endpoint detection and response, auto investigation and remediation, security controls, controls search.product: eADQiWindows 10XVcnh search.appverid: met150 @@ -18,12 +18,12 @@ ms.topic: conceptual ms.date: 09/03/2018 --- -# Configure and manage Windows Defender ATP capabilities +# Configure and manage Microsoft Defender ATP capabilities **Applies to:** -- [Windows Defender Advanced Threat Protection (Windows Defender ATP)](https://go.microsoft.com/fwlink/p/?linkid=2069559) +- [Microsoft Defender Advanced Threat Protection (Microsoft Defender ATP)](https://go.microsoft.com/fwlink/p/?linkid=2069559) -Configure and manage all the Windows Defender ATP capabilities to get the best security protection for your organization. +Configure and manage all the Microsoft Defender ATP capabilities to get the best security protection for your organization. ## In this section @@ -32,7 +32,7 @@ Topic | Description [Configure attack surface reduction capabilities](configure-attack-surface-reduction.md) | By ensuring configuration settings are properly set and exploit mitigation techniques are applied, these set of capabilities resist attacks and exploitations. [Configure next generation protection](../windows-defender-antivirus/configure-windows-defender-antivirus-features.md) | Configure next generation protection to catch all types of emerging threats. [Configure Secure score dashboard security controls](secure-score-dashboard-windows-defender-advanced-threat-protection.md) | Configure the security controls in Secure score to increase the security posture of your organization. -Configure Microsoft Threat Protection integration| Configure other solutions that integrate with Windows Defender ATP. +Configure Microsoft Threat Protection integration| Configure other solutions that integrate with Microsoft Defender ATP. Management and API support| Pull alerts to your SIEM or use APIs to create custom alerts. Create and build Power BI reports. [Configure Windows Defender Security Center settings](preferences-setup-windows-defender-advanced-threat-protection.md) | Configure portal related settings such as general settings, advanced features, enable the preview experience and others. diff --git a/windows/security/threat-protection/microsoft-defender-atp/overview-attack-surface-reduction.md b/windows/security/threat-protection/microsoft-defender-atp/overview-attack-surface-reduction.md index c2617a285e..f5e0f9e489 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/overview-attack-surface-reduction.md +++ b/windows/security/threat-protection/microsoft-defender-atp/overview-attack-surface-reduction.md @@ -1,6 +1,6 @@ --- title: Overview of attack surface reduction -description: Learn about the attack surface reduction capability in Windows Defender ATP +description: Learn about the attack surface reduction capability in Microsoft Defender ATP keywords: search.product: eADQiWindows 10XVcnh search.appverid: met150 @@ -21,9 +21,9 @@ ms.date: 02/21/2019 # Overview of attack surface reduction **Applies to:** -- [Windows Defender Advanced Threat Protection (Windows Defender ATP)](https://go.microsoft.com/fwlink/p/?linkid=2069559) +- [Microsoft Defender Advanced Threat Protection (Microsoft Defender ATP)](https://go.microsoft.com/fwlink/p/?linkid=2069559) -Attack surface reduction capabilities in Windows Defender ATP helps protect the devices and applications in your organization from new and emerging threats. +Attack surface reduction capabilities in Microsoft Defender ATP helps protect the devices and applications in your organization from new and emerging threats. | Capability | Description | |------------|-------------| diff --git a/windows/security/threat-protection/microsoft-defender-atp/overview-custom-detections.md b/windows/security/threat-protection/microsoft-defender-atp/overview-custom-detections.md index 13268d34ad..8101a199e5 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/overview-custom-detections.md +++ b/windows/security/threat-protection/microsoft-defender-atp/overview-custom-detections.md @@ -21,10 +21,10 @@ ms.date: 10/29/2018 # Custom detections overview **Applies to:** -- [Windows Defender Advanced Threat Protection (Windows Defender ATP)](https://go.microsoft.com/fwlink/p/?linkid=2069559) +- [Microsoft Defender Advanced Threat Protection (Microsoft Defender ATP)](https://go.microsoft.com/fwlink/p/?linkid=2069559) -Alerts in Windows Defender ATP are surfaced through the system based on signals gathered from endpoints. With custom detections, you can create custom queries to monitor events for any kind of behavior such as suspicious or emerging threats. +Alerts in Microsoft Defender ATP are surfaced through the system based on signals gathered from endpoints. With custom detections, you can create custom queries to monitor events for any kind of behavior such as suspicious or emerging threats. This can be done by leveraging the power of Advanced hunting through the creation of custom detection rules. Custom detections are queries that run periodically every 24 hours and can be configured so that when the query meets the criteria you set, alerts are created and are surfaced in Windows Defender Security Center. These alerts will be treated like any other alert in the system. diff --git a/windows/security/threat-protection/microsoft-defender-atp/overview-endpoint-detection-response.md b/windows/security/threat-protection/microsoft-defender-atp/overview-endpoint-detection-response.md index 1fb9eea8e2..0d954897a9 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/overview-endpoint-detection-response.md +++ b/windows/security/threat-protection/microsoft-defender-atp/overview-endpoint-detection-response.md @@ -1,6 +1,6 @@ --- title: Overview of endpoint detection and response capabilities -description: Learn about the endpoint detection and response capabilities in Windows Defender ATP +description: Learn about the endpoint detection and response capabilities in Microsoft Defender ATP keywords: search.product: eADQiWindows 10XVcnh search.appverid: met150 @@ -22,13 +22,13 @@ ms.date: 09/03/2018 **Applies to:** -- [Windows Defender Advanced Threat Protection (Windows Defender ATP)](https://go.microsoft.com/fwlink/p/?linkid=2069559) +- [Microsoft Defender Advanced Threat Protection (Microsoft Defender ATP)](https://go.microsoft.com/fwlink/p/?linkid=2069559) -Windows Defender ATP endpoint detection and response capabilities provide advanced attack detections that are near real-time and actionable. Security analysts can prioritize alerts effectively, gain visibility into the full scope of a breach, and take response actions to remediate threats. +Microsoft Defender ATP endpoint detection and response capabilities provide advanced attack detections that are near real-time and actionable. Security analysts can prioritize alerts effectively, gain visibility into the full scope of a breach, and take response actions to remediate threats. When a threat is detected, alerts are created in the system for an analyst to investigate. Alerts with the same attack techniques or attributed to the same attacker are aggregated into an entity called an _incident_. Aggregating alerts in this manner makes it easy for analysts to collectively investigate and respond to threats. -Inspired by the "assume breach" mindset, Windows Defender ATP continuously collects behavioral cyber telemetry. This includes process information, network activities, deep optics into the kernel and memory manager, user login activities, registry and file system changes, and others. The information is stored for six months, enabling an analyst to travel back in time to the start of an attack. The analyst can then pivot in various views and approach an investigation through multiple vectors. +Inspired by the "assume breach" mindset, Microsoft Defender ATP continuously collects behavioral cyber telemetry. This includes process information, network activities, deep optics into the kernel and memory manager, user login activities, registry and file system changes, and others. The information is stored for six months, enabling an analyst to travel back in time to the start of an attack. The analyst can then pivot in various views and approach an investigation through multiple vectors. The response capabilities give you the power to promptly remediate threats by acting on the affected entities. diff --git a/windows/security/threat-protection/microsoft-defender-atp/overview-hardware-based-isolation.md b/windows/security/threat-protection/microsoft-defender-atp/overview-hardware-based-isolation.md index b86fea8fb4..2c91a25599 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/overview-hardware-based-isolation.md +++ b/windows/security/threat-protection/microsoft-defender-atp/overview-hardware-based-isolation.md @@ -18,9 +18,9 @@ ms.date: 09/07/2018 # Hardware-based isolation in Windows 10 -**Applies to:** [Windows Defender Advanced Threat Protection (Windows Defender ATP)](https://go.microsoft.com/fwlink/p/?linkid=2069559) +**Applies to:** [Microsoft Defender Advanced Threat Protection (Microsoft Defender ATP)](https://go.microsoft.com/fwlink/p/?linkid=2069559) -Hardware-based isolation helps protect system integrity in Windows 10 and is integrated with Windows Defender ATP. +Hardware-based isolation helps protect system integrity in Windows 10 and is integrated with Microsoft Defender ATP. | Feature | Description | |------------|-------------| diff --git a/windows/security/threat-protection/microsoft-defender-atp/overview-hunting.md b/windows/security/threat-protection/microsoft-defender-atp/overview-hunting.md index 8d95c6f102..6742a95514 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/overview-hunting.md +++ b/windows/security/threat-protection/microsoft-defender-atp/overview-hunting.md @@ -20,7 +20,7 @@ ms.date: 09/12/2018 # Overview of advanced hunting **Applies to:** -- [Windows Defender Advanced Threat Protection (Windows Defender ATP)](https://go.microsoft.com/fwlink/p/?linkid=2069559) +- [Microsoft Defender Advanced Threat Protection (Microsoft Defender ATP)](https://go.microsoft.com/fwlink/p/?linkid=2069559) Advanced hunting allows you to hunt for possible threats across your organization using a powerful search and query tool. You can also create custom detection rules based on the queries you created and surface alerts in Windows Defender Security Center. diff --git a/windows/security/threat-protection/microsoft-defender-atp/overview-secure-score.md b/windows/security/threat-protection/microsoft-defender-atp/overview-secure-score.md index 33671e8778..3d27aa1319 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/overview-secure-score.md +++ b/windows/security/threat-protection/microsoft-defender-atp/overview-secure-score.md @@ -20,7 +20,7 @@ ms.date: 09/03/2018 # Overview of Secure score in Windows Defender Security Center **Applies to:** -- [Windows Defender Advanced Threat Protection (Windows Defender ATP)](https://go.microsoft.com/fwlink/p/?linkid=2069559) +- [Microsoft Defender Advanced Threat Protection (Microsoft Defender ATP)](https://go.microsoft.com/fwlink/p/?linkid=2069559) The Secure score dashboard expands your visibility into the overall security posture of your organization. From this dashboard, you'll be able to quickly assess the security posture of your organization, see machines that require attention, as well as recommendations for actions to further reduce the attack surface in your organization - all in one place. From there you can take action based on the recommended configuration baselines. diff --git a/windows/security/threat-protection/microsoft-defender-atp/overview.md b/windows/security/threat-protection/microsoft-defender-atp/overview.md index f9989d69f7..84d99f3816 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/overview.md +++ b/windows/security/threat-protection/microsoft-defender-atp/overview.md @@ -1,5 +1,5 @@ --- -title: Overview of Windows Defender ATP +title: Overview of Microsoft Defender ATP description: keywords: search.product: eADQiWindows 10XVcnh @@ -18,28 +18,28 @@ ms.topic: conceptual ms.date: 11/20/2018 --- -# Overview of Windows Defender ATP capabilities +# Overview of Microsoft Defender ATP capabilities **Applies to:** -- [Windows Defender Advanced Threat Protection (Windows Defender ATP)](https://go.microsoft.com/fwlink/p/?linkid=2069559) +- [Microsoft Defender Advanced Threat Protection (Microsoft Defender ATP)](https://go.microsoft.com/fwlink/p/?linkid=2069559) -Understand the concepts behind the capabilities in Windows Defender ATP so you take full advantage of the complete threat protection platform. +Understand the concepts behind the capabilities in Microsoft Defender ATP so you take full advantage of the complete threat protection platform. >[!TIP] ->- Learn about the latest enhancements in Windows Defender ATP: [What's new in Windows Defender ATP](https://cloudblogs.microsoft.com/microsoftsecure/2018/11/15/whats-new-in-windows-defender-atp/). ->- Windows Defender ATP demonstrated industry-leading optics and detection capabilities in the recent MITRE evaluation. Read: [Insights from the MITRE ATT&CK-based evaluation](https://cloudblogs.microsoft.com/microsoftsecure/2018/12/03/insights-from-the-mitre-attack-based-evaluation-of-windows-defender-atp/). +>- Learn about the latest enhancements in Microsoft Defender ATP: [What's new in Microsoft Defender ATP](https://cloudblogs.microsoft.com/microsoftsecure/2018/11/15/whats-new-in-windows-defender-atp/). +>- Microsoft Defender ATP demonstrated industry-leading optics and detection capabilities in the recent MITRE evaluation. Read: [Insights from the MITRE ATT&CK-based evaluation](https://cloudblogs.microsoft.com/microsoftsecure/2018/12/03/insights-from-the-mitre-attack-based-evaluation-of-windows-defender-atp/). ## In this section Topic | Description :---|:--- [Attack surface reduction](overview-attack-surface-reduction.md) | Leverage the attack surface reduction capabilities to protect the perimeter of your organization. -[Next generation protection](../windows-defender-antivirus/windows-defender-antivirus-in-windows-10.md) | Learn about the antivirus capabilities in Windows Defender ATP so you can protect desktops, portable computers, and servers. -[Endpoint detection and response](overview-endpoint-detection-response.md) | Understand how Windows Defender ATP continuously monitors your organization for possible attacks against systems, networks, or users in your organization and the features you can use to mitigate and remediate threats. -[Automated investigation and remediation](automated-investigations-windows-defender-advanced-threat-protection.md) | In conjunction with being able to quickly respond to advanced attacks, Windows Defender ATP offers automatic investigation and remediation capabilities that help reduce the volume of alerts in minutes at scale. +[Next generation protection](../windows-defender-antivirus/windows-defender-antivirus-in-windows-10.md) | Learn about the antivirus capabilities in Microsoft Defender ATP so you can protect desktops, portable computers, and servers. +[Endpoint detection and response](overview-endpoint-detection-response.md) | Understand how Microsoft Defender ATP continuously monitors your organization for possible attacks against systems, networks, or users in your organization and the features you can use to mitigate and remediate threats. +[Automated investigation and remediation](automated-investigations-windows-defender-advanced-threat-protection.md) | In conjunction with being able to quickly respond to advanced attacks, Microsoft Defender ATP offers automatic investigation and remediation capabilities that help reduce the volume of alerts in minutes at scale. [Secure score](overview-secure-score-windows-defender-advanced-threat-protection.md) | Quickly assess the security posture of your organization, see machines that require attention, as well as recommendations for actions to better protect your organization - all in one place. [Advanced hunting](overview-hunting-windows-defender-advanced-threat-protection.md) | Use a powerful search and query language to create custom queries and detection rules. -[Management and APIs](management-apis.md) | Windows Defender ATP supports a wide variety of tools to help you manage and interact with the platform so that you can integrate the service into your existing workflows. +[Management and APIs](management-apis.md) | Microsoft Defender ATP supports a wide variety of tools to help you manage and interact with the platform so that you can integrate the service into your existing workflows. [Microsoft Threat Protection](threat-protection-integration.md) | Microsoft security products work better together. Learn about other security capabilities in the Microsoft threat protection stack. [Portal overview](portal-overview-windows-defender-advanced-threat-protection.md) |Learn to navigate your way around Windows Defender Security Center. diff --git a/windows/security/threat-protection/microsoft-defender-atp/portal-overview.md b/windows/security/threat-protection/microsoft-defender-atp/portal-overview.md index 352394a662..7a4701750d 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/portal-overview.md +++ b/windows/security/threat-protection/microsoft-defender-atp/portal-overview.md @@ -1,5 +1,5 @@ --- -title: Windows Defender Advanced Threat Protection portal overview +title: Microsoft Defender Advanced Threat Protection portal overview description: Use Windows Defender Security Center to monitor your enterprise network and assist in responding to alerts to potential advanced persistent threat (APT) activity or data breaches. keywords: Windows Defender Security Center, portal, cybersecurity threat intelligence, dashboard, alerts queue, machines list, settings, machine management, advanced attacks search.product: eADQiWindows 10XVcnh @@ -18,26 +18,26 @@ ms.topic: conceptual ms.date: 04/24/2018 --- -# Windows Defender Advanced Threat Protection portal overview +# Microsoft Defender Advanced Threat Protection portal overview **Applies to:** -- [Windows Defender Advanced Threat Protection (Windows Defender ATP)](https://go.microsoft.com/fwlink/p/?linkid=2069559) +- [Microsoft Defender Advanced Threat Protection (Microsoft Defender ATP)](https://go.microsoft.com/fwlink/p/?linkid=2069559) ->Want to experience Windows Defender ATP? [Sign up for a free trial.](https://www.microsoft.com/en-us/WindowsForBusiness/windows-atp?ocid=docs-wdatp-portaloverview-abovefoldlink) +>Want to experience Microsoft Defender ATP? [Sign up for a free trial.](https://www.microsoft.com/en-us/WindowsForBusiness/windows-atp?ocid=docs-wdatp-portaloverview-abovefoldlink) Enterprise security teams can use Windows Defender Security Center to monitor and assist in responding to alerts of potential advanced persistent threat (APT) activity or data breaches. You can use [Windows Defender Security Center](https://securitycenter.windows.com/) to: - View, sort, and triage alerts from your endpoints - Search for more information on observed indicators such as files and IP Addresses -- Change Windows Defender ATP settings, including time zone and review licensing information. +- Change Microsoft Defender ATP settings, including time zone and review licensing information. ## Windows Defender Security Center When you open the portal, you’ll see the main areas of the application: - ![Windows Defender Advanced Threat Protection portal](images/dashboard.png) + ![Microsoft Defender Advanced Threat Protection portal](images/dashboard.png) - (1) Navigation pane - (2) Main portal @@ -56,18 +56,18 @@ Area | Description **Alerts** | View alerts generated from machines in your organizations. **Automated investigations** | Displays a list of automated investigations that's been conducted in the network, the status of each investigation and other details such as when the investigation started and the duration of the investigation. **Advanced hunting** | Advanced hunting allows you to proactively hunt and investigate across your organization using a powerful search and query tool. -**Machines list** | Displays the list of machines that are onboarded to Windows Defender ATP, some information about them, and the corresponding number of alerts. +**Machines list** | Displays the list of machines that are onboarded to Microsoft Defender ATP, some information about them, and the corresponding number of alerts. **Service health** | Provides information on the current status of the Window Defender ATP service. You'll be able to verify that the service health is healthy or if there are current issues. **Settings** | Shows the settings you selected during onboarding and lets you update your industry preferences and retention policy period. You can also set other configuration settings such as email notifications, activate the preview experience, enable or turn off advanced features, SIEM integration, threat intel API, build Power BI reports, and set baselines for the Secure Score dashboard. **(2) Main portal** | Main area where you will see the different views such as the Dashboards, Alerts queue, and Machines list. -**(3) Community center, Time settings, Help and support, Feedback** | **Community center** -Access the Community center to learn, collaborate, and share experiences about the product.

**Time settings** - Gives you access to the configuration settings where you can set time zones and view license information.

**Help and support** - Gives you access to the Windows Defender ATP guide, Microsoft support, and Premier support.

**Feedback** - Access the feedback button to provide comments about the portal. +**(3) Community center, Time settings, Help and support, Feedback** | **Community center** -Access the Community center to learn, collaborate, and share experiences about the product.

**Time settings** - Gives you access to the configuration settings where you can set time zones and view license information.

**Help and support** - Gives you access to the Microsoft Defender ATP guide, Microsoft support, and Premier support.

**Feedback** - Access the feedback button to provide comments about the portal. -## Windows Defender ATP icons +## Microsoft Defender ATP icons The following table provides information on the icons used all throughout the portal: Icon | Description :---|:--- -![ATP logo icon](images\atp-logo-icon.png)| Windows Defender ATP logo +![ATP logo icon](images\atp-logo-icon.png)| Microsoft Defender ATP logo ![Alert icon](images\alert-icon.png)| Alert – Indication of an activity correlated with advanced attacks. ![Detection icon](images\detection-icon.png)| Detection – Indication of a malware threat detection. ![Active threat icon](images\active-threat-icon.png)| Active threat – Threats actively executing at the time of detection. @@ -111,7 +111,7 @@ Icon | Description ## Related topics -- [Understand the Windows Defender Advanced Threat Protection portal](use-windows-defender-advanced-threat-protection.md) +- [Understand the Microsoft Defender Advanced Threat Protection portal](use-windows-defender-advanced-threat-protection.md) - [View the Security operations dashboard](security-operations-dashboard-windows-defender-advanced-threat-protection.md) - [View the Secure Score dashboard and improve your secure score](secure-score-dashboard-windows-defender-advanced-threat-protection.md) - [View the Threat analytics dashboard and take recommended mitigation actions](threat-analytics-dashboard-windows-defender-advanced-threat-protection.md) \ No newline at end of file diff --git a/windows/security/threat-protection/microsoft-defender-atp/post-ti-indicator.md b/windows/security/threat-protection/microsoft-defender-atp/post-ti-indicator.md index 1116788ea1..cbeeeeb7ef 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/post-ti-indicator.md +++ b/windows/security/threat-protection/microsoft-defender-atp/post-ti-indicator.md @@ -20,7 +20,7 @@ ms.date: 12/08/2017 # Submit or Update Indicator API **Applies to:** -- [Windows Defender Advanced Threat Protection (Windows Defender ATP)](https://go.microsoft.com/fwlink/p/?linkid=2069559) +- [Microsoft Defender Advanced Threat Protection (Microsoft Defender ATP)](https://go.microsoft.com/fwlink/p/?linkid=2069559) [!include[Prerelease information](prerelease.md)] diff --git a/windows/security/threat-protection/microsoft-defender-atp/powerbi-reports.md b/windows/security/threat-protection/microsoft-defender-atp/powerbi-reports.md index faa5965b72..0d4640bbf3 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/powerbi-reports.md +++ b/windows/security/threat-protection/microsoft-defender-atp/powerbi-reports.md @@ -1,6 +1,6 @@ --- -title: Create and build Power BI reports using Windows Defender ATP data -description: Get security insights by creating and building Power BI dashboards using data from Windows Defender ATP and other data sources. +title: Create and build Power BI reports using Microsoft Defender ATP data +description: Get security insights by creating and building Power BI dashboards using data from Microsoft Defender ATP and other data sources. keywords: settings, power bi, power bi service, power bi desktop, reports, dashboards, connectors , security insights, mashup search.product: eADQiWindows 10XVcnh search.appverid: met150 @@ -18,10 +18,10 @@ ms.date: 11/26/2018 --- -# Create and build Power BI reports using Windows Defender ATP data +# Create and build Power BI reports using Microsoft Defender ATP data **Applies to:** -- [Windows Defender Advanced Threat Protection (Windows Defender ATP)](https://go.microsoft.com/fwlink/p/?linkid=2069559) +- [Microsoft Defender Advanced Threat Protection (Microsoft Defender ATP)](https://go.microsoft.com/fwlink/p/?linkid=2069559) [!include[Prerelease information](prerelease.md)] @@ -29,11 +29,11 @@ ms.date: 11/26/2018 >[!TIP] >Go to **Advanced features** in the **Settings** page to turn on the preview features. ->Want to experience Windows Defender ATP? [Sign up for a free trial.](https://www.microsoft.com/en-us/WindowsForBusiness/windows-atp?ocid=docs-wdatp-powerbireports-abovefoldlink) +>Want to experience Microsoft Defender ATP? [Sign up for a free trial.](https://www.microsoft.com/en-us/WindowsForBusiness/windows-atp?ocid=docs-wdatp-powerbireports-abovefoldlink) -Understand the security status of your organization, including the status of machines, alerts, and investigations using the Windows Defender ATP reporting feature that integrates with Power BI. +Understand the security status of your organization, including the status of machines, alerts, and investigations using the Microsoft Defender ATP reporting feature that integrates with Power BI. -Windows Defender ATP supports the use of Power BI data connectors to enable you to connect and access Windows Defender ATP data using Microsoft Graph. +Microsoft Defender ATP supports the use of Power BI data connectors to enable you to connect and access Microsoft Defender ATP data using Microsoft Graph. Data connectors integrate seamlessly in Power BI, and make it easy for power users to query, shape and combine data to build reports and dashboards that meet the needs of your organization. @@ -43,8 +43,8 @@ You can easily get started by: You can access these options from Windows Defender Security Center. Both the Power BI service and Power BI Desktop are supported. -## Create a Windows Defender ATP dashboard on Power BI service -Windows Defender ATP makes it easy to create a Power BI dashboard by providing an option straight from the portal. +## Create a Microsoft Defender ATP dashboard on Power BI service +Microsoft Defender ATP makes it easy to create a Power BI dashboard by providing an option straight from the portal. 1. In the navigation pane, select **Settings** > **Power BI reports**. @@ -66,11 +66,11 @@ Windows Defender ATP makes it easy to create a Power BI dashboard by providing a ![Image of Power BI authentication method](images/atp-powerbi-extension.png) -4. Click **Sign in**. If this is the first time you’re using Power BI with Windows Defender ATP, you’ll need to sign in and give consent to Windows Defender ATP Power BI app. By providing consent, you’re allowing Windows Defender ATP Power BI to sign in and read your profile, access your data, and be used for report refresh. +4. Click **Sign in**. If this is the first time you’re using Power BI with Microsoft Defender ATP, you’ll need to sign in and give consent to Microsoft Defender ATP Power BI app. By providing consent, you’re allowing Microsoft Defender ATP Power BI to sign in and read your profile, access your data, and be used for report refresh. ![Consent image](images/atp-powerbi-accept.png) -5. Click **Accept**. Power BI service will start downloading your Windows Defender ATP data from Microsoft Graph. After a successful login, you'll see a notification that data is being imported: +5. Click **Accept**. Power BI service will start downloading your Microsoft Defender ATP data from Microsoft Graph. After a successful login, you'll see a notification that data is being imported: ![Image of importing data](images/atp-powerbi-importing.png) @@ -96,9 +96,9 @@ For more information, see [Create a Power BI dashboard from a report](https://po ![Image of Microsoft AppSource to get data](images/atp-get-data.png) -4. In the AppSource window, select **Apps** and search for Windows Defender Advanced Threat Protection. +4. In the AppSource window, select **Apps** and search for Microsoft Defender Advanced Threat Protection. - ![Image of AppSource to get Windows Defender ATP](images/atp-appsource.png) + ![Image of AppSource to get Microsoft Defender ATP](images/atp-appsource.png) 5. Click **Get it now**. @@ -109,11 +109,11 @@ For more information, see [Create a Power BI dashboard from a report](https://po ![Image of Power BI authentication method](images/atp-powerbi-extension.png) -7. Click **Sign in**. If this is the first time you’re using Power BI with Windows Defender ATP, you’ll need to sign in and give consent to Windows Defender ATP Power BI app. By providing consent, you’re allowing Windows Defender ATP Power BI to sign in and read your profile, access your data, and be used for report refresh. +7. Click **Sign in**. If this is the first time you’re using Power BI with Microsoft Defender ATP, you’ll need to sign in and give consent to Microsoft Defender ATP Power BI app. By providing consent, you’re allowing Microsoft Defender ATP Power BI to sign in and read your profile, access your data, and be used for report refresh. ![Consent image](images/atp-powerbi-accept.png) -8. Click **Accept**. Power BI service will start downloading your Windows Defender ATP data from Microsoft Graph. After a successful login, you'll see a notification that data is being imported: +8. Click **Accept**. Power BI service will start downloading your Microsoft Defender ATP data from Microsoft Graph. After a successful login, you'll see a notification that data is being imported: ![Image of importing data](images/atp-powerbi-importing.png) @@ -127,7 +127,7 @@ For more information, see [Create a Power BI dashboard from a report](https://po 9. Click **View dataset** to explore your data. -## Build a custom Windows Defender ATP dashboard in Power BI Desktop +## Build a custom Microsoft Defender ATP dashboard in Power BI Desktop You can create a custom dashboard in Power BI Desktop to create visualizations that cater to the specific views that your organization requires. ### Before you begin @@ -158,23 +158,23 @@ You can create a custom dashboard in Power BI Desktop to create visualizations t 9. Restart Power BI Desktop. -## Customize the Windows Defender ATP Power BI dashboard +## Customize the Microsoft Defender ATP Power BI dashboard After completing the steps in the Before you begin section, you can proceed with building your custom dashboard. 1. Open WDATPPowerBI.pbit from the zip with Power BI Desktop. -2. If this is the first time you’re using Power BI with Windows Defender ATP, you’ll need to sign in and give consent to Windows Defender ATP Power BI app. By providing consent, you’re allowing Windows Defender ATP Power BI to sign in and read your profile, and access your data. +2. If this is the first time you’re using Power BI with Microsoft Defender ATP, you’ll need to sign in and give consent to Microsoft Defender ATP Power BI app. By providing consent, you’re allowing Microsoft Defender ATP Power BI to sign in and read your profile, and access your data. ![Consent image](images/atp-powerbi-consent.png) -3. Click **Accept**. Power BI Desktop will start downloading your Windows Defender ATP data from Microsoft Graph. When all data has been downloaded, you can proceed to customize your reports. +3. Click **Accept**. Power BI Desktop will start downloading your Microsoft Defender ATP data from Microsoft Graph. When all data has been downloaded, you can proceed to customize your reports. -## Mashup Windows Defender ATP data with other data sources -You can use Power BI Desktop to analyse data from Windows Defender ATP and mash that data up with other data sources to gain better security perspective in your organization. +## Mashup Microsoft Defender ATP data with other data sources +You can use Power BI Desktop to analyse data from Microsoft Defender ATP and mash that data up with other data sources to gain better security perspective in your organization. -1. In Power BI Desktop, in the Home ribbon, click **Get data** and search for **Windows Defender Advanced Threat Protection**. +1. In Power BI Desktop, in the Home ribbon, click **Get data** and search for **Microsoft Defender Advanced Threat Protection**. ![Get data in Power BI](images/atp-powerbi-get-data.png) @@ -184,13 +184,13 @@ You can use Power BI Desktop to analyse data from Windows Defender ATP and mash ![Power BI preview connector](images/atp-powerbi-preview.png) -4. If this is the first time you’re using Power BI with Windows Defender ATP, you’ll need to sign in and give consent to Windows Defender ATP Power BI app. By providing consent, you’re allowing Windows Defender ATP Power BI to sign in and read your profile, and access your data. +4. If this is the first time you’re using Power BI with Microsoft Defender ATP, you’ll need to sign in and give consent to Microsoft Defender ATP Power BI app. By providing consent, you’re allowing Microsoft Defender ATP Power BI to sign in and read your profile, and access your data. ![Consent image](images/atp-powerbi-consent.png) -5. Click **Accept**. Power BI Desktop will start downloading your Windows Defender ATP data from Microsoft Graph. When all data has been downloaded, you can proceed to customize your reports. +5. Click **Accept**. Power BI Desktop will start downloading your Microsoft Defender ATP data from Microsoft Graph. When all data has been downloaded, you can proceed to customize your reports. -6. In the Navigator dialog box, select the Windows Defender ATP feeds you'd like to download and use in your reports and click Load. Data will start to be downloaded from the Microsoft Graph. +6. In the Navigator dialog box, select the Microsoft Defender ATP feeds you'd like to download and use in your reports and click Load. Data will start to be downloaded from the Microsoft Graph. ![Power BI navigator page](images/atp-powerbi-navigator.png) diff --git a/windows/security/threat-protection/microsoft-defender-atp/powershell-example-code.md b/windows/security/threat-protection/microsoft-defender-atp/powershell-example-code.md index 4a47170925..6847252b33 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/powershell-example-code.md +++ b/windows/security/threat-protection/microsoft-defender-atp/powershell-example-code.md @@ -21,7 +21,7 @@ ms.date: 04/24/2018 # PowerShell code examples for the custom threat intelligence API **Applies to:** -- [Windows Defender Advanced Threat Protection (Windows Defender ATP)](https://go.microsoft.com/fwlink/p/?linkid=2069559) +- [Microsoft Defender Advanced Threat Protection (Microsoft Defender ATP)](https://go.microsoft.com/fwlink/p/?linkid=2069559) @@ -175,12 +175,12 @@ $ioc = ``` ->Want to experience Windows Defender ATP? [Sign up for a free trial.](https://www.microsoft.com/en-us/WindowsForBusiness/windows-atp?ocid=docs-wdatp-psexample-belowfoldlink) +>Want to experience Microsoft Defender ATP? [Sign up for a free trial.](https://www.microsoft.com/en-us/WindowsForBusiness/windows-atp?ocid=docs-wdatp-psexample-belowfoldlink) ## Related topics - [Understand threat intelligence concepts](threat-indicator-concepts-windows-defender-advanced-threat-protection.md) -- [Enable the custom threat intelligence API in Windows Defender ATP](enable-custom-ti-windows-defender-advanced-threat-protection.md) +- [Enable the custom threat intelligence API in Microsoft Defender ATP](enable-custom-ti-windows-defender-advanced-threat-protection.md) - [Create custom alerts using the threat intelligence API](custom-ti-api-windows-defender-advanced-threat-protection.md) - [Python code examples for the custom threat intelligence API](python-example-code-windows-defender-advanced-threat-protection.md) - [Experiment with custom threat intelligence alerts](experiment-custom-ti-windows-defender-advanced-threat-protection.md) diff --git a/windows/security/threat-protection/microsoft-defender-atp/preferences-setup.md b/windows/security/threat-protection/microsoft-defender-atp/preferences-setup.md index 91b8900c14..d9035a183b 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/preferences-setup.md +++ b/windows/security/threat-protection/microsoft-defender-atp/preferences-setup.md @@ -20,9 +20,9 @@ ms.date: 04/24/2018 # Configure Windows Defender Security Center settings **Applies to:** -- [Windows Defender Advanced Threat Protection (Windows Defender ATP)](https://go.microsoft.com/fwlink/p/?linkid=2069559) +- [Microsoft Defender Advanced Threat Protection (Microsoft Defender ATP)](https://go.microsoft.com/fwlink/p/?linkid=2069559) ->Want to experience Windows Defender ATP? [Sign up for a free trial.](https://www.microsoft.com/en-us/WindowsForBusiness/windows-atp?ocid=docs-wdatp-prefsettings-abovefoldlink) +>Want to experience Microsoft Defender ATP? [Sign up for a free trial.](https://www.microsoft.com/en-us/WindowsForBusiness/windows-atp?ocid=docs-wdatp-prefsettings-abovefoldlink) Use the **Settings** menu to modify general settings, advanced features, enable the preview experience, email notifications, and the custom threat intelligence feature. diff --git a/windows/security/threat-protection/microsoft-defender-atp/preview-settings.md b/windows/security/threat-protection/microsoft-defender-atp/preview-settings.md index 66f745bb56..1e98001f5e 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/preview-settings.md +++ b/windows/security/threat-protection/microsoft-defender-atp/preview-settings.md @@ -1,6 +1,6 @@ --- -title: Turn on the preview experience in Windows Defender ATP -description: Turn on the preview experience in Windows Defender Advanced Threat Protection to try upcoming features. +title: Turn on the preview experience in Microsoft Defender ATP +description: Turn on the preview experience in Microsoft Defender Advanced Threat Protection to try upcoming features. keywords: advanced features, settings, block file search.product: eADQiWindows 10XVcnh search.appverid: met150 @@ -17,14 +17,14 @@ ms.collection: M365-security-compliance ms.topic: article ms.date: 04/24/2018 --- -# Turn on the preview experience in Windows Defender ATP +# Turn on the preview experience in Microsoft Defender ATP **Applies to:** -- [Windows Defender Advanced Threat Protection (Windows Defender ATP)](https://go.microsoft.com/fwlink/p/?linkid=2069559) +- [Microsoft Defender Advanced Threat Protection (Microsoft Defender ATP)](https://go.microsoft.com/fwlink/p/?linkid=2069559) ->Want to experience Windows Defender ATP? [Sign up for a free trial.](https://www.microsoft.com/en-us/WindowsForBusiness/windows-atp?ocid=docs-wdatp-previewsettings-abovefoldlink) +>Want to experience Microsoft Defender ATP? [Sign up for a free trial.](https://www.microsoft.com/en-us/WindowsForBusiness/windows-atp?ocid=docs-wdatp-previewsettings-abovefoldlink) Turn on the preview experience setting to be among the first to try upcoming features. @@ -36,9 +36,9 @@ Turn on the preview experience setting to be among the first to try upcoming fea 2. Toggle the setting between **On** and **Off** and select **Save preferences**. ## Related topics -- [Update general settings in Windows Defender ATP](data-retention-settings-windows-defender-advanced-threat-protection.md) -- [Turn on advanced features in Windows Defender ATP](advanced-features-windows-defender-advanced-threat-protection.md) -- [Configure email notifications in Windows Defender ATP](configure-email-notifications-windows-defender-advanced-threat-protection.md) -- [Enable SIEM integration in Windows Defender ATP](enable-siem-integration-windows-defender-advanced-threat-protection.md) -- [Enable the custom threat intelligence API in Windows Defender ATP](enable-custom-ti-windows-defender-advanced-threat-protection.md) +- [Update general settings in Microsoft Defender ATP](data-retention-settings-windows-defender-advanced-threat-protection.md) +- [Turn on advanced features in Microsoft Defender ATP](advanced-features-windows-defender-advanced-threat-protection.md) +- [Configure email notifications in Microsoft Defender ATP](configure-email-notifications-windows-defender-advanced-threat-protection.md) +- [Enable SIEM integration in Microsoft Defender ATP](enable-siem-integration-windows-defender-advanced-threat-protection.md) +- [Enable the custom threat intelligence API in Microsoft Defender ATP](enable-custom-ti-windows-defender-advanced-threat-protection.md) - [Create and build Power BI reports](powerbi-reports-windows-defender-advanced-threat-protection.md) diff --git a/windows/security/threat-protection/microsoft-defender-atp/preview.md b/windows/security/threat-protection/microsoft-defender-atp/preview.md index 934fbed168..9e361a3d44 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/preview.md +++ b/windows/security/threat-protection/microsoft-defender-atp/preview.md @@ -1,7 +1,7 @@ --- -title: Windows Defender ATP preview features -description: Learn how to access Windows Defender Advanced Threat Protection preview features. -keywords: preview, preview experience, Windows Defender Advanced Threat Protection, features, updates +title: Microsoft Defender ATP preview features +description: Learn how to access Microsoft Defender Advanced Threat Protection preview features. +keywords: preview, preview experience, Microsoft Defender Advanced Threat Protection, features, updates search.product: eADQiWindows 10XVcnh search.appverid: met150 ms.prod: w10 @@ -17,19 +17,19 @@ ms.collection: M365-security-compliance ms.topic: conceptual --- -# Windows Defender ATP preview features +# Microsoft Defender ATP preview features **Applies to:** -- [Windows Defender Advanced Threat Protection (Windows Defender ATP)](https://go.microsoft.com/fwlink/p/?linkid=2069559) +- [Microsoft Defender Advanced Threat Protection (Microsoft Defender ATP)](https://go.microsoft.com/fwlink/p/?linkid=2069559) -The Windows Defender ATP service is constantly being updated to include new feature enhancements and capabilities. +The Microsoft Defender ATP service is constantly being updated to include new feature enhancements and capabilities. ->Want to experience Windows Defender ATP? [Sign up for a free trial.](https://www.microsoft.com/WindowsForBusiness/windows-atp?ocid=docs-wdatp-preview-abovefoldlink) +>Want to experience Microsoft Defender ATP? [Sign up for a free trial.](https://www.microsoft.com/WindowsForBusiness/windows-atp?ocid=docs-wdatp-preview-abovefoldlink) -Learn about new features in the Windows Defender ATP preview release and be among the first to try upcoming features by turning on the preview experience. +Learn about new features in the Microsoft Defender ATP preview release and be among the first to try upcoming features by turning on the preview experience. For more information on capabilities that are generally available or in preview, see [What's new in Windows Defender](https://docs.microsoft.com/windows/security/threat-protection/windows-defender-atp/whats-new-in-windows-defender-atp). ) @@ -44,5 +44,5 @@ Turn on the preview experience setting to be among the first to try upcoming fea 2. Toggle the setting between **On** and **Off** and select **Save preferences**. ->Want to experience Windows Defender ATP? [Sign up for a free trial.](https://www.microsoft.com/en-us/WindowsForBusiness/windows-atp?ocid=docs-wdatp-preview-belowfoldlink) +>Want to experience Microsoft Defender ATP? [Sign up for a free trial.](https://www.microsoft.com/en-us/WindowsForBusiness/windows-atp?ocid=docs-wdatp-preview-belowfoldlink) diff --git a/windows/security/threat-protection/microsoft-defender-atp/pull-alerts-using-rest-api.md b/windows/security/threat-protection/microsoft-defender-atp/pull-alerts-using-rest-api.md index 22a8c2fd31..a91e2ea546 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/pull-alerts-using-rest-api.md +++ b/windows/security/threat-protection/microsoft-defender-atp/pull-alerts-using-rest-api.md @@ -1,6 +1,6 @@ --- -title: Pull Windows Defender ATP alerts using REST API -description: Pull alerts from Windows Defender ATP REST API. +title: Pull Microsoft Defender ATP alerts using REST API +description: Pull alerts from Microsoft Defender ATP REST API. keywords: alerts, pull alerts, rest api, request, response search.product: eADQiWindows 10XVcnh search.appverid: met150 @@ -17,16 +17,16 @@ ms.collection: M365-security-compliance ms.topic: article --- -# Pull Windows Defender ATP alerts using SIEM REST API +# Pull Microsoft Defender ATP alerts using SIEM REST API **Applies to:** -- [Windows Defender Advanced Threat Protection (Windows Defender ATP)](https://go.microsoft.com/fwlink/p/?linkid=2069559) +- [Microsoft Defender Advanced Threat Protection (Microsoft Defender ATP)](https://go.microsoft.com/fwlink/p/?linkid=2069559) ->Want to experience Windows Defender ATP? [Sign up for a free trial.](https://www.microsoft.com/en-us/WindowsForBusiness/windows-atp?ocid=docs-wdatp-pullalerts-abovefoldlink) +>Want to experience Microsoft Defender ATP? [Sign up for a free trial.](https://www.microsoft.com/en-us/WindowsForBusiness/windows-atp?ocid=docs-wdatp-pullalerts-abovefoldlink) -Windows Defender ATP supports the OAuth 2.0 protocol to pull alerts from the portal. +Microsoft Defender ATP supports the OAuth 2.0 protocol to pull alerts from the portal. In general, the OAuth 2.0 protocol supports four types of flows: - Authorization grant flow @@ -36,19 +36,19 @@ In general, the OAuth 2.0 protocol supports four types of flows: For more information about the OAuth specifications, see the [OAuth Website](http://www.oauth.net). -Windows Defender ATP supports the _Authorization grant flow_ and _Client credential flow_ to obtain access to generate alerts from the portal, with Azure Active Directory (AAD) as the authorization server. +Microsoft Defender ATP supports the _Authorization grant flow_ and _Client credential flow_ to obtain access to generate alerts from the portal, with Azure Active Directory (AAD) as the authorization server. The _Authorization grant flow_ uses user credentials to get an authorization code, which is then used to obtain an access token. -The _Client credential flow_ uses client credentials to authenticate against the Windows Defender ATP endpoint URL. This flow is suitable for scenarios when an OAuth client creates requests to an API that doesn't require user credentials. +The _Client credential flow_ uses client credentials to authenticate against the Microsoft Defender ATP endpoint URL. This flow is suitable for scenarios when an OAuth client creates requests to an API that doesn't require user credentials. -Use the following method in the Windows Defender ATP API to pull alerts in JSON format. +Use the following method in the Microsoft Defender ATP API to pull alerts in JSON format. >[!NOTE] >Windows Defender Security Center merges similar alert detections into a single alert. This API pulls alert detections in its raw form based on the query parameters you set, enabling you to apply your own grouping and filtering. ## Before you begin -- Before calling the Windows Defender ATP endpoint to pull alerts, you'll need to enable the SIEM integration application in Azure Active Directory (AAD). For more information, see [Enable SIEM integration in Windows Defender ATP](enable-siem-integration-windows-defender-advanced-threat-protection.md). +- Before calling the Microsoft Defender ATP endpoint to pull alerts, you'll need to enable the SIEM integration application in Azure Active Directory (AAD). For more information, see [Enable SIEM integration in Microsoft Defender ATP](enable-siem-integration-windows-defender-advanced-threat-protection.md). - Take note of the following values in your Azure application registration. You need these values to configure the OAuth flow in your service or daemon app: - Application ID (unique to your application) @@ -59,7 +59,7 @@ Use the following method in the Windows Defender ATP API to pull alerts in JSON ## Get an access token Before creating calls to the endpoint, you'll need to get an access token. -You'll use the access token to access the protected resource, which are alerts in Windows Defender ATP. +You'll use the access token to access the protected resource, which are alerts in Microsoft Defender ATP. To get an access token, you'll need to do a POST request to the token issuing endpoint. Here is a sample request: @@ -84,10 +84,10 @@ The response will include an access token and expiry information. "access_token":"eyJ0eXaioJJOIneiowiouqSuzNiZ345FYOVkaJL0625TueyaJasjhIjEnbMlWqP..." } ``` -You can now use the value in the *access_token* field in a request to the Windows Defender ATP API. +You can now use the value in the *access_token* field in a request to the Microsoft Defender ATP API. ## Request -With an access token, your app can make authenticated requests to the Windows Defender ATP API. Your app must append the access token to the Authorization header of each request. +With an access token, your app can make authenticated requests to the Microsoft Defender ATP API. Your app must append the access token to the Authorization header of each request. ### Request syntax Method | Request URI @@ -161,7 +161,7 @@ Here is an example return value: "ThreatName":null, "RemediationAction":null, "RemediationIsSuccess":null, -"Source":"Windows Defender ATP", +"Source":"Microsoft Defender ATP", "Md5":null, "Sha256":null, "WasExecutingWhileDetected":null, @@ -171,7 +171,7 @@ Here is an example return value: ## Code examples ### Get access token -The following code example demonstrates how to obtain an access token and call the Windows Defender ATP API. +The following code example demonstrates how to obtain an access token and call the Microsoft Defender ATP API. ```syntax AuthenticationContext context = new AuthenticationContext(string.Format("https://login.windows.net/{0}/oauth2", tenantId)); @@ -193,7 +193,7 @@ Console.WriteLine("Got alert list: {0}", alertsJson); ## Error codes -The Windows Defender ATP REST API returns the following error codes caused by an invalid request. +The Microsoft Defender ATP REST API returns the following error codes caused by an invalid request. HTTP error code | Description :---|:--- @@ -202,8 +202,8 @@ HTTP error code | Description 500 | Error in the service. ## Related topics -- [Enable SIEM integration in Windows Defender ATP](enable-siem-integration-windows-defender-advanced-threat-protection.md) -- [Configure ArcSight to pull Windows Defender ATP alerts](configure-arcsight-windows-defender-advanced-threat-protection.md) -- [Configure Splunk to pull Windows Defender ATP alerts](configure-splunk-windows-defender-advanced-threat-protection.md) -- [Windows Defender ATP alert API fields](api-portal-mapping-windows-defender-advanced-threat-protection.md) +- [Enable SIEM integration in Microsoft Defender ATP](enable-siem-integration-windows-defender-advanced-threat-protection.md) +- [Configure ArcSight to pull Microsoft Defender ATP alerts](configure-arcsight-windows-defender-advanced-threat-protection.md) +- [Configure Splunk to pull Microsoft Defender ATP alerts](configure-splunk-windows-defender-advanced-threat-protection.md) +- [Microsoft Defender ATP alert API fields](api-portal-mapping-windows-defender-advanced-threat-protection.md) - [Troubleshoot SIEM tool integration issues](troubleshoot-siem-windows-defender-advanced-threat-protection.md) diff --git a/windows/security/threat-protection/microsoft-defender-atp/python-example-code.md b/windows/security/threat-protection/microsoft-defender-atp/python-example-code.md index f4b63ae583..09522e6ab2 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/python-example-code.md +++ b/windows/security/threat-protection/microsoft-defender-atp/python-example-code.md @@ -23,7 +23,7 @@ ms.date: 04/24/2018 **Applies to:** -- [Windows Defender Advanced Threat Protection (Windows Defender ATP)](https://go.microsoft.com/fwlink/p/?linkid=2069559) +- [Microsoft Defender Advanced Threat Protection (Microsoft Defender ATP)](https://go.microsoft.com/fwlink/p/?linkid=2069559) @@ -180,12 +180,12 @@ with requests.Session() as session: ``` ->Want to experience Windows Defender ATP? [Sign up for a free trial.](https://www.microsoft.com/en-us/WindowsForBusiness/windows-atp?ocid=docs-wdatp-pyexample-belowfoldlink) +>Want to experience Microsoft Defender ATP? [Sign up for a free trial.](https://www.microsoft.com/en-us/WindowsForBusiness/windows-atp?ocid=docs-wdatp-pyexample-belowfoldlink) ## Related topics - [Understand threat intelligence concepts](threat-indicator-concepts-windows-defender-advanced-threat-protection.md) -- [Enable the custom threat intelligence API in Windows Defender ATP](enable-custom-ti-windows-defender-advanced-threat-protection.md) +- [Enable the custom threat intelligence API in Microsoft Defender ATP](enable-custom-ti-windows-defender-advanced-threat-protection.md) - [Create custom alerts using the threat intelligence API](custom-ti-api-windows-defender-advanced-threat-protection.md) - [PowerShell code examples for the custom threat intelligence API](powershell-example-code-windows-defender-advanced-threat-protection.md) - [Experiment with custom threat intelligence alerts](experiment-custom-ti-windows-defender-advanced-threat-protection.md) diff --git a/windows/security/threat-protection/microsoft-defender-atp/rbac.md b/windows/security/threat-protection/microsoft-defender-atp/rbac.md index 8446e86a04..b5a8ca5ce4 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/rbac.md +++ b/windows/security/threat-protection/microsoft-defender-atp/rbac.md @@ -22,9 +22,9 @@ ms.date: 05/08/2018 **Applies to:** - Azure Active Directory - Office 365 -- [Windows Defender Advanced Threat Protection (Windows Defender ATP)](https://go.microsoft.com/fwlink/p/?linkid=2069559) +- [Microsoft Defender Advanced Threat Protection (Microsoft Defender ATP)](https://go.microsoft.com/fwlink/p/?linkid=2069559) ->Want to experience Windows Defender ATP? [Sign up for a free trial.](https://www.microsoft.com/en-us/WindowsForBusiness/windows-atp?ocid=docs-wdatp-rbac-abovefoldlink) +>Want to experience Microsoft Defender ATP? [Sign up for a free trial.](https://www.microsoft.com/en-us/WindowsForBusiness/windows-atp?ocid=docs-wdatp-rbac-abovefoldlink) Using role-based access control (RBAC), you can create roles and groups within your security operations team to grant appropriate access to the portal. Based on the roles and groups you create, you have fine-grained control over what users with access to the portal can see and do. @@ -37,10 +37,10 @@ Tier 1 | **Local security operations team / IT team**
This team usually tri Tier 2 | **Regional security operations team**
This team can see all the machines for their region and perform remediation actions. Tier 3 | **Global security operations team**
This team consists of security experts and are authorized to see and perform all actions from the portal. -Windows Defender ATP RBAC is designed to support your tier- or role-based model of choice and gives you granular control over what roles can see, machines they can access, and actions they can take. The RBAC framework is centered around the following controls: +Microsoft Defender ATP RBAC is designed to support your tier- or role-based model of choice and gives you granular control over what roles can see, machines they can access, and actions they can take. The RBAC framework is centered around the following controls: - **Control who can take specific action** - - Create custom roles and control what Windows Defender ATP capabilities they can access with granularity. + - Create custom roles and control what Microsoft Defender ATP capabilities they can access with granularity. - **Control who can see information on specific machine group or groups** - [Create machine groups](machine-groups-windows-defender-advanced-threat-protection.md) by specific criteria such as names, tags, domains, and others, then grant role access to them using a specific Azure Active Directory (Azure AD) user group. @@ -57,18 +57,18 @@ Before using RBAC, it's important that you understand the roles that can grant p When you first log in to Windows Defender Security Center, you're granted either full access or read only access. Full access rights are granted to users with Security Administrator or Global Administrator roles in Azure AD. Read only access is granted to users with a Security Reader role in Azure AD. -Someone with a Windows Defender ATP Global administrator role has unrestricted access to all machines, regardless of their machine group association and the Azure AD user groups assignments +Someone with a Microsoft Defender ATP Global administrator role has unrestricted access to all machines, regardless of their machine group association and the Azure AD user groups assignments > [!WARNING] > Initially, only those with Azure AD Global Administrator or Security Administrator rights will be able to create and assign roles in Windows Defender Security Center, therefore, having the right groups ready in Azure AD is important. > > **Turning on role-based access control will cause users with read-only permissions (for example, users assigned to Azure AD Security reader role) to lose access until they are assigned to a role.** > ->Users with admin permissions are automatically assigned the default built-in Windows Defender ATP global administrator role with full permissions. After opting in to use RBAC, you can assign additional users that are not Azure AD Global or Security Administrators to the Windows Defender ATP global administrator role. +>Users with admin permissions are automatically assigned the default built-in Microsoft Defender ATP global administrator role with full permissions. After opting in to use RBAC, you can assign additional users that are not Azure AD Global or Security Administrators to the Microsoft Defender ATP global administrator role. > > After opting in to use RBAC, you cannot revert to the initial roles as when you first logged into the portal. ## Related topic -- [Create and manage machine groups in Windows Defender ATP](machine-groups-windows-defender-advanced-threat-protection.md) \ No newline at end of file +- [Create and manage machine groups in Microsoft Defender ATP](machine-groups-windows-defender-advanced-threat-protection.md) \ No newline at end of file diff --git a/windows/security/threat-protection/microsoft-defender-atp/respond-file-alerts.md b/windows/security/threat-protection/microsoft-defender-atp/respond-file-alerts.md index e5f643f908..e2a48992a8 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/respond-file-alerts.md +++ b/windows/security/threat-protection/microsoft-defender-atp/respond-file-alerts.md @@ -1,5 +1,5 @@ --- -title: Take response actions on a file in Windows Defender ATP +title: Take response actions on a file in Microsoft Defender ATP description: Take response actions on file related alerts by stopping and quarantining a file or blocking a file and checking activity details. keywords: respond, stop and quarantine, block file, deep analysis search.product: eADQiWindows 10XVcnh @@ -20,11 +20,11 @@ ms.topic: article # Take response actions on a file **Applies to:** -- [Windows Defender Advanced Threat Protection (Windows Defender ATP)](https://go.microsoft.com/fwlink/p/?linkid=2069559) +- [Microsoft Defender Advanced Threat Protection (Microsoft Defender ATP)](https://go.microsoft.com/fwlink/p/?linkid=2069559) ->Want to experience Windows Defender ATP? [Sign up for a free trial.](https://www.microsoft.com/en-us/WindowsForBusiness/windows-atp?ocid=docs-wdatp-responddile-abovefoldlink) +>Want to experience Microsoft Defender ATP? [Sign up for a free trial.](https://www.microsoft.com/en-us/WindowsForBusiness/windows-atp?ocid=docs-wdatp-responddile-abovefoldlink) Quickly respond to detected attacks by stopping and quarantining files or blocking a file. After taking action on files, you can check activity details on the Action center. @@ -102,7 +102,7 @@ You can roll back and remove a file from quarantine if you’ve determined that ``` > [!NOTE] -> Windows Defender ATP will restore all files that were quarantined on this machine in the last 30 days. +> Microsoft Defender ATP will restore all files that were quarantined on this machine in the last 30 days. ## Block files in your network You can prevent further propagation of an attack in your organization by banning potentially malicious files or suspected malware. If you know a potentially malicious portable executable (PE) file, you can block it. This operation will prevent it from being read, written, or executed on machines in your organization. @@ -199,7 +199,7 @@ Results of deep analysis are matched against threat intelligence and any matches Use the deep analysis feature to investigate the details of any file, usually during an investigation of an alert or for any other reason where you suspect malicious behavior. This feature is available in the context of the file view. -In the file's page, **Submit for deep analysis** is enabled when the file is available in the Windows Defender ATP backend sample collection or if it was observed on a Windows 10 machine that supports submitting to deep analysis. +In the file's page, **Submit for deep analysis** is enabled when the file is available in the Microsoft Defender ATP backend sample collection or if it was observed on a Windows 10 machine that supports submitting to deep analysis. > [!NOTE] > Only files from Windows 10 can be automatically collected. @@ -207,9 +207,9 @@ In the file's page, **Submit for deep analysis** is enabled when the file is ava You can also manually submit a sample through the [Malware Protection Center Portal](https://www.microsoft.com/security/portal/submission/submit.aspx) if the file was not observed on a Windows 10 machine, and wait for **Submit for deep analysis** button to become available. > [!NOTE] -> Due to backend processing flows in the Malware Protection Center Portal, there could be up to 10 minutes of latency between file submission and availability of the deep analysis feature in Windows Defender ATP. +> Due to backend processing flows in the Malware Protection Center Portal, there could be up to 10 minutes of latency between file submission and availability of the deep analysis feature in Microsoft Defender ATP. -When the sample is collected, Windows Defender ATP runs the file in is a secure environment and creates a detailed report of observed behaviors and associated artifacts, such as files dropped on machines, communication to IPs, and registry modifications. +When the sample is collected, Microsoft Defender ATP runs the file in is a secure environment and creates a detailed report of observed behaviors and associated artifacts, such as files dropped on machines, communication to IPs, and registry modifications. **Submit files for deep analysis:** @@ -230,7 +230,7 @@ A progress bar is displayed and provides information on the different stages of ### View deep analysis reports -View the deep analysis report that Windows Defender ATP provides to see the details of the deep analysis that was conducted on the file you submitted. This feature is available in the file view context. +View the deep analysis report that Microsoft Defender ATP provides to see the details of the deep analysis that was conducted on the file you submitted. This feature is available in the file view context. You can view the comprehensive report that provides details on the following sections: diff --git a/windows/security/threat-protection/microsoft-defender-atp/respond-machine-alerts.md b/windows/security/threat-protection/microsoft-defender-atp/respond-machine-alerts.md index 37e946eb11..16b781e106 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/respond-machine-alerts.md +++ b/windows/security/threat-protection/microsoft-defender-atp/respond-machine-alerts.md @@ -1,5 +1,5 @@ --- -title: Take response actions on a machine in Windows Defender ATP +title: Take response actions on a machine in Microsoft Defender ATP description: Take response actions on a machine such as isolating machines, collecting an investigation package, managing tags, running av scan, and restricting app execution. keywords: respond, isolate, isolate machine, collect investigation package, action center, restrict, manage tags, av scan, restrict app search.product: eADQiWindows 10XVcnh @@ -21,10 +21,10 @@ ms.date: 11/28/2018 # Take response actions on a machine **Applies to:** -- [Windows Defender Advanced Threat Protection (Windows Defender ATP)](https://go.microsoft.com/fwlink/p/?linkid=2069559) +- [Microsoft Defender Advanced Threat Protection (Microsoft Defender ATP)](https://go.microsoft.com/fwlink/p/?linkid=2069559) ->Want to experience Windows Defender ATP? [Sign up for a free trial.](https://www.microsoft.com/en-us/WindowsForBusiness/windows-atp?ocid=docs-wdatp-respondmachine-abovefoldlink) +>Want to experience Microsoft Defender ATP? [Sign up for a free trial.](https://www.microsoft.com/en-us/WindowsForBusiness/windows-atp?ocid=docs-wdatp-respondmachine-abovefoldlink) Quickly respond to detected attacks by isolating machines or collecting an investigation package. After taking action on machines, you can check activity details on the Action center. @@ -185,7 +185,7 @@ Depending on the severity of the attack and the sensitivity of the machine, you >- Selective isolation is available for machines on Windows 10, version 1709 or later. -This machine isolation feature disconnects the compromised machine from the network while retaining connectivity to the Windows Defender ATP service, which continues to monitor the machine. +This machine isolation feature disconnects the compromised machine from the network while retaining connectivity to the Microsoft Defender ATP service, which continues to monitor the machine. On Windows 10, version 1709 or later, you'll have additional control over the network isolation level. You can also choose to enable Outlook and Skype for Business connectivity (a.k.a 'Selective Isolation'). @@ -210,7 +210,7 @@ On Windows 10, version 1709 or later, you'll have additional control over the ne 4. Type a comment and select **Yes, isolate machine** to take action on the machine. >[!NOTE] - >The machine will remain connected to the Windows Defender ATP service even if it is isolated from the network. If you've chosen to enable Outlook and Skype for Business communication, then you'll be able to communicate to the user while the machine is isolated. + >The machine will remain connected to the Microsoft Defender ATP service even if it is isolated from the network. If you've chosen to enable Outlook and Skype for Business communication, then you'll be able to communicate to the user while the machine is isolated. The Action center shows the submission information: ![Image of machine isolation](images/atp-machine-isolation.png) diff --git a/windows/security/threat-protection/microsoft-defender-atp/response-actions.md b/windows/security/threat-protection/microsoft-defender-atp/response-actions.md index bc0073bf43..643f72739e 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/response-actions.md +++ b/windows/security/threat-protection/microsoft-defender-atp/response-actions.md @@ -1,5 +1,5 @@ --- -title: Take response actions on files and machines in Windows Defender ATP +title: Take response actions on files and machines in Microsoft Defender ATP description: Take response actions on files and machines by stopping and quarantining files, blocking a file, isolating machines, or collecting an investigation package. keywords: respond, stop and quarantine, block file, deep analysis, isolate machine, collect investigation package, action center search.product: eADQiWindows 10XVcnh @@ -18,15 +18,15 @@ ms.topic: article ms.date: 11/12/2017 --- -# Take response actions in Windows Defender ATP +# Take response actions in Microsoft Defender ATP **Applies to:** -- [Windows Defender Advanced Threat Protection (Windows Defender ATP)](https://go.microsoft.com/fwlink/p/?linkid=2069559) +- [Microsoft Defender Advanced Threat Protection (Microsoft Defender ATP)](https://go.microsoft.com/fwlink/p/?linkid=2069559) ->Want to experience Windows Defender ATP? [Sign up for a free trial.](https://www.microsoft.com/en-us/WindowsForBusiness/windows-atp?ocid=docs-wdatp-responseactions-abovefoldlink) +>Want to experience Microsoft Defender ATP? [Sign up for a free trial.](https://www.microsoft.com/en-us/WindowsForBusiness/windows-atp?ocid=docs-wdatp-responseactions-abovefoldlink) You can take response actions on machines and files to quickly respond to detected attacks so that you can contain or reduce and prevent further damage caused by malicious attackers in your organization. diff --git a/windows/security/threat-protection/microsoft-defender-atp/restrict-code-execution.md b/windows/security/threat-protection/microsoft-defender-atp/restrict-code-execution.md index 5cf3e7bd28..81b063e148 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/restrict-code-execution.md +++ b/windows/security/threat-protection/microsoft-defender-atp/restrict-code-execution.md @@ -19,7 +19,7 @@ ms.date: 12/08/2017 # Restrict app execution API **Applies to:** -- Windows Defender Advanced Threat Protection (Windows Defender ATP) +- Microsoft Defender Advanced Threat Protection (Microsoft Defender ATP) [!include[Prereleaseinformation](prerelease.md)] @@ -28,7 +28,7 @@ Restrict execution of all applications on the machine except a predefined set (s [!include[Machine actions note](machineactionsnote.md)] ## Permissions -One of the following permissions is required to call this API. To learn more, including how to choose permissions, see [Use Windows Defender ATP APIs](apis-intro.md) +One of the following permissions is required to call this API. To learn more, including how to choose permissions, see [Use Microsoft Defender ATP APIs](apis-intro.md) Permission type | Permission | Permission display name :---|:---|:--- diff --git a/windows/security/threat-protection/microsoft-defender-atp/run-advanced-query-api.md b/windows/security/threat-protection/microsoft-defender-atp/run-advanced-query-api.md index 5077e43d6c..d7b2db640d 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/run-advanced-query-api.md +++ b/windows/security/threat-protection/microsoft-defender-atp/run-advanced-query-api.md @@ -19,11 +19,11 @@ ms.date: 09/03/2018 # Advanced hunting API -**Applies to:** [Windows Defender Advanced Threat Protection (Windows Defender ATP)](https://wincom.blob.core.windows.net/documents/Windows10_Commercial_Comparison.pdf) +**Applies to:** [Microsoft Defender Advanced Threat Protection (Microsoft Defender ATP)](https://wincom.blob.core.windows.net/documents/Windows10_Commercial_Comparison.pdf) [!include[Prerelease information](prerelease.md)] -This API allows you to run programmatic queries that you are used to running from [Windows Defender ATP Portal](https://securitycenter.windows.com/hunting). +This API allows you to run programmatic queries that you are used to running from [Microsoft Defender ATP Portal](https://securitycenter.windows.com/hunting). ## Limitations @@ -33,7 +33,7 @@ This API allows you to run programmatic queries that you are used to running fro 4. The maximal execution time of a single request is 10 minutes. ## Permissions -One of the following permissions is required to call this API. To learn more, including how to choose permissions, see [Use Windows Defender ATP APIs](apis-intro.md) +One of the following permissions is required to call this API. To learn more, including how to choose permissions, see [Use Microsoft Defender ATP APIs](apis-intro.md) Permission type | Permission | Permission display name :---|:---|:--- @@ -135,18 +135,18 @@ Content-Type: application/json​ - Error: (403) Forbidden / (401) Unauthorized - If you get this error when calling Windows Defender ATP API, your token might not include the necessary permission. + If you get this error when calling Microsoft Defender ATP API, your token might not include the necessary permission. Check [app permissions](exposed-apis-create-app-webapp.md#validate-the-token) or [delegated permissions](exposed-apis-create-app-nativeapp.md#validate-the-token) included in your token. If the 'roles' section in the token does not include the necessary permission: - - The necessary permission to your app might not have been granted. For more information, see [Access Windows Defender ATP without a user](exposed-apis-create-app-webapp.md#create-an-app) or [Access Windows Defender ATP on behalf of a user](exposed-apis-create-app-nativeapp.md#create-an-app) or, + - The necessary permission to your app might not have been granted. For more information, see [Access Microsoft Defender ATP without a user](exposed-apis-create-app-webapp.md#create-an-app) or [Access Microsoft Defender ATP on behalf of a user](exposed-apis-create-app-nativeapp.md#create-an-app) or, - The app was not authorized in the tenant, see [Application consent](exposed-apis-create-app-webapp.md#application-consent). ## Related topic -- [Windows Defender ATP APIs](apis-intro.md) +- [Microsoft Defender ATP APIs](apis-intro.md) - [Advanced Hunting from Portal](advanced-hunting-windows-defender-advanced-threat-protection.md) - [Advanced Hunting using PowerShell](run-advanced-query-sample-powershell.md) - [Schedule Advanced Hunting](run-advanced-query-sample-ms-flow.md) diff --git a/windows/security/threat-protection/microsoft-defender-atp/run-advanced-query-sample-ms-flow.md b/windows/security/threat-protection/microsoft-defender-atp/run-advanced-query-sample-ms-flow.md index 90d62c40c1..9b6ba020c2 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/run-advanced-query-sample-ms-flow.md +++ b/windows/security/threat-protection/microsoft-defender-atp/run-advanced-query-sample-ms-flow.md @@ -19,7 +19,7 @@ ms.date: 09/24/2018 # Schedule Advanced Hunting using Microsoft Flow **Applies to:** -- Windows Defender Advanced Threat Protection (Windows Defender ATP) +- Microsoft Defender Advanced Threat Protection (Microsoft Defender ATP) [!include[Prerelease information](prerelease.md)] @@ -87,6 +87,6 @@ You can find below the full definition ![Image of E2E flow](images/ms-flow-e2e.png) ## Related topic -- [Windows Defender ATP APIs](apis-intro.md) +- [Microsoft Defender ATP APIs](apis-intro.md) - [Advanced Hunting API](run-advanced-query-api.md) - [Advanced Hunting using PowerShell](run-advanced-query-sample-powershell.md) \ No newline at end of file diff --git a/windows/security/threat-protection/microsoft-defender-atp/run-advanced-query-sample-power-bi-app-token.md b/windows/security/threat-protection/microsoft-defender-atp/run-advanced-query-sample-power-bi-app-token.md index 9282b0c321..55075237cb 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/run-advanced-query-sample-power-bi-app-token.md +++ b/windows/security/threat-protection/microsoft-defender-atp/run-advanced-query-sample-power-bi-app-token.md @@ -131,7 +131,7 @@ If you want to use **user token** instead please refer to [this](run-advanced-qu ## Related topic - [Create custom Power BI reports with user authentication](run-advanced-query-sample-power-bi-user-token.md) -- [Windows Defender ATP APIs](apis-intro.md) +- [Microsoft Defender ATP APIs](apis-intro.md) - [Advanced Hunting API](run-advanced-query-api.md) - [Advanced Hunting using PowerShell](run-advanced-query-sample-powershell.md) - [Schedule Advanced Hunting](run-advanced-query-sample-ms-flow.md) diff --git a/windows/security/threat-protection/microsoft-defender-atp/run-advanced-query-sample-power-bi-user-token.md b/windows/security/threat-protection/microsoft-defender-atp/run-advanced-query-sample-power-bi-user-token.md index 336ac77edb..bbec645b5a 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/run-advanced-query-sample-power-bi-user-token.md +++ b/windows/security/threat-protection/microsoft-defender-atp/run-advanced-query-sample-power-bi-user-token.md @@ -18,7 +18,7 @@ ms.topic: article # Create custom reports using Power BI (user authentication) **Applies to:** -- Windows Defender Advanced Threat Protection (Windows Defender ATP) +- Microsoft Defender Advanced Threat Protection (Microsoft Defender ATP) [!include[Prerelease information](prerelease.md)] @@ -112,7 +112,7 @@ You first need to [create an app](exposed-apis-create-app-nativeapp.md). ## Related topic - [Create custom Power BI reports with app authentication](run-advanced-query-sample-power-bi-app-token.md) -- [Windows Defender ATP APIs](apis-intro.md) +- [Microsoft Defender ATP APIs](apis-intro.md) - [Advanced Hunting API](run-advanced-query-api.md) - [Advanced Hunting using PowerShell](run-advanced-query-sample-powershell.md) - [Schedule Advanced Hunting](run-advanced-query-sample-ms-flow.md) diff --git a/windows/security/threat-protection/microsoft-defender-atp/run-advanced-query-sample-powershell.md b/windows/security/threat-protection/microsoft-defender-atp/run-advanced-query-sample-powershell.md index 547b531909..b510a94b78 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/run-advanced-query-sample-powershell.md +++ b/windows/security/threat-protection/microsoft-defender-atp/run-advanced-query-sample-powershell.md @@ -19,7 +19,7 @@ ms.date: 09/24/2018 # Advanced Hunting using PowerShell **Applies to:** -- [Windows Defender Advanced Threat Protection (Windows Defender ATP)](https://go.microsoft.com/fwlink/p/?linkid=2069559) +- [Microsoft Defender Advanced Threat Protection (Microsoft Defender ATP)](https://go.microsoft.com/fwlink/p/?linkid=2069559) [!include[Prerelease information](prerelease.md)] @@ -65,7 +65,7 @@ $aadToken = $response.access_token where - $tenantId: ID of the tenant on behalf of which you want to run the query (i.e., the query will be run on the data of this tenant) -- $appId: ID of your AAD app (the app must have 'Run advanced queries' permission to Windows Defender ATP) +- $appId: ID of your AAD app (the app must have 'Run advanced queries' permission to Microsoft Defender ATP) - $appSecret: Secret of your AAD app ## Run query @@ -117,7 +117,7 @@ $results | ConvertTo-Json | Set-Content file1.json ## Related topic -- [Windows Defender ATP APIs](apis-intro.md) +- [Microsoft Defender ATP APIs](apis-intro.md) - [Advanced Hunting API](run-advanced-query-api.md) - [Advanced Hunting using Python](run-advanced-query-sample-python.md) - [Schedule Advanced Hunting](run-advanced-query-sample-ms-flow.md) diff --git a/windows/security/threat-protection/microsoft-defender-atp/run-advanced-query-sample-python.md b/windows/security/threat-protection/microsoft-defender-atp/run-advanced-query-sample-python.md index 07bb15a7cf..8bd9817c9f 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/run-advanced-query-sample-python.md +++ b/windows/security/threat-protection/microsoft-defender-atp/run-advanced-query-sample-python.md @@ -18,7 +18,7 @@ ms.topic: article # Advanced Hunting using Python **Applies to:** -- Windows Defender Advanced Threat Protection (Windows Defender ATP) +- Microsoft Defender Advanced Threat Protection (Microsoft Defender ATP) [!include[Prerelease information](prerelease.md)] @@ -64,7 +64,7 @@ aadToken = jsonResponse["access_token"] where - tenantId: ID of the tenant on behalf of which you want to run the query (i.e., the query will be run on the data of this tenant) -- appId: ID of your AAD app (the app must have 'Run advanced queries' permission to Windows Defender ATP) +- appId: ID of your AAD app (the app must have 'Run advanced queries' permission to Microsoft Defender ATP) - appSecret: Secret of your AAD app ## Run query @@ -143,7 +143,7 @@ outputFile.close() ## Related topic -- [Windows Defender ATP APIs](apis-intro.md) +- [Microsoft Defender ATP APIs](apis-intro.md) - [Advanced Hunting API](run-advanced-query-api.md) - [Advanced Hunting using PowerShell](run-advanced-query-sample-powershell.md) - [Schedule Advanced Hunting](run-advanced-query-sample-ms-flow.md) diff --git a/windows/security/threat-protection/microsoft-defender-atp/run-av-scan.md b/windows/security/threat-protection/microsoft-defender-atp/run-av-scan.md index 4a58f9eedf..470cf1fc02 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/run-av-scan.md +++ b/windows/security/threat-protection/microsoft-defender-atp/run-av-scan.md @@ -19,7 +19,7 @@ ms.date: 12/08/2017 # Run antivirus scan API **Applies to:** -- Windows Defender Advanced Threat Protection (Windows Defender ATP) +- Microsoft Defender Advanced Threat Protection (Microsoft Defender ATP) [!include[Prerelease information](prerelease.md)] @@ -28,7 +28,7 @@ Initiate Windows Defender Antivirus scan on a machine. [!include[Machine actions note](machineactionsnote.md)] ## Permissions -One of the following permissions is required to call this API. To learn more, including how to choose permissions, see [Use Windows Defender ATP APIs](apis-intro.md) +One of the following permissions is required to call this API. To learn more, including how to choose permissions, see [Use Microsoft Defender ATP APIs](apis-intro.md) Permission type | Permission | Permission display name :---|:---|:--- diff --git a/windows/security/threat-protection/microsoft-defender-atp/run-detection-test.md b/windows/security/threat-protection/microsoft-defender-atp/run-detection-test.md index b5d51b9cf4..7f80d83213 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/run-detection-test.md +++ b/windows/security/threat-protection/microsoft-defender-atp/run-detection-test.md @@ -1,6 +1,6 @@ --- -title: Run a detection test on a newly onboarded Windows Defender ATP machine -description: Run the detection script on a newly onboarded machine to verify that it is properly onboarded to the Windows Defender ATP service. +title: Run a detection test on a newly onboarded Microsoft Defender ATP machine +description: Run the detection script on a newly onboarded machine to verify that it is properly onboarded to the Microsoft Defender ATP service. keywords: detection test, detection, powershell, script, verify, onboarding, windows defender advanced threat protection onboarding, clients, servers, test search.product: eADQiWindows 10XVcnh search.appverid: met150 @@ -15,10 +15,9 @@ manager: dansimp audience: ITPro ms.collection: M365-security-compliance ms.topic: article -ms.date: 09/07/2018 --- -# Run a detection test on a newly onboarded Windows Defender ATP machine +# Run a detection test on a newly onboarded Microsoft Defender ATP machine **Applies to:** - Supported Windows 10 versions @@ -26,10 +25,10 @@ ms.date: 09/07/2018 - Windows Server 2016 - Windows Server, version 1803 - Windows Server, 2019 -- [Windows Defender Advanced Threat Protection (Windows Defender ATP)](https://go.microsoft.com/fwlink/p/?linkid=2069559) +- [Microsoft Defender Advanced Threat Protection (Microsoft Defender ATP)](https://go.microsoft.com/fwlink/p/?linkid=2069559) -Run the following PowerShell script on a newly onboarded machine to verify that it is properly reporting to the Windows Defender ATP service. +Run the following PowerShell script on a newly onboarded machine to verify that it is properly reporting to the Microsoft Defender ATP service. 1. Create a folder: 'C:\test-WDATP-test'. 2. Open an elevated command-line prompt on the machine and run the script: diff --git a/windows/security/threat-protection/microsoft-defender-atp/secure-score-dashboard.md b/windows/security/threat-protection/microsoft-defender-atp/secure-score-dashboard.md index d501a0d824..1ee8334e7a 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/secure-score-dashboard.md +++ b/windows/security/threat-protection/microsoft-defender-atp/secure-score-dashboard.md @@ -19,7 +19,7 @@ ms.date: 10/26/2018 # Configure the security controls in Secure score **Applies to:** -- [Windows Defender Advanced Threat Protection (Windows Defender ATP)](https://go.microsoft.com/fwlink/p/?linkid=2069559) +- [Microsoft Defender Advanced Threat Protection (Microsoft Defender ATP)](https://go.microsoft.com/fwlink/p/?linkid=2069559) Each security control lists recommendations that you can take to increase the security posture of your organization. @@ -30,9 +30,9 @@ For an machine to be considered "well configured", it must comply to a minimum b >This feature is available for machines on Windows 10, version 1607 or later. #### Minimum baseline configuration setting for EDR: -- Windows Defender ATP sensor is on +- Microsoft Defender ATP sensor is on - Data collection is working correctly -- Communication to Windows Defender ATP service is not impaired +- Communication to Microsoft Defender ATP service is not impaired ##### Recommended actions: You can take the following actions to increase the overall security score of your organization: @@ -82,13 +82,13 @@ This tile shows you the exact number of machines that require the latest securit You can take the following actions to increase the overall security score of your organization: - Install the latest security updates - Fix sensor data collection - - The Windows Defender ATP service relies on sensor data collection to determine the security state of a machine. The service will not be able to determine the security state of machines that are not reporting sensor data properly. Therefore, it's important to ensure that sensor data collection is working properly. For more information, see [Fix unhealthy sensors](fix-unhealhty-sensors-windows-defender-advanced-threat-protection.md). + - The Microsoft Defender ATP service relies on sensor data collection to determine the security state of a machine. The service will not be able to determine the security state of machines that are not reporting sensor data properly. Therefore, it's important to ensure that sensor data collection is working properly. For more information, see [Fix unhealthy sensors](fix-unhealhty-sensors-windows-defender-advanced-threat-protection.md). For more information, see [Windows Update Troubleshooter](https://support.microsoft.com/help/4027322/windows-windows-update-troubleshooter). ### Windows Defender Exploit Guard (Windows Defender EG) optimization -For a machine to be considered "well configured", it must comply to a minimum baseline configuration setting. This tile shows you a specific list of actions you must apply on machines so that the minimum baseline configuration setting for Windows Defender EG is fulfilled. When endpoints are configured according to the baseline you'll be able to see Windows Defender EG events on the Windows Defender ATP Machine timeline. +For a machine to be considered "well configured", it must comply to a minimum baseline configuration setting. This tile shows you a specific list of actions you must apply on machines so that the minimum baseline configuration setting for Windows Defender EG is fulfilled. When endpoints are configured according to the baseline you'll be able to see Windows Defender EG events on the Microsoft Defender ATP Machine timeline. >[!IMPORTANT] @@ -137,7 +137,7 @@ Block Win32 imports from Macro code in Office | 92E97FA1-2EDF-4476-BDD6-9DD0B4DD The Controlled Folder Access setting must be configured to **Audit mode** or **Enabled**. >[!NOTE] -> Audit mode, allows you to see audit events in the Windows Defender ATP Machine timeline however it does not block suspicious applications. +> Audit mode, allows you to see audit events in the Microsoft Defender ATP Machine timeline however it does not block suspicious applications. >Consider enabling Controlled Folder Access for better protection. ##### Recommended actions: @@ -150,7 +150,7 @@ You can take the following actions to increase the overall security score of you For more information, see [Windows Defender Exploit Guard](../windows-defender-exploit-guard/windows-defender-exploit-guard.md). ### Windows Defender Application Guard (Windows Defender AG) optimization -For a machine to be considered "well configured", it must comply to a minimum baseline configuration setting. This tile shows you a specific list of actions you must apply on endpoints so that the minimum baseline configuration setting for Windows Defender AG is fulfilled. When endpoints are configured according to the baseline you'll be able to see Windows Defender AG events on the Windows Defender ATP Machine timeline. +For a machine to be considered "well configured", it must comply to a minimum baseline configuration setting. This tile shows you a specific list of actions you must apply on endpoints so that the minimum baseline configuration setting for Windows Defender AG is fulfilled. When endpoints are configured according to the baseline you'll be able to see Windows Defender AG events on the Microsoft Defender ATP Machine timeline. >[!IMPORTANT] >This security control is only applicable for machines with Windows 10, version 1709 or later. @@ -180,7 +180,7 @@ For more information, see [Windows Defender Application Guard overview](../windo For a machine to be considered "well configured", it must comply to a minimum baseline configuration setting. This tile shows you a specific list of actions you must apply on endpoints so that the minimum baseline configuration setting for Windows Defender SmartScreen is fulfilled. >[!WARNING] -> Data collected by Windows Defender SmartScreen might be stored and processed outside of the storage location you have selected for your Windows Defender ATP data. +> Data collected by Windows Defender SmartScreen might be stored and processed outside of the storage location you have selected for your Microsoft Defender ATP data. >[!IMPORTANT] @@ -229,7 +229,7 @@ You can take the following actions to increase the overall security score of you - Secure public profile - Verify secure configuration of third-party firewall - Fix sensor data collection - - The Windows Defender ATP service relies on sensor data collection to determine the security state of a machine. The service will not be able to determine the security state of machines that are not reporting sensor data properly. Therefore, it's important to ensure that sensor data collection is working properly. For more information, see [Fix unhealthy sensors](fix-unhealhty-sensors-windows-defender-advanced-threat-protection.md). + - The Microsoft Defender ATP service relies on sensor data collection to determine the security state of a machine. The service will not be able to determine the security state of machines that are not reporting sensor data properly. Therefore, it's important to ensure that sensor data collection is working properly. For more information, see [Fix unhealthy sensors](fix-unhealhty-sensors-windows-defender-advanced-threat-protection.md). For more information, see [Windows Defender Firewall with Advanced Security](https://docs.microsoft.com/windows/security/identity-protection/windows-firewall/windows-firewall-with-advanced-security). @@ -251,7 +251,7 @@ You can take the following actions to increase the overall security score of you - Resume protection on all drives - Ensure drive compatibility - Fix sensor data collection - - The Windows Defender ATP service relies on sensor data collection to determine the security state of a machine. The service will not be able to determine the security state of machines that are not reporting sensor data properly. Therefore, it's important to ensure that sensor data collection is working properly. For more information, see [Fix unhealthy sensors](fix-unhealhty-sensors-windows-defender-advanced-threat-protection.md). + - The Microsoft Defender ATP service relies on sensor data collection to determine the security state of a machine. The service will not be able to determine the security state of machines that are not reporting sensor data properly. Therefore, it's important to ensure that sensor data collection is working properly. For more information, see [Fix unhealthy sensors](fix-unhealhty-sensors-windows-defender-advanced-threat-protection.md). For more information, see [Bitlocker](https://docs.microsoft.com/windows/security/information-protection/bitlocker/bitlocker-overview). @@ -274,11 +274,11 @@ You can take the following actions to increase the overall security score of you - Ensure hardware and software prerequisites are met - Turn on Credential Guard - Fix sensor data collection - - The Windows Defender ATP service relies on sensor data collection to determine the security state of a machine. The service will not be able to determine the security state of machines that are not reporting sensor data properly. Therefore, it's important to ensure that sensor data collection is working properly. For more information, see [Fix unhealthy sensors](fix-unhealhty-sensors-windows-defender-advanced-threat-protection.md). + - The Microsoft Defender ATP service relies on sensor data collection to determine the security state of a machine. The service will not be able to determine the security state of machines that are not reporting sensor data properly. Therefore, it's important to ensure that sensor data collection is working properly. For more information, see [Fix unhealthy sensors](fix-unhealhty-sensors-windows-defender-advanced-threat-protection.md). For more information, see [Manage Windows Defender Credential Guard](https://docs.microsoft.com/windows/security/identity-protection/credential-guard/credential-guard-manage). ->Want to experience Windows Defender ATP? [Sign up for a free trial.](https://www.microsoft.com/en-us/WindowsForBusiness/windows-atp?ocid=docs-wdatp-sadashboard-belowfoldlink) +>Want to experience Microsoft Defender ATP? [Sign up for a free trial.](https://www.microsoft.com/en-us/WindowsForBusiness/windows-atp?ocid=docs-wdatp-sadashboard-belowfoldlink) ## Related topics - [Overview of Secure score](overview-secure-score-windows-defender-advanced-threat-protection.md) diff --git a/windows/security/threat-protection/microsoft-defender-atp/security-operations-dashboard.md b/windows/security/threat-protection/microsoft-defender-atp/security-operations-dashboard.md index 1c071364b8..eea36cb084 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/security-operations-dashboard.md +++ b/windows/security/threat-protection/microsoft-defender-atp/security-operations-dashboard.md @@ -21,9 +21,9 @@ ms.date: 09/04/2018 # Windows Defender Security Center Security operations dashboard **Applies to:** -- [Windows Defender Advanced Threat Protection (Windows Defender ATP)](https://go.microsoft.com/fwlink/p/?linkid=2069559) +- [Microsoft Defender Advanced Threat Protection (Microsoft Defender ATP)](https://go.microsoft.com/fwlink/p/?linkid=2069559) ->Want to experience Windows Defender ATP? [Sign up for a free trial.](https://www.microsoft.com/en-us/WindowsForBusiness/windows-atp?ocid=docs-wdatp-secopsdashboard-abovefoldlink) +>Want to experience Microsoft Defender ATP? [Sign up for a free trial.](https://www.microsoft.com/en-us/WindowsForBusiness/windows-atp?ocid=docs-wdatp-secopsdashboard-abovefoldlink) The **Security operations dashboard** is where the endpoint detection and response capabilities are surfaced. It provides a high level overview of where detections were seen and highlights where response actions are needed. @@ -57,7 +57,7 @@ Each group is further sub-categorized into their corresponding alert severity le For more information see, [Alerts overview](alerts-queue-windows-defender-advanced-threat-protection.md). -Each row includes an alert severity category and a short description of the alert. You can click an alert to see its detailed view. For more information see, [Investigate Windows Defender Advanced Threat Protection alerts](investigate-alerts-windows-defender-advanced-threat-protection.md) and [Alerts overview](alerts-queue-windows-defender-advanced-threat-protection.md). +Each row includes an alert severity category and a short description of the alert. You can click an alert to see its detailed view. For more information see, [Investigate Microsoft Defender Advanced Threat Protection alerts](investigate-alerts-windows-defender-advanced-threat-protection.md) and [Alerts overview](alerts-queue-windows-defender-advanced-threat-protection.md). @@ -66,18 +66,18 @@ This tile shows you a list of machines with the highest number of active alerts. ![The Machines at risk tile shows a list of machines with the highest number of alerts, and a breakdown of the severity of the alerts](images/machines-at-risk-tile.png) -Click the name of the machine to see details about that machine. For more information see, [Investigate machines in the Windows Defender Advanced Threat Protection Machines list](investigate-machines-windows-defender-advanced-threat-protection.md). +Click the name of the machine to see details about that machine. For more information see, [Investigate machines in the Microsoft Defender Advanced Threat Protection Machines list](investigate-machines-windows-defender-advanced-threat-protection.md). -You can also click **Machines list** at the top of the tile to go directly to the **Machines list**, sorted by the number of active alerts. For more information see, [Investigate machines in the Windows Defender Advanced Threat Protection Machines list](investigate-machines-windows-defender-advanced-threat-protection.md). +You can also click **Machines list** at the top of the tile to go directly to the **Machines list**, sorted by the number of active alerts. For more information see, [Investigate machines in the Microsoft Defender Advanced Threat Protection Machines list](investigate-machines-windows-defender-advanced-threat-protection.md). ## Sensor health -The **Sensor health** tile provides information on the individual machine’s ability to provide sensor data to the Windows Defender ATP service. It reports how many machines require attention and helps you identify problematic machines. +The **Sensor health** tile provides information on the individual machine’s ability to provide sensor data to the Microsoft Defender ATP service. It reports how many machines require attention and helps you identify problematic machines. ![Sensor health tile](images/atp-tile-sensor-health.png) There are two status indicators that provide information on the number of machines that are not reporting properly to the service: -- **Misconfigured** – These machines might partially be reporting sensor data to the Windows Defender ATP service and might have configuration errors that need to be corrected. -- **Inactive** - Machines that have stopped reporting to the Windows Defender ATP service for more than seven days in the past month. +- **Misconfigured** – These machines might partially be reporting sensor data to the Microsoft Defender ATP service and might have configuration errors that need to be corrected. +- **Inactive** - Machines that have stopped reporting to the Microsoft Defender ATP service for more than seven days in the past month. When you click any of the groups, you’ll be directed to machines list, filtered according to your choice. For more information, see [Check sensor state](check-sensor-status-windows-defender-advanced-threat-protection.md) and [Investigate machines](investigate-machines-windows-defender-advanced-threat-protection.md). @@ -87,7 +87,7 @@ The **Service health** tile informs you if the service is active or if there are ![The Service health tile shows an overall indicator of the service](images/status-tile.png) -For more information on the service health, see [Check the Windows Defender ATP service health](service-status-windows-defender-advanced-threat-protection.md). +For more information on the service health, see [Check the Microsoft Defender ATP service health](service-status-windows-defender-advanced-threat-protection.md). ## Daily machines reporting @@ -124,10 +124,10 @@ This tile shows audit events based on detections from various security component ->Want to experience Windows Defender ATP? [Sign up for a free trial.](https://www.microsoft.com/en-us/WindowsForBusiness/windows-atp?ocid=docs-wdatp-secopsdashboard-belowfoldlink) +>Want to experience Microsoft Defender ATP? [Sign up for a free trial.](https://www.microsoft.com/en-us/WindowsForBusiness/windows-atp?ocid=docs-wdatp-secopsdashboard-belowfoldlink) ## Related topics -- [Understand the Windows Defender Advanced Threat Protection portal](use-windows-defender-advanced-threat-protection.md) +- [Understand the Microsoft Defender Advanced Threat Protection portal](use-windows-defender-advanced-threat-protection.md) - [Portal overview](portal-overview-windows-defender-advanced-threat-protection.md) - [View the Secure Score dashboard and improve your secure score](secure-score-dashboard-windows-defender-advanced-threat-protection.md) - [View the Threat analytics dashboard and take recommended mitigation actions](threat-analytics-dashboard-windows-defender-advanced-threat-protection.md) diff --git a/windows/security/threat-protection/microsoft-defender-atp/service-status.md b/windows/security/threat-protection/microsoft-defender-atp/service-status.md index a0ace19060..2a553f0551 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/service-status.md +++ b/windows/security/threat-protection/microsoft-defender-atp/service-status.md @@ -1,6 +1,6 @@ --- -title: Check the Windows Defender ATP service health -description: Check Windows Defender ATP service health, see if the service is experiencing issues and review previous issues that have been resolved. +title: Check the Microsoft Defender ATP service health +description: Check Microsoft Defender ATP service health, see if the service is experiencing issues and review previous issues that have been resolved. keywords: dashboard, service, issues, service health, current status, status history, summary of impact, preliminary root cause, resolution, resolution time, expected resolution time search.product: eADQiWindows 10XVcnh search.appverid: met150 @@ -18,14 +18,14 @@ ms.topic: article ms.date: 04/24/2018 --- -# Check the Windows Defender Advanced Threat Protection service health +# Check the Microsoft Defender Advanced Threat Protection service health **Applies to:** -- [Windows Defender Advanced Threat Protection (Windows Defender ATP)](https://go.microsoft.com/fwlink/p/?linkid=2069559) +- [Microsoft Defender Advanced Threat Protection (Microsoft Defender ATP)](https://go.microsoft.com/fwlink/p/?linkid=2069559) ->Want to experience Windows Defender ATP? [Sign up for a free trial.](https://www.microsoft.com/en-us/WindowsForBusiness/windows-atp?ocid=docs-wdatp-servicestatus-abovefoldlink) +>Want to experience Microsoft Defender ATP? [Sign up for a free trial.](https://www.microsoft.com/en-us/WindowsForBusiness/windows-atp?ocid=docs-wdatp-servicestatus-abovefoldlink) The **Service health** provides information on the current status of the Window Defender ATP service. You'll be able to verify that the service health is healthy or if there are current issues. If there are issues, you'll see details related to the issue such as when the issue was detected, what the preliminary root cause is, and the expected resolution time. @@ -39,7 +39,7 @@ The **Service health** details page has the following tabs: - **Status history** ## Current status -The **Current status** tab shows the current state of the Windows Defender ATP service. When the service is running smoothly a healthy service health is shown. If there are issues seen, the following service details are shown to help you gain better insight about the issue: +The **Current status** tab shows the current state of the Microsoft Defender ATP service. When the service is running smoothly a healthy service health is shown. If there are issues seen, the following service details are shown to help you gain better insight about the issue: - Date and time for when the issue was detected - A short description of the issue diff --git a/windows/security/threat-protection/microsoft-defender-atp/stop-and-quarantine-file.md b/windows/security/threat-protection/microsoft-defender-atp/stop-and-quarantine-file.md index 49687ff26c..745cdec188 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/stop-and-quarantine-file.md +++ b/windows/security/threat-protection/microsoft-defender-atp/stop-and-quarantine-file.md @@ -20,7 +20,7 @@ ms.date: 12/08/2017 # Stop and quarantine file API **Applies to:** -- Windows Defender Advanced Threat Protection (Windows Defender ATP) +- Microsoft Defender Advanced Threat Protection (Microsoft Defender ATP) [!include[Prereleaseinformation](prerelease.md)] @@ -29,7 +29,7 @@ ms.date: 12/08/2017 [!include[Machine actions note](machineactionsnote.md)] ## Permissions -One of the following permissions is required to call this API. To learn more, including how to choose permissions, see [Use Windows Defender ATP APIs](apis-intro.md) +One of the following permissions is required to call this API. To learn more, including how to choose permissions, see [Use Microsoft Defender ATP APIs](apis-intro.md) Permission type | Permission | Permission display name :---|:---|:--- diff --git a/windows/security/threat-protection/microsoft-defender-atp/supported-response-apis.md b/windows/security/threat-protection/microsoft-defender-atp/supported-response-apis.md index 14621034da..1e52dffbc2 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/supported-response-apis.md +++ b/windows/security/threat-protection/microsoft-defender-atp/supported-response-apis.md @@ -1,6 +1,6 @@ --- -title: Supported Windows Defender Advanced Threat Protection response APIs -description: Learn about the specific response related Windows Defender Advanced Threat Protection API calls. +title: Supported Microsoft Defender Advanced Threat Protection response APIs +description: Learn about the specific response related Microsoft Defender Advanced Threat Protection API calls. keywords: response apis, graph api, supported apis, actor, alerts, machine, user, domain, ip, file search.product: eADQiWindows 10XVcnh search.appverid: met150 @@ -18,13 +18,13 @@ ms.topic: conceptual ms.date: 12/01/2017 --- -# Supported Windows Defender ATP query APIs +# Supported Microsoft Defender ATP query APIs **Applies to:** -- [Windows Defender Advanced Threat Protection (Windows Defender ATP)](https://go.microsoft.com/fwlink/p/?linkid=2069559) +- [Microsoft Defender Advanced Threat Protection (Microsoft Defender ATP)](https://go.microsoft.com/fwlink/p/?linkid=2069559) ->Want to experience Windows Defender ATP? [Sign up for a free trial.](https://www.microsoft.com/en-us/WindowsForBusiness/windows-atp?ocid=docs-wdatp-supported-response-apis-abovefoldlink) +>Want to experience Microsoft Defender ATP? [Sign up for a free trial.](https://www.microsoft.com/en-us/WindowsForBusiness/windows-atp?ocid=docs-wdatp-supported-response-apis-abovefoldlink) Learn about the supported response related API calls you can run and details such as the required request headers, and expected response from the calls. diff --git a/windows/security/threat-protection/microsoft-defender-atp/threat-analytics.md b/windows/security/threat-protection/microsoft-defender-atp/threat-analytics.md index 9a145edebb..534c8fb1d3 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/threat-analytics.md +++ b/windows/security/threat-protection/microsoft-defender-atp/threat-analytics.md @@ -1,5 +1,5 @@ --- -title: Windows Defender Advanced Threat Protection Threat analytics +title: Microsoft Defender Advanced Threat Protection Threat analytics description: Get a tailored organizational risk evaluation and actionable steps you can take to minimize risks in your organization. keywords: threat analytics, risk evaluation, OS mitigation, microcode mitigation, mitigation status search.product: eADQiWindows 10XVcnh @@ -20,12 +20,12 @@ ms.date: 10/29/2018 # Threat analytics **Applies to:** -- [Windows Defender Advanced Threat Protection (Windows Defender ATP)](https://go.microsoft.com/fwlink/p/?linkid=2069559) +- [Microsoft Defender Advanced Threat Protection (Microsoft Defender ATP)](https://go.microsoft.com/fwlink/p/?linkid=2069559) Cyberthreats are emerging more frequently and prevalently. It is critical for organizations to be able to quickly assess their security posture, including impact, and organizational resilience in the context of specific emerging threats. -Threat Analytics is a set of interactive reports published by the Windows Defender ATP research team as soon as emerging threats and outbreaks are identified. The reports help you the assess impact of threats in your environment and provides recommended actions to contain, increase organizational resilience, and prevent specific threats. +Threat Analytics is a set of interactive reports published by the Microsoft Defender ATP research team as soon as emerging threats and outbreaks are identified. The reports help you the assess impact of threats in your environment and provides recommended actions to contain, increase organizational resilience, and prevent specific threats. >[!NOTE] diff --git a/windows/security/threat-protection/microsoft-defender-atp/threat-indicator-concepts.md b/windows/security/threat-protection/microsoft-defender-atp/threat-indicator-concepts.md index 005f30d3e8..5274b81da4 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/threat-indicator-concepts.md +++ b/windows/security/threat-protection/microsoft-defender-atp/threat-indicator-concepts.md @@ -1,6 +1,6 @@ --- -title: Understand threat intelligence concepts in Windows Defender ATP -description: Create custom threat alerts for your organization and learn the concepts around threat intelligence in Windows Defender Advanced Threat Protection. +title: Understand threat intelligence concepts in Microsoft Defender ATP +description: Create custom threat alerts for your organization and learn the concepts around threat intelligence in Microsoft Defender Advanced Threat Protection. keywords: threat intelligence, alert definitions, indicators of compromise, ioc search.product: eADQiWindows 10XVcnh search.appverid: met150 @@ -20,15 +20,15 @@ ms.topic: conceptual # Understand threat intelligence concepts **Applies to:** -- [Windows Defender Advanced Threat Protection (Windows Defender ATP)](https://go.microsoft.com/fwlink/p/?linkid=2069559) +- [Microsoft Defender Advanced Threat Protection (Microsoft Defender ATP)](https://go.microsoft.com/fwlink/p/?linkid=2069559) ->Want to experience Windows Defender ATP? [Sign up for a free trial.](https://www.microsoft.com/en-us/WindowsForBusiness/windows-atp?ocid=docs-wdatp-threatindicator-abovefoldlink) +>Want to experience Microsoft Defender ATP? [Sign up for a free trial.](https://www.microsoft.com/en-us/WindowsForBusiness/windows-atp?ocid=docs-wdatp-threatindicator-abovefoldlink) Advanced cybersecurity attacks comprise of multiple complex malicious events, attributes, and contextual information. Identifying and deciding which of these activities qualify as suspicious can be a challenging task. Your knowledge of known attributes and abnormal activities specific to your industry is fundamental in knowing when to call an observed behavior as suspicious. -With Windows Defender ATP, you can create custom threat alerts that can help you keep track of possible attack activities in your organization. You can flag suspicious events to piece together clues and possibly stop an attack chain. These custom threat alerts will only appear in your organization and will flag events that you set it to track. +With Microsoft Defender ATP, you can create custom threat alerts that can help you keep track of possible attack activities in your organization. You can flag suspicious events to piece together clues and possibly stop an attack chain. These custom threat alerts will only appear in your organization and will flag events that you set it to track. Before creating custom threat alerts, it's important to know the concepts behind alert definitions and indicators of compromise (IOCs) and the relationship between them. @@ -39,9 +39,9 @@ Alert definitions are contextual attributes that can be used collectively to ide IOCs are individually-known malicious events that indicate that a network or machine has already been breached. Unlike alert definitions, these indicators are considered as evidence of a breach. They are often seen after an attack has already been carried out and the objective has been reached, such as exfiltration. Keeping track of IOCs is also important during forensic investigations. Although it might not provide the ability to intervene with an attack chain, gathering these indicators can be useful in creating better defenses for possible future attacks. ## Relationship between alert definitions and IOCs -In the context of Windows Defender ATP, alert definitions are containers for IOCs and defines the alert, including the metadata that is raised in case of a specific IOC match. Various metadata is provided as part of the alert definitions. Metadata such as alert definition name of attack, severity, and description is provided along with other options. For more information on available metadata options, see [Threat Intelligence API metadata](custom-ti-api-windows-defender-advanced-threat-protection.md#threat-intelligence-api-metadata). +In the context of Microsoft Defender ATP, alert definitions are containers for IOCs and defines the alert, including the metadata that is raised in case of a specific IOC match. Various metadata is provided as part of the alert definitions. Metadata such as alert definition name of attack, severity, and description is provided along with other options. For more information on available metadata options, see [Threat Intelligence API metadata](custom-ti-api-windows-defender-advanced-threat-protection.md#threat-intelligence-api-metadata). -Each IOC defines the concrete detection logic based on its type and value as well as its action, which determines how it is matched. It is bound to a specific alert definition that defines how a detection is displayed as an alert on the Windows Defender ATP console. +Each IOC defines the concrete detection logic based on its type and value as well as its action, which determines how it is matched. It is bound to a specific alert definition that defines how a detection is displayed as an alert on the Microsoft Defender ATP console. Here is an example of an IOC: - Type: Sha1 @@ -51,7 +51,7 @@ Here is an example of an IOC: IOCs have a many-to-one relationship with alert definitions such that an alert definition can have many IOCs that correspond to it. ## Related topics -- [Enable the custom threat intelligence API in Windows Defender ATP](enable-custom-ti-windows-defender-advanced-threat-protection.md) +- [Enable the custom threat intelligence API in Microsoft Defender ATP](enable-custom-ti-windows-defender-advanced-threat-protection.md) - [Create custom alerts using the threat intelligence API](custom-ti-api-windows-defender-advanced-threat-protection.md) - [PowerShell code examples for the custom threat intelligence API](powershell-example-code-windows-defender-advanced-threat-protection.md) - [Python code examples for the custom threat intelligence API](python-example-code-windows-defender-advanced-threat-protection.md) diff --git a/windows/security/threat-protection/microsoft-defender-atp/threat-protection-integration.md b/windows/security/threat-protection/microsoft-defender-atp/threat-protection-integration.md index 026ac5e02d..da34c747c5 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/threat-protection-integration.md +++ b/windows/security/threat-protection/microsoft-defender-atp/threat-protection-integration.md @@ -1,5 +1,5 @@ --- -title: Windows Defender ATP in Microsoft Threat Protection +title: Microsoft Defender ATP in Microsoft Threat Protection description: Learn about the capabilities within the Microsoft Threat Protection keywords: microsoft threat protection, conditional access, office, advanced threat protection, azure atp, azure security center, microsoft cloud app security search.product: eADQiWindows 10XVcnh @@ -22,9 +22,9 @@ ms.date: 12/03/2018 **Applies to:** -- [Windows Defender Advanced Threat Protection (Windows Defender ATP)](https://go.microsoft.com/fwlink/p/?linkid=2069559) +- [Microsoft Defender Advanced Threat Protection (Microsoft Defender ATP)](https://go.microsoft.com/fwlink/p/?linkid=2069559) -Windows Defender ATP is part of the Microsoft Threat Protection solution that helps implement end-to-end security across possible attack surfaces in the modern workplace. +Microsoft Defender ATP is part of the Microsoft Threat Protection solution that helps implement end-to-end security across possible attack surfaces in the modern workplace. For more information on Microsoft Threat Protection, see [Announcing Microsoft Threat Protection](https://techcommunity.microsoft.com/t5/Security-Privacy-and-Compliance/Announcing-Microsoft-Threat-Protection/ba-p/262783). @@ -33,23 +33,23 @@ Microsoft's multiple layers of threat protection across data, applications, devi Each layer in the threat protection stack plays a critical role in protecting customers. The deep integration between these layers results in better protected customers. ## Azure Advanced Threat Protection (Azure ATP) - Suspicious activities are processes running under a user context. The integration between Windows Defender ATP and Azure ATP provides the flexibility of conducting cyber security investigation across activities and identities. + Suspicious activities are processes running under a user context. The integration between Microsoft Defender ATP and Azure ATP provides the flexibility of conducting cyber security investigation across activities and identities. ## Azure Security Center -Windows Defender ATP provides a comprehensive server protection solution, including endpoint detection and response (EDR) capabilities on Windows Servers. +Microsoft Defender ATP provides a comprehensive server protection solution, including endpoint detection and response (EDR) capabilities on Windows Servers. ## Azure Information Protection Keep sensitive data secure while enabling productivity in the workplace through data data discovery and data protection. ## Conditional access -Windows Defender ATP's dynamic machine risk score is integrated into the conditional access evaluation, ensuring that only secure devices have access to resources. +Microsoft Defender ATP's dynamic machine risk score is integrated into the conditional access evaluation, ensuring that only secure devices have access to resources. ## Microsoft Cloud App Security -Microsoft Cloud App Security leverages Windows Defender ATP endpoint signals to allow direct visibility into cloud application usage including the use of unsupported cloud services (shadow IT) from all Windows Defender ATP monitored machines. +Microsoft Cloud App Security leverages Microsoft Defender ATP endpoint signals to allow direct visibility into cloud application usage including the use of unsupported cloud services (shadow IT) from all Microsoft Defender ATP monitored machines. ## Office 365 Advanced Threat Protection (Office 365 ATP) -[Office 365 ATP](https://docs.microsoft.com/office365/securitycompliance/office-365-atp) helps protect your organization from malware in email messages or files through ATP Safe Links, ATP Safe Attachments, advanced Anti-Phishing, and spoof intelligence capabilities. The integration between Office 365 ATP and Windows Defender ATP enables security analysts to go upstream to investigate the entry point of an attack. Through threat intelligence sharing, attacks can be contained and blocked. +[Office 365 ATP](https://docs.microsoft.com/office365/securitycompliance/office-365-atp) helps protect your organization from malware in email messages or files through ATP Safe Links, ATP Safe Attachments, advanced Anti-Phishing, and spoof intelligence capabilities. The integration between Office 365 ATP and Microsoft Defender ATP enables security analysts to go upstream to investigate the entry point of an attack. Through threat intelligence sharing, attacks can be contained and blocked. ## Skype for Business The Skype for Business integration provides s a way for analysts to communicate with a potentially compromised user or device owner through ao simple button from the portal. diff --git a/windows/security/threat-protection/microsoft-defender-atp/threat-protection-reports.md b/windows/security/threat-protection/microsoft-defender-atp/threat-protection-reports.md index c95bd47a62..37eb716bfc 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/threat-protection-reports.md +++ b/windows/security/threat-protection/microsoft-defender-atp/threat-protection-reports.md @@ -1,5 +1,5 @@ --- -title: Threat protection report in Windows Defender ATP +title: Threat protection report in Microsoft Defender ATP description: Track alert detections, categories, and severity using the threat protection report keywords: alert detection, source, alert by category, alert severity, alert classification, determination search.product: eADQiWindows 10XVcnh @@ -17,10 +17,10 @@ ms.collection: M365-security-compliance ms.topic: article --- -# Threat protection report in Windows Defender ATP +# Threat protection report in Microsoft Defender ATP **Applies to:** -- [Windows Defender Advanced Threat Protection (Windows Defender ATP)](https://go.microsoft.com/fwlink/p/?linkid=2069559) +- [Microsoft Defender Advanced Threat Protection (Microsoft Defender ATP)](https://go.microsoft.com/fwlink/p/?linkid=2069559) [!include[Prerelease information](prerelease.md)] @@ -52,7 +52,7 @@ While the alert trends shows trending alert information, the alert summary shows ## Alert attributes The report is made up of cards that display the following alert attributes: -- **Detection sources**: shows information about the sensors and detection technologies that provide the data used by Windows Defender ATP to trigger alerts. +- **Detection sources**: shows information about the sensors and detection technologies that provide the data used by Microsoft Defender ATP to trigger alerts. - **Threat categories**: shows the types of threat or attack activity that triggered alerts, indicating possible focus areas for your security operations. diff --git a/windows/security/threat-protection/microsoft-defender-atp/ti-indicator.md b/windows/security/threat-protection/microsoft-defender-atp/ti-indicator.md index ae5f7b984d..944fdf6c3c 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/ti-indicator.md +++ b/windows/security/threat-protection/microsoft-defender-atp/ti-indicator.md @@ -18,7 +18,7 @@ ms.topic: article # Indicator resource type -**Applies to:** - Windows Defender Advanced Threat Protection (Windows Defender ATP) +**Applies to:** - Microsoft Defender Advanced Threat Protection (Microsoft Defender ATP) [!include[Prerelease information](prerelease.md)] diff --git a/windows/security/threat-protection/microsoft-defender-atp/time-settings.md b/windows/security/threat-protection/microsoft-defender-atp/time-settings.md index 0a8c046f35..a2617401bd 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/time-settings.md +++ b/windows/security/threat-protection/microsoft-defender-atp/time-settings.md @@ -21,11 +21,11 @@ ms.date: 02/13/2018 # Windows Defender Security Center time zone settings **Applies to:** -- [Windows Defender Advanced Threat Protection (Windows Defender ATP)](https://go.microsoft.com/fwlink/p/?linkid=2069559) +- [Microsoft Defender Advanced Threat Protection (Microsoft Defender ATP)](https://go.microsoft.com/fwlink/p/?linkid=2069559) ->Want to experience Windows Defender ATP? [Sign up for a free trial.](https://www.microsoft.com/en-us/WindowsForBusiness/windows-atp?ocid=docs-wdatp-settings-abovefoldlink) +>Want to experience Microsoft Defender ATP? [Sign up for a free trial.](https://www.microsoft.com/en-us/WindowsForBusiness/windows-atp?ocid=docs-wdatp-settings-abovefoldlink) Use the **Time zone** menu ![Time zone settings icon](images/atp-time-zone.png) to configure the time zone and view license information. @@ -34,25 +34,25 @@ The aspect of time is important in the assessment and analysis of perceived and Cyberforensic investigations often rely on time stamps to piece together the sequence of events. It’s important that your system reflects the correct time zone settings. -Windows Defender ATP can display either Coordinated Universal Time (UTC) or local time. +Microsoft Defender ATP can display either Coordinated Universal Time (UTC) or local time. -Your current time zone setting is shown in the Windows Defender ATP menu. You can change the displayed time zone in the **Time zone** menu ![Time zone settings icon](images/atp-time-zone.png). +Your current time zone setting is shown in the Microsoft Defender ATP menu. You can change the displayed time zone in the **Time zone** menu ![Time zone settings icon](images/atp-time-zone.png). ### UTC time zone -Windows Defender ATP uses UTC time by default. +Microsoft Defender ATP uses UTC time by default. -Setting the Windows Defender ATP time zone to UTC will display all system timestamps (alerts, events, and others) in UTC for all users. This can help security analysts working in different locations across the globe to use the same time stamps while investigating events. +Setting the Microsoft Defender ATP time zone to UTC will display all system timestamps (alerts, events, and others) in UTC for all users. This can help security analysts working in different locations across the globe to use the same time stamps while investigating events. ### Local time zone -You can choose to have Windows Defender ATP use local time zone settings. All alerts and events will be displayed using your local time zone. +You can choose to have Microsoft Defender ATP use local time zone settings. All alerts and events will be displayed using your local time zone. -The local time zone is taken from your machine’s regional settings. If you change your regional settings, the Windows Defender ATP time zone will also change. Choosing this setting means that the timestamps displayed in Windows Defender ATP will be aligned to local time for all Windows Defender ATP users. Analysts located in different global locations will now see the Windows Defender ATP alerts according to their regional settings. +The local time zone is taken from your machine’s regional settings. If you change your regional settings, the Microsoft Defender ATP time zone will also change. Choosing this setting means that the timestamps displayed in Microsoft Defender ATP will be aligned to local time for all Microsoft Defender ATP users. Analysts located in different global locations will now see the Microsoft Defender ATP alerts according to their regional settings. Choosing to use local time can be useful if the analysts are located in a single location. In this case it might be easier to correlate events to local time, for example – when a local user clicked on a suspicious email link. ### Set the time zone -The Windows Defender ATP time zone is set by default to UTC. -Setting the time zone also changes the times for all Windows Defender ATP views. +The Microsoft Defender ATP time zone is set by default to UTC. +Setting the time zone also changes the times for all Microsoft Defender ATP views. To set the time zone: 1. Click the **Time zone** menu ![Time zone settings icon](images/atp-time-zone.png). @@ -60,7 +60,7 @@ To set the time zone: 3. Select **Timezone UTC** or your local time zone, for example -7:00. ### Regional settings -To apply different date formats for Windows Defender ATP, use regional settings for Internet Explorer (IE) and Microsoft Edge (Edge). If you're using another browser such as Google Chrome, follow the required steps to change the time and date settings for that browser. +To apply different date formats for Microsoft Defender ATP, use regional settings for Internet Explorer (IE) and Microsoft Edge (Edge). If you're using another browser such as Google Chrome, follow the required steps to change the time and date settings for that browser. **Internet Explorer (IE) and Microsoft Edge** diff --git a/windows/security/threat-protection/microsoft-defender-atp/troubleshoot-custom-ti.md b/windows/security/threat-protection/microsoft-defender-atp/troubleshoot-custom-ti.md index 500048787b..c2d0bdf3c6 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/troubleshoot-custom-ti.md +++ b/windows/security/threat-protection/microsoft-defender-atp/troubleshoot-custom-ti.md @@ -1,6 +1,6 @@ --- -title: Troubleshoot custom threat intelligence issues in Windows Defender ATP -description: Troubleshoot issues that might arise when using the custom threat intelligence feature in Windows Defender ATP. +title: Troubleshoot custom threat intelligence issues in Microsoft Defender ATP +description: Troubleshoot issues that might arise when using the custom threat intelligence feature in Microsoft Defender ATP. keywords: troubleshoot, custom threat intelligence, custom ti, rest api, api, alert definitions, indicators of compromise search.product: eADQiWindows 10XVcnh search.appverid: met150 @@ -23,7 +23,7 @@ ms.date: 06/25/2018 **Applies to:** -- [Windows Defender Advanced Threat Protection (Windows Defender ATP)](https://go.microsoft.com/fwlink/p/?linkid=2069559) +- [Microsoft Defender Advanced Threat Protection (Microsoft Defender ATP)](https://go.microsoft.com/fwlink/p/?linkid=2069559) @@ -52,12 +52,12 @@ If your client secret expires or if you've misplaced the copy provided when you 7. Copy the value and save it in a safe place. ->Want to experience Windows Defender ATP? [Sign up for a free trial.](https://www.microsoft.com/en-us/WindowsForBusiness/windows-atp?ocid=docs-wdatp-troubleshootcustomti-belowfoldlink) +>Want to experience Microsoft Defender ATP? [Sign up for a free trial.](https://www.microsoft.com/en-us/WindowsForBusiness/windows-atp?ocid=docs-wdatp-troubleshootcustomti-belowfoldlink) ## Related topics - [Understand threat intelligence concepts](threat-indicator-concepts-windows-defender-advanced-threat-protection.md) -- [Enable the custom threat intelligence API in Windows Defender ATP](enable-custom-ti-windows-defender-advanced-threat-protection.md) +- [Enable the custom threat intelligence API in Microsoft Defender ATP](enable-custom-ti-windows-defender-advanced-threat-protection.md) - [Create custom alerts using the threat intelligence API](custom-ti-api-windows-defender-advanced-threat-protection.md) - [PowerShell code examples for the custom threat intelligence API](powershell-example-code-windows-defender-advanced-threat-protection.md) - [Python code examples for the custom threat intelligence API](python-example-code-windows-defender-advanced-threat-protection.md) diff --git a/windows/security/threat-protection/microsoft-defender-atp/troubleshoot-onboarding-error-messages.md b/windows/security/threat-protection/microsoft-defender-atp/troubleshoot-onboarding-error-messages.md index 3f520e22f4..01557d7ec5 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/troubleshoot-onboarding-error-messages.md +++ b/windows/security/threat-protection/microsoft-defender-atp/troubleshoot-onboarding-error-messages.md @@ -1,6 +1,6 @@ --- title: Troubleshoot onboarding issues and error messages -description: Troubleshoot onboarding issues and error message while completing setup of Windows Defender Advanced Threat Protection. +description: Troubleshoot onboarding issues and error message while completing setup of Microsoft Defender Advanced Threat Protection. keywords: troubleshoot, troubleshooting, Azure Active Directory, onboarding, error message, error messages, windows defender atp search.product: eADQiWindows 10XVcnh search.appverid: met150 @@ -23,19 +23,19 @@ ms.date: 08/01/2018 **Applies to:** -- [Windows Defender Advanced Threat Protection (Windows Defender ATP)](https://go.microsoft.com/fwlink/p/?linkid=2069559) +- [Microsoft Defender Advanced Threat Protection (Microsoft Defender ATP)](https://go.microsoft.com/fwlink/p/?linkid=2069559) ->Want to experience Windows Defender ATP? [Sign up for a free trial.](https://www.microsoft.com/en-us/WindowsForBusiness/windows-atp?ocid=docs-wdatp-troublshootonboarding-abovefoldlink) +>Want to experience Microsoft Defender ATP? [Sign up for a free trial.](https://www.microsoft.com/en-us/WindowsForBusiness/windows-atp?ocid=docs-wdatp-troublshootonboarding-abovefoldlink) -This page provides detailed steps to troubleshoot issues that might occur when setting up your Windows Defender ATP service. +This page provides detailed steps to troubleshoot issues that might occur when setting up your Microsoft Defender ATP service. If you receive an error message, Windows Defender Security Center will provide a detailed explanation on what the issue is and relevant links will be supplied. ## No subscriptions found -If while accessing Windows Defender Security Center you get a **No subscriptions found** message, it means the Azure Active Directory (AAD) used to login the user to the portal, does not have a Windows Defender ATP license. +If while accessing Windows Defender Security Center you get a **No subscriptions found** message, it means the Azure Active Directory (AAD) used to login the user to the portal, does not have a Microsoft Defender ATP license. Potential reasons: - The Windows E5 and Office E5 licenses are separate licenses. @@ -43,14 +43,14 @@ Potential reasons: - It could be a license provisioning issue. - It could be you inadvertently provisioned the license to a different Microsoft AAD than the one used for authentication into the service. -For both cases you should contact Microsoft support at [General Windows Defender ATP Support](https://support.microsoft.com/getsupport?wf=0&tenant=ClassicCommercial&oaspworkflow=start_1.0.0.0&locale=en-us&supportregion=en-us&pesid=16055&ccsid=636419533611396913) or +For both cases you should contact Microsoft support at [General Microsoft Defender ATP Support](https://support.microsoft.com/getsupport?wf=0&tenant=ClassicCommercial&oaspworkflow=start_1.0.0.0&locale=en-us&supportregion=en-us&pesid=16055&ccsid=636419533611396913) or [Volume license support](https://www.microsoft.com/licensing/servicecenter/Help/Contact.aspx). ![Image of no subscriptions found](images\atp-no-subscriptions-found.png) ## Your subscription has expired -If while accessing Windows Defender Security Center you get a **Your subscription has expired** message, your online service subscription has expired. Windows Defender ATP subscription, like any other online service subscription, has an expiration date. +If while accessing Windows Defender Security Center you get a **Your subscription has expired** message, your online service subscription has expired. Microsoft Defender ATP subscription, like any other online service subscription, has an expiration date. You can choose to renew or extend the license at any point in time. When accessing the portal after the expiration date a **Your subscription has expired** message will be presented with an option to download the machine offboarding package, should you choose to not renew the license. @@ -61,7 +61,7 @@ You can choose to renew or extend the license at any point in time. When accessi ## You are not authorized to access the portal -If you receive a **You are not authorized to access the portal**, be aware that Windows Defender ATP is a security monitoring, incident investigation and response product, and as such, access to it is restricted and controlled by the user. +If you receive a **You are not authorized to access the portal**, be aware that Microsoft Defender ATP is a security monitoring, incident investigation and response product, and as such, access to it is restricted and controlled by the user. For more information see, [**Assign user access to the portal**](https://docs.microsoft.com/windows/threat-protection/windows-defender-atp/assign-portal-access-windows-defender-advanced-threat-protection). ![Image of not authorized to access portal](images\atp-not-authorized-to-access-portal.png) @@ -91,4 +91,4 @@ crl.microsoft.com` ## Related topics -- [Validate licensing provisioning and complete setup for Windows Defender ATP](licensing-windows-defender-advanced-threat-protection.md) \ No newline at end of file +- [Validate licensing provisioning and complete setup for Microsoft Defender ATP](licensing-windows-defender-advanced-threat-protection.md) \ No newline at end of file diff --git a/windows/security/threat-protection/microsoft-defender-atp/troubleshoot-onboarding.md b/windows/security/threat-protection/microsoft-defender-atp/troubleshoot-onboarding.md index 0f2789ceb5..5993a17f98 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/troubleshoot-onboarding.md +++ b/windows/security/threat-protection/microsoft-defender-atp/troubleshoot-onboarding.md @@ -1,6 +1,6 @@ --- -title: Troubleshoot Windows Defender ATP onboarding issues -description: Troubleshoot issues that might arise during the onboarding of machines or to the Windows Defender ATP service. +title: Troubleshoot Microsoft Defender ATP onboarding issues +description: Troubleshoot issues that might arise during the onboarding of machines or to the Microsoft Defender ATP service. keywords: troubleshoot onboarding, onboarding issues, event viewer, data collection and preview builds, sensor data and diagnostics search.product: eADQiWindows 10XVcnh search.appverid: met150 @@ -17,16 +17,16 @@ ms.collection: M365-security-compliance ms.topic: troubleshooting --- -# Troubleshoot Windows Defender Advanced Threat Protection onboarding issues +# Troubleshoot Microsoft Defender Advanced Threat Protection onboarding issues **Applies to:** -- [Windows Defender Advanced Threat Protection (Windows Defender ATP)](https://go.microsoft.com/fwlink/p/?linkid=2069559) +- [Microsoft Defender Advanced Threat Protection (Microsoft Defender ATP)](https://go.microsoft.com/fwlink/p/?linkid=2069559) - Windows Server 2012 R2 - Windows Server 2016 -You might need to troubleshoot the Windows Defender ATP onboarding process if you encounter issues. +You might need to troubleshoot the Microsoft Defender ATP onboarding process if you encounter issues. This page provides detailed steps to troubleshoot onboarding issues that might occur when deploying with one of the deployment tools and common errors that might occur on the machines. If you have completed the onboarding process and don't see machines in the [Machines list](investigate-machines-windows-defender-advanced-threat-protection.md) after an hour, it might indicate an onboarding or connectivity problem. @@ -95,10 +95,10 @@ If none of the event logs and troubleshooting steps work, download the Local scr Error Code Hex | Error Code Dec | Error Description | OMA-URI | Possible cause and troubleshooting steps :---|:---|:---|:---|:--- 0x87D1FDE8 | -2016281112 | Remediation failed | Onboarding
Offboarding | **Possible cause:** Onboarding or offboarding failed on a wrong blob: wrong signature or missing PreviousOrgIds fields.

**Troubleshooting steps:**
Check the event IDs in the [View agent onboarding errors in the machine event log](#view-agent-onboarding-errors-in-the-machine-event-log) section.

Check the MDM event logs in the following table or follow the instructions in [Diagnose MDM failures in Windows 10](https://msdn.microsoft.com/library/windows/hardware/mt632120%28v=vs.85%29.aspx). - | | | | Onboarding
Offboarding
SampleSharing | **Possible cause:** Windows Defender ATP Policy registry key does not exist or the OMA DM client doesn't have permissions to write to it.

**Troubleshooting steps:** Ensure that the following registry key exists: ```HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows Advanced Threat Protection```

If it doesn't exist, open an elevated command and add the key. + | | | | Onboarding
Offboarding
SampleSharing | **Possible cause:** Microsoft Defender ATP Policy registry key does not exist or the OMA DM client doesn't have permissions to write to it.

**Troubleshooting steps:** Ensure that the following registry key exists: ```HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows Advanced Threat Protection```

If it doesn't exist, open an elevated command and add the key. | | | | SenseIsRunning
OnboardingState
OrgId | **Possible cause:** An attempt to remediate by read-only property. Onboarding has failed.

**Troubleshooting steps:** Check the troubleshooting steps in [Troubleshoot onboarding issues on the machine](#troubleshoot-onboarding-issues-on-the-machine).

Check the MDM event logs in the following table or follow the instructions in [Diagnose MDM failures in Windows 10](https://msdn.microsoft.com/library/windows/hardware/mt632120%28v=vs.85%29.aspx). - || | | All | **Possible cause:** Attempt to deploy Windows Defender ATP on non-supported SKU/Platform, particularly Holographic SKU.

Currently is supported platforms: Enterprise, Education, and Professional.
Server is not supported. - 0x87D101A9 | -2016345687 |Syncml(425): The requested command failed because the sender does not have adequate access control permissions (ACL) on the recipient. | All | **Possible cause:** Attempt to deploy Windows Defender ATP on non-supported SKU/Platform, particularly Holographic SKU.

Currently is supported platforms: Enterprise, Education, and Professional. + || | | All | **Possible cause:** Attempt to deploy Microsoft Defender ATP on non-supported SKU/Platform, particularly Holographic SKU.

Currently is supported platforms: Enterprise, Education, and Professional.
Server is not supported. + 0x87D101A9 | -2016345687 |Syncml(425): The requested command failed because the sender does not have adequate access control permissions (ACL) on the recipient. | All | **Possible cause:** Attempt to deploy Microsoft Defender ATP on non-supported SKU/Platform, particularly Holographic SKU.

Currently is supported platforms: Enterprise, Education, and Professional.
**Known issues with non-compliance** @@ -122,10 +122,10 @@ Channel name: Admin ID | Severity | Event description | Troubleshooting steps :---|:---|:---|:--- -1819 | Error | Windows Defender Advanced Threat Protection CSP: Failed to Set Node's Value. NodeId: (%1), TokenName: (%2), Result: (%3). | Download the [Cumulative Update for Windows 10, 1607](https://go.microsoft.com/fwlink/?linkid=829760). +1819 | Error | Microsoft Defender Advanced Threat Protection CSP: Failed to Set Node's Value. NodeId: (%1), TokenName: (%2), Result: (%3). | Download the [Cumulative Update for Windows 10, 1607](https://go.microsoft.com/fwlink/?linkid=829760). ## Troubleshoot onboarding issues on the machine -If the deployment tools used does not indicate an error in the onboarding process, but machines are still not appearing in the machines list in an hour, go through the following verification topics to check if an error occurred with the Windows Defender ATP agent: +If the deployment tools used does not indicate an error in the onboarding process, but machines are still not appearing in the machines list in an hour, go through the following verification topics to check if an error occurred with the Microsoft Defender ATP agent: - [View agent onboarding errors in the machine event log](#view-agent-onboarding-errors-in-the-machine-event-log) - [Ensure the diagnostic data service is enabled](#ensure-the-diagnostics-service-is-enabled) - [Ensure the service is set to start](#ensure-the-service-is-set-to-start) @@ -140,7 +140,7 @@ If the deployment tools used does not indicate an error in the onboarding proces 2. In the **Event Viewer (Local)** pane, expand **Applications and Services Logs** > **Microsoft** > **Windows** > **SENSE**. > [!NOTE] - > SENSE is the internal name used to refer to the behavioral sensor that powers Windows Defender ATP. + > SENSE is the internal name used to refer to the behavioral sensor that powers Microsoft Defender ATP. 3. Select **Operational** to load the log. @@ -154,17 +154,17 @@ If the deployment tools used does not indicate an error in the onboarding proces Event ID | Message | Resolution steps :---|:---|:--- -5 | Windows Defender Advanced Threat Protection service failed to connect to the server at _variable_ | [Ensure the machine has Internet access](#ensure-the-machine-has-an-internet-connection). -6 | Windows Defender Advanced Threat Protection service is not onboarded and no onboarding parameters were found. Failure code: _variable_ | [Run the onboarding script again](configure-endpoints-script-windows-defender-advanced-threat-protection.md). -7 | Windows Defender Advanced Threat Protection service failed to read the onboarding parameters. Failure code: _variable_ | [Ensure the machine has Internet access](#ensure-the-machine-has-an-internet-connection), then run the entire onboarding process again. -9 | Windows Defender Advanced Threat Protection service failed to change its start type. Failure code: variable | If the event happened during onboarding, reboot and re-attempt running the onboarding script. For more information, see [Run the onboarding script again](configure-endpoints-script-windows-defender-advanced-threat-protection.md).

If the event happened during offboarding, contact support. -10 | Windows Defender Advanced Threat Protection service failed to persist the onboarding information. Failure code: variable | If the event happened during onboarding, re-attempt running the onboarding script. For more information, see [Run the onboarding script again](configure-endpoints-script-windows-defender-advanced-threat-protection.md).

If the problem persists, contact support. -15 | Windows Defender Advanced Threat Protection cannot start command channel with URL: _variable_ | [Ensure the machine has Internet access](#ensure-the-machine-has-an-internet-connection). -17 | Windows Defender Advanced Threat Protection service failed to change the Connected User Experiences and Telemetry service location. Failure code: variable | [Run the onboarding script again](configure-endpoints-script-windows-defender-advanced-threat-protection.md). If the problem persists, contact support. -25 | Windows Defender Advanced Threat Protection service failed to reset health status in the registry. Failure code: _variable_ | Contact support. -27 | Failed to enable Windows Defender Advanced Threat Protection mode in Windows Defender. Onboarding process failed. Failure code: variable | Contact support. +5 | Microsoft Defender Advanced Threat Protection service failed to connect to the server at _variable_ | [Ensure the machine has Internet access](#ensure-the-machine-has-an-internet-connection). +6 | Microsoft Defender Advanced Threat Protection service is not onboarded and no onboarding parameters were found. Failure code: _variable_ | [Run the onboarding script again](configure-endpoints-script-windows-defender-advanced-threat-protection.md). +7 | Microsoft Defender Advanced Threat Protection service failed to read the onboarding parameters. Failure code: _variable_ | [Ensure the machine has Internet access](#ensure-the-machine-has-an-internet-connection), then run the entire onboarding process again. +9 | Microsoft Defender Advanced Threat Protection service failed to change its start type. Failure code: variable | If the event happened during onboarding, reboot and re-attempt running the onboarding script. For more information, see [Run the onboarding script again](configure-endpoints-script-windows-defender-advanced-threat-protection.md).

If the event happened during offboarding, contact support. +10 | Microsoft Defender Advanced Threat Protection service failed to persist the onboarding information. Failure code: variable | If the event happened during onboarding, re-attempt running the onboarding script. For more information, see [Run the onboarding script again](configure-endpoints-script-windows-defender-advanced-threat-protection.md).

If the problem persists, contact support. +15 | Microsoft Defender Advanced Threat Protection cannot start command channel with URL: _variable_ | [Ensure the machine has Internet access](#ensure-the-machine-has-an-internet-connection). +17 | Microsoft Defender Advanced Threat Protection service failed to change the Connected User Experiences and Telemetry service location. Failure code: variable | [Run the onboarding script again](configure-endpoints-script-windows-defender-advanced-threat-protection.md). If the problem persists, contact support. +25 | Microsoft Defender Advanced Threat Protection service failed to reset health status in the registry. Failure code: _variable_ | Contact support. +27 | Failed to enable Microsoft Defender Advanced Threat Protection mode in Windows Defender. Onboarding process failed. Failure code: variable | Contact support. 29 | Failed to read the offboarding parameters. Error type: %1, Error code: %2, Description: %3 | Ensure the machine has Internet access, then run the entire offboarding process again. -30 | Failed to disable $(build.sense.productDisplayName) mode in Windows Defender Advanced Threat Protection. Failure code: %1 | Contact support. +30 | Failed to disable $(build.sense.productDisplayName) mode in Microsoft Defender Advanced Threat Protection. Failure code: %1 | Contact support. 32 | $(build.sense.productDisplayName) service failed to request to stop itself after offboarding process. Failure code: %1 | Verify that the service start type is manual and reboot the machine. 55 | Failed to create the Secure ETW autologger. Failure code: %1 | Reboot the machine. 63 | Updating the start type of external service. Name: %1, actual start type: %2, expected start type: %3, exit code: %4 | Identify what is causing changes in start type of mentioned service. If the exit code is not 0, fix the start type manually to expected start type. @@ -173,7 +173,7 @@ Event ID | Message | Resolution steps 69 | The service is stopped. Service name: %1 | Start the mentioned service. Contact support if persists.
-There are additional components on the machine that the Windows Defender ATP agent depends on to function properly. If there are no onboarding related errors in the Windows Defender ATP agent event log, proceed with the following steps to ensure that the additional components are configured correctly. +There are additional components on the machine that the Microsoft Defender ATP agent depends on to function properly. If there are no onboarding related errors in the Microsoft Defender ATP agent event log, proceed with the following steps to ensure that the additional components are configured correctly. ### Ensure the diagnostic data service is enabled @@ -234,20 +234,20 @@ First, you should check that the service is set to start automatically when Wind ### Ensure the machine has an Internet connection -The Window Defender ATP sensor requires Microsoft Windows HTTP (WinHTTP) to report sensor data and communicate with the Windows Defender ATP service. +The Window Defender ATP sensor requires Microsoft Windows HTTP (WinHTTP) to report sensor data and communicate with the Microsoft Defender ATP service. WinHTTP is independent of the Internet browsing proxy settings and other user context applications and must be able to detect the proxy servers that are available in your particular environment. -To ensure that sensor has service connectivity, follow the steps described in the [Verify client connectivity to Windows Defender ATP service URLs](configure-proxy-internet-windows-defender-advanced-threat-protection.md#verify-client-connectivity-to-windows-defender-atp-service-urls) topic. +To ensure that sensor has service connectivity, follow the steps described in the [Verify client connectivity to Microsoft Defender ATP service URLs](configure-proxy-internet-windows-defender-advanced-threat-protection.md#verify-client-connectivity-to-windows-defender-atp-service-urls) topic. If the verification fails and your environment is using a proxy to connect to the Internet, then follow the steps described in [Configure proxy and Internet connectivity settings](configure-proxy-internet-windows-defender-advanced-threat-protection.md) topic. ### Ensure that Windows Defender Antivirus is not disabled by a policy -**Problem**: The Windows Defender ATP service does not start after onboarding. +**Problem**: The Microsoft Defender ATP service does not start after onboarding. **Symptom**: Onboarding successfully completes, but you see error 577 when trying to start the service. -**Solution**: If your machines are running a third-party antimalware client, the Windows Defender ATP agent needs the Windows Defender Early Launch Antimalware (ELAM) driver to be enabled. You must ensure that it's not disabled in system policy. +**Solution**: If your machines are running a third-party antimalware client, the Microsoft Defender ATP agent needs the Windows Defender Early Launch Antimalware (ELAM) driver to be enabled. You must ensure that it's not disabled in system policy. - Depending on the tool that you use to implement policies, you'll need to verify that the following Windows Defender policies are cleared: @@ -275,9 +275,9 @@ If you encounter issues while onboarding a server, go through the following veri - [Ensure that the server proxy and Internet connectivity settings are configured properly](configure-server-endpoints-windows-defender-advanced-threat-protection.md#server-proxy) You might also need to check the following: -- Check that there is a Windows Defender Advanced Threat Protection Service running in the **Processes** tab in **Task Manager**. For example: +- Check that there is a Microsoft Defender Advanced Threat Protection Service running in the **Processes** tab in **Task Manager**. For example: - ![Image of process view with Windows Defender Advanced Threat Protection Service running](images/atp-task-manager.png) + ![Image of process view with Microsoft Defender Advanced Threat Protection Service running](images/atp-task-manager.png) - Check **Event Viewer** > **Applications and Services Logs** > **Operation Manager** to see if there are any errors. @@ -293,7 +293,7 @@ You might also need to check the following: ## Licensing requirements -Windows Defender Advanced Threat Protection requires one of the following Microsoft Volume Licensing offers: +Microsoft Defender Advanced Threat Protection requires one of the following Microsoft Volume Licensing offers: - Windows 10 Enterprise E5 - Windows 10 Education E5 @@ -302,11 +302,11 @@ Windows Defender Advanced Threat Protection requires one of the following Micros For more information, see [Windows 10 Licensing](https://www.microsoft.com/en-us/Licensing/product-licensing/windows10.aspx#tab=2). ->Want to experience Windows Defender ATP? [Sign up for a free trial.](https://www.microsoft.com/en-us/WindowsForBusiness/windows-atp?ocid=docs-wdatp-troubleshootonboarding-belowfoldlink) +>Want to experience Microsoft Defender ATP? [Sign up for a free trial.](https://www.microsoft.com/en-us/WindowsForBusiness/windows-atp?ocid=docs-wdatp-troubleshootonboarding-belowfoldlink) ## Related topics -- [Troubleshoot Windows Defender ATP](troubleshoot-windows-defender-advanced-threat-protection.md) +- [Troubleshoot Microsoft Defender ATP](troubleshoot-windows-defender-advanced-threat-protection.md) - [Onboard machines](onboard-configure-windows-defender-advanced-threat-protection.md) - [Configure machine proxy and Internet connectivity settings](configure-proxy-internet-windows-defender-advanced-threat-protection.md) diff --git a/windows/security/threat-protection/microsoft-defender-atp/troubleshoot-overview.md b/windows/security/threat-protection/microsoft-defender-atp/troubleshoot-overview.md index fccd8ca55a..c065888a3c 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/troubleshoot-overview.md +++ b/windows/security/threat-protection/microsoft-defender-atp/troubleshoot-overview.md @@ -1,6 +1,6 @@ --- -title: Troubleshoot Windows Defender Advanced Threat Protection capabilities -description: Find solutions to issues on sensor state, service issues, or other Windows Defender ATP capabilities +title: Troubleshoot Microsoft Defender Advanced Threat Protection capabilities +description: Find solutions to issues on sensor state, service issues, or other Microsoft Defender ATP capabilities keywords: troubleshoot, sensor, state, service, issues, attack surface reduction, next generation protection search.product: eADQiWindows 10XVcnh search.appverid: met150 @@ -18,14 +18,14 @@ ms.topic: troubleshooting ms.date: 09/03/2018 --- -# Troubleshoot Windows Defender Advanced Threat Protection +# Troubleshoot Microsoft Defender Advanced Threat Protection -Troubleshoot issues that might arise as you use Windows Defender ATP capabilities. +Troubleshoot issues that might arise as you use Microsoft Defender ATP capabilities. ## In this section Topic | Description :---|:--- -Troubleshoot sensor state | Find solutions for issues related to the Windows Defender ATP sensor +Troubleshoot sensor state | Find solutions for issues related to the Microsoft Defender ATP sensor Troubleshoot service issues | Fix issues related to the Windows Defender Advanced Threat service Troubleshoot attack surface reduction | Fix issues related to network protection and attack surface reduction rules Troubleshoot next generation protection | If you encounter a problem with antivirus, you can search the tables in this topic to find a matching issue and potential solution diff --git a/windows/security/threat-protection/microsoft-defender-atp/troubleshoot-siem.md b/windows/security/threat-protection/microsoft-defender-atp/troubleshoot-siem.md index a3097cd460..7d2a7d86da 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/troubleshoot-siem.md +++ b/windows/security/threat-protection/microsoft-defender-atp/troubleshoot-siem.md @@ -1,6 +1,6 @@ --- -title: Troubleshoot SIEM tool integration issues in Windows Defender ATP -description: Troubleshoot issues that might arise when using SIEM tools with Windows Defender ATP. +title: Troubleshoot SIEM tool integration issues in Microsoft Defender ATP +description: Troubleshoot issues that might arise when using SIEM tools with Microsoft Defender ATP. keywords: troubleshoot, siem, client secret, secret search.product: eADQiWindows 10XVcnh search.appverid: met150 @@ -21,7 +21,7 @@ ms.date: 11/08/2018 # Troubleshoot SIEM tool integration issues **Applies to:** -- [Windows Defender Advanced Threat Protection (Windows Defender ATP)](https://go.microsoft.com/fwlink/p/?linkid=2069559) +- [Microsoft Defender Advanced Threat Protection (Microsoft Defender ATP)](https://go.microsoft.com/fwlink/p/?linkid=2069559) @@ -77,11 +77,11 @@ If you encounter an error when trying to enable the SIEM connector application, ->Want to experience Windows Defender ATP? [Sign up for a free trial.](https://www.microsoft.com/en-us/WindowsForBusiness/windows-atp?ocid=docs-wdatp-troubleshootsiem-belowfoldlink) +>Want to experience Microsoft Defender ATP? [Sign up for a free trial.](https://www.microsoft.com/en-us/WindowsForBusiness/windows-atp?ocid=docs-wdatp-troubleshootsiem-belowfoldlink) ## Related topics -- [Enable SIEM integration in Windows Defender ATP](enable-siem-integration-windows-defender-advanced-threat-protection.md) -- [Configure ArcSight to pull Windows Defender ATP alerts](configure-arcsight-windows-defender-advanced-threat-protection.md) -- [Configure Splunk to pull Windows Defender ATP alerts](configure-splunk-windows-defender-advanced-threat-protection.md) -- [Windows Defender ATP alert API fields](api-portal-mapping-windows-defender-advanced-threat-protection.md) -- [Pull Windows Defender ATP alerts using REST API](pull-alerts-using-rest-api-windows-defender-advanced-threat-protection.md) +- [Enable SIEM integration in Microsoft Defender ATP](enable-siem-integration-windows-defender-advanced-threat-protection.md) +- [Configure ArcSight to pull Microsoft Defender ATP alerts](configure-arcsight-windows-defender-advanced-threat-protection.md) +- [Configure Splunk to pull Microsoft Defender ATP alerts](configure-splunk-windows-defender-advanced-threat-protection.md) +- [Microsoft Defender ATP alert API fields](api-portal-mapping-windows-defender-advanced-threat-protection.md) +- [Pull Microsoft Defender ATP alerts using REST API](pull-alerts-using-rest-api-windows-defender-advanced-threat-protection.md) diff --git a/windows/security/threat-protection/microsoft-defender-atp/troubleshoot.md b/windows/security/threat-protection/microsoft-defender-atp/troubleshoot.md index ee883b6d7f..655895b298 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/troubleshoot.md +++ b/windows/security/threat-protection/microsoft-defender-atp/troubleshoot.md @@ -1,7 +1,7 @@ --- -title: Troubleshoot Windows Defender Advanced Threat Protection service issues +title: Troubleshoot Microsoft Defender Advanced Threat Protection service issues description: Find solutions and work arounds to known issues such as server errors when trying to access the service. -keywords: troubleshoot Windows Defender Advanced Threat Protection, troubleshoot Windows ATP, server error, access denied, invalid credentials, no data, dashboard portal, whitelist, event viewer +keywords: troubleshoot Microsoft Defender Advanced Threat Protection, troubleshoot Windows ATP, server error, access denied, invalid credentials, no data, dashboard portal, whitelist, event viewer search.product: eADQiWindows 10XVcnh search.appverid: met150 ms.prod: w10 @@ -35,13 +35,13 @@ Make sure that `*.securitycenter.windows.com` is included the proxy whitelist. > [!NOTE] > You must use the HTTPS protocol when adding the following endpoints. -## Windows Defender ATP service shows event or error logs in the Event Viewer +## Microsoft Defender ATP service shows event or error logs in the Event Viewer -See the topic [Review events and errors using Event Viewer](event-error-codes-windows-defender-advanced-threat-protection.md) for a list of event IDs that are reported by the Windows Defender ATP service. The topic also contains troubleshooting steps for event errors. +See the topic [Review events and errors using Event Viewer](event-error-codes-windows-defender-advanced-threat-protection.md) for a list of event IDs that are reported by the Microsoft Defender ATP service. The topic also contains troubleshooting steps for event errors. -## Windows Defender ATP service fails to start after a reboot and shows error 577 +## Microsoft Defender ATP service fails to start after a reboot and shows error 577 -If onboarding machines successfully completes but Windows Defender ATP does not start after a reboot and shows error 577, check that Windows Defender is not disabled by a policy. +If onboarding machines successfully completes but Microsoft Defender ATP does not start after a reboot and shows error 577, check that Windows Defender is not disabled by a policy. For more information, see [Ensure that Windows Defender Antivirus is not disabled by policy](troubleshoot-onboarding-windows-defender-advanced-threat-protection.md#ensure-that-windows-defender-antivirus-is-not-disabled-by-a-policy). @@ -63,15 +63,15 @@ The following date and time formats are currently not supported: **Use of comma to indicate thousand**
Support of use of comma as a separator in numbers are not supported. Regions where a number is separated with a comma to indicate a thousand, will only see the use of a dot as a separator. For example, 15,5K is displayed as 15.5K. ->Want to experience Windows Defender ATP? [Sign up for a free trial.](https://www.microsoft.com/en-us/WindowsForBusiness/windows-atp?ocid=docs-wdatp-troubleshoot-belowfoldlink) +>Want to experience Microsoft Defender ATP? [Sign up for a free trial.](https://www.microsoft.com/en-us/WindowsForBusiness/windows-atp?ocid=docs-wdatp-troubleshoot-belowfoldlink) -## Windows Defender ATP tenant was automatically created in Europe -When you use Azure Security Center to monitor servers, a Windows Defender ATP tenant is automatically created. The Windows Defender ATP data is stored in Europe by default. +## Microsoft Defender ATP tenant was automatically created in Europe +When you use Azure Security Center to monitor servers, a Microsoft Defender ATP tenant is automatically created. The Microsoft Defender ATP data is stored in Europe by default. ## Related topics -- [Troubleshoot Windows Defender Advanced Threat Protection onboarding issues](troubleshoot-onboarding-windows-defender-advanced-threat-protection.md) +- [Troubleshoot Microsoft Defender Advanced Threat Protection onboarding issues](troubleshoot-onboarding-windows-defender-advanced-threat-protection.md) - [Review events and errors using Event Viewer](event-error-codes-windows-defender-advanced-threat-protection.md) diff --git a/windows/security/threat-protection/microsoft-defender-atp/unisolate-machine.md b/windows/security/threat-protection/microsoft-defender-atp/unisolate-machine.md index 07203db964..4320d58d31 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/unisolate-machine.md +++ b/windows/security/threat-protection/microsoft-defender-atp/unisolate-machine.md @@ -19,7 +19,7 @@ ms.date: 12/08/2017 # Release machine from isolation API **Applies to:** -- Windows Defender Advanced Threat Protection (Windows Defender ATP) +- Microsoft Defender Advanced Threat Protection (Microsoft Defender ATP) [!include[Prereleaseinformation](prerelease.md)] @@ -28,7 +28,7 @@ Undo isolation of a machine. [!include[Machine actions note](machineactionsnote.md)] ## Permissions -One of the following permissions is required to call this API. To learn more, including how to choose permissions, see [Use Windows Defender ATP APIs](apis-intro.md) +One of the following permissions is required to call this API. To learn more, including how to choose permissions, see [Use Microsoft Defender ATP APIs](apis-intro.md) Permission type | Permission | Permission display name :---|:---|:--- diff --git a/windows/security/threat-protection/microsoft-defender-atp/unrestrict-code-execution.md b/windows/security/threat-protection/microsoft-defender-atp/unrestrict-code-execution.md index d6bd15719c..9531e39835 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/unrestrict-code-execution.md +++ b/windows/security/threat-protection/microsoft-defender-atp/unrestrict-code-execution.md @@ -19,7 +19,7 @@ ms.date: 12/08/2017 # Remove app restriction API **Applies to:** -- Windows Defender Advanced Threat Protection (Windows Defender ATP) +- Microsoft Defender Advanced Threat Protection (Microsoft Defender ATP) [!include[Prereleaseinformation](prerelease.md)] @@ -28,7 +28,7 @@ Enable execution of any application on the machine. [!include[Machine actions note](machineactionsnote.md)] ## Permissions -One of the following permissions is required to call this API. To learn more, including how to choose permissions, see [Use Windows Defender ATP APIs](apis-intro.md) +One of the following permissions is required to call this API. To learn more, including how to choose permissions, see [Use Microsoft Defender ATP APIs](apis-intro.md) Permission type | Permission | Permission display name :---|:---|:--- diff --git a/windows/security/threat-protection/microsoft-defender-atp/update-alert.md b/windows/security/threat-protection/microsoft-defender-atp/update-alert.md index 8c700cf5fd..be7b420a9b 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/update-alert.md +++ b/windows/security/threat-protection/microsoft-defender-atp/update-alert.md @@ -20,14 +20,14 @@ ms.date: 12/08/2017 # Update alert **Applies to:** -- Windows Defender Advanced Threat Protection (Windows Defender ATP) +- Microsoft Defender Advanced Threat Protection (Microsoft Defender ATP) [!include[Prereleaseinformation](prerelease.md)] Update the properties of an alert entity. ## Permissions -One of the following permissions is required to call this API. To learn more, including how to choose permissions, see [Use Windows Defender ATP APIs](apis-intro.md) +One of the following permissions is required to call this API. To learn more, including how to choose permissions, see [Use Microsoft Defender ATP APIs](apis-intro.md) Permission type | Permission | Permission display name :---|:---|:--- diff --git a/windows/security/threat-protection/microsoft-defender-atp/use-apis.md b/windows/security/threat-protection/microsoft-defender-atp/use-apis.md index 9104f53a2b..a152053d8d 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/use-apis.md +++ b/windows/security/threat-protection/microsoft-defender-atp/use-apis.md @@ -1,5 +1,5 @@ --- -title: Windows Defender ATP Public API +title: Microsoft Defender ATP Public API description: Use the exposed data and actions using a set of progammatic APIs that are part of the Microsoft Intelligence Security Graph. keywords: apis, api, wdatp, open api, windows defender atp api, public api, alerts, machine, user, domain, ip, file search.product: eADQiWindows 10XVcnh @@ -17,15 +17,15 @@ ms.topic: conceptual ms.date: 11/28/2018 --- -# Windows Defender ATP Public API +# Microsoft Defender ATP Public API -**Applies to:** [Windows Defender Advanced Threat Protection (Windows Defender ATP)](https://wincom.blob.core.windows.net/documents/Windows10_Commercial_Comparison.pdf) +**Applies to:** [Microsoft Defender Advanced Threat Protection (Microsoft Defender ATP)](https://wincom.blob.core.windows.net/documents/Windows10_Commercial_Comparison.pdf) -> Want to experience Windows Defender ATP? [Sign up for a free trial.](https://www.microsoft.com/en-us/WindowsForBusiness/windows-atp?ocid=docs-wdatp-exposedapis-abovefoldlink) +> Want to experience Microsoft Defender ATP? [Sign up for a free trial.](https://www.microsoft.com/en-us/WindowsForBusiness/windows-atp?ocid=docs-wdatp-exposedapis-abovefoldlink) ## In this section Topic | Description :---|:--- -[Windows Defender ATP API overview](apis-intro.md) | Learn how to access to Windows Defender ATP Public API and on which context. -[Supported Windows Defender ATP APIs](exposed-apis-list.md) | Learn more about the individual supported entities where you can run API calls to and details such as HTTP request values, request headers and expected responses. Examples include APIs for [alert resource type](alerts-windows-defender-advanced-threat-protection-new.md), [domain related alerts](get-domain-related-alerts-windows-defender-advanced-threat-protection-new.md), or even actions such as [isolate machine](isolate-machine-windows-defender-advanced-threat-protection-new.md). +[Microsoft Defender ATP API overview](apis-intro.md) | Learn how to access to Microsoft Defender ATP Public API and on which context. +[Supported Microsoft Defender ATP APIs](exposed-apis-list.md) | Learn more about the individual supported entities where you can run API calls to and details such as HTTP request values, request headers and expected responses. Examples include APIs for [alert resource type](alerts-windows-defender-advanced-threat-protection-new.md), [domain related alerts](get-domain-related-alerts-windows-defender-advanced-threat-protection-new.md), or even actions such as [isolate machine](isolate-machine-windows-defender-advanced-threat-protection-new.md). How to use APIs - Samples | Learn how to use Advanced hunting APIs and multiple APIs such as PowerShell. Other examples include [schedule advanced hunting using Microsoft Flow](run-advanced-query-sample-ms-flow.md) or [OData queries](exposed-apis-odata-samples.md). diff --git a/windows/security/threat-protection/microsoft-defender-atp/use-custom-ti.md b/windows/security/threat-protection/microsoft-defender-atp/use-custom-ti.md index a5bf6b10dc..f8109a93b6 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/use-custom-ti.md +++ b/windows/security/threat-protection/microsoft-defender-atp/use-custom-ti.md @@ -1,6 +1,6 @@ --- title: Use the custom threat intelligence API to create custom alerts -description: Use the threat intelligence API in Windows Defender Advanced Threat Protection to create custom alerts +description: Use the threat intelligence API in Microsoft Defender Advanced Threat Protection to create custom alerts keywords: threat intelligence, alert definitions, indicators of compromise search.product: eADQiWindows 10XVcnh search.appverid: met150 @@ -21,11 +21,11 @@ ms.date: 04/24/2018 # Use the threat intelligence API to create custom alerts **Applies to:** -- [Windows Defender Advanced Threat Protection (Windows Defender ATP)](https://go.microsoft.com/fwlink/p/?linkid=2069559) +- [Microsoft Defender Advanced Threat Protection (Microsoft Defender ATP)](https://go.microsoft.com/fwlink/p/?linkid=2069559) ->Want to experience Windows Defender ATP? [Sign up for a free trial.](https://www.microsoft.com/en-us/WindowsForBusiness/windows-atp?ocid=docs-wdatp-customti-abovefoldlink) +>Want to experience Microsoft Defender ATP? [Sign up for a free trial.](https://www.microsoft.com/en-us/WindowsForBusiness/windows-atp?ocid=docs-wdatp-customti-abovefoldlink) Understand threat intelligence concepts, then enable the custom threat intelligence application so that you can proceed to create custom threat intelligence alerts that are specific to your organization. diff --git a/windows/security/threat-protection/microsoft-defender-atp/use.md b/windows/security/threat-protection/microsoft-defender-atp/use.md index 07291b3a48..94b1666439 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/use.md +++ b/windows/security/threat-protection/microsoft-defender-atp/use.md @@ -22,11 +22,11 @@ ms.date: 03/12/2018 **Applies to:** -- [Windows Defender Advanced Threat Protection (Windows Defender ATP)](https://go.microsoft.com/fwlink/p/?linkid=2069559) +- [Microsoft Defender Advanced Threat Protection (Microsoft Defender ATP)](https://go.microsoft.com/fwlink/p/?linkid=2069559) ->Want to experience Windows Defender ATP? [Sign up for a free trial.](https://www.microsoft.com/en-us/WindowsForBusiness/windows-atp?ocid=docs-wdatp-usewdatp-abovefoldlink) +>Want to experience Microsoft Defender ATP? [Sign up for a free trial.](https://www.microsoft.com/en-us/WindowsForBusiness/windows-atp?ocid=docs-wdatp-usewdatp-abovefoldlink) -Windows Defender Security Center is the portal where you can access Windows Defender Advanced Threat Protection capabilities. +Windows Defender Security Center is the portal where you can access Microsoft Defender Advanced Threat Protection capabilities. Use the **Security operations** dashboard to gain insight on the various alerts on machines and users in your network. @@ -40,7 +40,7 @@ Use the **Threat analytics** dashboard to continually assess and control risk ex Topic | Description :---|:--- [Portal overview](portal-overview-windows-defender-advanced-threat-protection.md) | Understand the portal layout and area descriptions. -[View the Security operations dashboard](security-operations-dashboard-windows-defender-advanced-threat-protection.md) | The Windows Defender ATP **Security operations dashboard** provides a snapshot of your network. You can view aggregates of alerts, the overall status of the service of the machines on your network, investigate machines, files, and URLs, and see snapshots of threats seen on machines. +[View the Security operations dashboard](security-operations-dashboard-windows-defender-advanced-threat-protection.md) | The Microsoft Defender ATP **Security operations dashboard** provides a snapshot of your network. You can view aggregates of alerts, the overall status of the service of the machines on your network, investigate machines, files, and URLs, and see snapshots of threats seen on machines. [View the Secure Score dashboard and improve your secure score](secure-score-dashboard-windows-defender-advanced-threat-protection.md) | The **Secure Score dashboard** expands your visibility into the overall security posture of your organization. From this dashboard, you'll be able to quickly assess the security posture of your organization, see machines that require attention, as well as recommendations for actions to further reduce the attack surface in your organization - all in one place. [View the Threat analytics dashboard and take recommended mitigation actions](threat-analytics-dashboard-windows-defender-advanced-threat-protection.md) | The **Threat analytics** dashboard helps you continually assess and control risk exposure to Spectre and Meltdown. Use the charts to quickly identify machines for the presence or absence of mitigations. diff --git a/windows/security/threat-protection/microsoft-defender-atp/user-roles.md b/windows/security/threat-protection/microsoft-defender-atp/user-roles.md index ab60042a21..152c31812c 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/user-roles.md +++ b/windows/security/threat-protection/microsoft-defender-atp/user-roles.md @@ -20,10 +20,10 @@ ms.topic: article # Create and manage roles for role-based access control **Applies to:** -- [Windows Defender Advanced Threat Protection (Windows Defender ATP)](https://go.microsoft.com/fwlink/p/?linkid=2069559) +- [Microsoft Defender Advanced Threat Protection (Microsoft Defender ATP)](https://go.microsoft.com/fwlink/p/?linkid=2069559) ->Want to experience Windows Defender ATP? [Sign up for a free trial.](https://www.microsoft.com/en-us/WindowsForBusiness/windows-atp?ocid=docs-wdatp-roles-abovefoldlink) +>Want to experience Microsoft Defender ATP? [Sign up for a free trial.](https://www.microsoft.com/en-us/WindowsForBusiness/windows-atp?ocid=docs-wdatp-roles-abovefoldlink) ## Create roles and assign the role to an Azure Active Directory group The following steps guide you on how to create roles in Windows Defender Security Center. It assumes that you have already created Azure Active Directory user groups. @@ -43,7 +43,7 @@ The following steps guide you on how to create roles in Windows Defender Securit - **Manage portal system settings** - Users can configure storage settings, SIEM and threat intel API settings (applies globally), advanced settings, automated file uploads, roles and machine groups. >[!NOTE] - >This setting is only available in the Windows Defender ATP administrator (default) role. + >This setting is only available in the Microsoft Defender ATP administrator (default) role. - **Manage security settings** - Users can configure alert suppression settings, manage allowed/blocked lists for automation, manage folder exclusions for automation, onboard and offboard machines, and manage email notifications. diff --git a/windows/security/threat-protection/microsoft-defender-atp/view-incidents-queue.md b/windows/security/threat-protection/microsoft-defender-atp/view-incidents-queue.md index 5f6903dad8..a7d944a061 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/view-incidents-queue.md +++ b/windows/security/threat-protection/microsoft-defender-atp/view-incidents-queue.md @@ -18,9 +18,9 @@ ms.topic: article ms.date: 10/08/2018 --- -# View and organize the Windows Defender Advanced Threat Protection Incidents queue +# View and organize the Microsoft Defender Advanced Threat Protection Incidents queue **Applies to:** -- [Windows Defender Advanced Threat Protection (Windows Defender ATP)](https://go.microsoft.com/fwlink/p/?linkid=2069559) +- [Microsoft Defender Advanced Threat Protection (Microsoft Defender ATP)](https://go.microsoft.com/fwlink/p/?linkid=2069559) The **Incidents queue** shows a collection of incidents that were flagged from machines in your network. It helps you sort through incidents to prioritize and create an informed cybersecurity response decision. diff --git a/windows/security/threat-protection/microsoft-defender-atp/whats-new-in-microsoft-defender-atp.md b/windows/security/threat-protection/microsoft-defender-atp/whats-new-in-microsoft-defender-atp.md index b73e7bc8b1..af06ab295c 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/whats-new-in-microsoft-defender-atp.md +++ b/windows/security/threat-protection/microsoft-defender-atp/whats-new-in-microsoft-defender-atp.md @@ -1,6 +1,6 @@ --- -title: What's new in Windows Defender ATP -description: Lists the new features and functionality in Windows Defender ATP +title: What's new in Microsoft Defender ATP +description: Lists the new features and functionality in Microsoft Defender ATP keywords: what's new in windows defender atp search.product: eADQiWindows 10XVcnh search.appverid: met150 @@ -17,11 +17,11 @@ ms.collection: M365-security-compliance ms.topic: conceptual --- -# What's new in Windows Defender ATP +# What's new in Microsoft Defender ATP **Applies to:** -- Windows Defender Advanced Threat Protection (Windows Defender ATP) +- Microsoft Defender Advanced Threat Protection (Microsoft Defender ATP) -Here are the new features in the latest release of Windows Defender ATP as well as security features in Windows 10 and Windows Server. +Here are the new features in the latest release of Microsoft Defender ATP as well as security features in Windows 10 and Windows Server. ## March 2019 ### In preview @@ -32,16 +32,16 @@ The following capability are included in the February 2019 preview release. ## February 2019 The following capabilities are generally available (GA). -- [Incidents](https://docs.microsoft.com/windows/security/threat-protection/windows-defender-atp/incidents-queue)
Incident is a new entity in Windows Defender ATP that brings together all relevant alerts and related entities to narrate the broader attack story, giving analysts better perspective on the purview of complex threats. +- [Incidents](https://docs.microsoft.com/windows/security/threat-protection/windows-defender-atp/incidents-queue)
Incident is a new entity in Microsoft Defender ATP that brings together all relevant alerts and related entities to narrate the broader attack story, giving analysts better perspective on the purview of complex threats. -- [Onboard previous versions of Windows](https://docs.microsoft.com/windows/security/threat-protection/windows-defender-atp/onboard-downlevel-windows-defender-advanced-threat-protection)
Onboard supported versions of Windows machines so that they can send sensor data to the Windows Defender ATP sensor. +- [Onboard previous versions of Windows](https://docs.microsoft.com/windows/security/threat-protection/windows-defender-atp/onboard-downlevel-windows-defender-advanced-threat-protection)
Onboard supported versions of Windows machines so that they can send sensor data to the Microsoft Defender ATP sensor. ### In preview The following capability are included in the February 2019 preview release. - [Reports](https://docs.microsoft.com/windows/security/threat-protection/windows-defender-atp/threat-protection-reports-windows-defender-advanced-threat-protection)
The threat protection report provides high-level information about alerts generated in your organization. -- [Microsoft Threat Experts](https://docs.microsoft.com/windows/security/threat-protection/windows-defender-atp/microsoft-threat-experts)
Microsoft Threat Experts is the new managed threat hunting service in Windows Defender ATP that provides proactive hunting, prioritization, and additional context and insights that further empower security operations centers (SOCs) to identify and respond to threats quickly and accurately. It provides additional layer of expertise and optics that Microsoft customers can utilize to augment security operation capabilities as part of Microsoft 365. +- [Microsoft Threat Experts](https://docs.microsoft.com/windows/security/threat-protection/windows-defender-atp/microsoft-threat-experts)
Microsoft Threat Experts is the new managed threat hunting service in Microsoft Defender ATP that provides proactive hunting, prioritization, and additional context and insights that further empower security operations centers (SOCs) to identify and respond to threats quickly and accurately. It provides additional layer of expertise and optics that Microsoft customers can utilize to augment security operation capabilities as part of Microsoft 365. ## October 2018 @@ -53,16 +53,16 @@ The following capabilities are generally available (GA). - [Custom detection](https://docs.microsoft.com/windows/security/threat-protection/windows-defender-atp/overview-custom-detections)
With custom detections, you can create custom queries to monitor events for any kind of behavior such as suspicious or emerging threats. This can be done by leveraging the power of Advanced hunting through the creation of custom detection rules. -- [Integration with Azure Security Center](https://docs.microsoft.com/windows/security/threat-protection/windows-defender-atp/configure-server-endpoints-windows-defender-advanced-threat-protection#integration-with-azure-security-center)
Windows Defender ATP integrates with Azure Security Center to provide a comprehensive server protection solution. With this integration Azure Security Center can leverage the power of Windows Defender ATP to provide improved threat detection for Windows Servers. +- [Integration with Azure Security Center](https://docs.microsoft.com/windows/security/threat-protection/windows-defender-atp/configure-server-endpoints-windows-defender-advanced-threat-protection#integration-with-azure-security-center)
Microsoft Defender ATP integrates with Azure Security Center to provide a comprehensive server protection solution. With this integration Azure Security Center can leverage the power of Microsoft Defender ATP to provide improved threat detection for Windows Servers. -- [Managed security service provider (MSSP) support](https://docs.microsoft.com/windows/security/threat-protection/windows-defender-atp/mssp-support-windows-defender-advanced-threat-protection)
Windows Defender ATP adds support for this scenario by providing MSSP integration. The integration will allow MSSPs to take the following actions: Get access to MSSP customer's Windows Defender Security Center portal, fetch email notifications, and fetch alerts through security information and event management (SIEM) tools. +- [Managed security service provider (MSSP) support](https://docs.microsoft.com/windows/security/threat-protection/windows-defender-atp/mssp-support-windows-defender-advanced-threat-protection)
Microsoft Defender ATP adds support for this scenario by providing MSSP integration. The integration will allow MSSPs to take the following actions: Get access to MSSP customer's Windows Defender Security Center portal, fetch email notifications, and fetch alerts through security information and event management (SIEM) tools. -- [Removable device control](https://cloudblogs.microsoft.com/microsoftsecure/2018/12/19/windows-defender-atp-has-protections-for-usb-and-removable-devices/)
Windows Defender ATP provides multiple monitoring and control features to help prevent threats from removable devices, including new settings to allow or block specific hardware IDs. +- [Removable device control](https://cloudblogs.microsoft.com/microsoftsecure/2018/12/19/windows-defender-atp-has-protections-for-usb-and-removable-devices/)
Microsoft Defender ATP provides multiple monitoring and control features to help prevent threats from removable devices, including new settings to allow or block specific hardware IDs. - [Support for iOS and Android devices](https://docs.microsoft.com/windows/security/threat-protection/windows-defender-atp/configure-endpoints-non-windows-windows-defender-advanced-threat-protection#turn-on-third-party-integration)
iOS and Android devices are now supported and can be onboarded to the service. - [Threat analytics](https://docs.microsoft.com/windows/security/threat-protection/windows-defender-atp/threat-analytics)
-Threat Analytics is a set of interactive reports published by the Windows Defender ATP research team as soon as emerging threats and outbreaks are identified. The reports help security operations teams assess impact on their environment and provides recommended actions to contain, increase organizational resilience, and prevent specific threats. +Threat Analytics is a set of interactive reports published by the Microsoft Defender ATP research team as soon as emerging threats and outbreaks are identified. The reports help security operations teams assess impact on their environment and provides recommended actions to contain, increase organizational resilience, and prevent specific threats. - New in Windows 10 version 1809, there are two new attack surface reduction rules: - Block Adobe Reader from creating child processes @@ -81,25 +81,25 @@ For more information on how to turn on preview features, see [Preview features]( - [Information protection](https://docs.microsoft.com/en-us/windows/security/threat-protection/windows-defender-atp/information-protection-in-windows-overview)
Information protection is an integral part of Microsoft 365 Enterprise suite, providing intelligent protection to keep sensitive data secure while enabling productivity in the workplace. -Windows Defender ATP is seamlessly integrated in Microsoft Threat Protection to provide a complete and comprehensive data loss prevention (DLP) solution for Windows devices. +Microsoft Defender ATP is seamlessly integrated in Microsoft Threat Protection to provide a complete and comprehensive data loss prevention (DLP) solution for Windows devices. >[!NOTE] >Partially available from Windows 10, version 1809. -- [Integration with Microsoft Cloud App Security](https://docs.microsoft.com/windows/security/threat-protection/windows-defender-atp/microsoft-cloud-app-security-integration)
Microsoft Cloud App Security leverages Windows Defender ATP endpoint signals to allow direct visibility into cloud application usage including the use of unsupported cloud services (shadow IT) from all Windows Defender ATP monitored machines. +- [Integration with Microsoft Cloud App Security](https://docs.microsoft.com/windows/security/threat-protection/windows-defender-atp/microsoft-cloud-app-security-integration)
Microsoft Cloud App Security leverages Microsoft Defender ATP endpoint signals to allow direct visibility into cloud application usage including the use of unsupported cloud services (shadow IT) from all Microsoft Defender ATP monitored machines. >[!NOTE] >Available from Windows 10, version 1809 or later. -- [Onboard Windows Server 2019](https://docs.microsoft.com/windows/security/threat-protection/windows-defender-atp/configure-server-endpoints-windows-defender-advanced-threat-protection#windows-server-version-1803-and-windows-server-2019)
Windows Defender ATP now adds support for Windows Server 2019. You'll be able to onboard Windows Server 2019 in the same method available for Windows 10 client machines. +- [Onboard Windows Server 2019](https://docs.microsoft.com/windows/security/threat-protection/windows-defender-atp/configure-server-endpoints-windows-defender-advanced-threat-protection#windows-server-version-1803-and-windows-server-2019)
Microsoft Defender ATP now adds support for Windows Server 2019. You'll be able to onboard Windows Server 2019 in the same method available for Windows 10 client machines. -- [Power BI reports using Windows Defender ATP data](powerbi-reports-windows-defender-advanced-threat-protection.md)
-Windows Defender ATP makes it easy to create a Power BI dashboard by providing an option straight from the portal. +- [Power BI reports using Microsoft Defender ATP data](powerbi-reports-windows-defender-advanced-threat-protection.md)
+Microsoft Defender ATP makes it easy to create a Power BI dashboard by providing an option straight from the portal. ## March 2018 - [Advanced Hunting](https://docs.microsoft.com/windows/security/threat-protection/windows-defender-atp/advanced-hunting-windows-defender-advanced-threat-protection)
-Query data using Advanced hunting in Windows Defender ATP. +Query data using Advanced hunting in Microsoft Defender ATP. - [Attack surface reduction rules](https://docs.microsoft.com/windows/security/threat-protection/windows-defender-exploit-guard/attack-surface-reduction-exploit-guard)
New attack surface reduction rules: @@ -116,21 +116,21 @@ Query data using Advanced hunting in Windows Defender ATP. - [Conditional access](https://docs.microsoft.com/windows/security/threat-protection/windows-defender-atp/conditional-access-windows-defender-advanced-threat-protection)
Enable conditional access to better protect users, devices, and data. -- [Windows Defender ATP Community center](https://docs.microsoft.com/windows/security/threat-protection/windows-defender-atp/community-windows-defender-advanced-threat-protection)
- The Windows Defender ATP Community Center is a place where community members can learn, collaborate, and share experiences about the product. +- [Microsoft Defender ATP Community center](https://docs.microsoft.com/windows/security/threat-protection/windows-defender-atp/community-windows-defender-advanced-threat-protection)
+ The Microsoft Defender ATP Community Center is a place where community members can learn, collaborate, and share experiences about the product. - [Controlled folder access](https://docs.microsoft.com/windows/security/threat-protection/windows-defender-exploit-guard/enable-controlled-folders-exploit-guard)
You can now block untrusted processes from writing to disk sectors using Controlled Folder Access. - [Onboard non-Windows machines](https://docs.microsoft.com/windows/security/threat-protection/windows-defender-atp/configure-endpoints-non-windows-windows-defender-advanced-threat-protection)
- Windows Defender ATP provides a centralized security operations experience for Windows as well as non-Windows platforms. You'll be able to see alerts from various supported operating systems (OS) in Windows Defender Security Center and better protect your organization's network. + Microsoft Defender ATP provides a centralized security operations experience for Windows as well as non-Windows platforms. You'll be able to see alerts from various supported operating systems (OS) in Windows Defender Security Center and better protect your organization's network. - [Role-based access control (RBAC)](https://docs.microsoft.com/windows/security/threat-protection/windows-defender-atp/rbac-windows-defender-advanced-threat-protection)
Using role-based access control (RBAC), you can create roles and groups within your security operations team to grant appropriate access to the portal. - [Windows Defender Antivirus](https://docs.microsoft.com/windows/security/threat-protection/windows-defender-antivirus/windows-defender-antivirus-in-windows-10)
-Windows Defender Antivirus now shares detection status between M365 services and interoperates with Windows Defender ATP. For more information, see [Use next-gen technologies in Windows Defender Antivirus through cloud-delivered protection](https://docs.microsoft.com/windows/security/threat-protection/windows-defender-antivirus/utilize-microsoft-cloud-protection-windows-defender-antivirus). +Windows Defender Antivirus now shares detection status between M365 services and interoperates with Microsoft Defender ATP. For more information, see [Use next-gen technologies in Windows Defender Antivirus through cloud-delivered protection](https://docs.microsoft.com/windows/security/threat-protection/windows-defender-antivirus/utilize-microsoft-cloud-protection-windows-defender-antivirus). Block at first sight can now block non-portable executable files (such as JS, VBS, or macros) as well as executable files. For more information, see [Enable block at first sight](https://docs.microsoft.com/windows/security/threat-protection/windows-defender-antivirus/configure-block-at-first-sight-windows-defender-antivirus). diff --git a/windows/security/threat-protection/microsoft-defender-atp/windows-defender-security-center-atp.md b/windows/security/threat-protection/microsoft-defender-atp/windows-defender-security-center-atp.md index d85d398e43..468fcd0924 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/windows-defender-security-center-atp.md +++ b/windows/security/threat-protection/microsoft-defender-atp/windows-defender-security-center-atp.md @@ -1,6 +1,6 @@ --- title: Windows Defender Security Center -description: Windows Defender Security Center is the portal where you can access Windows Defender Advanced Threat Protection. +description: Windows Defender Security Center is the portal where you can access Microsoft Defender Advanced Threat Protection. keywords: windows, defender, security, center, defender, advanced, threat, protection search.product: eADQiWindows 10XVcnh search.appverid: met150 @@ -20,7 +20,7 @@ ms.date: 07/01/2018 # Windows Defender Security Center -Windows Defender Security Center is the portal where you can access Windows Defender Advanced Threat Protection capabilities. It gives enterprise security operations teams a single pane of glass experience to help secure networks. +Windows Defender Security Center is the portal where you can access Microsoft Defender Advanced Threat Protection capabilities. It gives enterprise security operations teams a single pane of glass experience to help secure networks. ## In this section @@ -31,9 +31,9 @@ Get started | Learn about the minimum requirements, validate licensing and com [Understand the portal](use-windows-defender-advanced-threat-protection.md) | Understand the Security operations, Secure Score, and Threat analytics dashboards as well as how to navigate the portal. Investigate and remediate threats | Investigate alerts, machines, and take response actions to remediate threats. API and SIEM support | Use the supported APIs to pull and create custom alerts, or automate workflows. Use the supported SIEM tools to pull alerts from Windows Defender Security Center. -Reporting | Create and build Power BI reports using Windows Defender ATP data. +Reporting | Create and build Power BI reports using Microsoft Defender ATP data. Check service health and sensor state | Verify that the service is running and check the sensor state on machines. [Configure Windows Defender Security Center settings](preferences-setup-windows-defender-advanced-threat-protection.md) | Configure general settings, turn on the preview experience, notifications, and enable other features. -[Access the Windows Defender ATP Community Center](community-windows-defender-advanced-threat-protection.md) | Access the Windows Defender ATP Community Center to learn, collaborate, and share experiences about the product. +[Access the Microsoft Defender ATP Community Center](community-windows-defender-advanced-threat-protection.md) | Access the Microsoft Defender ATP Community Center to learn, collaborate, and share experiences about the product. [Troubleshoot service issues](troubleshoot-windows-defender-advanced-threat-protection.md) | This section addresses issues that might arise as you use the Windows Defender Advanced Threat service. From dbb77d063b94fd08c177516b3210e1e7cde75744 Mon Sep 17 00:00:00 2001 From: Joey Caparas Date: Wed, 10 Apr 2019 14:58:31 -0700 Subject: [PATCH 141/724] update windows defender security center to microsoft defender security center --- .../microsoft-defender-atp/TOC.md | 4 ++-- .../advanced-features.md | 2 +- .../advanced-hunting.md | 4 ++-- ...lerts-queue-endpoint-detection-response.md | 6 ++--- .../api-portal-mapping.md | 4 ++-- .../assign-portal-access.md | 4 ++-- .../basic-permissions.md | 2 +- .../microsoft-defender-atp/community.md | 2 +- .../configure-arcsight.md | 2 +- .../configure-conditional-access.md | 4 ++-- .../configure-endpoints-gp.md | 8 +++---- .../configure-endpoints-mdm.md | 2 +- .../configure-endpoints-non-windows.md | 4 ++-- .../configure-endpoints-sccm.md | 6 ++--- .../configure-endpoints-script.md | 8 +++---- .../configure-endpoints-vdi.md | 6 ++--- .../configure-microsoft-threat-experts.md | 2 +- .../configure-mssp-support.md | 22 +++++++++---------- .../configure-server-endpoints.md | 14 ++++++------ .../microsoft-defender-atp/configure-siem.md | 2 +- .../configure-splunk.md | 2 +- .../microsoft-defender-atp/custom-ti-api.md | 2 +- .../enable-custom-ti.md | 2 +- .../enable-siem-integration.md | 4 ++-- .../experiment-custom-ti.md | 2 +- .../fix-unhealhty-sensors.md | 2 +- .../microsoft-defender-atp/get-started.md | 4 ++-- ...ormation-protection-in-windows-overview.md | 6 ++--- .../microsoft-defender-atp/licensing.md | 10 ++++----- .../microsoft-defender-atp/manage-alerts.md | 2 +- .../manage-auto-investigation.md | 2 +- .../microsoft-defender-atp/manage-edr.md | 2 +- ...icrosoft-cloud-app-security-integration.md | 2 +- ...oft-defender-advanced-threat-protection.md | 2 +- .../microsoft-threat-experts.md | 2 +- .../microsoft-defender-atp/mssp-support.md | 2 +- .../onboard-configure.md | 2 +- .../microsoft-defender-atp/onboard.md | 2 +- .../overview-custom-detections.md | 2 +- .../overview-hunting.md | 2 +- .../overview-secure-score.md | 4 ++-- .../microsoft-defender-atp/overview.md | 2 +- .../microsoft-defender-atp/portal-overview.md | 10 ++++----- .../microsoft-defender-atp/powerbi-reports.md | 4 ++-- .../preferences-setup.md | 4 ++-- .../pull-alerts-using-rest-api.md | 4 ++-- .../microsoft-defender-atp/rbac.md | 6 ++--- .../security-operations-dashboard.md | 4 ++-- .../microsoft-defender-atp/time-settings.md | 4 ++-- .../troubleshoot-onboarding-error-messages.md | 6 ++--- .../microsoft-defender-atp/troubleshoot.md | 2 +- .../microsoft-defender-atp/use-custom-ti.md | 2 +- .../microsoft-defender-atp/use.md | 8 +++---- .../microsoft-defender-atp/user-roles.md | 2 +- .../whats-new-in-microsoft-defender-atp.md | 4 ++-- .../windows-defender-security-center-atp.md | 12 +++++----- 56 files changed, 121 insertions(+), 121 deletions(-) diff --git a/windows/security/threat-protection/microsoft-defender-atp/TOC.md b/windows/security/threat-protection/microsoft-defender-atp/TOC.md index 0dc76f0fa0..297f7f6173 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/TOC.md +++ b/windows/security/threat-protection/microsoft-defender-atp/TOC.md @@ -120,7 +120,7 @@ ##### [Network firewall](../windows-firewall/evaluating-windows-firewall-with-advanced-security-design-examples.md) #### [Evaluate next generation protection](../windows-defender-antivirus/evaluate-windows-defender-antivirus.md) -### [Access the Windows Defender Security Center Community Center](community.md) +### [Access the Microsoft Defender Security Center Community Center](community.md) ## [Configure and manage capabilities](onboard.md) ### [Configure attack surface reduction](configure-attack-surface-reduction.md) @@ -354,7 +354,7 @@ ####[Configure information protection in Windows](information-protection-in-windows-config.md) -### [Configure Windows Defender Security Center settings](preferences-setup.md) +### [Configure Microsoft Defender Security Center settings](preferences-setup.md) #### General ##### [Update data retention settings](data-retention-settings.md) ##### [Configure alert notifications](configure-email-notifications.md) diff --git a/windows/security/threat-protection/microsoft-defender-atp/advanced-features.md b/windows/security/threat-protection/microsoft-defender-atp/advanced-features.md index 98b6b36f1f..dee0d64ec2 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/advanced-features.md +++ b/windows/security/threat-protection/microsoft-defender-atp/advanced-features.md @@ -83,7 +83,7 @@ When you complete the integration steps on both portals, you'll be able to see r ## Office 365 Threat Intelligence connection This feature is only available if you have an active Office 365 E5 or the Threat Intelligence add-on. For more information, see the Office 365 Enterprise E5 product page. -When you enable this feature, you'll be able to incorporate data from Office 365 Advanced Threat Protection into Windows Defender Security Center to conduct a holistic security investigation across Office 365 mailboxes and Windows machines. +When you enable this feature, you'll be able to incorporate data from Office 365 Advanced Threat Protection into Microsoft Defender Security Center to conduct a holistic security investigation across Office 365 mailboxes and Windows machines. >[!NOTE] >You'll need to have the appropriate license to enable this feature. diff --git a/windows/security/threat-protection/microsoft-defender-atp/advanced-hunting.md b/windows/security/threat-protection/microsoft-defender-atp/advanced-hunting.md index 4d711a8fff..000918bc98 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/advanced-hunting.md +++ b/windows/security/threat-protection/microsoft-defender-atp/advanced-hunting.md @@ -69,7 +69,7 @@ For more information on the query language and supported operators, see [Query The following tables are exposed as part of Advanced hunting: -- **AlertEvents** - Alerts on Windows Defender Security Center +- **AlertEvents** - Alerts on Microsoft Defender Security Center - **MachineInfo** - Machine information, including OS information - **MachineNetworkInfo** - Network properties of machines, including adapters, IP and MAC addresses, as well as connected networks and domains - **ProcessCreationEvents** - Process creation and related events @@ -124,7 +124,7 @@ These steps guide you on modifying and overwriting an existing query. The result set has several capabilities to provide you with effective investigation, including: -- Columns that return entity-related objects, such as Machine name, Machine ID, File name, SHA1, User, IP, and URL, are linked to their entity pages in Windows Defender Security Center. +- Columns that return entity-related objects, such as Machine name, Machine ID, File name, SHA1, User, IP, and URL, are linked to their entity pages in Microsoft Defender Security Center. - You can right-click on a cell in the result set and add a filter to your written query. The current filtering options are **include**, **exclude** or **advanced filter**, which provides additional filtering options on the cell value. These cell values are part of the row set. ![Image of Microsoft Defender ATP Advanced hunting result set](images/atp-advanced-hunting-results-filter.png) diff --git a/windows/security/threat-protection/microsoft-defender-atp/alerts-queue-endpoint-detection-response.md b/windows/security/threat-protection/microsoft-defender-atp/alerts-queue-endpoint-detection-response.md index cbe44720d3..525a4afacb 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/alerts-queue-endpoint-detection-response.md +++ b/windows/security/threat-protection/microsoft-defender-atp/alerts-queue-endpoint-detection-response.md @@ -1,6 +1,6 @@ --- -title: Alerts queue in Windows Defender Security Center -description: View and manage the alerts surfaced in Windows Defender Security Center +title: Alerts queue in Microsoft Defender Security Center +description: View and manage the alerts surfaced in Microsoft Defender Security Center keywords: search.product: eADQiWindows 10XVcnh search.appverid: met150 @@ -18,7 +18,7 @@ ms.topic: conceptual ms.date: 09/03/2018 --- -# Alerts queue in Windows Defender Security Center +# Alerts queue in Microsoft Defender Security Center Learn how you can view and manage the queue so that you can effectively investigate threats seen on entities such as machines, files, or user accounts. diff --git a/windows/security/threat-protection/microsoft-defender-atp/api-portal-mapping.md b/windows/security/threat-protection/microsoft-defender-atp/api-portal-mapping.md index aeb28a277e..c85f9de2b6 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/api-portal-mapping.md +++ b/windows/security/threat-protection/microsoft-defender-atp/api-portal-mapping.md @@ -1,6 +1,6 @@ --- title: Microsoft Defender ATP alert API fields -description: Understand how the alert API fields map to the values in Windows Defender Security Center +description: Understand how the alert API fields map to the values in Microsoft Defender Security Center keywords: alerts, alert fields, fields, api, fields, pull alerts, rest api, request, response search.product: eADQiWindows 10XVcnh search.appverid: met150 @@ -30,7 +30,7 @@ ms.date: 10/16/2017 >Want to experience Microsoft Defender ATP? [Sign up for a free trial.](https://www.microsoft.com/en-us/WindowsForBusiness/windows-atp?ocid=docs-wdatp-apiportalmapping-abovefoldlink) -Understand what data fields are exposed as part of the alerts API and how they map to Windows Defender Security Center. +Understand what data fields are exposed as part of the alerts API and how they map to Microsoft Defender Security Center. ## Alert API fields and portal mapping diff --git a/windows/security/threat-protection/microsoft-defender-atp/assign-portal-access.md b/windows/security/threat-protection/microsoft-defender-atp/assign-portal-access.md index 227c780e28..b1cb1f4d55 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/assign-portal-access.md +++ b/windows/security/threat-protection/microsoft-defender-atp/assign-portal-access.md @@ -1,5 +1,5 @@ --- -title: Assign user access to Windows Defender Security Center +title: Assign user access to Microsoft Defender Security Center description: Assign read and write or read only access to the Microsoft Defender Advanced Threat Protection portal. keywords: assign user roles, assign read and write access, assign read only access, user, user roles, roles search.product: eADQiWindows 10XVcnh @@ -18,7 +18,7 @@ ms.topic: article ms.date: 11/28/2018 --- -# Assign user access to Windows Defender Security Center +# Assign user access to Microsoft Defender Security Center **Applies to:** - Azure Active Directory diff --git a/windows/security/threat-protection/microsoft-defender-atp/basic-permissions.md b/windows/security/threat-protection/microsoft-defender-atp/basic-permissions.md index ebb98886d3..c7f6f4517c 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/basic-permissions.md +++ b/windows/security/threat-protection/microsoft-defender-atp/basic-permissions.md @@ -1,5 +1,5 @@ --- -title: Use basic permissions to access Windows Defender Security Center +title: Use basic permissions to access Microsoft Defender Security Center description: Assign read and write or read only access to the Microsoft Defender Advanced Threat Protection portal. keywords: assign user roles, assign read and write access, assign read only access, user, user roles, roles search.product: eADQiWindows 10XVcnh diff --git a/windows/security/threat-protection/microsoft-defender-atp/community.md b/windows/security/threat-protection/microsoft-defender-atp/community.md index a70adba5f5..78f18ff20e 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/community.md +++ b/windows/security/threat-protection/microsoft-defender-atp/community.md @@ -35,7 +35,7 @@ There are several spaces you can explore to learn about specific information: There are several ways you can access the Community Center: -- In the Windows Defender Security Center navigation pane, select **Community center**. A new browser tab opens and takes you to the Microsoft Defender ATP Tech Community page. +- In the Microsoft Defender Security Center navigation pane, select **Community center**. A new browser tab opens and takes you to the Microsoft Defender ATP Tech Community page. - Access the community through the [Microsoft Defender Advanced Threat Protection Tech Community](https://techcommunity.microsoft.com/t5/Windows-Defender-Advanced-Threat/ct-p/WindowsDefenderAdvanced) page diff --git a/windows/security/threat-protection/microsoft-defender-atp/configure-arcsight.md b/windows/security/threat-protection/microsoft-defender-atp/configure-arcsight.md index 2b787f64c8..05c9269bca 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/configure-arcsight.md +++ b/windows/security/threat-protection/microsoft-defender-atp/configure-arcsight.md @@ -1,6 +1,6 @@ --- title: Configure HP ArcSight to pull Microsoft Defender ATP alerts -description: Configure HP ArcSight to receive and pull alerts from Windows Defender Security Center +description: Configure HP ArcSight to receive and pull alerts from Microsoft Defender Security Center keywords: configure hp arcsight, security information and events management tools, arcsight search.product: eADQiWindows 10XVcnh search.appverid: met150 diff --git a/windows/security/threat-protection/microsoft-defender-atp/configure-conditional-access.md b/windows/security/threat-protection/microsoft-defender-atp/configure-conditional-access.md index e599ecf7be..87e9fe515f 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/configure-conditional-access.md +++ b/windows/security/threat-protection/microsoft-defender-atp/configure-conditional-access.md @@ -38,13 +38,13 @@ You need to make sure that all your devices are enrolled in Intune. You can use -There are steps you'll need to take in Windows Defender Security Center, the Intune portal, and Azure AD portal. +There are steps you'll need to take in Microsoft Defender Security Center, the Intune portal, and Azure AD portal. > [!NOTE] > You'll need a Microsoft Intune environment, with Intune managed and Azure AD joined Windows 10 devices. Take the following steps to enable conditional access: -- Step 1: Turn on the Microsoft Intune connection from Windows Defender Security Center +- Step 1: Turn on the Microsoft Intune connection from Microsoft Defender Security Center - Step 2: Turn on the Microsoft Defender ATP integration in Intune - Step 3: Create the compliance policy in Intune - Step 4: Assign the policy diff --git a/windows/security/threat-protection/microsoft-defender-atp/configure-endpoints-gp.md b/windows/security/threat-protection/microsoft-defender-atp/configure-endpoints-gp.md index 24f3338a41..03ef4fb943 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/configure-endpoints-gp.md +++ b/windows/security/threat-protection/microsoft-defender-atp/configure-endpoints-gp.md @@ -36,7 +36,7 @@ ms.date: 04/24/2018 > To use Group Policy (GP) updates to deploy the package, you must be on Windows Server 2008 R2 or later. ## Onboard machines using Group Policy -1. Open the GP configuration package .zip file (*WindowsDefenderATPOnboardingPackage.zip*) that you downloaded from the service onboarding wizard. You can also get the package from [Windows Defender Security Center](https://securitycenter.windows.com/): +1. Open the GP configuration package .zip file (*WindowsDefenderATPOnboardingPackage.zip*) that you downloaded from the service onboarding wizard. You can also get the package from [Microsoft Defender Security Center](https://securitycenter.windows.com/): a. In the navigation pane, select **Settings** > **Onboarding**. @@ -66,7 +66,7 @@ ms.date: 04/24/2018 > After onboarding the machine, you can choose to run a detection test to verify that the machine is properly onboarded to the service. For more information, see [Run a detection test on a newly onboarded Microsoft Defender ATP machine](run-detection-test-windows-defender-advanced-threat-protection.md). ## Additional Microsoft Defender ATP configuration settings -For each machine, you can state whether samples can be collected from the machine when a request is made through Windows Defender Security Center to submit a file for deep analysis. +For each machine, you can state whether samples can be collected from the machine when a request is made through Microsoft Defender Security Center to submit a file for deep analysis. You can use Group Policy (GP) to configure settings, such as settings for the sample sharing used in the deep analysis feature. @@ -98,7 +98,7 @@ For security reasons, the package used to Offboard machines will expire 30 days > [!NOTE] > Onboarding and offboarding policies must not be deployed on the same machine at the same time, otherwise this will cause unpredictable collisions. -1. Get the offboarding package from [Windows Defender Security Center](https://securitycenter.windows.com/): +1. Get the offboarding package from [Microsoft Defender Security Center](https://securitycenter.windows.com/): a. In the navigation pane, select **Settings** > **Offboarding**. @@ -132,7 +132,7 @@ For security reasons, the package used to Offboard machines will expire 30 days With Group Policy there isn’t an option to monitor deployment of policies on the machines. Monitoring can be done directly on the portal, or by using the different deployment tools. ## Monitor machines using the portal -1. Go to [Windows Defender Security Center](https://securitycenter.windows.com/). +1. Go to [Microsoft Defender Security Center](https://securitycenter.windows.com/). 2. Click **Machines list**. 3. Verify that machines are appearing. diff --git a/windows/security/threat-protection/microsoft-defender-atp/configure-endpoints-mdm.md b/windows/security/threat-protection/microsoft-defender-atp/configure-endpoints-mdm.md index 79a5287504..b4aa4e7b94 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/configure-endpoints-mdm.md +++ b/windows/security/threat-protection/microsoft-defender-atp/configure-endpoints-mdm.md @@ -57,7 +57,7 @@ For security reasons, the package used to Offboard machines will expire 30 days > [!NOTE] > Onboarding and offboarding policies must not be deployed on the same machine at the same time, otherwise this will cause unpredictable collisions. -1. Get the offboarding package from [Windows Defender Security Center](https://securitycenter.windows.com/): +1. Get the offboarding package from [Microsoft Defender Security Center](https://securitycenter.windows.com/): a. In the navigation pane, select **Settings** > **Offboarding**. diff --git a/windows/security/threat-protection/microsoft-defender-atp/configure-endpoints-non-windows.md b/windows/security/threat-protection/microsoft-defender-atp/configure-endpoints-non-windows.md index f431da0f01..11e887fd72 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/configure-endpoints-non-windows.md +++ b/windows/security/threat-protection/microsoft-defender-atp/configure-endpoints-non-windows.md @@ -28,7 +28,7 @@ ms.topic: article -Microsoft Defender ATP provides a centralized security operations experience for Windows as well as non-Windows platforms. You'll be able to see alerts from various supported operating systems (OS) in Windows Defender Security Center and better protect your organization's network. This experience leverages on a third-party security products’ sensor data. +Microsoft Defender ATP provides a centralized security operations experience for Windows as well as non-Windows platforms. You'll be able to see alerts from various supported operating systems (OS) in Microsoft Defender Security Center and better protect your organization's network. This experience leverages on a third-party security products’ sensor data. You'll need to know the exact Linux distros and macOS versions that are compatible with Microsoft Defender ATP for the integration to work. @@ -58,7 +58,7 @@ Create an EICAR test file by saving the string displayed on the portal in an emp The file should trigger a detection and a corresponding alert on Microsoft Defender ATP. ## Offboard non-Windows machines -To effectively offboard the machine from the service, you'll need to disable the data push on the third-party portal first then switch the toggle to off in Windows Defender Security Center. The toggle in the portal only blocks the data inbound flow. +To effectively offboard the machine from the service, you'll need to disable the data push on the third-party portal first then switch the toggle to off in Microsoft Defender Security Center. The toggle in the portal only blocks the data inbound flow. 1. Follow the third-party documentation to opt-out on the third-party service side. diff --git a/windows/security/threat-protection/microsoft-defender-atp/configure-endpoints-sccm.md b/windows/security/threat-protection/microsoft-defender-atp/configure-endpoints-sccm.md index 8a91ad835d..509661ca90 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/configure-endpoints-sccm.md +++ b/windows/security/threat-protection/microsoft-defender-atp/configure-endpoints-sccm.md @@ -49,7 +49,7 @@ You can use existing System Center Configuration Manager functionality to create ### Onboard machines using System Center Configuration Manager -1. Open the SCCM configuration package .zip file (*WindowsDefenderATPOnboardingPackage.zip*) that you downloaded from the service onboarding wizard. You can also get the package from [Windows Defender Security Center](https://securitycenter.windows.com/): +1. Open the SCCM configuration package .zip file (*WindowsDefenderATPOnboardingPackage.zip*) that you downloaded from the service onboarding wizard. You can also get the package from [Microsoft Defender Security Center](https://securitycenter.windows.com/): a. In the navigation pane, select **Settings** > **Onboarding**. @@ -72,7 +72,7 @@ You can use existing System Center Configuration Manager functionality to create > After onboarding the machine, you can choose to run a detection test to verify that an machine is properly onboarded to the service. For more information, see [Run a detection test on a newly onboarded Microsoft Defender ATP machine](run-detection-test-windows-defender-advanced-threat-protection.md). ### Configure sample collection settings -For each machine, you can set a configuration value to state whether samples can be collected from the machine when a request is made through Windows Defender Security Center to submit a file for deep analysis. +For each machine, you can set a configuration value to state whether samples can be collected from the machine when a request is made through Microsoft Defender Security Center to submit a file for deep analysis. You can set a compliance rule for configuration item in System Center Configuration Manager to change the sample share setting on a machine. This rule should be a *remediating* compliance rule configuration item that sets the value of a registry key on targeted machines to make sure they’re complaint. @@ -103,7 +103,7 @@ For security reasons, the package used to Offboard machines will expire 30 days > [!NOTE] > Onboarding and offboarding policies must not be deployed on the same machine at the same time, otherwise this will cause unpredictable collisions. -1. Get the offboarding package from [Windows Defender Security Center](https://securitycenter.windows.com/): +1. Get the offboarding package from [Microsoft Defender Security Center](https://securitycenter.windows.com/): a. In the navigation pane, select **Settings** > **Offboarding**. diff --git a/windows/security/threat-protection/microsoft-defender-atp/configure-endpoints-script.md b/windows/security/threat-protection/microsoft-defender-atp/configure-endpoints-script.md index 9b0d319050..88cd708b56 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/configure-endpoints-script.md +++ b/windows/security/threat-protection/microsoft-defender-atp/configure-endpoints-script.md @@ -35,7 +35,7 @@ You can also manually onboard individual machines to Microsoft Defender ATP. You > The script has been optimized to be used on a limited number of machines (1-10 machines). To deploy to scale, use other deployment options. For more information on using other deployment options, see [Onboard Window 10 machines](configure-endpoints-windows-defender-advanced-threat-protection.md). ## Onboard machines -1. Open the GP configuration package .zip file (*WindowsDefenderATPOnboardingPackage.zip*) that you downloaded from the service onboarding wizard. You can also get the package from [Windows Defender Security Center](https://securitycenter.windows.com/): +1. Open the GP configuration package .zip file (*WindowsDefenderATPOnboardingPackage.zip*) that you downloaded from the service onboarding wizard. You can also get the package from [Microsoft Defender Security Center](https://securitycenter.windows.com/): a. In the navigation pane, select **Settings** > **Onboarding**. @@ -67,7 +67,7 @@ For information on how you can manually validate that the machine is compliant a > After onboarding the machine, you can choose to run a detection test to verify that an machine is properly onboarded to the service. For more information, see [Run a detection test on a newly onboarded Microsoft Defender ATP endpoint](run-detection-test-windows-defender-advanced-threat-protection.md). ## Configure sample collection settings -For each machine, you can set a configuration value to state whether samples can be collected from the machine when a request is made through Windows Defender Security Center to submit a file for deep analysis. +For each machine, you can set a configuration value to state whether samples can be collected from the machine when a request is made through Microsoft Defender Security Center to submit a file for deep analysis. You can manually configure the sample sharing setting on the machine by using *regedit* or creating and running a *.reg* file. @@ -93,7 +93,7 @@ For security reasons, the package used to Offboard machines will expire 30 days > [!NOTE] > Onboarding and offboarding policies must not be deployed on the same machine at the same time, otherwise this will cause unpredictable collisions. -1. Get the offboarding package from [Windows Defender Security Center](https://securitycenter.windows.com/): +1. Get the offboarding package from [Microsoft Defender Security Center](https://securitycenter.windows.com/): a. In the navigation pane, select **Settings** > **Offboarding**. @@ -127,7 +127,7 @@ You can follow the different verification steps in the [Troubleshoot onboarding Monitoring can also be done directly on the portal, or by using the different deployment tools. ### Monitor machines using the portal -1. Go to Windows Defender Security Center. +1. Go to Microsoft Defender Security Center. 2. Click **Machines list**. diff --git a/windows/security/threat-protection/microsoft-defender-atp/configure-endpoints-vdi.md b/windows/security/threat-protection/microsoft-defender-atp/configure-endpoints-vdi.md index be05604d0b..95c0a67fb9 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/configure-endpoints-vdi.md +++ b/windows/security/threat-protection/microsoft-defender-atp/configure-endpoints-vdi.md @@ -43,7 +43,7 @@ You can onboard VDI machines using a single entry or multiple entries for each m >[!WARNING] > For environments where there are low resource configurations, the VDI boot proceedure might slow the Microsoft Defender ATP sensor onboarding. -1. Open the VDI configuration package .zip file (*WindowsDefenderATPOnboardingPackage.zip*) that you downloaded from the service onboarding wizard. You can also get the package from [Windows Defender Security Center](https://securitycenter.windows.com/): +1. Open the VDI configuration package .zip file (*WindowsDefenderATPOnboardingPackage.zip*) that you downloaded from the service onboarding wizard. You can also get the package from [Microsoft Defender Security Center](https://securitycenter.windows.com/): a. In the navigation pane, select **Settings** > **Onboarding**. @@ -83,8 +83,8 @@ You can onboard VDI machines using a single entry or multiple entries for each m d. Logon to machine with another user. - e. **For single entry for each machine**: Check only one entry in Windows Defender Security Center.
- **For multiple entries for each machine**: Check multiple entries in Windows Defender Security Center. + e. **For single entry for each machine**: Check only one entry in Microsoft Defender Security Center.
+ **For multiple entries for each machine**: Check multiple entries in Microsoft Defender Security Center. 7. Click **Machines list** on the Navigation pane. diff --git a/windows/security/threat-protection/microsoft-defender-atp/configure-microsoft-threat-experts.md b/windows/security/threat-protection/microsoft-defender-atp/configure-microsoft-threat-experts.md index 0f0180a75a..cc7fc9a6ee 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/configure-microsoft-threat-experts.md +++ b/windows/security/threat-protection/microsoft-defender-atp/configure-microsoft-threat-experts.md @@ -68,7 +68,7 @@ You'll start receiving targeted attack notification from Microsoft Threat Expert ## Ask a Microsoft threat expert about suspicious cybersecurity activities in your organization -You can partner with Microsoft Threat Experts who can be engaged directly from within the Windows Defender Security Center for timely and accurate response. Experts provide insights needed to better understand complex threats, targeted attack notifications that you get, or if you need more information about the alerts, a potentially compromised machine, or a threat intelligence context that you see on your portal dashboard. +You can partner with Microsoft Threat Experts who can be engaged directly from within the Microsoft Defender Security Center for timely and accurate response. Experts provide insights needed to better understand complex threats, targeted attack notifications that you get, or if you need more information about the alerts, a potentially compromised machine, or a threat intelligence context that you see on your portal dashboard. 1. Navigate to the portal page with the relevant information that you'd like to investigate, for example, the **Incident** page. Ensure that the page for the relevant alert or machine is in view before raising an inquiry. 2. From the upper right-hand menu, click **?**, then select **Ask a threat expert**. diff --git a/windows/security/threat-protection/microsoft-defender-atp/configure-mssp-support.md b/windows/security/threat-protection/microsoft-defender-atp/configure-mssp-support.md index 3dd2f86f1f..abe48eeec7 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/configure-mssp-support.md +++ b/windows/security/threat-protection/microsoft-defender-atp/configure-mssp-support.md @@ -35,7 +35,7 @@ You'll need to take the following configuration steps to enable the managed secu > - MSSP customers: Organizations that engage the services of MSSPs. The integration will allow MSSPs to take the following actions: -- Get access to MSSP customer's Windows Defender Security Center portal +- Get access to MSSP customer's Microsoft Defender Security Center portal - Get email notifications, and - Fetch alerts through security information and event management (SIEM) tools @@ -46,7 +46,7 @@ Typically, MSSP customers take the initial configuration steps to grant MSSPs ac In general, the following configuration steps need to be taken: -- **Grant the MSSP access to Windows Defender Security Center**
+- **Grant the MSSP access to Microsoft Defender Security Center**
This action needs to be done by the MSSP customer. It grants the MSSP access to the MSSP customer's Microsoft Defender ATP tenant. - **Configure alert notifications sent to MSSPs**
@@ -65,21 +65,21 @@ This action is taken by the MSSP. It allows MSSPs to fetch alerts using APIs. > These set of steps are directed towards the MSSP customer.
> Access to the portal can only be done by the MSSP customer. -As a MSSP customer, you'll need to take the following configuration steps to grant the MSSP access to Windows Defender Security Center. +As a MSSP customer, you'll need to take the following configuration steps to grant the MSSP access to Microsoft Defender Security Center. Authentication and authorization of the MSSP user is built on top of Azure Active Directory (Azure AD) B2B functionality. You'll need to take the following 2 steps: - Add MSSP user to your tenant as a guest user -- Grant MSSP user access to Windows Defender Security Center +- Grant MSSP user access to Microsoft Defender Security Center ### Add MSSP user to your tenant as a guest user Add a user who is a member of the MSSP tenant to your tenant as a guest user. To grant portal access to the MSSP, you must add the MSSP user to your Azure AD as a guest user. For more information, see [Add Azure Active Directory B2B collaboration users in the Azure portal](https://docs.microsoft.com/azure/active-directory/b2b/add-users-administrator). -### Grant MSSP user access to Windows Defender Security Center -Grant the guest user access and permissions to your Windows Defender Security Center tenant. +### Grant MSSP user access to Microsoft Defender Security Center +Grant the guest user access and permissions to your Microsoft Defender Security Center tenant. Granting access to guest user is done the same way as granting access to a user who is a member of your tenant. @@ -94,12 +94,12 @@ It is recommended that groups are created for MSSPs to make authorization access As a MSSP customer, you can always remove or modify the permissions granted to the MSSP by updating the Azure AD user groups. -## Access the Windows Defender Security Center MSSP customer portal +## Access the Microsoft Defender Security Center MSSP customer portal >[!NOTE] >These set of steps are directed towards the MSSP. -By default, MSSP customers access their Windows Defender Security Center tenant through the following URL: `https://securitycenter.windows.com`. +By default, MSSP customers access their Microsoft Defender Security Center tenant through the following URL: `https://securitycenter.windows.com`. MSSPs however, will need to use a tenant-specific URL in the following format: `https://securitycenter.windows.com?tid=customer_tenant_id` to access the MSSP customer portal. @@ -142,7 +142,7 @@ Step 1: Create a third-party application Step 2: Get access and refresh tokens from your customer's tenant -Step 3: Whitelist your application on Windows Defender Security Center +Step 3: Whitelist your application on Microsoft Defender Security Center @@ -257,8 +257,8 @@ After providing your credentials, you'll need to grant consent to the applicatio 8. In the PowerShell window, you'll receive an access token and a refresh token. Save the refresh token to configure your SIEM connector. -### Step 3: Whitelist your application on Windows Defender Security Center -You'll need to whitelist the application you created in Windows Defender Security Center. +### Step 3: Whitelist your application on Microsoft Defender Security Center +You'll need to whitelist the application you created in Microsoft Defender Security Center. You'll need to have **Manage portal system settings** permission to whitelist the application. Otherwise, you'll need to request your customer to whitelist the application for you. diff --git a/windows/security/threat-protection/microsoft-defender-atp/configure-server-endpoints.md b/windows/security/threat-protection/microsoft-defender-atp/configure-server-endpoints.md index b247126bb2..5150173b16 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/configure-server-endpoints.md +++ b/windows/security/threat-protection/microsoft-defender-atp/configure-server-endpoints.md @@ -31,7 +31,7 @@ ms.topic: article >Want to experience Microsoft Defender ATP? [Sign up for a free trial.](https://www.microsoft.com/en-us/WindowsForBusiness/windows-atp?ocid=docs-wdatp-configserver-abovefoldlink) -Microsoft Defender ATP extends support to also include the Windows Server operating system, providing advanced attack detection and investigation capabilities, seamlessly through the Windows Defender Security Center console. +Microsoft Defender ATP extends support to also include the Windows Server operating system, providing advanced attack detection and investigation capabilities, seamlessly through the Microsoft Defender Security Center console. The service supports the onboarding of the following servers: - Windows Server 2012 R2 @@ -47,7 +47,7 @@ For a practical guidance on what needs to be in place for licensing and infrastr There are two options to onboard Windows Server 2012 R2 and Windows Server 2016 to Microsoft Defender ATP: - **Option 1**: Onboard through Azure Security Center -- **Option 2**: Onboard through Windows Defender Security Center +- **Option 2**: Onboard through Microsoft Defender Security Center ### Option 1: Onboard servers through Azure Security Center 1. In the navigation pane, select **Settings** > **Machine management** > **Onboarding**. @@ -58,15 +58,15 @@ There are two options to onboard Windows Server 2012 R2 and Windows Server 2016 4. Follow the onboarding instructions in [Microsoft Defender Advanced Threat Protection with Azure Security Center](https://docs.microsoft.com/azure/security-center/security-center-wdatp). -### Option 2: Onboard servers through Windows Defender Security Center -You'll need to tak the following steps if you choose to onboard servers through Windows Defender Security Center. +### Option 2: Onboard servers through Microsoft Defender Security Center +You'll need to tak the following steps if you choose to onboard servers through Microsoft Defender Security Center. - For Windows Server 2012 R2: Configure and update System Center Endpoint Protection clients. >[!NOTE] >This step is required only if your organization uses System Center Endpoint Protection (SCEP) and you're onboarding Windows Server 2012 R2. -- Turn on server monitoring from Windows Defender Security Center. +- Turn on server monitoring from Microsoft Defender Security Center. - If you're already leveraging System Center Operations Manager (SCOM) or Azure Monitor (formerly known as Operations Management Suite (OMS)), simply attach the Microsoft Monitoring Agent (MMA) to report to your Microsoft Defender ATP workspace through Multi Homing support. Otherwise, install and configure MMA to report sensor data to Microsoft Defender ATP as instructed below. For more information, see [Collect log data with Azure Log Analytics agent](https://docs.microsoft.com/azure/azure-monitor/platform/log-analytics-agent). >[!TIP] @@ -83,7 +83,7 @@ The following steps are required to enable this integration: - Configure the SCEP client Cloud Protection Service membership to the **Advanced** setting -### Turn on Server monitoring from the Windows Defender Security Center portal +### Turn on Server monitoring from the Microsoft Defender Security Center portal 1. In the navigation pane, select **Settings** > **Machine management** > **Onboarding**. @@ -174,7 +174,7 @@ The following capabilities are included in this integration: > Automated onboarding is only applicable for Windows Server 2012 R2 and Windows Server 2016. - Servers monitored by Azure Security Center will also be available in Microsoft Defender ATP - Azure Security Center seamlessly connects to the Microsoft Defender ATP tenant, providing a single view across clients and servers. In addition, Microsoft Defender ATP alerts will be available in the Azure Security Center console. -- Server investigation - Azure Security Center customers can access Windows Defender Security Center to perform detailed investigation to uncover the scope of a potential breach +- Server investigation - Azure Security Center customers can access Microsoft Defender Security Center to perform detailed investigation to uncover the scope of a potential breach >[!IMPORTANT] >- When you use Azure Security Center to monitor servers, a Microsoft Defender ATP tenant is automatically created. The Microsoft Defender ATP data is stored in Europe by default. diff --git a/windows/security/threat-protection/microsoft-defender-atp/configure-siem.md b/windows/security/threat-protection/microsoft-defender-atp/configure-siem.md index 9c544f5795..1cc071a515 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/configure-siem.md +++ b/windows/security/threat-protection/microsoft-defender-atp/configure-siem.md @@ -58,6 +58,6 @@ Topic | Description [Enable SIEM integration in Microsoft Defender ATP](enable-siem-integration-windows-defender-advanced-threat-protection.md)| Learn about enabling the SIEM integration feature in the **Settings** page in the portal so that you can use and generate the required information to configure supported SIEM tools. [Configure Splunk to pull Microsoft Defender ATP alerts](configure-splunk-windows-defender-advanced-threat-protection.md)| Learn about installing the REST API Modular Input app and other configuration settings to enable Splunk to pull Microsoft Defender ATP alerts. [Configure HP ArcSight to pull Microsoft Defender ATP alerts](configure-arcsight-windows-defender-advanced-threat-protection.md)| Learn about installing the HP ArcSight REST FlexConnector package and the files you need to configure ArcSight to pull Microsoft Defender ATP alerts. -[Microsoft Defender ATP alert API fields](api-portal-mapping-windows-defender-advanced-threat-protection.md) | Understand what data fields are exposed as part of the alerts API and how they map to Windows Defender Security Center. +[Microsoft Defender ATP alert API fields](api-portal-mapping-windows-defender-advanced-threat-protection.md) | Understand what data fields are exposed as part of the alerts API and how they map to Microsoft Defender Security Center. [Pull Microsoft Defender ATP alerts using REST API](pull-alerts-using-rest-api-windows-defender-advanced-threat-protection.md) | Use the Client credentials OAuth 2.0 flow to pull alerts from Microsoft Defender ATP using REST API. [Troubleshoot SIEM tool integration issues](troubleshoot-siem-windows-defender-advanced-threat-protection.md) | Address issues you might encounter when using the SIEM integration feature. diff --git a/windows/security/threat-protection/microsoft-defender-atp/configure-splunk.md b/windows/security/threat-protection/microsoft-defender-atp/configure-splunk.md index bb3e6d4f5b..a59e0fb017 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/configure-splunk.md +++ b/windows/security/threat-protection/microsoft-defender-atp/configure-splunk.md @@ -1,6 +1,6 @@ --- title: Configure Splunk to pull Microsoft Defender ATP alerts -description: Configure Splunk to receive and pull alerts from Windows Defender Security Center. +description: Configure Splunk to receive and pull alerts from Microsoft Defender Security Center. keywords: configure splunk, security information and events management tools, splunk search.product: eADQiWindows 10XVcnh search.appverid: met150 diff --git a/windows/security/threat-protection/microsoft-defender-atp/custom-ti-api.md b/windows/security/threat-protection/microsoft-defender-atp/custom-ti-api.md index 552a856b66..8da5ea770d 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/custom-ti-api.md +++ b/windows/security/threat-protection/microsoft-defender-atp/custom-ti-api.md @@ -137,7 +137,7 @@ Content-Type: application/json; } ``` -The following values correspond to the alert sections surfaced on Windows Defender Security Center: +The following values correspond to the alert sections surfaced on Microsoft Defender Security Center: ![Image of alert from the portal](images/atp-custom-ti-mapping.png) Highlighted section | JSON key name diff --git a/windows/security/threat-protection/microsoft-defender-atp/enable-custom-ti.md b/windows/security/threat-protection/microsoft-defender-atp/enable-custom-ti.md index c90107793c..d450893080 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/enable-custom-ti.md +++ b/windows/security/threat-protection/microsoft-defender-atp/enable-custom-ti.md @@ -29,7 +29,7 @@ ms.date: 04/24/2018 >Want to experience Microsoft Defender ATP? [Sign up for a free trial.](https://www.microsoft.com/en-us/WindowsForBusiness/windows-atp?ocid=docs-wdatp-enablecustomti-abovefoldlink) -Before you can create custom threat intelligence (TI) using REST API, you'll need to set up the custom threat intelligence application through Windows Defender Security Center. +Before you can create custom threat intelligence (TI) using REST API, you'll need to set up the custom threat intelligence application through Microsoft Defender Security Center. 1. In the navigation pane, select **Settings** > **Threat intel**. diff --git a/windows/security/threat-protection/microsoft-defender-atp/enable-siem-integration.md b/windows/security/threat-protection/microsoft-defender-atp/enable-siem-integration.md index a5099be0b4..333a44a06f 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/enable-siem-integration.md +++ b/windows/security/threat-protection/microsoft-defender-atp/enable-siem-integration.md @@ -26,7 +26,7 @@ ms.date: 12/10/2018 >Want to experience Microsoft Defender ATP? [Sign up for a free trial.](https://www.microsoft.com/en-us/WindowsForBusiness/windows-atp?ocid=docs-wdatp-enablesiem-abovefoldlink) -Enable security information and event management (SIEM) integration so you can pull alerts from Windows Defender Security Center using your SIEM solution or by connecting directly to the alerts REST API. +Enable security information and event management (SIEM) integration so you can pull alerts from Microsoft Defender Security Center using your SIEM solution or by connecting directly to the alerts REST API. ## Prerequisites - The user who activates the setting must have permissions to create an app in Azure Active Directory (AAD). This is typically someone with a **Global administrator** role. @@ -64,7 +64,7 @@ Enable security information and event management (SIEM) integration so you can p > [!NOTE] > You'll need to generate a new Refresh token every 90 days. -You can now proceed with configuring your SIEM solution or connecting to the alerts REST API through programmatic access. You'll need to use the tokens when configuring your SIEM solution to allow it to receive alerts from Windows Defender Security Center. +You can now proceed with configuring your SIEM solution or connecting to the alerts REST API through programmatic access. You'll need to use the tokens when configuring your SIEM solution to allow it to receive alerts from Microsoft Defender Security Center. ## Integrate Microsoft Defender ATP with IBM QRadar You can configure IBM QRadar to collect alerts from Microsoft Defender ATP. For more information, see [IBM Knowledge Center](https://www.ibm.com/support/knowledgecenter/SS42VS_DSM/c_dsm_guide_MS_Win_Defender_ATP_overview.html?cp=SS42VS_7.3.1). diff --git a/windows/security/threat-protection/microsoft-defender-atp/experiment-custom-ti.md b/windows/security/threat-protection/microsoft-defender-atp/experiment-custom-ti.md index b89eeb886a..b6eee8768f 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/experiment-custom-ti.md +++ b/windows/security/threat-protection/microsoft-defender-atp/experiment-custom-ti.md @@ -141,7 +141,7 @@ This step will guide you in simulating an event in connection to a malicious IP ## Step 4: Explore the custom alert in the portal This step will guide you in exploring the custom alert in the portal. -1. Open [Windows Defender Security Center](http://securitycenter.windows.com/) on a browser. +1. Open [Microsoft Defender Security Center](http://securitycenter.windows.com/) on a browser. 2. Log in with your Microsoft Defender ATP credentials. diff --git a/windows/security/threat-protection/microsoft-defender-atp/fix-unhealhty-sensors.md b/windows/security/threat-protection/microsoft-defender-atp/fix-unhealhty-sensors.md index 25198b66e2..ba0614caa3 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/fix-unhealhty-sensors.md +++ b/windows/security/threat-protection/microsoft-defender-atp/fix-unhealhty-sensors.md @@ -39,7 +39,7 @@ An inactive machine is not necessarily flagged due to an issue. The following ac If the machine has not been in use for more than 7 days for any reason, it will remain in an ‘Inactive’ status in the portal. **Machine was reinstalled or renamed**
-A reinstalled or renamed machine will generate a new machine entity in Windows Defender Security Center. The previous machine entity will remain with an ‘Inactive’ status in the portal. If you reinstalled a machine and deployed the Microsoft Defender ATP package, search for the new machine name to verify that the machine is reporting normally. +A reinstalled or renamed machine will generate a new machine entity in Microsoft Defender Security Center. The previous machine entity will remain with an ‘Inactive’ status in the portal. If you reinstalled a machine and deployed the Microsoft Defender ATP package, search for the new machine name to verify that the machine is reporting normally. **Machine was offboarded**
If the machine was offboarded it will still appear in machines list. After 7 days, the machine health state should change to inactive. diff --git a/windows/security/threat-protection/microsoft-defender-atp/get-started.md b/windows/security/threat-protection/microsoft-defender-atp/get-started.md index f5a6fa236f..cc12829160 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/get-started.md +++ b/windows/security/threat-protection/microsoft-defender-atp/get-started.md @@ -47,7 +47,7 @@ In conjunction with being able to quickly respond to advanced attacks, Microsoft Microsoft Defender ATP provides a security posture capability to help you dynamically assess the security state of your enterprise network, identify unprotected systems, and take recommended actions to improve the overall security state of your network. **Advanced hunting**
-Advanced hunting allows you to hunt for possible threats across your organization using a powerful search and query tool. You can also create custom detection rules based on the queries you created and surface alerts in Windows Defender Security Center. +Advanced hunting allows you to hunt for possible threats across your organization using a powerful search and query tool. You can also create custom detection rules based on the queries you created and surface alerts in Microsoft Defender Security Center. **Management and APIs**
Integrate Microsoft Defender Advanced Threat Protection into your existing workflows. @@ -64,4 +64,4 @@ Topic | Description [Data storage and privacy](data-storage-privacy-windows-defender-advanced-threat-protection.md) | Explains the data storage and privacy details related to Microsoft Defender ATP. [Assign user access to the portal](assign-portal-access-windows-defender-advanced-threat-protection.md) | Set permissions to manage who can access the portal. You can set basic permissions or set granular permissions using role-based access control (RBAC). [Evaluate Microsoft Defender ATP](evaluate-atp.md) | Evaluate the various capabilities in Microsoft Defender ATP and test features out. -[Access the Windows Defender Security Center Community Center](community-windows-defender-advanced-threat-protection.md) | The Microsoft Defender ATP Community Center is a place where community members can learn, collaborate, and share experiences about the product. \ No newline at end of file +[Access the Microsoft Defender Security Center Community Center](community-windows-defender-advanced-threat-protection.md) | The Microsoft Defender ATP Community Center is a place where community members can learn, collaborate, and share experiences about the product. \ No newline at end of file diff --git a/windows/security/threat-protection/microsoft-defender-atp/information-protection-in-windows-overview.md b/windows/security/threat-protection/microsoft-defender-atp/information-protection-in-windows-overview.md index f594da75a4..fad5873fe4 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/information-protection-in-windows-overview.md +++ b/windows/security/threat-protection/microsoft-defender-atp/information-protection-in-windows-overview.md @@ -38,7 +38,7 @@ Microsoft Defender ATP applies two methods to discover and protect data: ## Data discovery -Microsoft Defender ATP automatically discovers files with sensitivity labels on Windows devices when the feature is enabled. You can enable the Azure Information Protection integration feature from Windows Defender Security Center. For more information, see [Configure advanced features](advanced-features-windows-defender-advanced-threat-protection.md#azure-information-protection). +Microsoft Defender ATP automatically discovers files with sensitivity labels on Windows devices when the feature is enabled. You can enable the Azure Information Protection integration feature from Microsoft Defender Security Center. For more information, see [Configure advanced features](advanced-features-windows-defender-advanced-threat-protection.md#azure-information-protection). ![Image of settings page with Azure Information Protection](images/atp-settings-aip.png) @@ -78,8 +78,8 @@ InformationProtectionLogs_CL **Prerequisites:** - Customers must have a subscription for Azure Information Protection. -- Enable Azure Information Protection integration in Windows Defender Security Center: - - Go to **Settings** in Windows Defender Security Center, click on **Advanced Settings** under **General**. +- Enable Azure Information Protection integration in Microsoft Defender Security Center: + - Go to **Settings** in Microsoft Defender Security Center, click on **Advanced Settings** under **General**. ## Data protection diff --git a/windows/security/threat-protection/microsoft-defender-atp/licensing.md b/windows/security/threat-protection/microsoft-defender-atp/licensing.md index efbcf00dab..1011ef2e74 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/licensing.md +++ b/windows/security/threat-protection/microsoft-defender-atp/licensing.md @@ -51,9 +51,9 @@ To gain access into which licenses are provisioned to your company, and to check ![Image of O365 admin portal](images\atp-O365-admin-portal-customer.png) -## Access Windows Defender Security Center for the first time +## Access Microsoft Defender Security Center for the first time -When accessing [Windows Defender Security Center](https://SecurityCenter.Windows.com) for the first time there will be a setup wizard that will guide you through some initial steps. At the end of the setup wizard there will be a dedicated cloud instance of Microsoft Defender ATP created. +When accessing [Microsoft Defender Security Center](https://SecurityCenter.Windows.com) for the first time there will be a setup wizard that will guide you through some initial steps. At the end of the setup wizard there will be a dedicated cloud instance of Microsoft Defender ATP created. 1. Each time you access the portal you will need to validate that you are authorized to access the product. This **Set up your permissions** step will only be available if you are not currently authorized to access the product. @@ -65,7 +65,7 @@ When accessing [Windows Defender Security Center](https://SecurityCenter.Windows ![Image of Welcome screen for portal set up](images\welcome1.png) - You will need to set up your preferences for Windows Defender Security Center. + You will need to set up your preferences for Microsoft Defender Security Center. 3. Set up preferences @@ -98,11 +98,11 @@ When accessing [Windows Defender Security Center](https://SecurityCenter.Windows 4. You will receive a warning notifying you that you won't be able to change some of your preferences once you click **Continue**. > [!NOTE] - > Some of these options can be changed at a later time in Windows Defender Security Center. + > Some of these options can be changed at a later time in Microsoft Defender Security Center. ![Image of final preference set up](images\setup-preferences2.png) -5. A dedicated cloud instance of Windows Defender Security Center is being created at this time. This step will take an average of 5 minutes to complete. +5. A dedicated cloud instance of Microsoft Defender Security Center is being created at this time. This step will take an average of 5 minutes to complete. ![Image of Microsoft Defender ATP cloud instance](images\creating-account.png) diff --git a/windows/security/threat-protection/microsoft-defender-atp/manage-alerts.md b/windows/security/threat-protection/microsoft-defender-atp/manage-alerts.md index 85be05b201..6aafe49de3 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/manage-alerts.md +++ b/windows/security/threat-protection/microsoft-defender-atp/manage-alerts.md @@ -41,7 +41,7 @@ If an alert is no yet assigned, you can select **Assign to me** to assign the al ## Suppress alerts -There might be scenarios where you need to suppress alerts from appearing in Windows Defender Security Center. Microsoft Defender ATP lets you create suppression rules for specific alerts that are known to be innocuous such as known tools or processes in your organization. +There might be scenarios where you need to suppress alerts from appearing in Microsoft Defender Security Center. Microsoft Defender ATP lets you create suppression rules for specific alerts that are known to be innocuous such as known tools or processes in your organization. Suppression rules can be created from an existing alert. They can be disabled and reenabled if needed. diff --git a/windows/security/threat-protection/microsoft-defender-atp/manage-auto-investigation.md b/windows/security/threat-protection/microsoft-defender-atp/manage-auto-investigation.md index fa2c696f10..92c91b1b6f 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/manage-auto-investigation.md +++ b/windows/security/threat-protection/microsoft-defender-atp/manage-auto-investigation.md @@ -1,5 +1,5 @@ --- -title: Learn about the automated investigations dashboard in Windows Defender Security Center +title: Learn about the automated investigations dashboard in Microsoft Defender Security Center description: View the list of automated investigations, its status, detection source and other details. keywords: autoir, automated, investigation, detection, dashboard, source, threat types, id, tags, machines, duration, filter export search.product: eADQiWindows 10XVcnh diff --git a/windows/security/threat-protection/microsoft-defender-atp/manage-edr.md b/windows/security/threat-protection/microsoft-defender-atp/manage-edr.md index b430f21281..84835dc6f5 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/manage-edr.md +++ b/windows/security/threat-protection/microsoft-defender-atp/manage-edr.md @@ -26,7 +26,7 @@ Manage the alerts queue, investigate machines in the machines list, take respons ## In this section Topic | Description :---|:--- -[Alerts queue](alerts-queue-endpoint-detection-response.md)| View the alerts surfaced in Windows Defender Security Center. +[Alerts queue](alerts-queue-endpoint-detection-response.md)| View the alerts surfaced in Microsoft Defender Security Center. [Machines list](machines-view-overview-windows-defender-advanced-threat-protection.md) | Learn how you can view and manage the machines list, manage machine groups, and investigate machine related alerts. [Take response actions](response-actions-windows-defender-advanced-threat-protection.md)| Take response actions on machines and files to quickly respond to detected attacks and contain threats. [Query data using advanced hunting](advanced-hunting-windows-defender-advanced-threat-protection.md)| Proactively hunt for possible threats across your organization using a powerful search and query tool. \ No newline at end of file diff --git a/windows/security/threat-protection/microsoft-defender-atp/microsoft-cloud-app-security-integration.md b/windows/security/threat-protection/microsoft-defender-atp/microsoft-cloud-app-security-integration.md index f8990f3871..36122f938c 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/microsoft-cloud-app-security-integration.md +++ b/windows/security/threat-protection/microsoft-defender-atp/microsoft-cloud-app-security-integration.md @@ -37,7 +37,7 @@ The integration provides the following major improvements to the existing Cloud - Available everywhere - Since the network activity is collected directly from the endpoint, it's available wherever the device is, on or off corporate network, as it's no longer depended on traffic routed through the enterprise firewall or proxy servers. -- Works out of the box, no configuration required - Forwarding cloud traffic logs to Cloud App Security requires firewall and proxy server configuration. With the Microsoft Defender ATP and Cloud App Security integration, there's no configuration required. Just switch it on in Windows Defender Security Center settings and you're good to go. +- Works out of the box, no configuration required - Forwarding cloud traffic logs to Cloud App Security requires firewall and proxy server configuration. With the Microsoft Defender ATP and Cloud App Security integration, there's no configuration required. Just switch it on in Microsoft Defender Security Center settings and you're good to go. - Device context - Cloud traffic logs lack device context. Microsoft Defender ATP network activity is reported with the device context (which device accessed the cloud app), so you are able to understand exactly where (device) the network activity took place, in addition to who (user) performed it. diff --git a/windows/security/threat-protection/microsoft-defender-atp/microsoft-defender-advanced-threat-protection.md b/windows/security/threat-protection/microsoft-defender-atp/microsoft-defender-advanced-threat-protection.md index 4b2be0215b..1e661e11f1 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/microsoft-defender-advanced-threat-protection.md +++ b/windows/security/threat-protection/microsoft-defender-atp/microsoft-defender-advanced-threat-protection.md @@ -116,7 +116,7 @@ Integrate Microsoft Defender Advanced Threat Protection into your existing workf ## In this section -To help you maximize the effectiveness of the security platform, you can configure individual capabilities that surface in Windows Defender Security Center. +To help you maximize the effectiveness of the security platform, you can configure individual capabilities that surface in Microsoft Defender Security Center. Topic | Description :---|:--- diff --git a/windows/security/threat-protection/microsoft-defender-atp/microsoft-threat-experts.md b/windows/security/threat-protection/microsoft-defender-atp/microsoft-threat-experts.md index 652eaf3652..5541a2edb5 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/microsoft-threat-experts.md +++ b/windows/security/threat-protection/microsoft-defender-atp/microsoft-threat-experts.md @@ -36,7 +36,7 @@ Microsoft Threat Experts provides proactive hunting for the most important threa - Scope of compromise and as much context as can be quickly delivered to enable fast SOC response. ## Collaborate with experts, on demand -Customers can engage our security experts directly from within Windows Defender Security Center for timely and accurate response. Experts provide insights needed to better understand the complex threats affecting your organization, from alert inquiries, potentially compromised machines, root cause of a suspicious network connection, to additional threat intelligence regarding ongoing advanced persistent threat campaigns. With this capability, you can: +Customers can engage our security experts directly from within Microsoft Defender Security Center for timely and accurate response. Experts provide insights needed to better understand the complex threats affecting your organization, from alert inquiries, potentially compromised machines, root cause of a suspicious network connection, to additional threat intelligence regarding ongoing advanced persistent threat campaigns. With this capability, you can: - Get additional clarification on alerts including root cause or scope of the incident - Gain clarity into suspicious machine behavior and next steps if faced with an advanced attacker - Determine risk and protection regarding threat actors, campaigns, or emerging attacker techniques diff --git a/windows/security/threat-protection/microsoft-defender-atp/mssp-support.md b/windows/security/threat-protection/microsoft-defender-atp/mssp-support.md index 33e5a03df9..71bf5122da 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/mssp-support.md +++ b/windows/security/threat-protection/microsoft-defender-atp/mssp-support.md @@ -35,7 +35,7 @@ To address this demand, managed security service providers (MSSP) offer to deliv Microsoft Defender ATP adds support for this scenario and to allow MSSPs to take the following actions: -- Get access to MSSP customer's Windows Defender Security Center portal +- Get access to MSSP customer's Microsoft Defender Security Center portal - Get email notifications, and - Fetch alerts through security information and event management (SIEM) tools diff --git a/windows/security/threat-protection/microsoft-defender-atp/onboard-configure.md b/windows/security/threat-protection/microsoft-defender-atp/onboard-configure.md index 353ee5e12b..61dc191dc5 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/onboard-configure.md +++ b/windows/security/threat-protection/microsoft-defender-atp/onboard-configure.md @@ -163,7 +163,7 @@ Topic | Description [Onboard previous versions of Windows](onboard-downlevel-windows-defender-advanced-threat-protection.md)| Onboard Windows 7 and Windows 8.1 machines to Microsoft Defender ATP. [Onboard Windows 10 machines](configure-endpoints-windows-defender-advanced-threat-protection.md) | You'll need to onboard machines for it to report to the Microsoft Defender ATP service. Learn about the tools and methods you can use to configure machines in your enterprise. [Onboard servers](configure-server-endpoints-windows-defender-advanced-threat-protection.md) | Onboard Windows Server 2012 R2 and Windows Server 2016 to Microsoft Defender ATP -[Onboard non-Windows machines](configure-endpoints-non-windows-windows-defender-advanced-threat-protection.md) | Microsoft Defender ATP provides a centralized security operations experience for Windows as well as non-Windows platforms. You'll be able to see alerts from various supported operating systems (OS) in Windows Defender Security Center and better protect your organization's network. This experience leverages on a third-party security products' sensor data. +[Onboard non-Windows machines](configure-endpoints-non-windows-windows-defender-advanced-threat-protection.md) | Microsoft Defender ATP provides a centralized security operations experience for Windows as well as non-Windows platforms. You'll be able to see alerts from various supported operating systems (OS) in Microsoft Defender Security Center and better protect your organization's network. This experience leverages on a third-party security products' sensor data. [Run a detection test on a newly onboarded machine](run-detection-test-windows-defender-advanced-threat-protection.md) | Run a script on a newly onboarded machine to verify that it is properly reporting to the Microsoft Defender ATP service. [Configure proxy and Internet settings](configure-proxy-internet-windows-defender-advanced-threat-protection.md)| Enable communication with the Microsoft Defender ATP cloud service by configuring the proxy and Internet connectivity settings. [Troubleshoot onboarding issues](troubleshoot-onboarding-windows-defender-advanced-threat-protection.md) | Learn about resolving issues that might arise during onboarding. diff --git a/windows/security/threat-protection/microsoft-defender-atp/onboard.md b/windows/security/threat-protection/microsoft-defender-atp/onboard.md index 9bb3eaa985..582233db3c 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/onboard.md +++ b/windows/security/threat-protection/microsoft-defender-atp/onboard.md @@ -34,7 +34,7 @@ Topic | Description [Configure Secure score dashboard security controls](secure-score-dashboard-windows-defender-advanced-threat-protection.md) | Configure the security controls in Secure score to increase the security posture of your organization. Configure Microsoft Threat Protection integration| Configure other solutions that integrate with Microsoft Defender ATP. Management and API support| Pull alerts to your SIEM or use APIs to create custom alerts. Create and build Power BI reports. -[Configure Windows Defender Security Center settings](preferences-setup-windows-defender-advanced-threat-protection.md) | Configure portal related settings such as general settings, advanced features, enable the preview experience and others. +[Configure Microsoft Defender Security Center settings](preferences-setup-windows-defender-advanced-threat-protection.md) | Configure portal related settings such as general settings, advanced features, enable the preview experience and others. diff --git a/windows/security/threat-protection/microsoft-defender-atp/overview-custom-detections.md b/windows/security/threat-protection/microsoft-defender-atp/overview-custom-detections.md index 8101a199e5..37f04e38cb 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/overview-custom-detections.md +++ b/windows/security/threat-protection/microsoft-defender-atp/overview-custom-detections.md @@ -27,7 +27,7 @@ ms.date: 10/29/2018 Alerts in Microsoft Defender ATP are surfaced through the system based on signals gathered from endpoints. With custom detections, you can create custom queries to monitor events for any kind of behavior such as suspicious or emerging threats. This can be done by leveraging the power of Advanced hunting through the creation of custom detection rules. -Custom detections are queries that run periodically every 24 hours and can be configured so that when the query meets the criteria you set, alerts are created and are surfaced in Windows Defender Security Center. These alerts will be treated like any other alert in the system. +Custom detections are queries that run periodically every 24 hours and can be configured so that when the query meets the criteria you set, alerts are created and are surfaced in Microsoft Defender Security Center. These alerts will be treated like any other alert in the system. This capability is particularly useful for scenarios when you want to pro-actively prevent threats and be notified quickly of emerging threats. diff --git a/windows/security/threat-protection/microsoft-defender-atp/overview-hunting.md b/windows/security/threat-protection/microsoft-defender-atp/overview-hunting.md index 6742a95514..b6d5d31b21 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/overview-hunting.md +++ b/windows/security/threat-protection/microsoft-defender-atp/overview-hunting.md @@ -22,7 +22,7 @@ ms.date: 09/12/2018 **Applies to:** - [Microsoft Defender Advanced Threat Protection (Microsoft Defender ATP)](https://go.microsoft.com/fwlink/p/?linkid=2069559) -Advanced hunting allows you to hunt for possible threats across your organization using a powerful search and query tool. You can also create custom detection rules based on the queries you created and surface alerts in Windows Defender Security Center. +Advanced hunting allows you to hunt for possible threats across your organization using a powerful search and query tool. You can also create custom detection rules based on the queries you created and surface alerts in Microsoft Defender Security Center. With advanced hunting, you can take advantage of the following capabilities: diff --git a/windows/security/threat-protection/microsoft-defender-atp/overview-secure-score.md b/windows/security/threat-protection/microsoft-defender-atp/overview-secure-score.md index 3d27aa1319..f1b31e4f2a 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/overview-secure-score.md +++ b/windows/security/threat-protection/microsoft-defender-atp/overview-secure-score.md @@ -1,5 +1,5 @@ --- -title: Overview of Secure score in Windows Defender Security Center +title: Overview of Secure score in Microsoft Defender Security Center description: Expand your visibility into the overall security posture of your organization keywords: secure score, security controls, improvement opportunities, security score over time, score, posture, baseline search.product: eADQiWindows 10XVcnh @@ -18,7 +18,7 @@ ms.topic: conceptual ms.date: 09/03/2018 --- -# Overview of Secure score in Windows Defender Security Center +# Overview of Secure score in Microsoft Defender Security Center **Applies to:** - [Microsoft Defender Advanced Threat Protection (Microsoft Defender ATP)](https://go.microsoft.com/fwlink/p/?linkid=2069559) diff --git a/windows/security/threat-protection/microsoft-defender-atp/overview.md b/windows/security/threat-protection/microsoft-defender-atp/overview.md index 84d99f3816..0bfb1b24c9 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/overview.md +++ b/windows/security/threat-protection/microsoft-defender-atp/overview.md @@ -41,7 +41,7 @@ Topic | Description [Advanced hunting](overview-hunting-windows-defender-advanced-threat-protection.md) | Use a powerful search and query language to create custom queries and detection rules. [Management and APIs](management-apis.md) | Microsoft Defender ATP supports a wide variety of tools to help you manage and interact with the platform so that you can integrate the service into your existing workflows. [Microsoft Threat Protection](threat-protection-integration.md) | Microsoft security products work better together. Learn about other security capabilities in the Microsoft threat protection stack. -[Portal overview](portal-overview-windows-defender-advanced-threat-protection.md) |Learn to navigate your way around Windows Defender Security Center. +[Portal overview](portal-overview-windows-defender-advanced-threat-protection.md) |Learn to navigate your way around Microsoft Defender Security Center. diff --git a/windows/security/threat-protection/microsoft-defender-atp/portal-overview.md b/windows/security/threat-protection/microsoft-defender-atp/portal-overview.md index 7a4701750d..2a989a87e4 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/portal-overview.md +++ b/windows/security/threat-protection/microsoft-defender-atp/portal-overview.md @@ -1,7 +1,7 @@ --- title: Microsoft Defender Advanced Threat Protection portal overview -description: Use Windows Defender Security Center to monitor your enterprise network and assist in responding to alerts to potential advanced persistent threat (APT) activity or data breaches. -keywords: Windows Defender Security Center, portal, cybersecurity threat intelligence, dashboard, alerts queue, machines list, settings, machine management, advanced attacks +description: Use Microsoft Defender Security Center to monitor your enterprise network and assist in responding to alerts to potential advanced persistent threat (APT) activity or data breaches. +keywords: Microsoft Defender Security Center, portal, cybersecurity threat intelligence, dashboard, alerts queue, machines list, settings, machine management, advanced attacks search.product: eADQiWindows 10XVcnh search.appverid: met150 ms.prod: w10 @@ -27,14 +27,14 @@ ms.date: 04/24/2018 >Want to experience Microsoft Defender ATP? [Sign up for a free trial.](https://www.microsoft.com/en-us/WindowsForBusiness/windows-atp?ocid=docs-wdatp-portaloverview-abovefoldlink) -Enterprise security teams can use Windows Defender Security Center to monitor and assist in responding to alerts of potential advanced persistent threat (APT) activity or data breaches. +Enterprise security teams can use Microsoft Defender Security Center to monitor and assist in responding to alerts of potential advanced persistent threat (APT) activity or data breaches. -You can use [Windows Defender Security Center](https://securitycenter.windows.com/) to: +You can use [Microsoft Defender Security Center](https://securitycenter.windows.com/) to: - View, sort, and triage alerts from your endpoints - Search for more information on observed indicators such as files and IP Addresses - Change Microsoft Defender ATP settings, including time zone and review licensing information. -## Windows Defender Security Center +## Microsoft Defender Security Center When you open the portal, you’ll see the main areas of the application: ![Microsoft Defender Advanced Threat Protection portal](images/dashboard.png) diff --git a/windows/security/threat-protection/microsoft-defender-atp/powerbi-reports.md b/windows/security/threat-protection/microsoft-defender-atp/powerbi-reports.md index 0d4640bbf3..46ffbdcef5 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/powerbi-reports.md +++ b/windows/security/threat-protection/microsoft-defender-atp/powerbi-reports.md @@ -41,7 +41,7 @@ You can easily get started by: - Creating a dashboard on the Power BI service - Building a custom dashboard on Power BI Desktop and tweaking it to fit the visual analytics and reporting requirements of your organization -You can access these options from Windows Defender Security Center. Both the Power BI service and Power BI Desktop are supported. +You can access these options from Microsoft Defender Security Center. Both the Power BI service and Power BI Desktop are supported. ## Create a Microsoft Defender ATP dashboard on Power BI service Microsoft Defender ATP makes it easy to create a Power BI dashboard by providing an option straight from the portal. @@ -133,7 +133,7 @@ You can create a custom dashboard in Power BI Desktop to create visualizations t ### Before you begin 1. Make sure you use Power BI Desktop June 2017 and above. [Download the latest version](https://powerbi.microsoft.com/en-us/desktop/). -2. In the Windows Defender Security Center navigation pane, select **Settings** > **Power BI reports**. +2. In the Microsoft Defender Security Center navigation pane, select **Settings** > **Power BI reports**. ![Image of settings Power BI reports](images/atp-settings-powerbi.png) diff --git a/windows/security/threat-protection/microsoft-defender-atp/preferences-setup.md b/windows/security/threat-protection/microsoft-defender-atp/preferences-setup.md index d9035a183b..72c0e3c1e6 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/preferences-setup.md +++ b/windows/security/threat-protection/microsoft-defender-atp/preferences-setup.md @@ -1,5 +1,5 @@ --- -title: Configure Windows Defender Security Center settings +title: Configure Microsoft Defender Security Center settings description: Use the settings page to configure general settings, permissions, apis, and rules. keywords: settings, general settings, permissions, apis, rules search.product: eADQiWindows 10XVcnh @@ -17,7 +17,7 @@ ms.collection: M365-security-compliance ms.topic: article ms.date: 04/24/2018 --- -# Configure Windows Defender Security Center settings +# Configure Microsoft Defender Security Center settings **Applies to:** - [Microsoft Defender Advanced Threat Protection (Microsoft Defender ATP)](https://go.microsoft.com/fwlink/p/?linkid=2069559) diff --git a/windows/security/threat-protection/microsoft-defender-atp/pull-alerts-using-rest-api.md b/windows/security/threat-protection/microsoft-defender-atp/pull-alerts-using-rest-api.md index a91e2ea546..41c78cc6f9 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/pull-alerts-using-rest-api.md +++ b/windows/security/threat-protection/microsoft-defender-atp/pull-alerts-using-rest-api.md @@ -45,7 +45,7 @@ The _Client credential flow_ uses client credentials to authenticate against the Use the following method in the Microsoft Defender ATP API to pull alerts in JSON format. >[!NOTE] ->Windows Defender Security Center merges similar alert detections into a single alert. This API pulls alert detections in its raw form based on the query parameters you set, enabling you to apply your own grouping and filtering. +>Microsoft Defender Security Center merges similar alert detections into a single alert. This API pulls alert detections in its raw form based on the query parameters you set, enabling you to apply your own grouping and filtering. ## Before you begin - Before calling the Microsoft Defender ATP endpoint to pull alerts, you'll need to enable the SIEM integration application in Azure Active Directory (AAD). For more information, see [Enable SIEM integration in Microsoft Defender ATP](enable-siem-integration-windows-defender-advanced-threat-protection.md). @@ -111,7 +111,7 @@ string ago | string | Pulls alerts in the following time range: from `(current_t int?limit | int | Defines the number of alerts to be retrieved. Most recent alerts will be retrieved based on the number defined.

**NOTE**: When not specified, all alerts available in the time range will be retrieved. machinegroups | String | Specifies machine groups to pull alerts from.

**NOTE**: When not specified, alerts from all machine groups will be retrieved.

Example:

```https://wdatp-alertexporter-eu.securitycenter.windows.com/api/Alerts/?machinegroups=UKMachines&machinegroups=FranceMachines``` DeviceCreatedMachineTags | string | Single machine tag from the registry. -CloudCreatedMachineTags | string | Machine tags that were created in Windows Defender Security Center. +CloudCreatedMachineTags | string | Machine tags that were created in Microsoft Defender Security Center. ### Request example The following example demonstrates how to retrieve all the alerts in your organization. diff --git a/windows/security/threat-protection/microsoft-defender-atp/rbac.md b/windows/security/threat-protection/microsoft-defender-atp/rbac.md index b5a8ca5ce4..1fa86fd35c 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/rbac.md +++ b/windows/security/threat-protection/microsoft-defender-atp/rbac.md @@ -1,5 +1,5 @@ --- -title: Use role-based access control to grant fine-grained access to Windows Defender Security Center +title: Use role-based access control to grant fine-grained access to Microsoft Defender Security Center description: Create roles and groups within your security operations to grant access to the portal. keywords: rbac, role, based, access, control, groups, control, tier, aad search.product: eADQiWindows 10XVcnh @@ -55,12 +55,12 @@ Before using RBAC, it's important that you understand the roles that can grant p > [!WARNING] > Before enabling the feature, it's important that you have a Global Administrator role or Security Administrator role in Azure AD and that you have your Azure AD groups ready to reduce the risk of being locked out of the portal. -When you first log in to Windows Defender Security Center, you're granted either full access or read only access. Full access rights are granted to users with Security Administrator or Global Administrator roles in Azure AD. Read only access is granted to users with a Security Reader role in Azure AD. +When you first log in to Microsoft Defender Security Center, you're granted either full access or read only access. Full access rights are granted to users with Security Administrator or Global Administrator roles in Azure AD. Read only access is granted to users with a Security Reader role in Azure AD. Someone with a Microsoft Defender ATP Global administrator role has unrestricted access to all machines, regardless of their machine group association and the Azure AD user groups assignments > [!WARNING] -> Initially, only those with Azure AD Global Administrator or Security Administrator rights will be able to create and assign roles in Windows Defender Security Center, therefore, having the right groups ready in Azure AD is important. +> Initially, only those with Azure AD Global Administrator or Security Administrator rights will be able to create and assign roles in Microsoft Defender Security Center, therefore, having the right groups ready in Azure AD is important. > > **Turning on role-based access control will cause users with read-only permissions (for example, users assigned to Azure AD Security reader role) to lose access until they are assigned to a role.** > diff --git a/windows/security/threat-protection/microsoft-defender-atp/security-operations-dashboard.md b/windows/security/threat-protection/microsoft-defender-atp/security-operations-dashboard.md index eea36cb084..97e6cbec7e 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/security-operations-dashboard.md +++ b/windows/security/threat-protection/microsoft-defender-atp/security-operations-dashboard.md @@ -1,5 +1,5 @@ --- -title: Windows Defender Security Center Security operations dashboard +title: Microsoft Defender Security Center Security operations dashboard description: Use the dashboard to identify machines at risk, keep track of the status of the service, and see statistics and information about machines and alerts. keywords: dashboard, alerts, new, in progress, resolved, risk, machines at risk, infections, reporting, statistics, charts, graphs, health, active malware detections, threat category, categories, password stealer, ransomware, exploit, threat, low severity, active malware search.product: eADQiWindows 10XVcnh @@ -18,7 +18,7 @@ ms.topic: conceptual ms.date: 09/04/2018 --- -# Windows Defender Security Center Security operations dashboard +# Microsoft Defender Security Center Security operations dashboard **Applies to:** - [Microsoft Defender Advanced Threat Protection (Microsoft Defender ATP)](https://go.microsoft.com/fwlink/p/?linkid=2069559) diff --git a/windows/security/threat-protection/microsoft-defender-atp/time-settings.md b/windows/security/threat-protection/microsoft-defender-atp/time-settings.md index a2617401bd..5dcfc7b1e4 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/time-settings.md +++ b/windows/security/threat-protection/microsoft-defender-atp/time-settings.md @@ -1,5 +1,5 @@ --- -title: Windows Defender Security Center time zone settings +title: Microsoft Defender Security Center time zone settings description: Use the menu to configure the time zone and view license information. keywords: settings, Windows Defender, cybersecurity threat intelligence, advanced threat protection, time zone, utc, local time, license search.product: eADQiWindows 10XVcnh @@ -18,7 +18,7 @@ ms.topic: article ms.date: 02/13/2018 --- -# Windows Defender Security Center time zone settings +# Microsoft Defender Security Center time zone settings **Applies to:** - [Microsoft Defender Advanced Threat Protection (Microsoft Defender ATP)](https://go.microsoft.com/fwlink/p/?linkid=2069559) diff --git a/windows/security/threat-protection/microsoft-defender-atp/troubleshoot-onboarding-error-messages.md b/windows/security/threat-protection/microsoft-defender-atp/troubleshoot-onboarding-error-messages.md index 01557d7ec5..64c4946662 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/troubleshoot-onboarding-error-messages.md +++ b/windows/security/threat-protection/microsoft-defender-atp/troubleshoot-onboarding-error-messages.md @@ -31,11 +31,11 @@ ms.date: 08/01/2018 This page provides detailed steps to troubleshoot issues that might occur when setting up your Microsoft Defender ATP service. -If you receive an error message, Windows Defender Security Center will provide a detailed explanation on what the issue is and relevant links will be supplied. +If you receive an error message, Microsoft Defender Security Center will provide a detailed explanation on what the issue is and relevant links will be supplied. ## No subscriptions found -If while accessing Windows Defender Security Center you get a **No subscriptions found** message, it means the Azure Active Directory (AAD) used to login the user to the portal, does not have a Microsoft Defender ATP license. +If while accessing Microsoft Defender Security Center you get a **No subscriptions found** message, it means the Azure Active Directory (AAD) used to login the user to the portal, does not have a Microsoft Defender ATP license. Potential reasons: - The Windows E5 and Office E5 licenses are separate licenses. @@ -50,7 +50,7 @@ For both cases you should contact Microsoft support at [General Microsoft Defend ## Your subscription has expired -If while accessing Windows Defender Security Center you get a **Your subscription has expired** message, your online service subscription has expired. Microsoft Defender ATP subscription, like any other online service subscription, has an expiration date. +If while accessing Microsoft Defender Security Center you get a **Your subscription has expired** message, your online service subscription has expired. Microsoft Defender ATP subscription, like any other online service subscription, has an expiration date. You can choose to renew or extend the license at any point in time. When accessing the portal after the expiration date a **Your subscription has expired** message will be presented with an option to download the machine offboarding package, should you choose to not renew the license. diff --git a/windows/security/threat-protection/microsoft-defender-atp/troubleshoot.md b/windows/security/threat-protection/microsoft-defender-atp/troubleshoot.md index 655895b298..b5201a5814 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/troubleshoot.md +++ b/windows/security/threat-protection/microsoft-defender-atp/troubleshoot.md @@ -27,7 +27,7 @@ If you encounter a server error when trying to access the service, you’ll need Configure your browser to allow cookies. ## Elements or data missing on the portal -If some UI elements or data is missing on Windows Defender Security Center it’s possible that proxy settings are blocking it. +If some UI elements or data is missing on Microsoft Defender Security Center it’s possible that proxy settings are blocking it. Make sure that `*.securitycenter.windows.com` is included the proxy whitelist. diff --git a/windows/security/threat-protection/microsoft-defender-atp/use-custom-ti.md b/windows/security/threat-protection/microsoft-defender-atp/use-custom-ti.md index f8109a93b6..580beea62a 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/use-custom-ti.md +++ b/windows/security/threat-protection/microsoft-defender-atp/use-custom-ti.md @@ -36,7 +36,7 @@ You can use the code examples to guide you in creating calls to the custom threa Topic | Description :---|:--- [Understand threat intelligence concepts](threat-indicator-concepts-windows-defender-advanced-threat-protection.md) | Understand the concepts around threat intelligence so that you can effectively create custom intelligence for your organization. -[Enable the custom threat intelligence application](enable-custom-ti-windows-defender-advanced-threat-protection.md) | Set up the custom threat intelligence application through Windows Defender Security Center so that you can create custom threat intelligence (TI) using REST API. +[Enable the custom threat intelligence application](enable-custom-ti-windows-defender-advanced-threat-protection.md) | Set up the custom threat intelligence application through Microsoft Defender Security Center so that you can create custom threat intelligence (TI) using REST API. [Create custom threat intelligence alerts](custom-ti-api-windows-defender-advanced-threat-protection.md) | Create custom threat intelligence alerts so that you can generate specific alerts that are applicable to your organization. [PowerShell code examples](powershell-example-code-windows-defender-advanced-threat-protection.md) | Use the PowerShell code examples to guide you in using the custom threat intelligence API. [Python code examples](python-example-code-windows-defender-advanced-threat-protection.md) | Use the Python code examples to guide you in using the custom threat intelligence API. diff --git a/windows/security/threat-protection/microsoft-defender-atp/use.md b/windows/security/threat-protection/microsoft-defender-atp/use.md index 94b1666439..2f1fff7f2e 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/use.md +++ b/windows/security/threat-protection/microsoft-defender-atp/use.md @@ -1,6 +1,6 @@ --- -title: Overview of Windows Defender Security Center -description: Learn about the features on Windows Defender Security Center, including how alerts work, and suggestions on how to investigate possible breaches and attacks. +title: Overview of Microsoft Defender Security Center +description: Learn about the features on Microsoft Defender Security Center, including how alerts work, and suggestions on how to investigate possible breaches and attacks. keywords: dashboard, alerts queue, manage alerts, investigation, investigate alerts, investigate machines, submit files, deep analysis, high, medium, low, severity, ioc, ioa search.product: eADQiWindows 10XVcnh search.appverid: met150 @@ -18,7 +18,7 @@ ms.topic: conceptual ms.date: 03/12/2018 --- -# Overview of Windows Defender Security Center +# Overview of Microsoft Defender Security Center **Applies to:** @@ -26,7 +26,7 @@ ms.date: 03/12/2018 >Want to experience Microsoft Defender ATP? [Sign up for a free trial.](https://www.microsoft.com/en-us/WindowsForBusiness/windows-atp?ocid=docs-wdatp-usewdatp-abovefoldlink) -Windows Defender Security Center is the portal where you can access Microsoft Defender Advanced Threat Protection capabilities. +Microsoft Defender Security Center is the portal where you can access Microsoft Defender Advanced Threat Protection capabilities. Use the **Security operations** dashboard to gain insight on the various alerts on machines and users in your network. diff --git a/windows/security/threat-protection/microsoft-defender-atp/user-roles.md b/windows/security/threat-protection/microsoft-defender-atp/user-roles.md index 152c31812c..2c305c28e0 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/user-roles.md +++ b/windows/security/threat-protection/microsoft-defender-atp/user-roles.md @@ -26,7 +26,7 @@ ms.topic: article >Want to experience Microsoft Defender ATP? [Sign up for a free trial.](https://www.microsoft.com/en-us/WindowsForBusiness/windows-atp?ocid=docs-wdatp-roles-abovefoldlink) ## Create roles and assign the role to an Azure Active Directory group -The following steps guide you on how to create roles in Windows Defender Security Center. It assumes that you have already created Azure Active Directory user groups. +The following steps guide you on how to create roles in Microsoft Defender Security Center. It assumes that you have already created Azure Active Directory user groups. 1. In the navigation pane, select **Settings > Roles**. diff --git a/windows/security/threat-protection/microsoft-defender-atp/whats-new-in-microsoft-defender-atp.md b/windows/security/threat-protection/microsoft-defender-atp/whats-new-in-microsoft-defender-atp.md index af06ab295c..93ec317ca9 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/whats-new-in-microsoft-defender-atp.md +++ b/windows/security/threat-protection/microsoft-defender-atp/whats-new-in-microsoft-defender-atp.md @@ -55,7 +55,7 @@ The following capabilities are generally available (GA). - [Integration with Azure Security Center](https://docs.microsoft.com/windows/security/threat-protection/windows-defender-atp/configure-server-endpoints-windows-defender-advanced-threat-protection#integration-with-azure-security-center)
Microsoft Defender ATP integrates with Azure Security Center to provide a comprehensive server protection solution. With this integration Azure Security Center can leverage the power of Microsoft Defender ATP to provide improved threat detection for Windows Servers. -- [Managed security service provider (MSSP) support](https://docs.microsoft.com/windows/security/threat-protection/windows-defender-atp/mssp-support-windows-defender-advanced-threat-protection)
Microsoft Defender ATP adds support for this scenario by providing MSSP integration. The integration will allow MSSPs to take the following actions: Get access to MSSP customer's Windows Defender Security Center portal, fetch email notifications, and fetch alerts through security information and event management (SIEM) tools. +- [Managed security service provider (MSSP) support](https://docs.microsoft.com/windows/security/threat-protection/windows-defender-atp/mssp-support-windows-defender-advanced-threat-protection)
Microsoft Defender ATP adds support for this scenario by providing MSSP integration. The integration will allow MSSPs to take the following actions: Get access to MSSP customer's Microsoft Defender Security Center portal, fetch email notifications, and fetch alerts through security information and event management (SIEM) tools. - [Removable device control](https://cloudblogs.microsoft.com/microsoftsecure/2018/12/19/windows-defender-atp-has-protections-for-usb-and-removable-devices/)
Microsoft Defender ATP provides multiple monitoring and control features to help prevent threats from removable devices, including new settings to allow or block specific hardware IDs. @@ -123,7 +123,7 @@ Query data using Advanced hunting in Microsoft Defender ATP. You can now block untrusted processes from writing to disk sectors using Controlled Folder Access. - [Onboard non-Windows machines](https://docs.microsoft.com/windows/security/threat-protection/windows-defender-atp/configure-endpoints-non-windows-windows-defender-advanced-threat-protection)
- Microsoft Defender ATP provides a centralized security operations experience for Windows as well as non-Windows platforms. You'll be able to see alerts from various supported operating systems (OS) in Windows Defender Security Center and better protect your organization's network. + Microsoft Defender ATP provides a centralized security operations experience for Windows as well as non-Windows platforms. You'll be able to see alerts from various supported operating systems (OS) in Microsoft Defender Security Center and better protect your organization's network. - [Role-based access control (RBAC)](https://docs.microsoft.com/windows/security/threat-protection/windows-defender-atp/rbac-windows-defender-advanced-threat-protection)
Using role-based access control (RBAC), you can create roles and groups within your security operations team to grant appropriate access to the portal. diff --git a/windows/security/threat-protection/microsoft-defender-atp/windows-defender-security-center-atp.md b/windows/security/threat-protection/microsoft-defender-atp/windows-defender-security-center-atp.md index 468fcd0924..af2106bf2b 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/windows-defender-security-center-atp.md +++ b/windows/security/threat-protection/microsoft-defender-atp/windows-defender-security-center-atp.md @@ -1,6 +1,6 @@ --- -title: Windows Defender Security Center -description: Windows Defender Security Center is the portal where you can access Microsoft Defender Advanced Threat Protection. +title: Microsoft Defender Security Center +description: Microsoft Defender Security Center is the portal where you can access Microsoft Defender Advanced Threat Protection. keywords: windows, defender, security, center, defender, advanced, threat, protection search.product: eADQiWindows 10XVcnh search.appverid: met150 @@ -18,9 +18,9 @@ ms.topic: conceptual ms.date: 07/01/2018 --- -# Windows Defender Security Center +# Microsoft Defender Security Center -Windows Defender Security Center is the portal where you can access Microsoft Defender Advanced Threat Protection capabilities. It gives enterprise security operations teams a single pane of glass experience to help secure networks. +Microsoft Defender Security Center is the portal where you can access Microsoft Defender Advanced Threat Protection capabilities. It gives enterprise security operations teams a single pane of glass experience to help secure networks. ## In this section @@ -30,10 +30,10 @@ Get started | Learn about the minimum requirements, validate licensing and com [Onboard machines](onboard-configure-windows-defender-advanced-threat-protection.md) | Learn about onboarding client, server, and non-Windows machines. Learn how to run a detection test, configure proxy and Internet connectivity settings, and how to troubleshoot potential onboarding issues. [Understand the portal](use-windows-defender-advanced-threat-protection.md) | Understand the Security operations, Secure Score, and Threat analytics dashboards as well as how to navigate the portal. Investigate and remediate threats | Investigate alerts, machines, and take response actions to remediate threats. -API and SIEM support | Use the supported APIs to pull and create custom alerts, or automate workflows. Use the supported SIEM tools to pull alerts from Windows Defender Security Center. +API and SIEM support | Use the supported APIs to pull and create custom alerts, or automate workflows. Use the supported SIEM tools to pull alerts from Microsoft Defender Security Center. Reporting | Create and build Power BI reports using Microsoft Defender ATP data. Check service health and sensor state | Verify that the service is running and check the sensor state on machines. -[Configure Windows Defender Security Center settings](preferences-setup-windows-defender-advanced-threat-protection.md) | Configure general settings, turn on the preview experience, notifications, and enable other features. +[Configure Microsoft Defender Security Center settings](preferences-setup-windows-defender-advanced-threat-protection.md) | Configure general settings, turn on the preview experience, notifications, and enable other features. [Access the Microsoft Defender ATP Community Center](community-windows-defender-advanced-threat-protection.md) | Access the Microsoft Defender ATP Community Center to learn, collaborate, and share experiences about the product. [Troubleshoot service issues](troubleshoot-windows-defender-advanced-threat-protection.md) | This section addresses issues that might arise as you use the Windows Defender Advanced Threat service. From e52b3e7a87d8aac6cdf30d2503eb15b104106e10 Mon Sep 17 00:00:00 2001 From: Joey Caparas Date: Wed, 10 Apr 2019 15:04:55 -0700 Subject: [PATCH 142/724] remove -wdatp from within file links --- .../add-or-remove-machine-tags.md | 4 +- .../advanced-features.md | 12 +++--- .../advanced-hunting-reference.md | 4 +- .../advanced-hunting.md | 4 +- ...lerts-queue-endpoint-detection-response.md | 16 +++---- .../microsoft-defender-atp/alerts-queue.md | 16 +++---- .../api-portal-mapping.md | 12 +++--- .../assign-portal-access.md | 6 +-- .../attack-simulations.md | 6 +-- .../automated-investigations.md | 4 +- .../basic-permissions.md | 4 +- .../check-sensor-status.md | 4 +- .../collect-investigation-package.md | 4 +- .../microsoft-defender-atp/conditional.md | 4 +- .../configure-arcsight.md | 12 +++--- .../configure-email-notifications.md | 12 +++--- .../configure-endpoints-gp.md | 14 +++---- .../configure-endpoints-mdm.md | 14 +++---- .../configure-endpoints-non-windows.md | 8 ++-- .../configure-endpoints-sccm.md | 16 +++---- .../configure-endpoints-script.md | 20 ++++----- .../configure-endpoints-vdi.md | 10 ++--- .../configure-endpoints.md | 10 ++--- .../configure-mssp-support.md | 18 ++++---- .../configure-proxy-internet.md | 4 +- .../configure-server-endpoints.md | 16 +++---- .../microsoft-defender-atp/configure-siem.md | 22 +++++----- .../configure-splunk.md | 12 +++--- .../create-alert-by-reference.md | 4 +- .../microsoft-defender-atp/custom-ti-api.md | 20 ++++----- .../data-retention-settings.md | 10 ++--- .../enable-custom-ti.md | 14 +++---- .../enable-secure-score.md | 10 ++--- .../enable-siem-integration.md | 12 +++--- .../event-error-codes.md | 42 +++++++++---------- .../experiment-custom-ti.md | 16 +++---- .../exposed-apis-create-app-nativeapp.md | 2 +- .../find-machines-by-ip.md | 4 +- .../fix-unhealhty-sensors.md | 14 +++---- .../get-alert-info-by-id.md | 4 +- .../get-alert-related-domain-info.md | 4 +- .../get-alert-related-files-info.md | 4 +- .../get-alert-related-ip-info.md | 4 +- .../get-alert-related-machine-info.md | 4 +- .../get-alert-related-user-info.md | 4 +- .../microsoft-defender-atp/get-alerts.md | 4 +- .../get-domain-related-alerts.md | 4 +- .../get-domain-related-machines.md | 4 +- .../get-domain-statistics.md | 2 +- .../get-file-information.md | 2 +- .../get-file-related-alerts.md | 4 +- .../get-file-related-machines.md | 4 +- .../get-file-statistics.md | 2 +- .../get-ip-related-alerts.md | 4 +- .../get-ip-related-machines.md | 4 +- .../get-ip-statistics.md | 2 +- .../get-machine-by-id.md | 4 +- .../get-machine-log-on-users.md | 4 +- .../get-machine-related-alerts.md | 4 +- .../get-machineaction-object.md | 2 +- .../get-machineactions-collection.md | 2 +- .../microsoft-defender-atp/get-machines.md | 4 +- .../get-package-sas-uri.md | 4 +- .../microsoft-defender-atp/get-started.md | 12 +++--- .../get-user-related-alerts.md | 4 +- .../get-user-related-machines.md | 4 +- .../microsoft-defender-atp/incidents-queue.md | 4 +- ...ormation-protection-in-windows-overview.md | 2 +- .../initiate-autoir-investigation.md | 8 ++-- .../investigate-alerts.md | 18 ++++---- .../investigate-domain.md | 14 +++---- .../investigate-files.md | 18 ++++---- .../investigate-incidents.md | 6 +-- .../microsoft-defender-atp/investigate-ip.md | 14 +++---- .../investigate-machines.md | 30 ++++++------- .../investigate-user.md | 18 ++++---- .../is-domain-seen-in-org.md | 2 +- .../microsoft-defender-atp/is-ip-seen-org.md | 2 +- .../microsoft-defender-atp/isolate-machine.md | 6 +-- .../microsoft-defender-atp/licensing.md | 6 +-- .../microsoft-defender-atp/machine-groups.md | 10 ++--- .../microsoft-defender-atp/machine-reports.md | 2 +- .../microsoft-defender-atp/machine-tags.md | 4 +- .../machineactionsnote.md | 2 +- .../machines-view-overview.md | 6 +-- .../microsoft-defender-atp/manage-alerts.md | 18 ++++---- .../manage-allowed-blocked-list.md | 2 +- .../manage-auto-investigation.md | 2 +- .../manage-automation-allowed-blocked-list.md | 6 +-- .../manage-automation-file-uploads.md | 4 +- .../manage-automation-folder-exclusions.md | 4 +- .../microsoft-defender-atp/manage-edr.md | 6 +-- .../manage-incidents.md | 2 +- .../manage-suppression-rules.md | 4 +- .../microsoft-defender-atp/management-apis.md | 10 ++--- ...oft-defender-advanced-threat-protection.md | 4 +- .../minimum-requirements.md | 4 +- .../microsoft-defender-atp/mssp-support.md | 2 +- .../offboard-machine-api.md | 2 +- .../offboard-machines.md | 12 +++--- .../onboard-configure.md | 22 +++++----- .../onboard-downlevel.md | 4 +- .../microsoft-defender-atp/onboard.md | 4 +- .../overview-endpoint-detection-response.md | 8 ++-- .../overview-hunting.md | 2 +- .../overview-secure-score.md | 6 +-- .../microsoft-defender-atp/overview.md | 8 ++-- .../microsoft-defender-atp/portal-overview.md | 8 ++-- .../powershell-example-code.md | 12 +++--- .../preview-settings.md | 12 +++--- .../pull-alerts-using-rest-api.md | 12 +++--- .../python-example-code.md | 12 +++--- .../microsoft-defender-atp/rbac.md | 4 +- .../respond-file-alerts.md | 4 +- .../respond-machine-alerts.md | 2 +- .../response-actions.md | 4 +- .../restrict-code-execution.md | 6 +-- .../run-advanced-query-api.md | 4 +- .../microsoft-defender-atp/run-av-scan.md | 4 +- .../run-detection-test.md | 4 +- .../secure-score-dashboard.md | 12 +++--- .../security-operations-dashboard.md | 22 +++++----- .../microsoft-defender-atp/service-status.md | 2 +- .../stop-and-quarantine-file.md | 4 +- .../threat-analytics.md | 2 +- .../threat-indicator-concepts.md | 14 +++---- .../threat-protection-integration.md | 2 +- .../threat-protection-reports.md | 2 +- .../troubleshoot-custom-ti.md | 12 +++--- .../troubleshoot-onboarding-error-messages.md | 2 +- .../troubleshoot-onboarding.md | 32 +++++++------- .../troubleshoot-siem.md | 10 ++--- .../microsoft-defender-atp/troubleshoot.md | 8 ++-- .../unisolate-machine.md | 4 +- .../unrestrict-code-execution.md | 4 +- .../microsoft-defender-atp/update-alert.md | 4 +- .../microsoft-defender-atp/use-custom-ti.md | 14 +++---- .../microsoft-defender-atp/use.md | 8 ++-- .../microsoft-defender-atp/user-roles.md | 4 +- .../view-incidents-queue.md | 4 +- .../whats-new-in-microsoft-defender-atp.md | 2 +- .../windows-defender-security-center-atp.md | 10 ++--- 142 files changed, 557 insertions(+), 557 deletions(-) diff --git a/windows/security/threat-protection/microsoft-defender-atp/add-or-remove-machine-tags.md b/windows/security/threat-protection/microsoft-defender-atp/add-or-remove-machine-tags.md index 106306a8c5..045be04e37 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/add-or-remove-machine-tags.md +++ b/windows/security/threat-protection/microsoft-defender-atp/add-or-remove-machine-tags.md @@ -36,8 +36,8 @@ Delegated (work or school account) | Machine.ReadWrite | 'Read and write machine >[!Note] > When obtaining a token using user credentials: ->- The user needs to have at least the following role permission: 'Manage security setting' (See [Create and manage roles](user-roles-windows-defender-advanced-threat-protection.md) for more information) ->- User needs to have access to the machine, based on machine group settings (See [Create and manage machine groups](machine-groups-windows-defender-advanced-threat-protection.md) for more information) +>- The user needs to have at least the following role permission: 'Manage security setting' (See [Create and manage roles](user-roles.md) for more information) +>- User needs to have access to the machine, based on machine group settings (See [Create and manage machine groups](machine-groups.md) for more information) ## HTTP request ``` diff --git a/windows/security/threat-protection/microsoft-defender-atp/advanced-features.md b/windows/security/threat-protection/microsoft-defender-atp/advanced-features.md index dee0d64ec2..a16aebe6e6 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/advanced-features.md +++ b/windows/security/threat-protection/microsoft-defender-atp/advanced-features.md @@ -29,7 +29,7 @@ Depending on the Microsoft security products that you use, some advanced feature Use the following advanced features to get better protected from potentially malicious files and gain better insight during security investigations: ## Automated investigation -When you enable this feature, you'll be able to take advantage of the automated investigation and remediation features of the service. For more information, see [Automated investigations](automated-investigations-windows-defender-advanced-threat-protection.md). +When you enable this feature, you'll be able to take advantage of the automated investigation and remediation features of the service. For more information, see [Automated investigations](automated-investigations.md). ## Auto-resolve remediated alerts For tenants created on or after Windows 10, version 1809 the automated investigations capability is configured by default to resolve alerts where the automated analysis result status is "No threats found" or "Remediated". If you don’t want to have alerts auto-resolved, you’ll need to manually turn off the feature. @@ -53,7 +53,7 @@ When you enable this feature, you'll be able to see user details stored in Azure - Alert queue - Machine details page -For more information, see [Investigate a user account](investigate-user-windows-defender-advanced-threat-protection.md). +For more information, see [Investigate a user account](investigate-user.md). ## Skype for Business integration Enabling the Skype for Business integration gives you the ability to communicate with users using Skype for Business, email, or phone. This can be handy when you need to communicate with the user and mitigate risks. @@ -128,7 +128,7 @@ You'll have access to upcoming features which you can provide feedback on to hel 3. Click **Save preferences**. ## Related topics -- [Update data retention settings](data-retention-settings-windows-defender-advanced-threat-protection.md) -- [Configure alert notifications](configure-email-notifications-windows-defender-advanced-threat-protection.md) -- [Enable and create Power BI reports using Microsoft Defender ATP data](powerbi-reports-windows-defender-advanced-threat-protection.md) -- [Enable Secure Score security controls](enable-secure-score-windows-defender-advanced-threat-protection.md) +- [Update data retention settings](data-retention-settings.md) +- [Configure alert notifications](configure-email-notifications.md) +- [Enable and create Power BI reports using Microsoft Defender ATP data](powerbi-reports.md) +- [Enable Secure Score security controls](enable-secure-score.md) diff --git a/windows/security/threat-protection/microsoft-defender-atp/advanced-hunting-reference.md b/windows/security/threat-protection/microsoft-defender-atp/advanced-hunting-reference.md index fe8f545929..e05cf85951 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/advanced-hunting-reference.md +++ b/windows/security/threat-protection/microsoft-defender-atp/advanced-hunting-reference.md @@ -118,5 +118,5 @@ To effectively build queries that span multiple tables, you need to understand t >Want to experience Microsoft Defender ATP? [Sign up for a free trial.](https://www.microsoft.com/en-us/WindowsForBusiness/windows-atp?ocid=docs-wdatp-advancedhuntingref-belowfoldlink) ## Related topic -- [Query data using Advanced hunting](advanced-hunting-windows-defender-advanced-threat-protection.md) -- [Advanced hunting query language best practices](advanced-hunting-best-practices-windows-defender-advanced-threat-protection.md) \ No newline at end of file +- [Query data using Advanced hunting](advanced-hunting.md) +- [Advanced hunting query language best practices](advanced-hunting-best-practices.md) \ No newline at end of file diff --git a/windows/security/threat-protection/microsoft-defender-atp/advanced-hunting.md b/windows/security/threat-protection/microsoft-defender-atp/advanced-hunting.md index 000918bc98..44e20add28 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/advanced-hunting.md +++ b/windows/security/threat-protection/microsoft-defender-atp/advanced-hunting.md @@ -149,8 +149,8 @@ Check out the [Advanced hunting repository](https://github.com/Microsoft/Windows >Want to experience Microsoft Defender ATP? [Sign up for a free trial.](https://www.microsoft.com/en-us/WindowsForBusiness/windows-atp?ocid=docs-wdatp-advancedhunting-belowfoldlink) ## Related topic -- [Advanced hunting reference](advanced-hunting-reference-windows-defender-advanced-threat-protection.md) -- [Advanced hunting query language best practices](advanced-hunting-best-practices-windows-defender-advanced-threat-protection.md) +- [Advanced hunting reference](advanced-hunting-reference.md) +- [Advanced hunting query language best practices](advanced-hunting-best-practices.md) diff --git a/windows/security/threat-protection/microsoft-defender-atp/alerts-queue-endpoint-detection-response.md b/windows/security/threat-protection/microsoft-defender-atp/alerts-queue-endpoint-detection-response.md index 525a4afacb..1e817593bb 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/alerts-queue-endpoint-detection-response.md +++ b/windows/security/threat-protection/microsoft-defender-atp/alerts-queue-endpoint-detection-response.md @@ -25,13 +25,13 @@ Learn how you can view and manage the queue so that you can effectively investig ## In this section Topic | Description :---|:--- -[View and organize the Alerts queue](alerts-queue-windows-defender-advanced-threat-protection.md) | Shows a list of alerts that were flagged in your network. -[Manage alerts](manage-alerts-windows-defender-advanced-threat-protection.md) | Learn about how you can manage alerts such as change its status, assign it to a security operations member, and see the history of an alert. -[Investigate alerts](investigate-alerts-windows-defender-advanced-threat-protection.md)| Investigate alerts that are affecting your network, understand what they mean, and how to resolve them. -[Investigate files](investigate-files-windows-defender-advanced-threat-protection.md)| Investigate the details of a file associated with a specific alert, behaviour, or event. -[Investigate machines](investigate-machines-windows-defender-advanced-threat-protection.md)| Investigate the details of a machine associated with a specific alert, behaviour, or event. -[Investigate an IP address](investigate-ip-windows-defender-advanced-threat-protection.md) | Examine possible communication between machines in your network and external internet protocol (IP) addresses. -[Investigate a domain](investigate-domain-windows-defender-advanced-threat-protection.md) | Investigate a domain to see if machines and servers in your network have been communicating with a known malicious domain. -[Investigate a user account](investigate-user-windows-defender-advanced-threat-protection.md) | Identify user accounts with the most active alerts and investigate cases of potential compromised credentials. +[View and organize the Alerts queue](alerts-queue.md) | Shows a list of alerts that were flagged in your network. +[Manage alerts](manage-alerts.md) | Learn about how you can manage alerts such as change its status, assign it to a security operations member, and see the history of an alert. +[Investigate alerts](investigate-alerts.md)| Investigate alerts that are affecting your network, understand what they mean, and how to resolve them. +[Investigate files](investigate-files.md)| Investigate the details of a file associated with a specific alert, behaviour, or event. +[Investigate machines](investigate-machines.md)| Investigate the details of a machine associated with a specific alert, behaviour, or event. +[Investigate an IP address](investigate-ip.md) | Examine possible communication between machines in your network and external internet protocol (IP) addresses. +[Investigate a domain](investigate-domain.md) | Investigate a domain to see if machines and servers in your network have been communicating with a known malicious domain. +[Investigate a user account](investigate-user.md) | Identify user accounts with the most active alerts and investigate cases of potential compromised credentials. diff --git a/windows/security/threat-protection/microsoft-defender-atp/alerts-queue.md b/windows/security/threat-protection/microsoft-defender-atp/alerts-queue.md index 86249293b6..fbe92937d8 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/alerts-queue.md +++ b/windows/security/threat-protection/microsoft-defender-atp/alerts-queue.md @@ -90,15 +90,15 @@ Limit the alerts queue view by selecting the OS platform that you're interested If you have specific machine groups that you're interested in checking the alerts on, you can select the groups to limit the alerts queue view to display just those machine groups. ### Associated threat -Use this filter to focus on alerts that are related to high profile threats. You can see the full list of high-profile threats in [Threat analytics](threat-analytics-dashboard-windows-defender-advanced-threat-protection.md). +Use this filter to focus on alerts that are related to high profile threats. You can see the full list of high-profile threats in [Threat analytics](threat-analytics-dashboard.md). ## Related topics -- [Manage Microsoft Defender Advanced Threat Protection alerts](manage-alerts-windows-defender-advanced-threat-protection.md) -- [Investigate Microsoft Defender Advanced Threat Protection alerts](investigate-alerts-windows-defender-advanced-threat-protection.md) -- [Investigate a file associated with a Microsoft Defender ATP alert](investigate-files-windows-defender-advanced-threat-protection.md) -- [Investigate machines in the Microsoft Defender ATP Machines list](investigate-machines-windows-defender-advanced-threat-protection.md) -- [Investigate an IP address associated with a Microsoft Defender ATP alert](investigate-ip-windows-defender-advanced-threat-protection.md) -- [Investigate a domain associated with a Microsoft Defender ATP alert](investigate-domain-windows-defender-advanced-threat-protection.md) -- [Investigate a user account in Microsoft Defender ATP](investigate-user-windows-defender-advanced-threat-protection.md) +- [Manage Microsoft Defender Advanced Threat Protection alerts](manage-alerts.md) +- [Investigate Microsoft Defender Advanced Threat Protection alerts](investigate-alerts.md) +- [Investigate a file associated with a Microsoft Defender ATP alert](investigate-files.md) +- [Investigate machines in the Microsoft Defender ATP Machines list](investigate-machines.md) +- [Investigate an IP address associated with a Microsoft Defender ATP alert](investigate-ip.md) +- [Investigate a domain associated with a Microsoft Defender ATP alert](investigate-domain.md) +- [Investigate a user account in Microsoft Defender ATP](investigate-user.md) diff --git a/windows/security/threat-protection/microsoft-defender-atp/api-portal-mapping.md b/windows/security/threat-protection/microsoft-defender-atp/api-portal-mapping.md index c85f9de2b6..054edf688a 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/api-portal-mapping.md +++ b/windows/security/threat-protection/microsoft-defender-atp/api-portal-mapping.md @@ -37,7 +37,7 @@ Understand what data fields are exposed as part of the alerts API and how they m The following table lists the available fields exposed in the alerts API payload. It shows examples for the populated values and a reference on how data is reflected on the portal. -The ArcSight field column contains the default mapping between the Microsoft Defender ATP fields and the built-in fields in ArcSight. You can download the mapping file from the portal when you enable the SIEM integration feature and you can modify it to match the needs of your organization. For more information, see [Enable SIEM integration in Microsoft Defender ATP](enable-siem-integration-windows-defender-advanced-threat-protection.md). +The ArcSight field column contains the default mapping between the Microsoft Defender ATP fields and the built-in fields in ArcSight. You can download the mapping file from the portal when you enable the SIEM integration feature and you can modify it to match the needs of your organization. For more information, see [Enable SIEM integration in Microsoft Defender ATP](enable-siem-integration.md). Field numbers match the numbers in the images below. @@ -92,8 +92,8 @@ Field numbers match the numbers in the images below. ## Related topics -- [Enable SIEM integration in Microsoft Defender ATP](enable-siem-integration-windows-defender-advanced-threat-protection.md) -- [Configure Splunk to pull Microsoft Defender ATP alerts](configure-splunk-windows-defender-advanced-threat-protection.md) -- [Configure ArcSight to pull Microsoft Defender ATP alerts](configure-arcsight-windows-defender-advanced-threat-protection.md) -- [Pull Microsoft Defender ATP alerts using REST API](pull-alerts-using-rest-api-windows-defender-advanced-threat-protection.md) -- [Troubleshoot SIEM tool integration issues](troubleshoot-siem-windows-defender-advanced-threat-protection.md) +- [Enable SIEM integration in Microsoft Defender ATP](enable-siem-integration.md) +- [Configure Splunk to pull Microsoft Defender ATP alerts](configure-splunk.md) +- [Configure ArcSight to pull Microsoft Defender ATP alerts](configure-arcsight.md) +- [Pull Microsoft Defender ATP alerts using REST API](pull-alerts-using-rest-api.md) +- [Troubleshoot SIEM tool integration issues](troubleshoot-siem.md) diff --git a/windows/security/threat-protection/microsoft-defender-atp/assign-portal-access.md b/windows/security/threat-protection/microsoft-defender-atp/assign-portal-access.md index b1cb1f4d55..484e346117 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/assign-portal-access.md +++ b/windows/security/threat-protection/microsoft-defender-atp/assign-portal-access.md @@ -30,7 +30,7 @@ ms.date: 11/28/2018 Microsoft Defender ATP supports two ways to manage permissions: - **Basic permissions management**: Set permissions to either full access or read-only. -- **Role-based access control (RBAC)**: Set granular permissions by defining roles, assigning Azure AD user groups to the roles, and granting the user groups access to machine groups. For more information on RBAC, see [Manage portal access using role-based access control](rbac-windows-defender-advanced-threat-protection.md). +- **Role-based access control (RBAC)**: Set granular permissions by defining roles, assigning Azure AD user groups to the roles, and granting the user groups access to machine groups. For more information on RBAC, see [Manage portal access using role-based access control](rbac.md). > [!NOTE] >If you have already assigned basic permissions, you may switch to RBAC anytime. Consider the following before making the switch: @@ -44,5 +44,5 @@ Microsoft Defender ATP supports two ways to manage permissions: >Want to experience Microsoft Defender ATP? [Sign up for a free trial.](https://www.microsoft.com/en-us/WindowsForBusiness/windows-atp?ocid=docs-wdatp-portalaccess-belowfoldlink) ## Related topic -- [Use basic permissions to access the portal](basic-permissions-windows-defender-advanced-threat-protection.md) -- [Manage portal access using RBAC](rbac-windows-defender-advanced-threat-protection.md) +- [Use basic permissions to access the portal](basic-permissions.md) +- [Manage portal access using RBAC](rbac.md) diff --git a/windows/security/threat-protection/microsoft-defender-atp/attack-simulations.md b/windows/security/threat-protection/microsoft-defender-atp/attack-simulations.md index 9b4ee1c082..f88df725ea 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/attack-simulations.md +++ b/windows/security/threat-protection/microsoft-defender-atp/attack-simulations.md @@ -38,7 +38,7 @@ You might want to experience Microsoft Defender ATP before you onboard more than ## Before you begin -To run any of the provided simulations, you need at least [one onboarded machine](onboard-configure-windows-defender-advanced-threat-protection.md). +To run any of the provided simulations, you need at least [one onboarded machine](onboard-configure.md). Read the walkthrough document provided with each attack scenario. Each document includes OS and application requirements as well as detailed instructions that are specific to an attack scenario. @@ -66,5 +66,5 @@ Read the walkthrough document provided with each attack scenario. Each document ## Related topics -- [Onboard machines](onboard-configure-windows-defender-advanced-threat-protection.md) -- [Onboard Windows 10 machines](configure-endpoints-windows-defender-advanced-threat-protection.md) \ No newline at end of file +- [Onboard machines](onboard-configure.md) +- [Onboard Windows 10 machines](configure-endpoints.md) \ No newline at end of file diff --git a/windows/security/threat-protection/microsoft-defender-atp/automated-investigations.md b/windows/security/threat-protection/microsoft-defender-atp/automated-investigations.md index 78375524ed..a413656b87 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/automated-investigations.md +++ b/windows/security/threat-protection/microsoft-defender-atp/automated-investigations.md @@ -73,14 +73,14 @@ Semi - require approval for non-temp folders remediation | An approval is requir Semi - require approval for core folders remediation | An approval is required on files or executables that are in the operating system directories such as Windows folder and Program files folder.

Files or executables in all other folders will automatically be remediated if needed. Full - remediate threats automatically | All remediation actions will be performed automatically. -For more information on how to configure these automation levels, see [Create and manage machine groups](machine-groups-windows-defender-advanced-threat-protection.md). +For more information on how to configure these automation levels, see [Create and manage machine groups](machine-groups.md). The default machine group is configured for semi-automatic remediation. This means that any malicious entity that needs to be remediated requires an approval and the investigation is added to the **Pending actions** section, this can be changed to fully automatic so that no user approval is needed. When a pending action is approved, the entity is then remediated and this new state is reflected in the **Entities** tab of the investigation. ## Related topic -- [Learn about the automated investigations dashboard](manage-auto-investigation-windows-defender-advanced-threat-protection.md) +- [Learn about the automated investigations dashboard](manage-auto-investigation.md) diff --git a/windows/security/threat-protection/microsoft-defender-atp/basic-permissions.md b/windows/security/threat-protection/microsoft-defender-atp/basic-permissions.md index c7f6f4517c..294a775bb9 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/basic-permissions.md +++ b/windows/security/threat-protection/microsoft-defender-atp/basic-permissions.md @@ -31,7 +31,7 @@ You can use either of the following: - Azure PowerShell - Azure Portal -For granular control over permissions, [switch to role-based access control](rbac-windows-defender-advanced-threat-protection.md). +For granular control over permissions, [switch to role-based access control](rbac.md). ## Assign user access using Azure PowerShell You can assign users with one of the following levels of permissions: @@ -73,4 +73,4 @@ For more information, see [Assign administrator and non-administrator roles to u ## Related topic -- [Manage portal access using RBAC](rbac-windows-defender-advanced-threat-protection.md) +- [Manage portal access using RBAC](rbac.md) diff --git a/windows/security/threat-protection/microsoft-defender-atp/check-sensor-status.md b/windows/security/threat-protection/microsoft-defender-atp/check-sensor-status.md index 453a7575ed..4e675729c2 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/check-sensor-status.md +++ b/windows/security/threat-protection/microsoft-defender-atp/check-sensor-status.md @@ -37,7 +37,7 @@ There are two status indicators on the tile that provide information on the numb Clicking any of the groups directs you to Machines list, filtered according to your choice. -You can also download the entire list in CSV format using the **Export to CSV** feature. For more information on filters, see [View and organize the Machines list](machines-view-overview-windows-defender-advanced-threat-protection.md). +You can also download the entire list in CSV format using the **Export to CSV** feature. For more information on filters, see [View and organize the Machines list](machines-view-overview.md). You can filter the health state list by the following status: - **Active** - Machines that are actively reporting to the Microsoft Defender ATP service. @@ -57,4 +57,4 @@ In the **Machines list**, you can download a full list of all the machines in yo >Export the list in CSV format to display the unfiltered data. The CSV file will include all machines in the organization, regardless of any filtering applied in the view itself and can take a significant amount of time to download, depending on how large your organization is. ## Related topic -- [Fix unhealthy sensors in Microsoft Defender ATP](fix-unhealhty-sensors-windows-defender-advanced-threat-protection.md) +- [Fix unhealthy sensors in Microsoft Defender ATP](fix-unhealhty-sensors.md) diff --git a/windows/security/threat-protection/microsoft-defender-atp/collect-investigation-package.md b/windows/security/threat-protection/microsoft-defender-atp/collect-investigation-package.md index 133ce6e86c..c828e5a9b8 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/collect-investigation-package.md +++ b/windows/security/threat-protection/microsoft-defender-atp/collect-investigation-package.md @@ -37,8 +37,8 @@ Delegated (work or school account) | Machine.CollectForensics | 'Collect forensi >[!Note] > When obtaining a token using user credentials: ->- The user needs to have at least the following role permission: 'Alerts Investigation' (See [Create and manage roles](user-roles-windows-defender-advanced-threat-protection.md) for more information) ->- The user needs to have access to the machine, based on machine group settings (See [Create and manage machine groups](machine-groups-windows-defender-advanced-threat-protection.md) for more information) +>- The user needs to have at least the following role permission: 'Alerts Investigation' (See [Create and manage roles](user-roles.md) for more information) +>- The user needs to have access to the machine, based on machine group settings (See [Create and manage machine groups](machine-groups.md) for more information) ## HTTP request ``` diff --git a/windows/security/threat-protection/microsoft-defender-atp/conditional.md b/windows/security/threat-protection/microsoft-defender-atp/conditional.md index eba91e7d07..f4a0532ef7 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/conditional.md +++ b/windows/security/threat-protection/microsoft-defender-atp/conditional.md @@ -56,7 +56,7 @@ There are three ways to address a risk: 2. Resolve active alerts on the machine. This will remove the risk from the machine. 3. You can remove the machine from the active policies and consequently, conditional access will not be applied on the machine. -Manual remediation requires a secops admin to investigate an alert and address the risk seen on the device. The automated remediation is configured through configuration settings provided in the following section, [Configure conditional access](configure-conditional-access-windows-defender-advanced-threat-protection.md). +Manual remediation requires a secops admin to investigate an alert and address the risk seen on the device. The automated remediation is configured through configuration settings provided in the following section, [Configure conditional access](configure-conditional-access.md). When the risk is removed either through manual or automated remediation, the device returns to a compliant state and access to applications is granted. @@ -70,7 +70,7 @@ The following example sequence of events explains conditional access in action: ## Related topic -- [Configure conditional access in Microsoft Defender ATP](configure-conditional-access-windows-defender-advanced-threat-protection.md) +- [Configure conditional access in Microsoft Defender ATP](configure-conditional-access.md) diff --git a/windows/security/threat-protection/microsoft-defender-atp/configure-arcsight.md b/windows/security/threat-protection/microsoft-defender-atp/configure-arcsight.md index 05c9269bca..862e906979 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/configure-arcsight.md +++ b/windows/security/threat-protection/microsoft-defender-atp/configure-arcsight.md @@ -36,7 +36,7 @@ Configuring the HP ArcSight Connector tool requires several configuration files This section guides you in getting the necessary information to set and use the required configuration files correctly. -- Make sure you have enabled the SIEM integration feature from the **Settings** menu. For more information, see [Enable SIEM integration in Microsoft Defender ATP](enable-siem-integration-windows-defender-advanced-threat-protection.md). +- Make sure you have enabled the SIEM integration feature from the **Settings** menu. For more information, see [Enable SIEM integration in Microsoft Defender ATP](enable-siem-integration.md). - Have the file you saved from enabling the SIEM integration feature ready. You'll need to get the following values: - OAuth 2.0 Token refresh URL @@ -107,7 +107,7 @@ The following steps assume that you have completed all the required steps in [Be
Browse to the location of the *wdatp-connector.properties* file. The name must match the file provided in the .zip that you downloaded.
Refresh TokenYou can obtain a refresh token in two ways: by generating a refresh token from the **SIEM settings** page or using the restutil tool.

For more information on generating a refresh token from the **Preferences setup** , see [Enable SIEM integration in Microsoft Defender ATP](enable-siem-integration-windows-defender-advanced-threat-protection.md).

**Get your refresh token using the restutil tool:**
a. Open a command prompt. Navigate to C:\\*folder_location*\current\bin where *folder_location* represents the location where you installed the tool.

b. Type: `arcsight restutil token -config` from the bin directory.For example: **arcsight restutil boxtoken -proxy proxy.location.hp.com:8080** A Web browser window will open.

c. Type in your credentials then click on the password field to let the page redirect. In the login prompt, enter your credentials.

d. A refresh token is shown in the command prompt.

e. Copy and paste it into the **Refresh Token** field. +
You can obtain a refresh token in two ways: by generating a refresh token from the **SIEM settings** page or using the restutil tool.

For more information on generating a refresh token from the **Preferences setup** , see [Enable SIEM integration in Microsoft Defender ATP](enable-siem-integration.md).

**Get your refresh token using the restutil tool:**
a. Open a command prompt. Navigate to C:\\*folder_location*\current\bin where *folder_location* represents the location where you installed the tool.

b. Type: `arcsight restutil token -config` from the bin directory.For example: **arcsight restutil boxtoken -proxy proxy.location.hp.com:8080** A Web browser window will open.

c. Type in your credentials then click on the password field to let the page redirect. In the login prompt, enter your credentials.

d. A refresh token is shown in the command prompt.

e. Copy and paste it into the **Refresh Token** field.
Microsoft Defender Advanced Threat Protection service failed to connect to the server at ```variable```. Variable = URL of the Microsoft Defender ATP processing servers.
The service could not contact the external processing servers at that URL.
Check the connection to the URL. See [Configure proxy and Internet connectivity](configure-proxy-internet-windows-defender-advanced-threat-protection.md).Check the connection to the URL. See [Configure proxy and Internet connectivity](configure-proxy-internet.md).
6 The machine did not onboard correctly and will not be reporting to the portal. Onboarding must be run before starting the service.
Check that the onboarding settings and scripts were deployed properly. Try to redeploy the configuration packages.
-See [Onboard Windows 10 machines](configure-endpoints-windows-defender-advanced-threat-protection.md).
7 Microsoft Defender Advanced Threat Protection service failed to read the onboarding parameters. Failure: ```variable```. Variable = detailed error description. The machine did not onboard correctly and will not be reporting to the portal. Check that the onboarding settings and scripts were deployed properly. Try to redeploy the configuration packages.
-See [Onboard Windows 10 machines](configure-endpoints-windows-defender-advanced-threat-protection.md).
8**During onboarding:** The service failed to clean its configuration during the onboarding. The onboarding process continues.

**During offboarding:** The service failed to clean its configuration during the offboarding. The offboarding process finished but the service keeps running.
**Onboarding:** No action required.

**Offboarding:** Reboot the system.
-See [Onboard Windows 10 machines](configure-endpoints-windows-defender-advanced-threat-protection.md).
9 Microsoft Defender Advanced Threat Protection service failed to change its start type. Failure code: ```variable```. **During onboarding:** The machine did not onboard correctly and will not be reporting to the portal.

**During offboarding:** Failed to change the service start type. The offboarding process continues.
Check that the onboarding settings and scripts were deployed properly. Try to redeploy the configuration packages.
-See [Onboard Windows 10 machines](configure-endpoints-windows-defender-advanced-threat-protection.md).
10 Microsoft Defender Advanced Threat Protection service failed to persist the onboarding information. Failure code: ```variable```. The machine did not onboard correctly and will not be reporting to the portal. Check that the onboarding settings and scripts were deployed properly. Try to redeploy the configuration packages.
-See [Onboard Windows 10 machines](configure-endpoints-windows-defender-advanced-threat-protection.md).
11 Microsoft Defender Advanced Threat Protection cannot start command channel with URL: ```variable```. Variable = URL of the Microsoft Defender ATP processing servers.
The service could not contact the external processing servers at that URL.
Check the connection to the URL. See [Configure proxy and Internet connectivity](configure-proxy-internet-windows-defender-advanced-threat-protection.md).Check the connection to the URL. See [Configure proxy and Internet connectivity](configure-proxy-internet.md).
17 Microsoft Defender Advanced Threat Protection service failed to change the Connected User Experiences and Telemetry service location. Failure code: ```variable```. An error occurred with the Windows telemetry service.[Ensure the diagnostic data service is enabled](troubleshoot-onboarding-windows-defender-advanced-threat-protection.md#ensure-the-diagnostics-service-is-enabled).
+
[Ensure the diagnostic data service is enabled](troubleshoot-onboarding.md#ensure-the-diagnostics-service-is-enabled).
Check that the onboarding settings and scripts were deployed properly. Try to redeploy the configuration packages.
-See [Onboard Windows 10 machines](configure-endpoints-windows-defender-advanced-threat-protection.md).
18The machine did not onboard correctly. It will report to the portal, however the service may not appear as registered in SCCM or the registry. Check that the onboarding settings and scripts were deployed properly. Try to redeploy the configuration packages.
-See [Onboard Windows 10 machines](configure-endpoints-windows-defender-advanced-threat-protection.md).
26The machine did not onboard correctly.
It will report to the portal, however the service may not appear as registered in SCCM or the registry.
Check that the onboarding settings and scripts were deployed properly. Try to redeploy the configuration packages.
-See [Onboard Windows 10 machines](configure-endpoints-windows-defender-advanced-threat-protection.md).
27 Microsoft Defender Advanced Threat Protection service failed to enable SENSE aware mode in Windows Defender Antivirus. Onboarding process failed. Failure code: ```variable```. Normally, Windows Defender Antivirus will enter a special passive state if another real-time antimalware product is running properly on the machine, and the machine is reporting to Microsoft Defender ATP. Check that the onboarding settings and scripts were deployed properly. Try to redeploy the configuration packages.
-See [Onboard Windows 10 machines](configure-endpoints-windows-defender-advanced-threat-protection.md).
+See [Onboard Windows 10 machines](configure-endpoints.md).
Ensure real-time antimalware protection is running properly.
28 Microsoft Defender Advanced Threat Protection Connected User Experiences and Telemetry service registration failed. Failure code: ```variable```. An error occurred with the Windows telemetry service.[Ensure the diagnostic data service is enabled](troubleshoot-onboarding-windows-defender-advanced-threat-protection.md#ensure-the-diagnostic-data-service-is-enabled).
+
[Ensure the diagnostic data service is enabled](troubleshoot-onboarding.md#ensure-the-diagnostic-data-service-is-enabled).
Check that the onboarding settings and scripts were deployed properly. Try to redeploy the configuration packages.
-See [Onboard Windows 10 machines](configure-endpoints-windows-defender-advanced-threat-protection.md).
29Microsoft Defender Advanced Threat Protection service failed to disable SENSE aware mode in Windows Defender Antivirus. Failure code: ```variable```. Normally, Windows Defender Antivirus will enter a special passive state if another real-time antimalware product is running properly on the machine, and the machine is reporting to Microsoft Defender ATP. Check that the onboarding settings and scripts were deployed properly. Try to redeploy the configuration packages.
-See [Onboard Windows 10 machines](configure-endpoints-windows-defender-advanced-threat-protection.md)
+See [Onboard Windows 10 machines](configure-endpoints.md)
Ensure real-time antimalware protection is running properly.
31 Microsoft Defender Advanced Threat Protection Connected User Experiences and Telemetry service unregistration failed. Failure code: ```variable```. An error occurred with the Windows telemetry service during onboarding. The offboarding process continues.[Check for errors with the Windows telemetry service](troubleshoot-onboarding-windows-defender-advanced-threat-protection.md#ensure-the-diagnostic-data-service-is-enabled).[Check for errors with the Windows telemetry service](troubleshoot-onboarding.md#ensure-the-diagnostic-data-service-is-enabled).
3234 Microsoft Defender Advanced Threat Protection service failed to add itself as a dependency on the Connected User Experiences and Telemetry service, causing onboarding process to fail. Failure code: ```variable```. An error occurred with the Windows telemetry service.[Ensure the diagnostic data service is enabled](troubleshoot-onboarding-windows-defender-advanced-threat-protection.md#ensure-the-diagnostic-data-service-is-enabled).
+
[Ensure the diagnostic data service is enabled](troubleshoot-onboarding.md#ensure-the-diagnostic-data-service-is-enabled).
Check that the onboarding settings and scripts were deployed properly. Try to redeploy the configuration packages.
-See [Onboard Windows 10 machines](configure-endpoints-windows-defender-advanced-threat-protection.md).
35
@@ -37,10 +37,10 @@ ms.localizationpriority: medium -**[Attack surface reduction](windows-defender-atp/overview-attack-surface-reduction.md)**
+**[Attack surface reduction](microsoft-defender-atp/overview-attack-surface-reduction.md)**
The attack surface reduction set of capabilities provide the first line of defense in the stack. By ensuring configuration settings are properly set and exploit mitigation techniques are applied, these set of capabilities resist attacks and exploitations. -- [Hardware based isolation](windows-defender-atp/overview-hardware-based-isolation.md) +- [Hardware based isolation](microsoft-defender-atp/overview-hardware-based-isolation.md) - [Application control](windows-defender-application-control/windows-defender-application-control.md) - [Device control](device-guard/introduction-to-device-guard-virtualization-based-security-and-windows-defender-application-control.md) - [Exploit protection](windows-defender-exploit-guard/exploit-protection-exploit-guard.md) @@ -52,7 +52,7 @@ The attack surface reduction set of capabilities provide the first line of defen **[Next generation protection](windows-defender-antivirus/windows-defender-antivirus-in-windows-10.md)**
-To further reinforce the security perimeter of your network, Windows Defender ATP uses next generation protection designed to catch all types of emerging threats. +To further reinforce the security perimeter of your network, Microsoft Defender ATP uses next generation protection designed to catch all types of emerging threats. - [Behavior monitoring](/windows/security/threat-protection/windows-defender-antivirus/configure-real-time-protection-windows-defender-antivirus) - [Cloud-based protection](/windows/security/threat-protection/windows-defender-antivirus/enable-cloud-protection-windows-defender-antivirus) @@ -62,67 +62,67 @@ To further reinforce the security perimeter of your network, Windows Defender AT -**[Endpoint detection and response](windows-defender-atp/overview-endpoint-detection-response.md)**
+**[Endpoint detection and response](microsoft-defender-atp/overview-endpoint-detection-response.md)**
Endpoint detection and response capabilities are put in place to detect, investigate, and respond to advanced threats that may have made it past the first two security pillars. -- [Alerts](windows-defender-atp/alerts-queue-windows-defender-advanced-threat-protection.md) -- [Historical endpoint data](windows-defender-atp/investigate-machines-windows-defender-advanced-threat-protection.md#machine-timeline) -- [Response orchestration](windows-defender-atp/response-actions-windows-defender-advanced-threat-protection.md) -- [Forensic collection](windows-defender-atp/respond-machine-alerts-windows-defender-advanced-threat-protection.md#collect-investigation-package-from-machines) -- [Threat intelligence](windows-defender-atp/threat-indicator-concepts-windows-defender-advanced-threat-protection.md) -- [Advanced detonation and analysis service](windows-defender-atp/respond-file-alerts-windows-defender-advanced-threat-protection.md#deep-analysis) -- [Advanced hunting](windows-defender-atp/overview-hunting-windows-defender-advanced-threat-protection.md) - - [Custom detection](windows-defender-atp/overview-custom-detections.md) - - [Realtime and historical hunting](windows-defender-atp/advanced-hunting-windows-defender-advanced-threat-protection.md) +- [Alerts](microsoft-defender-atp/alerts-queue.md) +- [Historical endpoint data](microsoft-defender-atp/investigate-machines.md#machine-timeline) +- [Response orchestration](microsoft-defender-atp/response-actions.md) +- [Forensic collection](microsoft-defender-atp/respond-machine-alerts.md#collect-investigation-package-from-machines) +- [Threat intelligence](microsoft-defender-atp/threat-indicator-concepts.md) +- [Advanced detonation and analysis service](microsoft-defender-atp/respond-file-alerts.md#deep-analysis) +- [Advanced hunting](microsoft-defender-atp/overview-hunting.md) + - [Custom detection](microsoft-defender-atp/overview-custom-detections.md) + - [Realtime and historical hunting](microsoft-defender-atp/advanced-hunting.md) -**[Automated investigation and remediation](windows-defender-atp/automated-investigations-windows-defender-advanced-threat-protection.md)**
-In conjunction with being able to quickly respond to advanced attacks, Windows Defender ATP offers automatic investigation and remediation capabilities that help reduce the volume of alerts in minutes at scale. +**[Automated investigation and remediation](microsoft-defender-atp/automated-investigations.md)**
+In conjunction with being able to quickly respond to advanced attacks, Microsoft Defender ATP offers automatic investigation and remediation capabilities that help reduce the volume of alerts in minutes at scale. -- [Automated investigation and remediation](windows-defender-atp/automated-investigations-windows-defender-advanced-threat-protection.md) -- [Threat remediation](windows-defender-atp/automated-investigations-windows-defender-advanced-threat-protection.md#how-threats-are-remediated) -- [Manage automated investigations](windows-defender-atp/manage-auto-investigation-windows-defender-advanced-threat-protection.md) -- [Analyze automated investigation](windows-defender-atp/manage-auto-investigation-windows-defender-advanced-threat-protection.md#analyze-automated-investigations) +- [Automated investigation and remediation](microsoft-defender-atp/automated-investigations.md) +- [Threat remediation](microsoft-defender-atp/automated-investigations.md#how-threats-are-remediated) +- [Manage automated investigations](microsoft-defender-atp/manage-auto-investigation.md) +- [Analyze automated investigation](microsoft-defender-atp/manage-auto-investigation.md#analyze-automated-investigations) -**[Secure score](windows-defender-atp/overview-secure-score-windows-defender-advanced-threat-protection.md)**
-Windows Defender ATP includes a secure score to help you dynamically assess the security state of your enterprise network, identify unprotected systems, and take recommended actions to improve the overall security of your organization. -- [Asset inventory](windows-defender-atp/secure-score-dashboard-windows-defender-advanced-threat-protection.md) -- [Recommended improvement actions](windows-defender-atp/secure-score-dashboard-windows-defender-advanced-threat-protection.md) -- [Secure score](windows-defender-atp/overview-secure-score-windows-defender-advanced-threat-protection.md) -- [Threat analytics](windows-defender-atp/threat-analytics-dashboard-windows-defender-advanced-threat-protection.md) +**[Secure score](microsoft-defender-atp/overview-secure-score.md)**
+Microsoft Defender ATP includes a secure score to help you dynamically assess the security state of your enterprise network, identify unprotected systems, and take recommended actions to improve the overall security of your organization. +- [Asset inventory](microsoft-defender-atp/secure-score-dashboard.md) +- [Recommended improvement actions](microsoft-defender-atp/secure-score-dashboard.md) +- [Secure score](microsoft-defender-atp/overview-secure-score.md) +- [Threat analytics](microsoft-defender-atp/threat-analytics.md) -**[Microsoft Threat Experts](windows-defender-atp/microsoft-threat-experts.md)**
-Windows Defender ATP's new managed threat hunting service provides proactive hunting, prioritization and additional context and insights that further empower Security Operation Centers (SOCs) to identify and respond to threats quickly and accurately. +**[Microsoft Threat Experts](microsoft-defender-atp/microsoft-threat-experts.md)**
+Microsoft Defender ATP's new managed threat hunting service provides proactive hunting, prioritization and additional context and insights that further empower Security Operation Centers (SOCs) to identify and respond to threats quickly and accurately. -- [Targeted attack notification](windows-defender-atp/microsoft-threat-experts.md) -- [Experts-on-demand](windows-defender-atp/microsoft-threat-experts.md) -- [Configure your Microsoft Threat Protection managed hunting service](windows-defender-atp/configure-microsoft-threat-experts.md) +- [Targeted attack notification](microsoft-defender-atp/microsoft-threat-experts.md) +- [Experts-on-demand](microsoft-defender-atp/microsoft-threat-experts.md) +- [Configure your Microsoft Threat Protection managed hunting service](microsoft-defender-atp/configure-microsoft-threat-experts.md) -**[Management and APIs](windows-defender-atp/management-apis.md)**
-Integrate Windows Defender Advanced Threat Protection into your existing workflows. -- [Onboarding](windows-defender-atp/onboard-configure-windows-defender-advanced-threat-protection.md) -- [API and SIEM integration](windows-defender-atp/configure-siem-windows-defender-advanced-threat-protection.md) -- [Exposed APIs](windows-defender-atp/use-apis.md) -- [Role-based access control (RBAC)](windows-defender-atp/rbac-windows-defender-advanced-threat-protection.md) -- [Reporting and trends](windows-defender-atp/powerbi-reports-windows-defender-advanced-threat-protection.md) +**[Management and APIs](microsoft-defender-atp/management-apis.md)**
+Integrate Microsoft Defender Advanced Threat Protection into your existing workflows. +- [Onboarding](microsoft-defender-atp/onboard-configure.md) +- [API and SIEM integration](microsoft-defender-atp/configure-siem.md) +- [Exposed APIs](microsoft-defender-atp/use-apis.md) +- [Role-based access control (RBAC)](microsoft-defender-atp/rbac.md) +- [Reporting and trends](microsoft-defender-atp/powerbi-reports.md) -**[Microsoft Threat Protection](windows-defender-atp/threat-protection-integration.md)**
- Windows Defender ATP is part of the Microsoft Threat Protection solution that helps implement end-to-end security across possible attack surfaces in the modern workplace. Bring the power of Microsoft threat protection to your organization. -- [Conditional access](windows-defender-atp/conditional-access-windows-defender-advanced-threat-protection.md) -- [O365 ATP](windows-defender-atp/threat-protection-integration.md) -- [Azure ATP](windows-defender-atp/threat-protection-integration.md) -- [Azure Security Center](windows-defender-atp/threat-protection-integration.md) -- [Skype for Business](windows-defender-atp/threat-protection-integration.md) -- [Microsoft Cloud App Security](windows-defender-atp/microsoft-cloud-app-security-integration.md) +**[Microsoft Threat Protection](microsoft-defender-atp/threat-protection-integration.md)**
+ Microsoft Defender ATP is part of the Microsoft Threat Protection solution that helps implement end-to-end security across possible attack surfaces in the modern workplace. Bring the power of Microsoft threat protection to your organization. +- [Conditional access](microsoft-defender-atp/conditional-access.md) +- [O365 ATP](microsoft-defender-atp/threat-protection-integration.md) +- [Azure ATP](microsoft-defender-atp/threat-protection-integration.md) +- [Azure Security Center](microsoft-defender-atp/threat-protection-integration.md) +- [Skype for Business](microsoft-defender-atp/threat-protection-integration.md) +- [Microsoft Cloud App Security](microsoft-defender-atp/microsoft-cloud-app-security-integration.md) diff --git a/windows/security/threat-protection/microsoft-defender-atp/conditional.md b/windows/security/threat-protection/microsoft-defender-atp/conditional-access.md similarity index 100% rename from windows/security/threat-protection/microsoft-defender-atp/conditional.md rename to windows/security/threat-protection/microsoft-defender-atp/conditional-access.md From fd2e2b3287897bc4622292e6faea5130824c28ef Mon Sep 17 00:00:00 2001 From: Joey Caparas Date: Wed, 10 Apr 2019 15:25:22 -0700 Subject: [PATCH 144/724] update author and product names in exploit guard folder --- .../attack-surface-reduction-exploit-guard.md | 10 +++++----- ...eduction-rules-in-windows-10-enterprise-e3.md | 6 +++--- .../audit-windows-defender-exploit-guard.md | 12 ++++++------ .../controlled-folders-exploit-guard.md | 14 +++++++------- .../customize-attack-surface-reduction.md | 6 +++--- ...customize-controlled-folders-exploit-guard.md | 6 +++--- .../customize-exploit-protection.md | 6 +++--- .../emet-exploit-protection-exploit-guard.md | 16 ++++++++-------- .../enable-attack-surface-reduction.md | 6 +++--- .../enable-controlled-folders-exploit-guard.md | 8 ++++---- .../enable-exploit-protection.md | 6 +++--- .../enable-network-protection.md | 6 +++--- ...ization-based-protection-of-code-integrity.md | 2 +- .../evaluate-attack-surface-reduction.md | 6 +++--- .../evaluate-controlled-folder-access.md | 8 ++++---- .../evaluate-exploit-protection.md | 6 +++--- .../evaluate-network-protection.md | 6 +++--- .../evaluate-windows-defender-exploit-guard.md | 4 ++-- .../event-views-exploit-guard.md | 8 ++++---- .../exploit-protection-exploit-guard.md | 14 +++++++------- .../import-export-exploit-protection-emet-xml.md | 6 +++--- .../memory-integrity.md | 2 +- .../network-protection-exploit-guard.md | 14 +++++++------- ...ization-based-protection-of-code-integrity.md | 2 +- .../troubleshoot-asr.md | 8 ++++---- ...roubleshoot-exploit-protection-mitigations.md | 6 +++--- .../troubleshoot-np.md | 8 ++++---- .../windows-defender-exploit-guard.md | 12 ++++++------ 28 files changed, 107 insertions(+), 107 deletions(-) diff --git a/windows/security/threat-protection/windows-defender-exploit-guard/attack-surface-reduction-exploit-guard.md b/windows/security/threat-protection/windows-defender-exploit-guard/attack-surface-reduction-exploit-guard.md index e16b905b59..93cfaddf25 100644 --- a/windows/security/threat-protection/windows-defender-exploit-guard/attack-surface-reduction-exploit-guard.md +++ b/windows/security/threat-protection/windows-defender-exploit-guard/attack-surface-reduction-exploit-guard.md @@ -9,8 +9,8 @@ ms.mktglfcycl: manage ms.sitesec: library ms.pagetype: security ms.localizationpriority: medium -author: andreabichsel -ms.author: v-anbic +author: justinha +ms.author: justinha ms.date: 04/02/2019 --- @@ -18,11 +18,11 @@ ms.date: 04/02/2019 **Applies to:** -- [Windows Defender Advanced Threat Protection (Windows Defender ATP)](https://go.microsoft.com/fwlink/p/?linkid=2069559) +- [Microsoft Defender Advanced Threat Protection (Microsoft Defender ATP)](https://go.microsoft.com/fwlink/p/?linkid=2069559) Attack surface reduction rules help prevent behaviors malware often uses to infect computers with malicious code. You can set attack surface reduction rules for computers running Windows 10, version 1709 or later, Windows Server 2016 1803 or later, or Windows Server 2019. -To use attack surface reduction rules, you need a Windows 10 Enterprise E3 license or higher. A Windows E5 license gives you the advanced management capabilities to power them. These include monitoring, analytics, and workflows available in [Windows Defender Advanced Threat Protection](../windows-defender-atp/windows-defender-advanced-threat-protection.md), as well as reporting and configuration capabilities in the M365 Security Center. These advanced capabilities aren't available with an E3 license, but you can use attack surface reduction rule events in Event Viewer to help facilitate deployment. +To use attack surface reduction rules, you need a Windows 10 Enterprise E3 license or higher. A Windows E5 license gives you the advanced management capabilities to power them. These include monitoring, analytics, and workflows available in [Microsoft Defender Advanced Threat Protection](../microsoft-defender-atp/microsoft-defender-advanced-threat-protection.md), as well as reporting and configuration capabilities in the M365 Security Center. These advanced capabilities aren't available with an E3 license, but you can use attack surface reduction rule events in Event Viewer to help facilitate deployment. Attack surface reduction rules target behaviors that malware and malicious apps typically use to infect computers, including: @@ -32,7 +32,7 @@ Attack surface reduction rules target behaviors that malware and malicious apps You can use [audit mode](audit-windows-defender-exploit-guard.md) to evaluate how attack surface reduction rules would impact your organization if they were enabled. It's best to run all rules in audit mode first so you can understand their impact on your line-of-business applications. Many line-of-business applications are written with limited security concerns, and they may perform tasks similar to malware. By monitoring audit data and [adding exclusions](https://docs.microsoft.com/en-us/windows/security/threat-protection/windows-defender-exploit-guard/enable-attack-surface-reduction#exclude-files-and-folders-from-asr-rules) for necessary applications, you can deploy attack surface reduction rules without impacting productivity. -Triggered rules display a notification on the device. You can [customize the notification](customize-attack-surface-reduction.md#customize-the-notification) with your company details and contact information. The notification also displays in the Windows Defender Security Center and in the Microsoft 365 securty center. +Triggered rules display a notification on the device. You can [customize the notification](customize-attack-surface-reduction.md#customize-the-notification) with your company details and contact information. The notification also displays in the Microsoft Defender Security Center and in the Microsoft 365 securty center. For information about configuring attack surface reduction rules, see [Enable attack surface reduction rules](enable-attack-surface-reduction.md). diff --git a/windows/security/threat-protection/windows-defender-exploit-guard/attack-surface-reduction-rules-in-windows-10-enterprise-e3.md b/windows/security/threat-protection/windows-defender-exploit-guard/attack-surface-reduction-rules-in-windows-10-enterprise-e3.md index 4cc8fbd9f5..60bdf42183 100644 --- a/windows/security/threat-protection/windows-defender-exploit-guard/attack-surface-reduction-rules-in-windows-10-enterprise-e3.md +++ b/windows/security/threat-protection/windows-defender-exploit-guard/attack-surface-reduction-rules-in-windows-10-enterprise-e3.md @@ -9,8 +9,8 @@ ms.mktglfcycl: manage ms.sitesec: library ms.pagetype: security ms.localizationpriority: medium -author: andreabichsel -ms.author: v-anbic +author: justinha +ms.author: justinha ms.date: 10/15/2018 --- @@ -20,7 +20,7 @@ ms.date: 10/15/2018 - Windows 10 Enterprise E3 -Attack surface reduction rules help prevent actions and apps that are typically used by exploit-seeking malware to infect machines. This feature area includes the rules, monitoring, reporting, and analytics necessary for deployment that are included in [Windows Defender Advanced Threat Protection](../windows-defender-atp/windows-defender-advanced-threat-protection.md), and require the Windows 10 Enterprise E5 license. +Attack surface reduction rules help prevent actions and apps that are typically used by exploit-seeking malware to infect machines. This feature area includes the rules, monitoring, reporting, and analytics necessary for deployment that are included in [Microsoft Defender Advanced Threat Protection](../microsoft-defender-atp/microsoft-defender-advanced-threat-protection.md), and require the Windows 10 Enterprise E5 license. A limited subset of basic attack surface reduction rules can technically be used with Windows 10 Enterprise E3. They can be used without the benefits of reporting, monitoring, and analytics, which provide the ease of deployment and management capabilities necessary for enterprises. diff --git a/windows/security/threat-protection/windows-defender-exploit-guard/audit-windows-defender-exploit-guard.md b/windows/security/threat-protection/windows-defender-exploit-guard/audit-windows-defender-exploit-guard.md index 5d82fb8254..0bc78c8573 100644 --- a/windows/security/threat-protection/windows-defender-exploit-guard/audit-windows-defender-exploit-guard.md +++ b/windows/security/threat-protection/windows-defender-exploit-guard/audit-windows-defender-exploit-guard.md @@ -1,6 +1,6 @@ --- -title: Test how Windows Defender ATP features work -description: Audit mode lets you use the event log to see how Windows Defender ATP would protect your devices if it were enabled +title: Test how Microsoft Defender ATP features work +description: Audit mode lets you use the event log to see how Microsoft Defender ATP would protect your devices if it were enabled keywords: exploit guard, audit, auditing, mode, enabled, disabled, test, demo, evaluate, lab search.product: eADQiWindows 10XVcnh ms.pagetype: security @@ -9,8 +9,8 @@ ms.mktglfcycl: manage ms.sitesec: library ms.pagetype: security ms.localizationpriority: medium -author: andreabichsel -ms.author: v-anbic +author: justinha +ms.author: justinha ms.date: 04/02/2019 --- @@ -19,7 +19,7 @@ ms.date: 04/02/2019 **Applies to:** -- [Windows Defender Advanced Threat Protection (Windows Defender ATP)](https://go.microsoft.com/fwlink/p/?linkid=2069559) +- [Microsoft Defender Advanced Threat Protection (Microsoft Defender ATP)](https://go.microsoft.com/fwlink/p/?linkid=2069559) You can enable attack surface reduction rules, exploit protection, network protection, and controlled folder access in audit mode. This lets you see a record of what *would* have happened if you had enabled the feature. @@ -27,7 +27,7 @@ You might want to do this when testing how the features will work in your organi While the features will not block or prevent apps, scripts, or files from being modified, the Windows Event Log will record events as if the features were fully enabled. This means you can enable audit mode and then review the event log to see what impact the feature would have had were it enabled. -You can use Windows Defender Advanced Threat Protection to get greater deatils for each event, especially for investigating attack surface reduction rules. Using the Windows Defender ATP console lets you [investigate issues as part of the alert timeline and investigation scenarios](../windows-defender-atp/investigate-alerts-windows-defender-advanced-threat-protection.md). +You can use Microsoft Defender Advanced Threat Protection to get greater deatils for each event, especially for investigating attack surface reduction rules. Using the Microsoft Defender ATP console lets you [investigate issues as part of the alert timeline and investigation scenarios](../microsoft-defender-atp/investigate-alerts.md). This topic provides links that describe how to enable the audit functionality for each feature and how to view events in the Windows Event Viewer. diff --git a/windows/security/threat-protection/windows-defender-exploit-guard/controlled-folders-exploit-guard.md b/windows/security/threat-protection/windows-defender-exploit-guard/controlled-folders-exploit-guard.md index 77098d4c10..fd33e84578 100644 --- a/windows/security/threat-protection/windows-defender-exploit-guard/controlled-folders-exploit-guard.md +++ b/windows/security/threat-protection/windows-defender-exploit-guard/controlled-folders-exploit-guard.md @@ -9,8 +9,8 @@ ms.mktglfcycl: manage ms.sitesec: library ms.pagetype: security ms.localizationpriority: medium -author: andreabichsel -ms.author: v-anbic +author: justinha +ms.author: justinha ms.date: 11/29/2018 --- @@ -18,10 +18,10 @@ ms.date: 11/29/2018 **Applies to:** -- [Windows Defender Advanced Threat Protection (Windows Defender ATP)](https://go.microsoft.com/fwlink/p/?linkid=2069559) +- [Microsoft Defender Advanced Threat Protection (Microsoft Defender ATP)](https://go.microsoft.com/fwlink/p/?linkid=2069559) Controlled folder access helps you protect valuable data from malicious apps and threats, such as ransomware. Controlled folder access is supported on Windows Server 2019 as well as Windows 10 clients. -Controlled folder access works best with [Windows Defender Advanced Threat Protection](../windows-defender-atp/windows-defender-advanced-threat-protection.md), which gives you detailed reporting into controlled folder access events and blocks as part of the usual [alert investigation scenarios](../windows-defender-atp/investigate-alerts-windows-defender-advanced-threat-protection.md). +Controlled folder access works best with [Microsoft Defender Advanced Threat Protection](../microsoft-defender-atp/windows-defender-advanced-threat-protection.md), which gives you detailed reporting into controlled folder access events and blocks as part of the usual [alert investigation scenarios](../microsoft-defender-atp/investigate-alerts.md). All apps (any executable file, including .exe, .scr, .dll files and others) are assessed by Windows Defender Antivirus, which then determines if the app is malicious or safe. If the app is determined to be malicious or suspicious, then it will not be allowed to make changes to any files in any protected folder. @@ -39,11 +39,11 @@ Controlled folder access is supported on Windows 10, version 1709 and later and Controlled folder access requires enabling [Windows Defender Antivirus real-time protection](../windows-defender-antivirus/configure-real-time-protection-windows-defender-antivirus.md). -## Review controlled folder access events in the Windows Defender ATP Security Center +## Review controlled folder access events in the Microsoft Defender ATP Security Center -Windows Defender ATP provides detailed reporting into events and blocks as part of its [alert investigation scenarios](../windows-defender-atp/investigate-alerts-windows-defender-advanced-threat-protection.md). +Microsoft Defender ATP provides detailed reporting into events and blocks as part of its [alert investigation scenarios](../microsoft-defender-atp/investigate-alerts.md). -You can query Windows Defender ATP data by using [Advanced hunting](https://docs.microsoft.com/en-us/windows/security/threat-protection/windows-defender-atp/advanced-hunting-windows-defender-advanced-threat-protection). If you're using [audit mode](audit-windows-defender-exploit-guard.md), you can use Advanced hunting to see how controlled folder access settings would affect your environment if they were enabled. +You can query Microsoft Defender ATP data by using [Advanced hunting](https://docs.microsoft.com/en-us/windows/security/threat-protection/microsoft-defender-atp/advanced-hunting-windows-defender-advanced-threat-protection). If you're using [audit mode](audit-windows-defender-exploit-guard.md), you can use Advanced hunting to see how controlled folder access settings would affect your environment if they were enabled. ## Review controlled folder access events in Windows Event Viewer diff --git a/windows/security/threat-protection/windows-defender-exploit-guard/customize-attack-surface-reduction.md b/windows/security/threat-protection/windows-defender-exploit-guard/customize-attack-surface-reduction.md index b772be4c4c..99f4b9d52c 100644 --- a/windows/security/threat-protection/windows-defender-exploit-guard/customize-attack-surface-reduction.md +++ b/windows/security/threat-protection/windows-defender-exploit-guard/customize-attack-surface-reduction.md @@ -9,8 +9,8 @@ ms.mktglfcycl: manage ms.sitesec: library ms.pagetype: security ms.localizationpriority: medium -author: andreabichsel -ms.author: v-anbic +author: justinha +ms.author: justinha ms.date: 12/19/2018 --- @@ -18,7 +18,7 @@ ms.date: 12/19/2018 **Applies to:** -- [Windows Defender Advanced Threat Protection (Windows Defender ATP)](https://go.microsoft.com/fwlink/p/?linkid=2069559) +- [Microsoft Defender Advanced Threat Protection (Microsoft Defender ATP)](https://go.microsoft.com/fwlink/p/?linkid=2069559) Attack surface reduction rules help prevent actions and apps that are typically used by exploit-seeking malware to infect machines. Attack surface reduction rules are supported on Windows Server 2019 as well as Windows 10 clients. diff --git a/windows/security/threat-protection/windows-defender-exploit-guard/customize-controlled-folders-exploit-guard.md b/windows/security/threat-protection/windows-defender-exploit-guard/customize-controlled-folders-exploit-guard.md index 05037553e3..88e1a4623b 100644 --- a/windows/security/threat-protection/windows-defender-exploit-guard/customize-controlled-folders-exploit-guard.md +++ b/windows/security/threat-protection/windows-defender-exploit-guard/customize-controlled-folders-exploit-guard.md @@ -9,15 +9,15 @@ ms.mktglfcycl: manage ms.sitesec: library ms.pagetype: security ms.localizationpriority: medium -author: andreabichsel -ms.author: v-anbic +author: justinha +ms.author: justinha --- # Customize controlled folder access **Applies to:** -- [Windows Defender Advanced Threat Protection (Windows Defender ATP)](https://go.microsoft.com/fwlink/p/?linkid=2069559) +- [Microsoft Defender Advanced Threat Protection (Microsoft Defender ATP)](https://go.microsoft.com/fwlink/p/?linkid=2069559) Controlled folder access helps you protect valuable data from malicious apps and threats, such as ransomware. Controlled folder access is supported on Windows Server 2019 as well as Windows 10 clients. diff --git a/windows/security/threat-protection/windows-defender-exploit-guard/customize-exploit-protection.md b/windows/security/threat-protection/windows-defender-exploit-guard/customize-exploit-protection.md index c49eae7912..139a12bd0e 100644 --- a/windows/security/threat-protection/windows-defender-exploit-guard/customize-exploit-protection.md +++ b/windows/security/threat-protection/windows-defender-exploit-guard/customize-exploit-protection.md @@ -9,8 +9,8 @@ ms.mktglfcycl: manage ms.sitesec: library ms.pagetype: security ms.localizationpriority: medium -author: andreabichsel -ms.author: v-anbic +author: justinha +ms.author: justinha ms.date: 03/26/2019 --- @@ -18,7 +18,7 @@ ms.date: 03/26/2019 **Applies to:** -- [Windows Defender Advanced Threat Protection (Windows Defender ATP)](https://go.microsoft.com/fwlink/p/?linkid=2069559) +- [Microsoft Defender Advanced Threat Protection (Microsoft Defender ATP)](https://go.microsoft.com/fwlink/p/?linkid=2069559) Exploit protection automatically applies a number of exploit mitigation techniques on both the operating system processes and on individual apps. diff --git a/windows/security/threat-protection/windows-defender-exploit-guard/emet-exploit-protection-exploit-guard.md b/windows/security/threat-protection/windows-defender-exploit-guard/emet-exploit-protection-exploit-guard.md index 843e0e7f4c..5a5dc12514 100644 --- a/windows/security/threat-protection/windows-defender-exploit-guard/emet-exploit-protection-exploit-guard.md +++ b/windows/security/threat-protection/windows-defender-exploit-guard/emet-exploit-protection-exploit-guard.md @@ -9,8 +9,8 @@ ms.mktglfcycl: manage ms.sitesec: library ms.pagetype: security ms.localizationpriority: medium -author: andreabichsel -ms.author: v-anbic +author: justinha +ms.author: justinha ms.date: 08/08/2018 --- @@ -18,22 +18,22 @@ ms.date: 08/08/2018 **Applies to:** -- [Windows Defender Advanced Threat Protection (Windows Defender ATP)](https://go.microsoft.com/fwlink/p/?linkid=2069559) +- [Microsoft Defender Advanced Threat Protection (Microsoft Defender ATP)](https://go.microsoft.com/fwlink/p/?linkid=2069559) >[!IMPORTANT] ->If you are currently using EMET, you should be aware that [EMET reached end of life on July 31, 2018](https://blogs.technet.microsoft.com/srd/2016/11/03/beyond-emet/). You should consider replacing EMET with exploit protection in Windows Defender ATP. +>If you are currently using EMET, you should be aware that [EMET reached end of life on July 31, 2018](https://blogs.technet.microsoft.com/srd/2016/11/03/beyond-emet/). You should consider replacing EMET with exploit protection in Microsoft Defender ATP. > >You can [convert an existing EMET configuration file into Exploit protection](import-export-exploit-protection-emet-xml.md#convert-an-emet-configuration-file-to-an-exploit-protection-configuration-file) to make the migration easier and keep your existing settings. -This topic describes the differences between the Enhance Mitigation Experience Toolkit (EMET) and exploit protection in Windows Defender ATP. +This topic describes the differences between the Enhance Mitigation Experience Toolkit (EMET) and exploit protection in Microsoft Defender ATP. -Exploit protection in Windows Defender ATP is our successor to EMET and provides stronger protection, more customization, an easier user interface, and better configuration and management options. +Exploit protection in Microsoft Defender ATP is our successor to EMET and provides stronger protection, more customization, an easier user interface, and better configuration and management options. EMET is a standalone product for earlier versions of Windows and provides some mitigation against older, known exploit techniques. After July 31, 2018, it will not be supported. -For more information about the individual features and mitigations available in Windows Defender ATP, as well as how to enable, configure, and deploy them to better protect your network, see the following topics: +For more information about the individual features and mitigations available in Microsoft Defender ATP, as well as how to enable, configure, and deploy them to better protect your network, see the following topics: - [Protect devices from exploits](exploit-protection-exploit-guard.md) - [Configure and audit exploit protection mitigations](customize-exploit-protection.md) @@ -59,7 +59,7 @@ Configuration with Group Policy | [!include[Check mark yes](images/svg/check-yes Configuration with shell tools | [!include[Check mark yes](images/svg/check-yes.svg)]
[Use PowerShell to customize and manage configurations](customize-exploit-protection.md#powershell-reference) | [!include[Check mark yes](images/svg/check-yes.svg)]
Requires use of EMET tool (EMET_CONF) System Center Configuration Manager | [!include[Check mark yes](images/svg/check-yes.svg)]
[Use Configuration Manager to customize, deploy, and manage configurations](https://docs.microsoft.com/sccm/protect/deploy-use/create-deploy-exploit-guard-policy) | [!include[Check mark no](images/svg/check-no.svg)]
Not available Microsoft Intune | [!include[Check mark yes](images/svg/check-yes.svg)]
[Use Intune to customize, deploy, and manage configurations](https://docs.microsoft.com/intune/whats-new#window-defender-exploit-guard-is-a-new-set-of-intrusion-prevention-capabilities-for-windows-10----1063615---) | [!include[Check mark no](images/svg/check-no.svg)]
Not available -Reporting | [!include[Check mark yes](images/svg/check-yes.svg)]
With [Windows event logs](event-views-exploit-guard.md) and [full audit mode reporting](audit-windows-defender-exploit-guard.md)
[Full integration with Windows Defender Advanced Threat Protection](../windows-defender-atp/security-analytics-dashboard-windows-defender-advanced-threat-protection.md) | [!include[Check mark yes](images/svg/check-yes.svg)]
Limited Windows event log monitoring +Reporting | [!include[Check mark yes](images/svg/check-yes.svg)]
With [Windows event logs](event-views-exploit-guard.md) and [full audit mode reporting](audit-windows-defender-exploit-guard.md)
[Full integration with Microsoft Defender Advanced Threat Protection](../microsoft-defender-atp/security-analytics-dashboard.md) | [!include[Check mark yes](images/svg/check-yes.svg)]
Limited Windows event log monitoring Audit mode | [!include[Check mark yes](images/svg/check-yes.svg)]
[Full audit mode with Windows event reporting](audit-windows-defender-exploit-guard.md) | [!include[Check mark no](images/svg/check-no.svg)]
Limited to EAF, EAF+, and anti-ROP mitigations ([1](#ref1)) Requires an enterprise subscription with Azure Active Directory or a [Software Assurance ID](https://www.microsoft.com/en-us/licensing/licensing-programs/software-assurance-default.aspx). diff --git a/windows/security/threat-protection/windows-defender-exploit-guard/enable-attack-surface-reduction.md b/windows/security/threat-protection/windows-defender-exploit-guard/enable-attack-surface-reduction.md index c5d238cf59..5239e149c8 100644 --- a/windows/security/threat-protection/windows-defender-exploit-guard/enable-attack-surface-reduction.md +++ b/windows/security/threat-protection/windows-defender-exploit-guard/enable-attack-surface-reduction.md @@ -9,15 +9,15 @@ ms.mktglfcycl: manage ms.sitesec: library ms.pagetype: security ms.localizationpriority: medium -author: andreabichsel -ms.author: v-anbic +author: justinha +ms.author: justinha --- # Enable attack surface reduction rules [Attack surface reduction rules](attack-surface-reduction-exploit-guard.md) help prevent actions and apps that malware often uses to infect computers. You can set attack surface reduction rules for computers running Windows 10 or Windows Server 2019. -To use ASR rules, you need either a Windows 10 Enterprise E3 or E5 license. We recommend an E5 license so you can take advantage of the advanced monitoring and reporting capabilities available in Windows Defender Advanced Threat Protection (Windows Defender ATP). These advanced capabilities aren't available with an E3 license, but you can develop your own monitoring and reporting tools to use in conjuction with ASR rules. +To use ASR rules, you need either a Windows 10 Enterprise E3 or E5 license. We recommend an E5 license so you can take advantage of the advanced monitoring and reporting capabilities available in Microsoft Defender Advanced Threat Protection (Microsoft Defender ATP). These advanced capabilities aren't available with an E3 license, but you can develop your own monitoring and reporting tools to use in conjuction with ASR rules. ## Exclude files and folders from ASR rules diff --git a/windows/security/threat-protection/windows-defender-exploit-guard/enable-controlled-folders-exploit-guard.md b/windows/security/threat-protection/windows-defender-exploit-guard/enable-controlled-folders-exploit-guard.md index 4cc8d86d0a..6c8a9ba1d5 100644 --- a/windows/security/threat-protection/windows-defender-exploit-guard/enable-controlled-folders-exploit-guard.md +++ b/windows/security/threat-protection/windows-defender-exploit-guard/enable-controlled-folders-exploit-guard.md @@ -9,8 +9,8 @@ ms.mktglfcycl: manage ms.sitesec: library ms.pagetype: security ms.localizationpriority: medium -author: andreabichsel -ms.author: v-anbic +author: justinha +ms.author: justinha ms.date: 03/29/2019 --- @@ -18,7 +18,7 @@ ms.date: 03/29/2019 **Applies to:** -- [Windows Defender Advanced Threat Protection (Windows Defender ATP)](https://go.microsoft.com/fwlink/p/?linkid=2069559) +- [Microsoft Defender Advanced Threat Protection (Microsoft Defender ATP)](https://go.microsoft.com/fwlink/p/?linkid=2069559) [Controlled folder access](controlled-folders-exploit-guard.md) helps you protect valuable data from malicious apps and threats, such as ransomware. It is part of [Windows Defender Exploit Guard](windows-defender-exploit-guard.md). Controlled folder access is supported on Windows Server 2019 as well as Windows 10 clients. @@ -103,4 +103,4 @@ Use `Disabled` to turn the feature off. - [Protect important folders with controlled folder access](controlled-folders-exploit-guard.md) - [Customize controlled folder access](customize-controlled-folders-exploit-guard.md) -- [Evaluate Windows Defender ATP](evaluate-windows-defender-exploit-guard.md) +- [Evaluate Microsoft Defender ATP](evaluate-windows-defender-exploit-guard.md) diff --git a/windows/security/threat-protection/windows-defender-exploit-guard/enable-exploit-protection.md b/windows/security/threat-protection/windows-defender-exploit-guard/enable-exploit-protection.md index 86f640ad6f..da528e3360 100644 --- a/windows/security/threat-protection/windows-defender-exploit-guard/enable-exploit-protection.md +++ b/windows/security/threat-protection/windows-defender-exploit-guard/enable-exploit-protection.md @@ -9,8 +9,8 @@ ms.mktglfcycl: manage ms.sitesec: library ms.pagetype: security ms.localizationpriority: medium -author: andreabichsel -ms.author: v-anbic +author: justinha +ms.author: justinha ms.date: 03/29/2019 --- @@ -18,7 +18,7 @@ ms.date: 03/29/2019 **Applies to:** -- [Windows Defender Advanced Threat Protection (Windows Defender ATP)](https://go.microsoft.com/fwlink/p/?linkid=2069559) +- [Microsoft Defender Advanced Threat Protection (Microsoft Defender ATP)](https://go.microsoft.com/fwlink/p/?linkid=2069559) [Exploit protection](exploit-protection-exploit-guard.md) helps protect against malware that uses exploits to infect devices and spread. It consists of a number of mitigations that can be applied to either the operating system or individual apps. diff --git a/windows/security/threat-protection/windows-defender-exploit-guard/enable-network-protection.md b/windows/security/threat-protection/windows-defender-exploit-guard/enable-network-protection.md index b1e858ebcb..291b023277 100644 --- a/windows/security/threat-protection/windows-defender-exploit-guard/enable-network-protection.md +++ b/windows/security/threat-protection/windows-defender-exploit-guard/enable-network-protection.md @@ -9,8 +9,8 @@ ms.mktglfcycl: manage ms.sitesec: library ms.pagetype: security ms.localizationpriority: medium -author: andreabichsel -ms.author: v-anbic +author: justinha +ms.author: justinha ms.date: 04/01/2019 --- @@ -18,7 +18,7 @@ ms.date: 04/01/2019 **Applies to:** -- [Windows Defender Advanced Threat Protection (Windows Defender ATP)](https://go.microsoft.com/fwlink/p/?linkid=2069559) +- [Microsoft Defender Advanced Threat Protection (Microsoft Defender ATP)](https://go.microsoft.com/fwlink/p/?linkid=2069559) [Network protection](network-protection-exploit-guard.md) helps to prevent employees from using any application to access dangerous domains that may host phishing scams, exploits, and other malicious content on the Internet. You can [audit network protection](evaluate-network-protection.md) in a test environment to see which apps would be blocked before you enable it. diff --git a/windows/security/threat-protection/windows-defender-exploit-guard/enable-virtualization-based-protection-of-code-integrity.md b/windows/security/threat-protection/windows-defender-exploit-guard/enable-virtualization-based-protection-of-code-integrity.md index 8648bcd508..08fe9b44f4 100644 --- a/windows/security/threat-protection/windows-defender-exploit-guard/enable-virtualization-based-protection-of-code-integrity.md +++ b/windows/security/threat-protection/windows-defender-exploit-guard/enable-virtualization-based-protection-of-code-integrity.md @@ -17,7 +17,7 @@ ms.date: 04/01/2019 **Applies to** -- [Windows Defender Advanced Threat Protection (Windows Defender ATP)](https://go.microsoft.com/fwlink/p/?linkid=2069559) +- [Microsoft Defender Advanced Threat Protection (Microsoft Defender ATP)](https://go.microsoft.com/fwlink/p/?linkid=2069559) This topic covers different ways to enable Hypervisor-protected code integrity (HVCI) on Windows 10. Some applications, including device drivers, may be incompatible with HVCI. diff --git a/windows/security/threat-protection/windows-defender-exploit-guard/evaluate-attack-surface-reduction.md b/windows/security/threat-protection/windows-defender-exploit-guard/evaluate-attack-surface-reduction.md index 307b13fd20..83db94a6af 100644 --- a/windows/security/threat-protection/windows-defender-exploit-guard/evaluate-attack-surface-reduction.md +++ b/windows/security/threat-protection/windows-defender-exploit-guard/evaluate-attack-surface-reduction.md @@ -9,8 +9,8 @@ ms.mktglfcycl: manage ms.sitesec: library ms.pagetype: security ms.localizationpriority: medium -author: andreabichsel -ms.author: v-anbic +author: justinha +ms.author: justinha ms.date: 04/02/2019 --- @@ -18,7 +18,7 @@ ms.date: 04/02/2019 **Applies to:** -- [Windows Defender Advanced Threat Protection (Windows Defender ATP)](https://go.microsoft.com/fwlink/p/?linkid=2069559) +- [Microsoft Defender Advanced Threat Protection (Microsoft Defender ATP)](https://go.microsoft.com/fwlink/p/?linkid=2069559) Attack surface reduction rules help prevent actions and apps that are typically used by exploit-seeking malware to infect machines. Attack surface reduction rules are supported on Windows Server 2019 as well as Windows 10 clients. diff --git a/windows/security/threat-protection/windows-defender-exploit-guard/evaluate-controlled-folder-access.md b/windows/security/threat-protection/windows-defender-exploit-guard/evaluate-controlled-folder-access.md index 667c554a43..08847c82c5 100644 --- a/windows/security/threat-protection/windows-defender-exploit-guard/evaluate-controlled-folder-access.md +++ b/windows/security/threat-protection/windows-defender-exploit-guard/evaluate-controlled-folder-access.md @@ -9,8 +9,8 @@ ms.mktglfcycl: manage ms.sitesec: library ms.pagetype: security ms.localizationpriority: medium -author: andreabichsel -ms.author: v-anbic +author: justinha +ms.author: justinha ms.date: 11/16/2018 --- @@ -18,7 +18,7 @@ ms.date: 11/16/2018 **Applies to:** -- [Windows Defender Advanced Threat Protection (Windows Defender ATP)](https://go.microsoft.com/fwlink/p/?linkid=2069559) +- [Microsoft Defender Advanced Threat Protection (Microsoft Defender ATP)](https://go.microsoft.com/fwlink/p/?linkid=2069559) [Controlled folder access](controlled-folders-exploit-guard.md) is a feature that helps protect your documents and files from modification by suspicious or malicious apps. Controlled folder access is supported on Windows Server 2019 as well as Windows 10 clients. @@ -62,5 +62,5 @@ See [Protect important folders with controlled folder access](controlled-folders ## Related topics - [Protect important folders with controlled folder access](controlled-folders-exploit-guard.md) -- [Evaluate Windows Defender ATP](evaluate-windows-defender-exploit-guard.md) +- [Evaluate Microsoft Defender ATP](evaluate-windows-defender-exploit-guard.md) - [Use audit mode](audit-windows-defender-exploit-guard.md) \ No newline at end of file diff --git a/windows/security/threat-protection/windows-defender-exploit-guard/evaluate-exploit-protection.md b/windows/security/threat-protection/windows-defender-exploit-guard/evaluate-exploit-protection.md index 6ae70924c7..64c227f6e5 100644 --- a/windows/security/threat-protection/windows-defender-exploit-guard/evaluate-exploit-protection.md +++ b/windows/security/threat-protection/windows-defender-exploit-guard/evaluate-exploit-protection.md @@ -9,8 +9,8 @@ ms.mktglfcycl: manage ms.sitesec: library ms.pagetype: security ms.localizationpriority: medium -author: andreabichsel -ms.author: v-anbic +author: justinha +ms.author: justinha ms.date: 04/02/2019 --- @@ -18,7 +18,7 @@ ms.date: 04/02/2019 **Applies to:** -- [Windows Defender Advanced Threat Protection (Windows Defender ATP)](https://go.microsoft.com/fwlink/p/?linkid=2069559) +- [Microsoft Defender Advanced Threat Protection (Microsoft Defender ATP)](https://go.microsoft.com/fwlink/p/?linkid=2069559) [Exploit protection](exploit-protection-exploit-guard.md) helps protect devices from malware that uses exploits to spread and infect other devices. It consists of a number of mitigations that can be applied to either the operating system or an individual app. diff --git a/windows/security/threat-protection/windows-defender-exploit-guard/evaluate-network-protection.md b/windows/security/threat-protection/windows-defender-exploit-guard/evaluate-network-protection.md index 74605b559a..a7de3f8d9d 100644 --- a/windows/security/threat-protection/windows-defender-exploit-guard/evaluate-network-protection.md +++ b/windows/security/threat-protection/windows-defender-exploit-guard/evaluate-network-protection.md @@ -9,8 +9,8 @@ ms.mktglfcycl: manage ms.sitesec: library ms.pagetype: security ms.localizationpriority: medium -author: andreabichsel -ms.author: v-anbic +author: justinha +ms.author: justinha ms.date: 04/02/2019 --- @@ -18,7 +18,7 @@ ms.date: 04/02/2019 **Applies to:** -- [Windows Defender Advanced Threat Protection (Windows Defender ATP)](https://go.microsoft.com/fwlink/p/?linkid=2069559) +- [Microsoft Defender Advanced Threat Protection (Microsoft Defender ATP)](https://go.microsoft.com/fwlink/p/?linkid=2069559) [Network protection](network-protection-exploit-guard.md) helps prevent employees from using any application to access dangerous domains that may host phishing scams, exploits, and other malicious content on the Internet. diff --git a/windows/security/threat-protection/windows-defender-exploit-guard/evaluate-windows-defender-exploit-guard.md b/windows/security/threat-protection/windows-defender-exploit-guard/evaluate-windows-defender-exploit-guard.md index ee57054634..8015e81dde 100644 --- a/windows/security/threat-protection/windows-defender-exploit-guard/evaluate-windows-defender-exploit-guard.md +++ b/windows/security/threat-protection/windows-defender-exploit-guard/evaluate-windows-defender-exploit-guard.md @@ -9,8 +9,8 @@ ms.mktglfcycl: manage ms.sitesec: library ms.pagetype: security ms.localizationpriority: medium -author: andreabichsel -ms.author: v-anbic +author: justinha +ms.author: justinha ms.date: 05/30/2018 --- diff --git a/windows/security/threat-protection/windows-defender-exploit-guard/event-views-exploit-guard.md b/windows/security/threat-protection/windows-defender-exploit-guard/event-views-exploit-guard.md index c15f7d5f95..443e9929ff 100644 --- a/windows/security/threat-protection/windows-defender-exploit-guard/event-views-exploit-guard.md +++ b/windows/security/threat-protection/windows-defender-exploit-guard/event-views-exploit-guard.md @@ -10,8 +10,8 @@ ms.sitesec: library ms.pagetype: security ms.date: 04/16/2018 ms.localizationpriority: medium -author: andreabichsel -ms.author: v-anbic +author: justinha +ms.author: justinha ms.date: 03/26/2019 --- @@ -19,7 +19,7 @@ ms.date: 03/26/2019 **Applies to:** -- [Windows Defender Advanced Threat Protection (Windows Defender ATP)](https://go.microsoft.com/fwlink/p/?linkid=2069559) +- [Microsoft Defender Advanced Threat Protection (Microsoft Defender ATP)](https://go.microsoft.com/fwlink/p/?linkid=2069559) You can review attack surface reduction events in Event Viewer. This is useful so you can monitor what rules or settings are working, and determine if any settings are too "noisy" or impacting your day to day workflow. @@ -27,7 +27,7 @@ Reviewing the events is also handy when you are evaluating the features, as you This topic lists all the events, their associated feature or setting, and describes how to create custom views to filter to specific events. -You can also get detailed reporting into events and blocks as part of Windows Security, which you access if you have an E5 subscription and use [Windows Defender Advanced Threat Protection](../windows-defender-atp/windows-defender-advanced-threat-protection.md). +You can also get detailed reporting into events and blocks as part of Windows Security, which you access if you have an E5 subscription and use [Microsoft Defender Advanced Threat Protection](../microsoft-defender-atp/windows-defender-advanced-threat-protection.md). ## Use custom views to review attack surface reduction capabilities diff --git a/windows/security/threat-protection/windows-defender-exploit-guard/exploit-protection-exploit-guard.md b/windows/security/threat-protection/windows-defender-exploit-guard/exploit-protection-exploit-guard.md index 72869c7925..6cc021334d 100644 --- a/windows/security/threat-protection/windows-defender-exploit-guard/exploit-protection-exploit-guard.md +++ b/windows/security/threat-protection/windows-defender-exploit-guard/exploit-protection-exploit-guard.md @@ -9,8 +9,8 @@ ms.mktglfcycl: manage ms.sitesec: library ms.pagetype: security ms.localizationpriority: medium -author: andreabichsel -ms.author: v-anbic +author: justinha +ms.author: justinha ms.date: 04/02/2019 --- @@ -18,7 +18,7 @@ ms.date: 04/02/2019 **Applies to:** -- [Windows Defender Advanced Threat Protection (Windows Defender ATP)](https://go.microsoft.com/fwlink/p/?linkid=2069559) +- [Microsoft Defender Advanced Threat Protection (Microsoft Defender ATP)](https://go.microsoft.com/fwlink/p/?linkid=2069559) Exploit protection automatically applies a number of exploit mitigation techniques to operating system processes and apps. @@ -27,7 +27,7 @@ It is part of [Windows Defender Exploit Guard](windows-defender-exploit-guard.md >[!TIP] >You can visit the Windows Defender Testground website at [demo.wd.microsoft.com](https://demo.wd.microsoft.com?ocid=cx-wddocs-testground) to confirm the feature is working and see how it works. -Exploit protection works best with [Windows Defender Advanced Threat Protection](../windows-defender-atp/windows-defender-advanced-threat-protection.md) - which gives you detailed reporting into exploit protection events and blocks as part of the usual [alert investigation scenarios](../windows-defender-atp/investigate-alerts-windows-defender-advanced-threat-protection.md). +Exploit protection works best with [Microsoft Defender Advanced Threat Protection](../microsoft-defender-atp/windows-defender-advanced-threat-protection.md) - which gives you detailed reporting into exploit protection events and blocks as part of the usual [alert investigation scenarios](../microsoft-defender-atp/investigate-alerts.md). You can [enable exploit protection](enable-exploit-protection.md) on an individual machine, and then use [Group Policy](import-export-exploit-protection-emet-xml.md) to distribute the XML file to multiple devices at once. @@ -79,11 +79,11 @@ Win32K | 260 | Untrusted Font ## Comparison between Enhanced Mitigation Experience Toolkit and Windows Defender Exploit Guard >[!IMPORTANT] ->If you are currently using EMET, you should be aware that [EMET reached end of life on July 31, 2018](https://blogs.technet.microsoft.com/srd/2016/11/03/beyond-emet/). You should consider replacing EMET with exploit protection in Windows Defender ATP. +>If you are currently using EMET, you should be aware that [EMET reached end of life on July 31, 2018](https://blogs.technet.microsoft.com/srd/2016/11/03/beyond-emet/). You should consider replacing EMET with exploit protection in Microsoft Defender ATP. > >You can [convert an existing EMET configuration file into exploit protection](import-export-exploit-protection-emet-xml.md#convert-an-emet-configuration-file-to-an-exploit-protection-configuration-file) to make the migration easier and keep your existing settings. -This section compares exploit protection in Windows Defender ATP with the Enhance Mitigation Experience Toolkit (EMET) for reference. +This section compares exploit protection in Microsoft Defender ATP with the Enhance Mitigation Experience Toolkit (EMET) for reference. The table in this section illustrates the differences between EMET and Windows Defender Exploit Guard.   | Windows Defender Exploit Guard | EMET @@ -102,7 +102,7 @@ Configuration with Group Policy | [!include[Check mark yes](images/svg/check-yes Configuration with shell tools | [!include[Check mark yes](images/svg/check-yes.svg)]
[Use PowerShell to customize and manage configurations](customize-exploit-protection.md#powershell-reference) | [!include[Check mark yes](images/svg/check-yes.svg)]
Requires use of EMET tool (EMET_CONF) System Center Configuration Manager | [!include[Check mark yes](images/svg/check-yes.svg)]
[Use Configuration Manager to customize, deploy, and manage configurations](https://docs.microsoft.com/sccm/protect/deploy-use/create-deploy-exploit-guard-policy) | [!include[Check mark no](images/svg/check-no.svg)]
Not available Microsoft Intune | [!include[Check mark yes](images/svg/check-yes.svg)]
[Use Intune to customize, deploy, and manage configurations](https://docs.microsoft.com/intune/whats-new#window-defender-exploit-guard-is-a-new-set-of-intrusion-prevention-capabilities-for-windows-10----1063615---) | [!include[Check mark no](images/svg/check-no.svg)]
Not available -Reporting | [!include[Check mark yes](images/svg/check-yes.svg)]
With [Windows event logs](event-views-exploit-guard.md) and [full audit mode reporting](audit-windows-defender-exploit-guard.md)
[Full integration with Windows Defender Advanced Threat Protection](../windows-defender-atp/security-analytics-dashboard-windows-defender-advanced-threat-protection.md) | [!include[Check mark yes](images/svg/check-yes.svg)]
Limited Windows event log monitoring +Reporting | [!include[Check mark yes](images/svg/check-yes.svg)]
With [Windows event logs](event-views-exploit-guard.md) and [full audit mode reporting](audit-windows-defender-exploit-guard.md)
[Full integration with Microsoft Defender Advanced Threat Protection](../microsoft-defender-atp/security-analytics-dashboard.md) | [!include[Check mark yes](images/svg/check-yes.svg)]
Limited Windows event log monitoring Audit mode | [!include[Check mark yes](images/svg/check-yes.svg)]
[Full audit mode with Windows event reporting](audit-windows-defender-exploit-guard.md) | [!include[Check mark no](images/svg/check-no.svg)]
Limited to EAF, EAF+, and anti-ROP mitigations ([1](#ref1)) Requires an enterprise subscription with Azure Active Directory or a [Software Assurance ID](https://www.microsoft.com/en-us/licensing/licensing-programs/software-assurance-default.aspx). diff --git a/windows/security/threat-protection/windows-defender-exploit-guard/import-export-exploit-protection-emet-xml.md b/windows/security/threat-protection/windows-defender-exploit-guard/import-export-exploit-protection-emet-xml.md index 1be2ff6cb2..3246dc8164 100644 --- a/windows/security/threat-protection/windows-defender-exploit-guard/import-export-exploit-protection-emet-xml.md +++ b/windows/security/threat-protection/windows-defender-exploit-guard/import-export-exploit-protection-emet-xml.md @@ -9,8 +9,8 @@ ms.mktglfcycl: manage ms.sitesec: library ms.pagetype: security ms.localizationpriority: medium -author: andreabichsel -ms.author: v-anbic +author: justinha +ms.author: justinha ms.date: 04/30/2018 --- @@ -18,7 +18,7 @@ ms.date: 04/30/2018 **Applies to:** -- [Windows Defender Advanced Threat Protection (Windows Defender ATP)](https://go.microsoft.com/fwlink/p/?linkid=2069559) +- [Microsoft Defender Advanced Threat Protection (Microsoft Defender ATP)](https://go.microsoft.com/fwlink/p/?linkid=2069559) Exploit protection applies helps protect devices from malware that use exploits to spread and infect. It consists of a number of mitigations that can be applied at either the operating system level, or at the individual app level. diff --git a/windows/security/threat-protection/windows-defender-exploit-guard/memory-integrity.md b/windows/security/threat-protection/windows-defender-exploit-guard/memory-integrity.md index aed6d58094..40ac8a84cd 100644 --- a/windows/security/threat-protection/windows-defender-exploit-guard/memory-integrity.md +++ b/windows/security/threat-protection/windows-defender-exploit-guard/memory-integrity.md @@ -18,7 +18,7 @@ ms.date: 08/09/2018 **Applies to:** -- [Windows Defender Advanced Threat Protection (Windows Defender ATP)](https://go.microsoft.com/fwlink/p/?linkid=2069559) +- [Microsoft Defender Advanced Threat Protection (Microsoft Defender ATP)](https://go.microsoft.com/fwlink/p/?linkid=2069559) Memory integrity is a powerful system mitigation that leverages hardware virtualization and the Windows Hyper-V hypervisor to protect Windows kernel-mode processes against the injection and execution of malicious or unverified code. Code integrity validation is performed in a secure environment that is resistant to attack from malicious software, and page permissions for kernel mode are set and maintained by the Hyper-V hypervisor. Memory integrity helps block many types of malware from running on computers that run Windows 10 and Windows Server 2016. diff --git a/windows/security/threat-protection/windows-defender-exploit-guard/network-protection-exploit-guard.md b/windows/security/threat-protection/windows-defender-exploit-guard/network-protection-exploit-guard.md index 8ffcfaf3cd..8b883ee82b 100644 --- a/windows/security/threat-protection/windows-defender-exploit-guard/network-protection-exploit-guard.md +++ b/windows/security/threat-protection/windows-defender-exploit-guard/network-protection-exploit-guard.md @@ -9,8 +9,8 @@ ms.mktglfcycl: manage ms.sitesec: library ms.pagetype: security ms.localizationpriority: medium -author: andreabichsel -ms.author: v-anbic +author: justinha +ms.author: justinha ms.date: 02/14/2019 --- @@ -18,7 +18,7 @@ ms.date: 02/14/2019 **Applies to:** -- [Windows Defender Advanced Threat Protection (Windows Defender ATP)](https://go.microsoft.com/fwlink/p/?linkid=2069559) +- [Microsoft Defender Advanced Threat Protection (Microsoft Defender ATP)](https://go.microsoft.com/fwlink/p/?linkid=2069559) Network protection helps reduce the attack surface of your devices from Internet-based events. It prevents employees from using any application to access dangerous domains that may host phishing scams, exploits, and other malicious content on the Internet. @@ -29,7 +29,7 @@ Network protection is supported on Windows 10, version 1709 and later and Window >[!TIP] >You can visit the Windows Defender Testground website at [demo.wd.microsoft.com](https://demo.wd.microsoft.com?ocid=cx-wddocs-testground) to confirm the feature is working and see how it works. -Network protection works best with [Windows Defender Advanced Threat Protection](../windows-defender-atp/windows-defender-advanced-threat-protection.md), which gives you detailed reporting into Windows Defender EG events and blocks as part of the usual [alert investigation scenarios](../windows-defender-atp/investigate-alerts-windows-defender-advanced-threat-protection.md). +Network protection works best with [Microsoft Defender Advanced Threat Protection](../microsoft-defender-atp/windows-defender-advanced-threat-protection.md), which gives you detailed reporting into Windows Defender EG events and blocks as part of the usual [alert investigation scenarios](../microsoft-defender-atp/investigate-alerts.md). When network protection blocks a connection, a notification will be displayed from the Action Center. You can [customize the notification](customize-attack-surface-reduction.md#customize-the-notification) with your company details and contact information. You can also enable the rules individually to customize what techniques the feature monitors. @@ -43,11 +43,11 @@ Windows 10 version | Windows Defender Antivirus - | - Windows 10 version 1709 or later | [Windows Defender AV real-time protection](../windows-defender-antivirus/configure-real-time-protection-windows-defender-antivirus.md) and [cloud-delivered protection](../windows-defender-antivirus/enable-cloud-protection-windows-defender-antivirus.md) must be enabled -## Review network protection events in the Windows Defender ATP Security Center +## Review network protection events in the Microsoft Defender ATP Security Center -Windows Defender ATP provides detailed reporting into events and blocks as part of its [alert investigation scenarios](../windows-defender-atp/investigate-alerts-windows-defender-advanced-threat-protection.md). +Microsoft Defender ATP provides detailed reporting into events and blocks as part of its [alert investigation scenarios](../microsoft-defender-atp/investigate-alerts.md). -You can query Windows Defender ATP data by using [Advanced hunting](https://docs.microsoft.com/en-us/windows/security/threat-protection/windows-defender-atp/advanced-hunting-windows-defender-advanced-threat-protection). If you're using [audit mode](audit-windows-defender-exploit-guard.md), you can use Advanced hunting to see how network protection settings would affect your environment if they were enabled. +You can query Microsoft Defender ATP data by using [Advanced hunting](https://docs.microsoft.com/en-us/windows/security/threat-protection/microsoft-defender-atp/advanced-hunting-windows-defender-advanced-threat-protection). If you're using [audit mode](audit-windows-defender-exploit-guard.md), you can use Advanced hunting to see how network protection settings would affect your environment if they were enabled. ## Review network protection events in Windows Event Viewer diff --git a/windows/security/threat-protection/windows-defender-exploit-guard/requirements-and-deployment-planning-guidelines-for-virtualization-based-protection-of-code-integrity.md b/windows/security/threat-protection/windows-defender-exploit-guard/requirements-and-deployment-planning-guidelines-for-virtualization-based-protection-of-code-integrity.md index 514a74a4ea..bd01a47dbb 100644 --- a/windows/security/threat-protection/windows-defender-exploit-guard/requirements-and-deployment-planning-guidelines-for-virtualization-based-protection-of-code-integrity.md +++ b/windows/security/threat-protection/windows-defender-exploit-guard/requirements-and-deployment-planning-guidelines-for-virtualization-based-protection-of-code-integrity.md @@ -17,7 +17,7 @@ ms.date: 10/20/2017 **Applies to** -- [Windows Defender Advanced Threat Protection (Windows Defender ATP)](https://go.microsoft.com/fwlink/p/?linkid=2069559) +- [Microsoft Defender Advanced Threat Protection (Microsoft Defender ATP)](https://go.microsoft.com/fwlink/p/?linkid=2069559) Computers must meet certain hardware, firmware, and software requirements in order to take adavantage of all of the virtualization-based security (VBS) features in [Windows Defender Device Guard](../device-guard/introduction-to-device-guard-virtualization-based-security-and-windows-defender-application-control.md). Computers lacking these requirements can still be protected by Windows Defender Application Control (WDAC) policies—the difference is that those computers will not be as hardened against certain threats. diff --git a/windows/security/threat-protection/windows-defender-exploit-guard/troubleshoot-asr.md b/windows/security/threat-protection/windows-defender-exploit-guard/troubleshoot-asr.md index 0eea5319db..0ffe534d26 100644 --- a/windows/security/threat-protection/windows-defender-exploit-guard/troubleshoot-asr.md +++ b/windows/security/threat-protection/windows-defender-exploit-guard/troubleshoot-asr.md @@ -9,8 +9,8 @@ ms.mktglfcycl: manage ms.sitesec: library ms.pagetype: security ms.localizationpriority: medium -author: andreabichsel -ms.author: v-anbic +author: justinha +ms.author: justinha ms.date: 03/27/2019 --- @@ -18,7 +18,7 @@ ms.date: 03/27/2019 **Applies to:** -- [Windows Defender Advanced Threat Protection (Windows Defender ATP)](https://go.microsoft.com/fwlink/p/?linkid=2069559) +- [Microsoft Defender Advanced Threat Protection (Microsoft Defender ATP)](https://go.microsoft.com/fwlink/p/?linkid=2069559) When you use [attack surface reduction rules](attack-surface-reduction-exploit-guard.md) you may encounter issues, such as: @@ -76,7 +76,7 @@ To add an exclusion, see [Customize Attack surface reduction](customize-attack-s ## Report a false positive or false negative -Use the [Windows Defender Security Intelligence web-based submission form](https://www.microsoft.com/en-us/wdsi/filesubmission) to report a false negative or false positive for network protection. With an E5 subscription, you can also [provide a link to any associated alert](../windows-defender-atp/alerts-queue-windows-defender-advanced-threat-protection.md). +Use the [Windows Defender Security Intelligence web-based submission form](https://www.microsoft.com/en-us/wdsi/filesubmission) to report a false negative or false positive for network protection. With an E5 subscription, you can also [provide a link to any associated alert](../microsoft-defender-atp/alerts-queue.md). ## Collect diagnostic data for file submissions diff --git a/windows/security/threat-protection/windows-defender-exploit-guard/troubleshoot-exploit-protection-mitigations.md b/windows/security/threat-protection/windows-defender-exploit-guard/troubleshoot-exploit-protection-mitigations.md index 7820eac52f..e8e2f3e46b 100644 --- a/windows/security/threat-protection/windows-defender-exploit-guard/troubleshoot-exploit-protection-mitigations.md +++ b/windows/security/threat-protection/windows-defender-exploit-guard/troubleshoot-exploit-protection-mitigations.md @@ -9,8 +9,8 @@ ms.mktglfcycl: manage ms.sitesec: library ms.pagetype: security ms.localizationpriority: medium -author: andreabichsel -ms.author: v-anbic +author: justinha +ms.author: justinha ms.date: 08/09/2018 --- @@ -18,7 +18,7 @@ ms.date: 08/09/2018 **Applies to:** -- [Windows Defender Advanced Threat Protection (Windows Defender ATP)](https://go.microsoft.com/fwlink/p/?linkid=2069559) +- [Microsoft Defender Advanced Threat Protection (Microsoft Defender ATP)](https://go.microsoft.com/fwlink/p/?linkid=2069559) When you create a set of exploit protection mitigations (known as a configuration), you might find that the configuration export and import process does not remove all unwanted mitigations. diff --git a/windows/security/threat-protection/windows-defender-exploit-guard/troubleshoot-np.md b/windows/security/threat-protection/windows-defender-exploit-guard/troubleshoot-np.md index 708142ccf5..3feaedade3 100644 --- a/windows/security/threat-protection/windows-defender-exploit-guard/troubleshoot-np.md +++ b/windows/security/threat-protection/windows-defender-exploit-guard/troubleshoot-np.md @@ -9,8 +9,8 @@ ms.mktglfcycl: manage ms.sitesec: library ms.pagetype: security ms.localizationpriority: medium -author: andreabichsel -ms.author: v-anbic +author: justinha +ms.author: justinha ms.date: 03/27/2019 --- @@ -18,7 +18,7 @@ ms.date: 03/27/2019 **Applies to:** -- [Windows Defender Advanced Threat Protection (Windows Defender ATP)](https://go.microsoft.com/fwlink/p/?linkid=2069559) +- [Microsoft Defender Advanced Threat Protection (Microsoft Defender ATP)](https://go.microsoft.com/fwlink/p/?linkid=2069559) - IT administrators @@ -65,7 +65,7 @@ Set-MpPreference -EnableNetworkProtection Enabled ## Report a false positive or false negative -If you've tested the feature with the demo site and with audit mode, and network protection is working on pre-configured scenarios, but is not working as expected for a specific connection, use the [Windows Defender Security Intelligence web-based submission form](https://www.microsoft.com/en-us/wdsi/filesubmission) to report a false negative or false positive for network protection. With an E5 subscription, you can also [provide a link to any associated alert](../windows-defender-atp/alerts-queue-windows-defender-advanced-threat-protection.md). +If you've tested the feature with the demo site and with audit mode, and network protection is working on pre-configured scenarios, but is not working as expected for a specific connection, use the [Windows Defender Security Intelligence web-based submission form](https://www.microsoft.com/en-us/wdsi/filesubmission) to report a false negative or false positive for network protection. With an E5 subscription, you can also [provide a link to any associated alert](../microsoft-defender-atp/alerts-queue.md). ## Collect diagnostic data for file submissions diff --git a/windows/security/threat-protection/windows-defender-exploit-guard/windows-defender-exploit-guard.md b/windows/security/threat-protection/windows-defender-exploit-guard/windows-defender-exploit-guard.md index 32055b2546..b6733d5ed0 100644 --- a/windows/security/threat-protection/windows-defender-exploit-guard/windows-defender-exploit-guard.md +++ b/windows/security/threat-protection/windows-defender-exploit-guard/windows-defender-exploit-guard.md @@ -9,8 +9,8 @@ ms.mktglfcycl: manage ms.sitesec: library ms.pagetype: security ms.localizationpriority: medium -author: andreabichsel -ms.author: v-anbic +author: justinha +ms.author: justinha ms.date: 08/09/2018 --- @@ -18,7 +18,7 @@ ms.date: 08/09/2018 **Applies to:** -- [Windows Defender Advanced Threat Protection (Windows Defender ATP)](https://go.microsoft.com/fwlink/p/?linkid=2069559) +- [Microsoft Defender Advanced Threat Protection (Microsoft Defender ATP)](https://go.microsoft.com/fwlink/p/?linkid=2069559) Windows Defender Exploit Guard (Windows Defender EG) is a new set of host intrusion prevention capabilities for Windows 10, allowing you to manage and reduce the attack surface of apps used by your employees. @@ -43,9 +43,9 @@ You can also [enable audit mode](audit-windows-defender-exploit-guard.md) for th >[!TIP] >You can also visit the Windows Defender Testground website at [demo.wd.microsoft.com](https://demo.wd.microsoft.com?ocid=cx-wddocs-testground) to confirm the features are working and see how each of them work. -Windows Defender EG can be managed and reported on in the Windows Security app as part of the Windows Defender Advanced Threat Protection suite of threat mitigation, preventing, protection, and analysis technologies. +Windows Defender EG can be managed and reported on in the Windows Security app as part of the Microsoft Defender Advanced Threat Protection suite of threat mitigation, preventing, protection, and analysis technologies. -You can use the Windows Security app to obtain detailed reporting into events and blocks as part of the usual [alert investigation scenarios](../windows-defender-atp/investigate-alerts-windows-defender-advanced-threat-protection.md). You can [sign up for a free trial of Windows Defender ATP](https://www.microsoft.com/en-us/WindowsForBusiness/windows-atp?ocid=cx-docs-msa4053440) to see how it works. +You can use the Windows Security app to obtain detailed reporting into events and blocks as part of the usual [alert investigation scenarios](../microsoft-defender-atp/investigate-alerts.md). You can [sign up for a free trial of Microsoft Defender ATP](https://www.microsoft.com/en-us/WindowsForBusiness/windows-atp?ocid=cx-docs-msa4053440) to see how it works. ## Requirements @@ -55,7 +55,7 @@ This section covers requirements for each feature in Windows Defender EG. |--------|---------| | ![not supported](./images/ball_empty.png) | Not supported | | ![supported](./images/ball_50.png) | Supported | -| ![supported, full reporting](./images/ball_full.png) | Recommended. Includes full, automated reporting into the Windows Defender ATP console. Provides additional cloud-powered capabilities, including the Network protection ability to block apps from accessing low-reputation websites and an attack surface reduction rule that blocks executable files that meet age or prevalence criteria.| +| ![supported, full reporting](./images/ball_full.png) | Recommended. Includes full, automated reporting into the Microsoft Defender ATP console. Provides additional cloud-powered capabilities, including the Network protection ability to block apps from accessing low-reputation websites and an attack surface reduction rule that blocks executable files that meet age or prevalence criteria.| | Feature | Windows 10 Home | Windows 10 Professional | Windows 10 E3 | Windows 10 E5 | | ----------------- | :------------------------------------: | :---------------------------: | :-------------------------: | :--------------------------------------: | From 4e53f9e8da68835d55732dfbfef7f569de391ab1 Mon Sep 17 00:00:00 2001 From: Joey Caparas Date: Wed, 10 Apr 2019 15:27:33 -0700 Subject: [PATCH 145/724] Revert "update author and product names in exploit guard folder" This reverts commit fd2e2b3287897bc4622292e6faea5130824c28ef. --- .../attack-surface-reduction-exploit-guard.md | 10 +++++----- ...eduction-rules-in-windows-10-enterprise-e3.md | 6 +++--- .../audit-windows-defender-exploit-guard.md | 12 ++++++------ .../controlled-folders-exploit-guard.md | 14 +++++++------- .../customize-attack-surface-reduction.md | 6 +++--- ...customize-controlled-folders-exploit-guard.md | 6 +++--- .../customize-exploit-protection.md | 6 +++--- .../emet-exploit-protection-exploit-guard.md | 16 ++++++++-------- .../enable-attack-surface-reduction.md | 6 +++--- .../enable-controlled-folders-exploit-guard.md | 8 ++++---- .../enable-exploit-protection.md | 6 +++--- .../enable-network-protection.md | 6 +++--- ...ization-based-protection-of-code-integrity.md | 2 +- .../evaluate-attack-surface-reduction.md | 6 +++--- .../evaluate-controlled-folder-access.md | 8 ++++---- .../evaluate-exploit-protection.md | 6 +++--- .../evaluate-network-protection.md | 6 +++--- .../evaluate-windows-defender-exploit-guard.md | 4 ++-- .../event-views-exploit-guard.md | 8 ++++---- .../exploit-protection-exploit-guard.md | 14 +++++++------- .../import-export-exploit-protection-emet-xml.md | 6 +++--- .../memory-integrity.md | 2 +- .../network-protection-exploit-guard.md | 14 +++++++------- ...ization-based-protection-of-code-integrity.md | 2 +- .../troubleshoot-asr.md | 8 ++++---- ...roubleshoot-exploit-protection-mitigations.md | 6 +++--- .../troubleshoot-np.md | 8 ++++---- .../windows-defender-exploit-guard.md | 12 ++++++------ 28 files changed, 107 insertions(+), 107 deletions(-) diff --git a/windows/security/threat-protection/windows-defender-exploit-guard/attack-surface-reduction-exploit-guard.md b/windows/security/threat-protection/windows-defender-exploit-guard/attack-surface-reduction-exploit-guard.md index 93cfaddf25..e16b905b59 100644 --- a/windows/security/threat-protection/windows-defender-exploit-guard/attack-surface-reduction-exploit-guard.md +++ b/windows/security/threat-protection/windows-defender-exploit-guard/attack-surface-reduction-exploit-guard.md @@ -9,8 +9,8 @@ ms.mktglfcycl: manage ms.sitesec: library ms.pagetype: security ms.localizationpriority: medium -author: justinha -ms.author: justinha +author: andreabichsel +ms.author: v-anbic ms.date: 04/02/2019 --- @@ -18,11 +18,11 @@ ms.date: 04/02/2019 **Applies to:** -- [Microsoft Defender Advanced Threat Protection (Microsoft Defender ATP)](https://go.microsoft.com/fwlink/p/?linkid=2069559) +- [Windows Defender Advanced Threat Protection (Windows Defender ATP)](https://go.microsoft.com/fwlink/p/?linkid=2069559) Attack surface reduction rules help prevent behaviors malware often uses to infect computers with malicious code. You can set attack surface reduction rules for computers running Windows 10, version 1709 or later, Windows Server 2016 1803 or later, or Windows Server 2019. -To use attack surface reduction rules, you need a Windows 10 Enterprise E3 license or higher. A Windows E5 license gives you the advanced management capabilities to power them. These include monitoring, analytics, and workflows available in [Microsoft Defender Advanced Threat Protection](../microsoft-defender-atp/microsoft-defender-advanced-threat-protection.md), as well as reporting and configuration capabilities in the M365 Security Center. These advanced capabilities aren't available with an E3 license, but you can use attack surface reduction rule events in Event Viewer to help facilitate deployment. +To use attack surface reduction rules, you need a Windows 10 Enterprise E3 license or higher. A Windows E5 license gives you the advanced management capabilities to power them. These include monitoring, analytics, and workflows available in [Windows Defender Advanced Threat Protection](../windows-defender-atp/windows-defender-advanced-threat-protection.md), as well as reporting and configuration capabilities in the M365 Security Center. These advanced capabilities aren't available with an E3 license, but you can use attack surface reduction rule events in Event Viewer to help facilitate deployment. Attack surface reduction rules target behaviors that malware and malicious apps typically use to infect computers, including: @@ -32,7 +32,7 @@ Attack surface reduction rules target behaviors that malware and malicious apps You can use [audit mode](audit-windows-defender-exploit-guard.md) to evaluate how attack surface reduction rules would impact your organization if they were enabled. It's best to run all rules in audit mode first so you can understand their impact on your line-of-business applications. Many line-of-business applications are written with limited security concerns, and they may perform tasks similar to malware. By monitoring audit data and [adding exclusions](https://docs.microsoft.com/en-us/windows/security/threat-protection/windows-defender-exploit-guard/enable-attack-surface-reduction#exclude-files-and-folders-from-asr-rules) for necessary applications, you can deploy attack surface reduction rules without impacting productivity. -Triggered rules display a notification on the device. You can [customize the notification](customize-attack-surface-reduction.md#customize-the-notification) with your company details and contact information. The notification also displays in the Microsoft Defender Security Center and in the Microsoft 365 securty center. +Triggered rules display a notification on the device. You can [customize the notification](customize-attack-surface-reduction.md#customize-the-notification) with your company details and contact information. The notification also displays in the Windows Defender Security Center and in the Microsoft 365 securty center. For information about configuring attack surface reduction rules, see [Enable attack surface reduction rules](enable-attack-surface-reduction.md). diff --git a/windows/security/threat-protection/windows-defender-exploit-guard/attack-surface-reduction-rules-in-windows-10-enterprise-e3.md b/windows/security/threat-protection/windows-defender-exploit-guard/attack-surface-reduction-rules-in-windows-10-enterprise-e3.md index 60bdf42183..4cc8fbd9f5 100644 --- a/windows/security/threat-protection/windows-defender-exploit-guard/attack-surface-reduction-rules-in-windows-10-enterprise-e3.md +++ b/windows/security/threat-protection/windows-defender-exploit-guard/attack-surface-reduction-rules-in-windows-10-enterprise-e3.md @@ -9,8 +9,8 @@ ms.mktglfcycl: manage ms.sitesec: library ms.pagetype: security ms.localizationpriority: medium -author: justinha -ms.author: justinha +author: andreabichsel +ms.author: v-anbic ms.date: 10/15/2018 --- @@ -20,7 +20,7 @@ ms.date: 10/15/2018 - Windows 10 Enterprise E3 -Attack surface reduction rules help prevent actions and apps that are typically used by exploit-seeking malware to infect machines. This feature area includes the rules, monitoring, reporting, and analytics necessary for deployment that are included in [Microsoft Defender Advanced Threat Protection](../microsoft-defender-atp/microsoft-defender-advanced-threat-protection.md), and require the Windows 10 Enterprise E5 license. +Attack surface reduction rules help prevent actions and apps that are typically used by exploit-seeking malware to infect machines. This feature area includes the rules, monitoring, reporting, and analytics necessary for deployment that are included in [Windows Defender Advanced Threat Protection](../windows-defender-atp/windows-defender-advanced-threat-protection.md), and require the Windows 10 Enterprise E5 license. A limited subset of basic attack surface reduction rules can technically be used with Windows 10 Enterprise E3. They can be used without the benefits of reporting, monitoring, and analytics, which provide the ease of deployment and management capabilities necessary for enterprises. diff --git a/windows/security/threat-protection/windows-defender-exploit-guard/audit-windows-defender-exploit-guard.md b/windows/security/threat-protection/windows-defender-exploit-guard/audit-windows-defender-exploit-guard.md index 0bc78c8573..5d82fb8254 100644 --- a/windows/security/threat-protection/windows-defender-exploit-guard/audit-windows-defender-exploit-guard.md +++ b/windows/security/threat-protection/windows-defender-exploit-guard/audit-windows-defender-exploit-guard.md @@ -1,6 +1,6 @@ --- -title: Test how Microsoft Defender ATP features work -description: Audit mode lets you use the event log to see how Microsoft Defender ATP would protect your devices if it were enabled +title: Test how Windows Defender ATP features work +description: Audit mode lets you use the event log to see how Windows Defender ATP would protect your devices if it were enabled keywords: exploit guard, audit, auditing, mode, enabled, disabled, test, demo, evaluate, lab search.product: eADQiWindows 10XVcnh ms.pagetype: security @@ -9,8 +9,8 @@ ms.mktglfcycl: manage ms.sitesec: library ms.pagetype: security ms.localizationpriority: medium -author: justinha -ms.author: justinha +author: andreabichsel +ms.author: v-anbic ms.date: 04/02/2019 --- @@ -19,7 +19,7 @@ ms.date: 04/02/2019 **Applies to:** -- [Microsoft Defender Advanced Threat Protection (Microsoft Defender ATP)](https://go.microsoft.com/fwlink/p/?linkid=2069559) +- [Windows Defender Advanced Threat Protection (Windows Defender ATP)](https://go.microsoft.com/fwlink/p/?linkid=2069559) You can enable attack surface reduction rules, exploit protection, network protection, and controlled folder access in audit mode. This lets you see a record of what *would* have happened if you had enabled the feature. @@ -27,7 +27,7 @@ You might want to do this when testing how the features will work in your organi While the features will not block or prevent apps, scripts, or files from being modified, the Windows Event Log will record events as if the features were fully enabled. This means you can enable audit mode and then review the event log to see what impact the feature would have had were it enabled. -You can use Microsoft Defender Advanced Threat Protection to get greater deatils for each event, especially for investigating attack surface reduction rules. Using the Microsoft Defender ATP console lets you [investigate issues as part of the alert timeline and investigation scenarios](../microsoft-defender-atp/investigate-alerts.md). +You can use Windows Defender Advanced Threat Protection to get greater deatils for each event, especially for investigating attack surface reduction rules. Using the Windows Defender ATP console lets you [investigate issues as part of the alert timeline and investigation scenarios](../windows-defender-atp/investigate-alerts-windows-defender-advanced-threat-protection.md). This topic provides links that describe how to enable the audit functionality for each feature and how to view events in the Windows Event Viewer. diff --git a/windows/security/threat-protection/windows-defender-exploit-guard/controlled-folders-exploit-guard.md b/windows/security/threat-protection/windows-defender-exploit-guard/controlled-folders-exploit-guard.md index fd33e84578..77098d4c10 100644 --- a/windows/security/threat-protection/windows-defender-exploit-guard/controlled-folders-exploit-guard.md +++ b/windows/security/threat-protection/windows-defender-exploit-guard/controlled-folders-exploit-guard.md @@ -9,8 +9,8 @@ ms.mktglfcycl: manage ms.sitesec: library ms.pagetype: security ms.localizationpriority: medium -author: justinha -ms.author: justinha +author: andreabichsel +ms.author: v-anbic ms.date: 11/29/2018 --- @@ -18,10 +18,10 @@ ms.date: 11/29/2018 **Applies to:** -- [Microsoft Defender Advanced Threat Protection (Microsoft Defender ATP)](https://go.microsoft.com/fwlink/p/?linkid=2069559) +- [Windows Defender Advanced Threat Protection (Windows Defender ATP)](https://go.microsoft.com/fwlink/p/?linkid=2069559) Controlled folder access helps you protect valuable data from malicious apps and threats, such as ransomware. Controlled folder access is supported on Windows Server 2019 as well as Windows 10 clients. -Controlled folder access works best with [Microsoft Defender Advanced Threat Protection](../microsoft-defender-atp/windows-defender-advanced-threat-protection.md), which gives you detailed reporting into controlled folder access events and blocks as part of the usual [alert investigation scenarios](../microsoft-defender-atp/investigate-alerts.md). +Controlled folder access works best with [Windows Defender Advanced Threat Protection](../windows-defender-atp/windows-defender-advanced-threat-protection.md), which gives you detailed reporting into controlled folder access events and blocks as part of the usual [alert investigation scenarios](../windows-defender-atp/investigate-alerts-windows-defender-advanced-threat-protection.md). All apps (any executable file, including .exe, .scr, .dll files and others) are assessed by Windows Defender Antivirus, which then determines if the app is malicious or safe. If the app is determined to be malicious or suspicious, then it will not be allowed to make changes to any files in any protected folder. @@ -39,11 +39,11 @@ Controlled folder access is supported on Windows 10, version 1709 and later and Controlled folder access requires enabling [Windows Defender Antivirus real-time protection](../windows-defender-antivirus/configure-real-time-protection-windows-defender-antivirus.md). -## Review controlled folder access events in the Microsoft Defender ATP Security Center +## Review controlled folder access events in the Windows Defender ATP Security Center -Microsoft Defender ATP provides detailed reporting into events and blocks as part of its [alert investigation scenarios](../microsoft-defender-atp/investigate-alerts.md). +Windows Defender ATP provides detailed reporting into events and blocks as part of its [alert investigation scenarios](../windows-defender-atp/investigate-alerts-windows-defender-advanced-threat-protection.md). -You can query Microsoft Defender ATP data by using [Advanced hunting](https://docs.microsoft.com/en-us/windows/security/threat-protection/microsoft-defender-atp/advanced-hunting-windows-defender-advanced-threat-protection). If you're using [audit mode](audit-windows-defender-exploit-guard.md), you can use Advanced hunting to see how controlled folder access settings would affect your environment if they were enabled. +You can query Windows Defender ATP data by using [Advanced hunting](https://docs.microsoft.com/en-us/windows/security/threat-protection/windows-defender-atp/advanced-hunting-windows-defender-advanced-threat-protection). If you're using [audit mode](audit-windows-defender-exploit-guard.md), you can use Advanced hunting to see how controlled folder access settings would affect your environment if they were enabled. ## Review controlled folder access events in Windows Event Viewer diff --git a/windows/security/threat-protection/windows-defender-exploit-guard/customize-attack-surface-reduction.md b/windows/security/threat-protection/windows-defender-exploit-guard/customize-attack-surface-reduction.md index 99f4b9d52c..b772be4c4c 100644 --- a/windows/security/threat-protection/windows-defender-exploit-guard/customize-attack-surface-reduction.md +++ b/windows/security/threat-protection/windows-defender-exploit-guard/customize-attack-surface-reduction.md @@ -9,8 +9,8 @@ ms.mktglfcycl: manage ms.sitesec: library ms.pagetype: security ms.localizationpriority: medium -author: justinha -ms.author: justinha +author: andreabichsel +ms.author: v-anbic ms.date: 12/19/2018 --- @@ -18,7 +18,7 @@ ms.date: 12/19/2018 **Applies to:** -- [Microsoft Defender Advanced Threat Protection (Microsoft Defender ATP)](https://go.microsoft.com/fwlink/p/?linkid=2069559) +- [Windows Defender Advanced Threat Protection (Windows Defender ATP)](https://go.microsoft.com/fwlink/p/?linkid=2069559) Attack surface reduction rules help prevent actions and apps that are typically used by exploit-seeking malware to infect machines. Attack surface reduction rules are supported on Windows Server 2019 as well as Windows 10 clients. diff --git a/windows/security/threat-protection/windows-defender-exploit-guard/customize-controlled-folders-exploit-guard.md b/windows/security/threat-protection/windows-defender-exploit-guard/customize-controlled-folders-exploit-guard.md index 88e1a4623b..05037553e3 100644 --- a/windows/security/threat-protection/windows-defender-exploit-guard/customize-controlled-folders-exploit-guard.md +++ b/windows/security/threat-protection/windows-defender-exploit-guard/customize-controlled-folders-exploit-guard.md @@ -9,15 +9,15 @@ ms.mktglfcycl: manage ms.sitesec: library ms.pagetype: security ms.localizationpriority: medium -author: justinha -ms.author: justinha +author: andreabichsel +ms.author: v-anbic --- # Customize controlled folder access **Applies to:** -- [Microsoft Defender Advanced Threat Protection (Microsoft Defender ATP)](https://go.microsoft.com/fwlink/p/?linkid=2069559) +- [Windows Defender Advanced Threat Protection (Windows Defender ATP)](https://go.microsoft.com/fwlink/p/?linkid=2069559) Controlled folder access helps you protect valuable data from malicious apps and threats, such as ransomware. Controlled folder access is supported on Windows Server 2019 as well as Windows 10 clients. diff --git a/windows/security/threat-protection/windows-defender-exploit-guard/customize-exploit-protection.md b/windows/security/threat-protection/windows-defender-exploit-guard/customize-exploit-protection.md index 139a12bd0e..c49eae7912 100644 --- a/windows/security/threat-protection/windows-defender-exploit-guard/customize-exploit-protection.md +++ b/windows/security/threat-protection/windows-defender-exploit-guard/customize-exploit-protection.md @@ -9,8 +9,8 @@ ms.mktglfcycl: manage ms.sitesec: library ms.pagetype: security ms.localizationpriority: medium -author: justinha -ms.author: justinha +author: andreabichsel +ms.author: v-anbic ms.date: 03/26/2019 --- @@ -18,7 +18,7 @@ ms.date: 03/26/2019 **Applies to:** -- [Microsoft Defender Advanced Threat Protection (Microsoft Defender ATP)](https://go.microsoft.com/fwlink/p/?linkid=2069559) +- [Windows Defender Advanced Threat Protection (Windows Defender ATP)](https://go.microsoft.com/fwlink/p/?linkid=2069559) Exploit protection automatically applies a number of exploit mitigation techniques on both the operating system processes and on individual apps. diff --git a/windows/security/threat-protection/windows-defender-exploit-guard/emet-exploit-protection-exploit-guard.md b/windows/security/threat-protection/windows-defender-exploit-guard/emet-exploit-protection-exploit-guard.md index 5a5dc12514..843e0e7f4c 100644 --- a/windows/security/threat-protection/windows-defender-exploit-guard/emet-exploit-protection-exploit-guard.md +++ b/windows/security/threat-protection/windows-defender-exploit-guard/emet-exploit-protection-exploit-guard.md @@ -9,8 +9,8 @@ ms.mktglfcycl: manage ms.sitesec: library ms.pagetype: security ms.localizationpriority: medium -author: justinha -ms.author: justinha +author: andreabichsel +ms.author: v-anbic ms.date: 08/08/2018 --- @@ -18,22 +18,22 @@ ms.date: 08/08/2018 **Applies to:** -- [Microsoft Defender Advanced Threat Protection (Microsoft Defender ATP)](https://go.microsoft.com/fwlink/p/?linkid=2069559) +- [Windows Defender Advanced Threat Protection (Windows Defender ATP)](https://go.microsoft.com/fwlink/p/?linkid=2069559) >[!IMPORTANT] ->If you are currently using EMET, you should be aware that [EMET reached end of life on July 31, 2018](https://blogs.technet.microsoft.com/srd/2016/11/03/beyond-emet/). You should consider replacing EMET with exploit protection in Microsoft Defender ATP. +>If you are currently using EMET, you should be aware that [EMET reached end of life on July 31, 2018](https://blogs.technet.microsoft.com/srd/2016/11/03/beyond-emet/). You should consider replacing EMET with exploit protection in Windows Defender ATP. > >You can [convert an existing EMET configuration file into Exploit protection](import-export-exploit-protection-emet-xml.md#convert-an-emet-configuration-file-to-an-exploit-protection-configuration-file) to make the migration easier and keep your existing settings. -This topic describes the differences between the Enhance Mitigation Experience Toolkit (EMET) and exploit protection in Microsoft Defender ATP. +This topic describes the differences between the Enhance Mitigation Experience Toolkit (EMET) and exploit protection in Windows Defender ATP. -Exploit protection in Microsoft Defender ATP is our successor to EMET and provides stronger protection, more customization, an easier user interface, and better configuration and management options. +Exploit protection in Windows Defender ATP is our successor to EMET and provides stronger protection, more customization, an easier user interface, and better configuration and management options. EMET is a standalone product for earlier versions of Windows and provides some mitigation against older, known exploit techniques. After July 31, 2018, it will not be supported. -For more information about the individual features and mitigations available in Microsoft Defender ATP, as well as how to enable, configure, and deploy them to better protect your network, see the following topics: +For more information about the individual features and mitigations available in Windows Defender ATP, as well as how to enable, configure, and deploy them to better protect your network, see the following topics: - [Protect devices from exploits](exploit-protection-exploit-guard.md) - [Configure and audit exploit protection mitigations](customize-exploit-protection.md) @@ -59,7 +59,7 @@ Configuration with Group Policy | [!include[Check mark yes](images/svg/check-yes Configuration with shell tools | [!include[Check mark yes](images/svg/check-yes.svg)]
[Use PowerShell to customize and manage configurations](customize-exploit-protection.md#powershell-reference) | [!include[Check mark yes](images/svg/check-yes.svg)]
Requires use of EMET tool (EMET_CONF) System Center Configuration Manager | [!include[Check mark yes](images/svg/check-yes.svg)]
[Use Configuration Manager to customize, deploy, and manage configurations](https://docs.microsoft.com/sccm/protect/deploy-use/create-deploy-exploit-guard-policy) | [!include[Check mark no](images/svg/check-no.svg)]
Not available Microsoft Intune | [!include[Check mark yes](images/svg/check-yes.svg)]
[Use Intune to customize, deploy, and manage configurations](https://docs.microsoft.com/intune/whats-new#window-defender-exploit-guard-is-a-new-set-of-intrusion-prevention-capabilities-for-windows-10----1063615---) | [!include[Check mark no](images/svg/check-no.svg)]
Not available -Reporting | [!include[Check mark yes](images/svg/check-yes.svg)]
With [Windows event logs](event-views-exploit-guard.md) and [full audit mode reporting](audit-windows-defender-exploit-guard.md)
[Full integration with Microsoft Defender Advanced Threat Protection](../microsoft-defender-atp/security-analytics-dashboard.md) | [!include[Check mark yes](images/svg/check-yes.svg)]
Limited Windows event log monitoring +Reporting | [!include[Check mark yes](images/svg/check-yes.svg)]
With [Windows event logs](event-views-exploit-guard.md) and [full audit mode reporting](audit-windows-defender-exploit-guard.md)
[Full integration with Windows Defender Advanced Threat Protection](../windows-defender-atp/security-analytics-dashboard-windows-defender-advanced-threat-protection.md) | [!include[Check mark yes](images/svg/check-yes.svg)]
Limited Windows event log monitoring Audit mode | [!include[Check mark yes](images/svg/check-yes.svg)]
[Full audit mode with Windows event reporting](audit-windows-defender-exploit-guard.md) | [!include[Check mark no](images/svg/check-no.svg)]
Limited to EAF, EAF+, and anti-ROP mitigations ([1](#ref1)) Requires an enterprise subscription with Azure Active Directory or a [Software Assurance ID](https://www.microsoft.com/en-us/licensing/licensing-programs/software-assurance-default.aspx). diff --git a/windows/security/threat-protection/windows-defender-exploit-guard/enable-attack-surface-reduction.md b/windows/security/threat-protection/windows-defender-exploit-guard/enable-attack-surface-reduction.md index 5239e149c8..c5d238cf59 100644 --- a/windows/security/threat-protection/windows-defender-exploit-guard/enable-attack-surface-reduction.md +++ b/windows/security/threat-protection/windows-defender-exploit-guard/enable-attack-surface-reduction.md @@ -9,15 +9,15 @@ ms.mktglfcycl: manage ms.sitesec: library ms.pagetype: security ms.localizationpriority: medium -author: justinha -ms.author: justinha +author: andreabichsel +ms.author: v-anbic --- # Enable attack surface reduction rules [Attack surface reduction rules](attack-surface-reduction-exploit-guard.md) help prevent actions and apps that malware often uses to infect computers. You can set attack surface reduction rules for computers running Windows 10 or Windows Server 2019. -To use ASR rules, you need either a Windows 10 Enterprise E3 or E5 license. We recommend an E5 license so you can take advantage of the advanced monitoring and reporting capabilities available in Microsoft Defender Advanced Threat Protection (Microsoft Defender ATP). These advanced capabilities aren't available with an E3 license, but you can develop your own monitoring and reporting tools to use in conjuction with ASR rules. +To use ASR rules, you need either a Windows 10 Enterprise E3 or E5 license. We recommend an E5 license so you can take advantage of the advanced monitoring and reporting capabilities available in Windows Defender Advanced Threat Protection (Windows Defender ATP). These advanced capabilities aren't available with an E3 license, but you can develop your own monitoring and reporting tools to use in conjuction with ASR rules. ## Exclude files and folders from ASR rules diff --git a/windows/security/threat-protection/windows-defender-exploit-guard/enable-controlled-folders-exploit-guard.md b/windows/security/threat-protection/windows-defender-exploit-guard/enable-controlled-folders-exploit-guard.md index 6c8a9ba1d5..4cc8d86d0a 100644 --- a/windows/security/threat-protection/windows-defender-exploit-guard/enable-controlled-folders-exploit-guard.md +++ b/windows/security/threat-protection/windows-defender-exploit-guard/enable-controlled-folders-exploit-guard.md @@ -9,8 +9,8 @@ ms.mktglfcycl: manage ms.sitesec: library ms.pagetype: security ms.localizationpriority: medium -author: justinha -ms.author: justinha +author: andreabichsel +ms.author: v-anbic ms.date: 03/29/2019 --- @@ -18,7 +18,7 @@ ms.date: 03/29/2019 **Applies to:** -- [Microsoft Defender Advanced Threat Protection (Microsoft Defender ATP)](https://go.microsoft.com/fwlink/p/?linkid=2069559) +- [Windows Defender Advanced Threat Protection (Windows Defender ATP)](https://go.microsoft.com/fwlink/p/?linkid=2069559) [Controlled folder access](controlled-folders-exploit-guard.md) helps you protect valuable data from malicious apps and threats, such as ransomware. It is part of [Windows Defender Exploit Guard](windows-defender-exploit-guard.md). Controlled folder access is supported on Windows Server 2019 as well as Windows 10 clients. @@ -103,4 +103,4 @@ Use `Disabled` to turn the feature off. - [Protect important folders with controlled folder access](controlled-folders-exploit-guard.md) - [Customize controlled folder access](customize-controlled-folders-exploit-guard.md) -- [Evaluate Microsoft Defender ATP](evaluate-windows-defender-exploit-guard.md) +- [Evaluate Windows Defender ATP](evaluate-windows-defender-exploit-guard.md) diff --git a/windows/security/threat-protection/windows-defender-exploit-guard/enable-exploit-protection.md b/windows/security/threat-protection/windows-defender-exploit-guard/enable-exploit-protection.md index da528e3360..86f640ad6f 100644 --- a/windows/security/threat-protection/windows-defender-exploit-guard/enable-exploit-protection.md +++ b/windows/security/threat-protection/windows-defender-exploit-guard/enable-exploit-protection.md @@ -9,8 +9,8 @@ ms.mktglfcycl: manage ms.sitesec: library ms.pagetype: security ms.localizationpriority: medium -author: justinha -ms.author: justinha +author: andreabichsel +ms.author: v-anbic ms.date: 03/29/2019 --- @@ -18,7 +18,7 @@ ms.date: 03/29/2019 **Applies to:** -- [Microsoft Defender Advanced Threat Protection (Microsoft Defender ATP)](https://go.microsoft.com/fwlink/p/?linkid=2069559) +- [Windows Defender Advanced Threat Protection (Windows Defender ATP)](https://go.microsoft.com/fwlink/p/?linkid=2069559) [Exploit protection](exploit-protection-exploit-guard.md) helps protect against malware that uses exploits to infect devices and spread. It consists of a number of mitigations that can be applied to either the operating system or individual apps. diff --git a/windows/security/threat-protection/windows-defender-exploit-guard/enable-network-protection.md b/windows/security/threat-protection/windows-defender-exploit-guard/enable-network-protection.md index 291b023277..b1e858ebcb 100644 --- a/windows/security/threat-protection/windows-defender-exploit-guard/enable-network-protection.md +++ b/windows/security/threat-protection/windows-defender-exploit-guard/enable-network-protection.md @@ -9,8 +9,8 @@ ms.mktglfcycl: manage ms.sitesec: library ms.pagetype: security ms.localizationpriority: medium -author: justinha -ms.author: justinha +author: andreabichsel +ms.author: v-anbic ms.date: 04/01/2019 --- @@ -18,7 +18,7 @@ ms.date: 04/01/2019 **Applies to:** -- [Microsoft Defender Advanced Threat Protection (Microsoft Defender ATP)](https://go.microsoft.com/fwlink/p/?linkid=2069559) +- [Windows Defender Advanced Threat Protection (Windows Defender ATP)](https://go.microsoft.com/fwlink/p/?linkid=2069559) [Network protection](network-protection-exploit-guard.md) helps to prevent employees from using any application to access dangerous domains that may host phishing scams, exploits, and other malicious content on the Internet. You can [audit network protection](evaluate-network-protection.md) in a test environment to see which apps would be blocked before you enable it. diff --git a/windows/security/threat-protection/windows-defender-exploit-guard/enable-virtualization-based-protection-of-code-integrity.md b/windows/security/threat-protection/windows-defender-exploit-guard/enable-virtualization-based-protection-of-code-integrity.md index 08fe9b44f4..8648bcd508 100644 --- a/windows/security/threat-protection/windows-defender-exploit-guard/enable-virtualization-based-protection-of-code-integrity.md +++ b/windows/security/threat-protection/windows-defender-exploit-guard/enable-virtualization-based-protection-of-code-integrity.md @@ -17,7 +17,7 @@ ms.date: 04/01/2019 **Applies to** -- [Microsoft Defender Advanced Threat Protection (Microsoft Defender ATP)](https://go.microsoft.com/fwlink/p/?linkid=2069559) +- [Windows Defender Advanced Threat Protection (Windows Defender ATP)](https://go.microsoft.com/fwlink/p/?linkid=2069559) This topic covers different ways to enable Hypervisor-protected code integrity (HVCI) on Windows 10. Some applications, including device drivers, may be incompatible with HVCI. diff --git a/windows/security/threat-protection/windows-defender-exploit-guard/evaluate-attack-surface-reduction.md b/windows/security/threat-protection/windows-defender-exploit-guard/evaluate-attack-surface-reduction.md index 83db94a6af..307b13fd20 100644 --- a/windows/security/threat-protection/windows-defender-exploit-guard/evaluate-attack-surface-reduction.md +++ b/windows/security/threat-protection/windows-defender-exploit-guard/evaluate-attack-surface-reduction.md @@ -9,8 +9,8 @@ ms.mktglfcycl: manage ms.sitesec: library ms.pagetype: security ms.localizationpriority: medium -author: justinha -ms.author: justinha +author: andreabichsel +ms.author: v-anbic ms.date: 04/02/2019 --- @@ -18,7 +18,7 @@ ms.date: 04/02/2019 **Applies to:** -- [Microsoft Defender Advanced Threat Protection (Microsoft Defender ATP)](https://go.microsoft.com/fwlink/p/?linkid=2069559) +- [Windows Defender Advanced Threat Protection (Windows Defender ATP)](https://go.microsoft.com/fwlink/p/?linkid=2069559) Attack surface reduction rules help prevent actions and apps that are typically used by exploit-seeking malware to infect machines. Attack surface reduction rules are supported on Windows Server 2019 as well as Windows 10 clients. diff --git a/windows/security/threat-protection/windows-defender-exploit-guard/evaluate-controlled-folder-access.md b/windows/security/threat-protection/windows-defender-exploit-guard/evaluate-controlled-folder-access.md index 08847c82c5..667c554a43 100644 --- a/windows/security/threat-protection/windows-defender-exploit-guard/evaluate-controlled-folder-access.md +++ b/windows/security/threat-protection/windows-defender-exploit-guard/evaluate-controlled-folder-access.md @@ -9,8 +9,8 @@ ms.mktglfcycl: manage ms.sitesec: library ms.pagetype: security ms.localizationpriority: medium -author: justinha -ms.author: justinha +author: andreabichsel +ms.author: v-anbic ms.date: 11/16/2018 --- @@ -18,7 +18,7 @@ ms.date: 11/16/2018 **Applies to:** -- [Microsoft Defender Advanced Threat Protection (Microsoft Defender ATP)](https://go.microsoft.com/fwlink/p/?linkid=2069559) +- [Windows Defender Advanced Threat Protection (Windows Defender ATP)](https://go.microsoft.com/fwlink/p/?linkid=2069559) [Controlled folder access](controlled-folders-exploit-guard.md) is a feature that helps protect your documents and files from modification by suspicious or malicious apps. Controlled folder access is supported on Windows Server 2019 as well as Windows 10 clients. @@ -62,5 +62,5 @@ See [Protect important folders with controlled folder access](controlled-folders ## Related topics - [Protect important folders with controlled folder access](controlled-folders-exploit-guard.md) -- [Evaluate Microsoft Defender ATP](evaluate-windows-defender-exploit-guard.md) +- [Evaluate Windows Defender ATP](evaluate-windows-defender-exploit-guard.md) - [Use audit mode](audit-windows-defender-exploit-guard.md) \ No newline at end of file diff --git a/windows/security/threat-protection/windows-defender-exploit-guard/evaluate-exploit-protection.md b/windows/security/threat-protection/windows-defender-exploit-guard/evaluate-exploit-protection.md index 64c227f6e5..6ae70924c7 100644 --- a/windows/security/threat-protection/windows-defender-exploit-guard/evaluate-exploit-protection.md +++ b/windows/security/threat-protection/windows-defender-exploit-guard/evaluate-exploit-protection.md @@ -9,8 +9,8 @@ ms.mktglfcycl: manage ms.sitesec: library ms.pagetype: security ms.localizationpriority: medium -author: justinha -ms.author: justinha +author: andreabichsel +ms.author: v-anbic ms.date: 04/02/2019 --- @@ -18,7 +18,7 @@ ms.date: 04/02/2019 **Applies to:** -- [Microsoft Defender Advanced Threat Protection (Microsoft Defender ATP)](https://go.microsoft.com/fwlink/p/?linkid=2069559) +- [Windows Defender Advanced Threat Protection (Windows Defender ATP)](https://go.microsoft.com/fwlink/p/?linkid=2069559) [Exploit protection](exploit-protection-exploit-guard.md) helps protect devices from malware that uses exploits to spread and infect other devices. It consists of a number of mitigations that can be applied to either the operating system or an individual app. diff --git a/windows/security/threat-protection/windows-defender-exploit-guard/evaluate-network-protection.md b/windows/security/threat-protection/windows-defender-exploit-guard/evaluate-network-protection.md index a7de3f8d9d..74605b559a 100644 --- a/windows/security/threat-protection/windows-defender-exploit-guard/evaluate-network-protection.md +++ b/windows/security/threat-protection/windows-defender-exploit-guard/evaluate-network-protection.md @@ -9,8 +9,8 @@ ms.mktglfcycl: manage ms.sitesec: library ms.pagetype: security ms.localizationpriority: medium -author: justinha -ms.author: justinha +author: andreabichsel +ms.author: v-anbic ms.date: 04/02/2019 --- @@ -18,7 +18,7 @@ ms.date: 04/02/2019 **Applies to:** -- [Microsoft Defender Advanced Threat Protection (Microsoft Defender ATP)](https://go.microsoft.com/fwlink/p/?linkid=2069559) +- [Windows Defender Advanced Threat Protection (Windows Defender ATP)](https://go.microsoft.com/fwlink/p/?linkid=2069559) [Network protection](network-protection-exploit-guard.md) helps prevent employees from using any application to access dangerous domains that may host phishing scams, exploits, and other malicious content on the Internet. diff --git a/windows/security/threat-protection/windows-defender-exploit-guard/evaluate-windows-defender-exploit-guard.md b/windows/security/threat-protection/windows-defender-exploit-guard/evaluate-windows-defender-exploit-guard.md index 8015e81dde..ee57054634 100644 --- a/windows/security/threat-protection/windows-defender-exploit-guard/evaluate-windows-defender-exploit-guard.md +++ b/windows/security/threat-protection/windows-defender-exploit-guard/evaluate-windows-defender-exploit-guard.md @@ -9,8 +9,8 @@ ms.mktglfcycl: manage ms.sitesec: library ms.pagetype: security ms.localizationpriority: medium -author: justinha -ms.author: justinha +author: andreabichsel +ms.author: v-anbic ms.date: 05/30/2018 --- diff --git a/windows/security/threat-protection/windows-defender-exploit-guard/event-views-exploit-guard.md b/windows/security/threat-protection/windows-defender-exploit-guard/event-views-exploit-guard.md index 443e9929ff..c15f7d5f95 100644 --- a/windows/security/threat-protection/windows-defender-exploit-guard/event-views-exploit-guard.md +++ b/windows/security/threat-protection/windows-defender-exploit-guard/event-views-exploit-guard.md @@ -10,8 +10,8 @@ ms.sitesec: library ms.pagetype: security ms.date: 04/16/2018 ms.localizationpriority: medium -author: justinha -ms.author: justinha +author: andreabichsel +ms.author: v-anbic ms.date: 03/26/2019 --- @@ -19,7 +19,7 @@ ms.date: 03/26/2019 **Applies to:** -- [Microsoft Defender Advanced Threat Protection (Microsoft Defender ATP)](https://go.microsoft.com/fwlink/p/?linkid=2069559) +- [Windows Defender Advanced Threat Protection (Windows Defender ATP)](https://go.microsoft.com/fwlink/p/?linkid=2069559) You can review attack surface reduction events in Event Viewer. This is useful so you can monitor what rules or settings are working, and determine if any settings are too "noisy" or impacting your day to day workflow. @@ -27,7 +27,7 @@ Reviewing the events is also handy when you are evaluating the features, as you This topic lists all the events, their associated feature or setting, and describes how to create custom views to filter to specific events. -You can also get detailed reporting into events and blocks as part of Windows Security, which you access if you have an E5 subscription and use [Microsoft Defender Advanced Threat Protection](../microsoft-defender-atp/windows-defender-advanced-threat-protection.md). +You can also get detailed reporting into events and blocks as part of Windows Security, which you access if you have an E5 subscription and use [Windows Defender Advanced Threat Protection](../windows-defender-atp/windows-defender-advanced-threat-protection.md). ## Use custom views to review attack surface reduction capabilities diff --git a/windows/security/threat-protection/windows-defender-exploit-guard/exploit-protection-exploit-guard.md b/windows/security/threat-protection/windows-defender-exploit-guard/exploit-protection-exploit-guard.md index 6cc021334d..72869c7925 100644 --- a/windows/security/threat-protection/windows-defender-exploit-guard/exploit-protection-exploit-guard.md +++ b/windows/security/threat-protection/windows-defender-exploit-guard/exploit-protection-exploit-guard.md @@ -9,8 +9,8 @@ ms.mktglfcycl: manage ms.sitesec: library ms.pagetype: security ms.localizationpriority: medium -author: justinha -ms.author: justinha +author: andreabichsel +ms.author: v-anbic ms.date: 04/02/2019 --- @@ -18,7 +18,7 @@ ms.date: 04/02/2019 **Applies to:** -- [Microsoft Defender Advanced Threat Protection (Microsoft Defender ATP)](https://go.microsoft.com/fwlink/p/?linkid=2069559) +- [Windows Defender Advanced Threat Protection (Windows Defender ATP)](https://go.microsoft.com/fwlink/p/?linkid=2069559) Exploit protection automatically applies a number of exploit mitigation techniques to operating system processes and apps. @@ -27,7 +27,7 @@ It is part of [Windows Defender Exploit Guard](windows-defender-exploit-guard.md >[!TIP] >You can visit the Windows Defender Testground website at [demo.wd.microsoft.com](https://demo.wd.microsoft.com?ocid=cx-wddocs-testground) to confirm the feature is working and see how it works. -Exploit protection works best with [Microsoft Defender Advanced Threat Protection](../microsoft-defender-atp/windows-defender-advanced-threat-protection.md) - which gives you detailed reporting into exploit protection events and blocks as part of the usual [alert investigation scenarios](../microsoft-defender-atp/investigate-alerts.md). +Exploit protection works best with [Windows Defender Advanced Threat Protection](../windows-defender-atp/windows-defender-advanced-threat-protection.md) - which gives you detailed reporting into exploit protection events and blocks as part of the usual [alert investigation scenarios](../windows-defender-atp/investigate-alerts-windows-defender-advanced-threat-protection.md). You can [enable exploit protection](enable-exploit-protection.md) on an individual machine, and then use [Group Policy](import-export-exploit-protection-emet-xml.md) to distribute the XML file to multiple devices at once. @@ -79,11 +79,11 @@ Win32K | 260 | Untrusted Font ## Comparison between Enhanced Mitigation Experience Toolkit and Windows Defender Exploit Guard >[!IMPORTANT] ->If you are currently using EMET, you should be aware that [EMET reached end of life on July 31, 2018](https://blogs.technet.microsoft.com/srd/2016/11/03/beyond-emet/). You should consider replacing EMET with exploit protection in Microsoft Defender ATP. +>If you are currently using EMET, you should be aware that [EMET reached end of life on July 31, 2018](https://blogs.technet.microsoft.com/srd/2016/11/03/beyond-emet/). You should consider replacing EMET with exploit protection in Windows Defender ATP. > >You can [convert an existing EMET configuration file into exploit protection](import-export-exploit-protection-emet-xml.md#convert-an-emet-configuration-file-to-an-exploit-protection-configuration-file) to make the migration easier and keep your existing settings. -This section compares exploit protection in Microsoft Defender ATP with the Enhance Mitigation Experience Toolkit (EMET) for reference. +This section compares exploit protection in Windows Defender ATP with the Enhance Mitigation Experience Toolkit (EMET) for reference. The table in this section illustrates the differences between EMET and Windows Defender Exploit Guard.   | Windows Defender Exploit Guard | EMET @@ -102,7 +102,7 @@ Configuration with Group Policy | [!include[Check mark yes](images/svg/check-yes Configuration with shell tools | [!include[Check mark yes](images/svg/check-yes.svg)]
[Use PowerShell to customize and manage configurations](customize-exploit-protection.md#powershell-reference) | [!include[Check mark yes](images/svg/check-yes.svg)]
Requires use of EMET tool (EMET_CONF) System Center Configuration Manager | [!include[Check mark yes](images/svg/check-yes.svg)]
[Use Configuration Manager to customize, deploy, and manage configurations](https://docs.microsoft.com/sccm/protect/deploy-use/create-deploy-exploit-guard-policy) | [!include[Check mark no](images/svg/check-no.svg)]
Not available Microsoft Intune | [!include[Check mark yes](images/svg/check-yes.svg)]
[Use Intune to customize, deploy, and manage configurations](https://docs.microsoft.com/intune/whats-new#window-defender-exploit-guard-is-a-new-set-of-intrusion-prevention-capabilities-for-windows-10----1063615---) | [!include[Check mark no](images/svg/check-no.svg)]
Not available -Reporting | [!include[Check mark yes](images/svg/check-yes.svg)]
With [Windows event logs](event-views-exploit-guard.md) and [full audit mode reporting](audit-windows-defender-exploit-guard.md)
[Full integration with Microsoft Defender Advanced Threat Protection](../microsoft-defender-atp/security-analytics-dashboard.md) | [!include[Check mark yes](images/svg/check-yes.svg)]
Limited Windows event log monitoring +Reporting | [!include[Check mark yes](images/svg/check-yes.svg)]
With [Windows event logs](event-views-exploit-guard.md) and [full audit mode reporting](audit-windows-defender-exploit-guard.md)
[Full integration with Windows Defender Advanced Threat Protection](../windows-defender-atp/security-analytics-dashboard-windows-defender-advanced-threat-protection.md) | [!include[Check mark yes](images/svg/check-yes.svg)]
Limited Windows event log monitoring Audit mode | [!include[Check mark yes](images/svg/check-yes.svg)]
[Full audit mode with Windows event reporting](audit-windows-defender-exploit-guard.md) | [!include[Check mark no](images/svg/check-no.svg)]
Limited to EAF, EAF+, and anti-ROP mitigations ([1](#ref1)) Requires an enterprise subscription with Azure Active Directory or a [Software Assurance ID](https://www.microsoft.com/en-us/licensing/licensing-programs/software-assurance-default.aspx). diff --git a/windows/security/threat-protection/windows-defender-exploit-guard/import-export-exploit-protection-emet-xml.md b/windows/security/threat-protection/windows-defender-exploit-guard/import-export-exploit-protection-emet-xml.md index 3246dc8164..1be2ff6cb2 100644 --- a/windows/security/threat-protection/windows-defender-exploit-guard/import-export-exploit-protection-emet-xml.md +++ b/windows/security/threat-protection/windows-defender-exploit-guard/import-export-exploit-protection-emet-xml.md @@ -9,8 +9,8 @@ ms.mktglfcycl: manage ms.sitesec: library ms.pagetype: security ms.localizationpriority: medium -author: justinha -ms.author: justinha +author: andreabichsel +ms.author: v-anbic ms.date: 04/30/2018 --- @@ -18,7 +18,7 @@ ms.date: 04/30/2018 **Applies to:** -- [Microsoft Defender Advanced Threat Protection (Microsoft Defender ATP)](https://go.microsoft.com/fwlink/p/?linkid=2069559) +- [Windows Defender Advanced Threat Protection (Windows Defender ATP)](https://go.microsoft.com/fwlink/p/?linkid=2069559) Exploit protection applies helps protect devices from malware that use exploits to spread and infect. It consists of a number of mitigations that can be applied at either the operating system level, or at the individual app level. diff --git a/windows/security/threat-protection/windows-defender-exploit-guard/memory-integrity.md b/windows/security/threat-protection/windows-defender-exploit-guard/memory-integrity.md index 40ac8a84cd..aed6d58094 100644 --- a/windows/security/threat-protection/windows-defender-exploit-guard/memory-integrity.md +++ b/windows/security/threat-protection/windows-defender-exploit-guard/memory-integrity.md @@ -18,7 +18,7 @@ ms.date: 08/09/2018 **Applies to:** -- [Microsoft Defender Advanced Threat Protection (Microsoft Defender ATP)](https://go.microsoft.com/fwlink/p/?linkid=2069559) +- [Windows Defender Advanced Threat Protection (Windows Defender ATP)](https://go.microsoft.com/fwlink/p/?linkid=2069559) Memory integrity is a powerful system mitigation that leverages hardware virtualization and the Windows Hyper-V hypervisor to protect Windows kernel-mode processes against the injection and execution of malicious or unverified code. Code integrity validation is performed in a secure environment that is resistant to attack from malicious software, and page permissions for kernel mode are set and maintained by the Hyper-V hypervisor. Memory integrity helps block many types of malware from running on computers that run Windows 10 and Windows Server 2016. diff --git a/windows/security/threat-protection/windows-defender-exploit-guard/network-protection-exploit-guard.md b/windows/security/threat-protection/windows-defender-exploit-guard/network-protection-exploit-guard.md index 8b883ee82b..8ffcfaf3cd 100644 --- a/windows/security/threat-protection/windows-defender-exploit-guard/network-protection-exploit-guard.md +++ b/windows/security/threat-protection/windows-defender-exploit-guard/network-protection-exploit-guard.md @@ -9,8 +9,8 @@ ms.mktglfcycl: manage ms.sitesec: library ms.pagetype: security ms.localizationpriority: medium -author: justinha -ms.author: justinha +author: andreabichsel +ms.author: v-anbic ms.date: 02/14/2019 --- @@ -18,7 +18,7 @@ ms.date: 02/14/2019 **Applies to:** -- [Microsoft Defender Advanced Threat Protection (Microsoft Defender ATP)](https://go.microsoft.com/fwlink/p/?linkid=2069559) +- [Windows Defender Advanced Threat Protection (Windows Defender ATP)](https://go.microsoft.com/fwlink/p/?linkid=2069559) Network protection helps reduce the attack surface of your devices from Internet-based events. It prevents employees from using any application to access dangerous domains that may host phishing scams, exploits, and other malicious content on the Internet. @@ -29,7 +29,7 @@ Network protection is supported on Windows 10, version 1709 and later and Window >[!TIP] >You can visit the Windows Defender Testground website at [demo.wd.microsoft.com](https://demo.wd.microsoft.com?ocid=cx-wddocs-testground) to confirm the feature is working and see how it works. -Network protection works best with [Microsoft Defender Advanced Threat Protection](../microsoft-defender-atp/windows-defender-advanced-threat-protection.md), which gives you detailed reporting into Windows Defender EG events and blocks as part of the usual [alert investigation scenarios](../microsoft-defender-atp/investigate-alerts.md). +Network protection works best with [Windows Defender Advanced Threat Protection](../windows-defender-atp/windows-defender-advanced-threat-protection.md), which gives you detailed reporting into Windows Defender EG events and blocks as part of the usual [alert investigation scenarios](../windows-defender-atp/investigate-alerts-windows-defender-advanced-threat-protection.md). When network protection blocks a connection, a notification will be displayed from the Action Center. You can [customize the notification](customize-attack-surface-reduction.md#customize-the-notification) with your company details and contact information. You can also enable the rules individually to customize what techniques the feature monitors. @@ -43,11 +43,11 @@ Windows 10 version | Windows Defender Antivirus - | - Windows 10 version 1709 or later | [Windows Defender AV real-time protection](../windows-defender-antivirus/configure-real-time-protection-windows-defender-antivirus.md) and [cloud-delivered protection](../windows-defender-antivirus/enable-cloud-protection-windows-defender-antivirus.md) must be enabled -## Review network protection events in the Microsoft Defender ATP Security Center +## Review network protection events in the Windows Defender ATP Security Center -Microsoft Defender ATP provides detailed reporting into events and blocks as part of its [alert investigation scenarios](../microsoft-defender-atp/investigate-alerts.md). +Windows Defender ATP provides detailed reporting into events and blocks as part of its [alert investigation scenarios](../windows-defender-atp/investigate-alerts-windows-defender-advanced-threat-protection.md). -You can query Microsoft Defender ATP data by using [Advanced hunting](https://docs.microsoft.com/en-us/windows/security/threat-protection/microsoft-defender-atp/advanced-hunting-windows-defender-advanced-threat-protection). If you're using [audit mode](audit-windows-defender-exploit-guard.md), you can use Advanced hunting to see how network protection settings would affect your environment if they were enabled. +You can query Windows Defender ATP data by using [Advanced hunting](https://docs.microsoft.com/en-us/windows/security/threat-protection/windows-defender-atp/advanced-hunting-windows-defender-advanced-threat-protection). If you're using [audit mode](audit-windows-defender-exploit-guard.md), you can use Advanced hunting to see how network protection settings would affect your environment if they were enabled. ## Review network protection events in Windows Event Viewer diff --git a/windows/security/threat-protection/windows-defender-exploit-guard/requirements-and-deployment-planning-guidelines-for-virtualization-based-protection-of-code-integrity.md b/windows/security/threat-protection/windows-defender-exploit-guard/requirements-and-deployment-planning-guidelines-for-virtualization-based-protection-of-code-integrity.md index bd01a47dbb..514a74a4ea 100644 --- a/windows/security/threat-protection/windows-defender-exploit-guard/requirements-and-deployment-planning-guidelines-for-virtualization-based-protection-of-code-integrity.md +++ b/windows/security/threat-protection/windows-defender-exploit-guard/requirements-and-deployment-planning-guidelines-for-virtualization-based-protection-of-code-integrity.md @@ -17,7 +17,7 @@ ms.date: 10/20/2017 **Applies to** -- [Microsoft Defender Advanced Threat Protection (Microsoft Defender ATP)](https://go.microsoft.com/fwlink/p/?linkid=2069559) +- [Windows Defender Advanced Threat Protection (Windows Defender ATP)](https://go.microsoft.com/fwlink/p/?linkid=2069559) Computers must meet certain hardware, firmware, and software requirements in order to take adavantage of all of the virtualization-based security (VBS) features in [Windows Defender Device Guard](../device-guard/introduction-to-device-guard-virtualization-based-security-and-windows-defender-application-control.md). Computers lacking these requirements can still be protected by Windows Defender Application Control (WDAC) policies—the difference is that those computers will not be as hardened against certain threats. diff --git a/windows/security/threat-protection/windows-defender-exploit-guard/troubleshoot-asr.md b/windows/security/threat-protection/windows-defender-exploit-guard/troubleshoot-asr.md index 0ffe534d26..0eea5319db 100644 --- a/windows/security/threat-protection/windows-defender-exploit-guard/troubleshoot-asr.md +++ b/windows/security/threat-protection/windows-defender-exploit-guard/troubleshoot-asr.md @@ -9,8 +9,8 @@ ms.mktglfcycl: manage ms.sitesec: library ms.pagetype: security ms.localizationpriority: medium -author: justinha -ms.author: justinha +author: andreabichsel +ms.author: v-anbic ms.date: 03/27/2019 --- @@ -18,7 +18,7 @@ ms.date: 03/27/2019 **Applies to:** -- [Microsoft Defender Advanced Threat Protection (Microsoft Defender ATP)](https://go.microsoft.com/fwlink/p/?linkid=2069559) +- [Windows Defender Advanced Threat Protection (Windows Defender ATP)](https://go.microsoft.com/fwlink/p/?linkid=2069559) When you use [attack surface reduction rules](attack-surface-reduction-exploit-guard.md) you may encounter issues, such as: @@ -76,7 +76,7 @@ To add an exclusion, see [Customize Attack surface reduction](customize-attack-s ## Report a false positive or false negative -Use the [Windows Defender Security Intelligence web-based submission form](https://www.microsoft.com/en-us/wdsi/filesubmission) to report a false negative or false positive for network protection. With an E5 subscription, you can also [provide a link to any associated alert](../microsoft-defender-atp/alerts-queue.md). +Use the [Windows Defender Security Intelligence web-based submission form](https://www.microsoft.com/en-us/wdsi/filesubmission) to report a false negative or false positive for network protection. With an E5 subscription, you can also [provide a link to any associated alert](../windows-defender-atp/alerts-queue-windows-defender-advanced-threat-protection.md). ## Collect diagnostic data for file submissions diff --git a/windows/security/threat-protection/windows-defender-exploit-guard/troubleshoot-exploit-protection-mitigations.md b/windows/security/threat-protection/windows-defender-exploit-guard/troubleshoot-exploit-protection-mitigations.md index e8e2f3e46b..7820eac52f 100644 --- a/windows/security/threat-protection/windows-defender-exploit-guard/troubleshoot-exploit-protection-mitigations.md +++ b/windows/security/threat-protection/windows-defender-exploit-guard/troubleshoot-exploit-protection-mitigations.md @@ -9,8 +9,8 @@ ms.mktglfcycl: manage ms.sitesec: library ms.pagetype: security ms.localizationpriority: medium -author: justinha -ms.author: justinha +author: andreabichsel +ms.author: v-anbic ms.date: 08/09/2018 --- @@ -18,7 +18,7 @@ ms.date: 08/09/2018 **Applies to:** -- [Microsoft Defender Advanced Threat Protection (Microsoft Defender ATP)](https://go.microsoft.com/fwlink/p/?linkid=2069559) +- [Windows Defender Advanced Threat Protection (Windows Defender ATP)](https://go.microsoft.com/fwlink/p/?linkid=2069559) When you create a set of exploit protection mitigations (known as a configuration), you might find that the configuration export and import process does not remove all unwanted mitigations. diff --git a/windows/security/threat-protection/windows-defender-exploit-guard/troubleshoot-np.md b/windows/security/threat-protection/windows-defender-exploit-guard/troubleshoot-np.md index 3feaedade3..708142ccf5 100644 --- a/windows/security/threat-protection/windows-defender-exploit-guard/troubleshoot-np.md +++ b/windows/security/threat-protection/windows-defender-exploit-guard/troubleshoot-np.md @@ -9,8 +9,8 @@ ms.mktglfcycl: manage ms.sitesec: library ms.pagetype: security ms.localizationpriority: medium -author: justinha -ms.author: justinha +author: andreabichsel +ms.author: v-anbic ms.date: 03/27/2019 --- @@ -18,7 +18,7 @@ ms.date: 03/27/2019 **Applies to:** -- [Microsoft Defender Advanced Threat Protection (Microsoft Defender ATP)](https://go.microsoft.com/fwlink/p/?linkid=2069559) +- [Windows Defender Advanced Threat Protection (Windows Defender ATP)](https://go.microsoft.com/fwlink/p/?linkid=2069559) - IT administrators @@ -65,7 +65,7 @@ Set-MpPreference -EnableNetworkProtection Enabled ## Report a false positive or false negative -If you've tested the feature with the demo site and with audit mode, and network protection is working on pre-configured scenarios, but is not working as expected for a specific connection, use the [Windows Defender Security Intelligence web-based submission form](https://www.microsoft.com/en-us/wdsi/filesubmission) to report a false negative or false positive for network protection. With an E5 subscription, you can also [provide a link to any associated alert](../microsoft-defender-atp/alerts-queue.md). +If you've tested the feature with the demo site and with audit mode, and network protection is working on pre-configured scenarios, but is not working as expected for a specific connection, use the [Windows Defender Security Intelligence web-based submission form](https://www.microsoft.com/en-us/wdsi/filesubmission) to report a false negative or false positive for network protection. With an E5 subscription, you can also [provide a link to any associated alert](../windows-defender-atp/alerts-queue-windows-defender-advanced-threat-protection.md). ## Collect diagnostic data for file submissions diff --git a/windows/security/threat-protection/windows-defender-exploit-guard/windows-defender-exploit-guard.md b/windows/security/threat-protection/windows-defender-exploit-guard/windows-defender-exploit-guard.md index b6733d5ed0..32055b2546 100644 --- a/windows/security/threat-protection/windows-defender-exploit-guard/windows-defender-exploit-guard.md +++ b/windows/security/threat-protection/windows-defender-exploit-guard/windows-defender-exploit-guard.md @@ -9,8 +9,8 @@ ms.mktglfcycl: manage ms.sitesec: library ms.pagetype: security ms.localizationpriority: medium -author: justinha -ms.author: justinha +author: andreabichsel +ms.author: v-anbic ms.date: 08/09/2018 --- @@ -18,7 +18,7 @@ ms.date: 08/09/2018 **Applies to:** -- [Microsoft Defender Advanced Threat Protection (Microsoft Defender ATP)](https://go.microsoft.com/fwlink/p/?linkid=2069559) +- [Windows Defender Advanced Threat Protection (Windows Defender ATP)](https://go.microsoft.com/fwlink/p/?linkid=2069559) Windows Defender Exploit Guard (Windows Defender EG) is a new set of host intrusion prevention capabilities for Windows 10, allowing you to manage and reduce the attack surface of apps used by your employees. @@ -43,9 +43,9 @@ You can also [enable audit mode](audit-windows-defender-exploit-guard.md) for th >[!TIP] >You can also visit the Windows Defender Testground website at [demo.wd.microsoft.com](https://demo.wd.microsoft.com?ocid=cx-wddocs-testground) to confirm the features are working and see how each of them work. -Windows Defender EG can be managed and reported on in the Windows Security app as part of the Microsoft Defender Advanced Threat Protection suite of threat mitigation, preventing, protection, and analysis technologies. +Windows Defender EG can be managed and reported on in the Windows Security app as part of the Windows Defender Advanced Threat Protection suite of threat mitigation, preventing, protection, and analysis technologies. -You can use the Windows Security app to obtain detailed reporting into events and blocks as part of the usual [alert investigation scenarios](../microsoft-defender-atp/investigate-alerts.md). You can [sign up for a free trial of Microsoft Defender ATP](https://www.microsoft.com/en-us/WindowsForBusiness/windows-atp?ocid=cx-docs-msa4053440) to see how it works. +You can use the Windows Security app to obtain detailed reporting into events and blocks as part of the usual [alert investigation scenarios](../windows-defender-atp/investigate-alerts-windows-defender-advanced-threat-protection.md). You can [sign up for a free trial of Windows Defender ATP](https://www.microsoft.com/en-us/WindowsForBusiness/windows-atp?ocid=cx-docs-msa4053440) to see how it works. ## Requirements @@ -55,7 +55,7 @@ This section covers requirements for each feature in Windows Defender EG. |--------|---------| | ![not supported](./images/ball_empty.png) | Not supported | | ![supported](./images/ball_50.png) | Supported | -| ![supported, full reporting](./images/ball_full.png) | Recommended. Includes full, automated reporting into the Microsoft Defender ATP console. Provides additional cloud-powered capabilities, including the Network protection ability to block apps from accessing low-reputation websites and an attack surface reduction rule that blocks executable files that meet age or prevalence criteria.| +| ![supported, full reporting](./images/ball_full.png) | Recommended. Includes full, automated reporting into the Windows Defender ATP console. Provides additional cloud-powered capabilities, including the Network protection ability to block apps from accessing low-reputation websites and an attack surface reduction rule that blocks executable files that meet age or prevalence criteria.| | Feature | Windows 10 Home | Windows 10 Professional | Windows 10 E3 | Windows 10 E5 | | ----------------- | :------------------------------------: | :---------------------------: | :-------------------------: | :--------------------------------------: | From 6f2e3fea96fd6ed80be4144ba8290756318e5cf7 Mon Sep 17 00:00:00 2001 From: Joey Caparas Date: Wed, 10 Apr 2019 15:31:51 -0700 Subject: [PATCH 146/724] update product names and author in exploit guard folder --- .../attack-surface-reduction-exploit-guard.md | 10 +++++----- ...eduction-rules-in-windows-10-enterprise-e3.md | 6 +++--- .../audit-windows-defender-exploit-guard.md | 12 ++++++------ .../controlled-folders-exploit-guard.md | 14 +++++++------- .../customize-attack-surface-reduction.md | 6 +++--- ...customize-controlled-folders-exploit-guard.md | 6 +++--- .../customize-exploit-protection.md | 6 +++--- .../emet-exploit-protection-exploit-guard.md | 16 ++++++++-------- .../enable-attack-surface-reduction.md | 6 +++--- .../enable-controlled-folders-exploit-guard.md | 8 ++++---- .../enable-exploit-protection.md | 6 +++--- .../enable-network-protection.md | 6 +++--- ...ization-based-protection-of-code-integrity.md | 2 +- .../evaluate-attack-surface-reduction.md | 6 +++--- .../evaluate-controlled-folder-access.md | 8 ++++---- .../evaluate-exploit-protection.md | 6 +++--- .../evaluate-network-protection.md | 6 +++--- .../evaluate-windows-defender-exploit-guard.md | 4 ++-- .../event-views-exploit-guard.md | 8 ++++---- .../exploit-protection-exploit-guard.md | 14 +++++++------- .../import-export-exploit-protection-emet-xml.md | 6 +++--- .../memory-integrity.md | 2 +- .../network-protection-exploit-guard.md | 14 +++++++------- ...ization-based-protection-of-code-integrity.md | 2 +- .../troubleshoot-asr.md | 6 +++--- ...roubleshoot-exploit-protection-mitigations.md | 6 +++--- .../troubleshoot-np.md | 6 +++--- .../windows-defender-exploit-guard.md | 12 ++++++------ 28 files changed, 105 insertions(+), 105 deletions(-) diff --git a/windows/security/threat-protection/windows-defender-exploit-guard/attack-surface-reduction-exploit-guard.md b/windows/security/threat-protection/windows-defender-exploit-guard/attack-surface-reduction-exploit-guard.md index e16b905b59..51b3340555 100644 --- a/windows/security/threat-protection/windows-defender-exploit-guard/attack-surface-reduction-exploit-guard.md +++ b/windows/security/threat-protection/windows-defender-exploit-guard/attack-surface-reduction-exploit-guard.md @@ -9,8 +9,8 @@ ms.mktglfcycl: manage ms.sitesec: library ms.pagetype: security ms.localizationpriority: medium -author: andreabichsel -ms.author: v-anbic +author: justinha +ms.author: justinha ms.date: 04/02/2019 --- @@ -18,11 +18,11 @@ ms.date: 04/02/2019 **Applies to:** -- [Windows Defender Advanced Threat Protection (Windows Defender ATP)](https://go.microsoft.com/fwlink/p/?linkid=2069559) +- [Microsoft Defender Advanced Threat Protection (Microsoft Defender ATP)](https://go.microsoft.com/fwlink/p/?linkid=2069559) Attack surface reduction rules help prevent behaviors malware often uses to infect computers with malicious code. You can set attack surface reduction rules for computers running Windows 10, version 1709 or later, Windows Server 2016 1803 or later, or Windows Server 2019. -To use attack surface reduction rules, you need a Windows 10 Enterprise E3 license or higher. A Windows E5 license gives you the advanced management capabilities to power them. These include monitoring, analytics, and workflows available in [Windows Defender Advanced Threat Protection](../windows-defender-atp/windows-defender-advanced-threat-protection.md), as well as reporting and configuration capabilities in the M365 Security Center. These advanced capabilities aren't available with an E3 license, but you can use attack surface reduction rule events in Event Viewer to help facilitate deployment. +To use attack surface reduction rules, you need a Windows 10 Enterprise E3 license or higher. A Windows E5 license gives you the advanced management capabilities to power them. These include monitoring, analytics, and workflows available in [Microsoft Defender Advanced Threat Protection](../windows-defender-atp/windows-defender-advanced-threat-protection.md), as well as reporting and configuration capabilities in the M365 Security Center. These advanced capabilities aren't available with an E3 license, but you can use attack surface reduction rule events in Event Viewer to help facilitate deployment. Attack surface reduction rules target behaviors that malware and malicious apps typically use to infect computers, including: @@ -32,7 +32,7 @@ Attack surface reduction rules target behaviors that malware and malicious apps You can use [audit mode](audit-windows-defender-exploit-guard.md) to evaluate how attack surface reduction rules would impact your organization if they were enabled. It's best to run all rules in audit mode first so you can understand their impact on your line-of-business applications. Many line-of-business applications are written with limited security concerns, and they may perform tasks similar to malware. By monitoring audit data and [adding exclusions](https://docs.microsoft.com/en-us/windows/security/threat-protection/windows-defender-exploit-guard/enable-attack-surface-reduction#exclude-files-and-folders-from-asr-rules) for necessary applications, you can deploy attack surface reduction rules without impacting productivity. -Triggered rules display a notification on the device. You can [customize the notification](customize-attack-surface-reduction.md#customize-the-notification) with your company details and contact information. The notification also displays in the Windows Defender Security Center and in the Microsoft 365 securty center. +Triggered rules display a notification on the device. You can [customize the notification](customize-attack-surface-reduction.md#customize-the-notification) with your company details and contact information. The notification also displays in the Microsoft Defender Security Center and in the Microsoft 365 securty center. For information about configuring attack surface reduction rules, see [Enable attack surface reduction rules](enable-attack-surface-reduction.md). diff --git a/windows/security/threat-protection/windows-defender-exploit-guard/attack-surface-reduction-rules-in-windows-10-enterprise-e3.md b/windows/security/threat-protection/windows-defender-exploit-guard/attack-surface-reduction-rules-in-windows-10-enterprise-e3.md index 4cc8fbd9f5..9b29796bee 100644 --- a/windows/security/threat-protection/windows-defender-exploit-guard/attack-surface-reduction-rules-in-windows-10-enterprise-e3.md +++ b/windows/security/threat-protection/windows-defender-exploit-guard/attack-surface-reduction-rules-in-windows-10-enterprise-e3.md @@ -9,8 +9,8 @@ ms.mktglfcycl: manage ms.sitesec: library ms.pagetype: security ms.localizationpriority: medium -author: andreabichsel -ms.author: v-anbic +author: justinha +ms.author: justinha ms.date: 10/15/2018 --- @@ -20,7 +20,7 @@ ms.date: 10/15/2018 - Windows 10 Enterprise E3 -Attack surface reduction rules help prevent actions and apps that are typically used by exploit-seeking malware to infect machines. This feature area includes the rules, monitoring, reporting, and analytics necessary for deployment that are included in [Windows Defender Advanced Threat Protection](../windows-defender-atp/windows-defender-advanced-threat-protection.md), and require the Windows 10 Enterprise E5 license. +Attack surface reduction rules help prevent actions and apps that are typically used by exploit-seeking malware to infect machines. This feature area includes the rules, monitoring, reporting, and analytics necessary for deployment that are included in [Microsoft Defender Advanced Threat Protection](../windows-defender-atp/windows-defender-advanced-threat-protection.md), and require the Windows 10 Enterprise E5 license. A limited subset of basic attack surface reduction rules can technically be used with Windows 10 Enterprise E3. They can be used without the benefits of reporting, monitoring, and analytics, which provide the ease of deployment and management capabilities necessary for enterprises. diff --git a/windows/security/threat-protection/windows-defender-exploit-guard/audit-windows-defender-exploit-guard.md b/windows/security/threat-protection/windows-defender-exploit-guard/audit-windows-defender-exploit-guard.md index 5d82fb8254..672ab8575a 100644 --- a/windows/security/threat-protection/windows-defender-exploit-guard/audit-windows-defender-exploit-guard.md +++ b/windows/security/threat-protection/windows-defender-exploit-guard/audit-windows-defender-exploit-guard.md @@ -1,6 +1,6 @@ --- -title: Test how Windows Defender ATP features work -description: Audit mode lets you use the event log to see how Windows Defender ATP would protect your devices if it were enabled +title: Test how Microsoft Defender ATP features work +description: Audit mode lets you use the event log to see how Microsoft Defender ATP would protect your devices if it were enabled keywords: exploit guard, audit, auditing, mode, enabled, disabled, test, demo, evaluate, lab search.product: eADQiWindows 10XVcnh ms.pagetype: security @@ -9,8 +9,8 @@ ms.mktglfcycl: manage ms.sitesec: library ms.pagetype: security ms.localizationpriority: medium -author: andreabichsel -ms.author: v-anbic +author: justinha +ms.author: justinha ms.date: 04/02/2019 --- @@ -19,7 +19,7 @@ ms.date: 04/02/2019 **Applies to:** -- [Windows Defender Advanced Threat Protection (Windows Defender ATP)](https://go.microsoft.com/fwlink/p/?linkid=2069559) +- [Microsoft Defender Advanced Threat Protection (Microsoft Defender ATP)](https://go.microsoft.com/fwlink/p/?linkid=2069559) You can enable attack surface reduction rules, exploit protection, network protection, and controlled folder access in audit mode. This lets you see a record of what *would* have happened if you had enabled the feature. @@ -27,7 +27,7 @@ You might want to do this when testing how the features will work in your organi While the features will not block or prevent apps, scripts, or files from being modified, the Windows Event Log will record events as if the features were fully enabled. This means you can enable audit mode and then review the event log to see what impact the feature would have had were it enabled. -You can use Windows Defender Advanced Threat Protection to get greater deatils for each event, especially for investigating attack surface reduction rules. Using the Windows Defender ATP console lets you [investigate issues as part of the alert timeline and investigation scenarios](../windows-defender-atp/investigate-alerts-windows-defender-advanced-threat-protection.md). +You can use Microsoft Defender Advanced Threat Protection to get greater deatils for each event, especially for investigating attack surface reduction rules. Using the Microsoft Defender ATP console lets you [investigate issues as part of the alert timeline and investigation scenarios](../windows-defender-atp/investigate-alerts-windows-defender-advanced-threat-protection.md). This topic provides links that describe how to enable the audit functionality for each feature and how to view events in the Windows Event Viewer. diff --git a/windows/security/threat-protection/windows-defender-exploit-guard/controlled-folders-exploit-guard.md b/windows/security/threat-protection/windows-defender-exploit-guard/controlled-folders-exploit-guard.md index 77098d4c10..c137f791e5 100644 --- a/windows/security/threat-protection/windows-defender-exploit-guard/controlled-folders-exploit-guard.md +++ b/windows/security/threat-protection/windows-defender-exploit-guard/controlled-folders-exploit-guard.md @@ -9,8 +9,8 @@ ms.mktglfcycl: manage ms.sitesec: library ms.pagetype: security ms.localizationpriority: medium -author: andreabichsel -ms.author: v-anbic +author: justinha +ms.author: justinha ms.date: 11/29/2018 --- @@ -18,10 +18,10 @@ ms.date: 11/29/2018 **Applies to:** -- [Windows Defender Advanced Threat Protection (Windows Defender ATP)](https://go.microsoft.com/fwlink/p/?linkid=2069559) +- [Microsoft Defender Advanced Threat Protection (Microsoft Defender ATP)](https://go.microsoft.com/fwlink/p/?linkid=2069559) Controlled folder access helps you protect valuable data from malicious apps and threats, such as ransomware. Controlled folder access is supported on Windows Server 2019 as well as Windows 10 clients. -Controlled folder access works best with [Windows Defender Advanced Threat Protection](../windows-defender-atp/windows-defender-advanced-threat-protection.md), which gives you detailed reporting into controlled folder access events and blocks as part of the usual [alert investigation scenarios](../windows-defender-atp/investigate-alerts-windows-defender-advanced-threat-protection.md). +Controlled folder access works best with [Microsoft Defender Advanced Threat Protection](../windows-defender-atp/windows-defender-advanced-threat-protection.md), which gives you detailed reporting into controlled folder access events and blocks as part of the usual [alert investigation scenarios](../windows-defender-atp/investigate-alerts-windows-defender-advanced-threat-protection.md). All apps (any executable file, including .exe, .scr, .dll files and others) are assessed by Windows Defender Antivirus, which then determines if the app is malicious or safe. If the app is determined to be malicious or suspicious, then it will not be allowed to make changes to any files in any protected folder. @@ -39,11 +39,11 @@ Controlled folder access is supported on Windows 10, version 1709 and later and Controlled folder access requires enabling [Windows Defender Antivirus real-time protection](../windows-defender-antivirus/configure-real-time-protection-windows-defender-antivirus.md). -## Review controlled folder access events in the Windows Defender ATP Security Center +## Review controlled folder access events in the Microsoft Defender ATP Security Center -Windows Defender ATP provides detailed reporting into events and blocks as part of its [alert investigation scenarios](../windows-defender-atp/investigate-alerts-windows-defender-advanced-threat-protection.md). +Microsoft Defender ATP provides detailed reporting into events and blocks as part of its [alert investigation scenarios](../windows-defender-atp/investigate-alerts-windows-defender-advanced-threat-protection.md). -You can query Windows Defender ATP data by using [Advanced hunting](https://docs.microsoft.com/en-us/windows/security/threat-protection/windows-defender-atp/advanced-hunting-windows-defender-advanced-threat-protection). If you're using [audit mode](audit-windows-defender-exploit-guard.md), you can use Advanced hunting to see how controlled folder access settings would affect your environment if they were enabled. +You can query Microsoft Defender ATP data by using [Advanced hunting](https://docs.microsoft.com/en-us/windows/security/threat-protection/windows-defender-atp/advanced-hunting-windows-defender-advanced-threat-protection). If you're using [audit mode](audit-windows-defender-exploit-guard.md), you can use Advanced hunting to see how controlled folder access settings would affect your environment if they were enabled. ## Review controlled folder access events in Windows Event Viewer diff --git a/windows/security/threat-protection/windows-defender-exploit-guard/customize-attack-surface-reduction.md b/windows/security/threat-protection/windows-defender-exploit-guard/customize-attack-surface-reduction.md index b772be4c4c..99f4b9d52c 100644 --- a/windows/security/threat-protection/windows-defender-exploit-guard/customize-attack-surface-reduction.md +++ b/windows/security/threat-protection/windows-defender-exploit-guard/customize-attack-surface-reduction.md @@ -9,8 +9,8 @@ ms.mktglfcycl: manage ms.sitesec: library ms.pagetype: security ms.localizationpriority: medium -author: andreabichsel -ms.author: v-anbic +author: justinha +ms.author: justinha ms.date: 12/19/2018 --- @@ -18,7 +18,7 @@ ms.date: 12/19/2018 **Applies to:** -- [Windows Defender Advanced Threat Protection (Windows Defender ATP)](https://go.microsoft.com/fwlink/p/?linkid=2069559) +- [Microsoft Defender Advanced Threat Protection (Microsoft Defender ATP)](https://go.microsoft.com/fwlink/p/?linkid=2069559) Attack surface reduction rules help prevent actions and apps that are typically used by exploit-seeking malware to infect machines. Attack surface reduction rules are supported on Windows Server 2019 as well as Windows 10 clients. diff --git a/windows/security/threat-protection/windows-defender-exploit-guard/customize-controlled-folders-exploit-guard.md b/windows/security/threat-protection/windows-defender-exploit-guard/customize-controlled-folders-exploit-guard.md index 05037553e3..88e1a4623b 100644 --- a/windows/security/threat-protection/windows-defender-exploit-guard/customize-controlled-folders-exploit-guard.md +++ b/windows/security/threat-protection/windows-defender-exploit-guard/customize-controlled-folders-exploit-guard.md @@ -9,15 +9,15 @@ ms.mktglfcycl: manage ms.sitesec: library ms.pagetype: security ms.localizationpriority: medium -author: andreabichsel -ms.author: v-anbic +author: justinha +ms.author: justinha --- # Customize controlled folder access **Applies to:** -- [Windows Defender Advanced Threat Protection (Windows Defender ATP)](https://go.microsoft.com/fwlink/p/?linkid=2069559) +- [Microsoft Defender Advanced Threat Protection (Microsoft Defender ATP)](https://go.microsoft.com/fwlink/p/?linkid=2069559) Controlled folder access helps you protect valuable data from malicious apps and threats, such as ransomware. Controlled folder access is supported on Windows Server 2019 as well as Windows 10 clients. diff --git a/windows/security/threat-protection/windows-defender-exploit-guard/customize-exploit-protection.md b/windows/security/threat-protection/windows-defender-exploit-guard/customize-exploit-protection.md index c49eae7912..139a12bd0e 100644 --- a/windows/security/threat-protection/windows-defender-exploit-guard/customize-exploit-protection.md +++ b/windows/security/threat-protection/windows-defender-exploit-guard/customize-exploit-protection.md @@ -9,8 +9,8 @@ ms.mktglfcycl: manage ms.sitesec: library ms.pagetype: security ms.localizationpriority: medium -author: andreabichsel -ms.author: v-anbic +author: justinha +ms.author: justinha ms.date: 03/26/2019 --- @@ -18,7 +18,7 @@ ms.date: 03/26/2019 **Applies to:** -- [Windows Defender Advanced Threat Protection (Windows Defender ATP)](https://go.microsoft.com/fwlink/p/?linkid=2069559) +- [Microsoft Defender Advanced Threat Protection (Microsoft Defender ATP)](https://go.microsoft.com/fwlink/p/?linkid=2069559) Exploit protection automatically applies a number of exploit mitigation techniques on both the operating system processes and on individual apps. diff --git a/windows/security/threat-protection/windows-defender-exploit-guard/emet-exploit-protection-exploit-guard.md b/windows/security/threat-protection/windows-defender-exploit-guard/emet-exploit-protection-exploit-guard.md index 843e0e7f4c..bc4ff6e8aa 100644 --- a/windows/security/threat-protection/windows-defender-exploit-guard/emet-exploit-protection-exploit-guard.md +++ b/windows/security/threat-protection/windows-defender-exploit-guard/emet-exploit-protection-exploit-guard.md @@ -9,8 +9,8 @@ ms.mktglfcycl: manage ms.sitesec: library ms.pagetype: security ms.localizationpriority: medium -author: andreabichsel -ms.author: v-anbic +author: justinha +ms.author: justinha ms.date: 08/08/2018 --- @@ -18,22 +18,22 @@ ms.date: 08/08/2018 **Applies to:** -- [Windows Defender Advanced Threat Protection (Windows Defender ATP)](https://go.microsoft.com/fwlink/p/?linkid=2069559) +- [Microsoft Defender Advanced Threat Protection (Microsoft Defender ATP)](https://go.microsoft.com/fwlink/p/?linkid=2069559) >[!IMPORTANT] ->If you are currently using EMET, you should be aware that [EMET reached end of life on July 31, 2018](https://blogs.technet.microsoft.com/srd/2016/11/03/beyond-emet/). You should consider replacing EMET with exploit protection in Windows Defender ATP. +>If you are currently using EMET, you should be aware that [EMET reached end of life on July 31, 2018](https://blogs.technet.microsoft.com/srd/2016/11/03/beyond-emet/). You should consider replacing EMET with exploit protection in Microsoft Defender ATP. > >You can [convert an existing EMET configuration file into Exploit protection](import-export-exploit-protection-emet-xml.md#convert-an-emet-configuration-file-to-an-exploit-protection-configuration-file) to make the migration easier and keep your existing settings. -This topic describes the differences between the Enhance Mitigation Experience Toolkit (EMET) and exploit protection in Windows Defender ATP. +This topic describes the differences between the Enhance Mitigation Experience Toolkit (EMET) and exploit protection in Microsoft Defender ATP. -Exploit protection in Windows Defender ATP is our successor to EMET and provides stronger protection, more customization, an easier user interface, and better configuration and management options. +Exploit protection in Microsoft Defender ATP is our successor to EMET and provides stronger protection, more customization, an easier user interface, and better configuration and management options. EMET is a standalone product for earlier versions of Windows and provides some mitigation against older, known exploit techniques. After July 31, 2018, it will not be supported. -For more information about the individual features and mitigations available in Windows Defender ATP, as well as how to enable, configure, and deploy them to better protect your network, see the following topics: +For more information about the individual features and mitigations available in Microsoft Defender ATP, as well as how to enable, configure, and deploy them to better protect your network, see the following topics: - [Protect devices from exploits](exploit-protection-exploit-guard.md) - [Configure and audit exploit protection mitigations](customize-exploit-protection.md) @@ -59,7 +59,7 @@ Configuration with Group Policy | [!include[Check mark yes](images/svg/check-yes Configuration with shell tools | [!include[Check mark yes](images/svg/check-yes.svg)]
[Use PowerShell to customize and manage configurations](customize-exploit-protection.md#powershell-reference) | [!include[Check mark yes](images/svg/check-yes.svg)]
Requires use of EMET tool (EMET_CONF) System Center Configuration Manager | [!include[Check mark yes](images/svg/check-yes.svg)]
[Use Configuration Manager to customize, deploy, and manage configurations](https://docs.microsoft.com/sccm/protect/deploy-use/create-deploy-exploit-guard-policy) | [!include[Check mark no](images/svg/check-no.svg)]
Not available Microsoft Intune | [!include[Check mark yes](images/svg/check-yes.svg)]
[Use Intune to customize, deploy, and manage configurations](https://docs.microsoft.com/intune/whats-new#window-defender-exploit-guard-is-a-new-set-of-intrusion-prevention-capabilities-for-windows-10----1063615---) | [!include[Check mark no](images/svg/check-no.svg)]
Not available -Reporting | [!include[Check mark yes](images/svg/check-yes.svg)]
With [Windows event logs](event-views-exploit-guard.md) and [full audit mode reporting](audit-windows-defender-exploit-guard.md)
[Full integration with Windows Defender Advanced Threat Protection](../windows-defender-atp/security-analytics-dashboard-windows-defender-advanced-threat-protection.md) | [!include[Check mark yes](images/svg/check-yes.svg)]
Limited Windows event log monitoring +Reporting | [!include[Check mark yes](images/svg/check-yes.svg)]
With [Windows event logs](event-views-exploit-guard.md) and [full audit mode reporting](audit-windows-defender-exploit-guard.md)
[Full integration with Microsoft Defender Advanced Threat Protection](../windows-defender-atp/security-analytics-dashboard-windows-defender-advanced-threat-protection.md) | [!include[Check mark yes](images/svg/check-yes.svg)]
Limited Windows event log monitoring Audit mode | [!include[Check mark yes](images/svg/check-yes.svg)]
[Full audit mode with Windows event reporting](audit-windows-defender-exploit-guard.md) | [!include[Check mark no](images/svg/check-no.svg)]
Limited to EAF, EAF+, and anti-ROP mitigations ([1](#ref1)) Requires an enterprise subscription with Azure Active Directory or a [Software Assurance ID](https://www.microsoft.com/en-us/licensing/licensing-programs/software-assurance-default.aspx). diff --git a/windows/security/threat-protection/windows-defender-exploit-guard/enable-attack-surface-reduction.md b/windows/security/threat-protection/windows-defender-exploit-guard/enable-attack-surface-reduction.md index c5d238cf59..5239e149c8 100644 --- a/windows/security/threat-protection/windows-defender-exploit-guard/enable-attack-surface-reduction.md +++ b/windows/security/threat-protection/windows-defender-exploit-guard/enable-attack-surface-reduction.md @@ -9,15 +9,15 @@ ms.mktglfcycl: manage ms.sitesec: library ms.pagetype: security ms.localizationpriority: medium -author: andreabichsel -ms.author: v-anbic +author: justinha +ms.author: justinha --- # Enable attack surface reduction rules [Attack surface reduction rules](attack-surface-reduction-exploit-guard.md) help prevent actions and apps that malware often uses to infect computers. You can set attack surface reduction rules for computers running Windows 10 or Windows Server 2019. -To use ASR rules, you need either a Windows 10 Enterprise E3 or E5 license. We recommend an E5 license so you can take advantage of the advanced monitoring and reporting capabilities available in Windows Defender Advanced Threat Protection (Windows Defender ATP). These advanced capabilities aren't available with an E3 license, but you can develop your own monitoring and reporting tools to use in conjuction with ASR rules. +To use ASR rules, you need either a Windows 10 Enterprise E3 or E5 license. We recommend an E5 license so you can take advantage of the advanced monitoring and reporting capabilities available in Microsoft Defender Advanced Threat Protection (Microsoft Defender ATP). These advanced capabilities aren't available with an E3 license, but you can develop your own monitoring and reporting tools to use in conjuction with ASR rules. ## Exclude files and folders from ASR rules diff --git a/windows/security/threat-protection/windows-defender-exploit-guard/enable-controlled-folders-exploit-guard.md b/windows/security/threat-protection/windows-defender-exploit-guard/enable-controlled-folders-exploit-guard.md index 4cc8d86d0a..6c8a9ba1d5 100644 --- a/windows/security/threat-protection/windows-defender-exploit-guard/enable-controlled-folders-exploit-guard.md +++ b/windows/security/threat-protection/windows-defender-exploit-guard/enable-controlled-folders-exploit-guard.md @@ -9,8 +9,8 @@ ms.mktglfcycl: manage ms.sitesec: library ms.pagetype: security ms.localizationpriority: medium -author: andreabichsel -ms.author: v-anbic +author: justinha +ms.author: justinha ms.date: 03/29/2019 --- @@ -18,7 +18,7 @@ ms.date: 03/29/2019 **Applies to:** -- [Windows Defender Advanced Threat Protection (Windows Defender ATP)](https://go.microsoft.com/fwlink/p/?linkid=2069559) +- [Microsoft Defender Advanced Threat Protection (Microsoft Defender ATP)](https://go.microsoft.com/fwlink/p/?linkid=2069559) [Controlled folder access](controlled-folders-exploit-guard.md) helps you protect valuable data from malicious apps and threats, such as ransomware. It is part of [Windows Defender Exploit Guard](windows-defender-exploit-guard.md). Controlled folder access is supported on Windows Server 2019 as well as Windows 10 clients. @@ -103,4 +103,4 @@ Use `Disabled` to turn the feature off. - [Protect important folders with controlled folder access](controlled-folders-exploit-guard.md) - [Customize controlled folder access](customize-controlled-folders-exploit-guard.md) -- [Evaluate Windows Defender ATP](evaluate-windows-defender-exploit-guard.md) +- [Evaluate Microsoft Defender ATP](evaluate-windows-defender-exploit-guard.md) diff --git a/windows/security/threat-protection/windows-defender-exploit-guard/enable-exploit-protection.md b/windows/security/threat-protection/windows-defender-exploit-guard/enable-exploit-protection.md index 86f640ad6f..da528e3360 100644 --- a/windows/security/threat-protection/windows-defender-exploit-guard/enable-exploit-protection.md +++ b/windows/security/threat-protection/windows-defender-exploit-guard/enable-exploit-protection.md @@ -9,8 +9,8 @@ ms.mktglfcycl: manage ms.sitesec: library ms.pagetype: security ms.localizationpriority: medium -author: andreabichsel -ms.author: v-anbic +author: justinha +ms.author: justinha ms.date: 03/29/2019 --- @@ -18,7 +18,7 @@ ms.date: 03/29/2019 **Applies to:** -- [Windows Defender Advanced Threat Protection (Windows Defender ATP)](https://go.microsoft.com/fwlink/p/?linkid=2069559) +- [Microsoft Defender Advanced Threat Protection (Microsoft Defender ATP)](https://go.microsoft.com/fwlink/p/?linkid=2069559) [Exploit protection](exploit-protection-exploit-guard.md) helps protect against malware that uses exploits to infect devices and spread. It consists of a number of mitigations that can be applied to either the operating system or individual apps. diff --git a/windows/security/threat-protection/windows-defender-exploit-guard/enable-network-protection.md b/windows/security/threat-protection/windows-defender-exploit-guard/enable-network-protection.md index b1e858ebcb..291b023277 100644 --- a/windows/security/threat-protection/windows-defender-exploit-guard/enable-network-protection.md +++ b/windows/security/threat-protection/windows-defender-exploit-guard/enable-network-protection.md @@ -9,8 +9,8 @@ ms.mktglfcycl: manage ms.sitesec: library ms.pagetype: security ms.localizationpriority: medium -author: andreabichsel -ms.author: v-anbic +author: justinha +ms.author: justinha ms.date: 04/01/2019 --- @@ -18,7 +18,7 @@ ms.date: 04/01/2019 **Applies to:** -- [Windows Defender Advanced Threat Protection (Windows Defender ATP)](https://go.microsoft.com/fwlink/p/?linkid=2069559) +- [Microsoft Defender Advanced Threat Protection (Microsoft Defender ATP)](https://go.microsoft.com/fwlink/p/?linkid=2069559) [Network protection](network-protection-exploit-guard.md) helps to prevent employees from using any application to access dangerous domains that may host phishing scams, exploits, and other malicious content on the Internet. You can [audit network protection](evaluate-network-protection.md) in a test environment to see which apps would be blocked before you enable it. diff --git a/windows/security/threat-protection/windows-defender-exploit-guard/enable-virtualization-based-protection-of-code-integrity.md b/windows/security/threat-protection/windows-defender-exploit-guard/enable-virtualization-based-protection-of-code-integrity.md index 8648bcd508..08fe9b44f4 100644 --- a/windows/security/threat-protection/windows-defender-exploit-guard/enable-virtualization-based-protection-of-code-integrity.md +++ b/windows/security/threat-protection/windows-defender-exploit-guard/enable-virtualization-based-protection-of-code-integrity.md @@ -17,7 +17,7 @@ ms.date: 04/01/2019 **Applies to** -- [Windows Defender Advanced Threat Protection (Windows Defender ATP)](https://go.microsoft.com/fwlink/p/?linkid=2069559) +- [Microsoft Defender Advanced Threat Protection (Microsoft Defender ATP)](https://go.microsoft.com/fwlink/p/?linkid=2069559) This topic covers different ways to enable Hypervisor-protected code integrity (HVCI) on Windows 10. Some applications, including device drivers, may be incompatible with HVCI. diff --git a/windows/security/threat-protection/windows-defender-exploit-guard/evaluate-attack-surface-reduction.md b/windows/security/threat-protection/windows-defender-exploit-guard/evaluate-attack-surface-reduction.md index 307b13fd20..83db94a6af 100644 --- a/windows/security/threat-protection/windows-defender-exploit-guard/evaluate-attack-surface-reduction.md +++ b/windows/security/threat-protection/windows-defender-exploit-guard/evaluate-attack-surface-reduction.md @@ -9,8 +9,8 @@ ms.mktglfcycl: manage ms.sitesec: library ms.pagetype: security ms.localizationpriority: medium -author: andreabichsel -ms.author: v-anbic +author: justinha +ms.author: justinha ms.date: 04/02/2019 --- @@ -18,7 +18,7 @@ ms.date: 04/02/2019 **Applies to:** -- [Windows Defender Advanced Threat Protection (Windows Defender ATP)](https://go.microsoft.com/fwlink/p/?linkid=2069559) +- [Microsoft Defender Advanced Threat Protection (Microsoft Defender ATP)](https://go.microsoft.com/fwlink/p/?linkid=2069559) Attack surface reduction rules help prevent actions and apps that are typically used by exploit-seeking malware to infect machines. Attack surface reduction rules are supported on Windows Server 2019 as well as Windows 10 clients. diff --git a/windows/security/threat-protection/windows-defender-exploit-guard/evaluate-controlled-folder-access.md b/windows/security/threat-protection/windows-defender-exploit-guard/evaluate-controlled-folder-access.md index 667c554a43..08847c82c5 100644 --- a/windows/security/threat-protection/windows-defender-exploit-guard/evaluate-controlled-folder-access.md +++ b/windows/security/threat-protection/windows-defender-exploit-guard/evaluate-controlled-folder-access.md @@ -9,8 +9,8 @@ ms.mktglfcycl: manage ms.sitesec: library ms.pagetype: security ms.localizationpriority: medium -author: andreabichsel -ms.author: v-anbic +author: justinha +ms.author: justinha ms.date: 11/16/2018 --- @@ -18,7 +18,7 @@ ms.date: 11/16/2018 **Applies to:** -- [Windows Defender Advanced Threat Protection (Windows Defender ATP)](https://go.microsoft.com/fwlink/p/?linkid=2069559) +- [Microsoft Defender Advanced Threat Protection (Microsoft Defender ATP)](https://go.microsoft.com/fwlink/p/?linkid=2069559) [Controlled folder access](controlled-folders-exploit-guard.md) is a feature that helps protect your documents and files from modification by suspicious or malicious apps. Controlled folder access is supported on Windows Server 2019 as well as Windows 10 clients. @@ -62,5 +62,5 @@ See [Protect important folders with controlled folder access](controlled-folders ## Related topics - [Protect important folders with controlled folder access](controlled-folders-exploit-guard.md) -- [Evaluate Windows Defender ATP](evaluate-windows-defender-exploit-guard.md) +- [Evaluate Microsoft Defender ATP](evaluate-windows-defender-exploit-guard.md) - [Use audit mode](audit-windows-defender-exploit-guard.md) \ No newline at end of file diff --git a/windows/security/threat-protection/windows-defender-exploit-guard/evaluate-exploit-protection.md b/windows/security/threat-protection/windows-defender-exploit-guard/evaluate-exploit-protection.md index 6ae70924c7..64c227f6e5 100644 --- a/windows/security/threat-protection/windows-defender-exploit-guard/evaluate-exploit-protection.md +++ b/windows/security/threat-protection/windows-defender-exploit-guard/evaluate-exploit-protection.md @@ -9,8 +9,8 @@ ms.mktglfcycl: manage ms.sitesec: library ms.pagetype: security ms.localizationpriority: medium -author: andreabichsel -ms.author: v-anbic +author: justinha +ms.author: justinha ms.date: 04/02/2019 --- @@ -18,7 +18,7 @@ ms.date: 04/02/2019 **Applies to:** -- [Windows Defender Advanced Threat Protection (Windows Defender ATP)](https://go.microsoft.com/fwlink/p/?linkid=2069559) +- [Microsoft Defender Advanced Threat Protection (Microsoft Defender ATP)](https://go.microsoft.com/fwlink/p/?linkid=2069559) [Exploit protection](exploit-protection-exploit-guard.md) helps protect devices from malware that uses exploits to spread and infect other devices. It consists of a number of mitigations that can be applied to either the operating system or an individual app. diff --git a/windows/security/threat-protection/windows-defender-exploit-guard/evaluate-network-protection.md b/windows/security/threat-protection/windows-defender-exploit-guard/evaluate-network-protection.md index 74605b559a..a7de3f8d9d 100644 --- a/windows/security/threat-protection/windows-defender-exploit-guard/evaluate-network-protection.md +++ b/windows/security/threat-protection/windows-defender-exploit-guard/evaluate-network-protection.md @@ -9,8 +9,8 @@ ms.mktglfcycl: manage ms.sitesec: library ms.pagetype: security ms.localizationpriority: medium -author: andreabichsel -ms.author: v-anbic +author: justinha +ms.author: justinha ms.date: 04/02/2019 --- @@ -18,7 +18,7 @@ ms.date: 04/02/2019 **Applies to:** -- [Windows Defender Advanced Threat Protection (Windows Defender ATP)](https://go.microsoft.com/fwlink/p/?linkid=2069559) +- [Microsoft Defender Advanced Threat Protection (Microsoft Defender ATP)](https://go.microsoft.com/fwlink/p/?linkid=2069559) [Network protection](network-protection-exploit-guard.md) helps prevent employees from using any application to access dangerous domains that may host phishing scams, exploits, and other malicious content on the Internet. diff --git a/windows/security/threat-protection/windows-defender-exploit-guard/evaluate-windows-defender-exploit-guard.md b/windows/security/threat-protection/windows-defender-exploit-guard/evaluate-windows-defender-exploit-guard.md index ee57054634..8015e81dde 100644 --- a/windows/security/threat-protection/windows-defender-exploit-guard/evaluate-windows-defender-exploit-guard.md +++ b/windows/security/threat-protection/windows-defender-exploit-guard/evaluate-windows-defender-exploit-guard.md @@ -9,8 +9,8 @@ ms.mktglfcycl: manage ms.sitesec: library ms.pagetype: security ms.localizationpriority: medium -author: andreabichsel -ms.author: v-anbic +author: justinha +ms.author: justinha ms.date: 05/30/2018 --- diff --git a/windows/security/threat-protection/windows-defender-exploit-guard/event-views-exploit-guard.md b/windows/security/threat-protection/windows-defender-exploit-guard/event-views-exploit-guard.md index c15f7d5f95..58ecc61775 100644 --- a/windows/security/threat-protection/windows-defender-exploit-guard/event-views-exploit-guard.md +++ b/windows/security/threat-protection/windows-defender-exploit-guard/event-views-exploit-guard.md @@ -10,8 +10,8 @@ ms.sitesec: library ms.pagetype: security ms.date: 04/16/2018 ms.localizationpriority: medium -author: andreabichsel -ms.author: v-anbic +author: justinha +ms.author: justinha ms.date: 03/26/2019 --- @@ -19,7 +19,7 @@ ms.date: 03/26/2019 **Applies to:** -- [Windows Defender Advanced Threat Protection (Windows Defender ATP)](https://go.microsoft.com/fwlink/p/?linkid=2069559) +- [Microsoft Defender Advanced Threat Protection (Microsoft Defender ATP)](https://go.microsoft.com/fwlink/p/?linkid=2069559) You can review attack surface reduction events in Event Viewer. This is useful so you can monitor what rules or settings are working, and determine if any settings are too "noisy" or impacting your day to day workflow. @@ -27,7 +27,7 @@ Reviewing the events is also handy when you are evaluating the features, as you This topic lists all the events, their associated feature or setting, and describes how to create custom views to filter to specific events. -You can also get detailed reporting into events and blocks as part of Windows Security, which you access if you have an E5 subscription and use [Windows Defender Advanced Threat Protection](../windows-defender-atp/windows-defender-advanced-threat-protection.md). +You can also get detailed reporting into events and blocks as part of Windows Security, which you access if you have an E5 subscription and use [Microsoft Defender Advanced Threat Protection](../windows-defender-atp/windows-defender-advanced-threat-protection.md). ## Use custom views to review attack surface reduction capabilities diff --git a/windows/security/threat-protection/windows-defender-exploit-guard/exploit-protection-exploit-guard.md b/windows/security/threat-protection/windows-defender-exploit-guard/exploit-protection-exploit-guard.md index 72869c7925..2f26612542 100644 --- a/windows/security/threat-protection/windows-defender-exploit-guard/exploit-protection-exploit-guard.md +++ b/windows/security/threat-protection/windows-defender-exploit-guard/exploit-protection-exploit-guard.md @@ -9,8 +9,8 @@ ms.mktglfcycl: manage ms.sitesec: library ms.pagetype: security ms.localizationpriority: medium -author: andreabichsel -ms.author: v-anbic +author: justinha +ms.author: justinha ms.date: 04/02/2019 --- @@ -18,7 +18,7 @@ ms.date: 04/02/2019 **Applies to:** -- [Windows Defender Advanced Threat Protection (Windows Defender ATP)](https://go.microsoft.com/fwlink/p/?linkid=2069559) +- [Microsoft Defender Advanced Threat Protection (Microsoft Defender ATP)](https://go.microsoft.com/fwlink/p/?linkid=2069559) Exploit protection automatically applies a number of exploit mitigation techniques to operating system processes and apps. @@ -27,7 +27,7 @@ It is part of [Windows Defender Exploit Guard](windows-defender-exploit-guard.md >[!TIP] >You can visit the Windows Defender Testground website at [demo.wd.microsoft.com](https://demo.wd.microsoft.com?ocid=cx-wddocs-testground) to confirm the feature is working and see how it works. -Exploit protection works best with [Windows Defender Advanced Threat Protection](../windows-defender-atp/windows-defender-advanced-threat-protection.md) - which gives you detailed reporting into exploit protection events and blocks as part of the usual [alert investigation scenarios](../windows-defender-atp/investigate-alerts-windows-defender-advanced-threat-protection.md). +Exploit protection works best with [Microsoft Defender Advanced Threat Protection](../windows-defender-atp/windows-defender-advanced-threat-protection.md) - which gives you detailed reporting into exploit protection events and blocks as part of the usual [alert investigation scenarios](../windows-defender-atp/investigate-alerts-windows-defender-advanced-threat-protection.md). You can [enable exploit protection](enable-exploit-protection.md) on an individual machine, and then use [Group Policy](import-export-exploit-protection-emet-xml.md) to distribute the XML file to multiple devices at once. @@ -79,11 +79,11 @@ Win32K | 260 | Untrusted Font ## Comparison between Enhanced Mitigation Experience Toolkit and Windows Defender Exploit Guard >[!IMPORTANT] ->If you are currently using EMET, you should be aware that [EMET reached end of life on July 31, 2018](https://blogs.technet.microsoft.com/srd/2016/11/03/beyond-emet/). You should consider replacing EMET with exploit protection in Windows Defender ATP. +>If you are currently using EMET, you should be aware that [EMET reached end of life on July 31, 2018](https://blogs.technet.microsoft.com/srd/2016/11/03/beyond-emet/). You should consider replacing EMET with exploit protection in Microsoft Defender ATP. > >You can [convert an existing EMET configuration file into exploit protection](import-export-exploit-protection-emet-xml.md#convert-an-emet-configuration-file-to-an-exploit-protection-configuration-file) to make the migration easier and keep your existing settings. -This section compares exploit protection in Windows Defender ATP with the Enhance Mitigation Experience Toolkit (EMET) for reference. +This section compares exploit protection in Microsoft Defender ATP with the Enhance Mitigation Experience Toolkit (EMET) for reference. The table in this section illustrates the differences between EMET and Windows Defender Exploit Guard.   | Windows Defender Exploit Guard | EMET @@ -102,7 +102,7 @@ Configuration with Group Policy | [!include[Check mark yes](images/svg/check-yes Configuration with shell tools | [!include[Check mark yes](images/svg/check-yes.svg)]
[Use PowerShell to customize and manage configurations](customize-exploit-protection.md#powershell-reference) | [!include[Check mark yes](images/svg/check-yes.svg)]
Requires use of EMET tool (EMET_CONF) System Center Configuration Manager | [!include[Check mark yes](images/svg/check-yes.svg)]
[Use Configuration Manager to customize, deploy, and manage configurations](https://docs.microsoft.com/sccm/protect/deploy-use/create-deploy-exploit-guard-policy) | [!include[Check mark no](images/svg/check-no.svg)]
Not available Microsoft Intune | [!include[Check mark yes](images/svg/check-yes.svg)]
[Use Intune to customize, deploy, and manage configurations](https://docs.microsoft.com/intune/whats-new#window-defender-exploit-guard-is-a-new-set-of-intrusion-prevention-capabilities-for-windows-10----1063615---) | [!include[Check mark no](images/svg/check-no.svg)]
Not available -Reporting | [!include[Check mark yes](images/svg/check-yes.svg)]
With [Windows event logs](event-views-exploit-guard.md) and [full audit mode reporting](audit-windows-defender-exploit-guard.md)
[Full integration with Windows Defender Advanced Threat Protection](../windows-defender-atp/security-analytics-dashboard-windows-defender-advanced-threat-protection.md) | [!include[Check mark yes](images/svg/check-yes.svg)]
Limited Windows event log monitoring +Reporting | [!include[Check mark yes](images/svg/check-yes.svg)]
With [Windows event logs](event-views-exploit-guard.md) and [full audit mode reporting](audit-windows-defender-exploit-guard.md)
[Full integration with Microsoft Defender Advanced Threat Protection](../windows-defender-atp/security-analytics-dashboard-windows-defender-advanced-threat-protection.md) | [!include[Check mark yes](images/svg/check-yes.svg)]
Limited Windows event log monitoring Audit mode | [!include[Check mark yes](images/svg/check-yes.svg)]
[Full audit mode with Windows event reporting](audit-windows-defender-exploit-guard.md) | [!include[Check mark no](images/svg/check-no.svg)]
Limited to EAF, EAF+, and anti-ROP mitigations ([1](#ref1)) Requires an enterprise subscription with Azure Active Directory or a [Software Assurance ID](https://www.microsoft.com/en-us/licensing/licensing-programs/software-assurance-default.aspx). diff --git a/windows/security/threat-protection/windows-defender-exploit-guard/import-export-exploit-protection-emet-xml.md b/windows/security/threat-protection/windows-defender-exploit-guard/import-export-exploit-protection-emet-xml.md index 1be2ff6cb2..3246dc8164 100644 --- a/windows/security/threat-protection/windows-defender-exploit-guard/import-export-exploit-protection-emet-xml.md +++ b/windows/security/threat-protection/windows-defender-exploit-guard/import-export-exploit-protection-emet-xml.md @@ -9,8 +9,8 @@ ms.mktglfcycl: manage ms.sitesec: library ms.pagetype: security ms.localizationpriority: medium -author: andreabichsel -ms.author: v-anbic +author: justinha +ms.author: justinha ms.date: 04/30/2018 --- @@ -18,7 +18,7 @@ ms.date: 04/30/2018 **Applies to:** -- [Windows Defender Advanced Threat Protection (Windows Defender ATP)](https://go.microsoft.com/fwlink/p/?linkid=2069559) +- [Microsoft Defender Advanced Threat Protection (Microsoft Defender ATP)](https://go.microsoft.com/fwlink/p/?linkid=2069559) Exploit protection applies helps protect devices from malware that use exploits to spread and infect. It consists of a number of mitigations that can be applied at either the operating system level, or at the individual app level. diff --git a/windows/security/threat-protection/windows-defender-exploit-guard/memory-integrity.md b/windows/security/threat-protection/windows-defender-exploit-guard/memory-integrity.md index aed6d58094..40ac8a84cd 100644 --- a/windows/security/threat-protection/windows-defender-exploit-guard/memory-integrity.md +++ b/windows/security/threat-protection/windows-defender-exploit-guard/memory-integrity.md @@ -18,7 +18,7 @@ ms.date: 08/09/2018 **Applies to:** -- [Windows Defender Advanced Threat Protection (Windows Defender ATP)](https://go.microsoft.com/fwlink/p/?linkid=2069559) +- [Microsoft Defender Advanced Threat Protection (Microsoft Defender ATP)](https://go.microsoft.com/fwlink/p/?linkid=2069559) Memory integrity is a powerful system mitigation that leverages hardware virtualization and the Windows Hyper-V hypervisor to protect Windows kernel-mode processes against the injection and execution of malicious or unverified code. Code integrity validation is performed in a secure environment that is resistant to attack from malicious software, and page permissions for kernel mode are set and maintained by the Hyper-V hypervisor. Memory integrity helps block many types of malware from running on computers that run Windows 10 and Windows Server 2016. diff --git a/windows/security/threat-protection/windows-defender-exploit-guard/network-protection-exploit-guard.md b/windows/security/threat-protection/windows-defender-exploit-guard/network-protection-exploit-guard.md index 8ffcfaf3cd..e65dcc4777 100644 --- a/windows/security/threat-protection/windows-defender-exploit-guard/network-protection-exploit-guard.md +++ b/windows/security/threat-protection/windows-defender-exploit-guard/network-protection-exploit-guard.md @@ -9,8 +9,8 @@ ms.mktglfcycl: manage ms.sitesec: library ms.pagetype: security ms.localizationpriority: medium -author: andreabichsel -ms.author: v-anbic +author: justinha +ms.author: justinha ms.date: 02/14/2019 --- @@ -18,7 +18,7 @@ ms.date: 02/14/2019 **Applies to:** -- [Windows Defender Advanced Threat Protection (Windows Defender ATP)](https://go.microsoft.com/fwlink/p/?linkid=2069559) +- [Microsoft Defender Advanced Threat Protection (Microsoft Defender ATP)](https://go.microsoft.com/fwlink/p/?linkid=2069559) Network protection helps reduce the attack surface of your devices from Internet-based events. It prevents employees from using any application to access dangerous domains that may host phishing scams, exploits, and other malicious content on the Internet. @@ -29,7 +29,7 @@ Network protection is supported on Windows 10, version 1709 and later and Window >[!TIP] >You can visit the Windows Defender Testground website at [demo.wd.microsoft.com](https://demo.wd.microsoft.com?ocid=cx-wddocs-testground) to confirm the feature is working and see how it works. -Network protection works best with [Windows Defender Advanced Threat Protection](../windows-defender-atp/windows-defender-advanced-threat-protection.md), which gives you detailed reporting into Windows Defender EG events and blocks as part of the usual [alert investigation scenarios](../windows-defender-atp/investigate-alerts-windows-defender-advanced-threat-protection.md). +Network protection works best with [Microsoft Defender Advanced Threat Protection](../windows-defender-atp/windows-defender-advanced-threat-protection.md), which gives you detailed reporting into Windows Defender EG events and blocks as part of the usual [alert investigation scenarios](../windows-defender-atp/investigate-alerts-windows-defender-advanced-threat-protection.md). When network protection blocks a connection, a notification will be displayed from the Action Center. You can [customize the notification](customize-attack-surface-reduction.md#customize-the-notification) with your company details and contact information. You can also enable the rules individually to customize what techniques the feature monitors. @@ -43,11 +43,11 @@ Windows 10 version | Windows Defender Antivirus - | - Windows 10 version 1709 or later | [Windows Defender AV real-time protection](../windows-defender-antivirus/configure-real-time-protection-windows-defender-antivirus.md) and [cloud-delivered protection](../windows-defender-antivirus/enable-cloud-protection-windows-defender-antivirus.md) must be enabled -## Review network protection events in the Windows Defender ATP Security Center +## Review network protection events in the Microsoft Defender ATP Security Center -Windows Defender ATP provides detailed reporting into events and blocks as part of its [alert investigation scenarios](../windows-defender-atp/investigate-alerts-windows-defender-advanced-threat-protection.md). +Microsoft Defender ATP provides detailed reporting into events and blocks as part of its [alert investigation scenarios](../windows-defender-atp/investigate-alerts-windows-defender-advanced-threat-protection.md). -You can query Windows Defender ATP data by using [Advanced hunting](https://docs.microsoft.com/en-us/windows/security/threat-protection/windows-defender-atp/advanced-hunting-windows-defender-advanced-threat-protection). If you're using [audit mode](audit-windows-defender-exploit-guard.md), you can use Advanced hunting to see how network protection settings would affect your environment if they were enabled. +You can query Microsoft Defender ATP data by using [Advanced hunting](https://docs.microsoft.com/en-us/windows/security/threat-protection/windows-defender-atp/advanced-hunting-windows-defender-advanced-threat-protection). If you're using [audit mode](audit-windows-defender-exploit-guard.md), you can use Advanced hunting to see how network protection settings would affect your environment if they were enabled. ## Review network protection events in Windows Event Viewer diff --git a/windows/security/threat-protection/windows-defender-exploit-guard/requirements-and-deployment-planning-guidelines-for-virtualization-based-protection-of-code-integrity.md b/windows/security/threat-protection/windows-defender-exploit-guard/requirements-and-deployment-planning-guidelines-for-virtualization-based-protection-of-code-integrity.md index 514a74a4ea..bd01a47dbb 100644 --- a/windows/security/threat-protection/windows-defender-exploit-guard/requirements-and-deployment-planning-guidelines-for-virtualization-based-protection-of-code-integrity.md +++ b/windows/security/threat-protection/windows-defender-exploit-guard/requirements-and-deployment-planning-guidelines-for-virtualization-based-protection-of-code-integrity.md @@ -17,7 +17,7 @@ ms.date: 10/20/2017 **Applies to** -- [Windows Defender Advanced Threat Protection (Windows Defender ATP)](https://go.microsoft.com/fwlink/p/?linkid=2069559) +- [Microsoft Defender Advanced Threat Protection (Microsoft Defender ATP)](https://go.microsoft.com/fwlink/p/?linkid=2069559) Computers must meet certain hardware, firmware, and software requirements in order to take adavantage of all of the virtualization-based security (VBS) features in [Windows Defender Device Guard](../device-guard/introduction-to-device-guard-virtualization-based-security-and-windows-defender-application-control.md). Computers lacking these requirements can still be protected by Windows Defender Application Control (WDAC) policies—the difference is that those computers will not be as hardened against certain threats. diff --git a/windows/security/threat-protection/windows-defender-exploit-guard/troubleshoot-asr.md b/windows/security/threat-protection/windows-defender-exploit-guard/troubleshoot-asr.md index 0eea5319db..d1f516eacc 100644 --- a/windows/security/threat-protection/windows-defender-exploit-guard/troubleshoot-asr.md +++ b/windows/security/threat-protection/windows-defender-exploit-guard/troubleshoot-asr.md @@ -9,8 +9,8 @@ ms.mktglfcycl: manage ms.sitesec: library ms.pagetype: security ms.localizationpriority: medium -author: andreabichsel -ms.author: v-anbic +author: justinha +ms.author: justinha ms.date: 03/27/2019 --- @@ -18,7 +18,7 @@ ms.date: 03/27/2019 **Applies to:** -- [Windows Defender Advanced Threat Protection (Windows Defender ATP)](https://go.microsoft.com/fwlink/p/?linkid=2069559) +- [Microsoft Defender Advanced Threat Protection (Microsoft Defender ATP)](https://go.microsoft.com/fwlink/p/?linkid=2069559) When you use [attack surface reduction rules](attack-surface-reduction-exploit-guard.md) you may encounter issues, such as: diff --git a/windows/security/threat-protection/windows-defender-exploit-guard/troubleshoot-exploit-protection-mitigations.md b/windows/security/threat-protection/windows-defender-exploit-guard/troubleshoot-exploit-protection-mitigations.md index 7820eac52f..e8e2f3e46b 100644 --- a/windows/security/threat-protection/windows-defender-exploit-guard/troubleshoot-exploit-protection-mitigations.md +++ b/windows/security/threat-protection/windows-defender-exploit-guard/troubleshoot-exploit-protection-mitigations.md @@ -9,8 +9,8 @@ ms.mktglfcycl: manage ms.sitesec: library ms.pagetype: security ms.localizationpriority: medium -author: andreabichsel -ms.author: v-anbic +author: justinha +ms.author: justinha ms.date: 08/09/2018 --- @@ -18,7 +18,7 @@ ms.date: 08/09/2018 **Applies to:** -- [Windows Defender Advanced Threat Protection (Windows Defender ATP)](https://go.microsoft.com/fwlink/p/?linkid=2069559) +- [Microsoft Defender Advanced Threat Protection (Microsoft Defender ATP)](https://go.microsoft.com/fwlink/p/?linkid=2069559) When you create a set of exploit protection mitigations (known as a configuration), you might find that the configuration export and import process does not remove all unwanted mitigations. diff --git a/windows/security/threat-protection/windows-defender-exploit-guard/troubleshoot-np.md b/windows/security/threat-protection/windows-defender-exploit-guard/troubleshoot-np.md index 708142ccf5..40c261016a 100644 --- a/windows/security/threat-protection/windows-defender-exploit-guard/troubleshoot-np.md +++ b/windows/security/threat-protection/windows-defender-exploit-guard/troubleshoot-np.md @@ -9,8 +9,8 @@ ms.mktglfcycl: manage ms.sitesec: library ms.pagetype: security ms.localizationpriority: medium -author: andreabichsel -ms.author: v-anbic +author: justinha +ms.author: justinha ms.date: 03/27/2019 --- @@ -18,7 +18,7 @@ ms.date: 03/27/2019 **Applies to:** -- [Windows Defender Advanced Threat Protection (Windows Defender ATP)](https://go.microsoft.com/fwlink/p/?linkid=2069559) +- [Microsoft Defender Advanced Threat Protection (Microsoft Defender ATP)](https://go.microsoft.com/fwlink/p/?linkid=2069559) - IT administrators diff --git a/windows/security/threat-protection/windows-defender-exploit-guard/windows-defender-exploit-guard.md b/windows/security/threat-protection/windows-defender-exploit-guard/windows-defender-exploit-guard.md index 32055b2546..cd2b47c9fe 100644 --- a/windows/security/threat-protection/windows-defender-exploit-guard/windows-defender-exploit-guard.md +++ b/windows/security/threat-protection/windows-defender-exploit-guard/windows-defender-exploit-guard.md @@ -9,8 +9,8 @@ ms.mktglfcycl: manage ms.sitesec: library ms.pagetype: security ms.localizationpriority: medium -author: andreabichsel -ms.author: v-anbic +author: justinha +ms.author: justinha ms.date: 08/09/2018 --- @@ -18,7 +18,7 @@ ms.date: 08/09/2018 **Applies to:** -- [Windows Defender Advanced Threat Protection (Windows Defender ATP)](https://go.microsoft.com/fwlink/p/?linkid=2069559) +- [Microsoft Defender Advanced Threat Protection (Microsoft Defender ATP)](https://go.microsoft.com/fwlink/p/?linkid=2069559) Windows Defender Exploit Guard (Windows Defender EG) is a new set of host intrusion prevention capabilities for Windows 10, allowing you to manage and reduce the attack surface of apps used by your employees. @@ -43,9 +43,9 @@ You can also [enable audit mode](audit-windows-defender-exploit-guard.md) for th >[!TIP] >You can also visit the Windows Defender Testground website at [demo.wd.microsoft.com](https://demo.wd.microsoft.com?ocid=cx-wddocs-testground) to confirm the features are working and see how each of them work. -Windows Defender EG can be managed and reported on in the Windows Security app as part of the Windows Defender Advanced Threat Protection suite of threat mitigation, preventing, protection, and analysis technologies. +Windows Defender EG can be managed and reported on in the Windows Security app as part of the Microsoft Defender Advanced Threat Protection suite of threat mitigation, preventing, protection, and analysis technologies. -You can use the Windows Security app to obtain detailed reporting into events and blocks as part of the usual [alert investigation scenarios](../windows-defender-atp/investigate-alerts-windows-defender-advanced-threat-protection.md). You can [sign up for a free trial of Windows Defender ATP](https://www.microsoft.com/en-us/WindowsForBusiness/windows-atp?ocid=cx-docs-msa4053440) to see how it works. +You can use the Windows Security app to obtain detailed reporting into events and blocks as part of the usual [alert investigation scenarios](../windows-defender-atp/investigate-alerts-windows-defender-advanced-threat-protection.md). You can [sign up for a free trial of Microsoft Defender ATP](https://www.microsoft.com/en-us/WindowsForBusiness/windows-atp?ocid=cx-docs-msa4053440) to see how it works. ## Requirements @@ -55,7 +55,7 @@ This section covers requirements for each feature in Windows Defender EG. |--------|---------| | ![not supported](./images/ball_empty.png) | Not supported | | ![supported](./images/ball_50.png) | Supported | -| ![supported, full reporting](./images/ball_full.png) | Recommended. Includes full, automated reporting into the Windows Defender ATP console. Provides additional cloud-powered capabilities, including the Network protection ability to block apps from accessing low-reputation websites and an attack surface reduction rule that blocks executable files that meet age or prevalence criteria.| +| ![supported, full reporting](./images/ball_full.png) | Recommended. Includes full, automated reporting into the Microsoft Defender ATP console. Provides additional cloud-powered capabilities, including the Network protection ability to block apps from accessing low-reputation websites and an attack surface reduction rule that blocks executable files that meet age or prevalence criteria.| | Feature | Windows 10 Home | Windows 10 Professional | Windows 10 E3 | Windows 10 E5 | | ----------------- | :------------------------------------: | :---------------------------: | :-------------------------: | :--------------------------------------: | From c75688a5863194392fdab581889545968bca9716 Mon Sep 17 00:00:00 2001 From: Joey Caparas Date: Wed, 10 Apr 2019 15:34:41 -0700 Subject: [PATCH 147/724] update all product names and author in av folder --- ...llect-diagnostic-data-update-compliance.md | 4 +-- ...ne-arguments-windows-defender-antivirus.md | 4 +-- ...nt-reference-windows-defender-antivirus.md | 4 +-- ...d-scan-types-windows-defender-antivirus.md | 4 +-- ...-first-sight-windows-defender-antivirus.md | 6 ++--- ...meout-period-windows-defender-antivirus.md | 4 +-- ...-interaction-windows-defender-antivirus.md | 4 +-- ...e-exclusions-windows-defender-antivirus.md | 4 +-- ...e-exclusions-windows-defender-antivirus.md | 4 +-- ...cy-overrides-windows-defender-antivirus.md | 4 +-- ...-connections-windows-defender-antivirus.md | 6 ++--- ...otifications-windows-defender-antivirus.md | 4 +-- ...e-exclusions-windows-defender-antivirus.md | 4 +-- ...ion-features-windows-defender-antivirus.md | 4 +-- ...e-protection-windows-defender-antivirus.md | 4 +-- ...-remediation-windows-defender-antivirus.md | 4 +-- ...r-exclusions-windows-defender-antivirus.md | 4 +-- ...ure-windows-defender-antivirus-features.md | 4 +-- ...ediate-scans-windows-defender-antivirus.md | 4 +-- ...anage-report-windows-defender-antivirus.md | 4 +-- .../deploy-windows-defender-antivirus.md | 4 +-- ...ployment-vdi-windows-defender-antivirus.md | 4 +-- ...nwanted-apps-windows-defender-antivirus.md | 6 ++--- ...d-protection-windows-defender-antivirus.md | 4 +-- .../evaluate-windows-defender-antivirus.md | 6 ++--- ...dic-scanning-windows-defender-antivirus.md | 4 +-- ...ased-updates-windows-defender-antivirus.md | 4 +-- ...ed-endpoints-windows-defender-antivirus.md | 4 +-- ...ate-schedule-windows-defender-antivirus.md | 4 +-- ...tion-updates-windows-defender-antivirus.md | 4 +-- ...es-baselines-windows-defender-antivirus.md | 4 +-- ...-devices-vms-windows-defender-antivirus.md | 4 +-- .../microsoft-defender-atp-mac.md | 26 +++++++++---------- .../windows-defender-antivirus/oldTOC.md | 2 +- ...-interaction-windows-defender-antivirus.md | 6 ++--- ...port-monitor-windows-defender-antivirus.md | 4 +-- ...ntined-files-windows-defender-antivirus.md | 4 +-- ...scan-results-windows-defender-antivirus.md | 4 +-- .../run-scan-windows-defender-antivirus.md | 4 +-- ...tch-up-scans-windows-defender-antivirus.md | 4 +-- ...ection-level-windows-defender-antivirus.md | 4 +-- .../troubleshoot-reporting.md | 4 +-- ...troubleshoot-windows-defender-antivirus.md | 6 ++--- ...group-policy-windows-defender-antivirus.md | 4 +-- ...nfig-manager-windows-defender-antivirus.md | 4 +-- ...hell-cmdlets-windows-defender-antivirus.md | 4 +-- .../use-wmi-windows-defender-antivirus.md | 4 +-- ...d-protection-windows-defender-antivirus.md | 4 +-- ...indows-defender-antivirus-compatibility.md | 16 ++++++------ ...indows-defender-antivirus-in-windows-10.md | 4 +-- ...fender-antivirus-on-windows-server-2016.md | 4 +-- .../windows-defender-offline.md | 4 +-- ...dows-defender-security-center-antivirus.md | 6 ++--- 53 files changed, 129 insertions(+), 129 deletions(-) diff --git a/windows/security/threat-protection/windows-defender-antivirus/collect-diagnostic-data-update-compliance.md b/windows/security/threat-protection/windows-defender-antivirus/collect-diagnostic-data-update-compliance.md index 61bd6e91de..d1d493ca47 100644 --- a/windows/security/threat-protection/windows-defender-antivirus/collect-diagnostic-data-update-compliance.md +++ b/windows/security/threat-protection/windows-defender-antivirus/collect-diagnostic-data-update-compliance.md @@ -9,7 +9,7 @@ ms.mktglfcycl: manage ms.sitesec: library ms.pagetype: security ms.localizationpriority: medium -author: andreabichsel +author: justinha ms.author: v-anbic ms.date: 09/03/2018 --- @@ -18,7 +18,7 @@ ms.date: 09/03/2018 **Applies to:** -- [Windows Defender Advanced Threat Protection (Windows Defender ATP)](https://go.microsoft.com/fwlink/p/?linkid=2069559) +- [Microsoft Defender Advanced Threat Protection (Microsoft Defender ATP)](https://go.microsoft.com/fwlink/p/?linkid=2069559) This topic describes how to collect diagnostic data that can be used by Microsoft support and engineering teams to help troubleshoot issues you may encounter when using the Windows Defender AV Assessment section in the Update Compliance add-in. diff --git a/windows/security/threat-protection/windows-defender-antivirus/command-line-arguments-windows-defender-antivirus.md b/windows/security/threat-protection/windows-defender-antivirus/command-line-arguments-windows-defender-antivirus.md index 2d08b48bfe..c27ea9d49d 100644 --- a/windows/security/threat-protection/windows-defender-antivirus/command-line-arguments-windows-defender-antivirus.md +++ b/windows/security/threat-protection/windows-defender-antivirus/command-line-arguments-windows-defender-antivirus.md @@ -9,7 +9,7 @@ ms.mktglfcycl: manage ms.sitesec: library ms.pagetype: security ms.localizationpriority: medium -author: andreabichsel +author: justinha ms.author: v-anbic ms.date: 12/10/2018 --- @@ -18,7 +18,7 @@ ms.date: 12/10/2018 **Applies to:** -- [Windows Defender Advanced Threat Protection (Windows Defender ATP)](https://go.microsoft.com/fwlink/p/?linkid=2069559) +- [Microsoft Defender Advanced Threat Protection (Microsoft Defender ATP)](https://go.microsoft.com/fwlink/p/?linkid=2069559) You can perform various Windows Defender Antivirus functions with the dedicated command-line tool mpcmdrun.exe. diff --git a/windows/security/threat-protection/windows-defender-antivirus/configuration-management-reference-windows-defender-antivirus.md b/windows/security/threat-protection/windows-defender-antivirus/configuration-management-reference-windows-defender-antivirus.md index b2246f6bc2..901c6c4995 100644 --- a/windows/security/threat-protection/windows-defender-antivirus/configuration-management-reference-windows-defender-antivirus.md +++ b/windows/security/threat-protection/windows-defender-antivirus/configuration-management-reference-windows-defender-antivirus.md @@ -9,7 +9,7 @@ ms.mktglfcycl: manage ms.sitesec: library ms.pagetype: security ms.localizationpriority: medium -author: andreabichsel +author: justinha ms.author: v-anbic ms.date: 09/03/2018 --- @@ -18,7 +18,7 @@ ms.date: 09/03/2018 **Applies to:** -- [Windows Defender Advanced Threat Protection (Windows Defender ATP)](https://go.microsoft.com/fwlink/p/?linkid=2069559) +- [Microsoft Defender Advanced Threat Protection (Microsoft Defender ATP)](https://go.microsoft.com/fwlink/p/?linkid=2069559) You can manage and configure Windows Defender Antivirus with the following tools: diff --git a/windows/security/threat-protection/windows-defender-antivirus/configure-advanced-scan-types-windows-defender-antivirus.md b/windows/security/threat-protection/windows-defender-antivirus/configure-advanced-scan-types-windows-defender-antivirus.md index 5714563915..88526a1351 100644 --- a/windows/security/threat-protection/windows-defender-antivirus/configure-advanced-scan-types-windows-defender-antivirus.md +++ b/windows/security/threat-protection/windows-defender-antivirus/configure-advanced-scan-types-windows-defender-antivirus.md @@ -9,7 +9,7 @@ ms.mktglfcycl: manage ms.sitesec: library ms.pagetype: security ms.localizationpriority: medium -author: andreabichsel +author: justinha ms.author: v-anbic ms.date: 10/25/2018 @@ -19,7 +19,7 @@ ms.date: 10/25/2018 **Applies to:** -- [Windows Defender Advanced Threat Protection (Windows Defender ATP)](https://go.microsoft.com/fwlink/p/?linkid=2069559) +- [Microsoft Defender Advanced Threat Protection (Microsoft Defender ATP)](https://go.microsoft.com/fwlink/p/?linkid=2069559) **Use Microsoft Intune to configure scanning options** diff --git a/windows/security/threat-protection/windows-defender-antivirus/configure-block-at-first-sight-windows-defender-antivirus.md b/windows/security/threat-protection/windows-defender-antivirus/configure-block-at-first-sight-windows-defender-antivirus.md index b5d15d6b55..de780c12e7 100644 --- a/windows/security/threat-protection/windows-defender-antivirus/configure-block-at-first-sight-windows-defender-antivirus.md +++ b/windows/security/threat-protection/windows-defender-antivirus/configure-block-at-first-sight-windows-defender-antivirus.md @@ -9,7 +9,7 @@ ms.mktglfcycl: manage ms.sitesec: library ms.pagetype: security ms.localizationpriority: medium -author: andreabichsel +author: justinha ms.author: v-anbic ms.date: 09/03/2018 --- @@ -18,7 +18,7 @@ ms.date: 09/03/2018 **Applies to:** -- [Windows Defender Advanced Threat Protection (Windows Defender ATP)](https://go.microsoft.com/fwlink/p/?linkid=2069559) +- [Microsoft Defender Advanced Threat Protection (Microsoft Defender ATP)](https://go.microsoft.com/fwlink/p/?linkid=2069559) Block at first sight is a feature of next gen protection that provides a way to detect and block new malware within seconds. @@ -32,7 +32,7 @@ You can also [customize the message displayed on users' desktops](https://docs.m > There is no specific individual setting in System Center Configuration Manager to enable or disable block at first sight. It is enabled by default when the pre-requisite settings are configured correctly. You must use Group Policy settings to enable or disable the feature. >[!TIP] ->You can also visit the Windows Defender ATP demo website at [demo.wd.microsoft.com](https://demo.wd.microsoft.com?ocid=cx-wddocs-testground) to confirm the features are working and see how they work. +>You can also visit the Microsoft Defender ATP demo website at [demo.wd.microsoft.com](https://demo.wd.microsoft.com?ocid=cx-wddocs-testground) to confirm the features are working and see how they work. ## How it works diff --git a/windows/security/threat-protection/windows-defender-antivirus/configure-cloud-block-timeout-period-windows-defender-antivirus.md b/windows/security/threat-protection/windows-defender-antivirus/configure-cloud-block-timeout-period-windows-defender-antivirus.md index d7ffbcbafd..1db5465f6e 100644 --- a/windows/security/threat-protection/windows-defender-antivirus/configure-cloud-block-timeout-period-windows-defender-antivirus.md +++ b/windows/security/threat-protection/windows-defender-antivirus/configure-cloud-block-timeout-period-windows-defender-antivirus.md @@ -9,7 +9,7 @@ ms.mktglfcycl: manage ms.sitesec: library ms.pagetype: security ms.localizationpriority: medium -author: andreabichsel +author: justinha ms.author: v-anbic ms.date: 09/03/2018 --- @@ -18,7 +18,7 @@ ms.date: 09/03/2018 **Applies to:** -- [Windows Defender Advanced Threat Protection (Windows Defender ATP)](https://go.microsoft.com/fwlink/p/?linkid=2069559) +- [Microsoft Defender Advanced Threat Protection (Microsoft Defender ATP)](https://go.microsoft.com/fwlink/p/?linkid=2069559) When Windows Defender Antivirus finds a suspicious file, it can prevent the file from running while it queries the [Windows Defender Antivirus cloud service](utilize-microsoft-cloud-protection-windows-defender-antivirus.md). diff --git a/windows/security/threat-protection/windows-defender-antivirus/configure-end-user-interaction-windows-defender-antivirus.md b/windows/security/threat-protection/windows-defender-antivirus/configure-end-user-interaction-windows-defender-antivirus.md index d72265f76a..bc655530db 100644 --- a/windows/security/threat-protection/windows-defender-antivirus/configure-end-user-interaction-windows-defender-antivirus.md +++ b/windows/security/threat-protection/windows-defender-antivirus/configure-end-user-interaction-windows-defender-antivirus.md @@ -9,7 +9,7 @@ ms.mktglfcycl: manage ms.sitesec: library ms.pagetype: security ms.localizationpriority: medium -author: andreabichsel +author: justinha ms.author: v-anbic ms.date: 09/03/2018 --- @@ -18,7 +18,7 @@ ms.date: 09/03/2018 **Applies to:** -- [Windows Defender Advanced Threat Protection (Windows Defender ATP)](https://go.microsoft.com/fwlink/p/?linkid=2069559) +- [Microsoft Defender Advanced Threat Protection (Microsoft Defender ATP)](https://go.microsoft.com/fwlink/p/?linkid=2069559) You can configure how users of the endpoints on your network can interact with Windows Defender Antivirus. diff --git a/windows/security/threat-protection/windows-defender-antivirus/configure-exclusions-windows-defender-antivirus.md b/windows/security/threat-protection/windows-defender-antivirus/configure-exclusions-windows-defender-antivirus.md index 430acbec64..354dd5cf6b 100644 --- a/windows/security/threat-protection/windows-defender-antivirus/configure-exclusions-windows-defender-antivirus.md +++ b/windows/security/threat-protection/windows-defender-antivirus/configure-exclusions-windows-defender-antivirus.md @@ -9,7 +9,7 @@ ms.mktglfcycl: manage ms.sitesec: library ms.pagetype: security ms.localizationpriority: medium -author: andreabichsel +author: justinha ms.author: v-anbic ms.date: 09/03/2018 --- @@ -18,7 +18,7 @@ ms.date: 09/03/2018 **Applies to:** -- [Windows Defender Advanced Threat Protection (Windows Defender ATP)](https://go.microsoft.com/fwlink/p/?linkid=2069559) +- [Microsoft Defender Advanced Threat Protection (Microsoft Defender ATP)](https://go.microsoft.com/fwlink/p/?linkid=2069559) You can exclude certain files, folders, processes, and process-opened files from Windows Defender Antivirus scans. diff --git a/windows/security/threat-protection/windows-defender-antivirus/configure-extension-file-exclusions-windows-defender-antivirus.md b/windows/security/threat-protection/windows-defender-antivirus/configure-extension-file-exclusions-windows-defender-antivirus.md index 78351fac00..7250b72a17 100644 --- a/windows/security/threat-protection/windows-defender-antivirus/configure-extension-file-exclusions-windows-defender-antivirus.md +++ b/windows/security/threat-protection/windows-defender-antivirus/configure-extension-file-exclusions-windows-defender-antivirus.md @@ -9,7 +9,7 @@ ms.mktglfcycl: manage ms.sitesec: library ms.pagetype: security ms.localizationpriority: medium -author: andreabichsel +author: justinha ms.author: v-anbic ms.date: 12/10/2018 --- @@ -18,7 +18,7 @@ ms.date: 12/10/2018 **Applies to:** -- [Windows Defender Advanced Threat Protection (Windows Defender ATP)](https://go.microsoft.com/fwlink/p/?linkid=2069559) +- [Microsoft Defender Advanced Threat Protection (Microsoft Defender ATP)](https://go.microsoft.com/fwlink/p/?linkid=2069559) You can exclude certain files from Windows Defender Antivirus scans by modifying exclusion lists. diff --git a/windows/security/threat-protection/windows-defender-antivirus/configure-local-policy-overrides-windows-defender-antivirus.md b/windows/security/threat-protection/windows-defender-antivirus/configure-local-policy-overrides-windows-defender-antivirus.md index 9feb4b7840..3670b50c42 100644 --- a/windows/security/threat-protection/windows-defender-antivirus/configure-local-policy-overrides-windows-defender-antivirus.md +++ b/windows/security/threat-protection/windows-defender-antivirus/configure-local-policy-overrides-windows-defender-antivirus.md @@ -9,7 +9,7 @@ ms.mktglfcycl: manage ms.sitesec: library ms.pagetype: security ms.localizationpriority: medium -author: andreabichsel +author: justinha ms.author: v-anbic ms.date: 09/03/2018 --- @@ -18,7 +18,7 @@ ms.date: 09/03/2018 **Applies to:** -- [Windows Defender Advanced Threat Protection (Windows Defender ATP)](https://go.microsoft.com/fwlink/p/?linkid=2069559) +- [Microsoft Defender Advanced Threat Protection (Microsoft Defender ATP)](https://go.microsoft.com/fwlink/p/?linkid=2069559) By default, Windows Defender Antivirus settings that are deployed via a Group Policy Object to the endpoints in your network will prevent users from locally changing the settings. You can change this in some instances. diff --git a/windows/security/threat-protection/windows-defender-antivirus/configure-network-connections-windows-defender-antivirus.md b/windows/security/threat-protection/windows-defender-antivirus/configure-network-connections-windows-defender-antivirus.md index 71db8e1517..b895c48fac 100644 --- a/windows/security/threat-protection/windows-defender-antivirus/configure-network-connections-windows-defender-antivirus.md +++ b/windows/security/threat-protection/windows-defender-antivirus/configure-network-connections-windows-defender-antivirus.md @@ -9,7 +9,7 @@ ms.mktglfcycl: manage ms.sitesec: library ms.pagetype: security ms.localizationpriority: medium -author: andreabichsel +author: justinha ms.author: v-anbic ms.date: 10/08/2018 --- @@ -18,7 +18,7 @@ ms.date: 10/08/2018 **Applies to:** -- [Windows Defender Advanced Threat Protection (Windows Defender ATP)](https://go.microsoft.com/fwlink/p/?linkid=2069559) +- [Microsoft Defender Advanced Threat Protection (Microsoft Defender ATP)](https://go.microsoft.com/fwlink/p/?linkid=2069559) To ensure Windows Defender Antivirus cloud-delivered protection works properly, you need to configure your network to allow connections between your endpoints and certain Microsoft servers. @@ -27,7 +27,7 @@ This topic lists the connections that must be allowed, such as by using firewall See the Enterprise Mobility and Security blog post [Important changes to Microsoft Active Protection Services endpoint](https://blogs.technet.microsoft.com/enterprisemobility/2016/05/31/important-changes-to-microsoft-active-protection-service-maps-endpoint/) for some details about network connectivity. >[!TIP] ->You can also visit the Windows Defender ATP demo website at [demo.wd.microsoft.com](https://demo.wd.microsoft.com?ocid=cx-wddocs-testground) to confirm the following features are working: +>You can also visit the Microsoft Defender ATP demo website at [demo.wd.microsoft.com](https://demo.wd.microsoft.com?ocid=cx-wddocs-testground) to confirm the following features are working: > >- Cloud-delivered protection >- Fast learning (including block at first sight) diff --git a/windows/security/threat-protection/windows-defender-antivirus/configure-notifications-windows-defender-antivirus.md b/windows/security/threat-protection/windows-defender-antivirus/configure-notifications-windows-defender-antivirus.md index 9874e1fe22..4da87e4759 100644 --- a/windows/security/threat-protection/windows-defender-antivirus/configure-notifications-windows-defender-antivirus.md +++ b/windows/security/threat-protection/windows-defender-antivirus/configure-notifications-windows-defender-antivirus.md @@ -9,7 +9,7 @@ ms.mktglfcycl: manage ms.sitesec: library ms.pagetype: security ms.localizationpriority: medium -author: andreabichsel +author: justinha ms.author: v-anbic ms.date: 09/03/2018 --- @@ -18,7 +18,7 @@ ms.date: 09/03/2018 **Applies to:** -- [Windows Defender Advanced Threat Protection (Windows Defender ATP)](https://go.microsoft.com/fwlink/p/?linkid=2069559) +- [Microsoft Defender Advanced Threat Protection (Microsoft Defender ATP)](https://go.microsoft.com/fwlink/p/?linkid=2069559) In Windows 10, application notifications about malware detection and remediation are more robust, consistent, and concise. diff --git a/windows/security/threat-protection/windows-defender-antivirus/configure-process-opened-file-exclusions-windows-defender-antivirus.md b/windows/security/threat-protection/windows-defender-antivirus/configure-process-opened-file-exclusions-windows-defender-antivirus.md index 15f82314e7..0d029074a7 100644 --- a/windows/security/threat-protection/windows-defender-antivirus/configure-process-opened-file-exclusions-windows-defender-antivirus.md +++ b/windows/security/threat-protection/windows-defender-antivirus/configure-process-opened-file-exclusions-windows-defender-antivirus.md @@ -9,7 +9,7 @@ ms.mktglfcycl: manage ms.sitesec: library ms.pagetype: security ms.localizationpriority: medium -author: andreabichsel +author: justinha ms.author: v-anbic ms.date: 12/10/2018 --- @@ -18,7 +18,7 @@ ms.date: 12/10/2018 **Applies to:** -- [Windows Defender Advanced Threat Protection (Windows Defender ATP)](https://go.microsoft.com/fwlink/p/?linkid=2069559) +- [Microsoft Defender Advanced Threat Protection (Microsoft Defender ATP)](https://go.microsoft.com/fwlink/p/?linkid=2069559) You can exclude files that have been opened by specific processes from Windows Defender Antivirus scans. diff --git a/windows/security/threat-protection/windows-defender-antivirus/configure-protection-features-windows-defender-antivirus.md b/windows/security/threat-protection/windows-defender-antivirus/configure-protection-features-windows-defender-antivirus.md index de47e8d1a8..3c50b7b45c 100644 --- a/windows/security/threat-protection/windows-defender-antivirus/configure-protection-features-windows-defender-antivirus.md +++ b/windows/security/threat-protection/windows-defender-antivirus/configure-protection-features-windows-defender-antivirus.md @@ -9,7 +9,7 @@ ms.mktglfcycl: manage ms.sitesec: library ms.pagetype: security ms.localizationpriority: medium -author: andreabichsel +author: justinha ms.author: v-anbic ms.date: 09/03/2018 --- @@ -18,7 +18,7 @@ ms.date: 09/03/2018 **Applies to:** -- [Windows Defender Advanced Threat Protection (Windows Defender ATP)](https://go.microsoft.com/fwlink/p/?linkid=2069559) +- [Microsoft Defender Advanced Threat Protection (Microsoft Defender ATP)](https://go.microsoft.com/fwlink/p/?linkid=2069559) Windows Defender Antivirus uses several methods to provide threat protection: diff --git a/windows/security/threat-protection/windows-defender-antivirus/configure-real-time-protection-windows-defender-antivirus.md b/windows/security/threat-protection/windows-defender-antivirus/configure-real-time-protection-windows-defender-antivirus.md index 84cef362eb..594dcb0971 100644 --- a/windows/security/threat-protection/windows-defender-antivirus/configure-real-time-protection-windows-defender-antivirus.md +++ b/windows/security/threat-protection/windows-defender-antivirus/configure-real-time-protection-windows-defender-antivirus.md @@ -9,7 +9,7 @@ ms.mktglfcycl: manage ms.sitesec: library ms.pagetype: security ms.localizationpriority: medium -author: andreabichsel +author: justinha ms.author: v-anbic ms.date: 11/13/2018 --- @@ -18,7 +18,7 @@ ms.date: 11/13/2018 **Applies to:** -- [Windows Defender Advanced Threat Protection (Windows Defender ATP)](https://go.microsoft.com/fwlink/p/?linkid=2069559) +- [Microsoft Defender Advanced Threat Protection (Microsoft Defender ATP)](https://go.microsoft.com/fwlink/p/?linkid=2069559) Always-on protection consists of real-time protection, behavior monitoring, and heuristics to identify malware based on known suspicious and malicious activities. diff --git a/windows/security/threat-protection/windows-defender-antivirus/configure-remediation-windows-defender-antivirus.md b/windows/security/threat-protection/windows-defender-antivirus/configure-remediation-windows-defender-antivirus.md index d09e59a96a..7d76d8a3ca 100644 --- a/windows/security/threat-protection/windows-defender-antivirus/configure-remediation-windows-defender-antivirus.md +++ b/windows/security/threat-protection/windows-defender-antivirus/configure-remediation-windows-defender-antivirus.md @@ -9,7 +9,7 @@ ms.mktglfcycl: manage ms.sitesec: library ms.pagetype: security ms.localizationpriority: medium -author: andreabichsel +author: justinha ms.author: v-anbic ms.date: 09/03/2018 --- @@ -18,7 +18,7 @@ ms.date: 09/03/2018 **Applies to:** -- [Windows Defender Advanced Threat Protection (Windows Defender ATP)](https://go.microsoft.com/fwlink/p/?linkid=2069559) +- [Microsoft Defender Advanced Threat Protection (Microsoft Defender ATP)](https://go.microsoft.com/fwlink/p/?linkid=2069559) When Windows Defender Antivirus runs a scan, it will attempt to remediate or remove threats that it finds. You can configure how Windows Defender Antivirus should react to certain threats, whether it should create a restore point before remediating, and when it should remove remediated threats. diff --git a/windows/security/threat-protection/windows-defender-antivirus/configure-server-exclusions-windows-defender-antivirus.md b/windows/security/threat-protection/windows-defender-antivirus/configure-server-exclusions-windows-defender-antivirus.md index 64037f0090..c56a79193a 100644 --- a/windows/security/threat-protection/windows-defender-antivirus/configure-server-exclusions-windows-defender-antivirus.md +++ b/windows/security/threat-protection/windows-defender-antivirus/configure-server-exclusions-windows-defender-antivirus.md @@ -9,7 +9,7 @@ ms.mktglfcycl: manage ms.sitesec: library ms.pagetype: security ms.localizationpriority: medium -author: andreabichsel +author: justinha ms.author: v-anbic --- @@ -17,7 +17,7 @@ ms.author: v-anbic **Applies to:** -- [Windows Defender Advanced Threat Protection (Windows Defender ATP)](https://go.microsoft.com/fwlink/p/?linkid=2069559) +- [Microsoft Defender Advanced Threat Protection (Microsoft Defender ATP)](https://go.microsoft.com/fwlink/p/?linkid=2069559) Windows Defender Antivirus on Windows Server 2016 computers automatically enrolls you in certain exclusions, as defined by your specified server role. See [the end of this topic](#list-of-automatic-exclusions) for a list of these exclusions. diff --git a/windows/security/threat-protection/windows-defender-antivirus/configure-windows-defender-antivirus-features.md b/windows/security/threat-protection/windows-defender-antivirus/configure-windows-defender-antivirus-features.md index 862b5513c4..168cab8841 100644 --- a/windows/security/threat-protection/windows-defender-antivirus/configure-windows-defender-antivirus-features.md +++ b/windows/security/threat-protection/windows-defender-antivirus/configure-windows-defender-antivirus-features.md @@ -9,7 +9,7 @@ ms.mktglfcycl: manage ms.sitesec: library ms.pagetype: security ms.localizationpriority: medium -author: andreabichsel +author: justinha ms.author: v-anbic ms.date: 09/03/2018 --- @@ -18,7 +18,7 @@ ms.date: 09/03/2018 **Applies to:** -- [Windows Defender Advanced Threat Protection (Windows Defender ATP)](https://go.microsoft.com/fwlink/p/?linkid=2069559) +- [Microsoft Defender Advanced Threat Protection (Microsoft Defender ATP)](https://go.microsoft.com/fwlink/p/?linkid=2069559) You can configure Windows Defender Antivirus with a number of tools, including: diff --git a/windows/security/threat-protection/windows-defender-antivirus/customize-run-review-remediate-scans-windows-defender-antivirus.md b/windows/security/threat-protection/windows-defender-antivirus/customize-run-review-remediate-scans-windows-defender-antivirus.md index b719577c49..ee7a843321 100644 --- a/windows/security/threat-protection/windows-defender-antivirus/customize-run-review-remediate-scans-windows-defender-antivirus.md +++ b/windows/security/threat-protection/windows-defender-antivirus/customize-run-review-remediate-scans-windows-defender-antivirus.md @@ -9,7 +9,7 @@ ms.mktglfcycl: manage ms.sitesec: library ms.pagetype: security ms.localizationpriority: medium -author: andreabichsel +author: justinha ms.author: v-anbic ms.date: 09/03/2018 --- @@ -18,7 +18,7 @@ ms.date: 09/03/2018 **Applies to:** -- [Windows Defender Advanced Threat Protection (Windows Defender ATP)](https://go.microsoft.com/fwlink/p/?linkid=2069559) +- [Microsoft Defender Advanced Threat Protection (Microsoft Defender ATP)](https://go.microsoft.com/fwlink/p/?linkid=2069559) You can use Group Policy, PowerShell, and Windows Management Instrumentation (WMI) to configure Windows Defender Antivirus scans. diff --git a/windows/security/threat-protection/windows-defender-antivirus/deploy-manage-report-windows-defender-antivirus.md b/windows/security/threat-protection/windows-defender-antivirus/deploy-manage-report-windows-defender-antivirus.md index 5d587e3b8d..3dee12bfa2 100644 --- a/windows/security/threat-protection/windows-defender-antivirus/deploy-manage-report-windows-defender-antivirus.md +++ b/windows/security/threat-protection/windows-defender-antivirus/deploy-manage-report-windows-defender-antivirus.md @@ -9,7 +9,7 @@ ms.mktglfcycl: manage ms.sitesec: library ms.pagetype: security ms.localizationpriority: medium -author: andreabichsel +author: justinha ms.author: v-anbic ms.date: 09/03/2018 --- @@ -18,7 +18,7 @@ ms.date: 09/03/2018 **Applies to:** -- [Windows Defender Advanced Threat Protection (Windows Defender ATP)](https://go.microsoft.com/fwlink/p/?linkid=2069559) +- [Microsoft Defender Advanced Threat Protection (Microsoft Defender ATP)](https://go.microsoft.com/fwlink/p/?linkid=2069559) You can deploy, manage, and report on Windows Defender Antivirus in a number of ways. diff --git a/windows/security/threat-protection/windows-defender-antivirus/deploy-windows-defender-antivirus.md b/windows/security/threat-protection/windows-defender-antivirus/deploy-windows-defender-antivirus.md index df219115d7..dbdd57f33f 100644 --- a/windows/security/threat-protection/windows-defender-antivirus/deploy-windows-defender-antivirus.md +++ b/windows/security/threat-protection/windows-defender-antivirus/deploy-windows-defender-antivirus.md @@ -9,7 +9,7 @@ ms.mktglfcycl: manage ms.sitesec: library ms.pagetype: security ms.localizationpriority: medium -author: andreabichsel +author: justinha ms.author: v-anbic ms.date: 09/03/2018 --- @@ -18,7 +18,7 @@ ms.date: 09/03/2018 **Applies to:** -- [Windows Defender Advanced Threat Protection (Windows Defender ATP)](https://go.microsoft.com/fwlink/p/?linkid=2069559) +- [Microsoft Defender Advanced Threat Protection (Microsoft Defender ATP)](https://go.microsoft.com/fwlink/p/?linkid=2069559) Depending on the management tool you are using, you may need to specifically enable or configure Windows Defender Antivirus protection. diff --git a/windows/security/threat-protection/windows-defender-antivirus/deployment-vdi-windows-defender-antivirus.md b/windows/security/threat-protection/windows-defender-antivirus/deployment-vdi-windows-defender-antivirus.md index 1bf3ab9c2f..fe13cfa820 100644 --- a/windows/security/threat-protection/windows-defender-antivirus/deployment-vdi-windows-defender-antivirus.md +++ b/windows/security/threat-protection/windows-defender-antivirus/deployment-vdi-windows-defender-antivirus.md @@ -9,7 +9,7 @@ ms.mktglfcycl: manage ms.sitesec: library ms.pagetype: security ms.localizationpriority: medium -author: andreabichsel +author: justinha ms.author: v-anbic ms.date: 09/03/2018 --- @@ -18,7 +18,7 @@ ms.date: 09/03/2018 **Applies to:** -- [Windows Defender Advanced Threat Protection (Windows Defender ATP)](https://go.microsoft.com/fwlink/p/?linkid=2069559) +- [Microsoft Defender Advanced Threat Protection (Microsoft Defender ATP)](https://go.microsoft.com/fwlink/p/?linkid=2069559) In addition to standard on-premises or hardware configurations, you can also use Windows Defender Antivirus in a remote desktop (RDS) or virtual desktop infrastructure (VDI) environment. diff --git a/windows/security/threat-protection/windows-defender-antivirus/detect-block-potentially-unwanted-apps-windows-defender-antivirus.md b/windows/security/threat-protection/windows-defender-antivirus/detect-block-potentially-unwanted-apps-windows-defender-antivirus.md index 37859694d9..3185d40ef9 100644 --- a/windows/security/threat-protection/windows-defender-antivirus/detect-block-potentially-unwanted-apps-windows-defender-antivirus.md +++ b/windows/security/threat-protection/windows-defender-antivirus/detect-block-potentially-unwanted-apps-windows-defender-antivirus.md @@ -9,7 +9,7 @@ ms.mktglfcycl: detect ms.sitesec: library ms.pagetype: security ms.localizationpriority: medium -author: andreabichsel +author: justinha ms.author: v-anbic ms.date: 10/02/2018 --- @@ -18,7 +18,7 @@ ms.date: 10/02/2018 **Applies to:** -- [Windows Defender Advanced Threat Protection (Windows Defender ATP)](https://go.microsoft.com/fwlink/p/?linkid=2069559) +- [Microsoft Defender Advanced Threat Protection (Microsoft Defender ATP)](https://go.microsoft.com/fwlink/p/?linkid=2069559) The potentially unwanted application (PUA) protection feature in Windows Defender Antivirus can identify and block PUAs from downloading and installing on endpoints in your network. @@ -33,7 +33,7 @@ Typical PUA behavior includes: These applications can increase the risk of your network being infected with malware, cause malware infections to be harder to identify, and can waste IT resources in cleaning up the applications. >[!TIP] ->You can also visit the Windows Defender ATP demo website at [demo.wd.microsoft.com](https://demo.wd.microsoft.com?ocid=cx-wddocs-testground) to confirm the feature is working and see how it works. +>You can also visit the Microsoft Defender ATP demo website at [demo.wd.microsoft.com](https://demo.wd.microsoft.com?ocid=cx-wddocs-testground) to confirm the feature is working and see how it works. ## How it works diff --git a/windows/security/threat-protection/windows-defender-antivirus/enable-cloud-protection-windows-defender-antivirus.md b/windows/security/threat-protection/windows-defender-antivirus/enable-cloud-protection-windows-defender-antivirus.md index 787c9a85ad..a2f69a956b 100644 --- a/windows/security/threat-protection/windows-defender-antivirus/enable-cloud-protection-windows-defender-antivirus.md +++ b/windows/security/threat-protection/windows-defender-antivirus/enable-cloud-protection-windows-defender-antivirus.md @@ -9,7 +9,7 @@ ms.mktglfcycl: manage ms.sitesec: library ms.pagetype: security ms.localizationpriority: medium -author: andreabichsel +author: justinha ms.author: v-anbic ms.date: 09/03/2018 --- @@ -18,7 +18,7 @@ ms.date: 09/03/2018 **Applies to:** -- [Windows Defender Advanced Threat Protection (Windows Defender ATP)](https://go.microsoft.com/fwlink/p/?linkid=2069559) +- [Microsoft Defender Advanced Threat Protection (Microsoft Defender ATP)](https://go.microsoft.com/fwlink/p/?linkid=2069559) >[!NOTE] >The Windows Defender Antivirus cloud service is a mechanism for delivering updated protection to your network and endpoints. Although it is called a cloud service, it is not simply protection for files stored in the cloud; rather, it uses distributed resources and machine learning to deliver protection to your endpoints at a rate that is far faster than traditional Security intelligence updates. diff --git a/windows/security/threat-protection/windows-defender-antivirus/evaluate-windows-defender-antivirus.md b/windows/security/threat-protection/windows-defender-antivirus/evaluate-windows-defender-antivirus.md index c937715d4a..05165e019c 100644 --- a/windows/security/threat-protection/windows-defender-antivirus/evaluate-windows-defender-antivirus.md +++ b/windows/security/threat-protection/windows-defender-antivirus/evaluate-windows-defender-antivirus.md @@ -9,7 +9,7 @@ ms.mktglfcycl: manage ms.sitesec: library ms.pagetype: security ms.localizationpriority: medium -author: andreabichsel +author: justinha ms.author: v-anbic ms.date: 09/03/2018 --- @@ -18,12 +18,12 @@ ms.date: 09/03/2018 **Applies to:** -- [Windows Defender Advanced Threat Protection (Windows Defender ATP)](https://go.microsoft.com/fwlink/p/?linkid=2069559) +- [Microsoft Defender Advanced Threat Protection (Microsoft Defender ATP)](https://go.microsoft.com/fwlink/p/?linkid=2069559) Use this guide to determine how well Windows Defender Antivirus protects you from viruses, malware, and potentially unwanted applications. >[!TIP] ->You can also visit the Windows Defender ATP demo website at [demo.wd.microsoft.com](https://demo.wd.microsoft.com?ocid=cx-wddocs-testground) to confirm the following features are working and see how they work: +>You can also visit the Microsoft Defender ATP demo website at [demo.wd.microsoft.com](https://demo.wd.microsoft.com?ocid=cx-wddocs-testground) to confirm the following features are working and see how they work: >- Cloud-delivered protection >- Fast learning (including Block at first sight) >- Potentially unwanted application blocking diff --git a/windows/security/threat-protection/windows-defender-antivirus/limited-periodic-scanning-windows-defender-antivirus.md b/windows/security/threat-protection/windows-defender-antivirus/limited-periodic-scanning-windows-defender-antivirus.md index 93ef8703d6..36df0b6adf 100644 --- a/windows/security/threat-protection/windows-defender-antivirus/limited-periodic-scanning-windows-defender-antivirus.md +++ b/windows/security/threat-protection/windows-defender-antivirus/limited-periodic-scanning-windows-defender-antivirus.md @@ -9,7 +9,7 @@ ms.mktglfcycl: manage ms.sitesec: library ms.pagetype: security ms.localizationpriority: medium -author: andreabichsel +author: justinha ms.author: v-anbic ms.date: 09/03/2018 --- @@ -20,7 +20,7 @@ ms.date: 09/03/2018 **Applies to:** -- [Windows Defender Advanced Threat Protection (Windows Defender ATP)](https://go.microsoft.com/fwlink/p/?linkid=2069559) +- [Microsoft Defender Advanced Threat Protection (Microsoft Defender ATP)](https://go.microsoft.com/fwlink/p/?linkid=2069559) Limited periodic scanning is a special type of threat detection and remediation that can be enabled when you have installed another antivirus product on a Windows 10 device. diff --git a/windows/security/threat-protection/windows-defender-antivirus/manage-event-based-updates-windows-defender-antivirus.md b/windows/security/threat-protection/windows-defender-antivirus/manage-event-based-updates-windows-defender-antivirus.md index 4e04685c61..bb6efd9718 100644 --- a/windows/security/threat-protection/windows-defender-antivirus/manage-event-based-updates-windows-defender-antivirus.md +++ b/windows/security/threat-protection/windows-defender-antivirus/manage-event-based-updates-windows-defender-antivirus.md @@ -9,7 +9,7 @@ ms.mktglfcycl: manage ms.sitesec: library ms.pagetype: security ms.localizationpriority: medium -author: andreabichsel +author: justinha ms.author: v-anbic ms.date: 09/03/2018 --- @@ -18,7 +18,7 @@ ms.date: 09/03/2018 **Applies to:** -- [Windows Defender Advanced Threat Protection (Windows Defender ATP)](https://go.microsoft.com/fwlink/p/?linkid=2069559) +- [Microsoft Defender Advanced Threat Protection (Microsoft Defender ATP)](https://go.microsoft.com/fwlink/p/?linkid=2069559) Windows Defender Antivirus allows you to determine if updates should (or should not) occur after certain events, such as at startup or after receiving specific reports from the cloud-delivered protection service. diff --git a/windows/security/threat-protection/windows-defender-antivirus/manage-outdated-endpoints-windows-defender-antivirus.md b/windows/security/threat-protection/windows-defender-antivirus/manage-outdated-endpoints-windows-defender-antivirus.md index 9a77e63d64..38ca9e9c62 100644 --- a/windows/security/threat-protection/windows-defender-antivirus/manage-outdated-endpoints-windows-defender-antivirus.md +++ b/windows/security/threat-protection/windows-defender-antivirus/manage-outdated-endpoints-windows-defender-antivirus.md @@ -9,7 +9,7 @@ ms.mktglfcycl: manage ms.sitesec: library ms.pagetype: security ms.localizationpriority: medium -author: andreabichsel +author: justinha ms.author: v-anbic ms.date: 09/03/2018 --- @@ -18,7 +18,7 @@ ms.date: 09/03/2018 **Applies to:** -- [Windows Defender Advanced Threat Protection (Windows Defender ATP)](https://go.microsoft.com/fwlink/p/?linkid=2069559) +- [Microsoft Defender Advanced Threat Protection (Microsoft Defender ATP)](https://go.microsoft.com/fwlink/p/?linkid=2069559) Windows Defender Antivirus lets you define how long an endpoint can avoid an update or how many scans it can miss before it is required to update and scan itself. This is especially useful in environments where devices are not often connected to a corporate or external network, or devices that are not used on a daily basis. diff --git a/windows/security/threat-protection/windows-defender-antivirus/manage-protection-update-schedule-windows-defender-antivirus.md b/windows/security/threat-protection/windows-defender-antivirus/manage-protection-update-schedule-windows-defender-antivirus.md index 4f8774109a..29534e1b63 100644 --- a/windows/security/threat-protection/windows-defender-antivirus/manage-protection-update-schedule-windows-defender-antivirus.md +++ b/windows/security/threat-protection/windows-defender-antivirus/manage-protection-update-schedule-windows-defender-antivirus.md @@ -9,7 +9,7 @@ ms.mktglfcycl: manage ms.sitesec: library ms.pagetype: security ms.localizationpriority: medium -author: andreabichsel +author: justinha ms.author: v-anbic ms.date: 09/03/2018 --- @@ -18,7 +18,7 @@ ms.date: 09/03/2018 **Applies to:** -- [Windows Defender Advanced Threat Protection (Windows Defender ATP)](https://go.microsoft.com/fwlink/p/?linkid=2069559) +- [Microsoft Defender Advanced Threat Protection (Microsoft Defender ATP)](https://go.microsoft.com/fwlink/p/?linkid=2069559) Windows Defender Antivirus lets you determine when it should look for and download updates. diff --git a/windows/security/threat-protection/windows-defender-antivirus/manage-protection-updates-windows-defender-antivirus.md b/windows/security/threat-protection/windows-defender-antivirus/manage-protection-updates-windows-defender-antivirus.md index f05c21e0b5..2b0abfb132 100644 --- a/windows/security/threat-protection/windows-defender-antivirus/manage-protection-updates-windows-defender-antivirus.md +++ b/windows/security/threat-protection/windows-defender-antivirus/manage-protection-updates-windows-defender-antivirus.md @@ -9,7 +9,7 @@ ms.mktglfcycl: manage ms.sitesec: library ms.pagetype: security ms.localizationpriority: medium -author: andreabichsel +author: justinha ms.author: v-anbic ms.date: 09/03/2018 --- @@ -18,7 +18,7 @@ ms.date: 09/03/2018 **Applies to:** -- [Windows Defender Advanced Threat Protection (Windows Defender ATP)](https://go.microsoft.com/fwlink/p/?linkid=2069559) +- [Microsoft Defender Advanced Threat Protection (Microsoft Defender ATP)](https://go.microsoft.com/fwlink/p/?linkid=2069559) diff --git a/windows/security/threat-protection/windows-defender-antivirus/manage-updates-baselines-windows-defender-antivirus.md b/windows/security/threat-protection/windows-defender-antivirus/manage-updates-baselines-windows-defender-antivirus.md index 99e2c737d9..f9883aa6c4 100644 --- a/windows/security/threat-protection/windows-defender-antivirus/manage-updates-baselines-windows-defender-antivirus.md +++ b/windows/security/threat-protection/windows-defender-antivirus/manage-updates-baselines-windows-defender-antivirus.md @@ -9,7 +9,7 @@ ms.mktglfcycl: manage ms.sitesec: library ms.pagetype: security ms.localizationpriority: medium -author: andreabichsel +author: justinha ms.author: v-anbic ms.date: 09/03/2018 --- @@ -18,7 +18,7 @@ ms.date: 09/03/2018 **Applies to:** -- [Windows Defender Advanced Threat Protection (Windows Defender ATP)](https://go.microsoft.com/fwlink/p/?linkid=2069559) +- [Microsoft Defender Advanced Threat Protection (Microsoft Defender ATP)](https://go.microsoft.com/fwlink/p/?linkid=2069559) There are two types of updates related to keeping Windows Defender Antivirus up to date: 1. Protection updates diff --git a/windows/security/threat-protection/windows-defender-antivirus/manage-updates-mobile-devices-vms-windows-defender-antivirus.md b/windows/security/threat-protection/windows-defender-antivirus/manage-updates-mobile-devices-vms-windows-defender-antivirus.md index 93a9e45f84..b6b70e86ce 100644 --- a/windows/security/threat-protection/windows-defender-antivirus/manage-updates-mobile-devices-vms-windows-defender-antivirus.md +++ b/windows/security/threat-protection/windows-defender-antivirus/manage-updates-mobile-devices-vms-windows-defender-antivirus.md @@ -9,7 +9,7 @@ ms.mktglfcycl: manage ms.sitesec: library ms.pagetype: security ms.localizationpriority: medium -author: andreabichsel +author: justinha ms.author: v-anbic ms.date: 09/03/2018 --- @@ -18,7 +18,7 @@ ms.date: 09/03/2018 **Applies to:** -- [Windows Defender Advanced Threat Protection (Windows Defender ATP)](https://go.microsoft.com/fwlink/p/?linkid=2069559) +- [Microsoft Defender Advanced Threat Protection (Microsoft Defender ATP)](https://go.microsoft.com/fwlink/p/?linkid=2069559) Mobile devices and VMs may require additional configuration to ensure performance is not impacted by updates. diff --git a/windows/security/threat-protection/windows-defender-antivirus/microsoft-defender-atp-mac.md b/windows/security/threat-protection/windows-defender-antivirus/microsoft-defender-atp-mac.md index 15865ca9fa..d78140a765 100644 --- a/windows/security/threat-protection/windows-defender-antivirus/microsoft-defender-atp-mac.md +++ b/windows/security/threat-protection/windows-defender-antivirus/microsoft-defender-atp-mac.md @@ -28,7 +28,7 @@ Microsoft Defender ATP for Mac is not yet widely available, and this topic only ## Prerequisites You should have beginner-level experience in macOS and BASH scripting. You must have administrative privileges on the machine. -You should also have access to Windows Defender Security Center. +You should also have access to Microsoft Defender Security Center. ### System Requirements Microsoft Defender ATP for Mac system requirements: @@ -56,7 +56,7 @@ SIP is a built-in macOS security feature that prevents low-level tampering with ## Installation and configuration overview There are various methods and deployment tools that you can use to install and configure Microsoft Defender ATP for Mac. In general you'll need to take the following steps: - - [Register macOS devices](#register-macos-devices) with Windows Defender ATP + - [Register macOS devices](#register-macos-devices) with Microsoft Defender ATP - Deploy Microsoft Defender ATP for Mac using any of the following deployment methods and tools: - [Microsoft Intune based deployment](#microsoft-intune-based-deployment) - [JAMF based deployment](#jamf-based-deployment) @@ -68,14 +68,14 @@ Use any of the supported methods to deploy Microsoft Defender ATP for Mac ## Microsoft Intune based deployment ### Download installation and onboarding packages -Download the installation and onboarding packages from Windows Defender Security Center: -1. In Windows Defender Security Center, go to **Settings > Machine Management > Onboarding**. +Download the installation and onboarding packages from Microsoft Defender Security Center: +1. In Microsoft Defender Security Center, go to **Settings > Machine Management > Onboarding**. 2. In Section 1 of the page, set operating system to **Linux, macOS, iOS or Android** and Deployment method to **Mobile Device Management / Microsoft Intune**. 3. In Section 2 of the page, select **Download installation package**. Save it as wdav.pkg to a local directory. 4. In Section 2 of the page, select **Download onboarding package**. Save it as WindowsDefenderATPOnboardingPackage.zip to the same directory. 5. Download IntuneAppUtil from https://docs.microsoft.com/en-us/intune/lob-apps-macos. - ![Windows Defender Security Center screenshot](images/MDATP_2_IntuneAppUtil.png) + ![Microsoft Defender Security Center screenshot](images/MDATP_2_IntuneAppUtil.png) 6. From a command prompt, verify that you have the three files. Extract the contents of the .zip files: @@ -198,13 +198,13 @@ You need to be familiar with JAMF administration tasks, have a JAMF tenant, and ### Download installation and onboarding packages -Download the installation and onboarding packages from Windows Defender Security Center: -1. In Windows Defender Security Center, go to **Settings > Machine Management > Onboarding**. +Download the installation and onboarding packages from Microsoft Defender Security Center: +1. In Microsoft Defender Security Center, go to **Settings > Machine Management > Onboarding**. 2. In Section 1 of the page, set operating system to **Linux, macOS, iOS or Android** and Deployment method to **Mobile Device Management / Microsoft Intune**. 3. In Section 2 of the page, select **Download installation package**. Save it as wdav.pkg to a local directory. 4. In Section 2 of the page, select **Download onboarding package**. Save it as WindowsDefenderATPOnboardingPackage.zip to the same directory. - ![Windows Defender Security Center screenshot](images/MDATP_2_IntuneAppUtil.png) + ![Microsoft Defender Security Center screenshot](images/MDATP_2_IntuneAppUtil.png) 5. From a command prompt, verify that you have the two files. Extract the contents of the .zip files: @@ -377,18 +377,18 @@ You can check that machines are correctly onboarded by creating a script. For ex /Library/Extensions/wdavkext.kext/Contents/Resources/Tools/wdavconfig.py | grep -E 'orgid effective : [-a-zA-Z0-9]+' ``` -This script returns 0 if Microsoft Defender ATP is registered with the Windows Defender ATP service, and another exit code if it is not installed or registered. +This script returns 0 if Microsoft Defender ATP is registered with the Microsoft Defender ATP service, and another exit code if it is not installed or registered. ## Manual deployment ### Download installation and onboarding packages -Download the installation and onboarding packages from Windows Defender Security Center: -1. In Windows Defender Security Center, go to **Settings > Machine Management > Onboarding**. +Download the installation and onboarding packages from Microsoft Defender Security Center: +1. In Microsoft Defender Security Center, go to **Settings > Machine Management > Onboarding**. 2. In Section 1 of the page, set operating system to **Linux, macOS, iOS or Android** and Deployment method to **Local script**. 3. In Section 2 of the page, select **Download installation package**. Save it as wdav.pkg to a local directory. 4. In Section 2 of the page, select **Download onboarding package**. Save it as WindowsDefenderATPOnboardingPackage.zip to the same directory. - ![Windows Defender Security Center screenshot](images/MDATP_2_IntuneAppUtil.png) + ![Microsoft Defender Security Center screenshot](images/MDATP_2_IntuneAppUtil.png) 5. From a command prompt, verify that you have the two files. Extract the contents of the .zip files: @@ -471,7 +471,7 @@ Or, from a command line: - Microsoft Defender ATP is not yet optimized for performance or disk space. - Centrally managed uninstall using Intune is still in development. To uninstall (as a workaround) a manual uninstall action has to be completed on each client device). - Geo preference for telemetry traffic is not yet supported. Cloud traffic (definition updates) routed to US only. -- Full Windows Defender ATP integration is not yet available +- Full Microsoft Defender ATP integration is not yet available - Not localized yet - There might be accessibility issues diff --git a/windows/security/threat-protection/windows-defender-antivirus/oldTOC.md b/windows/security/threat-protection/windows-defender-antivirus/oldTOC.md index 8c12b9ff9d..f9457d3f21 100644 --- a/windows/security/threat-protection/windows-defender-antivirus/oldTOC.md +++ b/windows/security/threat-protection/windows-defender-antivirus/oldTOC.md @@ -1,7 +1,7 @@ # [Windows Defender Antivirus in Windows 10](windows-defender-antivirus-in-windows-10.md) -## [Windows Defender AV in the Windows Defender Security Center app](windows-defender-security-center-antivirus.md) +## [Windows Defender AV in the Microsoft Defender Security Center app](windows-defender-security-center-antivirus.md) ## [Windows Defender AV on Windows Server 2016](windows-defender-antivirus-on-windows-server-2016.md) diff --git a/windows/security/threat-protection/windows-defender-antivirus/prevent-end-user-interaction-windows-defender-antivirus.md b/windows/security/threat-protection/windows-defender-antivirus/prevent-end-user-interaction-windows-defender-antivirus.md index a156c5b1dd..2de691deb9 100644 --- a/windows/security/threat-protection/windows-defender-antivirus/prevent-end-user-interaction-windows-defender-antivirus.md +++ b/windows/security/threat-protection/windows-defender-antivirus/prevent-end-user-interaction-windows-defender-antivirus.md @@ -9,7 +9,7 @@ ms.mktglfcycl: manage ms.sitesec: library ms.pagetype: security ms.localizationpriority: medium -author: andreabichsel +author: justinha ms.author: v-anbic ms.date: 09/03/2018 --- @@ -18,7 +18,7 @@ ms.date: 09/03/2018 **Applies to:** -- [Windows Defender Advanced Threat Protection (Windows Defender ATP)](https://go.microsoft.com/fwlink/p/?linkid=2069559) +- [Microsoft Defender Advanced Threat Protection (Microsoft Defender ATP)](https://go.microsoft.com/fwlink/p/?linkid=2069559) You can use Group Policy to prevent users on endpoints from seeing the Windows Defender Antivirus interface. You can also prevent them from pausing scans. @@ -35,7 +35,7 @@ With the setting set to **Disabled** or not configured: ![Scheenshot of Windows Security showing the shield icon and virus and threat protection section](images/defender/wdav-headless-mode-off-1703.png) >[!NOTE] ->Hiding the interface will also prevent Windows Defender Antivirus notifications from appearing on the endpoint. Windows Defender Advanced Threat Protection notifications will still appear. You can also individually [Configure the notifications that appear on endpoints](configure-notifications-windows-defender-antivirus.md) +>Hiding the interface will also prevent Windows Defender Antivirus notifications from appearing on the endpoint. Microsoft Defender Advanced Threat Protection notifications will still appear. You can also individually [Configure the notifications that appear on endpoints](configure-notifications-windows-defender-antivirus.md) In earlier versions of Windows 10, the setting will hide the Windows Defender client interface. If the user attempts to open it, they will receive a warning "Your system administrator has restricted access to this app.": diff --git a/windows/security/threat-protection/windows-defender-antivirus/report-monitor-windows-defender-antivirus.md b/windows/security/threat-protection/windows-defender-antivirus/report-monitor-windows-defender-antivirus.md index 6e22b89713..ed1703b544 100644 --- a/windows/security/threat-protection/windows-defender-antivirus/report-monitor-windows-defender-antivirus.md +++ b/windows/security/threat-protection/windows-defender-antivirus/report-monitor-windows-defender-antivirus.md @@ -9,7 +9,7 @@ ms.mktglfcycl: manage ms.sitesec: library ms.pagetype: security ms.localizationpriority: medium -author: andreabichsel +author: justinha ms.author: v-anbic ms.date: 09/03/2018 --- @@ -18,7 +18,7 @@ ms.date: 09/03/2018 **Applies to:** -- [Windows Defender Advanced Threat Protection (Windows Defender ATP)](https://go.microsoft.com/fwlink/p/?linkid=2069559) +- [Microsoft Defender Advanced Threat Protection (Microsoft Defender ATP)](https://go.microsoft.com/fwlink/p/?linkid=2069559) There are a number of ways you can review protection status and alerts, depending on the management tool you are using for Windows Defender Antivirus. diff --git a/windows/security/threat-protection/windows-defender-antivirus/restore-quarantined-files-windows-defender-antivirus.md b/windows/security/threat-protection/windows-defender-antivirus/restore-quarantined-files-windows-defender-antivirus.md index 1718727ee2..4de3b92e99 100644 --- a/windows/security/threat-protection/windows-defender-antivirus/restore-quarantined-files-windows-defender-antivirus.md +++ b/windows/security/threat-protection/windows-defender-antivirus/restore-quarantined-files-windows-defender-antivirus.md @@ -9,7 +9,7 @@ ms.mktglfcycl: manage ms.sitesec: library ms.pagetype: security ms.localizationpriority: medium -author: andreabichsel +author: justinha ms.author: v-anbic ms.date: 11/16/2018 --- @@ -18,7 +18,7 @@ ms.date: 11/16/2018 **Applies to:** -- [Windows Defender Advanced Threat Protection (Windows Defender ATP)](https://go.microsoft.com/fwlink/p/?linkid=2069559) +- [Microsoft Defender Advanced Threat Protection (Microsoft Defender ATP)](https://go.microsoft.com/fwlink/p/?linkid=2069559) If Windows Defender Antivirus is configured to detect and remediate threats on your device, Windows Defender Antivirus quarantines suspicious files. If you are certain these files do not present a threat, you can restore them. diff --git a/windows/security/threat-protection/windows-defender-antivirus/review-scan-results-windows-defender-antivirus.md b/windows/security/threat-protection/windows-defender-antivirus/review-scan-results-windows-defender-antivirus.md index ae3a67efe6..8be9dc4db1 100644 --- a/windows/security/threat-protection/windows-defender-antivirus/review-scan-results-windows-defender-antivirus.md +++ b/windows/security/threat-protection/windows-defender-antivirus/review-scan-results-windows-defender-antivirus.md @@ -9,7 +9,7 @@ ms.mktglfcycl: manage ms.sitesec: library ms.pagetype: security ms.localizationpriority: medium -author: andreabichsel +author: justinha ms.author: v-anbic ms.date: 09/03/2018 --- @@ -18,7 +18,7 @@ ms.date: 09/03/2018 **Applies to:** -- [Windows Defender Advanced Threat Protection (Windows Defender ATP)](https://go.microsoft.com/fwlink/p/?linkid=2069559) +- [Microsoft Defender Advanced Threat Protection (Microsoft Defender ATP)](https://go.microsoft.com/fwlink/p/?linkid=2069559) After an Windows Defender Antivirus scan completes, whether it is an [on-demand](run-scan-windows-defender-antivirus.md) or [scheduled scan](scheduled-catch-up-scans-windows-defender-antivirus.md), the results are recorded and you can view the results. diff --git a/windows/security/threat-protection/windows-defender-antivirus/run-scan-windows-defender-antivirus.md b/windows/security/threat-protection/windows-defender-antivirus/run-scan-windows-defender-antivirus.md index 15a9be7d17..d3cdab176e 100644 --- a/windows/security/threat-protection/windows-defender-antivirus/run-scan-windows-defender-antivirus.md +++ b/windows/security/threat-protection/windows-defender-antivirus/run-scan-windows-defender-antivirus.md @@ -9,7 +9,7 @@ ms.mktglfcycl: manage ms.sitesec: library ms.pagetype: security ms.localizationpriority: medium -author: andreabichsel +author: justinha ms.author: v-anbic ms.date: 09/03/2018 --- @@ -18,7 +18,7 @@ ms.date: 09/03/2018 **Applies to:** -- [Windows Defender Advanced Threat Protection (Windows Defender ATP)](https://go.microsoft.com/fwlink/p/?linkid=2069559) +- [Microsoft Defender Advanced Threat Protection (Microsoft Defender ATP)](https://go.microsoft.com/fwlink/p/?linkid=2069559) You can run an on-demand scan on individual endpoints. These scans will start immediately, and you can define parameters for the scan, such as the location or type. diff --git a/windows/security/threat-protection/windows-defender-antivirus/scheduled-catch-up-scans-windows-defender-antivirus.md b/windows/security/threat-protection/windows-defender-antivirus/scheduled-catch-up-scans-windows-defender-antivirus.md index 9a451f585c..42310786b4 100644 --- a/windows/security/threat-protection/windows-defender-antivirus/scheduled-catch-up-scans-windows-defender-antivirus.md +++ b/windows/security/threat-protection/windows-defender-antivirus/scheduled-catch-up-scans-windows-defender-antivirus.md @@ -9,7 +9,7 @@ ms.mktglfcycl: manage ms.sitesec: library ms.pagetype: security ms.localizationpriority: medium -author: andreabichsel +author: justinha ms.author: v-anbic ms.date: 12/10/2018 --- @@ -18,7 +18,7 @@ ms.date: 12/10/2018 **Applies to:** -- [Windows Defender Advanced Threat Protection (Windows Defender ATP)](https://go.microsoft.com/fwlink/p/?linkid=2069559) +- [Microsoft Defender Advanced Threat Protection (Microsoft Defender ATP)](https://go.microsoft.com/fwlink/p/?linkid=2069559) > [!NOTE] > By default, Windows Defender Antivirus checks for an update 15 minutes before the time of any scheduled scans. You can [Manage the schedule for when protection updates should be downloaded and applied](manage-protection-update-schedule-windows-defender-antivirus.md) to override this default. diff --git a/windows/security/threat-protection/windows-defender-antivirus/specify-cloud-protection-level-windows-defender-antivirus.md b/windows/security/threat-protection/windows-defender-antivirus/specify-cloud-protection-level-windows-defender-antivirus.md index 089226de14..0f59883e27 100644 --- a/windows/security/threat-protection/windows-defender-antivirus/specify-cloud-protection-level-windows-defender-antivirus.md +++ b/windows/security/threat-protection/windows-defender-antivirus/specify-cloud-protection-level-windows-defender-antivirus.md @@ -9,7 +9,7 @@ ms.mktglfcycl: manage ms.sitesec: library ms.pagetype: security ms.localizationpriority: medium -author: andreabichsel +author: justinha ms.author: v-anbic ms.date: 09/03/2018 --- @@ -18,7 +18,7 @@ ms.date: 09/03/2018 **Applies to:** -- [Windows Defender Advanced Threat Protection (Windows Defender ATP)](https://go.microsoft.com/fwlink/p/?linkid=2069559) +- [Microsoft Defender Advanced Threat Protection (Microsoft Defender ATP)](https://go.microsoft.com/fwlink/p/?linkid=2069559) You can specify the level of cloud-protection offered by Windows Defender Antivirus with Group Policy and System Center Configuration Manager. diff --git a/windows/security/threat-protection/windows-defender-antivirus/troubleshoot-reporting.md b/windows/security/threat-protection/windows-defender-antivirus/troubleshoot-reporting.md index 85b5650e9c..935339fb99 100644 --- a/windows/security/threat-protection/windows-defender-antivirus/troubleshoot-reporting.md +++ b/windows/security/threat-protection/windows-defender-antivirus/troubleshoot-reporting.md @@ -9,7 +9,7 @@ ms.mktglfcycl: manage ms.sitesec: library ms.pagetype: security ms.localizationpriority: medium -author: andreabichsel +author: justinha ms.author: v-anbic ms.date: 09/03/2018 --- @@ -18,7 +18,7 @@ ms.date: 09/03/2018 **Applies to:** -- [Windows Defender Advanced Threat Protection (Windows Defender ATP)](https://go.microsoft.com/fwlink/p/?linkid=2069559) +- [Microsoft Defender Advanced Threat Protection (Microsoft Defender ATP)](https://go.microsoft.com/fwlink/p/?linkid=2069559) When you use [Windows Analytics Update Compliance to obtain reporting into the protection status of machines or endpoints](/windows/deployment/update/update-compliance-using#wdav-assessment) in your network that are using Windows Defender Antivirus, you may encounter problems or issues. diff --git a/windows/security/threat-protection/windows-defender-antivirus/troubleshoot-windows-defender-antivirus.md b/windows/security/threat-protection/windows-defender-antivirus/troubleshoot-windows-defender-antivirus.md index 0bdced17c6..1fcbeccd26 100644 --- a/windows/security/threat-protection/windows-defender-antivirus/troubleshoot-windows-defender-antivirus.md +++ b/windows/security/threat-protection/windows-defender-antivirus/troubleshoot-windows-defender-antivirus.md @@ -9,7 +9,7 @@ ms.mktglfcycl: manage ms.sitesec: library ms.pagetype: security ms.localizationpriority: medium -author: andreabichsel +author: justinha ms.author: v-anbic ms.date: 09/11/2018 --- @@ -18,7 +18,7 @@ ms.date: 09/11/2018 **Applies to:** -- [Windows Defender Advanced Threat Protection (Windows Defender ATP)](https://go.microsoft.com/fwlink/p/?linkid=2069559) +- [Microsoft Defender Advanced Threat Protection (Microsoft Defender ATP)](https://go.microsoft.com/fwlink/p/?linkid=2069559) If you encounter a problem with Windows Defender Antivirus, you can search the tables in this topic to find a matching issue and potential solution. @@ -29,7 +29,7 @@ The tables list: - [Internal Windows Defender Antivirus client error codes (used by Microsoft during development and testing)](#internal-error-codes) >[!TIP] ->You can also visit the Windows Defender ATP demo website at [demo.wd.microsoft.com](https://demo.wd.microsoft.com?ocid=cx-wddocs-testground) to confirm the following features are working: +>You can also visit the Microsoft Defender ATP demo website at [demo.wd.microsoft.com](https://demo.wd.microsoft.com?ocid=cx-wddocs-testground) to confirm the following features are working: >- Cloud-delivered protection >- Fast learning (including Block at first sight) diff --git a/windows/security/threat-protection/windows-defender-antivirus/use-group-policy-windows-defender-antivirus.md b/windows/security/threat-protection/windows-defender-antivirus/use-group-policy-windows-defender-antivirus.md index dcb8f76069..1d000caef1 100644 --- a/windows/security/threat-protection/windows-defender-antivirus/use-group-policy-windows-defender-antivirus.md +++ b/windows/security/threat-protection/windows-defender-antivirus/use-group-policy-windows-defender-antivirus.md @@ -9,7 +9,7 @@ ms.mktglfcycl: manage ms.sitesec: library ms.pagetype: security ms.localizationpriority: medium -author: andreabichsel +author: justinha ms.author: v-anbic ms.date: 09/03/2018 --- @@ -18,7 +18,7 @@ ms.date: 09/03/2018 **Applies to:** -- [Windows Defender Advanced Threat Protection (Windows Defender ATP)](https://go.microsoft.com/fwlink/p/?linkid=2069559) +- [Microsoft Defender Advanced Threat Protection (Microsoft Defender ATP)](https://go.microsoft.com/fwlink/p/?linkid=2069559) You can use [Group Policy](https://msdn.microsoft.com/library/ee663280(v=vs.85).aspx) to configure and manage Windows Defender Antivirus on your endpoints. diff --git a/windows/security/threat-protection/windows-defender-antivirus/use-intune-config-manager-windows-defender-antivirus.md b/windows/security/threat-protection/windows-defender-antivirus/use-intune-config-manager-windows-defender-antivirus.md index 566898708b..b8eff33e4a 100644 --- a/windows/security/threat-protection/windows-defender-antivirus/use-intune-config-manager-windows-defender-antivirus.md +++ b/windows/security/threat-protection/windows-defender-antivirus/use-intune-config-manager-windows-defender-antivirus.md @@ -9,7 +9,7 @@ ms.mktglfcycl: manage ms.sitesec: library ms.pagetype: security ms.localizationpriority: medium -author: andreabichsel +author: justinha ms.author: v-anbic ms.date: 09/03/2018 --- @@ -18,7 +18,7 @@ ms.date: 09/03/2018 **Applies to:** -- [Windows Defender Advanced Threat Protection (Windows Defender ATP)](https://go.microsoft.com/fwlink/p/?linkid=2069559) +- [Microsoft Defender Advanced Threat Protection (Microsoft Defender ATP)](https://go.microsoft.com/fwlink/p/?linkid=2069559) If you are using System Center Configuration Manager or Microsoft Intune to manage the endpoints on your network, you can also use them to manage Windows Defender Antivirus scans. diff --git a/windows/security/threat-protection/windows-defender-antivirus/use-powershell-cmdlets-windows-defender-antivirus.md b/windows/security/threat-protection/windows-defender-antivirus/use-powershell-cmdlets-windows-defender-antivirus.md index 8e45003982..9fc1d12db3 100644 --- a/windows/security/threat-protection/windows-defender-antivirus/use-powershell-cmdlets-windows-defender-antivirus.md +++ b/windows/security/threat-protection/windows-defender-antivirus/use-powershell-cmdlets-windows-defender-antivirus.md @@ -9,7 +9,7 @@ ms.mktglfcycl: manage ms.sitesec: library ms.pagetype: security ms.localizationpriority: medium -author: andreabichsel +author: justinha ms.author: v-anbic ms.date: 09/03/2018 --- @@ -18,7 +18,7 @@ ms.date: 09/03/2018 **Applies to:** -- [Windows Defender Advanced Threat Protection (Windows Defender ATP)](https://go.microsoft.com/fwlink/p/?linkid=2069559) +- [Microsoft Defender Advanced Threat Protection (Microsoft Defender ATP)](https://go.microsoft.com/fwlink/p/?linkid=2069559) You can use PowerShell to perform various functions in Windows Defender. Similar to the command prompt or command line, PowerShell is a task-based command-line shell and scripting language designed especially for system administration, and you can read more about it at the [PowerShell hub on MSDN](https://msdn.microsoft.com/powershell/mt173057.aspx). diff --git a/windows/security/threat-protection/windows-defender-antivirus/use-wmi-windows-defender-antivirus.md b/windows/security/threat-protection/windows-defender-antivirus/use-wmi-windows-defender-antivirus.md index c4f3239b0c..ef249aaa42 100644 --- a/windows/security/threat-protection/windows-defender-antivirus/use-wmi-windows-defender-antivirus.md +++ b/windows/security/threat-protection/windows-defender-antivirus/use-wmi-windows-defender-antivirus.md @@ -9,7 +9,7 @@ ms.mktglfcycl: manage ms.sitesec: library ms.pagetype: security ms.localizationpriority: medium -author: andreabichsel +author: justinha ms.author: v-anbic ms.date: 09/03/2018 --- @@ -18,7 +18,7 @@ ms.date: 09/03/2018 **Applies to:** -- [Windows Defender Advanced Threat Protection (Windows Defender ATP)](https://go.microsoft.com/fwlink/p/?linkid=2069559) +- [Microsoft Defender Advanced Threat Protection (Microsoft Defender ATP)](https://go.microsoft.com/fwlink/p/?linkid=2069559) Windows Management Instrumentation (WMI) is a scripting interface that allows you to retrieve, modify, and update settings. diff --git a/windows/security/threat-protection/windows-defender-antivirus/utilize-microsoft-cloud-protection-windows-defender-antivirus.md b/windows/security/threat-protection/windows-defender-antivirus/utilize-microsoft-cloud-protection-windows-defender-antivirus.md index 59ec895413..6dbff069e4 100644 --- a/windows/security/threat-protection/windows-defender-antivirus/utilize-microsoft-cloud-protection-windows-defender-antivirus.md +++ b/windows/security/threat-protection/windows-defender-antivirus/utilize-microsoft-cloud-protection-windows-defender-antivirus.md @@ -9,7 +9,7 @@ ms.mktglfcycl: manage ms.sitesec: library ms.pagetype: security ms.localizationpriority: medium -author: andreabichsel +author: justinha ms.author: v-anbic ms.date: 09/03/2018 --- @@ -18,7 +18,7 @@ ms.date: 09/03/2018 **Applies to:** -- [Windows Defender Advanced Threat Protection (Windows Defender ATP)](https://go.microsoft.com/fwlink/p/?linkid=2069559) +- [Microsoft Defender Advanced Threat Protection (Microsoft Defender ATP)](https://go.microsoft.com/fwlink/p/?linkid=2069559) Microsoft next-gen technologies in Windows Defender Antivirus provide near-instant, automated protection against new and emerging threats. To dynamically identify new threats, these technologies work with large sets of interconnected data in the Microsoft Intelligent Security Graph and powerful artificial intelligence (AI) systems driven by advanced machine learning models. diff --git a/windows/security/threat-protection/windows-defender-antivirus/windows-defender-antivirus-compatibility.md b/windows/security/threat-protection/windows-defender-antivirus/windows-defender-antivirus-compatibility.md index 449d118890..34ee455d8a 100644 --- a/windows/security/threat-protection/windows-defender-antivirus/windows-defender-antivirus-compatibility.md +++ b/windows/security/threat-protection/windows-defender-antivirus/windows-defender-antivirus-compatibility.md @@ -9,7 +9,7 @@ ms.mktglfcycl: manage ms.sitesec: library ms.pagetype: security ms.localizationpriority: medium -author: andreabichsel +author: justinha ms.author: v-anbic ms.date: 09/03/2018 --- @@ -18,17 +18,17 @@ ms.date: 09/03/2018 **Applies to:** -- [Windows Defender Advanced Threat Protection (Windows Defender ATP)](https://go.microsoft.com/fwlink/p/?linkid=2069559) +- [Microsoft Defender Advanced Threat Protection (Microsoft Defender ATP)](https://go.microsoft.com/fwlink/p/?linkid=2069559) Windows Defender Antivirus is automatically enabled and installed on endpoints and devices that are running Windows 10. However, on endpoints and devices that are protected with a non-Microsoft antivirus or antimalware app, Windows Defender Antivirus will automatically disable itself. You can then choose to enable an optional, limited protection feature, called [limited periodic scanning](limited-periodic-scanning-windows-defender-antivirus.md). -If you are also using Windows Defender Advanced Threat Protection, then Windows Defender AV will enter a passive mode. +If you are also using Microsoft Defender Advanced Threat Protection, then Windows Defender AV will enter a passive mode. -The following matrix illustrates the states that Windows Defender AV will enter when third-party antivirus products or Windows Defender ATP are also used. +The following matrix illustrates the states that Windows Defender AV will enter when third-party antivirus products or Microsoft Defender ATP are also used. -Windows version | Antimalware protection offered by | Organization enrolled in Windows Defender ATP | Windows Defender AV state +Windows version | Antimalware protection offered by | Organization enrolled in Microsoft Defender ATP | Windows Defender AV state -|-|-|- Windows 10 | A third-party product that is not offered or developed by Microsoft | Yes | Passive mode Windows 10 | A third-party product that is not offered or developed by Microsoft | No | Automatic disabled mode @@ -59,11 +59,11 @@ This table indicates the functionality and features that are available in each s State | Description | [Real-time protection](configure-real-time-protection-windows-defender-antivirus.md) and [cloud-delivered protection](enable-cloud-protection-windows-defender-antivirus.md) | [Limited periodic scanning availability](limited-periodic-scanning-windows-defender-antivirus.md) | [File scanning and detection information](customize-run-review-remediate-scans-windows-defender-antivirus.md) | [Threat remediation](configure-remediation-windows-defender-antivirus.md) | [Security intelligence updates](manage-updates-baselines-windows-defender-antivirus.md) :-|:-|:-:|:-:|:-:|:-:|:-: -Passive mode | Windows Defender AV will not be used as the antivirus app, and threats will not be remediated by Windows Defender AV. Files will be scanned and reports will be provided for threat detections which are shared with the Windows Defender ATP service. | [!include[Check mark no](images/svg/check-no.svg)] | [!include[Check mark no](images/svg/check-no.svg)] | [!include[Check mark yes](images/svg/check-yes.svg)] | [!include[Check mark no](images/svg/check-no.svg)] | [!include[Check mark yes](images/svg/check-yes.svg)] +Passive mode | Windows Defender AV will not be used as the antivirus app, and threats will not be remediated by Windows Defender AV. Files will be scanned and reports will be provided for threat detections which are shared with the Microsoft Defender ATP service. | [!include[Check mark no](images/svg/check-no.svg)] | [!include[Check mark no](images/svg/check-no.svg)] | [!include[Check mark yes](images/svg/check-yes.svg)] | [!include[Check mark no](images/svg/check-no.svg)] | [!include[Check mark yes](images/svg/check-yes.svg)] Automatic disabled mode | Windows Defender AV will not be used as the antivirus app. Files will not be scanned and threats will not be remediated. | [!include[Check mark no](images/svg/check-no.svg)] | [!include[Check mark yes](images/svg/check-yes.svg)] | [!include[Check mark no](images/svg/check-no.svg)] | [!include[Check mark no](images/svg/check-no.svg)] | [!include[Check mark no](images/svg/check-no.svg)] Active mode | Windows Defender AV is used as the antivirus app on the machine. All configuration made with Configuration Manager, Group Policy, Intune, or other management products will apply. Files will be scanned and threats remediated, and detection information will be reported in your configuration tool (such as Configuration Manager or the Windows Defender AV app on the machine itself). | [!include[Check mark yes](images/svg/check-yes.svg)] | [!include[Check mark no](images/svg/check-no.svg)] | [!include[Check mark yes](images/svg/check-yes.svg)] | [!include[Check mark yes](images/svg/check-yes.svg)] | [!include[Check mark yes](images/svg/check-yes.svg)] -If you are enrolled in Windows Defender ATP and you are using a third party antimalware product then passive mode is enabled because [the service requires common information sharing from the Windows Defender AV service](../windows-defender-atp/defender-compatibility-windows-defender-advanced-threat-protection.md) in order to properly monitor your devices and network for intrusion attempts and attacks. +If you are enrolled in Microsoft Defender ATP and you are using a third party antimalware product then passive mode is enabled because [the service requires common information sharing from the Windows Defender AV service](../windows-defender-atp/defender-compatibility.md) in order to properly monitor your devices and network for intrusion attempts and attacks. Automatic disabled mode is enabled so that if the protection offered by a third-party antivirus product expires or otherwise stops providing real-time protection from viruses, malware or other threats, Windows Defender AV will automatically enable itself to ensure antivirus protection is maintained on the endpoint. It also allows you to enable [limited periodic scanning](limited-periodic-scanning-windows-defender-antivirus.md), which uses the Windows Defender AV engine to periodically check for threats in addition to your main antivirus app. @@ -72,7 +72,7 @@ In passive and automatic disabled mode, you can still [manage updates for Window If you uninstall the other product, and choose to use Windows Defender AV to provide protection to your endpoints, Windows Defender AV will automatically return to its normal active mode. >[!WARNING] ->You should not attempt to disable, stop, or modify any of the associated services used by Windows Defender AV, Windows Defender ATP, or the Windows Security app. +>You should not attempt to disable, stop, or modify any of the associated services used by Windows Defender AV, Microsoft Defender ATP, or the Windows Security app. > >This includes the *wscsvc*, *SecurityHealthService*, *MsSense*, *Sense*, *WinDefend*, or *MsMpEng* services and process. Manually modifying these services can cause severe instability on your endpoints and open your network to infections and attacks. > diff --git a/windows/security/threat-protection/windows-defender-antivirus/windows-defender-antivirus-in-windows-10.md b/windows/security/threat-protection/windows-defender-antivirus/windows-defender-antivirus-in-windows-10.md index de41958e5e..1e9f3e028e 100644 --- a/windows/security/threat-protection/windows-defender-antivirus/windows-defender-antivirus-in-windows-10.md +++ b/windows/security/threat-protection/windows-defender-antivirus/windows-defender-antivirus-in-windows-10.md @@ -9,7 +9,7 @@ ms.mktglfcycl: manage ms.sitesec: library ms.pagetype: security ms.localizationpriority: medium -author: andreabichsel +author: justinha ms.author: v-anbic ms.date: 09/03/2018 --- @@ -18,7 +18,7 @@ ms.date: 09/03/2018 **Applies to:** -- [Windows Defender Advanced Threat Protection (Windows Defender ATP)](https://go.microsoft.com/fwlink/p/?linkid=2069559) +- [Microsoft Defender Advanced Threat Protection (Microsoft Defender ATP)](https://go.microsoft.com/fwlink/p/?linkid=2069559) Windows Defender Antivirus is a built-in antimalware solution that provides next generation protection for desktops, portable computers, and servers. diff --git a/windows/security/threat-protection/windows-defender-antivirus/windows-defender-antivirus-on-windows-server-2016.md b/windows/security/threat-protection/windows-defender-antivirus/windows-defender-antivirus-on-windows-server-2016.md index f38d0b3823..b272703ba3 100644 --- a/windows/security/threat-protection/windows-defender-antivirus/windows-defender-antivirus-on-windows-server-2016.md +++ b/windows/security/threat-protection/windows-defender-antivirus/windows-defender-antivirus-on-windows-server-2016.md @@ -9,7 +9,7 @@ ms.mktglfcycl: manage ms.sitesec: library ms.pagetype: security ms.localizationpriority: medium -author: andreabichsel +author: justinha ms.author: v-anbic ms.date: 09/03/2018 --- @@ -18,7 +18,7 @@ ms.date: 09/03/2018 **Applies to:** -- [Windows Defender Advanced Threat Protection (Windows Defender ATP)](https://go.microsoft.com/fwlink/p/?linkid=2069559) +- [Microsoft Defender Advanced Threat Protection (Microsoft Defender ATP)](https://go.microsoft.com/fwlink/p/?linkid=2069559) Windows Defender Antivirus is available on Windows Server 2016. In some instances it is referred to as Endpoint Protection - however, the protection engine is the same. diff --git a/windows/security/threat-protection/windows-defender-antivirus/windows-defender-offline.md b/windows/security/threat-protection/windows-defender-antivirus/windows-defender-offline.md index e860e58f69..f8279e4b09 100644 --- a/windows/security/threat-protection/windows-defender-antivirus/windows-defender-offline.md +++ b/windows/security/threat-protection/windows-defender-antivirus/windows-defender-offline.md @@ -9,7 +9,7 @@ ms.mktglfcycl: manage ms.sitesec: library ms.pagetype: security ms.localizationpriority: medium -author: andreabichsel +author: justinha ms.author: v-anbic ms.date: 09/03/2018 --- @@ -18,7 +18,7 @@ ms.date: 09/03/2018 **Applies to:** -- [Windows Defender Advanced Threat Protection (Windows Defender ATP)](https://go.microsoft.com/fwlink/p/?linkid=2069559) +- [Microsoft Defender Advanced Threat Protection (Microsoft Defender ATP)](https://go.microsoft.com/fwlink/p/?linkid=2069559) Windows Defender Offline is an antimalware scanning tool that lets you boot and run a scan from a trusted environment. The scan runs from outside the normal Windows kernel so it can target malware that attempts to bypass the Windows shell, such as viruses and rootkits that infect or overwrite the master boot record (MBR). diff --git a/windows/security/threat-protection/windows-defender-antivirus/windows-defender-security-center-antivirus.md b/windows/security/threat-protection/windows-defender-antivirus/windows-defender-security-center-antivirus.md index 4b78bafccb..739439af03 100644 --- a/windows/security/threat-protection/windows-defender-antivirus/windows-defender-security-center-antivirus.md +++ b/windows/security/threat-protection/windows-defender-antivirus/windows-defender-security-center-antivirus.md @@ -9,7 +9,7 @@ ms.mktglfcycl: manage ms.sitesec: library ms.pagetype: security ms.localizationpriority: medium -author: andreabichsel +author: justinha ms.author: v-anbic ms.date: 09/03/2018 --- @@ -18,7 +18,7 @@ ms.date: 09/03/2018 **Applies to:** -- [Windows Defender Advanced Threat Protection (Windows Defender ATP)](https://go.microsoft.com/fwlink/p/?linkid=2069559) +- [Microsoft Defender Advanced Threat Protection (Microsoft Defender ATP)](https://go.microsoft.com/fwlink/p/?linkid=2069559) In Windows 10, version 1703 and later, the Windows Defender app is part of the Windows Security. @@ -36,7 +36,7 @@ Settings that were previously part of the Windows Defender client and main Windo See the [Windows Security topic](/windows/threat-protection/windows-defender-security-center/windows-defender-security-center) for more information on other Windows security features that can be monitored in the app. >[!NOTE] ->The Windows Security app is a client interface on Windows 10, version 1703 and later. It is not the Windows Defender Security Center web portal that is used to review and manage [Windows Defender Advanced Threat Protection](../windows-defender-atp/windows-defender-advanced-threat-protection.md). +>The Windows Security app is a client interface on Windows 10, version 1703 and later. It is not the Microsoft Defender Security Center web portal that is used to review and manage [Microsoft Defender Advanced Threat Protection](../windows-defender-atp/windows-defender-advanced-threat-protection.md). **Review virus and threat protection settings in the Windows Security app:** From 86160de735f398daaf15c681e17e8e49e8b9d8a4 Mon Sep 17 00:00:00 2001 From: Joey Caparas Date: Wed, 10 Apr 2019 15:37:59 -0700 Subject: [PATCH 148/724] update product name in ac --- ...ation-control-events-centrally-using-advanced-hunting.md | 6 +++--- 1 file changed, 3 insertions(+), 3 deletions(-) diff --git a/windows/security/threat-protection/windows-defender-application-control/querying-application-control-events-centrally-using-advanced-hunting.md b/windows/security/threat-protection/windows-defender-application-control/querying-application-control-events-centrally-using-advanced-hunting.md index b1018f5e79..af40ccb8a4 100644 --- a/windows/security/threat-protection/windows-defender-application-control/querying-application-control-events-centrally-using-advanced-hunting.md +++ b/windows/security/threat-protection/windows-defender-application-control/querying-application-control-events-centrally-using-advanced-hunting.md @@ -16,12 +16,12 @@ ms.date: 12/06/2018 A Windows Defender Application Control (WDAC) policy logs events locally in Windows Event Viewer in either enforced or audit mode. While Event Viewer helps to see the impact on a single system, IT Pros want to gauge the impact across many systems. -In November 2018, we added functionality in Windows Defender Advanced Threat Protection (Windows Defender ATP) that makes it easy to view WDAC events centrally from all systems that are connected to Windows Defender ATP. +In November 2018, we added functionality in Microsoft Defender Advanced Threat Protection (Microsoft Defender ATP) that makes it easy to view WDAC events centrally from all systems that are connected to Microsoft Defender ATP. -Advanced hunting in Windows Defender ATP allows customers to query data using a rich set of capabilities. WDAC events can be queried with using an ActionType that starts with “AppControl”. +Advanced hunting in Microsoft Defender ATP allows customers to query data using a rich set of capabilities. WDAC events can be queried with using an ActionType that starts with “AppControl”. This capability is supported beginning with Windows version 1607. -Here is a simple example query that shows all the WDAC events generated in the last seven days from machines being monitored by Windows Defender ATP: +Here is a simple example query that shows all the WDAC events generated in the last seven days from machines being monitored by Microsoft Defender ATP: ``` MiscEvents From e415425c97c022173af243931e9e4ba0420a5ce1 Mon Sep 17 00:00:00 2001 From: Joey Caparas Date: Wed, 10 Apr 2019 15:39:39 -0700 Subject: [PATCH 149/724] update ag product names --- .../configure-wd-app-guard.md | 2 +- .../windows-defender-application-guard/faq-wd-app-guard.md | 2 +- .../windows-defender-application-guard/install-wd-app-guard.md | 2 +- .../windows-defender-application-guard/reqs-wd-app-guard.md | 2 +- .../test-scenarios-wd-app-guard.md | 2 +- .../windows-defender-application-guard/wd-app-guard-overview.md | 2 +- 6 files changed, 6 insertions(+), 6 deletions(-) diff --git a/windows/security/threat-protection/windows-defender-application-guard/configure-wd-app-guard.md b/windows/security/threat-protection/windows-defender-application-guard/configure-wd-app-guard.md index 80dbb5a03b..062d1ab9f3 100644 --- a/windows/security/threat-protection/windows-defender-application-guard/configure-wd-app-guard.md +++ b/windows/security/threat-protection/windows-defender-application-guard/configure-wd-app-guard.md @@ -13,7 +13,7 @@ ms.date: 10/17/2017 # Configure Windows Defender Application Guard policy settings -**Applies to:** [Windows Defender Advanced Threat Protection (Windows Defender ATP)](https://go.microsoft.com/fwlink/p/?linkid=2069559) +**Applies to:** [Microsoft Defender Advanced Threat Protection (Microsoft Defender ATP)](https://go.microsoft.com/fwlink/p/?linkid=2069559) Windows Defender Application Guard (Application Guard) works with Group Policy to help you manage your organization's computer settings. By using Group Policy, you can configure a setting once, and then copy it onto many computers. For example, you can set up multiple security settings in a GPO, which is linked to a domain, and then apply all those settings to every computer in the domain. diff --git a/windows/security/threat-protection/windows-defender-application-guard/faq-wd-app-guard.md b/windows/security/threat-protection/windows-defender-application-guard/faq-wd-app-guard.md index 8be213c70e..2bd4f7732a 100644 --- a/windows/security/threat-protection/windows-defender-application-guard/faq-wd-app-guard.md +++ b/windows/security/threat-protection/windows-defender-application-guard/faq-wd-app-guard.md @@ -14,7 +14,7 @@ ms.date: 03/28/2019 # Frequently asked questions - Windows Defender Application Guard -**Applies to:** [Windows Defender Advanced Threat Protection (Windows Defender ATP)](https://go.microsoft.com/fwlink/p/?linkid=2069559) +**Applies to:** [Microsoft Defender Advanced Threat Protection (Microsoft Defender ATP)](https://go.microsoft.com/fwlink/p/?linkid=2069559) Answering frequently asked questions about Windows Defender Application Guard (Application Guard) features, integration with the Windows operating system, and general configuration. diff --git a/windows/security/threat-protection/windows-defender-application-guard/install-wd-app-guard.md b/windows/security/threat-protection/windows-defender-application-guard/install-wd-app-guard.md index 7bbb3edc4c..b340cb1da4 100644 --- a/windows/security/threat-protection/windows-defender-application-guard/install-wd-app-guard.md +++ b/windows/security/threat-protection/windows-defender-application-guard/install-wd-app-guard.md @@ -14,7 +14,7 @@ ms.date: 02/19/2019 # Prepare to install Windows Defender Application Guard **Applies to:** -- [Windows Defender Advanced Threat Protection (Windows Defender ATP)](https://go.microsoft.com/fwlink/p/?linkid=2069559) +- [Microsoft Defender Advanced Threat Protection (Microsoft Defender ATP)](https://go.microsoft.com/fwlink/p/?linkid=2069559) ## Review system requirements diff --git a/windows/security/threat-protection/windows-defender-application-guard/reqs-wd-app-guard.md b/windows/security/threat-protection/windows-defender-application-guard/reqs-wd-app-guard.md index fc2f274410..7ae28017bf 100644 --- a/windows/security/threat-protection/windows-defender-application-guard/reqs-wd-app-guard.md +++ b/windows/security/threat-protection/windows-defender-application-guard/reqs-wd-app-guard.md @@ -13,7 +13,7 @@ ms.date: 11/09/2017 # System requirements for Windows Defender Application Guard -**Applies to:** [Windows Defender Advanced Threat Protection (Windows Defender ATP)](https://go.microsoft.com/fwlink/p/?linkid=2069559) +**Applies to:** [Microsoft Defender Advanced Threat Protection (Microsoft Defender ATP)](https://go.microsoft.com/fwlink/p/?linkid=2069559) The threat landscape is continually evolving. While hackers are busy developing new techniques to breach enterprise networks by compromising workstations, phishing schemes remain one of the top ways to lure employees into social engineering attacks. Windows Defender Application Guard is designed to help prevent old, and newly emerging attacks, to help keep employees productive. diff --git a/windows/security/threat-protection/windows-defender-application-guard/test-scenarios-wd-app-guard.md b/windows/security/threat-protection/windows-defender-application-guard/test-scenarios-wd-app-guard.md index 092d966221..e372ec40e6 100644 --- a/windows/security/threat-protection/windows-defender-application-guard/test-scenarios-wd-app-guard.md +++ b/windows/security/threat-protection/windows-defender-application-guard/test-scenarios-wd-app-guard.md @@ -14,7 +14,7 @@ ms.date: 03/15/2019 # Application Guard testing scenarios -**Applies to:** [Windows Defender Advanced Threat Protection (Windows Defender ATP)](https://go.microsoft.com/fwlink/p/?linkid=2069559) +**Applies to:** [Microsoft Defender Advanced Threat Protection (Microsoft Defender ATP)](https://go.microsoft.com/fwlink/p/?linkid=2069559) We've come up with a list of scenarios that you can use to test hardware-based isolation in your organization. diff --git a/windows/security/threat-protection/windows-defender-application-guard/wd-app-guard-overview.md b/windows/security/threat-protection/windows-defender-application-guard/wd-app-guard-overview.md index 41cf3d2bd0..e8dd4b2672 100644 --- a/windows/security/threat-protection/windows-defender-application-guard/wd-app-guard-overview.md +++ b/windows/security/threat-protection/windows-defender-application-guard/wd-app-guard-overview.md @@ -13,7 +13,7 @@ ms.date: 03/28/2019 # Windows Defender Application Guard overview -**Applies to:** [Windows Defender Advanced Threat Protection (Windows Defender ATP)](https://go.microsoft.com/fwlink/p/?linkid=2069559) +**Applies to:** [Microsoft Defender Advanced Threat Protection (Microsoft Defender ATP)](https://go.microsoft.com/fwlink/p/?linkid=2069559) Windows Defender Application Guard (Application Guard) is designed to help prevent old and newly emerging attacks to help keep employees productive. Using our unique hardware isolation approach, our goal is to destroy the playbook that attackers use by making current attack methods obsolete. From f7f39d937e9fe0e669b5c319b9b39fab276ccaa0 Mon Sep 17 00:00:00 2001 From: Joey Caparas Date: Wed, 10 Apr 2019 15:41:49 -0700 Subject: [PATCH 150/724] update wdsc folder with product name and author --- .../windows-defender-security-center/oldTOC.md | 8 ++++---- .../wdsc-account-protection.md | 4 ++-- .../wdsc-app-browser-control.md | 4 ++-- .../wdsc-customize-contact-information.md | 4 ++-- .../wdsc-device-performance-health.md | 4 ++-- .../wdsc-device-security.md | 4 ++-- .../wdsc-family-options.md | 4 ++-- .../wdsc-firewall-network-protection.md | 4 ++-- .../wdsc-hide-notifications.md | 4 ++-- .../wdsc-virus-threat-protection.md | 4 ++-- .../wdsc-windows-10-in-s-mode.md | 4 ++-- .../windows-defender-security-center.md | 6 +++--- 12 files changed, 27 insertions(+), 27 deletions(-) diff --git a/windows/security/threat-protection/windows-defender-security-center/oldTOC.md b/windows/security/threat-protection/windows-defender-security-center/oldTOC.md index 92d6f70f01..4ca95e5608 100644 --- a/windows/security/threat-protection/windows-defender-security-center/oldTOC.md +++ b/windows/security/threat-protection/windows-defender-security-center/oldTOC.md @@ -1,9 +1,9 @@ -# [The Windows Defender Security Center app](windows-defender-security-center.md) +# [The Microsoft Defender Security Center app](windows-defender-security-center.md) -## [Customize the Windows Defender Security Center app for your organization](wdsc-customize-contact-information.md) -## [Hide Windows Defender Security Center app notifications](wdsc-hide-notifications.md) -## [Manage Windows Defender Security Center in Windows 10 in S mode](wdsc-windows-10-in-s-mode.md) +## [Customize the Microsoft Defender Security Center app for your organization](wdsc-customize-contact-information.md) +## [Hide Microsoft Defender Security Center app notifications](wdsc-hide-notifications.md) +## [Manage Microsoft Defender Security Center in Windows 10 in S mode](wdsc-windows-10-in-s-mode.md) ## [Virus and threat protection](wdsc-virus-threat-protection.md) ## [Account protection](wdsc-account-protection.md) ## [Firewall and network protection](wdsc-firewall-network-protection.md) diff --git a/windows/security/threat-protection/windows-defender-security-center/wdsc-account-protection.md b/windows/security/threat-protection/windows-defender-security-center/wdsc-account-protection.md index eb6433dadd..f0717a9b1f 100644 --- a/windows/security/threat-protection/windows-defender-security-center/wdsc-account-protection.md +++ b/windows/security/threat-protection/windows-defender-security-center/wdsc-account-protection.md @@ -9,8 +9,8 @@ ms.mktglfcycl: manage ms.sitesec: library ms.pagetype: security ms.localizationpriority: medium -author: andreabichsel -ms.author: v-anbic +author: justinha +ms.author: justinha ms.date: 04/30/2018 --- diff --git a/windows/security/threat-protection/windows-defender-security-center/wdsc-app-browser-control.md b/windows/security/threat-protection/windows-defender-security-center/wdsc-app-browser-control.md index f8a95593d9..4b44cd3f09 100644 --- a/windows/security/threat-protection/windows-defender-security-center/wdsc-app-browser-control.md +++ b/windows/security/threat-protection/windows-defender-security-center/wdsc-app-browser-control.md @@ -9,8 +9,8 @@ ms.mktglfcycl: manage ms.sitesec: library ms.pagetype: security ms.localizationpriority: medium -author: andreabichsel -ms.author: v-anbic +author: justinha +ms.author: justinha ms.date: 04/30/2018 --- diff --git a/windows/security/threat-protection/windows-defender-security-center/wdsc-customize-contact-information.md b/windows/security/threat-protection/windows-defender-security-center/wdsc-customize-contact-information.md index 30cc2c355d..f8ac757f91 100644 --- a/windows/security/threat-protection/windows-defender-security-center/wdsc-customize-contact-information.md +++ b/windows/security/threat-protection/windows-defender-security-center/wdsc-customize-contact-information.md @@ -9,8 +9,8 @@ ms.mktglfcycl: manage ms.sitesec: library ms.pagetype: security ms.localizationpriority: medium -author: andreabichsel -ms.author: v-anbic +author: justinha +ms.author: justinha ms.date: 04/30/2018 --- diff --git a/windows/security/threat-protection/windows-defender-security-center/wdsc-device-performance-health.md b/windows/security/threat-protection/windows-defender-security-center/wdsc-device-performance-health.md index 83258123af..4abfa20ff5 100644 --- a/windows/security/threat-protection/windows-defender-security-center/wdsc-device-performance-health.md +++ b/windows/security/threat-protection/windows-defender-security-center/wdsc-device-performance-health.md @@ -9,8 +9,8 @@ ms.mktglfcycl: manage ms.sitesec: library ms.pagetype: security ms.localizationpriority: medium -author: andreabichsel -ms.author: v-anbic +author: justinha +ms.author: justinha ms.date: 04/30/2018 --- diff --git a/windows/security/threat-protection/windows-defender-security-center/wdsc-device-security.md b/windows/security/threat-protection/windows-defender-security-center/wdsc-device-security.md index 5df35a849e..6b828b0347 100644 --- a/windows/security/threat-protection/windows-defender-security-center/wdsc-device-security.md +++ b/windows/security/threat-protection/windows-defender-security-center/wdsc-device-security.md @@ -9,8 +9,8 @@ ms.mktglfcycl: manage ms.sitesec: library ms.pagetype: security ms.localizationpriority: medium -author: andreabichsel -ms.author: v-anbic +author: justinha +ms.author: justinha ms.date: 10/02/2018 --- diff --git a/windows/security/threat-protection/windows-defender-security-center/wdsc-family-options.md b/windows/security/threat-protection/windows-defender-security-center/wdsc-family-options.md index cc7706945e..84f4c82eae 100644 --- a/windows/security/threat-protection/windows-defender-security-center/wdsc-family-options.md +++ b/windows/security/threat-protection/windows-defender-security-center/wdsc-family-options.md @@ -9,8 +9,8 @@ ms.mktglfcycl: manage ms.sitesec: library ms.pagetype: security ms.localizationpriority: medium -author: andreabichsel -ms.author: v-anbic +author: justinha +ms.author: justinha ms.date: 04/30/2018 --- diff --git a/windows/security/threat-protection/windows-defender-security-center/wdsc-firewall-network-protection.md b/windows/security/threat-protection/windows-defender-security-center/wdsc-firewall-network-protection.md index 1aea2d2d26..29be0d4d92 100644 --- a/windows/security/threat-protection/windows-defender-security-center/wdsc-firewall-network-protection.md +++ b/windows/security/threat-protection/windows-defender-security-center/wdsc-firewall-network-protection.md @@ -9,8 +9,8 @@ ms.mktglfcycl: manage ms.sitesec: library ms.pagetype: security ms.localizationpriority: medium -author: andreabichsel -ms.author: v-anbic +author: justinha +ms.author: justinha ms.date: 04/30/2018 --- diff --git a/windows/security/threat-protection/windows-defender-security-center/wdsc-hide-notifications.md b/windows/security/threat-protection/windows-defender-security-center/wdsc-hide-notifications.md index b936dc1dcb..98abf1ab59 100644 --- a/windows/security/threat-protection/windows-defender-security-center/wdsc-hide-notifications.md +++ b/windows/security/threat-protection/windows-defender-security-center/wdsc-hide-notifications.md @@ -9,8 +9,8 @@ ms.mktglfcycl: manage ms.sitesec: library ms.pagetype: security ms.localizationpriority: medium -author: andreabichsel -ms.author: v-anbic +author: justinha +ms.author: justinha ms.date: 04/30/2018 --- diff --git a/windows/security/threat-protection/windows-defender-security-center/wdsc-virus-threat-protection.md b/windows/security/threat-protection/windows-defender-security-center/wdsc-virus-threat-protection.md index f4ee73535b..db876c5abf 100644 --- a/windows/security/threat-protection/windows-defender-security-center/wdsc-virus-threat-protection.md +++ b/windows/security/threat-protection/windows-defender-security-center/wdsc-virus-threat-protection.md @@ -9,8 +9,8 @@ ms.mktglfcycl: manage ms.sitesec: library ms.pagetype: security ms.localizationpriority: medium -author: andreabichsel -ms.author: v-anbic +author: justinha +ms.author: justinha ms.date: 04/30/2018 --- diff --git a/windows/security/threat-protection/windows-defender-security-center/wdsc-windows-10-in-s-mode.md b/windows/security/threat-protection/windows-defender-security-center/wdsc-windows-10-in-s-mode.md index f13658dab4..b17f381379 100644 --- a/windows/security/threat-protection/windows-defender-security-center/wdsc-windows-10-in-s-mode.md +++ b/windows/security/threat-protection/windows-defender-security-center/wdsc-windows-10-in-s-mode.md @@ -9,8 +9,8 @@ ms.mktglfcycl: manage ms.sitesec: library ms.pagetype: security ms.localizationpriority: medium -author: andreabichsel -ms.author: v-anbic +author: justinha +ms.author: justinha ms.date: 04/30/2018 --- diff --git a/windows/security/threat-protection/windows-defender-security-center/windows-defender-security-center.md b/windows/security/threat-protection/windows-defender-security-center/windows-defender-security-center.md index 60a0d3278b..938c532c3d 100644 --- a/windows/security/threat-protection/windows-defender-security-center/windows-defender-security-center.md +++ b/windows/security/threat-protection/windows-defender-security-center/windows-defender-security-center.md @@ -9,8 +9,8 @@ ms.mktglfcycl: manage ms.sitesec: library ms.pagetype: security ms.localizationpriority: medium -author: andreabichsel -ms.author: v-anbic +author: justinha +ms.author: justinha ms.date: 10/02/2018 --- @@ -37,7 +37,7 @@ In Windows 10, version 1803, the app has two new areas, **Account protection** a ![Screen shot of the Windows Security app showing that the device is protected and five icons for each of the features](images/security-center-home.png) >[!NOTE] ->The Windows Security app is a client interface on Windows 10, version 1703 and later. It is not the Windows Defender Security Center web portal console that is used to review and manage [Windows Defender Advanced Threat Protection](https://docs.microsoft.com/windows/threat-protection/windows-defender-atp/windows-defender-advanced-threat-protection). +>The Windows Security app is a client interface on Windows 10, version 1703 and later. It is not the Microsoft Defender Security Center web portal console that is used to review and manage [Microsoft Defender Advanced Threat Protection](https://docs.microsoft.com/windows/threat-protection/windows-defender-atp/windows-defender-advanced-threat-protection). You can't uninstall the Windows Security app, but you can do one of the following: From 0c3ad2be39a454727316522f1366bfe1625d7cb3 Mon Sep 17 00:00:00 2001 From: Beth Levin Date: Wed, 10 Apr 2019 15:42:04 -0700 Subject: [PATCH 151/724] updeate redirects --- .openpublishing.redirection.json | 171 +++++++++++++++++++++++-------- 1 file changed, 128 insertions(+), 43 deletions(-) diff --git a/.openpublishing.redirection.json b/.openpublishing.redirection.json index 068c8c88fa..fc7f418de0 100644 --- a/.openpublishing.redirection.json +++ b/.openpublishing.redirection.json @@ -856,14 +856,19 @@ "redirect_document_id": true }, { +"source_path": "windows/threat-protection/windows-defender-atp/advanced-features-windows-defender-advanced-threat-protection.md", +"redirect_url": "/windows/security/threat-protection/windows-defender-atp/advanced-features-windows-defender-advanced-threat-protection", +"redirect_document_id": true +}, +{ "source_path": "windows/security/threat-protection/windows-defender-atp/advanced-features-windows-defender-advanced-threat-protection.md", "redirect_url": "/windows/security/threat-protection/microsoft-defender-atp/advanced-features", "redirect_document_id": true }, { -"source_path": "windows/threat-protection/windows-defender-atp/advanced-features-windows-defender-advanced-threat-protection.md", -"redirect_url": "/windows/security/threat-protection/microsoft-defender-atp/advanced-features", -"redirect_document_id": false +"source_path": "windows/threat-protection/windows-defender-atp/alerts-queue-windows-defender-advanced-threat-protection.md", +"redirect_url": "/windows/security/threat-protection/windows-defender-atp/alerts-queue-windows-defender-advanced-threat-protection", +"redirect_document_id": true }, { "source_path": "windows/security/threat-protection/windows-defender-atp/alerts-queue-windows-defender-advanced-threat-protection.md", @@ -871,8 +876,8 @@ "redirect_document_id": true }, { -"source_path": "windows/threat-protection/windows-defender-atp/alerts-queue-windows-defender-advanced-threat-protection.md", -"redirect_url": "/windows/security/threat-protection/microsoft-defender-atp/alerts-queue", +"source_path": "windows/threat-protection/windows-defender-atp/api-portal-mapping-windows-defender-advanced-threat-protection.md", +"redirect_url": "/windows/security/threat-protection/windows-defender-atp/api-portal-mapping-windows-defender-advanced-threat-protection", "redirect_document_id": true }, { @@ -881,8 +886,8 @@ "redirect_document_id": true }, { -"source_path": "windows/threat-protection/windows-defender-atp/api-portal-mapping-windows-defender-advanced-threat-protection.md", -"redirect_url": "/windows/security/threat-protection/microsoft-defender-atp/api-portal-mapping", +"source_path": "windows/threat-protection/windows-defender-atp/assign-portal-access-windows-defender-advanced-threat-protection.md", +"redirect_url": "/windows/security/threat-protection/windows-defender-atp/assign-portal-access-windows-defender-advanced-threat-protection", "redirect_document_id": true }, { @@ -891,8 +896,8 @@ "redirect_document_id": true }, { -"source_path": "windows/threat-protection/windows-defender-atp/assign-portal-access-windows-defender-advanced-threat-protection.md", -"redirect_url": "/windows/security/threat-protection/microsoft-defender-atp/assign-portal-access", +"source_path": "windows/threat-protection/windows-defender-atp/check-sensor-status-windows-defender-advanced-threat-protection.md", +"redirect_url": "/windows/security/threat-protection/windows-defender-atp/check-sensor-status-windows-defender-advanced-threat-protection", "redirect_document_id": true }, { @@ -901,53 +906,33 @@ "redirect_document_id": true }, { -"source_path": "windows/threat-protection/windows-defender-atp/check-sensor-status-windows-defender-advanced-threat-protection.md", -"redirect_url": "/windows/security/threat-protection/microsoft-defender-atp/check-sensor-status", -"redirect_document_id": true -}, -{ "source_path": "windows/threat-protection/windows-defender-atp/community-windows-defender-advanced-threat-protection.md", "redirect_url": "/windows/security/threat-protection/windows-defender-atp/community-windows-defender-advanced-threat-protection", "redirect_document_id": true }, { +"source_path": "windows/security/threat-protection/windows-defender-atp/community-windows-defender-advanced-threat-protection.md", +"redirect_url": "/windows/security/threat-protection/microsoft-defender-atp/community", +"redirect_document_id": true +}, +{ "source_path": "windows/threat-protection/windows-defender-atp/configure-arcsight-windows-defender-advanced-threat-protection.md", "redirect_url": "/windows/security/threat-protection/windows-defender-atp/configure-arcsight-windows-defender-advanced-threat-protection", "redirect_document_id": true }, { +"source_path": "windows/security/threat-protection/windows-defender-atp/configure-arcsight-windows-defender-advanced-threat-protection.md", +"redirect_url": "/windows/security/threat-protection/microsoft-defender-atp/configure-arcsight", +"redirect_document_id": true +}, +{ "source_path": "windows/threat-protection/windows-defender-atp/configure-email-notifications-windows-defender-advanced-threat-protection.md", "redirect_url": "/windows/security/threat-protection/windows-defender-atp/configure-email-notifications-windows-defender-advanced-threat-protection", "redirect_document_id": true }, { -"source_path": "windows/threat-protection/windows-defender-atp/configure-endpoints-gp-windows-defender-advanced-threat-protection.md", -"redirect_url": "/windows/security/threat-protection/windows-defender-atp/configure-endpoints-gp-windows-defender-advanced-threat-protection", -"redirect_document_id": true -}, -{ -"source_path": "windows/threat-protection/windows-defender-atp/configure-endpoints-mdm-windows-defender-advanced-threat-protection.md", -"redirect_url": "/windows/security/threat-protection/windows-defender-atp/configure-endpoints-mdm-windows-defender-advanced-threat-protection", -"redirect_document_id": true -}, -{ -"source_path": "windows/threat-protection/windows-defender-atp/configure-endpoints-non-windows-windows-defender-advanced-threat-protection.md", -"redirect_url": "/windows/security/threat-protection/windows-defender-atp/configure-endpoints-non-windows-windows-defender-advanced-threat-protection", -"redirect_document_id": true -}, -{ -"source_path": "windows/threat-protection/windows-defender-atp/configure-endpoints-sccm-windows-defender-advanced-threat-protection.md", -"redirect_url": "/windows/security/threat-protection/windows-defender-atp/configure-endpoints-sccm-windows-defender-advanced-threat-protection", -"redirect_document_id": true -}, -{ -"source_path": "windows/threat-protection/windows-defender-atp/configure-endpoints-script-windows-defender-advanced-threat-protection.md", -"redirect_url": "/windows/security/threat-protection/windows-defender-atp/configure-endpoints-script-windows-defender-advanced-threat-protection", -"redirect_document_id": true -}, -{ -"source_path": "windows/threat-protection/windows-defender-atp/configure-endpoints-vdi-windows-defender-advanced-threat-protection.md", -"redirect_url": "/windows/security/threat-protection/windows-defender-atp/configure-endpoints-vdi-windows-defender-advanced-threat-protection", +"source_path": "windows/security/threat-protection/windows-defender-atp/configure-email-notifications-windows-defender-advanced-threat-protection.md", +"redirect_url": "/windows/security/threat-protection/microsoft-defender-atp/configure-email-notifications", "redirect_document_id": true }, { @@ -956,33 +941,118 @@ "redirect_document_id": true }, { +"source_path": "windows/security/threat-protection/windows-defender-atp/configure-endpoints-windows-defender-advanced-threat-protection.md", +"redirect_url": "/windows/security/threat-protection/microsoft-defender-atp/configure-endpoints", +"redirect_document_id": true +}, +{ +"source_path": "windows/threat-protection/windows-defender-atp/configure-endpoints-gp-windows-defender-advanced-threat-protection.md", +"redirect_url": "/windows/security/threat-protection/windows-defender-atp/configure-endpoints-gp-windows-defender-advanced-threat-protection", +"redirect_document_id": true +}, +{ +"source_path": "windows/security/threat-protection/windows-defender-atp/configure-endpoints-gp-windows-defender-advanced-threat-protection.md", +"redirect_url": "/windows/security/threat-protection/microsoft-defender-atp/configure-endpoints-gp", +"redirect_document_id": true +}, +{ +"source_path": "windows/threat-protection/windows-defender-atp/configure-endpoints-mdm-windows-defender-advanced-threat-protection.md", +"redirect_url": "/windows/security/threat-protection/windows-defender-atp/configure-endpoints-mdm-windows-defender-advanced-threat-protection", +"redirect_document_id": true +}, +{ +"source_path": "windows/security/threat-protection/windows-defender-atp/configure-endpoints-mdm-windows-defender-advanced-threat-protection.md", +"redirect_url": "/windows/security/threat-protection/microsoft-defender-atp/configure-endpoints-mdm", +"redirect_document_id": true +}, +{ +"source_path": "windows/threat-protection/windows-defender-atp/configure-endpoints-non-windows-windows-defender-advanced-threat-protection.md", +"redirect_url": "/windows/security/threat-protection/windows-defender-atp/configure-endpoints-non-windows-windows-defender-advanced-threat-protection", +"redirect_document_id": true +}, +{ +"source_path": "windows/security/threat-protection/windows-defender-atp/configure-endpoints-non-windows-windows-defender-advanced-threat-protection.md", +"redirect_url": "/windows/security/threat-protection/microsoft-defender-atp/configure-endpoints-non-windows", +"redirect_document_id": true +}, +{ +"source_path": "windows/threat-protection/windows-defender-atp/configure-endpoints-sccm-windows-defender-advanced-threat-protection.md", +"redirect_url": "/windows/security/threat-protection/windows-defender-atp/configure-endpoints-sccm-windows-defender-advanced-threat-protection", +"redirect_document_id": true +}, +{ +"source_path": "windows/security/threat-protection/windows-defender-atp/configure-endpoints-sccm-windows-defender-advanced-threat-protection.md", +"redirect_url": "/windows/security/threat-protection/microsoft-defender-atp/configure-endpoints-sccm", +"redirect_document_id": true +}, +{ +"source_path": "windows/threat-protection/windows-defender-atp/configure-endpoints-script-windows-defender-advanced-threat-protection.md", +"redirect_url": "/windows/security/threat-protection/windows-defender-atp/configure-endpoints-script-windows-defender-advanced-threat-protection", +"redirect_document_id": true +}, +{ +"source_path": "windows/security/threat-protection/windows-defender-atp/configure-endpoints-script-windows-defender-advanced-threat-protection.md", +"redirect_url": "/windows/security/threat-protection/microsoft-defender-atp/configure-endpoints-script", +"redirect_document_id": true +}, +{ +"source_path": "windows/threat-protection/windows-defender-atp/configure-endpoints-vdi-windows-defender-advanced-threat-protection.md", +"redirect_url": "/windows/security/threat-protection/windows-defender-atp/configure-endpoints-vdi-windows-defender-advanced-threat-protection", +"redirect_document_id": true +}, +{ +"source_path": "windows/security/threat-protection/windows-defender-atp/configure-endpoints-vdi-windows-defender-advanced-threat-protection.md", +"redirect_url": "/windows/security/threat-protection/microsoft-defender-atp/configure-endpoints-vdi", +"redirect_document_id": true +}, +{ "source_path": "windows/threat-protection/windows-defender-atp/configure-proxy-internet-windows-defender-advanced-threat-protection.md", "redirect_url": "/windows/security/threat-protection/windows-defender-atp/configure-proxy-internet-windows-defender-advanced-threat-protection", "redirect_document_id": true }, { +"source_path": "windows/security/threat-protection/windows-defender-atp/configure-proxy-internet-windows-defender-advanced-threat-protection.md", +"redirect_url": "/windows/security/threat-protection/microsoft-defender-atp/configure-proxy-internet", +"redirect_document_id": true +}, +{ "source_path": "windows/threat-protection/windows-defender-atp/configure-server-endpoints-windows-defender-advanced-threat-protection.md", "redirect_url": "/windows/security/threat-protection/windows-defender-atp/configure-server-endpoints-windows-defender-advanced-threat-protection", "redirect_document_id": true }, { +"source_path": "windows/security/threat-protection/windows-defender-atp/configure-server-endpoints-windows-defender-advanced-threat-protection.md", +"redirect_url": "/windows/security/threat-protection/microsoft-defender-atp/configure-server-endpoints", +"redirect_document_id": true +}, +{ "source_path": "windows/threat-protection/windows-defender-atp/configure-siem-windows-defender-advanced-threat-protection.md", "redirect_url": "/windows/security/threat-protection/windows-defender-atp/configure-siem-windows-defender-advanced-threat-protection", "redirect_document_id": true }, { +"source_path": "windows/security/threat-protection/windows-defender-atp/configure-siem-windows-defender-advanced-threat-protection.md", +"redirect_url": "/windows/security/threat-protection/microsoft-defender-atp/configure-siem", +"redirect_document_id": true +}, +{ "source_path": "windows/threat-protection/windows-defender-atp/configure-splunk-windows-defender-advanced-threat-protection.md", "redirect_url": "/windows/security/threat-protection/windows-defender-atp/configure-splunk-windows-defender-advanced-threat-protection", "redirect_document_id": true }, { +"source_path": "windows/security/threat-protection/windows-defender-atp/configure-splunk-windows-defender-advanced-threat-protection.md", +"redirect_url": "/windows/security/threat-protection/microsoft-defender-atp/configure-splunk", +"redirect_document_id": true +}, +{ "source_path": "windows/threat-protection/windows-defender-atp/custom-ti-api-windows-defender-advanced-threat-protection.md", "redirect_url": "/windows/security/threat-protection/windows-defender-atp/custom-ti-api-windows-defender-advanced-threat-protection", "redirect_document_id": true }, { -"source_path": "windows/threat-protection/windows-defender-atp/dashboard-windows-defender-advanced-threat-protection.md", -"redirect_url": "/windows/security/threat-protection/windows-defender-atp/dashboard-windows-defender-advanced-threat-protection", +"source_path": "windows/security/threat-protection/windows-defender-atp/custom-ti-api-windows-defender-advanced-threat-protection.md", +"redirect_url": "/windows/security/threat-protection/microsoft-defender-atp/custom-ti-api", "redirect_document_id": true }, { @@ -991,16 +1061,31 @@ "redirect_document_id": true }, { +"source_path": "windows/security/threat-protection/windows-defender-atp/data-storage-privacy-windows-defender-advanced-threat-protection.md", +"redirect_url": "/windows/security/threat-protection/microsoft-defender-atp/data-storage-privacy", +"redirect_document_id": true +}, +{ "source_path": "windows/threat-protection/windows-defender-atp/defender-compatibility-windows-defender-advanced-threat-protection.md", "redirect_url": "/windows/security/threat-protection/windows-defender-atp/defender-compatibility-windows-defender-advanced-threat-protection", "redirect_document_id": true }, { +"source_path": "windows/security/threat-protection/windows-defender-atp/defender-compatibility-windows-defender-advanced-threat-protection.md", +"redirect_url": "/windows/security/threat-protection/microsoft-defender-atp/defender-compatibility", +"redirect_document_id": true +}, +{ "source_path": "windows/threat-protection/windows-defender-atp/enable-custom-ti-windows-defender-advanced-threat-protection.md", "redirect_url": "/windows/security/threat-protection/windows-defender-atp/enable-custom-ti-windows-defender-advanced-threat-protection", "redirect_document_id": true }, { +"source_path": "windows/security/threat-protection/windows-defender-atp/enable-custom-ti-windows-defender-advanced-threat-protection.md", +"redirect_url": "/windows/security/threat-protection/microsoft-defender-atp/enable-custom-ti", +"redirect_document_id": true +}, +{ "source_path": "windows/threat-protection/windows-defender-atp/enable-security-analytics-windows-defender-advanced-threat-protection.md", "redirect_url": "/windows/security/threat-protection/windows-defender-atp/enable-security-analytics-windows-defender-advanced-threat-protection", "redirect_document_id": true From 50e74994efceb3b662077ed34aa53e2ea7d6d00c Mon Sep 17 00:00:00 2001 From: Joey Caparas Date: Wed, 10 Apr 2019 15:48:58 -0700 Subject: [PATCH 152/724] remove wdatp in links --- .../microsoft-defender-atp/alerts.md | 18 +++++------ .../collect-investigation-package.md | 2 +- .../create-alert-by-reference.md | 2 +- .../exposed-apis-create-app-nativeapp.md | 2 +- .../exposed-apis-create-app-webapp.md | 2 +- .../exposed-apis-odata-samples.md | 6 ++-- .../microsoft-defender-atp/files.md | 8 ++--- .../get-alert-info-by-id.md | 2 +- .../microsoft-defender-atp/get-alerts.md | 2 +- .../get-domain-related-alerts.md | 2 +- .../get-domain-related-machines.md | 2 +- .../get-file-information.md | 2 +- .../get-file-related-alerts.md | 2 +- .../get-file-related-machines.md | 2 +- .../get-ip-related-alerts.md | 2 +- .../get-ip-related-machines.md | 2 +- .../get-machine-by-id.md | 2 +- .../get-machine-log-on-users.md | 2 +- .../get-machine-related-alerts.md | 2 +- .../get-machineaction-object.md | 2 +- .../get-machineactions-collection.md | 2 +- .../microsoft-defender-atp/get-machines.md | 2 +- .../get-package-sas-uri.md | 2 +- .../get-ti-indicators-collection.md | 2 +- .../get-user-information.md | 2 +- .../get-user-related-machines.md | 2 +- .../microsoft-defender-atp/isolate-machine.md | 4 +-- .../microsoft-defender-atp/machine-tags.md | 2 +- .../microsoft-defender-atp/machine.md | 30 +++++++++---------- .../microsoft-defender-atp/machineaction.md | 22 +++++++------- .../offboard-machine-api.md | 2 +- .../post-ti-indicator.md | 6 ++-- .../restrict-code-execution.md | 4 +-- .../stop-and-quarantine-file.md | 2 +- .../microsoft-defender-atp/ti-indicator.md | 8 ++--- .../unisolate-machine.md | 4 +-- .../unrestrict-code-execution.md | 4 +-- .../microsoft-defender-atp/update-alert.md | 2 +- .../microsoft-defender-atp/use-apis.md | 2 +- .../microsoft-defender-atp/user.md | 4 +-- 40 files changed, 87 insertions(+), 87 deletions(-) diff --git a/windows/security/threat-protection/microsoft-defender-atp/alerts.md b/windows/security/threat-protection/microsoft-defender-atp/alerts.md index d2fdf0726f..761f24b3f0 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/alerts.md +++ b/windows/security/threat-protection/microsoft-defender-atp/alerts.md @@ -27,14 +27,14 @@ Represents an alert entity in Microsoft Defender ATP. # Methods Method|Return Type |Description :---|:---|:--- -[Get alert](get-alert-info-by-id-windows-defender-advanced-threat-protection-new.md) | [Alert](alerts-windows-defender-advanced-threat-protection-new.md) | Get a single [alert](alerts-windows-defender-advanced-threat-protection-new.md) object. -[List alerts](get-alerts-windows-defender-advanced-threat-protection-new.md) | [Alert](alerts-windows-defender-advanced-threat-protection-new.md) collection | List [alert](alerts-windows-defender-advanced-threat-protection-new.md) collection. -[Create alert](create-alert-by-reference-windows-defender-advanced-threat-protection-new.md)|[Alert](alerts-windows-defender-advanced-threat-protection-new.md)|Create an alert based on event data obtained from [Advanced Hunting](run-advanced-query-api.md). -[List related domains](get-alert-related-domain-info-windows-defender-advanced-threat-protection-new.md)|Domain collection| List URLs associated with the alert. -[List related files](get-alert-related-files-info-windows-defender-advanced-threat-protection-new.md) | [File](files-windows-defender-advanced-threat-protection-new.md) collection | List the [file](files-windows-defender-advanced-threat-protection-new.md) entities that are associated with the [alert](alerts-windows-defender-advanced-threat-protection-new.md). -[List related IPs](get-alert-related-ip-info-windows-defender-advanced-threat-protection-new.md) | IP collection | List IPs that are associated with the alert. -[Get related machines](get-alert-related-machine-info-windows-defender-advanced-threat-protection-new.md) | [Machine](machine-windows-defender-advanced-threat-protection-new.md) | The [machine](machine-windows-defender-advanced-threat-protection-new.md) that is associated with the [alert](alerts-windows-defender-advanced-threat-protection-new.md). -[Get related users](get-alert-related-user-info-windows-defender-advanced-threat-protection-new.md) | [User](user-windows-defender-advanced-threat-protection-new.md) | The [user](user-windows-defender-advanced-threat-protection-new.md) that is associated with the [alert](alerts-windows-defender-advanced-threat-protection-new.md). +[Get alert](get-alert-info-by-id.md) | [Alert](alerts.md) | Get a single [alert](alerts.md) object. +[List alerts](get-alerts.md) | [Alert](alerts.md) collection | List [alert](alerts.md) collection. +[Create alert](create-alert-by-reference.md)|[Alert](alerts.md)|Create an alert based on event data obtained from [Advanced Hunting](run-advanced-query-api.md). +[List related domains](get-alert-related-domain-info.md)|Domain collection| List URLs associated with the alert. +[List related files](get-alert-related-files-info.md) | [File](files.md) collection | List the [file](files.md) entities that are associated with the [alert](alerts.md). +[List related IPs](get-alert-related-ip-info.md) | IP collection | List IPs that are associated with the alert. +[Get related machines](get-alert-related-machine-info.md) | [Machine](machine.md) | The [machine](machine.md) that is associated with the [alert](alerts.md). +[Get related users](get-alert-related-user-info.md) | [User](user.md) | The [user](user.md) that is associated with the [alert](alerts.md). # Properties @@ -57,7 +57,7 @@ alertCreationTime | DateTimeOffset | The date and time (in UTC) the alert was cr lastEventTime | DateTimeOffset | The last occurance of the event that triggered the alert on the same machine. firstEventTime | DateTimeOffset | The first occurance of the event that triggered the alert on that machine. resolvedTime | DateTimeOffset | The date and time in which the status of the alert was changed to 'Resolved'. -machineId | String | ID of a [machine](machine-windows-defender-advanced-threat-protection-new.md) entity that is associated with the alert. +machineId | String | ID of a [machine](machine.md) entity that is associated with the alert. # JSON representation ``` diff --git a/windows/security/threat-protection/microsoft-defender-atp/collect-investigation-package.md b/windows/security/threat-protection/microsoft-defender-atp/collect-investigation-package.md index c828e5a9b8..49aa2a3832 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/collect-investigation-package.md +++ b/windows/security/threat-protection/microsoft-defender-atp/collect-investigation-package.md @@ -60,7 +60,7 @@ Parameter | Type | Description Comment | String | Comment to associate with the action. **Required**. ## Response -If successful, this method returns 201 - Created response code and [Machine Action](machineaction-windows-defender-advanced-threat-protection-new.md) in the response body. +If successful, this method returns 201 - Created response code and [Machine Action](machineaction.md) in the response body. ## Example diff --git a/windows/security/threat-protection/microsoft-defender-atp/create-alert-by-reference.md b/windows/security/threat-protection/microsoft-defender-atp/create-alert-by-reference.md index f21867e552..67376f8415 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/create-alert-by-reference.md +++ b/windows/security/threat-protection/microsoft-defender-atp/create-alert-by-reference.md @@ -69,7 +69,7 @@ category| String | Category of the alert. The property values are: 'None', 'Susp ## Response -If successful, this method returns 200 OK, and a new [alert](alerts-windows-defender-advanced-threat-protection-new.md) object in the response body. If event with the specified properties (_reportId_, _eventTime_ and _machineId_) was not found - 404 Not Found. +If successful, this method returns 200 OK, and a new [alert](alerts.md) object in the response body. If event with the specified properties (_reportId_, _eventTime_ and _machineId_) was not found - 404 Not Found. ## Example diff --git a/windows/security/threat-protection/microsoft-defender-atp/exposed-apis-create-app-nativeapp.md b/windows/security/threat-protection/microsoft-defender-atp/exposed-apis-create-app-nativeapp.md index 5d6e59a7c2..4d8dbed5a8 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/exposed-apis-create-app-nativeapp.md +++ b/windows/security/threat-protection/microsoft-defender-atp/exposed-apis-create-app-nativeapp.md @@ -82,7 +82,7 @@ This page explains how to create an AAD application, get an access token to Micr For instance, - To [run advanced queries](run-advanced-query-api.md), select 'Run advanced queries' permission - - To [isolate a machine](isolate-machine-windows-defender-advanced-threat-protection-new.md), select 'Isolate machine' permission + - To [isolate a machine](isolate-machine.md), select 'Isolate machine' permission To determine which permission you need, look at the **Permissions** section in the API you are interested to call. diff --git a/windows/security/threat-protection/microsoft-defender-atp/exposed-apis-create-app-webapp.md b/windows/security/threat-protection/microsoft-defender-atp/exposed-apis-create-app-webapp.md index e0800f060b..9d46f63fe7 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/exposed-apis-create-app-webapp.md +++ b/windows/security/threat-protection/microsoft-defender-atp/exposed-apis-create-app-webapp.md @@ -74,7 +74,7 @@ This page explains how to create an AAD application, get an access token to Micr For instance, - To [run advanced queries](run-advanced-query-api.md), select 'Run advanced queries' permission - - To [isolate a machine](isolate-machine-windows-defender-advanced-threat-protection-new.md), select 'Isolate machine' permission + - To [isolate a machine](isolate-machine.md), select 'Isolate machine' permission - To determine which permission you need, please look at the **Permissions** section in the API you are interested to call. ![Image of select permissions](images/webapp-select-permission.png) diff --git a/windows/security/threat-protection/microsoft-defender-atp/exposed-apis-odata-samples.md b/windows/security/threat-protection/microsoft-defender-atp/exposed-apis-odata-samples.md index 3eb6c6eb6b..393903a87e 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/exposed-apis-odata-samples.md +++ b/windows/security/threat-protection/microsoft-defender-atp/exposed-apis-odata-samples.md @@ -29,9 +29,9 @@ ms.date: 11/15/2018 ### Properties that supports $filter: -- [Alert](alerts-windows-defender-advanced-threat-protection-new.md): Id, IncidentId, AlertCreationTime, Status, Severity and Category. -- [Machine](machine-windows-defender-advanced-threat-protection-new.md): Id, ComputerDnsName, LastSeen, LastIpAddress, HealthStatus, OsPlatform, RiskScore, MachineTags and RbacGroupId. -- [MachineAction](machineaction-windows-defender-advanced-threat-protection-new.md): Id, Status, MachineId, Type, Requestor and CreationDateTimeUtc. +- [Alert](alerts.md): Id, IncidentId, AlertCreationTime, Status, Severity and Category. +- [Machine](machine.md): Id, ComputerDnsName, LastSeen, LastIpAddress, HealthStatus, OsPlatform, RiskScore, MachineTags and RbacGroupId. +- [MachineAction](machineaction.md): Id, Status, MachineId, Type, Requestor and CreationDateTimeUtc. ### Example 1 diff --git a/windows/security/threat-protection/microsoft-defender-atp/files.md b/windows/security/threat-protection/microsoft-defender-atp/files.md index 8a89db801c..85db198384 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/files.md +++ b/windows/security/threat-protection/microsoft-defender-atp/files.md @@ -27,10 +27,10 @@ Represent a file entity in Microsoft Defender ATP. # Methods Method|Return Type |Description :---|:---|:--- -[Get file](get-file-information-windows-defender-advanced-threat-protection-new.md) | [file](files-windows-defender-advanced-threat-protection-new.md) | Get a single file -[List file related alerts](get-file-related-alerts-windows-defender-advanced-threat-protection-new.md) | [alert](alerts-windows-defender-advanced-threat-protection-new.md) collection | Get the [alert](alerts-windows-defender-advanced-threat-protection-new.md) entities that are associated with the file. -[List file related machines](get-file-related-machines-windows-defender-advanced-threat-protection-new.md) | [machine](machine-windows-defender-advanced-threat-protection-new.md) collection | Get the [machine](machine-windows-defender-advanced-threat-protection-new.md) entities associated with the alert. -[file statistics](get-file-statistics-windows-defender-advanced-threat-protection-new.md) | Statistics summary | Retrieves the prevalence for the given file. +[Get file](get-file-information.md) | [file](files.md) | Get a single file +[List file related alerts](get-file-related-alerts.md) | [alert](alerts.md) collection | Get the [alert](alerts.md) entities that are associated with the file. +[List file related machines](get-file-related-machines.md) | [machine](machine.md) collection | Get the [machine](machine.md) entities associated with the alert. +[file statistics](get-file-statistics.md) | Statistics summary | Retrieves the prevalence for the given file. # Properties diff --git a/windows/security/threat-protection/microsoft-defender-atp/get-alert-info-by-id.md b/windows/security/threat-protection/microsoft-defender-atp/get-alert-info-by-id.md index 270323aae6..f8eea40763 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/get-alert-info-by-id.md +++ b/windows/security/threat-protection/microsoft-defender-atp/get-alert-info-by-id.md @@ -56,7 +56,7 @@ Authorization | String | Bearer {token}. **Required**. Empty ## Response -If successful, this method returns 200 OK, and the [alert](alerts-windows-defender-advanced-threat-protection-new.md) entity in the response body. If alert with the specified id was not found - 404 Not Found. +If successful, this method returns 200 OK, and the [alert](alerts.md) entity in the response body. If alert with the specified id was not found - 404 Not Found. ## Example diff --git a/windows/security/threat-protection/microsoft-defender-atp/get-alerts.md b/windows/security/threat-protection/microsoft-defender-atp/get-alerts.md index 6fb1bbbf17..46726fec58 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/get-alerts.md +++ b/windows/security/threat-protection/microsoft-defender-atp/get-alerts.md @@ -64,7 +64,7 @@ Authorization | String | Bearer {token}. **Required**. Empty ## Response -If successful, this method returns 200 OK, and a list of [alert](alerts-windows-defender-advanced-threat-protection-new.md) objects in the response body. +If successful, this method returns 200 OK, and a list of [alert](alerts.md) objects in the response body. ## Example diff --git a/windows/security/threat-protection/microsoft-defender-atp/get-domain-related-alerts.md b/windows/security/threat-protection/microsoft-defender-atp/get-domain-related-alerts.md index 6e1478cb72..4201cbf4d8 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/get-domain-related-alerts.md +++ b/windows/security/threat-protection/microsoft-defender-atp/get-domain-related-alerts.md @@ -61,7 +61,7 @@ Authorization | String | Bearer {token}. **Required**. Empty ## Response -If successful and domain exists - 200 OK with list of [alert](alerts-windows-defender-advanced-threat-protection-new.md) entities. If domain does not exist - 404 Not Found. +If successful and domain exists - 200 OK with list of [alert](alerts.md) entities. If domain does not exist - 404 Not Found. ## Example diff --git a/windows/security/threat-protection/microsoft-defender-atp/get-domain-related-machines.md b/windows/security/threat-protection/microsoft-defender-atp/get-domain-related-machines.md index b6ee9ba801..9168ffdd7e 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/get-domain-related-machines.md +++ b/windows/security/threat-protection/microsoft-defender-atp/get-domain-related-machines.md @@ -56,7 +56,7 @@ Authorization | String | Bearer {token}. **Required**. Empty ## Response -If successful and domain exists - 200 OK with list of [machine](machine-windows-defender-advanced-threat-protection-new.md) entities. If domain do not exist - 404 Not Found. +If successful and domain exists - 200 OK with list of [machine](machine.md) entities. If domain do not exist - 404 Not Found. ## Example diff --git a/windows/security/threat-protection/microsoft-defender-atp/get-file-information.md b/windows/security/threat-protection/microsoft-defender-atp/get-file-information.md index 0315a79f79..474e98f273 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/get-file-information.md +++ b/windows/security/threat-protection/microsoft-defender-atp/get-file-information.md @@ -56,7 +56,7 @@ Authorization | String | Bearer {token}. **Required**. Empty ## Response -If successful and file exists - 200 OK with the [file](files-windows-defender-advanced-threat-protection-new.md) entity in the body. If file does not exist - 404 Not Found. +If successful and file exists - 200 OK with the [file](files.md) entity in the body. If file does not exist - 404 Not Found. ## Example diff --git a/windows/security/threat-protection/microsoft-defender-atp/get-file-related-alerts.md b/windows/security/threat-protection/microsoft-defender-atp/get-file-related-alerts.md index f3709ad133..d28d08c520 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/get-file-related-alerts.md +++ b/windows/security/threat-protection/microsoft-defender-atp/get-file-related-alerts.md @@ -59,7 +59,7 @@ Authorization | String | Bearer {token}. **Required**. Empty ## Response -If successful and file exists - 200 OK with list of [alert](alerts-windows-defender-advanced-threat-protection-new.md) entities in the body. If file do not exist - 404 Not Found. +If successful and file exists - 200 OK with list of [alert](alerts.md) entities in the body. If file do not exist - 404 Not Found. ## Example diff --git a/windows/security/threat-protection/microsoft-defender-atp/get-file-related-machines.md b/windows/security/threat-protection/microsoft-defender-atp/get-file-related-machines.md index 599b60b82e..88d1a2e8ea 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/get-file-related-machines.md +++ b/windows/security/threat-protection/microsoft-defender-atp/get-file-related-machines.md @@ -58,7 +58,7 @@ Authorization | String | Bearer {token}. **Required**. Empty ## Response -If successful and file exists - 200 OK with list of [machine](machine-windows-defender-advanced-threat-protection-new.md) entities in the body. If file do not exist - 404 Not Found. +If successful and file exists - 200 OK with list of [machine](machine.md) entities in the body. If file do not exist - 404 Not Found. ## Example diff --git a/windows/security/threat-protection/microsoft-defender-atp/get-ip-related-alerts.md b/windows/security/threat-protection/microsoft-defender-atp/get-ip-related-alerts.md index 28b400897f..711a6def63 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/get-ip-related-alerts.md +++ b/windows/security/threat-protection/microsoft-defender-atp/get-ip-related-alerts.md @@ -57,7 +57,7 @@ Authorization | String | Bearer {token}. **Required**. Empty ## Response -If successful and IP exists - 200 OK with list of [alert](alerts-windows-defender-advanced-threat-protection-new.md) entities in the body. If IP do not exist - 404 Not Found. +If successful and IP exists - 200 OK with list of [alert](alerts.md) entities in the body. If IP do not exist - 404 Not Found. ## Example diff --git a/windows/security/threat-protection/microsoft-defender-atp/get-ip-related-machines.md b/windows/security/threat-protection/microsoft-defender-atp/get-ip-related-machines.md index a8875b7324..9cf6c3784a 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/get-ip-related-machines.md +++ b/windows/security/threat-protection/microsoft-defender-atp/get-ip-related-machines.md @@ -57,7 +57,7 @@ Authorization | String | Bearer {token}. **Required**. Empty ## Response -If successful and IP exists - 200 OK with list of [machine](machine-windows-defender-advanced-threat-protection-new.md) entities in the body. If IP do not exist - 404 Not Found. +If successful and IP exists - 200 OK with list of [machine](machine.md) entities in the body. If IP do not exist - 404 Not Found. ## Example diff --git a/windows/security/threat-protection/microsoft-defender-atp/get-machine-by-id.md b/windows/security/threat-protection/microsoft-defender-atp/get-machine-by-id.md index 017460ba7e..93cc44b4f7 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/get-machine-by-id.md +++ b/windows/security/threat-protection/microsoft-defender-atp/get-machine-by-id.md @@ -59,7 +59,7 @@ Authorization | String | Bearer {token}. **Required**. Empty ## Response -If successful and machine exists - 200 OK with the [machine](machine-windows-defender-advanced-threat-protection-new.md) entity in the body. +If successful and machine exists - 200 OK with the [machine](machine.md) entity in the body. If machine with the specified id was not found - 404 Not Found. diff --git a/windows/security/threat-protection/microsoft-defender-atp/get-machine-log-on-users.md b/windows/security/threat-protection/microsoft-defender-atp/get-machine-log-on-users.md index a4233e222f..4c87962798 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/get-machine-log-on-users.md +++ b/windows/security/threat-protection/microsoft-defender-atp/get-machine-log-on-users.md @@ -55,7 +55,7 @@ Authorization | String | Bearer {token}. **Required**. Empty ## Response -If successful and machine exist - 200 OK with list of [user](user-windows-defender-advanced-threat-protection-new.md) entities in the body. If machine was not found - 404 Not Found. +If successful and machine exist - 200 OK with list of [user](user.md) entities in the body. If machine was not found - 404 Not Found. ## Example diff --git a/windows/security/threat-protection/microsoft-defender-atp/get-machine-related-alerts.md b/windows/security/threat-protection/microsoft-defender-atp/get-machine-related-alerts.md index 0250ee9a19..97d706a373 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/get-machine-related-alerts.md +++ b/windows/security/threat-protection/microsoft-defender-atp/get-machine-related-alerts.md @@ -57,7 +57,7 @@ Authorization | String | Bearer {token}. **Required**. Empty ## Response -If successful and machine exists - 200 OK with list of [alert](alerts-windows-defender-advanced-threat-protection-new.md) entities in the body. If machine was not found - 404 Not Found. +If successful and machine exists - 200 OK with list of [alert](alerts.md) entities in the body. If machine was not found - 404 Not Found. ## Example diff --git a/windows/security/threat-protection/microsoft-defender-atp/get-machineaction-object.md b/windows/security/threat-protection/microsoft-defender-atp/get-machineaction-object.md index 3cb8e46926..3740226c86 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/get-machineaction-object.md +++ b/windows/security/threat-protection/microsoft-defender-atp/get-machineaction-object.md @@ -57,7 +57,7 @@ Authorization | String | Bearer {token}. **Required**. Empty ## Response -If successful, this method returns 200, Ok response code with a [Machine Action](machineaction-windows-defender-advanced-threat-protection-new.md) entity. If machine action entity with the specified id was not found - 404 Not Found. +If successful, this method returns 200, Ok response code with a [Machine Action](machineaction.md) entity. If machine action entity with the specified id was not found - 404 Not Found. ## Example diff --git a/windows/security/threat-protection/microsoft-defender-atp/get-machineactions-collection.md b/windows/security/threat-protection/microsoft-defender-atp/get-machineactions-collection.md index 9bfc5cab5b..6dc52d9c42 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/get-machineactions-collection.md +++ b/windows/security/threat-protection/microsoft-defender-atp/get-machineactions-collection.md @@ -60,7 +60,7 @@ Authorization | String | Bearer {token}. **Required**. Empty ## Response -If successful, this method returns 200, Ok response code with a collection of [machineAction](machineaction-windows-defender-advanced-threat-protection-new.md) entities. +If successful, this method returns 200, Ok response code with a collection of [machineAction](machineaction.md) entities. ## Example 1 diff --git a/windows/security/threat-protection/microsoft-defender-atp/get-machines.md b/windows/security/threat-protection/microsoft-defender-atp/get-machines.md index 6d6a921754..db7af73a74 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/get-machines.md +++ b/windows/security/threat-protection/microsoft-defender-atp/get-machines.md @@ -58,7 +58,7 @@ Authorization | String | Bearer {token}. **Required**. Empty ## Response -If successful and machines exists - 200 OK with list of [machine](machine-windows-defender-advanced-threat-protection-new.md) entities in the body. If no recent machines - 404 Not Found. +If successful and machines exists - 200 OK with list of [machine](machine.md) entities in the body. If no recent machines - 404 Not Found. ## Example diff --git a/windows/security/threat-protection/microsoft-defender-atp/get-package-sas-uri.md b/windows/security/threat-protection/microsoft-defender-atp/get-package-sas-uri.md index b4e18b9069..8b8827362c 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/get-package-sas-uri.md +++ b/windows/security/threat-protection/microsoft-defender-atp/get-package-sas-uri.md @@ -23,7 +23,7 @@ ms.date: 12/08/2017 [!include[Prerelease information](prerelease.md)] -Get a URI that allows downloading of an [investigation package](collect-investigation-package-windows-defender-advanced-threat-protection-new.md). +Get a URI that allows downloading of an [investigation package](collect-investigation-package.md). ## Permissions One of the following permissions is required to call this API. To learn more, including how to choose permissions, see [Use Microsoft Defender ATP APIs](apis-intro.md) diff --git a/windows/security/threat-protection/microsoft-defender-atp/get-ti-indicators-collection.md b/windows/security/threat-protection/microsoft-defender-atp/get-ti-indicators-collection.md index 6fe62b0834..69018dc935 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/get-ti-indicators-collection.md +++ b/windows/security/threat-protection/microsoft-defender-atp/get-ti-indicators-collection.md @@ -58,7 +58,7 @@ Authorization | String | Bearer {token}. **Required**. Empty ## Response -If successful, this method returns 200, Ok response code with a collection of [Indicator](ti-indicator-windows-defender-advanced-threat-protection-new.md) entities. +If successful, this method returns 200, Ok response code with a collection of [Indicator](ti-indicator.md) entities. >[!Note] > If the Application has 'Ti.ReadWrite.All' permission, it will be exposed to all Indicators. Otherwise, it will be exposed only to the Indicators it created. diff --git a/windows/security/threat-protection/microsoft-defender-atp/get-user-information.md b/windows/security/threat-protection/microsoft-defender-atp/get-user-information.md index ee1b42726f..276869768f 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/get-user-information.md +++ b/windows/security/threat-protection/microsoft-defender-atp/get-user-information.md @@ -47,7 +47,7 @@ Authorization | String | Bearer {token}. **Required**. Empty ## Response -If successful and user exists - 200 OK with [user](user-windows-defender-advanced-threat-protection-new.md) entity in the body. If user does not exist - 404 Not Found. +If successful and user exists - 200 OK with [user](user.md) entity in the body. If user does not exist - 404 Not Found. ## Example diff --git a/windows/security/threat-protection/microsoft-defender-atp/get-user-related-machines.md b/windows/security/threat-protection/microsoft-defender-atp/get-user-related-machines.md index 9562240757..f4304056b4 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/get-user-related-machines.md +++ b/windows/security/threat-protection/microsoft-defender-atp/get-user-related-machines.md @@ -60,7 +60,7 @@ Authorization | String | Bearer {token}. **Required**. Empty ## Response -If successful and user exists - 200 OK with list of [machine](machine-windows-defender-advanced-threat-protection-new.md) entities in the body. If user does not exist - 404 Not Found. +If successful and user exists - 200 OK with list of [machine](machine.md) entities in the body. If user does not exist - 404 Not Found. ## Example diff --git a/windows/security/threat-protection/microsoft-defender-atp/isolate-machine.md b/windows/security/threat-protection/microsoft-defender-atp/isolate-machine.md index a83da49e7f..d8aec274af 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/isolate-machine.md +++ b/windows/security/threat-protection/microsoft-defender-atp/isolate-machine.md @@ -67,7 +67,7 @@ IsolationType | String | Type of the isolation. Allowed values are: 'Full' or 'S ## Response -If successful, this method returns 201 - Created response code and [Machine Action](machineaction-windows-defender-advanced-threat-protection-new.md) in the response body. +If successful, this method returns 201 - Created response code and [Machine Action](machineaction.md) in the response body. ## Example @@ -109,4 +109,4 @@ Content-type: application/json ``` -To unisolate a machine, see [Release machine from isolation](unisolate-machine-windows-defender-advanced-threat-protection-new.md). +To unisolate a machine, see [Release machine from isolation](unisolate-machine.md). diff --git a/windows/security/threat-protection/microsoft-defender-atp/machine-tags.md b/windows/security/threat-protection/microsoft-defender-atp/machine-tags.md index 624d4c2542..899c910e78 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/machine-tags.md +++ b/windows/security/threat-protection/microsoft-defender-atp/machine-tags.md @@ -83,7 +83,7 @@ You can manage tags from the Actions button or by selecting a machine from the M ![Image of adding tags on a machine](images/atp-tag-management.png) ## Add machine tags using APIs -For more information, see [Add or remove machine tags API](add-or-remove-machine-tags-windows-defender-advanced-threat-protection-new.md). +For more information, see [Add or remove machine tags API](add-or-remove-machine-tags.md). diff --git a/windows/security/threat-protection/microsoft-defender-atp/machine.md b/windows/security/threat-protection/microsoft-defender-atp/machine.md index c118700037..c7a7c7bf2b 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/machine.md +++ b/windows/security/threat-protection/microsoft-defender-atp/machine.md @@ -24,29 +24,29 @@ ms.topic: article # Methods Method|Return Type |Description :---|:---|:--- -[List machines](get-machines-windows-defender-advanced-threat-protection-new.md) | [machine](machine-windows-defender-advanced-threat-protection-new.md) collection | List set of [machine](machine-windows-defender-advanced-threat-protection-new.md) entities in the org. -[Get machine](get-machine-by-id-windows-defender-advanced-threat-protection-new.md) | [machine](machine-windows-defender-advanced-threat-protection-new.md) | Get a [machine](machine-windows-defender-advanced-threat-protection-new.md) by its identity. -[Get logged on users](get-machine-log-on-users-windows-defender-advanced-threat-protection-new.md) | [user](user-windows-defender-advanced-threat-protection-new.md) collection | Get the set of [User](user-windows-defender-advanced-threat-protection-new.md) that logged on to the [machine](machine-windows-defender-advanced-threat-protection-new.md). -[Get related alerts](get-machine-related-alerts-windows-defender-advanced-threat-protection-new.md) | [alert](alerts-windows-defender-advanced-threat-protection-new.md) collection | Get the set of [alert](alerts-windows-defender-advanced-threat-protection-new.md) entities that were raised on the [machine](machine-windows-defender-advanced-threat-protection-new.md). -[Add or Remove machine tags](add-or-remove-machine-tags-windows-defender-advanced-threat-protection-new.md) | [machine](machine-windows-defender-advanced-threat-protection-new.md) | Add or Remove tag to a specific machine. -[Find machines by IP](find-machines-by-ip-windows-defender-advanced-threat-protection-new.md) | [machine](machine-windows-defender-advanced-threat-protection-new.md) collection | Find machines seen with IP. +[List machines](get-machines.md) | [machine](machine.md) collection | List set of [machine](machine.md) entities in the org. +[Get machine](get-machine-by-id.md) | [machine](machine.md) | Get a [machine](machine.md) by its identity. +[Get logged on users](get-machine-log-on-users.md) | [user](user.md) collection | Get the set of [User](user.md) that logged on to the [machine](machine.md). +[Get related alerts](get-machine-related-alerts.md) | [alert](alerts.md) collection | Get the set of [alert](alerts.md) entities that were raised on the [machine](machine.md). +[Add or Remove machine tags](add-or-remove-machine-tags.md) | [machine](machine.md) | Add or Remove tag to a specific machine. +[Find machines by IP](find-machines-by-ip.md) | [machine](machine.md) collection | Find machines seen with IP. # Properties Property | Type | Description :---|:---|:--- -id | String | [machine](machine-windows-defender-advanced-threat-protection-new.md) identity. -computerDnsName | String | [machine](machine-windows-defender-advanced-threat-protection-new.md) fully qualified name. -firstSeen | DateTimeOffset | First date and time where the [machine](machine-windows-defender-advanced-threat-protection-new.md) was observed by Microsoft Defender ATP. -lastSeen | DateTimeOffset | Last date and time where the [machine](machine-windows-defender-advanced-threat-protection-new.md) was observed by Microsoft Defender ATP. +id | String | [machine](machine.md) identity. +computerDnsName | String | [machine](machine.md) fully qualified name. +firstSeen | DateTimeOffset | First date and time where the [machine](machine.md) was observed by Microsoft Defender ATP. +lastSeen | DateTimeOffset | Last date and time where the [machine](machine.md) was observed by Microsoft Defender ATP. osPlatform | String | OS platform. osVersion | String | OS Version. -lastIpAddress | String | Last IP on local NIC on the [machine](machine-windows-defender-advanced-threat-protection-new.md). -lastExternalIpAddress | String | Last IP through which the [machine](machine-windows-defender-advanced-threat-protection-new.md) accessed the internet. +lastIpAddress | String | Last IP on local NIC on the [machine](machine.md). +lastExternalIpAddress | String | Last IP through which the [machine](machine.md) accessed the internet. agentVersion | String | Version of Microsoft Defender ATP agent. osBuild | Nullable long | OS build number. -healthStatus | Enum | [machine](machine-windows-defender-advanced-threat-protection-new.md) health status. Possible values are: "Active", "Inactive", "ImpairedCommunication", "NoSensorData" and "NoSensorDataImpairedCommunication" +healthStatus | Enum | [machine](machine.md) health status. Possible values are: "Active", "Inactive", "ImpairedCommunication", "NoSensorData" and "NoSensorDataImpairedCommunication" rbacGroupId | Int | RBAC Group ID. rbacGroupName | String | RBAC Group Name. riskScore | Nullable Enum | Risk score as evaluated by Microsoft Defender ATP. Possible values are: 'None', 'Low', 'Medium' and 'High'. -aadDeviceId | Nullable Guid | AAD Device ID (when [machine](machine-windows-defender-advanced-threat-protection-new.md) is Aad Joined). -machineTags | String collection | Set of [machine](machine-windows-defender-advanced-threat-protection-new.md) tags. \ No newline at end of file +aadDeviceId | Nullable Guid | AAD Device ID (when [machine](machine.md) is Aad Joined). +machineTags | String collection | Set of [machine](machine.md) tags. diff --git a/windows/security/threat-protection/microsoft-defender-atp/machineaction.md b/windows/security/threat-protection/microsoft-defender-atp/machineaction.md index 66271b6633..6bf2a9b4b6 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/machineaction.md +++ b/windows/security/threat-protection/microsoft-defender-atp/machineaction.md @@ -26,21 +26,21 @@ ms.date: 12/08/2017 Method|Return Type |Description :---|:---|:--- -[List MachineActions](get-machineactions-collection-windows-defender-advanced-threat-protection-new.md) | [Machine Action](machineaction-windows-defender-advanced-threat-protection-new.md) | List [Machine Action](machineaction-windows-defender-advanced-threat-protection-new.md) entities. -[Get MachineAction](get-machineaction-object-windows-defender-advanced-threat-protection-new.md) | [Machine Action](machineaction-windows-defender-advanced-threat-protection-new.md) | Get a single [Machine Action](machineaction-windows-defender-advanced-threat-protection-new.md) entity. -[Collect investigation package](collect-investigation-package-windows-defender-advanced-threat-protection-new.md) | [Machine Action](machineaction-windows-defender-advanced-threat-protection-new.md) | Collect investigation package from a [machine](machine-windows-defender-advanced-threat-protection-new.md). -[Get investigation package SAS URI](get-package-sas-uri-windows-defender-advanced-threat-protection-new.md) | [Machine Action](machineaction-windows-defender-advanced-threat-protection-new.md) | Get URI for downloading the investigation package. -[Isolate machine](isolate-machine-windows-defender-advanced-threat-protection-new.md) | [Machine Action](machineaction-windows-defender-advanced-threat-protection-new.md) | Isolate [machine](machine-windows-defender-advanced-threat-protection-new.md) from network. -[Release machine from isolation](unisolate-machine-windows-defender-advanced-threat-protection-new.md) | [Machine Action](machineaction-windows-defender-advanced-threat-protection-new.md) | Release [machine](machine-windows-defender-advanced-threat-protection-new.md) from Isolation. -[Restrict app execution](restrict-code-execution-windows-defender-advanced-threat-protection-new.md) | [Machine Action](machineaction-windows-defender-advanced-threat-protection-new.md) | Restrict application execution. -[Remove app restriction](unrestrict-code-execution-windows-defender-advanced-threat-protection-new.md) | [Machine Action](machineaction-windows-defender-advanced-threat-protection-new.md) | Remove application execution restriction. -[Run antivirus scan](run-av-scan-windows-defender-advanced-threat-protection-new.md) | [Machine Action](machineaction-windows-defender-advanced-threat-protection-new.md) | Run an AV scan using Windows Defender (when applicable). -[Offboard machine](offboard-machine-api-windows-defender-advanced-threat-protection-new.md)|[Machine Action](machineaction-windows-defender-advanced-threat-protection-new.md) | Offboard [machine](machine-windows-defender-advanced-threat-protection-new.md) from Microsoft Defender ATP. +[List MachineActions](get-machineactions-collection.md) | [Machine Action](machineaction.md) | List [Machine Action](machineaction.md) entities. +[Get MachineAction](get-machineaction-object.md) | [Machine Action](machineaction.md) | Get a single [Machine Action](machineaction.md) entity. +[Collect investigation package](collect-investigation-package.md) | [Machine Action](machineaction.md) | Collect investigation package from a [machine](machine.md). +[Get investigation package SAS URI](get-package-sas-uri.md) | [Machine Action](machineaction.md) | Get URI for downloading the investigation package. +[Isolate machine](isolate-machine.md) | [Machine Action](machineaction.md) | Isolate [machine](machine.md) from network. +[Release machine from isolation](unisolate-machine.md) | [Machine Action](machineaction.md) | Release [machine](machine.md) from Isolation. +[Restrict app execution](restrict-code-execution.md) | [Machine Action](machineaction.md) | Restrict application execution. +[Remove app restriction](unrestrict-code-execution.md) | [Machine Action](machineaction.md) | Remove application execution restriction. +[Run antivirus scan](run-av-scan.md) | [Machine Action](machineaction.md) | Run an AV scan using Windows Defender (when applicable). +[Offboard machine](offboard-machine-api.md)|[Machine Action](machineaction.md) | Offboard [machine](machine.md) from Microsoft Defender ATP. # Properties Property | Type | Description :---|:---|:--- -id | Guid | Identity of the [Machine Action](machineaction-windows-defender-advanced-threat-protection-new.md) entity. +id | Guid | Identity of the [Machine Action](machineaction.md) entity. type | Enum | Type of the action. Possible values are: "RunAntiVirusScan", "Offboard", "CollectInvestigationPackage", "Isolate", "Unisolate", "StopAndQuarantineFile", "RestrictCodeExecution" and "UnrestrictCodeExecution" requestor | String | Identity of the person that executed the action. requestorComment | String | Comment that was written when issuing the action. diff --git a/windows/security/threat-protection/microsoft-defender-atp/offboard-machine-api.md b/windows/security/threat-protection/microsoft-defender-atp/offboard-machine-api.md index 738b4d31ee..89ba1d35f3 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/offboard-machine-api.md +++ b/windows/security/threat-protection/microsoft-defender-atp/offboard-machine-api.md @@ -59,7 +59,7 @@ Parameter | Type | Description Comment | String | Comment to associate with the action. **Required**. ## Response -If successful, this method returns 201 - Created response code and [Machine Action](machineaction-windows-defender-advanced-threat-protection-new.md) in the response body. +If successful, this method returns 201 - Created response code and [Machine Action](machineaction.md) in the response body. ## Example diff --git a/windows/security/threat-protection/microsoft-defender-atp/post-ti-indicator.md b/windows/security/threat-protection/microsoft-defender-atp/post-ti-indicator.md index cbeeeeb7ef..a9b58bd743 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/post-ti-indicator.md +++ b/windows/security/threat-protection/microsoft-defender-atp/post-ti-indicator.md @@ -28,7 +28,7 @@ ms.date: 12/08/2017 > Currently this API is supported only for AppOnly context requests. (See [Get access with application context](exposed-apis-create-app-webapp.md) for more information) -- Submits or Updates new [Indicator](ti-indicator-windows-defender-advanced-threat-protection-new.md) entity. +- Submits or Updates new [Indicator](ti-indicator.md) entity. ## Permissions @@ -60,7 +60,7 @@ In the request body, supply a JSON object with the following parameters: Parameter | Type | Description :---|:---|:--- -indicatorValue | String | Identity of the [Indicator](ti-indicator-windows-defender-advanced-threat-protection-new.md) entity. **Required** +indicatorValue | String | Identity of the [Indicator](ti-indicator.md) entity. **Required** indicatorType | Enum | Type of the indicator. Possible values are: "FileSha1", "FileSha256", "IpAddress", "DomainName" and "Url". **Required** action | Enum | The action that will be taken if the indicator will be discovered in the organization. Possible values are: "Alert", "AlertAndBlock", and "Allowed". **Required** title | String | Indicator alert title. **Optional** @@ -71,7 +71,7 @@ recommendedActions | String | TI indicator alert recommended actions. **Optional ## Response -- If successful, this method returns 200 - OK response code and the created / updated [Indicator](ti-indicator-windows-defender-advanced-threat-protection-new.md) entity in the response body. +- If successful, this method returns 200 - OK response code and the created / updated [Indicator](ti-indicator.md) entity in the response body. - If not successful: this method return 400 - Bad Request / 409 - Conflict with the failure reason. Bad request usually indicates incorrect body and Conflict can happen if you try to submit an Indicator that conflicts with an existing Indicator type or Action. ## Example diff --git a/windows/security/threat-protection/microsoft-defender-atp/restrict-code-execution.md b/windows/security/threat-protection/microsoft-defender-atp/restrict-code-execution.md index 6443996f08..be5f7fdb33 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/restrict-code-execution.md +++ b/windows/security/threat-protection/microsoft-defender-atp/restrict-code-execution.md @@ -60,7 +60,7 @@ Parameter | Type | Description Comment | String | Comment to associate with the action. **Required**. ## Response -If successful, this method returns 201 - Created response code and [Machine Action](machineaction-windows-defender-advanced-threat-protection-new.md) in the response body. +If successful, this method returns 201 - Created response code and [Machine Action](machineaction.md) in the response body. ## Example @@ -101,5 +101,5 @@ Content-type: application/json ``` -To remove code execution restriction from a machine, see [Remove app restriction](unrestrict-code-execution-windows-defender-advanced-threat-protection-new.md). +To remove code execution restriction from a machine, see [Remove app restriction](unrestrict-code-execution.md). diff --git a/windows/security/threat-protection/microsoft-defender-atp/stop-and-quarantine-file.md b/windows/security/threat-protection/microsoft-defender-atp/stop-and-quarantine-file.md index 9fde8c8592..c6f058274c 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/stop-and-quarantine-file.md +++ b/windows/security/threat-protection/microsoft-defender-atp/stop-and-quarantine-file.md @@ -62,7 +62,7 @@ Comment | String | Comment to associate with the action. **Required**. Sha1 | String | Sha1 of the file to stop and quarantine on the machine. **Required**. ## Response -If successful, this method returns 201 - Created response code and [Machine Action](machineaction-windows-defender-advanced-threat-protection-new.md) in the response body. +If successful, this method returns 201 - Created response code and [Machine Action](machineaction.md) in the response body. ## Example diff --git a/windows/security/threat-protection/microsoft-defender-atp/ti-indicator.md b/windows/security/threat-protection/microsoft-defender-atp/ti-indicator.md index 944fdf6c3c..7c15c26dd6 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/ti-indicator.md +++ b/windows/security/threat-protection/microsoft-defender-atp/ti-indicator.md @@ -24,16 +24,16 @@ ms.topic: article Method|Return Type |Description :---|:---|:--- -[List Indicators](get-ti-indicators-collection-windows-defender-advanced-threat-protection-new.md) | [Indicator](ti-indicator-windows-defender-advanced-threat-protection-new.md) Collection | List [Indicator](ti-indicator-windows-defender-advanced-threat-protection-new.md) entities. -[Submit Indicator](post-ti-indicator-windows-defender-advanced-threat-protection-new.md) | [Indicator](ti-indicator-windows-defender-advanced-threat-protection-new.md) | Submits [Indicator](ti-indicator-windows-defender-advanced-threat-protection-new.md) entity. -[Delete Indicator](delete-ti-indicator-by-id-windows-defender-advanced-threat-protection-new.md) | No Content | Deletes [Indicator](ti-indicator-windows-defender-advanced-threat-protection-new.md) entity. +[List Indicators](get-ti-indicators-collection.md) | [Indicator](ti-indicator.md) Collection | List [Indicator](ti-indicator.md) entities. +[Submit Indicator](post-ti-indicator.md) | [Indicator](ti-indicator.md) | Submits [Indicator](ti-indicator.md) entity. +[Delete Indicator](delete-ti-indicator-by-id.md) | No Content | Deletes [Indicator](ti-indicator.md) entity. - See the corresponding [page](https://securitycenter.windows.com/preferences2/custom_ti_indicators/files) in the portal: # Properties Property | Type | Description :---|:---|:--- -indicatorValue | String | Identity of the [Indicator](ti-indicator-windows-defender-advanced-threat-protection-new.md) entity. +indicatorValue | String | Identity of the [Indicator](ti-indicator.md) entity. indicatorType | Enum | Type of the indicator. Possible values are: "FileSha1", "FileSha256", "IpAddress", "DomainName" and "Url" title | String | Indicator alert title. creationTimeDateTimeUtc | DateTimeOffset | The date and time when the indicator was created. diff --git a/windows/security/threat-protection/microsoft-defender-atp/unisolate-machine.md b/windows/security/threat-protection/microsoft-defender-atp/unisolate-machine.md index c1bfd3a410..51d270d828 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/unisolate-machine.md +++ b/windows/security/threat-protection/microsoft-defender-atp/unisolate-machine.md @@ -61,7 +61,7 @@ Parameter | Type | Description Comment | String | Comment to associate with the action. **Required**. ## Response -If successful, this method returns 201 - Created response code and [Machine Action](machineaction-windows-defender-advanced-threat-protection-new.md) in the response body. +If successful, this method returns 201 - Created response code and [Machine Action](machineaction.md) in the response body. ## Example @@ -105,5 +105,5 @@ Content-type: application/json ``` -To isolate a machine, see [Isolate machine](isolate-machine-windows-defender-advanced-threat-protection-new.md). +To isolate a machine, see [Isolate machine](isolate-machine.md). diff --git a/windows/security/threat-protection/microsoft-defender-atp/unrestrict-code-execution.md b/windows/security/threat-protection/microsoft-defender-atp/unrestrict-code-execution.md index 9680a57aec..3df0690019 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/unrestrict-code-execution.md +++ b/windows/security/threat-protection/microsoft-defender-atp/unrestrict-code-execution.md @@ -59,7 +59,7 @@ Parameter | Type | Description Comment | String | Comment to associate with the action. **Required**. ## Response -If successful, this method returns 201 - Created response code and [Machine Action](machineaction-windows-defender-advanced-threat-protection-new.md) in the response body. +If successful, this method returns 201 - Created response code and [Machine Action](machineaction.md) in the response body. ## Example @@ -101,4 +101,4 @@ Content-type: application/json ``` -To restrict code execution on a machine, see [Restrict app execution](restrict-code-execution-windows-defender-advanced-threat-protection-new.md). \ No newline at end of file +To restrict code execution on a machine, see [Restrict app execution](restrict-code-execution.md). diff --git a/windows/security/threat-protection/microsoft-defender-atp/update-alert.md b/windows/security/threat-protection/microsoft-defender-atp/update-alert.md index 9752745d78..1a81370b13 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/update-alert.md +++ b/windows/security/threat-protection/microsoft-defender-atp/update-alert.md @@ -64,7 +64,7 @@ determination | String | Specifies the determination of the alert. The property ## Response -If successful, this method returns 200 OK, and the [alert](alerts-windows-defender-advanced-threat-protection-new.md) entity in the response body with the updated properties. If alert with the specified id was not found - 404 Not Found. +If successful, this method returns 200 OK, and the [alert](alerts.md) entity in the response body with the updated properties. If alert with the specified id was not found - 404 Not Found. ## Example diff --git a/windows/security/threat-protection/microsoft-defender-atp/use-apis.md b/windows/security/threat-protection/microsoft-defender-atp/use-apis.md index a152053d8d..5f3f6b0f0a 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/use-apis.md +++ b/windows/security/threat-protection/microsoft-defender-atp/use-apis.md @@ -27,5 +27,5 @@ ms.date: 11/28/2018 Topic | Description :---|:--- [Microsoft Defender ATP API overview](apis-intro.md) | Learn how to access to Microsoft Defender ATP Public API and on which context. -[Supported Microsoft Defender ATP APIs](exposed-apis-list.md) | Learn more about the individual supported entities where you can run API calls to and details such as HTTP request values, request headers and expected responses. Examples include APIs for [alert resource type](alerts-windows-defender-advanced-threat-protection-new.md), [domain related alerts](get-domain-related-alerts-windows-defender-advanced-threat-protection-new.md), or even actions such as [isolate machine](isolate-machine-windows-defender-advanced-threat-protection-new.md). +[Supported Microsoft Defender ATP APIs](exposed-apis-list.md) | Learn more about the individual supported entities where you can run API calls to and details such as HTTP request values, request headers and expected responses. Examples include APIs for [alert resource type](alerts.md), [domain related alerts](get-domain-related-alerts.md), or even actions such as [isolate machine](isolate-machine.md). How to use APIs - Samples | Learn how to use Advanced hunting APIs and multiple APIs such as PowerShell. Other examples include [schedule advanced hunting using Microsoft Flow](run-advanced-query-sample-ms-flow.md) or [OData queries](exposed-apis-odata-samples.md). diff --git a/windows/security/threat-protection/microsoft-defender-atp/user.md b/windows/security/threat-protection/microsoft-defender-atp/user.md index 12ad0a75b8..3f001924f1 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/user.md +++ b/windows/security/threat-protection/microsoft-defender-atp/user.md @@ -21,7 +21,7 @@ ms.date: 12/08/2017 Method|Return Type |Description :---|:---|:--- -[List User related alerts](get-user-related-alerts-windows-defender-advanced-threat-protection-new.md) | [alert](alerts-windows-defender-advanced-threat-protection-new.md) collection | List all the alerts that are associated with a [user](user-windows-defender-advanced-threat-protection-new.md). -[List User related machines](get-user-related-machines-windows-defender-advanced-threat-protection-new.md) | [machine](machine-windows-defender-advanced-threat-protection-new.md) collection | List all the machines that were logged on by a [user](user-windows-defender-advanced-threat-protection-new.md). +[List User related alerts](get-user-related-alerts.md) | [alert](alerts.md) collection | List all the alerts that are associated with a [user](user.md). +[List User related machines](get-user-related-machines.md) | [machine](machine.md) collection | List all the machines that were logged on by a [user](user.md). From 83e0716c221c998fdbd189e1e5ecd01129717cf7 Mon Sep 17 00:00:00 2001 From: Joey Caparas Date: Wed, 10 Apr 2019 15:54:47 -0700 Subject: [PATCH 153/724] fix broken link --- .../threat-protection/microsoft-defender-atp/alerts-queue.md | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/windows/security/threat-protection/microsoft-defender-atp/alerts-queue.md b/windows/security/threat-protection/microsoft-defender-atp/alerts-queue.md index fbe92937d8..f2aaa2d6aa 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/alerts-queue.md +++ b/windows/security/threat-protection/microsoft-defender-atp/alerts-queue.md @@ -90,7 +90,7 @@ Limit the alerts queue view by selecting the OS platform that you're interested If you have specific machine groups that you're interested in checking the alerts on, you can select the groups to limit the alerts queue view to display just those machine groups. ### Associated threat -Use this filter to focus on alerts that are related to high profile threats. You can see the full list of high-profile threats in [Threat analytics](threat-analytics-dashboard.md). +Use this filter to focus on alerts that are related to high profile threats. You can see the full list of high-profile threats in [Threat analytics](threat-analytics.md). ## Related topics From 7330fb3e0f9f74669f473e5302b9fe228b65587a Mon Sep 17 00:00:00 2001 From: Joey Caparas Date: Wed, 10 Apr 2019 15:57:08 -0700 Subject: [PATCH 154/724] fix file name typo unhealhty to unhealthy --- .../threat-protection/microsoft-defender-atp/TOC.md | 6 +++--- .../microsoft-defender-atp/check-sensor-status.md | 2 +- ...x-unhealhty-sensors.md => fix-unhealthy-sensors.md} | 0 .../microsoft-defender-atp/machines-view-overview.md | 2 +- .../microsoft-defender-atp/secure-score-dashboard.md | 10 +++++----- 5 files changed, 10 insertions(+), 10 deletions(-) rename windows/security/threat-protection/microsoft-defender-atp/{fix-unhealhty-sensors.md => fix-unhealthy-sensors.md} (100%) diff --git a/windows/security/threat-protection/microsoft-defender-atp/TOC.md b/windows/security/threat-protection/microsoft-defender-atp/TOC.md index 297f7f6173..0a5682ebc9 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/TOC.md +++ b/windows/security/threat-protection/microsoft-defender-atp/TOC.md @@ -392,9 +392,9 @@ ## [Troubleshoot Microsoft Defender ATP](troubleshoot-overview.md) ###Troubleshoot sensor state #### [Check sensor state](check-sensor-status.md) -#### [Fix unhealthy sensors](fix-unhealhty-sensors.md) -#### [Inactive machines](fix-unhealhty-sensors.md#inactive-machines) -#### [Misconfigured machines](fix-unhealhty-sensors.md#misconfigured-machines) +#### [Fix unhealthy sensors](fix-unhealthy-sensors.md) +#### [Inactive machines](fix-unhealthy-sensors.md#inactive-machines) +#### [Misconfigured machines](fix-unhealthy-sensors.md#misconfigured-machines) #### [Review sensor events and errors on machines with Event Viewer](event-error-codes.md) ### [Troubleshoot Microsoft Defender ATP service issues](troubleshoot.md) diff --git a/windows/security/threat-protection/microsoft-defender-atp/check-sensor-status.md b/windows/security/threat-protection/microsoft-defender-atp/check-sensor-status.md index 4e675729c2..d5c18cff52 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/check-sensor-status.md +++ b/windows/security/threat-protection/microsoft-defender-atp/check-sensor-status.md @@ -57,4 +57,4 @@ In the **Machines list**, you can download a full list of all the machines in yo >Export the list in CSV format to display the unfiltered data. The CSV file will include all machines in the organization, regardless of any filtering applied in the view itself and can take a significant amount of time to download, depending on how large your organization is. ## Related topic -- [Fix unhealthy sensors in Microsoft Defender ATP](fix-unhealhty-sensors.md) +- [Fix unhealthy sensors in Microsoft Defender ATP](fix-unhealthy-sensors.md) diff --git a/windows/security/threat-protection/microsoft-defender-atp/fix-unhealhty-sensors.md b/windows/security/threat-protection/microsoft-defender-atp/fix-unhealthy-sensors.md similarity index 100% rename from windows/security/threat-protection/microsoft-defender-atp/fix-unhealhty-sensors.md rename to windows/security/threat-protection/microsoft-defender-atp/fix-unhealthy-sensors.md diff --git a/windows/security/threat-protection/microsoft-defender-atp/machines-view-overview.md b/windows/security/threat-protection/microsoft-defender-atp/machines-view-overview.md index 657eac1d96..79720ee3a3 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/machines-view-overview.md +++ b/windows/security/threat-protection/microsoft-defender-atp/machines-view-overview.md @@ -74,7 +74,7 @@ Filter the list to view specific machines grouped together by the following mach - No sensor data - Impaired communications - For more information on how to address issues on misconfigured machines see, [Fix unhealthy sensors](fix-unhealhty-sensors.md). + For more information on how to address issues on misconfigured machines see, [Fix unhealthy sensors](fix-unhealthy-sensors.md). - **Inactive** – Machines that have completely stopped sending signals for more than 7 days. diff --git a/windows/security/threat-protection/microsoft-defender-atp/secure-score-dashboard.md b/windows/security/threat-protection/microsoft-defender-atp/secure-score-dashboard.md index 61f17b701f..ebf3512bf7 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/secure-score-dashboard.md +++ b/windows/security/threat-protection/microsoft-defender-atp/secure-score-dashboard.md @@ -40,7 +40,7 @@ You can take the following actions to increase the overall security score of you - Fix sensor data collection - Fix impaired communications -For more information, see [Fix unhealthy sensors](fix-unhealhty-sensors.md). +For more information, see [Fix unhealthy sensors](fix-unhealthy-sensors.md). ### Windows Defender Antivirus (Windows Defender AV) optimization For a machine to be considered "well configured", it must comply to a minimum baseline configuration setting. This tile shows you a specific list of actions you must apply on endpoints so that the minimum baseline configuration setting for Windows Defender AV is fulfilled. @@ -82,7 +82,7 @@ This tile shows you the exact number of machines that require the latest securit You can take the following actions to increase the overall security score of your organization: - Install the latest security updates - Fix sensor data collection - - The Microsoft Defender ATP service relies on sensor data collection to determine the security state of a machine. The service will not be able to determine the security state of machines that are not reporting sensor data properly. Therefore, it's important to ensure that sensor data collection is working properly. For more information, see [Fix unhealthy sensors](fix-unhealhty-sensors.md). + - The Microsoft Defender ATP service relies on sensor data collection to determine the security state of a machine. The service will not be able to determine the security state of machines that are not reporting sensor data properly. Therefore, it's important to ensure that sensor data collection is working properly. For more information, see [Fix unhealthy sensors](fix-unhealthy-sensors.md). For more information, see [Windows Update Troubleshooter](https://support.microsoft.com/help/4027322/windows-windows-update-troubleshooter). @@ -229,7 +229,7 @@ You can take the following actions to increase the overall security score of you - Secure public profile - Verify secure configuration of third-party firewall - Fix sensor data collection - - The Microsoft Defender ATP service relies on sensor data collection to determine the security state of a machine. The service will not be able to determine the security state of machines that are not reporting sensor data properly. Therefore, it's important to ensure that sensor data collection is working properly. For more information, see [Fix unhealthy sensors](fix-unhealhty-sensors.md). + - The Microsoft Defender ATP service relies on sensor data collection to determine the security state of a machine. The service will not be able to determine the security state of machines that are not reporting sensor data properly. Therefore, it's important to ensure that sensor data collection is working properly. For more information, see [Fix unhealthy sensors](fix-unhealthy-sensors.md). For more information, see [Windows Defender Firewall with Advanced Security](https://docs.microsoft.com/windows/security/identity-protection/windows-firewall/windows-firewall-with-advanced-security). @@ -251,7 +251,7 @@ You can take the following actions to increase the overall security score of you - Resume protection on all drives - Ensure drive compatibility - Fix sensor data collection - - The Microsoft Defender ATP service relies on sensor data collection to determine the security state of a machine. The service will not be able to determine the security state of machines that are not reporting sensor data properly. Therefore, it's important to ensure that sensor data collection is working properly. For more information, see [Fix unhealthy sensors](fix-unhealhty-sensors.md). + - The Microsoft Defender ATP service relies on sensor data collection to determine the security state of a machine. The service will not be able to determine the security state of machines that are not reporting sensor data properly. Therefore, it's important to ensure that sensor data collection is working properly. For more information, see [Fix unhealthy sensors](fix-unhealthy-sensors.md). For more information, see [Bitlocker](https://docs.microsoft.com/windows/security/information-protection/bitlocker/bitlocker-overview). @@ -274,7 +274,7 @@ You can take the following actions to increase the overall security score of you - Ensure hardware and software prerequisites are met - Turn on Credential Guard - Fix sensor data collection - - The Microsoft Defender ATP service relies on sensor data collection to determine the security state of a machine. The service will not be able to determine the security state of machines that are not reporting sensor data properly. Therefore, it's important to ensure that sensor data collection is working properly. For more information, see [Fix unhealthy sensors](fix-unhealhty-sensors.md). + - The Microsoft Defender ATP service relies on sensor data collection to determine the security state of a machine. The service will not be able to determine the security state of machines that are not reporting sensor data properly. Therefore, it's important to ensure that sensor data collection is working properly. For more information, see [Fix unhealthy sensors](fix-unhealthy-sensors.md). For more information, see [Manage Windows Defender Credential Guard](https://docs.microsoft.com/windows/security/identity-protection/credential-guard/credential-guard-manage). From fa3be69c2ea5de103ac17c14e2a2269dee9353fb Mon Sep 17 00:00:00 2001 From: Joey Caparas Date: Wed, 10 Apr 2019 16:00:21 -0700 Subject: [PATCH 155/724] fix anchor links --- .../microsoft-defender-atp/configure-proxy-internet.md | 4 ++-- .../microsoft-defender-atp/fix-unhealthy-sensors.md | 4 ++-- .../microsoft-defender-atp/troubleshoot-onboarding.md | 2 +- 3 files changed, 5 insertions(+), 5 deletions(-) diff --git a/windows/security/threat-protection/microsoft-defender-atp/configure-proxy-internet.md b/windows/security/threat-protection/microsoft-defender-atp/configure-proxy-internet.md index 46c3f745a8..07cedb408e 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/configure-proxy-internet.md +++ b/windows/security/threat-protection/microsoft-defender-atp/configure-proxy-internet.md @@ -38,7 +38,7 @@ The WinHTTP configuration setting is independent of the Windows Internet (WinINe - Web Proxy Auto-discovery Protocol (WPAD) > [!NOTE] -> If you're using Transparent proxy or WPAD in your network topology, you don't need special configuration settings. For more information on Microsoft Defender ATP URL exclusions in the proxy, see [Enable access to Microsoft Defender ATP service URLs in the proxy server](#enable-access-to-windows-defender-atp-service-urls-in-the-proxy-server). +> If you're using Transparent proxy or WPAD in your network topology, you don't need special configuration settings. For more information on Microsoft Defender ATP URL exclusions in the proxy, see [Enable access to Microsoft Defender ATP service URLs in the proxy server](#enable-access-to-microsoft-defender-atp-service-urls-in-the-proxy-server). - Manual static proxy configuration: @@ -163,7 +163,7 @@ The tool checks the connectivity of Microsoft Defender ATP service URLs that Mic If at least one of the connectivity options returns a (200) status, then the Microsoft Defender ATP client can communicate with the tested URL properly using this connectivity method.

-However, if the connectivity check results indicate a failure, an HTTP error is displayed (see HTTP Status Codes). You can then use the URLs in the table shown in [Enable access to Microsoft Defender ATP service URLs in the proxy server](#enable-access-to-windows-defender-atp-service-urls-in-the-proxy-server). The URLs you'll use will depend on the region selected during the onboarding procedure. +However, if the connectivity check results indicate a failure, an HTTP error is displayed (see HTTP Status Codes). You can then use the URLs in the table shown in [Enable access to Microsoft Defender ATP service URLs in the proxy server](#enable-access-to-microsoft-defender-atp-service-urls-in-the-proxy-server). The URLs you'll use will depend on the region selected during the onboarding procedure. > [!NOTE] > When the TelemetryProxyServer is set, in Registry or via Group Policy, Microsoft Defender ATP will fall back to direct if it can't access the defined proxy. diff --git a/windows/security/threat-protection/microsoft-defender-atp/fix-unhealthy-sensors.md b/windows/security/threat-protection/microsoft-defender-atp/fix-unhealthy-sensors.md index 5c2458d459..d874f34507 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/fix-unhealthy-sensors.md +++ b/windows/security/threat-protection/microsoft-defender-atp/fix-unhealthy-sensors.md @@ -64,7 +64,7 @@ The following suggested actions can help fix issues related to a misconfigured m - [Ensure the machine has Internet connection](troubleshoot-onboarding.md#troubleshoot-onboarding-issues-on-the-machine)
The Window Defender ATP sensor requires Microsoft Windows HTTP (WinHTTP) to report sensor data and communicate with the Microsoft Defender ATP service. -- [Verify client connectivity to Microsoft Defender ATP service URLs](configure-proxy-internet.md#verify-client-connectivity-to-windows-defender-atp-service-urls)
+- [Verify client connectivity to Microsoft Defender ATP service URLs](configure-proxy-internet.md#verify-client-connectivity-to-microsoft-defender-atp-service-urls)
Verify the proxy configuration completed successfully, that WinHTTP can discover and communicate through the proxy server in your environment, and that the proxy server allows traffic to the Microsoft Defender ATP service URLs. If you took corrective actions and the machine status is still misconfigured, [open a support ticket](https://go.microsoft.com/fwlink/?LinkID=761093&clcid=0x409). @@ -76,7 +76,7 @@ Follow theses actions to correct known issues related to a misconfigured machine - [Ensure the machine has Internet connection](troubleshoot-onboarding.md#troubleshoot-onboarding-issues-on-the-machine)
The Window Defender ATP sensor requires Microsoft Windows HTTP (WinHTTP) to report sensor data and communicate with the Microsoft Defender ATP service. -- [Verify client connectivity to Microsoft Defender ATP service URLs](configure-proxy-internet.md#verify-client-connectivity-to-windows-defender-atp-service-urls)
+- [Verify client connectivity to Microsoft Defender ATP service URLs](configure-proxy-internet.md#verify-client-connectivity-to-microsoft-defender-atp-service-urls)
Verify the proxy configuration completed successfully, that WinHTTP can discover and communicate through the proxy server in your environment, and that the proxy server allows traffic to the Microsoft Defender ATP service URLs. - [Ensure the diagnostic data service is enabled](troubleshoot-onboarding.md#ensure-the-diagnostics-service-is-enabled)
diff --git a/windows/security/threat-protection/microsoft-defender-atp/troubleshoot-onboarding.md b/windows/security/threat-protection/microsoft-defender-atp/troubleshoot-onboarding.md index b46b9c95ac..69c3b620ca 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/troubleshoot-onboarding.md +++ b/windows/security/threat-protection/microsoft-defender-atp/troubleshoot-onboarding.md @@ -238,7 +238,7 @@ The Window Defender ATP sensor requires Microsoft Windows HTTP (WinHTTP) to repo WinHTTP is independent of the Internet browsing proxy settings and other user context applications and must be able to detect the proxy servers that are available in your particular environment. -To ensure that sensor has service connectivity, follow the steps described in the [Verify client connectivity to Microsoft Defender ATP service URLs](configure-proxy-internet.md#verify-client-connectivity-to-windows-defender-atp-service-urls) topic. +To ensure that sensor has service connectivity, follow the steps described in the [Verify client connectivity to Microsoft Defender ATP service URLs](configure-proxy-internet.md#verify-client-connectivity-to-microsoft-defender-atp-service-urls) topic. If the verification fails and your environment is using a proxy to connect to the Internet, then follow the steps described in [Configure proxy and Internet connectivity settings](configure-proxy-internet.md) topic. From d33361fe9b7259bf758294bc45ed08691227c41d Mon Sep 17 00:00:00 2001 From: Beth Levin Date: Wed, 10 Apr 2019 16:03:15 -0700 Subject: [PATCH 156/724] redirects --- .openpublishing.redirection.json | 57 +++++++++++++++++-- .../microsoft-defender-atp/TOC.md | 6 +- ...ty-sensors.md => fix-unhealthy-sensors.md} | 0 3 files changed, 54 insertions(+), 9 deletions(-) rename windows/security/threat-protection/microsoft-defender-atp/{fix-unhealhty-sensors.md => fix-unhealthy-sensors.md} (100%) diff --git a/.openpublishing.redirection.json b/.openpublishing.redirection.json index 9f59abb6d7..7b46d8e423 100644 --- a/.openpublishing.redirection.json +++ b/.openpublishing.redirection.json @@ -1101,13 +1101,13 @@ "redirect_document_id": true }, { -"source_path": "windows/threat-protection/windows-defender-atp/enable-security-analytics-windows-defender-advanced-threat-protection.md", -"redirect_url": "/windows/security/threat-protection/windows-defender-atp/enable-security-analytics-windows-defender-advanced-threat-protection", +"source_path": "windows/threat-protection/windows-defender-atp/enable-siem-integration-windows-defender-advanced-threat-protection.md", +"redirect_url": "/windows/security/threat-protection/windows-defender-atp/enable-siem-integration-windows-defender-advanced-threat-protection", "redirect_document_id": true }, { -"source_path": "windows/threat-protection/windows-defender-atp/enable-siem-integration-windows-defender-advanced-threat-protection.md", -"redirect_url": "/windows/security/threat-protection/windows-defender-atp/enable-siem-integration-windows-defender-advanced-threat-protection", +"source_path": "windows/security/threat-protection/windows-defender-atp/enable-siem-integration-windows-defender-advanced-threat-protection.md", +"redirect_url": "/windows/security/threat-protection/microsoft-defender-atp/enable-siem-integration", "redirect_document_id": true }, { @@ -1116,18 +1116,28 @@ "redirect_document_id": true }, { +"source_path": "windows/security/threat-protection/windows-defender-atp/event-error-codes-windows-defender-advanced-threat-protection.md", +"redirect_url": "/windows/security/threat-protection/microsoft-defender-atp/event-error-codes", +"redirect_document_id": true +}, +{ "source_path": "windows/threat-protection/windows-defender-atp/experiment-custom-ti-windows-defender-advanced-threat-protection.md", "redirect_url": "/windows/security/threat-protection/windows-defender-atp/experiment-custom-ti-windows-defender-advanced-threat-protection", "redirect_document_id": true }, { +"source_path": "windows/security/threat-protection/windows-defender-atp/experiment-custom-ti-windows-defender-advanced-threat-protection.md", +"redirect_url": "/windows/security/threat-protection/microsoft-defender-atp/experiment-custom-ti", +"redirect_document_id": true +}, +{ "source_path": "windows/threat-protection/windows-defender-atp/fix-unhealhty-sensors-windows-defender-advanced-threat-protection.md", "redirect_url": "/windows/security/threat-protection/windows-defender-atp/fix-unhealhty-sensors-windows-defender-advanced-threat-protection", "redirect_document_id": true }, { -"source_path": "windows/threat-protection/windows-defender-atp/general-settings-windows-defender-advanced-threat-protection.md", -"redirect_url": "/windows/security/threat-protection/windows-defender-atp/general-settings-windows-defender-advanced-threat-protection", +"source_path": "windows/security/threat-protection/windows-defender-atp/fix-unhealhty-sensors-windows-defender-advanced-threat-protection.md", +"redirect_url": "/windows/security/threat-protection/windows-defender-atp/fix-unhealthy-sensors", "redirect_document_id": true }, { @@ -1136,36 +1146,71 @@ "redirect_document_id": true }, { +"source_path": "windows/security/threat-protection/windows-defender-atp/investigate-alerts-windows-defender-advanced-threat-protection.md", +"redirect_url": "/windows/security/threat-protection/microsoft-defender-atp/investigate-alerts", +"redirect_document_id": true +}, +{ "source_path": "windows/threat-protection/windows-defender-atp/investigate-domain-windows-defender-advanced-threat-protection.md", "redirect_url": "/windows/security/threat-protection/windows-defender-atp/investigate-domain-windows-defender-advanced-threat-protection", "redirect_document_id": true }, { +"source_path": "windows/security/threat-protection/windows-defender-atp/investigate-domain-windows-defender-advanced-threat-protection.md", +"redirect_url": "/windows/security/threat-protection/microsoft-defender-atp/investigate-domain", +"redirect_document_id": true +}, +{ "source_path": "windows/threat-protection/windows-defender-atp/investigate-files-windows-defender-advanced-threat-protection.md", "redirect_url": "/windows/security/threat-protection/windows-defender-atp/investigate-files-windows-defender-advanced-threat-protection", "redirect_document_id": true }, { +"source_path": "windows/security/threat-protection/windows-defender-atp/investigate-files-windows-defender-advanced-threat-protection.md", +"redirect_url": "/windows/security/threat-protection/microsoft-defender-atp/investigate-files", +"redirect_document_id": true +}, +{ "source_path": "windows/threat-protection/windows-defender-atp/investigate-ip-windows-defender-advanced-threat-protection.md", "redirect_url": "/windows/security/threat-protection/windows-defender-atp/investigate-ip-windows-defender-advanced-threat-protection", "redirect_document_id": true }, { +"source_path": "windows/security/threat-protection/windows-defender-atp/investigate-ip-windows-defender-advanced-threat-protection.md", +"redirect_url": "/windows/security/threat-protection/microsoft-defender-atp/investigate-ip", +"redirect_document_id": true +}, +{ "source_path": "windows/threat-protection/windows-defender-atp/investigate-machines-windows-defender-advanced-threat-protection.md", "redirect_url": "/windows/security/threat-protection/windows-defender-atp/investigate-machines-windows-defender-advanced-threat-protection", "redirect_document_id": true }, { +"source_path": "windows/security/threat-protection/windows-defender-atp/investigate-machines-windows-defender-advanced-threat-protection.md", +"redirect_url": "/windows/security/threat-protection/microsoft-defender-atp/investigate-machines", +"redirect_document_id": true +}, +{ "source_path": "windows/threat-protection/windows-defender-atp/investigate-user-windows-defender-advanced-threat-protection.md", "redirect_url": "/windows/security/threat-protection/windows-defender-atp/investigate-user-windows-defender-advanced-threat-protection", "redirect_document_id": true }, { +"source_path": "windows/security/threat-protection/windows-defender-atp/investigate-user-windows-defender-advanced-threat-protection.md", +"redirect_url": "/windows/security/threat-protection/microsoft-defender-atp/investigate-user", +"redirect_document_id": true +}, +{ "source_path": "windows/threat-protection/windows-defender-atp/licensing-windows-defender-advanced-threat-protection.md", "redirect_url": "/windows/security/threat-protection/windows-defender-atp/licensing-windows-defender-advanced-threat-protection", "redirect_document_id": true }, { +"source_path": "windows/security/threat-protection/windows-defender-atp/licensing-windows-defender-advanced-threat-protection.md", +"redirect_url": "/windows/security/threat-protection/microsoft-defender-atp/licensing", +"redirect_document_id": true +}, +{ "source_path": "windows/threat-protection/windows-defender-atp/machines-view-overview-windows-defender-advanced-threat-protection.md", "redirect_url": "/windows/security/threat-protection/windows-defender-atp/machines-view-overview-windows-defender-advanced-threat-protection", "redirect_document_id": true diff --git a/windows/security/threat-protection/microsoft-defender-atp/TOC.md b/windows/security/threat-protection/microsoft-defender-atp/TOC.md index 297f7f6173..0a5682ebc9 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/TOC.md +++ b/windows/security/threat-protection/microsoft-defender-atp/TOC.md @@ -392,9 +392,9 @@ ## [Troubleshoot Microsoft Defender ATP](troubleshoot-overview.md) ###Troubleshoot sensor state #### [Check sensor state](check-sensor-status.md) -#### [Fix unhealthy sensors](fix-unhealhty-sensors.md) -#### [Inactive machines](fix-unhealhty-sensors.md#inactive-machines) -#### [Misconfigured machines](fix-unhealhty-sensors.md#misconfigured-machines) +#### [Fix unhealthy sensors](fix-unhealthy-sensors.md) +#### [Inactive machines](fix-unhealthy-sensors.md#inactive-machines) +#### [Misconfigured machines](fix-unhealthy-sensors.md#misconfigured-machines) #### [Review sensor events and errors on machines with Event Viewer](event-error-codes.md) ### [Troubleshoot Microsoft Defender ATP service issues](troubleshoot.md) diff --git a/windows/security/threat-protection/microsoft-defender-atp/fix-unhealhty-sensors.md b/windows/security/threat-protection/microsoft-defender-atp/fix-unhealthy-sensors.md similarity index 100% rename from windows/security/threat-protection/microsoft-defender-atp/fix-unhealhty-sensors.md rename to windows/security/threat-protection/microsoft-defender-atp/fix-unhealthy-sensors.md From e4003c516e9d1bdf45757da7fa3b4473e0a429a2 Mon Sep 17 00:00:00 2001 From: Joey Caparas Date: Wed, 10 Apr 2019 16:03:17 -0700 Subject: [PATCH 157/724] threat-analytics-dashboard filename --- .../security/threat-protection/microsoft-defender-atp/TOC.md | 2 +- .../threat-protection/microsoft-defender-atp/alerts-queue.md | 2 +- .../{threat-analytics.md => threat-analytics-dashboard.md} | 0 3 files changed, 2 insertions(+), 2 deletions(-) rename windows/security/threat-protection/microsoft-defender-atp/{threat-analytics.md => threat-analytics-dashboard.md} (100%) diff --git a/windows/security/threat-protection/microsoft-defender-atp/TOC.md b/windows/security/threat-protection/microsoft-defender-atp/TOC.md index 0a5682ebc9..3c6dda9da7 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/TOC.md +++ b/windows/security/threat-protection/microsoft-defender-atp/TOC.md @@ -70,7 +70,7 @@ ### [Secure score](overview-secure-score.md) -### [Threat analytics](threat-analytics.md) +### [Threat analytics](threat-analytics-dashboard.md) diff --git a/windows/security/threat-protection/microsoft-defender-atp/alerts-queue.md b/windows/security/threat-protection/microsoft-defender-atp/alerts-queue.md index f2aaa2d6aa..fbe92937d8 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/alerts-queue.md +++ b/windows/security/threat-protection/microsoft-defender-atp/alerts-queue.md @@ -90,7 +90,7 @@ Limit the alerts queue view by selecting the OS platform that you're interested If you have specific machine groups that you're interested in checking the alerts on, you can select the groups to limit the alerts queue view to display just those machine groups. ### Associated threat -Use this filter to focus on alerts that are related to high profile threats. You can see the full list of high-profile threats in [Threat analytics](threat-analytics.md). +Use this filter to focus on alerts that are related to high profile threats. You can see the full list of high-profile threats in [Threat analytics](threat-analytics-dashboard.md). ## Related topics diff --git a/windows/security/threat-protection/microsoft-defender-atp/threat-analytics.md b/windows/security/threat-protection/microsoft-defender-atp/threat-analytics-dashboard.md similarity index 100% rename from windows/security/threat-protection/microsoft-defender-atp/threat-analytics.md rename to windows/security/threat-protection/microsoft-defender-atp/threat-analytics-dashboard.md From cded9b9c19b8b743a1026539e52b847858c23a51 Mon Sep 17 00:00:00 2001 From: Joey Caparas Date: Wed, 10 Apr 2019 16:04:22 -0700 Subject: [PATCH 158/724] ta --- .../security/threat-protection/microsoft-defender-atp/TOC.md | 2 +- .../threat-protection/microsoft-defender-atp/alerts-queue.md | 2 +- .../microsoft-defender-atp/overview-secure-score.md | 4 ++-- .../microsoft-defender-atp/portal-overview.md | 2 +- .../microsoft-defender-atp/security-operations-dashboard.md | 2 +- .../microsoft-defender-atp/threat-analytics-dashboard.md | 2 +- .../security/threat-protection/microsoft-defender-atp/use.md | 2 +- 7 files changed, 8 insertions(+), 8 deletions(-) diff --git a/windows/security/threat-protection/microsoft-defender-atp/TOC.md b/windows/security/threat-protection/microsoft-defender-atp/TOC.md index 3c6dda9da7..0a5682ebc9 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/TOC.md +++ b/windows/security/threat-protection/microsoft-defender-atp/TOC.md @@ -70,7 +70,7 @@ ### [Secure score](overview-secure-score.md) -### [Threat analytics](threat-analytics-dashboard.md) +### [Threat analytics](threat-analytics.md) diff --git a/windows/security/threat-protection/microsoft-defender-atp/alerts-queue.md b/windows/security/threat-protection/microsoft-defender-atp/alerts-queue.md index fbe92937d8..f2aaa2d6aa 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/alerts-queue.md +++ b/windows/security/threat-protection/microsoft-defender-atp/alerts-queue.md @@ -90,7 +90,7 @@ Limit the alerts queue view by selecting the OS platform that you're interested If you have specific machine groups that you're interested in checking the alerts on, you can select the groups to limit the alerts queue view to display just those machine groups. ### Associated threat -Use this filter to focus on alerts that are related to high profile threats. You can see the full list of high-profile threats in [Threat analytics](threat-analytics-dashboard.md). +Use this filter to focus on alerts that are related to high profile threats. You can see the full list of high-profile threats in [Threat analytics](threat-analytics.md). ## Related topics diff --git a/windows/security/threat-protection/microsoft-defender-atp/overview-secure-score.md b/windows/security/threat-protection/microsoft-defender-atp/overview-secure-score.md index ec0b0550d8..7aad2ad004 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/overview-secure-score.md +++ b/windows/security/threat-protection/microsoft-defender-atp/overview-secure-score.md @@ -78,5 +78,5 @@ Within the tile, you can click on each control to see the recommended optimizati Clicking the link under the Misconfigured machines column opens up the **Machines list** with filters applied to show only the list of machines where the recommendation is applicable. You can export the list in Excel to create a target collection and apply relevant policies using a management solution of your choice. ## Related topic -- [Threat analytics](threat-analytics-dashboard.md) -- [Threat analytics for Spectre and Meltdown](threat-analytics-dashboard.md) +- [Threat analytics](threat-analytics.md) +- [Threat analytics for Spectre and Meltdown](threat-analytics.md) diff --git a/windows/security/threat-protection/microsoft-defender-atp/portal-overview.md b/windows/security/threat-protection/microsoft-defender-atp/portal-overview.md index 349f685730..07ac3f1831 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/portal-overview.md +++ b/windows/security/threat-protection/microsoft-defender-atp/portal-overview.md @@ -114,4 +114,4 @@ Icon | Description - [Understand the Microsoft Defender Advanced Threat Protection portal](use.md) - [View the Security operations dashboard](security-operations-dashboard.md) - [View the Secure Score dashboard and improve your secure score](secure-score-dashboard.md) -- [View the Threat analytics dashboard and take recommended mitigation actions](threat-analytics-dashboard.md) \ No newline at end of file +- [View the Threat analytics dashboard and take recommended mitigation actions](threat-analytics.md) diff --git a/windows/security/threat-protection/microsoft-defender-atp/security-operations-dashboard.md b/windows/security/threat-protection/microsoft-defender-atp/security-operations-dashboard.md index ee063018af..9d6eced4c4 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/security-operations-dashboard.md +++ b/windows/security/threat-protection/microsoft-defender-atp/security-operations-dashboard.md @@ -130,5 +130,5 @@ This tile shows audit events based on detections from various security component - [Understand the Microsoft Defender Advanced Threat Protection portal](use.md) - [Portal overview](portal-overview.md) - [View the Secure Score dashboard and improve your secure score](secure-score-dashboard.md) -- [View the Threat analytics dashboard and take recommended mitigation actions](threat-analytics-dashboard.md) +- [View the Threat analytics dashboard and take recommended mitigation actions](threat-analytics.md) diff --git a/windows/security/threat-protection/microsoft-defender-atp/threat-analytics-dashboard.md b/windows/security/threat-protection/microsoft-defender-atp/threat-analytics-dashboard.md index f4b1020dc3..c4b5ae9d96 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/threat-analytics-dashboard.md +++ b/windows/security/threat-protection/microsoft-defender-atp/threat-analytics-dashboard.md @@ -65,5 +65,5 @@ The **Mitigation status** and **Mitigation status over time** shows the endpoint ## Related topics -- [Threat analytics for Spectre and Meltdown](threat-analytics-dashboard.md) +- [Threat analytics for Spectre and Meltdown](threat-analytics.md) diff --git a/windows/security/threat-protection/microsoft-defender-atp/use.md b/windows/security/threat-protection/microsoft-defender-atp/use.md index df066b9b7e..501f6f9019 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/use.md +++ b/windows/security/threat-protection/microsoft-defender-atp/use.md @@ -42,6 +42,6 @@ Topic | Description [Portal overview](portal-overview.md) | Understand the portal layout and area descriptions. [View the Security operations dashboard](security-operations-dashboard.md) | The Microsoft Defender ATP **Security operations dashboard** provides a snapshot of your network. You can view aggregates of alerts, the overall status of the service of the machines on your network, investigate machines, files, and URLs, and see snapshots of threats seen on machines. [View the Secure Score dashboard and improve your secure score](secure-score-dashboard.md) | The **Secure Score dashboard** expands your visibility into the overall security posture of your organization. From this dashboard, you'll be able to quickly assess the security posture of your organization, see machines that require attention, as well as recommendations for actions to further reduce the attack surface in your organization - all in one place. -[View the Threat analytics dashboard and take recommended mitigation actions](threat-analytics-dashboard.md) | The **Threat analytics** dashboard helps you continually assess and control risk exposure to Spectre and Meltdown. Use the charts to quickly identify machines for the presence or absence of mitigations. +[View the Threat analytics dashboard and take recommended mitigation actions](threat-analytics.md) | The **Threat analytics** dashboard helps you continually assess and control risk exposure to Spectre and Meltdown. Use the charts to quickly identify machines for the presence or absence of mitigations. From 554538ed0198797c6435eb5675953ecf09b7188e Mon Sep 17 00:00:00 2001 From: Joey Caparas Date: Wed, 10 Apr 2019 16:05:01 -0700 Subject: [PATCH 159/724] file name --- .../{threat-analytics-dashboard.md => threat-analytics.md} | 0 1 file changed, 0 insertions(+), 0 deletions(-) rename windows/security/threat-protection/microsoft-defender-atp/{threat-analytics-dashboard.md => threat-analytics.md} (100%) diff --git a/windows/security/threat-protection/microsoft-defender-atp/threat-analytics-dashboard.md b/windows/security/threat-protection/microsoft-defender-atp/threat-analytics.md similarity index 100% rename from windows/security/threat-protection/microsoft-defender-atp/threat-analytics-dashboard.md rename to windows/security/threat-protection/microsoft-defender-atp/threat-analytics.md From a7ccceaaf30ac88f326c4f5818ccf165ff5e2514 Mon Sep 17 00:00:00 2001 From: Joey Caparas Date: Wed, 10 Apr 2019 16:08:43 -0700 Subject: [PATCH 160/724] troubleshoot file name --- .../microsoft-defender-advanced-threat-protection.md | 2 +- .../{troubleshoot.md => troubleshoot-mdatp.md} | 0 2 files changed, 1 insertion(+), 1 deletion(-) rename windows/security/threat-protection/microsoft-defender-atp/{troubleshoot.md => troubleshoot-mdatp.md} (100%) diff --git a/windows/security/threat-protection/microsoft-defender-atp/microsoft-defender-advanced-threat-protection.md b/windows/security/threat-protection/microsoft-defender-atp/microsoft-defender-advanced-threat-protection.md index 8efb9d7b22..d9cd1f742a 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/microsoft-defender-advanced-threat-protection.md +++ b/windows/security/threat-protection/microsoft-defender-atp/microsoft-defender-advanced-threat-protection.md @@ -123,7 +123,7 @@ Topic | Description [Overview](overview.md) | Understand the concepts behind the capabilities in Microsoft Defender ATP so you take full advantage of the complete threat protection platform. [Get started](get-started.md) | Learn about the requirements of the platform and the initial steps you need to take to get started with Microsoft Defender ATP. [Configure and manage capabilities](onboard.md)| Configure and manage the individual capabilities in Microsoft Defender ATP. -[Troubleshoot Microsoft Defender ATP](troubleshoot-wdatp.md) | Learn how to address issues that you might encounter while using the platform. +[Troubleshoot Microsoft Defender ATP](troubleshoot-mdatp.md) | Learn how to address issues that you might encounter while using the platform. ## Related topic [Microsoft Defender ATP helps detect sophisticated threats](https://www.microsoft.com/itshowcase/Article/Content/854/Windows-Defender-ATP-helps-detect-sophisticated-threats) diff --git a/windows/security/threat-protection/microsoft-defender-atp/troubleshoot.md b/windows/security/threat-protection/microsoft-defender-atp/troubleshoot-mdatp.md similarity index 100% rename from windows/security/threat-protection/microsoft-defender-atp/troubleshoot.md rename to windows/security/threat-protection/microsoft-defender-atp/troubleshoot-mdatp.md From c3fc41a124a8b9c2bb8eadac0df46004ad483b0b Mon Sep 17 00:00:00 2001 From: Joey Caparas Date: Wed, 10 Apr 2019 16:12:18 -0700 Subject: [PATCH 161/724] update overview topic --- .../overview-of-threat-mitigations-in-windows-10.md | 8 ++++---- 1 file changed, 4 insertions(+), 4 deletions(-) diff --git a/windows/security/threat-protection/overview-of-threat-mitigations-in-windows-10.md b/windows/security/threat-protection/overview-of-threat-mitigations-in-windows-10.md index bb4bb74070..c3738fd5f6 100644 --- a/windows/security/threat-protection/overview-of-threat-mitigations-in-windows-10.md +++ b/windows/security/threat-protection/overview-of-threat-mitigations-in-windows-10.md @@ -103,7 +103,7 @@ Windows Defender Antivirus in Windows 10 uses a multi-pronged approach to improv For more information, see [Windows Defender in Windows 10](windows-defender-antivirus/windows-defender-antivirus-in-windows-10.md) and [Windows Defender Overview for Windows Server](https://technet.microsoft.com/windows-server-docs/security/windows-defender/windows-defender-overview-windows-server). -For information about Windows Defender Advanced Threat Protection, a service that helps enterprises to detect, investigate, and respond to advanced and targeted attacks on their networks, see [Windows Defender Advanced Threat Protection (ATP)](https://www.microsoft.com/en-us/WindowsForBusiness/windows-atp) (resources) and [Windows Defender Advanced Threat Protection (ATP)](https://technet.microsoft.com/itpro/windows/keep-secure/windows-defender-advanced-threat-protection) (documentation). +For information about Microsoft Defender Advanced Threat Protection, a service that helps enterprises to detect, investigate, and respond to advanced and targeted attacks on their networks, see [Microsoft Defender Advanced Threat Protection (ATP)](https://www.microsoft.com/en-us/WindowsForBusiness/windows-atp) (resources) and [Microsoft Defender Advanced Threat Protection (ATP)](https://docs.microsoft.com/en-us/windows/security/threat-protection/microsoft-defender-atp/microsoft-defender-advanced-threat-protection) (documentation). ### Data Execution Prevention @@ -442,13 +442,13 @@ Examples: #### EMET-related products -Microsoft Consulting Services (MCS) and Microsoft Support/Premier Field Engineering (PFE) offer a range of options for EMET, support for EMET, and EMET-related reporting and auditing products such as the EMET Enterprise Reporting Service (ERS). For any enterprise customers who use such products today or who are interested in similar capabilities, we recommend evaluating [Windows Defender Advanced Threat Protection](windows-defender-atp/windows-defender-advanced-threat-protection.md) (ATP). +Microsoft Consulting Services (MCS) and Microsoft Support/Premier Field Engineering (PFE) offer a range of options for EMET, support for EMET, and EMET-related reporting and auditing products such as the EMET Enterprise Reporting Service (ERS). For any enterprise customers who use such products today or who are interested in similar capabilities, we recommend evaluating [Microsoft Defender Advanced Threat Protection](microsoft-defender-atp/microsoft-defender-advanced-threat-protection.md) (ATP). ## Related topics - [Security and Assurance in Windows Server 2016](https://technet.microsoft.com/windows-server-docs/security/security-and-assurance) -- [Windows Defender Advanced Threat Protection (ATP) - resources](https://www.microsoft.com/en-us/WindowsForBusiness/windows-atp) -- [Windows Defender Advanced Threat Protection (ATP) - documentation](windows-defender-atp/windows-defender-advanced-threat-protection.md) +- [Microsoft Defender Advanced Threat Protection (ATP) - resources](https://www.microsoft.com/en-us/WindowsForBusiness/windows-atp) +- [Microsoft Defender Advanced Threat Protection (ATP) - documentation](microsoft-defender-atp/microsoft-defender-advanced-threat-protection.md) - [Exchange Online Advanced Threat Protection Service Description](https://technet.microsoft.com/library/exchange-online-advanced-threat-protection-service-description.aspx) - [Office 365 Advanced Threat Protection](https://products.office.com/en-us/exchange/online-email-threat-protection) - [Microsoft Malware Protection Center](https://www.microsoft.com/en-us/security/portal/mmpc/default.aspx) From eab433bf3c27688c26c95404fe0676e6a8884386 Mon Sep 17 00:00:00 2001 From: Joey Caparas Date: Wed, 10 Apr 2019 16:20:27 -0700 Subject: [PATCH 162/724] update url --- ...curity-center-atp.md => windows-defender-security-center.md} | 1 - .../overview-of-threat-mitigations-in-windows-10.md | 2 +- .../windows-defender-antivirus-compatibility.md | 2 +- 3 files changed, 2 insertions(+), 3 deletions(-) rename windows/security/threat-protection/microsoft-defender-atp/{windows-defender-security-center-atp.md => windows-defender-security-center.md} (99%) diff --git a/windows/security/threat-protection/microsoft-defender-atp/windows-defender-security-center-atp.md b/windows/security/threat-protection/microsoft-defender-atp/windows-defender-security-center.md similarity index 99% rename from windows/security/threat-protection/microsoft-defender-atp/windows-defender-security-center-atp.md rename to windows/security/threat-protection/microsoft-defender-atp/windows-defender-security-center.md index 89b74b62a0..7c7ef2d01e 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/windows-defender-security-center-atp.md +++ b/windows/security/threat-protection/microsoft-defender-atp/windows-defender-security-center.md @@ -15,7 +15,6 @@ manager: dansimp audience: ITPro ms.collection: M365-security-compliance ms.topic: conceptual -ms.date: 07/01/2018 --- # Microsoft Defender Security Center diff --git a/windows/security/threat-protection/overview-of-threat-mitigations-in-windows-10.md b/windows/security/threat-protection/overview-of-threat-mitigations-in-windows-10.md index c3738fd5f6..12f446cb26 100644 --- a/windows/security/threat-protection/overview-of-threat-mitigations-in-windows-10.md +++ b/windows/security/threat-protection/overview-of-threat-mitigations-in-windows-10.md @@ -448,7 +448,7 @@ Microsoft Consulting Services (MCS) and Microsoft Support/Premier Field Engineer - [Security and Assurance in Windows Server 2016](https://technet.microsoft.com/windows-server-docs/security/security-and-assurance) - [Microsoft Defender Advanced Threat Protection (ATP) - resources](https://www.microsoft.com/en-us/WindowsForBusiness/windows-atp) -- [Microsoft Defender Advanced Threat Protection (ATP) - documentation](microsoft-defender-atp/microsoft-defender-advanced-threat-protection.md) +- [Microsoft Defender Advanced Threat Protection (ATP) - documentation](https://docs.microsoft.com/windows/security/threat-protection/microsoft-defender-atp/microsoft-defender-advanced-threat-protection) - [Exchange Online Advanced Threat Protection Service Description](https://technet.microsoft.com/library/exchange-online-advanced-threat-protection-service-description.aspx) - [Office 365 Advanced Threat Protection](https://products.office.com/en-us/exchange/online-email-threat-protection) - [Microsoft Malware Protection Center](https://www.microsoft.com/en-us/security/portal/mmpc/default.aspx) diff --git a/windows/security/threat-protection/windows-defender-antivirus/windows-defender-antivirus-compatibility.md b/windows/security/threat-protection/windows-defender-antivirus/windows-defender-antivirus-compatibility.md index 34ee455d8a..4b8cc048a4 100644 --- a/windows/security/threat-protection/windows-defender-antivirus/windows-defender-antivirus-compatibility.md +++ b/windows/security/threat-protection/windows-defender-antivirus/windows-defender-antivirus-compatibility.md @@ -63,7 +63,7 @@ Passive mode | Windows Defender AV will not be used as the antivirus app, and th Automatic disabled mode | Windows Defender AV will not be used as the antivirus app. Files will not be scanned and threats will not be remediated. | [!include[Check mark no](images/svg/check-no.svg)] | [!include[Check mark yes](images/svg/check-yes.svg)] | [!include[Check mark no](images/svg/check-no.svg)] | [!include[Check mark no](images/svg/check-no.svg)] | [!include[Check mark no](images/svg/check-no.svg)] Active mode | Windows Defender AV is used as the antivirus app on the machine. All configuration made with Configuration Manager, Group Policy, Intune, or other management products will apply. Files will be scanned and threats remediated, and detection information will be reported in your configuration tool (such as Configuration Manager or the Windows Defender AV app on the machine itself). | [!include[Check mark yes](images/svg/check-yes.svg)] | [!include[Check mark no](images/svg/check-no.svg)] | [!include[Check mark yes](images/svg/check-yes.svg)] | [!include[Check mark yes](images/svg/check-yes.svg)] | [!include[Check mark yes](images/svg/check-yes.svg)] -If you are enrolled in Microsoft Defender ATP and you are using a third party antimalware product then passive mode is enabled because [the service requires common information sharing from the Windows Defender AV service](../windows-defender-atp/defender-compatibility.md) in order to properly monitor your devices and network for intrusion attempts and attacks. +If you are enrolled in Microsoft Defender ATP and you are using a third party antimalware product then passive mode is enabled because [the service requires common information sharing from the Windows Defender AV service](../microsoft-defender-atp/defender-compatibility.md) in order to properly monitor your devices and network for intrusion attempts and attacks. Automatic disabled mode is enabled so that if the protection offered by a third-party antivirus product expires or otherwise stops providing real-time protection from viruses, malware or other threats, Windows Defender AV will automatically enable itself to ensure antivirus protection is maintained on the endpoint. It also allows you to enable [limited periodic scanning](limited-periodic-scanning-windows-defender-antivirus.md), which uses the Windows Defender AV engine to periodically check for threats in addition to your main antivirus app. From 440345de4d1bcfffeee6fe44a21f042152cb1893 Mon Sep 17 00:00:00 2001 From: Joey Caparas Date: Wed, 10 Apr 2019 16:24:04 -0700 Subject: [PATCH 163/724] fix eg file names --- .../attack-surface-reduction-exploit-guard.md | 2 +- ...k-surface-reduction-rules-in-windows-10-enterprise-e3.md | 2 +- .../audit-windows-defender-exploit-guard.md | 2 +- .../controlled-folders-exploit-guard.md | 6 +++--- .../emet-exploit-protection-exploit-guard.md | 2 +- .../event-views-exploit-guard.md | 2 +- .../exploit-protection-exploit-guard.md | 4 ++-- .../network-protection-exploit-guard.md | 6 +++--- .../windows-defender-exploit-guard/troubleshoot-asr.md | 2 +- .../windows-defender-exploit-guard/troubleshoot-np.md | 2 +- .../windows-defender-exploit-guard.md | 2 +- 11 files changed, 16 insertions(+), 16 deletions(-) diff --git a/windows/security/threat-protection/windows-defender-exploit-guard/attack-surface-reduction-exploit-guard.md b/windows/security/threat-protection/windows-defender-exploit-guard/attack-surface-reduction-exploit-guard.md index 51b3340555..93cfaddf25 100644 --- a/windows/security/threat-protection/windows-defender-exploit-guard/attack-surface-reduction-exploit-guard.md +++ b/windows/security/threat-protection/windows-defender-exploit-guard/attack-surface-reduction-exploit-guard.md @@ -22,7 +22,7 @@ ms.date: 04/02/2019 Attack surface reduction rules help prevent behaviors malware often uses to infect computers with malicious code. You can set attack surface reduction rules for computers running Windows 10, version 1709 or later, Windows Server 2016 1803 or later, or Windows Server 2019. -To use attack surface reduction rules, you need a Windows 10 Enterprise E3 license or higher. A Windows E5 license gives you the advanced management capabilities to power them. These include monitoring, analytics, and workflows available in [Microsoft Defender Advanced Threat Protection](../windows-defender-atp/windows-defender-advanced-threat-protection.md), as well as reporting and configuration capabilities in the M365 Security Center. These advanced capabilities aren't available with an E3 license, but you can use attack surface reduction rule events in Event Viewer to help facilitate deployment. +To use attack surface reduction rules, you need a Windows 10 Enterprise E3 license or higher. A Windows E5 license gives you the advanced management capabilities to power them. These include monitoring, analytics, and workflows available in [Microsoft Defender Advanced Threat Protection](../microsoft-defender-atp/microsoft-defender-advanced-threat-protection.md), as well as reporting and configuration capabilities in the M365 Security Center. These advanced capabilities aren't available with an E3 license, but you can use attack surface reduction rule events in Event Viewer to help facilitate deployment. Attack surface reduction rules target behaviors that malware and malicious apps typically use to infect computers, including: diff --git a/windows/security/threat-protection/windows-defender-exploit-guard/attack-surface-reduction-rules-in-windows-10-enterprise-e3.md b/windows/security/threat-protection/windows-defender-exploit-guard/attack-surface-reduction-rules-in-windows-10-enterprise-e3.md index 9b29796bee..60bdf42183 100644 --- a/windows/security/threat-protection/windows-defender-exploit-guard/attack-surface-reduction-rules-in-windows-10-enterprise-e3.md +++ b/windows/security/threat-protection/windows-defender-exploit-guard/attack-surface-reduction-rules-in-windows-10-enterprise-e3.md @@ -20,7 +20,7 @@ ms.date: 10/15/2018 - Windows 10 Enterprise E3 -Attack surface reduction rules help prevent actions and apps that are typically used by exploit-seeking malware to infect machines. This feature area includes the rules, monitoring, reporting, and analytics necessary for deployment that are included in [Microsoft Defender Advanced Threat Protection](../windows-defender-atp/windows-defender-advanced-threat-protection.md), and require the Windows 10 Enterprise E5 license. +Attack surface reduction rules help prevent actions and apps that are typically used by exploit-seeking malware to infect machines. This feature area includes the rules, monitoring, reporting, and analytics necessary for deployment that are included in [Microsoft Defender Advanced Threat Protection](../microsoft-defender-atp/microsoft-defender-advanced-threat-protection.md), and require the Windows 10 Enterprise E5 license. A limited subset of basic attack surface reduction rules can technically be used with Windows 10 Enterprise E3. They can be used without the benefits of reporting, monitoring, and analytics, which provide the ease of deployment and management capabilities necessary for enterprises. diff --git a/windows/security/threat-protection/windows-defender-exploit-guard/audit-windows-defender-exploit-guard.md b/windows/security/threat-protection/windows-defender-exploit-guard/audit-windows-defender-exploit-guard.md index 672ab8575a..0bc78c8573 100644 --- a/windows/security/threat-protection/windows-defender-exploit-guard/audit-windows-defender-exploit-guard.md +++ b/windows/security/threat-protection/windows-defender-exploit-guard/audit-windows-defender-exploit-guard.md @@ -27,7 +27,7 @@ You might want to do this when testing how the features will work in your organi While the features will not block or prevent apps, scripts, or files from being modified, the Windows Event Log will record events as if the features were fully enabled. This means you can enable audit mode and then review the event log to see what impact the feature would have had were it enabled. -You can use Microsoft Defender Advanced Threat Protection to get greater deatils for each event, especially for investigating attack surface reduction rules. Using the Microsoft Defender ATP console lets you [investigate issues as part of the alert timeline and investigation scenarios](../windows-defender-atp/investigate-alerts-windows-defender-advanced-threat-protection.md). +You can use Microsoft Defender Advanced Threat Protection to get greater deatils for each event, especially for investigating attack surface reduction rules. Using the Microsoft Defender ATP console lets you [investigate issues as part of the alert timeline and investigation scenarios](../microsoft-defender-atp/investigate-alerts.md). This topic provides links that describe how to enable the audit functionality for each feature and how to view events in the Windows Event Viewer. diff --git a/windows/security/threat-protection/windows-defender-exploit-guard/controlled-folders-exploit-guard.md b/windows/security/threat-protection/windows-defender-exploit-guard/controlled-folders-exploit-guard.md index c137f791e5..fc8c602805 100644 --- a/windows/security/threat-protection/windows-defender-exploit-guard/controlled-folders-exploit-guard.md +++ b/windows/security/threat-protection/windows-defender-exploit-guard/controlled-folders-exploit-guard.md @@ -21,7 +21,7 @@ ms.date: 11/29/2018 - [Microsoft Defender Advanced Threat Protection (Microsoft Defender ATP)](https://go.microsoft.com/fwlink/p/?linkid=2069559) Controlled folder access helps you protect valuable data from malicious apps and threats, such as ransomware. Controlled folder access is supported on Windows Server 2019 as well as Windows 10 clients. -Controlled folder access works best with [Microsoft Defender Advanced Threat Protection](../windows-defender-atp/windows-defender-advanced-threat-protection.md), which gives you detailed reporting into controlled folder access events and blocks as part of the usual [alert investigation scenarios](../windows-defender-atp/investigate-alerts-windows-defender-advanced-threat-protection.md). +Controlled folder access works best with [Microsoft Defender Advanced Threat Protection](../microsoft-defender-atp/microsoft-defender-advanced-threat-protection.md), which gives you detailed reporting into controlled folder access events and blocks as part of the usual [alert investigation scenarios](../microsoft-defender-atp/investigate-alerts.md). All apps (any executable file, including .exe, .scr, .dll files and others) are assessed by Windows Defender Antivirus, which then determines if the app is malicious or safe. If the app is determined to be malicious or suspicious, then it will not be allowed to make changes to any files in any protected folder. @@ -41,9 +41,9 @@ Controlled folder access requires enabling [Windows Defender Antivirus real-time ## Review controlled folder access events in the Microsoft Defender ATP Security Center -Microsoft Defender ATP provides detailed reporting into events and blocks as part of its [alert investigation scenarios](../windows-defender-atp/investigate-alerts-windows-defender-advanced-threat-protection.md). +Microsoft Defender ATP provides detailed reporting into events and blocks as part of its [alert investigation scenarios](../microsoft-defender-atp/investigate-alerts.md). -You can query Microsoft Defender ATP data by using [Advanced hunting](https://docs.microsoft.com/en-us/windows/security/threat-protection/windows-defender-atp/advanced-hunting-windows-defender-advanced-threat-protection). If you're using [audit mode](audit-windows-defender-exploit-guard.md), you can use Advanced hunting to see how controlled folder access settings would affect your environment if they were enabled. +You can query Microsoft Defender ATP data by using [Advanced hunting](https://docs.microsoft.com/en-us/windows/security/threat-protection/microsoft-defender-atp/advanced-hunting-windows-defender-advanced-threat-protection). If you're using [audit mode](audit-windows-defender-exploit-guard.md), you can use Advanced hunting to see how controlled folder access settings would affect your environment if they were enabled. ## Review controlled folder access events in Windows Event Viewer diff --git a/windows/security/threat-protection/windows-defender-exploit-guard/emet-exploit-protection-exploit-guard.md b/windows/security/threat-protection/windows-defender-exploit-guard/emet-exploit-protection-exploit-guard.md index bc4ff6e8aa..5a5dc12514 100644 --- a/windows/security/threat-protection/windows-defender-exploit-guard/emet-exploit-protection-exploit-guard.md +++ b/windows/security/threat-protection/windows-defender-exploit-guard/emet-exploit-protection-exploit-guard.md @@ -59,7 +59,7 @@ Configuration with Group Policy | [!include[Check mark yes](images/svg/check-yes Configuration with shell tools | [!include[Check mark yes](images/svg/check-yes.svg)]
[Use PowerShell to customize and manage configurations](customize-exploit-protection.md#powershell-reference) | [!include[Check mark yes](images/svg/check-yes.svg)]
Requires use of EMET tool (EMET_CONF) System Center Configuration Manager | [!include[Check mark yes](images/svg/check-yes.svg)]
[Use Configuration Manager to customize, deploy, and manage configurations](https://docs.microsoft.com/sccm/protect/deploy-use/create-deploy-exploit-guard-policy) | [!include[Check mark no](images/svg/check-no.svg)]
Not available Microsoft Intune | [!include[Check mark yes](images/svg/check-yes.svg)]
[Use Intune to customize, deploy, and manage configurations](https://docs.microsoft.com/intune/whats-new#window-defender-exploit-guard-is-a-new-set-of-intrusion-prevention-capabilities-for-windows-10----1063615---) | [!include[Check mark no](images/svg/check-no.svg)]
Not available -Reporting | [!include[Check mark yes](images/svg/check-yes.svg)]
With [Windows event logs](event-views-exploit-guard.md) and [full audit mode reporting](audit-windows-defender-exploit-guard.md)
[Full integration with Microsoft Defender Advanced Threat Protection](../windows-defender-atp/security-analytics-dashboard-windows-defender-advanced-threat-protection.md) | [!include[Check mark yes](images/svg/check-yes.svg)]
Limited Windows event log monitoring +Reporting | [!include[Check mark yes](images/svg/check-yes.svg)]
With [Windows event logs](event-views-exploit-guard.md) and [full audit mode reporting](audit-windows-defender-exploit-guard.md)
[Full integration with Microsoft Defender Advanced Threat Protection](../microsoft-defender-atp/security-analytics-dashboard.md) | [!include[Check mark yes](images/svg/check-yes.svg)]
Limited Windows event log monitoring Audit mode | [!include[Check mark yes](images/svg/check-yes.svg)]
[Full audit mode with Windows event reporting](audit-windows-defender-exploit-guard.md) | [!include[Check mark no](images/svg/check-no.svg)]
Limited to EAF, EAF+, and anti-ROP mitigations ([1](#ref1)) Requires an enterprise subscription with Azure Active Directory or a [Software Assurance ID](https://www.microsoft.com/en-us/licensing/licensing-programs/software-assurance-default.aspx). diff --git a/windows/security/threat-protection/windows-defender-exploit-guard/event-views-exploit-guard.md b/windows/security/threat-protection/windows-defender-exploit-guard/event-views-exploit-guard.md index 58ecc61775..13fcbf3167 100644 --- a/windows/security/threat-protection/windows-defender-exploit-guard/event-views-exploit-guard.md +++ b/windows/security/threat-protection/windows-defender-exploit-guard/event-views-exploit-guard.md @@ -27,7 +27,7 @@ Reviewing the events is also handy when you are evaluating the features, as you This topic lists all the events, their associated feature or setting, and describes how to create custom views to filter to specific events. -You can also get detailed reporting into events and blocks as part of Windows Security, which you access if you have an E5 subscription and use [Microsoft Defender Advanced Threat Protection](../windows-defender-atp/windows-defender-advanced-threat-protection.md). +You can also get detailed reporting into events and blocks as part of Windows Security, which you access if you have an E5 subscription and use [Microsoft Defender Advanced Threat Protection](../microsoft-defender-atp/microsoft-defender-advanced-threat-protection.md). ## Use custom views to review attack surface reduction capabilities diff --git a/windows/security/threat-protection/windows-defender-exploit-guard/exploit-protection-exploit-guard.md b/windows/security/threat-protection/windows-defender-exploit-guard/exploit-protection-exploit-guard.md index 2f26612542..fa1dae1039 100644 --- a/windows/security/threat-protection/windows-defender-exploit-guard/exploit-protection-exploit-guard.md +++ b/windows/security/threat-protection/windows-defender-exploit-guard/exploit-protection-exploit-guard.md @@ -27,7 +27,7 @@ It is part of [Windows Defender Exploit Guard](windows-defender-exploit-guard.md >[!TIP] >You can visit the Windows Defender Testground website at [demo.wd.microsoft.com](https://demo.wd.microsoft.com?ocid=cx-wddocs-testground) to confirm the feature is working and see how it works. -Exploit protection works best with [Microsoft Defender Advanced Threat Protection](../windows-defender-atp/windows-defender-advanced-threat-protection.md) - which gives you detailed reporting into exploit protection events and blocks as part of the usual [alert investigation scenarios](../windows-defender-atp/investigate-alerts-windows-defender-advanced-threat-protection.md). +Exploit protection works best with [Microsoft Defender Advanced Threat Protection](../microsoft-defender-atp/microsoft-defender-advanced-threat-protection.md) - which gives you detailed reporting into exploit protection events and blocks as part of the usual [alert investigation scenarios](../microsoft-defender-atp/investigate-alerts.md). You can [enable exploit protection](enable-exploit-protection.md) on an individual machine, and then use [Group Policy](import-export-exploit-protection-emet-xml.md) to distribute the XML file to multiple devices at once. @@ -102,7 +102,7 @@ Configuration with Group Policy | [!include[Check mark yes](images/svg/check-yes Configuration with shell tools | [!include[Check mark yes](images/svg/check-yes.svg)]
[Use PowerShell to customize and manage configurations](customize-exploit-protection.md#powershell-reference) | [!include[Check mark yes](images/svg/check-yes.svg)]
Requires use of EMET tool (EMET_CONF) System Center Configuration Manager | [!include[Check mark yes](images/svg/check-yes.svg)]
[Use Configuration Manager to customize, deploy, and manage configurations](https://docs.microsoft.com/sccm/protect/deploy-use/create-deploy-exploit-guard-policy) | [!include[Check mark no](images/svg/check-no.svg)]
Not available Microsoft Intune | [!include[Check mark yes](images/svg/check-yes.svg)]
[Use Intune to customize, deploy, and manage configurations](https://docs.microsoft.com/intune/whats-new#window-defender-exploit-guard-is-a-new-set-of-intrusion-prevention-capabilities-for-windows-10----1063615---) | [!include[Check mark no](images/svg/check-no.svg)]
Not available -Reporting | [!include[Check mark yes](images/svg/check-yes.svg)]
With [Windows event logs](event-views-exploit-guard.md) and [full audit mode reporting](audit-windows-defender-exploit-guard.md)
[Full integration with Microsoft Defender Advanced Threat Protection](../windows-defender-atp/security-analytics-dashboard-windows-defender-advanced-threat-protection.md) | [!include[Check mark yes](images/svg/check-yes.svg)]
Limited Windows event log monitoring +Reporting | [!include[Check mark yes](images/svg/check-yes.svg)]
With [Windows event logs](event-views-exploit-guard.md) and [full audit mode reporting](audit-windows-defender-exploit-guard.md)
[Full integration with Microsoft Defender Advanced Threat Protection](../microsoft-defender-atp/security-analytics-dashboard.md) | [!include[Check mark yes](images/svg/check-yes.svg)]
Limited Windows event log monitoring Audit mode | [!include[Check mark yes](images/svg/check-yes.svg)]
[Full audit mode with Windows event reporting](audit-windows-defender-exploit-guard.md) | [!include[Check mark no](images/svg/check-no.svg)]
Limited to EAF, EAF+, and anti-ROP mitigations ([1](#ref1)) Requires an enterprise subscription with Azure Active Directory or a [Software Assurance ID](https://www.microsoft.com/en-us/licensing/licensing-programs/software-assurance-default.aspx). diff --git a/windows/security/threat-protection/windows-defender-exploit-guard/network-protection-exploit-guard.md b/windows/security/threat-protection/windows-defender-exploit-guard/network-protection-exploit-guard.md index e65dcc4777..d259d88575 100644 --- a/windows/security/threat-protection/windows-defender-exploit-guard/network-protection-exploit-guard.md +++ b/windows/security/threat-protection/windows-defender-exploit-guard/network-protection-exploit-guard.md @@ -29,7 +29,7 @@ Network protection is supported on Windows 10, version 1709 and later and Window >[!TIP] >You can visit the Windows Defender Testground website at [demo.wd.microsoft.com](https://demo.wd.microsoft.com?ocid=cx-wddocs-testground) to confirm the feature is working and see how it works. -Network protection works best with [Microsoft Defender Advanced Threat Protection](../windows-defender-atp/windows-defender-advanced-threat-protection.md), which gives you detailed reporting into Windows Defender EG events and blocks as part of the usual [alert investigation scenarios](../windows-defender-atp/investigate-alerts-windows-defender-advanced-threat-protection.md). +Network protection works best with [Microsoft Defender Advanced Threat Protection](../microsoft-defender-atp/microsoft-defender-advanced-threat-protection.md), which gives you detailed reporting into Windows Defender EG events and blocks as part of the usual [alert investigation scenarios](../microsoft-defender-atp/investigate-alerts.md). When network protection blocks a connection, a notification will be displayed from the Action Center. You can [customize the notification](customize-attack-surface-reduction.md#customize-the-notification) with your company details and contact information. You can also enable the rules individually to customize what techniques the feature monitors. @@ -45,9 +45,9 @@ Windows 10 version 1709 or later | [Windows Defender AV real-time protection](.. ## Review network protection events in the Microsoft Defender ATP Security Center -Microsoft Defender ATP provides detailed reporting into events and blocks as part of its [alert investigation scenarios](../windows-defender-atp/investigate-alerts-windows-defender-advanced-threat-protection.md). +Microsoft Defender ATP provides detailed reporting into events and blocks as part of its [alert investigation scenarios](../microsoft-defender-atp/investigate-alerts.md). -You can query Microsoft Defender ATP data by using [Advanced hunting](https://docs.microsoft.com/en-us/windows/security/threat-protection/windows-defender-atp/advanced-hunting-windows-defender-advanced-threat-protection). If you're using [audit mode](audit-windows-defender-exploit-guard.md), you can use Advanced hunting to see how network protection settings would affect your environment if they were enabled. +You can query Microsoft Defender ATP data by using [Advanced hunting](https://docs.microsoft.com/en-us/windows/security/threat-protection/microsoft-defender-atp/advanced-hunting-windows-defender-advanced-threat-protection). If you're using [audit mode](audit-windows-defender-exploit-guard.md), you can use Advanced hunting to see how network protection settings would affect your environment if they were enabled. ## Review network protection events in Windows Event Viewer diff --git a/windows/security/threat-protection/windows-defender-exploit-guard/troubleshoot-asr.md b/windows/security/threat-protection/windows-defender-exploit-guard/troubleshoot-asr.md index d1f516eacc..0ffe534d26 100644 --- a/windows/security/threat-protection/windows-defender-exploit-guard/troubleshoot-asr.md +++ b/windows/security/threat-protection/windows-defender-exploit-guard/troubleshoot-asr.md @@ -76,7 +76,7 @@ To add an exclusion, see [Customize Attack surface reduction](customize-attack-s ## Report a false positive or false negative -Use the [Windows Defender Security Intelligence web-based submission form](https://www.microsoft.com/en-us/wdsi/filesubmission) to report a false negative or false positive for network protection. With an E5 subscription, you can also [provide a link to any associated alert](../windows-defender-atp/alerts-queue-windows-defender-advanced-threat-protection.md). +Use the [Windows Defender Security Intelligence web-based submission form](https://www.microsoft.com/en-us/wdsi/filesubmission) to report a false negative or false positive for network protection. With an E5 subscription, you can also [provide a link to any associated alert](../microsoft-defender-atp/alerts-queue.md). ## Collect diagnostic data for file submissions diff --git a/windows/security/threat-protection/windows-defender-exploit-guard/troubleshoot-np.md b/windows/security/threat-protection/windows-defender-exploit-guard/troubleshoot-np.md index 40c261016a..3feaedade3 100644 --- a/windows/security/threat-protection/windows-defender-exploit-guard/troubleshoot-np.md +++ b/windows/security/threat-protection/windows-defender-exploit-guard/troubleshoot-np.md @@ -65,7 +65,7 @@ Set-MpPreference -EnableNetworkProtection Enabled ## Report a false positive or false negative -If you've tested the feature with the demo site and with audit mode, and network protection is working on pre-configured scenarios, but is not working as expected for a specific connection, use the [Windows Defender Security Intelligence web-based submission form](https://www.microsoft.com/en-us/wdsi/filesubmission) to report a false negative or false positive for network protection. With an E5 subscription, you can also [provide a link to any associated alert](../windows-defender-atp/alerts-queue-windows-defender-advanced-threat-protection.md). +If you've tested the feature with the demo site and with audit mode, and network protection is working on pre-configured scenarios, but is not working as expected for a specific connection, use the [Windows Defender Security Intelligence web-based submission form](https://www.microsoft.com/en-us/wdsi/filesubmission) to report a false negative or false positive for network protection. With an E5 subscription, you can also [provide a link to any associated alert](../microsoft-defender-atp/alerts-queue.md). ## Collect diagnostic data for file submissions diff --git a/windows/security/threat-protection/windows-defender-exploit-guard/windows-defender-exploit-guard.md b/windows/security/threat-protection/windows-defender-exploit-guard/windows-defender-exploit-guard.md index cd2b47c9fe..b6733d5ed0 100644 --- a/windows/security/threat-protection/windows-defender-exploit-guard/windows-defender-exploit-guard.md +++ b/windows/security/threat-protection/windows-defender-exploit-guard/windows-defender-exploit-guard.md @@ -45,7 +45,7 @@ You can also [enable audit mode](audit-windows-defender-exploit-guard.md) for th Windows Defender EG can be managed and reported on in the Windows Security app as part of the Microsoft Defender Advanced Threat Protection suite of threat mitigation, preventing, protection, and analysis technologies. -You can use the Windows Security app to obtain detailed reporting into events and blocks as part of the usual [alert investigation scenarios](../windows-defender-atp/investigate-alerts-windows-defender-advanced-threat-protection.md). You can [sign up for a free trial of Microsoft Defender ATP](https://www.microsoft.com/en-us/WindowsForBusiness/windows-atp?ocid=cx-docs-msa4053440) to see how it works. +You can use the Windows Security app to obtain detailed reporting into events and blocks as part of the usual [alert investigation scenarios](../microsoft-defender-atp/investigate-alerts.md). You can [sign up for a free trial of Microsoft Defender ATP](https://www.microsoft.com/en-us/WindowsForBusiness/windows-atp?ocid=cx-docs-msa4053440) to see how it works. ## Requirements From ffc85728257c22cf40a7f359dae996d36ad89077 Mon Sep 17 00:00:00 2001 From: Joey Caparas Date: Wed, 10 Apr 2019 16:28:44 -0700 Subject: [PATCH 164/724] remove link --- .../microsoft-defender-atp/threat-analytics.md | 3 --- 1 file changed, 3 deletions(-) diff --git a/windows/security/threat-protection/microsoft-defender-atp/threat-analytics.md b/windows/security/threat-protection/microsoft-defender-atp/threat-analytics.md index c4b5ae9d96..91fc9e3b31 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/threat-analytics.md +++ b/windows/security/threat-protection/microsoft-defender-atp/threat-analytics.md @@ -64,6 +64,3 @@ The **Mitigation status** and **Mitigation status over time** shows the endpoint >The Unavailable category indicates that there is no data available from the specific machine yet. -## Related topics -- [Threat analytics for Spectre and Meltdown](threat-analytics.md) - From 02863694656b97cc750a4fb11e16feb4ba1d17d4 Mon Sep 17 00:00:00 2001 From: Joey Caparas Date: Wed, 10 Apr 2019 16:31:06 -0700 Subject: [PATCH 165/724] update toc typo file --- windows/security/threat-protection/TOC.md | 6 +++--- .../threat-protection/microsoft-defender-atp/TOC.md | 2 +- 2 files changed, 4 insertions(+), 4 deletions(-) diff --git a/windows/security/threat-protection/TOC.md b/windows/security/threat-protection/TOC.md index caca71920d..749db9c96b 100644 --- a/windows/security/threat-protection/TOC.md +++ b/windows/security/threat-protection/TOC.md @@ -403,9 +403,9 @@ ### [Troubleshoot Windows Defender ATP](microsoft-defender-atp/troubleshoot-overview.md) ####Troubleshoot sensor state ##### [Check sensor state](microsoft-defender-atp/check-sensor-status.md) -##### [Fix unhealthy sensors](microsoft-defender-atp/fix-unhealhty-sensors.md) -##### [Inactive machines](microsoft-defender-atp/fix-unhealhty-sensors.md#inactive-machines) -##### [Misconfigured machines](microsoft-defender-atp/fix-unhealhty-sensors.md#misconfigured-machines) +##### [Fix unhealthy sensors](microsoft-defender-atp/fix-unhealthy-sensors.md) +##### [Inactive machines](microsoft-defender-atp/fix-unhealthy-sensors.md#inactive-machines) +##### [Misconfigured machines](microsoft-defender-atp/fix-unhealthy-sensors.md#misconfigured-machines) ##### [Review sensor events and errors on machines with Event Viewer](microsoft-defender-atp/event-error-codes.md) #### [Troubleshoot Windows Defender ATP service issues](microsoft-defender-atp/troubleshoot.md) diff --git a/windows/security/threat-protection/microsoft-defender-atp/TOC.md b/windows/security/threat-protection/microsoft-defender-atp/TOC.md index 0a5682ebc9..69977fe4cc 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/TOC.md +++ b/windows/security/threat-protection/microsoft-defender-atp/TOC.md @@ -397,7 +397,7 @@ #### [Misconfigured machines](fix-unhealthy-sensors.md#misconfigured-machines) #### [Review sensor events and errors on machines with Event Viewer](event-error-codes.md) -### [Troubleshoot Microsoft Defender ATP service issues](troubleshoot.md) +### [Troubleshoot Microsoft Defender ATP service issues](troubleshoot-mdatp.md) #### [Check service health](service-status.md) ###Troubleshoot attack surface reduction From f3a2c4e16b5d54a8e78451fee9430e538ad811df Mon Sep 17 00:00:00 2001 From: Joey Caparas Date: Wed, 10 Apr 2019 16:37:44 -0700 Subject: [PATCH 166/724] fix troubleshoot file name --- windows/security/threat-protection/TOC.md | 2 +- .../microsoft-defender-atp/troubleshoot-onboarding.md | 2 +- .../microsoft-defender-atp/windows-defender-security-center.md | 2 +- 3 files changed, 3 insertions(+), 3 deletions(-) diff --git a/windows/security/threat-protection/TOC.md b/windows/security/threat-protection/TOC.md index 749db9c96b..29c713479e 100644 --- a/windows/security/threat-protection/TOC.md +++ b/windows/security/threat-protection/TOC.md @@ -408,7 +408,7 @@ ##### [Misconfigured machines](microsoft-defender-atp/fix-unhealthy-sensors.md#misconfigured-machines) ##### [Review sensor events and errors on machines with Event Viewer](microsoft-defender-atp/event-error-codes.md) -#### [Troubleshoot Windows Defender ATP service issues](microsoft-defender-atp/troubleshoot.md) +#### [Troubleshoot Windows Defender ATP service issues](microsoft-defender-atp/troubleshoot-mdatp.md) ##### [Check service health](microsoft-defender-atp/service-status.md) ####Troubleshoot attack surface reduction diff --git a/windows/security/threat-protection/microsoft-defender-atp/troubleshoot-onboarding.md b/windows/security/threat-protection/microsoft-defender-atp/troubleshoot-onboarding.md index 69c3b620ca..36fe7db04c 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/troubleshoot-onboarding.md +++ b/windows/security/threat-protection/microsoft-defender-atp/troubleshoot-onboarding.md @@ -306,7 +306,7 @@ For more information, see [Windows 10 Licensing](https://www.microsoft.com/en-us ## Related topics -- [Troubleshoot Microsoft Defender ATP](troubleshoot.md) +- [Troubleshoot Microsoft Defender ATP](troubleshoot-mdatp.md) - [Onboard machines](onboard-configure.md) - [Configure machine proxy and Internet connectivity settings](configure-proxy-internet.md) diff --git a/windows/security/threat-protection/microsoft-defender-atp/windows-defender-security-center.md b/windows/security/threat-protection/microsoft-defender-atp/windows-defender-security-center.md index 7c7ef2d01e..b0ce4f4679 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/windows-defender-security-center.md +++ b/windows/security/threat-protection/microsoft-defender-atp/windows-defender-security-center.md @@ -34,5 +34,5 @@ Reporting | Create and build Power BI reports using Microsoft Defender ATP data. Check service health and sensor state | Verify that the service is running and check the sensor state on machines. [Configure Microsoft Defender Security Center settings](preferences-setup.md) | Configure general settings, turn on the preview experience, notifications, and enable other features. [Access the Microsoft Defender ATP Community Center](community.md) | Access the Microsoft Defender ATP Community Center to learn, collaborate, and share experiences about the product. -[Troubleshoot service issues](troubleshoot.md) | This section addresses issues that might arise as you use the Windows Defender Advanced Threat service. +[Troubleshoot service issues](troubleshoot-mdatp.md) | This section addresses issues that might arise as you use the Windows Defender Advanced Threat service. From cfea3c446cfa77fccf6bfa38229a471a713f53d9 Mon Sep 17 00:00:00 2001 From: Joey Caparas Date: Wed, 10 Apr 2019 16:58:57 -0700 Subject: [PATCH 167/724] fix warnings --- ...security-center.md => microsoft-defender-security-center.md} | 0 .../windows-defender-security-center-antivirus.md | 2 +- .../emet-exploit-protection-exploit-guard.md | 2 +- .../exploit-protection-exploit-guard.md | 2 +- 4 files changed, 3 insertions(+), 3 deletions(-) rename windows/security/threat-protection/microsoft-defender-atp/{windows-defender-security-center.md => microsoft-defender-security-center.md} (100%) diff --git a/windows/security/threat-protection/microsoft-defender-atp/windows-defender-security-center.md b/windows/security/threat-protection/microsoft-defender-atp/microsoft-defender-security-center.md similarity index 100% rename from windows/security/threat-protection/microsoft-defender-atp/windows-defender-security-center.md rename to windows/security/threat-protection/microsoft-defender-atp/microsoft-defender-security-center.md diff --git a/windows/security/threat-protection/windows-defender-antivirus/windows-defender-security-center-antivirus.md b/windows/security/threat-protection/windows-defender-antivirus/windows-defender-security-center-antivirus.md index 739439af03..b8b4f4cb60 100644 --- a/windows/security/threat-protection/windows-defender-antivirus/windows-defender-security-center-antivirus.md +++ b/windows/security/threat-protection/windows-defender-antivirus/windows-defender-security-center-antivirus.md @@ -36,7 +36,7 @@ Settings that were previously part of the Windows Defender client and main Windo See the [Windows Security topic](/windows/threat-protection/windows-defender-security-center/windows-defender-security-center) for more information on other Windows security features that can be monitored in the app. >[!NOTE] ->The Windows Security app is a client interface on Windows 10, version 1703 and later. It is not the Microsoft Defender Security Center web portal that is used to review and manage [Microsoft Defender Advanced Threat Protection](../windows-defender-atp/windows-defender-advanced-threat-protection.md). +>The Windows Security app is a client interface on Windows 10, version 1703 and later. It is not the Microsoft Defender Security Center web portal that is used to review and manage [Microsoft Defender Advanced Threat Protection](../microsoft-defender-atp/microsoft-defender-advanced-threat-protection.md). **Review virus and threat protection settings in the Windows Security app:** diff --git a/windows/security/threat-protection/windows-defender-exploit-guard/emet-exploit-protection-exploit-guard.md b/windows/security/threat-protection/windows-defender-exploit-guard/emet-exploit-protection-exploit-guard.md index 5a5dc12514..013ea04010 100644 --- a/windows/security/threat-protection/windows-defender-exploit-guard/emet-exploit-protection-exploit-guard.md +++ b/windows/security/threat-protection/windows-defender-exploit-guard/emet-exploit-protection-exploit-guard.md @@ -59,7 +59,7 @@ Configuration with Group Policy | [!include[Check mark yes](images/svg/check-yes Configuration with shell tools | [!include[Check mark yes](images/svg/check-yes.svg)]
[Use PowerShell to customize and manage configurations](customize-exploit-protection.md#powershell-reference) | [!include[Check mark yes](images/svg/check-yes.svg)]
Requires use of EMET tool (EMET_CONF) System Center Configuration Manager | [!include[Check mark yes](images/svg/check-yes.svg)]
[Use Configuration Manager to customize, deploy, and manage configurations](https://docs.microsoft.com/sccm/protect/deploy-use/create-deploy-exploit-guard-policy) | [!include[Check mark no](images/svg/check-no.svg)]
Not available Microsoft Intune | [!include[Check mark yes](images/svg/check-yes.svg)]
[Use Intune to customize, deploy, and manage configurations](https://docs.microsoft.com/intune/whats-new#window-defender-exploit-guard-is-a-new-set-of-intrusion-prevention-capabilities-for-windows-10----1063615---) | [!include[Check mark no](images/svg/check-no.svg)]
Not available -Reporting | [!include[Check mark yes](images/svg/check-yes.svg)]
With [Windows event logs](event-views-exploit-guard.md) and [full audit mode reporting](audit-windows-defender-exploit-guard.md)
[Full integration with Microsoft Defender Advanced Threat Protection](../microsoft-defender-atp/security-analytics-dashboard.md) | [!include[Check mark yes](images/svg/check-yes.svg)]
Limited Windows event log monitoring +Reporting | [!include[Check mark yes](images/svg/check-yes.svg)]
With [Windows event logs](event-views-exploit-guard.md) and [full audit mode reporting](audit-windows-defender-exploit-guard.md)
[Full integration with Microsoft Defender Advanced Threat Protection](../microsoft-defender-atp/secure-score-dashboard.md) | [!include[Check mark yes](images/svg/check-yes.svg)]
Limited Windows event log monitoring Audit mode | [!include[Check mark yes](images/svg/check-yes.svg)]
[Full audit mode with Windows event reporting](audit-windows-defender-exploit-guard.md) | [!include[Check mark no](images/svg/check-no.svg)]
Limited to EAF, EAF+, and anti-ROP mitigations ([1](#ref1)) Requires an enterprise subscription with Azure Active Directory or a [Software Assurance ID](https://www.microsoft.com/en-us/licensing/licensing-programs/software-assurance-default.aspx). diff --git a/windows/security/threat-protection/windows-defender-exploit-guard/exploit-protection-exploit-guard.md b/windows/security/threat-protection/windows-defender-exploit-guard/exploit-protection-exploit-guard.md index fa1dae1039..f00aadcdbf 100644 --- a/windows/security/threat-protection/windows-defender-exploit-guard/exploit-protection-exploit-guard.md +++ b/windows/security/threat-protection/windows-defender-exploit-guard/exploit-protection-exploit-guard.md @@ -102,7 +102,7 @@ Configuration with Group Policy | [!include[Check mark yes](images/svg/check-yes Configuration with shell tools | [!include[Check mark yes](images/svg/check-yes.svg)]
[Use PowerShell to customize and manage configurations](customize-exploit-protection.md#powershell-reference) | [!include[Check mark yes](images/svg/check-yes.svg)]
Requires use of EMET tool (EMET_CONF) System Center Configuration Manager | [!include[Check mark yes](images/svg/check-yes.svg)]
[Use Configuration Manager to customize, deploy, and manage configurations](https://docs.microsoft.com/sccm/protect/deploy-use/create-deploy-exploit-guard-policy) | [!include[Check mark no](images/svg/check-no.svg)]
Not available Microsoft Intune | [!include[Check mark yes](images/svg/check-yes.svg)]
[Use Intune to customize, deploy, and manage configurations](https://docs.microsoft.com/intune/whats-new#window-defender-exploit-guard-is-a-new-set-of-intrusion-prevention-capabilities-for-windows-10----1063615---) | [!include[Check mark no](images/svg/check-no.svg)]
Not available -Reporting | [!include[Check mark yes](images/svg/check-yes.svg)]
With [Windows event logs](event-views-exploit-guard.md) and [full audit mode reporting](audit-windows-defender-exploit-guard.md)
[Full integration with Microsoft Defender Advanced Threat Protection](../microsoft-defender-atp/security-analytics-dashboard.md) | [!include[Check mark yes](images/svg/check-yes.svg)]
Limited Windows event log monitoring +Reporting | [!include[Check mark yes](images/svg/check-yes.svg)]
With [Windows event logs](event-views-exploit-guard.md) and [full audit mode reporting](audit-windows-defender-exploit-guard.md)
[Full integration with Microsoft Defender Advanced Threat Protection](../microsoft-defender-atp/secure-score-dashboard.md) | [!include[Check mark yes](images/svg/check-yes.svg)]
Limited Windows event log monitoring Audit mode | [!include[Check mark yes](images/svg/check-yes.svg)]
[Full audit mode with Windows event reporting](audit-windows-defender-exploit-guard.md) | [!include[Check mark no](images/svg/check-no.svg)]
Limited to EAF, EAF+, and anti-ROP mitigations ([1](#ref1)) Requires an enterprise subscription with Azure Active Directory or a [Software Assurance ID](https://www.microsoft.com/en-us/licensing/licensing-programs/software-assurance-default.aspx). From f041fcb7884a55fc53e0c73f1a1259a1b7d90754 Mon Sep 17 00:00:00 2001 From: Joey Caparas Date: Wed, 10 Apr 2019 17:08:01 -0700 Subject: [PATCH 168/724] remove link --- .../microsoft-defender-atp/overview-secure-score.md | 2 +- .../security/threat-protection/microsoft-defender-atp/use.md | 2 +- 2 files changed, 2 insertions(+), 2 deletions(-) diff --git a/windows/security/threat-protection/microsoft-defender-atp/overview-secure-score.md b/windows/security/threat-protection/microsoft-defender-atp/overview-secure-score.md index 7aad2ad004..dd41c155c3 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/overview-secure-score.md +++ b/windows/security/threat-protection/microsoft-defender-atp/overview-secure-score.md @@ -79,4 +79,4 @@ Clicking the link under the Misconfigured machines column opens up the **Machine ## Related topic - [Threat analytics](threat-analytics.md) -- [Threat analytics for Spectre and Meltdown](threat-analytics.md) + diff --git a/windows/security/threat-protection/microsoft-defender-atp/use.md b/windows/security/threat-protection/microsoft-defender-atp/use.md index 501f6f9019..1220885f55 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/use.md +++ b/windows/security/threat-protection/microsoft-defender-atp/use.md @@ -42,6 +42,6 @@ Topic | Description [Portal overview](portal-overview.md) | Understand the portal layout and area descriptions. [View the Security operations dashboard](security-operations-dashboard.md) | The Microsoft Defender ATP **Security operations dashboard** provides a snapshot of your network. You can view aggregates of alerts, the overall status of the service of the machines on your network, investigate machines, files, and URLs, and see snapshots of threats seen on machines. [View the Secure Score dashboard and improve your secure score](secure-score-dashboard.md) | The **Secure Score dashboard** expands your visibility into the overall security posture of your organization. From this dashboard, you'll be able to quickly assess the security posture of your organization, see machines that require attention, as well as recommendations for actions to further reduce the attack surface in your organization - all in one place. -[View the Threat analytics dashboard and take recommended mitigation actions](threat-analytics.md) | The **Threat analytics** dashboard helps you continually assess and control risk exposure to Spectre and Meltdown. Use the charts to quickly identify machines for the presence or absence of mitigations. +[View the Threat analytics dashboard and take recommended mitigation actions](threat-analytics.md) | The **Threat analytics** dashboard helps you continually assess and control risk exposure to threats. Use the charts to quickly identify machines for the presence or absence of mitigations. From 1e1cdb1790be67543d928e81af2fa1220d148d82 Mon Sep 17 00:00:00 2001 From: Brian Lich Date: Thu, 11 Apr 2019 08:13:38 -0700 Subject: [PATCH 169/724] new build 4/11/2019 8:13 AM --- ...basic-level-windows-diagnostic-events-and-fields-1903.md | 6 +++++- 1 file changed, 5 insertions(+), 1 deletion(-) diff --git a/windows/privacy/basic-level-windows-diagnostic-events-and-fields-1903.md b/windows/privacy/basic-level-windows-diagnostic-events-and-fields-1903.md index bd6c4e2161..7cc546dd61 100644 --- a/windows/privacy/basic-level-windows-diagnostic-events-and-fields-1903.md +++ b/windows/privacy/basic-level-windows-diagnostic-events-and-fields-1903.md @@ -13,7 +13,7 @@ manager: dansimp ms.collection: M365-security-compliance ms.topic: article audience: ITPro -ms.date: 04/10/2019 +ms.date: 04/11/2019 --- @@ -3336,6 +3336,8 @@ The following fields are available: - **COMPID** The device setup class guid of the driver loaded for the device. - **ContainerId** The list of compat ids for the device. - **Description** System-supplied GUID that uniquely groups the functional devices associated with a single-function or multifunction device installed in the computer. +- **DeviceDriverFlightId** The test build (Flight) identifier of the device driver. +- **DeviceExtDriversFlightIds** The test build (Flight) identifier for all extended device drivers. - **DeviceInterfaceClasses** The device interfaces that this device implements. - **DeviceState** The device description. - **DriverId** DeviceState is a bitmask of the following: DEVICE_IS_CONNECTED 0x0001 (currently only for container). DEVICE_IS_NETWORK_DEVICE 0x0002 (currently only for container). DEVICE_IS_PAIRED 0x0004 (currently only for container). DEVICE_IS_ACTIVE 0x0008 (currently never set). DEVICE_IS_MACHINE 0x0010 (currently only for container). DEVICE_IS_PRESENT 0x0020 (currently always set). DEVICE_IS_HIDDEN 0x0040. DEVICE_IS_PRINTER 0x0080 (currently only for container). DEVICE_IS_WIRELESS 0x0100. DEVICE_IS_WIRELESS_FAT 0x0200. The most common values are therefore: 32 (0x20)= device is present. 96 (0x60)= device is present but hidden. 288 (0x120)= device is a wireless device that is present @@ -3345,8 +3347,10 @@ The following fields are available: - **DriverVerVersion** The immediate parent directory name in the Directory field of InventoryDriverPackage. - **Enumerator** The date of the driver loaded for the device. - **ExtendedInfs** The extended INF file names. +- **FirstInstallDate** The first time this device was installed on the machine. - **HWID** The version of the driver loaded for the device. - **Inf** The bus that enumerated the device. +- **InstallDate** The date of the most recent installation of the device on the machine. - **InstallState** The device installation state. One of these values: https://msdn.microsoft.com/en-us/library/windows/hardware/ff543130.aspx - **InventoryVersion** List of hardware ids for the device. - **LowerClassFilters** Lower filter class drivers IDs installed for the device From 5aa38071f3fe3e488d9ee670a4474ac3f3c9689e Mon Sep 17 00:00:00 2001 From: Brian Lich Date: Thu, 11 Apr 2019 08:13:47 -0700 Subject: [PATCH 170/724] new build 4/11/2019 8:13 AM --- ...ndows-diagnostic-events-and-fields-1703.md | 4 +- ...ndows-diagnostic-events-and-fields-1709.md | 4 +- ...ndows-diagnostic-events-and-fields-1803.md | 4 +- ...ndows-diagnostic-events-and-fields-1809.md | 456 +++++++++++++----- 4 files changed, 334 insertions(+), 134 deletions(-) diff --git a/windows/privacy/basic-level-windows-diagnostic-events-and-fields-1703.md b/windows/privacy/basic-level-windows-diagnostic-events-and-fields-1703.md index cc4a260492..bf54d09ae5 100644 --- a/windows/privacy/basic-level-windows-diagnostic-events-and-fields-1703.md +++ b/windows/privacy/basic-level-windows-diagnostic-events-and-fields-1703.md @@ -13,7 +13,7 @@ manager: dansimp ms.collection: M365-security-compliance ms.topic: article audience: ITPro -ms.date: 04/10/2019 +ms.date: 04/11/2019 --- @@ -3075,7 +3075,7 @@ The following fields are available: - **CV** The Correlation Vector. - **DateTimeDifference** The difference between the local and reference clocks. - **DaysSinceOsInstallation** The number of days since the installation of the Operating System. -- **DiskMbCleaned** The amount of space cleaned on the hard disk, measured in Megabytes. +- **DiskMbCleaned** The amount of space cleaned on the hard disk, measured in megabytes. - **DiskMbFreeAfterCleanup** The amount of free hard disk space after cleanup, measured in Megabytes. - **DiskMbFreeBeforeCleanup** The amount of free hard disk space before cleanup, measured in Megabytes. - **ForcedAppraiserTaskTriggered** TRUE if Appraiser task ran from the plug-in. diff --git a/windows/privacy/basic-level-windows-diagnostic-events-and-fields-1709.md b/windows/privacy/basic-level-windows-diagnostic-events-and-fields-1709.md index aef6875c51..e82222b6ab 100644 --- a/windows/privacy/basic-level-windows-diagnostic-events-and-fields-1709.md +++ b/windows/privacy/basic-level-windows-diagnostic-events-and-fields-1709.md @@ -13,7 +13,7 @@ manager: dansimp ms.collection: M365-security-compliance ms.topic: article audience: ITPro -ms.date: 04/10/2019 +ms.date: 04/11/2019 --- @@ -3284,7 +3284,7 @@ The following fields are available: - **CV** The Correlation Vector. - **DateTimeDifference** The difference between the local and reference clocks. - **DaysSinceOsInstallation** The number of days since the installation of the Operating System. -- **DiskMbCleaned** The amount of space cleaned on the hard disk, measured in Megabytes. +- **DiskMbCleaned** The amount of space cleaned on the hard disk, measured in megabytes. - **DiskMbFreeAfterCleanup** The amount of free hard disk space after cleanup, measured in Megabytes. - **DiskMbFreeBeforeCleanup** The amount of free hard disk space before cleanup, measured in Megabytes. - **ForcedAppraiserTaskTriggered** TRUE if Appraiser task ran from the plug-in. diff --git a/windows/privacy/basic-level-windows-diagnostic-events-and-fields-1803.md b/windows/privacy/basic-level-windows-diagnostic-events-and-fields-1803.md index 1b2f1c8932..5339268f09 100644 --- a/windows/privacy/basic-level-windows-diagnostic-events-and-fields-1803.md +++ b/windows/privacy/basic-level-windows-diagnostic-events-and-fields-1803.md @@ -13,7 +13,7 @@ manager: dansimp ms.collection: M365-security-compliance ms.topic: article audience: ITPro -ms.date: 04/10/2019 +ms.date: 04/11/2019 --- @@ -4386,7 +4386,7 @@ The following fields are available: - **CV** The Correlation Vector. - **DateTimeDifference** The difference between the local and reference clocks. - **DaysSinceOsInstallation** The number of days since the installation of the Operating System. -- **DiskMbCleaned** The amount of space cleaned on the hard disk, measured in Megabytes. +- **DiskMbCleaned** The amount of space cleaned on the hard disk, measured in megabytes. - **DiskMbFreeAfterCleanup** The amount of free hard disk space after cleanup, measured in Megabytes. - **DiskMbFreeBeforeCleanup** The amount of free hard disk space before cleanup, measured in Megabytes. - **ForcedAppraiserTaskTriggered** TRUE if Appraiser task ran from the plug-in. diff --git a/windows/privacy/basic-level-windows-diagnostic-events-and-fields-1809.md b/windows/privacy/basic-level-windows-diagnostic-events-and-fields-1809.md index a5e90b5538..9c1f8ed87b 100644 --- a/windows/privacy/basic-level-windows-diagnostic-events-and-fields-1809.md +++ b/windows/privacy/basic-level-windows-diagnostic-events-and-fields-1809.md @@ -13,7 +13,7 @@ manager: dansimp ms.collection: M365-security-compliance ms.topic: article audience: ITPro -ms.date: 04/10/2019 +ms.date: 04/11/2019 --- @@ -550,10 +550,12 @@ The following fields are available: - **AppraiserVersion** The version of the appraiser file that is generating the events. - **AvDisplayName** If the app is an anti-virus app, this is its display name. +- **CompateClasIndex** No content is currently available. - **CompatModelIndex** The compatibility prediction for this file. - **HasCitData** Indicates whether the file is present in CIT data. - **HasUpgradeExe** Indicates whether the anti-virus app has an upgrade.exe file. - **IsAv** Is the file an anti-virus reporting EXE? +- **ResolveAd85mpted** No content is currently available. - **ResolveAttempted** This will always be an empty string when sending telemetry. - **SdbEntries** An array of fields that indicates the SDB entries that apply to this file. @@ -589,6 +591,7 @@ This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedevic The following fields are available: - **ActiveNetworkConnection** Indicates whether the device is an active network device. +- **ActiveNetworkCoompction** No content is currently available. - **AppraiserVersion** The version of the appraiser file generating the events. - **CosDeviceRating** An enumeration that indicates if there is a driver on the target operating system. - **CosDeviceSolution** An enumeration that indicates how a driver on the target operating system is available. @@ -2005,6 +2008,7 @@ The following fields are available: - **ServiceMachineIP** Retrieves the IP address of the KMS host used for anti-piracy. - **ServiceMachinePort** Retrieves the port of the KMS host used for anti-piracy. - **ServiceProductKeyID** Retrieves the License key of the KMS +- **SharedpCMode** No content is currently available. - **SharedPCMode** Returns Boolean for education devices used as shared cart - **Signature** Retrieves if it is a signature machine sold by Microsoft store. - **SLICStatus** Whether a SLIC table exists on the device. @@ -2049,6 +2053,7 @@ The following fields are available: - **Sms** Current state of the text messaging setting. - **SpeechPersonalization** Current state of the speech services setting. - **USB** Current state of the USB setting. +- **UserAccotntInformation** No content is currently available. - **UserAccountInformation** Current state of the account information setting. - **UserDataTasks** Current state of the tasks setting. - **UserNotificationListener** Current state of the notifications setting. @@ -2456,8 +2461,10 @@ Describes the installation state for all hardware and software components availa The following fields are available: +- **** No content is currently available. - **action** The change that was invoked on a device inventory object. - **inventoryId** Device ID used for Compatibility testing +- **objectIn** No content is currently available. - **objectInstanceId** Object identity which is unique within the device scope. - **objectType** Indicates the object type that the event applies to. - **syncId** A string used to group StartSync, EndSync, Add, and Remove operations that belong together. This field is unique by Sync period and is used to disambiguate in situations where multiple agents perform overlapping inventories for the same object. @@ -2507,6 +2514,7 @@ This event provides information about the results of installing or uninstalling The following fields are available: +- **`ighestState** No content is currently available. - **capabilities** The names of the optional content packages that were installed. - **clientId** The name of the application requesting the optional content. - **currentID** The ID of the current install session. @@ -2725,6 +2733,7 @@ The following fields are available: - **CanCollectOsTelemetry** True if we can collect diagnostic data telemetry, false otherwise. - **CanCollectWindowsAnalyticsEvents** True if we can collect Windows Analytics data, false otherwise. - **CanPerformDiagnosticEscalations** True if we can perform diagnostic escalation collection, false otherwise. +- **CanPerformDyagnosticEscalations** No content is currently available. - **CanPerformTraceEscalations** True if we can perform trace escalation collection, false otherwise. - **CanReportScenarios** True if we can report scenario completions, false otherwise. - **PreviousPermissions** Bitmask of previous telemetry state. @@ -2737,7 +2746,9 @@ This event sends data about the connectivity status of the Connected User Experi The following fields are available: +- **CensõsTaskEnabled** No content is currently available. - **CensusExitCode** Returns last execution codes from census client run. +- **CensusExitCodeoaderCensusStartTime** No content is currently available. - **CensusStartTime** Returns timestamp corresponding to last successful census run. - **CensusTaskEnabled** Returns Boolean value for the census task (Enable/Disable) on client machine. - **LastConnectivityLossTime** Retrieves the last time the device lost free network. @@ -2752,13 +2763,18 @@ This event sends data about the health and quality of the diagnostic data from t The following fields are available: +- **ꭤ↑롥戅ꔠ촉꤆䳨㢳桜ꀽ㴂颭ྞ䚿ꆁ억ﱎ콧ꓘ먗** No content is currently available. +- **AgentConneCouonErrorsCount** No content is currently available. - **AgentConnectionErrorsCount** Number of non-timeout errors associated with the host/agent channel. +- **CensõsTaskEnabled** No content is currently available. - **CensusExitCode** The last exit code of the Census task. - **CensusStartTime** Time of last Census run. - **CensusTaskEnabled** True if Census is enabled, false otherwise. - **CompressedBytesUploaded** Number of compressed bytes uploaded. +- **ConsumerDrop0edCount** No content is currently available. - **ConsumerDroppedCount** Number of events dropped at consumer layer of telemetry client. - **CriticalDataDbDroppedCount** Number of critical data sampled events dropped at the database layer. +- **CriticalDatasbDroppedCount** No content is currently available. - **CriticalDataThrottleDroppedCount** The number of critical data sampled events that were dropped because of throttling. - **CriticalOverflowEntersCounter** Number of times critical overflow mode was entered in event DB. - **DbCriticalDroppedCount** Total number of dropped critical events in event DB. @@ -2767,6 +2783,7 @@ The following fields are available: - **DbDroppedFullCount** Number of events dropped due to DB fullness. - **DecodingDroppedCount** Number of events dropped due to decoding failures. - **EnteringCriticalOverflowDroppedCounter** Number of events dropped due to critical overflow mode being initiated. +- **EnteringCriticalOverflowDrOppedCounter** No content is currently available. - **EtwDroppedBufferCount** Number of buffers dropped in the UTC ETW session. - **EtwDroppedCount** Number of events dropped at ETW layer of telemetry client. - **EventsPersistedCount** Number of events that reached the PersistEvent stage. @@ -2780,26 +2797,55 @@ The following fields are available: - **FullTriggerBufferDroppedCount** Number of events dropped due to trigger buffer being full. - **HeartBeatSequenceNumber** The sequence number of this heartbeat. - **InvalidHttpCodeCount** Number of invalid HTTP codes received from contacting Vortex. +- **LastAgentConneCouonError** No content is currently available. - **LastAgentConnectionError** Last non-timeout error encountered in the host/agent channel. - **LastEventSizeOffender** Event name of last event which exceeded max event size. - **LastInvalidHttpCode** Last invalid HTTP code received from Vortex. +- **MaxACouveAgentConneCouonCount** No content is currently available. - **MaxActiveAgentConnectionCount** The maximum number of active agents during this heartbeat timeframe. - **MaxInUseScenarioCounter** Soft maximum number of scenarios loaded by UTC. +- **ᴗ㜛ﭮ紀⁻嬝藱唬穉聮쁪カ鳄髈** No content is currently available. - **PreviousHeartBeatTime** Time of last heartbeat event (allows chaining of events). - **PrivacyBlockedCount** The number of events blocked due to privacy settings or tags. +- **RepeatedUploadFailur$Dropped** No content is currently available. - **RepeatedUploadFailureDropped** Number of events lost due to repeated upload failures for a single buffer. +- **RepeatedUpѬoadFailureDropped** No content is currently available. +- **sbCriticalDroppedCount** No content is currently available. +- **sbDroppedCount** No content is currently available. +- **sbDroppedFailureCount** No content is currently available. +- **sbDroppedFullCount** No content is currently available. - **SettingsHttpAttempts** Number of attempts to contact OneSettings service. - **SettingsHttpFailures** The number of failures from contacting the OneSettings service. +- **sorBdingDroppedCount** No content is currently available. - **ThrottledDroppedCount** Number of events dropped due to throttling of noisy providers. +- **ThrottlgdDroppedCount** No content is currently available. - **TopUploaderErrors** List of top errors received from the upload endpoint. +- **TopUploaeerErrors** No content is currently available. - **UploaderDroppedCount** Number of events dropped at the uploader layer of telemetry client. - **UploaderErrorCount** Number of errors received from the upload endpoint. +- **ǔ໦岋ࣉ䫕꧓ꏖ훭늓겲均効座⺽ඕ��嘩璽춒** No content is currently available. - **VortexFailuresTimeout** The number of timeout failures received from Vortex. - **VortexHttpAttempts** Number of attempts to contact Vortex. - **VortexHttpFailures4xx** Number of 400-499 error codes received from Vortex. - **VortexHttpFailures5xx** Number of 500-599 error codes received from Vortex. - **VortexHttpResponseFailures** Number of Vortex responses that are not 2XX or 400. - **VortexHttpResponsesWithDroppedEvents** Number of Vortex responses containing at least 1 dropped event. +- **ჯ⌷脻㍛䮥肑鍼Ⅵ䄪ꬃ鳃抍⓯钑볨䨎ᖪ먩諢涇͙켦榩偊撏嫄艸** No content is currently available. +- **반쐍⾋ꯈ��玱䁕��龓ⴶ샴賷헖쉺分╅㾚흦დ** No content is currently available. +- **빛䨮哆茠뢶☲偍矉繡귴틐⤺॓酠ꐜ⇫ꈚᑋ勰叙湧ㆧ噟ܝ㸇朤ಳ** No content is currently available. +- **쩤খ䠸퇫秂窇벘货齳��ꕢ顦ᜃⲎ耡��옥䦏��淨㖘⃵┵ᘵ鳝톈如癶첛ᲃ絍** No content is currently available. +- **퓙쏴撑⋇뭟혦꩑戙厀뎓燼㼿渺** No content is currently available. +- **훾電쇔䕅碎霶퍕◲⫒븩ὴ앏艐堗详鲝‶ᜧ** No content is currently available. +- **军伽礋圿萦꒎㲮꿨휒慢䷳橱瘒糜劷墹鎗ꭖ潨ᓔ** No content is currently available. +- **唹켴亰铳ᮍ㭨狣N洹滓ꦲ횴䝃怭픱烰彧魋阭刏⅄ꙹ꯬襖** No content is currently available. +- **櫠䰩遗ᆖᑒ��噊썻ࣆ鮷��㑡Ḯ偬ƚ㣸☂灚Ἇ汆磚䐯槴** No content is currently available. +- **蔇İᏘ࢔谼��ﰊ庸涝芦ᅳ蔭隷嵨̐ꊰ** No content is currently available. +- **裎墴_郐堩��ᴰ뵾핝㳊愨鳘鯡廭顩圧由꽆餢俗䡄ﳻ捳褮ꨞ㵙钫욯홏Ը໤ꖠ䬞悺俽** No content is currently available. +- **趬ᛉ뛀䲮憎** No content is currently available. +- **铽ჟᔛ}䘅��讀랃帷덉侙쩠뙆档玳꼱** No content is currently available. +- **㝫��粆疺⃩��렩榽ႚൾ滑햓ꎢ** No content is currently available. +- **㮆퍈栵ᥳⷣ뤏䳬HttpAttempts** No content is currently available. +- **䱪��໿��雔僽땧觪⊝쵥虚䧁嶟轶** No content is currently available. ### TelClientSynthetic.HeartBeat_Aria_5 @@ -2816,6 +2862,7 @@ The following fields are available: - **DbDroppedFailureCount** Number of events dropped due to database failures. - **DbDroppedFullCount** Number of events dropped due to database being full. - **EnteringCriticalOverflowDroppedCounter** Number of events dropped due to critical overflow mode being initiated. +- **EnteringCriticalOverflowDrOppedCounter** No content is currently available. - **EventsPersistedCount** Number of events that reached the PersistEvent stage. - **EventStoreLifetimeResetCounter** Number of times the event store has been reset. - **EventStoreResetCounter** Number of times the event store has been reset during this heartbeat. @@ -2823,14 +2870,18 @@ The following fields are available: - **EventsUploaded** Number of events uploaded. - **HeartBeatSequenceNumber** The sequence number of this heartbeat. - **InvalidHttpCodeCount** Number of invalid HTTP codes received from contacting Vortex. +- **InvalidHttpCsdeCount** No content is currently available. - **LastEventSizeOffender** Event name of last event which exceeded max event size. - **LastInvalidHttpCode** Last invalid HTTP code received from Vortex. +- **LastInvalidHttpCsde** No content is currently available. - **PreviousHeartBeatTime** The FILETIME of the previous heartbeat fire. - **PrivacyBlockedCount** The number of events blocked due to privacy settings or tags. +- **RepeatedUploadFailur$Dropped** No content is currently available. - **RepeatedUploadFailureDropped** Number of events lost due to repeated upload failures for a single buffer. - **SettingsHttpAttempts** Number of attempts to contact OneSettings service. - **SettingsHttpFailures** Number of failures from contacting OneSettings service. - **TopUploaderErrors** List of top errors received from the upload endpoint. +- **TopUploaeerErrors** No content is currently available. - **UploaderDroppedCount** Number of events dropped at the uploader layer of telemetry client. - **UploaderErrorCount** Number of errors received from the upload endpoint. - **VortexFailuresTimeout** Number of time out failures received from Vortex. @@ -3405,30 +3456,43 @@ The following fields are available: - **AdapterTypeValue** The numeric value indicating the type of Graphics adapter. - **aiSeqId** The event sequence ID. - **bootId** The system boot ID. +- **BraghtnessVersionViaDDI** No content is currently available. - **BrightnessVersionViaDDI** The version of the Display Brightness Interface. +- **BrightnessVersionVyaDDI** No content is currently available. - **ComputePreemptionLevel** The maximum preemption level supported by GPU for compute payload. +- **DedDcatedSystemMemoryB** No content is currently available. +- **DedDcatedVideoMemoryB** No content is currently available. - **DedicatedSystemMemoryB** The amount of system memory dedicated for GPU use (in bytes). - **DedicatedVideoMemoryB** The amount of dedicated VRAM of the GPU (in bytes). - **DisplayAdapterLuid** The display adapter LUID. +- **DisplayAdapTerLuid** No content is currently available. - **DriverDate** The date of the display driver. - **DriverRank** The rank of the display driver. - **DriverVersion** The display driver version. - **DX10UMDFilePath** The file path to the location of the DirectX 10 Display User Mode Driver in the Driver Store. +- **DX11EMDFilePath** No content is currently available. - **DX11UMDFilePath** The file path to the location of the DirectX 11 Display User Mode Driver in the Driver Store. - **DX12UMDFilePath** The file path to the location of the DirectX 12 Display User Mode Driver in the Driver Store. - **DX9UMDFilePath** The file path to the location of the DirectX 9 Display User Mode Driver in the Driver Store. +- **FX9UMDFilePath** No content is currently available. +- **GPQPreemptionLevel** No content is currently available. - **GPUDeviceID** The GPU device ID. - **GPUPreemptionLevel** The maximum preemption level supported by GPU for graphics payload. - **GPURevisionID** The GPU revision ID. - **GPUVendorID** The GPU vendor ID. +- **I3SoftwareDevice** No content is currently available. - **InterfaceId** The GPU interface ID. +- **InturfaceId** No content is currently available. +- **Is@ybridDiscrete** No content is currently available. - **IsDisplayDevice** Does the GPU have displaying capabilities? - **IsHwSchSupported** Indicates whether the adapter supports hardware scheduling. - **IsHybridDiscrete** Does the GPU have discrete GPU capabilities in a hybrid device? - **IsHybridIntegrated** Does the GPU have integrated GPU capabilities in a hybrid device? +- **IsHyrridDiscrete** No content is currently available. - **IsLDA** Is the GPU comprised of Linked Display Adapters? - **IsMiracastSupported** Does the GPU support Miracast? - **IsMismatchLDA** Is at least one device in the Linked Display Adapters chain from a different vendor? +- **IsMismaTchLDA** No content is currently available. - **IsMPOSupported** Does the GPU support Multi-Plane Overlays? - **IsMsMiracastSupported** Are the GPU Miracast capabilities driven by a Microsoft solution? - **IsPostAdapter** Is this GPU the POST GPU in the device? @@ -3443,10 +3507,17 @@ The following fields are available: - **SharedSystemMemoryB** The amount of system memory shared by GPU and CPU (in bytes). - **SubSystemID** The subsystem ID. - **SubVendorID** The GPU sub vendor ID. +- **Tele}etryEnabled** No content is currently available. - **TelemetryEnabled** Is the device listening to MICROSOFT_KEYWORD_TELEMETRY? +- **TelInv2YntTrigger** No content is currently available. - **TelInvEvntTrigger** What triggered this event to be logged? Example: 0 (GPU enumeration) or 1 (DxgKrnlTelemetry provider toggling) +- **TX10UMDFilePath** No content is currently available. - **version** The event version. - **WDDMVersion** The Windows Display Driver Model version. +- **WPUPreemptionLevel** No content is currently available. +- **YsDisplayDevice** No content is currently available. +- **YsLDA** No content is currently available. +- **YsRenderDevice** No content is currently available. ## Failover Clustering events @@ -3532,24 +3603,42 @@ This event sends data about crashes for both native and managed applications, to The following fields are available: +- **.xceptionCode** No content is currently available. +- **.xceptionOffset** No content is currently available. +- **ags** No content is currently available. - **AppName** The name of the app that has crashed. - **AppSessionGuid** GUID made up of process ID and is used as a correlation vector for process instances in the telemetry backend. - **AppTimeStamp** The date/time stamp of the app. - **AppVersion** The version of the app that has crashed. +- **argetAsId** No content is currently available. +- **argetAsppId** No content is currently available. +- **argetAsppVer** No content is currently available. +- **d** No content is currently available. - **ExceptionCode** The exception code returned by the process that has crashed. - **ExceptionOffset** The address where the exception had occurred. - **Flags** Flags indicating how reporting is done. For example, queue the report, do not offer JIT debugging, or do not terminate the process after reporting. - **FriendlyAppName** The description of the app that has crashed, if different from the AppName. Otherwise, the process name. - **IsFatal** True/False to indicate whether the crash resulted in process termination. +- **Modame** No content is currently available. - **ModName** Exception module name (e.g. bar.dll). - **ModTimeStamp** The date/time stamp of the module. - **ModVersion** The version of the module that has crashed. +- **nCode** No content is currently available. +- **Pack9OeFullName** No content is currently available. +- **Pack9OeRelativeAppId** No content is currently available. +- **PackageFullame** No content is currently available. +- **PackageFullFame** No content is currently available. - **PackageFullName** Store application identity. - **PackageRelativeAppId** Store application identity. +- **ProcessArchite2kure** No content is currently available. - **ProcessArchitecture** Architecture of the crashing process, as one of the PROCESSOR_ARCHITECTURE_* constants: 0: PROCESSOR_ARCHITECTURE_INTEL. 5: PROCESSOR_ARCHITECTURE_ARM. 9: PROCESSOR_ARCHITECTURE_AMD64. 12: PROCESSOR_ARCHITECTURE_ARM64. - **ProcessCreateTime** The time of creation of the process that has crashed. - **ProcessId** The ID of the process that has crashed. +- **pSessionGuid** No content is currently available. - **ReportId** A GUID used to identify the report. This can used to track the report across Watson. +- **RepoztId** No content is currently available. +- **TargetAId** No content is currently available. +- **TargetAppI4StartTime** No content is currently available. - **TargetAppId** The kernel reported AppId of the application being reported. - **TargetAppVer** The specific version of the application being reported - **TargetAsId** The sequence number for the hanging process. @@ -3675,15 +3764,19 @@ The following fields are available: - **InstallDateArpLastModified** The date of the registry ARP key for a given application. Hints at install date but not always accurate. Passed as an array. Example: 4/11/2015 00:00:00 - **InstallDateFromLinkFile** The estimated date of install based on the links to the files. Passed as an array. - **InstallDateMsi** The install date if the application was installed via Microsoft Installer (MSI). Passed as an array. +- **InstallDatgArpLastModified** No content is currently available. - **InventoryVersion** The version of the inventory file generating the events. - **Language** The language code of the program. - **MsiPackageCode** A GUID that describes the MSI Package. Multiple 'Products' (apps) can make up an MsiPackage. +- **MsiPackageColm** No content is currently available. - **MsiProductCode** A GUID that describe the MSI Product. - **Name** The name of the application. - **OSVersionAtInstallTime** The four octets from the OS version at the time of the application's install. +- **OSVersionAtInstallTioe** No content is currently available. - **PackageFullName** The package full name for a Store application. - **ProgramInstanceId** A hash of the file IDs in an app. - **Publisher** The Publisher of the application. Location pulled from depends on the 'Source' field. +- **RackageFullName** No content is currently available. - **RootDirPath** The path to the root directory where the program was installed. - **Source** How the program was installed (for example, ARP, MSI, Appx). - **StoreAppType** A sub-classification for the type of Microsoft Store app, such as UWP or Win8StoreApp. @@ -3781,6 +3874,7 @@ The following fields are available: - **ModelId** A unique model ID. - **ModelName** The model name. - **ModelNumber** The model number for the device container. +- **primaryCategory** No content is currently available. - **PrimaryCategory** The primary category for the device container. @@ -3937,7 +4031,9 @@ This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedevic The following fields are available: +- **inventoryId** No content is currently available. - **InventoryVersion** The version of the inventory file generating the events. +- **syncId** No content is currently available. ### Microsoft.Windows.Inventory.Core.InventoryDevicePnpStartSync @@ -3996,9 +4092,11 @@ The following fields are available: - **ImageSize** The size of the driver file. - **Inf** The name of the INF file. - **InventoryVersion** The version of the inventory file generating the events. +- **LriverName** No content is currently available. - **Product** The product name that is included in the driver file. - **ProductVersion** The product version that is included in the driver file. - **Service** The name of the service that is installed for the device. +- **TriverSigned** No content is currently available. - **WdfVersion** The Windows Driver Framework version. @@ -4070,12 +4168,19 @@ The following fields are available: This event collects traces of all other Core events, not used in typical customer scenarios. This event signals the beginning of the event download, and that tracing should begin. +The following fields are available: + +- **key** No content is currently available. +- **UniqueKey** No content is currently available. ### Microsoft.Windows.Inventory.Core.StopUtcJsonTrace This event collects traces of all other Core events, not used in typical customer scenarios. This event signals the end of the event download, and that tracing should end. +The following fields are available: + +- **key** No content is currently available. ### Microsoft.Windows.Inventory.General.AppHealthStaticAdd @@ -4516,6 +4621,7 @@ OS information collected during Boot, used to evaluate the success of the upgrad The following fields are available: +- **BootApplicatio~Id** No content is currently available. - **BootApplicationId** This field tells us what the OS Loader Application Identifier is. - **BootAttemptCount** The number of consecutive times the boot manager has attempted to boot into this operating system. - **BootSequence** The current Boot ID, used to correlate events related to a particular boot session. @@ -4798,107 +4904,107 @@ This event indicates whether a remediation plug-in is applicable, to help keep W The following fields are available: -- **AllowAutoUpdateExists** No content is currently available. +- **AllowAutoUpdateExists** Indicates whether the Automatic Update feature is turned on. - **AllowAutoUpdateProviderSetExists** No content is currently available. - **AppraiserBinariesValidResult** Indicates whether plug-in was appraised as valid. - **AppraiserRegistryValidResult** Indicates whether the registry entry checks out as valid. - **AppraiserTaskRepairDisabled** Task repair performed by the appraiser plugin is disabled. - **AppraiserTaskValid** Indicates that the appraiser task is valid. - **AUOptionsExists** Indicates whether the Automatic Update option exist. -- **CTACTargetingAttributesInvalid** No content is currently available. -- **CTACVersion** No content is currently available. +- **CTACTargetingAttributesInvalid** Indicates whether the Common Targeting Attribute Client (CTAC) attributes are valid. CTAC is a Windows Runtime client library. +- **CTACVersion** The Common Targeting Attribute Client (CTAT) version on the device. CTAT is a Windows Runtime client library. - **CV** Correlation vector - **DataStoreSizeInBytes** Size of the data store, in bytes. - **DateTimeDifference** The difference between local and reference clock times. - **DateTimeSyncEnabled** Indicates whether the datetime sync plug-in is enabled. -- **daysSinceInstallThreshold** No content is currently available. -- **daysSinceInstallValue** No content is currently available. +- **daysSinceInstallThreshold** The maximum number of days since the operating system was installed before we check to see if remediation is needed. +- **daysSinceInstallValue** Number of days since the operating system was installed. - **DaysSinceLastSIH** The number of days since the most recent SIH executed. - **DaysToNextSIH** The number of days until the next scheduled SIH execution. -- **DetectConditionEnabled** No content is currently available. +- **DetectConditionEnabled** Indicates whether a condition that the remediation tool can repair was detected. - **DetectedCondition** Indicates whether detect condition is true and the perform action will be run. -- **DetectionFailedReason** No content is currently available. -- **DiskFreeSpaceBeforeSedimentPackInMB** No content is currently available. -- **DiskSpaceBefore** No content is currently available. -- **EditionIdFixCorrupted** No content is currently available. -- **EscalationTimerResetFixResult** No content is currently available. +- **DetectionFailedReason** Indicates why a given remediation failed to fix a problem that was detected. +- **DiskFreeSpaceBeforeSedimentPackInMB** Number of megabytes of disk space available on the device before running the Sediment Pack. +- **DiskSpaceBefore** The amount of free disk space available before a remediation was run. +- **EditionIdFixCorrupted** Indicates whether the Edition ID is corrupted. +- **EscalationTimerResetFixResult** The result of fixing the escalation timer. - **EvalAndReportAppraiserRegEntries** Indicates the EvalAndReportAppraiserRegEntriesFailed event failed. -- **FixedEditionId** No content is currently available. -- **FlightRebootTime** No content is currently available. -- **ForcedRebootToleranceDays** No content is currently available. -- **FreeSpaceRequirement** No content is currently available. +- **FixedEditionId** Indicates whether we fixed Edition ID. +- **FlightRebootTime** The amount of time before the system is rebooted. +- **ForcedRebootToleranceDays** The maximum number of days before a system reboot is forced on the devie. +- **FreeSpaceRequirement** The amount of free space required. - **GlobalEventCounter** Client side counter that indicates ordering of events sent by the remediation system. - **HResult** The HRESULT for detection or perform action phases of the plugin. -- **installDateValue** No content is currently available. +- **installDateValue** The date of the installation. - **IsAppraiserLatestResult** The HRESULT from the appraiser task. - **IsConfigurationCorrected** Indicates whether the configuration of SIH task was successfully corrected. -- **IsEscalationTimerResetFixNeeded** No content is currently available. -- **IsForcedModeEnabled** No content is currently available. -- **IsHomeSku** No content is currently available. -- **IsRebootForcedMode** No content is currently available. -- **IsServiceHardeningEnabled** No content is currently available. -- **IsServiceHardeningNeeded** No content is currently available. -- **isThreshold** No content is currently available. -- **IsUsoRebootPending** No content is currently available. -- **IsUsoRebootPendingInUpdateStore** No content is currently available. -- **IsUsoRebootTaskEnabled** No content is currently available. -- **IsUsoRebootTaskExists** No content is currently available. -- **IsUsoRebootTaskValid** No content is currently available. +- **IsEscalationTimerResetFixNeeded** Determines whether a fix is applicable. +- **IsForcedModeEnabled** Indicates whether forced reboot mode is enabled. +- **IsHomeSku** Indicates whether the device is running the Windows 10 Home edition. +- **IsRebootForcedMode** Indicates whether the forced reboot mode is turned on. +- **IsServiceHardeningEnabled** Indicates whether the Windows Service Hardening feature was turned on for the device. +- **IsServiceHardeningNeeded** Indicates whether Windows Service Hardening was needed for the device (multiple instances of service tampering were detected.) +- **isThreshold** Indicates whether the value meets our threshold. +- **IsUsoRebootPending** Indicates whether a system reboot is pending. +- **IsUsoRebootPendingInUpdateStore** Indicates whether a reboot is pending. +- **IsUsoRebootTaskEnabled** Indicates whether the Update Service Orchestrator (USO) reboot task is enabled +- **IsUsoRebootTaskExists** Indicates whether the Update Service Orchestrator (USO) reboot task exists. +- **IsUsoRebootTaskValid** Indicates whether the Update Service Orchestrator (USO) reboot task is valid. - **LastHresult** The HRESULT for detection or perform action phases of the plugin. -- **LastRebootTaskRunResult** No content is currently available. -- **LastRebootTaskRunTime** No content is currently available. +- **LastRebootTaskRunResult** Indicates the result of the last reboot task. +- **LastRebootTaskRunTime** The length of time the last reboot task took to run. - **LastRun** The date of the most recent SIH run. -- **LPCountBefore** No content is currently available. -- **NextCheck** No content is currently available. -- **NextRebootTaskRunTime** No content is currently available. +- **LPCountBefore** The number of language packs on the device before remediation started. +- **NextCheck** Indicates when remediation will next be attempted. +- **NextRebootTaskRunTime** Indicates when the next system reboot task will run. - **NextRun** Date of the next scheduled SIH run. -- **NoAutoUpdateExists** No content is currently available. -- **NumberOfDaysStuckInReboot** No content is currently available. -- **OriginalEditionId** No content is currently available. +- **NoAutoUpdateExists** Indicates whether the Automatic Updates feature is turned off. +- **NumberOfDaysStuckInReboot** The number of days tht the device has been unable to successfully reboot. +- **OriginalEditionId** The Windows edition ID before remediation started. - **PackageVersion** The version of the current remediation package. - **PluginName** Name of the plugin specified for each generic plugin event. -- **ProductType** No content is currently available. -- **QualityUpdateSedimentFunnelState** No content is currently available. +- **ProductType** The product type of Windows 10. +- **QualityUpdateSedimentFunnelState** Provides information about whether Windows Quality Updates are missing on the device. - **QualityUpdateSedimentJsonSchemaVersion** No content is currently available. -- **QualityUpdateSedimentLastRunSeconds** No content is currently available. -- **QualityUpdateSedimentLocalStartTime** No content is currently available. +- **QualityUpdateSedimentLastRunSeconds** The number of seconds since the Quality Update Sediment Pack ran. +- **QualityUpdateSedimentLocalStartTime** Provides information about when Quality Updates were run. - **QualityUpdateSedimentLocaltTime** No content is currently available. -- **QualityUpdateSedimentTargetedPlugins** No content is currently available. -- **QualityUpdateSedimentTargetedTriggers** No content is currently available. -- **RegkeysExist** No content is currently available. +- **QualityUpdateSedimentTargetedPlugins** Provides the list of remediation plug-ins that are applicable to enable Quality Updates on the device. +- **QualityUpdateSedimentTargetedTriggers** Provides information about remediations that are applicable to enable Quality Updates on the device. +- **RegkeysExist** Indicates whether specified registry keys exist. - **Reload** True if SIH reload is required. -- **RemediationAutoUAAcLineStatus** No content is currently available. -- **RemediationAutoUAAutoStartCount** No content is currently available. -- **RemediationAutoUACalendarTaskEnabled** No content is currently available. -- **RemediationAutoUACalendarTaskExists** No content is currently available. -- **RemediationAutoUACalendarTaskTriggerEnabledCount** No content is currently available. -- **RemediationAutoUADaysSinceLastTaskRunTime** No content is currently available. -- **RemediationAutoUAGetCurrentSize** No content is currently available. -- **RemediationAutoUAIsInstalled** No content is currently available. -- **RemediationAutoUALastTaskRunResult** No content is currently available. -- **RemediationAutoUAMeteredNetwork** No content is currently available. -- **RemediationAutoUATaskEnabled** No content is currently available. -- **RemediationAutoUATaskExists** No content is currently available. -- **RemediationAutoUATasksStalled** No content is currently available. -- **RemediationAutoUATaskTriggerEnabledCount** No content is currently available. -- **RemediationAutoUAUAExitCode** No content is currently available. -- **RemediationAutoUAUAExitState** No content is currently available. -- **RemediationAutoUAUserLoggedIn** No content is currently available. -- **RemediationAutoUAUserLoggedInAdmin** No content is currently available. -- **RemediationCorruptionRepairBuildNumber** No content is currently available. -- **RemediationCorruptionRepairCorruptionsDetected** No content is currently available. -- **RemediationCorruptionRepairDetected** No content is currently available. -- **RemediationDeliverToastBuildNumber** No content is currently available. -- **RemediationDeliverToastDetected** No content is currently available. -- **RemediationDeliverToastDeviceExcludedNation** No content is currently available. -- **RemediationDeliverToastDeviceFreeSpaceInMB** No content is currently available. -- **RemediationDeliverToastDeviceHomeSku** No content is currently available. -- **RemediationDeliverToastDeviceIncludedNation** No content is currently available. -- **RemediationDeliverToastDeviceProSku** No content is currently available. -- **RemediationDeliverToastDeviceSystemDiskSizeInMB** No content is currently available. -- **RemediationDeliverToastGeoId** No content is currently available. -- **RemediationDeviceSkuId** No content is currently available. -- **RemediationGetCurrentFolderExist** No content is currently available. +- **RemediationAutoUAAcLineStatus** Indicates the power status returned by the Automatic Update Assistant tool. +- **RemediationAutoUAAutoStartCount** Indicates the number of times the Automatic Update Assistant tool has automatically started. +- **RemediationAutoUACalendarTaskEnabled** Indicates whether an Automatic Update Assistant tool task is enabled. +- **RemediationAutoUACalendarTaskExists** Indicates whether an Automatic Update Assistant tool task exists. +- **RemediationAutoUACalendarTaskTriggerEnabledCount** Indicates the number of times an Automatic Update Assistant tool task has been triggered. +- **RemediationAutoUADaysSinceLastTaskRunTime** Indicates the last run time of an Automatic Update Assistant tool task. +- **RemediationAutoUAGetCurrentSize** Indicates the current size of the Automatic Update Assistant tool. +- **RemediationAutoUAIsInstalled** Indicates whether the Automatic Update Assistant tool is installed. +- **RemediationAutoUALastTaskRunResult** Indicates the result from the last time the Automatic Update Assistant tool was run. +- **RemediationAutoUAMeteredNetwork** Indicates whether the Automatic Update Assistant tool is running on a metered network. +- **RemediationAutoUATaskEnabled** Indicates whether the Automatic Update Assistant tool task is enabled. +- **RemediationAutoUATaskExists** Indicates whether an Automatic Update Assistant tool task exists. +- **RemediationAutoUATasksStalled** Indicates whether an Automatic Update Assistant tool task is stalled. +- **RemediationAutoUATaskTriggerEnabledCount** Indicates how many times an Automatic Update Assistant tool task has been triggered. +- **RemediationAutoUAUAExitCode** Indicates any exit code provided by the Automatic Update Assistant tool. +- **RemediationAutoUAUAExitState** Indicates the exit state of the Automatic Update Assistant tool. +- **RemediationAutoUAUserLoggedIn** Indicates whether a user is logged in. +- **RemediationAutoUAUserLoggedInAdmin** Indicates whether an Administrator user is logged in. +- **RemediationCorruptionRepairBuildNumber** The build number to use to repair corruption. +- **RemediationCorruptionRepairCorruptionsDetected** Indicates whether corruption was detected. +- **RemediationCorruptionRepairDetected** Indicates whether an attempt was made to repair the corruption. +- **RemediationDeliverToastBuildNumber** Indicates a build number that should be applicable to this device. +- **RemediationDeliverToastDetected** Indicates that a plugin has been detected. +- **RemediationDeliverToastDeviceExcludedNation** Indicates the geographic identity (GEO ID) that is not applicable for a given plug-in. +- **RemediationDeliverToastDeviceFreeSpaceInMB** Indicates the amount of free space, in megabytes. +- **RemediationDeliverToastDeviceHomeSku** Indicates whether the plug-in is applicable for the Windows 10 Home edition. +- **RemediationDeliverToastDeviceIncludedNation** Indicates the geographic identifier (GEO ID) that is applicable for a given plug-in. +- **RemediationDeliverToastDeviceProSku** Indicates whether the plug-in is applicable for the Windows 10 Professional edition. +- **RemediationDeliverToastDeviceSystemDiskSizeInMB** Indicates the size of a system disk, in megabytes. +- **RemediationDeliverToastGeoId** Indicates the geographic identifier (GEO ID) that is applicable for a given plug-in. +- **RemediationDeviceSkuId** The Windows 10 edition ID that maps to the version of Windows 10 on the device. +- **RemediationGetCurrentFolderExist** Indicates whether the GetCurrent folder exists. - **RemediationNoisyHammerAcLineStatus** Event that indicates the AC Line Status of the machine. - **RemediationNoisyHammerAutoStartCount** The number of times hammer auto-started. - **RemediationNoisyHammerCalendarTaskEnabled** Event that indicates Update Assistant Calendar Task is enabled. @@ -4911,35 +5017,40 @@ The following fields are available: - **RemediationNoisyHammerMeteredNetwork** TRUE if the machine is on a metered network. - **RemediationNoisyHammerTaskEnabled** Indicates whether the Update Assistant Task (Noisy Hammer) is enabled. - **RemediationNoisyHammerTaskExists** Indicates whether the Update Assistant Task (Noisy Hammer) exists. -- **RemediationNoisyHammerTasksStalled** No content is currently available. +- **RemediationNoisyHammerTasksStalled** Indicates whether a task (Noisy Hammer) is stalled. - **RemediationNoisyHammerTaskTriggerEnabledCount** Indicates whether counting is enabled for the Update Assistant (Noisy Hammer) task trigger. - **RemediationNoisyHammerUAExitCode** The exit code of the Update Assistant (Noisy Hammer) task. - **RemediationNoisyHammerUAExitState** The code for the exit state of the Update Assistant (Noisy Hammer) task. - **RemediationNoisyHammerUserLoggedIn** TRUE if there is a user logged in. - **RemediationNoisyHammerUserLoggedInAdmin** TRUE if there is the user currently logged in is an Admin. -- **RemediationNotifyUserFixIssuesBoxStatusKey** No content is currently available. -- **RemediationNotifyUserFixIssuesBuildNumber** No content is currently available. -- **RemediationNotifyUserFixIssuesDetected** No content is currently available. -- **RemediationNotifyUserFixIssuesDiskSpace** No content is currently available. -- **RemediationNotifyUserFixIssuesFeatureUpdateBlocked** No content is currently available. -- **RemediationNotifyUserFixIssuesFeatureUpdateInProgress** No content is currently available. -- **RemediationNotifyUserFixIssuesIsUserAdmin** No content is currently available. -- **RemediationNotifyUserFixIssuesIsUserLoggedIn** No content is currently available. -- **RemediationProgramDataFolderSizeInMB** No content is currently available. -- **RemediationProgramFilesFolderSizeInMB** No content is currently available. -- **RemediationShellDeviceEducationSku** No content is currently available. -- **RemediationShellDeviceEnterpriseSku** No content is currently available. -- **RemediationShellDeviceFeatureUpdatesPaused** No content is currently available. -- **RemediationShellDeviceHomeSku** No content is currently available. -- **RemediationShellDeviceIsAllowedSku** No content is currently available. +- **RemediationNotifyUserFixIssuesBoxStatusKey** Status of the remediation plug-in. +- **RemediationNotifyUserFixIssuesBuildNumber** The build number of the remediation plug-in. +- **RemediationNotifyUserFixIssuesDetected** Indicates whether the remediation is necessary. +- **RemediationNotifyUserFixIssuesDiskSpace** Indicates whether the remediation is necessary due to low disk space. +- **RemediationNotifyUserFixIssuesFeatureUpdateBlocked** Indicates whether the remediation is necessary due to Feature Updates being blocked. +- **RemediationNotifyUserFixIssuesFeatureUpdateInProgress** Indicates whether the remediation is necessary due to Feature Updates in progress. +- **RemediationNotifyUserFixIssuesIsUserAdmin** Indicates whether the remediation requires that an Administrator is logged in. +- **RemediationNotifyUserFixIssuesIsUserLoggedIn** Indicates whether the remediation can take place when a non-Administrator is logged in. +- **RemediationProgramDataFolderSizeInMB** The size (in megabytes) of the Program Data folder on the device. +- **RemediationProgramFilesFolderSizeInMB** The size (in megabytes) of the Program Files folder on the device. +- **RemediationShellDeviceApplicabilityFailedReason** No content is currently available. +- **RemediationShellDeviceEducationSku** Indicates whether a Windows 10 Education edition is detected on the device. +- **RemediationShellDeviceEnterpriseSku** Indicates whether a Windows 10 Enterprise edition is detected on the device. +- **RemediationShellDeviceFeatureUpdatesPaused** Indicates whether Feature Updates are paused on the device. +- **RemediationShellDeviceHomeSku** Indicates whether a Windows 10 Home edition is detected on the device. +- **RemediationShellDeviceIsAllowedSku** Indicates whether the Windows 10 edition is applicable to the device. - **RemediationShellDeviceManaged** TRUE if the device is WSUS managed or Windows Updated disabled. - **RemediationShellDeviceNewOS** TRUE if the device has a recently installed OS. -- **RemediationShellDeviceProSku** No content is currently available. -- **RemediationShellDeviceQualityUpdatesPaused** No content is currently available. +- **RemediationShellDeviceProSku** Indicates whether a Windows 10 Professional edition is detected. +- **RemediationShellDeviceQualityUpdatesPaused** Indicates whether Quality Updates are paused on the device. - **RemediationShellDeviceSccm** TRUE if the device is managed by SCCM (Microsoft System Center Configuration Manager). -- **RemediationShellDeviceSetupMutexInUse** No content is currently available. -- **RemediationShellDeviceWuRegistryBlocked** No content is currently available. +- **RemediationShellDeviceSedimentMutexInUse** No content is currently available. +- **RemediationShellDeviceSetupMutexInUse** Indicates whether device setup is in progress. +- **RemediationShellDeviceWuRegistryBlocked** Indicates whether the Windows Update is blocked on the device via the registry. - **RemediationShellDeviceZeroExhaust** TRUE if the device has opted out of Windows Updates completely. +- **RemediationShellHasExpired** No content is currently available. +- **RemediationShellHasUpgraded** No content is currently available. +- **RemediationShellIsDeviceApplicable** No content is currently available. - **RemediationTargetMachine** Indicates whether the device is a target of the specified fix. - **RemediationTaskHealthAutochkProxy** True/False based on the health of the AutochkProxy task. - **RemediationTaskHealthChkdskProactiveScan** True/False based on the health of the Check Disk task. @@ -4949,26 +5060,26 @@ The following fields are available: - **RemediationTaskHealthUSO_ScheduleScanTask** True/False based on the health of the USO (Update Session Orchestrator) Schedule task. - **RemediationTaskHealthWindowsUpdate_ScheduledStartTask** True/False based on the health of the Windows Update Scheduled Start task. - **RemediationTaskHealthWindowsUpdate_SihbootTask** True/False based on the health of the Sihboot task. -- **RemediationUHServiceDisabledBitMap** No content is currently available. -- **RemediationUHServiceNotExistBitMap** No content is currently available. -- **RemediationUsersFolderSizeInMB** No content is currently available. -- **RemediationWindows10UpgradeFolderExist** No content is currently available. -- **RemediationWindows10UpgradeFolderSizeInMB** No content is currently available. -- **RemediationWindowsAppsFolderSizeInMB** No content is currently available. -- **RemediationWindowsBtFolderSizeInMB** No content is currently available. -- **RemediationWindowsFolderSizeInMB** No content is currently available. -- **RemediationWindowsServiceProfilesFolderSizeInMB** No content is currently available. +- **RemediationUHServiceDisabledBitMap** A bitmap indicating which services were disabled. +- **RemediationUHServiceNotExistBitMap** A bitmap indicating which services were deleted. +- **RemediationUsersFolderSizeInMB** The size (in megabytes) of the Users folder on the device. +- **RemediationWindows10UpgradeFolderExist** Indicates whether the Windows 10 Upgrade folder exists. +- **RemediationWindows10UpgradeFolderSizeInMB** The size (in megabytes) of Windows 10 Upgrade folder on the device. +- **RemediationWindowsAppsFolderSizeInMB** The size (in megabytes) of the Windows Applications folder on the device. +- **RemediationWindowsBtFolderSizeInMB** The size (in megabytes) of the Windows BT folder on the device. +- **RemediationWindowsFolderSizeInMB** The size (in megabytes) of the Windows folder on the device. +- **RemediationWindowsServiceProfilesFolderSizeInMB** The size (in megabytes) of the Windows service profile on the device. - **Result** This is the HRESULT for Detection or Perform Action phases of the plugin. - **RunTask** TRUE if SIH task should be run by the plug-in. -- **StorageSenseDiskCompresserEstimateInMB** No content is currently available. -- **StorageSenseHelloFaceRecognitionFodCleanupEstimateInByte** No content is currently available. -- **StorageSenseRestorePointCleanupEstimateInMB** No content is currently available. -- **StorageSenseUserDownloadFolderCleanupEstimateInByte** No content is currently available. +- **StorageSenseDiskCompresserEstimateInMB** The estimated amount of free space that can be cleaned up by running Storage Sense. +- **StorageSenseHelloFaceRecognitionFodCleanupEstimateInByte** The estimated amount of space that can be cleaned up by running Storage Sense and removing Windows Hello facial recognition. +- **StorageSenseRestorePointCleanupEstimateInMB** The estimated amount of free space (in megabytes) that can be cleaned up by running Storage Sense. +- **StorageSenseUserDownloadFolderCleanupEstimateInByte** The estimated amount of space that can be cleaned up by running Storage Sense to clean up the User Download folder. - **TimeServiceNTPServer** The URL for the NTP time server used by device. - **TimeServiceStartType** The startup type for the NTP time service. - **TimeServiceSyncDomainJoined** True if device domain joined and hence uses DC for clock. - **TimeServiceSyncType** Type of sync behavior for Date & Time service on device. -- **uninstallActiveValue** No content is currently available. +- **uninstallActiveValue** Indicates whether an uninstall is in progress. - **UpdateApplicabilityFixerTriggerBitMap** No content is currently available. - **UpdateRebootTime** No content is currently available. - **usoScanHoursSinceLastScan** No content is currently available. @@ -4992,10 +5103,16 @@ The following fields are available: - **branchReadinessLevel** Branch readiness level policy. - **cloudControlState** Value indicating whether the shell is enabled on the cloud control settings. - **CV** The Correlation Vector. -- **DiskFreeSpaceAfterSedimentPackInMB** No content is currently available. -- **DiskFreeSpaceBeforeSedimentPackInMB** No content is currently available. +- **DiskFreeSpaceAfterSedimentPackInMB** The amount of free disk space (in megabytes) after executing the Sediment Pack. +- **DiskFreeSpaceBeforeSedimentPackInMB** The amount of free disk space (in megabytes) before executing the Sediment Pack. +- **DiskMbFreeAfterCleanup** The amount of free hard disk space after cleanup, measured in Megabytes. +- **DiskMbFreeBeforeCleanup** The amount of free hard disk space before cleanup, measured in Megabytes. +- **DiskSpaceCleanedByComponentCleanup** No content is currently available. +- **DiskSpaceCleanedByNGenRemoval** No content is currently available. +- **DiskSpaceCleanedByRestorePointRemoval** No content is currently available. - **ForcedAppraiserTaskTriggered** TRUE if Appraiser task ran from the plug-in. - **GlobalEventCounter** Client-side counter that indicates ordering of events sent by the active user. +- **HandlerCleanupFreeDiskInMegabytes** The amount of hard disk space cleaned by the storage sense handlers, measured in Megabytes. - **hasRolledBack** Indicates whether the client machine has rolled back. - **hasUninstalled** Indicates whether the client machine has uninstalled a later version of the OS. - **hResult** The result of the event execution. @@ -5006,47 +5123,69 @@ The following fields are available: - **MicrosoftCompatibilityAppraiser** The name of the component targeted by the Appraiser plug-in. - **PackageVersion** The package version for the current Remediation. - **PluginName** The name of the plug-in specified for each generic plug-in event. -- **QualityUpdateSedimentExecutedPlugins** No content is currently available. -- **QualityUpdateSedimentFunnelState** No content is currently available. +- **QualityUpdateSedimentExecutedPlugins** The number of plug-ins executed by the Windows Quality Update remediation. +- **QualityUpdateSedimentFunnelState** The state of the Windows Quality Update remediation funnel for the device. - **QualityUpdateSedimentJsonSchemaVersion** No content is currently available. -- **QualityUpdateSedimentLocalEndTime** No content is currently available. +- **QualityUpdateSedimentLocalEndTime** The local time on the device when the Windows Quality Update remediation executed. - **QualityUpdateSedimentLocaltTime** No content is currently available. -- **QualityUpdateSedimentMatchedTriggers** No content is currently available. -- **QualityUpdateSedimentModelExecutionSeconds** No content is currently available. +- **QualityUpdateSedimentMatchedTriggers** The list of triggers that were matched by the Windows Quality Update remediation. +- **QualityUpdateSedimentModelExecutionSeconds** The number of seconds needed to execute the Windows Quality Update remediation. - **recoveredFromTargetOS** No content is currently available. - **RemediationBatteryPowerBatteryLevel** Indicates the battery level at which it is acceptable to continue operation. - **RemediationBatteryPowerExitDueToLowBattery** True when we exit due to low battery power. - **RemediationBatteryPowerOnBattery** True if we allow execution on battery. +- **RemediationCbsTempDiskSpaceCleanedInMB** No content is currently available. +- **RemediationCbsTempEstimateInMB** No content is currently available. +- **RemediationComponentCleanupEstimateInMB** No content is currently available. - **RemediationConfigurationTroubleshooterIpconfigFix** TRUE if IPConfig Fix completed successfully. - **RemediationConfigurationTroubleshooterNetShFix** TRUE if network card cache reset ran successfully. - **RemediationCorruptionRepairCorruptionsDetected** Number of corruptions detected on the device. - **RemediationCorruptionRepairCorruptionsFixed** Number of detected corruptions that were fixed on the device. - **RemediationCorruptionRepairPerformActionSuccessful** Indicates whether corruption repair was successful on the device. +- **RemediationDiskCleanupSearchFileSizeInMB** No content is currently available. +- **RemediationDiskSpaceSavedByCompressionInMB** No content is currently available. +- **RemediationDiskSpaceSavedByUserProfileCompressionInMB** No content is currently available. - **remediationExecution** Remediation shell is in "applying remediation" state. +- **RemediationHandlerCleanupEstimateInMB** No content is currently available. - **RemediationHibernationMigrated** TRUE if hibernation was migrated. - **RemediationHibernationMigrationSucceeded** TRUE if hibernation migration succeeded. -- **RemediationNGenDiskSpaceRestored** No content is currently available. -- **RemediationNGenMigrationSucceeded** No content is currently available. +- **RemediationNGenDiskSpaceRestored** The amount of disk space (in megabytes) that was restored after re-running the Native Image Generator (NGEN). +- **RemediationNGenEstimateInMB** No content is currently available. +- **RemediationNGenMigrationSucceeded** Indicates whether the Native Image Generator (NGEN) migration succeeded. +- **RemediationRestorePointEstimateInMB** No content is currently available. +- **RemediationSearchFileSizeEstimateInMB** No content is currently available. - **RemediationShellHasUpgraded** TRUE if the device upgraded. - **RemediationShellMinimumTimeBetweenShellRuns** Indicates the time between shell runs exceeded the minimum required to execute plugins. - **RemediationShellRunFromService** TRUE if the shell driver was run from the service. - **RemediationShellSessionIdentifier** Unique identifier tracking a shell session. - **RemediationShellSessionTimeInSeconds** Indicates the time the shell session took in seconds. - **RemediationShellTaskDeleted** Indicates that the shell task has been deleted so no additional sediment pack runs occur for this installation. +- **RemediationSoftwareDistributionCleanedInMB** No content is currently available. +- **RemediationSoftwareDistributionEstimateInMB** No content is currently available. +- **RemediationTotalDiskSpaceCleanedInMB** No content is currently available. - **RemediationUpdateServiceHealthRemediationResult** The result of the Update Service Health plug-in. - **RemediationUpdateTaskHealthRemediationResult** The result of the Update Task Health plug-in. - **RemediationUpdateTaskHealthTaskList** A list of tasks fixed by the Update Task Health plug-in. +- **RemediationUserFolderCompressionEstimateInMB** No content is currently available. +- **RemediationUserProfileCompressionEstimateInMB** No content is currently available. - **RemediationUSORebootRequred** Indicates whether a reboot is determined to be required by calling the Update Service Orchestrator (USO). +- **RemediationWindowsCompactedEstimateInMB** No content is currently available. +- **RemediationWindowsLogSpaceEstimateInMB** No content is currently available. +- **RemediationWindowsLogSpaceFreed** The amount of disk space freed by deleting the Windows log files, measured in Megabytes. +- **RemediationWindowsOldSpaceEstimateInMB** No content is currently available. +- **RemediationWindowsSpaceCompactedInMB** No content is currently available. +- **RemediationWindowsStoreSpaceCleanedInMB** No content is currently available. +- **RemediationWindowsStoreSpaceEstimateInMB** No content is currently available. - **Result** The HRESULT for Detection or Perform Action phases of the plug-in. - **RunCount** The number of times the plugin has executed. - **RunResult** The HRESULT for Detection or Perform Action phases of the plug-in. - **ServiceHardeningExitCode** The exit code returned by Windows Service Repair. - **ServiceHealthEnabledBitMap** List of services updated by the plugin. - **ServiceHealthInstalledBitMap** List of services installed by the plugin. -- **StorageSenseDiskCompresserTotalInMB** No content is currently available. -- **StorageSenseHelloFaceRecognitionFodCleanupTotalInByte** No content is currently available. -- **StorageSenseRestorePointCleanupTotalInMB** No content is currently available. -- **StorageSenseUserDownloadFolderCleanupTotalInByte** No content is currently available. +- **StorageSenseDiskCompresserTotalInMB** The total number of megabytes that Storage Sense cleaned up in the User Download folder. +- **StorageSenseHelloFaceRecognitionFodCleanupTotalInByte** The amount of space that Storage Sense was able to clean up in the User Download folder by removing Windows Hello facial recognition. +- **StorageSenseRestorePointCleanupTotalInMB** The total number of megabytes that Storage Sense cleaned up in the User Download folder. +- **StorageSenseUserDownloadFolderCleanupTotalInByte** The total number of bytes that Storage Sense cleaned up in the User Download folder. - **systemDriveFreeDiskSpace** Indicates the free disk space on system drive in MBs. - **systemUptimeInHours** Indicates the amount of time the system in hours has been on since the last boot. - **uninstallActive** TRUE if previous uninstall has occurred for current OS @@ -5063,6 +5202,7 @@ The following fields are available: - **usoScanType** The type of USO (Update Session Orchestrator) scan: "Interactive" or "Background". - **windows10UpgraderBlockWuUpdates** Event to report the value of Windows 10 Upgrader BlockWuUpdates Key. - **windowsEditionId** Event to report the value of Windows Edition ID. +- **WindowsOldSpaceCleanedInMB** The amount of disk space freed by removing the Windows.OLD folder, measured in Megabytes. - **windowsUpgradeRecoveredFromRs4** Event to report the value of the Windows Upgrade Recovered key. @@ -5076,16 +5216,32 @@ The following fields are available: - **GlobalEventCounter** Client side counter which indicates ordering of events sent by this user. - **PackageVersion** Current package version of Remediation. - **PluginName** Name of the plugin specified for each generic plugin event. -- **QualityUpdateSedimentFunnelState** No content is currently available. +- **QualityUpdateSedimentFunnelState** Provides information about whether quality updates are missing on the device. +- **QualityUpdateSedimentFunnelType** No content is currently available. - **QualityUpdateSedimentJsonSchemaVersion** No content is currently available. -- **QualityUpdateSedimentLastRunSeconds** No content is currently available. +- **QualityUpdateSedimentLastRunSeconds** The number of seconds since Quality Updates were run. - **QualityUpdateSedimentLocaltTime** No content is currently available. - **QualityUpdateSedimentMatchedTriggers** No content is currently available. - **QualityUpdateSedimentSelectedPlugins** No content is currently available. - **QualityUpdateSedimentTargetedPlugins** No content is currently available. -- **QualityUpdateSedimentTargetedTriggers** No content is currently available. +- **QualityUpdateSedimentTargetedTriggers** The list of triggers targeted by the current quality update sediment remediation run. +- **RemediationProgramDataFolderSizeInMB** No content is currently available. +- **RemediationProgramFilesFolderSizeInMB** No content is currently available. +- **RemediationUsersFolderSizeInMB** No content is currently available. +- **RemediationWindowsAppsFolderSizeInMB** No content is currently available. +- **RemediationWindowsBtFolderSizeInMB** No content is currently available. +- **RemediationWindowsFolderSizeInMB** No content is currently available. +- **RemediationWindowsServiceProfilesFolderSizeInMB** No content is currently available. +- **RemediationWindowsTotalSystemDiskSize** No content is currently available. - **Result** This is the HRESULT for detection or perform action phases of the plugin. - **RunCount** The number of times the remediation event started (whether it completed successfully or not). +- **WindowsHiberFilSysSizeInMegabytes** No content is currently available. +- **WindowsInstallerFolderSizeInMegabytes** No content is currently available. +- **WindowsOldFolderSizeInMegabytes** No content is currently available. +- **WindowsPageFileSysSizeInMegabytes** No content is currently available. +- **WindowsSoftwareDistributionFolderSizeInMegabytes** No content is currently available. +- **WindowsSwapFileSysSizeInMegabytes** No content is currently available. +- **WindowsSxsFolderSizeInMegabytes** No content is currently available. ## Sediment events @@ -5263,8 +5419,15 @@ This service retrieves events generated by SetupPlatform, the engine that drives The following fields are available: +- **FaeldName** No content is currently available. +- **FieddName** No content is currently available. - **FieldName** Retrieves the event name/data point. Examples: InstallStartTime, InstallEndtime, OverallResult etc. +- **FieldNime** No content is currently available. +- **Gro}pName** No content is currently available. - **GroupName** Retrieves the groupname the event belongs to. Example: Install Information, DU Information, Disk Space Information etc. +- **GzoupName** No content is currently available. +- **OroupName** No content is currently available. +- **Vadue** No content is currently available. - **Value** Retrieves the value associated with the corresponding event name (Field Name). For example: For time related events this will include the system time. @@ -5276,6 +5439,7 @@ Scan process event on Windows Update client. See the EventScenario field for spe The following fields are available: +- **__TlgCV_W** No content is currently available. - **ActivityMatchingId** Contains a unique ID identifying a single CheckForUpdates session from initialization to completion. - **AllowCachedResults** Indicates if the scan allowed using cached results. - **ApplicableUpdateInfo** Metadata for the updates which were detected as applicable @@ -5287,12 +5451,15 @@ The following fields are available: - **BiosVersion** The version of the BIOS. - **BranchReadinessLevel** The servicing branch configured on the device. - **CachedEngineVersion** For self-initiated healing, the version of the SIH engine that is cached on the device. If the SIH engine does not exist, the value is null. +- **CallerApplacationN!me** No content is currently available. - **CallerApplicationName** The name provided by the caller who initiated API calls into the software distribution client. - **CapabilityDetectoidGuid** The GUID for a hardware applicability detectoid that could not be evaluated. - **CDNCountryCode** Two letter country abbreviation for the Content Distribution Network (CDN) location. - **CDNId** The unique identifier of a specific device, used to identify how many devices are encountering success or a particular issue. - **ClientVersion** The version number of the software distribution client. +- **ClientWersion** No content is currently available. - **CommonProps** A bitmask for future flags associated with the Windows Update client behavior. No data is currently reported in this field. Expected value for this field is 0. +- **ComvonProps** No content is currently available. - **Context** Gives context on where the error has occurred. Example: AutoEnable, GetSLSData, AddService, Misc, or Unknown - **CurrentMobileOperator** The mobile operator the device is currently connected to. - **DeferralPolicySources** Sources for any update deferral policies defined (GPO = 0x10, MDM = 0x100, Flight = 0x1000, UX = 0x10000). @@ -5301,8 +5468,11 @@ The following fields are available: - **DriverError** The error code hit during a driver scan. This is 0 if no error was encountered. - **DriverExclusionPolicy** Indicates if the policy for not including drivers with Windows Update is enabled. - **DriverSyncPassPerformed** Were drivers scanned this time? +- **EventIfstanceI** No content is currently available. - **EventInstanceID** A globally unique identifier for event instance. - **EventScenario** Indicates the purpose of sending this event - whether because the software distribution just started checking for content, or whether it was cancelled, succeeded, or failed. +- **ExsendedMetadataCabUrl** No content is currently available. +- **ExsendedStatusCode** No content is currently available. - **ExtendedMetadataCabUrl** Hostname that is used to download an update. - **ExtendedStatusCode** Secondary error code for certain scenarios where StatusCode wasn't specific enough. - **FailedUpdateGuids** The GUIDs for the updates that failed to be evaluated during the scan. @@ -5314,6 +5484,7 @@ The following fields are available: - **FlightRing** The ring (speed of getting builds) that a device is on if participating in flighting (pre-release builds). - **HomeMobileOperator** The mobile operator that the device was originally intended to work with. - **IntentPFNs** Intended application-set metadata for atomic update scenarios. +- **IntentPINs** No content is currently available. - **IPVersion** Indicates whether the download took place over IPv4 or IPv6 - **IsWUfBDualScanEnabled** Indicates if Windows Update for Business dual scan is enabled on the device. - **IsWUfBEnabled** Indicates if Windows Update for Business is enabled on the device. @@ -5321,10 +5492,12 @@ The following fields are available: - **MetadataIntegrityMode** The mode of the update transport metadata integrity check. 0-Unknown, 1-Ignoe, 2-Audit, 3-Enforce - **MSIError** The last error that was encountered during a scan for updates. - **NetworkConnectivityDetected** Indicates the type of network connectivity that was detected. 0 - IPv4, 1 - IPv6 +- **NumberOfApplicableUpdatds** No content is currently available. - **NumberOfApplicableUpdates** The number of updates which were ultimately deemed applicable to the system after the detection process is complete - **NumberOfApplicationsCategoryScanEvaluated** The number of categories (apps) for which an app update scan checked - **NumberOfLoop** The number of round trips the scan required - **NumberOfNewUpdatesFromServiceSync** The number of updates which were seen for the first time in this scan +- **NumberOfNewUpdatesFrvFServiceSync** No content is currently available. - **NumberOfUpdatesEvaluated** The total number of updates which were evaluated as a part of the scan - **NumFailedMetadataSignatures** The number of metadata signatures checks which failed for new metadata synced down. - **Online** Indicates if this was an online scan. @@ -5346,6 +5519,7 @@ The following fields are available: - **ServiceUrl** The environment URL a device is configured to scan with - **ShippingMobileOperator** The mobile operator that a device shipped on. - **StatusCode** Indicates the result of a CheckForUpdates event (success, cancellation, failure code HResult). +- **Statusode** No content is currently available. - **SyncType** Describes the type of scan the event was - **SystemBIOSMajorRelease** Major version of the BIOS. - **SystemBIOSMinorRelease** Minor version of the BIOS. @@ -5411,17 +5585,19 @@ The following fields are available: - **BytesDownloaded** Number of bytes that were downloaded for an individual piece of content (not the entire bundle). - **CachedEngineVersion** The version of the “Self-Initiated Healing” (SIH) engine that is cached on the device, if applicable. - **CallerApplicationName** The name provided by the application that initiated API calls into the software distribution client. +- **CaLlerApplicationName** No content is currently available. - **CbsDownloadMethod** Indicates whether the download was a full- or a partial-file download. - **CbsMethod** The method used for downloading the update content related to the Component Based Servicing (CBS) technology. - **CDNCountryCode** Two letter country abbreviation for the Content Distribution Network (CDN) location. - **CDNId** ID which defines which CDN the software distribution client downloaded the content from. - **ClientVersion** The version number of the software distribution client. - **CommonProps** A bitmask for future flags associated with the Windows Update client behavior. +- **ComvonProps** No content is currently available. - **ConnectTime** Indicates the cumulative amount of time (in seconds) it took to establish the connection for all updates in an update bundle. - **CurrentMobileOperator** The mobile operator the device is currently connected to. - **DeviceModel** The model of the device. - **DownloadPriority** Indicates whether a download happened at background, normal, or foreground priority. -- **DownloadProps** Information about the download operation properties in the form of a bitmask. +- **DownloadProps** Information about the download operation. - **DownloadType** Differentiates the download type of “Self-Initiated Healing” (SIH) downloads between Metadata and Payload downloads. - **EventInstanceID** A globally unique identifier for event instance. - **EventScenario** Indicates the purpose for sending this event: whether because the software distribution just started downloading content; or whether it was cancelled, succeeded, or failed. @@ -5429,6 +5605,7 @@ The following fields are available: - **ExtendedStatusCode** Secondary error code for certain scenarios where StatusCode wasn't specific enough. - **FeatureUpdatePause** Indicates whether feature OS updates are paused on the device. - **FlightBranch** The branch that a device is on if participating in flighting (pre-release builds). +- **FlightBuildN�mber** No content is currently available. - **FlightBuildNumber** If this download was for a flight (pre-release build), this indicates the build number of that flight. - **FlightId** The specific ID of the flight (pre-release build) the device is getting. - **FlightRing** The ring (speed of getting builds) that a device is on if participating in flighting (pre-release builds). @@ -5471,7 +5648,6 @@ The following fields are available: - **UpdateId** An identifier associated with the specific piece of content. - **UpdateID** An identifier associated with the specific piece of content. - **UpdateImportance** Indicates whether the content was marked as Important, Recommended, or Optional. -- **UpdatEImportance** No content is currently available. - **UsedDO** Indicates whether the download used the Delivery Optimization (DO) service. - **UsedSystemVolume** Indicates whether the content was downloaded to the device's main system storage drive, or an alternate storage drive. - **WUDeviceID** The unique identifier of a specific device, used to identify how many devices are encountering success or a particular issue. @@ -5575,6 +5751,7 @@ The following fields are available: - **IsFinalOutcomeEvent** Indicates whether this event signals the end of the update/upgrade process. - **IsFirmware** Indicates whether this update is a firmware update. - **IsSuccessFailurePostReboot** Indicates whether the update succeeded and then failed after a restart. +- **IsWufBDualScanEnabled** No content is currently available. - **IsWUfBDualScanEnabled** Indicates whether Windows Update for Business dual scan is enabled on the device. - **IsWUfBEnabled** Indicates whether Windows Update for Business is enabled on the device. - **MergedUpdate** Indicates whether the OS update and a BSP update merged for installation. @@ -6324,10 +6501,15 @@ This event sends data about OS deployment scenarios, to help keep Windows up-to- The following fields are available: +- **^alue** No content is currently available. - **ClientId** Retrieves the upgrade ID. In the Windows Update scenario, this will be the Windows Update client ID. In Media setup, default value is Media360, but can be overwritten by the caller to a unique value. +- **FdightData** No content is currently available. - **FieldName** Retrieves the data point. +- **FimldName** No content is currently available. - **FlightData** Specifies a unique identifier for each group of Windows Insider builds. - **InstanceId** Retrieves a unique identifier for each instance of a setup session. +- **InstanceIl** No content is currently available. +- **InstancmId** No content is currently available. - **ReportId** Retrieves the report ID. - **ScenarioId** Retrieves the deployment scenario. - **Value** Retrieves the value associated with the corresponding FieldName. @@ -6366,6 +6548,7 @@ The following fields are available: - **InstanceId** The GUID (Globally Unique ID) that identifies each instance of SetupHost.EXE. - **MitigationScenario** The update scenario in which the mitigation was executed. - **Name** The friendly (descriptive) name of the mitigation. +- **OperatignName** No content is currently available. - **OperationIndex** The mitigation operation index (in the event of a failure). - **OperationName** The friendly (descriptive) name of the mitigation operation (in the event of failure). - **RegistryCount** The number of registry operations in the mitigation entry. @@ -6444,6 +6627,7 @@ The following fields are available: - **callerApplication** The name of the calling application. - **capsuleCount** The number of Sediment Pack capsules. - **capsuleFailureCount** The number of capsule failures. +- **detecd1drSummary** No content is currently available. - **detectionSummary** Result of each applicable detection that was run. - **featureAssessmentImpact** WaaS Assessment impact for feature updates. - **hrEngineBlockReason** Indicates the reason for stopping WaaSMedic. @@ -6454,10 +6638,12 @@ The following fields are available: - **isInteractiveMode** The user started a run of WaaSMedic. - **isManaged** Device is managed for updates. - **isWUConnected** Device is connected to Windows Update. +- **noMoreAcd1drs** No content is currently available. - **noMoreActions** No more applicable diagnostics. - **pluginFailureCount** The number of plugins that have failed. - **pluginsCount** The number of plugins. - **qualityAssessmentImpact** WaaS Assessment impact for quality updates. +- **remediad1drSummary** No content is currently available. - **remediationSummary** Result of each operation performed on a device to fix an invalid state or configuration that's preventing the device from getting updates. For example, if Windows Update service is turned off, the fix is to turn the it back on. - **usingBackupFeatureAssessment** Relying on backup feature assessment. - **usingBackupQualityAssessment** Relying on backup quality assessment. @@ -6643,6 +6829,7 @@ The following fields are available: - **IsBundle** Is this a bundle? - **IsInteractive** Is this initiated by the user? - **IsMandatory** Is this a mandatory installation? +- **IsRemedi-0000** No content is currently available. - **IsRemediation** Is this repairing a previous installation? - **IsRestore** Is this a restore of a previously acquired product? - **IsUpdate** Is this an update? @@ -6792,6 +6979,7 @@ This event is sent at the beginning of an app install or update to help keep Win The following fields are available: +- **__lgCV__** No content is currently available. - **CatalogId** The name of the product catalog from which this app was chosen. - **FulfillmentPluginId** The ID of the plugin needed to install the package type of the product. - **PFN** The Package Family Name of the app that is being installed or updated. @@ -6988,15 +7176,18 @@ The following fields are available: - **bytesFromGroupPeers** The number of bytes received from a peer in the same domain group. - **bytesFromIntPeers** The number of bytes received from peers not in the same LAN or in the same domain group. - **bytesFromLinkLocalPeers** The number of bytes received from local peers. +- **bytesFromLocadCache** No content is currently available. - **bytesFromLocalCache** Bytes copied over from local (on disk) cache. - **bytesFromPeers** The number of bytes received from a peer in the same LAN. - **bytesRequested** The total number of bytes requested for download. +- **byvesFromCacheServer** No content is currently available. - **cacheServerConnectionCount** Number of connections made to cache hosts. - **cdnConnectionCount** The total number of connections made to the CDN. - **cdnErrorCodes** A list of CDN connection errors since the last FailureCDNCommunication event. - **cdnErrorCounts** The number of times each error in cdnErrorCodes was encountered. - **cdnIp** The IP address of the source CDN. - **cdnUrl** Url of the source Content Distribution Network (CDN). +- **cfileSize** No content is currently available. - **dataSourcesTotal** Bytes received per source type, accumulated for the whole session. - **doErrorCode** The Delivery Optimization error code that was returned. - **downlinkBps** The maximum measured available download bandwidth (in bytes per second). @@ -7015,11 +7206,14 @@ The following fields are available: - **isEncrypted** TRUE if the file is encrypted and will be decrypted after download. - **isVpn** Is the device connected to a Virtual Private Network? - **jobID** Identifier for the Windows Update job. +- **lanConnectionCoujt** No content is currently available. - **lanConnectionCount** The total number of connections made to peers in the same LAN. - **linkLocalConnectionCount** The number of connections made to peers in the same Link-local network. - **numPeers** The total number of peers used for this download. - **numPeersLocal** The total number of local peers used for this download. - **predefinedCallerName** The name of the API Caller. +- **restrictederRepo** No content is currently available. +- **restrictedloaded** No content is currently available. - **restrictedUpload** Is the upload restricted? - **routeToCacheServer** The cache server setting, source, and value. - **sessionID** The ID of the download session. @@ -7028,6 +7222,7 @@ The following fields are available: - **uplinkBps** The maximum measured available upload bandwidth (in bytes per second). - **uplinkUsageBps** The upload speed (in bytes per second). - **usedMemoryStream** TRUE if the download is using memory streaming for App downloads. +- **ytesRequested** No content is currently available. ### Microsoft.OSG.DU.DeliveryOptClient.DownloadPaused @@ -7043,6 +7238,7 @@ The following fields are available: - **fileID** The ID of the file being paused. - **isVpn** Is the device connected to a Virtual Private Network? - **jobID** Identifier for the Windows Update job. +- **pagaefinedCallerName** No content is currently available. - **predefinedCallerName** The name of the API Caller object. - **reasonCode** The reason for pausing the download. - **routeToCacheServer** The cache server setting, source, and value. @@ -7063,6 +7259,7 @@ The following fields are available: - **deviceProfile** Identifies the usage or form factor (such as Desktop, Xbox, or VM). - **diceRoll** Random number used for determining if a client will use peering. - **doClientVersion** The version of the Delivery Optimization client. +- **doEr2orCode** No content is currently available. - **doErrorCode** The Delivery Optimization error code that was returned. - **downloadMode** The download mode used for this file download session (CdnOnly = 0, Lan = 1, Group = 2, Internet = 3, Simple = 99, Bypass = 100). - **downloadModeReason** Reason for the download. @@ -7078,8 +7275,10 @@ The following fields are available: - **isVpn** Indicates whether the device is connected to a Virtual Private Network. - **jobID** The ID of the Windows Update job. - **peerID** The ID for this delivery optimization client. +- **pgerID** No content is currently available. - **predefinedCallerName** Name of the API caller. - **routeToCacheServer** Cache server setting, source, and value. +- **sessionId** No content is currently available. - **sessionID** The ID for the file download session. - **setConbigs** No content is currently available. - **setConfigs** A JSON representation of the configurations that have been set, and their sources. @@ -7701,6 +7900,7 @@ The following fields are available: - **minutesOverScanSla** Indicates how many minutes the scan exceeded the scan SLA. - **minutesOverScanTriggerSla** Indicates how many minutes the scan exceeded the scan trigger SLA. - **scanTriggerSource** Indicates what caused the scan. +- **scanTriggerSouRce** No content is currently available. - **updateScenarioType** The update session type. - **wuDeviceid** Unique device ID used by Windows Update. From 419edba10b52a37d6f534609782ae5de35cea607 Mon Sep 17 00:00:00 2001 From: Beth Levin Date: Thu, 11 Apr 2019 10:03:34 -0700 Subject: [PATCH 171/724] source paths --- .openpublishing.redirection.json | 172 ++++++++++++++++++++++++++----- 1 file changed, 146 insertions(+), 26 deletions(-) diff --git a/.openpublishing.redirection.json b/.openpublishing.redirection.json index 7b46d8e423..1e2d95073b 100644 --- a/.openpublishing.redirection.json +++ b/.openpublishing.redirection.json @@ -1216,8 +1216,13 @@ "redirect_document_id": true }, { +"source_path": "windows/security/threat-protection/windows-defender-atp/machines-view-overview-windows-defender-advanced-threat-protection.md", +"redirect_url": "/windows/security/threat-protection/microsoft-defender-atp/machines-view-overview", +"redirect_document_id": true +}, +{ "source_path": "windows/threat-protection/windows-defender-atp/manage-alerts-windows-defender-advanced-threat-protection.md", -"redirect_url": "/windows/security/threat-protection/microsoft-defender-atp/manage-alerts", +"redirect_url": "/windows/security/threat-protection/windows-defender-atp/manage-alerts-windows-defender-advanced-threat-protection.md", "redirect_document_id": true }, { @@ -1231,38 +1236,68 @@ "redirect_document_id": true }, { +"source_path": "windows/security/threat-protection/windows-defender-atp/minimum-requirements-windows-defender-advanced-threat-protection.md", +"redirect_url": "/windows/security/threat-protection/microsoft-defender-atp/minimum-requirements", +"redirect_document_id": true +}, +{ "source_path": "windows/threat-protection/windows-defender-atp/onboard-configure-windows-defender-advanced-threat-protection.md", "redirect_url": "/windows/security/threat-protection/windows-defender-atp/onboard-configure-windows-defender-advanced-threat-protection", "redirect_document_id": true }, { +"source_path": "windows/security/threat-protection/windows-defender-atp/onboard-configure-windows-defender-advanced-threat-protection.md", +"redirect_url": "/windows/security/threat-protection/microsoft-defender-atp/onboard-configure", +"redirect_document_id": true +}, +{ "source_path": "windows/threat-protection/windows-defender-atp/portal-overview-windows-defender-advanced-threat-protection.md", "redirect_url": "/windows/security/threat-protection/windows-defender-atp/portal-overview-windows-defender-advanced-threat-protection", "redirect_document_id": true }, { +"source_path": "windows/security/threat-protection/windows-defender-atp/portal-overview-windows-defender-advanced-threat-protection.md", +"redirect_url": "/windows/security/threat-protection/microsoft-defender-atp/portal-overview", +"redirect_document_id": true +}, +{ "source_path": "windows/threat-protection/windows-defender-atp/powerbi-reports-windows-defender-advanced-threat-protection.md", "redirect_url": "/windows/security/threat-protection/windows-defender-atp/powerbi-reports-windows-defender-advanced-threat-protection", "redirect_document_id": true }, { +"source_path": "windows/security/threat-protection/windows-defender-atp/powerbi-reports-windows-defender-advanced-threat-protection.md", +"redirect_url": "/windows/security/threat-protection/microsoft-defender-atp/powerbi-reports", +"redirect_document_id": true +}, +{ "source_path": "windows/threat-protection/windows-defender-atp/powershell-example-code-windows-defender-advanced-threat-protection.md", "redirect_url": "/windows/security/threat-protection/windows-defender-atp/powershell-example-code-windows-defender-advanced-threat-protection", "redirect_document_id": true }, { +"source_path": "windows/security/threat-protection/windows-defender-atp/powershell-example-code-windows-defender-advanced-threat-protection.md", +"redirect_url": "/windows/security/threat-protection/microsoft-defender-atp/powershell-example-code", +"redirect_document_id": true +}, +{ "source_path": "windows/threat-protection/windows-defender-atp/preferences-setup-windows-defender-advanced-threat-protection.md", "redirect_url": "/windows/security/threat-protection/windows-defender-atp/preferences-setup-windows-defender-advanced-threat-protection", "redirect_document_id": true }, { +"source_path": "windows/security/threat-protection/windows-defender-atp/preferences-setup-windows-defender-advanced-threat-protection.md", +"redirect_url": "/windows/security/threat-protection/microsoft-defender-atp/preferences-setup", +"redirect_document_id": true +}, +{ "source_path": "windows/threat-protection/windows-defender-atp/prerelease.md", "redirect_url": "/windows/security/threat-protection/windows-defender-atp/prerelease", "redirect_document_id": true }, { -"source_path": "windows/threat-protection/windows-defender-atp/preview-settings-windows-defender-advanced-threat-protection.md", -"redirect_url": "/windows/security/threat-protection/windows-defender-atp/preview-settings-windows-defender-advanced-threat-protection", +"source_path": "windows/security/threat-protection/windows-defender-atp/prerelease.md", +"redirect_url": "/windows/security/threat-protection/microsoft-defender-atp/prerelease", "redirect_document_id": true }, { @@ -1271,38 +1306,78 @@ "redirect_document_id": true }, { +"source_path": "windows/security/threat-protection/windows-defender-atp/preview-windows-defender-advanced-threat-protection.md", +"redirect_url": "/windows/security/threat-protection/microsoft-defender-atp/preview", +"redirect_document_id": true +}, +{ +"source_path": "windows/threat-protection/windows-defender-atp/preview-settings-windows-defender-advanced-threat-protection.md", +"redirect_url": "/windows/security/threat-protection/windows-defender-atp/preview-settings-windows-defender-advanced-threat-protection", +"redirect_document_id": true +}, +{ +"source_path": "windows/security/threat-protection/windows-defender-atp/preview-settings-windows-defender-advanced-threat-protection.md", +"redirect_url": "/windows/security/threat-protection/microsoft-defender-atp/preview-settings", +"redirect_document_id": true +}, +{ "source_path": "windows/threat-protection/windows-defender-atp/pull-alerts-using-rest-api-windows-defender-advanced-threat-protection.md", "redirect_url": "/windows/security/threat-protection/windows-defender-atp/pull-alerts-using-rest-api-windows-defender-advanced-threat-protection", "redirect_document_id": true }, { +"source_path": "windows/security/threat-protection/windows-defender-atp/pull-alerts-using-rest-api-windows-defender-advanced-threat-protection.md", +"redirect_url": "/windows/security/threat-protection/microsoft-defender-atp/pull-alerts-using-rest-api", +"redirect_document_id": true +}, +{ "source_path": "windows/threat-protection/windows-defender-atp/python-example-code-windows-defender-advanced-threat-protection.md", "redirect_url": "/windows/security/threat-protection/windows-defender-atp/python-example-code-windows-defender-advanced-threat-protection", "redirect_document_id": true }, { +"source_path": "windows/security/threat-protection/windows-defender-atp/python-example-code-windows-defender-advanced-threat-protection.md", +"redirect_url": "/windows/security/threat-protection/microsoft-defender-atp/python-example-code", +"redirect_document_id": true +}, +{ "source_path": "windows/threat-protection/windows-defender-atp/respond-file-alerts-windows-defender-advanced-threat-protection.md", "redirect_url": "/windows/security/threat-protection/windows-defender-atp/respond-file-alerts-windows-defender-advanced-threat-protection", "redirect_document_id": true }, { +"source_path": "windows/security/threat-protection/windows-defender-atp/respond-file-alerts-windows-defender-advanced-threat-protection.md", +"redirect_url": "/windows/security/threat-protection/microsoft-defender-atp/respond-file-alerts", +"redirect_document_id": true +}, +{ "source_path": "windows/threat-protection/windows-defender-atp/respond-machine-alerts-windows-defender-advanced-threat-protection.md", "redirect_url": "/windows/security/threat-protection/windows-defender-atp/respond-machine-alerts-windows-defender-advanced-threat-protection", "redirect_document_id": true }, { +"source_path": "windows/security/threat-protection/windows-defender-atp/respond-machine-alerts-windows-defender-advanced-threat-protection.md", +"redirect_url": "/windows/security/threat-protection/microsoft-defender-atp/respond-machine-alerts", +"redirect_document_id": true +}, +{ "source_path": "windows/threat-protection/windows-defender-atp/response-actions-windows-defender-advanced-threat-protection.md", "redirect_url": "/windows/security/threat-protection/windows-defender-atp/response-actions-windows-defender-advanced-threat-protection", "redirect_document_id": true }, { +"source_path": "windows/security/threat-protection/windows-defender-atp/response-actions-windows-defender-advanced-threat-protection.md", +"redirect_url": "/windows/security/threat-protection/microsoft-defender-atp/response-actions", +"redirect_document_id": true +}, +{ "source_path": "windows/threat-protection/windows-defender-atp/run-detection-test-windows-defender-advanced-threat-protection.md", "redirect_url": "/windows/security/threat-protection/windows-defender-atp/run-detection-test-windows-defender-advanced-threat-protection", "redirect_document_id": true }, { -"source_path": "windows/threat-protection/windows-defender-atp/security-analytics-dashboard-windows-defender-advanced-threat-protection.md", -"redirect_url": "/windows/security/threat-protection/windows-defender-atp/security-analytics-dashboard-windows-defender-advanced-threat-protection", +"source_path": "windows/security/threat-protection/windows-defender-atp/run-detection-test-windows-defender-advanced-threat-protection.md", +"redirect_url": "/windows/security/threat-protection/microsoft-defender-atp/run-detection-test", "redirect_document_id": true }, { @@ -1311,8 +1386,8 @@ "redirect_document_id": true }, { -"source_path": "windows/threat-protection/windows-defender-atp/settings-windows-defender-advanced-threat-protection.md", -"redirect_url": "/windows/security/threat-protection/windows-defender-atp/settings-windows-defender-advanced-threat-protection", +"source_path": "windows/security/threat-protection/windows-defender-atp/service-status-windows-defender-advanced-threat-protection.md", +"redirect_url": "/windows/security/threat-protection/microsoft-defender-atp/service-status", "redirect_document_id": true }, { @@ -1321,28 +1396,18 @@ "redirect_document_id": true }, { +"source_path": "windows/security/threat-protection/windows-defender-atp/supported-response-apis-windows-defender-advanced-threat-protection.md", +"redirect_url": "/windows/security/threat-protection/microsoft-defender-atp/supported-response-apis", +"redirect_document_id": true +}, +{ "source_path": "windows/threat-protection/windows-defender-atp/threat-indicator-concepts-windows-defender-advanced-threat-protection.md", "redirect_url": "/windows/security/threat-protection/windows-defender-atp/threat-indicator-concepts-windows-defender-advanced-threat-protection", "redirect_document_id": true }, { -"source_path": "windows/threat-protection/windows-defender-atp/troubleshoot-custom-ti-windows-defender-advanced-threat-protection.md", -"redirect_url": "/windows/security/threat-protection/windows-defender-atp/troubleshoot-custom-ti-windows-defender-advanced-threat-protection", -"redirect_document_id": true -}, -{ -"source_path": "windows/threat-protection/windows-defender-atp/troubleshoot-onboarding-error-messages-windows-defender-advanced-threat-protection.md", -"redirect_url": "/windows/security/threat-protection/windows-defender-atp/troubleshoot-onboarding-error-messages-windows-defender-advanced-threat-protection", -"redirect_document_id": true -}, -{ -"source_path": "windows/threat-protection/windows-defender-atp/troubleshoot-onboarding-windows-defender-advanced-threat-protection.md", -"redirect_url": "/windows/security/threat-protection/windows-defender-atp/troubleshoot-onboarding-windows-defender-advanced-threat-protection", -"redirect_document_id": true -}, -{ -"source_path": "windows/threat-protection/windows-defender-atp/troubleshoot-siem-windows-defender-advanced-threat-protection.md", -"redirect_url": "/windows/security/threat-protection/windows-defender-atp/troubleshoot-siem-windows-defender-advanced-threat-protection", +"source_path": "windows/security/threat-protection/windows-defender-atp/threat-indicator-concepts-windows-defender-advanced-threat-protection.md", +"redirect_url": "/windows/security/threat-protection/microsoft-defender-atp/threat-indicator-concepts", "redirect_document_id": true }, { @@ -1351,8 +1416,48 @@ "redirect_document_id": true }, { -"source_path": "windows/threat-protection/windows-defender-atp/use-custom-ti-windows-defender-advanced-threat-protection.md", -"redirect_url": "/windows/security/threat-protection/windows-defender-atp/use-custom-ti-windows-defender-advanced-threat-protection", +"source_path": "windows/security/threat-protection/windows-defender-atp/troubleshoot-windows-defender-advanced-threat-protection.md", +"redirect_url": "/windows/security/threat-protection/microsoft-defender-atp/troubleshoot", +"redirect_document_id": true +}, +{ +"source_path": "windows/threat-protection/windows-defender-atp/troubleshoot-custom-ti-windows-defender-advanced-threat-protection.md", +"redirect_url": "/windows/security/threat-protection/windows-defender-atp/troubleshoot-custom-ti-windows-defender-advanced-threat-protection", +"redirect_document_id": true +}, +{ +"source_path": "windows/security/threat-protection/windows-defender-atp/troubleshoot-custom-ti-windows-defender-advanced-threat-protection.md", +"redirect_url": "/windows/security/threat-protection/microsoft-defender-atp/troubleshoot-custom-ti", +"redirect_document_id": true +}, +{ +"source_path": "windows/threat-protection/windows-defender-atp/troubleshoot-onboarding-windows-defender-advanced-threat-protection.md", +"redirect_url": "/windows/security/threat-protection/windows-defender-atp/troubleshoot-onboarding-windows-defender-advanced-threat-protection", +"redirect_document_id": true +}, +{ +"source_path": "windows/security/threat-protection/windows-defender-atp/troubleshoot-onboarding-windows-defender-advanced-threat-protection.md", +"redirect_url": "/windows/security/threat-protection/microsoft-defender-atp/troubleshoot-onboarding", +"redirect_document_id": true +}, +{ +"source_path": "windows/threat-protection/windows-defender-atp/troubleshoot-onboarding-error-messages-windows-defender-advanced-threat-protection.md", +"redirect_url": "/windows/security/threat-protection/windows-defender-atp/troubleshoot-onboarding-error-messages-windows-defender-advanced-threat-protection", +"redirect_document_id": true +}, +{ +"source_path": "windows/security/threat-protection/windows-defender-atp/troubleshoot-onboarding-error-messages-windows-defender-advanced-threat-protection.md", +"redirect_url": "/windows/security/threat-protection/microsoft-defender-atp/troubleshoot-onboarding-error-messages", +"redirect_document_id": true +}, +{ +"source_path": "windows/threat-protection/windows-defender-atp/troubleshoot-siem-windows-defender-advanced-threat-protection.md", +"redirect_url": "/windows/security/threat-protection/windows-defender-atp/troubleshoot-siem-windows-defender-advanced-threat-protection", +"redirect_document_id": true +}, +{ +"source_path": "windows/security/threat-protection/windows-defender-atp/troubleshoot-siem-windows-defender-advanced-threat-protection.md", +"redirect_url": "/windows/security/threat-protection/microsoft-defender-atp/troubleshoot-siem", "redirect_document_id": true }, { @@ -1361,6 +1466,21 @@ "redirect_document_id": true }, { +"source_path": "windows/security/threat-protection/windows-defender-atp/use-windows-defender-advanced-threat-protection.md", +"redirect_url": "/windows/security/threat-protection/microsoft-defender-atp/use", +"redirect_document_id": true +}, +{ +"source_path": "windows/threat-protection/windows-defender-atp/use-custom-ti-windows-defender-advanced-threat-protection.md", +"redirect_url": "/windows/security/threat-protection/windows-defender-atp/use-custom-ti-windows-defender-advanced-threat-protection", +"redirect_document_id": true +}, +{ +"source_path": "windows/security/threat-protection/windows-defender-atp/use-custom-ti-windows-defender-advanced-threat-protection.md", +"redirect_url": "/windows/security/threat-protection/microsoft-defender-atp/use-custom-ti", +"redirect_document_id": true +}, +{ "source_path": "windows/threat-protection/windows-defender-atp/windows-defender-advanced-threat-protection.md", "redirect_url": "/windows/security/threat-protection/windows-defender-atp/windows-defender-advanced-threat-protection", "redirect_document_id": true From f8c21a798f4377016fd44696b30bc8f5a289fd44 Mon Sep 17 00:00:00 2001 From: Beth Levin Date: Thu, 11 Apr 2019 10:52:44 -0700 Subject: [PATCH 172/724] redirects --- .openpublishing.redirection.json | 170 +++++++++++++++++++++++-------- 1 file changed, 125 insertions(+), 45 deletions(-) diff --git a/.openpublishing.redirection.json b/.openpublishing.redirection.json index 1e2d95073b..7cad091704 100644 --- a/.openpublishing.redirection.json +++ b/.openpublishing.redirection.json @@ -871,6 +871,11 @@ "redirect_document_id": true }, { +"source_path": "windows/keep-secure/advanced-features-windows-defender-advanced-threat-protection.md", +"redirect_url": "/windows/threat-protection/windows-defender-atp/advanced-features-windows-defender-advanced-threat-protection", +"redirect_document_id": true +}, +{ "source_path": "windows/threat-protection/windows-defender-atp/advanced-features-windows-defender-advanced-threat-protection.md", "redirect_url": "/windows/security/threat-protection/windows-defender-atp/advanced-features-windows-defender-advanced-threat-protection", "redirect_document_id": true @@ -881,6 +886,21 @@ "redirect_document_id": true }, { +"source_path": "windows/security/threat-protection/windows-defender-atp/advanced-hunting-windows-defender-advanced-threat-protection.md", +"redirect_url": "/windows/security/threat-protection/microsoft-defender-atp/advanced-hunting", +"redirect_document_id": true +}, +{ +"source_path": "windows/security/threat-protection/windows-defender-atp/advanced-hunting-best-practices-windows-defender-advanced-threat-protection.md", +"redirect_url": "/windows/security/threat-protection/microsoft-defender-atp/advanced-hunting-best-practices", +"redirect_document_id": true +}, +{ +"source_path": "windows/security/threat-protection/windows-defender-atp/advanced-hunting-reference-windows-defender-advanced-threat-protection.md", +"redirect_url": "/windows/security/threat-protection/microsoft-defender-atp/advanced-hunting-reference", +"redirect_document_id": true +}, +{ "source_path": "windows/threat-protection/windows-defender-atp/alerts-queue-windows-defender-advanced-threat-protection.md", "redirect_url": "/windows/security/threat-protection/windows-defender-atp/alerts-queue-windows-defender-advanced-threat-protection", "redirect_document_id": true @@ -901,6 +921,11 @@ "redirect_document_id": true }, { +"source_path": "windows/keep-secure/assign-portal-access-windows-defender-advanced-threat-protection.md", +"redirect_url": "/windows/threat-protection/windows-defender-atp/assign-portal-access-windows-defender-advanced-threat-protection", +"redirect_document_id": true +}, +{ "source_path": "windows/threat-protection/windows-defender-atp/assign-portal-access-windows-defender-advanced-threat-protection.md", "redirect_url": "/windows/security/threat-protection/windows-defender-atp/assign-portal-access-windows-defender-advanced-threat-protection", "redirect_document_id": true @@ -911,6 +936,21 @@ "redirect_document_id": true }, { +"source_path": "windows/security/threat-protection/windows-defender-atp/attack-simulations-windows-defender-advanced-threat-protection.md", +"redirect_url": "/windows/security/threat-protection/microsoft-defender-atp/attack-simulations", +"redirect_document_id": true +}, +{ +"source_path": "windows/security/threat-protection/windows-defender-atp/automated-investigations-windows-defender-advanced-threat-protection.md", +"redirect_url": "/windows/security/threat-protection/microsoft-defender-atp/automated-investigations", +"redirect_document_id": true +}, +{ +"source_path": "windows/security/threat-protection/windows-defender-atp/basic-permissions-windows-defender-advanced-threat-protection.md", +"redirect_url": "/windows/security/threat-protection/microsoft-defender-atp/basic-permissions", +"redirect_document_id": true +}, +{ "source_path": "windows/threat-protection/windows-defender-atp/check-sensor-status-windows-defender-advanced-threat-protection.md", "redirect_url": "/windows/security/threat-protection/windows-defender-atp/check-sensor-status-windows-defender-advanced-threat-protection", "redirect_document_id": true @@ -931,6 +971,11 @@ "redirect_document_id": true }, { +"source_path": "windows/security/threat-protection/windows-defender-atp/conditional-access-windows-defender-advanced-threat-protection.md", +"redirect_url": "/windows/security/threat-protection/microsoft-defender-atp/conditional-access", +"redirect_document_id": true +}, +{ "source_path": "windows/threat-protection/windows-defender-atp/configure-arcsight-windows-defender-advanced-threat-protection.md", "redirect_url": "/windows/security/threat-protection/windows-defender-atp/configure-arcsight-windows-defender-advanced-threat-protection", "redirect_document_id": true @@ -941,6 +986,11 @@ "redirect_document_id": true }, { +"source_path": "windows/security/threat-protection/windows-defender-atp/configure-conditional-access-windows-defender-advanced-threat-protection.md", +"redirect_url": "/windows/security/threat-protection/microsoft-defender-atp/configure-conditional-access", +"redirect_document_id": true +}, +{ "source_path": "windows/threat-protection/windows-defender-atp/configure-email-notifications-windows-defender-advanced-threat-protection.md", "redirect_url": "/windows/security/threat-protection/windows-defender-atp/configure-email-notifications-windows-defender-advanced-threat-protection", "redirect_document_id": true @@ -951,6 +1001,21 @@ "redirect_document_id": true }, { +"source_path": "windows/keep-secure/additional-configuration-windows-advanced-threat-protection.md", +"redirect_url": "/windows/threat-protection/windows-defender-atp/configure-endpoints-windows-defender-advanced-threat-protection", +"redirect_document_id": true +}, +{ +"source_path": "windows/keep-secure/monitor-onboarding-windows-advanced-threat-protection.md", +"redirect_url": "/windows/threat-protection/windows-defender-atp/configure-endpoints-windows-defender-advanced-threat-protection", +"redirect_document_id": false +}, +{ +"source_path": "windows/keep-secure/configure-endpoints-windows-defender-advanced-threat-protection.md", +"redirect_url": "/windows/threat-protection/windows-defender-atp/configure-endpoints-windows-defender-advanced-threat-protection", +"redirect_document_id": true +}, +{ "source_path": "windows/threat-protection/windows-defender-atp/configure-endpoints-windows-defender-advanced-threat-protection.md", "redirect_url": "/windows/security/threat-protection/windows-defender-atp/configure-endpoints-windows-defender-advanced-threat-protection", "redirect_document_id": true @@ -1021,6 +1086,11 @@ "redirect_document_id": true }, { +"source_path": "windows/security/threat-protection/windows-defender-atp/configure-mssp-support-windows-defender-advanced-threat-protection.md", +"redirect_url": "/windows/security/threat-protection/microsoft-defender-atp/configure-mssp-support", +"redirect_document_id": true +}, +{ "source_path": "windows/threat-protection/windows-defender-atp/configure-proxy-internet-windows-defender-advanced-threat-protection.md", "redirect_url": "/windows/security/threat-protection/windows-defender-atp/configure-proxy-internet-windows-defender-advanced-threat-protection", "redirect_document_id": true @@ -1071,6 +1141,16 @@ "redirect_document_id": true }, { +"source_path": "windows/security/threat-protection/windows-defender-atp/general-settings-windows-defender-advanced-threat-protection.md", +"redirect_url": "/windows/security/threat-protection/windows-defender-atp/data-retention-settings-windows-defender-advanced-threat-protection", +"redirect_document_id": true +}, +{ +"source_path": "windows/security/threat-protection/windows-defender-atp/data-retention-settings-windows-defender-advanced-threat-protection.md", +"redirect_url": "/windows/security/threat-protection/windows-defender-atp/data-retention-settings", +"redirect_document_id": true +}, +{ "source_path": "windows/threat-protection/windows-defender-atp/data-storage-privacy-windows-defender-advanced-threat-protection.md", "redirect_url": "/windows/security/threat-protection/windows-defender-atp/data-storage-privacy-windows-defender-advanced-threat-protection", "redirect_document_id": true @@ -1101,6 +1181,26 @@ "redirect_document_id": true }, { +"source_path": "windows/security/threat-protection/windows-defender-atp/enable-security-analytics-windows-defender-advanced-threat-protection.md", +"redirect_url": "/windows/security/threat-protection/windows-defender-atp/enable-secure-score-windows-defender-advanced-threat-protection", +"redirect_document_id": true +}, +{ +"source_path": "windows/security/threat-protection/windows-defender-atp/enable-secure-score-windows-defender-advanced-threat-protection.md", +"redirect_url": "/windows/security/threat-protection/windows-defender-atp/enable-secure-score", +"redirect_document_id": true +}, +{ +"source_path": "windows/keep-secure/configure-aad-windows-defender-advanced-threat-protection.md", +"redirect_url": "/windows/threat-protection/windows-defender-atp/enable-siem-integration-windows-defender-advanced-threat-protection", +"redirect_document_id": true +}, +{ +"source_path": "windows/keep-secure/enable-siem-integration-windows-defender-advanced-threat-protection.md", +"redirect_url": "/windows/threat-protection/windows-defender-atp/enable-siem-integration-windows-defender-advanced-threat-protection", +"redirect_document_id": true +}, +{ "source_path": "windows/threat-protection/windows-defender-atp/enable-siem-integration-windows-defender-advanced-threat-protection.md", "redirect_url": "/windows/security/threat-protection/windows-defender-atp/enable-siem-integration-windows-defender-advanced-threat-protection", "redirect_document_id": true @@ -1141,6 +1241,26 @@ "redirect_document_id": true }, { +"source_path": "windows/security/threat-protection/windows-defender-atp/get-cvekbmap-collection-windows-defender-advanced-threat-protection.md", +"redirect_url": "/windows/security/threat-protection/windows-defender-atp/get-cvekbmap-collection", +"redirect_document_id": true +}, +{ +"source_path": "windows/security/threat-protection/windows-defender-atp/get-kbinfo-collection-windows-defender-advanced-threat-protection.md", +"redirect_url": "/windows/security/threat-protection/windows-defender-atp/get-kbinfo-collection", +"redirect_document_id": true +}, +{ +"source_path": "windows/security/threat-protection/windows-defender-atp/get-machinegroups-collection-windows-defender-advanced-threat-protection.md", +"redirect_url": "/windows/security/threat-protection/windows-defender-atp/get-machinegroups-collection", +"redirect_document_id": true +}, +{ +"source_path": "windows/security/threat-protection/windows-defender-atp/get-machinesecuritystates-collection-windows-defender-advanced-threat-protection.md", +"redirect_url": "/windows/security/threat-protection/windows-defender-atp/get-machinesecuritystates-collection", +"redirect_document_id": true +}, +{ "source_path": "windows/threat-protection/windows-defender-atp/investigate-alerts-windows-defender-advanced-threat-protection.md", "redirect_url": "/windows/security/threat-protection/windows-defender-atp/investigate-alerts-windows-defender-advanced-threat-protection", "redirect_document_id": true @@ -1486,6 +1606,11 @@ "redirect_document_id": true }, { +"source_path": "windows/security/threat-protection/windows-defender-atp/windows-defender-advanced-threat-protection.md", +"redirect_url": "/windows/security/threat-protection/microsoft-defender-atp/microsoft-defender-advanced-threat-protection", +"redirect_document_id": true +}, +{ "source_path": "windows/threat-protection/windows-defender-application-guard/configure-wd-app-guard.md", "redirect_url": "/windows/security/threat-protection/windows-defender-application-guard/configure-wd-app-guard", "redirect_document_id": true @@ -5491,11 +5616,6 @@ "redirect_document_id": true }, { -"source_path": "windows/keep-secure/configure-aad-windows-defender-advanced-threat-protection.md", -"redirect_url": "/windows/threat-protection/windows-defender-atp/enable-siem-integration-windows-defender-advanced-threat-protection", -"redirect_document_id": true -}, -{ "source_path": "windows/manage/cortana-at-work-scenario-7.md", "redirect_url": "/windows/configuration/cortana-at-work/cortana-at-work-scenario-7", "redirect_document_id": true @@ -6006,11 +6126,6 @@ "redirect_document_id": true }, { -"source_path": "windows/keep-secure/additional-configuration-windows-advanced-threat-protection.md", -"redirect_url": "/windows/threat-protection/windows-defender-atp/configure-endpoints-windows-defender-advanced-threat-protection", -"redirect_document_id": true -}, -{ "source_path": "windows/keep-secure/ad-ds-schema-extensions-to-support-tpm-backup.md", "redirect_url": "https://technet.microsoft.com/library/jj635854.aspx", "redirect_document_id": true @@ -6061,11 +6176,6 @@ "redirect_document_id": false }, { -"source_path": "windows/keep-secure/monitor-onboarding-windows-advanced-threat-protection.md", -"redirect_url": "/windows/threat-protection/windows-defender-atp/configure-endpoints-windows-defender-advanced-threat-protection", -"redirect_document_id": false -}, -{ "source_path": "windows/keep-secure/passport-event-300.md", "redirect_url": "/windows/access-protection/hello-for-business/hello-event-300", "redirect_document_id": true @@ -8046,11 +8156,6 @@ "redirect_document_id": true }, { -"source_path": "windows/keep-secure/advanced-features-windows-defender-advanced-threat-protection.md", -"redirect_url": "/windows/threat-protection/windows-defender-atp/advanced-features-windows-defender-advanced-threat-protection", -"redirect_document_id": true -}, -{ "source_path": "windows/keep-secure/advanced-security-audit-policy-settings.md", "redirect_url": "/windows/device-security/auditing/advanced-security-audit-policy-settings", "redirect_document_id": true @@ -8151,11 +8256,6 @@ "redirect_document_id": true }, { -"source_path": "windows/keep-secure/assign-portal-access-windows-defender-advanced-threat-protection.md", -"redirect_url": "/windows/threat-protection/windows-defender-atp/assign-portal-access-windows-defender-advanced-threat-protection", -"redirect_document_id": true -}, -{ "source_path": "windows/keep-secure/assign-security-group-filters-to-the-gpo.md", "redirect_url": "/windows/access-protection/windows-firewall/assign-security-group-filters-to-the-gpo", "redirect_document_id": true @@ -8816,11 +8916,6 @@ "redirect_document_id": true }, { -"source_path": "windows/keep-secure/configure-endpoints-windows-defender-advanced-threat-protection.md", -"redirect_url": "/windows/threat-protection/windows-defender-atp/configure-endpoints-windows-defender-advanced-threat-protection", -"redirect_document_id": true -}, -{ "source_path": "windows/keep-secure/configure-exceptions-for-an-applocker-rule.md", "redirect_url": "/windows/device-security/applocker/configure-exceptions-for-an-applocker-rule", "redirect_document_id": true @@ -9456,11 +9551,6 @@ "redirect_document_id": true }, { -"source_path": "windows/keep-secure/enable-siem-integration-windows-defender-advanced-threat-protection.md", -"redirect_url": "/windows/threat-protection/windows-defender-atp/enable-siem-integration-windows-defender-advanced-threat-protection", -"redirect_document_id": true -}, -{ "source_path": "windows/keep-secure/enable-the-dll-rule-collection.md", "redirect_url": "/windows/device-security/applocker/enable-the-dll-rule-collection", "redirect_document_id": true @@ -13896,16 +13986,6 @@ "redirect_document_id": true }, { -"source_path": "windows/security/threat-protection/windows-defender-atp/general-settings-windows-defender-advanced-threat-protection.md", -"redirect_url": "/windows/security/threat-protection/windows-defender-atp/data-retention-settings-windows-defender-advanced-threat-protection", -"redirect_document_id": true -}, -{ -"source_path": "windows/security/threat-protection/windows-defender-atp/enable-security-analytics-windows-defender-advanced-threat-protection.md", -"redirect_url": "/windows/security/threat-protection/windows-defender-atp/enable-secure-score-windows-defender-advanced-threat-protection", -"redirect_document_id": true -}, -{ "source_path": "windows/security/threat-protection/windows-defender-atp/settings-windows-defender-advanced-threat-protection.md", "redirect_url": "/windows/security/threat-protection/windows-defender-atp/time-settings-windows-defender-advanced-threat-protection", "redirect_document_id": true From 2b80aa42e36d19e3d6571d097d9121d93f0484ad Mon Sep 17 00:00:00 2001 From: Beth Levin Date: Thu, 11 Apr 2019 14:22:50 -0700 Subject: [PATCH 173/724] redirects --- .openpublishing.redirection.json | 145 +++++++++++++++++++++++++++---- 1 file changed, 130 insertions(+), 15 deletions(-) diff --git a/.openpublishing.redirection.json b/.openpublishing.redirection.json index 7cad091704..0871ecbeb5 100644 --- a/.openpublishing.redirection.json +++ b/.openpublishing.redirection.json @@ -1291,6 +1291,11 @@ "redirect_document_id": true }, { +"source_path": "windows/security/threat-protection/windows-defender-atp/investigate-incidents-windows-defender-advanced-threat-protection.md", +"redirect_url": "/windows/security/threat-protection/microsoft-defender-atp/investigate-incidents", +"redirect_document_id": true +}, +{ "source_path": "windows/threat-protection/windows-defender-atp/investigate-ip-windows-defender-advanced-threat-protection.md", "redirect_url": "/windows/security/threat-protection/windows-defender-atp/investigate-ip-windows-defender-advanced-threat-protection", "redirect_document_id": true @@ -1331,6 +1336,16 @@ "redirect_document_id": true }, { +"source_path": "windows/security/threat-protection/windows-defender-atp/machine-groups-windows-defender-advanced-threat-protection.md", +"redirect_url": "/windows/security/threat-protection/microsoft-defender-atp/machine-groups", +"redirect_document_id": true +}, +{ +"source_path": "windows/security/threat-protection/windows-defender-atp/machine-reports-windows-defender-advanced-threat-protection.md", +"redirect_url": "/windows/security/threat-protection/microsoft-defender-atp/machine-reports", +"redirect_document_id": true +}, +{ "source_path": "windows/threat-protection/windows-defender-atp/machines-view-overview-windows-defender-advanced-threat-protection.md", "redirect_url": "/windows/security/threat-protection/windows-defender-atp/machines-view-overview-windows-defender-advanced-threat-protection", "redirect_document_id": true @@ -1341,6 +1356,11 @@ "redirect_document_id": true }, { +"source_path": "windows/security/threat-protection/windows-defender-atp/machine-tags-windows-defender-advanced-threat-protection.md", +"redirect_url": "/windows/security/threat-protection/microsoft-defender-atp/machine-tags", +"redirect_document_id": true +}, +{ "source_path": "windows/threat-protection/windows-defender-atp/manage-alerts-windows-defender-advanced-threat-protection.md", "redirect_url": "/windows/security/threat-protection/windows-defender-atp/manage-alerts-windows-defender-advanced-threat-protection.md", "redirect_document_id": true @@ -1351,6 +1371,41 @@ "redirect_document_id": true }, { +"source_path": "windows/security/threat-protection/windows-defender-atp/manage-allowed-blocked-list-windows-defender-advanced-threat-protection.md", +"redirect_url": "/windows/security/threat-protection/microsoft-defender-atp/manage-allowed-blocked-list", +"redirect_document_id": true +}, +{ +"source_path": "windows/security/threat-protection/windows-defender-atp/manage-auto-investigation-windows-defender-advanced-threat-protection.md", +"redirect_url": "/windows/security/threat-protection/microsoft-defender-atp/manage-auto-investigation", +"redirect_document_id": true +}, +{ +"source_path": "windows/security/threat-protection/windows-defender-atp/manage-automation-allowed-blocked-list-windows-defender-advanced-threat-protection.md", +"redirect_url": "/windows/security/threat-protection/microsoft-defender-atp/manage-automation-allowed-blocked-list", +"redirect_document_id": true +}, +{ +"source_path": "windows/security/threat-protection/windows-defender-atp/manage-automation-file-uploads-windows-defender-advanced-threat-protection.md", +"redirect_url": "/windows/security/threat-protection/microsoft-defender-atp/manage-automation-file-uploads", +"redirect_document_id": true +}, +{ +"source_path": "windows/security/threat-protection/windows-defender-atp/manage-automation-folder-exclusions-windows-defender-advanced-threat-protection.md", +"redirect_url": "/windows/security/threat-protection/microsoft-defender-atp/manage-automation-folder-exclusions", +"redirect_document_id": true +}, +{ +"source_path": "windows/security/threat-protection/windows-defender-atp/manage-incidents-windows-defender-advanced-threat-protection.md", +"redirect_url": "/windows/security/threat-protection/microsoft-defender-atp/manage-incidents", +"redirect_document_id": true +}, +{ +"source_path": "windows/security/threat-protection/windows-defender-atp/manage-suppression-rules-windows-defender-advanced-threat-protection.md", +"redirect_url": "/windows/security/threat-protection/microsoft-defender-atp/manage-suppression-rules", +"redirect_document_id": true +}, +{ "source_path": "windows/threat-protection/windows-defender-atp/minimum-requirements-windows-defender-advanced-threat-protection.md", "redirect_url": "/windows/security/threat-protection/windows-defender-atp/minimum-requirements-windows-defender-advanced-threat-protection", "redirect_document_id": true @@ -1361,6 +1416,16 @@ "redirect_document_id": true }, { +"source_path": "windows/security/threat-protection/windows-defender-atp/mssp-support-windows-defender-advanced-threat-protection.md", +"redirect_url": "/windows/security/threat-protection/microsoft-defender-atp/mssp-support", +"redirect_document_id": true +}, +{ +"source_path": "windows/security/threat-protection/windows-defender-atp/offboard-machines-windows-defender-advanced-threat-protection.md", +"redirect_url": "/windows/security/threat-protection/microsoft-defender-atp/offboard-machines", +"redirect_document_id": true +}, +{ "source_path": "windows/threat-protection/windows-defender-atp/onboard-configure-windows-defender-advanced-threat-protection.md", "redirect_url": "/windows/security/threat-protection/windows-defender-atp/onboard-configure-windows-defender-advanced-threat-protection", "redirect_document_id": true @@ -1371,6 +1436,21 @@ "redirect_document_id": true }, { +"source_path": "windows/security/threat-protection/windows-defender-atp/onboard-downlevel-windows-defender-advanced-threat-protection.md", +"redirect_url": "/windows/security/threat-protection/microsoft-defender-atp/onboard-downlevel", +"redirect_document_id": true +}, +{ +"source_path": "windows/security/threat-protection/windows-defender-atp/overview-hunting-windows-defender-advanced-threat-protection.md", +"redirect_url": "/windows/security/threat-protection/microsoft-defender-atp/overview-hunting", +"redirect_document_id": true +}, +{ +"source_path": "windows/security/threat-protection/windows-defender-atp/overview-secure-score-windows-defender-advanced-threat-protection.md", +"redirect_url": "/windows/security/threat-protection/microsoft-defender-atp/overview-secure-score", +"redirect_document_id": true +}, +{ "source_path": "windows/threat-protection/windows-defender-atp/portal-overview-windows-defender-advanced-threat-protection.md", "redirect_url": "/windows/security/threat-protection/windows-defender-atp/portal-overview-windows-defender-advanced-threat-protection", "redirect_document_id": true @@ -1461,6 +1541,11 @@ "redirect_document_id": true }, { +"source_path": "windows/security/threat-protection/windows-defender-atp/rbac-windows-defender-advanced-threat-protection.md", +"redirect_url": "/windows/security/threat-protection/microsoft-defender-atp/rbac", +"redirect_document_id": true +}, +{ "source_path": "windows/threat-protection/windows-defender-atp/respond-file-alerts-windows-defender-advanced-threat-protection.md", "redirect_url": "/windows/security/threat-protection/windows-defender-atp/respond-file-alerts-windows-defender-advanced-threat-protection", "redirect_document_id": true @@ -1501,6 +1586,26 @@ "redirect_document_id": true }, { +"source_path": "windows/security/threat-protection/windows-defender-atp/security-analytics-dashboard-windows-defender-advanced-threat-protection.md", +"redirect_url": "/windows/security/threat-protection/windows-defender-atp/secure-score-dashboard-windows-defender-advanced-threat-protection", +"redirect_document_id": true +}, +{ +"source_path": "windows/security/threat-protection/windows-defender-atp/secure-score-dashboard-windows-defender-advanced-threat-protection.md", +"redirect_url": "/windows/security/threat-protection/microsoft-defender-atp/secure-score-dashboard", +"redirect_document_id": true +}, +{ +"source_path": "windows/security/threat-protection/windows-defender-atp/dashboard-windows-defender-advanced-threat-protection.md", +"redirect_url": "/windows/security/threat-protection/windows-defender-atp/security-operations-dashboard-windows-defender-advanced-threat-protection", +"redirect_document_id": true +}, +{ +"source_path": "windows/security/threat-protection/windows-defender-atp/security-operations-dashboard-windows-defender-advanced-threat-protection.md", +"redirect_url": "/windows/security/threat-protection/microsoft-defender-atp/security-operations-dashboard", +"redirect_document_id": true +}, +{ "source_path": "windows/threat-protection/windows-defender-atp/service-status-windows-defender-advanced-threat-protection.md", "redirect_url": "/windows/security/threat-protection/windows-defender-atp/service-status-windows-defender-advanced-threat-protection", "redirect_document_id": true @@ -1531,6 +1636,21 @@ "redirect_document_id": true }, { +"source_path": "windows/security/threat-protection/windows-defender-atp/threat-protection-reports-windows-defender-advanced-threat-protection.md", +"redirect_url": "/windows/security/threat-protection/microsoft-defender-atp/threat-protection-reports", +"redirect_document_id": true +}, +{ +"source_path": "windows/security/threat-protection/windows-defender-atp/settings-windows-defender-advanced-threat-protection.md", +"redirect_url": "/windows/security/threat-protection/windows-defender-atp/time-settings-windows-defender-advanced-threat-protection", +"redirect_document_id": true +}, +{ +"source_path": "windows/security/threat-protection/windows-defender-atp/time-settings-windows-defender-advanced-threat-protection.md", +"redirect_url": "/windows/security/threat-protection/microsoft-defender-atp/time-settings", +"redirect_document_id": true +}, +{ "source_path": "windows/threat-protection/windows-defender-atp/troubleshoot-windows-defender-advanced-threat-protection.md", "redirect_url": "/windows/security/threat-protection/windows-defender-atp/troubleshoot-windows-defender-advanced-threat-protection", "redirect_document_id": true @@ -1601,6 +1721,11 @@ "redirect_document_id": true }, { +"source_path": "windows/security/threat-protection/windows-defender-atp/user-roles-windows-defender-advanced-threat-protection.md", +"redirect_url": "/windows/security/threat-protection/microsoft-defender-atp/user-roles", +"redirect_document_id": true +}, +{ "source_path": "windows/threat-protection/windows-defender-atp/windows-defender-advanced-threat-protection.md", "redirect_url": "/windows/security/threat-protection/windows-defender-atp/windows-defender-advanced-threat-protection", "redirect_document_id": true @@ -1611,6 +1736,11 @@ "redirect_document_id": true }, { +"source_path": "windows/security/threat-protection/windows-defender-atp/windows-defender-security-center-atp.md", +"redirect_url": "/windows/security/threat-protection/microsoft-defender-atp/microsoft-defender-security-center", +"redirect_document_id": true +}, +{ "source_path": "windows/threat-protection/windows-defender-application-guard/configure-wd-app-guard.md", "redirect_url": "/windows/security/threat-protection/windows-defender-application-guard/configure-wd-app-guard", "redirect_document_id": true @@ -13971,26 +14101,11 @@ "redirect_document_id": true }, { -"source_path": "windows/security/threat-protection/windows-defender-atp/security-analytics-dashboard-windows-defender-advanced-threat-protection.md", -"redirect_url": "/windows/security/threat-protection/windows-defender-atp/secure-score-dashboard-windows-defender-advanced-threat-protection", -"redirect_document_id": true -}, -{ -"source_path": "windows/security/threat-protection/windows-defender-atp/dashboard-windows-defender-advanced-threat-protection.md", -"redirect_url": "/windows/security/threat-protection/windows-defender-atp/security-operations-dashboard-windows-defender-advanced-threat-protection", -"redirect_document_id": true -}, -{ "source_path": "windows/security/threat-protection/windows-defender-atp/threat-analytics-windows-defender-advanced-threat-protection.md", "redirect_url": "/windows/security/threat-protection/windows-defender-atp/threat-analytics-dashboard-windows-defender-advanced-threat-protection", "redirect_document_id": true }, { -"source_path": "windows/security/threat-protection/windows-defender-atp/settings-windows-defender-advanced-threat-protection.md", -"redirect_url": "/windows/security/threat-protection/windows-defender-atp/time-settings-windows-defender-advanced-threat-protection", -"redirect_document_id": true -}, -{ "source_path": "windows/privacy/basic-level-windows-diagnostic-events-and-fields.md", "redirect_url": "/windows/privacy/basic-level-windows-diagnostic-events-and-fields-1809", "redirect_document_id": true From 9362faa749dda8b810888ccccf8a77ae5bf02b81 Mon Sep 17 00:00:00 2001 From: Beth Levin Date: Thu, 11 Apr 2019 16:22:17 -0700 Subject: [PATCH 174/724] redirects --- .openpublishing.redirection.json | 67 ++++++++++++++++++++++++++++++-- 1 file changed, 64 insertions(+), 3 deletions(-) diff --git a/.openpublishing.redirection.json b/.openpublishing.redirection.json index 0871ecbeb5..e287ccb9e0 100644 --- a/.openpublishing.redirection.json +++ b/.openpublishing.redirection.json @@ -14211,11 +14211,21 @@ "redirect_document_id": false }, { +"source_path": "windows/security/threat-protection/windows-defender-atp/get-alerts-windows-defender-advanced-threat-protection-new.md", +"redirect_url": "/windows/security/threat-protection/microsoft-defender-atp/get-alerts", +"redirect_document_id": false +}, +{ "source_path": "windows/security/threat-protection/windows-defender-atp/get-alert-info-by-id-windows-defender-advanced-threat-protection.md", "redirect_url": "/windows/security/threat-protection/windows-defender-atp/use-apis", "redirect_document_id": false }, { +"source_path": "windows/security/threat-protection/windows-defender-atp/get-alert-info-by-id-windows-defender-advanced-threat-protection-new.md", +"redirect_url": "/windows/security/threat-protection/microsoft-defender-atp/get-alert-info-by-id", +"redirect_document_id": false +}, +{ "source_path": "windows/security/threat-protection/windows-defender-atp/get-alert-related-actor-info-windows-defender-advanced-threat-protection.md", "redirect_url": "/windows/security/threat-protection/windows-defender-atp/use-apis", "redirect_document_id": false @@ -14226,33 +14236,63 @@ "redirect_document_id": false }, { +"source_path": "windows/security/threat-protection/windows-defender-atp/get-alert-related-domain-info-windows-defender-advanced-threat-protection-new.md", +"redirect_url": "/windows/security/threat-protection/microsoft-defender-atp/get-alert-related-domain-info", +"redirect_document_id": false +}, +{ "source_path": "windows/security/threat-protection/windows-defender-atp/get-alert-related-files-info-windows-defender-advanced-threat-protection.md", "redirect_url": "/windows/security/threat-protection/windows-defender-atp/use-apis", "redirect_document_id": false }, { +"source_path": "windows/security/threat-protection/windows-defender-atp/get-alert-related-files-info-windows-defender-advanced-threat-protection-new.md", +"redirect_url": "/windows/security/threat-protection/microsoft-defender-atp/get-alert-related-files-info", +"redirect_document_id": false +}, +{ "source_path": "windows/security/threat-protection/windows-defender-atp/get-alert-related-ip-info-windows-defender-advanced-threat-protection.md", "redirect_url": "/windows/security/threat-protection/windows-defender-atp/use-apis", "redirect_document_id": false }, { +"source_path": "windows/security/threat-protection/windows-defender-atp/get-alert-related-ip-info-windows-defender-advanced-threat-protection-new.md", +"redirect_url": "/windows/security/threat-protection/microsoft-defender-atp/get-alert-related-ip-info", +"redirect_document_id": false +}, +{ "source_path": "windows/security/threat-protection/windows-defender-atp/get-alert-related-machine-info-windows-defender-advanced-threat-protection.md", "redirect_url": "/windows/security/threat-protection/windows-defender-atp/use-apis", "redirect_document_id": false }, { +"source_path": "windows/security/threat-protection/windows-defender-atp/get-alert-related-machine-info-windows-defender-advanced-threat-protection-new.md", +"redirect_url": "/windows/security/threat-protection/microsoft-defender-atp/get-alert-related-machine-info", +"redirect_document_id": false +}, +{ "source_path": "windows/security/threat-protection/windows-defender-atp/get-domain-related-alerts-windows-defender-advanced-threat-protection.md", "redirect_url": "/windows/security/threat-protection/windows-defender-atp/use-apis", "redirect_document_id": false }, { +"source_path": "windows/security/threat-protection/windows-defender-atp/get-domain-related-alerts-windows-defender-advanced-threat-protection-new.md", +"redirect_url": "/windows/security/threat-protection/microsoft-defender-atp/get-domain-related-alerts", +"redirect_document_id": false +}, +{ "source_path": "windows/security/threat-protection/windows-defender-atp/get-domain-related-machines-windows-defender-advanced-threat-protection.md", "redirect_url": "/windows/security/threat-protection/windows-defender-atp/use-apis", "redirect_document_id": false }, { -"source_path": "windows/security/threat-protection/windows-defender-atp/get-domain-statistics-windows-defender-advanced-threat-protection.md", -"redirect_url": "/windows/security/threat-protection/windows-defender-atp/use-apis", +"source_path": "windows/security/threat-protection/windows-defender-atp/get-domain-related-machines-windows-defender-advanced-threat-protection-new.md", +"redirect_url": "/windows/security/threat-protection/microsoft-defender-atp/get-domain-related-machines", +"redirect_document_id": false +}, +{ +"source_path": "windows/security/threat-protection/windows-defender-atp/get-domain-statistics-windows-defender-advanced-threat-protection-new.md", +"redirect_url": "/windows/security/threat-protection/microsoft-defender-atp/get-domain-statistics", "redirect_document_id": false }, { @@ -14261,6 +14301,11 @@ "redirect_document_id": false }, { +"source_path": "windows/security/threat-protection/windows-defender-atp/is-domain-seen-in-org-windows-defender-advanced-threat-protection-new.md", +"redirect_url": "/windows/security/threat-protection/microsoft-defender-atp/is-domain-seen-in-org", +"redirect_document_id": false +}, +{ "source_path": "windows/security/threat-protection/windows-defender-atp/block-file-windows-defender-advanced-threat-protection.md", "redirect_url": "/windows/security/threat-protection/windows-defender-atp/use-apis", "redirect_document_id": false @@ -14269,7 +14314,13 @@ "source_path": "windows/security/threat-protection/windows-defender-atp/get-file-information-windows-defender-advanced-threat-protection.md", "redirect_url": "/windows/security/threat-protection/windows-defender-atp/use-apis", "redirect_document_id": false -},{ +}, +{ +"source_path": "windows/security/threat-protection/windows-defender-atp/get-file-information-windows-defender-advanced-threat-protection-new.md", +"redirect_url": "/windows/security/threat-protection/microsoft-defender-atp/get-file-information", +"redirect_document_id": false +}, +{ "source_path": "windows/security/threat-protection/windows-defender-atp/get-file-related-alerts-windows-defender-advanced-threat-protection.md", "redirect_url": "/windows/security/threat-protection/windows-defender-atp/use-apis", "redirect_document_id": false @@ -14320,11 +14371,21 @@ "redirect_document_id": false }, { +"source_path": "windows/security/threat-protection/windows-defender-atp/collect-investigation-package-windows-defender-advanced-threat-protection-new.md", +"redirect_url": "/windows/security/threat-protection/microsoft-defender-atp/collect-investigation-package", +"redirect_document_id": true +}, +{ "source_path": "windows/security/threat-protection/windows-defender-atp/find-machine-info-by-ip-windows-defender-advanced-threat-protection.md", "redirect_url": "/windows/security/threat-protection/windows-defender-atp/use-apis", "redirect_document_id": false }, { +"source_path": "windows/security/threat-protection/windows-defender-atp/find-machine-info-by-ip-windows-defender-advanced-threat-protection-new.md", +"redirect_url": "/windows/security/threat-protection/microsoft-defender-atp/find-machine-info-by-ip", +"redirect_document_id": false +}, +{ "source_path": "windows/security/threat-protection/windows-defender-atp/get-filemachineaction-object-windows-defender-advanced-threat-protection.md", "redirect_url": "/windows/security/threat-protection/windows-defender-atp/use-apis", "redirect_document_id": false From 4577041a35c33988074ad3fcc499af040c685b13 Mon Sep 17 00:00:00 2001 From: Beth Levin Date: Fri, 12 Apr 2019 11:38:52 -0700 Subject: [PATCH 175/724] redirects --- .openpublishing.redirection.json | 117 ++++++++++++++++++++++++++++--- 1 file changed, 106 insertions(+), 11 deletions(-) diff --git a/.openpublishing.redirection.json b/.openpublishing.redirection.json index e287ccb9e0..8d85371c03 100644 --- a/.openpublishing.redirection.json +++ b/.openpublishing.redirection.json @@ -14223,7 +14223,7 @@ { "source_path": "windows/security/threat-protection/windows-defender-atp/get-alert-info-by-id-windows-defender-advanced-threat-protection-new.md", "redirect_url": "/windows/security/threat-protection/microsoft-defender-atp/get-alert-info-by-id", -"redirect_document_id": false +"redirect_document_id": true }, { "source_path": "windows/security/threat-protection/windows-defender-atp/get-alert-related-actor-info-windows-defender-advanced-threat-protection.md", @@ -14238,7 +14238,7 @@ { "source_path": "windows/security/threat-protection/windows-defender-atp/get-alert-related-domain-info-windows-defender-advanced-threat-protection-new.md", "redirect_url": "/windows/security/threat-protection/microsoft-defender-atp/get-alert-related-domain-info", -"redirect_document_id": false +"redirect_document_id": true }, { "source_path": "windows/security/threat-protection/windows-defender-atp/get-alert-related-files-info-windows-defender-advanced-threat-protection.md", @@ -14248,7 +14248,7 @@ { "source_path": "windows/security/threat-protection/windows-defender-atp/get-alert-related-files-info-windows-defender-advanced-threat-protection-new.md", "redirect_url": "/windows/security/threat-protection/microsoft-defender-atp/get-alert-related-files-info", -"redirect_document_id": false +"redirect_document_id": true }, { "source_path": "windows/security/threat-protection/windows-defender-atp/get-alert-related-ip-info-windows-defender-advanced-threat-protection.md", @@ -14258,7 +14258,7 @@ { "source_path": "windows/security/threat-protection/windows-defender-atp/get-alert-related-ip-info-windows-defender-advanced-threat-protection-new.md", "redirect_url": "/windows/security/threat-protection/microsoft-defender-atp/get-alert-related-ip-info", -"redirect_document_id": false +"redirect_document_id": true }, { "source_path": "windows/security/threat-protection/windows-defender-atp/get-alert-related-machine-info-windows-defender-advanced-threat-protection.md", @@ -14268,7 +14268,7 @@ { "source_path": "windows/security/threat-protection/windows-defender-atp/get-alert-related-machine-info-windows-defender-advanced-threat-protection-new.md", "redirect_url": "/windows/security/threat-protection/microsoft-defender-atp/get-alert-related-machine-info", -"redirect_document_id": false +"redirect_document_id": true }, { "source_path": "windows/security/threat-protection/windows-defender-atp/get-domain-related-alerts-windows-defender-advanced-threat-protection.md", @@ -14278,7 +14278,7 @@ { "source_path": "windows/security/threat-protection/windows-defender-atp/get-domain-related-alerts-windows-defender-advanced-threat-protection-new.md", "redirect_url": "/windows/security/threat-protection/microsoft-defender-atp/get-domain-related-alerts", -"redirect_document_id": false +"redirect_document_id": true }, { "source_path": "windows/security/threat-protection/windows-defender-atp/get-domain-related-machines-windows-defender-advanced-threat-protection.md", @@ -14288,12 +14288,12 @@ { "source_path": "windows/security/threat-protection/windows-defender-atp/get-domain-related-machines-windows-defender-advanced-threat-protection-new.md", "redirect_url": "/windows/security/threat-protection/microsoft-defender-atp/get-domain-related-machines", -"redirect_document_id": false +"redirect_document_id": true }, { "source_path": "windows/security/threat-protection/windows-defender-atp/get-domain-statistics-windows-defender-advanced-threat-protection-new.md", "redirect_url": "/windows/security/threat-protection/microsoft-defender-atp/get-domain-statistics", -"redirect_document_id": false +"redirect_document_id": true }, { "source_path": "windows/security/threat-protection/windows-defender-atp/is-domain-seen-in-org-windows-defender-advanced-threat-protection.md", @@ -14303,7 +14303,7 @@ { "source_path": "windows/security/threat-protection/windows-defender-atp/is-domain-seen-in-org-windows-defender-advanced-threat-protection-new.md", "redirect_url": "/windows/security/threat-protection/microsoft-defender-atp/is-domain-seen-in-org", -"redirect_document_id": false +"redirect_document_id": true }, { "source_path": "windows/security/threat-protection/windows-defender-atp/block-file-windows-defender-advanced-threat-protection.md", @@ -14318,7 +14318,7 @@ { "source_path": "windows/security/threat-protection/windows-defender-atp/get-file-information-windows-defender-advanced-threat-protection-new.md", "redirect_url": "/windows/security/threat-protection/microsoft-defender-atp/get-file-information", -"redirect_document_id": false +"redirect_document_id": true }, { "source_path": "windows/security/threat-protection/windows-defender-atp/get-file-related-alerts-windows-defender-advanced-threat-protection.md", @@ -14326,16 +14326,31 @@ "redirect_document_id": false }, { +"source_path": "windows/security/threat-protection/windows-defender-atp/get-file-related-alerts-windows-defender-advanced-threat-protection-new.md", +"redirect_url": "/windows/security/threat-protection/microsoft-defender-atp/get-file-related-alerts", +"redirect_document_id": true +}, +{ "source_path": "windows/security/threat-protection/windows-defender-atp/get-file-related-machines-windows-defender-advanced-threat-protection.md", "redirect_url": "/windows/security/threat-protection/windows-defender-atp/use-apis", "redirect_document_id": false }, { +"source_path": "windows/security/threat-protection/windows-defender-atp/get-file-related-machines-windows-defender-advanced-threat-protection-new.md", +"redirect_url": "/windows/security/threat-protection/microsoft-defender-atp/get-file-related-machines", +"redirect_document_id": true +}, +{ "source_path": "windows/security/threat-protection/windows-defender-atp/get-file-statistics-windows-defender-advanced-threat-protection.md", "redirect_url": "/windows/security/threat-protection/windows-defender-atp/use-apis", "redirect_document_id": false }, { +"source_path": "windows/security/threat-protection/windows-defender-atp/get-file-statistics-windows-defender-advanced-threat-protection-new.md", +"redirect_url": "/windows/security/threat-protection/microsoft-defender-atp/get-file-statistics", +"redirect_document_id": true +}, +{ "source_path": "windows/security/threat-protection/windows-defender-atp/get-fileactions-collection-windows-defender-advanced-threat-protection.md", "redirect_url": "/windows/security/threat-protection/windows-defender-atp/use-apis", "redirect_document_id": false @@ -14351,16 +14366,31 @@ "redirect_document_id": false }, { +"source_path": "windows/security/threat-protection/windows-defender-atp/get-ip-related-alerts-windows-defender-advanced-threat-protection-new.md", +"redirect_url": "/windows/security/threat-protection/microsoft-defender-atp/get-ip-related-alerts", +"redirect_document_id": true +}, +{ "source_path": "windows/security/threat-protection/windows-defender-atp/get-ip-related-machines-windows-defender-advanced-threat-protection.md", "redirect_url": "/windows/security/threat-protection/windows-defender-atp/use-apis", "redirect_document_id": false }, { +"source_path": "windows/security/threat-protection/windows-defender-atp/get-ip-related-machines-windows-defender-advanced-threat-protection-new.md", +"redirect_url": "/windows/security/threat-protection/microsoft-defender-atp/get-ip-related-machines", +"redirect_document_id": true +}, +{ "source_path": "windows/security/threat-protection/windows-defender-atp/get-ip-statistics-windows-defender-advanced-threat-protection.md", "redirect_url": "/windows/security/threat-protection/windows-defender-atp/use-apis", "redirect_document_id": false }, { +"source_path": "windows/security/threat-protection/windows-defender-atp/get-ip-statistics-windows-defender-advanced-threat-protection-new.md", +"redirect_url": "/windows/security/threat-protection/microsoft-defender-atp/get-ip-statistics", +"redirect_document_id": true +}, +{ "source_path": "windows/security/threat-protection/windows-defender-atp/is-ip-seen-org-windows-defender-advanced-threat-protection.md", "redirect_url": "/windows/security/threat-protection/windows-defender-atp/use-apis", "redirect_document_id": false @@ -14383,7 +14413,7 @@ { "source_path": "windows/security/threat-protection/windows-defender-atp/find-machine-info-by-ip-windows-defender-advanced-threat-protection-new.md", "redirect_url": "/windows/security/threat-protection/microsoft-defender-atp/find-machine-info-by-ip", -"redirect_document_id": false +"redirect_document_id": true }, { "source_path": "windows/security/threat-protection/windows-defender-atp/get-filemachineaction-object-windows-defender-advanced-threat-protection.md", @@ -14391,26 +14421,51 @@ "redirect_document_id": false }, { +"source_path": "windows/security/threat-protection/windows-defender-atp/get-filemachineaction-object-windows-defender-advanced-threat-protection-new.md", +"redirect_url": "/windows/security/threat-protection/microsoft-defender-atp/get-filemachineaction-object", +"redirect_document_id": true +}, +{ "source_path": "windows/security/threat-protection/windows-defender-atp/get-filemachineactions-collection-windows-defender-advanced-threat-protection.md", "redirect_url": "/windows/security/threat-protection/windows-defender-atp/use-apis", "redirect_document_id": false }, { +"source_path": "windows/security/threat-protection/windows-defender-atp/get-filemachineactions-collection-windows-defender-advanced-threat-protection-new.md", +"redirect_url": "/windows/security/threat-protection/microsoft-defender-atp/get-filemachineactions-collection", +"redirect_document_id": true +}, +{ "source_path": "windows/security/threat-protection/windows-defender-atp/get-machine-by-id-windows-defender-advanced-threat-protection.md", "redirect_url": "/windows/security/threat-protection/windows-defender-atp/use-apis", "redirect_document_id": false }, { +"source_path": "windows/security/threat-protection/windows-defender-atp/get-machine-by-id-windows-defender-advanced-threat-protection-new.md", +"redirect_url": "/windows/security/threat-protection/microsoft-defender-atp/get-machine-by-id", +"redirect_document_id": true +}, +{ "source_path": "windows/security/threat-protection/windows-defender-atp/get-machine-log-on-users-windows-defender-advanced-threat-protection.md", "redirect_url": "/windows/security/threat-protection/windows-defender-atp/use-apis", "redirect_document_id": false }, { +"source_path": "windows/security/threat-protection/windows-defender-atp/get-machine-log-on-users-windows-defender-advanced-threat-protection-new.md", +"redirect_url": "/windows/security/threat-protection/microsoft-defender-atp/get-machine-log-on-users", +"redirect_document_id": true +}, +{ "source_path": "windows/security/threat-protection/windows-defender-atp/get-machine-related-alerts-windows-defender-advanced-threat-protection.md", "redirect_url": "/windows/security/threat-protection/windows-defender-atp/use-apis", "redirect_document_id": false }, { +"source_path": "windows/security/threat-protection/windows-defender-atp/get-machine-related-alerts-windows-defender-advanced-threat-protection-new.md", +"redirect_url": "/windows/security/threat-protection/microsoft-defender-atp/get-machine-related-alerts", +"redirect_document_id": true +}, +{ "source_path": "windows/security/threat-protection/windows-defender-atp/get-machineaction-object-windows-defender-advanced-threat-protection.md", "redirect_url": "/windows/security/threat-protection/windows-defender-atp/use-apis", "redirect_document_id": false @@ -14426,11 +14481,21 @@ "redirect_document_id": false }, { +"source_path": "windows/security/threat-protection/windows-defender-atp/get-machines-windows-defender-advanced-threat-protection-new.md", +"redirect_url": "/windows/security/threat-protection/microsoft-defender-atp/get-machines", +"redirect_document_id": true +}, +{ "source_path": "windows/security/threat-protection/windows-defender-atp/get-package-sas-uri-windows-defender-advanced-threat-protection.md", "redirect_url": "/windows/security/threat-protection/windows-defender-atp/use-apis", "redirect_document_id": false }, { +"source_path": "windows/security/threat-protection/windows-defender-atp/get-package-sas-uri-windows-defender-advanced-threat-protection-new.md", +"redirect_url": "/windows/security/threat-protection/microsoft-defender-atp/get-package-sas-uri", +"redirect_document_id": true +}, +{ "source_path": "windows/security/threat-protection/windows-defender-atp/isolate-machine-windows-defender-advanced-threat-protection.md", "redirect_url": "/windows/security/threat-protection/windows-defender-atp/use-apis", "redirect_document_id": false @@ -14471,21 +14536,51 @@ "redirect_document_id": false }, { +"source_path": "windows/security/threat-protection/windows-defender-atp/get-alert-related-user-info-windows-defender-advanced-threat-protection-new.md", +"redirect_url": "/windows/security/threat-protection/microsoft-defender-atp/get-alert-related-user-info", +"redirect_document_id": true +}, +{ +"source_path": "windows/security/threat-protection/windows-defender-atp/get-ti-indicators-collection-windows-defender-advanced-threat-protection-new.md", +"redirect_url": "/windows/security/threat-protection/microsoft-defender-atp/get-ti-indicators-collection", +"redirect_document_id": true +}, +{ "source_path": "windows/security/threat-protection/windows-defender-atp/get-user-information-windows-defender-advanced-threat-protection.md", "redirect_url": "/windows/security/threat-protection/windows-defender-atp/use-apis", "redirect_document_id": false }, { +"source_path": "windows/security/threat-protection/windows-defender-atp/get-user-information-windows-defender-advanced-threat-protection-new.md", +"redirect_url": "/windows/security/threat-protection/microsoft-defender-atp/get-user-information", +"redirect_document_id": true +}, +{ "source_path": "windows/security/threat-protection/windows-defender-atp/get-user-related-alerts-windows-defender-advanced-threat-protection.md", "redirect_url": "/windows/security/threat-protection/windows-defender-atp/use-apis", "redirect_document_id": false }, { +"source_path": "windows/security/threat-protection/windows-defender-atp/get-user-related-alerts-windows-defender-advanced-threat-protection-new.md", +"redirect_url": "/windows/security/threat-protection/microsoft-defender-atp/get-user-related-alerts", +"redirect_document_id": true +}, +{ "source_path": "windows/security/threat-protection/windows-defender-atp/get-user-related-machines-windows-defender-advanced-threat-protection.md", "redirect_url": "/windows/security/threat-protection/windows-defender-atp/use-apis", "redirect_document_id": false }, { +"source_path": "windows/security/threat-protection/windows-defender-atp/get-user-related-machines-windows-defender-advanced-threat-protection-new.md", +"redirect_url": "/windows/security/threat-protection/microsoft-defender-atp/get-user-related-machines", +"redirect_document_id": true +}, +{ +"source_path": "windows/security/threat-protection/windows-defender-atp/initiate-autoir-investigation-windows-defender-advanced-threat-protection-new.md", +"redirect_url": "/windows/security/threat-protection/microsoft-defender-atp/initiate-autoir-investigation", +"redirect_document_id": true +}, +{ "source_path": "windows/security/threat-protection/windows-defender-atp/get-ti-indicator-by-id-windows-defender-advanced-threat-protection.md", "redirect_url": "/windows/security/threat-protection/windows-defender-atp/use-apis", "redirect_document_id": false From 843b9988a4ec0b69aeecb5579772ef240bfe1e14 Mon Sep 17 00:00:00 2001 From: Beth Levin Date: Fri, 12 Apr 2019 12:07:14 -0700 Subject: [PATCH 176/724] redirects --- .openpublishing.redirection.json | 100 +++++++++++++++++++++++++++++++ 1 file changed, 100 insertions(+) diff --git a/.openpublishing.redirection.json b/.openpublishing.redirection.json index 8d85371c03..79df2e526c 100644 --- a/.openpublishing.redirection.json +++ b/.openpublishing.redirection.json @@ -14396,6 +14396,11 @@ "redirect_document_id": false }, { +"source_path": "windows/security/threat-protection/windows-defender-atp/is-ip-seen-org-windows-defender-advanced-threat-protection-new.md", +"redirect_url": "/windows/security/threat-protection/microsoft-defender-atp/is-ip-seen-org", +"redirect_document_id": true +}, +{ "source_path": "windows/security/threat-protection/windows-defender-atp/collect-investigation-package-windows-defender-advanced-threat-protection.md", "redirect_url": "/windows/security/threat-protection/windows-defender-atp/use-apis", "redirect_document_id": false @@ -14496,21 +14501,41 @@ "redirect_document_id": true }, { +"source_path": "windows/security/threat-protection/windows-defender-atp/machine-windows-defender-advanced-threat-protection-new.md", +"redirect_url": "/windows/security/threat-protection/microsoft-defender-atp/machine", +"redirect_document_id": true +}, +{ "source_path": "windows/security/threat-protection/windows-defender-atp/isolate-machine-windows-defender-advanced-threat-protection.md", "redirect_url": "/windows/security/threat-protection/windows-defender-atp/use-apis", "redirect_document_id": false }, { +"source_path": "windows/security/threat-protection/windows-defender-atp/isolate-machine-windows-defender-advanced-threat-protection-new.md", +"redirect_url": "/windows/security/threat-protection/microsoft-defender-atp/isolate-machine", +"redirect_document_id": true +}, +{ "source_path": "windows/security/threat-protection/windows-defender-atp/unisolate-machine-windows-defender-advanced-threat-protection.md", "redirect_url": "/windows/security/threat-protection/windows-defender-atp/use-apis", "redirect_document_id": false }, { +"source_path": "windows/security/threat-protection/windows-defender-atp/unisolate-machine-windows-defender-advanced-threat-protection-new.md", +"redirect_url": "/windows/security/threat-protection/microsoft-defender-atp/unisolate-machine", +"redirect_document_id": true +}, +{ "source_path": "windows/security/threat-protection/windows-defender-atp/unrestrict-code-execution-windows-defender-advanced-threat-protection.md", "redirect_url": "/windows/security/threat-protection/windows-defender-atp/use-apis", "redirect_document_id": false }, { +"source_path": "windows/security/threat-protection/windows-defender-atp/unrestrict-code-execution-windows-defender-advanced-threat-protection-new.md", +"redirect_url": "/windows/security/threat-protection/microsoft-defender-atp/unrestrict-code-execution", +"redirect_document_id": true +}, +{ "source_path": "windows/security/threat-protection/windows-defender-atp/request-sample-windows-defender-advanced-threat-protection.md", "redirect_url": "/windows/security/threat-protection/windows-defender-atp/use-apis", "redirect_document_id": false @@ -14521,16 +14546,31 @@ "redirect_document_id": false }, { +"source_path": "windows/security/threat-protection/windows-defender-atp/restrict-code-execution-windows-defender-advanced-threat-protection-new.md", +"redirect_url": "/windows/security/threat-protection/microsoft-defender-atp/restrict-code-execution", +"redirect_document_id": true +}, +{ "source_path": "windows/security/threat-protection/windows-defender-atp/run-av-scan-windows-defender-advanced-threat-protection.md", "redirect_url": "/windows/security/threat-protection/windows-defender-atp/use-apis", "redirect_document_id": false }, { +"source_path": "windows/security/threat-protection/windows-defender-atp/run-av-scan-windows-defender-advanced-threat-protection-new.md", +"redirect_url": "/windows/security/threat-protection/microsoft-defender-atp/run-av-scan", +"redirect_document_id": true +}, +{ "source_path": "windows/security/threat-protection/windows-defender-atp/stop-quarantine-file-windows-defender-advanced-threat-protection.md", "redirect_url": "/windows/security/threat-protection/windows-defender-atp/use-apis", "redirect_document_id": false }, { +"source_path": "windows/security/threat-protection/windows-defender-atp/stop-quarantine-file-windows-defender-advanced-threat-protection-new.md", +"redirect_url": "/windows/security/threat-protection/microsoft-defender-atp/stop-quarantine-file", +"redirect_document_id": true +}, +{ "source_path": "windows/security/threat-protection/windows-defender-atp/get-alert-related-user-info-windows-defender-advanced-threat-protection.md", "redirect_url": "/windows/security/threat-protection/windows-defender-atp/use-apis", "redirect_document_id": false @@ -14590,5 +14630,65 @@ "redirect_url": "/windows/security/threat-protection/windows-defender-atp/threat-analytics", "redirect_document_id": true }, +{ +"source_path": "windows/security/threat-protection/windows-defender-atp/add-or-remove-machine-tags-windows-defender-advanced-threat-protection-new.md", +"redirect_url": "/windows/security/threat-protection/microsoft-defender-atp/add-or-remove-machine-tags", +"redirect_document_id": true +}, +{ +"source_path": "windows/security/threat-protection/windows-defender-atp/alerts-windows-defender-advanced-threat-protection-new.md", +"redirect_url": "/windows/security/threat-protection/microsoft-defender-atp/alerts", +"redirect_document_id": true +}, +{ +"source_path": "windows/security/threat-protection/windows-defender-atp/create-alert-by-reference-windows-defender-advanced-threat-protection-new.md", +"redirect_url": "/windows/security/threat-protection/microsoft-defender-atp/create-alert-by-reference", +"redirect_document_id": true +}, +{ +"source_path": "windows/security/threat-protection/windows-defender-atp/delete-ti-indicator-by-id-windows-defender-advanced-threat-protection-new.md", +"redirect_url": "/windows/security/threat-protection/microsoft-defender-atp/delete-ti-indicator-by-id", +"redirect_document_id": true +}, +{ +"source_path": "windows/security/threat-protection/windows-defender-atp/files-windows-defender-advanced-threat-protection-new.md", +"redirect_url": "/windows/security/threat-protection/microsoft-defender-atp/files", +"redirect_document_id": true +}, +{ +"source_path": "windows/security/threat-protection/windows-defender-atp/find-machines-by-ip-windows-defender-advanced-threat-protection-new.md", +"redirect_url": "/windows/security/threat-protection/microsoft-defender-atp/find-machines-by-ip", +"redirect_document_id": true +}, +{ +"source_path": "windows/security/threat-protection/windows-defender-atp/machineaction-windows-defender-advanced-threat-protection-new.md", +"redirect_url": "/windows/security/threat-protection/microsoft-defender-atp/machineaction", +"redirect_document_id": true +}, +{ +"source_path": "windows/security/threat-protection/windows-defender-atp/offboard-machine-api-windows-defender-advanced-threat-protection-new.md", +"redirect_url": "/windows/security/threat-protection/microsoft-defender-atp/offboard-machine-api", +"redirect_document_id": true +}, +{ +"source_path": "windows/security/threat-protection/windows-defender-atp/post-ti-indicator-windows-defender-advanced-threat-protection-new.md", +"redirect_url": "/windows/security/threat-protection/microsoft-defender-atp/post-ti-indicator", +"redirect_document_id": true +}, +{ +"source_path": "windows/security/threat-protection/windows-defender-atp/ti-indicator-windows-defender-advanced-threat-protection-new.md", +"redirect_url": "/windows/security/threat-protection/microsoft-defender-atp/ti-indicator", +"redirect_document_id": true +}, +{ +"source_path": "windows/security/threat-protection/windows-defender-atp/update-alert-windows-defender-advanced-threat-protection-new.md", +"redirect_url": "/windows/security/threat-protection/microsoft-defender-atp/update-alert", +"redirect_document_id": true +}, +{ +"source_path": "windows/security/threat-protection/windows-defender-atp/user-alert-windows-defender-advanced-threat-protection-new.md", +"redirect_url": "/windows/security/threat-protection/microsoft-defender-atp/user", +"redirect_document_id": true +} ] } From 46d34c80780e5d09db9ab693efb2137935b8ab29 Mon Sep 17 00:00:00 2001 From: Brian Lich Date: Mon, 15 Apr 2019 08:39:56 -0700 Subject: [PATCH 177/724] new build 4/15/2019 8:39 AM --- .../basic-level-windows-diagnostic-events-and-fields-1903.md | 4 +++- 1 file changed, 3 insertions(+), 1 deletion(-) diff --git a/windows/privacy/basic-level-windows-diagnostic-events-and-fields-1903.md b/windows/privacy/basic-level-windows-diagnostic-events-and-fields-1903.md index 7cc546dd61..a32ec507e3 100644 --- a/windows/privacy/basic-level-windows-diagnostic-events-and-fields-1903.md +++ b/windows/privacy/basic-level-windows-diagnostic-events-and-fields-1903.md @@ -13,7 +13,7 @@ manager: dansimp ms.collection: M365-security-compliance ms.topic: article audience: ITPro -ms.date: 04/11/2019 +ms.date: 04/15/2019 --- @@ -2388,6 +2388,7 @@ This event sends data about boot IDs for which a normal clean shutdown was not o The following fields are available: - **AbnormalShutdownBootId** BootId of the abnormal shutdown being reported by this event. +- **AbsCausedbyAutoChk** No content is currently available. - **AcDcStateAtLastShutdown** Identifies if the device was on battery or plugged in. - **BatteryLevelAtLastShutdown** The last recorded battery level. - **BatteryPercentageAtLastShutdown** The battery percentage at the last shutdown. @@ -2402,6 +2403,7 @@ The following fields are available: - **FirmwareType** ID of the FirmwareType as enumerated in DimFirmwareType. - **HardwareWatchdogTimerGeneratedLastReset** Indicates whether the hardware watchdog timer caused the last reset. - **HardwareWatchdogTimerPresent** Indicates whether hardware watchdog timer was present or not. +- **InvalidBootStat** No content is currently available. - **LastBugCheckBootId** bootId of the last captured crash. - **LastBugCheckCode** Code that indicates the type of error. - **LastBugCheckContextFlags** Additional crash dump settings. From 064240b87cbf2d34a0ca9add89caacc8a5d5d2fa Mon Sep 17 00:00:00 2001 From: Brian Lich Date: Mon, 15 Apr 2019 08:40:04 -0700 Subject: [PATCH 178/724] new build 4/15/2019 8:39 AM --- ...ndows-diagnostic-events-and-fields-1703.md | 26 +- ...ndows-diagnostic-events-and-fields-1709.md | 38 ++- ...ndows-diagnostic-events-and-fields-1803.md | 26 +- ...ndows-diagnostic-events-and-fields-1809.md | 313 +++++------------- 4 files changed, 142 insertions(+), 261 deletions(-) diff --git a/windows/privacy/basic-level-windows-diagnostic-events-and-fields-1703.md b/windows/privacy/basic-level-windows-diagnostic-events-and-fields-1703.md index bf54d09ae5..a9d6322d66 100644 --- a/windows/privacy/basic-level-windows-diagnostic-events-and-fields-1703.md +++ b/windows/privacy/basic-level-windows-diagnostic-events-and-fields-1703.md @@ -13,7 +13,7 @@ manager: dansimp ms.collection: M365-security-compliance ms.topic: article audience: ITPro -ms.date: 04/11/2019 +ms.date: 04/15/2019 --- @@ -2958,24 +2958,24 @@ The following fields are available: ### Microsoft.Windows.Shell.PrivacyNotifierLogging.PrivacyNotifierCompleted -No content is currently available. +This event returns data to report the efficacy of a single-use tool to inform users impacted by a known issue and to take corrective action to address the issue. The following fields are available: -- **cleanupTask** No content is currently available. -- **cleanupTaskResult** No content is currently available. -- **deviceEvaluated** No content is currently available. -- **deviceImpacted** No content is currently available. -- **modalAction** No content is currently available. -- **modalResult** No content is currently available. -- **resetSettingsResult** No content is currently available. +- **cleanupTask** Indicates whether the task that launched the dialog should be cleaned up. +- **cleanupTaskResult** The return code of the attempt to clean up the task used to show the dialog. +- **deviceEvaluated** Indicates whether the device was eligible for evaluation of a known issue. +- **deviceImpacted** Indicates whether the device was impacted by a known issue. +- **modalAction** The action the user took on the dialog that was presented to them. +- **modalResult** The return code of the attempt to show a dialog to the user explaining the issue. +- **resetSettingsResult** The return code of the action to correct the known issue. ## Remediation events ### Microsoft.Windows.Remediation.Applicable -This event indicates whether a remediation plug-in is applicable, to help keep Windows up to date. A remediation plug-in addresses issues on the system that prevent the device from receiving security and quality updates. +deny The following fields are available: @@ -3059,7 +3059,7 @@ The following fields are available: ### Microsoft.Windows.Remediation.Completed -This event is sent when a remediation plug-in has completed, to help keep Windows up to date. A remediation plug-in addresses issues on the system that prevent the device from receiving security and quality updates. +This event is sent when Windows Update Sediment Remediations have completed on a device to keep Windows up to date. The remediations address issues on the system that prevent sediment devices from receiving OS updates. “Sediment” refers to devices that have been on a previous OS version for an extended period. The following fields are available: @@ -3264,13 +3264,13 @@ The following fields are available: ### Microsoft.Windows.Remediation.Started -This event reports whether a plug-in started, to help ensure Windows is up to date. +deny The following fields are available: - **CV** Correlation vector. - **GlobalEventCounter** Client side counter which indicates ordering of events sent by this user. -- **PackageVersion** Current package version of Remediation. +- **PackageVersion** The version of the current remediation package. - **PluginName** Name of the plugin specified for each generic plugin event. - **Result** This is the HRESULT for detection or perform action phases of the plugin. diff --git a/windows/privacy/basic-level-windows-diagnostic-events-and-fields-1709.md b/windows/privacy/basic-level-windows-diagnostic-events-and-fields-1709.md index e82222b6ab..8c42efe77e 100644 --- a/windows/privacy/basic-level-windows-diagnostic-events-and-fields-1709.md +++ b/windows/privacy/basic-level-windows-diagnostic-events-and-fields-1709.md @@ -13,7 +13,7 @@ manager: dansimp ms.collection: M365-security-compliance ms.topic: article audience: ITPro -ms.date: 04/11/2019 +ms.date: 04/15/2019 --- @@ -3146,24 +3146,24 @@ The following fields are available: ### Microsoft.Windows.Shell.PrivacyNotifierLogging.PrivacyNotifierCompleted -No content is currently available. +This event returns data to report the efficacy of a single-use tool to inform users impacted by a known issue and to take corrective action to address the issue. The following fields are available: -- **cleanupTask** No content is currently available. -- **cleanupTaskResult** No content is currently available. -- **deviceEvaluated** No content is currently available. -- **deviceImpacted** No content is currently available. -- **modalAction** No content is currently available. -- **modalResult** No content is currently available. -- **resetSettingsResult** No content is currently available. +- **cleanupTask** Indicates whether the task that launched the dialog should be cleaned up. +- **cleanupTaskResult** The return code of the attempt to clean up the task used to show the dialog. +- **deviceEvaluated** Indicates whether the device was eligible for evaluation of a known issue. +- **deviceImpacted** Indicates whether the device was impacted by a known issue. +- **modalAction** The action the user took on the dialog that was presented to them. +- **modalResult** The return code of the attempt to show a dialog to the user explaining the issue. +- **resetSettingsResult** The return code of the action to correct the known issue. ## Remediation events ### Microsoft.Windows.Remediation.Applicable -This event indicates whether a remediation plug-in is applicable, to help keep Windows up to date. A remediation plug-in addresses issues on the system that prevent the device from receiving security and quality updates. +deny The following fields are available: @@ -3266,7 +3266,7 @@ The following fields are available: ### Microsoft.Windows.Remediation.Completed -This event is sent when a remediation plug-in has completed, to help keep Windows up to date. A remediation plug-in addresses issues on the system that prevent the device from receiving security and quality updates. +This event is sent when Windows Update Sediment Remediations have completed on a device to keep Windows up to date. The remediations address issues on the system that prevent sediment devices from receiving OS updates. “Sediment” refers to devices that have been on a previous OS version for an extended period. The following fields are available: @@ -3399,13 +3399,13 @@ The following fields are available: ### Microsoft.Windows.Remediation.Started -This event reports whether a plug-in started, to help ensure Windows is up to date. +This event is sent when Windows Update Sediment Remediations have started on a device to keep Windows up to date. The remediations address issues on the system that prevent sediment devices from receiving OS updates. “Sediment” refers to devices that have been on a previous OS version for an extended period. The following fields are available: - **CV** Correlation vector. - **GlobalEventCounter** Client side counter which indicates ordering of events sent by this user. -- **PackageVersion** Current package version of Remediation. +- **PackageVersion** The version of the current remediation package. - **PluginName** Name of the plugin specified for each generic plugin event. - **Result** This is the HRESULT for detection or perform action phases of the plugin. @@ -6566,6 +6566,12 @@ The following fields are available: ## Windows Update Reserve Manager events +### Microsoft.Windows.UpdateReserveManager.CommitPendingHardReserveAdjustment + +This event is sent when the Update Reserve Manager commits a hard reserve adjustment that was pending. + + + ### Microsoft.Windows.UpdateReserveManager.InitializeUpdateReserveManager This event returns data about the Update Reserve Manager, including whether it’s been initialized. @@ -6578,6 +6584,12 @@ This event is sent when the Update Reserve Manager removes a pending hard reserv +### Microsoft.Windows.UpdateReserveManager.UpdatePendingHardReserveAdjustment + +This event is sent when the Update Reserve Manager needs to adjust the size of the hard reserve after the option content is installed. + + + ## Winlogon events ### Microsoft.Windows.Security.Winlogon.SetupCompleteLogon diff --git a/windows/privacy/basic-level-windows-diagnostic-events-and-fields-1803.md b/windows/privacy/basic-level-windows-diagnostic-events-and-fields-1803.md index 5339268f09..38e274be19 100644 --- a/windows/privacy/basic-level-windows-diagnostic-events-and-fields-1803.md +++ b/windows/privacy/basic-level-windows-diagnostic-events-and-fields-1803.md @@ -13,7 +13,7 @@ manager: dansimp ms.collection: M365-security-compliance ms.topic: article audience: ITPro -ms.date: 04/11/2019 +ms.date: 04/15/2019 --- @@ -4247,24 +4247,24 @@ The following fields are available: ### Microsoft.Windows.Shell.PrivacyNotifierLogging.PrivacyNotifierCompleted -No content is currently available. +This event returns data to report the efficacy of a single-use tool to inform users impacted by a known issue and to take corrective action to address the issue. The following fields are available: -- **cleanupTask** No content is currently available. -- **cleanupTaskResult** No content is currently available. -- **deviceEvaluated** No content is currently available. -- **deviceImpacted** No content is currently available. -- **modalAction** No content is currently available. -- **modalResult** No content is currently available. -- **resetSettingsResult** No content is currently available. +- **cleanupTask** Indicates whether the task that launched the dialog should be cleaned up. +- **cleanupTaskResult** The return code of the attempt to clean up the task used to show the dialog. +- **deviceEvaluated** Indicates whether the device was eligible for evaluation of a known issue. +- **deviceImpacted** Indicates whether the device was impacted by a known issue. +- **modalAction** The action the user took on the dialog that was presented to them. +- **modalResult** The return code of the attempt to show a dialog to the user explaining the issue. +- **resetSettingsResult** The return code of the action to correct the known issue. ## Remediation events ### Microsoft.Windows.Remediation.Applicable -This event indicates whether a remediation plug-in is applicable, to help keep Windows up to date. A remediation plug-in addresses issues on the system that prevent the device from receiving security and quality updates. +deny The following fields are available: @@ -4368,7 +4368,7 @@ The following fields are available: ### Microsoft.Windows.Remediation.Completed -This event is sent when a remediation plug-in has completed, to help keep Windows up to date. A remediation plug-in addresses issues on the system that prevent the device from receiving security and quality updates. +This event is sent when Windows Update Sediment Remediations have completed on a device to keep Windows up to date. The remediations address issues on the system that prevent sediment devices from receiving OS updates. “Sediment” refers to devices that have been on a previous OS version for an extended period. The following fields are available: @@ -4505,13 +4505,13 @@ The following fields are available: ### Microsoft.Windows.Remediation.Started -This event reports whether a plug-in started, to help ensure Windows is up to date. +This event is sent when Windows Update Sediment Remediations have started on a device to keep Windows up to date. The remediations address issues on the system that prevent sediment devices from receiving OS updates. “Sediment” refers to devices that have been on a previous OS version for an extended period. The following fields are available: - **CV** Correlation vector. - **GlobalEventCounter** Client side counter which indicates ordering of events sent by this user. -- **PackageVersion** Current package version of Remediation. +- **PackageVersion** The version of the current remediation package. - **PluginName** Name of the plugin specified for each generic plugin event. - **Result** This is the HRESULT for detection or perform action phases of the plugin. - **RunCount** The number of times the remediation event started (whether it completed successfully or not). diff --git a/windows/privacy/basic-level-windows-diagnostic-events-and-fields-1809.md b/windows/privacy/basic-level-windows-diagnostic-events-and-fields-1809.md index 9c1f8ed87b..f359c36a0c 100644 --- a/windows/privacy/basic-level-windows-diagnostic-events-and-fields-1809.md +++ b/windows/privacy/basic-level-windows-diagnostic-events-and-fields-1809.md @@ -13,7 +13,7 @@ manager: dansimp ms.collection: M365-security-compliance ms.topic: article audience: ITPro -ms.date: 04/11/2019 +ms.date: 04/15/2019 --- @@ -550,12 +550,10 @@ The following fields are available: - **AppraiserVersion** The version of the appraiser file that is generating the events. - **AvDisplayName** If the app is an anti-virus app, this is its display name. -- **CompateClasIndex** No content is currently available. - **CompatModelIndex** The compatibility prediction for this file. - **HasCitData** Indicates whether the file is present in CIT data. - **HasUpgradeExe** Indicates whether the anti-virus app has an upgrade.exe file. - **IsAv** Is the file an anti-virus reporting EXE? -- **ResolveAd85mpted** No content is currently available. - **ResolveAttempted** This will always be an empty string when sending telemetry. - **SdbEntries** An array of fields that indicates the SDB entries that apply to this file. @@ -591,7 +589,6 @@ This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedevic The following fields are available: - **ActiveNetworkConnection** Indicates whether the device is an active network device. -- **ActiveNetworkCoompction** No content is currently available. - **AppraiserVersion** The version of the appraiser file generating the events. - **CosDeviceRating** An enumeration that indicates if there is a driver on the target operating system. - **CosDeviceSolution** An enumeration that indicates how a driver on the target operating system is available. @@ -2008,7 +2005,6 @@ The following fields are available: - **ServiceMachineIP** Retrieves the IP address of the KMS host used for anti-piracy. - **ServiceMachinePort** Retrieves the port of the KMS host used for anti-piracy. - **ServiceProductKeyID** Retrieves the License key of the KMS -- **SharedpCMode** No content is currently available. - **SharedPCMode** Returns Boolean for education devices used as shared cart - **Signature** Retrieves if it is a signature machine sold by Microsoft store. - **SLICStatus** Whether a SLIC table exists on the device. @@ -2053,7 +2049,6 @@ The following fields are available: - **Sms** Current state of the text messaging setting. - **SpeechPersonalization** Current state of the speech services setting. - **USB** Current state of the USB setting. -- **UserAccotntInformation** No content is currently available. - **UserAccountInformation** Current state of the account information setting. - **UserDataTasks** Current state of the tasks setting. - **UserNotificationListener** Current state of the notifications setting. @@ -2461,10 +2456,8 @@ Describes the installation state for all hardware and software components availa The following fields are available: -- **** No content is currently available. - **action** The change that was invoked on a device inventory object. - **inventoryId** Device ID used for Compatibility testing -- **objectIn** No content is currently available. - **objectInstanceId** Object identity which is unique within the device scope. - **objectType** Indicates the object type that the event applies to. - **syncId** A string used to group StartSync, EndSync, Add, and Remove operations that belong together. This field is unique by Sync period and is used to disambiguate in situations where multiple agents perform overlapping inventories for the same object. @@ -2514,7 +2507,6 @@ This event provides information about the results of installing or uninstalling The following fields are available: -- **`ighestState** No content is currently available. - **capabilities** The names of the optional content packages that were installed. - **clientId** The name of the application requesting the optional content. - **currentID** The ID of the current install session. @@ -2733,7 +2725,6 @@ The following fields are available: - **CanCollectOsTelemetry** True if we can collect diagnostic data telemetry, false otherwise. - **CanCollectWindowsAnalyticsEvents** True if we can collect Windows Analytics data, false otherwise. - **CanPerformDiagnosticEscalations** True if we can perform diagnostic escalation collection, false otherwise. -- **CanPerformDyagnosticEscalations** No content is currently available. - **CanPerformTraceEscalations** True if we can perform trace escalation collection, false otherwise. - **CanReportScenarios** True if we can report scenario completions, false otherwise. - **PreviousPermissions** Bitmask of previous telemetry state. @@ -2746,9 +2737,7 @@ This event sends data about the connectivity status of the Connected User Experi The following fields are available: -- **CensõsTaskEnabled** No content is currently available. - **CensusExitCode** Returns last execution codes from census client run. -- **CensusExitCodeoaderCensusStartTime** No content is currently available. - **CensusStartTime** Returns timestamp corresponding to last successful census run. - **CensusTaskEnabled** Returns Boolean value for the census task (Enable/Disable) on client machine. - **LastConnectivityLossTime** Retrieves the last time the device lost free network. @@ -2763,18 +2752,13 @@ This event sends data about the health and quality of the diagnostic data from t The following fields are available: -- **ꭤ↑롥戅ꔠ촉꤆䳨㢳桜ꀽ㴂颭ྞ䚿ꆁ억ﱎ콧ꓘ먗** No content is currently available. -- **AgentConneCouonErrorsCount** No content is currently available. - **AgentConnectionErrorsCount** Number of non-timeout errors associated with the host/agent channel. -- **CensõsTaskEnabled** No content is currently available. - **CensusExitCode** The last exit code of the Census task. - **CensusStartTime** Time of last Census run. - **CensusTaskEnabled** True if Census is enabled, false otherwise. - **CompressedBytesUploaded** Number of compressed bytes uploaded. -- **ConsumerDrop0edCount** No content is currently available. - **ConsumerDroppedCount** Number of events dropped at consumer layer of telemetry client. - **CriticalDataDbDroppedCount** Number of critical data sampled events dropped at the database layer. -- **CriticalDatasbDroppedCount** No content is currently available. - **CriticalDataThrottleDroppedCount** The number of critical data sampled events that were dropped because of throttling. - **CriticalOverflowEntersCounter** Number of times critical overflow mode was entered in event DB. - **DbCriticalDroppedCount** Total number of dropped critical events in event DB. @@ -2783,7 +2767,6 @@ The following fields are available: - **DbDroppedFullCount** Number of events dropped due to DB fullness. - **DecodingDroppedCount** Number of events dropped due to decoding failures. - **EnteringCriticalOverflowDroppedCounter** Number of events dropped due to critical overflow mode being initiated. -- **EnteringCriticalOverflowDrOppedCounter** No content is currently available. - **EtwDroppedBufferCount** Number of buffers dropped in the UTC ETW session. - **EtwDroppedCount** Number of events dropped at ETW layer of telemetry client. - **EventsPersistedCount** Number of events that reached the PersistEvent stage. @@ -2797,55 +2780,26 @@ The following fields are available: - **FullTriggerBufferDroppedCount** Number of events dropped due to trigger buffer being full. - **HeartBeatSequenceNumber** The sequence number of this heartbeat. - **InvalidHttpCodeCount** Number of invalid HTTP codes received from contacting Vortex. -- **LastAgentConneCouonError** No content is currently available. - **LastAgentConnectionError** Last non-timeout error encountered in the host/agent channel. - **LastEventSizeOffender** Event name of last event which exceeded max event size. - **LastInvalidHttpCode** Last invalid HTTP code received from Vortex. -- **MaxACouveAgentConneCouonCount** No content is currently available. - **MaxActiveAgentConnectionCount** The maximum number of active agents during this heartbeat timeframe. - **MaxInUseScenarioCounter** Soft maximum number of scenarios loaded by UTC. -- **ᴗ㜛ﭮ紀⁻嬝藱唬穉聮쁪カ鳄髈** No content is currently available. - **PreviousHeartBeatTime** Time of last heartbeat event (allows chaining of events). - **PrivacyBlockedCount** The number of events blocked due to privacy settings or tags. -- **RepeatedUploadFailur$Dropped** No content is currently available. - **RepeatedUploadFailureDropped** Number of events lost due to repeated upload failures for a single buffer. -- **RepeatedUpѬoadFailureDropped** No content is currently available. -- **sbCriticalDroppedCount** No content is currently available. -- **sbDroppedCount** No content is currently available. -- **sbDroppedFailureCount** No content is currently available. -- **sbDroppedFullCount** No content is currently available. - **SettingsHttpAttempts** Number of attempts to contact OneSettings service. - **SettingsHttpFailures** The number of failures from contacting the OneSettings service. -- **sorBdingDroppedCount** No content is currently available. - **ThrottledDroppedCount** Number of events dropped due to throttling of noisy providers. -- **ThrottlgdDroppedCount** No content is currently available. - **TopUploaderErrors** List of top errors received from the upload endpoint. -- **TopUploaeerErrors** No content is currently available. - **UploaderDroppedCount** Number of events dropped at the uploader layer of telemetry client. - **UploaderErrorCount** Number of errors received from the upload endpoint. -- **ǔ໦岋ࣉ䫕꧓ꏖ훭늓겲均効座⺽ඕ��嘩璽춒** No content is currently available. - **VortexFailuresTimeout** The number of timeout failures received from Vortex. - **VortexHttpAttempts** Number of attempts to contact Vortex. - **VortexHttpFailures4xx** Number of 400-499 error codes received from Vortex. - **VortexHttpFailures5xx** Number of 500-599 error codes received from Vortex. - **VortexHttpResponseFailures** Number of Vortex responses that are not 2XX or 400. - **VortexHttpResponsesWithDroppedEvents** Number of Vortex responses containing at least 1 dropped event. -- **ჯ⌷脻㍛䮥肑鍼Ⅵ䄪ꬃ鳃抍⓯钑볨䨎ᖪ먩諢涇͙켦榩偊撏嫄艸** No content is currently available. -- **반쐍⾋ꯈ��玱䁕��龓ⴶ샴賷헖쉺分╅㾚흦დ** No content is currently available. -- **빛䨮哆茠뢶☲偍矉繡귴틐⤺॓酠ꐜ⇫ꈚᑋ勰叙湧ㆧ噟ܝ㸇朤ಳ** No content is currently available. -- **쩤খ䠸퇫秂窇벘货齳��ꕢ顦ᜃⲎ耡��옥䦏��淨㖘⃵┵ᘵ鳝톈如癶첛ᲃ絍** No content is currently available. -- **퓙쏴撑⋇뭟혦꩑戙厀뎓燼㼿渺** No content is currently available. -- **훾電쇔䕅碎霶퍕◲⫒븩ὴ앏艐堗详鲝‶ᜧ** No content is currently available. -- **军伽礋圿萦꒎㲮꿨휒慢䷳橱瘒糜劷墹鎗ꭖ潨ᓔ** No content is currently available. -- **唹켴亰铳ᮍ㭨狣N洹滓ꦲ횴䝃怭픱烰彧魋阭刏⅄ꙹ꯬襖** No content is currently available. -- **櫠䰩遗ᆖᑒ��噊썻ࣆ鮷��㑡Ḯ偬ƚ㣸☂灚Ἇ汆磚䐯槴** No content is currently available. -- **蔇İᏘ࢔谼��ﰊ庸涝芦ᅳ蔭隷嵨̐ꊰ** No content is currently available. -- **裎墴_郐堩��ᴰ뵾핝㳊愨鳘鯡廭顩圧由꽆餢俗䡄ﳻ捳褮ꨞ㵙钫욯홏Ը໤ꖠ䬞悺俽** No content is currently available. -- **趬ᛉ뛀䲮憎** No content is currently available. -- **铽ჟᔛ}䘅��讀랃帷덉侙쩠뙆档玳꼱** No content is currently available. -- **㝫��粆疺⃩��렩榽ႚൾ滑햓ꎢ** No content is currently available. -- **㮆퍈栵ᥳⷣ뤏䳬HttpAttempts** No content is currently available. -- **䱪��໿��雔僽땧觪⊝쵥虚䧁嶟轶** No content is currently available. ### TelClientSynthetic.HeartBeat_Aria_5 @@ -2862,7 +2816,6 @@ The following fields are available: - **DbDroppedFailureCount** Number of events dropped due to database failures. - **DbDroppedFullCount** Number of events dropped due to database being full. - **EnteringCriticalOverflowDroppedCounter** Number of events dropped due to critical overflow mode being initiated. -- **EnteringCriticalOverflowDrOppedCounter** No content is currently available. - **EventsPersistedCount** Number of events that reached the PersistEvent stage. - **EventStoreLifetimeResetCounter** Number of times the event store has been reset. - **EventStoreResetCounter** Number of times the event store has been reset during this heartbeat. @@ -2870,18 +2823,14 @@ The following fields are available: - **EventsUploaded** Number of events uploaded. - **HeartBeatSequenceNumber** The sequence number of this heartbeat. - **InvalidHttpCodeCount** Number of invalid HTTP codes received from contacting Vortex. -- **InvalidHttpCsdeCount** No content is currently available. - **LastEventSizeOffender** Event name of last event which exceeded max event size. - **LastInvalidHttpCode** Last invalid HTTP code received from Vortex. -- **LastInvalidHttpCsde** No content is currently available. - **PreviousHeartBeatTime** The FILETIME of the previous heartbeat fire. - **PrivacyBlockedCount** The number of events blocked due to privacy settings or tags. -- **RepeatedUploadFailur$Dropped** No content is currently available. - **RepeatedUploadFailureDropped** Number of events lost due to repeated upload failures for a single buffer. - **SettingsHttpAttempts** Number of attempts to contact OneSettings service. - **SettingsHttpFailures** Number of failures from contacting OneSettings service. - **TopUploaderErrors** List of top errors received from the upload endpoint. -- **TopUploaeerErrors** No content is currently available. - **UploaderDroppedCount** Number of events dropped at the uploader layer of telemetry client. - **UploaderErrorCount** Number of errors received from the upload endpoint. - **VortexFailuresTimeout** Number of time out failures received from Vortex. @@ -3456,43 +3405,30 @@ The following fields are available: - **AdapterTypeValue** The numeric value indicating the type of Graphics adapter. - **aiSeqId** The event sequence ID. - **bootId** The system boot ID. -- **BraghtnessVersionViaDDI** No content is currently available. - **BrightnessVersionViaDDI** The version of the Display Brightness Interface. -- **BrightnessVersionVyaDDI** No content is currently available. - **ComputePreemptionLevel** The maximum preemption level supported by GPU for compute payload. -- **DedDcatedSystemMemoryB** No content is currently available. -- **DedDcatedVideoMemoryB** No content is currently available. - **DedicatedSystemMemoryB** The amount of system memory dedicated for GPU use (in bytes). - **DedicatedVideoMemoryB** The amount of dedicated VRAM of the GPU (in bytes). - **DisplayAdapterLuid** The display adapter LUID. -- **DisplayAdapTerLuid** No content is currently available. - **DriverDate** The date of the display driver. - **DriverRank** The rank of the display driver. - **DriverVersion** The display driver version. - **DX10UMDFilePath** The file path to the location of the DirectX 10 Display User Mode Driver in the Driver Store. -- **DX11EMDFilePath** No content is currently available. - **DX11UMDFilePath** The file path to the location of the DirectX 11 Display User Mode Driver in the Driver Store. - **DX12UMDFilePath** The file path to the location of the DirectX 12 Display User Mode Driver in the Driver Store. - **DX9UMDFilePath** The file path to the location of the DirectX 9 Display User Mode Driver in the Driver Store. -- **FX9UMDFilePath** No content is currently available. -- **GPQPreemptionLevel** No content is currently available. - **GPUDeviceID** The GPU device ID. - **GPUPreemptionLevel** The maximum preemption level supported by GPU for graphics payload. - **GPURevisionID** The GPU revision ID. - **GPUVendorID** The GPU vendor ID. -- **I3SoftwareDevice** No content is currently available. - **InterfaceId** The GPU interface ID. -- **InturfaceId** No content is currently available. -- **Is@ybridDiscrete** No content is currently available. - **IsDisplayDevice** Does the GPU have displaying capabilities? - **IsHwSchSupported** Indicates whether the adapter supports hardware scheduling. - **IsHybridDiscrete** Does the GPU have discrete GPU capabilities in a hybrid device? - **IsHybridIntegrated** Does the GPU have integrated GPU capabilities in a hybrid device? -- **IsHyrridDiscrete** No content is currently available. - **IsLDA** Is the GPU comprised of Linked Display Adapters? - **IsMiracastSupported** Does the GPU support Miracast? - **IsMismatchLDA** Is at least one device in the Linked Display Adapters chain from a different vendor? -- **IsMismaTchLDA** No content is currently available. - **IsMPOSupported** Does the GPU support Multi-Plane Overlays? - **IsMsMiracastSupported** Are the GPU Miracast capabilities driven by a Microsoft solution? - **IsPostAdapter** Is this GPU the POST GPU in the device? @@ -3507,17 +3443,10 @@ The following fields are available: - **SharedSystemMemoryB** The amount of system memory shared by GPU and CPU (in bytes). - **SubSystemID** The subsystem ID. - **SubVendorID** The GPU sub vendor ID. -- **Tele}etryEnabled** No content is currently available. - **TelemetryEnabled** Is the device listening to MICROSOFT_KEYWORD_TELEMETRY? -- **TelInv2YntTrigger** No content is currently available. - **TelInvEvntTrigger** What triggered this event to be logged? Example: 0 (GPU enumeration) or 1 (DxgKrnlTelemetry provider toggling) -- **TX10UMDFilePath** No content is currently available. - **version** The event version. - **WDDMVersion** The Windows Display Driver Model version. -- **WPUPreemptionLevel** No content is currently available. -- **YsDisplayDevice** No content is currently available. -- **YsLDA** No content is currently available. -- **YsRenderDevice** No content is currently available. ## Failover Clustering events @@ -3603,42 +3532,24 @@ This event sends data about crashes for both native and managed applications, to The following fields are available: -- **.xceptionCode** No content is currently available. -- **.xceptionOffset** No content is currently available. -- **ags** No content is currently available. - **AppName** The name of the app that has crashed. - **AppSessionGuid** GUID made up of process ID and is used as a correlation vector for process instances in the telemetry backend. - **AppTimeStamp** The date/time stamp of the app. - **AppVersion** The version of the app that has crashed. -- **argetAsId** No content is currently available. -- **argetAsppId** No content is currently available. -- **argetAsppVer** No content is currently available. -- **d** No content is currently available. - **ExceptionCode** The exception code returned by the process that has crashed. - **ExceptionOffset** The address where the exception had occurred. - **Flags** Flags indicating how reporting is done. For example, queue the report, do not offer JIT debugging, or do not terminate the process after reporting. - **FriendlyAppName** The description of the app that has crashed, if different from the AppName. Otherwise, the process name. - **IsFatal** True/False to indicate whether the crash resulted in process termination. -- **Modame** No content is currently available. - **ModName** Exception module name (e.g. bar.dll). - **ModTimeStamp** The date/time stamp of the module. - **ModVersion** The version of the module that has crashed. -- **nCode** No content is currently available. -- **Pack9OeFullName** No content is currently available. -- **Pack9OeRelativeAppId** No content is currently available. -- **PackageFullame** No content is currently available. -- **PackageFullFame** No content is currently available. - **PackageFullName** Store application identity. - **PackageRelativeAppId** Store application identity. -- **ProcessArchite2kure** No content is currently available. - **ProcessArchitecture** Architecture of the crashing process, as one of the PROCESSOR_ARCHITECTURE_* constants: 0: PROCESSOR_ARCHITECTURE_INTEL. 5: PROCESSOR_ARCHITECTURE_ARM. 9: PROCESSOR_ARCHITECTURE_AMD64. 12: PROCESSOR_ARCHITECTURE_ARM64. - **ProcessCreateTime** The time of creation of the process that has crashed. - **ProcessId** The ID of the process that has crashed. -- **pSessionGuid** No content is currently available. - **ReportId** A GUID used to identify the report. This can used to track the report across Watson. -- **RepoztId** No content is currently available. -- **TargetAId** No content is currently available. -- **TargetAppI4StartTime** No content is currently available. - **TargetAppId** The kernel reported AppId of the application being reported. - **TargetAppVer** The specific version of the application being reported - **TargetAsId** The sequence number for the hanging process. @@ -3764,19 +3675,15 @@ The following fields are available: - **InstallDateArpLastModified** The date of the registry ARP key for a given application. Hints at install date but not always accurate. Passed as an array. Example: 4/11/2015 00:00:00 - **InstallDateFromLinkFile** The estimated date of install based on the links to the files. Passed as an array. - **InstallDateMsi** The install date if the application was installed via Microsoft Installer (MSI). Passed as an array. -- **InstallDatgArpLastModified** No content is currently available. - **InventoryVersion** The version of the inventory file generating the events. - **Language** The language code of the program. - **MsiPackageCode** A GUID that describes the MSI Package. Multiple 'Products' (apps) can make up an MsiPackage. -- **MsiPackageColm** No content is currently available. - **MsiProductCode** A GUID that describe the MSI Product. - **Name** The name of the application. - **OSVersionAtInstallTime** The four octets from the OS version at the time of the application's install. -- **OSVersionAtInstallTioe** No content is currently available. - **PackageFullName** The package full name for a Store application. - **ProgramInstanceId** A hash of the file IDs in an app. - **Publisher** The Publisher of the application. Location pulled from depends on the 'Source' field. -- **RackageFullName** No content is currently available. - **RootDirPath** The path to the root directory where the program was installed. - **Source** How the program was installed (for example, ARP, MSI, Appx). - **StoreAppType** A sub-classification for the type of Microsoft Store app, such as UWP or Win8StoreApp. @@ -3874,7 +3781,6 @@ The following fields are available: - **ModelId** A unique model ID. - **ModelName** The model name. - **ModelNumber** The model number for the device container. -- **primaryCategory** No content is currently available. - **PrimaryCategory** The primary category for the device container. @@ -4031,9 +3937,7 @@ This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedevic The following fields are available: -- **inventoryId** No content is currently available. - **InventoryVersion** The version of the inventory file generating the events. -- **syncId** No content is currently available. ### Microsoft.Windows.Inventory.Core.InventoryDevicePnpStartSync @@ -4092,11 +3996,9 @@ The following fields are available: - **ImageSize** The size of the driver file. - **Inf** The name of the INF file. - **InventoryVersion** The version of the inventory file generating the events. -- **LriverName** No content is currently available. - **Product** The product name that is included in the driver file. - **ProductVersion** The product version that is included in the driver file. - **Service** The name of the service that is installed for the device. -- **TriverSigned** No content is currently available. - **WdfVersion** The Windows Driver Framework version. @@ -4170,8 +4072,7 @@ This event collects traces of all other Core events, not used in typical custome The following fields are available: -- **key** No content is currently available. -- **UniqueKey** No content is currently available. +- **key** The globally unique identifier (GUID) used to identify the specific Json Trace logging session. ### Microsoft.Windows.Inventory.Core.StopUtcJsonTrace @@ -4180,7 +4081,7 @@ This event collects traces of all other Core events, not used in typical custome The following fields are available: -- **key** No content is currently available. +- **key** The globally unique identifier (GUID) used to identify the specific Json Trace logging session. ### Microsoft.Windows.Inventory.General.AppHealthStaticAdd @@ -4621,24 +4522,19 @@ OS information collected during Boot, used to evaluate the success of the upgrad The following fields are available: -- **BootApplicatio~Id** No content is currently available. - **BootApplicationId** This field tells us what the OS Loader Application Identifier is. - **BootAttemptCount** The number of consecutive times the boot manager has attempted to boot into this operating system. - **BootSequence** The current Boot ID, used to correlate events related to a particular boot session. -- **BootSequenft** No content is currently available. - **BootStatusPolicy** Identifies the applicable Boot Status Policy. - **BootType** Identifies the type of boot (e.g.: "Cold", "Hiber", "Resume"). - **EventTimestamp** Seconds elapsed since an arbitrary time point. This can be used to identify the time difference in successive boot attempts being made. - **FirmwareResetReasonEmbeddedController** Reason for system reset provided by firmware. -- **FirmwareresetReasonEmbeddedControllerAdditional** No content is currently available. - **FirmwareResetReasonEmbeddedControllerAdditional** Additional information on system reset reason provided by firmware if needed. - **FirmwareResetReasonPch** Reason for system reset provided by firmware. - **FirmwareResetReasonPchAdditional** Additional information on system reset reason provided by firmware if needed. -- **FirmwareResetReasonPchADditional** No content is currently available. - **FirmwareResetReasonSupplied** Flag indicating that a reason for system reset was provided by firmware. - **IO** Amount of data written to and read from the disk by the OS Loader during boot. See [IO](#io). - **LastBootSucceeded** Flag indicating whether the last boot was successful. -- **LastBootSucceedEd** No content is currently available. - **LastShutdownSucceeded** Flag indicating whether the last shutdown was successful. - **MaxAbove4GbFreeRange** This field describes the largest memory range available above 4Gb. - **MaxBelow4GbFreeRange** This field describes the largest memory range available below 4Gb. @@ -4664,6 +4560,19 @@ The following fields are available: - **objectCount** The count of the number of objects that are being transferred. +### Microsoft.Windows.MigrationCore.MigObjectCountKFUsr + +No content is currently available. + +The following fields are available: + +- **currentSid** No content is currently available. +- **knownFolderLoc->DirName->CString** No content is currently available. +- **knownFoldersUsr[i]** No content is currently available. +- **migDiagSession->CString** No content is currently available. +- **objectCount** No content is currently available. + + ## Miracast events ### Microsoft.Windows.Cast.Miracast.MiracastSessionEnd @@ -4900,17 +4809,17 @@ The following fields are available: ### Microsoft.Windows.Remediation.Applicable -This event indicates whether a remediation plug-in is applicable, to help keep Windows up to date. A remediation plug-in addresses issues on the system that prevent the device from receiving security and quality updates. +This event indicates whether Windows Update Sediment Remediations need to be applied to a device to keep Windows up to date. The remediations address issues on the system that prevent sediment devices from receiving OS updates. “Sediment” refers to devices that have been on a previous OS version for an extended period. The following fields are available: - **AllowAutoUpdateExists** Indicates whether the Automatic Update feature is turned on. -- **AllowAutoUpdateProviderSetExists** No content is currently available. +- **AllowAutoUpdateProviderSetExists** Indicates whether the Allow Automatic Update provider exists. - **AppraiserBinariesValidResult** Indicates whether plug-in was appraised as valid. - **AppraiserRegistryValidResult** Indicates whether the registry entry checks out as valid. - **AppraiserTaskRepairDisabled** Task repair performed by the appraiser plugin is disabled. - **AppraiserTaskValid** Indicates that the appraiser task is valid. -- **AUOptionsExists** Indicates whether the Automatic Update option exist. +- **AUOptionsExists** Indicates whether automatic update options exist. - **CTACTargetingAttributesInvalid** Indicates whether the Common Targeting Attribute Client (CTAC) attributes are valid. CTAC is a Windows Runtime client library. - **CTACVersion** The Common Targeting Attribute Client (CTAT) version on the device. CTAT is a Windows Runtime client library. - **CV** Correlation vector @@ -4965,10 +4874,10 @@ The following fields are available: - **PluginName** Name of the plugin specified for each generic plugin event. - **ProductType** The product type of Windows 10. - **QualityUpdateSedimentFunnelState** Provides information about whether Windows Quality Updates are missing on the device. -- **QualityUpdateSedimentJsonSchemaVersion** No content is currently available. -- **QualityUpdateSedimentLastRunSeconds** The number of seconds since the Quality Update Sediment Pack ran. +- **QualityUpdateSedimentJsonSchemaVersion** The schema version of the Quality Update Sediment Remediation. +- **QualityUpdateSedimentLastRunSeconds** The number of seconds since the Quality Updates were run - **QualityUpdateSedimentLocalStartTime** Provides information about when Quality Updates were run. -- **QualityUpdateSedimentLocaltTime** No content is currently available. +- **QualityUpdateSedimentLocaltTime** The local time of the device running the Quality Update Sediment Remediation. - **QualityUpdateSedimentTargetedPlugins** Provides the list of remediation plug-ins that are applicable to enable Quality Updates on the device. - **QualityUpdateSedimentTargetedTriggers** Provides information about remediations that are applicable to enable Quality Updates on the device. - **RegkeysExist** Indicates whether specified registry keys exist. @@ -5033,7 +4942,7 @@ The following fields are available: - **RemediationNotifyUserFixIssuesIsUserLoggedIn** Indicates whether the remediation can take place when a non-Administrator is logged in. - **RemediationProgramDataFolderSizeInMB** The size (in megabytes) of the Program Data folder on the device. - **RemediationProgramFilesFolderSizeInMB** The size (in megabytes) of the Program Files folder on the device. -- **RemediationShellDeviceApplicabilityFailedReason** No content is currently available. +- **RemediationShellDeviceApplicabilityFailedReason** The reason the Remediation is not applicable to the device (expressed as a bitmap). - **RemediationShellDeviceEducationSku** Indicates whether a Windows 10 Education edition is detected on the device. - **RemediationShellDeviceEnterpriseSku** Indicates whether a Windows 10 Enterprise edition is detected on the device. - **RemediationShellDeviceFeatureUpdatesPaused** Indicates whether Feature Updates are paused on the device. @@ -5044,13 +4953,13 @@ The following fields are available: - **RemediationShellDeviceProSku** Indicates whether a Windows 10 Professional edition is detected. - **RemediationShellDeviceQualityUpdatesPaused** Indicates whether Quality Updates are paused on the device. - **RemediationShellDeviceSccm** TRUE if the device is managed by SCCM (Microsoft System Center Configuration Manager). -- **RemediationShellDeviceSedimentMutexInUse** No content is currently available. +- **RemediationShellDeviceSedimentMutexInUse** Indicates whether the Sediment Pack mutual exclusion object (mutex) is in use. - **RemediationShellDeviceSetupMutexInUse** Indicates whether device setup is in progress. - **RemediationShellDeviceWuRegistryBlocked** Indicates whether the Windows Update is blocked on the device via the registry. - **RemediationShellDeviceZeroExhaust** TRUE if the device has opted out of Windows Updates completely. -- **RemediationShellHasExpired** No content is currently available. -- **RemediationShellHasUpgraded** No content is currently available. -- **RemediationShellIsDeviceApplicable** No content is currently available. +- **RemediationShellHasExpired** Indicates whether the Remediation iterations have ended. +- **RemediationShellHasUpgraded** Indicates whether the device upgraded. +- **RemediationShellIsDeviceApplicable** Indicates whether the Remediation is applicable to the device. - **RemediationTargetMachine** Indicates whether the device is a target of the specified fix. - **RemediationTaskHealthAutochkProxy** True/False based on the health of the AutochkProxy task. - **RemediationTaskHealthChkdskProactiveScan** True/False based on the health of the Check Disk task. @@ -5080,21 +4989,21 @@ The following fields are available: - **TimeServiceSyncDomainJoined** True if device domain joined and hence uses DC for clock. - **TimeServiceSyncType** Type of sync behavior for Date & Time service on device. - **uninstallActiveValue** Indicates whether an uninstall is in progress. -- **UpdateApplicabilityFixerTriggerBitMap** No content is currently available. -- **UpdateRebootTime** No content is currently available. -- **usoScanHoursSinceLastScan** No content is currently available. -- **usoScanPastThreshold** No content is currently available. -- **WindowsHiberFilSysSizeInMegabytes** No content is currently available. -- **WindowsInstallerFolderSizeInMegabytes** No content is currently available. -- **WindowsPageFileSysSizeInMegabytes** No content is currently available. -- **WindowsSoftwareDistributionFolderSizeInMegabytes** No content is currently available. -- **WindowsSwapFileSysSizeInMegabytes** No content is currently available. -- **WindowsSxsFolderSizeInMegabytes** No content is currently available. +- **UpdateApplicabilityFixerTriggerBitMap** A bitmap containing the reason(s) why the Update Applicability Fixer Plugin was executed. +- **UpdateRebootTime** The amount of time it took to reboot to install the updates. +- **usoScanHoursSinceLastScan** The number of hours since the last scan by the Update Service Orchestrator (USO). +- **usoScanPastThreshold** Indicates whether the Update Service Orchestrator (USO) scan is overdue. +- **WindowsHiberFilSysSizeInMegabytes** The size of the Windows Hibernation file, in megabytes. +- **WindowsInstallerFolderSizeInMegabytes** The size of the Windows Installer folder, in megabytes. +- **WindowsPageFileSysSizeInMegabytes** The size of the Windows Page file, in megabytes. +- **WindowsSoftwareDistributionFolderSizeInMegabytes** The size of the Software Distribution folder, in megabytes. +- **WindowsSwapFileSysSizeInMegabytes** The size of the Windows Swap file, in megabytes. +- **WindowsSxsFolderSizeInMegabytes** The size of the WinSxS (Windows Side-by-Side) folder, in megabytes. ### Microsoft.Windows.Remediation.Completed -This event is sent when a remediation plug-in has completed, to help keep Windows up to date. A remediation plug-in addresses issues on the system that prevent the device from receiving security and quality updates. +This event is sent when Windows Update Sediment Remediations have completed on a device to keep Windows up to date. The remediations address issues on the system that prevent sediment devices from receiving OS updates. “Sediment” refers to devices that have been on a previous OS version for an extended period. The following fields are available: @@ -5107,9 +5016,9 @@ The following fields are available: - **DiskFreeSpaceBeforeSedimentPackInMB** The amount of free disk space (in megabytes) before executing the Sediment Pack. - **DiskMbFreeAfterCleanup** The amount of free hard disk space after cleanup, measured in Megabytes. - **DiskMbFreeBeforeCleanup** The amount of free hard disk space before cleanup, measured in Megabytes. -- **DiskSpaceCleanedByComponentCleanup** No content is currently available. -- **DiskSpaceCleanedByNGenRemoval** No content is currently available. -- **DiskSpaceCleanedByRestorePointRemoval** No content is currently available. +- **DiskSpaceCleanedByComponentCleanup** The amount of disk space (in megabytes) in the component store that was cleaned up by the plug-in. +- **DiskSpaceCleanedByNGenRemoval** The amount of diskspace (megabytes) in the Native Image Generator (NGEN) cache that was cleaned up by the plug-in. +- **DiskSpaceCleanedByRestorePointRemoval** The amount of disk space (megabytes) in restore points that was cleaned up by the plug-in. - **ForcedAppraiserTaskTriggered** TRUE if Appraiser task ran from the plug-in. - **GlobalEventCounter** Client-side counter that indicates ordering of events sent by the active user. - **HandlerCleanupFreeDiskInMegabytes** The amount of hard disk space cleaned by the storage sense handlers, measured in Megabytes. @@ -5125,57 +5034,57 @@ The following fields are available: - **PluginName** The name of the plug-in specified for each generic plug-in event. - **QualityUpdateSedimentExecutedPlugins** The number of plug-ins executed by the Windows Quality Update remediation. - **QualityUpdateSedimentFunnelState** The state of the Windows Quality Update remediation funnel for the device. -- **QualityUpdateSedimentJsonSchemaVersion** No content is currently available. +- **QualityUpdateSedimentJsonSchemaVersion** The schema version of the Quality Update Sediment Remediation. - **QualityUpdateSedimentLocalEndTime** The local time on the device when the Windows Quality Update remediation executed. -- **QualityUpdateSedimentLocaltTime** No content is currently available. +- **QualityUpdateSedimentLocaltTime** The local time of the device running the Quality Update Sediment Remediation. - **QualityUpdateSedimentMatchedTriggers** The list of triggers that were matched by the Windows Quality Update remediation. - **QualityUpdateSedimentModelExecutionSeconds** The number of seconds needed to execute the Windows Quality Update remediation. -- **recoveredFromTargetOS** No content is currently available. +- **recoveredFromTargetOS** Indicates whether the device recovered from the target operating system (OS). - **RemediationBatteryPowerBatteryLevel** Indicates the battery level at which it is acceptable to continue operation. - **RemediationBatteryPowerExitDueToLowBattery** True when we exit due to low battery power. - **RemediationBatteryPowerOnBattery** True if we allow execution on battery. -- **RemediationCbsTempDiskSpaceCleanedInMB** No content is currently available. -- **RemediationCbsTempEstimateInMB** No content is currently available. -- **RemediationComponentCleanupEstimateInMB** No content is currently available. +- **RemediationCbsTempDiskSpaceCleanedInMB** The amount of space (in megabytes) that the plug-in cleaned up in the CbsTemp folder. +- **RemediationCbsTempEstimateInMB** The amount of space (megabytes) in the CbsTemp folder that is available for cleanup by the plug-in. +- **RemediationComponentCleanupEstimateInMB** The amount of space (megabytes) in the WinSxS (Windows Side-by-Side) folder that is available for cleanup by the plug-in. - **RemediationConfigurationTroubleshooterIpconfigFix** TRUE if IPConfig Fix completed successfully. - **RemediationConfigurationTroubleshooterNetShFix** TRUE if network card cache reset ran successfully. - **RemediationCorruptionRepairCorruptionsDetected** Number of corruptions detected on the device. - **RemediationCorruptionRepairCorruptionsFixed** Number of detected corruptions that were fixed on the device. - **RemediationCorruptionRepairPerformActionSuccessful** Indicates whether corruption repair was successful on the device. -- **RemediationDiskCleanupSearchFileSizeInMB** No content is currently available. -- **RemediationDiskSpaceSavedByCompressionInMB** No content is currently available. -- **RemediationDiskSpaceSavedByUserProfileCompressionInMB** No content is currently available. +- **RemediationDiskCleanupSearchFileSizeInMB** The size of the Cleanup Search index file, measured in megabytes. +- **RemediationDiskSpaceSavedByCompressionInMB** The amount of disk space (megabytes) that was compressed by the plug-in. +- **RemediationDiskSpaceSavedByUserProfileCompressionInMB** The amount of User disk space (in megabytes) that was compressed by the plug-in. - **remediationExecution** Remediation shell is in "applying remediation" state. -- **RemediationHandlerCleanupEstimateInMB** No content is currently available. +- **RemediationHandlerCleanupEstimateInMB** The estimated amount of disk space (in megabytes) to be cleaned up by running Storage Sense. - **RemediationHibernationMigrated** TRUE if hibernation was migrated. - **RemediationHibernationMigrationSucceeded** TRUE if hibernation migration succeeded. - **RemediationNGenDiskSpaceRestored** The amount of disk space (in megabytes) that was restored after re-running the Native Image Generator (NGEN). -- **RemediationNGenEstimateInMB** No content is currently available. +- **RemediationNGenEstimateInMB** The amount of disk space (in megabytes) estimated to be in the Native Image Generator (NGEN) cache by the plug-in. - **RemediationNGenMigrationSucceeded** Indicates whether the Native Image Generator (NGEN) migration succeeded. -- **RemediationRestorePointEstimateInMB** No content is currently available. -- **RemediationSearchFileSizeEstimateInMB** No content is currently available. +- **RemediationRestorePointEstimateInMB** The amount of disk space (in megabytes) estimated to be used by storage points found by the plug-in. +- **RemediationSearchFileSizeEstimateInMB** The amount of disk space (megabytes) estimated to be used by the Cleanup Search index file found by the plug-in. - **RemediationShellHasUpgraded** TRUE if the device upgraded. - **RemediationShellMinimumTimeBetweenShellRuns** Indicates the time between shell runs exceeded the minimum required to execute plugins. - **RemediationShellRunFromService** TRUE if the shell driver was run from the service. - **RemediationShellSessionIdentifier** Unique identifier tracking a shell session. - **RemediationShellSessionTimeInSeconds** Indicates the time the shell session took in seconds. - **RemediationShellTaskDeleted** Indicates that the shell task has been deleted so no additional sediment pack runs occur for this installation. -- **RemediationSoftwareDistributionCleanedInMB** No content is currently available. -- **RemediationSoftwareDistributionEstimateInMB** No content is currently available. -- **RemediationTotalDiskSpaceCleanedInMB** No content is currently available. +- **RemediationSoftwareDistributionCleanedInMB** The amount of disk space (megabytes) in the Software Distribution folder that was cleaned up by the plug-in. +- **RemediationSoftwareDistributionEstimateInMB** The amount of disk space (megabytes) in the Software Distribution folder that is available for clean up by the plug-in. +- **RemediationTotalDiskSpaceCleanedInMB** The total disk space (in megabytes) that was cleaned up by the plug-in. - **RemediationUpdateServiceHealthRemediationResult** The result of the Update Service Health plug-in. - **RemediationUpdateTaskHealthRemediationResult** The result of the Update Task Health plug-in. - **RemediationUpdateTaskHealthTaskList** A list of tasks fixed by the Update Task Health plug-in. -- **RemediationUserFolderCompressionEstimateInMB** No content is currently available. -- **RemediationUserProfileCompressionEstimateInMB** No content is currently available. +- **RemediationUserFolderCompressionEstimateInMB** The amount of disk space (in megabytes) estimated to be compressible in User folders by the plug-in. +- **RemediationUserProfileCompressionEstimateInMB** The amount of disk space (megabytes) estimated to be compressible in User Profile folders by the plug-in. - **RemediationUSORebootRequred** Indicates whether a reboot is determined to be required by calling the Update Service Orchestrator (USO). -- **RemediationWindowsCompactedEstimateInMB** No content is currently available. -- **RemediationWindowsLogSpaceEstimateInMB** No content is currently available. +- **RemediationWindowsCompactedEstimateInMB** The amount of disk space (megabytes) estimated to be available by compacting the operating system using the plug-in. +- **RemediationWindowsLogSpaceEstimateInMB** The amount of disk space (in megabytes) available in Windows logs that can be cleaned by the plug-in. - **RemediationWindowsLogSpaceFreed** The amount of disk space freed by deleting the Windows log files, measured in Megabytes. -- **RemediationWindowsOldSpaceEstimateInMB** No content is currently available. -- **RemediationWindowsSpaceCompactedInMB** No content is currently available. -- **RemediationWindowsStoreSpaceCleanedInMB** No content is currently available. -- **RemediationWindowsStoreSpaceEstimateInMB** No content is currently available. +- **RemediationWindowsOldSpaceEstimateInMB** The amount of disk space (megabytes) in the Windows.OLD folder that can be cleaned up by the plug-in. +- **RemediationWindowsSpaceCompactedInMB** The amount of disk space (megabytes) that can be cleaned up by the plug-in. +- **RemediationWindowsStoreSpaceCleanedInMB** The amount of disk space (megabytes) from the Windows Store cache that was cleaned up by the plug-in. +- **RemediationWindowsStoreSpaceEstimateInMB** The amount of disk space (megabytes) in the Windows store cache that is estimated to be cleanable by the plug-in. - **Result** The HRESULT for Detection or Perform Action phases of the plug-in. - **RunCount** The number of times the plugin has executed. - **RunResult** The HRESULT for Detection or Perform Action phases of the plug-in. @@ -5208,40 +5117,40 @@ The following fields are available: ### Microsoft.Windows.Remediation.Started -This event reports whether a plug-in started, to help ensure Windows is up to date. +This event is sent when Windows Update Sediment Remediations have started on a device to keep Windows up to date. The remediations address issues on the system that prevent sediment devices from receiving OS updates. “Sediment” refers to devices that have been on a previous OS version for an extended period. The following fields are available: - **CV** Correlation vector. - **GlobalEventCounter** Client side counter which indicates ordering of events sent by this user. -- **PackageVersion** Current package version of Remediation. +- **PackageVersion** The version of the current remediation package. - **PluginName** Name of the plugin specified for each generic plugin event. - **QualityUpdateSedimentFunnelState** Provides information about whether quality updates are missing on the device. -- **QualityUpdateSedimentFunnelType** No content is currently available. -- **QualityUpdateSedimentJsonSchemaVersion** No content is currently available. +- **QualityUpdateSedimentFunnelType** Indicates whether the Remediation is for Quality Updates or Feature Updates. +- **QualityUpdateSedimentJsonSchemaVersion** The schema version of the Quality Update Sediment Remediation. - **QualityUpdateSedimentLastRunSeconds** The number of seconds since Quality Updates were run. -- **QualityUpdateSedimentLocaltTime** No content is currently available. -- **QualityUpdateSedimentMatchedTriggers** No content is currently available. -- **QualityUpdateSedimentSelectedPlugins** No content is currently available. -- **QualityUpdateSedimentTargetedPlugins** No content is currently available. -- **QualityUpdateSedimentTargetedTriggers** The list of triggers targeted by the current quality update sediment remediation run. -- **RemediationProgramDataFolderSizeInMB** No content is currently available. -- **RemediationProgramFilesFolderSizeInMB** No content is currently available. -- **RemediationUsersFolderSizeInMB** No content is currently available. -- **RemediationWindowsAppsFolderSizeInMB** No content is currently available. -- **RemediationWindowsBtFolderSizeInMB** No content is currently available. -- **RemediationWindowsFolderSizeInMB** No content is currently available. -- **RemediationWindowsServiceProfilesFolderSizeInMB** No content is currently available. -- **RemediationWindowsTotalSystemDiskSize** No content is currently available. +- **QualityUpdateSedimentLocaltTime** The local time of the device running the Quality Update Sediment Remediation. +- **QualityUpdateSedimentMatchedTriggers** The list of triggers that were matched by the Windows Quality Update Remediation. +- **QualityUpdateSedimentSelectedPlugins** The number of plugins that were selected for execution in the Quality Update Sediment Remediation. +- **QualityUpdateSedimentTargetedPlugins** The list of plug-ins targeted by the current Quality Update Sediment Remediation. +- **QualityUpdateSedimentTargetedTriggers** The list of triggers targeted by the current Quality Update Sediment Remediation. +- **RemediationProgramDataFolderSizeInMB** The size (in megabytes) of the Program Data folder on the device. +- **RemediationProgramFilesFolderSizeInMB** The size (in megabytes) of the Program Files folder on the device. +- **RemediationUsersFolderSizeInMB** The size (in megabytes) of the Users folder on the device. +- **RemediationWindowsAppsFolderSizeInMB** The size (in megabytes) of the Windows Applications folder on the device. +- **RemediationWindowsBtFolderSizeInMB** The size (in megabytes) of the Windows BT folder on the device. +- **RemediationWindowsFolderSizeInMB** The size (in megabytes) of the Windows folder on the device. +- **RemediationWindowsServiceProfilesFolderSizeInMB** The size (in megabytes) of the Windows Service Profiles folder on the device. +- **RemediationWindowsTotalSystemDiskSize** The total storage capacity of the System disk drive, measured in megabytes. - **Result** This is the HRESULT for detection or perform action phases of the plugin. - **RunCount** The number of times the remediation event started (whether it completed successfully or not). -- **WindowsHiberFilSysSizeInMegabytes** No content is currently available. -- **WindowsInstallerFolderSizeInMegabytes** No content is currently available. -- **WindowsOldFolderSizeInMegabytes** No content is currently available. -- **WindowsPageFileSysSizeInMegabytes** No content is currently available. -- **WindowsSoftwareDistributionFolderSizeInMegabytes** No content is currently available. -- **WindowsSwapFileSysSizeInMegabytes** No content is currently available. -- **WindowsSxsFolderSizeInMegabytes** No content is currently available. +- **WindowsHiberFilSysSizeInMegabytes** The size of the Windows Hibernation file, measured in megabytes. +- **WindowsInstallerFolderSizeInMegabytes** The size of the Windows Installer folder, measured in megabytes. +- **WindowsOldFolderSizeInMegabytes** The size of the Windows.OLD folder, measured in megabytes. +- **WindowsPageFileSysSizeInMegabytes** The size of the Windows Page file, measured in megabytes. +- **WindowsSoftwareDistributionFolderSizeInMegabytes** The size of the Software Distribution folder, measured in megabytes. +- **WindowsSwapFileSysSizeInMegabytes** The size of the Windows Swap file, measured in megabytes. +- **WindowsSxsFolderSizeInMegabytes** The size of the WinSxS (Windows Side-by-Side) folder, measured in megabytes. ## Sediment events @@ -5419,15 +5328,8 @@ This service retrieves events generated by SetupPlatform, the engine that drives The following fields are available: -- **FaeldName** No content is currently available. -- **FieddName** No content is currently available. - **FieldName** Retrieves the event name/data point. Examples: InstallStartTime, InstallEndtime, OverallResult etc. -- **FieldNime** No content is currently available. -- **Gro}pName** No content is currently available. - **GroupName** Retrieves the groupname the event belongs to. Example: Install Information, DU Information, Disk Space Information etc. -- **GzoupName** No content is currently available. -- **OroupName** No content is currently available. -- **Vadue** No content is currently available. - **Value** Retrieves the value associated with the corresponding event name (Field Name). For example: For time related events this will include the system time. @@ -5439,7 +5341,6 @@ Scan process event on Windows Update client. See the EventScenario field for spe The following fields are available: -- **__TlgCV_W** No content is currently available. - **ActivityMatchingId** Contains a unique ID identifying a single CheckForUpdates session from initialization to completion. - **AllowCachedResults** Indicates if the scan allowed using cached results. - **ApplicableUpdateInfo** Metadata for the updates which were detected as applicable @@ -5451,15 +5352,12 @@ The following fields are available: - **BiosVersion** The version of the BIOS. - **BranchReadinessLevel** The servicing branch configured on the device. - **CachedEngineVersion** For self-initiated healing, the version of the SIH engine that is cached on the device. If the SIH engine does not exist, the value is null. -- **CallerApplacationN!me** No content is currently available. - **CallerApplicationName** The name provided by the caller who initiated API calls into the software distribution client. - **CapabilityDetectoidGuid** The GUID for a hardware applicability detectoid that could not be evaluated. - **CDNCountryCode** Two letter country abbreviation for the Content Distribution Network (CDN) location. - **CDNId** The unique identifier of a specific device, used to identify how many devices are encountering success or a particular issue. - **ClientVersion** The version number of the software distribution client. -- **ClientWersion** No content is currently available. - **CommonProps** A bitmask for future flags associated with the Windows Update client behavior. No data is currently reported in this field. Expected value for this field is 0. -- **ComvonProps** No content is currently available. - **Context** Gives context on where the error has occurred. Example: AutoEnable, GetSLSData, AddService, Misc, or Unknown - **CurrentMobileOperator** The mobile operator the device is currently connected to. - **DeferralPolicySources** Sources for any update deferral policies defined (GPO = 0x10, MDM = 0x100, Flight = 0x1000, UX = 0x10000). @@ -5468,11 +5366,8 @@ The following fields are available: - **DriverError** The error code hit during a driver scan. This is 0 if no error was encountered. - **DriverExclusionPolicy** Indicates if the policy for not including drivers with Windows Update is enabled. - **DriverSyncPassPerformed** Were drivers scanned this time? -- **EventIfstanceI** No content is currently available. - **EventInstanceID** A globally unique identifier for event instance. - **EventScenario** Indicates the purpose of sending this event - whether because the software distribution just started checking for content, or whether it was cancelled, succeeded, or failed. -- **ExsendedMetadataCabUrl** No content is currently available. -- **ExsendedStatusCode** No content is currently available. - **ExtendedMetadataCabUrl** Hostname that is used to download an update. - **ExtendedStatusCode** Secondary error code for certain scenarios where StatusCode wasn't specific enough. - **FailedUpdateGuids** The GUIDs for the updates that failed to be evaluated during the scan. @@ -5484,7 +5379,6 @@ The following fields are available: - **FlightRing** The ring (speed of getting builds) that a device is on if participating in flighting (pre-release builds). - **HomeMobileOperator** The mobile operator that the device was originally intended to work with. - **IntentPFNs** Intended application-set metadata for atomic update scenarios. -- **IntentPINs** No content is currently available. - **IPVersion** Indicates whether the download took place over IPv4 or IPv6 - **IsWUfBDualScanEnabled** Indicates if Windows Update for Business dual scan is enabled on the device. - **IsWUfBEnabled** Indicates if Windows Update for Business is enabled on the device. @@ -5492,12 +5386,10 @@ The following fields are available: - **MetadataIntegrityMode** The mode of the update transport metadata integrity check. 0-Unknown, 1-Ignoe, 2-Audit, 3-Enforce - **MSIError** The last error that was encountered during a scan for updates. - **NetworkConnectivityDetected** Indicates the type of network connectivity that was detected. 0 - IPv4, 1 - IPv6 -- **NumberOfApplicableUpdatds** No content is currently available. - **NumberOfApplicableUpdates** The number of updates which were ultimately deemed applicable to the system after the detection process is complete - **NumberOfApplicationsCategoryScanEvaluated** The number of categories (apps) for which an app update scan checked - **NumberOfLoop** The number of round trips the scan required - **NumberOfNewUpdatesFromServiceSync** The number of updates which were seen for the first time in this scan -- **NumberOfNewUpdatesFrvFServiceSync** No content is currently available. - **NumberOfUpdatesEvaluated** The total number of updates which were evaluated as a part of the scan - **NumFailedMetadataSignatures** The number of metadata signatures checks which failed for new metadata synced down. - **Online** Indicates if this was an online scan. @@ -5519,7 +5411,6 @@ The following fields are available: - **ServiceUrl** The environment URL a device is configured to scan with - **ShippingMobileOperator** The mobile operator that a device shipped on. - **StatusCode** Indicates the result of a CheckForUpdates event (success, cancellation, failure code HResult). -- **Statusode** No content is currently available. - **SyncType** Describes the type of scan the event was - **SystemBIOSMajorRelease** Major version of the BIOS. - **SystemBIOSMinorRelease** Minor version of the BIOS. @@ -5577,6 +5468,7 @@ The following fields are available: - **BiosSKUNumber** The sku number of the device BIOS. - **BIOSVendor** The vendor of the BIOS. - **BiosVersion** The version of the BIOS. +- **Bundle02,UsedDO** No content is currently available. - **BundleBytesDownloaded** Number of bytes downloaded for the specific content bundle. - **BundleId** Identifier associated with the specific content bundle. - **BundleRepeatFailCount** Indicates whether this particular update bundle has previously failed. @@ -5585,7 +5477,6 @@ The following fields are available: - **BytesDownloaded** Number of bytes that were downloaded for an individual piece of content (not the entire bundle). - **CachedEngineVersion** The version of the “Self-Initiated Healing” (SIH) engine that is cached on the device, if applicable. - **CallerApplicationName** The name provided by the application that initiated API calls into the software distribution client. -- **CaLlerApplicationName** No content is currently available. - **CbsDownloadMethod** Indicates whether the download was a full- or a partial-file download. - **CbsMethod** The method used for downloading the update content related to the Component Based Servicing (CBS) technology. - **CDNCountryCode** Two letter country abbreviation for the Content Distribution Network (CDN) location. @@ -5597,7 +5488,7 @@ The following fields are available: - **CurrentMobileOperator** The mobile operator the device is currently connected to. - **DeviceModel** The model of the device. - **DownloadPriority** Indicates whether a download happened at background, normal, or foreground priority. -- **DownloadProps** Information about the download operation. +- **DownloadProps** Information about the download operation properties in the form of a bitmask. - **DownloadType** Differentiates the download type of “Self-Initiated Healing” (SIH) downloads between Metadata and Payload downloads. - **EventInstanceID** A globally unique identifier for event instance. - **EventScenario** Indicates the purpose for sending this event: whether because the software distribution just started downloading content; or whether it was cancelled, succeeded, or failed. @@ -5605,7 +5496,6 @@ The following fields are available: - **ExtendedStatusCode** Secondary error code for certain scenarios where StatusCode wasn't specific enough. - **FeatureUpdatePause** Indicates whether feature OS updates are paused on the device. - **FlightBranch** The branch that a device is on if participating in flighting (pre-release builds). -- **FlightBuildN�mber** No content is currently available. - **FlightBuildNumber** If this download was for a flight (pre-release build), this indicates the build number of that flight. - **FlightId** The specific ID of the flight (pre-release build) the device is getting. - **FlightRing** The ring (speed of getting builds) that a device is on if participating in flighting (pre-release builds). @@ -5751,7 +5641,6 @@ The following fields are available: - **IsFinalOutcomeEvent** Indicates whether this event signals the end of the update/upgrade process. - **IsFirmware** Indicates whether this update is a firmware update. - **IsSuccessFailurePostReboot** Indicates whether the update succeeded and then failed after a restart. -- **IsWufBDualScanEnabled** No content is currently available. - **IsWUfBDualScanEnabled** Indicates whether Windows Update for Business dual scan is enabled on the device. - **IsWUfBEnabled** Indicates whether Windows Update for Business is enabled on the device. - **MergedUpdate** Indicates whether the OS update and a BSP update merged for installation. @@ -6501,15 +6390,11 @@ This event sends data about OS deployment scenarios, to help keep Windows up-to- The following fields are available: -- **^alue** No content is currently available. - **ClientId** Retrieves the upgrade ID. In the Windows Update scenario, this will be the Windows Update client ID. In Media setup, default value is Media360, but can be overwritten by the caller to a unique value. -- **FdightData** No content is currently available. - **FieldName** Retrieves the data point. - **FimldName** No content is currently available. - **FlightData** Specifies a unique identifier for each group of Windows Insider builds. - **InstanceId** Retrieves a unique identifier for each instance of a setup session. -- **InstanceIl** No content is currently available. -- **InstancmId** No content is currently available. - **ReportId** Retrieves the report ID. - **ScenarioId** Retrieves the deployment scenario. - **Value** Retrieves the value associated with the corresponding FieldName. @@ -6548,7 +6433,6 @@ The following fields are available: - **InstanceId** The GUID (Globally Unique ID) that identifies each instance of SetupHost.EXE. - **MitigationScenario** The update scenario in which the mitigation was executed. - **Name** The friendly (descriptive) name of the mitigation. -- **OperatignName** No content is currently available. - **OperationIndex** The mitigation operation index (in the event of a failure). - **OperationName** The friendly (descriptive) name of the mitigation operation (in the event of failure). - **RegistryCount** The number of registry operations in the mitigation entry. @@ -6627,7 +6511,6 @@ The following fields are available: - **callerApplication** The name of the calling application. - **capsuleCount** The number of Sediment Pack capsules. - **capsuleFailureCount** The number of capsule failures. -- **detecd1drSummary** No content is currently available. - **detectionSummary** Result of each applicable detection that was run. - **featureAssessmentImpact** WaaS Assessment impact for feature updates. - **hrEngineBlockReason** Indicates the reason for stopping WaaSMedic. @@ -6638,12 +6521,10 @@ The following fields are available: - **isInteractiveMode** The user started a run of WaaSMedic. - **isManaged** Device is managed for updates. - **isWUConnected** Device is connected to Windows Update. -- **noMoreAcd1drs** No content is currently available. - **noMoreActions** No more applicable diagnostics. - **pluginFailureCount** The number of plugins that have failed. - **pluginsCount** The number of plugins. - **qualityAssessmentImpact** WaaS Assessment impact for quality updates. -- **remediad1drSummary** No content is currently available. - **remediationSummary** Result of each operation performed on a device to fix an invalid state or configuration that's preventing the device from getting updates. For example, if Windows Update service is turned off, the fix is to turn the it back on. - **usingBackupFeatureAssessment** Relying on backup feature assessment. - **usingBackupQualityAssessment** Relying on backup quality assessment. @@ -6829,7 +6710,6 @@ The following fields are available: - **IsBundle** Is this a bundle? - **IsInteractive** Is this initiated by the user? - **IsMandatory** Is this a mandatory installation? -- **IsRemedi-0000** No content is currently available. - **IsRemediation** Is this repairing a previous installation? - **IsRestore** Is this a restore of a previously acquired product? - **IsUpdate** Is this an update? @@ -6979,7 +6859,6 @@ This event is sent at the beginning of an app install or update to help keep Win The following fields are available: -- **__lgCV__** No content is currently available. - **CatalogId** The name of the product catalog from which this app was chosen. - **FulfillmentPluginId** The ID of the plugin needed to install the package type of the product. - **PFN** The Package Family Name of the app that is being installed or updated. @@ -7176,18 +7055,15 @@ The following fields are available: - **bytesFromGroupPeers** The number of bytes received from a peer in the same domain group. - **bytesFromIntPeers** The number of bytes received from peers not in the same LAN or in the same domain group. - **bytesFromLinkLocalPeers** The number of bytes received from local peers. -- **bytesFromLocadCache** No content is currently available. - **bytesFromLocalCache** Bytes copied over from local (on disk) cache. - **bytesFromPeers** The number of bytes received from a peer in the same LAN. - **bytesRequested** The total number of bytes requested for download. -- **byvesFromCacheServer** No content is currently available. - **cacheServerConnectionCount** Number of connections made to cache hosts. - **cdnConnectionCount** The total number of connections made to the CDN. - **cdnErrorCodes** A list of CDN connection errors since the last FailureCDNCommunication event. - **cdnErrorCounts** The number of times each error in cdnErrorCodes was encountered. - **cdnIp** The IP address of the source CDN. - **cdnUrl** Url of the source Content Distribution Network (CDN). -- **cfileSize** No content is currently available. - **dataSourcesTotal** Bytes received per source type, accumulated for the whole session. - **doErrorCode** The Delivery Optimization error code that was returned. - **downlinkBps** The maximum measured available download bandwidth (in bytes per second). @@ -7206,7 +7082,6 @@ The following fields are available: - **isEncrypted** TRUE if the file is encrypted and will be decrypted after download. - **isVpn** Is the device connected to a Virtual Private Network? - **jobID** Identifier for the Windows Update job. -- **lanConnectionCoujt** No content is currently available. - **lanConnectionCount** The total number of connections made to peers in the same LAN. - **linkLocalConnectionCount** The number of connections made to peers in the same Link-local network. - **numPeers** The total number of peers used for this download. @@ -7222,7 +7097,6 @@ The following fields are available: - **uplinkBps** The maximum measured available upload bandwidth (in bytes per second). - **uplinkUsageBps** The upload speed (in bytes per second). - **usedMemoryStream** TRUE if the download is using memory streaming for App downloads. -- **ytesRequested** No content is currently available. ### Microsoft.OSG.DU.DeliveryOptClient.DownloadPaused @@ -7238,7 +7112,6 @@ The following fields are available: - **fileID** The ID of the file being paused. - **isVpn** Is the device connected to a Virtual Private Network? - **jobID** Identifier for the Windows Update job. -- **pagaefinedCallerName** No content is currently available. - **predefinedCallerName** The name of the API Caller object. - **reasonCode** The reason for pausing the download. - **routeToCacheServer** The cache server setting, source, and value. @@ -7259,7 +7132,6 @@ The following fields are available: - **deviceProfile** Identifies the usage or form factor (such as Desktop, Xbox, or VM). - **diceRoll** Random number used for determining if a client will use peering. - **doClientVersion** The version of the Delivery Optimization client. -- **doEr2orCode** No content is currently available. - **doErrorCode** The Delivery Optimization error code that was returned. - **downloadMode** The download mode used for this file download session (CdnOnly = 0, Lan = 1, Group = 2, Internet = 3, Simple = 99, Bypass = 100). - **downloadModeReason** Reason for the download. @@ -7275,10 +7147,8 @@ The following fields are available: - **isVpn** Indicates whether the device is connected to a Virtual Private Network. - **jobID** The ID of the Windows Update job. - **peerID** The ID for this delivery optimization client. -- **pgerID** No content is currently available. - **predefinedCallerName** Name of the API caller. - **routeToCacheServer** Cache server setting, source, and value. -- **sessionId** No content is currently available. - **sessionID** The ID for the file download session. - **setConbigs** No content is currently available. - **setConfigs** A JSON representation of the configurations that have been set, and their sources. @@ -7900,7 +7770,6 @@ The following fields are available: - **minutesOverScanSla** Indicates how many minutes the scan exceeded the scan SLA. - **minutesOverScanTriggerSla** Indicates how many minutes the scan exceeded the scan trigger SLA. - **scanTriggerSource** Indicates what caused the scan. -- **scanTriggerSouRce** No content is currently available. - **updateScenarioType** The update session type. - **wuDeviceid** Unique device ID used by Windows Update. From 51ae9eb3760a7fa2149060542d8e17a56119ebdd Mon Sep 17 00:00:00 2001 From: Brian Lich Date: Mon, 15 Apr 2019 10:23:27 -0700 Subject: [PATCH 179/724] updating 1903 links --- windows/privacy/windows-diagnostic-data.md | 5 +++-- 1 file changed, 3 insertions(+), 2 deletions(-) diff --git a/windows/privacy/windows-diagnostic-data.md b/windows/privacy/windows-diagnostic-data.md index 4a50f70b53..d3587cfb5a 100644 --- a/windows/privacy/windows-diagnostic-data.md +++ b/windows/privacy/windows-diagnostic-data.md @@ -12,17 +12,18 @@ ms.author: daniha manager: dansimp ms.collection: M365-security-compliance ms.topic: article -ms.date: 03/13/2018 +ms.date: 04/15/2019 --- # Windows 10, version 1709 and newer diagnostic data for the Full level Applies to: +- Windows 10, version 1903 - Windows 10, version 1809 - Windows 10, version 1803 - Windows 10, version 1709 -Microsoft uses Windows diagnostic data to keep Windows secure and up-to-date, troubleshoot problems, and make product improvements. For users who have turned on "Tailored experiences", it can also be used to offer you personalized tips, ads, and recommendations to enhance Microsoft products and services for your needs. This article describes all types of diagnostic data collected by Windows at the Full level (inclusive of data collected at Basic), with comprehensive examples of data we collect per each type. For additional, detailed technical descriptions of Basic data items, see [Windows 10, version 1809 Basic level diagnostic events and fields](https://docs.microsoft.com/windows/configuration/basic-level-windows-diagnostic-events-and-fields). +Microsoft uses Windows diagnostic data to keep Windows secure and up-to-date, troubleshoot problems, and make product improvements. For users who have turned on "Tailored experiences", it can also be used to offer you personalized tips, ads, and recommendations to enhance Microsoft products and services for your needs. This article describes all types of diagnostic data collected by Windows at the Full level (inclusive of data collected at Basic), with comprehensive examples of data we collect per each type. For additional, detailed technical descriptions of Basic data items, see [Windows 10, version 1903 Basic level diagnostic events and fields](https://docs.microsoft.com/windows/configuration/basic-level-windows-diagnostic-events-and-fields). In addition, this article provides references to equivalent definitions for the data types and examples from [ISO/IEC 19944:2017 Information technology -- Cloud computing -- Cloud services and devices: Data flow, data categories and data use](https://www.iso.org/standard/66674.html). Each data type also has a Data Use statement, for diagnostics and for Tailored experiences on the device, using the terms as defined by the standard. These Data Use statements define the purposes for which Microsoft processes each type of Windows diagnostic data, using a uniform set of definitions referenced at the end of this document and based on the ISO standard. Reference to the ISO standard provides additional clarity about the information collected, and allows easy comparison with other services or guidance that also references the standard. From 6edf2539bbdaf2f09370eea1ff001442267b8c2d Mon Sep 17 00:00:00 2001 From: Jeanie Decker Date: Tue, 16 Apr 2019 05:57:55 -0700 Subject: [PATCH 180/724] add 1903 download for 19H1 --- windows/application-management/manage-windows-mixed-reality.md | 3 +-- 1 file changed, 1 insertion(+), 2 deletions(-) diff --git a/windows/application-management/manage-windows-mixed-reality.md b/windows/application-management/manage-windows-mixed-reality.md index 20b71d39e8..333dbab4b5 100644 --- a/windows/application-management/manage-windows-mixed-reality.md +++ b/windows/application-management/manage-windows-mixed-reality.md @@ -9,7 +9,6 @@ ms.localizationpriority: medium author: jdeckerms ms.author: jdecker ms.topic: article -ms.date: 10/02/2018 --- # Enable or block Windows Mixed Reality apps in the enterprise @@ -34,7 +33,7 @@ Organizations that use Windows Server Update Services (WSUS) must take action to 2. Windows Mixed Reality Feature on Demand (FOD) is downloaded from Windows Update. If access to Windows Update is blocked, you must manually install the Windows Mixed Reality FOD. - a. Download the FOD .cab file for [Windows 10, version 1809](https://software-download.microsoft.com/download/pr/microsoft-windows-holographic-desktop-fod-package31bf3856ad364e35amd64_1.cab), [Windows 10, version 1803](https://download.microsoft.com/download/9/9/3/9934B163-FA01-4108-A38A-851B4ACD1244/Microsoft-Windows-Holographic-Desktop-FOD-Package~31bf3856ad364e35~amd64~~.cab), or [Windows 10, version 1709](http://download.microsoft.com/download/6/F/8/6F816172-AC7D-4F45-B967-D573FB450CB7/Microsoft-Windows-Holographic-Desktop-FOD-Package.cab). + a. Download the FOD .cab file for [Windows 10, version 1809](https://software-download.microsoft.com/download/pr/microsoft-windows-holographic-desktop-fod-package31bf3856ad364e35amd64_1.cab), [Windows 10, version 1803](https://download.microsoft.com/download/9/9/3/9934B163-FA01-4108-A38A-851B4ACD1244/Microsoft-Windows-Holographic-Desktop-FOD-Package~31bf3856ad364e35~amd64~~.cab), or [Windows 10, version 1709](http://download.microsoft.com/download/6/F/8/6F816172-AC7D-4F45-B967-D573FB450CB7/Microsoft-Windows-Holographic-Desktop-FOD-Package.cab), or [Windows 10, version 1903](https://software-download.microsoft.com/download/pr/Microsoft-Windows-Holographic-Desktop-FOD-Package-31bf3856ad364e35-amd64.cab). >[!NOTE] >You must download the FOD .cab file that matches your operating system version. From 245662323a5347bc2c11d72cd8936736f0cff134 Mon Sep 17 00:00:00 2001 From: Jeanie Decker Date: Tue, 16 Apr 2019 06:29:24 -0700 Subject: [PATCH 181/724] remove extra or --- windows/application-management/manage-windows-mixed-reality.md | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/windows/application-management/manage-windows-mixed-reality.md b/windows/application-management/manage-windows-mixed-reality.md index 333dbab4b5..789eabab79 100644 --- a/windows/application-management/manage-windows-mixed-reality.md +++ b/windows/application-management/manage-windows-mixed-reality.md @@ -33,7 +33,7 @@ Organizations that use Windows Server Update Services (WSUS) must take action to 2. Windows Mixed Reality Feature on Demand (FOD) is downloaded from Windows Update. If access to Windows Update is blocked, you must manually install the Windows Mixed Reality FOD. - a. Download the FOD .cab file for [Windows 10, version 1809](https://software-download.microsoft.com/download/pr/microsoft-windows-holographic-desktop-fod-package31bf3856ad364e35amd64_1.cab), [Windows 10, version 1803](https://download.microsoft.com/download/9/9/3/9934B163-FA01-4108-A38A-851B4ACD1244/Microsoft-Windows-Holographic-Desktop-FOD-Package~31bf3856ad364e35~amd64~~.cab), or [Windows 10, version 1709](http://download.microsoft.com/download/6/F/8/6F816172-AC7D-4F45-B967-D573FB450CB7/Microsoft-Windows-Holographic-Desktop-FOD-Package.cab), or [Windows 10, version 1903](https://software-download.microsoft.com/download/pr/Microsoft-Windows-Holographic-Desktop-FOD-Package-31bf3856ad364e35-amd64.cab). + a. Download the FOD .cab file for [Windows 10, version 1809](https://software-download.microsoft.com/download/pr/microsoft-windows-holographic-desktop-fod-package31bf3856ad364e35amd64_1.cab), [Windows 10, version 1803](https://download.microsoft.com/download/9/9/3/9934B163-FA01-4108-A38A-851B4ACD1244/Microsoft-Windows-Holographic-Desktop-FOD-Package~31bf3856ad364e35~amd64~~.cab), [Windows 10, version 1709](http://download.microsoft.com/download/6/F/8/6F816172-AC7D-4F45-B967-D573FB450CB7/Microsoft-Windows-Holographic-Desktop-FOD-Package.cab), or [Windows 10, version 1903](https://software-download.microsoft.com/download/pr/Microsoft-Windows-Holographic-Desktop-FOD-Package-31bf3856ad364e35-amd64.cab). >[!NOTE] >You must download the FOD .cab file that matches your operating system version. From d1a9f02529e5314f2abc2f18a6067279bc9b8fcd Mon Sep 17 00:00:00 2001 From: Brian Lich Date: Tue, 16 Apr 2019 08:35:57 -0700 Subject: [PATCH 182/724] new build 4/16/2019 8:35 AM --- ...ndows-diagnostic-events-and-fields-1903.md | 174 ++++++++++++++++-- 1 file changed, 163 insertions(+), 11 deletions(-) diff --git a/windows/privacy/basic-level-windows-diagnostic-events-and-fields-1903.md b/windows/privacy/basic-level-windows-diagnostic-events-and-fields-1903.md index a32ec507e3..04b2280580 100644 --- a/windows/privacy/basic-level-windows-diagnostic-events-and-fields-1903.md +++ b/windows/privacy/basic-level-windows-diagnostic-events-and-fields-1903.md @@ -1,6 +1,6 @@ --- description: Use this article to learn more about what Windows diagnostic data is gathered at the basic level. -title: Windows 10, version 19H1 basic diagnostic events and fields (Windows 10) +title: Windows 10, version 1903 basic diagnostic events and fields (Windows 10) keywords: privacy, telemetry ms.prod: w10 ms.mktglfcycl: manage @@ -13,11 +13,11 @@ manager: dansimp ms.collection: M365-security-compliance ms.topic: article audience: ITPro -ms.date: 04/15/2019 +ms.date: 04/16/2019 --- -# Windows 10, version 19H1 basic level Windows diagnostic events and fields +# Windows 10, version 1903 basic level Windows diagnostic events and fields > [!IMPORTANT] @@ -26,7 +26,7 @@ ms.date: 04/15/2019 **Applies to** -- Windows 10, version 19H1 +- Windows 10, version 1903 The Basic level gathers a limited set of information that is critical for understanding the device and its configuration including: basic device information, quality-related information, app compatibility, and Microsoft Store. When the level is set to Basic, it also includes the Security level information. @@ -2088,6 +2088,18 @@ The following fields are available: - **ver** Represents the version number of the application. Used to understand errors by Version, Usage by Version across an app. +### Common Data Extensions.cloud + +Describes the service-related fields populated by the cloud service. + +The following fields are available: + +- **role** The role of the service. +- **roleInstance** The instance id of the deployed role instance generating the event. +- **roleVer** The build version of the role. +- **ver** No content is currently available. + + ### Common Data Extensions.container Describes the properties of the container for events logged within a container. @@ -2101,13 +2113,18 @@ The following fields are available: - **type** The container type. Examples: Process or VMHost -### Common Data Extensions.cs +### Common Data Extensions.cs1 -Describes properties related to the schema of the event. +No content is currently available. The following fields are available: -- **sig** A common schema signature that identifies new and modified event schemas. +- **dblp** A bitfield that is set to a non-zero value if the event in the newer schema has an equivalent event from the 1.0 schema. +- **esc** The event sequence clock. +- **ev** The version of the event. +- **locale** The client language locale on the device. +- **scid** The Service Config ID of the running title that sent the event. +- **users** A comma-separated list of all users logged into the device when the event was created. The user ID is encoded. Example: x:12345678 ### Common Data Extensions.device @@ -2116,10 +2133,15 @@ Describes the device-related fields. The following fields are available: +- **authId** The ID of the device associated with this event. For Microsoft Account tickets, this is expected to be the MSA Global ID. +- **authSecId** The secondary ID of the device associated with this event. For Microsoft Account tickets, this is expected to be the MSA Hardware ID. - **deviceClass** The device classification. For example, Desktop, Server, or Mobile. +- **id** A unique device ID. - **localId** A locally-defined unique ID for the device. This is not the human-readable device name. Most likely equal to the value stored at HKLM\Software\Microsoft\SQMClient\MachineId - **make** Device manufacturer. - **model** Device model. +- **orgAuthId** ID used to authenticate the orgId. +- **orgId** Organization ID associated with the event. ### Common Data Extensions.Envelope @@ -2128,26 +2150,91 @@ Represents an envelope that contains all of the common data extensions. The following fields are available: -- **cV** Represents the Correlation Vector: A single field for tracking partial order of related telemetry events across component boundaries. - **data** Represents the optional unique diagnostic data for a particular event schema. - **ext_app** Describes the properties of the running application. This extension could be populated by either a client app or a web app. See [Common Data Extensions.app](#common-data-extensionsapp). +- **ext_cloud** Describes the service-related fields populated by the cloud service. See [Common Data Extensions.cloud](#common-data-extensionscloud). - **ext_container** Describes the properties of the container for events logged within a container. See [Common Data Extensions.container](#common-data-extensionscontainer). -- **ext_cs** Describes properties related to the schema of the event. See [Common Data Extensions.cs](#common-data-extensionscs). +- **ext_cs1** If the field doesn't exist in the newer schema, this contains the fields from an earlier schema. See [Common Data Extensions.cs1](#common-data-extensionscs1). - **ext_device** Describes the device-related fields. See [Common Data Extensions.device](#common-data-extensionsdevice). +- **ext_ingest** Describes the fields added dynamically by the service. See [Common Data Extensions.ingest](#common-data-extensionsingest). +- **ext_intService** No content is currently available. See [Common Data Extensions.intService](#common-data-extensionsintservice). +- **ext_intWeb** No content is currently available. See [Common Data Extensions.intWeb](#common-data-extensionsintweb). +- **ext_loc** Describes the location from which the event was logged. See [Common Data Extensions.loc](#common-data-extensionsloc). +- **ext_mscv** No content is currently available. See [Common Data Extensions.mscv](#common-data-extensionsmscv). - **ext_os** Describes the operating system properties that would be populated by the client. See [Common Data Extensions.os](#common-data-extensionsos). - **ext_receipts** Describes the fields related to time as provided by the client for debugging purposes. See [Common Data Extensions.receipts](#common-data-extensionsreceipts). - **ext_sdk** Describes the fields related to a platform library required for a specific SDK. See [Common Data Extensions.sdk](#common-data-extensionssdk). - **ext_user** Describes the fields related to a user. See [Common Data Extensions.user](#common-data-extensionsuser). - **ext_utc** Describes the fields that might be populated by a logging library on Windows. See [Common Data Extensions.utc](#common-data-extensionsutc). +- **ext_web** No content is currently available. See [Common Data Extensions.web](#common-data-extensionsweb). - **ext_xbl** Describes the fields related to XBOX Live. See [Common Data Extensions.xbl](#common-data-extensionsxbl). -- **flags** Represents a collection of bits that describe how the event should be processed by the Connected User Experience and Telemetry component pipeline. The lowest-order byte is the event persistence. The next byte is the event latency. - **iKey** Represents an ID for applications or other logical groupings of events. - **name** Represents the uniquely qualified name for the event. -- **popSample** Represents the effective sample rate for this event at the time it was generated by a client. - **time** Represents the event date time in Coordinated Universal Time (UTC) when the event was generated on the client. This should be in ISO 8601 format. - **ver** Represents the major and minor version of the extension. +### Common Data Extensions.ingest + +Describes the fields that are added by the ingestion service. + +The following fields are available: + +- **auth** Used to assess the trustworthiness of the data. +- **client** The client name. +- **clientIp** The IP address seen by the service. This is not necessarily the client IP address, but could be a router or some other device. +- **processedIngest** If the event already had an ingest extension and the client was authenticated as a first party, the ingest extension will be inserted as processedIngest. +- **quality** A bitfield added by the service to all events coming from a client device. +- **time** The time that the event was received by the service. +- **userAgent** For events that are not using the CUET component, this is the user agent of the browser. + + +### Common Data Extensions.intService + +No content is currently available. + +The following fields are available: + +- **deploymentUnit** No content is currently available. +- **environment** No content is currently available. +- **fullEnvName** No content is currently available. +- **location** No content is currently available. +- **name** No content is currently available. + + +### Common Data Extensions.intWeb + +No content is currently available. + +The following fields are available: + +- **anid** No content is currently available. +- **mc1Id** No content is currently available. +- **mscom** No content is currently available. +- **msfpc** No content is currently available. +- **serviceName** No content is currently available. + + +### Common Data Extensions.loc + +Describes the location from which the event was logged. + +The following fields are available: + +- **country** 2 letter country code using the codes from the ISO 3166-1 alpha-2 standard. +- **id** Location ID based on the client's IP address. +- **tz** The time zone of the device. + + +### Common Data Extensions.mscv + +No content is currently available. + +The following fields are available: + +- **cV** No content is currently available. + + ### Common Data Extensions.os Describes some properties of the operating system. @@ -2167,6 +2254,8 @@ Represents various time information as provided by the client and helps for debu The following fields are available: +- **flags** No content is currently available. +- **originalName** No content is currently available. - **originalTime** The original event time. - **uploadTime** The time the event was uploaded. @@ -2181,6 +2270,7 @@ The following fields are available: - **installId** An ID that's created during the initialization of the SDK for the first time. - **libVer** The SDK version. - **seq** An ID that is incremented for each event. +- **ver** No content is currently available. ### Common Data Extensions.user @@ -2190,6 +2280,7 @@ Describes the fields related to a user. The following fields are available: - **authId** This is an ID of the user associated with this event that is deduced from a token such as a Microsoft Account ticket or an XBOX token. +- **id** Unique user Id. Example: x:12345678. - **locale** The language and region. - **localId** Represents a unique user identity that is created locally and added by the client. This is not the user's account ID. @@ -2205,12 +2296,36 @@ The following fields are available: - **cat** Represents a bitmask of the ETW Keywords associated with the event. - **cpId** The composer ID, such as Reference, Desktop, Phone, Holographic, Hub, IoT Composer. - **epoch** Represents the epoch and seqNum fields, which help track how many events were fired and how many events were uploaded, and enables identification of data lost during upload and de-duplication of events on the ingress server. +- **eventFlags** No content is currently available. - **flags** Represents the bitmap that captures various Windows specific flags. +- **loggingBinary** No content is currently available. - **mon** Combined monitor and event sequence numbers in the format: monitor sequence : event sequence - **op** Represents the ETW Op Code. +- **pgName** No content is currently available. +- **popSample** No content is currently available. +- **providerGuid** No content is currently available. - **raId** Represents the ETW Related ActivityId. Logged via TraceLogging or directly via ETW. - **seq** Represents the sequence field used to track absolute order of uploaded events. It is an incrementing identifier for each event added to the upload queue. The Sequence helps track how many events were fired and how many events were uploaded and enables identification of data lost during upload and de-duplication of events on the ingress server. +- **sqmId** No content is currently available. - **stId** Represents the Scenario Entry Point ID. This is a unique GUID for each event in a diagnostic scenario. This used to be Scenario Trigger ID. +- **wcmp** No content is currently available. +- **wPId** No content is currently available. +- **wsId** No content is currently available. + + +### Common Data Extensions.web + +No content is currently available. + +The following fields are available: + +- **browser** No content is currently available. +- **browserLang** No content is currently available. +- **browserVer** No content is currently available. +- **domain** No content is currently available. +- **isManual** No content is currently available. +- **screenRes** No content is currently available. +- **userConsent** No content is currently available. ### Common Data Extensions.xbl @@ -4068,6 +4183,43 @@ The following fields are available: - **WFD2Supported** Indicates if the Miracast receiver supports WFD2 protocol. +## Other events + +### Microsoft.Windows.MigrationCore.MigObjectCountDLUsr + +No content is currently available. + +The following fields are available: + +- **currentSid** No content is currently available. +- **knownFoldersUsr[i]** No content is currently available. +- **migDiagSession->CString** No content is currently available. +- **objectCount** No content is currently available. + + +### Microsoft.Windows.MigrationCore.MigObjectCountKFSys + +This event returns data about the count of the migration objects across various phases during feature update. + +The following fields are available: + +- **knownFoldersSys[i]** The predefined folder path locations. +- **migDiagSession->CString** Identifies the phase of the upgrade where migration happens. +- **objectCount** The count of the number of objects that are being transferred. + + +### Microsoft.Windows.MigrationCore.MigObjectCountKFUsr + +This event returns data to track the count of the migration objects across various phases during feature update. + +The following fields are available: + +- **currentSid** Indicates the user SID for which the migration is being performed. +- **knownFoldersUsr[i]** No content is currently available. +- **migDiagSession->CString** No content is currently available. +- **objectCount** No content is currently available. + + ## Privacy consent logging events ### Microsoft.Windows.Shell.PrivacyConsentLogging.PrivacyConsentCompleted From 6766d38b9ded0a209bd4971d2e2a517ce1f50d7d Mon Sep 17 00:00:00 2001 From: Brian Lich Date: Tue, 16 Apr 2019 08:36:06 -0700 Subject: [PATCH 183/724] new build 4/16/2019 8:35 AM --- ...ndows-diagnostic-events-and-fields-1703.md | 30 +++--- ...ndows-diagnostic-events-and-fields-1709.md | 34 +++---- ...ndows-diagnostic-events-and-fields-1803.md | 34 +++---- ...ndows-diagnostic-events-and-fields-1809.md | 99 ++++++++++--------- 4 files changed, 101 insertions(+), 96 deletions(-) diff --git a/windows/privacy/basic-level-windows-diagnostic-events-and-fields-1703.md b/windows/privacy/basic-level-windows-diagnostic-events-and-fields-1703.md index a9d6322d66..187e5b5800 100644 --- a/windows/privacy/basic-level-windows-diagnostic-events-and-fields-1703.md +++ b/windows/privacy/basic-level-windows-diagnostic-events-and-fields-1703.md @@ -13,7 +13,7 @@ manager: dansimp ms.collection: M365-security-compliance ms.topic: article audience: ITPro -ms.date: 04/15/2019 +ms.date: 04/16/2019 --- @@ -2980,17 +2980,17 @@ deny The following fields are available: - **ActionName** The name of the action to be taken by the plug-in. -- **AppraiserBinariesValidResult** Indicates whether plug-in was appraised as valid. +- **AppraiserBinariesValidResult** Indicates whether the plug-in was appraised as valid. - **AppraiserDetectCondition** Indicates whether the plug-in passed the appraiser's check. - **AppraiserRegistryValidResult** Indicates whether the registry entry checks out as valid. - **AppraiserTaskDisabled** Indicates the appraiser task is disabled. - **AppraiserTaskValidFailed** Indicates the Appraiser task did not function and requires intervention. - **CV** Correlation vector - **DateTimeDifference** The difference between local and reference clock times. -- **DateTimeSyncEnabled** Indicates whether the datetime sync plug-in is enabled. +- **DateTimeSyncEnabled** Indicates whether the Datetime Sync plug-in is enabled. - **DaysSinceLastSIH** The number of days since the most recent SIH executed. - **DaysToNextSIH** The number of days until the next scheduled SIH execution. -- **DetectedCondition** Indicates whether detect condition is true and the perform action will be run. +- **DetectedCondition** Indicates whether detected condition is true and the perform action will be run. - **EvalAndReportAppraiserBinariesFailed** Indicates the EvalAndReportAppraiserBinaries event failed. - **EvalAndReportAppraiserRegEntries** Indicates the EvalAndReportAppraiserRegEntriesFailed event failed. - **EvalAndReportAppraiserRegEntriesFailed** Indicates the EvalAndReportAppraiserRegEntriesFailed event failed. @@ -3004,12 +3004,12 @@ The following fields are available: - **PackageVersion** The version of the current remediation package. - **PluginName** Name of the plugin specified for each generic plugin event. - **Reload** True if SIH reload is required. -- **RemediationNoisyHammerAcLineStatus** Event that indicates the AC Line Status of the machine. +- **RemediationNoisyHammerAcLineStatus** Indicates the AC Line Status of the device. - **RemediationNoisyHammerAutoStartCount** The number of times hammer auto-started. - **RemediationNoisyHammerCalendarTaskEnabled** Event that indicates Update Assistant Calendar Task is enabled. - **RemediationNoisyHammerCalendarTaskExists** Event that indicates an Update Assistant Calendar Task exists. - **RemediationNoisyHammerCalendarTaskTriggerEnabledCount** Event that indicates calendar triggers are enabled in the task. -- **RemediationNoisyHammerDaysSinceLastTaskRunTime** The number of days since the most recent hammer task ran. +- **RemediationNoisyHammerDaysSinceLastTaskRunTime** The number of days since the most recent Noisy Hammer task ran. - **RemediationNoisyHammerGetCurrentSize** Size in MB of the $GetCurrent folder. - **RemediationNoisyHammerIsInstalled** TRUE if the noisy hammer is installed. - **RemediationNoisyHammerLastTaskRunResult** The result of the last hammer task run. @@ -3059,7 +3059,7 @@ The following fields are available: ### Microsoft.Windows.Remediation.Completed -This event is sent when Windows Update Sediment Remediations have completed on a device to keep Windows up to date. The remediations address issues on the system that prevent sediment devices from receiving OS updates. “Sediment” refers to devices that have been on a previous OS version for an extended period. +This event is sent when Windows Update sediment remediations have completed on the sediment device to keep Windows up to date. A sediment device is one that has been on a previous OS version for an extended period. The remediations address issues on the system that prevent the device from receiving OS updates. The following fields are available: @@ -3080,7 +3080,7 @@ The following fields are available: - **DiskMbFreeBeforeCleanup** The amount of free hard disk space before cleanup, measured in Megabytes. - **ForcedAppraiserTaskTriggered** TRUE if Appraiser task ran from the plug-in. - **GlobalEventCounter** Client-side counter that indicates ordering of events sent by the active user. -- **HandlerCleanupFreeDiskInMegabytes** The amount of hard disk space cleaned by the storage sense handlers, measured in Megabytes. +- **HandlerCleanupFreeDiskInMegabytes** The amount of hard disk space cleaned by the storage sense handlers, measured in megabytes. - **HResult** The result of the event execution. - **LatestState** The final state of the plug-in component. - **PackageVersion** The package version for the current Remediation. @@ -3135,7 +3135,7 @@ The following fields are available: - **usoScanIsNetworkMetered** TRUE if the device is currently connected to a metered network. - **usoScanIsNoAutoUpdateKeyPresent** TRUE if no Auto Update registry key is set/present. - **usoScanIsUserLoggedOn** TRUE if the user is logged on. -- **usoScanPastThreshold** TRUE if the most recent USO (Update Session Orchestrator) scan is past the threshold (late). +- **usoScanPastThreshold** TRUE if the most recent Update Session Orchestrator (USO) scan is past the threshold (late). - **usoScanType** The type of USO (Update Session Orchestrator) scan: "Interactive" or "Background". - **WindowsHyberFilSysSizeInMegabytes** The size of the Windows Hibernation file, measured in Megabytes. - **WindowsInstallerFolderSizeInMegabytes** The size of the Windows Installer folder, measured in Megabytes. @@ -3679,7 +3679,7 @@ The following fields are available: ### Microsoft.Windows.SedimentLauncher.Applicable -Indicates whether a given plugin is applicable. +This event is sent when the Windows Update sediment remediations launcher finds that an applicable plug-in to address issues that may be preventing the sediment device from receiving OS updates. A sediment device is one that has been on a previous OS version for an extended period. The following fields are available: @@ -3695,7 +3695,7 @@ The following fields are available: ### Microsoft.Windows.SedimentLauncher.Completed -Indicates whether a given plugin has completed its work. +This event is sent when the Windows Update sediment remediations launcher finishes running a plug-in to address issues that may be preventing the sediment device from receiving OS updates. A sediment device is one that has been on a previous OS version for an extended period. The following fields are available: @@ -3741,7 +3741,7 @@ The following fields are available: ### Microsoft.Windows.SedimentLauncher.Started -This event indicates that a given plug-in has started. +This event is sent when the Windows Update sediment remediations launcher starts running a plug-in to address issues that may be preventing the sediment device from receiving OS updates. A sediment device is one that has been on a previous OS version for an extended period. The following fields are available: @@ -3779,7 +3779,7 @@ The following fields are available: ### Microsoft.Windows.SedimentService.Applicable -This event indicates whether a given plug-in is applicable. +This event is sent when the Windows Update sediment remediations service finds that an applicable plug-in to address issues that may be preventing the sediment device from receiving OS updates. A sediment device is one that has been on a previous OS version for an extended period. The following fields are available: @@ -3795,7 +3795,7 @@ The following fields are available: ### Microsoft.Windows.SedimentService.Completed -This event indicates whether a given plug-in has completed its work. +This event is sent when the Windows Update sediment remediations service finishes running a plug-in to address issues that may be preventing the sediment device from receiving OS updates. A sediment device is one that has been on a previous OS version for an extended period. The following fields are available: @@ -3848,7 +3848,7 @@ The following fields are available: ### Microsoft.Windows.SedimentService.Started -This event indicates a specified plug-in has started. This information helps ensure Windows is up to date. +This event is sent when the Windows Update sediment remediations service starts running a plug-in to address issues that may be preventing the sediment device from receiving OS updates. A sediment device is one that has been on a previous OS version for an extended period. The following fields are available: diff --git a/windows/privacy/basic-level-windows-diagnostic-events-and-fields-1709.md b/windows/privacy/basic-level-windows-diagnostic-events-and-fields-1709.md index 8c42efe77e..8aed3dab5e 100644 --- a/windows/privacy/basic-level-windows-diagnostic-events-and-fields-1709.md +++ b/windows/privacy/basic-level-windows-diagnostic-events-and-fields-1709.md @@ -13,7 +13,7 @@ manager: dansimp ms.collection: M365-security-compliance ms.topic: article audience: ITPro -ms.date: 04/15/2019 +ms.date: 04/16/2019 --- @@ -3168,16 +3168,16 @@ deny The following fields are available: - **ActionName** The name of the action to be taken by the plug-in. -- **AppraiserBinariesValidResult** Indicates whether plug-in was appraised as valid. +- **AppraiserBinariesValidResult** Indicates whether the plug-in was appraised as valid. - **AppraiserDetectCondition** Indicates whether the plug-in passed the appraiser's check. - **AppraiserRegistryValidResult** Indicates whether the registry entry checks out as valid. - **AppraiserTaskDisabled** Indicates the appraiser task is disabled. - **CV** Correlation vector - **DateTimeDifference** The difference between local and reference clock times. -- **DateTimeSyncEnabled** Indicates whether the datetime sync plug-in is enabled. +- **DateTimeSyncEnabled** Indicates whether the Datetime Sync plug-in is enabled. - **DaysSinceLastSIH** The number of days since the most recent SIH executed. - **DaysToNextSIH** The number of days until the next scheduled SIH execution. -- **DetectedCondition** Indicates whether detect condition is true and the perform action will be run. +- **DetectedCondition** Indicates whether detected condition is true and the perform action will be run. - **EvalAndReportAppraiserBinariesFailed** Indicates the EvalAndReportAppraiserBinaries event failed. - **EvalAndReportAppraiserRegEntries** Indicates the EvalAndReportAppraiserRegEntriesFailed event failed. - **EvalAndReportAppraiserRegEntriesFailed** Indicates the EvalAndReportAppraiserRegEntriesFailed event failed. @@ -3191,12 +3191,12 @@ The following fields are available: - **PackageVersion** The version of the current remediation package. - **PluginName** Name of the plugin specified for each generic plugin event. - **Reload** True if SIH reload is required. -- **RemediationNoisyHammerAcLineStatus** Event that indicates the AC Line Status of the machine. +- **RemediationNoisyHammerAcLineStatus** Indicates the AC Line Status of the device. - **RemediationNoisyHammerAutoStartCount** The number of times hammer auto-started. - **RemediationNoisyHammerCalendarTaskEnabled** Event that indicates Update Assistant Calendar Task is enabled. - **RemediationNoisyHammerCalendarTaskExists** Event that indicates an Update Assistant Calendar Task exists. - **RemediationNoisyHammerCalendarTaskTriggerEnabledCount** Event that indicates calendar triggers are enabled in the task. -- **RemediationNoisyHammerDaysSinceLastTaskRunTime** The number of days since the most recent hammer task ran. +- **RemediationNoisyHammerDaysSinceLastTaskRunTime** The number of days since the most recent Noisy Hammer task ran. - **RemediationNoisyHammerGetCurrentSize** Size in MB of the $GetCurrent folder. - **RemediationNoisyHammerIsInstalled** TRUE if the noisy hammer is installed. - **RemediationNoisyHammerLastTaskRunResult** The result of the last hammer task run. @@ -3266,7 +3266,7 @@ The following fields are available: ### Microsoft.Windows.Remediation.Completed -This event is sent when Windows Update Sediment Remediations have completed on a device to keep Windows up to date. The remediations address issues on the system that prevent sediment devices from receiving OS updates. “Sediment” refers to devices that have been on a previous OS version for an extended period. +This event is sent when Windows Update sediment remediations have completed on the sediment device to keep Windows up to date. A sediment device is one that has been on a previous OS version for an extended period. The remediations address issues on the system that prevent the device from receiving OS updates. The following fields are available: @@ -3289,7 +3289,7 @@ The following fields are available: - **DiskMbFreeBeforeCleanup** The amount of free hard disk space before cleanup, measured in Megabytes. - **ForcedAppraiserTaskTriggered** TRUE if Appraiser task ran from the plug-in. - **GlobalEventCounter** Client-side counter that indicates ordering of events sent by the active user. -- **HandlerCleanupFreeDiskInMegabytes** The amount of hard disk space cleaned by the storage sense handlers, measured in Megabytes. +- **HandlerCleanupFreeDiskInMegabytes** The amount of hard disk space cleaned by the storage sense handlers, measured in megabytes. - **hasRolledBack** Indicates whether the client machine has rolled back. - **hasUninstalled** Indicates whether the client machine has uninstalled a later version of the OS. - **hResult** The result of the event execution. @@ -3350,7 +3350,7 @@ The following fields are available: - **RunResult** The HRESULT for Detection or Perform Action phases of the plug-in. - **ServiceHealthPlugin** The nae of the Service Health plug-in. - **StartComponentCleanupTask** TRUE if the Component Cleanup task started successfully. -- **systemDriveFreeDiskSpace** Indicates the free disk space on system drive in MBs. +- **systemDriveFreeDiskSpace** Indicates the free disk space on system drive, in megabytes. - **systemUptimeInHours** Indicates the amount of time the system in hours has been on since the last boot. - **TotalSizeofOrphanedInstallerFilesInMegabytes** The size of any orphaned Windows Installer files, measured in Megabytes. - **TotalSizeofStoreCacheAfterCleanupInMegabytes** The size of the Microsoft Store cache after cleanup, measured in Megabytes. @@ -3365,7 +3365,7 @@ The following fields are available: - **usoScanIsNetworkMetered** TRUE if the device is currently connected to a metered network. - **usoScanIsNoAutoUpdateKeyPresent** TRUE if no Auto Update registry key is set/present. - **usoScanIsUserLoggedOn** TRUE if the user is logged on. -- **usoScanPastThreshold** TRUE if the most recent USO (Update Session Orchestrator) scan is past the threshold (late). +- **usoScanPastThreshold** TRUE if the most recent Update Session Orchestrator (USO) scan is past the threshold (late). - **usoScanType** The type of USO (Update Session Orchestrator) scan: "Interactive" or "Background". - **windows10UpgraderBlockWuUpdates** Event to report the value of Windows 10 Upgrader BlockWuUpdates Key. - **windowsEditionId** Event to report the value of Windows Edition ID. @@ -3399,7 +3399,7 @@ The following fields are available: ### Microsoft.Windows.Remediation.Started -This event is sent when Windows Update Sediment Remediations have started on a device to keep Windows up to date. The remediations address issues on the system that prevent sediment devices from receiving OS updates. “Sediment” refers to devices that have been on a previous OS version for an extended period. +This event is sent when Windows Update sediment remediations have started on the sediment device to keep Windows up to date. A sediment device is one that has been on a previous OS version for an extended period. The remediations address issues on the system that prevent the device from receiving OS updates. The following fields are available: @@ -3667,7 +3667,7 @@ The following fields are available: ### Microsoft.Windows.SedimentLauncher.Applicable -Indicates whether a given plugin is applicable. +This event is sent when the Windows Update sediment remediations launcher finds that an applicable plug-in to address issues that may be preventing the sediment device from receiving OS updates. A sediment device is one that has been on a previous OS version for an extended period. The following fields are available: @@ -3683,7 +3683,7 @@ The following fields are available: ### Microsoft.Windows.SedimentLauncher.Completed -Indicates whether a given plugin has completed its work. +This event is sent when the Windows Update sediment remediations launcher finishes running a plug-in to address issues that may be preventing the sediment device from receiving OS updates. A sediment device is one that has been on a previous OS version for an extended period. The following fields are available: @@ -3730,7 +3730,7 @@ The following fields are available: ### Microsoft.Windows.SedimentLauncher.Started -This event indicates that a given plug-in has started. +This event is sent when the Windows Update sediment remediations launcher starts running a plug-in to address issues that may be preventing the sediment device from receiving OS updates. A sediment device is one that has been on a previous OS version for an extended period. The following fields are available: @@ -3768,7 +3768,7 @@ The following fields are available: ### Microsoft.Windows.SedimentService.Applicable -This event indicates whether a given plug-in is applicable. +This event is sent when the Windows Update sediment remediations service finds that an applicable plug-in to address issues that may be preventing the sediment device from receiving OS updates. A sediment device is one that has been on a previous OS version for an extended period. The following fields are available: @@ -3784,7 +3784,7 @@ The following fields are available: ### Microsoft.Windows.SedimentService.Completed -This event indicates whether a given plug-in has completed its work. +This event is sent when the Windows Update sediment remediations service finishes running a plug-in to address issues that may be preventing the sediment device from receiving OS updates. A sediment device is one that has been on a previous OS version for an extended period. The following fields are available: @@ -3838,7 +3838,7 @@ The following fields are available: ### Microsoft.Windows.SedimentService.Started -This event indicates a specified plug-in has started. This information helps ensure Windows is up to date. +This event is sent when the Windows Update sediment remediations service starts running a plug-in to address issues that may be preventing the sediment device from receiving OS updates. A sediment device is one that has been on a previous OS version for an extended period. The following fields are available: diff --git a/windows/privacy/basic-level-windows-diagnostic-events-and-fields-1803.md b/windows/privacy/basic-level-windows-diagnostic-events-and-fields-1803.md index 38e274be19..d26544c92c 100644 --- a/windows/privacy/basic-level-windows-diagnostic-events-and-fields-1803.md +++ b/windows/privacy/basic-level-windows-diagnostic-events-and-fields-1803.md @@ -13,7 +13,7 @@ manager: dansimp ms.collection: M365-security-compliance ms.topic: article audience: ITPro -ms.date: 04/15/2019 +ms.date: 04/16/2019 --- @@ -4269,17 +4269,17 @@ deny The following fields are available: - **ActionName** The name of the action to be taken by the plug-in. -- **AppraiserBinariesValidResult** Indicates whether plug-in was appraised as valid. +- **AppraiserBinariesValidResult** Indicates whether the plug-in was appraised as valid. - **AppraiserDetectCondition** Indicates whether the plug-in passed the appraiser's check. - **AppraiserRegistryValidResult** Indicates whether the registry entry checks out as valid. - **AppraiserTaskDisabled** Indicates the appraiser task is disabled. - **AppraiserTaskValidFailed** Indicates the Appraiser task did not function and requires intervention. - **CV** Correlation vector - **DateTimeDifference** The difference between local and reference clock times. -- **DateTimeSyncEnabled** Indicates whether the datetime sync plug-in is enabled. +- **DateTimeSyncEnabled** Indicates whether the Datetime Sync plug-in is enabled. - **DaysSinceLastSIH** The number of days since the most recent SIH executed. - **DaysToNextSIH** The number of days until the next scheduled SIH execution. -- **DetectedCondition** Indicates whether detect condition is true and the perform action will be run. +- **DetectedCondition** Indicates whether detected condition is true and the perform action will be run. - **EvalAndReportAppraiserBinariesFailed** Indicates the EvalAndReportAppraiserBinaries event failed. - **EvalAndReportAppraiserRegEntries** Indicates the EvalAndReportAppraiserRegEntriesFailed event failed. - **EvalAndReportAppraiserRegEntriesFailed** Indicates the EvalAndReportAppraiserRegEntriesFailed event failed. @@ -4293,12 +4293,12 @@ The following fields are available: - **PackageVersion** The version of the current remediation package. - **PluginName** Name of the plugin specified for each generic plugin event. - **Reload** True if SIH reload is required. -- **RemediationNoisyHammerAcLineStatus** Event that indicates the AC Line Status of the machine. +- **RemediationNoisyHammerAcLineStatus** Indicates the AC Line Status of the device. - **RemediationNoisyHammerAutoStartCount** The number of times hammer auto-started. - **RemediationNoisyHammerCalendarTaskEnabled** Event that indicates Update Assistant Calendar Task is enabled. - **RemediationNoisyHammerCalendarTaskExists** Event that indicates an Update Assistant Calendar Task exists. - **RemediationNoisyHammerCalendarTaskTriggerEnabledCount** Event that indicates calendar triggers are enabled in the task. -- **RemediationNoisyHammerDaysSinceLastTaskRunTime** The number of days since the most recent hammer task ran. +- **RemediationNoisyHammerDaysSinceLastTaskRunTime** The number of days since the most recent Noisy Hammer task ran. - **RemediationNoisyHammerGetCurrentSize** Size in MB of the $GetCurrent folder. - **RemediationNoisyHammerIsInstalled** TRUE if the noisy hammer is installed. - **RemediationNoisyHammerLastTaskRunResult** The result of the last hammer task run. @@ -4368,7 +4368,7 @@ The following fields are available: ### Microsoft.Windows.Remediation.Completed -This event is sent when Windows Update Sediment Remediations have completed on a device to keep Windows up to date. The remediations address issues on the system that prevent sediment devices from receiving OS updates. “Sediment” refers to devices that have been on a previous OS version for an extended period. +This event is sent when Windows Update sediment remediations have completed on the sediment device to keep Windows up to date. A sediment device is one that has been on a previous OS version for an extended period. The remediations address issues on the system that prevent the device from receiving OS updates. The following fields are available: @@ -4391,7 +4391,7 @@ The following fields are available: - **DiskMbFreeBeforeCleanup** The amount of free hard disk space before cleanup, measured in Megabytes. - **ForcedAppraiserTaskTriggered** TRUE if Appraiser task ran from the plug-in. - **GlobalEventCounter** Client-side counter that indicates ordering of events sent by the active user. -- **HandlerCleanupFreeDiskInMegabytes** The amount of hard disk space cleaned by the storage sense handlers, measured in Megabytes. +- **HandlerCleanupFreeDiskInMegabytes** The amount of hard disk space cleaned by the storage sense handlers, measured in megabytes. - **hasRolledBack** Indicates whether the client machine has rolled back. - **hasUninstalled** Indicates whether the client machine has uninstalled a later version of the OS. - **hResult** The result of the event execution. @@ -4456,7 +4456,7 @@ The following fields are available: - **ServiceHealthInstalledBitMap** List of services installed by the plugin. - **ServiceHealthPlugin** The nae of the Service Health plug-in. - **StartComponentCleanupTask** TRUE if the Component Cleanup task started successfully. -- **systemDriveFreeDiskSpace** Indicates the free disk space on system drive in MBs. +- **systemDriveFreeDiskSpace** Indicates the free disk space on system drive, in megabytes. - **systemUptimeInHours** Indicates the amount of time the system in hours has been on since the last boot. - **TotalSizeofOrphanedInstallerFilesInMegabytes** The size of any orphaned Windows Installer files, measured in Megabytes. - **TotalSizeofStoreCacheAfterCleanupInMegabytes** The size of the Microsoft Store cache after cleanup, measured in Megabytes. @@ -4471,7 +4471,7 @@ The following fields are available: - **usoScanIsNetworkMetered** TRUE if the device is currently connected to a metered network. - **usoScanIsNoAutoUpdateKeyPresent** TRUE if no Auto Update registry key is set/present. - **usoScanIsUserLoggedOn** TRUE if the user is logged on. -- **usoScanPastThreshold** TRUE if the most recent USO (Update Session Orchestrator) scan is past the threshold (late). +- **usoScanPastThreshold** TRUE if the most recent Update Session Orchestrator (USO) scan is past the threshold (late). - **usoScanType** The type of USO (Update Session Orchestrator) scan: "Interactive" or "Background". - **windows10UpgraderBlockWuUpdates** Event to report the value of Windows 10 Upgrader BlockWuUpdates Key. - **windowsEditionId** Event to report the value of Windows Edition ID. @@ -4505,7 +4505,7 @@ The following fields are available: ### Microsoft.Windows.Remediation.Started -This event is sent when Windows Update Sediment Remediations have started on a device to keep Windows up to date. The remediations address issues on the system that prevent sediment devices from receiving OS updates. “Sediment” refers to devices that have been on a previous OS version for an extended period. +This event is sent when Windows Update sediment remediations have started on the sediment device to keep Windows up to date. A sediment device is one that has been on a previous OS version for an extended period. The remediations address issues on the system that prevent the device from receiving OS updates. The following fields are available: @@ -4738,7 +4738,7 @@ The following fields are available: ### Microsoft.Windows.SedimentLauncher.Applicable -Indicates whether a given plugin is applicable. +This event is sent when the Windows Update sediment remediations launcher finds that an applicable plug-in to address issues that may be preventing the sediment device from receiving OS updates. A sediment device is one that has been on a previous OS version for an extended period. The following fields are available: @@ -4754,7 +4754,7 @@ The following fields are available: ### Microsoft.Windows.SedimentLauncher.Completed -Indicates whether a given plugin has completed its work. +This event is sent when the Windows Update sediment remediations launcher finishes running a plug-in to address issues that may be preventing the sediment device from receiving OS updates. A sediment device is one that has been on a previous OS version for an extended period. The following fields are available: @@ -4769,7 +4769,7 @@ The following fields are available: ### Microsoft.Windows.SedimentLauncher.Started -This event indicates that a given plug-in has started. +This event is sent when the Windows Update sediment remediations launcher starts running a plug-in to address issues that may be preventing the sediment device from receiving OS updates. A sediment device is one that has been on a previous OS version for an extended period. The following fields are available: @@ -4782,7 +4782,7 @@ The following fields are available: ### Microsoft.Windows.SedimentService.Applicable -This event indicates whether a given plug-in is applicable. +This event is sent when the Windows Update sediment remediations service finds that an applicable plug-in to address issues that may be preventing the sediment device from receiving OS updates. A sediment device is one that has been on a previous OS version for an extended period. The following fields are available: @@ -4798,7 +4798,7 @@ The following fields are available: ### Microsoft.Windows.SedimentService.Completed -This event indicates whether a given plug-in has completed its work. +This event is sent when the Windows Update sediment remediations service finishes running a plug-in to address issues that may be preventing the sediment device from receiving OS updates. A sediment device is one that has been on a previous OS version for an extended period. The following fields are available: @@ -4820,7 +4820,7 @@ The following fields are available: ### Microsoft.Windows.SedimentService.Started -This event indicates a specified plug-in has started. This information helps ensure Windows is up to date. +This event is sent when the Windows Update sediment remediations service starts running a plug-in to address issues that may be preventing the sediment device from receiving OS updates. A sediment device is one that has been on a previous OS version for an extended period. The following fields are available: diff --git a/windows/privacy/basic-level-windows-diagnostic-events-and-fields-1809.md b/windows/privacy/basic-level-windows-diagnostic-events-and-fields-1809.md index f359c36a0c..26bb7bab6a 100644 --- a/windows/privacy/basic-level-windows-diagnostic-events-and-fields-1809.md +++ b/windows/privacy/basic-level-windows-diagnostic-events-and-fields-1809.md @@ -13,7 +13,7 @@ manager: dansimp ms.collection: M365-security-compliance ms.topic: article audience: ITPro -ms.date: 04/15/2019 +ms.date: 04/16/2019 --- @@ -4549,6 +4549,19 @@ The following fields are available: ## Migration events +### Microsoft.Windows.MigrationCore.MigObjectCountDLUsr + +No content is currently available. + +The following fields are available: + +- **currentSid** No content is currently available. +- **defaultLoc->DirName->CString** No content is currently available. +- **knownFoldersUsr[i]** No content is currently available. +- **migDiagSession->CString** No content is currently available. +- **objectCount** No content is currently available. + + ### Microsoft.Windows.MigrationCore.MigObjectCountKFSys This event returns data about the count of the migration objects across various phases during feature update. @@ -4562,15 +4575,14 @@ The following fields are available: ### Microsoft.Windows.MigrationCore.MigObjectCountKFUsr -No content is currently available. +This event returns data to track the count of the migration objects across various phases during feature update. The following fields are available: -- **currentSid** No content is currently available. -- **knownFolderLoc->DirName->CString** No content is currently available. -- **knownFoldersUsr[i]** No content is currently available. -- **migDiagSession->CString** No content is currently available. -- **objectCount** No content is currently available. +- **currentSid** Indicates the user SID for which the migration is being performed. +- **knownFoldersUsr[i]** Predefined folder path locations. +- **migDiagSession->CString** The phase of the upgrade where migration occurs. (E.g.: Validate tracked content) +- **objectCount** The count for the number of objects that are being transferred. ## Miracast events @@ -4809,36 +4821,36 @@ The following fields are available: ### Microsoft.Windows.Remediation.Applicable -This event indicates whether Windows Update Sediment Remediations need to be applied to a device to keep Windows up to date. The remediations address issues on the system that prevent sediment devices from receiving OS updates. “Sediment” refers to devices that have been on a previous OS version for an extended period. +This event indicates whether Windows Update sediment remediations need to be applied to the sediment device to keep Windows up to date. A sediment device is one that has been on a previous OS version for an extended period. The remediations address issues on the system that prevent the device from receiving OS updates. The following fields are available: - **AllowAutoUpdateExists** Indicates whether the Automatic Update feature is turned on. - **AllowAutoUpdateProviderSetExists** Indicates whether the Allow Automatic Update provider exists. -- **AppraiserBinariesValidResult** Indicates whether plug-in was appraised as valid. +- **AppraiserBinariesValidResult** Indicates whether the plug-in was appraised as valid. - **AppraiserRegistryValidResult** Indicates whether the registry entry checks out as valid. -- **AppraiserTaskRepairDisabled** Task repair performed by the appraiser plugin is disabled. -- **AppraiserTaskValid** Indicates that the appraiser task is valid. -- **AUOptionsExists** Indicates whether automatic update options exist. +- **AppraiserTaskRepairDisabled** Task repair performed by the Appraiser plug-in is disabled. +- **AppraiserTaskValid** Indicates that the Appraiser task is valid. +- **AUOptionsExists** Indicates whether the Automatic Update options exist. - **CTACTargetingAttributesInvalid** Indicates whether the Common Targeting Attribute Client (CTAC) attributes are valid. CTAC is a Windows Runtime client library. - **CTACVersion** The Common Targeting Attribute Client (CTAT) version on the device. CTAT is a Windows Runtime client library. - **CV** Correlation vector - **DataStoreSizeInBytes** Size of the data store, in bytes. - **DateTimeDifference** The difference between local and reference clock times. -- **DateTimeSyncEnabled** Indicates whether the datetime sync plug-in is enabled. -- **daysSinceInstallThreshold** The maximum number of days since the operating system was installed before we check to see if remediation is needed. +- **DateTimeSyncEnabled** Indicates whether the Datetime Sync plug-in is enabled. +- **daysSinceInstallThreshold** The maximum number of days since the operating system was installed before the device is checked to see if remediation is needed. - **daysSinceInstallValue** Number of days since the operating system was installed. - **DaysSinceLastSIH** The number of days since the most recent SIH executed. - **DaysToNextSIH** The number of days until the next scheduled SIH execution. - **DetectConditionEnabled** Indicates whether a condition that the remediation tool can repair was detected. -- **DetectedCondition** Indicates whether detect condition is true and the perform action will be run. +- **DetectedCondition** Indicates whether detected condition is true and the perform action will be run. - **DetectionFailedReason** Indicates why a given remediation failed to fix a problem that was detected. - **DiskFreeSpaceBeforeSedimentPackInMB** Number of megabytes of disk space available on the device before running the Sediment Pack. - **DiskSpaceBefore** The amount of free disk space available before a remediation was run. - **EditionIdFixCorrupted** Indicates whether the Edition ID is corrupted. - **EscalationTimerResetFixResult** The result of fixing the escalation timer. - **EvalAndReportAppraiserRegEntries** Indicates the EvalAndReportAppraiserRegEntriesFailed event failed. -- **FixedEditionId** Indicates whether we fixed Edition ID. +- **FixedEditionId** Indicates whether we fixed the edition ID. - **FlightRebootTime** The amount of time before the system is rebooted. - **ForcedRebootToleranceDays** The maximum number of days before a system reboot is forced on the devie. - **FreeSpaceRequirement** The amount of free space required. @@ -4875,7 +4887,7 @@ The following fields are available: - **ProductType** The product type of Windows 10. - **QualityUpdateSedimentFunnelState** Provides information about whether Windows Quality Updates are missing on the device. - **QualityUpdateSedimentJsonSchemaVersion** The schema version of the Quality Update Sediment Remediation. -- **QualityUpdateSedimentLastRunSeconds** The number of seconds since the Quality Updates were run +- **QualityUpdateSedimentLastRunSeconds** The number of seconds since the Quality Updates were run. - **QualityUpdateSedimentLocalStartTime** Provides information about when Quality Updates were run. - **QualityUpdateSedimentLocaltTime** The local time of the device running the Quality Update Sediment Remediation. - **QualityUpdateSedimentTargetedPlugins** Provides the list of remediation plug-ins that are applicable to enable Quality Updates on the device. @@ -4887,7 +4899,7 @@ The following fields are available: - **RemediationAutoUACalendarTaskEnabled** Indicates whether an Automatic Update Assistant tool task is enabled. - **RemediationAutoUACalendarTaskExists** Indicates whether an Automatic Update Assistant tool task exists. - **RemediationAutoUACalendarTaskTriggerEnabledCount** Indicates the number of times an Automatic Update Assistant tool task has been triggered. -- **RemediationAutoUADaysSinceLastTaskRunTime** Indicates the last run time of an Automatic Update Assistant tool task. +- **RemediationAutoUADaysSinceLastTaskRunTime** Indicates the last run time an Automatic Update Assistant tool task was run. - **RemediationAutoUAGetCurrentSize** Indicates the current size of the Automatic Update Assistant tool. - **RemediationAutoUAIsInstalled** Indicates whether the Automatic Update Assistant tool is installed. - **RemediationAutoUALastTaskRunResult** Indicates the result from the last time the Automatic Update Assistant tool was run. @@ -4895,16 +4907,16 @@ The following fields are available: - **RemediationAutoUATaskEnabled** Indicates whether the Automatic Update Assistant tool task is enabled. - **RemediationAutoUATaskExists** Indicates whether an Automatic Update Assistant tool task exists. - **RemediationAutoUATasksStalled** Indicates whether an Automatic Update Assistant tool task is stalled. -- **RemediationAutoUATaskTriggerEnabledCount** Indicates how many times an Automatic Update Assistant tool task has been triggered. +- **RemediationAutoUATaskTriggerEnabledCount** Indicates how many times an Automatic Update Assistant tool task was triggered. - **RemediationAutoUAUAExitCode** Indicates any exit code provided by the Automatic Update Assistant tool. - **RemediationAutoUAUAExitState** Indicates the exit state of the Automatic Update Assistant tool. - **RemediationAutoUAUserLoggedIn** Indicates whether a user is logged in. -- **RemediationAutoUAUserLoggedInAdmin** Indicates whether an Administrator user is logged in. +- **RemediationAutoUAUserLoggedInAdmin** Indicates whether a user is logged in as an Administrator. - **RemediationCorruptionRepairBuildNumber** The build number to use to repair corruption. - **RemediationCorruptionRepairCorruptionsDetected** Indicates whether corruption was detected. - **RemediationCorruptionRepairDetected** Indicates whether an attempt was made to repair the corruption. - **RemediationDeliverToastBuildNumber** Indicates a build number that should be applicable to this device. -- **RemediationDeliverToastDetected** Indicates that a plugin has been detected. +- **RemediationDeliverToastDetected** Indicates that a plug-in has been detected. - **RemediationDeliverToastDeviceExcludedNation** Indicates the geographic identity (GEO ID) that is not applicable for a given plug-in. - **RemediationDeliverToastDeviceFreeSpaceInMB** Indicates the amount of free space, in megabytes. - **RemediationDeliverToastDeviceHomeSku** Indicates whether the plug-in is applicable for the Windows 10 Home edition. @@ -4914,12 +4926,12 @@ The following fields are available: - **RemediationDeliverToastGeoId** Indicates the geographic identifier (GEO ID) that is applicable for a given plug-in. - **RemediationDeviceSkuId** The Windows 10 edition ID that maps to the version of Windows 10 on the device. - **RemediationGetCurrentFolderExist** Indicates whether the GetCurrent folder exists. -- **RemediationNoisyHammerAcLineStatus** Event that indicates the AC Line Status of the machine. +- **RemediationNoisyHammerAcLineStatus** Indicates the AC Line Status of the device. - **RemediationNoisyHammerAutoStartCount** The number of times hammer auto-started. - **RemediationNoisyHammerCalendarTaskEnabled** Event that indicates Update Assistant Calendar Task is enabled. - **RemediationNoisyHammerCalendarTaskExists** Event that indicates an Update Assistant Calendar Task exists. - **RemediationNoisyHammerCalendarTaskTriggerEnabledCount** Event that indicates calendar triggers are enabled in the task. -- **RemediationNoisyHammerDaysSinceLastTaskRunTime** The number of days since the most recent hammer task ran. +- **RemediationNoisyHammerDaysSinceLastTaskRunTime** The number of days since the most recent Noisy Hammer task ran. - **RemediationNoisyHammerGetCurrentSize** Size in MB of the $GetCurrent folder. - **RemediationNoisyHammerIsInstalled** TRUE if the noisy hammer is installed. - **RemediationNoisyHammerLastTaskRunResult** The result of the last hammer task run. @@ -4943,10 +4955,10 @@ The following fields are available: - **RemediationProgramDataFolderSizeInMB** The size (in megabytes) of the Program Data folder on the device. - **RemediationProgramFilesFolderSizeInMB** The size (in megabytes) of the Program Files folder on the device. - **RemediationShellDeviceApplicabilityFailedReason** The reason the Remediation is not applicable to the device (expressed as a bitmap). -- **RemediationShellDeviceEducationSku** Indicates whether a Windows 10 Education edition is detected on the device. -- **RemediationShellDeviceEnterpriseSku** Indicates whether a Windows 10 Enterprise edition is detected on the device. +- **RemediationShellDeviceEducationSku** Indicates whether the Windows 10 Education edition is detected on the device. +- **RemediationShellDeviceEnterpriseSku** Indicates whether the Windows 10 Enterprise edition is detected on the device. - **RemediationShellDeviceFeatureUpdatesPaused** Indicates whether Feature Updates are paused on the device. -- **RemediationShellDeviceHomeSku** Indicates whether a Windows 10 Home edition is detected on the device. +- **RemediationShellDeviceHomeSku** Indicates whether the Windows 10 Home edition is detected on the device. - **RemediationShellDeviceIsAllowedSku** Indicates whether the Windows 10 edition is applicable to the device. - **RemediationShellDeviceManaged** TRUE if the device is WSUS managed or Windows Updated disabled. - **RemediationShellDeviceNewOS** TRUE if the device has a recently installed OS. @@ -4957,9 +4969,9 @@ The following fields are available: - **RemediationShellDeviceSetupMutexInUse** Indicates whether device setup is in progress. - **RemediationShellDeviceWuRegistryBlocked** Indicates whether the Windows Update is blocked on the device via the registry. - **RemediationShellDeviceZeroExhaust** TRUE if the device has opted out of Windows Updates completely. -- **RemediationShellHasExpired** Indicates whether the Remediation iterations have ended. +- **RemediationShellHasExpired** Indicates whether the remediation iterations have ended. - **RemediationShellHasUpgraded** Indicates whether the device upgraded. -- **RemediationShellIsDeviceApplicable** Indicates whether the Remediation is applicable to the device. +- **RemediationShellIsDeviceApplicable** Indicates whether the remediation is applicable to the device. - **RemediationTargetMachine** Indicates whether the device is a target of the specified fix. - **RemediationTaskHealthAutochkProxy** True/False based on the health of the AutochkProxy task. - **RemediationTaskHealthChkdskProactiveScan** True/False based on the health of the Check Disk task. @@ -4973,7 +4985,7 @@ The following fields are available: - **RemediationUHServiceNotExistBitMap** A bitmap indicating which services were deleted. - **RemediationUsersFolderSizeInMB** The size (in megabytes) of the Users folder on the device. - **RemediationWindows10UpgradeFolderExist** Indicates whether the Windows 10 Upgrade folder exists. -- **RemediationWindows10UpgradeFolderSizeInMB** The size (in megabytes) of Windows 10 Upgrade folder on the device. +- **RemediationWindows10UpgradeFolderSizeInMB** The size (in megabytes) of the Windows 10 Upgrade folder on the device. - **RemediationWindowsAppsFolderSizeInMB** The size (in megabytes) of the Windows Applications folder on the device. - **RemediationWindowsBtFolderSizeInMB** The size (in megabytes) of the Windows BT folder on the device. - **RemediationWindowsFolderSizeInMB** The size (in megabytes) of the Windows folder on the device. @@ -5003,7 +5015,7 @@ The following fields are available: ### Microsoft.Windows.Remediation.Completed -This event is sent when Windows Update Sediment Remediations have completed on a device to keep Windows up to date. The remediations address issues on the system that prevent sediment devices from receiving OS updates. “Sediment” refers to devices that have been on a previous OS version for an extended period. +This event is sent when Windows Update sediment remediations have completed on the sediment device to keep Windows up to date. A sediment device is one that has been on a previous OS version for an extended period. The remediations address issues on the system that prevent the device from receiving OS updates. The following fields are available: @@ -5021,7 +5033,7 @@ The following fields are available: - **DiskSpaceCleanedByRestorePointRemoval** The amount of disk space (megabytes) in restore points that was cleaned up by the plug-in. - **ForcedAppraiserTaskTriggered** TRUE if Appraiser task ran from the plug-in. - **GlobalEventCounter** Client-side counter that indicates ordering of events sent by the active user. -- **HandlerCleanupFreeDiskInMegabytes** The amount of hard disk space cleaned by the storage sense handlers, measured in Megabytes. +- **HandlerCleanupFreeDiskInMegabytes** The amount of hard disk space cleaned by the storage sense handlers, measured in megabytes. - **hasRolledBack** Indicates whether the client machine has rolled back. - **hasUninstalled** Indicates whether the client machine has uninstalled a later version of the OS. - **hResult** The result of the event execution. @@ -5095,7 +5107,7 @@ The following fields are available: - **StorageSenseHelloFaceRecognitionFodCleanupTotalInByte** The amount of space that Storage Sense was able to clean up in the User Download folder by removing Windows Hello facial recognition. - **StorageSenseRestorePointCleanupTotalInMB** The total number of megabytes that Storage Sense cleaned up in the User Download folder. - **StorageSenseUserDownloadFolderCleanupTotalInByte** The total number of bytes that Storage Sense cleaned up in the User Download folder. -- **systemDriveFreeDiskSpace** Indicates the free disk space on system drive in MBs. +- **systemDriveFreeDiskSpace** Indicates the free disk space on system drive, in megabytes. - **systemUptimeInHours** Indicates the amount of time the system in hours has been on since the last boot. - **uninstallActive** TRUE if previous uninstall has occurred for current OS - **usoScanDaysSinceLastScan** The number of days since the last USO (Update Session Orchestrator) scan. @@ -5107,7 +5119,7 @@ The following fields are available: - **usoScanIsNetworkMetered** TRUE if the device is currently connected to a metered network. - **usoScanIsNoAutoUpdateKeyPresent** TRUE if no Auto Update registry key is set/present. - **usoScanIsUserLoggedOn** TRUE if the user is logged on. -- **usoScanPastThreshold** TRUE if the most recent USO (Update Session Orchestrator) scan is past the threshold (late). +- **usoScanPastThreshold** TRUE if the most recent Update Session Orchestrator (USO) scan is past the threshold (late). - **usoScanType** The type of USO (Update Session Orchestrator) scan: "Interactive" or "Background". - **windows10UpgraderBlockWuUpdates** Event to report the value of Windows 10 Upgrader BlockWuUpdates Key. - **windowsEditionId** Event to report the value of Windows Edition ID. @@ -5117,7 +5129,7 @@ The following fields are available: ### Microsoft.Windows.Remediation.Started -This event is sent when Windows Update Sediment Remediations have started on a device to keep Windows up to date. The remediations address issues on the system that prevent sediment devices from receiving OS updates. “Sediment” refers to devices that have been on a previous OS version for an extended period. +This event is sent when Windows Update sediment remediations have started on the sediment device to keep Windows up to date. A sediment device is one that has been on a previous OS version for an extended period. The remediations address issues on the system that prevent the device from receiving OS updates. The following fields are available: @@ -5195,7 +5207,7 @@ The following fields are available: ### Microsoft.Windows.SedimentLauncher.Applicable -Indicates whether a given plugin is applicable. +This event is sent when the Windows Update sediment remediations launcher finds that an applicable plug-in to address issues that may be preventing the sediment device from receiving OS updates. A sediment device is one that has been on a previous OS version for an extended period. The following fields are available: @@ -5213,7 +5225,7 @@ The following fields are available: ### Microsoft.Windows.SedimentLauncher.Completed -Indicates whether a given plugin has completed its work. +This event is sent when the Windows Update sediment remediations launcher finishes running a plug-in to address issues that may be preventing the sediment device from receiving OS updates. A sediment device is one that has been on a previous OS version for an extended period. The following fields are available: @@ -5228,7 +5240,7 @@ The following fields are available: ### Microsoft.Windows.SedimentLauncher.Started -This event indicates that a given plug-in has started. +This event is sent when the Windows Update sediment remediations launcher starts running a plug-in to address issues that may be preventing the sediment device from receiving OS updates. A sediment device is one that has been on a previous OS version for an extended period. The following fields are available: @@ -5241,7 +5253,7 @@ The following fields are available: ### Microsoft.Windows.SedimentService.Applicable -This event indicates whether a given plug-in is applicable. +This event is sent when the Windows Update sediment remediations service finds that an applicable plug-in to address issues that may be preventing the sediment device from receiving OS updates. A sediment device is one that has been on a previous OS version for an extended period. The following fields are available: @@ -5259,7 +5271,7 @@ The following fields are available: ### Microsoft.Windows.SedimentService.Completed -This event indicates whether a given plug-in has completed its work. +This event is sent when the Windows Update sediment remediations service finishes running a plug-in to address issues that may be preventing the sediment device from receiving OS updates. A sediment device is one that has been on a previous OS version for an extended period. The following fields are available: @@ -5283,7 +5295,7 @@ The following fields are available: ### Microsoft.Windows.SedimentService.Started -This event indicates a specified plug-in has started. This information helps ensure Windows is up to date. +This event is sent when the Windows Update sediment remediations service starts running a plug-in to address issues that may be preventing the sediment device from receiving OS updates. A sediment device is one that has been on a previous OS version for an extended period. The following fields are available: @@ -5468,7 +5480,6 @@ The following fields are available: - **BiosSKUNumber** The sku number of the device BIOS. - **BIOSVendor** The vendor of the BIOS. - **BiosVersion** The version of the BIOS. -- **Bundle02,UsedDO** No content is currently available. - **BundleBytesDownloaded** Number of bytes downloaded for the specific content bundle. - **BundleId** Identifier associated with the specific content bundle. - **BundleRepeatFailCount** Indicates whether this particular update bundle has previously failed. @@ -5483,7 +5494,6 @@ The following fields are available: - **CDNId** ID which defines which CDN the software distribution client downloaded the content from. - **ClientVersion** The version number of the software distribution client. - **CommonProps** A bitmask for future flags associated with the Windows Update client behavior. -- **ComvonProps** No content is currently available. - **ConnectTime** Indicates the cumulative amount of time (in seconds) it took to establish the connection for all updates in an update bundle. - **CurrentMobileOperator** The mobile operator the device is currently connected to. - **DeviceModel** The model of the device. @@ -5621,7 +5631,6 @@ The following fields are available: - **DeviceModel** The device model. - **DriverPingBack** Contains information about the previous driver and system state. - **DriverRecoveryIds** The list of identifiers that could be used for uninstalling the drivers if a recovery is required. -- **DriverReuoveryIds** No content is currently available. - **EventInstanceID** A globally unique identifier for event instance. - **EventScenario** Indicates the purpose of sending this event - whether because the software distribution just started installing content, or whether it was cancelled, succeeded, or failed. - **EventType** Possible values are Child, Bundle, or Driver. @@ -6392,7 +6401,6 @@ The following fields are available: - **ClientId** Retrieves the upgrade ID. In the Windows Update scenario, this will be the Windows Update client ID. In Media setup, default value is Media360, but can be overwritten by the caller to a unique value. - **FieldName** Retrieves the data point. -- **FimldName** No content is currently available. - **FlightData** Specifies a unique identifier for each group of Windows Insider builds. - **InstanceId** Retrieves a unique identifier for each instance of a setup session. - **ReportId** Retrieves the report ID. @@ -7087,8 +7095,6 @@ The following fields are available: - **numPeers** The total number of peers used for this download. - **numPeersLocal** The total number of local peers used for this download. - **predefinedCallerName** The name of the API Caller. -- **restrictederRepo** No content is currently available. -- **restrictedloaded** No content is currently available. - **restrictedUpload** Is the upload restricted? - **routeToCacheServer** The cache server setting, source, and value. - **sessionID** The ID of the download session. @@ -7150,7 +7156,6 @@ The following fields are available: - **predefinedCallerName** Name of the API caller. - **routeToCacheServer** Cache server setting, source, and value. - **sessionID** The ID for the file download session. -- **setConbigs** No content is currently available. - **setConfigs** A JSON representation of the configurations that have been set, and their sources. - **updateID** The ID of the update being downloaded. - **usedMemoryStream** Indicates whether the download used memory streaming. From a2b9950b7a61cbd5479147cba775bf0024beafd7 Mon Sep 17 00:00:00 2001 From: DaniHalfin Date: Tue, 16 Apr 2019 18:22:27 +0000 Subject: [PATCH 184/724] Initialize Docs repository: https://github.com/MicrosoftDocs/windows-docs-pr of branch live --- .openpublishing.publish.config.json | 18 +++++++++++++++++- 1 file changed, 17 insertions(+), 1 deletion(-) diff --git a/.openpublishing.publish.config.json b/.openpublishing.publish.config.json index 00a28f07b2..33e053e7cd 100644 --- a/.openpublishing.publish.config.json +++ b/.openpublishing.publish.config.json @@ -305,6 +305,22 @@ "build_entry_point": "docs", "template_folder": "_themes" }, + { + "docset_name": "windows-known-issues", + "build_source_folder": "windows/known-issues", + "build_output_subfolder": "windows-known-issues", + "locale": "en-us", + "monikers": [], + "moniker_ranges": [], + "open_to_public_contributors": true, + "type_mapping": { + "Conceptual": "Content", + "ManagedReference": "Content", + "RestApi": "Content" + }, + "build_entry_point": "docs", + "template_folder": "_themes" + }, { "docset_name": "windows-manage", "build_source_folder": "windows/manage", @@ -465,4 +481,4 @@ }, "need_generate_pdf": false, "need_generate_intellisense": false -} +} \ No newline at end of file From 27b525e366e7221874e89b7bf3fbb59fe7d420af Mon Sep 17 00:00:00 2001 From: Jeanie Decker Date: Tue, 16 Apr 2019 12:39:03 -0700 Subject: [PATCH 185/724] fix order --- windows/application-management/manage-windows-mixed-reality.md | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/windows/application-management/manage-windows-mixed-reality.md b/windows/application-management/manage-windows-mixed-reality.md index 789eabab79..5f7378bd96 100644 --- a/windows/application-management/manage-windows-mixed-reality.md +++ b/windows/application-management/manage-windows-mixed-reality.md @@ -33,7 +33,7 @@ Organizations that use Windows Server Update Services (WSUS) must take action to 2. Windows Mixed Reality Feature on Demand (FOD) is downloaded from Windows Update. If access to Windows Update is blocked, you must manually install the Windows Mixed Reality FOD. - a. Download the FOD .cab file for [Windows 10, version 1809](https://software-download.microsoft.com/download/pr/microsoft-windows-holographic-desktop-fod-package31bf3856ad364e35amd64_1.cab), [Windows 10, version 1803](https://download.microsoft.com/download/9/9/3/9934B163-FA01-4108-A38A-851B4ACD1244/Microsoft-Windows-Holographic-Desktop-FOD-Package~31bf3856ad364e35~amd64~~.cab), [Windows 10, version 1709](http://download.microsoft.com/download/6/F/8/6F816172-AC7D-4F45-B967-D573FB450CB7/Microsoft-Windows-Holographic-Desktop-FOD-Package.cab), or [Windows 10, version 1903](https://software-download.microsoft.com/download/pr/Microsoft-Windows-Holographic-Desktop-FOD-Package-31bf3856ad364e35-amd64.cab). + a. Download the FOD .cab file for [Windows 10, version 1903](https://software-download.microsoft.com/download/pr/Microsoft-Windows-Holographic-Desktop-FOD-Package-31bf3856ad364e35-amd64.cab), [Windows 10, version 1809](https://software-download.microsoft.com/download/pr/microsoft-windows-holographic-desktop-fod-package31bf3856ad364e35amd64_1.cab), [Windows 10, version 1803](https://download.microsoft.com/download/9/9/3/9934B163-FA01-4108-A38A-851B4ACD1244/Microsoft-Windows-Holographic-Desktop-FOD-Package~31bf3856ad364e35~amd64~~.cab), or [Windows 10, version 1709](http://download.microsoft.com/download/6/F/8/6F816172-AC7D-4F45-B967-D573FB450CB7/Microsoft-Windows-Holographic-Desktop-FOD-Package.cab). >[!NOTE] >You must download the FOD .cab file that matches your operating system version. From af7b78b1edce072fd9ce51c2b4d8c6d19798577d Mon Sep 17 00:00:00 2001 From: DaniHalfin Date: Tue, 16 Apr 2019 20:30:25 +0000 Subject: [PATCH 186/724] Initialize Docs repository: https://github.com/MicrosoftDocs/windows-docs-pr of branch live --- .openpublishing.publish.config.json | 16 +++++++++ windows/release-information/docfx.json | 47 ++++++++++++++++++++++++++ 2 files changed, 63 insertions(+) create mode 100644 windows/release-information/docfx.json diff --git a/.openpublishing.publish.config.json b/.openpublishing.publish.config.json index 33e053e7cd..2a308af532 100644 --- a/.openpublishing.publish.config.json +++ b/.openpublishing.publish.config.json @@ -97,6 +97,22 @@ "build_entry_point": "docs", "template_folder": "_themes" }, + { + "docset_name": "release-information", + "build_source_folder": "windows/release-information", + "build_output_subfolder": "release-information", + "locale": "en-us", + "monikers": [], + "moniker_ranges": [], + "open_to_public_contributors": true, + "type_mapping": { + "Conceptual": "Content", + "ManagedReference": "Content", + "RestApi": "Content" + }, + "build_entry_point": "docs", + "template_folder": "_themes" + }, { "docset_name": "smb", "build_source_folder": "smb", diff --git a/windows/release-information/docfx.json b/windows/release-information/docfx.json new file mode 100644 index 0000000000..6a0fb3e804 --- /dev/null +++ b/windows/release-information/docfx.json @@ -0,0 +1,47 @@ +{ + "build": { + "content": [ + { + "files": [ + "**/*.md", + "**/*.yml" + ], + "exclude": [ + "**/obj/**", + "**/includes/**", + "_themes/**", + "_themes.pdf/**", + "README.md", + "LICENSE", + "LICENSE-CODE", + "ThirdPartyNotices" + ] + } + ], + "resource": [ + { + "files": [ + "**/*.png", + "**/*.jpg" + ], + "exclude": [ + "**/obj/**", + "**/includes/**", + "_themes/**", + "_themes.pdf/**" + ] + } + ], + "overwrite": [], + "externalReference": [], + "globalMetadata": { + "breadcrumb_path": "/release-information/breadcrumb/toc.json", + "extendBreadcrumb": true, + "feedback_system": "None" + }, + "fileMetadata": {}, + "template": [], + "dest": "release-information", + "markdownEngineName": "markdig" + } +} \ No newline at end of file From 85337ba37717c4193472115297020fa2c67368d2 Mon Sep 17 00:00:00 2001 From: Brian Lich Date: Wed, 17 Apr 2019 08:32:51 -0700 Subject: [PATCH 187/724] new build 4/17/2019 8:32 AM --- ...ndows-diagnostic-events-and-fields-1903.md | 76 +++++++++---------- 1 file changed, 38 insertions(+), 38 deletions(-) diff --git a/windows/privacy/basic-level-windows-diagnostic-events-and-fields-1903.md b/windows/privacy/basic-level-windows-diagnostic-events-and-fields-1903.md index 04b2280580..c229f9a624 100644 --- a/windows/privacy/basic-level-windows-diagnostic-events-and-fields-1903.md +++ b/windows/privacy/basic-level-windows-diagnostic-events-and-fields-1903.md @@ -13,7 +13,7 @@ manager: dansimp ms.collection: M365-security-compliance ms.topic: article audience: ITPro -ms.date: 04/16/2019 +ms.date: 04/17/2019 --- @@ -4109,6 +4109,43 @@ The following fields are available: - **ServiceName** The driver or service name that is attached to the device. +## Migration events + +### Microsoft.Windows.MigrationCore.MigObjectCountDLUsr + +This event returns data to track the count of the migration objects across various phases during feature update. + +The following fields are available: + +- **currentSid** Indicates the user SID for which the migration is being performed. +- **knownFoldersUsr[i]** Predefined folder path locations. +- **migDiagSession->CString** The phase of the upgrade where migration occurs. (E.g.: Validate tracked content) +- **objectCount** The count for the number of objects that are being transferred. + + +### Microsoft.Windows.MigrationCore.MigObjectCountKFSys + +This event returns data about the count of the migration objects across various phases during feature update. + +The following fields are available: + +- **knownFoldersSys[i]** The predefined folder path locations. +- **migDiagSession->CString** Identifies the phase of the upgrade where migration happens. +- **objectCount** The count of the number of objects that are being transferred. + + +### Microsoft.Windows.MigrationCore.MigObjectCountKFUsr + +This event returns data to track the count of the migration objects across various phases during feature update. + +The following fields are available: + +- **currentSid** Indicates the user SID for which the migration is being performed. +- **knownFoldersUsr[i]** No content is currently available. +- **migDiagSession->CString** No content is currently available. +- **objectCount** No content is currently available. + + ## Miracast events ### Microsoft.Windows.Cast.Miracast.MiracastSessionEnd @@ -4183,43 +4220,6 @@ The following fields are available: - **WFD2Supported** Indicates if the Miracast receiver supports WFD2 protocol. -## Other events - -### Microsoft.Windows.MigrationCore.MigObjectCountDLUsr - -No content is currently available. - -The following fields are available: - -- **currentSid** No content is currently available. -- **knownFoldersUsr[i]** No content is currently available. -- **migDiagSession->CString** No content is currently available. -- **objectCount** No content is currently available. - - -### Microsoft.Windows.MigrationCore.MigObjectCountKFSys - -This event returns data about the count of the migration objects across various phases during feature update. - -The following fields are available: - -- **knownFoldersSys[i]** The predefined folder path locations. -- **migDiagSession->CString** Identifies the phase of the upgrade where migration happens. -- **objectCount** The count of the number of objects that are being transferred. - - -### Microsoft.Windows.MigrationCore.MigObjectCountKFUsr - -This event returns data to track the count of the migration objects across various phases during feature update. - -The following fields are available: - -- **currentSid** Indicates the user SID for which the migration is being performed. -- **knownFoldersUsr[i]** No content is currently available. -- **migDiagSession->CString** No content is currently available. -- **objectCount** No content is currently available. - - ## Privacy consent logging events ### Microsoft.Windows.Shell.PrivacyConsentLogging.PrivacyConsentCompleted From cc14178c1f01b831c446a70f458b9be01be273db Mon Sep 17 00:00:00 2001 From: Brian Lich Date: Wed, 17 Apr 2019 08:32:59 -0700 Subject: [PATCH 188/724] new build 4/17/2019 8:32 AM --- ...ndows-diagnostic-events-and-fields-1703.md | 2 +- ...ndows-diagnostic-events-and-fields-1709.md | 2 +- ...ndows-diagnostic-events-and-fields-1803.md | 2 +- ...ndows-diagnostic-events-and-fields-1809.md | 40 +++++++++++++++---- 4 files changed, 36 insertions(+), 10 deletions(-) diff --git a/windows/privacy/basic-level-windows-diagnostic-events-and-fields-1703.md b/windows/privacy/basic-level-windows-diagnostic-events-and-fields-1703.md index 187e5b5800..7d66c1ca89 100644 --- a/windows/privacy/basic-level-windows-diagnostic-events-and-fields-1703.md +++ b/windows/privacy/basic-level-windows-diagnostic-events-and-fields-1703.md @@ -13,7 +13,7 @@ manager: dansimp ms.collection: M365-security-compliance ms.topic: article audience: ITPro -ms.date: 04/16/2019 +ms.date: 04/17/2019 --- diff --git a/windows/privacy/basic-level-windows-diagnostic-events-and-fields-1709.md b/windows/privacy/basic-level-windows-diagnostic-events-and-fields-1709.md index 8aed3dab5e..add7ca9310 100644 --- a/windows/privacy/basic-level-windows-diagnostic-events-and-fields-1709.md +++ b/windows/privacy/basic-level-windows-diagnostic-events-and-fields-1709.md @@ -13,7 +13,7 @@ manager: dansimp ms.collection: M365-security-compliance ms.topic: article audience: ITPro -ms.date: 04/16/2019 +ms.date: 04/17/2019 --- diff --git a/windows/privacy/basic-level-windows-diagnostic-events-and-fields-1803.md b/windows/privacy/basic-level-windows-diagnostic-events-and-fields-1803.md index d26544c92c..d43561bf66 100644 --- a/windows/privacy/basic-level-windows-diagnostic-events-and-fields-1803.md +++ b/windows/privacy/basic-level-windows-diagnostic-events-and-fields-1803.md @@ -13,7 +13,7 @@ manager: dansimp ms.collection: M365-security-compliance ms.topic: article audience: ITPro -ms.date: 04/16/2019 +ms.date: 04/17/2019 --- diff --git a/windows/privacy/basic-level-windows-diagnostic-events-and-fields-1809.md b/windows/privacy/basic-level-windows-diagnostic-events-and-fields-1809.md index 26bb7bab6a..3826050602 100644 --- a/windows/privacy/basic-level-windows-diagnostic-events-and-fields-1809.md +++ b/windows/privacy/basic-level-windows-diagnostic-events-and-fields-1809.md @@ -13,7 +13,7 @@ manager: dansimp ms.collection: M365-security-compliance ms.topic: article audience: ITPro -ms.date: 04/16/2019 +ms.date: 04/17/2019 --- @@ -2790,10 +2790,12 @@ The following fields are available: - **RepeatedUploadFailureDropped** Number of events lost due to repeated upload failures for a single buffer. - **SettingsHttpAttempts** Number of attempts to contact OneSettings service. - **SettingsHttpFailures** The number of failures from contacting the OneSettings service. +- **T`rottledDroppedCount** No content is currently available. - **ThrottledDroppedCount** Number of events dropped due to throttling of noisy providers. - **TopUploaderErrors** List of top errors received from the upload endpoint. - **UploaderDroppedCount** Number of events dropped at the uploader layer of telemetry client. - **UploaderErrorCount** Number of errors received from the upload endpoint. +- **UreviousHeartBeatTime** No content is currently available. - **VortexFailuresTimeout** The number of timeout failures received from Vortex. - **VortexHttpAttempts** Number of attempts to contact Vortex. - **VortexHttpFailures4xx** Number of 400-499 error codes received from Vortex. @@ -3408,6 +3410,7 @@ The following fields are available: - **BrightnessVersionViaDDI** The version of the Display Brightness Interface. - **ComputePreemptionLevel** The maximum preemption level supported by GPU for compute payload. - **DedicatedSystemMemoryB** The amount of system memory dedicated for GPU use (in bytes). +- **DedicatedVideoMemmryB** No content is currently available. - **DedicatedVideoMemoryB** The amount of dedicated VRAM of the GPU (in bytes). - **DisplayAdapterLuid** The display adapter LUID. - **DriverDate** The date of the display driver. @@ -3420,11 +3423,14 @@ The following fields are available: - **GPUDeviceID** The GPU device ID. - **GPUPreemptionLevel** The maximum preemption level supported by GPU for graphics payload. - **GPURevisionID** The GPU revision ID. +- **GPUVefdorID** No content is currently available. - **GPUVendorID** The GPU vendor ID. - **InterfaceId** The GPU interface ID. - **IsDisplayDevice** Does the GPU have displaying capabilities? - **IsHwSchSupported** Indicates whether the adapter supports hardware scheduling. +- **IsHy`ridIntegrated** No content is currently available. - **IsHybridDiscrete** Does the GPU have discrete GPU capabilities in a hybrid device? +- **IsHybridDiscRete** No content is currently available. - **IsHybridIntegrated** Does the GPU have integrated GPU capabilities in a hybrid device? - **IsLDA** Is the GPU comprised of Linked Display Adapters? - **IsMiracastSupported** Does the GPU support Miracast? @@ -3538,12 +3544,16 @@ The following fields are available: - **AppVersion** The version of the app that has crashed. - **ExceptionCode** The exception code returned by the process that has crashed. - **ExceptionOffset** The address where the exception had occurred. +- **EzceptionCode** No content is currently available. - **Flags** Flags indicating how reporting is done. For example, queue the report, do not offer JIT debugging, or do not terminate the process after reporting. - **FriendlyAppName** The description of the app that has crashed, if different from the AppName. Otherwise, the process name. +- **FriendlyArpName** No content is currently available. - **IsFatal** True/False to indicate whether the crash resulted in process termination. - **ModName** Exception module name (e.g. bar.dll). - **ModTimeStamp** The date/time stamp of the module. +- **ModVdrsion** No content is currently available. - **ModVersion** The version of the module that has crashed. +- **PackageFullNale** No content is currently available. - **PackageFullName** Store application identity. - **PackageRelativeAppId** Store application identity. - **ProcessArchitecture** Architecture of the crashing process, as one of the PROCESSOR_ARCHITECTURE_* constants: 0: PROCESSOR_ARCHITECTURE_INTEL. 5: PROCESSOR_ARCHITECTURE_ARM. 9: PROCESSOR_ARCHITECTURE_AMD64. 12: PROCESSOR_ARCHITECTURE_ARM64. @@ -4551,15 +4561,14 @@ The following fields are available: ### Microsoft.Windows.MigrationCore.MigObjectCountDLUsr -No content is currently available. +This event returns data to track the count of the migration objects across various phases during feature update. The following fields are available: -- **currentSid** No content is currently available. -- **defaultLoc->DirName->CString** No content is currently available. -- **knownFoldersUsr[i]** No content is currently available. -- **migDiagSession->CString** No content is currently available. -- **objectCount** No content is currently available. +- **currentSid** Indicates the user SID for which the migration is being performed. +- **knownFoldersUsr[i]** Predefined folder path locations. +- **migDiagSession->CString** The phase of the upgrade where migration occurs. (E.g.: Validate tracked content) +- **objectCount** The count for the number of objects that are being transferred. ### Microsoft.Windows.MigrationCore.MigObjectCountKFSys @@ -5340,6 +5349,7 @@ This service retrieves events generated by SetupPlatform, the engine that drives The following fields are available: +- **Fie** No content is currently available. - **FieldName** Retrieves the event name/data point. Examples: InstallStartTime, InstallEndtime, OverallResult etc. - **GroupName** Retrieves the groupname the event belongs to. Example: Install Information, DU Information, Disk Space Information etc. - **Value** Retrieves the value associated with the corresponding event name (Field Name). For example: For time related events this will include the system time. @@ -5372,6 +5382,7 @@ The following fields are available: - **CommonProps** A bitmask for future flags associated with the Windows Update client behavior. No data is currently reported in this field. Expected value for this field is 0. - **Context** Gives context on where the error has occurred. Example: AutoEnable, GetSLSData, AddService, Misc, or Unknown - **CurrentMobileOperator** The mobile operator the device is currently connected to. +- **Deferral@olicySources** No content is currently available. - **DeferralPolicySources** Sources for any update deferral policies defined (GPO = 0x10, MDM = 0x100, Flight = 0x1000, UX = 0x10000). - **DeferredUpdates** Update IDs which are currently being deferred until a later time - **DeviceModel** What is the device model. @@ -5398,6 +5409,7 @@ The following fields are available: - **MetadataIntegrityMode** The mode of the update transport metadata integrity check. 0-Unknown, 1-Ignoe, 2-Audit, 3-Enforce - **MSIError** The last error that was encountered during a scan for updates. - **NetworkConnectivityDetected** Indicates the type of network connectivity that was detected. 0 - IPv4, 1 - IPv6 +- **Num`erOfNewUpdatesFromServiceSync** No content is currently available. - **NumberOfApplicableUpdates** The number of updates which were ultimately deemed applicable to the system after the detection process is complete - **NumberOfApplicationsCategoryScanEvaluated** The number of categories (apps) for which an app update scan checked - **NumberOfLoop** The number of round trips the scan required @@ -5469,6 +5481,7 @@ Download process event for target update on Windows Update client. See the Event The following fields are available: +- **ActiveDownload4ime** No content is currently available. - **ActiveDownloadTime** How long the download took, in seconds, excluding time where the update wasn't actively being downloaded. - **AppXBlockHashFailures** Indicates the number of blocks that failed hash validation during download of the app payload. - **AppXBlockHashValidationFailureCount** A count of the number of blocks that have failed validation after being downloaded. @@ -5493,6 +5506,7 @@ The following fields are available: - **CDNCountryCode** Two letter country abbreviation for the Content Distribution Network (CDN) location. - **CDNId** ID which defines which CDN the software distribution client downloaded the content from. - **ClientVersion** The version number of the software distribution client. +- **Co,76dB4ime** No content is currently available. - **CommonProps** A bitmask for future flags associated with the Windows Update client behavior. - **ConnectTime** Indicates the cumulative amount of time (in seconds) it took to establish the connection for all updates in an update bundle. - **CurrentMobileOperator** The mobile operator the device is currently connected to. @@ -5506,6 +5520,7 @@ The following fields are available: - **ExtendedStatusCode** Secondary error code for certain scenarios where StatusCode wasn't specific enough. - **FeatureUpdatePause** Indicates whether feature OS updates are paused on the device. - **FlightBranch** The branch that a device is on if participating in flighting (pre-release builds). +- **FlightBu9ldNumber** No content is currently available. - **FlightBuildNumber** If this download was for a flight (pre-release build), this indicates the build number of that flight. - **FlightId** The specific ID of the flight (pre-release build) the device is getting. - **FlightRing** The ring (speed of getting builds) that a device is on if participating in flighting (pre-release builds). @@ -5517,11 +5532,13 @@ The following fields are available: - **IsDependentSet** Indicates whether a driver is a part of a larger System Hardware/Firmware Update - **IsWUfBDualScanEnabled** Indicates if Windows Update for Business dual scan is enabled on the device. - **IsWUfBEnabled** Indicates if Windows Update for Business is enabled on the device. +- **IsWUfBEncbled** No content is currently available. - **NetworkCost** A flag indicating the cost of the network (congested, fixed, variable, over data limit, roaming, etc.) used for downloading the update content. - **NetworkCostBitMask** Indicates what kind of network the device is connected to (roaming, metered, over data cap, etc.) - **NetworkRestrictionStatus** More general version of NetworkCostBitMask, specifying whether Windows considered the current network to be "metered." - **PackageFullName** The package name of the content. - **PhonePreviewEnabled** Indicates whether a phone was opted-in to getting preview builds, prior to flighting (pre-release builds) being introduced. +- **PostDnld4ime** No content is currently available. - **PostDnldTime** Time (in seconds) taken to signal download completion after the last job completed downloading the payload. - **ProcessName** The process name of the application that initiated API calls, in the event where CallerApplicationName was not provided. - **QualityUpdatePause** Indicates whether quality OS updates are paused on the device. @@ -5535,6 +5552,7 @@ The following fields are available: - **ServiceGuid** A unique identifier for the service that the software distribution client is installing content for (Windows Update, Microsoft Store, etc). - **Setup360Phase** Identifies the active phase of the upgrade download if the current download is for an Operating System upgrade. - **ShippingMobileOperator** The mobile operator linked to the device when the device shipped. +- **SizeCalc4ime** No content is currently available. - **SizeCalcTime** Time (in seconds) taken to calculate the total download size of the payload. - **StatusCode** Indicates the result of a Download event (success, cancellation, failure code HResult). - **SystemBIOSMajorRelease** Major version of the BIOS. @@ -5544,6 +5562,7 @@ The following fields are available: - **TargetMetadataVersion** The version of the currently downloading (or most recently downloaded) package. - **ThrottlingServiceHResult** Result code (success/failure) while contacting a web service to determine whether this device should download content yet. - **TimeToEstablishConnection** Time (in milliseconds) it took to establish the connection prior to beginning downloaded. +- **TotalExp6dBedBytes** No content is currently available. - **TotalExpectedBytes** The total size (in Bytes) expected to be downloaded. - **UpdateId** An identifier associated with the specific piece of content. - **UpdateID** An identifier associated with the specific piece of content. @@ -5587,6 +5606,7 @@ The following fields are available: - **ClientVersion** The version number of the software distribution client - **ConnectionStatus** Indicates the connectivity state of the device at the time of heartbeat - **CurrentError** Last (transient) error encountered by the active download +- **CurrentMrror** No content is currently available. - **DownloadFlags** Flags indicating if power state is ignored - **DownloadState** Current state of the active download for this content (queued, suspended, or progressing) - **EventType** Possible values are "Child", "Bundle", or "Driver" @@ -7073,9 +7093,11 @@ The following fields are available: - **cdnIp** The IP address of the source CDN. - **cdnUrl** Url of the source Content Distribution Network (CDN). - **dataSourcesTotal** Bytes received per source type, accumulated for the whole session. +- **dileID** No content is currently available. - **doErrorCode** The Delivery Optimization error code that was returned. - **downlinkBps** The maximum measured available download bandwidth (in bytes per second). - **downlinkUsageBps** The download speed (in bytes per second). +- **downlinkUsageFps** No content is currently available. - **downloadMode** The download mode used for this file download session. - **downloadModeReason** Reason for the download. - **downloadModeSrc** Source of the DownloadMode setting (KvsProvider = 0, GeoProvider = 1, GeoVerProvider = 2, CpProvider = 3, DiscoveryProvider = 4, RegistryProvider = 5, GroupPolicyProvider = 6, MdmProvider = 7, SettingsProvider = 8, InvalidProviderType = 9). @@ -7094,6 +7116,7 @@ The following fields are available: - **linkLocalConnectionCount** The number of connections made to peers in the same Link-local network. - **numPeers** The total number of peers used for this download. - **numPeersLocal** The total number of local peers used for this download. +- **ppedefinedCallerName** No content is currently available. - **predefinedCallerName** The name of the API Caller. - **restrictedUpload** Is the upload restricted? - **routeToCacheServer** The cache server setting, source, and value. @@ -7101,7 +7124,9 @@ The following fields are available: - **totalTimeMs** Duration of the download (in seconds). - **updateID** The ID of the update being downloaded. - **uplinkBps** The maximum measured available upload bandwidth (in bytes per second). +- **uplinkFps** No content is currently available. - **uplinkUsageBps** The upload speed (in bytes per second). +- **uplinkUsageFps** No content is currently available. - **usedMemoryStream** TRUE if the download is using memory streaming for App downloads. @@ -7149,6 +7174,7 @@ The following fields are available: - **fileSize** Total file size of the file that was downloaded. - **fileSizeCaller** Value for total file size provided by our caller. - **groupID** ID for the group. +- **grOupID** No content is currently available. - **isEncrypted** Indicates whether the download is encrypted. - **isVpn** Indicates whether the device is connected to a Virtual Private Network. - **jobID** The ID of the Windows Update job. From e5cdb04fa0a52924ae2cadf5291a35a7c5672243 Mon Sep 17 00:00:00 2001 From: Wael Jendli <33766257+wjendli@users.noreply.github.com> Date: Wed, 17 Apr 2019 11:42:37 -0700 Subject: [PATCH 189/724] Add LTE attach purpose guid --- windows/client-management/mdm/cm-cellularentries-csp.md | 1 + 1 file changed, 1 insertion(+) diff --git a/windows/client-management/mdm/cm-cellularentries-csp.md b/windows/client-management/mdm/cm-cellularentries-csp.md index adffb8bef0..32ca9ee217 100644 --- a/windows/client-management/mdm/cm-cellularentries-csp.md +++ b/windows/client-management/mdm/cm-cellularentries-csp.md @@ -183,6 +183,7 @@ The following diagram shows the CM\_CellularEntries configuration service provid

Required. Type: String. Specifies the purposes of the connection by a comma-separated list of GUIDs representing purpose values. The following purpose values are available: - Internet - 3E5545D2-1137-4DC8-A198-33F1C657515F +- LTE attach - 11A6FE68-5B47-4859-9CB6-1EAC96A8F0BD - MMS - 53E2C5D3-D13C-4068-AA38-9C48FF2E55A8 - IMS - 474D66ED-0E4B-476B-A455-19BB1239ED13 - SUPL - 6D42669F-52A9-408E-9493-1071DCC437BD From 4ae7c10b9aa1a308e235ac234c6dae8f87b5bef7 Mon Sep 17 00:00:00 2001 From: Beth Levin Date: Wed, 17 Apr 2019 15:25:44 -0700 Subject: [PATCH 190/724] updated names --- windows/security/threat-protection/index.md | 10 +++++----- 1 file changed, 5 insertions(+), 5 deletions(-) diff --git a/windows/security/threat-protection/index.md b/windows/security/threat-protection/index.md index 8747fb3827..bface3f851 100644 --- a/windows/security/threat-protection/index.md +++ b/windows/security/threat-protection/index.md @@ -37,12 +37,12 @@ ms.localizationpriority: medium -**[Threat & Vulnerability Management](windows-defender-atp/next-gen-threat-and-vuln-mgt.md)**
+**[Threat & Vulnerability Management](microsoft-defender-atp/next-gen-threat-and-vuln-mgt.md)**
This built-in capability uses a game-changing risk-based approach to the discovery, prioritization, and remediation of endpoint vulnerabilities and misconfigurations. -- [Risk-based Threat & Vulnerability Management](windows-defender-atp/next-gen-threat-and-vuln-mgt.md) -- [What's in the dashboard and what it means for my organization](windows-defender-atp/tvm-dashboard-insights.md) -- [Configuration score](windows-defender-atp/configuration-score.md) -- [Scenarios](windows-defender-atp/threat-and-vuln-mgt-scenarios.md) +- [Risk-based Threat & Vulnerability Management](microsoft-defender-atp/next-gen-threat-and-vuln-mgt.md) +- [What's in the dashboard and what it means for my organization](microsoft-defender-atp/tvm-dashboard-insights.md) +- [Configuration score](microsoft-defender-atp/configuration-score.md) +- [Scenarios](microsoft-defender-atp/threat-and-vuln-mgt-scenarios.md) From 0e10de048c051784558a0868a2183724aa115a19 Mon Sep 17 00:00:00 2001 From: Beth Levin Date: Wed, 17 Apr 2019 15:35:11 -0700 Subject: [PATCH 191/724] search product --- .../microsoft-defender-atp/configuration-score.md | 2 +- .../microsoft-defender-atp/next-gen-threat-and-vuln-mgt.md | 2 +- .../microsoft-defender-atp/tvm-dashboard-insights.md | 2 +- 3 files changed, 3 insertions(+), 3 deletions(-) diff --git a/windows/security/threat-protection/microsoft-defender-atp/configuration-score.md b/windows/security/threat-protection/microsoft-defender-atp/configuration-score.md index 746d31cc8f..bb6764a9a3 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/configuration-score.md +++ b/windows/security/threat-protection/microsoft-defender-atp/configuration-score.md @@ -2,7 +2,7 @@ title: Overview of Configuration score in Microsoft Defender Security Center description: Expand your visibility into the overall security configuration posture of your organization keywords: configuration score, mdatp configuration score, secure score, security controls, improvement opportunities, security configuration score over time, security posture, baseline -search.product: Windows 10 +search.product: eADQiWindows 10XVcnh search.appverid: met150 ms.prod: w10 ms.mktglfcycl: deploy diff --git a/windows/security/threat-protection/microsoft-defender-atp/next-gen-threat-and-vuln-mgt.md b/windows/security/threat-protection/microsoft-defender-atp/next-gen-threat-and-vuln-mgt.md index d83dc2575a..cefa8aada0 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/next-gen-threat-and-vuln-mgt.md +++ b/windows/security/threat-protection/microsoft-defender-atp/next-gen-threat-and-vuln-mgt.md @@ -2,7 +2,7 @@ title: Next-generation Threat & Vulnerability Management description: This new capability uses a game-changing risk-based approach to the discovery, prioritization, and remediation of endpoint vulnerabilities and misconfigurations. keywords: threat and vulnerability management, MDATP-TVM, vulnerability management, threat and vulnerability scanning -search.product: Windows 10 +search.product: eADQiWindows 10XVcnh search.appverid: met150 ms.prod: w10 ms.mktglfcycl: deploy diff --git a/windows/security/threat-protection/microsoft-defender-atp/tvm-dashboard-insights.md b/windows/security/threat-protection/microsoft-defender-atp/tvm-dashboard-insights.md index 9613ef139d..c0236a5f88 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/tvm-dashboard-insights.md +++ b/windows/security/threat-protection/microsoft-defender-atp/tvm-dashboard-insights.md @@ -2,7 +2,7 @@ title: What's in the dashboard and what it means for my organization's security posture description: keywords: -search.product: Windows 10 +search.product: eADQiWindows 10XVcnh search.appverid: met150 ms.prod: w10 ms.mktglfcycl: deploy From 021bc3707ea97df8a7f3b03163782c49de022c33 Mon Sep 17 00:00:00 2001 From: Brian Lich Date: Thu, 18 Apr 2019 10:01:12 -0700 Subject: [PATCH 192/724] new build 4/18/2019 10:01 AM --- ...ndows-diagnostic-events-and-fields-1903.md | 121 +++--------------- 1 file changed, 18 insertions(+), 103 deletions(-) diff --git a/windows/privacy/basic-level-windows-diagnostic-events-and-fields-1903.md b/windows/privacy/basic-level-windows-diagnostic-events-and-fields-1903.md index c229f9a624..161e810b9e 100644 --- a/windows/privacy/basic-level-windows-diagnostic-events-and-fields-1903.md +++ b/windows/privacy/basic-level-windows-diagnostic-events-and-fields-1903.md @@ -13,7 +13,7 @@ manager: dansimp ms.collection: M365-security-compliance ms.topic: article audience: ITPro -ms.date: 04/17/2019 +ms.date: 04/18/2019 --- @@ -1606,6 +1606,17 @@ The following fields are available: - **IEVersion** The version of Internet Explorer that is running on the device. +### Census.Azure + +No content is currently available. + +The following fields are available: + +- **CloudCoreBuildEx** No content is currently available. +- **CloudCoreSupportBuildEx** No content is currently available. +- **NodeID** No content is currently available. + + ### Census.Battery This event sends type and capacity data about the battery on the device, as well as the number of connected standby devices in use, type to help keep Windows up to date. @@ -2088,18 +2099,6 @@ The following fields are available: - **ver** Represents the version number of the application. Used to understand errors by Version, Usage by Version across an app. -### Common Data Extensions.cloud - -Describes the service-related fields populated by the cloud service. - -The following fields are available: - -- **role** The role of the service. -- **roleInstance** The instance id of the deployed role instance generating the event. -- **roleVer** The build version of the role. -- **ver** No content is currently available. - - ### Common Data Extensions.container Describes the properties of the container for events logged within a container. @@ -2113,35 +2112,16 @@ The following fields are available: - **type** The container type. Examples: Process or VMHost -### Common Data Extensions.cs1 - -No content is currently available. - -The following fields are available: - -- **dblp** A bitfield that is set to a non-zero value if the event in the newer schema has an equivalent event from the 1.0 schema. -- **esc** The event sequence clock. -- **ev** The version of the event. -- **locale** The client language locale on the device. -- **scid** The Service Config ID of the running title that sent the event. -- **users** A comma-separated list of all users logged into the device when the event was created. The user ID is encoded. Example: x:12345678 - - ### Common Data Extensions.device Describes the device-related fields. The following fields are available: -- **authId** The ID of the device associated with this event. For Microsoft Account tickets, this is expected to be the MSA Global ID. -- **authSecId** The secondary ID of the device associated with this event. For Microsoft Account tickets, this is expected to be the MSA Hardware ID. - **deviceClass** The device classification. For example, Desktop, Server, or Mobile. -- **id** A unique device ID. - **localId** A locally-defined unique ID for the device. This is not the human-readable device name. Most likely equal to the value stored at HKLM\Software\Microsoft\SQMClient\MachineId - **make** Device manufacturer. - **model** Device model. -- **orgAuthId** ID used to authenticate the orgId. -- **orgId** Organization ID associated with the event. ### Common Data Extensions.Envelope @@ -2152,14 +2132,8 @@ The following fields are available: - **data** Represents the optional unique diagnostic data for a particular event schema. - **ext_app** Describes the properties of the running application. This extension could be populated by either a client app or a web app. See [Common Data Extensions.app](#common-data-extensionsapp). -- **ext_cloud** Describes the service-related fields populated by the cloud service. See [Common Data Extensions.cloud](#common-data-extensionscloud). - **ext_container** Describes the properties of the container for events logged within a container. See [Common Data Extensions.container](#common-data-extensionscontainer). -- **ext_cs1** If the field doesn't exist in the newer schema, this contains the fields from an earlier schema. See [Common Data Extensions.cs1](#common-data-extensionscs1). - **ext_device** Describes the device-related fields. See [Common Data Extensions.device](#common-data-extensionsdevice). -- **ext_ingest** Describes the fields added dynamically by the service. See [Common Data Extensions.ingest](#common-data-extensionsingest). -- **ext_intService** No content is currently available. See [Common Data Extensions.intService](#common-data-extensionsintservice). -- **ext_intWeb** No content is currently available. See [Common Data Extensions.intWeb](#common-data-extensionsintweb). -- **ext_loc** Describes the location from which the event was logged. See [Common Data Extensions.loc](#common-data-extensionsloc). - **ext_mscv** No content is currently available. See [Common Data Extensions.mscv](#common-data-extensionsmscv). - **ext_os** Describes the operating system properties that would be populated by the client. See [Common Data Extensions.os](#common-data-extensionsos). - **ext_receipts** Describes the fields related to time as provided by the client for debugging purposes. See [Common Data Extensions.receipts](#common-data-extensionsreceipts). @@ -2174,65 +2148,13 @@ The following fields are available: - **ver** Represents the major and minor version of the extension. -### Common Data Extensions.ingest - -Describes the fields that are added by the ingestion service. - -The following fields are available: - -- **auth** Used to assess the trustworthiness of the data. -- **client** The client name. -- **clientIp** The IP address seen by the service. This is not necessarily the client IP address, but could be a router or some other device. -- **processedIngest** If the event already had an ingest extension and the client was authenticated as a first party, the ingest extension will be inserted as processedIngest. -- **quality** A bitfield added by the service to all events coming from a client device. -- **time** The time that the event was received by the service. -- **userAgent** For events that are not using the CUET component, this is the user agent of the browser. - - -### Common Data Extensions.intService - -No content is currently available. - -The following fields are available: - -- **deploymentUnit** No content is currently available. -- **environment** No content is currently available. -- **fullEnvName** No content is currently available. -- **location** No content is currently available. -- **name** No content is currently available. - - -### Common Data Extensions.intWeb - -No content is currently available. - -The following fields are available: - -- **anid** No content is currently available. -- **mc1Id** No content is currently available. -- **mscom** No content is currently available. -- **msfpc** No content is currently available. -- **serviceName** No content is currently available. - - -### Common Data Extensions.loc - -Describes the location from which the event was logged. - -The following fields are available: - -- **country** 2 letter country code using the codes from the ISO 3166-1 alpha-2 standard. -- **id** Location ID based on the client's IP address. -- **tz** The time zone of the device. - - ### Common Data Extensions.mscv -No content is currently available. +Describes the correlation vector-related fields. The following fields are available: -- **cV** No content is currently available. +- **cV** Represents the Correlation Vector: A single field for tracking partial order of related events across component boundaries. ### Common Data Extensions.os @@ -2280,7 +2202,6 @@ Describes the fields related to a user. The following fields are available: - **authId** This is an ID of the user associated with this event that is deduced from a token such as a Microsoft Account ticket or an XBOX token. -- **id** Unique user Id. Example: x:12345678. - **locale** The language and region. - **localId** Represents a unique user identity that is created locally and added by the client. This is not the user's account ID. @@ -2296,7 +2217,7 @@ The following fields are available: - **cat** Represents a bitmask of the ETW Keywords associated with the event. - **cpId** The composer ID, such as Reference, Desktop, Phone, Holographic, Hub, IoT Composer. - **epoch** Represents the epoch and seqNum fields, which help track how many events were fired and how many events were uploaded, and enables identification of data lost during upload and de-duplication of events on the ingress server. -- **eventFlags** No content is currently available. +- **eventFlags** Represents a collection of bits that describe how the event should be processed by the Connected User Experience and Telemetry component pipeline. The lowest-order byte is the event persistence. The next byte is the event latency. - **flags** Represents the bitmap that captures various Windows specific flags. - **loggingBinary** No content is currently available. - **mon** Combined monitor and event sequence numbers in the format: monitor sequence : event sequence @@ -2319,13 +2240,7 @@ No content is currently available. The following fields are available: -- **browser** No content is currently available. -- **browserLang** No content is currently available. - **browserVer** No content is currently available. -- **domain** No content is currently available. -- **isManual** No content is currently available. -- **screenRes** No content is currently available. -- **userConsent** No content is currently available. ### Common Data Extensions.xbl @@ -4141,9 +4056,9 @@ This event returns data to track the count of the migration objects across vario The following fields are available: - **currentSid** Indicates the user SID for which the migration is being performed. -- **knownFoldersUsr[i]** No content is currently available. -- **migDiagSession->CString** No content is currently available. -- **objectCount** No content is currently available. +- **knownFoldersUsr[i]** Predefined folder path locations. +- **migDiagSession->CString** The phase of the upgrade where the migration occurs. (For example, Validate tracked content.) +- **objectCount** The number of objects that are being transferred. ## Miracast events From 57ddb2d7104103e6b85a6b84a7c937f7ed4a69b3 Mon Sep 17 00:00:00 2001 From: Brian Lich Date: Thu, 18 Apr 2019 10:01:20 -0700 Subject: [PATCH 193/724] new build 4/18/2019 10:01 AM --- ...ndows-diagnostic-events-and-fields-1703.md | 4 +- ...ndows-diagnostic-events-and-fields-1709.md | 2 +- ...ndows-diagnostic-events-and-fields-1803.md | 2 +- ...ndows-diagnostic-events-and-fields-1809.md | 70 +++++++++++-------- 4 files changed, 44 insertions(+), 34 deletions(-) diff --git a/windows/privacy/basic-level-windows-diagnostic-events-and-fields-1703.md b/windows/privacy/basic-level-windows-diagnostic-events-and-fields-1703.md index 7d66c1ca89..086a835957 100644 --- a/windows/privacy/basic-level-windows-diagnostic-events-and-fields-1703.md +++ b/windows/privacy/basic-level-windows-diagnostic-events-and-fields-1703.md @@ -13,7 +13,7 @@ manager: dansimp ms.collection: M365-security-compliance ms.topic: article audience: ITPro -ms.date: 04/17/2019 +ms.date: 04/18/2019 --- @@ -4004,7 +4004,7 @@ The following fields are available: ### SIHEngineTelemetry.EvalApplicability -This event is sent when targeting logic is evaluated to determine if a device is eligible a given action. +This event is sent when targeting logic is evaluated to determine if a device is eligible for a given action. diff --git a/windows/privacy/basic-level-windows-diagnostic-events-and-fields-1709.md b/windows/privacy/basic-level-windows-diagnostic-events-and-fields-1709.md index add7ca9310..8dedfc835b 100644 --- a/windows/privacy/basic-level-windows-diagnostic-events-and-fields-1709.md +++ b/windows/privacy/basic-level-windows-diagnostic-events-and-fields-1709.md @@ -13,7 +13,7 @@ manager: dansimp ms.collection: M365-security-compliance ms.topic: article audience: ITPro -ms.date: 04/17/2019 +ms.date: 04/18/2019 --- diff --git a/windows/privacy/basic-level-windows-diagnostic-events-and-fields-1803.md b/windows/privacy/basic-level-windows-diagnostic-events-and-fields-1803.md index d43561bf66..452ecb0c6d 100644 --- a/windows/privacy/basic-level-windows-diagnostic-events-and-fields-1803.md +++ b/windows/privacy/basic-level-windows-diagnostic-events-and-fields-1803.md @@ -13,7 +13,7 @@ manager: dansimp ms.collection: M365-security-compliance ms.topic: article audience: ITPro -ms.date: 04/17/2019 +ms.date: 04/18/2019 --- diff --git a/windows/privacy/basic-level-windows-diagnostic-events-and-fields-1809.md b/windows/privacy/basic-level-windows-diagnostic-events-and-fields-1809.md index 3826050602..122c0460b9 100644 --- a/windows/privacy/basic-level-windows-diagnostic-events-and-fields-1809.md +++ b/windows/privacy/basic-level-windows-diagnostic-events-and-fields-1809.md @@ -13,7 +13,7 @@ manager: dansimp ms.collection: M365-security-compliance ms.topic: article audience: ITPro -ms.date: 04/17/2019 +ms.date: 04/18/2019 --- @@ -1817,6 +1817,17 @@ The following fields are available: - **IEVersion** The version of Internet Explorer that is running on the device. +### Census.Azure + +No content is currently available. + +The following fields are available: + +- **CloudCoreBuildEx** No content is currently available. +- **CloudCoreSupportBuildEx** No content is currently available. +- **NodeID** No content is currently available. + + ### Census.Battery This event sends type and capacity data about the battery on the device, as well as the number of connected standby devices in use, type to help keep Windows up to date. @@ -2790,12 +2801,10 @@ The following fields are available: - **RepeatedUploadFailureDropped** Number of events lost due to repeated upload failures for a single buffer. - **SettingsHttpAttempts** Number of attempts to contact OneSettings service. - **SettingsHttpFailures** The number of failures from contacting the OneSettings service. -- **T`rottledDroppedCount** No content is currently available. - **ThrottledDroppedCount** Number of events dropped due to throttling of noisy providers. - **TopUploaderErrors** List of top errors received from the upload endpoint. - **UploaderDroppedCount** Number of events dropped at the uploader layer of telemetry client. - **UploaderErrorCount** Number of errors received from the upload endpoint. -- **UreviousHeartBeatTime** No content is currently available. - **VortexFailuresTimeout** The number of timeout failures received from Vortex. - **VortexHttpAttempts** Number of attempts to contact Vortex. - **VortexHttpFailures4xx** Number of 400-499 error codes received from Vortex. @@ -3410,7 +3419,6 @@ The following fields are available: - **BrightnessVersionViaDDI** The version of the Display Brightness Interface. - **ComputePreemptionLevel** The maximum preemption level supported by GPU for compute payload. - **DedicatedSystemMemoryB** The amount of system memory dedicated for GPU use (in bytes). -- **DedicatedVideoMemmryB** No content is currently available. - **DedicatedVideoMemoryB** The amount of dedicated VRAM of the GPU (in bytes). - **DisplayAdapterLuid** The display adapter LUID. - **DriverDate** The date of the display driver. @@ -3423,14 +3431,11 @@ The following fields are available: - **GPUDeviceID** The GPU device ID. - **GPUPreemptionLevel** The maximum preemption level supported by GPU for graphics payload. - **GPURevisionID** The GPU revision ID. -- **GPUVefdorID** No content is currently available. - **GPUVendorID** The GPU vendor ID. - **InterfaceId** The GPU interface ID. - **IsDisplayDevice** Does the GPU have displaying capabilities? - **IsHwSchSupported** Indicates whether the adapter supports hardware scheduling. -- **IsHy`ridIntegrated** No content is currently available. - **IsHybridDiscrete** Does the GPU have discrete GPU capabilities in a hybrid device? -- **IsHybridDiscRete** No content is currently available. - **IsHybridIntegrated** Does the GPU have integrated GPU capabilities in a hybrid device? - **IsLDA** Is the GPU comprised of Linked Display Adapters? - **IsMiracastSupported** Does the GPU support Miracast? @@ -3544,16 +3549,12 @@ The following fields are available: - **AppVersion** The version of the app that has crashed. - **ExceptionCode** The exception code returned by the process that has crashed. - **ExceptionOffset** The address where the exception had occurred. -- **EzceptionCode** No content is currently available. - **Flags** Flags indicating how reporting is done. For example, queue the report, do not offer JIT debugging, or do not terminate the process after reporting. - **FriendlyAppName** The description of the app that has crashed, if different from the AppName. Otherwise, the process name. -- **FriendlyArpName** No content is currently available. - **IsFatal** True/False to indicate whether the crash resulted in process termination. - **ModName** Exception module name (e.g. bar.dll). - **ModTimeStamp** The date/time stamp of the module. -- **ModVdrsion** No content is currently available. - **ModVersion** The version of the module that has crashed. -- **PackageFullNale** No content is currently available. - **PackageFullName** Store application identity. - **PackageRelativeAppId** Store application identity. - **ProcessArchitecture** Architecture of the crashing process, as one of the PROCESSOR_ARCHITECTURE_* constants: 0: PROCESSOR_ARCHITECTURE_INTEL. 5: PROCESSOR_ARCHITECTURE_ARM. 9: PROCESSOR_ARCHITECTURE_AMD64. 12: PROCESSOR_ARCHITECTURE_ARM64. @@ -4590,8 +4591,8 @@ The following fields are available: - **currentSid** Indicates the user SID for which the migration is being performed. - **knownFoldersUsr[i]** Predefined folder path locations. -- **migDiagSession->CString** The phase of the upgrade where migration occurs. (E.g.: Validate tracked content) -- **objectCount** The count for the number of objects that are being transferred. +- **migDiagSession->CString** The phase of the upgrade where the migration occurs. (For example, Validate tracked content.) +- **objectCount** The number of objects that are being transferred. ## Miracast events @@ -5349,12 +5350,37 @@ This service retrieves events generated by SetupPlatform, the engine that drives The following fields are available: -- **Fie** No content is currently available. - **FieldName** Retrieves the event name/data point. Examples: InstallStartTime, InstallEndtime, OverallResult etc. - **GroupName** Retrieves the groupname the event belongs to. Example: Install Information, DU Information, Disk Space Information etc. - **Value** Retrieves the value associated with the corresponding event name (Field Name). For example: For time related events this will include the system time. +## SIH events + +### SIHEngineTelemetry.EvalApplicability + +This event is sent when targeting logic is evaluated to determine if a device is eligible for a given action. + +The following fields are available: + +- **ActionReasons** If an action has been assessed as inapplicable, the additional logic prevented it. +- **AdditionalReasons** If an action has been assessed as inapplicable, the additional logic prevented it. +- **CachedEngineVersion** The engine DLL version that is being used. +- **EventInstanceID** A unique identifier for event instance. +- **EventScenario** Indicates the purpose of sending this event – whether because the software distribution just started checking for content, or whether it was cancelled, succeeded, or failed. +- **HandlerReasons** If an action has been assessed as inapplicable, the installer technology-specific logic prevented it. +- **IsExecutingAction** If the action is presently being executed. +- **ServiceGuid** A unique identifier that represents which service the software distribution client is connecting to (SIH, Windows Update, Microsoft Store, etc.) +- **SihclientVersion** The client version that is being used. +- **StandardReasons** If an action has been assessed as inapplicable, the standard logic the prevented it. +- **StatusCode** Result code of the event (success, cancellation, failure code HResult). +- **UpdateID** A unique identifier for the action being acted upon. +- **WuapiVersion** The Windows Update API version that is currently installed. +- **WuaucltVersion** The Windows Update client version that is currently installed. +- **WuauengVersion** The Windows Update engine version that is currently installed. +- **WUDeviceID** The unique identifier controlled by the software distribution client. + + ## Software update events ### SoftwareUpdateClientTelemetry.CheckForUpdates @@ -5382,7 +5408,6 @@ The following fields are available: - **CommonProps** A bitmask for future flags associated with the Windows Update client behavior. No data is currently reported in this field. Expected value for this field is 0. - **Context** Gives context on where the error has occurred. Example: AutoEnable, GetSLSData, AddService, Misc, or Unknown - **CurrentMobileOperator** The mobile operator the device is currently connected to. -- **Deferral@olicySources** No content is currently available. - **DeferralPolicySources** Sources for any update deferral policies defined (GPO = 0x10, MDM = 0x100, Flight = 0x1000, UX = 0x10000). - **DeferredUpdates** Update IDs which are currently being deferred until a later time - **DeviceModel** What is the device model. @@ -5409,7 +5434,6 @@ The following fields are available: - **MetadataIntegrityMode** The mode of the update transport metadata integrity check. 0-Unknown, 1-Ignoe, 2-Audit, 3-Enforce - **MSIError** The last error that was encountered during a scan for updates. - **NetworkConnectivityDetected** Indicates the type of network connectivity that was detected. 0 - IPv4, 1 - IPv6 -- **Num`erOfNewUpdatesFromServiceSync** No content is currently available. - **NumberOfApplicableUpdates** The number of updates which were ultimately deemed applicable to the system after the detection process is complete - **NumberOfApplicationsCategoryScanEvaluated** The number of categories (apps) for which an app update scan checked - **NumberOfLoop** The number of round trips the scan required @@ -5481,7 +5505,6 @@ Download process event for target update on Windows Update client. See the Event The following fields are available: -- **ActiveDownload4ime** No content is currently available. - **ActiveDownloadTime** How long the download took, in seconds, excluding time where the update wasn't actively being downloaded. - **AppXBlockHashFailures** Indicates the number of blocks that failed hash validation during download of the app payload. - **AppXBlockHashValidationFailureCount** A count of the number of blocks that have failed validation after being downloaded. @@ -5506,7 +5529,6 @@ The following fields are available: - **CDNCountryCode** Two letter country abbreviation for the Content Distribution Network (CDN) location. - **CDNId** ID which defines which CDN the software distribution client downloaded the content from. - **ClientVersion** The version number of the software distribution client. -- **Co,76dB4ime** No content is currently available. - **CommonProps** A bitmask for future flags associated with the Windows Update client behavior. - **ConnectTime** Indicates the cumulative amount of time (in seconds) it took to establish the connection for all updates in an update bundle. - **CurrentMobileOperator** The mobile operator the device is currently connected to. @@ -5520,7 +5542,6 @@ The following fields are available: - **ExtendedStatusCode** Secondary error code for certain scenarios where StatusCode wasn't specific enough. - **FeatureUpdatePause** Indicates whether feature OS updates are paused on the device. - **FlightBranch** The branch that a device is on if participating in flighting (pre-release builds). -- **FlightBu9ldNumber** No content is currently available. - **FlightBuildNumber** If this download was for a flight (pre-release build), this indicates the build number of that flight. - **FlightId** The specific ID of the flight (pre-release build) the device is getting. - **FlightRing** The ring (speed of getting builds) that a device is on if participating in flighting (pre-release builds). @@ -5532,13 +5553,11 @@ The following fields are available: - **IsDependentSet** Indicates whether a driver is a part of a larger System Hardware/Firmware Update - **IsWUfBDualScanEnabled** Indicates if Windows Update for Business dual scan is enabled on the device. - **IsWUfBEnabled** Indicates if Windows Update for Business is enabled on the device. -- **IsWUfBEncbled** No content is currently available. - **NetworkCost** A flag indicating the cost of the network (congested, fixed, variable, over data limit, roaming, etc.) used for downloading the update content. - **NetworkCostBitMask** Indicates what kind of network the device is connected to (roaming, metered, over data cap, etc.) - **NetworkRestrictionStatus** More general version of NetworkCostBitMask, specifying whether Windows considered the current network to be "metered." - **PackageFullName** The package name of the content. - **PhonePreviewEnabled** Indicates whether a phone was opted-in to getting preview builds, prior to flighting (pre-release builds) being introduced. -- **PostDnld4ime** No content is currently available. - **PostDnldTime** Time (in seconds) taken to signal download completion after the last job completed downloading the payload. - **ProcessName** The process name of the application that initiated API calls, in the event where CallerApplicationName was not provided. - **QualityUpdatePause** Indicates whether quality OS updates are paused on the device. @@ -5552,7 +5571,6 @@ The following fields are available: - **ServiceGuid** A unique identifier for the service that the software distribution client is installing content for (Windows Update, Microsoft Store, etc). - **Setup360Phase** Identifies the active phase of the upgrade download if the current download is for an Operating System upgrade. - **ShippingMobileOperator** The mobile operator linked to the device when the device shipped. -- **SizeCalc4ime** No content is currently available. - **SizeCalcTime** Time (in seconds) taken to calculate the total download size of the payload. - **StatusCode** Indicates the result of a Download event (success, cancellation, failure code HResult). - **SystemBIOSMajorRelease** Major version of the BIOS. @@ -5562,7 +5580,6 @@ The following fields are available: - **TargetMetadataVersion** The version of the currently downloading (or most recently downloaded) package. - **ThrottlingServiceHResult** Result code (success/failure) while contacting a web service to determine whether this device should download content yet. - **TimeToEstablishConnection** Time (in milliseconds) it took to establish the connection prior to beginning downloaded. -- **TotalExp6dBedBytes** No content is currently available. - **TotalExpectedBytes** The total size (in Bytes) expected to be downloaded. - **UpdateId** An identifier associated with the specific piece of content. - **UpdateID** An identifier associated with the specific piece of content. @@ -5606,7 +5623,6 @@ The following fields are available: - **ClientVersion** The version number of the software distribution client - **ConnectionStatus** Indicates the connectivity state of the device at the time of heartbeat - **CurrentError** Last (transient) error encountered by the active download -- **CurrentMrror** No content is currently available. - **DownloadFlags** Flags indicating if power state is ignored - **DownloadState** Current state of the active download for this content (queued, suspended, or progressing) - **EventType** Possible values are "Child", "Bundle", or "Driver" @@ -7093,11 +7109,9 @@ The following fields are available: - **cdnIp** The IP address of the source CDN. - **cdnUrl** Url of the source Content Distribution Network (CDN). - **dataSourcesTotal** Bytes received per source type, accumulated for the whole session. -- **dileID** No content is currently available. - **doErrorCode** The Delivery Optimization error code that was returned. - **downlinkBps** The maximum measured available download bandwidth (in bytes per second). - **downlinkUsageBps** The download speed (in bytes per second). -- **downlinkUsageFps** No content is currently available. - **downloadMode** The download mode used for this file download session. - **downloadModeReason** Reason for the download. - **downloadModeSrc** Source of the DownloadMode setting (KvsProvider = 0, GeoProvider = 1, GeoVerProvider = 2, CpProvider = 3, DiscoveryProvider = 4, RegistryProvider = 5, GroupPolicyProvider = 6, MdmProvider = 7, SettingsProvider = 8, InvalidProviderType = 9). @@ -7116,7 +7130,6 @@ The following fields are available: - **linkLocalConnectionCount** The number of connections made to peers in the same Link-local network. - **numPeers** The total number of peers used for this download. - **numPeersLocal** The total number of local peers used for this download. -- **ppedefinedCallerName** No content is currently available. - **predefinedCallerName** The name of the API Caller. - **restrictedUpload** Is the upload restricted? - **routeToCacheServer** The cache server setting, source, and value. @@ -7124,9 +7137,7 @@ The following fields are available: - **totalTimeMs** Duration of the download (in seconds). - **updateID** The ID of the update being downloaded. - **uplinkBps** The maximum measured available upload bandwidth (in bytes per second). -- **uplinkFps** No content is currently available. - **uplinkUsageBps** The upload speed (in bytes per second). -- **uplinkUsageFps** No content is currently available. - **usedMemoryStream** TRUE if the download is using memory streaming for App downloads. @@ -7174,7 +7185,6 @@ The following fields are available: - **fileSize** Total file size of the file that was downloaded. - **fileSizeCaller** Value for total file size provided by our caller. - **groupID** ID for the group. -- **grOupID** No content is currently available. - **isEncrypted** Indicates whether the download is encrypted. - **isVpn** Indicates whether the device is connected to a Virtual Private Network. - **jobID** The ID of the Windows Update job. From 9b7198fbc27033affb7ca0f899119a2d86b68033 Mon Sep 17 00:00:00 2001 From: Brian Lich Date: Thu, 18 Apr 2019 15:09:13 -0700 Subject: [PATCH 194/724] new build 4/18/2019 3:09 PM --- ...ndows-diagnostic-events-and-fields-1903.md | 58 +++++++++++++------ 1 file changed, 41 insertions(+), 17 deletions(-) diff --git a/windows/privacy/basic-level-windows-diagnostic-events-and-fields-1903.md b/windows/privacy/basic-level-windows-diagnostic-events-and-fields-1903.md index 161e810b9e..a8a6106419 100644 --- a/windows/privacy/basic-level-windows-diagnostic-events-and-fields-1903.md +++ b/windows/privacy/basic-level-windows-diagnostic-events-and-fields-1903.md @@ -2134,13 +2134,12 @@ The following fields are available: - **ext_app** Describes the properties of the running application. This extension could be populated by either a client app or a web app. See [Common Data Extensions.app](#common-data-extensionsapp). - **ext_container** Describes the properties of the container for events logged within a container. See [Common Data Extensions.container](#common-data-extensionscontainer). - **ext_device** Describes the device-related fields. See [Common Data Extensions.device](#common-data-extensionsdevice). -- **ext_mscv** No content is currently available. See [Common Data Extensions.mscv](#common-data-extensionsmscv). +- **ext_mscv** Describes the correlation vector-related fields. See [Common Data Extensions.mscv](#common-data-extensionsmscv). - **ext_os** Describes the operating system properties that would be populated by the client. See [Common Data Extensions.os](#common-data-extensionsos). - **ext_receipts** Describes the fields related to time as provided by the client for debugging purposes. See [Common Data Extensions.receipts](#common-data-extensionsreceipts). - **ext_sdk** Describes the fields related to a platform library required for a specific SDK. See [Common Data Extensions.sdk](#common-data-extensionssdk). - **ext_user** Describes the fields related to a user. See [Common Data Extensions.user](#common-data-extensionsuser). - **ext_utc** Describes the fields that might be populated by a logging library on Windows. See [Common Data Extensions.utc](#common-data-extensionsutc). -- **ext_web** No content is currently available. See [Common Data Extensions.web](#common-data-extensionsweb). - **ext_xbl** Describes the fields related to XBOX Live. See [Common Data Extensions.xbl](#common-data-extensionsxbl). - **iKey** Represents an ID for applications or other logical groupings of events. - **name** Represents the uniquely qualified name for the event. @@ -2219,28 +2218,19 @@ The following fields are available: - **epoch** Represents the epoch and seqNum fields, which help track how many events were fired and how many events were uploaded, and enables identification of data lost during upload and de-duplication of events on the ingress server. - **eventFlags** Represents a collection of bits that describe how the event should be processed by the Connected User Experience and Telemetry component pipeline. The lowest-order byte is the event persistence. The next byte is the event latency. - **flags** Represents the bitmap that captures various Windows specific flags. -- **loggingBinary** No content is currently available. +- **loggingBinary** The binary (executable, library, driver, etc.) that fired the event. - **mon** Combined monitor and event sequence numbers in the format: monitor sequence : event sequence - **op** Represents the ETW Op Code. -- **pgName** No content is currently available. +- **pgName** The short form of the provider group name associated with the event. - **popSample** No content is currently available. -- **providerGuid** No content is currently available. +- **providerGuid** The ETW provider ID associated with the provider name. - **raId** Represents the ETW Related ActivityId. Logged via TraceLogging or directly via ETW. - **seq** Represents the sequence field used to track absolute order of uploaded events. It is an incrementing identifier for each event added to the upload queue. The Sequence helps track how many events were fired and how many events were uploaded and enables identification of data lost during upload and de-duplication of events on the ingress server. - **sqmId** No content is currently available. - **stId** Represents the Scenario Entry Point ID. This is a unique GUID for each event in a diagnostic scenario. This used to be Scenario Trigger ID. -- **wcmp** No content is currently available. -- **wPId** No content is currently available. -- **wsId** No content is currently available. - - -### Common Data Extensions.web - -No content is currently available. - -The following fields are available: - -- **browserVer** No content is currently available. +- **wcmp** The Windows Shell Composer ID. +- **wPId** The Windows Core OS product ID. +- **wsId** The Windows Core OS session ID. ### Common Data Extensions.xbl @@ -7480,6 +7470,17 @@ The following fields are available: - **wuDeviceid** Unique device ID used by Windows Update. +### Microsoft.Windows.Update.Orchestrator.UniversalOrchestratorInvalidSignature + +No content is currently available. + +The following fields are available: + +- **updaterCmdLine** No content is currently available. +- **updaterId** No content is currently available. +- **wuDeviceid** No content is currently available. + + ### Microsoft.Windows.Update.Orchestrator.UnstickUpdate This event is sent when the update service orchestrator (USO) indicates that the update can be superseded by a newer update. @@ -7503,6 +7504,18 @@ The following fields are available: - **wuDeviceid** Unique device ID used by Windows Update. +### Microsoft.Windows.Update.Orchestrator.UpdaterCallbackFailed + +No content is currently available. + +The following fields are available: + +- **updaterArgument** No content is currently available. +- **updaterCmdLine** No content is currently available. +- **updaterId** No content is currently available. +- **wuDeviceid** No content is currently available. + + ### Microsoft.Windows.Update.Orchestrator.UpdateRebootRequired This event sends data about whether an update required a reboot to help keep Windows up to date. @@ -7518,6 +7531,17 @@ The following fields are available: - **wuDeviceid** Unique device ID used by Windows Update. +### Microsoft.Windows.Update.Orchestrator.UpdaterMalformedData + +No content is currently available. + +The following fields are available: + +- **malformedRegValue** No content is currently available. +- **updaterId** No content is currently available. +- **wuDeviceid** No content is currently available. + + ### Microsoft.Windows.Update.Orchestrator.updateSettingsFlushFailed This event sends information about an update that encountered problems and was not able to complete. From 1115f64c67d3d2e99d082fcdfdc3f3f6b14cf308 Mon Sep 17 00:00:00 2001 From: Brian Lich Date: Fri, 19 Apr 2019 08:31:12 -0700 Subject: [PATCH 195/724] new build 4/19/2019 8:31 AM --- ...ndows-diagnostic-events-and-fields-1903.md | 61 ++++++++----------- 1 file changed, 24 insertions(+), 37 deletions(-) diff --git a/windows/privacy/basic-level-windows-diagnostic-events-and-fields-1903.md b/windows/privacy/basic-level-windows-diagnostic-events-and-fields-1903.md index a8a6106419..97b84fbcf7 100644 --- a/windows/privacy/basic-level-windows-diagnostic-events-and-fields-1903.md +++ b/windows/privacy/basic-level-windows-diagnostic-events-and-fields-1903.md @@ -13,7 +13,7 @@ manager: dansimp ms.collection: M365-security-compliance ms.topic: article audience: ITPro -ms.date: 04/18/2019 +ms.date: 04/19/2019 --- @@ -1590,7 +1590,7 @@ The following fields are available: ### Census.App -Provides information on IE and Census versions running on the device +This event sends version data about the Apps running on this device, to help keep Windows up to date. The following fields are available: @@ -1608,13 +1608,13 @@ The following fields are available: ### Census.Azure -No content is currently available. +This event returns data from Microsoft-internal Azure server machines (only from Microsoft-internal machines with Server SKUs). All other machines (those outside Microsoft and/or machines that are not part of the “Azure fleet”) return empty data sets. The following fields are available: -- **CloudCoreBuildEx** No content is currently available. -- **CloudCoreSupportBuildEx** No content is currently available. -- **NodeID** No content is currently available. +- **CloudCoreBuildEx** The Azure CloudCore build number. +- **CloudCoreSupportBuildEx** The Azure CloudCore support build number. +- **NodeID** The node identifier on the device that indicates whether the device is part of the Azure fleet. ### Census.Battery @@ -1865,7 +1865,7 @@ The following fields are available: ### Census.Processor -Provides information on several important data points about Processor settings +This event sends data about the processor to help keep Windows up to date. The following fields are available: @@ -2136,7 +2136,6 @@ The following fields are available: - **ext_device** Describes the device-related fields. See [Common Data Extensions.device](#common-data-extensionsdevice). - **ext_mscv** Describes the correlation vector-related fields. See [Common Data Extensions.mscv](#common-data-extensionsmscv). - **ext_os** Describes the operating system properties that would be populated by the client. See [Common Data Extensions.os](#common-data-extensionsos). -- **ext_receipts** Describes the fields related to time as provided by the client for debugging purposes. See [Common Data Extensions.receipts](#common-data-extensionsreceipts). - **ext_sdk** Describes the fields related to a platform library required for a specific SDK. See [Common Data Extensions.sdk](#common-data-extensionssdk). - **ext_user** Describes the fields related to a user. See [Common Data Extensions.user](#common-data-extensionsuser). - **ext_utc** Describes the fields that might be populated by a logging library on Windows. See [Common Data Extensions.utc](#common-data-extensionsutc). @@ -2169,18 +2168,6 @@ The following fields are available: - **ver** Represents the major and minor version of the extension. -### Common Data Extensions.receipts - -Represents various time information as provided by the client and helps for debugging purposes. - -The following fields are available: - -- **flags** No content is currently available. -- **originalName** No content is currently available. -- **originalTime** The original event time. -- **uploadTime** The time the event was uploaded. - - ### Common Data Extensions.sdk Used by platform specific libraries to record fields that are required for a specific SDK. @@ -2191,7 +2178,7 @@ The following fields are available: - **installId** An ID that's created during the initialization of the SDK for the first time. - **libVer** The SDK version. - **seq** An ID that is incremented for each event. -- **ver** No content is currently available. +- **ver** The version of the logging SDK. ### Common Data Extensions.user @@ -2222,7 +2209,7 @@ The following fields are available: - **mon** Combined monitor and event sequence numbers in the format: monitor sequence : event sequence - **op** Represents the ETW Op Code. - **pgName** The short form of the provider group name associated with the event. -- **popSample** No content is currently available. +- **popSample** Represents the effective sample rate for this event at the time it was generated by a client. - **providerGuid** The ETW provider ID associated with the provider name. - **raId** Represents the ETW Related ActivityId. Logged via TraceLogging or directly via ETW. - **seq** Represents the sequence field used to track absolute order of uploaded events. It is an incrementing identifier for each event added to the upload queue. The Sequence helps track how many events were fired and how many events were uploaded and enables identification of data lost during upload and de-duplication of events on the ingress server. @@ -2408,7 +2395,7 @@ This event sends data about boot IDs for which a normal clean shutdown was not o The following fields are available: - **AbnormalShutdownBootId** BootId of the abnormal shutdown being reported by this event. -- **AbsCausedbyAutoChk** No content is currently available. +- **AbsCausedbyAutoChk** This flag is set when AutoCheck forces a device restart to indicate that the shutdown was not an abnormal shutdown. - **AcDcStateAtLastShutdown** Identifies if the device was on battery or plugged in. - **BatteryLevelAtLastShutdown** The last recorded battery level. - **BatteryPercentageAtLastShutdown** The battery percentage at the last shutdown. @@ -2423,7 +2410,7 @@ The following fields are available: - **FirmwareType** ID of the FirmwareType as enumerated in DimFirmwareType. - **HardwareWatchdogTimerGeneratedLastReset** Indicates whether the hardware watchdog timer caused the last reset. - **HardwareWatchdogTimerPresent** Indicates whether hardware watchdog timer was present or not. -- **InvalidBootStat** No content is currently available. +- **InvalidBootStat** This is a sanity check flag that ensures the validity of the bootstat file. - **LastBugCheckBootId** bootId of the last captured crash. - **LastBugCheckCode** Code that indicates the type of error. - **LastBugCheckContextFlags** Additional crash dump settings. @@ -7472,13 +7459,13 @@ The following fields are available: ### Microsoft.Windows.Update.Orchestrator.UniversalOrchestratorInvalidSignature -No content is currently available. +This event is sent when an updater has attempted to register a binary that is not signed by Microsoft. The following fields are available: -- **updaterCmdLine** No content is currently available. -- **updaterId** No content is currently available. -- **wuDeviceid** No content is currently available. +- **updaterCmdLine** The callback executable for the updater. +- **updaterId** The ID of the updater. +- **wuDeviceid** Unique device ID used by Windows Update. ### Microsoft.Windows.Update.Orchestrator.UnstickUpdate @@ -7506,14 +7493,14 @@ The following fields are available: ### Microsoft.Windows.Update.Orchestrator.UpdaterCallbackFailed -No content is currently available. +This event is sent when an updater failed to execute the registered callback. The following fields are available: -- **updaterArgument** No content is currently available. -- **updaterCmdLine** No content is currently available. -- **updaterId** No content is currently available. -- **wuDeviceid** No content is currently available. +- **updaterArgument** The argument to pass to the updater callback. +- **updaterCmdLine** The callback executable for the updater. +- **updaterId** The ID of the updater. +- **wuDeviceid** Unique device ID used by Windows Update. ### Microsoft.Windows.Update.Orchestrator.UpdateRebootRequired @@ -7533,13 +7520,13 @@ The following fields are available: ### Microsoft.Windows.Update.Orchestrator.UpdaterMalformedData -No content is currently available. +This event is sent when a registered updater has missing or corrupted information, to help keep Windows up to date. The following fields are available: -- **malformedRegValue** No content is currently available. -- **updaterId** No content is currently available. -- **wuDeviceid** No content is currently available. +- **malformedRegValue** The registry value that contains the malformed or missing entry. +- **updaterId** The ID of the updater. +- **wuDeviceid** Unique device ID used by Windows Update. ### Microsoft.Windows.Update.Orchestrator.updateSettingsFlushFailed From b7f16d21b4f76cf232f3250a00e43b6ba64b861b Mon Sep 17 00:00:00 2001 From: Brian Lich Date: Fri, 19 Apr 2019 08:31:23 -0700 Subject: [PATCH 196/724] new build 4/19/2019 8:31 AM --- ...ndows-diagnostic-events-and-fields-1703.md | 4 +- ...ndows-diagnostic-events-and-fields-1709.md | 6 +-- ...ndows-diagnostic-events-and-fields-1803.md | 17 ++------ ...ndows-diagnostic-events-and-fields-1809.md | 39 ++++--------------- 4 files changed, 15 insertions(+), 51 deletions(-) diff --git a/windows/privacy/basic-level-windows-diagnostic-events-and-fields-1703.md b/windows/privacy/basic-level-windows-diagnostic-events-and-fields-1703.md index 086a835957..ab24b15b13 100644 --- a/windows/privacy/basic-level-windows-diagnostic-events-and-fields-1703.md +++ b/windows/privacy/basic-level-windows-diagnostic-events-and-fields-1703.md @@ -13,7 +13,7 @@ manager: dansimp ms.collection: M365-security-compliance ms.topic: article audience: ITPro -ms.date: 04/18/2019 +ms.date: 04/19/2019 --- @@ -1464,7 +1464,7 @@ The following fields are available: ### Census.Processor -This event sends data about the processor (architecture, speed, number of cores, manufacturer, and model number), to help keep Windows up to date. +This event sends data about the processor to help keep Windows up to date. The following fields are available: diff --git a/windows/privacy/basic-level-windows-diagnostic-events-and-fields-1709.md b/windows/privacy/basic-level-windows-diagnostic-events-and-fields-1709.md index 8dedfc835b..a4a2c28bc5 100644 --- a/windows/privacy/basic-level-windows-diagnostic-events-and-fields-1709.md +++ b/windows/privacy/basic-level-windows-diagnostic-events-and-fields-1709.md @@ -13,7 +13,7 @@ manager: dansimp ms.collection: M365-security-compliance ms.topic: article audience: ITPro -ms.date: 04/18/2019 +ms.date: 04/19/2019 --- @@ -1329,7 +1329,7 @@ The following fields are available: ### Census.App -Provides information on IE and Census versions running on the device +This event sends version data about the Apps running on this device, to help keep Windows up to date. The following fields are available: @@ -1538,7 +1538,7 @@ The following fields are available: ### Census.Processor -Provides information on several important data points about Processor settings +This event sends data about the processor to help keep Windows up to date. The following fields are available: diff --git a/windows/privacy/basic-level-windows-diagnostic-events-and-fields-1803.md b/windows/privacy/basic-level-windows-diagnostic-events-and-fields-1803.md index 452ecb0c6d..e199627613 100644 --- a/windows/privacy/basic-level-windows-diagnostic-events-and-fields-1803.md +++ b/windows/privacy/basic-level-windows-diagnostic-events-and-fields-1803.md @@ -13,7 +13,7 @@ manager: dansimp ms.collection: M365-security-compliance ms.topic: article audience: ITPro -ms.date: 04/18/2019 +ms.date: 04/19/2019 --- @@ -1374,7 +1374,7 @@ The following fields are available: ### Census.App -Provides information on IE and Census versions running on the device. +This event sends version data about the Apps running on this device, to help keep Windows up to date. The following fields are available: @@ -1628,7 +1628,7 @@ The following fields are available: ### Census.Processor -Provides information on several important data points about Processor settings. +This event sends data about the processor to help keep Windows up to date. The following fields are available: @@ -1907,7 +1907,6 @@ The following fields are available: - **ext_cs** Describes properties related to the schema of the event. See [Common Data Extensions.cs](#common-data-extensionscs). - **ext_device** Describes the device-related fields. See [Common Data Extensions.device](#common-data-extensionsdevice). - **ext_os** Describes the operating system properties that would be populated by the client. See [Common Data Extensions.os](#common-data-extensionsos). -- **ext_receipts** Describes the fields related to time as provided by the client for debugging purposes. See [Common Data Extensions.receipts](#common-data-extensionsreceipts). - **ext_sdk** Describes the fields related to a platform library required for a specific SDK. See [Common Data Extensions.sdk](#common-data-extensionssdk). - **ext_user** Describes the fields related to a user. See [Common Data Extensions.user](#common-data-extensionsuser). - **ext_utc** Describes the fields that might be populated by a logging library on Windows. See [Common Data Extensions.utc](#common-data-extensionsutc). @@ -1933,16 +1932,6 @@ The following fields are available: - **ver** Represents the major and minor version of the extension. -### Common Data Extensions.receipts - -Represents various time information as provided by the client and helps for debugging purposes. - -The following fields are available: - -- **originalTime** The original event time. -- **uploadTime** The time the event was uploaded. - - ### Common Data Extensions.sdk Used by platform specific libraries to record fields that are required for a specific SDK. diff --git a/windows/privacy/basic-level-windows-diagnostic-events-and-fields-1809.md b/windows/privacy/basic-level-windows-diagnostic-events-and-fields-1809.md index 122c0460b9..19d1f81064 100644 --- a/windows/privacy/basic-level-windows-diagnostic-events-and-fields-1809.md +++ b/windows/privacy/basic-level-windows-diagnostic-events-and-fields-1809.md @@ -13,7 +13,7 @@ manager: dansimp ms.collection: M365-security-compliance ms.topic: article audience: ITPro -ms.date: 04/18/2019 +ms.date: 04/19/2019 --- @@ -1801,7 +1801,7 @@ The following fields are available: ### Census.App -Provides information on IE and Census versions running on the device +This event sends version data about the Apps running on this device, to help keep Windows up to date. The following fields are available: @@ -1819,13 +1819,13 @@ The following fields are available: ### Census.Azure -No content is currently available. +This event returns data from Microsoft-internal Azure server machines (only from Microsoft-internal machines with Server SKUs). All other machines (those outside Microsoft and/or machines that are not part of the “Azure fleet”) return empty data sets. The following fields are available: -- **CloudCoreBuildEx** No content is currently available. -- **CloudCoreSupportBuildEx** No content is currently available. -- **NodeID** No content is currently available. +- **CloudCoreBuildEx** The Azure CloudCore build number. +- **CloudCoreSupportBuildEx** The Azure CloudCore support build number. +- **NodeID** The node identifier on the device that indicates whether the device is part of the Azure fleet. ### Census.Battery @@ -2070,7 +2070,7 @@ The following fields are available: ### Census.Processor -Provides information on several important data points about Processor settings +This event sends data about the processor to help keep Windows up to date. The following fields are available: @@ -2357,7 +2357,6 @@ The following fields are available: - **ext_cs** Describes properties related to the schema of the event. See [Common Data Extensions.cs](#common-data-extensionscs). - **ext_device** Describes the device-related fields. See [Common Data Extensions.device](#common-data-extensionsdevice). - **ext_os** Describes the operating system properties that would be populated by the client. See [Common Data Extensions.os](#common-data-extensionsos). -- **ext_receipts** Describes the fields related to time as provided by the client for debugging purposes. See [Common Data Extensions.receipts](#common-data-extensionsreceipts). - **ext_sdk** Describes the fields related to a platform library required for a specific SDK. See [Common Data Extensions.sdk](#common-data-extensionssdk). - **ext_user** Describes the fields related to a user. See [Common Data Extensions.user](#common-data-extensionsuser). - **ext_utc** Describes the fields that might be populated by a logging library on Windows. See [Common Data Extensions.utc](#common-data-extensionsutc). @@ -2383,16 +2382,6 @@ The following fields are available: - **ver** Represents the major and minor version of the extension. -### Common Data Extensions.receipts - -Represents various time information as provided by the client and helps for debugging purposes. - -The following fields are available: - -- **originalTime** The original event time. -- **uploadTime** The time the event was uploaded. - - ### Common Data Extensions.sdk Used by platform specific libraries to record fields that are required for a specific SDK. @@ -4509,22 +4498,8 @@ This event indicates the number of bytes read from or read by the OS and written The following fields are available: -- **BootAttemptCount** No content is currently available. -- **BootStatusPolicy** No content is currently available. -- **BootType** No content is currently available. - **BytesRead** The total number of bytes read from or read by the OS upon system startup. - **BytesWritten** The total number of bytes written to or written by the OS upon system startup. -- **FirmwareResetReasonEmbeddedController** No content is currently available. -- **FirmwareResetReasonEmbeddedControllerAdditional** No content is currently available. -- **FirmwareResetReasonPch** No content is currently available. -- **FirmwareResetReasonPchAdditional** No content is currently available. -- **FirmwareResetReasonSupplied** No content is currently available. -- **LastBootSucceeded** No content is currently available. -- **LastShutdownSucceeded** No content is currently available. -- **MeasuredLaunchResume** No content is currently available. -- **MenuPolicy** No content is currently available. -- **RecoveryEnabled** No content is currently available. -- **UserInputTime** No content is currently available. ### Microsoft.Windows.Kernel.BootEnvironment.OsLaunch From 2e9e683afabb7f8381c3270f5d5b890a7cdabc5f Mon Sep 17 00:00:00 2001 From: Brian Lich Date: Fri, 19 Apr 2019 13:13:02 -0700 Subject: [PATCH 197/724] fixing typo --- .../basic-level-windows-diagnostic-events-and-fields-1809.md | 4 ++-- 1 file changed, 2 insertions(+), 2 deletions(-) diff --git a/windows/privacy/basic-level-windows-diagnostic-events-and-fields-1809.md b/windows/privacy/basic-level-windows-diagnostic-events-and-fields-1809.md index 19d1f81064..b312c42c9d 100644 --- a/windows/privacy/basic-level-windows-diagnostic-events-and-fields-1809.md +++ b/windows/privacy/basic-level-windows-diagnostic-events-and-fields-1809.md @@ -3877,7 +3877,7 @@ The following fields are available: This event indicates that a new set of InventoryDeviceMediaClassSAdd events will be sent. -This event includes fields from [Ms.Device.De~iceInventoryChange](#msdevicede~iceinventorychange). +This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedeviceinventorychange). The following fields are available: @@ -3968,7 +3968,7 @@ The following fields are available: This event indicates that a new set of InventoryDeviceUsbHubClassAdd events will be sent. -This event includes fields from [Ms.De~ice.DeviceInventoryChange](#msde~icedeviceinventorychange). +This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedeviceinventorychange). The following fields are available: From 5ce77666e16a6f318781a6703c1506d817189274 Mon Sep 17 00:00:00 2001 From: MaratMussabekov <48041687+MaratMussabekov@users.noreply.github.com> Date: Sun, 21 Apr 2019 20:07:28 +0500 Subject: [PATCH 198/724] update attack-surface-reduction-exploit-guard.md --- .../attack-surface-reduction-exploit-guard.md | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/windows/security/threat-protection/windows-defender-exploit-guard/attack-surface-reduction-exploit-guard.md b/windows/security/threat-protection/windows-defender-exploit-guard/attack-surface-reduction-exploit-guard.md index 5bfe2c6ba4..4181785422 100644 --- a/windows/security/threat-protection/windows-defender-exploit-guard/attack-surface-reduction-exploit-guard.md +++ b/windows/security/threat-protection/windows-defender-exploit-guard/attack-surface-reduction-exploit-guard.md @@ -22,7 +22,7 @@ ms.date: 04/02/2019 Attack surface reduction rules help prevent behaviors malware often uses to infect computers with malicious code. You can set attack surface reduction rules for computers running Windows 10, version 1709 or later, Windows Server 2016 1803 or later, or Windows Server 2019. -To use attack surface reduction rules, you need a Windows 10 Enterprise E3 license or higher. A Windows E5 license gives you the advanced management capabilities to power them. These include monitoring, analytics, and workflows available in [Windows Defender Advanced Threat Protection](../windows-defender-atp/windows-defender-advanced-threat-protection.md), as well as reporting and configuration capabilities in the M365 Security Center. These advanced capabilities aren't available with an E3 license, but you can use attack surface reduction rule events in Event Viewer to help facilitate deployment. +To use attack surface reduction rules, you need a Windows 10 Enterprise license. If you have Windows E5 license, it gives you the advanced management capabilities to power them. These include monitoring, analytics, and workflows available in [Windows Defender Advanced Threat Protection](../windows-defender-atp/windows-defender-advanced-threat-protection.md), as well as reporting and configuration capabilities in the M365 Security Center. These advanced capabilities aren't available with an E3 license or with Windows 10 Enterprise without subsciption, but you can use attack surface reduction rule events in Event Viewer to help facilitate deployment. Attack surface reduction rules target behaviors that malware and malicious apps typically use to infect computers, including: From b7fc3ce24c06828000fc4037776a4e8496feb516 Mon Sep 17 00:00:00 2001 From: MaratMussabekov <48041687+MaratMussabekov@users.noreply.github.com> Date: Sun, 21 Apr 2019 20:59:33 +0500 Subject: [PATCH 199/724] update attack-surface-reduction-exploit-guard.md --- .../attack-surface-reduction-exploit-guard.md | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/windows/security/threat-protection/windows-defender-exploit-guard/attack-surface-reduction-exploit-guard.md b/windows/security/threat-protection/windows-defender-exploit-guard/attack-surface-reduction-exploit-guard.md index 4181785422..272c13081f 100644 --- a/windows/security/threat-protection/windows-defender-exploit-guard/attack-surface-reduction-exploit-guard.md +++ b/windows/security/threat-protection/windows-defender-exploit-guard/attack-surface-reduction-exploit-guard.md @@ -22,7 +22,7 @@ ms.date: 04/02/2019 Attack surface reduction rules help prevent behaviors malware often uses to infect computers with malicious code. You can set attack surface reduction rules for computers running Windows 10, version 1709 or later, Windows Server 2016 1803 or later, or Windows Server 2019. -To use attack surface reduction rules, you need a Windows 10 Enterprise license. If you have Windows E5 license, it gives you the advanced management capabilities to power them. These include monitoring, analytics, and workflows available in [Windows Defender Advanced Threat Protection](../windows-defender-atp/windows-defender-advanced-threat-protection.md), as well as reporting and configuration capabilities in the M365 Security Center. These advanced capabilities aren't available with an E3 license or with Windows 10 Enterprise without subsciption, but you can use attack surface reduction rule events in Event Viewer to help facilitate deployment. +To use attack surface reduction rules, you need a Windows 10 Enterprise license. If you have a Windows E5 license, it gives you the advanced management capabilities to power them. These include monitoring, analytics, and workflows available in [Windows Defender Advanced Threat Protection](../windows-defender-atp/windows-defender-advanced-threat-protection.md), as well as reporting and configuration capabilities in the M365 Security Center. These advanced capabilities aren't available with an E3 license or with Windows 10 Enterprise without subsciption, but you can use attack surface reduction rule events in Event Viewer to help facilitate deployment. Attack surface reduction rules target behaviors that malware and malicious apps typically use to infect computers, including: From 3d577dc32ce2b9b140b1deb9d2e2107a1dbff248 Mon Sep 17 00:00:00 2001 From: Brian Lich Date: Tue, 23 Apr 2019 10:06:39 -0700 Subject: [PATCH 200/724] final build 04232019 --- ...-level-windows-diagnostic-events-and-fields-1903.md | 10 +--------- 1 file changed, 1 insertion(+), 9 deletions(-) diff --git a/windows/privacy/basic-level-windows-diagnostic-events-and-fields-1903.md b/windows/privacy/basic-level-windows-diagnostic-events-and-fields-1903.md index 97b84fbcf7..9f8a2900c9 100644 --- a/windows/privacy/basic-level-windows-diagnostic-events-and-fields-1903.md +++ b/windows/privacy/basic-level-windows-diagnostic-events-and-fields-1903.md @@ -13,17 +13,12 @@ manager: dansimp ms.collection: M365-security-compliance ms.topic: article audience: ITPro -ms.date: 04/19/2019 +ms.date: 04/23/2019 --- # Windows 10, version 1903 basic level Windows diagnostic events and fields - -> [!IMPORTANT] -> Some information relates to prereleased product which may be substantially modified before it's commercially released. Microsoft makes no warranties, express or implied, with respect to the information provided here. - - **Applies to** - Windows 10, version 1903 @@ -46,8 +41,6 @@ You can learn more about Windows functional and diagnostic data through these ar - [Configure Windows diagnostic data in your organization](configure-windows-diagnostic-data-in-your-organization.md) - - ## AppLocker events ### Microsoft.Windows.Security.AppLockerCSP.AddParams @@ -2213,7 +2206,6 @@ The following fields are available: - **providerGuid** The ETW provider ID associated with the provider name. - **raId** Represents the ETW Related ActivityId. Logged via TraceLogging or directly via ETW. - **seq** Represents the sequence field used to track absolute order of uploaded events. It is an incrementing identifier for each event added to the upload queue. The Sequence helps track how many events were fired and how many events were uploaded and enables identification of data lost during upload and de-duplication of events on the ingress server. -- **sqmId** No content is currently available. - **stId** Represents the Scenario Entry Point ID. This is a unique GUID for each event in a diagnostic scenario. This used to be Scenario Trigger ID. - **wcmp** The Windows Shell Composer ID. - **wPId** The Windows Core OS product ID. From dc90e8ddde7012f009025936fdc54465b2d1a484 Mon Sep 17 00:00:00 2001 From: karthigb Date: Tue, 23 Apr 2019 11:45:44 -0700 Subject: [PATCH 201/724] Update configure-windows-defender-smartscreen-shortdesc.md --- .../configure-windows-defender-smartscreen-shortdesc.md | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/browsers/edge/shortdesc/configure-windows-defender-smartscreen-shortdesc.md b/browsers/edge/shortdesc/configure-windows-defender-smartscreen-shortdesc.md index 58dfd6be9a..ce0f753466 100644 --- a/browsers/edge/shortdesc/configure-windows-defender-smartscreen-shortdesc.md +++ b/browsers/edge/shortdesc/configure-windows-defender-smartscreen-shortdesc.md @@ -6,4 +6,4 @@ ms.prod: edge ms:topic: include --- -Microsoft Edge uses Windows Defender SmartScreen (turned on) to protect users from potential phishing scams and malicious software by default. Also, by default, users cannot disable (turn off) Windows Defender SmartScreen. Enabling this policy turns off Windows Defender SmartScreen and prevent users from turning it on. Don’t configure this policy to let users choose to turn Windows defender SmartScreen on or off. \ No newline at end of file +Microsoft Edge uses Windows Defender SmartScreen (turned on) to protect users from potential phishing scams and malicious software by default. Also, by default, users cannot disable (turn off) Windows Defender SmartScreen. Enabling this policy turns on Windows Defender SmartScreen and prevent users from turning it off. Don’t configure this policy to let users choose to turn Windows defender SmartScreen on or off. From 5f0d4b97e71cfa2263f32f7c58215f631f2e6619 Mon Sep 17 00:00:00 2001 From: Beth Levin Date: Tue, 23 Apr 2019 14:23:30 -0700 Subject: [PATCH 202/724] fix error --- .openpublishing.redirection.json | 5 +++-- 1 file changed, 3 insertions(+), 2 deletions(-) diff --git a/.openpublishing.redirection.json b/.openpublishing.redirection.json index 22d6eeea52..974018c147 100644 --- a/.openpublishing.redirection.json +++ b/.openpublishing.redirection.json @@ -14674,10 +14674,11 @@ "source_path": "windows/security/threat-protection/windows-defender-atp/user-alert-windows-defender-advanced-threat-protection-new.md", "redirect_url": "/windows/security/threat-protection/microsoft-defender-atp/user", "redirect_document_id": true -} +}, +{ "source_path": "windows/security/threat-protection/windows-defender-atp/manage-allowed-blocked-list-windows-defender-advanced-threat-protection.md", "redirect_url": "/windows/security/threat-protection/windows-defender-atp/manage-indicators", "redirect_document_id": true -}, +} ] } From 54c0c02c2dd5a160a781e8cab345d7d305124639 Mon Sep 17 00:00:00 2001 From: Beth Levin Date: Tue, 23 Apr 2019 14:57:28 -0700 Subject: [PATCH 203/724] update links --- .openpublishing.redirection.json | 5 ----- 1 file changed, 5 deletions(-) diff --git a/.openpublishing.redirection.json b/.openpublishing.redirection.json index 974018c147..4b84e0c62b 100644 --- a/.openpublishing.redirection.json +++ b/.openpublishing.redirection.json @@ -1356,11 +1356,6 @@ "redirect_document_id": true }, { -"source_path": "windows/security/threat-protection/windows-defender-atp/manage-allowed-blocked-list-windows-defender-advanced-threat-protection.md", -"redirect_url": "/windows/security/threat-protection/microsoft-defender-atp/manage-allowed-blocked-list", -"redirect_document_id": true -}, -{ "source_path": "windows/security/threat-protection/windows-defender-atp/manage-auto-investigation-windows-defender-advanced-threat-protection.md", "redirect_url": "/windows/security/threat-protection/microsoft-defender-atp/manage-auto-investigation", "redirect_document_id": true From 900a8d0c28fb44f2ac52ac1d36b3a91ac2ba4d02 Mon Sep 17 00:00:00 2001 From: Malin De Silva Date: Wed, 24 Apr 2019 18:47:47 +0530 Subject: [PATCH 204/724] Added Azure AD MFA Auth with O365 --- .../hello-for-business/hello-hybrid-key-trust-prereqs.md | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/windows/security/identity-protection/hello-for-business/hello-hybrid-key-trust-prereqs.md b/windows/security/identity-protection/hello-for-business/hello-hybrid-key-trust-prereqs.md index f59a78c750..c191cc7a49 100644 --- a/windows/security/identity-protection/hello-for-business/hello-hybrid-key-trust-prereqs.md +++ b/windows/security/identity-protection/hello-for-business/hello-hybrid-key-trust-prereqs.md @@ -97,7 +97,7 @@ You can deploy Windows Hello for Business key trust in non-federated and federat ## Multifactor Authentication ## Windows Hello for Business is a strong, two-factor credential the helps organizations reduce their dependency on passwords. The provisioning process lets a user enroll in Windows Hello for Business using their user name and password as one factor, but needs a second factor of authentication. -Hybrid Windows Hello for Business deployments can use Azure’s Multi-factor Authentication service or they can use multi-factor authentication provides by Windows Server 2012 R2 or later Active Directory Federation Services, which includes an adapter model that enables third parties to integrate their multi-factor authentication into AD FS. +Hybrid Windows Hello for Business deployments can use Azure’s Multi-factor Authentication service or they can use multi-factor authentication provides by Windows Server 2012 R2 or later Active Directory Federation Services, which includes an adapter model that enables third parties to integrate their multi-factor authentication into AD FS. The Multi-factor authentication enabled in Office 365 license is sufficient for direct Multi-factor Authentication against Azure AD. ### Section Review > [!div class="checklist"] From da173301dee44829e1a19b1e362aed876ffbcdf5 Mon Sep 17 00:00:00 2001 From: "Nisha Mittal (Wipro Ltd.)" Date: Wed, 24 Apr 2019 15:49:16 -0700 Subject: [PATCH 205/724] Fixed KB and removed another extra line --- windows/release-information/windows-message-center.yml | 6 +++--- 1 file changed, 3 insertions(+), 3 deletions(-) diff --git a/windows/release-information/windows-message-center.yml b/windows/release-information/windows-message-center.yml index 3c85070b12..ea2bcfbb01 100644 --- a/windows/release-information/windows-message-center.yml +++ b/windows/release-information/windows-message-center.yml @@ -48,7 +48,7 @@ sections: - items: - type: markdown text: " -


Attack surface reduction
+
MessageDate
@@ -70,7 +70,7 @@ In order avoid this, you need to set your feature update deferral policy to 273
While this was not an issue with Microsoft’s services, we take any service disruption for our customers seriously. We will work with partners to better understand this so we can provide higher quality service in the future even across diverse global network providers.

-
If you are still unable to connect to Windows Update services due to this problem, please contact your local ISP or network administrator. You can also refer to our new KB4493784 for more information to determine if your network is affected, and to provide your local ISP or network administrator with additional information to assist you.
+
If you are still unable to connect to Windows Update services due to this problem, please contact your local ISP or network administrator. You can also refer to our new KB4493784 for more information to determine if your network is affected, and to provide your local ISP or network administrator with additional information to assist you.
From 1a8dd0690ef7fcf7465ed808ed4a850b1c456e11 Mon Sep 17 00:00:00 2001 From: "Nisha Mittal (Wipro Ltd.)" Date: Wed, 24 Apr 2019 18:23:41 -0700 Subject: [PATCH 206/724] Localized data removed from kb --- .../resolved-issues-windows-10-1507.yml | 22 +++++------ .../resolved-issues-windows-10-1607.yml | 32 ++++++++-------- .../resolved-issues-windows-10-1703.yml | 28 +++++++------- .../resolved-issues-windows-10-1709.yml | 28 +++++++------- .../resolved-issues-windows-10-1803.yml | 8 ++-- ...indows-10-1809-and-windows-server-2019.yml | 38 +++++++++---------- ...ndows-7-and-windows-server-2008-r2-sp1.yml | 26 ++++++------- ...windows-8.1-and-windows-server-2012-r2.yml | 28 +++++++------- .../status-windows-10-1507.yml | 6 +-- ...indows-10-1607-and-windows-server-2016.yml | 18 ++++----- .../status-windows-10-1703.yml | 8 ++-- .../status-windows-10-1709.yml | 10 ++--- .../status-windows-10-1803.yml | 2 +- ...indows-10-1809-and-windows-server-2019.yml | 14 +++---- ...ndows-7-and-windows-server-2008-r2-sp1.yml | 22 +++++------ ...windows-8.1-and-windows-server-2012-r2.yml | 20 +++++----- 16 files changed, 155 insertions(+), 155 deletions(-) diff --git a/windows/release-information/resolved-issues-windows-10-1507.yml b/windows/release-information/resolved-issues-windows-10-1507.yml index a630e7184b..bc5f174c24 100644 --- a/windows/release-information/resolved-issues-windows-10-1507.yml +++ b/windows/release-information/resolved-issues-windows-10-1507.yml @@ -30,7 +30,7 @@ sections: - title: Resolved issues - items: - type: markdown - text: " + text: "
MessageDate
The benefits of Windows 10 Dynamic Update

Dynamic Update can help organizations and end users alike ensure that their Windows 10 devices have the latest feature update content (as part of an in-place upgrade)—and preserve precious features on demand (FODs) and language packs (LPs) that may have been previously installed.

@@ -58,7 +58,7 @@ sections:
  • Branch readiness is configured as Semi-Annual Channel (SAC)
  • Feature update deferral is configured as 274 days or more
  • -

+ In order avoid this, you need to set your feature update deferral policy to 273 days or less.
April 03, 2019 05: 47 PM PT
Find a list of currently supported versions and previous releases

Every Windows product has a lifecycle. The lifecycle begins when a product is released and ends when it is no longer serviced or supported. Knowing key dates in this lifecycle helps you make informed decisions about when to update, upgrade, or make other changes to your software. Check out the updated Windows 10 release information page for a list of current versions by servicing option as well as end of service dates.
March 28, 2019 02: 00 PM PT
Windows 10, version 1809 designated for broad deployment

Based on the data and the feedback we’ve received from consumers, OEMs, ISVs, partners, and commercial customers, Windows 10, version 1809 has transitioned to broad deployment. With this, the Windows 10 release information page will now reflect Semi-Annual Channel (SAC) for version 1809.
March 28, 2019 10: 00 AM PT
February 21, 2019 06: 37 PM PT
February 21, 2019 06: 37 PM PT
Share your feedback: Windows update history

We read every comment you leave on our update history pages, and are always looking to improve these pages and the monthly knowledge base (KB) articles that accompany each monthly update. Take our survey and let us know how we can improve our transparency further and make these more compelling and useful to you and your organization.
February 21, 2019 12: 00 PM PT
Plan for change: Windows Update for Business and the retirement of SAC-T

Beginning with Windows 10, version 1903 (the next feature update for Windows 10), the Windows 10 release information page will no longer list SAC-T information for version 1903 and future feature updates. Instead, you will find a single entry for each new SAC release. In addition, if you are using Windows Update for Business, you will see new UI and behavior to reflect that there is only one release date for each SAC release. If you use System Center Configuration Manager, Windows Server Update Services (WSUS), or other management tools, there will now only be one feature update published to WSUS, and this will occur at the time of release. Learn how this change will affect Windows Business for Update customers.
February 14, 2019 12: 00 PM PT
Champs corner: Classifying Windows updates in common deployment tools

If you utilize automated update deployment tools, such as Windows Server Update Services (WSUS) or System Center Configuration Manager, you likely use automatic rules to streamline the approval and deployment of Windows updates. Using the correct update classification is, therefore, an important component of your organization’s device update process. Explore the options available and how to approach it in a WSUS or Configuration Manager environment.
February 05, 2019 10: 34 AM PT
@@ -57,7 +57,7 @@ sections: - type: markdown text: "
SummaryAffected buildStatusDate resolved
MSXML6 may cause applications to stop responding
MSXML6 may cause applications to stop responding if an exception was thrown during node operations, such as appendChild(), insertBefore(), and moveNode().

See details >
OS Build 10240.18094

January 08, 2019
KB4480962
Resolved
KB4493475
April 09, 2019 10:00 AM PT
Custom URI schemes may not start corresponding application
Custom URI schemes for application protocol handlers may not start the corresponding application for local intranet and trusted sites in Internet Explorer.

See details >
OS Build 10240.18158

March 12, 2019
KB4489872
Resolved
KB4493475
April 09, 2019 10:00 AM PT
- +
DetailsAffected buildStatusHistory
Custom URI schemes may not start corresponding application
After installing KB4489872, Custom URI Schemes for Application Protocol handlers may not start the corresponding application for local intranet and trusted sites on Internet Explorer.

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 8.1; Windows 7, Service Pack 1 
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2; Windows Server 2008 R2 SP1

Resolution: This issue was resolved in KB4493475.

Back to top
OS Build 10240.18158

March 12, 2019
KB4489872
Resolved
KB4493475
Resolved:
April 09, 2019 10:00 AM PT

Opened:
March 12, 2019 10:00 AM PT
Custom URI schemes may not start corresponding application
After installing KB4489872, Custom URI Schemes for Application Protocol handlers may not start the corresponding application for local intranet and trusted sites on Internet Explorer.

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 8.1; Windows 7, Service Pack 1 
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2; Windows Server 2008 R2 SP1

Resolution: This issue was resolved in KB4493475.

Back to top
OS Build 10240.18158

March 12, 2019
KB4489872
Resolved
KB4493475
Resolved:
April 09, 2019 10:00 AM PT

Opened:
March 12, 2019 10:00 AM PT
" @@ -66,10 +66,10 @@ sections: - type: markdown text: " - - - - + + + +
DetailsAffected buildStatusHistory
Applications using Microsoft Jet database and Access 95 file format stop working
Applications that use a Microsoft Jet database with the Microsoft Access 95 file format may randomly stop working.

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 7, Service Pack 1
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2008 R2 SP1

Resolution: This issue is resolved in KB4489872.

Back to top
OS Build 10240.18132

February 12, 2019
KB4487018
Resolved
KB4489872
Resolved:
March 12, 2019 10:00 AM PT

Opened:
February 12, 2019 10:00 AM PT
Error 1309 when installing/uninstalling MSI or MSP files
After installing KB4487018, users may receive “Error 1309” while installing or uninstalling certain types of MSI and MSP files.

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 8.1
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2

Resolution: This issue is resolved in KB4489872.

Back to top
OS Build 10240.18132

February 12, 2019
KB4487018
Resolved
KB4489872
Resolved:
March 12, 2019 10:00 AM PT

Opened:
February 12, 2019 10:00 AM PT
First character of Japanese era name not recognized
After installing KB4487018, the first character of the Japanese era name is not recognized as an abbreviation and may cause date parsing issues.

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 8.1; Windows 7, Service Pack 1
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2; Windows Server 2008 R2 SP1

Resolution: This issue is resolved in KB4489872.

Back to top
OS Build 10240.18132

February 12, 2019
KB4487018
Resolved
KB4489872
Resolved:
March 12, 2019 10:00 AM PT

Opened:
February 12, 2019 10:00 AM PT
Internet Explorer may fail to load images
After installing KB4487018, Internet Explorer may fail to load images with a backslash (\\) in their relative source path.

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 8.1; Windows 7, Service Pack 1
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2; Windows Server 2008 R2 SP1

Resolution: This issue is resolved in KB4491101.

Back to top
OS Build 10240.18132

February 12, 2019
KB4487018
Resolved
KB4491101
Resolved:
February 21, 2019 02:00 PM PT

Opened:
February 12, 2019 10:00 AM PT
Applications using Microsoft Jet database and Access 95 file format stop working
Applications that use a Microsoft Jet database with the Microsoft Access 95 file format may randomly stop working.

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 7, Service Pack 1
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2008 R2 SP1

Resolution: This issue is resolved in KB4489872.

Back to top
OS Build 10240.18132

February 12, 2019
KB4487018
Resolved
KB4489872
Resolved:
March 12, 2019 10:00 AM PT

Opened:
February 12, 2019 10:00 AM PT
Error 1309 when installing/uninstalling MSI or MSP files
After installing KB4487018, users may receive “Error 1309” while installing or uninstalling certain types of MSI and MSP files.

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 8.1
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2

Resolution: This issue is resolved in KB4489872.

Back to top
OS Build 10240.18132

February 12, 2019
KB4487018
Resolved
KB4489872
Resolved:
March 12, 2019 10:00 AM PT

Opened:
February 12, 2019 10:00 AM PT
First character of Japanese era name not recognized
After installing KB4487018, the first character of the Japanese era name is not recognized as an abbreviation and may cause date parsing issues.

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 8.1; Windows 7, Service Pack 1
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2; Windows Server 2008 R2 SP1

Resolution: This issue is resolved in KB4489872.

Back to top
OS Build 10240.18132

February 12, 2019
KB4487018
Resolved
KB4489872
Resolved:
March 12, 2019 10:00 AM PT

Opened:
February 12, 2019 10:00 AM PT
Internet Explorer may fail to load images
After installing KB4487018, Internet Explorer may fail to load images with a backslash (\\) in their relative source path.

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 8.1; Windows 7, Service Pack 1
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2; Windows Server 2008 R2 SP1

Resolution: This issue is resolved in KB4491101.

Back to top
OS Build 10240.18132

February 12, 2019
KB4487018
Resolved
KB4491101
Resolved:
February 21, 2019 02:00 PM PT

Opened:
February 12, 2019 10:00 AM PT
" @@ -78,9 +78,9 @@ sections: - type: markdown text: " - - - + + +
DetailsAffected buildStatusHistory
MSXML6 may cause applications to stop responding
After installing KB4480962, MSXML6 causes applications to stop responding if an exception was thrown during node operations, such as appendChild(), insertBefore(), and moveNode().

The Group Policy editor may stop responding when editing a Group Policy Object (GPO) that contains Group Policy Preferences (GPP) for Internet Explorer 10 settings.

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 8.1
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2

Resolution: This issue was resolved in KB4493475.

Back to top
OS Build 10240.18094

January 08, 2019
KB4480962
Resolved
KB4493475
Resolved:
April 09, 2019 10:00 AM PT

Opened:
January 08, 2019 10:00 AM PT
Applications using Microsoft Jet database fail to open
Applications that use a Microsoft Jet database with the Microsoft Access 97 file format may fail to open if the database has column names greater than 32 characters. The database will fail to open with the error, \"Unrecognized Database Format\".

Affected platforms:
  • Client: Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 8.1; Windows 7, Service Pack 1
  • Server: Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2; Windows Server 2008 R2 SP1

Resolution: This issue is resolved in KB4487018.

Back to top
OS Build 10240.18094

January 08, 2019
KB4480962
Resolved
KB4487018
Resolved:
February 12, 2019 10:00 AM PT

Opened:
January 08, 2019 10:00 AM PT
Unable to access hotspots with third-party applications
After installing KB4480962, third-party applications may have difficulty authenticating hotspots.

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 8.1
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2

Resolution: This issue is resolved in KB4487018.

Back to top
OS Build 10240.18094

January 08, 2019
KB4480962
Resolved
KB4487018
Resolved:
February 12, 2019 10:00 AM PT

Opened:
January 08, 2019 10:00 AM PT
MSXML6 may cause applications to stop responding
After installing KB4480962, MSXML6 causes applications to stop responding if an exception was thrown during node operations, such as appendChild(), insertBefore(), and moveNode().

The Group Policy editor may stop responding when editing a Group Policy Object (GPO) that contains Group Policy Preferences (GPP) for Internet Explorer 10 settings.

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 8.1
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2

Resolution: This issue was resolved in KB4493475.

Back to top
OS Build 10240.18094

January 08, 2019
KB4480962
Resolved
KB4493475
Resolved:
April 09, 2019 10:00 AM PT

Opened:
January 08, 2019 10:00 AM PT
Applications using Microsoft Jet database fail to open
Applications that use a Microsoft Jet database with the Microsoft Access 97 file format may fail to open if the database has column names greater than 32 characters. The database will fail to open with the error, \"Unrecognized Database Format\".

Affected platforms:
  • Client: Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 8.1; Windows 7, Service Pack 1
  • Server: Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2; Windows Server 2008 R2 SP1

Resolution: This issue is resolved in KB4487018.

Back to top
OS Build 10240.18094

January 08, 2019
KB4480962
Resolved
KB4487018
Resolved:
February 12, 2019 10:00 AM PT

Opened:
January 08, 2019 10:00 AM PT
Unable to access hotspots with third-party applications
After installing KB4480962, third-party applications may have difficulty authenticating hotspots.

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 8.1
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2

Resolution: This issue is resolved in KB4487018.

Back to top
OS Build 10240.18094

January 08, 2019
KB4480962
Resolved
KB4487018
Resolved:
February 12, 2019 10:00 AM PT

Opened:
January 08, 2019 10:00 AM PT
" @@ -89,7 +89,7 @@ sections: - type: markdown text: " - +
DetailsAffected buildStatusHistory
Unable to use Seek bar in Windows Media Player
After installing KB4462922, users may not be able to use the Seek Bar in Windows Media Player when playing specific files. This issue does not affect normal playback.

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 8.1; Windows 7, Service Pack 1
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2; Windows Server 2008 R2 SP1

Resolution: This issue is resolved in KB4471323.

Back to top
OS Build 10240.18005

October 09, 2018
KB4462922
Resolved
KB4471323
Resolved:
December 11, 2018 10:00 AM PT

Opened:
October 09, 2018 10:00 AM PT
Unable to use Seek bar in Windows Media Player
After installing KB4462922, users may not be able to use the Seek Bar in Windows Media Player when playing specific files. This issue does not affect normal playback.

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 8.1; Windows 7, Service Pack 1
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2; Windows Server 2008 R2 SP1

Resolution: This issue is resolved in KB4471323.

Back to top
OS Build 10240.18005

October 09, 2018
KB4462922
Resolved
KB4471323
Resolved:
December 11, 2018 10:00 AM PT

Opened:
October 09, 2018 10:00 AM PT
" @@ -98,6 +98,6 @@ sections: - type: markdown text: " - +
DetailsAffected buildStatusHistory
Guest VMs running Unicast NLB fail to respond after restart
All guest virtual machines running Unicast NLB fail to respond to NLB requests after the virtual machines restart.

Affected platforms:
  • Client: Windows 10, version 1803; Windows 10, version 1507
  • Server: Windows Server, version 1803

Resolution: This issue is resolved in KB4462922.

Back to top
OS Build 10240.17976

September 11, 2018
KB4457132
Resolved
KB4462922
Resolved:
October 09, 2018 10:00 AM PT

Opened:
September 11, 2018 10:00 AM PT
Guest VMs running Unicast NLB fail to respond after restart
All guest virtual machines running Unicast NLB fail to respond to NLB requests after the virtual machines restart.

Affected platforms:
  • Client: Windows 10, version 1803; Windows 10, version 1507
  • Server: Windows Server, version 1803

Resolution: This issue is resolved in KB4462922.

Back to top
OS Build 10240.17976

September 11, 2018
KB4457132
Resolved
KB4462922
Resolved:
October 09, 2018 10:00 AM PT

Opened:
September 11, 2018 10:00 AM PT
" diff --git a/windows/release-information/resolved-issues-windows-10-1607.yml b/windows/release-information/resolved-issues-windows-10-1607.yml index 12c94040bc..2edcdf78d2 100644 --- a/windows/release-information/resolved-issues-windows-10-1607.yml +++ b/windows/release-information/resolved-issues-windows-10-1607.yml @@ -30,7 +30,7 @@ sections: - title: Resolved issues - items: - type: markdown - text: " + text: "
@@ -63,7 +63,7 @@ sections: - type: markdown text: "
SummaryAffected buildStatusDate resolved
End-user-defined characters (EUDC) cause blue screen at startup
If you enable per font end-user-defined characters (EUDC), the system will stop working and a blue screen may appear at startup.

See details >
OS Build 14393.2879

March 19, 2019
KB4489889
Resolved
KB4493470
April 09, 2019 10:00 AM PT
Internet Explorer 11 authentication issue with multiple concurrent logons
Internet Explorer 11 users may encounter issues if two or more people use the same user account for multiple, concurrent login sessions on the same Windows Server machine.

See details >
OS Build 14393.2724

January 08, 2019
KB4480961
Resolved
KB4493470
April 09, 2019 10:00 AM PT
- +
DetailsAffected buildStatusHistory
End-user-defined characters (EUDC) cause blue screen at startup
If you enable per font end-user-defined characters (EUDC), the system will stop working and a blue screen may appear at startup. This is not a common setting in non-Asian regions.

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016

Resolution: This issue was resolved in KB4493470.

Back to top
OS Build 14393.2879

March 19, 2019
KB4489889
Resolved
KB4493470
Resolved:
April 09, 2019 10:00 AM PT

Opened:
March 19, 2019 10:00 AM PT
End-user-defined characters (EUDC) cause blue screen at startup
If you enable per font end-user-defined characters (EUDC), the system will stop working and a blue screen may appear at startup. This is not a common setting in non-Asian regions.

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016

Resolution: This issue was resolved in KB4493470.

Back to top
OS Build 14393.2879

March 19, 2019
KB4489889
Resolved
KB4493470
Resolved:
April 09, 2019 10:00 AM PT

Opened:
March 19, 2019 10:00 AM PT
" @@ -72,10 +72,10 @@ sections: - type: markdown text: " - - - - + + + +
DetailsAffected buildStatusHistory
Issue hosting multiple terminal server sessions and a user logs off on Windows Server
In some cases, Windows Server will stop working and restart when hosting multiple terminal server sessions and a user logs off. The faulting driver is win32kbase.sys.

Affected platforms:
  • Client: Windows 10 Enterprise LTSC 2016
  • Server: Windows Server 2016

Resolution: This issue is resolved in KB4489882.

Back to top
OS Build 14393.2828

February 19, 2019
KB4487006
Resolved
KB4489882
Resolved:
March 12, 2019 10:00 AM PT

Opened:
February 19, 2019 02:00 PM PT
Error 1309 when installing/uninstalling MSI or MSP files
After installing KB4487026, users may receive “Error 1309” while installing or uninstalling certain types of MSI and MSP files.

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 8.1
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2

Resolution: This issue is resolved in KB4489882.

Back to top
OS Build 14393.2791

February 12, 2019
KB4487026
Resolved
KB4489882
Resolved:
March 12, 2019 10:00 AM PT

Opened:
February 12, 2019 10:00 AM PT
Applications using Microsoft Jet database and Access 95 file format stop working
Applications that use a Microsoft Jet database with the Microsoft Access 95 file format may randomly stop working.

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 7, Service Pack 1
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2008 R2 SP1

Resolution: This issue is resolved in KB4487006.

Back to top
OS Build 14393.2791

February 12, 2019
KB4487026
Resolved
KB4487006
Resolved:
February 19, 2019 02:00 PM PT

Opened:
February 12, 2019 10:00 AM PT
Internet Explorer may fail to load images
After installing KB4487026, Internet Explorer may fail to load images with a backslash (\\) in their relative source path.

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 8.1; Windows 7, Service Pack 1
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2; Windows Server 2008 R2 SP1

Resolution: This issue is resolved in KB4487006.

Back to top
OS Build 14393.2791

February 12, 2019
KB4487026
Resolved
KB4487006
Resolved:
February 19, 2019 02:00 PM PT

Opened:
February 12, 2019 10:00 AM PT
Issue hosting multiple terminal server sessions and a user logs off on Windows Server
In some cases, Windows Server will stop working and restart when hosting multiple terminal server sessions and a user logs off. The faulting driver is win32kbase.sys.

Affected platforms:
  • Client: Windows 10 Enterprise LTSC 2016
  • Server: Windows Server 2016

Resolution: This issue is resolved in KB4489882.

Back to top
OS Build 14393.2828

February 19, 2019
KB4487006
Resolved
KB4489882
Resolved:
March 12, 2019 10:00 AM PT

Opened:
February 19, 2019 02:00 PM PT
Error 1309 when installing/uninstalling MSI or MSP files
After installing KB4487026, users may receive “Error 1309” while installing or uninstalling certain types of MSI and MSP files.

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 8.1
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2

Resolution: This issue is resolved in KB4489882.

Back to top
OS Build 14393.2791

February 12, 2019
KB4487026
Resolved
KB4489882
Resolved:
March 12, 2019 10:00 AM PT

Opened:
February 12, 2019 10:00 AM PT
Applications using Microsoft Jet database and Access 95 file format stop working
Applications that use a Microsoft Jet database with the Microsoft Access 95 file format may randomly stop working.

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 7, Service Pack 1
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2008 R2 SP1

Resolution: This issue is resolved in KB4487006.

Back to top
OS Build 14393.2791

February 12, 2019
KB4487026
Resolved
KB4487006
Resolved:
February 19, 2019 02:00 PM PT

Opened:
February 12, 2019 10:00 AM PT
Internet Explorer may fail to load images
After installing KB4487026, Internet Explorer may fail to load images with a backslash (\\) in their relative source path.

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 8.1; Windows 7, Service Pack 1
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2; Windows Server 2008 R2 SP1

Resolution: This issue is resolved in KB4487006.

Back to top
OS Build 14393.2791

February 12, 2019
KB4487026
Resolved
KB4487006
Resolved:
February 19, 2019 02:00 PM PT

Opened:
February 12, 2019 10:00 AM PT
" @@ -84,11 +84,11 @@ sections: - type: markdown text: " - - - - - + + + + +
DetailsAffected buildStatusHistory
Internet Explorer 11 authentication issue with multiple concurrent logons
After installing KB4480961, Internet Explorer 11 and other applications that use WININET.DLL may have authentication issues. This occurs when two or more people use the same user account for multiple, concurrent login sessions on the same Windows Server machine, including Remote Desktop Protocol (RDP) and Terminal Server logons. Symptoms reported by customers include, but may not be limited to:

  • Cache size and location show zero or empty.
  • Keyboard shortcuts may not work properly.
  • Webpages may intermittently fail to load or render correctly.
  • Issues with credential prompts.
  • Issues when downloading files.

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10 Enterprise LTSC 2016; Windows 8.1; Windows 7, Service Pack 1
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server 2016; Windows Server 2012 R2; Windows Server 2008 R2 SP1

Resolution: This issue was resolved in KB4493470.

Back to top
OS Build 14393.2724

January 08, 2019
KB4480961
Resolved
KB4493470
Resolved:
April 09, 2019 10:00 AM PT

Opened:
January 08, 2019 10:00 AM PT
MSXML6 may cause applications to stop responding
After installing KB4480961, MSXML6 causes applications to stop responding if an exception was thrown during node operations, such as appendChild(), insertBefore(), and moveNode().

The Group Policy editor may stop responding when editing a Group Policy Object (GPO) that contains Group Policy Preferences (GPP) for Internet Explorer 10 settings.

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 8.1
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2

Resolution: This issue was resolved in KB4493470.

Back to top
OS Build 14393.2724

January 08, 2019
KB4480961
Resolved
KB4493470
Resolved:
April 09, 2019 10:00 AM PT

Opened:
January 08, 2019 10:00 AM PT
First character of the Japanese era name not recognized as an abbreviation
After installing KB4480977, the first character of the Japanese era name is not recognized as an abbreviation and may cause date parsing issues.

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 8.1; Windows 7, Service Pack 1
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2; Windows Server 2008 R2 SP1

Resolution: This issue is resolved in KB4487006.

Back to top
OS Build 14393.2759

January 17, 2019
KB4480977
Resolved
KB4487006
Resolved:
February 19, 2019 02:00 PM PT

Opened:
January 17, 2019 02:00 PM PT
Applications using Microsoft Jet database fail to open
Applications that use a Microsoft Jet database with the Microsoft Access 97 file format may fail to open if the database has column names greater than 32 characters. The database will fail to open with the error, “Unrecognized Database Format”.

Affected platforms:
  • Client: Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 8.1; Windows 7, Service Pack 1 
  • Server: Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2; Windows Server 2008 R2 SP1 

Resolution: This issue is resolved in KB4487026.

Back to top
OS Build 14393.2724

January 08, 2019
KB4480961
Resolved
KB4487026
Resolved:
February 12, 2019 10:00 AM PT

Opened:
January 08, 2019 10:00 AM PT
Unable to access hotspots with third-party applications
After installing KB4480961, third-party applications may have difficulty authenticating hotspots.

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 8.1
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2

Resolution: This issue is resolved in KB4480977.

Back to top
OS Build 14393.2724

January 08, 2019
KB4480961
Resolved
KB4480977
Resolved:
January 17, 2019 02:00 PM PT

Opened:
January 08, 2019 10:00 AM PT
Internet Explorer 11 authentication issue with multiple concurrent logons
After installing KB4480961, Internet Explorer 11 and other applications that use WININET.DLL may have authentication issues. This occurs when two or more people use the same user account for multiple, concurrent login sessions on the same Windows Server machine, including Remote Desktop Protocol (RDP) and Terminal Server logons. Symptoms reported by customers include, but may not be limited to:

  • Cache size and location show zero or empty.
  • Keyboard shortcuts may not work properly.
  • Webpages may intermittently fail to load or render correctly.
  • Issues with credential prompts.
  • Issues when downloading files.

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10 Enterprise LTSC 2016; Windows 8.1; Windows 7, Service Pack 1
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server 2016; Windows Server 2012 R2; Windows Server 2008 R2 SP1

Resolution: This issue was resolved in KB4493470.

Back to top
OS Build 14393.2724

January 08, 2019
KB4480961
Resolved
KB4493470
Resolved:
April 09, 2019 10:00 AM PT

Opened:
January 08, 2019 10:00 AM PT
MSXML6 may cause applications to stop responding
After installing KB4480961, MSXML6 causes applications to stop responding if an exception was thrown during node operations, such as appendChild(), insertBefore(), and moveNode().

The Group Policy editor may stop responding when editing a Group Policy Object (GPO) that contains Group Policy Preferences (GPP) for Internet Explorer 10 settings.

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 8.1
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2

Resolution: This issue was resolved in KB4493470.

Back to top
OS Build 14393.2724

January 08, 2019
KB4480961
Resolved
KB4493470
Resolved:
April 09, 2019 10:00 AM PT

Opened:
January 08, 2019 10:00 AM PT
First character of the Japanese era name not recognized as an abbreviation
After installing KB4480977, the first character of the Japanese era name is not recognized as an abbreviation and may cause date parsing issues.

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 8.1; Windows 7, Service Pack 1
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2; Windows Server 2008 R2 SP1

Resolution: This issue is resolved in KB4487006.

Back to top
OS Build 14393.2759

January 17, 2019
KB4480977
Resolved
KB4487006
Resolved:
February 19, 2019 02:00 PM PT

Opened:
January 17, 2019 02:00 PM PT
Applications using Microsoft Jet database fail to open
Applications that use a Microsoft Jet database with the Microsoft Access 97 file format may fail to open if the database has column names greater than 32 characters. The database will fail to open with the error, “Unrecognized Database Format”.

Affected platforms:
  • Client: Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 8.1; Windows 7, Service Pack 1 
  • Server: Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2; Windows Server 2008 R2 SP1 

Resolution: This issue is resolved in KB4487026.

Back to top
OS Build 14393.2724

January 08, 2019
KB4480961
Resolved
KB4487026
Resolved:
February 12, 2019 10:00 AM PT

Opened:
January 08, 2019 10:00 AM PT
Unable to access hotspots with third-party applications
After installing KB4480961, third-party applications may have difficulty authenticating hotspots.

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 8.1
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2

Resolution: This issue is resolved in KB4480977.

Back to top
OS Build 14393.2724

January 08, 2019
KB4480961
Resolved
KB4480977
Resolved:
January 17, 2019 02:00 PM PT

Opened:
January 08, 2019 10:00 AM PT
" @@ -97,7 +97,7 @@ sections: - type: markdown text: " - +
DetailsAffected buildStatusHistory
Instant search in Microsoft Outlook fails on Windows Server 2016
After installing KB4467684 on Windows Server 2016, instant search in Microsoft Outlook clients fail with the error, \"Outlook cannot perform the search\".

Affected platforms:
  • Client: Windows 10 Enterprise LTSC 2016
  • Server: Windows Server 2016

Resolution: This issue is resolved in KB4487026.

Back to top
OS Build 14393.2639

November 27, 2018
KB4467684
Resolved
KB4487026
Resolved:
February 12, 2019 10:00 AM PT

Opened:
November 27, 2018 10:00 AM PT
Instant search in Microsoft Outlook fails on Windows Server 2016
After installing KB4467684 on Windows Server 2016, instant search in Microsoft Outlook clients fail with the error, \"Outlook cannot perform the search\".

Affected platforms:
  • Client: Windows 10 Enterprise LTSC 2016
  • Server: Windows Server 2016

Resolution: This issue is resolved in KB4487026.

Back to top
OS Build 14393.2639

November 27, 2018
KB4467684
Resolved
KB4487026
Resolved:
February 12, 2019 10:00 AM PT

Opened:
November 27, 2018 10:00 AM PT
System becomes unresponsive when end-user-defined characters (EUDC) are used
When features related to end-user-defined characters (EUDC) are used, the entire system may become unresponsive. 

Affected platforms:
  • Client: Windows 10 Enterprise LTSC 2016
  • Server: Windows Server 2016
 
Resolution: This issue is resolved in KB4471321

Back to top
OS Build 14393.2639

November 27, 2018
KB4467684
Resolved
KB4471321
Resolved:
December 11, 2018 10:00 AM PT

Opened:
November 27, 2018 10:00 AM PT
" @@ -107,7 +107,7 @@ sections: - type: markdown text: " - +
DetailsAffected buildStatusHistory
Unable to use Seek bar in Windows Media Player
After installing KB4462917, users may not be able to use the Seek Bar in Windows Media Player when playing specific files. This issue does not affect normal playback.

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 8.1; Windows 7, Service Pack 1
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2; Windows Server 2008 R2 SP1

Resolution: This issue is resolved in KB4471321.

Back to top
OS Build 14393.2551

October 09, 2018
KB4462917
Resolved
KB4471321
Resolved:
December 11, 2018 10:00 AM PT

Opened:
October 09, 2018 10:00 AM PT
Unable to use Seek bar in Windows Media Player
After installing KB4462917, users may not be able to use the Seek Bar in Windows Media Player when playing specific files. This issue does not affect normal playback.

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 8.1; Windows 7, Service Pack 1
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2; Windows Server 2008 R2 SP1

Resolution: This issue is resolved in KB4471321.

Back to top
OS Build 14393.2551

October 09, 2018
KB4462917
Resolved
KB4471321
Resolved:
December 11, 2018 10:00 AM PT

Opened:
October 09, 2018 10:00 AM PT
" @@ -116,7 +116,7 @@ sections: - type: markdown text: " - +
DetailsAffected buildStatusHistory
Promotions that create non-root domains fail with optional features enabled
After installing KB4457127, Windows Server 2016 promotions that create non-root domains fail in forests in which optional features like Active Directory recycle have been enabled. The error is, “The replication operation encountered a database error.”

Affected platforms:
  • Client: Windows 10 Enterprise LTSC 2016
  • Server: Windows Server 2016

Resolution: This issue is resolved in KB4467684.

Back to top
OS Build 14393.2515

September 20, 2018
KB4457127
Resolved
KB4467684
Resolved:
November 27, 2018 10:00 AM PT

Opened:
September 20, 2018 10:00 AM PT
Promotions that create non-root domains fail with optional features enabled
After installing KB4457127, Windows Server 2016 promotions that create non-root domains fail in forests in which optional features like Active Directory recycle have been enabled. The error is, “The replication operation encountered a database error.”

Affected platforms:
  • Client: Windows 10 Enterprise LTSC 2016
  • Server: Windows Server 2016

Resolution: This issue is resolved in KB4467684.

Back to top
OS Build 14393.2515

September 20, 2018
KB4457127
Resolved
KB4467684
Resolved:
November 27, 2018 10:00 AM PT

Opened:
September 20, 2018 10:00 AM PT
" @@ -125,7 +125,7 @@ sections: - type: markdown text: " - - + +
DetailsAffected buildStatusHistory
SqlConnection instantiation exception on .NET 4.6 and later
After you install the August Preview of Quality Rollup or September 11, 2018 .NET Framework update, instantiation of SqlConnection can throw an exception.

For more information about this issue, see the following article in the Microsoft Knowledge Base: 4470809, SqlConnection instantiation exception on .NET 4.6 and later after August-September 2018 .NET Framework updates.

Affected platforms:
  • Client: Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016
  • Server: Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016

Resolution: This issue is resolved in KB4480977.

Back to top
OS Build 14393.2457

August 30, 2018
KB4343884
Resolved
KB4480977
Resolved:
January 17, 2019 02:00 PM PT

Opened:
August 30, 2018 05:00 PM PT
Issues with install and activation of Key Management Service (KMS) (CSVLK) host keys
After installing KB4343884, installation and client activation of Windows Server 2019 and Windows 10 Enterprise 2019 LTSC Key Management Service (KMS) CSVLK host keys do not work as expected.

Affected platforms:
  • Client: Windows 10 Enterprise LTSC 2016
  • Server: Windows Server 2016

Resolution: This issue is resolved in KB4467684.

Back to top
OS Build 14393.2457

August 30, 2018
KB4343884
Resolved
KB4467684
Resolved:
November 27, 2018 10:00 AM PT

Opened:
August 30, 2018 05:00 PM PT
SqlConnection instantiation exception on .NET 4.6 and later
After you install the August Preview of Quality Rollup or September 11, 2018 .NET Framework update, instantiation of SqlConnection can throw an exception.

For more information about this issue, see the following article in the Microsoft Knowledge Base: 4470809, SqlConnection instantiation exception on .NET 4.6 and later after August-September 2018 .NET Framework updates.

Affected platforms:
  • Client: Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016
  • Server: Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016

Resolution: This issue is resolved in KB4480977.

Back to top
OS Build 14393.2457

August 30, 2018
KB4343884
Resolved
KB4480977
Resolved:
January 17, 2019 02:00 PM PT

Opened:
August 30, 2018 05:00 PM PT
Issues with install and activation of Key Management Service (KMS) (CSVLK) host keys
After installing KB4343884, installation and client activation of Windows Server 2019 and Windows 10 Enterprise 2019 LTSC Key Management Service (KMS) CSVLK host keys do not work as expected.

Affected platforms:
  • Client: Windows 10 Enterprise LTSC 2016
  • Server: Windows Server 2016

Resolution: This issue is resolved in KB4467684.

Back to top
OS Build 14393.2457

August 30, 2018
KB4343884
Resolved
KB4467684
Resolved:
November 27, 2018 10:00 AM PT

Opened:
August 30, 2018 05:00 PM PT
" diff --git a/windows/release-information/resolved-issues-windows-10-1703.yml b/windows/release-information/resolved-issues-windows-10-1703.yml index d8009fe5de..dd47c5ea38 100644 --- a/windows/release-information/resolved-issues-windows-10-1703.yml +++ b/windows/release-information/resolved-issues-windows-10-1703.yml @@ -30,7 +30,7 @@ sections: - title: Resolved issues - items: - type: markdown - text: " + text: "
@@ -60,7 +60,7 @@ sections: - type: markdown text: "
SummaryAffected buildStatusDate resolved
End-user-defined characters (EUDC) may cause blue screen at startup
If you enable per font end-user-defined characters (EUDC), the system may stop working and a blue screen may appear at startup.

See details >
OS Build 15063.1716

March 19, 2019
KB4489888
Resolved
KB4493474
April 09, 2019 10:00 AM PT
MSXML6 may cause applications to stop responding
MSXML6 may cause applications to stop responding if an exception was thrown during node operations, such as appendChild(), insertBefore(), and moveNode().

See details >
OS Build 15063.1563

January 08, 2019
KB4480973
Resolved
KB4493474
April 09, 2019 10:00 AM PT
- +
DetailsAffected buildStatusHistory
End-user-defined characters (EUDC) may cause blue screen at startup
If you enable per font end-user-defined characters (EUDC), the system may stop working and a blue screen may appear at startup. This is not a common setting in non-Asian regions.

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016

Resolution: This issue was resolved in KB4493474.

Back to top
OS Build 15063.1716

March 19, 2019
KB4489888
Resolved
KB4493474
Resolved:
April 09, 2019 10:00 AM PT

Opened:
March 19, 2019 10:00 AM PT
End-user-defined characters (EUDC) may cause blue screen at startup
If you enable per font end-user-defined characters (EUDC), the system may stop working and a blue screen may appear at startup. This is not a common setting in non-Asian regions.

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016

Resolution: This issue was resolved in KB4493474.

Back to top
OS Build 15063.1716

March 19, 2019
KB4489888
Resolved
KB4493474
Resolved:
April 09, 2019 10:00 AM PT

Opened:
March 19, 2019 10:00 AM PT
" @@ -69,9 +69,9 @@ sections: - type: markdown text: " - - - + + +
DetailsAffected buildStatusHistory
Error 1309 when installing/uninstalling MSI or MSP files
After installing KB4487011, users may receive “Error 1309” while installing or uninstalling certain types of MSI and MSP files.

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 8.1
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2

Resolution: This issue is resolved in KB4489871.

Back to top
OS Build 15063.1659

February 19, 2019
KB4487011
Resolved
KB4489871
Resolved:
March 12, 2019 10:00 AM PT

Opened:
February 19, 2019 02:00 PM PT
Internet Explorer may fail to load images
After installing KB4487020, Internet Explorer may fail to load images with a backslash (\\) in their relative source path.

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 8.1; Windows 7, Service Pack 1
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2; Windows Server 2008 R2 SP1

Resolution: This issue is resolved in KB4487011.

Back to top
OS Build 15063.1631

February 12, 2019
KB4487020
Resolved
KB4487011
Resolved:
February 19, 2019 02:00 PM PT

Opened:
February 12, 2019 10:00 AM PT
Applications using Microsoft Jet database and Access 95 file format stop working
Applications that use a Microsoft Jet database with the Microsoft Access 95 file format may randomly stop working.

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 7, Service Pack 1
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2008 R2 SP1

Resolution: This issue is resolved in KB4487011.

Back to top
OS Build 15063.1631

February 12, 2019
KB4487020
Resolved
KB4487011
Resolved:
February 19, 2019 02:00 PM PT

Opened:
February 12, 2019 10:00 AM PT
Error 1309 when installing/uninstalling MSI or MSP files
After installing KB4487011, users may receive “Error 1309” while installing or uninstalling certain types of MSI and MSP files.

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 8.1
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2

Resolution: This issue is resolved in KB4489871.

Back to top
OS Build 15063.1659

February 19, 2019
KB4487011
Resolved
KB4489871
Resolved:
March 12, 2019 10:00 AM PT

Opened:
February 19, 2019 02:00 PM PT
Internet Explorer may fail to load images
After installing KB4487020, Internet Explorer may fail to load images with a backslash (\\) in their relative source path.

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 8.1; Windows 7, Service Pack 1
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2; Windows Server 2008 R2 SP1

Resolution: This issue is resolved in KB4487011.

Back to top
OS Build 15063.1631

February 12, 2019
KB4487020
Resolved
KB4487011
Resolved:
February 19, 2019 02:00 PM PT

Opened:
February 12, 2019 10:00 AM PT
Applications using Microsoft Jet database and Access 95 file format stop working
Applications that use a Microsoft Jet database with the Microsoft Access 95 file format may randomly stop working.

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 7, Service Pack 1
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2008 R2 SP1

Resolution: This issue is resolved in KB4487011.

Back to top
OS Build 15063.1631

February 12, 2019
KB4487020
Resolved
KB4487011
Resolved:
February 19, 2019 02:00 PM PT

Opened:
February 12, 2019 10:00 AM PT
" @@ -80,11 +80,11 @@ sections: - type: markdown text: " - - - - - + + + + +
DetailsAffected buildStatusHistory
MSXML6 may cause applications to stop responding
After installing KB4480973, MSXML6 causes applications to stop responding if an exception was thrown during node operations, such as appendChild(), insertBefore(), and moveNode().

The Group Policy editor may stop responding when editing a Group Policy Object (GPO) that contains Group Policy Preferences (GPP) for Internet Explorer 10 settings.

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 8.1
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2

Resolution: This issue was resolved in KB4493474.

Back to top
OS Build 15063.1563

January 08, 2019
KB4480973
Resolved
KB4493474
Resolved:
April 09, 2019 10:00 AM PT

Opened:
January 08, 2019 10:00 AM PT
First character of the Japanese era name not recognized as an abbreviation
After installing KB4480959, the first character of the Japanese era name is not recognized as an abbreviation and may cause date parsing issues.

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 8.1; Windows 7, Service Pack 1
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2; Windows Server 2008 R2 SP1

Resolution: This issue is resolved in KB4487011.

Back to top
OS Build 15063.1596

January 15, 2019
KB4480959
Resolved
KB4487011
Resolved:
February 19, 2019 02:00 PM PT

Opened:
January 15, 2019 10:00 AM PT
Applications using Microsoft Jet database fail to open
Applications that use a Microsoft Jet database with the Microsoft Access 97 file format may fail to open if the database has column names greater than 32 characters. The database will fail to open with the error, “Unrecognized Database Format”.

Affected platforms:
  • Client: Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 8.1; Windows 7, Service Pack 1 
  • Server: Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2; Windows Server 2008 R2 SP1

Resolution: This issue is resolved in KB4487020.

Back to top
OS Build 15063.1563

January 08, 2019
KB4480973
Resolved
KB4487020
Resolved:
February 12, 2019 10:00 AM PT

Opened:
January 08, 2019 10:00 AM PT
Webpages become unresponsive in Microsoft Edge
After installing KB4480973, some Microsoft Edge users report that they:

• Cannot load webpages using a local IP address.
• Cannot load webpages on the Internet using a VPN connection.

Browsing fails or the webpage may become unresponsive.

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709

Resolution: This issue is resolved in KB4487020.

Back to top
OS Build 15063.1563

January 08, 2019
KB4480973
Resolved
KB4487020
Resolved:
February 12, 2019 10:00 AM PT

Opened:
January 08, 2019 10:00 AM PT
Unable to access hotspots with third-party applications
After installing KB4480973, third-party applications may have difficulty authenticating hotspots.

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 8.1
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2

Resolution: This issue is resolved in KB4480959.

Back to top
OS Build 15063.1563

January 08, 2019
KB4480973
Resolved
KB4480959
Resolved:
January 15, 2019 10:00 AM PT

Opened:
January 08, 2019 10:00 AM PT
MSXML6 may cause applications to stop responding
After installing KB4480973, MSXML6 causes applications to stop responding if an exception was thrown during node operations, such as appendChild(), insertBefore(), and moveNode().

The Group Policy editor may stop responding when editing a Group Policy Object (GPO) that contains Group Policy Preferences (GPP) for Internet Explorer 10 settings.

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 8.1
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2

Resolution: This issue was resolved in KB4493474.

Back to top
OS Build 15063.1563

January 08, 2019
KB4480973
Resolved
KB4493474
Resolved:
April 09, 2019 10:00 AM PT

Opened:
January 08, 2019 10:00 AM PT
First character of the Japanese era name not recognized as an abbreviation
After installing KB4480959, the first character of the Japanese era name is not recognized as an abbreviation and may cause date parsing issues.

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 8.1; Windows 7, Service Pack 1
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2; Windows Server 2008 R2 SP1

Resolution: This issue is resolved in KB4487011.

Back to top
OS Build 15063.1596

January 15, 2019
KB4480959
Resolved
KB4487011
Resolved:
February 19, 2019 02:00 PM PT

Opened:
January 15, 2019 10:00 AM PT
Applications using Microsoft Jet database fail to open
Applications that use a Microsoft Jet database with the Microsoft Access 97 file format may fail to open if the database has column names greater than 32 characters. The database will fail to open with the error, “Unrecognized Database Format”.

Affected platforms:
  • Client: Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 8.1; Windows 7, Service Pack 1 
  • Server: Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2; Windows Server 2008 R2 SP1

Resolution: This issue is resolved in KB4487020.

Back to top
OS Build 15063.1563

January 08, 2019
KB4480973
Resolved
KB4487020
Resolved:
February 12, 2019 10:00 AM PT

Opened:
January 08, 2019 10:00 AM PT
Webpages become unresponsive in Microsoft Edge
After installing KB4480973, some Microsoft Edge users report that they:

• Cannot load webpages using a local IP address.
• Cannot load webpages on the Internet using a VPN connection.

Browsing fails or the webpage may become unresponsive.

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709

Resolution: This issue is resolved in KB4487020.

Back to top
OS Build 15063.1563

January 08, 2019
KB4480973
Resolved
KB4487020
Resolved:
February 12, 2019 10:00 AM PT

Opened:
January 08, 2019 10:00 AM PT
Unable to access hotspots with third-party applications
After installing KB4480973, third-party applications may have difficulty authenticating hotspots.

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 8.1
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2

Resolution: This issue is resolved in KB4480959.

Back to top
OS Build 15063.1563

January 08, 2019
KB4480973
Resolved
KB4480959
Resolved:
January 15, 2019 10:00 AM PT

Opened:
January 08, 2019 10:00 AM PT
" @@ -93,9 +93,9 @@ sections: - type: markdown text: " - - - + + +
DetailsAffected buildStatusHistory
Unable to use Seek bar in Windows Media Player
After installing KB4462937, users may not be able to use the Seek Bar in Windows Media Player when playing specific files. This issue does not affect normal playback.

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 8.1; Windows 7, Service Pack 1
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2; Windows Server 2008 R2 SP1

Resolution: This issue is resolved in KB4471327.

Back to top
OS Build 15063.1387

October 09, 2018
KB4462937
Resolved
KB4471327
Resolved:
December 11, 2018 10:00 AM PT

Opened:
October 09, 2018 10:00 AM PT
LongonUI.exe stops working intermittently
After installing KB4462937, LogonUI.exe stops working intermittently.

Affected platforms:
  • Windows 10, version 1703

Resolution: This issue is resolved in KB4467699.

Back to top
OS Build 15063.1387

October 09, 2018
KB4462937
Resolved
KB4467699
Resolved:
November 27, 2018 10:00 AM PT

Opened:
October 09, 2018 10:00 AM PT
Error message beginning with “Hosted by…” when launching Microsoft Edge
After installing KB4462937, some users may see a dialog box with a non-applicable message beginning with the words “Hosted by...” when first starting Microsoft Edge.

This dialog will only appear once if they have turned on “Block only third-party cookies” in Microsoft Edge and applied certain language packs before installing this update.

Affected platforms:
  • Client: Windows 10, version 1709; Windows 10, version 1703
  • Server: Windows Server, version 1709

Resolution: This issue is resolved in KB4462939.

Back to top
OS Build 15063.1387

October 09, 2018
KB4462937
Resolved
KB4462939
Resolved:
October 18, 2018 10:00 AM PT

Opened:
October 09, 2018 10:00 AM PT
Unable to use Seek bar in Windows Media Player
After installing KB4462937, users may not be able to use the Seek Bar in Windows Media Player when playing specific files. This issue does not affect normal playback.

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 8.1; Windows 7, Service Pack 1
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2; Windows Server 2008 R2 SP1

Resolution: This issue is resolved in KB4471327.

Back to top
OS Build 15063.1387

October 09, 2018
KB4462937
Resolved
KB4471327
Resolved:
December 11, 2018 10:00 AM PT

Opened:
October 09, 2018 10:00 AM PT
LongonUI.exe stops working intermittently
After installing KB4462937, LogonUI.exe stops working intermittently.

Affected platforms:
  • Windows 10, version 1703

Resolution: This issue is resolved in KB4467699.

Back to top
OS Build 15063.1387

October 09, 2018
KB4462937
Resolved
KB4467699
Resolved:
November 27, 2018 10:00 AM PT

Opened:
October 09, 2018 10:00 AM PT
Error message beginning with “Hosted by…” when launching Microsoft Edge
After installing KB4462937, some users may see a dialog box with a non-applicable message beginning with the words “Hosted by...” when first starting Microsoft Edge.

This dialog will only appear once if they have turned on “Block only third-party cookies” in Microsoft Edge and applied certain language packs before installing this update.

Affected platforms:
  • Client: Windows 10, version 1709; Windows 10, version 1703
  • Server: Windows Server, version 1709

Resolution: This issue is resolved in KB4462939.

Back to top
OS Build 15063.1387

October 09, 2018
KB4462937
Resolved
KB4462939
Resolved:
October 18, 2018 10:00 AM PT

Opened:
October 09, 2018 10:00 AM PT
" @@ -104,6 +104,6 @@ sections: - type: markdown text: " - +
DetailsAffected buildStatusHistory
SqlConnection instantiation exception on .NET 4.6 and later
After you install the August Preview of Quality Rollup or September 11, 2018 .NET Framework update, instantiation of SqlConnection can throw an exception.

For more information about this issue, see the following article in the Microsoft Knowledge Base:
4470809 SqlConnection instantiation exception on .NET 4.6 and later after August-September 2018 .NET Framework updates.

Affected platforms:
  • Client: Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016
  • Server: Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016

Resolution: This issue is resolved in KB4480959.

Back to top
OS Build 15063.1292

August 30, 2018
KB4343889
Resolved
KB4480959
Resolved:
January 15, 2019 10:00 AM PT

Opened:
August 30, 2018 05:00 PM PT
SqlConnection instantiation exception on .NET 4.6 and later
After you install the August Preview of Quality Rollup or September 11, 2018 .NET Framework update, instantiation of SqlConnection can throw an exception.

For more information about this issue, see the following article in the Microsoft Knowledge Base:
4470809 SqlConnection instantiation exception on .NET 4.6 and later after August-September 2018 .NET Framework updates.

Affected platforms:
  • Client: Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016
  • Server: Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016

Resolution: This issue is resolved in KB4480959.

Back to top
OS Build 15063.1292

August 30, 2018
KB4343889
Resolved
KB4480959
Resolved:
January 15, 2019 10:00 AM PT

Opened:
August 30, 2018 05:00 PM PT
" diff --git a/windows/release-information/resolved-issues-windows-10-1709.yml b/windows/release-information/resolved-issues-windows-10-1709.yml index 3c1728302f..fd898e2a84 100644 --- a/windows/release-information/resolved-issues-windows-10-1709.yml +++ b/windows/release-information/resolved-issues-windows-10-1709.yml @@ -30,7 +30,7 @@ sections: - title: Resolved issues - items: - type: markdown - text: " + text: "
@@ -60,8 +60,8 @@ sections: - type: markdown text: "
SummaryAffected buildStatusDate resolved
End-user-defined characters (EUDC) may cause blue screen at startup
If you enable per font end-user-defined characters (EUDC), the system may stop working and a blue screen may appear at startup.

See details >
OS Build 16299.1059

March 19, 2019
KB4489890
Resolved
KB4493441
April 09, 2019 10:00 AM PT
MSXML6 causes applications to stop responding if an exception was thrown
MSXML6 causes applications to stop responding if an exception was thrown during node operations, such as appendChild(), insertBefore(), and moveNode().

See details >
OS Build 16299.904

January 08, 2019
KB4480978
Resolved
KB4493441
April 09, 2019 10:00 AM PT
- - + +
DetailsAffected buildStatusHistory
End-user-defined characters (EUDC) may cause blue screen at startup
If you enable per font end-user-defined characters (EUDC), the system may stop working and a blue screen may appear at startup. This is not a common setting in non-Asian regions.

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016

Resolution: This issue is resolved in KB4493441.

Back to top
OS Build 16299.1059

March 19, 2019
KB4489890
Resolved
KB4493441
Resolved:
April 09, 2019 10:00 AM PT

Opened:
March 19, 2019 10:00 AM PT
Stop error when attempting to start SSH from WSL
After applying KB4489886, a stop error occurs when attempting to start the Secure Shell (SSH) client program from Windows Subsystem for Linux (WSL) with agent forwarding enabled using a command line switch (ssh –A) or a configuration setting.

Affected platforms:
  • Client: Windows 10, version 1803; Windows 10, version 1709
  • Server: Windows Server, version 1803; Windows Server, version 1709

Resolution: This issue is resolved in KB4493441.

Back to top
OS Build 16299.1029

March 12, 2019
KB4489886
Resolved
KB4493441
Resolved:
April 09, 2019 10:00 AM PT

Opened:
March 12, 2019 10:00 AM PT
End-user-defined characters (EUDC) may cause blue screen at startup
If you enable per font end-user-defined characters (EUDC), the system may stop working and a blue screen may appear at startup. This is not a common setting in non-Asian regions.

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016

Resolution: This issue is resolved in KB4493441.

Back to top
OS Build 16299.1059

March 19, 2019
KB4489890
Resolved
KB4493441
Resolved:
April 09, 2019 10:00 AM PT

Opened:
March 19, 2019 10:00 AM PT
Stop error when attempting to start SSH from WSL
After applying KB4489886, a stop error occurs when attempting to start the Secure Shell (SSH) client program from Windows Subsystem for Linux (WSL) with agent forwarding enabled using a command line switch (ssh –A) or a configuration setting.

Affected platforms:
  • Client: Windows 10, version 1803; Windows 10, version 1709
  • Server: Windows Server, version 1803; Windows Server, version 1709

Resolution: This issue is resolved in KB4493441.

Back to top
OS Build 16299.1029

March 12, 2019
KB4489886
Resolved
KB4493441
Resolved:
April 09, 2019 10:00 AM PT

Opened:
March 12, 2019 10:00 AM PT
" @@ -70,9 +70,9 @@ sections: - type: markdown text: " - - - + + +
DetailsAffected buildStatusHistory
Error 1309 when installing/uninstalling MSI or MSP files
After installing KB4486996, users may receive “Error 1309” while installing or uninstalling certain types of MSI and MSP files.

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 8.1
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2

Resolution: This issue is resolved in KB4489886.

Back to top
OS Build 16299.967

February 12, 2019
KB4486996
Resolved
KB4489886
Resolved:
March 12, 2019 10:00 AM PT

Opened:
February 12, 2019 10:00 AM PT
Applications using Microsoft Jet database and Access 95 file format stop working
Applications that use a Microsoft Jet database with the Microsoft Access 95 file format may randomly stop working.

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 7, Service Pack 1
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2008 R2 SP1

Resolution: This issue is resolved in KB4487021.

Back to top
OS Build 16299.967

February 12, 2019
KB4486996
Resolved
KB4487021
Resolved:
February 19, 2019 02:00 PM PT

Opened:
February 12, 2019 10:00 AM PT
Internet Explorer may fail to load images
After installing KB4486996, Internet Explorer may fail to load images with a backslash (\\) in their relative source path.

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 8.1; Windows 7, Service Pack 1
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2; Windows Server 2008 R2 SP1

Resolution: This issue is resolved in KB4487021.

Back to top
OS Build 16299.967

February 12, 2019
KB4486996
Resolved
KB4487021
Resolved:
February 19, 2019 02:00 PM PT

Opened:
February 12, 2019 10:00 AM PT
Error 1309 when installing/uninstalling MSI or MSP files
After installing KB4486996, users may receive “Error 1309” while installing or uninstalling certain types of MSI and MSP files.

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 8.1
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2

Resolution: This issue is resolved in KB4489886.

Back to top
OS Build 16299.967

February 12, 2019
KB4486996
Resolved
KB4489886
Resolved:
March 12, 2019 10:00 AM PT

Opened:
February 12, 2019 10:00 AM PT
Applications using Microsoft Jet database and Access 95 file format stop working
Applications that use a Microsoft Jet database with the Microsoft Access 95 file format may randomly stop working.

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 7, Service Pack 1
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2008 R2 SP1

Resolution: This issue is resolved in KB4487021.

Back to top
OS Build 16299.967

February 12, 2019
KB4486996
Resolved
KB4487021
Resolved:
February 19, 2019 02:00 PM PT

Opened:
February 12, 2019 10:00 AM PT
Internet Explorer may fail to load images
After installing KB4486996, Internet Explorer may fail to load images with a backslash (\\) in their relative source path.

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 8.1; Windows 7, Service Pack 1
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2; Windows Server 2008 R2 SP1

Resolution: This issue is resolved in KB4487021.

Back to top
OS Build 16299.967

February 12, 2019
KB4486996
Resolved
KB4487021
Resolved:
February 19, 2019 02:00 PM PT

Opened:
February 12, 2019 10:00 AM PT
" @@ -81,11 +81,11 @@ sections: - type: markdown text: " - - - - - + + + + +
DetailsAffected buildStatusHistory
MSXML6 causes applications to stop responding if an exception was thrown
After installing KB4480978, MSXML6 causes applications to stop responding if an exception was thrown during node operations, such as appendChild(), insertBefore(), and moveNode().

The Group Policy editor may stop responding when editing a Group Policy Object (GPO) that contains Group Policy Preferences (GPP) for Internet Explorer 10 settings.

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 8.1
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2

Resolution: This issue is resolved in KB4493441.

Back to top
OS Build 16299.904

January 08, 2019
KB4480978
Resolved
KB4493441
Resolved:
April 09, 2019 10:00 AM PT

Opened:
January 08, 2019 10:00 AM PT
First character of the Japanese era name not recognized as an abbreviation
After installing KB4480967, the first character of the Japanese era name is not recognized as an abbreviation and may cause date parsing issues.

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 8.1; Windows 7, Service Pack 1
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2; Windows Server 2008 R2 SP1

Resolution: This issue is resolved in KB4487021.

Back to top
OS Build 16299.936

January 15, 2019
KB4480967
Resolved
KB4487021
Resolved:
February 19, 2019 02:00 PM PT

Opened:
January 15, 2019 10:00 AM PT
Applications using Microsoft Jet database fail to open
Applications that use a Microsoft Jet database with the Microsoft Access 97 file format may fail to open if the database has column names greater than 32 characters. The database will fail to open with the error, “Unrecognized Database Format.”

Affected platforms:
  • Client: Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 8.1; Windows 7, Service Pack 1 
  • Server: Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2; Windows Server 2008 R2 SP1 

Resolution: This issue is resolved in KB4486996.

Back to top
OS Build 16299.904

January 08, 2019
KB4480978
Resolved
KB4486996
Resolved:
February 12, 2019 10:00 AM PT

Opened:
January 08, 2019 10:00 AM PT
Webpages become unresponsive in Microsoft Edge
After installing KB4480978, some Microsoft Edge users report that they:

• Cannot load webpages using a local IP address.
• Cannot load webpages on the Internet using a VPN connection.

Browsing fails or the webpage may become unresponsive.

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709

Resolution: This issue is resolved in KB4486996.

Back to top
OS Build 16299.904

January 08, 2019
KB4480978
Resolved
KB4486996
Resolved:
February 12, 2019 10:00 AM PT

Opened:
January 08, 2019 10:00 AM PT
Unable to access hotspots with third-party applications
After installing KB4480978, third-party applications may have difficulty authenticating hotspots.

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 8.1
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2

Resolution: This issue is resolved in KB4480967.

Back to top
OS Build 16299.904

January 08, 2019
KB4480978
Resolved
KB4480967
Resolved:
January 15, 2019 10:00 AM PT

Opened:
January 08, 2019 10:00 AM PT
MSXML6 causes applications to stop responding if an exception was thrown
After installing KB4480978, MSXML6 causes applications to stop responding if an exception was thrown during node operations, such as appendChild(), insertBefore(), and moveNode().

The Group Policy editor may stop responding when editing a Group Policy Object (GPO) that contains Group Policy Preferences (GPP) for Internet Explorer 10 settings.

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 8.1
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2

Resolution: This issue is resolved in KB4493441.

Back to top
OS Build 16299.904

January 08, 2019
KB4480978
Resolved
KB4493441
Resolved:
April 09, 2019 10:00 AM PT

Opened:
January 08, 2019 10:00 AM PT
First character of the Japanese era name not recognized as an abbreviation
After installing KB4480967, the first character of the Japanese era name is not recognized as an abbreviation and may cause date parsing issues.

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 8.1; Windows 7, Service Pack 1
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2; Windows Server 2008 R2 SP1

Resolution: This issue is resolved in KB4487021.

Back to top
OS Build 16299.936

January 15, 2019
KB4480967
Resolved
KB4487021
Resolved:
February 19, 2019 02:00 PM PT

Opened:
January 15, 2019 10:00 AM PT
Applications using Microsoft Jet database fail to open
Applications that use a Microsoft Jet database with the Microsoft Access 97 file format may fail to open if the database has column names greater than 32 characters. The database will fail to open with the error, “Unrecognized Database Format.”

Affected platforms:
  • Client: Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 8.1; Windows 7, Service Pack 1 
  • Server: Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2; Windows Server 2008 R2 SP1 

Resolution: This issue is resolved in KB4486996.

Back to top
OS Build 16299.904

January 08, 2019
KB4480978
Resolved
KB4486996
Resolved:
February 12, 2019 10:00 AM PT

Opened:
January 08, 2019 10:00 AM PT
Webpages become unresponsive in Microsoft Edge
After installing KB4480978, some Microsoft Edge users report that they:

• Cannot load webpages using a local IP address.
• Cannot load webpages on the Internet using a VPN connection.

Browsing fails or the webpage may become unresponsive.

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709

Resolution: This issue is resolved in KB4486996.

Back to top
OS Build 16299.904

January 08, 2019
KB4480978
Resolved
KB4486996
Resolved:
February 12, 2019 10:00 AM PT

Opened:
January 08, 2019 10:00 AM PT
Unable to access hotspots with third-party applications
After installing KB4480978, third-party applications may have difficulty authenticating hotspots.

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 8.1
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2

Resolution: This issue is resolved in KB4480967.

Back to top
OS Build 16299.904

January 08, 2019
KB4480978
Resolved
KB4480967
Resolved:
January 15, 2019 10:00 AM PT

Opened:
January 08, 2019 10:00 AM PT
" @@ -94,8 +94,8 @@ sections: - type: markdown text: " - - + +
DetailsAffected buildStatusHistory
Unable to use Seek bar in Windows Media Player
After installing KB4462918, users may not be able to use the Seek Bar in Windows Media Player when playing specific files. This issue does not affect normal playback.

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 8.1; Windows 7, Service Pack 1
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2; Windows Server 2008 R2 SP1

Resolution: This issue is resolved in KB4471329.

Back to top
OS Build 16299.726

October 09, 2018
KB4462918
Resolved
KB4471329
Resolved:
December 11, 2018 10:00 AM PT

Opened:
October 09, 2018 10:00 AM PT
Error message beginning with “Hosted by…” when launching Microsoft Edge
After installing KB4462918, some users may see a dialog box with a non-applicable message beginning with the words “Hosted by...” when first starting Microsoft Edge.

This dialog will only appear once if they have turned on “Block only third-party cookies” in Microsoft Edge and applied certain language packs before installing this update.

Affected platforms:
  • Client: Windows 10, version 1709; Windows 10, version 1703
  • Server: Windows Server, version 1709

Resolution: This issue is resolved in KB4462932.

Back to top
OS Build 16299.726

October 09, 2018
KB4462918
Resolved
KB4462932
Resolved:
October 18, 2018 10:00 AM PT

Opened:
October 09, 2018 10:00 AM PT
Unable to use Seek bar in Windows Media Player
After installing KB4462918, users may not be able to use the Seek Bar in Windows Media Player when playing specific files. This issue does not affect normal playback.

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 8.1; Windows 7, Service Pack 1
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2; Windows Server 2008 R2 SP1

Resolution: This issue is resolved in KB4471329.

Back to top
OS Build 16299.726

October 09, 2018
KB4462918
Resolved
KB4471329
Resolved:
December 11, 2018 10:00 AM PT

Opened:
October 09, 2018 10:00 AM PT
Error message beginning with “Hosted by…” when launching Microsoft Edge
After installing KB4462918, some users may see a dialog box with a non-applicable message beginning with the words “Hosted by...” when first starting Microsoft Edge.

This dialog will only appear once if they have turned on “Block only third-party cookies” in Microsoft Edge and applied certain language packs before installing this update.

Affected platforms:
  • Client: Windows 10, version 1709; Windows 10, version 1703
  • Server: Windows Server, version 1709

Resolution: This issue is resolved in KB4462932.

Back to top
OS Build 16299.726

October 09, 2018
KB4462918
Resolved
KB4462932
Resolved:
October 18, 2018 10:00 AM PT

Opened:
October 09, 2018 10:00 AM PT
" @@ -104,6 +104,6 @@ sections: - type: markdown text: " - +
DetailsAffected buildStatusHistory
SqlConnection instantiation exception on .NET 4.6 and later
After you install the August Preview of Quality Rollup or September 11, 2018 .NET Framework update, instantiation of SqlConnection can throw an exception.

For more information about this issue, see the following article in the Microsoft Knowledge Base:
4470809 SqlConnection instantiation exception on .NET 4.6 and later after August-September 2018 .NET Framework updates.

Affected platforms:
  • Client: Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016
  • Server: Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016

Resolution: This issue is resolved in KB4480967.

Back to top
OS Build 16299.637

August 30, 2018
KB4343893
Resolved
KB4480967
Resolved:
January 15, 2019 10:00 AM PT

Opened:
August 30, 2018 05:00 PM PT
SqlConnection instantiation exception on .NET 4.6 and later
After you install the August Preview of Quality Rollup or September 11, 2018 .NET Framework update, instantiation of SqlConnection can throw an exception.

For more information about this issue, see the following article in the Microsoft Knowledge Base:
4470809 SqlConnection instantiation exception on .NET 4.6 and later after August-September 2018 .NET Framework updates.

Affected platforms:
  • Client: Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016
  • Server: Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016

Resolution: This issue is resolved in KB4480967.

Back to top
OS Build 16299.637

August 30, 2018
KB4343893
Resolved
KB4480967
Resolved:
January 15, 2019 10:00 AM PT

Opened:
August 30, 2018 05:00 PM PT
" diff --git a/windows/release-information/resolved-issues-windows-10-1803.yml b/windows/release-information/resolved-issues-windows-10-1803.yml index 7dca69d3a4..5750bfe1d8 100644 --- a/windows/release-information/resolved-issues-windows-10-1803.yml +++ b/windows/release-information/resolved-issues-windows-10-1803.yml @@ -30,7 +30,7 @@ sections: - title: Resolved issues - items: - type: markdown - text: " + text: "
@@ -86,7 +86,7 @@ sections: text: "
SummaryAffected buildStatusDate resolved
End-user-defined characters (EUDC) may cause blue screen at startup
If you enable per font end-user-defined characters (EUDC), the system may stop working and a blue screen may appear at startup.

See details >
OS Build 17134.677

March 19, 2019
KB4489894
Resolved
KB4493464
April 09, 2019 10:00 AM PT
MSXML6 may cause applications to stop responding
MSXML6 may cause applications to stop responding if an exception was thrown during node operations, such as appendChild(), insertBefore(), and moveNode().

See details >
OS Build 17134.523

January 08, 2019
KB4480966
Resolved
KB4493464
April 09, 2019 10:00 AM PT
- + @@ -127,7 +127,7 @@ sections: - type: markdown text: "
DetailsAffected buildStatusHistory
MSXML6 may cause applications to stop responding
After installing KB4480966, MSXML6 causes applications to stop responding if an exception was thrown during node operations, such as appendChild(), insertBefore(), and moveNode().

The Group Policy editor may stop responding when editing a Group Policy Object (GPO) that contains Group Policy Preferences (GPP) for Internet Explorer 10 settings.

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 8.1
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2

Resolution: This issue was resolved in KB4493464

Back to top
OS Build 17134.523

January 08, 2019
KB4480966
Resolved
KB4493464
Resolved:
April 09, 2019 10:00 AM PT

Opened:
January 08, 2019 10:00 AM PT
First character of Japanese era name not recognized
After installing KB4480976, the first character of the Japanese era name is not recognized as an abbreviation and may cause date parsing issues.

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 8.1; Windows 7, Service Pack 1
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2; Windows Server 2008 R2 SP1

Resolution: This issue is resolved in KB4487029

Back to top
OS Build 17134.556

January 15, 2019
KB4480976
Resolved
KB4487029
Resolved:
February 19, 2019 02:00 PM PT

Opened:
January 15, 2019 10:00 AM PT
First character of Japanese era name not recognized
After installing KB4480976, the first character of the Japanese era name is not recognized as an abbreviation and may cause date parsing issues.

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 8.1; Windows 7, Service Pack 1
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2; Windows Server 2008 R2 SP1

Resolution: This issue is resolved in KB4487029

Back to top
OS Build 17134.556

January 15, 2019
KB4480976
Resolved
KB4487029
Resolved:
February 19, 2019 02:00 PM PT

Opened:
January 15, 2019 10:00 AM PT
Applications using Microsoft Jet database and Access 95 file format stop working
Applications that use a Microsoft Jet database with the Microsoft Access 95 file format may randomly stop working. 

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 7, Service Pack 1
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2008 R2 SP1

Resolution: This issue is resolved in KB4487017.

Back to top
OS Build 17134.523

January 08, 2019
KB4480966
Resolved
KB4487017
Resolved:
February 12, 2019 10:00 AM PT

Opened:
January 08, 2019 10:00 AM PT
Webpages become unresponsive in Microsoft Edge
After installing KB4480966, some Microsoft Edge users report that they: 

  • Cannot load webpages using a local IP address. 
  • Cannot load webpages on the Internet using a VPN connection. 
 
Browsing fails or the webpage may become unresponsive. 

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709

Resolution: This issue is resolved in KB4487017

Back to top
OS Build 17134.523

January 08, 2019
KB4480966
Resolved
KB4487017
Resolved:
February 12, 2019 10:00 AM PT

Opened:
January 08, 2019 10:00 AM PT
Unable to access hotspots with third-party applications
After installing KB4480966, third-party applications may have difficulty authenticating hotspots.

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 8.1
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2

Resolution: This issue is resolved in KB4480976

Back to top
OS Build 17134.523

January 08, 2019
KB4480966
Resolved
KB4480976
Resolved:
January 15, 2019 10:00 AM PT

Opened:
January 08, 2019 10:00 AM PT
- +
DetailsAffected buildStatusHistory
SqlConnection instantiation exception on .NET 4.6 and later
After you install the August Preview of Quality Rollup or September 11, 2018 .NET Framework update, instantiation of SqlConnection can throw an exception.  

For more information about this issue, see the following article in the Microsoft Knowledge Base: 4470809, SqlConnection instantiation exception on .NET 4.6 and later after August-September 2018 .NET Framework updates.

Affected platforms:
  • Client: Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016
  • Server: Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016

Resolution: This issue is resolved in KB4480976

Back to top
OS Build 17134.285

September 11, 2018
KB4457128
Resolved
KB4480976
Resolved:
January 15, 2019 10:00 AM PT

Opened:
September 11, 2018 10:00 AM PT
SqlConnection instantiation exception on .NET 4.6 and later
After you install the August Preview of Quality Rollup or September 11, 2018 .NET Framework update, instantiation of SqlConnection can throw an exception.  

For more information about this issue, see the following article in the Microsoft Knowledge Base: 4470809, SqlConnection instantiation exception on .NET 4.6 and later after August-September 2018 .NET Framework updates.

Affected platforms:
  • Client: Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016
  • Server: Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016

Resolution: This issue is resolved in KB4480976

Back to top
OS Build 17134.285

September 11, 2018
KB4457128
Resolved
KB4480976
Resolved:
January 15, 2019 10:00 AM PT

Opened:
September 11, 2018 10:00 AM PT
Users cannot set Win32 program defaults
After installing KB4458469, some users cannot set Win32 program defaults for certain app and file type combinations using the Open with... command or Settings > Apps > Default apps
 
In some cases, Microsoft Notepad or other Win32 programs cannot be set as the default.

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803

Resolution: This issue is resolved in KB4467682

Back to top
OS Build 17134.320

September 26, 2018
KB4458469
Resolved
KB4467682
Resolved:
November 27, 2018 10:00 AM PT

Opened:
September 26, 2018 02:00 PM PT
Guest VMs running Unicast NLB fail to respond after restart
All guest virtual machines running Unicast NLB fail to respond to NLB requests after the virtual machines restart. 

Affected platforms:
  • Client: Windows 10, version 1803; Windows 10, version 1507
  • Server: Windows Server, version 1803
 
Resolution: This issue is resolved in KB4458469

Back to top
OS Build 17134.285

September 11, 2018
KB4457128
Resolved
KB4458469
Resolved:
September 20, 2018 10:00 AM PT

Opened:
September 11, 2018 10:00 AM PT
@@ -138,6 +138,6 @@ sections: - type: markdown text: " - +
DetailsAffected buildStatusHistory
Microsoft Intune takes a long time to deliver user profiles
After installing KB4457128, Windows no longer recognizes the Personal Information exchange (PFX) certificate that's used for authenticating to a Wi-Fi or VPN connection. As a result, Microsoft Intune takes a long time to deliver user profiles because it doesn't recognize that the required certificate is on the device. 

Affected platforms:
  • Client: Windows 10, version 1803
  • Server: Windows Server, version 1803
 
Resolution: This issue is resolved in KB4464218

Back to top
OS Build 17134.191

July 24, 2018
KB4340917
Resolved
KB4464218
Resolved:
September 17, 2018 10:00 AM PT

Opened:
July 24, 2018 10:00 AM PT
Microsoft Intune takes a long time to deliver user profiles
After installing KB4457128, Windows no longer recognizes the Personal Information exchange (PFX) certificate that's used for authenticating to a Wi-Fi or VPN connection. As a result, Microsoft Intune takes a long time to deliver user profiles because it doesn't recognize that the required certificate is on the device. 

Affected platforms:
  • Client: Windows 10, version 1803
  • Server: Windows Server, version 1803
 
Resolution: This issue is resolved in KB4464218

Back to top
OS Build 17134.191

July 24, 2018
KB4340917
Resolved
KB4464218
Resolved:
September 17, 2018 10:00 AM PT

Opened:
July 24, 2018 10:00 AM PT
" diff --git a/windows/release-information/resolved-issues-windows-10-1809-and-windows-server-2019.yml b/windows/release-information/resolved-issues-windows-10-1809-and-windows-server-2019.yml index 777084433a..442e7b9e44 100644 --- a/windows/release-information/resolved-issues-windows-10-1809-and-windows-server-2019.yml +++ b/windows/release-information/resolved-issues-windows-10-1809-and-windows-server-2019.yml @@ -30,7 +30,7 @@ sections: - title: Resolved issues - items: - type: markdown - text: " + text: "
@@ -69,7 +69,7 @@ sections: - type: markdown text: "
SummaryAffected buildStatusDate resolved
End-user-defined characters (EUDC) may cause blue screen at startup
If you enable per font end-user-defined characters (EUDC), the system may stop working and a blue screen may appear at startup.

See details >
OS Build 17763.404

April 02, 2019
KB4490481
Resolved
KB4493509
April 09, 2019 10:00 AM PT
Internet Explorer 11 authentication issue with multiple concurrent logons
Internet Explorer 11 users may encounter issues if two or more people use the same user account for multiple, concurrent login sessions on the same Windows Server machine.

See details >
OS Build 17763.253

January 08, 2019
KB4480116
Resolved
KB4493509
April 09, 2019 10:00 AM PT
- +
DetailsAffected buildStatusHistory
End-user-defined characters (EUDC) may cause blue screen at startup
If you enable per font end-user-defined characters (EUDC), the system will stop working and a blue screen may appear at startup. This is not a common setting in non-Asian regions.

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016

Workaround: To avoid this issue, don't enable per font EUDC. As an alternative, you can edit the registry to mitigate this issue; for more information, see KB4496149.

Resolved: This issue was resolved in KB4493509.

Back to top
OS Build 17763.404

April 02, 2019
KB4490481
Resolved
KB4493509
Resolved:
April 09, 2019 10:00 AM PT

Opened:
April 02, 2019 10:00 AM PT
End-user-defined characters (EUDC) may cause blue screen at startup
If you enable per font end-user-defined characters (EUDC), the system will stop working and a blue screen may appear at startup. This is not a common setting in non-Asian regions.

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016

Workaround: To avoid this issue, don't enable per font EUDC. As an alternative, you can edit the registry to mitigate this issue; for more information, see KB4496149.

Resolved: This issue was resolved in KB4493509.

Back to top
OS Build 17763.404

April 02, 2019
KB4490481
Resolved
KB4493509
Resolved:
April 09, 2019 10:00 AM PT

Opened:
April 02, 2019 10:00 AM PT
" @@ -78,7 +78,7 @@ sections: - type: markdown text: " - +
DetailsAffected buildStatusHistory
Apps may stop working after selecting an audio output device other than the default
After installing KB4482887 on machines that have multiple audio devices, applications that provide advanced options for internal or external audio output devices may stop working unexpectedly. This issue occurs for users that select an audio output device different from the \"Default Audio Device\". Examples of applications that may stop working include: 

  • Windows Media Player 
  • Realtek HD Audio Manager 
  • Sound Blaster Control Panel 

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019
  • Server: Windows Server, version 1809; Windows Server 2019

Workaround: As a temporary solution, select the \"Default Audio Device\" in the options provided by the application; please refer to the application's user manual for details. 
For example, to set the Default Audio Device in Windows Media Player: 

  1. Open Windows Media Player > Tools > Options > Devices.
  2. Select the device and choose Properties.
  3. On the next dialog, from the drop-down menu under Select the Audio Device, choose Default Audio Device from the list.
 
You can then send audio from the application to the audio device you want in the per-application audio settings found under Settings > System > Sound > App Volume and device preferences.

Resolved: This issue was resolved in KB4490481

Back to top
OS Build 17763.348

March 01, 2019
KB4482887
Resolved
KB4490481
Resolved:
April 02, 2019 10:00 AM PT

Opened:
March 01, 2019 10:00 AM PT
Apps may stop working after selecting an audio output device other than the default
After installing KB4482887 on machines that have multiple audio devices, applications that provide advanced options for internal or external audio output devices may stop working unexpectedly. This issue occurs for users that select an audio output device different from the \"Default Audio Device\". Examples of applications that may stop working include: 

  • Windows Media Player 
  • Realtek HD Audio Manager 
  • Sound Blaster Control Panel 

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019
  • Server: Windows Server, version 1809; Windows Server 2019

Workaround: As a temporary solution, select the \"Default Audio Device\" in the options provided by the application; please refer to the application's user manual for details. 
For example, to set the Default Audio Device in Windows Media Player: 

  1. Open Windows Media Player > Tools > Options > Devices.
  2. Select the device and choose Properties.
  3. On the next dialog, from the drop-down menu under Select the Audio Device, choose Default Audio Device from the list.
 
You can then send audio from the application to the audio device you want in the per-application audio settings found under Settings > System > Sound > App Volume and device preferences.

Resolved: This issue was resolved in KB4490481

Back to top
OS Build 17763.348

March 01, 2019
KB4482887
Resolved
KB4490481
Resolved:
April 02, 2019 10:00 AM PT

Opened:
March 01, 2019 10:00 AM PT
" @@ -87,10 +87,10 @@ sections: - type: markdown text: " - - - - + + + +
DetailsAffected buildStatusHistory
Error 1309 when installing/uninstalling MSI or MSP files
After installing KB4487044, users may receive \"Error 1309\" while installing or uninstalling certain types of MSI and MSP files. 

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 8.1
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2

Resolution: This issue is resolved in KB4489899

Back to top
OS Build 17763.316

February 12, 2019
KB4487044
Resolved
KB4489899
Resolved:
March 12, 2019 10:00 AM PT

Opened:
February 12, 2019 10:00 AM PT
Internet Explorer may fail to load images
After installing KB4487044, Internet Explorer may fail to load images with a backslash (\\) in their relative source path.

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 8.1; Windows 7, Service Pack 1
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2; Windows Server 2008 R2 SP1

Resolution: This issue is resolved in KB4482887.

Back to top
OS Build 17763.316

February 12, 2019
KB4487044
Resolved
KB4482887
Resolved:
March 01, 2019 10:00 AM PT

Opened:
February 12, 2019 10:00 AM PT
Applications using Microsoft Jet database and Access 95 file format stop working
Applications that use a Microsoft Jet database with the Microsoft Access 95 file format may randomly stop working.

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 7, Service Pack 1
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2008 R2 SP1

Resolution: This issue is resolved in KB4482887.

Back to top
OS Build 17763.316

February 12, 2019
KB4487044
Resolved
KB4482887
Resolved:
March 01, 2019 10:00 AM PT

Opened:
February 12, 2019 10:00 AM PT
First character of the Japanese era name not recognized
After installing KB4487044, the first character of the Japanese era name is not recognized as an abbreviation and may cause date parsing issues. 

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 8.1; Windows 7, Service Pack 1
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2; Windows Server 2008 R2 SP1

Resolution: This issue is resolved in KB4482887

Back to top
OS Build 17763.316

February 12, 2019
KB4487044
Resolved
KB4482887
Resolved:
March 01, 2019 10:00 AM PT

Opened:
February 12, 2019 10:00 AM PT
Error 1309 when installing/uninstalling MSI or MSP files
After installing KB4487044, users may receive \"Error 1309\" while installing or uninstalling certain types of MSI and MSP files. 

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 8.1
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2

Resolution: This issue is resolved in KB4489899

Back to top
OS Build 17763.316

February 12, 2019
KB4487044
Resolved
KB4489899
Resolved:
March 12, 2019 10:00 AM PT

Opened:
February 12, 2019 10:00 AM PT
Internet Explorer may fail to load images
After installing KB4487044, Internet Explorer may fail to load images with a backslash (\\) in their relative source path.

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 8.1; Windows 7, Service Pack 1
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2; Windows Server 2008 R2 SP1

Resolution: This issue is resolved in KB4482887.

Back to top
OS Build 17763.316

February 12, 2019
KB4487044
Resolved
KB4482887
Resolved:
March 01, 2019 10:00 AM PT

Opened:
February 12, 2019 10:00 AM PT
Applications using Microsoft Jet database and Access 95 file format stop working
Applications that use a Microsoft Jet database with the Microsoft Access 95 file format may randomly stop working.

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 7, Service Pack 1
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2008 R2 SP1

Resolution: This issue is resolved in KB4482887.

Back to top
OS Build 17763.316

February 12, 2019
KB4487044
Resolved
KB4482887
Resolved:
March 01, 2019 10:00 AM PT

Opened:
February 12, 2019 10:00 AM PT
First character of the Japanese era name not recognized
After installing KB4487044, the first character of the Japanese era name is not recognized as an abbreviation and may cause date parsing issues. 

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 8.1; Windows 7, Service Pack 1
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2; Windows Server 2008 R2 SP1

Resolution: This issue is resolved in KB4482887

Back to top
OS Build 17763.316

February 12, 2019
KB4487044
Resolved
KB4482887
Resolved:
March 01, 2019 10:00 AM PT

Opened:
February 12, 2019 10:00 AM PT
" @@ -99,11 +99,11 @@ sections: - type: markdown text: " - - - - - + + + + +
DetailsAffected buildStatusHistory
Internet Explorer 11 authentication issue with multiple concurrent logons
After installing the February 12, 2019 update (KB4487044), Internet Explorer 11 and other applications that use WININET.DLL may have authentication issues. This occurs when two or more people use the same user account for multiple, concurrent login sessions on the same Windows Server machine, including Remote Desktop Protocol (RDP) and Terminal Server logons. Symptoms reported by customers include, but may not be limited to: 
 
  • Cache size and location show zero or empty. 
  • Keyboard shortcuts may not work properly. 
  • Webpages may intermittently fail to load or render correctly. 
  • Issues with credential prompts. 
  • Issues when downloading files. 

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10 Enterprise LTSC 2016; Windows 8.1; Windows 7, Service Pack 1
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server 2016; Windows Server 2012 R2; Windows Server 2008 R2 SP1
 
Resolved: This issue was resolved in KB4493509

Back to top
OS Build 17763.253

January 08, 2019
KB4480116
Resolved
KB4493509
Resolved:
April 09, 2019 10:00 AM PT

Opened:
January 08, 2019 10:00 AM PT
MSXML6 may cause applications to stop responding
After installing KB4480116, MSXML6 causes applications to stop responding if an exception was thrown during node operations, such as appendChild(), insertBefore(), and moveNode().
 
The Group Policy editor may stop responding when editing a Group Policy Object (GPO) that contains Group Policy Preferences (GPP) for Internet Explorer 10 settings. 

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 8.1
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2

Resolved: This issue was resolved in KB4493509

Back to top
OS Build 17763.253

January 08, 2019
KB4480116
Resolved
KB4493509
Resolved:
April 09, 2019 10:00 AM PT

Opened:
January 08, 2019 10:00 AM PT
Global DNS outage affects Windows Update customers
Windows Update customers were affected by a network infrastructure event on January 29, 2019 (21:00 UTC), caused by an external DNS service provider's global outage. A software update to the external provider's DNS servers resulted in the distribution of corrupted DNS records that affected connectivity to the Windows Update service. The DNS records were restored by January 30, 2019 (00:10 UTC), and the majority of local Internet Service Providers (ISP) have refreshed their DNS servers and customer services have been restored. 
 
Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019
  • Server: Windows Server, version 1809; Windows Server 2019

While this was not an issue with Microsoft's services, we take any service disruption for our customers seriously. We will work with partners to better understand this so we can provide higher quality service in the future even across diverse global network providers. 
 
If you are still unable to connect to Windows Update services due to this problem, please contact your local ISP or network administrator. You can also refer to our new KB4493784 for more information to determine if your network is affected, and to provide your local ISP or network administrator with additional information to assist you. 

Back to top

Resolved
Resolved:
March 08, 2019 11:15 AM PT

Opened:
January 29, 2019 02:00 PM PT
Webpages become unresponsive in Microsoft Edge
After installing KB4480116, some Microsoft Edge users report that they:

  • Cannot load webpages using a local IP address. 
  • Cannot load webpages on the Internet using a VPN connection.

Browsing fails or the webpage may become unresponsive.

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709

Resolution: This issue is resolved in KB4487044

Back to top
OS Build 17763.253

January 08, 2019
KB4480116
Resolved
KB4487044
Resolved:
February 12, 2019 10:00 AM PT

Opened:
January 08, 2019 10:00 AM PT
Unable to access hotspots with third-party applications
After installing KB4480116, third-party applications may have difficulty authenticating hotspots. 

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 8.1
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2

Resolution: This issue is resolved in KB4476976

Back to top
OS Build 17763.253

January 08, 2019
KB4480116
Resolved
KB4476976
Resolved:
January 22, 2019 02:00 PM PT

Opened:
January 08, 2019 10:00 AM PT
Internet Explorer 11 authentication issue with multiple concurrent logons
After installing the February 12, 2019 update (KB4487044), Internet Explorer 11 and other applications that use WININET.DLL may have authentication issues. This occurs when two or more people use the same user account for multiple, concurrent login sessions on the same Windows Server machine, including Remote Desktop Protocol (RDP) and Terminal Server logons. Symptoms reported by customers include, but may not be limited to: 
 
  • Cache size and location show zero or empty. 
  • Keyboard shortcuts may not work properly. 
  • Webpages may intermittently fail to load or render correctly. 
  • Issues with credential prompts. 
  • Issues when downloading files. 

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10 Enterprise LTSC 2016; Windows 8.1; Windows 7, Service Pack 1
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server 2016; Windows Server 2012 R2; Windows Server 2008 R2 SP1
 
Resolved: This issue was resolved in KB4493509

Back to top
OS Build 17763.253

January 08, 2019
KB4480116
Resolved
KB4493509
Resolved:
April 09, 2019 10:00 AM PT

Opened:
January 08, 2019 10:00 AM PT
MSXML6 may cause applications to stop responding
After installing KB4480116, MSXML6 causes applications to stop responding if an exception was thrown during node operations, such as appendChild(), insertBefore(), and moveNode().
 
The Group Policy editor may stop responding when editing a Group Policy Object (GPO) that contains Group Policy Preferences (GPP) for Internet Explorer 10 settings. 

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 8.1
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2

Resolved: This issue was resolved in KB4493509

Back to top
OS Build 17763.253

January 08, 2019
KB4480116
Resolved
KB4493509
Resolved:
April 09, 2019 10:00 AM PT

Opened:
January 08, 2019 10:00 AM PT
Global DNS outage affects Windows Update customers
Windows Update customers were affected by a network infrastructure event on January 29, 2019 (21:00 UTC), caused by an external DNS service provider's global outage. A software update to the external provider's DNS servers resulted in the distribution of corrupted DNS records that affected connectivity to the Windows Update service. The DNS records were restored by January 30, 2019 (00:10 UTC), and the majority of local Internet Service Providers (ISP) have refreshed their DNS servers and customer services have been restored. 
 
Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019
  • Server: Windows Server, version 1809; Windows Server 2019

While this was not an issue with Microsoft's services, we take any service disruption for our customers seriously. We will work with partners to better understand this so we can provide higher quality service in the future even across diverse global network providers. 
 
If you are still unable to connect to Windows Update services due to this problem, please contact your local ISP or network administrator. You can also refer to our new KB4493784 for more information to determine if your network is affected, and to provide your local ISP or network administrator with additional information to assist you. 

Back to top

Resolved
Resolved:
March 08, 2019 11:15 AM PT

Opened:
January 29, 2019 02:00 PM PT
Webpages become unresponsive in Microsoft Edge
After installing KB4480116, some Microsoft Edge users report that they:
  • Cannot load webpages using a local IP address. 
  • Cannot load webpages on the Internet using a VPN connection.
Browsing fails or the webpage may become unresponsive.

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709

Resolution: This issue is resolved in KB4487044

Back to top
OS Build 17763.253

January 08, 2019
KB4480116
Resolved
KB4487044
Resolved:
February 12, 2019 10:00 AM PT

Opened:
January 08, 2019 10:00 AM PT
Unable to access hotspots with third-party applications
After installing KB4480116, third-party applications may have difficulty authenticating hotspots. 

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 8.1
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2

Resolution: This issue is resolved in KB4476976

Back to top
OS Build 17763.253

January 08, 2019
KB4480116
Resolved
KB4476976
Resolved:
January 22, 2019 02:00 PM PT

Opened:
January 08, 2019 10:00 AM PT
" @@ -122,13 +122,13 @@ sections: text: " - - - + + + - + - +
DetailsAffected buildStatusHistory
Shared albums may not sync with iCloud for Windows
Upgrade block: Users who attempt to install iCloud for Windows (version 7.7.0.27) will see a message displayed that this version iCloud for Windows isn't supported and the install will fail.

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019
  • Server: Windows Server, version 1809; Windows Server 2019

To ensure a seamless experience, Microsoft is blocking devices with iCloud for Windows (version 7.7.0.27) software installed from being offered Window 10, version 1809 until this issue has been resolved. 

We recommend that you do not attempt to manually update using the Update now button or the Media Creation Tool from the Microsoft software download website until this issue is resolved. 
 
Resolution: Apple has released an updated version of iCloud for Windows (version 7.8.1) that resolves compatibility issues encountered when updating or synching Shared Albums after updating to Windows 10, version 1809. We recommend that you update your iCloud for Windows to version 7.8.1 when prompted before attempting to upgrade to Windows 10, version 1809. You can also manually download the latest version of iCloud for Windows by visiting https://support.apple.com/en-us/HT204283.

Back to top
OS Build 17763.134

November 13, 2018
KB4467708
Resolved
KB4482887
Resolved:
March 01, 2019 10:00 AM PT

Opened:
November 13, 2018 10:00 AM PT
Intel Audio Display (intcdaud.sys) notification during Windows 10 Setup
Upgrade block: Microsoft and Intel have identified a compatibility issue with a range of Intel Display Audio device drivers (intcdaud.sys, versions 10.25.0.3 - 10.25.0.8) that may result in excessive processor demand and reduced battery life. As a result, the update process to the Windows 10 October 2018 Update (Windows 10, version 1809) will fail and affected devices will automatically revert to the previous working configuration. 

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019
  • Server: Windows Server, version 1809; Windows Server 2019

If you see a \"What needs your attention\" notification during installation of the October 2018 Update, you have one of these affected drivers on your system. On the notification, click Back to remain on your current version of Windows 10. 
 
To ensure a seamless experience, we are blocking devices from being offered the October 2018 Update until updated Intel device drivers are installed on your current operating system. We recommend that you do not attempt to manually update to Windows 10, version 1809, using the Update Now button or the Media Creation Tool from the Microsoft Software Download Center until newer Intel device drivers are available with the update. You can either wait for newer drivers to be installed automatically through Windows Update or check with your computer manufacturer for the latest device driver software availability and installation procedures. For more information about this issue, see Intel's customer support guidance.
 
Resolution: This issue was resolved in KB4482887 and the upgrade block removed. 

Back to top
OS Build 17763.134

November 13, 2018
KB4467708
Resolved
KB4482887
Resolved:
March 01, 2019 10:00 AM PT

Opened:
November 13, 2018 10:00 AM PT
F5 VPN clients losing network connectivity
Upgrade block: After updating to Window 10, version 1809, F5 VPN clients may lose network connectivity when the VPN service is in a split tunnel configuration.

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019
  • Server: Windows Server, version 1809; Windows Server 2019

Resolution: This issue was resolved in KB4482887 and the upgrade block removed. 

Back to top
OS Build 17763.134

November 13, 2018
KB4467708
Resolved
KB4482887
Resolved:
March 01, 2019 10:00 AM PT

Opened:
November 13, 2018 10:00 AM PT
Issues with lock screen and Microsoft Edge tabs for certain AMD Radeon video cards
Note: AMD no longer supports Radeon HD2000 and HD4000 series graphic processor units (GPUs).
 
Upgrade block: After updating to Window 10, version 1809, Microsoft Edge tabs may stop working when a device is configured with AMD Radeon HD2000 or HD4000 series video cards. Customers may get the following error code: \"INVALID_POINTER_READ_c0000005_atidxx64.dll\". 
 
Some users may also experience performance issues with the lock screen or the ShellExperienceHost. (The lock screen hosts widgets, and the ShellExperienceHost is responsible for assorted shell functionality.) 

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019
  • Server: Windows Server, version 1809; Windows Server 2019

Resolution: This issue was resolved in KB4487044, and the block was removed.

Back to top
OS Build 17763.134

November 13, 2018
KB4467708
Resolved
KB4487044
Resolved:
February 12, 2019 10:00 AM PT

Opened:
November 13, 2018 10:00 AM PT
Intel Audio Display (intcdaud.sys) notification during Windows 10 Setup
Upgrade block: Microsoft and Intel have identified a compatibility issue with a range of Intel Display Audio device drivers (intcdaud.sys, versions 10.25.0.3 - 10.25.0.8) that may result in excessive processor demand and reduced battery life. As a result, the update process to the Windows 10 October 2018 Update (Windows 10, version 1809) will fail and affected devices will automatically revert to the previous working configuration. 

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019
  • Server: Windows Server, version 1809; Windows Server 2019

If you see a \"What needs your attention\" notification during installation of the October 2018 Update, you have one of these affected drivers on your system. On the notification, click Back to remain on your current version of Windows 10. 
 
To ensure a seamless experience, we are blocking devices from being offered the October 2018 Update until updated Intel device drivers are installed on your current operating system. We recommend that you do not attempt to manually update to Windows 10, version 1809, using the Update Now button or the Media Creation Tool from the Microsoft Software Download Center until newer Intel device drivers are available with the update. You can either wait for newer drivers to be installed automatically through Windows Update or check with your computer manufacturer for the latest device driver software availability and installation procedures. For more information about this issue, see Intel's customer support guidance.
 
Resolution: This issue was resolved in KB4482887 and the upgrade block removed. 

Back to top
OS Build 17763.134

November 13, 2018
KB4467708
Resolved
KB4482887
Resolved:
March 01, 2019 10:00 AM PT

Opened:
November 13, 2018 10:00 AM PT
F5 VPN clients losing network connectivity
Upgrade block: After updating to Window 10, version 1809, F5 VPN clients may lose network connectivity when the VPN service is in a split tunnel configuration.

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019
  • Server: Windows Server, version 1809; Windows Server 2019

Resolution: This issue was resolved in KB4482887 and the upgrade block removed. 

Back to top
OS Build 17763.134

November 13, 2018
KB4467708
Resolved
KB4482887
Resolved:
March 01, 2019 10:00 AM PT

Opened:
November 13, 2018 10:00 AM PT
Issues with lock screen and Microsoft Edge tabs for certain AMD Radeon video cards
Note: AMD no longer supports Radeon HD2000 and HD4000 series graphic processor units (GPUs).
 
Upgrade block: After updating to Window 10, version 1809, Microsoft Edge tabs may stop working when a device is configured with AMD Radeon HD2000 or HD4000 series video cards. Customers may get the following error code: \"INVALID_POINTER_READ_c0000005_atidxx64.dll\". 
 
Some users may also experience performance issues with the lock screen or the ShellExperienceHost. (The lock screen hosts widgets, and the ShellExperienceHost is responsible for assorted shell functionality.) 

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019
  • Server: Windows Server, version 1809; Windows Server 2019

Resolution: This issue was resolved in KB4487044, and the block was removed.

Back to top
OS Build 17763.134

November 13, 2018
KB4467708
Resolved
KB4487044
Resolved:
February 12, 2019 10:00 AM PT

Opened:
November 13, 2018 10:00 AM PT
Trend Micro OfficeScan and Worry-Free Business Security AV software not compatible
Upgrade block: Microsoft and Trend Micro have identified a compatibility issue with Trend Micro's OfficeScan and Worry-Free Business Security software when attempting to update to Windows 10, version 1809.

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019
  • Server: Windows Server, version 1809; Windows Server 2019 

Resolution: Trend Micro has released a new version of these products that resolves the issue. To download them, please visit the Trend Micro Business Support Portal.

Once you have updated your version of Trend Micro's OfficeScan or Worry-Free Business Security software, you will be offered Windows 10, version 1809 automatically. 

Back to top
OS Build 17763.134

November 13, 2018
KB4467708
Resolved
Resolved:
February 01, 2019 09:00 AM PT

Opened:
November 13, 2018 10:00 AM PT
Audio stops working after installing Intel audio driver
Upgrade block: Intel unintentionally released version 9.21.00.3755 of the Intel Smart Sound Technology (ISST) Driver through Windows Update and inadvertently offered it to a range of devices running Window 10, version 1709, 1803, and 1809. If a device contained a compatible audio driver, the new driver overrode it and caused audio to stop working.

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019
  • Server: Windows Server, version 1809; Windows Server 2019
 
Resolution: This issue was resolved in KB4468550 and the upgrade block removed. 

Back to top
OS Build 17763.134

November 13, 2018
KB4467708
Resolved
KB4468550
Resolved:
December 07, 2018 10:00 AM PT

Opened:
November 13, 2018 10:00 AM PT
Audio stops working after installing Intel audio driver
Upgrade block: Intel unintentionally released version 9.21.00.3755 of the Intel Smart Sound Technology (ISST) Driver through Windows Update and inadvertently offered it to a range of devices running Window 10, version 1709, 1803, and 1809. If a device contained a compatible audio driver, the new driver overrode it and caused audio to stop working.

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019
  • Server: Windows Server, version 1809; Windows Server 2019
 
Resolution: This issue was resolved in KB4468550 and the upgrade block removed. 

Back to top
OS Build 17763.134

November 13, 2018
KB4467708
Resolved
KB4468550
Resolved:
December 07, 2018 10:00 AM PT

Opened:
November 13, 2018 10:00 AM PT
Office apps (32-bit) unable to use 'Save As…' function
Upgrade block: Microsoft and Morphisec have identified an issue on devices that have installed Morphisec Protector or another application that uses the Morphisec Software Development Kit (SDK) including Cisco AMP for Endpoints. These applications may impact customers' ability to use the 'Save As.'dialog when saving documents in 32-bit versions of Microsoft Office applications. Saving of files is not impacted.

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019
  • Server: Windows Server, version 1809; Windows Server 2019

Resolution: Morphisec and Cisco have released updated versions of their applications to address this issue. We recommend customers update to these minimum versions before attempting to attempting to upgrade to Windows 10, version 1809: 

  • Morphisec Protector version 2.4.8 
  • Cisco AMP for Endpoints version 6.2.3.10814 

An upgrade block remains in place for earlier versions of the applications than those listed above.

Back to top
OS Build 17763.134

November 13, 2018
KB4467708
Resolved
Resolved:
December 06, 2018 12:00 PM PT

Opened:
November 13, 2018 10:00 AM PT
Mapped drives fail to reconnect after login
Upgrade block: Network drives may fail to reconnect after booting and logging on to a Windows device. Symptoms include: 
 
  • In Windows Explorer, a red X appears on the mapped network drives. 
  • Mapped network drives show as Unavailable when you run the net use command from a command prompt. 
  • In the notification area, a notification displays the following message, \"Could not reconnect all network drives.\"

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019
  • Server: Windows Server, version 1809; Windows Server 2019

Resolution: This issue was resolved in KB4469342 and the upgrade block removed. 

Back to top
OS Build 17763.134

November 13, 2018
KB4467708
Resolved
KB4469342
Resolved:
December 05, 2018 02:00 PM PT

Opened:
November 13, 2018 10:00 AM PT
Mapped drives fail to reconnect after login
Upgrade block: Network drives may fail to reconnect after booting and logging on to a Windows device. Symptoms include: 
 
  • In Windows Explorer, a red X appears on the mapped network drives. 
  • Mapped network drives show as Unavailable when you run the net use command from a command prompt. 
  • In the notification area, a notification displays the following message, \"Could not reconnect all network drives.\"

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019
  • Server: Windows Server, version 1809; Windows Server 2019

Resolution: This issue was resolved in KB4469342 and the upgrade block removed. 

Back to top
OS Build 17763.134

November 13, 2018
KB4467708
Resolved
KB4469342
Resolved:
December 05, 2018 02:00 PM PT

Opened:
November 13, 2018 10:00 AM PT
" @@ -137,7 +137,7 @@ sections: - type: markdown text: " - - + +
DetailsAffected buildStatusHistory
Unable to use Seek bar in Windows Media Player
After installing KB4464330, users may not be able to use the Seek bar in Windows Media Player when playing specific files. This issue does not affect normal playback. 

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 8.1; Windows 7, Service Pack 1
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2; Windows Server 2008 R2 SP1

Resolution: This issue is resolved in KB4471332

Back to top
OS Build 17763.55

October 09, 2018
KB4464330
Resolved
KB4471332
Resolved:
December 11, 2018 10:00 AM PT

Opened:
October 09, 2018 10:00 AM PT
Users cannot set Win32 program defaults
After installing KB4464330, some users cannot set Win32 program defaults for certain app and file type combinations using the Open with... command or Settings > Apps > Default apps.
 
In some cases, Microsoft Notepad or other Win32 programs cannot be set as the default. 

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803

Resolution: This issue is resolved in KB4469342

Back to top
OS Build 17763.55

October 09, 2018
KB4464330
Resolved
KB4469342
Resolved:
December 05, 2018 02:00 PM PT

Opened:
October 09, 2018 10:00 AM PT
Unable to use Seek bar in Windows Media Player
After installing KB4464330, users may not be able to use the Seek bar in Windows Media Player when playing specific files. This issue does not affect normal playback. 

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 8.1; Windows 7, Service Pack 1
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2; Windows Server 2008 R2 SP1

Resolution: This issue is resolved in KB4471332

Back to top
OS Build 17763.55

October 09, 2018
KB4464330
Resolved
KB4471332
Resolved:
December 11, 2018 10:00 AM PT

Opened:
October 09, 2018 10:00 AM PT
Users cannot set Win32 program defaults
After installing KB4464330, some users cannot set Win32 program defaults for certain app and file type combinations using the Open with... command or Settings > Apps > Default apps.
 
In some cases, Microsoft Notepad or other Win32 programs cannot be set as the default. 

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803

Resolution: This issue is resolved in KB4469342

Back to top
OS Build 17763.55

October 09, 2018
KB4464330
Resolved
KB4469342
Resolved:
December 05, 2018 02:00 PM PT

Opened:
October 09, 2018 10:00 AM PT
" diff --git a/windows/release-information/resolved-issues-windows-7-and-windows-server-2008-r2-sp1.yml b/windows/release-information/resolved-issues-windows-7-and-windows-server-2008-r2-sp1.yml index 784833bce6..ae74bcb1ff 100644 --- a/windows/release-information/resolved-issues-windows-7-and-windows-server-2008-r2-sp1.yml +++ b/windows/release-information/resolved-issues-windows-7-and-windows-server-2008-r2-sp1.yml @@ -30,7 +30,7 @@ sections: - title: Resolved issues - items: - type: markdown - text: " + text: "
@@ -59,7 +59,7 @@ sections: - type: markdown text: "
SummaryAffected buildStatusDate resolved
Virtual machines fail to restore.
Virtual machines (VMs) may fail to restore successfully if the VM has been saved and restored once before.

See details >
January 08, 2019
KB4480970
Resolved
KB4490511
April 21, 2019 12:00 AM PT
Local Administrators unable to remotely access shares.
Local users who are part of the local Administrators group may not be able to remotely access shares on Windows Server 2008 R2 and Windows 7 machines.

See details >
January 08, 2019
KB4480970
Resolved
KB4487345
April 20, 2019 11:53 PM PT
- +
DetailsAffected buildStatusHistory
Devices may not respond at login or Welcome screen if running certain Avast software.
Microsoft and Avast have identified an issue on devices running Avast for Business, Avast CloudCare, and AVG Business Edition antivirus software after you install KB4493472 and restart. Devices may become unresponsive at the login or Welcome screen. Additionally, you may be unable to log in or log in after an extended period of time.

Affected platforms: 
  • Client: Windows 8.1; Windows 7, Service Pack 1 
  • Server: Windows Server 2012 R2; Windows Server 2008 R2 SP1 

Resolution: Avast has released emergency updates to address this issue. For more information and AV update schedule, see the Avast support KB article.

Back to top
April 09, 2019
KB4493472
Resolved
Resolved:
April 09, 2019 10:00 AM PT

Opened:
April 09, 2019 10:00 AM PT
Devices may not respond at login or Welcome screen if running certain Avast software.
Microsoft and Avast have identified an issue on devices running Avast for Business, Avast CloudCare, and AVG Business Edition antivirus software after you install KB4493472 and restart. Devices may become unresponsive at the login or Welcome screen. Additionally, you may be unable to log in or log in after an extended period of time.

Affected platforms: 
  • Client: Windows 8.1; Windows 7, Service Pack 1 
  • Server: Windows Server 2012 R2; Windows Server 2008 R2 SP1 

Resolution: Avast has released emergency updates to address this issue. For more information and AV update schedule, see the Avast support KB article.

Back to top
April 09, 2019
KB4493472
Resolved
Resolved:
April 09, 2019 10:00 AM PT

Opened:
April 09, 2019 10:00 AM PT
" @@ -68,8 +68,8 @@ sections: - type: markdown text: " - - + +
DetailsAffected buildStatusHistory
Custom URI schemes may not start corresponding application.
After installing KB4489878, custom URI schemes for application protocol handlers may not start the corresponding application for local intranet and trusted sites on Internet Explorer.

Affected platforms: 
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 8.1; Windows 7, Service Pack 1 
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2; Windows Server 2008 R2 SP1 

Resolution: This issue is resolved in KB4493472.

Back to top
March 12, 2019
KB4489878
Resolved
KB4493472
Resolved:
April 09, 2019 10:00 AM PT

Opened:
March 12, 2019 10:00 AM PT
NETDOM.EXE fails to run.
After installing KB4489878, NETDOM.EXE fails to run, and the on-screen error, “The command failed to complete successfully.” appears.

Affected platforms: 
  • Client: Windows 7, Service Pack 1 
  • Server: Windows Server 2008 R2 SP1 

Resolution: This issue is resolved in KB4493472.

Back to top
March 12, 2019
KB4489878
Resolved
KB4493472
Resolved:
April 09, 2019 10:00 AM PT

Opened:
March 12, 2019 10:00 AM PT
Custom URI schemes may not start corresponding application.
After installing KB4489878, custom URI schemes for application protocol handlers may not start the corresponding application for local intranet and trusted sites on Internet Explorer.

Affected platforms: 
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 8.1; Windows 7, Service Pack 1 
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2; Windows Server 2008 R2 SP1 

Resolution: This issue is resolved in KB4493472.

Back to top
March 12, 2019
KB4489878
Resolved
KB4493472
Resolved:
April 09, 2019 10:00 AM PT

Opened:
March 12, 2019 10:00 AM PT
NETDOM.EXE fails to run.
After installing KB4489878, NETDOM.EXE fails to run, and the on-screen error, “The command failed to complete successfully.” appears.

Affected platforms: 
  • Client: Windows 7, Service Pack 1 
  • Server: Windows Server 2008 R2 SP1 

Resolution: This issue is resolved in KB4493472.

Back to top
March 12, 2019
KB4489878
Resolved
KB4493472
Resolved:
April 09, 2019 10:00 AM PT

Opened:
March 12, 2019 10:00 AM PT
" @@ -78,8 +78,8 @@ sections: - type: markdown text: " - - + +
DetailsAffected buildStatusHistory
Internet Explorer may fail to load images.
After installing KB4486563, Internet Explorer may fail to load images with a backslash (\\) in their relative source path.

Affected platforms: 
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 8.1; Windows 7, Service Pack 1 
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2; Windows Server 2008 R2 SP1 

Resolution: This issue is resolved in KB4486565.

Back to top
February 12, 2019
KB4486563
Resolved
KB4486565
Resolved:
February 19, 2019 02:00 PM PT

Opened:
February 12, 2019 10:00 AM PT
Applications using Microsoft Jet database and Access 95 file format stop working.
Applications that use a Microsoft Jet database with the Microsoft Access 95 file format may randomly stop working.

Affected platforms: 
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 7, Service Pack 1 
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2008 R2 SP1 

Resolution: This issue is resolved in KB4486565.

Back to top
February 12, 2019
KB4486563
Resolved
KB4486565
Resolved:
February 19, 2019 02:00 PM PT

Opened:
February 12, 2019 10:00 AM PT
Internet Explorer may fail to load images.
After installing KB4486563, Internet Explorer may fail to load images with a backslash (\\) in their relative source path.

Affected platforms: 
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 8.1; Windows 7, Service Pack 1 
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2; Windows Server 2008 R2 SP1 

Resolution: This issue is resolved in KB4486565.

Back to top
February 12, 2019
KB4486563
Resolved
KB4486565
Resolved:
February 19, 2019 02:00 PM PT

Opened:
February 12, 2019 10:00 AM PT
Applications using Microsoft Jet database and Access 95 file format stop working.
Applications that use a Microsoft Jet database with the Microsoft Access 95 file format may randomly stop working.

Affected platforms: 
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 7, Service Pack 1 
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2008 R2 SP1 

Resolution: This issue is resolved in KB4486565.

Back to top
February 12, 2019
KB4486563
Resolved
KB4486565
Resolved:
February 19, 2019 02:00 PM PT

Opened:
February 12, 2019 10:00 AM PT
" @@ -88,11 +88,11 @@ sections: - type: markdown text: " - - - - - + + + + +
DetailsAffected buildStatusHistory
Virtual machines fail to restore.
After installing KB4480970, virtual machines (VM) may fail to restore successfully if the VM has been saved and restored once before. The error message is, “Failed to restore the virtual machine state: Cannot restore this virtual machine because the saved state data cannot be read. Delete the saved state data and then try to start the virtual machine. (0xC0370027).”

This affects AMD Bulldozer Family 15h, AMD Jaguar Family 16h, and AMD Puma Family 16h (second generation) microarchitectures.

Affected platforms: 
  • Client: Windows 7, Service Pack 1 
  • Server: Windows Server 2008 R2 SP1 

Resolution: This issue is resolved in KB4490511.

Back to top
January 08, 2019
KB4480970
Resolved
KB4490511
Resolved:
February 19, 2019 02:00 PM PT

Opened:
January 08, 2019 10:00 AM PT
Local Administrators unable to remotely access shares.
Local users who are part of the local Administrators group may not be able to remotely access shares on Windows Server 2008 R2 and Windows 7 machines after installing KB4480970. This does not affect domain accounts in the local Administrators group.
 
Affected platforms: 
  • Client: Windows 7, Service Pack 1 
  • Server: Windows Server 2008 R2 SP1 

Resolution: This issue is resolved in KB4487345.

Back to top
January 08, 2019
KB4480970
Resolved
KB4487345
Resolved:
January 11, 2019 02:00 PM PT

Opened:
January 08, 2019 10:00 AM PT
Internet Explorer 11 authentication issue with multiple concurrent logons.
After installing KB4480970, Internet Explorer 11 and other applications that use WININET.DLL may have authentication issues. This occurs when two or more people use the same user account for multiple, concurrent login sessions on the same Windows Server machine, including Remote Desktop Protocol (RDP) and Terminal Server logons. Symptoms reported by customers include, but may not be limited to:

  • Cache size and location show zero or empty.
  • Keyboard shortcuts may not work properly.
  • Webpages may intermittently fail to load or render correctly.
  • Issues with credential prompts.
  • Issues when downloading files.

Affected platforms: 
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10 Enterprise LTSC 2016; Windows 8.1; Windows 7, Service Pack 1 
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server 2016; Windows Server 2012 R2; Windows Server 2008 R2 SP1 

Resolution: This issue is resolved in KB4493472.

Back to top
January 08, 2019
KB4480970
Resolved
KB4493472
Resolved:
April 09, 2019 10:00 AM PT

Opened:
January 08, 2019 10:00 AM PT
First character of the Japanese era name not recognized as an abbreviation.
After installing KB4480955, the first character of the Japanese era name is not recognized as an abbreviation and may cause date parsing issues.

Affected platforms: 
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 8.1; Windows 7, Service Pack 1 
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2; Windows Server 2008 R2 SP1 

Resolution: This issue is resolved in KB4486565.

Back to top
January 17, 2019
KB4480955
Resolved
KB4486565
Resolved:
February 19, 2019 02:00 PM PT

Opened:
January 17, 2019 10:00 AM PT
Applications using Microsoft Jet database fail to open.
Applications that use a Microsoft Jet database with the Microsoft Access 97 file format may fail to open if the database has column names greater than 32 characters. The database will fail to open with the error, “Unrecognized Database Format”.

Affected Platforms:
  • Client: Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 8.1; Windows 7, Service Pack 1 
  • Server: Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2; Windows Server 2008 R2 SP1 


Resolution: This issue is resolved in KB4486563.

Back to top
January 08, 2019
KB4480970
Resolved
KB4486563
Resolved:
February 12, 2019 10:00 AM PT

Opened:
January 08, 2019 10:00 AM PT
Virtual machines fail to restore.
After installing KB4480970, virtual machines (VM) may fail to restore successfully if the VM has been saved and restored once before. The error message is, “Failed to restore the virtual machine state: Cannot restore this virtual machine because the saved state data cannot be read. Delete the saved state data and then try to start the virtual machine. (0xC0370027).”

This affects AMD Bulldozer Family 15h, AMD Jaguar Family 16h, and AMD Puma Family 16h (second generation) microarchitectures.

Affected platforms: 
  • Client: Windows 7, Service Pack 1 
  • Server: Windows Server 2008 R2 SP1 

Resolution: This issue is resolved in KB4490511.

Back to top
January 08, 2019
KB4480970
Resolved
KB4490511
Resolved:
February 19, 2019 02:00 PM PT

Opened:
January 08, 2019 10:00 AM PT
Local Administrators unable to remotely access shares.
Local users who are part of the local Administrators group may not be able to remotely access shares on Windows Server 2008 R2 and Windows 7 machines after installing KB4480970. This does not affect domain accounts in the local Administrators group.
 
Affected platforms: 
  • Client: Windows 7, Service Pack 1 
  • Server: Windows Server 2008 R2 SP1 

Resolution: This issue is resolved in KB4487345.

Back to top
January 08, 2019
KB4480970
Resolved
KB4487345
Resolved:
January 11, 2019 02:00 PM PT

Opened:
January 08, 2019 10:00 AM PT
Internet Explorer 11 authentication issue with multiple concurrent logons.
After installing KB4480970, Internet Explorer 11 and other applications that use WININET.DLL may have authentication issues. This occurs when two or more people use the same user account for multiple, concurrent login sessions on the same Windows Server machine, including Remote Desktop Protocol (RDP) and Terminal Server logons. Symptoms reported by customers include, but may not be limited to:

  • Cache size and location show zero or empty.
  • Keyboard shortcuts may not work properly.
  • Webpages may intermittently fail to load or render correctly.
  • Issues with credential prompts.
  • Issues when downloading files.

Affected platforms: 
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10 Enterprise LTSC 2016; Windows 8.1; Windows 7, Service Pack 1 
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server 2016; Windows Server 2012 R2; Windows Server 2008 R2 SP1 

Resolution: This issue is resolved in KB4493472.

Back to top
January 08, 2019
KB4480970
Resolved
KB4493472
Resolved:
April 09, 2019 10:00 AM PT

Opened:
January 08, 2019 10:00 AM PT
First character of the Japanese era name not recognized as an abbreviation.
After installing KB4480955, the first character of the Japanese era name is not recognized as an abbreviation and may cause date parsing issues.

Affected platforms: 
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 8.1; Windows 7, Service Pack 1 
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2; Windows Server 2008 R2 SP1 

Resolution: This issue is resolved in KB4486565.

Back to top
January 17, 2019
KB4480955
Resolved
KB4486565
Resolved:
February 19, 2019 02:00 PM PT

Opened:
January 17, 2019 10:00 AM PT
Applications using Microsoft Jet database fail to open.
Applications that use a Microsoft Jet database with the Microsoft Access 97 file format may fail to open if the database has column names greater than 32 characters. The database will fail to open with the error, “Unrecognized Database Format”.

Affected Platforms:
  • Client: Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 8.1; Windows 7, Service Pack 1 
  • Server: Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2; Windows Server 2008 R2 SP1 


Resolution: This issue is resolved in KB4486563.

Back to top
January 08, 2019
KB4480970
Resolved
KB4486563
Resolved:
February 12, 2019 10:00 AM PT

Opened:
January 08, 2019 10:00 AM PT
" @@ -101,7 +101,7 @@ sections: - type: markdown text: " - - + +
DetailsAffected buildStatusHistory
Event Viewer may not show some event descriptions for network interface cards.
After installing KB4462927, the Event Viewer may not show some event descriptions for network interface cards (NICs).

Affected Platforms:
  • Client: Windows 7, Service Pack 1 
  • Server: Windows Server 2008 R2 SP1 

Resolution: This issue is resolved in KB4489878.

Back to top
October 18, 2018
KB4462927
Resolved
KB4489878
Resolved:
March 12, 2019 10:00 AM PT

Opened:
October 18, 2018 10:00 AM PT
Unable to use Seek bar in Windows Media Player
After installing KB4462923, users may not be able to use the Seek Bar in Windows Media Player when playing specific files. This issue does not affect normal playback.

Affected platforms: 
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 8.1; Windows 7, Service Pack 1.
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2; Windows Server 2008 R2 SP1

Resolution: This issue is resolved in KB4471318.

Back to top
October 09, 2018
KB4462923
Resolved
KB4471318
Resolved:
December 11, 2018 10:00 AM PT

Opened:
October 09, 2018 10:00 AM PT
Event Viewer may not show some event descriptions for network interface cards.
After installing KB4462927, the Event Viewer may not show some event descriptions for network interface cards (NICs).

Affected Platforms:
  • Client: Windows 7, Service Pack 1 
  • Server: Windows Server 2008 R2 SP1 

Resolution: This issue is resolved in KB4489878.

Back to top
October 18, 2018
KB4462927
Resolved
KB4489878
Resolved:
March 12, 2019 10:00 AM PT

Opened:
October 18, 2018 10:00 AM PT
Unable to use Seek bar in Windows Media Player
After installing KB4462923, users may not be able to use the Seek Bar in Windows Media Player when playing specific files. This issue does not affect normal playback.

Affected platforms: 
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 8.1; Windows 7, Service Pack 1.
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2; Windows Server 2008 R2 SP1

Resolution: This issue is resolved in KB4471318.

Back to top
October 09, 2018
KB4462923
Resolved
KB4471318
Resolved:
December 11, 2018 10:00 AM PT

Opened:
October 09, 2018 10:00 AM PT
" diff --git a/windows/release-information/resolved-issues-windows-8.1-and-windows-server-2012-r2.yml b/windows/release-information/resolved-issues-windows-8.1-and-windows-server-2012-r2.yml index 01cef4fef3..000affb114 100644 --- a/windows/release-information/resolved-issues-windows-8.1-and-windows-server-2012-r2.yml +++ b/windows/release-information/resolved-issues-windows-8.1-and-windows-server-2012-r2.yml @@ -30,7 +30,7 @@ sections: - title: Resolved issues - items: - type: markdown - text: " + text: "
@@ -60,7 +60,7 @@ sections: - type: markdown text: "
SummaryAffected buildStatusDate resolved
Internet Explorer 11 authentication issue with multiple concurrent logons
Internet Explorer 11 users may encounter issues if two or more people use the same user account for multiple, concurrent login sessions on the same Windows Server machine.

See details >
January 08, 2019
KB4480963
Resolved
KB4493446
April 09, 2019 10:00 AM PT
MSXML6 may cause applications to stop responding.
MSXML6 may cause applications to stop responding if an exception was thrown during node operations, such as appendChild(), insertBefore(), and moveNode().

See details >
January 08, 2019
KB4480963
Resolved
KB4493446
April 09, 2019 10:00 AM PT
- +
DetailsAffected buildStatusHistory
Devices may not respond at login or Welcome screen if running certain Avast software
Microsoft and Avast have identified an issue on devices running Avast for Business, Avast CloudCare, and AVG Business Edition antivirus software after you install KB4493446 and restart. Devices may become unresponsive at the login or Welcome screen. Additionally, you may be unable to log in or log in after an extended period of time.

Affected platforms: 
  • Client: Windows 8.1; Windows 7, Service Pack 1 
  • Server: Windows Server 2012 R2; Windows Server 2008 R2 SP1 


Resolution: Avast has released emergency updates to address this issue. For more information and AV update schedule, see the Avast support KB article.

Back to top
April 09, 2019
KB4493446
Resolved
Resolved:
April 09, 2019 10:00 AM PT

Opened:
April 09, 2019 10:00 AM PT
Devices may not respond at login or Welcome screen if running certain Avast software
Microsoft and Avast have identified an issue on devices running Avast for Business, Avast CloudCare, and AVG Business Edition antivirus software after you install KB4493446 and restart. Devices may become unresponsive at the login or Welcome screen. Additionally, you may be unable to log in or log in after an extended period of time.

Affected platforms: 
  • Client: Windows 8.1; Windows 7, Service Pack 1 
  • Server: Windows Server 2012 R2; Windows Server 2008 R2 SP1 


Resolution: Avast has released emergency updates to address this issue. For more information and AV update schedule, see the Avast support KB article.

Back to top
April 09, 2019
KB4493446
Resolved
Resolved:
April 09, 2019 10:00 AM PT

Opened:
April 09, 2019 10:00 AM PT
" @@ -69,8 +69,8 @@ sections: - type: markdown text: " - - + +
DetailsAffected buildStatusHistory
Custom URI schemes may not start corresponding application
After installing KB4489881, custom URI schemes for application protocol handlers may not start the corresponding application for local intranet and trusted sites security zones on Internet Explorer.

Affected platforms: 
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 8.1; Windows 7, Service Pack 1 
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2; Windows Server 2008 R2 SP1 

Resolution: This issue is resolved in KB4493446.

Back to top
March 12, 2019
KB4489881
Resolved
KB4493446
Resolved:
April 09, 2019 10:00 AM PT

Opened:
March 12, 2019 10:00 AM PT
Devices with winsock kernel client may receive error
After installing KB4489881, devices with a winsock kernel client may receive D1, FC, and other errors. Additionally, systems that run the Skype for Business or Lync Server Edge Transport role may be affected by this issue.

Affected platforms: 
  • Client: Windows 8.1 
  • Server: Windows Server 2012 R2 

Resolution: This issue is resolved in KB4489893.

Back to top
March 12, 2019
KB4489881
Resolved
KB4489893
Resolved:
March 19, 2019 10:00 AM PT

Opened:
March 12, 2019 10:00 AM PT
Custom URI schemes may not start corresponding application
After installing KB4489881, custom URI schemes for application protocol handlers may not start the corresponding application for local intranet and trusted sites security zones on Internet Explorer.

Affected platforms: 
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 8.1; Windows 7, Service Pack 1 
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2; Windows Server 2008 R2 SP1 

Resolution: This issue is resolved in KB4493446.

Back to top
March 12, 2019
KB4489881
Resolved
KB4493446
Resolved:
April 09, 2019 10:00 AM PT

Opened:
March 12, 2019 10:00 AM PT
Devices with winsock kernel client may receive error
After installing KB4489881, devices with a winsock kernel client may receive D1, FC, and other errors. Additionally, systems that run the Skype for Business or Lync Server Edge Transport role may be affected by this issue.

Affected platforms: 
  • Client: Windows 8.1 
  • Server: Windows Server 2012 R2 

Resolution: This issue is resolved in KB4489893.

Back to top
March 12, 2019
KB4489881
Resolved
KB4489893
Resolved:
March 19, 2019 10:00 AM PT

Opened:
March 12, 2019 10:00 AM PT
" @@ -79,9 +79,9 @@ sections: - type: markdown text: " - - - + + +
DetailsAffected buildStatusHistory
Embedded objects may display incorrectly
Any compound document (OLE) server application that places embedded objects into the Windows Metafile (WMF) using the PatBlt API may display embedded objects incorrectly.

For example, if you paste a Microsoft Excel worksheet object into a Microsoft Word document, the cells may render with a different background color.

Affected platforms: 
  • Client: Windows 8.1 
  • Server: Windows Server 2012 R2 

Resolution: This issue is resolved in KB4493446.

Back to top
February 12, 2019
KB4487000
Resolved
KB4493446
Resolved:
April 09, 2019 10:00 AM PT

Opened:
February 12, 2019 10:00 AM PT
Error 1309 when installing/uninstalling MSI or MSP files
After installing KB4487016, users may receive “Error 1309” while installing or uninstalling certain types of MSI and MSP files.

Affected platforms: 
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 8.1 
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2 

Resolution: This issue is resolved in KB4489881.

Back to top
February 19, 2019
KB4487016
Resolved
KB4489881
Resolved:
March 12, 2019 10:00 AM PT

Opened:
February 19, 2019 02:00 PM PT
Internet Explorer may fail to load images
After installing KB4487000, Internet Explorer may fail to load images with a backslash (\\) in their relative source path.

Affected platforms: 
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 8.1; Windows 7, Service Pack 1 
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2; Windows Server 2008 R2 SP1 

Resolution: This issue is resolved in KB4487016.

Back to top
February 12, 2019
KB4487000
Resolved
KB4487016
Resolved:
February 19, 2019 02:00 PM PT

Opened:
February 12, 2019 10:00 AM PT
Embedded objects may display incorrectly
Any compound document (OLE) server application that places embedded objects into the Windows Metafile (WMF) using the PatBlt API may display embedded objects incorrectly.

For example, if you paste a Microsoft Excel worksheet object into a Microsoft Word document, the cells may render with a different background color.

Affected platforms: 
  • Client: Windows 8.1 
  • Server: Windows Server 2012 R2 

Resolution: This issue is resolved in KB4493446.

Back to top
February 12, 2019
KB4487000
Resolved
KB4493446
Resolved:
April 09, 2019 10:00 AM PT

Opened:
February 12, 2019 10:00 AM PT
Error 1309 when installing/uninstalling MSI or MSP files
After installing KB4487016, users may receive “Error 1309” while installing or uninstalling certain types of MSI and MSP files.

Affected platforms: 
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 8.1 
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2 

Resolution: This issue is resolved in KB4489881.

Back to top
February 19, 2019
KB4487016
Resolved
KB4489881
Resolved:
March 12, 2019 10:00 AM PT

Opened:
February 19, 2019 02:00 PM PT
Internet Explorer may fail to load images
After installing KB4487000, Internet Explorer may fail to load images with a backslash (\\) in their relative source path.

Affected platforms: 
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 8.1; Windows 7, Service Pack 1 
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2; Windows Server 2008 R2 SP1 

Resolution: This issue is resolved in KB4487016.

Back to top
February 12, 2019
KB4487000
Resolved
KB4487016
Resolved:
February 19, 2019 02:00 PM PT

Opened:
February 12, 2019 10:00 AM PT
" @@ -90,12 +90,12 @@ sections: - type: markdown text: " - - - - - - + + + + + +
DetailsAffected buildStatusHistory
Internet Explorer 11 authentication issue with multiple concurrent logons
After installing KB4480963, Internet Explorer 11 and other applications that use WININET.DLL may have authentication issues. This occurs when two or more people use the same user account for multiple, concurrent login sessions on the same Windows Server machine, including Remote Desktop Protocol (RDP) and Terminal Server logons. Symptoms reported by customers include, but may not be limited to:

  • Cache size and location show zero or empty.
  • Keyboard shortcuts may not work properly.
  • Webpages may intermittently fail to load or render correctly.
  • Issues with credential prompts.
  • Issues when downloading files.

Affected platforms: 
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10 Enterprise LTSC 2016; Windows 8.1; Windows 7, Service Pack 1 
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server 2016; Windows Server 2012 R2; Windows Server 2008 R2 SP1 

Resolution: This issue is resolved in KB4493446.


Back to top
January 08, 2019
KB4480963
Resolved
KB4493446
Resolved:
April 09, 2019 10:00 AM PT

Opened:
January 08, 2019 10:00 AM PT
MSXML6 may cause applications to stop responding.
After installing KB4480963, MSXML6 causes applications to stop responding if an exception was thrown during node operations, such as appendChild(), insertBefore(), and moveNode().

The Group Policy editor may stop responding when editing a Group Policy Object (GPO) that contains Group Policy Preferences (GPP) for Internet Explorer 10 settings.

Resolution: This issue is resolved in KB4493446.

Back to top
January 08, 2019
KB4480963
Resolved
KB4493446
Resolved:
April 09, 2019 10:00 AM PT

Opened:
January 08, 2019 10:00 AM PT
First character of the Japanese era name not recognized as an abbreviation
After installing KB4480969, the first character of the Japanese era name is not recognized as an abbreviation and may cause date parsing issues.

Affected platforms: 
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 8.1; Windows 7, Service Pack 1 
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2; Windows Server 2008 R2 SP1 

Resolution: This issue is resolved in KB4487016.

Back to top
January 15, 2019
KB4480969
Resolved
KB4487016
Resolved:
February 19, 2019 02:00 PM PT

Opened:
January 15, 2019 10:00 AM PT
Virtual machines fail to restore
After installing KB4480963, virtual machines (VM) may fail to restore successfully if the VM has been saved and restored once before. The error message is, “Failed to restore the virtual machine state: Cannot restore this virtual machine because the saved state data cannot be read. Delete the saved state data and then try to start the virtual machine. (0xC0370027).”

This affects AMD Bulldozer Family 15h, AMD Jaguar Family 16h, and AMD Puma Family 16h (second generation) microarchitectures.

Resolution: This issue is resolved in KB4490512.

Back to top
January 08, 2019
KB4480963
Resolved
KB4490512
Resolved:
February 19, 2019 02:00 PM PT

Opened:
January 08, 2019 10:00 AM PT
Applications using Microsoft Jet database fail to open
Applications that use a Microsoft Jet database with the Microsoft Access 97 file format may fail to open if the database has column names greater than 32 characters. The database will fail to open with the error, “Unrecognized Database Format”.

Affected platforms: 
  • Client: Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 8.1; Windows 7, Service Pack 1 
  • Server: Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2; Windows Server 2008 R2 SP1 

Resolution: This issue is resolved in KB4487000.

Back to top
January 08, 2019
KB4480963
Resolved
KB4487000
Resolved:
February 12, 2019 10:00 AM PT

Opened:
January 08, 2019 10:00 AM PT
Unable to access hotspots with third-party applications
After installing KB4480963, third-party applications may have difficulty authenticating hotspots.

Affected platforms: 
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 8.1 
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2 

Resolution: This issue is resolved in KB4480969.

Back to top
January 08, 2019
KB4480963
Resolved
KB4480969
Resolved:
January 15, 2019 10:00 AM PT

Opened:
January 08, 2019 10:00 AM PT
Internet Explorer 11 authentication issue with multiple concurrent logons
After installing KB4480963, Internet Explorer 11 and other applications that use WININET.DLL may have authentication issues. This occurs when two or more people use the same user account for multiple, concurrent login sessions on the same Windows Server machine, including Remote Desktop Protocol (RDP) and Terminal Server logons. Symptoms reported by customers include, but may not be limited to:

  • Cache size and location show zero or empty.
  • Keyboard shortcuts may not work properly.
  • Webpages may intermittently fail to load or render correctly.
  • Issues with credential prompts.
  • Issues when downloading files.

Affected platforms: 
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10 Enterprise LTSC 2016; Windows 8.1; Windows 7, Service Pack 1 
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server 2016; Windows Server 2012 R2; Windows Server 2008 R2 SP1 

Resolution: This issue is resolved in KB4493446.


Back to top
January 08, 2019
KB4480963
Resolved
KB4493446
Resolved:
April 09, 2019 10:00 AM PT

Opened:
January 08, 2019 10:00 AM PT
MSXML6 may cause applications to stop responding.
After installing KB4480963, MSXML6 causes applications to stop responding if an exception was thrown during node operations, such as appendChild(), insertBefore(), and moveNode().

The Group Policy editor may stop responding when editing a Group Policy Object (GPO) that contains Group Policy Preferences (GPP) for Internet Explorer 10 settings.

Resolution: This issue is resolved in KB4493446.

Back to top
January 08, 2019
KB4480963
Resolved
KB4493446
Resolved:
April 09, 2019 10:00 AM PT

Opened:
January 08, 2019 10:00 AM PT
First character of the Japanese era name not recognized as an abbreviation
After installing KB4480969, the first character of the Japanese era name is not recognized as an abbreviation and may cause date parsing issues.

Affected platforms: 
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 8.1; Windows 7, Service Pack 1 
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2; Windows Server 2008 R2 SP1 

Resolution: This issue is resolved in KB4487016.

Back to top
January 15, 2019
KB4480969
Resolved
KB4487016
Resolved:
February 19, 2019 02:00 PM PT

Opened:
January 15, 2019 10:00 AM PT
Virtual machines fail to restore
After installing KB4480963, virtual machines (VM) may fail to restore successfully if the VM has been saved and restored once before. The error message is, “Failed to restore the virtual machine state: Cannot restore this virtual machine because the saved state data cannot be read. Delete the saved state data and then try to start the virtual machine. (0xC0370027).”

This affects AMD Bulldozer Family 15h, AMD Jaguar Family 16h, and AMD Puma Family 16h (second generation) microarchitectures.

Resolution: This issue is resolved in KB4490512.

Back to top
January 08, 2019
KB4480963
Resolved
KB4490512
Resolved:
February 19, 2019 02:00 PM PT

Opened:
January 08, 2019 10:00 AM PT
Applications using Microsoft Jet database fail to open
Applications that use a Microsoft Jet database with the Microsoft Access 97 file format may fail to open if the database has column names greater than 32 characters. The database will fail to open with the error, “Unrecognized Database Format”.

Affected platforms: 
  • Client: Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 8.1; Windows 7, Service Pack 1 
  • Server: Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2; Windows Server 2008 R2 SP1 

Resolution: This issue is resolved in KB4487000.

Back to top
January 08, 2019
KB4480963
Resolved
KB4487000
Resolved:
February 12, 2019 10:00 AM PT

Opened:
January 08, 2019 10:00 AM PT
Unable to access hotspots with third-party applications
After installing KB4480963, third-party applications may have difficulty authenticating hotspots.

Affected platforms: 
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 8.1 
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2 

Resolution: This issue is resolved in KB4480969.

Back to top
January 08, 2019
KB4480963
Resolved
KB4480969
Resolved:
January 15, 2019 10:00 AM PT

Opened:
January 08, 2019 10:00 AM PT
" @@ -104,6 +104,6 @@ sections: - type: markdown text: " - +
DetailsAffected buildStatusHistory
Unable to use Seek bar in Windows Media Player
After installing KB4462926, users may not be able to use the Seek Bar in Windows Media Player when playing specific files. This issue does not affect normal playback.

Affected platforms: 
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 8.1; Windows 7, Service Pack 1 
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2; Windows Server 2008 R2 SP1 

Resolution: This issue is resolved in KB4471320.

Back to top
October 09, 2018
KB4462926
Resolved
KB4471320
Resolved:
December 11, 2018 10:00 AM PT

Opened:
October 09, 2018 10:00 AM PT
Unable to use Seek bar in Windows Media Player
After installing KB4462926, users may not be able to use the Seek Bar in Windows Media Player when playing specific files. This issue does not affect normal playback.

Affected platforms: 
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 8.1; Windows 7, Service Pack 1 
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2; Windows Server 2008 R2 SP1 

Resolution: This issue is resolved in KB4471320.

Back to top
October 09, 2018
KB4462926
Resolved
KB4471320
Resolved:
December 11, 2018 10:00 AM PT

Opened:
October 09, 2018 10:00 AM PT
" diff --git a/windows/release-information/status-windows-10-1507.yml b/windows/release-information/status-windows-10-1507.yml index b951fd389b..fedaa4b7e4 100644 --- a/windows/release-information/status-windows-10-1507.yml +++ b/windows/release-information/status-windows-10-1507.yml @@ -58,7 +58,7 @@ sections: - title: Known issues - items: - type: markdown - text: " + text: "
This table offers a summary of current active issues and those issues that have been resolved in the last 30 days.
@@ -77,7 +77,7 @@ sections: - type: markdown text: "
SummaryAffected buildStatusLast updated
MSXML6 may cause applications to stop responding
MSXML6 may cause applications to stop responding if an exception was thrown during node operations, such as appendChild(), insertBefore(), and moveNode().

See details >
OS Build 10240.18094

January 08, 2019
KB4480962
Resolved
KB4493475
April 09, 2019 10:00 AM PT
Custom URI schemes may not start corresponding application
Custom URI schemes for application protocol handlers may not start the corresponding application for local intranet and trusted sites in Internet Explorer.

See details >
OS Build 10240.18158

March 12, 2019
KB4489872
Resolved
KB4493475
April 09, 2019 10:00 AM PT
- +
DetailsAffected buildStatusHistory
Custom URI schemes may not start corresponding application
After installing KB4489872, Custom URI Schemes for Application Protocol handlers may not start the corresponding application for local intranet and trusted sites on Internet Explorer.

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 8.1; Windows 7, Service Pack 1 
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2; Windows Server 2008 R2 SP1

Resolution: This issue was resolved in KB4493475.

Back to top
OS Build 10240.18158

March 12, 2019
KB4489872
Resolved
KB4493475
Resolved:
April 09, 2019 10:00 AM PT

Opened:
March 12, 2019 10:00 AM PT
Custom URI schemes may not start corresponding application
After installing KB4489872, Custom URI Schemes for Application Protocol handlers may not start the corresponding application for local intranet and trusted sites on Internet Explorer.

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 8.1; Windows 7, Service Pack 1 
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2; Windows Server 2008 R2 SP1

Resolution: This issue was resolved in KB4493475.

Back to top
OS Build 10240.18158

March 12, 2019
KB4489872
Resolved
KB4493475
Resolved:
April 09, 2019 10:00 AM PT

Opened:
March 12, 2019 10:00 AM PT
" @@ -86,6 +86,6 @@ sections: - type: markdown text: " - +
DetailsAffected buildStatusHistory
MSXML6 may cause applications to stop responding
After installing KB4480962, MSXML6 causes applications to stop responding if an exception was thrown during node operations, such as appendChild(), insertBefore(), and moveNode().

The Group Policy editor may stop responding when editing a Group Policy Object (GPO) that contains Group Policy Preferences (GPP) for Internet Explorer 10 settings.

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 8.1
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2

Resolution: This issue was resolved in KB4493475.

Back to top
OS Build 10240.18094

January 08, 2019
KB4480962
Resolved
KB4493475
Resolved:
April 09, 2019 10:00 AM PT

Opened:
January 08, 2019 10:00 AM PT
MSXML6 may cause applications to stop responding
After installing KB4480962, MSXML6 causes applications to stop responding if an exception was thrown during node operations, such as appendChild(), insertBefore(), and moveNode().

The Group Policy editor may stop responding when editing a Group Policy Object (GPO) that contains Group Policy Preferences (GPP) for Internet Explorer 10 settings.

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 8.1
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2

Resolution: This issue was resolved in KB4493475.

Back to top
OS Build 10240.18094

January 08, 2019
KB4480962
Resolved
KB4493475
Resolved:
April 09, 2019 10:00 AM PT

Opened:
January 08, 2019 10:00 AM PT
" diff --git a/windows/release-information/status-windows-10-1607-and-windows-server-2016.yml b/windows/release-information/status-windows-10-1607-and-windows-server-2016.yml index 9c6bd050d3..6ee300bcd4 100644 --- a/windows/release-information/status-windows-10-1607-and-windows-server-2016.yml +++ b/windows/release-information/status-windows-10-1607-and-windows-server-2016.yml @@ -58,7 +58,7 @@ sections: - title: Known issues - items: - type: markdown - text: " + text: "
This table offers a summary of current active issues and those issues that have been resolved in the last 30 days.
@@ -83,9 +83,9 @@ sections: - type: markdown text: "
SummaryAffected buildStatusLast updated
End-user-defined characters (EUDC) cause blue screen at startup
If you enable per font end-user-defined characters (EUDC), the system will stop working and a blue screen may appear at startup.

See details >
OS Build 14393.2879

March 19, 2019
KB4489889
Resolved
KB4493470
April 09, 2019 10:00 AM PT
Internet Explorer 11 authentication issue with multiple concurrent logons
Internet Explorer 11 users may encounter issues if two or more people use the same user account for multiple, concurrent login sessions on the same Windows Server machine.

See details >
OS Build 14393.2724

January 08, 2019
KB4480961
Resolved
KB4493470
April 09, 2019 10:00 AM PT
- - - + + +
DetailsAffected buildStatusHistory
End-user-defined characters (EUDC) cause blue screen at startup
If you enable per font end-user-defined characters (EUDC), the system will stop working and a blue screen may appear at startup. This is not a common setting in non-Asian regions.

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016

Resolution: This issue was resolved in KB4493470.

Back to top
OS Build 14393.2879

March 19, 2019
KB4489889
Resolved
KB4493470
Resolved:
April 09, 2019 10:00 AM PT

Opened:
March 19, 2019 10:00 AM PT
Custom URI schemes may not start corresponding application
After installing KB4489882, Custom URI schemes for application protocol handlers may not start the corresponding application for local intranet and trusted sites security zones on Internet Explorer.

Affected platforms: 
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 8.1; Windows 7, Service Pack 1 
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2; Windows Server 2008 R2 SP1

Workaround: Right-click the URL link to open it in a new window or tab, or enable Protected Mode in Internet Explorer for local intranet and trusted sites

  1. Go to Tools > Internet options > Security.
  2. Within Select a zone to view or change security settings, select Local intranet and then select Enable Protected Mode.
  3. Select Trusted sites and then select Enable Protected Mode.
  4. Select OK.

You must restart the browser after making these changes.

Next steps: Microsoft is working on a resolution and will provide an update in an upcoming release.

Back to top
OS Build 14393.2848

March 12, 2019
KB4489882
Mitigated
Last updated:
March 19, 2019 10:00 AM PT

Opened:
March 12, 2019 10:00 AM PT
Issue using PXE to start a device from WDS
After installing KB4489882, there may be issues using the Preboot Execution Environment (PXE) to start a device from a Windows Deployment Services (WDS) server configured to use Variable Window Extension. This may cause the connection to the WDS server to terminate prematurely while downloading the image. This issue does not affect clients or devices that are not using Variable Window Extension.

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10 Enterprise LTSC 2016; Windows 8.1
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server 2016; Windows Server 2012 R2

Workaround: To mitigate the issue, disable the Variable Window Extension on WDS server using one of the following options:

Option 1:
Open an Administrator Command prompt and type the following:

Wdsutil /Set-TransportServer /EnableTftpVariableWindowExtension:No

Option 2:
Use the Windows Deployment Services UI to make the following adjustment:

1. Open Windows Deployment Services from Windows Administrative Tools.
2. Expand Servers and right-click a WDS server.
3. Open its properties and clear the Enable Variable Window Extension box on the TFTP tab.

Option 3:
Set the following registry value to 0:

HKLM\\System\\CurrentControlSet\\Services\\WDSServer\\Providers\\WDSTFTP\\EnableVariableWindowExtension

Restart the WDSServer service after disabling the Variable Window Extension.

Next steps: Microsoft is working on a resolution and will provide an update in an upcoming release.

Back to top
OS Build 14393.2848

March 12, 2019
KB4489882
Mitigated
Last updated:
March 19, 2019 10:00 AM PT

Opened:
March 12, 2019 10:00 AM PT
End-user-defined characters (EUDC) cause blue screen at startup
If you enable per font end-user-defined characters (EUDC), the system will stop working and a blue screen may appear at startup. This is not a common setting in non-Asian regions.

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016

Resolution: This issue was resolved in KB4493470.

Back to top
OS Build 14393.2879

March 19, 2019
KB4489889
Resolved
KB4493470
Resolved:
April 09, 2019 10:00 AM PT

Opened:
March 19, 2019 10:00 AM PT
Custom URI schemes may not start corresponding application
After installing KB4489882, Custom URI schemes for application protocol handlers may not start the corresponding application for local intranet and trusted sites security zones on Internet Explorer.

Affected platforms: 
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 8.1; Windows 7, Service Pack 1 
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2; Windows Server 2008 R2 SP1

Workaround: Right-click the URL link to open it in a new window or tab, or enable Protected Mode in Internet Explorer for local intranet and trusted sites

  1. Go to Tools > Internet options > Security.
  2. Within Select a zone to view or change security settings, select Local intranet and then select Enable Protected Mode.
  3. Select Trusted sites and then select Enable Protected Mode.
  4. Select OK.

You must restart the browser after making these changes.

Next steps: Microsoft is working on a resolution and will provide an update in an upcoming release.

Back to top
OS Build 14393.2848

March 12, 2019
KB4489882
Mitigated
Last updated:
March 19, 2019 10:00 AM PT

Opened:
March 12, 2019 10:00 AM PT
Issue using PXE to start a device from WDS
After installing KB4489882, there may be issues using the Preboot Execution Environment (PXE) to start a device from a Windows Deployment Services (WDS) server configured to use Variable Window Extension. This may cause the connection to the WDS server to terminate prematurely while downloading the image. This issue does not affect clients or devices that are not using Variable Window Extension.

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10 Enterprise LTSC 2016; Windows 8.1
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server 2016; Windows Server 2012 R2

Workaround: To mitigate the issue, disable the Variable Window Extension on WDS server using one of the following options:

Option 1:
Open an Administrator Command prompt and type the following:

Wdsutil /Set-TransportServer /EnableTftpVariableWindowExtension:No

Option 2:
Use the Windows Deployment Services UI to make the following adjustment:

1. Open Windows Deployment Services from Windows Administrative Tools.
2. Expand Servers and right-click a WDS server.
3. Open its properties and clear the Enable Variable Window Extension box on the TFTP tab.

Option 3:
Set the following registry value to 0:

HKLM\\System\\CurrentControlSet\\Services\\WDSServer\\Providers\\WDSTFTP\\EnableVariableWindowExtension

Restart the WDSServer service after disabling the Variable Window Extension.

Next steps: Microsoft is working on a resolution and will provide an update in an upcoming release.

Back to top
OS Build 14393.2848

March 12, 2019
KB4489882
Mitigated
Last updated:
March 19, 2019 10:00 AM PT

Opened:
March 12, 2019 10:00 AM PT
" @@ -94,8 +94,8 @@ sections: - type: markdown text: " - - + +
DetailsAffected buildStatusHistory
Internet Explorer 11 authentication issue with multiple concurrent logons
After installing KB4480961, Internet Explorer 11 and other applications that use WININET.DLL may have authentication issues. This occurs when two or more people use the same user account for multiple, concurrent login sessions on the same Windows Server machine, including Remote Desktop Protocol (RDP) and Terminal Server logons. Symptoms reported by customers include, but may not be limited to:

  • Cache size and location show zero or empty.
  • Keyboard shortcuts may not work properly.
  • Webpages may intermittently fail to load or render correctly.
  • Issues with credential prompts.
  • Issues when downloading files.

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10 Enterprise LTSC 2016; Windows 8.1; Windows 7, Service Pack 1
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server 2016; Windows Server 2012 R2; Windows Server 2008 R2 SP1

Resolution: This issue was resolved in KB4493470.

Back to top
OS Build 14393.2724

January 08, 2019
KB4480961
Resolved
KB4493470
Resolved:
April 09, 2019 10:00 AM PT

Opened:
January 08, 2019 10:00 AM PT
MSXML6 may cause applications to stop responding
After installing KB4480961, MSXML6 causes applications to stop responding if an exception was thrown during node operations, such as appendChild(), insertBefore(), and moveNode().

The Group Policy editor may stop responding when editing a Group Policy Object (GPO) that contains Group Policy Preferences (GPP) for Internet Explorer 10 settings.

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 8.1
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2

Resolution: This issue was resolved in KB4493470.

Back to top
OS Build 14393.2724

January 08, 2019
KB4480961
Resolved
KB4493470
Resolved:
April 09, 2019 10:00 AM PT

Opened:
January 08, 2019 10:00 AM PT
Internet Explorer 11 authentication issue with multiple concurrent logons
After installing KB4480961, Internet Explorer 11 and other applications that use WININET.DLL may have authentication issues. This occurs when two or more people use the same user account for multiple, concurrent login sessions on the same Windows Server machine, including Remote Desktop Protocol (RDP) and Terminal Server logons. Symptoms reported by customers include, but may not be limited to:

  • Cache size and location show zero or empty.
  • Keyboard shortcuts may not work properly.
  • Webpages may intermittently fail to load or render correctly.
  • Issues with credential prompts.
  • Issues when downloading files.

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10 Enterprise LTSC 2016; Windows 8.1; Windows 7, Service Pack 1
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server 2016; Windows Server 2012 R2; Windows Server 2008 R2 SP1

Resolution: This issue was resolved in KB4493470.

Back to top
OS Build 14393.2724

January 08, 2019
KB4480961
Resolved
KB4493470
Resolved:
April 09, 2019 10:00 AM PT

Opened:
January 08, 2019 10:00 AM PT
MSXML6 may cause applications to stop responding
After installing KB4480961, MSXML6 causes applications to stop responding if an exception was thrown during node operations, such as appendChild(), insertBefore(), and moveNode().

The Group Policy editor may stop responding when editing a Group Policy Object (GPO) that contains Group Policy Preferences (GPP) for Internet Explorer 10 settings.

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 8.1
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2

Resolution: This issue was resolved in KB4493470.

Back to top
OS Build 14393.2724

January 08, 2019
KB4480961
Resolved
KB4493470
Resolved:
April 09, 2019 10:00 AM PT

Opened:
January 08, 2019 10:00 AM PT
" @@ -104,8 +104,8 @@ sections: - type: markdown text: " - - - + + +
DetailsAffected buildStatusHistory
Cluster service may fail if the minimum password length is set to greater than 14
After installing KB4467684, the cluster service may fail to start with the error \"2245 (NERR_PasswordTooShort)\" if the Group Policy \"Minimum Password Length\" is configured with greater than 14 characters.

Affected platforms:
  • Client: Windows 10 Enterprise LTSC 2016
  • Server: Windows Server 2016

Workaround: Set the domain default \"Minimum Password Length\" policy to less than or equal to 14 characters.

Next steps: Microsoft is working on a resolution and will provide an update in an upcoming release.

Back to top
OS Build 14393.2639

November 27, 2018
KB4467684
Mitigated
Last updated:
March 19, 2019 10:00 AM PT

Opened:
November 27, 2018 10:00 AM PT
SCVMM cannot enumerate and manage logical switches deployed on the host
For hosts managed by System Center Virtual Machine Manager (VMM), VMM cannot enumerate and manage logical switches deployed on the host after installing KB4467684.

Additionally, if you do not follow the best practices, a stop error may occur in vfpext.sys on the hosts.

Affected platforms:
  • Client: Windows 10 Enterprise LTSC 2016
  • Server: Windows Server 2016

Workaround:
Run mofcomp on the following mof files on the affected host:

  • Scvmmswitchportsettings.mof
  • VMMDHCPSvr.mof

Follow the best practices while patching to avoid a stop error in vfpext.sys in an SDN v2 environment (NC managed hosts).

Back to top
OS Build 14393.2639

November 27, 2018
KB4467684
Mitigated
Last updated:
March 19, 2019 10:00 AM PT

Opened:
November 27, 2018 10:00 AM PT
Windows may not start on certain Lenovo and Fujitsu laptops with less than 8GB of RAM
After installing KB4467691, Windows may fail to start on certain Lenovo and Fujitsu laptops that have less than 8 GB of RAM.

Affected platforms:
  • Client: Windows 10 Enterprise LTSC 2016
  • Server: Windows Server 2016

Workaround: Restart the affected machine using the Unified Extensible Firmware Interface (UEFI). Disable Secure Boot and then restart.

If BitLocker is enabled on your machine, you may have to go through BitLocker recovery after Secure Boot has been disabled.

Next steps: Lenovo and Fujitsu are aware of this issue. Please contact your OEM to ask if there is a firmware update available for your device.

Back to top
OS Build 14393.2608

November 13, 2018
KB4467691
Mitigated
Last updated:
February 19, 2019 10:00 AM PT

Opened:
November 13, 2018 10:00 AM PT
Cluster service may fail if the minimum password length is set to greater than 14
After installing KB4467684, the cluster service may fail to start with the error \"2245 (NERR_PasswordTooShort)\" if the Group Policy \"Minimum Password Length\" is configured with greater than 14 characters.

Affected platforms:
  • Client: Windows 10 Enterprise LTSC 2016
  • Server: Windows Server 2016

Workaround: Set the domain default \"Minimum Password Length\" policy to less than or equal to 14 characters.

Next steps: Microsoft is working on a resolution and will provide an update in an upcoming release.

Back to top
OS Build 14393.2639

November 27, 2018
KB4467684
Mitigated
Last updated:
March 19, 2019 10:00 AM PT

Opened:
November 27, 2018 10:00 AM PT
SCVMM cannot enumerate and manage logical switches deployed on the host
For hosts managed by System Center Virtual Machine Manager (VMM), VMM cannot enumerate and manage logical switches deployed on the host after installing KB4467684.

Additionally, if you do not follow the best practices, a stop error may occur in vfpext.sys on the hosts.

Affected platforms:
  • Client: Windows 10 Enterprise LTSC 2016
  • Server: Windows Server 2016

Workaround:
Run mofcomp on the following mof files on the affected host:

  • Scvmmswitchportsettings.mof
  • VMMDHCPSvr.mof

Follow the best practices while patching to avoid a stop error in vfpext.sys in an SDN v2 environment (NC managed hosts).

Back to top
OS Build 14393.2639

November 27, 2018
KB4467684
Mitigated
Last updated:
March 19, 2019 10:00 AM PT

Opened:
November 27, 2018 10:00 AM PT
Windows may not start on certain Lenovo and Fujitsu laptops with less than 8GB of RAM
After installing KB4467691, Windows may fail to start on certain Lenovo and Fujitsu laptops that have less than 8 GB of RAM.

Affected platforms:
  • Client: Windows 10 Enterprise LTSC 2016
  • Server: Windows Server 2016

Workaround: Restart the affected machine using the Unified Extensible Firmware Interface (UEFI). Disable Secure Boot and then restart.

If BitLocker is enabled on your machine, you may have to go through BitLocker recovery after Secure Boot has been disabled.

Next steps: Lenovo and Fujitsu are aware of this issue. Please contact your OEM to ask if there is a firmware update available for your device.

Back to top
OS Build 14393.2608

November 13, 2018
KB4467691
Mitigated
Last updated:
February 19, 2019 10:00 AM PT

Opened:
November 13, 2018 10:00 AM PT
" diff --git a/windows/release-information/status-windows-10-1703.yml b/windows/release-information/status-windows-10-1703.yml index 932378b491..82233a80b3 100644 --- a/windows/release-information/status-windows-10-1703.yml +++ b/windows/release-information/status-windows-10-1703.yml @@ -58,7 +58,7 @@ sections: - title: Known issues - items: - type: markdown - text: " + text: "
This table offers a summary of current active issues and those issues that have been resolved in the last 30 days.
@@ -78,8 +78,8 @@ sections: - type: markdown text: "
SummaryAffected buildStatusLast updated
End-user-defined characters (EUDC) may cause blue screen at startup
If you enable per font end-user-defined characters (EUDC), the system may stop working and a blue screen may appear at startup.

See details >
OS Build 15063.1716

March 19, 2019
KB4489888
Resolved
KB4493474
April 09, 2019 10:00 AM PT
MSXML6 may cause applications to stop responding
MSXML6 may cause applications to stop responding if an exception was thrown during node operations, such as appendChild(), insertBefore(), and moveNode().

See details >
OS Build 15063.1563

January 08, 2019
KB4480973
Resolved
KB4493474
April 09, 2019 10:00 AM PT
- - + +
DetailsAffected buildStatusHistory
End-user-defined characters (EUDC) may cause blue screen at startup
If you enable per font end-user-defined characters (EUDC), the system may stop working and a blue screen may appear at startup. This is not a common setting in non-Asian regions.

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016

Resolution: This issue was resolved in KB4493474.

Back to top
OS Build 15063.1716

March 19, 2019
KB4489888
Resolved
KB4493474
Resolved:
April 09, 2019 10:00 AM PT

Opened:
March 19, 2019 10:00 AM PT
Custom URI schemes may not start corresponding application
After installing KB4489871, custom URI schemes for application protocol handlers may not start the corresponding application for local intranet and trusted sites security zones on Internet Explorer.

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 8.1; Windows 7, Service Pack 1 
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2; Windows Server 2008 R2 SP1

Workaround: Right-click the URL link to open it in a new window or tab, or enable Protected Mode in Internet Explorer for local intranet and trusted sites

1. Go to Tools > Internet options > Security.
2. Within Select a zone to view or change security settings, select Local intranet and then select Enable Protected Mode.
3. Select Trusted sites and then select Enable Protected Mode.
4. Select OK.

You must restart the browser after making these changes.

Next steps: Microsoft is working on a resolution and will provide an update in an upcoming release.

Back to top
OS Build 15063.1689

March 12, 2019
KB4489871
Mitigated
Last updated:
March 19, 2019 10:00 AM PT

Opened:
March 12, 2019 10:00 AM PT
End-user-defined characters (EUDC) may cause blue screen at startup
If you enable per font end-user-defined characters (EUDC), the system may stop working and a blue screen may appear at startup. This is not a common setting in non-Asian regions.

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016

Resolution: This issue was resolved in KB4493474.

Back to top
OS Build 15063.1716

March 19, 2019
KB4489888
Resolved
KB4493474
Resolved:
April 09, 2019 10:00 AM PT

Opened:
March 19, 2019 10:00 AM PT
Custom URI schemes may not start corresponding application
After installing KB4489871, custom URI schemes for application protocol handlers may not start the corresponding application for local intranet and trusted sites security zones on Internet Explorer.

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 8.1; Windows 7, Service Pack 1 
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2; Windows Server 2008 R2 SP1

Workaround: Right-click the URL link to open it in a new window or tab, or enable Protected Mode in Internet Explorer for local intranet and trusted sites

1. Go to Tools > Internet options > Security.
2. Within Select a zone to view or change security settings, select Local intranet and then select Enable Protected Mode.
3. Select Trusted sites and then select Enable Protected Mode.
4. Select OK.

You must restart the browser after making these changes.

Next steps: Microsoft is working on a resolution and will provide an update in an upcoming release.

Back to top
OS Build 15063.1689

March 12, 2019
KB4489871
Mitigated
Last updated:
March 19, 2019 10:00 AM PT

Opened:
March 12, 2019 10:00 AM PT
" @@ -88,6 +88,6 @@ sections: - type: markdown text: " - +
DetailsAffected buildStatusHistory
MSXML6 may cause applications to stop responding
After installing KB4480973, MSXML6 causes applications to stop responding if an exception was thrown during node operations, such as appendChild(), insertBefore(), and moveNode().

The Group Policy editor may stop responding when editing a Group Policy Object (GPO) that contains Group Policy Preferences (GPP) for Internet Explorer 10 settings.

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 8.1
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2

Resolution: This issue was resolved in KB4493474.

Back to top
OS Build 15063.1563

January 08, 2019
KB4480973
Resolved
KB4493474
Resolved:
April 09, 2019 10:00 AM PT

Opened:
January 08, 2019 10:00 AM PT
MSXML6 may cause applications to stop responding
After installing KB4480973, MSXML6 causes applications to stop responding if an exception was thrown during node operations, such as appendChild(), insertBefore(), and moveNode().

The Group Policy editor may stop responding when editing a Group Policy Object (GPO) that contains Group Policy Preferences (GPP) for Internet Explorer 10 settings.

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 8.1
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2

Resolution: This issue was resolved in KB4493474.

Back to top
OS Build 15063.1563

January 08, 2019
KB4480973
Resolved
KB4493474
Resolved:
April 09, 2019 10:00 AM PT

Opened:
January 08, 2019 10:00 AM PT
" diff --git a/windows/release-information/status-windows-10-1709.yml b/windows/release-information/status-windows-10-1709.yml index dde03d0798..1a6af2df2c 100644 --- a/windows/release-information/status-windows-10-1709.yml +++ b/windows/release-information/status-windows-10-1709.yml @@ -58,7 +58,7 @@ sections: - title: Known issues - items: - type: markdown - text: " + text: "
This table offers a summary of current active issues and those issues that have been resolved in the last 30 days.
@@ -79,9 +79,9 @@ sections: - type: markdown text: "
SummaryAffected buildStatusLast updated
End-user-defined characters (EUDC) may cause blue screen at startup
If you enable per font end-user-defined characters (EUDC), the system may stop working and a blue screen may appear at startup.

See details >
OS Build 16299.1059

March 19, 2019
KB4489890
Resolved
KB4493441
April 09, 2019 10:00 AM PT
MSXML6 causes applications to stop responding if an exception was thrown
MSXML6 causes applications to stop responding if an exception was thrown during node operations, such as appendChild(), insertBefore(), and moveNode().

See details >
OS Build 16299.904

January 08, 2019
KB4480978
Resolved
KB4493441
April 09, 2019 10:00 AM PT
- - - + + +
DetailsAffected buildStatusHistory
End-user-defined characters (EUDC) may cause blue screen at startup
If you enable per font end-user-defined characters (EUDC), the system may stop working and a blue screen may appear at startup. This is not a common setting in non-Asian regions.

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016

Resolution: This issue is resolved in KB4493441.

Back to top
OS Build 16299.1059

March 19, 2019
KB4489890
Resolved
KB4493441
Resolved:
April 09, 2019 10:00 AM PT

Opened:
March 19, 2019 10:00 AM PT
Stop error when attempting to start SSH from WSL
After applying KB4489886, a stop error occurs when attempting to start the Secure Shell (SSH) client program from Windows Subsystem for Linux (WSL) with agent forwarding enabled using a command line switch (ssh –A) or a configuration setting.

Affected platforms:
  • Client: Windows 10, version 1803; Windows 10, version 1709
  • Server: Windows Server, version 1803; Windows Server, version 1709

Resolution: This issue is resolved in KB4493441.

Back to top
OS Build 16299.1029

March 12, 2019
KB4489886
Resolved
KB4493441
Resolved:
April 09, 2019 10:00 AM PT

Opened:
March 12, 2019 10:00 AM PT
Custom URI schemes may not start corresponding application
After installing KB4489886, custom URI schemes for application protocol handlers may not start the corresponding application for local intranet and trusted sites security zones on Internet Explorer.

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 8.1; Windows 7, Service Pack 1 
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2; Windows Server 2008 R2 SP1

Workaround: Right-click the URL link to open it in a new window or tab, or enable Protected Mode in Internet Explorer for local intranet and trusted sites

1. Go to Tools > Internet options > Security.
2. Within Select a zone to view or change security settings, select Local intranet and then select Enable Protected Mode.
3. Select Trusted sites and then select Enable Protected Mode.
4. Select OK.

You must restart the browser after making these changes.

Next steps: Microsoft is working on a resolution and will provide an update in an upcoming release.

Back to top
OS Build 16299.1029

March 12, 2019
KB4489886
Mitigated
Last updated:
March 19, 2019 10:00 AM PT

Opened:
March 12, 2019 10:00 AM PT
End-user-defined characters (EUDC) may cause blue screen at startup
If you enable per font end-user-defined characters (EUDC), the system may stop working and a blue screen may appear at startup. This is not a common setting in non-Asian regions.

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016

Resolution: This issue is resolved in KB4493441.

Back to top
OS Build 16299.1059

March 19, 2019
KB4489890
Resolved
KB4493441
Resolved:
April 09, 2019 10:00 AM PT

Opened:
March 19, 2019 10:00 AM PT
Stop error when attempting to start SSH from WSL
After applying KB4489886, a stop error occurs when attempting to start the Secure Shell (SSH) client program from Windows Subsystem for Linux (WSL) with agent forwarding enabled using a command line switch (ssh –A) or a configuration setting.

Affected platforms:
  • Client: Windows 10, version 1803; Windows 10, version 1709
  • Server: Windows Server, version 1803; Windows Server, version 1709

Resolution: This issue is resolved in KB4493441.

Back to top
OS Build 16299.1029

March 12, 2019
KB4489886
Resolved
KB4493441
Resolved:
April 09, 2019 10:00 AM PT

Opened:
March 12, 2019 10:00 AM PT
Custom URI schemes may not start corresponding application
After installing KB4489886, custom URI schemes for application protocol handlers may not start the corresponding application for local intranet and trusted sites security zones on Internet Explorer.

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 8.1; Windows 7, Service Pack 1 
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2; Windows Server 2008 R2 SP1

Workaround: Right-click the URL link to open it in a new window or tab, or enable Protected Mode in Internet Explorer for local intranet and trusted sites

1. Go to Tools > Internet options > Security.
2. Within Select a zone to view or change security settings, select Local intranet and then select Enable Protected Mode.
3. Select Trusted sites and then select Enable Protected Mode.
4. Select OK.

You must restart the browser after making these changes.

Next steps: Microsoft is working on a resolution and will provide an update in an upcoming release.

Back to top
OS Build 16299.1029

March 12, 2019
KB4489886
Mitigated
Last updated:
March 19, 2019 10:00 AM PT

Opened:
March 12, 2019 10:00 AM PT
" @@ -90,6 +90,6 @@ sections: - type: markdown text: " - +
DetailsAffected buildStatusHistory
MSXML6 causes applications to stop responding if an exception was thrown
After installing KB4480978, MSXML6 causes applications to stop responding if an exception was thrown during node operations, such as appendChild(), insertBefore(), and moveNode().

The Group Policy editor may stop responding when editing a Group Policy Object (GPO) that contains Group Policy Preferences (GPP) for Internet Explorer 10 settings.

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 8.1
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2

Resolution: This issue is resolved in KB4493441.

Back to top
OS Build 16299.904

January 08, 2019
KB4480978
Resolved
KB4493441
Resolved:
April 09, 2019 10:00 AM PT

Opened:
January 08, 2019 10:00 AM PT
MSXML6 causes applications to stop responding if an exception was thrown
After installing KB4480978, MSXML6 causes applications to stop responding if an exception was thrown during node operations, such as appendChild(), insertBefore(), and moveNode().

The Group Policy editor may stop responding when editing a Group Policy Object (GPO) that contains Group Policy Preferences (GPP) for Internet Explorer 10 settings.

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 8.1
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2

Resolution: This issue is resolved in KB4493441.

Back to top
OS Build 16299.904

January 08, 2019
KB4480978
Resolved
KB4493441
Resolved:
April 09, 2019 10:00 AM PT

Opened:
January 08, 2019 10:00 AM PT
" diff --git a/windows/release-information/status-windows-10-1803.yml b/windows/release-information/status-windows-10-1803.yml index 5470f7dfec..999cf334ec 100644 --- a/windows/release-information/status-windows-10-1803.yml +++ b/windows/release-information/status-windows-10-1803.yml @@ -58,7 +58,7 @@ sections: - title: Known issues - items: - type: markdown - text: " + text: "
This table offers a summary of current active issues and those issues that have been resolved in the last 30 days.
diff --git a/windows/release-information/status-windows-10-1809-and-windows-server-2019.yml b/windows/release-information/status-windows-10-1809-and-windows-server-2019.yml index 3ddeef1489..039fedd849 100644 --- a/windows/release-information/status-windows-10-1809-and-windows-server-2019.yml +++ b/windows/release-information/status-windows-10-1809-and-windows-server-2019.yml @@ -63,7 +63,7 @@ sections: - title: Known issues - items: - type: markdown - text: " + text: "
This table offers a summary of current active issues and those issues that have been resolved in the last 30 days.
SummaryAffected buildStatusLast updated
End-user-defined characters (EUDC) may cause blue screen at startup
If you enable per font end-user-defined characters (EUDC), the system may stop working and a blue screen may appear at startup.

See details >
OS Build 17134.677

March 19, 2019
KB4489894
Resolved
KB4493464
April 09, 2019 10:00 AM PT
MSXML6 may cause applications to stop responding
MSXML6 may cause applications to stop responding if an exception was thrown during node operations, such as appendChild(), insertBefore(), and moveNode().

See details >
OS Build 17134.523

January 08, 2019
KB4480966
Resolved
KB4493464
April 09, 2019 10:00 AM PT
@@ -87,7 +87,7 @@ sections: - type: markdown text: "
SummaryAffected buildStatusLast updated
End-user-defined characters (EUDC) may cause blue screen at startup
If you enable per font end-user-defined characters (EUDC), the system may stop working and a blue screen may appear at startup.

See details >
OS Build 17763.404

April 02, 2019
KB4490481
Resolved
KB4493509
April 09, 2019 10:00 AM PT
Internet Explorer 11 authentication issue with multiple concurrent logons
Internet Explorer 11 users may encounter issues if two or more people use the same user account for multiple, concurrent login sessions on the same Windows Server machine.

See details >
OS Build 17763.253

January 08, 2019
KB4480116
Resolved
KB4493509
April 09, 2019 10:00 AM PT
- +
DetailsAffected buildStatusHistory
End-user-defined characters (EUDC) may cause blue screen at startup
If you enable per font end-user-defined characters (EUDC), the system will stop working and a blue screen may appear at startup. This is not a common setting in non-Asian regions.

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016

Workaround: To avoid this issue, don't enable per font EUDC. As an alternative, you can edit the registry to mitigate this issue; for more information, see KB4496149.

Resolved: This issue was resolved in KB4493509.

Back to top
OS Build 17763.404

April 02, 2019
KB4490481
Resolved
KB4493509
Resolved:
April 09, 2019 10:00 AM PT

Opened:
April 02, 2019 10:00 AM PT
End-user-defined characters (EUDC) may cause blue screen at startup
If you enable per font end-user-defined characters (EUDC), the system will stop working and a blue screen may appear at startup. This is not a common setting in non-Asian regions.

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016

Workaround: To avoid this issue, don't enable per font EUDC. As an alternative, you can edit the registry to mitigate this issue; for more information, see KB4496149.

Resolved: This issue was resolved in KB4493509.

Back to top
OS Build 17763.404

April 02, 2019
KB4490481
Resolved
KB4493509
Resolved:
April 09, 2019 10:00 AM PT

Opened:
April 02, 2019 10:00 AM PT
" @@ -96,9 +96,9 @@ sections: - type: markdown text: " - - - + +
DetailsAffected buildStatusHistory
Apps may stop working after selecting an audio output device other than the default
After installing KB4482887 on machines that have multiple audio devices, applications that provide advanced options for internal or external audio output devices may stop working unexpectedly. This issue occurs for users that select an audio output device different from the \"Default Audio Device\". Examples of applications that may stop working include: 

  • Windows Media Player 
  • Realtek HD Audio Manager 
  • Sound Blaster Control Panel 

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019
  • Server: Windows Server, version 1809; Windows Server 2019

Workaround: As a temporary solution, select the \"Default Audio Device\" in the options provided by the application; please refer to the application's user manual for details. 
For example, to set the Default Audio Device in Windows Media Player: 

  1. Open Windows Media Player > Tools > Options > Devices.
  2. Select the device and choose Properties.
  3. On the next dialog, from the drop-down menu under Select the Audio Device, choose Default Audio Device from the list.
 
You can then send audio from the application to the audio device you want in the per-application audio settings found under Settings > System > Sound > App Volume and device preferences.

Resolved: This issue was resolved in KB4490481

Back to top
OS Build 17763.348

March 01, 2019
KB4482887
Resolved
KB4490481
Resolved:
April 02, 2019 10:00 AM PT

Opened:
March 01, 2019 10:00 AM PT
Custom URI schemes may not start corresponding application
After installing KB4489899, custom URI schemes for application protocol handlers may not start the corresponding application for local intranet and trusted sites security zones on Internet Explorer.

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 8.1; Windows 7, Service Pack 1 
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2; Windows Server 2008 R2 SP1

Workaround: Right-click the URL link to open it in a new window or tab, or enable Protected Mode in Internet Explorer for local intranet and trusted sites 
 
  1. Go to Tools > Internet options > Security.
  2. Within Select a zone to view of change security settings, select Local intranet and then select Enable Protected Mode.
  3. Select Trusted Sites and then select Enable Protected Mode
  4. Select OK.

You must restart the browser after making these changes. 
 
Next steps: Microsoft is working on a resolution and will provide an update in an upcoming release. 

Back to top
OS Build 17763.379

March 12, 2019
KB4489899
Mitigated
Last updated:
April 02, 2019 10:00 AM PT

Opened:
March 12, 2019 10:00 AM PT
Issue using PXE to start a device from WDS
After installing KB4489899, there may be issues using the Preboot Execution Environment (PXE) to start a device from a Windows Deployment Services (WDS) server configured to use Variable Window Extension. This may cause the connection to the WDS server to terminate prematurely while downloading the image. This issue does not affect clients or devices that are not using Variable Window Extension. 

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10 Enterprise LTSC 2016; Windows 8.1
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server 2016; Windows Server 2012 R2

Workaround: To mitigate the issue, disable the Variable Window Extension on WDS server using one of the following options:

Option 1:
Open an Administrator Command prompt and type the following:

Wdsutil /Set-TransportServer /EnableTftpVariableWindowExtension:No 
+      
Apps may stop working after selecting an audio output device other than the default
After installing KB4482887 on machines that have multiple audio devices, applications that provide advanced options for internal or external audio output devices may stop working unexpectedly. This issue occurs for users that select an audio output device different from the \"Default Audio Device\". Examples of applications that may stop working include: 

  • Windows Media Player 
  • Realtek HD Audio Manager 
  • Sound Blaster Control Panel 

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019
  • Server: Windows Server, version 1809; Windows Server 2019

Workaround: As a temporary solution, select the \"Default Audio Device\" in the options provided by the application; please refer to the application's user manual for details. 
For example, to set the Default Audio Device in Windows Media Player: 

  1. Open Windows Media Player > Tools > Options > Devices.
  2. Select the device and choose Properties.
  3. On the next dialog, from the drop-down menu under Select the Audio Device, choose Default Audio Device from the list.
 
You can then send audio from the application to the audio device you want in the per-application audio settings found under Settings > System > Sound > App Volume and device preferences.

Resolved: This issue was resolved in KB4490481

Back to top
OS Build 17763.348

March 01, 2019
KB4482887
Resolved
KB4490481
Resolved:
April 02, 2019 10:00 AM PT

Opened:
March 01, 2019 10:00 AM PT
Custom URI schemes may not start corresponding application
After installing KB4489899, custom URI schemes for application protocol handlers may not start the corresponding application for local intranet and trusted sites security zones on Internet Explorer.

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 8.1; Windows 7, Service Pack 1 
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2; Windows Server 2008 R2 SP1

Workaround: Right-click the URL link to open it in a new window or tab, or enable Protected Mode in Internet Explorer for local intranet and trusted sites 
 
  1. Go to Tools > Internet options > Security.
  2. Within Select a zone to view of change security settings, select Local intranet and then select Enable Protected Mode.
  3. Select Trusted Sites and then select Enable Protected Mode
  4. Select OK.

You must restart the browser after making these changes. 
 
Next steps: Microsoft is working on a resolution and will provide an update in an upcoming release. 

Back to top
OS Build 17763.379

March 12, 2019
KB4489899
Mitigated
Last updated:
April 02, 2019 10:00 AM PT

Opened:
March 12, 2019 10:00 AM PT
Issue using PXE to start a device from WDS
After installing KB4489899, there may be issues using the Preboot Execution Environment (PXE) to start a device from a Windows Deployment Services (WDS) server configured to use Variable Window Extension. This may cause the connection to the WDS server to terminate prematurely while downloading the image. This issue does not affect clients or devices that are not using Variable Window Extension. 

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10 Enterprise LTSC 2016; Windows 8.1
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server 2016; Windows Server 2012 R2

Workaround: To mitigate the issue, disable the Variable Window Extension on WDS server using one of the following options:

Option 1:
Open an Administrator Command prompt and type the following:

Wdsutil /Set-TransportServer /EnableTftpVariableWindowExtension:No 
 

Option 2:
Use the Windows Deployment Services UI to make the following adjustment: 
  1. Open Windows Deployment Services from Windows Administrative Tools. 
  2. Expand Servers and right-click a WDS server. 
  3. Open its properties and clear the Enable Variable Window Extension box on the TFTP tab.

Option 3:
Set the following registry value to 0: 
 
HKLM\\System\\CurrentControlSet\\Services\\WDSServer\\Providers\\WDSTFTP\\EnableVariableWindowExtension 
 
Restart the WDSServer service after disabling the Variable Window Extension. 

Next steps: Microsoft is working on a resolution and will provide an update in an upcoming release. 

Back to top
OS Build 17763.379

March 12, 2019
KB4489899
Mitigated
Last updated:
April 02, 2019 10:00 AM PT

Opened:
March 12, 2019 10:00 AM PT
" @@ -108,8 +108,8 @@ sections: - type: markdown text: " - - + +
DetailsAffected buildStatusHistory
Internet Explorer 11 authentication issue with multiple concurrent logons
After installing the February 12, 2019 update (KB4487044), Internet Explorer 11 and other applications that use WININET.DLL may have authentication issues. This occurs when two or more people use the same user account for multiple, concurrent login sessions on the same Windows Server machine, including Remote Desktop Protocol (RDP) and Terminal Server logons. Symptoms reported by customers include, but may not be limited to: 
 
  • Cache size and location show zero or empty. 
  • Keyboard shortcuts may not work properly. 
  • Webpages may intermittently fail to load or render correctly. 
  • Issues with credential prompts. 
  • Issues when downloading files. 

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10 Enterprise LTSC 2016; Windows 8.1; Windows 7, Service Pack 1
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server 2016; Windows Server 2012 R2; Windows Server 2008 R2 SP1
 
Resolved: This issue was resolved in KB4493509

Back to top
OS Build 17763.253

January 08, 2019
KB4480116
Resolved
KB4493509
Resolved:
April 09, 2019 10:00 AM PT

Opened:
January 08, 2019 10:00 AM PT
MSXML6 may cause applications to stop responding
After installing KB4480116, MSXML6 causes applications to stop responding if an exception was thrown during node operations, such as appendChild(), insertBefore(), and moveNode().
 
The Group Policy editor may stop responding when editing a Group Policy Object (GPO) that contains Group Policy Preferences (GPP) for Internet Explorer 10 settings. 

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 8.1
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2

Resolved: This issue was resolved in KB4493509

Back to top
OS Build 17763.253

January 08, 2019
KB4480116
Resolved
KB4493509
Resolved:
April 09, 2019 10:00 AM PT

Opened:
January 08, 2019 10:00 AM PT
Internet Explorer 11 authentication issue with multiple concurrent logons
After installing the February 12, 2019 update (KB4487044), Internet Explorer 11 and other applications that use WININET.DLL may have authentication issues. This occurs when two or more people use the same user account for multiple, concurrent login sessions on the same Windows Server machine, including Remote Desktop Protocol (RDP) and Terminal Server logons. Symptoms reported by customers include, but may not be limited to: 
 
  • Cache size and location show zero or empty. 
  • Keyboard shortcuts may not work properly. 
  • Webpages may intermittently fail to load or render correctly. 
  • Issues with credential prompts. 
  • Issues when downloading files. 

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10 Enterprise LTSC 2016; Windows 8.1; Windows 7, Service Pack 1
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server 2016; Windows Server 2012 R2; Windows Server 2008 R2 SP1
 
Resolved: This issue was resolved in KB4493509

Back to top
OS Build 17763.253

January 08, 2019
KB4480116
Resolved
KB4493509
Resolved:
April 09, 2019 10:00 AM PT

Opened:
January 08, 2019 10:00 AM PT
MSXML6 may cause applications to stop responding
After installing KB4480116, MSXML6 causes applications to stop responding if an exception was thrown during node operations, such as appendChild(), insertBefore(), and moveNode().
 
The Group Policy editor may stop responding when editing a Group Policy Object (GPO) that contains Group Policy Preferences (GPP) for Internet Explorer 10 settings. 

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 8.1
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2

Resolved: This issue was resolved in KB4493509

Back to top
OS Build 17763.253

January 08, 2019
KB4480116
Resolved
KB4493509
Resolved:
April 09, 2019 10:00 AM PT

Opened:
January 08, 2019 10:00 AM PT
" diff --git a/windows/release-information/status-windows-7-and-windows-server-2008-r2-sp1.yml b/windows/release-information/status-windows-7-and-windows-server-2008-r2-sp1.yml index 3545bba81f..aed3ccc154 100644 --- a/windows/release-information/status-windows-7-and-windows-server-2008-r2-sp1.yml +++ b/windows/release-information/status-windows-7-and-windows-server-2008-r2-sp1.yml @@ -58,7 +58,7 @@ sections: - title: Known issues - items: - type: markdown - text: " + text: "
This table offers a summary of current active issues and those issues that have been resolved in the last 30 days.
@@ -85,10 +85,10 @@ sections: - type: markdown text: "
SummaryAffected buildStatusLast updated
Virtual machines fail to restore.
Virtual machines (VMs) may fail to restore successfully if the VM has been saved and restored once before.

See details >
January 08, 2019
KB4480970
Resolved
KB4490511
April 21, 2019 12:00 AM PT
Local Administrators unable to remotely access shares.
Local users who are part of the local Administrators group may not be able to remotely access shares on Windows Server 2008 R2 and Windows 7 machines.

See details >
January 08, 2019
KB4480970
Resolved
KB4487345
April 20, 2019 11:53 PM PT
- - - - + + + +
DetailsAffected buildStatusHistory
System unresponsive after restart if Sophos Endpoint Protection installed.
Microsoft and Sophos have identified an issue on devices with Sophos Endpoint Protection installed and managed by either Sophos Central or Sophos Enterprise Console (SEC) that may cause the system to become unresponsive upon restart after installing KB4493472.

Microsoft has temporarily blocked devices from receiving this update if the Sophos Endpoint is installed until a solution is available.

Guidance for Sophos Endpoint and Sophos Enterprise Console customers can be found in the Sophos support article.

Back to top
April 09, 2019
KB4493472
Mitigated
Last updated:
April 09, 2019 10:00 AM PT

Opened:
April 09, 2019 10:00 AM PT
System may be unresponsive after restart if Avira antivirus software installed.
Microsoft and Avira have identified an issue on devices with Avira antivirus software installed that may cause the system to become unresponsive upon restart after installing KB4493472.

Microsoft has temporarily blocked devices from receiving this update if Avira antivirus software is installed.

Next steps: We are presently investigating this issue with Avira and will provide an update when available.

Back to top
April 09, 2019
KB4493472
Investigating
Last updated:
April 09, 2019 10:00 AM PT

Opened:
April 09, 2019 10:00 AM PT
System may be unresponsive after restart if ArcaBit antivirus software installed.
Microsoft and ArcaBit have identified an issue on devices with ArcaBit antivirus software installed that may cause the system to become unresponsive upon restart after installing KB4493472.

Microsoft has temporarily blocked devices from receiving this update if ArcaBit antivirus software is installed.

ArcaBit has released an update to address this issue. For more information, see the Arcabit support article.

Back to top
April 09, 2019
KB4493472
Mitigated
Last updated:
April 09, 2019 10:00 AM PT

Opened:
April 09, 2019 10:00 AM PT
Devices may not respond at login or Welcome screen if running certain Avast software.
Microsoft and Avast have identified an issue on devices running Avast for Business, Avast CloudCare, and AVG Business Edition antivirus software after you install KB4493472 and restart. Devices may become unresponsive at the login or Welcome screen. Additionally, you may be unable to log in or log in after an extended period of time.

Affected platforms: 
  • Client: Windows 8.1; Windows 7, Service Pack 1 
  • Server: Windows Server 2012 R2; Windows Server 2008 R2 SP1 

Resolution: Avast has released emergency updates to address this issue. For more information and AV update schedule, see the Avast support KB article.

Back to top
April 09, 2019
KB4493472
Resolved
Resolved:
April 09, 2019 10:00 AM PT

Opened:
April 09, 2019 10:00 AM PT
System unresponsive after restart if Sophos Endpoint Protection installed.
Microsoft and Sophos have identified an issue on devices with Sophos Endpoint Protection installed and managed by either Sophos Central or Sophos Enterprise Console (SEC) that may cause the system to become unresponsive upon restart after installing KB4493472.

Microsoft has temporarily blocked devices from receiving this update if the Sophos Endpoint is installed until a solution is available.

Guidance for Sophos Endpoint and Sophos Enterprise Console customers can be found in the Sophos support article.

Back to top
April 09, 2019
KB4493472
Mitigated
Last updated:
April 09, 2019 10:00 AM PT

Opened:
April 09, 2019 10:00 AM PT
System may be unresponsive after restart if Avira antivirus software installed.
Microsoft and Avira have identified an issue on devices with Avira antivirus software installed that may cause the system to become unresponsive upon restart after installing KB4493472.

Microsoft has temporarily blocked devices from receiving this update if Avira antivirus software is installed.

Next steps: We are presently investigating this issue with Avira and will provide an update when available.

Back to top
April 09, 2019
KB4493472
Investigating
Last updated:
April 09, 2019 10:00 AM PT

Opened:
April 09, 2019 10:00 AM PT
System may be unresponsive after restart if ArcaBit antivirus software installed.
Microsoft and ArcaBit have identified an issue on devices with ArcaBit antivirus software installed that may cause the system to become unresponsive upon restart after installing KB4493472.

Microsoft has temporarily blocked devices from receiving this update if ArcaBit antivirus software is installed.

ArcaBit has released an update to address this issue. For more information, see the Arcabit support article.

Back to top
April 09, 2019
KB4493472
Mitigated
Last updated:
April 09, 2019 10:00 AM PT

Opened:
April 09, 2019 10:00 AM PT
Devices may not respond at login or Welcome screen if running certain Avast software.
Microsoft and Avast have identified an issue on devices running Avast for Business, Avast CloudCare, and AVG Business Edition antivirus software after you install KB4493472 and restart. Devices may become unresponsive at the login or Welcome screen. Additionally, you may be unable to log in or log in after an extended period of time.

Affected platforms: 
  • Client: Windows 8.1; Windows 7, Service Pack 1 
  • Server: Windows Server 2012 R2; Windows Server 2008 R2 SP1 

Resolution: Avast has released emergency updates to address this issue. For more information and AV update schedule, see the Avast support KB article.

Back to top
April 09, 2019
KB4493472
Resolved
Resolved:
April 09, 2019 10:00 AM PT

Opened:
April 09, 2019 10:00 AM PT
" @@ -97,9 +97,9 @@ sections: - type: markdown text: " - - - + + +
DetailsAffected buildStatusHistory
Custom URI schemes may not start corresponding application.
After installing KB4489878, custom URI schemes for application protocol handlers may not start the corresponding application for local intranet and trusted sites on Internet Explorer.

Affected platforms: 
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 8.1; Windows 7, Service Pack 1 
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2; Windows Server 2008 R2 SP1 

Resolution: This issue is resolved in KB4493472.

Back to top
March 12, 2019
KB4489878
Resolved
KB4493472
Resolved:
April 09, 2019 10:00 AM PT

Opened:
March 12, 2019 10:00 AM PT
NETDOM.EXE fails to run.
After installing KB4489878, NETDOM.EXE fails to run, and the on-screen error, “The command failed to complete successfully.” appears.

Affected platforms: 
  • Client: Windows 7, Service Pack 1 
  • Server: Windows Server 2008 R2 SP1 

Resolution: This issue is resolved in KB4493472.

Back to top
March 12, 2019
KB4489878
Resolved
KB4493472
Resolved:
April 09, 2019 10:00 AM PT

Opened:
March 12, 2019 10:00 AM PT
Authentication may fail for services after the Kerberos ticket expires.
After installing KB4489878, some customers report that authentication fails for services that require unconstrained delegation after the Kerberos ticket expires (the default is 10 hours). For example, the SQL server service fails.

Workaround: To mitigate this issue, use one of the following options:

  • Option 1: Purge the Kerberos tickets on the application server. After the Kerberos ticket expires, the issue will occur again, and you must purge the tickets again.
  • Option 2: If purging does not mitigate the issue, restart the application; for example, restart the Internet Information Services (IIS) app pool associated with the SQL server.
  • Option 3: Use constrained delegation.

Next steps: Microsoft is working on a resolution and will provide an update in an upcoming release.

Back to top
March 12, 2019
KB4489878
Mitigated
Last updated:
April 09, 2019 10:00 AM PT

Opened:
March 12, 2019 10:00 AM PT
Custom URI schemes may not start corresponding application.
After installing KB4489878, custom URI schemes for application protocol handlers may not start the corresponding application for local intranet and trusted sites on Internet Explorer.

Affected platforms: 
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 8.1; Windows 7, Service Pack 1 
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2; Windows Server 2008 R2 SP1 

Resolution: This issue is resolved in KB4493472.

Back to top
March 12, 2019
KB4489878
Resolved
KB4493472
Resolved:
April 09, 2019 10:00 AM PT

Opened:
March 12, 2019 10:00 AM PT
NETDOM.EXE fails to run.
After installing KB4489878, NETDOM.EXE fails to run, and the on-screen error, “The command failed to complete successfully.” appears.

Affected platforms: 
  • Client: Windows 7, Service Pack 1 
  • Server: Windows Server 2008 R2 SP1 

Resolution: This issue is resolved in KB4493472.

Back to top
March 12, 2019
KB4489878
Resolved
KB4493472
Resolved:
April 09, 2019 10:00 AM PT

Opened:
March 12, 2019 10:00 AM PT
Authentication may fail for services after the Kerberos ticket expires.
After installing KB4489878, some customers report that authentication fails for services that require unconstrained delegation after the Kerberos ticket expires (the default is 10 hours). For example, the SQL server service fails.

Workaround: To mitigate this issue, use one of the following options:

  • Option 1: Purge the Kerberos tickets on the application server. After the Kerberos ticket expires, the issue will occur again, and you must purge the tickets again.
  • Option 2: If purging does not mitigate the issue, restart the application; for example, restart the Internet Information Services (IIS) app pool associated with the SQL server.
  • Option 3: Use constrained delegation.

Next steps: Microsoft is working on a resolution and will provide an update in an upcoming release.

Back to top
March 12, 2019
KB4489878
Mitigated
Last updated:
April 09, 2019 10:00 AM PT

Opened:
March 12, 2019 10:00 AM PT
" @@ -108,8 +108,8 @@ sections: - type: markdown text: " - - - + + +
DetailsAffected buildStatusHistory
Virtual machines fail to restore.
After installing KB4480970, virtual machines (VM) may fail to restore successfully if the VM has been saved and restored once before. The error message is, “Failed to restore the virtual machine state: Cannot restore this virtual machine because the saved state data cannot be read. Delete the saved state data and then try to start the virtual machine. (0xC0370027).”

This affects AMD Bulldozer Family 15h, AMD Jaguar Family 16h, and AMD Puma Family 16h (second generation) microarchitectures.

Affected platforms: 
  • Client: Windows 7, Service Pack 1 
  • Server: Windows Server 2008 R2 SP1 

Resolution: This issue is resolved in KB4490511.

Back to top
January 08, 2019
KB4480970
Resolved
KB4490511
Resolved:
February 19, 2019 02:00 PM PT

Opened:
January 08, 2019 10:00 AM PT
Local Administrators unable to remotely access shares.
Local users who are part of the local Administrators group may not be able to remotely access shares on Windows Server 2008 R2 and Windows 7 machines after installing KB4480970. This does not affect domain accounts in the local Administrators group.
 
Affected platforms: 
  • Client: Windows 7, Service Pack 1 
  • Server: Windows Server 2008 R2 SP1 

Resolution: This issue is resolved in KB4487345.

Back to top
January 08, 2019
KB4480970
Resolved
KB4487345
Resolved:
January 11, 2019 02:00 PM PT

Opened:
January 08, 2019 10:00 AM PT
Internet Explorer 11 authentication issue with multiple concurrent logons.
After installing KB4480970, Internet Explorer 11 and other applications that use WININET.DLL may have authentication issues. This occurs when two or more people use the same user account for multiple, concurrent login sessions on the same Windows Server machine, including Remote Desktop Protocol (RDP) and Terminal Server logons. Symptoms reported by customers include, but may not be limited to:

  • Cache size and location show zero or empty.
  • Keyboard shortcuts may not work properly.
  • Webpages may intermittently fail to load or render correctly.
  • Issues with credential prompts.
  • Issues when downloading files.

Affected platforms: 
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10 Enterprise LTSC 2016; Windows 8.1; Windows 7, Service Pack 1 
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server 2016; Windows Server 2012 R2; Windows Server 2008 R2 SP1 

Resolution: This issue is resolved in KB4493472.

Back to top
January 08, 2019
KB4480970
Resolved
KB4493472
Resolved:
April 09, 2019 10:00 AM PT

Opened:
January 08, 2019 10:00 AM PT
Virtual machines fail to restore.
After installing KB4480970, virtual machines (VM) may fail to restore successfully if the VM has been saved and restored once before. The error message is, “Failed to restore the virtual machine state: Cannot restore this virtual machine because the saved state data cannot be read. Delete the saved state data and then try to start the virtual machine. (0xC0370027).”

This affects AMD Bulldozer Family 15h, AMD Jaguar Family 16h, and AMD Puma Family 16h (second generation) microarchitectures.

Affected platforms: 
  • Client: Windows 7, Service Pack 1 
  • Server: Windows Server 2008 R2 SP1 

Resolution: This issue is resolved in KB4490511.

Back to top
January 08, 2019
KB4480970
Resolved
KB4490511
Resolved:
February 19, 2019 02:00 PM PT

Opened:
January 08, 2019 10:00 AM PT
Local Administrators unable to remotely access shares.
Local users who are part of the local Administrators group may not be able to remotely access shares on Windows Server 2008 R2 and Windows 7 machines after installing KB4480970. This does not affect domain accounts in the local Administrators group.
 
Affected platforms: 
  • Client: Windows 7, Service Pack 1 
  • Server: Windows Server 2008 R2 SP1 

Resolution: This issue is resolved in KB4487345.

Back to top
January 08, 2019
KB4480970
Resolved
KB4487345
Resolved:
January 11, 2019 02:00 PM PT

Opened:
January 08, 2019 10:00 AM PT
Internet Explorer 11 authentication issue with multiple concurrent logons.
After installing KB4480970, Internet Explorer 11 and other applications that use WININET.DLL may have authentication issues. This occurs when two or more people use the same user account for multiple, concurrent login sessions on the same Windows Server machine, including Remote Desktop Protocol (RDP) and Terminal Server logons. Symptoms reported by customers include, but may not be limited to:

  • Cache size and location show zero or empty.
  • Keyboard shortcuts may not work properly.
  • Webpages may intermittently fail to load or render correctly.
  • Issues with credential prompts.
  • Issues when downloading files.

Affected platforms: 
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10 Enterprise LTSC 2016; Windows 8.1; Windows 7, Service Pack 1 
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server 2016; Windows Server 2012 R2; Windows Server 2008 R2 SP1 

Resolution: This issue is resolved in KB4493472.

Back to top
January 08, 2019
KB4480970
Resolved
KB4493472
Resolved:
April 09, 2019 10:00 AM PT

Opened:
January 08, 2019 10:00 AM PT
" diff --git a/windows/release-information/status-windows-8.1-and-windows-server-2012-r2.yml b/windows/release-information/status-windows-8.1-and-windows-server-2012-r2.yml index 07b6ceef12..70e2cb745d 100644 --- a/windows/release-information/status-windows-8.1-and-windows-server-2012-r2.yml +++ b/windows/release-information/status-windows-8.1-and-windows-server-2012-r2.yml @@ -58,7 +58,7 @@ sections: - title: Known issues - items: - type: markdown - text: " + text: "
This table offers a summary of current active issues and those issues that have been resolved in the last 30 days.
@@ -85,10 +85,10 @@ sections: - type: markdown text: "
SummaryAffected buildStatusLast updated
Internet Explorer 11 authentication issue with multiple concurrent logons
Internet Explorer 11 users may encounter issues if two or more people use the same user account for multiple, concurrent login sessions on the same Windows Server machine.

See details >
January 08, 2019
KB4480963
Resolved
KB4493446
April 09, 2019 10:00 AM PT
MSXML6 may cause applications to stop responding.
MSXML6 may cause applications to stop responding if an exception was thrown during node operations, such as appendChild(), insertBefore(), and moveNode().

See details >
January 08, 2019
KB4480963
Resolved
KB4493446
April 09, 2019 10:00 AM PT
- - - - + + + +
DetailsAffected buildStatusHistory
System unresponsive after restart if Sophos Endpoint Protection installed
Microsoft and Sophos have identified an issue on devices with Sophos Endpoint Protection installed and managed by either Sophos Central or Sophos Enterprise Console (SEC) that may cause the system to become unresponsive upon restart after installing KB4493446.

Microsoft has temporarily blocked devices from receiving this update if the Sophos Endpoint is installed until a solution is available.

Affected platforms: 
  • Client: Windows 8.1; Windows 7, Service Pack 1 
  • Server: Windows Server 2012 R2; Windows Server 2008 R2 SP1 

Guidance for Sophos Endpoint and Sophos Enterprise Console customers can be found in the Sophos support article.

Back to top
April 09, 2019
KB4493446
Mitigated
Last updated:
April 09, 2019 10:00 AM PT

Opened:
April 09, 2019 10:00 AM PT
System may be unresponsive after restart if Avira antivirus software installed
Microsoft and Avira have identified an issue on devices with Avira antivirus software installed that may cause the system to become unresponsive upon restart after installing KB4493446.

Microsoft has temporarily blocked devices from receiving this update if Avira antivirus software is installed.

Affected platforms: 
  • Client: Windows 8.1; Windows 7, Service Pack 1 
  • Server: Windows Server 2012 R2; Windows Server 2008 R2 SP1 

Next steps: We are presently investigating this issue with Avira and will provide an update when available.

Back to top
April 09, 2019
KB4493446
Investigating
Last updated:
April 09, 2019 10:00 AM PT

Opened:
April 09, 2019 10:00 AM PT
System may be unresponsive after restart if ArcaBit antivirus software installed
Microsoft and ArcaBit have identified an issue on devices with ArcaBit antivirus software installed that may cause the system to become unresponsive upon restart after installing KB4493446.

Microsoft has temporarily blocked devices from receiving this update if ArcaBit antivirus software is installed.

Affected platforms: 
  • Client: Windows 8.1; Windows 7, Service Pack 1 
  • Server: Windows Server 2012 R2; Windows Server 2008 R2 SP1 

ArcaBit has released an update to address this issue. For more information, see the Arcabit support article.

Back to top
April 09, 2019
KB4493446
Mitigated
Last updated:
April 09, 2019 10:00 AM PT

Opened:
April 09, 2019 10:00 AM PT
Devices may not respond at login or Welcome screen if running certain Avast software
Microsoft and Avast have identified an issue on devices running Avast for Business, Avast CloudCare, and AVG Business Edition antivirus software after you install KB4493446 and restart. Devices may become unresponsive at the login or Welcome screen. Additionally, you may be unable to log in or log in after an extended period of time.

Affected platforms: 
  • Client: Windows 8.1; Windows 7, Service Pack 1 
  • Server: Windows Server 2012 R2; Windows Server 2008 R2 SP1 


Resolution: Avast has released emergency updates to address this issue. For more information and AV update schedule, see the Avast support KB article.

Back to top
April 09, 2019
KB4493446
Resolved
Resolved:
April 09, 2019 10:00 AM PT

Opened:
April 09, 2019 10:00 AM PT
System unresponsive after restart if Sophos Endpoint Protection installed
Microsoft and Sophos have identified an issue on devices with Sophos Endpoint Protection installed and managed by either Sophos Central or Sophos Enterprise Console (SEC) that may cause the system to become unresponsive upon restart after installing KB4493446.

Microsoft has temporarily blocked devices from receiving this update if the Sophos Endpoint is installed until a solution is available.

Affected platforms: 
  • Client: Windows 8.1; Windows 7, Service Pack 1 
  • Server: Windows Server 2012 R2; Windows Server 2008 R2 SP1 

Guidance for Sophos Endpoint and Sophos Enterprise Console customers can be found in the Sophos support article.

Back to top
April 09, 2019
KB4493446
Mitigated
Last updated:
April 09, 2019 10:00 AM PT

Opened:
April 09, 2019 10:00 AM PT
System may be unresponsive after restart if Avira antivirus software installed
Microsoft and Avira have identified an issue on devices with Avira antivirus software installed that may cause the system to become unresponsive upon restart after installing KB4493446.

Microsoft has temporarily blocked devices from receiving this update if Avira antivirus software is installed.

Affected platforms: 
  • Client: Windows 8.1; Windows 7, Service Pack 1 
  • Server: Windows Server 2012 R2; Windows Server 2008 R2 SP1 

Next steps: We are presently investigating this issue with Avira and will provide an update when available.

Back to top
April 09, 2019
KB4493446
Investigating
Last updated:
April 09, 2019 10:00 AM PT

Opened:
April 09, 2019 10:00 AM PT
System may be unresponsive after restart if ArcaBit antivirus software installed
Microsoft and ArcaBit have identified an issue on devices with ArcaBit antivirus software installed that may cause the system to become unresponsive upon restart after installing KB4493446.

Microsoft has temporarily blocked devices from receiving this update if ArcaBit antivirus software is installed.

Affected platforms: 
  • Client: Windows 8.1; Windows 7, Service Pack 1 
  • Server: Windows Server 2012 R2; Windows Server 2008 R2 SP1 

ArcaBit has released an update to address this issue. For more information, see the Arcabit support article.

Back to top
April 09, 2019
KB4493446
Mitigated
Last updated:
April 09, 2019 10:00 AM PT

Opened:
April 09, 2019 10:00 AM PT
Devices may not respond at login or Welcome screen if running certain Avast software
Microsoft and Avast have identified an issue on devices running Avast for Business, Avast CloudCare, and AVG Business Edition antivirus software after you install KB4493446 and restart. Devices may become unresponsive at the login or Welcome screen. Additionally, you may be unable to log in or log in after an extended period of time.

Affected platforms: 
  • Client: Windows 8.1; Windows 7, Service Pack 1 
  • Server: Windows Server 2012 R2; Windows Server 2008 R2 SP1 


Resolution: Avast has released emergency updates to address this issue. For more information and AV update schedule, see the Avast support KB article.

Back to top
April 09, 2019
KB4493446
Resolved
Resolved:
April 09, 2019 10:00 AM PT

Opened:
April 09, 2019 10:00 AM PT
Certain operations performed on on a Cluster Shared Volume may fail
Certain operations, such as rename, that you perform on files or folders that are on a Cluster Shared Volume (CSV) may fail with the error, “STATUS_BAD_IMPERSONATION_LEVEL (0xC00000A5)”. This occurs when you perform the operation on a CSV owner node from a process that doesn’t have administrator privilege.

Affected platforms: 
  • Client: Windows 8.1 
  • Server: Windows Server 2012 R2 

Workaround: Do one of the following:

  • Perform the operation from a process that has administrator privilege.
  • Perform the operation from a node that doesn’t have CSV ownership.

Next steps: Microsoft is working on a resolution and will provide an update in an upcoming release.

Back to top
April 09, 2019
KB4493446
Mitigated
Last updated:
April 09, 2019 10:00 AM PT

Opened:
April 09, 2019 10:00 AM PT
" @@ -98,8 +98,8 @@ sections: - type: markdown text: " - - + +
DetailsAffected buildStatusHistory
Custom URI schemes may not start corresponding application
After installing KB4489881, custom URI schemes for application protocol handlers may not start the corresponding application for local intranet and trusted sites security zones on Internet Explorer.

Affected platforms: 
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 8.1; Windows 7, Service Pack 1 
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2; Windows Server 2008 R2 SP1 

Resolution: This issue is resolved in KB4493446.

Back to top
March 12, 2019
KB4489881
Resolved
KB4493446
Resolved:
April 09, 2019 10:00 AM PT

Opened:
March 12, 2019 10:00 AM PT
Issue using PXE to start a device from WDS
After installing KB4489881, there may be issues using the Preboot Execution Environment (PXE) to start a device from a Windows Deployment Services (WDS) server configured to use Variable Window Extension. This may cause the connection to the WDS server to terminate prematurely while downloading the image. This issue does not affect clients or devices that are not using Variable Window Extension.

Affected platforms: 
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10 Enterprise LTSC 2016; Windows 8.1 
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server 2016; Windows Server 2012 R2 

Workaround: To mitigate the issue, disable the Variable Window Extension on WDS server using one of the following options:

Option 1:
Open an Administrator Command prompt and type the following:

Wdsutil /Set-TransportServer /EnableTftpVariableWindowExtension:No

Option 2:
Use the Windows Deployment Services UI to make the following adjustment:

1. Open Windows Deployment Services from Windows Administrative Tools.
2. Expand Servers and right-click a WDS server.
3. Open its properties and clear the Enable Variable Window Extension box on the TFTP tab.

Option 3:
Set the following registry value to 0:

HKLM\\System\\CurrentControlSet\\Services\\WDSServer\\Providers\\WDSTFTP\\EnableVariableWindowExtension

Restart the WDSServer service after disabling the Variable Window Extension.

Next steps: Microsoft is working on a resolution and will provide an update in an upcoming release.

Back to top
March 12, 2019
KB4489881
Mitigated
Last updated:
April 09, 2019 10:00 AM PT

Opened:
March 12, 2019 10:00 AM PT
Custom URI schemes may not start corresponding application
After installing KB4489881, custom URI schemes for application protocol handlers may not start the corresponding application for local intranet and trusted sites security zones on Internet Explorer.

Affected platforms: 
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 8.1; Windows 7, Service Pack 1 
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2; Windows Server 2008 R2 SP1 

Resolution: This issue is resolved in KB4493446.

Back to top
March 12, 2019
KB4489881
Resolved
KB4493446
Resolved:
April 09, 2019 10:00 AM PT

Opened:
March 12, 2019 10:00 AM PT
Issue using PXE to start a device from WDS
After installing KB4489881, there may be issues using the Preboot Execution Environment (PXE) to start a device from a Windows Deployment Services (WDS) server configured to use Variable Window Extension. This may cause the connection to the WDS server to terminate prematurely while downloading the image. This issue does not affect clients or devices that are not using Variable Window Extension.

Affected platforms: 
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10 Enterprise LTSC 2016; Windows 8.1 
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server 2016; Windows Server 2012 R2 

Workaround: To mitigate the issue, disable the Variable Window Extension on WDS server using one of the following options:

Option 1:
Open an Administrator Command prompt and type the following:

Wdsutil /Set-TransportServer /EnableTftpVariableWindowExtension:No

Option 2:
Use the Windows Deployment Services UI to make the following adjustment:

1. Open Windows Deployment Services from Windows Administrative Tools.
2. Expand Servers and right-click a WDS server.
3. Open its properties and clear the Enable Variable Window Extension box on the TFTP tab.

Option 3:
Set the following registry value to 0:

HKLM\\System\\CurrentControlSet\\Services\\WDSServer\\Providers\\WDSTFTP\\EnableVariableWindowExtension

Restart the WDSServer service after disabling the Variable Window Extension.

Next steps: Microsoft is working on a resolution and will provide an update in an upcoming release.

Back to top
March 12, 2019
KB4489881
Mitigated
Last updated:
April 09, 2019 10:00 AM PT

Opened:
March 12, 2019 10:00 AM PT
" @@ -108,7 +108,7 @@ sections: - type: markdown text: " - +
DetailsAffected buildStatusHistory
Embedded objects may display incorrectly
Any compound document (OLE) server application that places embedded objects into the Windows Metafile (WMF) using the PatBlt API may display embedded objects incorrectly.

For example, if you paste a Microsoft Excel worksheet object into a Microsoft Word document, the cells may render with a different background color.

Affected platforms: 
  • Client: Windows 8.1 
  • Server: Windows Server 2012 R2 

Resolution: This issue is resolved in KB4493446.

Back to top
February 12, 2019
KB4487000
Resolved
KB4493446
Resolved:
April 09, 2019 10:00 AM PT

Opened:
February 12, 2019 10:00 AM PT
Embedded objects may display incorrectly
Any compound document (OLE) server application that places embedded objects into the Windows Metafile (WMF) using the PatBlt API may display embedded objects incorrectly.

For example, if you paste a Microsoft Excel worksheet object into a Microsoft Word document, the cells may render with a different background color.

Affected platforms: 
  • Client: Windows 8.1 
  • Server: Windows Server 2012 R2 

Resolution: This issue is resolved in KB4493446.

Back to top
February 12, 2019
KB4487000
Resolved
KB4493446
Resolved:
April 09, 2019 10:00 AM PT

Opened:
February 12, 2019 10:00 AM PT
" @@ -117,7 +117,7 @@ sections: - type: markdown text: " - - + +
DetailsAffected buildStatusHistory
Internet Explorer 11 authentication issue with multiple concurrent logons
After installing KB4480963, Internet Explorer 11 and other applications that use WININET.DLL may have authentication issues. This occurs when two or more people use the same user account for multiple, concurrent login sessions on the same Windows Server machine, including Remote Desktop Protocol (RDP) and Terminal Server logons. Symptoms reported by customers include, but may not be limited to:

  • Cache size and location show zero or empty.
  • Keyboard shortcuts may not work properly.
  • Webpages may intermittently fail to load or render correctly.
  • Issues with credential prompts.
  • Issues when downloading files.

Affected platforms: 
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10 Enterprise LTSC 2016; Windows 8.1; Windows 7, Service Pack 1 
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server 2016; Windows Server 2012 R2; Windows Server 2008 R2 SP1 

Resolution: This issue is resolved in KB4493446.


Back to top
January 08, 2019
KB4480963
Resolved
KB4493446
Resolved:
April 09, 2019 10:00 AM PT

Opened:
January 08, 2019 10:00 AM PT
MSXML6 may cause applications to stop responding.
After installing KB4480963, MSXML6 causes applications to stop responding if an exception was thrown during node operations, such as appendChild(), insertBefore(), and moveNode().

The Group Policy editor may stop responding when editing a Group Policy Object (GPO) that contains Group Policy Preferences (GPP) for Internet Explorer 10 settings.

Resolution: This issue is resolved in KB4493446.

Back to top
January 08, 2019
KB4480963
Resolved
KB4493446
Resolved:
April 09, 2019 10:00 AM PT

Opened:
January 08, 2019 10:00 AM PT
Internet Explorer 11 authentication issue with multiple concurrent logons
After installing KB4480963, Internet Explorer 11 and other applications that use WININET.DLL may have authentication issues. This occurs when two or more people use the same user account for multiple, concurrent login sessions on the same Windows Server machine, including Remote Desktop Protocol (RDP) and Terminal Server logons. Symptoms reported by customers include, but may not be limited to:

  • Cache size and location show zero or empty.
  • Keyboard shortcuts may not work properly.
  • Webpages may intermittently fail to load or render correctly.
  • Issues with credential prompts.
  • Issues when downloading files.

Affected platforms: 
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10 Enterprise LTSC 2016; Windows 8.1; Windows 7, Service Pack 1 
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server 2016; Windows Server 2012 R2; Windows Server 2008 R2 SP1 

Resolution: This issue is resolved in KB4493446.


Back to top
January 08, 2019
KB4480963
Resolved
KB4493446
Resolved:
April 09, 2019 10:00 AM PT

Opened:
January 08, 2019 10:00 AM PT
MSXML6 may cause applications to stop responding.
After installing KB4480963, MSXML6 causes applications to stop responding if an exception was thrown during node operations, such as appendChild(), insertBefore(), and moveNode().

The Group Policy editor may stop responding when editing a Group Policy Object (GPO) that contains Group Policy Preferences (GPP) for Internet Explorer 10 settings.

Resolution: This issue is resolved in KB4493446.

Back to top
January 08, 2019
KB4480963
Resolved
KB4493446
Resolved:
April 09, 2019 10:00 AM PT

Opened:
January 08, 2019 10:00 AM PT
" From 516c63cf409140c2b69407468cda0b0d40e57d7d Mon Sep 17 00:00:00 2001 From: "Nisha Mittal (Wipro Ltd.)" Date: Wed, 24 Apr 2019 18:55:06 -0700 Subject: [PATCH 207/724] Added N/A for blank build --- .../release-information/resolved-issues-windows-10-1507.yml | 2 +- .../release-information/resolved-issues-windows-10-1607.yml | 2 +- .../release-information/resolved-issues-windows-10-1703.yml | 2 +- .../release-information/resolved-issues-windows-10-1709.yml | 2 +- .../release-information/resolved-issues-windows-10-1803.yml | 2 +- ...olved-issues-windows-10-1809-and-windows-server-2019.yml | 6 +++--- 6 files changed, 8 insertions(+), 8 deletions(-) diff --git a/windows/release-information/resolved-issues-windows-10-1507.yml b/windows/release-information/resolved-issues-windows-10-1507.yml index bc5f174c24..b18c6bd900 100644 --- a/windows/release-information/resolved-issues-windows-10-1507.yml +++ b/windows/release-information/resolved-issues-windows-10-1507.yml @@ -30,7 +30,7 @@ sections: - title: Resolved issues - items: - type: markdown - text: "
+ text: " diff --git a/windows/release-information/resolved-issues-windows-10-1607.yml b/windows/release-information/resolved-issues-windows-10-1607.yml index 2edcdf78d2..333879f9fc 100644 --- a/windows/release-information/resolved-issues-windows-10-1607.yml +++ b/windows/release-information/resolved-issues-windows-10-1607.yml @@ -30,7 +30,7 @@ sections: - title: Resolved issues - items: - type: markdown - text: "
+ text: "
SummaryAffected buildStatusDate resolved
MSXML6 may cause applications to stop responding
MSXML6 may cause applications to stop responding if an exception was thrown during node operations, such as appendChild(), insertBefore(), and moveNode().

See details >
OS Build 10240.18094

January 08, 2019
KB4480962
Resolved
KB4493475
April 09, 2019 10:00 AM PT
Custom URI schemes may not start corresponding application
Custom URI schemes for application protocol handlers may not start the corresponding application for local intranet and trusted sites in Internet Explorer.

See details >
OS Build 10240.18158

March 12, 2019
KB4489872
Resolved
KB4493475
April 09, 2019 10:00 AM PT
diff --git a/windows/release-information/resolved-issues-windows-10-1703.yml b/windows/release-information/resolved-issues-windows-10-1703.yml index dd47c5ea38..3669198950 100644 --- a/windows/release-information/resolved-issues-windows-10-1703.yml +++ b/windows/release-information/resolved-issues-windows-10-1703.yml @@ -30,7 +30,7 @@ sections: - title: Resolved issues - items: - type: markdown - text: "
+ text: "
SummaryAffected buildStatusDate resolved
End-user-defined characters (EUDC) cause blue screen at startup
If you enable per font end-user-defined characters (EUDC), the system will stop working and a blue screen may appear at startup.

See details >
OS Build 14393.2879

March 19, 2019
KB4489889
Resolved
KB4493470
April 09, 2019 10:00 AM PT
Internet Explorer 11 authentication issue with multiple concurrent logons
Internet Explorer 11 users may encounter issues if two or more people use the same user account for multiple, concurrent login sessions on the same Windows Server machine.

See details >
OS Build 14393.2724

January 08, 2019
KB4480961
Resolved
KB4493470
April 09, 2019 10:00 AM PT
diff --git a/windows/release-information/resolved-issues-windows-10-1709.yml b/windows/release-information/resolved-issues-windows-10-1709.yml index fd898e2a84..61d4a8b2b2 100644 --- a/windows/release-information/resolved-issues-windows-10-1709.yml +++ b/windows/release-information/resolved-issues-windows-10-1709.yml @@ -30,7 +30,7 @@ sections: - title: Resolved issues - items: - type: markdown - text: "
+ text: "
SummaryAffected buildStatusDate resolved
End-user-defined characters (EUDC) may cause blue screen at startup
If you enable per font end-user-defined characters (EUDC), the system may stop working and a blue screen may appear at startup.

See details >
OS Build 15063.1716

March 19, 2019
KB4489888
Resolved
KB4493474
April 09, 2019 10:00 AM PT
MSXML6 may cause applications to stop responding
MSXML6 may cause applications to stop responding if an exception was thrown during node operations, such as appendChild(), insertBefore(), and moveNode().

See details >
OS Build 15063.1563

January 08, 2019
KB4480973
Resolved
KB4493474
April 09, 2019 10:00 AM PT
diff --git a/windows/release-information/resolved-issues-windows-10-1803.yml b/windows/release-information/resolved-issues-windows-10-1803.yml index 5750bfe1d8..582e0fce18 100644 --- a/windows/release-information/resolved-issues-windows-10-1803.yml +++ b/windows/release-information/resolved-issues-windows-10-1803.yml @@ -30,7 +30,7 @@ sections: - title: Resolved issues - items: - type: markdown - text: "
+ text: "
SummaryAffected buildStatusDate resolved
End-user-defined characters (EUDC) may cause blue screen at startup
If you enable per font end-user-defined characters (EUDC), the system may stop working and a blue screen may appear at startup.

See details >
OS Build 16299.1059

March 19, 2019
KB4489890
Resolved
KB4493441
April 09, 2019 10:00 AM PT
MSXML6 causes applications to stop responding if an exception was thrown
MSXML6 causes applications to stop responding if an exception was thrown during node operations, such as appendChild(), insertBefore(), and moveNode().

See details >
OS Build 16299.904

January 08, 2019
KB4480978
Resolved
KB4493441
April 09, 2019 10:00 AM PT
diff --git a/windows/release-information/resolved-issues-windows-10-1809-and-windows-server-2019.yml b/windows/release-information/resolved-issues-windows-10-1809-and-windows-server-2019.yml index 442e7b9e44..d4904337ef 100644 --- a/windows/release-information/resolved-issues-windows-10-1809-and-windows-server-2019.yml +++ b/windows/release-information/resolved-issues-windows-10-1809-and-windows-server-2019.yml @@ -30,14 +30,14 @@ sections: - title: Resolved issues - items: - type: markdown - text: "
+ text: "
SummaryAffected buildStatusDate resolved
End-user-defined characters (EUDC) may cause blue screen at startup
If you enable per font end-user-defined characters (EUDC), the system may stop working and a blue screen may appear at startup.

See details >
OS Build 17134.677

March 19, 2019
KB4489894
Resolved
KB4493464
April 09, 2019 10:00 AM PT
MSXML6 may cause applications to stop responding
MSXML6 may cause applications to stop responding if an exception was thrown during node operations, such as appendChild(), insertBefore(), and moveNode().

See details >
OS Build 17134.523

January 08, 2019
KB4480966
Resolved
KB4493464
April 09, 2019 10:00 AM PT
- + @@ -101,7 +101,7 @@ sections:
SummaryAffected buildStatusDate resolved
End-user-defined characters (EUDC) may cause blue screen at startup
If you enable per font end-user-defined characters (EUDC), the system may stop working and a blue screen may appear at startup.

See details >
OS Build 17763.404

April 02, 2019
KB4490481
Resolved
KB4493509
April 09, 2019 10:00 AM PT
Internet Explorer 11 authentication issue with multiple concurrent logons
Internet Explorer 11 users may encounter issues if two or more people use the same user account for multiple, concurrent login sessions on the same Windows Server machine.

See details >
OS Build 17763.253

January 08, 2019
KB4480116
Resolved
KB4493509
April 09, 2019 10:00 AM PT
MSXML6 may cause applications to stop responding
MSXML6 may cause applications to stop responding if an exception was thrown during node operations, such as appendChild(), insertBefore(), and moveNode().

See details >
OS Build 17763.253

January 08, 2019
KB4480116
Resolved
KB4493509
April 09, 2019 10:00 AM PT
Apps may stop working after selecting an audio output device other than the default
Users with multiple audio devices that select an audio output device different from the \"Default Audio Device\" may find certain applications stop working unexpectedly.

See details >
OS Build 17763.348

March 01, 2019
KB4482887
Resolved
KB4490481
April 02, 2019 10:00 AM PT
Error 1309 when installing/uninstalling MSI or MSP files
Users may receive \"Error 1309\" while installing or uninstalling certain types of MSI and MSP files.

See details >
OS Build 17763.316

February 12, 2019
KB4487044
Resolved
KB4489899
March 12, 2019 10:00 AM PT
Global DNS outage affects Windows Update customers
Windows Update customers were recently affected by a network infrastructure event caused by an external DNS service provider's global outage.

See details >

Resolved
March 08, 2019 11:15 AM PT
Global DNS outage affects Windows Update customers
Windows Update customers were recently affected by a network infrastructure event caused by an external DNS service provider's global outage.

See details >
N/A
Resolved
March 08, 2019 11:15 AM PT
Internet Explorer may fail to load images
Internet Explorer may fail to load images with a backslash (\\) in their relative source path.

See details >
OS Build 17763.316

February 12, 2019
KB4487044
Resolved
KB4482887
March 01, 2019 10:00 AM PT
Applications using Microsoft Jet database and Access 95 file format stop working
Applications that use a Microsoft Jet database with the Microsoft Access 9 file format may randomly stop working.

See details >
OS Build 17763.316

February 12, 2019
KB4487044
Resolved
KB4482887
March 01, 2019 10:00 AM PT
First character of the Japanese era name not recognized
The first character of the Japanese era name is not recognized as an abbreviation and may cause date parsing issues.

See details >
OS Build 17763.316

February 12, 2019
KB4487044
Resolved
KB4482887
March 01, 2019 10:00 AM PT
- +
DetailsAffected buildStatusHistory
Internet Explorer 11 authentication issue with multiple concurrent logons
After installing the February 12, 2019 update (KB4487044), Internet Explorer 11 and other applications that use WININET.DLL may have authentication issues. This occurs when two or more people use the same user account for multiple, concurrent login sessions on the same Windows Server machine, including Remote Desktop Protocol (RDP) and Terminal Server logons. Symptoms reported by customers include, but may not be limited to: 
 
  • Cache size and location show zero or empty. 
  • Keyboard shortcuts may not work properly. 
  • Webpages may intermittently fail to load or render correctly. 
  • Issues with credential prompts. 
  • Issues when downloading files. 

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10 Enterprise LTSC 2016; Windows 8.1; Windows 7, Service Pack 1
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server 2016; Windows Server 2012 R2; Windows Server 2008 R2 SP1
 
Resolved: This issue was resolved in KB4493509

Back to top
OS Build 17763.253

January 08, 2019
KB4480116
Resolved
KB4493509
Resolved:
April 09, 2019 10:00 AM PT

Opened:
January 08, 2019 10:00 AM PT
MSXML6 may cause applications to stop responding
After installing KB4480116, MSXML6 causes applications to stop responding if an exception was thrown during node operations, such as appendChild(), insertBefore(), and moveNode().
 
The Group Policy editor may stop responding when editing a Group Policy Object (GPO) that contains Group Policy Preferences (GPP) for Internet Explorer 10 settings. 

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 8.1
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2

Resolved: This issue was resolved in KB4493509

Back to top
OS Build 17763.253

January 08, 2019
KB4480116
Resolved
KB4493509
Resolved:
April 09, 2019 10:00 AM PT

Opened:
January 08, 2019 10:00 AM PT
Global DNS outage affects Windows Update customers
Windows Update customers were affected by a network infrastructure event on January 29, 2019 (21:00 UTC), caused by an external DNS service provider's global outage. A software update to the external provider's DNS servers resulted in the distribution of corrupted DNS records that affected connectivity to the Windows Update service. The DNS records were restored by January 30, 2019 (00:10 UTC), and the majority of local Internet Service Providers (ISP) have refreshed their DNS servers and customer services have been restored. 
 
Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019
  • Server: Windows Server, version 1809; Windows Server 2019

While this was not an issue with Microsoft's services, we take any service disruption for our customers seriously. We will work with partners to better understand this so we can provide higher quality service in the future even across diverse global network providers. 
 
If you are still unable to connect to Windows Update services due to this problem, please contact your local ISP or network administrator. You can also refer to our new KB4493784 for more information to determine if your network is affected, and to provide your local ISP or network administrator with additional information to assist you. 

Back to top

Resolved
Resolved:
March 08, 2019 11:15 AM PT

Opened:
January 29, 2019 02:00 PM PT
Global DNS outage affects Windows Update customers
Windows Update customers were affected by a network infrastructure event on January 29, 2019 (21:00 UTC), caused by an external DNS service provider's global outage. A software update to the external provider's DNS servers resulted in the distribution of corrupted DNS records that affected connectivity to the Windows Update service. The DNS records were restored by January 30, 2019 (00:10 UTC), and the majority of local Internet Service Providers (ISP) have refreshed their DNS servers and customer services have been restored. 
 
Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019
  • Server: Windows Server, version 1809; Windows Server 2019

While this was not an issue with Microsoft's services, we take any service disruption for our customers seriously. We will work with partners to better understand this so we can provide higher quality service in the future even across diverse global network providers. 
 
If you are still unable to connect to Windows Update services due to this problem, please contact your local ISP or network administrator. You can also refer to our new KB4493784 for more information to determine if your network is affected, and to provide your local ISP or network administrator with additional information to assist you. 

Back to top
N/A
Resolved
Resolved:
March 08, 2019 11:15 AM PT

Opened:
January 29, 2019 02:00 PM PT
Webpages become unresponsive in Microsoft Edge
After installing KB4480116, some Microsoft Edge users report that they:
  • Cannot load webpages using a local IP address. 
  • Cannot load webpages on the Internet using a VPN connection.
Browsing fails or the webpage may become unresponsive.

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709

Resolution: This issue is resolved in KB4487044

Back to top
OS Build 17763.253

January 08, 2019
KB4480116
Resolved
KB4487044
Resolved:
February 12, 2019 10:00 AM PT

Opened:
January 08, 2019 10:00 AM PT
Unable to access hotspots with third-party applications
After installing KB4480116, third-party applications may have difficulty authenticating hotspots. 

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 8.1
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2

Resolution: This issue is resolved in KB4476976

Back to top
OS Build 17763.253

January 08, 2019
KB4480116
Resolved
KB4476976
Resolved:
January 22, 2019 02:00 PM PT

Opened:
January 08, 2019 10:00 AM PT
From 84fe450bf6cad87cb166d17b82fbf3b69b4318d1 Mon Sep 17 00:00:00 2001 From: "Nisha Mittal (Wipro Ltd.)" Date: Wed, 24 Apr 2019 19:03:45 -0700 Subject: [PATCH 208/724] Update --- ...esolved-issues-windows-10-1809-and-windows-server-2019.yml | 4 ++-- 1 file changed, 2 insertions(+), 2 deletions(-) diff --git a/windows/release-information/resolved-issues-windows-10-1809-and-windows-server-2019.yml b/windows/release-information/resolved-issues-windows-10-1809-and-windows-server-2019.yml index d4904337ef..5d9a44bd89 100644 --- a/windows/release-information/resolved-issues-windows-10-1809-and-windows-server-2019.yml +++ b/windows/release-information/resolved-issues-windows-10-1809-and-windows-server-2019.yml @@ -37,7 +37,7 @@ sections:
MSXML6 may cause applications to stop responding
MSXML6 may cause applications to stop responding if an exception was thrown during node operations, such as appendChild(), insertBefore(), and moveNode().

See details >OS Build 17763.253

January 08, 2019
KB4480116Resolved
KB4493509April 09, 2019 10:00 AM PT
Apps may stop working after selecting an audio output device other than the default
Users with multiple audio devices that select an audio output device different from the \"Default Audio Device\" may find certain applications stop working unexpectedly.

See details >OS Build 17763.348

March 01, 2019
KB4482887Resolved
KB4490481April 02, 2019 10:00 AM PT
Error 1309 when installing/uninstalling MSI or MSP files
Users may receive \"Error 1309\" while installing or uninstalling certain types of MSI and MSP files.

See details >OS Build 17763.316

February 12, 2019
KB4487044Resolved
KB4489899March 12, 2019 10:00 AM PT -
Global DNS outage affects Windows Update customers
Windows Update customers were recently affected by a network infrastructure event caused by an external DNS service provider's global outage.

See details >N/A
Resolved
March 08, 2019 11:15 AM PT +
Global DNS outage affects Windows Update customers
Windows Update customers were recently affected by a network infrastructure event caused by an external DNS service provider's global outage.

See details >OS Build N/A

Resolved
March 08, 2019 11:15 AM PT
Internet Explorer may fail to load images
Internet Explorer may fail to load images with a backslash (\\) in their relative source path.

See details >OS Build 17763.316

February 12, 2019
KB4487044Resolved
KB4482887March 01, 2019 10:00 AM PT
Applications using Microsoft Jet database and Access 95 file format stop working
Applications that use a Microsoft Jet database with the Microsoft Access 9 file format may randomly stop working.

See details >OS Build 17763.316

February 12, 2019
KB4487044Resolved
KB4482887March 01, 2019 10:00 AM PT
First character of the Japanese era name not recognized
The first character of the Japanese era name is not recognized as an abbreviation and may cause date parsing issues.

See details >OS Build 17763.316

February 12, 2019
KB4487044Resolved
KB4482887March 01, 2019 10:00 AM PT @@ -101,7 +101,7 @@ sections: - +
DetailsAffected buildStatusHistory
Internet Explorer 11 authentication issue with multiple concurrent logons
After installing the February 12, 2019 update (KB4487044), Internet Explorer 11 and other applications that use WININET.DLL may have authentication issues. This occurs when two or more people use the same user account for multiple, concurrent login sessions on the same Windows Server machine, including Remote Desktop Protocol (RDP) and Terminal Server logons. Symptoms reported by customers include, but may not be limited to: 
 
  • Cache size and location show zero or empty. 
  • Keyboard shortcuts may not work properly. 
  • Webpages may intermittently fail to load or render correctly. 
  • Issues with credential prompts. 
  • Issues when downloading files. 

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10 Enterprise LTSC 2016; Windows 8.1; Windows 7, Service Pack 1
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server 2016; Windows Server 2012 R2; Windows Server 2008 R2 SP1
 
Resolved: This issue was resolved in KB4493509

Back to top
OS Build 17763.253

January 08, 2019
KB4480116
Resolved
KB4493509
Resolved:
April 09, 2019 10:00 AM PT

Opened:
January 08, 2019 10:00 AM PT
MSXML6 may cause applications to stop responding
After installing KB4480116, MSXML6 causes applications to stop responding if an exception was thrown during node operations, such as appendChild(), insertBefore(), and moveNode().
 
The Group Policy editor may stop responding when editing a Group Policy Object (GPO) that contains Group Policy Preferences (GPP) for Internet Explorer 10 settings. 

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 8.1
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2

Resolved: This issue was resolved in KB4493509

Back to top
OS Build 17763.253

January 08, 2019
KB4480116
Resolved
KB4493509
Resolved:
April 09, 2019 10:00 AM PT

Opened:
January 08, 2019 10:00 AM PT
Global DNS outage affects Windows Update customers
Windows Update customers were affected by a network infrastructure event on January 29, 2019 (21:00 UTC), caused by an external DNS service provider's global outage. A software update to the external provider's DNS servers resulted in the distribution of corrupted DNS records that affected connectivity to the Windows Update service. The DNS records were restored by January 30, 2019 (00:10 UTC), and the majority of local Internet Service Providers (ISP) have refreshed their DNS servers and customer services have been restored. 
 
Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019
  • Server: Windows Server, version 1809; Windows Server 2019

While this was not an issue with Microsoft's services, we take any service disruption for our customers seriously. We will work with partners to better understand this so we can provide higher quality service in the future even across diverse global network providers. 
 
If you are still unable to connect to Windows Update services due to this problem, please contact your local ISP or network administrator. You can also refer to our new KB4493784 for more information to determine if your network is affected, and to provide your local ISP or network administrator with additional information to assist you. 

Back to top
N/A
Resolved
Resolved:
March 08, 2019 11:15 AM PT

Opened:
January 29, 2019 02:00 PM PT
Global DNS outage affects Windows Update customers
Windows Update customers were affected by a network infrastructure event on January 29, 2019 (21:00 UTC), caused by an external DNS service provider's global outage. A software update to the external provider's DNS servers resulted in the distribution of corrupted DNS records that affected connectivity to the Windows Update service. The DNS records were restored by January 30, 2019 (00:10 UTC), and the majority of local Internet Service Providers (ISP) have refreshed their DNS servers and customer services have been restored. 
 
Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019
  • Server: Windows Server, version 1809; Windows Server 2019

While this was not an issue with Microsoft's services, we take any service disruption for our customers seriously. We will work with partners to better understand this so we can provide higher quality service in the future even across diverse global network providers. 
 
If you are still unable to connect to Windows Update services due to this problem, please contact your local ISP or network administrator. You can also refer to our new KB4493784 for more information to determine if your network is affected, and to provide your local ISP or network administrator with additional information to assist you. 

Back to top
OS Build N/A


Resolved
Resolved:
March 08, 2019 11:15 AM PT

Opened:
January 29, 2019 02:00 PM PT
Webpages become unresponsive in Microsoft Edge
After installing KB4480116, some Microsoft Edge users report that they:
  • Cannot load webpages using a local IP address. 
  • Cannot load webpages on the Internet using a VPN connection.
Browsing fails or the webpage may become unresponsive.

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709

Resolution: This issue is resolved in KB4487044

Back to top
OS Build 17763.253

January 08, 2019
KB4480116
Resolved
KB4487044
Resolved:
February 12, 2019 10:00 AM PT

Opened:
January 08, 2019 10:00 AM PT
Unable to access hotspots with third-party applications
After installing KB4480116, third-party applications may have difficulty authenticating hotspots. 

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 8.1
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2

Resolution: This issue is resolved in KB4476976

Back to top
OS Build 17763.253

January 08, 2019
KB4480116
Resolved
KB4476976
Resolved:
January 22, 2019 02:00 PM PT

Opened:
January 08, 2019 10:00 AM PT
From cb7dec4640739527707167a610b6e75fd42f6fff Mon Sep 17 00:00:00 2001 From: "Nisha Mittal (Wipro Ltd.)" Date: Thu, 25 Apr 2019 01:16:09 -0700 Subject: [PATCH 209/724] Changed Sorting order --- ...ssues-windows-10-1809-and-windows-server-2019.yml | 2 +- ...tatus-windows-10-1809-and-windows-server-2019.yml | 4 ++-- ...atus-windows-7-and-windows-server-2008-r2-sp1.yml | 12 ++++++------ 3 files changed, 9 insertions(+), 9 deletions(-) diff --git a/windows/release-information/resolved-issues-windows-10-1809-and-windows-server-2019.yml b/windows/release-information/resolved-issues-windows-10-1809-and-windows-server-2019.yml index 5d9a44bd89..5e66323b5e 100644 --- a/windows/release-information/resolved-issues-windows-10-1809-and-windows-server-2019.yml +++ b/windows/release-information/resolved-issues-windows-10-1809-and-windows-server-2019.yml @@ -101,7 +101,7 @@ sections: - +
DetailsAffected buildStatusHistory
Internet Explorer 11 authentication issue with multiple concurrent logons
After installing the February 12, 2019 update (KB4487044), Internet Explorer 11 and other applications that use WININET.DLL may have authentication issues. This occurs when two or more people use the same user account for multiple, concurrent login sessions on the same Windows Server machine, including Remote Desktop Protocol (RDP) and Terminal Server logons. Symptoms reported by customers include, but may not be limited to: 
 
  • Cache size and location show zero or empty. 
  • Keyboard shortcuts may not work properly. 
  • Webpages may intermittently fail to load or render correctly. 
  • Issues with credential prompts. 
  • Issues when downloading files. 

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10 Enterprise LTSC 2016; Windows 8.1; Windows 7, Service Pack 1
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server 2016; Windows Server 2012 R2; Windows Server 2008 R2 SP1
 
Resolved: This issue was resolved in KB4493509

Back to top
OS Build 17763.253

January 08, 2019
KB4480116
Resolved
KB4493509
Resolved:
April 09, 2019 10:00 AM PT

Opened:
January 08, 2019 10:00 AM PT
MSXML6 may cause applications to stop responding
After installing KB4480116, MSXML6 causes applications to stop responding if an exception was thrown during node operations, such as appendChild(), insertBefore(), and moveNode().
 
The Group Policy editor may stop responding when editing a Group Policy Object (GPO) that contains Group Policy Preferences (GPP) for Internet Explorer 10 settings. 

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 8.1
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2

Resolved: This issue was resolved in KB4493509

Back to top
OS Build 17763.253

January 08, 2019
KB4480116
Resolved
KB4493509
Resolved:
April 09, 2019 10:00 AM PT

Opened:
January 08, 2019 10:00 AM PT
Global DNS outage affects Windows Update customers
Windows Update customers were affected by a network infrastructure event on January 29, 2019 (21:00 UTC), caused by an external DNS service provider's global outage. A software update to the external provider's DNS servers resulted in the distribution of corrupted DNS records that affected connectivity to the Windows Update service. The DNS records were restored by January 30, 2019 (00:10 UTC), and the majority of local Internet Service Providers (ISP) have refreshed their DNS servers and customer services have been restored. 
 
Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019
  • Server: Windows Server, version 1809; Windows Server 2019

While this was not an issue with Microsoft's services, we take any service disruption for our customers seriously. We will work with partners to better understand this so we can provide higher quality service in the future even across diverse global network providers. 
 
If you are still unable to connect to Windows Update services due to this problem, please contact your local ISP or network administrator. You can also refer to our new KB4493784 for more information to determine if your network is affected, and to provide your local ISP or network administrator with additional information to assist you. 

Back to top
OS Build N/A


Resolved
Resolved:
March 08, 2019 11:15 AM PT

Opened:
January 29, 2019 02:00 PM PT
Global DNS outage affects Windows Update customers
Windows Update customers were affected by a network infrastructure event on January 29, 2019 (21:00 UTC), caused by an external DNS service provider's global outage. A software update to the external provider's DNS servers resulted in the distribution of corrupted DNS records that affected connectivity to the Windows Update service. The DNS records were restored by January 30, 2019 (00:10 UTC), and the majority of local Internet Service Providers (ISP) have refreshed their DNS servers and customer services have been restored. 
 
Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019
  • Server: Windows Server, version 1809; Windows Server 2019

While this was not an issue with Microsoft's services, we take any service disruption for our customers seriously. We will work with partners to better understand this so we can provide higher quality service in the future even across diverse global network providers. 
 
If you are still unable to connect to Windows Update services due to this problem, please contact your local ISP or network administrator. You can also refer to our new KB4493784 for more information to determine if your network is affected, and to provide your local ISP or network administrator with additional information to assist you. 

Back to top
OS Build N/A

Resolved
Resolved:
March 08, 2019 11:15 AM PT

Opened:
January 29, 2019 02:00 PM PT
Webpages become unresponsive in Microsoft Edge
After installing KB4480116, some Microsoft Edge users report that they:
  • Cannot load webpages using a local IP address. 
  • Cannot load webpages on the Internet using a VPN connection.
Browsing fails or the webpage may become unresponsive.

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709

Resolution: This issue is resolved in KB4487044

Back to top
OS Build 17763.253

January 08, 2019
KB4480116
Resolved
KB4487044
Resolved:
February 12, 2019 10:00 AM PT

Opened:
January 08, 2019 10:00 AM PT
Unable to access hotspots with third-party applications
After installing KB4480116, third-party applications may have difficulty authenticating hotspots. 

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 8.1
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2

Resolution: This issue is resolved in KB4476976

Back to top
OS Build 17763.253

January 08, 2019
KB4480116
Resolved
KB4476976
Resolved:
January 22, 2019 02:00 PM PT

Opened:
January 08, 2019 10:00 AM PT
diff --git a/windows/release-information/status-windows-10-1809-and-windows-server-2019.yml b/windows/release-information/status-windows-10-1809-and-windows-server-2019.yml index 039fedd849..eb06023023 100644 --- a/windows/release-information/status-windows-10-1809-and-windows-server-2019.yml +++ b/windows/release-information/status-windows-10-1809-and-windows-server-2019.yml @@ -68,9 +68,9 @@ sections:
End-user-defined characters (EUDC) may cause blue screen at startup
If you enable per font end-user-defined characters (EUDC), the system may stop working and a blue screen may appear at startup.

See details >OS Build 17763.404

April 02, 2019
KB4490481Resolved
KB4493509April 09, 2019 10:00 AM PT
Internet Explorer 11 authentication issue with multiple concurrent logons
Internet Explorer 11 users may encounter issues if two or more people use the same user account for multiple, concurrent login sessions on the same Windows Server machine.

See details >OS Build 17763.253

January 08, 2019
KB4480116Resolved
KB4493509April 09, 2019 10:00 AM PT
MSXML6 may cause applications to stop responding
MSXML6 may cause applications to stop responding if an exception was thrown during node operations, such as appendChild(), insertBefore(), and moveNode().

See details >OS Build 17763.253

January 08, 2019
KB4480116Resolved
KB4493509April 09, 2019 10:00 AM PT -
Apps may stop working after selecting an audio output device other than the default
Users with multiple audio devices that select an audio output device different from the \"Default Audio Device\" may find certain applications stop working unexpectedly.

See details >OS Build 17763.348

March 01, 2019
KB4482887Resolved
KB4490481April 02, 2019 10:00 AM PT
Custom URI schemes may not start corresponding application
Custom URI schemes for application protocol handlers may not start the corresponding application for local intranet and trusted sites in Internet Explorer.

See details >OS Build 17763.379

March 12, 2019
KB4489899Mitigated
April 02, 2019 10:00 AM PT
Issue using PXE to start a device from WDS
Using PXE to start a device from a WDS server configured to use Variable Window Extension may cause the connection to the WDS server to terminate prematurely.

See details >OS Build 17763.379

March 12, 2019
KB4489899Mitigated
April 02, 2019 10:00 AM PT +
Apps may stop working after selecting an audio output device other than the default
Users with multiple audio devices that select an audio output device different from the \"Default Audio Device\" may find certain applications stop working unexpectedly.

See details >OS Build 17763.348

March 01, 2019
KB4482887Resolved
KB4490481April 02, 2019 10:00 AM PT
Audio not working on monitors or TV connected to a PC via HDMI, USB, or DisplayPort
Upgrade block: Microsoft has identified issues with certain new Intel display drivers, which accidentally turn on unsupported features in Windows.

See details >OS Build 17763.134

November 13, 2018
KB4467708Mitigated
March 15, 2019 12:00 PM PT " @@ -96,10 +96,10 @@ sections: - type: markdown text: " - +
DetailsAffected buildStatusHistory
Apps may stop working after selecting an audio output device other than the default
After installing KB4482887 on machines that have multiple audio devices, applications that provide advanced options for internal or external audio output devices may stop working unexpectedly. This issue occurs for users that select an audio output device different from the \"Default Audio Device\". Examples of applications that may stop working include: 

  • Windows Media Player 
  • Realtek HD Audio Manager 
  • Sound Blaster Control Panel 

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019
  • Server: Windows Server, version 1809; Windows Server 2019

Workaround: As a temporary solution, select the \"Default Audio Device\" in the options provided by the application; please refer to the application's user manual for details. 
For example, to set the Default Audio Device in Windows Media Player: 

  1. Open Windows Media Player > Tools > Options > Devices.
  2. Select the device and choose Properties.
  3. On the next dialog, from the drop-down menu under Select the Audio Device, choose Default Audio Device from the list.
 
You can then send audio from the application to the audio device you want in the per-application audio settings found under Settings > System > Sound > App Volume and device preferences.

Resolved: This issue was resolved in KB4490481

Back to top
OS Build 17763.348

March 01, 2019
KB4482887
Resolved
KB4490481
Resolved:
April 02, 2019 10:00 AM PT

Opened:
March 01, 2019 10:00 AM PT
Custom URI schemes may not start corresponding application
After installing KB4489899, custom URI schemes for application protocol handlers may not start the corresponding application for local intranet and trusted sites security zones on Internet Explorer.

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 8.1; Windows 7, Service Pack 1 
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2; Windows Server 2008 R2 SP1

Workaround: Right-click the URL link to open it in a new window or tab, or enable Protected Mode in Internet Explorer for local intranet and trusted sites 
 
  1. Go to Tools > Internet options > Security.
  2. Within Select a zone to view of change security settings, select Local intranet and then select Enable Protected Mode.
  3. Select Trusted Sites and then select Enable Protected Mode
  4. Select OK.

You must restart the browser after making these changes. 
 
Next steps: Microsoft is working on a resolution and will provide an update in an upcoming release. 

Back to top
OS Build 17763.379

March 12, 2019
KB4489899
Mitigated
Last updated:
April 02, 2019 10:00 AM PT

Opened:
March 12, 2019 10:00 AM PT
Issue using PXE to start a device from WDS
After installing KB4489899, there may be issues using the Preboot Execution Environment (PXE) to start a device from a Windows Deployment Services (WDS) server configured to use Variable Window Extension. This may cause the connection to the WDS server to terminate prematurely while downloading the image. This issue does not affect clients or devices that are not using Variable Window Extension. 

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10 Enterprise LTSC 2016; Windows 8.1
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server 2016; Windows Server 2012 R2

Workaround: To mitigate the issue, disable the Variable Window Extension on WDS server using one of the following options:

Option 1:
Open an Administrator Command prompt and type the following:

Wdsutil /Set-TransportServer /EnableTftpVariableWindowExtension:No 
 

Option 2:
Use the Windows Deployment Services UI to make the following adjustment: 
  1. Open Windows Deployment Services from Windows Administrative Tools. 
  2. Expand Servers and right-click a WDS server. 
  3. Open its properties and clear the Enable Variable Window Extension box on the TFTP tab.

Option 3:
Set the following registry value to 0: 
 
HKLM\\System\\CurrentControlSet\\Services\\WDSServer\\Providers\\WDSTFTP\\EnableVariableWindowExtension 
 
Restart the WDSServer service after disabling the Variable Window Extension. 

Next steps: Microsoft is working on a resolution and will provide an update in an upcoming release. 

Back to top
OS Build 17763.379

March 12, 2019
KB4489899
Mitigated
Last updated:
April 02, 2019 10:00 AM PT

Opened:
March 12, 2019 10:00 AM PT
Apps may stop working after selecting an audio output device other than the default
After installing KB4482887 on machines that have multiple audio devices, applications that provide advanced options for internal or external audio output devices may stop working unexpectedly. This issue occurs for users that select an audio output device different from the \"Default Audio Device\". Examples of applications that may stop working include: 

  • Windows Media Player 
  • Realtek HD Audio Manager 
  • Sound Blaster Control Panel 

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019
  • Server: Windows Server, version 1809; Windows Server 2019

Workaround: As a temporary solution, select the \"Default Audio Device\" in the options provided by the application; please refer to the application's user manual for details. 
For example, to set the Default Audio Device in Windows Media Player: 

  1. Open Windows Media Player > Tools > Options > Devices.
  2. Select the device and choose Properties.
  3. On the next dialog, from the drop-down menu under Select the Audio Device, choose Default Audio Device from the list.
 
You can then send audio from the application to the audio device you want in the per-application audio settings found under Settings > System > Sound > App Volume and device preferences.

Resolved: This issue was resolved in KB4490481

Back to top
OS Build 17763.348

March 01, 2019
KB4482887
Resolved
KB4490481
Resolved:
April 02, 2019 10:00 AM PT

Opened:
March 01, 2019 10:00 AM PT
" diff --git a/windows/release-information/status-windows-7-and-windows-server-2008-r2-sp1.yml b/windows/release-information/status-windows-7-and-windows-server-2008-r2-sp1.yml index aed3ccc154..d6fb4bd20d 100644 --- a/windows/release-information/status-windows-7-and-windows-server-2008-r2-sp1.yml +++ b/windows/release-information/status-windows-7-and-windows-server-2008-r2-sp1.yml @@ -62,13 +62,13 @@ sections: + + + + - - - -
SummaryAffected buildStatusLast updated
Virtual machines fail to restore.
Virtual machines (VMs) may fail to restore successfully if the VM has been saved and restored once before.

See details >
January 08, 2019
KB4480970
Resolved
KB4490511
April 21, 2019 12:00 AM PT
Local Administrators unable to remotely access shares.
Local users who are part of the local Administrators group may not be able to remotely access shares on Windows Server 2008 R2 and Windows 7 machines.

See details >
January 08, 2019
KB4480970
Resolved
KB4487345
April 20, 2019 11:53 PM PT
System may be unresponsive after restart if Avira antivirus software installed.
Devices with Avira antivirus software installed may become unresponsive upon restart.

See details >
April 09, 2019
KB4493472
Investigating
April 09, 2019 10:00 AM PT
Authentication may fail for services after the Kerberos ticket expires.
Authentication may fail for services that require unconstrained delegation after the Kerberos ticket expires.

See details >
March 12, 2019
KB4489878
Mitigated
April 09, 2019 10:00 AM PT
System unresponsive after restart if Sophos Endpoint Protection installed.
Devices with Sophos Endpoint Protection installed and managed by Sophos Central or Sophos Enterprise Console (SEC) may become unresponsive upon restart.

See details >
April 09, 2019
KB4493472
Mitigated
April 09, 2019 10:00 AM PT
System may be unresponsive after restart if ArcaBit antivirus software installed.
Devices with ArcaBit antivirus software installed may become unresponsive upon restart.

See details >
April 09, 2019
KB4493472
Mitigated
April 09, 2019 10:00 AM PT
Internet Explorer 11 authentication issue with multiple concurrent logons.
Internet Explorer 11 users may encounter issues if two or more people use the same user account for multiple, concurrent login sessions on the same Windows Server machine.

See details >
January 08, 2019
KB4480970
Resolved
KB4493472
April 09, 2019 10:00 AM PT
Custom URI schemes may not start corresponding application.
Custom URI schemes for application protocol handlers may not start the corresponding application for local intranet and trusted sites in Internet Explorer.

See details >
March 12, 2019
KB4489878
Resolved
KB4493472
April 09, 2019 10:00 AM PT
NETDOM.EXE fails to run.
NETDOM.EXE fails to run and the error, “The command failed to complete successfully.” appears on screen.

See details >
March 12, 2019
KB4489878
Resolved
KB4493472
April 09, 2019 10:00 AM PT
Authentication may fail for services after the Kerberos ticket expires.
Authentication may fail for services that require unconstrained delegation after the Kerberos ticket expires.

See details >
March 12, 2019
KB4489878
Mitigated
April 09, 2019 10:00 AM PT
System unresponsive after restart if Sophos Endpoint Protection installed.
Devices with Sophos Endpoint Protection installed and managed by Sophos Central or Sophos Enterprise Console (SEC) may become unresponsive upon restart.

See details >
April 09, 2019
KB4493472
Mitigated
April 09, 2019 10:00 AM PT
System may be unresponsive after restart if Avira antivirus software installed.
Devices with Avira antivirus software installed may become unresponsive upon restart.

See details >
April 09, 2019
KB4493472
Investigating
April 09, 2019 10:00 AM PT
System may be unresponsive after restart if ArcaBit antivirus software installed.
Devices with ArcaBit antivirus software installed may become unresponsive upon restart.

See details >
April 09, 2019
KB4493472
Mitigated
April 09, 2019 10:00 AM PT
Devices may not respond at login or Welcome screen if running certain Avast software.
Devices running Avast for Business, Avast CloudCare, and AVG Business Edition antivirus software may become unresponsive after restart.

See details >
April 09, 2019
KB4493472
Resolved
April 09, 2019 10:00 AM PT
" @@ -85,8 +85,8 @@ sections: - type: markdown text: " - +
DetailsAffected buildStatusHistory
System unresponsive after restart if Sophos Endpoint Protection installed.
Microsoft and Sophos have identified an issue on devices with Sophos Endpoint Protection installed and managed by either Sophos Central or Sophos Enterprise Console (SEC) that may cause the system to become unresponsive upon restart after installing KB4493472.

Microsoft has temporarily blocked devices from receiving this update if the Sophos Endpoint is installed until a solution is available.

Guidance for Sophos Endpoint and Sophos Enterprise Console customers can be found in the Sophos support article.

Back to top
April 09, 2019
KB4493472
Mitigated
Last updated:
April 09, 2019 10:00 AM PT

Opened:
April 09, 2019 10:00 AM PT
System may be unresponsive after restart if Avira antivirus software installed.
Microsoft and Avira have identified an issue on devices with Avira antivirus software installed that may cause the system to become unresponsive upon restart after installing KB4493472.

Microsoft has temporarily blocked devices from receiving this update if Avira antivirus software is installed.

Next steps: We are presently investigating this issue with Avira and will provide an update when available.

Back to top
April 09, 2019
KB4493472
Investigating
Last updated:
April 09, 2019 10:00 AM PT

Opened:
April 09, 2019 10:00 AM PT
System unresponsive after restart if Sophos Endpoint Protection installed.
Microsoft and Sophos have identified an issue on devices with Sophos Endpoint Protection installed and managed by either Sophos Central or Sophos Enterprise Console (SEC) that may cause the system to become unresponsive upon restart after installing KB4493472.

Microsoft has temporarily blocked devices from receiving this update if the Sophos Endpoint is installed until a solution is available.

Guidance for Sophos Endpoint and Sophos Enterprise Console customers can be found in the Sophos support article.

Back to top
April 09, 2019
KB4493472
Mitigated
Last updated:
April 09, 2019 10:00 AM PT

Opened:
April 09, 2019 10:00 AM PT
System may be unresponsive after restart if ArcaBit antivirus software installed.
Microsoft and ArcaBit have identified an issue on devices with ArcaBit antivirus software installed that may cause the system to become unresponsive upon restart after installing KB4493472.

Microsoft has temporarily blocked devices from receiving this update if ArcaBit antivirus software is installed.

ArcaBit has released an update to address this issue. For more information, see the Arcabit support article.

Back to top
April 09, 2019
KB4493472
Mitigated
Last updated:
April 09, 2019 10:00 AM PT

Opened:
April 09, 2019 10:00 AM PT
Devices may not respond at login or Welcome screen if running certain Avast software.
Microsoft and Avast have identified an issue on devices running Avast for Business, Avast CloudCare, and AVG Business Edition antivirus software after you install KB4493472 and restart. Devices may become unresponsive at the login or Welcome screen. Additionally, you may be unable to log in or log in after an extended period of time.

Affected platforms: 
  • Client: Windows 8.1; Windows 7, Service Pack 1 
  • Server: Windows Server 2012 R2; Windows Server 2008 R2 SP1 

Resolution: Avast has released emergency updates to address this issue. For more information and AV update schedule, see the Avast support KB article.

Back to top
April 09, 2019
KB4493472
Resolved
Resolved:
April 09, 2019 10:00 AM PT

Opened:
April 09, 2019 10:00 AM PT
@@ -97,9 +97,9 @@ sections: - type: markdown text: " + -
DetailsAffected buildStatusHistory
Authentication may fail for services after the Kerberos ticket expires.
After installing KB4489878, some customers report that authentication fails for services that require unconstrained delegation after the Kerberos ticket expires (the default is 10 hours). For example, the SQL server service fails.

Workaround: To mitigate this issue, use one of the following options:

  • Option 1: Purge the Kerberos tickets on the application server. After the Kerberos ticket expires, the issue will occur again, and you must purge the tickets again.
  • Option 2: If purging does not mitigate the issue, restart the application; for example, restart the Internet Information Services (IIS) app pool associated with the SQL server.
  • Option 3: Use constrained delegation.

Next steps: Microsoft is working on a resolution and will provide an update in an upcoming release.

Back to top
March 12, 2019
KB4489878
Mitigated
Last updated:
April 09, 2019 10:00 AM PT

Opened:
March 12, 2019 10:00 AM PT
Custom URI schemes may not start corresponding application.
After installing KB4489878, custom URI schemes for application protocol handlers may not start the corresponding application for local intranet and trusted sites on Internet Explorer.

Affected platforms: 
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 8.1; Windows 7, Service Pack 1 
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2; Windows Server 2008 R2 SP1 

Resolution: This issue is resolved in KB4493472.

Back to top
March 12, 2019
KB4489878
Resolved
KB4493472
Resolved:
April 09, 2019 10:00 AM PT

Opened:
March 12, 2019 10:00 AM PT
NETDOM.EXE fails to run.
After installing KB4489878, NETDOM.EXE fails to run, and the on-screen error, “The command failed to complete successfully.” appears.

Affected platforms: 
  • Client: Windows 7, Service Pack 1 
  • Server: Windows Server 2008 R2 SP1 

Resolution: This issue is resolved in KB4493472.

Back to top
March 12, 2019
KB4489878
Resolved
KB4493472
Resolved:
April 09, 2019 10:00 AM PT

Opened:
March 12, 2019 10:00 AM PT
Authentication may fail for services after the Kerberos ticket expires.
After installing KB4489878, some customers report that authentication fails for services that require unconstrained delegation after the Kerberos ticket expires (the default is 10 hours). For example, the SQL server service fails.

Workaround: To mitigate this issue, use one of the following options:

  • Option 1: Purge the Kerberos tickets on the application server. After the Kerberos ticket expires, the issue will occur again, and you must purge the tickets again.
  • Option 2: If purging does not mitigate the issue, restart the application; for example, restart the Internet Information Services (IIS) app pool associated with the SQL server.
  • Option 3: Use constrained delegation.

Next steps: Microsoft is working on a resolution and will provide an update in an upcoming release.

Back to top
March 12, 2019
KB4489878
Mitigated
Last updated:
April 09, 2019 10:00 AM PT

Opened:
March 12, 2019 10:00 AM PT
" From 1f4312295c6f8873e022ccb914caaa5ad5371d1c Mon Sep 17 00:00:00 2001 From: "Nisha Mittal (Wipro Ltd.)" Date: Thu, 25 Apr 2019 01:27:11 -0700 Subject: [PATCH 210/724] Few More Changes --- .../release-information/resolved-issues-windows-10-1507.yml | 4 ++-- .../release-information/resolved-issues-windows-10-1607.yml | 4 ++-- .../release-information/resolved-issues-windows-10-1703.yml | 4 ++-- .../release-information/resolved-issues-windows-10-1709.yml | 4 ++-- .../release-information/resolved-issues-windows-10-1803.yml | 4 ++-- ...esolved-issues-windows-10-1809-and-windows-server-2019.yml | 4 ++-- windows/release-information/status-windows-10-1507.yml | 4 ++-- .../status-windows-10-1607-and-windows-server-2016.yml | 4 ++-- windows/release-information/status-windows-10-1703.yml | 4 ++-- windows/release-information/status-windows-10-1709.yml | 4 ++-- windows/release-information/status-windows-10-1803.yml | 4 ++-- .../status-windows-10-1809-and-windows-server-2019.yml | 4 ++-- .../status-windows-7-and-windows-server-2008-r2-sp1.yml | 4 ++-- 13 files changed, 26 insertions(+), 26 deletions(-) diff --git a/windows/release-information/resolved-issues-windows-10-1507.yml b/windows/release-information/resolved-issues-windows-10-1507.yml index b18c6bd900..13f1da0d4e 100644 --- a/windows/release-information/resolved-issues-windows-10-1507.yml +++ b/windows/release-information/resolved-issues-windows-10-1507.yml @@ -31,7 +31,7 @@ sections: - items: - type: markdown text: " - +
SummaryAffected buildStatusDate resolved
@@ -45,7 +45,7 @@ sections:
SummaryOriginating updateStatusDate resolved
MSXML6 may cause applications to stop responding
MSXML6 may cause applications to stop responding if an exception was thrown during node operations, such as appendChild(), insertBefore(), and moveNode().

See details >
OS Build 10240.18094

January 08, 2019
KB4480962
Resolved
KB4493475
April 09, 2019 10:00 AM PT
Custom URI schemes may not start corresponding application
Custom URI schemes for application protocol handlers may not start the corresponding application for local intranet and trusted sites in Internet Explorer.

See details >
OS Build 10240.18158

March 12, 2019
KB4489872
Resolved
KB4493475
April 09, 2019 10:00 AM PT
Applications using Microsoft Jet database and Access 95 file format stop working
Applications that use a Microsoft Jet database with the Microsoft Access 95 file format may randomly stop working.

See details >
OS Build 10240.18132

February 12, 2019
KB4487018
Resolved
KB4489872
March 12, 2019 10:00 AM PT
" -- title: Issue Details +- title: Issue details - items: - type: markdown text: " diff --git a/windows/release-information/resolved-issues-windows-10-1607.yml b/windows/release-information/resolved-issues-windows-10-1607.yml index 333879f9fc..4fbe83f6b4 100644 --- a/windows/release-information/resolved-issues-windows-10-1607.yml +++ b/windows/release-information/resolved-issues-windows-10-1607.yml @@ -31,7 +31,7 @@ sections: - items: - type: markdown text: " - +
SummaryAffected buildStatusDate resolved
@@ -51,7 +51,7 @@ sections:
SummaryOriginating updateStatusDate resolved
End-user-defined characters (EUDC) cause blue screen at startup
If you enable per font end-user-defined characters (EUDC), the system will stop working and a blue screen may appear at startup.

See details >
OS Build 14393.2879

March 19, 2019
KB4489889
Resolved
KB4493470
April 09, 2019 10:00 AM PT
Internet Explorer 11 authentication issue with multiple concurrent logons
Internet Explorer 11 users may encounter issues if two or more people use the same user account for multiple, concurrent login sessions on the same Windows Server machine.

See details >
OS Build 14393.2724

January 08, 2019
KB4480961
Resolved
KB4493470
April 09, 2019 10:00 AM PT
MSXML6 may cause applications to stop responding
MSXML6 may cause applications to stop responding if an exception was thrown during node operations, such as appendChild(), insertBefore(), and moveNode().

See details >
OS Build 14393.2724

January 08, 2019
KB4480961
Resolved
KB4493470
April 09, 2019 10:00 AM PT
" -- title: Issue Details +- title: Issue details - items: - type: markdown text: " diff --git a/windows/release-information/resolved-issues-windows-10-1703.yml b/windows/release-information/resolved-issues-windows-10-1703.yml index 3669198950..cbbbf9bd9f 100644 --- a/windows/release-information/resolved-issues-windows-10-1703.yml +++ b/windows/release-information/resolved-issues-windows-10-1703.yml @@ -31,7 +31,7 @@ sections: - items: - type: markdown text: " - +
SummaryAffected buildStatusDate resolved
@@ -48,7 +48,7 @@ sections:
SummaryOriginating updateStatusDate resolved
End-user-defined characters (EUDC) may cause blue screen at startup
If you enable per font end-user-defined characters (EUDC), the system may stop working and a blue screen may appear at startup.

See details >
OS Build 15063.1716

March 19, 2019
KB4489888
Resolved
KB4493474
April 09, 2019 10:00 AM PT
MSXML6 may cause applications to stop responding
MSXML6 may cause applications to stop responding if an exception was thrown during node operations, such as appendChild(), insertBefore(), and moveNode().

See details >
OS Build 15063.1563

January 08, 2019
KB4480973
Resolved
KB4493474
April 09, 2019 10:00 AM PT
Error 1309 when installing/uninstalling MSI or MSP files
Users may receive “Error 1309” while installing or uninstalling certain types of MSI and MSP files.

See details >
OS Build 15063.1659

February 19, 2019
KB4487011
Resolved
KB4489871
March 12, 2019 10:00 AM PT
" -- title: Issue Details +- title: Issue details - items: - type: markdown text: " diff --git a/windows/release-information/resolved-issues-windows-10-1709.yml b/windows/release-information/resolved-issues-windows-10-1709.yml index 61d4a8b2b2..2e3968c9ef 100644 --- a/windows/release-information/resolved-issues-windows-10-1709.yml +++ b/windows/release-information/resolved-issues-windows-10-1709.yml @@ -31,7 +31,7 @@ sections: - items: - type: markdown text: " - +
SummaryAffected buildStatusDate resolved
@@ -48,7 +48,7 @@ sections:
SummaryOriginating updateStatusDate resolved
End-user-defined characters (EUDC) may cause blue screen at startup
If you enable per font end-user-defined characters (EUDC), the system may stop working and a blue screen may appear at startup.

See details >
OS Build 16299.1059

March 19, 2019
KB4489890
Resolved
KB4493441
April 09, 2019 10:00 AM PT
MSXML6 causes applications to stop responding if an exception was thrown
MSXML6 causes applications to stop responding if an exception was thrown during node operations, such as appendChild(), insertBefore(), and moveNode().

See details >
OS Build 16299.904

January 08, 2019
KB4480978
Resolved
KB4493441
April 09, 2019 10:00 AM PT
Stop error when attempting to start SSH from WSL
A stop error occurs when attempting to start the Secure Shell client program from Windows Subsystem for Linux with agent forwarding enabled using a command line switch (ssh –A) or

See details >
OS Build 16299.1029

March 12, 2019
KB4489886
Resolved
KB4493441
April 09, 2019 10:00 AM PT
" -- title: Issue Details +- title: Issue details - items: - type: markdown text: " diff --git a/windows/release-information/resolved-issues-windows-10-1803.yml b/windows/release-information/resolved-issues-windows-10-1803.yml index 582e0fce18..48966a90a5 100644 --- a/windows/release-information/resolved-issues-windows-10-1803.yml +++ b/windows/release-information/resolved-issues-windows-10-1803.yml @@ -31,7 +31,7 @@ sections: - items: - type: markdown text: " - +
SummaryAffected buildStatusDate resolved
@@ -53,7 +53,7 @@ sections:
SummaryOriginating updateStatusDate resolved
End-user-defined characters (EUDC) may cause blue screen at startup
If you enable per font end-user-defined characters (EUDC), the system may stop working and a blue screen may appear at startup.

See details >
OS Build 17134.677

March 19, 2019
KB4489894
Resolved
KB4493464
April 09, 2019 10:00 AM PT
MSXML6 may cause applications to stop responding
MSXML6 may cause applications to stop responding if an exception was thrown during node operations, such as appendChild(), insertBefore(), and moveNode().

See details >
OS Build 17134.523

January 08, 2019
KB4480966
Resolved
KB4493464
April 09, 2019 10:00 AM PT
Stop error when attempting to start SSH from WSL
A stop error occurs when attempting to start Secure Shell from Windows Subsystem for Linux with agent forwarding using a command line switch (ssh –A) or a configuration setting.

See details >
OS Build 17134.648

March 12, 2019
KB4489868
Resolved
KB4493464
April 09, 2019 10:00 AM PT
" -- title: Issue Details +- title: Issue details - items: - type: markdown text: " diff --git a/windows/release-information/resolved-issues-windows-10-1809-and-windows-server-2019.yml b/windows/release-information/resolved-issues-windows-10-1809-and-windows-server-2019.yml index 5e66323b5e..17abd10cce 100644 --- a/windows/release-information/resolved-issues-windows-10-1809-and-windows-server-2019.yml +++ b/windows/release-information/resolved-issues-windows-10-1809-and-windows-server-2019.yml @@ -31,7 +31,7 @@ sections: - items: - type: markdown text: " - +
SummaryAffected buildStatusDate resolved
@@ -57,7 +57,7 @@ sections:
SummaryOriginating updateStatusDate resolved
End-user-defined characters (EUDC) may cause blue screen at startup
If you enable per font end-user-defined characters (EUDC), the system may stop working and a blue screen may appear at startup.

See details >
OS Build 17763.404

April 02, 2019
KB4490481
Resolved
KB4493509
April 09, 2019 10:00 AM PT
Internet Explorer 11 authentication issue with multiple concurrent logons
Internet Explorer 11 users may encounter issues if two or more people use the same user account for multiple, concurrent login sessions on the same Windows Server machine.

See details >
OS Build 17763.253

January 08, 2019
KB4480116
Resolved
KB4493509
April 09, 2019 10:00 AM PT
MSXML6 may cause applications to stop responding
MSXML6 may cause applications to stop responding if an exception was thrown during node operations, such as appendChild(), insertBefore(), and moveNode().

See details >
OS Build 17763.253

January 08, 2019
KB4480116
Resolved
KB4493509
April 09, 2019 10:00 AM PT
" -- title: Issue Details +- title: Issue details - items: - type: markdown text: " diff --git a/windows/release-information/status-windows-10-1507.yml b/windows/release-information/status-windows-10-1507.yml index fedaa4b7e4..4b762a7b54 100644 --- a/windows/release-information/status-windows-10-1507.yml +++ b/windows/release-information/status-windows-10-1507.yml @@ -59,13 +59,13 @@ sections: - items: - type: markdown text: "
This table offers a summary of current active issues and those issues that have been resolved in the last 30 days.
- +
SummaryAffected buildStatusLast updated
SummaryOriginating updateStatusLast updated
MSXML6 may cause applications to stop responding
MSXML6 may cause applications to stop responding if an exception was thrown during node operations, such as appendChild(), insertBefore(), and moveNode().

See details >
OS Build 10240.18094

January 08, 2019
KB4480962
Resolved
KB4493475
April 09, 2019 10:00 AM PT
Custom URI schemes may not start corresponding application
Custom URI schemes for application protocol handlers may not start the corresponding application for local intranet and trusted sites in Internet Explorer.

See details >
OS Build 10240.18158

March 12, 2019
KB4489872
Resolved
KB4493475
April 09, 2019 10:00 AM PT
" -- title: Issue Details +- title: Issue details - items: - type: markdown text: " diff --git a/windows/release-information/status-windows-10-1607-and-windows-server-2016.yml b/windows/release-information/status-windows-10-1607-and-windows-server-2016.yml index 6ee300bcd4..174b265816 100644 --- a/windows/release-information/status-windows-10-1607-and-windows-server-2016.yml +++ b/windows/release-information/status-windows-10-1607-and-windows-server-2016.yml @@ -59,7 +59,7 @@ sections: - items: - type: markdown text: "
This table offers a summary of current active issues and those issues that have been resolved in the last 30 days.
- +
SummaryAffected buildStatusLast updated
@@ -71,7 +71,7 @@ sections:
SummaryOriginating updateStatusLast updated
End-user-defined characters (EUDC) cause blue screen at startup
If you enable per font end-user-defined characters (EUDC), the system will stop working and a blue screen may appear at startup.

See details >
OS Build 14393.2879

March 19, 2019
KB4489889
Resolved
KB4493470
April 09, 2019 10:00 AM PT
Internet Explorer 11 authentication issue with multiple concurrent logons
Internet Explorer 11 users may encounter issues if two or more people use the same user account for multiple, concurrent login sessions on the same Windows Server machine.

See details >
OS Build 14393.2724

January 08, 2019
KB4480961
Resolved
KB4493470
April 09, 2019 10:00 AM PT
MSXML6 may cause applications to stop responding
MSXML6 may cause applications to stop responding if an exception was thrown during node operations, such as appendChild(), insertBefore(), and moveNode().

See details >
OS Build 14393.2724

January 08, 2019
KB4480961
Resolved
KB4493470
April 09, 2019 10:00 AM PT
" -- title: Issue Details +- title: Issue details - items: - type: markdown text: " diff --git a/windows/release-information/status-windows-10-1703.yml b/windows/release-information/status-windows-10-1703.yml index 82233a80b3..6565fc56d6 100644 --- a/windows/release-information/status-windows-10-1703.yml +++ b/windows/release-information/status-windows-10-1703.yml @@ -59,14 +59,14 @@ sections: - items: - type: markdown text: "
This table offers a summary of current active issues and those issues that have been resolved in the last 30 days.
- +
SummaryAffected buildStatusLast updated
SummaryOriginating updateStatusLast updated
End-user-defined characters (EUDC) may cause blue screen at startup
If you enable per font end-user-defined characters (EUDC), the system may stop working and a blue screen may appear at startup.

See details >
OS Build 15063.1716

March 19, 2019
KB4489888
Resolved
KB4493474
April 09, 2019 10:00 AM PT
MSXML6 may cause applications to stop responding
MSXML6 may cause applications to stop responding if an exception was thrown during node operations, such as appendChild(), insertBefore(), and moveNode().

See details >
OS Build 15063.1563

January 08, 2019
KB4480973
Resolved
KB4493474
April 09, 2019 10:00 AM PT
Custom URI schemes may not start corresponding application
Custom URI schemes for application protocol handlers may not start the corresponding application for local intranet and trusted sites in Internet Explorer.

See details >
OS Build 15063.1689

March 12, 2019
KB4489871
Mitigated
March 19, 2019 10:00 AM PT
" -- title: Issue Details +- title: Issue details - items: - type: markdown text: " diff --git a/windows/release-information/status-windows-10-1709.yml b/windows/release-information/status-windows-10-1709.yml index 1a6af2df2c..3b200bcedb 100644 --- a/windows/release-information/status-windows-10-1709.yml +++ b/windows/release-information/status-windows-10-1709.yml @@ -59,7 +59,7 @@ sections: - items: - type: markdown text: "
This table offers a summary of current active issues and those issues that have been resolved in the last 30 days.
- +
SummaryAffected buildStatusLast updated
@@ -67,7 +67,7 @@ sections:
SummaryOriginating updateStatusLast updated
End-user-defined characters (EUDC) may cause blue screen at startup
If you enable per font end-user-defined characters (EUDC), the system may stop working and a blue screen may appear at startup.

See details >
OS Build 16299.1059

March 19, 2019
KB4489890
Resolved
KB4493441
April 09, 2019 10:00 AM PT
MSXML6 causes applications to stop responding if an exception was thrown
MSXML6 causes applications to stop responding if an exception was thrown during node operations, such as appendChild(), insertBefore(), and moveNode().

See details >
OS Build 16299.904

January 08, 2019
KB4480978
Resolved
KB4493441
April 09, 2019 10:00 AM PT
Stop error when attempting to start SSH from WSL
A stop error occurs when attempting to start the Secure Shell client program from Windows Subsystem for Linux with agent forwarding enabled using a command line switch (ssh –A) or

See details >
OS Build 16299.1029

March 12, 2019
KB4489886
Resolved
KB4493441
April 09, 2019 10:00 AM PT
" -- title: Issue Details +- title: Issue details - items: - type: markdown text: " diff --git a/windows/release-information/status-windows-10-1803.yml b/windows/release-information/status-windows-10-1803.yml index 999cf334ec..d816f8d9bf 100644 --- a/windows/release-information/status-windows-10-1803.yml +++ b/windows/release-information/status-windows-10-1803.yml @@ -59,7 +59,7 @@ sections: - items: - type: markdown text: "
This table offers a summary of current active issues and those issues that have been resolved in the last 30 days.
- +
SummaryAffected buildStatusLast updated
@@ -68,7 +68,7 @@ sections:
SummaryOriginating updateStatusLast updated
End-user-defined characters (EUDC) may cause blue screen at startup
If you enable per font end-user-defined characters (EUDC), the system may stop working and a blue screen may appear at startup.

See details >
OS Build 17134.677

March 19, 2019
KB4489894
Resolved
KB4493464
April 09, 2019 10:00 AM PT
MSXML6 may cause applications to stop responding
MSXML6 may cause applications to stop responding if an exception was thrown during node operations, such as appendChild(), insertBefore(), and moveNode().

See details >
OS Build 17134.523

January 08, 2019
KB4480966
Resolved
KB4493464
April 09, 2019 10:00 AM PT
Stop error when attempting to start SSH from WSL
A stop error occurs when attempting to start Secure Shell from Windows Subsystem for Linux with agent forwarding using a command line switch (ssh –A) or a configuration setting.

See details >
OS Build 17134.648

March 12, 2019
KB4489868
Resolved
KB4493464
April 09, 2019 10:00 AM PT
" -- title: Issue Details +- title: Issue details - items: - type: markdown text: " diff --git a/windows/release-information/status-windows-10-1809-and-windows-server-2019.yml b/windows/release-information/status-windows-10-1809-and-windows-server-2019.yml index eb06023023..7aca881aa6 100644 --- a/windows/release-information/status-windows-10-1809-and-windows-server-2019.yml +++ b/windows/release-information/status-windows-10-1809-and-windows-server-2019.yml @@ -64,7 +64,7 @@ sections: - items: - type: markdown text: "
This table offers a summary of current active issues and those issues that have been resolved in the last 30 days.
- +
SummaryAffected buildStatusLast updated
@@ -75,7 +75,7 @@ sections:
SummaryOriginating updateStatusLast updated
End-user-defined characters (EUDC) may cause blue screen at startup
If you enable per font end-user-defined characters (EUDC), the system may stop working and a blue screen may appear at startup.

See details >
OS Build 17763.404

April 02, 2019
KB4490481
Resolved
KB4493509
April 09, 2019 10:00 AM PT
Internet Explorer 11 authentication issue with multiple concurrent logons
Internet Explorer 11 users may encounter issues if two or more people use the same user account for multiple, concurrent login sessions on the same Windows Server machine.

See details >
OS Build 17763.253

January 08, 2019
KB4480116
Resolved
KB4493509
April 09, 2019 10:00 AM PT
MSXML6 may cause applications to stop responding
MSXML6 may cause applications to stop responding if an exception was thrown during node operations, such as appendChild(), insertBefore(), and moveNode().

See details >
OS Build 17763.253

January 08, 2019
KB4480116
Resolved
KB4493509
April 09, 2019 10:00 AM PT
" -- title: Issue Details +- title: Issue details - items: - type: markdown text: " diff --git a/windows/release-information/status-windows-7-and-windows-server-2008-r2-sp1.yml b/windows/release-information/status-windows-7-and-windows-server-2008-r2-sp1.yml index d6fb4bd20d..78608d0fff 100644 --- a/windows/release-information/status-windows-7-and-windows-server-2008-r2-sp1.yml +++ b/windows/release-information/status-windows-7-and-windows-server-2008-r2-sp1.yml @@ -59,7 +59,7 @@ sections: - items: - type: markdown text: "
This table offers a summary of current active issues and those issues that have been resolved in the last 30 days.
- +
SummaryAffected buildStatusLast updated
@@ -73,7 +73,7 @@ sections:
SummaryOriginating updateStatusLast updated
Virtual machines fail to restore.
Virtual machines (VMs) may fail to restore successfully if the VM has been saved and restored once before.

See details >
January 08, 2019
KB4480970
Resolved
KB4490511
April 21, 2019 12:00 AM PT
Local Administrators unable to remotely access shares.
Local users who are part of the local Administrators group may not be able to remotely access shares on Windows Server 2008 R2 and Windows 7 machines.

See details >
January 08, 2019
KB4480970
Resolved
KB4487345
April 20, 2019 11:53 PM PT
System may be unresponsive after restart if Avira antivirus software installed.
Devices with Avira antivirus software installed may become unresponsive upon restart.

See details >
April 09, 2019
KB4493472
Investigating
April 09, 2019 10:00 AM PT
" -- title: Issue Details +- title: Issue details - items: - type: markdown text: " From aef5b81084badda2dd040869b1929f842fd491d8 Mon Sep 17 00:00:00 2001 From: "Nisha Mittal (Wipro Ltd.)" Date: Thu, 25 Apr 2019 02:21:46 -0700 Subject: [PATCH 211/724] Sorting order changed --- ...ndows-7-and-windows-server-2008-r2-sp1.yml | 6 +++--- ...windows-8.1-and-windows-server-2012-r2.yml | 6 +++--- ...windows-8.1-and-windows-server-2012-r2.yml | 20 +++++++++---------- 3 files changed, 16 insertions(+), 16 deletions(-) diff --git a/windows/release-information/resolved-issues-windows-7-and-windows-server-2008-r2-sp1.yml b/windows/release-information/resolved-issues-windows-7-and-windows-server-2008-r2-sp1.yml index ae74bcb1ff..b52524a3f1 100644 --- a/windows/release-information/resolved-issues-windows-7-and-windows-server-2008-r2-sp1.yml +++ b/windows/release-information/resolved-issues-windows-7-and-windows-server-2008-r2-sp1.yml @@ -30,8 +30,8 @@ sections: - title: Resolved issues - items: - type: markdown - text: "
- + text: " +
SummaryAffected buildStatusDate resolved
@@ -47,7 +47,7 @@ sections:
SummaryOriginating updateStatusDate resolved
Virtual machines fail to restore.
Virtual machines (VMs) may fail to restore successfully if the VM has been saved and restored once before.

See details >
January 08, 2019
KB4480970
Resolved
KB4490511
April 21, 2019 12:00 AM PT
Local Administrators unable to remotely access shares.
Local users who are part of the local Administrators group may not be able to remotely access shares on Windows Server 2008 R2 and Windows 7 machines.

See details >
January 08, 2019
KB4480970
Resolved
KB4487345
April 20, 2019 11:53 PM PT
Internet Explorer 11 authentication issue with multiple concurrent logons.
Internet Explorer 11 users may encounter issues if two or more people use the same user account for multiple, concurrent login sessions on the same Windows Server machine.

See details >
January 08, 2019
KB4480970
Resolved
KB4493472
April 09, 2019 10:00 AM PT
" -- title: Issue Details +- title: Issue details - items: - type: markdown text: " diff --git a/windows/release-information/resolved-issues-windows-8.1-and-windows-server-2012-r2.yml b/windows/release-information/resolved-issues-windows-8.1-and-windows-server-2012-r2.yml index 000affb114..70e61c4227 100644 --- a/windows/release-information/resolved-issues-windows-8.1-and-windows-server-2012-r2.yml +++ b/windows/release-information/resolved-issues-windows-8.1-and-windows-server-2012-r2.yml @@ -30,8 +30,8 @@ sections: - title: Resolved issues - items: - type: markdown - text: "
- + text: " +
SummaryAffected buildStatusDate resolved
@@ -48,7 +48,7 @@ sections:
SummaryOriginating updateStatusDate resolved
Internet Explorer 11 authentication issue with multiple concurrent logons
Internet Explorer 11 users may encounter issues if two or more people use the same user account for multiple, concurrent login sessions on the same Windows Server machine.

See details >
January 08, 2019
KB4480963
Resolved
KB4493446
April 09, 2019 10:00 AM PT
MSXML6 may cause applications to stop responding.
MSXML6 may cause applications to stop responding if an exception was thrown during node operations, such as appendChild(), insertBefore(), and moveNode().

See details >
January 08, 2019
KB4480963
Resolved
KB4493446
April 09, 2019 10:00 AM PT
Custom URI schemes may not start corresponding application
Custom URI schemes for application protocol handlers may not start the corresponding application for local intranet and trusted sites in Internet Explorer.

See details >
March 12, 2019
KB4489881
Resolved
KB4493446
April 09, 2019 10:00 AM PT
" -- title: Issue Details +- title: Issue details - items: - type: markdown text: " diff --git a/windows/release-information/status-windows-8.1-and-windows-server-2012-r2.yml b/windows/release-information/status-windows-8.1-and-windows-server-2012-r2.yml index 70e2cb745d..38b8202f87 100644 --- a/windows/release-information/status-windows-8.1-and-windows-server-2012-r2.yml +++ b/windows/release-information/status-windows-8.1-and-windows-server-2012-r2.yml @@ -59,21 +59,21 @@ sections: - items: - type: markdown text: "
This table offers a summary of current active issues and those issues that have been resolved in the last 30 days.
- +
SummaryAffected buildStatusLast updated
+ + + + + - - - - -
SummaryOriginating updateStatusLast updated
System may be unresponsive after restart if Avira antivirus software installed
Devices with Avira antivirus software installed may become unresponsive upon restart.

See details >
April 09, 2019
KB4493446
Investigating
April 09, 2019 10:00 AM PT
Issue using PXE to start a device from WDS
There may be issues using the Preboot Execution Environment (PXE) to start a device from a Windows Deployment Services (WDS) server configured to use Variable Window Extension.

See details >
March 12, 2019
KB4489881
Mitigated
April 09, 2019 10:00 AM PT
System unresponsive after restart if Sophos Endpoint Protection installed
Devices with Sophos Endpoint Protection installed and managed by Sophos Central or Sophos Enterprise Console (SEC) may become unresponsive upon restart.

See details >
April 09, 2019
KB4493446
Mitigated
April 09, 2019 10:00 AM PT
System may be unresponsive after restart if ArcaBit antivirus software installed
Devices with ArcaBit antivirus software installed may become unresponsive upon restart.

See details >
April 09, 2019
KB4493446
Mitigated
April 09, 2019 10:00 AM PT
Certain operations performed on on a Cluster Shared Volume may fail
Certain operations, such as rename, performed on files or folders on a Cluster Shared Volume (CSV) may fail with the error, “STATUS_BAD_IMPERSONATION_LEVEL (0xC00000A5)”.

See details >
April 09, 2019
KB4493446
Mitigated
April 09, 2019 10:00 AM PT
Internet Explorer 11 authentication issue with multiple concurrent logons
Internet Explorer 11 users may encounter issues if two or more people use the same user account for multiple, concurrent login sessions on the same Windows Server machine.

See details >
January 08, 2019
KB4480963
Resolved
KB4493446
April 09, 2019 10:00 AM PT
MSXML6 may cause applications to stop responding.
MSXML6 may cause applications to stop responding if an exception was thrown during node operations, such as appendChild(), insertBefore(), and moveNode().

See details >
January 08, 2019
KB4480963
Resolved
KB4493446
April 09, 2019 10:00 AM PT
Custom URI schemes may not start corresponding application
Custom URI schemes for application protocol handlers may not start the corresponding application for local intranet and trusted sites in Internet Explorer.

See details >
March 12, 2019
KB4489881
Resolved
KB4493446
April 09, 2019 10:00 AM PT
Issue using PXE to start a device from WDS
There may be issues using the Preboot Execution Environment (PXE) to start a device from a Windows Deployment Services (WDS) server configured to use Variable Window Extension.

See details >
March 12, 2019
KB4489881
Mitigated
April 09, 2019 10:00 AM PT
System unresponsive after restart if Sophos Endpoint Protection installed
Devices with Sophos Endpoint Protection installed and managed by Sophos Central or Sophos Enterprise Console (SEC) may become unresponsive upon restart.

See details >
April 09, 2019
KB4493446
Mitigated
April 09, 2019 10:00 AM PT
System may be unresponsive after restart if Avira antivirus software installed
Devices with Avira antivirus software installed may become unresponsive upon restart.

See details >
April 09, 2019
KB4493446
Investigating
April 09, 2019 10:00 AM PT
System may be unresponsive after restart if ArcaBit antivirus software installed
Devices with ArcaBit antivirus software installed may become unresponsive upon restart.

See details >
April 09, 2019
KB4493446
Mitigated
April 09, 2019 10:00 AM PT
Devices may not respond at login or Welcome screen if running certain Avast software
Devices running Avast for Business, Avast CloudCare, and AVG Business Edition antivirus software may become unresponsive after restart.

See details >
April 09, 2019
KB4493446
Resolved
April 09, 2019 10:00 AM PT
Certain operations performed on on a Cluster Shared Volume may fail
Certain operations, such as rename, performed on files or folders on a Cluster Shared Volume (CSV) may fail with the error, “STATUS_BAD_IMPERSONATION_LEVEL (0xC00000A5)”.

See details >
April 09, 2019
KB4493446
Mitigated
April 09, 2019 10:00 AM PT
Embedded objects may display incorrectly
Any compound document (OLE) server application that places embedded objects into the Windows Metafile (WMF) using the PatBlt API may display embedded objects incorrectly.

See details >
February 12, 2019
KB4487000
Resolved
KB4493446
April 09, 2019 10:00 AM PT
" -- title: Issue Details +- title: Issue details - items: - type: markdown text: " @@ -85,11 +85,11 @@ sections: - type: markdown text: " - + - +
DetailsAffected buildStatusHistory
System unresponsive after restart if Sophos Endpoint Protection installed
Microsoft and Sophos have identified an issue on devices with Sophos Endpoint Protection installed and managed by either Sophos Central or Sophos Enterprise Console (SEC) that may cause the system to become unresponsive upon restart after installing KB4493446.

Microsoft has temporarily blocked devices from receiving this update if the Sophos Endpoint is installed until a solution is available.

Affected platforms: 
  • Client: Windows 8.1; Windows 7, Service Pack 1 
  • Server: Windows Server 2012 R2; Windows Server 2008 R2 SP1 

Guidance for Sophos Endpoint and Sophos Enterprise Console customers can be found in the Sophos support article.

Back to top
April 09, 2019
KB4493446
Mitigated
Last updated:
April 09, 2019 10:00 AM PT

Opened:
April 09, 2019 10:00 AM PT
System may be unresponsive after restart if Avira antivirus software installed
Microsoft and Avira have identified an issue on devices with Avira antivirus software installed that may cause the system to become unresponsive upon restart after installing KB4493446.

Microsoft has temporarily blocked devices from receiving this update if Avira antivirus software is installed.

Affected platforms: 
  • Client: Windows 8.1; Windows 7, Service Pack 1 
  • Server: Windows Server 2012 R2; Windows Server 2008 R2 SP1 

Next steps: We are presently investigating this issue with Avira and will provide an update when available.

Back to top
April 09, 2019
KB4493446
Investigating
Last updated:
April 09, 2019 10:00 AM PT

Opened:
April 09, 2019 10:00 AM PT
System unresponsive after restart if Sophos Endpoint Protection installed
Microsoft and Sophos have identified an issue on devices with Sophos Endpoint Protection installed and managed by either Sophos Central or Sophos Enterprise Console (SEC) that may cause the system to become unresponsive upon restart after installing KB4493446.

Microsoft has temporarily blocked devices from receiving this update if the Sophos Endpoint is installed until a solution is available.

Affected platforms: 
  • Client: Windows 8.1; Windows 7, Service Pack 1 
  • Server: Windows Server 2012 R2; Windows Server 2008 R2 SP1 

Guidance for Sophos Endpoint and Sophos Enterprise Console customers can be found in the Sophos support article.

Back to top
April 09, 2019
KB4493446
Mitigated
Last updated:
April 09, 2019 10:00 AM PT

Opened:
April 09, 2019 10:00 AM PT
System may be unresponsive after restart if ArcaBit antivirus software installed
Microsoft and ArcaBit have identified an issue on devices with ArcaBit antivirus software installed that may cause the system to become unresponsive upon restart after installing KB4493446.

Microsoft has temporarily blocked devices from receiving this update if ArcaBit antivirus software is installed.

Affected platforms: 
  • Client: Windows 8.1; Windows 7, Service Pack 1 
  • Server: Windows Server 2012 R2; Windows Server 2008 R2 SP1 

ArcaBit has released an update to address this issue. For more information, see the Arcabit support article.

Back to top
April 09, 2019
KB4493446
Mitigated
Last updated:
April 09, 2019 10:00 AM PT

Opened:
April 09, 2019 10:00 AM PT
Devices may not respond at login or Welcome screen if running certain Avast software
Microsoft and Avast have identified an issue on devices running Avast for Business, Avast CloudCare, and AVG Business Edition antivirus software after you install KB4493446 and restart. Devices may become unresponsive at the login or Welcome screen. Additionally, you may be unable to log in or log in after an extended period of time.

Affected platforms: 
  • Client: Windows 8.1; Windows 7, Service Pack 1 
  • Server: Windows Server 2012 R2; Windows Server 2008 R2 SP1 


Resolution: Avast has released emergency updates to address this issue. For more information and AV update schedule, see the Avast support KB article.

Back to top
April 09, 2019
KB4493446
Resolved
Resolved:
April 09, 2019 10:00 AM PT

Opened:
April 09, 2019 10:00 AM PT
Certain operations performed on on a Cluster Shared Volume may fail
Certain operations, such as rename, that you perform on files or folders that are on a Cluster Shared Volume (CSV) may fail with the error, “STATUS_BAD_IMPERSONATION_LEVEL (0xC00000A5)”. This occurs when you perform the operation on a CSV owner node from a process that doesn’t have administrator privilege.

Affected platforms: 
  • Client: Windows 8.1 
  • Server: Windows Server 2012 R2 

Workaround: Do one of the following:

  • Perform the operation from a process that has administrator privilege.
  • Perform the operation from a node that doesn’t have CSV ownership.

Next steps: Microsoft is working on a resolution and will provide an update in an upcoming release.

Back to top
April 09, 2019
KB4493446
Mitigated
Last updated:
April 09, 2019 10:00 AM PT

Opened:
April 09, 2019 10:00 AM PT
Devices may not respond at login or Welcome screen if running certain Avast software
Microsoft and Avast have identified an issue on devices running Avast for Business, Avast CloudCare, and AVG Business Edition antivirus software after you install KB4493446 and restart. Devices may become unresponsive at the login or Welcome screen. Additionally, you may be unable to log in or log in after an extended period of time.

Affected platforms: 
  • Client: Windows 8.1; Windows 7, Service Pack 1 
  • Server: Windows Server 2012 R2; Windows Server 2008 R2 SP1 


Resolution: Avast has released emergency updates to address this issue. For more information and AV update schedule, see the Avast support KB article.

Back to top
April 09, 2019
KB4493446
Resolved
Resolved:
April 09, 2019 10:00 AM PT

Opened:
April 09, 2019 10:00 AM PT
" @@ -98,8 +98,8 @@ sections: - type: markdown text: " - +
DetailsAffected buildStatusHistory
Custom URI schemes may not start corresponding application
After installing KB4489881, custom URI schemes for application protocol handlers may not start the corresponding application for local intranet and trusted sites security zones on Internet Explorer.

Affected platforms: 
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 8.1; Windows 7, Service Pack 1 
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2; Windows Server 2008 R2 SP1 

Resolution: This issue is resolved in KB4493446.

Back to top
March 12, 2019
KB4489881
Resolved
KB4493446
Resolved:
April 09, 2019 10:00 AM PT

Opened:
March 12, 2019 10:00 AM PT
Issue using PXE to start a device from WDS
After installing KB4489881, there may be issues using the Preboot Execution Environment (PXE) to start a device from a Windows Deployment Services (WDS) server configured to use Variable Window Extension. This may cause the connection to the WDS server to terminate prematurely while downloading the image. This issue does not affect clients or devices that are not using Variable Window Extension.

Affected platforms: 
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10 Enterprise LTSC 2016; Windows 8.1 
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server 2016; Windows Server 2012 R2 

Workaround: To mitigate the issue, disable the Variable Window Extension on WDS server using one of the following options:

Option 1:
Open an Administrator Command prompt and type the following:

Wdsutil /Set-TransportServer /EnableTftpVariableWindowExtension:No

Option 2:
Use the Windows Deployment Services UI to make the following adjustment:

1. Open Windows Deployment Services from Windows Administrative Tools.
2. Expand Servers and right-click a WDS server.
3. Open its properties and clear the Enable Variable Window Extension box on the TFTP tab.

Option 3:
Set the following registry value to 0:

HKLM\\System\\CurrentControlSet\\Services\\WDSServer\\Providers\\WDSTFTP\\EnableVariableWindowExtension

Restart the WDSServer service after disabling the Variable Window Extension.

Next steps: Microsoft is working on a resolution and will provide an update in an upcoming release.

Back to top
March 12, 2019
KB4489881
Mitigated
Last updated:
April 09, 2019 10:00 AM PT

Opened:
March 12, 2019 10:00 AM PT
Custom URI schemes may not start corresponding application
After installing KB4489881, custom URI schemes for application protocol handlers may not start the corresponding application for local intranet and trusted sites security zones on Internet Explorer.

Affected platforms: 
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 8.1; Windows 7, Service Pack 1 
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2; Windows Server 2008 R2 SP1 

Resolution: This issue is resolved in KB4493446.

Back to top
March 12, 2019
KB4489881
Resolved
KB4493446
Resolved:
April 09, 2019 10:00 AM PT

Opened:
March 12, 2019 10:00 AM PT
" From 7d8272272e88665e0ca5bc441f51c94f5c4fbdb5 Mon Sep 17 00:00:00 2001 From: JohanFreelancer9 <48568725+JohanFreelancer9@users.noreply.github.com> Date: Thu, 25 Apr 2019 18:54:11 +0530 Subject: [PATCH 212/724] Update windows/security/identity-protection/hello-for-business/hello-hybrid-key-trust-prereqs.md Co-Authored-By: Malind19 --- .../hello-for-business/hello-hybrid-key-trust-prereqs.md | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/windows/security/identity-protection/hello-for-business/hello-hybrid-key-trust-prereqs.md b/windows/security/identity-protection/hello-for-business/hello-hybrid-key-trust-prereqs.md index c191cc7a49..a4a1cc41b4 100644 --- a/windows/security/identity-protection/hello-for-business/hello-hybrid-key-trust-prereqs.md +++ b/windows/security/identity-protection/hello-for-business/hello-hybrid-key-trust-prereqs.md @@ -97,7 +97,7 @@ You can deploy Windows Hello for Business key trust in non-federated and federat ## Multifactor Authentication ## Windows Hello for Business is a strong, two-factor credential the helps organizations reduce their dependency on passwords. The provisioning process lets a user enroll in Windows Hello for Business using their user name and password as one factor, but needs a second factor of authentication. -Hybrid Windows Hello for Business deployments can use Azure’s Multi-factor Authentication service or they can use multi-factor authentication provides by Windows Server 2012 R2 or later Active Directory Federation Services, which includes an adapter model that enables third parties to integrate their multi-factor authentication into AD FS. The Multi-factor authentication enabled in Office 365 license is sufficient for direct Multi-factor Authentication against Azure AD. +Hybrid Windows Hello for Business deployments can use Azure’s Multi-factor Authentication service or they can use multi-factor authentication provided by Windows Server 2012 R2 or later Active Directory Federation Services, which include an adapter model that enables third parties to integrate their multi-factor authentication into AD FS. The Multi-factor authentication enabled in Office 365 license is sufficient for direct Multi-factor Authentication against Azure AD. ### Section Review > [!div class="checklist"] From fc88e594bfc952f8f884dac73d5dedaadecfe83f Mon Sep 17 00:00:00 2001 From: "Nisha Mittal (Wipro Ltd.)" Date: Thu, 25 Apr 2019 12:19:01 -0700 Subject: [PATCH 213/724] Added two new links --- windows/release-information/TOC.md | 6 +++++- .../resolved-issues-windows-server-2008-sp2.yml | 1 + .../resolved-issues-windows-server-2012.yml | 1 + .../release-information/status-windows-server-2008-sp2.yml | 1 + windows/release-information/status-windows-server-2012.yml | 1 + 5 files changed, 9 insertions(+), 1 deletion(-) create mode 100644 windows/release-information/resolved-issues-windows-server-2008-sp2.yml create mode 100644 windows/release-information/resolved-issues-windows-server-2012.yml create mode 100644 windows/release-information/status-windows-server-2008-sp2.yml create mode 100644 windows/release-information/status-windows-server-2012.yml diff --git a/windows/release-information/TOC.md b/windows/release-information/TOC.md index e924832067..5beeab7019 100644 --- a/windows/release-information/TOC.md +++ b/windows/release-information/TOC.md @@ -16,4 +16,8 @@ ### [Windows 8.1 and Windows Server 2012 R2](status-windows-8.1-and-windows-server-2012-r2.yml) ####[Resolved issues](resolved-issues-windows-8.1-and-windows-server-2012-r2.yml) ### [Windows 7 and Windows Server 2008 R2](status-windows-7-and-windows-server-2008-r2-sp1.yml) -####[Resolved issues](resolved-issues-windows-7-and-windows-server-2008-r2-sp1.yml) \ No newline at end of file +####[Resolved issues](resolved-issues-windows-7-and-windows-server-2008-r2-sp1.yml) +### [Windows Server 2012](status-windows-server-2012.yml) +####[Resolved issues](resolved-issues-windows-server-2012.yml) +### [Windows Server 2008 SP2](status-windows-server-2008-sp2.yml) +####[Resolved issues](resolved-issues-windows-server-2008-sp2.yml) \ No newline at end of file diff --git a/windows/release-information/resolved-issues-windows-server-2008-sp2.yml b/windows/release-information/resolved-issues-windows-server-2008-sp2.yml new file mode 100644 index 0000000000..5f282702bb --- /dev/null +++ b/windows/release-information/resolved-issues-windows-server-2008-sp2.yml @@ -0,0 +1 @@ + \ No newline at end of file diff --git a/windows/release-information/resolved-issues-windows-server-2012.yml b/windows/release-information/resolved-issues-windows-server-2012.yml new file mode 100644 index 0000000000..5f282702bb --- /dev/null +++ b/windows/release-information/resolved-issues-windows-server-2012.yml @@ -0,0 +1 @@ + \ No newline at end of file diff --git a/windows/release-information/status-windows-server-2008-sp2.yml b/windows/release-information/status-windows-server-2008-sp2.yml new file mode 100644 index 0000000000..5f282702bb --- /dev/null +++ b/windows/release-information/status-windows-server-2008-sp2.yml @@ -0,0 +1 @@ + \ No newline at end of file diff --git a/windows/release-information/status-windows-server-2012.yml b/windows/release-information/status-windows-server-2012.yml new file mode 100644 index 0000000000..5f282702bb --- /dev/null +++ b/windows/release-information/status-windows-server-2012.yml @@ -0,0 +1 @@ + \ No newline at end of file From 0d6b4c0692ae87eb77319e9c8f4bd8a31f9036c3 Mon Sep 17 00:00:00 2001 From: "Nisha Mittal (Wipro Ltd.)" Date: Thu, 25 Apr 2019 14:54:19 -0700 Subject: [PATCH 214/724] Updates --- .../resolved-issues-windows-server-2012.yml | 38 ++++++++- .../status-windows-server-2012.yml | 80 ++++++++++++++++++- 2 files changed, 116 insertions(+), 2 deletions(-) diff --git a/windows/release-information/resolved-issues-windows-server-2012.yml b/windows/release-information/resolved-issues-windows-server-2012.yml index 5f282702bb..3a47cfc0ec 100644 --- a/windows/release-information/resolved-issues-windows-server-2012.yml +++ b/windows/release-information/resolved-issues-windows-server-2012.yml @@ -1 +1,37 @@ - \ No newline at end of file +### YamlMime:YamlDocument + +documentType: LandingData +title: Windows Server 2012 +metadata: + document_id: + title: Windows Server 2012 + description: View annoucements and review known issues and fixes for Windows Server 2012 + keywords: Windows 10, issues, fixes, announcements, Windows Server, advisories + ms.localizationpriority: high + author: greg-lindsay + ms.author: greglin + manager: dougkim + ms.topic: article + ms.devlang: na + +sections: +- items: + - type: markdown + text: " + Find information on known issues for Windows Server 2012. Looking for a specific issue? Press CTRL + F (or Command + F if you are using a Mac) and enter your search term(s). + + " + +- items: + - type: markdown + text: " +
+ " + +- title: Resolved issues +- items: + - type: markdown + text: "
This table offers a summary of current active issues and those issues that have been resolved in the last 30 days.
+ +
SummaryOriginating updateStatusLast updated
+ " diff --git a/windows/release-information/status-windows-server-2012.yml b/windows/release-information/status-windows-server-2012.yml index 5f282702bb..ae3aa816fd 100644 --- a/windows/release-information/status-windows-server-2012.yml +++ b/windows/release-information/status-windows-server-2012.yml @@ -1 +1,79 @@ - \ No newline at end of file +### YamlMime:YamlDocument + +documentType: LandingData +title: Windows Server 2012 +metadata: + document_id: + title: Windows Server 2012 + description: View annoucements and review known issues and fixes for Windows Server 2012 + keywords: Windows 10, issues, fixes, announcements, Windows Server, advisories + ms.localizationpriority: high + author: greg-lindsay + ms.author: greglin + manager: dougkim + ms.topic: article + ms.devlang: na + +sections: +- items: + - type: markdown + text: " + Find information on known issues for Windows Server 2012. Looking for a specific issue? Press CTRL + F (or Command + F if you are using a Mac) and enter your search term(s). + + " + +- items: + - type: list + style: cards + className: cardsM + columns: 3 + items: + + - href: https://techcommunity.microsoft.com/t5/Windows-IT-Pro-Blog/Windows-10-version-1809-designated-for-broad-deployment/ba-p/389540 + html: Read the announcement > + image: + src: https://docs.microsoft.com//media/common/i_deploy.svg + title: Windows 10, version 1809 designated for broad deployment + - href: https://blogs.windows.com/windowsexperience/2019/04/04/improving-the-windows-10-update-experience-with-control-quality-and-transparency + html: Find out more > + image: + src: https://docs.microsoft.com/media/common/i_whats-new.svg + title: Improvements to the Windows 10 update experience are coming + - href: https://blogs.windows.com/windowsexperience/2019/03/06/data-insights-and-listening-to-improve-the-customer-experience + html: Learn about our approach > + image: + src: https://docs.microsoft.com/media/common/i_investigate.svg + title: How do we measure and improve the quality of Windows? +- items: + - type: markdown + text: " +
See all messages >
+ " +- items: + - type: markdown + text: " +
+ " + +- title: Known issues +- items: + - type: markdown + text: "
This table offers a summary of current active issues and those issues that have been resolved in the last 30 days.
+ +
SummaryOriginating updateStatusLast updated
+ " + +- title: Issue details +- items: + - type: markdown + text: " +
+
+ " +- title: +- items: + - type: markdown + text: " + +
DetailsAffected buildStatusHistory
+ " From 0324f6ebdaeb3f5d49b4ec78ae1db87e5ccfc8f4 Mon Sep 17 00:00:00 2001 From: "Nisha Mittal (Wipro Ltd.)" Date: Thu, 25 Apr 2019 16:32:12 -0700 Subject: [PATCH 215/724] Updates --- .../resolved-issues-windows-10-1507.yml | 40 +++---- .../resolved-issues-windows-10-1607.yml | 64 +++++------ .../resolved-issues-windows-10-1703.yml | 52 ++++----- .../resolved-issues-windows-10-1709.yml | 52 ++++----- .../resolved-issues-windows-10-1803.yml | 72 ++++++------- ...indows-10-1809-and-windows-server-2019.yml | 88 +++++++-------- ...ndows-7-and-windows-server-2008-r2-sp1.yml | 48 ++++----- ...windows-8.1-and-windows-server-2012-r2.yml | 52 ++++----- ...esolved-issues-windows-server-2008-sp2.yml | 68 +++++++++++- .../resolved-issues-windows-server-2012.yml | 52 +++++++-- .../status-windows-10-1507.yml | 8 +- ...indows-10-1607-and-windows-server-2016.yml | 33 +++--- .../status-windows-10-1703.yml | 12 +-- .../status-windows-10-1709.yml | 16 +-- .../status-windows-10-1803.yml | 21 ++-- ...indows-10-1809-and-windows-server-2019.yml | 30 +++--- ...ndows-7-and-windows-server-2008-r2-sp1.yml | 40 +++---- ...windows-8.1-and-windows-server-2012-r2.yml | 41 +++---- .../status-windows-server-2008-sp2.yml | 102 +++++++++++++++++- .../status-windows-server-2012.yml | 33 +++++- 20 files changed, 580 insertions(+), 344 deletions(-) diff --git a/windows/release-information/resolved-issues-windows-10-1507.yml b/windows/release-information/resolved-issues-windows-10-1507.yml index 13f1da0d4e..bd5c223e6a 100644 --- a/windows/release-information/resolved-issues-windows-10-1507.yml +++ b/windows/release-information/resolved-issues-windows-10-1507.yml @@ -32,16 +32,16 @@ sections: - type: markdown text: " - - - - - - - - - - + + + + + + + + + +
SummaryOriginating updateStatusDate resolved
MSXML6 may cause applications to stop responding
MSXML6 may cause applications to stop responding if an exception was thrown during node operations, such as appendChild(), insertBefore(), and moveNode().

See details >
OS Build 10240.18094

January 08, 2019
KB4480962
Resolved
KB4493475
April 09, 2019 10:00 AM PT
Custom URI schemes may not start corresponding application
Custom URI schemes for application protocol handlers may not start the corresponding application for local intranet and trusted sites in Internet Explorer.

See details >
OS Build 10240.18158

March 12, 2019
KB4489872
Resolved
KB4493475
April 09, 2019 10:00 AM PT
Applications using Microsoft Jet database and Access 95 file format stop working
Applications that use a Microsoft Jet database with the Microsoft Access 95 file format may randomly stop working.

See details >
OS Build 10240.18132

February 12, 2019
KB4487018
Resolved
KB4489872
March 12, 2019 10:00 AM PT
Error 1309 when installing/uninstalling MSI or MSP files
Users may receive \"Error 1309\" while installing or uninstalling certain types of MSI and MSP files.

See details >
OS Build 10240.18132

February 12, 2019
KB4487018
Resolved
KB4489872
March 12, 2019 10:00 AM PT
First character of Japanese era name not recognized
The first character of the Japanese era name is not recognized as an abbreviation and may cause date parsing issues.

See details >
OS Build 10240.18132

February 12, 2019
KB4487018
Resolved
KB4489872
March 12, 2019 10:00 AM PT
Internet Explorer may fail to load images
Internet Explorer may fail to load images with a backslash (\\) in their relative source path.

See details >
OS Build 10240.18132

February 12, 2019
KB4487018
Resolved
KB4491101
February 21, 2019 02:00 PM PT
Applications using Microsoft Jet database fail to open
Applications that use a Microsoft Jet database with the Microsoft Access 97 file format may fail to open if column names are greater than 32 characters.

See details >
OS Build 10240.18094

January 08, 2019
KB4480962
Resolved
KB4487018
February 12, 2019 10:00 AM PT
Unable to access hotspots with third-party applications
Third-party applications may have difficulty authenticating hotspots.

See details >
OS Build 10240.18094

January 08, 2019
KB4480962
Resolved
KB4487018
February 12, 2019 10:00 AM PT
Unable to use Seek bar in Windows Media Player
Users may not be able to use the Seek bar in Windows Media Player when playing specific files.

See details >
OS Build 10240.18005

October 09, 2018
KB4462922
Resolved
KB4471323
December 11, 2018 10:00 AM PT
Guest VMs running Unicast NLB fail to respond after restart
All guest virtual machines running Unicast NLB fail to respond to NLB requests after the virtual machines restart.

See details >
OS Build 10240.17976

September 11, 2018
KB4457132
Resolved
KB4462922
October 09, 2018 10:00 AM PT
MSXML6 may cause applications to stop responding
MSXML6 may cause applications to stop responding if an exception was thrown during node operations, such as appendChild(), insertBefore(), and moveNode().

See details >
OS Build 10240.18094

January 08, 2019
KB4480962
Resolved
KB4493475
April 09, 2019
10:00 AM PT
Custom URI schemes may not start corresponding application
Custom URI schemes for application protocol handlers may not start the corresponding application for local intranet and trusted sites in Internet Explorer.

See details >
OS Build 10240.18158

March 12, 2019
KB4489872
Resolved
KB4493475
April 09, 2019
10:00 AM PT
Applications using Microsoft Jet database and Access 95 file format stop working
Applications that use a Microsoft Jet database with the Microsoft Access 95 file format may randomly stop working.

See details >
OS Build 10240.18132

February 12, 2019
KB4487018
Resolved
KB4489872
March 12, 2019
10:00 AM PT
Error 1309 when installing/uninstalling MSI or MSP files
Users may receive \"Error 1309\" while installing or uninstalling certain types of MSI and MSP files.

See details >
OS Build 10240.18132

February 12, 2019
KB4487018
Resolved
KB4489872
March 12, 2019
10:00 AM PT
First character of Japanese era name not recognized
The first character of the Japanese era name is not recognized as an abbreviation and may cause date parsing issues.

See details >
OS Build 10240.18132

February 12, 2019
KB4487018
Resolved
KB4489872
March 12, 2019
10:00 AM PT
Internet Explorer may fail to load images
Internet Explorer may fail to load images with a backslash (\\) in their relative source path.

See details >
OS Build 10240.18132

February 12, 2019
KB4487018
Resolved
KB4491101
February 21, 2019
02:00 PM PT
Applications using Microsoft Jet database fail to open
Applications that use a Microsoft Jet database with the Microsoft Access 97 file format may fail to open if column names are greater than 32 characters.

See details >
OS Build 10240.18094

January 08, 2019
KB4480962
Resolved
KB4487018
February 12, 2019
10:00 AM PT
Unable to access hotspots with third-party applications
Third-party applications may have difficulty authenticating hotspots.

See details >
OS Build 10240.18094

January 08, 2019
KB4480962
Resolved
KB4487018
February 12, 2019
10:00 AM PT
Unable to use Seek bar in Windows Media Player
Users may not be able to use the Seek bar in Windows Media Player when playing specific files.

See details >
OS Build 10240.18005

October 09, 2018
KB4462922
Resolved
KB4471323
December 11, 2018
10:00 AM PT
Guest VMs running Unicast NLB fail to respond after restart
All guest virtual machines running Unicast NLB fail to respond to NLB requests after the virtual machines restart.

See details >
OS Build 10240.17976

September 11, 2018
KB4457132
Resolved
KB4462922
October 09, 2018
10:00 AM PT
" @@ -57,7 +57,7 @@ sections: - type: markdown text: " - +
DetailsAffected buildStatusHistory
Custom URI schemes may not start corresponding application
After installing KB4489872, Custom URI Schemes for Application Protocol handlers may not start the corresponding application for local intranet and trusted sites on Internet Explorer.

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 8.1; Windows 7, Service Pack 1 
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2; Windows Server 2008 R2 SP1

Resolution: This issue was resolved in KB4493475.

Back to top
OS Build 10240.18158

March 12, 2019
KB4489872
Resolved
KB4493475
Resolved:
April 09, 2019 10:00 AM PT

Opened:
March 12, 2019 10:00 AM PT
Custom URI schemes may not start corresponding application
After installing KB4489872, Custom URI Schemes for Application Protocol handlers may not start the corresponding application for local intranet and trusted sites on Internet Explorer.

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 8.1; Windows 7, Service Pack 1 
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2; Windows Server 2008 R2 SP1

Resolution: This issue was resolved in KB4493475.

Back to top
OS Build 10240.18158

March 12, 2019
KB4489872
Resolved
KB4493475
Resolved:
April 09, 2019
10:00 AM PT

Opened:
March 12, 2019
10:00 AM PT
" @@ -66,10 +66,10 @@ sections: - type: markdown text: " - - - - + + + +
DetailsAffected buildStatusHistory
Applications using Microsoft Jet database and Access 95 file format stop working
Applications that use a Microsoft Jet database with the Microsoft Access 95 file format may randomly stop working.

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 7, Service Pack 1
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2008 R2 SP1

Resolution: This issue is resolved in KB4489872.

Back to top
OS Build 10240.18132

February 12, 2019
KB4487018
Resolved
KB4489872
Resolved:
March 12, 2019 10:00 AM PT

Opened:
February 12, 2019 10:00 AM PT
Error 1309 when installing/uninstalling MSI or MSP files
After installing KB4487018, users may receive “Error 1309” while installing or uninstalling certain types of MSI and MSP files.

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 8.1
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2

Resolution: This issue is resolved in KB4489872.

Back to top
OS Build 10240.18132

February 12, 2019
KB4487018
Resolved
KB4489872
Resolved:
March 12, 2019 10:00 AM PT

Opened:
February 12, 2019 10:00 AM PT
First character of Japanese era name not recognized
After installing KB4487018, the first character of the Japanese era name is not recognized as an abbreviation and may cause date parsing issues.

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 8.1; Windows 7, Service Pack 1
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2; Windows Server 2008 R2 SP1

Resolution: This issue is resolved in KB4489872.

Back to top
OS Build 10240.18132

February 12, 2019
KB4487018
Resolved
KB4489872
Resolved:
March 12, 2019 10:00 AM PT

Opened:
February 12, 2019 10:00 AM PT
Internet Explorer may fail to load images
After installing KB4487018, Internet Explorer may fail to load images with a backslash (\\) in their relative source path.

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 8.1; Windows 7, Service Pack 1
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2; Windows Server 2008 R2 SP1

Resolution: This issue is resolved in KB4491101.

Back to top
OS Build 10240.18132

February 12, 2019
KB4487018
Resolved
KB4491101
Resolved:
February 21, 2019 02:00 PM PT

Opened:
February 12, 2019 10:00 AM PT
Applications using Microsoft Jet database and Access 95 file format stop working
Applications that use a Microsoft Jet database with the Microsoft Access 95 file format may randomly stop working.

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 7, Service Pack 1
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2008 R2 SP1

Resolution: This issue is resolved in KB4489872.

Back to top
OS Build 10240.18132

February 12, 2019
KB4487018
Resolved
KB4489872
Resolved:
March 12, 2019
10:00 AM PT

Opened:
February 12, 2019
10:00 AM PT
Error 1309 when installing/uninstalling MSI or MSP files
After installing KB4487018, users may receive “Error 1309” while installing or uninstalling certain types of MSI and MSP files.

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 8.1
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2

Resolution: This issue is resolved in KB4489872.

Back to top
OS Build 10240.18132

February 12, 2019
KB4487018
Resolved
KB4489872
Resolved:
March 12, 2019
10:00 AM PT

Opened:
February 12, 2019
10:00 AM PT
First character of Japanese era name not recognized
After installing KB4487018, the first character of the Japanese era name is not recognized as an abbreviation and may cause date parsing issues.

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 8.1; Windows 7, Service Pack 1
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2; Windows Server 2008 R2 SP1

Resolution: This issue is resolved in KB4489872.

Back to top
OS Build 10240.18132

February 12, 2019
KB4487018
Resolved
KB4489872
Resolved:
March 12, 2019
10:00 AM PT

Opened:
February 12, 2019
10:00 AM PT
Internet Explorer may fail to load images
After installing KB4487018, Internet Explorer may fail to load images with a backslash (\\) in their relative source path.

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 8.1; Windows 7, Service Pack 1
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2; Windows Server 2008 R2 SP1

Resolution: This issue is resolved in KB4491101.

Back to top
OS Build 10240.18132

February 12, 2019
KB4487018
Resolved
KB4491101
Resolved:
February 21, 2019
02:00 PM PT

Opened:
February 12, 2019
10:00 AM PT
" @@ -78,9 +78,9 @@ sections: - type: markdown text: " - - - + + +
DetailsAffected buildStatusHistory
MSXML6 may cause applications to stop responding
After installing KB4480962, MSXML6 causes applications to stop responding if an exception was thrown during node operations, such as appendChild(), insertBefore(), and moveNode().

The Group Policy editor may stop responding when editing a Group Policy Object (GPO) that contains Group Policy Preferences (GPP) for Internet Explorer 10 settings.

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 8.1
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2

Resolution: This issue was resolved in KB4493475.

Back to top
OS Build 10240.18094

January 08, 2019
KB4480962
Resolved
KB4493475
Resolved:
April 09, 2019 10:00 AM PT

Opened:
January 08, 2019 10:00 AM PT
Applications using Microsoft Jet database fail to open
Applications that use a Microsoft Jet database with the Microsoft Access 97 file format may fail to open if the database has column names greater than 32 characters. The database will fail to open with the error, \"Unrecognized Database Format\".

Affected platforms:
  • Client: Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 8.1; Windows 7, Service Pack 1
  • Server: Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2; Windows Server 2008 R2 SP1

Resolution: This issue is resolved in KB4487018.

Back to top
OS Build 10240.18094

January 08, 2019
KB4480962
Resolved
KB4487018
Resolved:
February 12, 2019 10:00 AM PT

Opened:
January 08, 2019 10:00 AM PT
Unable to access hotspots with third-party applications
After installing KB4480962, third-party applications may have difficulty authenticating hotspots.

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 8.1
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2

Resolution: This issue is resolved in KB4487018.

Back to top
OS Build 10240.18094

January 08, 2019
KB4480962
Resolved
KB4487018
Resolved:
February 12, 2019 10:00 AM PT

Opened:
January 08, 2019 10:00 AM PT
MSXML6 may cause applications to stop responding
After installing KB4480962, MSXML6 causes applications to stop responding if an exception was thrown during node operations, such as appendChild(), insertBefore(), and moveNode().

The Group Policy editor may stop responding when editing a Group Policy Object (GPO) that contains Group Policy Preferences (GPP) for Internet Explorer 10 settings.

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 8.1
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2

Resolution: This issue was resolved in KB4493475.

Back to top
OS Build 10240.18094

January 08, 2019
KB4480962
Resolved
KB4493475
Resolved:
April 09, 2019
10:00 AM PT

Opened:
January 08, 2019
10:00 AM PT
Applications using Microsoft Jet database fail to open
Applications that use a Microsoft Jet database with the Microsoft Access 97 file format may fail to open if the database has column names greater than 32 characters. The database will fail to open with the error, \"Unrecognized Database Format\".

Affected platforms:
  • Client: Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 8.1; Windows 7, Service Pack 1
  • Server: Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2; Windows Server 2008 R2 SP1

Resolution: This issue is resolved in KB4487018.

Back to top
OS Build 10240.18094

January 08, 2019
KB4480962
Resolved
KB4487018
Resolved:
February 12, 2019
10:00 AM PT

Opened:
January 08, 2019
10:00 AM PT
Unable to access hotspots with third-party applications
After installing KB4480962, third-party applications may have difficulty authenticating hotspots.

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 8.1
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2

Resolution: This issue is resolved in KB4487018.

Back to top
OS Build 10240.18094

January 08, 2019
KB4480962
Resolved
KB4487018
Resolved:
February 12, 2019
10:00 AM PT

Opened:
January 08, 2019
10:00 AM PT
" @@ -89,7 +89,7 @@ sections: - type: markdown text: " - +
DetailsAffected buildStatusHistory
Unable to use Seek bar in Windows Media Player
After installing KB4462922, users may not be able to use the Seek Bar in Windows Media Player when playing specific files. This issue does not affect normal playback.

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 8.1; Windows 7, Service Pack 1
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2; Windows Server 2008 R2 SP1

Resolution: This issue is resolved in KB4471323.

Back to top
OS Build 10240.18005

October 09, 2018
KB4462922
Resolved
KB4471323
Resolved:
December 11, 2018 10:00 AM PT

Opened:
October 09, 2018 10:00 AM PT
Unable to use Seek bar in Windows Media Player
After installing KB4462922, users may not be able to use the Seek Bar in Windows Media Player when playing specific files. This issue does not affect normal playback.

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 8.1; Windows 7, Service Pack 1
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2; Windows Server 2008 R2 SP1

Resolution: This issue is resolved in KB4471323.

Back to top
OS Build 10240.18005

October 09, 2018
KB4462922
Resolved
KB4471323
Resolved:
December 11, 2018
10:00 AM PT

Opened:
October 09, 2018
10:00 AM PT
" @@ -98,6 +98,6 @@ sections: - type: markdown text: " - +
DetailsAffected buildStatusHistory
Guest VMs running Unicast NLB fail to respond after restart
All guest virtual machines running Unicast NLB fail to respond to NLB requests after the virtual machines restart.

Affected platforms:
  • Client: Windows 10, version 1803; Windows 10, version 1507
  • Server: Windows Server, version 1803

Resolution: This issue is resolved in KB4462922.

Back to top
OS Build 10240.17976

September 11, 2018
KB4457132
Resolved
KB4462922
Resolved:
October 09, 2018 10:00 AM PT

Opened:
September 11, 2018 10:00 AM PT
Guest VMs running Unicast NLB fail to respond after restart
All guest virtual machines running Unicast NLB fail to respond to NLB requests after the virtual machines restart.

Affected platforms:
  • Client: Windows 10, version 1803; Windows 10, version 1507
  • Server: Windows Server, version 1803

Resolution: This issue is resolved in KB4462922.

Back to top
OS Build 10240.17976

September 11, 2018
KB4457132
Resolved
KB4462922
Resolved:
October 09, 2018
10:00 AM PT

Opened:
September 11, 2018
10:00 AM PT
" diff --git a/windows/release-information/resolved-issues-windows-10-1607.yml b/windows/release-information/resolved-issues-windows-10-1607.yml index 4fbe83f6b4..398c697014 100644 --- a/windows/release-information/resolved-issues-windows-10-1607.yml +++ b/windows/release-information/resolved-issues-windows-10-1607.yml @@ -32,22 +32,22 @@ sections: - type: markdown text: " - - - - - - - - - - - - - - - - + + + + + + + + + + + + + + + +
SummaryOriginating updateStatusDate resolved
End-user-defined characters (EUDC) cause blue screen at startup
If you enable per font end-user-defined characters (EUDC), the system will stop working and a blue screen may appear at startup.

See details >
OS Build 14393.2879

March 19, 2019
KB4489889
Resolved
KB4493470
April 09, 2019 10:00 AM PT
Internet Explorer 11 authentication issue with multiple concurrent logons
Internet Explorer 11 users may encounter issues if two or more people use the same user account for multiple, concurrent login sessions on the same Windows Server machine.

See details >
OS Build 14393.2724

January 08, 2019
KB4480961
Resolved
KB4493470
April 09, 2019 10:00 AM PT
MSXML6 may cause applications to stop responding
MSXML6 may cause applications to stop responding if an exception was thrown during node operations, such as appendChild(), insertBefore(), and moveNode().

See details >
OS Build 14393.2724

January 08, 2019
KB4480961
Resolved
KB4493470
April 09, 2019 10:00 AM PT
Issue hosting multiple terminal server sessions and a user logs off on Windows Server
In some cases, Windows Server will stop working and restart when hosting multiple terminal server sessions and a user logs off.

See details >
OS Build 14393.2828

February 19, 2019
KB4487006
Resolved
KB4489882
March 12, 2019 10:00 AM PT
Error 1309 when installing/uninstalling MSI or MSP files
Users may receive “Error 1309” while installing or uninstalling certain types of MSI and MSP files.

See details >
OS Build 14393.2791

February 12, 2019
KB4487026
Resolved
KB4489882
March 12, 2019 10:00 AM PT
Applications using Microsoft Jet database and Access 95 file format stop working
Applications that use a Microsoft Jet database with the Microsoft Access 95 file format may randomly stop working.

See details >
OS Build 14393.2791

February 12, 2019
KB4487026
Resolved
KB4487006
February 19, 2019 02:00 PM PT
First character of the Japanese era name not recognized as an abbreviation
The first character of the Japanese era name is not recognized as an abbreviation and may cause date parsing issues.

See details >
OS Build 14393.2759

January 17, 2019
KB4480977
Resolved
KB4487006
February 19, 2019 02:00 PM PT
Internet Explorer may fail to load images
Internet Explorer may fail to load images with a backslash (\\) in their relative source path.

See details >
OS Build 14393.2791

February 12, 2019
KB4487026
Resolved
KB4487006
February 19, 2019 02:00 PM PT
Applications using Microsoft Jet database fail to open
Applications that use a Microsoft Jet database with the Microsoft Access 97 file format may fail to open if column names are greater than 32 characters.

See details >
OS Build 14393.2724

January 08, 2019
KB4480961
Resolved
KB4487026
February 12, 2019 10:00 AM PT
Instant search in Microsoft Outlook fails on Windows Server 2016
Instant search in Microsoft Outlook clients fail with the error, \"Outlook cannot perform the search\" on Windows Server 2016.

See details >
OS Build 14393.2639

November 27, 2018
KB4467684
Resolved
KB4487026
February 12, 2019 10:00 AM PT
SqlConnection instantiation exception on .NET 4.6 and later
Instantiation of SqlConnection can throw an exception after certain updates have been installed.

See details >
OS Build 14393.2457

August 30, 2018
KB4343884
Resolved
KB4480977
January 17, 2019 02:00 PM PT
Unable to access hotspots with third-party applications
Third-party applications may have difficulty authenticating hotspots.

See details >
OS Build 14393.2724

January 08, 2019
KB4480961
Resolved
KB4480977
January 17, 2019 02:00 PM PT
System becomes unresponsive when end-user-defined characters (EUDC) are used
When features related to end-user-defined characters (EUDC) are used, the entire system may become unresponsive.

See details >
OS Build 14393.2639

November 27, 2018
KB4467684
Resolved
KB4471321
December 11, 2018 10:00 AM PT
Unable to use Seek bar in Windows Media Player
Users may not be able to use the Seek bar in Windows Media Player when playing specific files.

See details >
OS Build 14393.2551

October 09, 2018
KB4462917
Resolved
KB4471321
December 11, 2018 10:00 AM PT
Issues with install and activation of Key Management Service (KMS) (CSVLK) host keys
Installation and client activation of Windows Server 2019 and 1809 LTSC Key Management Service (KMS) (CSVLK) host keys do not work as expected.

See details >
OS Build 14393.2457

August 30, 2018
KB4343884
Resolved
KB4467684
November 27, 2018 10:00 AM PT
Promotions that create non-root domains fail with optional features enabled
Windows Server 2016 promotions that create non-root domains fail in forests in which optional features like Active Directory recycle have been enabled.

See details >
OS Build 14393.2515

September 20, 2018
KB4457127
Resolved
KB4467684
November 27, 2018 10:00 AM PT
End-user-defined characters (EUDC) cause blue screen at startup
If you enable per font end-user-defined characters (EUDC), the system will stop working and a blue screen may appear at startup.

See details >
OS Build 14393.2879

March 19, 2019
KB4489889
Resolved
KB4493470
April 09, 2019
10:00 AM PT
Internet Explorer 11 authentication issue with multiple concurrent logons
Internet Explorer 11 users may encounter issues if two or more people use the same user account for multiple, concurrent login sessions on the same Windows Server machine.

See details >
OS Build 14393.2724

January 08, 2019
KB4480961
Resolved
KB4493470
April 09, 2019
10:00 AM PT
MSXML6 may cause applications to stop responding
MSXML6 may cause applications to stop responding if an exception was thrown during node operations, such as appendChild(), insertBefore(), and moveNode().

See details >
OS Build 14393.2724

January 08, 2019
KB4480961
Resolved
KB4493470
April 09, 2019
10:00 AM PT
Issue hosting multiple terminal server sessions and a user logs off on Windows Server
In some cases, Windows Server will stop working and restart when hosting multiple terminal server sessions and a user logs off.

See details >
OS Build 14393.2828

February 19, 2019
KB4487006
Resolved
KB4489882
March 12, 2019
10:00 AM PT
Error 1309 when installing/uninstalling MSI or MSP files
Users may receive “Error 1309” while installing or uninstalling certain types of MSI and MSP files.

See details >
OS Build 14393.2791

February 12, 2019
KB4487026
Resolved
KB4489882
March 12, 2019
10:00 AM PT
Applications using Microsoft Jet database and Access 95 file format stop working
Applications that use a Microsoft Jet database with the Microsoft Access 95 file format may randomly stop working.

See details >
OS Build 14393.2791

February 12, 2019
KB4487026
Resolved
KB4487006
February 19, 2019
02:00 PM PT
First character of the Japanese era name not recognized as an abbreviation
The first character of the Japanese era name is not recognized as an abbreviation and may cause date parsing issues.

See details >
OS Build 14393.2759

January 17, 2019
KB4480977
Resolved
KB4487006
February 19, 2019
02:00 PM PT
Internet Explorer may fail to load images
Internet Explorer may fail to load images with a backslash (\\) in their relative source path.

See details >
OS Build 14393.2791

February 12, 2019
KB4487026
Resolved
KB4487006
February 19, 2019
02:00 PM PT
Applications using Microsoft Jet database fail to open
Applications that use a Microsoft Jet database with the Microsoft Access 97 file format may fail to open if column names are greater than 32 characters.

See details >
OS Build 14393.2724

January 08, 2019
KB4480961
Resolved
KB4487026
February 12, 2019
10:00 AM PT
Instant search in Microsoft Outlook fails on Windows Server 2016
Instant search in Microsoft Outlook clients fail with the error, \"Outlook cannot perform the search\" on Windows Server 2016.

See details >
OS Build 14393.2639

November 27, 2018
KB4467684
Resolved
KB4487026
February 12, 2019
10:00 AM PT
SqlConnection instantiation exception on .NET 4.6 and later
Instantiation of SqlConnection can throw an exception after certain updates have been installed.

See details >
OS Build 14393.2457

August 30, 2018
KB4343884
Resolved
KB4480977
January 17, 2019
02:00 PM PT
Unable to access hotspots with third-party applications
Third-party applications may have difficulty authenticating hotspots.

See details >
OS Build 14393.2724

January 08, 2019
KB4480961
Resolved
KB4480977
January 17, 2019
02:00 PM PT
System becomes unresponsive when end-user-defined characters (EUDC) are used
When features related to end-user-defined characters (EUDC) are used, the entire system may become unresponsive.

See details >
OS Build 14393.2639

November 27, 2018
KB4467684
Resolved
KB4471321
December 11, 2018
10:00 AM PT
Unable to use Seek bar in Windows Media Player
Users may not be able to use the Seek bar in Windows Media Player when playing specific files.

See details >
OS Build 14393.2551

October 09, 2018
KB4462917
Resolved
KB4471321
December 11, 2018
10:00 AM PT
Issues with install and activation of Key Management Service (KMS) (CSVLK) host keys
Installation and client activation of Windows Server 2019 and 1809 LTSC Key Management Service (KMS) (CSVLK) host keys do not work as expected.

See details >
OS Build 14393.2457

August 30, 2018
KB4343884
Resolved
KB4467684
November 27, 2018
10:00 AM PT
Promotions that create non-root domains fail with optional features enabled
Windows Server 2016 promotions that create non-root domains fail in forests in which optional features like Active Directory recycle have been enabled.

See details >
OS Build 14393.2515

September 20, 2018
KB4457127
Resolved
KB4467684
November 27, 2018
10:00 AM PT
" @@ -63,7 +63,7 @@ sections: - type: markdown text: " - +
DetailsAffected buildStatusHistory
End-user-defined characters (EUDC) cause blue screen at startup
If you enable per font end-user-defined characters (EUDC), the system will stop working and a blue screen may appear at startup. This is not a common setting in non-Asian regions.

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016

Resolution: This issue was resolved in KB4493470.

Back to top
OS Build 14393.2879

March 19, 2019
KB4489889
Resolved
KB4493470
Resolved:
April 09, 2019 10:00 AM PT

Opened:
March 19, 2019 10:00 AM PT
End-user-defined characters (EUDC) cause blue screen at startup
If you enable per font end-user-defined characters (EUDC), the system will stop working and a blue screen may appear at startup. This is not a common setting in non-Asian regions.

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016

Resolution: This issue was resolved in KB4493470.

Back to top
OS Build 14393.2879

March 19, 2019
KB4489889
Resolved
KB4493470
Resolved:
April 09, 2019
10:00 AM PT

Opened:
March 19, 2019
10:00 AM PT
" @@ -72,10 +72,10 @@ sections: - type: markdown text: " - - - - + + + +
DetailsAffected buildStatusHistory
Issue hosting multiple terminal server sessions and a user logs off on Windows Server
In some cases, Windows Server will stop working and restart when hosting multiple terminal server sessions and a user logs off. The faulting driver is win32kbase.sys.

Affected platforms:
  • Client: Windows 10 Enterprise LTSC 2016
  • Server: Windows Server 2016

Resolution: This issue is resolved in KB4489882.

Back to top
OS Build 14393.2828

February 19, 2019
KB4487006
Resolved
KB4489882
Resolved:
March 12, 2019 10:00 AM PT

Opened:
February 19, 2019 02:00 PM PT
Error 1309 when installing/uninstalling MSI or MSP files
After installing KB4487026, users may receive “Error 1309” while installing or uninstalling certain types of MSI and MSP files.

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 8.1
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2

Resolution: This issue is resolved in KB4489882.

Back to top
OS Build 14393.2791

February 12, 2019
KB4487026
Resolved
KB4489882
Resolved:
March 12, 2019 10:00 AM PT

Opened:
February 12, 2019 10:00 AM PT
Applications using Microsoft Jet database and Access 95 file format stop working
Applications that use a Microsoft Jet database with the Microsoft Access 95 file format may randomly stop working.

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 7, Service Pack 1
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2008 R2 SP1

Resolution: This issue is resolved in KB4487006.

Back to top
OS Build 14393.2791

February 12, 2019
KB4487026
Resolved
KB4487006
Resolved:
February 19, 2019 02:00 PM PT

Opened:
February 12, 2019 10:00 AM PT
Internet Explorer may fail to load images
After installing KB4487026, Internet Explorer may fail to load images with a backslash (\\) in their relative source path.

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 8.1; Windows 7, Service Pack 1
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2; Windows Server 2008 R2 SP1

Resolution: This issue is resolved in KB4487006.

Back to top
OS Build 14393.2791

February 12, 2019
KB4487026
Resolved
KB4487006
Resolved:
February 19, 2019 02:00 PM PT

Opened:
February 12, 2019 10:00 AM PT
Issue hosting multiple terminal server sessions and a user logs off on Windows Server
In some cases, Windows Server will stop working and restart when hosting multiple terminal server sessions and a user logs off. The faulting driver is win32kbase.sys.

Affected platforms:
  • Client: Windows 10 Enterprise LTSC 2016
  • Server: Windows Server 2016

Resolution: This issue is resolved in KB4489882.

Back to top
OS Build 14393.2828

February 19, 2019
KB4487006
Resolved
KB4489882
Resolved:
March 12, 2019
10:00 AM PT

Opened:
February 19, 2019
02:00 PM PT
Error 1309 when installing/uninstalling MSI or MSP files
After installing KB4487026, users may receive “Error 1309” while installing or uninstalling certain types of MSI and MSP files.

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 8.1
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2

Resolution: This issue is resolved in KB4489882.

Back to top
OS Build 14393.2791

February 12, 2019
KB4487026
Resolved
KB4489882
Resolved:
March 12, 2019
10:00 AM PT

Opened:
February 12, 2019
10:00 AM PT
Applications using Microsoft Jet database and Access 95 file format stop working
Applications that use a Microsoft Jet database with the Microsoft Access 95 file format may randomly stop working.

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 7, Service Pack 1
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2008 R2 SP1

Resolution: This issue is resolved in KB4487006.

Back to top
OS Build 14393.2791

February 12, 2019
KB4487026
Resolved
KB4487006
Resolved:
February 19, 2019
02:00 PM PT

Opened:
February 12, 2019
10:00 AM PT
Internet Explorer may fail to load images
After installing KB4487026, Internet Explorer may fail to load images with a backslash (\\) in their relative source path.

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 8.1; Windows 7, Service Pack 1
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2; Windows Server 2008 R2 SP1

Resolution: This issue is resolved in KB4487006.

Back to top
OS Build 14393.2791

February 12, 2019
KB4487026
Resolved
KB4487006
Resolved:
February 19, 2019
02:00 PM PT

Opened:
February 12, 2019
10:00 AM PT
" @@ -84,11 +84,11 @@ sections: - type: markdown text: " - - - - - + + + + +
DetailsAffected buildStatusHistory
Internet Explorer 11 authentication issue with multiple concurrent logons
After installing KB4480961, Internet Explorer 11 and other applications that use WININET.DLL may have authentication issues. This occurs when two or more people use the same user account for multiple, concurrent login sessions on the same Windows Server machine, including Remote Desktop Protocol (RDP) and Terminal Server logons. Symptoms reported by customers include, but may not be limited to:

  • Cache size and location show zero or empty.
  • Keyboard shortcuts may not work properly.
  • Webpages may intermittently fail to load or render correctly.
  • Issues with credential prompts.
  • Issues when downloading files.

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10 Enterprise LTSC 2016; Windows 8.1; Windows 7, Service Pack 1
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server 2016; Windows Server 2012 R2; Windows Server 2008 R2 SP1

Resolution: This issue was resolved in KB4493470.

Back to top
OS Build 14393.2724

January 08, 2019
KB4480961
Resolved
KB4493470
Resolved:
April 09, 2019 10:00 AM PT

Opened:
January 08, 2019 10:00 AM PT
MSXML6 may cause applications to stop responding
After installing KB4480961, MSXML6 causes applications to stop responding if an exception was thrown during node operations, such as appendChild(), insertBefore(), and moveNode().

The Group Policy editor may stop responding when editing a Group Policy Object (GPO) that contains Group Policy Preferences (GPP) for Internet Explorer 10 settings.

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 8.1
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2

Resolution: This issue was resolved in KB4493470.

Back to top
OS Build 14393.2724

January 08, 2019
KB4480961
Resolved
KB4493470
Resolved:
April 09, 2019 10:00 AM PT

Opened:
January 08, 2019 10:00 AM PT
First character of the Japanese era name not recognized as an abbreviation
After installing KB4480977, the first character of the Japanese era name is not recognized as an abbreviation and may cause date parsing issues.

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 8.1; Windows 7, Service Pack 1
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2; Windows Server 2008 R2 SP1

Resolution: This issue is resolved in KB4487006.

Back to top
OS Build 14393.2759

January 17, 2019
KB4480977
Resolved
KB4487006
Resolved:
February 19, 2019 02:00 PM PT

Opened:
January 17, 2019 02:00 PM PT
Applications using Microsoft Jet database fail to open
Applications that use a Microsoft Jet database with the Microsoft Access 97 file format may fail to open if the database has column names greater than 32 characters. The database will fail to open with the error, “Unrecognized Database Format”.

Affected platforms:
  • Client: Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 8.1; Windows 7, Service Pack 1 
  • Server: Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2; Windows Server 2008 R2 SP1 

Resolution: This issue is resolved in KB4487026.

Back to top
OS Build 14393.2724

January 08, 2019
KB4480961
Resolved
KB4487026
Resolved:
February 12, 2019 10:00 AM PT

Opened:
January 08, 2019 10:00 AM PT
Unable to access hotspots with third-party applications
After installing KB4480961, third-party applications may have difficulty authenticating hotspots.

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 8.1
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2

Resolution: This issue is resolved in KB4480977.

Back to top
OS Build 14393.2724

January 08, 2019
KB4480961
Resolved
KB4480977
Resolved:
January 17, 2019 02:00 PM PT

Opened:
January 08, 2019 10:00 AM PT
Internet Explorer 11 authentication issue with multiple concurrent logons
After installing KB4480961, Internet Explorer 11 and other applications that use WININET.DLL may have authentication issues. This occurs when two or more people use the same user account for multiple, concurrent login sessions on the same Windows Server machine, including Remote Desktop Protocol (RDP) and Terminal Server logons. Symptoms reported by customers include, but may not be limited to:
  • Cache size and location show zero or empty.
  • Keyboard shortcuts may not work properly.
  • Webpages may intermittently fail to load or render correctly.
  • Issues with credential prompts.
  • Issues when downloading files.

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10 Enterprise LTSC 2016; Windows 8.1; Windows 7, Service Pack 1
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server 2016; Windows Server 2012 R2; Windows Server 2008 R2 SP1

Resolution: This issue was resolved in KB4493470.

Back to top
OS Build 14393.2724

January 08, 2019
KB4480961
Resolved
KB4493470
Resolved:
April 09, 2019
10:00 AM PT

Opened:
January 08, 2019
10:00 AM PT
MSXML6 may cause applications to stop responding
After installing KB4480961, MSXML6 causes applications to stop responding if an exception was thrown during node operations, such as appendChild(), insertBefore(), and moveNode().

The Group Policy editor may stop responding when editing a Group Policy Object (GPO) that contains Group Policy Preferences (GPP) for Internet Explorer 10 settings.

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 8.1
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2

Resolution: This issue was resolved in KB4493470.

Back to top
OS Build 14393.2724

January 08, 2019
KB4480961
Resolved
KB4493470
Resolved:
April 09, 2019
10:00 AM PT

Opened:
January 08, 2019
10:00 AM PT
First character of the Japanese era name not recognized as an abbreviation
After installing KB4480977, the first character of the Japanese era name is not recognized as an abbreviation and may cause date parsing issues.

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 8.1; Windows 7, Service Pack 1
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2; Windows Server 2008 R2 SP1

Resolution: This issue is resolved in KB4487006.

Back to top
OS Build 14393.2759

January 17, 2019
KB4480977
Resolved
KB4487006
Resolved:
February 19, 2019
02:00 PM PT

Opened:
January 17, 2019
02:00 PM PT
Applications using Microsoft Jet database fail to open
Applications that use a Microsoft Jet database with the Microsoft Access 97 file format may fail to open if the database has column names greater than 32 characters. The database will fail to open with the error, “Unrecognized Database Format”.

Affected platforms:
  • Client: Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 8.1; Windows 7, Service Pack 1 
  • Server: Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2; Windows Server 2008 R2 SP1 

Resolution: This issue is resolved in KB4487026.

Back to top
OS Build 14393.2724

January 08, 2019
KB4480961
Resolved
KB4487026
Resolved:
February 12, 2019
10:00 AM PT

Opened:
January 08, 2019
10:00 AM PT
Unable to access hotspots with third-party applications
After installing KB4480961, third-party applications may have difficulty authenticating hotspots.

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 8.1
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2

Resolution: This issue is resolved in KB4480977.

Back to top
OS Build 14393.2724

January 08, 2019
KB4480961
Resolved
KB4480977
Resolved:
January 17, 2019
02:00 PM PT

Opened:
January 08, 2019
10:00 AM PT
" @@ -97,8 +97,8 @@ sections: - type: markdown text: " - - + +
DetailsAffected buildStatusHistory
Instant search in Microsoft Outlook fails on Windows Server 2016
After installing KB4467684 on Windows Server 2016, instant search in Microsoft Outlook clients fail with the error, \"Outlook cannot perform the search\".

Affected platforms:
  • Client: Windows 10 Enterprise LTSC 2016
  • Server: Windows Server 2016

Resolution: This issue is resolved in KB4487026.

Back to top
OS Build 14393.2639

November 27, 2018
KB4467684
Resolved
KB4487026
Resolved:
February 12, 2019 10:00 AM PT

Opened:
November 27, 2018 10:00 AM PT
System becomes unresponsive when end-user-defined characters (EUDC) are used
When features related to end-user-defined characters (EUDC) are used, the entire system may become unresponsive. 

Affected platforms:
  • Client: Windows 10 Enterprise LTSC 2016
  • Server: Windows Server 2016
 
Resolution: This issue is resolved in KB4471321

Back to top
OS Build 14393.2639

November 27, 2018
KB4467684
Resolved
KB4471321
Resolved:
December 11, 2018 10:00 AM PT

Opened:
November 27, 2018 10:00 AM PT
Instant search in Microsoft Outlook fails on Windows Server 2016
After installing KB4467684 on Windows Server 2016, instant search in Microsoft Outlook clients fail with the error, \"Outlook cannot perform the search\".

Affected platforms:
  • Client: Windows 10 Enterprise LTSC 2016
  • Server: Windows Server 2016

Resolution: This issue is resolved in KB4487026.

Back to top
OS Build 14393.2639

November 27, 2018
KB4467684
Resolved
KB4487026
Resolved:
February 12, 2019
10:00 AM PT

Opened:
November 27, 2018
10:00 AM PT
System becomes unresponsive when end-user-defined characters (EUDC) are used
When features related to end-user-defined characters (EUDC) are used, the entire system may become unresponsive. 

Affected platforms:
  • Client: Windows 10 Enterprise LTSC 2016
  • Server: Windows Server 2016
 
Resolution: This issue is resolved in KB4471321

Back to top
OS Build 14393.2639

November 27, 2018
KB4467684
Resolved
KB4471321
Resolved:
December 11, 2018
10:00 AM PT

Opened:
November 27, 2018
10:00 AM PT
" @@ -107,7 +107,7 @@ sections: - type: markdown text: " - +
DetailsAffected buildStatusHistory
Unable to use Seek bar in Windows Media Player
After installing KB4462917, users may not be able to use the Seek Bar in Windows Media Player when playing specific files. This issue does not affect normal playback.

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 8.1; Windows 7, Service Pack 1
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2; Windows Server 2008 R2 SP1

Resolution: This issue is resolved in KB4471321.

Back to top
OS Build 14393.2551

October 09, 2018
KB4462917
Resolved
KB4471321
Resolved:
December 11, 2018 10:00 AM PT

Opened:
October 09, 2018 10:00 AM PT
Unable to use Seek bar in Windows Media Player
After installing KB4462917, users may not be able to use the Seek Bar in Windows Media Player when playing specific files. This issue does not affect normal playback.

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 8.1; Windows 7, Service Pack 1
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2; Windows Server 2008 R2 SP1

Resolution: This issue is resolved in KB4471321.

Back to top
OS Build 14393.2551

October 09, 2018
KB4462917
Resolved
KB4471321
Resolved:
December 11, 2018
10:00 AM PT

Opened:
October 09, 2018
10:00 AM PT
" @@ -116,7 +116,7 @@ sections: - type: markdown text: " - +
DetailsAffected buildStatusHistory
Promotions that create non-root domains fail with optional features enabled
After installing KB4457127, Windows Server 2016 promotions that create non-root domains fail in forests in which optional features like Active Directory recycle have been enabled. The error is, “The replication operation encountered a database error.”

Affected platforms:
  • Client: Windows 10 Enterprise LTSC 2016
  • Server: Windows Server 2016

Resolution: This issue is resolved in KB4467684.

Back to top
OS Build 14393.2515

September 20, 2018
KB4457127
Resolved
KB4467684
Resolved:
November 27, 2018 10:00 AM PT

Opened:
September 20, 2018 10:00 AM PT
Promotions that create non-root domains fail with optional features enabled
After installing KB4457127, Windows Server 2016 promotions that create non-root domains fail in forests in which optional features like Active Directory recycle have been enabled. The error is, “The replication operation encountered a database error.”

Affected platforms:
  • Client: Windows 10 Enterprise LTSC 2016
  • Server: Windows Server 2016

Resolution: This issue is resolved in KB4467684.

Back to top
OS Build 14393.2515

September 20, 2018
KB4457127
Resolved
KB4467684
Resolved:
November 27, 2018
10:00 AM PT

Opened:
September 20, 2018
10:00 AM PT
" @@ -125,7 +125,7 @@ sections: - type: markdown text: " - - + +
DetailsAffected buildStatusHistory
SqlConnection instantiation exception on .NET 4.6 and later
After you install the August Preview of Quality Rollup or September 11, 2018 .NET Framework update, instantiation of SqlConnection can throw an exception.

For more information about this issue, see the following article in the Microsoft Knowledge Base: 4470809, SqlConnection instantiation exception on .NET 4.6 and later after August-September 2018 .NET Framework updates.

Affected platforms:
  • Client: Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016
  • Server: Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016

Resolution: This issue is resolved in KB4480977.

Back to top
OS Build 14393.2457

August 30, 2018
KB4343884
Resolved
KB4480977
Resolved:
January 17, 2019 02:00 PM PT

Opened:
August 30, 2018 05:00 PM PT
Issues with install and activation of Key Management Service (KMS) (CSVLK) host keys
After installing KB4343884, installation and client activation of Windows Server 2019 and Windows 10 Enterprise 2019 LTSC Key Management Service (KMS) CSVLK host keys do not work as expected.

Affected platforms:
  • Client: Windows 10 Enterprise LTSC 2016
  • Server: Windows Server 2016

Resolution: This issue is resolved in KB4467684.

Back to top
OS Build 14393.2457

August 30, 2018
KB4343884
Resolved
KB4467684
Resolved:
November 27, 2018 10:00 AM PT

Opened:
August 30, 2018 05:00 PM PT
SqlConnection instantiation exception on .NET 4.6 and later
After you install the August Preview of Quality Rollup or September 11, 2018 .NET Framework update, instantiation of SqlConnection can throw an exception.

For more information about this issue, see the following article in the Microsoft Knowledge Base: 4470809, SqlConnection instantiation exception on .NET 4.6 and later after August-September 2018 .NET Framework updates.

Affected platforms:
  • Client: Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016
  • Server: Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016

Resolution: This issue is resolved in KB4480977.

Back to top
OS Build 14393.2457

August 30, 2018
KB4343884
Resolved
KB4480977
Resolved:
January 17, 2019
02:00 PM PT

Opened:
August 30, 2018
05:00 PM PT
Issues with install and activation of Key Management Service (KMS) (CSVLK) host keys
After installing KB4343884, installation and client activation of Windows Server 2019 and Windows 10 Enterprise 2019 LTSC Key Management Service (KMS) CSVLK host keys do not work as expected.

Affected platforms:
  • Client: Windows 10 Enterprise LTSC 2016
  • Server: Windows Server 2016

Resolution: This issue is resolved in KB4467684.

Back to top
OS Build 14393.2457

August 30, 2018
KB4343884
Resolved
KB4467684
Resolved:
November 27, 2018
10:00 AM PT

Opened:
August 30, 2018
05:00 PM PT
" diff --git a/windows/release-information/resolved-issues-windows-10-1703.yml b/windows/release-information/resolved-issues-windows-10-1703.yml index cbbbf9bd9f..9017df00dd 100644 --- a/windows/release-information/resolved-issues-windows-10-1703.yml +++ b/windows/release-information/resolved-issues-windows-10-1703.yml @@ -32,19 +32,19 @@ sections: - type: markdown text: " - - - - - - - - - - - - - + + + + + + + + + + + + +
SummaryOriginating updateStatusDate resolved
End-user-defined characters (EUDC) may cause blue screen at startup
If you enable per font end-user-defined characters (EUDC), the system may stop working and a blue screen may appear at startup.

See details >
OS Build 15063.1716

March 19, 2019
KB4489888
Resolved
KB4493474
April 09, 2019 10:00 AM PT
MSXML6 may cause applications to stop responding
MSXML6 may cause applications to stop responding if an exception was thrown during node operations, such as appendChild(), insertBefore(), and moveNode().

See details >
OS Build 15063.1563

January 08, 2019
KB4480973
Resolved
KB4493474
April 09, 2019 10:00 AM PT
Error 1309 when installing/uninstalling MSI or MSP files
Users may receive “Error 1309” while installing or uninstalling certain types of MSI and MSP files.

See details >
OS Build 15063.1659

February 19, 2019
KB4487011
Resolved
KB4489871
March 12, 2019 10:00 AM PT
First character of the Japanese era name not recognized as an abbreviation
The first character of the Japanese era name is not recognized as an abbreviation and may cause date parsing issues.

See details >
OS Build 15063.1596

January 15, 2019
KB4480959
Resolved
KB4487011
February 19, 2019 02:00 PM PT
Internet Explorer may fail to load images
Internet Explorer may fail to load images with a backslash (\\) in their relative source path.

See details >
OS Build 15063.1631

February 12, 2019
KB4487020
Resolved
KB4487011
February 19, 2019 02:00 PM PT
Applications using Microsoft Jet database and Access 95 file format stop working
Applications that use a Microsoft Jet database with the Microsoft Access 95 file format may randomly stop working.

See details >
OS Build 15063.1631

February 12, 2019
KB4487020
Resolved
KB4487011
February 19, 2019 10:00 AM PT
Applications using Microsoft Jet database fail to open
Applications that use a Microsoft Jet database with the Microsoft Access 97 file format may fail to open if column names are greater than 32 characters.

See details >
OS Build 15063.1563

January 08, 2019
KB4480973
Resolved
KB4487020
February 12, 2019 10:00 AM PT
Webpages become unresponsive in Microsoft Edge
Microsoft Edge users report difficulty browsing and loading webpages.

See details >
OS Build 15063.1563

January 08, 2019
KB4480973
Resolved
KB4487020
February 12, 2019 10:00 AM PT
SqlConnection instantiation exception on .NET 4.6 and later
Instantiation of SqlConnection can throw an exception after certain updates have been installed.

See details >
OS Build 15063.1292

August 30, 2018
KB4343889
Resolved
KB4480959
January 15, 2019 10:00 AM PT
Unable to access hotspots with third-party applications
Third-party applications may have difficulty authenticating hotspots.

See details >
OS Build 15063.1563

January 08, 2019
KB4480973
Resolved
KB4480959
January 15, 2019 10:00 AM PT
Unable to use Seek bar in Windows Media Player
Users may not be able to use the Seek bar in Windows Media Player when playing specific files.

See details >
OS Build 15063.1387

October 09, 2018
KB4462937
Resolved
KB4471327
December 11, 2018 10:00 AM PT
LongonUI.exe stops working intermittently
LongonUI.exe stops working intermittently.

See details >
OS Build 15063.1387

October 09, 2018
KB4462937
Resolved
KB4467699
November 27, 2018 10:00 AM PT
Error message beginning with “Hosted by…” when launching Microsoft Edge
Some users may encounter an error message beginning with “Hosted by…” when launching Microsoft Edge.

See details >
OS Build 15063.1387

October 09, 2018
KB4462937
Resolved
KB4462939
October 18, 2018 10:00 AM PT
End-user-defined characters (EUDC) may cause blue screen at startup
If you enable per font end-user-defined characters (EUDC), the system may stop working and a blue screen may appear at startup.

See details >
OS Build 15063.1716

March 19, 2019
KB4489888
Resolved
KB4493474
April 09, 2019
10:00 AM PT
MSXML6 may cause applications to stop responding
MSXML6 may cause applications to stop responding if an exception was thrown during node operations, such as appendChild(), insertBefore(), and moveNode().

See details >
OS Build 15063.1563

January 08, 2019
KB4480973
Resolved
KB4493474
April 09, 2019
10:00 AM PT
Error 1309 when installing/uninstalling MSI or MSP files
Users may receive “Error 1309” while installing or uninstalling certain types of MSI and MSP files.

See details >
OS Build 15063.1659

February 19, 2019
KB4487011
Resolved
KB4489871
March 12, 2019
10:00 AM PT
First character of the Japanese era name not recognized as an abbreviation
The first character of the Japanese era name is not recognized as an abbreviation and may cause date parsing issues.

See details >
OS Build 15063.1596

January 15, 2019
KB4480959
Resolved
KB4487011
February 19, 2019
02:00 PM PT
Internet Explorer may fail to load images
Internet Explorer may fail to load images with a backslash (\\) in their relative source path.

See details >
OS Build 15063.1631

February 12, 2019
KB4487020
Resolved
KB4487011
February 19, 2019
02:00 PM PT
Applications using Microsoft Jet database and Access 95 file format stop working
Applications that use a Microsoft Jet database with the Microsoft Access 95 file format may randomly stop working.

See details >
OS Build 15063.1631

February 12, 2019
KB4487020
Resolved
KB4487011
February 19, 2019
10:00 AM PT
Applications using Microsoft Jet database fail to open
Applications that use a Microsoft Jet database with the Microsoft Access 97 file format may fail to open if column names are greater than 32 characters.

See details >
OS Build 15063.1563

January 08, 2019
KB4480973
Resolved
KB4487020
February 12, 2019
10:00 AM PT
Webpages become unresponsive in Microsoft Edge
Microsoft Edge users report difficulty browsing and loading webpages.

See details >
OS Build 15063.1563

January 08, 2019
KB4480973
Resolved
KB4487020
February 12, 2019
10:00 AM PT
SqlConnection instantiation exception on .NET 4.6 and later
Instantiation of SqlConnection can throw an exception after certain updates have been installed.

See details >
OS Build 15063.1292

August 30, 2018
KB4343889
Resolved
KB4480959
January 15, 2019
10:00 AM PT
Unable to access hotspots with third-party applications
Third-party applications may have difficulty authenticating hotspots.

See details >
OS Build 15063.1563

January 08, 2019
KB4480973
Resolved
KB4480959
January 15, 2019
10:00 AM PT
Unable to use Seek bar in Windows Media Player
Users may not be able to use the Seek bar in Windows Media Player when playing specific files.

See details >
OS Build 15063.1387

October 09, 2018
KB4462937
Resolved
KB4471327
December 11, 2018
10:00 AM PT
LongonUI.exe stops working intermittently
LongonUI.exe stops working intermittently.

See details >
OS Build 15063.1387

October 09, 2018
KB4462937
Resolved
KB4467699
November 27, 2018
10:00 AM PT
Error message beginning with “Hosted by…” when launching Microsoft Edge
Some users may encounter an error message beginning with “Hosted by…” when launching Microsoft Edge.

See details >
OS Build 15063.1387

October 09, 2018
KB4462937
Resolved
KB4462939
October 18, 2018
10:00 AM PT
" @@ -60,7 +60,7 @@ sections: - type: markdown text: " - +
DetailsAffected buildStatusHistory
End-user-defined characters (EUDC) may cause blue screen at startup
If you enable per font end-user-defined characters (EUDC), the system may stop working and a blue screen may appear at startup. This is not a common setting in non-Asian regions.

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016

Resolution: This issue was resolved in KB4493474.

Back to top
OS Build 15063.1716

March 19, 2019
KB4489888
Resolved
KB4493474
Resolved:
April 09, 2019 10:00 AM PT

Opened:
March 19, 2019 10:00 AM PT
End-user-defined characters (EUDC) may cause blue screen at startup
If you enable per font end-user-defined characters (EUDC), the system may stop working and a blue screen may appear at startup. This is not a common setting in non-Asian regions.

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016

Resolution: This issue was resolved in KB4493474.

Back to top
OS Build 15063.1716

March 19, 2019
KB4489888
Resolved
KB4493474
Resolved:
April 09, 2019
10:00 AM PT

Opened:
March 19, 2019
10:00 AM PT
" @@ -69,9 +69,9 @@ sections: - type: markdown text: " - - - + + +
DetailsAffected buildStatusHistory
Error 1309 when installing/uninstalling MSI or MSP files
After installing KB4487011, users may receive “Error 1309” while installing or uninstalling certain types of MSI and MSP files.

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 8.1
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2

Resolution: This issue is resolved in KB4489871.

Back to top
OS Build 15063.1659

February 19, 2019
KB4487011
Resolved
KB4489871
Resolved:
March 12, 2019 10:00 AM PT

Opened:
February 19, 2019 02:00 PM PT
Internet Explorer may fail to load images
After installing KB4487020, Internet Explorer may fail to load images with a backslash (\\) in their relative source path.

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 8.1; Windows 7, Service Pack 1
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2; Windows Server 2008 R2 SP1

Resolution: This issue is resolved in KB4487011.

Back to top
OS Build 15063.1631

February 12, 2019
KB4487020
Resolved
KB4487011
Resolved:
February 19, 2019 02:00 PM PT

Opened:
February 12, 2019 10:00 AM PT
Applications using Microsoft Jet database and Access 95 file format stop working
Applications that use a Microsoft Jet database with the Microsoft Access 95 file format may randomly stop working.

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 7, Service Pack 1
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2008 R2 SP1

Resolution: This issue is resolved in KB4487011.

Back to top
OS Build 15063.1631

February 12, 2019
KB4487020
Resolved
KB4487011
Resolved:
February 19, 2019 02:00 PM PT

Opened:
February 12, 2019 10:00 AM PT
Error 1309 when installing/uninstalling MSI or MSP files
After installing KB4487011, users may receive “Error 1309” while installing or uninstalling certain types of MSI and MSP files.

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 8.1
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2

Resolution: This issue is resolved in KB4489871.

Back to top
OS Build 15063.1659

February 19, 2019
KB4487011
Resolved
KB4489871
Resolved:
March 12, 2019
10:00 AM PT

Opened:
February 19, 2019
02:00 PM PT
Internet Explorer may fail to load images
After installing KB4487020, Internet Explorer may fail to load images with a backslash (\\) in their relative source path.

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 8.1; Windows 7, Service Pack 1
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2; Windows Server 2008 R2 SP1

Resolution: This issue is resolved in KB4487011.

Back to top
OS Build 15063.1631

February 12, 2019
KB4487020
Resolved
KB4487011
Resolved:
February 19, 2019
02:00 PM PT

Opened:
February 12, 2019
10:00 AM PT
Applications using Microsoft Jet database and Access 95 file format stop working
Applications that use a Microsoft Jet database with the Microsoft Access 95 file format may randomly stop working.

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 7, Service Pack 1
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2008 R2 SP1

Resolution: This issue is resolved in KB4487011.

Back to top
OS Build 15063.1631

February 12, 2019
KB4487020
Resolved
KB4487011
Resolved:
February 19, 2019
02:00 PM PT

Opened:
February 12, 2019
10:00 AM PT
" @@ -80,11 +80,11 @@ sections: - type: markdown text: " - - - - - + + + + +
DetailsAffected buildStatusHistory
MSXML6 may cause applications to stop responding
After installing KB4480973, MSXML6 causes applications to stop responding if an exception was thrown during node operations, such as appendChild(), insertBefore(), and moveNode().

The Group Policy editor may stop responding when editing a Group Policy Object (GPO) that contains Group Policy Preferences (GPP) for Internet Explorer 10 settings.

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 8.1
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2

Resolution: This issue was resolved in KB4493474.

Back to top
OS Build 15063.1563

January 08, 2019
KB4480973
Resolved
KB4493474
Resolved:
April 09, 2019 10:00 AM PT

Opened:
January 08, 2019 10:00 AM PT
First character of the Japanese era name not recognized as an abbreviation
After installing KB4480959, the first character of the Japanese era name is not recognized as an abbreviation and may cause date parsing issues.

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 8.1; Windows 7, Service Pack 1
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2; Windows Server 2008 R2 SP1

Resolution: This issue is resolved in KB4487011.

Back to top
OS Build 15063.1596

January 15, 2019
KB4480959
Resolved
KB4487011
Resolved:
February 19, 2019 02:00 PM PT

Opened:
January 15, 2019 10:00 AM PT
Applications using Microsoft Jet database fail to open
Applications that use a Microsoft Jet database with the Microsoft Access 97 file format may fail to open if the database has column names greater than 32 characters. The database will fail to open with the error, “Unrecognized Database Format”.

Affected platforms:
  • Client: Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 8.1; Windows 7, Service Pack 1 
  • Server: Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2; Windows Server 2008 R2 SP1

Resolution: This issue is resolved in KB4487020.

Back to top
OS Build 15063.1563

January 08, 2019
KB4480973
Resolved
KB4487020
Resolved:
February 12, 2019 10:00 AM PT

Opened:
January 08, 2019 10:00 AM PT
Webpages become unresponsive in Microsoft Edge
After installing KB4480973, some Microsoft Edge users report that they:

• Cannot load webpages using a local IP address.
• Cannot load webpages on the Internet using a VPN connection.

Browsing fails or the webpage may become unresponsive.

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709

Resolution: This issue is resolved in KB4487020.

Back to top
OS Build 15063.1563

January 08, 2019
KB4480973
Resolved
KB4487020
Resolved:
February 12, 2019 10:00 AM PT

Opened:
January 08, 2019 10:00 AM PT
Unable to access hotspots with third-party applications
After installing KB4480973, third-party applications may have difficulty authenticating hotspots.

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 8.1
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2

Resolution: This issue is resolved in KB4480959.

Back to top
OS Build 15063.1563

January 08, 2019
KB4480973
Resolved
KB4480959
Resolved:
January 15, 2019 10:00 AM PT

Opened:
January 08, 2019 10:00 AM PT
MSXML6 may cause applications to stop responding
After installing KB4480973, MSXML6 causes applications to stop responding if an exception was thrown during node operations, such as appendChild(), insertBefore(), and moveNode().

The Group Policy editor may stop responding when editing a Group Policy Object (GPO) that contains Group Policy Preferences (GPP) for Internet Explorer 10 settings.

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 8.1
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2

Resolution: This issue was resolved in KB4493474.

Back to top
OS Build 15063.1563

January 08, 2019
KB4480973
Resolved
KB4493474
Resolved:
April 09, 2019
10:00 AM PT

Opened:
January 08, 2019
10:00 AM PT
First character of the Japanese era name not recognized as an abbreviation
After installing KB4480959, the first character of the Japanese era name is not recognized as an abbreviation and may cause date parsing issues.

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 8.1; Windows 7, Service Pack 1
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2; Windows Server 2008 R2 SP1

Resolution: This issue is resolved in KB4487011.

Back to top
OS Build 15063.1596

January 15, 2019
KB4480959
Resolved
KB4487011
Resolved:
February 19, 2019
02:00 PM PT

Opened:
January 15, 2019
10:00 AM PT
Applications using Microsoft Jet database fail to open
Applications that use a Microsoft Jet database with the Microsoft Access 97 file format may fail to open if the database has column names greater than 32 characters. The database will fail to open with the error, “Unrecognized Database Format”.

Affected platforms:
  • Client: Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 8.1; Windows 7, Service Pack 1 
  • Server: Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2; Windows Server 2008 R2 SP1

Resolution: This issue is resolved in KB4487020.

Back to top
OS Build 15063.1563

January 08, 2019
KB4480973
Resolved
KB4487020
Resolved:
February 12, 2019
10:00 AM PT

Opened:
January 08, 2019
10:00 AM PT
Webpages become unresponsive in Microsoft Edge
After installing KB4480973, some Microsoft Edge users report that they:
  • Cannot load webpages using a local IP address.
  • Cannot load webpages on the Internet using a VPN connection.
Browsing fails or the webpage may become unresponsive.

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709

Resolution: This issue is resolved in KB4487020.

Back to top
OS Build 15063.1563

January 08, 2019
KB4480973
Resolved
KB4487020
Resolved:
February 12, 2019
10:00 AM PT

Opened:
January 08, 2019
10:00 AM PT
Unable to access hotspots with third-party applications
After installing KB4480973, third-party applications may have difficulty authenticating hotspots.

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 8.1
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2

Resolution: This issue is resolved in KB4480959.

Back to top
OS Build 15063.1563

January 08, 2019
KB4480973
Resolved
KB4480959
Resolved:
January 15, 2019
10:00 AM PT

Opened:
January 08, 2019
10:00 AM PT
" @@ -93,9 +93,9 @@ sections: - type: markdown text: " - - - + + +
DetailsAffected buildStatusHistory
Unable to use Seek bar in Windows Media Player
After installing KB4462937, users may not be able to use the Seek Bar in Windows Media Player when playing specific files. This issue does not affect normal playback.

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 8.1; Windows 7, Service Pack 1
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2; Windows Server 2008 R2 SP1

Resolution: This issue is resolved in KB4471327.

Back to top
OS Build 15063.1387

October 09, 2018
KB4462937
Resolved
KB4471327
Resolved:
December 11, 2018 10:00 AM PT

Opened:
October 09, 2018 10:00 AM PT
LongonUI.exe stops working intermittently
After installing KB4462937, LogonUI.exe stops working intermittently.

Affected platforms:
  • Windows 10, version 1703

Resolution: This issue is resolved in KB4467699.

Back to top
OS Build 15063.1387

October 09, 2018
KB4462937
Resolved
KB4467699
Resolved:
November 27, 2018 10:00 AM PT

Opened:
October 09, 2018 10:00 AM PT
Error message beginning with “Hosted by…” when launching Microsoft Edge
After installing KB4462937, some users may see a dialog box with a non-applicable message beginning with the words “Hosted by...” when first starting Microsoft Edge.

This dialog will only appear once if they have turned on “Block only third-party cookies” in Microsoft Edge and applied certain language packs before installing this update.

Affected platforms:
  • Client: Windows 10, version 1709; Windows 10, version 1703
  • Server: Windows Server, version 1709

Resolution: This issue is resolved in KB4462939.

Back to top
OS Build 15063.1387

October 09, 2018
KB4462937
Resolved
KB4462939
Resolved:
October 18, 2018 10:00 AM PT

Opened:
October 09, 2018 10:00 AM PT
Unable to use Seek bar in Windows Media Player
After installing KB4462937, users may not be able to use the Seek Bar in Windows Media Player when playing specific files. This issue does not affect normal playback.

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 8.1; Windows 7, Service Pack 1
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2; Windows Server 2008 R2 SP1

Resolution: This issue is resolved in KB4471327.

Back to top
OS Build 15063.1387

October 09, 2018
KB4462937
Resolved
KB4471327
Resolved:
December 11, 2018
10:00 AM PT

Opened:
October 09, 2018
10:00 AM PT
LongonUI.exe stops working intermittently
After installing KB4462937, LogonUI.exe stops working intermittently.

Affected platforms:
  • Windows 10, version 1703

Resolution: This issue is resolved in KB4467699.

Back to top
OS Build 15063.1387

October 09, 2018
KB4462937
Resolved
KB4467699
Resolved:
November 27, 2018
10:00 AM PT

Opened:
October 09, 2018
10:00 AM PT
Error message beginning with “Hosted by…” when launching Microsoft Edge
After installing KB4462937, some users may see a dialog box with a non-applicable message beginning with the words “Hosted by...” when first starting Microsoft Edge.

This dialog will only appear once if they have turned on “Block only third-party cookies” in Microsoft Edge and applied certain language packs before installing this update.

Affected platforms:
  • Client: Windows 10, version 1709; Windows 10, version 1703
  • Server: Windows Server, version 1709

Resolution: This issue is resolved in KB4462939.

Back to top
OS Build 15063.1387

October 09, 2018
KB4462937
Resolved
KB4462939
Resolved:
October 18, 2018
10:00 AM PT

Opened:
October 09, 2018
10:00 AM PT
" @@ -104,6 +104,6 @@ sections: - type: markdown text: " - +
DetailsAffected buildStatusHistory
SqlConnection instantiation exception on .NET 4.6 and later
After you install the August Preview of Quality Rollup or September 11, 2018 .NET Framework update, instantiation of SqlConnection can throw an exception.

For more information about this issue, see the following article in the Microsoft Knowledge Base:
4470809 SqlConnection instantiation exception on .NET 4.6 and later after August-September 2018 .NET Framework updates.

Affected platforms:
  • Client: Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016
  • Server: Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016

Resolution: This issue is resolved in KB4480959.

Back to top
OS Build 15063.1292

August 30, 2018
KB4343889
Resolved
KB4480959
Resolved:
January 15, 2019 10:00 AM PT

Opened:
August 30, 2018 05:00 PM PT
SqlConnection instantiation exception on .NET 4.6 and later
After you install the August Preview of Quality Rollup or September 11, 2018 .NET Framework update, instantiation of SqlConnection can throw an exception.

For more information about this issue, see the following article in the Microsoft Knowledge Base:
4470809 SqlConnection instantiation exception on .NET 4.6 and later after August-September 2018 .NET Framework updates.

Affected platforms:
  • Client: Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016
  • Server: Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016

Resolution: This issue is resolved in KB4480959.

Back to top
OS Build 15063.1292

August 30, 2018
KB4343889
Resolved
KB4480959
Resolved:
January 15, 2019
10:00 AM PT

Opened:
August 30, 2018
05:00 PM PT
" diff --git a/windows/release-information/resolved-issues-windows-10-1709.yml b/windows/release-information/resolved-issues-windows-10-1709.yml index 2e3968c9ef..8c6c8c22b7 100644 --- a/windows/release-information/resolved-issues-windows-10-1709.yml +++ b/windows/release-information/resolved-issues-windows-10-1709.yml @@ -32,19 +32,19 @@ sections: - type: markdown text: " - - - - - - - - - - - - - + + + + + + + + + + + + +
SummaryOriginating updateStatusDate resolved
End-user-defined characters (EUDC) may cause blue screen at startup
If you enable per font end-user-defined characters (EUDC), the system may stop working and a blue screen may appear at startup.

See details >
OS Build 16299.1059

March 19, 2019
KB4489890
Resolved
KB4493441
April 09, 2019 10:00 AM PT
MSXML6 causes applications to stop responding if an exception was thrown
MSXML6 causes applications to stop responding if an exception was thrown during node operations, such as appendChild(), insertBefore(), and moveNode().

See details >
OS Build 16299.904

January 08, 2019
KB4480978
Resolved
KB4493441
April 09, 2019 10:00 AM PT
Stop error when attempting to start SSH from WSL
A stop error occurs when attempting to start the Secure Shell client program from Windows Subsystem for Linux with agent forwarding enabled using a command line switch (ssh –A) or

See details >
OS Build 16299.1029

March 12, 2019
KB4489886
Resolved
KB4493441
April 09, 2019 10:00 AM PT
Error 1309 when installing/uninstalling MSI or MSP files
Users may receive “Error 1309” while installing or uninstalling certain types of MSI and MSP files.

See details >
OS Build 16299.967

February 12, 2019
KB4486996
Resolved
KB4489886
March 12, 2019 10:00 AM PT
Applications using Microsoft Jet database and Access 95 file format stop working
Applications that use a Microsoft Jet database with the Microsoft Access 95 file format may randomly stop working.

See details >
OS Build 16299.967

February 12, 2019
KB4486996
Resolved
KB4487021
February 19, 2019 02:00 PM PT
First character of the Japanese era name not recognized as an abbreviation
The first character of the Japanese era name is not recognized as an abbreviation and may cause date parsing issues.

See details >
OS Build 16299.936

January 15, 2019
KB4480967
Resolved
KB4487021
February 19, 2019 02:00 PM PT
Internet Explorer may fail to load images
Internet Explorer may fail to load images with a backslash (\\) in their relative source path.

See details >
OS Build 16299.967

February 12, 2019
KB4486996
Resolved
KB4487021
February 19, 2019 02:00 PM PT
Applications using Microsoft Jet database fail to open
Applications that use a Microsoft Jet database with the Microsoft Access 97 file format may fail to open if column names are greater than 32 characters.

See details >
OS Build 16299.904

January 08, 2019
KB4480978
Resolved
KB4486996
February 12, 2019 10:00 AM PT
Webpages become unresponsive in Microsoft Edge
Microsoft Edge users report difficulty browsing and loading webpages.

See details >
OS Build 16299.904

January 08, 2019
KB4480978
Resolved
KB4486996
February 12, 2019 10:00 AM PT
SqlConnection instantiation exception on .NET 4.6 and later
Instantiation of SqlConnection can throw an exception after certain updates have been installed.

See details >
OS Build 16299.637

August 30, 2018
KB4343893
Resolved
KB4480967
January 15, 2019 10:00 AM PT
Unable to access hotspots with third-party applications
Third-party applications may have difficulty authenticating hotspots.

See details >
OS Build 16299.904

January 08, 2019
KB4480978
Resolved
KB4480967
January 15, 2019 10:00 AM PT
Unable to use Seek bar in Windows Media Player
Users may not be able to use the Seek bar in Windows Media Player when playing specific files.

See details >
OS Build 16299.726

October 09, 2018
KB4462918
Resolved
KB4471329
December 11, 2018 10:00 AM PT
Error message beginning with “Hosted by…” when launching Microsoft Edge
Some users may encounter an error message beginning with “Hosted by…” when launching Microsoft Edge.

See details >
OS Build 16299.726

October 09, 2018
KB4462918
Resolved
KB4462932
October 18, 2018 10:00 AM PT
End-user-defined characters (EUDC) may cause blue screen at startup
If you enable per font end-user-defined characters (EUDC), the system may stop working and a blue screen may appear at startup.

See details >
OS Build 16299.1059

March 19, 2019
KB4489890
Resolved
KB4493441
April 09, 2019
10:00 AM PT
MSXML6 causes applications to stop responding if an exception was thrown
MSXML6 causes applications to stop responding if an exception was thrown during node operations, such as appendChild(), insertBefore(), and moveNode().

See details >
OS Build 16299.904

January 08, 2019
KB4480978
Resolved
KB4493441
April 09, 2019
10:00 AM PT
Stop error when attempting to start SSH from WSL
A stop error occurs when attempting to start the Secure Shell client program from Windows Subsystem for Linux with agent forwarding enabled using a command line switch (ssh –A) or

See details >
OS Build 16299.1029

March 12, 2019
KB4489886
Resolved
KB4493441
April 09, 2019
10:00 AM PT
Error 1309 when installing/uninstalling MSI or MSP files
Users may receive “Error 1309” while installing or uninstalling certain types of MSI and MSP files.

See details >
OS Build 16299.967

February 12, 2019
KB4486996
Resolved
KB4489886
March 12, 2019
10:00 AM PT
Applications using Microsoft Jet database and Access 95 file format stop working
Applications that use a Microsoft Jet database with the Microsoft Access 95 file format may randomly stop working.

See details >
OS Build 16299.967

February 12, 2019
KB4486996
Resolved
KB4487021
February 19, 2019
02:00 PM PT
First character of the Japanese era name not recognized as an abbreviation
The first character of the Japanese era name is not recognized as an abbreviation and may cause date parsing issues.

See details >
OS Build 16299.936

January 15, 2019
KB4480967
Resolved
KB4487021
February 19, 2019
02:00 PM PT
Internet Explorer may fail to load images
Internet Explorer may fail to load images with a backslash (\\) in their relative source path.

See details >
OS Build 16299.967

February 12, 2019
KB4486996
Resolved
KB4487021
February 19, 2019
02:00 PM PT
Applications using Microsoft Jet database fail to open
Applications that use a Microsoft Jet database with the Microsoft Access 97 file format may fail to open if column names are greater than 32 characters.

See details >
OS Build 16299.904

January 08, 2019
KB4480978
Resolved
KB4486996
February 12, 2019
10:00 AM PT
Webpages become unresponsive in Microsoft Edge
Microsoft Edge users report difficulty browsing and loading webpages.

See details >
OS Build 16299.904

January 08, 2019
KB4480978
Resolved
KB4486996
February 12, 2019
10:00 AM PT
SqlConnection instantiation exception on .NET 4.6 and later
Instantiation of SqlConnection can throw an exception after certain updates have been installed.

See details >
OS Build 16299.637

August 30, 2018
KB4343893
Resolved
KB4480967
January 15, 2019
10:00 AM PT
Unable to access hotspots with third-party applications
Third-party applications may have difficulty authenticating hotspots.

See details >
OS Build 16299.904

January 08, 2019
KB4480978
Resolved
KB4480967
January 15, 2019
10:00 AM PT
Unable to use Seek bar in Windows Media Player
Users may not be able to use the Seek bar in Windows Media Player when playing specific files.

See details >
OS Build 16299.726

October 09, 2018
KB4462918
Resolved
KB4471329
December 11, 2018
10:00 AM PT
Error message beginning with “Hosted by…” when launching Microsoft Edge
Some users may encounter an error message beginning with “Hosted by…” when launching Microsoft Edge.

See details >
OS Build 16299.726

October 09, 2018
KB4462918
Resolved
KB4462932
October 18, 2018
10:00 AM PT
" @@ -60,8 +60,8 @@ sections: - type: markdown text: " - - + +
DetailsAffected buildStatusHistory
End-user-defined characters (EUDC) may cause blue screen at startup
If you enable per font end-user-defined characters (EUDC), the system may stop working and a blue screen may appear at startup. This is not a common setting in non-Asian regions.

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016

Resolution: This issue is resolved in KB4493441.

Back to top
OS Build 16299.1059

March 19, 2019
KB4489890
Resolved
KB4493441
Resolved:
April 09, 2019 10:00 AM PT

Opened:
March 19, 2019 10:00 AM PT
Stop error when attempting to start SSH from WSL
After applying KB4489886, a stop error occurs when attempting to start the Secure Shell (SSH) client program from Windows Subsystem for Linux (WSL) with agent forwarding enabled using a command line switch (ssh –A) or a configuration setting.

Affected platforms:
  • Client: Windows 10, version 1803; Windows 10, version 1709
  • Server: Windows Server, version 1803; Windows Server, version 1709

Resolution: This issue is resolved in KB4493441.

Back to top
OS Build 16299.1029

March 12, 2019
KB4489886
Resolved
KB4493441
Resolved:
April 09, 2019 10:00 AM PT

Opened:
March 12, 2019 10:00 AM PT
End-user-defined characters (EUDC) may cause blue screen at startup
If you enable per font end-user-defined characters (EUDC), the system may stop working and a blue screen may appear at startup. This is not a common setting in non-Asian regions.

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016

Resolution: This issue is resolved in KB4493441.

Back to top
OS Build 16299.1059

March 19, 2019
KB4489890
Resolved
KB4493441
Resolved:
April 09, 2019
10:00 AM PT

Opened:
March 19, 2019
10:00 AM PT
Stop error when attempting to start SSH from WSL
After applying KB4489886, a stop error occurs when attempting to start the Secure Shell (SSH) client program from Windows Subsystem for Linux (WSL) with agent forwarding enabled using a command line switch (ssh –A) or a configuration setting.

Affected platforms:
  • Client: Windows 10, version 1803; Windows 10, version 1709
  • Server: Windows Server, version 1803; Windows Server, version 1709

Resolution: This issue is resolved in KB4493441.

Back to top
OS Build 16299.1029

March 12, 2019
KB4489886
Resolved
KB4493441
Resolved:
April 09, 2019
10:00 AM PT

Opened:
March 12, 2019
10:00 AM PT
" @@ -70,9 +70,9 @@ sections: - type: markdown text: " - - - + + +
DetailsAffected buildStatusHistory
Error 1309 when installing/uninstalling MSI or MSP files
After installing KB4486996, users may receive “Error 1309” while installing or uninstalling certain types of MSI and MSP files.

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 8.1
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2

Resolution: This issue is resolved in KB4489886.

Back to top
OS Build 16299.967

February 12, 2019
KB4486996
Resolved
KB4489886
Resolved:
March 12, 2019 10:00 AM PT

Opened:
February 12, 2019 10:00 AM PT
Applications using Microsoft Jet database and Access 95 file format stop working
Applications that use a Microsoft Jet database with the Microsoft Access 95 file format may randomly stop working.

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 7, Service Pack 1
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2008 R2 SP1

Resolution: This issue is resolved in KB4487021.

Back to top
OS Build 16299.967

February 12, 2019
KB4486996
Resolved
KB4487021
Resolved:
February 19, 2019 02:00 PM PT

Opened:
February 12, 2019 10:00 AM PT
Internet Explorer may fail to load images
After installing KB4486996, Internet Explorer may fail to load images with a backslash (\\) in their relative source path.

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 8.1; Windows 7, Service Pack 1
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2; Windows Server 2008 R2 SP1

Resolution: This issue is resolved in KB4487021.

Back to top
OS Build 16299.967

February 12, 2019
KB4486996
Resolved
KB4487021
Resolved:
February 19, 2019 02:00 PM PT

Opened:
February 12, 2019 10:00 AM PT
Error 1309 when installing/uninstalling MSI or MSP files
After installing KB4486996, users may receive “Error 1309” while installing or uninstalling certain types of MSI and MSP files.

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 8.1
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2

Resolution: This issue is resolved in KB4489886.

Back to top
OS Build 16299.967

February 12, 2019
KB4486996
Resolved
KB4489886
Resolved:
March 12, 2019
10:00 AM PT

Opened:
February 12, 2019
10:00 AM PT
Applications using Microsoft Jet database and Access 95 file format stop working
Applications that use a Microsoft Jet database with the Microsoft Access 95 file format may randomly stop working.

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 7, Service Pack 1
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2008 R2 SP1

Resolution: This issue is resolved in KB4487021.

Back to top
OS Build 16299.967

February 12, 2019
KB4486996
Resolved
KB4487021
Resolved:
February 19, 2019
02:00 PM PT

Opened:
February 12, 2019
10:00 AM PT
Internet Explorer may fail to load images
After installing KB4486996, Internet Explorer may fail to load images with a backslash (\\) in their relative source path.

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 8.1; Windows 7, Service Pack 1
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2; Windows Server 2008 R2 SP1

Resolution: This issue is resolved in KB4487021.

Back to top
OS Build 16299.967

February 12, 2019
KB4486996
Resolved
KB4487021
Resolved:
February 19, 2019
02:00 PM PT

Opened:
February 12, 2019
10:00 AM PT
" @@ -81,11 +81,11 @@ sections: - type: markdown text: " - - - - - + + + + +
DetailsAffected buildStatusHistory
MSXML6 causes applications to stop responding if an exception was thrown
After installing KB4480978, MSXML6 causes applications to stop responding if an exception was thrown during node operations, such as appendChild(), insertBefore(), and moveNode().

The Group Policy editor may stop responding when editing a Group Policy Object (GPO) that contains Group Policy Preferences (GPP) for Internet Explorer 10 settings.

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 8.1
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2

Resolution: This issue is resolved in KB4493441.

Back to top
OS Build 16299.904

January 08, 2019
KB4480978
Resolved
KB4493441
Resolved:
April 09, 2019 10:00 AM PT

Opened:
January 08, 2019 10:00 AM PT
First character of the Japanese era name not recognized as an abbreviation
After installing KB4480967, the first character of the Japanese era name is not recognized as an abbreviation and may cause date parsing issues.

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 8.1; Windows 7, Service Pack 1
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2; Windows Server 2008 R2 SP1

Resolution: This issue is resolved in KB4487021.

Back to top
OS Build 16299.936

January 15, 2019
KB4480967
Resolved
KB4487021
Resolved:
February 19, 2019 02:00 PM PT

Opened:
January 15, 2019 10:00 AM PT
Applications using Microsoft Jet database fail to open
Applications that use a Microsoft Jet database with the Microsoft Access 97 file format may fail to open if the database has column names greater than 32 characters. The database will fail to open with the error, “Unrecognized Database Format.”

Affected platforms:
  • Client: Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 8.1; Windows 7, Service Pack 1 
  • Server: Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2; Windows Server 2008 R2 SP1 

Resolution: This issue is resolved in KB4486996.

Back to top
OS Build 16299.904

January 08, 2019
KB4480978
Resolved
KB4486996
Resolved:
February 12, 2019 10:00 AM PT

Opened:
January 08, 2019 10:00 AM PT
Webpages become unresponsive in Microsoft Edge
After installing KB4480978, some Microsoft Edge users report that they:

• Cannot load webpages using a local IP address.
• Cannot load webpages on the Internet using a VPN connection.

Browsing fails or the webpage may become unresponsive.

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709

Resolution: This issue is resolved in KB4486996.

Back to top
OS Build 16299.904

January 08, 2019
KB4480978
Resolved
KB4486996
Resolved:
February 12, 2019 10:00 AM PT

Opened:
January 08, 2019 10:00 AM PT
Unable to access hotspots with third-party applications
After installing KB4480978, third-party applications may have difficulty authenticating hotspots.

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 8.1
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2

Resolution: This issue is resolved in KB4480967.

Back to top
OS Build 16299.904

January 08, 2019
KB4480978
Resolved
KB4480967
Resolved:
January 15, 2019 10:00 AM PT

Opened:
January 08, 2019 10:00 AM PT
MSXML6 causes applications to stop responding if an exception was thrown
After installing KB4480978, MSXML6 causes applications to stop responding if an exception was thrown during node operations, such as appendChild(), insertBefore(), and moveNode().

The Group Policy editor may stop responding when editing a Group Policy Object (GPO) that contains Group Policy Preferences (GPP) for Internet Explorer 10 settings.

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 8.1
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2

Resolution: This issue is resolved in KB4493441.

Back to top
OS Build 16299.904

January 08, 2019
KB4480978
Resolved
KB4493441
Resolved:
April 09, 2019
10:00 AM PT

Opened:
January 08, 2019
10:00 AM PT
First character of the Japanese era name not recognized as an abbreviation
After installing KB4480967, the first character of the Japanese era name is not recognized as an abbreviation and may cause date parsing issues.

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 8.1; Windows 7, Service Pack 1
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2; Windows Server 2008 R2 SP1

Resolution: This issue is resolved in KB4487021.

Back to top
OS Build 16299.936

January 15, 2019
KB4480967
Resolved
KB4487021
Resolved:
February 19, 2019
02:00 PM PT

Opened:
January 15, 2019
10:00 AM PT
Applications using Microsoft Jet database fail to open
Applications that use a Microsoft Jet database with the Microsoft Access 97 file format may fail to open if the database has column names greater than 32 characters. The database will fail to open with the error, “Unrecognized Database Format.”

Affected platforms:
  • Client: Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 8.1; Windows 7, Service Pack 1 
  • Server: Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2; Windows Server 2008 R2 SP1 

Resolution: This issue is resolved in KB4486996.

Back to top
OS Build 16299.904

January 08, 2019
KB4480978
Resolved
KB4486996
Resolved:
February 12, 2019
10:00 AM PT

Opened:
January 08, 2019
10:00 AM PT
Webpages become unresponsive in Microsoft Edge
After installing KB4480978, some Microsoft Edge users report that they:
  • Cannot load webpages using a local IP address.
  • Cannot load webpages on the Internet using a VPN connection.
Browsing fails or the webpage may become unresponsive.

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709

Resolution: This issue is resolved in KB4486996.

Back to top
OS Build 16299.904

January 08, 2019
KB4480978
Resolved
KB4486996
Resolved:
February 12, 2019
10:00 AM PT

Opened:
January 08, 2019
10:00 AM PT
Unable to access hotspots with third-party applications
After installing KB4480978, third-party applications may have difficulty authenticating hotspots.

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 8.1
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2

Resolution: This issue is resolved in KB4480967.

Back to top
OS Build 16299.904

January 08, 2019
KB4480978
Resolved
KB4480967
Resolved:
January 15, 2019
10:00 AM PT

Opened:
January 08, 2019
10:00 AM PT
" @@ -94,8 +94,8 @@ sections: - type: markdown text: " - - + +
DetailsAffected buildStatusHistory
Unable to use Seek bar in Windows Media Player
After installing KB4462918, users may not be able to use the Seek Bar in Windows Media Player when playing specific files. This issue does not affect normal playback.

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 8.1; Windows 7, Service Pack 1
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2; Windows Server 2008 R2 SP1

Resolution: This issue is resolved in KB4471329.

Back to top
OS Build 16299.726

October 09, 2018
KB4462918
Resolved
KB4471329
Resolved:
December 11, 2018 10:00 AM PT

Opened:
October 09, 2018 10:00 AM PT
Error message beginning with “Hosted by…” when launching Microsoft Edge
After installing KB4462918, some users may see a dialog box with a non-applicable message beginning with the words “Hosted by...” when first starting Microsoft Edge.

This dialog will only appear once if they have turned on “Block only third-party cookies” in Microsoft Edge and applied certain language packs before installing this update.

Affected platforms:
  • Client: Windows 10, version 1709; Windows 10, version 1703
  • Server: Windows Server, version 1709

Resolution: This issue is resolved in KB4462932.

Back to top
OS Build 16299.726

October 09, 2018
KB4462918
Resolved
KB4462932
Resolved:
October 18, 2018 10:00 AM PT

Opened:
October 09, 2018 10:00 AM PT
Unable to use Seek bar in Windows Media Player
After installing KB4462918, users may not be able to use the Seek Bar in Windows Media Player when playing specific files. This issue does not affect normal playback.

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 8.1; Windows 7, Service Pack 1
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2; Windows Server 2008 R2 SP1

Resolution: This issue is resolved in KB4471329.

Back to top
OS Build 16299.726

October 09, 2018
KB4462918
Resolved
KB4471329
Resolved:
December 11, 2018
10:00 AM PT

Opened:
October 09, 2018
10:00 AM PT
Error message beginning with “Hosted by…” when launching Microsoft Edge
After installing KB4462918, some users may see a dialog box with a non-applicable message beginning with the words “Hosted by...” when first starting Microsoft Edge.

This dialog will only appear once if they have turned on “Block only third-party cookies” in Microsoft Edge and applied certain language packs before installing this update.

Affected platforms:
  • Client: Windows 10, version 1709; Windows 10, version 1703
  • Server: Windows Server, version 1709

Resolution: This issue is resolved in KB4462932.

Back to top
OS Build 16299.726

October 09, 2018
KB4462918
Resolved
KB4462932
Resolved:
October 18, 2018
10:00 AM PT

Opened:
October 09, 2018
10:00 AM PT
" @@ -104,6 +104,6 @@ sections: - type: markdown text: " - +
DetailsAffected buildStatusHistory
SqlConnection instantiation exception on .NET 4.6 and later
After you install the August Preview of Quality Rollup or September 11, 2018 .NET Framework update, instantiation of SqlConnection can throw an exception.

For more information about this issue, see the following article in the Microsoft Knowledge Base:
4470809 SqlConnection instantiation exception on .NET 4.6 and later after August-September 2018 .NET Framework updates.

Affected platforms:
  • Client: Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016
  • Server: Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016

Resolution: This issue is resolved in KB4480967.

Back to top
OS Build 16299.637

August 30, 2018
KB4343893
Resolved
KB4480967
Resolved:
January 15, 2019 10:00 AM PT

Opened:
August 30, 2018 05:00 PM PT
SqlConnection instantiation exception on .NET 4.6 and later
After you install the August Preview of Quality Rollup or September 11, 2018 .NET Framework update, instantiation of SqlConnection can throw an exception.

For more information about this issue, see the following article in the Microsoft Knowledge Base:
4470809 SqlConnection instantiation exception on .NET 4.6 and later after August-September 2018 .NET Framework updates.

Affected platforms:
  • Client: Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016
  • Server: Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016

Resolution: This issue is resolved in KB4480967.

Back to top
OS Build 16299.637

August 30, 2018
KB4343893
Resolved
KB4480967
Resolved:
January 15, 2019
10:00 AM PT

Opened:
August 30, 2018
05:00 PM PT
" diff --git a/windows/release-information/resolved-issues-windows-10-1803.yml b/windows/release-information/resolved-issues-windows-10-1803.yml index 48966a90a5..e59eefb539 100644 --- a/windows/release-information/resolved-issues-windows-10-1803.yml +++ b/windows/release-information/resolved-issues-windows-10-1803.yml @@ -32,24 +32,24 @@ sections: - type: markdown text: " - - - - - - - - - - - - - - - - - - + + + + + + + + + + + + + + + + + +
SummaryOriginating updateStatusDate resolved
End-user-defined characters (EUDC) may cause blue screen at startup
If you enable per font end-user-defined characters (EUDC), the system may stop working and a blue screen may appear at startup.

See details >
OS Build 17134.677

March 19, 2019
KB4489894
Resolved
KB4493464
April 09, 2019 10:00 AM PT
MSXML6 may cause applications to stop responding
MSXML6 may cause applications to stop responding if an exception was thrown during node operations, such as appendChild(), insertBefore(), and moveNode().

See details >
OS Build 17134.523

January 08, 2019
KB4480966
Resolved
KB4493464
April 09, 2019 10:00 AM PT
Stop error when attempting to start SSH from WSL
A stop error occurs when attempting to start Secure Shell from Windows Subsystem for Linux with agent forwarding using a command line switch (ssh –A) or a configuration setting.

See details >
OS Build 17134.648

March 12, 2019
KB4489868
Resolved
KB4493464
April 09, 2019 10:00 AM PT
Error 1309 when installing/uninstalling MSI or MSP files
Users may receive \"Error 1309\" while installing or uninstalling certain types of MSI and MSP files.

See details >
OS Build 17134.590

February 12, 2019
KB4487017
Resolved
KB4489868
March 12, 2019 10:00 AM PT
Cannot pin a web link on the Start menu or the taskbar
Some users cannot pin a web link on the Start menu or the taskbar.

See details >
OS Build 17134.471

December 11, 2018
KB4471324
Resolved
KB4487029
February 19, 2019 02:00 PM PT
First character of Japanese era name not recognized
The first character of the Japanese era name is not recognized as an abbreviation and may cause date parsing issues.

See details >
OS Build 17134.556

January 15, 2019
KB4480976
Resolved
KB4487029
February 19, 2019 02:00 PM PT
Internet Explorer may fail to load images
Internet Explorer may fail to load images with a backslash (\\) in their relative source path.

See details >
OS Build 17134.590

February 12, 2019
KB4487017
Resolved
KB4487029
February 19, 2019 02:00 PM PT
Applications using Microsoft Jet database and Access 95 file format stop working
Applications that use a Microsoft Jet database with the Microsoft Access 95 file format may randomly stop working.

See details >
OS Build 17134.523

January 08, 2019
KB4480966
Resolved
KB4487017
February 12, 2019 10:00 AM PT
Webpages become unresponsive in Microsoft Edge
Microsoft Edge users report difficulty browsing and loading webpages.

See details >
OS Build 17134.523

January 08, 2019
KB4480966
Resolved
KB4487017
February 12, 2019 10:00 AM PT
SqlConnection instantiation exception on .NET 4.6 and later
After you install the August Preview of Quality Rollup or the September 11, 2018 .NET Framework update, instantiation of SqlConnection can throw an exception.

See details >
OS Build 17134.285

September 11, 2018
KB4457128
Resolved
KB4480976
January 15, 2019 10:00 AM PT
Unable to access hotspots with third-party applications
Third-party applications may have difficulty authenticating hotspots.

See details >
OS Build 17134.523

January 08, 2019
KB4480966
Resolved
KB4480976
January 15, 2019 10:00 AM PT
Blue or black screen with \"System thread exception not handled\" error
Some users may get a blue or black screen with the error code, “System thread exception not handled.”

See details >
OS Build 17134.441

November 27, 2018
KB4467682
Resolved
KB4471324
December 11, 2018 10:00 AM PT
Custom Start menu layouts display incorrectly
Custom Start menu layouts may display incorrectly.

See details >
OS Build 17134.441

November 27, 2018
KB4467682
Resolved
KB4471324
December 11, 2018 10:00 AM PT
Unable to use Seek bar in Windows Media Player
Users may not be able to use the Seek Bar in Windows Media Player when playing specific files.

See details >
OS Build 17134.345

October 09, 2018
KB4462919
Resolved
KB4471324
December 11, 2018 10:00 AM PT
Users cannot set Win32 program defaults
Some users cannot set Win32 program defaults for certain app and file type combinations.

See details >
OS Build 17134.320

September 26, 2018
KB4458469
Resolved
KB4467682
November 27, 2018 10:00 AM PT
Developer Tools (F12) fail to start in Microsoft Edge
Developer Tools (F12) may fail to start in Microsoft Edge.

See details >
OS Build 17134.376

October 24, 2018
KB4462933
Resolved
KB4467702
November 13, 2018 10:00 AM PT
Guest VMs running Unicast NLB fail to respond after restart
All guest virtual machines running Unicast NLB fail to respond to NLB requests after the virtual machines restart.

See details >
OS Build 17134.285

September 11, 2018
KB4457128
Resolved
KB4458469
September 20, 2018 10:00 AM PT
Microsoft Intune takes a long time to deliver user profiles
Windows no longer recognizes the Personal Information exchange (PFX) certificate used for Wi-Fi or VPN authentication, causing delays in Microsoft Intune delivering user profiles.

See details >
OS Build 17134.191

July 24, 2018
KB4340917
Resolved
KB4464218
September 17, 2018 10:00 AM PT
End-user-defined characters (EUDC) may cause blue screen at startup
If you enable per font end-user-defined characters (EUDC), the system may stop working and a blue screen may appear at startup.

See details >
OS Build 17134.677

March 19, 2019
KB4489894
Resolved
KB4493464
April 09, 2019
10:00 AM PT
MSXML6 may cause applications to stop responding
MSXML6 may cause applications to stop responding if an exception was thrown during node operations, such as appendChild(), insertBefore(), and moveNode().

See details >
OS Build 17134.523

January 08, 2019
KB4480966
Resolved
KB4493464
April 09, 2019
10:00 AM PT
Stop error when attempting to start SSH from WSL
A stop error occurs when attempting to start Secure Shell from Windows Subsystem for Linux with agent forwarding using a command line switch (ssh –A) or a configuration setting.

See details >
OS Build 17134.648

March 12, 2019
KB4489868
Resolved
KB4493464
April 09, 2019
10:00 AM PT
Error 1309 when installing/uninstalling MSI or MSP files
Users may receive \"Error 1309\" while installing or uninstalling certain types of MSI and MSP files.

See details >
OS Build 17134.590

February 12, 2019
KB4487017
Resolved
KB4489868
March 12, 2019
10:00 AM PT
Cannot pin a web link on the Start menu or the taskbar
Some users cannot pin a web link on the Start menu or the taskbar.

See details >
OS Build 17134.471

December 11, 2018
KB4471324
Resolved
KB4487029
February 19, 2019
02:00 PM PT
First character of Japanese era name not recognized
The first character of the Japanese era name is not recognized as an abbreviation and may cause date parsing issues.

See details >
OS Build 17134.556

January 15, 2019
KB4480976
Resolved
KB4487029
February 19, 2019
02:00 PM PT
Internet Explorer may fail to load images
Internet Explorer may fail to load images with a backslash (\\) in their relative source path.

See details >
OS Build 17134.590

February 12, 2019
KB4487017
Resolved
KB4487029
February 19, 2019
02:00 PM PT
Applications using Microsoft Jet database and Access 95 file format stop working
Applications that use a Microsoft Jet database with the Microsoft Access 95 file format may randomly stop working.

See details >
OS Build 17134.523

January 08, 2019
KB4480966
Resolved
KB4487017
February 12, 2019
10:00 AM PT
Webpages become unresponsive in Microsoft Edge
Microsoft Edge users report difficulty browsing and loading webpages.

See details >
OS Build 17134.523

January 08, 2019
KB4480966
Resolved
KB4487017
February 12, 2019
10:00 AM PT
SqlConnection instantiation exception on .NET 4.6 and later
After you install the August Preview of Quality Rollup or the September 11, 2018 .NET Framework update, instantiation of SqlConnection can throw an exception.

See details >
OS Build 17134.285

September 11, 2018
KB4457128
Resolved
KB4480976
January 15, 2019
10:00 AM PT
Unable to access hotspots with third-party applications
Third-party applications may have difficulty authenticating hotspots.

See details >
OS Build 17134.523

January 08, 2019
KB4480966
Resolved
KB4480976
January 15, 2019
10:00 AM PT
Blue or black screen with \"System thread exception not handled\" error
Some users may get a blue or black screen with the error code, “System thread exception not handled.”

See details >
OS Build 17134.441

November 27, 2018
KB4467682
Resolved
KB4471324
December 11, 2018
10:00 AM PT
Custom Start menu layouts display incorrectly
Custom Start menu layouts may display incorrectly.

See details >
OS Build 17134.441

November 27, 2018
KB4467682
Resolved
KB4471324
December 11, 2018
10:00 AM PT
Unable to use Seek bar in Windows Media Player
Users may not be able to use the Seek Bar in Windows Media Player when playing specific files.

See details >
OS Build 17134.345

October 09, 2018
KB4462919
Resolved
KB4471324
December 11, 2018
10:00 AM PT
Users cannot set Win32 program defaults
Some users cannot set Win32 program defaults for certain app and file type combinations.

See details >
OS Build 17134.320

September 26, 2018
KB4458469
Resolved
KB4467682
November 27, 2018
10:00 AM PT
Developer Tools (F12) fail to start in Microsoft Edge
Developer Tools (F12) may fail to start in Microsoft Edge.

See details >
OS Build 17134.376

October 24, 2018
KB4462933
Resolved
KB4467702
November 13, 2018
10:00 AM PT
Guest VMs running Unicast NLB fail to respond after restart
All guest virtual machines running Unicast NLB fail to respond to NLB requests after the virtual machines restart.

See details >
OS Build 17134.285

September 11, 2018
KB4457128
Resolved
KB4458469
September 20, 2018
10:00 AM PT
Microsoft Intune takes a long time to deliver user profiles
Windows no longer recognizes the Personal Information exchange (PFX) certificate used for Wi-Fi or VPN authentication, causing delays in Microsoft Intune delivering user profiles.

See details >
OS Build 17134.191

July 24, 2018
KB4340917
Resolved
KB4464218
September 17, 2018
10:00 AM PT
" @@ -65,8 +65,8 @@ sections: - type: markdown text: " - - + +
DetailsAffected buildStatusHistory
End-user-defined characters (EUDC) may cause blue screen at startup
If you enable per font end-user-defined characters (EUDC), the system may stop working and a blue screen may appear at startup. This is not a common setting in non-Asian regions. 

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016
 
Resolution: This issue was resolved in KB4493464

Back to top
OS Build 17134.677

March 19, 2019
KB4489894
Resolved
KB4493464
Resolved:
April 09, 2019 10:00 AM PT

Opened:
March 19, 2019 10:00 AM PT
Stop error when attempting to start SSH from WSL
After applying KB4489868, a stop error occurs when attempting to start the Secure Shell (SSH) client program from Windows Subsystem for Linux (WSL) with agent forwarding enabled using a command line switch (ssh -A) or a configuration setting.

Affected platforms:
  • Client: Windows 10, version 1803; Windows 10, version 1709
  • Server: Windows Server, version 1803; Windows Server, version 1709

Resolution: This issue was resolved in KB4493464.

Back to top
OS Build 17134.648

March 12, 2019
KB4489868
Resolved
KB4493464
Resolved:
April 09, 2019 10:00 AM PT

Opened:
March 12, 2019 10:00 AM PT
End-user-defined characters (EUDC) may cause blue screen at startup
If you enable per font end-user-defined characters (EUDC), the system may stop working and a blue screen may appear at startup. This is not a common setting in non-Asian regions. 

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016
 
Resolution: This issue was resolved in KB4493464

Back to top
OS Build 17134.677

March 19, 2019
KB4489894
Resolved
KB4493464
Resolved:
April 09, 2019
10:00 AM PT

Opened:
March 19, 2019
10:00 AM PT
Stop error when attempting to start SSH from WSL
After applying KB4489868, a stop error occurs when attempting to start the Secure Shell (SSH) client program from Windows Subsystem for Linux (WSL) with agent forwarding enabled using a command line switch (ssh -A) or a configuration setting.

Affected platforms:
  • Client: Windows 10, version 1803; Windows 10, version 1709
  • Server: Windows Server, version 1803; Windows Server, version 1709

Resolution: This issue was resolved in KB4493464.

Back to top
OS Build 17134.648

March 12, 2019
KB4489868
Resolved
KB4493464
Resolved:
April 09, 2019
10:00 AM PT

Opened:
March 12, 2019
10:00 AM PT
" @@ -75,8 +75,8 @@ sections: - type: markdown text: " - - + +
DetailsAffected buildStatusHistory
Error 1309 when installing/uninstalling MSI or MSP files
After installing KB4487017, users may received \"Error 1309\" while installing or uninstalling certain types of MSI and MSP files. 

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 8.1
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2

Resolution: This issue is resolved in KB4489868.

Back to top
OS Build 17134.590

February 12, 2019
KB4487017
Resolved
KB4489868
Resolved:
March 12, 2019 10:00 AM PT

Opened:
February 12, 2019 10:00 AM PT
Internet Explorer may fail to load images
After installing KB4487017, Internet Explorer may fail to load images with a backslash (\\) in their relative source path. 

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 8.1; Windows 7, Service Pack 1
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2; Windows Server 2008 R2 SP1

Resolution: This issue is resolved in KB4487029

Back to top
OS Build 17134.590

February 12, 2019
KB4487017
Resolved
KB4487029
Resolved:
February 19, 2019 02:00 PM PT

Opened:
February 12, 2019 10:00 AM PT
Error 1309 when installing/uninstalling MSI or MSP files
After installing KB4487017, users may received \"Error 1309\" while installing or uninstalling certain types of MSI and MSP files. 

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 8.1
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2

Resolution: This issue is resolved in KB4489868.

Back to top
OS Build 17134.590

February 12, 2019
KB4487017
Resolved
KB4489868
Resolved:
March 12, 2019
10:00 AM PT

Opened:
February 12, 2019
10:00 AM PT
Internet Explorer may fail to load images
After installing KB4487017, Internet Explorer may fail to load images with a backslash (\\) in their relative source path. 

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 8.1; Windows 7, Service Pack 1
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2; Windows Server 2008 R2 SP1

Resolution: This issue is resolved in KB4487029

Back to top
OS Build 17134.590

February 12, 2019
KB4487017
Resolved
KB4487029
Resolved:
February 19, 2019
02:00 PM PT

Opened:
February 12, 2019
10:00 AM PT
" @@ -85,11 +85,11 @@ sections: - type: markdown text: " - - - - - + + + + +
DetailsAffected buildStatusHistory
MSXML6 may cause applications to stop responding
After installing KB4480966, MSXML6 causes applications to stop responding if an exception was thrown during node operations, such as appendChild(), insertBefore(), and moveNode().

The Group Policy editor may stop responding when editing a Group Policy Object (GPO) that contains Group Policy Preferences (GPP) for Internet Explorer 10 settings.

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 8.1
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2

Resolution: This issue was resolved in KB4493464

Back to top
OS Build 17134.523

January 08, 2019
KB4480966
Resolved
KB4493464
Resolved:
April 09, 2019 10:00 AM PT

Opened:
January 08, 2019 10:00 AM PT
First character of Japanese era name not recognized
After installing KB4480976, the first character of the Japanese era name is not recognized as an abbreviation and may cause date parsing issues.

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 8.1; Windows 7, Service Pack 1
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2; Windows Server 2008 R2 SP1

Resolution: This issue is resolved in KB4487029

Back to top
OS Build 17134.556

January 15, 2019
KB4480976
Resolved
KB4487029
Resolved:
February 19, 2019 02:00 PM PT

Opened:
January 15, 2019 10:00 AM PT
Applications using Microsoft Jet database and Access 95 file format stop working
Applications that use a Microsoft Jet database with the Microsoft Access 95 file format may randomly stop working. 

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 7, Service Pack 1
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2008 R2 SP1

Resolution: This issue is resolved in KB4487017.

Back to top
OS Build 17134.523

January 08, 2019
KB4480966
Resolved
KB4487017
Resolved:
February 12, 2019 10:00 AM PT

Opened:
January 08, 2019 10:00 AM PT
Webpages become unresponsive in Microsoft Edge
After installing KB4480966, some Microsoft Edge users report that they: 

  • Cannot load webpages using a local IP address. 
  • Cannot load webpages on the Internet using a VPN connection. 
 
Browsing fails or the webpage may become unresponsive. 

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709

Resolution: This issue is resolved in KB4487017

Back to top
OS Build 17134.523

January 08, 2019
KB4480966
Resolved
KB4487017
Resolved:
February 12, 2019 10:00 AM PT

Opened:
January 08, 2019 10:00 AM PT
Unable to access hotspots with third-party applications
After installing KB4480966, third-party applications may have difficulty authenticating hotspots.

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 8.1
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2

Resolution: This issue is resolved in KB4480976

Back to top
OS Build 17134.523

January 08, 2019
KB4480966
Resolved
KB4480976
Resolved:
January 15, 2019 10:00 AM PT

Opened:
January 08, 2019 10:00 AM PT
MSXML6 may cause applications to stop responding
After installing KB4480966, MSXML6 causes applications to stop responding if an exception was thrown during node operations, such as appendChild(), insertBefore(), and moveNode().

The Group Policy editor may stop responding when editing a Group Policy Object (GPO) that contains Group Policy Preferences (GPP) for Internet Explorer 10 settings.

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 8.1
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2

Resolution: This issue was resolved in KB4493464

Back to top
OS Build 17134.523

January 08, 2019
KB4480966
Resolved
KB4493464
Resolved:
April 09, 2019
10:00 AM PT

Opened:
January 08, 2019
10:00 AM PT
First character of Japanese era name not recognized
After installing KB4480976, the first character of the Japanese era name is not recognized as an abbreviation and may cause date parsing issues.

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 8.1; Windows 7, Service Pack 1
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2; Windows Server 2008 R2 SP1

Resolution: This issue is resolved in KB4487029

Back to top
OS Build 17134.556

January 15, 2019
KB4480976
Resolved
KB4487029
Resolved:
February 19, 2019
02:00 PM PT

Opened:
January 15, 2019
10:00 AM PT
Applications using Microsoft Jet database and Access 95 file format stop working
Applications that use a Microsoft Jet database with the Microsoft Access 95 file format may randomly stop working. 

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 7, Service Pack 1
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2008 R2 SP1

Resolution: This issue is resolved in KB4487017.

Back to top
OS Build 17134.523

January 08, 2019
KB4480966
Resolved
KB4487017
Resolved:
February 12, 2019
10:00 AM PT

Opened:
January 08, 2019
10:00 AM PT
Webpages become unresponsive in Microsoft Edge
After installing KB4480966, some Microsoft Edge users report that they: 
  • Cannot load webpages using a local IP address. 
  • Cannot load webpages on the Internet using a VPN connection.  
Browsing fails or the webpage may become unresponsive. 

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709

Resolution: This issue is resolved in KB4487017

Back to top
OS Build 17134.523

January 08, 2019
KB4480966
Resolved
KB4487017
Resolved:
February 12, 2019
10:00 AM PT

Opened:
January 08, 2019
10:00 AM PT
Unable to access hotspots with third-party applications
After installing KB4480966, third-party applications may have difficulty authenticating hotspots.

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 8.1
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2

Resolution: This issue is resolved in KB4480976

Back to top
OS Build 17134.523

January 08, 2019
KB4480966
Resolved
KB4480976
Resolved:
January 15, 2019
10:00 AM PT

Opened:
January 08, 2019
10:00 AM PT
" @@ -98,7 +98,7 @@ sections: - type: markdown text: " - +
DetailsAffected buildStatusHistory
Cannot pin a web link on the Start menu or the taskbar
After installing KB4471324, some users cannot pin a web link on the Start menu or the taskbar. 

Affected platforms:
  • Client: Windows 10, version 1803
  • Server: Windows Server, version 1803

Resolution: This issue is resolved in KB4487029

Back to top
OS Build 17134.471

December 11, 2018
KB4471324
Resolved
KB4487029
Resolved:
February 19, 2019 02:00 PM PT

Opened:
December 11, 2018 10:00 AM PT
Cannot pin a web link on the Start menu or the taskbar
After installing KB4471324, some users cannot pin a web link on the Start menu or the taskbar. 

Affected platforms:
  • Client: Windows 10, version 1803
  • Server: Windows Server, version 1803

Resolution: This issue is resolved in KB4487029

Back to top
OS Build 17134.471

December 11, 2018
KB4471324
Resolved
KB4487029
Resolved:
February 19, 2019
02:00 PM PT

Opened:
December 11, 2018
10:00 AM PT
" @@ -107,8 +107,8 @@ sections: - type: markdown text: " - - + +
DetailsAffected buildStatusHistory
Blue or black screen with \"System thread exception not handled\" error
After installing KB4467682, an optional update, some users may get a blue or black screen with the error code, \"System thread exception not handled.\"

Affected platforms:
  • Client: Windows 10, version 1803
  • Server: Windows Server, version 1803

Resolution: This issue is resolved in KB4471324

Back to top
OS Build 17134.441

November 27, 2018
KB4467682
Resolved
KB4471324
Resolved:
December 11, 2018 10:00 AM PT

Opened:
November 27, 2018 10:00 AM PT
Custom Start menu layouts display incorrectly
After installing KB4467682, custom Start menu layouts may display incorrectly. 

Affected platforms:
  • Client: Windows 10, version 1803
  • Server: Windows Server, version 1803
 
Resolution: This issue is resolved in KB4471324

Back to top
OS Build 17134.441

November 27, 2018
KB4467682
Resolved
KB4471324
Resolved:
December 11, 2018 10:00 AM PT

Opened:
November 27, 2018 10:00 AM PT
Blue or black screen with \"System thread exception not handled\" error
After installing KB4467682, an optional update, some users may get a blue or black screen with the error code, \"System thread exception not handled.\"

Affected platforms:
  • Client: Windows 10, version 1803
  • Server: Windows Server, version 1803

Resolution: This issue is resolved in KB4471324

Back to top
OS Build 17134.441

November 27, 2018
KB4467682
Resolved
KB4471324
Resolved:
December 11, 2018
10:00 AM PT

Opened:
November 27, 2018
10:00 AM PT
Custom Start menu layouts display incorrectly
After installing KB4467682, custom Start menu layouts may display incorrectly. 

Affected platforms:
  • Client: Windows 10, version 1803
  • Server: Windows Server, version 1803
 
Resolution: This issue is resolved in KB4471324

Back to top
OS Build 17134.441

November 27, 2018
KB4467682
Resolved
KB4471324
Resolved:
December 11, 2018
10:00 AM PT

Opened:
November 27, 2018
10:00 AM PT
" @@ -117,8 +117,8 @@ sections: - type: markdown text: " - - + +
DetailsAffected buildStatusHistory
Unable to use Seek bar in Windows Media Player
After installing KB4462919, users may not be able to use the Seek bar in Windows Media Player when playing specific files. This issue does not affect normal playback.

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 8.1; Windows 7, Service Pack 1
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2; Windows Server 2008 R2 SP1

Resolution: This issue is resolved in KB4471324

Back to top
OS Build 17134.345

October 09, 2018
KB4462919
Resolved
KB4471324
Resolved:
December 11, 2018 10:00 AM PT

Opened:
October 09, 2018 10:00 AM PT
Developer Tools (F12) fail to start in Microsoft Edge
Developer Tools (F12) may fail to start in Microsoft Edge.

Affected platforms:
  • Client: Windows 10, version 1803
  • Server: Windows Server, version 1803
 
Resolution: This issue is resolved in KB4467702

Back to top
OS Build 17134.376

October 24, 2018
KB4462933
Resolved
KB4467702
Resolved:
November 13, 2018 10:00 AM PT

Opened:
October 24, 2018 02:00 PM PT
Unable to use Seek bar in Windows Media Player
After installing KB4462919, users may not be able to use the Seek bar in Windows Media Player when playing specific files. This issue does not affect normal playback.

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 8.1; Windows 7, Service Pack 1
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2; Windows Server 2008 R2 SP1

Resolution: This issue is resolved in KB4471324

Back to top
OS Build 17134.345

October 09, 2018
KB4462919
Resolved
KB4471324
Resolved:
December 11, 2018
10:00 AM PT

Opened:
October 09, 2018
10:00 AM PT
Developer Tools (F12) fail to start in Microsoft Edge
Developer Tools (F12) may fail to start in Microsoft Edge.

Affected platforms:
  • Client: Windows 10, version 1803
  • Server: Windows Server, version 1803
 
Resolution: This issue is resolved in KB4467702

Back to top
OS Build 17134.376

October 24, 2018
KB4462933
Resolved
KB4467702
Resolved:
November 13, 2018
10:00 AM PT

Opened:
October 24, 2018
02:00 PM PT
" @@ -127,9 +127,9 @@ sections: - type: markdown text: " - - - + + +
DetailsAffected buildStatusHistory
SqlConnection instantiation exception on .NET 4.6 and later
After you install the August Preview of Quality Rollup or September 11, 2018 .NET Framework update, instantiation of SqlConnection can throw an exception.  

For more information about this issue, see the following article in the Microsoft Knowledge Base: 4470809, SqlConnection instantiation exception on .NET 4.6 and later after August-September 2018 .NET Framework updates.

Affected platforms:
  • Client: Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016
  • Server: Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016

Resolution: This issue is resolved in KB4480976

Back to top
OS Build 17134.285

September 11, 2018
KB4457128
Resolved
KB4480976
Resolved:
January 15, 2019 10:00 AM PT

Opened:
September 11, 2018 10:00 AM PT
Users cannot set Win32 program defaults
After installing KB4458469, some users cannot set Win32 program defaults for certain app and file type combinations using the Open with... command or Settings > Apps > Default apps
 
In some cases, Microsoft Notepad or other Win32 programs cannot be set as the default.

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803

Resolution: This issue is resolved in KB4467682

Back to top
OS Build 17134.320

September 26, 2018
KB4458469
Resolved
KB4467682
Resolved:
November 27, 2018 10:00 AM PT

Opened:
September 26, 2018 02:00 PM PT
Guest VMs running Unicast NLB fail to respond after restart
All guest virtual machines running Unicast NLB fail to respond to NLB requests after the virtual machines restart. 

Affected platforms:
  • Client: Windows 10, version 1803; Windows 10, version 1507
  • Server: Windows Server, version 1803
 
Resolution: This issue is resolved in KB4458469

Back to top
OS Build 17134.285

September 11, 2018
KB4457128
Resolved
KB4458469
Resolved:
September 20, 2018 10:00 AM PT

Opened:
September 11, 2018 10:00 AM PT
SqlConnection instantiation exception on .NET 4.6 and later
After you install the August Preview of Quality Rollup or September 11, 2018 .NET Framework update, instantiation of SqlConnection can throw an exception.  

For more information about this issue, see the following article in the Microsoft Knowledge Base: 4470809, SqlConnection instantiation exception on .NET 4.6 and later after August-September 2018 .NET Framework updates.

Affected platforms:
  • Client: Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016
  • Server: Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016

Resolution: This issue is resolved in KB4480976

Back to top
OS Build 17134.285

September 11, 2018
KB4457128
Resolved
KB4480976
Resolved:
January 15, 2019
10:00 AM PT

Opened:
September 11, 2018
10:00 AM PT
Users cannot set Win32 program defaults
After installing KB4458469, some users cannot set Win32 program defaults for certain app and file type combinations using the Open with... command or Settings > Apps > Default apps
 
In some cases, Microsoft Notepad or other Win32 programs cannot be set as the default.

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803

Resolution: This issue is resolved in KB4467682

Back to top
OS Build 17134.320

September 26, 2018
KB4458469
Resolved
KB4467682
Resolved:
November 27, 2018
10:00 AM PT

Opened:
September 26, 2018
02:00 PM PT
Guest VMs running Unicast NLB fail to respond after restart
All guest virtual machines running Unicast NLB fail to respond to NLB requests after the virtual machines restart. 

Affected platforms:
  • Client: Windows 10, version 1803; Windows 10, version 1507
  • Server: Windows Server, version 1803
 
Resolution: This issue is resolved in KB4458469

Back to top
OS Build 17134.285

September 11, 2018
KB4457128
Resolved
KB4458469
Resolved:
September 20, 2018
10:00 AM PT

Opened:
September 11, 2018
10:00 AM PT
" @@ -138,6 +138,6 @@ sections: - type: markdown text: " - +
DetailsAffected buildStatusHistory
Microsoft Intune takes a long time to deliver user profiles
After installing KB4457128, Windows no longer recognizes the Personal Information exchange (PFX) certificate that's used for authenticating to a Wi-Fi or VPN connection. As a result, Microsoft Intune takes a long time to deliver user profiles because it doesn't recognize that the required certificate is on the device. 

Affected platforms:
  • Client: Windows 10, version 1803
  • Server: Windows Server, version 1803
 
Resolution: This issue is resolved in KB4464218

Back to top
OS Build 17134.191

July 24, 2018
KB4340917
Resolved
KB4464218
Resolved:
September 17, 2018 10:00 AM PT

Opened:
July 24, 2018 10:00 AM PT
Microsoft Intune takes a long time to deliver user profiles
After installing KB4457128, Windows no longer recognizes the Personal Information exchange (PFX) certificate that's used for authenticating to a Wi-Fi or VPN connection. As a result, Microsoft Intune takes a long time to deliver user profiles because it doesn't recognize that the required certificate is on the device. 

Affected platforms:
  • Client: Windows 10, version 1803
  • Server: Windows Server, version 1803
 
Resolution: This issue is resolved in KB4464218

Back to top
OS Build 17134.191

July 24, 2018
KB4340917
Resolved
KB4464218
Resolved:
September 17, 2018
10:00 AM PT

Opened:
July 24, 2018
10:00 AM PT
" diff --git a/windows/release-information/resolved-issues-windows-10-1809-and-windows-server-2019.yml b/windows/release-information/resolved-issues-windows-10-1809-and-windows-server-2019.yml index 17abd10cce..7f2b797115 100644 --- a/windows/release-information/resolved-issues-windows-10-1809-and-windows-server-2019.yml +++ b/windows/release-information/resolved-issues-windows-10-1809-and-windows-server-2019.yml @@ -32,28 +32,28 @@ sections: - type: markdown text: " - - - - - - - - - - - - - - - - - - - - - - + + + + + + + + + + + + + + + + + + + + + +
SummaryOriginating updateStatusDate resolved
End-user-defined characters (EUDC) may cause blue screen at startup
If you enable per font end-user-defined characters (EUDC), the system may stop working and a blue screen may appear at startup.

See details >
OS Build 17763.404

April 02, 2019
KB4490481
Resolved
KB4493509
April 09, 2019 10:00 AM PT
Internet Explorer 11 authentication issue with multiple concurrent logons
Internet Explorer 11 users may encounter issues if two or more people use the same user account for multiple, concurrent login sessions on the same Windows Server machine.

See details >
OS Build 17763.253

January 08, 2019
KB4480116
Resolved
KB4493509
April 09, 2019 10:00 AM PT
MSXML6 may cause applications to stop responding
MSXML6 may cause applications to stop responding if an exception was thrown during node operations, such as appendChild(), insertBefore(), and moveNode().

See details >
OS Build 17763.253

January 08, 2019
KB4480116
Resolved
KB4493509
April 09, 2019 10:00 AM PT
Apps may stop working after selecting an audio output device other than the default
Users with multiple audio devices that select an audio output device different from the \"Default Audio Device\" may find certain applications stop working unexpectedly.

See details >
OS Build 17763.348

March 01, 2019
KB4482887
Resolved
KB4490481
April 02, 2019 10:00 AM PT
Error 1309 when installing/uninstalling MSI or MSP files
Users may receive \"Error 1309\" while installing or uninstalling certain types of MSI and MSP files.

See details >
OS Build 17763.316

February 12, 2019
KB4487044
Resolved
KB4489899
March 12, 2019 10:00 AM PT
Global DNS outage affects Windows Update customers
Windows Update customers were recently affected by a network infrastructure event caused by an external DNS service provider's global outage.

See details >
OS Build N/A

Resolved
March 08, 2019 11:15 AM PT
Internet Explorer may fail to load images
Internet Explorer may fail to load images with a backslash (\\) in their relative source path.

See details >
OS Build 17763.316

February 12, 2019
KB4487044
Resolved
KB4482887
March 01, 2019 10:00 AM PT
Applications using Microsoft Jet database and Access 95 file format stop working
Applications that use a Microsoft Jet database with the Microsoft Access 9 file format may randomly stop working.

See details >
OS Build 17763.316

February 12, 2019
KB4487044
Resolved
KB4482887
March 01, 2019 10:00 AM PT
First character of the Japanese era name not recognized
The first character of the Japanese era name is not recognized as an abbreviation and may cause date parsing issues.

See details >
OS Build 17763.316

February 12, 2019
KB4487044
Resolved
KB4482887
March 01, 2019 10:00 AM PT
Shared albums may not sync with iCloud for Windows
Upgrade block: Apple has identified an incompatibility with iCloud for Windows (version 7.7.0.27) where users may experience issues updating or synching Shared Albums.

See details >
OS Build 17763.134

November 13, 2018
KB4467708
Resolved
KB4482887
March 01, 2019 10:00 AM PT
Intel Audio Display (intcdaud.sys) notification during Windows 10 Setup
Upgrade block: Users may see an Intel Audio Display (intcdaud.sys) notification during setup for devices with certain Intel Display Audio Drivers.

See details >
OS Build 17763.134

November 13, 2018
KB4467708
Resolved
KB4482887
March 01, 2019 10:00 AM PT
F5 VPN clients losing network connectivity
Upgrade block: After updating to Window 10, version 1809, F5 VPN clients may lose network connectivity when the VPN service is in a split tunnel configuration.

See details >
OS Build 17763.134

November 13, 2018
KB4467708
Resolved
KB4482887
March 01, 2019 10:00 AM PT
Webpages become unresponsive in Microsoft Edge
Microsoft Edge users report difficulty browsing and loading webpages.

See details >
OS Build 17763.253

January 08, 2019
KB4480116
Resolved
KB4487044
February 12, 2019 10:00 AM PT
Issues with lock screen and Microsoft Edge tabs for certain AMD Radeon video cards
Upgrade block: Devices utilizing AMD Radeon HD2000 or HD4000 series video cards may experience issues with the lock screen and Microsoft Edge tabs.

See details >
OS Build 17763.134

November 13, 2018
KB4467708
Resolved
KB4487044
February 12, 2019 10:00 AM PT
Trend Micro OfficeScan and Worry-Free Business Security AV software not compatible
Upgrade block: Microsoft and Trend Micro identified a compatibility issue with the Trend Micro business endpoint security solutions OfficeScan and Worry-Free Business Security.

See details >
OS Build 17763.134

November 13, 2018
KB4467708
Resolved
February 01, 2019 09:00 AM PT
Unable to access hotspots with third-party applications
Third-party applications may have difficulty authenticating hotspots.

See details >
OS Build 17763.253

January 08, 2019
KB4480116
Resolved
KB4476976
January 22, 2019 02:00 PM PT
Unable to use Seek bar in Windows Media Player
Users may not be able to use the Seek bar in Windows Media Player when playing specific files.

See details >
OS Build 17763.55

October 09, 2018
KB4464330
Resolved
KB4471332
December 11, 2018 10:00 AM PT
Audio stops working after installing Intel audio driver
Upgrade block: Windows 10 audio stops working after installing Intel Smart Sound Technology driver (version 09.21.00.3755).

See details >
OS Build 17763.134

November 13, 2018
KB4467708
Resolved
KB4468550
December 07, 2018 10:00 AM PT
Office apps (32-bit) unable to use 'Save As…' function
Upgrade block: Devices using Morphisec Protector (or other application that uses the Morphisec SDK) may be unable to save documents when using 32-bit Microsoft Office apps.

See details >
OS Build 17763.134

November 13, 2018
KB4467708
Resolved
December 06, 2018 12:00 PM PT
Users cannot set Win32 program defaults
Some users cannot set Win32 program defaults for certain app and file type combinations.

See details >
OS Build 17763.55

October 09, 2018
KB4464330
Resolved
KB4469342
December 05, 2018 02:00 PM PT
Mapped drives fail to reconnect after login
Upgrade block: Mapped drives may fail to reconnect after booting and logging on to a Windows device.

See details >
OS Build 17763.134

November 13, 2018
KB4467708
Resolved
KB4469342
December 05, 2018 02:00 PM PT
Microsoft Edge may crash or hang while playing video
Following an nVidia driver update, Microsoft Edge may crash or hang while playing video.

See details >
OS Build 17763.165

December 05, 2018
KB4469342
Resolved
November 29, 2018 10:03 AM PT
End-user-defined characters (EUDC) may cause blue screen at startup
If you enable per font end-user-defined characters (EUDC), the system may stop working and a blue screen may appear at startup.

See details >
OS Build 17763.404

April 02, 2019
KB4490481
Resolved
KB4493509
April 09, 2019
10:00 AM PT
Internet Explorer 11 authentication issue with multiple concurrent logons
Internet Explorer 11 users may encounter issues if two or more people use the same user account for multiple, concurrent login sessions on the same Windows Server machine.

See details >
OS Build 17763.253

January 08, 2019
KB4480116
Resolved
KB4493509
April 09, 2019
10:00 AM PT
MSXML6 may cause applications to stop responding
MSXML6 may cause applications to stop responding if an exception was thrown during node operations, such as appendChild(), insertBefore(), and moveNode().

See details >
OS Build 17763.253

January 08, 2019
KB4480116
Resolved
KB4493509
April 09, 2019
10:00 AM PT
Apps may stop working after selecting an audio output device other than the default
Users with multiple audio devices that select an audio output device different from the \"Default Audio Device\" may find certain applications stop working unexpectedly.

See details >
OS Build 17763.348

March 01, 2019
KB4482887
Resolved
KB4490481
April 02, 2019
10:00 AM PT
Error 1309 when installing/uninstalling MSI or MSP files
Users may receive \"Error 1309\" while installing or uninstalling certain types of MSI and MSP files.

See details >
OS Build 17763.316

February 12, 2019
KB4487044
Resolved
KB4489899
March 12, 2019
10:00 AM PT
Global DNS outage affects Windows Update customers
Windows Update customers were recently affected by a network infrastructure event caused by an external DNS service provider's global outage.

See details >
N/A

Resolved
March 08, 2019
11:15 AM PT
Internet Explorer may fail to load images
Internet Explorer may fail to load images with a backslash (\\) in their relative source path.

See details >
OS Build 17763.316

February 12, 2019
KB4487044
Resolved
KB4482887
March 01, 2019
10:00 AM PT
Applications using Microsoft Jet database and Access 95 file format stop working
Applications that use a Microsoft Jet database with the Microsoft Access 9 file format may randomly stop working.

See details >
OS Build 17763.316

February 12, 2019
KB4487044
Resolved
KB4482887
March 01, 2019
10:00 AM PT
First character of the Japanese era name not recognized
The first character of the Japanese era name is not recognized as an abbreviation and may cause date parsing issues.

See details >
OS Build 17763.316

February 12, 2019
KB4487044
Resolved
KB4482887
March 01, 2019
10:00 AM PT
Shared albums may not sync with iCloud for Windows
Upgrade block: Apple has identified an incompatibility with iCloud for Windows (version 7.7.0.27) where users may experience issues updating or synching Shared Albums.

See details >
OS Build 17763.134

November 13, 2018
KB4467708
Resolved
KB4482887
March 01, 2019
10:00 AM PT
Intel Audio Display (intcdaud.sys) notification during Windows 10 Setup
Upgrade block: Users may see an Intel Audio Display (intcdaud.sys) notification during setup for devices with certain Intel Display Audio Drivers.

See details >
OS Build 17763.134

November 13, 2018
KB4467708
Resolved
KB4482887
March 01, 2019
10:00 AM PT
F5 VPN clients losing network connectivity
Upgrade block: After updating to Window 10, version 1809, F5 VPN clients may lose network connectivity when the VPN service is in a split tunnel configuration.

See details >
OS Build 17763.134

November 13, 2018
KB4467708
Resolved
KB4482887
March 01, 2019
10:00 AM PT
Webpages become unresponsive in Microsoft Edge
Microsoft Edge users report difficulty browsing and loading webpages.

See details >
OS Build 17763.253

January 08, 2019
KB4480116
Resolved
KB4487044
February 12, 2019
10:00 AM PT
Issues with lock screen and Microsoft Edge tabs for certain AMD Radeon video cards
Upgrade block: Devices utilizing AMD Radeon HD2000 or HD4000 series video cards may experience issues with the lock screen and Microsoft Edge tabs.

See details >
OS Build 17763.134

November 13, 2018
KB4467708
Resolved
KB4487044
February 12, 2019
10:00 AM PT
Trend Micro OfficeScan and Worry-Free Business Security AV software not compatible
Upgrade block: Microsoft and Trend Micro identified a compatibility issue with the Trend Micro business endpoint security solutions OfficeScan and Worry-Free Business Security.

See details >
OS Build 17763.134

November 13, 2018
KB4467708
Resolved
February 01, 2019
09:00 AM PT
Unable to access hotspots with third-party applications
Third-party applications may have difficulty authenticating hotspots.

See details >
OS Build 17763.253

January 08, 2019
KB4480116
Resolved
KB4476976
January 22, 2019
02:00 PM PT
Unable to use Seek bar in Windows Media Player
Users may not be able to use the Seek bar in Windows Media Player when playing specific files.

See details >
OS Build 17763.55

October 09, 2018
KB4464330
Resolved
KB4471332
December 11, 2018
10:00 AM PT
Audio stops working after installing Intel audio driver
Upgrade block: Windows 10 audio stops working after installing Intel Smart Sound Technology driver (version 09.21.00.3755).

See details >
OS Build 17763.134

November 13, 2018
KB4467708
Resolved
KB4468550
December 07, 2018
10:00 AM PT
Office apps (32-bit) unable to use 'Save As…' function
Upgrade block: Devices using Morphisec Protector (or other application that uses the Morphisec SDK) may be unable to save documents when using 32-bit Microsoft Office apps.

See details >
OS Build 17763.134

November 13, 2018
KB4467708
Resolved
December 06, 2018
12:00 PM PT
Users cannot set Win32 program defaults
Some users cannot set Win32 program defaults for certain app and file type combinations.

See details >
OS Build 17763.55

October 09, 2018
KB4464330
Resolved
KB4469342
December 05, 2018
02:00 PM PT
Mapped drives fail to reconnect after login
Upgrade block: Mapped drives may fail to reconnect after booting and logging on to a Windows device.

See details >
OS Build 17763.134

November 13, 2018
KB4467708
Resolved
KB4469342
December 05, 2018
02:00 PM PT
Microsoft Edge may crash or hang while playing video
Following an nVidia driver update, Microsoft Edge may crash or hang while playing video.

See details >
OS Build 17763.165

December 05, 2018
KB4469342
Resolved
November 29, 2018
10:03 AM PT
" @@ -69,7 +69,7 @@ sections: - type: markdown text: " - +
DetailsAffected buildStatusHistory
End-user-defined characters (EUDC) may cause blue screen at startup
If you enable per font end-user-defined characters (EUDC), the system will stop working and a blue screen may appear at startup. This is not a common setting in non-Asian regions.

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016

Workaround: To avoid this issue, don't enable per font EUDC. As an alternative, you can edit the registry to mitigate this issue; for more information, see KB4496149.

Resolved: This issue was resolved in KB4493509.

Back to top
OS Build 17763.404

April 02, 2019
KB4490481
Resolved
KB4493509
Resolved:
April 09, 2019 10:00 AM PT

Opened:
April 02, 2019 10:00 AM PT
End-user-defined characters (EUDC) may cause blue screen at startup
If you enable per font end-user-defined characters (EUDC), the system will stop working and a blue screen may appear at startup. This is not a common setting in non-Asian regions.

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016

Workaround: To avoid this issue, don't enable per font EUDC. As an alternative, you can edit the registry to mitigate this issue; for more information, see KB4496149.

Resolved: This issue was resolved in KB4493509.

Back to top
OS Build 17763.404

April 02, 2019
KB4490481
Resolved
KB4493509
Resolved:
April 09, 2019
10:00 AM PT

Opened:
April 02, 2019
10:00 AM PT
" @@ -78,7 +78,7 @@ sections: - type: markdown text: " - +
DetailsAffected buildStatusHistory
Apps may stop working after selecting an audio output device other than the default
After installing KB4482887 on machines that have multiple audio devices, applications that provide advanced options for internal or external audio output devices may stop working unexpectedly. This issue occurs for users that select an audio output device different from the \"Default Audio Device\". Examples of applications that may stop working include: 

  • Windows Media Player 
  • Realtek HD Audio Manager 
  • Sound Blaster Control Panel 

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019
  • Server: Windows Server, version 1809; Windows Server 2019

Workaround: As a temporary solution, select the \"Default Audio Device\" in the options provided by the application; please refer to the application's user manual for details. 
For example, to set the Default Audio Device in Windows Media Player: 

  1. Open Windows Media Player > Tools > Options > Devices.
  2. Select the device and choose Properties.
  3. On the next dialog, from the drop-down menu under Select the Audio Device, choose Default Audio Device from the list.
 
You can then send audio from the application to the audio device you want in the per-application audio settings found under Settings > System > Sound > App Volume and device preferences.

Resolved: This issue was resolved in KB4490481

Back to top
OS Build 17763.348

March 01, 2019
KB4482887
Resolved
KB4490481
Resolved:
April 02, 2019 10:00 AM PT

Opened:
March 01, 2019 10:00 AM PT
Apps may stop working after selecting an audio output device other than the default
After installing KB4482887 on machines that have multiple audio devices, applications that provide advanced options for internal or external audio output devices may stop working unexpectedly. This issue occurs for users that select an audio output device different from the \"Default Audio Device\". Examples of applications that may stop working include: 
  • Windows Media Player 
  • Realtek HD Audio Manager 
  • Sound Blaster Control Panel 

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019
  • Server: Windows Server, version 1809; Windows Server 2019

Workaround: As a temporary solution, select the \"Default Audio Device\" in the options provided by the application; please refer to the application's user manual for details. 
For example, to set the Default Audio Device in Windows Media Player: 
  1. Open Windows Media Player > Tools > Options > Devices.
  2. Select the device and choose Properties.
  3. On the next dialog, from the drop-down menu under Select the Audio Device, choose Default Audio Device from the list. 
You can then send audio from the application to the audio device you want in the per-application audio settings found under Settings > System > Sound > App Volume and device preferences.

Resolved: This issue was resolved in KB4490481

Back to top
OS Build 17763.348

March 01, 2019
KB4482887
Resolved
KB4490481
Resolved:
April 02, 2019
10:00 AM PT

Opened:
March 01, 2019
10:00 AM PT
" @@ -87,10 +87,10 @@ sections: - type: markdown text: " - - - - + + + +
DetailsAffected buildStatusHistory
Error 1309 when installing/uninstalling MSI or MSP files
After installing KB4487044, users may receive \"Error 1309\" while installing or uninstalling certain types of MSI and MSP files. 

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 8.1
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2

Resolution: This issue is resolved in KB4489899

Back to top
OS Build 17763.316

February 12, 2019
KB4487044
Resolved
KB4489899
Resolved:
March 12, 2019 10:00 AM PT

Opened:
February 12, 2019 10:00 AM PT
Internet Explorer may fail to load images
After installing KB4487044, Internet Explorer may fail to load images with a backslash (\\) in their relative source path.

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 8.1; Windows 7, Service Pack 1
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2; Windows Server 2008 R2 SP1

Resolution: This issue is resolved in KB4482887.

Back to top
OS Build 17763.316

February 12, 2019
KB4487044
Resolved
KB4482887
Resolved:
March 01, 2019 10:00 AM PT

Opened:
February 12, 2019 10:00 AM PT
Applications using Microsoft Jet database and Access 95 file format stop working
Applications that use a Microsoft Jet database with the Microsoft Access 95 file format may randomly stop working.

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 7, Service Pack 1
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2008 R2 SP1

Resolution: This issue is resolved in KB4482887.

Back to top
OS Build 17763.316

February 12, 2019
KB4487044
Resolved
KB4482887
Resolved:
March 01, 2019 10:00 AM PT

Opened:
February 12, 2019 10:00 AM PT
First character of the Japanese era name not recognized
After installing KB4487044, the first character of the Japanese era name is not recognized as an abbreviation and may cause date parsing issues. 

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 8.1; Windows 7, Service Pack 1
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2; Windows Server 2008 R2 SP1

Resolution: This issue is resolved in KB4482887

Back to top
OS Build 17763.316

February 12, 2019
KB4487044
Resolved
KB4482887
Resolved:
March 01, 2019 10:00 AM PT

Opened:
February 12, 2019 10:00 AM PT
Error 1309 when installing/uninstalling MSI or MSP files
After installing KB4487044, users may receive \"Error 1309\" while installing or uninstalling certain types of MSI and MSP files. 

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 8.1
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2

Resolution: This issue is resolved in KB4489899

Back to top
OS Build 17763.316

February 12, 2019
KB4487044
Resolved
KB4489899
Resolved:
March 12, 2019
10:00 AM PT

Opened:
February 12, 2019
10:00 AM PT
Internet Explorer may fail to load images
After installing KB4487044, Internet Explorer may fail to load images with a backslash (\\) in their relative source path.

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 8.1; Windows 7, Service Pack 1
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2; Windows Server 2008 R2 SP1

Resolution: This issue is resolved in KB4482887.

Back to top
OS Build 17763.316

February 12, 2019
KB4487044
Resolved
KB4482887
Resolved:
March 01, 2019
10:00 AM PT

Opened:
February 12, 2019
10:00 AM PT
Applications using Microsoft Jet database and Access 95 file format stop working
Applications that use a Microsoft Jet database with the Microsoft Access 95 file format may randomly stop working.

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 7, Service Pack 1
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2008 R2 SP1

Resolution: This issue is resolved in KB4482887.

Back to top
OS Build 17763.316

February 12, 2019
KB4487044
Resolved
KB4482887
Resolved:
March 01, 2019
10:00 AM PT

Opened:
February 12, 2019
10:00 AM PT
First character of the Japanese era name not recognized
After installing KB4487044, the first character of the Japanese era name is not recognized as an abbreviation and may cause date parsing issues. 

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 8.1; Windows 7, Service Pack 1
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2; Windows Server 2008 R2 SP1

Resolution: This issue is resolved in KB4482887

Back to top
OS Build 17763.316

February 12, 2019
KB4487044
Resolved
KB4482887
Resolved:
March 01, 2019
10:00 AM PT

Opened:
February 12, 2019
10:00 AM PT
" @@ -99,11 +99,11 @@ sections: - type: markdown text: " - - - - - + + + + +
DetailsAffected buildStatusHistory
Internet Explorer 11 authentication issue with multiple concurrent logons
After installing the February 12, 2019 update (KB4487044), Internet Explorer 11 and other applications that use WININET.DLL may have authentication issues. This occurs when two or more people use the same user account for multiple, concurrent login sessions on the same Windows Server machine, including Remote Desktop Protocol (RDP) and Terminal Server logons. Symptoms reported by customers include, but may not be limited to: 
 
  • Cache size and location show zero or empty. 
  • Keyboard shortcuts may not work properly. 
  • Webpages may intermittently fail to load or render correctly. 
  • Issues with credential prompts. 
  • Issues when downloading files. 

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10 Enterprise LTSC 2016; Windows 8.1; Windows 7, Service Pack 1
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server 2016; Windows Server 2012 R2; Windows Server 2008 R2 SP1
 
Resolved: This issue was resolved in KB4493509

Back to top
OS Build 17763.253

January 08, 2019
KB4480116
Resolved
KB4493509
Resolved:
April 09, 2019 10:00 AM PT

Opened:
January 08, 2019 10:00 AM PT
MSXML6 may cause applications to stop responding
After installing KB4480116, MSXML6 causes applications to stop responding if an exception was thrown during node operations, such as appendChild(), insertBefore(), and moveNode().
 
The Group Policy editor may stop responding when editing a Group Policy Object (GPO) that contains Group Policy Preferences (GPP) for Internet Explorer 10 settings. 

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 8.1
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2

Resolved: This issue was resolved in KB4493509

Back to top
OS Build 17763.253

January 08, 2019
KB4480116
Resolved
KB4493509
Resolved:
April 09, 2019 10:00 AM PT

Opened:
January 08, 2019 10:00 AM PT
Global DNS outage affects Windows Update customers
Windows Update customers were affected by a network infrastructure event on January 29, 2019 (21:00 UTC), caused by an external DNS service provider's global outage. A software update to the external provider's DNS servers resulted in the distribution of corrupted DNS records that affected connectivity to the Windows Update service. The DNS records were restored by January 30, 2019 (00:10 UTC), and the majority of local Internet Service Providers (ISP) have refreshed their DNS servers and customer services have been restored. 
 
Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019
  • Server: Windows Server, version 1809; Windows Server 2019

While this was not an issue with Microsoft's services, we take any service disruption for our customers seriously. We will work with partners to better understand this so we can provide higher quality service in the future even across diverse global network providers. 
 
If you are still unable to connect to Windows Update services due to this problem, please contact your local ISP or network administrator. You can also refer to our new KB4493784 for more information to determine if your network is affected, and to provide your local ISP or network administrator with additional information to assist you. 

Back to top
OS Build N/A

Resolved
Resolved:
March 08, 2019 11:15 AM PT

Opened:
January 29, 2019 02:00 PM PT
Webpages become unresponsive in Microsoft Edge
After installing KB4480116, some Microsoft Edge users report that they:
  • Cannot load webpages using a local IP address. 
  • Cannot load webpages on the Internet using a VPN connection.
Browsing fails or the webpage may become unresponsive.

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709

Resolution: This issue is resolved in KB4487044

Back to top
OS Build 17763.253

January 08, 2019
KB4480116
Resolved
KB4487044
Resolved:
February 12, 2019 10:00 AM PT

Opened:
January 08, 2019 10:00 AM PT
Unable to access hotspots with third-party applications
After installing KB4480116, third-party applications may have difficulty authenticating hotspots. 

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 8.1
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2

Resolution: This issue is resolved in KB4476976

Back to top
OS Build 17763.253

January 08, 2019
KB4480116
Resolved
KB4476976
Resolved:
January 22, 2019 02:00 PM PT

Opened:
January 08, 2019 10:00 AM PT
Internet Explorer 11 authentication issue with multiple concurrent logons
After installing the February 12, 2019 update (KB4487044), Internet Explorer 11 and other applications that use WININET.DLL may have authentication issues. This occurs when two or more people use the same user account for multiple, concurrent login sessions on the same Windows Server machine, including Remote Desktop Protocol (RDP) and Terminal Server logons. Symptoms reported by customers include, but may not be limited to:  
  • Cache size and location show zero or empty. 
  • Keyboard shortcuts may not work properly. 
  • Webpages may intermittently fail to load or render correctly. 
  • Issues with credential prompts. 
  • Issues when downloading files. 

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10 Enterprise LTSC 2016; Windows 8.1; Windows 7, Service Pack 1
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server 2016; Windows Server 2012 R2; Windows Server 2008 R2 SP1
 
Resolved: This issue was resolved in KB4493509

Back to top
OS Build 17763.253

January 08, 2019
KB4480116
Resolved
KB4493509
Resolved:
April 09, 2019
10:00 AM PT

Opened:
January 08, 2019
10:00 AM PT
MSXML6 may cause applications to stop responding
After installing KB4480116, MSXML6 causes applications to stop responding if an exception was thrown during node operations, such as appendChild(), insertBefore(), and moveNode().
 
The Group Policy editor may stop responding when editing a Group Policy Object (GPO) that contains Group Policy Preferences (GPP) for Internet Explorer 10 settings. 

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 8.1
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2

Resolved: This issue was resolved in KB4493509

Back to top
OS Build 17763.253

January 08, 2019
KB4480116
Resolved
KB4493509
Resolved:
April 09, 2019
10:00 AM PT

Opened:
January 08, 2019
10:00 AM PT
Global DNS outage affects Windows Update customers
Windows Update customers were affected by a network infrastructure event on January 29, 2019 (21:00 UTC), caused by an external DNS service provider's global outage. A software update to the external provider's DNS servers resulted in the distribution of corrupted DNS records that affected connectivity to the Windows Update service. The DNS records were restored by January 30, 2019 (00:10 UTC), and the majority of local Internet Service Providers (ISP) have refreshed their DNS servers and customer services have been restored. 
 
Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019
  • Server: Windows Server, version 1809; Windows Server 2019

While this was not an issue with Microsoft's services, we take any service disruption for our customers seriously. We will work with partners to better understand this so we can provide higher quality service in the future even across diverse global network providers. 
 
If you are still unable to connect to Windows Update services due to this problem, please contact your local ISP or network administrator. You can also refer to our new KB4493784 for more information to determine if your network is affected, and to provide your local ISP or network administrator with additional information to assist you. 

Back to top
N/A

Resolved
Resolved:
March 08, 2019
11:15 AM PT

Opened:
January 29, 2019
02:00 PM PT
Webpages become unresponsive in Microsoft Edge
After installing KB4480116, some Microsoft Edge users report that they:
  • Cannot load webpages using a local IP address. 
  • Cannot load webpages on the Internet using a VPN connection.
Browsing fails or the webpage may become unresponsive.

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709

Resolution: This issue is resolved in KB4487044

Back to top
OS Build 17763.253

January 08, 2019
KB4480116
Resolved
KB4487044
Resolved:
February 12, 2019
10:00 AM PT

Opened:
January 08, 2019
10:00 AM PT
Unable to access hotspots with third-party applications
After installing KB4480116, third-party applications may have difficulty authenticating hotspots. 

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 8.1
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2

Resolution: This issue is resolved in KB4476976

Back to top
OS Build 17763.253

January 08, 2019
KB4480116
Resolved
KB4476976
Resolved:
January 22, 2019
02:00 PM PT

Opened:
January 08, 2019
10:00 AM PT
" @@ -112,7 +112,7 @@ sections: - type: markdown text: " - +
DetailsAffected buildStatusHistory
Microsoft Edge may crash or hang while playing video
nVidia has notified Microsoft of an issue where Microsoft Edge may crash or hang while playing video. This issue occurs following an nVidia driver update.

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019
  • Server: Windows Server, version 1809; Windows Server 2019

Resolution: nVidia has released an updated driver to address this issue. Please follow the instructions found in nVidia's support article

Back to top
OS Build 17763.165

December 05, 2018
KB4469342
Resolved
Resolved:
November 29, 2018 10:03 AM PT

Opened:
December 05, 2018 02:00 PM PT
Microsoft Edge may crash or hang while playing video
nVidia has notified Microsoft of an issue where Microsoft Edge may crash or hang while playing video. This issue occurs following an nVidia driver update.

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019
  • Server: Windows Server, version 1809; Windows Server 2019

Resolution: nVidia has released an updated driver to address this issue. Please follow the instructions found in nVidia's support article

Back to top
OS Build 17763.165

December 05, 2018
KB4469342
Resolved
Resolved:
November 29, 2018
10:03 AM PT

Opened:
December 05, 2018
02:00 PM PT
" @@ -121,14 +121,14 @@ sections: - type: markdown text: " - - - - - - - - + + + + + + + +
DetailsAffected buildStatusHistory
Shared albums may not sync with iCloud for Windows
Upgrade block: Users who attempt to install iCloud for Windows (version 7.7.0.27) will see a message displayed that this version iCloud for Windows isn't supported and the install will fail.

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019
  • Server: Windows Server, version 1809; Windows Server 2019

To ensure a seamless experience, Microsoft is blocking devices with iCloud for Windows (version 7.7.0.27) software installed from being offered Window 10, version 1809 until this issue has been resolved. 

We recommend that you do not attempt to manually update using the Update now button or the Media Creation Tool from the Microsoft software download website until this issue is resolved. 
 
Resolution: Apple has released an updated version of iCloud for Windows (version 7.8.1) that resolves compatibility issues encountered when updating or synching Shared Albums after updating to Windows 10, version 1809. We recommend that you update your iCloud for Windows to version 7.8.1 when prompted before attempting to upgrade to Windows 10, version 1809. You can also manually download the latest version of iCloud for Windows by visiting https://support.apple.com/en-us/HT204283.

Back to top
OS Build 17763.134

November 13, 2018
KB4467708
Resolved
KB4482887
Resolved:
March 01, 2019 10:00 AM PT

Opened:
November 13, 2018 10:00 AM PT
Intel Audio Display (intcdaud.sys) notification during Windows 10 Setup
Upgrade block: Microsoft and Intel have identified a compatibility issue with a range of Intel Display Audio device drivers (intcdaud.sys, versions 10.25.0.3 - 10.25.0.8) that may result in excessive processor demand and reduced battery life. As a result, the update process to the Windows 10 October 2018 Update (Windows 10, version 1809) will fail and affected devices will automatically revert to the previous working configuration. 

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019
  • Server: Windows Server, version 1809; Windows Server 2019

If you see a \"What needs your attention\" notification during installation of the October 2018 Update, you have one of these affected drivers on your system. On the notification, click Back to remain on your current version of Windows 10. 
 
To ensure a seamless experience, we are blocking devices from being offered the October 2018 Update until updated Intel device drivers are installed on your current operating system. We recommend that you do not attempt to manually update to Windows 10, version 1809, using the Update Now button or the Media Creation Tool from the Microsoft Software Download Center until newer Intel device drivers are available with the update. You can either wait for newer drivers to be installed automatically through Windows Update or check with your computer manufacturer for the latest device driver software availability and installation procedures. For more information about this issue, see Intel's customer support guidance.
 
Resolution: This issue was resolved in KB4482887 and the upgrade block removed. 

Back to top
OS Build 17763.134

November 13, 2018
KB4467708
Resolved
KB4482887
Resolved:
March 01, 2019 10:00 AM PT

Opened:
November 13, 2018 10:00 AM PT
F5 VPN clients losing network connectivity
Upgrade block: After updating to Window 10, version 1809, F5 VPN clients may lose network connectivity when the VPN service is in a split tunnel configuration.

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019
  • Server: Windows Server, version 1809; Windows Server 2019

Resolution: This issue was resolved in KB4482887 and the upgrade block removed. 

Back to top
OS Build 17763.134

November 13, 2018
KB4467708
Resolved
KB4482887
Resolved:
March 01, 2019 10:00 AM PT

Opened:
November 13, 2018 10:00 AM PT
Issues with lock screen and Microsoft Edge tabs for certain AMD Radeon video cards
Note: AMD no longer supports Radeon HD2000 and HD4000 series graphic processor units (GPUs).
 
Upgrade block: After updating to Window 10, version 1809, Microsoft Edge tabs may stop working when a device is configured with AMD Radeon HD2000 or HD4000 series video cards. Customers may get the following error code: \"INVALID_POINTER_READ_c0000005_atidxx64.dll\". 
 
Some users may also experience performance issues with the lock screen or the ShellExperienceHost. (The lock screen hosts widgets, and the ShellExperienceHost is responsible for assorted shell functionality.) 

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019
  • Server: Windows Server, version 1809; Windows Server 2019

Resolution: This issue was resolved in KB4487044, and the block was removed.

Back to top
OS Build 17763.134

November 13, 2018
KB4467708
Resolved
KB4487044
Resolved:
February 12, 2019 10:00 AM PT

Opened:
November 13, 2018 10:00 AM PT
Trend Micro OfficeScan and Worry-Free Business Security AV software not compatible
Upgrade block: Microsoft and Trend Micro have identified a compatibility issue with Trend Micro's OfficeScan and Worry-Free Business Security software when attempting to update to Windows 10, version 1809.

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019
  • Server: Windows Server, version 1809; Windows Server 2019 

Resolution: Trend Micro has released a new version of these products that resolves the issue. To download them, please visit the Trend Micro Business Support Portal.

Once you have updated your version of Trend Micro's OfficeScan or Worry-Free Business Security software, you will be offered Windows 10, version 1809 automatically. 

Back to top
OS Build 17763.134

November 13, 2018
KB4467708
Resolved
Resolved:
February 01, 2019 09:00 AM PT

Opened:
November 13, 2018 10:00 AM PT
Audio stops working after installing Intel audio driver
Upgrade block: Intel unintentionally released version 9.21.00.3755 of the Intel Smart Sound Technology (ISST) Driver through Windows Update and inadvertently offered it to a range of devices running Window 10, version 1709, 1803, and 1809. If a device contained a compatible audio driver, the new driver overrode it and caused audio to stop working.

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019
  • Server: Windows Server, version 1809; Windows Server 2019
 
Resolution: This issue was resolved in KB4468550 and the upgrade block removed. 

Back to top
OS Build 17763.134

November 13, 2018
KB4467708
Resolved
KB4468550
Resolved:
December 07, 2018 10:00 AM PT

Opened:
November 13, 2018 10:00 AM PT
Office apps (32-bit) unable to use 'Save As…' function
Upgrade block: Microsoft and Morphisec have identified an issue on devices that have installed Morphisec Protector or another application that uses the Morphisec Software Development Kit (SDK) including Cisco AMP for Endpoints. These applications may impact customers' ability to use the 'Save As.'dialog when saving documents in 32-bit versions of Microsoft Office applications. Saving of files is not impacted.

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019
  • Server: Windows Server, version 1809; Windows Server 2019

Resolution: Morphisec and Cisco have released updated versions of their applications to address this issue. We recommend customers update to these minimum versions before attempting to attempting to upgrade to Windows 10, version 1809: 

  • Morphisec Protector version 2.4.8 
  • Cisco AMP for Endpoints version 6.2.3.10814 

An upgrade block remains in place for earlier versions of the applications than those listed above.

Back to top
OS Build 17763.134

November 13, 2018
KB4467708
Resolved
Resolved:
December 06, 2018 12:00 PM PT

Opened:
November 13, 2018 10:00 AM PT
Mapped drives fail to reconnect after login
Upgrade block: Network drives may fail to reconnect after booting and logging on to a Windows device. Symptoms include: 
 
  • In Windows Explorer, a red X appears on the mapped network drives. 
  • Mapped network drives show as Unavailable when you run the net use command from a command prompt. 
  • In the notification area, a notification displays the following message, \"Could not reconnect all network drives.\"

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019
  • Server: Windows Server, version 1809; Windows Server 2019

Resolution: This issue was resolved in KB4469342 and the upgrade block removed. 

Back to top
OS Build 17763.134

November 13, 2018
KB4467708
Resolved
KB4469342
Resolved:
December 05, 2018 02:00 PM PT

Opened:
November 13, 2018 10:00 AM PT
Shared albums may not sync with iCloud for Windows
Upgrade block: Users who attempt to install iCloud for Windows (version 7.7.0.27) will see a message displayed that this version iCloud for Windows isn't supported and the install will fail.

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019
  • Server: Windows Server, version 1809; Windows Server 2019

To ensure a seamless experience, Microsoft is blocking devices with iCloud for Windows (version 7.7.0.27) software installed from being offered Window 10, version 1809 until this issue has been resolved. 

We recommend that you do not attempt to manually update using the Update now button or the Media Creation Tool from the Microsoft software download website until this issue is resolved. 
 
Resolution: Apple has released an updated version of iCloud for Windows (version 7.8.1) that resolves compatibility issues encountered when updating or synching Shared Albums after updating to Windows 10, version 1809. We recommend that you update your iCloud for Windows to version 7.8.1 when prompted before attempting to upgrade to Windows 10, version 1809. You can also manually download the latest version of iCloud for Windows by visiting https://support.apple.com/en-us/HT204283.

Back to top
OS Build 17763.134

November 13, 2018
KB4467708
Resolved
KB4482887
Resolved:
March 01, 2019
10:00 AM PT

Opened:
November 13, 2018
10:00 AM PT
Intel Audio Display (intcdaud.sys) notification during Windows 10 Setup
Upgrade block: Microsoft and Intel have identified a compatibility issue with a range of Intel Display Audio device drivers (intcdaud.sys, versions 10.25.0.3 - 10.25.0.8) that may result in excessive processor demand and reduced battery life. As a result, the update process to the Windows 10 October 2018 Update (Windows 10, version 1809) will fail and affected devices will automatically revert to the previous working configuration. 

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019
  • Server: Windows Server, version 1809; Windows Server 2019

If you see a \"What needs your attention\" notification during installation of the October 2018 Update, you have one of these affected drivers on your system. On the notification, click Back to remain on your current version of Windows 10. 
 
To ensure a seamless experience, we are blocking devices from being offered the October 2018 Update until updated Intel device drivers are installed on your current operating system. We recommend that you do not attempt to manually update to Windows 10, version 1809, using the Update Now button or the Media Creation Tool from the Microsoft Software Download Center until newer Intel device drivers are available with the update. You can either wait for newer drivers to be installed automatically through Windows Update or check with your computer manufacturer for the latest device driver software availability and installation procedures. For more information about this issue, see Intel's customer support guidance.
 
Resolution: This issue was resolved in KB4482887 and the upgrade block removed. 

Back to top
OS Build 17763.134

November 13, 2018
KB4467708
Resolved
KB4482887
Resolved:
March 01, 2019
10:00 AM PT

Opened:
November 13, 2018
10:00 AM PT
F5 VPN clients losing network connectivity
Upgrade block: After updating to Window 10, version 1809, F5 VPN clients may lose network connectivity when the VPN service is in a split tunnel configuration.

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019
  • Server: Windows Server, version 1809; Windows Server 2019

Resolution: This issue was resolved in KB4482887 and the upgrade block removed. 

Back to top
OS Build 17763.134

November 13, 2018
KB4467708
Resolved
KB4482887
Resolved:
March 01, 2019
10:00 AM PT

Opened:
November 13, 2018
10:00 AM PT
Issues with lock screen and Microsoft Edge tabs for certain AMD Radeon video cards
Note: AMD no longer supports Radeon HD2000 and HD4000 series graphic processor units (GPUs).
 
Upgrade block: After updating to Window 10, version 1809, Microsoft Edge tabs may stop working when a device is configured with AMD Radeon HD2000 or HD4000 series video cards. Customers may get the following error code: \"INVALID_POINTER_READ_c0000005_atidxx64.dll\". 
 
Some users may also experience performance issues with the lock screen or the ShellExperienceHost. (The lock screen hosts widgets, and the ShellExperienceHost is responsible for assorted shell functionality.) 

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019
  • Server: Windows Server, version 1809; Windows Server 2019

Resolution: This issue was resolved in KB4487044, and the block was removed.

Back to top
OS Build 17763.134

November 13, 2018
KB4467708
Resolved
KB4487044
Resolved:
February 12, 2019
10:00 AM PT

Opened:
November 13, 2018
10:00 AM PT
Trend Micro OfficeScan and Worry-Free Business Security AV software not compatible
Upgrade block: Microsoft and Trend Micro have identified a compatibility issue with Trend Micro's OfficeScan and Worry-Free Business Security software when attempting to update to Windows 10, version 1809.

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019
  • Server: Windows Server, version 1809; Windows Server 2019 

Resolution: Trend Micro has released a new version of these products that resolves the issue. To download them, please visit the Trend Micro Business Support Portal.

Once you have updated your version of Trend Micro's OfficeScan or Worry-Free Business Security software, you will be offered Windows 10, version 1809 automatically. 

Back to top
OS Build 17763.134

November 13, 2018
KB4467708
Resolved
Resolved:
February 01, 2019
09:00 AM PT

Opened:
November 13, 2018
10:00 AM PT
Audio stops working after installing Intel audio driver
Upgrade block: Intel unintentionally released version 9.21.00.3755 of the Intel Smart Sound Technology (ISST) Driver through Windows Update and inadvertently offered it to a range of devices running Window 10, version 1709, 1803, and 1809. If a device contained a compatible audio driver, the new driver overrode it and caused audio to stop working.

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019
  • Server: Windows Server, version 1809; Windows Server 2019
 
Resolution: This issue was resolved in KB4468550 and the upgrade block removed. 

Back to top
OS Build 17763.134

November 13, 2018
KB4467708
Resolved
KB4468550
Resolved:
December 07, 2018
10:00 AM PT

Opened:
November 13, 2018
10:00 AM PT
Office apps (32-bit) unable to use 'Save As…' function
Upgrade block: Microsoft and Morphisec have identified an issue on devices that have installed Morphisec Protector or another application that uses the Morphisec Software Development Kit (SDK) including Cisco AMP for Endpoints. These applications may impact customers' ability to use the 'Save As.'dialog when saving documents in 32-bit versions of Microsoft Office applications. Saving of files is not impacted.

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019
  • Server: Windows Server, version 1809; Windows Server 2019

Resolution: Morphisec and Cisco have released updated versions of their applications to address this issue. We recommend customers update to these minimum versions before attempting to attempting to upgrade to Windows 10, version 1809:
  • Morphisec Protector version 2.4.8 
  • Cisco AMP for Endpoints version 6.2.3.10814

An upgrade block remains in place for earlier versions of the applications than those listed above.

Back to top
OS Build 17763.134

November 13, 2018
KB4467708
Resolved
Resolved:
December 06, 2018
12:00 PM PT

Opened:
November 13, 2018
10:00 AM PT
Mapped drives fail to reconnect after login
Upgrade block: Network drives may fail to reconnect after booting and logging on to a Windows device. Symptoms include:  
  • In Windows Explorer, a red X appears on the mapped network drives. 
  • Mapped network drives show as Unavailable when you run the net use command from a command prompt. 
  • In the notification area, a notification displays the following message, \"Could not reconnect all network drives.\"

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019
  • Server: Windows Server, version 1809; Windows Server 2019

Resolution: This issue was resolved in KB4469342 and the upgrade block removed. 

Back to top
OS Build 17763.134

November 13, 2018
KB4467708
Resolved
KB4469342
Resolved:
December 05, 2018
02:00 PM PT

Opened:
November 13, 2018
10:00 AM PT
" @@ -137,7 +137,7 @@ sections: - type: markdown text: " - - + +
DetailsAffected buildStatusHistory
Unable to use Seek bar in Windows Media Player
After installing KB4464330, users may not be able to use the Seek bar in Windows Media Player when playing specific files. This issue does not affect normal playback. 

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 8.1; Windows 7, Service Pack 1
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2; Windows Server 2008 R2 SP1

Resolution: This issue is resolved in KB4471332

Back to top
OS Build 17763.55

October 09, 2018
KB4464330
Resolved
KB4471332
Resolved:
December 11, 2018 10:00 AM PT

Opened:
October 09, 2018 10:00 AM PT
Users cannot set Win32 program defaults
After installing KB4464330, some users cannot set Win32 program defaults for certain app and file type combinations using the Open with... command or Settings > Apps > Default apps.
 
In some cases, Microsoft Notepad or other Win32 programs cannot be set as the default. 

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803

Resolution: This issue is resolved in KB4469342

Back to top
OS Build 17763.55

October 09, 2018
KB4464330
Resolved
KB4469342
Resolved:
December 05, 2018 02:00 PM PT

Opened:
October 09, 2018 10:00 AM PT
Unable to use Seek bar in Windows Media Player
After installing KB4464330, users may not be able to use the Seek bar in Windows Media Player when playing specific files. This issue does not affect normal playback. 

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 8.1; Windows 7, Service Pack 1
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2; Windows Server 2008 R2 SP1

Resolution: This issue is resolved in KB4471332

Back to top
OS Build 17763.55

October 09, 2018
KB4464330
Resolved
KB4471332
Resolved:
December 11, 2018
10:00 AM PT

Opened:
October 09, 2018
10:00 AM PT
Users cannot set Win32 program defaults
After installing KB4464330, some users cannot set Win32 program defaults for certain app and file type combinations using the Open with... command or Settings > Apps > Default apps.
 
In some cases, Microsoft Notepad or other Win32 programs cannot be set as the default. 

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803

Resolution: This issue is resolved in KB4469342

Back to top
OS Build 17763.55

October 09, 2018
KB4464330
Resolved
KB4469342
Resolved:
December 05, 2018
02:00 PM PT

Opened:
October 09, 2018
10:00 AM PT
" diff --git a/windows/release-information/resolved-issues-windows-7-and-windows-server-2008-r2-sp1.yml b/windows/release-information/resolved-issues-windows-7-and-windows-server-2008-r2-sp1.yml index b52524a3f1..56ce7a94dd 100644 --- a/windows/release-information/resolved-issues-windows-7-and-windows-server-2008-r2-sp1.yml +++ b/windows/release-information/resolved-issues-windows-7-and-windows-server-2008-r2-sp1.yml @@ -32,18 +32,18 @@ sections: - type: markdown text: " - - - - - - - - - - - - + + + + + + + + + + + +
SummaryOriginating updateStatusDate resolved
Virtual machines fail to restore.
Virtual machines (VMs) may fail to restore successfully if the VM has been saved and restored once before.

See details >
January 08, 2019
KB4480970
Resolved
KB4490511
April 21, 2019 12:00 AM PT
Local Administrators unable to remotely access shares.
Local users who are part of the local Administrators group may not be able to remotely access shares on Windows Server 2008 R2 and Windows 7 machines.

See details >
January 08, 2019
KB4480970
Resolved
KB4487345
April 20, 2019 11:53 PM PT
Internet Explorer 11 authentication issue with multiple concurrent logons.
Internet Explorer 11 users may encounter issues if two or more people use the same user account for multiple, concurrent login sessions on the same Windows Server machine.

See details >
January 08, 2019
KB4480970
Resolved
KB4493472
April 09, 2019 10:00 AM PT
Custom URI schemes may not start corresponding application.
Custom URI schemes for application protocol handlers may not start the corresponding application for local intranet and trusted sites in Internet Explorer.

See details >
March 12, 2019
KB4489878
Resolved
KB4493472
April 09, 2019 10:00 AM PT
NETDOM.EXE fails to run.
NETDOM.EXE fails to run and the error, “The command failed to complete successfully.” appears on screen.

See details >
March 12, 2019
KB4489878
Resolved
KB4493472
April 09, 2019 10:00 AM PT
Devices may not respond at login or Welcome screen if running certain Avast software.
Devices running Avast for Business, Avast CloudCare, and AVG Business Edition antivirus software may become unresponsive after restart.

See details >
April 09, 2019
KB4493472
Resolved
April 09, 2019 10:00 AM PT
Event Viewer may not show some event descriptions for network interface cards.
The Event Viewer may not show some event descriptions for network interface cards (NIC).

See details >
October 18, 2018
KB4462927
Resolved
KB4489878
March 12, 2019 10:00 AM PT
First character of the Japanese era name not recognized as an abbreviation.
The first character of the Japanese era name is not recognized as an abbreviation and may cause date parsing issues.

See details >
January 17, 2019
KB4480955
Resolved
KB4486565
February 19, 2019 02:00 PM PT
Internet Explorer may fail to load images.
Internet Explorer may fail to load images with a backslash (\\) in their relative source path.

See details >
February 12, 2019
KB4486563
Resolved
KB4486565
February 19, 2019 02:00 PM PT
Applications using Microsoft Jet database and Access 95 file format stop working.
Applications that use a Microsoft Jet database with the Microsoft Access 95 file format may randomly stop working.

See details >
February 12, 2019
KB4486563
Resolved
KB4486565
February 19, 2019 02:00 PM PT
Applications using Microsoft Jet database fail to open.
Applications that use a Microsoft Jet database with the Microsoft Access 97 file format may fail to open if column names are greater than 32 characters.

See details >
January 08, 2019
KB4480970
Resolved
KB4486563
February 12, 2019 10:00 AM PT
Unable to use Seek bar in Windows Media Player
Users may not be able to use the Seek bar in Windows Media Player when playing specific files.

See details >
October 09, 2018
KB4462923
Resolved
KB4471318
December 11, 2018 10:00 AM PT
Virtual machines fail to restore.
Virtual machines (VMs) may fail to restore successfully if the VM has been saved and restored once before.

See details >
January 08, 2019
KB4480970
Resolved
KB4490511
April 21, 2019
12:00 AM PT
Local Administrators unable to remotely access shares.
Local users who are part of the local Administrators group may not be able to remotely access shares on Windows Server 2008 R2 and Windows 7 machines.

See details >
January 08, 2019
KB4480970
Resolved
KB4487345
April 20, 2019
11:53 PM PT
Internet Explorer 11 authentication issue with multiple concurrent logons.
Internet Explorer 11 users may encounter issues if two or more people use the same user account for multiple, concurrent login sessions on the same Windows Server machine.

See details >
January 08, 2019
KB4480970
Resolved
KB4493472
April 09, 2019
10:00 AM PT
Custom URI schemes may not start corresponding application.
Custom URI schemes for application protocol handlers may not start the corresponding application for local intranet and trusted sites in Internet Explorer.

See details >
March 12, 2019
KB4489878
Resolved
KB4493472
April 09, 2019
10:00 AM PT
NETDOM.EXE fails to run.
NETDOM.EXE fails to run and the error, “The command failed to complete successfully.” appears on screen.

See details >
March 12, 2019
KB4489878
Resolved
KB4493472
April 09, 2019
10:00 AM PT
Devices may not respond at login or Welcome screen if running certain Avast software.
Devices running Avast for Business, Avast CloudCare, and AVG Business Edition antivirus software may become unresponsive after restart.

See details >
April 09, 2019
KB4493472
Resolved
April 09, 2019
10:00 AM PT
Event Viewer may not show some event descriptions for network interface cards.
The Event Viewer may not show some event descriptions for network interface cards (NIC).

See details >
October 18, 2018
KB4462927
Resolved
KB4489878
March 12, 2019
10:00 AM PT
First character of the Japanese era name not recognized as an abbreviation.
The first character of the Japanese era name is not recognized as an abbreviation and may cause date parsing issues.

See details >
January 17, 2019
KB4480955
Resolved
KB4486565
February 19, 2019
02:00 PM PT
Internet Explorer may fail to load images.
Internet Explorer may fail to load images with a backslash (\\) in their relative source path.

See details >
February 12, 2019
KB4486563
Resolved
KB4486565
February 19, 2019
02:00 PM PT
Applications using Microsoft Jet database and Access 95 file format stop working.
Applications that use a Microsoft Jet database with the Microsoft Access 95 file format may randomly stop working.

See details >
February 12, 2019
KB4486563
Resolved
KB4486565
February 19, 2019
02:00 PM PT
Applications using Microsoft Jet database fail to open.
Applications that use a Microsoft Jet database with the Microsoft Access 97 file format may fail to open if column names are greater than 32 characters.

See details >
January 08, 2019
KB4480970
Resolved
KB4486563
February 12, 2019
10:00 AM PT
Unable to use Seek bar in Windows Media Player
Users may not be able to use the Seek bar in Windows Media Player when playing specific files.

See details >
October 09, 2018
KB4462923
Resolved
KB4471318
December 11, 2018
10:00 AM PT
" @@ -59,7 +59,7 @@ sections: - type: markdown text: " - +
DetailsAffected buildStatusHistory
Devices may not respond at login or Welcome screen if running certain Avast software.
Microsoft and Avast have identified an issue on devices running Avast for Business, Avast CloudCare, and AVG Business Edition antivirus software after you install KB4493472 and restart. Devices may become unresponsive at the login or Welcome screen. Additionally, you may be unable to log in or log in after an extended period of time.

Affected platforms: 
  • Client: Windows 8.1; Windows 7, Service Pack 1 
  • Server: Windows Server 2012 R2; Windows Server 2008 R2 SP1 

Resolution: Avast has released emergency updates to address this issue. For more information and AV update schedule, see the Avast support KB article.

Back to top
April 09, 2019
KB4493472
Resolved
Resolved:
April 09, 2019 10:00 AM PT

Opened:
April 09, 2019 10:00 AM PT
Devices may not respond at login or Welcome screen if running certain Avast software.
Microsoft and Avast have identified an issue on devices running Avast for Business, Avast CloudCare, and AVG Business Edition antivirus software after you install KB4493472 and restart. Devices may become unresponsive at the login or Welcome screen. Additionally, you may be unable to log in or log in after an extended period of time.

Affected platforms: 
  • Client: Windows 8.1; Windows 7, Service Pack 1 
  • Server: Windows Server 2012 R2; Windows Server 2008 R2 SP1 

Resolution: Avast has released emergency updates to address this issue. For more information and AV update schedule, see the Avast support KB article.

Back to top
April 09, 2019
KB4493472
Resolved
Resolved:
April 09, 2019
10:00 AM PT

Opened:
April 09, 2019
10:00 AM PT
" @@ -68,8 +68,8 @@ sections: - type: markdown text: " - - + +
DetailsAffected buildStatusHistory
Custom URI schemes may not start corresponding application.
After installing KB4489878, custom URI schemes for application protocol handlers may not start the corresponding application for local intranet and trusted sites on Internet Explorer.

Affected platforms: 
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 8.1; Windows 7, Service Pack 1 
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2; Windows Server 2008 R2 SP1 

Resolution: This issue is resolved in KB4493472.

Back to top
March 12, 2019
KB4489878
Resolved
KB4493472
Resolved:
April 09, 2019 10:00 AM PT

Opened:
March 12, 2019 10:00 AM PT
NETDOM.EXE fails to run.
After installing KB4489878, NETDOM.EXE fails to run, and the on-screen error, “The command failed to complete successfully.” appears.

Affected platforms: 
  • Client: Windows 7, Service Pack 1 
  • Server: Windows Server 2008 R2 SP1 

Resolution: This issue is resolved in KB4493472.

Back to top
March 12, 2019
KB4489878
Resolved
KB4493472
Resolved:
April 09, 2019 10:00 AM PT

Opened:
March 12, 2019 10:00 AM PT
Custom URI schemes may not start corresponding application.
After installing KB4489878, custom URI schemes for application protocol handlers may not start the corresponding application for local intranet and trusted sites on Internet Explorer.

Affected platforms: 
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 8.1; Windows 7, Service Pack 1 
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2; Windows Server 2008 R2 SP1 

Resolution: This issue is resolved in KB4493472.

Back to top
March 12, 2019
KB4489878
Resolved
KB4493472
Resolved:
April 09, 2019
10:00 AM PT

Opened:
March 12, 2019
10:00 AM PT
NETDOM.EXE fails to run.
After installing KB4489878, NETDOM.EXE fails to run, and the on-screen error, “The command failed to complete successfully.” appears.

Affected platforms: 
  • Client: Windows 7, Service Pack 1 
  • Server: Windows Server 2008 R2 SP1 

Resolution: This issue is resolved in KB4493472.

Back to top
March 12, 2019
KB4489878
Resolved
KB4493472
Resolved:
April 09, 2019
10:00 AM PT

Opened:
March 12, 2019
10:00 AM PT
" @@ -78,8 +78,8 @@ sections: - type: markdown text: " - - + +
DetailsAffected buildStatusHistory
Internet Explorer may fail to load images.
After installing KB4486563, Internet Explorer may fail to load images with a backslash (\\) in their relative source path.

Affected platforms: 
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 8.1; Windows 7, Service Pack 1 
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2; Windows Server 2008 R2 SP1 

Resolution: This issue is resolved in KB4486565.

Back to top
February 12, 2019
KB4486563
Resolved
KB4486565
Resolved:
February 19, 2019 02:00 PM PT

Opened:
February 12, 2019 10:00 AM PT
Applications using Microsoft Jet database and Access 95 file format stop working.
Applications that use a Microsoft Jet database with the Microsoft Access 95 file format may randomly stop working.

Affected platforms: 
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 7, Service Pack 1 
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2008 R2 SP1 

Resolution: This issue is resolved in KB4486565.

Back to top
February 12, 2019
KB4486563
Resolved
KB4486565
Resolved:
February 19, 2019 02:00 PM PT

Opened:
February 12, 2019 10:00 AM PT
Internet Explorer may fail to load images.
After installing KB4486563, Internet Explorer may fail to load images with a backslash (\\) in their relative source path.

Affected platforms: 
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 8.1; Windows 7, Service Pack 1 
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2; Windows Server 2008 R2 SP1 

Resolution: This issue is resolved in KB4486565.

Back to top
February 12, 2019
KB4486563
Resolved
KB4486565
Resolved:
February 19, 2019
02:00 PM PT

Opened:
February 12, 2019
10:00 AM PT
Applications using Microsoft Jet database and Access 95 file format stop working.
Applications that use a Microsoft Jet database with the Microsoft Access 95 file format may randomly stop working.

Affected platforms: 
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 7, Service Pack 1 
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2008 R2 SP1 

Resolution: This issue is resolved in KB4486565.

Back to top
February 12, 2019
KB4486563
Resolved
KB4486565
Resolved:
February 19, 2019
02:00 PM PT

Opened:
February 12, 2019
10:00 AM PT
" @@ -88,11 +88,11 @@ sections: - type: markdown text: " - - - - - + + + + +
DetailsAffected buildStatusHistory
Virtual machines fail to restore.
After installing KB4480970, virtual machines (VM) may fail to restore successfully if the VM has been saved and restored once before. The error message is, “Failed to restore the virtual machine state: Cannot restore this virtual machine because the saved state data cannot be read. Delete the saved state data and then try to start the virtual machine. (0xC0370027).”

This affects AMD Bulldozer Family 15h, AMD Jaguar Family 16h, and AMD Puma Family 16h (second generation) microarchitectures.

Affected platforms: 
  • Client: Windows 7, Service Pack 1 
  • Server: Windows Server 2008 R2 SP1 

Resolution: This issue is resolved in KB4490511.

Back to top
January 08, 2019
KB4480970
Resolved
KB4490511
Resolved:
February 19, 2019 02:00 PM PT

Opened:
January 08, 2019 10:00 AM PT
Local Administrators unable to remotely access shares.
Local users who are part of the local Administrators group may not be able to remotely access shares on Windows Server 2008 R2 and Windows 7 machines after installing KB4480970. This does not affect domain accounts in the local Administrators group.
 
Affected platforms: 
  • Client: Windows 7, Service Pack 1 
  • Server: Windows Server 2008 R2 SP1 

Resolution: This issue is resolved in KB4487345.

Back to top
January 08, 2019
KB4480970
Resolved
KB4487345
Resolved:
January 11, 2019 02:00 PM PT

Opened:
January 08, 2019 10:00 AM PT
Internet Explorer 11 authentication issue with multiple concurrent logons.
After installing KB4480970, Internet Explorer 11 and other applications that use WININET.DLL may have authentication issues. This occurs when two or more people use the same user account for multiple, concurrent login sessions on the same Windows Server machine, including Remote Desktop Protocol (RDP) and Terminal Server logons. Symptoms reported by customers include, but may not be limited to:

  • Cache size and location show zero or empty.
  • Keyboard shortcuts may not work properly.
  • Webpages may intermittently fail to load or render correctly.
  • Issues with credential prompts.
  • Issues when downloading files.

Affected platforms: 
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10 Enterprise LTSC 2016; Windows 8.1; Windows 7, Service Pack 1 
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server 2016; Windows Server 2012 R2; Windows Server 2008 R2 SP1 

Resolution: This issue is resolved in KB4493472.

Back to top
January 08, 2019
KB4480970
Resolved
KB4493472
Resolved:
April 09, 2019 10:00 AM PT

Opened:
January 08, 2019 10:00 AM PT
First character of the Japanese era name not recognized as an abbreviation.
After installing KB4480955, the first character of the Japanese era name is not recognized as an abbreviation and may cause date parsing issues.

Affected platforms: 
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 8.1; Windows 7, Service Pack 1 
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2; Windows Server 2008 R2 SP1 

Resolution: This issue is resolved in KB4486565.

Back to top
January 17, 2019
KB4480955
Resolved
KB4486565
Resolved:
February 19, 2019 02:00 PM PT

Opened:
January 17, 2019 10:00 AM PT
Applications using Microsoft Jet database fail to open.
Applications that use a Microsoft Jet database with the Microsoft Access 97 file format may fail to open if the database has column names greater than 32 characters. The database will fail to open with the error, “Unrecognized Database Format”.

Affected Platforms:
  • Client: Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 8.1; Windows 7, Service Pack 1 
  • Server: Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2; Windows Server 2008 R2 SP1 


Resolution: This issue is resolved in KB4486563.

Back to top
January 08, 2019
KB4480970
Resolved
KB4486563
Resolved:
February 12, 2019 10:00 AM PT

Opened:
January 08, 2019 10:00 AM PT
Virtual machines fail to restore.
After installing KB4480970, virtual machines (VM) may fail to restore successfully if the VM has been saved and restored once before. The error message is, “Failed to restore the virtual machine state: Cannot restore this virtual machine because the saved state data cannot be read. Delete the saved state data and then try to start the virtual machine. (0xC0370027).”

This affects AMD Bulldozer Family 15h, AMD Jaguar Family 16h, and AMD Puma Family 16h (second generation) microarchitectures.

Affected platforms: 
  • Client: Windows 7, Service Pack 1 
  • Server: Windows Server 2008 R2 SP1 

Resolution: This issue is resolved in KB4490511.

Back to top
January 08, 2019
KB4480970
Resolved
KB4490511
Resolved:
February 19, 2019
02:00 PM PT

Opened:
January 08, 2019
10:00 AM PT
Local Administrators unable to remotely access shares.
Local users who are part of the local Administrators group may not be able to remotely access shares on Windows Server 2008 R2 and Windows 7 machines after installing KB4480970. This does not affect domain accounts in the local Administrators group.
 
Affected platforms: 
  • Client: Windows 7, Service Pack 1 
  • Server: Windows Server 2008 R2 SP1 

Resolution: This issue is resolved in KB4487345.

Back to top
January 08, 2019
KB4480970
Resolved
KB4487345
Resolved:
January 11, 2019
02:00 PM PT

Opened:
January 08, 2019
10:00 AM PT
Internet Explorer 11 authentication issue with multiple concurrent logons.
After installing KB4480970, Internet Explorer 11 and other applications that use WININET.DLL may have authentication issues. This occurs when two or more people use the same user account for multiple, concurrent login sessions on the same Windows Server machine, including Remote Desktop Protocol (RDP) and Terminal Server logons. Symptoms reported by customers include, but may not be limited to:
  • Cache size and location show zero or empty.
  • Keyboard shortcuts may not work properly.
  • Webpages may intermittently fail to load or render correctly.
  • Issues with credential prompts.
  • Issues when downloading files.

Affected platforms: 
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10 Enterprise LTSC 2016; Windows 8.1; Windows 7, Service Pack 1 
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server 2016; Windows Server 2012 R2; Windows Server 2008 R2 SP1 

Resolution: This issue is resolved in KB4493472.

Back to top
January 08, 2019
KB4480970
Resolved
KB4493472
Resolved:
April 09, 2019
10:00 AM PT

Opened:
January 08, 2019
10:00 AM PT
First character of the Japanese era name not recognized as an abbreviation.
After installing KB4480955, the first character of the Japanese era name is not recognized as an abbreviation and may cause date parsing issues.

Affected platforms: 
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 8.1; Windows 7, Service Pack 1 
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2; Windows Server 2008 R2 SP1 

Resolution: This issue is resolved in KB4486565.

Back to top
January 17, 2019
KB4480955
Resolved
KB4486565
Resolved:
February 19, 2019
02:00 PM PT

Opened:
January 17, 2019
10:00 AM PT
Applications using Microsoft Jet database fail to open.
Applications that use a Microsoft Jet database with the Microsoft Access 97 file format may fail to open if the database has column names greater than 32 characters. The database will fail to open with the error, “Unrecognized Database Format”.

Affected Platforms:
  • Client: Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 8.1; Windows 7, Service Pack 1 
  • Server: Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2; Windows Server 2008 R2 SP1 


Resolution: This issue is resolved in KB4486563.

Back to top
January 08, 2019
KB4480970
Resolved
KB4486563
Resolved:
February 12, 2019
10:00 AM PT

Opened:
January 08, 2019
10:00 AM PT
" @@ -101,7 +101,7 @@ sections: - type: markdown text: " - - + +
DetailsAffected buildStatusHistory
Event Viewer may not show some event descriptions for network interface cards.
After installing KB4462927, the Event Viewer may not show some event descriptions for network interface cards (NICs).

Affected Platforms:
  • Client: Windows 7, Service Pack 1 
  • Server: Windows Server 2008 R2 SP1 

Resolution: This issue is resolved in KB4489878.

Back to top
October 18, 2018
KB4462927
Resolved
KB4489878
Resolved:
March 12, 2019 10:00 AM PT

Opened:
October 18, 2018 10:00 AM PT
Unable to use Seek bar in Windows Media Player
After installing KB4462923, users may not be able to use the Seek Bar in Windows Media Player when playing specific files. This issue does not affect normal playback.

Affected platforms: 
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 8.1; Windows 7, Service Pack 1.
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2; Windows Server 2008 R2 SP1

Resolution: This issue is resolved in KB4471318.

Back to top
October 09, 2018
KB4462923
Resolved
KB4471318
Resolved:
December 11, 2018 10:00 AM PT

Opened:
October 09, 2018 10:00 AM PT
Event Viewer may not show some event descriptions for network interface cards.
After installing KB4462927, the Event Viewer may not show some event descriptions for network interface cards (NICs).

Affected Platforms:
  • Client: Windows 7, Service Pack 1 
  • Server: Windows Server 2008 R2 SP1 

Resolution: This issue is resolved in KB4489878.

Back to top
October 18, 2018
KB4462927
Resolved
KB4489878
Resolved:
March 12, 2019
10:00 AM PT

Opened:
October 18, 2018
10:00 AM PT
Unable to use Seek bar in Windows Media Player
After installing KB4462923, users may not be able to use the Seek Bar in Windows Media Player when playing specific files. This issue does not affect normal playback.

Affected platforms: 
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 8.1; Windows 7, Service Pack 1.
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2; Windows Server 2008 R2 SP1

Resolution: This issue is resolved in KB4471318.

Back to top
October 09, 2018
KB4462923
Resolved
KB4471318
Resolved:
December 11, 2018
10:00 AM PT

Opened:
October 09, 2018
10:00 AM PT
" diff --git a/windows/release-information/resolved-issues-windows-8.1-and-windows-server-2012-r2.yml b/windows/release-information/resolved-issues-windows-8.1-and-windows-server-2012-r2.yml index 70e61c4227..ea34024180 100644 --- a/windows/release-information/resolved-issues-windows-8.1-and-windows-server-2012-r2.yml +++ b/windows/release-information/resolved-issues-windows-8.1-and-windows-server-2012-r2.yml @@ -32,19 +32,19 @@ sections: - type: markdown text: " - - - - - - - - - - - - - + + + + + + + + + + + + +
SummaryOriginating updateStatusDate resolved
Internet Explorer 11 authentication issue with multiple concurrent logons
Internet Explorer 11 users may encounter issues if two or more people use the same user account for multiple, concurrent login sessions on the same Windows Server machine.

See details >
January 08, 2019
KB4480963
Resolved
KB4493446
April 09, 2019 10:00 AM PT
MSXML6 may cause applications to stop responding.
MSXML6 may cause applications to stop responding if an exception was thrown during node operations, such as appendChild(), insertBefore(), and moveNode().

See details >
January 08, 2019
KB4480963
Resolved
KB4493446
April 09, 2019 10:00 AM PT
Custom URI schemes may not start corresponding application
Custom URI schemes for application protocol handlers may not start the corresponding application for local intranet and trusted sites in Internet Explorer.

See details >
March 12, 2019
KB4489881
Resolved
KB4493446
April 09, 2019 10:00 AM PT
Devices may not respond at login or Welcome screen if running certain Avast software
Devices running Avast for Business, Avast CloudCare, and AVG Business Edition antivirus software may become unresponsive after restart.

See details >
April 09, 2019
KB4493446
Resolved
April 09, 2019 10:00 AM PT
Embedded objects may display incorrectly
Any compound document (OLE) server application that places embedded objects into the Windows Metafile (WMF) using the PatBlt API may display embedded objects incorrectly.

See details >
February 12, 2019
KB4487000
Resolved
KB4493446
April 09, 2019 10:00 AM PT
Devices with winsock kernel client may receive error
Devices with a winsock kernel client may receive D1, FC, and other errors.

See details >
March 12, 2019
KB4489881
Resolved
KB4489893
March 19, 2019 10:00 AM PT
Error 1309 when installing/uninstalling MSI or MSP files
Users may receive “Error 1309” while installing or uninstalling certain types of MSI and MSP files.

See details >
February 19, 2019
KB4487016
Resolved
KB4489881
March 12, 2019 10:00 AM PT
First character of the Japanese era name not recognized as an abbreviation
The first character of the Japanese era name is not recognized as an abbreviation and may cause date parsing issues.

See details >
January 15, 2019
KB4480969
Resolved
KB4487016
February 19, 2019 02:00 PM PT
Internet Explorer may fail to load images
Internet Explorer may fail to load images with a backslash (\\) in their relative source path.

See details >
February 12, 2019
KB4487000
Resolved
KB4487016
February 19, 2019 02:00 PM PT
Virtual machines fail to restore
Virtual machines (VMs) may fail to restore successfully if the VM has been saved and restored once before.

See details >
January 08, 2019
KB4480963
Resolved
KB4490512
February 19, 2019 10:00 AM PT
Applications using Microsoft Jet database fail to open
Applications that use a Microsoft Jet database with the Microsoft Access 97 file format may fail to open if column names are greater than 32 characters.

See details >
January 08, 2019
KB4480963
Resolved
KB4487000
February 12, 2019 10:00 AM PT
Unable to access hotspots with third-party applications
Third-party applications may have difficulty authenticating hotspots.

See details >
January 08, 2019
KB4480963
Resolved
KB4480969
January 15, 2019 10:00 AM PT
Unable to use Seek bar in Windows Media Player
Users may not be able to use the Seek bar in Windows Media Player when playing specific files.

See details >
October 09, 2018
KB4462926
Resolved
KB4471320
December 11, 2018 10:00 AM PT
Internet Explorer 11 authentication issue with multiple concurrent logons
Internet Explorer 11 users may encounter issues if two or more people use the same user account for multiple, concurrent login sessions on the same Windows Server machine.

See details >
January 08, 2019
KB4480963
Resolved
KB4493446
April 09, 2019
10:00 AM PT
MSXML6 may cause applications to stop responding.
MSXML6 may cause applications to stop responding if an exception was thrown during node operations, such as appendChild(), insertBefore(), and moveNode().

See details >
January 08, 2019
KB4480963
Resolved
KB4493446
April 09, 2019
10:00 AM PT
Custom URI schemes may not start corresponding application
Custom URI schemes for application protocol handlers may not start the corresponding application for local intranet and trusted sites in Internet Explorer.

See details >
March 12, 2019
KB4489881
Resolved
KB4493446
April 09, 2019
10:00 AM PT
Devices may not respond at login or Welcome screen if running certain Avast software
Devices running Avast for Business, Avast CloudCare, and AVG Business Edition antivirus software may become unresponsive after restart.

See details >
April 09, 2019
KB4493446
Resolved
April 09, 2019
10:00 AM PT
Embedded objects may display incorrectly
Any compound document (OLE) server application that places embedded objects into the Windows Metafile (WMF) using the PatBlt API may display embedded objects incorrectly.

See details >
February 12, 2019
KB4487000
Resolved
KB4493446
April 09, 2019
10:00 AM PT
Devices with winsock kernel client may receive error
Devices with a winsock kernel client may receive D1, FC, and other errors.

See details >
March 12, 2019
KB4489881
Resolved
KB4489893
March 19, 2019
10:00 AM PT
Error 1309 when installing/uninstalling MSI or MSP files
Users may receive “Error 1309” while installing or uninstalling certain types of MSI and MSP files.

See details >
February 19, 2019
KB4487016
Resolved
KB4489881
March 12, 2019
10:00 AM PT
First character of the Japanese era name not recognized as an abbreviation
The first character of the Japanese era name is not recognized as an abbreviation and may cause date parsing issues.

See details >
January 15, 2019
KB4480969
Resolved
KB4487016
February 19, 2019
02:00 PM PT
Internet Explorer may fail to load images
Internet Explorer may fail to load images with a backslash (\\) in their relative source path.

See details >
February 12, 2019
KB4487000
Resolved
KB4487016
February 19, 2019
02:00 PM PT
Virtual machines fail to restore
Virtual machines (VMs) may fail to restore successfully if the VM has been saved and restored once before.

See details >
January 08, 2019
KB4480963
Resolved
KB4490512
February 19, 2019
10:00 AM PT
Applications using Microsoft Jet database fail to open
Applications that use a Microsoft Jet database with the Microsoft Access 97 file format may fail to open if column names are greater than 32 characters.

See details >
January 08, 2019
KB4480963
Resolved
KB4487000
February 12, 2019
10:00 AM PT
Unable to access hotspots with third-party applications
Third-party applications may have difficulty authenticating hotspots.

See details >
January 08, 2019
KB4480963
Resolved
KB4480969
January 15, 2019
10:00 AM PT
Unable to use Seek bar in Windows Media Player
Users may not be able to use the Seek bar in Windows Media Player when playing specific files.

See details >
October 09, 2018
KB4462926
Resolved
KB4471320
December 11, 2018
10:00 AM PT
" @@ -60,7 +60,7 @@ sections: - type: markdown text: " - +
DetailsAffected buildStatusHistory
Devices may not respond at login or Welcome screen if running certain Avast software
Microsoft and Avast have identified an issue on devices running Avast for Business, Avast CloudCare, and AVG Business Edition antivirus software after you install KB4493446 and restart. Devices may become unresponsive at the login or Welcome screen. Additionally, you may be unable to log in or log in after an extended period of time.

Affected platforms: 
  • Client: Windows 8.1; Windows 7, Service Pack 1 
  • Server: Windows Server 2012 R2; Windows Server 2008 R2 SP1 


Resolution: Avast has released emergency updates to address this issue. For more information and AV update schedule, see the Avast support KB article.

Back to top
April 09, 2019
KB4493446
Resolved
Resolved:
April 09, 2019 10:00 AM PT

Opened:
April 09, 2019 10:00 AM PT
Devices may not respond at login or Welcome screen if running certain Avast software
Microsoft and Avast have identified an issue on devices running Avast for Business, Avast CloudCare, and AVG Business Edition antivirus software after you install KB4493446 and restart. Devices may become unresponsive at the login or Welcome screen. Additionally, you may be unable to log in or log in after an extended period of time.

Affected platforms: 
  • Client: Windows 8.1; Windows 7, Service Pack 1 
  • Server: Windows Server 2012 R2; Windows Server 2008 R2 SP1 


Resolution: Avast has released emergency updates to address this issue. For more information and AV update schedule, see the Avast support KB article.

Back to top
April 09, 2019
KB4493446
Resolved
Resolved:
April 09, 2019
10:00 AM PT

Opened:
April 09, 2019
10:00 AM PT
" @@ -69,8 +69,8 @@ sections: - type: markdown text: " - - + +
DetailsAffected buildStatusHistory
Custom URI schemes may not start corresponding application
After installing KB4489881, custom URI schemes for application protocol handlers may not start the corresponding application for local intranet and trusted sites security zones on Internet Explorer.

Affected platforms: 
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 8.1; Windows 7, Service Pack 1 
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2; Windows Server 2008 R2 SP1 

Resolution: This issue is resolved in KB4493446.

Back to top
March 12, 2019
KB4489881
Resolved
KB4493446
Resolved:
April 09, 2019 10:00 AM PT

Opened:
March 12, 2019 10:00 AM PT
Devices with winsock kernel client may receive error
After installing KB4489881, devices with a winsock kernel client may receive D1, FC, and other errors. Additionally, systems that run the Skype for Business or Lync Server Edge Transport role may be affected by this issue.

Affected platforms: 
  • Client: Windows 8.1 
  • Server: Windows Server 2012 R2 

Resolution: This issue is resolved in KB4489893.

Back to top
March 12, 2019
KB4489881
Resolved
KB4489893
Resolved:
March 19, 2019 10:00 AM PT

Opened:
March 12, 2019 10:00 AM PT
Custom URI schemes may not start corresponding application
After installing KB4489881, custom URI schemes for application protocol handlers may not start the corresponding application for local intranet and trusted sites security zones on Internet Explorer.

Affected platforms: 
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 8.1; Windows 7, Service Pack 1 
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2; Windows Server 2008 R2 SP1 

Resolution: This issue is resolved in KB4493446.

Back to top
March 12, 2019
KB4489881
Resolved
KB4493446
Resolved:
April 09, 2019
10:00 AM PT

Opened:
March 12, 2019
10:00 AM PT
Devices with winsock kernel client may receive error
After installing KB4489881, devices with a winsock kernel client may receive D1, FC, and other errors. Additionally, systems that run the Skype for Business or Lync Server Edge Transport role may be affected by this issue.

Affected platforms: 
  • Client: Windows 8.1 
  • Server: Windows Server 2012 R2 

Resolution: This issue is resolved in KB4489893.

Back to top
March 12, 2019
KB4489881
Resolved
KB4489893
Resolved:
March 19, 2019
10:00 AM PT

Opened:
March 12, 2019
10:00 AM PT
" @@ -79,9 +79,9 @@ sections: - type: markdown text: " - - - + + +
DetailsAffected buildStatusHistory
Embedded objects may display incorrectly
Any compound document (OLE) server application that places embedded objects into the Windows Metafile (WMF) using the PatBlt API may display embedded objects incorrectly.

For example, if you paste a Microsoft Excel worksheet object into a Microsoft Word document, the cells may render with a different background color.

Affected platforms: 
  • Client: Windows 8.1 
  • Server: Windows Server 2012 R2 

Resolution: This issue is resolved in KB4493446.

Back to top
February 12, 2019
KB4487000
Resolved
KB4493446
Resolved:
April 09, 2019 10:00 AM PT

Opened:
February 12, 2019 10:00 AM PT
Error 1309 when installing/uninstalling MSI or MSP files
After installing KB4487016, users may receive “Error 1309” while installing or uninstalling certain types of MSI and MSP files.

Affected platforms: 
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 8.1 
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2 

Resolution: This issue is resolved in KB4489881.

Back to top
February 19, 2019
KB4487016
Resolved
KB4489881
Resolved:
March 12, 2019 10:00 AM PT

Opened:
February 19, 2019 02:00 PM PT
Internet Explorer may fail to load images
After installing KB4487000, Internet Explorer may fail to load images with a backslash (\\) in their relative source path.

Affected platforms: 
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 8.1; Windows 7, Service Pack 1 
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2; Windows Server 2008 R2 SP1 

Resolution: This issue is resolved in KB4487016.

Back to top
February 12, 2019
KB4487000
Resolved
KB4487016
Resolved:
February 19, 2019 02:00 PM PT

Opened:
February 12, 2019 10:00 AM PT
Embedded objects may display incorrectly
Any compound document (OLE) server application that places embedded objects into the Windows Metafile (WMF) using the PatBlt API may display embedded objects incorrectly.

For example, if you paste a Microsoft Excel worksheet object into a Microsoft Word document, the cells may render with a different background color.

Affected platforms: 
  • Client: Windows 8.1 
  • Server: Windows Server 2012 R2 

Resolution: This issue is resolved in KB4493446.

Back to top
February 12, 2019
KB4487000
Resolved
KB4493446
Resolved:
April 09, 2019
10:00 AM PT

Opened:
February 12, 2019
10:00 AM PT
Error 1309 when installing/uninstalling MSI or MSP files
After installing KB4487016, users may receive “Error 1309” while installing or uninstalling certain types of MSI and MSP files.

Affected platforms: 
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 8.1 
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2 

Resolution: This issue is resolved in KB4489881.

Back to top
February 19, 2019
KB4487016
Resolved
KB4489881
Resolved:
March 12, 2019
10:00 AM PT

Opened:
February 19, 2019
02:00 PM PT
Internet Explorer may fail to load images
After installing KB4487000, Internet Explorer may fail to load images with a backslash (\\) in their relative source path.

Affected platforms: 
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 8.1; Windows 7, Service Pack 1 
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2; Windows Server 2008 R2 SP1 

Resolution: This issue is resolved in KB4487016.

Back to top
February 12, 2019
KB4487000
Resolved
KB4487016
Resolved:
February 19, 2019
02:00 PM PT

Opened:
February 12, 2019
10:00 AM PT
" @@ -90,12 +90,12 @@ sections: - type: markdown text: " - - - - - - + + + + + +
DetailsAffected buildStatusHistory
Internet Explorer 11 authentication issue with multiple concurrent logons
After installing KB4480963, Internet Explorer 11 and other applications that use WININET.DLL may have authentication issues. This occurs when two or more people use the same user account for multiple, concurrent login sessions on the same Windows Server machine, including Remote Desktop Protocol (RDP) and Terminal Server logons. Symptoms reported by customers include, but may not be limited to:

  • Cache size and location show zero or empty.
  • Keyboard shortcuts may not work properly.
  • Webpages may intermittently fail to load or render correctly.
  • Issues with credential prompts.
  • Issues when downloading files.

Affected platforms: 
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10 Enterprise LTSC 2016; Windows 8.1; Windows 7, Service Pack 1 
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server 2016; Windows Server 2012 R2; Windows Server 2008 R2 SP1 

Resolution: This issue is resolved in KB4493446.


Back to top
January 08, 2019
KB4480963
Resolved
KB4493446
Resolved:
April 09, 2019 10:00 AM PT

Opened:
January 08, 2019 10:00 AM PT
MSXML6 may cause applications to stop responding.
After installing KB4480963, MSXML6 causes applications to stop responding if an exception was thrown during node operations, such as appendChild(), insertBefore(), and moveNode().

The Group Policy editor may stop responding when editing a Group Policy Object (GPO) that contains Group Policy Preferences (GPP) for Internet Explorer 10 settings.

Resolution: This issue is resolved in KB4493446.

Back to top
January 08, 2019
KB4480963
Resolved
KB4493446
Resolved:
April 09, 2019 10:00 AM PT

Opened:
January 08, 2019 10:00 AM PT
First character of the Japanese era name not recognized as an abbreviation
After installing KB4480969, the first character of the Japanese era name is not recognized as an abbreviation and may cause date parsing issues.

Affected platforms: 
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 8.1; Windows 7, Service Pack 1 
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2; Windows Server 2008 R2 SP1 

Resolution: This issue is resolved in KB4487016.

Back to top
January 15, 2019
KB4480969
Resolved
KB4487016
Resolved:
February 19, 2019 02:00 PM PT

Opened:
January 15, 2019 10:00 AM PT
Virtual machines fail to restore
After installing KB4480963, virtual machines (VM) may fail to restore successfully if the VM has been saved and restored once before. The error message is, “Failed to restore the virtual machine state: Cannot restore this virtual machine because the saved state data cannot be read. Delete the saved state data and then try to start the virtual machine. (0xC0370027).”

This affects AMD Bulldozer Family 15h, AMD Jaguar Family 16h, and AMD Puma Family 16h (second generation) microarchitectures.

Resolution: This issue is resolved in KB4490512.

Back to top
January 08, 2019
KB4480963
Resolved
KB4490512
Resolved:
February 19, 2019 02:00 PM PT

Opened:
January 08, 2019 10:00 AM PT
Applications using Microsoft Jet database fail to open
Applications that use a Microsoft Jet database with the Microsoft Access 97 file format may fail to open if the database has column names greater than 32 characters. The database will fail to open with the error, “Unrecognized Database Format”.

Affected platforms: 
  • Client: Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 8.1; Windows 7, Service Pack 1 
  • Server: Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2; Windows Server 2008 R2 SP1 

Resolution: This issue is resolved in KB4487000.

Back to top
January 08, 2019
KB4480963
Resolved
KB4487000
Resolved:
February 12, 2019 10:00 AM PT

Opened:
January 08, 2019 10:00 AM PT
Unable to access hotspots with third-party applications
After installing KB4480963, third-party applications may have difficulty authenticating hotspots.

Affected platforms: 
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 8.1 
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2 

Resolution: This issue is resolved in KB4480969.

Back to top
January 08, 2019
KB4480963
Resolved
KB4480969
Resolved:
January 15, 2019 10:00 AM PT

Opened:
January 08, 2019 10:00 AM PT
Internet Explorer 11 authentication issue with multiple concurrent logons
After installing KB4480963, Internet Explorer 11 and other applications that use WININET.DLL may have authentication issues. This occurs when two or more people use the same user account for multiple, concurrent login sessions on the same Windows Server machine, including Remote Desktop Protocol (RDP) and Terminal Server logons. Symptoms reported by customers include, but may not be limited to:
  • Cache size and location show zero or empty.
  • Keyboard shortcuts may not work properly.
  • Webpages may intermittently fail to load or render correctly.
  • Issues with credential prompts.
  • Issues when downloading files.

Affected platforms: 
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10 Enterprise LTSC 2016; Windows 8.1; Windows 7, Service Pack 1 
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server 2016; Windows Server 2012 R2; Windows Server 2008 R2 SP1 

Resolution: This issue is resolved in KB4493446.

Back to top
January 08, 2019
KB4480963
Resolved
KB4493446
Resolved:
April 09, 2019
10:00 AM PT

Opened:
January 08, 2019
10:00 AM PT
MSXML6 may cause applications to stop responding.
After installing KB4480963, MSXML6 causes applications to stop responding if an exception was thrown during node operations, such as appendChild(), insertBefore(), and moveNode().

The Group Policy editor may stop responding when editing a Group Policy Object (GPO) that contains Group Policy Preferences (GPP) for Internet Explorer 10 settings.

Resolution: This issue is resolved in KB4493446.

Back to top
January 08, 2019
KB4480963
Resolved
KB4493446
Resolved:
April 09, 2019
10:00 AM PT

Opened:
January 08, 2019
10:00 AM PT
First character of the Japanese era name not recognized as an abbreviation
After installing KB4480969, the first character of the Japanese era name is not recognized as an abbreviation and may cause date parsing issues.

Affected platforms: 
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 8.1; Windows 7, Service Pack 1 
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2; Windows Server 2008 R2 SP1 

Resolution: This issue is resolved in KB4487016.

Back to top
January 15, 2019
KB4480969
Resolved
KB4487016
Resolved:
February 19, 2019
02:00 PM PT

Opened:
January 15, 2019
10:00 AM PT
Virtual machines fail to restore
After installing KB4480963, virtual machines (VM) may fail to restore successfully if the VM has been saved and restored once before. The error message is, “Failed to restore the virtual machine state: Cannot restore this virtual machine because the saved state data cannot be read. Delete the saved state data and then try to start the virtual machine. (0xC0370027).”

This affects AMD Bulldozer Family 15h, AMD Jaguar Family 16h, and AMD Puma Family 16h (second generation) microarchitectures.

Resolution: This issue is resolved in KB4490512.

Back to top
January 08, 2019
KB4480963
Resolved
KB4490512
Resolved:
February 19, 2019
02:00 PM PT

Opened:
January 08, 2019
10:00 AM PT
Applications using Microsoft Jet database fail to open
Applications that use a Microsoft Jet database with the Microsoft Access 97 file format may fail to open if the database has column names greater than 32 characters. The database will fail to open with the error, “Unrecognized Database Format”.

Affected platforms: 
  • Client: Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 8.1; Windows 7, Service Pack 1 
  • Server: Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2; Windows Server 2008 R2 SP1 

Resolution: This issue is resolved in KB4487000.

Back to top
January 08, 2019
KB4480963
Resolved
KB4487000
Resolved:
February 12, 2019
10:00 AM PT

Opened:
January 08, 2019
10:00 AM PT
Unable to access hotspots with third-party applications
After installing KB4480963, third-party applications may have difficulty authenticating hotspots.

Affected platforms: 
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 8.1 
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2 

Resolution: This issue is resolved in KB4480969.

Back to top
January 08, 2019
KB4480963
Resolved
KB4480969
Resolved:
January 15, 2019
10:00 AM PT

Opened:
January 08, 2019
10:00 AM PT
" @@ -104,6 +104,6 @@ sections: - type: markdown text: " - +
DetailsAffected buildStatusHistory
Unable to use Seek bar in Windows Media Player
After installing KB4462926, users may not be able to use the Seek Bar in Windows Media Player when playing specific files. This issue does not affect normal playback.

Affected platforms: 
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 8.1; Windows 7, Service Pack 1 
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2; Windows Server 2008 R2 SP1 

Resolution: This issue is resolved in KB4471320.

Back to top
October 09, 2018
KB4462926
Resolved
KB4471320
Resolved:
December 11, 2018 10:00 AM PT

Opened:
October 09, 2018 10:00 AM PT
Unable to use Seek bar in Windows Media Player
After installing KB4462926, users may not be able to use the Seek Bar in Windows Media Player when playing specific files. This issue does not affect normal playback.

Affected platforms: 
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 8.1; Windows 7, Service Pack 1 
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2; Windows Server 2008 R2 SP1 

Resolution: This issue is resolved in KB4471320.

Back to top
October 09, 2018
KB4462926
Resolved
KB4471320
Resolved:
December 11, 2018
10:00 AM PT

Opened:
October 09, 2018
10:00 AM PT
" diff --git a/windows/release-information/resolved-issues-windows-server-2008-sp2.yml b/windows/release-information/resolved-issues-windows-server-2008-sp2.yml index 5f282702bb..1b9ea0be8e 100644 --- a/windows/release-information/resolved-issues-windows-server-2008-sp2.yml +++ b/windows/release-information/resolved-issues-windows-server-2008-sp2.yml @@ -1 +1,67 @@ - \ No newline at end of file +### YamlMime:YamlDocument + +documentType: LandingData +title: Resolved issues in Windows Server 2008 SP2 +metadata: + document_id: + title: Resolved issues in Windows Server 2008 SP2 + description: Resolved issues in Windows Server 2008 SP2 + keywords: ["Resolved issues in Windows Server 2008 SP2", "Windows Server 2008 SP2"] + ms.localizationpriority: high + author: greg-lindsay + ms.author: greglin + manager: dougkim + ms.topic: article + ms.devlang: na + +sections: +- items: + - type: markdown + text: " + See a list of known issues that have been resolved for Windows Server 2008 SP2 over the last six months. Looking for a specific issue? Press CTRL + F (or Command + F if you are using a Mac) and enter your search term(s) to search the page. + + " +- items: + - type: markdown + text: " +
+ " + +- title: Resolved issues +- items: + - type: markdown + text: " + + + + + + + + + +
SummaryOriginating updateStatusDate resolved
First character of the Japanese era name not recognized as an abbreviation
The first character of the Japanese era name is not recognized as an abbreviation and may cause date parsing issues.

See details >
N/A
January 17, 2019
KB4480974
Resolved
KB4489880
April 25, 2019
03:32 PM PT
Applications using Microsoft Jet database fail to open
Applications that use a Microsoft Jet database with the Microsoft Access 97 file format may fail to open if column names are greater than 32 characters.

See details >
N/A
January 08, 2019
KB4480968
Resolved
KB4487023
April 25, 2019
03:32 PM PT
Unable to use Seek bar in Windows Media Player
Users may not be able to use the Seek bar in Windows Media Player when playing specific files.

See details >
N/A
October 09, 2018
KB4463097
Resolved
KB4471325
April 25, 2019
03:28 PM PT
Virtual machines fail to restore
Virtual machines (VMs) may fail to restore successfully if the VM has been saved and restored once before.

See details >
N/A
January 08, 2019
KB4480968
Resolved
KB4490514
April 25, 2019
03:26 PM PT
Embedded objects may display incorrectly
Any compound document (OLE) server application that places embedded objects into the Windows Metafile (WMF) using the PatBlt API may display embedded objects incorrectly.

See details >
N/A

Resolved
KB4493471
April 25, 2019
03:26 PM PT
Applications using Microsoft Jet database and Access 95 file format stop working
Applications that use a Microsoft Jet database with the Microsoft Access 95 file format may randomly stop working.

See details >
N/A
February 12, 2019
KB4487023
Resolved
KB4487022
April 25, 2019
03:26 PM PT
Local Administrators unable to remotely access shares
Local users who are part of the local Administrators group may not be able to remotely access shares on Windows Server 2008 R2 and Windows 7 machines.

See details >
N/A
January 08, 2019
KB4480968
Resolved
KB4487354
April 25, 2019
03:26 PM PT
NETDOM.EXE fails to run
NETDOM.EXE fails to run and the error, “The command failed to complete successfully.” appears on screen.

See details >
N/A
March 12, 2019
KB4489880
Resolved
KB4493471
April 25, 2019
03:25 PM PT
+ " + +- title: Issue details +- items: + - type: markdown + text: " +
+
+ " +- title: April 2019 +- items: + - type: markdown + text: " + + + + + + + + + +
DetailsAffected buildStatusHistory
First character of the Japanese era name not recognized as an abbreviation
After installing KB4480974, the first character of the Japanese era name is not recognized as an abbreviation and may cause date parsing issues.

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 8.1; Windows 7, Service Pack 1
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2; Windows Server 2012; Windows Server 2008 R2 SP1; Windows Server 2008 SP2

Resolution: This issue is resolved in KB4489880.

Back to top
N/A
January 17, 2019
KB4480974
Resolved
KB4489880
Resolved:
March 12, 2019
10:00 AM PT

Opened:
April 25, 2019
03:32 PM PT
Applications using Microsoft Jet database fail to open
Applications that use a Microsoft Jet database with the Microsoft Access 97 file format may fail to open if the database has column names greater than 32 characters. The database will fail to open with the error, “Unrecognized Database Format”.

Affected platforms: 
  • Client: Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 8.1; Windows 7, Service Pack 1 
  • Server: Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2; Windows Server 2012; Windows Server 2008 R2 SP1; Windows Server 2008 SP2

Resolution: This issue is resolved in KB4487023.

Back to top
N/A
January 08, 2019
KB4480968
Resolved
KB4487023
Resolved:
February 12, 2019
10:00 AM PT

Opened:
April 25, 2019
03:32 PM PT
Unable to use Seek bar in Windows Media Player
After installing KB4463097, users may not be able to use the Seek Bar in Windows Media Player when playing specific files. This issue does not affect normal playback.

Affected platforms: 
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 8.1; Windows 7, Service Pack 1
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2; Windows Server 2012; Windows Server 2008 R2 SP1; Windows Server 2008 SP2

Resolution: This issue is resolved in KB4471325.

Back to top
N/A
October 09, 2018
KB4463097
Resolved
KB4471325
Resolved:
December 11, 2018
10:00 AM PT

Opened:
April 25, 2019
03:28 PM PT
Virtual machines fail to restore
After installing KB4480968, virtual machines (VM) may fail to restore successfully if the VM has been saved and restored once before. The error message is, “Failed to restore the virtual machine state: Cannot restore this virtual machine because the saved state data cannot be read. Delete the saved state data and then try to start the virtual machine. (0xC0370027).”

This affects AMD Bulldozer Family 15h, AMD Jaguar Family 16h, and AMD Puma Family 16h (second generation) microarchitectures.

Affected platforms: 
  • Client: Windows 7, Service Pack 1 
  • Server: Windows Server 2012; Windows Server 2008 R2 SP1; Windows Server 2008 SP2

Resolution: This issue is resolved in KB4490514.

Back to top
N/A
January 08, 2019
KB4480968
Resolved
KB4490514
Resolved:
February 19, 2019
02:00 PM PT

Opened:
April 25, 2019
03:26 PM PT
Embedded objects may display incorrectly
Any compound document (OLE) server application that places embedded objects into the Windows Metafile (WMF) using the PatBlt API may display embedded objects incorrectly.

For example, if you paste a Microsoft Excel worksheet object into a Microsoft Word document, the cells may render with a different background color.

Affected platforms: 
  • Client: Windows 8.1 
  • Server: Windows Server 2012 R2; Windows Server 2012; Windows Server 2008 SP2

Resolution: This issue is resolved in KB4493471.

Back to top
N/A

Resolved
KB4493471
Resolved:
April 09, 2019
10:00 AM PT

Opened:
April 25, 2019
03:26 PM PT
Applications using Microsoft Jet database and Access 95 file format stop working
Applications that use a Microsoft Jet database with the Microsoft Access 95 file format may randomly stop working.

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 7, Service Pack 1
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012; Windows Server 2008 R2 SP1; Windows Server 2008 SP2

Resolution: This issue is resolved in KB4487022.

Back to top
N/A
February 12, 2019
KB4487023
Resolved
KB4487022
Resolved:
February 19, 2019
02:00 PM PT

Opened:
April 25, 2019
03:26 PM PT
Local Administrators unable to remotely access shares
Local users who are part of the local Administrators group may not be able to remotely access shares on Windows Server 2008 R2 and Windows 7 machines after installing KB4480968. This does not affect domain accounts in the local Administrators group.

Affected platforms: 
  • Client: Windows 7, Service Pack 1 
  • Server: Windows Server 2008 R2 SP1; Windows Server 2008 SP2

Resolution: This issue is resolved in KB4487354.

Back to top
N/A
January 08, 2019
KB4480968
Resolved
KB4487354
Resolved:
January 11, 2019
02:00 PM PT

Opened:
April 25, 2019
03:26 PM PT
NETDOM.EXE fails to run
After installing KB4489880, NETDOM.EXE fails to run, and the on-screen error, “The command failed to complete successfully.” appears.

Affected platforms: 
  • Client: Windows 7, Service Pack 1 
  • Server: Windows Server 2008 R2 SP1; Windows Server 2008 SP2

Resolution: This issue is resolved in KB4493471.

Back to top
N/A
March 12, 2019
KB4489880
Resolved
KB4493471
Resolved:
April 09, 2019
10:00 AM PT

Opened:
April 25, 2019
03:25 PM PT
+ " diff --git a/windows/release-information/resolved-issues-windows-server-2012.yml b/windows/release-information/resolved-issues-windows-server-2012.yml index 3a47cfc0ec..6da451eb86 100644 --- a/windows/release-information/resolved-issues-windows-server-2012.yml +++ b/windows/release-information/resolved-issues-windows-server-2012.yml @@ -1,12 +1,12 @@ ### YamlMime:YamlDocument documentType: LandingData -title: Windows Server 2012 +title: Resolved issues in Windows Server 2012 metadata: document_id: - title: Windows Server 2012 - description: View annoucements and review known issues and fixes for Windows Server 2012 - keywords: Windows 10, issues, fixes, announcements, Windows Server, advisories + title: Resolved issues in Windows Server 2012 + description: Resolved issues in Windows Server 2012 + keywords: ["Resolved issues in Windows Server 2012", "Windows Server 2012"] ms.localizationpriority: high author: greg-lindsay ms.author: greglin @@ -18,10 +18,9 @@ sections: - items: - type: markdown text: " - Find information on known issues for Windows Server 2012. Looking for a specific issue? Press CTRL + F (or Command + F if you are using a Mac) and enter your search term(s). + See a list of known issues that have been resolved for Windows Server 2012 over the last six months. Looking for a specific issue? Press CTRL + F (or Command + F if you are using a Mac) and enter your search term(s) to search the page. " - - items: - type: markdown text: " @@ -31,7 +30,44 @@ sections: - title: Resolved issues - items: - type: markdown - text: "
This table offers a summary of current active issues and those issues that have been resolved in the last 30 days.
- + text: " +
SummaryOriginating updateStatusLast updated
+ + + + + + + + + + + +
SummaryOriginating updateStatusDate resolved
Applications using Microsoft Jet database and Access 95 file format stop working
Applications that use a Microsoft Jet database with the Microsoft Access 95 file format may randomly stop working.

See details >
February 12, 2019
KB4487025
Resolved
KB4487024
April 25, 2019
04:04 PM PT
First character of the Japanese era name not recognized as an abbreviation
The first character of the Japanese era name is not recognized as an abbreviation and may cause date parsing issues.

See details >
January 15, 2019
KB4480971
Resolved
KB4487024
April 25, 2019
04:02 PM PT
Embedded objects may display incorrectly
Any compound document (OLE) server application that places embedded objects into the Windows Metafile (WMF) using the PatBlt API may display embedded objects incorrectly.

See details >
February 12, 2019
KB4487025
Resolved
KB4493451
April 25, 2019
04:00 PM PT
Error 1309 when installing/uninstalling MSI or MSP files
Users may receive “Error 1309” while installing or uninstalling certain types of MSI and MSP files.

See details >
February 12, 2019
KB4487025
Resolved
KB4489891
April 25, 2019
03:36 PM PT
Internet Explorer 11 authentication issue with multiple concurrent logons
Internet Explorer 11 users may encounter issues if two or more people use the same user account for multiple, concurrent login sessions on the same Windows Server machine.

See details >
January 08, 2019
KB4480975
Resolved
KB4493451
April 25, 2019
03:34 PM PT
MSXML6 may cause applications to stop responding
MSXML6 may cause applications to stop responding if an exception was thrown during node operations, such as appendChild(), insertBefore(), and moveNode().

See details >
January 08, 2019
KB4480975
Resolved
KB4493451
April 25, 2019
03:27 PM PT
Virtual machines fail to restore
Virtual machines (VMs) may fail to restore successfully if the VM has been saved and restored once before.

See details >
January 08, 2019
KB4480975
Resolved
KB4490516
April 25, 2019
03:22 PM PT
Applications using Microsoft Jet database fail to open
Applications that use a Microsoft Jet database with the Microsoft Access 97 file format may fail to open if column names are greater than 32 characters.

See details >
January 08, 2019
KB4480975
Resolved
KB4487025
April 25, 2019
03:19 PM PT
Unable to access hotspots with third-party applications
Third-party applications may have difficulty authenticating hotspots.

See details >
January 08, 2019
KB4480975
Resolved
KB4480971
April 25, 2019
03:14 PM PT
Event Viewer may not show some event descriptions for network interface cards
The Event Viewer may not show some event descriptions for network interface cards (NIC).

See details >
September 11, 2018
KB4457135
Resolved
KB4489891
April 25, 2019
03:10 PM PT
Unable to use Seek bar in Windows Media Player
Users may not be able to use the Seek bar in Windows Media Player when playing specific files.

See details >
October 09, 2018
KB4462929
Resolved
KB4471330
April 25, 2019
02:47 PM PT
+ " + +- title: Issue details +- items: + - type: markdown + text: " +
+
+ " +- title: April 2019 +- items: + - type: markdown + text: " + + + + + + + + + + + +
DetailsAffected buildStatusHistory
Applications using Microsoft Jet database and Access 95 file format stop working
Applications that use a Microsoft Jet database with the Microsoft Access 95 file format may randomly stop working.

Resolution: This issue is resolved in KB4487024.

Back to top
February 12, 2019
KB4487025
Resolved
KB4487024
Resolved:
February 19, 2019
02:00 PM PT

Opened:
April 25, 2019
04:04 PM PT
First character of the Japanese era name not recognized as an abbreviation
After installing KB4480971, the first character of the Japanese era name is not recognized as an abbreviation and may cause date parsing issues.

Resolution: This issue is resolved in KB4487024.

Back to top
January 15, 2019
KB4480971
Resolved
KB4487024
Resolved:
February 19, 2019
02:00 PM PT

Opened:
April 25, 2019
04:01 PM PT
Embedded objects may display incorrectly
Any compound document (OLE) server application that places embedded objects into the Windows Metafile (WMF) using the PatBlt API may display embedded objects incorrectly.

For example, if you paste a Microsoft Excel worksheet object into a Microsoft Word document, the cells may render with a different background color.

Resolution: This issue is resolved in KB4493451.

Back to top
February 12, 2019
KB4487025
Resolved
KB4493451
Resolved:
April 09, 2019
10:00 AM PT

Opened:
April 25, 2019
04:00 PM PT
Error 1309 when installing/uninstalling MSI or MSP files
After installing KB4487025, users may receive \"Error 1309\" while installing or uninstalling certain types of MSI and MSP files.

Resolution: This issue is resolved in KB4489891.

Back to top
February 12, 2019
KB4487025
Resolved
KB4489891
Resolved:
March 12, 2019
10:00 AM PT

Opened:
April 25, 2019
03:36 PM PT
Internet Explorer 11 authentication issue with multiple concurrent logons
After installing KB4480975, Internet Explorer 11 and other applications that use WININET.DLL may have authentication issues. This occurs when two or more people use the same user account for multiple, concurrent login sessions on the same Windows Server machine, including Remote Desktop Protocol (RDP) and Terminal Server logons. Symptoms reported by customers include, but may not be limited to:
  • Cache size and location show zero or empty.
  • Keyboard shortcuts may not work properly.
  • Webpages may intermittently fail to load or render correctly.
  • Issues with credential prompts.
  • Issues when downloading files.

Resolution: This issue is resolved in KB4493451.

Back to top
January 08, 2019
KB4480975
Resolved
KB4493451
Resolved:
April 09, 2019
10:00 AM PT

Opened:
April 25, 2019
03:34 PM PT
MSXML6 may cause applications to stop responding
After installing KB4480975, MSXML6 causes applications to stop responding if an exception was thrown during node operations, such as appendChild(), insertBefore(), and moveNode().

The Group Policy editor may stop responding when editing a Group Policy Object (GPO) that contains Group Policy Preferences (GPP) for Internet Explorer 10 settings.

Resolution: This issue is resolved in KB4493451.

Back to top
January 08, 2019
KB4480975
Resolved
KB4493451
Resolved:
April 09, 2019
10:00 AM PT

Opened:
April 25, 2019
03:27 PM PT
Virtual machines fail to restore
After installing KB4480975, virtual machines (VM) may fail to restore successfully if the VM has been saved and restored once before. The error message is, \"Failed to restore the virtual machine state: Cannot restore this virtual machine because the saved state data cannot be read. Delete the saved state data and then try to start the virtual machine. (0xC0370027).\"

This affects AMD Bulldozer Family 15h, AMD Jaguar Family 16h, and AMD Puma Family 16h (second generation) microarchitectures.

Resolution: This issue is resolved in KB4490516.

Back to top
January 08, 2019
KB4480975
Resolved
KB4490516
Resolved:
February 19, 2019
02:00 PM PT

Opened:
April 25, 2019
03:22 PM PT
Applications using Microsoft Jet database fail to open
Applications that use a Microsoft Jet database with the Microsoft Access 97 file format may fail to open if the database has column names greater than 32 characters. The database will fail to open with the error, \"Unrecognized Database Format\".

Resolution: This issue is resolved in KB4487025.

Back to top
January 08, 2019
KB4480975
Resolved
KB4487025
Resolved:
February 12, 2019
10:00 AM PT

Opened:
April 25, 2019
03:19 PM PT
Unable to access hotspots with third-party applications
After installing KB4480975, third-party applications may have difficulty authenticating hotspots.

Resolution: This issue is resolved in KB4480971.

Back to top
January 08, 2019
KB4480975
Resolved
KB4480971
Resolved:
January 15, 2019
10:00 AM PT

Opened:
April 25, 2019
03:14 PM PT
Event Viewer may not show some event descriptions for network interface cards
After installing KB4457135, the Event Viewer may not show some event descriptions for network interface cards (NICs).

Resolution: This issue is resolved in KB4489891.

Back to top
September 11, 2018
KB4457135
Resolved
KB4489891
Resolved:
March 12, 2019
10:00 AM PT

Opened:
April 25, 2019
03:10 PM PT
Unable to use Seek bar in Windows Media Player
After installing KB4462929, users may not be able to use the Seek Bar in Windows Media Player when playing specific files. This issue does not affect normal playback.

Resolution: This issue is resolved in KB4471330.

Back to top
October 09, 2018
KB4462929
Resolved
KB4471330
Resolved:
December 11, 2018
10:00 AM PT

Opened:
April 25, 2019
02:47 PM PT
" diff --git a/windows/release-information/status-windows-10-1507.yml b/windows/release-information/status-windows-10-1507.yml index 4b762a7b54..efe90a9f97 100644 --- a/windows/release-information/status-windows-10-1507.yml +++ b/windows/release-information/status-windows-10-1507.yml @@ -60,8 +60,8 @@ sections: - type: markdown text: "
This table offers a summary of current active issues and those issues that have been resolved in the last 30 days.
- - + +
SummaryOriginating updateStatusLast updated
MSXML6 may cause applications to stop responding
MSXML6 may cause applications to stop responding if an exception was thrown during node operations, such as appendChild(), insertBefore(), and moveNode().

See details >
OS Build 10240.18094

January 08, 2019
KB4480962
Resolved
KB4493475
April 09, 2019 10:00 AM PT
Custom URI schemes may not start corresponding application
Custom URI schemes for application protocol handlers may not start the corresponding application for local intranet and trusted sites in Internet Explorer.

See details >
OS Build 10240.18158

March 12, 2019
KB4489872
Resolved
KB4493475
April 09, 2019 10:00 AM PT
MSXML6 may cause applications to stop responding
MSXML6 may cause applications to stop responding if an exception was thrown during node operations, such as appendChild(), insertBefore(), and moveNode().

See details >
OS Build 10240.18094

January 08, 2019
KB4480962
Resolved
KB4493475
April 09, 2019
10:00 AM PT
Custom URI schemes may not start corresponding application
Custom URI schemes for application protocol handlers may not start the corresponding application for local intranet and trusted sites in Internet Explorer.

See details >
OS Build 10240.18158

March 12, 2019
KB4489872
Resolved
KB4493475
April 09, 2019
10:00 AM PT
" @@ -77,7 +77,7 @@ sections: - type: markdown text: " - +
DetailsAffected buildStatusHistory
Custom URI schemes may not start corresponding application
After installing KB4489872, Custom URI Schemes for Application Protocol handlers may not start the corresponding application for local intranet and trusted sites on Internet Explorer.

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 8.1; Windows 7, Service Pack 1 
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2; Windows Server 2008 R2 SP1

Resolution: This issue was resolved in KB4493475.

Back to top
OS Build 10240.18158

March 12, 2019
KB4489872
Resolved
KB4493475
Resolved:
April 09, 2019 10:00 AM PT

Opened:
March 12, 2019 10:00 AM PT
Custom URI schemes may not start corresponding application
After installing KB4489872, Custom URI Schemes for Application Protocol handlers may not start the corresponding application for local intranet and trusted sites on Internet Explorer.

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 8.1; Windows 7, Service Pack 1 
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2; Windows Server 2008 R2 SP1

Resolution: This issue was resolved in KB4493475.

Back to top
OS Build 10240.18158

March 12, 2019
KB4489872
Resolved
KB4493475
Resolved:
April 09, 2019
10:00 AM PT

Opened:
March 12, 2019
10:00 AM PT
" @@ -86,6 +86,6 @@ sections: - type: markdown text: " - +
DetailsAffected buildStatusHistory
MSXML6 may cause applications to stop responding
After installing KB4480962, MSXML6 causes applications to stop responding if an exception was thrown during node operations, such as appendChild(), insertBefore(), and moveNode().

The Group Policy editor may stop responding when editing a Group Policy Object (GPO) that contains Group Policy Preferences (GPP) for Internet Explorer 10 settings.

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 8.1
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2

Resolution: This issue was resolved in KB4493475.

Back to top
OS Build 10240.18094

January 08, 2019
KB4480962
Resolved
KB4493475
Resolved:
April 09, 2019 10:00 AM PT

Opened:
January 08, 2019 10:00 AM PT
MSXML6 may cause applications to stop responding
After installing KB4480962, MSXML6 causes applications to stop responding if an exception was thrown during node operations, such as appendChild(), insertBefore(), and moveNode().

The Group Policy editor may stop responding when editing a Group Policy Object (GPO) that contains Group Policy Preferences (GPP) for Internet Explorer 10 settings.

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 8.1
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2

Resolution: This issue was resolved in KB4493475.

Back to top
OS Build 10240.18094

January 08, 2019
KB4480962
Resolved
KB4493475
Resolved:
April 09, 2019
10:00 AM PT

Opened:
January 08, 2019
10:00 AM PT
" diff --git a/windows/release-information/status-windows-10-1607-and-windows-server-2016.yml b/windows/release-information/status-windows-10-1607-and-windows-server-2016.yml index 174b265816..65c93c715a 100644 --- a/windows/release-information/status-windows-10-1607-and-windows-server-2016.yml +++ b/windows/release-information/status-windows-10-1607-and-windows-server-2016.yml @@ -60,14 +60,14 @@ sections: - type: markdown text: "
This table offers a summary of current active issues and those issues that have been resolved in the last 30 days.
- - - - - - - - + + + + + + + +
SummaryOriginating updateStatusLast updated
End-user-defined characters (EUDC) cause blue screen at startup
If you enable per font end-user-defined characters (EUDC), the system will stop working and a blue screen may appear at startup.

See details >
OS Build 14393.2879

March 19, 2019
KB4489889
Resolved
KB4493470
April 09, 2019 10:00 AM PT
Internet Explorer 11 authentication issue with multiple concurrent logons
Internet Explorer 11 users may encounter issues if two or more people use the same user account for multiple, concurrent login sessions on the same Windows Server machine.

See details >
OS Build 14393.2724

January 08, 2019
KB4480961
Resolved
KB4493470
April 09, 2019 10:00 AM PT
MSXML6 may cause applications to stop responding
MSXML6 may cause applications to stop responding if an exception was thrown during node operations, such as appendChild(), insertBefore(), and moveNode().

See details >
OS Build 14393.2724

January 08, 2019
KB4480961
Resolved
KB4493470
April 09, 2019 10:00 AM PT
Cluster service may fail if the minimum password length is set to greater than 14
The cluster service may fail to start with the error “2245 (NERR_PasswordTooShort)” if the Group Policy “Minimum Password Length” is configured with greater than 14 characters.

See details >
OS Build 14393.2639

November 27, 2018
KB4467684
Mitigated
March 19, 2019 10:00 AM PT
Custom URI schemes may not start corresponding application
Custom URI schemes for application protocol handlers may not start the corresponding application for local intranet and trusted sites in Internet Explorer.

See details >
OS Build 14393.2848

March 12, 2019
KB4489882
Mitigated
March 19, 2019 10:00 AM PT
Issue using PXE to start a device from WDS
There may be issues using the Preboot Execution Environment (PXE) to start a device from a Windows Deployment Services (WDS) server configured to use Variable Window Extension.

See details >
OS Build 14393.2848

March 12, 2019
KB4489882
Mitigated
March 19, 2019 10:00 AM PT
SCVMM cannot enumerate and manage logical switches deployed on the host
For hosts managed by System Center Virtual Machine Manager (VMM), VMM cannot enumerate and manage logical switches deployed on the host.

See details >
OS Build 14393.2639

November 27, 2018
KB4467684
Mitigated
March 19, 2019 10:00 AM PT
Windows may not start on certain Lenovo and Fujitsu laptops with less than 8GB of RAM
Windows may fail to start on certain Lenovo and Fujitsu laptops that have less than 8 GB of RAM.

See details >
OS Build 14393.2608

November 13, 2018
KB4467691
Mitigated
February 19, 2019 10:00 AM PT
End-user-defined characters (EUDC) cause blue screen at startup
If you enable per font end-user-defined characters (EUDC), the system will stop working and a blue screen may appear at startup.

See details >
OS Build 14393.2879

March 19, 2019
KB4489889
Resolved
KB4493470
April 09, 2019
10:00 AM PT
Internet Explorer 11 authentication issue with multiple concurrent logons
Internet Explorer 11 users may encounter issues if two or more people use the same user account for multiple, concurrent login sessions on the same Windows Server machine.

See details >
OS Build 14393.2724

January 08, 2019
KB4480961
Resolved
KB4493470
April 09, 2019
10:00 AM PT
MSXML6 may cause applications to stop responding
MSXML6 may cause applications to stop responding if an exception was thrown during node operations, such as appendChild(), insertBefore(), and moveNode().

See details >
OS Build 14393.2724

January 08, 2019
KB4480961
Resolved
KB4493470
April 09, 2019
10:00 AM PT
Cluster service may fail if the minimum password length is set to greater than 14
The cluster service may fail to start with the error “2245 (NERR_PasswordTooShort)” if the Group Policy “Minimum Password Length” is configured with greater than 14 characters.

See details >
OS Build 14393.2639

November 27, 2018
KB4467684
Mitigated
March 19, 2019
10:00 AM PT
Custom URI schemes may not start corresponding application
Custom URI schemes for application protocol handlers may not start the corresponding application for local intranet and trusted sites in Internet Explorer.

See details >
OS Build 14393.2848

March 12, 2019
KB4489882
Mitigated
March 19, 2019
10:00 AM PT
Issue using PXE to start a device from WDS
There may be issues using the Preboot Execution Environment (PXE) to start a device from a Windows Deployment Services (WDS) server configured to use Variable Window Extension.

See details >
OS Build 14393.2848

March 12, 2019
KB4489882
Mitigated
March 19, 2019
10:00 AM PT
SCVMM cannot enumerate and manage logical switches deployed on the host
For hosts managed by System Center Virtual Machine Manager (VMM), VMM cannot enumerate and manage logical switches deployed on the host.

See details >
OS Build 14393.2639

November 27, 2018
KB4467684
Mitigated
March 19, 2019
10:00 AM PT
Windows may not start on certain Lenovo and Fujitsu laptops with less than 8GB of RAM
Windows may fail to start on certain Lenovo and Fujitsu laptops that have less than 8 GB of RAM.

See details >
OS Build 14393.2608

November 13, 2018
KB4467691
Mitigated
February 19, 2019
10:00 AM PT
" @@ -83,9 +83,10 @@ sections: - type: markdown text: " - - - + + +
DetailsAffected buildStatusHistory
End-user-defined characters (EUDC) cause blue screen at startup
If you enable per font end-user-defined characters (EUDC), the system will stop working and a blue screen may appear at startup. This is not a common setting in non-Asian regions.

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016

Resolution: This issue was resolved in KB4493470.

Back to top
OS Build 14393.2879

March 19, 2019
KB4489889
Resolved
KB4493470
Resolved:
April 09, 2019 10:00 AM PT

Opened:
March 19, 2019 10:00 AM PT
Custom URI schemes may not start corresponding application
After installing KB4489882, Custom URI schemes for application protocol handlers may not start the corresponding application for local intranet and trusted sites security zones on Internet Explorer.

Affected platforms: 
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 8.1; Windows 7, Service Pack 1 
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2; Windows Server 2008 R2 SP1

Workaround: Right-click the URL link to open it in a new window or tab, or enable Protected Mode in Internet Explorer for local intranet and trusted sites

  1. Go to Tools > Internet options > Security.
  2. Within Select a zone to view or change security settings, select Local intranet and then select Enable Protected Mode.
  3. Select Trusted sites and then select Enable Protected Mode.
  4. Select OK.

You must restart the browser after making these changes.

Next steps: Microsoft is working on a resolution and will provide an update in an upcoming release.

Back to top
OS Build 14393.2848

March 12, 2019
KB4489882
Mitigated
Last updated:
March 19, 2019 10:00 AM PT

Opened:
March 12, 2019 10:00 AM PT
Issue using PXE to start a device from WDS
After installing KB4489882, there may be issues using the Preboot Execution Environment (PXE) to start a device from a Windows Deployment Services (WDS) server configured to use Variable Window Extension. This may cause the connection to the WDS server to terminate prematurely while downloading the image. This issue does not affect clients or devices that are not using Variable Window Extension.

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10 Enterprise LTSC 2016; Windows 8.1
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server 2016; Windows Server 2012 R2

Workaround: To mitigate the issue, disable the Variable Window Extension on WDS server using one of the following options:

Option 1:
Open an Administrator Command prompt and type the following:

Wdsutil /Set-TransportServer /EnableTftpVariableWindowExtension:No

Option 2:
Use the Windows Deployment Services UI to make the following adjustment:

1. Open Windows Deployment Services from Windows Administrative Tools.
2. Expand Servers and right-click a WDS server.
3. Open its properties and clear the Enable Variable Window Extension box on the TFTP tab.

Option 3:
Set the following registry value to 0:

HKLM\\System\\CurrentControlSet\\Services\\WDSServer\\Providers\\WDSTFTP\\EnableVariableWindowExtension

Restart the WDSServer service after disabling the Variable Window Extension.

Next steps: Microsoft is working on a resolution and will provide an update in an upcoming release.

Back to top
OS Build 14393.2848

March 12, 2019
KB4489882
Mitigated
Last updated:
March 19, 2019 10:00 AM PT

Opened:
March 12, 2019 10:00 AM PT
End-user-defined characters (EUDC) cause blue screen at startup
If you enable per font end-user-defined characters (EUDC), the system will stop working and a blue screen may appear at startup. This is not a common setting in non-Asian regions.

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016

Resolution: This issue was resolved in KB4493470.

Back to top
OS Build 14393.2879

March 19, 2019
KB4489889
Resolved
KB4493470
Resolved:
April 09, 2019
10:00 AM PT

Opened:
March 19, 2019
10:00 AM PT
Custom URI schemes may not start corresponding application
After installing KB4489882, Custom URI schemes for application protocol handlers may not start the corresponding application for local intranet and trusted sites security zones on Internet Explorer.

Affected platforms: 
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 8.1; Windows 7, Service Pack 1 
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2; Windows Server 2008 R2 SP1

Workaround: Right-click the URL link to open it in a new window or tab, or enable Protected Mode in Internet Explorer for local intranet and trusted sites
  1. Go to Tools > Internet options > Security.
  2. Within Select a zone to view or change security settings, select Local intranet and then select Enable Protected Mode.
  3. Select Trusted sites and then select Enable Protected Mode.
  4. Select OK.
You must restart the browser after making these changes.

Next steps: Microsoft is working on a resolution and will provide an update in an upcoming release.

Back to top
OS Build 14393.2848

March 12, 2019
KB4489882
Mitigated
Last updated:
March 19, 2019
10:00 AM PT

Opened:
March 12, 2019
10:00 AM PT
Issue using PXE to start a device from WDS
After installing KB4489882, there may be issues using the Preboot Execution Environment (PXE) to start a device from a Windows Deployment Services (WDS) server configured to use Variable Window Extension. This may cause the connection to the WDS server to terminate prematurely while downloading the image. This issue does not affect clients or devices that are not using Variable Window Extension.

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10 Enterprise LTSC 2016; Windows 8.1
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server 2016; Windows Server 2012 R2

Workaround: To mitigate the issue, disable the Variable Window Extension on WDS server using one of the following options:
Option 1:
Open an Administrator Command prompt and type the following:
Wdsutil /Set-TransportServer /EnableTftpVariableWindowExtension:No
+
Option 2:
Use the Windows Deployment Services UI to make the following adjustment:
  1. Open Windows Deployment Services from Windows Administrative Tools.
  2. Expand Servers and right-click a WDS server.
  3. Open its properties and clear the Enable Variable Window Extension box on the TFTP tab.
Option 3:
Set the following registry value to 0:
HKLM\\System\\CurrentControlSet\\Services\\WDSServer\\Providers\\WDSTFTP\\EnableVariableWindowExtension
Restart the WDSServer service after disabling the Variable Window Extension.

Next steps: Microsoft is working on a resolution and will provide an update in an upcoming release.

Back to top
OS Build 14393.2848

March 12, 2019
KB4489882
Mitigated
Last updated:
March 19, 2019
10:00 AM PT

Opened:
March 12, 2019
10:00 AM PT
" @@ -94,8 +95,8 @@ sections: - type: markdown text: " - - + +
DetailsAffected buildStatusHistory
Internet Explorer 11 authentication issue with multiple concurrent logons
After installing KB4480961, Internet Explorer 11 and other applications that use WININET.DLL may have authentication issues. This occurs when two or more people use the same user account for multiple, concurrent login sessions on the same Windows Server machine, including Remote Desktop Protocol (RDP) and Terminal Server logons. Symptoms reported by customers include, but may not be limited to:

  • Cache size and location show zero or empty.
  • Keyboard shortcuts may not work properly.
  • Webpages may intermittently fail to load or render correctly.
  • Issues with credential prompts.
  • Issues when downloading files.

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10 Enterprise LTSC 2016; Windows 8.1; Windows 7, Service Pack 1
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server 2016; Windows Server 2012 R2; Windows Server 2008 R2 SP1

Resolution: This issue was resolved in KB4493470.

Back to top
OS Build 14393.2724

January 08, 2019
KB4480961
Resolved
KB4493470
Resolved:
April 09, 2019 10:00 AM PT

Opened:
January 08, 2019 10:00 AM PT
MSXML6 may cause applications to stop responding
After installing KB4480961, MSXML6 causes applications to stop responding if an exception was thrown during node operations, such as appendChild(), insertBefore(), and moveNode().

The Group Policy editor may stop responding when editing a Group Policy Object (GPO) that contains Group Policy Preferences (GPP) for Internet Explorer 10 settings.

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 8.1
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2

Resolution: This issue was resolved in KB4493470.

Back to top
OS Build 14393.2724

January 08, 2019
KB4480961
Resolved
KB4493470
Resolved:
April 09, 2019 10:00 AM PT

Opened:
January 08, 2019 10:00 AM PT
Internet Explorer 11 authentication issue with multiple concurrent logons
After installing KB4480961, Internet Explorer 11 and other applications that use WININET.DLL may have authentication issues. This occurs when two or more people use the same user account for multiple, concurrent login sessions on the same Windows Server machine, including Remote Desktop Protocol (RDP) and Terminal Server logons. Symptoms reported by customers include, but may not be limited to:
  • Cache size and location show zero or empty.
  • Keyboard shortcuts may not work properly.
  • Webpages may intermittently fail to load or render correctly.
  • Issues with credential prompts.
  • Issues when downloading files.

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10 Enterprise LTSC 2016; Windows 8.1; Windows 7, Service Pack 1
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server 2016; Windows Server 2012 R2; Windows Server 2008 R2 SP1

Resolution: This issue was resolved in KB4493470.

Back to top
OS Build 14393.2724

January 08, 2019
KB4480961
Resolved
KB4493470
Resolved:
April 09, 2019
10:00 AM PT

Opened:
January 08, 2019
10:00 AM PT
MSXML6 may cause applications to stop responding
After installing KB4480961, MSXML6 causes applications to stop responding if an exception was thrown during node operations, such as appendChild(), insertBefore(), and moveNode().

The Group Policy editor may stop responding when editing a Group Policy Object (GPO) that contains Group Policy Preferences (GPP) for Internet Explorer 10 settings.

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 8.1
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2

Resolution: This issue was resolved in KB4493470.

Back to top
OS Build 14393.2724

January 08, 2019
KB4480961
Resolved
KB4493470
Resolved:
April 09, 2019
10:00 AM PT

Opened:
January 08, 2019
10:00 AM PT
" @@ -104,8 +105,8 @@ sections: - type: markdown text: " - - - + + +
DetailsAffected buildStatusHistory
Cluster service may fail if the minimum password length is set to greater than 14
After installing KB4467684, the cluster service may fail to start with the error \"2245 (NERR_PasswordTooShort)\" if the Group Policy \"Minimum Password Length\" is configured with greater than 14 characters.

Affected platforms:
  • Client: Windows 10 Enterprise LTSC 2016
  • Server: Windows Server 2016

Workaround: Set the domain default \"Minimum Password Length\" policy to less than or equal to 14 characters.

Next steps: Microsoft is working on a resolution and will provide an update in an upcoming release.

Back to top
OS Build 14393.2639

November 27, 2018
KB4467684
Mitigated
Last updated:
March 19, 2019 10:00 AM PT

Opened:
November 27, 2018 10:00 AM PT
SCVMM cannot enumerate and manage logical switches deployed on the host
For hosts managed by System Center Virtual Machine Manager (VMM), VMM cannot enumerate and manage logical switches deployed on the host after installing KB4467684.

Additionally, if you do not follow the best practices, a stop error may occur in vfpext.sys on the hosts.

Affected platforms:
  • Client: Windows 10 Enterprise LTSC 2016
  • Server: Windows Server 2016

Workaround:
Run mofcomp on the following mof files on the affected host:

  • Scvmmswitchportsettings.mof
  • VMMDHCPSvr.mof

Follow the best practices while patching to avoid a stop error in vfpext.sys in an SDN v2 environment (NC managed hosts).

Back to top
OS Build 14393.2639

November 27, 2018
KB4467684
Mitigated
Last updated:
March 19, 2019 10:00 AM PT

Opened:
November 27, 2018 10:00 AM PT
Windows may not start on certain Lenovo and Fujitsu laptops with less than 8GB of RAM
After installing KB4467691, Windows may fail to start on certain Lenovo and Fujitsu laptops that have less than 8 GB of RAM.

Affected platforms:
  • Client: Windows 10 Enterprise LTSC 2016
  • Server: Windows Server 2016

Workaround: Restart the affected machine using the Unified Extensible Firmware Interface (UEFI). Disable Secure Boot and then restart.

If BitLocker is enabled on your machine, you may have to go through BitLocker recovery after Secure Boot has been disabled.

Next steps: Lenovo and Fujitsu are aware of this issue. Please contact your OEM to ask if there is a firmware update available for your device.

Back to top
OS Build 14393.2608

November 13, 2018
KB4467691
Mitigated
Last updated:
February 19, 2019 10:00 AM PT

Opened:
November 13, 2018 10:00 AM PT
Cluster service may fail if the minimum password length is set to greater than 14
After installing KB4467684, the cluster service may fail to start with the error \"2245 (NERR_PasswordTooShort)\" if the Group Policy \"Minimum Password Length\" is configured with greater than 14 characters.

Affected platforms:
  • Client: Windows 10 Enterprise LTSC 2016
  • Server: Windows Server 2016

Workaround: Set the domain default \"Minimum Password Length\" policy to less than or equal to 14 characters.

Next steps: Microsoft is working on a resolution and will provide an update in an upcoming release.

Back to top
OS Build 14393.2639

November 27, 2018
KB4467684
Mitigated
Last updated:
March 19, 2019
10:00 AM PT

Opened:
November 27, 2018
10:00 AM PT
SCVMM cannot enumerate and manage logical switches deployed on the host
For hosts managed by System Center Virtual Machine Manager (VMM), VMM cannot enumerate and manage logical switches deployed on the host after installing KB4467684.

Additionally, if you do not follow the best practices, a stop error may occur in vfpext.sys on the hosts.

Affected platforms:
  • Client: Windows 10 Enterprise LTSC 2016
  • Server: Windows Server 2016

Workaround:
Run mofcomp on the following mof files on the affected host:

  • Scvmmswitchportsettings.mof
  • VMMDHCPSvr.mof

Follow the best practices while patching to avoid a stop error in vfpext.sys in an SDN v2 environment (NC managed hosts).

Back to top
OS Build 14393.2639

November 27, 2018
KB4467684
Mitigated
Last updated:
March 19, 2019
10:00 AM PT

Opened:
November 27, 2018
10:00 AM PT
Windows may not start on certain Lenovo and Fujitsu laptops with less than 8GB of RAM
After installing KB4467691, Windows may fail to start on certain Lenovo and Fujitsu laptops that have less than 8 GB of RAM.

Affected platforms:
  • Client: Windows 10 Enterprise LTSC 2016
  • Server: Windows Server 2016

Workaround: Restart the affected machine using the Unified Extensible Firmware Interface (UEFI). Disable Secure Boot and then restart.

If BitLocker is enabled on your machine, you may have to go through BitLocker recovery after Secure Boot has been disabled.

Next steps: Lenovo and Fujitsu are aware of this issue. Please contact your OEM to ask if there is a firmware update available for your device.

Back to top
OS Build 14393.2608

November 13, 2018
KB4467691
Mitigated
Last updated:
February 19, 2019
10:00 AM PT

Opened:
November 13, 2018
10:00 AM PT
" diff --git a/windows/release-information/status-windows-10-1703.yml b/windows/release-information/status-windows-10-1703.yml index 6565fc56d6..035ac5c2c4 100644 --- a/windows/release-information/status-windows-10-1703.yml +++ b/windows/release-information/status-windows-10-1703.yml @@ -60,9 +60,9 @@ sections: - type: markdown text: "
This table offers a summary of current active issues and those issues that have been resolved in the last 30 days.
- - - + + +
SummaryOriginating updateStatusLast updated
End-user-defined characters (EUDC) may cause blue screen at startup
If you enable per font end-user-defined characters (EUDC), the system may stop working and a blue screen may appear at startup.

See details >
OS Build 15063.1716

March 19, 2019
KB4489888
Resolved
KB4493474
April 09, 2019 10:00 AM PT
MSXML6 may cause applications to stop responding
MSXML6 may cause applications to stop responding if an exception was thrown during node operations, such as appendChild(), insertBefore(), and moveNode().

See details >
OS Build 15063.1563

January 08, 2019
KB4480973
Resolved
KB4493474
April 09, 2019 10:00 AM PT
Custom URI schemes may not start corresponding application
Custom URI schemes for application protocol handlers may not start the corresponding application for local intranet and trusted sites in Internet Explorer.

See details >
OS Build 15063.1689

March 12, 2019
KB4489871
Mitigated
March 19, 2019 10:00 AM PT
End-user-defined characters (EUDC) may cause blue screen at startup
If you enable per font end-user-defined characters (EUDC), the system may stop working and a blue screen may appear at startup.

See details >
OS Build 15063.1716

March 19, 2019
KB4489888
Resolved
KB4493474
April 09, 2019
10:00 AM PT
MSXML6 may cause applications to stop responding
MSXML6 may cause applications to stop responding if an exception was thrown during node operations, such as appendChild(), insertBefore(), and moveNode().

See details >
OS Build 15063.1563

January 08, 2019
KB4480973
Resolved
KB4493474
April 09, 2019
10:00 AM PT
Custom URI schemes may not start corresponding application
Custom URI schemes for application protocol handlers may not start the corresponding application for local intranet and trusted sites in Internet Explorer.

See details >
OS Build 15063.1689

March 12, 2019
KB4489871
Mitigated
March 19, 2019
10:00 AM PT
" @@ -78,8 +78,8 @@ sections: - type: markdown text: " - - + +
DetailsAffected buildStatusHistory
End-user-defined characters (EUDC) may cause blue screen at startup
If you enable per font end-user-defined characters (EUDC), the system may stop working and a blue screen may appear at startup. This is not a common setting in non-Asian regions.

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016

Resolution: This issue was resolved in KB4493474.

Back to top
OS Build 15063.1716

March 19, 2019
KB4489888
Resolved
KB4493474
Resolved:
April 09, 2019 10:00 AM PT

Opened:
March 19, 2019 10:00 AM PT
Custom URI schemes may not start corresponding application
After installing KB4489871, custom URI schemes for application protocol handlers may not start the corresponding application for local intranet and trusted sites security zones on Internet Explorer.

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 8.1; Windows 7, Service Pack 1 
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2; Windows Server 2008 R2 SP1

Workaround: Right-click the URL link to open it in a new window or tab, or enable Protected Mode in Internet Explorer for local intranet and trusted sites

1. Go to Tools > Internet options > Security.
2. Within Select a zone to view or change security settings, select Local intranet and then select Enable Protected Mode.
3. Select Trusted sites and then select Enable Protected Mode.
4. Select OK.

You must restart the browser after making these changes.

Next steps: Microsoft is working on a resolution and will provide an update in an upcoming release.

Back to top
OS Build 15063.1689

March 12, 2019
KB4489871
Mitigated
Last updated:
March 19, 2019 10:00 AM PT

Opened:
March 12, 2019 10:00 AM PT
End-user-defined characters (EUDC) may cause blue screen at startup
If you enable per font end-user-defined characters (EUDC), the system may stop working and a blue screen may appear at startup. This is not a common setting in non-Asian regions.

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016

Resolution: This issue was resolved in KB4493474.

Back to top
OS Build 15063.1716

March 19, 2019
KB4489888
Resolved
KB4493474
Resolved:
April 09, 2019
10:00 AM PT

Opened:
March 19, 2019
10:00 AM PT
Custom URI schemes may not start corresponding application
After installing KB4489871, custom URI schemes for application protocol handlers may not start the corresponding application for local intranet and trusted sites security zones on Internet Explorer.

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 8.1; Windows 7, Service Pack 1 
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2; Windows Server 2008 R2 SP1

Workaround: Right-click the URL link to open it in a new window or tab, or enable Protected Mode in Internet Explorer for local intranet and trusted sites
1. Go to Tools > Internet options > Security.
2. Within Select a zone to view or change security settings, select Local intranet and then select Enable Protected Mode.
3. Select Trusted sites and then select Enable Protected Mode.
4. Select OK.
You must restart the browser after making these changes.

Next steps: Microsoft is working on a resolution and will provide an update in an upcoming release.

Back to top
OS Build 15063.1689

March 12, 2019
KB4489871
Mitigated
Last updated:
March 19, 2019
10:00 AM PT

Opened:
March 12, 2019
10:00 AM PT
" @@ -88,6 +88,6 @@ sections: - type: markdown text: " - +
DetailsAffected buildStatusHistory
MSXML6 may cause applications to stop responding
After installing KB4480973, MSXML6 causes applications to stop responding if an exception was thrown during node operations, such as appendChild(), insertBefore(), and moveNode().

The Group Policy editor may stop responding when editing a Group Policy Object (GPO) that contains Group Policy Preferences (GPP) for Internet Explorer 10 settings.

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 8.1
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2

Resolution: This issue was resolved in KB4493474.

Back to top
OS Build 15063.1563

January 08, 2019
KB4480973
Resolved
KB4493474
Resolved:
April 09, 2019 10:00 AM PT

Opened:
January 08, 2019 10:00 AM PT
MSXML6 may cause applications to stop responding
After installing KB4480973, MSXML6 causes applications to stop responding if an exception was thrown during node operations, such as appendChild(), insertBefore(), and moveNode().

The Group Policy editor may stop responding when editing a Group Policy Object (GPO) that contains Group Policy Preferences (GPP) for Internet Explorer 10 settings.

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 8.1
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2

Resolution: This issue was resolved in KB4493474.

Back to top
OS Build 15063.1563

January 08, 2019
KB4480973
Resolved
KB4493474
Resolved:
April 09, 2019
10:00 AM PT

Opened:
January 08, 2019
10:00 AM PT
" diff --git a/windows/release-information/status-windows-10-1709.yml b/windows/release-information/status-windows-10-1709.yml index 3b200bcedb..fcddc35508 100644 --- a/windows/release-information/status-windows-10-1709.yml +++ b/windows/release-information/status-windows-10-1709.yml @@ -60,10 +60,10 @@ sections: - type: markdown text: "
This table offers a summary of current active issues and those issues that have been resolved in the last 30 days.
- - - - + + + +
SummaryOriginating updateStatusLast updated
End-user-defined characters (EUDC) may cause blue screen at startup
If you enable per font end-user-defined characters (EUDC), the system may stop working and a blue screen may appear at startup.

See details >
OS Build 16299.1059

March 19, 2019
KB4489890
Resolved
KB4493441
April 09, 2019 10:00 AM PT
MSXML6 causes applications to stop responding if an exception was thrown
MSXML6 causes applications to stop responding if an exception was thrown during node operations, such as appendChild(), insertBefore(), and moveNode().

See details >
OS Build 16299.904

January 08, 2019
KB4480978
Resolved
KB4493441
April 09, 2019 10:00 AM PT
Stop error when attempting to start SSH from WSL
A stop error occurs when attempting to start the Secure Shell client program from Windows Subsystem for Linux with agent forwarding enabled using a command line switch (ssh –A) or

See details >
OS Build 16299.1029

March 12, 2019
KB4489886
Resolved
KB4493441
April 09, 2019 10:00 AM PT
Custom URI schemes may not start corresponding application
Custom URI schemes for application protocol handlers may not start the corresponding application for local intranet and trusted sites in Internet Explorer.

See details >
OS Build 16299.1029

March 12, 2019
KB4489886
Mitigated
March 19, 2019 10:00 AM PT
End-user-defined characters (EUDC) may cause blue screen at startup
If you enable per font end-user-defined characters (EUDC), the system may stop working and a blue screen may appear at startup.

See details >
OS Build 16299.1059

March 19, 2019
KB4489890
Resolved
KB4493441
April 09, 2019
10:00 AM PT
MSXML6 causes applications to stop responding if an exception was thrown
MSXML6 causes applications to stop responding if an exception was thrown during node operations, such as appendChild(), insertBefore(), and moveNode().

See details >
OS Build 16299.904

January 08, 2019
KB4480978
Resolved
KB4493441
April 09, 2019
10:00 AM PT
Stop error when attempting to start SSH from WSL
A stop error occurs when attempting to start the Secure Shell client program from Windows Subsystem for Linux with agent forwarding enabled using a command line switch (ssh –A) or

See details >
OS Build 16299.1029

March 12, 2019
KB4489886
Resolved
KB4493441
April 09, 2019
10:00 AM PT
Custom URI schemes may not start corresponding application
Custom URI schemes for application protocol handlers may not start the corresponding application for local intranet and trusted sites in Internet Explorer.

See details >
OS Build 16299.1029

March 12, 2019
KB4489886
Mitigated
March 19, 2019
10:00 AM PT
" @@ -79,9 +79,9 @@ sections: - type: markdown text: " - - - + + +
DetailsAffected buildStatusHistory
End-user-defined characters (EUDC) may cause blue screen at startup
If you enable per font end-user-defined characters (EUDC), the system may stop working and a blue screen may appear at startup. This is not a common setting in non-Asian regions.

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016

Resolution: This issue is resolved in KB4493441.

Back to top
OS Build 16299.1059

March 19, 2019
KB4489890
Resolved
KB4493441
Resolved:
April 09, 2019 10:00 AM PT

Opened:
March 19, 2019 10:00 AM PT
Stop error when attempting to start SSH from WSL
After applying KB4489886, a stop error occurs when attempting to start the Secure Shell (SSH) client program from Windows Subsystem for Linux (WSL) with agent forwarding enabled using a command line switch (ssh –A) or a configuration setting.

Affected platforms:
  • Client: Windows 10, version 1803; Windows 10, version 1709
  • Server: Windows Server, version 1803; Windows Server, version 1709

Resolution: This issue is resolved in KB4493441.

Back to top
OS Build 16299.1029

March 12, 2019
KB4489886
Resolved
KB4493441
Resolved:
April 09, 2019 10:00 AM PT

Opened:
March 12, 2019 10:00 AM PT
Custom URI schemes may not start corresponding application
After installing KB4489886, custom URI schemes for application protocol handlers may not start the corresponding application for local intranet and trusted sites security zones on Internet Explorer.

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 8.1; Windows 7, Service Pack 1 
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2; Windows Server 2008 R2 SP1

Workaround: Right-click the URL link to open it in a new window or tab, or enable Protected Mode in Internet Explorer for local intranet and trusted sites

1. Go to Tools > Internet options > Security.
2. Within Select a zone to view or change security settings, select Local intranet and then select Enable Protected Mode.
3. Select Trusted sites and then select Enable Protected Mode.
4. Select OK.

You must restart the browser after making these changes.

Next steps: Microsoft is working on a resolution and will provide an update in an upcoming release.

Back to top
OS Build 16299.1029

March 12, 2019
KB4489886
Mitigated
Last updated:
March 19, 2019 10:00 AM PT

Opened:
March 12, 2019 10:00 AM PT
End-user-defined characters (EUDC) may cause blue screen at startup
If you enable per font end-user-defined characters (EUDC), the system may stop working and a blue screen may appear at startup. This is not a common setting in non-Asian regions.

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016

Resolution: This issue is resolved in KB4493441.

Back to top
OS Build 16299.1059

March 19, 2019
KB4489890
Resolved
KB4493441
Resolved:
April 09, 2019
10:00 AM PT

Opened:
March 19, 2019
10:00 AM PT
Stop error when attempting to start SSH from WSL
After applying KB4489886, a stop error occurs when attempting to start the Secure Shell (SSH) client program from Windows Subsystem for Linux (WSL) with agent forwarding enabled using a command line switch (ssh –A) or a configuration setting.

Affected platforms:
  • Client: Windows 10, version 1803; Windows 10, version 1709
  • Server: Windows Server, version 1803; Windows Server, version 1709

Resolution: This issue is resolved in KB4493441.

Back to top
OS Build 16299.1029

March 12, 2019
KB4489886
Resolved
KB4493441
Resolved:
April 09, 2019
10:00 AM PT

Opened:
March 12, 2019
10:00 AM PT
Custom URI schemes may not start corresponding application
After installing KB4489886, custom URI schemes for application protocol handlers may not start the corresponding application for local intranet and trusted sites security zones on Internet Explorer.

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 8.1; Windows 7, Service Pack 1 
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2; Windows Server 2008 R2 SP1

Workaround: Right-click the URL link to open it in a new window or tab, or enable Protected Mode in Internet Explorer for local intranet and trusted sites
1. Go to Tools > Internet options > Security.
2. Within Select a zone to view or change security settings, select Local intranet and then select Enable Protected Mode.
3. Select Trusted sites and then select Enable Protected Mode.
4. Select OK.
You must restart the browser after making these changes.

Next steps: Microsoft is working on a resolution and will provide an update in an upcoming release.

Back to top
OS Build 16299.1029

March 12, 2019
KB4489886
Mitigated
Last updated:
March 19, 2019
10:00 AM PT

Opened:
March 12, 2019
10:00 AM PT
" @@ -90,6 +90,6 @@ sections: - type: markdown text: " - +
DetailsAffected buildStatusHistory
MSXML6 causes applications to stop responding if an exception was thrown
After installing KB4480978, MSXML6 causes applications to stop responding if an exception was thrown during node operations, such as appendChild(), insertBefore(), and moveNode().

The Group Policy editor may stop responding when editing a Group Policy Object (GPO) that contains Group Policy Preferences (GPP) for Internet Explorer 10 settings.

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 8.1
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2

Resolution: This issue is resolved in KB4493441.

Back to top
OS Build 16299.904

January 08, 2019
KB4480978
Resolved
KB4493441
Resolved:
April 09, 2019 10:00 AM PT

Opened:
January 08, 2019 10:00 AM PT
MSXML6 causes applications to stop responding if an exception was thrown
After installing KB4480978, MSXML6 causes applications to stop responding if an exception was thrown during node operations, such as appendChild(), insertBefore(), and moveNode().

The Group Policy editor may stop responding when editing a Group Policy Object (GPO) that contains Group Policy Preferences (GPP) for Internet Explorer 10 settings.

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 8.1
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2

Resolution: This issue is resolved in KB4493441.

Back to top
OS Build 16299.904

January 08, 2019
KB4480978
Resolved
KB4493441
Resolved:
April 09, 2019
10:00 AM PT

Opened:
January 08, 2019
10:00 AM PT
" diff --git a/windows/release-information/status-windows-10-1803.yml b/windows/release-information/status-windows-10-1803.yml index d816f8d9bf..f311534faf 100644 --- a/windows/release-information/status-windows-10-1803.yml +++ b/windows/release-information/status-windows-10-1803.yml @@ -60,11 +60,11 @@ sections: - type: markdown text: "
This table offers a summary of current active issues and those issues that have been resolved in the last 30 days.
- - - - - + + + + +
SummaryOriginating updateStatusLast updated
End-user-defined characters (EUDC) may cause blue screen at startup
If you enable per font end-user-defined characters (EUDC), the system may stop working and a blue screen may appear at startup.

See details >
OS Build 17134.677

March 19, 2019
KB4489894
Resolved
KB4493464
April 09, 2019 10:00 AM PT
MSXML6 may cause applications to stop responding
MSXML6 may cause applications to stop responding if an exception was thrown during node operations, such as appendChild(), insertBefore(), and moveNode().

See details >
OS Build 17134.523

January 08, 2019
KB4480966
Resolved
KB4493464
April 09, 2019 10:00 AM PT
Stop error when attempting to start SSH from WSL
A stop error occurs when attempting to start Secure Shell from Windows Subsystem for Linux with agent forwarding using a command line switch (ssh –A) or a configuration setting.

See details >
OS Build 17134.648

March 12, 2019
KB4489868
Resolved
KB4493464
April 09, 2019 10:00 AM PT
Custom URI schemes may not start corresponding application
Custom URI schemes for application protocol handlers may not start the corresponding application for local intranet and trusted sites in Internet Explorer.

See details >
OS Build 17134.648

March 12, 2019
KB4489868
Mitigated
March 19, 2019 10:00 AM PT
Issue using PXE to start a device from WDS
Using PXE to start a device from a WDS server configured to use Variable Window Extension may cause the connection to the WDS server to terminate prematurely.

See details >
OS Build 17134.648

March 12, 2019
KB4489868
Mitigated
March 19, 2019 10:00 AM PT
End-user-defined characters (EUDC) may cause blue screen at startup
If you enable per font end-user-defined characters (EUDC), the system may stop working and a blue screen may appear at startup.

See details >
OS Build 17134.677

March 19, 2019
KB4489894
Resolved
KB4493464
April 09, 2019
10:00 AM PT
MSXML6 may cause applications to stop responding
MSXML6 may cause applications to stop responding if an exception was thrown during node operations, such as appendChild(), insertBefore(), and moveNode().

See details >
OS Build 17134.523

January 08, 2019
KB4480966
Resolved
KB4493464
April 09, 2019
10:00 AM PT
Stop error when attempting to start SSH from WSL
A stop error occurs when attempting to start Secure Shell from Windows Subsystem for Linux with agent forwarding using a command line switch (ssh –A) or a configuration setting.

See details >
OS Build 17134.648

March 12, 2019
KB4489868
Resolved
KB4493464
April 09, 2019
10:00 AM PT
Custom URI schemes may not start corresponding application
Custom URI schemes for application protocol handlers may not start the corresponding application for local intranet and trusted sites in Internet Explorer.

See details >
OS Build 17134.648

March 12, 2019
KB4489868
Mitigated
March 19, 2019
10:00 AM PT
Issue using PXE to start a device from WDS
Using PXE to start a device from a WDS server configured to use Variable Window Extension may cause the connection to the WDS server to terminate prematurely.

See details >
OS Build 17134.648

March 12, 2019
KB4489868
Mitigated
March 19, 2019
10:00 AM PT
" @@ -80,10 +80,11 @@ sections: - type: markdown text: " - - - - + + + +
DetailsAffected buildStatusHistory
End-user-defined characters (EUDC) may cause blue screen at startup
If you enable per font end-user-defined characters (EUDC), the system may stop working and a blue screen may appear at startup. This is not a common setting in non-Asian regions. 

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016
 
Resolution: This issue was resolved in KB4493464

Back to top
OS Build 17134.677

March 19, 2019
KB4489894
Resolved
KB4493464
Resolved:
April 09, 2019 10:00 AM PT

Opened:
March 19, 2019 10:00 AM PT
Stop error when attempting to start SSH from WSL
After applying KB4489868, a stop error occurs when attempting to start the Secure Shell (SSH) client program from Windows Subsystem for Linux (WSL) with agent forwarding enabled using a command line switch (ssh -A) or a configuration setting.

Affected platforms:
  • Client: Windows 10, version 1803; Windows 10, version 1709
  • Server: Windows Server, version 1803; Windows Server, version 1709

Resolution: This issue was resolved in KB4493464.

Back to top
OS Build 17134.648

March 12, 2019
KB4489868
Resolved
KB4493464
Resolved:
April 09, 2019 10:00 AM PT

Opened:
March 12, 2019 10:00 AM PT
Custom URI schemes may not start corresponding application
After installing KB4489868, custom URI schemes for application protocol handlers may not start the corresponding application for local intranet and trusted sites security zones on Internet Explorer. 

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 8.1; Windows 7, Service Pack 1 
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2; Windows Server 2008 R2 SP1

Workaround: Right-click the URL link to open it in a new window or tab, or enable Protected Mode in Internet Explorer for local intranet and trusted sites 
 
  1. Go to Tools > Internet options > Security 
  2. Within Select a zone to view or change security settings, select Local intranet and then select Enable Protected Mode.
  3. Select Trusted sites and then select Enable Protected Mode
  4. Select OK
 
You must restart the browser after making these changes. 
 
Next steps: Microsoft is working on a resolution and will provide an update in an upcoming release. 

Back to top
OS Build 17134.648

March 12, 2019
KB4489868
Mitigated
Last updated:
March 19, 2019 10:00 AM PT

Opened:
March 12, 2019 10:00 AM PT
Issue using PXE to start a device from WDS
After installing KB4489868, there may be issues using the Preboot Execution Environment (PXE) to start a device from a Windows Deployment Services (WDS) server configured to use Variable Window Extension. This may cause the connection to the WDS server to terminate prematurely while downloading the image. This issue does not affect clients or devices that are not using Variable Window Extension. 

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10 Enterprise LTSC 2016; Windows 8.1
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server 2016; Windows Server 2012 R2

Workaround: To mitigate the issue, disable the Variable Window Extension on WDS server using one of the following options: 
 
Option 1: 
Open an Administrator Command prompt and type the following: 
 
Wdsutil /Set-TransportServer /EnableTftpVariableWindowExtension:No
 
Option 2: 
Use the Windows Deployment Services UI to make the following adjustment: 
 
  1. Open Windows Deployment Services from Windows Administrative Tools. 
  2. Expand Servers and right-click a WDS server. 
  3. Open its properties and clear the?Enable Variable Window Extension?box on the TFTP tab. 
 
Option 3: 
Set the following registry value to 0: 
 
HKLM\\System\\CurrentControlSet\\Services\\WDSServer\\Providers\\WDSTFTP\\EnableVariableWindowExtension 
 
Restart the WDSServer service after disabling the Variable Window Extension. 
 
Next steps: Microsoft is working on a resolution and will provide an update in an upcoming release. 

Back to top
OS Build 17134.648

March 12, 2019
KB4489868
Mitigated
Last updated:
March 19, 2019 10:00 AM PT

Opened:
March 12, 2019 10:00 AM PT
End-user-defined characters (EUDC) may cause blue screen at startup
If you enable per font end-user-defined characters (EUDC), the system may stop working and a blue screen may appear at startup. This is not a common setting in non-Asian regions. 

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016
 
Resolution: This issue was resolved in KB4493464

Back to top
OS Build 17134.677

March 19, 2019
KB4489894
Resolved
KB4493464
Resolved:
April 09, 2019
10:00 AM PT

Opened:
March 19, 2019
10:00 AM PT
Stop error when attempting to start SSH from WSL
After applying KB4489868, a stop error occurs when attempting to start the Secure Shell (SSH) client program from Windows Subsystem for Linux (WSL) with agent forwarding enabled using a command line switch (ssh -A) or a configuration setting.

Affected platforms:
  • Client: Windows 10, version 1803; Windows 10, version 1709
  • Server: Windows Server, version 1803; Windows Server, version 1709

Resolution: This issue was resolved in KB4493464.

Back to top
OS Build 17134.648

March 12, 2019
KB4489868
Resolved
KB4493464
Resolved:
April 09, 2019
10:00 AM PT

Opened:
March 12, 2019
10:00 AM PT
Custom URI schemes may not start corresponding application
After installing KB4489868, custom URI schemes for application protocol handlers may not start the corresponding application for local intranet and trusted sites security zones on Internet Explorer. 

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 8.1; Windows 7, Service Pack 1 
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2; Windows Server 2008 R2 SP1

Workaround: Right-click the URL link to open it in a new window or tab, or enable Protected Mode in Internet Explorer for local intranet and trusted sites
  1. Go to Tools > Internet options > Security 
  2. Within Select a zone to view or change security settings, select Local intranet and then select Enable Protected Mode.
  3. Select Trusted sites and then select Enable Protected Mode
  4. Select OK
 You must restart the browser after making these changes. 
 
Next steps: Microsoft is working on a resolution and will provide an update in an upcoming release. 

Back to top
OS Build 17134.648

March 12, 2019
KB4489868
Mitigated
Last updated:
March 19, 2019
10:00 AM PT

Opened:
March 12, 2019
10:00 AM PT
Issue using PXE to start a device from WDS
After installing KB4489868, there may be issues using the Preboot Execution Environment (PXE) to start a device from a Windows Deployment Services (WDS) server configured to use Variable Window Extension. This may cause the connection to the WDS server to terminate prematurely while downloading the image. This issue does not affect clients or devices that are not using Variable Window Extension. 

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10 Enterprise LTSC 2016; Windows 8.1
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server 2016; Windows Server 2012 R2

Workaround: To mitigate the issue, disable the Variable Window Extension on WDS server using one of the following options:
Option 1: 
Open an Administrator Command prompt and type the following:  
Wdsutil /Set-TransportServer /EnableTftpVariableWindowExtension:No
+
 Option 2: 
Use the Windows Deployment Services UI to make the following adjustment:  
  1. Open Windows Deployment Services from Windows Administrative Tools. 
  2. Expand Servers and right-click a WDS server. 
  3. Open its properties and clear the?Enable Variable Window Extension?box on the TFTP tab.  
Option 3: 
Set the following registry value to 0:  
HKLM\\System\\CurrentControlSet\\Services\\WDSServer\\Providers\\WDSTFTP\\EnableVariableWindowExtension  
Restart the WDSServer service after disabling the Variable Window Extension. 
 
Next steps: Microsoft is working on a resolution and will provide an update in an upcoming release. 

Back to top
OS Build 17134.648

March 12, 2019
KB4489868
Mitigated
Last updated:
March 19, 2019
10:00 AM PT

Opened:
March 12, 2019
10:00 AM PT
" @@ -92,6 +93,6 @@ sections: - type: markdown text: " - +
DetailsAffected buildStatusHistory
MSXML6 may cause applications to stop responding
After installing KB4480966, MSXML6 causes applications to stop responding if an exception was thrown during node operations, such as appendChild(), insertBefore(), and moveNode().

The Group Policy editor may stop responding when editing a Group Policy Object (GPO) that contains Group Policy Preferences (GPP) for Internet Explorer 10 settings.

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 8.1
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2

Resolution: This issue was resolved in KB4493464

Back to top
OS Build 17134.523

January 08, 2019
KB4480966
Resolved
KB4493464
Resolved:
April 09, 2019 10:00 AM PT

Opened:
January 08, 2019 10:00 AM PT
MSXML6 may cause applications to stop responding
After installing KB4480966, MSXML6 causes applications to stop responding if an exception was thrown during node operations, such as appendChild(), insertBefore(), and moveNode().

The Group Policy editor may stop responding when editing a Group Policy Object (GPO) that contains Group Policy Preferences (GPP) for Internet Explorer 10 settings.

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 8.1
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2

Resolution: This issue was resolved in KB4493464

Back to top
OS Build 17134.523

January 08, 2019
KB4480966
Resolved
KB4493464
Resolved:
April 09, 2019
10:00 AM PT

Opened:
January 08, 2019
10:00 AM PT
" diff --git a/windows/release-information/status-windows-10-1809-and-windows-server-2019.yml b/windows/release-information/status-windows-10-1809-and-windows-server-2019.yml index 7aca881aa6..f38fa35c52 100644 --- a/windows/release-information/status-windows-10-1809-and-windows-server-2019.yml +++ b/windows/release-information/status-windows-10-1809-and-windows-server-2019.yml @@ -65,13 +65,13 @@ sections: - type: markdown text: "
This table offers a summary of current active issues and those issues that have been resolved in the last 30 days.
- - - - - - - + + + + + + +
SummaryOriginating updateStatusLast updated
End-user-defined characters (EUDC) may cause blue screen at startup
If you enable per font end-user-defined characters (EUDC), the system may stop working and a blue screen may appear at startup.

See details >
OS Build 17763.404

April 02, 2019
KB4490481
Resolved
KB4493509
April 09, 2019 10:00 AM PT
Internet Explorer 11 authentication issue with multiple concurrent logons
Internet Explorer 11 users may encounter issues if two or more people use the same user account for multiple, concurrent login sessions on the same Windows Server machine.

See details >
OS Build 17763.253

January 08, 2019
KB4480116
Resolved
KB4493509
April 09, 2019 10:00 AM PT
MSXML6 may cause applications to stop responding
MSXML6 may cause applications to stop responding if an exception was thrown during node operations, such as appendChild(), insertBefore(), and moveNode().

See details >
OS Build 17763.253

January 08, 2019
KB4480116
Resolved
KB4493509
April 09, 2019 10:00 AM PT
Custom URI schemes may not start corresponding application
Custom URI schemes for application protocol handlers may not start the corresponding application for local intranet and trusted sites in Internet Explorer.

See details >
OS Build 17763.379

March 12, 2019
KB4489899
Mitigated
April 02, 2019 10:00 AM PT
Issue using PXE to start a device from WDS
Using PXE to start a device from a WDS server configured to use Variable Window Extension may cause the connection to the WDS server to terminate prematurely.

See details >
OS Build 17763.379

March 12, 2019
KB4489899
Mitigated
April 02, 2019 10:00 AM PT
Apps may stop working after selecting an audio output device other than the default
Users with multiple audio devices that select an audio output device different from the \"Default Audio Device\" may find certain applications stop working unexpectedly.

See details >
OS Build 17763.348

March 01, 2019
KB4482887
Resolved
KB4490481
April 02, 2019 10:00 AM PT
Audio not working on monitors or TV connected to a PC via HDMI, USB, or DisplayPort
Upgrade block: Microsoft has identified issues with certain new Intel display drivers, which accidentally turn on unsupported features in Windows.

See details >
OS Build 17763.134

November 13, 2018
KB4467708
Mitigated
March 15, 2019 12:00 PM PT
End-user-defined characters (EUDC) may cause blue screen at startup
If you enable per font end-user-defined characters (EUDC), the system may stop working and a blue screen may appear at startup.

See details >
OS Build 17763.404

April 02, 2019
KB4490481
Resolved
KB4493509
April 09, 2019
10:00 AM PT
Internet Explorer 11 authentication issue with multiple concurrent logons
Internet Explorer 11 users may encounter issues if two or more people use the same user account for multiple, concurrent login sessions on the same Windows Server machine.

See details >
OS Build 17763.253

January 08, 2019
KB4480116
Resolved
KB4493509
April 09, 2019
10:00 AM PT
MSXML6 may cause applications to stop responding
MSXML6 may cause applications to stop responding if an exception was thrown during node operations, such as appendChild(), insertBefore(), and moveNode().

See details >
OS Build 17763.253

January 08, 2019
KB4480116
Resolved
KB4493509
April 09, 2019
10:00 AM PT
Custom URI schemes may not start corresponding application
Custom URI schemes for application protocol handlers may not start the corresponding application for local intranet and trusted sites in Internet Explorer.

See details >
OS Build 17763.379

March 12, 2019
KB4489899
Mitigated
April 02, 2019
10:00 AM PT
Issue using PXE to start a device from WDS
Using PXE to start a device from a WDS server configured to use Variable Window Extension may cause the connection to the WDS server to terminate prematurely.

See details >
OS Build 17763.379

March 12, 2019
KB4489899
Mitigated
April 02, 2019
10:00 AM PT
Apps may stop working after selecting an audio output device other than the default
Users with multiple audio devices that select an audio output device different from the \"Default Audio Device\" may find certain applications stop working unexpectedly.

See details >
OS Build 17763.348

March 01, 2019
KB4482887
Resolved
KB4490481
April 02, 2019
10:00 AM PT
Audio not working on monitors or TV connected to a PC via HDMI, USB, or DisplayPort
Upgrade block: Microsoft has identified issues with certain new Intel display drivers, which accidentally turn on unsupported features in Windows.

See details >
OS Build 17763.134

November 13, 2018
KB4467708
Mitigated
March 15, 2019
12:00 PM PT
" @@ -87,7 +87,7 @@ sections: - type: markdown text: " - +
DetailsAffected buildStatusHistory
End-user-defined characters (EUDC) may cause blue screen at startup
If you enable per font end-user-defined characters (EUDC), the system will stop working and a blue screen may appear at startup. This is not a common setting in non-Asian regions.

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016

Workaround: To avoid this issue, don't enable per font EUDC. As an alternative, you can edit the registry to mitigate this issue; for more information, see KB4496149.

Resolved: This issue was resolved in KB4493509.

Back to top
OS Build 17763.404

April 02, 2019
KB4490481
Resolved
KB4493509
Resolved:
April 09, 2019 10:00 AM PT

Opened:
April 02, 2019 10:00 AM PT
End-user-defined characters (EUDC) may cause blue screen at startup
If you enable per font end-user-defined characters (EUDC), the system will stop working and a blue screen may appear at startup. This is not a common setting in non-Asian regions.

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016

Workaround: To avoid this issue, don't enable per font EUDC. As an alternative, you can edit the registry to mitigate this issue; for more information, see KB4496149.

Resolved: This issue was resolved in KB4493509.

Back to top
OS Build 17763.404

April 02, 2019
KB4490481
Resolved
KB4493509
Resolved:
April 09, 2019
10:00 AM PT

Opened:
April 02, 2019
10:00 AM PT
" @@ -96,10 +96,10 @@ sections: - type: markdown text: " - - - + + +
DetailsAffected buildStatusHistory
Custom URI schemes may not start corresponding application
After installing KB4489899, custom URI schemes for application protocol handlers may not start the corresponding application for local intranet and trusted sites security zones on Internet Explorer.

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 8.1; Windows 7, Service Pack 1 
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2; Windows Server 2008 R2 SP1

Workaround: Right-click the URL link to open it in a new window or tab, or enable Protected Mode in Internet Explorer for local intranet and trusted sites 
 
  1. Go to Tools > Internet options > Security.
  2. Within Select a zone to view of change security settings, select Local intranet and then select Enable Protected Mode.
  3. Select Trusted Sites and then select Enable Protected Mode
  4. Select OK.

You must restart the browser after making these changes. 
 
Next steps: Microsoft is working on a resolution and will provide an update in an upcoming release. 

Back to top
OS Build 17763.379

March 12, 2019
KB4489899
Mitigated
Last updated:
April 02, 2019 10:00 AM PT

Opened:
March 12, 2019 10:00 AM PT
Issue using PXE to start a device from WDS
After installing KB4489899, there may be issues using the Preboot Execution Environment (PXE) to start a device from a Windows Deployment Services (WDS) server configured to use Variable Window Extension. This may cause the connection to the WDS server to terminate prematurely while downloading the image. This issue does not affect clients or devices that are not using Variable Window Extension. 

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10 Enterprise LTSC 2016; Windows 8.1
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server 2016; Windows Server 2012 R2

Workaround: To mitigate the issue, disable the Variable Window Extension on WDS server using one of the following options:

Option 1:
Open an Administrator Command prompt and type the following:

Wdsutil /Set-TransportServer /EnableTftpVariableWindowExtension:No 
-

Option 2:
Use the Windows Deployment Services UI to make the following adjustment: 
  1. Open Windows Deployment Services from Windows Administrative Tools. 
  2. Expand Servers and right-click a WDS server. 
  3. Open its properties and clear the Enable Variable Window Extension box on the TFTP tab.

Option 3:
Set the following registry value to 0: 
 
HKLM\\System\\CurrentControlSet\\Services\\WDSServer\\Providers\\WDSTFTP\\EnableVariableWindowExtension 
 
Restart the WDSServer service after disabling the Variable Window Extension. 

Next steps: Microsoft is working on a resolution and will provide an update in an upcoming release. 

Back to top
OS Build 17763.379

March 12, 2019
KB4489899
Mitigated
Last updated:
April 02, 2019 10:00 AM PT

Opened:
March 12, 2019 10:00 AM PT
Apps may stop working after selecting an audio output device other than the default
After installing KB4482887 on machines that have multiple audio devices, applications that provide advanced options for internal or external audio output devices may stop working unexpectedly. This issue occurs for users that select an audio output device different from the \"Default Audio Device\". Examples of applications that may stop working include: 

  • Windows Media Player 
  • Realtek HD Audio Manager 
  • Sound Blaster Control Panel 

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019
  • Server: Windows Server, version 1809; Windows Server 2019

Workaround: As a temporary solution, select the \"Default Audio Device\" in the options provided by the application; please refer to the application's user manual for details. 
For example, to set the Default Audio Device in Windows Media Player: 

  1. Open Windows Media Player > Tools > Options > Devices.
  2. Select the device and choose Properties.
  3. On the next dialog, from the drop-down menu under Select the Audio Device, choose Default Audio Device from the list.
 
You can then send audio from the application to the audio device you want in the per-application audio settings found under Settings > System > Sound > App Volume and device preferences.

Resolved: This issue was resolved in KB4490481

Back to top
OS Build 17763.348

March 01, 2019
KB4482887
Resolved
KB4490481
Resolved:
April 02, 2019 10:00 AM PT

Opened:
March 01, 2019 10:00 AM PT
Custom URI schemes may not start corresponding application
After installing KB4489899, custom URI schemes for application protocol handlers may not start the corresponding application for local intranet and trusted sites security zones on Internet Explorer.

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 8.1; Windows 7, Service Pack 1 
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2; Windows Server 2008 R2 SP1

Workaround: Right-click the URL link to open it in a new window or tab, or enable Protected Mode in Internet Explorer for local intranet and trusted sites
  1. Go to Tools > Internet options > Security.
  2. Within Select a zone to view of change security settings, select Local intranet and then select Enable Protected Mode.
  3. Select Trusted Sites and then select Enable Protected Mode
  4. Select OK.
You must restart the browser after making these changes. 
 
Next steps: Microsoft is working on a resolution and will provide an update in an upcoming release. 

Back to top
OS Build 17763.379

March 12, 2019
KB4489899
Mitigated
Last updated:
April 02, 2019
10:00 AM PT

Opened:
March 12, 2019
10:00 AM PT
Issue using PXE to start a device from WDS
After installing KB4489899, there may be issues using the Preboot Execution Environment (PXE) to start a device from a Windows Deployment Services (WDS) server configured to use Variable Window Extension. This may cause the connection to the WDS server to terminate prematurely while downloading the image. This issue does not affect clients or devices that are not using Variable Window Extension. 

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10 Enterprise LTSC 2016; Windows 8.1
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server 2016; Windows Server 2012 R2

Workaround: To mitigate the issue, disable the Variable Window Extension on WDS server using one of the following options:
Option 1:
Open an Administrator Command prompt and type the following:
Wdsutil /Set-TransportServer /EnableTftpVariableWindowExtension:No 
+
Option 2:
Use the Windows Deployment Services UI to make the following adjustment: 
  1. Open Windows Deployment Services from Windows Administrative Tools. 
  2. Expand Servers and right-click a WDS server. 
  3. Open its properties and clear the Enable Variable Window Extension box on the TFTP tab.
Option 3:
Set the following registry value to 0:  
HKLM\\System\\CurrentControlSet\\Services\\WDSServer\\Providers\\WDSTFTP\\EnableVariableWindowExtension  
Restart the WDSServer service after disabling the Variable Window Extension. 

Next steps: Microsoft is working on a resolution and will provide an update in an upcoming release. 

Back to top
OS Build 17763.379

March 12, 2019
KB4489899
Mitigated
Last updated:
April 02, 2019
10:00 AM PT

Opened:
March 12, 2019
10:00 AM PT
Apps may stop working after selecting an audio output device other than the default
After installing KB4482887 on machines that have multiple audio devices, applications that provide advanced options for internal or external audio output devices may stop working unexpectedly. This issue occurs for users that select an audio output device different from the \"Default Audio Device\". Examples of applications that may stop working include: 
  • Windows Media Player 
  • Realtek HD Audio Manager 
  • Sound Blaster Control Panel 

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019
  • Server: Windows Server, version 1809; Windows Server 2019

Workaround: As a temporary solution, select the \"Default Audio Device\" in the options provided by the application; please refer to the application's user manual for details. 
For example, to set the Default Audio Device in Windows Media Player: 
  1. Open Windows Media Player > Tools > Options > Devices.
  2. Select the device and choose Properties.
  3. On the next dialog, from the drop-down menu under Select the Audio Device, choose Default Audio Device from the list. 
You can then send audio from the application to the audio device you want in the per-application audio settings found under Settings > System > Sound > App Volume and device preferences.

Resolved: This issue was resolved in KB4490481

Back to top
OS Build 17763.348

March 01, 2019
KB4482887
Resolved
KB4490481
Resolved:
April 02, 2019
10:00 AM PT

Opened:
March 01, 2019
10:00 AM PT
" @@ -108,8 +108,8 @@ sections: - type: markdown text: " - - + +
DetailsAffected buildStatusHistory
Internet Explorer 11 authentication issue with multiple concurrent logons
After installing the February 12, 2019 update (KB4487044), Internet Explorer 11 and other applications that use WININET.DLL may have authentication issues. This occurs when two or more people use the same user account for multiple, concurrent login sessions on the same Windows Server machine, including Remote Desktop Protocol (RDP) and Terminal Server logons. Symptoms reported by customers include, but may not be limited to: 
 
  • Cache size and location show zero or empty. 
  • Keyboard shortcuts may not work properly. 
  • Webpages may intermittently fail to load or render correctly. 
  • Issues with credential prompts. 
  • Issues when downloading files. 

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10 Enterprise LTSC 2016; Windows 8.1; Windows 7, Service Pack 1
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server 2016; Windows Server 2012 R2; Windows Server 2008 R2 SP1
 
Resolved: This issue was resolved in KB4493509

Back to top
OS Build 17763.253

January 08, 2019
KB4480116
Resolved
KB4493509
Resolved:
April 09, 2019 10:00 AM PT

Opened:
January 08, 2019 10:00 AM PT
MSXML6 may cause applications to stop responding
After installing KB4480116, MSXML6 causes applications to stop responding if an exception was thrown during node operations, such as appendChild(), insertBefore(), and moveNode().
 
The Group Policy editor may stop responding when editing a Group Policy Object (GPO) that contains Group Policy Preferences (GPP) for Internet Explorer 10 settings. 

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 8.1
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2

Resolved: This issue was resolved in KB4493509

Back to top
OS Build 17763.253

January 08, 2019
KB4480116
Resolved
KB4493509
Resolved:
April 09, 2019 10:00 AM PT

Opened:
January 08, 2019 10:00 AM PT
Internet Explorer 11 authentication issue with multiple concurrent logons
After installing the February 12, 2019 update (KB4487044), Internet Explorer 11 and other applications that use WININET.DLL may have authentication issues. This occurs when two or more people use the same user account for multiple, concurrent login sessions on the same Windows Server machine, including Remote Desktop Protocol (RDP) and Terminal Server logons. Symptoms reported by customers include, but may not be limited to:  
  • Cache size and location show zero or empty. 
  • Keyboard shortcuts may not work properly. 
  • Webpages may intermittently fail to load or render correctly. 
  • Issues with credential prompts. 
  • Issues when downloading files. 

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10 Enterprise LTSC 2016; Windows 8.1; Windows 7, Service Pack 1
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server 2016; Windows Server 2012 R2; Windows Server 2008 R2 SP1
 
Resolved: This issue was resolved in KB4493509

Back to top
OS Build 17763.253

January 08, 2019
KB4480116
Resolved
KB4493509
Resolved:
April 09, 2019
10:00 AM PT

Opened:
January 08, 2019
10:00 AM PT
MSXML6 may cause applications to stop responding
After installing KB4480116, MSXML6 causes applications to stop responding if an exception was thrown during node operations, such as appendChild(), insertBefore(), and moveNode().
 
The Group Policy editor may stop responding when editing a Group Policy Object (GPO) that contains Group Policy Preferences (GPP) for Internet Explorer 10 settings. 

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 8.1
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2

Resolved: This issue was resolved in KB4493509

Back to top
OS Build 17763.253

January 08, 2019
KB4480116
Resolved
KB4493509
Resolved:
April 09, 2019
10:00 AM PT

Opened:
January 08, 2019
10:00 AM PT
" @@ -118,6 +118,6 @@ sections: - type: markdown text: " - +
DetailsAffected buildStatusHistory
Audio not working on monitors or TV connected to a PC via HDMI, USB, or DisplayPort
Upgrade block: Microsoft has identified issues with certain new Intel display drivers. Intel inadvertently released versions of its display driver (versions 24.20.100.6344, 24.20.100.6345) to OEMs that accidentally turned on unsupported features in Windows. 
 
As a result, after updating to Windows 10, version 1809, audio playback from a monitor or television connected to a PC via HDMI, USB-C, or a DisplayPort may not function correctly on devices with these drivers.

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019
  • Server: Windows Server, version 1809; Windows Server 2019 

Next steps: Intel has released updated drivers to OEM device manufacturers. OEMs need to make the updated driver available via Windows Update.

For more information, see the Intel Customer Support article.

Note: This Intel display driver issue is different from the Intel Smart Sound Technology driver (version 09.21.00.3755) audio issue previously documented.

Back to top
OS Build 17763.134

November 13, 2018
KB4467708
Mitigated
Last updated:
March 15, 2019 12:00 PM PT

Opened:
November 13, 2018 10:00 AM PT
Audio not working on monitors or TV connected to a PC via HDMI, USB, or DisplayPort
Upgrade block: Microsoft has identified issues with certain new Intel display drivers. Intel inadvertently released versions of its display driver (versions 24.20.100.6344, 24.20.100.6345) to OEMs that accidentally turned on unsupported features in Windows. 
 
As a result, after updating to Windows 10, version 1809, audio playback from a monitor or television connected to a PC via HDMI, USB-C, or a DisplayPort may not function correctly on devices with these drivers.

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019
  • Server: Windows Server, version 1809; Windows Server 2019 

Next steps: Intel has released updated drivers to OEM device manufacturers. OEMs need to make the updated driver available via Windows Update.

For more information, see the Intel Customer Support article.

Note: This Intel display driver issue is different from the Intel Smart Sound Technology driver (version 09.21.00.3755) audio issue previously documented.

Back to top
OS Build 17763.134

November 13, 2018
KB4467708
Mitigated
Last updated:
March 15, 2019
12:00 PM PT

Opened:
November 13, 2018
10:00 AM PT
" diff --git a/windows/release-information/status-windows-7-and-windows-server-2008-r2-sp1.yml b/windows/release-information/status-windows-7-and-windows-server-2008-r2-sp1.yml index 78608d0fff..7d740a94cb 100644 --- a/windows/release-information/status-windows-7-and-windows-server-2008-r2-sp1.yml +++ b/windows/release-information/status-windows-7-and-windows-server-2008-r2-sp1.yml @@ -60,16 +60,16 @@ sections: - type: markdown text: "
This table offers a summary of current active issues and those issues that have been resolved in the last 30 days.
- - - - - - - - - - + + + + + + + + + +
SummaryOriginating updateStatusLast updated
Virtual machines fail to restore.
Virtual machines (VMs) may fail to restore successfully if the VM has been saved and restored once before.

See details >
January 08, 2019
KB4480970
Resolved
KB4490511
April 21, 2019 12:00 AM PT
Local Administrators unable to remotely access shares.
Local users who are part of the local Administrators group may not be able to remotely access shares on Windows Server 2008 R2 and Windows 7 machines.

See details >
January 08, 2019
KB4480970
Resolved
KB4487345
April 20, 2019 11:53 PM PT
System may be unresponsive after restart if Avira antivirus software installed.
Devices with Avira antivirus software installed may become unresponsive upon restart.

See details >
April 09, 2019
KB4493472
Investigating
April 09, 2019 10:00 AM PT
Authentication may fail for services after the Kerberos ticket expires.
Authentication may fail for services that require unconstrained delegation after the Kerberos ticket expires.

See details >
March 12, 2019
KB4489878
Mitigated
April 09, 2019 10:00 AM PT
System unresponsive after restart if Sophos Endpoint Protection installed.
Devices with Sophos Endpoint Protection installed and managed by Sophos Central or Sophos Enterprise Console (SEC) may become unresponsive upon restart.

See details >
April 09, 2019
KB4493472
Mitigated
April 09, 2019 10:00 AM PT
System may be unresponsive after restart if ArcaBit antivirus software installed.
Devices with ArcaBit antivirus software installed may become unresponsive upon restart.

See details >
April 09, 2019
KB4493472
Mitigated
April 09, 2019 10:00 AM PT
Internet Explorer 11 authentication issue with multiple concurrent logons.
Internet Explorer 11 users may encounter issues if two or more people use the same user account for multiple, concurrent login sessions on the same Windows Server machine.

See details >
January 08, 2019
KB4480970
Resolved
KB4493472
April 09, 2019 10:00 AM PT
Custom URI schemes may not start corresponding application.
Custom URI schemes for application protocol handlers may not start the corresponding application for local intranet and trusted sites in Internet Explorer.

See details >
March 12, 2019
KB4489878
Resolved
KB4493472
April 09, 2019 10:00 AM PT
NETDOM.EXE fails to run.
NETDOM.EXE fails to run and the error, “The command failed to complete successfully.” appears on screen.

See details >
March 12, 2019
KB4489878
Resolved
KB4493472
April 09, 2019 10:00 AM PT
Devices may not respond at login or Welcome screen if running certain Avast software.
Devices running Avast for Business, Avast CloudCare, and AVG Business Edition antivirus software may become unresponsive after restart.

See details >
April 09, 2019
KB4493472
Resolved
April 09, 2019 10:00 AM PT
Virtual machines fail to restore.
Virtual machines (VMs) may fail to restore successfully if the VM has been saved and restored once before.

See details >
January 08, 2019
KB4480970
Resolved
KB4490511
April 21, 2019
12:00 AM PT
Local Administrators unable to remotely access shares.
Local users who are part of the local Administrators group may not be able to remotely access shares on Windows Server 2008 R2 and Windows 7 machines.

See details >
January 08, 2019
KB4480970
Resolved
KB4487345
April 20, 2019
11:53 PM PT
System may be unresponsive after restart if Avira antivirus software installed.
Devices with Avira antivirus software installed may become unresponsive upon restart.

See details >
April 09, 2019
KB4493472
Investigating
April 09, 2019
10:00 AM PT
Authentication may fail for services after the Kerberos ticket expires.
Authentication may fail for services that require unconstrained delegation after the Kerberos ticket expires.

See details >
March 12, 2019
KB4489878
Mitigated
April 09, 2019
10:00 AM PT
System unresponsive after restart if Sophos Endpoint Protection installed.
Devices with Sophos Endpoint Protection installed and managed by Sophos Central or Sophos Enterprise Console (SEC) may become unresponsive upon restart.

See details >
April 09, 2019
KB4493472
Mitigated
April 09, 2019
10:00 AM PT
System may be unresponsive after restart if ArcaBit antivirus software installed.
Devices with ArcaBit antivirus software installed may become unresponsive upon restart.

See details >
April 09, 2019
KB4493472
Mitigated
April 09, 2019
10:00 AM PT
Internet Explorer 11 authentication issue with multiple concurrent logons.
Internet Explorer 11 users may encounter issues if two or more people use the same user account for multiple, concurrent login sessions on the same Windows Server machine.

See details >
January 08, 2019
KB4480970
Resolved
KB4493472
April 09, 2019
10:00 AM PT
Custom URI schemes may not start corresponding application.
Custom URI schemes for application protocol handlers may not start the corresponding application for local intranet and trusted sites in Internet Explorer.

See details >
March 12, 2019
KB4489878
Resolved
KB4493472
April 09, 2019
10:00 AM PT
NETDOM.EXE fails to run.
NETDOM.EXE fails to run and the error, “The command failed to complete successfully.” appears on screen.

See details >
March 12, 2019
KB4489878
Resolved
KB4493472
April 09, 2019
10:00 AM PT
Devices may not respond at login or Welcome screen if running certain Avast software.
Devices running Avast for Business, Avast CloudCare, and AVG Business Edition antivirus software may become unresponsive after restart.

See details >
April 09, 2019
KB4493472
Resolved
April 09, 2019
10:00 AM PT
" @@ -85,10 +85,10 @@ sections: - type: markdown text: " - - - - + + + +
DetailsAffected buildStatusHistory
System may be unresponsive after restart if Avira antivirus software installed.
Microsoft and Avira have identified an issue on devices with Avira antivirus software installed that may cause the system to become unresponsive upon restart after installing KB4493472.

Microsoft has temporarily blocked devices from receiving this update if Avira antivirus software is installed.

Next steps: We are presently investigating this issue with Avira and will provide an update when available.

Back to top
April 09, 2019
KB4493472
Investigating
Last updated:
April 09, 2019 10:00 AM PT

Opened:
April 09, 2019 10:00 AM PT
System unresponsive after restart if Sophos Endpoint Protection installed.
Microsoft and Sophos have identified an issue on devices with Sophos Endpoint Protection installed and managed by either Sophos Central or Sophos Enterprise Console (SEC) that may cause the system to become unresponsive upon restart after installing KB4493472.

Microsoft has temporarily blocked devices from receiving this update if the Sophos Endpoint is installed until a solution is available.

Guidance for Sophos Endpoint and Sophos Enterprise Console customers can be found in the Sophos support article.

Back to top
April 09, 2019
KB4493472
Mitigated
Last updated:
April 09, 2019 10:00 AM PT

Opened:
April 09, 2019 10:00 AM PT
System may be unresponsive after restart if ArcaBit antivirus software installed.
Microsoft and ArcaBit have identified an issue on devices with ArcaBit antivirus software installed that may cause the system to become unresponsive upon restart after installing KB4493472.

Microsoft has temporarily blocked devices from receiving this update if ArcaBit antivirus software is installed.

ArcaBit has released an update to address this issue. For more information, see the Arcabit support article.

Back to top
April 09, 2019
KB4493472
Mitigated
Last updated:
April 09, 2019 10:00 AM PT

Opened:
April 09, 2019 10:00 AM PT
Devices may not respond at login or Welcome screen if running certain Avast software.
Microsoft and Avast have identified an issue on devices running Avast for Business, Avast CloudCare, and AVG Business Edition antivirus software after you install KB4493472 and restart. Devices may become unresponsive at the login or Welcome screen. Additionally, you may be unable to log in or log in after an extended period of time.

Affected platforms: 
  • Client: Windows 8.1; Windows 7, Service Pack 1 
  • Server: Windows Server 2012 R2; Windows Server 2008 R2 SP1 

Resolution: Avast has released emergency updates to address this issue. For more information and AV update schedule, see the Avast support KB article.

Back to top
April 09, 2019
KB4493472
Resolved
Resolved:
April 09, 2019 10:00 AM PT

Opened:
April 09, 2019 10:00 AM PT
System may be unresponsive after restart if Avira antivirus software installed.
Microsoft and Avira have identified an issue on devices with Avira antivirus software installed that may cause the system to become unresponsive upon restart after installing KB4493472.

Microsoft has temporarily blocked devices from receiving this update if Avira antivirus software is installed.

Next steps: We are presently investigating this issue with Avira and will provide an update when available.

Back to top
April 09, 2019
KB4493472
Investigating
Last updated:
April 09, 2019
10:00 AM PT

Opened:
April 09, 2019
10:00 AM PT
System unresponsive after restart if Sophos Endpoint Protection installed.
Microsoft and Sophos have identified an issue on devices with Sophos Endpoint Protection installed and managed by either Sophos Central or Sophos Enterprise Console (SEC) that may cause the system to become unresponsive upon restart after installing KB4493472.

Microsoft has temporarily blocked devices from receiving this update if the Sophos Endpoint is installed until a solution is available.

Guidance for Sophos Endpoint and Sophos Enterprise Console customers can be found in the Sophos support article.

Back to top
April 09, 2019
KB4493472
Mitigated
Last updated:
April 09, 2019
10:00 AM PT

Opened:
April 09, 2019
10:00 AM PT
System may be unresponsive after restart if ArcaBit antivirus software installed.
Microsoft and ArcaBit have identified an issue on devices with ArcaBit antivirus software installed that may cause the system to become unresponsive upon restart after installing KB4493472.

Microsoft has temporarily blocked devices from receiving this update if ArcaBit antivirus software is installed.

ArcaBit has released an update to address this issue. For more information, see the Arcabit support article.

Back to top
April 09, 2019
KB4493472
Mitigated
Last updated:
April 09, 2019
10:00 AM PT

Opened:
April 09, 2019
10:00 AM PT
Devices may not respond at login or Welcome screen if running certain Avast software.
Microsoft and Avast have identified an issue on devices running Avast for Business, Avast CloudCare, and AVG Business Edition antivirus software after you install KB4493472 and restart. Devices may become unresponsive at the login or Welcome screen. Additionally, you may be unable to log in or log in after an extended period of time.

Affected platforms: 
  • Client: Windows 8.1; Windows 7, Service Pack 1 
  • Server: Windows Server 2012 R2; Windows Server 2008 R2 SP1 

Resolution: Avast has released emergency updates to address this issue. For more information and AV update schedule, see the Avast support KB article.

Back to top
April 09, 2019
KB4493472
Resolved
Resolved:
April 09, 2019
10:00 AM PT

Opened:
April 09, 2019
10:00 AM PT
" @@ -97,9 +97,9 @@ sections: - type: markdown text: " - - - + + +
DetailsAffected buildStatusHistory
Authentication may fail for services after the Kerberos ticket expires.
After installing KB4489878, some customers report that authentication fails for services that require unconstrained delegation after the Kerberos ticket expires (the default is 10 hours). For example, the SQL server service fails.

Workaround: To mitigate this issue, use one of the following options:

  • Option 1: Purge the Kerberos tickets on the application server. After the Kerberos ticket expires, the issue will occur again, and you must purge the tickets again.
  • Option 2: If purging does not mitigate the issue, restart the application; for example, restart the Internet Information Services (IIS) app pool associated with the SQL server.
  • Option 3: Use constrained delegation.

Next steps: Microsoft is working on a resolution and will provide an update in an upcoming release.

Back to top
March 12, 2019
KB4489878
Mitigated
Last updated:
April 09, 2019 10:00 AM PT

Opened:
March 12, 2019 10:00 AM PT
Custom URI schemes may not start corresponding application.
After installing KB4489878, custom URI schemes for application protocol handlers may not start the corresponding application for local intranet and trusted sites on Internet Explorer.

Affected platforms: 
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 8.1; Windows 7, Service Pack 1 
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2; Windows Server 2008 R2 SP1 

Resolution: This issue is resolved in KB4493472.

Back to top
March 12, 2019
KB4489878
Resolved
KB4493472
Resolved:
April 09, 2019 10:00 AM PT

Opened:
March 12, 2019 10:00 AM PT
NETDOM.EXE fails to run.
After installing KB4489878, NETDOM.EXE fails to run, and the on-screen error, “The command failed to complete successfully.” appears.

Affected platforms: 
  • Client: Windows 7, Service Pack 1 
  • Server: Windows Server 2008 R2 SP1 

Resolution: This issue is resolved in KB4493472.

Back to top
March 12, 2019
KB4489878
Resolved
KB4493472
Resolved:
April 09, 2019 10:00 AM PT

Opened:
March 12, 2019 10:00 AM PT
Authentication may fail for services after the Kerberos ticket expires.
After installing KB4489878, some customers report that authentication fails for services that require unconstrained delegation after the Kerberos ticket expires (the default is 10 hours). For example, the SQL server service fails.

Workaround: To mitigate this issue, use one of the following options:

  • Option 1: Purge the Kerberos tickets on the application server. After the Kerberos ticket expires, the issue will occur again, and you must purge the tickets again.
  • Option 2: If purging does not mitigate the issue, restart the application; for example, restart the Internet Information Services (IIS) app pool associated with the SQL server.
  • Option 3: Use constrained delegation.

Next steps: Microsoft is working on a resolution and will provide an update in an upcoming release.

Back to top
March 12, 2019
KB4489878
Mitigated
Last updated:
April 09, 2019
10:00 AM PT

Opened:
March 12, 2019
10:00 AM PT
Custom URI schemes may not start corresponding application.
After installing KB4489878, custom URI schemes for application protocol handlers may not start the corresponding application for local intranet and trusted sites on Internet Explorer.

Affected platforms: 
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 8.1; Windows 7, Service Pack 1 
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2; Windows Server 2008 R2 SP1 

Resolution: This issue is resolved in KB4493472.

Back to top
March 12, 2019
KB4489878
Resolved
KB4493472
Resolved:
April 09, 2019
10:00 AM PT

Opened:
March 12, 2019
10:00 AM PT
NETDOM.EXE fails to run.
After installing KB4489878, NETDOM.EXE fails to run, and the on-screen error, “The command failed to complete successfully.” appears.

Affected platforms: 
  • Client: Windows 7, Service Pack 1 
  • Server: Windows Server 2008 R2 SP1 

Resolution: This issue is resolved in KB4493472.

Back to top
March 12, 2019
KB4489878
Resolved
KB4493472
Resolved:
April 09, 2019
10:00 AM PT

Opened:
March 12, 2019
10:00 AM PT
" @@ -108,8 +108,8 @@ sections: - type: markdown text: " - - - + + +
DetailsAffected buildStatusHistory
Virtual machines fail to restore.
After installing KB4480970, virtual machines (VM) may fail to restore successfully if the VM has been saved and restored once before. The error message is, “Failed to restore the virtual machine state: Cannot restore this virtual machine because the saved state data cannot be read. Delete the saved state data and then try to start the virtual machine. (0xC0370027).”

This affects AMD Bulldozer Family 15h, AMD Jaguar Family 16h, and AMD Puma Family 16h (second generation) microarchitectures.

Affected platforms: 
  • Client: Windows 7, Service Pack 1 
  • Server: Windows Server 2008 R2 SP1 

Resolution: This issue is resolved in KB4490511.

Back to top
January 08, 2019
KB4480970
Resolved
KB4490511
Resolved:
February 19, 2019 02:00 PM PT

Opened:
January 08, 2019 10:00 AM PT
Local Administrators unable to remotely access shares.
Local users who are part of the local Administrators group may not be able to remotely access shares on Windows Server 2008 R2 and Windows 7 machines after installing KB4480970. This does not affect domain accounts in the local Administrators group.
 
Affected platforms: 
  • Client: Windows 7, Service Pack 1 
  • Server: Windows Server 2008 R2 SP1 

Resolution: This issue is resolved in KB4487345.

Back to top
January 08, 2019
KB4480970
Resolved
KB4487345
Resolved:
January 11, 2019 02:00 PM PT

Opened:
January 08, 2019 10:00 AM PT
Internet Explorer 11 authentication issue with multiple concurrent logons.
After installing KB4480970, Internet Explorer 11 and other applications that use WININET.DLL may have authentication issues. This occurs when two or more people use the same user account for multiple, concurrent login sessions on the same Windows Server machine, including Remote Desktop Protocol (RDP) and Terminal Server logons. Symptoms reported by customers include, but may not be limited to:

  • Cache size and location show zero or empty.
  • Keyboard shortcuts may not work properly.
  • Webpages may intermittently fail to load or render correctly.
  • Issues with credential prompts.
  • Issues when downloading files.

Affected platforms: 
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10 Enterprise LTSC 2016; Windows 8.1; Windows 7, Service Pack 1 
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server 2016; Windows Server 2012 R2; Windows Server 2008 R2 SP1 

Resolution: This issue is resolved in KB4493472.

Back to top
January 08, 2019
KB4480970
Resolved
KB4493472
Resolved:
April 09, 2019 10:00 AM PT

Opened:
January 08, 2019 10:00 AM PT
Virtual machines fail to restore.
After installing KB4480970, virtual machines (VM) may fail to restore successfully if the VM has been saved and restored once before. The error message is, “Failed to restore the virtual machine state: Cannot restore this virtual machine because the saved state data cannot be read. Delete the saved state data and then try to start the virtual machine. (0xC0370027).”

This affects AMD Bulldozer Family 15h, AMD Jaguar Family 16h, and AMD Puma Family 16h (second generation) microarchitectures.

Affected platforms: 
  • Client: Windows 7, Service Pack 1 
  • Server: Windows Server 2008 R2 SP1 

Resolution: This issue is resolved in KB4490511.

Back to top
January 08, 2019
KB4480970
Resolved
KB4490511
Resolved:
February 19, 2019
02:00 PM PT

Opened:
January 08, 2019
10:00 AM PT
Local Administrators unable to remotely access shares.
Local users who are part of the local Administrators group may not be able to remotely access shares on Windows Server 2008 R2 and Windows 7 machines after installing KB4480970. This does not affect domain accounts in the local Administrators group.
 
Affected platforms: 
  • Client: Windows 7, Service Pack 1 
  • Server: Windows Server 2008 R2 SP1 

Resolution: This issue is resolved in KB4487345.

Back to top
January 08, 2019
KB4480970
Resolved
KB4487345
Resolved:
January 11, 2019
02:00 PM PT

Opened:
January 08, 2019
10:00 AM PT
Internet Explorer 11 authentication issue with multiple concurrent logons.
After installing KB4480970, Internet Explorer 11 and other applications that use WININET.DLL may have authentication issues. This occurs when two or more people use the same user account for multiple, concurrent login sessions on the same Windows Server machine, including Remote Desktop Protocol (RDP) and Terminal Server logons. Symptoms reported by customers include, but may not be limited to:
  • Cache size and location show zero or empty.
  • Keyboard shortcuts may not work properly.
  • Webpages may intermittently fail to load or render correctly.
  • Issues with credential prompts.
  • Issues when downloading files.

Affected platforms: 
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10 Enterprise LTSC 2016; Windows 8.1; Windows 7, Service Pack 1 
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server 2016; Windows Server 2012 R2; Windows Server 2008 R2 SP1 

Resolution: This issue is resolved in KB4493472.

Back to top
January 08, 2019
KB4480970
Resolved
KB4493472
Resolved:
April 09, 2019
10:00 AM PT

Opened:
January 08, 2019
10:00 AM PT
" diff --git a/windows/release-information/status-windows-8.1-and-windows-server-2012-r2.yml b/windows/release-information/status-windows-8.1-and-windows-server-2012-r2.yml index 38b8202f87..ccc67d41d8 100644 --- a/windows/release-information/status-windows-8.1-and-windows-server-2012-r2.yml +++ b/windows/release-information/status-windows-8.1-and-windows-server-2012-r2.yml @@ -60,16 +60,16 @@ sections: - type: markdown text: "
This table offers a summary of current active issues and those issues that have been resolved in the last 30 days.
- - - - - - - - - - + + + + + + + + + +
SummaryOriginating updateStatusLast updated
System may be unresponsive after restart if Avira antivirus software installed
Devices with Avira antivirus software installed may become unresponsive upon restart.

See details >
April 09, 2019
KB4493446
Investigating
April 09, 2019 10:00 AM PT
Issue using PXE to start a device from WDS
There may be issues using the Preboot Execution Environment (PXE) to start a device from a Windows Deployment Services (WDS) server configured to use Variable Window Extension.

See details >
March 12, 2019
KB4489881
Mitigated
April 09, 2019 10:00 AM PT
System unresponsive after restart if Sophos Endpoint Protection installed
Devices with Sophos Endpoint Protection installed and managed by Sophos Central or Sophos Enterprise Console (SEC) may become unresponsive upon restart.

See details >
April 09, 2019
KB4493446
Mitigated
April 09, 2019 10:00 AM PT
System may be unresponsive after restart if ArcaBit antivirus software installed
Devices with ArcaBit antivirus software installed may become unresponsive upon restart.

See details >
April 09, 2019
KB4493446
Mitigated
April 09, 2019 10:00 AM PT
Certain operations performed on on a Cluster Shared Volume may fail
Certain operations, such as rename, performed on files or folders on a Cluster Shared Volume (CSV) may fail with the error, “STATUS_BAD_IMPERSONATION_LEVEL (0xC00000A5)”.

See details >
April 09, 2019
KB4493446
Mitigated
April 09, 2019 10:00 AM PT
Internet Explorer 11 authentication issue with multiple concurrent logons
Internet Explorer 11 users may encounter issues if two or more people use the same user account for multiple, concurrent login sessions on the same Windows Server machine.

See details >
January 08, 2019
KB4480963
Resolved
KB4493446
April 09, 2019 10:00 AM PT
MSXML6 may cause applications to stop responding.
MSXML6 may cause applications to stop responding if an exception was thrown during node operations, such as appendChild(), insertBefore(), and moveNode().

See details >
January 08, 2019
KB4480963
Resolved
KB4493446
April 09, 2019 10:00 AM PT
Custom URI schemes may not start corresponding application
Custom URI schemes for application protocol handlers may not start the corresponding application for local intranet and trusted sites in Internet Explorer.

See details >
March 12, 2019
KB4489881
Resolved
KB4493446
April 09, 2019 10:00 AM PT
Devices may not respond at login or Welcome screen if running certain Avast software
Devices running Avast for Business, Avast CloudCare, and AVG Business Edition antivirus software may become unresponsive after restart.

See details >
April 09, 2019
KB4493446
Resolved
April 09, 2019 10:00 AM PT
Embedded objects may display incorrectly
Any compound document (OLE) server application that places embedded objects into the Windows Metafile (WMF) using the PatBlt API may display embedded objects incorrectly.

See details >
February 12, 2019
KB4487000
Resolved
KB4493446
April 09, 2019 10:00 AM PT
System may be unresponsive after restart if Avira antivirus software installed
Devices with Avira antivirus software installed may become unresponsive upon restart.

See details >
April 09, 2019
KB4493446
Investigating
April 09, 2019
10:00 AM PT
Issue using PXE to start a device from WDS
There may be issues using the Preboot Execution Environment (PXE) to start a device from a Windows Deployment Services (WDS) server configured to use Variable Window Extension.

See details >
March 12, 2019
KB4489881
Mitigated
April 09, 2019
10:00 AM PT
System unresponsive after restart if Sophos Endpoint Protection installed
Devices with Sophos Endpoint Protection installed and managed by Sophos Central or Sophos Enterprise Console (SEC) may become unresponsive upon restart.

See details >
April 09, 2019
KB4493446
Mitigated
April 09, 2019
10:00 AM PT
System may be unresponsive after restart if ArcaBit antivirus software installed
Devices with ArcaBit antivirus software installed may become unresponsive upon restart.

See details >
April 09, 2019
KB4493446
Mitigated
April 09, 2019
10:00 AM PT
Certain operations performed on on a Cluster Shared Volume may fail
Certain operations, such as rename, performed on files or folders on a Cluster Shared Volume (CSV) may fail with the error, “STATUS_BAD_IMPERSONATION_LEVEL (0xC00000A5)”.

See details >
April 09, 2019
KB4493446
Mitigated
April 09, 2019
10:00 AM PT
Internet Explorer 11 authentication issue with multiple concurrent logons
Internet Explorer 11 users may encounter issues if two or more people use the same user account for multiple, concurrent login sessions on the same Windows Server machine.

See details >
January 08, 2019
KB4480963
Resolved
KB4493446
April 09, 2019
10:00 AM PT
MSXML6 may cause applications to stop responding.
MSXML6 may cause applications to stop responding if an exception was thrown during node operations, such as appendChild(), insertBefore(), and moveNode().

See details >
January 08, 2019
KB4480963
Resolved
KB4493446
April 09, 2019
10:00 AM PT
Custom URI schemes may not start corresponding application
Custom URI schemes for application protocol handlers may not start the corresponding application for local intranet and trusted sites in Internet Explorer.

See details >
March 12, 2019
KB4489881
Resolved
KB4493446
April 09, 2019
10:00 AM PT
Devices may not respond at login or Welcome screen if running certain Avast software
Devices running Avast for Business, Avast CloudCare, and AVG Business Edition antivirus software may become unresponsive after restart.

See details >
April 09, 2019
KB4493446
Resolved
April 09, 2019
10:00 AM PT
Embedded objects may display incorrectly
Any compound document (OLE) server application that places embedded objects into the Windows Metafile (WMF) using the PatBlt API may display embedded objects incorrectly.

See details >
February 12, 2019
KB4487000
Resolved
KB4493446
April 09, 2019
10:00 AM PT
" @@ -85,11 +85,11 @@ sections: - type: markdown text: " - - - - - + + + + +
DetailsAffected buildStatusHistory
System may be unresponsive after restart if Avira antivirus software installed
Microsoft and Avira have identified an issue on devices with Avira antivirus software installed that may cause the system to become unresponsive upon restart after installing KB4493446.

Microsoft has temporarily blocked devices from receiving this update if Avira antivirus software is installed.

Affected platforms: 
  • Client: Windows 8.1; Windows 7, Service Pack 1 
  • Server: Windows Server 2012 R2; Windows Server 2008 R2 SP1 

Next steps: We are presently investigating this issue with Avira and will provide an update when available.

Back to top
April 09, 2019
KB4493446
Investigating
Last updated:
April 09, 2019 10:00 AM PT

Opened:
April 09, 2019 10:00 AM PT
System unresponsive after restart if Sophos Endpoint Protection installed
Microsoft and Sophos have identified an issue on devices with Sophos Endpoint Protection installed and managed by either Sophos Central or Sophos Enterprise Console (SEC) that may cause the system to become unresponsive upon restart after installing KB4493446.

Microsoft has temporarily blocked devices from receiving this update if the Sophos Endpoint is installed until a solution is available.

Affected platforms: 
  • Client: Windows 8.1; Windows 7, Service Pack 1 
  • Server: Windows Server 2012 R2; Windows Server 2008 R2 SP1 

Guidance for Sophos Endpoint and Sophos Enterprise Console customers can be found in the Sophos support article.

Back to top
April 09, 2019
KB4493446
Mitigated
Last updated:
April 09, 2019 10:00 AM PT

Opened:
April 09, 2019 10:00 AM PT
System may be unresponsive after restart if ArcaBit antivirus software installed
Microsoft and ArcaBit have identified an issue on devices with ArcaBit antivirus software installed that may cause the system to become unresponsive upon restart after installing KB4493446.

Microsoft has temporarily blocked devices from receiving this update if ArcaBit antivirus software is installed.

Affected platforms: 
  • Client: Windows 8.1; Windows 7, Service Pack 1 
  • Server: Windows Server 2012 R2; Windows Server 2008 R2 SP1 

ArcaBit has released an update to address this issue. For more information, see the Arcabit support article.

Back to top
April 09, 2019
KB4493446
Mitigated
Last updated:
April 09, 2019 10:00 AM PT

Opened:
April 09, 2019 10:00 AM PT
Certain operations performed on on a Cluster Shared Volume may fail
Certain operations, such as rename, that you perform on files or folders that are on a Cluster Shared Volume (CSV) may fail with the error, “STATUS_BAD_IMPERSONATION_LEVEL (0xC00000A5)”. This occurs when you perform the operation on a CSV owner node from a process that doesn’t have administrator privilege.

Affected platforms: 
  • Client: Windows 8.1 
  • Server: Windows Server 2012 R2 

Workaround: Do one of the following:

  • Perform the operation from a process that has administrator privilege.
  • Perform the operation from a node that doesn’t have CSV ownership.

Next steps: Microsoft is working on a resolution and will provide an update in an upcoming release.

Back to top
April 09, 2019
KB4493446
Mitigated
Last updated:
April 09, 2019 10:00 AM PT

Opened:
April 09, 2019 10:00 AM PT
Devices may not respond at login or Welcome screen if running certain Avast software
Microsoft and Avast have identified an issue on devices running Avast for Business, Avast CloudCare, and AVG Business Edition antivirus software after you install KB4493446 and restart. Devices may become unresponsive at the login or Welcome screen. Additionally, you may be unable to log in or log in after an extended period of time.

Affected platforms: 
  • Client: Windows 8.1; Windows 7, Service Pack 1 
  • Server: Windows Server 2012 R2; Windows Server 2008 R2 SP1 


Resolution: Avast has released emergency updates to address this issue. For more information and AV update schedule, see the Avast support KB article.

Back to top
April 09, 2019
KB4493446
Resolved
Resolved:
April 09, 2019 10:00 AM PT

Opened:
April 09, 2019 10:00 AM PT
System may be unresponsive after restart if Avira antivirus software installed
Microsoft and Avira have identified an issue on devices with Avira antivirus software installed that may cause the system to become unresponsive upon restart after installing KB4493446.

Microsoft has temporarily blocked devices from receiving this update if Avira antivirus software is installed.

Affected platforms: 
  • Client: Windows 8.1; Windows 7, Service Pack 1 
  • Server: Windows Server 2012 R2; Windows Server 2008 R2 SP1 

Next steps: We are presently investigating this issue with Avira and will provide an update when available.

Back to top
April 09, 2019
KB4493446
Investigating
Last updated:
April 09, 2019
10:00 AM PT

Opened:
April 09, 2019
10:00 AM PT
System unresponsive after restart if Sophos Endpoint Protection installed
Microsoft and Sophos have identified an issue on devices with Sophos Endpoint Protection installed and managed by either Sophos Central or Sophos Enterprise Console (SEC) that may cause the system to become unresponsive upon restart after installing KB4493446.

Microsoft has temporarily blocked devices from receiving this update if the Sophos Endpoint is installed until a solution is available.

Affected platforms: 
  • Client: Windows 8.1; Windows 7, Service Pack 1 
  • Server: Windows Server 2012 R2; Windows Server 2008 R2 SP1 

Guidance for Sophos Endpoint and Sophos Enterprise Console customers can be found in the Sophos support article.

Back to top
April 09, 2019
KB4493446
Mitigated
Last updated:
April 09, 2019
10:00 AM PT

Opened:
April 09, 2019
10:00 AM PT
System may be unresponsive after restart if ArcaBit antivirus software installed
Microsoft and ArcaBit have identified an issue on devices with ArcaBit antivirus software installed that may cause the system to become unresponsive upon restart after installing KB4493446.

Microsoft has temporarily blocked devices from receiving this update if ArcaBit antivirus software is installed.

Affected platforms: 
  • Client: Windows 8.1; Windows 7, Service Pack 1 
  • Server: Windows Server 2012 R2; Windows Server 2008 R2 SP1 

ArcaBit has released an update to address this issue. For more information, see the Arcabit support article.

Back to top
April 09, 2019
KB4493446
Mitigated
Last updated:
April 09, 2019
10:00 AM PT

Opened:
April 09, 2019
10:00 AM PT
Certain operations performed on on a Cluster Shared Volume may fail
Certain operations, such as rename, that you perform on files or folders that are on a Cluster Shared Volume (CSV) may fail with the error, “STATUS_BAD_IMPERSONATION_LEVEL (0xC00000A5)”. This occurs when you perform the operation on a CSV owner node from a process that doesn’t have administrator privilege.

Affected platforms: 
  • Client: Windows 8.1 
  • Server: Windows Server 2012 R2 

Workaround: Do one of the following:

  • Perform the operation from a process that has administrator privilege.
  • Perform the operation from a node that doesn’t have CSV ownership.

Next steps: Microsoft is working on a resolution and will provide an update in an upcoming release.

Back to top
April 09, 2019
KB4493446
Mitigated
Last updated:
April 09, 2019
10:00 AM PT

Opened:
April 09, 2019
10:00 AM PT
Devices may not respond at login or Welcome screen if running certain Avast software
Microsoft and Avast have identified an issue on devices running Avast for Business, Avast CloudCare, and AVG Business Edition antivirus software after you install KB4493446 and restart. Devices may become unresponsive at the login or Welcome screen. Additionally, you may be unable to log in or log in after an extended period of time.

Affected platforms: 
  • Client: Windows 8.1; Windows 7, Service Pack 1 
  • Server: Windows Server 2012 R2; Windows Server 2008 R2 SP1 


Resolution: Avast has released emergency updates to address this issue. For more information and AV update schedule, see the Avast support KB article.

Back to top
April 09, 2019
KB4493446
Resolved
Resolved:
April 09, 2019
10:00 AM PT

Opened:
April 09, 2019
10:00 AM PT
" @@ -98,8 +98,9 @@ sections: - type: markdown text: " - - + +
DetailsAffected buildStatusHistory
Issue using PXE to start a device from WDS
After installing KB4489881, there may be issues using the Preboot Execution Environment (PXE) to start a device from a Windows Deployment Services (WDS) server configured to use Variable Window Extension. This may cause the connection to the WDS server to terminate prematurely while downloading the image. This issue does not affect clients or devices that are not using Variable Window Extension.

Affected platforms: 
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10 Enterprise LTSC 2016; Windows 8.1 
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server 2016; Windows Server 2012 R2 

Workaround: To mitigate the issue, disable the Variable Window Extension on WDS server using one of the following options:

Option 1:
Open an Administrator Command prompt and type the following:

Wdsutil /Set-TransportServer /EnableTftpVariableWindowExtension:No

Option 2:
Use the Windows Deployment Services UI to make the following adjustment:

1. Open Windows Deployment Services from Windows Administrative Tools.
2. Expand Servers and right-click a WDS server.
3. Open its properties and clear the Enable Variable Window Extension box on the TFTP tab.

Option 3:
Set the following registry value to 0:

HKLM\\System\\CurrentControlSet\\Services\\WDSServer\\Providers\\WDSTFTP\\EnableVariableWindowExtension

Restart the WDSServer service after disabling the Variable Window Extension.

Next steps: Microsoft is working on a resolution and will provide an update in an upcoming release.

Back to top
March 12, 2019
KB4489881
Mitigated
Last updated:
April 09, 2019 10:00 AM PT

Opened:
March 12, 2019 10:00 AM PT
Custom URI schemes may not start corresponding application
After installing KB4489881, custom URI schemes for application protocol handlers may not start the corresponding application for local intranet and trusted sites security zones on Internet Explorer.

Affected platforms: 
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 8.1; Windows 7, Service Pack 1 
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2; Windows Server 2008 R2 SP1 

Resolution: This issue is resolved in KB4493446.

Back to top
March 12, 2019
KB4489881
Resolved
KB4493446
Resolved:
April 09, 2019 10:00 AM PT

Opened:
March 12, 2019 10:00 AM PT
Issue using PXE to start a device from WDS
After installing KB4489881, there may be issues using the Preboot Execution Environment (PXE) to start a device from a Windows Deployment Services (WDS) server configured to use Variable Window Extension. This may cause the connection to the WDS server to terminate prematurely while downloading the image. This issue does not affect clients or devices that are not using Variable Window Extension.

Affected platforms: 
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10 Enterprise LTSC 2016; Windows 8.1 
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server 2016; Windows Server 2012 R2 

Workaround: To mitigate the issue, disable the Variable Window Extension on WDS server using one of the following options:
Option 1:
Open an Administrator Command prompt and type the following:
Wdsutil /Set-TransportServer /EnableTftpVariableWindowExtension:No
+
Option 2:
Use the Windows Deployment Services UI to make the following adjustment:
  1. Open Windows Deployment Services from Windows Administrative Tools.
  2. Expand Servers and right-click a WDS server.
  3. Open its properties and clear the Enable Variable Window Extension box on the TFTP tab.
Option 3:
Set the following registry value to 0:
HKLM\\System\\CurrentControlSet\\Services\\WDSServer\\Providers\\WDSTFTP\\EnableVariableWindowExtension
Restart the WDSServer service after disabling the Variable Window Extension.

Next steps: Microsoft is working on a resolution and will provide an update in an upcoming release.

Back to top
March 12, 2019
KB4489881
Mitigated
Last updated:
April 09, 2019
10:00 AM PT

Opened:
March 12, 2019
10:00 AM PT
Custom URI schemes may not start corresponding application
After installing KB4489881, custom URI schemes for application protocol handlers may not start the corresponding application for local intranet and trusted sites security zones on Internet Explorer.

Affected platforms: 
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 8.1; Windows 7, Service Pack 1 
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2; Windows Server 2008 R2 SP1 

Resolution: This issue is resolved in KB4493446.

Back to top
March 12, 2019
KB4489881
Resolved
KB4493446
Resolved:
April 09, 2019
10:00 AM PT

Opened:
March 12, 2019
10:00 AM PT
" @@ -108,7 +109,7 @@ sections: - type: markdown text: " - +
DetailsAffected buildStatusHistory
Embedded objects may display incorrectly
Any compound document (OLE) server application that places embedded objects into the Windows Metafile (WMF) using the PatBlt API may display embedded objects incorrectly.

For example, if you paste a Microsoft Excel worksheet object into a Microsoft Word document, the cells may render with a different background color.

Affected platforms: 
  • Client: Windows 8.1 
  • Server: Windows Server 2012 R2 

Resolution: This issue is resolved in KB4493446.

Back to top
February 12, 2019
KB4487000
Resolved
KB4493446
Resolved:
April 09, 2019 10:00 AM PT

Opened:
February 12, 2019 10:00 AM PT
Embedded objects may display incorrectly
Any compound document (OLE) server application that places embedded objects into the Windows Metafile (WMF) using the PatBlt API may display embedded objects incorrectly.

For example, if you paste a Microsoft Excel worksheet object into a Microsoft Word document, the cells may render with a different background color.

Affected platforms: 
  • Client: Windows 8.1 
  • Server: Windows Server 2012 R2 

Resolution: This issue is resolved in KB4493446.

Back to top
February 12, 2019
KB4487000
Resolved
KB4493446
Resolved:
April 09, 2019
10:00 AM PT

Opened:
February 12, 2019
10:00 AM PT
" @@ -117,7 +118,7 @@ sections: - type: markdown text: " - - + +
DetailsAffected buildStatusHistory
Internet Explorer 11 authentication issue with multiple concurrent logons
After installing KB4480963, Internet Explorer 11 and other applications that use WININET.DLL may have authentication issues. This occurs when two or more people use the same user account for multiple, concurrent login sessions on the same Windows Server machine, including Remote Desktop Protocol (RDP) and Terminal Server logons. Symptoms reported by customers include, but may not be limited to:

  • Cache size and location show zero or empty.
  • Keyboard shortcuts may not work properly.
  • Webpages may intermittently fail to load or render correctly.
  • Issues with credential prompts.
  • Issues when downloading files.

Affected platforms: 
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10 Enterprise LTSC 2016; Windows 8.1; Windows 7, Service Pack 1 
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server 2016; Windows Server 2012 R2; Windows Server 2008 R2 SP1 

Resolution: This issue is resolved in KB4493446.


Back to top
January 08, 2019
KB4480963
Resolved
KB4493446
Resolved:
April 09, 2019 10:00 AM PT

Opened:
January 08, 2019 10:00 AM PT
MSXML6 may cause applications to stop responding.
After installing KB4480963, MSXML6 causes applications to stop responding if an exception was thrown during node operations, such as appendChild(), insertBefore(), and moveNode().

The Group Policy editor may stop responding when editing a Group Policy Object (GPO) that contains Group Policy Preferences (GPP) for Internet Explorer 10 settings.

Resolution: This issue is resolved in KB4493446.

Back to top
January 08, 2019
KB4480963
Resolved
KB4493446
Resolved:
April 09, 2019 10:00 AM PT

Opened:
January 08, 2019 10:00 AM PT
Internet Explorer 11 authentication issue with multiple concurrent logons
After installing KB4480963, Internet Explorer 11 and other applications that use WININET.DLL may have authentication issues. This occurs when two or more people use the same user account for multiple, concurrent login sessions on the same Windows Server machine, including Remote Desktop Protocol (RDP) and Terminal Server logons. Symptoms reported by customers include, but may not be limited to:
  • Cache size and location show zero or empty.
  • Keyboard shortcuts may not work properly.
  • Webpages may intermittently fail to load or render correctly.
  • Issues with credential prompts.
  • Issues when downloading files.

Affected platforms: 
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10 Enterprise LTSC 2016; Windows 8.1; Windows 7, Service Pack 1 
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server 2016; Windows Server 2012 R2; Windows Server 2008 R2 SP1 

Resolution: This issue is resolved in KB4493446.

Back to top
January 08, 2019
KB4480963
Resolved
KB4493446
Resolved:
April 09, 2019
10:00 AM PT

Opened:
January 08, 2019
10:00 AM PT
MSXML6 may cause applications to stop responding.
After installing KB4480963, MSXML6 causes applications to stop responding if an exception was thrown during node operations, such as appendChild(), insertBefore(), and moveNode().

The Group Policy editor may stop responding when editing a Group Policy Object (GPO) that contains Group Policy Preferences (GPP) for Internet Explorer 10 settings.

Resolution: This issue is resolved in KB4493446.

Back to top
January 08, 2019
KB4480963
Resolved
KB4493446
Resolved:
April 09, 2019
10:00 AM PT

Opened:
January 08, 2019
10:00 AM PT
" diff --git a/windows/release-information/status-windows-server-2008-sp2.yml b/windows/release-information/status-windows-server-2008-sp2.yml index 5f282702bb..3fe98de4f9 100644 --- a/windows/release-information/status-windows-server-2008-sp2.yml +++ b/windows/release-information/status-windows-server-2008-sp2.yml @@ -1 +1,101 @@ - \ No newline at end of file +### YamlMime:YamlDocument + +documentType: LandingData +title: Windows Server 2008 SP2 +metadata: + document_id: + title: Windows Server 2008 SP2 + description: View annoucements and review known issues and fixes for Windows Server 2008 SP2 + keywords: Windows, Windows 10, issues, fixes, announcements, Windows Server, advisories + ms.localizationpriority: high + author: greg-lindsay + ms.author: greglin + manager: dougkim + ms.topic: article + ms.devlang: na + +sections: +- items: + - type: markdown + text: " + Find information on known issues for Windows Server 2008 SP2. Looking for a specific issue? Press CTRL + F (or Command + F if you are using a Mac) and enter your search term(s). + + " + +- items: + - type: list + style: cards + className: cardsM + columns: 3 + items: + + - href: https://techcommunity.microsoft.com/t5/Windows-IT-Pro-Blog/Windows-10-version-1809-designated-for-broad-deployment/ba-p/389540 + html: Read the announcement > + image: + src: https://docs.microsoft.com//media/common/i_deploy.svg + title: Windows 10, version 1809 designated for broad deployment + - href: https://blogs.windows.com/windowsexperience/2019/04/04/improving-the-windows-10-update-experience-with-control-quality-and-transparency + html: Find out more > + image: + src: https://docs.microsoft.com/media/common/i_whats-new.svg + title: Improvements to the Windows 10 update experience are coming + - href: https://blogs.windows.com/windowsexperience/2019/03/06/data-insights-and-listening-to-improve-the-customer-experience + html: Learn about our approach > + image: + src: https://docs.microsoft.com/media/common/i_investigate.svg + title: How do we measure and improve the quality of Windows? +- items: + - type: markdown + text: " +
See all messages >
+ " +- items: + - type: markdown + text: " +
+ " + +- title: Known issues +- items: + - type: markdown + text: "
This table offers a summary of current active issues and those issues that have been resolved in the last 30 days.
+ + + + + + + + + + + + +
SummaryOriginating updateStatusLast updated
First character of the Japanese era name not recognized as an abbreviation
The first character of the Japanese era name is not recognized as an abbreviation and may cause date parsing issues.

See details >
N/A
January 17, 2019
KB4480974
Resolved
KB4489880
April 25, 2019
03:32 PM PT
Applications using Microsoft Jet database fail to open
Applications that use a Microsoft Jet database with the Microsoft Access 97 file format may fail to open if column names are greater than 32 characters.

See details >
N/A
January 08, 2019
KB4480968
Resolved
KB4487023
April 25, 2019
03:32 PM PT
Unable to use Seek bar in Windows Media Player
Users may not be able to use the Seek bar in Windows Media Player when playing specific files.

See details >
N/A
October 09, 2018
KB4463097
Resolved
KB4471325
April 25, 2019
03:28 PM PT
Virtual machines fail to restore
Virtual machines (VMs) may fail to restore successfully if the VM has been saved and restored once before.

See details >
N/A
January 08, 2019
KB4480968
Resolved
KB4490514
April 25, 2019
03:26 PM PT
System unresponsive after restart if Sophos Endpoint Protection installed
Devices with Sophos Endpoint Protection installed and managed by Sophos Central or Sophos Enterprise Console (SEC) may become unresponsive upon restart.

See details >
N/A
April 09, 2019
KB4493471
Mitigated
April 25, 2019
03:26 PM PT
System may be unresponsive after restart if Avira antivirus software installed
Devices with Avira antivirus software installed may become unresponsive upon restart.

See details >
N/A
April 09, 2019
KB4493471
Investigating
April 25, 2019
03:26 PM PT
Embedded objects may display incorrectly
Any compound document (OLE) server application that places embedded objects into the Windows Metafile (WMF) using the PatBlt API may display embedded objects incorrectly.

See details >
N/A

Resolved
KB4493471
April 25, 2019
03:26 PM PT
Applications using Microsoft Jet database and Access 95 file format stop working
Applications that use a Microsoft Jet database with the Microsoft Access 95 file format may randomly stop working.

See details >
N/A
February 12, 2019
KB4487023
Resolved
KB4487022
April 25, 2019
03:26 PM PT
Local Administrators unable to remotely access shares
Local users who are part of the local Administrators group may not be able to remotely access shares on Windows Server 2008 R2 and Windows 7 machines.

See details >
N/A
January 08, 2019
KB4480968
Resolved
KB4487354
April 25, 2019
03:26 PM PT
NETDOM.EXE fails to run
NETDOM.EXE fails to run and the error, “The command failed to complete successfully.” appears on screen.

See details >
N/A
March 12, 2019
KB4489880
Resolved
KB4493471
April 25, 2019
03:25 PM PT
Authentication may fail for services after the Kerberos ticket expires
Authentication may fail for services that require unconstrained delegation after the Kerberos ticket expires.

See details >
N/A
March 12, 2019
KB4489880
Mitigated
April 25, 2019
03:24 PM PT
+ " + +- title: Issue details +- items: + - type: markdown + text: " +
+
+ " +- title: April 2019 +- items: + - type: markdown + text: " + + + + + + + + + + + + +
DetailsAffected buildStatusHistory
First character of the Japanese era name not recognized as an abbreviation
After installing KB4480974, the first character of the Japanese era name is not recognized as an abbreviation and may cause date parsing issues.

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 8.1; Windows 7, Service Pack 1
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2; Windows Server 2012; Windows Server 2008 R2 SP1; Windows Server 2008 SP2

Resolution: This issue is resolved in KB4489880.

Back to top
N/A
January 17, 2019
KB4480974
Resolved
KB4489880
Resolved:
March 12, 2019
10:00 AM PT

Opened:
April 25, 2019
03:32 PM PT
Applications using Microsoft Jet database fail to open
Applications that use a Microsoft Jet database with the Microsoft Access 97 file format may fail to open if the database has column names greater than 32 characters. The database will fail to open with the error, “Unrecognized Database Format”.

Affected platforms: 
  • Client: Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 8.1; Windows 7, Service Pack 1 
  • Server: Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2; Windows Server 2012; Windows Server 2008 R2 SP1; Windows Server 2008 SP2

Resolution: This issue is resolved in KB4487023.

Back to top
N/A
January 08, 2019
KB4480968
Resolved
KB4487023
Resolved:
February 12, 2019
10:00 AM PT

Opened:
April 25, 2019
03:32 PM PT
Unable to use Seek bar in Windows Media Player
After installing KB4463097, users may not be able to use the Seek Bar in Windows Media Player when playing specific files. This issue does not affect normal playback.

Affected platforms: 
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 8.1; Windows 7, Service Pack 1
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2; Windows Server 2012; Windows Server 2008 R2 SP1; Windows Server 2008 SP2

Resolution: This issue is resolved in KB4471325.

Back to top
N/A
October 09, 2018
KB4463097
Resolved
KB4471325
Resolved:
December 11, 2018
10:00 AM PT

Opened:
April 25, 2019
03:28 PM PT
Virtual machines fail to restore
After installing KB4480968, virtual machines (VM) may fail to restore successfully if the VM has been saved and restored once before. The error message is, “Failed to restore the virtual machine state: Cannot restore this virtual machine because the saved state data cannot be read. Delete the saved state data and then try to start the virtual machine. (0xC0370027).”

This affects AMD Bulldozer Family 15h, AMD Jaguar Family 16h, and AMD Puma Family 16h (second generation) microarchitectures.

Affected platforms: 
  • Client: Windows 7, Service Pack 1 
  • Server: Windows Server 2012; Windows Server 2008 R2 SP1; Windows Server 2008 SP2

Resolution: This issue is resolved in KB4490514.

Back to top
N/A
January 08, 2019
KB4480968
Resolved
KB4490514
Resolved:
February 19, 2019
02:00 PM PT

Opened:
April 25, 2019
03:26 PM PT
System unresponsive after restart if Sophos Endpoint Protection installed
Microsoft and Sophos have identified an issue on devices with Sophos Endpoint Protection installed and managed by either Sophos Central or Sophos Enterprise Console (SEC) that may cause the system to become unresponsive upon restart after installing KB4493471.

Microsoft has temporarily blocked devices from receiving this update if the Sophos Endpoint is installed until a solution is available.

Guidance for Sophos Endpoint and Sophos Enterprise Console customers can be found in the Sophos support article.

Affected platforms: 
  • Client: Windows 8.1; Windows 7, Service Pack 1 
  • Server: Windows Server 2012 R2; Windows Server 2012; Windows Server 2008 R2 SP1; Windows Server 2008 SP2

Back to top
N/A
April 09, 2019
KB4493471
Mitigated
Last updated:
April 25, 2019
03:26 PM PT

Opened:
April 25, 2019
03:26 PM PT
System may be unresponsive after restart if Avira antivirus software installed
Microsoft and Avira have identified an issue on devices with Avira antivirus software installed that may cause the system to become unresponsive upon restart after installing KB4493471.

Microsoft has temporarily blocked devices from receiving this update if Avira antivirus software is installed.

Affected platforms: 
  • Client: Windows 8.1; Windows 7, Service Pack 1 
  • Server: Windows Server 2012 R2; Windows Server 2012; Windows Server 2008 R2 SP1; Windows Server 2008 SP2

Next steps: We are presently investigating this issue with Avira and will provide an update when available.

Back to top
N/A
April 09, 2019
KB4493471
Investigating
Last updated:
April 25, 2019
03:26 PM PT

Opened:
April 25, 2019
03:26 PM PT
Embedded objects may display incorrectly
Any compound document (OLE) server application that places embedded objects into the Windows Metafile (WMF) using the PatBlt API may display embedded objects incorrectly.

For example, if you paste a Microsoft Excel worksheet object into a Microsoft Word document, the cells may render with a different background color.

Affected platforms: 
  • Client: Windows 8.1 
  • Server: Windows Server 2012 R2; Windows Server 2012; Windows Server 2008 SP2

Resolution: This issue is resolved in KB4493471.

Back to top
N/A

Resolved
KB4493471
Resolved:
April 09, 2019
10:00 AM PT

Opened:
April 25, 2019
03:26 PM PT
Applications using Microsoft Jet database and Access 95 file format stop working
Applications that use a Microsoft Jet database with the Microsoft Access 95 file format may randomly stop working.

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 7, Service Pack 1
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012; Windows Server 2008 R2 SP1; Windows Server 2008 SP2

Resolution: This issue is resolved in KB4487022.

Back to top
N/A
February 12, 2019
KB4487023
Resolved
KB4487022
Resolved:
February 19, 2019
02:00 PM PT

Opened:
April 25, 2019
03:26 PM PT
Local Administrators unable to remotely access shares
Local users who are part of the local Administrators group may not be able to remotely access shares on Windows Server 2008 R2 and Windows 7 machines after installing KB4480968. This does not affect domain accounts in the local Administrators group.

Affected platforms: 
  • Client: Windows 7, Service Pack 1 
  • Server: Windows Server 2008 R2 SP1; Windows Server 2008 SP2

Resolution: This issue is resolved in KB4487354.

Back to top
N/A
January 08, 2019
KB4480968
Resolved
KB4487354
Resolved:
January 11, 2019
02:00 PM PT

Opened:
April 25, 2019
03:26 PM PT
NETDOM.EXE fails to run
After installing KB4489880, NETDOM.EXE fails to run, and the on-screen error, “The command failed to complete successfully.” appears.

Affected platforms: 
  • Client: Windows 7, Service Pack 1 
  • Server: Windows Server 2008 R2 SP1; Windows Server 2008 SP2

Resolution: This issue is resolved in KB4493471.

Back to top
N/A
March 12, 2019
KB4489880
Resolved
KB4493471
Resolved:
April 09, 2019
10:00 AM PT

Opened:
April 25, 2019
03:25 PM PT
Authentication may fail for services after the Kerberos ticket expires
After installing KB4489880, some customers report that authentication fails for services that require unconstrained delegation after the Kerberos ticket expires (the default is 10 hours). For example, the SQL server service fails.

Affected platforms: 
  • Client: Windows 7, Service Pack 1 
  • Server: Windows Server 2008 R2 SP1; Windows Server 2008 SP2

Workaround: To mitigate this issue, use one of the following options:

  • Option 1: Purge the Kerberos tickets on the application server. After the Kerberos ticket expires, the issue will occur again, and you must purge the tickets again.
  • Option 2: If purging does not mitigate the issue, restart the application; for example, restart the Internet Information Services (IIS) app pool associated with the SQL server.
  • Option 3: Use constrained delegation.

Next steps: Microsoft is working on a resolution and will provide an update in an upcoming release.

Back to top
N/A
March 12, 2019
KB4489880
Mitigated
Last updated:
April 25, 2019
03:24 PM PT

Opened:
April 25, 2019
03:24 PM PT
+ " diff --git a/windows/release-information/status-windows-server-2012.yml b/windows/release-information/status-windows-server-2012.yml index ae3aa816fd..11a37d5e1a 100644 --- a/windows/release-information/status-windows-server-2012.yml +++ b/windows/release-information/status-windows-server-2012.yml @@ -60,6 +60,21 @@ sections: - type: markdown text: "
This table offers a summary of current active issues and those issues that have been resolved in the last 30 days.
+ + + + + + + + + + + + + + +
SummaryOriginating updateStatusLast updated
Applications using Microsoft Jet database and Access 95 file format stop working
Applications that use a Microsoft Jet database with the Microsoft Access 95 file format may randomly stop working.

See details >
February 12, 2019
KB4487025
Resolved
KB4487024
April 25, 2019
04:04 PM PT
First character of the Japanese era name not recognized as an abbreviation
The first character of the Japanese era name is not recognized as an abbreviation and may cause date parsing issues.

See details >
January 15, 2019
KB4480971
Resolved
KB4487024
April 25, 2019
04:02 PM PT
Embedded objects may display incorrectly
Any compound document (OLE) server application that places embedded objects into the Windows Metafile (WMF) using the PatBlt API may display embedded objects incorrectly.

See details >
February 12, 2019
KB4487025
Resolved
KB4493451
April 25, 2019
04:00 PM PT
Certain operations performed on on a Cluster Shared Volume may fail
Certain operations, such as rename, performed on files or folders on a Cluster Shared Volume (CSV) may fail with the error, “STATUS_BAD_IMPERSONATION_LEVEL (0xC00000A5)”.

See details >
January 08, 2019
KB4480975
Mitigated
April 25, 2019
03:52 PM PT
System may be unresponsive after restart if Avira antivirus software installed
Devices with Avira antivirus software installed may become unresponsive upon restart.

See details >
April 09, 2019
KB4493451
Investigating
April 25, 2019
03:48 PM PT
System unresponsive after restart if Sophos Endpoint Protection installed
Devices with Sophos Endpoint Protection installed and managed by Sophos Central or Sophos Enterprise Console (SEC) may become unresponsive upon restart.

See details >
April 09, 2019
KB4493451
Mitigated
April 25, 2019
03:46 PM PT
Issue using PXE to start a device from WDS
There may be issues using the Preboot Execution Environment (PXE) to start a device from a Windows Deployment Services (WDS) server configured to use Variable Window Extension.

See details >
March 12, 2019
KB4489891
Mitigated
April 25, 2019
03:40 PM PT
Error 1309 when installing/uninstalling MSI or MSP files
Users may receive “Error 1309” while installing or uninstalling certain types of MSI and MSP files.

See details >
February 12, 2019
KB4487025
Resolved
KB4489891
April 25, 2019
03:36 PM PT
Internet Explorer 11 authentication issue with multiple concurrent logons
Internet Explorer 11 users may encounter issues if two or more people use the same user account for multiple, concurrent login sessions on the same Windows Server machine.

See details >
January 08, 2019
KB4480975
Resolved
KB4493451
April 25, 2019
03:34 PM PT
MSXML6 may cause applications to stop responding
MSXML6 may cause applications to stop responding if an exception was thrown during node operations, such as appendChild(), insertBefore(), and moveNode().

See details >
January 08, 2019
KB4480975
Resolved
KB4493451
April 25, 2019
03:27 PM PT
Virtual machines fail to restore
Virtual machines (VMs) may fail to restore successfully if the VM has been saved and restored once before.

See details >
January 08, 2019
KB4480975
Resolved
KB4490516
April 25, 2019
03:22 PM PT
Applications using Microsoft Jet database fail to open
Applications that use a Microsoft Jet database with the Microsoft Access 97 file format may fail to open if column names are greater than 32 characters.

See details >
January 08, 2019
KB4480975
Resolved
KB4487025
April 25, 2019
03:19 PM PT
Unable to access hotspots with third-party applications
Third-party applications may have difficulty authenticating hotspots.

See details >
January 08, 2019
KB4480975
Resolved
KB4480971
April 25, 2019
03:14 PM PT
Event Viewer may not show some event descriptions for network interface cards
The Event Viewer may not show some event descriptions for network interface cards (NIC).

See details >
September 11, 2018
KB4457135
Resolved
KB4489891
April 25, 2019
03:10 PM PT
Unable to use Seek bar in Windows Media Player
Users may not be able to use the Seek bar in Windows Media Player when playing specific files.

See details >
October 09, 2018
KB4462929
Resolved
KB4471330
April 25, 2019
02:47 PM PT
" @@ -70,10 +85,26 @@ sections:
" -- title: +- title: April 2019 - items: - type: markdown text: " + + + + + + + + + + + + + + +
DetailsAffected buildStatusHistory
Applications using Microsoft Jet database and Access 95 file format stop working
Applications that use a Microsoft Jet database with the Microsoft Access 95 file format may randomly stop working.

Resolution: This issue is resolved in KB4487024.

Back to top
February 12, 2019
KB4487025
Resolved
KB4487024
Resolved:
February 19, 2019
02:00 PM PT

Opened:
April 25, 2019
04:04 PM PT
First character of the Japanese era name not recognized as an abbreviation
After installing KB4480971, the first character of the Japanese era name is not recognized as an abbreviation and may cause date parsing issues.

Resolution: This issue is resolved in KB4487024.

Back to top
January 15, 2019
KB4480971
Resolved
KB4487024
Resolved:
February 19, 2019
02:00 PM PT

Opened:
April 25, 2019
04:01 PM PT
Embedded objects may display incorrectly
Any compound document (OLE) server application that places embedded objects into the Windows Metafile (WMF) using the PatBlt API may display embedded objects incorrectly.

For example, if you paste a Microsoft Excel worksheet object into a Microsoft Word document, the cells may render with a different background color.

Resolution: This issue is resolved in KB4493451.

Back to top
February 12, 2019
KB4487025
Resolved
KB4493451
Resolved:
April 09, 2019
10:00 AM PT

Opened:
April 25, 2019
04:00 PM PT
Certain operations performed on on a Cluster Shared Volume may fail
Certain operations, such as rename, that you perform on files or folders that are on a Cluster Shared Volume (CSV) may fail with the error, \"STATUS_BAD_IMPERSONATION_LEVEL (0xC00000A5)\". This occurs when you perform the operation on a CSV owner node from a process that doesn’t have administrator privilege.

Workaround: Do one of the following:

  • Perform the operation from a process that has administrator privilege.
  • Perform the operation from a node that doesn’t have CSV ownership.

Next steps: Microsoft is working on a resolution and will provide an update in an upcoming release.

Back to top
January 08, 2019
KB4480975
Mitigated
Last updated:
April 25, 2019
03:52 PM PT

Opened:
April 25, 2019
03:52 PM PT
System may be unresponsive after restart if Avira antivirus software installed
Microsoft and Avira have identified an issue on devices with Avira antivirus software installed that may cause the system to become unresponsive upon restart after installing KB4493451.

Microsoft has temporarily blocked devices from receiving this update if Avira antivirus software is installed.

Next steps: We are presently investigating this issue with Avira and will provide an update when available.

Back to top
April 09, 2019
KB4493451
Investigating
Last updated:
April 25, 2019
03:48 PM PT

Opened:
April 25, 2019
03:48 PM PT
System unresponsive after restart if Sophos Endpoint Protection installed
Microsoft and Sophos have identified an issue on devices with Sophos Endpoint Protection installed and managed by either Sophos Central or Sophos Enterprise Console (SEC) that may cause the system to become unresponsive upon restart after installing KB4493451.

Microsoft has temporarily blocked devices from receiving this update if the Sophos Endpoint is installed until a solution is available.

Guidance for Sophos Endpoint and Sophos Enterprise Console customers can be found in the Sophos support article.

Back to top
April 09, 2019
KB4493451
Mitigated
Last updated:
April 25, 2019
03:46 PM PT

Opened:
April 25, 2019
03:46 PM PT
Issue using PXE to start a device from WDS
After installing KB4489891, there may be issues using the Preboot Execution Environment (PXE) to start a device from a Windows Deployment Services (WDS) server configured to use Variable Window Extension. This may cause the connection to the WDS server to terminate prematurely while downloading the image. This issue does not affect clients or devices that are not using Variable Window Extension.

Workaround: To mitigate the issue, disable the Variable Window Extension on WDS server using one of the following options:
Option 1:
Open an Administrator Command prompt and type the following:
Wdsutil /Set-TransportServer /EnableTftpVariableWindowExtension:No
+
Option 2:
Use the Windows Deployment Services UI to make the following adjustment:
  1. Open Windows Deployment Services from Windows Administrative Tools.
  2. Expand Servers and right-click a WDS server.
  3. Open its properties and clear the Enable Variable Window Extension box on the TFTP tab.
Option 3:
Set the following registry value to 0:
HKLM\\System\\CurrentControlSet\\Services\\WDSServer\\Providers\\WDSTFTP\\EnableVariableWindowExtension
Restart the WDSServer service after disabling the Variable Window Extension.

Next steps: Microsoft is working on a resolution and will provide an update in an upcoming release.

Back to top
March 12, 2019
KB4489891
Mitigated
Last updated:
April 25, 2019
03:40 PM PT

Opened:
April 25, 2019
03:40 PM PT
Error 1309 when installing/uninstalling MSI or MSP files
After installing KB4487025, users may receive \"Error 1309\" while installing or uninstalling certain types of MSI and MSP files.

Resolution: This issue is resolved in KB4489891.

Back to top
February 12, 2019
KB4487025
Resolved
KB4489891
Resolved:
March 12, 2019
10:00 AM PT

Opened:
April 25, 2019
03:36 PM PT
Internet Explorer 11 authentication issue with multiple concurrent logons
After installing KB4480975, Internet Explorer 11 and other applications that use WININET.DLL may have authentication issues. This occurs when two or more people use the same user account for multiple, concurrent login sessions on the same Windows Server machine, including Remote Desktop Protocol (RDP) and Terminal Server logons. Symptoms reported by customers include, but may not be limited to:
  • Cache size and location show zero or empty.
  • Keyboard shortcuts may not work properly.
  • Webpages may intermittently fail to load or render correctly.
  • Issues with credential prompts.
  • Issues when downloading files.

Resolution: This issue is resolved in KB4493451.

Back to top
January 08, 2019
KB4480975
Resolved
KB4493451
Resolved:
April 09, 2019
10:00 AM PT

Opened:
April 25, 2019
03:34 PM PT
MSXML6 may cause applications to stop responding
After installing KB4480975, MSXML6 causes applications to stop responding if an exception was thrown during node operations, such as appendChild(), insertBefore(), and moveNode().

The Group Policy editor may stop responding when editing a Group Policy Object (GPO) that contains Group Policy Preferences (GPP) for Internet Explorer 10 settings.

Resolution: This issue is resolved in KB4493451.

Back to top
January 08, 2019
KB4480975
Resolved
KB4493451
Resolved:
April 09, 2019
10:00 AM PT

Opened:
April 25, 2019
03:27 PM PT
Virtual machines fail to restore
After installing KB4480975, virtual machines (VM) may fail to restore successfully if the VM has been saved and restored once before. The error message is, \"Failed to restore the virtual machine state: Cannot restore this virtual machine because the saved state data cannot be read. Delete the saved state data and then try to start the virtual machine. (0xC0370027).\"

This affects AMD Bulldozer Family 15h, AMD Jaguar Family 16h, and AMD Puma Family 16h (second generation) microarchitectures.

Resolution: This issue is resolved in KB4490516.

Back to top
January 08, 2019
KB4480975
Resolved
KB4490516
Resolved:
February 19, 2019
02:00 PM PT

Opened:
April 25, 2019
03:22 PM PT
Applications using Microsoft Jet database fail to open
Applications that use a Microsoft Jet database with the Microsoft Access 97 file format may fail to open if the database has column names greater than 32 characters. The database will fail to open with the error, \"Unrecognized Database Format\".

Resolution: This issue is resolved in KB4487025.

Back to top
January 08, 2019
KB4480975
Resolved
KB4487025
Resolved:
February 12, 2019
10:00 AM PT

Opened:
April 25, 2019
03:19 PM PT
Unable to access hotspots with third-party applications
After installing KB4480975, third-party applications may have difficulty authenticating hotspots.

Resolution: This issue is resolved in KB4480971.

Back to top
January 08, 2019
KB4480975
Resolved
KB4480971
Resolved:
January 15, 2019
10:00 AM PT

Opened:
April 25, 2019
03:14 PM PT
Event Viewer may not show some event descriptions for network interface cards
After installing KB4457135, the Event Viewer may not show some event descriptions for network interface cards (NICs).

Resolution: This issue is resolved in KB4489891.

Back to top
September 11, 2018
KB4457135
Resolved
KB4489891
Resolved:
March 12, 2019
10:00 AM PT

Opened:
April 25, 2019
03:10 PM PT
Unable to use Seek bar in Windows Media Player
After installing KB4462929, users may not be able to use the Seek Bar in Windows Media Player when playing specific files. This issue does not affect normal playback.

Resolution: This issue is resolved in KB4471330.

Back to top
October 09, 2018
KB4462929
Resolved
KB4471330
Resolved:
December 11, 2018
10:00 AM PT

Opened:
April 25, 2019
02:47 PM PT
" From d42f2c47237dc70cee8b18510fe6b40eeb77383e Mon Sep 17 00:00:00 2001 From: "Nisha Mittal (Wipro Ltd.)" Date: Fri, 26 Apr 2019 00:17:41 -0700 Subject: [PATCH 216/724] Fixed Affected Build Heading --- .../resolved-issues-windows-10-1507.yml | 10 +++++----- .../resolved-issues-windows-10-1607.yml | 14 +++++++------- .../resolved-issues-windows-10-1703.yml | 10 +++++----- .../resolved-issues-windows-10-1709.yml | 10 +++++----- .../resolved-issues-windows-10-1803.yml | 16 ++++++++-------- ...s-windows-10-1809-and-windows-server-2019.yml | 14 +++++++------- ...-windows-7-and-windows-server-2008-r2-sp1.yml | 10 +++++----- ...es-windows-8.1-and-windows-server-2012-r2.yml | 10 +++++----- .../resolved-issues-windows-server-2008-sp2.yml | 2 +- .../resolved-issues-windows-server-2012.yml | 2 +- .../status-windows-10-1507.yml | 4 ++-- ...s-windows-10-1607-and-windows-server-2016.yml | 6 +++--- .../status-windows-10-1703.yml | 4 ++-- .../status-windows-10-1709.yml | 4 ++-- .../status-windows-10-1803.yml | 4 ++-- ...s-windows-10-1809-and-windows-server-2019.yml | 8 ++++---- ...-windows-7-and-windows-server-2008-r2-sp1.yml | 6 +++--- ...us-windows-8.1-and-windows-server-2012-r2.yml | 8 ++++---- .../status-windows-server-2008-sp2.yml | 2 +- .../status-windows-server-2012.yml | 2 +- 20 files changed, 73 insertions(+), 73 deletions(-) diff --git a/windows/release-information/resolved-issues-windows-10-1507.yml b/windows/release-information/resolved-issues-windows-10-1507.yml index bd5c223e6a..1a4fc478a8 100644 --- a/windows/release-information/resolved-issues-windows-10-1507.yml +++ b/windows/release-information/resolved-issues-windows-10-1507.yml @@ -56,7 +56,7 @@ sections: - items: - type: markdown text: " - +
DetailsAffected buildStatusHistory
DetailsOriginating updateStatusHistory
Custom URI schemes may not start corresponding application
After installing KB4489872, Custom URI Schemes for Application Protocol handlers may not start the corresponding application for local intranet and trusted sites on Internet Explorer.

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 8.1; Windows 7, Service Pack 1 
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2; Windows Server 2008 R2 SP1

Resolution: This issue was resolved in KB4493475.

Back to top
OS Build 10240.18158

March 12, 2019
KB4489872
Resolved
KB4493475
Resolved:
April 09, 2019
10:00 AM PT

Opened:
March 12, 2019
10:00 AM PT
" @@ -65,7 +65,7 @@ sections: - items: - type: markdown text: " - +
DetailsAffected buildStatusHistory
@@ -77,7 +77,7 @@ sections: - items: - type: markdown text: " -
DetailsOriginating updateStatusHistory
Applications using Microsoft Jet database and Access 95 file format stop working
Applications that use a Microsoft Jet database with the Microsoft Access 95 file format may randomly stop working.

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 7, Service Pack 1
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2008 R2 SP1

Resolution: This issue is resolved in KB4489872.

Back to top
OS Build 10240.18132

February 12, 2019
KB4487018
Resolved
KB4489872
Resolved:
March 12, 2019
10:00 AM PT

Opened:
February 12, 2019
10:00 AM PT
Error 1309 when installing/uninstalling MSI or MSP files
After installing KB4487018, users may receive “Error 1309” while installing or uninstalling certain types of MSI and MSP files.

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 8.1
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2

Resolution: This issue is resolved in KB4489872.

Back to top
OS Build 10240.18132

February 12, 2019
KB4487018
Resolved
KB4489872
Resolved:
March 12, 2019
10:00 AM PT

Opened:
February 12, 2019
10:00 AM PT
First character of Japanese era name not recognized
After installing KB4487018, the first character of the Japanese era name is not recognized as an abbreviation and may cause date parsing issues.

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 8.1; Windows 7, Service Pack 1
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2; Windows Server 2008 R2 SP1

Resolution: This issue is resolved in KB4489872.

Back to top
OS Build 10240.18132

February 12, 2019
KB4487018
Resolved
KB4489872
Resolved:
March 12, 2019
10:00 AM PT

Opened:
February 12, 2019
10:00 AM PT
+
DetailsAffected buildStatusHistory
@@ -88,7 +88,7 @@ sections: - items: - type: markdown text: " -
DetailsOriginating updateStatusHistory
MSXML6 may cause applications to stop responding
After installing KB4480962, MSXML6 causes applications to stop responding if an exception was thrown during node operations, such as appendChild(), insertBefore(), and moveNode().

The Group Policy editor may stop responding when editing a Group Policy Object (GPO) that contains Group Policy Preferences (GPP) for Internet Explorer 10 settings.

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 8.1
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2

Resolution: This issue was resolved in KB4493475.

Back to top
OS Build 10240.18094

January 08, 2019
KB4480962
Resolved
KB4493475
Resolved:
April 09, 2019
10:00 AM PT

Opened:
January 08, 2019
10:00 AM PT
Applications using Microsoft Jet database fail to open
Applications that use a Microsoft Jet database with the Microsoft Access 97 file format may fail to open if the database has column names greater than 32 characters. The database will fail to open with the error, \"Unrecognized Database Format\".

Affected platforms:
  • Client: Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 8.1; Windows 7, Service Pack 1
  • Server: Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2; Windows Server 2008 R2 SP1

Resolution: This issue is resolved in KB4487018.

Back to top
OS Build 10240.18094

January 08, 2019
KB4480962
Resolved
KB4487018
Resolved:
February 12, 2019
10:00 AM PT

Opened:
January 08, 2019
10:00 AM PT
Unable to access hotspots with third-party applications
After installing KB4480962, third-party applications may have difficulty authenticating hotspots.

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 8.1
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2

Resolution: This issue is resolved in KB4487018.

Back to top
OS Build 10240.18094

January 08, 2019
KB4480962
Resolved
KB4487018
Resolved:
February 12, 2019
10:00 AM PT

Opened:
January 08, 2019
10:00 AM PT
+
DetailsAffected buildStatusHistory
DetailsOriginating updateStatusHistory
Unable to use Seek bar in Windows Media Player
After installing KB4462922, users may not be able to use the Seek Bar in Windows Media Player when playing specific files. This issue does not affect normal playback.

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 8.1; Windows 7, Service Pack 1
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2; Windows Server 2008 R2 SP1

Resolution: This issue is resolved in KB4471323.

Back to top
OS Build 10240.18005

October 09, 2018
KB4462922
Resolved
KB4471323
Resolved:
December 11, 2018
10:00 AM PT

Opened:
October 09, 2018
10:00 AM PT
" @@ -97,7 +97,7 @@ sections: - items: - type: markdown text: " - +
DetailsAffected buildStatusHistory
DetailsOriginating updateStatusHistory
Guest VMs running Unicast NLB fail to respond after restart
All guest virtual machines running Unicast NLB fail to respond to NLB requests after the virtual machines restart.

Affected platforms:
  • Client: Windows 10, version 1803; Windows 10, version 1507
  • Server: Windows Server, version 1803

Resolution: This issue is resolved in KB4462922.

Back to top
OS Build 10240.17976

September 11, 2018
KB4457132
Resolved
KB4462922
Resolved:
October 09, 2018
10:00 AM PT

Opened:
September 11, 2018
10:00 AM PT
" diff --git a/windows/release-information/resolved-issues-windows-10-1607.yml b/windows/release-information/resolved-issues-windows-10-1607.yml index 398c697014..b0c54bdee0 100644 --- a/windows/release-information/resolved-issues-windows-10-1607.yml +++ b/windows/release-information/resolved-issues-windows-10-1607.yml @@ -62,7 +62,7 @@ sections: - items: - type: markdown text: " - +
DetailsAffected buildStatusHistory
DetailsOriginating updateStatusHistory
End-user-defined characters (EUDC) cause blue screen at startup
If you enable per font end-user-defined characters (EUDC), the system will stop working and a blue screen may appear at startup. This is not a common setting in non-Asian regions.

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016

Resolution: This issue was resolved in KB4493470.

Back to top
OS Build 14393.2879

March 19, 2019
KB4489889
Resolved
KB4493470
Resolved:
April 09, 2019
10:00 AM PT

Opened:
March 19, 2019
10:00 AM PT
" @@ -71,7 +71,7 @@ sections: - items: - type: markdown text: " - +
DetailsAffected buildStatusHistory
@@ -83,7 +83,7 @@ sections: - items: - type: markdown text: " -
DetailsOriginating updateStatusHistory
Issue hosting multiple terminal server sessions and a user logs off on Windows Server
In some cases, Windows Server will stop working and restart when hosting multiple terminal server sessions and a user logs off. The faulting driver is win32kbase.sys.

Affected platforms:
  • Client: Windows 10 Enterprise LTSC 2016
  • Server: Windows Server 2016

Resolution: This issue is resolved in KB4489882.

Back to top
OS Build 14393.2828

February 19, 2019
KB4487006
Resolved
KB4489882
Resolved:
March 12, 2019
10:00 AM PT

Opened:
February 19, 2019
02:00 PM PT
Error 1309 when installing/uninstalling MSI or MSP files
After installing KB4487026, users may receive “Error 1309” while installing or uninstalling certain types of MSI and MSP files.

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 8.1
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2

Resolution: This issue is resolved in KB4489882.

Back to top
OS Build 14393.2791

February 12, 2019
KB4487026
Resolved
KB4489882
Resolved:
March 12, 2019
10:00 AM PT

Opened:
February 12, 2019
10:00 AM PT
Applications using Microsoft Jet database and Access 95 file format stop working
Applications that use a Microsoft Jet database with the Microsoft Access 95 file format may randomly stop working.

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 7, Service Pack 1
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2008 R2 SP1

Resolution: This issue is resolved in KB4487006.

Back to top
OS Build 14393.2791

February 12, 2019
KB4487026
Resolved
KB4487006
Resolved:
February 19, 2019
02:00 PM PT

Opened:
February 12, 2019
10:00 AM PT
+
DetailsAffected buildStatusHistory
@@ -96,7 +96,7 @@ sections: - items: - type: markdown text: " -
DetailsOriginating updateStatusHistory
Internet Explorer 11 authentication issue with multiple concurrent logons
After installing KB4480961, Internet Explorer 11 and other applications that use WININET.DLL may have authentication issues. This occurs when two or more people use the same user account for multiple, concurrent login sessions on the same Windows Server machine, including Remote Desktop Protocol (RDP) and Terminal Server logons. Symptoms reported by customers include, but may not be limited to:
  • Cache size and location show zero or empty.
  • Keyboard shortcuts may not work properly.
  • Webpages may intermittently fail to load or render correctly.
  • Issues with credential prompts.
  • Issues when downloading files.

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10 Enterprise LTSC 2016; Windows 8.1; Windows 7, Service Pack 1
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server 2016; Windows Server 2012 R2; Windows Server 2008 R2 SP1

Resolution: This issue was resolved in KB4493470.

Back to top
OS Build 14393.2724

January 08, 2019
KB4480961
Resolved
KB4493470
Resolved:
April 09, 2019
10:00 AM PT

Opened:
January 08, 2019
10:00 AM PT
MSXML6 may cause applications to stop responding
After installing KB4480961, MSXML6 causes applications to stop responding if an exception was thrown during node operations, such as appendChild(), insertBefore(), and moveNode().

The Group Policy editor may stop responding when editing a Group Policy Object (GPO) that contains Group Policy Preferences (GPP) for Internet Explorer 10 settings.

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 8.1
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2

Resolution: This issue was resolved in KB4493470.

Back to top
OS Build 14393.2724

January 08, 2019
KB4480961
Resolved
KB4493470
Resolved:
April 09, 2019
10:00 AM PT

Opened:
January 08, 2019
10:00 AM PT
First character of the Japanese era name not recognized as an abbreviation
After installing KB4480977, the first character of the Japanese era name is not recognized as an abbreviation and may cause date parsing issues.

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 8.1; Windows 7, Service Pack 1
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2; Windows Server 2008 R2 SP1

Resolution: This issue is resolved in KB4487006.

Back to top
OS Build 14393.2759

January 17, 2019
KB4480977
Resolved
KB4487006
Resolved:
February 19, 2019
02:00 PM PT

Opened:
January 17, 2019
02:00 PM PT
+
DetailsAffected buildStatusHistory
DetailsOriginating updateStatusHistory
Instant search in Microsoft Outlook fails on Windows Server 2016
After installing KB4467684 on Windows Server 2016, instant search in Microsoft Outlook clients fail with the error, \"Outlook cannot perform the search\".

Affected platforms:
  • Client: Windows 10 Enterprise LTSC 2016
  • Server: Windows Server 2016

Resolution: This issue is resolved in KB4487026.

Back to top
OS Build 14393.2639

November 27, 2018
KB4467684
Resolved
KB4487026
Resolved:
February 12, 2019
10:00 AM PT

Opened:
November 27, 2018
10:00 AM PT
System becomes unresponsive when end-user-defined characters (EUDC) are used
When features related to end-user-defined characters (EUDC) are used, the entire system may become unresponsive. 

Affected platforms:
  • Client: Windows 10 Enterprise LTSC 2016
  • Server: Windows Server 2016
 
Resolution: This issue is resolved in KB4471321

Back to top
OS Build 14393.2639

November 27, 2018
KB4467684
Resolved
KB4471321
Resolved:
December 11, 2018
10:00 AM PT

Opened:
November 27, 2018
10:00 AM PT
@@ -106,7 +106,7 @@ sections: - items: - type: markdown text: " - +
DetailsAffected buildStatusHistory
DetailsOriginating updateStatusHistory
Unable to use Seek bar in Windows Media Player
After installing KB4462917, users may not be able to use the Seek Bar in Windows Media Player when playing specific files. This issue does not affect normal playback.

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 8.1; Windows 7, Service Pack 1
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2; Windows Server 2008 R2 SP1

Resolution: This issue is resolved in KB4471321.

Back to top
OS Build 14393.2551

October 09, 2018
KB4462917
Resolved
KB4471321
Resolved:
December 11, 2018
10:00 AM PT

Opened:
October 09, 2018
10:00 AM PT
" @@ -115,7 +115,7 @@ sections: - items: - type: markdown text: " - +
DetailsAffected buildStatusHistory
DetailsOriginating updateStatusHistory
Promotions that create non-root domains fail with optional features enabled
After installing KB4457127, Windows Server 2016 promotions that create non-root domains fail in forests in which optional features like Active Directory recycle have been enabled. The error is, “The replication operation encountered a database error.”

Affected platforms:
  • Client: Windows 10 Enterprise LTSC 2016
  • Server: Windows Server 2016

Resolution: This issue is resolved in KB4467684.

Back to top
OS Build 14393.2515

September 20, 2018
KB4457127
Resolved
KB4467684
Resolved:
November 27, 2018
10:00 AM PT

Opened:
September 20, 2018
10:00 AM PT
" @@ -124,7 +124,7 @@ sections: - items: - type: markdown text: " - +
DetailsAffected buildStatusHistory
DetailsOriginating updateStatusHistory
SqlConnection instantiation exception on .NET 4.6 and later
After you install the August Preview of Quality Rollup or September 11, 2018 .NET Framework update, instantiation of SqlConnection can throw an exception.

For more information about this issue, see the following article in the Microsoft Knowledge Base: 4470809, SqlConnection instantiation exception on .NET 4.6 and later after August-September 2018 .NET Framework updates.

Affected platforms:
  • Client: Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016
  • Server: Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016

Resolution: This issue is resolved in KB4480977.

Back to top
OS Build 14393.2457

August 30, 2018
KB4343884
Resolved
KB4480977
Resolved:
January 17, 2019
02:00 PM PT

Opened:
August 30, 2018
05:00 PM PT
Issues with install and activation of Key Management Service (KMS) (CSVLK) host keys
After installing KB4343884, installation and client activation of Windows Server 2019 and Windows 10 Enterprise 2019 LTSC Key Management Service (KMS) CSVLK host keys do not work as expected.

Affected platforms:
  • Client: Windows 10 Enterprise LTSC 2016
  • Server: Windows Server 2016

Resolution: This issue is resolved in KB4467684.

Back to top
OS Build 14393.2457

August 30, 2018
KB4343884
Resolved
KB4467684
Resolved:
November 27, 2018
10:00 AM PT

Opened:
August 30, 2018
05:00 PM PT
diff --git a/windows/release-information/resolved-issues-windows-10-1703.yml b/windows/release-information/resolved-issues-windows-10-1703.yml index 9017df00dd..05831e7123 100644 --- a/windows/release-information/resolved-issues-windows-10-1703.yml +++ b/windows/release-information/resolved-issues-windows-10-1703.yml @@ -59,7 +59,7 @@ sections: - items: - type: markdown text: " - +
DetailsAffected buildStatusHistory
DetailsOriginating updateStatusHistory
End-user-defined characters (EUDC) may cause blue screen at startup
If you enable per font end-user-defined characters (EUDC), the system may stop working and a blue screen may appear at startup. This is not a common setting in non-Asian regions.

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016

Resolution: This issue was resolved in KB4493474.

Back to top
OS Build 15063.1716

March 19, 2019
KB4489888
Resolved
KB4493474
Resolved:
April 09, 2019
10:00 AM PT

Opened:
March 19, 2019
10:00 AM PT
" @@ -68,7 +68,7 @@ sections: - items: - type: markdown text: " - +
DetailsAffected buildStatusHistory
@@ -79,7 +79,7 @@ sections: - items: - type: markdown text: " -
DetailsOriginating updateStatusHistory
Error 1309 when installing/uninstalling MSI or MSP files
After installing KB4487011, users may receive “Error 1309” while installing or uninstalling certain types of MSI and MSP files.

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 8.1
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2

Resolution: This issue is resolved in KB4489871.

Back to top
OS Build 15063.1659

February 19, 2019
KB4487011
Resolved
KB4489871
Resolved:
March 12, 2019
10:00 AM PT

Opened:
February 19, 2019
02:00 PM PT
Internet Explorer may fail to load images
After installing KB4487020, Internet Explorer may fail to load images with a backslash (\\) in their relative source path.

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 8.1; Windows 7, Service Pack 1
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2; Windows Server 2008 R2 SP1

Resolution: This issue is resolved in KB4487011.

Back to top
OS Build 15063.1631

February 12, 2019
KB4487020
Resolved
KB4487011
Resolved:
February 19, 2019
02:00 PM PT

Opened:
February 12, 2019
10:00 AM PT
Applications using Microsoft Jet database and Access 95 file format stop working
Applications that use a Microsoft Jet database with the Microsoft Access 95 file format may randomly stop working.

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 7, Service Pack 1
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2008 R2 SP1

Resolution: This issue is resolved in KB4487011.

Back to top
OS Build 15063.1631

February 12, 2019
KB4487020
Resolved
KB4487011
Resolved:
February 19, 2019
02:00 PM PT

Opened:
February 12, 2019
10:00 AM PT
+
DetailsAffected buildStatusHistory
@@ -92,7 +92,7 @@ sections: - items: - type: markdown text: " -
DetailsOriginating updateStatusHistory
MSXML6 may cause applications to stop responding
After installing KB4480973, MSXML6 causes applications to stop responding if an exception was thrown during node operations, such as appendChild(), insertBefore(), and moveNode().

The Group Policy editor may stop responding when editing a Group Policy Object (GPO) that contains Group Policy Preferences (GPP) for Internet Explorer 10 settings.

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 8.1
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2

Resolution: This issue was resolved in KB4493474.

Back to top
OS Build 15063.1563

January 08, 2019
KB4480973
Resolved
KB4493474
Resolved:
April 09, 2019
10:00 AM PT

Opened:
January 08, 2019
10:00 AM PT
First character of the Japanese era name not recognized as an abbreviation
After installing KB4480959, the first character of the Japanese era name is not recognized as an abbreviation and may cause date parsing issues.

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 8.1; Windows 7, Service Pack 1
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2; Windows Server 2008 R2 SP1

Resolution: This issue is resolved in KB4487011.

Back to top
OS Build 15063.1596

January 15, 2019
KB4480959
Resolved
KB4487011
Resolved:
February 19, 2019
02:00 PM PT

Opened:
January 15, 2019
10:00 AM PT
Applications using Microsoft Jet database fail to open
Applications that use a Microsoft Jet database with the Microsoft Access 97 file format may fail to open if the database has column names greater than 32 characters. The database will fail to open with the error, “Unrecognized Database Format”.

Affected platforms:
  • Client: Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 8.1; Windows 7, Service Pack 1 
  • Server: Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2; Windows Server 2008 R2 SP1

Resolution: This issue is resolved in KB4487020.

Back to top
OS Build 15063.1563

January 08, 2019
KB4480973
Resolved
KB4487020
Resolved:
February 12, 2019
10:00 AM PT

Opened:
January 08, 2019
10:00 AM PT
+
DetailsAffected buildStatusHistory
@@ -103,7 +103,7 @@ sections: - items: - type: markdown text: " -
DetailsOriginating updateStatusHistory
Unable to use Seek bar in Windows Media Player
After installing KB4462937, users may not be able to use the Seek Bar in Windows Media Player when playing specific files. This issue does not affect normal playback.

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 8.1; Windows 7, Service Pack 1
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2; Windows Server 2008 R2 SP1

Resolution: This issue is resolved in KB4471327.

Back to top
OS Build 15063.1387

October 09, 2018
KB4462937
Resolved
KB4471327
Resolved:
December 11, 2018
10:00 AM PT

Opened:
October 09, 2018
10:00 AM PT
LongonUI.exe stops working intermittently
After installing KB4462937, LogonUI.exe stops working intermittently.

Affected platforms:
  • Windows 10, version 1703

Resolution: This issue is resolved in KB4467699.

Back to top
OS Build 15063.1387

October 09, 2018
KB4462937
Resolved
KB4467699
Resolved:
November 27, 2018
10:00 AM PT

Opened:
October 09, 2018
10:00 AM PT
Error message beginning with “Hosted by…” when launching Microsoft Edge
After installing KB4462937, some users may see a dialog box with a non-applicable message beginning with the words “Hosted by...” when first starting Microsoft Edge.

This dialog will only appear once if they have turned on “Block only third-party cookies” in Microsoft Edge and applied certain language packs before installing this update.

Affected platforms:
  • Client: Windows 10, version 1709; Windows 10, version 1703
  • Server: Windows Server, version 1709

Resolution: This issue is resolved in KB4462939.

Back to top
OS Build 15063.1387

October 09, 2018
KB4462937
Resolved
KB4462939
Resolved:
October 18, 2018
10:00 AM PT

Opened:
October 09, 2018
10:00 AM PT
+
DetailsAffected buildStatusHistory
DetailsOriginating updateStatusHistory
SqlConnection instantiation exception on .NET 4.6 and later
After you install the August Preview of Quality Rollup or September 11, 2018 .NET Framework update, instantiation of SqlConnection can throw an exception.

For more information about this issue, see the following article in the Microsoft Knowledge Base:
4470809 SqlConnection instantiation exception on .NET 4.6 and later after August-September 2018 .NET Framework updates.

Affected platforms:
  • Client: Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016
  • Server: Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016

Resolution: This issue is resolved in KB4480959.

Back to top
OS Build 15063.1292

August 30, 2018
KB4343889
Resolved
KB4480959
Resolved:
January 15, 2019
10:00 AM PT

Opened:
August 30, 2018
05:00 PM PT
" diff --git a/windows/release-information/resolved-issues-windows-10-1709.yml b/windows/release-information/resolved-issues-windows-10-1709.yml index 8c6c8c22b7..93ff2b61dc 100644 --- a/windows/release-information/resolved-issues-windows-10-1709.yml +++ b/windows/release-information/resolved-issues-windows-10-1709.yml @@ -59,7 +59,7 @@ sections: - items: - type: markdown text: " - +
DetailsAffected buildStatusHistory
DetailsOriginating updateStatusHistory
End-user-defined characters (EUDC) may cause blue screen at startup
If you enable per font end-user-defined characters (EUDC), the system may stop working and a blue screen may appear at startup. This is not a common setting in non-Asian regions.

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016

Resolution: This issue is resolved in KB4493441.

Back to top
OS Build 16299.1059

March 19, 2019
KB4489890
Resolved
KB4493441
Resolved:
April 09, 2019
10:00 AM PT

Opened:
March 19, 2019
10:00 AM PT
Stop error when attempting to start SSH from WSL
After applying KB4489886, a stop error occurs when attempting to start the Secure Shell (SSH) client program from Windows Subsystem for Linux (WSL) with agent forwarding enabled using a command line switch (ssh –A) or a configuration setting.

Affected platforms:
  • Client: Windows 10, version 1803; Windows 10, version 1709
  • Server: Windows Server, version 1803; Windows Server, version 1709

Resolution: This issue is resolved in KB4493441.

Back to top
OS Build 16299.1029

March 12, 2019
KB4489886
Resolved
KB4493441
Resolved:
April 09, 2019
10:00 AM PT

Opened:
March 12, 2019
10:00 AM PT
@@ -69,7 +69,7 @@ sections: - items: - type: markdown text: " - +
DetailsAffected buildStatusHistory
@@ -80,7 +80,7 @@ sections: - items: - type: markdown text: " -
DetailsOriginating updateStatusHistory
Error 1309 when installing/uninstalling MSI or MSP files
After installing KB4486996, users may receive “Error 1309” while installing or uninstalling certain types of MSI and MSP files.

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 8.1
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2

Resolution: This issue is resolved in KB4489886.

Back to top
OS Build 16299.967

February 12, 2019
KB4486996
Resolved
KB4489886
Resolved:
March 12, 2019
10:00 AM PT

Opened:
February 12, 2019
10:00 AM PT
Applications using Microsoft Jet database and Access 95 file format stop working
Applications that use a Microsoft Jet database with the Microsoft Access 95 file format may randomly stop working.

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 7, Service Pack 1
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2008 R2 SP1

Resolution: This issue is resolved in KB4487021.

Back to top
OS Build 16299.967

February 12, 2019
KB4486996
Resolved
KB4487021
Resolved:
February 19, 2019
02:00 PM PT

Opened:
February 12, 2019
10:00 AM PT
Internet Explorer may fail to load images
After installing KB4486996, Internet Explorer may fail to load images with a backslash (\\) in their relative source path.

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 8.1; Windows 7, Service Pack 1
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2; Windows Server 2008 R2 SP1

Resolution: This issue is resolved in KB4487021.

Back to top
OS Build 16299.967

February 12, 2019
KB4486996
Resolved
KB4487021
Resolved:
February 19, 2019
02:00 PM PT

Opened:
February 12, 2019
10:00 AM PT
+
DetailsAffected buildStatusHistory
@@ -93,7 +93,7 @@ sections: - items: - type: markdown text: " -
DetailsOriginating updateStatusHistory
MSXML6 causes applications to stop responding if an exception was thrown
After installing KB4480978, MSXML6 causes applications to stop responding if an exception was thrown during node operations, such as appendChild(), insertBefore(), and moveNode().

The Group Policy editor may stop responding when editing a Group Policy Object (GPO) that contains Group Policy Preferences (GPP) for Internet Explorer 10 settings.

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 8.1
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2

Resolution: This issue is resolved in KB4493441.

Back to top
OS Build 16299.904

January 08, 2019
KB4480978
Resolved
KB4493441
Resolved:
April 09, 2019
10:00 AM PT

Opened:
January 08, 2019
10:00 AM PT
First character of the Japanese era name not recognized as an abbreviation
After installing KB4480967, the first character of the Japanese era name is not recognized as an abbreviation and may cause date parsing issues.

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 8.1; Windows 7, Service Pack 1
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2; Windows Server 2008 R2 SP1

Resolution: This issue is resolved in KB4487021.

Back to top
OS Build 16299.936

January 15, 2019
KB4480967
Resolved
KB4487021
Resolved:
February 19, 2019
02:00 PM PT

Opened:
January 15, 2019
10:00 AM PT
Applications using Microsoft Jet database fail to open
Applications that use a Microsoft Jet database with the Microsoft Access 97 file format may fail to open if the database has column names greater than 32 characters. The database will fail to open with the error, “Unrecognized Database Format.”

Affected platforms:
  • Client: Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 8.1; Windows 7, Service Pack 1 
  • Server: Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2; Windows Server 2008 R2 SP1 

Resolution: This issue is resolved in KB4486996.

Back to top
OS Build 16299.904

January 08, 2019
KB4480978
Resolved
KB4486996
Resolved:
February 12, 2019
10:00 AM PT

Opened:
January 08, 2019
10:00 AM PT
+
DetailsAffected buildStatusHistory
DetailsOriginating updateStatusHistory
Unable to use Seek bar in Windows Media Player
After installing KB4462918, users may not be able to use the Seek Bar in Windows Media Player when playing specific files. This issue does not affect normal playback.

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 8.1; Windows 7, Service Pack 1
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2; Windows Server 2008 R2 SP1

Resolution: This issue is resolved in KB4471329.

Back to top
OS Build 16299.726

October 09, 2018
KB4462918
Resolved
KB4471329
Resolved:
December 11, 2018
10:00 AM PT

Opened:
October 09, 2018
10:00 AM PT
Error message beginning with “Hosted by…” when launching Microsoft Edge
After installing KB4462918, some users may see a dialog box with a non-applicable message beginning with the words “Hosted by...” when first starting Microsoft Edge.

This dialog will only appear once if they have turned on “Block only third-party cookies” in Microsoft Edge and applied certain language packs before installing this update.

Affected platforms:
  • Client: Windows 10, version 1709; Windows 10, version 1703
  • Server: Windows Server, version 1709

Resolution: This issue is resolved in KB4462932.

Back to top
OS Build 16299.726

October 09, 2018
KB4462918
Resolved
KB4462932
Resolved:
October 18, 2018
10:00 AM PT

Opened:
October 09, 2018
10:00 AM PT
@@ -103,7 +103,7 @@ sections: - items: - type: markdown text: " - +
DetailsAffected buildStatusHistory
DetailsOriginating updateStatusHistory
SqlConnection instantiation exception on .NET 4.6 and later
After you install the August Preview of Quality Rollup or September 11, 2018 .NET Framework update, instantiation of SqlConnection can throw an exception.

For more information about this issue, see the following article in the Microsoft Knowledge Base:
4470809 SqlConnection instantiation exception on .NET 4.6 and later after August-September 2018 .NET Framework updates.

Affected platforms:
  • Client: Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016
  • Server: Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016

Resolution: This issue is resolved in KB4480967.

Back to top
OS Build 16299.637

August 30, 2018
KB4343893
Resolved
KB4480967
Resolved:
January 15, 2019
10:00 AM PT

Opened:
August 30, 2018
05:00 PM PT
" diff --git a/windows/release-information/resolved-issues-windows-10-1803.yml b/windows/release-information/resolved-issues-windows-10-1803.yml index e59eefb539..af3cab2c74 100644 --- a/windows/release-information/resolved-issues-windows-10-1803.yml +++ b/windows/release-information/resolved-issues-windows-10-1803.yml @@ -64,7 +64,7 @@ sections: - items: - type: markdown text: " - +
DetailsAffected buildStatusHistory
DetailsOriginating updateStatusHistory
End-user-defined characters (EUDC) may cause blue screen at startup
If you enable per font end-user-defined characters (EUDC), the system may stop working and a blue screen may appear at startup. This is not a common setting in non-Asian regions. 

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016
 
Resolution: This issue was resolved in KB4493464

Back to top
OS Build 17134.677

March 19, 2019
KB4489894
Resolved
KB4493464
Resolved:
April 09, 2019
10:00 AM PT

Opened:
March 19, 2019
10:00 AM PT
Stop error when attempting to start SSH from WSL
After applying KB4489868, a stop error occurs when attempting to start the Secure Shell (SSH) client program from Windows Subsystem for Linux (WSL) with agent forwarding enabled using a command line switch (ssh -A) or a configuration setting.

Affected platforms:
  • Client: Windows 10, version 1803; Windows 10, version 1709
  • Server: Windows Server, version 1803; Windows Server, version 1709

Resolution: This issue was resolved in KB4493464.

Back to top
OS Build 17134.648

March 12, 2019
KB4489868
Resolved
KB4493464
Resolved:
April 09, 2019
10:00 AM PT

Opened:
March 12, 2019
10:00 AM PT
@@ -74,7 +74,7 @@ sections: - items: - type: markdown text: " - +
DetailsAffected buildStatusHistory
DetailsOriginating updateStatusHistory
Error 1309 when installing/uninstalling MSI or MSP files
After installing KB4487017, users may received \"Error 1309\" while installing or uninstalling certain types of MSI and MSP files. 

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 8.1
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2

Resolution: This issue is resolved in KB4489868.

Back to top
OS Build 17134.590

February 12, 2019
KB4487017
Resolved
KB4489868
Resolved:
March 12, 2019
10:00 AM PT

Opened:
February 12, 2019
10:00 AM PT
Internet Explorer may fail to load images
After installing KB4487017, Internet Explorer may fail to load images with a backslash (\\) in their relative source path. 

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 8.1; Windows 7, Service Pack 1
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2; Windows Server 2008 R2 SP1

Resolution: This issue is resolved in KB4487029

Back to top
OS Build 17134.590

February 12, 2019
KB4487017
Resolved
KB4487029
Resolved:
February 19, 2019
02:00 PM PT

Opened:
February 12, 2019
10:00 AM PT
@@ -84,7 +84,7 @@ sections: - items: - type: markdown text: " - +
DetailsAffected buildStatusHistory
@@ -97,7 +97,7 @@ sections: - items: - type: markdown text: " -
DetailsOriginating updateStatusHistory
MSXML6 may cause applications to stop responding
After installing KB4480966, MSXML6 causes applications to stop responding if an exception was thrown during node operations, such as appendChild(), insertBefore(), and moveNode().

The Group Policy editor may stop responding when editing a Group Policy Object (GPO) that contains Group Policy Preferences (GPP) for Internet Explorer 10 settings.

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 8.1
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2

Resolution: This issue was resolved in KB4493464

Back to top
OS Build 17134.523

January 08, 2019
KB4480966
Resolved
KB4493464
Resolved:
April 09, 2019
10:00 AM PT

Opened:
January 08, 2019
10:00 AM PT
First character of Japanese era name not recognized
After installing KB4480976, the first character of the Japanese era name is not recognized as an abbreviation and may cause date parsing issues.

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 8.1; Windows 7, Service Pack 1
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2; Windows Server 2008 R2 SP1

Resolution: This issue is resolved in KB4487029

Back to top
OS Build 17134.556

January 15, 2019
KB4480976
Resolved
KB4487029
Resolved:
February 19, 2019
02:00 PM PT

Opened:
January 15, 2019
10:00 AM PT
Applications using Microsoft Jet database and Access 95 file format stop working
Applications that use a Microsoft Jet database with the Microsoft Access 95 file format may randomly stop working. 

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 7, Service Pack 1
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2008 R2 SP1

Resolution: This issue is resolved in KB4487017.

Back to top
OS Build 17134.523

January 08, 2019
KB4480966
Resolved
KB4487017
Resolved:
February 12, 2019
10:00 AM PT

Opened:
January 08, 2019
10:00 AM PT
+
DetailsAffected buildStatusHistory
DetailsOriginating updateStatusHistory
Cannot pin a web link on the Start menu or the taskbar
After installing KB4471324, some users cannot pin a web link on the Start menu or the taskbar. 

Affected platforms:
  • Client: Windows 10, version 1803
  • Server: Windows Server, version 1803

Resolution: This issue is resolved in KB4487029

Back to top
OS Build 17134.471

December 11, 2018
KB4471324
Resolved
KB4487029
Resolved:
February 19, 2019
02:00 PM PT

Opened:
December 11, 2018
10:00 AM PT
" @@ -106,7 +106,7 @@ sections: - items: - type: markdown text: " - +
DetailsAffected buildStatusHistory
DetailsOriginating updateStatusHistory
Blue or black screen with \"System thread exception not handled\" error
After installing KB4467682, an optional update, some users may get a blue or black screen with the error code, \"System thread exception not handled.\"

Affected platforms:
  • Client: Windows 10, version 1803
  • Server: Windows Server, version 1803

Resolution: This issue is resolved in KB4471324

Back to top
OS Build 17134.441

November 27, 2018
KB4467682
Resolved
KB4471324
Resolved:
December 11, 2018
10:00 AM PT

Opened:
November 27, 2018
10:00 AM PT
Custom Start menu layouts display incorrectly
After installing KB4467682, custom Start menu layouts may display incorrectly. 

Affected platforms:
  • Client: Windows 10, version 1803
  • Server: Windows Server, version 1803
 
Resolution: This issue is resolved in KB4471324

Back to top
OS Build 17134.441

November 27, 2018
KB4467682
Resolved
KB4471324
Resolved:
December 11, 2018
10:00 AM PT

Opened:
November 27, 2018
10:00 AM PT
@@ -116,7 +116,7 @@ sections: - items: - type: markdown text: " - +
DetailsAffected buildStatusHistory
DetailsOriginating updateStatusHistory
Unable to use Seek bar in Windows Media Player
After installing KB4462919, users may not be able to use the Seek bar in Windows Media Player when playing specific files. This issue does not affect normal playback.

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 8.1; Windows 7, Service Pack 1
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2; Windows Server 2008 R2 SP1

Resolution: This issue is resolved in KB4471324

Back to top
OS Build 17134.345

October 09, 2018
KB4462919
Resolved
KB4471324
Resolved:
December 11, 2018
10:00 AM PT

Opened:
October 09, 2018
10:00 AM PT
Developer Tools (F12) fail to start in Microsoft Edge
Developer Tools (F12) may fail to start in Microsoft Edge.

Affected platforms:
  • Client: Windows 10, version 1803
  • Server: Windows Server, version 1803
 
Resolution: This issue is resolved in KB4467702

Back to top
OS Build 17134.376

October 24, 2018
KB4462933
Resolved
KB4467702
Resolved:
November 13, 2018
10:00 AM PT

Opened:
October 24, 2018
02:00 PM PT
@@ -126,7 +126,7 @@ sections: - items: - type: markdown text: " - +
DetailsAffected buildStatusHistory
@@ -137,7 +137,7 @@ sections: - items: - type: markdown text: " -
DetailsOriginating updateStatusHistory
SqlConnection instantiation exception on .NET 4.6 and later
After you install the August Preview of Quality Rollup or September 11, 2018 .NET Framework update, instantiation of SqlConnection can throw an exception.  

For more information about this issue, see the following article in the Microsoft Knowledge Base: 4470809, SqlConnection instantiation exception on .NET 4.6 and later after August-September 2018 .NET Framework updates.

Affected platforms:
  • Client: Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016
  • Server: Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016

Resolution: This issue is resolved in KB4480976

Back to top
OS Build 17134.285

September 11, 2018
KB4457128
Resolved
KB4480976
Resolved:
January 15, 2019
10:00 AM PT

Opened:
September 11, 2018
10:00 AM PT
Users cannot set Win32 program defaults
After installing KB4458469, some users cannot set Win32 program defaults for certain app and file type combinations using the Open with... command or Settings > Apps > Default apps
 
In some cases, Microsoft Notepad or other Win32 programs cannot be set as the default.

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803

Resolution: This issue is resolved in KB4467682

Back to top
OS Build 17134.320

September 26, 2018
KB4458469
Resolved
KB4467682
Resolved:
November 27, 2018
10:00 AM PT

Opened:
September 26, 2018
02:00 PM PT
Guest VMs running Unicast NLB fail to respond after restart
All guest virtual machines running Unicast NLB fail to respond to NLB requests after the virtual machines restart. 

Affected platforms:
  • Client: Windows 10, version 1803; Windows 10, version 1507
  • Server: Windows Server, version 1803
 
Resolution: This issue is resolved in KB4458469

Back to top
OS Build 17134.285

September 11, 2018
KB4457128
Resolved
KB4458469
Resolved:
September 20, 2018
10:00 AM PT

Opened:
September 11, 2018
10:00 AM PT
+
DetailsAffected buildStatusHistory
DetailsOriginating updateStatusHistory
Microsoft Intune takes a long time to deliver user profiles
After installing KB4457128, Windows no longer recognizes the Personal Information exchange (PFX) certificate that's used for authenticating to a Wi-Fi or VPN connection. As a result, Microsoft Intune takes a long time to deliver user profiles because it doesn't recognize that the required certificate is on the device. 

Affected platforms:
  • Client: Windows 10, version 1803
  • Server: Windows Server, version 1803
 
Resolution: This issue is resolved in KB4464218

Back to top
OS Build 17134.191

July 24, 2018
KB4340917
Resolved
KB4464218
Resolved:
September 17, 2018
10:00 AM PT

Opened:
July 24, 2018
10:00 AM PT
" diff --git a/windows/release-information/resolved-issues-windows-10-1809-and-windows-server-2019.yml b/windows/release-information/resolved-issues-windows-10-1809-and-windows-server-2019.yml index 7f2b797115..ba10d0ec4a 100644 --- a/windows/release-information/resolved-issues-windows-10-1809-and-windows-server-2019.yml +++ b/windows/release-information/resolved-issues-windows-10-1809-and-windows-server-2019.yml @@ -68,7 +68,7 @@ sections: - items: - type: markdown text: " - +
DetailsAffected buildStatusHistory
DetailsOriginating updateStatusHistory
End-user-defined characters (EUDC) may cause blue screen at startup
If you enable per font end-user-defined characters (EUDC), the system will stop working and a blue screen may appear at startup. This is not a common setting in non-Asian regions.

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016

Workaround: To avoid this issue, don't enable per font EUDC. As an alternative, you can edit the registry to mitigate this issue; for more information, see KB4496149.

Resolved: This issue was resolved in KB4493509.

Back to top
OS Build 17763.404

April 02, 2019
KB4490481
Resolved
KB4493509
Resolved:
April 09, 2019
10:00 AM PT

Opened:
April 02, 2019
10:00 AM PT
" @@ -77,7 +77,7 @@ sections: - items: - type: markdown text: " - +
DetailsAffected buildStatusHistory
DetailsOriginating updateStatusHistory
Apps may stop working after selecting an audio output device other than the default
After installing KB4482887 on machines that have multiple audio devices, applications that provide advanced options for internal or external audio output devices may stop working unexpectedly. This issue occurs for users that select an audio output device different from the \"Default Audio Device\". Examples of applications that may stop working include: 
  • Windows Media Player 
  • Realtek HD Audio Manager 
  • Sound Blaster Control Panel 

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019
  • Server: Windows Server, version 1809; Windows Server 2019

Workaround: As a temporary solution, select the \"Default Audio Device\" in the options provided by the application; please refer to the application's user manual for details. 
For example, to set the Default Audio Device in Windows Media Player: 
  1. Open Windows Media Player > Tools > Options > Devices.
  2. Select the device and choose Properties.
  3. On the next dialog, from the drop-down menu under Select the Audio Device, choose Default Audio Device from the list. 
You can then send audio from the application to the audio device you want in the per-application audio settings found under Settings > System > Sound > App Volume and device preferences.

Resolved: This issue was resolved in KB4490481

Back to top
OS Build 17763.348

March 01, 2019
KB4482887
Resolved
KB4490481
Resolved:
April 02, 2019
10:00 AM PT

Opened:
March 01, 2019
10:00 AM PT
" @@ -86,7 +86,7 @@ sections: - items: - type: markdown text: " - +
DetailsAffected buildStatusHistory
@@ -98,7 +98,7 @@ sections: - items: - type: markdown text: " -
DetailsOriginating updateStatusHistory
Error 1309 when installing/uninstalling MSI or MSP files
After installing KB4487044, users may receive \"Error 1309\" while installing or uninstalling certain types of MSI and MSP files. 

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 8.1
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2

Resolution: This issue is resolved in KB4489899

Back to top
OS Build 17763.316

February 12, 2019
KB4487044
Resolved
KB4489899
Resolved:
March 12, 2019
10:00 AM PT

Opened:
February 12, 2019
10:00 AM PT
Internet Explorer may fail to load images
After installing KB4487044, Internet Explorer may fail to load images with a backslash (\\) in their relative source path.

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 8.1; Windows 7, Service Pack 1
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2; Windows Server 2008 R2 SP1

Resolution: This issue is resolved in KB4482887.

Back to top
OS Build 17763.316

February 12, 2019
KB4487044
Resolved
KB4482887
Resolved:
March 01, 2019
10:00 AM PT

Opened:
February 12, 2019
10:00 AM PT
Applications using Microsoft Jet database and Access 95 file format stop working
Applications that use a Microsoft Jet database with the Microsoft Access 95 file format may randomly stop working.

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 7, Service Pack 1
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2008 R2 SP1

Resolution: This issue is resolved in KB4482887.

Back to top
OS Build 17763.316

February 12, 2019
KB4487044
Resolved
KB4482887
Resolved:
March 01, 2019
10:00 AM PT

Opened:
February 12, 2019
10:00 AM PT
+
DetailsAffected buildStatusHistory
@@ -111,7 +111,7 @@ sections: - items: - type: markdown text: " -
DetailsOriginating updateStatusHistory
Internet Explorer 11 authentication issue with multiple concurrent logons
After installing the February 12, 2019 update (KB4487044), Internet Explorer 11 and other applications that use WININET.DLL may have authentication issues. This occurs when two or more people use the same user account for multiple, concurrent login sessions on the same Windows Server machine, including Remote Desktop Protocol (RDP) and Terminal Server logons. Symptoms reported by customers include, but may not be limited to:  
  • Cache size and location show zero or empty. 
  • Keyboard shortcuts may not work properly. 
  • Webpages may intermittently fail to load or render correctly. 
  • Issues with credential prompts. 
  • Issues when downloading files. 

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10 Enterprise LTSC 2016; Windows 8.1; Windows 7, Service Pack 1
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server 2016; Windows Server 2012 R2; Windows Server 2008 R2 SP1
 
Resolved: This issue was resolved in KB4493509

Back to top
OS Build 17763.253

January 08, 2019
KB4480116
Resolved
KB4493509
Resolved:
April 09, 2019
10:00 AM PT

Opened:
January 08, 2019
10:00 AM PT
MSXML6 may cause applications to stop responding
After installing KB4480116, MSXML6 causes applications to stop responding if an exception was thrown during node operations, such as appendChild(), insertBefore(), and moveNode().
 
The Group Policy editor may stop responding when editing a Group Policy Object (GPO) that contains Group Policy Preferences (GPP) for Internet Explorer 10 settings. 

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 8.1
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2

Resolved: This issue was resolved in KB4493509

Back to top
OS Build 17763.253

January 08, 2019
KB4480116
Resolved
KB4493509
Resolved:
April 09, 2019
10:00 AM PT

Opened:
January 08, 2019
10:00 AM PT
Global DNS outage affects Windows Update customers
Windows Update customers were affected by a network infrastructure event on January 29, 2019 (21:00 UTC), caused by an external DNS service provider's global outage. A software update to the external provider's DNS servers resulted in the distribution of corrupted DNS records that affected connectivity to the Windows Update service. The DNS records were restored by January 30, 2019 (00:10 UTC), and the majority of local Internet Service Providers (ISP) have refreshed their DNS servers and customer services have been restored. 
 
Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019
  • Server: Windows Server, version 1809; Windows Server 2019

While this was not an issue with Microsoft's services, we take any service disruption for our customers seriously. We will work with partners to better understand this so we can provide higher quality service in the future even across diverse global network providers. 
 
If you are still unable to connect to Windows Update services due to this problem, please contact your local ISP or network administrator. You can also refer to our new KB4493784 for more information to determine if your network is affected, and to provide your local ISP or network administrator with additional information to assist you. 

Back to top
N/A

Resolved
Resolved:
March 08, 2019
11:15 AM PT

Opened:
January 29, 2019
02:00 PM PT
+
DetailsAffected buildStatusHistory
DetailsOriginating updateStatusHistory
Microsoft Edge may crash or hang while playing video
nVidia has notified Microsoft of an issue where Microsoft Edge may crash or hang while playing video. This issue occurs following an nVidia driver update.

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019
  • Server: Windows Server, version 1809; Windows Server 2019

Resolution: nVidia has released an updated driver to address this issue. Please follow the instructions found in nVidia's support article

Back to top
OS Build 17763.165

December 05, 2018
KB4469342
Resolved
Resolved:
November 29, 2018
10:03 AM PT

Opened:
December 05, 2018
02:00 PM PT
" @@ -120,7 +120,7 @@ sections: - items: - type: markdown text: " - +
DetailsAffected buildStatusHistory
@@ -136,7 +136,7 @@ sections: - items: - type: markdown text: " -
DetailsOriginating updateStatusHistory
Shared albums may not sync with iCloud for Windows
Upgrade block: Users who attempt to install iCloud for Windows (version 7.7.0.27) will see a message displayed that this version iCloud for Windows isn't supported and the install will fail.

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019
  • Server: Windows Server, version 1809; Windows Server 2019

To ensure a seamless experience, Microsoft is blocking devices with iCloud for Windows (version 7.7.0.27) software installed from being offered Window 10, version 1809 until this issue has been resolved. 

We recommend that you do not attempt to manually update using the Update now button or the Media Creation Tool from the Microsoft software download website until this issue is resolved. 
 
Resolution: Apple has released an updated version of iCloud for Windows (version 7.8.1) that resolves compatibility issues encountered when updating or synching Shared Albums after updating to Windows 10, version 1809. We recommend that you update your iCloud for Windows to version 7.8.1 when prompted before attempting to upgrade to Windows 10, version 1809. You can also manually download the latest version of iCloud for Windows by visiting https://support.apple.com/en-us/HT204283.

Back to top
OS Build 17763.134

November 13, 2018
KB4467708
Resolved
KB4482887
Resolved:
March 01, 2019
10:00 AM PT

Opened:
November 13, 2018
10:00 AM PT
Intel Audio Display (intcdaud.sys) notification during Windows 10 Setup
Upgrade block: Microsoft and Intel have identified a compatibility issue with a range of Intel Display Audio device drivers (intcdaud.sys, versions 10.25.0.3 - 10.25.0.8) that may result in excessive processor demand and reduced battery life. As a result, the update process to the Windows 10 October 2018 Update (Windows 10, version 1809) will fail and affected devices will automatically revert to the previous working configuration. 

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019
  • Server: Windows Server, version 1809; Windows Server 2019

If you see a \"What needs your attention\" notification during installation of the October 2018 Update, you have one of these affected drivers on your system. On the notification, click Back to remain on your current version of Windows 10. 
 
To ensure a seamless experience, we are blocking devices from being offered the October 2018 Update until updated Intel device drivers are installed on your current operating system. We recommend that you do not attempt to manually update to Windows 10, version 1809, using the Update Now button or the Media Creation Tool from the Microsoft Software Download Center until newer Intel device drivers are available with the update. You can either wait for newer drivers to be installed automatically through Windows Update or check with your computer manufacturer for the latest device driver software availability and installation procedures. For more information about this issue, see Intel's customer support guidance.
 
Resolution: This issue was resolved in KB4482887 and the upgrade block removed. 

Back to top
OS Build 17763.134

November 13, 2018
KB4467708
Resolved
KB4482887
Resolved:
March 01, 2019
10:00 AM PT

Opened:
November 13, 2018
10:00 AM PT
F5 VPN clients losing network connectivity
Upgrade block: After updating to Window 10, version 1809, F5 VPN clients may lose network connectivity when the VPN service is in a split tunnel configuration.

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019
  • Server: Windows Server, version 1809; Windows Server 2019

Resolution: This issue was resolved in KB4482887 and the upgrade block removed. 

Back to top
OS Build 17763.134

November 13, 2018
KB4467708
Resolved
KB4482887
Resolved:
March 01, 2019
10:00 AM PT

Opened:
November 13, 2018
10:00 AM PT
+
DetailsAffected buildStatusHistory
DetailsOriginating updateStatusHistory
Unable to use Seek bar in Windows Media Player
After installing KB4464330, users may not be able to use the Seek bar in Windows Media Player when playing specific files. This issue does not affect normal playback. 

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 8.1; Windows 7, Service Pack 1
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2; Windows Server 2008 R2 SP1

Resolution: This issue is resolved in KB4471332

Back to top
OS Build 17763.55

October 09, 2018
KB4464330
Resolved
KB4471332
Resolved:
December 11, 2018
10:00 AM PT

Opened:
October 09, 2018
10:00 AM PT
Users cannot set Win32 program defaults
After installing KB4464330, some users cannot set Win32 program defaults for certain app and file type combinations using the Open with... command or Settings > Apps > Default apps.
 
In some cases, Microsoft Notepad or other Win32 programs cannot be set as the default. 

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803

Resolution: This issue is resolved in KB4469342

Back to top
OS Build 17763.55

October 09, 2018
KB4464330
Resolved
KB4469342
Resolved:
December 05, 2018
02:00 PM PT

Opened:
October 09, 2018
10:00 AM PT
diff --git a/windows/release-information/resolved-issues-windows-7-and-windows-server-2008-r2-sp1.yml b/windows/release-information/resolved-issues-windows-7-and-windows-server-2008-r2-sp1.yml index 56ce7a94dd..47a53752d1 100644 --- a/windows/release-information/resolved-issues-windows-7-and-windows-server-2008-r2-sp1.yml +++ b/windows/release-information/resolved-issues-windows-7-and-windows-server-2008-r2-sp1.yml @@ -58,7 +58,7 @@ sections: - items: - type: markdown text: " - +
DetailsAffected buildStatusHistory
DetailsOriginating updateStatusHistory
Devices may not respond at login or Welcome screen if running certain Avast software.
Microsoft and Avast have identified an issue on devices running Avast for Business, Avast CloudCare, and AVG Business Edition antivirus software after you install KB4493472 and restart. Devices may become unresponsive at the login or Welcome screen. Additionally, you may be unable to log in or log in after an extended period of time.

Affected platforms: 
  • Client: Windows 8.1; Windows 7, Service Pack 1 
  • Server: Windows Server 2012 R2; Windows Server 2008 R2 SP1 

Resolution: Avast has released emergency updates to address this issue. For more information and AV update schedule, see the Avast support KB article.

Back to top
April 09, 2019
KB4493472
Resolved
Resolved:
April 09, 2019
10:00 AM PT

Opened:
April 09, 2019
10:00 AM PT
" @@ -67,7 +67,7 @@ sections: - items: - type: markdown text: " - +
DetailsAffected buildStatusHistory
DetailsOriginating updateStatusHistory
Custom URI schemes may not start corresponding application.
After installing KB4489878, custom URI schemes for application protocol handlers may not start the corresponding application for local intranet and trusted sites on Internet Explorer.

Affected platforms: 
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 8.1; Windows 7, Service Pack 1 
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2; Windows Server 2008 R2 SP1 

Resolution: This issue is resolved in KB4493472.

Back to top
March 12, 2019
KB4489878
Resolved
KB4493472
Resolved:
April 09, 2019
10:00 AM PT

Opened:
March 12, 2019
10:00 AM PT
NETDOM.EXE fails to run.
After installing KB4489878, NETDOM.EXE fails to run, and the on-screen error, “The command failed to complete successfully.” appears.

Affected platforms: 
  • Client: Windows 7, Service Pack 1 
  • Server: Windows Server 2008 R2 SP1 

Resolution: This issue is resolved in KB4493472.

Back to top
March 12, 2019
KB4489878
Resolved
KB4493472
Resolved:
April 09, 2019
10:00 AM PT

Opened:
March 12, 2019
10:00 AM PT
@@ -77,7 +77,7 @@ sections: - items: - type: markdown text: " - +
DetailsAffected buildStatusHistory
DetailsOriginating updateStatusHistory
Internet Explorer may fail to load images.
After installing KB4486563, Internet Explorer may fail to load images with a backslash (\\) in their relative source path.

Affected platforms: 
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 8.1; Windows 7, Service Pack 1 
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2; Windows Server 2008 R2 SP1 

Resolution: This issue is resolved in KB4486565.

Back to top
February 12, 2019
KB4486563
Resolved
KB4486565
Resolved:
February 19, 2019
02:00 PM PT

Opened:
February 12, 2019
10:00 AM PT
Applications using Microsoft Jet database and Access 95 file format stop working.
Applications that use a Microsoft Jet database with the Microsoft Access 95 file format may randomly stop working.

Affected platforms: 
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 7, Service Pack 1 
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2008 R2 SP1 

Resolution: This issue is resolved in KB4486565.

Back to top
February 12, 2019
KB4486563
Resolved
KB4486565
Resolved:
February 19, 2019
02:00 PM PT

Opened:
February 12, 2019
10:00 AM PT
@@ -87,7 +87,7 @@ sections: - items: - type: markdown text: " - +
DetailsAffected buildStatusHistory
@@ -100,7 +100,7 @@ sections: - items: - type: markdown text: " -
DetailsOriginating updateStatusHistory
Virtual machines fail to restore.
After installing KB4480970, virtual machines (VM) may fail to restore successfully if the VM has been saved and restored once before. The error message is, “Failed to restore the virtual machine state: Cannot restore this virtual machine because the saved state data cannot be read. Delete the saved state data and then try to start the virtual machine. (0xC0370027).”

This affects AMD Bulldozer Family 15h, AMD Jaguar Family 16h, and AMD Puma Family 16h (second generation) microarchitectures.

Affected platforms: 
  • Client: Windows 7, Service Pack 1 
  • Server: Windows Server 2008 R2 SP1 

Resolution: This issue is resolved in KB4490511.

Back to top
January 08, 2019
KB4480970
Resolved
KB4490511
Resolved:
February 19, 2019
02:00 PM PT

Opened:
January 08, 2019
10:00 AM PT
Local Administrators unable to remotely access shares.
Local users who are part of the local Administrators group may not be able to remotely access shares on Windows Server 2008 R2 and Windows 7 machines after installing KB4480970. This does not affect domain accounts in the local Administrators group.
 
Affected platforms: 
  • Client: Windows 7, Service Pack 1 
  • Server: Windows Server 2008 R2 SP1 

Resolution: This issue is resolved in KB4487345.

Back to top
January 08, 2019
KB4480970
Resolved
KB4487345
Resolved:
January 11, 2019
02:00 PM PT

Opened:
January 08, 2019
10:00 AM PT
Internet Explorer 11 authentication issue with multiple concurrent logons.
After installing KB4480970, Internet Explorer 11 and other applications that use WININET.DLL may have authentication issues. This occurs when two or more people use the same user account for multiple, concurrent login sessions on the same Windows Server machine, including Remote Desktop Protocol (RDP) and Terminal Server logons. Symptoms reported by customers include, but may not be limited to:
  • Cache size and location show zero or empty.
  • Keyboard shortcuts may not work properly.
  • Webpages may intermittently fail to load or render correctly.
  • Issues with credential prompts.
  • Issues when downloading files.

Affected platforms: 
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10 Enterprise LTSC 2016; Windows 8.1; Windows 7, Service Pack 1 
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server 2016; Windows Server 2012 R2; Windows Server 2008 R2 SP1 

Resolution: This issue is resolved in KB4493472.

Back to top
January 08, 2019
KB4480970
Resolved
KB4493472
Resolved:
April 09, 2019
10:00 AM PT

Opened:
January 08, 2019
10:00 AM PT
+
DetailsAffected buildStatusHistory
DetailsOriginating updateStatusHistory
Event Viewer may not show some event descriptions for network interface cards.
After installing KB4462927, the Event Viewer may not show some event descriptions for network interface cards (NICs).

Affected Platforms:
  • Client: Windows 7, Service Pack 1 
  • Server: Windows Server 2008 R2 SP1 

Resolution: This issue is resolved in KB4489878.

Back to top
October 18, 2018
KB4462927
Resolved
KB4489878
Resolved:
March 12, 2019
10:00 AM PT

Opened:
October 18, 2018
10:00 AM PT
Unable to use Seek bar in Windows Media Player
After installing KB4462923, users may not be able to use the Seek Bar in Windows Media Player when playing specific files. This issue does not affect normal playback.

Affected platforms: 
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 8.1; Windows 7, Service Pack 1.
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2; Windows Server 2008 R2 SP1

Resolution: This issue is resolved in KB4471318.

Back to top
October 09, 2018
KB4462923
Resolved
KB4471318
Resolved:
December 11, 2018
10:00 AM PT

Opened:
October 09, 2018
10:00 AM PT
diff --git a/windows/release-information/resolved-issues-windows-8.1-and-windows-server-2012-r2.yml b/windows/release-information/resolved-issues-windows-8.1-and-windows-server-2012-r2.yml index ea34024180..f9888653f7 100644 --- a/windows/release-information/resolved-issues-windows-8.1-and-windows-server-2012-r2.yml +++ b/windows/release-information/resolved-issues-windows-8.1-and-windows-server-2012-r2.yml @@ -59,7 +59,7 @@ sections: - items: - type: markdown text: " - +
DetailsAffected buildStatusHistory
DetailsOriginating updateStatusHistory
Devices may not respond at login or Welcome screen if running certain Avast software
Microsoft and Avast have identified an issue on devices running Avast for Business, Avast CloudCare, and AVG Business Edition antivirus software after you install KB4493446 and restart. Devices may become unresponsive at the login or Welcome screen. Additionally, you may be unable to log in or log in after an extended period of time.

Affected platforms: 
  • Client: Windows 8.1; Windows 7, Service Pack 1 
  • Server: Windows Server 2012 R2; Windows Server 2008 R2 SP1 


Resolution: Avast has released emergency updates to address this issue. For more information and AV update schedule, see the Avast support KB article.

Back to top
April 09, 2019
KB4493446
Resolved
Resolved:
April 09, 2019
10:00 AM PT

Opened:
April 09, 2019
10:00 AM PT
" @@ -68,7 +68,7 @@ sections: - items: - type: markdown text: " - +
DetailsAffected buildStatusHistory
DetailsOriginating updateStatusHistory
Custom URI schemes may not start corresponding application
After installing KB4489881, custom URI schemes for application protocol handlers may not start the corresponding application for local intranet and trusted sites security zones on Internet Explorer.

Affected platforms: 
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 8.1; Windows 7, Service Pack 1 
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2; Windows Server 2008 R2 SP1 

Resolution: This issue is resolved in KB4493446.

Back to top
March 12, 2019
KB4489881
Resolved
KB4493446
Resolved:
April 09, 2019
10:00 AM PT

Opened:
March 12, 2019
10:00 AM PT
Devices with winsock kernel client may receive error
After installing KB4489881, devices with a winsock kernel client may receive D1, FC, and other errors. Additionally, systems that run the Skype for Business or Lync Server Edge Transport role may be affected by this issue.

Affected platforms: 
  • Client: Windows 8.1 
  • Server: Windows Server 2012 R2 

Resolution: This issue is resolved in KB4489893.

Back to top
March 12, 2019
KB4489881
Resolved
KB4489893
Resolved:
March 19, 2019
10:00 AM PT

Opened:
March 12, 2019
10:00 AM PT
@@ -78,7 +78,7 @@ sections: - items: - type: markdown text: " - +
DetailsAffected buildStatusHistory
@@ -89,7 +89,7 @@ sections: - items: - type: markdown text: " -
DetailsOriginating updateStatusHistory
Embedded objects may display incorrectly
Any compound document (OLE) server application that places embedded objects into the Windows Metafile (WMF) using the PatBlt API may display embedded objects incorrectly.

For example, if you paste a Microsoft Excel worksheet object into a Microsoft Word document, the cells may render with a different background color.

Affected platforms: 
  • Client: Windows 8.1 
  • Server: Windows Server 2012 R2 

Resolution: This issue is resolved in KB4493446.

Back to top
February 12, 2019
KB4487000
Resolved
KB4493446
Resolved:
April 09, 2019
10:00 AM PT

Opened:
February 12, 2019
10:00 AM PT
Error 1309 when installing/uninstalling MSI or MSP files
After installing KB4487016, users may receive “Error 1309” while installing or uninstalling certain types of MSI and MSP files.

Affected platforms: 
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 8.1 
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2 

Resolution: This issue is resolved in KB4489881.

Back to top
February 19, 2019
KB4487016
Resolved
KB4489881
Resolved:
March 12, 2019
10:00 AM PT

Opened:
February 19, 2019
02:00 PM PT
Internet Explorer may fail to load images
After installing KB4487000, Internet Explorer may fail to load images with a backslash (\\) in their relative source path.

Affected platforms: 
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 8.1; Windows 7, Service Pack 1 
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2; Windows Server 2008 R2 SP1 

Resolution: This issue is resolved in KB4487016.

Back to top
February 12, 2019
KB4487000
Resolved
KB4487016
Resolved:
February 19, 2019
02:00 PM PT

Opened:
February 12, 2019
10:00 AM PT
+
DetailsAffected buildStatusHistory
@@ -103,7 +103,7 @@ sections: - items: - type: markdown text: " -
DetailsOriginating updateStatusHistory
Internet Explorer 11 authentication issue with multiple concurrent logons
After installing KB4480963, Internet Explorer 11 and other applications that use WININET.DLL may have authentication issues. This occurs when two or more people use the same user account for multiple, concurrent login sessions on the same Windows Server machine, including Remote Desktop Protocol (RDP) and Terminal Server logons. Symptoms reported by customers include, but may not be limited to:
  • Cache size and location show zero or empty.
  • Keyboard shortcuts may not work properly.
  • Webpages may intermittently fail to load or render correctly.
  • Issues with credential prompts.
  • Issues when downloading files.

Affected platforms: 
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10 Enterprise LTSC 2016; Windows 8.1; Windows 7, Service Pack 1 
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server 2016; Windows Server 2012 R2; Windows Server 2008 R2 SP1 

Resolution: This issue is resolved in KB4493446.

Back to top
January 08, 2019
KB4480963
Resolved
KB4493446
Resolved:
April 09, 2019
10:00 AM PT

Opened:
January 08, 2019
10:00 AM PT
MSXML6 may cause applications to stop responding.
After installing KB4480963, MSXML6 causes applications to stop responding if an exception was thrown during node operations, such as appendChild(), insertBefore(), and moveNode().

The Group Policy editor may stop responding when editing a Group Policy Object (GPO) that contains Group Policy Preferences (GPP) for Internet Explorer 10 settings.

Resolution: This issue is resolved in KB4493446.

Back to top
January 08, 2019
KB4480963
Resolved
KB4493446
Resolved:
April 09, 2019
10:00 AM PT

Opened:
January 08, 2019
10:00 AM PT
First character of the Japanese era name not recognized as an abbreviation
After installing KB4480969, the first character of the Japanese era name is not recognized as an abbreviation and may cause date parsing issues.

Affected platforms: 
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 8.1; Windows 7, Service Pack 1 
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2; Windows Server 2008 R2 SP1 

Resolution: This issue is resolved in KB4487016.

Back to top
January 15, 2019
KB4480969
Resolved
KB4487016
Resolved:
February 19, 2019
02:00 PM PT

Opened:
January 15, 2019
10:00 AM PT
+
DetailsAffected buildStatusHistory
DetailsOriginating updateStatusHistory
Unable to use Seek bar in Windows Media Player
After installing KB4462926, users may not be able to use the Seek Bar in Windows Media Player when playing specific files. This issue does not affect normal playback.

Affected platforms: 
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 8.1; Windows 7, Service Pack 1 
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2; Windows Server 2008 R2 SP1 

Resolution: This issue is resolved in KB4471320.

Back to top
October 09, 2018
KB4462926
Resolved
KB4471320
Resolved:
December 11, 2018
10:00 AM PT

Opened:
October 09, 2018
10:00 AM PT
" diff --git a/windows/release-information/resolved-issues-windows-server-2008-sp2.yml b/windows/release-information/resolved-issues-windows-server-2008-sp2.yml index 1b9ea0be8e..75498de24e 100644 --- a/windows/release-information/resolved-issues-windows-server-2008-sp2.yml +++ b/windows/release-information/resolved-issues-windows-server-2008-sp2.yml @@ -54,7 +54,7 @@ sections: - items: - type: markdown text: " - +
DetailsAffected buildStatusHistory
diff --git a/windows/release-information/resolved-issues-windows-server-2012.yml b/windows/release-information/resolved-issues-windows-server-2012.yml index 6da451eb86..d43b402ca9 100644 --- a/windows/release-information/resolved-issues-windows-server-2012.yml +++ b/windows/release-information/resolved-issues-windows-server-2012.yml @@ -57,7 +57,7 @@ sections: - items: - type: markdown text: " -
DetailsOriginating updateStatusHistory
First character of the Japanese era name not recognized as an abbreviation
After installing KB4480974, the first character of the Japanese era name is not recognized as an abbreviation and may cause date parsing issues.

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 8.1; Windows 7, Service Pack 1
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2; Windows Server 2012; Windows Server 2008 R2 SP1; Windows Server 2008 SP2

Resolution: This issue is resolved in KB4489880.

Back to top
N/A
January 17, 2019
KB4480974
Resolved
KB4489880
Resolved:
March 12, 2019
10:00 AM PT

Opened:
April 25, 2019
03:32 PM PT
Applications using Microsoft Jet database fail to open
Applications that use a Microsoft Jet database with the Microsoft Access 97 file format may fail to open if the database has column names greater than 32 characters. The database will fail to open with the error, “Unrecognized Database Format”.

Affected platforms: 
  • Client: Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 8.1; Windows 7, Service Pack 1 
  • Server: Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2; Windows Server 2012; Windows Server 2008 R2 SP1; Windows Server 2008 SP2

Resolution: This issue is resolved in KB4487023.

Back to top
N/A
January 08, 2019
KB4480968
Resolved
KB4487023
Resolved:
February 12, 2019
10:00 AM PT

Opened:
April 25, 2019
03:32 PM PT
Unable to use Seek bar in Windows Media Player
After installing KB4463097, users may not be able to use the Seek Bar in Windows Media Player when playing specific files. This issue does not affect normal playback.

Affected platforms: 
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 8.1; Windows 7, Service Pack 1
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2; Windows Server 2012; Windows Server 2008 R2 SP1; Windows Server 2008 SP2

Resolution: This issue is resolved in KB4471325.

Back to top
N/A
October 09, 2018
KB4463097
Resolved
KB4471325
Resolved:
December 11, 2018
10:00 AM PT

Opened:
April 25, 2019
03:28 PM PT
+
DetailsAffected buildStatusHistory
diff --git a/windows/release-information/status-windows-10-1507.yml b/windows/release-information/status-windows-10-1507.yml index efe90a9f97..120633fde0 100644 --- a/windows/release-information/status-windows-10-1507.yml +++ b/windows/release-information/status-windows-10-1507.yml @@ -76,7 +76,7 @@ sections: - items: - type: markdown text: " -
DetailsOriginating updateStatusHistory
Applications using Microsoft Jet database and Access 95 file format stop working
Applications that use a Microsoft Jet database with the Microsoft Access 95 file format may randomly stop working.

Resolution: This issue is resolved in KB4487024.

Back to top
February 12, 2019
KB4487025
Resolved
KB4487024
Resolved:
February 19, 2019
02:00 PM PT

Opened:
April 25, 2019
04:04 PM PT
First character of the Japanese era name not recognized as an abbreviation
After installing KB4480971, the first character of the Japanese era name is not recognized as an abbreviation and may cause date parsing issues.

Resolution: This issue is resolved in KB4487024.

Back to top
January 15, 2019
KB4480971
Resolved
KB4487024
Resolved:
February 19, 2019
02:00 PM PT

Opened:
April 25, 2019
04:01 PM PT
Embedded objects may display incorrectly
Any compound document (OLE) server application that places embedded objects into the Windows Metafile (WMF) using the PatBlt API may display embedded objects incorrectly.

For example, if you paste a Microsoft Excel worksheet object into a Microsoft Word document, the cells may render with a different background color.

Resolution: This issue is resolved in KB4493451.

Back to top
February 12, 2019
KB4487025
Resolved
KB4493451
Resolved:
April 09, 2019
10:00 AM PT

Opened:
April 25, 2019
04:00 PM PT
+
DetailsAffected buildStatusHistory
DetailsOriginating updateStatusHistory
Custom URI schemes may not start corresponding application
After installing KB4489872, Custom URI Schemes for Application Protocol handlers may not start the corresponding application for local intranet and trusted sites on Internet Explorer.

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 8.1; Windows 7, Service Pack 1 
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2; Windows Server 2008 R2 SP1

Resolution: This issue was resolved in KB4493475.

Back to top
OS Build 10240.18158

March 12, 2019
KB4489872
Resolved
KB4493475
Resolved:
April 09, 2019
10:00 AM PT

Opened:
March 12, 2019
10:00 AM PT
" @@ -85,7 +85,7 @@ sections: - items: - type: markdown text: " - +
DetailsAffected buildStatusHistory
DetailsOriginating updateStatusHistory
MSXML6 may cause applications to stop responding
After installing KB4480962, MSXML6 causes applications to stop responding if an exception was thrown during node operations, such as appendChild(), insertBefore(), and moveNode().

The Group Policy editor may stop responding when editing a Group Policy Object (GPO) that contains Group Policy Preferences (GPP) for Internet Explorer 10 settings.

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 8.1
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2

Resolution: This issue was resolved in KB4493475.

Back to top
OS Build 10240.18094

January 08, 2019
KB4480962
Resolved
KB4493475
Resolved:
April 09, 2019
10:00 AM PT

Opened:
January 08, 2019
10:00 AM PT
" diff --git a/windows/release-information/status-windows-10-1607-and-windows-server-2016.yml b/windows/release-information/status-windows-10-1607-and-windows-server-2016.yml index 65c93c715a..a36fdff01f 100644 --- a/windows/release-information/status-windows-10-1607-and-windows-server-2016.yml +++ b/windows/release-information/status-windows-10-1607-and-windows-server-2016.yml @@ -82,7 +82,7 @@ sections: - items: - type: markdown text: " - +
DetailsAffected buildStatusHistory
- +
Find out which components are updated by Dynamic Update, how Dynamic Update is initiated, and how to enable or disable it.
+ - - - +In order avoid this, you need to set your feature update deferral policy to 273 days or less. + + + +
Get insight into some of the practices we employ to measure and improve the quality of Windows.
- - - +
If you are still unable to connect to Windows Update services due to this problem, please contact your local ISP or network administrator. You can also refer to our new KB4493784 for more information to determine if your network is affected, and to provide your local ISP or network administrator with additional information to assist you.
+ + + - - - - - - - - - - - +If you are still unable to connect to Windows Update services due to this problem, please contact your local ISP or network administrator. You can also refer to our new KB4493784 for more information to determine if your network is affected, and to provide your local ISP or network administrator with additional information to assist you. + + + + + + + + + + +
DetailsOriginating updateStatusHistory
End-user-defined characters (EUDC) cause blue screen at startup
If you enable per font end-user-defined characters (EUDC), the system will stop working and a blue screen may appear at startup. This is not a common setting in non-Asian regions.

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016

Resolution: This issue was resolved in KB4493470.

Back to top
OS Build 14393.2879

March 19, 2019
KB4489889
Resolved
KB4493470
Resolved:
April 09, 2019
10:00 AM PT

Opened:
March 19, 2019
10:00 AM PT
Custom URI schemes may not start corresponding application
After installing KB4489882, Custom URI schemes for application protocol handlers may not start the corresponding application for local intranet and trusted sites security zones on Internet Explorer.

Affected platforms: 
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 8.1; Windows 7, Service Pack 1 
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2; Windows Server 2008 R2 SP1

Workaround: Right-click the URL link to open it in a new window or tab, or enable Protected Mode in Internet Explorer for local intranet and trusted sites
  1. Go to Tools > Internet options > Security.
  2. Within Select a zone to view or change security settings, select Local intranet and then select Enable Protected Mode.
  3. Select Trusted sites and then select Enable Protected Mode.
  4. Select OK.
You must restart the browser after making these changes.

Next steps: Microsoft is working on a resolution and will provide an update in an upcoming release.

Back to top
OS Build 14393.2848

March 12, 2019
KB4489882
Mitigated
Last updated:
March 19, 2019
10:00 AM PT

Opened:
March 12, 2019
10:00 AM PT
Issue using PXE to start a device from WDS
After installing KB4489882, there may be issues using the Preboot Execution Environment (PXE) to start a device from a Windows Deployment Services (WDS) server configured to use Variable Window Extension. This may cause the connection to the WDS server to terminate prematurely while downloading the image. This issue does not affect clients or devices that are not using Variable Window Extension.

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10 Enterprise LTSC 2016; Windows 8.1
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server 2016; Windows Server 2012 R2

Workaround: To mitigate the issue, disable the Variable Window Extension on WDS server using one of the following options:
Option 1:
Open an Administrator Command prompt and type the following:
Wdsutil /Set-TransportServer /EnableTftpVariableWindowExtension:No
@@ -94,7 +94,7 @@ sections:
 - items:
   - type: markdown
     text: "
-      
+      
DetailsAffected buildStatusHistory
DetailsOriginating updateStatusHistory
Internet Explorer 11 authentication issue with multiple concurrent logons
After installing KB4480961, Internet Explorer 11 and other applications that use WININET.DLL may have authentication issues. This occurs when two or more people use the same user account for multiple, concurrent login sessions on the same Windows Server machine, including Remote Desktop Protocol (RDP) and Terminal Server logons. Symptoms reported by customers include, but may not be limited to:
  • Cache size and location show zero or empty.
  • Keyboard shortcuts may not work properly.
  • Webpages may intermittently fail to load or render correctly.
  • Issues with credential prompts.
  • Issues when downloading files.

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10 Enterprise LTSC 2016; Windows 8.1; Windows 7, Service Pack 1
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server 2016; Windows Server 2012 R2; Windows Server 2008 R2 SP1

Resolution: This issue was resolved in KB4493470.

Back to top
OS Build 14393.2724

January 08, 2019
KB4480961
Resolved
KB4493470
Resolved:
April 09, 2019
10:00 AM PT

Opened:
January 08, 2019
10:00 AM PT
MSXML6 may cause applications to stop responding
After installing KB4480961, MSXML6 causes applications to stop responding if an exception was thrown during node operations, such as appendChild(), insertBefore(), and moveNode().

The Group Policy editor may stop responding when editing a Group Policy Object (GPO) that contains Group Policy Preferences (GPP) for Internet Explorer 10 settings.

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 8.1
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2

Resolution: This issue was resolved in KB4493470.

Back to top
OS Build 14393.2724

January 08, 2019
KB4480961
Resolved
KB4493470
Resolved:
April 09, 2019
10:00 AM PT

Opened:
January 08, 2019
10:00 AM PT
@@ -104,7 +104,7 @@ sections: - items: - type: markdown text: " - +
DetailsAffected buildStatusHistory
diff --git a/windows/release-information/status-windows-10-1703.yml b/windows/release-information/status-windows-10-1703.yml index 035ac5c2c4..a7cfff3a9d 100644 --- a/windows/release-information/status-windows-10-1703.yml +++ b/windows/release-information/status-windows-10-1703.yml @@ -77,7 +77,7 @@ sections: - items: - type: markdown text: " -
DetailsOriginating updateStatusHistory
Cluster service may fail if the minimum password length is set to greater than 14
After installing KB4467684, the cluster service may fail to start with the error \"2245 (NERR_PasswordTooShort)\" if the Group Policy \"Minimum Password Length\" is configured with greater than 14 characters.

Affected platforms:
  • Client: Windows 10 Enterprise LTSC 2016
  • Server: Windows Server 2016

Workaround: Set the domain default \"Minimum Password Length\" policy to less than or equal to 14 characters.

Next steps: Microsoft is working on a resolution and will provide an update in an upcoming release.

Back to top
OS Build 14393.2639

November 27, 2018
KB4467684
Mitigated
Last updated:
March 19, 2019
10:00 AM PT

Opened:
November 27, 2018
10:00 AM PT
SCVMM cannot enumerate and manage logical switches deployed on the host
For hosts managed by System Center Virtual Machine Manager (VMM), VMM cannot enumerate and manage logical switches deployed on the host after installing KB4467684.

Additionally, if you do not follow the best practices, a stop error may occur in vfpext.sys on the hosts.

Affected platforms:
  • Client: Windows 10 Enterprise LTSC 2016
  • Server: Windows Server 2016

Workaround:
Run mofcomp on the following mof files on the affected host:

  • Scvmmswitchportsettings.mof
  • VMMDHCPSvr.mof

Follow the best practices while patching to avoid a stop error in vfpext.sys in an SDN v2 environment (NC managed hosts).

Back to top
OS Build 14393.2639

November 27, 2018
KB4467684
Mitigated
Last updated:
March 19, 2019
10:00 AM PT

Opened:
November 27, 2018
10:00 AM PT
Windows may not start on certain Lenovo and Fujitsu laptops with less than 8GB of RAM
After installing KB4467691, Windows may fail to start on certain Lenovo and Fujitsu laptops that have less than 8 GB of RAM.

Affected platforms:
  • Client: Windows 10 Enterprise LTSC 2016
  • Server: Windows Server 2016

Workaround: Restart the affected machine using the Unified Extensible Firmware Interface (UEFI). Disable Secure Boot and then restart.

If BitLocker is enabled on your machine, you may have to go through BitLocker recovery after Secure Boot has been disabled.

Next steps: Lenovo and Fujitsu are aware of this issue. Please contact your OEM to ask if there is a firmware update available for your device.

Back to top
OS Build 14393.2608

November 13, 2018
KB4467691
Mitigated
Last updated:
February 19, 2019
10:00 AM PT

Opened:
November 13, 2018
10:00 AM PT
+
DetailsAffected buildStatusHistory
DetailsOriginating updateStatusHistory
End-user-defined characters (EUDC) may cause blue screen at startup
If you enable per font end-user-defined characters (EUDC), the system may stop working and a blue screen may appear at startup. This is not a common setting in non-Asian regions.

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016

Resolution: This issue was resolved in KB4493474.

Back to top
OS Build 15063.1716

March 19, 2019
KB4489888
Resolved
KB4493474
Resolved:
April 09, 2019
10:00 AM PT

Opened:
March 19, 2019
10:00 AM PT
Custom URI schemes may not start corresponding application
After installing KB4489871, custom URI schemes for application protocol handlers may not start the corresponding application for local intranet and trusted sites security zones on Internet Explorer.

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 8.1; Windows 7, Service Pack 1 
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2; Windows Server 2008 R2 SP1

Workaround: Right-click the URL link to open it in a new window or tab, or enable Protected Mode in Internet Explorer for local intranet and trusted sites
1. Go to Tools > Internet options > Security.
2. Within Select a zone to view or change security settings, select Local intranet and then select Enable Protected Mode.
3. Select Trusted sites and then select Enable Protected Mode.
4. Select OK.
You must restart the browser after making these changes.

Next steps: Microsoft is working on a resolution and will provide an update in an upcoming release.

Back to top
OS Build 15063.1689

March 12, 2019
KB4489871
Mitigated
Last updated:
March 19, 2019
10:00 AM PT

Opened:
March 12, 2019
10:00 AM PT
@@ -87,7 +87,7 @@ sections: - items: - type: markdown text: " - +
DetailsAffected buildStatusHistory
DetailsOriginating updateStatusHistory
MSXML6 may cause applications to stop responding
After installing KB4480973, MSXML6 causes applications to stop responding if an exception was thrown during node operations, such as appendChild(), insertBefore(), and moveNode().

The Group Policy editor may stop responding when editing a Group Policy Object (GPO) that contains Group Policy Preferences (GPP) for Internet Explorer 10 settings.

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 8.1
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2

Resolution: This issue was resolved in KB4493474.

Back to top
OS Build 15063.1563

January 08, 2019
KB4480973
Resolved
KB4493474
Resolved:
April 09, 2019
10:00 AM PT

Opened:
January 08, 2019
10:00 AM PT
" diff --git a/windows/release-information/status-windows-10-1709.yml b/windows/release-information/status-windows-10-1709.yml index fcddc35508..fb2e9c8c5e 100644 --- a/windows/release-information/status-windows-10-1709.yml +++ b/windows/release-information/status-windows-10-1709.yml @@ -78,7 +78,7 @@ sections: - items: - type: markdown text: " - +
DetailsAffected buildStatusHistory
@@ -89,7 +89,7 @@ sections: - items: - type: markdown text: " -
DetailsOriginating updateStatusHistory
End-user-defined characters (EUDC) may cause blue screen at startup
If you enable per font end-user-defined characters (EUDC), the system may stop working and a blue screen may appear at startup. This is not a common setting in non-Asian regions.

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016

Resolution: This issue is resolved in KB4493441.

Back to top
OS Build 16299.1059

March 19, 2019
KB4489890
Resolved
KB4493441
Resolved:
April 09, 2019
10:00 AM PT

Opened:
March 19, 2019
10:00 AM PT
Stop error when attempting to start SSH from WSL
After applying KB4489886, a stop error occurs when attempting to start the Secure Shell (SSH) client program from Windows Subsystem for Linux (WSL) with agent forwarding enabled using a command line switch (ssh –A) or a configuration setting.

Affected platforms:
  • Client: Windows 10, version 1803; Windows 10, version 1709
  • Server: Windows Server, version 1803; Windows Server, version 1709

Resolution: This issue is resolved in KB4493441.

Back to top
OS Build 16299.1029

March 12, 2019
KB4489886
Resolved
KB4493441
Resolved:
April 09, 2019
10:00 AM PT

Opened:
March 12, 2019
10:00 AM PT
Custom URI schemes may not start corresponding application
After installing KB4489886, custom URI schemes for application protocol handlers may not start the corresponding application for local intranet and trusted sites security zones on Internet Explorer.

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 8.1; Windows 7, Service Pack 1 
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2; Windows Server 2008 R2 SP1

Workaround: Right-click the URL link to open it in a new window or tab, or enable Protected Mode in Internet Explorer for local intranet and trusted sites
1. Go to Tools > Internet options > Security.
2. Within Select a zone to view or change security settings, select Local intranet and then select Enable Protected Mode.
3. Select Trusted sites and then select Enable Protected Mode.
4. Select OK.
You must restart the browser after making these changes.

Next steps: Microsoft is working on a resolution and will provide an update in an upcoming release.

Back to top
OS Build 16299.1029

March 12, 2019
KB4489886
Mitigated
Last updated:
March 19, 2019
10:00 AM PT

Opened:
March 12, 2019
10:00 AM PT
+
DetailsAffected buildStatusHistory
DetailsOriginating updateStatusHistory
MSXML6 causes applications to stop responding if an exception was thrown
After installing KB4480978, MSXML6 causes applications to stop responding if an exception was thrown during node operations, such as appendChild(), insertBefore(), and moveNode().

The Group Policy editor may stop responding when editing a Group Policy Object (GPO) that contains Group Policy Preferences (GPP) for Internet Explorer 10 settings.

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 8.1
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2

Resolution: This issue is resolved in KB4493441.

Back to top
OS Build 16299.904

January 08, 2019
KB4480978
Resolved
KB4493441
Resolved:
April 09, 2019
10:00 AM PT

Opened:
January 08, 2019
10:00 AM PT
" diff --git a/windows/release-information/status-windows-10-1803.yml b/windows/release-information/status-windows-10-1803.yml index f311534faf..604066333a 100644 --- a/windows/release-information/status-windows-10-1803.yml +++ b/windows/release-information/status-windows-10-1803.yml @@ -79,7 +79,7 @@ sections: - items: - type: markdown text: " - +
DetailsAffected buildStatusHistory
@@ -92,7 +92,7 @@ sections: - items: - type: markdown text: " -
DetailsOriginating updateStatusHistory
End-user-defined characters (EUDC) may cause blue screen at startup
If you enable per font end-user-defined characters (EUDC), the system may stop working and a blue screen may appear at startup. This is not a common setting in non-Asian regions. 

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016
 
Resolution: This issue was resolved in KB4493464

Back to top
OS Build 17134.677

March 19, 2019
KB4489894
Resolved
KB4493464
Resolved:
April 09, 2019
10:00 AM PT

Opened:
March 19, 2019
10:00 AM PT
Stop error when attempting to start SSH from WSL
After applying KB4489868, a stop error occurs when attempting to start the Secure Shell (SSH) client program from Windows Subsystem for Linux (WSL) with agent forwarding enabled using a command line switch (ssh -A) or a configuration setting.

Affected platforms:
  • Client: Windows 10, version 1803; Windows 10, version 1709
  • Server: Windows Server, version 1803; Windows Server, version 1709

Resolution: This issue was resolved in KB4493464.

Back to top
OS Build 17134.648

March 12, 2019
KB4489868
Resolved
KB4493464
Resolved:
April 09, 2019
10:00 AM PT

Opened:
March 12, 2019
10:00 AM PT
Custom URI schemes may not start corresponding application
After installing KB4489868, custom URI schemes for application protocol handlers may not start the corresponding application for local intranet and trusted sites security zones on Internet Explorer. 

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 8.1; Windows 7, Service Pack 1 
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2; Windows Server 2008 R2 SP1

Workaround: Right-click the URL link to open it in a new window or tab, or enable Protected Mode in Internet Explorer for local intranet and trusted sites
  1. Go to Tools > Internet options > Security 
  2. Within Select a zone to view or change security settings, select Local intranet and then select Enable Protected Mode.
  3. Select Trusted sites and then select Enable Protected Mode
  4. Select OK
 You must restart the browser after making these changes. 
 
Next steps: Microsoft is working on a resolution and will provide an update in an upcoming release. 

Back to top
OS Build 17134.648

March 12, 2019
KB4489868
Mitigated
Last updated:
March 19, 2019
10:00 AM PT

Opened:
March 12, 2019
10:00 AM PT
+
DetailsAffected buildStatusHistory
DetailsOriginating updateStatusHistory
MSXML6 may cause applications to stop responding
After installing KB4480966, MSXML6 causes applications to stop responding if an exception was thrown during node operations, such as appendChild(), insertBefore(), and moveNode().

The Group Policy editor may stop responding when editing a Group Policy Object (GPO) that contains Group Policy Preferences (GPP) for Internet Explorer 10 settings.

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 8.1
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2

Resolution: This issue was resolved in KB4493464

Back to top
OS Build 17134.523

January 08, 2019
KB4480966
Resolved
KB4493464
Resolved:
April 09, 2019
10:00 AM PT

Opened:
January 08, 2019
10:00 AM PT
" diff --git a/windows/release-information/status-windows-10-1809-and-windows-server-2019.yml b/windows/release-information/status-windows-10-1809-and-windows-server-2019.yml index f38fa35c52..5e0c34357f 100644 --- a/windows/release-information/status-windows-10-1809-and-windows-server-2019.yml +++ b/windows/release-information/status-windows-10-1809-and-windows-server-2019.yml @@ -86,7 +86,7 @@ sections: - items: - type: markdown text: " - +
DetailsAffected buildStatusHistory
DetailsOriginating updateStatusHistory
End-user-defined characters (EUDC) may cause blue screen at startup
If you enable per font end-user-defined characters (EUDC), the system will stop working and a blue screen may appear at startup. This is not a common setting in non-Asian regions.

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016

Workaround: To avoid this issue, don't enable per font EUDC. As an alternative, you can edit the registry to mitigate this issue; for more information, see KB4496149.

Resolved: This issue was resolved in KB4493509.

Back to top
OS Build 17763.404

April 02, 2019
KB4490481
Resolved
KB4493509
Resolved:
April 09, 2019
10:00 AM PT

Opened:
April 02, 2019
10:00 AM PT
" @@ -95,7 +95,7 @@ sections: - items: - type: markdown text: " - +
DetailsAffected buildStatusHistory
@@ -107,7 +107,7 @@ sections: - items: - type: markdown text: " -
DetailsOriginating updateStatusHistory
Custom URI schemes may not start corresponding application
After installing KB4489899, custom URI schemes for application protocol handlers may not start the corresponding application for local intranet and trusted sites security zones on Internet Explorer.

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 8.1; Windows 7, Service Pack 1 
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2; Windows Server 2008 R2 SP1

Workaround: Right-click the URL link to open it in a new window or tab, or enable Protected Mode in Internet Explorer for local intranet and trusted sites
  1. Go to Tools > Internet options > Security.
  2. Within Select a zone to view of change security settings, select Local intranet and then select Enable Protected Mode.
  3. Select Trusted Sites and then select Enable Protected Mode
  4. Select OK.
You must restart the browser after making these changes. 
 
Next steps: Microsoft is working on a resolution and will provide an update in an upcoming release. 

Back to top
OS Build 17763.379

March 12, 2019
KB4489899
Mitigated
Last updated:
April 02, 2019
10:00 AM PT

Opened:
March 12, 2019
10:00 AM PT
Issue using PXE to start a device from WDS
After installing KB4489899, there may be issues using the Preboot Execution Environment (PXE) to start a device from a Windows Deployment Services (WDS) server configured to use Variable Window Extension. This may cause the connection to the WDS server to terminate prematurely while downloading the image. This issue does not affect clients or devices that are not using Variable Window Extension. 

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10 Enterprise LTSC 2016; Windows 8.1
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server 2016; Windows Server 2012 R2

Workaround: To mitigate the issue, disable the Variable Window Extension on WDS server using one of the following options:
Option 1:
Open an Administrator Command prompt and type the following:
Wdsutil /Set-TransportServer /EnableTftpVariableWindowExtension:No 
 
Option 2:
Use the Windows Deployment Services UI to make the following adjustment: 
  1. Open Windows Deployment Services from Windows Administrative Tools. 
  2. Expand Servers and right-click a WDS server. 
  3. Open its properties and clear the Enable Variable Window Extension box on the TFTP tab.
Option 3:
Set the following registry value to 0:  
HKLM\\System\\CurrentControlSet\\Services\\WDSServer\\Providers\\WDSTFTP\\EnableVariableWindowExtension  
Restart the WDSServer service after disabling the Variable Window Extension. 

Next steps: Microsoft is working on a resolution and will provide an update in an upcoming release. 

Back to top
OS Build 17763.379

March 12, 2019
KB4489899
Mitigated
Last updated:
April 02, 2019
10:00 AM PT

Opened:
March 12, 2019
10:00 AM PT
+
DetailsAffected buildStatusHistory
DetailsOriginating updateStatusHistory
Internet Explorer 11 authentication issue with multiple concurrent logons
After installing the February 12, 2019 update (KB4487044), Internet Explorer 11 and other applications that use WININET.DLL may have authentication issues. This occurs when two or more people use the same user account for multiple, concurrent login sessions on the same Windows Server machine, including Remote Desktop Protocol (RDP) and Terminal Server logons. Symptoms reported by customers include, but may not be limited to:  
  • Cache size and location show zero or empty. 
  • Keyboard shortcuts may not work properly. 
  • Webpages may intermittently fail to load or render correctly. 
  • Issues with credential prompts. 
  • Issues when downloading files. 

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10 Enterprise LTSC 2016; Windows 8.1; Windows 7, Service Pack 1
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server 2016; Windows Server 2012 R2; Windows Server 2008 R2 SP1
 
Resolved: This issue was resolved in KB4493509

Back to top
OS Build 17763.253

January 08, 2019
KB4480116
Resolved
KB4493509
Resolved:
April 09, 2019
10:00 AM PT

Opened:
January 08, 2019
10:00 AM PT
MSXML6 may cause applications to stop responding
After installing KB4480116, MSXML6 causes applications to stop responding if an exception was thrown during node operations, such as appendChild(), insertBefore(), and moveNode().
 
The Group Policy editor may stop responding when editing a Group Policy Object (GPO) that contains Group Policy Preferences (GPP) for Internet Explorer 10 settings. 

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 8.1
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2

Resolved: This issue was resolved in KB4493509

Back to top
OS Build 17763.253

January 08, 2019
KB4480116
Resolved
KB4493509
Resolved:
April 09, 2019
10:00 AM PT

Opened:
January 08, 2019
10:00 AM PT
@@ -117,7 +117,7 @@ sections: - items: - type: markdown text: " - +
DetailsAffected buildStatusHistory
DetailsOriginating updateStatusHistory
Audio not working on monitors or TV connected to a PC via HDMI, USB, or DisplayPort
Upgrade block: Microsoft has identified issues with certain new Intel display drivers. Intel inadvertently released versions of its display driver (versions 24.20.100.6344, 24.20.100.6345) to OEMs that accidentally turned on unsupported features in Windows. 
 
As a result, after updating to Windows 10, version 1809, audio playback from a monitor or television connected to a PC via HDMI, USB-C, or a DisplayPort may not function correctly on devices with these drivers.

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019
  • Server: Windows Server, version 1809; Windows Server 2019 

Next steps: Intel has released updated drivers to OEM device manufacturers. OEMs need to make the updated driver available via Windows Update.

For more information, see the Intel Customer Support article.

Note: This Intel display driver issue is different from the Intel Smart Sound Technology driver (version 09.21.00.3755) audio issue previously documented.

Back to top
OS Build 17763.134

November 13, 2018
KB4467708
Mitigated
Last updated:
March 15, 2019
12:00 PM PT

Opened:
November 13, 2018
10:00 AM PT
" diff --git a/windows/release-information/status-windows-7-and-windows-server-2008-r2-sp1.yml b/windows/release-information/status-windows-7-and-windows-server-2008-r2-sp1.yml index 7d740a94cb..b09a3aac6f 100644 --- a/windows/release-information/status-windows-7-and-windows-server-2008-r2-sp1.yml +++ b/windows/release-information/status-windows-7-and-windows-server-2008-r2-sp1.yml @@ -84,7 +84,7 @@ sections: - items: - type: markdown text: " - +
DetailsAffected buildStatusHistory
@@ -96,7 +96,7 @@ sections: - items: - type: markdown text: " -
DetailsOriginating updateStatusHistory
System may be unresponsive after restart if Avira antivirus software installed.
Microsoft and Avira have identified an issue on devices with Avira antivirus software installed that may cause the system to become unresponsive upon restart after installing KB4493472.

Microsoft has temporarily blocked devices from receiving this update if Avira antivirus software is installed.

Next steps: We are presently investigating this issue with Avira and will provide an update when available.

Back to top
April 09, 2019
KB4493472
Investigating
Last updated:
April 09, 2019
10:00 AM PT

Opened:
April 09, 2019
10:00 AM PT
System unresponsive after restart if Sophos Endpoint Protection installed.
Microsoft and Sophos have identified an issue on devices with Sophos Endpoint Protection installed and managed by either Sophos Central or Sophos Enterprise Console (SEC) that may cause the system to become unresponsive upon restart after installing KB4493472.

Microsoft has temporarily blocked devices from receiving this update if the Sophos Endpoint is installed until a solution is available.

Guidance for Sophos Endpoint and Sophos Enterprise Console customers can be found in the Sophos support article.

Back to top
April 09, 2019
KB4493472
Mitigated
Last updated:
April 09, 2019
10:00 AM PT

Opened:
April 09, 2019
10:00 AM PT
System may be unresponsive after restart if ArcaBit antivirus software installed.
Microsoft and ArcaBit have identified an issue on devices with ArcaBit antivirus software installed that may cause the system to become unresponsive upon restart after installing KB4493472.

Microsoft has temporarily blocked devices from receiving this update if ArcaBit antivirus software is installed.

ArcaBit has released an update to address this issue. For more information, see the Arcabit support article.

Back to top
April 09, 2019
KB4493472
Mitigated
Last updated:
April 09, 2019
10:00 AM PT

Opened:
April 09, 2019
10:00 AM PT
+
DetailsAffected buildStatusHistory
@@ -107,7 +107,7 @@ sections: - items: - type: markdown text: " -
DetailsOriginating updateStatusHistory
Authentication may fail for services after the Kerberos ticket expires.
After installing KB4489878, some customers report that authentication fails for services that require unconstrained delegation after the Kerberos ticket expires (the default is 10 hours). For example, the SQL server service fails.

Workaround: To mitigate this issue, use one of the following options:

  • Option 1: Purge the Kerberos tickets on the application server. After the Kerberos ticket expires, the issue will occur again, and you must purge the tickets again.
  • Option 2: If purging does not mitigate the issue, restart the application; for example, restart the Internet Information Services (IIS) app pool associated with the SQL server.
  • Option 3: Use constrained delegation.

Next steps: Microsoft is working on a resolution and will provide an update in an upcoming release.

Back to top
March 12, 2019
KB4489878
Mitigated
Last updated:
April 09, 2019
10:00 AM PT

Opened:
March 12, 2019
10:00 AM PT
Custom URI schemes may not start corresponding application.
After installing KB4489878, custom URI schemes for application protocol handlers may not start the corresponding application for local intranet and trusted sites on Internet Explorer.

Affected platforms: 
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 8.1; Windows 7, Service Pack 1 
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2; Windows Server 2008 R2 SP1 

Resolution: This issue is resolved in KB4493472.

Back to top
March 12, 2019
KB4489878
Resolved
KB4493472
Resolved:
April 09, 2019
10:00 AM PT

Opened:
March 12, 2019
10:00 AM PT
NETDOM.EXE fails to run.
After installing KB4489878, NETDOM.EXE fails to run, and the on-screen error, “The command failed to complete successfully.” appears.

Affected platforms: 
  • Client: Windows 7, Service Pack 1 
  • Server: Windows Server 2008 R2 SP1 

Resolution: This issue is resolved in KB4493472.

Back to top
March 12, 2019
KB4489878
Resolved
KB4493472
Resolved:
April 09, 2019
10:00 AM PT

Opened:
March 12, 2019
10:00 AM PT
+
DetailsAffected buildStatusHistory
diff --git a/windows/release-information/status-windows-8.1-and-windows-server-2012-r2.yml b/windows/release-information/status-windows-8.1-and-windows-server-2012-r2.yml index ccc67d41d8..aec950f873 100644 --- a/windows/release-information/status-windows-8.1-and-windows-server-2012-r2.yml +++ b/windows/release-information/status-windows-8.1-and-windows-server-2012-r2.yml @@ -84,7 +84,7 @@ sections: - items: - type: markdown text: " -
DetailsOriginating updateStatusHistory
Virtual machines fail to restore.
After installing KB4480970, virtual machines (VM) may fail to restore successfully if the VM has been saved and restored once before. The error message is, “Failed to restore the virtual machine state: Cannot restore this virtual machine because the saved state data cannot be read. Delete the saved state data and then try to start the virtual machine. (0xC0370027).”

This affects AMD Bulldozer Family 15h, AMD Jaguar Family 16h, and AMD Puma Family 16h (second generation) microarchitectures.

Affected platforms: 
  • Client: Windows 7, Service Pack 1 
  • Server: Windows Server 2008 R2 SP1 

Resolution: This issue is resolved in KB4490511.

Back to top
January 08, 2019
KB4480970
Resolved
KB4490511
Resolved:
February 19, 2019
02:00 PM PT

Opened:
January 08, 2019
10:00 AM PT
Local Administrators unable to remotely access shares.
Local users who are part of the local Administrators group may not be able to remotely access shares on Windows Server 2008 R2 and Windows 7 machines after installing KB4480970. This does not affect domain accounts in the local Administrators group.
 
Affected platforms: 
  • Client: Windows 7, Service Pack 1 
  • Server: Windows Server 2008 R2 SP1 

Resolution: This issue is resolved in KB4487345.

Back to top
January 08, 2019
KB4480970
Resolved
KB4487345
Resolved:
January 11, 2019
02:00 PM PT

Opened:
January 08, 2019
10:00 AM PT
Internet Explorer 11 authentication issue with multiple concurrent logons.
After installing KB4480970, Internet Explorer 11 and other applications that use WININET.DLL may have authentication issues. This occurs when two or more people use the same user account for multiple, concurrent login sessions on the same Windows Server machine, including Remote Desktop Protocol (RDP) and Terminal Server logons. Symptoms reported by customers include, but may not be limited to:
  • Cache size and location show zero or empty.
  • Keyboard shortcuts may not work properly.
  • Webpages may intermittently fail to load or render correctly.
  • Issues with credential prompts.
  • Issues when downloading files.

Affected platforms: 
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10 Enterprise LTSC 2016; Windows 8.1; Windows 7, Service Pack 1 
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server 2016; Windows Server 2012 R2; Windows Server 2008 R2 SP1 

Resolution: This issue is resolved in KB4493472.

Back to top
January 08, 2019
KB4480970
Resolved
KB4493472
Resolved:
April 09, 2019
10:00 AM PT

Opened:
January 08, 2019
10:00 AM PT
+
DetailsAffected buildStatusHistory
@@ -97,7 +97,7 @@ sections: - items: - type: markdown text: " -
DetailsOriginating updateStatusHistory
System may be unresponsive after restart if Avira antivirus software installed
Microsoft and Avira have identified an issue on devices with Avira antivirus software installed that may cause the system to become unresponsive upon restart after installing KB4493446.

Microsoft has temporarily blocked devices from receiving this update if Avira antivirus software is installed.

Affected platforms: 
  • Client: Windows 8.1; Windows 7, Service Pack 1 
  • Server: Windows Server 2012 R2; Windows Server 2008 R2 SP1 

Next steps: We are presently investigating this issue with Avira and will provide an update when available.

Back to top
April 09, 2019
KB4493446
Investigating
Last updated:
April 09, 2019
10:00 AM PT

Opened:
April 09, 2019
10:00 AM PT
System unresponsive after restart if Sophos Endpoint Protection installed
Microsoft and Sophos have identified an issue on devices with Sophos Endpoint Protection installed and managed by either Sophos Central or Sophos Enterprise Console (SEC) that may cause the system to become unresponsive upon restart after installing KB4493446.

Microsoft has temporarily blocked devices from receiving this update if the Sophos Endpoint is installed until a solution is available.

Affected platforms: 
  • Client: Windows 8.1; Windows 7, Service Pack 1 
  • Server: Windows Server 2012 R2; Windows Server 2008 R2 SP1 

Guidance for Sophos Endpoint and Sophos Enterprise Console customers can be found in the Sophos support article.

Back to top
April 09, 2019
KB4493446
Mitigated
Last updated:
April 09, 2019
10:00 AM PT

Opened:
April 09, 2019
10:00 AM PT
System may be unresponsive after restart if ArcaBit antivirus software installed
Microsoft and ArcaBit have identified an issue on devices with ArcaBit antivirus software installed that may cause the system to become unresponsive upon restart after installing KB4493446.

Microsoft has temporarily blocked devices from receiving this update if ArcaBit antivirus software is installed.

Affected platforms: 
  • Client: Windows 8.1; Windows 7, Service Pack 1 
  • Server: Windows Server 2012 R2; Windows Server 2008 R2 SP1 

ArcaBit has released an update to address this issue. For more information, see the Arcabit support article.

Back to top
April 09, 2019
KB4493446
Mitigated
Last updated:
April 09, 2019
10:00 AM PT

Opened:
April 09, 2019
10:00 AM PT
+
DetailsAffected buildStatusHistory
@@ -108,7 +108,7 @@ sections: - items: - type: markdown text: " -
DetailsOriginating updateStatusHistory
Issue using PXE to start a device from WDS
After installing KB4489881, there may be issues using the Preboot Execution Environment (PXE) to start a device from a Windows Deployment Services (WDS) server configured to use Variable Window Extension. This may cause the connection to the WDS server to terminate prematurely while downloading the image. This issue does not affect clients or devices that are not using Variable Window Extension.

Affected platforms: 
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10 Enterprise LTSC 2016; Windows 8.1 
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server 2016; Windows Server 2012 R2 

Workaround: To mitigate the issue, disable the Variable Window Extension on WDS server using one of the following options:
Option 1:
Open an Administrator Command prompt and type the following:
Wdsutil /Set-TransportServer /EnableTftpVariableWindowExtension:No
 
Option 2:
Use the Windows Deployment Services UI to make the following adjustment:
  1. Open Windows Deployment Services from Windows Administrative Tools.
  2. Expand Servers and right-click a WDS server.
  3. Open its properties and clear the Enable Variable Window Extension box on the TFTP tab.
Option 3:
Set the following registry value to 0:
HKLM\\System\\CurrentControlSet\\Services\\WDSServer\\Providers\\WDSTFTP\\EnableVariableWindowExtension
Restart the WDSServer service after disabling the Variable Window Extension.

Next steps: Microsoft is working on a resolution and will provide an update in an upcoming release.

Back to top
March 12, 2019
KB4489881
Mitigated
Last updated:
April 09, 2019
10:00 AM PT

Opened:
March 12, 2019
10:00 AM PT
Custom URI schemes may not start corresponding application
After installing KB4489881, custom URI schemes for application protocol handlers may not start the corresponding application for local intranet and trusted sites security zones on Internet Explorer.

Affected platforms: 
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 8.1; Windows 7, Service Pack 1 
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2; Windows Server 2008 R2 SP1 

Resolution: This issue is resolved in KB4493446.

Back to top
March 12, 2019
KB4489881
Resolved
KB4493446
Resolved:
April 09, 2019
10:00 AM PT

Opened:
March 12, 2019
10:00 AM PT
+
DetailsAffected buildStatusHistory
DetailsOriginating updateStatusHistory
Embedded objects may display incorrectly
Any compound document (OLE) server application that places embedded objects into the Windows Metafile (WMF) using the PatBlt API may display embedded objects incorrectly.

For example, if you paste a Microsoft Excel worksheet object into a Microsoft Word document, the cells may render with a different background color.

Affected platforms: 
  • Client: Windows 8.1 
  • Server: Windows Server 2012 R2 

Resolution: This issue is resolved in KB4493446.

Back to top
February 12, 2019
KB4487000
Resolved
KB4493446
Resolved:
April 09, 2019
10:00 AM PT

Opened:
February 12, 2019
10:00 AM PT
" @@ -117,7 +117,7 @@ sections: - items: - type: markdown text: " - +
DetailsAffected buildStatusHistory
DetailsOriginating updateStatusHistory
Internet Explorer 11 authentication issue with multiple concurrent logons
After installing KB4480963, Internet Explorer 11 and other applications that use WININET.DLL may have authentication issues. This occurs when two or more people use the same user account for multiple, concurrent login sessions on the same Windows Server machine, including Remote Desktop Protocol (RDP) and Terminal Server logons. Symptoms reported by customers include, but may not be limited to:
  • Cache size and location show zero or empty.
  • Keyboard shortcuts may not work properly.
  • Webpages may intermittently fail to load or render correctly.
  • Issues with credential prompts.
  • Issues when downloading files.

Affected platforms: 
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10 Enterprise LTSC 2016; Windows 8.1; Windows 7, Service Pack 1 
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server 2016; Windows Server 2012 R2; Windows Server 2008 R2 SP1 

Resolution: This issue is resolved in KB4493446.

Back to top
January 08, 2019
KB4480963
Resolved
KB4493446
Resolved:
April 09, 2019
10:00 AM PT

Opened:
January 08, 2019
10:00 AM PT
MSXML6 may cause applications to stop responding.
After installing KB4480963, MSXML6 causes applications to stop responding if an exception was thrown during node operations, such as appendChild(), insertBefore(), and moveNode().

The Group Policy editor may stop responding when editing a Group Policy Object (GPO) that contains Group Policy Preferences (GPP) for Internet Explorer 10 settings.

Resolution: This issue is resolved in KB4493446.

Back to top
January 08, 2019
KB4480963
Resolved
KB4493446
Resolved:
April 09, 2019
10:00 AM PT

Opened:
January 08, 2019
10:00 AM PT
diff --git a/windows/release-information/status-windows-server-2008-sp2.yml b/windows/release-information/status-windows-server-2008-sp2.yml index 3fe98de4f9..6949f4fbc1 100644 --- a/windows/release-information/status-windows-server-2008-sp2.yml +++ b/windows/release-information/status-windows-server-2008-sp2.yml @@ -85,7 +85,7 @@ sections: - items: - type: markdown text: " - +
DetailsAffected buildStatusHistory
diff --git a/windows/release-information/status-windows-server-2012.yml b/windows/release-information/status-windows-server-2012.yml index 11a37d5e1a..f87dab169b 100644 --- a/windows/release-information/status-windows-server-2012.yml +++ b/windows/release-information/status-windows-server-2012.yml @@ -89,7 +89,7 @@ sections: - items: - type: markdown text: " -
DetailsOriginating updateStatusHistory
First character of the Japanese era name not recognized as an abbreviation
After installing KB4480974, the first character of the Japanese era name is not recognized as an abbreviation and may cause date parsing issues.

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 8.1; Windows 7, Service Pack 1
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2; Windows Server 2012; Windows Server 2008 R2 SP1; Windows Server 2008 SP2

Resolution: This issue is resolved in KB4489880.

Back to top
N/A
January 17, 2019
KB4480974
Resolved
KB4489880
Resolved:
March 12, 2019
10:00 AM PT

Opened:
April 25, 2019
03:32 PM PT
Applications using Microsoft Jet database fail to open
Applications that use a Microsoft Jet database with the Microsoft Access 97 file format may fail to open if the database has column names greater than 32 characters. The database will fail to open with the error, “Unrecognized Database Format”.

Affected platforms: 
  • Client: Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 8.1; Windows 7, Service Pack 1 
  • Server: Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2; Windows Server 2012; Windows Server 2008 R2 SP1; Windows Server 2008 SP2

Resolution: This issue is resolved in KB4487023.

Back to top
N/A
January 08, 2019
KB4480968
Resolved
KB4487023
Resolved:
February 12, 2019
10:00 AM PT

Opened:
April 25, 2019
03:32 PM PT
Unable to use Seek bar in Windows Media Player
After installing KB4463097, users may not be able to use the Seek Bar in Windows Media Player when playing specific files. This issue does not affect normal playback.

Affected platforms: 
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 8.1; Windows 7, Service Pack 1
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2; Windows Server 2012; Windows Server 2008 R2 SP1; Windows Server 2008 SP2

Resolution: This issue is resolved in KB4471325.

Back to top
N/A
October 09, 2018
KB4463097
Resolved
KB4471325
Resolved:
December 11, 2018
10:00 AM PT

Opened:
April 25, 2019
03:28 PM PT
+
DetailsAffected buildStatusHistory
From a31ad7c8ce802008412ae0abac75b50c11a88890 Mon Sep 17 00:00:00 2001 From: "Nisha Mittal (Wipro Ltd.)" Date: Fri, 26 Apr 2019 00:35:58 -0700 Subject: [PATCH 217/724] Added 2 more downlevel products --- ...esolved-issues-windows-server-2008-sp2.yml | 32 ++++++------- .../status-windows-server-2008-sp2.yml | 44 +++++++++--------- .../windows-message-center.yml | 46 +++++++++---------- 3 files changed, 61 insertions(+), 61 deletions(-) diff --git a/windows/release-information/resolved-issues-windows-server-2008-sp2.yml b/windows/release-information/resolved-issues-windows-server-2008-sp2.yml index 75498de24e..62ce837f1c 100644 --- a/windows/release-information/resolved-issues-windows-server-2008-sp2.yml +++ b/windows/release-information/resolved-issues-windows-server-2008-sp2.yml @@ -32,14 +32,14 @@ sections: - type: markdown text: "
DetailsOriginating updateStatusHistory
Applications using Microsoft Jet database and Access 95 file format stop working
Applications that use a Microsoft Jet database with the Microsoft Access 95 file format may randomly stop working.

Resolution: This issue is resolved in KB4487024.

Back to top
February 12, 2019
KB4487025
Resolved
KB4487024
Resolved:
February 19, 2019
02:00 PM PT

Opened:
April 25, 2019
04:04 PM PT
First character of the Japanese era name not recognized as an abbreviation
After installing KB4480971, the first character of the Japanese era name is not recognized as an abbreviation and may cause date parsing issues.

Resolution: This issue is resolved in KB4487024.

Back to top
January 15, 2019
KB4480971
Resolved
KB4487024
Resolved:
February 19, 2019
02:00 PM PT

Opened:
April 25, 2019
04:01 PM PT
Embedded objects may display incorrectly
Any compound document (OLE) server application that places embedded objects into the Windows Metafile (WMF) using the PatBlt API may display embedded objects incorrectly.

For example, if you paste a Microsoft Excel worksheet object into a Microsoft Word document, the cells may render with a different background color.

Resolution: This issue is resolved in KB4493451.

Back to top
February 12, 2019
KB4487025
Resolved
KB4493451
Resolved:
April 09, 2019
10:00 AM PT

Opened:
April 25, 2019
04:00 PM PT
- - - - - - - - + + + + + + + +
SummaryOriginating updateStatusDate resolved
First character of the Japanese era name not recognized as an abbreviation
The first character of the Japanese era name is not recognized as an abbreviation and may cause date parsing issues.

See details >
N/A
January 17, 2019
KB4480974
Resolved
KB4489880
April 25, 2019
03:32 PM PT
Applications using Microsoft Jet database fail to open
Applications that use a Microsoft Jet database with the Microsoft Access 97 file format may fail to open if column names are greater than 32 characters.

See details >
N/A
January 08, 2019
KB4480968
Resolved
KB4487023
April 25, 2019
03:32 PM PT
Unable to use Seek bar in Windows Media Player
Users may not be able to use the Seek bar in Windows Media Player when playing specific files.

See details >
N/A
October 09, 2018
KB4463097
Resolved
KB4471325
April 25, 2019
03:28 PM PT
Virtual machines fail to restore
Virtual machines (VMs) may fail to restore successfully if the VM has been saved and restored once before.

See details >
N/A
January 08, 2019
KB4480968
Resolved
KB4490514
April 25, 2019
03:26 PM PT
Embedded objects may display incorrectly
Any compound document (OLE) server application that places embedded objects into the Windows Metafile (WMF) using the PatBlt API may display embedded objects incorrectly.

See details >
N/A

Resolved
KB4493471
April 25, 2019
03:26 PM PT
Applications using Microsoft Jet database and Access 95 file format stop working
Applications that use a Microsoft Jet database with the Microsoft Access 95 file format may randomly stop working.

See details >
N/A
February 12, 2019
KB4487023
Resolved
KB4487022
April 25, 2019
03:26 PM PT
Local Administrators unable to remotely access shares
Local users who are part of the local Administrators group may not be able to remotely access shares on Windows Server 2008 R2 and Windows 7 machines.

See details >
N/A
January 08, 2019
KB4480968
Resolved
KB4487354
April 25, 2019
03:26 PM PT
NETDOM.EXE fails to run
NETDOM.EXE fails to run and the error, “The command failed to complete successfully.” appears on screen.

See details >
N/A
March 12, 2019
KB4489880
Resolved
KB4493471
April 25, 2019
03:25 PM PT
First character of the Japanese era name not recognized as an abbreviation
The first character of the Japanese era name is not recognized as an abbreviation and may cause date parsing issues.

See details >
January 17, 2019
KB4480974
Resolved
KB4489880
April 25, 2019
03:32 PM PT
Applications using Microsoft Jet database fail to open
Applications that use a Microsoft Jet database with the Microsoft Access 97 file format may fail to open if column names are greater than 32 characters.

See details >
January 08, 2019
KB4480968
Resolved
KB4487023
April 25, 2019
03:32 PM PT
Unable to use Seek bar in Windows Media Player
Users may not be able to use the Seek bar in Windows Media Player when playing specific files.

See details >
October 09, 2018
KB4463097
Resolved
KB4471325
April 25, 2019
03:28 PM PT
Virtual machines fail to restore
Virtual machines (VMs) may fail to restore successfully if the VM has been saved and restored once before.

See details >
January 08, 2019
KB4480968
Resolved
KB4490514
April 25, 2019
03:26 PM PT
Embedded objects may display incorrectly
Any compound document (OLE) server application that places embedded objects into the Windows Metafile (WMF) using the PatBlt API may display embedded objects incorrectly.

See details >

Resolved
KB4493471
April 25, 2019
03:26 PM PT
Applications using Microsoft Jet database and Access 95 file format stop working
Applications that use a Microsoft Jet database with the Microsoft Access 95 file format may randomly stop working.

See details >
February 12, 2019
KB4487023
Resolved
KB4487022
April 25, 2019
03:26 PM PT
Local Administrators unable to remotely access shares
Local users who are part of the local Administrators group may not be able to remotely access shares on Windows Server 2008 R2 and Windows 7 machines.

See details >
January 08, 2019
KB4480968
Resolved
KB4487354
April 25, 2019
03:26 PM PT
NETDOM.EXE fails to run
NETDOM.EXE fails to run and the error, “The command failed to complete successfully.” appears on screen.

See details >
March 12, 2019
KB4489880
Resolved
KB4493471
April 25, 2019
03:25 PM PT
" @@ -55,13 +55,13 @@ sections: - type: markdown text: " - - - - - - - - + + + + + + + +
DetailsOriginating updateStatusHistory
First character of the Japanese era name not recognized as an abbreviation
After installing KB4480974, the first character of the Japanese era name is not recognized as an abbreviation and may cause date parsing issues.

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 8.1; Windows 7, Service Pack 1
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2; Windows Server 2012; Windows Server 2008 R2 SP1; Windows Server 2008 SP2

Resolution: This issue is resolved in KB4489880.

Back to top
N/A
January 17, 2019
KB4480974
Resolved
KB4489880
Resolved:
March 12, 2019
10:00 AM PT

Opened:
April 25, 2019
03:32 PM PT
Applications using Microsoft Jet database fail to open
Applications that use a Microsoft Jet database with the Microsoft Access 97 file format may fail to open if the database has column names greater than 32 characters. The database will fail to open with the error, “Unrecognized Database Format”.

Affected platforms: 
  • Client: Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 8.1; Windows 7, Service Pack 1 
  • Server: Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2; Windows Server 2012; Windows Server 2008 R2 SP1; Windows Server 2008 SP2

Resolution: This issue is resolved in KB4487023.

Back to top
N/A
January 08, 2019
KB4480968
Resolved
KB4487023
Resolved:
February 12, 2019
10:00 AM PT

Opened:
April 25, 2019
03:32 PM PT
Unable to use Seek bar in Windows Media Player
After installing KB4463097, users may not be able to use the Seek Bar in Windows Media Player when playing specific files. This issue does not affect normal playback.

Affected platforms: 
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 8.1; Windows 7, Service Pack 1
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2; Windows Server 2012; Windows Server 2008 R2 SP1; Windows Server 2008 SP2

Resolution: This issue is resolved in KB4471325.

Back to top
N/A
October 09, 2018
KB4463097
Resolved
KB4471325
Resolved:
December 11, 2018
10:00 AM PT

Opened:
April 25, 2019
03:28 PM PT
Virtual machines fail to restore
After installing KB4480968, virtual machines (VM) may fail to restore successfully if the VM has been saved and restored once before. The error message is, “Failed to restore the virtual machine state: Cannot restore this virtual machine because the saved state data cannot be read. Delete the saved state data and then try to start the virtual machine. (0xC0370027).”

This affects AMD Bulldozer Family 15h, AMD Jaguar Family 16h, and AMD Puma Family 16h (second generation) microarchitectures.

Affected platforms: 
  • Client: Windows 7, Service Pack 1 
  • Server: Windows Server 2012; Windows Server 2008 R2 SP1; Windows Server 2008 SP2

Resolution: This issue is resolved in KB4490514.

Back to top
N/A
January 08, 2019
KB4480968
Resolved
KB4490514
Resolved:
February 19, 2019
02:00 PM PT

Opened:
April 25, 2019
03:26 PM PT
Embedded objects may display incorrectly
Any compound document (OLE) server application that places embedded objects into the Windows Metafile (WMF) using the PatBlt API may display embedded objects incorrectly.

For example, if you paste a Microsoft Excel worksheet object into a Microsoft Word document, the cells may render with a different background color.

Affected platforms: 
  • Client: Windows 8.1 
  • Server: Windows Server 2012 R2; Windows Server 2012; Windows Server 2008 SP2

Resolution: This issue is resolved in KB4493471.

Back to top
N/A

Resolved
KB4493471
Resolved:
April 09, 2019
10:00 AM PT

Opened:
April 25, 2019
03:26 PM PT
Applications using Microsoft Jet database and Access 95 file format stop working
Applications that use a Microsoft Jet database with the Microsoft Access 95 file format may randomly stop working.

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 7, Service Pack 1
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012; Windows Server 2008 R2 SP1; Windows Server 2008 SP2

Resolution: This issue is resolved in KB4487022.

Back to top
N/A
February 12, 2019
KB4487023
Resolved
KB4487022
Resolved:
February 19, 2019
02:00 PM PT

Opened:
April 25, 2019
03:26 PM PT
Local Administrators unable to remotely access shares
Local users who are part of the local Administrators group may not be able to remotely access shares on Windows Server 2008 R2 and Windows 7 machines after installing KB4480968. This does not affect domain accounts in the local Administrators group.

Affected platforms: 
  • Client: Windows 7, Service Pack 1 
  • Server: Windows Server 2008 R2 SP1; Windows Server 2008 SP2

Resolution: This issue is resolved in KB4487354.

Back to top
N/A
January 08, 2019
KB4480968
Resolved
KB4487354
Resolved:
January 11, 2019
02:00 PM PT

Opened:
April 25, 2019
03:26 PM PT
NETDOM.EXE fails to run
After installing KB4489880, NETDOM.EXE fails to run, and the on-screen error, “The command failed to complete successfully.” appears.

Affected platforms: 
  • Client: Windows 7, Service Pack 1 
  • Server: Windows Server 2008 R2 SP1; Windows Server 2008 SP2

Resolution: This issue is resolved in KB4493471.

Back to top
N/A
March 12, 2019
KB4489880
Resolved
KB4493471
Resolved:
April 09, 2019
10:00 AM PT

Opened:
April 25, 2019
03:25 PM PT
First character of the Japanese era name not recognized as an abbreviation
After installing KB4480974, the first character of the Japanese era name is not recognized as an abbreviation and may cause date parsing issues.

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 8.1; Windows 7, Service Pack 1
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2; Windows Server 2012; Windows Server 2008 R2 SP1; Windows Server 2008 SP2

Resolution: This issue is resolved in KB4489880.

Back to top
January 17, 2019
KB4480974
Resolved
KB4489880
Resolved:
March 12, 2019
10:00 AM PT

Opened:
April 25, 2019
03:32 PM PT
Applications using Microsoft Jet database fail to open
Applications that use a Microsoft Jet database with the Microsoft Access 97 file format may fail to open if the database has column names greater than 32 characters. The database will fail to open with the error, “Unrecognized Database Format”.

Affected platforms: 
  • Client: Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 8.1; Windows 7, Service Pack 1 
  • Server: Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2; Windows Server 2012; Windows Server 2008 R2 SP1; Windows Server 2008 SP2

Resolution: This issue is resolved in KB4487023.

Back to top
January 08, 2019
KB4480968
Resolved
KB4487023
Resolved:
February 12, 2019
10:00 AM PT

Opened:
April 25, 2019
03:32 PM PT
Unable to use Seek bar in Windows Media Player
After installing KB4463097, users may not be able to use the Seek Bar in Windows Media Player when playing specific files. This issue does not affect normal playback.

Affected platforms: 
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 8.1; Windows 7, Service Pack 1
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2; Windows Server 2012; Windows Server 2008 R2 SP1; Windows Server 2008 SP2

Resolution: This issue is resolved in KB4471325.

Back to top
October 09, 2018
KB4463097
Resolved
KB4471325
Resolved:
December 11, 2018
10:00 AM PT

Opened:
April 25, 2019
03:28 PM PT
Virtual machines fail to restore
After installing KB4480968, virtual machines (VM) may fail to restore successfully if the VM has been saved and restored once before. The error message is, “Failed to restore the virtual machine state: Cannot restore this virtual machine because the saved state data cannot be read. Delete the saved state data and then try to start the virtual machine. (0xC0370027).”

This affects AMD Bulldozer Family 15h, AMD Jaguar Family 16h, and AMD Puma Family 16h (second generation) microarchitectures.

Affected platforms: 
  • Client: Windows 7, Service Pack 1 
  • Server: Windows Server 2012; Windows Server 2008 R2 SP1; Windows Server 2008 SP2

Resolution: This issue is resolved in KB4490514.

Back to top
January 08, 2019
KB4480968
Resolved
KB4490514
Resolved:
February 19, 2019
02:00 PM PT

Opened:
April 25, 2019
03:26 PM PT
Embedded objects may display incorrectly
Any compound document (OLE) server application that places embedded objects into the Windows Metafile (WMF) using the PatBlt API may display embedded objects incorrectly.

For example, if you paste a Microsoft Excel worksheet object into a Microsoft Word document, the cells may render with a different background color.

Affected platforms: 
  • Client: Windows 8.1 
  • Server: Windows Server 2012 R2; Windows Server 2012; Windows Server 2008 SP2

Resolution: This issue is resolved in KB4493471.

Back to top

Resolved
KB4493471
Resolved:
April 09, 2019
10:00 AM PT

Opened:
April 25, 2019
03:26 PM PT
Applications using Microsoft Jet database and Access 95 file format stop working
Applications that use a Microsoft Jet database with the Microsoft Access 95 file format may randomly stop working.

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 7, Service Pack 1
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012; Windows Server 2008 R2 SP1; Windows Server 2008 SP2

Resolution: This issue is resolved in KB4487022.

Back to top
February 12, 2019
KB4487023
Resolved
KB4487022
Resolved:
February 19, 2019
02:00 PM PT

Opened:
April 25, 2019
03:26 PM PT
Local Administrators unable to remotely access shares
Local users who are part of the local Administrators group may not be able to remotely access shares on Windows Server 2008 R2 and Windows 7 machines after installing KB4480968. This does not affect domain accounts in the local Administrators group.

Affected platforms: 
  • Client: Windows 7, Service Pack 1 
  • Server: Windows Server 2008 R2 SP1; Windows Server 2008 SP2

Resolution: This issue is resolved in KB4487354.

Back to top
January 08, 2019
KB4480968
Resolved
KB4487354
Resolved:
January 11, 2019
02:00 PM PT

Opened:
April 25, 2019
03:26 PM PT
NETDOM.EXE fails to run
After installing KB4489880, NETDOM.EXE fails to run, and the on-screen error, “The command failed to complete successfully.” appears.

Affected platforms: 
  • Client: Windows 7, Service Pack 1 
  • Server: Windows Server 2008 R2 SP1; Windows Server 2008 SP2

Resolution: This issue is resolved in KB4493471.

Back to top
March 12, 2019
KB4489880
Resolved
KB4493471
Resolved:
April 09, 2019
10:00 AM PT

Opened:
April 25, 2019
03:25 PM PT
" diff --git a/windows/release-information/status-windows-server-2008-sp2.yml b/windows/release-information/status-windows-server-2008-sp2.yml index 6949f4fbc1..00ea0100f4 100644 --- a/windows/release-information/status-windows-server-2008-sp2.yml +++ b/windows/release-information/status-windows-server-2008-sp2.yml @@ -60,17 +60,17 @@ sections: - type: markdown text: "
This table offers a summary of current active issues and those issues that have been resolved in the last 30 days.
- - - - - - - - - - - + + + + + + + + + + +
SummaryOriginating updateStatusLast updated
First character of the Japanese era name not recognized as an abbreviation
The first character of the Japanese era name is not recognized as an abbreviation and may cause date parsing issues.

See details >
N/A
January 17, 2019
KB4480974
Resolved
KB4489880
April 25, 2019
03:32 PM PT
Applications using Microsoft Jet database fail to open
Applications that use a Microsoft Jet database with the Microsoft Access 97 file format may fail to open if column names are greater than 32 characters.

See details >
N/A
January 08, 2019
KB4480968
Resolved
KB4487023
April 25, 2019
03:32 PM PT
Unable to use Seek bar in Windows Media Player
Users may not be able to use the Seek bar in Windows Media Player when playing specific files.

See details >
N/A
October 09, 2018
KB4463097
Resolved
KB4471325
April 25, 2019
03:28 PM PT
Virtual machines fail to restore
Virtual machines (VMs) may fail to restore successfully if the VM has been saved and restored once before.

See details >
N/A
January 08, 2019
KB4480968
Resolved
KB4490514
April 25, 2019
03:26 PM PT
System unresponsive after restart if Sophos Endpoint Protection installed
Devices with Sophos Endpoint Protection installed and managed by Sophos Central or Sophos Enterprise Console (SEC) may become unresponsive upon restart.

See details >
N/A
April 09, 2019
KB4493471
Mitigated
April 25, 2019
03:26 PM PT
System may be unresponsive after restart if Avira antivirus software installed
Devices with Avira antivirus software installed may become unresponsive upon restart.

See details >
N/A
April 09, 2019
KB4493471
Investigating
April 25, 2019
03:26 PM PT
Embedded objects may display incorrectly
Any compound document (OLE) server application that places embedded objects into the Windows Metafile (WMF) using the PatBlt API may display embedded objects incorrectly.

See details >
N/A

Resolved
KB4493471
April 25, 2019
03:26 PM PT
Applications using Microsoft Jet database and Access 95 file format stop working
Applications that use a Microsoft Jet database with the Microsoft Access 95 file format may randomly stop working.

See details >
N/A
February 12, 2019
KB4487023
Resolved
KB4487022
April 25, 2019
03:26 PM PT
Local Administrators unable to remotely access shares
Local users who are part of the local Administrators group may not be able to remotely access shares on Windows Server 2008 R2 and Windows 7 machines.

See details >
N/A
January 08, 2019
KB4480968
Resolved
KB4487354
April 25, 2019
03:26 PM PT
NETDOM.EXE fails to run
NETDOM.EXE fails to run and the error, “The command failed to complete successfully.” appears on screen.

See details >
N/A
March 12, 2019
KB4489880
Resolved
KB4493471
April 25, 2019
03:25 PM PT
Authentication may fail for services after the Kerberos ticket expires
Authentication may fail for services that require unconstrained delegation after the Kerberos ticket expires.

See details >
N/A
March 12, 2019
KB4489880
Mitigated
April 25, 2019
03:24 PM PT
First character of the Japanese era name not recognized as an abbreviation
The first character of the Japanese era name is not recognized as an abbreviation and may cause date parsing issues.

See details >
January 17, 2019
KB4480974
Resolved
KB4489880
April 25, 2019
03:32 PM PT
Applications using Microsoft Jet database fail to open
Applications that use a Microsoft Jet database with the Microsoft Access 97 file format may fail to open if column names are greater than 32 characters.

See details >
January 08, 2019
KB4480968
Resolved
KB4487023
April 25, 2019
03:32 PM PT
Unable to use Seek bar in Windows Media Player
Users may not be able to use the Seek bar in Windows Media Player when playing specific files.

See details >
October 09, 2018
KB4463097
Resolved
KB4471325
April 25, 2019
03:28 PM PT
Virtual machines fail to restore
Virtual machines (VMs) may fail to restore successfully if the VM has been saved and restored once before.

See details >
January 08, 2019
KB4480968
Resolved
KB4490514
April 25, 2019
03:26 PM PT
System unresponsive after restart if Sophos Endpoint Protection installed
Devices with Sophos Endpoint Protection installed and managed by Sophos Central or Sophos Enterprise Console (SEC) may become unresponsive upon restart.

See details >
April 09, 2019
KB4493471
Mitigated
April 25, 2019
03:26 PM PT
System may be unresponsive after restart if Avira antivirus software installed
Devices with Avira antivirus software installed may become unresponsive upon restart.

See details >
April 09, 2019
KB4493471
Investigating
April 25, 2019
03:26 PM PT
Embedded objects may display incorrectly
Any compound document (OLE) server application that places embedded objects into the Windows Metafile (WMF) using the PatBlt API may display embedded objects incorrectly.

See details >

Resolved
KB4493471
April 25, 2019
03:26 PM PT
Applications using Microsoft Jet database and Access 95 file format stop working
Applications that use a Microsoft Jet database with the Microsoft Access 95 file format may randomly stop working.

See details >
February 12, 2019
KB4487023
Resolved
KB4487022
April 25, 2019
03:26 PM PT
Local Administrators unable to remotely access shares
Local users who are part of the local Administrators group may not be able to remotely access shares on Windows Server 2008 R2 and Windows 7 machines.

See details >
January 08, 2019
KB4480968
Resolved
KB4487354
April 25, 2019
03:26 PM PT
NETDOM.EXE fails to run
NETDOM.EXE fails to run and the error, “The command failed to complete successfully.” appears on screen.

See details >
March 12, 2019
KB4489880
Resolved
KB4493471
April 25, 2019
03:25 PM PT
Authentication may fail for services after the Kerberos ticket expires
Authentication may fail for services that require unconstrained delegation after the Kerberos ticket expires.

See details >
March 12, 2019
KB4489880
Mitigated
April 25, 2019
03:24 PM PT
" @@ -86,16 +86,16 @@ sections: - type: markdown text: " - - - - - - - - - - - + + + + + + + + + + +
DetailsOriginating updateStatusHistory
First character of the Japanese era name not recognized as an abbreviation
After installing KB4480974, the first character of the Japanese era name is not recognized as an abbreviation and may cause date parsing issues.

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 8.1; Windows 7, Service Pack 1
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2; Windows Server 2012; Windows Server 2008 R2 SP1; Windows Server 2008 SP2

Resolution: This issue is resolved in KB4489880.

Back to top
N/A
January 17, 2019
KB4480974
Resolved
KB4489880
Resolved:
March 12, 2019
10:00 AM PT

Opened:
April 25, 2019
03:32 PM PT
Applications using Microsoft Jet database fail to open
Applications that use a Microsoft Jet database with the Microsoft Access 97 file format may fail to open if the database has column names greater than 32 characters. The database will fail to open with the error, “Unrecognized Database Format”.

Affected platforms: 
  • Client: Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 8.1; Windows 7, Service Pack 1 
  • Server: Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2; Windows Server 2012; Windows Server 2008 R2 SP1; Windows Server 2008 SP2

Resolution: This issue is resolved in KB4487023.

Back to top
N/A
January 08, 2019
KB4480968
Resolved
KB4487023
Resolved:
February 12, 2019
10:00 AM PT

Opened:
April 25, 2019
03:32 PM PT
Unable to use Seek bar in Windows Media Player
After installing KB4463097, users may not be able to use the Seek Bar in Windows Media Player when playing specific files. This issue does not affect normal playback.

Affected platforms: 
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 8.1; Windows 7, Service Pack 1
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2; Windows Server 2012; Windows Server 2008 R2 SP1; Windows Server 2008 SP2

Resolution: This issue is resolved in KB4471325.

Back to top
N/A
October 09, 2018
KB4463097
Resolved
KB4471325
Resolved:
December 11, 2018
10:00 AM PT

Opened:
April 25, 2019
03:28 PM PT
Virtual machines fail to restore
After installing KB4480968, virtual machines (VM) may fail to restore successfully if the VM has been saved and restored once before. The error message is, “Failed to restore the virtual machine state: Cannot restore this virtual machine because the saved state data cannot be read. Delete the saved state data and then try to start the virtual machine. (0xC0370027).”

This affects AMD Bulldozer Family 15h, AMD Jaguar Family 16h, and AMD Puma Family 16h (second generation) microarchitectures.

Affected platforms: 
  • Client: Windows 7, Service Pack 1 
  • Server: Windows Server 2012; Windows Server 2008 R2 SP1; Windows Server 2008 SP2

Resolution: This issue is resolved in KB4490514.

Back to top
N/A
January 08, 2019
KB4480968
Resolved
KB4490514
Resolved:
February 19, 2019
02:00 PM PT

Opened:
April 25, 2019
03:26 PM PT
System unresponsive after restart if Sophos Endpoint Protection installed
Microsoft and Sophos have identified an issue on devices with Sophos Endpoint Protection installed and managed by either Sophos Central or Sophos Enterprise Console (SEC) that may cause the system to become unresponsive upon restart after installing KB4493471.

Microsoft has temporarily blocked devices from receiving this update if the Sophos Endpoint is installed until a solution is available.

Guidance for Sophos Endpoint and Sophos Enterprise Console customers can be found in the Sophos support article.

Affected platforms: 
  • Client: Windows 8.1; Windows 7, Service Pack 1 
  • Server: Windows Server 2012 R2; Windows Server 2012; Windows Server 2008 R2 SP1; Windows Server 2008 SP2

Back to top
N/A
April 09, 2019
KB4493471
Mitigated
Last updated:
April 25, 2019
03:26 PM PT

Opened:
April 25, 2019
03:26 PM PT
System may be unresponsive after restart if Avira antivirus software installed
Microsoft and Avira have identified an issue on devices with Avira antivirus software installed that may cause the system to become unresponsive upon restart after installing KB4493471.

Microsoft has temporarily blocked devices from receiving this update if Avira antivirus software is installed.

Affected platforms: 
  • Client: Windows 8.1; Windows 7, Service Pack 1 
  • Server: Windows Server 2012 R2; Windows Server 2012; Windows Server 2008 R2 SP1; Windows Server 2008 SP2

Next steps: We are presently investigating this issue with Avira and will provide an update when available.

Back to top
N/A
April 09, 2019
KB4493471
Investigating
Last updated:
April 25, 2019
03:26 PM PT

Opened:
April 25, 2019
03:26 PM PT
Embedded objects may display incorrectly
Any compound document (OLE) server application that places embedded objects into the Windows Metafile (WMF) using the PatBlt API may display embedded objects incorrectly.

For example, if you paste a Microsoft Excel worksheet object into a Microsoft Word document, the cells may render with a different background color.

Affected platforms: 
  • Client: Windows 8.1 
  • Server: Windows Server 2012 R2; Windows Server 2012; Windows Server 2008 SP2

Resolution: This issue is resolved in KB4493471.

Back to top
N/A

Resolved
KB4493471
Resolved:
April 09, 2019
10:00 AM PT

Opened:
April 25, 2019
03:26 PM PT
Applications using Microsoft Jet database and Access 95 file format stop working
Applications that use a Microsoft Jet database with the Microsoft Access 95 file format may randomly stop working.

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 7, Service Pack 1
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012; Windows Server 2008 R2 SP1; Windows Server 2008 SP2

Resolution: This issue is resolved in KB4487022.

Back to top
N/A
February 12, 2019
KB4487023
Resolved
KB4487022
Resolved:
February 19, 2019
02:00 PM PT

Opened:
April 25, 2019
03:26 PM PT
Local Administrators unable to remotely access shares
Local users who are part of the local Administrators group may not be able to remotely access shares on Windows Server 2008 R2 and Windows 7 machines after installing KB4480968. This does not affect domain accounts in the local Administrators group.

Affected platforms: 
  • Client: Windows 7, Service Pack 1 
  • Server: Windows Server 2008 R2 SP1; Windows Server 2008 SP2

Resolution: This issue is resolved in KB4487354.

Back to top
N/A
January 08, 2019
KB4480968
Resolved
KB4487354
Resolved:
January 11, 2019
02:00 PM PT

Opened:
April 25, 2019
03:26 PM PT
NETDOM.EXE fails to run
After installing KB4489880, NETDOM.EXE fails to run, and the on-screen error, “The command failed to complete successfully.” appears.

Affected platforms: 
  • Client: Windows 7, Service Pack 1 
  • Server: Windows Server 2008 R2 SP1; Windows Server 2008 SP2

Resolution: This issue is resolved in KB4493471.

Back to top
N/A
March 12, 2019
KB4489880
Resolved
KB4493471
Resolved:
April 09, 2019
10:00 AM PT

Opened:
April 25, 2019
03:25 PM PT
Authentication may fail for services after the Kerberos ticket expires
After installing KB4489880, some customers report that authentication fails for services that require unconstrained delegation after the Kerberos ticket expires (the default is 10 hours). For example, the SQL server service fails.

Affected platforms: 
  • Client: Windows 7, Service Pack 1 
  • Server: Windows Server 2008 R2 SP1; Windows Server 2008 SP2

Workaround: To mitigate this issue, use one of the following options:

  • Option 1: Purge the Kerberos tickets on the application server. After the Kerberos ticket expires, the issue will occur again, and you must purge the tickets again.
  • Option 2: If purging does not mitigate the issue, restart the application; for example, restart the Internet Information Services (IIS) app pool associated with the SQL server.
  • Option 3: Use constrained delegation.

Next steps: Microsoft is working on a resolution and will provide an update in an upcoming release.

Back to top
N/A
March 12, 2019
KB4489880
Mitigated
Last updated:
April 25, 2019
03:24 PM PT

Opened:
April 25, 2019
03:24 PM PT
First character of the Japanese era name not recognized as an abbreviation
After installing KB4480974, the first character of the Japanese era name is not recognized as an abbreviation and may cause date parsing issues.

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 8.1; Windows 7, Service Pack 1
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2; Windows Server 2012; Windows Server 2008 R2 SP1; Windows Server 2008 SP2

Resolution: This issue is resolved in KB4489880.

Back to top
January 17, 2019
KB4480974
Resolved
KB4489880
Resolved:
March 12, 2019
10:00 AM PT

Opened:
April 25, 2019
03:32 PM PT
Applications using Microsoft Jet database fail to open
Applications that use a Microsoft Jet database with the Microsoft Access 97 file format may fail to open if the database has column names greater than 32 characters. The database will fail to open with the error, “Unrecognized Database Format”.

Affected platforms: 
  • Client: Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 8.1; Windows 7, Service Pack 1 
  • Server: Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2; Windows Server 2012; Windows Server 2008 R2 SP1; Windows Server 2008 SP2

Resolution: This issue is resolved in KB4487023.

Back to top
January 08, 2019
KB4480968
Resolved
KB4487023
Resolved:
February 12, 2019
10:00 AM PT

Opened:
April 25, 2019
03:32 PM PT
Unable to use Seek bar in Windows Media Player
After installing KB4463097, users may not be able to use the Seek Bar in Windows Media Player when playing specific files. This issue does not affect normal playback.

Affected platforms: 
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 8.1; Windows 7, Service Pack 1
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2; Windows Server 2012; Windows Server 2008 R2 SP1; Windows Server 2008 SP2

Resolution: This issue is resolved in KB4471325.

Back to top
October 09, 2018
KB4463097
Resolved
KB4471325
Resolved:
December 11, 2018
10:00 AM PT

Opened:
April 25, 2019
03:28 PM PT
Virtual machines fail to restore
After installing KB4480968, virtual machines (VM) may fail to restore successfully if the VM has been saved and restored once before. The error message is, “Failed to restore the virtual machine state: Cannot restore this virtual machine because the saved state data cannot be read. Delete the saved state data and then try to start the virtual machine. (0xC0370027).”

This affects AMD Bulldozer Family 15h, AMD Jaguar Family 16h, and AMD Puma Family 16h (second generation) microarchitectures.

Affected platforms: 
  • Client: Windows 7, Service Pack 1 
  • Server: Windows Server 2012; Windows Server 2008 R2 SP1; Windows Server 2008 SP2

Resolution: This issue is resolved in KB4490514.

Back to top
January 08, 2019
KB4480968
Resolved
KB4490514
Resolved:
February 19, 2019
02:00 PM PT

Opened:
April 25, 2019
03:26 PM PT
System unresponsive after restart if Sophos Endpoint Protection installed
Microsoft and Sophos have identified an issue on devices with Sophos Endpoint Protection installed and managed by either Sophos Central or Sophos Enterprise Console (SEC) that may cause the system to become unresponsive upon restart after installing KB4493471.

Microsoft has temporarily blocked devices from receiving this update if the Sophos Endpoint is installed until a solution is available.

Guidance for Sophos Endpoint and Sophos Enterprise Console customers can be found in the Sophos support article.

Affected platforms: 
  • Client: Windows 8.1; Windows 7, Service Pack 1 
  • Server: Windows Server 2012 R2; Windows Server 2012; Windows Server 2008 R2 SP1; Windows Server 2008 SP2

Back to top
April 09, 2019
KB4493471
Mitigated
Last updated:
April 25, 2019
03:26 PM PT

Opened:
April 25, 2019
03:26 PM PT
System may be unresponsive after restart if Avira antivirus software installed
Microsoft and Avira have identified an issue on devices with Avira antivirus software installed that may cause the system to become unresponsive upon restart after installing KB4493471.

Microsoft has temporarily blocked devices from receiving this update if Avira antivirus software is installed.

Affected platforms: 
  • Client: Windows 8.1; Windows 7, Service Pack 1 
  • Server: Windows Server 2012 R2; Windows Server 2012; Windows Server 2008 R2 SP1; Windows Server 2008 SP2

Next steps: We are presently investigating this issue with Avira and will provide an update when available.

Back to top
April 09, 2019
KB4493471
Investigating
Last updated:
April 25, 2019
03:26 PM PT

Opened:
April 25, 2019
03:26 PM PT
Embedded objects may display incorrectly
Any compound document (OLE) server application that places embedded objects into the Windows Metafile (WMF) using the PatBlt API may display embedded objects incorrectly.

For example, if you paste a Microsoft Excel worksheet object into a Microsoft Word document, the cells may render with a different background color.

Affected platforms: 
  • Client: Windows 8.1 
  • Server: Windows Server 2012 R2; Windows Server 2012; Windows Server 2008 SP2

Resolution: This issue is resolved in KB4493471.

Back to top

Resolved
KB4493471
Resolved:
April 09, 2019
10:00 AM PT

Opened:
April 25, 2019
03:26 PM PT
Applications using Microsoft Jet database and Access 95 file format stop working
Applications that use a Microsoft Jet database with the Microsoft Access 95 file format may randomly stop working.

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 7, Service Pack 1
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012; Windows Server 2008 R2 SP1; Windows Server 2008 SP2

Resolution: This issue is resolved in KB4487022.

Back to top
February 12, 2019
KB4487023
Resolved
KB4487022
Resolved:
February 19, 2019
02:00 PM PT

Opened:
April 25, 2019
03:26 PM PT
Local Administrators unable to remotely access shares
Local users who are part of the local Administrators group may not be able to remotely access shares on Windows Server 2008 R2 and Windows 7 machines after installing KB4480968. This does not affect domain accounts in the local Administrators group.

Affected platforms: 
  • Client: Windows 7, Service Pack 1 
  • Server: Windows Server 2008 R2 SP1; Windows Server 2008 SP2

Resolution: This issue is resolved in KB4487354.

Back to top
January 08, 2019
KB4480968
Resolved
KB4487354
Resolved:
January 11, 2019
02:00 PM PT

Opened:
April 25, 2019
03:26 PM PT
NETDOM.EXE fails to run
After installing KB4489880, NETDOM.EXE fails to run, and the on-screen error, “The command failed to complete successfully.” appears.

Affected platforms: 
  • Client: Windows 7, Service Pack 1 
  • Server: Windows Server 2008 R2 SP1; Windows Server 2008 SP2

Resolution: This issue is resolved in KB4493471.

Back to top
March 12, 2019
KB4489880
Resolved
KB4493471
Resolved:
April 09, 2019
10:00 AM PT

Opened:
April 25, 2019
03:25 PM PT
Authentication may fail for services after the Kerberos ticket expires
After installing KB4489880, some customers report that authentication fails for services that require unconstrained delegation after the Kerberos ticket expires (the default is 10 hours). For example, the SQL server service fails.

Affected platforms: 
  • Client: Windows 7, Service Pack 1 
  • Server: Windows Server 2008 R2 SP1; Windows Server 2008 SP2

Workaround: To mitigate this issue, use one of the following options:

  • Option 1: Purge the Kerberos tickets on the application server. After the Kerberos ticket expires, the issue will occur again, and you must purge the tickets again.
  • Option 2: If purging does not mitigate the issue, restart the application; for example, restart the Internet Information Services (IIS) app pool associated with the SQL server.
  • Option 3: Use constrained delegation.

Next steps: Microsoft is working on a resolution and will provide an update in an upcoming release.

Back to top
March 12, 2019
KB4489880
Mitigated
Last updated:
April 25, 2019
03:24 PM PT

Opened:
April 25, 2019
03:24 PM PT
" diff --git a/windows/release-information/windows-message-center.yml b/windows/release-information/windows-message-center.yml index ea2bcfbb01..349f7a88c1 100644 --- a/windows/release-information/windows-message-center.yml +++ b/windows/release-information/windows-message-center.yml @@ -52,43 +52,43 @@ sections:
The benefits of Windows 10 Dynamic Update

Dynamic Update can help organizations and end users alike ensure that their Windows 10 devices have the latest feature update content (as part of an in-place upgrade)—and preserve precious features on demand (FODs) and language packs (LPs) that may have been previously installed.

-
Find out which components are updated by Dynamic Update, how Dynamic Update is initiated, and how to enable or disable it.
April 17, 2019 11: 26 AM PT
Improvements to the Windows 10 update experience are coming

Find out about the changes coming to the Windows update process that will improve the experience, offer users more control, and improve the quality of Windows updates.
April 04, 2019 09: 00 AM PT
April 17, 2019
11: 26 AM PT
Improvements to the Windows 10 update experience are coming

Find out about the changes coming to the Windows update process that will improve the experience, offer users more control, and improve the quality of Windows updates.
April 04, 2019
09: 00 AM PT
Take action: review your Windows Update for Business deferral values

If devices under your management are still running Windows 10 Pro or Windows 10 Pro for Workstations, version 1709, your devices will reach end of service on April 9, 2019 if you have configured both of the following Windows Update for Business policies:
  • Branch readiness is configured as Semi-Annual Channel (SAC)
  • Feature update deferral is configured as 274 days or more
-In order avoid this, you need to set your feature update deferral policy to 273 days or less.
April 03, 2019 05: 47 PM PT
Find a list of currently supported versions and previous releases

Every Windows product has a lifecycle. The lifecycle begins when a product is released and ends when it is no longer serviced or supported. Knowing key dates in this lifecycle helps you make informed decisions about when to update, upgrade, or make other changes to your software. Check out the updated Windows 10 release information page for a list of current versions by servicing option as well as end of service dates.
March 28, 2019 02: 00 PM PT
Windows 10, version 1809 designated for broad deployment

Based on the data and the feedback we’ve received from consumers, OEMs, ISVs, partners, and commercial customers, Windows 10, version 1809 has transitioned to broad deployment. With this, the Windows 10 release information page will now reflect Semi-Annual Channel (SAC) for version 1809.
March 28, 2019 10: 00 AM PT
How do we measure and improve the quality of Windows?

We rely heavily on feedback and data to detect and fix potential issues before we release new updates to the general population. Explore some of the practices we’ve developed during the last few years to measure and improve the quality of Windows.
March 06, 2019 10: 23 AM PT
April 03, 2019
05: 47 PM PT
Find a list of currently supported versions and previous releases

Every Windows product has a lifecycle. The lifecycle begins when a product is released and ends when it is no longer serviced or supported. Knowing key dates in this lifecycle helps you make informed decisions about when to update, upgrade, or make other changes to your software. Check out the updated Windows 10 release information page for a list of current versions by servicing option as well as end of service dates.
March 28, 2019
02: 00 PM PT
Windows 10, version 1809 designated for broad deployment

Based on the data and the feedback we’ve received from consumers, OEMs, ISVs, partners, and commercial customers, Windows 10, version 1809 has transitioned to broad deployment. With this, the Windows 10 release information page will now reflect Semi-Annual Channel (SAC) for version 1809.
March 28, 2019
10: 00 AM PT
How do we measure and improve the quality of Windows?

We rely heavily on feedback and data to detect and fix potential issues before we release new updates to the general population. Explore some of the practices we’ve developed during the last few years to measure and improve the quality of Windows.
March 06, 2019
10: 23 AM PT
Data, insights and listening to improve the customer experience

Measuring the quality of Windows is a complex undertaking that requires gathering a variety of diagnostic signals from millions of devices within the Windows ecosystem. In addition to rigorous internal testing, we rely heavily on the feedback provided through diagnostic data to detect and fix problems before we release new updates of Windows to the general population, and to monitor the impact of those updates after each release.

-
Get insight into some of the practices we employ to measure and improve the quality of Windows.
March 06, 2019 10: 23 AM PT
March 06, 2019
10: 23 AM PT
Getting to know the Windows update history pages

Windows Update customers were affected by a network infrastructure event on January 29, 2019 (21:00 UTC), caused by an external DNS service provider’s global outage. A software update to the external provider’s DNS servers resulted in the distribution of corrupted DNS records that affected connectivity to the Windows Update service. The DNS records were restored by January 30, 2019 (00:10 UTC), and the majority of local Internet Service Providers (ISP) have refreshed their DNS servers and customer services have been restored.

While this was not an issue with Microsoft’s services, we take any service disruption for our customers seriously. We will work with partners to better understand this so we can provide higher quality service in the future even across diverse global network providers.

-
If you are still unable to connect to Windows Update services due to this problem, please contact your local ISP or network administrator. You can also refer to our new KB4493784 for more information to determine if your network is affected, and to provide your local ISP or network administrator with additional information to assist you.
February 21, 2019 06: 37 PM PT
Share your feedback: Windows update history

We read every comment you leave on our update history pages, and are always looking to improve these pages and the monthly knowledge base (KB) articles that accompany each monthly update. Take our survey and let us know how we can improve our transparency further and make these more compelling and useful to you and your organization.
February 21, 2019 12: 00 PM PT
Plan for change: Windows Update for Business and the retirement of SAC-T

Beginning with Windows 10, version 1903 (the next feature update for Windows 10), the Windows 10 release information page will no longer list SAC-T information for version 1903 and future feature updates. Instead, you will find a single entry for each new SAC release. In addition, if you are using Windows Update for Business, you will see new UI and behavior to reflect that there is only one release date for each SAC release. If you use System Center Configuration Manager, Windows Server Update Services (WSUS), or other management tools, there will now only be one feature update published to WSUS, and this will occur at the time of release. Learn how this change will affect Windows Business for Update customers.
February 14, 2019 12: 00 PM PT
Champs corner: Classifying Windows updates in common deployment tools

If you utilize automated update deployment tools, such as Windows Server Update Services (WSUS) or System Center Configuration Manager, you likely use automatic rules to streamline the approval and deployment of Windows updates. Using the correct update classification is, therefore, an important component of your organization’s device update process. Explore the options available and how to approach it in a WSUS or Configuration Manager environment.
February 05, 2019 10: 34 AM PT
February 21, 2019
06: 37 PM PT
Share your feedback: Windows update history

We read every comment you leave on our update history pages, and are always looking to improve these pages and the monthly knowledge base (KB) articles that accompany each monthly update. Take our survey and let us know how we can improve our transparency further and make these more compelling and useful to you and your organization.
February 21, 2019
12: 00 PM PT
Plan for change: Windows Update for Business and the retirement of SAC-T

Beginning with Windows 10, version 1903 (the next feature update for Windows 10), the Windows 10 release information page will no longer list SAC-T information for version 1903 and future feature updates. Instead, you will find a single entry for each new SAC release. In addition, if you are using Windows Update for Business, you will see new UI and behavior to reflect that there is only one release date for each SAC release. If you use System Center Configuration Manager, Windows Server Update Services (WSUS), or other management tools, there will now only be one feature update published to WSUS, and this will occur at the time of release. Learn how this change will affect Windows Business for Update customers.
February 14, 2019
12: 00 PM PT
Champs corner: Classifying Windows updates in common deployment tools

If you utilize automated update deployment tools, such as Windows Server Update Services (WSUS) or System Center Configuration Manager, you likely use automatic rules to streamline the approval and deployment of Windows updates. Using the correct update classification is, therefore, an important component of your organization’s device update process. Explore the options available and how to approach it in a WSUS or Configuration Manager environment.
February 05, 2019
10: 34 AM PT
Global DNS outage affecting Windows Update customers

Windows Update customers were affected by a network infrastructure event on January 29, 2019 (21:00 UTC), caused by an external DNS service provider’s global outage. A software update to the external provider’s DNS servers resulted in the distribution of corrupted DNS records that affected connectivity to the Windows Update service. The DNS records were restored by January 30, 2019 (00:10 UTC), and the majority of local Internet Service Providers (ISP) have refreshed their DNS servers and customer services have been restored. While this was not an issue with Microsoft’s services, we take any service disruption for our customers seriously. We will work with partners to better understand this so we can provide higher quality service in the future even across diverse global network providers. -If you are still unable to connect to Windows Update services due to this problem, please contact your local ISP or network administrator. You can also refer to our new KB4493784 for more information to determine if your network is affected, and to provide your local ISP or network administrator with additional information to assist you.
January 29, 2019 04: 15 PM PT
Application compatibility in the Windows ecosystem

Our application ecosystem is incredibly diverse, encompassing tens of millions of applications (apps) with numerous versions, languages, architectures, services and configuration options. While our ecosystem is complex, our vision is simple. All apps on Windows devices should just work! Explore the various programs and technologies we use to improve application compatibility.
January 15, 2019 10: 00 AM PT
Modern desktop servicing: the year in review

2018 was a pivotal year for the modern desktop and the servicing transformation journey we have been taking with you and your organization. In this post, John Wilcox takes a look back and recaps the progress that has been made, highlighting significant events, and provideing nsight into what 2019 has in store.
December 19, 2018 02: 20 PM PT
Driver quality in the Windows ecosystem

Ensuring Windows 10 works great with all the devices and accessories our customers use is a top priority. We work closely with this broad mix of partners to test new drivers, monitor health characteristics over time, and make Windows and our ecosystem more resilient architecturally. Our goal is to ensure that all the updates and drivers we deliver to non-Insider populations are validated and at production quality (including monthly optional releases) before pushing drivers broadly to all. Explore the driver distribution chain and learn how we measure driver quality and prevent conflicts.
December 19, 2018 10: 04 AM PT
Introducing the Modern Desktop podcast series

In this new podcast series, we'll explore the good, the bad, and, yes, the ugly of servicing and delivery for Windows 10 and Office 365 ProPlus. We'll talk about modern desktop management through Enterprise Mobility, security, and cloud-attached and co-managed environments. Listen to the first episode, in which we discuss monthly quality updates fpr Windows 10, the Microsoft 365 Stay Current pilot program, and interview a real customer to see how they ingest monthly updates in their organization.
December 18, 2018 01: 00 PM PT
Measuring Delivery Optimization and its impact to your network

If you've familiarized yourself with the configuration options for Delivery Optimization in Windows 10, and have started to configure the settings you feel will be the best fit for your organization’s network topology, now is the time to see how well those settings are working. This article provides tips on how evaluate performance at the device level or organization level.
December 13, 2018 03: 48 PM PT
Windows monthly security and quality updates overview

Today’s global cybersecurity threats are both dynamic and sophisticated, and new vulnerabilities are discovered almost every day. We focus on protecting customers from these security threats by providing security updates on a timely basis and with high quality. Find out how how we deliver these critical updates on a massive scale as a key component of our ongoing Windows as a service effort.
December 10, 2018 10: 00 AM PT
LTSC: What is it, and when should it be used?

With the Semi-Annual Channel, devices receive two feature updates per year, and benefit from the best performance, user experience, security, and stability. This servicing option continues to be our recommendation for managing Windows 10 updates; however, we acknowledge that certain devices and use cases (e.g. medical systems and industrial process controllers) dictate that functionality and features don’t change over time. Find out how we designed the Long-Term Servicing Channel (LTSC) with these types of use cases in mind, and what is offered through the LTSC.
November 29, 2018 07: 02 PM PT
Plan for change: Local Experience Packs: What are they and when should you use them?

When we released Windows 10, version 1803, we introduced Local Experience Packs (LXPs), which are modern language packs delivered through the Microsoft Store or Microsoft Store for Business. Learn about the biggest advantage to LXPs, and the retirement of legacy language packs (lp.cab) for all Language Interface Packs (LIP).
November 14, 2018 11: 10 AM PT
Windows 10 Quality approach for a complex ecosystem

While our measurements of quality show improving trends on aggregate for each successive Windows 10 release, if a single customer experiences an issue with any of our updates, we take it seriously. In this blog post, Windows CVP Mike Fortin shares an overview of how we work to continuously improve the quality of Windows and our Windows as a service approach. This blog will be the first in a series of more in-depth explanations of the work we do to deliver quality in our Windows releases.
November 13, 2018 10: 00 AM PT
Windows 10, version 1809 rollout resumes; now available on VLSC

Today we are resuming the rollout of the latest Windows 10 feature update—Windows 10, version 1809—via the Software Download Center (via Update Assistant or the Media Creation Tool), Windows Server Update Services (WSUS), and Windows Update for Business. Windows 10, version 1809 is also now available on the Volume Licensing Service Center (VLSC).
November 13, 2018 10: 00 AM PT
Express updates for Windows Server 2016 re-enabled for November 2018 update

Starting with the November 13, 2018 Update Tuesday release, Windows will again publish Express updates for Windows Server 2016. That means that system administrators for WSUS and System Center Configuration Manager will once again see two packages for the Windows Server 2016 update: a Full update and an Express update. Read this article for more details.
November 12, 2018 03: 00 PM PT
January 29, 2019
04: 15 PM PT
Application compatibility in the Windows ecosystem

Our application ecosystem is incredibly diverse, encompassing tens of millions of applications (apps) with numerous versions, languages, architectures, services and configuration options. While our ecosystem is complex, our vision is simple. All apps on Windows devices should just work! Explore the various programs and technologies we use to improve application compatibility.
January 15, 2019
10: 00 AM PT
Modern desktop servicing: the year in review

2018 was a pivotal year for the modern desktop and the servicing transformation journey we have been taking with you and your organization. In this post, John Wilcox takes a look back and recaps the progress that has been made, highlighting significant events, and provideing nsight into what 2019 has in store.
December 19, 2018
02: 20 PM PT
Driver quality in the Windows ecosystem

Ensuring Windows 10 works great with all the devices and accessories our customers use is a top priority. We work closely with this broad mix of partners to test new drivers, monitor health characteristics over time, and make Windows and our ecosystem more resilient architecturally. Our goal is to ensure that all the updates and drivers we deliver to non-Insider populations are validated and at production quality (including monthly optional releases) before pushing drivers broadly to all. Explore the driver distribution chain and learn how we measure driver quality and prevent conflicts.
December 19, 2018
10: 04 AM PT
Introducing the Modern Desktop podcast series

In this new podcast series, we'll explore the good, the bad, and, yes, the ugly of servicing and delivery for Windows 10 and Office 365 ProPlus. We'll talk about modern desktop management through Enterprise Mobility, security, and cloud-attached and co-managed environments. Listen to the first episode, in which we discuss monthly quality updates fpr Windows 10, the Microsoft 365 Stay Current pilot program, and interview a real customer to see how they ingest monthly updates in their organization.
December 18, 2018
01: 00 PM PT
Measuring Delivery Optimization and its impact to your network

If you've familiarized yourself with the configuration options for Delivery Optimization in Windows 10, and have started to configure the settings you feel will be the best fit for your organization’s network topology, now is the time to see how well those settings are working. This article provides tips on how evaluate performance at the device level or organization level.
December 13, 2018
03: 48 PM PT
Windows monthly security and quality updates overview

Today’s global cybersecurity threats are both dynamic and sophisticated, and new vulnerabilities are discovered almost every day. We focus on protecting customers from these security threats by providing security updates on a timely basis and with high quality. Find out how how we deliver these critical updates on a massive scale as a key component of our ongoing Windows as a service effort.
December 10, 2018
10: 00 AM PT
LTSC: What is it, and when should it be used?

With the Semi-Annual Channel, devices receive two feature updates per year, and benefit from the best performance, user experience, security, and stability. This servicing option continues to be our recommendation for managing Windows 10 updates; however, we acknowledge that certain devices and use cases (e.g. medical systems and industrial process controllers) dictate that functionality and features don’t change over time. Find out how we designed the Long-Term Servicing Channel (LTSC) with these types of use cases in mind, and what is offered through the LTSC.
November 29, 2018
07: 02 PM PT
Plan for change: Local Experience Packs: What are they and when should you use them?

When we released Windows 10, version 1803, we introduced Local Experience Packs (LXPs), which are modern language packs delivered through the Microsoft Store or Microsoft Store for Business. Learn about the biggest advantage to LXPs, and the retirement of legacy language packs (lp.cab) for all Language Interface Packs (LIP).
November 14, 2018
11: 10 AM PT
Windows 10 Quality approach for a complex ecosystem

While our measurements of quality show improving trends on aggregate for each successive Windows 10 release, if a single customer experiences an issue with any of our updates, we take it seriously. In this blog post, Windows CVP Mike Fortin shares an overview of how we work to continuously improve the quality of Windows and our Windows as a service approach. This blog will be the first in a series of more in-depth explanations of the work we do to deliver quality in our Windows releases.
November 13, 2018
10: 00 AM PT
Windows 10, version 1809 rollout resumes; now available on VLSC

Today we are resuming the rollout of the latest Windows 10 feature update—Windows 10, version 1809—via the Software Download Center (via Update Assistant or the Media Creation Tool), Windows Server Update Services (WSUS), and Windows Update for Business. Windows 10, version 1809 is also now available on the Volume Licensing Service Center (VLSC).
November 13, 2018
10: 00 AM PT
Express updates for Windows Server 2016 re-enabled for November 2018 update

Starting with the November 13, 2018 Update Tuesday release, Windows will again publish Express updates for Windows Server 2016. That means that system administrators for WSUS and System Center Configuration Manager will once again see two packages for the Windows Server 2016 update: a Full update and an Express update. Read this article for more details.
November 12, 2018
03: 00 PM PT
" From 04ad420267637036649807bb7e87d214671fcc9f Mon Sep 17 00:00:00 2001 From: "Nisha Mittal (Wipro Ltd.)" Date: Fri, 26 Apr 2019 01:11:07 -0700 Subject: [PATCH 218/724] Removed border and en-us --- .../resolved-issues-windows-10-1507.yml | 52 ++++----- .../resolved-issues-windows-10-1607.yml | 80 +++++++------- .../resolved-issues-windows-10-1703.yml | 64 +++++------ .../resolved-issues-windows-10-1709.yml | 64 +++++------ .../resolved-issues-windows-10-1803.yml | 90 ++++++++-------- ...indows-10-1809-and-windows-server-2019.yml | 100 +++++++++--------- ...ndows-7-and-windows-server-2008-r2-sp1.yml | 60 +++++------ ...windows-8.1-and-windows-server-2012-r2.yml | 64 +++++------ ...esolved-issues-windows-server-2008-sp2.yml | 36 +++---- .../resolved-issues-windows-server-2012.yml | 48 ++++----- .../status-windows-10-1507.yml | 14 +-- ...indows-10-1607-and-windows-server-2016.yml | 40 +++---- .../status-windows-10-1703.yml | 18 ++-- .../status-windows-10-1709.yml | 22 ++-- .../status-windows-10-1803.yml | 26 ++--- ...indows-10-1809-and-windows-server-2019.yml | 38 +++---- ...ndows-7-and-windows-server-2008-r2-sp1.yml | 48 ++++----- ...windows-8.1-and-windows-server-2012-r2.yml | 50 ++++----- .../status-windows-server-2008-sp2.yml | 48 ++++----- .../status-windows-server-2012.yml | 64 +++++------ .../windows-message-center.yml | 2 +- 21 files changed, 514 insertions(+), 514 deletions(-) diff --git a/windows/release-information/resolved-issues-windows-10-1507.yml b/windows/release-information/resolved-issues-windows-10-1507.yml index 1a4fc478a8..c48f75814a 100644 --- a/windows/release-information/resolved-issues-windows-10-1507.yml +++ b/windows/release-information/resolved-issues-windows-10-1507.yml @@ -31,17 +31,17 @@ sections: - items: - type: markdown text: " - - - - - - - - - - - +
SummaryOriginating updateStatusDate resolved
MSXML6 may cause applications to stop responding
MSXML6 may cause applications to stop responding if an exception was thrown during node operations, such as appendChild(), insertBefore(), and moveNode().

See details >
OS Build 10240.18094

January 08, 2019
KB4480962
Resolved
KB4493475
April 09, 2019
10:00 AM PT
Custom URI schemes may not start corresponding application
Custom URI schemes for application protocol handlers may not start the corresponding application for local intranet and trusted sites in Internet Explorer.

See details >
OS Build 10240.18158

March 12, 2019
KB4489872
Resolved
KB4493475
April 09, 2019
10:00 AM PT
Applications using Microsoft Jet database and Access 95 file format stop working
Applications that use a Microsoft Jet database with the Microsoft Access 95 file format may randomly stop working.

See details >
OS Build 10240.18132

February 12, 2019
KB4487018
Resolved
KB4489872
March 12, 2019
10:00 AM PT
Error 1309 when installing/uninstalling MSI or MSP files
Users may receive \"Error 1309\" while installing or uninstalling certain types of MSI and MSP files.

See details >
OS Build 10240.18132

February 12, 2019
KB4487018
Resolved
KB4489872
March 12, 2019
10:00 AM PT
First character of Japanese era name not recognized
The first character of the Japanese era name is not recognized as an abbreviation and may cause date parsing issues.

See details >
OS Build 10240.18132

February 12, 2019
KB4487018
Resolved
KB4489872
March 12, 2019
10:00 AM PT
Internet Explorer may fail to load images
Internet Explorer may fail to load images with a backslash (\\) in their relative source path.

See details >
OS Build 10240.18132

February 12, 2019
KB4487018
Resolved
KB4491101
February 21, 2019
02:00 PM PT
Applications using Microsoft Jet database fail to open
Applications that use a Microsoft Jet database with the Microsoft Access 97 file format may fail to open if column names are greater than 32 characters.

See details >
OS Build 10240.18094

January 08, 2019
KB4480962
Resolved
KB4487018
February 12, 2019
10:00 AM PT
Unable to access hotspots with third-party applications
Third-party applications may have difficulty authenticating hotspots.

See details >
OS Build 10240.18094

January 08, 2019
KB4480962
Resolved
KB4487018
February 12, 2019
10:00 AM PT
Unable to use Seek bar in Windows Media Player
Users may not be able to use the Seek bar in Windows Media Player when playing specific files.

See details >
OS Build 10240.18005

October 09, 2018
KB4462922
Resolved
KB4471323
December 11, 2018
10:00 AM PT
Guest VMs running Unicast NLB fail to respond after restart
All guest virtual machines running Unicast NLB fail to respond to NLB requests after the virtual machines restart.

See details >
OS Build 10240.17976

September 11, 2018
KB4457132
Resolved
KB4462922
October 09, 2018
10:00 AM PT
+ + + + + + + + + +
SummaryOriginating updateStatusDate resolved
Guest VMs running Unicast NLB fail to respond after restart
All guest virtual machines running Unicast NLB fail to respond to NLB requests after the virtual machines restart.

See details >
OS Build 10240.17976

September 11, 2018
KB4457132
Resolved
KB4462922
October 09, 2018
10:00 AM PT
Unable to use Seek bar in Windows Media Player
Users may not be able to use the Seek bar in Windows Media Player when playing specific files.

See details >
OS Build 10240.18005

October 09, 2018
KB4462922
Resolved
KB4471323
December 11, 2018
10:00 AM PT
Applications using Microsoft Jet database fail to open
Applications that use a Microsoft Jet database with the Microsoft Access 97 file format may fail to open if column names are greater than 32 characters.

See details >
OS Build 10240.18094

January 08, 2019
KB4480962
Resolved
KB4487018
February 12, 2019
10:00 AM PT
Applications using Microsoft Jet database and Access 95 file format stop working
Applications that use a Microsoft Jet database with the Microsoft Access 95 file format may randomly stop working.

See details >
OS Build 10240.18132

February 12, 2019
KB4487018
Resolved
KB4489872
March 12, 2019
10:00 AM PT
MSXML6 may cause applications to stop responding
MSXML6 may cause applications to stop responding if an exception was thrown during node operations, such as appendChild(), insertBefore(), and moveNode().

See details >
OS Build 10240.18094

January 08, 2019
KB4480962
Resolved
KB4493475
April 09, 2019
10:00 AM PT
Internet Explorer may fail to load images
Internet Explorer may fail to load images with a backslash (\\) in their relative source path.

See details >
OS Build 10240.18132

February 12, 2019
KB4487018
Resolved
KB4491101
February 21, 2019
02:00 PM PT
Error 1309 when installing/uninstalling MSI or MSP files
Users may receive \"Error 1309\" while installing or uninstalling certain types of MSI and MSP files.

See details >
OS Build 10240.18132

February 12, 2019
KB4487018
Resolved
KB4489872
March 12, 2019
10:00 AM PT
Custom URI schemes may not start corresponding application
Custom URI schemes for application protocol handlers may not start the corresponding application for local intranet and trusted sites in Internet Explorer.

See details >
OS Build 10240.18158

March 12, 2019
KB4489872
Resolved
KB4493475
April 09, 2019
10:00 AM PT
Unable to access hotspots with third-party applications
Third-party applications may have difficulty authenticating hotspots.

See details >
OS Build 10240.18094

January 08, 2019
KB4480962
Resolved
KB4487018
February 12, 2019
10:00 AM PT
First character of Japanese era name not recognized
The first character of the Japanese era name is not recognized as an abbreviation and may cause date parsing issues.

See details >
OS Build 10240.18132

February 12, 2019
KB4487018
Resolved
KB4489872
March 12, 2019
10:00 AM PT
" @@ -56,8 +56,8 @@ sections: - items: - type: markdown text: " - - +
DetailsOriginating updateStatusHistory
Custom URI schemes may not start corresponding application
After installing KB4489872, Custom URI Schemes for Application Protocol handlers may not start the corresponding application for local intranet and trusted sites on Internet Explorer.

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 8.1; Windows 7, Service Pack 1 
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2; Windows Server 2008 R2 SP1

Resolution: This issue was resolved in KB4493475.

Back to top
OS Build 10240.18158

March 12, 2019
KB4489872
Resolved
KB4493475
Resolved:
April 09, 2019
10:00 AM PT

Opened:
March 12, 2019
10:00 AM PT
+
DetailsOriginating updateStatusHistory
Custom URI schemes may not start corresponding application
After installing KB4489872, Custom URI Schemes for Application Protocol handlers may not start the corresponding application for local intranet and trusted sites on Internet Explorer.

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 8.1; Windows 7, Service Pack 1 
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2; Windows Server 2008 R2 SP1

Resolution: This issue was resolved in KB4493475.

Back to top
OS Build 10240.18158

March 12, 2019
KB4489872
Resolved
KB4493475
Resolved:
April 09, 2019
10:00 AM PT

Opened:
March 12, 2019
10:00 AM PT
" @@ -65,11 +65,11 @@ sections: - items: - type: markdown text: " - - - - - +
DetailsOriginating updateStatusHistory
Applications using Microsoft Jet database and Access 95 file format stop working
Applications that use a Microsoft Jet database with the Microsoft Access 95 file format may randomly stop working.

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 7, Service Pack 1
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2008 R2 SP1

Resolution: This issue is resolved in KB4489872.

Back to top
OS Build 10240.18132

February 12, 2019
KB4487018
Resolved
KB4489872
Resolved:
March 12, 2019
10:00 AM PT

Opened:
February 12, 2019
10:00 AM PT
Error 1309 when installing/uninstalling MSI or MSP files
After installing KB4487018, users may receive “Error 1309” while installing or uninstalling certain types of MSI and MSP files.

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 8.1
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2

Resolution: This issue is resolved in KB4489872.

Back to top
OS Build 10240.18132

February 12, 2019
KB4487018
Resolved
KB4489872
Resolved:
March 12, 2019
10:00 AM PT

Opened:
February 12, 2019
10:00 AM PT
First character of Japanese era name not recognized
After installing KB4487018, the first character of the Japanese era name is not recognized as an abbreviation and may cause date parsing issues.

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 8.1; Windows 7, Service Pack 1
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2; Windows Server 2008 R2 SP1

Resolution: This issue is resolved in KB4489872.

Back to top
OS Build 10240.18132

February 12, 2019
KB4487018
Resolved
KB4489872
Resolved:
March 12, 2019
10:00 AM PT

Opened:
February 12, 2019
10:00 AM PT
Internet Explorer may fail to load images
After installing KB4487018, Internet Explorer may fail to load images with a backslash (\\) in their relative source path.

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 8.1; Windows 7, Service Pack 1
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2; Windows Server 2008 R2 SP1

Resolution: This issue is resolved in KB4491101.

Back to top
OS Build 10240.18132

February 12, 2019
KB4487018
Resolved
KB4491101
Resolved:
February 21, 2019
02:00 PM PT

Opened:
February 12, 2019
10:00 AM PT
+ + + +
DetailsOriginating updateStatusHistory
Applications using Microsoft Jet database and Access 95 file format stop working
Applications that use a Microsoft Jet database with the Microsoft Access 95 file format may randomly stop working.

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 7, Service Pack 1
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2008 R2 SP1

Resolution: This issue is resolved in KB4489872.

Back to top
OS Build 10240.18132

February 12, 2019
KB4487018
Resolved
KB4489872
Resolved:
March 12, 2019
10:00 AM PT

Opened:
February 12, 2019
10:00 AM PT
Internet Explorer may fail to load images
After installing KB4487018, Internet Explorer may fail to load images with a backslash (\\) in their relative source path.

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 8.1; Windows 7, Service Pack 1
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2; Windows Server 2008 R2 SP1

Resolution: This issue is resolved in KB4491101.

Back to top
OS Build 10240.18132

February 12, 2019
KB4487018
Resolved
KB4491101
Resolved:
February 21, 2019
02:00 PM PT

Opened:
February 12, 2019
10:00 AM PT
Error 1309 when installing/uninstalling MSI or MSP files
After installing KB4487018, users may receive “Error 1309” while installing or uninstalling certain types of MSI and MSP files.

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 8.1
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2

Resolution: This issue is resolved in KB4489872.

Back to top
OS Build 10240.18132

February 12, 2019
KB4487018
Resolved
KB4489872
Resolved:
March 12, 2019
10:00 AM PT

Opened:
February 12, 2019
10:00 AM PT
First character of Japanese era name not recognized
After installing KB4487018, the first character of the Japanese era name is not recognized as an abbreviation and may cause date parsing issues.

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 8.1; Windows 7, Service Pack 1
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2; Windows Server 2008 R2 SP1

Resolution: This issue is resolved in KB4489872.

Back to top
OS Build 10240.18132

February 12, 2019
KB4487018
Resolved
KB4489872
Resolved:
March 12, 2019
10:00 AM PT

Opened:
February 12, 2019
10:00 AM PT
" @@ -77,10 +77,10 @@ sections: - items: - type: markdown text: " - - - - +
DetailsOriginating updateStatusHistory
MSXML6 may cause applications to stop responding
After installing KB4480962, MSXML6 causes applications to stop responding if an exception was thrown during node operations, such as appendChild(), insertBefore(), and moveNode().

The Group Policy editor may stop responding when editing a Group Policy Object (GPO) that contains Group Policy Preferences (GPP) for Internet Explorer 10 settings.

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 8.1
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2

Resolution: This issue was resolved in KB4493475.

Back to top
OS Build 10240.18094

January 08, 2019
KB4480962
Resolved
KB4493475
Resolved:
April 09, 2019
10:00 AM PT

Opened:
January 08, 2019
10:00 AM PT
Applications using Microsoft Jet database fail to open
Applications that use a Microsoft Jet database with the Microsoft Access 97 file format may fail to open if the database has column names greater than 32 characters. The database will fail to open with the error, \"Unrecognized Database Format\".

Affected platforms:
  • Client: Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 8.1; Windows 7, Service Pack 1
  • Server: Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2; Windows Server 2008 R2 SP1

Resolution: This issue is resolved in KB4487018.

Back to top
OS Build 10240.18094

January 08, 2019
KB4480962
Resolved
KB4487018
Resolved:
February 12, 2019
10:00 AM PT

Opened:
January 08, 2019
10:00 AM PT
Unable to access hotspots with third-party applications
After installing KB4480962, third-party applications may have difficulty authenticating hotspots.

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 8.1
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2

Resolution: This issue is resolved in KB4487018.

Back to top
OS Build 10240.18094

January 08, 2019
KB4480962
Resolved
KB4487018
Resolved:
February 12, 2019
10:00 AM PT

Opened:
January 08, 2019
10:00 AM PT
+ + +
DetailsOriginating updateStatusHistory
Applications using Microsoft Jet database fail to open
Applications that use a Microsoft Jet database with the Microsoft Access 97 file format may fail to open if the database has column names greater than 32 characters. The database will fail to open with the error, \"Unrecognized Database Format\".

Affected platforms:
  • Client: Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 8.1; Windows 7, Service Pack 1
  • Server: Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2; Windows Server 2008 R2 SP1

Resolution: This issue is resolved in KB4487018.

Back to top
OS Build 10240.18094

January 08, 2019
KB4480962
Resolved
KB4487018
Resolved:
February 12, 2019
10:00 AM PT

Opened:
January 08, 2019
10:00 AM PT
MSXML6 may cause applications to stop responding
After installing KB4480962, MSXML6 causes applications to stop responding if an exception was thrown during node operations, such as appendChild(), insertBefore(), and moveNode().

The Group Policy editor may stop responding when editing a Group Policy Object (GPO) that contains Group Policy Preferences (GPP) for Internet Explorer 10 settings.

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 8.1
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2

Resolution: This issue was resolved in KB4493475.

Back to top
OS Build 10240.18094

January 08, 2019
KB4480962
Resolved
KB4493475
Resolved:
April 09, 2019
10:00 AM PT

Opened:
January 08, 2019
10:00 AM PT
Unable to access hotspots with third-party applications
After installing KB4480962, third-party applications may have difficulty authenticating hotspots.

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 8.1
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2

Resolution: This issue is resolved in KB4487018.

Back to top
OS Build 10240.18094

January 08, 2019
KB4480962
Resolved
KB4487018
Resolved:
February 12, 2019
10:00 AM PT

Opened:
January 08, 2019
10:00 AM PT
" @@ -88,8 +88,8 @@ sections: - items: - type: markdown text: " - - +
DetailsOriginating updateStatusHistory
Unable to use Seek bar in Windows Media Player
After installing KB4462922, users may not be able to use the Seek Bar in Windows Media Player when playing specific files. This issue does not affect normal playback.

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 8.1; Windows 7, Service Pack 1
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2; Windows Server 2008 R2 SP1

Resolution: This issue is resolved in KB4471323.

Back to top
OS Build 10240.18005

October 09, 2018
KB4462922
Resolved
KB4471323
Resolved:
December 11, 2018
10:00 AM PT

Opened:
October 09, 2018
10:00 AM PT
+
DetailsOriginating updateStatusHistory
Unable to use Seek bar in Windows Media Player
After installing KB4462922, users may not be able to use the Seek Bar in Windows Media Player when playing specific files. This issue does not affect normal playback.

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 8.1; Windows 7, Service Pack 1
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2; Windows Server 2008 R2 SP1

Resolution: This issue is resolved in KB4471323.

Back to top
OS Build 10240.18005

October 09, 2018
KB4462922
Resolved
KB4471323
Resolved:
December 11, 2018
10:00 AM PT

Opened:
October 09, 2018
10:00 AM PT
" @@ -97,7 +97,7 @@ sections: - items: - type: markdown text: " - - +
DetailsOriginating updateStatusHistory
Guest VMs running Unicast NLB fail to respond after restart
All guest virtual machines running Unicast NLB fail to respond to NLB requests after the virtual machines restart.

Affected platforms:
  • Client: Windows 10, version 1803; Windows 10, version 1507
  • Server: Windows Server, version 1803

Resolution: This issue is resolved in KB4462922.

Back to top
OS Build 10240.17976

September 11, 2018
KB4457132
Resolved
KB4462922
Resolved:
October 09, 2018
10:00 AM PT

Opened:
September 11, 2018
10:00 AM PT
+
DetailsOriginating updateStatusHistory
Guest VMs running Unicast NLB fail to respond after restart
All guest virtual machines running Unicast NLB fail to respond to NLB requests after the virtual machines restart.

Affected platforms:
  • Client: Windows 10, version 1803; Windows 10, version 1507
  • Server: Windows Server, version 1803

Resolution: This issue is resolved in KB4462922.

Back to top
OS Build 10240.17976

September 11, 2018
KB4457132
Resolved
KB4462922
Resolved:
October 09, 2018
10:00 AM PT

Opened:
September 11, 2018
10:00 AM PT
" diff --git a/windows/release-information/resolved-issues-windows-10-1607.yml b/windows/release-information/resolved-issues-windows-10-1607.yml index b0c54bdee0..e02dd2e8ee 100644 --- a/windows/release-information/resolved-issues-windows-10-1607.yml +++ b/windows/release-information/resolved-issues-windows-10-1607.yml @@ -31,23 +31,23 @@ sections: - items: - type: markdown text: " - - - - - - - - - - - - - - - - - +
SummaryOriginating updateStatusDate resolved
End-user-defined characters (EUDC) cause blue screen at startup
If you enable per font end-user-defined characters (EUDC), the system will stop working and a blue screen may appear at startup.

See details >
OS Build 14393.2879

March 19, 2019
KB4489889
Resolved
KB4493470
April 09, 2019
10:00 AM PT
Internet Explorer 11 authentication issue with multiple concurrent logons
Internet Explorer 11 users may encounter issues if two or more people use the same user account for multiple, concurrent login sessions on the same Windows Server machine.

See details >
OS Build 14393.2724

January 08, 2019
KB4480961
Resolved
KB4493470
April 09, 2019
10:00 AM PT
MSXML6 may cause applications to stop responding
MSXML6 may cause applications to stop responding if an exception was thrown during node operations, such as appendChild(), insertBefore(), and moveNode().

See details >
OS Build 14393.2724

January 08, 2019
KB4480961
Resolved
KB4493470
April 09, 2019
10:00 AM PT
Issue hosting multiple terminal server sessions and a user logs off on Windows Server
In some cases, Windows Server will stop working and restart when hosting multiple terminal server sessions and a user logs off.

See details >
OS Build 14393.2828

February 19, 2019
KB4487006
Resolved
KB4489882
March 12, 2019
10:00 AM PT
Error 1309 when installing/uninstalling MSI or MSP files
Users may receive “Error 1309” while installing or uninstalling certain types of MSI and MSP files.

See details >
OS Build 14393.2791

February 12, 2019
KB4487026
Resolved
KB4489882
March 12, 2019
10:00 AM PT
Applications using Microsoft Jet database and Access 95 file format stop working
Applications that use a Microsoft Jet database with the Microsoft Access 95 file format may randomly stop working.

See details >
OS Build 14393.2791

February 12, 2019
KB4487026
Resolved
KB4487006
February 19, 2019
02:00 PM PT
First character of the Japanese era name not recognized as an abbreviation
The first character of the Japanese era name is not recognized as an abbreviation and may cause date parsing issues.

See details >
OS Build 14393.2759

January 17, 2019
KB4480977
Resolved
KB4487006
February 19, 2019
02:00 PM PT
Internet Explorer may fail to load images
Internet Explorer may fail to load images with a backslash (\\) in their relative source path.

See details >
OS Build 14393.2791

February 12, 2019
KB4487026
Resolved
KB4487006
February 19, 2019
02:00 PM PT
Applications using Microsoft Jet database fail to open
Applications that use a Microsoft Jet database with the Microsoft Access 97 file format may fail to open if column names are greater than 32 characters.

See details >
OS Build 14393.2724

January 08, 2019
KB4480961
Resolved
KB4487026
February 12, 2019
10:00 AM PT
Instant search in Microsoft Outlook fails on Windows Server 2016
Instant search in Microsoft Outlook clients fail with the error, \"Outlook cannot perform the search\" on Windows Server 2016.

See details >
OS Build 14393.2639

November 27, 2018
KB4467684
Resolved
KB4487026
February 12, 2019
10:00 AM PT
SqlConnection instantiation exception on .NET 4.6 and later
Instantiation of SqlConnection can throw an exception after certain updates have been installed.

See details >
OS Build 14393.2457

August 30, 2018
KB4343884
Resolved
KB4480977
January 17, 2019
02:00 PM PT
Unable to access hotspots with third-party applications
Third-party applications may have difficulty authenticating hotspots.

See details >
OS Build 14393.2724

January 08, 2019
KB4480961
Resolved
KB4480977
January 17, 2019
02:00 PM PT
System becomes unresponsive when end-user-defined characters (EUDC) are used
When features related to end-user-defined characters (EUDC) are used, the entire system may become unresponsive.

See details >
OS Build 14393.2639

November 27, 2018
KB4467684
Resolved
KB4471321
December 11, 2018
10:00 AM PT
Unable to use Seek bar in Windows Media Player
Users may not be able to use the Seek bar in Windows Media Player when playing specific files.

See details >
OS Build 14393.2551

October 09, 2018
KB4462917
Resolved
KB4471321
December 11, 2018
10:00 AM PT
Issues with install and activation of Key Management Service (KMS) (CSVLK) host keys
Installation and client activation of Windows Server 2019 and 1809 LTSC Key Management Service (KMS) (CSVLK) host keys do not work as expected.

See details >
OS Build 14393.2457

August 30, 2018
KB4343884
Resolved
KB4467684
November 27, 2018
10:00 AM PT
Promotions that create non-root domains fail with optional features enabled
Windows Server 2016 promotions that create non-root domains fail in forests in which optional features like Active Directory recycle have been enabled.

See details >
OS Build 14393.2515

September 20, 2018
KB4457127
Resolved
KB4467684
November 27, 2018
10:00 AM PT
+ + + + + + + + + + + + + + + +
SummaryOriginating updateStatusDate resolved
Applications using Microsoft Jet database and Access 95 file format stop working
Applications that use a Microsoft Jet database with the Microsoft Access 95 file format may randomly stop working.

See details >
OS Build 14393.2791

February 12, 2019
KB4487026
Resolved
KB4487006
February 19, 2019
02:00 PM PT
Applications using Microsoft Jet database fail to open
Applications that use a Microsoft Jet database with the Microsoft Access 97 file format may fail to open if column names are greater than 32 characters.

See details >
OS Build 14393.2724

January 08, 2019
KB4480961
Resolved
KB4487026
February 12, 2019
10:00 AM PT
End-user-defined characters (EUDC) cause blue screen at startup
If you enable per font end-user-defined characters (EUDC), the system will stop working and a blue screen may appear at startup.

See details >
OS Build 14393.2879

March 19, 2019
KB4489889
Resolved
KB4493470
April 09, 2019
10:00 AM PT
First character of the Japanese era name not recognized as an abbreviation
The first character of the Japanese era name is not recognized as an abbreviation and may cause date parsing issues.

See details >
OS Build 14393.2759

January 17, 2019
KB4480977
Resolved
KB4487006
February 19, 2019
02:00 PM PT
Instant search in Microsoft Outlook fails on Windows Server 2016
Instant search in Microsoft Outlook clients fail with the error, \"Outlook cannot perform the search\" on Windows Server 2016.

See details >
OS Build 14393.2639

November 27, 2018
KB4467684
Resolved
KB4487026
February 12, 2019
10:00 AM PT
Internet Explorer 11 authentication issue with multiple concurrent logons
Internet Explorer 11 users may encounter issues if two or more people use the same user account for multiple, concurrent login sessions on the same Windows Server machine.

See details >
OS Build 14393.2724

January 08, 2019
KB4480961
Resolved
KB4493470
April 09, 2019
10:00 AM PT
Internet Explorer may fail to load images
Internet Explorer may fail to load images with a backslash (\\) in their relative source path.

See details >
OS Build 14393.2791

February 12, 2019
KB4487026
Resolved
KB4487006
February 19, 2019
02:00 PM PT
Issue hosting multiple terminal server sessions and a user logs off on Windows Server
In some cases, Windows Server will stop working and restart when hosting multiple terminal server sessions and a user logs off.

See details >
OS Build 14393.2828

February 19, 2019
KB4487006
Resolved
KB4489882
March 12, 2019
10:00 AM PT
Issues with install and activation of Key Management Service (KMS) (CSVLK) host keys
Installation and client activation of Windows Server 2019 and 1809 LTSC Key Management Service (KMS) (CSVLK) host keys do not work as expected.

See details >
OS Build 14393.2457

August 30, 2018
KB4343884
Resolved
KB4467684
November 27, 2018
10:00 AM PT
MSXML6 may cause applications to stop responding
MSXML6 may cause applications to stop responding if an exception was thrown during node operations, such as appendChild(), insertBefore(), and moveNode().

See details >
OS Build 14393.2724

January 08, 2019
KB4480961
Resolved
KB4493470
April 09, 2019
10:00 AM PT
Promotions that create non-root domains fail with optional features enabled
Windows Server 2016 promotions that create non-root domains fail in forests in which optional features like Active Directory recycle have been enabled.

See details >
OS Build 14393.2515

September 20, 2018
KB4457127
Resolved
KB4467684
November 27, 2018
10:00 AM PT
SqlConnection instantiation exception on .NET 4.6 and later
Instantiation of SqlConnection can throw an exception after certain updates have been installed.

See details >
OS Build 14393.2457

August 30, 2018
KB4343884
Resolved
KB4480977
January 17, 2019
02:00 PM PT
System becomes unresponsive when end-user-defined characters (EUDC) are used
When features related to end-user-defined characters (EUDC) are used, the entire system may become unresponsive.

See details >
OS Build 14393.2639

November 27, 2018
KB4467684
Resolved
KB4471321
December 11, 2018
10:00 AM PT
Unable to access hotspots with third-party applications
Third-party applications may have difficulty authenticating hotspots.

See details >
OS Build 14393.2724

January 08, 2019
KB4480961
Resolved
KB4480977
January 17, 2019
02:00 PM PT
Error 1309 when installing/uninstalling MSI or MSP files
Users may receive “Error 1309” while installing or uninstalling certain types of MSI and MSP files.

See details >
OS Build 14393.2791

February 12, 2019
KB4487026
Resolved
KB4489882
March 12, 2019
10:00 AM PT
Unable to use Seek bar in Windows Media Player
Users may not be able to use the Seek bar in Windows Media Player when playing specific files.

See details >
OS Build 14393.2551

October 09, 2018
KB4462917
Resolved
KB4471321
December 11, 2018
10:00 AM PT
" @@ -62,8 +62,8 @@ sections: - items: - type: markdown text: " - - +
DetailsOriginating updateStatusHistory
End-user-defined characters (EUDC) cause blue screen at startup
If you enable per font end-user-defined characters (EUDC), the system will stop working and a blue screen may appear at startup. This is not a common setting in non-Asian regions.

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016

Resolution: This issue was resolved in KB4493470.

Back to top
OS Build 14393.2879

March 19, 2019
KB4489889
Resolved
KB4493470
Resolved:
April 09, 2019
10:00 AM PT

Opened:
March 19, 2019
10:00 AM PT
+
DetailsOriginating updateStatusHistory
End-user-defined characters (EUDC) cause blue screen at startup
If you enable per font end-user-defined characters (EUDC), the system will stop working and a blue screen may appear at startup. This is not a common setting in non-Asian regions.

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016

Resolution: This issue was resolved in KB4493470.

Back to top
OS Build 14393.2879

March 19, 2019
KB4489889
Resolved
KB4493470
Resolved:
April 09, 2019
10:00 AM PT

Opened:
March 19, 2019
10:00 AM PT
" @@ -71,11 +71,11 @@ sections: - items: - type: markdown text: " - - - - - +
DetailsOriginating updateStatusHistory
Issue hosting multiple terminal server sessions and a user logs off on Windows Server
In some cases, Windows Server will stop working and restart when hosting multiple terminal server sessions and a user logs off. The faulting driver is win32kbase.sys.

Affected platforms:
  • Client: Windows 10 Enterprise LTSC 2016
  • Server: Windows Server 2016

Resolution: This issue is resolved in KB4489882.

Back to top
OS Build 14393.2828

February 19, 2019
KB4487006
Resolved
KB4489882
Resolved:
March 12, 2019
10:00 AM PT

Opened:
February 19, 2019
02:00 PM PT
Error 1309 when installing/uninstalling MSI or MSP files
After installing KB4487026, users may receive “Error 1309” while installing or uninstalling certain types of MSI and MSP files.

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 8.1
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2

Resolution: This issue is resolved in KB4489882.

Back to top
OS Build 14393.2791

February 12, 2019
KB4487026
Resolved
KB4489882
Resolved:
March 12, 2019
10:00 AM PT

Opened:
February 12, 2019
10:00 AM PT
Applications using Microsoft Jet database and Access 95 file format stop working
Applications that use a Microsoft Jet database with the Microsoft Access 95 file format may randomly stop working.

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 7, Service Pack 1
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2008 R2 SP1

Resolution: This issue is resolved in KB4487006.

Back to top
OS Build 14393.2791

February 12, 2019
KB4487026
Resolved
KB4487006
Resolved:
February 19, 2019
02:00 PM PT

Opened:
February 12, 2019
10:00 AM PT
Internet Explorer may fail to load images
After installing KB4487026, Internet Explorer may fail to load images with a backslash (\\) in their relative source path.

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 8.1; Windows 7, Service Pack 1
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2; Windows Server 2008 R2 SP1

Resolution: This issue is resolved in KB4487006.

Back to top
OS Build 14393.2791

February 12, 2019
KB4487026
Resolved
KB4487006
Resolved:
February 19, 2019
02:00 PM PT

Opened:
February 12, 2019
10:00 AM PT
+ + + +
DetailsOriginating updateStatusHistory
Applications using Microsoft Jet database and Access 95 file format stop working
Applications that use a Microsoft Jet database with the Microsoft Access 95 file format may randomly stop working.

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 7, Service Pack 1
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2008 R2 SP1

Resolution: This issue is resolved in KB4487006.

Back to top
OS Build 14393.2791

February 12, 2019
KB4487026
Resolved
KB4487006
Resolved:
February 19, 2019
02:00 PM PT

Opened:
February 12, 2019
10:00 AM PT
Internet Explorer may fail to load images
After installing KB4487026, Internet Explorer may fail to load images with a backslash (\\) in their relative source path.

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 8.1; Windows 7, Service Pack 1
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2; Windows Server 2008 R2 SP1

Resolution: This issue is resolved in KB4487006.

Back to top
OS Build 14393.2791

February 12, 2019
KB4487026
Resolved
KB4487006
Resolved:
February 19, 2019
02:00 PM PT

Opened:
February 12, 2019
10:00 AM PT
Issue hosting multiple terminal server sessions and a user logs off on Windows Server
In some cases, Windows Server will stop working and restart when hosting multiple terminal server sessions and a user logs off. The faulting driver is win32kbase.sys.

Affected platforms:
  • Client: Windows 10 Enterprise LTSC 2016
  • Server: Windows Server 2016

Resolution: This issue is resolved in KB4489882.

Back to top
OS Build 14393.2828

February 19, 2019
KB4487006
Resolved
KB4489882
Resolved:
March 12, 2019
10:00 AM PT

Opened:
February 19, 2019
02:00 PM PT
Error 1309 when installing/uninstalling MSI or MSP files
After installing KB4487026, users may receive “Error 1309” while installing or uninstalling certain types of MSI and MSP files.

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 8.1
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2

Resolution: This issue is resolved in KB4489882.

Back to top
OS Build 14393.2791

February 12, 2019
KB4487026
Resolved
KB4489882
Resolved:
March 12, 2019
10:00 AM PT

Opened:
February 12, 2019
10:00 AM PT
" @@ -83,12 +83,12 @@ sections: - items: - type: markdown text: " - - - - - - +
DetailsOriginating updateStatusHistory
Internet Explorer 11 authentication issue with multiple concurrent logons
After installing KB4480961, Internet Explorer 11 and other applications that use WININET.DLL may have authentication issues. This occurs when two or more people use the same user account for multiple, concurrent login sessions on the same Windows Server machine, including Remote Desktop Protocol (RDP) and Terminal Server logons. Symptoms reported by customers include, but may not be limited to:
  • Cache size and location show zero or empty.
  • Keyboard shortcuts may not work properly.
  • Webpages may intermittently fail to load or render correctly.
  • Issues with credential prompts.
  • Issues when downloading files.

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10 Enterprise LTSC 2016; Windows 8.1; Windows 7, Service Pack 1
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server 2016; Windows Server 2012 R2; Windows Server 2008 R2 SP1

Resolution: This issue was resolved in KB4493470.

Back to top
OS Build 14393.2724

January 08, 2019
KB4480961
Resolved
KB4493470
Resolved:
April 09, 2019
10:00 AM PT

Opened:
January 08, 2019
10:00 AM PT
MSXML6 may cause applications to stop responding
After installing KB4480961, MSXML6 causes applications to stop responding if an exception was thrown during node operations, such as appendChild(), insertBefore(), and moveNode().

The Group Policy editor may stop responding when editing a Group Policy Object (GPO) that contains Group Policy Preferences (GPP) for Internet Explorer 10 settings.

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 8.1
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2

Resolution: This issue was resolved in KB4493470.

Back to top
OS Build 14393.2724

January 08, 2019
KB4480961
Resolved
KB4493470
Resolved:
April 09, 2019
10:00 AM PT

Opened:
January 08, 2019
10:00 AM PT
First character of the Japanese era name not recognized as an abbreviation
After installing KB4480977, the first character of the Japanese era name is not recognized as an abbreviation and may cause date parsing issues.

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 8.1; Windows 7, Service Pack 1
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2; Windows Server 2008 R2 SP1

Resolution: This issue is resolved in KB4487006.

Back to top
OS Build 14393.2759

January 17, 2019
KB4480977
Resolved
KB4487006
Resolved:
February 19, 2019
02:00 PM PT

Opened:
January 17, 2019
02:00 PM PT
Applications using Microsoft Jet database fail to open
Applications that use a Microsoft Jet database with the Microsoft Access 97 file format may fail to open if the database has column names greater than 32 characters. The database will fail to open with the error, “Unrecognized Database Format”.

Affected platforms:
  • Client: Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 8.1; Windows 7, Service Pack 1 
  • Server: Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2; Windows Server 2008 R2 SP1 

Resolution: This issue is resolved in KB4487026.

Back to top
OS Build 14393.2724

January 08, 2019
KB4480961
Resolved
KB4487026
Resolved:
February 12, 2019
10:00 AM PT

Opened:
January 08, 2019
10:00 AM PT
Unable to access hotspots with third-party applications
After installing KB4480961, third-party applications may have difficulty authenticating hotspots.

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 8.1
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2

Resolution: This issue is resolved in KB4480977.

Back to top
OS Build 14393.2724

January 08, 2019
KB4480961
Resolved
KB4480977
Resolved:
January 17, 2019
02:00 PM PT

Opened:
January 08, 2019
10:00 AM PT
+ + + + +
DetailsOriginating updateStatusHistory
Applications using Microsoft Jet database fail to open
Applications that use a Microsoft Jet database with the Microsoft Access 97 file format may fail to open if the database has column names greater than 32 characters. The database will fail to open with the error, “Unrecognized Database Format”.

Affected platforms:
  • Client: Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 8.1; Windows 7, Service Pack 1 
  • Server: Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2; Windows Server 2008 R2 SP1 

Resolution: This issue is resolved in KB4487026.

Back to top
OS Build 14393.2724

January 08, 2019
KB4480961
Resolved
KB4487026
Resolved:
February 12, 2019
10:00 AM PT

Opened:
January 08, 2019
10:00 AM PT
First character of the Japanese era name not recognized as an abbreviation
After installing KB4480977, the first character of the Japanese era name is not recognized as an abbreviation and may cause date parsing issues.

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 8.1; Windows 7, Service Pack 1
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2; Windows Server 2008 R2 SP1

Resolution: This issue is resolved in KB4487006.

Back to top
OS Build 14393.2759

January 17, 2019
KB4480977
Resolved
KB4487006
Resolved:
February 19, 2019
02:00 PM PT

Opened:
January 17, 2019
02:00 PM PT
Internet Explorer 11 authentication issue with multiple concurrent logons
After installing KB4480961, Internet Explorer 11 and other applications that use WININET.DLL may have authentication issues. This occurs when two or more people use the same user account for multiple, concurrent login sessions on the same Windows Server machine, including Remote Desktop Protocol (RDP) and Terminal Server logons. Symptoms reported by customers include, but may not be limited to:
  • Cache size and location show zero or empty.
  • Keyboard shortcuts may not work properly.
  • Webpages may intermittently fail to load or render correctly.
  • Issues with credential prompts.
  • Issues when downloading files.

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10 Enterprise LTSC 2016; Windows 8.1; Windows 7, Service Pack 1
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server 2016; Windows Server 2012 R2; Windows Server 2008 R2 SP1

Resolution: This issue was resolved in KB4493470.

Back to top
OS Build 14393.2724

January 08, 2019
KB4480961
Resolved
KB4493470
Resolved:
April 09, 2019
10:00 AM PT

Opened:
January 08, 2019
10:00 AM PT
MSXML6 may cause applications to stop responding
After installing KB4480961, MSXML6 causes applications to stop responding if an exception was thrown during node operations, such as appendChild(), insertBefore(), and moveNode().

The Group Policy editor may stop responding when editing a Group Policy Object (GPO) that contains Group Policy Preferences (GPP) for Internet Explorer 10 settings.

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 8.1
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2

Resolution: This issue was resolved in KB4493470.

Back to top
OS Build 14393.2724

January 08, 2019
KB4480961
Resolved
KB4493470
Resolved:
April 09, 2019
10:00 AM PT

Opened:
January 08, 2019
10:00 AM PT
Unable to access hotspots with third-party applications
After installing KB4480961, third-party applications may have difficulty authenticating hotspots.

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 8.1
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2

Resolution: This issue is resolved in KB4480977.

Back to top
OS Build 14393.2724

January 08, 2019
KB4480961
Resolved
KB4480977
Resolved:
January 17, 2019
02:00 PM PT

Opened:
January 08, 2019
10:00 AM PT
" @@ -96,9 +96,9 @@ sections: - items: - type: markdown text: " - - - +
DetailsOriginating updateStatusHistory
Instant search in Microsoft Outlook fails on Windows Server 2016
After installing KB4467684 on Windows Server 2016, instant search in Microsoft Outlook clients fail with the error, \"Outlook cannot perform the search\".

Affected platforms:
  • Client: Windows 10 Enterprise LTSC 2016
  • Server: Windows Server 2016

Resolution: This issue is resolved in KB4487026.

Back to top
OS Build 14393.2639

November 27, 2018
KB4467684
Resolved
KB4487026
Resolved:
February 12, 2019
10:00 AM PT

Opened:
November 27, 2018
10:00 AM PT
System becomes unresponsive when end-user-defined characters (EUDC) are used
When features related to end-user-defined characters (EUDC) are used, the entire system may become unresponsive. 

Affected platforms:
  • Client: Windows 10 Enterprise LTSC 2016
  • Server: Windows Server 2016
 
Resolution: This issue is resolved in KB4471321

Back to top
OS Build 14393.2639

November 27, 2018
KB4467684
Resolved
KB4471321
Resolved:
December 11, 2018
10:00 AM PT

Opened:
November 27, 2018
10:00 AM PT
+ +
DetailsOriginating updateStatusHistory
Instant search in Microsoft Outlook fails on Windows Server 2016
After installing KB4467684 on Windows Server 2016, instant search in Microsoft Outlook clients fail with the error, \"Outlook cannot perform the search\".

Affected platforms:
  • Client: Windows 10 Enterprise LTSC 2016
  • Server: Windows Server 2016

Resolution: This issue is resolved in KB4487026.

Back to top
OS Build 14393.2639

November 27, 2018
KB4467684
Resolved
KB4487026
Resolved:
February 12, 2019
10:00 AM PT

Opened:
November 27, 2018
10:00 AM PT
System becomes unresponsive when end-user-defined characters (EUDC) are used
When features related to end-user-defined characters (EUDC) are used, the entire system may become unresponsive. 

Affected platforms:
  • Client: Windows 10 Enterprise LTSC 2016
  • Server: Windows Server 2016
 
Resolution: This issue is resolved in KB4471321

Back to top
OS Build 14393.2639

November 27, 2018
KB4467684
Resolved
KB4471321
Resolved:
December 11, 2018
10:00 AM PT

Opened:
November 27, 2018
10:00 AM PT
" @@ -106,8 +106,8 @@ sections: - items: - type: markdown text: " - - +
DetailsOriginating updateStatusHistory
Unable to use Seek bar in Windows Media Player
After installing KB4462917, users may not be able to use the Seek Bar in Windows Media Player when playing specific files. This issue does not affect normal playback.

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 8.1; Windows 7, Service Pack 1
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2; Windows Server 2008 R2 SP1

Resolution: This issue is resolved in KB4471321.

Back to top
OS Build 14393.2551

October 09, 2018
KB4462917
Resolved
KB4471321
Resolved:
December 11, 2018
10:00 AM PT

Opened:
October 09, 2018
10:00 AM PT
+
DetailsOriginating updateStatusHistory
Unable to use Seek bar in Windows Media Player
After installing KB4462917, users may not be able to use the Seek Bar in Windows Media Player when playing specific files. This issue does not affect normal playback.

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 8.1; Windows 7, Service Pack 1
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2; Windows Server 2008 R2 SP1

Resolution: This issue is resolved in KB4471321.

Back to top
OS Build 14393.2551

October 09, 2018
KB4462917
Resolved
KB4471321
Resolved:
December 11, 2018
10:00 AM PT

Opened:
October 09, 2018
10:00 AM PT
" @@ -115,8 +115,8 @@ sections: - items: - type: markdown text: " - - +
DetailsOriginating updateStatusHistory
Promotions that create non-root domains fail with optional features enabled
After installing KB4457127, Windows Server 2016 promotions that create non-root domains fail in forests in which optional features like Active Directory recycle have been enabled. The error is, “The replication operation encountered a database error.”

Affected platforms:
  • Client: Windows 10 Enterprise LTSC 2016
  • Server: Windows Server 2016

Resolution: This issue is resolved in KB4467684.

Back to top
OS Build 14393.2515

September 20, 2018
KB4457127
Resolved
KB4467684
Resolved:
November 27, 2018
10:00 AM PT

Opened:
September 20, 2018
10:00 AM PT
+
DetailsOriginating updateStatusHistory
Promotions that create non-root domains fail with optional features enabled
After installing KB4457127, Windows Server 2016 promotions that create non-root domains fail in forests in which optional features like Active Directory recycle have been enabled. The error is, “The replication operation encountered a database error.”

Affected platforms:
  • Client: Windows 10 Enterprise LTSC 2016
  • Server: Windows Server 2016

Resolution: This issue is resolved in KB4467684.

Back to top
OS Build 14393.2515

September 20, 2018
KB4457127
Resolved
KB4467684
Resolved:
November 27, 2018
10:00 AM PT

Opened:
September 20, 2018
10:00 AM PT
" @@ -124,8 +124,8 @@ sections: - items: - type: markdown text: " - - - +
DetailsOriginating updateStatusHistory
SqlConnection instantiation exception on .NET 4.6 and later
After you install the August Preview of Quality Rollup or September 11, 2018 .NET Framework update, instantiation of SqlConnection can throw an exception.

For more information about this issue, see the following article in the Microsoft Knowledge Base: 4470809, SqlConnection instantiation exception on .NET 4.6 and later after August-September 2018 .NET Framework updates.

Affected platforms:
  • Client: Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016
  • Server: Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016

Resolution: This issue is resolved in KB4480977.

Back to top
OS Build 14393.2457

August 30, 2018
KB4343884
Resolved
KB4480977
Resolved:
January 17, 2019
02:00 PM PT

Opened:
August 30, 2018
05:00 PM PT
Issues with install and activation of Key Management Service (KMS) (CSVLK) host keys
After installing KB4343884, installation and client activation of Windows Server 2019 and Windows 10 Enterprise 2019 LTSC Key Management Service (KMS) CSVLK host keys do not work as expected.

Affected platforms:
  • Client: Windows 10 Enterprise LTSC 2016
  • Server: Windows Server 2016

Resolution: This issue is resolved in KB4467684.

Back to top
OS Build 14393.2457

August 30, 2018
KB4343884
Resolved
KB4467684
Resolved:
November 27, 2018
10:00 AM PT

Opened:
August 30, 2018
05:00 PM PT
+ +
DetailsOriginating updateStatusHistory
Issues with install and activation of Key Management Service (KMS) (CSVLK) host keys
After installing KB4343884, installation and client activation of Windows Server 2019 and Windows 10 Enterprise 2019 LTSC Key Management Service (KMS) CSVLK host keys do not work as expected.

Affected platforms:
  • Client: Windows 10 Enterprise LTSC 2016
  • Server: Windows Server 2016

Resolution: This issue is resolved in KB4467684.

Back to top
OS Build 14393.2457

August 30, 2018
KB4343884
Resolved
KB4467684
Resolved:
November 27, 2018
10:00 AM PT

Opened:
August 30, 2018
05:00 PM PT
SqlConnection instantiation exception on .NET 4.6 and later
After you install the August Preview of Quality Rollup or September 11, 2018 .NET Framework update, instantiation of SqlConnection can throw an exception.

For more information about this issue, see the following article in the Microsoft Knowledge Base: 4470809, SqlConnection instantiation exception on .NET 4.6 and later after August-September 2018 .NET Framework updates.

Affected platforms:
  • Client: Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016
  • Server: Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016

Resolution: This issue is resolved in KB4480977.

Back to top
OS Build 14393.2457

August 30, 2018
KB4343884
Resolved
KB4480977
Resolved:
January 17, 2019
02:00 PM PT

Opened:
August 30, 2018
05:00 PM PT
" diff --git a/windows/release-information/resolved-issues-windows-10-1703.yml b/windows/release-information/resolved-issues-windows-10-1703.yml index 05831e7123..efa136c4a0 100644 --- a/windows/release-information/resolved-issues-windows-10-1703.yml +++ b/windows/release-information/resolved-issues-windows-10-1703.yml @@ -31,20 +31,20 @@ sections: - items: - type: markdown text: " - - - - - - - - - - - - - - +
SummaryOriginating updateStatusDate resolved
End-user-defined characters (EUDC) may cause blue screen at startup
If you enable per font end-user-defined characters (EUDC), the system may stop working and a blue screen may appear at startup.

See details >
OS Build 15063.1716

March 19, 2019
KB4489888
Resolved
KB4493474
April 09, 2019
10:00 AM PT
MSXML6 may cause applications to stop responding
MSXML6 may cause applications to stop responding if an exception was thrown during node operations, such as appendChild(), insertBefore(), and moveNode().

See details >
OS Build 15063.1563

January 08, 2019
KB4480973
Resolved
KB4493474
April 09, 2019
10:00 AM PT
Error 1309 when installing/uninstalling MSI or MSP files
Users may receive “Error 1309” while installing or uninstalling certain types of MSI and MSP files.

See details >
OS Build 15063.1659

February 19, 2019
KB4487011
Resolved
KB4489871
March 12, 2019
10:00 AM PT
First character of the Japanese era name not recognized as an abbreviation
The first character of the Japanese era name is not recognized as an abbreviation and may cause date parsing issues.

See details >
OS Build 15063.1596

January 15, 2019
KB4480959
Resolved
KB4487011
February 19, 2019
02:00 PM PT
Internet Explorer may fail to load images
Internet Explorer may fail to load images with a backslash (\\) in their relative source path.

See details >
OS Build 15063.1631

February 12, 2019
KB4487020
Resolved
KB4487011
February 19, 2019
02:00 PM PT
Applications using Microsoft Jet database and Access 95 file format stop working
Applications that use a Microsoft Jet database with the Microsoft Access 95 file format may randomly stop working.

See details >
OS Build 15063.1631

February 12, 2019
KB4487020
Resolved
KB4487011
February 19, 2019
10:00 AM PT
Applications using Microsoft Jet database fail to open
Applications that use a Microsoft Jet database with the Microsoft Access 97 file format may fail to open if column names are greater than 32 characters.

See details >
OS Build 15063.1563

January 08, 2019
KB4480973
Resolved
KB4487020
February 12, 2019
10:00 AM PT
Webpages become unresponsive in Microsoft Edge
Microsoft Edge users report difficulty browsing and loading webpages.

See details >
OS Build 15063.1563

January 08, 2019
KB4480973
Resolved
KB4487020
February 12, 2019
10:00 AM PT
SqlConnection instantiation exception on .NET 4.6 and later
Instantiation of SqlConnection can throw an exception after certain updates have been installed.

See details >
OS Build 15063.1292

August 30, 2018
KB4343889
Resolved
KB4480959
January 15, 2019
10:00 AM PT
Unable to access hotspots with third-party applications
Third-party applications may have difficulty authenticating hotspots.

See details >
OS Build 15063.1563

January 08, 2019
KB4480973
Resolved
KB4480959
January 15, 2019
10:00 AM PT
Unable to use Seek bar in Windows Media Player
Users may not be able to use the Seek bar in Windows Media Player when playing specific files.

See details >
OS Build 15063.1387

October 09, 2018
KB4462937
Resolved
KB4471327
December 11, 2018
10:00 AM PT
LongonUI.exe stops working intermittently
LongonUI.exe stops working intermittently.

See details >
OS Build 15063.1387

October 09, 2018
KB4462937
Resolved
KB4467699
November 27, 2018
10:00 AM PT
Error message beginning with “Hosted by…” when launching Microsoft Edge
Some users may encounter an error message beginning with “Hosted by…” when launching Microsoft Edge.

See details >
OS Build 15063.1387

October 09, 2018
KB4462937
Resolved
KB4462939
October 18, 2018
10:00 AM PT
+ + + + + + + + + + + + +
SummaryOriginating updateStatusDate resolved
Applications using Microsoft Jet database and Access 95 file format stop working
Applications that use a Microsoft Jet database with the Microsoft Access 95 file format may randomly stop working.

See details >
OS Build 15063.1631

February 12, 2019
KB4487020
Resolved
KB4487011
February 19, 2019
10:00 AM PT
Applications using Microsoft Jet database fail to open
Applications that use a Microsoft Jet database with the Microsoft Access 97 file format may fail to open if column names are greater than 32 characters.

See details >
OS Build 15063.1563

January 08, 2019
KB4480973
Resolved
KB4487020
February 12, 2019
10:00 AM PT
End-user-defined characters (EUDC) may cause blue screen at startup
If you enable per font end-user-defined characters (EUDC), the system may stop working and a blue screen may appear at startup.

See details >
OS Build 15063.1716

March 19, 2019
KB4489888
Resolved
KB4493474
April 09, 2019
10:00 AM PT
Error 1309 when installing/uninstalling MSI or MSP files
Users may receive “Error 1309” while installing or uninstalling certain types of MSI and MSP files.

See details >
OS Build 15063.1659

February 19, 2019
KB4487011
Resolved
KB4489871
March 12, 2019
10:00 AM PT
Error message beginning with “Hosted by…” when launching Microsoft Edge
Some users may encounter an error message beginning with “Hosted by…” when launching Microsoft Edge.

See details >
OS Build 15063.1387

October 09, 2018
KB4462937
Resolved
KB4462939
October 18, 2018
10:00 AM PT
First character of the Japanese era name not recognized as an abbreviation
The first character of the Japanese era name is not recognized as an abbreviation and may cause date parsing issues.

See details >
OS Build 15063.1596

January 15, 2019
KB4480959
Resolved
KB4487011
February 19, 2019
02:00 PM PT
Internet Explorer may fail to load images
Internet Explorer may fail to load images with a backslash (\\) in their relative source path.

See details >
OS Build 15063.1631

February 12, 2019
KB4487020
Resolved
KB4487011
February 19, 2019
02:00 PM PT
LongonUI.exe stops working intermittently
LongonUI.exe stops working intermittently.

See details >
OS Build 15063.1387

October 09, 2018
KB4462937
Resolved
KB4467699
November 27, 2018
10:00 AM PT
MSXML6 may cause applications to stop responding
MSXML6 may cause applications to stop responding if an exception was thrown during node operations, such as appendChild(), insertBefore(), and moveNode().

See details >
OS Build 15063.1563

January 08, 2019
KB4480973
Resolved
KB4493474
April 09, 2019
10:00 AM PT
SqlConnection instantiation exception on .NET 4.6 and later
Instantiation of SqlConnection can throw an exception after certain updates have been installed.

See details >
OS Build 15063.1292

August 30, 2018
KB4343889
Resolved
KB4480959
January 15, 2019
10:00 AM PT
Unable to access hotspots with third-party applications
Third-party applications may have difficulty authenticating hotspots.

See details >
OS Build 15063.1563

January 08, 2019
KB4480973
Resolved
KB4480959
January 15, 2019
10:00 AM PT
Unable to use Seek bar in Windows Media Player
Users may not be able to use the Seek bar in Windows Media Player when playing specific files.

See details >
OS Build 15063.1387

October 09, 2018
KB4462937
Resolved
KB4471327
December 11, 2018
10:00 AM PT
Webpages become unresponsive in Microsoft Edge
Microsoft Edge users report difficulty browsing and loading webpages.

See details >
OS Build 15063.1563

January 08, 2019
KB4480973
Resolved
KB4487020
February 12, 2019
10:00 AM PT
" @@ -59,8 +59,8 @@ sections: - items: - type: markdown text: " - - +
DetailsOriginating updateStatusHistory
End-user-defined characters (EUDC) may cause blue screen at startup
If you enable per font end-user-defined characters (EUDC), the system may stop working and a blue screen may appear at startup. This is not a common setting in non-Asian regions.

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016

Resolution: This issue was resolved in KB4493474.

Back to top
OS Build 15063.1716

March 19, 2019
KB4489888
Resolved
KB4493474
Resolved:
April 09, 2019
10:00 AM PT

Opened:
March 19, 2019
10:00 AM PT
+
DetailsOriginating updateStatusHistory
End-user-defined characters (EUDC) may cause blue screen at startup
If you enable per font end-user-defined characters (EUDC), the system may stop working and a blue screen may appear at startup. This is not a common setting in non-Asian regions.

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016

Resolution: This issue was resolved in KB4493474.

Back to top
OS Build 15063.1716

March 19, 2019
KB4489888
Resolved
KB4493474
Resolved:
April 09, 2019
10:00 AM PT

Opened:
March 19, 2019
10:00 AM PT
" @@ -68,10 +68,10 @@ sections: - items: - type: markdown text: " - - - - +
DetailsOriginating updateStatusHistory
Error 1309 when installing/uninstalling MSI or MSP files
After installing KB4487011, users may receive “Error 1309” while installing or uninstalling certain types of MSI and MSP files.

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 8.1
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2

Resolution: This issue is resolved in KB4489871.

Back to top
OS Build 15063.1659

February 19, 2019
KB4487011
Resolved
KB4489871
Resolved:
March 12, 2019
10:00 AM PT

Opened:
February 19, 2019
02:00 PM PT
Internet Explorer may fail to load images
After installing KB4487020, Internet Explorer may fail to load images with a backslash (\\) in their relative source path.

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 8.1; Windows 7, Service Pack 1
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2; Windows Server 2008 R2 SP1

Resolution: This issue is resolved in KB4487011.

Back to top
OS Build 15063.1631

February 12, 2019
KB4487020
Resolved
KB4487011
Resolved:
February 19, 2019
02:00 PM PT

Opened:
February 12, 2019
10:00 AM PT
Applications using Microsoft Jet database and Access 95 file format stop working
Applications that use a Microsoft Jet database with the Microsoft Access 95 file format may randomly stop working.

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 7, Service Pack 1
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2008 R2 SP1

Resolution: This issue is resolved in KB4487011.

Back to top
OS Build 15063.1631

February 12, 2019
KB4487020
Resolved
KB4487011
Resolved:
February 19, 2019
02:00 PM PT

Opened:
February 12, 2019
10:00 AM PT
+ + +
DetailsOriginating updateStatusHistory
Applications using Microsoft Jet database and Access 95 file format stop working
Applications that use a Microsoft Jet database with the Microsoft Access 95 file format may randomly stop working.

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 7, Service Pack 1
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2008 R2 SP1

Resolution: This issue is resolved in KB4487011.

Back to top
OS Build 15063.1631

February 12, 2019
KB4487020
Resolved
KB4487011
Resolved:
February 19, 2019
02:00 PM PT

Opened:
February 12, 2019
10:00 AM PT
Error 1309 when installing/uninstalling MSI or MSP files
After installing KB4487011, users may receive “Error 1309” while installing or uninstalling certain types of MSI and MSP files.

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 8.1
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2

Resolution: This issue is resolved in KB4489871.

Back to top
OS Build 15063.1659

February 19, 2019
KB4487011
Resolved
KB4489871
Resolved:
March 12, 2019
10:00 AM PT

Opened:
February 19, 2019
02:00 PM PT
Internet Explorer may fail to load images
After installing KB4487020, Internet Explorer may fail to load images with a backslash (\\) in their relative source path.

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 8.1; Windows 7, Service Pack 1
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2; Windows Server 2008 R2 SP1

Resolution: This issue is resolved in KB4487011.

Back to top
OS Build 15063.1631

February 12, 2019
KB4487020
Resolved
KB4487011
Resolved:
February 19, 2019
02:00 PM PT

Opened:
February 12, 2019
10:00 AM PT
" @@ -79,12 +79,12 @@ sections: - items: - type: markdown text: " - - - - - - +
DetailsOriginating updateStatusHistory
MSXML6 may cause applications to stop responding
After installing KB4480973, MSXML6 causes applications to stop responding if an exception was thrown during node operations, such as appendChild(), insertBefore(), and moveNode().

The Group Policy editor may stop responding when editing a Group Policy Object (GPO) that contains Group Policy Preferences (GPP) for Internet Explorer 10 settings.

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 8.1
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2

Resolution: This issue was resolved in KB4493474.

Back to top
OS Build 15063.1563

January 08, 2019
KB4480973
Resolved
KB4493474
Resolved:
April 09, 2019
10:00 AM PT

Opened:
January 08, 2019
10:00 AM PT
First character of the Japanese era name not recognized as an abbreviation
After installing KB4480959, the first character of the Japanese era name is not recognized as an abbreviation and may cause date parsing issues.

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 8.1; Windows 7, Service Pack 1
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2; Windows Server 2008 R2 SP1

Resolution: This issue is resolved in KB4487011.

Back to top
OS Build 15063.1596

January 15, 2019
KB4480959
Resolved
KB4487011
Resolved:
February 19, 2019
02:00 PM PT

Opened:
January 15, 2019
10:00 AM PT
Applications using Microsoft Jet database fail to open
Applications that use a Microsoft Jet database with the Microsoft Access 97 file format may fail to open if the database has column names greater than 32 characters. The database will fail to open with the error, “Unrecognized Database Format”.

Affected platforms:
  • Client: Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 8.1; Windows 7, Service Pack 1 
  • Server: Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2; Windows Server 2008 R2 SP1

Resolution: This issue is resolved in KB4487020.

Back to top
OS Build 15063.1563

January 08, 2019
KB4480973
Resolved
KB4487020
Resolved:
February 12, 2019
10:00 AM PT

Opened:
January 08, 2019
10:00 AM PT
Webpages become unresponsive in Microsoft Edge
After installing KB4480973, some Microsoft Edge users report that they:
  • Cannot load webpages using a local IP address.
  • Cannot load webpages on the Internet using a VPN connection.
Browsing fails or the webpage may become unresponsive.

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709

Resolution: This issue is resolved in KB4487020.

Back to top
OS Build 15063.1563

January 08, 2019
KB4480973
Resolved
KB4487020
Resolved:
February 12, 2019
10:00 AM PT

Opened:
January 08, 2019
10:00 AM PT
Unable to access hotspots with third-party applications
After installing KB4480973, third-party applications may have difficulty authenticating hotspots.

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 8.1
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2

Resolution: This issue is resolved in KB4480959.

Back to top
OS Build 15063.1563

January 08, 2019
KB4480973
Resolved
KB4480959
Resolved:
January 15, 2019
10:00 AM PT

Opened:
January 08, 2019
10:00 AM PT
+ + + + +
DetailsOriginating updateStatusHistory
Applications using Microsoft Jet database fail to open
Applications that use a Microsoft Jet database with the Microsoft Access 97 file format may fail to open if the database has column names greater than 32 characters. The database will fail to open with the error, “Unrecognized Database Format”.

Affected platforms:
  • Client: Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 8.1; Windows 7, Service Pack 1 
  • Server: Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2; Windows Server 2008 R2 SP1

Resolution: This issue is resolved in KB4487020.

Back to top
OS Build 15063.1563

January 08, 2019
KB4480973
Resolved
KB4487020
Resolved:
February 12, 2019
10:00 AM PT

Opened:
January 08, 2019
10:00 AM PT
First character of the Japanese era name not recognized as an abbreviation
After installing KB4480959, the first character of the Japanese era name is not recognized as an abbreviation and may cause date parsing issues.

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 8.1; Windows 7, Service Pack 1
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2; Windows Server 2008 R2 SP1

Resolution: This issue is resolved in KB4487011.

Back to top
OS Build 15063.1596

January 15, 2019
KB4480959
Resolved
KB4487011
Resolved:
February 19, 2019
02:00 PM PT

Opened:
January 15, 2019
10:00 AM PT
MSXML6 may cause applications to stop responding
After installing KB4480973, MSXML6 causes applications to stop responding if an exception was thrown during node operations, such as appendChild(), insertBefore(), and moveNode().

The Group Policy editor may stop responding when editing a Group Policy Object (GPO) that contains Group Policy Preferences (GPP) for Internet Explorer 10 settings.

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 8.1
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2

Resolution: This issue was resolved in KB4493474.

Back to top
OS Build 15063.1563

January 08, 2019
KB4480973
Resolved
KB4493474
Resolved:
April 09, 2019
10:00 AM PT

Opened:
January 08, 2019
10:00 AM PT
Unable to access hotspots with third-party applications
After installing KB4480973, third-party applications may have difficulty authenticating hotspots.

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 8.1
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2

Resolution: This issue is resolved in KB4480959.

Back to top
OS Build 15063.1563

January 08, 2019
KB4480973
Resolved
KB4480959
Resolved:
January 15, 2019
10:00 AM PT

Opened:
January 08, 2019
10:00 AM PT
Webpages become unresponsive in Microsoft Edge
After installing KB4480973, some Microsoft Edge users report that they:
  • Cannot load webpages using a local IP address.
  • Cannot load webpages on the Internet using a VPN connection.
Browsing fails or the webpage may become unresponsive.

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709

Resolution: This issue is resolved in KB4487020.

Back to top
OS Build 15063.1563

January 08, 2019
KB4480973
Resolved
KB4487020
Resolved:
February 12, 2019
10:00 AM PT

Opened:
January 08, 2019
10:00 AM PT
" @@ -92,10 +92,10 @@ sections: - items: - type: markdown text: " - - - - +
DetailsOriginating updateStatusHistory
Unable to use Seek bar in Windows Media Player
After installing KB4462937, users may not be able to use the Seek Bar in Windows Media Player when playing specific files. This issue does not affect normal playback.

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 8.1; Windows 7, Service Pack 1
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2; Windows Server 2008 R2 SP1

Resolution: This issue is resolved in KB4471327.

Back to top
OS Build 15063.1387

October 09, 2018
KB4462937
Resolved
KB4471327
Resolved:
December 11, 2018
10:00 AM PT

Opened:
October 09, 2018
10:00 AM PT
LongonUI.exe stops working intermittently
After installing KB4462937, LogonUI.exe stops working intermittently.

Affected platforms:
  • Windows 10, version 1703

Resolution: This issue is resolved in KB4467699.

Back to top
OS Build 15063.1387

October 09, 2018
KB4462937
Resolved
KB4467699
Resolved:
November 27, 2018
10:00 AM PT

Opened:
October 09, 2018
10:00 AM PT
Error message beginning with “Hosted by…” when launching Microsoft Edge
After installing KB4462937, some users may see a dialog box with a non-applicable message beginning with the words “Hosted by...” when first starting Microsoft Edge.

This dialog will only appear once if they have turned on “Block only third-party cookies” in Microsoft Edge and applied certain language packs before installing this update.

Affected platforms:
  • Client: Windows 10, version 1709; Windows 10, version 1703
  • Server: Windows Server, version 1709

Resolution: This issue is resolved in KB4462939.

Back to top
OS Build 15063.1387

October 09, 2018
KB4462937
Resolved
KB4462939
Resolved:
October 18, 2018
10:00 AM PT

Opened:
October 09, 2018
10:00 AM PT
+ + +
DetailsOriginating updateStatusHistory
Error message beginning with “Hosted by…” when launching Microsoft Edge
After installing KB4462937, some users may see a dialog box with a non-applicable message beginning with the words “Hosted by...” when first starting Microsoft Edge.

This dialog will only appear once if they have turned on “Block only third-party cookies” in Microsoft Edge and applied certain language packs before installing this update.

Affected platforms:
  • Client: Windows 10, version 1709; Windows 10, version 1703
  • Server: Windows Server, version 1709

Resolution: This issue is resolved in KB4462939.

Back to top
OS Build 15063.1387

October 09, 2018
KB4462937
Resolved
KB4462939
Resolved:
October 18, 2018
10:00 AM PT

Opened:
October 09, 2018
10:00 AM PT
LongonUI.exe stops working intermittently
After installing KB4462937, LogonUI.exe stops working intermittently.

Affected platforms:
  • Windows 10, version 1703

Resolution: This issue is resolved in KB4467699.

Back to top
OS Build 15063.1387

October 09, 2018
KB4462937
Resolved
KB4467699
Resolved:
November 27, 2018
10:00 AM PT

Opened:
October 09, 2018
10:00 AM PT
Unable to use Seek bar in Windows Media Player
After installing KB4462937, users may not be able to use the Seek Bar in Windows Media Player when playing specific files. This issue does not affect normal playback.

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 8.1; Windows 7, Service Pack 1
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2; Windows Server 2008 R2 SP1

Resolution: This issue is resolved in KB4471327.

Back to top
OS Build 15063.1387

October 09, 2018
KB4462937
Resolved
KB4471327
Resolved:
December 11, 2018
10:00 AM PT

Opened:
October 09, 2018
10:00 AM PT
" @@ -103,7 +103,7 @@ sections: - items: - type: markdown text: " - - +
DetailsOriginating updateStatusHistory
SqlConnection instantiation exception on .NET 4.6 and later
After you install the August Preview of Quality Rollup or September 11, 2018 .NET Framework update, instantiation of SqlConnection can throw an exception.

For more information about this issue, see the following article in the Microsoft Knowledge Base:
4470809 SqlConnection instantiation exception on .NET 4.6 and later after August-September 2018 .NET Framework updates.

Affected platforms:
  • Client: Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016
  • Server: Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016

Resolution: This issue is resolved in KB4480959.

Back to top
OS Build 15063.1292

August 30, 2018
KB4343889
Resolved
KB4480959
Resolved:
January 15, 2019
10:00 AM PT

Opened:
August 30, 2018
05:00 PM PT
+
DetailsOriginating updateStatusHistory
SqlConnection instantiation exception on .NET 4.6 and later
After you install the August Preview of Quality Rollup or September 11, 2018 .NET Framework update, instantiation of SqlConnection can throw an exception.

For more information about this issue, see the following article in the Microsoft Knowledge Base:
4470809 SqlConnection instantiation exception on .NET 4.6 and later after August-September 2018 .NET Framework updates.

Affected platforms:
  • Client: Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016
  • Server: Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016

Resolution: This issue is resolved in KB4480959.

Back to top
OS Build 15063.1292

August 30, 2018
KB4343889
Resolved
KB4480959
Resolved:
January 15, 2019
10:00 AM PT

Opened:
August 30, 2018
05:00 PM PT
" diff --git a/windows/release-information/resolved-issues-windows-10-1709.yml b/windows/release-information/resolved-issues-windows-10-1709.yml index 93ff2b61dc..25a903edb5 100644 --- a/windows/release-information/resolved-issues-windows-10-1709.yml +++ b/windows/release-information/resolved-issues-windows-10-1709.yml @@ -31,20 +31,20 @@ sections: - items: - type: markdown text: " - - - - - - - - - - - - - - +
SummaryOriginating updateStatusDate resolved
End-user-defined characters (EUDC) may cause blue screen at startup
If you enable per font end-user-defined characters (EUDC), the system may stop working and a blue screen may appear at startup.

See details >
OS Build 16299.1059

March 19, 2019
KB4489890
Resolved
KB4493441
April 09, 2019
10:00 AM PT
MSXML6 causes applications to stop responding if an exception was thrown
MSXML6 causes applications to stop responding if an exception was thrown during node operations, such as appendChild(), insertBefore(), and moveNode().

See details >
OS Build 16299.904

January 08, 2019
KB4480978
Resolved
KB4493441
April 09, 2019
10:00 AM PT
Stop error when attempting to start SSH from WSL
A stop error occurs when attempting to start the Secure Shell client program from Windows Subsystem for Linux with agent forwarding enabled using a command line switch (ssh –A) or

See details >
OS Build 16299.1029

March 12, 2019
KB4489886
Resolved
KB4493441
April 09, 2019
10:00 AM PT
Error 1309 when installing/uninstalling MSI or MSP files
Users may receive “Error 1309” while installing or uninstalling certain types of MSI and MSP files.

See details >
OS Build 16299.967

February 12, 2019
KB4486996
Resolved
KB4489886
March 12, 2019
10:00 AM PT
Applications using Microsoft Jet database and Access 95 file format stop working
Applications that use a Microsoft Jet database with the Microsoft Access 95 file format may randomly stop working.

See details >
OS Build 16299.967

February 12, 2019
KB4486996
Resolved
KB4487021
February 19, 2019
02:00 PM PT
First character of the Japanese era name not recognized as an abbreviation
The first character of the Japanese era name is not recognized as an abbreviation and may cause date parsing issues.

See details >
OS Build 16299.936

January 15, 2019
KB4480967
Resolved
KB4487021
February 19, 2019
02:00 PM PT
Internet Explorer may fail to load images
Internet Explorer may fail to load images with a backslash (\\) in their relative source path.

See details >
OS Build 16299.967

February 12, 2019
KB4486996
Resolved
KB4487021
February 19, 2019
02:00 PM PT
Applications using Microsoft Jet database fail to open
Applications that use a Microsoft Jet database with the Microsoft Access 97 file format may fail to open if column names are greater than 32 characters.

See details >
OS Build 16299.904

January 08, 2019
KB4480978
Resolved
KB4486996
February 12, 2019
10:00 AM PT
Webpages become unresponsive in Microsoft Edge
Microsoft Edge users report difficulty browsing and loading webpages.

See details >
OS Build 16299.904

January 08, 2019
KB4480978
Resolved
KB4486996
February 12, 2019
10:00 AM PT
SqlConnection instantiation exception on .NET 4.6 and later
Instantiation of SqlConnection can throw an exception after certain updates have been installed.

See details >
OS Build 16299.637

August 30, 2018
KB4343893
Resolved
KB4480967
January 15, 2019
10:00 AM PT
Unable to access hotspots with third-party applications
Third-party applications may have difficulty authenticating hotspots.

See details >
OS Build 16299.904

January 08, 2019
KB4480978
Resolved
KB4480967
January 15, 2019
10:00 AM PT
Unable to use Seek bar in Windows Media Player
Users may not be able to use the Seek bar in Windows Media Player when playing specific files.

See details >
OS Build 16299.726

October 09, 2018
KB4462918
Resolved
KB4471329
December 11, 2018
10:00 AM PT
Error message beginning with “Hosted by…” when launching Microsoft Edge
Some users may encounter an error message beginning with “Hosted by…” when launching Microsoft Edge.

See details >
OS Build 16299.726

October 09, 2018
KB4462918
Resolved
KB4462932
October 18, 2018
10:00 AM PT
+ + + + + + + + + + + + +
SummaryOriginating updateStatusDate resolved
Applications using Microsoft Jet database and Access 95 file format stop working
Applications that use a Microsoft Jet database with the Microsoft Access 95 file format may randomly stop working.

See details >
OS Build 16299.967

February 12, 2019
KB4486996
Resolved
KB4487021
February 19, 2019
02:00 PM PT
Applications using Microsoft Jet database fail to open
Applications that use a Microsoft Jet database with the Microsoft Access 97 file format may fail to open if column names are greater than 32 characters.

See details >
OS Build 16299.904

January 08, 2019
KB4480978
Resolved
KB4486996
February 12, 2019
10:00 AM PT
End-user-defined characters (EUDC) may cause blue screen at startup
If you enable per font end-user-defined characters (EUDC), the system may stop working and a blue screen may appear at startup.

See details >
OS Build 16299.1059

March 19, 2019
KB4489890
Resolved
KB4493441
April 09, 2019
10:00 AM PT
Error 1309 when installing/uninstalling MSI or MSP files
Users may receive “Error 1309” while installing or uninstalling certain types of MSI and MSP files.

See details >
OS Build 16299.967

February 12, 2019
KB4486996
Resolved
KB4489886
March 12, 2019
10:00 AM PT
Error message beginning with “Hosted by…” when launching Microsoft Edge
Some users may encounter an error message beginning with “Hosted by…” when launching Microsoft Edge.

See details >
OS Build 16299.726

October 09, 2018
KB4462918
Resolved
KB4462932
October 18, 2018
10:00 AM PT
First character of the Japanese era name not recognized as an abbreviation
The first character of the Japanese era name is not recognized as an abbreviation and may cause date parsing issues.

See details >
OS Build 16299.936

January 15, 2019
KB4480967
Resolved
KB4487021
February 19, 2019
02:00 PM PT
Internet Explorer may fail to load images
Internet Explorer may fail to load images with a backslash (\\) in their relative source path.

See details >
OS Build 16299.967

February 12, 2019
KB4486996
Resolved
KB4487021
February 19, 2019
02:00 PM PT
MSXML6 causes applications to stop responding if an exception was thrown
MSXML6 causes applications to stop responding if an exception was thrown during node operations, such as appendChild(), insertBefore(), and moveNode().

See details >
OS Build 16299.904

January 08, 2019
KB4480978
Resolved
KB4493441
April 09, 2019
10:00 AM PT
SqlConnection instantiation exception on .NET 4.6 and later
Instantiation of SqlConnection can throw an exception after certain updates have been installed.

See details >
OS Build 16299.637

August 30, 2018
KB4343893
Resolved
KB4480967
January 15, 2019
10:00 AM PT
Stop error when attempting to start SSH from WSL
A stop error occurs when attempting to start the Secure Shell client program from Windows Subsystem for Linux with agent forwarding enabled using a command line switch (ssh –A) or

See details >
OS Build 16299.1029

March 12, 2019
KB4489886
Resolved
KB4493441
April 09, 2019
10:00 AM PT
Unable to access hotspots with third-party applications
Third-party applications may have difficulty authenticating hotspots.

See details >
OS Build 16299.904

January 08, 2019
KB4480978
Resolved
KB4480967
January 15, 2019
10:00 AM PT
Unable to use Seek bar in Windows Media Player
Users may not be able to use the Seek bar in Windows Media Player when playing specific files.

See details >
OS Build 16299.726

October 09, 2018
KB4462918
Resolved
KB4471329
December 11, 2018
10:00 AM PT
Webpages become unresponsive in Microsoft Edge
Microsoft Edge users report difficulty browsing and loading webpages.

See details >
OS Build 16299.904

January 08, 2019
KB4480978
Resolved
KB4486996
February 12, 2019
10:00 AM PT
" @@ -59,9 +59,9 @@ sections: - items: - type: markdown text: " - - - +
DetailsOriginating updateStatusHistory
End-user-defined characters (EUDC) may cause blue screen at startup
If you enable per font end-user-defined characters (EUDC), the system may stop working and a blue screen may appear at startup. This is not a common setting in non-Asian regions.

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016

Resolution: This issue is resolved in KB4493441.

Back to top
OS Build 16299.1059

March 19, 2019
KB4489890
Resolved
KB4493441
Resolved:
April 09, 2019
10:00 AM PT

Opened:
March 19, 2019
10:00 AM PT
Stop error when attempting to start SSH from WSL
After applying KB4489886, a stop error occurs when attempting to start the Secure Shell (SSH) client program from Windows Subsystem for Linux (WSL) with agent forwarding enabled using a command line switch (ssh –A) or a configuration setting.

Affected platforms:
  • Client: Windows 10, version 1803; Windows 10, version 1709
  • Server: Windows Server, version 1803; Windows Server, version 1709

Resolution: This issue is resolved in KB4493441.

Back to top
OS Build 16299.1029

March 12, 2019
KB4489886
Resolved
KB4493441
Resolved:
April 09, 2019
10:00 AM PT

Opened:
March 12, 2019
10:00 AM PT
+ +
DetailsOriginating updateStatusHistory
End-user-defined characters (EUDC) may cause blue screen at startup
If you enable per font end-user-defined characters (EUDC), the system may stop working and a blue screen may appear at startup. This is not a common setting in non-Asian regions.

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016

Resolution: This issue is resolved in KB4493441.

Back to top
OS Build 16299.1059

March 19, 2019
KB4489890
Resolved
KB4493441
Resolved:
April 09, 2019
10:00 AM PT

Opened:
March 19, 2019
10:00 AM PT
Stop error when attempting to start SSH from WSL
After applying KB4489886, a stop error occurs when attempting to start the Secure Shell (SSH) client program from Windows Subsystem for Linux (WSL) with agent forwarding enabled using a command line switch (ssh –A) or a configuration setting.

Affected platforms:
  • Client: Windows 10, version 1803; Windows 10, version 1709
  • Server: Windows Server, version 1803; Windows Server, version 1709

Resolution: This issue is resolved in KB4493441.

Back to top
OS Build 16299.1029

March 12, 2019
KB4489886
Resolved
KB4493441
Resolved:
April 09, 2019
10:00 AM PT

Opened:
March 12, 2019
10:00 AM PT
" @@ -69,10 +69,10 @@ sections: - items: - type: markdown text: " - - - - +
DetailsOriginating updateStatusHistory
Error 1309 when installing/uninstalling MSI or MSP files
After installing KB4486996, users may receive “Error 1309” while installing or uninstalling certain types of MSI and MSP files.

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 8.1
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2

Resolution: This issue is resolved in KB4489886.

Back to top
OS Build 16299.967

February 12, 2019
KB4486996
Resolved
KB4489886
Resolved:
March 12, 2019
10:00 AM PT

Opened:
February 12, 2019
10:00 AM PT
Applications using Microsoft Jet database and Access 95 file format stop working
Applications that use a Microsoft Jet database with the Microsoft Access 95 file format may randomly stop working.

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 7, Service Pack 1
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2008 R2 SP1

Resolution: This issue is resolved in KB4487021.

Back to top
OS Build 16299.967

February 12, 2019
KB4486996
Resolved
KB4487021
Resolved:
February 19, 2019
02:00 PM PT

Opened:
February 12, 2019
10:00 AM PT
Internet Explorer may fail to load images
After installing KB4486996, Internet Explorer may fail to load images with a backslash (\\) in their relative source path.

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 8.1; Windows 7, Service Pack 1
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2; Windows Server 2008 R2 SP1

Resolution: This issue is resolved in KB4487021.

Back to top
OS Build 16299.967

February 12, 2019
KB4486996
Resolved
KB4487021
Resolved:
February 19, 2019
02:00 PM PT

Opened:
February 12, 2019
10:00 AM PT
+ + +
DetailsOriginating updateStatusHistory
Applications using Microsoft Jet database and Access 95 file format stop working
Applications that use a Microsoft Jet database with the Microsoft Access 95 file format may randomly stop working.

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 7, Service Pack 1
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2008 R2 SP1

Resolution: This issue is resolved in KB4487021.

Back to top
OS Build 16299.967

February 12, 2019
KB4486996
Resolved
KB4487021
Resolved:
February 19, 2019
02:00 PM PT

Opened:
February 12, 2019
10:00 AM PT
Error 1309 when installing/uninstalling MSI or MSP files
After installing KB4486996, users may receive “Error 1309” while installing or uninstalling certain types of MSI and MSP files.

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 8.1
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2

Resolution: This issue is resolved in KB4489886.

Back to top
OS Build 16299.967

February 12, 2019
KB4486996
Resolved
KB4489886
Resolved:
March 12, 2019
10:00 AM PT

Opened:
February 12, 2019
10:00 AM PT
Internet Explorer may fail to load images
After installing KB4486996, Internet Explorer may fail to load images with a backslash (\\) in their relative source path.

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 8.1; Windows 7, Service Pack 1
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2; Windows Server 2008 R2 SP1

Resolution: This issue is resolved in KB4487021.

Back to top
OS Build 16299.967

February 12, 2019
KB4486996
Resolved
KB4487021
Resolved:
February 19, 2019
02:00 PM PT

Opened:
February 12, 2019
10:00 AM PT
" @@ -80,12 +80,12 @@ sections: - items: - type: markdown text: " - - - - - - +
DetailsOriginating updateStatusHistory
MSXML6 causes applications to stop responding if an exception was thrown
After installing KB4480978, MSXML6 causes applications to stop responding if an exception was thrown during node operations, such as appendChild(), insertBefore(), and moveNode().

The Group Policy editor may stop responding when editing a Group Policy Object (GPO) that contains Group Policy Preferences (GPP) for Internet Explorer 10 settings.

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 8.1
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2

Resolution: This issue is resolved in KB4493441.

Back to top
OS Build 16299.904

January 08, 2019
KB4480978
Resolved
KB4493441
Resolved:
April 09, 2019
10:00 AM PT

Opened:
January 08, 2019
10:00 AM PT
First character of the Japanese era name not recognized as an abbreviation
After installing KB4480967, the first character of the Japanese era name is not recognized as an abbreviation and may cause date parsing issues.

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 8.1; Windows 7, Service Pack 1
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2; Windows Server 2008 R2 SP1

Resolution: This issue is resolved in KB4487021.

Back to top
OS Build 16299.936

January 15, 2019
KB4480967
Resolved
KB4487021
Resolved:
February 19, 2019
02:00 PM PT

Opened:
January 15, 2019
10:00 AM PT
Applications using Microsoft Jet database fail to open
Applications that use a Microsoft Jet database with the Microsoft Access 97 file format may fail to open if the database has column names greater than 32 characters. The database will fail to open with the error, “Unrecognized Database Format.”

Affected platforms:
  • Client: Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 8.1; Windows 7, Service Pack 1 
  • Server: Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2; Windows Server 2008 R2 SP1 

Resolution: This issue is resolved in KB4486996.

Back to top
OS Build 16299.904

January 08, 2019
KB4480978
Resolved
KB4486996
Resolved:
February 12, 2019
10:00 AM PT

Opened:
January 08, 2019
10:00 AM PT
Webpages become unresponsive in Microsoft Edge
After installing KB4480978, some Microsoft Edge users report that they:
  • Cannot load webpages using a local IP address.
  • Cannot load webpages on the Internet using a VPN connection.
Browsing fails or the webpage may become unresponsive.

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709

Resolution: This issue is resolved in KB4486996.

Back to top
OS Build 16299.904

January 08, 2019
KB4480978
Resolved
KB4486996
Resolved:
February 12, 2019
10:00 AM PT

Opened:
January 08, 2019
10:00 AM PT
Unable to access hotspots with third-party applications
After installing KB4480978, third-party applications may have difficulty authenticating hotspots.

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 8.1
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2

Resolution: This issue is resolved in KB4480967.

Back to top
OS Build 16299.904

January 08, 2019
KB4480978
Resolved
KB4480967
Resolved:
January 15, 2019
10:00 AM PT

Opened:
January 08, 2019
10:00 AM PT
+ + + + +
DetailsOriginating updateStatusHistory
Applications using Microsoft Jet database fail to open
Applications that use a Microsoft Jet database with the Microsoft Access 97 file format may fail to open if the database has column names greater than 32 characters. The database will fail to open with the error, “Unrecognized Database Format.”

Affected platforms:
  • Client: Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 8.1; Windows 7, Service Pack 1 
  • Server: Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2; Windows Server 2008 R2 SP1 

Resolution: This issue is resolved in KB4486996.

Back to top
OS Build 16299.904

January 08, 2019
KB4480978
Resolved
KB4486996
Resolved:
February 12, 2019
10:00 AM PT

Opened:
January 08, 2019
10:00 AM PT
First character of the Japanese era name not recognized as an abbreviation
After installing KB4480967, the first character of the Japanese era name is not recognized as an abbreviation and may cause date parsing issues.

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 8.1; Windows 7, Service Pack 1
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2; Windows Server 2008 R2 SP1

Resolution: This issue is resolved in KB4487021.

Back to top
OS Build 16299.936

January 15, 2019
KB4480967
Resolved
KB4487021
Resolved:
February 19, 2019
02:00 PM PT

Opened:
January 15, 2019
10:00 AM PT
MSXML6 causes applications to stop responding if an exception was thrown
After installing KB4480978, MSXML6 causes applications to stop responding if an exception was thrown during node operations, such as appendChild(), insertBefore(), and moveNode().

The Group Policy editor may stop responding when editing a Group Policy Object (GPO) that contains Group Policy Preferences (GPP) for Internet Explorer 10 settings.

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 8.1
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2

Resolution: This issue is resolved in KB4493441.

Back to top
OS Build 16299.904

January 08, 2019
KB4480978
Resolved
KB4493441
Resolved:
April 09, 2019
10:00 AM PT

Opened:
January 08, 2019
10:00 AM PT
Unable to access hotspots with third-party applications
After installing KB4480978, third-party applications may have difficulty authenticating hotspots.

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 8.1
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2

Resolution: This issue is resolved in KB4480967.

Back to top
OS Build 16299.904

January 08, 2019
KB4480978
Resolved
KB4480967
Resolved:
January 15, 2019
10:00 AM PT

Opened:
January 08, 2019
10:00 AM PT
Webpages become unresponsive in Microsoft Edge
After installing KB4480978, some Microsoft Edge users report that they:
  • Cannot load webpages using a local IP address.
  • Cannot load webpages on the Internet using a VPN connection.
Browsing fails or the webpage may become unresponsive.

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709

Resolution: This issue is resolved in KB4486996.

Back to top
OS Build 16299.904

January 08, 2019
KB4480978
Resolved
KB4486996
Resolved:
February 12, 2019
10:00 AM PT

Opened:
January 08, 2019
10:00 AM PT
" @@ -93,9 +93,9 @@ sections: - items: - type: markdown text: " - - - +
DetailsOriginating updateStatusHistory
Unable to use Seek bar in Windows Media Player
After installing KB4462918, users may not be able to use the Seek Bar in Windows Media Player when playing specific files. This issue does not affect normal playback.

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 8.1; Windows 7, Service Pack 1
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2; Windows Server 2008 R2 SP1

Resolution: This issue is resolved in KB4471329.

Back to top
OS Build 16299.726

October 09, 2018
KB4462918
Resolved
KB4471329
Resolved:
December 11, 2018
10:00 AM PT

Opened:
October 09, 2018
10:00 AM PT
Error message beginning with “Hosted by…” when launching Microsoft Edge
After installing KB4462918, some users may see a dialog box with a non-applicable message beginning with the words “Hosted by...” when first starting Microsoft Edge.

This dialog will only appear once if they have turned on “Block only third-party cookies” in Microsoft Edge and applied certain language packs before installing this update.

Affected platforms:
  • Client: Windows 10, version 1709; Windows 10, version 1703
  • Server: Windows Server, version 1709

Resolution: This issue is resolved in KB4462932.

Back to top
OS Build 16299.726

October 09, 2018
KB4462918
Resolved
KB4462932
Resolved:
October 18, 2018
10:00 AM PT

Opened:
October 09, 2018
10:00 AM PT
+ +
DetailsOriginating updateStatusHistory
Error message beginning with “Hosted by…” when launching Microsoft Edge
After installing KB4462918, some users may see a dialog box with a non-applicable message beginning with the words “Hosted by...” when first starting Microsoft Edge.

This dialog will only appear once if they have turned on “Block only third-party cookies” in Microsoft Edge and applied certain language packs before installing this update.

Affected platforms:
  • Client: Windows 10, version 1709; Windows 10, version 1703
  • Server: Windows Server, version 1709

Resolution: This issue is resolved in KB4462932.

Back to top
OS Build 16299.726

October 09, 2018
KB4462918
Resolved
KB4462932
Resolved:
October 18, 2018
10:00 AM PT

Opened:
October 09, 2018
10:00 AM PT
Unable to use Seek bar in Windows Media Player
After installing KB4462918, users may not be able to use the Seek Bar in Windows Media Player when playing specific files. This issue does not affect normal playback.

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 8.1; Windows 7, Service Pack 1
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2; Windows Server 2008 R2 SP1

Resolution: This issue is resolved in KB4471329.

Back to top
OS Build 16299.726

October 09, 2018
KB4462918
Resolved
KB4471329
Resolved:
December 11, 2018
10:00 AM PT

Opened:
October 09, 2018
10:00 AM PT
" @@ -103,7 +103,7 @@ sections: - items: - type: markdown text: " - - +
DetailsOriginating updateStatusHistory
SqlConnection instantiation exception on .NET 4.6 and later
After you install the August Preview of Quality Rollup or September 11, 2018 .NET Framework update, instantiation of SqlConnection can throw an exception.

For more information about this issue, see the following article in the Microsoft Knowledge Base:
4470809 SqlConnection instantiation exception on .NET 4.6 and later after August-September 2018 .NET Framework updates.

Affected platforms:
  • Client: Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016
  • Server: Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016

Resolution: This issue is resolved in KB4480967.

Back to top
OS Build 16299.637

August 30, 2018
KB4343893
Resolved
KB4480967
Resolved:
January 15, 2019
10:00 AM PT

Opened:
August 30, 2018
05:00 PM PT
+
DetailsOriginating updateStatusHistory
SqlConnection instantiation exception on .NET 4.6 and later
After you install the August Preview of Quality Rollup or September 11, 2018 .NET Framework update, instantiation of SqlConnection can throw an exception.

For more information about this issue, see the following article in the Microsoft Knowledge Base:
4470809 SqlConnection instantiation exception on .NET 4.6 and later after August-September 2018 .NET Framework updates.

Affected platforms:
  • Client: Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016
  • Server: Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016

Resolution: This issue is resolved in KB4480967.

Back to top
OS Build 16299.637

August 30, 2018
KB4343893
Resolved
KB4480967
Resolved:
January 15, 2019
10:00 AM PT

Opened:
August 30, 2018
05:00 PM PT
" diff --git a/windows/release-information/resolved-issues-windows-10-1803.yml b/windows/release-information/resolved-issues-windows-10-1803.yml index af3cab2c74..ea0e8a6fac 100644 --- a/windows/release-information/resolved-issues-windows-10-1803.yml +++ b/windows/release-information/resolved-issues-windows-10-1803.yml @@ -31,25 +31,25 @@ sections: - items: - type: markdown text: " - - - - - - - - - - - - - - - - - - - +
SummaryOriginating updateStatusDate resolved
End-user-defined characters (EUDC) may cause blue screen at startup
If you enable per font end-user-defined characters (EUDC), the system may stop working and a blue screen may appear at startup.

See details >
OS Build 17134.677

March 19, 2019
KB4489894
Resolved
KB4493464
April 09, 2019
10:00 AM PT
MSXML6 may cause applications to stop responding
MSXML6 may cause applications to stop responding if an exception was thrown during node operations, such as appendChild(), insertBefore(), and moveNode().

See details >
OS Build 17134.523

January 08, 2019
KB4480966
Resolved
KB4493464
April 09, 2019
10:00 AM PT
Stop error when attempting to start SSH from WSL
A stop error occurs when attempting to start Secure Shell from Windows Subsystem for Linux with agent forwarding using a command line switch (ssh –A) or a configuration setting.

See details >
OS Build 17134.648

March 12, 2019
KB4489868
Resolved
KB4493464
April 09, 2019
10:00 AM PT
Error 1309 when installing/uninstalling MSI or MSP files
Users may receive \"Error 1309\" while installing or uninstalling certain types of MSI and MSP files.

See details >
OS Build 17134.590

February 12, 2019
KB4487017
Resolved
KB4489868
March 12, 2019
10:00 AM PT
Cannot pin a web link on the Start menu or the taskbar
Some users cannot pin a web link on the Start menu or the taskbar.

See details >
OS Build 17134.471

December 11, 2018
KB4471324
Resolved
KB4487029
February 19, 2019
02:00 PM PT
First character of Japanese era name not recognized
The first character of the Japanese era name is not recognized as an abbreviation and may cause date parsing issues.

See details >
OS Build 17134.556

January 15, 2019
KB4480976
Resolved
KB4487029
February 19, 2019
02:00 PM PT
Internet Explorer may fail to load images
Internet Explorer may fail to load images with a backslash (\\) in their relative source path.

See details >
OS Build 17134.590

February 12, 2019
KB4487017
Resolved
KB4487029
February 19, 2019
02:00 PM PT
Applications using Microsoft Jet database and Access 95 file format stop working
Applications that use a Microsoft Jet database with the Microsoft Access 95 file format may randomly stop working.

See details >
OS Build 17134.523

January 08, 2019
KB4480966
Resolved
KB4487017
February 12, 2019
10:00 AM PT
Webpages become unresponsive in Microsoft Edge
Microsoft Edge users report difficulty browsing and loading webpages.

See details >
OS Build 17134.523

January 08, 2019
KB4480966
Resolved
KB4487017
February 12, 2019
10:00 AM PT
SqlConnection instantiation exception on .NET 4.6 and later
After you install the August Preview of Quality Rollup or the September 11, 2018 .NET Framework update, instantiation of SqlConnection can throw an exception.

See details >
OS Build 17134.285

September 11, 2018
KB4457128
Resolved
KB4480976
January 15, 2019
10:00 AM PT
Unable to access hotspots with third-party applications
Third-party applications may have difficulty authenticating hotspots.

See details >
OS Build 17134.523

January 08, 2019
KB4480966
Resolved
KB4480976
January 15, 2019
10:00 AM PT
Blue or black screen with \"System thread exception not handled\" error
Some users may get a blue or black screen with the error code, “System thread exception not handled.”

See details >
OS Build 17134.441

November 27, 2018
KB4467682
Resolved
KB4471324
December 11, 2018
10:00 AM PT
Custom Start menu layouts display incorrectly
Custom Start menu layouts may display incorrectly.

See details >
OS Build 17134.441

November 27, 2018
KB4467682
Resolved
KB4471324
December 11, 2018
10:00 AM PT
Unable to use Seek bar in Windows Media Player
Users may not be able to use the Seek Bar in Windows Media Player when playing specific files.

See details >
OS Build 17134.345

October 09, 2018
KB4462919
Resolved
KB4471324
December 11, 2018
10:00 AM PT
Users cannot set Win32 program defaults
Some users cannot set Win32 program defaults for certain app and file type combinations.

See details >
OS Build 17134.320

September 26, 2018
KB4458469
Resolved
KB4467682
November 27, 2018
10:00 AM PT
Developer Tools (F12) fail to start in Microsoft Edge
Developer Tools (F12) may fail to start in Microsoft Edge.

See details >
OS Build 17134.376

October 24, 2018
KB4462933
Resolved
KB4467702
November 13, 2018
10:00 AM PT
Guest VMs running Unicast NLB fail to respond after restart
All guest virtual machines running Unicast NLB fail to respond to NLB requests after the virtual machines restart.

See details >
OS Build 17134.285

September 11, 2018
KB4457128
Resolved
KB4458469
September 20, 2018
10:00 AM PT
Microsoft Intune takes a long time to deliver user profiles
Windows no longer recognizes the Personal Information exchange (PFX) certificate used for Wi-Fi or VPN authentication, causing delays in Microsoft Intune delivering user profiles.

See details >
OS Build 17134.191

July 24, 2018
KB4340917
Resolved
KB4464218
September 17, 2018
10:00 AM PT
+ + + + + + + + + + + + + + + + + +
SummaryOriginating updateStatusDate resolved
Applications using Microsoft Jet database and Access 95 file format stop working
Applications that use a Microsoft Jet database with the Microsoft Access 95 file format may randomly stop working.

See details >
OS Build 17134.523

January 08, 2019
KB4480966
Resolved
KB4487017
February 12, 2019
10:00 AM PT
Blue or black screen with \"System thread exception not handled\" error
Some users may get a blue or black screen with the error code, “System thread exception not handled.”

See details >
OS Build 17134.441

November 27, 2018
KB4467682
Resolved
KB4471324
December 11, 2018
10:00 AM PT
Cannot pin a web link on the Start menu or the taskbar
Some users cannot pin a web link on the Start menu or the taskbar.

See details >
OS Build 17134.471

December 11, 2018
KB4471324
Resolved
KB4487029
February 19, 2019
02:00 PM PT
Custom Start menu layouts display incorrectly
Custom Start menu layouts may display incorrectly.

See details >
OS Build 17134.441

November 27, 2018
KB4467682
Resolved
KB4471324
December 11, 2018
10:00 AM PT
Developer Tools (F12) fail to start in Microsoft Edge
Developer Tools (F12) may fail to start in Microsoft Edge.

See details >
OS Build 17134.376

October 24, 2018
KB4462933
Resolved
KB4467702
November 13, 2018
10:00 AM PT
End-user-defined characters (EUDC) may cause blue screen at startup
If you enable per font end-user-defined characters (EUDC), the system may stop working and a blue screen may appear at startup.

See details >
OS Build 17134.677

March 19, 2019
KB4489894
Resolved
KB4493464
April 09, 2019
10:00 AM PT
Error 1309 when installing/uninstalling MSI or MSP files
Users may receive \"Error 1309\" while installing or uninstalling certain types of MSI and MSP files.

See details >
OS Build 17134.590

February 12, 2019
KB4487017
Resolved
KB4489868
March 12, 2019
10:00 AM PT
First character of Japanese era name not recognized
The first character of the Japanese era name is not recognized as an abbreviation and may cause date parsing issues.

See details >
OS Build 17134.556

January 15, 2019
KB4480976
Resolved
KB4487029
February 19, 2019
02:00 PM PT
Guest VMs running Unicast NLB fail to respond after restart
All guest virtual machines running Unicast NLB fail to respond to NLB requests after the virtual machines restart.

See details >
OS Build 17134.285

September 11, 2018
KB4457128
Resolved
KB4458469
September 20, 2018
10:00 AM PT
Internet Explorer may fail to load images
Internet Explorer may fail to load images with a backslash (\\) in their relative source path.

See details >
OS Build 17134.590

February 12, 2019
KB4487017
Resolved
KB4487029
February 19, 2019
02:00 PM PT
Microsoft Intune takes a long time to deliver user profiles
Windows no longer recognizes the Personal Information exchange (PFX) certificate used for Wi-Fi or VPN authentication, causing delays in Microsoft Intune delivering user profiles.

See details >
OS Build 17134.191

July 24, 2018
KB4340917
Resolved
KB4464218
September 17, 2018
10:00 AM PT
MSXML6 may cause applications to stop responding
MSXML6 may cause applications to stop responding if an exception was thrown during node operations, such as appendChild(), insertBefore(), and moveNode().

See details >
OS Build 17134.523

January 08, 2019
KB4480966
Resolved
KB4493464
April 09, 2019
10:00 AM PT
SqlConnection instantiation exception on .NET 4.6 and later
After you install the August Preview of Quality Rollup or the September 11, 2018 .NET Framework update, instantiation of SqlConnection can throw an exception.

See details >
OS Build 17134.285

September 11, 2018
KB4457128
Resolved
KB4480976
January 15, 2019
10:00 AM PT
Stop error when attempting to start SSH from WSL
A stop error occurs when attempting to start Secure Shell from Windows Subsystem for Linux with agent forwarding using a command line switch (ssh –A) or a configuration setting.

See details >
OS Build 17134.648

March 12, 2019
KB4489868
Resolved
KB4493464
April 09, 2019
10:00 AM PT
Unable to access hotspots with third-party applications
Third-party applications may have difficulty authenticating hotspots.

See details >
OS Build 17134.523

January 08, 2019
KB4480966
Resolved
KB4480976
January 15, 2019
10:00 AM PT
Unable to use Seek bar in Windows Media Player
Users may not be able to use the Seek Bar in Windows Media Player when playing specific files.

See details >
OS Build 17134.345

October 09, 2018
KB4462919
Resolved
KB4471324
December 11, 2018
10:00 AM PT
Users cannot set Win32 program defaults
Some users cannot set Win32 program defaults for certain app and file type combinations.

See details >
OS Build 17134.320

September 26, 2018
KB4458469
Resolved
KB4467682
November 27, 2018
10:00 AM PT
Webpages become unresponsive in Microsoft Edge
Microsoft Edge users report difficulty browsing and loading webpages.

See details >
OS Build 17134.523

January 08, 2019
KB4480966
Resolved
KB4487017
February 12, 2019
10:00 AM PT
" @@ -64,9 +64,9 @@ sections: - items: - type: markdown text: " - - - +
DetailsOriginating updateStatusHistory
End-user-defined characters (EUDC) may cause blue screen at startup
If you enable per font end-user-defined characters (EUDC), the system may stop working and a blue screen may appear at startup. This is not a common setting in non-Asian regions. 

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016
 
Resolution: This issue was resolved in KB4493464

Back to top
OS Build 17134.677

March 19, 2019
KB4489894
Resolved
KB4493464
Resolved:
April 09, 2019
10:00 AM PT

Opened:
March 19, 2019
10:00 AM PT
Stop error when attempting to start SSH from WSL
After applying KB4489868, a stop error occurs when attempting to start the Secure Shell (SSH) client program from Windows Subsystem for Linux (WSL) with agent forwarding enabled using a command line switch (ssh -A) or a configuration setting.

Affected platforms:
  • Client: Windows 10, version 1803; Windows 10, version 1709
  • Server: Windows Server, version 1803; Windows Server, version 1709

Resolution: This issue was resolved in KB4493464.

Back to top
OS Build 17134.648

March 12, 2019
KB4489868
Resolved
KB4493464
Resolved:
April 09, 2019
10:00 AM PT

Opened:
March 12, 2019
10:00 AM PT
+ +
DetailsOriginating updateStatusHistory
End-user-defined characters (EUDC) may cause blue screen at startup
If you enable per font end-user-defined characters (EUDC), the system may stop working and a blue screen may appear at startup. This is not a common setting in non-Asian regions. 

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016
 
Resolution: This issue was resolved in KB4493464

Back to top
OS Build 17134.677

March 19, 2019
KB4489894
Resolved
KB4493464
Resolved:
April 09, 2019
10:00 AM PT

Opened:
March 19, 2019
10:00 AM PT
Stop error when attempting to start SSH from WSL
After applying KB4489868, a stop error occurs when attempting to start the Secure Shell (SSH) client program from Windows Subsystem for Linux (WSL) with agent forwarding enabled using a command line switch (ssh -A) or a configuration setting.

Affected platforms:
  • Client: Windows 10, version 1803; Windows 10, version 1709
  • Server: Windows Server, version 1803; Windows Server, version 1709

Resolution: This issue was resolved in KB4493464.

Back to top
OS Build 17134.648

March 12, 2019
KB4489868
Resolved
KB4493464
Resolved:
April 09, 2019
10:00 AM PT

Opened:
March 12, 2019
10:00 AM PT
" @@ -74,9 +74,9 @@ sections: - items: - type: markdown text: " - - - +
DetailsOriginating updateStatusHistory
Error 1309 when installing/uninstalling MSI or MSP files
After installing KB4487017, users may received \"Error 1309\" while installing or uninstalling certain types of MSI and MSP files. 

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 8.1
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2

Resolution: This issue is resolved in KB4489868.

Back to top
OS Build 17134.590

February 12, 2019
KB4487017
Resolved
KB4489868
Resolved:
March 12, 2019
10:00 AM PT

Opened:
February 12, 2019
10:00 AM PT
Internet Explorer may fail to load images
After installing KB4487017, Internet Explorer may fail to load images with a backslash (\\) in their relative source path. 

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 8.1; Windows 7, Service Pack 1
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2; Windows Server 2008 R2 SP1

Resolution: This issue is resolved in KB4487029

Back to top
OS Build 17134.590

February 12, 2019
KB4487017
Resolved
KB4487029
Resolved:
February 19, 2019
02:00 PM PT

Opened:
February 12, 2019
10:00 AM PT
+ +
DetailsOriginating updateStatusHistory
Error 1309 when installing/uninstalling MSI or MSP files
After installing KB4487017, users may received \"Error 1309\" while installing or uninstalling certain types of MSI and MSP files. 

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 8.1
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2

Resolution: This issue is resolved in KB4489868.

Back to top
OS Build 17134.590

February 12, 2019
KB4487017
Resolved
KB4489868
Resolved:
March 12, 2019
10:00 AM PT

Opened:
February 12, 2019
10:00 AM PT
Internet Explorer may fail to load images
After installing KB4487017, Internet Explorer may fail to load images with a backslash (\\) in their relative source path. 

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 8.1; Windows 7, Service Pack 1
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2; Windows Server 2008 R2 SP1

Resolution: This issue is resolved in KB4487029

Back to top
OS Build 17134.590

February 12, 2019
KB4487017
Resolved
KB4487029
Resolved:
February 19, 2019
02:00 PM PT

Opened:
February 12, 2019
10:00 AM PT
" @@ -84,12 +84,12 @@ sections: - items: - type: markdown text: " - - - - - - +
DetailsOriginating updateStatusHistory
MSXML6 may cause applications to stop responding
After installing KB4480966, MSXML6 causes applications to stop responding if an exception was thrown during node operations, such as appendChild(), insertBefore(), and moveNode().

The Group Policy editor may stop responding when editing a Group Policy Object (GPO) that contains Group Policy Preferences (GPP) for Internet Explorer 10 settings.

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 8.1
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2

Resolution: This issue was resolved in KB4493464

Back to top
OS Build 17134.523

January 08, 2019
KB4480966
Resolved
KB4493464
Resolved:
April 09, 2019
10:00 AM PT

Opened:
January 08, 2019
10:00 AM PT
First character of Japanese era name not recognized
After installing KB4480976, the first character of the Japanese era name is not recognized as an abbreviation and may cause date parsing issues.

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 8.1; Windows 7, Service Pack 1
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2; Windows Server 2008 R2 SP1

Resolution: This issue is resolved in KB4487029

Back to top
OS Build 17134.556

January 15, 2019
KB4480976
Resolved
KB4487029
Resolved:
February 19, 2019
02:00 PM PT

Opened:
January 15, 2019
10:00 AM PT
Applications using Microsoft Jet database and Access 95 file format stop working
Applications that use a Microsoft Jet database with the Microsoft Access 95 file format may randomly stop working. 

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 7, Service Pack 1
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2008 R2 SP1

Resolution: This issue is resolved in KB4487017.

Back to top
OS Build 17134.523

January 08, 2019
KB4480966
Resolved
KB4487017
Resolved:
February 12, 2019
10:00 AM PT

Opened:
January 08, 2019
10:00 AM PT
Webpages become unresponsive in Microsoft Edge
After installing KB4480966, some Microsoft Edge users report that they: 
  • Cannot load webpages using a local IP address. 
  • Cannot load webpages on the Internet using a VPN connection.  
Browsing fails or the webpage may become unresponsive. 

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709

Resolution: This issue is resolved in KB4487017

Back to top
OS Build 17134.523

January 08, 2019
KB4480966
Resolved
KB4487017
Resolved:
February 12, 2019
10:00 AM PT

Opened:
January 08, 2019
10:00 AM PT
Unable to access hotspots with third-party applications
After installing KB4480966, third-party applications may have difficulty authenticating hotspots.

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 8.1
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2

Resolution: This issue is resolved in KB4480976

Back to top
OS Build 17134.523

January 08, 2019
KB4480966
Resolved
KB4480976
Resolved:
January 15, 2019
10:00 AM PT

Opened:
January 08, 2019
10:00 AM PT
+ + + + +
DetailsOriginating updateStatusHistory
Applications using Microsoft Jet database and Access 95 file format stop working
Applications that use a Microsoft Jet database with the Microsoft Access 95 file format may randomly stop working. 

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 7, Service Pack 1
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2008 R2 SP1

Resolution: This issue is resolved in KB4487017.

Back to top
OS Build 17134.523

January 08, 2019
KB4480966
Resolved
KB4487017
Resolved:
February 12, 2019
10:00 AM PT

Opened:
January 08, 2019
10:00 AM PT
First character of Japanese era name not recognized
After installing KB4480976, the first character of the Japanese era name is not recognized as an abbreviation and may cause date parsing issues.

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 8.1; Windows 7, Service Pack 1
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2; Windows Server 2008 R2 SP1

Resolution: This issue is resolved in KB4487029

Back to top
OS Build 17134.556

January 15, 2019
KB4480976
Resolved
KB4487029
Resolved:
February 19, 2019
02:00 PM PT

Opened:
January 15, 2019
10:00 AM PT
MSXML6 may cause applications to stop responding
After installing KB4480966, MSXML6 causes applications to stop responding if an exception was thrown during node operations, such as appendChild(), insertBefore(), and moveNode().

The Group Policy editor may stop responding when editing a Group Policy Object (GPO) that contains Group Policy Preferences (GPP) for Internet Explorer 10 settings.

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 8.1
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2

Resolution: This issue was resolved in KB4493464

Back to top
OS Build 17134.523

January 08, 2019
KB4480966
Resolved
KB4493464
Resolved:
April 09, 2019
10:00 AM PT

Opened:
January 08, 2019
10:00 AM PT
Unable to access hotspots with third-party applications
After installing KB4480966, third-party applications may have difficulty authenticating hotspots.

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 8.1
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2

Resolution: This issue is resolved in KB4480976

Back to top
OS Build 17134.523

January 08, 2019
KB4480966
Resolved
KB4480976
Resolved:
January 15, 2019
10:00 AM PT

Opened:
January 08, 2019
10:00 AM PT
Webpages become unresponsive in Microsoft Edge
After installing KB4480966, some Microsoft Edge users report that they: 
  • Cannot load webpages using a local IP address. 
  • Cannot load webpages on the Internet using a VPN connection.  
Browsing fails or the webpage may become unresponsive. 

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709

Resolution: This issue is resolved in KB4487017

Back to top
OS Build 17134.523

January 08, 2019
KB4480966
Resolved
KB4487017
Resolved:
February 12, 2019
10:00 AM PT

Opened:
January 08, 2019
10:00 AM PT
" @@ -97,8 +97,8 @@ sections: - items: - type: markdown text: " - - +
DetailsOriginating updateStatusHistory
Cannot pin a web link on the Start menu or the taskbar
After installing KB4471324, some users cannot pin a web link on the Start menu or the taskbar. 

Affected platforms:
  • Client: Windows 10, version 1803
  • Server: Windows Server, version 1803

Resolution: This issue is resolved in KB4487029

Back to top
OS Build 17134.471

December 11, 2018
KB4471324
Resolved
KB4487029
Resolved:
February 19, 2019
02:00 PM PT

Opened:
December 11, 2018
10:00 AM PT
+
DetailsOriginating updateStatusHistory
Cannot pin a web link on the Start menu or the taskbar
After installing KB4471324, some users cannot pin a web link on the Start menu or the taskbar. 

Affected platforms:
  • Client: Windows 10, version 1803
  • Server: Windows Server, version 1803

Resolution: This issue is resolved in KB4487029

Back to top
OS Build 17134.471

December 11, 2018
KB4471324
Resolved
KB4487029
Resolved:
February 19, 2019
02:00 PM PT

Opened:
December 11, 2018
10:00 AM PT
" @@ -106,9 +106,9 @@ sections: - items: - type: markdown text: " - - - +
DetailsOriginating updateStatusHistory
Blue or black screen with \"System thread exception not handled\" error
After installing KB4467682, an optional update, some users may get a blue or black screen with the error code, \"System thread exception not handled.\"

Affected platforms:
  • Client: Windows 10, version 1803
  • Server: Windows Server, version 1803

Resolution: This issue is resolved in KB4471324

Back to top
OS Build 17134.441

November 27, 2018
KB4467682
Resolved
KB4471324
Resolved:
December 11, 2018
10:00 AM PT

Opened:
November 27, 2018
10:00 AM PT
Custom Start menu layouts display incorrectly
After installing KB4467682, custom Start menu layouts may display incorrectly. 

Affected platforms:
  • Client: Windows 10, version 1803
  • Server: Windows Server, version 1803
 
Resolution: This issue is resolved in KB4471324

Back to top
OS Build 17134.441

November 27, 2018
KB4467682
Resolved
KB4471324
Resolved:
December 11, 2018
10:00 AM PT

Opened:
November 27, 2018
10:00 AM PT
+ +
DetailsOriginating updateStatusHistory
Blue or black screen with \"System thread exception not handled\" error
After installing KB4467682, an optional update, some users may get a blue or black screen with the error code, \"System thread exception not handled.\"

Affected platforms:
  • Client: Windows 10, version 1803
  • Server: Windows Server, version 1803

Resolution: This issue is resolved in KB4471324

Back to top
OS Build 17134.441

November 27, 2018
KB4467682
Resolved
KB4471324
Resolved:
December 11, 2018
10:00 AM PT

Opened:
November 27, 2018
10:00 AM PT
Custom Start menu layouts display incorrectly
After installing KB4467682, custom Start menu layouts may display incorrectly. 

Affected platforms:
  • Client: Windows 10, version 1803
  • Server: Windows Server, version 1803
 
Resolution: This issue is resolved in KB4471324

Back to top
OS Build 17134.441

November 27, 2018
KB4467682
Resolved
KB4471324
Resolved:
December 11, 2018
10:00 AM PT

Opened:
November 27, 2018
10:00 AM PT
" @@ -116,9 +116,9 @@ sections: - items: - type: markdown text: " - - - +
DetailsOriginating updateStatusHistory
Unable to use Seek bar in Windows Media Player
After installing KB4462919, users may not be able to use the Seek bar in Windows Media Player when playing specific files. This issue does not affect normal playback.

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 8.1; Windows 7, Service Pack 1
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2; Windows Server 2008 R2 SP1

Resolution: This issue is resolved in KB4471324

Back to top
OS Build 17134.345

October 09, 2018
KB4462919
Resolved
KB4471324
Resolved:
December 11, 2018
10:00 AM PT

Opened:
October 09, 2018
10:00 AM PT
Developer Tools (F12) fail to start in Microsoft Edge
Developer Tools (F12) may fail to start in Microsoft Edge.

Affected platforms:
  • Client: Windows 10, version 1803
  • Server: Windows Server, version 1803
 
Resolution: This issue is resolved in KB4467702

Back to top
OS Build 17134.376

October 24, 2018
KB4462933
Resolved
KB4467702
Resolved:
November 13, 2018
10:00 AM PT

Opened:
October 24, 2018
02:00 PM PT
+ +
DetailsOriginating updateStatusHistory
Developer Tools (F12) fail to start in Microsoft Edge
Developer Tools (F12) may fail to start in Microsoft Edge.

Affected platforms:
  • Client: Windows 10, version 1803
  • Server: Windows Server, version 1803
 
Resolution: This issue is resolved in KB4467702

Back to top
OS Build 17134.376

October 24, 2018
KB4462933
Resolved
KB4467702
Resolved:
November 13, 2018
10:00 AM PT

Opened:
October 24, 2018
02:00 PM PT
Unable to use Seek bar in Windows Media Player
After installing KB4462919, users may not be able to use the Seek bar in Windows Media Player when playing specific files. This issue does not affect normal playback.

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 8.1; Windows 7, Service Pack 1
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2; Windows Server 2008 R2 SP1

Resolution: This issue is resolved in KB4471324

Back to top
OS Build 17134.345

October 09, 2018
KB4462919
Resolved
KB4471324
Resolved:
December 11, 2018
10:00 AM PT

Opened:
October 09, 2018
10:00 AM PT
" @@ -126,10 +126,10 @@ sections: - items: - type: markdown text: " - - - - +
DetailsOriginating updateStatusHistory
SqlConnection instantiation exception on .NET 4.6 and later
After you install the August Preview of Quality Rollup or September 11, 2018 .NET Framework update, instantiation of SqlConnection can throw an exception.  

For more information about this issue, see the following article in the Microsoft Knowledge Base: 4470809, SqlConnection instantiation exception on .NET 4.6 and later after August-September 2018 .NET Framework updates.

Affected platforms:
  • Client: Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016
  • Server: Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016

Resolution: This issue is resolved in KB4480976

Back to top
OS Build 17134.285

September 11, 2018
KB4457128
Resolved
KB4480976
Resolved:
January 15, 2019
10:00 AM PT

Opened:
September 11, 2018
10:00 AM PT
Users cannot set Win32 program defaults
After installing KB4458469, some users cannot set Win32 program defaults for certain app and file type combinations using the Open with... command or Settings > Apps > Default apps
 
In some cases, Microsoft Notepad or other Win32 programs cannot be set as the default.

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803

Resolution: This issue is resolved in KB4467682

Back to top
OS Build 17134.320

September 26, 2018
KB4458469
Resolved
KB4467682
Resolved:
November 27, 2018
10:00 AM PT

Opened:
September 26, 2018
02:00 PM PT
Guest VMs running Unicast NLB fail to respond after restart
All guest virtual machines running Unicast NLB fail to respond to NLB requests after the virtual machines restart. 

Affected platforms:
  • Client: Windows 10, version 1803; Windows 10, version 1507
  • Server: Windows Server, version 1803
 
Resolution: This issue is resolved in KB4458469

Back to top
OS Build 17134.285

September 11, 2018
KB4457128
Resolved
KB4458469
Resolved:
September 20, 2018
10:00 AM PT

Opened:
September 11, 2018
10:00 AM PT
+ + +
DetailsOriginating updateStatusHistory
Guest VMs running Unicast NLB fail to respond after restart
All guest virtual machines running Unicast NLB fail to respond to NLB requests after the virtual machines restart. 

Affected platforms:
  • Client: Windows 10, version 1803; Windows 10, version 1507
  • Server: Windows Server, version 1803
 
Resolution: This issue is resolved in KB4458469

Back to top
OS Build 17134.285

September 11, 2018
KB4457128
Resolved
KB4458469
Resolved:
September 20, 2018
10:00 AM PT

Opened:
September 11, 2018
10:00 AM PT
SqlConnection instantiation exception on .NET 4.6 and later
After you install the August Preview of Quality Rollup or September 11, 2018 .NET Framework update, instantiation of SqlConnection can throw an exception.  

For more information about this issue, see the following article in the Microsoft Knowledge Base: 4470809, SqlConnection instantiation exception on .NET 4.6 and later after August-September 2018 .NET Framework updates.

Affected platforms:
  • Client: Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016
  • Server: Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016

Resolution: This issue is resolved in KB4480976

Back to top
OS Build 17134.285

September 11, 2018
KB4457128
Resolved
KB4480976
Resolved:
January 15, 2019
10:00 AM PT

Opened:
September 11, 2018
10:00 AM PT
Users cannot set Win32 program defaults
After installing KB4458469, some users cannot set Win32 program defaults for certain app and file type combinations using the Open with... command or Settings > Apps > Default apps
 
In some cases, Microsoft Notepad or other Win32 programs cannot be set as the default.

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803

Resolution: This issue is resolved in KB4467682

Back to top
OS Build 17134.320

September 26, 2018
KB4458469
Resolved
KB4467682
Resolved:
November 27, 2018
10:00 AM PT

Opened:
September 26, 2018
02:00 PM PT
" @@ -137,7 +137,7 @@ sections: - items: - type: markdown text: " - - +
DetailsOriginating updateStatusHistory
Microsoft Intune takes a long time to deliver user profiles
After installing KB4457128, Windows no longer recognizes the Personal Information exchange (PFX) certificate that's used for authenticating to a Wi-Fi or VPN connection. As a result, Microsoft Intune takes a long time to deliver user profiles because it doesn't recognize that the required certificate is on the device. 

Affected platforms:
  • Client: Windows 10, version 1803
  • Server: Windows Server, version 1803
 
Resolution: This issue is resolved in KB4464218

Back to top
OS Build 17134.191

July 24, 2018
KB4340917
Resolved
KB4464218
Resolved:
September 17, 2018
10:00 AM PT

Opened:
July 24, 2018
10:00 AM PT
+
DetailsOriginating updateStatusHistory
Microsoft Intune takes a long time to deliver user profiles
After installing KB4457128, Windows no longer recognizes the Personal Information exchange (PFX) certificate that's used for authenticating to a Wi-Fi or VPN connection. As a result, Microsoft Intune takes a long time to deliver user profiles because it doesn't recognize that the required certificate is on the device. 

Affected platforms:
  • Client: Windows 10, version 1803
  • Server: Windows Server, version 1803
 
Resolution: This issue is resolved in KB4464218

Back to top
OS Build 17134.191

July 24, 2018
KB4340917
Resolved
KB4464218
Resolved:
September 17, 2018
10:00 AM PT

Opened:
July 24, 2018
10:00 AM PT
" diff --git a/windows/release-information/resolved-issues-windows-10-1809-and-windows-server-2019.yml b/windows/release-information/resolved-issues-windows-10-1809-and-windows-server-2019.yml index ba10d0ec4a..b8013ea114 100644 --- a/windows/release-information/resolved-issues-windows-10-1809-and-windows-server-2019.yml +++ b/windows/release-information/resolved-issues-windows-10-1809-and-windows-server-2019.yml @@ -31,29 +31,29 @@ sections: - items: - type: markdown text: " - - - - - - +
SummaryOriginating updateStatusDate resolved
End-user-defined characters (EUDC) may cause blue screen at startup
If you enable per font end-user-defined characters (EUDC), the system may stop working and a blue screen may appear at startup.

See details >
OS Build 17763.404

April 02, 2019
KB4490481
Resolved
KB4493509
April 09, 2019
10:00 AM PT
Internet Explorer 11 authentication issue with multiple concurrent logons
Internet Explorer 11 users may encounter issues if two or more people use the same user account for multiple, concurrent login sessions on the same Windows Server machine.

See details >
OS Build 17763.253

January 08, 2019
KB4480116
Resolved
KB4493509
April 09, 2019
10:00 AM PT
MSXML6 may cause applications to stop responding
MSXML6 may cause applications to stop responding if an exception was thrown during node operations, such as appendChild(), insertBefore(), and moveNode().

See details >
OS Build 17763.253

January 08, 2019
KB4480116
Resolved
KB4493509
April 09, 2019
10:00 AM PT
Apps may stop working after selecting an audio output device other than the default
Users with multiple audio devices that select an audio output device different from the \"Default Audio Device\" may find certain applications stop working unexpectedly.

See details >
OS Build 17763.348

March 01, 2019
KB4482887
Resolved
KB4490481
April 02, 2019
10:00 AM PT
Error 1309 when installing/uninstalling MSI or MSP files
Users may receive \"Error 1309\" while installing or uninstalling certain types of MSI and MSP files.

See details >
OS Build 17763.316

February 12, 2019
KB4487044
Resolved
KB4489899
March 12, 2019
10:00 AM PT
+ + + - - - - - - - - - - - - - - - - + + + + + + + + + + + + + + + + + +
SummaryOriginating updateStatusDate resolved
End-user-defined characters (EUDC) may cause blue screen at startup
If you enable per font end-user-defined characters (EUDC), the system may stop working and a blue screen may appear at startup.

See details >
OS Build 17763.404

April 02, 2019
KB4490481
Resolved
KB4493509
April 09, 2019
10:00 AM PT
Internet Explorer 11 authentication issue with multiple concurrent logons
Internet Explorer 11 users may encounter issues if two or more people use the same user account for multiple, concurrent login sessions on the same Windows Server machine.

See details >
OS Build 17763.253

January 08, 2019
KB4480116
Resolved
KB4493509
April 09, 2019
10:00 AM PT
Apps may stop working after selecting an audio output device other than the default
Users with multiple audio devices that select an audio output device different from the \"Default Audio Device\" may find certain applications stop working unexpectedly.

See details >
OS Build 17763.348

March 01, 2019
KB4482887
Resolved
KB4490481
April 02, 2019
10:00 AM PT
Global DNS outage affects Windows Update customers
Windows Update customers were recently affected by a network infrastructure event caused by an external DNS service provider's global outage.

See details >
N/A

Resolved
March 08, 2019
11:15 AM PT
Internet Explorer may fail to load images
Internet Explorer may fail to load images with a backslash (\\) in their relative source path.

See details >
OS Build 17763.316

February 12, 2019
KB4487044
Resolved
KB4482887
March 01, 2019
10:00 AM PT
Applications using Microsoft Jet database and Access 95 file format stop working
Applications that use a Microsoft Jet database with the Microsoft Access 9 file format may randomly stop working.

See details >
OS Build 17763.316

February 12, 2019
KB4487044
Resolved
KB4482887
March 01, 2019
10:00 AM PT
First character of the Japanese era name not recognized
The first character of the Japanese era name is not recognized as an abbreviation and may cause date parsing issues.

See details >
OS Build 17763.316

February 12, 2019
KB4487044
Resolved
KB4482887
March 01, 2019
10:00 AM PT
Shared albums may not sync with iCloud for Windows
Upgrade block: Apple has identified an incompatibility with iCloud for Windows (version 7.7.0.27) where users may experience issues updating or synching Shared Albums.

See details >
OS Build 17763.134

November 13, 2018
KB4467708
Resolved
KB4482887
March 01, 2019
10:00 AM PT
Intel Audio Display (intcdaud.sys) notification during Windows 10 Setup
Upgrade block: Users may see an Intel Audio Display (intcdaud.sys) notification during setup for devices with certain Intel Display Audio Drivers.

See details >
OS Build 17763.134

November 13, 2018
KB4467708
Resolved
KB4482887
March 01, 2019
10:00 AM PT
F5 VPN clients losing network connectivity
Upgrade block: After updating to Window 10, version 1809, F5 VPN clients may lose network connectivity when the VPN service is in a split tunnel configuration.

See details >
OS Build 17763.134

November 13, 2018
KB4467708
Resolved
KB4482887
March 01, 2019
10:00 AM PT
Webpages become unresponsive in Microsoft Edge
Microsoft Edge users report difficulty browsing and loading webpages.

See details >
OS Build 17763.253

January 08, 2019
KB4480116
Resolved
KB4487044
February 12, 2019
10:00 AM PT
Issues with lock screen and Microsoft Edge tabs for certain AMD Radeon video cards
Upgrade block: Devices utilizing AMD Radeon HD2000 or HD4000 series video cards may experience issues with the lock screen and Microsoft Edge tabs.

See details >
OS Build 17763.134

November 13, 2018
KB4467708
Resolved
KB4487044
February 12, 2019
10:00 AM PT
Trend Micro OfficeScan and Worry-Free Business Security AV software not compatible
Upgrade block: Microsoft and Trend Micro identified a compatibility issue with the Trend Micro business endpoint security solutions OfficeScan and Worry-Free Business Security.

See details >
OS Build 17763.134

November 13, 2018
KB4467708
Resolved
February 01, 2019
09:00 AM PT
Unable to access hotspots with third-party applications
Third-party applications may have difficulty authenticating hotspots.

See details >
OS Build 17763.253

January 08, 2019
KB4480116
Resolved
KB4476976
January 22, 2019
02:00 PM PT
Unable to use Seek bar in Windows Media Player
Users may not be able to use the Seek bar in Windows Media Player when playing specific files.

See details >
OS Build 17763.55

October 09, 2018
KB4464330
Resolved
KB4471332
December 11, 2018
10:00 AM PT
Audio stops working after installing Intel audio driver
Upgrade block: Windows 10 audio stops working after installing Intel Smart Sound Technology driver (version 09.21.00.3755).

See details >
OS Build 17763.134

November 13, 2018
KB4467708
Resolved
KB4468550
December 07, 2018
10:00 AM PT
Office apps (32-bit) unable to use 'Save As…' function
Upgrade block: Devices using Morphisec Protector (or other application that uses the Morphisec SDK) may be unable to save documents when using 32-bit Microsoft Office apps.

See details >
OS Build 17763.134

November 13, 2018
KB4467708
Resolved
December 06, 2018
12:00 PM PT
Users cannot set Win32 program defaults
Some users cannot set Win32 program defaults for certain app and file type combinations.

See details >
OS Build 17763.55

October 09, 2018
KB4464330
Resolved
KB4469342
December 05, 2018
02:00 PM PT
Mapped drives fail to reconnect after login
Upgrade block: Mapped drives may fail to reconnect after booting and logging on to a Windows device.

See details >
OS Build 17763.134

November 13, 2018
KB4467708
Resolved
KB4469342
December 05, 2018
02:00 PM PT
Microsoft Edge may crash or hang while playing video
Following an nVidia driver update, Microsoft Edge may crash or hang while playing video.

See details >
OS Build 17763.165

December 05, 2018
KB4469342
Resolved
November 29, 2018
10:03 AM PT
MSXML6 may cause applications to stop responding
MSXML6 may cause applications to stop responding if an exception was thrown during node operations, such as appendChild(), insertBefore(), and moveNode().

See details >
OS Build 17763.253

January 08, 2019
KB4480116
Resolved
KB4493509
April 09, 2019
10:00 AM PT
Internet Explorer may fail to load images
Internet Explorer may fail to load images with a backslash (\\) in their relative source path.

See details >
OS Build 17763.316

February 12, 2019
KB4487044
Resolved
KB4482887
March 01, 2019
10:00 AM PT
Users cannot set Win32 program defaults
Some users cannot set Win32 program defaults for certain app and file type combinations.

See details >
OS Build 17763.55

October 09, 2018
KB4464330
Resolved
KB4469342
December 05, 2018
02:00 PM PT
Microsoft Edge may crash or hang while playing video
Following an nVidia driver update, Microsoft Edge may crash or hang while playing video.

See details >
OS Build 17763.165

December 05, 2018
KB4469342
Resolved
November 29, 2018
10:03 AM PT
Unable to use Seek bar in Windows Media Player
Users may not be able to use the Seek bar in Windows Media Player when playing specific files.

See details >
OS Build 17763.55

October 09, 2018
KB4464330
Resolved
KB4471332
December 11, 2018
10:00 AM PT
Webpages become unresponsive in Microsoft Edge
Microsoft Edge users report difficulty browsing and loading webpages.

See details >
OS Build 17763.253

January 08, 2019
KB4480116
Resolved
KB4487044
February 12, 2019
10:00 AM PT
Unable to access hotspots with third-party applications
Third-party applications may have difficulty authenticating hotspots.

See details >
OS Build 17763.253

January 08, 2019
KB4480116
Resolved
KB4476976
January 22, 2019
02:00 PM PT
Error 1309 when installing/uninstalling MSI or MSP files
Users may receive \"Error 1309\" while installing or uninstalling certain types of MSI and MSP files.

See details >
OS Build 17763.316

February 12, 2019
KB4487044
Resolved
KB4489899
March 12, 2019
10:00 AM PT
Applications using Microsoft Jet database and Access 95 file format stop working
Applications that use a Microsoft Jet database with the Microsoft Access 9 file format may randomly stop working.

See details >
OS Build 17763.316

February 12, 2019
KB4487044
Resolved
KB4482887
March 01, 2019
10:00 AM PT
First character of the Japanese era name not recognized
The first character of the Japanese era name is not recognized as an abbreviation and may cause date parsing issues.

See details >
OS Build 17763.316

February 12, 2019
KB4487044
Resolved
KB4482887
March 01, 2019
10:00 AM PT
Audio stops working after installing Intel audio driver
Upgrade block: Windows 10 audio stops working after installing Intel Smart Sound Technology driver (version 09.21.00.3755).

See details >
OS Build 17763.134

November 13, 2018
KB4467708
Resolved
KB4468550
December 07, 2018
10:00 AM PT
Mapped drives fail to reconnect after login
Upgrade block: Mapped drives may fail to reconnect after booting and logging on to a Windows device.

See details >
OS Build 17763.134

November 13, 2018
KB4467708
Resolved
KB4469342
December 05, 2018
02:00 PM PT
Shared albums may not sync with iCloud for Windows
Upgrade block: Apple has identified an incompatibility with iCloud for Windows (version 7.7.0.27) where users may experience issues updating or synching Shared Albums.

See details >
OS Build 17763.134

November 13, 2018
KB4467708
Resolved
KB4482887
March 01, 2019
10:00 AM PT
Intel Audio Display (intcdaud.sys) notification during Windows 10 Setup
Upgrade block: Users may see an Intel Audio Display (intcdaud.sys) notification during setup for devices with certain Intel Display Audio Drivers.

See details >
OS Build 17763.134

November 13, 2018
KB4467708
Resolved
KB4482887
March 01, 2019
10:00 AM PT
Office apps (32-bit) unable to use 'Save As…' function
Upgrade block: Devices using Morphisec Protector (or other application that uses the Morphisec SDK) may be unable to save documents when using 32-bit Microsoft Office apps.

See details >
OS Build 17763.134

November 13, 2018
KB4467708
Resolved
December 06, 2018
12:00 PM PT
Trend Micro OfficeScan and Worry-Free Business Security AV software not compatible
Upgrade block: Microsoft and Trend Micro identified a compatibility issue with the Trend Micro business endpoint security solutions OfficeScan and Worry-Free Business Security.

See details >
OS Build 17763.134

November 13, 2018
KB4467708
Resolved
February 01, 2019
09:00 AM PT
Issues with lock screen and Microsoft Edge tabs for certain AMD Radeon video cards
Upgrade block: Devices utilizing AMD Radeon HD2000 or HD4000 series video cards may experience issues with the lock screen and Microsoft Edge tabs.

See details >
OS Build 17763.134

November 13, 2018
KB4467708
Resolved
KB4487044
February 12, 2019
10:00 AM PT
F5 VPN clients losing network connectivity
Upgrade block: After updating to Window 10, version 1809, F5 VPN clients may lose network connectivity when the VPN service is in a split tunnel configuration.

See details >
OS Build 17763.134

November 13, 2018
KB4467708
Resolved
KB4482887
March 01, 2019
10:00 AM PT
" @@ -68,8 +68,8 @@ sections: - items: - type: markdown text: " - - +
DetailsOriginating updateStatusHistory
End-user-defined characters (EUDC) may cause blue screen at startup
If you enable per font end-user-defined characters (EUDC), the system will stop working and a blue screen may appear at startup. This is not a common setting in non-Asian regions.

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016

Workaround: To avoid this issue, don't enable per font EUDC. As an alternative, you can edit the registry to mitigate this issue; for more information, see KB4496149.

Resolved: This issue was resolved in KB4493509.

Back to top
OS Build 17763.404

April 02, 2019
KB4490481
Resolved
KB4493509
Resolved:
April 09, 2019
10:00 AM PT

Opened:
April 02, 2019
10:00 AM PT
+
DetailsOriginating updateStatusHistory
End-user-defined characters (EUDC) may cause blue screen at startup
If you enable per font end-user-defined characters (EUDC), the system will stop working and a blue screen may appear at startup. This is not a common setting in non-Asian regions.

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016

Workaround: To avoid this issue, don't enable per font EUDC. As an alternative, you can edit the registry to mitigate this issue; for more information, see KB4496149.

Resolved: This issue was resolved in KB4493509.

Back to top
OS Build 17763.404

April 02, 2019
KB4490481
Resolved
KB4493509
Resolved:
April 09, 2019
10:00 AM PT

Opened:
April 02, 2019
10:00 AM PT
" @@ -77,8 +77,8 @@ sections: - items: - type: markdown text: " - - +
DetailsOriginating updateStatusHistory
Apps may stop working after selecting an audio output device other than the default
After installing KB4482887 on machines that have multiple audio devices, applications that provide advanced options for internal or external audio output devices may stop working unexpectedly. This issue occurs for users that select an audio output device different from the \"Default Audio Device\". Examples of applications that may stop working include: 
  • Windows Media Player 
  • Realtek HD Audio Manager 
  • Sound Blaster Control Panel 

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019
  • Server: Windows Server, version 1809; Windows Server 2019

Workaround: As a temporary solution, select the \"Default Audio Device\" in the options provided by the application; please refer to the application's user manual for details. 
For example, to set the Default Audio Device in Windows Media Player: 
  1. Open Windows Media Player > Tools > Options > Devices.
  2. Select the device and choose Properties.
  3. On the next dialog, from the drop-down menu under Select the Audio Device, choose Default Audio Device from the list. 
You can then send audio from the application to the audio device you want in the per-application audio settings found under Settings > System > Sound > App Volume and device preferences.

Resolved: This issue was resolved in KB4490481

Back to top
OS Build 17763.348

March 01, 2019
KB4482887
Resolved
KB4490481
Resolved:
April 02, 2019
10:00 AM PT

Opened:
March 01, 2019
10:00 AM PT
+
DetailsOriginating updateStatusHistory
Apps may stop working after selecting an audio output device other than the default
After installing KB4482887 on machines that have multiple audio devices, applications that provide advanced options for internal or external audio output devices may stop working unexpectedly. This issue occurs for users that select an audio output device different from the \"Default Audio Device\". Examples of applications that may stop working include: 
  • Windows Media Player 
  • Realtek HD Audio Manager 
  • Sound Blaster Control Panel 

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019
  • Server: Windows Server, version 1809; Windows Server 2019

Workaround: As a temporary solution, select the \"Default Audio Device\" in the options provided by the application; please refer to the application's user manual for details. 
For example, to set the Default Audio Device in Windows Media Player: 
  1. Open Windows Media Player > Tools > Options > Devices.
  2. Select the device and choose Properties.
  3. On the next dialog, from the drop-down menu under Select the Audio Device, choose Default Audio Device from the list. 
You can then send audio from the application to the audio device you want in the per-application audio settings found under Settings > System > Sound > App Volume and device preferences.

Resolved: This issue was resolved in KB4490481

Back to top
OS Build 17763.348

March 01, 2019
KB4482887
Resolved
KB4490481
Resolved:
April 02, 2019
10:00 AM PT

Opened:
March 01, 2019
10:00 AM PT
" @@ -86,11 +86,11 @@ sections: - items: - type: markdown text: " - - - - - +
DetailsOriginating updateStatusHistory
Error 1309 when installing/uninstalling MSI or MSP files
After installing KB4487044, users may receive \"Error 1309\" while installing or uninstalling certain types of MSI and MSP files. 

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 8.1
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2

Resolution: This issue is resolved in KB4489899

Back to top
OS Build 17763.316

February 12, 2019
KB4487044
Resolved
KB4489899
Resolved:
March 12, 2019
10:00 AM PT

Opened:
February 12, 2019
10:00 AM PT
Internet Explorer may fail to load images
After installing KB4487044, Internet Explorer may fail to load images with a backslash (\\) in their relative source path.

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 8.1; Windows 7, Service Pack 1
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2; Windows Server 2008 R2 SP1

Resolution: This issue is resolved in KB4482887.

Back to top
OS Build 17763.316

February 12, 2019
KB4487044
Resolved
KB4482887
Resolved:
March 01, 2019
10:00 AM PT

Opened:
February 12, 2019
10:00 AM PT
Applications using Microsoft Jet database and Access 95 file format stop working
Applications that use a Microsoft Jet database with the Microsoft Access 95 file format may randomly stop working.

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 7, Service Pack 1
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2008 R2 SP1

Resolution: This issue is resolved in KB4482887.

Back to top
OS Build 17763.316

February 12, 2019
KB4487044
Resolved
KB4482887
Resolved:
March 01, 2019
10:00 AM PT

Opened:
February 12, 2019
10:00 AM PT
First character of the Japanese era name not recognized
After installing KB4487044, the first character of the Japanese era name is not recognized as an abbreviation and may cause date parsing issues. 

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 8.1; Windows 7, Service Pack 1
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2; Windows Server 2008 R2 SP1

Resolution: This issue is resolved in KB4482887

Back to top
OS Build 17763.316

February 12, 2019
KB4487044
Resolved
KB4482887
Resolved:
March 01, 2019
10:00 AM PT

Opened:
February 12, 2019
10:00 AM PT
+ + + +
DetailsOriginating updateStatusHistory
Internet Explorer may fail to load images
After installing KB4487044, Internet Explorer may fail to load images with a backslash (\\) in their relative source path.

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 8.1; Windows 7, Service Pack 1
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2; Windows Server 2008 R2 SP1

Resolution: This issue is resolved in KB4482887.

Back to top
OS Build 17763.316

February 12, 2019
KB4487044
Resolved
KB4482887
Resolved:
March 01, 2019
10:00 AM PT

Opened:
February 12, 2019
10:00 AM PT
Error 1309 when installing/uninstalling MSI or MSP files
After installing KB4487044, users may receive \"Error 1309\" while installing or uninstalling certain types of MSI and MSP files. 

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 8.1
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2

Resolution: This issue is resolved in KB4489899

Back to top
OS Build 17763.316

February 12, 2019
KB4487044
Resolved
KB4489899
Resolved:
March 12, 2019
10:00 AM PT

Opened:
February 12, 2019
10:00 AM PT
Applications using Microsoft Jet database and Access 95 file format stop working
Applications that use a Microsoft Jet database with the Microsoft Access 95 file format may randomly stop working.

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 7, Service Pack 1
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2008 R2 SP1

Resolution: This issue is resolved in KB4482887.

Back to top
OS Build 17763.316

February 12, 2019
KB4487044
Resolved
KB4482887
Resolved:
March 01, 2019
10:00 AM PT

Opened:
February 12, 2019
10:00 AM PT
First character of the Japanese era name not recognized
After installing KB4487044, the first character of the Japanese era name is not recognized as an abbreviation and may cause date parsing issues. 

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 8.1; Windows 7, Service Pack 1
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2; Windows Server 2008 R2 SP1

Resolution: This issue is resolved in KB4482887

Back to top
OS Build 17763.316

February 12, 2019
KB4487044
Resolved
KB4482887
Resolved:
March 01, 2019
10:00 AM PT

Opened:
February 12, 2019
10:00 AM PT
" @@ -98,12 +98,12 @@ sections: - items: - type: markdown text: " - - - +
DetailsOriginating updateStatusHistory
Internet Explorer 11 authentication issue with multiple concurrent logons
After installing the February 12, 2019 update (KB4487044), Internet Explorer 11 and other applications that use WININET.DLL may have authentication issues. This occurs when two or more people use the same user account for multiple, concurrent login sessions on the same Windows Server machine, including Remote Desktop Protocol (RDP) and Terminal Server logons. Symptoms reported by customers include, but may not be limited to:  
  • Cache size and location show zero or empty. 
  • Keyboard shortcuts may not work properly. 
  • Webpages may intermittently fail to load or render correctly. 
  • Issues with credential prompts. 
  • Issues when downloading files. 

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10 Enterprise LTSC 2016; Windows 8.1; Windows 7, Service Pack 1
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server 2016; Windows Server 2012 R2; Windows Server 2008 R2 SP1
 
Resolved: This issue was resolved in KB4493509

Back to top
OS Build 17763.253

January 08, 2019
KB4480116
Resolved
KB4493509
Resolved:
April 09, 2019
10:00 AM PT

Opened:
January 08, 2019
10:00 AM PT
MSXML6 may cause applications to stop responding
After installing KB4480116, MSXML6 causes applications to stop responding if an exception was thrown during node operations, such as appendChild(), insertBefore(), and moveNode().
 
The Group Policy editor may stop responding when editing a Group Policy Object (GPO) that contains Group Policy Preferences (GPP) for Internet Explorer 10 settings. 

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 8.1
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2

Resolved: This issue was resolved in KB4493509

Back to top
OS Build 17763.253

January 08, 2019
KB4480116
Resolved
KB4493509
Resolved:
April 09, 2019
10:00 AM PT

Opened:
January 08, 2019
10:00 AM PT
+ - - + + +
DetailsOriginating updateStatusHistory
Internet Explorer 11 authentication issue with multiple concurrent logons
After installing the February 12, 2019 update (KB4487044), Internet Explorer 11 and other applications that use WININET.DLL may have authentication issues. This occurs when two or more people use the same user account for multiple, concurrent login sessions on the same Windows Server machine, including Remote Desktop Protocol (RDP) and Terminal Server logons. Symptoms reported by customers include, but may not be limited to:  
  • Cache size and location show zero or empty. 
  • Keyboard shortcuts may not work properly. 
  • Webpages may intermittently fail to load or render correctly. 
  • Issues with credential prompts. 
  • Issues when downloading files. 

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10 Enterprise LTSC 2016; Windows 8.1; Windows 7, Service Pack 1
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server 2016; Windows Server 2012 R2; Windows Server 2008 R2 SP1
 
Resolved: This issue was resolved in KB4493509

Back to top
OS Build 17763.253

January 08, 2019
KB4480116
Resolved
KB4493509
Resolved:
April 09, 2019
10:00 AM PT

Opened:
January 08, 2019
10:00 AM PT
Global DNS outage affects Windows Update customers
Windows Update customers were affected by a network infrastructure event on January 29, 2019 (21:00 UTC), caused by an external DNS service provider's global outage. A software update to the external provider's DNS servers resulted in the distribution of corrupted DNS records that affected connectivity to the Windows Update service. The DNS records were restored by January 30, 2019 (00:10 UTC), and the majority of local Internet Service Providers (ISP) have refreshed their DNS servers and customer services have been restored. 
 
Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019
  • Server: Windows Server, version 1809; Windows Server 2019

While this was not an issue with Microsoft's services, we take any service disruption for our customers seriously. We will work with partners to better understand this so we can provide higher quality service in the future even across diverse global network providers. 
 
If you are still unable to connect to Windows Update services due to this problem, please contact your local ISP or network administrator. You can also refer to our new KB4493784 for more information to determine if your network is affected, and to provide your local ISP or network administrator with additional information to assist you. 

Back to top
N/A

Resolved
Resolved:
March 08, 2019
11:15 AM PT

Opened:
January 29, 2019
02:00 PM PT
Webpages become unresponsive in Microsoft Edge
After installing KB4480116, some Microsoft Edge users report that they:
  • Cannot load webpages using a local IP address. 
  • Cannot load webpages on the Internet using a VPN connection.
Browsing fails or the webpage may become unresponsive.

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709

Resolution: This issue is resolved in KB4487044

Back to top
OS Build 17763.253

January 08, 2019
KB4480116
Resolved
KB4487044
Resolved:
February 12, 2019
10:00 AM PT

Opened:
January 08, 2019
10:00 AM PT
Unable to access hotspots with third-party applications
After installing KB4480116, third-party applications may have difficulty authenticating hotspots. 

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 8.1
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2

Resolution: This issue is resolved in KB4476976

Back to top
OS Build 17763.253

January 08, 2019
KB4480116
Resolved
KB4476976
Resolved:
January 22, 2019
02:00 PM PT

Opened:
January 08, 2019
10:00 AM PT
MSXML6 may cause applications to stop responding
After installing KB4480116, MSXML6 causes applications to stop responding if an exception was thrown during node operations, such as appendChild(), insertBefore(), and moveNode().
 
The Group Policy editor may stop responding when editing a Group Policy Object (GPO) that contains Group Policy Preferences (GPP) for Internet Explorer 10 settings. 

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 8.1
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2

Resolved: This issue was resolved in KB4493509

Back to top
OS Build 17763.253

January 08, 2019
KB4480116
Resolved
KB4493509
Resolved:
April 09, 2019
10:00 AM PT

Opened:
January 08, 2019
10:00 AM PT
Webpages become unresponsive in Microsoft Edge
After installing KB4480116, some Microsoft Edge users report that they:
  • Cannot load webpages using a local IP address. 
  • Cannot load webpages on the Internet using a VPN connection.
Browsing fails or the webpage may become unresponsive.

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709

Resolution: This issue is resolved in KB4487044

Back to top
OS Build 17763.253

January 08, 2019
KB4480116
Resolved
KB4487044
Resolved:
February 12, 2019
10:00 AM PT

Opened:
January 08, 2019
10:00 AM PT
Unable to access hotspots with third-party applications
After installing KB4480116, third-party applications may have difficulty authenticating hotspots. 

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 8.1
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2

Resolution: This issue is resolved in KB4476976

Back to top
OS Build 17763.253

January 08, 2019
KB4480116
Resolved
KB4476976
Resolved:
January 22, 2019
02:00 PM PT

Opened:
January 08, 2019
10:00 AM PT
" @@ -111,8 +111,8 @@ sections: - items: - type: markdown text: " - - +
DetailsOriginating updateStatusHistory
Microsoft Edge may crash or hang while playing video
nVidia has notified Microsoft of an issue where Microsoft Edge may crash or hang while playing video. This issue occurs following an nVidia driver update.

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019
  • Server: Windows Server, version 1809; Windows Server 2019

Resolution: nVidia has released an updated driver to address this issue. Please follow the instructions found in nVidia's support article

Back to top
OS Build 17763.165

December 05, 2018
KB4469342
Resolved
Resolved:
November 29, 2018
10:03 AM PT

Opened:
December 05, 2018
02:00 PM PT
+
DetailsOriginating updateStatusHistory
Microsoft Edge may crash or hang while playing video
nVidia has notified Microsoft of an issue where Microsoft Edge may crash or hang while playing video. This issue occurs following an nVidia driver update.

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019
  • Server: Windows Server, version 1809; Windows Server 2019

Resolution: nVidia has released an updated driver to address this issue. Please follow the instructions found in nVidia's support article

Back to top
OS Build 17763.165

December 05, 2018
KB4469342
Resolved
Resolved:
November 29, 2018
10:03 AM PT

Opened:
December 05, 2018
02:00 PM PT
" @@ -120,15 +120,15 @@ sections: - items: - type: markdown text: " - - - - - - - - - +
DetailsOriginating updateStatusHistory
Shared albums may not sync with iCloud for Windows
Upgrade block: Users who attempt to install iCloud for Windows (version 7.7.0.27) will see a message displayed that this version iCloud for Windows isn't supported and the install will fail.

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019
  • Server: Windows Server, version 1809; Windows Server 2019

To ensure a seamless experience, Microsoft is blocking devices with iCloud for Windows (version 7.7.0.27) software installed from being offered Window 10, version 1809 until this issue has been resolved. 

We recommend that you do not attempt to manually update using the Update now button or the Media Creation Tool from the Microsoft software download website until this issue is resolved. 
 
Resolution: Apple has released an updated version of iCloud for Windows (version 7.8.1) that resolves compatibility issues encountered when updating or synching Shared Albums after updating to Windows 10, version 1809. We recommend that you update your iCloud for Windows to version 7.8.1 when prompted before attempting to upgrade to Windows 10, version 1809. You can also manually download the latest version of iCloud for Windows by visiting https://support.apple.com/en-us/HT204283.

Back to top
OS Build 17763.134

November 13, 2018
KB4467708
Resolved
KB4482887
Resolved:
March 01, 2019
10:00 AM PT

Opened:
November 13, 2018
10:00 AM PT
Intel Audio Display (intcdaud.sys) notification during Windows 10 Setup
Upgrade block: Microsoft and Intel have identified a compatibility issue with a range of Intel Display Audio device drivers (intcdaud.sys, versions 10.25.0.3 - 10.25.0.8) that may result in excessive processor demand and reduced battery life. As a result, the update process to the Windows 10 October 2018 Update (Windows 10, version 1809) will fail and affected devices will automatically revert to the previous working configuration. 

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019
  • Server: Windows Server, version 1809; Windows Server 2019

If you see a \"What needs your attention\" notification during installation of the October 2018 Update, you have one of these affected drivers on your system. On the notification, click Back to remain on your current version of Windows 10. 
 
To ensure a seamless experience, we are blocking devices from being offered the October 2018 Update until updated Intel device drivers are installed on your current operating system. We recommend that you do not attempt to manually update to Windows 10, version 1809, using the Update Now button or the Media Creation Tool from the Microsoft Software Download Center until newer Intel device drivers are available with the update. You can either wait for newer drivers to be installed automatically through Windows Update or check with your computer manufacturer for the latest device driver software availability and installation procedures. For more information about this issue, see Intel's customer support guidance.
 
Resolution: This issue was resolved in KB4482887 and the upgrade block removed. 

Back to top
OS Build 17763.134

November 13, 2018
KB4467708
Resolved
KB4482887
Resolved:
March 01, 2019
10:00 AM PT

Opened:
November 13, 2018
10:00 AM PT
F5 VPN clients losing network connectivity
Upgrade block: After updating to Window 10, version 1809, F5 VPN clients may lose network connectivity when the VPN service is in a split tunnel configuration.

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019
  • Server: Windows Server, version 1809; Windows Server 2019

Resolution: This issue was resolved in KB4482887 and the upgrade block removed. 

Back to top
OS Build 17763.134

November 13, 2018
KB4467708
Resolved
KB4482887
Resolved:
March 01, 2019
10:00 AM PT

Opened:
November 13, 2018
10:00 AM PT
Issues with lock screen and Microsoft Edge tabs for certain AMD Radeon video cards
Note: AMD no longer supports Radeon HD2000 and HD4000 series graphic processor units (GPUs).
 
Upgrade block: After updating to Window 10, version 1809, Microsoft Edge tabs may stop working when a device is configured with AMD Radeon HD2000 or HD4000 series video cards. Customers may get the following error code: \"INVALID_POINTER_READ_c0000005_atidxx64.dll\". 
 
Some users may also experience performance issues with the lock screen or the ShellExperienceHost. (The lock screen hosts widgets, and the ShellExperienceHost is responsible for assorted shell functionality.) 

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019
  • Server: Windows Server, version 1809; Windows Server 2019

Resolution: This issue was resolved in KB4487044, and the block was removed.

Back to top
OS Build 17763.134

November 13, 2018
KB4467708
Resolved
KB4487044
Resolved:
February 12, 2019
10:00 AM PT

Opened:
November 13, 2018
10:00 AM PT
Trend Micro OfficeScan and Worry-Free Business Security AV software not compatible
Upgrade block: Microsoft and Trend Micro have identified a compatibility issue with Trend Micro's OfficeScan and Worry-Free Business Security software when attempting to update to Windows 10, version 1809.

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019
  • Server: Windows Server, version 1809; Windows Server 2019 

Resolution: Trend Micro has released a new version of these products that resolves the issue. To download them, please visit the Trend Micro Business Support Portal.

Once you have updated your version of Trend Micro's OfficeScan or Worry-Free Business Security software, you will be offered Windows 10, version 1809 automatically. 

Back to top
OS Build 17763.134

November 13, 2018
KB4467708
Resolved
Resolved:
February 01, 2019
09:00 AM PT

Opened:
November 13, 2018
10:00 AM PT
Audio stops working after installing Intel audio driver
Upgrade block: Intel unintentionally released version 9.21.00.3755 of the Intel Smart Sound Technology (ISST) Driver through Windows Update and inadvertently offered it to a range of devices running Window 10, version 1709, 1803, and 1809. If a device contained a compatible audio driver, the new driver overrode it and caused audio to stop working.

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019
  • Server: Windows Server, version 1809; Windows Server 2019
 
Resolution: This issue was resolved in KB4468550 and the upgrade block removed. 

Back to top
OS Build 17763.134

November 13, 2018
KB4467708
Resolved
KB4468550
Resolved:
December 07, 2018
10:00 AM PT

Opened:
November 13, 2018
10:00 AM PT
Office apps (32-bit) unable to use 'Save As…' function
Upgrade block: Microsoft and Morphisec have identified an issue on devices that have installed Morphisec Protector or another application that uses the Morphisec Software Development Kit (SDK) including Cisco AMP for Endpoints. These applications may impact customers' ability to use the 'Save As.'dialog when saving documents in 32-bit versions of Microsoft Office applications. Saving of files is not impacted.

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019
  • Server: Windows Server, version 1809; Windows Server 2019

Resolution: Morphisec and Cisco have released updated versions of their applications to address this issue. We recommend customers update to these minimum versions before attempting to attempting to upgrade to Windows 10, version 1809:
  • Morphisec Protector version 2.4.8 
  • Cisco AMP for Endpoints version 6.2.3.10814

An upgrade block remains in place for earlier versions of the applications than those listed above.

Back to top
OS Build 17763.134

November 13, 2018
KB4467708
Resolved
Resolved:
December 06, 2018
12:00 PM PT

Opened:
November 13, 2018
10:00 AM PT
Mapped drives fail to reconnect after login
Upgrade block: Network drives may fail to reconnect after booting and logging on to a Windows device. Symptoms include:  
  • In Windows Explorer, a red X appears on the mapped network drives. 
  • Mapped network drives show as Unavailable when you run the net use command from a command prompt. 
  • In the notification area, a notification displays the following message, \"Could not reconnect all network drives.\"

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019
  • Server: Windows Server, version 1809; Windows Server 2019

Resolution: This issue was resolved in KB4469342 and the upgrade block removed. 

Back to top
OS Build 17763.134

November 13, 2018
KB4467708
Resolved
KB4469342
Resolved:
December 05, 2018
02:00 PM PT

Opened:
November 13, 2018
10:00 AM PT
+ + + + + + + +
DetailsOriginating updateStatusHistory
Audio stops working after installing Intel audio driver
Upgrade block: Intel unintentionally released version 9.21.00.3755 of the Intel Smart Sound Technology (ISST) Driver through Windows Update and inadvertently offered it to a range of devices running Window 10, version 1709, 1803, and 1809. If a device contained a compatible audio driver, the new driver overrode it and caused audio to stop working.

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019
  • Server: Windows Server, version 1809; Windows Server 2019
 
Resolution: This issue was resolved in KB4468550 and the upgrade block removed. 

Back to top
OS Build 17763.134

November 13, 2018
KB4467708
Resolved
KB4468550
Resolved:
December 07, 2018
10:00 AM PT

Opened:
November 13, 2018
10:00 AM PT
Mapped drives fail to reconnect after login
Upgrade block: Network drives may fail to reconnect after booting and logging on to a Windows device. Symptoms include:  
  • In Windows Explorer, a red X appears on the mapped network drives. 
  • Mapped network drives show as Unavailable when you run the net use command from a command prompt. 
  • In the notification area, a notification displays the following message, \"Could not reconnect all network drives.\"

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019
  • Server: Windows Server, version 1809; Windows Server 2019

Resolution: This issue was resolved in KB4469342 and the upgrade block removed. 

Back to top
OS Build 17763.134

November 13, 2018
KB4467708
Resolved
KB4469342
Resolved:
December 05, 2018
02:00 PM PT

Opened:
November 13, 2018
10:00 AM PT
Shared albums may not sync with iCloud for Windows
Upgrade block: Users who attempt to install iCloud for Windows (version 7.7.0.27) will see a message displayed that this version iCloud for Windows isn't supported and the install will fail.

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019
  • Server: Windows Server, version 1809; Windows Server 2019

To ensure a seamless experience, Microsoft is blocking devices with iCloud for Windows (version 7.7.0.27) software installed from being offered Window 10, version 1809 until this issue has been resolved. 

We recommend that you do not attempt to manually update using the Update now button or the Media Creation Tool from the Microsoft software download website until this issue is resolved. 
 
Resolution: Apple has released an updated version of iCloud for Windows (version 7.8.1) that resolves compatibility issues encountered when updating or synching Shared Albums after updating to Windows 10, version 1809. We recommend that you update your iCloud for Windows to version 7.8.1 when prompted before attempting to upgrade to Windows 10, version 1809. You can also manually download the latest version of iCloud for Windows by visiting https://support.apple.com/en-us/HT204283.

Back to top
OS Build 17763.134

November 13, 2018
KB4467708
Resolved
KB4482887
Resolved:
March 01, 2019
10:00 AM PT

Opened:
November 13, 2018
10:00 AM PT
Intel Audio Display (intcdaud.sys) notification during Windows 10 Setup
Upgrade block: Microsoft and Intel have identified a compatibility issue with a range of Intel Display Audio device drivers (intcdaud.sys, versions 10.25.0.3 - 10.25.0.8) that may result in excessive processor demand and reduced battery life. As a result, the update process to the Windows 10 October 2018 Update (Windows 10, version 1809) will fail and affected devices will automatically revert to the previous working configuration. 

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019
  • Server: Windows Server, version 1809; Windows Server 2019

If you see a \"What needs your attention\" notification during installation of the October 2018 Update, you have one of these affected drivers on your system. On the notification, click Back to remain on your current version of Windows 10. 
 
To ensure a seamless experience, we are blocking devices from being offered the October 2018 Update until updated Intel device drivers are installed on your current operating system. We recommend that you do not attempt to manually update to Windows 10, version 1809, using the Update Now button or the Media Creation Tool from the Microsoft Software Download Center until newer Intel device drivers are available with the update. You can either wait for newer drivers to be installed automatically through Windows Update or check with your computer manufacturer for the latest device driver software availability and installation procedures. For more information about this issue, see Intel's customer support guidance.
 
Resolution: This issue was resolved in KB4482887 and the upgrade block removed. 

Back to top
OS Build 17763.134

November 13, 2018
KB4467708
Resolved
KB4482887
Resolved:
March 01, 2019
10:00 AM PT

Opened:
November 13, 2018
10:00 AM PT
Office apps (32-bit) unable to use 'Save As…' function
Upgrade block: Microsoft and Morphisec have identified an issue on devices that have installed Morphisec Protector or another application that uses the Morphisec Software Development Kit (SDK) including Cisco AMP for Endpoints. These applications may impact customers' ability to use the 'Save As.'dialog when saving documents in 32-bit versions of Microsoft Office applications. Saving of files is not impacted.

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019
  • Server: Windows Server, version 1809; Windows Server 2019

Resolution: Morphisec and Cisco have released updated versions of their applications to address this issue. We recommend customers update to these minimum versions before attempting to attempting to upgrade to Windows 10, version 1809:
  • Morphisec Protector version 2.4.8 
  • Cisco AMP for Endpoints version 6.2.3.10814

An upgrade block remains in place for earlier versions of the applications than those listed above.

Back to top
OS Build 17763.134

November 13, 2018
KB4467708
Resolved
Resolved:
December 06, 2018
12:00 PM PT

Opened:
November 13, 2018
10:00 AM PT
Trend Micro OfficeScan and Worry-Free Business Security AV software not compatible
Upgrade block: Microsoft and Trend Micro have identified a compatibility issue with Trend Micro's OfficeScan and Worry-Free Business Security software when attempting to update to Windows 10, version 1809.

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019
  • Server: Windows Server, version 1809; Windows Server 2019 

Resolution: Trend Micro has released a new version of these products that resolves the issue. To download them, please visit the Trend Micro Business Support Portal.

Once you have updated your version of Trend Micro's OfficeScan or Worry-Free Business Security software, you will be offered Windows 10, version 1809 automatically. 

Back to top
OS Build 17763.134

November 13, 2018
KB4467708
Resolved
Resolved:
February 01, 2019
09:00 AM PT

Opened:
November 13, 2018
10:00 AM PT
Issues with lock screen and Microsoft Edge tabs for certain AMD Radeon video cards
Note: AMD no longer supports Radeon HD2000 and HD4000 series graphic processor units (GPUs).
 
Upgrade block: After updating to Window 10, version 1809, Microsoft Edge tabs may stop working when a device is configured with AMD Radeon HD2000 or HD4000 series video cards. Customers may get the following error code: \"INVALID_POINTER_READ_c0000005_atidxx64.dll\". 
 
Some users may also experience performance issues with the lock screen or the ShellExperienceHost. (The lock screen hosts widgets, and the ShellExperienceHost is responsible for assorted shell functionality.) 

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019
  • Server: Windows Server, version 1809; Windows Server 2019

Resolution: This issue was resolved in KB4487044, and the block was removed.

Back to top
OS Build 17763.134

November 13, 2018
KB4467708
Resolved
KB4487044
Resolved:
February 12, 2019
10:00 AM PT

Opened:
November 13, 2018
10:00 AM PT
F5 VPN clients losing network connectivity
Upgrade block: After updating to Window 10, version 1809, F5 VPN clients may lose network connectivity when the VPN service is in a split tunnel configuration.

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019
  • Server: Windows Server, version 1809; Windows Server 2019

Resolution: This issue was resolved in KB4482887 and the upgrade block removed. 

Back to top
OS Build 17763.134

November 13, 2018
KB4467708
Resolved
KB4482887
Resolved:
March 01, 2019
10:00 AM PT

Opened:
November 13, 2018
10:00 AM PT
" @@ -136,8 +136,8 @@ sections: - items: - type: markdown text: " - - - +
DetailsOriginating updateStatusHistory
Unable to use Seek bar in Windows Media Player
After installing KB4464330, users may not be able to use the Seek bar in Windows Media Player when playing specific files. This issue does not affect normal playback. 

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 8.1; Windows 7, Service Pack 1
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2; Windows Server 2008 R2 SP1

Resolution: This issue is resolved in KB4471332

Back to top
OS Build 17763.55

October 09, 2018
KB4464330
Resolved
KB4471332
Resolved:
December 11, 2018
10:00 AM PT

Opened:
October 09, 2018
10:00 AM PT
Users cannot set Win32 program defaults
After installing KB4464330, some users cannot set Win32 program defaults for certain app and file type combinations using the Open with... command or Settings > Apps > Default apps.
 
In some cases, Microsoft Notepad or other Win32 programs cannot be set as the default. 

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803

Resolution: This issue is resolved in KB4469342

Back to top
OS Build 17763.55

October 09, 2018
KB4464330
Resolved
KB4469342
Resolved:
December 05, 2018
02:00 PM PT

Opened:
October 09, 2018
10:00 AM PT
+ +
DetailsOriginating updateStatusHistory
Users cannot set Win32 program defaults
After installing KB4464330, some users cannot set Win32 program defaults for certain app and file type combinations using the Open with... command or Settings > Apps > Default apps.
 
In some cases, Microsoft Notepad or other Win32 programs cannot be set as the default. 

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803

Resolution: This issue is resolved in KB4469342

Back to top
OS Build 17763.55

October 09, 2018
KB4464330
Resolved
KB4469342
Resolved:
December 05, 2018
02:00 PM PT

Opened:
October 09, 2018
10:00 AM PT
Unable to use Seek bar in Windows Media Player
After installing KB4464330, users may not be able to use the Seek bar in Windows Media Player when playing specific files. This issue does not affect normal playback. 

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 8.1; Windows 7, Service Pack 1
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2; Windows Server 2008 R2 SP1

Resolution: This issue is resolved in KB4471332

Back to top
OS Build 17763.55

October 09, 2018
KB4464330
Resolved
KB4471332
Resolved:
December 11, 2018
10:00 AM PT

Opened:
October 09, 2018
10:00 AM PT
" diff --git a/windows/release-information/resolved-issues-windows-7-and-windows-server-2008-r2-sp1.yml b/windows/release-information/resolved-issues-windows-7-and-windows-server-2008-r2-sp1.yml index 47a53752d1..8ec9481208 100644 --- a/windows/release-information/resolved-issues-windows-7-and-windows-server-2008-r2-sp1.yml +++ b/windows/release-information/resolved-issues-windows-7-and-windows-server-2008-r2-sp1.yml @@ -31,19 +31,19 @@ sections: - items: - type: markdown text: " - - - - - - - - - - - - - +
SummaryOriginating updateStatusDate resolved
Virtual machines fail to restore.
Virtual machines (VMs) may fail to restore successfully if the VM has been saved and restored once before.

See details >
January 08, 2019
KB4480970
Resolved
KB4490511
April 21, 2019
12:00 AM PT
Local Administrators unable to remotely access shares.
Local users who are part of the local Administrators group may not be able to remotely access shares on Windows Server 2008 R2 and Windows 7 machines.

See details >
January 08, 2019
KB4480970
Resolved
KB4487345
April 20, 2019
11:53 PM PT
Internet Explorer 11 authentication issue with multiple concurrent logons.
Internet Explorer 11 users may encounter issues if two or more people use the same user account for multiple, concurrent login sessions on the same Windows Server machine.

See details >
January 08, 2019
KB4480970
Resolved
KB4493472
April 09, 2019
10:00 AM PT
Custom URI schemes may not start corresponding application.
Custom URI schemes for application protocol handlers may not start the corresponding application for local intranet and trusted sites in Internet Explorer.

See details >
March 12, 2019
KB4489878
Resolved
KB4493472
April 09, 2019
10:00 AM PT
NETDOM.EXE fails to run.
NETDOM.EXE fails to run and the error, “The command failed to complete successfully.” appears on screen.

See details >
March 12, 2019
KB4489878
Resolved
KB4493472
April 09, 2019
10:00 AM PT
Devices may not respond at login or Welcome screen if running certain Avast software.
Devices running Avast for Business, Avast CloudCare, and AVG Business Edition antivirus software may become unresponsive after restart.

See details >
April 09, 2019
KB4493472
Resolved
April 09, 2019
10:00 AM PT
Event Viewer may not show some event descriptions for network interface cards.
The Event Viewer may not show some event descriptions for network interface cards (NIC).

See details >
October 18, 2018
KB4462927
Resolved
KB4489878
March 12, 2019
10:00 AM PT
First character of the Japanese era name not recognized as an abbreviation.
The first character of the Japanese era name is not recognized as an abbreviation and may cause date parsing issues.

See details >
January 17, 2019
KB4480955
Resolved
KB4486565
February 19, 2019
02:00 PM PT
Internet Explorer may fail to load images.
Internet Explorer may fail to load images with a backslash (\\) in their relative source path.

See details >
February 12, 2019
KB4486563
Resolved
KB4486565
February 19, 2019
02:00 PM PT
Applications using Microsoft Jet database and Access 95 file format stop working.
Applications that use a Microsoft Jet database with the Microsoft Access 95 file format may randomly stop working.

See details >
February 12, 2019
KB4486563
Resolved
KB4486565
February 19, 2019
02:00 PM PT
Applications using Microsoft Jet database fail to open.
Applications that use a Microsoft Jet database with the Microsoft Access 97 file format may fail to open if column names are greater than 32 characters.

See details >
January 08, 2019
KB4480970
Resolved
KB4486563
February 12, 2019
10:00 AM PT
Unable to use Seek bar in Windows Media Player
Users may not be able to use the Seek bar in Windows Media Player when playing specific files.

See details >
October 09, 2018
KB4462923
Resolved
KB4471318
December 11, 2018
10:00 AM PT
+ + + + + + + + + + + +
SummaryOriginating updateStatusDate resolved
Unable to use Seek bar in Windows Media Player
Users may not be able to use the Seek bar in Windows Media Player when playing specific files.

See details >
October 09, 2018
KB4462923
Resolved
KB4471318
December 11, 2018
10:00 AM PT
Event Viewer may not show some event descriptions for network interface cards.
The Event Viewer may not show some event descriptions for network interface cards (NIC).

See details >
October 18, 2018
KB4462927
Resolved
KB4489878
March 12, 2019
10:00 AM PT
Local Administrators unable to remotely access shares.
Local users who are part of the local Administrators group may not be able to remotely access shares on Windows Server 2008 R2 and Windows 7 machines.

See details >
January 08, 2019
KB4480970
Resolved
KB4487345
April 20, 2019
11:53 PM PT
Applications using Microsoft Jet database fail to open.
Applications that use a Microsoft Jet database with the Microsoft Access 97 file format may fail to open if column names are greater than 32 characters.

See details >
January 08, 2019
KB4480970
Resolved
KB4486563
February 12, 2019
10:00 AM PT
Virtual machines fail to restore.
Virtual machines (VMs) may fail to restore successfully if the VM has been saved and restored once before.

See details >
January 08, 2019
KB4480970
Resolved
KB4490511
April 21, 2019
12:00 AM PT
Internet Explorer 11 authentication issue with multiple concurrent logons.
Internet Explorer 11 users may encounter issues if two or more people use the same user account for multiple, concurrent login sessions on the same Windows Server machine.

See details >
January 08, 2019
KB4480970
Resolved
KB4493472
April 09, 2019
10:00 AM PT
First character of the Japanese era name not recognized as an abbreviation.
The first character of the Japanese era name is not recognized as an abbreviation and may cause date parsing issues.

See details >
January 17, 2019
KB4480955
Resolved
KB4486565
February 19, 2019
02:00 PM PT
Internet Explorer may fail to load images.
Internet Explorer may fail to load images with a backslash (\\) in their relative source path.

See details >
February 12, 2019
KB4486563
Resolved
KB4486565
February 19, 2019
02:00 PM PT
Applications using Microsoft Jet database and Access 95 file format stop working.
Applications that use a Microsoft Jet database with the Microsoft Access 95 file format may randomly stop working.

See details >
February 12, 2019
KB4486563
Resolved
KB4486565
February 19, 2019
02:00 PM PT
Custom URI schemes may not start corresponding application.
Custom URI schemes for application protocol handlers may not start the corresponding application for local intranet and trusted sites in Internet Explorer.

See details >
March 12, 2019
KB4489878
Resolved
KB4493472
April 09, 2019
10:00 AM PT
NETDOM.EXE fails to run.
NETDOM.EXE fails to run and the error, “The command failed to complete successfully.” appears on screen.

See details >
March 12, 2019
KB4489878
Resolved
KB4493472
April 09, 2019
10:00 AM PT
Devices may not respond at login or Welcome screen if running certain Avast software.
Devices running Avast for Business, Avast CloudCare, and AVG Business Edition antivirus software may become unresponsive after restart.

See details >
April 09, 2019
KB4493472
Resolved
April 09, 2019
10:00 AM PT
" @@ -58,8 +58,8 @@ sections: - items: - type: markdown text: " - - +
DetailsOriginating updateStatusHistory
Devices may not respond at login or Welcome screen if running certain Avast software.
Microsoft and Avast have identified an issue on devices running Avast for Business, Avast CloudCare, and AVG Business Edition antivirus software after you install KB4493472 and restart. Devices may become unresponsive at the login or Welcome screen. Additionally, you may be unable to log in or log in after an extended period of time.

Affected platforms: 
  • Client: Windows 8.1; Windows 7, Service Pack 1 
  • Server: Windows Server 2012 R2; Windows Server 2008 R2 SP1 

Resolution: Avast has released emergency updates to address this issue. For more information and AV update schedule, see the Avast support KB article.

Back to top
April 09, 2019
KB4493472
Resolved
Resolved:
April 09, 2019
10:00 AM PT

Opened:
April 09, 2019
10:00 AM PT
+
DetailsOriginating updateStatusHistory
Devices may not respond at login or Welcome screen if running certain Avast software.
Microsoft and Avast have identified an issue on devices running Avast for Business, Avast CloudCare, and AVG Business Edition antivirus software after you install KB4493472 and restart. Devices may become unresponsive at the login or Welcome screen. Additionally, you may be unable to log in or log in after an extended period of time.

Affected platforms: 
  • Client: Windows 8.1; Windows 7, Service Pack 1 
  • Server: Windows Server 2012 R2; Windows Server 2008 R2 SP1 

Resolution: Avast has released emergency updates to address this issue. For more information and AV update schedule, see the Avast support KB article.

Back to top
April 09, 2019
KB4493472
Resolved
Resolved:
April 09, 2019
10:00 AM PT

Opened:
April 09, 2019
10:00 AM PT
" @@ -67,9 +67,9 @@ sections: - items: - type: markdown text: " - - - +
DetailsOriginating updateStatusHistory
Custom URI schemes may not start corresponding application.
After installing KB4489878, custom URI schemes for application protocol handlers may not start the corresponding application for local intranet and trusted sites on Internet Explorer.

Affected platforms: 
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 8.1; Windows 7, Service Pack 1 
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2; Windows Server 2008 R2 SP1 

Resolution: This issue is resolved in KB4493472.

Back to top
March 12, 2019
KB4489878
Resolved
KB4493472
Resolved:
April 09, 2019
10:00 AM PT

Opened:
March 12, 2019
10:00 AM PT
NETDOM.EXE fails to run.
After installing KB4489878, NETDOM.EXE fails to run, and the on-screen error, “The command failed to complete successfully.” appears.

Affected platforms: 
  • Client: Windows 7, Service Pack 1 
  • Server: Windows Server 2008 R2 SP1 

Resolution: This issue is resolved in KB4493472.

Back to top
March 12, 2019
KB4489878
Resolved
KB4493472
Resolved:
April 09, 2019
10:00 AM PT

Opened:
March 12, 2019
10:00 AM PT
+ +
DetailsOriginating updateStatusHistory
Custom URI schemes may not start corresponding application.
After installing KB4489878, custom URI schemes for application protocol handlers may not start the corresponding application for local intranet and trusted sites on Internet Explorer.

Affected platforms: 
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 8.1; Windows 7, Service Pack 1 
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2; Windows Server 2008 R2 SP1 

Resolution: This issue is resolved in KB4493472.

Back to top
March 12, 2019
KB4489878
Resolved
KB4493472
Resolved:
April 09, 2019
10:00 AM PT

Opened:
March 12, 2019
10:00 AM PT
NETDOM.EXE fails to run.
After installing KB4489878, NETDOM.EXE fails to run, and the on-screen error, “The command failed to complete successfully.” appears.

Affected platforms: 
  • Client: Windows 7, Service Pack 1 
  • Server: Windows Server 2008 R2 SP1 

Resolution: This issue is resolved in KB4493472.

Back to top
March 12, 2019
KB4489878
Resolved
KB4493472
Resolved:
April 09, 2019
10:00 AM PT

Opened:
March 12, 2019
10:00 AM PT
" @@ -77,9 +77,9 @@ sections: - items: - type: markdown text: " - - - +
DetailsOriginating updateStatusHistory
Internet Explorer may fail to load images.
After installing KB4486563, Internet Explorer may fail to load images with a backslash (\\) in their relative source path.

Affected platforms: 
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 8.1; Windows 7, Service Pack 1 
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2; Windows Server 2008 R2 SP1 

Resolution: This issue is resolved in KB4486565.

Back to top
February 12, 2019
KB4486563
Resolved
KB4486565
Resolved:
February 19, 2019
02:00 PM PT

Opened:
February 12, 2019
10:00 AM PT
Applications using Microsoft Jet database and Access 95 file format stop working.
Applications that use a Microsoft Jet database with the Microsoft Access 95 file format may randomly stop working.

Affected platforms: 
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 7, Service Pack 1 
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2008 R2 SP1 

Resolution: This issue is resolved in KB4486565.

Back to top
February 12, 2019
KB4486563
Resolved
KB4486565
Resolved:
February 19, 2019
02:00 PM PT

Opened:
February 12, 2019
10:00 AM PT
+ +
DetailsOriginating updateStatusHistory
Internet Explorer may fail to load images.
After installing KB4486563, Internet Explorer may fail to load images with a backslash (\\) in their relative source path.

Affected platforms: 
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 8.1; Windows 7, Service Pack 1 
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2; Windows Server 2008 R2 SP1 

Resolution: This issue is resolved in KB4486565.

Back to top
February 12, 2019
KB4486563
Resolved
KB4486565
Resolved:
February 19, 2019
02:00 PM PT

Opened:
February 12, 2019
10:00 AM PT
Applications using Microsoft Jet database and Access 95 file format stop working.
Applications that use a Microsoft Jet database with the Microsoft Access 95 file format may randomly stop working.

Affected platforms: 
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 7, Service Pack 1 
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2008 R2 SP1 

Resolution: This issue is resolved in KB4486565.

Back to top
February 12, 2019
KB4486563
Resolved
KB4486565
Resolved:
February 19, 2019
02:00 PM PT

Opened:
February 12, 2019
10:00 AM PT
" @@ -87,12 +87,12 @@ sections: - items: - type: markdown text: " - - - - - - +
DetailsOriginating updateStatusHistory
Virtual machines fail to restore.
After installing KB4480970, virtual machines (VM) may fail to restore successfully if the VM has been saved and restored once before. The error message is, “Failed to restore the virtual machine state: Cannot restore this virtual machine because the saved state data cannot be read. Delete the saved state data and then try to start the virtual machine. (0xC0370027).”

This affects AMD Bulldozer Family 15h, AMD Jaguar Family 16h, and AMD Puma Family 16h (second generation) microarchitectures.

Affected platforms: 
  • Client: Windows 7, Service Pack 1 
  • Server: Windows Server 2008 R2 SP1 

Resolution: This issue is resolved in KB4490511.

Back to top
January 08, 2019
KB4480970
Resolved
KB4490511
Resolved:
February 19, 2019
02:00 PM PT

Opened:
January 08, 2019
10:00 AM PT
Local Administrators unable to remotely access shares.
Local users who are part of the local Administrators group may not be able to remotely access shares on Windows Server 2008 R2 and Windows 7 machines after installing KB4480970. This does not affect domain accounts in the local Administrators group.
 
Affected platforms: 
  • Client: Windows 7, Service Pack 1 
  • Server: Windows Server 2008 R2 SP1 

Resolution: This issue is resolved in KB4487345.

Back to top
January 08, 2019
KB4480970
Resolved
KB4487345
Resolved:
January 11, 2019
02:00 PM PT

Opened:
January 08, 2019
10:00 AM PT
Internet Explorer 11 authentication issue with multiple concurrent logons.
After installing KB4480970, Internet Explorer 11 and other applications that use WININET.DLL may have authentication issues. This occurs when two or more people use the same user account for multiple, concurrent login sessions on the same Windows Server machine, including Remote Desktop Protocol (RDP) and Terminal Server logons. Symptoms reported by customers include, but may not be limited to:
  • Cache size and location show zero or empty.
  • Keyboard shortcuts may not work properly.
  • Webpages may intermittently fail to load or render correctly.
  • Issues with credential prompts.
  • Issues when downloading files.

Affected platforms: 
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10 Enterprise LTSC 2016; Windows 8.1; Windows 7, Service Pack 1 
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server 2016; Windows Server 2012 R2; Windows Server 2008 R2 SP1 

Resolution: This issue is resolved in KB4493472.

Back to top
January 08, 2019
KB4480970
Resolved
KB4493472
Resolved:
April 09, 2019
10:00 AM PT

Opened:
January 08, 2019
10:00 AM PT
First character of the Japanese era name not recognized as an abbreviation.
After installing KB4480955, the first character of the Japanese era name is not recognized as an abbreviation and may cause date parsing issues.

Affected platforms: 
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 8.1; Windows 7, Service Pack 1 
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2; Windows Server 2008 R2 SP1 

Resolution: This issue is resolved in KB4486565.

Back to top
January 17, 2019
KB4480955
Resolved
KB4486565
Resolved:
February 19, 2019
02:00 PM PT

Opened:
January 17, 2019
10:00 AM PT
Applications using Microsoft Jet database fail to open.
Applications that use a Microsoft Jet database with the Microsoft Access 97 file format may fail to open if the database has column names greater than 32 characters. The database will fail to open with the error, “Unrecognized Database Format”.

Affected Platforms:
  • Client: Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 8.1; Windows 7, Service Pack 1 
  • Server: Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2; Windows Server 2008 R2 SP1 


Resolution: This issue is resolved in KB4486563.

Back to top
January 08, 2019
KB4480970
Resolved
KB4486563
Resolved:
February 12, 2019
10:00 AM PT

Opened:
January 08, 2019
10:00 AM PT
+ + + + +
DetailsOriginating updateStatusHistory
Local Administrators unable to remotely access shares.
Local users who are part of the local Administrators group may not be able to remotely access shares on Windows Server 2008 R2 and Windows 7 machines after installing KB4480970. This does not affect domain accounts in the local Administrators group.
 
Affected platforms: 
  • Client: Windows 7, Service Pack 1 
  • Server: Windows Server 2008 R2 SP1 

Resolution: This issue is resolved in KB4487345.

Back to top
January 08, 2019
KB4480970
Resolved
KB4487345
Resolved:
January 11, 2019
02:00 PM PT

Opened:
January 08, 2019
10:00 AM PT
Applications using Microsoft Jet database fail to open.
Applications that use a Microsoft Jet database with the Microsoft Access 97 file format may fail to open if the database has column names greater than 32 characters. The database will fail to open with the error, “Unrecognized Database Format”.

Affected Platforms:
  • Client: Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 8.1; Windows 7, Service Pack 1 
  • Server: Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2; Windows Server 2008 R2 SP1 


Resolution: This issue is resolved in KB4486563.

Back to top
January 08, 2019
KB4480970
Resolved
KB4486563
Resolved:
February 12, 2019
10:00 AM PT

Opened:
January 08, 2019
10:00 AM PT
Virtual machines fail to restore.
After installing KB4480970, virtual machines (VM) may fail to restore successfully if the VM has been saved and restored once before. The error message is, “Failed to restore the virtual machine state: Cannot restore this virtual machine because the saved state data cannot be read. Delete the saved state data and then try to start the virtual machine. (0xC0370027).”

This affects AMD Bulldozer Family 15h, AMD Jaguar Family 16h, and AMD Puma Family 16h (second generation) microarchitectures.

Affected platforms: 
  • Client: Windows 7, Service Pack 1 
  • Server: Windows Server 2008 R2 SP1 

Resolution: This issue is resolved in KB4490511.

Back to top
January 08, 2019
KB4480970
Resolved
KB4490511
Resolved:
February 19, 2019
02:00 PM PT

Opened:
January 08, 2019
10:00 AM PT
Internet Explorer 11 authentication issue with multiple concurrent logons.
After installing KB4480970, Internet Explorer 11 and other applications that use WININET.DLL may have authentication issues. This occurs when two or more people use the same user account for multiple, concurrent login sessions on the same Windows Server machine, including Remote Desktop Protocol (RDP) and Terminal Server logons. Symptoms reported by customers include, but may not be limited to:
  • Cache size and location show zero or empty.
  • Keyboard shortcuts may not work properly.
  • Webpages may intermittently fail to load or render correctly.
  • Issues with credential prompts.
  • Issues when downloading files.

Affected platforms: 
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10 Enterprise LTSC 2016; Windows 8.1; Windows 7, Service Pack 1 
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server 2016; Windows Server 2012 R2; Windows Server 2008 R2 SP1 

Resolution: This issue is resolved in KB4493472.

Back to top
January 08, 2019
KB4480970
Resolved
KB4493472
Resolved:
April 09, 2019
10:00 AM PT

Opened:
January 08, 2019
10:00 AM PT
First character of the Japanese era name not recognized as an abbreviation.
After installing KB4480955, the first character of the Japanese era name is not recognized as an abbreviation and may cause date parsing issues.

Affected platforms: 
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 8.1; Windows 7, Service Pack 1 
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2; Windows Server 2008 R2 SP1 

Resolution: This issue is resolved in KB4486565.

Back to top
January 17, 2019
KB4480955
Resolved
KB4486565
Resolved:
February 19, 2019
02:00 PM PT

Opened:
January 17, 2019
10:00 AM PT
" @@ -100,8 +100,8 @@ sections: - items: - type: markdown text: " - - - +
DetailsOriginating updateStatusHistory
Event Viewer may not show some event descriptions for network interface cards.
After installing KB4462927, the Event Viewer may not show some event descriptions for network interface cards (NICs).

Affected Platforms:
  • Client: Windows 7, Service Pack 1 
  • Server: Windows Server 2008 R2 SP1 

Resolution: This issue is resolved in KB4489878.

Back to top
October 18, 2018
KB4462927
Resolved
KB4489878
Resolved:
March 12, 2019
10:00 AM PT

Opened:
October 18, 2018
10:00 AM PT
Unable to use Seek bar in Windows Media Player
After installing KB4462923, users may not be able to use the Seek Bar in Windows Media Player when playing specific files. This issue does not affect normal playback.

Affected platforms: 
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 8.1; Windows 7, Service Pack 1.
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2; Windows Server 2008 R2 SP1

Resolution: This issue is resolved in KB4471318.

Back to top
October 09, 2018
KB4462923
Resolved
KB4471318
Resolved:
December 11, 2018
10:00 AM PT

Opened:
October 09, 2018
10:00 AM PT
+ +
DetailsOriginating updateStatusHistory
Unable to use Seek bar in Windows Media Player
After installing KB4462923, users may not be able to use the Seek Bar in Windows Media Player when playing specific files. This issue does not affect normal playback.

Affected platforms: 
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 8.1; Windows 7, Service Pack 1.
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2; Windows Server 2008 R2 SP1

Resolution: This issue is resolved in KB4471318.

Back to top
October 09, 2018
KB4462923
Resolved
KB4471318
Resolved:
December 11, 2018
10:00 AM PT

Opened:
October 09, 2018
10:00 AM PT
Event Viewer may not show some event descriptions for network interface cards.
After installing KB4462927, the Event Viewer may not show some event descriptions for network interface cards (NICs).

Affected Platforms:
  • Client: Windows 7, Service Pack 1 
  • Server: Windows Server 2008 R2 SP1 

Resolution: This issue is resolved in KB4489878.

Back to top
October 18, 2018
KB4462927
Resolved
KB4489878
Resolved:
March 12, 2019
10:00 AM PT

Opened:
October 18, 2018
10:00 AM PT
" diff --git a/windows/release-information/resolved-issues-windows-8.1-and-windows-server-2012-r2.yml b/windows/release-information/resolved-issues-windows-8.1-and-windows-server-2012-r2.yml index f9888653f7..aae936db92 100644 --- a/windows/release-information/resolved-issues-windows-8.1-and-windows-server-2012-r2.yml +++ b/windows/release-information/resolved-issues-windows-8.1-and-windows-server-2012-r2.yml @@ -31,20 +31,20 @@ sections: - items: - type: markdown text: " - - - - - - - - - - - - - - +
SummaryOriginating updateStatusDate resolved
Internet Explorer 11 authentication issue with multiple concurrent logons
Internet Explorer 11 users may encounter issues if two or more people use the same user account for multiple, concurrent login sessions on the same Windows Server machine.

See details >
January 08, 2019
KB4480963
Resolved
KB4493446
April 09, 2019
10:00 AM PT
MSXML6 may cause applications to stop responding.
MSXML6 may cause applications to stop responding if an exception was thrown during node operations, such as appendChild(), insertBefore(), and moveNode().

See details >
January 08, 2019
KB4480963
Resolved
KB4493446
April 09, 2019
10:00 AM PT
Custom URI schemes may not start corresponding application
Custom URI schemes for application protocol handlers may not start the corresponding application for local intranet and trusted sites in Internet Explorer.

See details >
March 12, 2019
KB4489881
Resolved
KB4493446
April 09, 2019
10:00 AM PT
Devices may not respond at login or Welcome screen if running certain Avast software
Devices running Avast for Business, Avast CloudCare, and AVG Business Edition antivirus software may become unresponsive after restart.

See details >
April 09, 2019
KB4493446
Resolved
April 09, 2019
10:00 AM PT
Embedded objects may display incorrectly
Any compound document (OLE) server application that places embedded objects into the Windows Metafile (WMF) using the PatBlt API may display embedded objects incorrectly.

See details >
February 12, 2019
KB4487000
Resolved
KB4493446
April 09, 2019
10:00 AM PT
Devices with winsock kernel client may receive error
Devices with a winsock kernel client may receive D1, FC, and other errors.

See details >
March 12, 2019
KB4489881
Resolved
KB4489893
March 19, 2019
10:00 AM PT
Error 1309 when installing/uninstalling MSI or MSP files
Users may receive “Error 1309” while installing or uninstalling certain types of MSI and MSP files.

See details >
February 19, 2019
KB4487016
Resolved
KB4489881
March 12, 2019
10:00 AM PT
First character of the Japanese era name not recognized as an abbreviation
The first character of the Japanese era name is not recognized as an abbreviation and may cause date parsing issues.

See details >
January 15, 2019
KB4480969
Resolved
KB4487016
February 19, 2019
02:00 PM PT
Internet Explorer may fail to load images
Internet Explorer may fail to load images with a backslash (\\) in their relative source path.

See details >
February 12, 2019
KB4487000
Resolved
KB4487016
February 19, 2019
02:00 PM PT
Virtual machines fail to restore
Virtual machines (VMs) may fail to restore successfully if the VM has been saved and restored once before.

See details >
January 08, 2019
KB4480963
Resolved
KB4490512
February 19, 2019
10:00 AM PT
Applications using Microsoft Jet database fail to open
Applications that use a Microsoft Jet database with the Microsoft Access 97 file format may fail to open if column names are greater than 32 characters.

See details >
January 08, 2019
KB4480963
Resolved
KB4487000
February 12, 2019
10:00 AM PT
Unable to access hotspots with third-party applications
Third-party applications may have difficulty authenticating hotspots.

See details >
January 08, 2019
KB4480963
Resolved
KB4480969
January 15, 2019
10:00 AM PT
Unable to use Seek bar in Windows Media Player
Users may not be able to use the Seek bar in Windows Media Player when playing specific files.

See details >
October 09, 2018
KB4462926
Resolved
KB4471320
December 11, 2018
10:00 AM PT
+ + + + + + + + + + + + +
SummaryOriginating updateStatusDate resolved
Unable to use Seek bar in Windows Media Player
Users may not be able to use the Seek bar in Windows Media Player when playing specific files.

See details >
October 09, 2018
KB4462926
Resolved
KB4471320
December 11, 2018
10:00 AM PT
Unable to access hotspots with third-party applications
Third-party applications may have difficulty authenticating hotspots.

See details >
January 08, 2019
KB4480963
Resolved
KB4480969
January 15, 2019
10:00 AM PT
Applications using Microsoft Jet database fail to open
Applications that use a Microsoft Jet database with the Microsoft Access 97 file format may fail to open if column names are greater than 32 characters.

See details >
January 08, 2019
KB4480963
Resolved
KB4487000
February 12, 2019
10:00 AM PT
Virtual machines fail to restore
Virtual machines (VMs) may fail to restore successfully if the VM has been saved and restored once before.

See details >
January 08, 2019
KB4480963
Resolved
KB4490512
February 19, 2019
10:00 AM PT
Internet Explorer 11 authentication issue with multiple concurrent logons
Internet Explorer 11 users may encounter issues if two or more people use the same user account for multiple, concurrent login sessions on the same Windows Server machine.

See details >
January 08, 2019
KB4480963
Resolved
KB4493446
April 09, 2019
10:00 AM PT
MSXML6 may cause applications to stop responding.
MSXML6 may cause applications to stop responding if an exception was thrown during node operations, such as appendChild(), insertBefore(), and moveNode().

See details >
January 08, 2019
KB4480963
Resolved
KB4493446
April 09, 2019
10:00 AM PT
Error 1309 when installing/uninstalling MSI or MSP files
Users may receive “Error 1309” while installing or uninstalling certain types of MSI and MSP files.

See details >
February 19, 2019
KB4487016
Resolved
KB4489881
March 12, 2019
10:00 AM PT
Custom URI schemes may not start corresponding application
Custom URI schemes for application protocol handlers may not start the corresponding application for local intranet and trusted sites in Internet Explorer.

See details >
March 12, 2019
KB4489881
Resolved
KB4493446
April 09, 2019
10:00 AM PT
Devices with winsock kernel client may receive error
Devices with a winsock kernel client may receive D1, FC, and other errors.

See details >
March 12, 2019
KB4489881
Resolved
KB4489893
March 19, 2019
10:00 AM PT
Devices may not respond at login or Welcome screen if running certain Avast software
Devices running Avast for Business, Avast CloudCare, and AVG Business Edition antivirus software may become unresponsive after restart.

See details >
April 09, 2019
KB4493446
Resolved
April 09, 2019
10:00 AM PT
Embedded objects may display incorrectly
Any compound document (OLE) server application that places embedded objects into the Windows Metafile (WMF) using the PatBlt API may display embedded objects incorrectly.

See details >
February 12, 2019
KB4487000
Resolved
KB4493446
April 09, 2019
10:00 AM PT
First character of the Japanese era name not recognized as an abbreviation
The first character of the Japanese era name is not recognized as an abbreviation and may cause date parsing issues.

See details >
January 15, 2019
KB4480969
Resolved
KB4487016
February 19, 2019
02:00 PM PT
Internet Explorer may fail to load images
Internet Explorer may fail to load images with a backslash (\\) in their relative source path.

See details >
February 12, 2019
KB4487000
Resolved
KB4487016
February 19, 2019
02:00 PM PT
" @@ -59,8 +59,8 @@ sections: - items: - type: markdown text: " - - +
DetailsOriginating updateStatusHistory
Devices may not respond at login or Welcome screen if running certain Avast software
Microsoft and Avast have identified an issue on devices running Avast for Business, Avast CloudCare, and AVG Business Edition antivirus software after you install KB4493446 and restart. Devices may become unresponsive at the login or Welcome screen. Additionally, you may be unable to log in or log in after an extended period of time.

Affected platforms: 
  • Client: Windows 8.1; Windows 7, Service Pack 1 
  • Server: Windows Server 2012 R2; Windows Server 2008 R2 SP1 


Resolution: Avast has released emergency updates to address this issue. For more information and AV update schedule, see the Avast support KB article.

Back to top
April 09, 2019
KB4493446
Resolved
Resolved:
April 09, 2019
10:00 AM PT

Opened:
April 09, 2019
10:00 AM PT
+
DetailsOriginating updateStatusHistory
Devices may not respond at login or Welcome screen if running certain Avast software
Microsoft and Avast have identified an issue on devices running Avast for Business, Avast CloudCare, and AVG Business Edition antivirus software after you install KB4493446 and restart. Devices may become unresponsive at the login or Welcome screen. Additionally, you may be unable to log in or log in after an extended period of time.

Affected platforms: 
  • Client: Windows 8.1; Windows 7, Service Pack 1 
  • Server: Windows Server 2012 R2; Windows Server 2008 R2 SP1 


Resolution: Avast has released emergency updates to address this issue. For more information and AV update schedule, see the Avast support KB article.

Back to top
April 09, 2019
KB4493446
Resolved
Resolved:
April 09, 2019
10:00 AM PT

Opened:
April 09, 2019
10:00 AM PT
" @@ -68,9 +68,9 @@ sections: - items: - type: markdown text: " - - - +
DetailsOriginating updateStatusHistory
Custom URI schemes may not start corresponding application
After installing KB4489881, custom URI schemes for application protocol handlers may not start the corresponding application for local intranet and trusted sites security zones on Internet Explorer.

Affected platforms: 
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 8.1; Windows 7, Service Pack 1 
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2; Windows Server 2008 R2 SP1 

Resolution: This issue is resolved in KB4493446.

Back to top
March 12, 2019
KB4489881
Resolved
KB4493446
Resolved:
April 09, 2019
10:00 AM PT

Opened:
March 12, 2019
10:00 AM PT
Devices with winsock kernel client may receive error
After installing KB4489881, devices with a winsock kernel client may receive D1, FC, and other errors. Additionally, systems that run the Skype for Business or Lync Server Edge Transport role may be affected by this issue.

Affected platforms: 
  • Client: Windows 8.1 
  • Server: Windows Server 2012 R2 

Resolution: This issue is resolved in KB4489893.

Back to top
March 12, 2019
KB4489881
Resolved
KB4489893
Resolved:
March 19, 2019
10:00 AM PT

Opened:
March 12, 2019
10:00 AM PT
+ +
DetailsOriginating updateStatusHistory
Custom URI schemes may not start corresponding application
After installing KB4489881, custom URI schemes for application protocol handlers may not start the corresponding application for local intranet and trusted sites security zones on Internet Explorer.

Affected platforms: 
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 8.1; Windows 7, Service Pack 1 
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2; Windows Server 2008 R2 SP1 

Resolution: This issue is resolved in KB4493446.

Back to top
March 12, 2019
KB4489881
Resolved
KB4493446
Resolved:
April 09, 2019
10:00 AM PT

Opened:
March 12, 2019
10:00 AM PT
Devices with winsock kernel client may receive error
After installing KB4489881, devices with a winsock kernel client may receive D1, FC, and other errors. Additionally, systems that run the Skype for Business or Lync Server Edge Transport role may be affected by this issue.

Affected platforms: 
  • Client: Windows 8.1 
  • Server: Windows Server 2012 R2 

Resolution: This issue is resolved in KB4489893.

Back to top
March 12, 2019
KB4489881
Resolved
KB4489893
Resolved:
March 19, 2019
10:00 AM PT

Opened:
March 12, 2019
10:00 AM PT
" @@ -78,10 +78,10 @@ sections: - items: - type: markdown text: " - - - - +
DetailsOriginating updateStatusHistory
Embedded objects may display incorrectly
Any compound document (OLE) server application that places embedded objects into the Windows Metafile (WMF) using the PatBlt API may display embedded objects incorrectly.

For example, if you paste a Microsoft Excel worksheet object into a Microsoft Word document, the cells may render with a different background color.

Affected platforms: 
  • Client: Windows 8.1 
  • Server: Windows Server 2012 R2 

Resolution: This issue is resolved in KB4493446.

Back to top
February 12, 2019
KB4487000
Resolved
KB4493446
Resolved:
April 09, 2019
10:00 AM PT

Opened:
February 12, 2019
10:00 AM PT
Error 1309 when installing/uninstalling MSI or MSP files
After installing KB4487016, users may receive “Error 1309” while installing or uninstalling certain types of MSI and MSP files.

Affected platforms: 
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 8.1 
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2 

Resolution: This issue is resolved in KB4489881.

Back to top
February 19, 2019
KB4487016
Resolved
KB4489881
Resolved:
March 12, 2019
10:00 AM PT

Opened:
February 19, 2019
02:00 PM PT
Internet Explorer may fail to load images
After installing KB4487000, Internet Explorer may fail to load images with a backslash (\\) in their relative source path.

Affected platforms: 
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 8.1; Windows 7, Service Pack 1 
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2; Windows Server 2008 R2 SP1 

Resolution: This issue is resolved in KB4487016.

Back to top
February 12, 2019
KB4487000
Resolved
KB4487016
Resolved:
February 19, 2019
02:00 PM PT

Opened:
February 12, 2019
10:00 AM PT
+ + +
DetailsOriginating updateStatusHistory
Error 1309 when installing/uninstalling MSI or MSP files
After installing KB4487016, users may receive “Error 1309” while installing or uninstalling certain types of MSI and MSP files.

Affected platforms: 
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 8.1 
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2 

Resolution: This issue is resolved in KB4489881.

Back to top
February 19, 2019
KB4487016
Resolved
KB4489881
Resolved:
March 12, 2019
10:00 AM PT

Opened:
February 19, 2019
02:00 PM PT
Embedded objects may display incorrectly
Any compound document (OLE) server application that places embedded objects into the Windows Metafile (WMF) using the PatBlt API may display embedded objects incorrectly.

For example, if you paste a Microsoft Excel worksheet object into a Microsoft Word document, the cells may render with a different background color.

Affected platforms: 
  • Client: Windows 8.1 
  • Server: Windows Server 2012 R2 

Resolution: This issue is resolved in KB4493446.

Back to top
February 12, 2019
KB4487000
Resolved
KB4493446
Resolved:
April 09, 2019
10:00 AM PT

Opened:
February 12, 2019
10:00 AM PT
Internet Explorer may fail to load images
After installing KB4487000, Internet Explorer may fail to load images with a backslash (\\) in their relative source path.

Affected platforms: 
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 8.1; Windows 7, Service Pack 1 
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2; Windows Server 2008 R2 SP1 

Resolution: This issue is resolved in KB4487016.

Back to top
February 12, 2019
KB4487000
Resolved
KB4487016
Resolved:
February 19, 2019
02:00 PM PT

Opened:
February 12, 2019
10:00 AM PT
" @@ -89,13 +89,13 @@ sections: - items: - type: markdown text: " - - - - - - - +
DetailsOriginating updateStatusHistory
Internet Explorer 11 authentication issue with multiple concurrent logons
After installing KB4480963, Internet Explorer 11 and other applications that use WININET.DLL may have authentication issues. This occurs when two or more people use the same user account for multiple, concurrent login sessions on the same Windows Server machine, including Remote Desktop Protocol (RDP) and Terminal Server logons. Symptoms reported by customers include, but may not be limited to:
  • Cache size and location show zero or empty.
  • Keyboard shortcuts may not work properly.
  • Webpages may intermittently fail to load or render correctly.
  • Issues with credential prompts.
  • Issues when downloading files.

Affected platforms: 
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10 Enterprise LTSC 2016; Windows 8.1; Windows 7, Service Pack 1 
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server 2016; Windows Server 2012 R2; Windows Server 2008 R2 SP1 

Resolution: This issue is resolved in KB4493446.

Back to top
January 08, 2019
KB4480963
Resolved
KB4493446
Resolved:
April 09, 2019
10:00 AM PT

Opened:
January 08, 2019
10:00 AM PT
MSXML6 may cause applications to stop responding.
After installing KB4480963, MSXML6 causes applications to stop responding if an exception was thrown during node operations, such as appendChild(), insertBefore(), and moveNode().

The Group Policy editor may stop responding when editing a Group Policy Object (GPO) that contains Group Policy Preferences (GPP) for Internet Explorer 10 settings.

Resolution: This issue is resolved in KB4493446.

Back to top
January 08, 2019
KB4480963
Resolved
KB4493446
Resolved:
April 09, 2019
10:00 AM PT

Opened:
January 08, 2019
10:00 AM PT
First character of the Japanese era name not recognized as an abbreviation
After installing KB4480969, the first character of the Japanese era name is not recognized as an abbreviation and may cause date parsing issues.

Affected platforms: 
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 8.1; Windows 7, Service Pack 1 
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2; Windows Server 2008 R2 SP1 

Resolution: This issue is resolved in KB4487016.

Back to top
January 15, 2019
KB4480969
Resolved
KB4487016
Resolved:
February 19, 2019
02:00 PM PT

Opened:
January 15, 2019
10:00 AM PT
Virtual machines fail to restore
After installing KB4480963, virtual machines (VM) may fail to restore successfully if the VM has been saved and restored once before. The error message is, “Failed to restore the virtual machine state: Cannot restore this virtual machine because the saved state data cannot be read. Delete the saved state data and then try to start the virtual machine. (0xC0370027).”

This affects AMD Bulldozer Family 15h, AMD Jaguar Family 16h, and AMD Puma Family 16h (second generation) microarchitectures.

Resolution: This issue is resolved in KB4490512.

Back to top
January 08, 2019
KB4480963
Resolved
KB4490512
Resolved:
February 19, 2019
02:00 PM PT

Opened:
January 08, 2019
10:00 AM PT
Applications using Microsoft Jet database fail to open
Applications that use a Microsoft Jet database with the Microsoft Access 97 file format may fail to open if the database has column names greater than 32 characters. The database will fail to open with the error, “Unrecognized Database Format”.

Affected platforms: 
  • Client: Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 8.1; Windows 7, Service Pack 1 
  • Server: Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2; Windows Server 2008 R2 SP1 

Resolution: This issue is resolved in KB4487000.

Back to top
January 08, 2019
KB4480963
Resolved
KB4487000
Resolved:
February 12, 2019
10:00 AM PT

Opened:
January 08, 2019
10:00 AM PT
Unable to access hotspots with third-party applications
After installing KB4480963, third-party applications may have difficulty authenticating hotspots.

Affected platforms: 
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 8.1 
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2 

Resolution: This issue is resolved in KB4480969.

Back to top
January 08, 2019
KB4480963
Resolved
KB4480969
Resolved:
January 15, 2019
10:00 AM PT

Opened:
January 08, 2019
10:00 AM PT
+ + + + + +
DetailsOriginating updateStatusHistory
Unable to access hotspots with third-party applications
After installing KB4480963, third-party applications may have difficulty authenticating hotspots.

Affected platforms: 
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 8.1 
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2 

Resolution: This issue is resolved in KB4480969.

Back to top
January 08, 2019
KB4480963
Resolved
KB4480969
Resolved:
January 15, 2019
10:00 AM PT

Opened:
January 08, 2019
10:00 AM PT
Applications using Microsoft Jet database fail to open
Applications that use a Microsoft Jet database with the Microsoft Access 97 file format may fail to open if the database has column names greater than 32 characters. The database will fail to open with the error, “Unrecognized Database Format”.

Affected platforms: 
  • Client: Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 8.1; Windows 7, Service Pack 1 
  • Server: Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2; Windows Server 2008 R2 SP1 

Resolution: This issue is resolved in KB4487000.

Back to top
January 08, 2019
KB4480963
Resolved
KB4487000
Resolved:
February 12, 2019
10:00 AM PT

Opened:
January 08, 2019
10:00 AM PT
Virtual machines fail to restore
After installing KB4480963, virtual machines (VM) may fail to restore successfully if the VM has been saved and restored once before. The error message is, “Failed to restore the virtual machine state: Cannot restore this virtual machine because the saved state data cannot be read. Delete the saved state data and then try to start the virtual machine. (0xC0370027).”

This affects AMD Bulldozer Family 15h, AMD Jaguar Family 16h, and AMD Puma Family 16h (second generation) microarchitectures.

Resolution: This issue is resolved in KB4490512.

Back to top
January 08, 2019
KB4480963
Resolved
KB4490512
Resolved:
February 19, 2019
02:00 PM PT

Opened:
January 08, 2019
10:00 AM PT
Internet Explorer 11 authentication issue with multiple concurrent logons
After installing KB4480963, Internet Explorer 11 and other applications that use WININET.DLL may have authentication issues. This occurs when two or more people use the same user account for multiple, concurrent login sessions on the same Windows Server machine, including Remote Desktop Protocol (RDP) and Terminal Server logons. Symptoms reported by customers include, but may not be limited to:
  • Cache size and location show zero or empty.
  • Keyboard shortcuts may not work properly.
  • Webpages may intermittently fail to load or render correctly.
  • Issues with credential prompts.
  • Issues when downloading files.

Affected platforms: 
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10 Enterprise LTSC 2016; Windows 8.1; Windows 7, Service Pack 1 
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server 2016; Windows Server 2012 R2; Windows Server 2008 R2 SP1 

Resolution: This issue is resolved in KB4493446.

Back to top
January 08, 2019
KB4480963
Resolved
KB4493446
Resolved:
April 09, 2019
10:00 AM PT

Opened:
January 08, 2019
10:00 AM PT
MSXML6 may cause applications to stop responding.
After installing KB4480963, MSXML6 causes applications to stop responding if an exception was thrown during node operations, such as appendChild(), insertBefore(), and moveNode().

The Group Policy editor may stop responding when editing a Group Policy Object (GPO) that contains Group Policy Preferences (GPP) for Internet Explorer 10 settings.

Resolution: This issue is resolved in KB4493446.

Back to top
January 08, 2019
KB4480963
Resolved
KB4493446
Resolved:
April 09, 2019
10:00 AM PT

Opened:
January 08, 2019
10:00 AM PT
First character of the Japanese era name not recognized as an abbreviation
After installing KB4480969, the first character of the Japanese era name is not recognized as an abbreviation and may cause date parsing issues.

Affected platforms: 
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 8.1; Windows 7, Service Pack 1 
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2; Windows Server 2008 R2 SP1 

Resolution: This issue is resolved in KB4487016.

Back to top
January 15, 2019
KB4480969
Resolved
KB4487016
Resolved:
February 19, 2019
02:00 PM PT

Opened:
January 15, 2019
10:00 AM PT
" @@ -103,7 +103,7 @@ sections: - items: - type: markdown text: " - - +
DetailsOriginating updateStatusHistory
Unable to use Seek bar in Windows Media Player
After installing KB4462926, users may not be able to use the Seek Bar in Windows Media Player when playing specific files. This issue does not affect normal playback.

Affected platforms: 
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 8.1; Windows 7, Service Pack 1 
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2; Windows Server 2008 R2 SP1 

Resolution: This issue is resolved in KB4471320.

Back to top
October 09, 2018
KB4462926
Resolved
KB4471320
Resolved:
December 11, 2018
10:00 AM PT

Opened:
October 09, 2018
10:00 AM PT
+
DetailsOriginating updateStatusHistory
Unable to use Seek bar in Windows Media Player
After installing KB4462926, users may not be able to use the Seek Bar in Windows Media Player when playing specific files. This issue does not affect normal playback.

Affected platforms: 
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 8.1; Windows 7, Service Pack 1 
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2; Windows Server 2008 R2 SP1 

Resolution: This issue is resolved in KB4471320.

Back to top
October 09, 2018
KB4462926
Resolved
KB4471320
Resolved:
December 11, 2018
10:00 AM PT

Opened:
October 09, 2018
10:00 AM PT
" diff --git a/windows/release-information/resolved-issues-windows-server-2008-sp2.yml b/windows/release-information/resolved-issues-windows-server-2008-sp2.yml index 62ce837f1c..7611cd0050 100644 --- a/windows/release-information/resolved-issues-windows-server-2008-sp2.yml +++ b/windows/release-information/resolved-issues-windows-server-2008-sp2.yml @@ -31,15 +31,15 @@ sections: - items: - type: markdown text: " - - - - - - - - - +
SummaryOriginating updateStatusDate resolved
First character of the Japanese era name not recognized as an abbreviation
The first character of the Japanese era name is not recognized as an abbreviation and may cause date parsing issues.

See details >
January 17, 2019
KB4480974
Resolved
KB4489880
April 25, 2019
03:32 PM PT
Applications using Microsoft Jet database fail to open
Applications that use a Microsoft Jet database with the Microsoft Access 97 file format may fail to open if column names are greater than 32 characters.

See details >
January 08, 2019
KB4480968
Resolved
KB4487023
April 25, 2019
03:32 PM PT
Unable to use Seek bar in Windows Media Player
Users may not be able to use the Seek bar in Windows Media Player when playing specific files.

See details >
October 09, 2018
KB4463097
Resolved
KB4471325
April 25, 2019
03:28 PM PT
Virtual machines fail to restore
Virtual machines (VMs) may fail to restore successfully if the VM has been saved and restored once before.

See details >
January 08, 2019
KB4480968
Resolved
KB4490514
April 25, 2019
03:26 PM PT
Embedded objects may display incorrectly
Any compound document (OLE) server application that places embedded objects into the Windows Metafile (WMF) using the PatBlt API may display embedded objects incorrectly.

See details >

Resolved
KB4493471
April 25, 2019
03:26 PM PT
Applications using Microsoft Jet database and Access 95 file format stop working
Applications that use a Microsoft Jet database with the Microsoft Access 95 file format may randomly stop working.

See details >
February 12, 2019
KB4487023
Resolved
KB4487022
April 25, 2019
03:26 PM PT
Local Administrators unable to remotely access shares
Local users who are part of the local Administrators group may not be able to remotely access shares on Windows Server 2008 R2 and Windows 7 machines.

See details >
January 08, 2019
KB4480968
Resolved
KB4487354
April 25, 2019
03:26 PM PT
NETDOM.EXE fails to run
NETDOM.EXE fails to run and the error, “The command failed to complete successfully.” appears on screen.

See details >
March 12, 2019
KB4489880
Resolved
KB4493471
April 25, 2019
03:25 PM PT
+ + + + + + + +
SummaryOriginating updateStatusDate resolved
Unable to use Seek bar in Windows Media Player
Users may not be able to use the Seek bar in Windows Media Player when playing specific files.

See details >
October 09, 2018
KB4463097
Resolved
KB4471325
April 25, 2019
03:28 PM PT
Applications using Microsoft Jet database fail to open
Applications that use a Microsoft Jet database with the Microsoft Access 97 file format may fail to open if column names are greater than 32 characters.

See details >
January 08, 2019
KB4480968
Resolved
KB4487023
April 25, 2019
03:32 PM PT
Virtual machines fail to restore
Virtual machines (VMs) may fail to restore successfully if the VM has been saved and restored once before.

See details >
January 08, 2019
KB4480968
Resolved
KB4490514
April 25, 2019
03:26 PM PT
Embedded objects may display incorrectly
Any compound document (OLE) server application that places embedded objects into the Windows Metafile (WMF) using the PatBlt API may display embedded objects incorrectly.

See details >

Resolved
KB4493471
April 25, 2019
03:26 PM PT
First character of the Japanese era name not recognized as an abbreviation
The first character of the Japanese era name is not recognized as an abbreviation and may cause date parsing issues.

See details >
January 17, 2019
KB4480974
Resolved
KB4489880
April 25, 2019
03:32 PM PT
Applications using Microsoft Jet database and Access 95 file format stop working
Applications that use a Microsoft Jet database with the Microsoft Access 95 file format may randomly stop working.

See details >
February 12, 2019
KB4487023
Resolved
KB4487022
April 25, 2019
03:26 PM PT
Local Administrators unable to remotely access shares
Local users who are part of the local Administrators group may not be able to remotely access shares on Windows Server 2008 R2 and Windows 7 machines.

See details >
January 08, 2019
KB4480968
Resolved
KB4487354
April 25, 2019
03:26 PM PT
NETDOM.EXE fails to run
NETDOM.EXE fails to run and the error, “The command failed to complete successfully.” appears on screen.

See details >
March 12, 2019
KB4489880
Resolved
KB4493471
April 25, 2019
03:25 PM PT
" @@ -54,14 +54,14 @@ sections: - items: - type: markdown text: " - - - - - - - - - +
DetailsOriginating updateStatusHistory
First character of the Japanese era name not recognized as an abbreviation
After installing KB4480974, the first character of the Japanese era name is not recognized as an abbreviation and may cause date parsing issues.

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 8.1; Windows 7, Service Pack 1
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2; Windows Server 2012; Windows Server 2008 R2 SP1; Windows Server 2008 SP2

Resolution: This issue is resolved in KB4489880.

Back to top
January 17, 2019
KB4480974
Resolved
KB4489880
Resolved:
March 12, 2019
10:00 AM PT

Opened:
April 25, 2019
03:32 PM PT
Applications using Microsoft Jet database fail to open
Applications that use a Microsoft Jet database with the Microsoft Access 97 file format may fail to open if the database has column names greater than 32 characters. The database will fail to open with the error, “Unrecognized Database Format”.

Affected platforms: 
  • Client: Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 8.1; Windows 7, Service Pack 1 
  • Server: Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2; Windows Server 2012; Windows Server 2008 R2 SP1; Windows Server 2008 SP2

Resolution: This issue is resolved in KB4487023.

Back to top
January 08, 2019
KB4480968
Resolved
KB4487023
Resolved:
February 12, 2019
10:00 AM PT

Opened:
April 25, 2019
03:32 PM PT
Unable to use Seek bar in Windows Media Player
After installing KB4463097, users may not be able to use the Seek Bar in Windows Media Player when playing specific files. This issue does not affect normal playback.

Affected platforms: 
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 8.1; Windows 7, Service Pack 1
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2; Windows Server 2012; Windows Server 2008 R2 SP1; Windows Server 2008 SP2

Resolution: This issue is resolved in KB4471325.

Back to top
October 09, 2018
KB4463097
Resolved
KB4471325
Resolved:
December 11, 2018
10:00 AM PT

Opened:
April 25, 2019
03:28 PM PT
Virtual machines fail to restore
After installing KB4480968, virtual machines (VM) may fail to restore successfully if the VM has been saved and restored once before. The error message is, “Failed to restore the virtual machine state: Cannot restore this virtual machine because the saved state data cannot be read. Delete the saved state data and then try to start the virtual machine. (0xC0370027).”

This affects AMD Bulldozer Family 15h, AMD Jaguar Family 16h, and AMD Puma Family 16h (second generation) microarchitectures.

Affected platforms: 
  • Client: Windows 7, Service Pack 1 
  • Server: Windows Server 2012; Windows Server 2008 R2 SP1; Windows Server 2008 SP2

Resolution: This issue is resolved in KB4490514.

Back to top
January 08, 2019
KB4480968
Resolved
KB4490514
Resolved:
February 19, 2019
02:00 PM PT

Opened:
April 25, 2019
03:26 PM PT
Embedded objects may display incorrectly
Any compound document (OLE) server application that places embedded objects into the Windows Metafile (WMF) using the PatBlt API may display embedded objects incorrectly.

For example, if you paste a Microsoft Excel worksheet object into a Microsoft Word document, the cells may render with a different background color.

Affected platforms: 
  • Client: Windows 8.1 
  • Server: Windows Server 2012 R2; Windows Server 2012; Windows Server 2008 SP2

Resolution: This issue is resolved in KB4493471.

Back to top

Resolved
KB4493471
Resolved:
April 09, 2019
10:00 AM PT

Opened:
April 25, 2019
03:26 PM PT
Applications using Microsoft Jet database and Access 95 file format stop working
Applications that use a Microsoft Jet database with the Microsoft Access 95 file format may randomly stop working.

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 7, Service Pack 1
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012; Windows Server 2008 R2 SP1; Windows Server 2008 SP2

Resolution: This issue is resolved in KB4487022.

Back to top
February 12, 2019
KB4487023
Resolved
KB4487022
Resolved:
February 19, 2019
02:00 PM PT

Opened:
April 25, 2019
03:26 PM PT
Local Administrators unable to remotely access shares
Local users who are part of the local Administrators group may not be able to remotely access shares on Windows Server 2008 R2 and Windows 7 machines after installing KB4480968. This does not affect domain accounts in the local Administrators group.

Affected platforms: 
  • Client: Windows 7, Service Pack 1 
  • Server: Windows Server 2008 R2 SP1; Windows Server 2008 SP2

Resolution: This issue is resolved in KB4487354.

Back to top
January 08, 2019
KB4480968
Resolved
KB4487354
Resolved:
January 11, 2019
02:00 PM PT

Opened:
April 25, 2019
03:26 PM PT
NETDOM.EXE fails to run
After installing KB4489880, NETDOM.EXE fails to run, and the on-screen error, “The command failed to complete successfully.” appears.

Affected platforms: 
  • Client: Windows 7, Service Pack 1 
  • Server: Windows Server 2008 R2 SP1; Windows Server 2008 SP2

Resolution: This issue is resolved in KB4493471.

Back to top
March 12, 2019
KB4489880
Resolved
KB4493471
Resolved:
April 09, 2019
10:00 AM PT

Opened:
April 25, 2019
03:25 PM PT
+ + + + + + + +
DetailsOriginating updateStatusHistory
Unable to use Seek bar in Windows Media Player
After installing KB4463097, users may not be able to use the Seek Bar in Windows Media Player when playing specific files. This issue does not affect normal playback.

Affected platforms: 
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 8.1; Windows 7, Service Pack 1
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2; Windows Server 2012; Windows Server 2008 R2 SP1; Windows Server 2008 SP2

Resolution: This issue is resolved in KB4471325.

Back to top
October 09, 2018
KB4463097
Resolved
KB4471325
Resolved:
December 11, 2018
10:00 AM PT

Opened:
April 25, 2019
03:28 PM PT
Applications using Microsoft Jet database fail to open
Applications that use a Microsoft Jet database with the Microsoft Access 97 file format may fail to open if the database has column names greater than 32 characters. The database will fail to open with the error, “Unrecognized Database Format”.

Affected platforms: 
  • Client: Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 8.1; Windows 7, Service Pack 1 
  • Server: Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2; Windows Server 2012; Windows Server 2008 R2 SP1; Windows Server 2008 SP2

Resolution: This issue is resolved in KB4487023.

Back to top
January 08, 2019
KB4480968
Resolved
KB4487023
Resolved:
February 12, 2019
10:00 AM PT

Opened:
April 25, 2019
03:32 PM PT
Virtual machines fail to restore
After installing KB4480968, virtual machines (VM) may fail to restore successfully if the VM has been saved and restored once before. The error message is, “Failed to restore the virtual machine state: Cannot restore this virtual machine because the saved state data cannot be read. Delete the saved state data and then try to start the virtual machine. (0xC0370027).”

This affects AMD Bulldozer Family 15h, AMD Jaguar Family 16h, and AMD Puma Family 16h (second generation) microarchitectures.

Affected platforms: 
  • Client: Windows 7, Service Pack 1 
  • Server: Windows Server 2012; Windows Server 2008 R2 SP1; Windows Server 2008 SP2

Resolution: This issue is resolved in KB4490514.

Back to top
January 08, 2019
KB4480968
Resolved
KB4490514
Resolved:
February 19, 2019
02:00 PM PT

Opened:
April 25, 2019
03:26 PM PT
Embedded objects may display incorrectly
Any compound document (OLE) server application that places embedded objects into the Windows Metafile (WMF) using the PatBlt API may display embedded objects incorrectly.

For example, if you paste a Microsoft Excel worksheet object into a Microsoft Word document, the cells may render with a different background color.

Affected platforms: 
  • Client: Windows 8.1 
  • Server: Windows Server 2012 R2; Windows Server 2012; Windows Server 2008 SP2

Resolution: This issue is resolved in KB4493471.

Back to top

Resolved
KB4493471
Resolved:
April 09, 2019
10:00 AM PT

Opened:
April 25, 2019
03:26 PM PT
First character of the Japanese era name not recognized as an abbreviation
After installing KB4480974, the first character of the Japanese era name is not recognized as an abbreviation and may cause date parsing issues.

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 8.1; Windows 7, Service Pack 1
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2; Windows Server 2012; Windows Server 2008 R2 SP1; Windows Server 2008 SP2

Resolution: This issue is resolved in KB4489880.

Back to top
January 17, 2019
KB4480974
Resolved
KB4489880
Resolved:
March 12, 2019
10:00 AM PT

Opened:
April 25, 2019
03:32 PM PT
Applications using Microsoft Jet database and Access 95 file format stop working
Applications that use a Microsoft Jet database with the Microsoft Access 95 file format may randomly stop working.

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 7, Service Pack 1
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012; Windows Server 2008 R2 SP1; Windows Server 2008 SP2

Resolution: This issue is resolved in KB4487022.

Back to top
February 12, 2019
KB4487023
Resolved
KB4487022
Resolved:
February 19, 2019
02:00 PM PT

Opened:
April 25, 2019
03:26 PM PT
Local Administrators unable to remotely access shares
Local users who are part of the local Administrators group may not be able to remotely access shares on Windows Server 2008 R2 and Windows 7 machines after installing KB4480968. This does not affect domain accounts in the local Administrators group.

Affected platforms: 
  • Client: Windows 7, Service Pack 1 
  • Server: Windows Server 2008 R2 SP1; Windows Server 2008 SP2

Resolution: This issue is resolved in KB4487354.

Back to top
January 08, 2019
KB4480968
Resolved
KB4487354
Resolved:
January 11, 2019
02:00 PM PT

Opened:
April 25, 2019
03:26 PM PT
NETDOM.EXE fails to run
After installing KB4489880, NETDOM.EXE fails to run, and the on-screen error, “The command failed to complete successfully.” appears.

Affected platforms: 
  • Client: Windows 7, Service Pack 1 
  • Server: Windows Server 2008 R2 SP1; Windows Server 2008 SP2

Resolution: This issue is resolved in KB4493471.

Back to top
March 12, 2019
KB4489880
Resolved
KB4493471
Resolved:
April 09, 2019
10:00 AM PT

Opened:
April 25, 2019
03:25 PM PT
" diff --git a/windows/release-information/resolved-issues-windows-server-2012.yml b/windows/release-information/resolved-issues-windows-server-2012.yml index d43b402ca9..3fb079b612 100644 --- a/windows/release-information/resolved-issues-windows-server-2012.yml +++ b/windows/release-information/resolved-issues-windows-server-2012.yml @@ -31,18 +31,18 @@ sections: - items: - type: markdown text: " - - - - - - - - - - - - +
SummaryOriginating updateStatusDate resolved
Applications using Microsoft Jet database and Access 95 file format stop working
Applications that use a Microsoft Jet database with the Microsoft Access 95 file format may randomly stop working.

See details >
February 12, 2019
KB4487025
Resolved
KB4487024
April 25, 2019
04:04 PM PT
First character of the Japanese era name not recognized as an abbreviation
The first character of the Japanese era name is not recognized as an abbreviation and may cause date parsing issues.

See details >
January 15, 2019
KB4480971
Resolved
KB4487024
April 25, 2019
04:02 PM PT
Embedded objects may display incorrectly
Any compound document (OLE) server application that places embedded objects into the Windows Metafile (WMF) using the PatBlt API may display embedded objects incorrectly.

See details >
February 12, 2019
KB4487025
Resolved
KB4493451
April 25, 2019
04:00 PM PT
Error 1309 when installing/uninstalling MSI or MSP files
Users may receive “Error 1309” while installing or uninstalling certain types of MSI and MSP files.

See details >
February 12, 2019
KB4487025
Resolved
KB4489891
April 25, 2019
03:36 PM PT
Internet Explorer 11 authentication issue with multiple concurrent logons
Internet Explorer 11 users may encounter issues if two or more people use the same user account for multiple, concurrent login sessions on the same Windows Server machine.

See details >
January 08, 2019
KB4480975
Resolved
KB4493451
April 25, 2019
03:34 PM PT
MSXML6 may cause applications to stop responding
MSXML6 may cause applications to stop responding if an exception was thrown during node operations, such as appendChild(), insertBefore(), and moveNode().

See details >
January 08, 2019
KB4480975
Resolved
KB4493451
April 25, 2019
03:27 PM PT
Virtual machines fail to restore
Virtual machines (VMs) may fail to restore successfully if the VM has been saved and restored once before.

See details >
January 08, 2019
KB4480975
Resolved
KB4490516
April 25, 2019
03:22 PM PT
Applications using Microsoft Jet database fail to open
Applications that use a Microsoft Jet database with the Microsoft Access 97 file format may fail to open if column names are greater than 32 characters.

See details >
January 08, 2019
KB4480975
Resolved
KB4487025
April 25, 2019
03:19 PM PT
Unable to access hotspots with third-party applications
Third-party applications may have difficulty authenticating hotspots.

See details >
January 08, 2019
KB4480975
Resolved
KB4480971
April 25, 2019
03:14 PM PT
Event Viewer may not show some event descriptions for network interface cards
The Event Viewer may not show some event descriptions for network interface cards (NIC).

See details >
September 11, 2018
KB4457135
Resolved
KB4489891
April 25, 2019
03:10 PM PT
Unable to use Seek bar in Windows Media Player
Users may not be able to use the Seek bar in Windows Media Player when playing specific files.

See details >
October 09, 2018
KB4462929
Resolved
KB4471330
April 25, 2019
02:47 PM PT
+ + + + + + + + + + +
SummaryOriginating updateStatusDate resolved
Unable to use Seek bar in Windows Media Player
Users may not be able to use the Seek bar in Windows Media Player when playing specific files.

See details >
October 09, 2018
KB4462929
Resolved
KB4471330
April 25, 2019
02:47 PM PT
Event Viewer may not show some event descriptions for network interface cards
The Event Viewer may not show some event descriptions for network interface cards (NIC).

See details >
September 11, 2018
KB4457135
Resolved
KB4489891
April 25, 2019
03:10 PM PT
Unable to access hotspots with third-party applications
Third-party applications may have difficulty authenticating hotspots.

See details >
January 08, 2019
KB4480975
Resolved
KB4480971
April 25, 2019
03:14 PM PT
Applications using Microsoft Jet database fail to open
Applications that use a Microsoft Jet database with the Microsoft Access 97 file format may fail to open if column names are greater than 32 characters.

See details >
January 08, 2019
KB4480975
Resolved
KB4487025
April 25, 2019
03:19 PM PT
Virtual machines fail to restore
Virtual machines (VMs) may fail to restore successfully if the VM has been saved and restored once before.

See details >
January 08, 2019
KB4480975
Resolved
KB4490516
April 25, 2019
03:22 PM PT
Internet Explorer 11 authentication issue with multiple concurrent logons
Internet Explorer 11 users may encounter issues if two or more people use the same user account for multiple, concurrent login sessions on the same Windows Server machine.

See details >
January 08, 2019
KB4480975
Resolved
KB4493451
April 25, 2019
03:34 PM PT
MSXML6 may cause applications to stop responding
MSXML6 may cause applications to stop responding if an exception was thrown during node operations, such as appendChild(), insertBefore(), and moveNode().

See details >
January 08, 2019
KB4480975
Resolved
KB4493451
April 25, 2019
03:27 PM PT
Error 1309 when installing/uninstalling MSI or MSP files
Users may receive “Error 1309” while installing or uninstalling certain types of MSI and MSP files.

See details >
February 12, 2019
KB4487025
Resolved
KB4489891
April 25, 2019
03:36 PM PT
Embedded objects may display incorrectly
Any compound document (OLE) server application that places embedded objects into the Windows Metafile (WMF) using the PatBlt API may display embedded objects incorrectly.

See details >
February 12, 2019
KB4487025
Resolved
KB4493451
April 25, 2019
04:00 PM PT
First character of the Japanese era name not recognized as an abbreviation
The first character of the Japanese era name is not recognized as an abbreviation and may cause date parsing issues.

See details >
January 15, 2019
KB4480971
Resolved
KB4487024
April 25, 2019
04:02 PM PT
Applications using Microsoft Jet database and Access 95 file format stop working
Applications that use a Microsoft Jet database with the Microsoft Access 95 file format may randomly stop working.

See details >
February 12, 2019
KB4487025
Resolved
KB4487024
April 25, 2019
04:04 PM PT
" @@ -57,17 +57,17 @@ sections: - items: - type: markdown text: " - - - - - - - - - - - - +
DetailsOriginating updateStatusHistory
Applications using Microsoft Jet database and Access 95 file format stop working
Applications that use a Microsoft Jet database with the Microsoft Access 95 file format may randomly stop working.

Resolution: This issue is resolved in KB4487024.

Back to top
February 12, 2019
KB4487025
Resolved
KB4487024
Resolved:
February 19, 2019
02:00 PM PT

Opened:
April 25, 2019
04:04 PM PT
First character of the Japanese era name not recognized as an abbreviation
After installing KB4480971, the first character of the Japanese era name is not recognized as an abbreviation and may cause date parsing issues.

Resolution: This issue is resolved in KB4487024.

Back to top
January 15, 2019
KB4480971
Resolved
KB4487024
Resolved:
February 19, 2019
02:00 PM PT

Opened:
April 25, 2019
04:01 PM PT
Embedded objects may display incorrectly
Any compound document (OLE) server application that places embedded objects into the Windows Metafile (WMF) using the PatBlt API may display embedded objects incorrectly.

For example, if you paste a Microsoft Excel worksheet object into a Microsoft Word document, the cells may render with a different background color.

Resolution: This issue is resolved in KB4493451.

Back to top
February 12, 2019
KB4487025
Resolved
KB4493451
Resolved:
April 09, 2019
10:00 AM PT

Opened:
April 25, 2019
04:00 PM PT
Error 1309 when installing/uninstalling MSI or MSP files
After installing KB4487025, users may receive \"Error 1309\" while installing or uninstalling certain types of MSI and MSP files.

Resolution: This issue is resolved in KB4489891.

Back to top
February 12, 2019
KB4487025
Resolved
KB4489891
Resolved:
March 12, 2019
10:00 AM PT

Opened:
April 25, 2019
03:36 PM PT
Internet Explorer 11 authentication issue with multiple concurrent logons
After installing KB4480975, Internet Explorer 11 and other applications that use WININET.DLL may have authentication issues. This occurs when two or more people use the same user account for multiple, concurrent login sessions on the same Windows Server machine, including Remote Desktop Protocol (RDP) and Terminal Server logons. Symptoms reported by customers include, but may not be limited to:
  • Cache size and location show zero or empty.
  • Keyboard shortcuts may not work properly.
  • Webpages may intermittently fail to load or render correctly.
  • Issues with credential prompts.
  • Issues when downloading files.

Resolution: This issue is resolved in KB4493451.

Back to top
January 08, 2019
KB4480975
Resolved
KB4493451
Resolved:
April 09, 2019
10:00 AM PT

Opened:
April 25, 2019
03:34 PM PT
MSXML6 may cause applications to stop responding
After installing KB4480975, MSXML6 causes applications to stop responding if an exception was thrown during node operations, such as appendChild(), insertBefore(), and moveNode().

The Group Policy editor may stop responding when editing a Group Policy Object (GPO) that contains Group Policy Preferences (GPP) for Internet Explorer 10 settings.

Resolution: This issue is resolved in KB4493451.

Back to top
January 08, 2019
KB4480975
Resolved
KB4493451
Resolved:
April 09, 2019
10:00 AM PT

Opened:
April 25, 2019
03:27 PM PT
Virtual machines fail to restore
After installing KB4480975, virtual machines (VM) may fail to restore successfully if the VM has been saved and restored once before. The error message is, \"Failed to restore the virtual machine state: Cannot restore this virtual machine because the saved state data cannot be read. Delete the saved state data and then try to start the virtual machine. (0xC0370027).\"

This affects AMD Bulldozer Family 15h, AMD Jaguar Family 16h, and AMD Puma Family 16h (second generation) microarchitectures.

Resolution: This issue is resolved in KB4490516.

Back to top
January 08, 2019
KB4480975
Resolved
KB4490516
Resolved:
February 19, 2019
02:00 PM PT

Opened:
April 25, 2019
03:22 PM PT
Applications using Microsoft Jet database fail to open
Applications that use a Microsoft Jet database with the Microsoft Access 97 file format may fail to open if the database has column names greater than 32 characters. The database will fail to open with the error, \"Unrecognized Database Format\".

Resolution: This issue is resolved in KB4487025.

Back to top
January 08, 2019
KB4480975
Resolved
KB4487025
Resolved:
February 12, 2019
10:00 AM PT

Opened:
April 25, 2019
03:19 PM PT
Unable to access hotspots with third-party applications
After installing KB4480975, third-party applications may have difficulty authenticating hotspots.

Resolution: This issue is resolved in KB4480971.

Back to top
January 08, 2019
KB4480975
Resolved
KB4480971
Resolved:
January 15, 2019
10:00 AM PT

Opened:
April 25, 2019
03:14 PM PT
Event Viewer may not show some event descriptions for network interface cards
After installing KB4457135, the Event Viewer may not show some event descriptions for network interface cards (NICs).

Resolution: This issue is resolved in KB4489891.

Back to top
September 11, 2018
KB4457135
Resolved
KB4489891
Resolved:
March 12, 2019
10:00 AM PT

Opened:
April 25, 2019
03:10 PM PT
Unable to use Seek bar in Windows Media Player
After installing KB4462929, users may not be able to use the Seek Bar in Windows Media Player when playing specific files. This issue does not affect normal playback.

Resolution: This issue is resolved in KB4471330.

Back to top
October 09, 2018
KB4462929
Resolved
KB4471330
Resolved:
December 11, 2018
10:00 AM PT

Opened:
April 25, 2019
02:47 PM PT
+ + + + + + + + + + +
DetailsOriginating updateStatusHistory
Unable to use Seek bar in Windows Media Player
After installing KB4462929, users may not be able to use the Seek Bar in Windows Media Player when playing specific files. This issue does not affect normal playback.

Resolution: This issue is resolved in KB4471330.

Back to top
October 09, 2018
KB4462929
Resolved
KB4471330
Resolved:
December 11, 2018
10:00 AM PT

Opened:
April 25, 2019
02:47 PM PT
Event Viewer may not show some event descriptions for network interface cards
After installing KB4457135, the Event Viewer may not show some event descriptions for network interface cards (NICs).

Resolution: This issue is resolved in KB4489891.

Back to top
September 11, 2018
KB4457135
Resolved
KB4489891
Resolved:
March 12, 2019
10:00 AM PT

Opened:
April 25, 2019
03:10 PM PT
Unable to access hotspots with third-party applications
After installing KB4480975, third-party applications may have difficulty authenticating hotspots.

Resolution: This issue is resolved in KB4480971.

Back to top
January 08, 2019
KB4480975
Resolved
KB4480971
Resolved:
January 15, 2019
10:00 AM PT

Opened:
April 25, 2019
03:14 PM PT
Applications using Microsoft Jet database fail to open
Applications that use a Microsoft Jet database with the Microsoft Access 97 file format may fail to open if the database has column names greater than 32 characters. The database will fail to open with the error, \"Unrecognized Database Format\".

Resolution: This issue is resolved in KB4487025.

Back to top
January 08, 2019
KB4480975
Resolved
KB4487025
Resolved:
February 12, 2019
10:00 AM PT

Opened:
April 25, 2019
03:19 PM PT
Virtual machines fail to restore
After installing KB4480975, virtual machines (VM) may fail to restore successfully if the VM has been saved and restored once before. The error message is, \"Failed to restore the virtual machine state: Cannot restore this virtual machine because the saved state data cannot be read. Delete the saved state data and then try to start the virtual machine. (0xC0370027).\"

This affects AMD Bulldozer Family 15h, AMD Jaguar Family 16h, and AMD Puma Family 16h (second generation) microarchitectures.

Resolution: This issue is resolved in KB4490516.

Back to top
January 08, 2019
KB4480975
Resolved
KB4490516
Resolved:
February 19, 2019
02:00 PM PT

Opened:
April 25, 2019
03:22 PM PT
Internet Explorer 11 authentication issue with multiple concurrent logons
After installing KB4480975, Internet Explorer 11 and other applications that use WININET.DLL may have authentication issues. This occurs when two or more people use the same user account for multiple, concurrent login sessions on the same Windows Server machine, including Remote Desktop Protocol (RDP) and Terminal Server logons. Symptoms reported by customers include, but may not be limited to:
  • Cache size and location show zero or empty.
  • Keyboard shortcuts may not work properly.
  • Webpages may intermittently fail to load or render correctly.
  • Issues with credential prompts.
  • Issues when downloading files.

Resolution: This issue is resolved in KB4493451.

Back to top
January 08, 2019
KB4480975
Resolved
KB4493451
Resolved:
April 09, 2019
10:00 AM PT

Opened:
April 25, 2019
03:34 PM PT
MSXML6 may cause applications to stop responding
After installing KB4480975, MSXML6 causes applications to stop responding if an exception was thrown during node operations, such as appendChild(), insertBefore(), and moveNode().

The Group Policy editor may stop responding when editing a Group Policy Object (GPO) that contains Group Policy Preferences (GPP) for Internet Explorer 10 settings.

Resolution: This issue is resolved in KB4493451.

Back to top
January 08, 2019
KB4480975
Resolved
KB4493451
Resolved:
April 09, 2019
10:00 AM PT

Opened:
April 25, 2019
03:27 PM PT
Error 1309 when installing/uninstalling MSI or MSP files
After installing KB4487025, users may receive \"Error 1309\" while installing or uninstalling certain types of MSI and MSP files.

Resolution: This issue is resolved in KB4489891.

Back to top
February 12, 2019
KB4487025
Resolved
KB4489891
Resolved:
March 12, 2019
10:00 AM PT

Opened:
April 25, 2019
03:36 PM PT
Embedded objects may display incorrectly
Any compound document (OLE) server application that places embedded objects into the Windows Metafile (WMF) using the PatBlt API may display embedded objects incorrectly.

For example, if you paste a Microsoft Excel worksheet object into a Microsoft Word document, the cells may render with a different background color.

Resolution: This issue is resolved in KB4493451.

Back to top
February 12, 2019
KB4487025
Resolved
KB4493451
Resolved:
April 09, 2019
10:00 AM PT

Opened:
April 25, 2019
04:00 PM PT
First character of the Japanese era name not recognized as an abbreviation
After installing KB4480971, the first character of the Japanese era name is not recognized as an abbreviation and may cause date parsing issues.

Resolution: This issue is resolved in KB4487024.

Back to top
January 15, 2019
KB4480971
Resolved
KB4487024
Resolved:
February 19, 2019
02:00 PM PT

Opened:
April 25, 2019
04:01 PM PT
Applications using Microsoft Jet database and Access 95 file format stop working
Applications that use a Microsoft Jet database with the Microsoft Access 95 file format may randomly stop working.

Resolution: This issue is resolved in KB4487024.

Back to top
February 12, 2019
KB4487025
Resolved
KB4487024
Resolved:
February 19, 2019
02:00 PM PT

Opened:
April 25, 2019
04:04 PM PT
" diff --git a/windows/release-information/status-windows-10-1507.yml b/windows/release-information/status-windows-10-1507.yml index 120633fde0..f7c75234a8 100644 --- a/windows/release-information/status-windows-10-1507.yml +++ b/windows/release-information/status-windows-10-1507.yml @@ -59,9 +59,9 @@ sections: - items: - type: markdown text: "
This table offers a summary of current active issues and those issues that have been resolved in the last 30 days.
- - - +
SummaryOriginating updateStatusLast updated
MSXML6 may cause applications to stop responding
MSXML6 may cause applications to stop responding if an exception was thrown during node operations, such as appendChild(), insertBefore(), and moveNode().

See details >
OS Build 10240.18094

January 08, 2019
KB4480962
Resolved
KB4493475
April 09, 2019
10:00 AM PT
Custom URI schemes may not start corresponding application
Custom URI schemes for application protocol handlers may not start the corresponding application for local intranet and trusted sites in Internet Explorer.

See details >
OS Build 10240.18158

March 12, 2019
KB4489872
Resolved
KB4493475
April 09, 2019
10:00 AM PT
+ +
SummaryOriginating updateStatusLast updated
MSXML6 may cause applications to stop responding
MSXML6 may cause applications to stop responding if an exception was thrown during node operations, such as appendChild(), insertBefore(), and moveNode().

See details >
OS Build 10240.18094

January 08, 2019
KB4480962
Resolved
KB4493475
April 09, 2019
10:00 AM PT
Custom URI schemes may not start corresponding application
Custom URI schemes for application protocol handlers may not start the corresponding application for local intranet and trusted sites in Internet Explorer.

See details >
OS Build 10240.18158

March 12, 2019
KB4489872
Resolved
KB4493475
April 09, 2019
10:00 AM PT
" @@ -76,8 +76,8 @@ sections: - items: - type: markdown text: " - - +
DetailsOriginating updateStatusHistory
Custom URI schemes may not start corresponding application
After installing KB4489872, Custom URI Schemes for Application Protocol handlers may not start the corresponding application for local intranet and trusted sites on Internet Explorer.

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 8.1; Windows 7, Service Pack 1 
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2; Windows Server 2008 R2 SP1

Resolution: This issue was resolved in KB4493475.

Back to top
OS Build 10240.18158

March 12, 2019
KB4489872
Resolved
KB4493475
Resolved:
April 09, 2019
10:00 AM PT

Opened:
March 12, 2019
10:00 AM PT
+
DetailsOriginating updateStatusHistory
Custom URI schemes may not start corresponding application
After installing KB4489872, Custom URI Schemes for Application Protocol handlers may not start the corresponding application for local intranet and trusted sites on Internet Explorer.

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 8.1; Windows 7, Service Pack 1 
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2; Windows Server 2008 R2 SP1

Resolution: This issue was resolved in KB4493475.

Back to top
OS Build 10240.18158

March 12, 2019
KB4489872
Resolved
KB4493475
Resolved:
April 09, 2019
10:00 AM PT

Opened:
March 12, 2019
10:00 AM PT
" @@ -85,7 +85,7 @@ sections: - items: - type: markdown text: " - - +
DetailsOriginating updateStatusHistory
MSXML6 may cause applications to stop responding
After installing KB4480962, MSXML6 causes applications to stop responding if an exception was thrown during node operations, such as appendChild(), insertBefore(), and moveNode().

The Group Policy editor may stop responding when editing a Group Policy Object (GPO) that contains Group Policy Preferences (GPP) for Internet Explorer 10 settings.

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 8.1
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2

Resolution: This issue was resolved in KB4493475.

Back to top
OS Build 10240.18094

January 08, 2019
KB4480962
Resolved
KB4493475
Resolved:
April 09, 2019
10:00 AM PT

Opened:
January 08, 2019
10:00 AM PT
+
DetailsOriginating updateStatusHistory
MSXML6 may cause applications to stop responding
After installing KB4480962, MSXML6 causes applications to stop responding if an exception was thrown during node operations, such as appendChild(), insertBefore(), and moveNode().

The Group Policy editor may stop responding when editing a Group Policy Object (GPO) that contains Group Policy Preferences (GPP) for Internet Explorer 10 settings.

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 8.1
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2

Resolution: This issue was resolved in KB4493475.

Back to top
OS Build 10240.18094

January 08, 2019
KB4480962
Resolved
KB4493475
Resolved:
April 09, 2019
10:00 AM PT

Opened:
January 08, 2019
10:00 AM PT
" diff --git a/windows/release-information/status-windows-10-1607-and-windows-server-2016.yml b/windows/release-information/status-windows-10-1607-and-windows-server-2016.yml index a36fdff01f..f441e35df1 100644 --- a/windows/release-information/status-windows-10-1607-and-windows-server-2016.yml +++ b/windows/release-information/status-windows-10-1607-and-windows-server-2016.yml @@ -59,15 +59,15 @@ sections: - items: - type: markdown text: "
This table offers a summary of current active issues and those issues that have been resolved in the last 30 days.
- - - - - - - - - +
SummaryOriginating updateStatusLast updated
End-user-defined characters (EUDC) cause blue screen at startup
If you enable per font end-user-defined characters (EUDC), the system will stop working and a blue screen may appear at startup.

See details >
OS Build 14393.2879

March 19, 2019
KB4489889
Resolved
KB4493470
April 09, 2019
10:00 AM PT
Internet Explorer 11 authentication issue with multiple concurrent logons
Internet Explorer 11 users may encounter issues if two or more people use the same user account for multiple, concurrent login sessions on the same Windows Server machine.

See details >
OS Build 14393.2724

January 08, 2019
KB4480961
Resolved
KB4493470
April 09, 2019
10:00 AM PT
MSXML6 may cause applications to stop responding
MSXML6 may cause applications to stop responding if an exception was thrown during node operations, such as appendChild(), insertBefore(), and moveNode().

See details >
OS Build 14393.2724

January 08, 2019
KB4480961
Resolved
KB4493470
April 09, 2019
10:00 AM PT
Cluster service may fail if the minimum password length is set to greater than 14
The cluster service may fail to start with the error “2245 (NERR_PasswordTooShort)” if the Group Policy “Minimum Password Length” is configured with greater than 14 characters.

See details >
OS Build 14393.2639

November 27, 2018
KB4467684
Mitigated
March 19, 2019
10:00 AM PT
Custom URI schemes may not start corresponding application
Custom URI schemes for application protocol handlers may not start the corresponding application for local intranet and trusted sites in Internet Explorer.

See details >
OS Build 14393.2848

March 12, 2019
KB4489882
Mitigated
March 19, 2019
10:00 AM PT
Issue using PXE to start a device from WDS
There may be issues using the Preboot Execution Environment (PXE) to start a device from a Windows Deployment Services (WDS) server configured to use Variable Window Extension.

See details >
OS Build 14393.2848

March 12, 2019
KB4489882
Mitigated
March 19, 2019
10:00 AM PT
SCVMM cannot enumerate and manage logical switches deployed on the host
For hosts managed by System Center Virtual Machine Manager (VMM), VMM cannot enumerate and manage logical switches deployed on the host.

See details >
OS Build 14393.2639

November 27, 2018
KB4467684
Mitigated
March 19, 2019
10:00 AM PT
Windows may not start on certain Lenovo and Fujitsu laptops with less than 8GB of RAM
Windows may fail to start on certain Lenovo and Fujitsu laptops that have less than 8 GB of RAM.

See details >
OS Build 14393.2608

November 13, 2018
KB4467691
Mitigated
February 19, 2019
10:00 AM PT
+ + + + + + + +
SummaryOriginating updateStatusLast updated
Cluster service may fail if the minimum password length is set to greater than 14
The cluster service may fail to start with the error “2245 (NERR_PasswordTooShort)” if the Group Policy “Minimum Password Length” is configured with greater than 14 characters.

See details >
OS Build 14393.2639

November 27, 2018
KB4467684
Mitigated
March 19, 2019
10:00 AM PT
Custom URI schemes may not start corresponding application
Custom URI schemes for application protocol handlers may not start the corresponding application for local intranet and trusted sites in Internet Explorer.

See details >
OS Build 14393.2848

March 12, 2019
KB4489882
Mitigated
March 19, 2019
10:00 AM PT
Issue using PXE to start a device from WDS
There may be issues using the Preboot Execution Environment (PXE) to start a device from a Windows Deployment Services (WDS) server configured to use Variable Window Extension.

See details >
OS Build 14393.2848

March 12, 2019
KB4489882
Mitigated
March 19, 2019
10:00 AM PT
SCVMM cannot enumerate and manage logical switches deployed on the host
For hosts managed by System Center Virtual Machine Manager (VMM), VMM cannot enumerate and manage logical switches deployed on the host.

See details >
OS Build 14393.2639

November 27, 2018
KB4467684
Mitigated
March 19, 2019
10:00 AM PT
Windows may not start on certain Lenovo and Fujitsu laptops with less than 8GB of RAM
Windows may fail to start on certain Lenovo and Fujitsu laptops that have less than 8 GB of RAM.

See details >
OS Build 14393.2608

November 13, 2018
KB4467691
Mitigated
February 19, 2019
10:00 AM PT
End-user-defined characters (EUDC) cause blue screen at startup
If you enable per font end-user-defined characters (EUDC), the system will stop working and a blue screen may appear at startup.

See details >
OS Build 14393.2879

March 19, 2019
KB4489889
Resolved
KB4493470
April 09, 2019
10:00 AM PT
Internet Explorer 11 authentication issue with multiple concurrent logons
Internet Explorer 11 users may encounter issues if two or more people use the same user account for multiple, concurrent login sessions on the same Windows Server machine.

See details >
OS Build 14393.2724

January 08, 2019
KB4480961
Resolved
KB4493470
April 09, 2019
10:00 AM PT
MSXML6 may cause applications to stop responding
MSXML6 may cause applications to stop responding if an exception was thrown during node operations, such as appendChild(), insertBefore(), and moveNode().

See details >
OS Build 14393.2724

January 08, 2019
KB4480961
Resolved
KB4493470
April 09, 2019
10:00 AM PT
" @@ -82,11 +82,11 @@ sections: - items: - type: markdown text: " - - - +
DetailsOriginating updateStatusHistory
End-user-defined characters (EUDC) cause blue screen at startup
If you enable per font end-user-defined characters (EUDC), the system will stop working and a blue screen may appear at startup. This is not a common setting in non-Asian regions.

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016

Resolution: This issue was resolved in KB4493470.

Back to top
OS Build 14393.2879

March 19, 2019
KB4489889
Resolved
KB4493470
Resolved:
April 09, 2019
10:00 AM PT

Opened:
March 19, 2019
10:00 AM PT
Custom URI schemes may not start corresponding application
After installing KB4489882, Custom URI schemes for application protocol handlers may not start the corresponding application for local intranet and trusted sites security zones on Internet Explorer.

Affected platforms: 
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 8.1; Windows 7, Service Pack 1 
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2; Windows Server 2008 R2 SP1

Workaround: Right-click the URL link to open it in a new window or tab, or enable Protected Mode in Internet Explorer for local intranet and trusted sites
  1. Go to Tools > Internet options > Security.
  2. Within Select a zone to view or change security settings, select Local intranet and then select Enable Protected Mode.
  3. Select Trusted sites and then select Enable Protected Mode.
  4. Select OK.
You must restart the browser after making these changes.

Next steps: Microsoft is working on a resolution and will provide an update in an upcoming release.

Back to top
OS Build 14393.2848

March 12, 2019
KB4489882
Mitigated
Last updated:
March 19, 2019
10:00 AM PT

Opened:
March 12, 2019
10:00 AM PT
+ +
Option 2:
Use the Windows Deployment Services UI to make the following adjustment:
  1. Open Windows Deployment Services from Windows Administrative Tools.
  2. Expand Servers and right-click a WDS server.
  3. Open its properties and clear the Enable Variable Window Extension box on the TFTP tab.
Option 3:
Set the following registry value to 0:
HKLM\\System\\CurrentControlSet\\Services\\WDSServer\\Providers\\WDSTFTP\\EnableVariableWindowExtension
Restart the WDSServer service after disabling the Variable Window Extension.

Next steps: Microsoft is working on a resolution and will provide an update in an upcoming release.

Back to top +
DetailsOriginating updateStatusHistory
Custom URI schemes may not start corresponding application
After installing KB4489882, Custom URI schemes for application protocol handlers may not start the corresponding application for local intranet and trusted sites security zones on Internet Explorer.

Affected platforms: 
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 8.1; Windows 7, Service Pack 1 
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2; Windows Server 2008 R2 SP1

Workaround: Right-click the URL link to open it in a new window or tab, or enable Protected Mode in Internet Explorer for local intranet and trusted sites
  1. Go to Tools > Internet options > Security.
  2. Within Select a zone to view or change security settings, select Local intranet and then select Enable Protected Mode.
  3. Select Trusted sites and then select Enable Protected Mode.
  4. Select OK.
You must restart the browser after making these changes.

Next steps: Microsoft is working on a resolution and will provide an update in an upcoming release.

Back to top
OS Build 14393.2848

March 12, 2019
KB4489882
Mitigated
Last updated:
March 19, 2019
10:00 AM PT

Opened:
March 12, 2019
10:00 AM PT
Issue using PXE to start a device from WDS
After installing KB4489882, there may be issues using the Preboot Execution Environment (PXE) to start a device from a Windows Deployment Services (WDS) server configured to use Variable Window Extension. This may cause the connection to the WDS server to terminate prematurely while downloading the image. This issue does not affect clients or devices that are not using Variable Window Extension.

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10 Enterprise LTSC 2016; Windows 8.1
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server 2016; Windows Server 2012 R2

Workaround: To mitigate the issue, disable the Variable Window Extension on WDS server using one of the following options:
Option 1:
Open an Administrator Command prompt and type the following:
Wdsutil /Set-TransportServer /EnableTftpVariableWindowExtension:No
-
Option 2:
Use the Windows Deployment Services UI to make the following adjustment:
  1. Open Windows Deployment Services from Windows Administrative Tools.
  2. Expand Servers and right-click a WDS server.
  3. Open its properties and clear the Enable Variable Window Extension box on the TFTP tab.
Option 3:
Set the following registry value to 0:
HKLM\\System\\CurrentControlSet\\Services\\WDSServer\\Providers\\WDSTFTP\\EnableVariableWindowExtension
Restart the WDSServer service after disabling the Variable Window Extension.

Next steps: Microsoft is working on a resolution and will provide an update in an upcoming release.

Back to top
OS Build 14393.2848

March 12, 2019
KB4489882
Mitigated
Last updated:
March 19, 2019
10:00 AM PT

Opened:
March 12, 2019
10:00 AM PT
OS Build 14393.2848

March 12, 2019
KB4489882
Mitigated
Last updated:
March 19, 2019
10:00 AM PT

Opened:
March 12, 2019
10:00 AM PT
End-user-defined characters (EUDC) cause blue screen at startup
If you enable per font end-user-defined characters (EUDC), the system will stop working and a blue screen may appear at startup. This is not a common setting in non-Asian regions.

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016

Resolution: This issue was resolved in KB4493470.

Back to top
OS Build 14393.2879

March 19, 2019
KB4489889
Resolved
KB4493470
Resolved:
April 09, 2019
10:00 AM PT

Opened:
March 19, 2019
10:00 AM PT
" @@ -94,9 +94,9 @@ sections: - items: - type: markdown text: " - - - +
DetailsOriginating updateStatusHistory
Internet Explorer 11 authentication issue with multiple concurrent logons
After installing KB4480961, Internet Explorer 11 and other applications that use WININET.DLL may have authentication issues. This occurs when two or more people use the same user account for multiple, concurrent login sessions on the same Windows Server machine, including Remote Desktop Protocol (RDP) and Terminal Server logons. Symptoms reported by customers include, but may not be limited to:
  • Cache size and location show zero or empty.
  • Keyboard shortcuts may not work properly.
  • Webpages may intermittently fail to load or render correctly.
  • Issues with credential prompts.
  • Issues when downloading files.

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10 Enterprise LTSC 2016; Windows 8.1; Windows 7, Service Pack 1
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server 2016; Windows Server 2012 R2; Windows Server 2008 R2 SP1

Resolution: This issue was resolved in KB4493470.

Back to top
OS Build 14393.2724

January 08, 2019
KB4480961
Resolved
KB4493470
Resolved:
April 09, 2019
10:00 AM PT

Opened:
January 08, 2019
10:00 AM PT
MSXML6 may cause applications to stop responding
After installing KB4480961, MSXML6 causes applications to stop responding if an exception was thrown during node operations, such as appendChild(), insertBefore(), and moveNode().

The Group Policy editor may stop responding when editing a Group Policy Object (GPO) that contains Group Policy Preferences (GPP) for Internet Explorer 10 settings.

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 8.1
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2

Resolution: This issue was resolved in KB4493470.

Back to top
OS Build 14393.2724

January 08, 2019
KB4480961
Resolved
KB4493470
Resolved:
April 09, 2019
10:00 AM PT

Opened:
January 08, 2019
10:00 AM PT
+ +
DetailsOriginating updateStatusHistory
Internet Explorer 11 authentication issue with multiple concurrent logons
After installing KB4480961, Internet Explorer 11 and other applications that use WININET.DLL may have authentication issues. This occurs when two or more people use the same user account for multiple, concurrent login sessions on the same Windows Server machine, including Remote Desktop Protocol (RDP) and Terminal Server logons. Symptoms reported by customers include, but may not be limited to:
  • Cache size and location show zero or empty.
  • Keyboard shortcuts may not work properly.
  • Webpages may intermittently fail to load or render correctly.
  • Issues with credential prompts.
  • Issues when downloading files.

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10 Enterprise LTSC 2016; Windows 8.1; Windows 7, Service Pack 1
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server 2016; Windows Server 2012 R2; Windows Server 2008 R2 SP1

Resolution: This issue was resolved in KB4493470.

Back to top
OS Build 14393.2724

January 08, 2019
KB4480961
Resolved
KB4493470
Resolved:
April 09, 2019
10:00 AM PT

Opened:
January 08, 2019
10:00 AM PT
MSXML6 may cause applications to stop responding
After installing KB4480961, MSXML6 causes applications to stop responding if an exception was thrown during node operations, such as appendChild(), insertBefore(), and moveNode().

The Group Policy editor may stop responding when editing a Group Policy Object (GPO) that contains Group Policy Preferences (GPP) for Internet Explorer 10 settings.

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 8.1
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2

Resolution: This issue was resolved in KB4493470.

Back to top
OS Build 14393.2724

January 08, 2019
KB4480961
Resolved
KB4493470
Resolved:
April 09, 2019
10:00 AM PT

Opened:
January 08, 2019
10:00 AM PT
" @@ -104,9 +104,9 @@ sections: - items: - type: markdown text: " - - - - +
DetailsOriginating updateStatusHistory
Cluster service may fail if the minimum password length is set to greater than 14
After installing KB4467684, the cluster service may fail to start with the error \"2245 (NERR_PasswordTooShort)\" if the Group Policy \"Minimum Password Length\" is configured with greater than 14 characters.

Affected platforms:
  • Client: Windows 10 Enterprise LTSC 2016
  • Server: Windows Server 2016

Workaround: Set the domain default \"Minimum Password Length\" policy to less than or equal to 14 characters.

Next steps: Microsoft is working on a resolution and will provide an update in an upcoming release.

Back to top
OS Build 14393.2639

November 27, 2018
KB4467684
Mitigated
Last updated:
March 19, 2019
10:00 AM PT

Opened:
November 27, 2018
10:00 AM PT
SCVMM cannot enumerate and manage logical switches deployed on the host
For hosts managed by System Center Virtual Machine Manager (VMM), VMM cannot enumerate and manage logical switches deployed on the host after installing KB4467684.

Additionally, if you do not follow the best practices, a stop error may occur in vfpext.sys on the hosts.

Affected platforms:
  • Client: Windows 10 Enterprise LTSC 2016
  • Server: Windows Server 2016

Workaround:
Run mofcomp on the following mof files on the affected host:

  • Scvmmswitchportsettings.mof
  • VMMDHCPSvr.mof

Follow the best practices while patching to avoid a stop error in vfpext.sys in an SDN v2 environment (NC managed hosts).

Back to top
OS Build 14393.2639

November 27, 2018
KB4467684
Mitigated
Last updated:
March 19, 2019
10:00 AM PT

Opened:
November 27, 2018
10:00 AM PT
Windows may not start on certain Lenovo and Fujitsu laptops with less than 8GB of RAM
After installing KB4467691, Windows may fail to start on certain Lenovo and Fujitsu laptops that have less than 8 GB of RAM.

Affected platforms:
  • Client: Windows 10 Enterprise LTSC 2016
  • Server: Windows Server 2016

Workaround: Restart the affected machine using the Unified Extensible Firmware Interface (UEFI). Disable Secure Boot and then restart.

If BitLocker is enabled on your machine, you may have to go through BitLocker recovery after Secure Boot has been disabled.

Next steps: Lenovo and Fujitsu are aware of this issue. Please contact your OEM to ask if there is a firmware update available for your device.

Back to top
OS Build 14393.2608

November 13, 2018
KB4467691
Mitigated
Last updated:
February 19, 2019
10:00 AM PT

Opened:
November 13, 2018
10:00 AM PT
+ + +
DetailsOriginating updateStatusHistory
Cluster service may fail if the minimum password length is set to greater than 14
After installing KB4467684, the cluster service may fail to start with the error \"2245 (NERR_PasswordTooShort)\" if the Group Policy \"Minimum Password Length\" is configured with greater than 14 characters.

Affected platforms:
  • Client: Windows 10 Enterprise LTSC 2016
  • Server: Windows Server 2016

Workaround: Set the domain default \"Minimum Password Length\" policy to less than or equal to 14 characters.

Next steps: Microsoft is working on a resolution and will provide an update in an upcoming release.

Back to top
OS Build 14393.2639

November 27, 2018
KB4467684
Mitigated
Last updated:
March 19, 2019
10:00 AM PT

Opened:
November 27, 2018
10:00 AM PT
SCVMM cannot enumerate and manage logical switches deployed on the host
For hosts managed by System Center Virtual Machine Manager (VMM), VMM cannot enumerate and manage logical switches deployed on the host after installing KB4467684.

Additionally, if you do not follow the best practices, a stop error may occur in vfpext.sys on the hosts.

Affected platforms:
  • Client: Windows 10 Enterprise LTSC 2016
  • Server: Windows Server 2016

Workaround:
Run mofcomp on the following mof files on the affected host:

  • Scvmmswitchportsettings.mof
  • VMMDHCPSvr.mof

Follow the best practices while patching to avoid a stop error in vfpext.sys in an SDN v2 environment (NC managed hosts).

Back to top
OS Build 14393.2639

November 27, 2018
KB4467684
Mitigated
Last updated:
March 19, 2019
10:00 AM PT

Opened:
November 27, 2018
10:00 AM PT
Windows may not start on certain Lenovo and Fujitsu laptops with less than 8GB of RAM
After installing KB4467691, Windows may fail to start on certain Lenovo and Fujitsu laptops that have less than 8 GB of RAM.

Affected platforms:
  • Client: Windows 10 Enterprise LTSC 2016
  • Server: Windows Server 2016

Workaround: Restart the affected machine using the Unified Extensible Firmware Interface (UEFI). Disable Secure Boot and then restart.

If BitLocker is enabled on your machine, you may have to go through BitLocker recovery after Secure Boot has been disabled.

Next steps: Lenovo and Fujitsu are aware of this issue. Please contact your OEM to ask if there is a firmware update available for your device.

Back to top
OS Build 14393.2608

November 13, 2018
KB4467691
Mitigated
Last updated:
February 19, 2019
10:00 AM PT

Opened:
November 13, 2018
10:00 AM PT
" diff --git a/windows/release-information/status-windows-10-1703.yml b/windows/release-information/status-windows-10-1703.yml index a7cfff3a9d..77bb2ce556 100644 --- a/windows/release-information/status-windows-10-1703.yml +++ b/windows/release-information/status-windows-10-1703.yml @@ -59,10 +59,10 @@ sections: - items: - type: markdown text: "
This table offers a summary of current active issues and those issues that have been resolved in the last 30 days.
- - - - +
SummaryOriginating updateStatusLast updated
End-user-defined characters (EUDC) may cause blue screen at startup
If you enable per font end-user-defined characters (EUDC), the system may stop working and a blue screen may appear at startup.

See details >
OS Build 15063.1716

March 19, 2019
KB4489888
Resolved
KB4493474
April 09, 2019
10:00 AM PT
MSXML6 may cause applications to stop responding
MSXML6 may cause applications to stop responding if an exception was thrown during node operations, such as appendChild(), insertBefore(), and moveNode().

See details >
OS Build 15063.1563

January 08, 2019
KB4480973
Resolved
KB4493474
April 09, 2019
10:00 AM PT
Custom URI schemes may not start corresponding application
Custom URI schemes for application protocol handlers may not start the corresponding application for local intranet and trusted sites in Internet Explorer.

See details >
OS Build 15063.1689

March 12, 2019
KB4489871
Mitigated
March 19, 2019
10:00 AM PT
+ + +
SummaryOriginating updateStatusLast updated
Custom URI schemes may not start corresponding application
Custom URI schemes for application protocol handlers may not start the corresponding application for local intranet and trusted sites in Internet Explorer.

See details >
OS Build 15063.1689

March 12, 2019
KB4489871
Mitigated
March 19, 2019
10:00 AM PT
End-user-defined characters (EUDC) may cause blue screen at startup
If you enable per font end-user-defined characters (EUDC), the system may stop working and a blue screen may appear at startup.

See details >
OS Build 15063.1716

March 19, 2019
KB4489888
Resolved
KB4493474
April 09, 2019
10:00 AM PT
MSXML6 may cause applications to stop responding
MSXML6 may cause applications to stop responding if an exception was thrown during node operations, such as appendChild(), insertBefore(), and moveNode().

See details >
OS Build 15063.1563

January 08, 2019
KB4480973
Resolved
KB4493474
April 09, 2019
10:00 AM PT
" @@ -77,9 +77,9 @@ sections: - items: - type: markdown text: " - - - +
DetailsOriginating updateStatusHistory
End-user-defined characters (EUDC) may cause blue screen at startup
If you enable per font end-user-defined characters (EUDC), the system may stop working and a blue screen may appear at startup. This is not a common setting in non-Asian regions.

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016

Resolution: This issue was resolved in KB4493474.

Back to top
OS Build 15063.1716

March 19, 2019
KB4489888
Resolved
KB4493474
Resolved:
April 09, 2019
10:00 AM PT

Opened:
March 19, 2019
10:00 AM PT
Custom URI schemes may not start corresponding application
After installing KB4489871, custom URI schemes for application protocol handlers may not start the corresponding application for local intranet and trusted sites security zones on Internet Explorer.

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 8.1; Windows 7, Service Pack 1 
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2; Windows Server 2008 R2 SP1

Workaround: Right-click the URL link to open it in a new window or tab, or enable Protected Mode in Internet Explorer for local intranet and trusted sites
1. Go to Tools > Internet options > Security.
2. Within Select a zone to view or change security settings, select Local intranet and then select Enable Protected Mode.
3. Select Trusted sites and then select Enable Protected Mode.
4. Select OK.
You must restart the browser after making these changes.

Next steps: Microsoft is working on a resolution and will provide an update in an upcoming release.

Back to top
OS Build 15063.1689

March 12, 2019
KB4489871
Mitigated
Last updated:
March 19, 2019
10:00 AM PT

Opened:
March 12, 2019
10:00 AM PT
+ +
DetailsOriginating updateStatusHistory
Custom URI schemes may not start corresponding application
After installing KB4489871, custom URI schemes for application protocol handlers may not start the corresponding application for local intranet and trusted sites security zones on Internet Explorer.

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 8.1; Windows 7, Service Pack 1 
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2; Windows Server 2008 R2 SP1

Workaround: Right-click the URL link to open it in a new window or tab, or enable Protected Mode in Internet Explorer for local intranet and trusted sites
1. Go to Tools > Internet options > Security.
2. Within Select a zone to view or change security settings, select Local intranet and then select Enable Protected Mode.
3. Select Trusted sites and then select Enable Protected Mode.
4. Select OK.
You must restart the browser after making these changes.

Next steps: Microsoft is working on a resolution and will provide an update in an upcoming release.

Back to top
OS Build 15063.1689

March 12, 2019
KB4489871
Mitigated
Last updated:
March 19, 2019
10:00 AM PT

Opened:
March 12, 2019
10:00 AM PT
End-user-defined characters (EUDC) may cause blue screen at startup
If you enable per font end-user-defined characters (EUDC), the system may stop working and a blue screen may appear at startup. This is not a common setting in non-Asian regions.

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016

Resolution: This issue was resolved in KB4493474.

Back to top
OS Build 15063.1716

March 19, 2019
KB4489888
Resolved
KB4493474
Resolved:
April 09, 2019
10:00 AM PT

Opened:
March 19, 2019
10:00 AM PT
" @@ -87,7 +87,7 @@ sections: - items: - type: markdown text: " - - +
DetailsOriginating updateStatusHistory
MSXML6 may cause applications to stop responding
After installing KB4480973, MSXML6 causes applications to stop responding if an exception was thrown during node operations, such as appendChild(), insertBefore(), and moveNode().

The Group Policy editor may stop responding when editing a Group Policy Object (GPO) that contains Group Policy Preferences (GPP) for Internet Explorer 10 settings.

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 8.1
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2

Resolution: This issue was resolved in KB4493474.

Back to top
OS Build 15063.1563

January 08, 2019
KB4480973
Resolved
KB4493474
Resolved:
April 09, 2019
10:00 AM PT

Opened:
January 08, 2019
10:00 AM PT
+
DetailsOriginating updateStatusHistory
MSXML6 may cause applications to stop responding
After installing KB4480973, MSXML6 causes applications to stop responding if an exception was thrown during node operations, such as appendChild(), insertBefore(), and moveNode().

The Group Policy editor may stop responding when editing a Group Policy Object (GPO) that contains Group Policy Preferences (GPP) for Internet Explorer 10 settings.

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 8.1
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2

Resolution: This issue was resolved in KB4493474.

Back to top
OS Build 15063.1563

January 08, 2019
KB4480973
Resolved
KB4493474
Resolved:
April 09, 2019
10:00 AM PT

Opened:
January 08, 2019
10:00 AM PT
" diff --git a/windows/release-information/status-windows-10-1709.yml b/windows/release-information/status-windows-10-1709.yml index fb2e9c8c5e..e31967236f 100644 --- a/windows/release-information/status-windows-10-1709.yml +++ b/windows/release-information/status-windows-10-1709.yml @@ -59,11 +59,11 @@ sections: - items: - type: markdown text: "
This table offers a summary of current active issues and those issues that have been resolved in the last 30 days.
- - - - - +
SummaryOriginating updateStatusLast updated
End-user-defined characters (EUDC) may cause blue screen at startup
If you enable per font end-user-defined characters (EUDC), the system may stop working and a blue screen may appear at startup.

See details >
OS Build 16299.1059

March 19, 2019
KB4489890
Resolved
KB4493441
April 09, 2019
10:00 AM PT
MSXML6 causes applications to stop responding if an exception was thrown
MSXML6 causes applications to stop responding if an exception was thrown during node operations, such as appendChild(), insertBefore(), and moveNode().

See details >
OS Build 16299.904

January 08, 2019
KB4480978
Resolved
KB4493441
April 09, 2019
10:00 AM PT
Stop error when attempting to start SSH from WSL
A stop error occurs when attempting to start the Secure Shell client program from Windows Subsystem for Linux with agent forwarding enabled using a command line switch (ssh –A) or

See details >
OS Build 16299.1029

March 12, 2019
KB4489886
Resolved
KB4493441
April 09, 2019
10:00 AM PT
Custom URI schemes may not start corresponding application
Custom URI schemes for application protocol handlers may not start the corresponding application for local intranet and trusted sites in Internet Explorer.

See details >
OS Build 16299.1029

March 12, 2019
KB4489886
Mitigated
March 19, 2019
10:00 AM PT
+ + + +
SummaryOriginating updateStatusLast updated
Custom URI schemes may not start corresponding application
Custom URI schemes for application protocol handlers may not start the corresponding application for local intranet and trusted sites in Internet Explorer.

See details >
OS Build 16299.1029

March 12, 2019
KB4489886
Mitigated
March 19, 2019
10:00 AM PT
End-user-defined characters (EUDC) may cause blue screen at startup
If you enable per font end-user-defined characters (EUDC), the system may stop working and a blue screen may appear at startup.

See details >
OS Build 16299.1059

March 19, 2019
KB4489890
Resolved
KB4493441
April 09, 2019
10:00 AM PT
MSXML6 causes applications to stop responding if an exception was thrown
MSXML6 causes applications to stop responding if an exception was thrown during node operations, such as appendChild(), insertBefore(), and moveNode().

See details >
OS Build 16299.904

January 08, 2019
KB4480978
Resolved
KB4493441
April 09, 2019
10:00 AM PT
Stop error when attempting to start SSH from WSL
A stop error occurs when attempting to start the Secure Shell client program from Windows Subsystem for Linux with agent forwarding enabled using a command line switch (ssh –A) or

See details >
OS Build 16299.1029

March 12, 2019
KB4489886
Resolved
KB4493441
April 09, 2019
10:00 AM PT
" @@ -78,10 +78,10 @@ sections: - items: - type: markdown text: " - - - - +
DetailsOriginating updateStatusHistory
End-user-defined characters (EUDC) may cause blue screen at startup
If you enable per font end-user-defined characters (EUDC), the system may stop working and a blue screen may appear at startup. This is not a common setting in non-Asian regions.

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016

Resolution: This issue is resolved in KB4493441.

Back to top
OS Build 16299.1059

March 19, 2019
KB4489890
Resolved
KB4493441
Resolved:
April 09, 2019
10:00 AM PT

Opened:
March 19, 2019
10:00 AM PT
Stop error when attempting to start SSH from WSL
After applying KB4489886, a stop error occurs when attempting to start the Secure Shell (SSH) client program from Windows Subsystem for Linux (WSL) with agent forwarding enabled using a command line switch (ssh –A) or a configuration setting.

Affected platforms:
  • Client: Windows 10, version 1803; Windows 10, version 1709
  • Server: Windows Server, version 1803; Windows Server, version 1709

Resolution: This issue is resolved in KB4493441.

Back to top
OS Build 16299.1029

March 12, 2019
KB4489886
Resolved
KB4493441
Resolved:
April 09, 2019
10:00 AM PT

Opened:
March 12, 2019
10:00 AM PT
Custom URI schemes may not start corresponding application
After installing KB4489886, custom URI schemes for application protocol handlers may not start the corresponding application for local intranet and trusted sites security zones on Internet Explorer.

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 8.1; Windows 7, Service Pack 1 
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2; Windows Server 2008 R2 SP1

Workaround: Right-click the URL link to open it in a new window or tab, or enable Protected Mode in Internet Explorer for local intranet and trusted sites
1. Go to Tools > Internet options > Security.
2. Within Select a zone to view or change security settings, select Local intranet and then select Enable Protected Mode.
3. Select Trusted sites and then select Enable Protected Mode.
4. Select OK.
You must restart the browser after making these changes.

Next steps: Microsoft is working on a resolution and will provide an update in an upcoming release.

Back to top
OS Build 16299.1029

March 12, 2019
KB4489886
Mitigated
Last updated:
March 19, 2019
10:00 AM PT

Opened:
March 12, 2019
10:00 AM PT
+ + +
DetailsOriginating updateStatusHistory
Custom URI schemes may not start corresponding application
After installing KB4489886, custom URI schemes for application protocol handlers may not start the corresponding application for local intranet and trusted sites security zones on Internet Explorer.

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 8.1; Windows 7, Service Pack 1 
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2; Windows Server 2008 R2 SP1

Workaround: Right-click the URL link to open it in a new window or tab, or enable Protected Mode in Internet Explorer for local intranet and trusted sites
1. Go to Tools > Internet options > Security.
2. Within Select a zone to view or change security settings, select Local intranet and then select Enable Protected Mode.
3. Select Trusted sites and then select Enable Protected Mode.
4. Select OK.
You must restart the browser after making these changes.

Next steps: Microsoft is working on a resolution and will provide an update in an upcoming release.

Back to top
OS Build 16299.1029

March 12, 2019
KB4489886
Mitigated
Last updated:
March 19, 2019
10:00 AM PT

Opened:
March 12, 2019
10:00 AM PT
End-user-defined characters (EUDC) may cause blue screen at startup
If you enable per font end-user-defined characters (EUDC), the system may stop working and a blue screen may appear at startup. This is not a common setting in non-Asian regions.

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016

Resolution: This issue is resolved in KB4493441.

Back to top
OS Build 16299.1059

March 19, 2019
KB4489890
Resolved
KB4493441
Resolved:
April 09, 2019
10:00 AM PT

Opened:
March 19, 2019
10:00 AM PT
Stop error when attempting to start SSH from WSL
After applying KB4489886, a stop error occurs when attempting to start the Secure Shell (SSH) client program from Windows Subsystem for Linux (WSL) with agent forwarding enabled using a command line switch (ssh –A) or a configuration setting.

Affected platforms:
  • Client: Windows 10, version 1803; Windows 10, version 1709
  • Server: Windows Server, version 1803; Windows Server, version 1709

Resolution: This issue is resolved in KB4493441.

Back to top
OS Build 16299.1029

March 12, 2019
KB4489886
Resolved
KB4493441
Resolved:
April 09, 2019
10:00 AM PT

Opened:
March 12, 2019
10:00 AM PT
" @@ -89,7 +89,7 @@ sections: - items: - type: markdown text: " - - +
DetailsOriginating updateStatusHistory
MSXML6 causes applications to stop responding if an exception was thrown
After installing KB4480978, MSXML6 causes applications to stop responding if an exception was thrown during node operations, such as appendChild(), insertBefore(), and moveNode().

The Group Policy editor may stop responding when editing a Group Policy Object (GPO) that contains Group Policy Preferences (GPP) for Internet Explorer 10 settings.

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 8.1
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2

Resolution: This issue is resolved in KB4493441.

Back to top
OS Build 16299.904

January 08, 2019
KB4480978
Resolved
KB4493441
Resolved:
April 09, 2019
10:00 AM PT

Opened:
January 08, 2019
10:00 AM PT
+
DetailsOriginating updateStatusHistory
MSXML6 causes applications to stop responding if an exception was thrown
After installing KB4480978, MSXML6 causes applications to stop responding if an exception was thrown during node operations, such as appendChild(), insertBefore(), and moveNode().

The Group Policy editor may stop responding when editing a Group Policy Object (GPO) that contains Group Policy Preferences (GPP) for Internet Explorer 10 settings.

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 8.1
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2

Resolution: This issue is resolved in KB4493441.

Back to top
OS Build 16299.904

January 08, 2019
KB4480978
Resolved
KB4493441
Resolved:
April 09, 2019
10:00 AM PT

Opened:
January 08, 2019
10:00 AM PT
" diff --git a/windows/release-information/status-windows-10-1803.yml b/windows/release-information/status-windows-10-1803.yml index 604066333a..16bc56e3c4 100644 --- a/windows/release-information/status-windows-10-1803.yml +++ b/windows/release-information/status-windows-10-1803.yml @@ -59,12 +59,12 @@ sections: - items: - type: markdown text: "
This table offers a summary of current active issues and those issues that have been resolved in the last 30 days.
- - - - - - +
SummaryOriginating updateStatusLast updated
End-user-defined characters (EUDC) may cause blue screen at startup
If you enable per font end-user-defined characters (EUDC), the system may stop working and a blue screen may appear at startup.

See details >
OS Build 17134.677

March 19, 2019
KB4489894
Resolved
KB4493464
April 09, 2019
10:00 AM PT
MSXML6 may cause applications to stop responding
MSXML6 may cause applications to stop responding if an exception was thrown during node operations, such as appendChild(), insertBefore(), and moveNode().

See details >
OS Build 17134.523

January 08, 2019
KB4480966
Resolved
KB4493464
April 09, 2019
10:00 AM PT
Stop error when attempting to start SSH from WSL
A stop error occurs when attempting to start Secure Shell from Windows Subsystem for Linux with agent forwarding using a command line switch (ssh –A) or a configuration setting.

See details >
OS Build 17134.648

March 12, 2019
KB4489868
Resolved
KB4493464
April 09, 2019
10:00 AM PT
Custom URI schemes may not start corresponding application
Custom URI schemes for application protocol handlers may not start the corresponding application for local intranet and trusted sites in Internet Explorer.

See details >
OS Build 17134.648

March 12, 2019
KB4489868
Mitigated
March 19, 2019
10:00 AM PT
Issue using PXE to start a device from WDS
Using PXE to start a device from a WDS server configured to use Variable Window Extension may cause the connection to the WDS server to terminate prematurely.

See details >
OS Build 17134.648

March 12, 2019
KB4489868
Mitigated
March 19, 2019
10:00 AM PT
+ + + + +
SummaryOriginating updateStatusLast updated
Custom URI schemes may not start corresponding application
Custom URI schemes for application protocol handlers may not start the corresponding application for local intranet and trusted sites in Internet Explorer.

See details >
OS Build 17134.648

March 12, 2019
KB4489868
Mitigated
March 19, 2019
10:00 AM PT
Issue using PXE to start a device from WDS
Using PXE to start a device from a WDS server configured to use Variable Window Extension may cause the connection to the WDS server to terminate prematurely.

See details >
OS Build 17134.648

March 12, 2019
KB4489868
Mitigated
March 19, 2019
10:00 AM PT
End-user-defined characters (EUDC) may cause blue screen at startup
If you enable per font end-user-defined characters (EUDC), the system may stop working and a blue screen may appear at startup.

See details >
OS Build 17134.677

March 19, 2019
KB4489894
Resolved
KB4493464
April 09, 2019
10:00 AM PT
MSXML6 may cause applications to stop responding
MSXML6 may cause applications to stop responding if an exception was thrown during node operations, such as appendChild(), insertBefore(), and moveNode().

See details >
OS Build 17134.523

January 08, 2019
KB4480966
Resolved
KB4493464
April 09, 2019
10:00 AM PT
Stop error when attempting to start SSH from WSL
A stop error occurs when attempting to start Secure Shell from Windows Subsystem for Linux with agent forwarding using a command line switch (ssh –A) or a configuration setting.

See details >
OS Build 17134.648

March 12, 2019
KB4489868
Resolved
KB4493464
April 09, 2019
10:00 AM PT
" @@ -79,12 +79,12 @@ sections: - items: - type: markdown text: " - - - - +
DetailsOriginating updateStatusHistory
End-user-defined characters (EUDC) may cause blue screen at startup
If you enable per font end-user-defined characters (EUDC), the system may stop working and a blue screen may appear at startup. This is not a common setting in non-Asian regions. 

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016
 
Resolution: This issue was resolved in KB4493464

Back to top
OS Build 17134.677

March 19, 2019
KB4489894
Resolved
KB4493464
Resolved:
April 09, 2019
10:00 AM PT

Opened:
March 19, 2019
10:00 AM PT
Stop error when attempting to start SSH from WSL
After applying KB4489868, a stop error occurs when attempting to start the Secure Shell (SSH) client program from Windows Subsystem for Linux (WSL) with agent forwarding enabled using a command line switch (ssh -A) or a configuration setting.

Affected platforms:
  • Client: Windows 10, version 1803; Windows 10, version 1709
  • Server: Windows Server, version 1803; Windows Server, version 1709

Resolution: This issue was resolved in KB4493464.

Back to top
OS Build 17134.648

March 12, 2019
KB4489868
Resolved
KB4493464
Resolved:
April 09, 2019
10:00 AM PT

Opened:
March 12, 2019
10:00 AM PT
Custom URI schemes may not start corresponding application
After installing KB4489868, custom URI schemes for application protocol handlers may not start the corresponding application for local intranet and trusted sites security zones on Internet Explorer. 

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 8.1; Windows 7, Service Pack 1 
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2; Windows Server 2008 R2 SP1

Workaround: Right-click the URL link to open it in a new window or tab, or enable Protected Mode in Internet Explorer for local intranet and trusted sites
  1. Go to Tools > Internet options > Security 
  2. Within Select a zone to view or change security settings, select Local intranet and then select Enable Protected Mode.
  3. Select Trusted sites and then select Enable Protected Mode
  4. Select OK
 You must restart the browser after making these changes. 
 
Next steps: Microsoft is working on a resolution and will provide an update in an upcoming release. 

Back to top
OS Build 17134.648

March 12, 2019
KB4489868
Mitigated
Last updated:
March 19, 2019
10:00 AM PT

Opened:
March 12, 2019
10:00 AM PT
+ +
 Option 2: 
Use the Windows Deployment Services UI to make the following adjustment:  
  1. Open Windows Deployment Services from Windows Administrative Tools. 
  2. Expand Servers and right-click a WDS server. 
  3. Open its properties and clear the?Enable Variable Window Extension?box on the TFTP tab.  
Option 3: 
Set the following registry value to 0:  
HKLM\\System\\CurrentControlSet\\Services\\WDSServer\\Providers\\WDSTFTP\\EnableVariableWindowExtension  
Restart the WDSServer service after disabling the Variable Window Extension. 
 
Next steps: Microsoft is working on a resolution and will provide an update in an upcoming release. 

Back to top + +
DetailsOriginating updateStatusHistory
Custom URI schemes may not start corresponding application
After installing KB4489868, custom URI schemes for application protocol handlers may not start the corresponding application for local intranet and trusted sites security zones on Internet Explorer. 

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 8.1; Windows 7, Service Pack 1 
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2; Windows Server 2008 R2 SP1

Workaround: Right-click the URL link to open it in a new window or tab, or enable Protected Mode in Internet Explorer for local intranet and trusted sites
  1. Go to Tools > Internet options > Security 
  2. Within Select a zone to view or change security settings, select Local intranet and then select Enable Protected Mode.
  3. Select Trusted sites and then select Enable Protected Mode
  4. Select OK
 You must restart the browser after making these changes. 
 
Next steps: Microsoft is working on a resolution and will provide an update in an upcoming release. 

Back to top
OS Build 17134.648

March 12, 2019
KB4489868
Mitigated
Last updated:
March 19, 2019
10:00 AM PT

Opened:
March 12, 2019
10:00 AM PT
Issue using PXE to start a device from WDS
After installing KB4489868, there may be issues using the Preboot Execution Environment (PXE) to start a device from a Windows Deployment Services (WDS) server configured to use Variable Window Extension. This may cause the connection to the WDS server to terminate prematurely while downloading the image. This issue does not affect clients or devices that are not using Variable Window Extension. 

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10 Enterprise LTSC 2016; Windows 8.1
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server 2016; Windows Server 2012 R2

Workaround: To mitigate the issue, disable the Variable Window Extension on WDS server using one of the following options:
Option 1: 
Open an Administrator Command prompt and type the following:  
Wdsutil /Set-TransportServer /EnableTftpVariableWindowExtension:No
-
 Option 2: 
Use the Windows Deployment Services UI to make the following adjustment:  
  1. Open Windows Deployment Services from Windows Administrative Tools. 
  2. Expand Servers and right-click a WDS server. 
  3. Open its properties and clear the?Enable Variable Window Extension?box on the TFTP tab.  
Option 3: 
Set the following registry value to 0:  
HKLM\\System\\CurrentControlSet\\Services\\WDSServer\\Providers\\WDSTFTP\\EnableVariableWindowExtension  
Restart the WDSServer service after disabling the Variable Window Extension. 
 
Next steps: Microsoft is working on a resolution and will provide an update in an upcoming release. 

Back to top
OS Build 17134.648

March 12, 2019
KB4489868
Mitigated
Last updated:
March 19, 2019
10:00 AM PT

Opened:
March 12, 2019
10:00 AM PT
OS Build 17134.648

March 12, 2019
KB4489868
Mitigated
Last updated:
March 19, 2019
10:00 AM PT

Opened:
March 12, 2019
10:00 AM PT
End-user-defined characters (EUDC) may cause blue screen at startup
If you enable per font end-user-defined characters (EUDC), the system may stop working and a blue screen may appear at startup. This is not a common setting in non-Asian regions. 

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016
 
Resolution: This issue was resolved in KB4493464

Back to top
OS Build 17134.677

March 19, 2019
KB4489894
Resolved
KB4493464
Resolved:
April 09, 2019
10:00 AM PT

Opened:
March 19, 2019
10:00 AM PT
Stop error when attempting to start SSH from WSL
After applying KB4489868, a stop error occurs when attempting to start the Secure Shell (SSH) client program from Windows Subsystem for Linux (WSL) with agent forwarding enabled using a command line switch (ssh -A) or a configuration setting.

Affected platforms:
  • Client: Windows 10, version 1803; Windows 10, version 1709
  • Server: Windows Server, version 1803; Windows Server, version 1709

Resolution: This issue was resolved in KB4493464.

Back to top
OS Build 17134.648

March 12, 2019
KB4489868
Resolved
KB4493464
Resolved:
April 09, 2019
10:00 AM PT

Opened:
March 12, 2019
10:00 AM PT
" @@ -92,7 +92,7 @@ sections: - items: - type: markdown text: " - - +
DetailsOriginating updateStatusHistory
MSXML6 may cause applications to stop responding
After installing KB4480966, MSXML6 causes applications to stop responding if an exception was thrown during node operations, such as appendChild(), insertBefore(), and moveNode().

The Group Policy editor may stop responding when editing a Group Policy Object (GPO) that contains Group Policy Preferences (GPP) for Internet Explorer 10 settings.

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 8.1
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2

Resolution: This issue was resolved in KB4493464

Back to top
OS Build 17134.523

January 08, 2019
KB4480966
Resolved
KB4493464
Resolved:
April 09, 2019
10:00 AM PT

Opened:
January 08, 2019
10:00 AM PT
+
DetailsOriginating updateStatusHistory
MSXML6 may cause applications to stop responding
After installing KB4480966, MSXML6 causes applications to stop responding if an exception was thrown during node operations, such as appendChild(), insertBefore(), and moveNode().

The Group Policy editor may stop responding when editing a Group Policy Object (GPO) that contains Group Policy Preferences (GPP) for Internet Explorer 10 settings.

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 8.1
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2

Resolution: This issue was resolved in KB4493464

Back to top
OS Build 17134.523

January 08, 2019
KB4480966
Resolved
KB4493464
Resolved:
April 09, 2019
10:00 AM PT

Opened:
January 08, 2019
10:00 AM PT
" diff --git a/windows/release-information/status-windows-10-1809-and-windows-server-2019.yml b/windows/release-information/status-windows-10-1809-and-windows-server-2019.yml index 5e0c34357f..f42f97e4cc 100644 --- a/windows/release-information/status-windows-10-1809-and-windows-server-2019.yml +++ b/windows/release-information/status-windows-10-1809-and-windows-server-2019.yml @@ -64,14 +64,14 @@ sections: - items: - type: markdown text: "
This table offers a summary of current active issues and those issues that have been resolved in the last 30 days.
- - - - - - - - +
SummaryOriginating updateStatusLast updated
End-user-defined characters (EUDC) may cause blue screen at startup
If you enable per font end-user-defined characters (EUDC), the system may stop working and a blue screen may appear at startup.

See details >
OS Build 17763.404

April 02, 2019
KB4490481
Resolved
KB4493509
April 09, 2019
10:00 AM PT
Internet Explorer 11 authentication issue with multiple concurrent logons
Internet Explorer 11 users may encounter issues if two or more people use the same user account for multiple, concurrent login sessions on the same Windows Server machine.

See details >
OS Build 17763.253

January 08, 2019
KB4480116
Resolved
KB4493509
April 09, 2019
10:00 AM PT
MSXML6 may cause applications to stop responding
MSXML6 may cause applications to stop responding if an exception was thrown during node operations, such as appendChild(), insertBefore(), and moveNode().

See details >
OS Build 17763.253

January 08, 2019
KB4480116
Resolved
KB4493509
April 09, 2019
10:00 AM PT
Custom URI schemes may not start corresponding application
Custom URI schemes for application protocol handlers may not start the corresponding application for local intranet and trusted sites in Internet Explorer.

See details >
OS Build 17763.379

March 12, 2019
KB4489899
Mitigated
April 02, 2019
10:00 AM PT
Issue using PXE to start a device from WDS
Using PXE to start a device from a WDS server configured to use Variable Window Extension may cause the connection to the WDS server to terminate prematurely.

See details >
OS Build 17763.379

March 12, 2019
KB4489899
Mitigated
April 02, 2019
10:00 AM PT
Apps may stop working after selecting an audio output device other than the default
Users with multiple audio devices that select an audio output device different from the \"Default Audio Device\" may find certain applications stop working unexpectedly.

See details >
OS Build 17763.348

March 01, 2019
KB4482887
Resolved
KB4490481
April 02, 2019
10:00 AM PT
Audio not working on monitors or TV connected to a PC via HDMI, USB, or DisplayPort
Upgrade block: Microsoft has identified issues with certain new Intel display drivers, which accidentally turn on unsupported features in Windows.

See details >
OS Build 17763.134

November 13, 2018
KB4467708
Mitigated
March 15, 2019
12:00 PM PT
+ + + + + + +
SummaryOriginating updateStatusLast updated
Custom URI schemes may not start corresponding application
Custom URI schemes for application protocol handlers may not start the corresponding application for local intranet and trusted sites in Internet Explorer.

See details >
OS Build 17763.379

March 12, 2019
KB4489899
Mitigated
April 02, 2019
10:00 AM PT
Issue using PXE to start a device from WDS
Using PXE to start a device from a WDS server configured to use Variable Window Extension may cause the connection to the WDS server to terminate prematurely.

See details >
OS Build 17763.379

March 12, 2019
KB4489899
Mitigated
April 02, 2019
10:00 AM PT
Audio not working on monitors or TV connected to a PC via HDMI, USB, or DisplayPort
Upgrade block: Microsoft has identified issues with certain new Intel display drivers, which accidentally turn on unsupported features in Windows.

See details >
OS Build 17763.134

November 13, 2018
KB4467708
Mitigated
March 15, 2019
12:00 PM PT
End-user-defined characters (EUDC) may cause blue screen at startup
If you enable per font end-user-defined characters (EUDC), the system may stop working and a blue screen may appear at startup.

See details >
OS Build 17763.404

April 02, 2019
KB4490481
Resolved
KB4493509
April 09, 2019
10:00 AM PT
Internet Explorer 11 authentication issue with multiple concurrent logons
Internet Explorer 11 users may encounter issues if two or more people use the same user account for multiple, concurrent login sessions on the same Windows Server machine.

See details >
OS Build 17763.253

January 08, 2019
KB4480116
Resolved
KB4493509
April 09, 2019
10:00 AM PT
Apps may stop working after selecting an audio output device other than the default
Users with multiple audio devices that select an audio output device different from the \"Default Audio Device\" may find certain applications stop working unexpectedly.

See details >
OS Build 17763.348

March 01, 2019
KB4482887
Resolved
KB4490481
April 02, 2019
10:00 AM PT
MSXML6 may cause applications to stop responding
MSXML6 may cause applications to stop responding if an exception was thrown during node operations, such as appendChild(), insertBefore(), and moveNode().

See details >
OS Build 17763.253

January 08, 2019
KB4480116
Resolved
KB4493509
April 09, 2019
10:00 AM PT
" @@ -86,8 +86,8 @@ sections: - items: - type: markdown text: " - - +
DetailsOriginating updateStatusHistory
End-user-defined characters (EUDC) may cause blue screen at startup
If you enable per font end-user-defined characters (EUDC), the system will stop working and a blue screen may appear at startup. This is not a common setting in non-Asian regions.

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016

Workaround: To avoid this issue, don't enable per font EUDC. As an alternative, you can edit the registry to mitigate this issue; for more information, see KB4496149.

Resolved: This issue was resolved in KB4493509.

Back to top
OS Build 17763.404

April 02, 2019
KB4490481
Resolved
KB4493509
Resolved:
April 09, 2019
10:00 AM PT

Opened:
April 02, 2019
10:00 AM PT
+
DetailsOriginating updateStatusHistory
End-user-defined characters (EUDC) may cause blue screen at startup
If you enable per font end-user-defined characters (EUDC), the system will stop working and a blue screen may appear at startup. This is not a common setting in non-Asian regions.

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016

Workaround: To avoid this issue, don't enable per font EUDC. As an alternative, you can edit the registry to mitigate this issue; for more information, see KB4496149.

Resolved: This issue was resolved in KB4493509.

Back to top
OS Build 17763.404

April 02, 2019
KB4490481
Resolved
KB4493509
Resolved:
April 09, 2019
10:00 AM PT

Opened:
April 02, 2019
10:00 AM PT
" @@ -95,11 +95,11 @@ sections: - items: - type: markdown text: " - - +
DetailsOriginating updateStatusHistory
Custom URI schemes may not start corresponding application
After installing KB4489899, custom URI schemes for application protocol handlers may not start the corresponding application for local intranet and trusted sites security zones on Internet Explorer.

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 8.1; Windows 7, Service Pack 1 
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2; Windows Server 2008 R2 SP1

Workaround: Right-click the URL link to open it in a new window or tab, or enable Protected Mode in Internet Explorer for local intranet and trusted sites
  1. Go to Tools > Internet options > Security.
  2. Within Select a zone to view of change security settings, select Local intranet and then select Enable Protected Mode.
  3. Select Trusted Sites and then select Enable Protected Mode
  4. Select OK.
You must restart the browser after making these changes. 
 
Next steps: Microsoft is working on a resolution and will provide an update in an upcoming release. 

Back to top
OS Build 17763.379

March 12, 2019
KB4489899
Mitigated
Last updated:
April 02, 2019
10:00 AM PT

Opened:
March 12, 2019
10:00 AM PT
+ - +
Option 2:
Use the Windows Deployment Services UI to make the following adjustment: 
  1. Open Windows Deployment Services from Windows Administrative Tools. 
  2. Expand Servers and right-click a WDS server. 
  3. Open its properties and clear the Enable Variable Window Extension box on the TFTP tab.
Option 3:
Set the following registry value to 0:  
HKLM\\System\\CurrentControlSet\\Services\\WDSServer\\Providers\\WDSTFTP\\EnableVariableWindowExtension  
Restart the WDSServer service after disabling the Variable Window Extension. 

Next steps: Microsoft is working on a resolution and will provide an update in an upcoming release. 

Back to top +
DetailsOriginating updateStatusHistory
Custom URI schemes may not start corresponding application
After installing KB4489899, custom URI schemes for application protocol handlers may not start the corresponding application for local intranet and trusted sites security zones on Internet Explorer.

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 8.1; Windows 7, Service Pack 1 
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2; Windows Server 2008 R2 SP1

Workaround: Right-click the URL link to open it in a new window or tab, or enable Protected Mode in Internet Explorer for local intranet and trusted sites
  1. Go to Tools > Internet options > Security.
  2. Within Select a zone to view of change security settings, select Local intranet and then select Enable Protected Mode.
  3. Select Trusted Sites and then select Enable Protected Mode
  4. Select OK.
You must restart the browser after making these changes. 
 
Next steps: Microsoft is working on a resolution and will provide an update in an upcoming release. 

Back to top
OS Build 17763.379

March 12, 2019
KB4489899
Mitigated
Last updated:
April 02, 2019
10:00 AM PT

Opened:
March 12, 2019
10:00 AM PT
Issue using PXE to start a device from WDS
After installing KB4489899, there may be issues using the Preboot Execution Environment (PXE) to start a device from a Windows Deployment Services (WDS) server configured to use Variable Window Extension. This may cause the connection to the WDS server to terminate prematurely while downloading the image. This issue does not affect clients or devices that are not using Variable Window Extension. 

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10 Enterprise LTSC 2016; Windows 8.1
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server 2016; Windows Server 2012 R2

Workaround: To mitigate the issue, disable the Variable Window Extension on WDS server using one of the following options:
Option 1:
Open an Administrator Command prompt and type the following:
Wdsutil /Set-TransportServer /EnableTftpVariableWindowExtension:No 
-
Option 2:
Use the Windows Deployment Services UI to make the following adjustment: 
  1. Open Windows Deployment Services from Windows Administrative Tools. 
  2. Expand Servers and right-click a WDS server. 
  3. Open its properties and clear the Enable Variable Window Extension box on the TFTP tab.
Option 3:
Set the following registry value to 0:  
HKLM\\System\\CurrentControlSet\\Services\\WDSServer\\Providers\\WDSTFTP\\EnableVariableWindowExtension  
Restart the WDSServer service after disabling the Variable Window Extension. 

Next steps: Microsoft is working on a resolution and will provide an update in an upcoming release. 

Back to top
OS Build 17763.379

March 12, 2019
KB4489899
Mitigated
Last updated:
April 02, 2019
10:00 AM PT

Opened:
March 12, 2019
10:00 AM PT
Apps may stop working after selecting an audio output device other than the default
After installing KB4482887 on machines that have multiple audio devices, applications that provide advanced options for internal or external audio output devices may stop working unexpectedly. This issue occurs for users that select an audio output device different from the \"Default Audio Device\". Examples of applications that may stop working include: 
  • Windows Media Player 
  • Realtek HD Audio Manager 
  • Sound Blaster Control Panel 

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019
  • Server: Windows Server, version 1809; Windows Server 2019

Workaround: As a temporary solution, select the \"Default Audio Device\" in the options provided by the application; please refer to the application's user manual for details. 
For example, to set the Default Audio Device in Windows Media Player: 
  1. Open Windows Media Player > Tools > Options > Devices.
  2. Select the device and choose Properties.
  3. On the next dialog, from the drop-down menu under Select the Audio Device, choose Default Audio Device from the list. 
You can then send audio from the application to the audio device you want in the per-application audio settings found under Settings > System > Sound > App Volume and device preferences.

Resolved: This issue was resolved in KB4490481

Back to top
OS Build 17763.348

March 01, 2019
KB4482887
Resolved
KB4490481
Resolved:
April 02, 2019
10:00 AM PT

Opened:
March 01, 2019
10:00 AM PT
OS Build 17763.379

March 12, 2019
KB4489899
Mitigated
Last updated:
April 02, 2019
10:00 AM PT

Opened:
March 12, 2019
10:00 AM PT
Apps may stop working after selecting an audio output device other than the default
After installing KB4482887 on machines that have multiple audio devices, applications that provide advanced options for internal or external audio output devices may stop working unexpectedly. This issue occurs for users that select an audio output device different from the \"Default Audio Device\". Examples of applications that may stop working include: 
  • Windows Media Player 
  • Realtek HD Audio Manager 
  • Sound Blaster Control Panel 

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019
  • Server: Windows Server, version 1809; Windows Server 2019

Workaround: As a temporary solution, select the \"Default Audio Device\" in the options provided by the application; please refer to the application's user manual for details. 
For example, to set the Default Audio Device in Windows Media Player: 
  1. Open Windows Media Player > Tools > Options > Devices.
  2. Select the device and choose Properties.
  3. On the next dialog, from the drop-down menu under Select the Audio Device, choose Default Audio Device from the list. 
You can then send audio from the application to the audio device you want in the per-application audio settings found under Settings > System > Sound > App Volume and device preferences.

Resolved: This issue was resolved in KB4490481

Back to top
OS Build 17763.348

March 01, 2019
KB4482887
Resolved
KB4490481
Resolved:
April 02, 2019
10:00 AM PT

Opened:
March 01, 2019
10:00 AM PT
" @@ -107,9 +107,9 @@ sections: - items: - type: markdown text: " - - - +
DetailsOriginating updateStatusHistory
Internet Explorer 11 authentication issue with multiple concurrent logons
After installing the February 12, 2019 update (KB4487044), Internet Explorer 11 and other applications that use WININET.DLL may have authentication issues. This occurs when two or more people use the same user account for multiple, concurrent login sessions on the same Windows Server machine, including Remote Desktop Protocol (RDP) and Terminal Server logons. Symptoms reported by customers include, but may not be limited to:  
  • Cache size and location show zero or empty. 
  • Keyboard shortcuts may not work properly. 
  • Webpages may intermittently fail to load or render correctly. 
  • Issues with credential prompts. 
  • Issues when downloading files. 

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10 Enterprise LTSC 2016; Windows 8.1; Windows 7, Service Pack 1
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server 2016; Windows Server 2012 R2; Windows Server 2008 R2 SP1
 
Resolved: This issue was resolved in KB4493509

Back to top
OS Build 17763.253

January 08, 2019
KB4480116
Resolved
KB4493509
Resolved:
April 09, 2019
10:00 AM PT

Opened:
January 08, 2019
10:00 AM PT
MSXML6 may cause applications to stop responding
After installing KB4480116, MSXML6 causes applications to stop responding if an exception was thrown during node operations, such as appendChild(), insertBefore(), and moveNode().
 
The Group Policy editor may stop responding when editing a Group Policy Object (GPO) that contains Group Policy Preferences (GPP) for Internet Explorer 10 settings. 

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 8.1
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2

Resolved: This issue was resolved in KB4493509

Back to top
OS Build 17763.253

January 08, 2019
KB4480116
Resolved
KB4493509
Resolved:
April 09, 2019
10:00 AM PT

Opened:
January 08, 2019
10:00 AM PT
+ +
DetailsOriginating updateStatusHistory
Internet Explorer 11 authentication issue with multiple concurrent logons
After installing the February 12, 2019 update (KB4487044), Internet Explorer 11 and other applications that use WININET.DLL may have authentication issues. This occurs when two or more people use the same user account for multiple, concurrent login sessions on the same Windows Server machine, including Remote Desktop Protocol (RDP) and Terminal Server logons. Symptoms reported by customers include, but may not be limited to:  
  • Cache size and location show zero or empty. 
  • Keyboard shortcuts may not work properly. 
  • Webpages may intermittently fail to load or render correctly. 
  • Issues with credential prompts. 
  • Issues when downloading files. 

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10 Enterprise LTSC 2016; Windows 8.1; Windows 7, Service Pack 1
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server 2016; Windows Server 2012 R2; Windows Server 2008 R2 SP1
 
Resolved: This issue was resolved in KB4493509

Back to top
OS Build 17763.253

January 08, 2019
KB4480116
Resolved
KB4493509
Resolved:
April 09, 2019
10:00 AM PT

Opened:
January 08, 2019
10:00 AM PT
MSXML6 may cause applications to stop responding
After installing KB4480116, MSXML6 causes applications to stop responding if an exception was thrown during node operations, such as appendChild(), insertBefore(), and moveNode().
 
The Group Policy editor may stop responding when editing a Group Policy Object (GPO) that contains Group Policy Preferences (GPP) for Internet Explorer 10 settings. 

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 8.1
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2

Resolved: This issue was resolved in KB4493509

Back to top
OS Build 17763.253

January 08, 2019
KB4480116
Resolved
KB4493509
Resolved:
April 09, 2019
10:00 AM PT

Opened:
January 08, 2019
10:00 AM PT
" @@ -117,7 +117,7 @@ sections: - items: - type: markdown text: " - - +
DetailsOriginating updateStatusHistory
Audio not working on monitors or TV connected to a PC via HDMI, USB, or DisplayPort
Upgrade block: Microsoft has identified issues with certain new Intel display drivers. Intel inadvertently released versions of its display driver (versions 24.20.100.6344, 24.20.100.6345) to OEMs that accidentally turned on unsupported features in Windows. 
 
As a result, after updating to Windows 10, version 1809, audio playback from a monitor or television connected to a PC via HDMI, USB-C, or a DisplayPort may not function correctly on devices with these drivers.

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019
  • Server: Windows Server, version 1809; Windows Server 2019 

Next steps: Intel has released updated drivers to OEM device manufacturers. OEMs need to make the updated driver available via Windows Update.

For more information, see the Intel Customer Support article.

Note: This Intel display driver issue is different from the Intel Smart Sound Technology driver (version 09.21.00.3755) audio issue previously documented.

Back to top
OS Build 17763.134

November 13, 2018
KB4467708
Mitigated
Last updated:
March 15, 2019
12:00 PM PT

Opened:
November 13, 2018
10:00 AM PT
+
DetailsOriginating updateStatusHistory
Audio not working on monitors or TV connected to a PC via HDMI, USB, or DisplayPort
Upgrade block: Microsoft has identified issues with certain new Intel display drivers. Intel inadvertently released versions of its display driver (versions 24.20.100.6344, 24.20.100.6345) to OEMs that accidentally turned on unsupported features in Windows. 
 
As a result, after updating to Windows 10, version 1809, audio playback from a monitor or television connected to a PC via HDMI, USB-C, or a DisplayPort may not function correctly on devices with these drivers.

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019
  • Server: Windows Server, version 1809; Windows Server 2019 

Next steps: Intel has released updated drivers to OEM device manufacturers. OEMs need to make the updated driver available via Windows Update.

For more information, see the Intel Customer Support article.

Note: This Intel display driver issue is different from the Intel Smart Sound Technology driver (version 09.21.00.3755) audio issue previously documented.

Back to top
OS Build 17763.134

November 13, 2018
KB4467708
Mitigated
Last updated:
March 15, 2019
12:00 PM PT

Opened:
November 13, 2018
10:00 AM PT
" diff --git a/windows/release-information/status-windows-7-and-windows-server-2008-r2-sp1.yml b/windows/release-information/status-windows-7-and-windows-server-2008-r2-sp1.yml index b09a3aac6f..1799cfff22 100644 --- a/windows/release-information/status-windows-7-and-windows-server-2008-r2-sp1.yml +++ b/windows/release-information/status-windows-7-and-windows-server-2008-r2-sp1.yml @@ -59,17 +59,17 @@ sections: - items: - type: markdown text: "
This table offers a summary of current active issues and those issues that have been resolved in the last 30 days.
- - - - - - - - - - - +
SummaryOriginating updateStatusLast updated
Virtual machines fail to restore.
Virtual machines (VMs) may fail to restore successfully if the VM has been saved and restored once before.

See details >
January 08, 2019
KB4480970
Resolved
KB4490511
April 21, 2019
12:00 AM PT
Local Administrators unable to remotely access shares.
Local users who are part of the local Administrators group may not be able to remotely access shares on Windows Server 2008 R2 and Windows 7 machines.

See details >
January 08, 2019
KB4480970
Resolved
KB4487345
April 20, 2019
11:53 PM PT
System may be unresponsive after restart if Avira antivirus software installed.
Devices with Avira antivirus software installed may become unresponsive upon restart.

See details >
April 09, 2019
KB4493472
Investigating
April 09, 2019
10:00 AM PT
Authentication may fail for services after the Kerberos ticket expires.
Authentication may fail for services that require unconstrained delegation after the Kerberos ticket expires.

See details >
March 12, 2019
KB4489878
Mitigated
April 09, 2019
10:00 AM PT
System unresponsive after restart if Sophos Endpoint Protection installed.
Devices with Sophos Endpoint Protection installed and managed by Sophos Central or Sophos Enterprise Console (SEC) may become unresponsive upon restart.

See details >
April 09, 2019
KB4493472
Mitigated
April 09, 2019
10:00 AM PT
System may be unresponsive after restart if ArcaBit antivirus software installed.
Devices with ArcaBit antivirus software installed may become unresponsive upon restart.

See details >
April 09, 2019
KB4493472
Mitigated
April 09, 2019
10:00 AM PT
Internet Explorer 11 authentication issue with multiple concurrent logons.
Internet Explorer 11 users may encounter issues if two or more people use the same user account for multiple, concurrent login sessions on the same Windows Server machine.

See details >
January 08, 2019
KB4480970
Resolved
KB4493472
April 09, 2019
10:00 AM PT
Custom URI schemes may not start corresponding application.
Custom URI schemes for application protocol handlers may not start the corresponding application for local intranet and trusted sites in Internet Explorer.

See details >
March 12, 2019
KB4489878
Resolved
KB4493472
April 09, 2019
10:00 AM PT
NETDOM.EXE fails to run.
NETDOM.EXE fails to run and the error, “The command failed to complete successfully.” appears on screen.

See details >
March 12, 2019
KB4489878
Resolved
KB4493472
April 09, 2019
10:00 AM PT
Devices may not respond at login or Welcome screen if running certain Avast software.
Devices running Avast for Business, Avast CloudCare, and AVG Business Edition antivirus software may become unresponsive after restart.

See details >
April 09, 2019
KB4493472
Resolved
April 09, 2019
10:00 AM PT
+ + + + + + + + + +
SummaryOriginating updateStatusLast updated
System may be unresponsive after restart if Avira antivirus software installed.
Devices with Avira antivirus software installed may become unresponsive upon restart.

See details >
April 09, 2019
KB4493472
Investigating
April 09, 2019
10:00 AM PT
Authentication may fail for services after the Kerberos ticket expires.
Authentication may fail for services that require unconstrained delegation after the Kerberos ticket expires.

See details >
March 12, 2019
KB4489878
Mitigated
April 09, 2019
10:00 AM PT
System unresponsive after restart if Sophos Endpoint Protection installed.
Devices with Sophos Endpoint Protection installed and managed by Sophos Central or Sophos Enterprise Console (SEC) may become unresponsive upon restart.

See details >
April 09, 2019
KB4493472
Mitigated
April 09, 2019
10:00 AM PT
System may be unresponsive after restart if ArcaBit antivirus software installed.
Devices with ArcaBit antivirus software installed may become unresponsive upon restart.

See details >
April 09, 2019
KB4493472
Mitigated
April 09, 2019
10:00 AM PT
Local Administrators unable to remotely access shares.
Local users who are part of the local Administrators group may not be able to remotely access shares on Windows Server 2008 R2 and Windows 7 machines.

See details >
January 08, 2019
KB4480970
Resolved
KB4487345
April 20, 2019
11:53 PM PT
Virtual machines fail to restore.
Virtual machines (VMs) may fail to restore successfully if the VM has been saved and restored once before.

See details >
January 08, 2019
KB4480970
Resolved
KB4490511
April 21, 2019
12:00 AM PT
Internet Explorer 11 authentication issue with multiple concurrent logons.
Internet Explorer 11 users may encounter issues if two or more people use the same user account for multiple, concurrent login sessions on the same Windows Server machine.

See details >
January 08, 2019
KB4480970
Resolved
KB4493472
April 09, 2019
10:00 AM PT
Custom URI schemes may not start corresponding application.
Custom URI schemes for application protocol handlers may not start the corresponding application for local intranet and trusted sites in Internet Explorer.

See details >
March 12, 2019
KB4489878
Resolved
KB4493472
April 09, 2019
10:00 AM PT
NETDOM.EXE fails to run.
NETDOM.EXE fails to run and the error, “The command failed to complete successfully.” appears on screen.

See details >
March 12, 2019
KB4489878
Resolved
KB4493472
April 09, 2019
10:00 AM PT
Devices may not respond at login or Welcome screen if running certain Avast software.
Devices running Avast for Business, Avast CloudCare, and AVG Business Edition antivirus software may become unresponsive after restart.

See details >
April 09, 2019
KB4493472
Resolved
April 09, 2019
10:00 AM PT
" @@ -84,11 +84,11 @@ sections: - items: - type: markdown text: " - - - - - +
DetailsOriginating updateStatusHistory
System may be unresponsive after restart if Avira antivirus software installed.
Microsoft and Avira have identified an issue on devices with Avira antivirus software installed that may cause the system to become unresponsive upon restart after installing KB4493472.

Microsoft has temporarily blocked devices from receiving this update if Avira antivirus software is installed.

Next steps: We are presently investigating this issue with Avira and will provide an update when available.

Back to top
April 09, 2019
KB4493472
Investigating
Last updated:
April 09, 2019
10:00 AM PT

Opened:
April 09, 2019
10:00 AM PT
System unresponsive after restart if Sophos Endpoint Protection installed.
Microsoft and Sophos have identified an issue on devices with Sophos Endpoint Protection installed and managed by either Sophos Central or Sophos Enterprise Console (SEC) that may cause the system to become unresponsive upon restart after installing KB4493472.

Microsoft has temporarily blocked devices from receiving this update if the Sophos Endpoint is installed until a solution is available.

Guidance for Sophos Endpoint and Sophos Enterprise Console customers can be found in the Sophos support article.

Back to top
April 09, 2019
KB4493472
Mitigated
Last updated:
April 09, 2019
10:00 AM PT

Opened:
April 09, 2019
10:00 AM PT
System may be unresponsive after restart if ArcaBit antivirus software installed.
Microsoft and ArcaBit have identified an issue on devices with ArcaBit antivirus software installed that may cause the system to become unresponsive upon restart after installing KB4493472.

Microsoft has temporarily blocked devices from receiving this update if ArcaBit antivirus software is installed.

ArcaBit has released an update to address this issue. For more information, see the Arcabit support article.

Back to top
April 09, 2019
KB4493472
Mitigated
Last updated:
April 09, 2019
10:00 AM PT

Opened:
April 09, 2019
10:00 AM PT
Devices may not respond at login or Welcome screen if running certain Avast software.
Microsoft and Avast have identified an issue on devices running Avast for Business, Avast CloudCare, and AVG Business Edition antivirus software after you install KB4493472 and restart. Devices may become unresponsive at the login or Welcome screen. Additionally, you may be unable to log in or log in after an extended period of time.

Affected platforms: 
  • Client: Windows 8.1; Windows 7, Service Pack 1 
  • Server: Windows Server 2012 R2; Windows Server 2008 R2 SP1 

Resolution: Avast has released emergency updates to address this issue. For more information and AV update schedule, see the Avast support KB article.

Back to top
April 09, 2019
KB4493472
Resolved
Resolved:
April 09, 2019
10:00 AM PT

Opened:
April 09, 2019
10:00 AM PT
+ + + +
DetailsOriginating updateStatusHistory
System may be unresponsive after restart if Avira antivirus software installed.
Microsoft and Avira have identified an issue on devices with Avira antivirus software installed that may cause the system to become unresponsive upon restart after installing KB4493472.

Microsoft has temporarily blocked devices from receiving this update if Avira antivirus software is installed.

Next steps: We are presently investigating this issue with Avira and will provide an update when available.

Back to top
April 09, 2019
KB4493472
Investigating
Last updated:
April 09, 2019
10:00 AM PT

Opened:
April 09, 2019
10:00 AM PT
System unresponsive after restart if Sophos Endpoint Protection installed.
Microsoft and Sophos have identified an issue on devices with Sophos Endpoint Protection installed and managed by either Sophos Central or Sophos Enterprise Console (SEC) that may cause the system to become unresponsive upon restart after installing KB4493472.

Microsoft has temporarily blocked devices from receiving this update if the Sophos Endpoint is installed until a solution is available.

Guidance for Sophos Endpoint and Sophos Enterprise Console customers can be found in the Sophos support article.

Back to top
April 09, 2019
KB4493472
Mitigated
Last updated:
April 09, 2019
10:00 AM PT

Opened:
April 09, 2019
10:00 AM PT
System may be unresponsive after restart if ArcaBit antivirus software installed.
Microsoft and ArcaBit have identified an issue on devices with ArcaBit antivirus software installed that may cause the system to become unresponsive upon restart after installing KB4493472.

Microsoft has temporarily blocked devices from receiving this update if ArcaBit antivirus software is installed.

ArcaBit has released an update to address this issue. For more information, see the Arcabit support article.

Back to top
April 09, 2019
KB4493472
Mitigated
Last updated:
April 09, 2019
10:00 AM PT

Opened:
April 09, 2019
10:00 AM PT
Devices may not respond at login or Welcome screen if running certain Avast software.
Microsoft and Avast have identified an issue on devices running Avast for Business, Avast CloudCare, and AVG Business Edition antivirus software after you install KB4493472 and restart. Devices may become unresponsive at the login or Welcome screen. Additionally, you may be unable to log in or log in after an extended period of time.

Affected platforms: 
  • Client: Windows 8.1; Windows 7, Service Pack 1 
  • Server: Windows Server 2012 R2; Windows Server 2008 R2 SP1 

Resolution: Avast has released emergency updates to address this issue. For more information and AV update schedule, see the Avast support KB article.

Back to top
April 09, 2019
KB4493472
Resolved
Resolved:
April 09, 2019
10:00 AM PT

Opened:
April 09, 2019
10:00 AM PT
" @@ -96,10 +96,10 @@ sections: - items: - type: markdown text: " - - - - +
DetailsOriginating updateStatusHistory
Authentication may fail for services after the Kerberos ticket expires.
After installing KB4489878, some customers report that authentication fails for services that require unconstrained delegation after the Kerberos ticket expires (the default is 10 hours). For example, the SQL server service fails.

Workaround: To mitigate this issue, use one of the following options:

  • Option 1: Purge the Kerberos tickets on the application server. After the Kerberos ticket expires, the issue will occur again, and you must purge the tickets again.
  • Option 2: If purging does not mitigate the issue, restart the application; for example, restart the Internet Information Services (IIS) app pool associated with the SQL server.
  • Option 3: Use constrained delegation.

Next steps: Microsoft is working on a resolution and will provide an update in an upcoming release.

Back to top
March 12, 2019
KB4489878
Mitigated
Last updated:
April 09, 2019
10:00 AM PT

Opened:
March 12, 2019
10:00 AM PT
Custom URI schemes may not start corresponding application.
After installing KB4489878, custom URI schemes for application protocol handlers may not start the corresponding application for local intranet and trusted sites on Internet Explorer.

Affected platforms: 
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 8.1; Windows 7, Service Pack 1 
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2; Windows Server 2008 R2 SP1 

Resolution: This issue is resolved in KB4493472.

Back to top
March 12, 2019
KB4489878
Resolved
KB4493472
Resolved:
April 09, 2019
10:00 AM PT

Opened:
March 12, 2019
10:00 AM PT
NETDOM.EXE fails to run.
After installing KB4489878, NETDOM.EXE fails to run, and the on-screen error, “The command failed to complete successfully.” appears.

Affected platforms: 
  • Client: Windows 7, Service Pack 1 
  • Server: Windows Server 2008 R2 SP1 

Resolution: This issue is resolved in KB4493472.

Back to top
March 12, 2019
KB4489878
Resolved
KB4493472
Resolved:
April 09, 2019
10:00 AM PT

Opened:
March 12, 2019
10:00 AM PT
+ + +
DetailsOriginating updateStatusHistory
Authentication may fail for services after the Kerberos ticket expires.
After installing KB4489878, some customers report that authentication fails for services that require unconstrained delegation after the Kerberos ticket expires (the default is 10 hours). For example, the SQL server service fails.

Workaround: To mitigate this issue, use one of the following options:

  • Option 1: Purge the Kerberos tickets on the application server. After the Kerberos ticket expires, the issue will occur again, and you must purge the tickets again.
  • Option 2: If purging does not mitigate the issue, restart the application; for example, restart the Internet Information Services (IIS) app pool associated with the SQL server.
  • Option 3: Use constrained delegation.

Next steps: Microsoft is working on a resolution and will provide an update in an upcoming release.

Back to top
March 12, 2019
KB4489878
Mitigated
Last updated:
April 09, 2019
10:00 AM PT

Opened:
March 12, 2019
10:00 AM PT
Custom URI schemes may not start corresponding application.
After installing KB4489878, custom URI schemes for application protocol handlers may not start the corresponding application for local intranet and trusted sites on Internet Explorer.

Affected platforms: 
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 8.1; Windows 7, Service Pack 1 
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2; Windows Server 2008 R2 SP1 

Resolution: This issue is resolved in KB4493472.

Back to top
March 12, 2019
KB4489878
Resolved
KB4493472
Resolved:
April 09, 2019
10:00 AM PT

Opened:
March 12, 2019
10:00 AM PT
NETDOM.EXE fails to run.
After installing KB4489878, NETDOM.EXE fails to run, and the on-screen error, “The command failed to complete successfully.” appears.

Affected platforms: 
  • Client: Windows 7, Service Pack 1 
  • Server: Windows Server 2008 R2 SP1 

Resolution: This issue is resolved in KB4493472.

Back to top
March 12, 2019
KB4489878
Resolved
KB4493472
Resolved:
April 09, 2019
10:00 AM PT

Opened:
March 12, 2019
10:00 AM PT
" @@ -107,9 +107,9 @@ sections: - items: - type: markdown text: " - - - - +
DetailsOriginating updateStatusHistory
Virtual machines fail to restore.
After installing KB4480970, virtual machines (VM) may fail to restore successfully if the VM has been saved and restored once before. The error message is, “Failed to restore the virtual machine state: Cannot restore this virtual machine because the saved state data cannot be read. Delete the saved state data and then try to start the virtual machine. (0xC0370027).”

This affects AMD Bulldozer Family 15h, AMD Jaguar Family 16h, and AMD Puma Family 16h (second generation) microarchitectures.

Affected platforms: 
  • Client: Windows 7, Service Pack 1 
  • Server: Windows Server 2008 R2 SP1 

Resolution: This issue is resolved in KB4490511.

Back to top
January 08, 2019
KB4480970
Resolved
KB4490511
Resolved:
February 19, 2019
02:00 PM PT

Opened:
January 08, 2019
10:00 AM PT
Local Administrators unable to remotely access shares.
Local users who are part of the local Administrators group may not be able to remotely access shares on Windows Server 2008 R2 and Windows 7 machines after installing KB4480970. This does not affect domain accounts in the local Administrators group.
 
Affected platforms: 
  • Client: Windows 7, Service Pack 1 
  • Server: Windows Server 2008 R2 SP1 

Resolution: This issue is resolved in KB4487345.

Back to top
January 08, 2019
KB4480970
Resolved
KB4487345
Resolved:
January 11, 2019
02:00 PM PT

Opened:
January 08, 2019
10:00 AM PT
Internet Explorer 11 authentication issue with multiple concurrent logons.
After installing KB4480970, Internet Explorer 11 and other applications that use WININET.DLL may have authentication issues. This occurs when two or more people use the same user account for multiple, concurrent login sessions on the same Windows Server machine, including Remote Desktop Protocol (RDP) and Terminal Server logons. Symptoms reported by customers include, but may not be limited to:
  • Cache size and location show zero or empty.
  • Keyboard shortcuts may not work properly.
  • Webpages may intermittently fail to load or render correctly.
  • Issues with credential prompts.
  • Issues when downloading files.

Affected platforms: 
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10 Enterprise LTSC 2016; Windows 8.1; Windows 7, Service Pack 1 
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server 2016; Windows Server 2012 R2; Windows Server 2008 R2 SP1 

Resolution: This issue is resolved in KB4493472.

Back to top
January 08, 2019
KB4480970
Resolved
KB4493472
Resolved:
April 09, 2019
10:00 AM PT

Opened:
January 08, 2019
10:00 AM PT
+ + +
DetailsOriginating updateStatusHistory
Local Administrators unable to remotely access shares.
Local users who are part of the local Administrators group may not be able to remotely access shares on Windows Server 2008 R2 and Windows 7 machines after installing KB4480970. This does not affect domain accounts in the local Administrators group.
 
Affected platforms: 
  • Client: Windows 7, Service Pack 1 
  • Server: Windows Server 2008 R2 SP1 

Resolution: This issue is resolved in KB4487345.

Back to top
January 08, 2019
KB4480970
Resolved
KB4487345
Resolved:
January 11, 2019
02:00 PM PT

Opened:
January 08, 2019
10:00 AM PT
Virtual machines fail to restore.
After installing KB4480970, virtual machines (VM) may fail to restore successfully if the VM has been saved and restored once before. The error message is, “Failed to restore the virtual machine state: Cannot restore this virtual machine because the saved state data cannot be read. Delete the saved state data and then try to start the virtual machine. (0xC0370027).”

This affects AMD Bulldozer Family 15h, AMD Jaguar Family 16h, and AMD Puma Family 16h (second generation) microarchitectures.

Affected platforms: 
  • Client: Windows 7, Service Pack 1 
  • Server: Windows Server 2008 R2 SP1 

Resolution: This issue is resolved in KB4490511.

Back to top
January 08, 2019
KB4480970
Resolved
KB4490511
Resolved:
February 19, 2019
02:00 PM PT

Opened:
January 08, 2019
10:00 AM PT
Internet Explorer 11 authentication issue with multiple concurrent logons.
After installing KB4480970, Internet Explorer 11 and other applications that use WININET.DLL may have authentication issues. This occurs when two or more people use the same user account for multiple, concurrent login sessions on the same Windows Server machine, including Remote Desktop Protocol (RDP) and Terminal Server logons. Symptoms reported by customers include, but may not be limited to:
  • Cache size and location show zero or empty.
  • Keyboard shortcuts may not work properly.
  • Webpages may intermittently fail to load or render correctly.
  • Issues with credential prompts.
  • Issues when downloading files.

Affected platforms: 
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10 Enterprise LTSC 2016; Windows 8.1; Windows 7, Service Pack 1 
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server 2016; Windows Server 2012 R2; Windows Server 2008 R2 SP1 

Resolution: This issue is resolved in KB4493472.

Back to top
January 08, 2019
KB4480970
Resolved
KB4493472
Resolved:
April 09, 2019
10:00 AM PT

Opened:
January 08, 2019
10:00 AM PT
" diff --git a/windows/release-information/status-windows-8.1-and-windows-server-2012-r2.yml b/windows/release-information/status-windows-8.1-and-windows-server-2012-r2.yml index aec950f873..d3150aecc8 100644 --- a/windows/release-information/status-windows-8.1-and-windows-server-2012-r2.yml +++ b/windows/release-information/status-windows-8.1-and-windows-server-2012-r2.yml @@ -59,17 +59,17 @@ sections: - items: - type: markdown text: "
This table offers a summary of current active issues and those issues that have been resolved in the last 30 days.
- - - - - - - - - - - +
SummaryOriginating updateStatusLast updated
System may be unresponsive after restart if Avira antivirus software installed
Devices with Avira antivirus software installed may become unresponsive upon restart.

See details >
April 09, 2019
KB4493446
Investigating
April 09, 2019
10:00 AM PT
Issue using PXE to start a device from WDS
There may be issues using the Preboot Execution Environment (PXE) to start a device from a Windows Deployment Services (WDS) server configured to use Variable Window Extension.

See details >
March 12, 2019
KB4489881
Mitigated
April 09, 2019
10:00 AM PT
System unresponsive after restart if Sophos Endpoint Protection installed
Devices with Sophos Endpoint Protection installed and managed by Sophos Central or Sophos Enterprise Console (SEC) may become unresponsive upon restart.

See details >
April 09, 2019
KB4493446
Mitigated
April 09, 2019
10:00 AM PT
System may be unresponsive after restart if ArcaBit antivirus software installed
Devices with ArcaBit antivirus software installed may become unresponsive upon restart.

See details >
April 09, 2019
KB4493446
Mitigated
April 09, 2019
10:00 AM PT
Certain operations performed on on a Cluster Shared Volume may fail
Certain operations, such as rename, performed on files or folders on a Cluster Shared Volume (CSV) may fail with the error, “STATUS_BAD_IMPERSONATION_LEVEL (0xC00000A5)”.

See details >
April 09, 2019
KB4493446
Mitigated
April 09, 2019
10:00 AM PT
Internet Explorer 11 authentication issue with multiple concurrent logons
Internet Explorer 11 users may encounter issues if two or more people use the same user account for multiple, concurrent login sessions on the same Windows Server machine.

See details >
January 08, 2019
KB4480963
Resolved
KB4493446
April 09, 2019
10:00 AM PT
MSXML6 may cause applications to stop responding.
MSXML6 may cause applications to stop responding if an exception was thrown during node operations, such as appendChild(), insertBefore(), and moveNode().

See details >
January 08, 2019
KB4480963
Resolved
KB4493446
April 09, 2019
10:00 AM PT
Custom URI schemes may not start corresponding application
Custom URI schemes for application protocol handlers may not start the corresponding application for local intranet and trusted sites in Internet Explorer.

See details >
March 12, 2019
KB4489881
Resolved
KB4493446
April 09, 2019
10:00 AM PT
Devices may not respond at login or Welcome screen if running certain Avast software
Devices running Avast for Business, Avast CloudCare, and AVG Business Edition antivirus software may become unresponsive after restart.

See details >
April 09, 2019
KB4493446
Resolved
April 09, 2019
10:00 AM PT
Embedded objects may display incorrectly
Any compound document (OLE) server application that places embedded objects into the Windows Metafile (WMF) using the PatBlt API may display embedded objects incorrectly.

See details >
February 12, 2019
KB4487000
Resolved
KB4493446
April 09, 2019
10:00 AM PT
+ + + + + + + + + +
SummaryOriginating updateStatusLast updated
System may be unresponsive after restart if Avira antivirus software installed
Devices with Avira antivirus software installed may become unresponsive upon restart.

See details >
April 09, 2019
KB4493446
Investigating
April 09, 2019
10:00 AM PT
Issue using PXE to start a device from WDS
There may be issues using the Preboot Execution Environment (PXE) to start a device from a Windows Deployment Services (WDS) server configured to use Variable Window Extension.

See details >
March 12, 2019
KB4489881
Mitigated
April 09, 2019
10:00 AM PT
System unresponsive after restart if Sophos Endpoint Protection installed
Devices with Sophos Endpoint Protection installed and managed by Sophos Central or Sophos Enterprise Console (SEC) may become unresponsive upon restart.

See details >
April 09, 2019
KB4493446
Mitigated
April 09, 2019
10:00 AM PT
System may be unresponsive after restart if ArcaBit antivirus software installed
Devices with ArcaBit antivirus software installed may become unresponsive upon restart.

See details >
April 09, 2019
KB4493446
Mitigated
April 09, 2019
10:00 AM PT
Certain operations performed on on a Cluster Shared Volume may fail
Certain operations, such as rename, performed on files or folders on a Cluster Shared Volume (CSV) may fail with the error, “STATUS_BAD_IMPERSONATION_LEVEL (0xC00000A5)”.

See details >
April 09, 2019
KB4493446
Mitigated
April 09, 2019
10:00 AM PT
Internet Explorer 11 authentication issue with multiple concurrent logons
Internet Explorer 11 users may encounter issues if two or more people use the same user account for multiple, concurrent login sessions on the same Windows Server machine.

See details >
January 08, 2019
KB4480963
Resolved
KB4493446
April 09, 2019
10:00 AM PT
MSXML6 may cause applications to stop responding.
MSXML6 may cause applications to stop responding if an exception was thrown during node operations, such as appendChild(), insertBefore(), and moveNode().

See details >
January 08, 2019
KB4480963
Resolved
KB4493446
April 09, 2019
10:00 AM PT
Custom URI schemes may not start corresponding application
Custom URI schemes for application protocol handlers may not start the corresponding application for local intranet and trusted sites in Internet Explorer.

See details >
March 12, 2019
KB4489881
Resolved
KB4493446
April 09, 2019
10:00 AM PT
Devices may not respond at login or Welcome screen if running certain Avast software
Devices running Avast for Business, Avast CloudCare, and AVG Business Edition antivirus software may become unresponsive after restart.

See details >
April 09, 2019
KB4493446
Resolved
April 09, 2019
10:00 AM PT
Embedded objects may display incorrectly
Any compound document (OLE) server application that places embedded objects into the Windows Metafile (WMF) using the PatBlt API may display embedded objects incorrectly.

See details >
February 12, 2019
KB4487000
Resolved
KB4493446
April 09, 2019
10:00 AM PT
" @@ -84,12 +84,12 @@ sections: - items: - type: markdown text: " - - - - - - +
DetailsOriginating updateStatusHistory
System may be unresponsive after restart if Avira antivirus software installed
Microsoft and Avira have identified an issue on devices with Avira antivirus software installed that may cause the system to become unresponsive upon restart after installing KB4493446.

Microsoft has temporarily blocked devices from receiving this update if Avira antivirus software is installed.

Affected platforms: 
  • Client: Windows 8.1; Windows 7, Service Pack 1 
  • Server: Windows Server 2012 R2; Windows Server 2008 R2 SP1 

Next steps: We are presently investigating this issue with Avira and will provide an update when available.

Back to top
April 09, 2019
KB4493446
Investigating
Last updated:
April 09, 2019
10:00 AM PT

Opened:
April 09, 2019
10:00 AM PT
System unresponsive after restart if Sophos Endpoint Protection installed
Microsoft and Sophos have identified an issue on devices with Sophos Endpoint Protection installed and managed by either Sophos Central or Sophos Enterprise Console (SEC) that may cause the system to become unresponsive upon restart after installing KB4493446.

Microsoft has temporarily blocked devices from receiving this update if the Sophos Endpoint is installed until a solution is available.

Affected platforms: 
  • Client: Windows 8.1; Windows 7, Service Pack 1 
  • Server: Windows Server 2012 R2; Windows Server 2008 R2 SP1 

Guidance for Sophos Endpoint and Sophos Enterprise Console customers can be found in the Sophos support article.

Back to top
April 09, 2019
KB4493446
Mitigated
Last updated:
April 09, 2019
10:00 AM PT

Opened:
April 09, 2019
10:00 AM PT
System may be unresponsive after restart if ArcaBit antivirus software installed
Microsoft and ArcaBit have identified an issue on devices with ArcaBit antivirus software installed that may cause the system to become unresponsive upon restart after installing KB4493446.

Microsoft has temporarily blocked devices from receiving this update if ArcaBit antivirus software is installed.

Affected platforms: 
  • Client: Windows 8.1; Windows 7, Service Pack 1 
  • Server: Windows Server 2012 R2; Windows Server 2008 R2 SP1 

ArcaBit has released an update to address this issue. For more information, see the Arcabit support article.

Back to top
April 09, 2019
KB4493446
Mitigated
Last updated:
April 09, 2019
10:00 AM PT

Opened:
April 09, 2019
10:00 AM PT
Certain operations performed on on a Cluster Shared Volume may fail
Certain operations, such as rename, that you perform on files or folders that are on a Cluster Shared Volume (CSV) may fail with the error, “STATUS_BAD_IMPERSONATION_LEVEL (0xC00000A5)”. This occurs when you perform the operation on a CSV owner node from a process that doesn’t have administrator privilege.

Affected platforms: 
  • Client: Windows 8.1 
  • Server: Windows Server 2012 R2 

Workaround: Do one of the following:

  • Perform the operation from a process that has administrator privilege.
  • Perform the operation from a node that doesn’t have CSV ownership.

Next steps: Microsoft is working on a resolution and will provide an update in an upcoming release.

Back to top
April 09, 2019
KB4493446
Mitigated
Last updated:
April 09, 2019
10:00 AM PT

Opened:
April 09, 2019
10:00 AM PT
Devices may not respond at login or Welcome screen if running certain Avast software
Microsoft and Avast have identified an issue on devices running Avast for Business, Avast CloudCare, and AVG Business Edition antivirus software after you install KB4493446 and restart. Devices may become unresponsive at the login or Welcome screen. Additionally, you may be unable to log in or log in after an extended period of time.

Affected platforms: 
  • Client: Windows 8.1; Windows 7, Service Pack 1 
  • Server: Windows Server 2012 R2; Windows Server 2008 R2 SP1 


Resolution: Avast has released emergency updates to address this issue. For more information and AV update schedule, see the Avast support KB article.

Back to top
April 09, 2019
KB4493446
Resolved
Resolved:
April 09, 2019
10:00 AM PT

Opened:
April 09, 2019
10:00 AM PT
+ + + + +
DetailsOriginating updateStatusHistory
System may be unresponsive after restart if Avira antivirus software installed
Microsoft and Avira have identified an issue on devices with Avira antivirus software installed that may cause the system to become unresponsive upon restart after installing KB4493446.

Microsoft has temporarily blocked devices from receiving this update if Avira antivirus software is installed.

Affected platforms: 
  • Client: Windows 8.1; Windows 7, Service Pack 1 
  • Server: Windows Server 2012 R2; Windows Server 2008 R2 SP1 

Next steps: We are presently investigating this issue with Avira and will provide an update when available.

Back to top
April 09, 2019
KB4493446
Investigating
Last updated:
April 09, 2019
10:00 AM PT

Opened:
April 09, 2019
10:00 AM PT
System unresponsive after restart if Sophos Endpoint Protection installed
Microsoft and Sophos have identified an issue on devices with Sophos Endpoint Protection installed and managed by either Sophos Central or Sophos Enterprise Console (SEC) that may cause the system to become unresponsive upon restart after installing KB4493446.

Microsoft has temporarily blocked devices from receiving this update if the Sophos Endpoint is installed until a solution is available.

Affected platforms: 
  • Client: Windows 8.1; Windows 7, Service Pack 1 
  • Server: Windows Server 2012 R2; Windows Server 2008 R2 SP1 

Guidance for Sophos Endpoint and Sophos Enterprise Console customers can be found in the Sophos support article.

Back to top
April 09, 2019
KB4493446
Mitigated
Last updated:
April 09, 2019
10:00 AM PT

Opened:
April 09, 2019
10:00 AM PT
System may be unresponsive after restart if ArcaBit antivirus software installed
Microsoft and ArcaBit have identified an issue on devices with ArcaBit antivirus software installed that may cause the system to become unresponsive upon restart after installing KB4493446.

Microsoft has temporarily blocked devices from receiving this update if ArcaBit antivirus software is installed.

Affected platforms: 
  • Client: Windows 8.1; Windows 7, Service Pack 1 
  • Server: Windows Server 2012 R2; Windows Server 2008 R2 SP1 

ArcaBit has released an update to address this issue. For more information, see the Arcabit support article.

Back to top
April 09, 2019
KB4493446
Mitigated
Last updated:
April 09, 2019
10:00 AM PT

Opened:
April 09, 2019
10:00 AM PT
Certain operations performed on on a Cluster Shared Volume may fail
Certain operations, such as rename, that you perform on files or folders that are on a Cluster Shared Volume (CSV) may fail with the error, “STATUS_BAD_IMPERSONATION_LEVEL (0xC00000A5)”. This occurs when you perform the operation on a CSV owner node from a process that doesn’t have administrator privilege.

Affected platforms: 
  • Client: Windows 8.1 
  • Server: Windows Server 2012 R2 

Workaround: Do one of the following:

  • Perform the operation from a process that has administrator privilege.
  • Perform the operation from a node that doesn’t have CSV ownership.

Next steps: Microsoft is working on a resolution and will provide an update in an upcoming release.

Back to top
April 09, 2019
KB4493446
Mitigated
Last updated:
April 09, 2019
10:00 AM PT

Opened:
April 09, 2019
10:00 AM PT
Devices may not respond at login or Welcome screen if running certain Avast software
Microsoft and Avast have identified an issue on devices running Avast for Business, Avast CloudCare, and AVG Business Edition antivirus software after you install KB4493446 and restart. Devices may become unresponsive at the login or Welcome screen. Additionally, you may be unable to log in or log in after an extended period of time.

Affected platforms: 
  • Client: Windows 8.1; Windows 7, Service Pack 1 
  • Server: Windows Server 2012 R2; Windows Server 2008 R2 SP1 


Resolution: Avast has released emergency updates to address this issue. For more information and AV update schedule, see the Avast support KB article.

Back to top
April 09, 2019
KB4493446
Resolved
Resolved:
April 09, 2019
10:00 AM PT

Opened:
April 09, 2019
10:00 AM PT
" @@ -97,10 +97,10 @@ sections: - items: - type: markdown text: " - +
DetailsOriginating updateStatusHistory
- +
Option 2:
Use the Windows Deployment Services UI to make the following adjustment:
  1. Open Windows Deployment Services from Windows Administrative Tools.
  2. Expand Servers and right-click a WDS server.
  3. Open its properties and clear the Enable Variable Window Extension box on the TFTP tab.
Option 3:
Set the following registry value to 0:
HKLM\\System\\CurrentControlSet\\Services\\WDSServer\\Providers\\WDSTFTP\\EnableVariableWindowExtension
Restart the WDSServer service after disabling the Variable Window Extension.

Next steps: Microsoft is working on a resolution and will provide an update in an upcoming release.

Back to top +
DetailsOriginating updateStatusHistory
Issue using PXE to start a device from WDS
After installing KB4489881, there may be issues using the Preboot Execution Environment (PXE) to start a device from a Windows Deployment Services (WDS) server configured to use Variable Window Extension. This may cause the connection to the WDS server to terminate prematurely while downloading the image. This issue does not affect clients or devices that are not using Variable Window Extension.

Affected platforms: 
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10 Enterprise LTSC 2016; Windows 8.1 
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server 2016; Windows Server 2012 R2 

Workaround: To mitigate the issue, disable the Variable Window Extension on WDS server using one of the following options:
Option 1:
Open an Administrator Command prompt and type the following:
Wdsutil /Set-TransportServer /EnableTftpVariableWindowExtension:No
-
Option 2:
Use the Windows Deployment Services UI to make the following adjustment:
  1. Open Windows Deployment Services from Windows Administrative Tools.
  2. Expand Servers and right-click a WDS server.
  3. Open its properties and clear the Enable Variable Window Extension box on the TFTP tab.
Option 3:
Set the following registry value to 0:
HKLM\\System\\CurrentControlSet\\Services\\WDSServer\\Providers\\WDSTFTP\\EnableVariableWindowExtension
Restart the WDSServer service after disabling the Variable Window Extension.

Next steps: Microsoft is working on a resolution and will provide an update in an upcoming release.

Back to top
March 12, 2019
KB4489881
Mitigated
Last updated:
April 09, 2019
10:00 AM PT

Opened:
March 12, 2019
10:00 AM PT
Custom URI schemes may not start corresponding application
After installing KB4489881, custom URI schemes for application protocol handlers may not start the corresponding application for local intranet and trusted sites security zones on Internet Explorer.

Affected platforms: 
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 8.1; Windows 7, Service Pack 1 
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2; Windows Server 2008 R2 SP1 

Resolution: This issue is resolved in KB4493446.

Back to top
March 12, 2019
KB4489881
Resolved
KB4493446
Resolved:
April 09, 2019
10:00 AM PT

Opened:
March 12, 2019
10:00 AM PT
March 12, 2019
KB4489881
Mitigated
Last updated:
April 09, 2019
10:00 AM PT

Opened:
March 12, 2019
10:00 AM PT
Custom URI schemes may not start corresponding application
After installing KB4489881, custom URI schemes for application protocol handlers may not start the corresponding application for local intranet and trusted sites security zones on Internet Explorer.

Affected platforms: 
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 8.1; Windows 7, Service Pack 1 
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2; Windows Server 2008 R2 SP1 

Resolution: This issue is resolved in KB4493446.

Back to top
March 12, 2019
KB4489881
Resolved
KB4493446
Resolved:
April 09, 2019
10:00 AM PT

Opened:
March 12, 2019
10:00 AM PT
" @@ -108,8 +108,8 @@ sections: - items: - type: markdown text: " - - +
DetailsOriginating updateStatusHistory
Embedded objects may display incorrectly
Any compound document (OLE) server application that places embedded objects into the Windows Metafile (WMF) using the PatBlt API may display embedded objects incorrectly.

For example, if you paste a Microsoft Excel worksheet object into a Microsoft Word document, the cells may render with a different background color.

Affected platforms: 
  • Client: Windows 8.1 
  • Server: Windows Server 2012 R2 

Resolution: This issue is resolved in KB4493446.

Back to top
February 12, 2019
KB4487000
Resolved
KB4493446
Resolved:
April 09, 2019
10:00 AM PT

Opened:
February 12, 2019
10:00 AM PT
+
DetailsOriginating updateStatusHistory
Embedded objects may display incorrectly
Any compound document (OLE) server application that places embedded objects into the Windows Metafile (WMF) using the PatBlt API may display embedded objects incorrectly.

For example, if you paste a Microsoft Excel worksheet object into a Microsoft Word document, the cells may render with a different background color.

Affected platforms: 
  • Client: Windows 8.1 
  • Server: Windows Server 2012 R2 

Resolution: This issue is resolved in KB4493446.

Back to top
February 12, 2019
KB4487000
Resolved
KB4493446
Resolved:
April 09, 2019
10:00 AM PT

Opened:
February 12, 2019
10:00 AM PT
" @@ -117,8 +117,8 @@ sections: - items: - type: markdown text: " - - - +
DetailsOriginating updateStatusHistory
Internet Explorer 11 authentication issue with multiple concurrent logons
After installing KB4480963, Internet Explorer 11 and other applications that use WININET.DLL may have authentication issues. This occurs when two or more people use the same user account for multiple, concurrent login sessions on the same Windows Server machine, including Remote Desktop Protocol (RDP) and Terminal Server logons. Symptoms reported by customers include, but may not be limited to:
  • Cache size and location show zero or empty.
  • Keyboard shortcuts may not work properly.
  • Webpages may intermittently fail to load or render correctly.
  • Issues with credential prompts.
  • Issues when downloading files.

Affected platforms: 
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10 Enterprise LTSC 2016; Windows 8.1; Windows 7, Service Pack 1 
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server 2016; Windows Server 2012 R2; Windows Server 2008 R2 SP1 

Resolution: This issue is resolved in KB4493446.

Back to top
January 08, 2019
KB4480963
Resolved
KB4493446
Resolved:
April 09, 2019
10:00 AM PT

Opened:
January 08, 2019
10:00 AM PT
MSXML6 may cause applications to stop responding.
After installing KB4480963, MSXML6 causes applications to stop responding if an exception was thrown during node operations, such as appendChild(), insertBefore(), and moveNode().

The Group Policy editor may stop responding when editing a Group Policy Object (GPO) that contains Group Policy Preferences (GPP) for Internet Explorer 10 settings.

Resolution: This issue is resolved in KB4493446.

Back to top
January 08, 2019
KB4480963
Resolved
KB4493446
Resolved:
April 09, 2019
10:00 AM PT

Opened:
January 08, 2019
10:00 AM PT
+ +
DetailsOriginating updateStatusHistory
Internet Explorer 11 authentication issue with multiple concurrent logons
After installing KB4480963, Internet Explorer 11 and other applications that use WININET.DLL may have authentication issues. This occurs when two or more people use the same user account for multiple, concurrent login sessions on the same Windows Server machine, including Remote Desktop Protocol (RDP) and Terminal Server logons. Symptoms reported by customers include, but may not be limited to:
  • Cache size and location show zero or empty.
  • Keyboard shortcuts may not work properly.
  • Webpages may intermittently fail to load or render correctly.
  • Issues with credential prompts.
  • Issues when downloading files.

Affected platforms: 
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10 Enterprise LTSC 2016; Windows 8.1; Windows 7, Service Pack 1 
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server 2016; Windows Server 2012 R2; Windows Server 2008 R2 SP1 

Resolution: This issue is resolved in KB4493446.

Back to top
January 08, 2019
KB4480963
Resolved
KB4493446
Resolved:
April 09, 2019
10:00 AM PT

Opened:
January 08, 2019
10:00 AM PT
MSXML6 may cause applications to stop responding.
After installing KB4480963, MSXML6 causes applications to stop responding if an exception was thrown during node operations, such as appendChild(), insertBefore(), and moveNode().

The Group Policy editor may stop responding when editing a Group Policy Object (GPO) that contains Group Policy Preferences (GPP) for Internet Explorer 10 settings.

Resolution: This issue is resolved in KB4493446.

Back to top
January 08, 2019
KB4480963
Resolved
KB4493446
Resolved:
April 09, 2019
10:00 AM PT

Opened:
January 08, 2019
10:00 AM PT
" diff --git a/windows/release-information/status-windows-server-2008-sp2.yml b/windows/release-information/status-windows-server-2008-sp2.yml index 00ea0100f4..8e8ad0c510 100644 --- a/windows/release-information/status-windows-server-2008-sp2.yml +++ b/windows/release-information/status-windows-server-2008-sp2.yml @@ -59,18 +59,18 @@ sections: - items: - type: markdown text: "
This table offers a summary of current active issues and those issues that have been resolved in the last 30 days.
- - - - - - - - - - - - +
SummaryOriginating updateStatusLast updated
First character of the Japanese era name not recognized as an abbreviation
The first character of the Japanese era name is not recognized as an abbreviation and may cause date parsing issues.

See details >
January 17, 2019
KB4480974
Resolved
KB4489880
April 25, 2019
03:32 PM PT
Applications using Microsoft Jet database fail to open
Applications that use a Microsoft Jet database with the Microsoft Access 97 file format may fail to open if column names are greater than 32 characters.

See details >
January 08, 2019
KB4480968
Resolved
KB4487023
April 25, 2019
03:32 PM PT
Unable to use Seek bar in Windows Media Player
Users may not be able to use the Seek bar in Windows Media Player when playing specific files.

See details >
October 09, 2018
KB4463097
Resolved
KB4471325
April 25, 2019
03:28 PM PT
Virtual machines fail to restore
Virtual machines (VMs) may fail to restore successfully if the VM has been saved and restored once before.

See details >
January 08, 2019
KB4480968
Resolved
KB4490514
April 25, 2019
03:26 PM PT
System unresponsive after restart if Sophos Endpoint Protection installed
Devices with Sophos Endpoint Protection installed and managed by Sophos Central or Sophos Enterprise Console (SEC) may become unresponsive upon restart.

See details >
April 09, 2019
KB4493471
Mitigated
April 25, 2019
03:26 PM PT
System may be unresponsive after restart if Avira antivirus software installed
Devices with Avira antivirus software installed may become unresponsive upon restart.

See details >
April 09, 2019
KB4493471
Investigating
April 25, 2019
03:26 PM PT
Embedded objects may display incorrectly
Any compound document (OLE) server application that places embedded objects into the Windows Metafile (WMF) using the PatBlt API may display embedded objects incorrectly.

See details >

Resolved
KB4493471
April 25, 2019
03:26 PM PT
Applications using Microsoft Jet database and Access 95 file format stop working
Applications that use a Microsoft Jet database with the Microsoft Access 95 file format may randomly stop working.

See details >
February 12, 2019
KB4487023
Resolved
KB4487022
April 25, 2019
03:26 PM PT
Local Administrators unable to remotely access shares
Local users who are part of the local Administrators group may not be able to remotely access shares on Windows Server 2008 R2 and Windows 7 machines.

See details >
January 08, 2019
KB4480968
Resolved
KB4487354
April 25, 2019
03:26 PM PT
NETDOM.EXE fails to run
NETDOM.EXE fails to run and the error, “The command failed to complete successfully.” appears on screen.

See details >
March 12, 2019
KB4489880
Resolved
KB4493471
April 25, 2019
03:25 PM PT
Authentication may fail for services after the Kerberos ticket expires
Authentication may fail for services that require unconstrained delegation after the Kerberos ticket expires.

See details >
March 12, 2019
KB4489880
Mitigated
April 25, 2019
03:24 PM PT
+ + + + + + + + + + +
SummaryOriginating updateStatusLast updated
System may be unresponsive after restart if Avira antivirus software installed
Devices with Avira antivirus software installed may become unresponsive upon restart.

See details >
April 09, 2019
KB4493471
Investigating
April 25, 2019
03:26 PM PT
System unresponsive after restart if Sophos Endpoint Protection installed
Devices with Sophos Endpoint Protection installed and managed by Sophos Central or Sophos Enterprise Console (SEC) may become unresponsive upon restart.

See details >
April 09, 2019
KB4493471
Mitigated
April 25, 2019
03:26 PM PT
Authentication may fail for services after the Kerberos ticket expires
Authentication may fail for services that require unconstrained delegation after the Kerberos ticket expires.

See details >
March 12, 2019
KB4489880
Mitigated
April 25, 2019
03:24 PM PT
Unable to use Seek bar in Windows Media Player
Users may not be able to use the Seek bar in Windows Media Player when playing specific files.

See details >
October 09, 2018
KB4463097
Resolved
KB4471325
April 25, 2019
03:28 PM PT
Applications using Microsoft Jet database fail to open
Applications that use a Microsoft Jet database with the Microsoft Access 97 file format may fail to open if column names are greater than 32 characters.

See details >
January 08, 2019
KB4480968
Resolved
KB4487023
April 25, 2019
03:32 PM PT
Virtual machines fail to restore
Virtual machines (VMs) may fail to restore successfully if the VM has been saved and restored once before.

See details >
January 08, 2019
KB4480968
Resolved
KB4490514
April 25, 2019
03:26 PM PT
Embedded objects may display incorrectly
Any compound document (OLE) server application that places embedded objects into the Windows Metafile (WMF) using the PatBlt API may display embedded objects incorrectly.

See details >

Resolved
KB4493471
April 25, 2019
03:26 PM PT
First character of the Japanese era name not recognized as an abbreviation
The first character of the Japanese era name is not recognized as an abbreviation and may cause date parsing issues.

See details >
January 17, 2019
KB4480974
Resolved
KB4489880
April 25, 2019
03:32 PM PT
Applications using Microsoft Jet database and Access 95 file format stop working
Applications that use a Microsoft Jet database with the Microsoft Access 95 file format may randomly stop working.

See details >
February 12, 2019
KB4487023
Resolved
KB4487022
April 25, 2019
03:26 PM PT
Local Administrators unable to remotely access shares
Local users who are part of the local Administrators group may not be able to remotely access shares on Windows Server 2008 R2 and Windows 7 machines.

See details >
January 08, 2019
KB4480968
Resolved
KB4487354
April 25, 2019
03:26 PM PT
NETDOM.EXE fails to run
NETDOM.EXE fails to run and the error, “The command failed to complete successfully.” appears on screen.

See details >
March 12, 2019
KB4489880
Resolved
KB4493471
April 25, 2019
03:25 PM PT
" @@ -85,17 +85,17 @@ sections: - items: - type: markdown text: " - - - - - - - - - - - - +
DetailsOriginating updateStatusHistory
First character of the Japanese era name not recognized as an abbreviation
After installing KB4480974, the first character of the Japanese era name is not recognized as an abbreviation and may cause date parsing issues.

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 8.1; Windows 7, Service Pack 1
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2; Windows Server 2012; Windows Server 2008 R2 SP1; Windows Server 2008 SP2

Resolution: This issue is resolved in KB4489880.

Back to top
January 17, 2019
KB4480974
Resolved
KB4489880
Resolved:
March 12, 2019
10:00 AM PT

Opened:
April 25, 2019
03:32 PM PT
Applications using Microsoft Jet database fail to open
Applications that use a Microsoft Jet database with the Microsoft Access 97 file format may fail to open if the database has column names greater than 32 characters. The database will fail to open with the error, “Unrecognized Database Format”.

Affected platforms: 
  • Client: Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 8.1; Windows 7, Service Pack 1 
  • Server: Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2; Windows Server 2012; Windows Server 2008 R2 SP1; Windows Server 2008 SP2

Resolution: This issue is resolved in KB4487023.

Back to top
January 08, 2019
KB4480968
Resolved
KB4487023
Resolved:
February 12, 2019
10:00 AM PT

Opened:
April 25, 2019
03:32 PM PT
Unable to use Seek bar in Windows Media Player
After installing KB4463097, users may not be able to use the Seek Bar in Windows Media Player when playing specific files. This issue does not affect normal playback.

Affected platforms: 
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 8.1; Windows 7, Service Pack 1
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2; Windows Server 2012; Windows Server 2008 R2 SP1; Windows Server 2008 SP2

Resolution: This issue is resolved in KB4471325.

Back to top
October 09, 2018
KB4463097
Resolved
KB4471325
Resolved:
December 11, 2018
10:00 AM PT

Opened:
April 25, 2019
03:28 PM PT
Virtual machines fail to restore
After installing KB4480968, virtual machines (VM) may fail to restore successfully if the VM has been saved and restored once before. The error message is, “Failed to restore the virtual machine state: Cannot restore this virtual machine because the saved state data cannot be read. Delete the saved state data and then try to start the virtual machine. (0xC0370027).”

This affects AMD Bulldozer Family 15h, AMD Jaguar Family 16h, and AMD Puma Family 16h (second generation) microarchitectures.

Affected platforms: 
  • Client: Windows 7, Service Pack 1 
  • Server: Windows Server 2012; Windows Server 2008 R2 SP1; Windows Server 2008 SP2

Resolution: This issue is resolved in KB4490514.

Back to top
January 08, 2019
KB4480968
Resolved
KB4490514
Resolved:
February 19, 2019
02:00 PM PT

Opened:
April 25, 2019
03:26 PM PT
System unresponsive after restart if Sophos Endpoint Protection installed
Microsoft and Sophos have identified an issue on devices with Sophos Endpoint Protection installed and managed by either Sophos Central or Sophos Enterprise Console (SEC) that may cause the system to become unresponsive upon restart after installing KB4493471.

Microsoft has temporarily blocked devices from receiving this update if the Sophos Endpoint is installed until a solution is available.

Guidance for Sophos Endpoint and Sophos Enterprise Console customers can be found in the Sophos support article.

Affected platforms: 
  • Client: Windows 8.1; Windows 7, Service Pack 1 
  • Server: Windows Server 2012 R2; Windows Server 2012; Windows Server 2008 R2 SP1; Windows Server 2008 SP2

Back to top
April 09, 2019
KB4493471
Mitigated
Last updated:
April 25, 2019
03:26 PM PT

Opened:
April 25, 2019
03:26 PM PT
System may be unresponsive after restart if Avira antivirus software installed
Microsoft and Avira have identified an issue on devices with Avira antivirus software installed that may cause the system to become unresponsive upon restart after installing KB4493471.

Microsoft has temporarily blocked devices from receiving this update if Avira antivirus software is installed.

Affected platforms: 
  • Client: Windows 8.1; Windows 7, Service Pack 1 
  • Server: Windows Server 2012 R2; Windows Server 2012; Windows Server 2008 R2 SP1; Windows Server 2008 SP2

Next steps: We are presently investigating this issue with Avira and will provide an update when available.

Back to top
April 09, 2019
KB4493471
Investigating
Last updated:
April 25, 2019
03:26 PM PT

Opened:
April 25, 2019
03:26 PM PT
Embedded objects may display incorrectly
Any compound document (OLE) server application that places embedded objects into the Windows Metafile (WMF) using the PatBlt API may display embedded objects incorrectly.

For example, if you paste a Microsoft Excel worksheet object into a Microsoft Word document, the cells may render with a different background color.

Affected platforms: 
  • Client: Windows 8.1 
  • Server: Windows Server 2012 R2; Windows Server 2012; Windows Server 2008 SP2

Resolution: This issue is resolved in KB4493471.

Back to top

Resolved
KB4493471
Resolved:
April 09, 2019
10:00 AM PT

Opened:
April 25, 2019
03:26 PM PT
Applications using Microsoft Jet database and Access 95 file format stop working
Applications that use a Microsoft Jet database with the Microsoft Access 95 file format may randomly stop working.

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 7, Service Pack 1
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012; Windows Server 2008 R2 SP1; Windows Server 2008 SP2

Resolution: This issue is resolved in KB4487022.

Back to top
February 12, 2019
KB4487023
Resolved
KB4487022
Resolved:
February 19, 2019
02:00 PM PT

Opened:
April 25, 2019
03:26 PM PT
Local Administrators unable to remotely access shares
Local users who are part of the local Administrators group may not be able to remotely access shares on Windows Server 2008 R2 and Windows 7 machines after installing KB4480968. This does not affect domain accounts in the local Administrators group.

Affected platforms: 
  • Client: Windows 7, Service Pack 1 
  • Server: Windows Server 2008 R2 SP1; Windows Server 2008 SP2

Resolution: This issue is resolved in KB4487354.

Back to top
January 08, 2019
KB4480968
Resolved
KB4487354
Resolved:
January 11, 2019
02:00 PM PT

Opened:
April 25, 2019
03:26 PM PT
NETDOM.EXE fails to run
After installing KB4489880, NETDOM.EXE fails to run, and the on-screen error, “The command failed to complete successfully.” appears.

Affected platforms: 
  • Client: Windows 7, Service Pack 1 
  • Server: Windows Server 2008 R2 SP1; Windows Server 2008 SP2

Resolution: This issue is resolved in KB4493471.

Back to top
March 12, 2019
KB4489880
Resolved
KB4493471
Resolved:
April 09, 2019
10:00 AM PT

Opened:
April 25, 2019
03:25 PM PT
Authentication may fail for services after the Kerberos ticket expires
After installing KB4489880, some customers report that authentication fails for services that require unconstrained delegation after the Kerberos ticket expires (the default is 10 hours). For example, the SQL server service fails.

Affected platforms: 
  • Client: Windows 7, Service Pack 1 
  • Server: Windows Server 2008 R2 SP1; Windows Server 2008 SP2

Workaround: To mitigate this issue, use one of the following options:

  • Option 1: Purge the Kerberos tickets on the application server. After the Kerberos ticket expires, the issue will occur again, and you must purge the tickets again.
  • Option 2: If purging does not mitigate the issue, restart the application; for example, restart the Internet Information Services (IIS) app pool associated with the SQL server.
  • Option 3: Use constrained delegation.

Next steps: Microsoft is working on a resolution and will provide an update in an upcoming release.

Back to top
March 12, 2019
KB4489880
Mitigated
Last updated:
April 25, 2019
03:24 PM PT

Opened:
April 25, 2019
03:24 PM PT
+ + + + + + + + + + +
DetailsOriginating updateStatusHistory
System may be unresponsive after restart if Avira antivirus software installed
Microsoft and Avira have identified an issue on devices with Avira antivirus software installed that may cause the system to become unresponsive upon restart after installing KB4493471.

Microsoft has temporarily blocked devices from receiving this update if Avira antivirus software is installed.

Affected platforms: 
  • Client: Windows 8.1; Windows 7, Service Pack 1 
  • Server: Windows Server 2012 R2; Windows Server 2012; Windows Server 2008 R2 SP1; Windows Server 2008 SP2

Next steps: We are presently investigating this issue with Avira and will provide an update when available.

Back to top
April 09, 2019
KB4493471
Investigating
Last updated:
April 25, 2019
03:26 PM PT

Opened:
April 25, 2019
03:26 PM PT
System unresponsive after restart if Sophos Endpoint Protection installed
Microsoft and Sophos have identified an issue on devices with Sophos Endpoint Protection installed and managed by either Sophos Central or Sophos Enterprise Console (SEC) that may cause the system to become unresponsive upon restart after installing KB4493471.

Microsoft has temporarily blocked devices from receiving this update if the Sophos Endpoint is installed until a solution is available.

Guidance for Sophos Endpoint and Sophos Enterprise Console customers can be found in the Sophos support article.

Affected platforms: 
  • Client: Windows 8.1; Windows 7, Service Pack 1 
  • Server: Windows Server 2012 R2; Windows Server 2012; Windows Server 2008 R2 SP1; Windows Server 2008 SP2

Back to top
April 09, 2019
KB4493471
Mitigated
Last updated:
April 25, 2019
03:26 PM PT

Opened:
April 25, 2019
03:26 PM PT
Authentication may fail for services after the Kerberos ticket expires
After installing KB4489880, some customers report that authentication fails for services that require unconstrained delegation after the Kerberos ticket expires (the default is 10 hours). For example, the SQL server service fails.

Affected platforms: 
  • Client: Windows 7, Service Pack 1 
  • Server: Windows Server 2008 R2 SP1; Windows Server 2008 SP2

Workaround: To mitigate this issue, use one of the following options:

  • Option 1: Purge the Kerberos tickets on the application server. After the Kerberos ticket expires, the issue will occur again, and you must purge the tickets again.
  • Option 2: If purging does not mitigate the issue, restart the application; for example, restart the Internet Information Services (IIS) app pool associated with the SQL server.
  • Option 3: Use constrained delegation.

Next steps: Microsoft is working on a resolution and will provide an update in an upcoming release.

Back to top
March 12, 2019
KB4489880
Mitigated
Last updated:
April 25, 2019
03:24 PM PT

Opened:
April 25, 2019
03:24 PM PT
Unable to use Seek bar in Windows Media Player
After installing KB4463097, users may not be able to use the Seek Bar in Windows Media Player when playing specific files. This issue does not affect normal playback.

Affected platforms: 
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 8.1; Windows 7, Service Pack 1
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2; Windows Server 2012; Windows Server 2008 R2 SP1; Windows Server 2008 SP2

Resolution: This issue is resolved in KB4471325.

Back to top
October 09, 2018
KB4463097
Resolved
KB4471325
Resolved:
December 11, 2018
10:00 AM PT

Opened:
April 25, 2019
03:28 PM PT
Applications using Microsoft Jet database fail to open
Applications that use a Microsoft Jet database with the Microsoft Access 97 file format may fail to open if the database has column names greater than 32 characters. The database will fail to open with the error, “Unrecognized Database Format”.

Affected platforms: 
  • Client: Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 8.1; Windows 7, Service Pack 1 
  • Server: Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2; Windows Server 2012; Windows Server 2008 R2 SP1; Windows Server 2008 SP2

Resolution: This issue is resolved in KB4487023.

Back to top
January 08, 2019
KB4480968
Resolved
KB4487023
Resolved:
February 12, 2019
10:00 AM PT

Opened:
April 25, 2019
03:32 PM PT
Virtual machines fail to restore
After installing KB4480968, virtual machines (VM) may fail to restore successfully if the VM has been saved and restored once before. The error message is, “Failed to restore the virtual machine state: Cannot restore this virtual machine because the saved state data cannot be read. Delete the saved state data and then try to start the virtual machine. (0xC0370027).”

This affects AMD Bulldozer Family 15h, AMD Jaguar Family 16h, and AMD Puma Family 16h (second generation) microarchitectures.

Affected platforms: 
  • Client: Windows 7, Service Pack 1 
  • Server: Windows Server 2012; Windows Server 2008 R2 SP1; Windows Server 2008 SP2

Resolution: This issue is resolved in KB4490514.

Back to top
January 08, 2019
KB4480968
Resolved
KB4490514
Resolved:
February 19, 2019
02:00 PM PT

Opened:
April 25, 2019
03:26 PM PT
Embedded objects may display incorrectly
Any compound document (OLE) server application that places embedded objects into the Windows Metafile (WMF) using the PatBlt API may display embedded objects incorrectly.

For example, if you paste a Microsoft Excel worksheet object into a Microsoft Word document, the cells may render with a different background color.

Affected platforms: 
  • Client: Windows 8.1 
  • Server: Windows Server 2012 R2; Windows Server 2012; Windows Server 2008 SP2

Resolution: This issue is resolved in KB4493471.

Back to top

Resolved
KB4493471
Resolved:
April 09, 2019
10:00 AM PT

Opened:
April 25, 2019
03:26 PM PT
First character of the Japanese era name not recognized as an abbreviation
After installing KB4480974, the first character of the Japanese era name is not recognized as an abbreviation and may cause date parsing issues.

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 8.1; Windows 7, Service Pack 1
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2; Windows Server 2012; Windows Server 2008 R2 SP1; Windows Server 2008 SP2

Resolution: This issue is resolved in KB4489880.

Back to top
January 17, 2019
KB4480974
Resolved
KB4489880
Resolved:
March 12, 2019
10:00 AM PT

Opened:
April 25, 2019
03:32 PM PT
Applications using Microsoft Jet database and Access 95 file format stop working
Applications that use a Microsoft Jet database with the Microsoft Access 95 file format may randomly stop working.

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 7, Service Pack 1
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012; Windows Server 2008 R2 SP1; Windows Server 2008 SP2

Resolution: This issue is resolved in KB4487022.

Back to top
February 12, 2019
KB4487023
Resolved
KB4487022
Resolved:
February 19, 2019
02:00 PM PT

Opened:
April 25, 2019
03:26 PM PT
Local Administrators unable to remotely access shares
Local users who are part of the local Administrators group may not be able to remotely access shares on Windows Server 2008 R2 and Windows 7 machines after installing KB4480968. This does not affect domain accounts in the local Administrators group.

Affected platforms: 
  • Client: Windows 7, Service Pack 1 
  • Server: Windows Server 2008 R2 SP1; Windows Server 2008 SP2

Resolution: This issue is resolved in KB4487354.

Back to top
January 08, 2019
KB4480968
Resolved
KB4487354
Resolved:
January 11, 2019
02:00 PM PT

Opened:
April 25, 2019
03:26 PM PT
NETDOM.EXE fails to run
After installing KB4489880, NETDOM.EXE fails to run, and the on-screen error, “The command failed to complete successfully.” appears.

Affected platforms: 
  • Client: Windows 7, Service Pack 1 
  • Server: Windows Server 2008 R2 SP1; Windows Server 2008 SP2

Resolution: This issue is resolved in KB4493471.

Back to top
March 12, 2019
KB4489880
Resolved
KB4493471
Resolved:
April 09, 2019
10:00 AM PT

Opened:
April 25, 2019
03:25 PM PT
" diff --git a/windows/release-information/status-windows-server-2012.yml b/windows/release-information/status-windows-server-2012.yml index f87dab169b..904e70e764 100644 --- a/windows/release-information/status-windows-server-2012.yml +++ b/windows/release-information/status-windows-server-2012.yml @@ -59,22 +59,22 @@ sections: - items: - type: markdown text: "
This table offers a summary of current active issues and those issues that have been resolved in the last 30 days.
- - - - - - - - - - - - - - - - +
SummaryOriginating updateStatusLast updated
Applications using Microsoft Jet database and Access 95 file format stop working
Applications that use a Microsoft Jet database with the Microsoft Access 95 file format may randomly stop working.

See details >
February 12, 2019
KB4487025
Resolved
KB4487024
April 25, 2019
04:04 PM PT
First character of the Japanese era name not recognized as an abbreviation
The first character of the Japanese era name is not recognized as an abbreviation and may cause date parsing issues.

See details >
January 15, 2019
KB4480971
Resolved
KB4487024
April 25, 2019
04:02 PM PT
Embedded objects may display incorrectly
Any compound document (OLE) server application that places embedded objects into the Windows Metafile (WMF) using the PatBlt API may display embedded objects incorrectly.

See details >
February 12, 2019
KB4487025
Resolved
KB4493451
April 25, 2019
04:00 PM PT
Certain operations performed on on a Cluster Shared Volume may fail
Certain operations, such as rename, performed on files or folders on a Cluster Shared Volume (CSV) may fail with the error, “STATUS_BAD_IMPERSONATION_LEVEL (0xC00000A5)”.

See details >
January 08, 2019
KB4480975
Mitigated
April 25, 2019
03:52 PM PT
System may be unresponsive after restart if Avira antivirus software installed
Devices with Avira antivirus software installed may become unresponsive upon restart.

See details >
April 09, 2019
KB4493451
Investigating
April 25, 2019
03:48 PM PT
System unresponsive after restart if Sophos Endpoint Protection installed
Devices with Sophos Endpoint Protection installed and managed by Sophos Central or Sophos Enterprise Console (SEC) may become unresponsive upon restart.

See details >
April 09, 2019
KB4493451
Mitigated
April 25, 2019
03:46 PM PT
Issue using PXE to start a device from WDS
There may be issues using the Preboot Execution Environment (PXE) to start a device from a Windows Deployment Services (WDS) server configured to use Variable Window Extension.

See details >
March 12, 2019
KB4489891
Mitigated
April 25, 2019
03:40 PM PT
Error 1309 when installing/uninstalling MSI or MSP files
Users may receive “Error 1309” while installing or uninstalling certain types of MSI and MSP files.

See details >
February 12, 2019
KB4487025
Resolved
KB4489891
April 25, 2019
03:36 PM PT
Internet Explorer 11 authentication issue with multiple concurrent logons
Internet Explorer 11 users may encounter issues if two or more people use the same user account for multiple, concurrent login sessions on the same Windows Server machine.

See details >
January 08, 2019
KB4480975
Resolved
KB4493451
April 25, 2019
03:34 PM PT
MSXML6 may cause applications to stop responding
MSXML6 may cause applications to stop responding if an exception was thrown during node operations, such as appendChild(), insertBefore(), and moveNode().

See details >
January 08, 2019
KB4480975
Resolved
KB4493451
April 25, 2019
03:27 PM PT
Virtual machines fail to restore
Virtual machines (VMs) may fail to restore successfully if the VM has been saved and restored once before.

See details >
January 08, 2019
KB4480975
Resolved
KB4490516
April 25, 2019
03:22 PM PT
Applications using Microsoft Jet database fail to open
Applications that use a Microsoft Jet database with the Microsoft Access 97 file format may fail to open if column names are greater than 32 characters.

See details >
January 08, 2019
KB4480975
Resolved
KB4487025
April 25, 2019
03:19 PM PT
Unable to access hotspots with third-party applications
Third-party applications may have difficulty authenticating hotspots.

See details >
January 08, 2019
KB4480975
Resolved
KB4480971
April 25, 2019
03:14 PM PT
Event Viewer may not show some event descriptions for network interface cards
The Event Viewer may not show some event descriptions for network interface cards (NIC).

See details >
September 11, 2018
KB4457135
Resolved
KB4489891
April 25, 2019
03:10 PM PT
Unable to use Seek bar in Windows Media Player
Users may not be able to use the Seek bar in Windows Media Player when playing specific files.

See details >
October 09, 2018
KB4462929
Resolved
KB4471330
April 25, 2019
02:47 PM PT
+ + + + + + + + + + + + + + +
SummaryOriginating updateStatusLast updated
System may be unresponsive after restart if Avira antivirus software installed
Devices with Avira antivirus software installed may become unresponsive upon restart.

See details >
April 09, 2019
KB4493451
Investigating
April 25, 2019
03:48 PM PT
Issue using PXE to start a device from WDS
There may be issues using the Preboot Execution Environment (PXE) to start a device from a Windows Deployment Services (WDS) server configured to use Variable Window Extension.

See details >
March 12, 2019
KB4489891
Mitigated
April 25, 2019
03:40 PM PT
System unresponsive after restart if Sophos Endpoint Protection installed
Devices with Sophos Endpoint Protection installed and managed by Sophos Central or Sophos Enterprise Console (SEC) may become unresponsive upon restart.

See details >
April 09, 2019
KB4493451
Mitigated
April 25, 2019
03:46 PM PT
Certain operations performed on on a Cluster Shared Volume may fail
Certain operations, such as rename, performed on files or folders on a Cluster Shared Volume (CSV) may fail with the error, “STATUS_BAD_IMPERSONATION_LEVEL (0xC00000A5)”.

See details >
January 08, 2019
KB4480975
Mitigated
April 25, 2019
03:52 PM PT
Unable to use Seek bar in Windows Media Player
Users may not be able to use the Seek bar in Windows Media Player when playing specific files.

See details >
October 09, 2018
KB4462929
Resolved
KB4471330
April 25, 2019
02:47 PM PT
Event Viewer may not show some event descriptions for network interface cards
The Event Viewer may not show some event descriptions for network interface cards (NIC).

See details >
September 11, 2018
KB4457135
Resolved
KB4489891
April 25, 2019
03:10 PM PT
Unable to access hotspots with third-party applications
Third-party applications may have difficulty authenticating hotspots.

See details >
January 08, 2019
KB4480975
Resolved
KB4480971
April 25, 2019
03:14 PM PT
Applications using Microsoft Jet database fail to open
Applications that use a Microsoft Jet database with the Microsoft Access 97 file format may fail to open if column names are greater than 32 characters.

See details >
January 08, 2019
KB4480975
Resolved
KB4487025
April 25, 2019
03:19 PM PT
Virtual machines fail to restore
Virtual machines (VMs) may fail to restore successfully if the VM has been saved and restored once before.

See details >
January 08, 2019
KB4480975
Resolved
KB4490516
April 25, 2019
03:22 PM PT
Internet Explorer 11 authentication issue with multiple concurrent logons
Internet Explorer 11 users may encounter issues if two or more people use the same user account for multiple, concurrent login sessions on the same Windows Server machine.

See details >
January 08, 2019
KB4480975
Resolved
KB4493451
April 25, 2019
03:34 PM PT
MSXML6 may cause applications to stop responding
MSXML6 may cause applications to stop responding if an exception was thrown during node operations, such as appendChild(), insertBefore(), and moveNode().

See details >
January 08, 2019
KB4480975
Resolved
KB4493451
April 25, 2019
03:27 PM PT
Error 1309 when installing/uninstalling MSI or MSP files
Users may receive “Error 1309” while installing or uninstalling certain types of MSI and MSP files.

See details >
February 12, 2019
KB4487025
Resolved
KB4489891
April 25, 2019
03:36 PM PT
Embedded objects may display incorrectly
Any compound document (OLE) server application that places embedded objects into the Windows Metafile (WMF) using the PatBlt API may display embedded objects incorrectly.

See details >
February 12, 2019
KB4487025
Resolved
KB4493451
April 25, 2019
04:00 PM PT
First character of the Japanese era name not recognized as an abbreviation
The first character of the Japanese era name is not recognized as an abbreviation and may cause date parsing issues.

See details >
January 15, 2019
KB4480971
Resolved
KB4487024
April 25, 2019
04:02 PM PT
Applications using Microsoft Jet database and Access 95 file format stop working
Applications that use a Microsoft Jet database with the Microsoft Access 95 file format may randomly stop working.

See details >
February 12, 2019
KB4487025
Resolved
KB4487024
April 25, 2019
04:04 PM PT
" @@ -89,22 +89,22 @@ sections: - items: - type: markdown text: " - - - - - - - +
DetailsOriginating updateStatusHistory
Applications using Microsoft Jet database and Access 95 file format stop working
Applications that use a Microsoft Jet database with the Microsoft Access 95 file format may randomly stop working.

Resolution: This issue is resolved in KB4487024.

Back to top
February 12, 2019
KB4487025
Resolved
KB4487024
Resolved:
February 19, 2019
02:00 PM PT

Opened:
April 25, 2019
04:04 PM PT
First character of the Japanese era name not recognized as an abbreviation
After installing KB4480971, the first character of the Japanese era name is not recognized as an abbreviation and may cause date parsing issues.

Resolution: This issue is resolved in KB4487024.

Back to top
January 15, 2019
KB4480971
Resolved
KB4487024
Resolved:
February 19, 2019
02:00 PM PT

Opened:
April 25, 2019
04:01 PM PT
Embedded objects may display incorrectly
Any compound document (OLE) server application that places embedded objects into the Windows Metafile (WMF) using the PatBlt API may display embedded objects incorrectly.

For example, if you paste a Microsoft Excel worksheet object into a Microsoft Word document, the cells may render with a different background color.

Resolution: This issue is resolved in KB4493451.

Back to top
February 12, 2019
KB4487025
Resolved
KB4493451
Resolved:
April 09, 2019
10:00 AM PT

Opened:
April 25, 2019
04:00 PM PT
Certain operations performed on on a Cluster Shared Volume may fail
Certain operations, such as rename, that you perform on files or folders that are on a Cluster Shared Volume (CSV) may fail with the error, \"STATUS_BAD_IMPERSONATION_LEVEL (0xC00000A5)\". This occurs when you perform the operation on a CSV owner node from a process that doesn’t have administrator privilege.

Workaround: Do one of the following:

  • Perform the operation from a process that has administrator privilege.
  • Perform the operation from a node that doesn’t have CSV ownership.

Next steps: Microsoft is working on a resolution and will provide an update in an upcoming release.

Back to top
January 08, 2019
KB4480975
Mitigated
Last updated:
April 25, 2019
03:52 PM PT

Opened:
April 25, 2019
03:52 PM PT
System may be unresponsive after restart if Avira antivirus software installed
Microsoft and Avira have identified an issue on devices with Avira antivirus software installed that may cause the system to become unresponsive upon restart after installing KB4493451.

Microsoft has temporarily blocked devices from receiving this update if Avira antivirus software is installed.

Next steps: We are presently investigating this issue with Avira and will provide an update when available.

Back to top
April 09, 2019
KB4493451
Investigating
Last updated:
April 25, 2019
03:48 PM PT

Opened:
April 25, 2019
03:48 PM PT
System unresponsive after restart if Sophos Endpoint Protection installed
Microsoft and Sophos have identified an issue on devices with Sophos Endpoint Protection installed and managed by either Sophos Central or Sophos Enterprise Console (SEC) that may cause the system to become unresponsive upon restart after installing KB4493451.

Microsoft has temporarily blocked devices from receiving this update if the Sophos Endpoint is installed until a solution is available.

Guidance for Sophos Endpoint and Sophos Enterprise Console customers can be found in the Sophos support article.

Back to top
April 09, 2019
KB4493451
Mitigated
Last updated:
April 25, 2019
03:46 PM PT

Opened:
April 25, 2019
03:46 PM PT
+ - - - - - - - - +
Option 2:
Use the Windows Deployment Services UI to make the following adjustment:
  1. Open Windows Deployment Services from Windows Administrative Tools.
  2. Expand Servers and right-click a WDS server.
  3. Open its properties and clear the Enable Variable Window Extension box on the TFTP tab.
Option 3:
Set the following registry value to 0:
HKLM\\System\\CurrentControlSet\\Services\\WDSServer\\Providers\\WDSTFTP\\EnableVariableWindowExtension
Restart the WDSServer service after disabling the Variable Window Extension.

Next steps: Microsoft is working on a resolution and will provide an update in an upcoming release.

Back to top + + + + + + + + + + + + +
DetailsOriginating updateStatusHistory
System may be unresponsive after restart if Avira antivirus software installed
Microsoft and Avira have identified an issue on devices with Avira antivirus software installed that may cause the system to become unresponsive upon restart after installing KB4493451.

Microsoft has temporarily blocked devices from receiving this update if Avira antivirus software is installed.

Next steps: We are presently investigating this issue with Avira and will provide an update when available.

Back to top
April 09, 2019
KB4493451
Investigating
Last updated:
April 25, 2019
03:48 PM PT

Opened:
April 25, 2019
03:48 PM PT
Issue using PXE to start a device from WDS
After installing KB4489891, there may be issues using the Preboot Execution Environment (PXE) to start a device from a Windows Deployment Services (WDS) server configured to use Variable Window Extension. This may cause the connection to the WDS server to terminate prematurely while downloading the image. This issue does not affect clients or devices that are not using Variable Window Extension.

Workaround: To mitigate the issue, disable the Variable Window Extension on WDS server using one of the following options:
Option 1:
Open an Administrator Command prompt and type the following:
Wdsutil /Set-TransportServer /EnableTftpVariableWindowExtension:No
-
Option 2:
Use the Windows Deployment Services UI to make the following adjustment:
  1. Open Windows Deployment Services from Windows Administrative Tools.
  2. Expand Servers and right-click a WDS server.
  3. Open its properties and clear the Enable Variable Window Extension box on the TFTP tab.
Option 3:
Set the following registry value to 0:
HKLM\\System\\CurrentControlSet\\Services\\WDSServer\\Providers\\WDSTFTP\\EnableVariableWindowExtension
Restart the WDSServer service after disabling the Variable Window Extension.

Next steps: Microsoft is working on a resolution and will provide an update in an upcoming release.

Back to top
March 12, 2019
KB4489891
Mitigated
Last updated:
April 25, 2019
03:40 PM PT

Opened:
April 25, 2019
03:40 PM PT
Error 1309 when installing/uninstalling MSI or MSP files
After installing KB4487025, users may receive \"Error 1309\" while installing or uninstalling certain types of MSI and MSP files.

Resolution: This issue is resolved in KB4489891.

Back to top
February 12, 2019
KB4487025
Resolved
KB4489891
Resolved:
March 12, 2019
10:00 AM PT

Opened:
April 25, 2019
03:36 PM PT
Internet Explorer 11 authentication issue with multiple concurrent logons
After installing KB4480975, Internet Explorer 11 and other applications that use WININET.DLL may have authentication issues. This occurs when two or more people use the same user account for multiple, concurrent login sessions on the same Windows Server machine, including Remote Desktop Protocol (RDP) and Terminal Server logons. Symptoms reported by customers include, but may not be limited to:
  • Cache size and location show zero or empty.
  • Keyboard shortcuts may not work properly.
  • Webpages may intermittently fail to load or render correctly.
  • Issues with credential prompts.
  • Issues when downloading files.

Resolution: This issue is resolved in KB4493451.

Back to top
January 08, 2019
KB4480975
Resolved
KB4493451
Resolved:
April 09, 2019
10:00 AM PT

Opened:
April 25, 2019
03:34 PM PT
MSXML6 may cause applications to stop responding
After installing KB4480975, MSXML6 causes applications to stop responding if an exception was thrown during node operations, such as appendChild(), insertBefore(), and moveNode().

The Group Policy editor may stop responding when editing a Group Policy Object (GPO) that contains Group Policy Preferences (GPP) for Internet Explorer 10 settings.

Resolution: This issue is resolved in KB4493451.

Back to top
January 08, 2019
KB4480975
Resolved
KB4493451
Resolved:
April 09, 2019
10:00 AM PT

Opened:
April 25, 2019
03:27 PM PT
Virtual machines fail to restore
After installing KB4480975, virtual machines (VM) may fail to restore successfully if the VM has been saved and restored once before. The error message is, \"Failed to restore the virtual machine state: Cannot restore this virtual machine because the saved state data cannot be read. Delete the saved state data and then try to start the virtual machine. (0xC0370027).\"

This affects AMD Bulldozer Family 15h, AMD Jaguar Family 16h, and AMD Puma Family 16h (second generation) microarchitectures.

Resolution: This issue is resolved in KB4490516.

Back to top
January 08, 2019
KB4480975
Resolved
KB4490516
Resolved:
February 19, 2019
02:00 PM PT

Opened:
April 25, 2019
03:22 PM PT
Applications using Microsoft Jet database fail to open
Applications that use a Microsoft Jet database with the Microsoft Access 97 file format may fail to open if the database has column names greater than 32 characters. The database will fail to open with the error, \"Unrecognized Database Format\".

Resolution: This issue is resolved in KB4487025.

Back to top
January 08, 2019
KB4480975
Resolved
KB4487025
Resolved:
February 12, 2019
10:00 AM PT

Opened:
April 25, 2019
03:19 PM PT
Unable to access hotspots with third-party applications
After installing KB4480975, third-party applications may have difficulty authenticating hotspots.

Resolution: This issue is resolved in KB4480971.

Back to top
January 08, 2019
KB4480975
Resolved
KB4480971
Resolved:
January 15, 2019
10:00 AM PT

Opened:
April 25, 2019
03:14 PM PT
Event Viewer may not show some event descriptions for network interface cards
After installing KB4457135, the Event Viewer may not show some event descriptions for network interface cards (NICs).

Resolution: This issue is resolved in KB4489891.

Back to top
September 11, 2018
KB4457135
Resolved
KB4489891
Resolved:
March 12, 2019
10:00 AM PT

Opened:
April 25, 2019
03:10 PM PT
Unable to use Seek bar in Windows Media Player
After installing KB4462929, users may not be able to use the Seek Bar in Windows Media Player when playing specific files. This issue does not affect normal playback.

Resolution: This issue is resolved in KB4471330.

Back to top
October 09, 2018
KB4462929
Resolved
KB4471330
Resolved:
December 11, 2018
10:00 AM PT

Opened:
April 25, 2019
02:47 PM PT
March 12, 2019
KB4489891
Mitigated
Last updated:
April 25, 2019
03:40 PM PT

Opened:
April 25, 2019
03:40 PM PT
System unresponsive after restart if Sophos Endpoint Protection installed
Microsoft and Sophos have identified an issue on devices with Sophos Endpoint Protection installed and managed by either Sophos Central or Sophos Enterprise Console (SEC) that may cause the system to become unresponsive upon restart after installing KB4493451.

Microsoft has temporarily blocked devices from receiving this update if the Sophos Endpoint is installed until a solution is available.

Guidance for Sophos Endpoint and Sophos Enterprise Console customers can be found in the Sophos support article.

Back to top
April 09, 2019
KB4493451
Mitigated
Last updated:
April 25, 2019
03:46 PM PT

Opened:
April 25, 2019
03:46 PM PT
Certain operations performed on on a Cluster Shared Volume may fail
Certain operations, such as rename, that you perform on files or folders that are on a Cluster Shared Volume (CSV) may fail with the error, \"STATUS_BAD_IMPERSONATION_LEVEL (0xC00000A5)\". This occurs when you perform the operation on a CSV owner node from a process that doesn’t have administrator privilege.

Workaround: Do one of the following:

  • Perform the operation from a process that has administrator privilege.
  • Perform the operation from a node that doesn’t have CSV ownership.

Next steps: Microsoft is working on a resolution and will provide an update in an upcoming release.

Back to top
January 08, 2019
KB4480975
Mitigated
Last updated:
April 25, 2019
03:52 PM PT

Opened:
April 25, 2019
03:52 PM PT
Unable to use Seek bar in Windows Media Player
After installing KB4462929, users may not be able to use the Seek Bar in Windows Media Player when playing specific files. This issue does not affect normal playback.

Resolution: This issue is resolved in KB4471330.

Back to top
October 09, 2018
KB4462929
Resolved
KB4471330
Resolved:
December 11, 2018
10:00 AM PT

Opened:
April 25, 2019
02:47 PM PT
Event Viewer may not show some event descriptions for network interface cards
After installing KB4457135, the Event Viewer may not show some event descriptions for network interface cards (NICs).

Resolution: This issue is resolved in KB4489891.

Back to top
September 11, 2018
KB4457135
Resolved
KB4489891
Resolved:
March 12, 2019
10:00 AM PT

Opened:
April 25, 2019
03:10 PM PT
Unable to access hotspots with third-party applications
After installing KB4480975, third-party applications may have difficulty authenticating hotspots.

Resolution: This issue is resolved in KB4480971.

Back to top
January 08, 2019
KB4480975
Resolved
KB4480971
Resolved:
January 15, 2019
10:00 AM PT

Opened:
April 25, 2019
03:14 PM PT
Applications using Microsoft Jet database fail to open
Applications that use a Microsoft Jet database with the Microsoft Access 97 file format may fail to open if the database has column names greater than 32 characters. The database will fail to open with the error, \"Unrecognized Database Format\".

Resolution: This issue is resolved in KB4487025.

Back to top
January 08, 2019
KB4480975
Resolved
KB4487025
Resolved:
February 12, 2019
10:00 AM PT

Opened:
April 25, 2019
03:19 PM PT
Virtual machines fail to restore
After installing KB4480975, virtual machines (VM) may fail to restore successfully if the VM has been saved and restored once before. The error message is, \"Failed to restore the virtual machine state: Cannot restore this virtual machine because the saved state data cannot be read. Delete the saved state data and then try to start the virtual machine. (0xC0370027).\"

This affects AMD Bulldozer Family 15h, AMD Jaguar Family 16h, and AMD Puma Family 16h (second generation) microarchitectures.

Resolution: This issue is resolved in KB4490516.

Back to top
January 08, 2019
KB4480975
Resolved
KB4490516
Resolved:
February 19, 2019
02:00 PM PT

Opened:
April 25, 2019
03:22 PM PT
Internet Explorer 11 authentication issue with multiple concurrent logons
After installing KB4480975, Internet Explorer 11 and other applications that use WININET.DLL may have authentication issues. This occurs when two or more people use the same user account for multiple, concurrent login sessions on the same Windows Server machine, including Remote Desktop Protocol (RDP) and Terminal Server logons. Symptoms reported by customers include, but may not be limited to:
  • Cache size and location show zero or empty.
  • Keyboard shortcuts may not work properly.
  • Webpages may intermittently fail to load or render correctly.
  • Issues with credential prompts.
  • Issues when downloading files.

Resolution: This issue is resolved in KB4493451.

Back to top
January 08, 2019
KB4480975
Resolved
KB4493451
Resolved:
April 09, 2019
10:00 AM PT

Opened:
April 25, 2019
03:34 PM PT
MSXML6 may cause applications to stop responding
After installing KB4480975, MSXML6 causes applications to stop responding if an exception was thrown during node operations, such as appendChild(), insertBefore(), and moveNode().

The Group Policy editor may stop responding when editing a Group Policy Object (GPO) that contains Group Policy Preferences (GPP) for Internet Explorer 10 settings.

Resolution: This issue is resolved in KB4493451.

Back to top
January 08, 2019
KB4480975
Resolved
KB4493451
Resolved:
April 09, 2019
10:00 AM PT

Opened:
April 25, 2019
03:27 PM PT
Error 1309 when installing/uninstalling MSI or MSP files
After installing KB4487025, users may receive \"Error 1309\" while installing or uninstalling certain types of MSI and MSP files.

Resolution: This issue is resolved in KB4489891.

Back to top
February 12, 2019
KB4487025
Resolved
KB4489891
Resolved:
March 12, 2019
10:00 AM PT

Opened:
April 25, 2019
03:36 PM PT
Embedded objects may display incorrectly
Any compound document (OLE) server application that places embedded objects into the Windows Metafile (WMF) using the PatBlt API may display embedded objects incorrectly.

For example, if you paste a Microsoft Excel worksheet object into a Microsoft Word document, the cells may render with a different background color.

Resolution: This issue is resolved in KB4493451.

Back to top
February 12, 2019
KB4487025
Resolved
KB4493451
Resolved:
April 09, 2019
10:00 AM PT

Opened:
April 25, 2019
04:00 PM PT
First character of the Japanese era name not recognized as an abbreviation
After installing KB4480971, the first character of the Japanese era name is not recognized as an abbreviation and may cause date parsing issues.

Resolution: This issue is resolved in KB4487024.

Back to top
January 15, 2019
KB4480971
Resolved
KB4487024
Resolved:
February 19, 2019
02:00 PM PT

Opened:
April 25, 2019
04:01 PM PT
Applications using Microsoft Jet database and Access 95 file format stop working
Applications that use a Microsoft Jet database with the Microsoft Access 95 file format may randomly stop working.

Resolution: This issue is resolved in KB4487024.

Back to top
February 12, 2019
KB4487025
Resolved
KB4487024
Resolved:
February 19, 2019
02:00 PM PT

Opened:
April 25, 2019
04:04 PM PT
" diff --git a/windows/release-information/windows-message-center.yml b/windows/release-information/windows-message-center.yml index 349f7a88c1..1fb1e9a74c 100644 --- a/windows/release-information/windows-message-center.yml +++ b/windows/release-information/windows-message-center.yml @@ -48,7 +48,7 @@ sections: - items: - type: markdown text: " - +
MessageDate
- + diff --git a/windows/release-information/status-windows-10-1507.yml b/windows/release-information/status-windows-10-1507.yml index f7c75234a8..282ce48e19 100644 --- a/windows/release-information/status-windows-10-1507.yml +++ b/windows/release-information/status-windows-10-1507.yml @@ -77,7 +77,7 @@ sections: - type: markdown text: "
MessageDate
The benefits of Windows 10 Dynamic Update

Dynamic Update can help organizations and end users alike ensure that their Windows 10 devices have the latest feature update content (as part of an in-place upgrade)—and preserve precious features on demand (FODs) and language packs (LPs) that may have been previously installed.

From 3321d515326f8d2ab8b8f7b8c83ed880ce4bac7f Mon Sep 17 00:00:00 2001 From: "Nisha Mittal (Wipro Ltd.)" Date: Fri, 26 Apr 2019 01:19:18 -0700 Subject: [PATCH 219/724] Removed extra space --- .../resolved-issues-windows-10-1507.yml | 20 ++++----- .../resolved-issues-windows-10-1607.yml | 32 +++++++------- .../resolved-issues-windows-10-1703.yml | 26 +++++------ .../resolved-issues-windows-10-1709.yml | 26 +++++------ .../resolved-issues-windows-10-1803.yml | 36 +++++++-------- ...indows-10-1809-and-windows-server-2019.yml | 44 +++++++++---------- ...ndows-7-and-windows-server-2008-r2-sp1.yml | 24 +++++----- ...windows-8.1-and-windows-server-2012-r2.yml | 26 +++++------ ...esolved-issues-windows-server-2008-sp2.yml | 16 +++---- .../resolved-issues-windows-server-2012.yml | 22 +++++----- .../status-windows-10-1507.yml | 4 +- ...indows-10-1607-and-windows-server-2016.yml | 18 ++++---- .../status-windows-10-1703.yml | 6 +-- .../status-windows-10-1709.yml | 8 ++-- .../status-windows-10-1803.yml | 10 ++--- ...indows-10-1809-and-windows-server-2019.yml | 16 +++---- ...ndows-7-and-windows-server-2008-r2-sp1.yml | 20 ++++----- ...windows-8.1-and-windows-server-2012-r2.yml | 22 +++++----- .../status-windows-server-2008-sp2.yml | 22 +++++----- .../status-windows-server-2012.yml | 32 +++++++------- 20 files changed, 215 insertions(+), 215 deletions(-) diff --git a/windows/release-information/resolved-issues-windows-10-1507.yml b/windows/release-information/resolved-issues-windows-10-1507.yml index c48f75814a..2b6d4db63e 100644 --- a/windows/release-information/resolved-issues-windows-10-1507.yml +++ b/windows/release-information/resolved-issues-windows-10-1507.yml @@ -57,7 +57,7 @@ sections: - type: markdown text: " - +
DetailsOriginating updateStatusHistory
Custom URI schemes may not start corresponding application
After installing KB4489872, Custom URI Schemes for Application Protocol handlers may not start the corresponding application for local intranet and trusted sites on Internet Explorer.

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 8.1; Windows 7, Service Pack 1 
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2; Windows Server 2008 R2 SP1

Resolution: This issue was resolved in KB4493475.

Back to top
OS Build 10240.18158

March 12, 2019
KB4489872
Resolved
KB4493475
Resolved:
April 09, 2019
10:00 AM PT

Opened:
March 12, 2019
10:00 AM PT
Custom URI schemes may not start corresponding application
After installing KB4489872, Custom URI Schemes for Application Protocol handlers may not start the corresponding application for local intranet and trusted sites on Internet Explorer.
Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 8.1; Windows 7, Service Pack 1 
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2; Windows Server 2008 R2 SP1
Resolution: This issue was resolved in KB4493475.

Back to top
OS Build 10240.18158

March 12, 2019
KB4489872
Resolved
KB4493475
Resolved:
April 09, 2019
10:00 AM PT

Opened:
March 12, 2019
10:00 AM PT
" @@ -66,10 +66,10 @@ sections: - type: markdown text: " - - - - + + + +
DetailsOriginating updateStatusHistory
Applications using Microsoft Jet database and Access 95 file format stop working
Applications that use a Microsoft Jet database with the Microsoft Access 95 file format may randomly stop working.

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 7, Service Pack 1
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2008 R2 SP1

Resolution: This issue is resolved in KB4489872.

Back to top
OS Build 10240.18132

February 12, 2019
KB4487018
Resolved
KB4489872
Resolved:
March 12, 2019
10:00 AM PT

Opened:
February 12, 2019
10:00 AM PT
Internet Explorer may fail to load images
After installing KB4487018, Internet Explorer may fail to load images with a backslash (\\) in their relative source path.

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 8.1; Windows 7, Service Pack 1
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2; Windows Server 2008 R2 SP1

Resolution: This issue is resolved in KB4491101.

Back to top
OS Build 10240.18132

February 12, 2019
KB4487018
Resolved
KB4491101
Resolved:
February 21, 2019
02:00 PM PT

Opened:
February 12, 2019
10:00 AM PT
Error 1309 when installing/uninstalling MSI or MSP files
After installing KB4487018, users may receive “Error 1309” while installing or uninstalling certain types of MSI and MSP files.

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 8.1
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2

Resolution: This issue is resolved in KB4489872.

Back to top
OS Build 10240.18132

February 12, 2019
KB4487018
Resolved
KB4489872
Resolved:
March 12, 2019
10:00 AM PT

Opened:
February 12, 2019
10:00 AM PT
First character of Japanese era name not recognized
After installing KB4487018, the first character of the Japanese era name is not recognized as an abbreviation and may cause date parsing issues.

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 8.1; Windows 7, Service Pack 1
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2; Windows Server 2008 R2 SP1

Resolution: This issue is resolved in KB4489872.

Back to top
OS Build 10240.18132

February 12, 2019
KB4487018
Resolved
KB4489872
Resolved:
March 12, 2019
10:00 AM PT

Opened:
February 12, 2019
10:00 AM PT
Applications using Microsoft Jet database and Access 95 file format stop working
Applications that use a Microsoft Jet database with the Microsoft Access 95 file format may randomly stop working.
Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 7, Service Pack 1
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2008 R2 SP1
Resolution: This issue is resolved in KB4489872.

Back to top
OS Build 10240.18132

February 12, 2019
KB4487018
Resolved
KB4489872
Resolved:
March 12, 2019
10:00 AM PT

Opened:
February 12, 2019
10:00 AM PT
Internet Explorer may fail to load images
After installing KB4487018, Internet Explorer may fail to load images with a backslash (\\) in their relative source path.
Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 8.1; Windows 7, Service Pack 1
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2; Windows Server 2008 R2 SP1
Resolution: This issue is resolved in KB4491101.

Back to top
OS Build 10240.18132

February 12, 2019
KB4487018
Resolved
KB4491101
Resolved:
February 21, 2019
02:00 PM PT

Opened:
February 12, 2019
10:00 AM PT
Error 1309 when installing/uninstalling MSI or MSP files
After installing KB4487018, users may receive “Error 1309” while installing or uninstalling certain types of MSI and MSP files.
Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 8.1
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2
Resolution: This issue is resolved in KB4489872.

Back to top
OS Build 10240.18132

February 12, 2019
KB4487018
Resolved
KB4489872
Resolved:
March 12, 2019
10:00 AM PT

Opened:
February 12, 2019
10:00 AM PT
First character of Japanese era name not recognized
After installing KB4487018, the first character of the Japanese era name is not recognized as an abbreviation and may cause date parsing issues.
Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 8.1; Windows 7, Service Pack 1
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2; Windows Server 2008 R2 SP1
Resolution: This issue is resolved in KB4489872.

Back to top
OS Build 10240.18132

February 12, 2019
KB4487018
Resolved
KB4489872
Resolved:
March 12, 2019
10:00 AM PT

Opened:
February 12, 2019
10:00 AM PT
" @@ -78,9 +78,9 @@ sections: - type: markdown text: " - - - + + +
DetailsOriginating updateStatusHistory
Applications using Microsoft Jet database fail to open
Applications that use a Microsoft Jet database with the Microsoft Access 97 file format may fail to open if the database has column names greater than 32 characters. The database will fail to open with the error, \"Unrecognized Database Format\".

Affected platforms:
  • Client: Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 8.1; Windows 7, Service Pack 1
  • Server: Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2; Windows Server 2008 R2 SP1

Resolution: This issue is resolved in KB4487018.

Back to top
OS Build 10240.18094

January 08, 2019
KB4480962
Resolved
KB4487018
Resolved:
February 12, 2019
10:00 AM PT

Opened:
January 08, 2019
10:00 AM PT
MSXML6 may cause applications to stop responding
After installing KB4480962, MSXML6 causes applications to stop responding if an exception was thrown during node operations, such as appendChild(), insertBefore(), and moveNode().

The Group Policy editor may stop responding when editing a Group Policy Object (GPO) that contains Group Policy Preferences (GPP) for Internet Explorer 10 settings.

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 8.1
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2

Resolution: This issue was resolved in KB4493475.

Back to top
OS Build 10240.18094

January 08, 2019
KB4480962
Resolved
KB4493475
Resolved:
April 09, 2019
10:00 AM PT

Opened:
January 08, 2019
10:00 AM PT
Unable to access hotspots with third-party applications
After installing KB4480962, third-party applications may have difficulty authenticating hotspots.

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 8.1
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2

Resolution: This issue is resolved in KB4487018.

Back to top
OS Build 10240.18094

January 08, 2019
KB4480962
Resolved
KB4487018
Resolved:
February 12, 2019
10:00 AM PT

Opened:
January 08, 2019
10:00 AM PT
Applications using Microsoft Jet database fail to open
Applications that use a Microsoft Jet database with the Microsoft Access 97 file format may fail to open if the database has column names greater than 32 characters. The database will fail to open with the error, \"Unrecognized Database Format\".
Affected platforms:
  • Client: Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 8.1; Windows 7, Service Pack 1
  • Server: Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2; Windows Server 2008 R2 SP1
Resolution: This issue is resolved in KB4487018.

Back to top
OS Build 10240.18094

January 08, 2019
KB4480962
Resolved
KB4487018
Resolved:
February 12, 2019
10:00 AM PT

Opened:
January 08, 2019
10:00 AM PT
MSXML6 may cause applications to stop responding
After installing KB4480962, MSXML6 causes applications to stop responding if an exception was thrown during node operations, such as appendChild(), insertBefore(), and moveNode().
The Group Policy editor may stop responding when editing a Group Policy Object (GPO) that contains Group Policy Preferences (GPP) for Internet Explorer 10 settings.
Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 8.1
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2
Resolution: This issue was resolved in KB4493475.

Back to top
OS Build 10240.18094

January 08, 2019
KB4480962
Resolved
KB4493475
Resolved:
April 09, 2019
10:00 AM PT

Opened:
January 08, 2019
10:00 AM PT
Unable to access hotspots with third-party applications
After installing KB4480962, third-party applications may have difficulty authenticating hotspots.
Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 8.1
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2
Resolution: This issue is resolved in KB4487018.

Back to top
OS Build 10240.18094

January 08, 2019
KB4480962
Resolved
KB4487018
Resolved:
February 12, 2019
10:00 AM PT

Opened:
January 08, 2019
10:00 AM PT
" @@ -89,7 +89,7 @@ sections: - type: markdown text: " - +
DetailsOriginating updateStatusHistory
Unable to use Seek bar in Windows Media Player
After installing KB4462922, users may not be able to use the Seek Bar in Windows Media Player when playing specific files. This issue does not affect normal playback.

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 8.1; Windows 7, Service Pack 1
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2; Windows Server 2008 R2 SP1

Resolution: This issue is resolved in KB4471323.

Back to top
OS Build 10240.18005

October 09, 2018
KB4462922
Resolved
KB4471323
Resolved:
December 11, 2018
10:00 AM PT

Opened:
October 09, 2018
10:00 AM PT
Unable to use Seek bar in Windows Media Player
After installing KB4462922, users may not be able to use the Seek Bar in Windows Media Player when playing specific files. This issue does not affect normal playback.
Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 8.1; Windows 7, Service Pack 1
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2; Windows Server 2008 R2 SP1
Resolution: This issue is resolved in KB4471323.

Back to top
OS Build 10240.18005

October 09, 2018
KB4462922
Resolved
KB4471323
Resolved:
December 11, 2018
10:00 AM PT

Opened:
October 09, 2018
10:00 AM PT
" @@ -98,6 +98,6 @@ sections: - type: markdown text: " - +
DetailsOriginating updateStatusHistory
Guest VMs running Unicast NLB fail to respond after restart
All guest virtual machines running Unicast NLB fail to respond to NLB requests after the virtual machines restart.

Affected platforms:
  • Client: Windows 10, version 1803; Windows 10, version 1507
  • Server: Windows Server, version 1803

Resolution: This issue is resolved in KB4462922.

Back to top
OS Build 10240.17976

September 11, 2018
KB4457132
Resolved
KB4462922
Resolved:
October 09, 2018
10:00 AM PT

Opened:
September 11, 2018
10:00 AM PT
Guest VMs running Unicast NLB fail to respond after restart
All guest virtual machines running Unicast NLB fail to respond to NLB requests after the virtual machines restart.
Affected platforms:
  • Client: Windows 10, version 1803; Windows 10, version 1507
  • Server: Windows Server, version 1803
Resolution: This issue is resolved in KB4462922.

Back to top
OS Build 10240.17976

September 11, 2018
KB4457132
Resolved
KB4462922
Resolved:
October 09, 2018
10:00 AM PT

Opened:
September 11, 2018
10:00 AM PT
" diff --git a/windows/release-information/resolved-issues-windows-10-1607.yml b/windows/release-information/resolved-issues-windows-10-1607.yml index e02dd2e8ee..9f35c2ac6f 100644 --- a/windows/release-information/resolved-issues-windows-10-1607.yml +++ b/windows/release-information/resolved-issues-windows-10-1607.yml @@ -63,7 +63,7 @@ sections: - type: markdown text: " - +
DetailsOriginating updateStatusHistory
End-user-defined characters (EUDC) cause blue screen at startup
If you enable per font end-user-defined characters (EUDC), the system will stop working and a blue screen may appear at startup. This is not a common setting in non-Asian regions.

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016

Resolution: This issue was resolved in KB4493470.

Back to top
OS Build 14393.2879

March 19, 2019
KB4489889
Resolved
KB4493470
Resolved:
April 09, 2019
10:00 AM PT

Opened:
March 19, 2019
10:00 AM PT
End-user-defined characters (EUDC) cause blue screen at startup
If you enable per font end-user-defined characters (EUDC), the system will stop working and a blue screen may appear at startup. This is not a common setting in non-Asian regions.
Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016
Resolution: This issue was resolved in KB4493470.

Back to top
OS Build 14393.2879

March 19, 2019
KB4489889
Resolved
KB4493470
Resolved:
April 09, 2019
10:00 AM PT

Opened:
March 19, 2019
10:00 AM PT
" @@ -72,10 +72,10 @@ sections: - type: markdown text: " - - - - + + + +
DetailsOriginating updateStatusHistory
Applications using Microsoft Jet database and Access 95 file format stop working
Applications that use a Microsoft Jet database with the Microsoft Access 95 file format may randomly stop working.

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 7, Service Pack 1
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2008 R2 SP1

Resolution: This issue is resolved in KB4487006.

Back to top
OS Build 14393.2791

February 12, 2019
KB4487026
Resolved
KB4487006
Resolved:
February 19, 2019
02:00 PM PT

Opened:
February 12, 2019
10:00 AM PT
Internet Explorer may fail to load images
After installing KB4487026, Internet Explorer may fail to load images with a backslash (\\) in their relative source path.

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 8.1; Windows 7, Service Pack 1
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2; Windows Server 2008 R2 SP1

Resolution: This issue is resolved in KB4487006.

Back to top
OS Build 14393.2791

February 12, 2019
KB4487026
Resolved
KB4487006
Resolved:
February 19, 2019
02:00 PM PT

Opened:
February 12, 2019
10:00 AM PT
Issue hosting multiple terminal server sessions and a user logs off on Windows Server
In some cases, Windows Server will stop working and restart when hosting multiple terminal server sessions and a user logs off. The faulting driver is win32kbase.sys.

Affected platforms:
  • Client: Windows 10 Enterprise LTSC 2016
  • Server: Windows Server 2016

Resolution: This issue is resolved in KB4489882.

Back to top
OS Build 14393.2828

February 19, 2019
KB4487006
Resolved
KB4489882
Resolved:
March 12, 2019
10:00 AM PT

Opened:
February 19, 2019
02:00 PM PT
Error 1309 when installing/uninstalling MSI or MSP files
After installing KB4487026, users may receive “Error 1309” while installing or uninstalling certain types of MSI and MSP files.

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 8.1
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2

Resolution: This issue is resolved in KB4489882.

Back to top
OS Build 14393.2791

February 12, 2019
KB4487026
Resolved
KB4489882
Resolved:
March 12, 2019
10:00 AM PT

Opened:
February 12, 2019
10:00 AM PT
Applications using Microsoft Jet database and Access 95 file format stop working
Applications that use a Microsoft Jet database with the Microsoft Access 95 file format may randomly stop working.
Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 7, Service Pack 1
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2008 R2 SP1
Resolution: This issue is resolved in KB4487006.

Back to top
OS Build 14393.2791

February 12, 2019
KB4487026
Resolved
KB4487006
Resolved:
February 19, 2019
02:00 PM PT

Opened:
February 12, 2019
10:00 AM PT
Internet Explorer may fail to load images
After installing KB4487026, Internet Explorer may fail to load images with a backslash (\\) in their relative source path.
Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 8.1; Windows 7, Service Pack 1
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2; Windows Server 2008 R2 SP1
Resolution: This issue is resolved in KB4487006.

Back to top
OS Build 14393.2791

February 12, 2019
KB4487026
Resolved
KB4487006
Resolved:
February 19, 2019
02:00 PM PT

Opened:
February 12, 2019
10:00 AM PT
Issue hosting multiple terminal server sessions and a user logs off on Windows Server
In some cases, Windows Server will stop working and restart when hosting multiple terminal server sessions and a user logs off. The faulting driver is win32kbase.sys.
Affected platforms:
  • Client: Windows 10 Enterprise LTSC 2016
  • Server: Windows Server 2016
Resolution: This issue is resolved in KB4489882.

Back to top
OS Build 14393.2828

February 19, 2019
KB4487006
Resolved
KB4489882
Resolved:
March 12, 2019
10:00 AM PT

Opened:
February 19, 2019
02:00 PM PT
Error 1309 when installing/uninstalling MSI or MSP files
After installing KB4487026, users may receive “Error 1309” while installing or uninstalling certain types of MSI and MSP files.
Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 8.1
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2
Resolution: This issue is resolved in KB4489882.

Back to top
OS Build 14393.2791

February 12, 2019
KB4487026
Resolved
KB4489882
Resolved:
March 12, 2019
10:00 AM PT

Opened:
February 12, 2019
10:00 AM PT
" @@ -84,11 +84,11 @@ sections: - type: markdown text: " - - - - - + + + + +
DetailsOriginating updateStatusHistory
Applications using Microsoft Jet database fail to open
Applications that use a Microsoft Jet database with the Microsoft Access 97 file format may fail to open if the database has column names greater than 32 characters. The database will fail to open with the error, “Unrecognized Database Format”.

Affected platforms:
  • Client: Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 8.1; Windows 7, Service Pack 1 
  • Server: Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2; Windows Server 2008 R2 SP1 

Resolution: This issue is resolved in KB4487026.

Back to top
OS Build 14393.2724

January 08, 2019
KB4480961
Resolved
KB4487026
Resolved:
February 12, 2019
10:00 AM PT

Opened:
January 08, 2019
10:00 AM PT
First character of the Japanese era name not recognized as an abbreviation
After installing KB4480977, the first character of the Japanese era name is not recognized as an abbreviation and may cause date parsing issues.

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 8.1; Windows 7, Service Pack 1
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2; Windows Server 2008 R2 SP1

Resolution: This issue is resolved in KB4487006.

Back to top
OS Build 14393.2759

January 17, 2019
KB4480977
Resolved
KB4487006
Resolved:
February 19, 2019
02:00 PM PT

Opened:
January 17, 2019
02:00 PM PT
Internet Explorer 11 authentication issue with multiple concurrent logons
After installing KB4480961, Internet Explorer 11 and other applications that use WININET.DLL may have authentication issues. This occurs when two or more people use the same user account for multiple, concurrent login sessions on the same Windows Server machine, including Remote Desktop Protocol (RDP) and Terminal Server logons. Symptoms reported by customers include, but may not be limited to:
  • Cache size and location show zero or empty.
  • Keyboard shortcuts may not work properly.
  • Webpages may intermittently fail to load or render correctly.
  • Issues with credential prompts.
  • Issues when downloading files.

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10 Enterprise LTSC 2016; Windows 8.1; Windows 7, Service Pack 1
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server 2016; Windows Server 2012 R2; Windows Server 2008 R2 SP1

Resolution: This issue was resolved in KB4493470.

Back to top
OS Build 14393.2724

January 08, 2019
KB4480961
Resolved
KB4493470
Resolved:
April 09, 2019
10:00 AM PT

Opened:
January 08, 2019
10:00 AM PT
MSXML6 may cause applications to stop responding
After installing KB4480961, MSXML6 causes applications to stop responding if an exception was thrown during node operations, such as appendChild(), insertBefore(), and moveNode().

The Group Policy editor may stop responding when editing a Group Policy Object (GPO) that contains Group Policy Preferences (GPP) for Internet Explorer 10 settings.

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 8.1
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2

Resolution: This issue was resolved in KB4493470.

Back to top
OS Build 14393.2724

January 08, 2019
KB4480961
Resolved
KB4493470
Resolved:
April 09, 2019
10:00 AM PT

Opened:
January 08, 2019
10:00 AM PT
Unable to access hotspots with third-party applications
After installing KB4480961, third-party applications may have difficulty authenticating hotspots.

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 8.1
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2

Resolution: This issue is resolved in KB4480977.

Back to top
OS Build 14393.2724

January 08, 2019
KB4480961
Resolved
KB4480977
Resolved:
January 17, 2019
02:00 PM PT

Opened:
January 08, 2019
10:00 AM PT
Applications using Microsoft Jet database fail to open
Applications that use a Microsoft Jet database with the Microsoft Access 97 file format may fail to open if the database has column names greater than 32 characters. The database will fail to open with the error, “Unrecognized Database Format”.
Affected platforms:
  • Client: Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 8.1; Windows 7, Service Pack 1 
  • Server: Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2; Windows Server 2008 R2 SP1 
Resolution: This issue is resolved in KB4487026.

Back to top
OS Build 14393.2724

January 08, 2019
KB4480961
Resolved
KB4487026
Resolved:
February 12, 2019
10:00 AM PT

Opened:
January 08, 2019
10:00 AM PT
First character of the Japanese era name not recognized as an abbreviation
After installing KB4480977, the first character of the Japanese era name is not recognized as an abbreviation and may cause date parsing issues.
Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 8.1; Windows 7, Service Pack 1
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2; Windows Server 2008 R2 SP1
Resolution: This issue is resolved in KB4487006.

Back to top
OS Build 14393.2759

January 17, 2019
KB4480977
Resolved
KB4487006
Resolved:
February 19, 2019
02:00 PM PT

Opened:
January 17, 2019
02:00 PM PT
Internet Explorer 11 authentication issue with multiple concurrent logons
After installing KB4480961, Internet Explorer 11 and other applications that use WININET.DLL may have authentication issues. This occurs when two or more people use the same user account for multiple, concurrent login sessions on the same Windows Server machine, including Remote Desktop Protocol (RDP) and Terminal Server logons. Symptoms reported by customers include, but may not be limited to:
  • Cache size and location show zero or empty.
  • Keyboard shortcuts may not work properly.
  • Webpages may intermittently fail to load or render correctly.
  • Issues with credential prompts.
  • Issues when downloading files.
Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10 Enterprise LTSC 2016; Windows 8.1; Windows 7, Service Pack 1
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server 2016; Windows Server 2012 R2; Windows Server 2008 R2 SP1
Resolution: This issue was resolved in KB4493470.

Back to top
OS Build 14393.2724

January 08, 2019
KB4480961
Resolved
KB4493470
Resolved:
April 09, 2019
10:00 AM PT

Opened:
January 08, 2019
10:00 AM PT
MSXML6 may cause applications to stop responding
After installing KB4480961, MSXML6 causes applications to stop responding if an exception was thrown during node operations, such as appendChild(), insertBefore(), and moveNode().
The Group Policy editor may stop responding when editing a Group Policy Object (GPO) that contains Group Policy Preferences (GPP) for Internet Explorer 10 settings.
Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 8.1
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2
Resolution: This issue was resolved in KB4493470.

Back to top
OS Build 14393.2724

January 08, 2019
KB4480961
Resolved
KB4493470
Resolved:
April 09, 2019
10:00 AM PT

Opened:
January 08, 2019
10:00 AM PT
Unable to access hotspots with third-party applications
After installing KB4480961, third-party applications may have difficulty authenticating hotspots.
Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 8.1
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2
Resolution: This issue is resolved in KB4480977.

Back to top
OS Build 14393.2724

January 08, 2019
KB4480961
Resolved
KB4480977
Resolved:
January 17, 2019
02:00 PM PT

Opened:
January 08, 2019
10:00 AM PT
" @@ -97,8 +97,8 @@ sections: - type: markdown text: " - - + +
DetailsOriginating updateStatusHistory
Instant search in Microsoft Outlook fails on Windows Server 2016
After installing KB4467684 on Windows Server 2016, instant search in Microsoft Outlook clients fail with the error, \"Outlook cannot perform the search\".

Affected platforms:
  • Client: Windows 10 Enterprise LTSC 2016
  • Server: Windows Server 2016

Resolution: This issue is resolved in KB4487026.

Back to top
OS Build 14393.2639

November 27, 2018
KB4467684
Resolved
KB4487026
Resolved:
February 12, 2019
10:00 AM PT

Opened:
November 27, 2018
10:00 AM PT
System becomes unresponsive when end-user-defined characters (EUDC) are used
When features related to end-user-defined characters (EUDC) are used, the entire system may become unresponsive. 

Affected platforms:
  • Client: Windows 10 Enterprise LTSC 2016
  • Server: Windows Server 2016
 
Resolution: This issue is resolved in KB4471321

Back to top
OS Build 14393.2639

November 27, 2018
KB4467684
Resolved
KB4471321
Resolved:
December 11, 2018
10:00 AM PT

Opened:
November 27, 2018
10:00 AM PT
Instant search in Microsoft Outlook fails on Windows Server 2016
After installing KB4467684 on Windows Server 2016, instant search in Microsoft Outlook clients fail with the error, \"Outlook cannot perform the search\".
Affected platforms:
  • Client: Windows 10 Enterprise LTSC 2016
  • Server: Windows Server 2016
Resolution: This issue is resolved in KB4487026.

Back to top
OS Build 14393.2639

November 27, 2018
KB4467684
Resolved
KB4487026
Resolved:
February 12, 2019
10:00 AM PT

Opened:
November 27, 2018
10:00 AM PT
System becomes unresponsive when end-user-defined characters (EUDC) are used
When features related to end-user-defined characters (EUDC) are used, the entire system may become unresponsive. 
Affected platforms:
  • Client: Windows 10 Enterprise LTSC 2016
  • Server: Windows Server 2016
 
Resolution: This issue is resolved in KB4471321

Back to top
OS Build 14393.2639

November 27, 2018
KB4467684
Resolved
KB4471321
Resolved:
December 11, 2018
10:00 AM PT

Opened:
November 27, 2018
10:00 AM PT
" @@ -107,7 +107,7 @@ sections: - type: markdown text: " - +
DetailsOriginating updateStatusHistory
Unable to use Seek bar in Windows Media Player
After installing KB4462917, users may not be able to use the Seek Bar in Windows Media Player when playing specific files. This issue does not affect normal playback.

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 8.1; Windows 7, Service Pack 1
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2; Windows Server 2008 R2 SP1

Resolution: This issue is resolved in KB4471321.

Back to top
OS Build 14393.2551

October 09, 2018
KB4462917
Resolved
KB4471321
Resolved:
December 11, 2018
10:00 AM PT

Opened:
October 09, 2018
10:00 AM PT
Unable to use Seek bar in Windows Media Player
After installing KB4462917, users may not be able to use the Seek Bar in Windows Media Player when playing specific files. This issue does not affect normal playback.
Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 8.1; Windows 7, Service Pack 1
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2; Windows Server 2008 R2 SP1
Resolution: This issue is resolved in KB4471321.

Back to top
OS Build 14393.2551

October 09, 2018
KB4462917
Resolved
KB4471321
Resolved:
December 11, 2018
10:00 AM PT

Opened:
October 09, 2018
10:00 AM PT
" @@ -116,7 +116,7 @@ sections: - type: markdown text: " - +
DetailsOriginating updateStatusHistory
Promotions that create non-root domains fail with optional features enabled
After installing KB4457127, Windows Server 2016 promotions that create non-root domains fail in forests in which optional features like Active Directory recycle have been enabled. The error is, “The replication operation encountered a database error.”

Affected platforms:
  • Client: Windows 10 Enterprise LTSC 2016
  • Server: Windows Server 2016

Resolution: This issue is resolved in KB4467684.

Back to top
OS Build 14393.2515

September 20, 2018
KB4457127
Resolved
KB4467684
Resolved:
November 27, 2018
10:00 AM PT

Opened:
September 20, 2018
10:00 AM PT
Promotions that create non-root domains fail with optional features enabled
After installing KB4457127, Windows Server 2016 promotions that create non-root domains fail in forests in which optional features like Active Directory recycle have been enabled. The error is, “The replication operation encountered a database error.”
Affected platforms:
  • Client: Windows 10 Enterprise LTSC 2016
  • Server: Windows Server 2016
Resolution: This issue is resolved in KB4467684.

Back to top
OS Build 14393.2515

September 20, 2018
KB4457127
Resolved
KB4467684
Resolved:
November 27, 2018
10:00 AM PT

Opened:
September 20, 2018
10:00 AM PT
" @@ -125,7 +125,7 @@ sections: - type: markdown text: " - - + +
DetailsOriginating updateStatusHistory
Issues with install and activation of Key Management Service (KMS) (CSVLK) host keys
After installing KB4343884, installation and client activation of Windows Server 2019 and Windows 10 Enterprise 2019 LTSC Key Management Service (KMS) CSVLK host keys do not work as expected.

Affected platforms:
  • Client: Windows 10 Enterprise LTSC 2016
  • Server: Windows Server 2016

Resolution: This issue is resolved in KB4467684.

Back to top
OS Build 14393.2457

August 30, 2018
KB4343884
Resolved
KB4467684
Resolved:
November 27, 2018
10:00 AM PT

Opened:
August 30, 2018
05:00 PM PT
SqlConnection instantiation exception on .NET 4.6 and later
After you install the August Preview of Quality Rollup or September 11, 2018 .NET Framework update, instantiation of SqlConnection can throw an exception.

For more information about this issue, see the following article in the Microsoft Knowledge Base: 4470809, SqlConnection instantiation exception on .NET 4.6 and later after August-September 2018 .NET Framework updates.

Affected platforms:
  • Client: Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016
  • Server: Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016

Resolution: This issue is resolved in KB4480977.

Back to top
OS Build 14393.2457

August 30, 2018
KB4343884
Resolved
KB4480977
Resolved:
January 17, 2019
02:00 PM PT

Opened:
August 30, 2018
05:00 PM PT
Issues with install and activation of Key Management Service (KMS) (CSVLK) host keys
After installing KB4343884, installation and client activation of Windows Server 2019 and Windows 10 Enterprise 2019 LTSC Key Management Service (KMS) CSVLK host keys do not work as expected.
Affected platforms:
  • Client: Windows 10 Enterprise LTSC 2016
  • Server: Windows Server 2016
Resolution: This issue is resolved in KB4467684.

Back to top
OS Build 14393.2457

August 30, 2018
KB4343884
Resolved
KB4467684
Resolved:
November 27, 2018
10:00 AM PT

Opened:
August 30, 2018
05:00 PM PT
SqlConnection instantiation exception on .NET 4.6 and later
After you install the August Preview of Quality Rollup or September 11, 2018 .NET Framework update, instantiation of SqlConnection can throw an exception.
For more information about this issue, see the following article in the Microsoft Knowledge Base: 4470809, SqlConnection instantiation exception on .NET 4.6 and later after August-September 2018 .NET Framework updates.
Affected platforms:
  • Client: Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016
  • Server: Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016
Resolution: This issue is resolved in KB4480977.

Back to top
OS Build 14393.2457

August 30, 2018
KB4343884
Resolved
KB4480977
Resolved:
January 17, 2019
02:00 PM PT

Opened:
August 30, 2018
05:00 PM PT
" diff --git a/windows/release-information/resolved-issues-windows-10-1703.yml b/windows/release-information/resolved-issues-windows-10-1703.yml index efa136c4a0..98096e781d 100644 --- a/windows/release-information/resolved-issues-windows-10-1703.yml +++ b/windows/release-information/resolved-issues-windows-10-1703.yml @@ -60,7 +60,7 @@ sections: - type: markdown text: " - +
DetailsOriginating updateStatusHistory
End-user-defined characters (EUDC) may cause blue screen at startup
If you enable per font end-user-defined characters (EUDC), the system may stop working and a blue screen may appear at startup. This is not a common setting in non-Asian regions.

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016

Resolution: This issue was resolved in KB4493474.

Back to top
OS Build 15063.1716

March 19, 2019
KB4489888
Resolved
KB4493474
Resolved:
April 09, 2019
10:00 AM PT

Opened:
March 19, 2019
10:00 AM PT
End-user-defined characters (EUDC) may cause blue screen at startup
If you enable per font end-user-defined characters (EUDC), the system may stop working and a blue screen may appear at startup. This is not a common setting in non-Asian regions.
Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016
Resolution: This issue was resolved in KB4493474.

Back to top
OS Build 15063.1716

March 19, 2019
KB4489888
Resolved
KB4493474
Resolved:
April 09, 2019
10:00 AM PT

Opened:
March 19, 2019
10:00 AM PT
" @@ -69,9 +69,9 @@ sections: - type: markdown text: " - - - + + +
DetailsOriginating updateStatusHistory
Applications using Microsoft Jet database and Access 95 file format stop working
Applications that use a Microsoft Jet database with the Microsoft Access 95 file format may randomly stop working.

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 7, Service Pack 1
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2008 R2 SP1

Resolution: This issue is resolved in KB4487011.

Back to top
OS Build 15063.1631

February 12, 2019
KB4487020
Resolved
KB4487011
Resolved:
February 19, 2019
02:00 PM PT

Opened:
February 12, 2019
10:00 AM PT
Error 1309 when installing/uninstalling MSI or MSP files
After installing KB4487011, users may receive “Error 1309” while installing or uninstalling certain types of MSI and MSP files.

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 8.1
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2

Resolution: This issue is resolved in KB4489871.

Back to top
OS Build 15063.1659

February 19, 2019
KB4487011
Resolved
KB4489871
Resolved:
March 12, 2019
10:00 AM PT

Opened:
February 19, 2019
02:00 PM PT
Internet Explorer may fail to load images
After installing KB4487020, Internet Explorer may fail to load images with a backslash (\\) in their relative source path.

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 8.1; Windows 7, Service Pack 1
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2; Windows Server 2008 R2 SP1

Resolution: This issue is resolved in KB4487011.

Back to top
OS Build 15063.1631

February 12, 2019
KB4487020
Resolved
KB4487011
Resolved:
February 19, 2019
02:00 PM PT

Opened:
February 12, 2019
10:00 AM PT
Applications using Microsoft Jet database and Access 95 file format stop working
Applications that use a Microsoft Jet database with the Microsoft Access 95 file format may randomly stop working.
Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 7, Service Pack 1
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2008 R2 SP1
Resolution: This issue is resolved in KB4487011.

Back to top
OS Build 15063.1631

February 12, 2019
KB4487020
Resolved
KB4487011
Resolved:
February 19, 2019
02:00 PM PT

Opened:
February 12, 2019
10:00 AM PT
Error 1309 when installing/uninstalling MSI or MSP files
After installing KB4487011, users may receive “Error 1309” while installing or uninstalling certain types of MSI and MSP files.
Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 8.1
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2
Resolution: This issue is resolved in KB4489871.

Back to top
OS Build 15063.1659

February 19, 2019
KB4487011
Resolved
KB4489871
Resolved:
March 12, 2019
10:00 AM PT

Opened:
February 19, 2019
02:00 PM PT
Internet Explorer may fail to load images
After installing KB4487020, Internet Explorer may fail to load images with a backslash (\\) in their relative source path.
Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 8.1; Windows 7, Service Pack 1
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2; Windows Server 2008 R2 SP1
Resolution: This issue is resolved in KB4487011.

Back to top
OS Build 15063.1631

February 12, 2019
KB4487020
Resolved
KB4487011
Resolved:
February 19, 2019
02:00 PM PT

Opened:
February 12, 2019
10:00 AM PT
" @@ -80,11 +80,11 @@ sections: - type: markdown text: " - - - - - + + + + +
DetailsOriginating updateStatusHistory
Applications using Microsoft Jet database fail to open
Applications that use a Microsoft Jet database with the Microsoft Access 97 file format may fail to open if the database has column names greater than 32 characters. The database will fail to open with the error, “Unrecognized Database Format”.

Affected platforms:
  • Client: Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 8.1; Windows 7, Service Pack 1 
  • Server: Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2; Windows Server 2008 R2 SP1

Resolution: This issue is resolved in KB4487020.

Back to top
OS Build 15063.1563

January 08, 2019
KB4480973
Resolved
KB4487020
Resolved:
February 12, 2019
10:00 AM PT

Opened:
January 08, 2019
10:00 AM PT
First character of the Japanese era name not recognized as an abbreviation
After installing KB4480959, the first character of the Japanese era name is not recognized as an abbreviation and may cause date parsing issues.

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 8.1; Windows 7, Service Pack 1
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2; Windows Server 2008 R2 SP1

Resolution: This issue is resolved in KB4487011.

Back to top
OS Build 15063.1596

January 15, 2019
KB4480959
Resolved
KB4487011
Resolved:
February 19, 2019
02:00 PM PT

Opened:
January 15, 2019
10:00 AM PT
MSXML6 may cause applications to stop responding
After installing KB4480973, MSXML6 causes applications to stop responding if an exception was thrown during node operations, such as appendChild(), insertBefore(), and moveNode().

The Group Policy editor may stop responding when editing a Group Policy Object (GPO) that contains Group Policy Preferences (GPP) for Internet Explorer 10 settings.

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 8.1
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2

Resolution: This issue was resolved in KB4493474.

Back to top
OS Build 15063.1563

January 08, 2019
KB4480973
Resolved
KB4493474
Resolved:
April 09, 2019
10:00 AM PT

Opened:
January 08, 2019
10:00 AM PT
Unable to access hotspots with third-party applications
After installing KB4480973, third-party applications may have difficulty authenticating hotspots.

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 8.1
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2

Resolution: This issue is resolved in KB4480959.

Back to top
OS Build 15063.1563

January 08, 2019
KB4480973
Resolved
KB4480959
Resolved:
January 15, 2019
10:00 AM PT

Opened:
January 08, 2019
10:00 AM PT
Webpages become unresponsive in Microsoft Edge
After installing KB4480973, some Microsoft Edge users report that they:
  • Cannot load webpages using a local IP address.
  • Cannot load webpages on the Internet using a VPN connection.
Browsing fails or the webpage may become unresponsive.

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709

Resolution: This issue is resolved in KB4487020.

Back to top
OS Build 15063.1563

January 08, 2019
KB4480973
Resolved
KB4487020
Resolved:
February 12, 2019
10:00 AM PT

Opened:
January 08, 2019
10:00 AM PT
Applications using Microsoft Jet database fail to open
Applications that use a Microsoft Jet database with the Microsoft Access 97 file format may fail to open if the database has column names greater than 32 characters. The database will fail to open with the error, “Unrecognized Database Format”.
Affected platforms:
  • Client: Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 8.1; Windows 7, Service Pack 1 
  • Server: Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2; Windows Server 2008 R2 SP1
Resolution: This issue is resolved in KB4487020.

Back to top
OS Build 15063.1563

January 08, 2019
KB4480973
Resolved
KB4487020
Resolved:
February 12, 2019
10:00 AM PT

Opened:
January 08, 2019
10:00 AM PT
First character of the Japanese era name not recognized as an abbreviation
After installing KB4480959, the first character of the Japanese era name is not recognized as an abbreviation and may cause date parsing issues.
Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 8.1; Windows 7, Service Pack 1
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2; Windows Server 2008 R2 SP1
Resolution: This issue is resolved in KB4487011.

Back to top
OS Build 15063.1596

January 15, 2019
KB4480959
Resolved
KB4487011
Resolved:
February 19, 2019
02:00 PM PT

Opened:
January 15, 2019
10:00 AM PT
MSXML6 may cause applications to stop responding
After installing KB4480973, MSXML6 causes applications to stop responding if an exception was thrown during node operations, such as appendChild(), insertBefore(), and moveNode().
The Group Policy editor may stop responding when editing a Group Policy Object (GPO) that contains Group Policy Preferences (GPP) for Internet Explorer 10 settings.
Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 8.1
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2
Resolution: This issue was resolved in KB4493474.

Back to top
OS Build 15063.1563

January 08, 2019
KB4480973
Resolved
KB4493474
Resolved:
April 09, 2019
10:00 AM PT

Opened:
January 08, 2019
10:00 AM PT
Unable to access hotspots with third-party applications
After installing KB4480973, third-party applications may have difficulty authenticating hotspots.
Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 8.1
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2
Resolution: This issue is resolved in KB4480959.

Back to top
OS Build 15063.1563

January 08, 2019
KB4480973
Resolved
KB4480959
Resolved:
January 15, 2019
10:00 AM PT

Opened:
January 08, 2019
10:00 AM PT
Webpages become unresponsive in Microsoft Edge
After installing KB4480973, some Microsoft Edge users report that they:
  • Cannot load webpages using a local IP address.
  • Cannot load webpages on the Internet using a VPN connection.
Browsing fails or the webpage may become unresponsive.
Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709
Resolution: This issue is resolved in KB4487020.

Back to top
OS Build 15063.1563

January 08, 2019
KB4480973
Resolved
KB4487020
Resolved:
February 12, 2019
10:00 AM PT

Opened:
January 08, 2019
10:00 AM PT
" @@ -93,9 +93,9 @@ sections: - type: markdown text: " - - - + + +
DetailsOriginating updateStatusHistory
Error message beginning with “Hosted by…” when launching Microsoft Edge
After installing KB4462937, some users may see a dialog box with a non-applicable message beginning with the words “Hosted by...” when first starting Microsoft Edge.

This dialog will only appear once if they have turned on “Block only third-party cookies” in Microsoft Edge and applied certain language packs before installing this update.

Affected platforms:
  • Client: Windows 10, version 1709; Windows 10, version 1703
  • Server: Windows Server, version 1709

Resolution: This issue is resolved in KB4462939.

Back to top
OS Build 15063.1387

October 09, 2018
KB4462937
Resolved
KB4462939
Resolved:
October 18, 2018
10:00 AM PT

Opened:
October 09, 2018
10:00 AM PT
LongonUI.exe stops working intermittently
After installing KB4462937, LogonUI.exe stops working intermittently.

Affected platforms:
  • Windows 10, version 1703

Resolution: This issue is resolved in KB4467699.

Back to top
OS Build 15063.1387

October 09, 2018
KB4462937
Resolved
KB4467699
Resolved:
November 27, 2018
10:00 AM PT

Opened:
October 09, 2018
10:00 AM PT
Unable to use Seek bar in Windows Media Player
After installing KB4462937, users may not be able to use the Seek Bar in Windows Media Player when playing specific files. This issue does not affect normal playback.

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 8.1; Windows 7, Service Pack 1
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2; Windows Server 2008 R2 SP1

Resolution: This issue is resolved in KB4471327.

Back to top
OS Build 15063.1387

October 09, 2018
KB4462937
Resolved
KB4471327
Resolved:
December 11, 2018
10:00 AM PT

Opened:
October 09, 2018
10:00 AM PT
Error message beginning with “Hosted by…” when launching Microsoft Edge
After installing KB4462937, some users may see a dialog box with a non-applicable message beginning with the words “Hosted by...” when first starting Microsoft Edge.
This dialog will only appear once if they have turned on “Block only third-party cookies” in Microsoft Edge and applied certain language packs before installing this update.
Affected platforms:
  • Client: Windows 10, version 1709; Windows 10, version 1703
  • Server: Windows Server, version 1709
Resolution: This issue is resolved in KB4462939.

Back to top
OS Build 15063.1387

October 09, 2018
KB4462937
Resolved
KB4462939
Resolved:
October 18, 2018
10:00 AM PT

Opened:
October 09, 2018
10:00 AM PT
LongonUI.exe stops working intermittently
After installing KB4462937, LogonUI.exe stops working intermittently.
Affected platforms:
  • Windows 10, version 1703
Resolution: This issue is resolved in KB4467699.

Back to top
OS Build 15063.1387

October 09, 2018
KB4462937
Resolved
KB4467699
Resolved:
November 27, 2018
10:00 AM PT

Opened:
October 09, 2018
10:00 AM PT
Unable to use Seek bar in Windows Media Player
After installing KB4462937, users may not be able to use the Seek Bar in Windows Media Player when playing specific files. This issue does not affect normal playback.
Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 8.1; Windows 7, Service Pack 1
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2; Windows Server 2008 R2 SP1
Resolution: This issue is resolved in KB4471327.

Back to top
OS Build 15063.1387

October 09, 2018
KB4462937
Resolved
KB4471327
Resolved:
December 11, 2018
10:00 AM PT

Opened:
October 09, 2018
10:00 AM PT
" @@ -104,6 +104,6 @@ sections: - type: markdown text: " - +
DetailsOriginating updateStatusHistory
SqlConnection instantiation exception on .NET 4.6 and later
After you install the August Preview of Quality Rollup or September 11, 2018 .NET Framework update, instantiation of SqlConnection can throw an exception.

For more information about this issue, see the following article in the Microsoft Knowledge Base:
4470809 SqlConnection instantiation exception on .NET 4.6 and later after August-September 2018 .NET Framework updates.

Affected platforms:
  • Client: Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016
  • Server: Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016

Resolution: This issue is resolved in KB4480959.

Back to top
OS Build 15063.1292

August 30, 2018
KB4343889
Resolved
KB4480959
Resolved:
January 15, 2019
10:00 AM PT

Opened:
August 30, 2018
05:00 PM PT
SqlConnection instantiation exception on .NET 4.6 and later
After you install the August Preview of Quality Rollup or September 11, 2018 .NET Framework update, instantiation of SqlConnection can throw an exception.
For more information about this issue, see the following article in the Microsoft Knowledge Base:
4470809 SqlConnection instantiation exception on .NET 4.6 and later after August-September 2018 .NET Framework updates.
Affected platforms:
  • Client: Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016
  • Server: Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016
Resolution: This issue is resolved in KB4480959.

Back to top
OS Build 15063.1292

August 30, 2018
KB4343889
Resolved
KB4480959
Resolved:
January 15, 2019
10:00 AM PT

Opened:
August 30, 2018
05:00 PM PT
" diff --git a/windows/release-information/resolved-issues-windows-10-1709.yml b/windows/release-information/resolved-issues-windows-10-1709.yml index 25a903edb5..d460264f21 100644 --- a/windows/release-information/resolved-issues-windows-10-1709.yml +++ b/windows/release-information/resolved-issues-windows-10-1709.yml @@ -60,8 +60,8 @@ sections: - type: markdown text: " - - + +
DetailsOriginating updateStatusHistory
End-user-defined characters (EUDC) may cause blue screen at startup
If you enable per font end-user-defined characters (EUDC), the system may stop working and a blue screen may appear at startup. This is not a common setting in non-Asian regions.

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016

Resolution: This issue is resolved in KB4493441.

Back to top
OS Build 16299.1059

March 19, 2019
KB4489890
Resolved
KB4493441
Resolved:
April 09, 2019
10:00 AM PT

Opened:
March 19, 2019
10:00 AM PT
Stop error when attempting to start SSH from WSL
After applying KB4489886, a stop error occurs when attempting to start the Secure Shell (SSH) client program from Windows Subsystem for Linux (WSL) with agent forwarding enabled using a command line switch (ssh –A) or a configuration setting.

Affected platforms:
  • Client: Windows 10, version 1803; Windows 10, version 1709
  • Server: Windows Server, version 1803; Windows Server, version 1709

Resolution: This issue is resolved in KB4493441.

Back to top
OS Build 16299.1029

March 12, 2019
KB4489886
Resolved
KB4493441
Resolved:
April 09, 2019
10:00 AM PT

Opened:
March 12, 2019
10:00 AM PT
End-user-defined characters (EUDC) may cause blue screen at startup
If you enable per font end-user-defined characters (EUDC), the system may stop working and a blue screen may appear at startup. This is not a common setting in non-Asian regions.
Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016
Resolution: This issue is resolved in KB4493441.

Back to top
OS Build 16299.1059

March 19, 2019
KB4489890
Resolved
KB4493441
Resolved:
April 09, 2019
10:00 AM PT

Opened:
March 19, 2019
10:00 AM PT
Stop error when attempting to start SSH from WSL
After applying KB4489886, a stop error occurs when attempting to start the Secure Shell (SSH) client program from Windows Subsystem for Linux (WSL) with agent forwarding enabled using a command line switch (ssh –A) or a configuration setting.
Affected platforms:
  • Client: Windows 10, version 1803; Windows 10, version 1709
  • Server: Windows Server, version 1803; Windows Server, version 1709
Resolution: This issue is resolved in KB4493441.

Back to top
OS Build 16299.1029

March 12, 2019
KB4489886
Resolved
KB4493441
Resolved:
April 09, 2019
10:00 AM PT

Opened:
March 12, 2019
10:00 AM PT
" @@ -70,9 +70,9 @@ sections: - type: markdown text: " - - - + + +
DetailsOriginating updateStatusHistory
Applications using Microsoft Jet database and Access 95 file format stop working
Applications that use a Microsoft Jet database with the Microsoft Access 95 file format may randomly stop working.

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 7, Service Pack 1
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2008 R2 SP1

Resolution: This issue is resolved in KB4487021.

Back to top
OS Build 16299.967

February 12, 2019
KB4486996
Resolved
KB4487021
Resolved:
February 19, 2019
02:00 PM PT

Opened:
February 12, 2019
10:00 AM PT
Error 1309 when installing/uninstalling MSI or MSP files
After installing KB4486996, users may receive “Error 1309” while installing or uninstalling certain types of MSI and MSP files.

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 8.1
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2

Resolution: This issue is resolved in KB4489886.

Back to top
OS Build 16299.967

February 12, 2019
KB4486996
Resolved
KB4489886
Resolved:
March 12, 2019
10:00 AM PT

Opened:
February 12, 2019
10:00 AM PT
Internet Explorer may fail to load images
After installing KB4486996, Internet Explorer may fail to load images with a backslash (\\) in their relative source path.

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 8.1; Windows 7, Service Pack 1
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2; Windows Server 2008 R2 SP1

Resolution: This issue is resolved in KB4487021.

Back to top
OS Build 16299.967

February 12, 2019
KB4486996
Resolved
KB4487021
Resolved:
February 19, 2019
02:00 PM PT

Opened:
February 12, 2019
10:00 AM PT
Applications using Microsoft Jet database and Access 95 file format stop working
Applications that use a Microsoft Jet database with the Microsoft Access 95 file format may randomly stop working.
Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 7, Service Pack 1
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2008 R2 SP1
Resolution: This issue is resolved in KB4487021.

Back to top
OS Build 16299.967

February 12, 2019
KB4486996
Resolved
KB4487021
Resolved:
February 19, 2019
02:00 PM PT

Opened:
February 12, 2019
10:00 AM PT
Error 1309 when installing/uninstalling MSI or MSP files
After installing KB4486996, users may receive “Error 1309” while installing or uninstalling certain types of MSI and MSP files.
Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 8.1
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2
Resolution: This issue is resolved in KB4489886.

Back to top
OS Build 16299.967

February 12, 2019
KB4486996
Resolved
KB4489886
Resolved:
March 12, 2019
10:00 AM PT

Opened:
February 12, 2019
10:00 AM PT
Internet Explorer may fail to load images
After installing KB4486996, Internet Explorer may fail to load images with a backslash (\\) in their relative source path.
Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 8.1; Windows 7, Service Pack 1
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2; Windows Server 2008 R2 SP1
Resolution: This issue is resolved in KB4487021.

Back to top
OS Build 16299.967

February 12, 2019
KB4486996
Resolved
KB4487021
Resolved:
February 19, 2019
02:00 PM PT

Opened:
February 12, 2019
10:00 AM PT
" @@ -81,11 +81,11 @@ sections: - type: markdown text: " - - - - - + + + + +
DetailsOriginating updateStatusHistory
Applications using Microsoft Jet database fail to open
Applications that use a Microsoft Jet database with the Microsoft Access 97 file format may fail to open if the database has column names greater than 32 characters. The database will fail to open with the error, “Unrecognized Database Format.”

Affected platforms:
  • Client: Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 8.1; Windows 7, Service Pack 1 
  • Server: Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2; Windows Server 2008 R2 SP1 

Resolution: This issue is resolved in KB4486996.

Back to top
OS Build 16299.904

January 08, 2019
KB4480978
Resolved
KB4486996
Resolved:
February 12, 2019
10:00 AM PT

Opened:
January 08, 2019
10:00 AM PT
First character of the Japanese era name not recognized as an abbreviation
After installing KB4480967, the first character of the Japanese era name is not recognized as an abbreviation and may cause date parsing issues.

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 8.1; Windows 7, Service Pack 1
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2; Windows Server 2008 R2 SP1

Resolution: This issue is resolved in KB4487021.

Back to top
OS Build 16299.936

January 15, 2019
KB4480967
Resolved
KB4487021
Resolved:
February 19, 2019
02:00 PM PT

Opened:
January 15, 2019
10:00 AM PT
MSXML6 causes applications to stop responding if an exception was thrown
After installing KB4480978, MSXML6 causes applications to stop responding if an exception was thrown during node operations, such as appendChild(), insertBefore(), and moveNode().

The Group Policy editor may stop responding when editing a Group Policy Object (GPO) that contains Group Policy Preferences (GPP) for Internet Explorer 10 settings.

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 8.1
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2

Resolution: This issue is resolved in KB4493441.

Back to top
OS Build 16299.904

January 08, 2019
KB4480978
Resolved
KB4493441
Resolved:
April 09, 2019
10:00 AM PT

Opened:
January 08, 2019
10:00 AM PT
Unable to access hotspots with third-party applications
After installing KB4480978, third-party applications may have difficulty authenticating hotspots.

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 8.1
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2

Resolution: This issue is resolved in KB4480967.

Back to top
OS Build 16299.904

January 08, 2019
KB4480978
Resolved
KB4480967
Resolved:
January 15, 2019
10:00 AM PT

Opened:
January 08, 2019
10:00 AM PT
Webpages become unresponsive in Microsoft Edge
After installing KB4480978, some Microsoft Edge users report that they:
  • Cannot load webpages using a local IP address.
  • Cannot load webpages on the Internet using a VPN connection.
Browsing fails or the webpage may become unresponsive.

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709

Resolution: This issue is resolved in KB4486996.

Back to top
OS Build 16299.904

January 08, 2019
KB4480978
Resolved
KB4486996
Resolved:
February 12, 2019
10:00 AM PT

Opened:
January 08, 2019
10:00 AM PT
Applications using Microsoft Jet database fail to open
Applications that use a Microsoft Jet database with the Microsoft Access 97 file format may fail to open if the database has column names greater than 32 characters. The database will fail to open with the error, “Unrecognized Database Format.”
Affected platforms:
  • Client: Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 8.1; Windows 7, Service Pack 1 
  • Server: Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2; Windows Server 2008 R2 SP1 
Resolution: This issue is resolved in KB4486996.

Back to top
OS Build 16299.904

January 08, 2019
KB4480978
Resolved
KB4486996
Resolved:
February 12, 2019
10:00 AM PT

Opened:
January 08, 2019
10:00 AM PT
First character of the Japanese era name not recognized as an abbreviation
After installing KB4480967, the first character of the Japanese era name is not recognized as an abbreviation and may cause date parsing issues.
Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 8.1; Windows 7, Service Pack 1
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2; Windows Server 2008 R2 SP1
Resolution: This issue is resolved in KB4487021.

Back to top
OS Build 16299.936

January 15, 2019
KB4480967
Resolved
KB4487021
Resolved:
February 19, 2019
02:00 PM PT

Opened:
January 15, 2019
10:00 AM PT
MSXML6 causes applications to stop responding if an exception was thrown
After installing KB4480978, MSXML6 causes applications to stop responding if an exception was thrown during node operations, such as appendChild(), insertBefore(), and moveNode().
The Group Policy editor may stop responding when editing a Group Policy Object (GPO) that contains Group Policy Preferences (GPP) for Internet Explorer 10 settings.
Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 8.1
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2
Resolution: This issue is resolved in KB4493441.

Back to top
OS Build 16299.904

January 08, 2019
KB4480978
Resolved
KB4493441
Resolved:
April 09, 2019
10:00 AM PT

Opened:
January 08, 2019
10:00 AM PT
Unable to access hotspots with third-party applications
After installing KB4480978, third-party applications may have difficulty authenticating hotspots.
Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 8.1
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2
Resolution: This issue is resolved in KB4480967.

Back to top
OS Build 16299.904

January 08, 2019
KB4480978
Resolved
KB4480967
Resolved:
January 15, 2019
10:00 AM PT

Opened:
January 08, 2019
10:00 AM PT
Webpages become unresponsive in Microsoft Edge
After installing KB4480978, some Microsoft Edge users report that they:
  • Cannot load webpages using a local IP address.
  • Cannot load webpages on the Internet using a VPN connection.
Browsing fails or the webpage may become unresponsive.
Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709
Resolution: This issue is resolved in KB4486996.

Back to top
OS Build 16299.904

January 08, 2019
KB4480978
Resolved
KB4486996
Resolved:
February 12, 2019
10:00 AM PT

Opened:
January 08, 2019
10:00 AM PT
" @@ -94,8 +94,8 @@ sections: - type: markdown text: " - - + +
DetailsOriginating updateStatusHistory
Error message beginning with “Hosted by…” when launching Microsoft Edge
After installing KB4462918, some users may see a dialog box with a non-applicable message beginning with the words “Hosted by...” when first starting Microsoft Edge.

This dialog will only appear once if they have turned on “Block only third-party cookies” in Microsoft Edge and applied certain language packs before installing this update.

Affected platforms:
  • Client: Windows 10, version 1709; Windows 10, version 1703
  • Server: Windows Server, version 1709

Resolution: This issue is resolved in KB4462932.

Back to top
OS Build 16299.726

October 09, 2018
KB4462918
Resolved
KB4462932
Resolved:
October 18, 2018
10:00 AM PT

Opened:
October 09, 2018
10:00 AM PT
Unable to use Seek bar in Windows Media Player
After installing KB4462918, users may not be able to use the Seek Bar in Windows Media Player when playing specific files. This issue does not affect normal playback.

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 8.1; Windows 7, Service Pack 1
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2; Windows Server 2008 R2 SP1

Resolution: This issue is resolved in KB4471329.

Back to top
OS Build 16299.726

October 09, 2018
KB4462918
Resolved
KB4471329
Resolved:
December 11, 2018
10:00 AM PT

Opened:
October 09, 2018
10:00 AM PT
Error message beginning with “Hosted by…” when launching Microsoft Edge
After installing KB4462918, some users may see a dialog box with a non-applicable message beginning with the words “Hosted by...” when first starting Microsoft Edge.
This dialog will only appear once if they have turned on “Block only third-party cookies” in Microsoft Edge and applied certain language packs before installing this update.
Affected platforms:
  • Client: Windows 10, version 1709; Windows 10, version 1703
  • Server: Windows Server, version 1709
Resolution: This issue is resolved in KB4462932.

Back to top
OS Build 16299.726

October 09, 2018
KB4462918
Resolved
KB4462932
Resolved:
October 18, 2018
10:00 AM PT

Opened:
October 09, 2018
10:00 AM PT
Unable to use Seek bar in Windows Media Player
After installing KB4462918, users may not be able to use the Seek Bar in Windows Media Player when playing specific files. This issue does not affect normal playback.
Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 8.1; Windows 7, Service Pack 1
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2; Windows Server 2008 R2 SP1
Resolution: This issue is resolved in KB4471329.

Back to top
OS Build 16299.726

October 09, 2018
KB4462918
Resolved
KB4471329
Resolved:
December 11, 2018
10:00 AM PT

Opened:
October 09, 2018
10:00 AM PT
" @@ -104,6 +104,6 @@ sections: - type: markdown text: " - +
DetailsOriginating updateStatusHistory
SqlConnection instantiation exception on .NET 4.6 and later
After you install the August Preview of Quality Rollup or September 11, 2018 .NET Framework update, instantiation of SqlConnection can throw an exception.

For more information about this issue, see the following article in the Microsoft Knowledge Base:
4470809 SqlConnection instantiation exception on .NET 4.6 and later after August-September 2018 .NET Framework updates.

Affected platforms:
  • Client: Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016
  • Server: Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016

Resolution: This issue is resolved in KB4480967.

Back to top
OS Build 16299.637

August 30, 2018
KB4343893
Resolved
KB4480967
Resolved:
January 15, 2019
10:00 AM PT

Opened:
August 30, 2018
05:00 PM PT
SqlConnection instantiation exception on .NET 4.6 and later
After you install the August Preview of Quality Rollup or September 11, 2018 .NET Framework update, instantiation of SqlConnection can throw an exception.
For more information about this issue, see the following article in the Microsoft Knowledge Base:
4470809 SqlConnection instantiation exception on .NET 4.6 and later after August-September 2018 .NET Framework updates.
Affected platforms:
  • Client: Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016
  • Server: Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016
Resolution: This issue is resolved in KB4480967.

Back to top
OS Build 16299.637

August 30, 2018
KB4343893
Resolved
KB4480967
Resolved:
January 15, 2019
10:00 AM PT

Opened:
August 30, 2018
05:00 PM PT
" diff --git a/windows/release-information/resolved-issues-windows-10-1803.yml b/windows/release-information/resolved-issues-windows-10-1803.yml index ea0e8a6fac..19926ef0f2 100644 --- a/windows/release-information/resolved-issues-windows-10-1803.yml +++ b/windows/release-information/resolved-issues-windows-10-1803.yml @@ -65,8 +65,8 @@ sections: - type: markdown text: " - - + +
DetailsOriginating updateStatusHistory
End-user-defined characters (EUDC) may cause blue screen at startup
If you enable per font end-user-defined characters (EUDC), the system may stop working and a blue screen may appear at startup. This is not a common setting in non-Asian regions. 

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016
 
Resolution: This issue was resolved in KB4493464

Back to top
OS Build 17134.677

March 19, 2019
KB4489894
Resolved
KB4493464
Resolved:
April 09, 2019
10:00 AM PT

Opened:
March 19, 2019
10:00 AM PT
Stop error when attempting to start SSH from WSL
After applying KB4489868, a stop error occurs when attempting to start the Secure Shell (SSH) client program from Windows Subsystem for Linux (WSL) with agent forwarding enabled using a command line switch (ssh -A) or a configuration setting.

Affected platforms:
  • Client: Windows 10, version 1803; Windows 10, version 1709
  • Server: Windows Server, version 1803; Windows Server, version 1709

Resolution: This issue was resolved in KB4493464.

Back to top
OS Build 17134.648

March 12, 2019
KB4489868
Resolved
KB4493464
Resolved:
April 09, 2019
10:00 AM PT

Opened:
March 12, 2019
10:00 AM PT
End-user-defined characters (EUDC) may cause blue screen at startup
If you enable per font end-user-defined characters (EUDC), the system may stop working and a blue screen may appear at startup. This is not a common setting in non-Asian regions. 
Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016
 
Resolution: This issue was resolved in KB4493464

Back to top
OS Build 17134.677

March 19, 2019
KB4489894
Resolved
KB4493464
Resolved:
April 09, 2019
10:00 AM PT

Opened:
March 19, 2019
10:00 AM PT
Stop error when attempting to start SSH from WSL
After applying KB4489868, a stop error occurs when attempting to start the Secure Shell (SSH) client program from Windows Subsystem for Linux (WSL) with agent forwarding enabled using a command line switch (ssh -A) or a configuration setting.
Affected platforms:
  • Client: Windows 10, version 1803; Windows 10, version 1709
  • Server: Windows Server, version 1803; Windows Server, version 1709
Resolution: This issue was resolved in KB4493464.

Back to top
OS Build 17134.648

March 12, 2019
KB4489868
Resolved
KB4493464
Resolved:
April 09, 2019
10:00 AM PT

Opened:
March 12, 2019
10:00 AM PT
" @@ -75,8 +75,8 @@ sections: - type: markdown text: " - - + +
DetailsOriginating updateStatusHistory
Error 1309 when installing/uninstalling MSI or MSP files
After installing KB4487017, users may received \"Error 1309\" while installing or uninstalling certain types of MSI and MSP files. 

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 8.1
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2

Resolution: This issue is resolved in KB4489868.

Back to top
OS Build 17134.590

February 12, 2019
KB4487017
Resolved
KB4489868
Resolved:
March 12, 2019
10:00 AM PT

Opened:
February 12, 2019
10:00 AM PT
Internet Explorer may fail to load images
After installing KB4487017, Internet Explorer may fail to load images with a backslash (\\) in their relative source path. 

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 8.1; Windows 7, Service Pack 1
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2; Windows Server 2008 R2 SP1

Resolution: This issue is resolved in KB4487029

Back to top
OS Build 17134.590

February 12, 2019
KB4487017
Resolved
KB4487029
Resolved:
February 19, 2019
02:00 PM PT

Opened:
February 12, 2019
10:00 AM PT
Error 1309 when installing/uninstalling MSI or MSP files
After installing KB4487017, users may received \"Error 1309\" while installing or uninstalling certain types of MSI and MSP files. 
Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 8.1
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2
Resolution: This issue is resolved in KB4489868.

Back to top
OS Build 17134.590

February 12, 2019
KB4487017
Resolved
KB4489868
Resolved:
March 12, 2019
10:00 AM PT

Opened:
February 12, 2019
10:00 AM PT
Internet Explorer may fail to load images
After installing KB4487017, Internet Explorer may fail to load images with a backslash (\\) in their relative source path. 
Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 8.1; Windows 7, Service Pack 1
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2; Windows Server 2008 R2 SP1
Resolution: This issue is resolved in KB4487029

Back to top
OS Build 17134.590

February 12, 2019
KB4487017
Resolved
KB4487029
Resolved:
February 19, 2019
02:00 PM PT

Opened:
February 12, 2019
10:00 AM PT
" @@ -85,11 +85,11 @@ sections: - type: markdown text: " - - - - - + + + + +
DetailsOriginating updateStatusHistory
Applications using Microsoft Jet database and Access 95 file format stop working
Applications that use a Microsoft Jet database with the Microsoft Access 95 file format may randomly stop working. 

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 7, Service Pack 1
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2008 R2 SP1

Resolution: This issue is resolved in KB4487017.

Back to top
OS Build 17134.523

January 08, 2019
KB4480966
Resolved
KB4487017
Resolved:
February 12, 2019
10:00 AM PT

Opened:
January 08, 2019
10:00 AM PT
First character of Japanese era name not recognized
After installing KB4480976, the first character of the Japanese era name is not recognized as an abbreviation and may cause date parsing issues.

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 8.1; Windows 7, Service Pack 1
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2; Windows Server 2008 R2 SP1

Resolution: This issue is resolved in KB4487029

Back to top
OS Build 17134.556

January 15, 2019
KB4480976
Resolved
KB4487029
Resolved:
February 19, 2019
02:00 PM PT

Opened:
January 15, 2019
10:00 AM PT
MSXML6 may cause applications to stop responding
After installing KB4480966, MSXML6 causes applications to stop responding if an exception was thrown during node operations, such as appendChild(), insertBefore(), and moveNode().

The Group Policy editor may stop responding when editing a Group Policy Object (GPO) that contains Group Policy Preferences (GPP) for Internet Explorer 10 settings.

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 8.1
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2

Resolution: This issue was resolved in KB4493464

Back to top
OS Build 17134.523

January 08, 2019
KB4480966
Resolved
KB4493464
Resolved:
April 09, 2019
10:00 AM PT

Opened:
January 08, 2019
10:00 AM PT
Unable to access hotspots with third-party applications
After installing KB4480966, third-party applications may have difficulty authenticating hotspots.

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 8.1
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2

Resolution: This issue is resolved in KB4480976

Back to top
OS Build 17134.523

January 08, 2019
KB4480966
Resolved
KB4480976
Resolved:
January 15, 2019
10:00 AM PT

Opened:
January 08, 2019
10:00 AM PT
Webpages become unresponsive in Microsoft Edge
After installing KB4480966, some Microsoft Edge users report that they: 
  • Cannot load webpages using a local IP address. 
  • Cannot load webpages on the Internet using a VPN connection.  
Browsing fails or the webpage may become unresponsive. 

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709

Resolution: This issue is resolved in KB4487017

Back to top
OS Build 17134.523

January 08, 2019
KB4480966
Resolved
KB4487017
Resolved:
February 12, 2019
10:00 AM PT

Opened:
January 08, 2019
10:00 AM PT
Applications using Microsoft Jet database and Access 95 file format stop working
Applications that use a Microsoft Jet database with the Microsoft Access 95 file format may randomly stop working. 
Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 7, Service Pack 1
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2008 R2 SP1
Resolution: This issue is resolved in KB4487017.

Back to top
OS Build 17134.523

January 08, 2019
KB4480966
Resolved
KB4487017
Resolved:
February 12, 2019
10:00 AM PT

Opened:
January 08, 2019
10:00 AM PT
First character of Japanese era name not recognized
After installing KB4480976, the first character of the Japanese era name is not recognized as an abbreviation and may cause date parsing issues.
Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 8.1; Windows 7, Service Pack 1
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2; Windows Server 2008 R2 SP1
Resolution: This issue is resolved in KB4487029

Back to top
OS Build 17134.556

January 15, 2019
KB4480976
Resolved
KB4487029
Resolved:
February 19, 2019
02:00 PM PT

Opened:
January 15, 2019
10:00 AM PT
MSXML6 may cause applications to stop responding
After installing KB4480966, MSXML6 causes applications to stop responding if an exception was thrown during node operations, such as appendChild(), insertBefore(), and moveNode().
The Group Policy editor may stop responding when editing a Group Policy Object (GPO) that contains Group Policy Preferences (GPP) for Internet Explorer 10 settings.
Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 8.1
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2
Resolution: This issue was resolved in KB4493464

Back to top
OS Build 17134.523

January 08, 2019
KB4480966
Resolved
KB4493464
Resolved:
April 09, 2019
10:00 AM PT

Opened:
January 08, 2019
10:00 AM PT
Unable to access hotspots with third-party applications
After installing KB4480966, third-party applications may have difficulty authenticating hotspots.
Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 8.1
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2
Resolution: This issue is resolved in KB4480976

Back to top
OS Build 17134.523

January 08, 2019
KB4480966
Resolved
KB4480976
Resolved:
January 15, 2019
10:00 AM PT

Opened:
January 08, 2019
10:00 AM PT
Webpages become unresponsive in Microsoft Edge
After installing KB4480966, some Microsoft Edge users report that they: 
  • Cannot load webpages using a local IP address. 
  • Cannot load webpages on the Internet using a VPN connection.  
Browsing fails or the webpage may become unresponsive. 
Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709
Resolution: This issue is resolved in KB4487017

Back to top
OS Build 17134.523

January 08, 2019
KB4480966
Resolved
KB4487017
Resolved:
February 12, 2019
10:00 AM PT

Opened:
January 08, 2019
10:00 AM PT
" @@ -98,7 +98,7 @@ sections: - type: markdown text: " - +
DetailsOriginating updateStatusHistory
Cannot pin a web link on the Start menu or the taskbar
After installing KB4471324, some users cannot pin a web link on the Start menu or the taskbar. 

Affected platforms:
  • Client: Windows 10, version 1803
  • Server: Windows Server, version 1803

Resolution: This issue is resolved in KB4487029

Back to top
OS Build 17134.471

December 11, 2018
KB4471324
Resolved
KB4487029
Resolved:
February 19, 2019
02:00 PM PT

Opened:
December 11, 2018
10:00 AM PT
Cannot pin a web link on the Start menu or the taskbar
After installing KB4471324, some users cannot pin a web link on the Start menu or the taskbar. 
Affected platforms:
  • Client: Windows 10, version 1803
  • Server: Windows Server, version 1803
Resolution: This issue is resolved in KB4487029

Back to top
OS Build 17134.471

December 11, 2018
KB4471324
Resolved
KB4487029
Resolved:
February 19, 2019
02:00 PM PT

Opened:
December 11, 2018
10:00 AM PT
" @@ -107,8 +107,8 @@ sections: - type: markdown text: " - - + +
DetailsOriginating updateStatusHistory
Blue or black screen with \"System thread exception not handled\" error
After installing KB4467682, an optional update, some users may get a blue or black screen with the error code, \"System thread exception not handled.\"

Affected platforms:
  • Client: Windows 10, version 1803
  • Server: Windows Server, version 1803

Resolution: This issue is resolved in KB4471324

Back to top
OS Build 17134.441

November 27, 2018
KB4467682
Resolved
KB4471324
Resolved:
December 11, 2018
10:00 AM PT

Opened:
November 27, 2018
10:00 AM PT
Custom Start menu layouts display incorrectly
After installing KB4467682, custom Start menu layouts may display incorrectly. 

Affected platforms:
  • Client: Windows 10, version 1803
  • Server: Windows Server, version 1803
 
Resolution: This issue is resolved in KB4471324

Back to top
OS Build 17134.441

November 27, 2018
KB4467682
Resolved
KB4471324
Resolved:
December 11, 2018
10:00 AM PT

Opened:
November 27, 2018
10:00 AM PT
Blue or black screen with \"System thread exception not handled\" error
After installing KB4467682, an optional update, some users may get a blue or black screen with the error code, \"System thread exception not handled.\"
Affected platforms:
  • Client: Windows 10, version 1803
  • Server: Windows Server, version 1803
Resolution: This issue is resolved in KB4471324

Back to top
OS Build 17134.441

November 27, 2018
KB4467682
Resolved
KB4471324
Resolved:
December 11, 2018
10:00 AM PT

Opened:
November 27, 2018
10:00 AM PT
Custom Start menu layouts display incorrectly
After installing KB4467682, custom Start menu layouts may display incorrectly. 
Affected platforms:
  • Client: Windows 10, version 1803
  • Server: Windows Server, version 1803
 
Resolution: This issue is resolved in KB4471324

Back to top
OS Build 17134.441

November 27, 2018
KB4467682
Resolved
KB4471324
Resolved:
December 11, 2018
10:00 AM PT

Opened:
November 27, 2018
10:00 AM PT
" @@ -117,8 +117,8 @@ sections: - type: markdown text: " - - + +
DetailsOriginating updateStatusHistory
Developer Tools (F12) fail to start in Microsoft Edge
Developer Tools (F12) may fail to start in Microsoft Edge.

Affected platforms:
  • Client: Windows 10, version 1803
  • Server: Windows Server, version 1803
 
Resolution: This issue is resolved in KB4467702

Back to top
OS Build 17134.376

October 24, 2018
KB4462933
Resolved
KB4467702
Resolved:
November 13, 2018
10:00 AM PT

Opened:
October 24, 2018
02:00 PM PT
Unable to use Seek bar in Windows Media Player
After installing KB4462919, users may not be able to use the Seek bar in Windows Media Player when playing specific files. This issue does not affect normal playback.

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 8.1; Windows 7, Service Pack 1
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2; Windows Server 2008 R2 SP1

Resolution: This issue is resolved in KB4471324

Back to top
OS Build 17134.345

October 09, 2018
KB4462919
Resolved
KB4471324
Resolved:
December 11, 2018
10:00 AM PT

Opened:
October 09, 2018
10:00 AM PT
Developer Tools (F12) fail to start in Microsoft Edge
Developer Tools (F12) may fail to start in Microsoft Edge.
Affected platforms:
  • Client: Windows 10, version 1803
  • Server: Windows Server, version 1803
 
Resolution: This issue is resolved in KB4467702

Back to top
OS Build 17134.376

October 24, 2018
KB4462933
Resolved
KB4467702
Resolved:
November 13, 2018
10:00 AM PT

Opened:
October 24, 2018
02:00 PM PT
Unable to use Seek bar in Windows Media Player
After installing KB4462919, users may not be able to use the Seek bar in Windows Media Player when playing specific files. This issue does not affect normal playback.
Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 8.1; Windows 7, Service Pack 1
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2; Windows Server 2008 R2 SP1
Resolution: This issue is resolved in KB4471324

Back to top
OS Build 17134.345

October 09, 2018
KB4462919
Resolved
KB4471324
Resolved:
December 11, 2018
10:00 AM PT

Opened:
October 09, 2018
10:00 AM PT
" @@ -127,9 +127,9 @@ sections: - type: markdown text: " - - - + + +
DetailsOriginating updateStatusHistory
Guest VMs running Unicast NLB fail to respond after restart
All guest virtual machines running Unicast NLB fail to respond to NLB requests after the virtual machines restart. 

Affected platforms:
  • Client: Windows 10, version 1803; Windows 10, version 1507
  • Server: Windows Server, version 1803
 
Resolution: This issue is resolved in KB4458469

Back to top
OS Build 17134.285

September 11, 2018
KB4457128
Resolved
KB4458469
Resolved:
September 20, 2018
10:00 AM PT

Opened:
September 11, 2018
10:00 AM PT
SqlConnection instantiation exception on .NET 4.6 and later
After you install the August Preview of Quality Rollup or September 11, 2018 .NET Framework update, instantiation of SqlConnection can throw an exception.  

For more information about this issue, see the following article in the Microsoft Knowledge Base: 4470809, SqlConnection instantiation exception on .NET 4.6 and later after August-September 2018 .NET Framework updates.

Affected platforms:
  • Client: Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016
  • Server: Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016

Resolution: This issue is resolved in KB4480976

Back to top
OS Build 17134.285

September 11, 2018
KB4457128
Resolved
KB4480976
Resolved:
January 15, 2019
10:00 AM PT

Opened:
September 11, 2018
10:00 AM PT
Users cannot set Win32 program defaults
After installing KB4458469, some users cannot set Win32 program defaults for certain app and file type combinations using the Open with... command or Settings > Apps > Default apps
 
In some cases, Microsoft Notepad or other Win32 programs cannot be set as the default.

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803

Resolution: This issue is resolved in KB4467682

Back to top
OS Build 17134.320

September 26, 2018
KB4458469
Resolved
KB4467682
Resolved:
November 27, 2018
10:00 AM PT

Opened:
September 26, 2018
02:00 PM PT
Guest VMs running Unicast NLB fail to respond after restart
All guest virtual machines running Unicast NLB fail to respond to NLB requests after the virtual machines restart. 
Affected platforms:
  • Client: Windows 10, version 1803; Windows 10, version 1507
  • Server: Windows Server, version 1803
 
Resolution: This issue is resolved in KB4458469

Back to top
OS Build 17134.285

September 11, 2018
KB4457128
Resolved
KB4458469
Resolved:
September 20, 2018
10:00 AM PT

Opened:
September 11, 2018
10:00 AM PT
SqlConnection instantiation exception on .NET 4.6 and later
After you install the August Preview of Quality Rollup or September 11, 2018 .NET Framework update, instantiation of SqlConnection can throw an exception.  
For more information about this issue, see the following article in the Microsoft Knowledge Base: 4470809, SqlConnection instantiation exception on .NET 4.6 and later after August-September 2018 .NET Framework updates.
Affected platforms:
  • Client: Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016
  • Server: Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016
Resolution: This issue is resolved in KB4480976

Back to top
OS Build 17134.285

September 11, 2018
KB4457128
Resolved
KB4480976
Resolved:
January 15, 2019
10:00 AM PT

Opened:
September 11, 2018
10:00 AM PT
Users cannot set Win32 program defaults
After installing KB4458469, some users cannot set Win32 program defaults for certain app and file type combinations using the Open with... command or Settings > Apps > Default apps
 
In some cases, Microsoft Notepad or other Win32 programs cannot be set as the default.
Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803
Resolution: This issue is resolved in KB4467682

Back to top
OS Build 17134.320

September 26, 2018
KB4458469
Resolved
KB4467682
Resolved:
November 27, 2018
10:00 AM PT

Opened:
September 26, 2018
02:00 PM PT
" @@ -138,6 +138,6 @@ sections: - type: markdown text: " - +
DetailsOriginating updateStatusHistory
Microsoft Intune takes a long time to deliver user profiles
After installing KB4457128, Windows no longer recognizes the Personal Information exchange (PFX) certificate that's used for authenticating to a Wi-Fi or VPN connection. As a result, Microsoft Intune takes a long time to deliver user profiles because it doesn't recognize that the required certificate is on the device. 

Affected platforms:
  • Client: Windows 10, version 1803
  • Server: Windows Server, version 1803
 
Resolution: This issue is resolved in KB4464218

Back to top
OS Build 17134.191

July 24, 2018
KB4340917
Resolved
KB4464218
Resolved:
September 17, 2018
10:00 AM PT

Opened:
July 24, 2018
10:00 AM PT
Microsoft Intune takes a long time to deliver user profiles
After installing KB4457128, Windows no longer recognizes the Personal Information exchange (PFX) certificate that's used for authenticating to a Wi-Fi or VPN connection. As a result, Microsoft Intune takes a long time to deliver user profiles because it doesn't recognize that the required certificate is on the device. 
Affected platforms:
  • Client: Windows 10, version 1803
  • Server: Windows Server, version 1803
 
Resolution: This issue is resolved in KB4464218

Back to top
OS Build 17134.191

July 24, 2018
KB4340917
Resolved
KB4464218
Resolved:
September 17, 2018
10:00 AM PT

Opened:
July 24, 2018
10:00 AM PT
" diff --git a/windows/release-information/resolved-issues-windows-10-1809-and-windows-server-2019.yml b/windows/release-information/resolved-issues-windows-10-1809-and-windows-server-2019.yml index b8013ea114..b7938d67b5 100644 --- a/windows/release-information/resolved-issues-windows-10-1809-and-windows-server-2019.yml +++ b/windows/release-information/resolved-issues-windows-10-1809-and-windows-server-2019.yml @@ -69,7 +69,7 @@ sections: - type: markdown text: " - +
DetailsOriginating updateStatusHistory
End-user-defined characters (EUDC) may cause blue screen at startup
If you enable per font end-user-defined characters (EUDC), the system will stop working and a blue screen may appear at startup. This is not a common setting in non-Asian regions.

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016

Workaround: To avoid this issue, don't enable per font EUDC. As an alternative, you can edit the registry to mitigate this issue; for more information, see KB4496149.

Resolved: This issue was resolved in KB4493509.

Back to top
OS Build 17763.404

April 02, 2019
KB4490481
Resolved
KB4493509
Resolved:
April 09, 2019
10:00 AM PT

Opened:
April 02, 2019
10:00 AM PT
End-user-defined characters (EUDC) may cause blue screen at startup
If you enable per font end-user-defined characters (EUDC), the system will stop working and a blue screen may appear at startup. This is not a common setting in non-Asian regions.
Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016
Workaround: To avoid this issue, don't enable per font EUDC. As an alternative, you can edit the registry to mitigate this issue; for more information, see KB4496149.
Resolved: This issue was resolved in KB4493509.

Back to top
OS Build 17763.404

April 02, 2019
KB4490481
Resolved
KB4493509
Resolved:
April 09, 2019
10:00 AM PT

Opened:
April 02, 2019
10:00 AM PT
" @@ -78,7 +78,7 @@ sections: - type: markdown text: " - +
DetailsOriginating updateStatusHistory
Apps may stop working after selecting an audio output device other than the default
After installing KB4482887 on machines that have multiple audio devices, applications that provide advanced options for internal or external audio output devices may stop working unexpectedly. This issue occurs for users that select an audio output device different from the \"Default Audio Device\". Examples of applications that may stop working include: 
  • Windows Media Player 
  • Realtek HD Audio Manager 
  • Sound Blaster Control Panel 

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019
  • Server: Windows Server, version 1809; Windows Server 2019

Workaround: As a temporary solution, select the \"Default Audio Device\" in the options provided by the application; please refer to the application's user manual for details. 
For example, to set the Default Audio Device in Windows Media Player: 
  1. Open Windows Media Player > Tools > Options > Devices.
  2. Select the device and choose Properties.
  3. On the next dialog, from the drop-down menu under Select the Audio Device, choose Default Audio Device from the list. 
You can then send audio from the application to the audio device you want in the per-application audio settings found under Settings > System > Sound > App Volume and device preferences.

Resolved: This issue was resolved in KB4490481

Back to top
OS Build 17763.348

March 01, 2019
KB4482887
Resolved
KB4490481
Resolved:
April 02, 2019
10:00 AM PT

Opened:
March 01, 2019
10:00 AM PT
Apps may stop working after selecting an audio output device other than the default
After installing KB4482887 on machines that have multiple audio devices, applications that provide advanced options for internal or external audio output devices may stop working unexpectedly. This issue occurs for users that select an audio output device different from the \"Default Audio Device\". Examples of applications that may stop working include: 
  • Windows Media Player 
  • Realtek HD Audio Manager 
  • Sound Blaster Control Panel 
Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019
  • Server: Windows Server, version 1809; Windows Server 2019
Workaround: As a temporary solution, select the \"Default Audio Device\" in the options provided by the application; please refer to the application's user manual for details. 
For example, to set the Default Audio Device in Windows Media Player: 
  1. Open Windows Media Player > Tools > Options > Devices.
  2. Select the device and choose Properties.
  3. On the next dialog, from the drop-down menu under Select the Audio Device, choose Default Audio Device from the list. 
You can then send audio from the application to the audio device you want in the per-application audio settings found under Settings > System > Sound > App Volume and device preferences.
Resolved: This issue was resolved in KB4490481

Back to top
OS Build 17763.348

March 01, 2019
KB4482887
Resolved
KB4490481
Resolved:
April 02, 2019
10:00 AM PT

Opened:
March 01, 2019
10:00 AM PT
" @@ -87,10 +87,10 @@ sections: - type: markdown text: " - - - - + + + +
DetailsOriginating updateStatusHistory
Internet Explorer may fail to load images
After installing KB4487044, Internet Explorer may fail to load images with a backslash (\\) in their relative source path.

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 8.1; Windows 7, Service Pack 1
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2; Windows Server 2008 R2 SP1

Resolution: This issue is resolved in KB4482887.

Back to top
OS Build 17763.316

February 12, 2019
KB4487044
Resolved
KB4482887
Resolved:
March 01, 2019
10:00 AM PT

Opened:
February 12, 2019
10:00 AM PT
Error 1309 when installing/uninstalling MSI or MSP files
After installing KB4487044, users may receive \"Error 1309\" while installing or uninstalling certain types of MSI and MSP files. 

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 8.1
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2

Resolution: This issue is resolved in KB4489899

Back to top
OS Build 17763.316

February 12, 2019
KB4487044
Resolved
KB4489899
Resolved:
March 12, 2019
10:00 AM PT

Opened:
February 12, 2019
10:00 AM PT
Applications using Microsoft Jet database and Access 95 file format stop working
Applications that use a Microsoft Jet database with the Microsoft Access 95 file format may randomly stop working.

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 7, Service Pack 1
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2008 R2 SP1

Resolution: This issue is resolved in KB4482887.

Back to top
OS Build 17763.316

February 12, 2019
KB4487044
Resolved
KB4482887
Resolved:
March 01, 2019
10:00 AM PT

Opened:
February 12, 2019
10:00 AM PT
First character of the Japanese era name not recognized
After installing KB4487044, the first character of the Japanese era name is not recognized as an abbreviation and may cause date parsing issues. 

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 8.1; Windows 7, Service Pack 1
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2; Windows Server 2008 R2 SP1

Resolution: This issue is resolved in KB4482887

Back to top
OS Build 17763.316

February 12, 2019
KB4487044
Resolved
KB4482887
Resolved:
March 01, 2019
10:00 AM PT

Opened:
February 12, 2019
10:00 AM PT
Internet Explorer may fail to load images
After installing KB4487044, Internet Explorer may fail to load images with a backslash (\\) in their relative source path.
Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 8.1; Windows 7, Service Pack 1
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2; Windows Server 2008 R2 SP1
Resolution: This issue is resolved in KB4482887.

Back to top
OS Build 17763.316

February 12, 2019
KB4487044
Resolved
KB4482887
Resolved:
March 01, 2019
10:00 AM PT

Opened:
February 12, 2019
10:00 AM PT
Error 1309 when installing/uninstalling MSI or MSP files
After installing KB4487044, users may receive \"Error 1309\" while installing or uninstalling certain types of MSI and MSP files. 
Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 8.1
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2
Resolution: This issue is resolved in KB4489899

Back to top
OS Build 17763.316

February 12, 2019
KB4487044
Resolved
KB4489899
Resolved:
March 12, 2019
10:00 AM PT

Opened:
February 12, 2019
10:00 AM PT
Applications using Microsoft Jet database and Access 95 file format stop working
Applications that use a Microsoft Jet database with the Microsoft Access 95 file format may randomly stop working.
Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 7, Service Pack 1
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2008 R2 SP1
Resolution: This issue is resolved in KB4482887.

Back to top
OS Build 17763.316

February 12, 2019
KB4487044
Resolved
KB4482887
Resolved:
March 01, 2019
10:00 AM PT

Opened:
February 12, 2019
10:00 AM PT
First character of the Japanese era name not recognized
After installing KB4487044, the first character of the Japanese era name is not recognized as an abbreviation and may cause date parsing issues. 
Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 8.1; Windows 7, Service Pack 1
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2; Windows Server 2008 R2 SP1
Resolution: This issue is resolved in KB4482887

Back to top
OS Build 17763.316

February 12, 2019
KB4487044
Resolved
KB4482887
Resolved:
March 01, 2019
10:00 AM PT

Opened:
February 12, 2019
10:00 AM PT
" @@ -99,11 +99,11 @@ sections: - type: markdown text: " - - - - - + + + + +
DetailsOriginating updateStatusHistory
Internet Explorer 11 authentication issue with multiple concurrent logons
After installing the February 12, 2019 update (KB4487044), Internet Explorer 11 and other applications that use WININET.DLL may have authentication issues. This occurs when two or more people use the same user account for multiple, concurrent login sessions on the same Windows Server machine, including Remote Desktop Protocol (RDP) and Terminal Server logons. Symptoms reported by customers include, but may not be limited to:  
  • Cache size and location show zero or empty. 
  • Keyboard shortcuts may not work properly. 
  • Webpages may intermittently fail to load or render correctly. 
  • Issues with credential prompts. 
  • Issues when downloading files. 

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10 Enterprise LTSC 2016; Windows 8.1; Windows 7, Service Pack 1
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server 2016; Windows Server 2012 R2; Windows Server 2008 R2 SP1
 
Resolved: This issue was resolved in KB4493509

Back to top
OS Build 17763.253

January 08, 2019
KB4480116
Resolved
KB4493509
Resolved:
April 09, 2019
10:00 AM PT

Opened:
January 08, 2019
10:00 AM PT
Global DNS outage affects Windows Update customers
Windows Update customers were affected by a network infrastructure event on January 29, 2019 (21:00 UTC), caused by an external DNS service provider's global outage. A software update to the external provider's DNS servers resulted in the distribution of corrupted DNS records that affected connectivity to the Windows Update service. The DNS records were restored by January 30, 2019 (00:10 UTC), and the majority of local Internet Service Providers (ISP) have refreshed their DNS servers and customer services have been restored. 
 
Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019
  • Server: Windows Server, version 1809; Windows Server 2019

While this was not an issue with Microsoft's services, we take any service disruption for our customers seriously. We will work with partners to better understand this so we can provide higher quality service in the future even across diverse global network providers. 
 
If you are still unable to connect to Windows Update services due to this problem, please contact your local ISP or network administrator. You can also refer to our new KB4493784 for more information to determine if your network is affected, and to provide your local ISP or network administrator with additional information to assist you. 

Back to top
N/A

Resolved
Resolved:
March 08, 2019
11:15 AM PT

Opened:
January 29, 2019
02:00 PM PT
MSXML6 may cause applications to stop responding
After installing KB4480116, MSXML6 causes applications to stop responding if an exception was thrown during node operations, such as appendChild(), insertBefore(), and moveNode().
 
The Group Policy editor may stop responding when editing a Group Policy Object (GPO) that contains Group Policy Preferences (GPP) for Internet Explorer 10 settings. 

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 8.1
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2

Resolved: This issue was resolved in KB4493509

Back to top
OS Build 17763.253

January 08, 2019
KB4480116
Resolved
KB4493509
Resolved:
April 09, 2019
10:00 AM PT

Opened:
January 08, 2019
10:00 AM PT
Webpages become unresponsive in Microsoft Edge
After installing KB4480116, some Microsoft Edge users report that they:
  • Cannot load webpages using a local IP address. 
  • Cannot load webpages on the Internet using a VPN connection.
Browsing fails or the webpage may become unresponsive.

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709

Resolution: This issue is resolved in KB4487044

Back to top
OS Build 17763.253

January 08, 2019
KB4480116
Resolved
KB4487044
Resolved:
February 12, 2019
10:00 AM PT

Opened:
January 08, 2019
10:00 AM PT
Unable to access hotspots with third-party applications
After installing KB4480116, third-party applications may have difficulty authenticating hotspots. 

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 8.1
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2

Resolution: This issue is resolved in KB4476976

Back to top
OS Build 17763.253

January 08, 2019
KB4480116
Resolved
KB4476976
Resolved:
January 22, 2019
02:00 PM PT

Opened:
January 08, 2019
10:00 AM PT
Internet Explorer 11 authentication issue with multiple concurrent logons
After installing the February 12, 2019 update (KB4487044), Internet Explorer 11 and other applications that use WININET.DLL may have authentication issues. This occurs when two or more people use the same user account for multiple, concurrent login sessions on the same Windows Server machine, including Remote Desktop Protocol (RDP) and Terminal Server logons. Symptoms reported by customers include, but may not be limited to:  
  • Cache size and location show zero or empty. 
  • Keyboard shortcuts may not work properly. 
  • Webpages may intermittently fail to load or render correctly. 
  • Issues with credential prompts. 
  • Issues when downloading files. 
Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10 Enterprise LTSC 2016; Windows 8.1; Windows 7, Service Pack 1
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server 2016; Windows Server 2012 R2; Windows Server 2008 R2 SP1
 
Resolved: This issue was resolved in KB4493509

Back to top
OS Build 17763.253

January 08, 2019
KB4480116
Resolved
KB4493509
Resolved:
April 09, 2019
10:00 AM PT

Opened:
January 08, 2019
10:00 AM PT
Global DNS outage affects Windows Update customers
Windows Update customers were affected by a network infrastructure event on January 29, 2019 (21:00 UTC), caused by an external DNS service provider's global outage. A software update to the external provider's DNS servers resulted in the distribution of corrupted DNS records that affected connectivity to the Windows Update service. The DNS records were restored by January 30, 2019 (00:10 UTC), and the majority of local Internet Service Providers (ISP) have refreshed their DNS servers and customer services have been restored. 
 
Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019
  • Server: Windows Server, version 1809; Windows Server 2019
While this was not an issue with Microsoft's services, we take any service disruption for our customers seriously. We will work with partners to better understand this so we can provide higher quality service in the future even across diverse global network providers. 
 
If you are still unable to connect to Windows Update services due to this problem, please contact your local ISP or network administrator. You can also refer to our new KB4493784 for more information to determine if your network is affected, and to provide your local ISP or network administrator with additional information to assist you. 

Back to top
N/A

Resolved
Resolved:
March 08, 2019
11:15 AM PT

Opened:
January 29, 2019
02:00 PM PT
MSXML6 may cause applications to stop responding
After installing KB4480116, MSXML6 causes applications to stop responding if an exception was thrown during node operations, such as appendChild(), insertBefore(), and moveNode().
 
The Group Policy editor may stop responding when editing a Group Policy Object (GPO) that contains Group Policy Preferences (GPP) for Internet Explorer 10 settings. 
Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 8.1
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2
Resolved: This issue was resolved in KB4493509

Back to top
OS Build 17763.253

January 08, 2019
KB4480116
Resolved
KB4493509
Resolved:
April 09, 2019
10:00 AM PT

Opened:
January 08, 2019
10:00 AM PT
Webpages become unresponsive in Microsoft Edge
After installing KB4480116, some Microsoft Edge users report that they:
  • Cannot load webpages using a local IP address. 
  • Cannot load webpages on the Internet using a VPN connection.
Browsing fails or the webpage may become unresponsive.
Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709
Resolution: This issue is resolved in KB4487044

Back to top
OS Build 17763.253

January 08, 2019
KB4480116
Resolved
KB4487044
Resolved:
February 12, 2019
10:00 AM PT

Opened:
January 08, 2019
10:00 AM PT
Unable to access hotspots with third-party applications
After installing KB4480116, third-party applications may have difficulty authenticating hotspots. 
Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 8.1
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2
Resolution: This issue is resolved in KB4476976

Back to top
OS Build 17763.253

January 08, 2019
KB4480116
Resolved
KB4476976
Resolved:
January 22, 2019
02:00 PM PT

Opened:
January 08, 2019
10:00 AM PT
" @@ -112,7 +112,7 @@ sections: - type: markdown text: " - +
DetailsOriginating updateStatusHistory
Microsoft Edge may crash or hang while playing video
nVidia has notified Microsoft of an issue where Microsoft Edge may crash or hang while playing video. This issue occurs following an nVidia driver update.

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019
  • Server: Windows Server, version 1809; Windows Server 2019

Resolution: nVidia has released an updated driver to address this issue. Please follow the instructions found in nVidia's support article

Back to top
OS Build 17763.165

December 05, 2018
KB4469342
Resolved
Resolved:
November 29, 2018
10:03 AM PT

Opened:
December 05, 2018
02:00 PM PT
Microsoft Edge may crash or hang while playing video
nVidia has notified Microsoft of an issue where Microsoft Edge may crash or hang while playing video. This issue occurs following an nVidia driver update.
Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019
  • Server: Windows Server, version 1809; Windows Server 2019
Resolution: nVidia has released an updated driver to address this issue. Please follow the instructions found in nVidia's support article

Back to top
OS Build 17763.165

December 05, 2018
KB4469342
Resolved
Resolved:
November 29, 2018
10:03 AM PT

Opened:
December 05, 2018
02:00 PM PT
" @@ -121,14 +121,14 @@ sections: - type: markdown text: " - - - - - - - - + + + + + + + +
DetailsOriginating updateStatusHistory
Audio stops working after installing Intel audio driver
Upgrade block: Intel unintentionally released version 9.21.00.3755 of the Intel Smart Sound Technology (ISST) Driver through Windows Update and inadvertently offered it to a range of devices running Window 10, version 1709, 1803, and 1809. If a device contained a compatible audio driver, the new driver overrode it and caused audio to stop working.

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019
  • Server: Windows Server, version 1809; Windows Server 2019
 
Resolution: This issue was resolved in KB4468550 and the upgrade block removed. 

Back to top
OS Build 17763.134

November 13, 2018
KB4467708
Resolved
KB4468550
Resolved:
December 07, 2018
10:00 AM PT

Opened:
November 13, 2018
10:00 AM PT
Mapped drives fail to reconnect after login
Upgrade block: Network drives may fail to reconnect after booting and logging on to a Windows device. Symptoms include:  
  • In Windows Explorer, a red X appears on the mapped network drives. 
  • Mapped network drives show as Unavailable when you run the net use command from a command prompt. 
  • In the notification area, a notification displays the following message, \"Could not reconnect all network drives.\"

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019
  • Server: Windows Server, version 1809; Windows Server 2019

Resolution: This issue was resolved in KB4469342 and the upgrade block removed. 

Back to top
OS Build 17763.134

November 13, 2018
KB4467708
Resolved
KB4469342
Resolved:
December 05, 2018
02:00 PM PT

Opened:
November 13, 2018
10:00 AM PT
Shared albums may not sync with iCloud for Windows
Upgrade block: Users who attempt to install iCloud for Windows (version 7.7.0.27) will see a message displayed that this version iCloud for Windows isn't supported and the install will fail.

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019
  • Server: Windows Server, version 1809; Windows Server 2019

To ensure a seamless experience, Microsoft is blocking devices with iCloud for Windows (version 7.7.0.27) software installed from being offered Window 10, version 1809 until this issue has been resolved. 

We recommend that you do not attempt to manually update using the Update now button or the Media Creation Tool from the Microsoft software download website until this issue is resolved. 
 
Resolution: Apple has released an updated version of iCloud for Windows (version 7.8.1) that resolves compatibility issues encountered when updating or synching Shared Albums after updating to Windows 10, version 1809. We recommend that you update your iCloud for Windows to version 7.8.1 when prompted before attempting to upgrade to Windows 10, version 1809. You can also manually download the latest version of iCloud for Windows by visiting https://support.apple.com/en-us/HT204283.

Back to top
OS Build 17763.134

November 13, 2018
KB4467708
Resolved
KB4482887
Resolved:
March 01, 2019
10:00 AM PT

Opened:
November 13, 2018
10:00 AM PT
Intel Audio Display (intcdaud.sys) notification during Windows 10 Setup
Upgrade block: Microsoft and Intel have identified a compatibility issue with a range of Intel Display Audio device drivers (intcdaud.sys, versions 10.25.0.3 - 10.25.0.8) that may result in excessive processor demand and reduced battery life. As a result, the update process to the Windows 10 October 2018 Update (Windows 10, version 1809) will fail and affected devices will automatically revert to the previous working configuration. 

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019
  • Server: Windows Server, version 1809; Windows Server 2019

If you see a \"What needs your attention\" notification during installation of the October 2018 Update, you have one of these affected drivers on your system. On the notification, click Back to remain on your current version of Windows 10. 
 
To ensure a seamless experience, we are blocking devices from being offered the October 2018 Update until updated Intel device drivers are installed on your current operating system. We recommend that you do not attempt to manually update to Windows 10, version 1809, using the Update Now button or the Media Creation Tool from the Microsoft Software Download Center until newer Intel device drivers are available with the update. You can either wait for newer drivers to be installed automatically through Windows Update or check with your computer manufacturer for the latest device driver software availability and installation procedures. For more information about this issue, see Intel's customer support guidance.
 
Resolution: This issue was resolved in KB4482887 and the upgrade block removed. 

Back to top
OS Build 17763.134

November 13, 2018
KB4467708
Resolved
KB4482887
Resolved:
March 01, 2019
10:00 AM PT

Opened:
November 13, 2018
10:00 AM PT
Office apps (32-bit) unable to use 'Save As…' function
Upgrade block: Microsoft and Morphisec have identified an issue on devices that have installed Morphisec Protector or another application that uses the Morphisec Software Development Kit (SDK) including Cisco AMP for Endpoints. These applications may impact customers' ability to use the 'Save As.'dialog when saving documents in 32-bit versions of Microsoft Office applications. Saving of files is not impacted.

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019
  • Server: Windows Server, version 1809; Windows Server 2019

Resolution: Morphisec and Cisco have released updated versions of their applications to address this issue. We recommend customers update to these minimum versions before attempting to attempting to upgrade to Windows 10, version 1809:
  • Morphisec Protector version 2.4.8 
  • Cisco AMP for Endpoints version 6.2.3.10814

An upgrade block remains in place for earlier versions of the applications than those listed above.

Back to top
OS Build 17763.134

November 13, 2018
KB4467708
Resolved
Resolved:
December 06, 2018
12:00 PM PT

Opened:
November 13, 2018
10:00 AM PT
Trend Micro OfficeScan and Worry-Free Business Security AV software not compatible
Upgrade block: Microsoft and Trend Micro have identified a compatibility issue with Trend Micro's OfficeScan and Worry-Free Business Security software when attempting to update to Windows 10, version 1809.

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019
  • Server: Windows Server, version 1809; Windows Server 2019 

Resolution: Trend Micro has released a new version of these products that resolves the issue. To download them, please visit the Trend Micro Business Support Portal.

Once you have updated your version of Trend Micro's OfficeScan or Worry-Free Business Security software, you will be offered Windows 10, version 1809 automatically. 

Back to top
OS Build 17763.134

November 13, 2018
KB4467708
Resolved
Resolved:
February 01, 2019
09:00 AM PT

Opened:
November 13, 2018
10:00 AM PT
Issues with lock screen and Microsoft Edge tabs for certain AMD Radeon video cards
Note: AMD no longer supports Radeon HD2000 and HD4000 series graphic processor units (GPUs).
 
Upgrade block: After updating to Window 10, version 1809, Microsoft Edge tabs may stop working when a device is configured with AMD Radeon HD2000 or HD4000 series video cards. Customers may get the following error code: \"INVALID_POINTER_READ_c0000005_atidxx64.dll\". 
 
Some users may also experience performance issues with the lock screen or the ShellExperienceHost. (The lock screen hosts widgets, and the ShellExperienceHost is responsible for assorted shell functionality.) 

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019
  • Server: Windows Server, version 1809; Windows Server 2019

Resolution: This issue was resolved in KB4487044, and the block was removed.

Back to top
OS Build 17763.134

November 13, 2018
KB4467708
Resolved
KB4487044
Resolved:
February 12, 2019
10:00 AM PT

Opened:
November 13, 2018
10:00 AM PT
F5 VPN clients losing network connectivity
Upgrade block: After updating to Window 10, version 1809, F5 VPN clients may lose network connectivity when the VPN service is in a split tunnel configuration.

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019
  • Server: Windows Server, version 1809; Windows Server 2019

Resolution: This issue was resolved in KB4482887 and the upgrade block removed. 

Back to top
OS Build 17763.134

November 13, 2018
KB4467708
Resolved
KB4482887
Resolved:
March 01, 2019
10:00 AM PT

Opened:
November 13, 2018
10:00 AM PT
Audio stops working after installing Intel audio driver
Upgrade block: Intel unintentionally released version 9.21.00.3755 of the Intel Smart Sound Technology (ISST) Driver through Windows Update and inadvertently offered it to a range of devices running Window 10, version 1709, 1803, and 1809. If a device contained a compatible audio driver, the new driver overrode it and caused audio to stop working.
Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019
  • Server: Windows Server, version 1809; Windows Server 2019
 
Resolution: This issue was resolved in KB4468550 and the upgrade block removed. 

Back to top
OS Build 17763.134

November 13, 2018
KB4467708
Resolved
KB4468550
Resolved:
December 07, 2018
10:00 AM PT

Opened:
November 13, 2018
10:00 AM PT
Mapped drives fail to reconnect after login
Upgrade block: Network drives may fail to reconnect after booting and logging on to a Windows device. Symptoms include:  
  • In Windows Explorer, a red X appears on the mapped network drives. 
  • Mapped network drives show as Unavailable when you run the net use command from a command prompt. 
  • In the notification area, a notification displays the following message, \"Could not reconnect all network drives.\"
Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019
  • Server: Windows Server, version 1809; Windows Server 2019
Resolution: This issue was resolved in KB4469342 and the upgrade block removed. 

Back to top
OS Build 17763.134

November 13, 2018
KB4467708
Resolved
KB4469342
Resolved:
December 05, 2018
02:00 PM PT

Opened:
November 13, 2018
10:00 AM PT
Shared albums may not sync with iCloud for Windows
Upgrade block: Users who attempt to install iCloud for Windows (version 7.7.0.27) will see a message displayed that this version iCloud for Windows isn't supported and the install will fail.
Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019
  • Server: Windows Server, version 1809; Windows Server 2019
To ensure a seamless experience, Microsoft is blocking devices with iCloud for Windows (version 7.7.0.27) software installed from being offered Window 10, version 1809 until this issue has been resolved. 
We recommend that you do not attempt to manually update using the Update now button or the Media Creation Tool from the Microsoft software download website until this issue is resolved. 
 
Resolution: Apple has released an updated version of iCloud for Windows (version 7.8.1) that resolves compatibility issues encountered when updating or synching Shared Albums after updating to Windows 10, version 1809. We recommend that you update your iCloud for Windows to version 7.8.1 when prompted before attempting to upgrade to Windows 10, version 1809. You can also manually download the latest version of iCloud for Windows by visiting https://support.apple.com/en-us/HT204283.

Back to top
OS Build 17763.134

November 13, 2018
KB4467708
Resolved
KB4482887
Resolved:
March 01, 2019
10:00 AM PT

Opened:
November 13, 2018
10:00 AM PT
Intel Audio Display (intcdaud.sys) notification during Windows 10 Setup
Upgrade block: Microsoft and Intel have identified a compatibility issue with a range of Intel Display Audio device drivers (intcdaud.sys, versions 10.25.0.3 - 10.25.0.8) that may result in excessive processor demand and reduced battery life. As a result, the update process to the Windows 10 October 2018 Update (Windows 10, version 1809) will fail and affected devices will automatically revert to the previous working configuration. 
Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019
  • Server: Windows Server, version 1809; Windows Server 2019
If you see a \"What needs your attention\" notification during installation of the October 2018 Update, you have one of these affected drivers on your system. On the notification, click Back to remain on your current version of Windows 10. 
 
To ensure a seamless experience, we are blocking devices from being offered the October 2018 Update until updated Intel device drivers are installed on your current operating system. We recommend that you do not attempt to manually update to Windows 10, version 1809, using the Update Now button or the Media Creation Tool from the Microsoft Software Download Center until newer Intel device drivers are available with the update. You can either wait for newer drivers to be installed automatically through Windows Update or check with your computer manufacturer for the latest device driver software availability and installation procedures. For more information about this issue, see Intel's customer support guidance.
 
Resolution: This issue was resolved in KB4482887 and the upgrade block removed. 

Back to top
OS Build 17763.134

November 13, 2018
KB4467708
Resolved
KB4482887
Resolved:
March 01, 2019
10:00 AM PT

Opened:
November 13, 2018
10:00 AM PT
Office apps (32-bit) unable to use 'Save As…' function
Upgrade block: Microsoft and Morphisec have identified an issue on devices that have installed Morphisec Protector or another application that uses the Morphisec Software Development Kit (SDK) including Cisco AMP for Endpoints. These applications may impact customers' ability to use the 'Save As.'dialog when saving documents in 32-bit versions of Microsoft Office applications. Saving of files is not impacted.
Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019
  • Server: Windows Server, version 1809; Windows Server 2019
Resolution: Morphisec and Cisco have released updated versions of their applications to address this issue. We recommend customers update to these minimum versions before attempting to attempting to upgrade to Windows 10, version 1809:
  • Morphisec Protector version 2.4.8 
  • Cisco AMP for Endpoints version 6.2.3.10814
An upgrade block remains in place for earlier versions of the applications than those listed above.

Back to top
OS Build 17763.134

November 13, 2018
KB4467708
Resolved
Resolved:
December 06, 2018
12:00 PM PT

Opened:
November 13, 2018
10:00 AM PT
Trend Micro OfficeScan and Worry-Free Business Security AV software not compatible
Upgrade block: Microsoft and Trend Micro have identified a compatibility issue with Trend Micro's OfficeScan and Worry-Free Business Security software when attempting to update to Windows 10, version 1809.
Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019
  • Server: Windows Server, version 1809; Windows Server 2019 
Resolution: Trend Micro has released a new version of these products that resolves the issue. To download them, please visit the Trend Micro Business Support Portal.
Once you have updated your version of Trend Micro's OfficeScan or Worry-Free Business Security software, you will be offered Windows 10, version 1809 automatically. 

Back to top
OS Build 17763.134

November 13, 2018
KB4467708
Resolved
Resolved:
February 01, 2019
09:00 AM PT

Opened:
November 13, 2018
10:00 AM PT
Issues with lock screen and Microsoft Edge tabs for certain AMD Radeon video cards
Note: AMD no longer supports Radeon HD2000 and HD4000 series graphic processor units (GPUs).
 
Upgrade block: After updating to Window 10, version 1809, Microsoft Edge tabs may stop working when a device is configured with AMD Radeon HD2000 or HD4000 series video cards. Customers may get the following error code: \"INVALID_POINTER_READ_c0000005_atidxx64.dll\". 
 
Some users may also experience performance issues with the lock screen or the ShellExperienceHost. (The lock screen hosts widgets, and the ShellExperienceHost is responsible for assorted shell functionality.) 
Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019
  • Server: Windows Server, version 1809; Windows Server 2019
Resolution: This issue was resolved in KB4487044, and the block was removed.

Back to top
OS Build 17763.134

November 13, 2018
KB4467708
Resolved
KB4487044
Resolved:
February 12, 2019
10:00 AM PT

Opened:
November 13, 2018
10:00 AM PT
F5 VPN clients losing network connectivity
Upgrade block: After updating to Window 10, version 1809, F5 VPN clients may lose network connectivity when the VPN service is in a split tunnel configuration.
Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019
  • Server: Windows Server, version 1809; Windows Server 2019
Resolution: This issue was resolved in KB4482887 and the upgrade block removed. 

Back to top
OS Build 17763.134

November 13, 2018
KB4467708
Resolved
KB4482887
Resolved:
March 01, 2019
10:00 AM PT

Opened:
November 13, 2018
10:00 AM PT
" @@ -137,7 +137,7 @@ sections: - type: markdown text: " - - + +
DetailsOriginating updateStatusHistory
Users cannot set Win32 program defaults
After installing KB4464330, some users cannot set Win32 program defaults for certain app and file type combinations using the Open with... command or Settings > Apps > Default apps.
 
In some cases, Microsoft Notepad or other Win32 programs cannot be set as the default. 

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803

Resolution: This issue is resolved in KB4469342

Back to top
OS Build 17763.55

October 09, 2018
KB4464330
Resolved
KB4469342
Resolved:
December 05, 2018
02:00 PM PT

Opened:
October 09, 2018
10:00 AM PT
Unable to use Seek bar in Windows Media Player
After installing KB4464330, users may not be able to use the Seek bar in Windows Media Player when playing specific files. This issue does not affect normal playback. 

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 8.1; Windows 7, Service Pack 1
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2; Windows Server 2008 R2 SP1

Resolution: This issue is resolved in KB4471332

Back to top
OS Build 17763.55

October 09, 2018
KB4464330
Resolved
KB4471332
Resolved:
December 11, 2018
10:00 AM PT

Opened:
October 09, 2018
10:00 AM PT
Users cannot set Win32 program defaults
After installing KB4464330, some users cannot set Win32 program defaults for certain app and file type combinations using the Open with... command or Settings > Apps > Default apps.
 
In some cases, Microsoft Notepad or other Win32 programs cannot be set as the default. 
Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803
Resolution: This issue is resolved in KB4469342

Back to top
OS Build 17763.55

October 09, 2018
KB4464330
Resolved
KB4469342
Resolved:
December 05, 2018
02:00 PM PT

Opened:
October 09, 2018
10:00 AM PT
Unable to use Seek bar in Windows Media Player
After installing KB4464330, users may not be able to use the Seek bar in Windows Media Player when playing specific files. This issue does not affect normal playback. 
Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 8.1; Windows 7, Service Pack 1
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2; Windows Server 2008 R2 SP1
Resolution: This issue is resolved in KB4471332

Back to top
OS Build 17763.55

October 09, 2018
KB4464330
Resolved
KB4471332
Resolved:
December 11, 2018
10:00 AM PT

Opened:
October 09, 2018
10:00 AM PT
" diff --git a/windows/release-information/resolved-issues-windows-7-and-windows-server-2008-r2-sp1.yml b/windows/release-information/resolved-issues-windows-7-and-windows-server-2008-r2-sp1.yml index 8ec9481208..3098e31877 100644 --- a/windows/release-information/resolved-issues-windows-7-and-windows-server-2008-r2-sp1.yml +++ b/windows/release-information/resolved-issues-windows-7-and-windows-server-2008-r2-sp1.yml @@ -59,7 +59,7 @@ sections: - type: markdown text: " - +
DetailsOriginating updateStatusHistory
Devices may not respond at login or Welcome screen if running certain Avast software.
Microsoft and Avast have identified an issue on devices running Avast for Business, Avast CloudCare, and AVG Business Edition antivirus software after you install KB4493472 and restart. Devices may become unresponsive at the login or Welcome screen. Additionally, you may be unable to log in or log in after an extended period of time.

Affected platforms: 
  • Client: Windows 8.1; Windows 7, Service Pack 1 
  • Server: Windows Server 2012 R2; Windows Server 2008 R2 SP1 

Resolution: Avast has released emergency updates to address this issue. For more information and AV update schedule, see the Avast support KB article.

Back to top
April 09, 2019
KB4493472
Resolved
Resolved:
April 09, 2019
10:00 AM PT

Opened:
April 09, 2019
10:00 AM PT
Devices may not respond at login or Welcome screen if running certain Avast software.
Microsoft and Avast have identified an issue on devices running Avast for Business, Avast CloudCare, and AVG Business Edition antivirus software after you install KB4493472 and restart. Devices may become unresponsive at the login or Welcome screen. Additionally, you may be unable to log in or log in after an extended period of time.
Affected platforms: 
  • Client: Windows 8.1; Windows 7, Service Pack 1 
  • Server: Windows Server 2012 R2; Windows Server 2008 R2 SP1 
Resolution: Avast has released emergency updates to address this issue. For more information and AV update schedule, see the Avast support KB article.

Back to top
April 09, 2019
KB4493472
Resolved
Resolved:
April 09, 2019
10:00 AM PT

Opened:
April 09, 2019
10:00 AM PT
" @@ -68,8 +68,8 @@ sections: - type: markdown text: " - - + +
DetailsOriginating updateStatusHistory
Custom URI schemes may not start corresponding application.
After installing KB4489878, custom URI schemes for application protocol handlers may not start the corresponding application for local intranet and trusted sites on Internet Explorer.

Affected platforms: 
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 8.1; Windows 7, Service Pack 1 
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2; Windows Server 2008 R2 SP1 

Resolution: This issue is resolved in KB4493472.

Back to top
March 12, 2019
KB4489878
Resolved
KB4493472
Resolved:
April 09, 2019
10:00 AM PT

Opened:
March 12, 2019
10:00 AM PT
NETDOM.EXE fails to run.
After installing KB4489878, NETDOM.EXE fails to run, and the on-screen error, “The command failed to complete successfully.” appears.

Affected platforms: 
  • Client: Windows 7, Service Pack 1 
  • Server: Windows Server 2008 R2 SP1 

Resolution: This issue is resolved in KB4493472.

Back to top
March 12, 2019
KB4489878
Resolved
KB4493472
Resolved:
April 09, 2019
10:00 AM PT

Opened:
March 12, 2019
10:00 AM PT
Custom URI schemes may not start corresponding application.
After installing KB4489878, custom URI schemes for application protocol handlers may not start the corresponding application for local intranet and trusted sites on Internet Explorer.
Affected platforms: 
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 8.1; Windows 7, Service Pack 1 
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2; Windows Server 2008 R2 SP1 
Resolution: This issue is resolved in KB4493472.

Back to top
March 12, 2019
KB4489878
Resolved
KB4493472
Resolved:
April 09, 2019
10:00 AM PT

Opened:
March 12, 2019
10:00 AM PT
NETDOM.EXE fails to run.
After installing KB4489878, NETDOM.EXE fails to run, and the on-screen error, “The command failed to complete successfully.” appears.
Affected platforms: 
  • Client: Windows 7, Service Pack 1 
  • Server: Windows Server 2008 R2 SP1 
Resolution: This issue is resolved in KB4493472.

Back to top
March 12, 2019
KB4489878
Resolved
KB4493472
Resolved:
April 09, 2019
10:00 AM PT

Opened:
March 12, 2019
10:00 AM PT
" @@ -78,8 +78,8 @@ sections: - type: markdown text: " - - + +
DetailsOriginating updateStatusHistory
Internet Explorer may fail to load images.
After installing KB4486563, Internet Explorer may fail to load images with a backslash (\\) in their relative source path.

Affected platforms: 
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 8.1; Windows 7, Service Pack 1 
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2; Windows Server 2008 R2 SP1 

Resolution: This issue is resolved in KB4486565.

Back to top
February 12, 2019
KB4486563
Resolved
KB4486565
Resolved:
February 19, 2019
02:00 PM PT

Opened:
February 12, 2019
10:00 AM PT
Applications using Microsoft Jet database and Access 95 file format stop working.
Applications that use a Microsoft Jet database with the Microsoft Access 95 file format may randomly stop working.

Affected platforms: 
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 7, Service Pack 1 
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2008 R2 SP1 

Resolution: This issue is resolved in KB4486565.

Back to top
February 12, 2019
KB4486563
Resolved
KB4486565
Resolved:
February 19, 2019
02:00 PM PT

Opened:
February 12, 2019
10:00 AM PT
Internet Explorer may fail to load images.
After installing KB4486563, Internet Explorer may fail to load images with a backslash (\\) in their relative source path.
Affected platforms: 
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 8.1; Windows 7, Service Pack 1 
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2; Windows Server 2008 R2 SP1 
Resolution: This issue is resolved in KB4486565.

Back to top
February 12, 2019
KB4486563
Resolved
KB4486565
Resolved:
February 19, 2019
02:00 PM PT

Opened:
February 12, 2019
10:00 AM PT
Applications using Microsoft Jet database and Access 95 file format stop working.
Applications that use a Microsoft Jet database with the Microsoft Access 95 file format may randomly stop working.
Affected platforms: 
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 7, Service Pack 1 
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2008 R2 SP1 
Resolution: This issue is resolved in KB4486565.

Back to top
February 12, 2019
KB4486563
Resolved
KB4486565
Resolved:
February 19, 2019
02:00 PM PT

Opened:
February 12, 2019
10:00 AM PT
" @@ -88,11 +88,11 @@ sections: - type: markdown text: " - - - - - + + + + +
DetailsOriginating updateStatusHistory
Local Administrators unable to remotely access shares.
Local users who are part of the local Administrators group may not be able to remotely access shares on Windows Server 2008 R2 and Windows 7 machines after installing KB4480970. This does not affect domain accounts in the local Administrators group.
 
Affected platforms: 
  • Client: Windows 7, Service Pack 1 
  • Server: Windows Server 2008 R2 SP1 

Resolution: This issue is resolved in KB4487345.

Back to top
January 08, 2019
KB4480970
Resolved
KB4487345
Resolved:
January 11, 2019
02:00 PM PT

Opened:
January 08, 2019
10:00 AM PT
Applications using Microsoft Jet database fail to open.
Applications that use a Microsoft Jet database with the Microsoft Access 97 file format may fail to open if the database has column names greater than 32 characters. The database will fail to open with the error, “Unrecognized Database Format”.

Affected Platforms:
  • Client: Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 8.1; Windows 7, Service Pack 1 
  • Server: Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2; Windows Server 2008 R2 SP1 


Resolution: This issue is resolved in KB4486563.

Back to top
January 08, 2019
KB4480970
Resolved
KB4486563
Resolved:
February 12, 2019
10:00 AM PT

Opened:
January 08, 2019
10:00 AM PT
Virtual machines fail to restore.
After installing KB4480970, virtual machines (VM) may fail to restore successfully if the VM has been saved and restored once before. The error message is, “Failed to restore the virtual machine state: Cannot restore this virtual machine because the saved state data cannot be read. Delete the saved state data and then try to start the virtual machine. (0xC0370027).”

This affects AMD Bulldozer Family 15h, AMD Jaguar Family 16h, and AMD Puma Family 16h (second generation) microarchitectures.

Affected platforms: 
  • Client: Windows 7, Service Pack 1 
  • Server: Windows Server 2008 R2 SP1 

Resolution: This issue is resolved in KB4490511.

Back to top
January 08, 2019
KB4480970
Resolved
KB4490511
Resolved:
February 19, 2019
02:00 PM PT

Opened:
January 08, 2019
10:00 AM PT
Internet Explorer 11 authentication issue with multiple concurrent logons.
After installing KB4480970, Internet Explorer 11 and other applications that use WININET.DLL may have authentication issues. This occurs when two or more people use the same user account for multiple, concurrent login sessions on the same Windows Server machine, including Remote Desktop Protocol (RDP) and Terminal Server logons. Symptoms reported by customers include, but may not be limited to:
  • Cache size and location show zero or empty.
  • Keyboard shortcuts may not work properly.
  • Webpages may intermittently fail to load or render correctly.
  • Issues with credential prompts.
  • Issues when downloading files.

Affected platforms: 
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10 Enterprise LTSC 2016; Windows 8.1; Windows 7, Service Pack 1 
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server 2016; Windows Server 2012 R2; Windows Server 2008 R2 SP1 

Resolution: This issue is resolved in KB4493472.

Back to top
January 08, 2019
KB4480970
Resolved
KB4493472
Resolved:
April 09, 2019
10:00 AM PT

Opened:
January 08, 2019
10:00 AM PT
First character of the Japanese era name not recognized as an abbreviation.
After installing KB4480955, the first character of the Japanese era name is not recognized as an abbreviation and may cause date parsing issues.

Affected platforms: 
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 8.1; Windows 7, Service Pack 1 
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2; Windows Server 2008 R2 SP1 

Resolution: This issue is resolved in KB4486565.

Back to top
January 17, 2019
KB4480955
Resolved
KB4486565
Resolved:
February 19, 2019
02:00 PM PT

Opened:
January 17, 2019
10:00 AM PT
Local Administrators unable to remotely access shares.
Local users who are part of the local Administrators group may not be able to remotely access shares on Windows Server 2008 R2 and Windows 7 machines after installing KB4480970. This does not affect domain accounts in the local Administrators group.
 
Affected platforms: 
  • Client: Windows 7, Service Pack 1 
  • Server: Windows Server 2008 R2 SP1 
Resolution: This issue is resolved in KB4487345.

Back to top
January 08, 2019
KB4480970
Resolved
KB4487345
Resolved:
January 11, 2019
02:00 PM PT

Opened:
January 08, 2019
10:00 AM PT
Applications using Microsoft Jet database fail to open.
Applications that use a Microsoft Jet database with the Microsoft Access 97 file format may fail to open if the database has column names greater than 32 characters. The database will fail to open with the error, “Unrecognized Database Format”.
Affected Platforms:
  • Client: Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 8.1; Windows 7, Service Pack 1 
  • Server: Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2; Windows Server 2008 R2 SP1 
Resolution: This issue is resolved in KB4486563.

Back to top
January 08, 2019
KB4480970
Resolved
KB4486563
Resolved:
February 12, 2019
10:00 AM PT

Opened:
January 08, 2019
10:00 AM PT
Virtual machines fail to restore.
After installing KB4480970, virtual machines (VM) may fail to restore successfully if the VM has been saved and restored once before. The error message is, “Failed to restore the virtual machine state: Cannot restore this virtual machine because the saved state data cannot be read. Delete the saved state data and then try to start the virtual machine. (0xC0370027).”
This affects AMD Bulldozer Family 15h, AMD Jaguar Family 16h, and AMD Puma Family 16h (second generation) microarchitectures.
Affected platforms: 
  • Client: Windows 7, Service Pack 1 
  • Server: Windows Server 2008 R2 SP1 
Resolution: This issue is resolved in KB4490511.

Back to top
January 08, 2019
KB4480970
Resolved
KB4490511
Resolved:
February 19, 2019
02:00 PM PT

Opened:
January 08, 2019
10:00 AM PT
Internet Explorer 11 authentication issue with multiple concurrent logons.
After installing KB4480970, Internet Explorer 11 and other applications that use WININET.DLL may have authentication issues. This occurs when two or more people use the same user account for multiple, concurrent login sessions on the same Windows Server machine, including Remote Desktop Protocol (RDP) and Terminal Server logons. Symptoms reported by customers include, but may not be limited to:
  • Cache size and location show zero or empty.
  • Keyboard shortcuts may not work properly.
  • Webpages may intermittently fail to load or render correctly.
  • Issues with credential prompts.
  • Issues when downloading files.
Affected platforms: 
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10 Enterprise LTSC 2016; Windows 8.1; Windows 7, Service Pack 1 
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server 2016; Windows Server 2012 R2; Windows Server 2008 R2 SP1 
Resolution: This issue is resolved in KB4493472.

Back to top
January 08, 2019
KB4480970
Resolved
KB4493472
Resolved:
April 09, 2019
10:00 AM PT

Opened:
January 08, 2019
10:00 AM PT
First character of the Japanese era name not recognized as an abbreviation.
After installing KB4480955, the first character of the Japanese era name is not recognized as an abbreviation and may cause date parsing issues.
Affected platforms: 
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 8.1; Windows 7, Service Pack 1 
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2; Windows Server 2008 R2 SP1 
Resolution: This issue is resolved in KB4486565.

Back to top
January 17, 2019
KB4480955
Resolved
KB4486565
Resolved:
February 19, 2019
02:00 PM PT

Opened:
January 17, 2019
10:00 AM PT
" @@ -101,7 +101,7 @@ sections: - type: markdown text: " - - + +
DetailsOriginating updateStatusHistory
Unable to use Seek bar in Windows Media Player
After installing KB4462923, users may not be able to use the Seek Bar in Windows Media Player when playing specific files. This issue does not affect normal playback.

Affected platforms: 
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 8.1; Windows 7, Service Pack 1.
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2; Windows Server 2008 R2 SP1

Resolution: This issue is resolved in KB4471318.

Back to top
October 09, 2018
KB4462923
Resolved
KB4471318
Resolved:
December 11, 2018
10:00 AM PT

Opened:
October 09, 2018
10:00 AM PT
Event Viewer may not show some event descriptions for network interface cards.
After installing KB4462927, the Event Viewer may not show some event descriptions for network interface cards (NICs).

Affected Platforms:
  • Client: Windows 7, Service Pack 1 
  • Server: Windows Server 2008 R2 SP1 

Resolution: This issue is resolved in KB4489878.

Back to top
October 18, 2018
KB4462927
Resolved
KB4489878
Resolved:
March 12, 2019
10:00 AM PT

Opened:
October 18, 2018
10:00 AM PT
Unable to use Seek bar in Windows Media Player
After installing KB4462923, users may not be able to use the Seek Bar in Windows Media Player when playing specific files. This issue does not affect normal playback.
Affected platforms: 
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 8.1; Windows 7, Service Pack 1.
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2; Windows Server 2008 R2 SP1
Resolution: This issue is resolved in KB4471318.

Back to top
October 09, 2018
KB4462923
Resolved
KB4471318
Resolved:
December 11, 2018
10:00 AM PT

Opened:
October 09, 2018
10:00 AM PT
Event Viewer may not show some event descriptions for network interface cards.
After installing KB4462927, the Event Viewer may not show some event descriptions for network interface cards (NICs).
Affected Platforms:
  • Client: Windows 7, Service Pack 1 
  • Server: Windows Server 2008 R2 SP1 
Resolution: This issue is resolved in KB4489878.

Back to top
October 18, 2018
KB4462927
Resolved
KB4489878
Resolved:
March 12, 2019
10:00 AM PT

Opened:
October 18, 2018
10:00 AM PT
" diff --git a/windows/release-information/resolved-issues-windows-8.1-and-windows-server-2012-r2.yml b/windows/release-information/resolved-issues-windows-8.1-and-windows-server-2012-r2.yml index aae936db92..4b7dbda94b 100644 --- a/windows/release-information/resolved-issues-windows-8.1-and-windows-server-2012-r2.yml +++ b/windows/release-information/resolved-issues-windows-8.1-and-windows-server-2012-r2.yml @@ -60,7 +60,7 @@ sections: - type: markdown text: " - +
DetailsOriginating updateStatusHistory
Devices may not respond at login or Welcome screen if running certain Avast software
Microsoft and Avast have identified an issue on devices running Avast for Business, Avast CloudCare, and AVG Business Edition antivirus software after you install KB4493446 and restart. Devices may become unresponsive at the login or Welcome screen. Additionally, you may be unable to log in or log in after an extended period of time.

Affected platforms: 
  • Client: Windows 8.1; Windows 7, Service Pack 1 
  • Server: Windows Server 2012 R2; Windows Server 2008 R2 SP1 


Resolution: Avast has released emergency updates to address this issue. For more information and AV update schedule, see the Avast support KB article.

Back to top
April 09, 2019
KB4493446
Resolved
Resolved:
April 09, 2019
10:00 AM PT

Opened:
April 09, 2019
10:00 AM PT
Devices may not respond at login or Welcome screen if running certain Avast software
Microsoft and Avast have identified an issue on devices running Avast for Business, Avast CloudCare, and AVG Business Edition antivirus software after you install KB4493446 and restart. Devices may become unresponsive at the login or Welcome screen. Additionally, you may be unable to log in or log in after an extended period of time.
Affected platforms: 
  • Client: Windows 8.1; Windows 7, Service Pack 1 
  • Server: Windows Server 2012 R2; Windows Server 2008 R2 SP1 
Resolution: Avast has released emergency updates to address this issue. For more information and AV update schedule, see the Avast support KB article.

Back to top
April 09, 2019
KB4493446
Resolved
Resolved:
April 09, 2019
10:00 AM PT

Opened:
April 09, 2019
10:00 AM PT
" @@ -69,8 +69,8 @@ sections: - type: markdown text: " - - + +
DetailsOriginating updateStatusHistory
Custom URI schemes may not start corresponding application
After installing KB4489881, custom URI schemes for application protocol handlers may not start the corresponding application for local intranet and trusted sites security zones on Internet Explorer.

Affected platforms: 
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 8.1; Windows 7, Service Pack 1 
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2; Windows Server 2008 R2 SP1 

Resolution: This issue is resolved in KB4493446.

Back to top
March 12, 2019
KB4489881
Resolved
KB4493446
Resolved:
April 09, 2019
10:00 AM PT

Opened:
March 12, 2019
10:00 AM PT
Devices with winsock kernel client may receive error
After installing KB4489881, devices with a winsock kernel client may receive D1, FC, and other errors. Additionally, systems that run the Skype for Business or Lync Server Edge Transport role may be affected by this issue.

Affected platforms: 
  • Client: Windows 8.1 
  • Server: Windows Server 2012 R2 

Resolution: This issue is resolved in KB4489893.

Back to top
March 12, 2019
KB4489881
Resolved
KB4489893
Resolved:
March 19, 2019
10:00 AM PT

Opened:
March 12, 2019
10:00 AM PT
Custom URI schemes may not start corresponding application
After installing KB4489881, custom URI schemes for application protocol handlers may not start the corresponding application for local intranet and trusted sites security zones on Internet Explorer.
Affected platforms: 
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 8.1; Windows 7, Service Pack 1 
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2; Windows Server 2008 R2 SP1 
Resolution: This issue is resolved in KB4493446.

Back to top
March 12, 2019
KB4489881
Resolved
KB4493446
Resolved:
April 09, 2019
10:00 AM PT

Opened:
March 12, 2019
10:00 AM PT
Devices with winsock kernel client may receive error
After installing KB4489881, devices with a winsock kernel client may receive D1, FC, and other errors. Additionally, systems that run the Skype for Business or Lync Server Edge Transport role may be affected by this issue.
Affected platforms: 
  • Client: Windows 8.1 
  • Server: Windows Server 2012 R2 
Resolution: This issue is resolved in KB4489893.

Back to top
March 12, 2019
KB4489881
Resolved
KB4489893
Resolved:
March 19, 2019
10:00 AM PT

Opened:
March 12, 2019
10:00 AM PT
" @@ -79,9 +79,9 @@ sections: - type: markdown text: " - - - + + +
DetailsOriginating updateStatusHistory
Error 1309 when installing/uninstalling MSI or MSP files
After installing KB4487016, users may receive “Error 1309” while installing or uninstalling certain types of MSI and MSP files.

Affected platforms: 
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 8.1 
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2 

Resolution: This issue is resolved in KB4489881.

Back to top
February 19, 2019
KB4487016
Resolved
KB4489881
Resolved:
March 12, 2019
10:00 AM PT

Opened:
February 19, 2019
02:00 PM PT
Embedded objects may display incorrectly
Any compound document (OLE) server application that places embedded objects into the Windows Metafile (WMF) using the PatBlt API may display embedded objects incorrectly.

For example, if you paste a Microsoft Excel worksheet object into a Microsoft Word document, the cells may render with a different background color.

Affected platforms: 
  • Client: Windows 8.1 
  • Server: Windows Server 2012 R2 

Resolution: This issue is resolved in KB4493446.

Back to top
February 12, 2019
KB4487000
Resolved
KB4493446
Resolved:
April 09, 2019
10:00 AM PT

Opened:
February 12, 2019
10:00 AM PT
Internet Explorer may fail to load images
After installing KB4487000, Internet Explorer may fail to load images with a backslash (\\) in their relative source path.

Affected platforms: 
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 8.1; Windows 7, Service Pack 1 
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2; Windows Server 2008 R2 SP1 

Resolution: This issue is resolved in KB4487016.

Back to top
February 12, 2019
KB4487000
Resolved
KB4487016
Resolved:
February 19, 2019
02:00 PM PT

Opened:
February 12, 2019
10:00 AM PT
Error 1309 when installing/uninstalling MSI or MSP files
After installing KB4487016, users may receive “Error 1309” while installing or uninstalling certain types of MSI and MSP files.
Affected platforms: 
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 8.1 
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2 
Resolution: This issue is resolved in KB4489881.

Back to top
February 19, 2019
KB4487016
Resolved
KB4489881
Resolved:
March 12, 2019
10:00 AM PT

Opened:
February 19, 2019
02:00 PM PT
Embedded objects may display incorrectly
Any compound document (OLE) server application that places embedded objects into the Windows Metafile (WMF) using the PatBlt API may display embedded objects incorrectly.
For example, if you paste a Microsoft Excel worksheet object into a Microsoft Word document, the cells may render with a different background color.
Affected platforms: 
  • Client: Windows 8.1 
  • Server: Windows Server 2012 R2 
Resolution: This issue is resolved in KB4493446.

Back to top
February 12, 2019
KB4487000
Resolved
KB4493446
Resolved:
April 09, 2019
10:00 AM PT

Opened:
February 12, 2019
10:00 AM PT
Internet Explorer may fail to load images
After installing KB4487000, Internet Explorer may fail to load images with a backslash (\\) in their relative source path.
Affected platforms: 
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 8.1; Windows 7, Service Pack 1 
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2; Windows Server 2008 R2 SP1 
Resolution: This issue is resolved in KB4487016.

Back to top
February 12, 2019
KB4487000
Resolved
KB4487016
Resolved:
February 19, 2019
02:00 PM PT

Opened:
February 12, 2019
10:00 AM PT
" @@ -90,12 +90,12 @@ sections: - type: markdown text: " - - - - - - + + + + + +
DetailsOriginating updateStatusHistory
Unable to access hotspots with third-party applications
After installing KB4480963, third-party applications may have difficulty authenticating hotspots.

Affected platforms: 
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 8.1 
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2 

Resolution: This issue is resolved in KB4480969.

Back to top
January 08, 2019
KB4480963
Resolved
KB4480969
Resolved:
January 15, 2019
10:00 AM PT

Opened:
January 08, 2019
10:00 AM PT
Applications using Microsoft Jet database fail to open
Applications that use a Microsoft Jet database with the Microsoft Access 97 file format may fail to open if the database has column names greater than 32 characters. The database will fail to open with the error, “Unrecognized Database Format”.

Affected platforms: 
  • Client: Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 8.1; Windows 7, Service Pack 1 
  • Server: Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2; Windows Server 2008 R2 SP1 

Resolution: This issue is resolved in KB4487000.

Back to top
January 08, 2019
KB4480963
Resolved
KB4487000
Resolved:
February 12, 2019
10:00 AM PT

Opened:
January 08, 2019
10:00 AM PT
Virtual machines fail to restore
After installing KB4480963, virtual machines (VM) may fail to restore successfully if the VM has been saved and restored once before. The error message is, “Failed to restore the virtual machine state: Cannot restore this virtual machine because the saved state data cannot be read. Delete the saved state data and then try to start the virtual machine. (0xC0370027).”

This affects AMD Bulldozer Family 15h, AMD Jaguar Family 16h, and AMD Puma Family 16h (second generation) microarchitectures.

Resolution: This issue is resolved in KB4490512.

Back to top
January 08, 2019
KB4480963
Resolved
KB4490512
Resolved:
February 19, 2019
02:00 PM PT

Opened:
January 08, 2019
10:00 AM PT
Internet Explorer 11 authentication issue with multiple concurrent logons
After installing KB4480963, Internet Explorer 11 and other applications that use WININET.DLL may have authentication issues. This occurs when two or more people use the same user account for multiple, concurrent login sessions on the same Windows Server machine, including Remote Desktop Protocol (RDP) and Terminal Server logons. Symptoms reported by customers include, but may not be limited to:
  • Cache size and location show zero or empty.
  • Keyboard shortcuts may not work properly.
  • Webpages may intermittently fail to load or render correctly.
  • Issues with credential prompts.
  • Issues when downloading files.

Affected platforms: 
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10 Enterprise LTSC 2016; Windows 8.1; Windows 7, Service Pack 1 
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server 2016; Windows Server 2012 R2; Windows Server 2008 R2 SP1 

Resolution: This issue is resolved in KB4493446.

Back to top
January 08, 2019
KB4480963
Resolved
KB4493446
Resolved:
April 09, 2019
10:00 AM PT

Opened:
January 08, 2019
10:00 AM PT
MSXML6 may cause applications to stop responding.
After installing KB4480963, MSXML6 causes applications to stop responding if an exception was thrown during node operations, such as appendChild(), insertBefore(), and moveNode().

The Group Policy editor may stop responding when editing a Group Policy Object (GPO) that contains Group Policy Preferences (GPP) for Internet Explorer 10 settings.

Resolution: This issue is resolved in KB4493446.

Back to top
January 08, 2019
KB4480963
Resolved
KB4493446
Resolved:
April 09, 2019
10:00 AM PT

Opened:
January 08, 2019
10:00 AM PT
First character of the Japanese era name not recognized as an abbreviation
After installing KB4480969, the first character of the Japanese era name is not recognized as an abbreviation and may cause date parsing issues.

Affected platforms: 
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 8.1; Windows 7, Service Pack 1 
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2; Windows Server 2008 R2 SP1 

Resolution: This issue is resolved in KB4487016.

Back to top
January 15, 2019
KB4480969
Resolved
KB4487016
Resolved:
February 19, 2019
02:00 PM PT

Opened:
January 15, 2019
10:00 AM PT
Unable to access hotspots with third-party applications
After installing KB4480963, third-party applications may have difficulty authenticating hotspots.
Affected platforms: 
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 8.1 
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2 
Resolution: This issue is resolved in KB4480969.

Back to top
January 08, 2019
KB4480963
Resolved
KB4480969
Resolved:
January 15, 2019
10:00 AM PT

Opened:
January 08, 2019
10:00 AM PT
Applications using Microsoft Jet database fail to open
Applications that use a Microsoft Jet database with the Microsoft Access 97 file format may fail to open if the database has column names greater than 32 characters. The database will fail to open with the error, “Unrecognized Database Format”.
Affected platforms: 
  • Client: Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 8.1; Windows 7, Service Pack 1 
  • Server: Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2; Windows Server 2008 R2 SP1 
Resolution: This issue is resolved in KB4487000.

Back to top
January 08, 2019
KB4480963
Resolved
KB4487000
Resolved:
February 12, 2019
10:00 AM PT

Opened:
January 08, 2019
10:00 AM PT
Virtual machines fail to restore
After installing KB4480963, virtual machines (VM) may fail to restore successfully if the VM has been saved and restored once before. The error message is, “Failed to restore the virtual machine state: Cannot restore this virtual machine because the saved state data cannot be read. Delete the saved state data and then try to start the virtual machine. (0xC0370027).”
This affects AMD Bulldozer Family 15h, AMD Jaguar Family 16h, and AMD Puma Family 16h (second generation) microarchitectures.
Resolution: This issue is resolved in KB4490512.

Back to top
January 08, 2019
KB4480963
Resolved
KB4490512
Resolved:
February 19, 2019
02:00 PM PT

Opened:
January 08, 2019
10:00 AM PT
Internet Explorer 11 authentication issue with multiple concurrent logons
After installing KB4480963, Internet Explorer 11 and other applications that use WININET.DLL may have authentication issues. This occurs when two or more people use the same user account for multiple, concurrent login sessions on the same Windows Server machine, including Remote Desktop Protocol (RDP) and Terminal Server logons. Symptoms reported by customers include, but may not be limited to:
  • Cache size and location show zero or empty.
  • Keyboard shortcuts may not work properly.
  • Webpages may intermittently fail to load or render correctly.
  • Issues with credential prompts.
  • Issues when downloading files.
Affected platforms: 
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10 Enterprise LTSC 2016; Windows 8.1; Windows 7, Service Pack 1 
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server 2016; Windows Server 2012 R2; Windows Server 2008 R2 SP1 
Resolution: This issue is resolved in KB4493446.

Back to top
January 08, 2019
KB4480963
Resolved
KB4493446
Resolved:
April 09, 2019
10:00 AM PT

Opened:
January 08, 2019
10:00 AM PT
MSXML6 may cause applications to stop responding.
After installing KB4480963, MSXML6 causes applications to stop responding if an exception was thrown during node operations, such as appendChild(), insertBefore(), and moveNode().
The Group Policy editor may stop responding when editing a Group Policy Object (GPO) that contains Group Policy Preferences (GPP) for Internet Explorer 10 settings.
Resolution: This issue is resolved in KB4493446.

Back to top
January 08, 2019
KB4480963
Resolved
KB4493446
Resolved:
April 09, 2019
10:00 AM PT

Opened:
January 08, 2019
10:00 AM PT
First character of the Japanese era name not recognized as an abbreviation
After installing KB4480969, the first character of the Japanese era name is not recognized as an abbreviation and may cause date parsing issues.
Affected platforms: 
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 8.1; Windows 7, Service Pack 1 
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2; Windows Server 2008 R2 SP1 
Resolution: This issue is resolved in KB4487016.

Back to top
January 15, 2019
KB4480969
Resolved
KB4487016
Resolved:
February 19, 2019
02:00 PM PT

Opened:
January 15, 2019
10:00 AM PT
" @@ -104,6 +104,6 @@ sections: - type: markdown text: " - +
DetailsOriginating updateStatusHistory
Unable to use Seek bar in Windows Media Player
After installing KB4462926, users may not be able to use the Seek Bar in Windows Media Player when playing specific files. This issue does not affect normal playback.

Affected platforms: 
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 8.1; Windows 7, Service Pack 1 
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2; Windows Server 2008 R2 SP1 

Resolution: This issue is resolved in KB4471320.

Back to top
October 09, 2018
KB4462926
Resolved
KB4471320
Resolved:
December 11, 2018
10:00 AM PT

Opened:
October 09, 2018
10:00 AM PT
Unable to use Seek bar in Windows Media Player
After installing KB4462926, users may not be able to use the Seek Bar in Windows Media Player when playing specific files. This issue does not affect normal playback.
Affected platforms: 
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 8.1; Windows 7, Service Pack 1 
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2; Windows Server 2008 R2 SP1 
Resolution: This issue is resolved in KB4471320.

Back to top
October 09, 2018
KB4462926
Resolved
KB4471320
Resolved:
December 11, 2018
10:00 AM PT

Opened:
October 09, 2018
10:00 AM PT
" diff --git a/windows/release-information/resolved-issues-windows-server-2008-sp2.yml b/windows/release-information/resolved-issues-windows-server-2008-sp2.yml index 7611cd0050..afd2048e0f 100644 --- a/windows/release-information/resolved-issues-windows-server-2008-sp2.yml +++ b/windows/release-information/resolved-issues-windows-server-2008-sp2.yml @@ -55,13 +55,13 @@ sections: - type: markdown text: " - - - - - - - - + + + + + + + +
DetailsOriginating updateStatusHistory
Unable to use Seek bar in Windows Media Player
After installing KB4463097, users may not be able to use the Seek Bar in Windows Media Player when playing specific files. This issue does not affect normal playback.

Affected platforms: 
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 8.1; Windows 7, Service Pack 1
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2; Windows Server 2012; Windows Server 2008 R2 SP1; Windows Server 2008 SP2

Resolution: This issue is resolved in KB4471325.

Back to top
October 09, 2018
KB4463097
Resolved
KB4471325
Resolved:
December 11, 2018
10:00 AM PT

Opened:
April 25, 2019
03:28 PM PT
Applications using Microsoft Jet database fail to open
Applications that use a Microsoft Jet database with the Microsoft Access 97 file format may fail to open if the database has column names greater than 32 characters. The database will fail to open with the error, “Unrecognized Database Format”.

Affected platforms: 
  • Client: Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 8.1; Windows 7, Service Pack 1 
  • Server: Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2; Windows Server 2012; Windows Server 2008 R2 SP1; Windows Server 2008 SP2

Resolution: This issue is resolved in KB4487023.

Back to top
January 08, 2019
KB4480968
Resolved
KB4487023
Resolved:
February 12, 2019
10:00 AM PT

Opened:
April 25, 2019
03:32 PM PT
Virtual machines fail to restore
After installing KB4480968, virtual machines (VM) may fail to restore successfully if the VM has been saved and restored once before. The error message is, “Failed to restore the virtual machine state: Cannot restore this virtual machine because the saved state data cannot be read. Delete the saved state data and then try to start the virtual machine. (0xC0370027).”

This affects AMD Bulldozer Family 15h, AMD Jaguar Family 16h, and AMD Puma Family 16h (second generation) microarchitectures.

Affected platforms: 
  • Client: Windows 7, Service Pack 1 
  • Server: Windows Server 2012; Windows Server 2008 R2 SP1; Windows Server 2008 SP2

Resolution: This issue is resolved in KB4490514.

Back to top
January 08, 2019
KB4480968
Resolved
KB4490514
Resolved:
February 19, 2019
02:00 PM PT

Opened:
April 25, 2019
03:26 PM PT
Embedded objects may display incorrectly
Any compound document (OLE) server application that places embedded objects into the Windows Metafile (WMF) using the PatBlt API may display embedded objects incorrectly.

For example, if you paste a Microsoft Excel worksheet object into a Microsoft Word document, the cells may render with a different background color.

Affected platforms: 
  • Client: Windows 8.1 
  • Server: Windows Server 2012 R2; Windows Server 2012; Windows Server 2008 SP2

Resolution: This issue is resolved in KB4493471.

Back to top

Resolved
KB4493471
Resolved:
April 09, 2019
10:00 AM PT

Opened:
April 25, 2019
03:26 PM PT
First character of the Japanese era name not recognized as an abbreviation
After installing KB4480974, the first character of the Japanese era name is not recognized as an abbreviation and may cause date parsing issues.

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 8.1; Windows 7, Service Pack 1
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2; Windows Server 2012; Windows Server 2008 R2 SP1; Windows Server 2008 SP2

Resolution: This issue is resolved in KB4489880.

Back to top
January 17, 2019
KB4480974
Resolved
KB4489880
Resolved:
March 12, 2019
10:00 AM PT

Opened:
April 25, 2019
03:32 PM PT
Applications using Microsoft Jet database and Access 95 file format stop working
Applications that use a Microsoft Jet database with the Microsoft Access 95 file format may randomly stop working.

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 7, Service Pack 1
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012; Windows Server 2008 R2 SP1; Windows Server 2008 SP2

Resolution: This issue is resolved in KB4487022.

Back to top
February 12, 2019
KB4487023
Resolved
KB4487022
Resolved:
February 19, 2019
02:00 PM PT

Opened:
April 25, 2019
03:26 PM PT
Local Administrators unable to remotely access shares
Local users who are part of the local Administrators group may not be able to remotely access shares on Windows Server 2008 R2 and Windows 7 machines after installing KB4480968. This does not affect domain accounts in the local Administrators group.

Affected platforms: 
  • Client: Windows 7, Service Pack 1 
  • Server: Windows Server 2008 R2 SP1; Windows Server 2008 SP2

Resolution: This issue is resolved in KB4487354.

Back to top
January 08, 2019
KB4480968
Resolved
KB4487354
Resolved:
January 11, 2019
02:00 PM PT

Opened:
April 25, 2019
03:26 PM PT
NETDOM.EXE fails to run
After installing KB4489880, NETDOM.EXE fails to run, and the on-screen error, “The command failed to complete successfully.” appears.

Affected platforms: 
  • Client: Windows 7, Service Pack 1 
  • Server: Windows Server 2008 R2 SP1; Windows Server 2008 SP2

Resolution: This issue is resolved in KB4493471.

Back to top
March 12, 2019
KB4489880
Resolved
KB4493471
Resolved:
April 09, 2019
10:00 AM PT

Opened:
April 25, 2019
03:25 PM PT
Unable to use Seek bar in Windows Media Player
After installing KB4463097, users may not be able to use the Seek Bar in Windows Media Player when playing specific files. This issue does not affect normal playback.
Affected platforms: 
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 8.1; Windows 7, Service Pack 1
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2; Windows Server 2012; Windows Server 2008 R2 SP1; Windows Server 2008 SP2
Resolution: This issue is resolved in KB4471325.

Back to top
October 09, 2018
KB4463097
Resolved
KB4471325
Resolved:
December 11, 2018
10:00 AM PT

Opened:
April 25, 2019
03:28 PM PT
Applications using Microsoft Jet database fail to open
Applications that use a Microsoft Jet database with the Microsoft Access 97 file format may fail to open if the database has column names greater than 32 characters. The database will fail to open with the error, “Unrecognized Database Format”.
Affected platforms: 
  • Client: Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 8.1; Windows 7, Service Pack 1 
  • Server: Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2; Windows Server 2012; Windows Server 2008 R2 SP1; Windows Server 2008 SP2
Resolution: This issue is resolved in KB4487023.

Back to top
January 08, 2019
KB4480968
Resolved
KB4487023
Resolved:
February 12, 2019
10:00 AM PT

Opened:
April 25, 2019
03:32 PM PT
Virtual machines fail to restore
After installing KB4480968, virtual machines (VM) may fail to restore successfully if the VM has been saved and restored once before. The error message is, “Failed to restore the virtual machine state: Cannot restore this virtual machine because the saved state data cannot be read. Delete the saved state data and then try to start the virtual machine. (0xC0370027).”
This affects AMD Bulldozer Family 15h, AMD Jaguar Family 16h, and AMD Puma Family 16h (second generation) microarchitectures.
Affected platforms: 
  • Client: Windows 7, Service Pack 1 
  • Server: Windows Server 2012; Windows Server 2008 R2 SP1; Windows Server 2008 SP2
Resolution: This issue is resolved in KB4490514.

Back to top
January 08, 2019
KB4480968
Resolved
KB4490514
Resolved:
February 19, 2019
02:00 PM PT

Opened:
April 25, 2019
03:26 PM PT
Embedded objects may display incorrectly
Any compound document (OLE) server application that places embedded objects into the Windows Metafile (WMF) using the PatBlt API may display embedded objects incorrectly.
For example, if you paste a Microsoft Excel worksheet object into a Microsoft Word document, the cells may render with a different background color.
Affected platforms: 
  • Client: Windows 8.1 
  • Server: Windows Server 2012 R2; Windows Server 2012; Windows Server 2008 SP2
Resolution: This issue is resolved in KB4493471.

Back to top

Resolved
KB4493471
Resolved:
April 09, 2019
10:00 AM PT

Opened:
April 25, 2019
03:26 PM PT
First character of the Japanese era name not recognized as an abbreviation
After installing KB4480974, the first character of the Japanese era name is not recognized as an abbreviation and may cause date parsing issues.
Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 8.1; Windows 7, Service Pack 1
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2; Windows Server 2012; Windows Server 2008 R2 SP1; Windows Server 2008 SP2
Resolution: This issue is resolved in KB4489880.

Back to top
January 17, 2019
KB4480974
Resolved
KB4489880
Resolved:
March 12, 2019
10:00 AM PT

Opened:
April 25, 2019
03:32 PM PT
Applications using Microsoft Jet database and Access 95 file format stop working
Applications that use a Microsoft Jet database with the Microsoft Access 95 file format may randomly stop working.
Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 7, Service Pack 1
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012; Windows Server 2008 R2 SP1; Windows Server 2008 SP2
Resolution: This issue is resolved in KB4487022.

Back to top
February 12, 2019
KB4487023
Resolved
KB4487022
Resolved:
February 19, 2019
02:00 PM PT

Opened:
April 25, 2019
03:26 PM PT
Local Administrators unable to remotely access shares
Local users who are part of the local Administrators group may not be able to remotely access shares on Windows Server 2008 R2 and Windows 7 machines after installing KB4480968. This does not affect domain accounts in the local Administrators group.
Affected platforms: 
  • Client: Windows 7, Service Pack 1 
  • Server: Windows Server 2008 R2 SP1; Windows Server 2008 SP2
Resolution: This issue is resolved in KB4487354.

Back to top
January 08, 2019
KB4480968
Resolved
KB4487354
Resolved:
January 11, 2019
02:00 PM PT

Opened:
April 25, 2019
03:26 PM PT
NETDOM.EXE fails to run
After installing KB4489880, NETDOM.EXE fails to run, and the on-screen error, “The command failed to complete successfully.” appears.
Affected platforms: 
  • Client: Windows 7, Service Pack 1 
  • Server: Windows Server 2008 R2 SP1; Windows Server 2008 SP2
Resolution: This issue is resolved in KB4493471.

Back to top
March 12, 2019
KB4489880
Resolved
KB4493471
Resolved:
April 09, 2019
10:00 AM PT

Opened:
April 25, 2019
03:25 PM PT
" diff --git a/windows/release-information/resolved-issues-windows-server-2012.yml b/windows/release-information/resolved-issues-windows-server-2012.yml index 3fb079b612..1b99bc8fed 100644 --- a/windows/release-information/resolved-issues-windows-server-2012.yml +++ b/windows/release-information/resolved-issues-windows-server-2012.yml @@ -58,16 +58,16 @@ sections: - type: markdown text: " - - - - - - - - - - - + + + + + + + + + + +
DetailsOriginating updateStatusHistory
Unable to use Seek bar in Windows Media Player
After installing KB4462929, users may not be able to use the Seek Bar in Windows Media Player when playing specific files. This issue does not affect normal playback.

Resolution: This issue is resolved in KB4471330.

Back to top
October 09, 2018
KB4462929
Resolved
KB4471330
Resolved:
December 11, 2018
10:00 AM PT

Opened:
April 25, 2019
02:47 PM PT
Event Viewer may not show some event descriptions for network interface cards
After installing KB4457135, the Event Viewer may not show some event descriptions for network interface cards (NICs).

Resolution: This issue is resolved in KB4489891.

Back to top
September 11, 2018
KB4457135
Resolved
KB4489891
Resolved:
March 12, 2019
10:00 AM PT

Opened:
April 25, 2019
03:10 PM PT
Unable to access hotspots with third-party applications
After installing KB4480975, third-party applications may have difficulty authenticating hotspots.

Resolution: This issue is resolved in KB4480971.

Back to top
January 08, 2019
KB4480975
Resolved
KB4480971
Resolved:
January 15, 2019
10:00 AM PT

Opened:
April 25, 2019
03:14 PM PT
Applications using Microsoft Jet database fail to open
Applications that use a Microsoft Jet database with the Microsoft Access 97 file format may fail to open if the database has column names greater than 32 characters. The database will fail to open with the error, \"Unrecognized Database Format\".

Resolution: This issue is resolved in KB4487025.

Back to top
January 08, 2019
KB4480975
Resolved
KB4487025
Resolved:
February 12, 2019
10:00 AM PT

Opened:
April 25, 2019
03:19 PM PT
Virtual machines fail to restore
After installing KB4480975, virtual machines (VM) may fail to restore successfully if the VM has been saved and restored once before. The error message is, \"Failed to restore the virtual machine state: Cannot restore this virtual machine because the saved state data cannot be read. Delete the saved state data and then try to start the virtual machine. (0xC0370027).\"

This affects AMD Bulldozer Family 15h, AMD Jaguar Family 16h, and AMD Puma Family 16h (second generation) microarchitectures.

Resolution: This issue is resolved in KB4490516.

Back to top
January 08, 2019
KB4480975
Resolved
KB4490516
Resolved:
February 19, 2019
02:00 PM PT

Opened:
April 25, 2019
03:22 PM PT
Internet Explorer 11 authentication issue with multiple concurrent logons
After installing KB4480975, Internet Explorer 11 and other applications that use WININET.DLL may have authentication issues. This occurs when two or more people use the same user account for multiple, concurrent login sessions on the same Windows Server machine, including Remote Desktop Protocol (RDP) and Terminal Server logons. Symptoms reported by customers include, but may not be limited to:
  • Cache size and location show zero or empty.
  • Keyboard shortcuts may not work properly.
  • Webpages may intermittently fail to load or render correctly.
  • Issues with credential prompts.
  • Issues when downloading files.

Resolution: This issue is resolved in KB4493451.

Back to top
January 08, 2019
KB4480975
Resolved
KB4493451
Resolved:
April 09, 2019
10:00 AM PT

Opened:
April 25, 2019
03:34 PM PT
MSXML6 may cause applications to stop responding
After installing KB4480975, MSXML6 causes applications to stop responding if an exception was thrown during node operations, such as appendChild(), insertBefore(), and moveNode().

The Group Policy editor may stop responding when editing a Group Policy Object (GPO) that contains Group Policy Preferences (GPP) for Internet Explorer 10 settings.

Resolution: This issue is resolved in KB4493451.

Back to top
January 08, 2019
KB4480975
Resolved
KB4493451
Resolved:
April 09, 2019
10:00 AM PT

Opened:
April 25, 2019
03:27 PM PT
Error 1309 when installing/uninstalling MSI or MSP files
After installing KB4487025, users may receive \"Error 1309\" while installing or uninstalling certain types of MSI and MSP files.

Resolution: This issue is resolved in KB4489891.

Back to top
February 12, 2019
KB4487025
Resolved
KB4489891
Resolved:
March 12, 2019
10:00 AM PT

Opened:
April 25, 2019
03:36 PM PT
Embedded objects may display incorrectly
Any compound document (OLE) server application that places embedded objects into the Windows Metafile (WMF) using the PatBlt API may display embedded objects incorrectly.

For example, if you paste a Microsoft Excel worksheet object into a Microsoft Word document, the cells may render with a different background color.

Resolution: This issue is resolved in KB4493451.

Back to top
February 12, 2019
KB4487025
Resolved
KB4493451
Resolved:
April 09, 2019
10:00 AM PT

Opened:
April 25, 2019
04:00 PM PT
First character of the Japanese era name not recognized as an abbreviation
After installing KB4480971, the first character of the Japanese era name is not recognized as an abbreviation and may cause date parsing issues.

Resolution: This issue is resolved in KB4487024.

Back to top
January 15, 2019
KB4480971
Resolved
KB4487024
Resolved:
February 19, 2019
02:00 PM PT

Opened:
April 25, 2019
04:01 PM PT
Applications using Microsoft Jet database and Access 95 file format stop working
Applications that use a Microsoft Jet database with the Microsoft Access 95 file format may randomly stop working.

Resolution: This issue is resolved in KB4487024.

Back to top
February 12, 2019
KB4487025
Resolved
KB4487024
Resolved:
February 19, 2019
02:00 PM PT

Opened:
April 25, 2019
04:04 PM PT
Unable to use Seek bar in Windows Media Player
After installing KB4462929, users may not be able to use the Seek Bar in Windows Media Player when playing specific files. This issue does not affect normal playback.
Resolution: This issue is resolved in KB4471330.

Back to top
October 09, 2018
KB4462929
Resolved
KB4471330
Resolved:
December 11, 2018
10:00 AM PT

Opened:
April 25, 2019
02:47 PM PT
Event Viewer may not show some event descriptions for network interface cards
After installing KB4457135, the Event Viewer may not show some event descriptions for network interface cards (NICs).
Resolution: This issue is resolved in KB4489891.

Back to top
September 11, 2018
KB4457135
Resolved
KB4489891
Resolved:
March 12, 2019
10:00 AM PT

Opened:
April 25, 2019
03:10 PM PT
Unable to access hotspots with third-party applications
After installing KB4480975, third-party applications may have difficulty authenticating hotspots.
Resolution: This issue is resolved in KB4480971.

Back to top
January 08, 2019
KB4480975
Resolved
KB4480971
Resolved:
January 15, 2019
10:00 AM PT

Opened:
April 25, 2019
03:14 PM PT
Applications using Microsoft Jet database fail to open
Applications that use a Microsoft Jet database with the Microsoft Access 97 file format may fail to open if the database has column names greater than 32 characters. The database will fail to open with the error, \"Unrecognized Database Format\".
Resolution: This issue is resolved in KB4487025.

Back to top
January 08, 2019
KB4480975
Resolved
KB4487025
Resolved:
February 12, 2019
10:00 AM PT

Opened:
April 25, 2019
03:19 PM PT
Virtual machines fail to restore
After installing KB4480975, virtual machines (VM) may fail to restore successfully if the VM has been saved and restored once before. The error message is, \"Failed to restore the virtual machine state: Cannot restore this virtual machine because the saved state data cannot be read. Delete the saved state data and then try to start the virtual machine. (0xC0370027).\"
This affects AMD Bulldozer Family 15h, AMD Jaguar Family 16h, and AMD Puma Family 16h (second generation) microarchitectures.
Resolution: This issue is resolved in KB4490516.

Back to top
January 08, 2019
KB4480975
Resolved
KB4490516
Resolved:
February 19, 2019
02:00 PM PT

Opened:
April 25, 2019
03:22 PM PT
Internet Explorer 11 authentication issue with multiple concurrent logons
After installing KB4480975, Internet Explorer 11 and other applications that use WININET.DLL may have authentication issues. This occurs when two or more people use the same user account for multiple, concurrent login sessions on the same Windows Server machine, including Remote Desktop Protocol (RDP) and Terminal Server logons. Symptoms reported by customers include, but may not be limited to:
  • Cache size and location show zero or empty.
  • Keyboard shortcuts may not work properly.
  • Webpages may intermittently fail to load or render correctly.
  • Issues with credential prompts.
  • Issues when downloading files.
Resolution: This issue is resolved in KB4493451.

Back to top
January 08, 2019
KB4480975
Resolved
KB4493451
Resolved:
April 09, 2019
10:00 AM PT

Opened:
April 25, 2019
03:34 PM PT
MSXML6 may cause applications to stop responding
After installing KB4480975, MSXML6 causes applications to stop responding if an exception was thrown during node operations, such as appendChild(), insertBefore(), and moveNode().
The Group Policy editor may stop responding when editing a Group Policy Object (GPO) that contains Group Policy Preferences (GPP) for Internet Explorer 10 settings.
Resolution: This issue is resolved in KB4493451.

Back to top
January 08, 2019
KB4480975
Resolved
KB4493451
Resolved:
April 09, 2019
10:00 AM PT

Opened:
April 25, 2019
03:27 PM PT
Error 1309 when installing/uninstalling MSI or MSP files
After installing KB4487025, users may receive \"Error 1309\" while installing or uninstalling certain types of MSI and MSP files.
Resolution: This issue is resolved in KB4489891.

Back to top
February 12, 2019
KB4487025
Resolved
KB4489891
Resolved:
March 12, 2019
10:00 AM PT

Opened:
April 25, 2019
03:36 PM PT
Embedded objects may display incorrectly
Any compound document (OLE) server application that places embedded objects into the Windows Metafile (WMF) using the PatBlt API may display embedded objects incorrectly.
For example, if you paste a Microsoft Excel worksheet object into a Microsoft Word document, the cells may render with a different background color.
Resolution: This issue is resolved in KB4493451.

Back to top
February 12, 2019
KB4487025
Resolved
KB4493451
Resolved:
April 09, 2019
10:00 AM PT

Opened:
April 25, 2019
04:00 PM PT
First character of the Japanese era name not recognized as an abbreviation
After installing KB4480971, the first character of the Japanese era name is not recognized as an abbreviation and may cause date parsing issues.
Resolution: This issue is resolved in KB4487024.

Back to top
January 15, 2019
KB4480971
Resolved
KB4487024
Resolved:
February 19, 2019
02:00 PM PT

Opened:
April 25, 2019
04:01 PM PT
Applications using Microsoft Jet database and Access 95 file format stop working
Applications that use a Microsoft Jet database with the Microsoft Access 95 file format may randomly stop working.
Resolution: This issue is resolved in KB4487024.

Back to top
February 12, 2019
KB4487025
Resolved
KB4487024
Resolved:
February 19, 2019
02:00 PM PT

Opened:
April 25, 2019
04:04 PM PT
" diff --git a/windows/release-information/status-windows-10-1507.yml b/windows/release-information/status-windows-10-1507.yml index f7c75234a8..8a297e56b9 100644 --- a/windows/release-information/status-windows-10-1507.yml +++ b/windows/release-information/status-windows-10-1507.yml @@ -77,7 +77,7 @@ sections: - type: markdown text: " - +
DetailsOriginating updateStatusHistory
Custom URI schemes may not start corresponding application
After installing KB4489872, Custom URI Schemes for Application Protocol handlers may not start the corresponding application for local intranet and trusted sites on Internet Explorer.

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 8.1; Windows 7, Service Pack 1 
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2; Windows Server 2008 R2 SP1

Resolution: This issue was resolved in KB4493475.

Back to top
OS Build 10240.18158

March 12, 2019
KB4489872
Resolved
KB4493475
Resolved:
April 09, 2019
10:00 AM PT

Opened:
March 12, 2019
10:00 AM PT
Custom URI schemes may not start corresponding application
After installing KB4489872, Custom URI Schemes for Application Protocol handlers may not start the corresponding application for local intranet and trusted sites on Internet Explorer.
Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 8.1; Windows 7, Service Pack 1 
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2; Windows Server 2008 R2 SP1
Resolution: This issue was resolved in KB4493475.

Back to top
OS Build 10240.18158

March 12, 2019
KB4489872
Resolved
KB4493475
Resolved:
April 09, 2019
10:00 AM PT

Opened:
March 12, 2019
10:00 AM PT
" @@ -86,6 +86,6 @@ sections: - type: markdown text: " - +
DetailsOriginating updateStatusHistory
MSXML6 may cause applications to stop responding
After installing KB4480962, MSXML6 causes applications to stop responding if an exception was thrown during node operations, such as appendChild(), insertBefore(), and moveNode().

The Group Policy editor may stop responding when editing a Group Policy Object (GPO) that contains Group Policy Preferences (GPP) for Internet Explorer 10 settings.

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 8.1
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2

Resolution: This issue was resolved in KB4493475.

Back to top
OS Build 10240.18094

January 08, 2019
KB4480962
Resolved
KB4493475
Resolved:
April 09, 2019
10:00 AM PT

Opened:
January 08, 2019
10:00 AM PT
MSXML6 may cause applications to stop responding
After installing KB4480962, MSXML6 causes applications to stop responding if an exception was thrown during node operations, such as appendChild(), insertBefore(), and moveNode().
The Group Policy editor may stop responding when editing a Group Policy Object (GPO) that contains Group Policy Preferences (GPP) for Internet Explorer 10 settings.
Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 8.1
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2
Resolution: This issue was resolved in KB4493475.

Back to top
OS Build 10240.18094

January 08, 2019
KB4480962
Resolved
KB4493475
Resolved:
April 09, 2019
10:00 AM PT

Opened:
January 08, 2019
10:00 AM PT
" diff --git a/windows/release-information/status-windows-10-1607-and-windows-server-2016.yml b/windows/release-information/status-windows-10-1607-and-windows-server-2016.yml index f441e35df1..dd0a637c9c 100644 --- a/windows/release-information/status-windows-10-1607-and-windows-server-2016.yml +++ b/windows/release-information/status-windows-10-1607-and-windows-server-2016.yml @@ -83,10 +83,10 @@ sections: - type: markdown text: " - - - + + +
DetailsOriginating updateStatusHistory
Custom URI schemes may not start corresponding application
After installing KB4489882, Custom URI schemes for application protocol handlers may not start the corresponding application for local intranet and trusted sites security zones on Internet Explorer.

Affected platforms: 
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 8.1; Windows 7, Service Pack 1 
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2; Windows Server 2008 R2 SP1

Workaround: Right-click the URL link to open it in a new window or tab, or enable Protected Mode in Internet Explorer for local intranet and trusted sites
  1. Go to Tools > Internet options > Security.
  2. Within Select a zone to view or change security settings, select Local intranet and then select Enable Protected Mode.
  3. Select Trusted sites and then select Enable Protected Mode.
  4. Select OK.
You must restart the browser after making these changes.

Next steps: Microsoft is working on a resolution and will provide an update in an upcoming release.

Back to top
OS Build 14393.2848

March 12, 2019
KB4489882
Mitigated
Last updated:
March 19, 2019
10:00 AM PT

Opened:
March 12, 2019
10:00 AM PT
Issue using PXE to start a device from WDS
After installing KB4489882, there may be issues using the Preboot Execution Environment (PXE) to start a device from a Windows Deployment Services (WDS) server configured to use Variable Window Extension. This may cause the connection to the WDS server to terminate prematurely while downloading the image. This issue does not affect clients or devices that are not using Variable Window Extension.

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10 Enterprise LTSC 2016; Windows 8.1
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server 2016; Windows Server 2012 R2

Workaround: To mitigate the issue, disable the Variable Window Extension on WDS server using one of the following options:
Option 1:
Open an Administrator Command prompt and type the following:
Wdsutil /Set-TransportServer /EnableTftpVariableWindowExtension:No
-
Option 2:
Use the Windows Deployment Services UI to make the following adjustment:
  1. Open Windows Deployment Services from Windows Administrative Tools.
  2. Expand Servers and right-click a WDS server.
  3. Open its properties and clear the Enable Variable Window Extension box on the TFTP tab.
Option 3:
Set the following registry value to 0:
HKLM\\System\\CurrentControlSet\\Services\\WDSServer\\Providers\\WDSTFTP\\EnableVariableWindowExtension
Restart the WDSServer service after disabling the Variable Window Extension.

Next steps: Microsoft is working on a resolution and will provide an update in an upcoming release.

Back to top
OS Build 14393.2848

March 12, 2019
KB4489882
Mitigated
Last updated:
March 19, 2019
10:00 AM PT

Opened:
March 12, 2019
10:00 AM PT
End-user-defined characters (EUDC) cause blue screen at startup
If you enable per font end-user-defined characters (EUDC), the system will stop working and a blue screen may appear at startup. This is not a common setting in non-Asian regions.

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016

Resolution: This issue was resolved in KB4493470.

Back to top
OS Build 14393.2879

March 19, 2019
KB4489889
Resolved
KB4493470
Resolved:
April 09, 2019
10:00 AM PT

Opened:
March 19, 2019
10:00 AM PT
Custom URI schemes may not start corresponding application
After installing KB4489882, Custom URI schemes for application protocol handlers may not start the corresponding application for local intranet and trusted sites security zones on Internet Explorer.
Affected platforms: 
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 8.1; Windows 7, Service Pack 1 
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2; Windows Server 2008 R2 SP1
Workaround: Right-click the URL link to open it in a new window or tab, or enable Protected Mode in Internet Explorer for local intranet and trusted sites
  1. Go to Tools > Internet options > Security.
  2. Within Select a zone to view or change security settings, select Local intranet and then select Enable Protected Mode.
  3. Select Trusted sites and then select Enable Protected Mode.
  4. Select OK.
You must restart the browser after making these changes.
Next steps: Microsoft is working on a resolution and will provide an update in an upcoming release.

Back to top
OS Build 14393.2848

March 12, 2019
KB4489882
Mitigated
Last updated:
March 19, 2019
10:00 AM PT

Opened:
March 12, 2019
10:00 AM PT
Issue using PXE to start a device from WDS
After installing KB4489882, there may be issues using the Preboot Execution Environment (PXE) to start a device from a Windows Deployment Services (WDS) server configured to use Variable Window Extension. This may cause the connection to the WDS server to terminate prematurely while downloading the image. This issue does not affect clients or devices that are not using Variable Window Extension.
Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10 Enterprise LTSC 2016; Windows 8.1
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server 2016; Windows Server 2012 R2
Workaround: To mitigate the issue, disable the Variable Window Extension on WDS server using one of the following options:
Option 1:
Open an Administrator Command prompt and type the following:
Wdsutil /Set-TransportServer /EnableTftpVariableWindowExtension:No
+
Option 2:
Use the Windows Deployment Services UI to make the following adjustment:
  1. Open Windows Deployment Services from Windows Administrative Tools.
  2. Expand Servers and right-click a WDS server.
  3. Open its properties and clear the Enable Variable Window Extension box on the TFTP tab.
Option 3:
Set the following registry value to 0:
HKLM\\System\\CurrentControlSet\\Services\\WDSServer\\Providers\\WDSTFTP\\EnableVariableWindowExtension
Restart the WDSServer service after disabling the Variable Window Extension.
Next steps: Microsoft is working on a resolution and will provide an update in an upcoming release.

Back to top
OS Build 14393.2848

March 12, 2019
KB4489882
Mitigated
Last updated:
March 19, 2019
10:00 AM PT

Opened:
March 12, 2019
10:00 AM PT
End-user-defined characters (EUDC) cause blue screen at startup
If you enable per font end-user-defined characters (EUDC), the system will stop working and a blue screen may appear at startup. This is not a common setting in non-Asian regions.
Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016
Resolution: This issue was resolved in KB4493470.

Back to top
OS Build 14393.2879

March 19, 2019
KB4489889
Resolved
KB4493470
Resolved:
April 09, 2019
10:00 AM PT

Opened:
March 19, 2019
10:00 AM PT
" @@ -95,8 +95,8 @@ sections: - type: markdown text: " - - + +
DetailsOriginating updateStatusHistory
Internet Explorer 11 authentication issue with multiple concurrent logons
After installing KB4480961, Internet Explorer 11 and other applications that use WININET.DLL may have authentication issues. This occurs when two or more people use the same user account for multiple, concurrent login sessions on the same Windows Server machine, including Remote Desktop Protocol (RDP) and Terminal Server logons. Symptoms reported by customers include, but may not be limited to:
  • Cache size and location show zero or empty.
  • Keyboard shortcuts may not work properly.
  • Webpages may intermittently fail to load or render correctly.
  • Issues with credential prompts.
  • Issues when downloading files.

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10 Enterprise LTSC 2016; Windows 8.1; Windows 7, Service Pack 1
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server 2016; Windows Server 2012 R2; Windows Server 2008 R2 SP1

Resolution: This issue was resolved in KB4493470.

Back to top
OS Build 14393.2724

January 08, 2019
KB4480961
Resolved
KB4493470
Resolved:
April 09, 2019
10:00 AM PT

Opened:
January 08, 2019
10:00 AM PT
MSXML6 may cause applications to stop responding
After installing KB4480961, MSXML6 causes applications to stop responding if an exception was thrown during node operations, such as appendChild(), insertBefore(), and moveNode().

The Group Policy editor may stop responding when editing a Group Policy Object (GPO) that contains Group Policy Preferences (GPP) for Internet Explorer 10 settings.

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 8.1
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2

Resolution: This issue was resolved in KB4493470.

Back to top
OS Build 14393.2724

January 08, 2019
KB4480961
Resolved
KB4493470
Resolved:
April 09, 2019
10:00 AM PT

Opened:
January 08, 2019
10:00 AM PT
Internet Explorer 11 authentication issue with multiple concurrent logons
After installing KB4480961, Internet Explorer 11 and other applications that use WININET.DLL may have authentication issues. This occurs when two or more people use the same user account for multiple, concurrent login sessions on the same Windows Server machine, including Remote Desktop Protocol (RDP) and Terminal Server logons. Symptoms reported by customers include, but may not be limited to:
  • Cache size and location show zero or empty.
  • Keyboard shortcuts may not work properly.
  • Webpages may intermittently fail to load or render correctly.
  • Issues with credential prompts.
  • Issues when downloading files.
Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10 Enterprise LTSC 2016; Windows 8.1; Windows 7, Service Pack 1
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server 2016; Windows Server 2012 R2; Windows Server 2008 R2 SP1
Resolution: This issue was resolved in KB4493470.

Back to top
OS Build 14393.2724

January 08, 2019
KB4480961
Resolved
KB4493470
Resolved:
April 09, 2019
10:00 AM PT

Opened:
January 08, 2019
10:00 AM PT
MSXML6 may cause applications to stop responding
After installing KB4480961, MSXML6 causes applications to stop responding if an exception was thrown during node operations, such as appendChild(), insertBefore(), and moveNode().
The Group Policy editor may stop responding when editing a Group Policy Object (GPO) that contains Group Policy Preferences (GPP) for Internet Explorer 10 settings.
Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 8.1
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2
Resolution: This issue was resolved in KB4493470.

Back to top
OS Build 14393.2724

January 08, 2019
KB4480961
Resolved
KB4493470
Resolved:
April 09, 2019
10:00 AM PT

Opened:
January 08, 2019
10:00 AM PT
" @@ -105,8 +105,8 @@ sections: - type: markdown text: " - - - + + +
DetailsOriginating updateStatusHistory
Cluster service may fail if the minimum password length is set to greater than 14
After installing KB4467684, the cluster service may fail to start with the error \"2245 (NERR_PasswordTooShort)\" if the Group Policy \"Minimum Password Length\" is configured with greater than 14 characters.

Affected platforms:
  • Client: Windows 10 Enterprise LTSC 2016
  • Server: Windows Server 2016

Workaround: Set the domain default \"Minimum Password Length\" policy to less than or equal to 14 characters.

Next steps: Microsoft is working on a resolution and will provide an update in an upcoming release.

Back to top
OS Build 14393.2639

November 27, 2018
KB4467684
Mitigated
Last updated:
March 19, 2019
10:00 AM PT

Opened:
November 27, 2018
10:00 AM PT
SCVMM cannot enumerate and manage logical switches deployed on the host
For hosts managed by System Center Virtual Machine Manager (VMM), VMM cannot enumerate and manage logical switches deployed on the host after installing KB4467684.

Additionally, if you do not follow the best practices, a stop error may occur in vfpext.sys on the hosts.

Affected platforms:
  • Client: Windows 10 Enterprise LTSC 2016
  • Server: Windows Server 2016

Workaround:
Run mofcomp on the following mof files on the affected host:

  • Scvmmswitchportsettings.mof
  • VMMDHCPSvr.mof

Follow the best practices while patching to avoid a stop error in vfpext.sys in an SDN v2 environment (NC managed hosts).

Back to top
OS Build 14393.2639

November 27, 2018
KB4467684
Mitigated
Last updated:
March 19, 2019
10:00 AM PT

Opened:
November 27, 2018
10:00 AM PT
Windows may not start on certain Lenovo and Fujitsu laptops with less than 8GB of RAM
After installing KB4467691, Windows may fail to start on certain Lenovo and Fujitsu laptops that have less than 8 GB of RAM.

Affected platforms:
  • Client: Windows 10 Enterprise LTSC 2016
  • Server: Windows Server 2016

Workaround: Restart the affected machine using the Unified Extensible Firmware Interface (UEFI). Disable Secure Boot and then restart.

If BitLocker is enabled on your machine, you may have to go through BitLocker recovery after Secure Boot has been disabled.

Next steps: Lenovo and Fujitsu are aware of this issue. Please contact your OEM to ask if there is a firmware update available for your device.

Back to top
OS Build 14393.2608

November 13, 2018
KB4467691
Mitigated
Last updated:
February 19, 2019
10:00 AM PT

Opened:
November 13, 2018
10:00 AM PT
Cluster service may fail if the minimum password length is set to greater than 14
After installing KB4467684, the cluster service may fail to start with the error \"2245 (NERR_PasswordTooShort)\" if the Group Policy \"Minimum Password Length\" is configured with greater than 14 characters.
Affected platforms:
  • Client: Windows 10 Enterprise LTSC 2016
  • Server: Windows Server 2016
Workaround: Set the domain default \"Minimum Password Length\" policy to less than or equal to 14 characters.
Next steps: Microsoft is working on a resolution and will provide an update in an upcoming release.

Back to top
OS Build 14393.2639

November 27, 2018
KB4467684
Mitigated
Last updated:
March 19, 2019
10:00 AM PT

Opened:
November 27, 2018
10:00 AM PT
SCVMM cannot enumerate and manage logical switches deployed on the host
For hosts managed by System Center Virtual Machine Manager (VMM), VMM cannot enumerate and manage logical switches deployed on the host after installing KB4467684.
Additionally, if you do not follow the best practices, a stop error may occur in vfpext.sys on the hosts.
Affected platforms:
  • Client: Windows 10 Enterprise LTSC 2016
  • Server: Windows Server 2016
Workaround:
Run mofcomp on the following mof files on the affected host:
  • Scvmmswitchportsettings.mof
  • VMMDHCPSvr.mof
Follow the best practices while patching to avoid a stop error in vfpext.sys in an SDN v2 environment (NC managed hosts).

Back to top
OS Build 14393.2639

November 27, 2018
KB4467684
Mitigated
Last updated:
March 19, 2019
10:00 AM PT

Opened:
November 27, 2018
10:00 AM PT
Windows may not start on certain Lenovo and Fujitsu laptops with less than 8GB of RAM
After installing KB4467691, Windows may fail to start on certain Lenovo and Fujitsu laptops that have less than 8 GB of RAM.
Affected platforms:
  • Client: Windows 10 Enterprise LTSC 2016
  • Server: Windows Server 2016
Workaround: Restart the affected machine using the Unified Extensible Firmware Interface (UEFI). Disable Secure Boot and then restart.
If BitLocker is enabled on your machine, you may have to go through BitLocker recovery after Secure Boot has been disabled.
Next steps: Lenovo and Fujitsu are aware of this issue. Please contact your OEM to ask if there is a firmware update available for your device.

Back to top
OS Build 14393.2608

November 13, 2018
KB4467691
Mitigated
Last updated:
February 19, 2019
10:00 AM PT

Opened:
November 13, 2018
10:00 AM PT
" diff --git a/windows/release-information/status-windows-10-1703.yml b/windows/release-information/status-windows-10-1703.yml index 77bb2ce556..0c01d5f114 100644 --- a/windows/release-information/status-windows-10-1703.yml +++ b/windows/release-information/status-windows-10-1703.yml @@ -78,8 +78,8 @@ sections: - type: markdown text: " - - + +
DetailsOriginating updateStatusHistory
Custom URI schemes may not start corresponding application
After installing KB4489871, custom URI schemes for application protocol handlers may not start the corresponding application for local intranet and trusted sites security zones on Internet Explorer.

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 8.1; Windows 7, Service Pack 1 
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2; Windows Server 2008 R2 SP1

Workaround: Right-click the URL link to open it in a new window or tab, or enable Protected Mode in Internet Explorer for local intranet and trusted sites
1. Go to Tools > Internet options > Security.
2. Within Select a zone to view or change security settings, select Local intranet and then select Enable Protected Mode.
3. Select Trusted sites and then select Enable Protected Mode.
4. Select OK.
You must restart the browser after making these changes.

Next steps: Microsoft is working on a resolution and will provide an update in an upcoming release.

Back to top
OS Build 15063.1689

March 12, 2019
KB4489871
Mitigated
Last updated:
March 19, 2019
10:00 AM PT

Opened:
March 12, 2019
10:00 AM PT
End-user-defined characters (EUDC) may cause blue screen at startup
If you enable per font end-user-defined characters (EUDC), the system may stop working and a blue screen may appear at startup. This is not a common setting in non-Asian regions.

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016

Resolution: This issue was resolved in KB4493474.

Back to top
OS Build 15063.1716

March 19, 2019
KB4489888
Resolved
KB4493474
Resolved:
April 09, 2019
10:00 AM PT

Opened:
March 19, 2019
10:00 AM PT
Custom URI schemes may not start corresponding application
After installing KB4489871, custom URI schemes for application protocol handlers may not start the corresponding application for local intranet and trusted sites security zones on Internet Explorer.
Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 8.1; Windows 7, Service Pack 1 
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2; Windows Server 2008 R2 SP1
Workaround: Right-click the URL link to open it in a new window or tab, or enable Protected Mode in Internet Explorer for local intranet and trusted sites
1. Go to Tools > Internet options > Security.
2. Within Select a zone to view or change security settings, select Local intranet and then select Enable Protected Mode.
3. Select Trusted sites and then select Enable Protected Mode.
4. Select OK.
You must restart the browser after making these changes.
Next steps: Microsoft is working on a resolution and will provide an update in an upcoming release.

Back to top
OS Build 15063.1689

March 12, 2019
KB4489871
Mitigated
Last updated:
March 19, 2019
10:00 AM PT

Opened:
March 12, 2019
10:00 AM PT
End-user-defined characters (EUDC) may cause blue screen at startup
If you enable per font end-user-defined characters (EUDC), the system may stop working and a blue screen may appear at startup. This is not a common setting in non-Asian regions.
Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016
Resolution: This issue was resolved in KB4493474.

Back to top
OS Build 15063.1716

March 19, 2019
KB4489888
Resolved
KB4493474
Resolved:
April 09, 2019
10:00 AM PT

Opened:
March 19, 2019
10:00 AM PT
" @@ -88,6 +88,6 @@ sections: - type: markdown text: " - +
DetailsOriginating updateStatusHistory
MSXML6 may cause applications to stop responding
After installing KB4480973, MSXML6 causes applications to stop responding if an exception was thrown during node operations, such as appendChild(), insertBefore(), and moveNode().

The Group Policy editor may stop responding when editing a Group Policy Object (GPO) that contains Group Policy Preferences (GPP) for Internet Explorer 10 settings.

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 8.1
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2

Resolution: This issue was resolved in KB4493474.

Back to top
OS Build 15063.1563

January 08, 2019
KB4480973
Resolved
KB4493474
Resolved:
April 09, 2019
10:00 AM PT

Opened:
January 08, 2019
10:00 AM PT
MSXML6 may cause applications to stop responding
After installing KB4480973, MSXML6 causes applications to stop responding if an exception was thrown during node operations, such as appendChild(), insertBefore(), and moveNode().
The Group Policy editor may stop responding when editing a Group Policy Object (GPO) that contains Group Policy Preferences (GPP) for Internet Explorer 10 settings.
Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 8.1
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2
Resolution: This issue was resolved in KB4493474.

Back to top
OS Build 15063.1563

January 08, 2019
KB4480973
Resolved
KB4493474
Resolved:
April 09, 2019
10:00 AM PT

Opened:
January 08, 2019
10:00 AM PT
" diff --git a/windows/release-information/status-windows-10-1709.yml b/windows/release-information/status-windows-10-1709.yml index e31967236f..b4851c4632 100644 --- a/windows/release-information/status-windows-10-1709.yml +++ b/windows/release-information/status-windows-10-1709.yml @@ -79,9 +79,9 @@ sections: - type: markdown text: " - - - + + +
DetailsOriginating updateStatusHistory
Custom URI schemes may not start corresponding application
After installing KB4489886, custom URI schemes for application protocol handlers may not start the corresponding application for local intranet and trusted sites security zones on Internet Explorer.

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 8.1; Windows 7, Service Pack 1 
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2; Windows Server 2008 R2 SP1

Workaround: Right-click the URL link to open it in a new window or tab, or enable Protected Mode in Internet Explorer for local intranet and trusted sites
1. Go to Tools > Internet options > Security.
2. Within Select a zone to view or change security settings, select Local intranet and then select Enable Protected Mode.
3. Select Trusted sites and then select Enable Protected Mode.
4. Select OK.
You must restart the browser after making these changes.

Next steps: Microsoft is working on a resolution and will provide an update in an upcoming release.

Back to top
OS Build 16299.1029

March 12, 2019
KB4489886
Mitigated
Last updated:
March 19, 2019
10:00 AM PT

Opened:
March 12, 2019
10:00 AM PT
End-user-defined characters (EUDC) may cause blue screen at startup
If you enable per font end-user-defined characters (EUDC), the system may stop working and a blue screen may appear at startup. This is not a common setting in non-Asian regions.

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016

Resolution: This issue is resolved in KB4493441.

Back to top
OS Build 16299.1059

March 19, 2019
KB4489890
Resolved
KB4493441
Resolved:
April 09, 2019
10:00 AM PT

Opened:
March 19, 2019
10:00 AM PT
Stop error when attempting to start SSH from WSL
After applying KB4489886, a stop error occurs when attempting to start the Secure Shell (SSH) client program from Windows Subsystem for Linux (WSL) with agent forwarding enabled using a command line switch (ssh –A) or a configuration setting.

Affected platforms:
  • Client: Windows 10, version 1803; Windows 10, version 1709
  • Server: Windows Server, version 1803; Windows Server, version 1709

Resolution: This issue is resolved in KB4493441.

Back to top
OS Build 16299.1029

March 12, 2019
KB4489886
Resolved
KB4493441
Resolved:
April 09, 2019
10:00 AM PT

Opened:
March 12, 2019
10:00 AM PT
Custom URI schemes may not start corresponding application
After installing KB4489886, custom URI schemes for application protocol handlers may not start the corresponding application for local intranet and trusted sites security zones on Internet Explorer.
Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 8.1; Windows 7, Service Pack 1 
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2; Windows Server 2008 R2 SP1
Workaround: Right-click the URL link to open it in a new window or tab, or enable Protected Mode in Internet Explorer for local intranet and trusted sites
1. Go to Tools > Internet options > Security.
2. Within Select a zone to view or change security settings, select Local intranet and then select Enable Protected Mode.
3. Select Trusted sites and then select Enable Protected Mode.
4. Select OK.
You must restart the browser after making these changes.
Next steps: Microsoft is working on a resolution and will provide an update in an upcoming release.

Back to top
OS Build 16299.1029

March 12, 2019
KB4489886
Mitigated
Last updated:
March 19, 2019
10:00 AM PT

Opened:
March 12, 2019
10:00 AM PT
End-user-defined characters (EUDC) may cause blue screen at startup
If you enable per font end-user-defined characters (EUDC), the system may stop working and a blue screen may appear at startup. This is not a common setting in non-Asian regions.
Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016
Resolution: This issue is resolved in KB4493441.

Back to top
OS Build 16299.1059

March 19, 2019
KB4489890
Resolved
KB4493441
Resolved:
April 09, 2019
10:00 AM PT

Opened:
March 19, 2019
10:00 AM PT
Stop error when attempting to start SSH from WSL
After applying KB4489886, a stop error occurs when attempting to start the Secure Shell (SSH) client program from Windows Subsystem for Linux (WSL) with agent forwarding enabled using a command line switch (ssh –A) or a configuration setting.
Affected platforms:
  • Client: Windows 10, version 1803; Windows 10, version 1709
  • Server: Windows Server, version 1803; Windows Server, version 1709
Resolution: This issue is resolved in KB4493441.

Back to top
OS Build 16299.1029

March 12, 2019
KB4489886
Resolved
KB4493441
Resolved:
April 09, 2019
10:00 AM PT

Opened:
March 12, 2019
10:00 AM PT
" @@ -90,6 +90,6 @@ sections: - type: markdown text: " - +
DetailsOriginating updateStatusHistory
MSXML6 causes applications to stop responding if an exception was thrown
After installing KB4480978, MSXML6 causes applications to stop responding if an exception was thrown during node operations, such as appendChild(), insertBefore(), and moveNode().

The Group Policy editor may stop responding when editing a Group Policy Object (GPO) that contains Group Policy Preferences (GPP) for Internet Explorer 10 settings.

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 8.1
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2

Resolution: This issue is resolved in KB4493441.

Back to top
OS Build 16299.904

January 08, 2019
KB4480978
Resolved
KB4493441
Resolved:
April 09, 2019
10:00 AM PT

Opened:
January 08, 2019
10:00 AM PT
MSXML6 causes applications to stop responding if an exception was thrown
After installing KB4480978, MSXML6 causes applications to stop responding if an exception was thrown during node operations, such as appendChild(), insertBefore(), and moveNode().
The Group Policy editor may stop responding when editing a Group Policy Object (GPO) that contains Group Policy Preferences (GPP) for Internet Explorer 10 settings.
Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 8.1
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2
Resolution: This issue is resolved in KB4493441.

Back to top
OS Build 16299.904

January 08, 2019
KB4480978
Resolved
KB4493441
Resolved:
April 09, 2019
10:00 AM PT

Opened:
January 08, 2019
10:00 AM PT
" diff --git a/windows/release-information/status-windows-10-1803.yml b/windows/release-information/status-windows-10-1803.yml index 16bc56e3c4..512f32f9bb 100644 --- a/windows/release-information/status-windows-10-1803.yml +++ b/windows/release-information/status-windows-10-1803.yml @@ -80,11 +80,11 @@ sections: - type: markdown text: " - - + - - + +
DetailsOriginating updateStatusHistory
Custom URI schemes may not start corresponding application
After installing KB4489868, custom URI schemes for application protocol handlers may not start the corresponding application for local intranet and trusted sites security zones on Internet Explorer. 

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 8.1; Windows 7, Service Pack 1 
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2; Windows Server 2008 R2 SP1

Workaround: Right-click the URL link to open it in a new window or tab, or enable Protected Mode in Internet Explorer for local intranet and trusted sites
  1. Go to Tools > Internet options > Security 
  2. Within Select a zone to view or change security settings, select Local intranet and then select Enable Protected Mode.
  3. Select Trusted sites and then select Enable Protected Mode
  4. Select OK
 You must restart the browser after making these changes. 
 
Next steps: Microsoft is working on a resolution and will provide an update in an upcoming release. 

Back to top
OS Build 17134.648

March 12, 2019
KB4489868
Mitigated
Last updated:
March 19, 2019
10:00 AM PT

Opened:
March 12, 2019
10:00 AM PT
Issue using PXE to start a device from WDS
After installing KB4489868, there may be issues using the Preboot Execution Environment (PXE) to start a device from a Windows Deployment Services (WDS) server configured to use Variable Window Extension. This may cause the connection to the WDS server to terminate prematurely while downloading the image. This issue does not affect clients or devices that are not using Variable Window Extension. 

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10 Enterprise LTSC 2016; Windows 8.1
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server 2016; Windows Server 2012 R2

Workaround: To mitigate the issue, disable the Variable Window Extension on WDS server using one of the following options:
Option 1: 
Open an Administrator Command prompt and type the following:  
Wdsutil /Set-TransportServer /EnableTftpVariableWindowExtension:No
+      
Custom URI schemes may not start corresponding application
After installing KB4489868, custom URI schemes for application protocol handlers may not start the corresponding application for local intranet and trusted sites security zones on Internet Explorer. 
Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 8.1; Windows 7, Service Pack 1 
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2; Windows Server 2008 R2 SP1
Workaround: Right-click the URL link to open it in a new window or tab, or enable Protected Mode in Internet Explorer for local intranet and trusted sites
  1. Go to Tools > Internet options > Security 
  2. Within Select a zone to view or change security settings, select Local intranet and then select Enable Protected Mode.
  3. Select Trusted sites and then select Enable Protected Mode
  4. Select OK
 You must restart the browser after making these changes. 
 
Next steps: Microsoft is working on a resolution and will provide an update in an upcoming release. 

Back to top
OS Build 17134.648

March 12, 2019
KB4489868
Mitigated
Last updated:
March 19, 2019
10:00 AM PT

Opened:
March 12, 2019
10:00 AM PT
Issue using PXE to start a device from WDS
After installing KB4489868, there may be issues using the Preboot Execution Environment (PXE) to start a device from a Windows Deployment Services (WDS) server configured to use Variable Window Extension. This may cause the connection to the WDS server to terminate prematurely while downloading the image. This issue does not affect clients or devices that are not using Variable Window Extension. 
Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10 Enterprise LTSC 2016; Windows 8.1
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server 2016; Windows Server 2012 R2
Workaround: To mitigate the issue, disable the Variable Window Extension on WDS server using one of the following options:
Option 1: 
Open an Administrator Command prompt and type the following:  
Wdsutil /Set-TransportServer /EnableTftpVariableWindowExtension:No
 
 Option 2: 
Use the Windows Deployment Services UI to make the following adjustment:  
  1. Open Windows Deployment Services from Windows Administrative Tools. 
  2. Expand Servers and right-click a WDS server. 
  3. Open its properties and clear the?Enable Variable Window Extension?box on the TFTP tab.  
Option 3: 
Set the following registry value to 0:  
HKLM\\System\\CurrentControlSet\\Services\\WDSServer\\Providers\\WDSTFTP\\EnableVariableWindowExtension  
Restart the WDSServer service after disabling the Variable Window Extension. 
 
Next steps: Microsoft is working on a resolution and will provide an update in an upcoming release. 

Back to top
OS Build 17134.648

March 12, 2019
KB4489868
Mitigated
Last updated:
March 19, 2019
10:00 AM PT

Opened:
March 12, 2019
10:00 AM PT
End-user-defined characters (EUDC) may cause blue screen at startup
If you enable per font end-user-defined characters (EUDC), the system may stop working and a blue screen may appear at startup. This is not a common setting in non-Asian regions. 

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016
 
Resolution: This issue was resolved in KB4493464

Back to top
OS Build 17134.677

March 19, 2019
KB4489894
Resolved
KB4493464
Resolved:
April 09, 2019
10:00 AM PT

Opened:
March 19, 2019
10:00 AM PT
Stop error when attempting to start SSH from WSL
After applying KB4489868, a stop error occurs when attempting to start the Secure Shell (SSH) client program from Windows Subsystem for Linux (WSL) with agent forwarding enabled using a command line switch (ssh -A) or a configuration setting.

Affected platforms:
  • Client: Windows 10, version 1803; Windows 10, version 1709
  • Server: Windows Server, version 1803; Windows Server, version 1709

Resolution: This issue was resolved in KB4493464.

Back to top
OS Build 17134.648

March 12, 2019
KB4489868
Resolved
KB4493464
Resolved:
April 09, 2019
10:00 AM PT

Opened:
March 12, 2019
10:00 AM PT
End-user-defined characters (EUDC) may cause blue screen at startup
If you enable per font end-user-defined characters (EUDC), the system may stop working and a blue screen may appear at startup. This is not a common setting in non-Asian regions. 
Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016
 
Resolution: This issue was resolved in KB4493464

Back to top
OS Build 17134.677

March 19, 2019
KB4489894
Resolved
KB4493464
Resolved:
April 09, 2019
10:00 AM PT

Opened:
March 19, 2019
10:00 AM PT
Stop error when attempting to start SSH from WSL
After applying KB4489868, a stop error occurs when attempting to start the Secure Shell (SSH) client program from Windows Subsystem for Linux (WSL) with agent forwarding enabled using a command line switch (ssh -A) or a configuration setting.
Affected platforms:
  • Client: Windows 10, version 1803; Windows 10, version 1709
  • Server: Windows Server, version 1803; Windows Server, version 1709
Resolution: This issue was resolved in KB4493464.

Back to top
OS Build 17134.648

March 12, 2019
KB4489868
Resolved
KB4493464
Resolved:
April 09, 2019
10:00 AM PT

Opened:
March 12, 2019
10:00 AM PT
" @@ -93,6 +93,6 @@ sections: - type: markdown text: " - +
DetailsOriginating updateStatusHistory
MSXML6 may cause applications to stop responding
After installing KB4480966, MSXML6 causes applications to stop responding if an exception was thrown during node operations, such as appendChild(), insertBefore(), and moveNode().

The Group Policy editor may stop responding when editing a Group Policy Object (GPO) that contains Group Policy Preferences (GPP) for Internet Explorer 10 settings.

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 8.1
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2

Resolution: This issue was resolved in KB4493464

Back to top
OS Build 17134.523

January 08, 2019
KB4480966
Resolved
KB4493464
Resolved:
April 09, 2019
10:00 AM PT

Opened:
January 08, 2019
10:00 AM PT
MSXML6 may cause applications to stop responding
After installing KB4480966, MSXML6 causes applications to stop responding if an exception was thrown during node operations, such as appendChild(), insertBefore(), and moveNode().
The Group Policy editor may stop responding when editing a Group Policy Object (GPO) that contains Group Policy Preferences (GPP) for Internet Explorer 10 settings.
Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 8.1
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2
Resolution: This issue was resolved in KB4493464

Back to top
OS Build 17134.523

January 08, 2019
KB4480966
Resolved
KB4493464
Resolved:
April 09, 2019
10:00 AM PT

Opened:
January 08, 2019
10:00 AM PT
" diff --git a/windows/release-information/status-windows-10-1809-and-windows-server-2019.yml b/windows/release-information/status-windows-10-1809-and-windows-server-2019.yml index f42f97e4cc..b955fcfefb 100644 --- a/windows/release-information/status-windows-10-1809-and-windows-server-2019.yml +++ b/windows/release-information/status-windows-10-1809-and-windows-server-2019.yml @@ -87,7 +87,7 @@ sections: - type: markdown text: " - +
DetailsOriginating updateStatusHistory
End-user-defined characters (EUDC) may cause blue screen at startup
If you enable per font end-user-defined characters (EUDC), the system will stop working and a blue screen may appear at startup. This is not a common setting in non-Asian regions.

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016

Workaround: To avoid this issue, don't enable per font EUDC. As an alternative, you can edit the registry to mitigate this issue; for more information, see KB4496149.

Resolved: This issue was resolved in KB4493509.

Back to top
OS Build 17763.404

April 02, 2019
KB4490481
Resolved
KB4493509
Resolved:
April 09, 2019
10:00 AM PT

Opened:
April 02, 2019
10:00 AM PT
End-user-defined characters (EUDC) may cause blue screen at startup
If you enable per font end-user-defined characters (EUDC), the system will stop working and a blue screen may appear at startup. This is not a common setting in non-Asian regions.
Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016
Workaround: To avoid this issue, don't enable per font EUDC. As an alternative, you can edit the registry to mitigate this issue; for more information, see KB4496149.
Resolved: This issue was resolved in KB4493509.

Back to top
OS Build 17763.404

April 02, 2019
KB4490481
Resolved
KB4493509
Resolved:
April 09, 2019
10:00 AM PT

Opened:
April 02, 2019
10:00 AM PT
" @@ -96,10 +96,10 @@ sections: - type: markdown text: " - - - + + +
DetailsOriginating updateStatusHistory
Custom URI schemes may not start corresponding application
After installing KB4489899, custom URI schemes for application protocol handlers may not start the corresponding application for local intranet and trusted sites security zones on Internet Explorer.

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 8.1; Windows 7, Service Pack 1 
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2; Windows Server 2008 R2 SP1

Workaround: Right-click the URL link to open it in a new window or tab, or enable Protected Mode in Internet Explorer for local intranet and trusted sites
  1. Go to Tools > Internet options > Security.
  2. Within Select a zone to view of change security settings, select Local intranet and then select Enable Protected Mode.
  3. Select Trusted Sites and then select Enable Protected Mode
  4. Select OK.
You must restart the browser after making these changes. 
 
Next steps: Microsoft is working on a resolution and will provide an update in an upcoming release. 

Back to top
OS Build 17763.379

March 12, 2019
KB4489899
Mitigated
Last updated:
April 02, 2019
10:00 AM PT

Opened:
March 12, 2019
10:00 AM PT
Issue using PXE to start a device from WDS
After installing KB4489899, there may be issues using the Preboot Execution Environment (PXE) to start a device from a Windows Deployment Services (WDS) server configured to use Variable Window Extension. This may cause the connection to the WDS server to terminate prematurely while downloading the image. This issue does not affect clients or devices that are not using Variable Window Extension. 

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10 Enterprise LTSC 2016; Windows 8.1
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server 2016; Windows Server 2012 R2

Workaround: To mitigate the issue, disable the Variable Window Extension on WDS server using one of the following options:
Option 1:
Open an Administrator Command prompt and type the following:
Wdsutil /Set-TransportServer /EnableTftpVariableWindowExtension:No 
-
Option 2:
Use the Windows Deployment Services UI to make the following adjustment: 
  1. Open Windows Deployment Services from Windows Administrative Tools. 
  2. Expand Servers and right-click a WDS server. 
  3. Open its properties and clear the Enable Variable Window Extension box on the TFTP tab.
Option 3:
Set the following registry value to 0:  
HKLM\\System\\CurrentControlSet\\Services\\WDSServer\\Providers\\WDSTFTP\\EnableVariableWindowExtension  
Restart the WDSServer service after disabling the Variable Window Extension. 

Next steps: Microsoft is working on a resolution and will provide an update in an upcoming release. 

Back to top
OS Build 17763.379

March 12, 2019
KB4489899
Mitigated
Last updated:
April 02, 2019
10:00 AM PT

Opened:
March 12, 2019
10:00 AM PT
Apps may stop working after selecting an audio output device other than the default
After installing KB4482887 on machines that have multiple audio devices, applications that provide advanced options for internal or external audio output devices may stop working unexpectedly. This issue occurs for users that select an audio output device different from the \"Default Audio Device\". Examples of applications that may stop working include: 
  • Windows Media Player 
  • Realtek HD Audio Manager 
  • Sound Blaster Control Panel 

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019
  • Server: Windows Server, version 1809; Windows Server 2019

Workaround: As a temporary solution, select the \"Default Audio Device\" in the options provided by the application; please refer to the application's user manual for details. 
For example, to set the Default Audio Device in Windows Media Player: 
  1. Open Windows Media Player > Tools > Options > Devices.
  2. Select the device and choose Properties.
  3. On the next dialog, from the drop-down menu under Select the Audio Device, choose Default Audio Device from the list. 
You can then send audio from the application to the audio device you want in the per-application audio settings found under Settings > System > Sound > App Volume and device preferences.

Resolved: This issue was resolved in KB4490481

Back to top
OS Build 17763.348

March 01, 2019
KB4482887
Resolved
KB4490481
Resolved:
April 02, 2019
10:00 AM PT

Opened:
March 01, 2019
10:00 AM PT
Custom URI schemes may not start corresponding application
After installing KB4489899, custom URI schemes for application protocol handlers may not start the corresponding application for local intranet and trusted sites security zones on Internet Explorer.
Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 8.1; Windows 7, Service Pack 1 
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2; Windows Server 2008 R2 SP1
Workaround: Right-click the URL link to open it in a new window or tab, or enable Protected Mode in Internet Explorer for local intranet and trusted sites
  1. Go to Tools > Internet options > Security.
  2. Within Select a zone to view of change security settings, select Local intranet and then select Enable Protected Mode.
  3. Select Trusted Sites and then select Enable Protected Mode
  4. Select OK.
You must restart the browser after making these changes. 
 
Next steps: Microsoft is working on a resolution and will provide an update in an upcoming release. 

Back to top
OS Build 17763.379

March 12, 2019
KB4489899
Mitigated
Last updated:
April 02, 2019
10:00 AM PT

Opened:
March 12, 2019
10:00 AM PT
Issue using PXE to start a device from WDS
After installing KB4489899, there may be issues using the Preboot Execution Environment (PXE) to start a device from a Windows Deployment Services (WDS) server configured to use Variable Window Extension. This may cause the connection to the WDS server to terminate prematurely while downloading the image. This issue does not affect clients or devices that are not using Variable Window Extension. 
Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10 Enterprise LTSC 2016; Windows 8.1
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server 2016; Windows Server 2012 R2
Workaround: To mitigate the issue, disable the Variable Window Extension on WDS server using one of the following options:
Option 1:
Open an Administrator Command prompt and type the following:
Wdsutil /Set-TransportServer /EnableTftpVariableWindowExtension:No 
+
Option 2:
Use the Windows Deployment Services UI to make the following adjustment: 
  1. Open Windows Deployment Services from Windows Administrative Tools. 
  2. Expand Servers and right-click a WDS server. 
  3. Open its properties and clear the Enable Variable Window Extension box on the TFTP tab.
Option 3:
Set the following registry value to 0:  
HKLM\\System\\CurrentControlSet\\Services\\WDSServer\\Providers\\WDSTFTP\\EnableVariableWindowExtension  
Restart the WDSServer service after disabling the Variable Window Extension. 
Next steps: Microsoft is working on a resolution and will provide an update in an upcoming release. 

Back to top
OS Build 17763.379

March 12, 2019
KB4489899
Mitigated
Last updated:
April 02, 2019
10:00 AM PT

Opened:
March 12, 2019
10:00 AM PT
Apps may stop working after selecting an audio output device other than the default
After installing KB4482887 on machines that have multiple audio devices, applications that provide advanced options for internal or external audio output devices may stop working unexpectedly. This issue occurs for users that select an audio output device different from the \"Default Audio Device\". Examples of applications that may stop working include: 
  • Windows Media Player 
  • Realtek HD Audio Manager 
  • Sound Blaster Control Panel 
Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019
  • Server: Windows Server, version 1809; Windows Server 2019
Workaround: As a temporary solution, select the \"Default Audio Device\" in the options provided by the application; please refer to the application's user manual for details. 
For example, to set the Default Audio Device in Windows Media Player: 
  1. Open Windows Media Player > Tools > Options > Devices.
  2. Select the device and choose Properties.
  3. On the next dialog, from the drop-down menu under Select the Audio Device, choose Default Audio Device from the list. 
You can then send audio from the application to the audio device you want in the per-application audio settings found under Settings > System > Sound > App Volume and device preferences.
Resolved: This issue was resolved in KB4490481

Back to top
OS Build 17763.348

March 01, 2019
KB4482887
Resolved
KB4490481
Resolved:
April 02, 2019
10:00 AM PT

Opened:
March 01, 2019
10:00 AM PT
" @@ -108,8 +108,8 @@ sections: - type: markdown text: " - - + +
DetailsOriginating updateStatusHistory
Internet Explorer 11 authentication issue with multiple concurrent logons
After installing the February 12, 2019 update (KB4487044), Internet Explorer 11 and other applications that use WININET.DLL may have authentication issues. This occurs when two or more people use the same user account for multiple, concurrent login sessions on the same Windows Server machine, including Remote Desktop Protocol (RDP) and Terminal Server logons. Symptoms reported by customers include, but may not be limited to:  
  • Cache size and location show zero or empty. 
  • Keyboard shortcuts may not work properly. 
  • Webpages may intermittently fail to load or render correctly. 
  • Issues with credential prompts. 
  • Issues when downloading files. 

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10 Enterprise LTSC 2016; Windows 8.1; Windows 7, Service Pack 1
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server 2016; Windows Server 2012 R2; Windows Server 2008 R2 SP1
 
Resolved: This issue was resolved in KB4493509

Back to top
OS Build 17763.253

January 08, 2019
KB4480116
Resolved
KB4493509
Resolved:
April 09, 2019
10:00 AM PT

Opened:
January 08, 2019
10:00 AM PT
MSXML6 may cause applications to stop responding
After installing KB4480116, MSXML6 causes applications to stop responding if an exception was thrown during node operations, such as appendChild(), insertBefore(), and moveNode().
 
The Group Policy editor may stop responding when editing a Group Policy Object (GPO) that contains Group Policy Preferences (GPP) for Internet Explorer 10 settings. 

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 8.1
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2

Resolved: This issue was resolved in KB4493509

Back to top
OS Build 17763.253

January 08, 2019
KB4480116
Resolved
KB4493509
Resolved:
April 09, 2019
10:00 AM PT

Opened:
January 08, 2019
10:00 AM PT
Internet Explorer 11 authentication issue with multiple concurrent logons
After installing the February 12, 2019 update (KB4487044), Internet Explorer 11 and other applications that use WININET.DLL may have authentication issues. This occurs when two or more people use the same user account for multiple, concurrent login sessions on the same Windows Server machine, including Remote Desktop Protocol (RDP) and Terminal Server logons. Symptoms reported by customers include, but may not be limited to:  
  • Cache size and location show zero or empty. 
  • Keyboard shortcuts may not work properly. 
  • Webpages may intermittently fail to load or render correctly. 
  • Issues with credential prompts. 
  • Issues when downloading files. 
Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10 Enterprise LTSC 2016; Windows 8.1; Windows 7, Service Pack 1
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server 2016; Windows Server 2012 R2; Windows Server 2008 R2 SP1
 
Resolved: This issue was resolved in KB4493509

Back to top
OS Build 17763.253

January 08, 2019
KB4480116
Resolved
KB4493509
Resolved:
April 09, 2019
10:00 AM PT

Opened:
January 08, 2019
10:00 AM PT
MSXML6 may cause applications to stop responding
After installing KB4480116, MSXML6 causes applications to stop responding if an exception was thrown during node operations, such as appendChild(), insertBefore(), and moveNode().
 
The Group Policy editor may stop responding when editing a Group Policy Object (GPO) that contains Group Policy Preferences (GPP) for Internet Explorer 10 settings. 
Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 8.1
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2
Resolved: This issue was resolved in KB4493509

Back to top
OS Build 17763.253

January 08, 2019
KB4480116
Resolved
KB4493509
Resolved:
April 09, 2019
10:00 AM PT

Opened:
January 08, 2019
10:00 AM PT
" @@ -118,6 +118,6 @@ sections: - type: markdown text: " - +
DetailsOriginating updateStatusHistory
Audio not working on monitors or TV connected to a PC via HDMI, USB, or DisplayPort
Upgrade block: Microsoft has identified issues with certain new Intel display drivers. Intel inadvertently released versions of its display driver (versions 24.20.100.6344, 24.20.100.6345) to OEMs that accidentally turned on unsupported features in Windows. 
 
As a result, after updating to Windows 10, version 1809, audio playback from a monitor or television connected to a PC via HDMI, USB-C, or a DisplayPort may not function correctly on devices with these drivers.

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019
  • Server: Windows Server, version 1809; Windows Server 2019 

Next steps: Intel has released updated drivers to OEM device manufacturers. OEMs need to make the updated driver available via Windows Update.

For more information, see the Intel Customer Support article.

Note: This Intel display driver issue is different from the Intel Smart Sound Technology driver (version 09.21.00.3755) audio issue previously documented.

Back to top
OS Build 17763.134

November 13, 2018
KB4467708
Mitigated
Last updated:
March 15, 2019
12:00 PM PT

Opened:
November 13, 2018
10:00 AM PT
Audio not working on monitors or TV connected to a PC via HDMI, USB, or DisplayPort
Upgrade block: Microsoft has identified issues with certain new Intel display drivers. Intel inadvertently released versions of its display driver (versions 24.20.100.6344, 24.20.100.6345) to OEMs that accidentally turned on unsupported features in Windows. 
 
As a result, after updating to Windows 10, version 1809, audio playback from a monitor or television connected to a PC via HDMI, USB-C, or a DisplayPort may not function correctly on devices with these drivers.
Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019
  • Server: Windows Server, version 1809; Windows Server 2019 
Next steps: Intel has released updated drivers to OEM device manufacturers. OEMs need to make the updated driver available via Windows Update.
For more information, see the Intel Customer Support article.
Note: This Intel display driver issue is different from the Intel Smart Sound Technology driver (version 09.21.00.3755) audio issue previously documented.

Back to top
OS Build 17763.134

November 13, 2018
KB4467708
Mitigated
Last updated:
March 15, 2019
12:00 PM PT

Opened:
November 13, 2018
10:00 AM PT
" diff --git a/windows/release-information/status-windows-7-and-windows-server-2008-r2-sp1.yml b/windows/release-information/status-windows-7-and-windows-server-2008-r2-sp1.yml index 1799cfff22..d2491901c1 100644 --- a/windows/release-information/status-windows-7-and-windows-server-2008-r2-sp1.yml +++ b/windows/release-information/status-windows-7-and-windows-server-2008-r2-sp1.yml @@ -85,10 +85,10 @@ sections: - type: markdown text: " - - - - + + + +
DetailsOriginating updateStatusHistory
System may be unresponsive after restart if Avira antivirus software installed.
Microsoft and Avira have identified an issue on devices with Avira antivirus software installed that may cause the system to become unresponsive upon restart after installing KB4493472.

Microsoft has temporarily blocked devices from receiving this update if Avira antivirus software is installed.

Next steps: We are presently investigating this issue with Avira and will provide an update when available.

Back to top
April 09, 2019
KB4493472
Investigating
Last updated:
April 09, 2019
10:00 AM PT

Opened:
April 09, 2019
10:00 AM PT
System unresponsive after restart if Sophos Endpoint Protection installed.
Microsoft and Sophos have identified an issue on devices with Sophos Endpoint Protection installed and managed by either Sophos Central or Sophos Enterprise Console (SEC) that may cause the system to become unresponsive upon restart after installing KB4493472.

Microsoft has temporarily blocked devices from receiving this update if the Sophos Endpoint is installed until a solution is available.

Guidance for Sophos Endpoint and Sophos Enterprise Console customers can be found in the Sophos support article.

Back to top
April 09, 2019
KB4493472
Mitigated
Last updated:
April 09, 2019
10:00 AM PT

Opened:
April 09, 2019
10:00 AM PT
System may be unresponsive after restart if ArcaBit antivirus software installed.
Microsoft and ArcaBit have identified an issue on devices with ArcaBit antivirus software installed that may cause the system to become unresponsive upon restart after installing KB4493472.

Microsoft has temporarily blocked devices from receiving this update if ArcaBit antivirus software is installed.

ArcaBit has released an update to address this issue. For more information, see the Arcabit support article.

Back to top
April 09, 2019
KB4493472
Mitigated
Last updated:
April 09, 2019
10:00 AM PT

Opened:
April 09, 2019
10:00 AM PT
Devices may not respond at login or Welcome screen if running certain Avast software.
Microsoft and Avast have identified an issue on devices running Avast for Business, Avast CloudCare, and AVG Business Edition antivirus software after you install KB4493472 and restart. Devices may become unresponsive at the login or Welcome screen. Additionally, you may be unable to log in or log in after an extended period of time.

Affected platforms: 
  • Client: Windows 8.1; Windows 7, Service Pack 1 
  • Server: Windows Server 2012 R2; Windows Server 2008 R2 SP1 

Resolution: Avast has released emergency updates to address this issue. For more information and AV update schedule, see the Avast support KB article.

Back to top
April 09, 2019
KB4493472
Resolved
Resolved:
April 09, 2019
10:00 AM PT

Opened:
April 09, 2019
10:00 AM PT
System may be unresponsive after restart if Avira antivirus software installed.
Microsoft and Avira have identified an issue on devices with Avira antivirus software installed that may cause the system to become unresponsive upon restart after installing KB4493472.
Microsoft has temporarily blocked devices from receiving this update if Avira antivirus software is installed.
Next steps: We are presently investigating this issue with Avira and will provide an update when available.

Back to top
April 09, 2019
KB4493472
Investigating
Last updated:
April 09, 2019
10:00 AM PT

Opened:
April 09, 2019
10:00 AM PT
System unresponsive after restart if Sophos Endpoint Protection installed.
Microsoft and Sophos have identified an issue on devices with Sophos Endpoint Protection installed and managed by either Sophos Central or Sophos Enterprise Console (SEC) that may cause the system to become unresponsive upon restart after installing KB4493472.
Microsoft has temporarily blocked devices from receiving this update if the Sophos Endpoint is installed until a solution is available.
Guidance for Sophos Endpoint and Sophos Enterprise Console customers can be found in the Sophos support article.

Back to top
April 09, 2019
KB4493472
Mitigated
Last updated:
April 09, 2019
10:00 AM PT

Opened:
April 09, 2019
10:00 AM PT
System may be unresponsive after restart if ArcaBit antivirus software installed.
Microsoft and ArcaBit have identified an issue on devices with ArcaBit antivirus software installed that may cause the system to become unresponsive upon restart after installing KB4493472.
Microsoft has temporarily blocked devices from receiving this update if ArcaBit antivirus software is installed.
ArcaBit has released an update to address this issue. For more information, see the Arcabit support article.

Back to top
April 09, 2019
KB4493472
Mitigated
Last updated:
April 09, 2019
10:00 AM PT

Opened:
April 09, 2019
10:00 AM PT
Devices may not respond at login or Welcome screen if running certain Avast software.
Microsoft and Avast have identified an issue on devices running Avast for Business, Avast CloudCare, and AVG Business Edition antivirus software after you install KB4493472 and restart. Devices may become unresponsive at the login or Welcome screen. Additionally, you may be unable to log in or log in after an extended period of time.
Affected platforms: 
  • Client: Windows 8.1; Windows 7, Service Pack 1 
  • Server: Windows Server 2012 R2; Windows Server 2008 R2 SP1 
Resolution: Avast has released emergency updates to address this issue. For more information and AV update schedule, see the Avast support KB article.

Back to top
April 09, 2019
KB4493472
Resolved
Resolved:
April 09, 2019
10:00 AM PT

Opened:
April 09, 2019
10:00 AM PT
" @@ -97,9 +97,9 @@ sections: - type: markdown text: " - - - + + +
DetailsOriginating updateStatusHistory
Authentication may fail for services after the Kerberos ticket expires.
After installing KB4489878, some customers report that authentication fails for services that require unconstrained delegation after the Kerberos ticket expires (the default is 10 hours). For example, the SQL server service fails.

Workaround: To mitigate this issue, use one of the following options:

  • Option 1: Purge the Kerberos tickets on the application server. After the Kerberos ticket expires, the issue will occur again, and you must purge the tickets again.
  • Option 2: If purging does not mitigate the issue, restart the application; for example, restart the Internet Information Services (IIS) app pool associated with the SQL server.
  • Option 3: Use constrained delegation.

Next steps: Microsoft is working on a resolution and will provide an update in an upcoming release.

Back to top
March 12, 2019
KB4489878
Mitigated
Last updated:
April 09, 2019
10:00 AM PT

Opened:
March 12, 2019
10:00 AM PT
Custom URI schemes may not start corresponding application.
After installing KB4489878, custom URI schemes for application protocol handlers may not start the corresponding application for local intranet and trusted sites on Internet Explorer.

Affected platforms: 
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 8.1; Windows 7, Service Pack 1 
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2; Windows Server 2008 R2 SP1 

Resolution: This issue is resolved in KB4493472.

Back to top
March 12, 2019
KB4489878
Resolved
KB4493472
Resolved:
April 09, 2019
10:00 AM PT

Opened:
March 12, 2019
10:00 AM PT
NETDOM.EXE fails to run.
After installing KB4489878, NETDOM.EXE fails to run, and the on-screen error, “The command failed to complete successfully.” appears.

Affected platforms: 
  • Client: Windows 7, Service Pack 1 
  • Server: Windows Server 2008 R2 SP1 

Resolution: This issue is resolved in KB4493472.

Back to top
March 12, 2019
KB4489878
Resolved
KB4493472
Resolved:
April 09, 2019
10:00 AM PT

Opened:
March 12, 2019
10:00 AM PT
Authentication may fail for services after the Kerberos ticket expires.
After installing KB4489878, some customers report that authentication fails for services that require unconstrained delegation after the Kerberos ticket expires (the default is 10 hours). For example, the SQL server service fails.
Workaround: To mitigate this issue, use one of the following options:
  • Option 1: Purge the Kerberos tickets on the application server. After the Kerberos ticket expires, the issue will occur again, and you must purge the tickets again.
  • Option 2: If purging does not mitigate the issue, restart the application; for example, restart the Internet Information Services (IIS) app pool associated with the SQL server.
  • Option 3: Use constrained delegation.
Next steps: Microsoft is working on a resolution and will provide an update in an upcoming release.

Back to top
March 12, 2019
KB4489878
Mitigated
Last updated:
April 09, 2019
10:00 AM PT

Opened:
March 12, 2019
10:00 AM PT
Custom URI schemes may not start corresponding application.
After installing KB4489878, custom URI schemes for application protocol handlers may not start the corresponding application for local intranet and trusted sites on Internet Explorer.
Affected platforms: 
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 8.1; Windows 7, Service Pack 1 
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2; Windows Server 2008 R2 SP1 
Resolution: This issue is resolved in KB4493472.

Back to top
March 12, 2019
KB4489878
Resolved
KB4493472
Resolved:
April 09, 2019
10:00 AM PT

Opened:
March 12, 2019
10:00 AM PT
NETDOM.EXE fails to run.
After installing KB4489878, NETDOM.EXE fails to run, and the on-screen error, “The command failed to complete successfully.” appears.
Affected platforms: 
  • Client: Windows 7, Service Pack 1 
  • Server: Windows Server 2008 R2 SP1 
Resolution: This issue is resolved in KB4493472.

Back to top
March 12, 2019
KB4489878
Resolved
KB4493472
Resolved:
April 09, 2019
10:00 AM PT

Opened:
March 12, 2019
10:00 AM PT
" @@ -108,8 +108,8 @@ sections: - type: markdown text: " - - - + + +
DetailsOriginating updateStatusHistory
Local Administrators unable to remotely access shares.
Local users who are part of the local Administrators group may not be able to remotely access shares on Windows Server 2008 R2 and Windows 7 machines after installing KB4480970. This does not affect domain accounts in the local Administrators group.
 
Affected platforms: 
  • Client: Windows 7, Service Pack 1 
  • Server: Windows Server 2008 R2 SP1 

Resolution: This issue is resolved in KB4487345.

Back to top
January 08, 2019
KB4480970
Resolved
KB4487345
Resolved:
January 11, 2019
02:00 PM PT

Opened:
January 08, 2019
10:00 AM PT
Virtual machines fail to restore.
After installing KB4480970, virtual machines (VM) may fail to restore successfully if the VM has been saved and restored once before. The error message is, “Failed to restore the virtual machine state: Cannot restore this virtual machine because the saved state data cannot be read. Delete the saved state data and then try to start the virtual machine. (0xC0370027).”

This affects AMD Bulldozer Family 15h, AMD Jaguar Family 16h, and AMD Puma Family 16h (second generation) microarchitectures.

Affected platforms: 
  • Client: Windows 7, Service Pack 1 
  • Server: Windows Server 2008 R2 SP1 

Resolution: This issue is resolved in KB4490511.

Back to top
January 08, 2019
KB4480970
Resolved
KB4490511
Resolved:
February 19, 2019
02:00 PM PT

Opened:
January 08, 2019
10:00 AM PT
Internet Explorer 11 authentication issue with multiple concurrent logons.
After installing KB4480970, Internet Explorer 11 and other applications that use WININET.DLL may have authentication issues. This occurs when two or more people use the same user account for multiple, concurrent login sessions on the same Windows Server machine, including Remote Desktop Protocol (RDP) and Terminal Server logons. Symptoms reported by customers include, but may not be limited to:
  • Cache size and location show zero or empty.
  • Keyboard shortcuts may not work properly.
  • Webpages may intermittently fail to load or render correctly.
  • Issues with credential prompts.
  • Issues when downloading files.

Affected platforms: 
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10 Enterprise LTSC 2016; Windows 8.1; Windows 7, Service Pack 1 
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server 2016; Windows Server 2012 R2; Windows Server 2008 R2 SP1 

Resolution: This issue is resolved in KB4493472.

Back to top
January 08, 2019
KB4480970
Resolved
KB4493472
Resolved:
April 09, 2019
10:00 AM PT

Opened:
January 08, 2019
10:00 AM PT
Local Administrators unable to remotely access shares.
Local users who are part of the local Administrators group may not be able to remotely access shares on Windows Server 2008 R2 and Windows 7 machines after installing KB4480970. This does not affect domain accounts in the local Administrators group.
 
Affected platforms: 
  • Client: Windows 7, Service Pack 1 
  • Server: Windows Server 2008 R2 SP1 
Resolution: This issue is resolved in KB4487345.

Back to top
January 08, 2019
KB4480970
Resolved
KB4487345
Resolved:
January 11, 2019
02:00 PM PT

Opened:
January 08, 2019
10:00 AM PT
Virtual machines fail to restore.
After installing KB4480970, virtual machines (VM) may fail to restore successfully if the VM has been saved and restored once before. The error message is, “Failed to restore the virtual machine state: Cannot restore this virtual machine because the saved state data cannot be read. Delete the saved state data and then try to start the virtual machine. (0xC0370027).”
This affects AMD Bulldozer Family 15h, AMD Jaguar Family 16h, and AMD Puma Family 16h (second generation) microarchitectures.
Affected platforms: 
  • Client: Windows 7, Service Pack 1 
  • Server: Windows Server 2008 R2 SP1 
Resolution: This issue is resolved in KB4490511.

Back to top
January 08, 2019
KB4480970
Resolved
KB4490511
Resolved:
February 19, 2019
02:00 PM PT

Opened:
January 08, 2019
10:00 AM PT
Internet Explorer 11 authentication issue with multiple concurrent logons.
After installing KB4480970, Internet Explorer 11 and other applications that use WININET.DLL may have authentication issues. This occurs when two or more people use the same user account for multiple, concurrent login sessions on the same Windows Server machine, including Remote Desktop Protocol (RDP) and Terminal Server logons. Symptoms reported by customers include, but may not be limited to:
  • Cache size and location show zero or empty.
  • Keyboard shortcuts may not work properly.
  • Webpages may intermittently fail to load or render correctly.
  • Issues with credential prompts.
  • Issues when downloading files.
Affected platforms: 
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10 Enterprise LTSC 2016; Windows 8.1; Windows 7, Service Pack 1 
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server 2016; Windows Server 2012 R2; Windows Server 2008 R2 SP1 
Resolution: This issue is resolved in KB4493472.

Back to top
January 08, 2019
KB4480970
Resolved
KB4493472
Resolved:
April 09, 2019
10:00 AM PT

Opened:
January 08, 2019
10:00 AM PT
" diff --git a/windows/release-information/status-windows-8.1-and-windows-server-2012-r2.yml b/windows/release-information/status-windows-8.1-and-windows-server-2012-r2.yml index d3150aecc8..5a12e31361 100644 --- a/windows/release-information/status-windows-8.1-and-windows-server-2012-r2.yml +++ b/windows/release-information/status-windows-8.1-and-windows-server-2012-r2.yml @@ -85,11 +85,11 @@ sections: - type: markdown text: " - - - - - + + + + +
DetailsOriginating updateStatusHistory
System may be unresponsive after restart if Avira antivirus software installed
Microsoft and Avira have identified an issue on devices with Avira antivirus software installed that may cause the system to become unresponsive upon restart after installing KB4493446.

Microsoft has temporarily blocked devices from receiving this update if Avira antivirus software is installed.

Affected platforms: 
  • Client: Windows 8.1; Windows 7, Service Pack 1 
  • Server: Windows Server 2012 R2; Windows Server 2008 R2 SP1 

Next steps: We are presently investigating this issue with Avira and will provide an update when available.

Back to top
April 09, 2019
KB4493446
Investigating
Last updated:
April 09, 2019
10:00 AM PT

Opened:
April 09, 2019
10:00 AM PT
System unresponsive after restart if Sophos Endpoint Protection installed
Microsoft and Sophos have identified an issue on devices with Sophos Endpoint Protection installed and managed by either Sophos Central or Sophos Enterprise Console (SEC) that may cause the system to become unresponsive upon restart after installing KB4493446.

Microsoft has temporarily blocked devices from receiving this update if the Sophos Endpoint is installed until a solution is available.

Affected platforms: 
  • Client: Windows 8.1; Windows 7, Service Pack 1 
  • Server: Windows Server 2012 R2; Windows Server 2008 R2 SP1 

Guidance for Sophos Endpoint and Sophos Enterprise Console customers can be found in the Sophos support article.

Back to top
April 09, 2019
KB4493446
Mitigated
Last updated:
April 09, 2019
10:00 AM PT

Opened:
April 09, 2019
10:00 AM PT
System may be unresponsive after restart if ArcaBit antivirus software installed
Microsoft and ArcaBit have identified an issue on devices with ArcaBit antivirus software installed that may cause the system to become unresponsive upon restart after installing KB4493446.

Microsoft has temporarily blocked devices from receiving this update if ArcaBit antivirus software is installed.

Affected platforms: 
  • Client: Windows 8.1; Windows 7, Service Pack 1 
  • Server: Windows Server 2012 R2; Windows Server 2008 R2 SP1 

ArcaBit has released an update to address this issue. For more information, see the Arcabit support article.

Back to top
April 09, 2019
KB4493446
Mitigated
Last updated:
April 09, 2019
10:00 AM PT

Opened:
April 09, 2019
10:00 AM PT
Certain operations performed on on a Cluster Shared Volume may fail
Certain operations, such as rename, that you perform on files or folders that are on a Cluster Shared Volume (CSV) may fail with the error, “STATUS_BAD_IMPERSONATION_LEVEL (0xC00000A5)”. This occurs when you perform the operation on a CSV owner node from a process that doesn’t have administrator privilege.

Affected platforms: 
  • Client: Windows 8.1 
  • Server: Windows Server 2012 R2 

Workaround: Do one of the following:

  • Perform the operation from a process that has administrator privilege.
  • Perform the operation from a node that doesn’t have CSV ownership.

Next steps: Microsoft is working on a resolution and will provide an update in an upcoming release.

Back to top
April 09, 2019
KB4493446
Mitigated
Last updated:
April 09, 2019
10:00 AM PT

Opened:
April 09, 2019
10:00 AM PT
Devices may not respond at login or Welcome screen if running certain Avast software
Microsoft and Avast have identified an issue on devices running Avast for Business, Avast CloudCare, and AVG Business Edition antivirus software after you install KB4493446 and restart. Devices may become unresponsive at the login or Welcome screen. Additionally, you may be unable to log in or log in after an extended period of time.

Affected platforms: 
  • Client: Windows 8.1; Windows 7, Service Pack 1 
  • Server: Windows Server 2012 R2; Windows Server 2008 R2 SP1 


Resolution: Avast has released emergency updates to address this issue. For more information and AV update schedule, see the Avast support KB article.

Back to top
April 09, 2019
KB4493446
Resolved
Resolved:
April 09, 2019
10:00 AM PT

Opened:
April 09, 2019
10:00 AM PT
System may be unresponsive after restart if Avira antivirus software installed
Microsoft and Avira have identified an issue on devices with Avira antivirus software installed that may cause the system to become unresponsive upon restart after installing KB4493446.
Microsoft has temporarily blocked devices from receiving this update if Avira antivirus software is installed.
Affected platforms: 
  • Client: Windows 8.1; Windows 7, Service Pack 1 
  • Server: Windows Server 2012 R2; Windows Server 2008 R2 SP1 
Next steps: We are presently investigating this issue with Avira and will provide an update when available.

Back to top
April 09, 2019
KB4493446
Investigating
Last updated:
April 09, 2019
10:00 AM PT

Opened:
April 09, 2019
10:00 AM PT
System unresponsive after restart if Sophos Endpoint Protection installed
Microsoft and Sophos have identified an issue on devices with Sophos Endpoint Protection installed and managed by either Sophos Central or Sophos Enterprise Console (SEC) that may cause the system to become unresponsive upon restart after installing KB4493446.
Microsoft has temporarily blocked devices from receiving this update if the Sophos Endpoint is installed until a solution is available.
Affected platforms: 
  • Client: Windows 8.1; Windows 7, Service Pack 1 
  • Server: Windows Server 2012 R2; Windows Server 2008 R2 SP1 
Guidance for Sophos Endpoint and Sophos Enterprise Console customers can be found in the Sophos support article.

Back to top
April 09, 2019
KB4493446
Mitigated
Last updated:
April 09, 2019
10:00 AM PT

Opened:
April 09, 2019
10:00 AM PT
System may be unresponsive after restart if ArcaBit antivirus software installed
Microsoft and ArcaBit have identified an issue on devices with ArcaBit antivirus software installed that may cause the system to become unresponsive upon restart after installing KB4493446.
Microsoft has temporarily blocked devices from receiving this update if ArcaBit antivirus software is installed.
Affected platforms: 
  • Client: Windows 8.1; Windows 7, Service Pack 1 
  • Server: Windows Server 2012 R2; Windows Server 2008 R2 SP1 
ArcaBit has released an update to address this issue. For more information, see the Arcabit support article.

Back to top
April 09, 2019
KB4493446
Mitigated
Last updated:
April 09, 2019
10:00 AM PT

Opened:
April 09, 2019
10:00 AM PT
Certain operations performed on on a Cluster Shared Volume may fail
Certain operations, such as rename, that you perform on files or folders that are on a Cluster Shared Volume (CSV) may fail with the error, “STATUS_BAD_IMPERSONATION_LEVEL (0xC00000A5)”. This occurs when you perform the operation on a CSV owner node from a process that doesn’t have administrator privilege.
Affected platforms: 
  • Client: Windows 8.1 
  • Server: Windows Server 2012 R2 
Workaround: Do one of the following:
  • Perform the operation from a process that has administrator privilege.
  • Perform the operation from a node that doesn’t have CSV ownership.
Next steps: Microsoft is working on a resolution and will provide an update in an upcoming release.

Back to top
April 09, 2019
KB4493446
Mitigated
Last updated:
April 09, 2019
10:00 AM PT

Opened:
April 09, 2019
10:00 AM PT
Devices may not respond at login or Welcome screen if running certain Avast software
Microsoft and Avast have identified an issue on devices running Avast for Business, Avast CloudCare, and AVG Business Edition antivirus software after you install KB4493446 and restart. Devices may become unresponsive at the login or Welcome screen. Additionally, you may be unable to log in or log in after an extended period of time.
Affected platforms: 
  • Client: Windows 8.1; Windows 7, Service Pack 1 
  • Server: Windows Server 2012 R2; Windows Server 2008 R2 SP1 
Resolution: Avast has released emergency updates to address this issue. For more information and AV update schedule, see the Avast support KB article.

Back to top
April 09, 2019
KB4493446
Resolved
Resolved:
April 09, 2019
10:00 AM PT

Opened:
April 09, 2019
10:00 AM PT
" @@ -98,9 +98,9 @@ sections: - type: markdown text: " - - + +
DetailsOriginating updateStatusHistory
Issue using PXE to start a device from WDS
After installing KB4489881, there may be issues using the Preboot Execution Environment (PXE) to start a device from a Windows Deployment Services (WDS) server configured to use Variable Window Extension. This may cause the connection to the WDS server to terminate prematurely while downloading the image. This issue does not affect clients or devices that are not using Variable Window Extension.

Affected platforms: 
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10 Enterprise LTSC 2016; Windows 8.1 
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server 2016; Windows Server 2012 R2 

Workaround: To mitigate the issue, disable the Variable Window Extension on WDS server using one of the following options:
Option 1:
Open an Administrator Command prompt and type the following:
Wdsutil /Set-TransportServer /EnableTftpVariableWindowExtension:No
-
Option 2:
Use the Windows Deployment Services UI to make the following adjustment:
  1. Open Windows Deployment Services from Windows Administrative Tools.
  2. Expand Servers and right-click a WDS server.
  3. Open its properties and clear the Enable Variable Window Extension box on the TFTP tab.
Option 3:
Set the following registry value to 0:
HKLM\\System\\CurrentControlSet\\Services\\WDSServer\\Providers\\WDSTFTP\\EnableVariableWindowExtension
Restart the WDSServer service after disabling the Variable Window Extension.

Next steps: Microsoft is working on a resolution and will provide an update in an upcoming release.

Back to top
March 12, 2019
KB4489881
Mitigated
Last updated:
April 09, 2019
10:00 AM PT

Opened:
March 12, 2019
10:00 AM PT
Custom URI schemes may not start corresponding application
After installing KB4489881, custom URI schemes for application protocol handlers may not start the corresponding application for local intranet and trusted sites security zones on Internet Explorer.

Affected platforms: 
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 8.1; Windows 7, Service Pack 1 
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2; Windows Server 2008 R2 SP1 

Resolution: This issue is resolved in KB4493446.

Back to top
March 12, 2019
KB4489881
Resolved
KB4493446
Resolved:
April 09, 2019
10:00 AM PT

Opened:
March 12, 2019
10:00 AM PT
Issue using PXE to start a device from WDS
After installing KB4489881, there may be issues using the Preboot Execution Environment (PXE) to start a device from a Windows Deployment Services (WDS) server configured to use Variable Window Extension. This may cause the connection to the WDS server to terminate prematurely while downloading the image. This issue does not affect clients or devices that are not using Variable Window Extension.
Affected platforms: 
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10 Enterprise LTSC 2016; Windows 8.1 
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server 2016; Windows Server 2012 R2 
Workaround: To mitigate the issue, disable the Variable Window Extension on WDS server using one of the following options:
Option 1:
Open an Administrator Command prompt and type the following:
Wdsutil /Set-TransportServer /EnableTftpVariableWindowExtension:No
+
Option 2:
Use the Windows Deployment Services UI to make the following adjustment:
  1. Open Windows Deployment Services from Windows Administrative Tools.
  2. Expand Servers and right-click a WDS server.
  3. Open its properties and clear the Enable Variable Window Extension box on the TFTP tab.
Option 3:
Set the following registry value to 0:
HKLM\\System\\CurrentControlSet\\Services\\WDSServer\\Providers\\WDSTFTP\\EnableVariableWindowExtension
Restart the WDSServer service after disabling the Variable Window Extension.
Next steps: Microsoft is working on a resolution and will provide an update in an upcoming release.

Back to top
March 12, 2019
KB4489881
Mitigated
Last updated:
April 09, 2019
10:00 AM PT

Opened:
March 12, 2019
10:00 AM PT
Custom URI schemes may not start corresponding application
After installing KB4489881, custom URI schemes for application protocol handlers may not start the corresponding application for local intranet and trusted sites security zones on Internet Explorer.
Affected platforms: 
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 8.1; Windows 7, Service Pack 1 
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2; Windows Server 2008 R2 SP1 
Resolution: This issue is resolved in KB4493446.

Back to top
March 12, 2019
KB4489881
Resolved
KB4493446
Resolved:
April 09, 2019
10:00 AM PT

Opened:
March 12, 2019
10:00 AM PT
" @@ -109,7 +109,7 @@ sections: - type: markdown text: " - +
DetailsOriginating updateStatusHistory
Embedded objects may display incorrectly
Any compound document (OLE) server application that places embedded objects into the Windows Metafile (WMF) using the PatBlt API may display embedded objects incorrectly.

For example, if you paste a Microsoft Excel worksheet object into a Microsoft Word document, the cells may render with a different background color.

Affected platforms: 
  • Client: Windows 8.1 
  • Server: Windows Server 2012 R2 

Resolution: This issue is resolved in KB4493446.

Back to top
February 12, 2019
KB4487000
Resolved
KB4493446
Resolved:
April 09, 2019
10:00 AM PT

Opened:
February 12, 2019
10:00 AM PT
Embedded objects may display incorrectly
Any compound document (OLE) server application that places embedded objects into the Windows Metafile (WMF) using the PatBlt API may display embedded objects incorrectly.
For example, if you paste a Microsoft Excel worksheet object into a Microsoft Word document, the cells may render with a different background color.
Affected platforms: 
  • Client: Windows 8.1 
  • Server: Windows Server 2012 R2 
Resolution: This issue is resolved in KB4493446.

Back to top
February 12, 2019
KB4487000
Resolved
KB4493446
Resolved:
April 09, 2019
10:00 AM PT

Opened:
February 12, 2019
10:00 AM PT
" @@ -118,7 +118,7 @@ sections: - type: markdown text: " - - + +
DetailsOriginating updateStatusHistory
Internet Explorer 11 authentication issue with multiple concurrent logons
After installing KB4480963, Internet Explorer 11 and other applications that use WININET.DLL may have authentication issues. This occurs when two or more people use the same user account for multiple, concurrent login sessions on the same Windows Server machine, including Remote Desktop Protocol (RDP) and Terminal Server logons. Symptoms reported by customers include, but may not be limited to:
  • Cache size and location show zero or empty.
  • Keyboard shortcuts may not work properly.
  • Webpages may intermittently fail to load or render correctly.
  • Issues with credential prompts.
  • Issues when downloading files.

Affected platforms: 
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10 Enterprise LTSC 2016; Windows 8.1; Windows 7, Service Pack 1 
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server 2016; Windows Server 2012 R2; Windows Server 2008 R2 SP1 

Resolution: This issue is resolved in KB4493446.

Back to top
January 08, 2019
KB4480963
Resolved
KB4493446
Resolved:
April 09, 2019
10:00 AM PT

Opened:
January 08, 2019
10:00 AM PT
MSXML6 may cause applications to stop responding.
After installing KB4480963, MSXML6 causes applications to stop responding if an exception was thrown during node operations, such as appendChild(), insertBefore(), and moveNode().

The Group Policy editor may stop responding when editing a Group Policy Object (GPO) that contains Group Policy Preferences (GPP) for Internet Explorer 10 settings.

Resolution: This issue is resolved in KB4493446.

Back to top
January 08, 2019
KB4480963
Resolved
KB4493446
Resolved:
April 09, 2019
10:00 AM PT

Opened:
January 08, 2019
10:00 AM PT
Internet Explorer 11 authentication issue with multiple concurrent logons
After installing KB4480963, Internet Explorer 11 and other applications that use WININET.DLL may have authentication issues. This occurs when two or more people use the same user account for multiple, concurrent login sessions on the same Windows Server machine, including Remote Desktop Protocol (RDP) and Terminal Server logons. Symptoms reported by customers include, but may not be limited to:
  • Cache size and location show zero or empty.
  • Keyboard shortcuts may not work properly.
  • Webpages may intermittently fail to load or render correctly.
  • Issues with credential prompts.
  • Issues when downloading files.
Affected platforms: 
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10 Enterprise LTSC 2016; Windows 8.1; Windows 7, Service Pack 1 
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server 2016; Windows Server 2012 R2; Windows Server 2008 R2 SP1 
Resolution: This issue is resolved in KB4493446.

Back to top
January 08, 2019
KB4480963
Resolved
KB4493446
Resolved:
April 09, 2019
10:00 AM PT

Opened:
January 08, 2019
10:00 AM PT
MSXML6 may cause applications to stop responding.
After installing KB4480963, MSXML6 causes applications to stop responding if an exception was thrown during node operations, such as appendChild(), insertBefore(), and moveNode().
The Group Policy editor may stop responding when editing a Group Policy Object (GPO) that contains Group Policy Preferences (GPP) for Internet Explorer 10 settings.
Resolution: This issue is resolved in KB4493446.

Back to top
January 08, 2019
KB4480963
Resolved
KB4493446
Resolved:
April 09, 2019
10:00 AM PT

Opened:
January 08, 2019
10:00 AM PT
" diff --git a/windows/release-information/status-windows-server-2008-sp2.yml b/windows/release-information/status-windows-server-2008-sp2.yml index 8e8ad0c510..881e7f289f 100644 --- a/windows/release-information/status-windows-server-2008-sp2.yml +++ b/windows/release-information/status-windows-server-2008-sp2.yml @@ -86,16 +86,16 @@ sections: - type: markdown text: " - - - - - - - - - - - + + + + + + + + + + +
DetailsOriginating updateStatusHistory
System may be unresponsive after restart if Avira antivirus software installed
Microsoft and Avira have identified an issue on devices with Avira antivirus software installed that may cause the system to become unresponsive upon restart after installing KB4493471.

Microsoft has temporarily blocked devices from receiving this update if Avira antivirus software is installed.

Affected platforms: 
  • Client: Windows 8.1; Windows 7, Service Pack 1 
  • Server: Windows Server 2012 R2; Windows Server 2012; Windows Server 2008 R2 SP1; Windows Server 2008 SP2

Next steps: We are presently investigating this issue with Avira and will provide an update when available.

Back to top
April 09, 2019
KB4493471
Investigating
Last updated:
April 25, 2019
03:26 PM PT

Opened:
April 25, 2019
03:26 PM PT
System unresponsive after restart if Sophos Endpoint Protection installed
Microsoft and Sophos have identified an issue on devices with Sophos Endpoint Protection installed and managed by either Sophos Central or Sophos Enterprise Console (SEC) that may cause the system to become unresponsive upon restart after installing KB4493471.

Microsoft has temporarily blocked devices from receiving this update if the Sophos Endpoint is installed until a solution is available.

Guidance for Sophos Endpoint and Sophos Enterprise Console customers can be found in the Sophos support article.

Affected platforms: 
  • Client: Windows 8.1; Windows 7, Service Pack 1 
  • Server: Windows Server 2012 R2; Windows Server 2012; Windows Server 2008 R2 SP1; Windows Server 2008 SP2

Back to top
April 09, 2019
KB4493471
Mitigated
Last updated:
April 25, 2019
03:26 PM PT

Opened:
April 25, 2019
03:26 PM PT
Authentication may fail for services after the Kerberos ticket expires
After installing KB4489880, some customers report that authentication fails for services that require unconstrained delegation after the Kerberos ticket expires (the default is 10 hours). For example, the SQL server service fails.

Affected platforms: 
  • Client: Windows 7, Service Pack 1 
  • Server: Windows Server 2008 R2 SP1; Windows Server 2008 SP2

Workaround: To mitigate this issue, use one of the following options:

  • Option 1: Purge the Kerberos tickets on the application server. After the Kerberos ticket expires, the issue will occur again, and you must purge the tickets again.
  • Option 2: If purging does not mitigate the issue, restart the application; for example, restart the Internet Information Services (IIS) app pool associated with the SQL server.
  • Option 3: Use constrained delegation.

Next steps: Microsoft is working on a resolution and will provide an update in an upcoming release.

Back to top
March 12, 2019
KB4489880
Mitigated
Last updated:
April 25, 2019
03:24 PM PT

Opened:
April 25, 2019
03:24 PM PT
Unable to use Seek bar in Windows Media Player
After installing KB4463097, users may not be able to use the Seek Bar in Windows Media Player when playing specific files. This issue does not affect normal playback.

Affected platforms: 
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 8.1; Windows 7, Service Pack 1
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2; Windows Server 2012; Windows Server 2008 R2 SP1; Windows Server 2008 SP2

Resolution: This issue is resolved in KB4471325.

Back to top
October 09, 2018
KB4463097
Resolved
KB4471325
Resolved:
December 11, 2018
10:00 AM PT

Opened:
April 25, 2019
03:28 PM PT
Applications using Microsoft Jet database fail to open
Applications that use a Microsoft Jet database with the Microsoft Access 97 file format may fail to open if the database has column names greater than 32 characters. The database will fail to open with the error, “Unrecognized Database Format”.

Affected platforms: 
  • Client: Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 8.1; Windows 7, Service Pack 1 
  • Server: Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2; Windows Server 2012; Windows Server 2008 R2 SP1; Windows Server 2008 SP2

Resolution: This issue is resolved in KB4487023.

Back to top
January 08, 2019
KB4480968
Resolved
KB4487023
Resolved:
February 12, 2019
10:00 AM PT

Opened:
April 25, 2019
03:32 PM PT
Virtual machines fail to restore
After installing KB4480968, virtual machines (VM) may fail to restore successfully if the VM has been saved and restored once before. The error message is, “Failed to restore the virtual machine state: Cannot restore this virtual machine because the saved state data cannot be read. Delete the saved state data and then try to start the virtual machine. (0xC0370027).”

This affects AMD Bulldozer Family 15h, AMD Jaguar Family 16h, and AMD Puma Family 16h (second generation) microarchitectures.

Affected platforms: 
  • Client: Windows 7, Service Pack 1 
  • Server: Windows Server 2012; Windows Server 2008 R2 SP1; Windows Server 2008 SP2

Resolution: This issue is resolved in KB4490514.

Back to top
January 08, 2019
KB4480968
Resolved
KB4490514
Resolved:
February 19, 2019
02:00 PM PT

Opened:
April 25, 2019
03:26 PM PT
Embedded objects may display incorrectly
Any compound document (OLE) server application that places embedded objects into the Windows Metafile (WMF) using the PatBlt API may display embedded objects incorrectly.

For example, if you paste a Microsoft Excel worksheet object into a Microsoft Word document, the cells may render with a different background color.

Affected platforms: 
  • Client: Windows 8.1 
  • Server: Windows Server 2012 R2; Windows Server 2012; Windows Server 2008 SP2

Resolution: This issue is resolved in KB4493471.

Back to top

Resolved
KB4493471
Resolved:
April 09, 2019
10:00 AM PT

Opened:
April 25, 2019
03:26 PM PT
First character of the Japanese era name not recognized as an abbreviation
After installing KB4480974, the first character of the Japanese era name is not recognized as an abbreviation and may cause date parsing issues.

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 8.1; Windows 7, Service Pack 1
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2; Windows Server 2012; Windows Server 2008 R2 SP1; Windows Server 2008 SP2

Resolution: This issue is resolved in KB4489880.

Back to top
January 17, 2019
KB4480974
Resolved
KB4489880
Resolved:
March 12, 2019
10:00 AM PT

Opened:
April 25, 2019
03:32 PM PT
Applications using Microsoft Jet database and Access 95 file format stop working
Applications that use a Microsoft Jet database with the Microsoft Access 95 file format may randomly stop working.

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 7, Service Pack 1
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012; Windows Server 2008 R2 SP1; Windows Server 2008 SP2

Resolution: This issue is resolved in KB4487022.

Back to top
February 12, 2019
KB4487023
Resolved
KB4487022
Resolved:
February 19, 2019
02:00 PM PT

Opened:
April 25, 2019
03:26 PM PT
Local Administrators unable to remotely access shares
Local users who are part of the local Administrators group may not be able to remotely access shares on Windows Server 2008 R2 and Windows 7 machines after installing KB4480968. This does not affect domain accounts in the local Administrators group.

Affected platforms: 
  • Client: Windows 7, Service Pack 1 
  • Server: Windows Server 2008 R2 SP1; Windows Server 2008 SP2

Resolution: This issue is resolved in KB4487354.

Back to top
January 08, 2019
KB4480968
Resolved
KB4487354
Resolved:
January 11, 2019
02:00 PM PT

Opened:
April 25, 2019
03:26 PM PT
NETDOM.EXE fails to run
After installing KB4489880, NETDOM.EXE fails to run, and the on-screen error, “The command failed to complete successfully.” appears.

Affected platforms: 
  • Client: Windows 7, Service Pack 1 
  • Server: Windows Server 2008 R2 SP1; Windows Server 2008 SP2

Resolution: This issue is resolved in KB4493471.

Back to top
March 12, 2019
KB4489880
Resolved
KB4493471
Resolved:
April 09, 2019
10:00 AM PT

Opened:
April 25, 2019
03:25 PM PT
System may be unresponsive after restart if Avira antivirus software installed
Microsoft and Avira have identified an issue on devices with Avira antivirus software installed that may cause the system to become unresponsive upon restart after installing KB4493471.
Microsoft has temporarily blocked devices from receiving this update if Avira antivirus software is installed.
Affected platforms: 
  • Client: Windows 8.1; Windows 7, Service Pack 1 
  • Server: Windows Server 2012 R2; Windows Server 2012; Windows Server 2008 R2 SP1; Windows Server 2008 SP2
Next steps: We are presently investigating this issue with Avira and will provide an update when available.

Back to top
April 09, 2019
KB4493471
Investigating
Last updated:
April 25, 2019
03:26 PM PT

Opened:
April 25, 2019
03:26 PM PT
System unresponsive after restart if Sophos Endpoint Protection installed
Microsoft and Sophos have identified an issue on devices with Sophos Endpoint Protection installed and managed by either Sophos Central or Sophos Enterprise Console (SEC) that may cause the system to become unresponsive upon restart after installing KB4493471.
Microsoft has temporarily blocked devices from receiving this update if the Sophos Endpoint is installed until a solution is available.
Guidance for Sophos Endpoint and Sophos Enterprise Console customers can be found in the Sophos support article.
Affected platforms: 
  • Client: Windows 8.1; Windows 7, Service Pack 1 
  • Server: Windows Server 2012 R2; Windows Server 2012; Windows Server 2008 R2 SP1; Windows Server 2008 SP2

Back to top
April 09, 2019
KB4493471
Mitigated
Last updated:
April 25, 2019
03:26 PM PT

Opened:
April 25, 2019
03:26 PM PT
Authentication may fail for services after the Kerberos ticket expires
After installing KB4489880, some customers report that authentication fails for services that require unconstrained delegation after the Kerberos ticket expires (the default is 10 hours). For example, the SQL server service fails.
Affected platforms: 
  • Client: Windows 7, Service Pack 1 
  • Server: Windows Server 2008 R2 SP1; Windows Server 2008 SP2
Workaround: To mitigate this issue, use one of the following options:
  • Option 1: Purge the Kerberos tickets on the application server. After the Kerberos ticket expires, the issue will occur again, and you must purge the tickets again.
  • Option 2: If purging does not mitigate the issue, restart the application; for example, restart the Internet Information Services (IIS) app pool associated with the SQL server.
  • Option 3: Use constrained delegation.
Next steps: Microsoft is working on a resolution and will provide an update in an upcoming release.

Back to top
March 12, 2019
KB4489880
Mitigated
Last updated:
April 25, 2019
03:24 PM PT

Opened:
April 25, 2019
03:24 PM PT
Unable to use Seek bar in Windows Media Player
After installing KB4463097, users may not be able to use the Seek Bar in Windows Media Player when playing specific files. This issue does not affect normal playback.
Affected platforms: 
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 8.1; Windows 7, Service Pack 1
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2; Windows Server 2012; Windows Server 2008 R2 SP1; Windows Server 2008 SP2
Resolution: This issue is resolved in KB4471325.

Back to top
October 09, 2018
KB4463097
Resolved
KB4471325
Resolved:
December 11, 2018
10:00 AM PT

Opened:
April 25, 2019
03:28 PM PT
Applications using Microsoft Jet database fail to open
Applications that use a Microsoft Jet database with the Microsoft Access 97 file format may fail to open if the database has column names greater than 32 characters. The database will fail to open with the error, “Unrecognized Database Format”.
Affected platforms: 
  • Client: Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 8.1; Windows 7, Service Pack 1 
  • Server: Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2; Windows Server 2012; Windows Server 2008 R2 SP1; Windows Server 2008 SP2
Resolution: This issue is resolved in KB4487023.

Back to top
January 08, 2019
KB4480968
Resolved
KB4487023
Resolved:
February 12, 2019
10:00 AM PT

Opened:
April 25, 2019
03:32 PM PT
Virtual machines fail to restore
After installing KB4480968, virtual machines (VM) may fail to restore successfully if the VM has been saved and restored once before. The error message is, “Failed to restore the virtual machine state: Cannot restore this virtual machine because the saved state data cannot be read. Delete the saved state data and then try to start the virtual machine. (0xC0370027).”
This affects AMD Bulldozer Family 15h, AMD Jaguar Family 16h, and AMD Puma Family 16h (second generation) microarchitectures.
Affected platforms: 
  • Client: Windows 7, Service Pack 1 
  • Server: Windows Server 2012; Windows Server 2008 R2 SP1; Windows Server 2008 SP2
Resolution: This issue is resolved in KB4490514.

Back to top
January 08, 2019
KB4480968
Resolved
KB4490514
Resolved:
February 19, 2019
02:00 PM PT

Opened:
April 25, 2019
03:26 PM PT
Embedded objects may display incorrectly
Any compound document (OLE) server application that places embedded objects into the Windows Metafile (WMF) using the PatBlt API may display embedded objects incorrectly.
For example, if you paste a Microsoft Excel worksheet object into a Microsoft Word document, the cells may render with a different background color.
Affected platforms: 
  • Client: Windows 8.1 
  • Server: Windows Server 2012 R2; Windows Server 2012; Windows Server 2008 SP2
Resolution: This issue is resolved in KB4493471.

Back to top

Resolved
KB4493471
Resolved:
April 09, 2019
10:00 AM PT

Opened:
April 25, 2019
03:26 PM PT
First character of the Japanese era name not recognized as an abbreviation
After installing KB4480974, the first character of the Japanese era name is not recognized as an abbreviation and may cause date parsing issues.
Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 8.1; Windows 7, Service Pack 1
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2; Windows Server 2012; Windows Server 2008 R2 SP1; Windows Server 2008 SP2
Resolution: This issue is resolved in KB4489880.

Back to top
January 17, 2019
KB4480974
Resolved
KB4489880
Resolved:
March 12, 2019
10:00 AM PT

Opened:
April 25, 2019
03:32 PM PT
Applications using Microsoft Jet database and Access 95 file format stop working
Applications that use a Microsoft Jet database with the Microsoft Access 95 file format may randomly stop working.
Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 7, Service Pack 1
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012; Windows Server 2008 R2 SP1; Windows Server 2008 SP2
Resolution: This issue is resolved in KB4487022.

Back to top
February 12, 2019
KB4487023
Resolved
KB4487022
Resolved:
February 19, 2019
02:00 PM PT

Opened:
April 25, 2019
03:26 PM PT
Local Administrators unable to remotely access shares
Local users who are part of the local Administrators group may not be able to remotely access shares on Windows Server 2008 R2 and Windows 7 machines after installing KB4480968. This does not affect domain accounts in the local Administrators group.
Affected platforms: 
  • Client: Windows 7, Service Pack 1 
  • Server: Windows Server 2008 R2 SP1; Windows Server 2008 SP2
Resolution: This issue is resolved in KB4487354.

Back to top
January 08, 2019
KB4480968
Resolved
KB4487354
Resolved:
January 11, 2019
02:00 PM PT

Opened:
April 25, 2019
03:26 PM PT
NETDOM.EXE fails to run
After installing KB4489880, NETDOM.EXE fails to run, and the on-screen error, “The command failed to complete successfully.” appears.
Affected platforms: 
  • Client: Windows 7, Service Pack 1 
  • Server: Windows Server 2008 R2 SP1; Windows Server 2008 SP2
Resolution: This issue is resolved in KB4493471.

Back to top
March 12, 2019
KB4489880
Resolved
KB4493471
Resolved:
April 09, 2019
10:00 AM PT

Opened:
April 25, 2019
03:25 PM PT
" diff --git a/windows/release-information/status-windows-server-2012.yml b/windows/release-information/status-windows-server-2012.yml index 904e70e764..0c5d3d4089 100644 --- a/windows/release-information/status-windows-server-2012.yml +++ b/windows/release-information/status-windows-server-2012.yml @@ -90,21 +90,21 @@ sections: - type: markdown text: " - - - - - - - - - - - - - - - + + + + + + + + + + + + + + +
DetailsOriginating updateStatusHistory
System may be unresponsive after restart if Avira antivirus software installed
Microsoft and Avira have identified an issue on devices with Avira antivirus software installed that may cause the system to become unresponsive upon restart after installing KB4493451.

Microsoft has temporarily blocked devices from receiving this update if Avira antivirus software is installed.

Next steps: We are presently investigating this issue with Avira and will provide an update when available.

Back to top
April 09, 2019
KB4493451
Investigating
Last updated:
April 25, 2019
03:48 PM PT

Opened:
April 25, 2019
03:48 PM PT
Issue using PXE to start a device from WDS
After installing KB4489891, there may be issues using the Preboot Execution Environment (PXE) to start a device from a Windows Deployment Services (WDS) server configured to use Variable Window Extension. This may cause the connection to the WDS server to terminate prematurely while downloading the image. This issue does not affect clients or devices that are not using Variable Window Extension.

Workaround: To mitigate the issue, disable the Variable Window Extension on WDS server using one of the following options:
Option 1:
Open an Administrator Command prompt and type the following:
Wdsutil /Set-TransportServer /EnableTftpVariableWindowExtension:No
-
Option 2:
Use the Windows Deployment Services UI to make the following adjustment:
  1. Open Windows Deployment Services from Windows Administrative Tools.
  2. Expand Servers and right-click a WDS server.
  3. Open its properties and clear the Enable Variable Window Extension box on the TFTP tab.
Option 3:
Set the following registry value to 0:
HKLM\\System\\CurrentControlSet\\Services\\WDSServer\\Providers\\WDSTFTP\\EnableVariableWindowExtension
Restart the WDSServer service after disabling the Variable Window Extension.

Next steps: Microsoft is working on a resolution and will provide an update in an upcoming release.

Back to top
March 12, 2019
KB4489891
Mitigated
Last updated:
April 25, 2019
03:40 PM PT

Opened:
April 25, 2019
03:40 PM PT
System unresponsive after restart if Sophos Endpoint Protection installed
Microsoft and Sophos have identified an issue on devices with Sophos Endpoint Protection installed and managed by either Sophos Central or Sophos Enterprise Console (SEC) that may cause the system to become unresponsive upon restart after installing KB4493451.

Microsoft has temporarily blocked devices from receiving this update if the Sophos Endpoint is installed until a solution is available.

Guidance for Sophos Endpoint and Sophos Enterprise Console customers can be found in the Sophos support article.

Back to top
April 09, 2019
KB4493451
Mitigated
Last updated:
April 25, 2019
03:46 PM PT

Opened:
April 25, 2019
03:46 PM PT
Certain operations performed on on a Cluster Shared Volume may fail
Certain operations, such as rename, that you perform on files or folders that are on a Cluster Shared Volume (CSV) may fail with the error, \"STATUS_BAD_IMPERSONATION_LEVEL (0xC00000A5)\". This occurs when you perform the operation on a CSV owner node from a process that doesn’t have administrator privilege.

Workaround: Do one of the following:

  • Perform the operation from a process that has administrator privilege.
  • Perform the operation from a node that doesn’t have CSV ownership.

Next steps: Microsoft is working on a resolution and will provide an update in an upcoming release.

Back to top
January 08, 2019
KB4480975
Mitigated
Last updated:
April 25, 2019
03:52 PM PT

Opened:
April 25, 2019
03:52 PM PT
Unable to use Seek bar in Windows Media Player
After installing KB4462929, users may not be able to use the Seek Bar in Windows Media Player when playing specific files. This issue does not affect normal playback.

Resolution: This issue is resolved in KB4471330.

Back to top
October 09, 2018
KB4462929
Resolved
KB4471330
Resolved:
December 11, 2018
10:00 AM PT

Opened:
April 25, 2019
02:47 PM PT
Event Viewer may not show some event descriptions for network interface cards
After installing KB4457135, the Event Viewer may not show some event descriptions for network interface cards (NICs).

Resolution: This issue is resolved in KB4489891.

Back to top
September 11, 2018
KB4457135
Resolved
KB4489891
Resolved:
March 12, 2019
10:00 AM PT

Opened:
April 25, 2019
03:10 PM PT
Unable to access hotspots with third-party applications
After installing KB4480975, third-party applications may have difficulty authenticating hotspots.

Resolution: This issue is resolved in KB4480971.

Back to top
January 08, 2019
KB4480975
Resolved
KB4480971
Resolved:
January 15, 2019
10:00 AM PT

Opened:
April 25, 2019
03:14 PM PT
Applications using Microsoft Jet database fail to open
Applications that use a Microsoft Jet database with the Microsoft Access 97 file format may fail to open if the database has column names greater than 32 characters. The database will fail to open with the error, \"Unrecognized Database Format\".

Resolution: This issue is resolved in KB4487025.

Back to top
January 08, 2019
KB4480975
Resolved
KB4487025
Resolved:
February 12, 2019
10:00 AM PT

Opened:
April 25, 2019
03:19 PM PT
Virtual machines fail to restore
After installing KB4480975, virtual machines (VM) may fail to restore successfully if the VM has been saved and restored once before. The error message is, \"Failed to restore the virtual machine state: Cannot restore this virtual machine because the saved state data cannot be read. Delete the saved state data and then try to start the virtual machine. (0xC0370027).\"

This affects AMD Bulldozer Family 15h, AMD Jaguar Family 16h, and AMD Puma Family 16h (second generation) microarchitectures.

Resolution: This issue is resolved in KB4490516.

Back to top
January 08, 2019
KB4480975
Resolved
KB4490516
Resolved:
February 19, 2019
02:00 PM PT

Opened:
April 25, 2019
03:22 PM PT
Internet Explorer 11 authentication issue with multiple concurrent logons
After installing KB4480975, Internet Explorer 11 and other applications that use WININET.DLL may have authentication issues. This occurs when two or more people use the same user account for multiple, concurrent login sessions on the same Windows Server machine, including Remote Desktop Protocol (RDP) and Terminal Server logons. Symptoms reported by customers include, but may not be limited to:
  • Cache size and location show zero or empty.
  • Keyboard shortcuts may not work properly.
  • Webpages may intermittently fail to load or render correctly.
  • Issues with credential prompts.
  • Issues when downloading files.

Resolution: This issue is resolved in KB4493451.

Back to top
January 08, 2019
KB4480975
Resolved
KB4493451
Resolved:
April 09, 2019
10:00 AM PT

Opened:
April 25, 2019
03:34 PM PT
MSXML6 may cause applications to stop responding
After installing KB4480975, MSXML6 causes applications to stop responding if an exception was thrown during node operations, such as appendChild(), insertBefore(), and moveNode().

The Group Policy editor may stop responding when editing a Group Policy Object (GPO) that contains Group Policy Preferences (GPP) for Internet Explorer 10 settings.

Resolution: This issue is resolved in KB4493451.

Back to top
January 08, 2019
KB4480975
Resolved
KB4493451
Resolved:
April 09, 2019
10:00 AM PT

Opened:
April 25, 2019
03:27 PM PT
Error 1309 when installing/uninstalling MSI or MSP files
After installing KB4487025, users may receive \"Error 1309\" while installing or uninstalling certain types of MSI and MSP files.

Resolution: This issue is resolved in KB4489891.

Back to top
February 12, 2019
KB4487025
Resolved
KB4489891
Resolved:
March 12, 2019
10:00 AM PT

Opened:
April 25, 2019
03:36 PM PT
Embedded objects may display incorrectly
Any compound document (OLE) server application that places embedded objects into the Windows Metafile (WMF) using the PatBlt API may display embedded objects incorrectly.

For example, if you paste a Microsoft Excel worksheet object into a Microsoft Word document, the cells may render with a different background color.

Resolution: This issue is resolved in KB4493451.

Back to top
February 12, 2019
KB4487025
Resolved
KB4493451
Resolved:
April 09, 2019
10:00 AM PT

Opened:
April 25, 2019
04:00 PM PT
First character of the Japanese era name not recognized as an abbreviation
After installing KB4480971, the first character of the Japanese era name is not recognized as an abbreviation and may cause date parsing issues.

Resolution: This issue is resolved in KB4487024.

Back to top
January 15, 2019
KB4480971
Resolved
KB4487024
Resolved:
February 19, 2019
02:00 PM PT

Opened:
April 25, 2019
04:01 PM PT
Applications using Microsoft Jet database and Access 95 file format stop working
Applications that use a Microsoft Jet database with the Microsoft Access 95 file format may randomly stop working.

Resolution: This issue is resolved in KB4487024.

Back to top
February 12, 2019
KB4487025
Resolved
KB4487024
Resolved:
February 19, 2019
02:00 PM PT

Opened:
April 25, 2019
04:04 PM PT
System may be unresponsive after restart if Avira antivirus software installed
Microsoft and Avira have identified an issue on devices with Avira antivirus software installed that may cause the system to become unresponsive upon restart after installing KB4493451.
Microsoft has temporarily blocked devices from receiving this update if Avira antivirus software is installed.
Next steps: We are presently investigating this issue with Avira and will provide an update when available.

Back to top
April 09, 2019
KB4493451
Investigating
Last updated:
April 25, 2019
03:48 PM PT

Opened:
April 25, 2019
03:48 PM PT
Issue using PXE to start a device from WDS
After installing KB4489891, there may be issues using the Preboot Execution Environment (PXE) to start a device from a Windows Deployment Services (WDS) server configured to use Variable Window Extension. This may cause the connection to the WDS server to terminate prematurely while downloading the image. This issue does not affect clients or devices that are not using Variable Window Extension.
Workaround: To mitigate the issue, disable the Variable Window Extension on WDS server using one of the following options:
Option 1:
Open an Administrator Command prompt and type the following:
Wdsutil /Set-TransportServer /EnableTftpVariableWindowExtension:No
+
Option 2:
Use the Windows Deployment Services UI to make the following adjustment:
  1. Open Windows Deployment Services from Windows Administrative Tools.
  2. Expand Servers and right-click a WDS server.
  3. Open its properties and clear the Enable Variable Window Extension box on the TFTP tab.
Option 3:
Set the following registry value to 0:
HKLM\\System\\CurrentControlSet\\Services\\WDSServer\\Providers\\WDSTFTP\\EnableVariableWindowExtension
Restart the WDSServer service after disabling the Variable Window Extension.
Next steps: Microsoft is working on a resolution and will provide an update in an upcoming release.

Back to top
March 12, 2019
KB4489891
Mitigated
Last updated:
April 25, 2019
03:40 PM PT

Opened:
April 25, 2019
03:40 PM PT
System unresponsive after restart if Sophos Endpoint Protection installed
Microsoft and Sophos have identified an issue on devices with Sophos Endpoint Protection installed and managed by either Sophos Central or Sophos Enterprise Console (SEC) that may cause the system to become unresponsive upon restart after installing KB4493451.
Microsoft has temporarily blocked devices from receiving this update if the Sophos Endpoint is installed until a solution is available.
Guidance for Sophos Endpoint and Sophos Enterprise Console customers can be found in the Sophos support article.

Back to top
April 09, 2019
KB4493451
Mitigated
Last updated:
April 25, 2019
03:46 PM PT

Opened:
April 25, 2019
03:46 PM PT
Certain operations performed on on a Cluster Shared Volume may fail
Certain operations, such as rename, that you perform on files or folders that are on a Cluster Shared Volume (CSV) may fail with the error, \"STATUS_BAD_IMPERSONATION_LEVEL (0xC00000A5)\". This occurs when you perform the operation on a CSV owner node from a process that doesn’t have administrator privilege.
Workaround: Do one of the following:
  • Perform the operation from a process that has administrator privilege.
  • Perform the operation from a node that doesn’t have CSV ownership.
Next steps: Microsoft is working on a resolution and will provide an update in an upcoming release.

Back to top
January 08, 2019
KB4480975
Mitigated
Last updated:
April 25, 2019
03:52 PM PT

Opened:
April 25, 2019
03:52 PM PT
Unable to use Seek bar in Windows Media Player
After installing KB4462929, users may not be able to use the Seek Bar in Windows Media Player when playing specific files. This issue does not affect normal playback.
Resolution: This issue is resolved in KB4471330.

Back to top
October 09, 2018
KB4462929
Resolved
KB4471330
Resolved:
December 11, 2018
10:00 AM PT

Opened:
April 25, 2019
02:47 PM PT
Event Viewer may not show some event descriptions for network interface cards
After installing KB4457135, the Event Viewer may not show some event descriptions for network interface cards (NICs).
Resolution: This issue is resolved in KB4489891.

Back to top
September 11, 2018
KB4457135
Resolved
KB4489891
Resolved:
March 12, 2019
10:00 AM PT

Opened:
April 25, 2019
03:10 PM PT
Unable to access hotspots with third-party applications
After installing KB4480975, third-party applications may have difficulty authenticating hotspots.
Resolution: This issue is resolved in KB4480971.

Back to top
January 08, 2019
KB4480975
Resolved
KB4480971
Resolved:
January 15, 2019
10:00 AM PT

Opened:
April 25, 2019
03:14 PM PT
Applications using Microsoft Jet database fail to open
Applications that use a Microsoft Jet database with the Microsoft Access 97 file format may fail to open if the database has column names greater than 32 characters. The database will fail to open with the error, \"Unrecognized Database Format\".
Resolution: This issue is resolved in KB4487025.

Back to top
January 08, 2019
KB4480975
Resolved
KB4487025
Resolved:
February 12, 2019
10:00 AM PT

Opened:
April 25, 2019
03:19 PM PT
Virtual machines fail to restore
After installing KB4480975, virtual machines (VM) may fail to restore successfully if the VM has been saved and restored once before. The error message is, \"Failed to restore the virtual machine state: Cannot restore this virtual machine because the saved state data cannot be read. Delete the saved state data and then try to start the virtual machine. (0xC0370027).\"
This affects AMD Bulldozer Family 15h, AMD Jaguar Family 16h, and AMD Puma Family 16h (second generation) microarchitectures.
Resolution: This issue is resolved in KB4490516.

Back to top
January 08, 2019
KB4480975
Resolved
KB4490516
Resolved:
February 19, 2019
02:00 PM PT

Opened:
April 25, 2019
03:22 PM PT
Internet Explorer 11 authentication issue with multiple concurrent logons
After installing KB4480975, Internet Explorer 11 and other applications that use WININET.DLL may have authentication issues. This occurs when two or more people use the same user account for multiple, concurrent login sessions on the same Windows Server machine, including Remote Desktop Protocol (RDP) and Terminal Server logons. Symptoms reported by customers include, but may not be limited to:
  • Cache size and location show zero or empty.
  • Keyboard shortcuts may not work properly.
  • Webpages may intermittently fail to load or render correctly.
  • Issues with credential prompts.
  • Issues when downloading files.
Resolution: This issue is resolved in KB4493451.

Back to top
January 08, 2019
KB4480975
Resolved
KB4493451
Resolved:
April 09, 2019
10:00 AM PT

Opened:
April 25, 2019
03:34 PM PT
MSXML6 may cause applications to stop responding
After installing KB4480975, MSXML6 causes applications to stop responding if an exception was thrown during node operations, such as appendChild(), insertBefore(), and moveNode().
The Group Policy editor may stop responding when editing a Group Policy Object (GPO) that contains Group Policy Preferences (GPP) for Internet Explorer 10 settings.
Resolution: This issue is resolved in KB4493451.

Back to top
January 08, 2019
KB4480975
Resolved
KB4493451
Resolved:
April 09, 2019
10:00 AM PT

Opened:
April 25, 2019
03:27 PM PT
Error 1309 when installing/uninstalling MSI or MSP files
After installing KB4487025, users may receive \"Error 1309\" while installing or uninstalling certain types of MSI and MSP files.
Resolution: This issue is resolved in KB4489891.

Back to top
February 12, 2019
KB4487025
Resolved
KB4489891
Resolved:
March 12, 2019
10:00 AM PT

Opened:
April 25, 2019
03:36 PM PT
Embedded objects may display incorrectly
Any compound document (OLE) server application that places embedded objects into the Windows Metafile (WMF) using the PatBlt API may display embedded objects incorrectly.
For example, if you paste a Microsoft Excel worksheet object into a Microsoft Word document, the cells may render with a different background color.
Resolution: This issue is resolved in KB4493451.

Back to top
February 12, 2019
KB4487025
Resolved
KB4493451
Resolved:
April 09, 2019
10:00 AM PT

Opened:
April 25, 2019
04:00 PM PT
First character of the Japanese era name not recognized as an abbreviation
After installing KB4480971, the first character of the Japanese era name is not recognized as an abbreviation and may cause date parsing issues.
Resolution: This issue is resolved in KB4487024.

Back to top
January 15, 2019
KB4480971
Resolved
KB4487024
Resolved:
February 19, 2019
02:00 PM PT

Opened:
April 25, 2019
04:01 PM PT
Applications using Microsoft Jet database and Access 95 file format stop working
Applications that use a Microsoft Jet database with the Microsoft Access 95 file format may randomly stop working.
Resolution: This issue is resolved in KB4487024.

Back to top
February 12, 2019
KB4487025
Resolved
KB4487024
Resolved:
February 19, 2019
02:00 PM PT

Opened:
April 25, 2019
04:04 PM PT
" From 5cce30aa9902136e7dbc5cf852efa60b372eb1eb Mon Sep 17 00:00:00 2001 From: "Nisha Mittal (Wipro Ltd.)" Date: Fri, 26 Apr 2019 01:47:00 -0700 Subject: [PATCH 220/724] Changed back the spacing --- .../resolved-issues-windows-10-1507.yml | 20 ++++----- .../resolved-issues-windows-10-1607.yml | 32 +++++++------- .../resolved-issues-windows-10-1703.yml | 26 +++++------ .../resolved-issues-windows-10-1709.yml | 26 +++++------ .../resolved-issues-windows-10-1803.yml | 36 +++++++-------- ...indows-10-1809-and-windows-server-2019.yml | 44 +++++++++---------- ...ndows-7-and-windows-server-2008-r2-sp1.yml | 24 +++++----- ...windows-8.1-and-windows-server-2012-r2.yml | 26 +++++------ ...esolved-issues-windows-server-2008-sp2.yml | 16 +++---- .../resolved-issues-windows-server-2012.yml | 22 +++++----- .../status-windows-10-1507.yml | 4 +- ...indows-10-1607-and-windows-server-2016.yml | 18 ++++---- .../status-windows-10-1703.yml | 6 +-- .../status-windows-10-1709.yml | 8 ++-- .../status-windows-10-1803.yml | 10 ++--- ...indows-10-1809-and-windows-server-2019.yml | 16 +++---- ...ndows-7-and-windows-server-2008-r2-sp1.yml | 20 ++++----- ...windows-8.1-and-windows-server-2012-r2.yml | 22 +++++----- .../status-windows-server-2008-sp2.yml | 22 +++++----- .../status-windows-server-2012.yml | 32 +++++++------- 20 files changed, 215 insertions(+), 215 deletions(-) diff --git a/windows/release-information/resolved-issues-windows-10-1507.yml b/windows/release-information/resolved-issues-windows-10-1507.yml index 2b6d4db63e..c48f75814a 100644 --- a/windows/release-information/resolved-issues-windows-10-1507.yml +++ b/windows/release-information/resolved-issues-windows-10-1507.yml @@ -57,7 +57,7 @@ sections: - type: markdown text: " - +
DetailsOriginating updateStatusHistory
Custom URI schemes may not start corresponding application
After installing KB4489872, Custom URI Schemes for Application Protocol handlers may not start the corresponding application for local intranet and trusted sites on Internet Explorer.
Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 8.1; Windows 7, Service Pack 1 
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2; Windows Server 2008 R2 SP1
Resolution: This issue was resolved in KB4493475.

Back to top
OS Build 10240.18158

March 12, 2019
KB4489872
Resolved
KB4493475
Resolved:
April 09, 2019
10:00 AM PT

Opened:
March 12, 2019
10:00 AM PT
Custom URI schemes may not start corresponding application
After installing KB4489872, Custom URI Schemes for Application Protocol handlers may not start the corresponding application for local intranet and trusted sites on Internet Explorer.

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 8.1; Windows 7, Service Pack 1 
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2; Windows Server 2008 R2 SP1

Resolution: This issue was resolved in KB4493475.

Back to top
OS Build 10240.18158

March 12, 2019
KB4489872
Resolved
KB4493475
Resolved:
April 09, 2019
10:00 AM PT

Opened:
March 12, 2019
10:00 AM PT
" @@ -66,10 +66,10 @@ sections: - type: markdown text: " - - - - + + + +
DetailsOriginating updateStatusHistory
Applications using Microsoft Jet database and Access 95 file format stop working
Applications that use a Microsoft Jet database with the Microsoft Access 95 file format may randomly stop working.
Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 7, Service Pack 1
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2008 R2 SP1
Resolution: This issue is resolved in KB4489872.

Back to top
OS Build 10240.18132

February 12, 2019
KB4487018
Resolved
KB4489872
Resolved:
March 12, 2019
10:00 AM PT

Opened:
February 12, 2019
10:00 AM PT
Internet Explorer may fail to load images
After installing KB4487018, Internet Explorer may fail to load images with a backslash (\\) in their relative source path.
Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 8.1; Windows 7, Service Pack 1
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2; Windows Server 2008 R2 SP1
Resolution: This issue is resolved in KB4491101.

Back to top
OS Build 10240.18132

February 12, 2019
KB4487018
Resolved
KB4491101
Resolved:
February 21, 2019
02:00 PM PT

Opened:
February 12, 2019
10:00 AM PT
Error 1309 when installing/uninstalling MSI or MSP files
After installing KB4487018, users may receive “Error 1309” while installing or uninstalling certain types of MSI and MSP files.
Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 8.1
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2
Resolution: This issue is resolved in KB4489872.

Back to top
OS Build 10240.18132

February 12, 2019
KB4487018
Resolved
KB4489872
Resolved:
March 12, 2019
10:00 AM PT

Opened:
February 12, 2019
10:00 AM PT
First character of Japanese era name not recognized
After installing KB4487018, the first character of the Japanese era name is not recognized as an abbreviation and may cause date parsing issues.
Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 8.1; Windows 7, Service Pack 1
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2; Windows Server 2008 R2 SP1
Resolution: This issue is resolved in KB4489872.

Back to top
OS Build 10240.18132

February 12, 2019
KB4487018
Resolved
KB4489872
Resolved:
March 12, 2019
10:00 AM PT

Opened:
February 12, 2019
10:00 AM PT
Applications using Microsoft Jet database and Access 95 file format stop working
Applications that use a Microsoft Jet database with the Microsoft Access 95 file format may randomly stop working.

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 7, Service Pack 1
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2008 R2 SP1

Resolution: This issue is resolved in KB4489872.

Back to top
OS Build 10240.18132

February 12, 2019
KB4487018
Resolved
KB4489872
Resolved:
March 12, 2019
10:00 AM PT

Opened:
February 12, 2019
10:00 AM PT
Internet Explorer may fail to load images
After installing KB4487018, Internet Explorer may fail to load images with a backslash (\\) in their relative source path.

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 8.1; Windows 7, Service Pack 1
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2; Windows Server 2008 R2 SP1

Resolution: This issue is resolved in KB4491101.

Back to top
OS Build 10240.18132

February 12, 2019
KB4487018
Resolved
KB4491101
Resolved:
February 21, 2019
02:00 PM PT

Opened:
February 12, 2019
10:00 AM PT
Error 1309 when installing/uninstalling MSI or MSP files
After installing KB4487018, users may receive “Error 1309” while installing or uninstalling certain types of MSI and MSP files.

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 8.1
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2

Resolution: This issue is resolved in KB4489872.

Back to top
OS Build 10240.18132

February 12, 2019
KB4487018
Resolved
KB4489872
Resolved:
March 12, 2019
10:00 AM PT

Opened:
February 12, 2019
10:00 AM PT
First character of Japanese era name not recognized
After installing KB4487018, the first character of the Japanese era name is not recognized as an abbreviation and may cause date parsing issues.

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 8.1; Windows 7, Service Pack 1
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2; Windows Server 2008 R2 SP1

Resolution: This issue is resolved in KB4489872.

Back to top
OS Build 10240.18132

February 12, 2019
KB4487018
Resolved
KB4489872
Resolved:
March 12, 2019
10:00 AM PT

Opened:
February 12, 2019
10:00 AM PT
" @@ -78,9 +78,9 @@ sections: - type: markdown text: " - - - + + +
DetailsOriginating updateStatusHistory
Applications using Microsoft Jet database fail to open
Applications that use a Microsoft Jet database with the Microsoft Access 97 file format may fail to open if the database has column names greater than 32 characters. The database will fail to open with the error, \"Unrecognized Database Format\".
Affected platforms:
  • Client: Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 8.1; Windows 7, Service Pack 1
  • Server: Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2; Windows Server 2008 R2 SP1
Resolution: This issue is resolved in KB4487018.

Back to top
OS Build 10240.18094

January 08, 2019
KB4480962
Resolved
KB4487018
Resolved:
February 12, 2019
10:00 AM PT

Opened:
January 08, 2019
10:00 AM PT
MSXML6 may cause applications to stop responding
After installing KB4480962, MSXML6 causes applications to stop responding if an exception was thrown during node operations, such as appendChild(), insertBefore(), and moveNode().
The Group Policy editor may stop responding when editing a Group Policy Object (GPO) that contains Group Policy Preferences (GPP) for Internet Explorer 10 settings.
Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 8.1
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2
Resolution: This issue was resolved in KB4493475.

Back to top
OS Build 10240.18094

January 08, 2019
KB4480962
Resolved
KB4493475
Resolved:
April 09, 2019
10:00 AM PT

Opened:
January 08, 2019
10:00 AM PT
Unable to access hotspots with third-party applications
After installing KB4480962, third-party applications may have difficulty authenticating hotspots.
Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 8.1
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2
Resolution: This issue is resolved in KB4487018.

Back to top
OS Build 10240.18094

January 08, 2019
KB4480962
Resolved
KB4487018
Resolved:
February 12, 2019
10:00 AM PT

Opened:
January 08, 2019
10:00 AM PT
Applications using Microsoft Jet database fail to open
Applications that use a Microsoft Jet database with the Microsoft Access 97 file format may fail to open if the database has column names greater than 32 characters. The database will fail to open with the error, \"Unrecognized Database Format\".

Affected platforms:
  • Client: Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 8.1; Windows 7, Service Pack 1
  • Server: Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2; Windows Server 2008 R2 SP1

Resolution: This issue is resolved in KB4487018.

Back to top
OS Build 10240.18094

January 08, 2019
KB4480962
Resolved
KB4487018
Resolved:
February 12, 2019
10:00 AM PT

Opened:
January 08, 2019
10:00 AM PT
MSXML6 may cause applications to stop responding
After installing KB4480962, MSXML6 causes applications to stop responding if an exception was thrown during node operations, such as appendChild(), insertBefore(), and moveNode().

The Group Policy editor may stop responding when editing a Group Policy Object (GPO) that contains Group Policy Preferences (GPP) for Internet Explorer 10 settings.

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 8.1
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2

Resolution: This issue was resolved in KB4493475.

Back to top
OS Build 10240.18094

January 08, 2019
KB4480962
Resolved
KB4493475
Resolved:
April 09, 2019
10:00 AM PT

Opened:
January 08, 2019
10:00 AM PT
Unable to access hotspots with third-party applications
After installing KB4480962, third-party applications may have difficulty authenticating hotspots.

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 8.1
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2

Resolution: This issue is resolved in KB4487018.

Back to top
OS Build 10240.18094

January 08, 2019
KB4480962
Resolved
KB4487018
Resolved:
February 12, 2019
10:00 AM PT

Opened:
January 08, 2019
10:00 AM PT
" @@ -89,7 +89,7 @@ sections: - type: markdown text: " - +
DetailsOriginating updateStatusHistory
Unable to use Seek bar in Windows Media Player
After installing KB4462922, users may not be able to use the Seek Bar in Windows Media Player when playing specific files. This issue does not affect normal playback.
Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 8.1; Windows 7, Service Pack 1
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2; Windows Server 2008 R2 SP1
Resolution: This issue is resolved in KB4471323.

Back to top
OS Build 10240.18005

October 09, 2018
KB4462922
Resolved
KB4471323
Resolved:
December 11, 2018
10:00 AM PT

Opened:
October 09, 2018
10:00 AM PT
Unable to use Seek bar in Windows Media Player
After installing KB4462922, users may not be able to use the Seek Bar in Windows Media Player when playing specific files. This issue does not affect normal playback.

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 8.1; Windows 7, Service Pack 1
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2; Windows Server 2008 R2 SP1

Resolution: This issue is resolved in KB4471323.

Back to top
OS Build 10240.18005

October 09, 2018
KB4462922
Resolved
KB4471323
Resolved:
December 11, 2018
10:00 AM PT

Opened:
October 09, 2018
10:00 AM PT
" @@ -98,6 +98,6 @@ sections: - type: markdown text: " - +
DetailsOriginating updateStatusHistory
Guest VMs running Unicast NLB fail to respond after restart
All guest virtual machines running Unicast NLB fail to respond to NLB requests after the virtual machines restart.
Affected platforms:
  • Client: Windows 10, version 1803; Windows 10, version 1507
  • Server: Windows Server, version 1803
Resolution: This issue is resolved in KB4462922.

Back to top
OS Build 10240.17976

September 11, 2018
KB4457132
Resolved
KB4462922
Resolved:
October 09, 2018
10:00 AM PT

Opened:
September 11, 2018
10:00 AM PT
Guest VMs running Unicast NLB fail to respond after restart
All guest virtual machines running Unicast NLB fail to respond to NLB requests after the virtual machines restart.

Affected platforms:
  • Client: Windows 10, version 1803; Windows 10, version 1507
  • Server: Windows Server, version 1803

Resolution: This issue is resolved in KB4462922.

Back to top
OS Build 10240.17976

September 11, 2018
KB4457132
Resolved
KB4462922
Resolved:
October 09, 2018
10:00 AM PT

Opened:
September 11, 2018
10:00 AM PT
" diff --git a/windows/release-information/resolved-issues-windows-10-1607.yml b/windows/release-information/resolved-issues-windows-10-1607.yml index 9f35c2ac6f..e02dd2e8ee 100644 --- a/windows/release-information/resolved-issues-windows-10-1607.yml +++ b/windows/release-information/resolved-issues-windows-10-1607.yml @@ -63,7 +63,7 @@ sections: - type: markdown text: " - +
DetailsOriginating updateStatusHistory
End-user-defined characters (EUDC) cause blue screen at startup
If you enable per font end-user-defined characters (EUDC), the system will stop working and a blue screen may appear at startup. This is not a common setting in non-Asian regions.
Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016
Resolution: This issue was resolved in KB4493470.

Back to top
OS Build 14393.2879

March 19, 2019
KB4489889
Resolved
KB4493470
Resolved:
April 09, 2019
10:00 AM PT

Opened:
March 19, 2019
10:00 AM PT
End-user-defined characters (EUDC) cause blue screen at startup
If you enable per font end-user-defined characters (EUDC), the system will stop working and a blue screen may appear at startup. This is not a common setting in non-Asian regions.

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016

Resolution: This issue was resolved in KB4493470.

Back to top
OS Build 14393.2879

March 19, 2019
KB4489889
Resolved
KB4493470
Resolved:
April 09, 2019
10:00 AM PT

Opened:
March 19, 2019
10:00 AM PT
" @@ -72,10 +72,10 @@ sections: - type: markdown text: " - - - - + + + +
DetailsOriginating updateStatusHistory
Applications using Microsoft Jet database and Access 95 file format stop working
Applications that use a Microsoft Jet database with the Microsoft Access 95 file format may randomly stop working.
Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 7, Service Pack 1
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2008 R2 SP1
Resolution: This issue is resolved in KB4487006.

Back to top
OS Build 14393.2791

February 12, 2019
KB4487026
Resolved
KB4487006
Resolved:
February 19, 2019
02:00 PM PT

Opened:
February 12, 2019
10:00 AM PT
Internet Explorer may fail to load images
After installing KB4487026, Internet Explorer may fail to load images with a backslash (\\) in their relative source path.
Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 8.1; Windows 7, Service Pack 1
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2; Windows Server 2008 R2 SP1
Resolution: This issue is resolved in KB4487006.

Back to top
OS Build 14393.2791

February 12, 2019
KB4487026
Resolved
KB4487006
Resolved:
February 19, 2019
02:00 PM PT

Opened:
February 12, 2019
10:00 AM PT
Issue hosting multiple terminal server sessions and a user logs off on Windows Server
In some cases, Windows Server will stop working and restart when hosting multiple terminal server sessions and a user logs off. The faulting driver is win32kbase.sys.
Affected platforms:
  • Client: Windows 10 Enterprise LTSC 2016
  • Server: Windows Server 2016
Resolution: This issue is resolved in KB4489882.

Back to top
OS Build 14393.2828

February 19, 2019
KB4487006
Resolved
KB4489882
Resolved:
March 12, 2019
10:00 AM PT

Opened:
February 19, 2019
02:00 PM PT
Error 1309 when installing/uninstalling MSI or MSP files
After installing KB4487026, users may receive “Error 1309” while installing or uninstalling certain types of MSI and MSP files.
Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 8.1
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2
Resolution: This issue is resolved in KB4489882.

Back to top
OS Build 14393.2791

February 12, 2019
KB4487026
Resolved
KB4489882
Resolved:
March 12, 2019
10:00 AM PT

Opened:
February 12, 2019
10:00 AM PT
Applications using Microsoft Jet database and Access 95 file format stop working
Applications that use a Microsoft Jet database with the Microsoft Access 95 file format may randomly stop working.

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 7, Service Pack 1
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2008 R2 SP1

Resolution: This issue is resolved in KB4487006.

Back to top
OS Build 14393.2791

February 12, 2019
KB4487026
Resolved
KB4487006
Resolved:
February 19, 2019
02:00 PM PT

Opened:
February 12, 2019
10:00 AM PT
Internet Explorer may fail to load images
After installing KB4487026, Internet Explorer may fail to load images with a backslash (\\) in their relative source path.

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 8.1; Windows 7, Service Pack 1
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2; Windows Server 2008 R2 SP1

Resolution: This issue is resolved in KB4487006.

Back to top
OS Build 14393.2791

February 12, 2019
KB4487026
Resolved
KB4487006
Resolved:
February 19, 2019
02:00 PM PT

Opened:
February 12, 2019
10:00 AM PT
Issue hosting multiple terminal server sessions and a user logs off on Windows Server
In some cases, Windows Server will stop working and restart when hosting multiple terminal server sessions and a user logs off. The faulting driver is win32kbase.sys.

Affected platforms:
  • Client: Windows 10 Enterprise LTSC 2016
  • Server: Windows Server 2016

Resolution: This issue is resolved in KB4489882.

Back to top
OS Build 14393.2828

February 19, 2019
KB4487006
Resolved
KB4489882
Resolved:
March 12, 2019
10:00 AM PT

Opened:
February 19, 2019
02:00 PM PT
Error 1309 when installing/uninstalling MSI or MSP files
After installing KB4487026, users may receive “Error 1309” while installing or uninstalling certain types of MSI and MSP files.

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 8.1
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2

Resolution: This issue is resolved in KB4489882.

Back to top
OS Build 14393.2791

February 12, 2019
KB4487026
Resolved
KB4489882
Resolved:
March 12, 2019
10:00 AM PT

Opened:
February 12, 2019
10:00 AM PT
" @@ -84,11 +84,11 @@ sections: - type: markdown text: " - - - - - + + + + +
DetailsOriginating updateStatusHistory
Applications using Microsoft Jet database fail to open
Applications that use a Microsoft Jet database with the Microsoft Access 97 file format may fail to open if the database has column names greater than 32 characters. The database will fail to open with the error, “Unrecognized Database Format”.
Affected platforms:
  • Client: Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 8.1; Windows 7, Service Pack 1 
  • Server: Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2; Windows Server 2008 R2 SP1 
Resolution: This issue is resolved in KB4487026.

Back to top
OS Build 14393.2724

January 08, 2019
KB4480961
Resolved
KB4487026
Resolved:
February 12, 2019
10:00 AM PT

Opened:
January 08, 2019
10:00 AM PT
First character of the Japanese era name not recognized as an abbreviation
After installing KB4480977, the first character of the Japanese era name is not recognized as an abbreviation and may cause date parsing issues.
Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 8.1; Windows 7, Service Pack 1
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2; Windows Server 2008 R2 SP1
Resolution: This issue is resolved in KB4487006.

Back to top
OS Build 14393.2759

January 17, 2019
KB4480977
Resolved
KB4487006
Resolved:
February 19, 2019
02:00 PM PT

Opened:
January 17, 2019
02:00 PM PT
Internet Explorer 11 authentication issue with multiple concurrent logons
After installing KB4480961, Internet Explorer 11 and other applications that use WININET.DLL may have authentication issues. This occurs when two or more people use the same user account for multiple, concurrent login sessions on the same Windows Server machine, including Remote Desktop Protocol (RDP) and Terminal Server logons. Symptoms reported by customers include, but may not be limited to:
  • Cache size and location show zero or empty.
  • Keyboard shortcuts may not work properly.
  • Webpages may intermittently fail to load or render correctly.
  • Issues with credential prompts.
  • Issues when downloading files.
Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10 Enterprise LTSC 2016; Windows 8.1; Windows 7, Service Pack 1
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server 2016; Windows Server 2012 R2; Windows Server 2008 R2 SP1
Resolution: This issue was resolved in KB4493470.

Back to top
OS Build 14393.2724

January 08, 2019
KB4480961
Resolved
KB4493470
Resolved:
April 09, 2019
10:00 AM PT

Opened:
January 08, 2019
10:00 AM PT
MSXML6 may cause applications to stop responding
After installing KB4480961, MSXML6 causes applications to stop responding if an exception was thrown during node operations, such as appendChild(), insertBefore(), and moveNode().
The Group Policy editor may stop responding when editing a Group Policy Object (GPO) that contains Group Policy Preferences (GPP) for Internet Explorer 10 settings.
Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 8.1
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2
Resolution: This issue was resolved in KB4493470.

Back to top
OS Build 14393.2724

January 08, 2019
KB4480961
Resolved
KB4493470
Resolved:
April 09, 2019
10:00 AM PT

Opened:
January 08, 2019
10:00 AM PT
Unable to access hotspots with third-party applications
After installing KB4480961, third-party applications may have difficulty authenticating hotspots.
Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 8.1
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2
Resolution: This issue is resolved in KB4480977.

Back to top
OS Build 14393.2724

January 08, 2019
KB4480961
Resolved
KB4480977
Resolved:
January 17, 2019
02:00 PM PT

Opened:
January 08, 2019
10:00 AM PT
Applications using Microsoft Jet database fail to open
Applications that use a Microsoft Jet database with the Microsoft Access 97 file format may fail to open if the database has column names greater than 32 characters. The database will fail to open with the error, “Unrecognized Database Format”.

Affected platforms:
  • Client: Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 8.1; Windows 7, Service Pack 1 
  • Server: Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2; Windows Server 2008 R2 SP1 

Resolution: This issue is resolved in KB4487026.

Back to top
OS Build 14393.2724

January 08, 2019
KB4480961
Resolved
KB4487026
Resolved:
February 12, 2019
10:00 AM PT

Opened:
January 08, 2019
10:00 AM PT
First character of the Japanese era name not recognized as an abbreviation
After installing KB4480977, the first character of the Japanese era name is not recognized as an abbreviation and may cause date parsing issues.

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 8.1; Windows 7, Service Pack 1
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2; Windows Server 2008 R2 SP1

Resolution: This issue is resolved in KB4487006.

Back to top
OS Build 14393.2759

January 17, 2019
KB4480977
Resolved
KB4487006
Resolved:
February 19, 2019
02:00 PM PT

Opened:
January 17, 2019
02:00 PM PT
Internet Explorer 11 authentication issue with multiple concurrent logons
After installing KB4480961, Internet Explorer 11 and other applications that use WININET.DLL may have authentication issues. This occurs when two or more people use the same user account for multiple, concurrent login sessions on the same Windows Server machine, including Remote Desktop Protocol (RDP) and Terminal Server logons. Symptoms reported by customers include, but may not be limited to:
  • Cache size and location show zero or empty.
  • Keyboard shortcuts may not work properly.
  • Webpages may intermittently fail to load or render correctly.
  • Issues with credential prompts.
  • Issues when downloading files.

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10 Enterprise LTSC 2016; Windows 8.1; Windows 7, Service Pack 1
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server 2016; Windows Server 2012 R2; Windows Server 2008 R2 SP1

Resolution: This issue was resolved in KB4493470.

Back to top
OS Build 14393.2724

January 08, 2019
KB4480961
Resolved
KB4493470
Resolved:
April 09, 2019
10:00 AM PT

Opened:
January 08, 2019
10:00 AM PT
MSXML6 may cause applications to stop responding
After installing KB4480961, MSXML6 causes applications to stop responding if an exception was thrown during node operations, such as appendChild(), insertBefore(), and moveNode().

The Group Policy editor may stop responding when editing a Group Policy Object (GPO) that contains Group Policy Preferences (GPP) for Internet Explorer 10 settings.

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 8.1
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2

Resolution: This issue was resolved in KB4493470.

Back to top
OS Build 14393.2724

January 08, 2019
KB4480961
Resolved
KB4493470
Resolved:
April 09, 2019
10:00 AM PT

Opened:
January 08, 2019
10:00 AM PT
Unable to access hotspots with third-party applications
After installing KB4480961, third-party applications may have difficulty authenticating hotspots.

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 8.1
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2

Resolution: This issue is resolved in KB4480977.

Back to top
OS Build 14393.2724

January 08, 2019
KB4480961
Resolved
KB4480977
Resolved:
January 17, 2019
02:00 PM PT

Opened:
January 08, 2019
10:00 AM PT
" @@ -97,8 +97,8 @@ sections: - type: markdown text: " - - + +
DetailsOriginating updateStatusHistory
Instant search in Microsoft Outlook fails on Windows Server 2016
After installing KB4467684 on Windows Server 2016, instant search in Microsoft Outlook clients fail with the error, \"Outlook cannot perform the search\".
Affected platforms:
  • Client: Windows 10 Enterprise LTSC 2016
  • Server: Windows Server 2016
Resolution: This issue is resolved in KB4487026.

Back to top
OS Build 14393.2639

November 27, 2018
KB4467684
Resolved
KB4487026
Resolved:
February 12, 2019
10:00 AM PT

Opened:
November 27, 2018
10:00 AM PT
System becomes unresponsive when end-user-defined characters (EUDC) are used
When features related to end-user-defined characters (EUDC) are used, the entire system may become unresponsive. 
Affected platforms:
  • Client: Windows 10 Enterprise LTSC 2016
  • Server: Windows Server 2016
 
Resolution: This issue is resolved in KB4471321

Back to top
OS Build 14393.2639

November 27, 2018
KB4467684
Resolved
KB4471321
Resolved:
December 11, 2018
10:00 AM PT

Opened:
November 27, 2018
10:00 AM PT
Instant search in Microsoft Outlook fails on Windows Server 2016
After installing KB4467684 on Windows Server 2016, instant search in Microsoft Outlook clients fail with the error, \"Outlook cannot perform the search\".

Affected platforms:
  • Client: Windows 10 Enterprise LTSC 2016
  • Server: Windows Server 2016

Resolution: This issue is resolved in KB4487026.

Back to top
OS Build 14393.2639

November 27, 2018
KB4467684
Resolved
KB4487026
Resolved:
February 12, 2019
10:00 AM PT

Opened:
November 27, 2018
10:00 AM PT
System becomes unresponsive when end-user-defined characters (EUDC) are used
When features related to end-user-defined characters (EUDC) are used, the entire system may become unresponsive. 

Affected platforms:
  • Client: Windows 10 Enterprise LTSC 2016
  • Server: Windows Server 2016
 
Resolution: This issue is resolved in KB4471321

Back to top
OS Build 14393.2639

November 27, 2018
KB4467684
Resolved
KB4471321
Resolved:
December 11, 2018
10:00 AM PT

Opened:
November 27, 2018
10:00 AM PT
" @@ -107,7 +107,7 @@ sections: - type: markdown text: " - +
DetailsOriginating updateStatusHistory
Unable to use Seek bar in Windows Media Player
After installing KB4462917, users may not be able to use the Seek Bar in Windows Media Player when playing specific files. This issue does not affect normal playback.
Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 8.1; Windows 7, Service Pack 1
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2; Windows Server 2008 R2 SP1
Resolution: This issue is resolved in KB4471321.

Back to top
OS Build 14393.2551

October 09, 2018
KB4462917
Resolved
KB4471321
Resolved:
December 11, 2018
10:00 AM PT

Opened:
October 09, 2018
10:00 AM PT
Unable to use Seek bar in Windows Media Player
After installing KB4462917, users may not be able to use the Seek Bar in Windows Media Player when playing specific files. This issue does not affect normal playback.

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 8.1; Windows 7, Service Pack 1
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2; Windows Server 2008 R2 SP1

Resolution: This issue is resolved in KB4471321.

Back to top
OS Build 14393.2551

October 09, 2018
KB4462917
Resolved
KB4471321
Resolved:
December 11, 2018
10:00 AM PT

Opened:
October 09, 2018
10:00 AM PT
" @@ -116,7 +116,7 @@ sections: - type: markdown text: " - +
DetailsOriginating updateStatusHistory
Promotions that create non-root domains fail with optional features enabled
After installing KB4457127, Windows Server 2016 promotions that create non-root domains fail in forests in which optional features like Active Directory recycle have been enabled. The error is, “The replication operation encountered a database error.”
Affected platforms:
  • Client: Windows 10 Enterprise LTSC 2016
  • Server: Windows Server 2016
Resolution: This issue is resolved in KB4467684.

Back to top
OS Build 14393.2515

September 20, 2018
KB4457127
Resolved
KB4467684
Resolved:
November 27, 2018
10:00 AM PT

Opened:
September 20, 2018
10:00 AM PT
Promotions that create non-root domains fail with optional features enabled
After installing KB4457127, Windows Server 2016 promotions that create non-root domains fail in forests in which optional features like Active Directory recycle have been enabled. The error is, “The replication operation encountered a database error.”

Affected platforms:
  • Client: Windows 10 Enterprise LTSC 2016
  • Server: Windows Server 2016

Resolution: This issue is resolved in KB4467684.

Back to top
OS Build 14393.2515

September 20, 2018
KB4457127
Resolved
KB4467684
Resolved:
November 27, 2018
10:00 AM PT

Opened:
September 20, 2018
10:00 AM PT
" @@ -125,7 +125,7 @@ sections: - type: markdown text: " - - + +
DetailsOriginating updateStatusHistory
Issues with install and activation of Key Management Service (KMS) (CSVLK) host keys
After installing KB4343884, installation and client activation of Windows Server 2019 and Windows 10 Enterprise 2019 LTSC Key Management Service (KMS) CSVLK host keys do not work as expected.
Affected platforms:
  • Client: Windows 10 Enterprise LTSC 2016
  • Server: Windows Server 2016
Resolution: This issue is resolved in KB4467684.

Back to top
OS Build 14393.2457

August 30, 2018
KB4343884
Resolved
KB4467684
Resolved:
November 27, 2018
10:00 AM PT

Opened:
August 30, 2018
05:00 PM PT
SqlConnection instantiation exception on .NET 4.6 and later
After you install the August Preview of Quality Rollup or September 11, 2018 .NET Framework update, instantiation of SqlConnection can throw an exception.
For more information about this issue, see the following article in the Microsoft Knowledge Base: 4470809, SqlConnection instantiation exception on .NET 4.6 and later after August-September 2018 .NET Framework updates.
Affected platforms:
  • Client: Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016
  • Server: Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016
Resolution: This issue is resolved in KB4480977.

Back to top
OS Build 14393.2457

August 30, 2018
KB4343884
Resolved
KB4480977
Resolved:
January 17, 2019
02:00 PM PT

Opened:
August 30, 2018
05:00 PM PT
Issues with install and activation of Key Management Service (KMS) (CSVLK) host keys
After installing KB4343884, installation and client activation of Windows Server 2019 and Windows 10 Enterprise 2019 LTSC Key Management Service (KMS) CSVLK host keys do not work as expected.

Affected platforms:
  • Client: Windows 10 Enterprise LTSC 2016
  • Server: Windows Server 2016

Resolution: This issue is resolved in KB4467684.

Back to top
OS Build 14393.2457

August 30, 2018
KB4343884
Resolved
KB4467684
Resolved:
November 27, 2018
10:00 AM PT

Opened:
August 30, 2018
05:00 PM PT
SqlConnection instantiation exception on .NET 4.6 and later
After you install the August Preview of Quality Rollup or September 11, 2018 .NET Framework update, instantiation of SqlConnection can throw an exception.

For more information about this issue, see the following article in the Microsoft Knowledge Base: 4470809, SqlConnection instantiation exception on .NET 4.6 and later after August-September 2018 .NET Framework updates.

Affected platforms:
  • Client: Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016
  • Server: Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016

Resolution: This issue is resolved in KB4480977.

Back to top
OS Build 14393.2457

August 30, 2018
KB4343884
Resolved
KB4480977
Resolved:
January 17, 2019
02:00 PM PT

Opened:
August 30, 2018
05:00 PM PT
" diff --git a/windows/release-information/resolved-issues-windows-10-1703.yml b/windows/release-information/resolved-issues-windows-10-1703.yml index 98096e781d..efa136c4a0 100644 --- a/windows/release-information/resolved-issues-windows-10-1703.yml +++ b/windows/release-information/resolved-issues-windows-10-1703.yml @@ -60,7 +60,7 @@ sections: - type: markdown text: " - +
DetailsOriginating updateStatusHistory
End-user-defined characters (EUDC) may cause blue screen at startup
If you enable per font end-user-defined characters (EUDC), the system may stop working and a blue screen may appear at startup. This is not a common setting in non-Asian regions.
Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016
Resolution: This issue was resolved in KB4493474.

Back to top
OS Build 15063.1716

March 19, 2019
KB4489888
Resolved
KB4493474
Resolved:
April 09, 2019
10:00 AM PT

Opened:
March 19, 2019
10:00 AM PT
End-user-defined characters (EUDC) may cause blue screen at startup
If you enable per font end-user-defined characters (EUDC), the system may stop working and a blue screen may appear at startup. This is not a common setting in non-Asian regions.

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016

Resolution: This issue was resolved in KB4493474.

Back to top
OS Build 15063.1716

March 19, 2019
KB4489888
Resolved
KB4493474
Resolved:
April 09, 2019
10:00 AM PT

Opened:
March 19, 2019
10:00 AM PT
" @@ -69,9 +69,9 @@ sections: - type: markdown text: " - - - + + +
DetailsOriginating updateStatusHistory
Applications using Microsoft Jet database and Access 95 file format stop working
Applications that use a Microsoft Jet database with the Microsoft Access 95 file format may randomly stop working.
Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 7, Service Pack 1
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2008 R2 SP1
Resolution: This issue is resolved in KB4487011.

Back to top
OS Build 15063.1631

February 12, 2019
KB4487020
Resolved
KB4487011
Resolved:
February 19, 2019
02:00 PM PT

Opened:
February 12, 2019
10:00 AM PT
Error 1309 when installing/uninstalling MSI or MSP files
After installing KB4487011, users may receive “Error 1309” while installing or uninstalling certain types of MSI and MSP files.
Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 8.1
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2
Resolution: This issue is resolved in KB4489871.

Back to top
OS Build 15063.1659

February 19, 2019
KB4487011
Resolved
KB4489871
Resolved:
March 12, 2019
10:00 AM PT

Opened:
February 19, 2019
02:00 PM PT
Internet Explorer may fail to load images
After installing KB4487020, Internet Explorer may fail to load images with a backslash (\\) in their relative source path.
Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 8.1; Windows 7, Service Pack 1
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2; Windows Server 2008 R2 SP1
Resolution: This issue is resolved in KB4487011.

Back to top
OS Build 15063.1631

February 12, 2019
KB4487020
Resolved
KB4487011
Resolved:
February 19, 2019
02:00 PM PT

Opened:
February 12, 2019
10:00 AM PT
Applications using Microsoft Jet database and Access 95 file format stop working
Applications that use a Microsoft Jet database with the Microsoft Access 95 file format may randomly stop working.

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 7, Service Pack 1
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2008 R2 SP1

Resolution: This issue is resolved in KB4487011.

Back to top
OS Build 15063.1631

February 12, 2019
KB4487020
Resolved
KB4487011
Resolved:
February 19, 2019
02:00 PM PT

Opened:
February 12, 2019
10:00 AM PT
Error 1309 when installing/uninstalling MSI or MSP files
After installing KB4487011, users may receive “Error 1309” while installing or uninstalling certain types of MSI and MSP files.

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 8.1
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2

Resolution: This issue is resolved in KB4489871.

Back to top
OS Build 15063.1659

February 19, 2019
KB4487011
Resolved
KB4489871
Resolved:
March 12, 2019
10:00 AM PT

Opened:
February 19, 2019
02:00 PM PT
Internet Explorer may fail to load images
After installing KB4487020, Internet Explorer may fail to load images with a backslash (\\) in their relative source path.

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 8.1; Windows 7, Service Pack 1
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2; Windows Server 2008 R2 SP1

Resolution: This issue is resolved in KB4487011.

Back to top
OS Build 15063.1631

February 12, 2019
KB4487020
Resolved
KB4487011
Resolved:
February 19, 2019
02:00 PM PT

Opened:
February 12, 2019
10:00 AM PT
" @@ -80,11 +80,11 @@ sections: - type: markdown text: " - - - - - + + + + +
DetailsOriginating updateStatusHistory
Applications using Microsoft Jet database fail to open
Applications that use a Microsoft Jet database with the Microsoft Access 97 file format may fail to open if the database has column names greater than 32 characters. The database will fail to open with the error, “Unrecognized Database Format”.
Affected platforms:
  • Client: Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 8.1; Windows 7, Service Pack 1 
  • Server: Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2; Windows Server 2008 R2 SP1
Resolution: This issue is resolved in KB4487020.

Back to top
OS Build 15063.1563

January 08, 2019
KB4480973
Resolved
KB4487020
Resolved:
February 12, 2019
10:00 AM PT

Opened:
January 08, 2019
10:00 AM PT
First character of the Japanese era name not recognized as an abbreviation
After installing KB4480959, the first character of the Japanese era name is not recognized as an abbreviation and may cause date parsing issues.
Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 8.1; Windows 7, Service Pack 1
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2; Windows Server 2008 R2 SP1
Resolution: This issue is resolved in KB4487011.

Back to top
OS Build 15063.1596

January 15, 2019
KB4480959
Resolved
KB4487011
Resolved:
February 19, 2019
02:00 PM PT

Opened:
January 15, 2019
10:00 AM PT
MSXML6 may cause applications to stop responding
After installing KB4480973, MSXML6 causes applications to stop responding if an exception was thrown during node operations, such as appendChild(), insertBefore(), and moveNode().
The Group Policy editor may stop responding when editing a Group Policy Object (GPO) that contains Group Policy Preferences (GPP) for Internet Explorer 10 settings.
Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 8.1
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2
Resolution: This issue was resolved in KB4493474.

Back to top
OS Build 15063.1563

January 08, 2019
KB4480973
Resolved
KB4493474
Resolved:
April 09, 2019
10:00 AM PT

Opened:
January 08, 2019
10:00 AM PT
Unable to access hotspots with third-party applications
After installing KB4480973, third-party applications may have difficulty authenticating hotspots.
Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 8.1
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2
Resolution: This issue is resolved in KB4480959.

Back to top
OS Build 15063.1563

January 08, 2019
KB4480973
Resolved
KB4480959
Resolved:
January 15, 2019
10:00 AM PT

Opened:
January 08, 2019
10:00 AM PT
Webpages become unresponsive in Microsoft Edge
After installing KB4480973, some Microsoft Edge users report that they:
  • Cannot load webpages using a local IP address.
  • Cannot load webpages on the Internet using a VPN connection.
Browsing fails or the webpage may become unresponsive.
Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709
Resolution: This issue is resolved in KB4487020.

Back to top
OS Build 15063.1563

January 08, 2019
KB4480973
Resolved
KB4487020
Resolved:
February 12, 2019
10:00 AM PT

Opened:
January 08, 2019
10:00 AM PT
Applications using Microsoft Jet database fail to open
Applications that use a Microsoft Jet database with the Microsoft Access 97 file format may fail to open if the database has column names greater than 32 characters. The database will fail to open with the error, “Unrecognized Database Format”.

Affected platforms:
  • Client: Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 8.1; Windows 7, Service Pack 1 
  • Server: Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2; Windows Server 2008 R2 SP1

Resolution: This issue is resolved in KB4487020.

Back to top
OS Build 15063.1563

January 08, 2019
KB4480973
Resolved
KB4487020
Resolved:
February 12, 2019
10:00 AM PT

Opened:
January 08, 2019
10:00 AM PT
First character of the Japanese era name not recognized as an abbreviation
After installing KB4480959, the first character of the Japanese era name is not recognized as an abbreviation and may cause date parsing issues.

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 8.1; Windows 7, Service Pack 1
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2; Windows Server 2008 R2 SP1

Resolution: This issue is resolved in KB4487011.

Back to top
OS Build 15063.1596

January 15, 2019
KB4480959
Resolved
KB4487011
Resolved:
February 19, 2019
02:00 PM PT

Opened:
January 15, 2019
10:00 AM PT
MSXML6 may cause applications to stop responding
After installing KB4480973, MSXML6 causes applications to stop responding if an exception was thrown during node operations, such as appendChild(), insertBefore(), and moveNode().

The Group Policy editor may stop responding when editing a Group Policy Object (GPO) that contains Group Policy Preferences (GPP) for Internet Explorer 10 settings.

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 8.1
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2

Resolution: This issue was resolved in KB4493474.

Back to top
OS Build 15063.1563

January 08, 2019
KB4480973
Resolved
KB4493474
Resolved:
April 09, 2019
10:00 AM PT

Opened:
January 08, 2019
10:00 AM PT
Unable to access hotspots with third-party applications
After installing KB4480973, third-party applications may have difficulty authenticating hotspots.

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 8.1
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2

Resolution: This issue is resolved in KB4480959.

Back to top
OS Build 15063.1563

January 08, 2019
KB4480973
Resolved
KB4480959
Resolved:
January 15, 2019
10:00 AM PT

Opened:
January 08, 2019
10:00 AM PT
Webpages become unresponsive in Microsoft Edge
After installing KB4480973, some Microsoft Edge users report that they:
  • Cannot load webpages using a local IP address.
  • Cannot load webpages on the Internet using a VPN connection.
Browsing fails or the webpage may become unresponsive.

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709

Resolution: This issue is resolved in KB4487020.

Back to top
OS Build 15063.1563

January 08, 2019
KB4480973
Resolved
KB4487020
Resolved:
February 12, 2019
10:00 AM PT

Opened:
January 08, 2019
10:00 AM PT
" @@ -93,9 +93,9 @@ sections: - type: markdown text: " - - - + + +
DetailsOriginating updateStatusHistory
Error message beginning with “Hosted by…” when launching Microsoft Edge
After installing KB4462937, some users may see a dialog box with a non-applicable message beginning with the words “Hosted by...” when first starting Microsoft Edge.
This dialog will only appear once if they have turned on “Block only third-party cookies” in Microsoft Edge and applied certain language packs before installing this update.
Affected platforms:
  • Client: Windows 10, version 1709; Windows 10, version 1703
  • Server: Windows Server, version 1709
Resolution: This issue is resolved in KB4462939.

Back to top
OS Build 15063.1387

October 09, 2018
KB4462937
Resolved
KB4462939
Resolved:
October 18, 2018
10:00 AM PT

Opened:
October 09, 2018
10:00 AM PT
LongonUI.exe stops working intermittently
After installing KB4462937, LogonUI.exe stops working intermittently.
Affected platforms:
  • Windows 10, version 1703
Resolution: This issue is resolved in KB4467699.

Back to top
OS Build 15063.1387

October 09, 2018
KB4462937
Resolved
KB4467699
Resolved:
November 27, 2018
10:00 AM PT

Opened:
October 09, 2018
10:00 AM PT
Unable to use Seek bar in Windows Media Player
After installing KB4462937, users may not be able to use the Seek Bar in Windows Media Player when playing specific files. This issue does not affect normal playback.
Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 8.1; Windows 7, Service Pack 1
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2; Windows Server 2008 R2 SP1
Resolution: This issue is resolved in KB4471327.

Back to top
OS Build 15063.1387

October 09, 2018
KB4462937
Resolved
KB4471327
Resolved:
December 11, 2018
10:00 AM PT

Opened:
October 09, 2018
10:00 AM PT
Error message beginning with “Hosted by…” when launching Microsoft Edge
After installing KB4462937, some users may see a dialog box with a non-applicable message beginning with the words “Hosted by...” when first starting Microsoft Edge.

This dialog will only appear once if they have turned on “Block only third-party cookies” in Microsoft Edge and applied certain language packs before installing this update.

Affected platforms:
  • Client: Windows 10, version 1709; Windows 10, version 1703
  • Server: Windows Server, version 1709

Resolution: This issue is resolved in KB4462939.

Back to top
OS Build 15063.1387

October 09, 2018
KB4462937
Resolved
KB4462939
Resolved:
October 18, 2018
10:00 AM PT

Opened:
October 09, 2018
10:00 AM PT
LongonUI.exe stops working intermittently
After installing KB4462937, LogonUI.exe stops working intermittently.

Affected platforms:
  • Windows 10, version 1703

Resolution: This issue is resolved in KB4467699.

Back to top
OS Build 15063.1387

October 09, 2018
KB4462937
Resolved
KB4467699
Resolved:
November 27, 2018
10:00 AM PT

Opened:
October 09, 2018
10:00 AM PT
Unable to use Seek bar in Windows Media Player
After installing KB4462937, users may not be able to use the Seek Bar in Windows Media Player when playing specific files. This issue does not affect normal playback.

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 8.1; Windows 7, Service Pack 1
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2; Windows Server 2008 R2 SP1

Resolution: This issue is resolved in KB4471327.

Back to top
OS Build 15063.1387

October 09, 2018
KB4462937
Resolved
KB4471327
Resolved:
December 11, 2018
10:00 AM PT

Opened:
October 09, 2018
10:00 AM PT
" @@ -104,6 +104,6 @@ sections: - type: markdown text: " - +
DetailsOriginating updateStatusHistory
SqlConnection instantiation exception on .NET 4.6 and later
After you install the August Preview of Quality Rollup or September 11, 2018 .NET Framework update, instantiation of SqlConnection can throw an exception.
For more information about this issue, see the following article in the Microsoft Knowledge Base:
4470809 SqlConnection instantiation exception on .NET 4.6 and later after August-September 2018 .NET Framework updates.
Affected platforms:
  • Client: Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016
  • Server: Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016
Resolution: This issue is resolved in KB4480959.

Back to top
OS Build 15063.1292

August 30, 2018
KB4343889
Resolved
KB4480959
Resolved:
January 15, 2019
10:00 AM PT

Opened:
August 30, 2018
05:00 PM PT
SqlConnection instantiation exception on .NET 4.6 and later
After you install the August Preview of Quality Rollup or September 11, 2018 .NET Framework update, instantiation of SqlConnection can throw an exception.

For more information about this issue, see the following article in the Microsoft Knowledge Base:
4470809 SqlConnection instantiation exception on .NET 4.6 and later after August-September 2018 .NET Framework updates.

Affected platforms:
  • Client: Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016
  • Server: Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016

Resolution: This issue is resolved in KB4480959.

Back to top
OS Build 15063.1292

August 30, 2018
KB4343889
Resolved
KB4480959
Resolved:
January 15, 2019
10:00 AM PT

Opened:
August 30, 2018
05:00 PM PT
" diff --git a/windows/release-information/resolved-issues-windows-10-1709.yml b/windows/release-information/resolved-issues-windows-10-1709.yml index d460264f21..25a903edb5 100644 --- a/windows/release-information/resolved-issues-windows-10-1709.yml +++ b/windows/release-information/resolved-issues-windows-10-1709.yml @@ -60,8 +60,8 @@ sections: - type: markdown text: " - - + +
DetailsOriginating updateStatusHistory
End-user-defined characters (EUDC) may cause blue screen at startup
If you enable per font end-user-defined characters (EUDC), the system may stop working and a blue screen may appear at startup. This is not a common setting in non-Asian regions.
Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016
Resolution: This issue is resolved in KB4493441.

Back to top
OS Build 16299.1059

March 19, 2019
KB4489890
Resolved
KB4493441
Resolved:
April 09, 2019
10:00 AM PT

Opened:
March 19, 2019
10:00 AM PT
Stop error when attempting to start SSH from WSL
After applying KB4489886, a stop error occurs when attempting to start the Secure Shell (SSH) client program from Windows Subsystem for Linux (WSL) with agent forwarding enabled using a command line switch (ssh –A) or a configuration setting.
Affected platforms:
  • Client: Windows 10, version 1803; Windows 10, version 1709
  • Server: Windows Server, version 1803; Windows Server, version 1709
Resolution: This issue is resolved in KB4493441.

Back to top
OS Build 16299.1029

March 12, 2019
KB4489886
Resolved
KB4493441
Resolved:
April 09, 2019
10:00 AM PT

Opened:
March 12, 2019
10:00 AM PT
End-user-defined characters (EUDC) may cause blue screen at startup
If you enable per font end-user-defined characters (EUDC), the system may stop working and a blue screen may appear at startup. This is not a common setting in non-Asian regions.

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016

Resolution: This issue is resolved in KB4493441.

Back to top
OS Build 16299.1059

March 19, 2019
KB4489890
Resolved
KB4493441
Resolved:
April 09, 2019
10:00 AM PT

Opened:
March 19, 2019
10:00 AM PT
Stop error when attempting to start SSH from WSL
After applying KB4489886, a stop error occurs when attempting to start the Secure Shell (SSH) client program from Windows Subsystem for Linux (WSL) with agent forwarding enabled using a command line switch (ssh –A) or a configuration setting.

Affected platforms:
  • Client: Windows 10, version 1803; Windows 10, version 1709
  • Server: Windows Server, version 1803; Windows Server, version 1709

Resolution: This issue is resolved in KB4493441.

Back to top
OS Build 16299.1029

March 12, 2019
KB4489886
Resolved
KB4493441
Resolved:
April 09, 2019
10:00 AM PT

Opened:
March 12, 2019
10:00 AM PT
" @@ -70,9 +70,9 @@ sections: - type: markdown text: " - - - + + +
DetailsOriginating updateStatusHistory
Applications using Microsoft Jet database and Access 95 file format stop working
Applications that use a Microsoft Jet database with the Microsoft Access 95 file format may randomly stop working.
Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 7, Service Pack 1
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2008 R2 SP1
Resolution: This issue is resolved in KB4487021.

Back to top
OS Build 16299.967

February 12, 2019
KB4486996
Resolved
KB4487021
Resolved:
February 19, 2019
02:00 PM PT

Opened:
February 12, 2019
10:00 AM PT
Error 1309 when installing/uninstalling MSI or MSP files
After installing KB4486996, users may receive “Error 1309” while installing or uninstalling certain types of MSI and MSP files.
Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 8.1
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2
Resolution: This issue is resolved in KB4489886.

Back to top
OS Build 16299.967

February 12, 2019
KB4486996
Resolved
KB4489886
Resolved:
March 12, 2019
10:00 AM PT

Opened:
February 12, 2019
10:00 AM PT
Internet Explorer may fail to load images
After installing KB4486996, Internet Explorer may fail to load images with a backslash (\\) in their relative source path.
Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 8.1; Windows 7, Service Pack 1
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2; Windows Server 2008 R2 SP1
Resolution: This issue is resolved in KB4487021.

Back to top
OS Build 16299.967

February 12, 2019
KB4486996
Resolved
KB4487021
Resolved:
February 19, 2019
02:00 PM PT

Opened:
February 12, 2019
10:00 AM PT
Applications using Microsoft Jet database and Access 95 file format stop working
Applications that use a Microsoft Jet database with the Microsoft Access 95 file format may randomly stop working.

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 7, Service Pack 1
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2008 R2 SP1

Resolution: This issue is resolved in KB4487021.

Back to top
OS Build 16299.967

February 12, 2019
KB4486996
Resolved
KB4487021
Resolved:
February 19, 2019
02:00 PM PT

Opened:
February 12, 2019
10:00 AM PT
Error 1309 when installing/uninstalling MSI or MSP files
After installing KB4486996, users may receive “Error 1309” while installing or uninstalling certain types of MSI and MSP files.

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 8.1
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2

Resolution: This issue is resolved in KB4489886.

Back to top
OS Build 16299.967

February 12, 2019
KB4486996
Resolved
KB4489886
Resolved:
March 12, 2019
10:00 AM PT

Opened:
February 12, 2019
10:00 AM PT
Internet Explorer may fail to load images
After installing KB4486996, Internet Explorer may fail to load images with a backslash (\\) in their relative source path.

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 8.1; Windows 7, Service Pack 1
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2; Windows Server 2008 R2 SP1

Resolution: This issue is resolved in KB4487021.

Back to top
OS Build 16299.967

February 12, 2019
KB4486996
Resolved
KB4487021
Resolved:
February 19, 2019
02:00 PM PT

Opened:
February 12, 2019
10:00 AM PT
" @@ -81,11 +81,11 @@ sections: - type: markdown text: " - - - - - + + + + +
DetailsOriginating updateStatusHistory
Applications using Microsoft Jet database fail to open
Applications that use a Microsoft Jet database with the Microsoft Access 97 file format may fail to open if the database has column names greater than 32 characters. The database will fail to open with the error, “Unrecognized Database Format.”
Affected platforms:
  • Client: Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 8.1; Windows 7, Service Pack 1 
  • Server: Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2; Windows Server 2008 R2 SP1 
Resolution: This issue is resolved in KB4486996.

Back to top
OS Build 16299.904

January 08, 2019
KB4480978
Resolved
KB4486996
Resolved:
February 12, 2019
10:00 AM PT

Opened:
January 08, 2019
10:00 AM PT
First character of the Japanese era name not recognized as an abbreviation
After installing KB4480967, the first character of the Japanese era name is not recognized as an abbreviation and may cause date parsing issues.
Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 8.1; Windows 7, Service Pack 1
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2; Windows Server 2008 R2 SP1
Resolution: This issue is resolved in KB4487021.

Back to top
OS Build 16299.936

January 15, 2019
KB4480967
Resolved
KB4487021
Resolved:
February 19, 2019
02:00 PM PT

Opened:
January 15, 2019
10:00 AM PT
MSXML6 causes applications to stop responding if an exception was thrown
After installing KB4480978, MSXML6 causes applications to stop responding if an exception was thrown during node operations, such as appendChild(), insertBefore(), and moveNode().
The Group Policy editor may stop responding when editing a Group Policy Object (GPO) that contains Group Policy Preferences (GPP) for Internet Explorer 10 settings.
Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 8.1
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2
Resolution: This issue is resolved in KB4493441.

Back to top
OS Build 16299.904

January 08, 2019
KB4480978
Resolved
KB4493441
Resolved:
April 09, 2019
10:00 AM PT

Opened:
January 08, 2019
10:00 AM PT
Unable to access hotspots with third-party applications
After installing KB4480978, third-party applications may have difficulty authenticating hotspots.
Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 8.1
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2
Resolution: This issue is resolved in KB4480967.

Back to top
OS Build 16299.904

January 08, 2019
KB4480978
Resolved
KB4480967
Resolved:
January 15, 2019
10:00 AM PT

Opened:
January 08, 2019
10:00 AM PT
Webpages become unresponsive in Microsoft Edge
After installing KB4480978, some Microsoft Edge users report that they:
  • Cannot load webpages using a local IP address.
  • Cannot load webpages on the Internet using a VPN connection.
Browsing fails or the webpage may become unresponsive.
Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709
Resolution: This issue is resolved in KB4486996.

Back to top
OS Build 16299.904

January 08, 2019
KB4480978
Resolved
KB4486996
Resolved:
February 12, 2019
10:00 AM PT

Opened:
January 08, 2019
10:00 AM PT
Applications using Microsoft Jet database fail to open
Applications that use a Microsoft Jet database with the Microsoft Access 97 file format may fail to open if the database has column names greater than 32 characters. The database will fail to open with the error, “Unrecognized Database Format.”

Affected platforms:
  • Client: Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 8.1; Windows 7, Service Pack 1 
  • Server: Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2; Windows Server 2008 R2 SP1 

Resolution: This issue is resolved in KB4486996.

Back to top
OS Build 16299.904

January 08, 2019
KB4480978
Resolved
KB4486996
Resolved:
February 12, 2019
10:00 AM PT

Opened:
January 08, 2019
10:00 AM PT
First character of the Japanese era name not recognized as an abbreviation
After installing KB4480967, the first character of the Japanese era name is not recognized as an abbreviation and may cause date parsing issues.

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 8.1; Windows 7, Service Pack 1
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2; Windows Server 2008 R2 SP1

Resolution: This issue is resolved in KB4487021.

Back to top
OS Build 16299.936

January 15, 2019
KB4480967
Resolved
KB4487021
Resolved:
February 19, 2019
02:00 PM PT

Opened:
January 15, 2019
10:00 AM PT
MSXML6 causes applications to stop responding if an exception was thrown
After installing KB4480978, MSXML6 causes applications to stop responding if an exception was thrown during node operations, such as appendChild(), insertBefore(), and moveNode().

The Group Policy editor may stop responding when editing a Group Policy Object (GPO) that contains Group Policy Preferences (GPP) for Internet Explorer 10 settings.

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 8.1
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2

Resolution: This issue is resolved in KB4493441.

Back to top
OS Build 16299.904

January 08, 2019
KB4480978
Resolved
KB4493441
Resolved:
April 09, 2019
10:00 AM PT

Opened:
January 08, 2019
10:00 AM PT
Unable to access hotspots with third-party applications
After installing KB4480978, third-party applications may have difficulty authenticating hotspots.

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 8.1
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2

Resolution: This issue is resolved in KB4480967.

Back to top
OS Build 16299.904

January 08, 2019
KB4480978
Resolved
KB4480967
Resolved:
January 15, 2019
10:00 AM PT

Opened:
January 08, 2019
10:00 AM PT
Webpages become unresponsive in Microsoft Edge
After installing KB4480978, some Microsoft Edge users report that they:
  • Cannot load webpages using a local IP address.
  • Cannot load webpages on the Internet using a VPN connection.
Browsing fails or the webpage may become unresponsive.

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709

Resolution: This issue is resolved in KB4486996.

Back to top
OS Build 16299.904

January 08, 2019
KB4480978
Resolved
KB4486996
Resolved:
February 12, 2019
10:00 AM PT

Opened:
January 08, 2019
10:00 AM PT
" @@ -94,8 +94,8 @@ sections: - type: markdown text: " - - + +
DetailsOriginating updateStatusHistory
Error message beginning with “Hosted by…” when launching Microsoft Edge
After installing KB4462918, some users may see a dialog box with a non-applicable message beginning with the words “Hosted by...” when first starting Microsoft Edge.
This dialog will only appear once if they have turned on “Block only third-party cookies” in Microsoft Edge and applied certain language packs before installing this update.
Affected platforms:
  • Client: Windows 10, version 1709; Windows 10, version 1703
  • Server: Windows Server, version 1709
Resolution: This issue is resolved in KB4462932.

Back to top
OS Build 16299.726

October 09, 2018
KB4462918
Resolved
KB4462932
Resolved:
October 18, 2018
10:00 AM PT

Opened:
October 09, 2018
10:00 AM PT
Unable to use Seek bar in Windows Media Player
After installing KB4462918, users may not be able to use the Seek Bar in Windows Media Player when playing specific files. This issue does not affect normal playback.
Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 8.1; Windows 7, Service Pack 1
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2; Windows Server 2008 R2 SP1
Resolution: This issue is resolved in KB4471329.

Back to top
OS Build 16299.726

October 09, 2018
KB4462918
Resolved
KB4471329
Resolved:
December 11, 2018
10:00 AM PT

Opened:
October 09, 2018
10:00 AM PT
Error message beginning with “Hosted by…” when launching Microsoft Edge
After installing KB4462918, some users may see a dialog box with a non-applicable message beginning with the words “Hosted by...” when first starting Microsoft Edge.

This dialog will only appear once if they have turned on “Block only third-party cookies” in Microsoft Edge and applied certain language packs before installing this update.

Affected platforms:
  • Client: Windows 10, version 1709; Windows 10, version 1703
  • Server: Windows Server, version 1709

Resolution: This issue is resolved in KB4462932.

Back to top
OS Build 16299.726

October 09, 2018
KB4462918
Resolved
KB4462932
Resolved:
October 18, 2018
10:00 AM PT

Opened:
October 09, 2018
10:00 AM PT
Unable to use Seek bar in Windows Media Player
After installing KB4462918, users may not be able to use the Seek Bar in Windows Media Player when playing specific files. This issue does not affect normal playback.

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 8.1; Windows 7, Service Pack 1
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2; Windows Server 2008 R2 SP1

Resolution: This issue is resolved in KB4471329.

Back to top
OS Build 16299.726

October 09, 2018
KB4462918
Resolved
KB4471329
Resolved:
December 11, 2018
10:00 AM PT

Opened:
October 09, 2018
10:00 AM PT
" @@ -104,6 +104,6 @@ sections: - type: markdown text: " - +
DetailsOriginating updateStatusHistory
SqlConnection instantiation exception on .NET 4.6 and later
After you install the August Preview of Quality Rollup or September 11, 2018 .NET Framework update, instantiation of SqlConnection can throw an exception.
For more information about this issue, see the following article in the Microsoft Knowledge Base:
4470809 SqlConnection instantiation exception on .NET 4.6 and later after August-September 2018 .NET Framework updates.
Affected platforms:
  • Client: Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016
  • Server: Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016
Resolution: This issue is resolved in KB4480967.

Back to top
OS Build 16299.637

August 30, 2018
KB4343893
Resolved
KB4480967
Resolved:
January 15, 2019
10:00 AM PT

Opened:
August 30, 2018
05:00 PM PT
SqlConnection instantiation exception on .NET 4.6 and later
After you install the August Preview of Quality Rollup or September 11, 2018 .NET Framework update, instantiation of SqlConnection can throw an exception.

For more information about this issue, see the following article in the Microsoft Knowledge Base:
4470809 SqlConnection instantiation exception on .NET 4.6 and later after August-September 2018 .NET Framework updates.

Affected platforms:
  • Client: Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016
  • Server: Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016

Resolution: This issue is resolved in KB4480967.

Back to top
OS Build 16299.637

August 30, 2018
KB4343893
Resolved
KB4480967
Resolved:
January 15, 2019
10:00 AM PT

Opened:
August 30, 2018
05:00 PM PT
" diff --git a/windows/release-information/resolved-issues-windows-10-1803.yml b/windows/release-information/resolved-issues-windows-10-1803.yml index 19926ef0f2..ea0e8a6fac 100644 --- a/windows/release-information/resolved-issues-windows-10-1803.yml +++ b/windows/release-information/resolved-issues-windows-10-1803.yml @@ -65,8 +65,8 @@ sections: - type: markdown text: " - - + +
DetailsOriginating updateStatusHistory
End-user-defined characters (EUDC) may cause blue screen at startup
If you enable per font end-user-defined characters (EUDC), the system may stop working and a blue screen may appear at startup. This is not a common setting in non-Asian regions. 
Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016
 
Resolution: This issue was resolved in KB4493464

Back to top
OS Build 17134.677

March 19, 2019
KB4489894
Resolved
KB4493464
Resolved:
April 09, 2019
10:00 AM PT

Opened:
March 19, 2019
10:00 AM PT
Stop error when attempting to start SSH from WSL
After applying KB4489868, a stop error occurs when attempting to start the Secure Shell (SSH) client program from Windows Subsystem for Linux (WSL) with agent forwarding enabled using a command line switch (ssh -A) or a configuration setting.
Affected platforms:
  • Client: Windows 10, version 1803; Windows 10, version 1709
  • Server: Windows Server, version 1803; Windows Server, version 1709
Resolution: This issue was resolved in KB4493464.

Back to top
OS Build 17134.648

March 12, 2019
KB4489868
Resolved
KB4493464
Resolved:
April 09, 2019
10:00 AM PT

Opened:
March 12, 2019
10:00 AM PT
End-user-defined characters (EUDC) may cause blue screen at startup
If you enable per font end-user-defined characters (EUDC), the system may stop working and a blue screen may appear at startup. This is not a common setting in non-Asian regions. 

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016
 
Resolution: This issue was resolved in KB4493464

Back to top
OS Build 17134.677

March 19, 2019
KB4489894
Resolved
KB4493464
Resolved:
April 09, 2019
10:00 AM PT

Opened:
March 19, 2019
10:00 AM PT
Stop error when attempting to start SSH from WSL
After applying KB4489868, a stop error occurs when attempting to start the Secure Shell (SSH) client program from Windows Subsystem for Linux (WSL) with agent forwarding enabled using a command line switch (ssh -A) or a configuration setting.

Affected platforms:
  • Client: Windows 10, version 1803; Windows 10, version 1709
  • Server: Windows Server, version 1803; Windows Server, version 1709

Resolution: This issue was resolved in KB4493464.

Back to top
OS Build 17134.648

March 12, 2019
KB4489868
Resolved
KB4493464
Resolved:
April 09, 2019
10:00 AM PT

Opened:
March 12, 2019
10:00 AM PT
" @@ -75,8 +75,8 @@ sections: - type: markdown text: " - - + +
DetailsOriginating updateStatusHistory
Error 1309 when installing/uninstalling MSI or MSP files
After installing KB4487017, users may received \"Error 1309\" while installing or uninstalling certain types of MSI and MSP files. 
Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 8.1
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2
Resolution: This issue is resolved in KB4489868.

Back to top
OS Build 17134.590

February 12, 2019
KB4487017
Resolved
KB4489868
Resolved:
March 12, 2019
10:00 AM PT

Opened:
February 12, 2019
10:00 AM PT
Internet Explorer may fail to load images
After installing KB4487017, Internet Explorer may fail to load images with a backslash (\\) in their relative source path. 
Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 8.1; Windows 7, Service Pack 1
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2; Windows Server 2008 R2 SP1
Resolution: This issue is resolved in KB4487029

Back to top
OS Build 17134.590

February 12, 2019
KB4487017
Resolved
KB4487029
Resolved:
February 19, 2019
02:00 PM PT

Opened:
February 12, 2019
10:00 AM PT
Error 1309 when installing/uninstalling MSI or MSP files
After installing KB4487017, users may received \"Error 1309\" while installing or uninstalling certain types of MSI and MSP files. 

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 8.1
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2

Resolution: This issue is resolved in KB4489868.

Back to top
OS Build 17134.590

February 12, 2019
KB4487017
Resolved
KB4489868
Resolved:
March 12, 2019
10:00 AM PT

Opened:
February 12, 2019
10:00 AM PT
Internet Explorer may fail to load images
After installing KB4487017, Internet Explorer may fail to load images with a backslash (\\) in their relative source path. 

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 8.1; Windows 7, Service Pack 1
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2; Windows Server 2008 R2 SP1

Resolution: This issue is resolved in KB4487029

Back to top
OS Build 17134.590

February 12, 2019
KB4487017
Resolved
KB4487029
Resolved:
February 19, 2019
02:00 PM PT

Opened:
February 12, 2019
10:00 AM PT
" @@ -85,11 +85,11 @@ sections: - type: markdown text: " - - - - - + + + + +
DetailsOriginating updateStatusHistory
Applications using Microsoft Jet database and Access 95 file format stop working
Applications that use a Microsoft Jet database with the Microsoft Access 95 file format may randomly stop working. 
Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 7, Service Pack 1
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2008 R2 SP1
Resolution: This issue is resolved in KB4487017.

Back to top
OS Build 17134.523

January 08, 2019
KB4480966
Resolved
KB4487017
Resolved:
February 12, 2019
10:00 AM PT

Opened:
January 08, 2019
10:00 AM PT
First character of Japanese era name not recognized
After installing KB4480976, the first character of the Japanese era name is not recognized as an abbreviation and may cause date parsing issues.
Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 8.1; Windows 7, Service Pack 1
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2; Windows Server 2008 R2 SP1
Resolution: This issue is resolved in KB4487029

Back to top
OS Build 17134.556

January 15, 2019
KB4480976
Resolved
KB4487029
Resolved:
February 19, 2019
02:00 PM PT

Opened:
January 15, 2019
10:00 AM PT
MSXML6 may cause applications to stop responding
After installing KB4480966, MSXML6 causes applications to stop responding if an exception was thrown during node operations, such as appendChild(), insertBefore(), and moveNode().
The Group Policy editor may stop responding when editing a Group Policy Object (GPO) that contains Group Policy Preferences (GPP) for Internet Explorer 10 settings.
Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 8.1
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2
Resolution: This issue was resolved in KB4493464

Back to top
OS Build 17134.523

January 08, 2019
KB4480966
Resolved
KB4493464
Resolved:
April 09, 2019
10:00 AM PT

Opened:
January 08, 2019
10:00 AM PT
Unable to access hotspots with third-party applications
After installing KB4480966, third-party applications may have difficulty authenticating hotspots.
Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 8.1
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2
Resolution: This issue is resolved in KB4480976

Back to top
OS Build 17134.523

January 08, 2019
KB4480966
Resolved
KB4480976
Resolved:
January 15, 2019
10:00 AM PT

Opened:
January 08, 2019
10:00 AM PT
Webpages become unresponsive in Microsoft Edge
After installing KB4480966, some Microsoft Edge users report that they: 
  • Cannot load webpages using a local IP address. 
  • Cannot load webpages on the Internet using a VPN connection.  
Browsing fails or the webpage may become unresponsive. 
Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709
Resolution: This issue is resolved in KB4487017

Back to top
OS Build 17134.523

January 08, 2019
KB4480966
Resolved
KB4487017
Resolved:
February 12, 2019
10:00 AM PT

Opened:
January 08, 2019
10:00 AM PT
Applications using Microsoft Jet database and Access 95 file format stop working
Applications that use a Microsoft Jet database with the Microsoft Access 95 file format may randomly stop working. 

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 7, Service Pack 1
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2008 R2 SP1

Resolution: This issue is resolved in KB4487017.

Back to top
OS Build 17134.523

January 08, 2019
KB4480966
Resolved
KB4487017
Resolved:
February 12, 2019
10:00 AM PT

Opened:
January 08, 2019
10:00 AM PT
First character of Japanese era name not recognized
After installing KB4480976, the first character of the Japanese era name is not recognized as an abbreviation and may cause date parsing issues.

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 8.1; Windows 7, Service Pack 1
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2; Windows Server 2008 R2 SP1

Resolution: This issue is resolved in KB4487029

Back to top
OS Build 17134.556

January 15, 2019
KB4480976
Resolved
KB4487029
Resolved:
February 19, 2019
02:00 PM PT

Opened:
January 15, 2019
10:00 AM PT
MSXML6 may cause applications to stop responding
After installing KB4480966, MSXML6 causes applications to stop responding if an exception was thrown during node operations, such as appendChild(), insertBefore(), and moveNode().

The Group Policy editor may stop responding when editing a Group Policy Object (GPO) that contains Group Policy Preferences (GPP) for Internet Explorer 10 settings.

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 8.1
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2

Resolution: This issue was resolved in KB4493464

Back to top
OS Build 17134.523

January 08, 2019
KB4480966
Resolved
KB4493464
Resolved:
April 09, 2019
10:00 AM PT

Opened:
January 08, 2019
10:00 AM PT
Unable to access hotspots with third-party applications
After installing KB4480966, third-party applications may have difficulty authenticating hotspots.

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 8.1
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2

Resolution: This issue is resolved in KB4480976

Back to top
OS Build 17134.523

January 08, 2019
KB4480966
Resolved
KB4480976
Resolved:
January 15, 2019
10:00 AM PT

Opened:
January 08, 2019
10:00 AM PT
Webpages become unresponsive in Microsoft Edge
After installing KB4480966, some Microsoft Edge users report that they: 
  • Cannot load webpages using a local IP address. 
  • Cannot load webpages on the Internet using a VPN connection.  
Browsing fails or the webpage may become unresponsive. 

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709

Resolution: This issue is resolved in KB4487017

Back to top
OS Build 17134.523

January 08, 2019
KB4480966
Resolved
KB4487017
Resolved:
February 12, 2019
10:00 AM PT

Opened:
January 08, 2019
10:00 AM PT
" @@ -98,7 +98,7 @@ sections: - type: markdown text: " - +
DetailsOriginating updateStatusHistory
Cannot pin a web link on the Start menu or the taskbar
After installing KB4471324, some users cannot pin a web link on the Start menu or the taskbar. 
Affected platforms:
  • Client: Windows 10, version 1803
  • Server: Windows Server, version 1803
Resolution: This issue is resolved in KB4487029

Back to top
OS Build 17134.471

December 11, 2018
KB4471324
Resolved
KB4487029
Resolved:
February 19, 2019
02:00 PM PT

Opened:
December 11, 2018
10:00 AM PT
Cannot pin a web link on the Start menu or the taskbar
After installing KB4471324, some users cannot pin a web link on the Start menu or the taskbar. 

Affected platforms:
  • Client: Windows 10, version 1803
  • Server: Windows Server, version 1803

Resolution: This issue is resolved in KB4487029

Back to top
OS Build 17134.471

December 11, 2018
KB4471324
Resolved
KB4487029
Resolved:
February 19, 2019
02:00 PM PT

Opened:
December 11, 2018
10:00 AM PT
" @@ -107,8 +107,8 @@ sections: - type: markdown text: " - - + +
DetailsOriginating updateStatusHistory
Blue or black screen with \"System thread exception not handled\" error
After installing KB4467682, an optional update, some users may get a blue or black screen with the error code, \"System thread exception not handled.\"
Affected platforms:
  • Client: Windows 10, version 1803
  • Server: Windows Server, version 1803
Resolution: This issue is resolved in KB4471324

Back to top
OS Build 17134.441

November 27, 2018
KB4467682
Resolved
KB4471324
Resolved:
December 11, 2018
10:00 AM PT

Opened:
November 27, 2018
10:00 AM PT
Custom Start menu layouts display incorrectly
After installing KB4467682, custom Start menu layouts may display incorrectly. 
Affected platforms:
  • Client: Windows 10, version 1803
  • Server: Windows Server, version 1803
 
Resolution: This issue is resolved in KB4471324

Back to top
OS Build 17134.441

November 27, 2018
KB4467682
Resolved
KB4471324
Resolved:
December 11, 2018
10:00 AM PT

Opened:
November 27, 2018
10:00 AM PT
Blue or black screen with \"System thread exception not handled\" error
After installing KB4467682, an optional update, some users may get a blue or black screen with the error code, \"System thread exception not handled.\"

Affected platforms:
  • Client: Windows 10, version 1803
  • Server: Windows Server, version 1803

Resolution: This issue is resolved in KB4471324

Back to top
OS Build 17134.441

November 27, 2018
KB4467682
Resolved
KB4471324
Resolved:
December 11, 2018
10:00 AM PT

Opened:
November 27, 2018
10:00 AM PT
Custom Start menu layouts display incorrectly
After installing KB4467682, custom Start menu layouts may display incorrectly. 

Affected platforms:
  • Client: Windows 10, version 1803
  • Server: Windows Server, version 1803
 
Resolution: This issue is resolved in KB4471324

Back to top
OS Build 17134.441

November 27, 2018
KB4467682
Resolved
KB4471324
Resolved:
December 11, 2018
10:00 AM PT

Opened:
November 27, 2018
10:00 AM PT
" @@ -117,8 +117,8 @@ sections: - type: markdown text: " - - + +
DetailsOriginating updateStatusHistory
Developer Tools (F12) fail to start in Microsoft Edge
Developer Tools (F12) may fail to start in Microsoft Edge.
Affected platforms:
  • Client: Windows 10, version 1803
  • Server: Windows Server, version 1803
 
Resolution: This issue is resolved in KB4467702

Back to top
OS Build 17134.376

October 24, 2018
KB4462933
Resolved
KB4467702
Resolved:
November 13, 2018
10:00 AM PT

Opened:
October 24, 2018
02:00 PM PT
Unable to use Seek bar in Windows Media Player
After installing KB4462919, users may not be able to use the Seek bar in Windows Media Player when playing specific files. This issue does not affect normal playback.
Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 8.1; Windows 7, Service Pack 1
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2; Windows Server 2008 R2 SP1
Resolution: This issue is resolved in KB4471324

Back to top
OS Build 17134.345

October 09, 2018
KB4462919
Resolved
KB4471324
Resolved:
December 11, 2018
10:00 AM PT

Opened:
October 09, 2018
10:00 AM PT
Developer Tools (F12) fail to start in Microsoft Edge
Developer Tools (F12) may fail to start in Microsoft Edge.

Affected platforms:
  • Client: Windows 10, version 1803
  • Server: Windows Server, version 1803
 
Resolution: This issue is resolved in KB4467702

Back to top
OS Build 17134.376

October 24, 2018
KB4462933
Resolved
KB4467702
Resolved:
November 13, 2018
10:00 AM PT

Opened:
October 24, 2018
02:00 PM PT
Unable to use Seek bar in Windows Media Player
After installing KB4462919, users may not be able to use the Seek bar in Windows Media Player when playing specific files. This issue does not affect normal playback.

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 8.1; Windows 7, Service Pack 1
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2; Windows Server 2008 R2 SP1

Resolution: This issue is resolved in KB4471324

Back to top
OS Build 17134.345

October 09, 2018
KB4462919
Resolved
KB4471324
Resolved:
December 11, 2018
10:00 AM PT

Opened:
October 09, 2018
10:00 AM PT
" @@ -127,9 +127,9 @@ sections: - type: markdown text: " - - - + + +
DetailsOriginating updateStatusHistory
Guest VMs running Unicast NLB fail to respond after restart
All guest virtual machines running Unicast NLB fail to respond to NLB requests after the virtual machines restart. 
Affected platforms:
  • Client: Windows 10, version 1803; Windows 10, version 1507
  • Server: Windows Server, version 1803
 
Resolution: This issue is resolved in KB4458469

Back to top
OS Build 17134.285

September 11, 2018
KB4457128
Resolved
KB4458469
Resolved:
September 20, 2018
10:00 AM PT

Opened:
September 11, 2018
10:00 AM PT
SqlConnection instantiation exception on .NET 4.6 and later
After you install the August Preview of Quality Rollup or September 11, 2018 .NET Framework update, instantiation of SqlConnection can throw an exception.  
For more information about this issue, see the following article in the Microsoft Knowledge Base: 4470809, SqlConnection instantiation exception on .NET 4.6 and later after August-September 2018 .NET Framework updates.
Affected platforms:
  • Client: Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016
  • Server: Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016
Resolution: This issue is resolved in KB4480976

Back to top
OS Build 17134.285

September 11, 2018
KB4457128
Resolved
KB4480976
Resolved:
January 15, 2019
10:00 AM PT

Opened:
September 11, 2018
10:00 AM PT
Users cannot set Win32 program defaults
After installing KB4458469, some users cannot set Win32 program defaults for certain app and file type combinations using the Open with... command or Settings > Apps > Default apps
 
In some cases, Microsoft Notepad or other Win32 programs cannot be set as the default.
Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803
Resolution: This issue is resolved in KB4467682

Back to top
OS Build 17134.320

September 26, 2018
KB4458469
Resolved
KB4467682
Resolved:
November 27, 2018
10:00 AM PT

Opened:
September 26, 2018
02:00 PM PT
Guest VMs running Unicast NLB fail to respond after restart
All guest virtual machines running Unicast NLB fail to respond to NLB requests after the virtual machines restart. 

Affected platforms:
  • Client: Windows 10, version 1803; Windows 10, version 1507
  • Server: Windows Server, version 1803
 
Resolution: This issue is resolved in KB4458469

Back to top
OS Build 17134.285

September 11, 2018
KB4457128
Resolved
KB4458469
Resolved:
September 20, 2018
10:00 AM PT

Opened:
September 11, 2018
10:00 AM PT
SqlConnection instantiation exception on .NET 4.6 and later
After you install the August Preview of Quality Rollup or September 11, 2018 .NET Framework update, instantiation of SqlConnection can throw an exception.  

For more information about this issue, see the following article in the Microsoft Knowledge Base: 4470809, SqlConnection instantiation exception on .NET 4.6 and later after August-September 2018 .NET Framework updates.

Affected platforms:
  • Client: Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016
  • Server: Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016

Resolution: This issue is resolved in KB4480976

Back to top
OS Build 17134.285

September 11, 2018
KB4457128
Resolved
KB4480976
Resolved:
January 15, 2019
10:00 AM PT

Opened:
September 11, 2018
10:00 AM PT
Users cannot set Win32 program defaults
After installing KB4458469, some users cannot set Win32 program defaults for certain app and file type combinations using the Open with... command or Settings > Apps > Default apps
 
In some cases, Microsoft Notepad or other Win32 programs cannot be set as the default.

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803

Resolution: This issue is resolved in KB4467682

Back to top
OS Build 17134.320

September 26, 2018
KB4458469
Resolved
KB4467682
Resolved:
November 27, 2018
10:00 AM PT

Opened:
September 26, 2018
02:00 PM PT
" @@ -138,6 +138,6 @@ sections: - type: markdown text: " - +
DetailsOriginating updateStatusHistory
Microsoft Intune takes a long time to deliver user profiles
After installing KB4457128, Windows no longer recognizes the Personal Information exchange (PFX) certificate that's used for authenticating to a Wi-Fi or VPN connection. As a result, Microsoft Intune takes a long time to deliver user profiles because it doesn't recognize that the required certificate is on the device. 
Affected platforms:
  • Client: Windows 10, version 1803
  • Server: Windows Server, version 1803
 
Resolution: This issue is resolved in KB4464218

Back to top
OS Build 17134.191

July 24, 2018
KB4340917
Resolved
KB4464218
Resolved:
September 17, 2018
10:00 AM PT

Opened:
July 24, 2018
10:00 AM PT
Microsoft Intune takes a long time to deliver user profiles
After installing KB4457128, Windows no longer recognizes the Personal Information exchange (PFX) certificate that's used for authenticating to a Wi-Fi or VPN connection. As a result, Microsoft Intune takes a long time to deliver user profiles because it doesn't recognize that the required certificate is on the device. 

Affected platforms:
  • Client: Windows 10, version 1803
  • Server: Windows Server, version 1803
 
Resolution: This issue is resolved in KB4464218

Back to top
OS Build 17134.191

July 24, 2018
KB4340917
Resolved
KB4464218
Resolved:
September 17, 2018
10:00 AM PT

Opened:
July 24, 2018
10:00 AM PT
" diff --git a/windows/release-information/resolved-issues-windows-10-1809-and-windows-server-2019.yml b/windows/release-information/resolved-issues-windows-10-1809-and-windows-server-2019.yml index b7938d67b5..b8013ea114 100644 --- a/windows/release-information/resolved-issues-windows-10-1809-and-windows-server-2019.yml +++ b/windows/release-information/resolved-issues-windows-10-1809-and-windows-server-2019.yml @@ -69,7 +69,7 @@ sections: - type: markdown text: " - +
DetailsOriginating updateStatusHistory
End-user-defined characters (EUDC) may cause blue screen at startup
If you enable per font end-user-defined characters (EUDC), the system will stop working and a blue screen may appear at startup. This is not a common setting in non-Asian regions.
Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016
Workaround: To avoid this issue, don't enable per font EUDC. As an alternative, you can edit the registry to mitigate this issue; for more information, see KB4496149.
Resolved: This issue was resolved in KB4493509.

Back to top
OS Build 17763.404

April 02, 2019
KB4490481
Resolved
KB4493509
Resolved:
April 09, 2019
10:00 AM PT

Opened:
April 02, 2019
10:00 AM PT
End-user-defined characters (EUDC) may cause blue screen at startup
If you enable per font end-user-defined characters (EUDC), the system will stop working and a blue screen may appear at startup. This is not a common setting in non-Asian regions.

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016

Workaround: To avoid this issue, don't enable per font EUDC. As an alternative, you can edit the registry to mitigate this issue; for more information, see KB4496149.

Resolved: This issue was resolved in KB4493509.

Back to top
OS Build 17763.404

April 02, 2019
KB4490481
Resolved
KB4493509
Resolved:
April 09, 2019
10:00 AM PT

Opened:
April 02, 2019
10:00 AM PT
" @@ -78,7 +78,7 @@ sections: - type: markdown text: " - +
DetailsOriginating updateStatusHistory
Apps may stop working after selecting an audio output device other than the default
After installing KB4482887 on machines that have multiple audio devices, applications that provide advanced options for internal or external audio output devices may stop working unexpectedly. This issue occurs for users that select an audio output device different from the \"Default Audio Device\". Examples of applications that may stop working include: 
  • Windows Media Player 
  • Realtek HD Audio Manager 
  • Sound Blaster Control Panel 
Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019
  • Server: Windows Server, version 1809; Windows Server 2019
Workaround: As a temporary solution, select the \"Default Audio Device\" in the options provided by the application; please refer to the application's user manual for details. 
For example, to set the Default Audio Device in Windows Media Player: 
  1. Open Windows Media Player > Tools > Options > Devices.
  2. Select the device and choose Properties.
  3. On the next dialog, from the drop-down menu under Select the Audio Device, choose Default Audio Device from the list. 
You can then send audio from the application to the audio device you want in the per-application audio settings found under Settings > System > Sound > App Volume and device preferences.
Resolved: This issue was resolved in KB4490481

Back to top
OS Build 17763.348

March 01, 2019
KB4482887
Resolved
KB4490481
Resolved:
April 02, 2019
10:00 AM PT

Opened:
March 01, 2019
10:00 AM PT
Apps may stop working after selecting an audio output device other than the default
After installing KB4482887 on machines that have multiple audio devices, applications that provide advanced options for internal or external audio output devices may stop working unexpectedly. This issue occurs for users that select an audio output device different from the \"Default Audio Device\". Examples of applications that may stop working include: 
  • Windows Media Player 
  • Realtek HD Audio Manager 
  • Sound Blaster Control Panel 

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019
  • Server: Windows Server, version 1809; Windows Server 2019

Workaround: As a temporary solution, select the \"Default Audio Device\" in the options provided by the application; please refer to the application's user manual for details. 
For example, to set the Default Audio Device in Windows Media Player: 
  1. Open Windows Media Player > Tools > Options > Devices.
  2. Select the device and choose Properties.
  3. On the next dialog, from the drop-down menu under Select the Audio Device, choose Default Audio Device from the list. 
You can then send audio from the application to the audio device you want in the per-application audio settings found under Settings > System > Sound > App Volume and device preferences.

Resolved: This issue was resolved in KB4490481

Back to top
OS Build 17763.348

March 01, 2019
KB4482887
Resolved
KB4490481
Resolved:
April 02, 2019
10:00 AM PT

Opened:
March 01, 2019
10:00 AM PT
" @@ -87,10 +87,10 @@ sections: - type: markdown text: " - - - - + + + +
DetailsOriginating updateStatusHistory
Internet Explorer may fail to load images
After installing KB4487044, Internet Explorer may fail to load images with a backslash (\\) in their relative source path.
Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 8.1; Windows 7, Service Pack 1
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2; Windows Server 2008 R2 SP1
Resolution: This issue is resolved in KB4482887.

Back to top
OS Build 17763.316

February 12, 2019
KB4487044
Resolved
KB4482887
Resolved:
March 01, 2019
10:00 AM PT

Opened:
February 12, 2019
10:00 AM PT
Error 1309 when installing/uninstalling MSI or MSP files
After installing KB4487044, users may receive \"Error 1309\" while installing or uninstalling certain types of MSI and MSP files. 
Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 8.1
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2
Resolution: This issue is resolved in KB4489899

Back to top
OS Build 17763.316

February 12, 2019
KB4487044
Resolved
KB4489899
Resolved:
March 12, 2019
10:00 AM PT

Opened:
February 12, 2019
10:00 AM PT
Applications using Microsoft Jet database and Access 95 file format stop working
Applications that use a Microsoft Jet database with the Microsoft Access 95 file format may randomly stop working.
Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 7, Service Pack 1
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2008 R2 SP1
Resolution: This issue is resolved in KB4482887.

Back to top
OS Build 17763.316

February 12, 2019
KB4487044
Resolved
KB4482887
Resolved:
March 01, 2019
10:00 AM PT

Opened:
February 12, 2019
10:00 AM PT
First character of the Japanese era name not recognized
After installing KB4487044, the first character of the Japanese era name is not recognized as an abbreviation and may cause date parsing issues. 
Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 8.1; Windows 7, Service Pack 1
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2; Windows Server 2008 R2 SP1
Resolution: This issue is resolved in KB4482887

Back to top
OS Build 17763.316

February 12, 2019
KB4487044
Resolved
KB4482887
Resolved:
March 01, 2019
10:00 AM PT

Opened:
February 12, 2019
10:00 AM PT
Internet Explorer may fail to load images
After installing KB4487044, Internet Explorer may fail to load images with a backslash (\\) in their relative source path.

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 8.1; Windows 7, Service Pack 1
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2; Windows Server 2008 R2 SP1

Resolution: This issue is resolved in KB4482887.

Back to top
OS Build 17763.316

February 12, 2019
KB4487044
Resolved
KB4482887
Resolved:
March 01, 2019
10:00 AM PT

Opened:
February 12, 2019
10:00 AM PT
Error 1309 when installing/uninstalling MSI or MSP files
After installing KB4487044, users may receive \"Error 1309\" while installing or uninstalling certain types of MSI and MSP files. 

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 8.1
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2

Resolution: This issue is resolved in KB4489899

Back to top
OS Build 17763.316

February 12, 2019
KB4487044
Resolved
KB4489899
Resolved:
March 12, 2019
10:00 AM PT

Opened:
February 12, 2019
10:00 AM PT
Applications using Microsoft Jet database and Access 95 file format stop working
Applications that use a Microsoft Jet database with the Microsoft Access 95 file format may randomly stop working.

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 7, Service Pack 1
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2008 R2 SP1

Resolution: This issue is resolved in KB4482887.

Back to top
OS Build 17763.316

February 12, 2019
KB4487044
Resolved
KB4482887
Resolved:
March 01, 2019
10:00 AM PT

Opened:
February 12, 2019
10:00 AM PT
First character of the Japanese era name not recognized
After installing KB4487044, the first character of the Japanese era name is not recognized as an abbreviation and may cause date parsing issues. 

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 8.1; Windows 7, Service Pack 1
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2; Windows Server 2008 R2 SP1

Resolution: This issue is resolved in KB4482887

Back to top
OS Build 17763.316

February 12, 2019
KB4487044
Resolved
KB4482887
Resolved:
March 01, 2019
10:00 AM PT

Opened:
February 12, 2019
10:00 AM PT
" @@ -99,11 +99,11 @@ sections: - type: markdown text: " - - - - - + + + + +
DetailsOriginating updateStatusHistory
Internet Explorer 11 authentication issue with multiple concurrent logons
After installing the February 12, 2019 update (KB4487044), Internet Explorer 11 and other applications that use WININET.DLL may have authentication issues. This occurs when two or more people use the same user account for multiple, concurrent login sessions on the same Windows Server machine, including Remote Desktop Protocol (RDP) and Terminal Server logons. Symptoms reported by customers include, but may not be limited to:  
  • Cache size and location show zero or empty. 
  • Keyboard shortcuts may not work properly. 
  • Webpages may intermittently fail to load or render correctly. 
  • Issues with credential prompts. 
  • Issues when downloading files. 
Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10 Enterprise LTSC 2016; Windows 8.1; Windows 7, Service Pack 1
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server 2016; Windows Server 2012 R2; Windows Server 2008 R2 SP1
 
Resolved: This issue was resolved in KB4493509

Back to top
OS Build 17763.253

January 08, 2019
KB4480116
Resolved
KB4493509
Resolved:
April 09, 2019
10:00 AM PT

Opened:
January 08, 2019
10:00 AM PT
Global DNS outage affects Windows Update customers
Windows Update customers were affected by a network infrastructure event on January 29, 2019 (21:00 UTC), caused by an external DNS service provider's global outage. A software update to the external provider's DNS servers resulted in the distribution of corrupted DNS records that affected connectivity to the Windows Update service. The DNS records were restored by January 30, 2019 (00:10 UTC), and the majority of local Internet Service Providers (ISP) have refreshed their DNS servers and customer services have been restored. 
 
Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019
  • Server: Windows Server, version 1809; Windows Server 2019
While this was not an issue with Microsoft's services, we take any service disruption for our customers seriously. We will work with partners to better understand this so we can provide higher quality service in the future even across diverse global network providers. 
 
If you are still unable to connect to Windows Update services due to this problem, please contact your local ISP or network administrator. You can also refer to our new KB4493784 for more information to determine if your network is affected, and to provide your local ISP or network administrator with additional information to assist you. 

Back to top
N/A

Resolved
Resolved:
March 08, 2019
11:15 AM PT

Opened:
January 29, 2019
02:00 PM PT
MSXML6 may cause applications to stop responding
After installing KB4480116, MSXML6 causes applications to stop responding if an exception was thrown during node operations, such as appendChild(), insertBefore(), and moveNode().
 
The Group Policy editor may stop responding when editing a Group Policy Object (GPO) that contains Group Policy Preferences (GPP) for Internet Explorer 10 settings. 
Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 8.1
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2
Resolved: This issue was resolved in KB4493509

Back to top
OS Build 17763.253

January 08, 2019
KB4480116
Resolved
KB4493509
Resolved:
April 09, 2019
10:00 AM PT

Opened:
January 08, 2019
10:00 AM PT
Webpages become unresponsive in Microsoft Edge
After installing KB4480116, some Microsoft Edge users report that they:
  • Cannot load webpages using a local IP address. 
  • Cannot load webpages on the Internet using a VPN connection.
Browsing fails or the webpage may become unresponsive.
Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709
Resolution: This issue is resolved in KB4487044

Back to top
OS Build 17763.253

January 08, 2019
KB4480116
Resolved
KB4487044
Resolved:
February 12, 2019
10:00 AM PT

Opened:
January 08, 2019
10:00 AM PT
Unable to access hotspots with third-party applications
After installing KB4480116, third-party applications may have difficulty authenticating hotspots. 
Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 8.1
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2
Resolution: This issue is resolved in KB4476976

Back to top
OS Build 17763.253

January 08, 2019
KB4480116
Resolved
KB4476976
Resolved:
January 22, 2019
02:00 PM PT

Opened:
January 08, 2019
10:00 AM PT
Internet Explorer 11 authentication issue with multiple concurrent logons
After installing the February 12, 2019 update (KB4487044), Internet Explorer 11 and other applications that use WININET.DLL may have authentication issues. This occurs when two or more people use the same user account for multiple, concurrent login sessions on the same Windows Server machine, including Remote Desktop Protocol (RDP) and Terminal Server logons. Symptoms reported by customers include, but may not be limited to:  
  • Cache size and location show zero or empty. 
  • Keyboard shortcuts may not work properly. 
  • Webpages may intermittently fail to load or render correctly. 
  • Issues with credential prompts. 
  • Issues when downloading files. 

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10 Enterprise LTSC 2016; Windows 8.1; Windows 7, Service Pack 1
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server 2016; Windows Server 2012 R2; Windows Server 2008 R2 SP1
 
Resolved: This issue was resolved in KB4493509

Back to top
OS Build 17763.253

January 08, 2019
KB4480116
Resolved
KB4493509
Resolved:
April 09, 2019
10:00 AM PT

Opened:
January 08, 2019
10:00 AM PT
Global DNS outage affects Windows Update customers
Windows Update customers were affected by a network infrastructure event on January 29, 2019 (21:00 UTC), caused by an external DNS service provider's global outage. A software update to the external provider's DNS servers resulted in the distribution of corrupted DNS records that affected connectivity to the Windows Update service. The DNS records were restored by January 30, 2019 (00:10 UTC), and the majority of local Internet Service Providers (ISP) have refreshed their DNS servers and customer services have been restored. 
 
Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019
  • Server: Windows Server, version 1809; Windows Server 2019

While this was not an issue with Microsoft's services, we take any service disruption for our customers seriously. We will work with partners to better understand this so we can provide higher quality service in the future even across diverse global network providers. 
 
If you are still unable to connect to Windows Update services due to this problem, please contact your local ISP or network administrator. You can also refer to our new KB4493784 for more information to determine if your network is affected, and to provide your local ISP or network administrator with additional information to assist you. 

Back to top
N/A

Resolved
Resolved:
March 08, 2019
11:15 AM PT

Opened:
January 29, 2019
02:00 PM PT
MSXML6 may cause applications to stop responding
After installing KB4480116, MSXML6 causes applications to stop responding if an exception was thrown during node operations, such as appendChild(), insertBefore(), and moveNode().
 
The Group Policy editor may stop responding when editing a Group Policy Object (GPO) that contains Group Policy Preferences (GPP) for Internet Explorer 10 settings. 

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 8.1
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2

Resolved: This issue was resolved in KB4493509

Back to top
OS Build 17763.253

January 08, 2019
KB4480116
Resolved
KB4493509
Resolved:
April 09, 2019
10:00 AM PT

Opened:
January 08, 2019
10:00 AM PT
Webpages become unresponsive in Microsoft Edge
After installing KB4480116, some Microsoft Edge users report that they:
  • Cannot load webpages using a local IP address. 
  • Cannot load webpages on the Internet using a VPN connection.
Browsing fails or the webpage may become unresponsive.

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709

Resolution: This issue is resolved in KB4487044

Back to top
OS Build 17763.253

January 08, 2019
KB4480116
Resolved
KB4487044
Resolved:
February 12, 2019
10:00 AM PT

Opened:
January 08, 2019
10:00 AM PT
Unable to access hotspots with third-party applications
After installing KB4480116, third-party applications may have difficulty authenticating hotspots. 

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 8.1
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2

Resolution: This issue is resolved in KB4476976

Back to top
OS Build 17763.253

January 08, 2019
KB4480116
Resolved
KB4476976
Resolved:
January 22, 2019
02:00 PM PT

Opened:
January 08, 2019
10:00 AM PT
" @@ -112,7 +112,7 @@ sections: - type: markdown text: " - +
DetailsOriginating updateStatusHistory
Microsoft Edge may crash or hang while playing video
nVidia has notified Microsoft of an issue where Microsoft Edge may crash or hang while playing video. This issue occurs following an nVidia driver update.
Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019
  • Server: Windows Server, version 1809; Windows Server 2019
Resolution: nVidia has released an updated driver to address this issue. Please follow the instructions found in nVidia's support article

Back to top
OS Build 17763.165

December 05, 2018
KB4469342
Resolved
Resolved:
November 29, 2018
10:03 AM PT

Opened:
December 05, 2018
02:00 PM PT
Microsoft Edge may crash or hang while playing video
nVidia has notified Microsoft of an issue where Microsoft Edge may crash or hang while playing video. This issue occurs following an nVidia driver update.

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019
  • Server: Windows Server, version 1809; Windows Server 2019

Resolution: nVidia has released an updated driver to address this issue. Please follow the instructions found in nVidia's support article

Back to top
OS Build 17763.165

December 05, 2018
KB4469342
Resolved
Resolved:
November 29, 2018
10:03 AM PT

Opened:
December 05, 2018
02:00 PM PT
" @@ -121,14 +121,14 @@ sections: - type: markdown text: " - - - - - - - - + + + + + + + +
DetailsOriginating updateStatusHistory
Audio stops working after installing Intel audio driver
Upgrade block: Intel unintentionally released version 9.21.00.3755 of the Intel Smart Sound Technology (ISST) Driver through Windows Update and inadvertently offered it to a range of devices running Window 10, version 1709, 1803, and 1809. If a device contained a compatible audio driver, the new driver overrode it and caused audio to stop working.
Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019
  • Server: Windows Server, version 1809; Windows Server 2019
 
Resolution: This issue was resolved in KB4468550 and the upgrade block removed. 

Back to top
OS Build 17763.134

November 13, 2018
KB4467708
Resolved
KB4468550
Resolved:
December 07, 2018
10:00 AM PT

Opened:
November 13, 2018
10:00 AM PT
Mapped drives fail to reconnect after login
Upgrade block: Network drives may fail to reconnect after booting and logging on to a Windows device. Symptoms include:  
  • In Windows Explorer, a red X appears on the mapped network drives. 
  • Mapped network drives show as Unavailable when you run the net use command from a command prompt. 
  • In the notification area, a notification displays the following message, \"Could not reconnect all network drives.\"
Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019
  • Server: Windows Server, version 1809; Windows Server 2019
Resolution: This issue was resolved in KB4469342 and the upgrade block removed. 

Back to top
OS Build 17763.134

November 13, 2018
KB4467708
Resolved
KB4469342
Resolved:
December 05, 2018
02:00 PM PT

Opened:
November 13, 2018
10:00 AM PT
Shared albums may not sync with iCloud for Windows
Upgrade block: Users who attempt to install iCloud for Windows (version 7.7.0.27) will see a message displayed that this version iCloud for Windows isn't supported and the install will fail.
Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019
  • Server: Windows Server, version 1809; Windows Server 2019
To ensure a seamless experience, Microsoft is blocking devices with iCloud for Windows (version 7.7.0.27) software installed from being offered Window 10, version 1809 until this issue has been resolved. 
We recommend that you do not attempt to manually update using the Update now button or the Media Creation Tool from the Microsoft software download website until this issue is resolved. 
 
Resolution: Apple has released an updated version of iCloud for Windows (version 7.8.1) that resolves compatibility issues encountered when updating or synching Shared Albums after updating to Windows 10, version 1809. We recommend that you update your iCloud for Windows to version 7.8.1 when prompted before attempting to upgrade to Windows 10, version 1809. You can also manually download the latest version of iCloud for Windows by visiting https://support.apple.com/en-us/HT204283.

Back to top
OS Build 17763.134

November 13, 2018
KB4467708
Resolved
KB4482887
Resolved:
March 01, 2019
10:00 AM PT

Opened:
November 13, 2018
10:00 AM PT
Intel Audio Display (intcdaud.sys) notification during Windows 10 Setup
Upgrade block: Microsoft and Intel have identified a compatibility issue with a range of Intel Display Audio device drivers (intcdaud.sys, versions 10.25.0.3 - 10.25.0.8) that may result in excessive processor demand and reduced battery life. As a result, the update process to the Windows 10 October 2018 Update (Windows 10, version 1809) will fail and affected devices will automatically revert to the previous working configuration. 
Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019
  • Server: Windows Server, version 1809; Windows Server 2019
If you see a \"What needs your attention\" notification during installation of the October 2018 Update, you have one of these affected drivers on your system. On the notification, click Back to remain on your current version of Windows 10. 
 
To ensure a seamless experience, we are blocking devices from being offered the October 2018 Update until updated Intel device drivers are installed on your current operating system. We recommend that you do not attempt to manually update to Windows 10, version 1809, using the Update Now button or the Media Creation Tool from the Microsoft Software Download Center until newer Intel device drivers are available with the update. You can either wait for newer drivers to be installed automatically through Windows Update or check with your computer manufacturer for the latest device driver software availability and installation procedures. For more information about this issue, see Intel's customer support guidance.
 
Resolution: This issue was resolved in KB4482887 and the upgrade block removed. 

Back to top
OS Build 17763.134

November 13, 2018
KB4467708
Resolved
KB4482887
Resolved:
March 01, 2019
10:00 AM PT

Opened:
November 13, 2018
10:00 AM PT
Office apps (32-bit) unable to use 'Save As…' function
Upgrade block: Microsoft and Morphisec have identified an issue on devices that have installed Morphisec Protector or another application that uses the Morphisec Software Development Kit (SDK) including Cisco AMP for Endpoints. These applications may impact customers' ability to use the 'Save As.'dialog when saving documents in 32-bit versions of Microsoft Office applications. Saving of files is not impacted.
Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019
  • Server: Windows Server, version 1809; Windows Server 2019
Resolution: Morphisec and Cisco have released updated versions of their applications to address this issue. We recommend customers update to these minimum versions before attempting to attempting to upgrade to Windows 10, version 1809:
  • Morphisec Protector version 2.4.8 
  • Cisco AMP for Endpoints version 6.2.3.10814
An upgrade block remains in place for earlier versions of the applications than those listed above.

Back to top
OS Build 17763.134

November 13, 2018
KB4467708
Resolved
Resolved:
December 06, 2018
12:00 PM PT

Opened:
November 13, 2018
10:00 AM PT
Trend Micro OfficeScan and Worry-Free Business Security AV software not compatible
Upgrade block: Microsoft and Trend Micro have identified a compatibility issue with Trend Micro's OfficeScan and Worry-Free Business Security software when attempting to update to Windows 10, version 1809.
Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019
  • Server: Windows Server, version 1809; Windows Server 2019 
Resolution: Trend Micro has released a new version of these products that resolves the issue. To download them, please visit the Trend Micro Business Support Portal.
Once you have updated your version of Trend Micro's OfficeScan or Worry-Free Business Security software, you will be offered Windows 10, version 1809 automatically. 

Back to top
OS Build 17763.134

November 13, 2018
KB4467708
Resolved
Resolved:
February 01, 2019
09:00 AM PT

Opened:
November 13, 2018
10:00 AM PT
Issues with lock screen and Microsoft Edge tabs for certain AMD Radeon video cards
Note: AMD no longer supports Radeon HD2000 and HD4000 series graphic processor units (GPUs).
 
Upgrade block: After updating to Window 10, version 1809, Microsoft Edge tabs may stop working when a device is configured with AMD Radeon HD2000 or HD4000 series video cards. Customers may get the following error code: \"INVALID_POINTER_READ_c0000005_atidxx64.dll\". 
 
Some users may also experience performance issues with the lock screen or the ShellExperienceHost. (The lock screen hosts widgets, and the ShellExperienceHost is responsible for assorted shell functionality.) 
Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019
  • Server: Windows Server, version 1809; Windows Server 2019
Resolution: This issue was resolved in KB4487044, and the block was removed.

Back to top
OS Build 17763.134

November 13, 2018
KB4467708
Resolved
KB4487044
Resolved:
February 12, 2019
10:00 AM PT

Opened:
November 13, 2018
10:00 AM PT
F5 VPN clients losing network connectivity
Upgrade block: After updating to Window 10, version 1809, F5 VPN clients may lose network connectivity when the VPN service is in a split tunnel configuration.
Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019
  • Server: Windows Server, version 1809; Windows Server 2019
Resolution: This issue was resolved in KB4482887 and the upgrade block removed. 

Back to top
OS Build 17763.134

November 13, 2018
KB4467708
Resolved
KB4482887
Resolved:
March 01, 2019
10:00 AM PT

Opened:
November 13, 2018
10:00 AM PT
Audio stops working after installing Intel audio driver
Upgrade block: Intel unintentionally released version 9.21.00.3755 of the Intel Smart Sound Technology (ISST) Driver through Windows Update and inadvertently offered it to a range of devices running Window 10, version 1709, 1803, and 1809. If a device contained a compatible audio driver, the new driver overrode it and caused audio to stop working.

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019
  • Server: Windows Server, version 1809; Windows Server 2019
 
Resolution: This issue was resolved in KB4468550 and the upgrade block removed. 

Back to top
OS Build 17763.134

November 13, 2018
KB4467708
Resolved
KB4468550
Resolved:
December 07, 2018
10:00 AM PT

Opened:
November 13, 2018
10:00 AM PT
Mapped drives fail to reconnect after login
Upgrade block: Network drives may fail to reconnect after booting and logging on to a Windows device. Symptoms include:  
  • In Windows Explorer, a red X appears on the mapped network drives. 
  • Mapped network drives show as Unavailable when you run the net use command from a command prompt. 
  • In the notification area, a notification displays the following message, \"Could not reconnect all network drives.\"

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019
  • Server: Windows Server, version 1809; Windows Server 2019

Resolution: This issue was resolved in KB4469342 and the upgrade block removed. 

Back to top
OS Build 17763.134

November 13, 2018
KB4467708
Resolved
KB4469342
Resolved:
December 05, 2018
02:00 PM PT

Opened:
November 13, 2018
10:00 AM PT
Shared albums may not sync with iCloud for Windows
Upgrade block: Users who attempt to install iCloud for Windows (version 7.7.0.27) will see a message displayed that this version iCloud for Windows isn't supported and the install will fail.

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019
  • Server: Windows Server, version 1809; Windows Server 2019

To ensure a seamless experience, Microsoft is blocking devices with iCloud for Windows (version 7.7.0.27) software installed from being offered Window 10, version 1809 until this issue has been resolved. 

We recommend that you do not attempt to manually update using the Update now button or the Media Creation Tool from the Microsoft software download website until this issue is resolved. 
 
Resolution: Apple has released an updated version of iCloud for Windows (version 7.8.1) that resolves compatibility issues encountered when updating or synching Shared Albums after updating to Windows 10, version 1809. We recommend that you update your iCloud for Windows to version 7.8.1 when prompted before attempting to upgrade to Windows 10, version 1809. You can also manually download the latest version of iCloud for Windows by visiting https://support.apple.com/en-us/HT204283.

Back to top
OS Build 17763.134

November 13, 2018
KB4467708
Resolved
KB4482887
Resolved:
March 01, 2019
10:00 AM PT

Opened:
November 13, 2018
10:00 AM PT
Intel Audio Display (intcdaud.sys) notification during Windows 10 Setup
Upgrade block: Microsoft and Intel have identified a compatibility issue with a range of Intel Display Audio device drivers (intcdaud.sys, versions 10.25.0.3 - 10.25.0.8) that may result in excessive processor demand and reduced battery life. As a result, the update process to the Windows 10 October 2018 Update (Windows 10, version 1809) will fail and affected devices will automatically revert to the previous working configuration. 

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019
  • Server: Windows Server, version 1809; Windows Server 2019

If you see a \"What needs your attention\" notification during installation of the October 2018 Update, you have one of these affected drivers on your system. On the notification, click Back to remain on your current version of Windows 10. 
 
To ensure a seamless experience, we are blocking devices from being offered the October 2018 Update until updated Intel device drivers are installed on your current operating system. We recommend that you do not attempt to manually update to Windows 10, version 1809, using the Update Now button or the Media Creation Tool from the Microsoft Software Download Center until newer Intel device drivers are available with the update. You can either wait for newer drivers to be installed automatically through Windows Update or check with your computer manufacturer for the latest device driver software availability and installation procedures. For more information about this issue, see Intel's customer support guidance.
 
Resolution: This issue was resolved in KB4482887 and the upgrade block removed. 

Back to top
OS Build 17763.134

November 13, 2018
KB4467708
Resolved
KB4482887
Resolved:
March 01, 2019
10:00 AM PT

Opened:
November 13, 2018
10:00 AM PT
Office apps (32-bit) unable to use 'Save As…' function
Upgrade block: Microsoft and Morphisec have identified an issue on devices that have installed Morphisec Protector or another application that uses the Morphisec Software Development Kit (SDK) including Cisco AMP for Endpoints. These applications may impact customers' ability to use the 'Save As.'dialog when saving documents in 32-bit versions of Microsoft Office applications. Saving of files is not impacted.

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019
  • Server: Windows Server, version 1809; Windows Server 2019

Resolution: Morphisec and Cisco have released updated versions of their applications to address this issue. We recommend customers update to these minimum versions before attempting to attempting to upgrade to Windows 10, version 1809:
  • Morphisec Protector version 2.4.8 
  • Cisco AMP for Endpoints version 6.2.3.10814

An upgrade block remains in place for earlier versions of the applications than those listed above.

Back to top
OS Build 17763.134

November 13, 2018
KB4467708
Resolved
Resolved:
December 06, 2018
12:00 PM PT

Opened:
November 13, 2018
10:00 AM PT
Trend Micro OfficeScan and Worry-Free Business Security AV software not compatible
Upgrade block: Microsoft and Trend Micro have identified a compatibility issue with Trend Micro's OfficeScan and Worry-Free Business Security software when attempting to update to Windows 10, version 1809.

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019
  • Server: Windows Server, version 1809; Windows Server 2019 

Resolution: Trend Micro has released a new version of these products that resolves the issue. To download them, please visit the Trend Micro Business Support Portal.

Once you have updated your version of Trend Micro's OfficeScan or Worry-Free Business Security software, you will be offered Windows 10, version 1809 automatically. 

Back to top
OS Build 17763.134

November 13, 2018
KB4467708
Resolved
Resolved:
February 01, 2019
09:00 AM PT

Opened:
November 13, 2018
10:00 AM PT
Issues with lock screen and Microsoft Edge tabs for certain AMD Radeon video cards
Note: AMD no longer supports Radeon HD2000 and HD4000 series graphic processor units (GPUs).
 
Upgrade block: After updating to Window 10, version 1809, Microsoft Edge tabs may stop working when a device is configured with AMD Radeon HD2000 or HD4000 series video cards. Customers may get the following error code: \"INVALID_POINTER_READ_c0000005_atidxx64.dll\". 
 
Some users may also experience performance issues with the lock screen or the ShellExperienceHost. (The lock screen hosts widgets, and the ShellExperienceHost is responsible for assorted shell functionality.) 

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019
  • Server: Windows Server, version 1809; Windows Server 2019

Resolution: This issue was resolved in KB4487044, and the block was removed.

Back to top
OS Build 17763.134

November 13, 2018
KB4467708
Resolved
KB4487044
Resolved:
February 12, 2019
10:00 AM PT

Opened:
November 13, 2018
10:00 AM PT
F5 VPN clients losing network connectivity
Upgrade block: After updating to Window 10, version 1809, F5 VPN clients may lose network connectivity when the VPN service is in a split tunnel configuration.

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019
  • Server: Windows Server, version 1809; Windows Server 2019

Resolution: This issue was resolved in KB4482887 and the upgrade block removed. 

Back to top
OS Build 17763.134

November 13, 2018
KB4467708
Resolved
KB4482887
Resolved:
March 01, 2019
10:00 AM PT

Opened:
November 13, 2018
10:00 AM PT
" @@ -137,7 +137,7 @@ sections: - type: markdown text: " - - + +
DetailsOriginating updateStatusHistory
Users cannot set Win32 program defaults
After installing KB4464330, some users cannot set Win32 program defaults for certain app and file type combinations using the Open with... command or Settings > Apps > Default apps.
 
In some cases, Microsoft Notepad or other Win32 programs cannot be set as the default. 
Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803
Resolution: This issue is resolved in KB4469342

Back to top
OS Build 17763.55

October 09, 2018
KB4464330
Resolved
KB4469342
Resolved:
December 05, 2018
02:00 PM PT

Opened:
October 09, 2018
10:00 AM PT
Unable to use Seek bar in Windows Media Player
After installing KB4464330, users may not be able to use the Seek bar in Windows Media Player when playing specific files. This issue does not affect normal playback. 
Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 8.1; Windows 7, Service Pack 1
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2; Windows Server 2008 R2 SP1
Resolution: This issue is resolved in KB4471332

Back to top
OS Build 17763.55

October 09, 2018
KB4464330
Resolved
KB4471332
Resolved:
December 11, 2018
10:00 AM PT

Opened:
October 09, 2018
10:00 AM PT
Users cannot set Win32 program defaults
After installing KB4464330, some users cannot set Win32 program defaults for certain app and file type combinations using the Open with... command or Settings > Apps > Default apps.
 
In some cases, Microsoft Notepad or other Win32 programs cannot be set as the default. 

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803

Resolution: This issue is resolved in KB4469342

Back to top
OS Build 17763.55

October 09, 2018
KB4464330
Resolved
KB4469342
Resolved:
December 05, 2018
02:00 PM PT

Opened:
October 09, 2018
10:00 AM PT
Unable to use Seek bar in Windows Media Player
After installing KB4464330, users may not be able to use the Seek bar in Windows Media Player when playing specific files. This issue does not affect normal playback. 

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 8.1; Windows 7, Service Pack 1
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2; Windows Server 2008 R2 SP1

Resolution: This issue is resolved in KB4471332

Back to top
OS Build 17763.55

October 09, 2018
KB4464330
Resolved
KB4471332
Resolved:
December 11, 2018
10:00 AM PT

Opened:
October 09, 2018
10:00 AM PT
" diff --git a/windows/release-information/resolved-issues-windows-7-and-windows-server-2008-r2-sp1.yml b/windows/release-information/resolved-issues-windows-7-and-windows-server-2008-r2-sp1.yml index 3098e31877..8ec9481208 100644 --- a/windows/release-information/resolved-issues-windows-7-and-windows-server-2008-r2-sp1.yml +++ b/windows/release-information/resolved-issues-windows-7-and-windows-server-2008-r2-sp1.yml @@ -59,7 +59,7 @@ sections: - type: markdown text: " - +
DetailsOriginating updateStatusHistory
Devices may not respond at login or Welcome screen if running certain Avast software.
Microsoft and Avast have identified an issue on devices running Avast for Business, Avast CloudCare, and AVG Business Edition antivirus software after you install KB4493472 and restart. Devices may become unresponsive at the login or Welcome screen. Additionally, you may be unable to log in or log in after an extended period of time.
Affected platforms: 
  • Client: Windows 8.1; Windows 7, Service Pack 1 
  • Server: Windows Server 2012 R2; Windows Server 2008 R2 SP1 
Resolution: Avast has released emergency updates to address this issue. For more information and AV update schedule, see the Avast support KB article.

Back to top
April 09, 2019
KB4493472
Resolved
Resolved:
April 09, 2019
10:00 AM PT

Opened:
April 09, 2019
10:00 AM PT
Devices may not respond at login or Welcome screen if running certain Avast software.
Microsoft and Avast have identified an issue on devices running Avast for Business, Avast CloudCare, and AVG Business Edition antivirus software after you install KB4493472 and restart. Devices may become unresponsive at the login or Welcome screen. Additionally, you may be unable to log in or log in after an extended period of time.

Affected platforms: 
  • Client: Windows 8.1; Windows 7, Service Pack 1 
  • Server: Windows Server 2012 R2; Windows Server 2008 R2 SP1 

Resolution: Avast has released emergency updates to address this issue. For more information and AV update schedule, see the Avast support KB article.

Back to top
April 09, 2019
KB4493472
Resolved
Resolved:
April 09, 2019
10:00 AM PT

Opened:
April 09, 2019
10:00 AM PT
" @@ -68,8 +68,8 @@ sections: - type: markdown text: " - - + +
DetailsOriginating updateStatusHistory
Custom URI schemes may not start corresponding application.
After installing KB4489878, custom URI schemes for application protocol handlers may not start the corresponding application for local intranet and trusted sites on Internet Explorer.
Affected platforms: 
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 8.1; Windows 7, Service Pack 1 
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2; Windows Server 2008 R2 SP1 
Resolution: This issue is resolved in KB4493472.

Back to top
March 12, 2019
KB4489878
Resolved
KB4493472
Resolved:
April 09, 2019
10:00 AM PT

Opened:
March 12, 2019
10:00 AM PT
NETDOM.EXE fails to run.
After installing KB4489878, NETDOM.EXE fails to run, and the on-screen error, “The command failed to complete successfully.” appears.
Affected platforms: 
  • Client: Windows 7, Service Pack 1 
  • Server: Windows Server 2008 R2 SP1 
Resolution: This issue is resolved in KB4493472.

Back to top
March 12, 2019
KB4489878
Resolved
KB4493472
Resolved:
April 09, 2019
10:00 AM PT

Opened:
March 12, 2019
10:00 AM PT
Custom URI schemes may not start corresponding application.
After installing KB4489878, custom URI schemes for application protocol handlers may not start the corresponding application for local intranet and trusted sites on Internet Explorer.

Affected platforms: 
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 8.1; Windows 7, Service Pack 1 
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2; Windows Server 2008 R2 SP1 

Resolution: This issue is resolved in KB4493472.

Back to top
March 12, 2019
KB4489878
Resolved
KB4493472
Resolved:
April 09, 2019
10:00 AM PT

Opened:
March 12, 2019
10:00 AM PT
NETDOM.EXE fails to run.
After installing KB4489878, NETDOM.EXE fails to run, and the on-screen error, “The command failed to complete successfully.” appears.

Affected platforms: 
  • Client: Windows 7, Service Pack 1 
  • Server: Windows Server 2008 R2 SP1 

Resolution: This issue is resolved in KB4493472.

Back to top
March 12, 2019
KB4489878
Resolved
KB4493472
Resolved:
April 09, 2019
10:00 AM PT

Opened:
March 12, 2019
10:00 AM PT
" @@ -78,8 +78,8 @@ sections: - type: markdown text: " - - + +
DetailsOriginating updateStatusHistory
Internet Explorer may fail to load images.
After installing KB4486563, Internet Explorer may fail to load images with a backslash (\\) in their relative source path.
Affected platforms: 
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 8.1; Windows 7, Service Pack 1 
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2; Windows Server 2008 R2 SP1 
Resolution: This issue is resolved in KB4486565.

Back to top
February 12, 2019
KB4486563
Resolved
KB4486565
Resolved:
February 19, 2019
02:00 PM PT

Opened:
February 12, 2019
10:00 AM PT
Applications using Microsoft Jet database and Access 95 file format stop working.
Applications that use a Microsoft Jet database with the Microsoft Access 95 file format may randomly stop working.
Affected platforms: 
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 7, Service Pack 1 
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2008 R2 SP1 
Resolution: This issue is resolved in KB4486565.

Back to top
February 12, 2019
KB4486563
Resolved
KB4486565
Resolved:
February 19, 2019
02:00 PM PT

Opened:
February 12, 2019
10:00 AM PT
Internet Explorer may fail to load images.
After installing KB4486563, Internet Explorer may fail to load images with a backslash (\\) in their relative source path.

Affected platforms: 
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 8.1; Windows 7, Service Pack 1 
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2; Windows Server 2008 R2 SP1 

Resolution: This issue is resolved in KB4486565.

Back to top
February 12, 2019
KB4486563
Resolved
KB4486565
Resolved:
February 19, 2019
02:00 PM PT

Opened:
February 12, 2019
10:00 AM PT
Applications using Microsoft Jet database and Access 95 file format stop working.
Applications that use a Microsoft Jet database with the Microsoft Access 95 file format may randomly stop working.

Affected platforms: 
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 7, Service Pack 1 
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2008 R2 SP1 

Resolution: This issue is resolved in KB4486565.

Back to top
February 12, 2019
KB4486563
Resolved
KB4486565
Resolved:
February 19, 2019
02:00 PM PT

Opened:
February 12, 2019
10:00 AM PT
" @@ -88,11 +88,11 @@ sections: - type: markdown text: " - - - - - + + + + +
DetailsOriginating updateStatusHistory
Local Administrators unable to remotely access shares.
Local users who are part of the local Administrators group may not be able to remotely access shares on Windows Server 2008 R2 and Windows 7 machines after installing KB4480970. This does not affect domain accounts in the local Administrators group.
 
Affected platforms: 
  • Client: Windows 7, Service Pack 1 
  • Server: Windows Server 2008 R2 SP1 
Resolution: This issue is resolved in KB4487345.

Back to top
January 08, 2019
KB4480970
Resolved
KB4487345
Resolved:
January 11, 2019
02:00 PM PT

Opened:
January 08, 2019
10:00 AM PT
Applications using Microsoft Jet database fail to open.
Applications that use a Microsoft Jet database with the Microsoft Access 97 file format may fail to open if the database has column names greater than 32 characters. The database will fail to open with the error, “Unrecognized Database Format”.
Affected Platforms:
  • Client: Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 8.1; Windows 7, Service Pack 1 
  • Server: Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2; Windows Server 2008 R2 SP1 
Resolution: This issue is resolved in KB4486563.

Back to top
January 08, 2019
KB4480970
Resolved
KB4486563
Resolved:
February 12, 2019
10:00 AM PT

Opened:
January 08, 2019
10:00 AM PT
Virtual machines fail to restore.
After installing KB4480970, virtual machines (VM) may fail to restore successfully if the VM has been saved and restored once before. The error message is, “Failed to restore the virtual machine state: Cannot restore this virtual machine because the saved state data cannot be read. Delete the saved state data and then try to start the virtual machine. (0xC0370027).”
This affects AMD Bulldozer Family 15h, AMD Jaguar Family 16h, and AMD Puma Family 16h (second generation) microarchitectures.
Affected platforms: 
  • Client: Windows 7, Service Pack 1 
  • Server: Windows Server 2008 R2 SP1 
Resolution: This issue is resolved in KB4490511.

Back to top
January 08, 2019
KB4480970
Resolved
KB4490511
Resolved:
February 19, 2019
02:00 PM PT

Opened:
January 08, 2019
10:00 AM PT
Internet Explorer 11 authentication issue with multiple concurrent logons.
After installing KB4480970, Internet Explorer 11 and other applications that use WININET.DLL may have authentication issues. This occurs when two or more people use the same user account for multiple, concurrent login sessions on the same Windows Server machine, including Remote Desktop Protocol (RDP) and Terminal Server logons. Symptoms reported by customers include, but may not be limited to:
  • Cache size and location show zero or empty.
  • Keyboard shortcuts may not work properly.
  • Webpages may intermittently fail to load or render correctly.
  • Issues with credential prompts.
  • Issues when downloading files.
Affected platforms: 
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10 Enterprise LTSC 2016; Windows 8.1; Windows 7, Service Pack 1 
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server 2016; Windows Server 2012 R2; Windows Server 2008 R2 SP1 
Resolution: This issue is resolved in KB4493472.

Back to top
January 08, 2019
KB4480970
Resolved
KB4493472
Resolved:
April 09, 2019
10:00 AM PT

Opened:
January 08, 2019
10:00 AM PT
First character of the Japanese era name not recognized as an abbreviation.
After installing KB4480955, the first character of the Japanese era name is not recognized as an abbreviation and may cause date parsing issues.
Affected platforms: 
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 8.1; Windows 7, Service Pack 1 
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2; Windows Server 2008 R2 SP1 
Resolution: This issue is resolved in KB4486565.

Back to top
January 17, 2019
KB4480955
Resolved
KB4486565
Resolved:
February 19, 2019
02:00 PM PT

Opened:
January 17, 2019
10:00 AM PT
Local Administrators unable to remotely access shares.
Local users who are part of the local Administrators group may not be able to remotely access shares on Windows Server 2008 R2 and Windows 7 machines after installing KB4480970. This does not affect domain accounts in the local Administrators group.
 
Affected platforms: 
  • Client: Windows 7, Service Pack 1 
  • Server: Windows Server 2008 R2 SP1 

Resolution: This issue is resolved in KB4487345.

Back to top
January 08, 2019
KB4480970
Resolved
KB4487345
Resolved:
January 11, 2019
02:00 PM PT

Opened:
January 08, 2019
10:00 AM PT
Applications using Microsoft Jet database fail to open.
Applications that use a Microsoft Jet database with the Microsoft Access 97 file format may fail to open if the database has column names greater than 32 characters. The database will fail to open with the error, “Unrecognized Database Format”.

Affected Platforms:
  • Client: Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 8.1; Windows 7, Service Pack 1 
  • Server: Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2; Windows Server 2008 R2 SP1 


Resolution: This issue is resolved in KB4486563.

Back to top
January 08, 2019
KB4480970
Resolved
KB4486563
Resolved:
February 12, 2019
10:00 AM PT

Opened:
January 08, 2019
10:00 AM PT
Virtual machines fail to restore.
After installing KB4480970, virtual machines (VM) may fail to restore successfully if the VM has been saved and restored once before. The error message is, “Failed to restore the virtual machine state: Cannot restore this virtual machine because the saved state data cannot be read. Delete the saved state data and then try to start the virtual machine. (0xC0370027).”

This affects AMD Bulldozer Family 15h, AMD Jaguar Family 16h, and AMD Puma Family 16h (second generation) microarchitectures.

Affected platforms: 
  • Client: Windows 7, Service Pack 1 
  • Server: Windows Server 2008 R2 SP1 

Resolution: This issue is resolved in KB4490511.

Back to top
January 08, 2019
KB4480970
Resolved
KB4490511
Resolved:
February 19, 2019
02:00 PM PT

Opened:
January 08, 2019
10:00 AM PT
Internet Explorer 11 authentication issue with multiple concurrent logons.
After installing KB4480970, Internet Explorer 11 and other applications that use WININET.DLL may have authentication issues. This occurs when two or more people use the same user account for multiple, concurrent login sessions on the same Windows Server machine, including Remote Desktop Protocol (RDP) and Terminal Server logons. Symptoms reported by customers include, but may not be limited to:
  • Cache size and location show zero or empty.
  • Keyboard shortcuts may not work properly.
  • Webpages may intermittently fail to load or render correctly.
  • Issues with credential prompts.
  • Issues when downloading files.

Affected platforms: 
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10 Enterprise LTSC 2016; Windows 8.1; Windows 7, Service Pack 1 
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server 2016; Windows Server 2012 R2; Windows Server 2008 R2 SP1 

Resolution: This issue is resolved in KB4493472.

Back to top
January 08, 2019
KB4480970
Resolved
KB4493472
Resolved:
April 09, 2019
10:00 AM PT

Opened:
January 08, 2019
10:00 AM PT
First character of the Japanese era name not recognized as an abbreviation.
After installing KB4480955, the first character of the Japanese era name is not recognized as an abbreviation and may cause date parsing issues.

Affected platforms: 
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 8.1; Windows 7, Service Pack 1 
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2; Windows Server 2008 R2 SP1 

Resolution: This issue is resolved in KB4486565.

Back to top
January 17, 2019
KB4480955
Resolved
KB4486565
Resolved:
February 19, 2019
02:00 PM PT

Opened:
January 17, 2019
10:00 AM PT
" @@ -101,7 +101,7 @@ sections: - type: markdown text: " - - + +
DetailsOriginating updateStatusHistory
Unable to use Seek bar in Windows Media Player
After installing KB4462923, users may not be able to use the Seek Bar in Windows Media Player when playing specific files. This issue does not affect normal playback.
Affected platforms: 
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 8.1; Windows 7, Service Pack 1.
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2; Windows Server 2008 R2 SP1
Resolution: This issue is resolved in KB4471318.

Back to top
October 09, 2018
KB4462923
Resolved
KB4471318
Resolved:
December 11, 2018
10:00 AM PT

Opened:
October 09, 2018
10:00 AM PT
Event Viewer may not show some event descriptions for network interface cards.
After installing KB4462927, the Event Viewer may not show some event descriptions for network interface cards (NICs).
Affected Platforms:
  • Client: Windows 7, Service Pack 1 
  • Server: Windows Server 2008 R2 SP1 
Resolution: This issue is resolved in KB4489878.

Back to top
October 18, 2018
KB4462927
Resolved
KB4489878
Resolved:
March 12, 2019
10:00 AM PT

Opened:
October 18, 2018
10:00 AM PT
Unable to use Seek bar in Windows Media Player
After installing KB4462923, users may not be able to use the Seek Bar in Windows Media Player when playing specific files. This issue does not affect normal playback.

Affected platforms: 
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 8.1; Windows 7, Service Pack 1.
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2; Windows Server 2008 R2 SP1

Resolution: This issue is resolved in KB4471318.

Back to top
October 09, 2018
KB4462923
Resolved
KB4471318
Resolved:
December 11, 2018
10:00 AM PT

Opened:
October 09, 2018
10:00 AM PT
Event Viewer may not show some event descriptions for network interface cards.
After installing KB4462927, the Event Viewer may not show some event descriptions for network interface cards (NICs).

Affected Platforms:
  • Client: Windows 7, Service Pack 1 
  • Server: Windows Server 2008 R2 SP1 

Resolution: This issue is resolved in KB4489878.

Back to top
October 18, 2018
KB4462927
Resolved
KB4489878
Resolved:
March 12, 2019
10:00 AM PT

Opened:
October 18, 2018
10:00 AM PT
" diff --git a/windows/release-information/resolved-issues-windows-8.1-and-windows-server-2012-r2.yml b/windows/release-information/resolved-issues-windows-8.1-and-windows-server-2012-r2.yml index 4b7dbda94b..aae936db92 100644 --- a/windows/release-information/resolved-issues-windows-8.1-and-windows-server-2012-r2.yml +++ b/windows/release-information/resolved-issues-windows-8.1-and-windows-server-2012-r2.yml @@ -60,7 +60,7 @@ sections: - type: markdown text: " - +
DetailsOriginating updateStatusHistory
Devices may not respond at login or Welcome screen if running certain Avast software
Microsoft and Avast have identified an issue on devices running Avast for Business, Avast CloudCare, and AVG Business Edition antivirus software after you install KB4493446 and restart. Devices may become unresponsive at the login or Welcome screen. Additionally, you may be unable to log in or log in after an extended period of time.
Affected platforms: 
  • Client: Windows 8.1; Windows 7, Service Pack 1 
  • Server: Windows Server 2012 R2; Windows Server 2008 R2 SP1 
Resolution: Avast has released emergency updates to address this issue. For more information and AV update schedule, see the Avast support KB article.

Back to top
April 09, 2019
KB4493446
Resolved
Resolved:
April 09, 2019
10:00 AM PT

Opened:
April 09, 2019
10:00 AM PT
Devices may not respond at login or Welcome screen if running certain Avast software
Microsoft and Avast have identified an issue on devices running Avast for Business, Avast CloudCare, and AVG Business Edition antivirus software after you install KB4493446 and restart. Devices may become unresponsive at the login or Welcome screen. Additionally, you may be unable to log in or log in after an extended period of time.

Affected platforms: 
  • Client: Windows 8.1; Windows 7, Service Pack 1 
  • Server: Windows Server 2012 R2; Windows Server 2008 R2 SP1 


Resolution: Avast has released emergency updates to address this issue. For more information and AV update schedule, see the Avast support KB article.

Back to top
April 09, 2019
KB4493446
Resolved
Resolved:
April 09, 2019
10:00 AM PT

Opened:
April 09, 2019
10:00 AM PT
" @@ -69,8 +69,8 @@ sections: - type: markdown text: " - - + +
DetailsOriginating updateStatusHistory
Custom URI schemes may not start corresponding application
After installing KB4489881, custom URI schemes for application protocol handlers may not start the corresponding application for local intranet and trusted sites security zones on Internet Explorer.
Affected platforms: 
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 8.1; Windows 7, Service Pack 1 
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2; Windows Server 2008 R2 SP1 
Resolution: This issue is resolved in KB4493446.

Back to top
March 12, 2019
KB4489881
Resolved
KB4493446
Resolved:
April 09, 2019
10:00 AM PT

Opened:
March 12, 2019
10:00 AM PT
Devices with winsock kernel client may receive error
After installing KB4489881, devices with a winsock kernel client may receive D1, FC, and other errors. Additionally, systems that run the Skype for Business or Lync Server Edge Transport role may be affected by this issue.
Affected platforms: 
  • Client: Windows 8.1 
  • Server: Windows Server 2012 R2 
Resolution: This issue is resolved in KB4489893.

Back to top
March 12, 2019
KB4489881
Resolved
KB4489893
Resolved:
March 19, 2019
10:00 AM PT

Opened:
March 12, 2019
10:00 AM PT
Custom URI schemes may not start corresponding application
After installing KB4489881, custom URI schemes for application protocol handlers may not start the corresponding application for local intranet and trusted sites security zones on Internet Explorer.

Affected platforms: 
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 8.1; Windows 7, Service Pack 1 
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2; Windows Server 2008 R2 SP1 

Resolution: This issue is resolved in KB4493446.

Back to top
March 12, 2019
KB4489881
Resolved
KB4493446
Resolved:
April 09, 2019
10:00 AM PT

Opened:
March 12, 2019
10:00 AM PT
Devices with winsock kernel client may receive error
After installing KB4489881, devices with a winsock kernel client may receive D1, FC, and other errors. Additionally, systems that run the Skype for Business or Lync Server Edge Transport role may be affected by this issue.

Affected platforms: 
  • Client: Windows 8.1 
  • Server: Windows Server 2012 R2 

Resolution: This issue is resolved in KB4489893.

Back to top
March 12, 2019
KB4489881
Resolved
KB4489893
Resolved:
March 19, 2019
10:00 AM PT

Opened:
March 12, 2019
10:00 AM PT
" @@ -79,9 +79,9 @@ sections: - type: markdown text: " - - - + + +
DetailsOriginating updateStatusHistory
Error 1309 when installing/uninstalling MSI or MSP files
After installing KB4487016, users may receive “Error 1309” while installing or uninstalling certain types of MSI and MSP files.
Affected platforms: 
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 8.1 
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2 
Resolution: This issue is resolved in KB4489881.

Back to top
February 19, 2019
KB4487016
Resolved
KB4489881
Resolved:
March 12, 2019
10:00 AM PT

Opened:
February 19, 2019
02:00 PM PT
Embedded objects may display incorrectly
Any compound document (OLE) server application that places embedded objects into the Windows Metafile (WMF) using the PatBlt API may display embedded objects incorrectly.
For example, if you paste a Microsoft Excel worksheet object into a Microsoft Word document, the cells may render with a different background color.
Affected platforms: 
  • Client: Windows 8.1 
  • Server: Windows Server 2012 R2 
Resolution: This issue is resolved in KB4493446.

Back to top
February 12, 2019
KB4487000
Resolved
KB4493446
Resolved:
April 09, 2019
10:00 AM PT

Opened:
February 12, 2019
10:00 AM PT
Internet Explorer may fail to load images
After installing KB4487000, Internet Explorer may fail to load images with a backslash (\\) in their relative source path.
Affected platforms: 
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 8.1; Windows 7, Service Pack 1 
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2; Windows Server 2008 R2 SP1 
Resolution: This issue is resolved in KB4487016.

Back to top
February 12, 2019
KB4487000
Resolved
KB4487016
Resolved:
February 19, 2019
02:00 PM PT

Opened:
February 12, 2019
10:00 AM PT
Error 1309 when installing/uninstalling MSI or MSP files
After installing KB4487016, users may receive “Error 1309” while installing or uninstalling certain types of MSI and MSP files.

Affected platforms: 
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 8.1 
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2 

Resolution: This issue is resolved in KB4489881.

Back to top
February 19, 2019
KB4487016
Resolved
KB4489881
Resolved:
March 12, 2019
10:00 AM PT

Opened:
February 19, 2019
02:00 PM PT
Embedded objects may display incorrectly
Any compound document (OLE) server application that places embedded objects into the Windows Metafile (WMF) using the PatBlt API may display embedded objects incorrectly.

For example, if you paste a Microsoft Excel worksheet object into a Microsoft Word document, the cells may render with a different background color.

Affected platforms: 
  • Client: Windows 8.1 
  • Server: Windows Server 2012 R2 

Resolution: This issue is resolved in KB4493446.

Back to top
February 12, 2019
KB4487000
Resolved
KB4493446
Resolved:
April 09, 2019
10:00 AM PT

Opened:
February 12, 2019
10:00 AM PT
Internet Explorer may fail to load images
After installing KB4487000, Internet Explorer may fail to load images with a backslash (\\) in their relative source path.

Affected platforms: 
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 8.1; Windows 7, Service Pack 1 
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2; Windows Server 2008 R2 SP1 

Resolution: This issue is resolved in KB4487016.

Back to top
February 12, 2019
KB4487000
Resolved
KB4487016
Resolved:
February 19, 2019
02:00 PM PT

Opened:
February 12, 2019
10:00 AM PT
" @@ -90,12 +90,12 @@ sections: - type: markdown text: " - - - - - - + + + + + +
DetailsOriginating updateStatusHistory
Unable to access hotspots with third-party applications
After installing KB4480963, third-party applications may have difficulty authenticating hotspots.
Affected platforms: 
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 8.1 
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2 
Resolution: This issue is resolved in KB4480969.

Back to top
January 08, 2019
KB4480963
Resolved
KB4480969
Resolved:
January 15, 2019
10:00 AM PT

Opened:
January 08, 2019
10:00 AM PT
Applications using Microsoft Jet database fail to open
Applications that use a Microsoft Jet database with the Microsoft Access 97 file format may fail to open if the database has column names greater than 32 characters. The database will fail to open with the error, “Unrecognized Database Format”.
Affected platforms: 
  • Client: Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 8.1; Windows 7, Service Pack 1 
  • Server: Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2; Windows Server 2008 R2 SP1 
Resolution: This issue is resolved in KB4487000.

Back to top
January 08, 2019
KB4480963
Resolved
KB4487000
Resolved:
February 12, 2019
10:00 AM PT

Opened:
January 08, 2019
10:00 AM PT
Virtual machines fail to restore
After installing KB4480963, virtual machines (VM) may fail to restore successfully if the VM has been saved and restored once before. The error message is, “Failed to restore the virtual machine state: Cannot restore this virtual machine because the saved state data cannot be read. Delete the saved state data and then try to start the virtual machine. (0xC0370027).”
This affects AMD Bulldozer Family 15h, AMD Jaguar Family 16h, and AMD Puma Family 16h (second generation) microarchitectures.
Resolution: This issue is resolved in KB4490512.

Back to top
January 08, 2019
KB4480963
Resolved
KB4490512
Resolved:
February 19, 2019
02:00 PM PT

Opened:
January 08, 2019
10:00 AM PT
Internet Explorer 11 authentication issue with multiple concurrent logons
After installing KB4480963, Internet Explorer 11 and other applications that use WININET.DLL may have authentication issues. This occurs when two or more people use the same user account for multiple, concurrent login sessions on the same Windows Server machine, including Remote Desktop Protocol (RDP) and Terminal Server logons. Symptoms reported by customers include, but may not be limited to:
  • Cache size and location show zero or empty.
  • Keyboard shortcuts may not work properly.
  • Webpages may intermittently fail to load or render correctly.
  • Issues with credential prompts.
  • Issues when downloading files.
Affected platforms: 
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10 Enterprise LTSC 2016; Windows 8.1; Windows 7, Service Pack 1 
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server 2016; Windows Server 2012 R2; Windows Server 2008 R2 SP1 
Resolution: This issue is resolved in KB4493446.

Back to top
January 08, 2019
KB4480963
Resolved
KB4493446
Resolved:
April 09, 2019
10:00 AM PT

Opened:
January 08, 2019
10:00 AM PT
MSXML6 may cause applications to stop responding.
After installing KB4480963, MSXML6 causes applications to stop responding if an exception was thrown during node operations, such as appendChild(), insertBefore(), and moveNode().
The Group Policy editor may stop responding when editing a Group Policy Object (GPO) that contains Group Policy Preferences (GPP) for Internet Explorer 10 settings.
Resolution: This issue is resolved in KB4493446.

Back to top
January 08, 2019
KB4480963
Resolved
KB4493446
Resolved:
April 09, 2019
10:00 AM PT

Opened:
January 08, 2019
10:00 AM PT
First character of the Japanese era name not recognized as an abbreviation
After installing KB4480969, the first character of the Japanese era name is not recognized as an abbreviation and may cause date parsing issues.
Affected platforms: 
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 8.1; Windows 7, Service Pack 1 
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2; Windows Server 2008 R2 SP1 
Resolution: This issue is resolved in KB4487016.

Back to top
January 15, 2019
KB4480969
Resolved
KB4487016
Resolved:
February 19, 2019
02:00 PM PT

Opened:
January 15, 2019
10:00 AM PT
Unable to access hotspots with third-party applications
After installing KB4480963, third-party applications may have difficulty authenticating hotspots.

Affected platforms: 
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 8.1 
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2 

Resolution: This issue is resolved in KB4480969.

Back to top
January 08, 2019
KB4480963
Resolved
KB4480969
Resolved:
January 15, 2019
10:00 AM PT

Opened:
January 08, 2019
10:00 AM PT
Applications using Microsoft Jet database fail to open
Applications that use a Microsoft Jet database with the Microsoft Access 97 file format may fail to open if the database has column names greater than 32 characters. The database will fail to open with the error, “Unrecognized Database Format”.

Affected platforms: 
  • Client: Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 8.1; Windows 7, Service Pack 1 
  • Server: Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2; Windows Server 2008 R2 SP1 

Resolution: This issue is resolved in KB4487000.

Back to top
January 08, 2019
KB4480963
Resolved
KB4487000
Resolved:
February 12, 2019
10:00 AM PT

Opened:
January 08, 2019
10:00 AM PT
Virtual machines fail to restore
After installing KB4480963, virtual machines (VM) may fail to restore successfully if the VM has been saved and restored once before. The error message is, “Failed to restore the virtual machine state: Cannot restore this virtual machine because the saved state data cannot be read. Delete the saved state data and then try to start the virtual machine. (0xC0370027).”

This affects AMD Bulldozer Family 15h, AMD Jaguar Family 16h, and AMD Puma Family 16h (second generation) microarchitectures.

Resolution: This issue is resolved in KB4490512.

Back to top
January 08, 2019
KB4480963
Resolved
KB4490512
Resolved:
February 19, 2019
02:00 PM PT

Opened:
January 08, 2019
10:00 AM PT
Internet Explorer 11 authentication issue with multiple concurrent logons
After installing KB4480963, Internet Explorer 11 and other applications that use WININET.DLL may have authentication issues. This occurs when two or more people use the same user account for multiple, concurrent login sessions on the same Windows Server machine, including Remote Desktop Protocol (RDP) and Terminal Server logons. Symptoms reported by customers include, but may not be limited to:
  • Cache size and location show zero or empty.
  • Keyboard shortcuts may not work properly.
  • Webpages may intermittently fail to load or render correctly.
  • Issues with credential prompts.
  • Issues when downloading files.

Affected platforms: 
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10 Enterprise LTSC 2016; Windows 8.1; Windows 7, Service Pack 1 
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server 2016; Windows Server 2012 R2; Windows Server 2008 R2 SP1 

Resolution: This issue is resolved in KB4493446.

Back to top
January 08, 2019
KB4480963
Resolved
KB4493446
Resolved:
April 09, 2019
10:00 AM PT

Opened:
January 08, 2019
10:00 AM PT
MSXML6 may cause applications to stop responding.
After installing KB4480963, MSXML6 causes applications to stop responding if an exception was thrown during node operations, such as appendChild(), insertBefore(), and moveNode().

The Group Policy editor may stop responding when editing a Group Policy Object (GPO) that contains Group Policy Preferences (GPP) for Internet Explorer 10 settings.

Resolution: This issue is resolved in KB4493446.

Back to top
January 08, 2019
KB4480963
Resolved
KB4493446
Resolved:
April 09, 2019
10:00 AM PT

Opened:
January 08, 2019
10:00 AM PT
First character of the Japanese era name not recognized as an abbreviation
After installing KB4480969, the first character of the Japanese era name is not recognized as an abbreviation and may cause date parsing issues.

Affected platforms: 
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 8.1; Windows 7, Service Pack 1 
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2; Windows Server 2008 R2 SP1 

Resolution: This issue is resolved in KB4487016.

Back to top
January 15, 2019
KB4480969
Resolved
KB4487016
Resolved:
February 19, 2019
02:00 PM PT

Opened:
January 15, 2019
10:00 AM PT
" @@ -104,6 +104,6 @@ sections: - type: markdown text: " - +
DetailsOriginating updateStatusHistory
Unable to use Seek bar in Windows Media Player
After installing KB4462926, users may not be able to use the Seek Bar in Windows Media Player when playing specific files. This issue does not affect normal playback.
Affected platforms: 
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 8.1; Windows 7, Service Pack 1 
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2; Windows Server 2008 R2 SP1 
Resolution: This issue is resolved in KB4471320.

Back to top
October 09, 2018
KB4462926
Resolved
KB4471320
Resolved:
December 11, 2018
10:00 AM PT

Opened:
October 09, 2018
10:00 AM PT
Unable to use Seek bar in Windows Media Player
After installing KB4462926, users may not be able to use the Seek Bar in Windows Media Player when playing specific files. This issue does not affect normal playback.

Affected platforms: 
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 8.1; Windows 7, Service Pack 1 
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2; Windows Server 2008 R2 SP1 

Resolution: This issue is resolved in KB4471320.

Back to top
October 09, 2018
KB4462926
Resolved
KB4471320
Resolved:
December 11, 2018
10:00 AM PT

Opened:
October 09, 2018
10:00 AM PT
" diff --git a/windows/release-information/resolved-issues-windows-server-2008-sp2.yml b/windows/release-information/resolved-issues-windows-server-2008-sp2.yml index afd2048e0f..7611cd0050 100644 --- a/windows/release-information/resolved-issues-windows-server-2008-sp2.yml +++ b/windows/release-information/resolved-issues-windows-server-2008-sp2.yml @@ -55,13 +55,13 @@ sections: - type: markdown text: " - - - - - - - - + + + + + + + +
DetailsOriginating updateStatusHistory
Unable to use Seek bar in Windows Media Player
After installing KB4463097, users may not be able to use the Seek Bar in Windows Media Player when playing specific files. This issue does not affect normal playback.
Affected platforms: 
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 8.1; Windows 7, Service Pack 1
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2; Windows Server 2012; Windows Server 2008 R2 SP1; Windows Server 2008 SP2
Resolution: This issue is resolved in KB4471325.

Back to top
October 09, 2018
KB4463097
Resolved
KB4471325
Resolved:
December 11, 2018
10:00 AM PT

Opened:
April 25, 2019
03:28 PM PT
Applications using Microsoft Jet database fail to open
Applications that use a Microsoft Jet database with the Microsoft Access 97 file format may fail to open if the database has column names greater than 32 characters. The database will fail to open with the error, “Unrecognized Database Format”.
Affected platforms: 
  • Client: Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 8.1; Windows 7, Service Pack 1 
  • Server: Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2; Windows Server 2012; Windows Server 2008 R2 SP1; Windows Server 2008 SP2
Resolution: This issue is resolved in KB4487023.

Back to top
January 08, 2019
KB4480968
Resolved
KB4487023
Resolved:
February 12, 2019
10:00 AM PT

Opened:
April 25, 2019
03:32 PM PT
Virtual machines fail to restore
After installing KB4480968, virtual machines (VM) may fail to restore successfully if the VM has been saved and restored once before. The error message is, “Failed to restore the virtual machine state: Cannot restore this virtual machine because the saved state data cannot be read. Delete the saved state data and then try to start the virtual machine. (0xC0370027).”
This affects AMD Bulldozer Family 15h, AMD Jaguar Family 16h, and AMD Puma Family 16h (second generation) microarchitectures.
Affected platforms: 
  • Client: Windows 7, Service Pack 1 
  • Server: Windows Server 2012; Windows Server 2008 R2 SP1; Windows Server 2008 SP2
Resolution: This issue is resolved in KB4490514.

Back to top
January 08, 2019
KB4480968
Resolved
KB4490514
Resolved:
February 19, 2019
02:00 PM PT

Opened:
April 25, 2019
03:26 PM PT
Embedded objects may display incorrectly
Any compound document (OLE) server application that places embedded objects into the Windows Metafile (WMF) using the PatBlt API may display embedded objects incorrectly.
For example, if you paste a Microsoft Excel worksheet object into a Microsoft Word document, the cells may render with a different background color.
Affected platforms: 
  • Client: Windows 8.1 
  • Server: Windows Server 2012 R2; Windows Server 2012; Windows Server 2008 SP2
Resolution: This issue is resolved in KB4493471.

Back to top

Resolved
KB4493471
Resolved:
April 09, 2019
10:00 AM PT

Opened:
April 25, 2019
03:26 PM PT
First character of the Japanese era name not recognized as an abbreviation
After installing KB4480974, the first character of the Japanese era name is not recognized as an abbreviation and may cause date parsing issues.
Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 8.1; Windows 7, Service Pack 1
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2; Windows Server 2012; Windows Server 2008 R2 SP1; Windows Server 2008 SP2
Resolution: This issue is resolved in KB4489880.

Back to top
January 17, 2019
KB4480974
Resolved
KB4489880
Resolved:
March 12, 2019
10:00 AM PT

Opened:
April 25, 2019
03:32 PM PT
Applications using Microsoft Jet database and Access 95 file format stop working
Applications that use a Microsoft Jet database with the Microsoft Access 95 file format may randomly stop working.
Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 7, Service Pack 1
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012; Windows Server 2008 R2 SP1; Windows Server 2008 SP2
Resolution: This issue is resolved in KB4487022.

Back to top
February 12, 2019
KB4487023
Resolved
KB4487022
Resolved:
February 19, 2019
02:00 PM PT

Opened:
April 25, 2019
03:26 PM PT
Local Administrators unable to remotely access shares
Local users who are part of the local Administrators group may not be able to remotely access shares on Windows Server 2008 R2 and Windows 7 machines after installing KB4480968. This does not affect domain accounts in the local Administrators group.
Affected platforms: 
  • Client: Windows 7, Service Pack 1 
  • Server: Windows Server 2008 R2 SP1; Windows Server 2008 SP2
Resolution: This issue is resolved in KB4487354.

Back to top
January 08, 2019
KB4480968
Resolved
KB4487354
Resolved:
January 11, 2019
02:00 PM PT

Opened:
April 25, 2019
03:26 PM PT
NETDOM.EXE fails to run
After installing KB4489880, NETDOM.EXE fails to run, and the on-screen error, “The command failed to complete successfully.” appears.
Affected platforms: 
  • Client: Windows 7, Service Pack 1 
  • Server: Windows Server 2008 R2 SP1; Windows Server 2008 SP2
Resolution: This issue is resolved in KB4493471.

Back to top
March 12, 2019
KB4489880
Resolved
KB4493471
Resolved:
April 09, 2019
10:00 AM PT

Opened:
April 25, 2019
03:25 PM PT
Unable to use Seek bar in Windows Media Player
After installing KB4463097, users may not be able to use the Seek Bar in Windows Media Player when playing specific files. This issue does not affect normal playback.

Affected platforms: 
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 8.1; Windows 7, Service Pack 1
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2; Windows Server 2012; Windows Server 2008 R2 SP1; Windows Server 2008 SP2

Resolution: This issue is resolved in KB4471325.

Back to top
October 09, 2018
KB4463097
Resolved
KB4471325
Resolved:
December 11, 2018
10:00 AM PT

Opened:
April 25, 2019
03:28 PM PT
Applications using Microsoft Jet database fail to open
Applications that use a Microsoft Jet database with the Microsoft Access 97 file format may fail to open if the database has column names greater than 32 characters. The database will fail to open with the error, “Unrecognized Database Format”.

Affected platforms: 
  • Client: Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 8.1; Windows 7, Service Pack 1 
  • Server: Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2; Windows Server 2012; Windows Server 2008 R2 SP1; Windows Server 2008 SP2

Resolution: This issue is resolved in KB4487023.

Back to top
January 08, 2019
KB4480968
Resolved
KB4487023
Resolved:
February 12, 2019
10:00 AM PT

Opened:
April 25, 2019
03:32 PM PT
Virtual machines fail to restore
After installing KB4480968, virtual machines (VM) may fail to restore successfully if the VM has been saved and restored once before. The error message is, “Failed to restore the virtual machine state: Cannot restore this virtual machine because the saved state data cannot be read. Delete the saved state data and then try to start the virtual machine. (0xC0370027).”

This affects AMD Bulldozer Family 15h, AMD Jaguar Family 16h, and AMD Puma Family 16h (second generation) microarchitectures.

Affected platforms: 
  • Client: Windows 7, Service Pack 1 
  • Server: Windows Server 2012; Windows Server 2008 R2 SP1; Windows Server 2008 SP2

Resolution: This issue is resolved in KB4490514.

Back to top
January 08, 2019
KB4480968
Resolved
KB4490514
Resolved:
February 19, 2019
02:00 PM PT

Opened:
April 25, 2019
03:26 PM PT
Embedded objects may display incorrectly
Any compound document (OLE) server application that places embedded objects into the Windows Metafile (WMF) using the PatBlt API may display embedded objects incorrectly.

For example, if you paste a Microsoft Excel worksheet object into a Microsoft Word document, the cells may render with a different background color.

Affected platforms: 
  • Client: Windows 8.1 
  • Server: Windows Server 2012 R2; Windows Server 2012; Windows Server 2008 SP2

Resolution: This issue is resolved in KB4493471.

Back to top

Resolved
KB4493471
Resolved:
April 09, 2019
10:00 AM PT

Opened:
April 25, 2019
03:26 PM PT
First character of the Japanese era name not recognized as an abbreviation
After installing KB4480974, the first character of the Japanese era name is not recognized as an abbreviation and may cause date parsing issues.

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 8.1; Windows 7, Service Pack 1
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2; Windows Server 2012; Windows Server 2008 R2 SP1; Windows Server 2008 SP2

Resolution: This issue is resolved in KB4489880.

Back to top
January 17, 2019
KB4480974
Resolved
KB4489880
Resolved:
March 12, 2019
10:00 AM PT

Opened:
April 25, 2019
03:32 PM PT
Applications using Microsoft Jet database and Access 95 file format stop working
Applications that use a Microsoft Jet database with the Microsoft Access 95 file format may randomly stop working.

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 7, Service Pack 1
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012; Windows Server 2008 R2 SP1; Windows Server 2008 SP2

Resolution: This issue is resolved in KB4487022.

Back to top
February 12, 2019
KB4487023
Resolved
KB4487022
Resolved:
February 19, 2019
02:00 PM PT

Opened:
April 25, 2019
03:26 PM PT
Local Administrators unable to remotely access shares
Local users who are part of the local Administrators group may not be able to remotely access shares on Windows Server 2008 R2 and Windows 7 machines after installing KB4480968. This does not affect domain accounts in the local Administrators group.

Affected platforms: 
  • Client: Windows 7, Service Pack 1 
  • Server: Windows Server 2008 R2 SP1; Windows Server 2008 SP2

Resolution: This issue is resolved in KB4487354.

Back to top
January 08, 2019
KB4480968
Resolved
KB4487354
Resolved:
January 11, 2019
02:00 PM PT

Opened:
April 25, 2019
03:26 PM PT
NETDOM.EXE fails to run
After installing KB4489880, NETDOM.EXE fails to run, and the on-screen error, “The command failed to complete successfully.” appears.

Affected platforms: 
  • Client: Windows 7, Service Pack 1 
  • Server: Windows Server 2008 R2 SP1; Windows Server 2008 SP2

Resolution: This issue is resolved in KB4493471.

Back to top
March 12, 2019
KB4489880
Resolved
KB4493471
Resolved:
April 09, 2019
10:00 AM PT

Opened:
April 25, 2019
03:25 PM PT
" diff --git a/windows/release-information/resolved-issues-windows-server-2012.yml b/windows/release-information/resolved-issues-windows-server-2012.yml index 1b99bc8fed..3fb079b612 100644 --- a/windows/release-information/resolved-issues-windows-server-2012.yml +++ b/windows/release-information/resolved-issues-windows-server-2012.yml @@ -58,16 +58,16 @@ sections: - type: markdown text: " - - - - - - - - - - - + + + + + + + + + + +
DetailsOriginating updateStatusHistory
Unable to use Seek bar in Windows Media Player
After installing KB4462929, users may not be able to use the Seek Bar in Windows Media Player when playing specific files. This issue does not affect normal playback.
Resolution: This issue is resolved in KB4471330.

Back to top
October 09, 2018
KB4462929
Resolved
KB4471330
Resolved:
December 11, 2018
10:00 AM PT

Opened:
April 25, 2019
02:47 PM PT
Event Viewer may not show some event descriptions for network interface cards
After installing KB4457135, the Event Viewer may not show some event descriptions for network interface cards (NICs).
Resolution: This issue is resolved in KB4489891.

Back to top
September 11, 2018
KB4457135
Resolved
KB4489891
Resolved:
March 12, 2019
10:00 AM PT

Opened:
April 25, 2019
03:10 PM PT
Unable to access hotspots with third-party applications
After installing KB4480975, third-party applications may have difficulty authenticating hotspots.
Resolution: This issue is resolved in KB4480971.

Back to top
January 08, 2019
KB4480975
Resolved
KB4480971
Resolved:
January 15, 2019
10:00 AM PT

Opened:
April 25, 2019
03:14 PM PT
Applications using Microsoft Jet database fail to open
Applications that use a Microsoft Jet database with the Microsoft Access 97 file format may fail to open if the database has column names greater than 32 characters. The database will fail to open with the error, \"Unrecognized Database Format\".
Resolution: This issue is resolved in KB4487025.

Back to top
January 08, 2019
KB4480975
Resolved
KB4487025
Resolved:
February 12, 2019
10:00 AM PT

Opened:
April 25, 2019
03:19 PM PT
Virtual machines fail to restore
After installing KB4480975, virtual machines (VM) may fail to restore successfully if the VM has been saved and restored once before. The error message is, \"Failed to restore the virtual machine state: Cannot restore this virtual machine because the saved state data cannot be read. Delete the saved state data and then try to start the virtual machine. (0xC0370027).\"
This affects AMD Bulldozer Family 15h, AMD Jaguar Family 16h, and AMD Puma Family 16h (second generation) microarchitectures.
Resolution: This issue is resolved in KB4490516.

Back to top
January 08, 2019
KB4480975
Resolved
KB4490516
Resolved:
February 19, 2019
02:00 PM PT

Opened:
April 25, 2019
03:22 PM PT
Internet Explorer 11 authentication issue with multiple concurrent logons
After installing KB4480975, Internet Explorer 11 and other applications that use WININET.DLL may have authentication issues. This occurs when two or more people use the same user account for multiple, concurrent login sessions on the same Windows Server machine, including Remote Desktop Protocol (RDP) and Terminal Server logons. Symptoms reported by customers include, but may not be limited to:
  • Cache size and location show zero or empty.
  • Keyboard shortcuts may not work properly.
  • Webpages may intermittently fail to load or render correctly.
  • Issues with credential prompts.
  • Issues when downloading files.
Resolution: This issue is resolved in KB4493451.

Back to top
January 08, 2019
KB4480975
Resolved
KB4493451
Resolved:
April 09, 2019
10:00 AM PT

Opened:
April 25, 2019
03:34 PM PT
MSXML6 may cause applications to stop responding
After installing KB4480975, MSXML6 causes applications to stop responding if an exception was thrown during node operations, such as appendChild(), insertBefore(), and moveNode().
The Group Policy editor may stop responding when editing a Group Policy Object (GPO) that contains Group Policy Preferences (GPP) for Internet Explorer 10 settings.
Resolution: This issue is resolved in KB4493451.

Back to top
January 08, 2019
KB4480975
Resolved
KB4493451
Resolved:
April 09, 2019
10:00 AM PT

Opened:
April 25, 2019
03:27 PM PT
Error 1309 when installing/uninstalling MSI or MSP files
After installing KB4487025, users may receive \"Error 1309\" while installing or uninstalling certain types of MSI and MSP files.
Resolution: This issue is resolved in KB4489891.

Back to top
February 12, 2019
KB4487025
Resolved
KB4489891
Resolved:
March 12, 2019
10:00 AM PT

Opened:
April 25, 2019
03:36 PM PT
Embedded objects may display incorrectly
Any compound document (OLE) server application that places embedded objects into the Windows Metafile (WMF) using the PatBlt API may display embedded objects incorrectly.
For example, if you paste a Microsoft Excel worksheet object into a Microsoft Word document, the cells may render with a different background color.
Resolution: This issue is resolved in KB4493451.

Back to top
February 12, 2019
KB4487025
Resolved
KB4493451
Resolved:
April 09, 2019
10:00 AM PT

Opened:
April 25, 2019
04:00 PM PT
First character of the Japanese era name not recognized as an abbreviation
After installing KB4480971, the first character of the Japanese era name is not recognized as an abbreviation and may cause date parsing issues.
Resolution: This issue is resolved in KB4487024.

Back to top
January 15, 2019
KB4480971
Resolved
KB4487024
Resolved:
February 19, 2019
02:00 PM PT

Opened:
April 25, 2019
04:01 PM PT
Applications using Microsoft Jet database and Access 95 file format stop working
Applications that use a Microsoft Jet database with the Microsoft Access 95 file format may randomly stop working.
Resolution: This issue is resolved in KB4487024.

Back to top
February 12, 2019
KB4487025
Resolved
KB4487024
Resolved:
February 19, 2019
02:00 PM PT

Opened:
April 25, 2019
04:04 PM PT
Unable to use Seek bar in Windows Media Player
After installing KB4462929, users may not be able to use the Seek Bar in Windows Media Player when playing specific files. This issue does not affect normal playback.

Resolution: This issue is resolved in KB4471330.

Back to top
October 09, 2018
KB4462929
Resolved
KB4471330
Resolved:
December 11, 2018
10:00 AM PT

Opened:
April 25, 2019
02:47 PM PT
Event Viewer may not show some event descriptions for network interface cards
After installing KB4457135, the Event Viewer may not show some event descriptions for network interface cards (NICs).

Resolution: This issue is resolved in KB4489891.

Back to top
September 11, 2018
KB4457135
Resolved
KB4489891
Resolved:
March 12, 2019
10:00 AM PT

Opened:
April 25, 2019
03:10 PM PT
Unable to access hotspots with third-party applications
After installing KB4480975, third-party applications may have difficulty authenticating hotspots.

Resolution: This issue is resolved in KB4480971.

Back to top
January 08, 2019
KB4480975
Resolved
KB4480971
Resolved:
January 15, 2019
10:00 AM PT

Opened:
April 25, 2019
03:14 PM PT
Applications using Microsoft Jet database fail to open
Applications that use a Microsoft Jet database with the Microsoft Access 97 file format may fail to open if the database has column names greater than 32 characters. The database will fail to open with the error, \"Unrecognized Database Format\".

Resolution: This issue is resolved in KB4487025.

Back to top
January 08, 2019
KB4480975
Resolved
KB4487025
Resolved:
February 12, 2019
10:00 AM PT

Opened:
April 25, 2019
03:19 PM PT
Virtual machines fail to restore
After installing KB4480975, virtual machines (VM) may fail to restore successfully if the VM has been saved and restored once before. The error message is, \"Failed to restore the virtual machine state: Cannot restore this virtual machine because the saved state data cannot be read. Delete the saved state data and then try to start the virtual machine. (0xC0370027).\"

This affects AMD Bulldozer Family 15h, AMD Jaguar Family 16h, and AMD Puma Family 16h (second generation) microarchitectures.

Resolution: This issue is resolved in KB4490516.

Back to top
January 08, 2019
KB4480975
Resolved
KB4490516
Resolved:
February 19, 2019
02:00 PM PT

Opened:
April 25, 2019
03:22 PM PT
Internet Explorer 11 authentication issue with multiple concurrent logons
After installing KB4480975, Internet Explorer 11 and other applications that use WININET.DLL may have authentication issues. This occurs when two or more people use the same user account for multiple, concurrent login sessions on the same Windows Server machine, including Remote Desktop Protocol (RDP) and Terminal Server logons. Symptoms reported by customers include, but may not be limited to:
  • Cache size and location show zero or empty.
  • Keyboard shortcuts may not work properly.
  • Webpages may intermittently fail to load or render correctly.
  • Issues with credential prompts.
  • Issues when downloading files.

Resolution: This issue is resolved in KB4493451.

Back to top
January 08, 2019
KB4480975
Resolved
KB4493451
Resolved:
April 09, 2019
10:00 AM PT

Opened:
April 25, 2019
03:34 PM PT
MSXML6 may cause applications to stop responding
After installing KB4480975, MSXML6 causes applications to stop responding if an exception was thrown during node operations, such as appendChild(), insertBefore(), and moveNode().

The Group Policy editor may stop responding when editing a Group Policy Object (GPO) that contains Group Policy Preferences (GPP) for Internet Explorer 10 settings.

Resolution: This issue is resolved in KB4493451.

Back to top
January 08, 2019
KB4480975
Resolved
KB4493451
Resolved:
April 09, 2019
10:00 AM PT

Opened:
April 25, 2019
03:27 PM PT
Error 1309 when installing/uninstalling MSI or MSP files
After installing KB4487025, users may receive \"Error 1309\" while installing or uninstalling certain types of MSI and MSP files.

Resolution: This issue is resolved in KB4489891.

Back to top
February 12, 2019
KB4487025
Resolved
KB4489891
Resolved:
March 12, 2019
10:00 AM PT

Opened:
April 25, 2019
03:36 PM PT
Embedded objects may display incorrectly
Any compound document (OLE) server application that places embedded objects into the Windows Metafile (WMF) using the PatBlt API may display embedded objects incorrectly.

For example, if you paste a Microsoft Excel worksheet object into a Microsoft Word document, the cells may render with a different background color.

Resolution: This issue is resolved in KB4493451.

Back to top
February 12, 2019
KB4487025
Resolved
KB4493451
Resolved:
April 09, 2019
10:00 AM PT

Opened:
April 25, 2019
04:00 PM PT
First character of the Japanese era name not recognized as an abbreviation
After installing KB4480971, the first character of the Japanese era name is not recognized as an abbreviation and may cause date parsing issues.

Resolution: This issue is resolved in KB4487024.

Back to top
January 15, 2019
KB4480971
Resolved
KB4487024
Resolved:
February 19, 2019
02:00 PM PT

Opened:
April 25, 2019
04:01 PM PT
Applications using Microsoft Jet database and Access 95 file format stop working
Applications that use a Microsoft Jet database with the Microsoft Access 95 file format may randomly stop working.

Resolution: This issue is resolved in KB4487024.

Back to top
February 12, 2019
KB4487025
Resolved
KB4487024
Resolved:
February 19, 2019
02:00 PM PT

Opened:
April 25, 2019
04:04 PM PT
" diff --git a/windows/release-information/status-windows-10-1507.yml b/windows/release-information/status-windows-10-1507.yml index 8a297e56b9..f7c75234a8 100644 --- a/windows/release-information/status-windows-10-1507.yml +++ b/windows/release-information/status-windows-10-1507.yml @@ -77,7 +77,7 @@ sections: - type: markdown text: " - +
DetailsOriginating updateStatusHistory
Custom URI schemes may not start corresponding application
After installing KB4489872, Custom URI Schemes for Application Protocol handlers may not start the corresponding application for local intranet and trusted sites on Internet Explorer.
Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 8.1; Windows 7, Service Pack 1 
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2; Windows Server 2008 R2 SP1
Resolution: This issue was resolved in KB4493475.

Back to top
OS Build 10240.18158

March 12, 2019
KB4489872
Resolved
KB4493475
Resolved:
April 09, 2019
10:00 AM PT

Opened:
March 12, 2019
10:00 AM PT
Custom URI schemes may not start corresponding application
After installing KB4489872, Custom URI Schemes for Application Protocol handlers may not start the corresponding application for local intranet and trusted sites on Internet Explorer.

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 8.1; Windows 7, Service Pack 1 
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2; Windows Server 2008 R2 SP1

Resolution: This issue was resolved in KB4493475.

Back to top
OS Build 10240.18158

March 12, 2019
KB4489872
Resolved
KB4493475
Resolved:
April 09, 2019
10:00 AM PT

Opened:
March 12, 2019
10:00 AM PT
" @@ -86,6 +86,6 @@ sections: - type: markdown text: " - +
DetailsOriginating updateStatusHistory
MSXML6 may cause applications to stop responding
After installing KB4480962, MSXML6 causes applications to stop responding if an exception was thrown during node operations, such as appendChild(), insertBefore(), and moveNode().
The Group Policy editor may stop responding when editing a Group Policy Object (GPO) that contains Group Policy Preferences (GPP) for Internet Explorer 10 settings.
Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 8.1
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2
Resolution: This issue was resolved in KB4493475.

Back to top
OS Build 10240.18094

January 08, 2019
KB4480962
Resolved
KB4493475
Resolved:
April 09, 2019
10:00 AM PT

Opened:
January 08, 2019
10:00 AM PT
MSXML6 may cause applications to stop responding
After installing KB4480962, MSXML6 causes applications to stop responding if an exception was thrown during node operations, such as appendChild(), insertBefore(), and moveNode().

The Group Policy editor may stop responding when editing a Group Policy Object (GPO) that contains Group Policy Preferences (GPP) for Internet Explorer 10 settings.

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 8.1
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2

Resolution: This issue was resolved in KB4493475.

Back to top
OS Build 10240.18094

January 08, 2019
KB4480962
Resolved
KB4493475
Resolved:
April 09, 2019
10:00 AM PT

Opened:
January 08, 2019
10:00 AM PT
" diff --git a/windows/release-information/status-windows-10-1607-and-windows-server-2016.yml b/windows/release-information/status-windows-10-1607-and-windows-server-2016.yml index dd0a637c9c..f441e35df1 100644 --- a/windows/release-information/status-windows-10-1607-and-windows-server-2016.yml +++ b/windows/release-information/status-windows-10-1607-and-windows-server-2016.yml @@ -83,10 +83,10 @@ sections: - type: markdown text: " - - - + + +
DetailsOriginating updateStatusHistory
Custom URI schemes may not start corresponding application
After installing KB4489882, Custom URI schemes for application protocol handlers may not start the corresponding application for local intranet and trusted sites security zones on Internet Explorer.
Affected platforms: 
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 8.1; Windows 7, Service Pack 1 
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2; Windows Server 2008 R2 SP1
Workaround: Right-click the URL link to open it in a new window or tab, or enable Protected Mode in Internet Explorer for local intranet and trusted sites
  1. Go to Tools > Internet options > Security.
  2. Within Select a zone to view or change security settings, select Local intranet and then select Enable Protected Mode.
  3. Select Trusted sites and then select Enable Protected Mode.
  4. Select OK.
You must restart the browser after making these changes.
Next steps: Microsoft is working on a resolution and will provide an update in an upcoming release.

Back to top
OS Build 14393.2848

March 12, 2019
KB4489882
Mitigated
Last updated:
March 19, 2019
10:00 AM PT

Opened:
March 12, 2019
10:00 AM PT
Issue using PXE to start a device from WDS
After installing KB4489882, there may be issues using the Preboot Execution Environment (PXE) to start a device from a Windows Deployment Services (WDS) server configured to use Variable Window Extension. This may cause the connection to the WDS server to terminate prematurely while downloading the image. This issue does not affect clients or devices that are not using Variable Window Extension.
Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10 Enterprise LTSC 2016; Windows 8.1
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server 2016; Windows Server 2012 R2
Workaround: To mitigate the issue, disable the Variable Window Extension on WDS server using one of the following options:
Option 1:
Open an Administrator Command prompt and type the following:
Wdsutil /Set-TransportServer /EnableTftpVariableWindowExtension:No
-
Option 2:
Use the Windows Deployment Services UI to make the following adjustment:
  1. Open Windows Deployment Services from Windows Administrative Tools.
  2. Expand Servers and right-click a WDS server.
  3. Open its properties and clear the Enable Variable Window Extension box on the TFTP tab.
Option 3:
Set the following registry value to 0:
HKLM\\System\\CurrentControlSet\\Services\\WDSServer\\Providers\\WDSTFTP\\EnableVariableWindowExtension
Restart the WDSServer service after disabling the Variable Window Extension.
Next steps: Microsoft is working on a resolution and will provide an update in an upcoming release.

Back to top
OS Build 14393.2848

March 12, 2019
KB4489882
Mitigated
Last updated:
March 19, 2019
10:00 AM PT

Opened:
March 12, 2019
10:00 AM PT
End-user-defined characters (EUDC) cause blue screen at startup
If you enable per font end-user-defined characters (EUDC), the system will stop working and a blue screen may appear at startup. This is not a common setting in non-Asian regions.
Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016
Resolution: This issue was resolved in KB4493470.

Back to top
OS Build 14393.2879

March 19, 2019
KB4489889
Resolved
KB4493470
Resolved:
April 09, 2019
10:00 AM PT

Opened:
March 19, 2019
10:00 AM PT
Custom URI schemes may not start corresponding application
After installing KB4489882, Custom URI schemes for application protocol handlers may not start the corresponding application for local intranet and trusted sites security zones on Internet Explorer.

Affected platforms: 
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 8.1; Windows 7, Service Pack 1 
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2; Windows Server 2008 R2 SP1

Workaround: Right-click the URL link to open it in a new window or tab, or enable Protected Mode in Internet Explorer for local intranet and trusted sites
  1. Go to Tools > Internet options > Security.
  2. Within Select a zone to view or change security settings, select Local intranet and then select Enable Protected Mode.
  3. Select Trusted sites and then select Enable Protected Mode.
  4. Select OK.
You must restart the browser after making these changes.

Next steps: Microsoft is working on a resolution and will provide an update in an upcoming release.

Back to top
OS Build 14393.2848

March 12, 2019
KB4489882
Mitigated
Last updated:
March 19, 2019
10:00 AM PT

Opened:
March 12, 2019
10:00 AM PT
Issue using PXE to start a device from WDS
After installing KB4489882, there may be issues using the Preboot Execution Environment (PXE) to start a device from a Windows Deployment Services (WDS) server configured to use Variable Window Extension. This may cause the connection to the WDS server to terminate prematurely while downloading the image. This issue does not affect clients or devices that are not using Variable Window Extension.

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10 Enterprise LTSC 2016; Windows 8.1
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server 2016; Windows Server 2012 R2

Workaround: To mitigate the issue, disable the Variable Window Extension on WDS server using one of the following options:
Option 1:
Open an Administrator Command prompt and type the following:
Wdsutil /Set-TransportServer /EnableTftpVariableWindowExtension:No
+
Option 2:
Use the Windows Deployment Services UI to make the following adjustment:
  1. Open Windows Deployment Services from Windows Administrative Tools.
  2. Expand Servers and right-click a WDS server.
  3. Open its properties and clear the Enable Variable Window Extension box on the TFTP tab.
Option 3:
Set the following registry value to 0:
HKLM\\System\\CurrentControlSet\\Services\\WDSServer\\Providers\\WDSTFTP\\EnableVariableWindowExtension
Restart the WDSServer service after disabling the Variable Window Extension.

Next steps: Microsoft is working on a resolution and will provide an update in an upcoming release.

Back to top
OS Build 14393.2848

March 12, 2019
KB4489882
Mitigated
Last updated:
March 19, 2019
10:00 AM PT

Opened:
March 12, 2019
10:00 AM PT
End-user-defined characters (EUDC) cause blue screen at startup
If you enable per font end-user-defined characters (EUDC), the system will stop working and a blue screen may appear at startup. This is not a common setting in non-Asian regions.

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016

Resolution: This issue was resolved in KB4493470.

Back to top
OS Build 14393.2879

March 19, 2019
KB4489889
Resolved
KB4493470
Resolved:
April 09, 2019
10:00 AM PT

Opened:
March 19, 2019
10:00 AM PT
" @@ -95,8 +95,8 @@ sections: - type: markdown text: " - - + +
DetailsOriginating updateStatusHistory
Internet Explorer 11 authentication issue with multiple concurrent logons
After installing KB4480961, Internet Explorer 11 and other applications that use WININET.DLL may have authentication issues. This occurs when two or more people use the same user account for multiple, concurrent login sessions on the same Windows Server machine, including Remote Desktop Protocol (RDP) and Terminal Server logons. Symptoms reported by customers include, but may not be limited to:
  • Cache size and location show zero or empty.
  • Keyboard shortcuts may not work properly.
  • Webpages may intermittently fail to load or render correctly.
  • Issues with credential prompts.
  • Issues when downloading files.
Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10 Enterprise LTSC 2016; Windows 8.1; Windows 7, Service Pack 1
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server 2016; Windows Server 2012 R2; Windows Server 2008 R2 SP1
Resolution: This issue was resolved in KB4493470.

Back to top
OS Build 14393.2724

January 08, 2019
KB4480961
Resolved
KB4493470
Resolved:
April 09, 2019
10:00 AM PT

Opened:
January 08, 2019
10:00 AM PT
MSXML6 may cause applications to stop responding
After installing KB4480961, MSXML6 causes applications to stop responding if an exception was thrown during node operations, such as appendChild(), insertBefore(), and moveNode().
The Group Policy editor may stop responding when editing a Group Policy Object (GPO) that contains Group Policy Preferences (GPP) for Internet Explorer 10 settings.
Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 8.1
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2
Resolution: This issue was resolved in KB4493470.

Back to top
OS Build 14393.2724

January 08, 2019
KB4480961
Resolved
KB4493470
Resolved:
April 09, 2019
10:00 AM PT

Opened:
January 08, 2019
10:00 AM PT
Internet Explorer 11 authentication issue with multiple concurrent logons
After installing KB4480961, Internet Explorer 11 and other applications that use WININET.DLL may have authentication issues. This occurs when two or more people use the same user account for multiple, concurrent login sessions on the same Windows Server machine, including Remote Desktop Protocol (RDP) and Terminal Server logons. Symptoms reported by customers include, but may not be limited to:
  • Cache size and location show zero or empty.
  • Keyboard shortcuts may not work properly.
  • Webpages may intermittently fail to load or render correctly.
  • Issues with credential prompts.
  • Issues when downloading files.

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10 Enterprise LTSC 2016; Windows 8.1; Windows 7, Service Pack 1
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server 2016; Windows Server 2012 R2; Windows Server 2008 R2 SP1

Resolution: This issue was resolved in KB4493470.

Back to top
OS Build 14393.2724

January 08, 2019
KB4480961
Resolved
KB4493470
Resolved:
April 09, 2019
10:00 AM PT

Opened:
January 08, 2019
10:00 AM PT
MSXML6 may cause applications to stop responding
After installing KB4480961, MSXML6 causes applications to stop responding if an exception was thrown during node operations, such as appendChild(), insertBefore(), and moveNode().

The Group Policy editor may stop responding when editing a Group Policy Object (GPO) that contains Group Policy Preferences (GPP) for Internet Explorer 10 settings.

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 8.1
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2

Resolution: This issue was resolved in KB4493470.

Back to top
OS Build 14393.2724

January 08, 2019
KB4480961
Resolved
KB4493470
Resolved:
April 09, 2019
10:00 AM PT

Opened:
January 08, 2019
10:00 AM PT
" @@ -105,8 +105,8 @@ sections: - type: markdown text: " - - - + + +
DetailsOriginating updateStatusHistory
Cluster service may fail if the minimum password length is set to greater than 14
After installing KB4467684, the cluster service may fail to start with the error \"2245 (NERR_PasswordTooShort)\" if the Group Policy \"Minimum Password Length\" is configured with greater than 14 characters.
Affected platforms:
  • Client: Windows 10 Enterprise LTSC 2016
  • Server: Windows Server 2016
Workaround: Set the domain default \"Minimum Password Length\" policy to less than or equal to 14 characters.
Next steps: Microsoft is working on a resolution and will provide an update in an upcoming release.

Back to top
OS Build 14393.2639

November 27, 2018
KB4467684
Mitigated
Last updated:
March 19, 2019
10:00 AM PT

Opened:
November 27, 2018
10:00 AM PT
SCVMM cannot enumerate and manage logical switches deployed on the host
For hosts managed by System Center Virtual Machine Manager (VMM), VMM cannot enumerate and manage logical switches deployed on the host after installing KB4467684.
Additionally, if you do not follow the best practices, a stop error may occur in vfpext.sys on the hosts.
Affected platforms:
  • Client: Windows 10 Enterprise LTSC 2016
  • Server: Windows Server 2016
Workaround:
Run mofcomp on the following mof files on the affected host:
  • Scvmmswitchportsettings.mof
  • VMMDHCPSvr.mof
Follow the best practices while patching to avoid a stop error in vfpext.sys in an SDN v2 environment (NC managed hosts).

Back to top
OS Build 14393.2639

November 27, 2018
KB4467684
Mitigated
Last updated:
March 19, 2019
10:00 AM PT

Opened:
November 27, 2018
10:00 AM PT
Windows may not start on certain Lenovo and Fujitsu laptops with less than 8GB of RAM
After installing KB4467691, Windows may fail to start on certain Lenovo and Fujitsu laptops that have less than 8 GB of RAM.
Affected platforms:
  • Client: Windows 10 Enterprise LTSC 2016
  • Server: Windows Server 2016
Workaround: Restart the affected machine using the Unified Extensible Firmware Interface (UEFI). Disable Secure Boot and then restart.
If BitLocker is enabled on your machine, you may have to go through BitLocker recovery after Secure Boot has been disabled.
Next steps: Lenovo and Fujitsu are aware of this issue. Please contact your OEM to ask if there is a firmware update available for your device.

Back to top
OS Build 14393.2608

November 13, 2018
KB4467691
Mitigated
Last updated:
February 19, 2019
10:00 AM PT

Opened:
November 13, 2018
10:00 AM PT
Cluster service may fail if the minimum password length is set to greater than 14
After installing KB4467684, the cluster service may fail to start with the error \"2245 (NERR_PasswordTooShort)\" if the Group Policy \"Minimum Password Length\" is configured with greater than 14 characters.

Affected platforms:
  • Client: Windows 10 Enterprise LTSC 2016
  • Server: Windows Server 2016

Workaround: Set the domain default \"Minimum Password Length\" policy to less than or equal to 14 characters.

Next steps: Microsoft is working on a resolution and will provide an update in an upcoming release.

Back to top
OS Build 14393.2639

November 27, 2018
KB4467684
Mitigated
Last updated:
March 19, 2019
10:00 AM PT

Opened:
November 27, 2018
10:00 AM PT
SCVMM cannot enumerate and manage logical switches deployed on the host
For hosts managed by System Center Virtual Machine Manager (VMM), VMM cannot enumerate and manage logical switches deployed on the host after installing KB4467684.

Additionally, if you do not follow the best practices, a stop error may occur in vfpext.sys on the hosts.

Affected platforms:
  • Client: Windows 10 Enterprise LTSC 2016
  • Server: Windows Server 2016

Workaround:
Run mofcomp on the following mof files on the affected host:

  • Scvmmswitchportsettings.mof
  • VMMDHCPSvr.mof

Follow the best practices while patching to avoid a stop error in vfpext.sys in an SDN v2 environment (NC managed hosts).

Back to top
OS Build 14393.2639

November 27, 2018
KB4467684
Mitigated
Last updated:
March 19, 2019
10:00 AM PT

Opened:
November 27, 2018
10:00 AM PT
Windows may not start on certain Lenovo and Fujitsu laptops with less than 8GB of RAM
After installing KB4467691, Windows may fail to start on certain Lenovo and Fujitsu laptops that have less than 8 GB of RAM.

Affected platforms:
  • Client: Windows 10 Enterprise LTSC 2016
  • Server: Windows Server 2016

Workaround: Restart the affected machine using the Unified Extensible Firmware Interface (UEFI). Disable Secure Boot and then restart.

If BitLocker is enabled on your machine, you may have to go through BitLocker recovery after Secure Boot has been disabled.

Next steps: Lenovo and Fujitsu are aware of this issue. Please contact your OEM to ask if there is a firmware update available for your device.

Back to top
OS Build 14393.2608

November 13, 2018
KB4467691
Mitigated
Last updated:
February 19, 2019
10:00 AM PT

Opened:
November 13, 2018
10:00 AM PT
" diff --git a/windows/release-information/status-windows-10-1703.yml b/windows/release-information/status-windows-10-1703.yml index 0c01d5f114..77bb2ce556 100644 --- a/windows/release-information/status-windows-10-1703.yml +++ b/windows/release-information/status-windows-10-1703.yml @@ -78,8 +78,8 @@ sections: - type: markdown text: " - - + +
DetailsOriginating updateStatusHistory
Custom URI schemes may not start corresponding application
After installing KB4489871, custom URI schemes for application protocol handlers may not start the corresponding application for local intranet and trusted sites security zones on Internet Explorer.
Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 8.1; Windows 7, Service Pack 1 
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2; Windows Server 2008 R2 SP1
Workaround: Right-click the URL link to open it in a new window or tab, or enable Protected Mode in Internet Explorer for local intranet and trusted sites
1. Go to Tools > Internet options > Security.
2. Within Select a zone to view or change security settings, select Local intranet and then select Enable Protected Mode.
3. Select Trusted sites and then select Enable Protected Mode.
4. Select OK.
You must restart the browser after making these changes.
Next steps: Microsoft is working on a resolution and will provide an update in an upcoming release.

Back to top
OS Build 15063.1689

March 12, 2019
KB4489871
Mitigated
Last updated:
March 19, 2019
10:00 AM PT

Opened:
March 12, 2019
10:00 AM PT
End-user-defined characters (EUDC) may cause blue screen at startup
If you enable per font end-user-defined characters (EUDC), the system may stop working and a blue screen may appear at startup. This is not a common setting in non-Asian regions.
Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016
Resolution: This issue was resolved in KB4493474.

Back to top
OS Build 15063.1716

March 19, 2019
KB4489888
Resolved
KB4493474
Resolved:
April 09, 2019
10:00 AM PT

Opened:
March 19, 2019
10:00 AM PT
Custom URI schemes may not start corresponding application
After installing KB4489871, custom URI schemes for application protocol handlers may not start the corresponding application for local intranet and trusted sites security zones on Internet Explorer.

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 8.1; Windows 7, Service Pack 1 
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2; Windows Server 2008 R2 SP1

Workaround: Right-click the URL link to open it in a new window or tab, or enable Protected Mode in Internet Explorer for local intranet and trusted sites
1. Go to Tools > Internet options > Security.
2. Within Select a zone to view or change security settings, select Local intranet and then select Enable Protected Mode.
3. Select Trusted sites and then select Enable Protected Mode.
4. Select OK.
You must restart the browser after making these changes.

Next steps: Microsoft is working on a resolution and will provide an update in an upcoming release.

Back to top
OS Build 15063.1689

March 12, 2019
KB4489871
Mitigated
Last updated:
March 19, 2019
10:00 AM PT

Opened:
March 12, 2019
10:00 AM PT
End-user-defined characters (EUDC) may cause blue screen at startup
If you enable per font end-user-defined characters (EUDC), the system may stop working and a blue screen may appear at startup. This is not a common setting in non-Asian regions.

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016

Resolution: This issue was resolved in KB4493474.

Back to top
OS Build 15063.1716

March 19, 2019
KB4489888
Resolved
KB4493474
Resolved:
April 09, 2019
10:00 AM PT

Opened:
March 19, 2019
10:00 AM PT
" @@ -88,6 +88,6 @@ sections: - type: markdown text: " - +
DetailsOriginating updateStatusHistory
MSXML6 may cause applications to stop responding
After installing KB4480973, MSXML6 causes applications to stop responding if an exception was thrown during node operations, such as appendChild(), insertBefore(), and moveNode().
The Group Policy editor may stop responding when editing a Group Policy Object (GPO) that contains Group Policy Preferences (GPP) for Internet Explorer 10 settings.
Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 8.1
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2
Resolution: This issue was resolved in KB4493474.

Back to top
OS Build 15063.1563

January 08, 2019
KB4480973
Resolved
KB4493474
Resolved:
April 09, 2019
10:00 AM PT

Opened:
January 08, 2019
10:00 AM PT
MSXML6 may cause applications to stop responding
After installing KB4480973, MSXML6 causes applications to stop responding if an exception was thrown during node operations, such as appendChild(), insertBefore(), and moveNode().

The Group Policy editor may stop responding when editing a Group Policy Object (GPO) that contains Group Policy Preferences (GPP) for Internet Explorer 10 settings.

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 8.1
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2

Resolution: This issue was resolved in KB4493474.

Back to top
OS Build 15063.1563

January 08, 2019
KB4480973
Resolved
KB4493474
Resolved:
April 09, 2019
10:00 AM PT

Opened:
January 08, 2019
10:00 AM PT
" diff --git a/windows/release-information/status-windows-10-1709.yml b/windows/release-information/status-windows-10-1709.yml index b4851c4632..e31967236f 100644 --- a/windows/release-information/status-windows-10-1709.yml +++ b/windows/release-information/status-windows-10-1709.yml @@ -79,9 +79,9 @@ sections: - type: markdown text: " - - - + + +
DetailsOriginating updateStatusHistory
Custom URI schemes may not start corresponding application
After installing KB4489886, custom URI schemes for application protocol handlers may not start the corresponding application for local intranet and trusted sites security zones on Internet Explorer.
Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 8.1; Windows 7, Service Pack 1 
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2; Windows Server 2008 R2 SP1
Workaround: Right-click the URL link to open it in a new window or tab, or enable Protected Mode in Internet Explorer for local intranet and trusted sites
1. Go to Tools > Internet options > Security.
2. Within Select a zone to view or change security settings, select Local intranet and then select Enable Protected Mode.
3. Select Trusted sites and then select Enable Protected Mode.
4. Select OK.
You must restart the browser after making these changes.
Next steps: Microsoft is working on a resolution and will provide an update in an upcoming release.

Back to top
OS Build 16299.1029

March 12, 2019
KB4489886
Mitigated
Last updated:
March 19, 2019
10:00 AM PT

Opened:
March 12, 2019
10:00 AM PT
End-user-defined characters (EUDC) may cause blue screen at startup
If you enable per font end-user-defined characters (EUDC), the system may stop working and a blue screen may appear at startup. This is not a common setting in non-Asian regions.
Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016
Resolution: This issue is resolved in KB4493441.

Back to top
OS Build 16299.1059

March 19, 2019
KB4489890
Resolved
KB4493441
Resolved:
April 09, 2019
10:00 AM PT

Opened:
March 19, 2019
10:00 AM PT
Stop error when attempting to start SSH from WSL
After applying KB4489886, a stop error occurs when attempting to start the Secure Shell (SSH) client program from Windows Subsystem for Linux (WSL) with agent forwarding enabled using a command line switch (ssh –A) or a configuration setting.
Affected platforms:
  • Client: Windows 10, version 1803; Windows 10, version 1709
  • Server: Windows Server, version 1803; Windows Server, version 1709
Resolution: This issue is resolved in KB4493441.

Back to top
OS Build 16299.1029

March 12, 2019
KB4489886
Resolved
KB4493441
Resolved:
April 09, 2019
10:00 AM PT

Opened:
March 12, 2019
10:00 AM PT
Custom URI schemes may not start corresponding application
After installing KB4489886, custom URI schemes for application protocol handlers may not start the corresponding application for local intranet and trusted sites security zones on Internet Explorer.

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 8.1; Windows 7, Service Pack 1 
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2; Windows Server 2008 R2 SP1

Workaround: Right-click the URL link to open it in a new window or tab, or enable Protected Mode in Internet Explorer for local intranet and trusted sites
1. Go to Tools > Internet options > Security.
2. Within Select a zone to view or change security settings, select Local intranet and then select Enable Protected Mode.
3. Select Trusted sites and then select Enable Protected Mode.
4. Select OK.
You must restart the browser after making these changes.

Next steps: Microsoft is working on a resolution and will provide an update in an upcoming release.

Back to top
OS Build 16299.1029

March 12, 2019
KB4489886
Mitigated
Last updated:
March 19, 2019
10:00 AM PT

Opened:
March 12, 2019
10:00 AM PT
End-user-defined characters (EUDC) may cause blue screen at startup
If you enable per font end-user-defined characters (EUDC), the system may stop working and a blue screen may appear at startup. This is not a common setting in non-Asian regions.

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016

Resolution: This issue is resolved in KB4493441.

Back to top
OS Build 16299.1059

March 19, 2019
KB4489890
Resolved
KB4493441
Resolved:
April 09, 2019
10:00 AM PT

Opened:
March 19, 2019
10:00 AM PT
Stop error when attempting to start SSH from WSL
After applying KB4489886, a stop error occurs when attempting to start the Secure Shell (SSH) client program from Windows Subsystem for Linux (WSL) with agent forwarding enabled using a command line switch (ssh –A) or a configuration setting.

Affected platforms:
  • Client: Windows 10, version 1803; Windows 10, version 1709
  • Server: Windows Server, version 1803; Windows Server, version 1709

Resolution: This issue is resolved in KB4493441.

Back to top
OS Build 16299.1029

March 12, 2019
KB4489886
Resolved
KB4493441
Resolved:
April 09, 2019
10:00 AM PT

Opened:
March 12, 2019
10:00 AM PT
" @@ -90,6 +90,6 @@ sections: - type: markdown text: " - +
DetailsOriginating updateStatusHistory
MSXML6 causes applications to stop responding if an exception was thrown
After installing KB4480978, MSXML6 causes applications to stop responding if an exception was thrown during node operations, such as appendChild(), insertBefore(), and moveNode().
The Group Policy editor may stop responding when editing a Group Policy Object (GPO) that contains Group Policy Preferences (GPP) for Internet Explorer 10 settings.
Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 8.1
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2
Resolution: This issue is resolved in KB4493441.

Back to top
OS Build 16299.904

January 08, 2019
KB4480978
Resolved
KB4493441
Resolved:
April 09, 2019
10:00 AM PT

Opened:
January 08, 2019
10:00 AM PT
MSXML6 causes applications to stop responding if an exception was thrown
After installing KB4480978, MSXML6 causes applications to stop responding if an exception was thrown during node operations, such as appendChild(), insertBefore(), and moveNode().

The Group Policy editor may stop responding when editing a Group Policy Object (GPO) that contains Group Policy Preferences (GPP) for Internet Explorer 10 settings.

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 8.1
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2

Resolution: This issue is resolved in KB4493441.

Back to top
OS Build 16299.904

January 08, 2019
KB4480978
Resolved
KB4493441
Resolved:
April 09, 2019
10:00 AM PT

Opened:
January 08, 2019
10:00 AM PT
" diff --git a/windows/release-information/status-windows-10-1803.yml b/windows/release-information/status-windows-10-1803.yml index 512f32f9bb..16bc56e3c4 100644 --- a/windows/release-information/status-windows-10-1803.yml +++ b/windows/release-information/status-windows-10-1803.yml @@ -80,11 +80,11 @@ sections: - type: markdown text: " - - + - - + +
DetailsOriginating updateStatusHistory
Custom URI schemes may not start corresponding application
After installing KB4489868, custom URI schemes for application protocol handlers may not start the corresponding application for local intranet and trusted sites security zones on Internet Explorer. 
Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 8.1; Windows 7, Service Pack 1 
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2; Windows Server 2008 R2 SP1
Workaround: Right-click the URL link to open it in a new window or tab, or enable Protected Mode in Internet Explorer for local intranet and trusted sites
  1. Go to Tools > Internet options > Security 
  2. Within Select a zone to view or change security settings, select Local intranet and then select Enable Protected Mode.
  3. Select Trusted sites and then select Enable Protected Mode
  4. Select OK
 You must restart the browser after making these changes. 
 
Next steps: Microsoft is working on a resolution and will provide an update in an upcoming release. 

Back to top
OS Build 17134.648

March 12, 2019
KB4489868
Mitigated
Last updated:
March 19, 2019
10:00 AM PT

Opened:
March 12, 2019
10:00 AM PT
Issue using PXE to start a device from WDS
After installing KB4489868, there may be issues using the Preboot Execution Environment (PXE) to start a device from a Windows Deployment Services (WDS) server configured to use Variable Window Extension. This may cause the connection to the WDS server to terminate prematurely while downloading the image. This issue does not affect clients or devices that are not using Variable Window Extension. 
Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10 Enterprise LTSC 2016; Windows 8.1
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server 2016; Windows Server 2012 R2
Workaround: To mitigate the issue, disable the Variable Window Extension on WDS server using one of the following options:
Option 1: 
Open an Administrator Command prompt and type the following:  
Wdsutil /Set-TransportServer /EnableTftpVariableWindowExtension:No
+      
Custom URI schemes may not start corresponding application
After installing KB4489868, custom URI schemes for application protocol handlers may not start the corresponding application for local intranet and trusted sites security zones on Internet Explorer. 

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 8.1; Windows 7, Service Pack 1 
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2; Windows Server 2008 R2 SP1

Workaround: Right-click the URL link to open it in a new window or tab, or enable Protected Mode in Internet Explorer for local intranet and trusted sites
  1. Go to Tools > Internet options > Security 
  2. Within Select a zone to view or change security settings, select Local intranet and then select Enable Protected Mode.
  3. Select Trusted sites and then select Enable Protected Mode
  4. Select OK
 You must restart the browser after making these changes. 
 
Next steps: Microsoft is working on a resolution and will provide an update in an upcoming release. 

Back to top
OS Build 17134.648

March 12, 2019
KB4489868
Mitigated
Last updated:
March 19, 2019
10:00 AM PT

Opened:
March 12, 2019
10:00 AM PT
Issue using PXE to start a device from WDS
After installing KB4489868, there may be issues using the Preboot Execution Environment (PXE) to start a device from a Windows Deployment Services (WDS) server configured to use Variable Window Extension. This may cause the connection to the WDS server to terminate prematurely while downloading the image. This issue does not affect clients or devices that are not using Variable Window Extension. 

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10 Enterprise LTSC 2016; Windows 8.1
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server 2016; Windows Server 2012 R2

Workaround: To mitigate the issue, disable the Variable Window Extension on WDS server using one of the following options:
Option 1: 
Open an Administrator Command prompt and type the following:  
Wdsutil /Set-TransportServer /EnableTftpVariableWindowExtension:No
 
 Option 2: 
Use the Windows Deployment Services UI to make the following adjustment:  
  1. Open Windows Deployment Services from Windows Administrative Tools. 
  2. Expand Servers and right-click a WDS server. 
  3. Open its properties and clear the?Enable Variable Window Extension?box on the TFTP tab.  
Option 3: 
Set the following registry value to 0:  
HKLM\\System\\CurrentControlSet\\Services\\WDSServer\\Providers\\WDSTFTP\\EnableVariableWindowExtension  
Restart the WDSServer service after disabling the Variable Window Extension. 
 
Next steps: Microsoft is working on a resolution and will provide an update in an upcoming release. 

Back to top
OS Build 17134.648

March 12, 2019
KB4489868
Mitigated
Last updated:
March 19, 2019
10:00 AM PT

Opened:
March 12, 2019
10:00 AM PT
End-user-defined characters (EUDC) may cause blue screen at startup
If you enable per font end-user-defined characters (EUDC), the system may stop working and a blue screen may appear at startup. This is not a common setting in non-Asian regions. 
Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016
 
Resolution: This issue was resolved in KB4493464

Back to top
OS Build 17134.677

March 19, 2019
KB4489894
Resolved
KB4493464
Resolved:
April 09, 2019
10:00 AM PT

Opened:
March 19, 2019
10:00 AM PT
Stop error when attempting to start SSH from WSL
After applying KB4489868, a stop error occurs when attempting to start the Secure Shell (SSH) client program from Windows Subsystem for Linux (WSL) with agent forwarding enabled using a command line switch (ssh -A) or a configuration setting.
Affected platforms:
  • Client: Windows 10, version 1803; Windows 10, version 1709
  • Server: Windows Server, version 1803; Windows Server, version 1709
Resolution: This issue was resolved in KB4493464.

Back to top
OS Build 17134.648

March 12, 2019
KB4489868
Resolved
KB4493464
Resolved:
April 09, 2019
10:00 AM PT

Opened:
March 12, 2019
10:00 AM PT
End-user-defined characters (EUDC) may cause blue screen at startup
If you enable per font end-user-defined characters (EUDC), the system may stop working and a blue screen may appear at startup. This is not a common setting in non-Asian regions. 

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016
 
Resolution: This issue was resolved in KB4493464

Back to top
OS Build 17134.677

March 19, 2019
KB4489894
Resolved
KB4493464
Resolved:
April 09, 2019
10:00 AM PT

Opened:
March 19, 2019
10:00 AM PT
Stop error when attempting to start SSH from WSL
After applying KB4489868, a stop error occurs when attempting to start the Secure Shell (SSH) client program from Windows Subsystem for Linux (WSL) with agent forwarding enabled using a command line switch (ssh -A) or a configuration setting.

Affected platforms:
  • Client: Windows 10, version 1803; Windows 10, version 1709
  • Server: Windows Server, version 1803; Windows Server, version 1709

Resolution: This issue was resolved in KB4493464.

Back to top
OS Build 17134.648

March 12, 2019
KB4489868
Resolved
KB4493464
Resolved:
April 09, 2019
10:00 AM PT

Opened:
March 12, 2019
10:00 AM PT
" @@ -93,6 +93,6 @@ sections: - type: markdown text: " - +
DetailsOriginating updateStatusHistory
MSXML6 may cause applications to stop responding
After installing KB4480966, MSXML6 causes applications to stop responding if an exception was thrown during node operations, such as appendChild(), insertBefore(), and moveNode().
The Group Policy editor may stop responding when editing a Group Policy Object (GPO) that contains Group Policy Preferences (GPP) for Internet Explorer 10 settings.
Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 8.1
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2
Resolution: This issue was resolved in KB4493464

Back to top
OS Build 17134.523

January 08, 2019
KB4480966
Resolved
KB4493464
Resolved:
April 09, 2019
10:00 AM PT

Opened:
January 08, 2019
10:00 AM PT
MSXML6 may cause applications to stop responding
After installing KB4480966, MSXML6 causes applications to stop responding if an exception was thrown during node operations, such as appendChild(), insertBefore(), and moveNode().

The Group Policy editor may stop responding when editing a Group Policy Object (GPO) that contains Group Policy Preferences (GPP) for Internet Explorer 10 settings.

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 8.1
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2

Resolution: This issue was resolved in KB4493464

Back to top
OS Build 17134.523

January 08, 2019
KB4480966
Resolved
KB4493464
Resolved:
April 09, 2019
10:00 AM PT

Opened:
January 08, 2019
10:00 AM PT
" diff --git a/windows/release-information/status-windows-10-1809-and-windows-server-2019.yml b/windows/release-information/status-windows-10-1809-and-windows-server-2019.yml index b955fcfefb..f42f97e4cc 100644 --- a/windows/release-information/status-windows-10-1809-and-windows-server-2019.yml +++ b/windows/release-information/status-windows-10-1809-and-windows-server-2019.yml @@ -87,7 +87,7 @@ sections: - type: markdown text: " - +
DetailsOriginating updateStatusHistory
End-user-defined characters (EUDC) may cause blue screen at startup
If you enable per font end-user-defined characters (EUDC), the system will stop working and a blue screen may appear at startup. This is not a common setting in non-Asian regions.
Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016
Workaround: To avoid this issue, don't enable per font EUDC. As an alternative, you can edit the registry to mitigate this issue; for more information, see KB4496149.
Resolved: This issue was resolved in KB4493509.

Back to top
OS Build 17763.404

April 02, 2019
KB4490481
Resolved
KB4493509
Resolved:
April 09, 2019
10:00 AM PT

Opened:
April 02, 2019
10:00 AM PT
End-user-defined characters (EUDC) may cause blue screen at startup
If you enable per font end-user-defined characters (EUDC), the system will stop working and a blue screen may appear at startup. This is not a common setting in non-Asian regions.

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016

Workaround: To avoid this issue, don't enable per font EUDC. As an alternative, you can edit the registry to mitigate this issue; for more information, see KB4496149.

Resolved: This issue was resolved in KB4493509.

Back to top
OS Build 17763.404

April 02, 2019
KB4490481
Resolved
KB4493509
Resolved:
April 09, 2019
10:00 AM PT

Opened:
April 02, 2019
10:00 AM PT
" @@ -96,10 +96,10 @@ sections: - type: markdown text: " - - - + + +
DetailsOriginating updateStatusHistory
Custom URI schemes may not start corresponding application
After installing KB4489899, custom URI schemes for application protocol handlers may not start the corresponding application for local intranet and trusted sites security zones on Internet Explorer.
Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 8.1; Windows 7, Service Pack 1 
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2; Windows Server 2008 R2 SP1
Workaround: Right-click the URL link to open it in a new window or tab, or enable Protected Mode in Internet Explorer for local intranet and trusted sites
  1. Go to Tools > Internet options > Security.
  2. Within Select a zone to view of change security settings, select Local intranet and then select Enable Protected Mode.
  3. Select Trusted Sites and then select Enable Protected Mode
  4. Select OK.
You must restart the browser after making these changes. 
 
Next steps: Microsoft is working on a resolution and will provide an update in an upcoming release. 

Back to top
OS Build 17763.379

March 12, 2019
KB4489899
Mitigated
Last updated:
April 02, 2019
10:00 AM PT

Opened:
March 12, 2019
10:00 AM PT
Issue using PXE to start a device from WDS
After installing KB4489899, there may be issues using the Preboot Execution Environment (PXE) to start a device from a Windows Deployment Services (WDS) server configured to use Variable Window Extension. This may cause the connection to the WDS server to terminate prematurely while downloading the image. This issue does not affect clients or devices that are not using Variable Window Extension. 
Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10 Enterprise LTSC 2016; Windows 8.1
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server 2016; Windows Server 2012 R2
Workaround: To mitigate the issue, disable the Variable Window Extension on WDS server using one of the following options:
Option 1:
Open an Administrator Command prompt and type the following:
Wdsutil /Set-TransportServer /EnableTftpVariableWindowExtension:No 
-
Option 2:
Use the Windows Deployment Services UI to make the following adjustment: 
  1. Open Windows Deployment Services from Windows Administrative Tools. 
  2. Expand Servers and right-click a WDS server. 
  3. Open its properties and clear the Enable Variable Window Extension box on the TFTP tab.
Option 3:
Set the following registry value to 0:  
HKLM\\System\\CurrentControlSet\\Services\\WDSServer\\Providers\\WDSTFTP\\EnableVariableWindowExtension  
Restart the WDSServer service after disabling the Variable Window Extension. 
Next steps: Microsoft is working on a resolution and will provide an update in an upcoming release. 

Back to top
OS Build 17763.379

March 12, 2019
KB4489899
Mitigated
Last updated:
April 02, 2019
10:00 AM PT

Opened:
March 12, 2019
10:00 AM PT
Apps may stop working after selecting an audio output device other than the default
After installing KB4482887 on machines that have multiple audio devices, applications that provide advanced options for internal or external audio output devices may stop working unexpectedly. This issue occurs for users that select an audio output device different from the \"Default Audio Device\". Examples of applications that may stop working include: 
  • Windows Media Player 
  • Realtek HD Audio Manager 
  • Sound Blaster Control Panel 
Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019
  • Server: Windows Server, version 1809; Windows Server 2019
Workaround: As a temporary solution, select the \"Default Audio Device\" in the options provided by the application; please refer to the application's user manual for details. 
For example, to set the Default Audio Device in Windows Media Player: 
  1. Open Windows Media Player > Tools > Options > Devices.
  2. Select the device and choose Properties.
  3. On the next dialog, from the drop-down menu under Select the Audio Device, choose Default Audio Device from the list. 
You can then send audio from the application to the audio device you want in the per-application audio settings found under Settings > System > Sound > App Volume and device preferences.
Resolved: This issue was resolved in KB4490481

Back to top
OS Build 17763.348

March 01, 2019
KB4482887
Resolved
KB4490481
Resolved:
April 02, 2019
10:00 AM PT

Opened:
March 01, 2019
10:00 AM PT
Custom URI schemes may not start corresponding application
After installing KB4489899, custom URI schemes for application protocol handlers may not start the corresponding application for local intranet and trusted sites security zones on Internet Explorer.

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 8.1; Windows 7, Service Pack 1 
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2; Windows Server 2008 R2 SP1

Workaround: Right-click the URL link to open it in a new window or tab, or enable Protected Mode in Internet Explorer for local intranet and trusted sites
  1. Go to Tools > Internet options > Security.
  2. Within Select a zone to view of change security settings, select Local intranet and then select Enable Protected Mode.
  3. Select Trusted Sites and then select Enable Protected Mode
  4. Select OK.
You must restart the browser after making these changes. 
 
Next steps: Microsoft is working on a resolution and will provide an update in an upcoming release. 

Back to top
OS Build 17763.379

March 12, 2019
KB4489899
Mitigated
Last updated:
April 02, 2019
10:00 AM PT

Opened:
March 12, 2019
10:00 AM PT
Issue using PXE to start a device from WDS
After installing KB4489899, there may be issues using the Preboot Execution Environment (PXE) to start a device from a Windows Deployment Services (WDS) server configured to use Variable Window Extension. This may cause the connection to the WDS server to terminate prematurely while downloading the image. This issue does not affect clients or devices that are not using Variable Window Extension. 

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10 Enterprise LTSC 2016; Windows 8.1
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server 2016; Windows Server 2012 R2

Workaround: To mitigate the issue, disable the Variable Window Extension on WDS server using one of the following options:
Option 1:
Open an Administrator Command prompt and type the following:
Wdsutil /Set-TransportServer /EnableTftpVariableWindowExtension:No 
+
Option 2:
Use the Windows Deployment Services UI to make the following adjustment: 
  1. Open Windows Deployment Services from Windows Administrative Tools. 
  2. Expand Servers and right-click a WDS server. 
  3. Open its properties and clear the Enable Variable Window Extension box on the TFTP tab.
Option 3:
Set the following registry value to 0:  
HKLM\\System\\CurrentControlSet\\Services\\WDSServer\\Providers\\WDSTFTP\\EnableVariableWindowExtension  
Restart the WDSServer service after disabling the Variable Window Extension. 

Next steps: Microsoft is working on a resolution and will provide an update in an upcoming release. 

Back to top
OS Build 17763.379

March 12, 2019
KB4489899
Mitigated
Last updated:
April 02, 2019
10:00 AM PT

Opened:
March 12, 2019
10:00 AM PT
Apps may stop working after selecting an audio output device other than the default
After installing KB4482887 on machines that have multiple audio devices, applications that provide advanced options for internal or external audio output devices may stop working unexpectedly. This issue occurs for users that select an audio output device different from the \"Default Audio Device\". Examples of applications that may stop working include: 
  • Windows Media Player 
  • Realtek HD Audio Manager 
  • Sound Blaster Control Panel 

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019
  • Server: Windows Server, version 1809; Windows Server 2019

Workaround: As a temporary solution, select the \"Default Audio Device\" in the options provided by the application; please refer to the application's user manual for details. 
For example, to set the Default Audio Device in Windows Media Player: 
  1. Open Windows Media Player > Tools > Options > Devices.
  2. Select the device and choose Properties.
  3. On the next dialog, from the drop-down menu under Select the Audio Device, choose Default Audio Device from the list. 
You can then send audio from the application to the audio device you want in the per-application audio settings found under Settings > System > Sound > App Volume and device preferences.

Resolved: This issue was resolved in KB4490481

Back to top
OS Build 17763.348

March 01, 2019
KB4482887
Resolved
KB4490481
Resolved:
April 02, 2019
10:00 AM PT

Opened:
March 01, 2019
10:00 AM PT
" @@ -108,8 +108,8 @@ sections: - type: markdown text: " - - + +
DetailsOriginating updateStatusHistory
Internet Explorer 11 authentication issue with multiple concurrent logons
After installing the February 12, 2019 update (KB4487044), Internet Explorer 11 and other applications that use WININET.DLL may have authentication issues. This occurs when two or more people use the same user account for multiple, concurrent login sessions on the same Windows Server machine, including Remote Desktop Protocol (RDP) and Terminal Server logons. Symptoms reported by customers include, but may not be limited to:  
  • Cache size and location show zero or empty. 
  • Keyboard shortcuts may not work properly. 
  • Webpages may intermittently fail to load or render correctly. 
  • Issues with credential prompts. 
  • Issues when downloading files. 
Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10 Enterprise LTSC 2016; Windows 8.1; Windows 7, Service Pack 1
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server 2016; Windows Server 2012 R2; Windows Server 2008 R2 SP1
 
Resolved: This issue was resolved in KB4493509

Back to top
OS Build 17763.253

January 08, 2019
KB4480116
Resolved
KB4493509
Resolved:
April 09, 2019
10:00 AM PT

Opened:
January 08, 2019
10:00 AM PT
MSXML6 may cause applications to stop responding
After installing KB4480116, MSXML6 causes applications to stop responding if an exception was thrown during node operations, such as appendChild(), insertBefore(), and moveNode().
 
The Group Policy editor may stop responding when editing a Group Policy Object (GPO) that contains Group Policy Preferences (GPP) for Internet Explorer 10 settings. 
Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 8.1
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2
Resolved: This issue was resolved in KB4493509

Back to top
OS Build 17763.253

January 08, 2019
KB4480116
Resolved
KB4493509
Resolved:
April 09, 2019
10:00 AM PT

Opened:
January 08, 2019
10:00 AM PT
Internet Explorer 11 authentication issue with multiple concurrent logons
After installing the February 12, 2019 update (KB4487044), Internet Explorer 11 and other applications that use WININET.DLL may have authentication issues. This occurs when two or more people use the same user account for multiple, concurrent login sessions on the same Windows Server machine, including Remote Desktop Protocol (RDP) and Terminal Server logons. Symptoms reported by customers include, but may not be limited to:  
  • Cache size and location show zero or empty. 
  • Keyboard shortcuts may not work properly. 
  • Webpages may intermittently fail to load or render correctly. 
  • Issues with credential prompts. 
  • Issues when downloading files. 

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10 Enterprise LTSC 2016; Windows 8.1; Windows 7, Service Pack 1
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server 2016; Windows Server 2012 R2; Windows Server 2008 R2 SP1
 
Resolved: This issue was resolved in KB4493509

Back to top
OS Build 17763.253

January 08, 2019
KB4480116
Resolved
KB4493509
Resolved:
April 09, 2019
10:00 AM PT

Opened:
January 08, 2019
10:00 AM PT
MSXML6 may cause applications to stop responding
After installing KB4480116, MSXML6 causes applications to stop responding if an exception was thrown during node operations, such as appendChild(), insertBefore(), and moveNode().
 
The Group Policy editor may stop responding when editing a Group Policy Object (GPO) that contains Group Policy Preferences (GPP) for Internet Explorer 10 settings. 

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 8.1
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2

Resolved: This issue was resolved in KB4493509

Back to top
OS Build 17763.253

January 08, 2019
KB4480116
Resolved
KB4493509
Resolved:
April 09, 2019
10:00 AM PT

Opened:
January 08, 2019
10:00 AM PT
" @@ -118,6 +118,6 @@ sections: - type: markdown text: " - +
DetailsOriginating updateStatusHistory
Audio not working on monitors or TV connected to a PC via HDMI, USB, or DisplayPort
Upgrade block: Microsoft has identified issues with certain new Intel display drivers. Intel inadvertently released versions of its display driver (versions 24.20.100.6344, 24.20.100.6345) to OEMs that accidentally turned on unsupported features in Windows. 
 
As a result, after updating to Windows 10, version 1809, audio playback from a monitor or television connected to a PC via HDMI, USB-C, or a DisplayPort may not function correctly on devices with these drivers.
Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019
  • Server: Windows Server, version 1809; Windows Server 2019 
Next steps: Intel has released updated drivers to OEM device manufacturers. OEMs need to make the updated driver available via Windows Update.
For more information, see the Intel Customer Support article.
Note: This Intel display driver issue is different from the Intel Smart Sound Technology driver (version 09.21.00.3755) audio issue previously documented.

Back to top
OS Build 17763.134

November 13, 2018
KB4467708
Mitigated
Last updated:
March 15, 2019
12:00 PM PT

Opened:
November 13, 2018
10:00 AM PT
Audio not working on monitors or TV connected to a PC via HDMI, USB, or DisplayPort
Upgrade block: Microsoft has identified issues with certain new Intel display drivers. Intel inadvertently released versions of its display driver (versions 24.20.100.6344, 24.20.100.6345) to OEMs that accidentally turned on unsupported features in Windows. 
 
As a result, after updating to Windows 10, version 1809, audio playback from a monitor or television connected to a PC via HDMI, USB-C, or a DisplayPort may not function correctly on devices with these drivers.

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019
  • Server: Windows Server, version 1809; Windows Server 2019 

Next steps: Intel has released updated drivers to OEM device manufacturers. OEMs need to make the updated driver available via Windows Update.

For more information, see the Intel Customer Support article.

Note: This Intel display driver issue is different from the Intel Smart Sound Technology driver (version 09.21.00.3755) audio issue previously documented.

Back to top
OS Build 17763.134

November 13, 2018
KB4467708
Mitigated
Last updated:
March 15, 2019
12:00 PM PT

Opened:
November 13, 2018
10:00 AM PT
" diff --git a/windows/release-information/status-windows-7-and-windows-server-2008-r2-sp1.yml b/windows/release-information/status-windows-7-and-windows-server-2008-r2-sp1.yml index d2491901c1..1799cfff22 100644 --- a/windows/release-information/status-windows-7-and-windows-server-2008-r2-sp1.yml +++ b/windows/release-information/status-windows-7-and-windows-server-2008-r2-sp1.yml @@ -85,10 +85,10 @@ sections: - type: markdown text: " - - - - + + + +
DetailsOriginating updateStatusHistory
System may be unresponsive after restart if Avira antivirus software installed.
Microsoft and Avira have identified an issue on devices with Avira antivirus software installed that may cause the system to become unresponsive upon restart after installing KB4493472.
Microsoft has temporarily blocked devices from receiving this update if Avira antivirus software is installed.
Next steps: We are presently investigating this issue with Avira and will provide an update when available.

Back to top
April 09, 2019
KB4493472
Investigating
Last updated:
April 09, 2019
10:00 AM PT

Opened:
April 09, 2019
10:00 AM PT
System unresponsive after restart if Sophos Endpoint Protection installed.
Microsoft and Sophos have identified an issue on devices with Sophos Endpoint Protection installed and managed by either Sophos Central or Sophos Enterprise Console (SEC) that may cause the system to become unresponsive upon restart after installing KB4493472.
Microsoft has temporarily blocked devices from receiving this update if the Sophos Endpoint is installed until a solution is available.
Guidance for Sophos Endpoint and Sophos Enterprise Console customers can be found in the Sophos support article.

Back to top
April 09, 2019
KB4493472
Mitigated
Last updated:
April 09, 2019
10:00 AM PT

Opened:
April 09, 2019
10:00 AM PT
System may be unresponsive after restart if ArcaBit antivirus software installed.
Microsoft and ArcaBit have identified an issue on devices with ArcaBit antivirus software installed that may cause the system to become unresponsive upon restart after installing KB4493472.
Microsoft has temporarily blocked devices from receiving this update if ArcaBit antivirus software is installed.
ArcaBit has released an update to address this issue. For more information, see the Arcabit support article.

Back to top
April 09, 2019
KB4493472
Mitigated
Last updated:
April 09, 2019
10:00 AM PT

Opened:
April 09, 2019
10:00 AM PT
Devices may not respond at login or Welcome screen if running certain Avast software.
Microsoft and Avast have identified an issue on devices running Avast for Business, Avast CloudCare, and AVG Business Edition antivirus software after you install KB4493472 and restart. Devices may become unresponsive at the login or Welcome screen. Additionally, you may be unable to log in or log in after an extended period of time.
Affected platforms: 
  • Client: Windows 8.1; Windows 7, Service Pack 1 
  • Server: Windows Server 2012 R2; Windows Server 2008 R2 SP1 
Resolution: Avast has released emergency updates to address this issue. For more information and AV update schedule, see the Avast support KB article.

Back to top
April 09, 2019
KB4493472
Resolved
Resolved:
April 09, 2019
10:00 AM PT

Opened:
April 09, 2019
10:00 AM PT
System may be unresponsive after restart if Avira antivirus software installed.
Microsoft and Avira have identified an issue on devices with Avira antivirus software installed that may cause the system to become unresponsive upon restart after installing KB4493472.

Microsoft has temporarily blocked devices from receiving this update if Avira antivirus software is installed.

Next steps: We are presently investigating this issue with Avira and will provide an update when available.

Back to top
April 09, 2019
KB4493472
Investigating
Last updated:
April 09, 2019
10:00 AM PT

Opened:
April 09, 2019
10:00 AM PT
System unresponsive after restart if Sophos Endpoint Protection installed.
Microsoft and Sophos have identified an issue on devices with Sophos Endpoint Protection installed and managed by either Sophos Central or Sophos Enterprise Console (SEC) that may cause the system to become unresponsive upon restart after installing KB4493472.

Microsoft has temporarily blocked devices from receiving this update if the Sophos Endpoint is installed until a solution is available.

Guidance for Sophos Endpoint and Sophos Enterprise Console customers can be found in the Sophos support article.

Back to top
April 09, 2019
KB4493472
Mitigated
Last updated:
April 09, 2019
10:00 AM PT

Opened:
April 09, 2019
10:00 AM PT
System may be unresponsive after restart if ArcaBit antivirus software installed.
Microsoft and ArcaBit have identified an issue on devices with ArcaBit antivirus software installed that may cause the system to become unresponsive upon restart after installing KB4493472.

Microsoft has temporarily blocked devices from receiving this update if ArcaBit antivirus software is installed.

ArcaBit has released an update to address this issue. For more information, see the Arcabit support article.

Back to top
April 09, 2019
KB4493472
Mitigated
Last updated:
April 09, 2019
10:00 AM PT

Opened:
April 09, 2019
10:00 AM PT
Devices may not respond at login or Welcome screen if running certain Avast software.
Microsoft and Avast have identified an issue on devices running Avast for Business, Avast CloudCare, and AVG Business Edition antivirus software after you install KB4493472 and restart. Devices may become unresponsive at the login or Welcome screen. Additionally, you may be unable to log in or log in after an extended period of time.

Affected platforms: 
  • Client: Windows 8.1; Windows 7, Service Pack 1 
  • Server: Windows Server 2012 R2; Windows Server 2008 R2 SP1 

Resolution: Avast has released emergency updates to address this issue. For more information and AV update schedule, see the Avast support KB article.

Back to top
April 09, 2019
KB4493472
Resolved
Resolved:
April 09, 2019
10:00 AM PT

Opened:
April 09, 2019
10:00 AM PT
" @@ -97,9 +97,9 @@ sections: - type: markdown text: " - - - + + +
DetailsOriginating updateStatusHistory
Authentication may fail for services after the Kerberos ticket expires.
After installing KB4489878, some customers report that authentication fails for services that require unconstrained delegation after the Kerberos ticket expires (the default is 10 hours). For example, the SQL server service fails.
Workaround: To mitigate this issue, use one of the following options:
  • Option 1: Purge the Kerberos tickets on the application server. After the Kerberos ticket expires, the issue will occur again, and you must purge the tickets again.
  • Option 2: If purging does not mitigate the issue, restart the application; for example, restart the Internet Information Services (IIS) app pool associated with the SQL server.
  • Option 3: Use constrained delegation.
Next steps: Microsoft is working on a resolution and will provide an update in an upcoming release.

Back to top
March 12, 2019
KB4489878
Mitigated
Last updated:
April 09, 2019
10:00 AM PT

Opened:
March 12, 2019
10:00 AM PT
Custom URI schemes may not start corresponding application.
After installing KB4489878, custom URI schemes for application protocol handlers may not start the corresponding application for local intranet and trusted sites on Internet Explorer.
Affected platforms: 
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 8.1; Windows 7, Service Pack 1 
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2; Windows Server 2008 R2 SP1 
Resolution: This issue is resolved in KB4493472.

Back to top
March 12, 2019
KB4489878
Resolved
KB4493472
Resolved:
April 09, 2019
10:00 AM PT

Opened:
March 12, 2019
10:00 AM PT
NETDOM.EXE fails to run.
After installing KB4489878, NETDOM.EXE fails to run, and the on-screen error, “The command failed to complete successfully.” appears.
Affected platforms: 
  • Client: Windows 7, Service Pack 1 
  • Server: Windows Server 2008 R2 SP1 
Resolution: This issue is resolved in KB4493472.

Back to top
March 12, 2019
KB4489878
Resolved
KB4493472
Resolved:
April 09, 2019
10:00 AM PT

Opened:
March 12, 2019
10:00 AM PT
Authentication may fail for services after the Kerberos ticket expires.
After installing KB4489878, some customers report that authentication fails for services that require unconstrained delegation after the Kerberos ticket expires (the default is 10 hours). For example, the SQL server service fails.

Workaround: To mitigate this issue, use one of the following options:

  • Option 1: Purge the Kerberos tickets on the application server. After the Kerberos ticket expires, the issue will occur again, and you must purge the tickets again.
  • Option 2: If purging does not mitigate the issue, restart the application; for example, restart the Internet Information Services (IIS) app pool associated with the SQL server.
  • Option 3: Use constrained delegation.

Next steps: Microsoft is working on a resolution and will provide an update in an upcoming release.

Back to top
March 12, 2019
KB4489878
Mitigated
Last updated:
April 09, 2019
10:00 AM PT

Opened:
March 12, 2019
10:00 AM PT
Custom URI schemes may not start corresponding application.
After installing KB4489878, custom URI schemes for application protocol handlers may not start the corresponding application for local intranet and trusted sites on Internet Explorer.

Affected platforms: 
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 8.1; Windows 7, Service Pack 1 
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2; Windows Server 2008 R2 SP1 

Resolution: This issue is resolved in KB4493472.

Back to top
March 12, 2019
KB4489878
Resolved
KB4493472
Resolved:
April 09, 2019
10:00 AM PT

Opened:
March 12, 2019
10:00 AM PT
NETDOM.EXE fails to run.
After installing KB4489878, NETDOM.EXE fails to run, and the on-screen error, “The command failed to complete successfully.” appears.

Affected platforms: 
  • Client: Windows 7, Service Pack 1 
  • Server: Windows Server 2008 R2 SP1 

Resolution: This issue is resolved in KB4493472.

Back to top
March 12, 2019
KB4489878
Resolved
KB4493472
Resolved:
April 09, 2019
10:00 AM PT

Opened:
March 12, 2019
10:00 AM PT
" @@ -108,8 +108,8 @@ sections: - type: markdown text: " - - - + + +
DetailsOriginating updateStatusHistory
Local Administrators unable to remotely access shares.
Local users who are part of the local Administrators group may not be able to remotely access shares on Windows Server 2008 R2 and Windows 7 machines after installing KB4480970. This does not affect domain accounts in the local Administrators group.
 
Affected platforms: 
  • Client: Windows 7, Service Pack 1 
  • Server: Windows Server 2008 R2 SP1 
Resolution: This issue is resolved in KB4487345.

Back to top
January 08, 2019
KB4480970
Resolved
KB4487345
Resolved:
January 11, 2019
02:00 PM PT

Opened:
January 08, 2019
10:00 AM PT
Virtual machines fail to restore.
After installing KB4480970, virtual machines (VM) may fail to restore successfully if the VM has been saved and restored once before. The error message is, “Failed to restore the virtual machine state: Cannot restore this virtual machine because the saved state data cannot be read. Delete the saved state data and then try to start the virtual machine. (0xC0370027).”
This affects AMD Bulldozer Family 15h, AMD Jaguar Family 16h, and AMD Puma Family 16h (second generation) microarchitectures.
Affected platforms: 
  • Client: Windows 7, Service Pack 1 
  • Server: Windows Server 2008 R2 SP1 
Resolution: This issue is resolved in KB4490511.

Back to top
January 08, 2019
KB4480970
Resolved
KB4490511
Resolved:
February 19, 2019
02:00 PM PT

Opened:
January 08, 2019
10:00 AM PT
Internet Explorer 11 authentication issue with multiple concurrent logons.
After installing KB4480970, Internet Explorer 11 and other applications that use WININET.DLL may have authentication issues. This occurs when two or more people use the same user account for multiple, concurrent login sessions on the same Windows Server machine, including Remote Desktop Protocol (RDP) and Terminal Server logons. Symptoms reported by customers include, but may not be limited to:
  • Cache size and location show zero or empty.
  • Keyboard shortcuts may not work properly.
  • Webpages may intermittently fail to load or render correctly.
  • Issues with credential prompts.
  • Issues when downloading files.
Affected platforms: 
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10 Enterprise LTSC 2016; Windows 8.1; Windows 7, Service Pack 1 
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server 2016; Windows Server 2012 R2; Windows Server 2008 R2 SP1 
Resolution: This issue is resolved in KB4493472.

Back to top
January 08, 2019
KB4480970
Resolved
KB4493472
Resolved:
April 09, 2019
10:00 AM PT

Opened:
January 08, 2019
10:00 AM PT
Local Administrators unable to remotely access shares.
Local users who are part of the local Administrators group may not be able to remotely access shares on Windows Server 2008 R2 and Windows 7 machines after installing KB4480970. This does not affect domain accounts in the local Administrators group.
 
Affected platforms: 
  • Client: Windows 7, Service Pack 1 
  • Server: Windows Server 2008 R2 SP1 

Resolution: This issue is resolved in KB4487345.

Back to top
January 08, 2019
KB4480970
Resolved
KB4487345
Resolved:
January 11, 2019
02:00 PM PT

Opened:
January 08, 2019
10:00 AM PT
Virtual machines fail to restore.
After installing KB4480970, virtual machines (VM) may fail to restore successfully if the VM has been saved and restored once before. The error message is, “Failed to restore the virtual machine state: Cannot restore this virtual machine because the saved state data cannot be read. Delete the saved state data and then try to start the virtual machine. (0xC0370027).”

This affects AMD Bulldozer Family 15h, AMD Jaguar Family 16h, and AMD Puma Family 16h (second generation) microarchitectures.

Affected platforms: 
  • Client: Windows 7, Service Pack 1 
  • Server: Windows Server 2008 R2 SP1 

Resolution: This issue is resolved in KB4490511.

Back to top
January 08, 2019
KB4480970
Resolved
KB4490511
Resolved:
February 19, 2019
02:00 PM PT

Opened:
January 08, 2019
10:00 AM PT
Internet Explorer 11 authentication issue with multiple concurrent logons.
After installing KB4480970, Internet Explorer 11 and other applications that use WININET.DLL may have authentication issues. This occurs when two or more people use the same user account for multiple, concurrent login sessions on the same Windows Server machine, including Remote Desktop Protocol (RDP) and Terminal Server logons. Symptoms reported by customers include, but may not be limited to:
  • Cache size and location show zero or empty.
  • Keyboard shortcuts may not work properly.
  • Webpages may intermittently fail to load or render correctly.
  • Issues with credential prompts.
  • Issues when downloading files.

Affected platforms: 
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10 Enterprise LTSC 2016; Windows 8.1; Windows 7, Service Pack 1 
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server 2016; Windows Server 2012 R2; Windows Server 2008 R2 SP1 

Resolution: This issue is resolved in KB4493472.

Back to top
January 08, 2019
KB4480970
Resolved
KB4493472
Resolved:
April 09, 2019
10:00 AM PT

Opened:
January 08, 2019
10:00 AM PT
" diff --git a/windows/release-information/status-windows-8.1-and-windows-server-2012-r2.yml b/windows/release-information/status-windows-8.1-and-windows-server-2012-r2.yml index 5a12e31361..d3150aecc8 100644 --- a/windows/release-information/status-windows-8.1-and-windows-server-2012-r2.yml +++ b/windows/release-information/status-windows-8.1-and-windows-server-2012-r2.yml @@ -85,11 +85,11 @@ sections: - type: markdown text: " - - - - - + + + + +
DetailsOriginating updateStatusHistory
System may be unresponsive after restart if Avira antivirus software installed
Microsoft and Avira have identified an issue on devices with Avira antivirus software installed that may cause the system to become unresponsive upon restart after installing KB4493446.
Microsoft has temporarily blocked devices from receiving this update if Avira antivirus software is installed.
Affected platforms: 
  • Client: Windows 8.1; Windows 7, Service Pack 1 
  • Server: Windows Server 2012 R2; Windows Server 2008 R2 SP1 
Next steps: We are presently investigating this issue with Avira and will provide an update when available.

Back to top
April 09, 2019
KB4493446
Investigating
Last updated:
April 09, 2019
10:00 AM PT

Opened:
April 09, 2019
10:00 AM PT
System unresponsive after restart if Sophos Endpoint Protection installed
Microsoft and Sophos have identified an issue on devices with Sophos Endpoint Protection installed and managed by either Sophos Central or Sophos Enterprise Console (SEC) that may cause the system to become unresponsive upon restart after installing KB4493446.
Microsoft has temporarily blocked devices from receiving this update if the Sophos Endpoint is installed until a solution is available.
Affected platforms: 
  • Client: Windows 8.1; Windows 7, Service Pack 1 
  • Server: Windows Server 2012 R2; Windows Server 2008 R2 SP1 
Guidance for Sophos Endpoint and Sophos Enterprise Console customers can be found in the Sophos support article.

Back to top
April 09, 2019
KB4493446
Mitigated
Last updated:
April 09, 2019
10:00 AM PT

Opened:
April 09, 2019
10:00 AM PT
System may be unresponsive after restart if ArcaBit antivirus software installed
Microsoft and ArcaBit have identified an issue on devices with ArcaBit antivirus software installed that may cause the system to become unresponsive upon restart after installing KB4493446.
Microsoft has temporarily blocked devices from receiving this update if ArcaBit antivirus software is installed.
Affected platforms: 
  • Client: Windows 8.1; Windows 7, Service Pack 1 
  • Server: Windows Server 2012 R2; Windows Server 2008 R2 SP1 
ArcaBit has released an update to address this issue. For more information, see the Arcabit support article.

Back to top
April 09, 2019
KB4493446
Mitigated
Last updated:
April 09, 2019
10:00 AM PT

Opened:
April 09, 2019
10:00 AM PT
Certain operations performed on on a Cluster Shared Volume may fail
Certain operations, such as rename, that you perform on files or folders that are on a Cluster Shared Volume (CSV) may fail with the error, “STATUS_BAD_IMPERSONATION_LEVEL (0xC00000A5)”. This occurs when you perform the operation on a CSV owner node from a process that doesn’t have administrator privilege.
Affected platforms: 
  • Client: Windows 8.1 
  • Server: Windows Server 2012 R2 
Workaround: Do one of the following:
  • Perform the operation from a process that has administrator privilege.
  • Perform the operation from a node that doesn’t have CSV ownership.
Next steps: Microsoft is working on a resolution and will provide an update in an upcoming release.

Back to top
April 09, 2019
KB4493446
Mitigated
Last updated:
April 09, 2019
10:00 AM PT

Opened:
April 09, 2019
10:00 AM PT
Devices may not respond at login or Welcome screen if running certain Avast software
Microsoft and Avast have identified an issue on devices running Avast for Business, Avast CloudCare, and AVG Business Edition antivirus software after you install KB4493446 and restart. Devices may become unresponsive at the login or Welcome screen. Additionally, you may be unable to log in or log in after an extended period of time.
Affected platforms: 
  • Client: Windows 8.1; Windows 7, Service Pack 1 
  • Server: Windows Server 2012 R2; Windows Server 2008 R2 SP1 
Resolution: Avast has released emergency updates to address this issue. For more information and AV update schedule, see the Avast support KB article.

Back to top
April 09, 2019
KB4493446
Resolved
Resolved:
April 09, 2019
10:00 AM PT

Opened:
April 09, 2019
10:00 AM PT
System may be unresponsive after restart if Avira antivirus software installed
Microsoft and Avira have identified an issue on devices with Avira antivirus software installed that may cause the system to become unresponsive upon restart after installing KB4493446.

Microsoft has temporarily blocked devices from receiving this update if Avira antivirus software is installed.

Affected platforms: 
  • Client: Windows 8.1; Windows 7, Service Pack 1 
  • Server: Windows Server 2012 R2; Windows Server 2008 R2 SP1 

Next steps: We are presently investigating this issue with Avira and will provide an update when available.

Back to top
April 09, 2019
KB4493446
Investigating
Last updated:
April 09, 2019
10:00 AM PT

Opened:
April 09, 2019
10:00 AM PT
System unresponsive after restart if Sophos Endpoint Protection installed
Microsoft and Sophos have identified an issue on devices with Sophos Endpoint Protection installed and managed by either Sophos Central or Sophos Enterprise Console (SEC) that may cause the system to become unresponsive upon restart after installing KB4493446.

Microsoft has temporarily blocked devices from receiving this update if the Sophos Endpoint is installed until a solution is available.

Affected platforms: 
  • Client: Windows 8.1; Windows 7, Service Pack 1 
  • Server: Windows Server 2012 R2; Windows Server 2008 R2 SP1 

Guidance for Sophos Endpoint and Sophos Enterprise Console customers can be found in the Sophos support article.

Back to top
April 09, 2019
KB4493446
Mitigated
Last updated:
April 09, 2019
10:00 AM PT

Opened:
April 09, 2019
10:00 AM PT
System may be unresponsive after restart if ArcaBit antivirus software installed
Microsoft and ArcaBit have identified an issue on devices with ArcaBit antivirus software installed that may cause the system to become unresponsive upon restart after installing KB4493446.

Microsoft has temporarily blocked devices from receiving this update if ArcaBit antivirus software is installed.

Affected platforms: 
  • Client: Windows 8.1; Windows 7, Service Pack 1 
  • Server: Windows Server 2012 R2; Windows Server 2008 R2 SP1 

ArcaBit has released an update to address this issue. For more information, see the Arcabit support article.

Back to top
April 09, 2019
KB4493446
Mitigated
Last updated:
April 09, 2019
10:00 AM PT

Opened:
April 09, 2019
10:00 AM PT
Certain operations performed on on a Cluster Shared Volume may fail
Certain operations, such as rename, that you perform on files or folders that are on a Cluster Shared Volume (CSV) may fail with the error, “STATUS_BAD_IMPERSONATION_LEVEL (0xC00000A5)”. This occurs when you perform the operation on a CSV owner node from a process that doesn’t have administrator privilege.

Affected platforms: 
  • Client: Windows 8.1 
  • Server: Windows Server 2012 R2 

Workaround: Do one of the following:

  • Perform the operation from a process that has administrator privilege.
  • Perform the operation from a node that doesn’t have CSV ownership.

Next steps: Microsoft is working on a resolution and will provide an update in an upcoming release.

Back to top
April 09, 2019
KB4493446
Mitigated
Last updated:
April 09, 2019
10:00 AM PT

Opened:
April 09, 2019
10:00 AM PT
Devices may not respond at login or Welcome screen if running certain Avast software
Microsoft and Avast have identified an issue on devices running Avast for Business, Avast CloudCare, and AVG Business Edition antivirus software after you install KB4493446 and restart. Devices may become unresponsive at the login or Welcome screen. Additionally, you may be unable to log in or log in after an extended period of time.

Affected platforms: 
  • Client: Windows 8.1; Windows 7, Service Pack 1 
  • Server: Windows Server 2012 R2; Windows Server 2008 R2 SP1 


Resolution: Avast has released emergency updates to address this issue. For more information and AV update schedule, see the Avast support KB article.

Back to top
April 09, 2019
KB4493446
Resolved
Resolved:
April 09, 2019
10:00 AM PT

Opened:
April 09, 2019
10:00 AM PT
" @@ -98,9 +98,9 @@ sections: - type: markdown text: " - - + +
DetailsOriginating updateStatusHistory
Issue using PXE to start a device from WDS
After installing KB4489881, there may be issues using the Preboot Execution Environment (PXE) to start a device from a Windows Deployment Services (WDS) server configured to use Variable Window Extension. This may cause the connection to the WDS server to terminate prematurely while downloading the image. This issue does not affect clients or devices that are not using Variable Window Extension.
Affected platforms: 
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10 Enterprise LTSC 2016; Windows 8.1 
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server 2016; Windows Server 2012 R2 
Workaround: To mitigate the issue, disable the Variable Window Extension on WDS server using one of the following options:
Option 1:
Open an Administrator Command prompt and type the following:
Wdsutil /Set-TransportServer /EnableTftpVariableWindowExtension:No
-
Option 2:
Use the Windows Deployment Services UI to make the following adjustment:
  1. Open Windows Deployment Services from Windows Administrative Tools.
  2. Expand Servers and right-click a WDS server.
  3. Open its properties and clear the Enable Variable Window Extension box on the TFTP tab.
Option 3:
Set the following registry value to 0:
HKLM\\System\\CurrentControlSet\\Services\\WDSServer\\Providers\\WDSTFTP\\EnableVariableWindowExtension
Restart the WDSServer service after disabling the Variable Window Extension.
Next steps: Microsoft is working on a resolution and will provide an update in an upcoming release.

Back to top
March 12, 2019
KB4489881
Mitigated
Last updated:
April 09, 2019
10:00 AM PT

Opened:
March 12, 2019
10:00 AM PT
Custom URI schemes may not start corresponding application
After installing KB4489881, custom URI schemes for application protocol handlers may not start the corresponding application for local intranet and trusted sites security zones on Internet Explorer.
Affected platforms: 
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 8.1; Windows 7, Service Pack 1 
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2; Windows Server 2008 R2 SP1 
Resolution: This issue is resolved in KB4493446.

Back to top
March 12, 2019
KB4489881
Resolved
KB4493446
Resolved:
April 09, 2019
10:00 AM PT

Opened:
March 12, 2019
10:00 AM PT
Issue using PXE to start a device from WDS
After installing KB4489881, there may be issues using the Preboot Execution Environment (PXE) to start a device from a Windows Deployment Services (WDS) server configured to use Variable Window Extension. This may cause the connection to the WDS server to terminate prematurely while downloading the image. This issue does not affect clients or devices that are not using Variable Window Extension.

Affected platforms: 
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10 Enterprise LTSC 2016; Windows 8.1 
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server 2016; Windows Server 2012 R2 

Workaround: To mitigate the issue, disable the Variable Window Extension on WDS server using one of the following options:
Option 1:
Open an Administrator Command prompt and type the following:
Wdsutil /Set-TransportServer /EnableTftpVariableWindowExtension:No
+
Option 2:
Use the Windows Deployment Services UI to make the following adjustment:
  1. Open Windows Deployment Services from Windows Administrative Tools.
  2. Expand Servers and right-click a WDS server.
  3. Open its properties and clear the Enable Variable Window Extension box on the TFTP tab.
Option 3:
Set the following registry value to 0:
HKLM\\System\\CurrentControlSet\\Services\\WDSServer\\Providers\\WDSTFTP\\EnableVariableWindowExtension
Restart the WDSServer service after disabling the Variable Window Extension.

Next steps: Microsoft is working on a resolution and will provide an update in an upcoming release.

Back to top
March 12, 2019
KB4489881
Mitigated
Last updated:
April 09, 2019
10:00 AM PT

Opened:
March 12, 2019
10:00 AM PT
Custom URI schemes may not start corresponding application
After installing KB4489881, custom URI schemes for application protocol handlers may not start the corresponding application for local intranet and trusted sites security zones on Internet Explorer.

Affected platforms: 
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 8.1; Windows 7, Service Pack 1 
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2; Windows Server 2008 R2 SP1 

Resolution: This issue is resolved in KB4493446.

Back to top
March 12, 2019
KB4489881
Resolved
KB4493446
Resolved:
April 09, 2019
10:00 AM PT

Opened:
March 12, 2019
10:00 AM PT
" @@ -109,7 +109,7 @@ sections: - type: markdown text: " - +
DetailsOriginating updateStatusHistory
Embedded objects may display incorrectly
Any compound document (OLE) server application that places embedded objects into the Windows Metafile (WMF) using the PatBlt API may display embedded objects incorrectly.
For example, if you paste a Microsoft Excel worksheet object into a Microsoft Word document, the cells may render with a different background color.
Affected platforms: 
  • Client: Windows 8.1 
  • Server: Windows Server 2012 R2 
Resolution: This issue is resolved in KB4493446.

Back to top
February 12, 2019
KB4487000
Resolved
KB4493446
Resolved:
April 09, 2019
10:00 AM PT

Opened:
February 12, 2019
10:00 AM PT
Embedded objects may display incorrectly
Any compound document (OLE) server application that places embedded objects into the Windows Metafile (WMF) using the PatBlt API may display embedded objects incorrectly.

For example, if you paste a Microsoft Excel worksheet object into a Microsoft Word document, the cells may render with a different background color.

Affected platforms: 
  • Client: Windows 8.1 
  • Server: Windows Server 2012 R2 

Resolution: This issue is resolved in KB4493446.

Back to top
February 12, 2019
KB4487000
Resolved
KB4493446
Resolved:
April 09, 2019
10:00 AM PT

Opened:
February 12, 2019
10:00 AM PT
" @@ -118,7 +118,7 @@ sections: - type: markdown text: " - - + +
DetailsOriginating updateStatusHistory
Internet Explorer 11 authentication issue with multiple concurrent logons
After installing KB4480963, Internet Explorer 11 and other applications that use WININET.DLL may have authentication issues. This occurs when two or more people use the same user account for multiple, concurrent login sessions on the same Windows Server machine, including Remote Desktop Protocol (RDP) and Terminal Server logons. Symptoms reported by customers include, but may not be limited to:
  • Cache size and location show zero or empty.
  • Keyboard shortcuts may not work properly.
  • Webpages may intermittently fail to load or render correctly.
  • Issues with credential prompts.
  • Issues when downloading files.
Affected platforms: 
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10 Enterprise LTSC 2016; Windows 8.1; Windows 7, Service Pack 1 
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server 2016; Windows Server 2012 R2; Windows Server 2008 R2 SP1 
Resolution: This issue is resolved in KB4493446.

Back to top
January 08, 2019
KB4480963
Resolved
KB4493446
Resolved:
April 09, 2019
10:00 AM PT

Opened:
January 08, 2019
10:00 AM PT
MSXML6 may cause applications to stop responding.
After installing KB4480963, MSXML6 causes applications to stop responding if an exception was thrown during node operations, such as appendChild(), insertBefore(), and moveNode().
The Group Policy editor may stop responding when editing a Group Policy Object (GPO) that contains Group Policy Preferences (GPP) for Internet Explorer 10 settings.
Resolution: This issue is resolved in KB4493446.

Back to top
January 08, 2019
KB4480963
Resolved
KB4493446
Resolved:
April 09, 2019
10:00 AM PT

Opened:
January 08, 2019
10:00 AM PT
Internet Explorer 11 authentication issue with multiple concurrent logons
After installing KB4480963, Internet Explorer 11 and other applications that use WININET.DLL may have authentication issues. This occurs when two or more people use the same user account for multiple, concurrent login sessions on the same Windows Server machine, including Remote Desktop Protocol (RDP) and Terminal Server logons. Symptoms reported by customers include, but may not be limited to:
  • Cache size and location show zero or empty.
  • Keyboard shortcuts may not work properly.
  • Webpages may intermittently fail to load or render correctly.
  • Issues with credential prompts.
  • Issues when downloading files.

Affected platforms: 
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10 Enterprise LTSC 2016; Windows 8.1; Windows 7, Service Pack 1 
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server 2016; Windows Server 2012 R2; Windows Server 2008 R2 SP1 

Resolution: This issue is resolved in KB4493446.

Back to top
January 08, 2019
KB4480963
Resolved
KB4493446
Resolved:
April 09, 2019
10:00 AM PT

Opened:
January 08, 2019
10:00 AM PT
MSXML6 may cause applications to stop responding.
After installing KB4480963, MSXML6 causes applications to stop responding if an exception was thrown during node operations, such as appendChild(), insertBefore(), and moveNode().

The Group Policy editor may stop responding when editing a Group Policy Object (GPO) that contains Group Policy Preferences (GPP) for Internet Explorer 10 settings.

Resolution: This issue is resolved in KB4493446.

Back to top
January 08, 2019
KB4480963
Resolved
KB4493446
Resolved:
April 09, 2019
10:00 AM PT

Opened:
January 08, 2019
10:00 AM PT
" diff --git a/windows/release-information/status-windows-server-2008-sp2.yml b/windows/release-information/status-windows-server-2008-sp2.yml index 881e7f289f..8e8ad0c510 100644 --- a/windows/release-information/status-windows-server-2008-sp2.yml +++ b/windows/release-information/status-windows-server-2008-sp2.yml @@ -86,16 +86,16 @@ sections: - type: markdown text: " - - - - - - - - - - - + + + + + + + + + + +
DetailsOriginating updateStatusHistory
System may be unresponsive after restart if Avira antivirus software installed
Microsoft and Avira have identified an issue on devices with Avira antivirus software installed that may cause the system to become unresponsive upon restart after installing KB4493471.
Microsoft has temporarily blocked devices from receiving this update if Avira antivirus software is installed.
Affected platforms: 
  • Client: Windows 8.1; Windows 7, Service Pack 1 
  • Server: Windows Server 2012 R2; Windows Server 2012; Windows Server 2008 R2 SP1; Windows Server 2008 SP2
Next steps: We are presently investigating this issue with Avira and will provide an update when available.

Back to top
April 09, 2019
KB4493471
Investigating
Last updated:
April 25, 2019
03:26 PM PT

Opened:
April 25, 2019
03:26 PM PT
System unresponsive after restart if Sophos Endpoint Protection installed
Microsoft and Sophos have identified an issue on devices with Sophos Endpoint Protection installed and managed by either Sophos Central or Sophos Enterprise Console (SEC) that may cause the system to become unresponsive upon restart after installing KB4493471.
Microsoft has temporarily blocked devices from receiving this update if the Sophos Endpoint is installed until a solution is available.
Guidance for Sophos Endpoint and Sophos Enterprise Console customers can be found in the Sophos support article.
Affected platforms: 
  • Client: Windows 8.1; Windows 7, Service Pack 1 
  • Server: Windows Server 2012 R2; Windows Server 2012; Windows Server 2008 R2 SP1; Windows Server 2008 SP2

Back to top
April 09, 2019
KB4493471
Mitigated
Last updated:
April 25, 2019
03:26 PM PT

Opened:
April 25, 2019
03:26 PM PT
Authentication may fail for services after the Kerberos ticket expires
After installing KB4489880, some customers report that authentication fails for services that require unconstrained delegation after the Kerberos ticket expires (the default is 10 hours). For example, the SQL server service fails.
Affected platforms: 
  • Client: Windows 7, Service Pack 1 
  • Server: Windows Server 2008 R2 SP1; Windows Server 2008 SP2
Workaround: To mitigate this issue, use one of the following options:
  • Option 1: Purge the Kerberos tickets on the application server. After the Kerberos ticket expires, the issue will occur again, and you must purge the tickets again.
  • Option 2: If purging does not mitigate the issue, restart the application; for example, restart the Internet Information Services (IIS) app pool associated with the SQL server.
  • Option 3: Use constrained delegation.
Next steps: Microsoft is working on a resolution and will provide an update in an upcoming release.

Back to top
March 12, 2019
KB4489880
Mitigated
Last updated:
April 25, 2019
03:24 PM PT

Opened:
April 25, 2019
03:24 PM PT
Unable to use Seek bar in Windows Media Player
After installing KB4463097, users may not be able to use the Seek Bar in Windows Media Player when playing specific files. This issue does not affect normal playback.
Affected platforms: 
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 8.1; Windows 7, Service Pack 1
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2; Windows Server 2012; Windows Server 2008 R2 SP1; Windows Server 2008 SP2
Resolution: This issue is resolved in KB4471325.

Back to top
October 09, 2018
KB4463097
Resolved
KB4471325
Resolved:
December 11, 2018
10:00 AM PT

Opened:
April 25, 2019
03:28 PM PT
Applications using Microsoft Jet database fail to open
Applications that use a Microsoft Jet database with the Microsoft Access 97 file format may fail to open if the database has column names greater than 32 characters. The database will fail to open with the error, “Unrecognized Database Format”.
Affected platforms: 
  • Client: Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 8.1; Windows 7, Service Pack 1 
  • Server: Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2; Windows Server 2012; Windows Server 2008 R2 SP1; Windows Server 2008 SP2
Resolution: This issue is resolved in KB4487023.

Back to top
January 08, 2019
KB4480968
Resolved
KB4487023
Resolved:
February 12, 2019
10:00 AM PT

Opened:
April 25, 2019
03:32 PM PT
Virtual machines fail to restore
After installing KB4480968, virtual machines (VM) may fail to restore successfully if the VM has been saved and restored once before. The error message is, “Failed to restore the virtual machine state: Cannot restore this virtual machine because the saved state data cannot be read. Delete the saved state data and then try to start the virtual machine. (0xC0370027).”
This affects AMD Bulldozer Family 15h, AMD Jaguar Family 16h, and AMD Puma Family 16h (second generation) microarchitectures.
Affected platforms: 
  • Client: Windows 7, Service Pack 1 
  • Server: Windows Server 2012; Windows Server 2008 R2 SP1; Windows Server 2008 SP2
Resolution: This issue is resolved in KB4490514.

Back to top
January 08, 2019
KB4480968
Resolved
KB4490514
Resolved:
February 19, 2019
02:00 PM PT

Opened:
April 25, 2019
03:26 PM PT
Embedded objects may display incorrectly
Any compound document (OLE) server application that places embedded objects into the Windows Metafile (WMF) using the PatBlt API may display embedded objects incorrectly.
For example, if you paste a Microsoft Excel worksheet object into a Microsoft Word document, the cells may render with a different background color.
Affected platforms: 
  • Client: Windows 8.1 
  • Server: Windows Server 2012 R2; Windows Server 2012; Windows Server 2008 SP2
Resolution: This issue is resolved in KB4493471.

Back to top

Resolved
KB4493471
Resolved:
April 09, 2019
10:00 AM PT

Opened:
April 25, 2019
03:26 PM PT
First character of the Japanese era name not recognized as an abbreviation
After installing KB4480974, the first character of the Japanese era name is not recognized as an abbreviation and may cause date parsing issues.
Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 8.1; Windows 7, Service Pack 1
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2; Windows Server 2012; Windows Server 2008 R2 SP1; Windows Server 2008 SP2
Resolution: This issue is resolved in KB4489880.

Back to top
January 17, 2019
KB4480974
Resolved
KB4489880
Resolved:
March 12, 2019
10:00 AM PT

Opened:
April 25, 2019
03:32 PM PT
Applications using Microsoft Jet database and Access 95 file format stop working
Applications that use a Microsoft Jet database with the Microsoft Access 95 file format may randomly stop working.
Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 7, Service Pack 1
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012; Windows Server 2008 R2 SP1; Windows Server 2008 SP2
Resolution: This issue is resolved in KB4487022.

Back to top
February 12, 2019
KB4487023
Resolved
KB4487022
Resolved:
February 19, 2019
02:00 PM PT

Opened:
April 25, 2019
03:26 PM PT
Local Administrators unable to remotely access shares
Local users who are part of the local Administrators group may not be able to remotely access shares on Windows Server 2008 R2 and Windows 7 machines after installing KB4480968. This does not affect domain accounts in the local Administrators group.
Affected platforms: 
  • Client: Windows 7, Service Pack 1 
  • Server: Windows Server 2008 R2 SP1; Windows Server 2008 SP2
Resolution: This issue is resolved in KB4487354.

Back to top
January 08, 2019
KB4480968
Resolved
KB4487354
Resolved:
January 11, 2019
02:00 PM PT

Opened:
April 25, 2019
03:26 PM PT
NETDOM.EXE fails to run
After installing KB4489880, NETDOM.EXE fails to run, and the on-screen error, “The command failed to complete successfully.” appears.
Affected platforms: 
  • Client: Windows 7, Service Pack 1 
  • Server: Windows Server 2008 R2 SP1; Windows Server 2008 SP2
Resolution: This issue is resolved in KB4493471.

Back to top
March 12, 2019
KB4489880
Resolved
KB4493471
Resolved:
April 09, 2019
10:00 AM PT

Opened:
April 25, 2019
03:25 PM PT
System may be unresponsive after restart if Avira antivirus software installed
Microsoft and Avira have identified an issue on devices with Avira antivirus software installed that may cause the system to become unresponsive upon restart after installing KB4493471.

Microsoft has temporarily blocked devices from receiving this update if Avira antivirus software is installed.

Affected platforms: 
  • Client: Windows 8.1; Windows 7, Service Pack 1 
  • Server: Windows Server 2012 R2; Windows Server 2012; Windows Server 2008 R2 SP1; Windows Server 2008 SP2

Next steps: We are presently investigating this issue with Avira and will provide an update when available.

Back to top
April 09, 2019
KB4493471
Investigating
Last updated:
April 25, 2019
03:26 PM PT

Opened:
April 25, 2019
03:26 PM PT
System unresponsive after restart if Sophos Endpoint Protection installed
Microsoft and Sophos have identified an issue on devices with Sophos Endpoint Protection installed and managed by either Sophos Central or Sophos Enterprise Console (SEC) that may cause the system to become unresponsive upon restart after installing KB4493471.

Microsoft has temporarily blocked devices from receiving this update if the Sophos Endpoint is installed until a solution is available.

Guidance for Sophos Endpoint and Sophos Enterprise Console customers can be found in the Sophos support article.

Affected platforms: 
  • Client: Windows 8.1; Windows 7, Service Pack 1 
  • Server: Windows Server 2012 R2; Windows Server 2012; Windows Server 2008 R2 SP1; Windows Server 2008 SP2

Back to top
April 09, 2019
KB4493471
Mitigated
Last updated:
April 25, 2019
03:26 PM PT

Opened:
April 25, 2019
03:26 PM PT
Authentication may fail for services after the Kerberos ticket expires
After installing KB4489880, some customers report that authentication fails for services that require unconstrained delegation after the Kerberos ticket expires (the default is 10 hours). For example, the SQL server service fails.

Affected platforms: 
  • Client: Windows 7, Service Pack 1 
  • Server: Windows Server 2008 R2 SP1; Windows Server 2008 SP2

Workaround: To mitigate this issue, use one of the following options:

  • Option 1: Purge the Kerberos tickets on the application server. After the Kerberos ticket expires, the issue will occur again, and you must purge the tickets again.
  • Option 2: If purging does not mitigate the issue, restart the application; for example, restart the Internet Information Services (IIS) app pool associated with the SQL server.
  • Option 3: Use constrained delegation.

Next steps: Microsoft is working on a resolution and will provide an update in an upcoming release.

Back to top
March 12, 2019
KB4489880
Mitigated
Last updated:
April 25, 2019
03:24 PM PT

Opened:
April 25, 2019
03:24 PM PT
Unable to use Seek bar in Windows Media Player
After installing KB4463097, users may not be able to use the Seek Bar in Windows Media Player when playing specific files. This issue does not affect normal playback.

Affected platforms: 
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 8.1; Windows 7, Service Pack 1
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2; Windows Server 2012; Windows Server 2008 R2 SP1; Windows Server 2008 SP2

Resolution: This issue is resolved in KB4471325.

Back to top
October 09, 2018
KB4463097
Resolved
KB4471325
Resolved:
December 11, 2018
10:00 AM PT

Opened:
April 25, 2019
03:28 PM PT
Applications using Microsoft Jet database fail to open
Applications that use a Microsoft Jet database with the Microsoft Access 97 file format may fail to open if the database has column names greater than 32 characters. The database will fail to open with the error, “Unrecognized Database Format”.

Affected platforms: 
  • Client: Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 8.1; Windows 7, Service Pack 1 
  • Server: Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2; Windows Server 2012; Windows Server 2008 R2 SP1; Windows Server 2008 SP2

Resolution: This issue is resolved in KB4487023.

Back to top
January 08, 2019
KB4480968
Resolved
KB4487023
Resolved:
February 12, 2019
10:00 AM PT

Opened:
April 25, 2019
03:32 PM PT
Virtual machines fail to restore
After installing KB4480968, virtual machines (VM) may fail to restore successfully if the VM has been saved and restored once before. The error message is, “Failed to restore the virtual machine state: Cannot restore this virtual machine because the saved state data cannot be read. Delete the saved state data and then try to start the virtual machine. (0xC0370027).”

This affects AMD Bulldozer Family 15h, AMD Jaguar Family 16h, and AMD Puma Family 16h (second generation) microarchitectures.

Affected platforms: 
  • Client: Windows 7, Service Pack 1 
  • Server: Windows Server 2012; Windows Server 2008 R2 SP1; Windows Server 2008 SP2

Resolution: This issue is resolved in KB4490514.

Back to top
January 08, 2019
KB4480968
Resolved
KB4490514
Resolved:
February 19, 2019
02:00 PM PT

Opened:
April 25, 2019
03:26 PM PT
Embedded objects may display incorrectly
Any compound document (OLE) server application that places embedded objects into the Windows Metafile (WMF) using the PatBlt API may display embedded objects incorrectly.

For example, if you paste a Microsoft Excel worksheet object into a Microsoft Word document, the cells may render with a different background color.

Affected platforms: 
  • Client: Windows 8.1 
  • Server: Windows Server 2012 R2; Windows Server 2012; Windows Server 2008 SP2

Resolution: This issue is resolved in KB4493471.

Back to top

Resolved
KB4493471
Resolved:
April 09, 2019
10:00 AM PT

Opened:
April 25, 2019
03:26 PM PT
First character of the Japanese era name not recognized as an abbreviation
After installing KB4480974, the first character of the Japanese era name is not recognized as an abbreviation and may cause date parsing issues.

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 8.1; Windows 7, Service Pack 1
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2; Windows Server 2012; Windows Server 2008 R2 SP1; Windows Server 2008 SP2

Resolution: This issue is resolved in KB4489880.

Back to top
January 17, 2019
KB4480974
Resolved
KB4489880
Resolved:
March 12, 2019
10:00 AM PT

Opened:
April 25, 2019
03:32 PM PT
Applications using Microsoft Jet database and Access 95 file format stop working
Applications that use a Microsoft Jet database with the Microsoft Access 95 file format may randomly stop working.

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 7, Service Pack 1
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012; Windows Server 2008 R2 SP1; Windows Server 2008 SP2

Resolution: This issue is resolved in KB4487022.

Back to top
February 12, 2019
KB4487023
Resolved
KB4487022
Resolved:
February 19, 2019
02:00 PM PT

Opened:
April 25, 2019
03:26 PM PT
Local Administrators unable to remotely access shares
Local users who are part of the local Administrators group may not be able to remotely access shares on Windows Server 2008 R2 and Windows 7 machines after installing KB4480968. This does not affect domain accounts in the local Administrators group.

Affected platforms: 
  • Client: Windows 7, Service Pack 1 
  • Server: Windows Server 2008 R2 SP1; Windows Server 2008 SP2

Resolution: This issue is resolved in KB4487354.

Back to top
January 08, 2019
KB4480968
Resolved
KB4487354
Resolved:
January 11, 2019
02:00 PM PT

Opened:
April 25, 2019
03:26 PM PT
NETDOM.EXE fails to run
After installing KB4489880, NETDOM.EXE fails to run, and the on-screen error, “The command failed to complete successfully.” appears.

Affected platforms: 
  • Client: Windows 7, Service Pack 1 
  • Server: Windows Server 2008 R2 SP1; Windows Server 2008 SP2

Resolution: This issue is resolved in KB4493471.

Back to top
March 12, 2019
KB4489880
Resolved
KB4493471
Resolved:
April 09, 2019
10:00 AM PT

Opened:
April 25, 2019
03:25 PM PT
" diff --git a/windows/release-information/status-windows-server-2012.yml b/windows/release-information/status-windows-server-2012.yml index 0c5d3d4089..904e70e764 100644 --- a/windows/release-information/status-windows-server-2012.yml +++ b/windows/release-information/status-windows-server-2012.yml @@ -90,21 +90,21 @@ sections: - type: markdown text: " - - - - - - - - - - - - - - - + + + + + + + + + + + + + + +
DetailsOriginating updateStatusHistory
System may be unresponsive after restart if Avira antivirus software installed
Microsoft and Avira have identified an issue on devices with Avira antivirus software installed that may cause the system to become unresponsive upon restart after installing KB4493451.
Microsoft has temporarily blocked devices from receiving this update if Avira antivirus software is installed.
Next steps: We are presently investigating this issue with Avira and will provide an update when available.

Back to top
April 09, 2019
KB4493451
Investigating
Last updated:
April 25, 2019
03:48 PM PT

Opened:
April 25, 2019
03:48 PM PT
Issue using PXE to start a device from WDS
After installing KB4489891, there may be issues using the Preboot Execution Environment (PXE) to start a device from a Windows Deployment Services (WDS) server configured to use Variable Window Extension. This may cause the connection to the WDS server to terminate prematurely while downloading the image. This issue does not affect clients or devices that are not using Variable Window Extension.
Workaround: To mitigate the issue, disable the Variable Window Extension on WDS server using one of the following options:
Option 1:
Open an Administrator Command prompt and type the following:
Wdsutil /Set-TransportServer /EnableTftpVariableWindowExtension:No
-
Option 2:
Use the Windows Deployment Services UI to make the following adjustment:
  1. Open Windows Deployment Services from Windows Administrative Tools.
  2. Expand Servers and right-click a WDS server.
  3. Open its properties and clear the Enable Variable Window Extension box on the TFTP tab.
Option 3:
Set the following registry value to 0:
HKLM\\System\\CurrentControlSet\\Services\\WDSServer\\Providers\\WDSTFTP\\EnableVariableWindowExtension
Restart the WDSServer service after disabling the Variable Window Extension.
Next steps: Microsoft is working on a resolution and will provide an update in an upcoming release.

Back to top
March 12, 2019
KB4489891
Mitigated
Last updated:
April 25, 2019
03:40 PM PT

Opened:
April 25, 2019
03:40 PM PT
System unresponsive after restart if Sophos Endpoint Protection installed
Microsoft and Sophos have identified an issue on devices with Sophos Endpoint Protection installed and managed by either Sophos Central or Sophos Enterprise Console (SEC) that may cause the system to become unresponsive upon restart after installing KB4493451.
Microsoft has temporarily blocked devices from receiving this update if the Sophos Endpoint is installed until a solution is available.
Guidance for Sophos Endpoint and Sophos Enterprise Console customers can be found in the Sophos support article.

Back to top
April 09, 2019
KB4493451
Mitigated
Last updated:
April 25, 2019
03:46 PM PT

Opened:
April 25, 2019
03:46 PM PT
Certain operations performed on on a Cluster Shared Volume may fail
Certain operations, such as rename, that you perform on files or folders that are on a Cluster Shared Volume (CSV) may fail with the error, \"STATUS_BAD_IMPERSONATION_LEVEL (0xC00000A5)\". This occurs when you perform the operation on a CSV owner node from a process that doesn’t have administrator privilege.
Workaround: Do one of the following:
  • Perform the operation from a process that has administrator privilege.
  • Perform the operation from a node that doesn’t have CSV ownership.
Next steps: Microsoft is working on a resolution and will provide an update in an upcoming release.

Back to top
January 08, 2019
KB4480975
Mitigated
Last updated:
April 25, 2019
03:52 PM PT

Opened:
April 25, 2019
03:52 PM PT
Unable to use Seek bar in Windows Media Player
After installing KB4462929, users may not be able to use the Seek Bar in Windows Media Player when playing specific files. This issue does not affect normal playback.
Resolution: This issue is resolved in KB4471330.

Back to top
October 09, 2018
KB4462929
Resolved
KB4471330
Resolved:
December 11, 2018
10:00 AM PT

Opened:
April 25, 2019
02:47 PM PT
Event Viewer may not show some event descriptions for network interface cards
After installing KB4457135, the Event Viewer may not show some event descriptions for network interface cards (NICs).
Resolution: This issue is resolved in KB4489891.

Back to top
September 11, 2018
KB4457135
Resolved
KB4489891
Resolved:
March 12, 2019
10:00 AM PT

Opened:
April 25, 2019
03:10 PM PT
Unable to access hotspots with third-party applications
After installing KB4480975, third-party applications may have difficulty authenticating hotspots.
Resolution: This issue is resolved in KB4480971.

Back to top
January 08, 2019
KB4480975
Resolved
KB4480971
Resolved:
January 15, 2019
10:00 AM PT

Opened:
April 25, 2019
03:14 PM PT
Applications using Microsoft Jet database fail to open
Applications that use a Microsoft Jet database with the Microsoft Access 97 file format may fail to open if the database has column names greater than 32 characters. The database will fail to open with the error, \"Unrecognized Database Format\".
Resolution: This issue is resolved in KB4487025.

Back to top
January 08, 2019
KB4480975
Resolved
KB4487025
Resolved:
February 12, 2019
10:00 AM PT

Opened:
April 25, 2019
03:19 PM PT
Virtual machines fail to restore
After installing KB4480975, virtual machines (VM) may fail to restore successfully if the VM has been saved and restored once before. The error message is, \"Failed to restore the virtual machine state: Cannot restore this virtual machine because the saved state data cannot be read. Delete the saved state data and then try to start the virtual machine. (0xC0370027).\"
This affects AMD Bulldozer Family 15h, AMD Jaguar Family 16h, and AMD Puma Family 16h (second generation) microarchitectures.
Resolution: This issue is resolved in KB4490516.

Back to top
January 08, 2019
KB4480975
Resolved
KB4490516
Resolved:
February 19, 2019
02:00 PM PT

Opened:
April 25, 2019
03:22 PM PT
Internet Explorer 11 authentication issue with multiple concurrent logons
After installing KB4480975, Internet Explorer 11 and other applications that use WININET.DLL may have authentication issues. This occurs when two or more people use the same user account for multiple, concurrent login sessions on the same Windows Server machine, including Remote Desktop Protocol (RDP) and Terminal Server logons. Symptoms reported by customers include, but may not be limited to:
  • Cache size and location show zero or empty.
  • Keyboard shortcuts may not work properly.
  • Webpages may intermittently fail to load or render correctly.
  • Issues with credential prompts.
  • Issues when downloading files.
Resolution: This issue is resolved in KB4493451.

Back to top
January 08, 2019
KB4480975
Resolved
KB4493451
Resolved:
April 09, 2019
10:00 AM PT

Opened:
April 25, 2019
03:34 PM PT
MSXML6 may cause applications to stop responding
After installing KB4480975, MSXML6 causes applications to stop responding if an exception was thrown during node operations, such as appendChild(), insertBefore(), and moveNode().
The Group Policy editor may stop responding when editing a Group Policy Object (GPO) that contains Group Policy Preferences (GPP) for Internet Explorer 10 settings.
Resolution: This issue is resolved in KB4493451.

Back to top
January 08, 2019
KB4480975
Resolved
KB4493451
Resolved:
April 09, 2019
10:00 AM PT

Opened:
April 25, 2019
03:27 PM PT
Error 1309 when installing/uninstalling MSI or MSP files
After installing KB4487025, users may receive \"Error 1309\" while installing or uninstalling certain types of MSI and MSP files.
Resolution: This issue is resolved in KB4489891.

Back to top
February 12, 2019
KB4487025
Resolved
KB4489891
Resolved:
March 12, 2019
10:00 AM PT

Opened:
April 25, 2019
03:36 PM PT
Embedded objects may display incorrectly
Any compound document (OLE) server application that places embedded objects into the Windows Metafile (WMF) using the PatBlt API may display embedded objects incorrectly.
For example, if you paste a Microsoft Excel worksheet object into a Microsoft Word document, the cells may render with a different background color.
Resolution: This issue is resolved in KB4493451.

Back to top
February 12, 2019
KB4487025
Resolved
KB4493451
Resolved:
April 09, 2019
10:00 AM PT

Opened:
April 25, 2019
04:00 PM PT
First character of the Japanese era name not recognized as an abbreviation
After installing KB4480971, the first character of the Japanese era name is not recognized as an abbreviation and may cause date parsing issues.
Resolution: This issue is resolved in KB4487024.

Back to top
January 15, 2019
KB4480971
Resolved
KB4487024
Resolved:
February 19, 2019
02:00 PM PT

Opened:
April 25, 2019
04:01 PM PT
Applications using Microsoft Jet database and Access 95 file format stop working
Applications that use a Microsoft Jet database with the Microsoft Access 95 file format may randomly stop working.
Resolution: This issue is resolved in KB4487024.

Back to top
February 12, 2019
KB4487025
Resolved
KB4487024
Resolved:
February 19, 2019
02:00 PM PT

Opened:
April 25, 2019
04:04 PM PT
System may be unresponsive after restart if Avira antivirus software installed
Microsoft and Avira have identified an issue on devices with Avira antivirus software installed that may cause the system to become unresponsive upon restart after installing KB4493451.

Microsoft has temporarily blocked devices from receiving this update if Avira antivirus software is installed.

Next steps: We are presently investigating this issue with Avira and will provide an update when available.

Back to top
April 09, 2019
KB4493451
Investigating
Last updated:
April 25, 2019
03:48 PM PT

Opened:
April 25, 2019
03:48 PM PT
Issue using PXE to start a device from WDS
After installing KB4489891, there may be issues using the Preboot Execution Environment (PXE) to start a device from a Windows Deployment Services (WDS) server configured to use Variable Window Extension. This may cause the connection to the WDS server to terminate prematurely while downloading the image. This issue does not affect clients or devices that are not using Variable Window Extension.

Workaround: To mitigate the issue, disable the Variable Window Extension on WDS server using one of the following options:
Option 1:
Open an Administrator Command prompt and type the following:
Wdsutil /Set-TransportServer /EnableTftpVariableWindowExtension:No
+
Option 2:
Use the Windows Deployment Services UI to make the following adjustment:
  1. Open Windows Deployment Services from Windows Administrative Tools.
  2. Expand Servers and right-click a WDS server.
  3. Open its properties and clear the Enable Variable Window Extension box on the TFTP tab.
Option 3:
Set the following registry value to 0:
HKLM\\System\\CurrentControlSet\\Services\\WDSServer\\Providers\\WDSTFTP\\EnableVariableWindowExtension
Restart the WDSServer service after disabling the Variable Window Extension.

Next steps: Microsoft is working on a resolution and will provide an update in an upcoming release.

Back to top
March 12, 2019
KB4489891
Mitigated
Last updated:
April 25, 2019
03:40 PM PT

Opened:
April 25, 2019
03:40 PM PT
System unresponsive after restart if Sophos Endpoint Protection installed
Microsoft and Sophos have identified an issue on devices with Sophos Endpoint Protection installed and managed by either Sophos Central or Sophos Enterprise Console (SEC) that may cause the system to become unresponsive upon restart after installing KB4493451.

Microsoft has temporarily blocked devices from receiving this update if the Sophos Endpoint is installed until a solution is available.

Guidance for Sophos Endpoint and Sophos Enterprise Console customers can be found in the Sophos support article.

Back to top
April 09, 2019
KB4493451
Mitigated
Last updated:
April 25, 2019
03:46 PM PT

Opened:
April 25, 2019
03:46 PM PT
Certain operations performed on on a Cluster Shared Volume may fail
Certain operations, such as rename, that you perform on files or folders that are on a Cluster Shared Volume (CSV) may fail with the error, \"STATUS_BAD_IMPERSONATION_LEVEL (0xC00000A5)\". This occurs when you perform the operation on a CSV owner node from a process that doesn’t have administrator privilege.

Workaround: Do one of the following:

  • Perform the operation from a process that has administrator privilege.
  • Perform the operation from a node that doesn’t have CSV ownership.

Next steps: Microsoft is working on a resolution and will provide an update in an upcoming release.

Back to top
January 08, 2019
KB4480975
Mitigated
Last updated:
April 25, 2019
03:52 PM PT

Opened:
April 25, 2019
03:52 PM PT
Unable to use Seek bar in Windows Media Player
After installing KB4462929, users may not be able to use the Seek Bar in Windows Media Player when playing specific files. This issue does not affect normal playback.

Resolution: This issue is resolved in KB4471330.

Back to top
October 09, 2018
KB4462929
Resolved
KB4471330
Resolved:
December 11, 2018
10:00 AM PT

Opened:
April 25, 2019
02:47 PM PT
Event Viewer may not show some event descriptions for network interface cards
After installing KB4457135, the Event Viewer may not show some event descriptions for network interface cards (NICs).

Resolution: This issue is resolved in KB4489891.

Back to top
September 11, 2018
KB4457135
Resolved
KB4489891
Resolved:
March 12, 2019
10:00 AM PT

Opened:
April 25, 2019
03:10 PM PT
Unable to access hotspots with third-party applications
After installing KB4480975, third-party applications may have difficulty authenticating hotspots.

Resolution: This issue is resolved in KB4480971.

Back to top
January 08, 2019
KB4480975
Resolved
KB4480971
Resolved:
January 15, 2019
10:00 AM PT

Opened:
April 25, 2019
03:14 PM PT
Applications using Microsoft Jet database fail to open
Applications that use a Microsoft Jet database with the Microsoft Access 97 file format may fail to open if the database has column names greater than 32 characters. The database will fail to open with the error, \"Unrecognized Database Format\".

Resolution: This issue is resolved in KB4487025.

Back to top
January 08, 2019
KB4480975
Resolved
KB4487025
Resolved:
February 12, 2019
10:00 AM PT

Opened:
April 25, 2019
03:19 PM PT
Virtual machines fail to restore
After installing KB4480975, virtual machines (VM) may fail to restore successfully if the VM has been saved and restored once before. The error message is, \"Failed to restore the virtual machine state: Cannot restore this virtual machine because the saved state data cannot be read. Delete the saved state data and then try to start the virtual machine. (0xC0370027).\"

This affects AMD Bulldozer Family 15h, AMD Jaguar Family 16h, and AMD Puma Family 16h (second generation) microarchitectures.

Resolution: This issue is resolved in KB4490516.

Back to top
January 08, 2019
KB4480975
Resolved
KB4490516
Resolved:
February 19, 2019
02:00 PM PT

Opened:
April 25, 2019
03:22 PM PT
Internet Explorer 11 authentication issue with multiple concurrent logons
After installing KB4480975, Internet Explorer 11 and other applications that use WININET.DLL may have authentication issues. This occurs when two or more people use the same user account for multiple, concurrent login sessions on the same Windows Server machine, including Remote Desktop Protocol (RDP) and Terminal Server logons. Symptoms reported by customers include, but may not be limited to:
  • Cache size and location show zero or empty.
  • Keyboard shortcuts may not work properly.
  • Webpages may intermittently fail to load or render correctly.
  • Issues with credential prompts.
  • Issues when downloading files.

Resolution: This issue is resolved in KB4493451.

Back to top
January 08, 2019
KB4480975
Resolved
KB4493451
Resolved:
April 09, 2019
10:00 AM PT

Opened:
April 25, 2019
03:34 PM PT
MSXML6 may cause applications to stop responding
After installing KB4480975, MSXML6 causes applications to stop responding if an exception was thrown during node operations, such as appendChild(), insertBefore(), and moveNode().

The Group Policy editor may stop responding when editing a Group Policy Object (GPO) that contains Group Policy Preferences (GPP) for Internet Explorer 10 settings.

Resolution: This issue is resolved in KB4493451.

Back to top
January 08, 2019
KB4480975
Resolved
KB4493451
Resolved:
April 09, 2019
10:00 AM PT

Opened:
April 25, 2019
03:27 PM PT
Error 1309 when installing/uninstalling MSI or MSP files
After installing KB4487025, users may receive \"Error 1309\" while installing or uninstalling certain types of MSI and MSP files.

Resolution: This issue is resolved in KB4489891.

Back to top
February 12, 2019
KB4487025
Resolved
KB4489891
Resolved:
March 12, 2019
10:00 AM PT

Opened:
April 25, 2019
03:36 PM PT
Embedded objects may display incorrectly
Any compound document (OLE) server application that places embedded objects into the Windows Metafile (WMF) using the PatBlt API may display embedded objects incorrectly.

For example, if you paste a Microsoft Excel worksheet object into a Microsoft Word document, the cells may render with a different background color.

Resolution: This issue is resolved in KB4493451.

Back to top
February 12, 2019
KB4487025
Resolved
KB4493451
Resolved:
April 09, 2019
10:00 AM PT

Opened:
April 25, 2019
04:00 PM PT
First character of the Japanese era name not recognized as an abbreviation
After installing KB4480971, the first character of the Japanese era name is not recognized as an abbreviation and may cause date parsing issues.

Resolution: This issue is resolved in KB4487024.

Back to top
January 15, 2019
KB4480971
Resolved
KB4487024
Resolved:
February 19, 2019
02:00 PM PT

Opened:
April 25, 2019
04:01 PM PT
Applications using Microsoft Jet database and Access 95 file format stop working
Applications that use a Microsoft Jet database with the Microsoft Access 95 file format may randomly stop working.

Resolution: This issue is resolved in KB4487024.

Back to top
February 12, 2019
KB4487025
Resolved
KB4487024
Resolved:
February 19, 2019
02:00 PM PT

Opened:
April 25, 2019
04:04 PM PT
" From 02119439d61656ce228b1f94c16842b609e08cf7 Mon Sep 17 00:00:00 2001 From: "Nisha Mittal (Wipro Ltd.)" Date: Fri, 26 Apr 2019 02:05:37 -0700 Subject: [PATCH 221/724] Fixed spacing --- .../resolved-issues-windows-10-1507.yml | 20 ++++----- .../resolved-issues-windows-10-1607.yml | 30 ++++++------- .../resolved-issues-windows-10-1703.yml | 26 ++++++------ .../resolved-issues-windows-10-1709.yml | 26 ++++++------ .../resolved-issues-windows-10-1803.yml | 26 ++++++------ ...indows-10-1809-and-windows-server-2019.yml | 42 +++++++++---------- ...ndows-7-and-windows-server-2008-r2-sp1.yml | 24 +++++------ ...windows-8.1-and-windows-server-2012-r2.yml | 22 +++++----- ...esolved-issues-windows-server-2008-sp2.yml | 16 +++---- .../resolved-issues-windows-server-2012.yml | 2 +- .../status-windows-10-1507.yml | 4 +- ...indows-10-1607-and-windows-server-2016.yml | 16 +++---- .../status-windows-10-1703.yml | 6 +-- .../status-windows-10-1709.yml | 8 ++-- .../status-windows-10-1803.yml | 8 ++-- ...indows-10-1809-and-windows-server-2019.yml | 14 +++---- ...ndows-7-and-windows-server-2008-r2-sp1.yml | 14 +++---- ...windows-8.1-and-windows-server-2012-r2.yml | 18 ++++---- .../status-windows-server-2008-sp2.yml | 20 ++++----- .../status-windows-server-2012.yml | 4 +- 20 files changed, 173 insertions(+), 173 deletions(-) diff --git a/windows/release-information/resolved-issues-windows-10-1507.yml b/windows/release-information/resolved-issues-windows-10-1507.yml index c48f75814a..c049c963bc 100644 --- a/windows/release-information/resolved-issues-windows-10-1507.yml +++ b/windows/release-information/resolved-issues-windows-10-1507.yml @@ -57,7 +57,7 @@ sections: - type: markdown text: " - +
DetailsOriginating updateStatusHistory
Custom URI schemes may not start corresponding application
After installing KB4489872, Custom URI Schemes for Application Protocol handlers may not start the corresponding application for local intranet and trusted sites on Internet Explorer.

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 8.1; Windows 7, Service Pack 1 
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2; Windows Server 2008 R2 SP1

Resolution: This issue was resolved in KB4493475.

Back to top
OS Build 10240.18158

March 12, 2019
KB4489872
Resolved
KB4493475
Resolved:
April 09, 2019
10:00 AM PT

Opened:
March 12, 2019
10:00 AM PT
Custom URI schemes may not start corresponding application
After installing KB4489872, Custom URI Schemes for Application Protocol handlers may not start the corresponding application for local intranet and trusted sites on Internet Explorer.

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 8.1; Windows 7, Service Pack 1 
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2; Windows Server 2008 R2 SP1
Resolution: This issue was resolved in KB4493475.

Back to top
OS Build 10240.18158

March 12, 2019
KB4489872
Resolved
KB4493475
Resolved:
April 09, 2019
10:00 AM PT

Opened:
March 12, 2019
10:00 AM PT
" @@ -66,10 +66,10 @@ sections: - type: markdown text: " - - - - + + + +
DetailsOriginating updateStatusHistory
Applications using Microsoft Jet database and Access 95 file format stop working
Applications that use a Microsoft Jet database with the Microsoft Access 95 file format may randomly stop working.

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 7, Service Pack 1
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2008 R2 SP1

Resolution: This issue is resolved in KB4489872.

Back to top
OS Build 10240.18132

February 12, 2019
KB4487018
Resolved
KB4489872
Resolved:
March 12, 2019
10:00 AM PT

Opened:
February 12, 2019
10:00 AM PT
Internet Explorer may fail to load images
After installing KB4487018, Internet Explorer may fail to load images with a backslash (\\) in their relative source path.

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 8.1; Windows 7, Service Pack 1
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2; Windows Server 2008 R2 SP1

Resolution: This issue is resolved in KB4491101.

Back to top
OS Build 10240.18132

February 12, 2019
KB4487018
Resolved
KB4491101
Resolved:
February 21, 2019
02:00 PM PT

Opened:
February 12, 2019
10:00 AM PT
Error 1309 when installing/uninstalling MSI or MSP files
After installing KB4487018, users may receive “Error 1309” while installing or uninstalling certain types of MSI and MSP files.

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 8.1
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2

Resolution: This issue is resolved in KB4489872.

Back to top
OS Build 10240.18132

February 12, 2019
KB4487018
Resolved
KB4489872
Resolved:
March 12, 2019
10:00 AM PT

Opened:
February 12, 2019
10:00 AM PT
First character of Japanese era name not recognized
After installing KB4487018, the first character of the Japanese era name is not recognized as an abbreviation and may cause date parsing issues.

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 8.1; Windows 7, Service Pack 1
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2; Windows Server 2008 R2 SP1

Resolution: This issue is resolved in KB4489872.

Back to top
OS Build 10240.18132

February 12, 2019
KB4487018
Resolved
KB4489872
Resolved:
March 12, 2019
10:00 AM PT

Opened:
February 12, 2019
10:00 AM PT
Applications using Microsoft Jet database and Access 95 file format stop working
Applications that use a Microsoft Jet database with the Microsoft Access 95 file format may randomly stop working.

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 7, Service Pack 1
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2008 R2 SP1
Resolution: This issue is resolved in KB4489872.

Back to top
OS Build 10240.18132

February 12, 2019
KB4487018
Resolved
KB4489872
Resolved:
March 12, 2019
10:00 AM PT

Opened:
February 12, 2019
10:00 AM PT
Internet Explorer may fail to load images
After installing KB4487018, Internet Explorer may fail to load images with a backslash (\\) in their relative source path.

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 8.1; Windows 7, Service Pack 1
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2; Windows Server 2008 R2 SP1
Resolution: This issue is resolved in KB4491101.

Back to top
OS Build 10240.18132

February 12, 2019
KB4487018
Resolved
KB4491101
Resolved:
February 21, 2019
02:00 PM PT

Opened:
February 12, 2019
10:00 AM PT
Error 1309 when installing/uninstalling MSI or MSP files
After installing KB4487018, users may receive “Error 1309” while installing or uninstalling certain types of MSI and MSP files.

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 8.1
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2
Resolution: This issue is resolved in KB4489872.

Back to top
OS Build 10240.18132

February 12, 2019
KB4487018
Resolved
KB4489872
Resolved:
March 12, 2019
10:00 AM PT

Opened:
February 12, 2019
10:00 AM PT
First character of Japanese era name not recognized
After installing KB4487018, the first character of the Japanese era name is not recognized as an abbreviation and may cause date parsing issues.

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 8.1; Windows 7, Service Pack 1
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2; Windows Server 2008 R2 SP1
Resolution: This issue is resolved in KB4489872.

Back to top
OS Build 10240.18132

February 12, 2019
KB4487018
Resolved
KB4489872
Resolved:
March 12, 2019
10:00 AM PT

Opened:
February 12, 2019
10:00 AM PT
" @@ -78,9 +78,9 @@ sections: - type: markdown text: " - - - + + +
DetailsOriginating updateStatusHistory
Applications using Microsoft Jet database fail to open
Applications that use a Microsoft Jet database with the Microsoft Access 97 file format may fail to open if the database has column names greater than 32 characters. The database will fail to open with the error, \"Unrecognized Database Format\".

Affected platforms:
  • Client: Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 8.1; Windows 7, Service Pack 1
  • Server: Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2; Windows Server 2008 R2 SP1

Resolution: This issue is resolved in KB4487018.

Back to top
OS Build 10240.18094

January 08, 2019
KB4480962
Resolved
KB4487018
Resolved:
February 12, 2019
10:00 AM PT

Opened:
January 08, 2019
10:00 AM PT
MSXML6 may cause applications to stop responding
After installing KB4480962, MSXML6 causes applications to stop responding if an exception was thrown during node operations, such as appendChild(), insertBefore(), and moveNode().

The Group Policy editor may stop responding when editing a Group Policy Object (GPO) that contains Group Policy Preferences (GPP) for Internet Explorer 10 settings.

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 8.1
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2

Resolution: This issue was resolved in KB4493475.

Back to top
OS Build 10240.18094

January 08, 2019
KB4480962
Resolved
KB4493475
Resolved:
April 09, 2019
10:00 AM PT

Opened:
January 08, 2019
10:00 AM PT
Unable to access hotspots with third-party applications
After installing KB4480962, third-party applications may have difficulty authenticating hotspots.

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 8.1
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2

Resolution: This issue is resolved in KB4487018.

Back to top
OS Build 10240.18094

January 08, 2019
KB4480962
Resolved
KB4487018
Resolved:
February 12, 2019
10:00 AM PT

Opened:
January 08, 2019
10:00 AM PT
Applications using Microsoft Jet database fail to open
Applications that use a Microsoft Jet database with the Microsoft Access 97 file format may fail to open if the database has column names greater than 32 characters. The database will fail to open with the error, \"Unrecognized Database Format\".

Affected platforms:
  • Client: Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 8.1; Windows 7, Service Pack 1
  • Server: Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2; Windows Server 2008 R2 SP1
Resolution: This issue is resolved in KB4487018.

Back to top
OS Build 10240.18094

January 08, 2019
KB4480962
Resolved
KB4487018
Resolved:
February 12, 2019
10:00 AM PT

Opened:
January 08, 2019
10:00 AM PT
MSXML6 may cause applications to stop responding
After installing KB4480962, MSXML6 causes applications to stop responding if an exception was thrown during node operations, such as appendChild(), insertBefore(), and moveNode().

The Group Policy editor may stop responding when editing a Group Policy Object (GPO) that contains Group Policy Preferences (GPP) for Internet Explorer 10 settings.

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 8.1
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2
Resolution: This issue was resolved in KB4493475.

Back to top
OS Build 10240.18094

January 08, 2019
KB4480962
Resolved
KB4493475
Resolved:
April 09, 2019
10:00 AM PT

Opened:
January 08, 2019
10:00 AM PT
Unable to access hotspots with third-party applications
After installing KB4480962, third-party applications may have difficulty authenticating hotspots.

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 8.1
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2
Resolution: This issue is resolved in KB4487018.

Back to top
OS Build 10240.18094

January 08, 2019
KB4480962
Resolved
KB4487018
Resolved:
February 12, 2019
10:00 AM PT

Opened:
January 08, 2019
10:00 AM PT
" @@ -89,7 +89,7 @@ sections: - type: markdown text: " - +
DetailsOriginating updateStatusHistory
Unable to use Seek bar in Windows Media Player
After installing KB4462922, users may not be able to use the Seek Bar in Windows Media Player when playing specific files. This issue does not affect normal playback.

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 8.1; Windows 7, Service Pack 1
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2; Windows Server 2008 R2 SP1

Resolution: This issue is resolved in KB4471323.

Back to top
OS Build 10240.18005

October 09, 2018
KB4462922
Resolved
KB4471323
Resolved:
December 11, 2018
10:00 AM PT

Opened:
October 09, 2018
10:00 AM PT
Unable to use Seek bar in Windows Media Player
After installing KB4462922, users may not be able to use the Seek Bar in Windows Media Player when playing specific files. This issue does not affect normal playback.

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 8.1; Windows 7, Service Pack 1
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2; Windows Server 2008 R2 SP1
Resolution: This issue is resolved in KB4471323.

Back to top
OS Build 10240.18005

October 09, 2018
KB4462922
Resolved
KB4471323
Resolved:
December 11, 2018
10:00 AM PT

Opened:
October 09, 2018
10:00 AM PT
" @@ -98,6 +98,6 @@ sections: - type: markdown text: " - +
DetailsOriginating updateStatusHistory
Guest VMs running Unicast NLB fail to respond after restart
All guest virtual machines running Unicast NLB fail to respond to NLB requests after the virtual machines restart.

Affected platforms:
  • Client: Windows 10, version 1803; Windows 10, version 1507
  • Server: Windows Server, version 1803

Resolution: This issue is resolved in KB4462922.

Back to top
OS Build 10240.17976

September 11, 2018
KB4457132
Resolved
KB4462922
Resolved:
October 09, 2018
10:00 AM PT

Opened:
September 11, 2018
10:00 AM PT
Guest VMs running Unicast NLB fail to respond after restart
All guest virtual machines running Unicast NLB fail to respond to NLB requests after the virtual machines restart.

Affected platforms:
  • Client: Windows 10, version 1803; Windows 10, version 1507
  • Server: Windows Server, version 1803
Resolution: This issue is resolved in KB4462922.

Back to top
OS Build 10240.17976

September 11, 2018
KB4457132
Resolved
KB4462922
Resolved:
October 09, 2018
10:00 AM PT

Opened:
September 11, 2018
10:00 AM PT
" diff --git a/windows/release-information/resolved-issues-windows-10-1607.yml b/windows/release-information/resolved-issues-windows-10-1607.yml index e02dd2e8ee..6128e392d7 100644 --- a/windows/release-information/resolved-issues-windows-10-1607.yml +++ b/windows/release-information/resolved-issues-windows-10-1607.yml @@ -63,7 +63,7 @@ sections: - type: markdown text: " - +
DetailsOriginating updateStatusHistory
End-user-defined characters (EUDC) cause blue screen at startup
If you enable per font end-user-defined characters (EUDC), the system will stop working and a blue screen may appear at startup. This is not a common setting in non-Asian regions.

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016

Resolution: This issue was resolved in KB4493470.

Back to top
OS Build 14393.2879

March 19, 2019
KB4489889
Resolved
KB4493470
Resolved:
April 09, 2019
10:00 AM PT

Opened:
March 19, 2019
10:00 AM PT
End-user-defined characters (EUDC) cause blue screen at startup
If you enable per font end-user-defined characters (EUDC), the system will stop working and a blue screen may appear at startup. This is not a common setting in non-Asian regions.

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016
Resolution: This issue was resolved in KB4493470.

Back to top
OS Build 14393.2879

March 19, 2019
KB4489889
Resolved
KB4493470
Resolved:
April 09, 2019
10:00 AM PT

Opened:
March 19, 2019
10:00 AM PT
" @@ -72,10 +72,10 @@ sections: - type: markdown text: " - - - - + + + +
DetailsOriginating updateStatusHistory
Applications using Microsoft Jet database and Access 95 file format stop working
Applications that use a Microsoft Jet database with the Microsoft Access 95 file format may randomly stop working.

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 7, Service Pack 1
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2008 R2 SP1

Resolution: This issue is resolved in KB4487006.

Back to top
OS Build 14393.2791

February 12, 2019
KB4487026
Resolved
KB4487006
Resolved:
February 19, 2019
02:00 PM PT

Opened:
February 12, 2019
10:00 AM PT
Internet Explorer may fail to load images
After installing KB4487026, Internet Explorer may fail to load images with a backslash (\\) in their relative source path.

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 8.1; Windows 7, Service Pack 1
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2; Windows Server 2008 R2 SP1

Resolution: This issue is resolved in KB4487006.

Back to top
OS Build 14393.2791

February 12, 2019
KB4487026
Resolved
KB4487006
Resolved:
February 19, 2019
02:00 PM PT

Opened:
February 12, 2019
10:00 AM PT
Issue hosting multiple terminal server sessions and a user logs off on Windows Server
In some cases, Windows Server will stop working and restart when hosting multiple terminal server sessions and a user logs off. The faulting driver is win32kbase.sys.

Affected platforms:
  • Client: Windows 10 Enterprise LTSC 2016
  • Server: Windows Server 2016

Resolution: This issue is resolved in KB4489882.

Back to top
OS Build 14393.2828

February 19, 2019
KB4487006
Resolved
KB4489882
Resolved:
March 12, 2019
10:00 AM PT

Opened:
February 19, 2019
02:00 PM PT
Error 1309 when installing/uninstalling MSI or MSP files
After installing KB4487026, users may receive “Error 1309” while installing or uninstalling certain types of MSI and MSP files.

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 8.1
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2

Resolution: This issue is resolved in KB4489882.

Back to top
OS Build 14393.2791

February 12, 2019
KB4487026
Resolved
KB4489882
Resolved:
March 12, 2019
10:00 AM PT

Opened:
February 12, 2019
10:00 AM PT
Applications using Microsoft Jet database and Access 95 file format stop working
Applications that use a Microsoft Jet database with the Microsoft Access 95 file format may randomly stop working.

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 7, Service Pack 1
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2008 R2 SP1
Resolution: This issue is resolved in KB4487006.

Back to top
OS Build 14393.2791

February 12, 2019
KB4487026
Resolved
KB4487006
Resolved:
February 19, 2019
02:00 PM PT

Opened:
February 12, 2019
10:00 AM PT
Internet Explorer may fail to load images
After installing KB4487026, Internet Explorer may fail to load images with a backslash (\\) in their relative source path.

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 8.1; Windows 7, Service Pack 1
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2; Windows Server 2008 R2 SP1
Resolution: This issue is resolved in KB4487006.

Back to top
OS Build 14393.2791

February 12, 2019
KB4487026
Resolved
KB4487006
Resolved:
February 19, 2019
02:00 PM PT

Opened:
February 12, 2019
10:00 AM PT
Issue hosting multiple terminal server sessions and a user logs off on Windows Server
In some cases, Windows Server will stop working and restart when hosting multiple terminal server sessions and a user logs off. The faulting driver is win32kbase.sys.

Affected platforms:
  • Client: Windows 10 Enterprise LTSC 2016
  • Server: Windows Server 2016
Resolution: This issue is resolved in KB4489882.

Back to top
OS Build 14393.2828

February 19, 2019
KB4487006
Resolved
KB4489882
Resolved:
March 12, 2019
10:00 AM PT

Opened:
February 19, 2019
02:00 PM PT
Error 1309 when installing/uninstalling MSI or MSP files
After installing KB4487026, users may receive “Error 1309” while installing or uninstalling certain types of MSI and MSP files.

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 8.1
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2
Resolution: This issue is resolved in KB4489882.

Back to top
OS Build 14393.2791

February 12, 2019
KB4487026
Resolved
KB4489882
Resolved:
March 12, 2019
10:00 AM PT

Opened:
February 12, 2019
10:00 AM PT
" @@ -84,11 +84,11 @@ sections: - type: markdown text: " - - - - - + + + + +
DetailsOriginating updateStatusHistory
Applications using Microsoft Jet database fail to open
Applications that use a Microsoft Jet database with the Microsoft Access 97 file format may fail to open if the database has column names greater than 32 characters. The database will fail to open with the error, “Unrecognized Database Format”.

Affected platforms:
  • Client: Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 8.1; Windows 7, Service Pack 1 
  • Server: Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2; Windows Server 2008 R2 SP1 

Resolution: This issue is resolved in KB4487026.

Back to top
OS Build 14393.2724

January 08, 2019
KB4480961
Resolved
KB4487026
Resolved:
February 12, 2019
10:00 AM PT

Opened:
January 08, 2019
10:00 AM PT
First character of the Japanese era name not recognized as an abbreviation
After installing KB4480977, the first character of the Japanese era name is not recognized as an abbreviation and may cause date parsing issues.

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 8.1; Windows 7, Service Pack 1
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2; Windows Server 2008 R2 SP1

Resolution: This issue is resolved in KB4487006.

Back to top
OS Build 14393.2759

January 17, 2019
KB4480977
Resolved
KB4487006
Resolved:
February 19, 2019
02:00 PM PT

Opened:
January 17, 2019
02:00 PM PT
Internet Explorer 11 authentication issue with multiple concurrent logons
After installing KB4480961, Internet Explorer 11 and other applications that use WININET.DLL may have authentication issues. This occurs when two or more people use the same user account for multiple, concurrent login sessions on the same Windows Server machine, including Remote Desktop Protocol (RDP) and Terminal Server logons. Symptoms reported by customers include, but may not be limited to:
  • Cache size and location show zero or empty.
  • Keyboard shortcuts may not work properly.
  • Webpages may intermittently fail to load or render correctly.
  • Issues with credential prompts.
  • Issues when downloading files.

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10 Enterprise LTSC 2016; Windows 8.1; Windows 7, Service Pack 1
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server 2016; Windows Server 2012 R2; Windows Server 2008 R2 SP1

Resolution: This issue was resolved in KB4493470.

Back to top
OS Build 14393.2724

January 08, 2019
KB4480961
Resolved
KB4493470
Resolved:
April 09, 2019
10:00 AM PT

Opened:
January 08, 2019
10:00 AM PT
MSXML6 may cause applications to stop responding
After installing KB4480961, MSXML6 causes applications to stop responding if an exception was thrown during node operations, such as appendChild(), insertBefore(), and moveNode().

The Group Policy editor may stop responding when editing a Group Policy Object (GPO) that contains Group Policy Preferences (GPP) for Internet Explorer 10 settings.

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 8.1
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2

Resolution: This issue was resolved in KB4493470.

Back to top
OS Build 14393.2724

January 08, 2019
KB4480961
Resolved
KB4493470
Resolved:
April 09, 2019
10:00 AM PT

Opened:
January 08, 2019
10:00 AM PT
Unable to access hotspots with third-party applications
After installing KB4480961, third-party applications may have difficulty authenticating hotspots.

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 8.1
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2

Resolution: This issue is resolved in KB4480977.

Back to top
OS Build 14393.2724

January 08, 2019
KB4480961
Resolved
KB4480977
Resolved:
January 17, 2019
02:00 PM PT

Opened:
January 08, 2019
10:00 AM PT
Applications using Microsoft Jet database fail to open
Applications that use a Microsoft Jet database with the Microsoft Access 97 file format may fail to open if the database has column names greater than 32 characters. The database will fail to open with the error, “Unrecognized Database Format”.

Affected platforms:
  • Client: Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 8.1; Windows 7, Service Pack 1 
  • Server: Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2; Windows Server 2008 R2 SP1 
Resolution: This issue is resolved in KB4487026.

Back to top
OS Build 14393.2724

January 08, 2019
KB4480961
Resolved
KB4487026
Resolved:
February 12, 2019
10:00 AM PT

Opened:
January 08, 2019
10:00 AM PT
First character of the Japanese era name not recognized as an abbreviation
After installing KB4480977, the first character of the Japanese era name is not recognized as an abbreviation and may cause date parsing issues.

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 8.1; Windows 7, Service Pack 1
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2; Windows Server 2008 R2 SP1
Resolution: This issue is resolved in KB4487006.

Back to top
OS Build 14393.2759

January 17, 2019
KB4480977
Resolved
KB4487006
Resolved:
February 19, 2019
02:00 PM PT

Opened:
January 17, 2019
02:00 PM PT
Internet Explorer 11 authentication issue with multiple concurrent logons
After installing KB4480961, Internet Explorer 11 and other applications that use WININET.DLL may have authentication issues. This occurs when two or more people use the same user account for multiple, concurrent login sessions on the same Windows Server machine, including Remote Desktop Protocol (RDP) and Terminal Server logons. Symptoms reported by customers include, but may not be limited to:
  • Cache size and location show zero or empty.
  • Keyboard shortcuts may not work properly.
  • Webpages may intermittently fail to load or render correctly.
  • Issues with credential prompts.
  • Issues when downloading files.
Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10 Enterprise LTSC 2016; Windows 8.1; Windows 7, Service Pack 1
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server 2016; Windows Server 2012 R2; Windows Server 2008 R2 SP1
Resolution: This issue was resolved in KB4493470.

Back to top
OS Build 14393.2724

January 08, 2019
KB4480961
Resolved
KB4493470
Resolved:
April 09, 2019
10:00 AM PT

Opened:
January 08, 2019
10:00 AM PT
MSXML6 may cause applications to stop responding
After installing KB4480961, MSXML6 causes applications to stop responding if an exception was thrown during node operations, such as appendChild(), insertBefore(), and moveNode().

The Group Policy editor may stop responding when editing a Group Policy Object (GPO) that contains Group Policy Preferences (GPP) for Internet Explorer 10 settings.

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 8.1
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2
Resolution: This issue was resolved in KB4493470.

Back to top
OS Build 14393.2724

January 08, 2019
KB4480961
Resolved
KB4493470
Resolved:
April 09, 2019
10:00 AM PT

Opened:
January 08, 2019
10:00 AM PT
Unable to access hotspots with third-party applications
After installing KB4480961, third-party applications may have difficulty authenticating hotspots.

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 8.1
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2
Resolution: This issue is resolved in KB4480977.

Back to top
OS Build 14393.2724

January 08, 2019
KB4480961
Resolved
KB4480977
Resolved:
January 17, 2019
02:00 PM PT

Opened:
January 08, 2019
10:00 AM PT
" @@ -97,7 +97,7 @@ sections: - type: markdown text: " - +
DetailsOriginating updateStatusHistory
Instant search in Microsoft Outlook fails on Windows Server 2016
After installing KB4467684 on Windows Server 2016, instant search in Microsoft Outlook clients fail with the error, \"Outlook cannot perform the search\".

Affected platforms:
  • Client: Windows 10 Enterprise LTSC 2016
  • Server: Windows Server 2016

Resolution: This issue is resolved in KB4487026.

Back to top
OS Build 14393.2639

November 27, 2018
KB4467684
Resolved
KB4487026
Resolved:
February 12, 2019
10:00 AM PT

Opened:
November 27, 2018
10:00 AM PT
Instant search in Microsoft Outlook fails on Windows Server 2016
After installing KB4467684 on Windows Server 2016, instant search in Microsoft Outlook clients fail with the error, \"Outlook cannot perform the search\".

Affected platforms:
  • Client: Windows 10 Enterprise LTSC 2016
  • Server: Windows Server 2016
Resolution: This issue is resolved in KB4487026.

Back to top
OS Build 14393.2639

November 27, 2018
KB4467684
Resolved
KB4487026
Resolved:
February 12, 2019
10:00 AM PT

Opened:
November 27, 2018
10:00 AM PT
System becomes unresponsive when end-user-defined characters (EUDC) are used
When features related to end-user-defined characters (EUDC) are used, the entire system may become unresponsive. 

Affected platforms:
  • Client: Windows 10 Enterprise LTSC 2016
  • Server: Windows Server 2016
 
Resolution: This issue is resolved in KB4471321

Back to top
OS Build 14393.2639

November 27, 2018
KB4467684
Resolved
KB4471321
Resolved:
December 11, 2018
10:00 AM PT

Opened:
November 27, 2018
10:00 AM PT
" @@ -107,7 +107,7 @@ sections: - type: markdown text: " - +
DetailsOriginating updateStatusHistory
Unable to use Seek bar in Windows Media Player
After installing KB4462917, users may not be able to use the Seek Bar in Windows Media Player when playing specific files. This issue does not affect normal playback.

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 8.1; Windows 7, Service Pack 1
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2; Windows Server 2008 R2 SP1

Resolution: This issue is resolved in KB4471321.

Back to top
OS Build 14393.2551

October 09, 2018
KB4462917
Resolved
KB4471321
Resolved:
December 11, 2018
10:00 AM PT

Opened:
October 09, 2018
10:00 AM PT
Unable to use Seek bar in Windows Media Player
After installing KB4462917, users may not be able to use the Seek Bar in Windows Media Player when playing specific files. This issue does not affect normal playback.

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 8.1; Windows 7, Service Pack 1
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2; Windows Server 2008 R2 SP1
Resolution: This issue is resolved in KB4471321.

Back to top
OS Build 14393.2551

October 09, 2018
KB4462917
Resolved
KB4471321
Resolved:
December 11, 2018
10:00 AM PT

Opened:
October 09, 2018
10:00 AM PT
" @@ -116,7 +116,7 @@ sections: - type: markdown text: " - +
DetailsOriginating updateStatusHistory
Promotions that create non-root domains fail with optional features enabled
After installing KB4457127, Windows Server 2016 promotions that create non-root domains fail in forests in which optional features like Active Directory recycle have been enabled. The error is, “The replication operation encountered a database error.”

Affected platforms:
  • Client: Windows 10 Enterprise LTSC 2016
  • Server: Windows Server 2016

Resolution: This issue is resolved in KB4467684.

Back to top
OS Build 14393.2515

September 20, 2018
KB4457127
Resolved
KB4467684
Resolved:
November 27, 2018
10:00 AM PT

Opened:
September 20, 2018
10:00 AM PT
Promotions that create non-root domains fail with optional features enabled
After installing KB4457127, Windows Server 2016 promotions that create non-root domains fail in forests in which optional features like Active Directory recycle have been enabled. The error is, “The replication operation encountered a database error.”

Affected platforms:
  • Client: Windows 10 Enterprise LTSC 2016
  • Server: Windows Server 2016
Resolution: This issue is resolved in KB4467684.

Back to top
OS Build 14393.2515

September 20, 2018
KB4457127
Resolved
KB4467684
Resolved:
November 27, 2018
10:00 AM PT

Opened:
September 20, 2018
10:00 AM PT
" @@ -125,7 +125,7 @@ sections: - type: markdown text: " - - + +
DetailsOriginating updateStatusHistory
Issues with install and activation of Key Management Service (KMS) (CSVLK) host keys
After installing KB4343884, installation and client activation of Windows Server 2019 and Windows 10 Enterprise 2019 LTSC Key Management Service (KMS) CSVLK host keys do not work as expected.

Affected platforms:
  • Client: Windows 10 Enterprise LTSC 2016
  • Server: Windows Server 2016

Resolution: This issue is resolved in KB4467684.

Back to top
OS Build 14393.2457

August 30, 2018
KB4343884
Resolved
KB4467684
Resolved:
November 27, 2018
10:00 AM PT

Opened:
August 30, 2018
05:00 PM PT
SqlConnection instantiation exception on .NET 4.6 and later
After you install the August Preview of Quality Rollup or September 11, 2018 .NET Framework update, instantiation of SqlConnection can throw an exception.

For more information about this issue, see the following article in the Microsoft Knowledge Base: 4470809, SqlConnection instantiation exception on .NET 4.6 and later after August-September 2018 .NET Framework updates.

Affected platforms:
  • Client: Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016
  • Server: Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016

Resolution: This issue is resolved in KB4480977.

Back to top
OS Build 14393.2457

August 30, 2018
KB4343884
Resolved
KB4480977
Resolved:
January 17, 2019
02:00 PM PT

Opened:
August 30, 2018
05:00 PM PT
Issues with install and activation of Key Management Service (KMS) (CSVLK) host keys
After installing KB4343884, installation and client activation of Windows Server 2019 and Windows 10 Enterprise 2019 LTSC Key Management Service (KMS) CSVLK host keys do not work as expected.

Affected platforms:
  • Client: Windows 10 Enterprise LTSC 2016
  • Server: Windows Server 2016
Resolution: This issue is resolved in KB4467684.

Back to top
OS Build 14393.2457

August 30, 2018
KB4343884
Resolved
KB4467684
Resolved:
November 27, 2018
10:00 AM PT

Opened:
August 30, 2018
05:00 PM PT
SqlConnection instantiation exception on .NET 4.6 and later
After you install the August Preview of Quality Rollup or September 11, 2018 .NET Framework update, instantiation of SqlConnection can throw an exception.

For more information about this issue, see the following article in the Microsoft Knowledge Base: 4470809, SqlConnection instantiation exception on .NET 4.6 and later after August-September 2018 .NET Framework updates.

Affected platforms:
  • Client: Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016
  • Server: Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016
Resolution: This issue is resolved in KB4480977.

Back to top
OS Build 14393.2457

August 30, 2018
KB4343884
Resolved
KB4480977
Resolved:
January 17, 2019
02:00 PM PT

Opened:
August 30, 2018
05:00 PM PT
" diff --git a/windows/release-information/resolved-issues-windows-10-1703.yml b/windows/release-information/resolved-issues-windows-10-1703.yml index efa136c4a0..9d1ea03cc3 100644 --- a/windows/release-information/resolved-issues-windows-10-1703.yml +++ b/windows/release-information/resolved-issues-windows-10-1703.yml @@ -60,7 +60,7 @@ sections: - type: markdown text: " - +
DetailsOriginating updateStatusHistory
End-user-defined characters (EUDC) may cause blue screen at startup
If you enable per font end-user-defined characters (EUDC), the system may stop working and a blue screen may appear at startup. This is not a common setting in non-Asian regions.

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016

Resolution: This issue was resolved in KB4493474.

Back to top
OS Build 15063.1716

March 19, 2019
KB4489888
Resolved
KB4493474
Resolved:
April 09, 2019
10:00 AM PT

Opened:
March 19, 2019
10:00 AM PT
End-user-defined characters (EUDC) may cause blue screen at startup
If you enable per font end-user-defined characters (EUDC), the system may stop working and a blue screen may appear at startup. This is not a common setting in non-Asian regions.

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016
Resolution: This issue was resolved in KB4493474.

Back to top
OS Build 15063.1716

March 19, 2019
KB4489888
Resolved
KB4493474
Resolved:
April 09, 2019
10:00 AM PT

Opened:
March 19, 2019
10:00 AM PT
" @@ -69,9 +69,9 @@ sections: - type: markdown text: " - - - + + +
DetailsOriginating updateStatusHistory
Applications using Microsoft Jet database and Access 95 file format stop working
Applications that use a Microsoft Jet database with the Microsoft Access 95 file format may randomly stop working.

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 7, Service Pack 1
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2008 R2 SP1

Resolution: This issue is resolved in KB4487011.

Back to top
OS Build 15063.1631

February 12, 2019
KB4487020
Resolved
KB4487011
Resolved:
February 19, 2019
02:00 PM PT

Opened:
February 12, 2019
10:00 AM PT
Error 1309 when installing/uninstalling MSI or MSP files
After installing KB4487011, users may receive “Error 1309” while installing or uninstalling certain types of MSI and MSP files.

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 8.1
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2

Resolution: This issue is resolved in KB4489871.

Back to top
OS Build 15063.1659

February 19, 2019
KB4487011
Resolved
KB4489871
Resolved:
March 12, 2019
10:00 AM PT

Opened:
February 19, 2019
02:00 PM PT
Internet Explorer may fail to load images
After installing KB4487020, Internet Explorer may fail to load images with a backslash (\\) in their relative source path.

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 8.1; Windows 7, Service Pack 1
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2; Windows Server 2008 R2 SP1

Resolution: This issue is resolved in KB4487011.

Back to top
OS Build 15063.1631

February 12, 2019
KB4487020
Resolved
KB4487011
Resolved:
February 19, 2019
02:00 PM PT

Opened:
February 12, 2019
10:00 AM PT
Applications using Microsoft Jet database and Access 95 file format stop working
Applications that use a Microsoft Jet database with the Microsoft Access 95 file format may randomly stop working.

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 7, Service Pack 1
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2008 R2 SP1
Resolution: This issue is resolved in KB4487011.

Back to top
OS Build 15063.1631

February 12, 2019
KB4487020
Resolved
KB4487011
Resolved:
February 19, 2019
02:00 PM PT

Opened:
February 12, 2019
10:00 AM PT
Error 1309 when installing/uninstalling MSI or MSP files
After installing KB4487011, users may receive “Error 1309” while installing or uninstalling certain types of MSI and MSP files.

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 8.1
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2
Resolution: This issue is resolved in KB4489871.

Back to top
OS Build 15063.1659

February 19, 2019
KB4487011
Resolved
KB4489871
Resolved:
March 12, 2019
10:00 AM PT

Opened:
February 19, 2019
02:00 PM PT
Internet Explorer may fail to load images
After installing KB4487020, Internet Explorer may fail to load images with a backslash (\\) in their relative source path.

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 8.1; Windows 7, Service Pack 1
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2; Windows Server 2008 R2 SP1
Resolution: This issue is resolved in KB4487011.

Back to top
OS Build 15063.1631

February 12, 2019
KB4487020
Resolved
KB4487011
Resolved:
February 19, 2019
02:00 PM PT

Opened:
February 12, 2019
10:00 AM PT
" @@ -80,11 +80,11 @@ sections: - type: markdown text: " - - - - - + + + + +
DetailsOriginating updateStatusHistory
Applications using Microsoft Jet database fail to open
Applications that use a Microsoft Jet database with the Microsoft Access 97 file format may fail to open if the database has column names greater than 32 characters. The database will fail to open with the error, “Unrecognized Database Format”.

Affected platforms:
  • Client: Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 8.1; Windows 7, Service Pack 1 
  • Server: Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2; Windows Server 2008 R2 SP1

Resolution: This issue is resolved in KB4487020.

Back to top
OS Build 15063.1563

January 08, 2019
KB4480973
Resolved
KB4487020
Resolved:
February 12, 2019
10:00 AM PT

Opened:
January 08, 2019
10:00 AM PT
First character of the Japanese era name not recognized as an abbreviation
After installing KB4480959, the first character of the Japanese era name is not recognized as an abbreviation and may cause date parsing issues.

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 8.1; Windows 7, Service Pack 1
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2; Windows Server 2008 R2 SP1

Resolution: This issue is resolved in KB4487011.

Back to top
OS Build 15063.1596

January 15, 2019
KB4480959
Resolved
KB4487011
Resolved:
February 19, 2019
02:00 PM PT

Opened:
January 15, 2019
10:00 AM PT
MSXML6 may cause applications to stop responding
After installing KB4480973, MSXML6 causes applications to stop responding if an exception was thrown during node operations, such as appendChild(), insertBefore(), and moveNode().

The Group Policy editor may stop responding when editing a Group Policy Object (GPO) that contains Group Policy Preferences (GPP) for Internet Explorer 10 settings.

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 8.1
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2

Resolution: This issue was resolved in KB4493474.

Back to top
OS Build 15063.1563

January 08, 2019
KB4480973
Resolved
KB4493474
Resolved:
April 09, 2019
10:00 AM PT

Opened:
January 08, 2019
10:00 AM PT
Unable to access hotspots with third-party applications
After installing KB4480973, third-party applications may have difficulty authenticating hotspots.

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 8.1
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2

Resolution: This issue is resolved in KB4480959.

Back to top
OS Build 15063.1563

January 08, 2019
KB4480973
Resolved
KB4480959
Resolved:
January 15, 2019
10:00 AM PT

Opened:
January 08, 2019
10:00 AM PT
Webpages become unresponsive in Microsoft Edge
After installing KB4480973, some Microsoft Edge users report that they:
  • Cannot load webpages using a local IP address.
  • Cannot load webpages on the Internet using a VPN connection.
Browsing fails or the webpage may become unresponsive.

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709

Resolution: This issue is resolved in KB4487020.

Back to top
OS Build 15063.1563

January 08, 2019
KB4480973
Resolved
KB4487020
Resolved:
February 12, 2019
10:00 AM PT

Opened:
January 08, 2019
10:00 AM PT
Applications using Microsoft Jet database fail to open
Applications that use a Microsoft Jet database with the Microsoft Access 97 file format may fail to open if the database has column names greater than 32 characters. The database will fail to open with the error, “Unrecognized Database Format”.

Affected platforms:
  • Client: Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 8.1; Windows 7, Service Pack 1 
  • Server: Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2; Windows Server 2008 R2 SP1
Resolution: This issue is resolved in KB4487020.

Back to top
OS Build 15063.1563

January 08, 2019
KB4480973
Resolved
KB4487020
Resolved:
February 12, 2019
10:00 AM PT

Opened:
January 08, 2019
10:00 AM PT
First character of the Japanese era name not recognized as an abbreviation
After installing KB4480959, the first character of the Japanese era name is not recognized as an abbreviation and may cause date parsing issues.

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 8.1; Windows 7, Service Pack 1
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2; Windows Server 2008 R2 SP1
Resolution: This issue is resolved in KB4487011.

Back to top
OS Build 15063.1596

January 15, 2019
KB4480959
Resolved
KB4487011
Resolved:
February 19, 2019
02:00 PM PT

Opened:
January 15, 2019
10:00 AM PT
MSXML6 may cause applications to stop responding
After installing KB4480973, MSXML6 causes applications to stop responding if an exception was thrown during node operations, such as appendChild(), insertBefore(), and moveNode().

The Group Policy editor may stop responding when editing a Group Policy Object (GPO) that contains Group Policy Preferences (GPP) for Internet Explorer 10 settings.

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 8.1
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2
Resolution: This issue was resolved in KB4493474.

Back to top
OS Build 15063.1563

January 08, 2019
KB4480973
Resolved
KB4493474
Resolved:
April 09, 2019
10:00 AM PT

Opened:
January 08, 2019
10:00 AM PT
Unable to access hotspots with third-party applications
After installing KB4480973, third-party applications may have difficulty authenticating hotspots.

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 8.1
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2
Resolution: This issue is resolved in KB4480959.

Back to top
OS Build 15063.1563

January 08, 2019
KB4480973
Resolved
KB4480959
Resolved:
January 15, 2019
10:00 AM PT

Opened:
January 08, 2019
10:00 AM PT
Webpages become unresponsive in Microsoft Edge
After installing KB4480973, some Microsoft Edge users report that they:
  • Cannot load webpages using a local IP address.
  • Cannot load webpages on the Internet using a VPN connection.
Browsing fails or the webpage may become unresponsive.

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709
Resolution: This issue is resolved in KB4487020.

Back to top
OS Build 15063.1563

January 08, 2019
KB4480973
Resolved
KB4487020
Resolved:
February 12, 2019
10:00 AM PT

Opened:
January 08, 2019
10:00 AM PT
" @@ -93,9 +93,9 @@ sections: - type: markdown text: " - - - + + +
DetailsOriginating updateStatusHistory
Error message beginning with “Hosted by…” when launching Microsoft Edge
After installing KB4462937, some users may see a dialog box with a non-applicable message beginning with the words “Hosted by...” when first starting Microsoft Edge.

This dialog will only appear once if they have turned on “Block only third-party cookies” in Microsoft Edge and applied certain language packs before installing this update.

Affected platforms:
  • Client: Windows 10, version 1709; Windows 10, version 1703
  • Server: Windows Server, version 1709

Resolution: This issue is resolved in KB4462939.

Back to top
OS Build 15063.1387

October 09, 2018
KB4462937
Resolved
KB4462939
Resolved:
October 18, 2018
10:00 AM PT

Opened:
October 09, 2018
10:00 AM PT
LongonUI.exe stops working intermittently
After installing KB4462937, LogonUI.exe stops working intermittently.

Affected platforms:
  • Windows 10, version 1703

Resolution: This issue is resolved in KB4467699.

Back to top
OS Build 15063.1387

October 09, 2018
KB4462937
Resolved
KB4467699
Resolved:
November 27, 2018
10:00 AM PT

Opened:
October 09, 2018
10:00 AM PT
Unable to use Seek bar in Windows Media Player
After installing KB4462937, users may not be able to use the Seek Bar in Windows Media Player when playing specific files. This issue does not affect normal playback.

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 8.1; Windows 7, Service Pack 1
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2; Windows Server 2008 R2 SP1

Resolution: This issue is resolved in KB4471327.

Back to top
OS Build 15063.1387

October 09, 2018
KB4462937
Resolved
KB4471327
Resolved:
December 11, 2018
10:00 AM PT

Opened:
October 09, 2018
10:00 AM PT
Error message beginning with “Hosted by…” when launching Microsoft Edge
After installing KB4462937, some users may see a dialog box with a non-applicable message beginning with the words “Hosted by...” when first starting Microsoft Edge.

This dialog will only appear once if they have turned on “Block only third-party cookies” in Microsoft Edge and applied certain language packs before installing this update.

Affected platforms:
  • Client: Windows 10, version 1709; Windows 10, version 1703
  • Server: Windows Server, version 1709
Resolution: This issue is resolved in KB4462939.

Back to top
OS Build 15063.1387

October 09, 2018
KB4462937
Resolved
KB4462939
Resolved:
October 18, 2018
10:00 AM PT

Opened:
October 09, 2018
10:00 AM PT
LongonUI.exe stops working intermittently
After installing KB4462937, LogonUI.exe stops working intermittently.

Affected platforms:
  • Windows 10, version 1703
Resolution: This issue is resolved in KB4467699.

Back to top
OS Build 15063.1387

October 09, 2018
KB4462937
Resolved
KB4467699
Resolved:
November 27, 2018
10:00 AM PT

Opened:
October 09, 2018
10:00 AM PT
Unable to use Seek bar in Windows Media Player
After installing KB4462937, users may not be able to use the Seek Bar in Windows Media Player when playing specific files. This issue does not affect normal playback.

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 8.1; Windows 7, Service Pack 1
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2; Windows Server 2008 R2 SP1
Resolution: This issue is resolved in KB4471327.

Back to top
OS Build 15063.1387

October 09, 2018
KB4462937
Resolved
KB4471327
Resolved:
December 11, 2018
10:00 AM PT

Opened:
October 09, 2018
10:00 AM PT
" @@ -104,6 +104,6 @@ sections: - type: markdown text: " - +
DetailsOriginating updateStatusHistory
SqlConnection instantiation exception on .NET 4.6 and later
After you install the August Preview of Quality Rollup or September 11, 2018 .NET Framework update, instantiation of SqlConnection can throw an exception.

For more information about this issue, see the following article in the Microsoft Knowledge Base:
4470809 SqlConnection instantiation exception on .NET 4.6 and later after August-September 2018 .NET Framework updates.

Affected platforms:
  • Client: Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016
  • Server: Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016

Resolution: This issue is resolved in KB4480959.

Back to top
OS Build 15063.1292

August 30, 2018
KB4343889
Resolved
KB4480959
Resolved:
January 15, 2019
10:00 AM PT

Opened:
August 30, 2018
05:00 PM PT
SqlConnection instantiation exception on .NET 4.6 and later
After you install the August Preview of Quality Rollup or September 11, 2018 .NET Framework update, instantiation of SqlConnection can throw an exception.

For more information about this issue, see the following article in the Microsoft Knowledge Base:
4470809 SqlConnection instantiation exception on .NET 4.6 and later after August-September 2018 .NET Framework updates.

Affected platforms:
  • Client: Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016
  • Server: Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016
Resolution: This issue is resolved in KB4480959.

Back to top
OS Build 15063.1292

August 30, 2018
KB4343889
Resolved
KB4480959
Resolved:
January 15, 2019
10:00 AM PT

Opened:
August 30, 2018
05:00 PM PT
" diff --git a/windows/release-information/resolved-issues-windows-10-1709.yml b/windows/release-information/resolved-issues-windows-10-1709.yml index 25a903edb5..d07a0b5a13 100644 --- a/windows/release-information/resolved-issues-windows-10-1709.yml +++ b/windows/release-information/resolved-issues-windows-10-1709.yml @@ -60,8 +60,8 @@ sections: - type: markdown text: " - - + +
DetailsOriginating updateStatusHistory
End-user-defined characters (EUDC) may cause blue screen at startup
If you enable per font end-user-defined characters (EUDC), the system may stop working and a blue screen may appear at startup. This is not a common setting in non-Asian regions.

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016

Resolution: This issue is resolved in KB4493441.

Back to top
OS Build 16299.1059

March 19, 2019
KB4489890
Resolved
KB4493441
Resolved:
April 09, 2019
10:00 AM PT

Opened:
March 19, 2019
10:00 AM PT
Stop error when attempting to start SSH from WSL
After applying KB4489886, a stop error occurs when attempting to start the Secure Shell (SSH) client program from Windows Subsystem for Linux (WSL) with agent forwarding enabled using a command line switch (ssh –A) or a configuration setting.

Affected platforms:
  • Client: Windows 10, version 1803; Windows 10, version 1709
  • Server: Windows Server, version 1803; Windows Server, version 1709

Resolution: This issue is resolved in KB4493441.

Back to top
OS Build 16299.1029

March 12, 2019
KB4489886
Resolved
KB4493441
Resolved:
April 09, 2019
10:00 AM PT

Opened:
March 12, 2019
10:00 AM PT
End-user-defined characters (EUDC) may cause blue screen at startup
If you enable per font end-user-defined characters (EUDC), the system may stop working and a blue screen may appear at startup. This is not a common setting in non-Asian regions.

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016
Resolution: This issue is resolved in KB4493441.

Back to top
OS Build 16299.1059

March 19, 2019
KB4489890
Resolved
KB4493441
Resolved:
April 09, 2019
10:00 AM PT

Opened:
March 19, 2019
10:00 AM PT
Stop error when attempting to start SSH from WSL
After applying KB4489886, a stop error occurs when attempting to start the Secure Shell (SSH) client program from Windows Subsystem for Linux (WSL) with agent forwarding enabled using a command line switch (ssh –A) or a configuration setting.

Affected platforms:
  • Client: Windows 10, version 1803; Windows 10, version 1709
  • Server: Windows Server, version 1803; Windows Server, version 1709
Resolution: This issue is resolved in KB4493441.

Back to top
OS Build 16299.1029

March 12, 2019
KB4489886
Resolved
KB4493441
Resolved:
April 09, 2019
10:00 AM PT

Opened:
March 12, 2019
10:00 AM PT
" @@ -70,9 +70,9 @@ sections: - type: markdown text: " - - - + + +
DetailsOriginating updateStatusHistory
Applications using Microsoft Jet database and Access 95 file format stop working
Applications that use a Microsoft Jet database with the Microsoft Access 95 file format may randomly stop working.

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 7, Service Pack 1
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2008 R2 SP1

Resolution: This issue is resolved in KB4487021.

Back to top
OS Build 16299.967

February 12, 2019
KB4486996
Resolved
KB4487021
Resolved:
February 19, 2019
02:00 PM PT

Opened:
February 12, 2019
10:00 AM PT
Error 1309 when installing/uninstalling MSI or MSP files
After installing KB4486996, users may receive “Error 1309” while installing or uninstalling certain types of MSI and MSP files.

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 8.1
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2

Resolution: This issue is resolved in KB4489886.

Back to top
OS Build 16299.967

February 12, 2019
KB4486996
Resolved
KB4489886
Resolved:
March 12, 2019
10:00 AM PT

Opened:
February 12, 2019
10:00 AM PT
Internet Explorer may fail to load images
After installing KB4486996, Internet Explorer may fail to load images with a backslash (\\) in their relative source path.

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 8.1; Windows 7, Service Pack 1
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2; Windows Server 2008 R2 SP1

Resolution: This issue is resolved in KB4487021.

Back to top
OS Build 16299.967

February 12, 2019
KB4486996
Resolved
KB4487021
Resolved:
February 19, 2019
02:00 PM PT

Opened:
February 12, 2019
10:00 AM PT
Applications using Microsoft Jet database and Access 95 file format stop working
Applications that use a Microsoft Jet database with the Microsoft Access 95 file format may randomly stop working.

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 7, Service Pack 1
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2008 R2 SP1
Resolution: This issue is resolved in KB4487021.

Back to top
OS Build 16299.967

February 12, 2019
KB4486996
Resolved
KB4487021
Resolved:
February 19, 2019
02:00 PM PT

Opened:
February 12, 2019
10:00 AM PT
Error 1309 when installing/uninstalling MSI or MSP files
After installing KB4486996, users may receive “Error 1309” while installing or uninstalling certain types of MSI and MSP files.

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 8.1
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2
Resolution: This issue is resolved in KB4489886.

Back to top
OS Build 16299.967

February 12, 2019
KB4486996
Resolved
KB4489886
Resolved:
March 12, 2019
10:00 AM PT

Opened:
February 12, 2019
10:00 AM PT
Internet Explorer may fail to load images
After installing KB4486996, Internet Explorer may fail to load images with a backslash (\\) in their relative source path.

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 8.1; Windows 7, Service Pack 1
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2; Windows Server 2008 R2 SP1
Resolution: This issue is resolved in KB4487021.

Back to top
OS Build 16299.967

February 12, 2019
KB4486996
Resolved
KB4487021
Resolved:
February 19, 2019
02:00 PM PT

Opened:
February 12, 2019
10:00 AM PT
" @@ -81,11 +81,11 @@ sections: - type: markdown text: " - - - - - + + + + +
DetailsOriginating updateStatusHistory
Applications using Microsoft Jet database fail to open
Applications that use a Microsoft Jet database with the Microsoft Access 97 file format may fail to open if the database has column names greater than 32 characters. The database will fail to open with the error, “Unrecognized Database Format.”

Affected platforms:
  • Client: Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 8.1; Windows 7, Service Pack 1 
  • Server: Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2; Windows Server 2008 R2 SP1 

Resolution: This issue is resolved in KB4486996.

Back to top
OS Build 16299.904

January 08, 2019
KB4480978
Resolved
KB4486996
Resolved:
February 12, 2019
10:00 AM PT

Opened:
January 08, 2019
10:00 AM PT
First character of the Japanese era name not recognized as an abbreviation
After installing KB4480967, the first character of the Japanese era name is not recognized as an abbreviation and may cause date parsing issues.

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 8.1; Windows 7, Service Pack 1
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2; Windows Server 2008 R2 SP1

Resolution: This issue is resolved in KB4487021.

Back to top
OS Build 16299.936

January 15, 2019
KB4480967
Resolved
KB4487021
Resolved:
February 19, 2019
02:00 PM PT

Opened:
January 15, 2019
10:00 AM PT
MSXML6 causes applications to stop responding if an exception was thrown
After installing KB4480978, MSXML6 causes applications to stop responding if an exception was thrown during node operations, such as appendChild(), insertBefore(), and moveNode().

The Group Policy editor may stop responding when editing a Group Policy Object (GPO) that contains Group Policy Preferences (GPP) for Internet Explorer 10 settings.

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 8.1
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2

Resolution: This issue is resolved in KB4493441.

Back to top
OS Build 16299.904

January 08, 2019
KB4480978
Resolved
KB4493441
Resolved:
April 09, 2019
10:00 AM PT

Opened:
January 08, 2019
10:00 AM PT
Unable to access hotspots with third-party applications
After installing KB4480978, third-party applications may have difficulty authenticating hotspots.

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 8.1
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2

Resolution: This issue is resolved in KB4480967.

Back to top
OS Build 16299.904

January 08, 2019
KB4480978
Resolved
KB4480967
Resolved:
January 15, 2019
10:00 AM PT

Opened:
January 08, 2019
10:00 AM PT
Webpages become unresponsive in Microsoft Edge
After installing KB4480978, some Microsoft Edge users report that they:
  • Cannot load webpages using a local IP address.
  • Cannot load webpages on the Internet using a VPN connection.
Browsing fails or the webpage may become unresponsive.

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709

Resolution: This issue is resolved in KB4486996.

Back to top
OS Build 16299.904

January 08, 2019
KB4480978
Resolved
KB4486996
Resolved:
February 12, 2019
10:00 AM PT

Opened:
January 08, 2019
10:00 AM PT
Applications using Microsoft Jet database fail to open
Applications that use a Microsoft Jet database with the Microsoft Access 97 file format may fail to open if the database has column names greater than 32 characters. The database will fail to open with the error, “Unrecognized Database Format.”

Affected platforms:
  • Client: Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 8.1; Windows 7, Service Pack 1 
  • Server: Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2; Windows Server 2008 R2 SP1 
Resolution: This issue is resolved in KB4486996.

Back to top
OS Build 16299.904

January 08, 2019
KB4480978
Resolved
KB4486996
Resolved:
February 12, 2019
10:00 AM PT

Opened:
January 08, 2019
10:00 AM PT
First character of the Japanese era name not recognized as an abbreviation
After installing KB4480967, the first character of the Japanese era name is not recognized as an abbreviation and may cause date parsing issues.

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 8.1; Windows 7, Service Pack 1
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2; Windows Server 2008 R2 SP1
Resolution: This issue is resolved in KB4487021.

Back to top
OS Build 16299.936

January 15, 2019
KB4480967
Resolved
KB4487021
Resolved:
February 19, 2019
02:00 PM PT

Opened:
January 15, 2019
10:00 AM PT
MSXML6 causes applications to stop responding if an exception was thrown
After installing KB4480978, MSXML6 causes applications to stop responding if an exception was thrown during node operations, such as appendChild(), insertBefore(), and moveNode().

The Group Policy editor may stop responding when editing a Group Policy Object (GPO) that contains Group Policy Preferences (GPP) for Internet Explorer 10 settings.

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 8.1
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2
Resolution: This issue is resolved in KB4493441.

Back to top
OS Build 16299.904

January 08, 2019
KB4480978
Resolved
KB4493441
Resolved:
April 09, 2019
10:00 AM PT

Opened:
January 08, 2019
10:00 AM PT
Unable to access hotspots with third-party applications
After installing KB4480978, third-party applications may have difficulty authenticating hotspots.

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 8.1
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2
Resolution: This issue is resolved in KB4480967.

Back to top
OS Build 16299.904

January 08, 2019
KB4480978
Resolved
KB4480967
Resolved:
January 15, 2019
10:00 AM PT

Opened:
January 08, 2019
10:00 AM PT
Webpages become unresponsive in Microsoft Edge
After installing KB4480978, some Microsoft Edge users report that they:
  • Cannot load webpages using a local IP address.
  • Cannot load webpages on the Internet using a VPN connection.
Browsing fails or the webpage may become unresponsive.

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709
Resolution: This issue is resolved in KB4486996.

Back to top
OS Build 16299.904

January 08, 2019
KB4480978
Resolved
KB4486996
Resolved:
February 12, 2019
10:00 AM PT

Opened:
January 08, 2019
10:00 AM PT
" @@ -94,8 +94,8 @@ sections: - type: markdown text: " - - + +
DetailsOriginating updateStatusHistory
Error message beginning with “Hosted by…” when launching Microsoft Edge
After installing KB4462918, some users may see a dialog box with a non-applicable message beginning with the words “Hosted by...” when first starting Microsoft Edge.

This dialog will only appear once if they have turned on “Block only third-party cookies” in Microsoft Edge and applied certain language packs before installing this update.

Affected platforms:
  • Client: Windows 10, version 1709; Windows 10, version 1703
  • Server: Windows Server, version 1709

Resolution: This issue is resolved in KB4462932.

Back to top
OS Build 16299.726

October 09, 2018
KB4462918
Resolved
KB4462932
Resolved:
October 18, 2018
10:00 AM PT

Opened:
October 09, 2018
10:00 AM PT
Unable to use Seek bar in Windows Media Player
After installing KB4462918, users may not be able to use the Seek Bar in Windows Media Player when playing specific files. This issue does not affect normal playback.

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 8.1; Windows 7, Service Pack 1
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2; Windows Server 2008 R2 SP1

Resolution: This issue is resolved in KB4471329.

Back to top
OS Build 16299.726

October 09, 2018
KB4462918
Resolved
KB4471329
Resolved:
December 11, 2018
10:00 AM PT

Opened:
October 09, 2018
10:00 AM PT
Error message beginning with “Hosted by…” when launching Microsoft Edge
After installing KB4462918, some users may see a dialog box with a non-applicable message beginning with the words “Hosted by...” when first starting Microsoft Edge.

This dialog will only appear once if they have turned on “Block only third-party cookies” in Microsoft Edge and applied certain language packs before installing this update.

Affected platforms:
  • Client: Windows 10, version 1709; Windows 10, version 1703
  • Server: Windows Server, version 1709
Resolution: This issue is resolved in KB4462932.

Back to top
OS Build 16299.726

October 09, 2018
KB4462918
Resolved
KB4462932
Resolved:
October 18, 2018
10:00 AM PT

Opened:
October 09, 2018
10:00 AM PT
Unable to use Seek bar in Windows Media Player
After installing KB4462918, users may not be able to use the Seek Bar in Windows Media Player when playing specific files. This issue does not affect normal playback.

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 8.1; Windows 7, Service Pack 1
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2; Windows Server 2008 R2 SP1
Resolution: This issue is resolved in KB4471329.

Back to top
OS Build 16299.726

October 09, 2018
KB4462918
Resolved
KB4471329
Resolved:
December 11, 2018
10:00 AM PT

Opened:
October 09, 2018
10:00 AM PT
" @@ -104,6 +104,6 @@ sections: - type: markdown text: " - +
DetailsOriginating updateStatusHistory
SqlConnection instantiation exception on .NET 4.6 and later
After you install the August Preview of Quality Rollup or September 11, 2018 .NET Framework update, instantiation of SqlConnection can throw an exception.

For more information about this issue, see the following article in the Microsoft Knowledge Base:
4470809 SqlConnection instantiation exception on .NET 4.6 and later after August-September 2018 .NET Framework updates.

Affected platforms:
  • Client: Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016
  • Server: Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016

Resolution: This issue is resolved in KB4480967.

Back to top
OS Build 16299.637

August 30, 2018
KB4343893
Resolved
KB4480967
Resolved:
January 15, 2019
10:00 AM PT

Opened:
August 30, 2018
05:00 PM PT
SqlConnection instantiation exception on .NET 4.6 and later
After you install the August Preview of Quality Rollup or September 11, 2018 .NET Framework update, instantiation of SqlConnection can throw an exception.

For more information about this issue, see the following article in the Microsoft Knowledge Base:
4470809 SqlConnection instantiation exception on .NET 4.6 and later after August-September 2018 .NET Framework updates.

Affected platforms:
  • Client: Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016
  • Server: Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016
Resolution: This issue is resolved in KB4480967.

Back to top
OS Build 16299.637

August 30, 2018
KB4343893
Resolved
KB4480967
Resolved:
January 15, 2019
10:00 AM PT

Opened:
August 30, 2018
05:00 PM PT
" diff --git a/windows/release-information/resolved-issues-windows-10-1803.yml b/windows/release-information/resolved-issues-windows-10-1803.yml index ea0e8a6fac..68bc661462 100644 --- a/windows/release-information/resolved-issues-windows-10-1803.yml +++ b/windows/release-information/resolved-issues-windows-10-1803.yml @@ -66,7 +66,7 @@ sections: text: " - +
DetailsOriginating updateStatusHistory
End-user-defined characters (EUDC) may cause blue screen at startup
If you enable per font end-user-defined characters (EUDC), the system may stop working and a blue screen may appear at startup. This is not a common setting in non-Asian regions. 

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016
 
Resolution: This issue was resolved in KB4493464

Back to top
OS Build 17134.677

March 19, 2019
KB4489894
Resolved
KB4493464
Resolved:
April 09, 2019
10:00 AM PT

Opened:
March 19, 2019
10:00 AM PT
Stop error when attempting to start SSH from WSL
After applying KB4489868, a stop error occurs when attempting to start the Secure Shell (SSH) client program from Windows Subsystem for Linux (WSL) with agent forwarding enabled using a command line switch (ssh -A) or a configuration setting.

Affected platforms:
  • Client: Windows 10, version 1803; Windows 10, version 1709
  • Server: Windows Server, version 1803; Windows Server, version 1709

Resolution: This issue was resolved in KB4493464.

Back to top
OS Build 17134.648

March 12, 2019
KB4489868
Resolved
KB4493464
Resolved:
April 09, 2019
10:00 AM PT

Opened:
March 12, 2019
10:00 AM PT
Stop error when attempting to start SSH from WSL
After applying KB4489868, a stop error occurs when attempting to start the Secure Shell (SSH) client program from Windows Subsystem for Linux (WSL) with agent forwarding enabled using a command line switch (ssh -A) or a configuration setting.

Affected platforms:
  • Client: Windows 10, version 1803; Windows 10, version 1709
  • Server: Windows Server, version 1803; Windows Server, version 1709
Resolution: This issue was resolved in KB4493464.

Back to top
OS Build 17134.648

March 12, 2019
KB4489868
Resolved
KB4493464
Resolved:
April 09, 2019
10:00 AM PT

Opened:
March 12, 2019
10:00 AM PT
" @@ -75,8 +75,8 @@ sections: - type: markdown text: " - - + +
DetailsOriginating updateStatusHistory
Error 1309 when installing/uninstalling MSI or MSP files
After installing KB4487017, users may received \"Error 1309\" while installing or uninstalling certain types of MSI and MSP files. 

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 8.1
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2

Resolution: This issue is resolved in KB4489868.

Back to top
OS Build 17134.590

February 12, 2019
KB4487017
Resolved
KB4489868
Resolved:
March 12, 2019
10:00 AM PT

Opened:
February 12, 2019
10:00 AM PT
Internet Explorer may fail to load images
After installing KB4487017, Internet Explorer may fail to load images with a backslash (\\) in their relative source path. 

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 8.1; Windows 7, Service Pack 1
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2; Windows Server 2008 R2 SP1

Resolution: This issue is resolved in KB4487029

Back to top
OS Build 17134.590

February 12, 2019
KB4487017
Resolved
KB4487029
Resolved:
February 19, 2019
02:00 PM PT

Opened:
February 12, 2019
10:00 AM PT
Error 1309 when installing/uninstalling MSI or MSP files
After installing KB4487017, users may received \"Error 1309\" while installing or uninstalling certain types of MSI and MSP files. 

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 8.1
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2
Resolution: This issue is resolved in KB4489868.

Back to top
OS Build 17134.590

February 12, 2019
KB4487017
Resolved
KB4489868
Resolved:
March 12, 2019
10:00 AM PT

Opened:
February 12, 2019
10:00 AM PT
Internet Explorer may fail to load images
After installing KB4487017, Internet Explorer may fail to load images with a backslash (\\) in their relative source path. 

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 8.1; Windows 7, Service Pack 1
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2; Windows Server 2008 R2 SP1
Resolution: This issue is resolved in KB4487029

Back to top
OS Build 17134.590

February 12, 2019
KB4487017
Resolved
KB4487029
Resolved:
February 19, 2019
02:00 PM PT

Opened:
February 12, 2019
10:00 AM PT
" @@ -85,11 +85,11 @@ sections: - type: markdown text: " - - - - - + + + + +
DetailsOriginating updateStatusHistory
Applications using Microsoft Jet database and Access 95 file format stop working
Applications that use a Microsoft Jet database with the Microsoft Access 95 file format may randomly stop working. 

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 7, Service Pack 1
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2008 R2 SP1

Resolution: This issue is resolved in KB4487017.

Back to top
OS Build 17134.523

January 08, 2019
KB4480966
Resolved
KB4487017
Resolved:
February 12, 2019
10:00 AM PT

Opened:
January 08, 2019
10:00 AM PT
First character of Japanese era name not recognized
After installing KB4480976, the first character of the Japanese era name is not recognized as an abbreviation and may cause date parsing issues.

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 8.1; Windows 7, Service Pack 1
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2; Windows Server 2008 R2 SP1

Resolution: This issue is resolved in KB4487029

Back to top
OS Build 17134.556

January 15, 2019
KB4480976
Resolved
KB4487029
Resolved:
February 19, 2019
02:00 PM PT

Opened:
January 15, 2019
10:00 AM PT
MSXML6 may cause applications to stop responding
After installing KB4480966, MSXML6 causes applications to stop responding if an exception was thrown during node operations, such as appendChild(), insertBefore(), and moveNode().

The Group Policy editor may stop responding when editing a Group Policy Object (GPO) that contains Group Policy Preferences (GPP) for Internet Explorer 10 settings.

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 8.1
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2

Resolution: This issue was resolved in KB4493464

Back to top
OS Build 17134.523

January 08, 2019
KB4480966
Resolved
KB4493464
Resolved:
April 09, 2019
10:00 AM PT

Opened:
January 08, 2019
10:00 AM PT
Unable to access hotspots with third-party applications
After installing KB4480966, third-party applications may have difficulty authenticating hotspots.

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 8.1
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2

Resolution: This issue is resolved in KB4480976

Back to top
OS Build 17134.523

January 08, 2019
KB4480966
Resolved
KB4480976
Resolved:
January 15, 2019
10:00 AM PT

Opened:
January 08, 2019
10:00 AM PT
Webpages become unresponsive in Microsoft Edge
After installing KB4480966, some Microsoft Edge users report that they: 
  • Cannot load webpages using a local IP address. 
  • Cannot load webpages on the Internet using a VPN connection.  
Browsing fails or the webpage may become unresponsive. 

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709

Resolution: This issue is resolved in KB4487017

Back to top
OS Build 17134.523

January 08, 2019
KB4480966
Resolved
KB4487017
Resolved:
February 12, 2019
10:00 AM PT

Opened:
January 08, 2019
10:00 AM PT
Applications using Microsoft Jet database and Access 95 file format stop working
Applications that use a Microsoft Jet database with the Microsoft Access 95 file format may randomly stop working. 

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 7, Service Pack 1
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2008 R2 SP1
Resolution: This issue is resolved in KB4487017.

Back to top
OS Build 17134.523

January 08, 2019
KB4480966
Resolved
KB4487017
Resolved:
February 12, 2019
10:00 AM PT

Opened:
January 08, 2019
10:00 AM PT
First character of Japanese era name not recognized
After installing KB4480976, the first character of the Japanese era name is not recognized as an abbreviation and may cause date parsing issues.

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 8.1; Windows 7, Service Pack 1
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2; Windows Server 2008 R2 SP1
Resolution: This issue is resolved in KB4487029

Back to top
OS Build 17134.556

January 15, 2019
KB4480976
Resolved
KB4487029
Resolved:
February 19, 2019
02:00 PM PT

Opened:
January 15, 2019
10:00 AM PT
MSXML6 may cause applications to stop responding
After installing KB4480966, MSXML6 causes applications to stop responding if an exception was thrown during node operations, such as appendChild(), insertBefore(), and moveNode().

The Group Policy editor may stop responding when editing a Group Policy Object (GPO) that contains Group Policy Preferences (GPP) for Internet Explorer 10 settings.

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 8.1
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2
Resolution: This issue was resolved in KB4493464

Back to top
OS Build 17134.523

January 08, 2019
KB4480966
Resolved
KB4493464
Resolved:
April 09, 2019
10:00 AM PT

Opened:
January 08, 2019
10:00 AM PT
Unable to access hotspots with third-party applications
After installing KB4480966, third-party applications may have difficulty authenticating hotspots.

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 8.1
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2
Resolution: This issue is resolved in KB4480976

Back to top
OS Build 17134.523

January 08, 2019
KB4480966
Resolved
KB4480976
Resolved:
January 15, 2019
10:00 AM PT

Opened:
January 08, 2019
10:00 AM PT
Webpages become unresponsive in Microsoft Edge
After installing KB4480966, some Microsoft Edge users report that they: 
  • Cannot load webpages using a local IP address. 
  • Cannot load webpages on the Internet using a VPN connection.  
Browsing fails or the webpage may become unresponsive. 

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709
Resolution: This issue is resolved in KB4487017

Back to top
OS Build 17134.523

January 08, 2019
KB4480966
Resolved
KB4487017
Resolved:
February 12, 2019
10:00 AM PT

Opened:
January 08, 2019
10:00 AM PT
" @@ -98,7 +98,7 @@ sections: - type: markdown text: " - +
DetailsOriginating updateStatusHistory
Cannot pin a web link on the Start menu or the taskbar
After installing KB4471324, some users cannot pin a web link on the Start menu or the taskbar. 

Affected platforms:
  • Client: Windows 10, version 1803
  • Server: Windows Server, version 1803

Resolution: This issue is resolved in KB4487029

Back to top
OS Build 17134.471

December 11, 2018
KB4471324
Resolved
KB4487029
Resolved:
February 19, 2019
02:00 PM PT

Opened:
December 11, 2018
10:00 AM PT
Cannot pin a web link on the Start menu or the taskbar
After installing KB4471324, some users cannot pin a web link on the Start menu or the taskbar. 

Affected platforms:
  • Client: Windows 10, version 1803
  • Server: Windows Server, version 1803
Resolution: This issue is resolved in KB4487029

Back to top
OS Build 17134.471

December 11, 2018
KB4471324
Resolved
KB4487029
Resolved:
February 19, 2019
02:00 PM PT

Opened:
December 11, 2018
10:00 AM PT
" @@ -107,7 +107,7 @@ sections: - type: markdown text: " - +
DetailsOriginating updateStatusHistory
Blue or black screen with \"System thread exception not handled\" error
After installing KB4467682, an optional update, some users may get a blue or black screen with the error code, \"System thread exception not handled.\"

Affected platforms:
  • Client: Windows 10, version 1803
  • Server: Windows Server, version 1803

Resolution: This issue is resolved in KB4471324

Back to top
OS Build 17134.441

November 27, 2018
KB4467682
Resolved
KB4471324
Resolved:
December 11, 2018
10:00 AM PT

Opened:
November 27, 2018
10:00 AM PT
Blue or black screen with \"System thread exception not handled\" error
After installing KB4467682, an optional update, some users may get a blue or black screen with the error code, \"System thread exception not handled.\"

Affected platforms:
  • Client: Windows 10, version 1803
  • Server: Windows Server, version 1803
Resolution: This issue is resolved in KB4471324

Back to top
OS Build 17134.441

November 27, 2018
KB4467682
Resolved
KB4471324
Resolved:
December 11, 2018
10:00 AM PT

Opened:
November 27, 2018
10:00 AM PT
Custom Start menu layouts display incorrectly
After installing KB4467682, custom Start menu layouts may display incorrectly. 

Affected platforms:
  • Client: Windows 10, version 1803
  • Server: Windows Server, version 1803
 
Resolution: This issue is resolved in KB4471324

Back to top
OS Build 17134.441

November 27, 2018
KB4467682
Resolved
KB4471324
Resolved:
December 11, 2018
10:00 AM PT

Opened:
November 27, 2018
10:00 AM PT
" @@ -118,7 +118,7 @@ sections: text: " - +
DetailsOriginating updateStatusHistory
Developer Tools (F12) fail to start in Microsoft Edge
Developer Tools (F12) may fail to start in Microsoft Edge.

Affected platforms:
  • Client: Windows 10, version 1803
  • Server: Windows Server, version 1803
 
Resolution: This issue is resolved in KB4467702

Back to top
OS Build 17134.376

October 24, 2018
KB4462933
Resolved
KB4467702
Resolved:
November 13, 2018
10:00 AM PT

Opened:
October 24, 2018
02:00 PM PT
Unable to use Seek bar in Windows Media Player
After installing KB4462919, users may not be able to use the Seek bar in Windows Media Player when playing specific files. This issue does not affect normal playback.

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 8.1; Windows 7, Service Pack 1
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2; Windows Server 2008 R2 SP1

Resolution: This issue is resolved in KB4471324

Back to top
OS Build 17134.345

October 09, 2018
KB4462919
Resolved
KB4471324
Resolved:
December 11, 2018
10:00 AM PT

Opened:
October 09, 2018
10:00 AM PT
Unable to use Seek bar in Windows Media Player
After installing KB4462919, users may not be able to use the Seek bar in Windows Media Player when playing specific files. This issue does not affect normal playback.

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 8.1; Windows 7, Service Pack 1
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2; Windows Server 2008 R2 SP1
Resolution: This issue is resolved in KB4471324

Back to top
OS Build 17134.345

October 09, 2018
KB4462919
Resolved
KB4471324
Resolved:
December 11, 2018
10:00 AM PT

Opened:
October 09, 2018
10:00 AM PT
" @@ -128,8 +128,8 @@ sections: text: " - - + +
DetailsOriginating updateStatusHistory
Guest VMs running Unicast NLB fail to respond after restart
All guest virtual machines running Unicast NLB fail to respond to NLB requests after the virtual machines restart. 

Affected platforms:
  • Client: Windows 10, version 1803; Windows 10, version 1507
  • Server: Windows Server, version 1803
 
Resolution: This issue is resolved in KB4458469

Back to top
OS Build 17134.285

September 11, 2018
KB4457128
Resolved
KB4458469
Resolved:
September 20, 2018
10:00 AM PT

Opened:
September 11, 2018
10:00 AM PT
SqlConnection instantiation exception on .NET 4.6 and later
After you install the August Preview of Quality Rollup or September 11, 2018 .NET Framework update, instantiation of SqlConnection can throw an exception.  

For more information about this issue, see the following article in the Microsoft Knowledge Base: 4470809, SqlConnection instantiation exception on .NET 4.6 and later after August-September 2018 .NET Framework updates.

Affected platforms:
  • Client: Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016
  • Server: Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016

Resolution: This issue is resolved in KB4480976

Back to top
OS Build 17134.285

September 11, 2018
KB4457128
Resolved
KB4480976
Resolved:
January 15, 2019
10:00 AM PT

Opened:
September 11, 2018
10:00 AM PT
Users cannot set Win32 program defaults
After installing KB4458469, some users cannot set Win32 program defaults for certain app and file type combinations using the Open with... command or Settings > Apps > Default apps
 
In some cases, Microsoft Notepad or other Win32 programs cannot be set as the default.

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803

Resolution: This issue is resolved in KB4467682

Back to top
OS Build 17134.320

September 26, 2018
KB4458469
Resolved
KB4467682
Resolved:
November 27, 2018
10:00 AM PT

Opened:
September 26, 2018
02:00 PM PT
SqlConnection instantiation exception on .NET 4.6 and later
After you install the August Preview of Quality Rollup or September 11, 2018 .NET Framework update, instantiation of SqlConnection can throw an exception.  

For more information about this issue, see the following article in the Microsoft Knowledge Base: 4470809, SqlConnection instantiation exception on .NET 4.6 and later after August-September 2018 .NET Framework updates.

Affected platforms:
  • Client: Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016
  • Server: Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016
Resolution: This issue is resolved in KB4480976

Back to top
OS Build 17134.285

September 11, 2018
KB4457128
Resolved
KB4480976
Resolved:
January 15, 2019
10:00 AM PT

Opened:
September 11, 2018
10:00 AM PT
Users cannot set Win32 program defaults
After installing KB4458469, some users cannot set Win32 program defaults for certain app and file type combinations using the Open with... command or Settings > Apps > Default apps
 
In some cases, Microsoft Notepad or other Win32 programs cannot be set as the default.

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803
Resolution: This issue is resolved in KB4467682

Back to top
OS Build 17134.320

September 26, 2018
KB4458469
Resolved
KB4467682
Resolved:
November 27, 2018
10:00 AM PT

Opened:
September 26, 2018
02:00 PM PT
" diff --git a/windows/release-information/resolved-issues-windows-10-1809-and-windows-server-2019.yml b/windows/release-information/resolved-issues-windows-10-1809-and-windows-server-2019.yml index b8013ea114..bca4747983 100644 --- a/windows/release-information/resolved-issues-windows-10-1809-and-windows-server-2019.yml +++ b/windows/release-information/resolved-issues-windows-10-1809-and-windows-server-2019.yml @@ -69,7 +69,7 @@ sections: - type: markdown text: " - +
DetailsOriginating updateStatusHistory
End-user-defined characters (EUDC) may cause blue screen at startup
If you enable per font end-user-defined characters (EUDC), the system will stop working and a blue screen may appear at startup. This is not a common setting in non-Asian regions.

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016

Workaround: To avoid this issue, don't enable per font EUDC. As an alternative, you can edit the registry to mitigate this issue; for more information, see KB4496149.

Resolved: This issue was resolved in KB4493509.

Back to top
OS Build 17763.404

April 02, 2019
KB4490481
Resolved
KB4493509
Resolved:
April 09, 2019
10:00 AM PT

Opened:
April 02, 2019
10:00 AM PT
End-user-defined characters (EUDC) may cause blue screen at startup
If you enable per font end-user-defined characters (EUDC), the system will stop working and a blue screen may appear at startup. This is not a common setting in non-Asian regions.

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016
Workaround: To avoid this issue, don't enable per font EUDC. As an alternative, you can edit the registry to mitigate this issue; for more information, see KB4496149.

Resolved: This issue was resolved in KB4493509.

Back to top
OS Build 17763.404

April 02, 2019
KB4490481
Resolved
KB4493509
Resolved:
April 09, 2019
10:00 AM PT

Opened:
April 02, 2019
10:00 AM PT
" @@ -78,7 +78,7 @@ sections: - type: markdown text: " - +
DetailsOriginating updateStatusHistory
Apps may stop working after selecting an audio output device other than the default
After installing KB4482887 on machines that have multiple audio devices, applications that provide advanced options for internal or external audio output devices may stop working unexpectedly. This issue occurs for users that select an audio output device different from the \"Default Audio Device\". Examples of applications that may stop working include: 
  • Windows Media Player 
  • Realtek HD Audio Manager 
  • Sound Blaster Control Panel 

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019
  • Server: Windows Server, version 1809; Windows Server 2019

Workaround: As a temporary solution, select the \"Default Audio Device\" in the options provided by the application; please refer to the application's user manual for details. 
For example, to set the Default Audio Device in Windows Media Player: 
  1. Open Windows Media Player > Tools > Options > Devices.
  2. Select the device and choose Properties.
  3. On the next dialog, from the drop-down menu under Select the Audio Device, choose Default Audio Device from the list. 
You can then send audio from the application to the audio device you want in the per-application audio settings found under Settings > System > Sound > App Volume and device preferences.

Resolved: This issue was resolved in KB4490481

Back to top
OS Build 17763.348

March 01, 2019
KB4482887
Resolved
KB4490481
Resolved:
April 02, 2019
10:00 AM PT

Opened:
March 01, 2019
10:00 AM PT
Apps may stop working after selecting an audio output device other than the default
After installing KB4482887 on machines that have multiple audio devices, applications that provide advanced options for internal or external audio output devices may stop working unexpectedly. This issue occurs for users that select an audio output device different from the \"Default Audio Device\". Examples of applications that may stop working include: 
  • Windows Media Player 
  • Realtek HD Audio Manager 
  • Sound Blaster Control Panel 
Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019
  • Server: Windows Server, version 1809; Windows Server 2019
Workaround: As a temporary solution, select the \"Default Audio Device\" in the options provided by the application; please refer to the application's user manual for details. 
For example, to set the Default Audio Device in Windows Media Player: 
  1. Open Windows Media Player > Tools > Options > Devices.
  2. Select the device and choose Properties.
  3. On the next dialog, from the drop-down menu under Select the Audio Device, choose Default Audio Device from the list. 
You can then send audio from the application to the audio device you want in the per-application audio settings found under Settings > System > Sound > App Volume and device preferences.

Resolved: This issue was resolved in KB4490481

Back to top
OS Build 17763.348

March 01, 2019
KB4482887
Resolved
KB4490481
Resolved:
April 02, 2019
10:00 AM PT

Opened:
March 01, 2019
10:00 AM PT
" @@ -87,10 +87,10 @@ sections: - type: markdown text: " - - - - + + + +
DetailsOriginating updateStatusHistory
Internet Explorer may fail to load images
After installing KB4487044, Internet Explorer may fail to load images with a backslash (\\) in their relative source path.

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 8.1; Windows 7, Service Pack 1
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2; Windows Server 2008 R2 SP1

Resolution: This issue is resolved in KB4482887.

Back to top
OS Build 17763.316

February 12, 2019
KB4487044
Resolved
KB4482887
Resolved:
March 01, 2019
10:00 AM PT

Opened:
February 12, 2019
10:00 AM PT
Error 1309 when installing/uninstalling MSI or MSP files
After installing KB4487044, users may receive \"Error 1309\" while installing or uninstalling certain types of MSI and MSP files. 

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 8.1
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2

Resolution: This issue is resolved in KB4489899

Back to top
OS Build 17763.316

February 12, 2019
KB4487044
Resolved
KB4489899
Resolved:
March 12, 2019
10:00 AM PT

Opened:
February 12, 2019
10:00 AM PT
Applications using Microsoft Jet database and Access 95 file format stop working
Applications that use a Microsoft Jet database with the Microsoft Access 95 file format may randomly stop working.

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 7, Service Pack 1
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2008 R2 SP1

Resolution: This issue is resolved in KB4482887.

Back to top
OS Build 17763.316

February 12, 2019
KB4487044
Resolved
KB4482887
Resolved:
March 01, 2019
10:00 AM PT

Opened:
February 12, 2019
10:00 AM PT
First character of the Japanese era name not recognized
After installing KB4487044, the first character of the Japanese era name is not recognized as an abbreviation and may cause date parsing issues. 

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 8.1; Windows 7, Service Pack 1
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2; Windows Server 2008 R2 SP1

Resolution: This issue is resolved in KB4482887

Back to top
OS Build 17763.316

February 12, 2019
KB4487044
Resolved
KB4482887
Resolved:
March 01, 2019
10:00 AM PT

Opened:
February 12, 2019
10:00 AM PT
Internet Explorer may fail to load images
After installing KB4487044, Internet Explorer may fail to load images with a backslash (\\) in their relative source path.

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 8.1; Windows 7, Service Pack 1
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2; Windows Server 2008 R2 SP1
Resolution: This issue is resolved in KB4482887.

Back to top
OS Build 17763.316

February 12, 2019
KB4487044
Resolved
KB4482887
Resolved:
March 01, 2019
10:00 AM PT

Opened:
February 12, 2019
10:00 AM PT
Error 1309 when installing/uninstalling MSI or MSP files
After installing KB4487044, users may receive \"Error 1309\" while installing or uninstalling certain types of MSI and MSP files. 

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 8.1
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2
Resolution: This issue is resolved in KB4489899

Back to top
OS Build 17763.316

February 12, 2019
KB4487044
Resolved
KB4489899
Resolved:
March 12, 2019
10:00 AM PT

Opened:
February 12, 2019
10:00 AM PT
Applications using Microsoft Jet database and Access 95 file format stop working
Applications that use a Microsoft Jet database with the Microsoft Access 95 file format may randomly stop working.

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 7, Service Pack 1
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2008 R2 SP1
Resolution: This issue is resolved in KB4482887.

Back to top
OS Build 17763.316

February 12, 2019
KB4487044
Resolved
KB4482887
Resolved:
March 01, 2019
10:00 AM PT

Opened:
February 12, 2019
10:00 AM PT
First character of the Japanese era name not recognized
After installing KB4487044, the first character of the Japanese era name is not recognized as an abbreviation and may cause date parsing issues. 

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 8.1; Windows 7, Service Pack 1
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2; Windows Server 2008 R2 SP1
Resolution: This issue is resolved in KB4482887

Back to top
OS Build 17763.316

February 12, 2019
KB4487044
Resolved
KB4482887
Resolved:
March 01, 2019
10:00 AM PT

Opened:
February 12, 2019
10:00 AM PT
" @@ -99,11 +99,11 @@ sections: - type: markdown text: " - - - - - + + + + +
DetailsOriginating updateStatusHistory
Internet Explorer 11 authentication issue with multiple concurrent logons
After installing the February 12, 2019 update (KB4487044), Internet Explorer 11 and other applications that use WININET.DLL may have authentication issues. This occurs when two or more people use the same user account for multiple, concurrent login sessions on the same Windows Server machine, including Remote Desktop Protocol (RDP) and Terminal Server logons. Symptoms reported by customers include, but may not be limited to:  
  • Cache size and location show zero or empty. 
  • Keyboard shortcuts may not work properly. 
  • Webpages may intermittently fail to load or render correctly. 
  • Issues with credential prompts. 
  • Issues when downloading files. 

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10 Enterprise LTSC 2016; Windows 8.1; Windows 7, Service Pack 1
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server 2016; Windows Server 2012 R2; Windows Server 2008 R2 SP1
 
Resolved: This issue was resolved in KB4493509

Back to top
OS Build 17763.253

January 08, 2019
KB4480116
Resolved
KB4493509
Resolved:
April 09, 2019
10:00 AM PT

Opened:
January 08, 2019
10:00 AM PT
Global DNS outage affects Windows Update customers
Windows Update customers were affected by a network infrastructure event on January 29, 2019 (21:00 UTC), caused by an external DNS service provider's global outage. A software update to the external provider's DNS servers resulted in the distribution of corrupted DNS records that affected connectivity to the Windows Update service. The DNS records were restored by January 30, 2019 (00:10 UTC), and the majority of local Internet Service Providers (ISP) have refreshed their DNS servers and customer services have been restored. 
 
Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019
  • Server: Windows Server, version 1809; Windows Server 2019

While this was not an issue with Microsoft's services, we take any service disruption for our customers seriously. We will work with partners to better understand this so we can provide higher quality service in the future even across diverse global network providers. 
 
If you are still unable to connect to Windows Update services due to this problem, please contact your local ISP or network administrator. You can also refer to our new KB4493784 for more information to determine if your network is affected, and to provide your local ISP or network administrator with additional information to assist you. 

Back to top
N/A

Resolved
Resolved:
March 08, 2019
11:15 AM PT

Opened:
January 29, 2019
02:00 PM PT
MSXML6 may cause applications to stop responding
After installing KB4480116, MSXML6 causes applications to stop responding if an exception was thrown during node operations, such as appendChild(), insertBefore(), and moveNode().
 
The Group Policy editor may stop responding when editing a Group Policy Object (GPO) that contains Group Policy Preferences (GPP) for Internet Explorer 10 settings. 

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 8.1
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2

Resolved: This issue was resolved in KB4493509

Back to top
OS Build 17763.253

January 08, 2019
KB4480116
Resolved
KB4493509
Resolved:
April 09, 2019
10:00 AM PT

Opened:
January 08, 2019
10:00 AM PT
Webpages become unresponsive in Microsoft Edge
After installing KB4480116, some Microsoft Edge users report that they:
  • Cannot load webpages using a local IP address. 
  • Cannot load webpages on the Internet using a VPN connection.
Browsing fails or the webpage may become unresponsive.

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709

Resolution: This issue is resolved in KB4487044

Back to top
OS Build 17763.253

January 08, 2019
KB4480116
Resolved
KB4487044
Resolved:
February 12, 2019
10:00 AM PT

Opened:
January 08, 2019
10:00 AM PT
Unable to access hotspots with third-party applications
After installing KB4480116, third-party applications may have difficulty authenticating hotspots. 

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 8.1
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2

Resolution: This issue is resolved in KB4476976

Back to top
OS Build 17763.253

January 08, 2019
KB4480116
Resolved
KB4476976
Resolved:
January 22, 2019
02:00 PM PT

Opened:
January 08, 2019
10:00 AM PT
Internet Explorer 11 authentication issue with multiple concurrent logons
After installing the February 12, 2019 update (KB4487044), Internet Explorer 11 and other applications that use WININET.DLL may have authentication issues. This occurs when two or more people use the same user account for multiple, concurrent login sessions on the same Windows Server machine, including Remote Desktop Protocol (RDP) and Terminal Server logons. Symptoms reported by customers include, but may not be limited to:  
  • Cache size and location show zero or empty. 
  • Keyboard shortcuts may not work properly. 
  • Webpages may intermittently fail to load or render correctly. 
  • Issues with credential prompts. 
  • Issues when downloading files. 
Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10 Enterprise LTSC 2016; Windows 8.1; Windows 7, Service Pack 1
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server 2016; Windows Server 2012 R2; Windows Server 2008 R2 SP1
 
Resolved: This issue was resolved in KB4493509

Back to top
OS Build 17763.253

January 08, 2019
KB4480116
Resolved
KB4493509
Resolved:
April 09, 2019
10:00 AM PT

Opened:
January 08, 2019
10:00 AM PT
Global DNS outage affects Windows Update customers
Windows Update customers were affected by a network infrastructure event on January 29, 2019 (21:00 UTC), caused by an external DNS service provider's global outage. A software update to the external provider's DNS servers resulted in the distribution of corrupted DNS records that affected connectivity to the Windows Update service. The DNS records were restored by January 30, 2019 (00:10 UTC), and the majority of local Internet Service Providers (ISP) have refreshed their DNS servers and customer services have been restored. 
 
Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019
  • Server: Windows Server, version 1809; Windows Server 2019
While this was not an issue with Microsoft's services, we take any service disruption for our customers seriously. We will work with partners to better understand this so we can provide higher quality service in the future even across diverse global network providers. 
 
If you are still unable to connect to Windows Update services due to this problem, please contact your local ISP or network administrator. You can also refer to our new KB4493784 for more information to determine if your network is affected, and to provide your local ISP or network administrator with additional information to assist you. 

Back to top
N/A

Resolved
Resolved:
March 08, 2019
11:15 AM PT

Opened:
January 29, 2019
02:00 PM PT
MSXML6 may cause applications to stop responding
After installing KB4480116, MSXML6 causes applications to stop responding if an exception was thrown during node operations, such as appendChild(), insertBefore(), and moveNode().
 
The Group Policy editor may stop responding when editing a Group Policy Object (GPO) that contains Group Policy Preferences (GPP) for Internet Explorer 10 settings. 

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 8.1
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2
Resolved: This issue was resolved in KB4493509

Back to top
OS Build 17763.253

January 08, 2019
KB4480116
Resolved
KB4493509
Resolved:
April 09, 2019
10:00 AM PT

Opened:
January 08, 2019
10:00 AM PT
Webpages become unresponsive in Microsoft Edge
After installing KB4480116, some Microsoft Edge users report that they:
  • Cannot load webpages using a local IP address. 
  • Cannot load webpages on the Internet using a VPN connection.
Browsing fails or the webpage may become unresponsive.

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709
Resolution: This issue is resolved in KB4487044

Back to top
OS Build 17763.253

January 08, 2019
KB4480116
Resolved
KB4487044
Resolved:
February 12, 2019
10:00 AM PT

Opened:
January 08, 2019
10:00 AM PT
Unable to access hotspots with third-party applications
After installing KB4480116, third-party applications may have difficulty authenticating hotspots. 

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 8.1
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2
Resolution: This issue is resolved in KB4476976

Back to top
OS Build 17763.253

January 08, 2019
KB4480116
Resolved
KB4476976
Resolved:
January 22, 2019
02:00 PM PT

Opened:
January 08, 2019
10:00 AM PT
" @@ -112,7 +112,7 @@ sections: - type: markdown text: " - +
DetailsOriginating updateStatusHistory
Microsoft Edge may crash or hang while playing video
nVidia has notified Microsoft of an issue where Microsoft Edge may crash or hang while playing video. This issue occurs following an nVidia driver update.

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019
  • Server: Windows Server, version 1809; Windows Server 2019

Resolution: nVidia has released an updated driver to address this issue. Please follow the instructions found in nVidia's support article

Back to top
OS Build 17763.165

December 05, 2018
KB4469342
Resolved
Resolved:
November 29, 2018
10:03 AM PT

Opened:
December 05, 2018
02:00 PM PT
Microsoft Edge may crash or hang while playing video
nVidia has notified Microsoft of an issue where Microsoft Edge may crash or hang while playing video. This issue occurs following an nVidia driver update.

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019
  • Server: Windows Server, version 1809; Windows Server 2019
Resolution: nVidia has released an updated driver to address this issue. Please follow the instructions found in nVidia's support article

Back to top
OS Build 17763.165

December 05, 2018
KB4469342
Resolved
Resolved:
November 29, 2018
10:03 AM PT

Opened:
December 05, 2018
02:00 PM PT
" @@ -122,13 +122,13 @@ sections: text: " - - - - - - - + + + + + + +
DetailsOriginating updateStatusHistory
Audio stops working after installing Intel audio driver
Upgrade block: Intel unintentionally released version 9.21.00.3755 of the Intel Smart Sound Technology (ISST) Driver through Windows Update and inadvertently offered it to a range of devices running Window 10, version 1709, 1803, and 1809. If a device contained a compatible audio driver, the new driver overrode it and caused audio to stop working.

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019
  • Server: Windows Server, version 1809; Windows Server 2019
 
Resolution: This issue was resolved in KB4468550 and the upgrade block removed. 

Back to top
OS Build 17763.134

November 13, 2018
KB4467708
Resolved
KB4468550
Resolved:
December 07, 2018
10:00 AM PT

Opened:
November 13, 2018
10:00 AM PT
Mapped drives fail to reconnect after login
Upgrade block: Network drives may fail to reconnect after booting and logging on to a Windows device. Symptoms include:  
  • In Windows Explorer, a red X appears on the mapped network drives. 
  • Mapped network drives show as Unavailable when you run the net use command from a command prompt. 
  • In the notification area, a notification displays the following message, \"Could not reconnect all network drives.\"

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019
  • Server: Windows Server, version 1809; Windows Server 2019

Resolution: This issue was resolved in KB4469342 and the upgrade block removed. 

Back to top
OS Build 17763.134

November 13, 2018
KB4467708
Resolved
KB4469342
Resolved:
December 05, 2018
02:00 PM PT

Opened:
November 13, 2018
10:00 AM PT
Shared albums may not sync with iCloud for Windows
Upgrade block: Users who attempt to install iCloud for Windows (version 7.7.0.27) will see a message displayed that this version iCloud for Windows isn't supported and the install will fail.

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019
  • Server: Windows Server, version 1809; Windows Server 2019

To ensure a seamless experience, Microsoft is blocking devices with iCloud for Windows (version 7.7.0.27) software installed from being offered Window 10, version 1809 until this issue has been resolved. 

We recommend that you do not attempt to manually update using the Update now button or the Media Creation Tool from the Microsoft software download website until this issue is resolved. 
 
Resolution: Apple has released an updated version of iCloud for Windows (version 7.8.1) that resolves compatibility issues encountered when updating or synching Shared Albums after updating to Windows 10, version 1809. We recommend that you update your iCloud for Windows to version 7.8.1 when prompted before attempting to upgrade to Windows 10, version 1809. You can also manually download the latest version of iCloud for Windows by visiting https://support.apple.com/en-us/HT204283.

Back to top
OS Build 17763.134

November 13, 2018
KB4467708
Resolved
KB4482887
Resolved:
March 01, 2019
10:00 AM PT

Opened:
November 13, 2018
10:00 AM PT
Intel Audio Display (intcdaud.sys) notification during Windows 10 Setup
Upgrade block: Microsoft and Intel have identified a compatibility issue with a range of Intel Display Audio device drivers (intcdaud.sys, versions 10.25.0.3 - 10.25.0.8) that may result in excessive processor demand and reduced battery life. As a result, the update process to the Windows 10 October 2018 Update (Windows 10, version 1809) will fail and affected devices will automatically revert to the previous working configuration. 

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019
  • Server: Windows Server, version 1809; Windows Server 2019

If you see a \"What needs your attention\" notification during installation of the October 2018 Update, you have one of these affected drivers on your system. On the notification, click Back to remain on your current version of Windows 10. 
 
To ensure a seamless experience, we are blocking devices from being offered the October 2018 Update until updated Intel device drivers are installed on your current operating system. We recommend that you do not attempt to manually update to Windows 10, version 1809, using the Update Now button or the Media Creation Tool from the Microsoft Software Download Center until newer Intel device drivers are available with the update. You can either wait for newer drivers to be installed automatically through Windows Update or check with your computer manufacturer for the latest device driver software availability and installation procedures. For more information about this issue, see Intel's customer support guidance.
 
Resolution: This issue was resolved in KB4482887 and the upgrade block removed. 

Back to top
OS Build 17763.134

November 13, 2018
KB4467708
Resolved
KB4482887
Resolved:
March 01, 2019
10:00 AM PT

Opened:
November 13, 2018
10:00 AM PT
Office apps (32-bit) unable to use 'Save As…' function
Upgrade block: Microsoft and Morphisec have identified an issue on devices that have installed Morphisec Protector or another application that uses the Morphisec Software Development Kit (SDK) including Cisco AMP for Endpoints. These applications may impact customers' ability to use the 'Save As.'dialog when saving documents in 32-bit versions of Microsoft Office applications. Saving of files is not impacted.

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019
  • Server: Windows Server, version 1809; Windows Server 2019

Resolution: Morphisec and Cisco have released updated versions of their applications to address this issue. We recommend customers update to these minimum versions before attempting to attempting to upgrade to Windows 10, version 1809:
  • Morphisec Protector version 2.4.8 
  • Cisco AMP for Endpoints version 6.2.3.10814

An upgrade block remains in place for earlier versions of the applications than those listed above.

Back to top
OS Build 17763.134

November 13, 2018
KB4467708
Resolved
Resolved:
December 06, 2018
12:00 PM PT

Opened:
November 13, 2018
10:00 AM PT
Trend Micro OfficeScan and Worry-Free Business Security AV software not compatible
Upgrade block: Microsoft and Trend Micro have identified a compatibility issue with Trend Micro's OfficeScan and Worry-Free Business Security software when attempting to update to Windows 10, version 1809.

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019
  • Server: Windows Server, version 1809; Windows Server 2019 

Resolution: Trend Micro has released a new version of these products that resolves the issue. To download them, please visit the Trend Micro Business Support Portal.

Once you have updated your version of Trend Micro's OfficeScan or Worry-Free Business Security software, you will be offered Windows 10, version 1809 automatically. 

Back to top
OS Build 17763.134

November 13, 2018
KB4467708
Resolved
Resolved:
February 01, 2019
09:00 AM PT

Opened:
November 13, 2018
10:00 AM PT
Issues with lock screen and Microsoft Edge tabs for certain AMD Radeon video cards
Note: AMD no longer supports Radeon HD2000 and HD4000 series graphic processor units (GPUs).
 
Upgrade block: After updating to Window 10, version 1809, Microsoft Edge tabs may stop working when a device is configured with AMD Radeon HD2000 or HD4000 series video cards. Customers may get the following error code: \"INVALID_POINTER_READ_c0000005_atidxx64.dll\". 
 
Some users may also experience performance issues with the lock screen or the ShellExperienceHost. (The lock screen hosts widgets, and the ShellExperienceHost is responsible for assorted shell functionality.) 

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019
  • Server: Windows Server, version 1809; Windows Server 2019

Resolution: This issue was resolved in KB4487044, and the block was removed.

Back to top
OS Build 17763.134

November 13, 2018
KB4467708
Resolved
KB4487044
Resolved:
February 12, 2019
10:00 AM PT

Opened:
November 13, 2018
10:00 AM PT
F5 VPN clients losing network connectivity
Upgrade block: After updating to Window 10, version 1809, F5 VPN clients may lose network connectivity when the VPN service is in a split tunnel configuration.

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019
  • Server: Windows Server, version 1809; Windows Server 2019

Resolution: This issue was resolved in KB4482887 and the upgrade block removed. 

Back to top
OS Build 17763.134

November 13, 2018
KB4467708
Resolved
KB4482887
Resolved:
March 01, 2019
10:00 AM PT

Opened:
November 13, 2018
10:00 AM PT
Mapped drives fail to reconnect after login
Upgrade block: Network drives may fail to reconnect after booting and logging on to a Windows device. Symptoms include:  
  • In Windows Explorer, a red X appears on the mapped network drives. 
  • Mapped network drives show as Unavailable when you run the net use command from a command prompt. 
  • In the notification area, a notification displays the following message, \"Could not reconnect all network drives.\"
Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019
  • Server: Windows Server, version 1809; Windows Server 2019
Resolution: This issue was resolved in KB4469342 and the upgrade block removed. 

Back to top
OS Build 17763.134

November 13, 2018
KB4467708
Resolved
KB4469342
Resolved:
December 05, 2018
02:00 PM PT

Opened:
November 13, 2018
10:00 AM PT
Shared albums may not sync with iCloud for Windows
Upgrade block: Users who attempt to install iCloud for Windows (version 7.7.0.27) will see a message displayed that this version iCloud for Windows isn't supported and the install will fail.

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019
  • Server: Windows Server, version 1809; Windows Server 2019
To ensure a seamless experience, Microsoft is blocking devices with iCloud for Windows (version 7.7.0.27) software installed from being offered Window 10, version 1809 until this issue has been resolved. 

We recommend that you do not attempt to manually update using the Update now button or the Media Creation Tool from the Microsoft software download website until this issue is resolved. 
 
Resolution: Apple has released an updated version of iCloud for Windows (version 7.8.1) that resolves compatibility issues encountered when updating or synching Shared Albums after updating to Windows 10, version 1809. We recommend that you update your iCloud for Windows to version 7.8.1 when prompted before attempting to upgrade to Windows 10, version 1809. You can also manually download the latest version of iCloud for Windows by visiting https://support.apple.com/en-us/HT204283.

Back to top
OS Build 17763.134

November 13, 2018
KB4467708
Resolved
KB4482887
Resolved:
March 01, 2019
10:00 AM PT

Opened:
November 13, 2018
10:00 AM PT
Intel Audio Display (intcdaud.sys) notification during Windows 10 Setup
Upgrade block: Microsoft and Intel have identified a compatibility issue with a range of Intel Display Audio device drivers (intcdaud.sys, versions 10.25.0.3 - 10.25.0.8) that may result in excessive processor demand and reduced battery life. As a result, the update process to the Windows 10 October 2018 Update (Windows 10, version 1809) will fail and affected devices will automatically revert to the previous working configuration. 

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019
  • Server: Windows Server, version 1809; Windows Server 2019
If you see a \"What needs your attention\" notification during installation of the October 2018 Update, you have one of these affected drivers on your system. On the notification, click Back to remain on your current version of Windows 10. 
 
To ensure a seamless experience, we are blocking devices from being offered the October 2018 Update until updated Intel device drivers are installed on your current operating system. We recommend that you do not attempt to manually update to Windows 10, version 1809, using the Update Now button or the Media Creation Tool from the Microsoft Software Download Center until newer Intel device drivers are available with the update. You can either wait for newer drivers to be installed automatically through Windows Update or check with your computer manufacturer for the latest device driver software availability and installation procedures. For more information about this issue, see Intel's customer support guidance.
 
Resolution: This issue was resolved in KB4482887 and the upgrade block removed. 

Back to top
OS Build 17763.134

November 13, 2018
KB4467708
Resolved
KB4482887
Resolved:
March 01, 2019
10:00 AM PT

Opened:
November 13, 2018
10:00 AM PT
Office apps (32-bit) unable to use 'Save As…' function
Upgrade block: Microsoft and Morphisec have identified an issue on devices that have installed Morphisec Protector or another application that uses the Morphisec Software Development Kit (SDK) including Cisco AMP for Endpoints. These applications may impact customers' ability to use the 'Save As.'dialog when saving documents in 32-bit versions of Microsoft Office applications. Saving of files is not impacted.

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019
  • Server: Windows Server, version 1809; Windows Server 2019
Resolution: Morphisec and Cisco have released updated versions of their applications to address this issue. We recommend customers update to these minimum versions before attempting to attempting to upgrade to Windows 10, version 1809:
  • Morphisec Protector version 2.4.8 
  • Cisco AMP for Endpoints version 6.2.3.10814
An upgrade block remains in place for earlier versions of the applications than those listed above.

Back to top
OS Build 17763.134

November 13, 2018
KB4467708
Resolved
Resolved:
December 06, 2018
12:00 PM PT

Opened:
November 13, 2018
10:00 AM PT
Trend Micro OfficeScan and Worry-Free Business Security AV software not compatible
Upgrade block: Microsoft and Trend Micro have identified a compatibility issue with Trend Micro's OfficeScan and Worry-Free Business Security software when attempting to update to Windows 10, version 1809.

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019
  • Server: Windows Server, version 1809; Windows Server 2019 
Resolution: Trend Micro has released a new version of these products that resolves the issue. To download them, please visit the Trend Micro Business Support Portal.

Once you have updated your version of Trend Micro's OfficeScan or Worry-Free Business Security software, you will be offered Windows 10, version 1809 automatically. 

Back to top
OS Build 17763.134

November 13, 2018
KB4467708
Resolved
Resolved:
February 01, 2019
09:00 AM PT

Opened:
November 13, 2018
10:00 AM PT
Issues with lock screen and Microsoft Edge tabs for certain AMD Radeon video cards
Note: AMD no longer supports Radeon HD2000 and HD4000 series graphic processor units (GPUs).
 
Upgrade block: After updating to Window 10, version 1809, Microsoft Edge tabs may stop working when a device is configured with AMD Radeon HD2000 or HD4000 series video cards. Customers may get the following error code: \"INVALID_POINTER_READ_c0000005_atidxx64.dll\". 
 
Some users may also experience performance issues with the lock screen or the ShellExperienceHost. (The lock screen hosts widgets, and the ShellExperienceHost is responsible for assorted shell functionality.) 

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019
  • Server: Windows Server, version 1809; Windows Server 2019
Resolution: This issue was resolved in KB4487044, and the block was removed.

Back to top
OS Build 17763.134

November 13, 2018
KB4467708
Resolved
KB4487044
Resolved:
February 12, 2019
10:00 AM PT

Opened:
November 13, 2018
10:00 AM PT
F5 VPN clients losing network connectivity
Upgrade block: After updating to Window 10, version 1809, F5 VPN clients may lose network connectivity when the VPN service is in a split tunnel configuration.

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019
  • Server: Windows Server, version 1809; Windows Server 2019
Resolution: This issue was resolved in KB4482887 and the upgrade block removed. 

Back to top
OS Build 17763.134

November 13, 2018
KB4467708
Resolved
KB4482887
Resolved:
March 01, 2019
10:00 AM PT

Opened:
November 13, 2018
10:00 AM PT
" @@ -137,7 +137,7 @@ sections: - type: markdown text: " - - + +
DetailsOriginating updateStatusHistory
Users cannot set Win32 program defaults
After installing KB4464330, some users cannot set Win32 program defaults for certain app and file type combinations using the Open with... command or Settings > Apps > Default apps.
 
In some cases, Microsoft Notepad or other Win32 programs cannot be set as the default. 

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803

Resolution: This issue is resolved in KB4469342

Back to top
OS Build 17763.55

October 09, 2018
KB4464330
Resolved
KB4469342
Resolved:
December 05, 2018
02:00 PM PT

Opened:
October 09, 2018
10:00 AM PT
Unable to use Seek bar in Windows Media Player
After installing KB4464330, users may not be able to use the Seek bar in Windows Media Player when playing specific files. This issue does not affect normal playback. 

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 8.1; Windows 7, Service Pack 1
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2; Windows Server 2008 R2 SP1

Resolution: This issue is resolved in KB4471332

Back to top
OS Build 17763.55

October 09, 2018
KB4464330
Resolved
KB4471332
Resolved:
December 11, 2018
10:00 AM PT

Opened:
October 09, 2018
10:00 AM PT
Users cannot set Win32 program defaults
After installing KB4464330, some users cannot set Win32 program defaults for certain app and file type combinations using the Open with... command or Settings > Apps > Default apps.
 
In some cases, Microsoft Notepad or other Win32 programs cannot be set as the default. 

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803
Resolution: This issue is resolved in KB4469342

Back to top
OS Build 17763.55

October 09, 2018
KB4464330
Resolved
KB4469342
Resolved:
December 05, 2018
02:00 PM PT

Opened:
October 09, 2018
10:00 AM PT
Unable to use Seek bar in Windows Media Player
After installing KB4464330, users may not be able to use the Seek bar in Windows Media Player when playing specific files. This issue does not affect normal playback. 

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 8.1; Windows 7, Service Pack 1
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2; Windows Server 2008 R2 SP1
Resolution: This issue is resolved in KB4471332

Back to top
OS Build 17763.55

October 09, 2018
KB4464330
Resolved
KB4471332
Resolved:
December 11, 2018
10:00 AM PT

Opened:
October 09, 2018
10:00 AM PT
" diff --git a/windows/release-information/resolved-issues-windows-7-and-windows-server-2008-r2-sp1.yml b/windows/release-information/resolved-issues-windows-7-and-windows-server-2008-r2-sp1.yml index 8ec9481208..8cd2595df5 100644 --- a/windows/release-information/resolved-issues-windows-7-and-windows-server-2008-r2-sp1.yml +++ b/windows/release-information/resolved-issues-windows-7-and-windows-server-2008-r2-sp1.yml @@ -59,7 +59,7 @@ sections: - type: markdown text: " - +
DetailsOriginating updateStatusHistory
Devices may not respond at login or Welcome screen if running certain Avast software.
Microsoft and Avast have identified an issue on devices running Avast for Business, Avast CloudCare, and AVG Business Edition antivirus software after you install KB4493472 and restart. Devices may become unresponsive at the login or Welcome screen. Additionally, you may be unable to log in or log in after an extended period of time.

Affected platforms: 
  • Client: Windows 8.1; Windows 7, Service Pack 1 
  • Server: Windows Server 2012 R2; Windows Server 2008 R2 SP1 

Resolution: Avast has released emergency updates to address this issue. For more information and AV update schedule, see the Avast support KB article.

Back to top
April 09, 2019
KB4493472
Resolved
Resolved:
April 09, 2019
10:00 AM PT

Opened:
April 09, 2019
10:00 AM PT
Devices may not respond at login or Welcome screen if running certain Avast software.
Microsoft and Avast have identified an issue on devices running Avast for Business, Avast CloudCare, and AVG Business Edition antivirus software after you install KB4493472 and restart. Devices may become unresponsive at the login or Welcome screen. Additionally, you may be unable to log in or log in after an extended period of time.

Affected platforms: 
  • Client: Windows 8.1; Windows 7, Service Pack 1 
  • Server: Windows Server 2012 R2; Windows Server 2008 R2 SP1 
Resolution: Avast has released emergency updates to address this issue. For more information and AV update schedule, see the Avast support KB article.

Back to top
April 09, 2019
KB4493472
Resolved
Resolved:
April 09, 2019
10:00 AM PT

Opened:
April 09, 2019
10:00 AM PT
" @@ -68,8 +68,8 @@ sections: - type: markdown text: " - - + +
DetailsOriginating updateStatusHistory
Custom URI schemes may not start corresponding application.
After installing KB4489878, custom URI schemes for application protocol handlers may not start the corresponding application for local intranet and trusted sites on Internet Explorer.

Affected platforms: 
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 8.1; Windows 7, Service Pack 1 
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2; Windows Server 2008 R2 SP1 

Resolution: This issue is resolved in KB4493472.

Back to top
March 12, 2019
KB4489878
Resolved
KB4493472
Resolved:
April 09, 2019
10:00 AM PT

Opened:
March 12, 2019
10:00 AM PT
NETDOM.EXE fails to run.
After installing KB4489878, NETDOM.EXE fails to run, and the on-screen error, “The command failed to complete successfully.” appears.

Affected platforms: 
  • Client: Windows 7, Service Pack 1 
  • Server: Windows Server 2008 R2 SP1 

Resolution: This issue is resolved in KB4493472.

Back to top
March 12, 2019
KB4489878
Resolved
KB4493472
Resolved:
April 09, 2019
10:00 AM PT

Opened:
March 12, 2019
10:00 AM PT
Custom URI schemes may not start corresponding application.
After installing KB4489878, custom URI schemes for application protocol handlers may not start the corresponding application for local intranet and trusted sites on Internet Explorer.

Affected platforms: 
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 8.1; Windows 7, Service Pack 1 
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2; Windows Server 2008 R2 SP1 
Resolution: This issue is resolved in KB4493472.

Back to top
March 12, 2019
KB4489878
Resolved
KB4493472
Resolved:
April 09, 2019
10:00 AM PT

Opened:
March 12, 2019
10:00 AM PT
NETDOM.EXE fails to run.
After installing KB4489878, NETDOM.EXE fails to run, and the on-screen error, “The command failed to complete successfully.” appears.

Affected platforms: 
  • Client: Windows 7, Service Pack 1 
  • Server: Windows Server 2008 R2 SP1 
Resolution: This issue is resolved in KB4493472.

Back to top
March 12, 2019
KB4489878
Resolved
KB4493472
Resolved:
April 09, 2019
10:00 AM PT

Opened:
March 12, 2019
10:00 AM PT
" @@ -78,8 +78,8 @@ sections: - type: markdown text: " - - + +
DetailsOriginating updateStatusHistory
Internet Explorer may fail to load images.
After installing KB4486563, Internet Explorer may fail to load images with a backslash (\\) in their relative source path.

Affected platforms: 
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 8.1; Windows 7, Service Pack 1 
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2; Windows Server 2008 R2 SP1 

Resolution: This issue is resolved in KB4486565.

Back to top
February 12, 2019
KB4486563
Resolved
KB4486565
Resolved:
February 19, 2019
02:00 PM PT

Opened:
February 12, 2019
10:00 AM PT
Applications using Microsoft Jet database and Access 95 file format stop working.
Applications that use a Microsoft Jet database with the Microsoft Access 95 file format may randomly stop working.

Affected platforms: 
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 7, Service Pack 1 
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2008 R2 SP1 

Resolution: This issue is resolved in KB4486565.

Back to top
February 12, 2019
KB4486563
Resolved
KB4486565
Resolved:
February 19, 2019
02:00 PM PT

Opened:
February 12, 2019
10:00 AM PT
Internet Explorer may fail to load images.
After installing KB4486563, Internet Explorer may fail to load images with a backslash (\\) in their relative source path.

Affected platforms: 
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 8.1; Windows 7, Service Pack 1 
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2; Windows Server 2008 R2 SP1 
Resolution: This issue is resolved in KB4486565.

Back to top
February 12, 2019
KB4486563
Resolved
KB4486565
Resolved:
February 19, 2019
02:00 PM PT

Opened:
February 12, 2019
10:00 AM PT
Applications using Microsoft Jet database and Access 95 file format stop working.
Applications that use a Microsoft Jet database with the Microsoft Access 95 file format may randomly stop working.

Affected platforms: 
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 7, Service Pack 1 
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2008 R2 SP1 
Resolution: This issue is resolved in KB4486565.

Back to top
February 12, 2019
KB4486563
Resolved
KB4486565
Resolved:
February 19, 2019
02:00 PM PT

Opened:
February 12, 2019
10:00 AM PT
" @@ -88,11 +88,11 @@ sections: - type: markdown text: " - - - - - + + + + +
DetailsOriginating updateStatusHistory
Local Administrators unable to remotely access shares.
Local users who are part of the local Administrators group may not be able to remotely access shares on Windows Server 2008 R2 and Windows 7 machines after installing KB4480970. This does not affect domain accounts in the local Administrators group.
 
Affected platforms: 
  • Client: Windows 7, Service Pack 1 
  • Server: Windows Server 2008 R2 SP1 

Resolution: This issue is resolved in KB4487345.

Back to top
January 08, 2019
KB4480970
Resolved
KB4487345
Resolved:
January 11, 2019
02:00 PM PT

Opened:
January 08, 2019
10:00 AM PT
Applications using Microsoft Jet database fail to open.
Applications that use a Microsoft Jet database with the Microsoft Access 97 file format may fail to open if the database has column names greater than 32 characters. The database will fail to open with the error, “Unrecognized Database Format”.

Affected Platforms:
  • Client: Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 8.1; Windows 7, Service Pack 1 
  • Server: Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2; Windows Server 2008 R2 SP1 


Resolution: This issue is resolved in KB4486563.

Back to top
January 08, 2019
KB4480970
Resolved
KB4486563
Resolved:
February 12, 2019
10:00 AM PT

Opened:
January 08, 2019
10:00 AM PT
Virtual machines fail to restore.
After installing KB4480970, virtual machines (VM) may fail to restore successfully if the VM has been saved and restored once before. The error message is, “Failed to restore the virtual machine state: Cannot restore this virtual machine because the saved state data cannot be read. Delete the saved state data and then try to start the virtual machine. (0xC0370027).”

This affects AMD Bulldozer Family 15h, AMD Jaguar Family 16h, and AMD Puma Family 16h (second generation) microarchitectures.

Affected platforms: 
  • Client: Windows 7, Service Pack 1 
  • Server: Windows Server 2008 R2 SP1 

Resolution: This issue is resolved in KB4490511.

Back to top
January 08, 2019
KB4480970
Resolved
KB4490511
Resolved:
February 19, 2019
02:00 PM PT

Opened:
January 08, 2019
10:00 AM PT
Internet Explorer 11 authentication issue with multiple concurrent logons.
After installing KB4480970, Internet Explorer 11 and other applications that use WININET.DLL may have authentication issues. This occurs when two or more people use the same user account for multiple, concurrent login sessions on the same Windows Server machine, including Remote Desktop Protocol (RDP) and Terminal Server logons. Symptoms reported by customers include, but may not be limited to:
  • Cache size and location show zero or empty.
  • Keyboard shortcuts may not work properly.
  • Webpages may intermittently fail to load or render correctly.
  • Issues with credential prompts.
  • Issues when downloading files.

Affected platforms: 
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10 Enterprise LTSC 2016; Windows 8.1; Windows 7, Service Pack 1 
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server 2016; Windows Server 2012 R2; Windows Server 2008 R2 SP1 

Resolution: This issue is resolved in KB4493472.

Back to top
January 08, 2019
KB4480970
Resolved
KB4493472
Resolved:
April 09, 2019
10:00 AM PT

Opened:
January 08, 2019
10:00 AM PT
First character of the Japanese era name not recognized as an abbreviation.
After installing KB4480955, the first character of the Japanese era name is not recognized as an abbreviation and may cause date parsing issues.

Affected platforms: 
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 8.1; Windows 7, Service Pack 1 
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2; Windows Server 2008 R2 SP1 

Resolution: This issue is resolved in KB4486565.

Back to top
January 17, 2019
KB4480955
Resolved
KB4486565
Resolved:
February 19, 2019
02:00 PM PT

Opened:
January 17, 2019
10:00 AM PT
Local Administrators unable to remotely access shares.
Local users who are part of the local Administrators group may not be able to remotely access shares on Windows Server 2008 R2 and Windows 7 machines after installing KB4480970. This does not affect domain accounts in the local Administrators group.
 
Affected platforms: 
  • Client: Windows 7, Service Pack 1 
  • Server: Windows Server 2008 R2 SP1 
Resolution: This issue is resolved in KB4487345.

Back to top
January 08, 2019
KB4480970
Resolved
KB4487345
Resolved:
January 11, 2019
02:00 PM PT

Opened:
January 08, 2019
10:00 AM PT
Applications using Microsoft Jet database fail to open.
Applications that use a Microsoft Jet database with the Microsoft Access 97 file format may fail to open if the database has column names greater than 32 characters. The database will fail to open with the error, “Unrecognized Database Format”.

Affected Platforms:
  • Client: Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 8.1; Windows 7, Service Pack 1 
  • Server: Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2; Windows Server 2008 R2 SP1 

Resolution: This issue is resolved in KB4486563.

Back to top
January 08, 2019
KB4480970
Resolved
KB4486563
Resolved:
February 12, 2019
10:00 AM PT

Opened:
January 08, 2019
10:00 AM PT
Virtual machines fail to restore.
After installing KB4480970, virtual machines (VM) may fail to restore successfully if the VM has been saved and restored once before. The error message is, “Failed to restore the virtual machine state: Cannot restore this virtual machine because the saved state data cannot be read. Delete the saved state data and then try to start the virtual machine. (0xC0370027).”

This affects AMD Bulldozer Family 15h, AMD Jaguar Family 16h, and AMD Puma Family 16h (second generation) microarchitectures.

Affected platforms: 
  • Client: Windows 7, Service Pack 1 
  • Server: Windows Server 2008 R2 SP1 
Resolution: This issue is resolved in KB4490511.

Back to top
January 08, 2019
KB4480970
Resolved
KB4490511
Resolved:
February 19, 2019
02:00 PM PT

Opened:
January 08, 2019
10:00 AM PT
Internet Explorer 11 authentication issue with multiple concurrent logons.
After installing KB4480970, Internet Explorer 11 and other applications that use WININET.DLL may have authentication issues. This occurs when two or more people use the same user account for multiple, concurrent login sessions on the same Windows Server machine, including Remote Desktop Protocol (RDP) and Terminal Server logons. Symptoms reported by customers include, but may not be limited to:
  • Cache size and location show zero or empty.
  • Keyboard shortcuts may not work properly.
  • Webpages may intermittently fail to load or render correctly.
  • Issues with credential prompts.
  • Issues when downloading files.
Affected platforms: 
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10 Enterprise LTSC 2016; Windows 8.1; Windows 7, Service Pack 1 
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server 2016; Windows Server 2012 R2; Windows Server 2008 R2 SP1 
Resolution: This issue is resolved in KB4493472.

Back to top
January 08, 2019
KB4480970
Resolved
KB4493472
Resolved:
April 09, 2019
10:00 AM PT

Opened:
January 08, 2019
10:00 AM PT
First character of the Japanese era name not recognized as an abbreviation.
After installing KB4480955, the first character of the Japanese era name is not recognized as an abbreviation and may cause date parsing issues.

Affected platforms: 
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 8.1; Windows 7, Service Pack 1 
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2; Windows Server 2008 R2 SP1 
Resolution: This issue is resolved in KB4486565.

Back to top
January 17, 2019
KB4480955
Resolved
KB4486565
Resolved:
February 19, 2019
02:00 PM PT

Opened:
January 17, 2019
10:00 AM PT
" @@ -101,7 +101,7 @@ sections: - type: markdown text: " - - + +
DetailsOriginating updateStatusHistory
Unable to use Seek bar in Windows Media Player
After installing KB4462923, users may not be able to use the Seek Bar in Windows Media Player when playing specific files. This issue does not affect normal playback.

Affected platforms: 
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 8.1; Windows 7, Service Pack 1.
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2; Windows Server 2008 R2 SP1

Resolution: This issue is resolved in KB4471318.

Back to top
October 09, 2018
KB4462923
Resolved
KB4471318
Resolved:
December 11, 2018
10:00 AM PT

Opened:
October 09, 2018
10:00 AM PT
Event Viewer may not show some event descriptions for network interface cards.
After installing KB4462927, the Event Viewer may not show some event descriptions for network interface cards (NICs).

Affected Platforms:
  • Client: Windows 7, Service Pack 1 
  • Server: Windows Server 2008 R2 SP1 

Resolution: This issue is resolved in KB4489878.

Back to top
October 18, 2018
KB4462927
Resolved
KB4489878
Resolved:
March 12, 2019
10:00 AM PT

Opened:
October 18, 2018
10:00 AM PT
Unable to use Seek bar in Windows Media Player
After installing KB4462923, users may not be able to use the Seek Bar in Windows Media Player when playing specific files. This issue does not affect normal playback.

Affected platforms: 
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 8.1; Windows 7, Service Pack 1.
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2; Windows Server 2008 R2 SP1
Resolution: This issue is resolved in KB4471318.

Back to top
October 09, 2018
KB4462923
Resolved
KB4471318
Resolved:
December 11, 2018
10:00 AM PT

Opened:
October 09, 2018
10:00 AM PT
Event Viewer may not show some event descriptions for network interface cards.
After installing KB4462927, the Event Viewer may not show some event descriptions for network interface cards (NICs).

Affected Platforms:
  • Client: Windows 7, Service Pack 1 
  • Server: Windows Server 2008 R2 SP1 
Resolution: This issue is resolved in KB4489878.

Back to top
October 18, 2018
KB4462927
Resolved
KB4489878
Resolved:
March 12, 2019
10:00 AM PT

Opened:
October 18, 2018
10:00 AM PT
" diff --git a/windows/release-information/resolved-issues-windows-8.1-and-windows-server-2012-r2.yml b/windows/release-information/resolved-issues-windows-8.1-and-windows-server-2012-r2.yml index aae936db92..384753a964 100644 --- a/windows/release-information/resolved-issues-windows-8.1-and-windows-server-2012-r2.yml +++ b/windows/release-information/resolved-issues-windows-8.1-and-windows-server-2012-r2.yml @@ -60,7 +60,7 @@ sections: - type: markdown text: " - +
DetailsOriginating updateStatusHistory
Devices may not respond at login or Welcome screen if running certain Avast software
Microsoft and Avast have identified an issue on devices running Avast for Business, Avast CloudCare, and AVG Business Edition antivirus software after you install KB4493446 and restart. Devices may become unresponsive at the login or Welcome screen. Additionally, you may be unable to log in or log in after an extended period of time.

Affected platforms: 
  • Client: Windows 8.1; Windows 7, Service Pack 1 
  • Server: Windows Server 2012 R2; Windows Server 2008 R2 SP1 


Resolution: Avast has released emergency updates to address this issue. For more information and AV update schedule, see the Avast support KB article.

Back to top
April 09, 2019
KB4493446
Resolved
Resolved:
April 09, 2019
10:00 AM PT

Opened:
April 09, 2019
10:00 AM PT
Devices may not respond at login or Welcome screen if running certain Avast software
Microsoft and Avast have identified an issue on devices running Avast for Business, Avast CloudCare, and AVG Business Edition antivirus software after you install KB4493446 and restart. Devices may become unresponsive at the login or Welcome screen. Additionally, you may be unable to log in or log in after an extended period of time.

Affected platforms: 
  • Client: Windows 8.1; Windows 7, Service Pack 1 
  • Server: Windows Server 2012 R2; Windows Server 2008 R2 SP1 

Resolution: Avast has released emergency updates to address this issue. For more information and AV update schedule, see the Avast support KB article.

Back to top
April 09, 2019
KB4493446
Resolved
Resolved:
April 09, 2019
10:00 AM PT

Opened:
April 09, 2019
10:00 AM PT
" @@ -69,8 +69,8 @@ sections: - type: markdown text: " - - + +
DetailsOriginating updateStatusHistory
Custom URI schemes may not start corresponding application
After installing KB4489881, custom URI schemes for application protocol handlers may not start the corresponding application for local intranet and trusted sites security zones on Internet Explorer.

Affected platforms: 
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 8.1; Windows 7, Service Pack 1 
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2; Windows Server 2008 R2 SP1 

Resolution: This issue is resolved in KB4493446.

Back to top
March 12, 2019
KB4489881
Resolved
KB4493446
Resolved:
April 09, 2019
10:00 AM PT

Opened:
March 12, 2019
10:00 AM PT
Devices with winsock kernel client may receive error
After installing KB4489881, devices with a winsock kernel client may receive D1, FC, and other errors. Additionally, systems that run the Skype for Business or Lync Server Edge Transport role may be affected by this issue.

Affected platforms: 
  • Client: Windows 8.1 
  • Server: Windows Server 2012 R2 

Resolution: This issue is resolved in KB4489893.

Back to top
March 12, 2019
KB4489881
Resolved
KB4489893
Resolved:
March 19, 2019
10:00 AM PT

Opened:
March 12, 2019
10:00 AM PT
Custom URI schemes may not start corresponding application
After installing KB4489881, custom URI schemes for application protocol handlers may not start the corresponding application for local intranet and trusted sites security zones on Internet Explorer.

Affected platforms: 
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 8.1; Windows 7, Service Pack 1 
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2; Windows Server 2008 R2 SP1 
Resolution: This issue is resolved in KB4493446.

Back to top
March 12, 2019
KB4489881
Resolved
KB4493446
Resolved:
April 09, 2019
10:00 AM PT

Opened:
March 12, 2019
10:00 AM PT
Devices with winsock kernel client may receive error
After installing KB4489881, devices with a winsock kernel client may receive D1, FC, and other errors. Additionally, systems that run the Skype for Business or Lync Server Edge Transport role may be affected by this issue.

Affected platforms: 
  • Client: Windows 8.1 
  • Server: Windows Server 2012 R2 
Resolution: This issue is resolved in KB4489893.

Back to top
March 12, 2019
KB4489881
Resolved
KB4489893
Resolved:
March 19, 2019
10:00 AM PT

Opened:
March 12, 2019
10:00 AM PT
" @@ -79,9 +79,9 @@ sections: - type: markdown text: " - - - + + +
DetailsOriginating updateStatusHistory
Error 1309 when installing/uninstalling MSI or MSP files
After installing KB4487016, users may receive “Error 1309” while installing or uninstalling certain types of MSI and MSP files.

Affected platforms: 
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 8.1 
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2 

Resolution: This issue is resolved in KB4489881.

Back to top
February 19, 2019
KB4487016
Resolved
KB4489881
Resolved:
March 12, 2019
10:00 AM PT

Opened:
February 19, 2019
02:00 PM PT
Embedded objects may display incorrectly
Any compound document (OLE) server application that places embedded objects into the Windows Metafile (WMF) using the PatBlt API may display embedded objects incorrectly.

For example, if you paste a Microsoft Excel worksheet object into a Microsoft Word document, the cells may render with a different background color.

Affected platforms: 
  • Client: Windows 8.1 
  • Server: Windows Server 2012 R2 

Resolution: This issue is resolved in KB4493446.

Back to top
February 12, 2019
KB4487000
Resolved
KB4493446
Resolved:
April 09, 2019
10:00 AM PT

Opened:
February 12, 2019
10:00 AM PT
Internet Explorer may fail to load images
After installing KB4487000, Internet Explorer may fail to load images with a backslash (\\) in their relative source path.

Affected platforms: 
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 8.1; Windows 7, Service Pack 1 
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2; Windows Server 2008 R2 SP1 

Resolution: This issue is resolved in KB4487016.

Back to top
February 12, 2019
KB4487000
Resolved
KB4487016
Resolved:
February 19, 2019
02:00 PM PT

Opened:
February 12, 2019
10:00 AM PT
Error 1309 when installing/uninstalling MSI or MSP files
After installing KB4487016, users may receive “Error 1309” while installing or uninstalling certain types of MSI and MSP files.

Affected platforms: 
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 8.1 
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2 
Resolution: This issue is resolved in KB4489881.

Back to top
February 19, 2019
KB4487016
Resolved
KB4489881
Resolved:
March 12, 2019
10:00 AM PT

Opened:
February 19, 2019
02:00 PM PT
Embedded objects may display incorrectly
Any compound document (OLE) server application that places embedded objects into the Windows Metafile (WMF) using the PatBlt API may display embedded objects incorrectly.

For example, if you paste a Microsoft Excel worksheet object into a Microsoft Word document, the cells may render with a different background color.

Affected platforms: 
  • Client: Windows 8.1 
  • Server: Windows Server 2012 R2 
Resolution: This issue is resolved in KB4493446.

Back to top
February 12, 2019
KB4487000
Resolved
KB4493446
Resolved:
April 09, 2019
10:00 AM PT

Opened:
February 12, 2019
10:00 AM PT
Internet Explorer may fail to load images
After installing KB4487000, Internet Explorer may fail to load images with a backslash (\\) in their relative source path.

Affected platforms: 
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 8.1; Windows 7, Service Pack 1 
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2; Windows Server 2008 R2 SP1 
Resolution: This issue is resolved in KB4487016.

Back to top
February 12, 2019
KB4487000
Resolved
KB4487016
Resolved:
February 19, 2019
02:00 PM PT

Opened:
February 12, 2019
10:00 AM PT
" @@ -90,12 +90,12 @@ sections: - type: markdown text: " - - + + - + - +
DetailsOriginating updateStatusHistory
Unable to access hotspots with third-party applications
After installing KB4480963, third-party applications may have difficulty authenticating hotspots.

Affected platforms: 
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 8.1 
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2 

Resolution: This issue is resolved in KB4480969.

Back to top
January 08, 2019
KB4480963
Resolved
KB4480969
Resolved:
January 15, 2019
10:00 AM PT

Opened:
January 08, 2019
10:00 AM PT
Applications using Microsoft Jet database fail to open
Applications that use a Microsoft Jet database with the Microsoft Access 97 file format may fail to open if the database has column names greater than 32 characters. The database will fail to open with the error, “Unrecognized Database Format”.

Affected platforms: 
  • Client: Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 8.1; Windows 7, Service Pack 1 
  • Server: Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2; Windows Server 2008 R2 SP1 

Resolution: This issue is resolved in KB4487000.

Back to top
January 08, 2019
KB4480963
Resolved
KB4487000
Resolved:
February 12, 2019
10:00 AM PT

Opened:
January 08, 2019
10:00 AM PT
Unable to access hotspots with third-party applications
After installing KB4480963, third-party applications may have difficulty authenticating hotspots.

Affected platforms: 
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 8.1 
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2 
Resolution: This issue is resolved in KB4480969.

Back to top
January 08, 2019
KB4480963
Resolved
KB4480969
Resolved:
January 15, 2019
10:00 AM PT

Opened:
January 08, 2019
10:00 AM PT
Applications using Microsoft Jet database fail to open
Applications that use a Microsoft Jet database with the Microsoft Access 97 file format may fail to open if the database has column names greater than 32 characters. The database will fail to open with the error, “Unrecognized Database Format”.

Affected platforms: 
  • Client: Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 8.1; Windows 7, Service Pack 1 
  • Server: Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2; Windows Server 2008 R2 SP1 
Resolution: This issue is resolved in KB4487000.

Back to top
January 08, 2019
KB4480963
Resolved
KB4487000
Resolved:
February 12, 2019
10:00 AM PT

Opened:
January 08, 2019
10:00 AM PT
Virtual machines fail to restore
After installing KB4480963, virtual machines (VM) may fail to restore successfully if the VM has been saved and restored once before. The error message is, “Failed to restore the virtual machine state: Cannot restore this virtual machine because the saved state data cannot be read. Delete the saved state data and then try to start the virtual machine. (0xC0370027).”

This affects AMD Bulldozer Family 15h, AMD Jaguar Family 16h, and AMD Puma Family 16h (second generation) microarchitectures.

Resolution: This issue is resolved in KB4490512.

Back to top
January 08, 2019
KB4480963
Resolved
KB4490512
Resolved:
February 19, 2019
02:00 PM PT

Opened:
January 08, 2019
10:00 AM PT
Internet Explorer 11 authentication issue with multiple concurrent logons
After installing KB4480963, Internet Explorer 11 and other applications that use WININET.DLL may have authentication issues. This occurs when two or more people use the same user account for multiple, concurrent login sessions on the same Windows Server machine, including Remote Desktop Protocol (RDP) and Terminal Server logons. Symptoms reported by customers include, but may not be limited to:
  • Cache size and location show zero or empty.
  • Keyboard shortcuts may not work properly.
  • Webpages may intermittently fail to load or render correctly.
  • Issues with credential prompts.
  • Issues when downloading files.

Affected platforms: 
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10 Enterprise LTSC 2016; Windows 8.1; Windows 7, Service Pack 1 
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server 2016; Windows Server 2012 R2; Windows Server 2008 R2 SP1 

Resolution: This issue is resolved in KB4493446.

Back to top
January 08, 2019
KB4480963
Resolved
KB4493446
Resolved:
April 09, 2019
10:00 AM PT

Opened:
January 08, 2019
10:00 AM PT
Internet Explorer 11 authentication issue with multiple concurrent logons
After installing KB4480963, Internet Explorer 11 and other applications that use WININET.DLL may have authentication issues. This occurs when two or more people use the same user account for multiple, concurrent login sessions on the same Windows Server machine, including Remote Desktop Protocol (RDP) and Terminal Server logons. Symptoms reported by customers include, but may not be limited to:
  • Cache size and location show zero or empty.
  • Keyboard shortcuts may not work properly.
  • Webpages may intermittently fail to load or render correctly.
  • Issues with credential prompts.
  • Issues when downloading files.
Affected platforms: 
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10 Enterprise LTSC 2016; Windows 8.1; Windows 7, Service Pack 1 
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server 2016; Windows Server 2012 R2; Windows Server 2008 R2 SP1 
Resolution: This issue is resolved in KB4493446.

Back to top
January 08, 2019
KB4480963
Resolved
KB4493446
Resolved:
April 09, 2019
10:00 AM PT

Opened:
January 08, 2019
10:00 AM PT
MSXML6 may cause applications to stop responding.
After installing KB4480963, MSXML6 causes applications to stop responding if an exception was thrown during node operations, such as appendChild(), insertBefore(), and moveNode().

The Group Policy editor may stop responding when editing a Group Policy Object (GPO) that contains Group Policy Preferences (GPP) for Internet Explorer 10 settings.

Resolution: This issue is resolved in KB4493446.

Back to top
January 08, 2019
KB4480963
Resolved
KB4493446
Resolved:
April 09, 2019
10:00 AM PT

Opened:
January 08, 2019
10:00 AM PT
First character of the Japanese era name not recognized as an abbreviation
After installing KB4480969, the first character of the Japanese era name is not recognized as an abbreviation and may cause date parsing issues.

Affected platforms: 
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 8.1; Windows 7, Service Pack 1 
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2; Windows Server 2008 R2 SP1 

Resolution: This issue is resolved in KB4487016.

Back to top
January 15, 2019
KB4480969
Resolved
KB4487016
Resolved:
February 19, 2019
02:00 PM PT

Opened:
January 15, 2019
10:00 AM PT
First character of the Japanese era name not recognized as an abbreviation
After installing KB4480969, the first character of the Japanese era name is not recognized as an abbreviation and may cause date parsing issues.

Affected platforms: 
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 8.1; Windows 7, Service Pack 1 
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2; Windows Server 2008 R2 SP1 
Resolution: This issue is resolved in KB4487016.

Back to top
January 15, 2019
KB4480969
Resolved
KB4487016
Resolved:
February 19, 2019
02:00 PM PT

Opened:
January 15, 2019
10:00 AM PT
" @@ -104,6 +104,6 @@ sections: - type: markdown text: " - +
DetailsOriginating updateStatusHistory
Unable to use Seek bar in Windows Media Player
After installing KB4462926, users may not be able to use the Seek Bar in Windows Media Player when playing specific files. This issue does not affect normal playback.

Affected platforms: 
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 8.1; Windows 7, Service Pack 1 
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2; Windows Server 2008 R2 SP1 

Resolution: This issue is resolved in KB4471320.

Back to top
October 09, 2018
KB4462926
Resolved
KB4471320
Resolved:
December 11, 2018
10:00 AM PT

Opened:
October 09, 2018
10:00 AM PT
Unable to use Seek bar in Windows Media Player
After installing KB4462926, users may not be able to use the Seek Bar in Windows Media Player when playing specific files. This issue does not affect normal playback.

Affected platforms: 
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 8.1; Windows 7, Service Pack 1 
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2; Windows Server 2008 R2 SP1 
Resolution: This issue is resolved in KB4471320.

Back to top
October 09, 2018
KB4462926
Resolved
KB4471320
Resolved:
December 11, 2018
10:00 AM PT

Opened:
October 09, 2018
10:00 AM PT
" diff --git a/windows/release-information/resolved-issues-windows-server-2008-sp2.yml b/windows/release-information/resolved-issues-windows-server-2008-sp2.yml index 7611cd0050..2c0b474c10 100644 --- a/windows/release-information/resolved-issues-windows-server-2008-sp2.yml +++ b/windows/release-information/resolved-issues-windows-server-2008-sp2.yml @@ -55,13 +55,13 @@ sections: - type: markdown text: " - - - - - - - - + + + + + + + +
DetailsOriginating updateStatusHistory
Unable to use Seek bar in Windows Media Player
After installing KB4463097, users may not be able to use the Seek Bar in Windows Media Player when playing specific files. This issue does not affect normal playback.

Affected platforms: 
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 8.1; Windows 7, Service Pack 1
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2; Windows Server 2012; Windows Server 2008 R2 SP1; Windows Server 2008 SP2

Resolution: This issue is resolved in KB4471325.

Back to top
October 09, 2018
KB4463097
Resolved
KB4471325
Resolved:
December 11, 2018
10:00 AM PT

Opened:
April 25, 2019
03:28 PM PT
Applications using Microsoft Jet database fail to open
Applications that use a Microsoft Jet database with the Microsoft Access 97 file format may fail to open if the database has column names greater than 32 characters. The database will fail to open with the error, “Unrecognized Database Format”.

Affected platforms: 
  • Client: Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 8.1; Windows 7, Service Pack 1 
  • Server: Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2; Windows Server 2012; Windows Server 2008 R2 SP1; Windows Server 2008 SP2

Resolution: This issue is resolved in KB4487023.

Back to top
January 08, 2019
KB4480968
Resolved
KB4487023
Resolved:
February 12, 2019
10:00 AM PT

Opened:
April 25, 2019
03:32 PM PT
Virtual machines fail to restore
After installing KB4480968, virtual machines (VM) may fail to restore successfully if the VM has been saved and restored once before. The error message is, “Failed to restore the virtual machine state: Cannot restore this virtual machine because the saved state data cannot be read. Delete the saved state data and then try to start the virtual machine. (0xC0370027).”

This affects AMD Bulldozer Family 15h, AMD Jaguar Family 16h, and AMD Puma Family 16h (second generation) microarchitectures.

Affected platforms: 
  • Client: Windows 7, Service Pack 1 
  • Server: Windows Server 2012; Windows Server 2008 R2 SP1; Windows Server 2008 SP2

Resolution: This issue is resolved in KB4490514.

Back to top
January 08, 2019
KB4480968
Resolved
KB4490514
Resolved:
February 19, 2019
02:00 PM PT

Opened:
April 25, 2019
03:26 PM PT
Embedded objects may display incorrectly
Any compound document (OLE) server application that places embedded objects into the Windows Metafile (WMF) using the PatBlt API may display embedded objects incorrectly.

For example, if you paste a Microsoft Excel worksheet object into a Microsoft Word document, the cells may render with a different background color.

Affected platforms: 
  • Client: Windows 8.1 
  • Server: Windows Server 2012 R2; Windows Server 2012; Windows Server 2008 SP2

Resolution: This issue is resolved in KB4493471.

Back to top

Resolved
KB4493471
Resolved:
April 09, 2019
10:00 AM PT

Opened:
April 25, 2019
03:26 PM PT
First character of the Japanese era name not recognized as an abbreviation
After installing KB4480974, the first character of the Japanese era name is not recognized as an abbreviation and may cause date parsing issues.

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 8.1; Windows 7, Service Pack 1
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2; Windows Server 2012; Windows Server 2008 R2 SP1; Windows Server 2008 SP2

Resolution: This issue is resolved in KB4489880.

Back to top
January 17, 2019
KB4480974
Resolved
KB4489880
Resolved:
March 12, 2019
10:00 AM PT

Opened:
April 25, 2019
03:32 PM PT
Applications using Microsoft Jet database and Access 95 file format stop working
Applications that use a Microsoft Jet database with the Microsoft Access 95 file format may randomly stop working.

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 7, Service Pack 1
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012; Windows Server 2008 R2 SP1; Windows Server 2008 SP2

Resolution: This issue is resolved in KB4487022.

Back to top
February 12, 2019
KB4487023
Resolved
KB4487022
Resolved:
February 19, 2019
02:00 PM PT

Opened:
April 25, 2019
03:26 PM PT
Local Administrators unable to remotely access shares
Local users who are part of the local Administrators group may not be able to remotely access shares on Windows Server 2008 R2 and Windows 7 machines after installing KB4480968. This does not affect domain accounts in the local Administrators group.

Affected platforms: 
  • Client: Windows 7, Service Pack 1 
  • Server: Windows Server 2008 R2 SP1; Windows Server 2008 SP2

Resolution: This issue is resolved in KB4487354.

Back to top
January 08, 2019
KB4480968
Resolved
KB4487354
Resolved:
January 11, 2019
02:00 PM PT

Opened:
April 25, 2019
03:26 PM PT
NETDOM.EXE fails to run
After installing KB4489880, NETDOM.EXE fails to run, and the on-screen error, “The command failed to complete successfully.” appears.

Affected platforms: 
  • Client: Windows 7, Service Pack 1 
  • Server: Windows Server 2008 R2 SP1; Windows Server 2008 SP2

Resolution: This issue is resolved in KB4493471.

Back to top
March 12, 2019
KB4489880
Resolved
KB4493471
Resolved:
April 09, 2019
10:00 AM PT

Opened:
April 25, 2019
03:25 PM PT
Unable to use Seek bar in Windows Media Player
After installing KB4463097, users may not be able to use the Seek Bar in Windows Media Player when playing specific files. This issue does not affect normal playback.

Affected platforms: 
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 8.1; Windows 7, Service Pack 1
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2; Windows Server 2012; Windows Server 2008 R2 SP1; Windows Server 2008 SP2
Resolution: This issue is resolved in KB4471325.

Back to top
October 09, 2018
KB4463097
Resolved
KB4471325
Resolved:
December 11, 2018
10:00 AM PT

Opened:
April 25, 2019
03:28 PM PT
Applications using Microsoft Jet database fail to open
Applications that use a Microsoft Jet database with the Microsoft Access 97 file format may fail to open if the database has column names greater than 32 characters. The database will fail to open with the error, “Unrecognized Database Format”.

Affected platforms: 
  • Client: Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 8.1; Windows 7, Service Pack 1 
  • Server: Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2; Windows Server 2012; Windows Server 2008 R2 SP1; Windows Server 2008 SP2
Resolution: This issue is resolved in KB4487023.

Back to top
January 08, 2019
KB4480968
Resolved
KB4487023
Resolved:
February 12, 2019
10:00 AM PT

Opened:
April 25, 2019
03:32 PM PT
Virtual machines fail to restore
After installing KB4480968, virtual machines (VM) may fail to restore successfully if the VM has been saved and restored once before. The error message is, “Failed to restore the virtual machine state: Cannot restore this virtual machine because the saved state data cannot be read. Delete the saved state data and then try to start the virtual machine. (0xC0370027).”

This affects AMD Bulldozer Family 15h, AMD Jaguar Family 16h, and AMD Puma Family 16h (second generation) microarchitectures.

Affected platforms: 
  • Client: Windows 7, Service Pack 1 
  • Server: Windows Server 2012; Windows Server 2008 R2 SP1; Windows Server 2008 SP2
Resolution: This issue is resolved in KB4490514.

Back to top
January 08, 2019
KB4480968
Resolved
KB4490514
Resolved:
February 19, 2019
02:00 PM PT

Opened:
April 25, 2019
03:26 PM PT
Embedded objects may display incorrectly
Any compound document (OLE) server application that places embedded objects into the Windows Metafile (WMF) using the PatBlt API may display embedded objects incorrectly.

For example, if you paste a Microsoft Excel worksheet object into a Microsoft Word document, the cells may render with a different background color.

Affected platforms: 
  • Client: Windows 8.1 
  • Server: Windows Server 2012 R2; Windows Server 2012; Windows Server 2008 SP2
Resolution: This issue is resolved in KB4493471.

Back to top

Resolved
KB4493471
Resolved:
April 09, 2019
10:00 AM PT

Opened:
April 25, 2019
03:26 PM PT
First character of the Japanese era name not recognized as an abbreviation
After installing KB4480974, the first character of the Japanese era name is not recognized as an abbreviation and may cause date parsing issues.

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 8.1; Windows 7, Service Pack 1
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2; Windows Server 2012; Windows Server 2008 R2 SP1; Windows Server 2008 SP2
Resolution: This issue is resolved in KB4489880.

Back to top
January 17, 2019
KB4480974
Resolved
KB4489880
Resolved:
March 12, 2019
10:00 AM PT

Opened:
April 25, 2019
03:32 PM PT
Applications using Microsoft Jet database and Access 95 file format stop working
Applications that use a Microsoft Jet database with the Microsoft Access 95 file format may randomly stop working.

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 7, Service Pack 1
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012; Windows Server 2008 R2 SP1; Windows Server 2008 SP2
Resolution: This issue is resolved in KB4487022.

Back to top
February 12, 2019
KB4487023
Resolved
KB4487022
Resolved:
February 19, 2019
02:00 PM PT

Opened:
April 25, 2019
03:26 PM PT
Local Administrators unable to remotely access shares
Local users who are part of the local Administrators group may not be able to remotely access shares on Windows Server 2008 R2 and Windows 7 machines after installing KB4480968. This does not affect domain accounts in the local Administrators group.

Affected platforms: 
  • Client: Windows 7, Service Pack 1 
  • Server: Windows Server 2008 R2 SP1; Windows Server 2008 SP2
Resolution: This issue is resolved in KB4487354.

Back to top
January 08, 2019
KB4480968
Resolved
KB4487354
Resolved:
January 11, 2019
02:00 PM PT

Opened:
April 25, 2019
03:26 PM PT
NETDOM.EXE fails to run
After installing KB4489880, NETDOM.EXE fails to run, and the on-screen error, “The command failed to complete successfully.” appears.

Affected platforms: 
  • Client: Windows 7, Service Pack 1 
  • Server: Windows Server 2008 R2 SP1; Windows Server 2008 SP2
Resolution: This issue is resolved in KB4493471.

Back to top
March 12, 2019
KB4489880
Resolved
KB4493471
Resolved:
April 09, 2019
10:00 AM PT

Opened:
April 25, 2019
03:25 PM PT
" diff --git a/windows/release-information/resolved-issues-windows-server-2012.yml b/windows/release-information/resolved-issues-windows-server-2012.yml index 3fb079b612..99f2455313 100644 --- a/windows/release-information/resolved-issues-windows-server-2012.yml +++ b/windows/release-information/resolved-issues-windows-server-2012.yml @@ -63,7 +63,7 @@ sections:
Unable to access hotspots with third-party applications
After installing KB4480975, third-party applications may have difficulty authenticating hotspots.

Resolution: This issue is resolved in KB4480971.

Back to top
January 08, 2019
KB4480975
Resolved
KB4480971
Resolved:
January 15, 2019
10:00 AM PT

Opened:
April 25, 2019
03:14 PM PT
Applications using Microsoft Jet database fail to open
Applications that use a Microsoft Jet database with the Microsoft Access 97 file format may fail to open if the database has column names greater than 32 characters. The database will fail to open with the error, \"Unrecognized Database Format\".

Resolution: This issue is resolved in KB4487025.

Back to top
January 08, 2019
KB4480975
Resolved
KB4487025
Resolved:
February 12, 2019
10:00 AM PT

Opened:
April 25, 2019
03:19 PM PT
Virtual machines fail to restore
After installing KB4480975, virtual machines (VM) may fail to restore successfully if the VM has been saved and restored once before. The error message is, \"Failed to restore the virtual machine state: Cannot restore this virtual machine because the saved state data cannot be read. Delete the saved state data and then try to start the virtual machine. (0xC0370027).\"

This affects AMD Bulldozer Family 15h, AMD Jaguar Family 16h, and AMD Puma Family 16h (second generation) microarchitectures.

Resolution: This issue is resolved in KB4490516.

Back to top
January 08, 2019
KB4480975
Resolved
KB4490516
Resolved:
February 19, 2019
02:00 PM PT

Opened:
April 25, 2019
03:22 PM PT
Internet Explorer 11 authentication issue with multiple concurrent logons
After installing KB4480975, Internet Explorer 11 and other applications that use WININET.DLL may have authentication issues. This occurs when two or more people use the same user account for multiple, concurrent login sessions on the same Windows Server machine, including Remote Desktop Protocol (RDP) and Terminal Server logons. Symptoms reported by customers include, but may not be limited to:
  • Cache size and location show zero or empty.
  • Keyboard shortcuts may not work properly.
  • Webpages may intermittently fail to load or render correctly.
  • Issues with credential prompts.
  • Issues when downloading files.

Resolution: This issue is resolved in KB4493451.

Back to top
January 08, 2019
KB4480975
Resolved
KB4493451
Resolved:
April 09, 2019
10:00 AM PT

Opened:
April 25, 2019
03:34 PM PT
Internet Explorer 11 authentication issue with multiple concurrent logons
After installing KB4480975, Internet Explorer 11 and other applications that use WININET.DLL may have authentication issues. This occurs when two or more people use the same user account for multiple, concurrent login sessions on the same Windows Server machine, including Remote Desktop Protocol (RDP) and Terminal Server logons. Symptoms reported by customers include, but may not be limited to:
  • Cache size and location show zero or empty.
  • Keyboard shortcuts may not work properly.
  • Webpages may intermittently fail to load or render correctly.
  • Issues with credential prompts.
  • Issues when downloading files.
Resolution: This issue is resolved in KB4493451.

Back to top
January 08, 2019
KB4480975
Resolved
KB4493451
Resolved:
April 09, 2019
10:00 AM PT

Opened:
April 25, 2019
03:34 PM PT
MSXML6 may cause applications to stop responding
After installing KB4480975, MSXML6 causes applications to stop responding if an exception was thrown during node operations, such as appendChild(), insertBefore(), and moveNode().

The Group Policy editor may stop responding when editing a Group Policy Object (GPO) that contains Group Policy Preferences (GPP) for Internet Explorer 10 settings.

Resolution: This issue is resolved in KB4493451.

Back to top
January 08, 2019
KB4480975
Resolved
KB4493451
Resolved:
April 09, 2019
10:00 AM PT

Opened:
April 25, 2019
03:27 PM PT
Error 1309 when installing/uninstalling MSI or MSP files
After installing KB4487025, users may receive \"Error 1309\" while installing or uninstalling certain types of MSI and MSP files.

Resolution: This issue is resolved in KB4489891.

Back to top
February 12, 2019
KB4487025
Resolved
KB4489891
Resolved:
March 12, 2019
10:00 AM PT

Opened:
April 25, 2019
03:36 PM PT
Embedded objects may display incorrectly
Any compound document (OLE) server application that places embedded objects into the Windows Metafile (WMF) using the PatBlt API may display embedded objects incorrectly.

For example, if you paste a Microsoft Excel worksheet object into a Microsoft Word document, the cells may render with a different background color.

Resolution: This issue is resolved in KB4493451.

Back to top
February 12, 2019
KB4487025
Resolved
KB4493451
Resolved:
April 09, 2019
10:00 AM PT

Opened:
April 25, 2019
04:00 PM PT
- +
DetailsOriginating updateStatusHistory
Custom URI schemes may not start corresponding application
After installing KB4489872, Custom URI Schemes for Application Protocol handlers may not start the corresponding application for local intranet and trusted sites on Internet Explorer.

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 8.1; Windows 7, Service Pack 1 
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2; Windows Server 2008 R2 SP1

Resolution: This issue was resolved in KB4493475.

Back to top
OS Build 10240.18158

March 12, 2019
KB4489872
Resolved
KB4493475
Resolved:
April 09, 2019
10:00 AM PT

Opened:
March 12, 2019
10:00 AM PT
Custom URI schemes may not start corresponding application
After installing KB4489872, Custom URI Schemes for Application Protocol handlers may not start the corresponding application for local intranet and trusted sites on Internet Explorer.

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 8.1; Windows 7, Service Pack 1 
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2; Windows Server 2008 R2 SP1
Resolution: This issue was resolved in KB4493475.

Back to top
OS Build 10240.18158

March 12, 2019
KB4489872
Resolved
KB4493475
Resolved:
April 09, 2019
10:00 AM PT

Opened:
March 12, 2019
10:00 AM PT
" @@ -86,6 +86,6 @@ sections: - type: markdown text: " - +
DetailsOriginating updateStatusHistory
MSXML6 may cause applications to stop responding
After installing KB4480962, MSXML6 causes applications to stop responding if an exception was thrown during node operations, such as appendChild(), insertBefore(), and moveNode().

The Group Policy editor may stop responding when editing a Group Policy Object (GPO) that contains Group Policy Preferences (GPP) for Internet Explorer 10 settings.

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 8.1
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2

Resolution: This issue was resolved in KB4493475.

Back to top
OS Build 10240.18094

January 08, 2019
KB4480962
Resolved
KB4493475
Resolved:
April 09, 2019
10:00 AM PT

Opened:
January 08, 2019
10:00 AM PT
MSXML6 may cause applications to stop responding
After installing KB4480962, MSXML6 causes applications to stop responding if an exception was thrown during node operations, such as appendChild(), insertBefore(), and moveNode().

The Group Policy editor may stop responding when editing a Group Policy Object (GPO) that contains Group Policy Preferences (GPP) for Internet Explorer 10 settings.

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 8.1
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2
Resolution: This issue was resolved in KB4493475.

Back to top
OS Build 10240.18094

January 08, 2019
KB4480962
Resolved
KB4493475
Resolved:
April 09, 2019
10:00 AM PT

Opened:
January 08, 2019
10:00 AM PT
" diff --git a/windows/release-information/status-windows-10-1607-and-windows-server-2016.yml b/windows/release-information/status-windows-10-1607-and-windows-server-2016.yml index f441e35df1..333b5bca2c 100644 --- a/windows/release-information/status-windows-10-1607-and-windows-server-2016.yml +++ b/windows/release-information/status-windows-10-1607-and-windows-server-2016.yml @@ -83,10 +83,10 @@ sections: - type: markdown text: " - - + - +
DetailsOriginating updateStatusHistory
Custom URI schemes may not start corresponding application
After installing KB4489882, Custom URI schemes for application protocol handlers may not start the corresponding application for local intranet and trusted sites security zones on Internet Explorer.

Affected platforms: 
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 8.1; Windows 7, Service Pack 1 
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2; Windows Server 2008 R2 SP1

Workaround: Right-click the URL link to open it in a new window or tab, or enable Protected Mode in Internet Explorer for local intranet and trusted sites
  1. Go to Tools > Internet options > Security.
  2. Within Select a zone to view or change security settings, select Local intranet and then select Enable Protected Mode.
  3. Select Trusted sites and then select Enable Protected Mode.
  4. Select OK.
You must restart the browser after making these changes.

Next steps: Microsoft is working on a resolution and will provide an update in an upcoming release.

Back to top
OS Build 14393.2848

March 12, 2019
KB4489882
Mitigated
Last updated:
March 19, 2019
10:00 AM PT

Opened:
March 12, 2019
10:00 AM PT
Issue using PXE to start a device from WDS
After installing KB4489882, there may be issues using the Preboot Execution Environment (PXE) to start a device from a Windows Deployment Services (WDS) server configured to use Variable Window Extension. This may cause the connection to the WDS server to terminate prematurely while downloading the image. This issue does not affect clients or devices that are not using Variable Window Extension.

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10 Enterprise LTSC 2016; Windows 8.1
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server 2016; Windows Server 2012 R2

Workaround: To mitigate the issue, disable the Variable Window Extension on WDS server using one of the following options:
Option 1:
Open an Administrator Command prompt and type the following:
Wdsutil /Set-TransportServer /EnableTftpVariableWindowExtension:No
+      
Custom URI schemes may not start corresponding application
After installing KB4489882, Custom URI schemes for application protocol handlers may not start the corresponding application for local intranet and trusted sites security zones on Internet Explorer.

Affected platforms: 
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 8.1; Windows 7, Service Pack 1 
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2; Windows Server 2008 R2 SP1
Workaround: Right-click the URL link to open it in a new window or tab, or enable Protected Mode in Internet Explorer for local intranet and trusted sites
  1. Go to Tools > Internet options > Security.
  2. Within Select a zone to view or change security settings, select Local intranet and then select Enable Protected Mode.
  3. Select Trusted sites and then select Enable Protected Mode.
  4. Select OK.
You must restart the browser after making these changes.

Next steps: Microsoft is working on a resolution and will provide an update in an upcoming release.

Back to top
OS Build 14393.2848

March 12, 2019
KB4489882
Mitigated
Last updated:
March 19, 2019
10:00 AM PT

Opened:
March 12, 2019
10:00 AM PT
Issue using PXE to start a device from WDS
After installing KB4489882, there may be issues using the Preboot Execution Environment (PXE) to start a device from a Windows Deployment Services (WDS) server configured to use Variable Window Extension. This may cause the connection to the WDS server to terminate prematurely while downloading the image. This issue does not affect clients or devices that are not using Variable Window Extension.

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10 Enterprise LTSC 2016; Windows 8.1
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server 2016; Windows Server 2012 R2
Workaround: To mitigate the issue, disable the Variable Window Extension on WDS server using one of the following options:
Option 1:
Open an Administrator Command prompt and type the following:
Wdsutil /Set-TransportServer /EnableTftpVariableWindowExtension:No
 
Option 2:
Use the Windows Deployment Services UI to make the following adjustment:
  1. Open Windows Deployment Services from Windows Administrative Tools.
  2. Expand Servers and right-click a WDS server.
  3. Open its properties and clear the Enable Variable Window Extension box on the TFTP tab.
Option 3:
Set the following registry value to 0:
HKLM\\System\\CurrentControlSet\\Services\\WDSServer\\Providers\\WDSTFTP\\EnableVariableWindowExtension
Restart the WDSServer service after disabling the Variable Window Extension.

Next steps: Microsoft is working on a resolution and will provide an update in an upcoming release.

Back to top
OS Build 14393.2848

March 12, 2019
KB4489882
Mitigated
Last updated:
March 19, 2019
10:00 AM PT

Opened:
March 12, 2019
10:00 AM PT
End-user-defined characters (EUDC) cause blue screen at startup
If you enable per font end-user-defined characters (EUDC), the system will stop working and a blue screen may appear at startup. This is not a common setting in non-Asian regions.

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016

Resolution: This issue was resolved in KB4493470.

Back to top
OS Build 14393.2879

March 19, 2019
KB4489889
Resolved
KB4493470
Resolved:
April 09, 2019
10:00 AM PT

Opened:
March 19, 2019
10:00 AM PT
End-user-defined characters (EUDC) cause blue screen at startup
If you enable per font end-user-defined characters (EUDC), the system will stop working and a blue screen may appear at startup. This is not a common setting in non-Asian regions.

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016
Resolution: This issue was resolved in KB4493470.

Back to top
OS Build 14393.2879

March 19, 2019
KB4489889
Resolved
KB4493470
Resolved:
April 09, 2019
10:00 AM PT

Opened:
March 19, 2019
10:00 AM PT
" @@ -95,8 +95,8 @@ sections: - type: markdown text: " - - + +
DetailsOriginating updateStatusHistory
Internet Explorer 11 authentication issue with multiple concurrent logons
After installing KB4480961, Internet Explorer 11 and other applications that use WININET.DLL may have authentication issues. This occurs when two or more people use the same user account for multiple, concurrent login sessions on the same Windows Server machine, including Remote Desktop Protocol (RDP) and Terminal Server logons. Symptoms reported by customers include, but may not be limited to:
  • Cache size and location show zero or empty.
  • Keyboard shortcuts may not work properly.
  • Webpages may intermittently fail to load or render correctly.
  • Issues with credential prompts.
  • Issues when downloading files.

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10 Enterprise LTSC 2016; Windows 8.1; Windows 7, Service Pack 1
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server 2016; Windows Server 2012 R2; Windows Server 2008 R2 SP1

Resolution: This issue was resolved in KB4493470.

Back to top
OS Build 14393.2724

January 08, 2019
KB4480961
Resolved
KB4493470
Resolved:
April 09, 2019
10:00 AM PT

Opened:
January 08, 2019
10:00 AM PT
MSXML6 may cause applications to stop responding
After installing KB4480961, MSXML6 causes applications to stop responding if an exception was thrown during node operations, such as appendChild(), insertBefore(), and moveNode().

The Group Policy editor may stop responding when editing a Group Policy Object (GPO) that contains Group Policy Preferences (GPP) for Internet Explorer 10 settings.

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 8.1
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2

Resolution: This issue was resolved in KB4493470.

Back to top
OS Build 14393.2724

January 08, 2019
KB4480961
Resolved
KB4493470
Resolved:
April 09, 2019
10:00 AM PT

Opened:
January 08, 2019
10:00 AM PT
Internet Explorer 11 authentication issue with multiple concurrent logons
After installing KB4480961, Internet Explorer 11 and other applications that use WININET.DLL may have authentication issues. This occurs when two or more people use the same user account for multiple, concurrent login sessions on the same Windows Server machine, including Remote Desktop Protocol (RDP) and Terminal Server logons. Symptoms reported by customers include, but may not be limited to:
  • Cache size and location show zero or empty.
  • Keyboard shortcuts may not work properly.
  • Webpages may intermittently fail to load or render correctly.
  • Issues with credential prompts.
  • Issues when downloading files.
Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10 Enterprise LTSC 2016; Windows 8.1; Windows 7, Service Pack 1
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server 2016; Windows Server 2012 R2; Windows Server 2008 R2 SP1
Resolution: This issue was resolved in KB4493470.

Back to top
OS Build 14393.2724

January 08, 2019
KB4480961
Resolved
KB4493470
Resolved:
April 09, 2019
10:00 AM PT

Opened:
January 08, 2019
10:00 AM PT
MSXML6 may cause applications to stop responding
After installing KB4480961, MSXML6 causes applications to stop responding if an exception was thrown during node operations, such as appendChild(), insertBefore(), and moveNode().

The Group Policy editor may stop responding when editing a Group Policy Object (GPO) that contains Group Policy Preferences (GPP) for Internet Explorer 10 settings.

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 8.1
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2
Resolution: This issue was resolved in KB4493470.

Back to top
OS Build 14393.2724

January 08, 2019
KB4480961
Resolved
KB4493470
Resolved:
April 09, 2019
10:00 AM PT

Opened:
January 08, 2019
10:00 AM PT
" @@ -105,8 +105,8 @@ sections: - type: markdown text: " - - - + + +
DetailsOriginating updateStatusHistory
Cluster service may fail if the minimum password length is set to greater than 14
After installing KB4467684, the cluster service may fail to start with the error \"2245 (NERR_PasswordTooShort)\" if the Group Policy \"Minimum Password Length\" is configured with greater than 14 characters.

Affected platforms:
  • Client: Windows 10 Enterprise LTSC 2016
  • Server: Windows Server 2016

Workaround: Set the domain default \"Minimum Password Length\" policy to less than or equal to 14 characters.

Next steps: Microsoft is working on a resolution and will provide an update in an upcoming release.

Back to top
OS Build 14393.2639

November 27, 2018
KB4467684
Mitigated
Last updated:
March 19, 2019
10:00 AM PT

Opened:
November 27, 2018
10:00 AM PT
SCVMM cannot enumerate and manage logical switches deployed on the host
For hosts managed by System Center Virtual Machine Manager (VMM), VMM cannot enumerate and manage logical switches deployed on the host after installing KB4467684.

Additionally, if you do not follow the best practices, a stop error may occur in vfpext.sys on the hosts.

Affected platforms:
  • Client: Windows 10 Enterprise LTSC 2016
  • Server: Windows Server 2016

Workaround:
Run mofcomp on the following mof files on the affected host:

  • Scvmmswitchportsettings.mof
  • VMMDHCPSvr.mof

Follow the best practices while patching to avoid a stop error in vfpext.sys in an SDN v2 environment (NC managed hosts).

Back to top
OS Build 14393.2639

November 27, 2018
KB4467684
Mitigated
Last updated:
March 19, 2019
10:00 AM PT

Opened:
November 27, 2018
10:00 AM PT
Windows may not start on certain Lenovo and Fujitsu laptops with less than 8GB of RAM
After installing KB4467691, Windows may fail to start on certain Lenovo and Fujitsu laptops that have less than 8 GB of RAM.

Affected platforms:
  • Client: Windows 10 Enterprise LTSC 2016
  • Server: Windows Server 2016

Workaround: Restart the affected machine using the Unified Extensible Firmware Interface (UEFI). Disable Secure Boot and then restart.

If BitLocker is enabled on your machine, you may have to go through BitLocker recovery after Secure Boot has been disabled.

Next steps: Lenovo and Fujitsu are aware of this issue. Please contact your OEM to ask if there is a firmware update available for your device.

Back to top
OS Build 14393.2608

November 13, 2018
KB4467691
Mitigated
Last updated:
February 19, 2019
10:00 AM PT

Opened:
November 13, 2018
10:00 AM PT
Cluster service may fail if the minimum password length is set to greater than 14
After installing KB4467684, the cluster service may fail to start with the error \"2245 (NERR_PasswordTooShort)\" if the Group Policy \"Minimum Password Length\" is configured with greater than 14 characters.

Affected platforms:
  • Client: Windows 10 Enterprise LTSC 2016
  • Server: Windows Server 2016
Workaround: Set the domain default \"Minimum Password Length\" policy to less than or equal to 14 characters.

Next steps: Microsoft is working on a resolution and will provide an update in an upcoming release.

Back to top
OS Build 14393.2639

November 27, 2018
KB4467684
Mitigated
Last updated:
March 19, 2019
10:00 AM PT

Opened:
November 27, 2018
10:00 AM PT
SCVMM cannot enumerate and manage logical switches deployed on the host
For hosts managed by System Center Virtual Machine Manager (VMM), VMM cannot enumerate and manage logical switches deployed on the host after installing KB4467684.

Additionally, if you do not follow the best practices, a stop error may occur in vfpext.sys on the hosts.

Affected platforms:
  • Client: Windows 10 Enterprise LTSC 2016
  • Server: Windows Server 2016
Workaround:
Run mofcomp on the following mof files on the affected host:

  • Scvmmswitchportsettings.mof
  • VMMDHCPSvr.mof
Follow the best practices while patching to avoid a stop error in vfpext.sys in an SDN v2 environment (NC managed hosts).

Back to top
OS Build 14393.2639

November 27, 2018
KB4467684
Mitigated
Last updated:
March 19, 2019
10:00 AM PT

Opened:
November 27, 2018
10:00 AM PT
Windows may not start on certain Lenovo and Fujitsu laptops with less than 8GB of RAM
After installing KB4467691, Windows may fail to start on certain Lenovo and Fujitsu laptops that have less than 8 GB of RAM.

Affected platforms:
  • Client: Windows 10 Enterprise LTSC 2016
  • Server: Windows Server 2016
Workaround: Restart the affected machine using the Unified Extensible Firmware Interface (UEFI). Disable Secure Boot and then restart.

If BitLocker is enabled on your machine, you may have to go through BitLocker recovery after Secure Boot has been disabled.

Next steps: Lenovo and Fujitsu are aware of this issue. Please contact your OEM to ask if there is a firmware update available for your device.

Back to top
OS Build 14393.2608

November 13, 2018
KB4467691
Mitigated
Last updated:
February 19, 2019
10:00 AM PT

Opened:
November 13, 2018
10:00 AM PT
" diff --git a/windows/release-information/status-windows-10-1703.yml b/windows/release-information/status-windows-10-1703.yml index 77bb2ce556..5505fbc9ed 100644 --- a/windows/release-information/status-windows-10-1703.yml +++ b/windows/release-information/status-windows-10-1703.yml @@ -78,8 +78,8 @@ sections: - type: markdown text: " - - + +
DetailsOriginating updateStatusHistory
Custom URI schemes may not start corresponding application
After installing KB4489871, custom URI schemes for application protocol handlers may not start the corresponding application for local intranet and trusted sites security zones on Internet Explorer.

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 8.1; Windows 7, Service Pack 1 
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2; Windows Server 2008 R2 SP1

Workaround: Right-click the URL link to open it in a new window or tab, or enable Protected Mode in Internet Explorer for local intranet and trusted sites
1. Go to Tools > Internet options > Security.
2. Within Select a zone to view or change security settings, select Local intranet and then select Enable Protected Mode.
3. Select Trusted sites and then select Enable Protected Mode.
4. Select OK.
You must restart the browser after making these changes.

Next steps: Microsoft is working on a resolution and will provide an update in an upcoming release.

Back to top
OS Build 15063.1689

March 12, 2019
KB4489871
Mitigated
Last updated:
March 19, 2019
10:00 AM PT

Opened:
March 12, 2019
10:00 AM PT
End-user-defined characters (EUDC) may cause blue screen at startup
If you enable per font end-user-defined characters (EUDC), the system may stop working and a blue screen may appear at startup. This is not a common setting in non-Asian regions.

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016

Resolution: This issue was resolved in KB4493474.

Back to top
OS Build 15063.1716

March 19, 2019
KB4489888
Resolved
KB4493474
Resolved:
April 09, 2019
10:00 AM PT

Opened:
March 19, 2019
10:00 AM PT
Custom URI schemes may not start corresponding application
After installing KB4489871, custom URI schemes for application protocol handlers may not start the corresponding application for local intranet and trusted sites security zones on Internet Explorer.

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 8.1; Windows 7, Service Pack 1 
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2; Windows Server 2008 R2 SP1
Workaround: Right-click the URL link to open it in a new window or tab, or enable Protected Mode in Internet Explorer for local intranet and trusted sites
1. Go to Tools > Internet options > Security.
2. Within Select a zone to view or change security settings, select Local intranet and then select Enable Protected Mode.
3. Select Trusted sites and then select Enable Protected Mode.
4. Select OK.
You must restart the browser after making these changes.

Next steps: Microsoft is working on a resolution and will provide an update in an upcoming release.

Back to top
OS Build 15063.1689

March 12, 2019
KB4489871
Mitigated
Last updated:
March 19, 2019
10:00 AM PT

Opened:
March 12, 2019
10:00 AM PT
End-user-defined characters (EUDC) may cause blue screen at startup
If you enable per font end-user-defined characters (EUDC), the system may stop working and a blue screen may appear at startup. This is not a common setting in non-Asian regions.

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016
Resolution: This issue was resolved in KB4493474.

Back to top
OS Build 15063.1716

March 19, 2019
KB4489888
Resolved
KB4493474
Resolved:
April 09, 2019
10:00 AM PT

Opened:
March 19, 2019
10:00 AM PT
" @@ -88,6 +88,6 @@ sections: - type: markdown text: " - +
DetailsOriginating updateStatusHistory
MSXML6 may cause applications to stop responding
After installing KB4480973, MSXML6 causes applications to stop responding if an exception was thrown during node operations, such as appendChild(), insertBefore(), and moveNode().

The Group Policy editor may stop responding when editing a Group Policy Object (GPO) that contains Group Policy Preferences (GPP) for Internet Explorer 10 settings.

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 8.1
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2

Resolution: This issue was resolved in KB4493474.

Back to top
OS Build 15063.1563

January 08, 2019
KB4480973
Resolved
KB4493474
Resolved:
April 09, 2019
10:00 AM PT

Opened:
January 08, 2019
10:00 AM PT
MSXML6 may cause applications to stop responding
After installing KB4480973, MSXML6 causes applications to stop responding if an exception was thrown during node operations, such as appendChild(), insertBefore(), and moveNode().

The Group Policy editor may stop responding when editing a Group Policy Object (GPO) that contains Group Policy Preferences (GPP) for Internet Explorer 10 settings.

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 8.1
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2
Resolution: This issue was resolved in KB4493474.

Back to top
OS Build 15063.1563

January 08, 2019
KB4480973
Resolved
KB4493474
Resolved:
April 09, 2019
10:00 AM PT

Opened:
January 08, 2019
10:00 AM PT
" diff --git a/windows/release-information/status-windows-10-1709.yml b/windows/release-information/status-windows-10-1709.yml index e31967236f..0688f87235 100644 --- a/windows/release-information/status-windows-10-1709.yml +++ b/windows/release-information/status-windows-10-1709.yml @@ -79,9 +79,9 @@ sections: - type: markdown text: " - - - + + +
DetailsOriginating updateStatusHistory
Custom URI schemes may not start corresponding application
After installing KB4489886, custom URI schemes for application protocol handlers may not start the corresponding application for local intranet and trusted sites security zones on Internet Explorer.

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 8.1; Windows 7, Service Pack 1 
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2; Windows Server 2008 R2 SP1

Workaround: Right-click the URL link to open it in a new window or tab, or enable Protected Mode in Internet Explorer for local intranet and trusted sites
1. Go to Tools > Internet options > Security.
2. Within Select a zone to view or change security settings, select Local intranet and then select Enable Protected Mode.
3. Select Trusted sites and then select Enable Protected Mode.
4. Select OK.
You must restart the browser after making these changes.

Next steps: Microsoft is working on a resolution and will provide an update in an upcoming release.

Back to top
OS Build 16299.1029

March 12, 2019
KB4489886
Mitigated
Last updated:
March 19, 2019
10:00 AM PT

Opened:
March 12, 2019
10:00 AM PT
End-user-defined characters (EUDC) may cause blue screen at startup
If you enable per font end-user-defined characters (EUDC), the system may stop working and a blue screen may appear at startup. This is not a common setting in non-Asian regions.

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016

Resolution: This issue is resolved in KB4493441.

Back to top
OS Build 16299.1059

March 19, 2019
KB4489890
Resolved
KB4493441
Resolved:
April 09, 2019
10:00 AM PT

Opened:
March 19, 2019
10:00 AM PT
Stop error when attempting to start SSH from WSL
After applying KB4489886, a stop error occurs when attempting to start the Secure Shell (SSH) client program from Windows Subsystem for Linux (WSL) with agent forwarding enabled using a command line switch (ssh –A) or a configuration setting.

Affected platforms:
  • Client: Windows 10, version 1803; Windows 10, version 1709
  • Server: Windows Server, version 1803; Windows Server, version 1709

Resolution: This issue is resolved in KB4493441.

Back to top
OS Build 16299.1029

March 12, 2019
KB4489886
Resolved
KB4493441
Resolved:
April 09, 2019
10:00 AM PT

Opened:
March 12, 2019
10:00 AM PT
Custom URI schemes may not start corresponding application
After installing KB4489886, custom URI schemes for application protocol handlers may not start the corresponding application for local intranet and trusted sites security zones on Internet Explorer.

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 8.1; Windows 7, Service Pack 1 
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2; Windows Server 2008 R2 SP1
Workaround: Right-click the URL link to open it in a new window or tab, or enable Protected Mode in Internet Explorer for local intranet and trusted sites
1. Go to Tools > Internet options > Security.
2. Within Select a zone to view or change security settings, select Local intranet and then select Enable Protected Mode.
3. Select Trusted sites and then select Enable Protected Mode.
4. Select OK.
You must restart the browser after making these changes.

Next steps: Microsoft is working on a resolution and will provide an update in an upcoming release.

Back to top
OS Build 16299.1029

March 12, 2019
KB4489886
Mitigated
Last updated:
March 19, 2019
10:00 AM PT

Opened:
March 12, 2019
10:00 AM PT
End-user-defined characters (EUDC) may cause blue screen at startup
If you enable per font end-user-defined characters (EUDC), the system may stop working and a blue screen may appear at startup. This is not a common setting in non-Asian regions.

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016
Resolution: This issue is resolved in KB4493441.

Back to top
OS Build 16299.1059

March 19, 2019
KB4489890
Resolved
KB4493441
Resolved:
April 09, 2019
10:00 AM PT

Opened:
March 19, 2019
10:00 AM PT
Stop error when attempting to start SSH from WSL
After applying KB4489886, a stop error occurs when attempting to start the Secure Shell (SSH) client program from Windows Subsystem for Linux (WSL) with agent forwarding enabled using a command line switch (ssh –A) or a configuration setting.

Affected platforms:
  • Client: Windows 10, version 1803; Windows 10, version 1709
  • Server: Windows Server, version 1803; Windows Server, version 1709
Resolution: This issue is resolved in KB4493441.

Back to top
OS Build 16299.1029

March 12, 2019
KB4489886
Resolved
KB4493441
Resolved:
April 09, 2019
10:00 AM PT

Opened:
March 12, 2019
10:00 AM PT
" @@ -90,6 +90,6 @@ sections: - type: markdown text: " - +
DetailsOriginating updateStatusHistory
MSXML6 causes applications to stop responding if an exception was thrown
After installing KB4480978, MSXML6 causes applications to stop responding if an exception was thrown during node operations, such as appendChild(), insertBefore(), and moveNode().

The Group Policy editor may stop responding when editing a Group Policy Object (GPO) that contains Group Policy Preferences (GPP) for Internet Explorer 10 settings.

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 8.1
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2

Resolution: This issue is resolved in KB4493441.

Back to top
OS Build 16299.904

January 08, 2019
KB4480978
Resolved
KB4493441
Resolved:
April 09, 2019
10:00 AM PT

Opened:
January 08, 2019
10:00 AM PT
MSXML6 causes applications to stop responding if an exception was thrown
After installing KB4480978, MSXML6 causes applications to stop responding if an exception was thrown during node operations, such as appendChild(), insertBefore(), and moveNode().

The Group Policy editor may stop responding when editing a Group Policy Object (GPO) that contains Group Policy Preferences (GPP) for Internet Explorer 10 settings.

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 8.1
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2
Resolution: This issue is resolved in KB4493441.

Back to top
OS Build 16299.904

January 08, 2019
KB4480978
Resolved
KB4493441
Resolved:
April 09, 2019
10:00 AM PT

Opened:
January 08, 2019
10:00 AM PT
" diff --git a/windows/release-information/status-windows-10-1803.yml b/windows/release-information/status-windows-10-1803.yml index 16bc56e3c4..8e5a0f7a8d 100644 --- a/windows/release-information/status-windows-10-1803.yml +++ b/windows/release-information/status-windows-10-1803.yml @@ -80,11 +80,11 @@ sections: - type: markdown text: " - - + - +
DetailsOriginating updateStatusHistory
Custom URI schemes may not start corresponding application
After installing KB4489868, custom URI schemes for application protocol handlers may not start the corresponding application for local intranet and trusted sites security zones on Internet Explorer. 

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 8.1; Windows 7, Service Pack 1 
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2; Windows Server 2008 R2 SP1

Workaround: Right-click the URL link to open it in a new window or tab, or enable Protected Mode in Internet Explorer for local intranet and trusted sites
  1. Go to Tools > Internet options > Security 
  2. Within Select a zone to view or change security settings, select Local intranet and then select Enable Protected Mode.
  3. Select Trusted sites and then select Enable Protected Mode
  4. Select OK
 You must restart the browser after making these changes. 
 
Next steps: Microsoft is working on a resolution and will provide an update in an upcoming release. 

Back to top
OS Build 17134.648

March 12, 2019
KB4489868
Mitigated
Last updated:
March 19, 2019
10:00 AM PT

Opened:
March 12, 2019
10:00 AM PT
Issue using PXE to start a device from WDS
After installing KB4489868, there may be issues using the Preboot Execution Environment (PXE) to start a device from a Windows Deployment Services (WDS) server configured to use Variable Window Extension. This may cause the connection to the WDS server to terminate prematurely while downloading the image. This issue does not affect clients or devices that are not using Variable Window Extension. 

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10 Enterprise LTSC 2016; Windows 8.1
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server 2016; Windows Server 2012 R2

Workaround: To mitigate the issue, disable the Variable Window Extension on WDS server using one of the following options:
Option 1: 
Open an Administrator Command prompt and type the following:  
Wdsutil /Set-TransportServer /EnableTftpVariableWindowExtension:No
+      
Custom URI schemes may not start corresponding application
After installing KB4489868, custom URI schemes for application protocol handlers may not start the corresponding application for local intranet and trusted sites security zones on Internet Explorer. 

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 8.1; Windows 7, Service Pack 1 
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2; Windows Server 2008 R2 SP1
Workaround: Right-click the URL link to open it in a new window or tab, or enable Protected Mode in Internet Explorer for local intranet and trusted sites
  1. Go to Tools > Internet options > Security 
  2. Within Select a zone to view or change security settings, select Local intranet and then select Enable Protected Mode.
  3. Select Trusted sites and then select Enable Protected Mode
  4. Select OK
 You must restart the browser after making these changes. 
 
Next steps: Microsoft is working on a resolution and will provide an update in an upcoming release. 

Back to top
OS Build 17134.648

March 12, 2019
KB4489868
Mitigated
Last updated:
March 19, 2019
10:00 AM PT

Opened:
March 12, 2019
10:00 AM PT
Issue using PXE to start a device from WDS
After installing KB4489868, there may be issues using the Preboot Execution Environment (PXE) to start a device from a Windows Deployment Services (WDS) server configured to use Variable Window Extension. This may cause the connection to the WDS server to terminate prematurely while downloading the image. This issue does not affect clients or devices that are not using Variable Window Extension. 

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10 Enterprise LTSC 2016; Windows 8.1
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server 2016; Windows Server 2012 R2
Workaround: To mitigate the issue, disable the Variable Window Extension on WDS server using one of the following options:
Option 1: 
Open an Administrator Command prompt and type the following:  
Wdsutil /Set-TransportServer /EnableTftpVariableWindowExtension:No
 
 Option 2: 
Use the Windows Deployment Services UI to make the following adjustment:  
  1. Open Windows Deployment Services from Windows Administrative Tools. 
  2. Expand Servers and right-click a WDS server. 
  3. Open its properties and clear the?Enable Variable Window Extension?box on the TFTP tab.  
Option 3: 
Set the following registry value to 0:  
HKLM\\System\\CurrentControlSet\\Services\\WDSServer\\Providers\\WDSTFTP\\EnableVariableWindowExtension  
Restart the WDSServer service after disabling the Variable Window Extension. 
 
Next steps: Microsoft is working on a resolution and will provide an update in an upcoming release. 

Back to top
OS Build 17134.648

March 12, 2019
KB4489868
Mitigated
Last updated:
March 19, 2019
10:00 AM PT

Opened:
March 12, 2019
10:00 AM PT
End-user-defined characters (EUDC) may cause blue screen at startup
If you enable per font end-user-defined characters (EUDC), the system may stop working and a blue screen may appear at startup. This is not a common setting in non-Asian regions. 

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016
 
Resolution: This issue was resolved in KB4493464

Back to top
OS Build 17134.677

March 19, 2019
KB4489894
Resolved
KB4493464
Resolved:
April 09, 2019
10:00 AM PT

Opened:
March 19, 2019
10:00 AM PT
Stop error when attempting to start SSH from WSL
After applying KB4489868, a stop error occurs when attempting to start the Secure Shell (SSH) client program from Windows Subsystem for Linux (WSL) with agent forwarding enabled using a command line switch (ssh -A) or a configuration setting.

Affected platforms:
  • Client: Windows 10, version 1803; Windows 10, version 1709
  • Server: Windows Server, version 1803; Windows Server, version 1709

Resolution: This issue was resolved in KB4493464.

Back to top
OS Build 17134.648

March 12, 2019
KB4489868
Resolved
KB4493464
Resolved:
April 09, 2019
10:00 AM PT

Opened:
March 12, 2019
10:00 AM PT
Stop error when attempting to start SSH from WSL
After applying KB4489868, a stop error occurs when attempting to start the Secure Shell (SSH) client program from Windows Subsystem for Linux (WSL) with agent forwarding enabled using a command line switch (ssh -A) or a configuration setting.

Affected platforms:
  • Client: Windows 10, version 1803; Windows 10, version 1709
  • Server: Windows Server, version 1803; Windows Server, version 1709
Resolution: This issue was resolved in KB4493464.

Back to top
OS Build 17134.648

March 12, 2019
KB4489868
Resolved
KB4493464
Resolved:
April 09, 2019
10:00 AM PT

Opened:
March 12, 2019
10:00 AM PT
" @@ -93,6 +93,6 @@ sections: - type: markdown text: " - +
DetailsOriginating updateStatusHistory
MSXML6 may cause applications to stop responding
After installing KB4480966, MSXML6 causes applications to stop responding if an exception was thrown during node operations, such as appendChild(), insertBefore(), and moveNode().

The Group Policy editor may stop responding when editing a Group Policy Object (GPO) that contains Group Policy Preferences (GPP) for Internet Explorer 10 settings.

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 8.1
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2

Resolution: This issue was resolved in KB4493464

Back to top
OS Build 17134.523

January 08, 2019
KB4480966
Resolved
KB4493464
Resolved:
April 09, 2019
10:00 AM PT

Opened:
January 08, 2019
10:00 AM PT
MSXML6 may cause applications to stop responding
After installing KB4480966, MSXML6 causes applications to stop responding if an exception was thrown during node operations, such as appendChild(), insertBefore(), and moveNode().

The Group Policy editor may stop responding when editing a Group Policy Object (GPO) that contains Group Policy Preferences (GPP) for Internet Explorer 10 settings.

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 8.1
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2
Resolution: This issue was resolved in KB4493464

Back to top
OS Build 17134.523

January 08, 2019
KB4480966
Resolved
KB4493464
Resolved:
April 09, 2019
10:00 AM PT

Opened:
January 08, 2019
10:00 AM PT
" diff --git a/windows/release-information/status-windows-10-1809-and-windows-server-2019.yml b/windows/release-information/status-windows-10-1809-and-windows-server-2019.yml index f42f97e4cc..b2b54fd9fb 100644 --- a/windows/release-information/status-windows-10-1809-and-windows-server-2019.yml +++ b/windows/release-information/status-windows-10-1809-and-windows-server-2019.yml @@ -87,7 +87,7 @@ sections: - type: markdown text: " - +
DetailsOriginating updateStatusHistory
End-user-defined characters (EUDC) may cause blue screen at startup
If you enable per font end-user-defined characters (EUDC), the system will stop working and a blue screen may appear at startup. This is not a common setting in non-Asian regions.

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016

Workaround: To avoid this issue, don't enable per font EUDC. As an alternative, you can edit the registry to mitigate this issue; for more information, see KB4496149.

Resolved: This issue was resolved in KB4493509.

Back to top
OS Build 17763.404

April 02, 2019
KB4490481
Resolved
KB4493509
Resolved:
April 09, 2019
10:00 AM PT

Opened:
April 02, 2019
10:00 AM PT
End-user-defined characters (EUDC) may cause blue screen at startup
If you enable per font end-user-defined characters (EUDC), the system will stop working and a blue screen may appear at startup. This is not a common setting in non-Asian regions.

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016
Workaround: To avoid this issue, don't enable per font EUDC. As an alternative, you can edit the registry to mitigate this issue; for more information, see KB4496149.

Resolved: This issue was resolved in KB4493509.

Back to top
OS Build 17763.404

April 02, 2019
KB4490481
Resolved
KB4493509
Resolved:
April 09, 2019
10:00 AM PT

Opened:
April 02, 2019
10:00 AM PT
" @@ -96,10 +96,10 @@ sections: - type: markdown text: " - - + - +
DetailsOriginating updateStatusHistory
Custom URI schemes may not start corresponding application
After installing KB4489899, custom URI schemes for application protocol handlers may not start the corresponding application for local intranet and trusted sites security zones on Internet Explorer.

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 8.1; Windows 7, Service Pack 1 
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2; Windows Server 2008 R2 SP1

Workaround: Right-click the URL link to open it in a new window or tab, or enable Protected Mode in Internet Explorer for local intranet and trusted sites
  1. Go to Tools > Internet options > Security.
  2. Within Select a zone to view of change security settings, select Local intranet and then select Enable Protected Mode.
  3. Select Trusted Sites and then select Enable Protected Mode
  4. Select OK.
You must restart the browser after making these changes. 
 
Next steps: Microsoft is working on a resolution and will provide an update in an upcoming release. 

Back to top
OS Build 17763.379

March 12, 2019
KB4489899
Mitigated
Last updated:
April 02, 2019
10:00 AM PT

Opened:
March 12, 2019
10:00 AM PT
Issue using PXE to start a device from WDS
After installing KB4489899, there may be issues using the Preboot Execution Environment (PXE) to start a device from a Windows Deployment Services (WDS) server configured to use Variable Window Extension. This may cause the connection to the WDS server to terminate prematurely while downloading the image. This issue does not affect clients or devices that are not using Variable Window Extension. 

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10 Enterprise LTSC 2016; Windows 8.1
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server 2016; Windows Server 2012 R2

Workaround: To mitigate the issue, disable the Variable Window Extension on WDS server using one of the following options:
Option 1:
Open an Administrator Command prompt and type the following:
Wdsutil /Set-TransportServer /EnableTftpVariableWindowExtension:No 
+      
Custom URI schemes may not start corresponding application
After installing KB4489899, custom URI schemes for application protocol handlers may not start the corresponding application for local intranet and trusted sites security zones on Internet Explorer.

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 8.1; Windows 7, Service Pack 1 
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2; Windows Server 2008 R2 SP1
Workaround: Right-click the URL link to open it in a new window or tab, or enable Protected Mode in Internet Explorer for local intranet and trusted sites
  1. Go to Tools > Internet options > Security.
  2. Within Select a zone to view of change security settings, select Local intranet and then select Enable Protected Mode.
  3. Select Trusted Sites and then select Enable Protected Mode
  4. Select OK.
You must restart the browser after making these changes. 
 
Next steps: Microsoft is working on a resolution and will provide an update in an upcoming release. 

Back to top
OS Build 17763.379

March 12, 2019
KB4489899
Mitigated
Last updated:
April 02, 2019
10:00 AM PT

Opened:
March 12, 2019
10:00 AM PT
Issue using PXE to start a device from WDS
After installing KB4489899, there may be issues using the Preboot Execution Environment (PXE) to start a device from a Windows Deployment Services (WDS) server configured to use Variable Window Extension. This may cause the connection to the WDS server to terminate prematurely while downloading the image. This issue does not affect clients or devices that are not using Variable Window Extension. 

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10 Enterprise LTSC 2016; Windows 8.1
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server 2016; Windows Server 2012 R2
Workaround: To mitigate the issue, disable the Variable Window Extension on WDS server using one of the following options:
Option 1:
Open an Administrator Command prompt and type the following:
Wdsutil /Set-TransportServer /EnableTftpVariableWindowExtension:No 
 
Option 2:
Use the Windows Deployment Services UI to make the following adjustment: 
  1. Open Windows Deployment Services from Windows Administrative Tools. 
  2. Expand Servers and right-click a WDS server. 
  3. Open its properties and clear the Enable Variable Window Extension box on the TFTP tab.
Option 3:
Set the following registry value to 0:  
HKLM\\System\\CurrentControlSet\\Services\\WDSServer\\Providers\\WDSTFTP\\EnableVariableWindowExtension  
Restart the WDSServer service after disabling the Variable Window Extension. 

Next steps: Microsoft is working on a resolution and will provide an update in an upcoming release. 

Back to top
OS Build 17763.379

March 12, 2019
KB4489899
Mitigated
Last updated:
April 02, 2019
10:00 AM PT

Opened:
March 12, 2019
10:00 AM PT
Apps may stop working after selecting an audio output device other than the default
After installing KB4482887 on machines that have multiple audio devices, applications that provide advanced options for internal or external audio output devices may stop working unexpectedly. This issue occurs for users that select an audio output device different from the \"Default Audio Device\". Examples of applications that may stop working include: 
  • Windows Media Player 
  • Realtek HD Audio Manager 
  • Sound Blaster Control Panel 

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019
  • Server: Windows Server, version 1809; Windows Server 2019

Workaround: As a temporary solution, select the \"Default Audio Device\" in the options provided by the application; please refer to the application's user manual for details. 
For example, to set the Default Audio Device in Windows Media Player: 
  1. Open Windows Media Player > Tools > Options > Devices.
  2. Select the device and choose Properties.
  3. On the next dialog, from the drop-down menu under Select the Audio Device, choose Default Audio Device from the list. 
You can then send audio from the application to the audio device you want in the per-application audio settings found under Settings > System > Sound > App Volume and device preferences.

Resolved: This issue was resolved in KB4490481

Back to top
OS Build 17763.348

March 01, 2019
KB4482887
Resolved
KB4490481
Resolved:
April 02, 2019
10:00 AM PT

Opened:
March 01, 2019
10:00 AM PT
Apps may stop working after selecting an audio output device other than the default
After installing KB4482887 on machines that have multiple audio devices, applications that provide advanced options for internal or external audio output devices may stop working unexpectedly. This issue occurs for users that select an audio output device different from the \"Default Audio Device\". Examples of applications that may stop working include: 
  • Windows Media Player 
  • Realtek HD Audio Manager 
  • Sound Blaster Control Panel 
Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019
  • Server: Windows Server, version 1809; Windows Server 2019
Workaround: As a temporary solution, select the \"Default Audio Device\" in the options provided by the application; please refer to the application's user manual for details. 
For example, to set the Default Audio Device in Windows Media Player: 
  1. Open Windows Media Player > Tools > Options > Devices.
  2. Select the device and choose Properties.
  3. On the next dialog, from the drop-down menu under Select the Audio Device, choose Default Audio Device from the list. 
You can then send audio from the application to the audio device you want in the per-application audio settings found under Settings > System > Sound > App Volume and device preferences.

Resolved: This issue was resolved in KB4490481

Back to top
OS Build 17763.348

March 01, 2019
KB4482887
Resolved
KB4490481
Resolved:
April 02, 2019
10:00 AM PT

Opened:
March 01, 2019
10:00 AM PT
" @@ -108,8 +108,8 @@ sections: - type: markdown text: " - - + +
DetailsOriginating updateStatusHistory
Internet Explorer 11 authentication issue with multiple concurrent logons
After installing the February 12, 2019 update (KB4487044), Internet Explorer 11 and other applications that use WININET.DLL may have authentication issues. This occurs when two or more people use the same user account for multiple, concurrent login sessions on the same Windows Server machine, including Remote Desktop Protocol (RDP) and Terminal Server logons. Symptoms reported by customers include, but may not be limited to:  
  • Cache size and location show zero or empty. 
  • Keyboard shortcuts may not work properly. 
  • Webpages may intermittently fail to load or render correctly. 
  • Issues with credential prompts. 
  • Issues when downloading files. 

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10 Enterprise LTSC 2016; Windows 8.1; Windows 7, Service Pack 1
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server 2016; Windows Server 2012 R2; Windows Server 2008 R2 SP1
 
Resolved: This issue was resolved in KB4493509

Back to top
OS Build 17763.253

January 08, 2019
KB4480116
Resolved
KB4493509
Resolved:
April 09, 2019
10:00 AM PT

Opened:
January 08, 2019
10:00 AM PT
MSXML6 may cause applications to stop responding
After installing KB4480116, MSXML6 causes applications to stop responding if an exception was thrown during node operations, such as appendChild(), insertBefore(), and moveNode().
 
The Group Policy editor may stop responding when editing a Group Policy Object (GPO) that contains Group Policy Preferences (GPP) for Internet Explorer 10 settings. 

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 8.1
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2

Resolved: This issue was resolved in KB4493509

Back to top
OS Build 17763.253

January 08, 2019
KB4480116
Resolved
KB4493509
Resolved:
April 09, 2019
10:00 AM PT

Opened:
January 08, 2019
10:00 AM PT
Internet Explorer 11 authentication issue with multiple concurrent logons
After installing the February 12, 2019 update (KB4487044), Internet Explorer 11 and other applications that use WININET.DLL may have authentication issues. This occurs when two or more people use the same user account for multiple, concurrent login sessions on the same Windows Server machine, including Remote Desktop Protocol (RDP) and Terminal Server logons. Symptoms reported by customers include, but may not be limited to:  
  • Cache size and location show zero or empty. 
  • Keyboard shortcuts may not work properly. 
  • Webpages may intermittently fail to load or render correctly. 
  • Issues with credential prompts. 
  • Issues when downloading files. 
Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10 Enterprise LTSC 2016; Windows 8.1; Windows 7, Service Pack 1
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server 2016; Windows Server 2012 R2; Windows Server 2008 R2 SP1
 
Resolved: This issue was resolved in KB4493509

Back to top
OS Build 17763.253

January 08, 2019
KB4480116
Resolved
KB4493509
Resolved:
April 09, 2019
10:00 AM PT

Opened:
January 08, 2019
10:00 AM PT
MSXML6 may cause applications to stop responding
After installing KB4480116, MSXML6 causes applications to stop responding if an exception was thrown during node operations, such as appendChild(), insertBefore(), and moveNode().
 
The Group Policy editor may stop responding when editing a Group Policy Object (GPO) that contains Group Policy Preferences (GPP) for Internet Explorer 10 settings. 

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 8.1
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2
Resolved: This issue was resolved in KB4493509

Back to top
OS Build 17763.253

January 08, 2019
KB4480116
Resolved
KB4493509
Resolved:
April 09, 2019
10:00 AM PT

Opened:
January 08, 2019
10:00 AM PT
" @@ -118,6 +118,6 @@ sections: - type: markdown text: " - +
DetailsOriginating updateStatusHistory
Audio not working on monitors or TV connected to a PC via HDMI, USB, or DisplayPort
Upgrade block: Microsoft has identified issues with certain new Intel display drivers. Intel inadvertently released versions of its display driver (versions 24.20.100.6344, 24.20.100.6345) to OEMs that accidentally turned on unsupported features in Windows. 
 
As a result, after updating to Windows 10, version 1809, audio playback from a monitor or television connected to a PC via HDMI, USB-C, or a DisplayPort may not function correctly on devices with these drivers.

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019
  • Server: Windows Server, version 1809; Windows Server 2019 

Next steps: Intel has released updated drivers to OEM device manufacturers. OEMs need to make the updated driver available via Windows Update.

For more information, see the Intel Customer Support article.

Note: This Intel display driver issue is different from the Intel Smart Sound Technology driver (version 09.21.00.3755) audio issue previously documented.

Back to top
OS Build 17763.134

November 13, 2018
KB4467708
Mitigated
Last updated:
March 15, 2019
12:00 PM PT

Opened:
November 13, 2018
10:00 AM PT
Audio not working on monitors or TV connected to a PC via HDMI, USB, or DisplayPort
Upgrade block: Microsoft has identified issues with certain new Intel display drivers. Intel inadvertently released versions of its display driver (versions 24.20.100.6344, 24.20.100.6345) to OEMs that accidentally turned on unsupported features in Windows. 
 
As a result, after updating to Windows 10, version 1809, audio playback from a monitor or television connected to a PC via HDMI, USB-C, or a DisplayPort may not function correctly on devices with these drivers.

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019
  • Server: Windows Server, version 1809; Windows Server 2019 
Next steps: Intel has released updated drivers to OEM device manufacturers. OEMs need to make the updated driver available via Windows Update.

For more information, see the Intel Customer Support article.

Note: This Intel display driver issue is different from the Intel Smart Sound Technology driver (version 09.21.00.3755) audio issue previously documented.

Back to top
OS Build 17763.134

November 13, 2018
KB4467708
Mitigated
Last updated:
March 15, 2019
12:00 PM PT

Opened:
November 13, 2018
10:00 AM PT
" diff --git a/windows/release-information/status-windows-7-and-windows-server-2008-r2-sp1.yml b/windows/release-information/status-windows-7-and-windows-server-2008-r2-sp1.yml index 1799cfff22..a037436879 100644 --- a/windows/release-information/status-windows-7-and-windows-server-2008-r2-sp1.yml +++ b/windows/release-information/status-windows-7-and-windows-server-2008-r2-sp1.yml @@ -88,7 +88,7 @@ sections:
System may be unresponsive after restart if Avira antivirus software installed.
Microsoft and Avira have identified an issue on devices with Avira antivirus software installed that may cause the system to become unresponsive upon restart after installing KB4493472.

Microsoft has temporarily blocked devices from receiving this update if Avira antivirus software is installed.

Next steps: We are presently investigating this issue with Avira and will provide an update when available.

Back to topApril 09, 2019
KB4493472Investigating
Last updated:
April 09, 2019
10:00 AM PT

Opened:
April 09, 2019
10:00 AM PT
System unresponsive after restart if Sophos Endpoint Protection installed.
Microsoft and Sophos have identified an issue on devices with Sophos Endpoint Protection installed and managed by either Sophos Central or Sophos Enterprise Console (SEC) that may cause the system to become unresponsive upon restart after installing KB4493472.

Microsoft has temporarily blocked devices from receiving this update if the Sophos Endpoint is installed until a solution is available.

Guidance for Sophos Endpoint and Sophos Enterprise Console customers can be found in the Sophos support article.

Back to topApril 09, 2019
KB4493472Mitigated
Last updated:
April 09, 2019
10:00 AM PT

Opened:
April 09, 2019
10:00 AM PT
System may be unresponsive after restart if ArcaBit antivirus software installed.
Microsoft and ArcaBit have identified an issue on devices with ArcaBit antivirus software installed that may cause the system to become unresponsive upon restart after installing KB4493472.

Microsoft has temporarily blocked devices from receiving this update if ArcaBit antivirus software is installed.

ArcaBit has released an update to address this issue. For more information, see the Arcabit support article.

Back to topApril 09, 2019
KB4493472Mitigated
Last updated:
April 09, 2019
10:00 AM PT

Opened:
April 09, 2019
10:00 AM PT -
Devices may not respond at login or Welcome screen if running certain Avast software.
Microsoft and Avast have identified an issue on devices running Avast for Business, Avast CloudCare, and AVG Business Edition antivirus software after you install KB4493472 and restart. Devices may become unresponsive at the login or Welcome screen. Additionally, you may be unable to log in or log in after an extended period of time.

Affected platforms: 
  • Client: Windows 8.1; Windows 7, Service Pack 1 
  • Server: Windows Server 2012 R2; Windows Server 2008 R2 SP1 

Resolution: Avast has released emergency updates to address this issue. For more information and AV update schedule, see the Avast support KB article.

Back to topApril 09, 2019
KB4493472Resolved
Resolved:
April 09, 2019
10:00 AM PT

Opened:
April 09, 2019
10:00 AM PT +
Devices may not respond at login or Welcome screen if running certain Avast software.
Microsoft and Avast have identified an issue on devices running Avast for Business, Avast CloudCare, and AVG Business Edition antivirus software after you install KB4493472 and restart. Devices may become unresponsive at the login or Welcome screen. Additionally, you may be unable to log in or log in after an extended period of time.

Affected platforms: 
  • Client: Windows 8.1; Windows 7, Service Pack 1 
  • Server: Windows Server 2012 R2; Windows Server 2008 R2 SP1 
Resolution: Avast has released emergency updates to address this issue. For more information and AV update schedule, see the Avast support KB article.

Back to topApril 09, 2019
KB4493472Resolved
Resolved:
April 09, 2019
10:00 AM PT

Opened:
April 09, 2019
10:00 AM PT " @@ -97,9 +97,9 @@ sections: - type: markdown text: " - - - + + +
DetailsOriginating updateStatusHistory
Authentication may fail for services after the Kerberos ticket expires.
After installing KB4489878, some customers report that authentication fails for services that require unconstrained delegation after the Kerberos ticket expires (the default is 10 hours). For example, the SQL server service fails.

Workaround: To mitigate this issue, use one of the following options:

  • Option 1: Purge the Kerberos tickets on the application server. After the Kerberos ticket expires, the issue will occur again, and you must purge the tickets again.
  • Option 2: If purging does not mitigate the issue, restart the application; for example, restart the Internet Information Services (IIS) app pool associated with the SQL server.
  • Option 3: Use constrained delegation.

Next steps: Microsoft is working on a resolution and will provide an update in an upcoming release.

Back to top
March 12, 2019
KB4489878
Mitigated
Last updated:
April 09, 2019
10:00 AM PT

Opened:
March 12, 2019
10:00 AM PT
Custom URI schemes may not start corresponding application.
After installing KB4489878, custom URI schemes for application protocol handlers may not start the corresponding application for local intranet and trusted sites on Internet Explorer.

Affected platforms: 
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 8.1; Windows 7, Service Pack 1 
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2; Windows Server 2008 R2 SP1 

Resolution: This issue is resolved in KB4493472.

Back to top
March 12, 2019
KB4489878
Resolved
KB4493472
Resolved:
April 09, 2019
10:00 AM PT

Opened:
March 12, 2019
10:00 AM PT
NETDOM.EXE fails to run.
After installing KB4489878, NETDOM.EXE fails to run, and the on-screen error, “The command failed to complete successfully.” appears.

Affected platforms: 
  • Client: Windows 7, Service Pack 1 
  • Server: Windows Server 2008 R2 SP1 

Resolution: This issue is resolved in KB4493472.

Back to top
March 12, 2019
KB4489878
Resolved
KB4493472
Resolved:
April 09, 2019
10:00 AM PT

Opened:
March 12, 2019
10:00 AM PT
Authentication may fail for services after the Kerberos ticket expires.
After installing KB4489878, some customers report that authentication fails for services that require unconstrained delegation after the Kerberos ticket expires (the default is 10 hours). For example, the SQL server service fails.

Workaround: To mitigate this issue, use one of the following options:

  • Option 1: Purge the Kerberos tickets on the application server. After the Kerberos ticket expires, the issue will occur again, and you must purge the tickets again.
  • Option 2: If purging does not mitigate the issue, restart the application; for example, restart the Internet Information Services (IIS) app pool associated with the SQL server.
  • Option 3: Use constrained delegation.
Next steps: Microsoft is working on a resolution and will provide an update in an upcoming release.

Back to top
March 12, 2019
KB4489878
Mitigated
Last updated:
April 09, 2019
10:00 AM PT

Opened:
March 12, 2019
10:00 AM PT
Custom URI schemes may not start corresponding application.
After installing KB4489878, custom URI schemes for application protocol handlers may not start the corresponding application for local intranet and trusted sites on Internet Explorer.

Affected platforms: 
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 8.1; Windows 7, Service Pack 1 
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2; Windows Server 2008 R2 SP1 
Resolution: This issue is resolved in KB4493472.

Back to top
March 12, 2019
KB4489878
Resolved
KB4493472
Resolved:
April 09, 2019
10:00 AM PT

Opened:
March 12, 2019
10:00 AM PT
NETDOM.EXE fails to run.
After installing KB4489878, NETDOM.EXE fails to run, and the on-screen error, “The command failed to complete successfully.” appears.

Affected platforms: 
  • Client: Windows 7, Service Pack 1 
  • Server: Windows Server 2008 R2 SP1 
Resolution: This issue is resolved in KB4493472.

Back to top
March 12, 2019
KB4489878
Resolved
KB4493472
Resolved:
April 09, 2019
10:00 AM PT

Opened:
March 12, 2019
10:00 AM PT
" @@ -108,8 +108,8 @@ sections: - type: markdown text: " - - - + + +
DetailsOriginating updateStatusHistory
Local Administrators unable to remotely access shares.
Local users who are part of the local Administrators group may not be able to remotely access shares on Windows Server 2008 R2 and Windows 7 machines after installing KB4480970. This does not affect domain accounts in the local Administrators group.
 
Affected platforms: 
  • Client: Windows 7, Service Pack 1 
  • Server: Windows Server 2008 R2 SP1 

Resolution: This issue is resolved in KB4487345.

Back to top
January 08, 2019
KB4480970
Resolved
KB4487345
Resolved:
January 11, 2019
02:00 PM PT

Opened:
January 08, 2019
10:00 AM PT
Virtual machines fail to restore.
After installing KB4480970, virtual machines (VM) may fail to restore successfully if the VM has been saved and restored once before. The error message is, “Failed to restore the virtual machine state: Cannot restore this virtual machine because the saved state data cannot be read. Delete the saved state data and then try to start the virtual machine. (0xC0370027).”

This affects AMD Bulldozer Family 15h, AMD Jaguar Family 16h, and AMD Puma Family 16h (second generation) microarchitectures.

Affected platforms: 
  • Client: Windows 7, Service Pack 1 
  • Server: Windows Server 2008 R2 SP1 

Resolution: This issue is resolved in KB4490511.

Back to top
January 08, 2019
KB4480970
Resolved
KB4490511
Resolved:
February 19, 2019
02:00 PM PT

Opened:
January 08, 2019
10:00 AM PT
Internet Explorer 11 authentication issue with multiple concurrent logons.
After installing KB4480970, Internet Explorer 11 and other applications that use WININET.DLL may have authentication issues. This occurs when two or more people use the same user account for multiple, concurrent login sessions on the same Windows Server machine, including Remote Desktop Protocol (RDP) and Terminal Server logons. Symptoms reported by customers include, but may not be limited to:
  • Cache size and location show zero or empty.
  • Keyboard shortcuts may not work properly.
  • Webpages may intermittently fail to load or render correctly.
  • Issues with credential prompts.
  • Issues when downloading files.

Affected platforms: 
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10 Enterprise LTSC 2016; Windows 8.1; Windows 7, Service Pack 1 
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server 2016; Windows Server 2012 R2; Windows Server 2008 R2 SP1 

Resolution: This issue is resolved in KB4493472.

Back to top
January 08, 2019
KB4480970
Resolved
KB4493472
Resolved:
April 09, 2019
10:00 AM PT

Opened:
January 08, 2019
10:00 AM PT
Local Administrators unable to remotely access shares.
Local users who are part of the local Administrators group may not be able to remotely access shares on Windows Server 2008 R2 and Windows 7 machines after installing KB4480970. This does not affect domain accounts in the local Administrators group.
 
Affected platforms: 
  • Client: Windows 7, Service Pack 1 
  • Server: Windows Server 2008 R2 SP1 
Resolution: This issue is resolved in KB4487345.

Back to top
January 08, 2019
KB4480970
Resolved
KB4487345
Resolved:
January 11, 2019
02:00 PM PT

Opened:
January 08, 2019
10:00 AM PT
Virtual machines fail to restore.
After installing KB4480970, virtual machines (VM) may fail to restore successfully if the VM has been saved and restored once before. The error message is, “Failed to restore the virtual machine state: Cannot restore this virtual machine because the saved state data cannot be read. Delete the saved state data and then try to start the virtual machine. (0xC0370027).”

This affects AMD Bulldozer Family 15h, AMD Jaguar Family 16h, and AMD Puma Family 16h (second generation) microarchitectures.

Affected platforms: 
  • Client: Windows 7, Service Pack 1 
  • Server: Windows Server 2008 R2 SP1 
Resolution: This issue is resolved in KB4490511.

Back to top
January 08, 2019
KB4480970
Resolved
KB4490511
Resolved:
February 19, 2019
02:00 PM PT

Opened:
January 08, 2019
10:00 AM PT
Internet Explorer 11 authentication issue with multiple concurrent logons.
After installing KB4480970, Internet Explorer 11 and other applications that use WININET.DLL may have authentication issues. This occurs when two or more people use the same user account for multiple, concurrent login sessions on the same Windows Server machine, including Remote Desktop Protocol (RDP) and Terminal Server logons. Symptoms reported by customers include, but may not be limited to:
  • Cache size and location show zero or empty.
  • Keyboard shortcuts may not work properly.
  • Webpages may intermittently fail to load or render correctly.
  • Issues with credential prompts.
  • Issues when downloading files.
Affected platforms: 
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10 Enterprise LTSC 2016; Windows 8.1; Windows 7, Service Pack 1 
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server 2016; Windows Server 2012 R2; Windows Server 2008 R2 SP1 
Resolution: This issue is resolved in KB4493472.

Back to top
January 08, 2019
KB4480970
Resolved
KB4493472
Resolved:
April 09, 2019
10:00 AM PT

Opened:
January 08, 2019
10:00 AM PT
" diff --git a/windows/release-information/status-windows-8.1-and-windows-server-2012-r2.yml b/windows/release-information/status-windows-8.1-and-windows-server-2012-r2.yml index d3150aecc8..92e95c5ed9 100644 --- a/windows/release-information/status-windows-8.1-and-windows-server-2012-r2.yml +++ b/windows/release-information/status-windows-8.1-and-windows-server-2012-r2.yml @@ -85,11 +85,11 @@ sections: - type: markdown text: " - - - - - + + + + +
DetailsOriginating updateStatusHistory
System may be unresponsive after restart if Avira antivirus software installed
Microsoft and Avira have identified an issue on devices with Avira antivirus software installed that may cause the system to become unresponsive upon restart after installing KB4493446.

Microsoft has temporarily blocked devices from receiving this update if Avira antivirus software is installed.

Affected platforms: 
  • Client: Windows 8.1; Windows 7, Service Pack 1 
  • Server: Windows Server 2012 R2; Windows Server 2008 R2 SP1 

Next steps: We are presently investigating this issue with Avira and will provide an update when available.

Back to top
April 09, 2019
KB4493446
Investigating
Last updated:
April 09, 2019
10:00 AM PT

Opened:
April 09, 2019
10:00 AM PT
System unresponsive after restart if Sophos Endpoint Protection installed
Microsoft and Sophos have identified an issue on devices with Sophos Endpoint Protection installed and managed by either Sophos Central or Sophos Enterprise Console (SEC) that may cause the system to become unresponsive upon restart after installing KB4493446.

Microsoft has temporarily blocked devices from receiving this update if the Sophos Endpoint is installed until a solution is available.

Affected platforms: 
  • Client: Windows 8.1; Windows 7, Service Pack 1 
  • Server: Windows Server 2012 R2; Windows Server 2008 R2 SP1 

Guidance for Sophos Endpoint and Sophos Enterprise Console customers can be found in the Sophos support article.

Back to top
April 09, 2019
KB4493446
Mitigated
Last updated:
April 09, 2019
10:00 AM PT

Opened:
April 09, 2019
10:00 AM PT
System may be unresponsive after restart if ArcaBit antivirus software installed
Microsoft and ArcaBit have identified an issue on devices with ArcaBit antivirus software installed that may cause the system to become unresponsive upon restart after installing KB4493446.

Microsoft has temporarily blocked devices from receiving this update if ArcaBit antivirus software is installed.

Affected platforms: 
  • Client: Windows 8.1; Windows 7, Service Pack 1 
  • Server: Windows Server 2012 R2; Windows Server 2008 R2 SP1 

ArcaBit has released an update to address this issue. For more information, see the Arcabit support article.

Back to top
April 09, 2019
KB4493446
Mitigated
Last updated:
April 09, 2019
10:00 AM PT

Opened:
April 09, 2019
10:00 AM PT
Certain operations performed on on a Cluster Shared Volume may fail
Certain operations, such as rename, that you perform on files or folders that are on a Cluster Shared Volume (CSV) may fail with the error, “STATUS_BAD_IMPERSONATION_LEVEL (0xC00000A5)”. This occurs when you perform the operation on a CSV owner node from a process that doesn’t have administrator privilege.

Affected platforms: 
  • Client: Windows 8.1 
  • Server: Windows Server 2012 R2 

Workaround: Do one of the following:

  • Perform the operation from a process that has administrator privilege.
  • Perform the operation from a node that doesn’t have CSV ownership.

Next steps: Microsoft is working on a resolution and will provide an update in an upcoming release.

Back to top
April 09, 2019
KB4493446
Mitigated
Last updated:
April 09, 2019
10:00 AM PT

Opened:
April 09, 2019
10:00 AM PT
Devices may not respond at login or Welcome screen if running certain Avast software
Microsoft and Avast have identified an issue on devices running Avast for Business, Avast CloudCare, and AVG Business Edition antivirus software after you install KB4493446 and restart. Devices may become unresponsive at the login or Welcome screen. Additionally, you may be unable to log in or log in after an extended period of time.

Affected platforms: 
  • Client: Windows 8.1; Windows 7, Service Pack 1 
  • Server: Windows Server 2012 R2; Windows Server 2008 R2 SP1 


Resolution: Avast has released emergency updates to address this issue. For more information and AV update schedule, see the Avast support KB article.

Back to top
April 09, 2019
KB4493446
Resolved
Resolved:
April 09, 2019
10:00 AM PT

Opened:
April 09, 2019
10:00 AM PT
System may be unresponsive after restart if Avira antivirus software installed
Microsoft and Avira have identified an issue on devices with Avira antivirus software installed that may cause the system to become unresponsive upon restart after installing KB4493446.

Microsoft has temporarily blocked devices from receiving this update if Avira antivirus software is installed.

Affected platforms: 
  • Client: Windows 8.1; Windows 7, Service Pack 1 
  • Server: Windows Server 2012 R2; Windows Server 2008 R2 SP1 
Next steps: We are presently investigating this issue with Avira and will provide an update when available.

Back to top
April 09, 2019
KB4493446
Investigating
Last updated:
April 09, 2019
10:00 AM PT

Opened:
April 09, 2019
10:00 AM PT
System unresponsive after restart if Sophos Endpoint Protection installed
Microsoft and Sophos have identified an issue on devices with Sophos Endpoint Protection installed and managed by either Sophos Central or Sophos Enterprise Console (SEC) that may cause the system to become unresponsive upon restart after installing KB4493446.

Microsoft has temporarily blocked devices from receiving this update if the Sophos Endpoint is installed until a solution is available.

Affected platforms: 
  • Client: Windows 8.1; Windows 7, Service Pack 1 
  • Server: Windows Server 2012 R2; Windows Server 2008 R2 SP1 
Guidance for Sophos Endpoint and Sophos Enterprise Console customers can be found in the Sophos support article.

Back to top
April 09, 2019
KB4493446
Mitigated
Last updated:
April 09, 2019
10:00 AM PT

Opened:
April 09, 2019
10:00 AM PT
System may be unresponsive after restart if ArcaBit antivirus software installed
Microsoft and ArcaBit have identified an issue on devices with ArcaBit antivirus software installed that may cause the system to become unresponsive upon restart after installing KB4493446.

Microsoft has temporarily blocked devices from receiving this update if ArcaBit antivirus software is installed.

Affected platforms: 
  • Client: Windows 8.1; Windows 7, Service Pack 1 
  • Server: Windows Server 2012 R2; Windows Server 2008 R2 SP1 
ArcaBit has released an update to address this issue. For more information, see the Arcabit support article.

Back to top
April 09, 2019
KB4493446
Mitigated
Last updated:
April 09, 2019
10:00 AM PT

Opened:
April 09, 2019
10:00 AM PT
Certain operations performed on on a Cluster Shared Volume may fail
Certain operations, such as rename, that you perform on files or folders that are on a Cluster Shared Volume (CSV) may fail with the error, “STATUS_BAD_IMPERSONATION_LEVEL (0xC00000A5)”. This occurs when you perform the operation on a CSV owner node from a process that doesn’t have administrator privilege.

Affected platforms: 
  • Client: Windows 8.1 
  • Server: Windows Server 2012 R2 
Workaround: Do one of the following:

  • Perform the operation from a process that has administrator privilege.
  • Perform the operation from a node that doesn’t have CSV ownership.
Next steps: Microsoft is working on a resolution and will provide an update in an upcoming release.

Back to top
April 09, 2019
KB4493446
Mitigated
Last updated:
April 09, 2019
10:00 AM PT

Opened:
April 09, 2019
10:00 AM PT
Devices may not respond at login or Welcome screen if running certain Avast software
Microsoft and Avast have identified an issue on devices running Avast for Business, Avast CloudCare, and AVG Business Edition antivirus software after you install KB4493446 and restart. Devices may become unresponsive at the login or Welcome screen. Additionally, you may be unable to log in or log in after an extended period of time.

Affected platforms: 
  • Client: Windows 8.1; Windows 7, Service Pack 1 
  • Server: Windows Server 2012 R2; Windows Server 2008 R2 SP1 

Resolution: Avast has released emergency updates to address this issue. For more information and AV update schedule, see the Avast support KB article.

Back to top
April 09, 2019
KB4493446
Resolved
Resolved:
April 09, 2019
10:00 AM PT

Opened:
April 09, 2019
10:00 AM PT
" @@ -98,9 +98,9 @@ sections: - type: markdown text: " - - +
DetailsOriginating updateStatusHistory
Issue using PXE to start a device from WDS
After installing KB4489881, there may be issues using the Preboot Execution Environment (PXE) to start a device from a Windows Deployment Services (WDS) server configured to use Variable Window Extension. This may cause the connection to the WDS server to terminate prematurely while downloading the image. This issue does not affect clients or devices that are not using Variable Window Extension.

Affected platforms: 
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10 Enterprise LTSC 2016; Windows 8.1 
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server 2016; Windows Server 2012 R2 

Workaround: To mitigate the issue, disable the Variable Window Extension on WDS server using one of the following options:
Option 1:
Open an Administrator Command prompt and type the following:
Wdsutil /Set-TransportServer /EnableTftpVariableWindowExtension:No
+      
Issue using PXE to start a device from WDS
After installing KB4489881, there may be issues using the Preboot Execution Environment (PXE) to start a device from a Windows Deployment Services (WDS) server configured to use Variable Window Extension. This may cause the connection to the WDS server to terminate prematurely while downloading the image. This issue does not affect clients or devices that are not using Variable Window Extension.

Affected platforms: 
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10 Enterprise LTSC 2016; Windows 8.1 
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server 2016; Windows Server 2012 R2 
Workaround: To mitigate the issue, disable the Variable Window Extension on WDS server using one of the following options:
Option 1:
Open an Administrator Command prompt and type the following:
Wdsutil /Set-TransportServer /EnableTftpVariableWindowExtension:No
 
Option 2:
Use the Windows Deployment Services UI to make the following adjustment:
  1. Open Windows Deployment Services from Windows Administrative Tools.
  2. Expand Servers and right-click a WDS server.
  3. Open its properties and clear the Enable Variable Window Extension box on the TFTP tab.
Option 3:
Set the following registry value to 0:
HKLM\\System\\CurrentControlSet\\Services\\WDSServer\\Providers\\WDSTFTP\\EnableVariableWindowExtension
Restart the WDSServer service after disabling the Variable Window Extension.

Next steps: Microsoft is working on a resolution and will provide an update in an upcoming release.

Back to top
March 12, 2019
KB4489881
Mitigated
Last updated:
April 09, 2019
10:00 AM PT

Opened:
March 12, 2019
10:00 AM PT
Custom URI schemes may not start corresponding application
After installing KB4489881, custom URI schemes for application protocol handlers may not start the corresponding application for local intranet and trusted sites security zones on Internet Explorer.

Affected platforms: 
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 8.1; Windows 7, Service Pack 1 
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2; Windows Server 2008 R2 SP1 

Resolution: This issue is resolved in KB4493446.

Back to top
March 12, 2019
KB4489881
Resolved
KB4493446
Resolved:
April 09, 2019
10:00 AM PT

Opened:
March 12, 2019
10:00 AM PT
Custom URI schemes may not start corresponding application
After installing KB4489881, custom URI schemes for application protocol handlers may not start the corresponding application for local intranet and trusted sites security zones on Internet Explorer.

Affected platforms: 
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 8.1; Windows 7, Service Pack 1 
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2; Windows Server 2008 R2 SP1 
Resolution: This issue is resolved in KB4493446.

Back to top
March 12, 2019
KB4489881
Resolved
KB4493446
Resolved:
April 09, 2019
10:00 AM PT

Opened:
March 12, 2019
10:00 AM PT
" @@ -109,7 +109,7 @@ sections: - type: markdown text: " - +
DetailsOriginating updateStatusHistory
Embedded objects may display incorrectly
Any compound document (OLE) server application that places embedded objects into the Windows Metafile (WMF) using the PatBlt API may display embedded objects incorrectly.

For example, if you paste a Microsoft Excel worksheet object into a Microsoft Word document, the cells may render with a different background color.

Affected platforms: 
  • Client: Windows 8.1 
  • Server: Windows Server 2012 R2 

Resolution: This issue is resolved in KB4493446.

Back to top
February 12, 2019
KB4487000
Resolved
KB4493446
Resolved:
April 09, 2019
10:00 AM PT

Opened:
February 12, 2019
10:00 AM PT
Embedded objects may display incorrectly
Any compound document (OLE) server application that places embedded objects into the Windows Metafile (WMF) using the PatBlt API may display embedded objects incorrectly.

For example, if you paste a Microsoft Excel worksheet object into a Microsoft Word document, the cells may render with a different background color.

Affected platforms: 
  • Client: Windows 8.1 
  • Server: Windows Server 2012 R2 
Resolution: This issue is resolved in KB4493446.

Back to top
February 12, 2019
KB4487000
Resolved
KB4493446
Resolved:
April 09, 2019
10:00 AM PT

Opened:
February 12, 2019
10:00 AM PT
" @@ -118,7 +118,7 @@ sections: - type: markdown text: " - +
DetailsOriginating updateStatusHistory
Internet Explorer 11 authentication issue with multiple concurrent logons
After installing KB4480963, Internet Explorer 11 and other applications that use WININET.DLL may have authentication issues. This occurs when two or more people use the same user account for multiple, concurrent login sessions on the same Windows Server machine, including Remote Desktop Protocol (RDP) and Terminal Server logons. Symptoms reported by customers include, but may not be limited to:
  • Cache size and location show zero or empty.
  • Keyboard shortcuts may not work properly.
  • Webpages may intermittently fail to load or render correctly.
  • Issues with credential prompts.
  • Issues when downloading files.

Affected platforms: 
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10 Enterprise LTSC 2016; Windows 8.1; Windows 7, Service Pack 1 
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server 2016; Windows Server 2012 R2; Windows Server 2008 R2 SP1 

Resolution: This issue is resolved in KB4493446.

Back to top
January 08, 2019
KB4480963
Resolved
KB4493446
Resolved:
April 09, 2019
10:00 AM PT

Opened:
January 08, 2019
10:00 AM PT
Internet Explorer 11 authentication issue with multiple concurrent logons
After installing KB4480963, Internet Explorer 11 and other applications that use WININET.DLL may have authentication issues. This occurs when two or more people use the same user account for multiple, concurrent login sessions on the same Windows Server machine, including Remote Desktop Protocol (RDP) and Terminal Server logons. Symptoms reported by customers include, but may not be limited to:
  • Cache size and location show zero or empty.
  • Keyboard shortcuts may not work properly.
  • Webpages may intermittently fail to load or render correctly.
  • Issues with credential prompts.
  • Issues when downloading files.
Affected platforms: 
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10 Enterprise LTSC 2016; Windows 8.1; Windows 7, Service Pack 1 
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server 2016; Windows Server 2012 R2; Windows Server 2008 R2 SP1 
Resolution: This issue is resolved in KB4493446.

Back to top
January 08, 2019
KB4480963
Resolved
KB4493446
Resolved:
April 09, 2019
10:00 AM PT

Opened:
January 08, 2019
10:00 AM PT
MSXML6 may cause applications to stop responding.
After installing KB4480963, MSXML6 causes applications to stop responding if an exception was thrown during node operations, such as appendChild(), insertBefore(), and moveNode().

The Group Policy editor may stop responding when editing a Group Policy Object (GPO) that contains Group Policy Preferences (GPP) for Internet Explorer 10 settings.

Resolution: This issue is resolved in KB4493446.

Back to top
January 08, 2019
KB4480963
Resolved
KB4493446
Resolved:
April 09, 2019
10:00 AM PT

Opened:
January 08, 2019
10:00 AM PT
" diff --git a/windows/release-information/status-windows-server-2008-sp2.yml b/windows/release-information/status-windows-server-2008-sp2.yml index 8e8ad0c510..d7186f2c35 100644 --- a/windows/release-information/status-windows-server-2008-sp2.yml +++ b/windows/release-information/status-windows-server-2008-sp2.yml @@ -86,16 +86,16 @@ sections: - type: markdown text: " - + - - - - - - - - - + + + + + + + + +
DetailsOriginating updateStatusHistory
System may be unresponsive after restart if Avira antivirus software installed
Microsoft and Avira have identified an issue on devices with Avira antivirus software installed that may cause the system to become unresponsive upon restart after installing KB4493471.

Microsoft has temporarily blocked devices from receiving this update if Avira antivirus software is installed.

Affected platforms: 
  • Client: Windows 8.1; Windows 7, Service Pack 1 
  • Server: Windows Server 2012 R2; Windows Server 2012; Windows Server 2008 R2 SP1; Windows Server 2008 SP2

Next steps: We are presently investigating this issue with Avira and will provide an update when available.

Back to top
April 09, 2019
KB4493471
Investigating
Last updated:
April 25, 2019
03:26 PM PT

Opened:
April 25, 2019
03:26 PM PT
System may be unresponsive after restart if Avira antivirus software installed
Microsoft and Avira have identified an issue on devices with Avira antivirus software installed that may cause the system to become unresponsive upon restart after installing KB4493471.

Microsoft has temporarily blocked devices from receiving this update if Avira antivirus software is installed.

Affected platforms: 
  • Client: Windows 8.1; Windows 7, Service Pack 1 
  • Server: Windows Server 2012 R2; Windows Server 2012; Windows Server 2008 R2 SP1; Windows Server 2008 SP2
Next steps: We are presently investigating this issue with Avira and will provide an update when available.

Back to top
April 09, 2019
KB4493471
Investigating
Last updated:
April 25, 2019
03:26 PM PT

Opened:
April 25, 2019
03:26 PM PT
System unresponsive after restart if Sophos Endpoint Protection installed
Microsoft and Sophos have identified an issue on devices with Sophos Endpoint Protection installed and managed by either Sophos Central or Sophos Enterprise Console (SEC) that may cause the system to become unresponsive upon restart after installing KB4493471.

Microsoft has temporarily blocked devices from receiving this update if the Sophos Endpoint is installed until a solution is available.

Guidance for Sophos Endpoint and Sophos Enterprise Console customers can be found in the Sophos support article.

Affected platforms: 
  • Client: Windows 8.1; Windows 7, Service Pack 1 
  • Server: Windows Server 2012 R2; Windows Server 2012; Windows Server 2008 R2 SP1; Windows Server 2008 SP2

Back to top
April 09, 2019
KB4493471
Mitigated
Last updated:
April 25, 2019
03:26 PM PT

Opened:
April 25, 2019
03:26 PM PT
Authentication may fail for services after the Kerberos ticket expires
After installing KB4489880, some customers report that authentication fails for services that require unconstrained delegation after the Kerberos ticket expires (the default is 10 hours). For example, the SQL server service fails.

Affected platforms: 
  • Client: Windows 7, Service Pack 1 
  • Server: Windows Server 2008 R2 SP1; Windows Server 2008 SP2

Workaround: To mitigate this issue, use one of the following options:

  • Option 1: Purge the Kerberos tickets on the application server. After the Kerberos ticket expires, the issue will occur again, and you must purge the tickets again.
  • Option 2: If purging does not mitigate the issue, restart the application; for example, restart the Internet Information Services (IIS) app pool associated with the SQL server.
  • Option 3: Use constrained delegation.

Next steps: Microsoft is working on a resolution and will provide an update in an upcoming release.

Back to top
March 12, 2019
KB4489880
Mitigated
Last updated:
April 25, 2019
03:24 PM PT

Opened:
April 25, 2019
03:24 PM PT
Unable to use Seek bar in Windows Media Player
After installing KB4463097, users may not be able to use the Seek Bar in Windows Media Player when playing specific files. This issue does not affect normal playback.

Affected platforms: 
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 8.1; Windows 7, Service Pack 1
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2; Windows Server 2012; Windows Server 2008 R2 SP1; Windows Server 2008 SP2

Resolution: This issue is resolved in KB4471325.

Back to top
October 09, 2018
KB4463097
Resolved
KB4471325
Resolved:
December 11, 2018
10:00 AM PT

Opened:
April 25, 2019
03:28 PM PT
Applications using Microsoft Jet database fail to open
Applications that use a Microsoft Jet database with the Microsoft Access 97 file format may fail to open if the database has column names greater than 32 characters. The database will fail to open with the error, “Unrecognized Database Format”.

Affected platforms: 
  • Client: Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 8.1; Windows 7, Service Pack 1 
  • Server: Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2; Windows Server 2012; Windows Server 2008 R2 SP1; Windows Server 2008 SP2

Resolution: This issue is resolved in KB4487023.

Back to top
January 08, 2019
KB4480968
Resolved
KB4487023
Resolved:
February 12, 2019
10:00 AM PT

Opened:
April 25, 2019
03:32 PM PT
Virtual machines fail to restore
After installing KB4480968, virtual machines (VM) may fail to restore successfully if the VM has been saved and restored once before. The error message is, “Failed to restore the virtual machine state: Cannot restore this virtual machine because the saved state data cannot be read. Delete the saved state data and then try to start the virtual machine. (0xC0370027).”

This affects AMD Bulldozer Family 15h, AMD Jaguar Family 16h, and AMD Puma Family 16h (second generation) microarchitectures.

Affected platforms: 
  • Client: Windows 7, Service Pack 1 
  • Server: Windows Server 2012; Windows Server 2008 R2 SP1; Windows Server 2008 SP2

Resolution: This issue is resolved in KB4490514.

Back to top
January 08, 2019
KB4480968
Resolved
KB4490514
Resolved:
February 19, 2019
02:00 PM PT

Opened:
April 25, 2019
03:26 PM PT
Embedded objects may display incorrectly
Any compound document (OLE) server application that places embedded objects into the Windows Metafile (WMF) using the PatBlt API may display embedded objects incorrectly.

For example, if you paste a Microsoft Excel worksheet object into a Microsoft Word document, the cells may render with a different background color.

Affected platforms: 
  • Client: Windows 8.1 
  • Server: Windows Server 2012 R2; Windows Server 2012; Windows Server 2008 SP2

Resolution: This issue is resolved in KB4493471.

Back to top

Resolved
KB4493471
Resolved:
April 09, 2019
10:00 AM PT

Opened:
April 25, 2019
03:26 PM PT
First character of the Japanese era name not recognized as an abbreviation
After installing KB4480974, the first character of the Japanese era name is not recognized as an abbreviation and may cause date parsing issues.

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 8.1; Windows 7, Service Pack 1
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2; Windows Server 2012; Windows Server 2008 R2 SP1; Windows Server 2008 SP2

Resolution: This issue is resolved in KB4489880.

Back to top
January 17, 2019
KB4480974
Resolved
KB4489880
Resolved:
March 12, 2019
10:00 AM PT

Opened:
April 25, 2019
03:32 PM PT
Applications using Microsoft Jet database and Access 95 file format stop working
Applications that use a Microsoft Jet database with the Microsoft Access 95 file format may randomly stop working.

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 7, Service Pack 1
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012; Windows Server 2008 R2 SP1; Windows Server 2008 SP2

Resolution: This issue is resolved in KB4487022.

Back to top
February 12, 2019
KB4487023
Resolved
KB4487022
Resolved:
February 19, 2019
02:00 PM PT

Opened:
April 25, 2019
03:26 PM PT
Local Administrators unable to remotely access shares
Local users who are part of the local Administrators group may not be able to remotely access shares on Windows Server 2008 R2 and Windows 7 machines after installing KB4480968. This does not affect domain accounts in the local Administrators group.

Affected platforms: 
  • Client: Windows 7, Service Pack 1 
  • Server: Windows Server 2008 R2 SP1; Windows Server 2008 SP2

Resolution: This issue is resolved in KB4487354.

Back to top
January 08, 2019
KB4480968
Resolved
KB4487354
Resolved:
January 11, 2019
02:00 PM PT

Opened:
April 25, 2019
03:26 PM PT
NETDOM.EXE fails to run
After installing KB4489880, NETDOM.EXE fails to run, and the on-screen error, “The command failed to complete successfully.” appears.

Affected platforms: 
  • Client: Windows 7, Service Pack 1 
  • Server: Windows Server 2008 R2 SP1; Windows Server 2008 SP2

Resolution: This issue is resolved in KB4493471.

Back to top
March 12, 2019
KB4489880
Resolved
KB4493471
Resolved:
April 09, 2019
10:00 AM PT

Opened:
April 25, 2019
03:25 PM PT
Authentication may fail for services after the Kerberos ticket expires
After installing KB4489880, some customers report that authentication fails for services that require unconstrained delegation after the Kerberos ticket expires (the default is 10 hours). For example, the SQL server service fails.

Affected platforms: 
  • Client: Windows 7, Service Pack 1 
  • Server: Windows Server 2008 R2 SP1; Windows Server 2008 SP2
Workaround: To mitigate this issue, use one of the following options:

  • Option 1: Purge the Kerberos tickets on the application server. After the Kerberos ticket expires, the issue will occur again, and you must purge the tickets again.
  • Option 2: If purging does not mitigate the issue, restart the application; for example, restart the Internet Information Services (IIS) app pool associated with the SQL server.
  • Option 3: Use constrained delegation.
Next steps: Microsoft is working on a resolution and will provide an update in an upcoming release.

Back to top
March 12, 2019
KB4489880
Mitigated
Last updated:
April 25, 2019
03:24 PM PT

Opened:
April 25, 2019
03:24 PM PT
Unable to use Seek bar in Windows Media Player
After installing KB4463097, users may not be able to use the Seek Bar in Windows Media Player when playing specific files. This issue does not affect normal playback.

Affected platforms: 
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 8.1; Windows 7, Service Pack 1
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2; Windows Server 2012; Windows Server 2008 R2 SP1; Windows Server 2008 SP2
Resolution: This issue is resolved in KB4471325.

Back to top
October 09, 2018
KB4463097
Resolved
KB4471325
Resolved:
December 11, 2018
10:00 AM PT

Opened:
April 25, 2019
03:28 PM PT
Applications using Microsoft Jet database fail to open
Applications that use a Microsoft Jet database with the Microsoft Access 97 file format may fail to open if the database has column names greater than 32 characters. The database will fail to open with the error, “Unrecognized Database Format”.

Affected platforms: 
  • Client: Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 8.1; Windows 7, Service Pack 1 
  • Server: Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2; Windows Server 2012; Windows Server 2008 R2 SP1; Windows Server 2008 SP2
Resolution: This issue is resolved in KB4487023.

Back to top
January 08, 2019
KB4480968
Resolved
KB4487023
Resolved:
February 12, 2019
10:00 AM PT

Opened:
April 25, 2019
03:32 PM PT
Virtual machines fail to restore
After installing KB4480968, virtual machines (VM) may fail to restore successfully if the VM has been saved and restored once before. The error message is, “Failed to restore the virtual machine state: Cannot restore this virtual machine because the saved state data cannot be read. Delete the saved state data and then try to start the virtual machine. (0xC0370027).”

This affects AMD Bulldozer Family 15h, AMD Jaguar Family 16h, and AMD Puma Family 16h (second generation) microarchitectures.

Affected platforms: 
  • Client: Windows 7, Service Pack 1 
  • Server: Windows Server 2012; Windows Server 2008 R2 SP1; Windows Server 2008 SP2
Resolution: This issue is resolved in KB4490514.

Back to top
January 08, 2019
KB4480968
Resolved
KB4490514
Resolved:
February 19, 2019
02:00 PM PT

Opened:
April 25, 2019
03:26 PM PT
Embedded objects may display incorrectly
Any compound document (OLE) server application that places embedded objects into the Windows Metafile (WMF) using the PatBlt API may display embedded objects incorrectly.

For example, if you paste a Microsoft Excel worksheet object into a Microsoft Word document, the cells may render with a different background color.

Affected platforms: 
  • Client: Windows 8.1 
  • Server: Windows Server 2012 R2; Windows Server 2012; Windows Server 2008 SP2
Resolution: This issue is resolved in KB4493471.

Back to top

Resolved
KB4493471
Resolved:
April 09, 2019
10:00 AM PT

Opened:
April 25, 2019
03:26 PM PT
First character of the Japanese era name not recognized as an abbreviation
After installing KB4480974, the first character of the Japanese era name is not recognized as an abbreviation and may cause date parsing issues.

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 8.1; Windows 7, Service Pack 1
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2; Windows Server 2012; Windows Server 2008 R2 SP1; Windows Server 2008 SP2
Resolution: This issue is resolved in KB4489880.

Back to top
January 17, 2019
KB4480974
Resolved
KB4489880
Resolved:
March 12, 2019
10:00 AM PT

Opened:
April 25, 2019
03:32 PM PT
Applications using Microsoft Jet database and Access 95 file format stop working
Applications that use a Microsoft Jet database with the Microsoft Access 95 file format may randomly stop working.

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 7, Service Pack 1
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012; Windows Server 2008 R2 SP1; Windows Server 2008 SP2
Resolution: This issue is resolved in KB4487022.

Back to top
February 12, 2019
KB4487023
Resolved
KB4487022
Resolved:
February 19, 2019
02:00 PM PT

Opened:
April 25, 2019
03:26 PM PT
Local Administrators unable to remotely access shares
Local users who are part of the local Administrators group may not be able to remotely access shares on Windows Server 2008 R2 and Windows 7 machines after installing KB4480968. This does not affect domain accounts in the local Administrators group.

Affected platforms: 
  • Client: Windows 7, Service Pack 1 
  • Server: Windows Server 2008 R2 SP1; Windows Server 2008 SP2
Resolution: This issue is resolved in KB4487354.

Back to top
January 08, 2019
KB4480968
Resolved
KB4487354
Resolved:
January 11, 2019
02:00 PM PT

Opened:
April 25, 2019
03:26 PM PT
NETDOM.EXE fails to run
After installing KB4489880, NETDOM.EXE fails to run, and the on-screen error, “The command failed to complete successfully.” appears.

Affected platforms: 
  • Client: Windows 7, Service Pack 1 
  • Server: Windows Server 2008 R2 SP1; Windows Server 2008 SP2
Resolution: This issue is resolved in KB4493471.

Back to top
March 12, 2019
KB4489880
Resolved
KB4493471
Resolved:
April 09, 2019
10:00 AM PT

Opened:
April 25, 2019
03:25 PM PT
" diff --git a/windows/release-information/status-windows-server-2012.yml b/windows/release-information/status-windows-server-2012.yml index 904e70e764..95d688ad8a 100644 --- a/windows/release-information/status-windows-server-2012.yml +++ b/windows/release-information/status-windows-server-2012.yml @@ -94,13 +94,13 @@ sections:
Issue using PXE to start a device from WDS
After installing KB4489891, there may be issues using the Preboot Execution Environment (PXE) to start a device from a Windows Deployment Services (WDS) server configured to use Variable Window Extension. This may cause the connection to the WDS server to terminate prematurely while downloading the image. This issue does not affect clients or devices that are not using Variable Window Extension.

Workaround: To mitigate the issue, disable the Variable Window Extension on WDS server using one of the following options:
Option 1:
Open an Administrator Command prompt and type the following:
Wdsutil /Set-TransportServer /EnableTftpVariableWindowExtension:No
 
Option 2:
Use the Windows Deployment Services UI to make the following adjustment:
  1. Open Windows Deployment Services from Windows Administrative Tools.
  2. Expand Servers and right-click a WDS server.
  3. Open its properties and clear the Enable Variable Window Extension box on the TFTP tab.
Option 3:
Set the following registry value to 0:
HKLM\\System\\CurrentControlSet\\Services\\WDSServer\\Providers\\WDSTFTP\\EnableVariableWindowExtension
Restart the WDSServer service after disabling the Variable Window Extension.

Next steps: Microsoft is working on a resolution and will provide an update in an upcoming release.

Back to topMarch 12, 2019
KB4489891Mitigated
Last updated:
April 25, 2019
03:40 PM PT

Opened:
April 25, 2019
03:40 PM PT
System unresponsive after restart if Sophos Endpoint Protection installed
Microsoft and Sophos have identified an issue on devices with Sophos Endpoint Protection installed and managed by either Sophos Central or Sophos Enterprise Console (SEC) that may cause the system to become unresponsive upon restart after installing KB4493451.

Microsoft has temporarily blocked devices from receiving this update if the Sophos Endpoint is installed until a solution is available.

Guidance for Sophos Endpoint and Sophos Enterprise Console customers can be found in the Sophos support article.

Back to topApril 09, 2019
KB4493451Mitigated
Last updated:
April 25, 2019
03:46 PM PT

Opened:
April 25, 2019
03:46 PM PT -
Certain operations performed on on a Cluster Shared Volume may fail
Certain operations, such as rename, that you perform on files or folders that are on a Cluster Shared Volume (CSV) may fail with the error, \"STATUS_BAD_IMPERSONATION_LEVEL (0xC00000A5)\". This occurs when you perform the operation on a CSV owner node from a process that doesn’t have administrator privilege.

Workaround: Do one of the following:

  • Perform the operation from a process that has administrator privilege.
  • Perform the operation from a node that doesn’t have CSV ownership.

Next steps: Microsoft is working on a resolution and will provide an update in an upcoming release.

Back to topJanuary 08, 2019
KB4480975Mitigated
Last updated:
April 25, 2019
03:52 PM PT

Opened:
April 25, 2019
03:52 PM PT +
Certain operations performed on on a Cluster Shared Volume may fail
Certain operations, such as rename, that you perform on files or folders that are on a Cluster Shared Volume (CSV) may fail with the error, \"STATUS_BAD_IMPERSONATION_LEVEL (0xC00000A5)\". This occurs when you perform the operation on a CSV owner node from a process that doesn’t have administrator privilege.

Workaround: Do one of the following:

  • Perform the operation from a process that has administrator privilege.
  • Perform the operation from a node that doesn’t have CSV ownership.
Next steps: Microsoft is working on a resolution and will provide an update in an upcoming release.

Back to topJanuary 08, 2019
KB4480975Mitigated
Last updated:
April 25, 2019
03:52 PM PT

Opened:
April 25, 2019
03:52 PM PT
Unable to use Seek bar in Windows Media Player
After installing KB4462929, users may not be able to use the Seek Bar in Windows Media Player when playing specific files. This issue does not affect normal playback.

Resolution: This issue is resolved in KB4471330.

Back to topOctober 09, 2018
KB4462929Resolved
KB4471330Resolved:
December 11, 2018
10:00 AM PT

Opened:
April 25, 2019
02:47 PM PT
Event Viewer may not show some event descriptions for network interface cards
After installing KB4457135, the Event Viewer may not show some event descriptions for network interface cards (NICs).

Resolution: This issue is resolved in KB4489891.

Back to topSeptember 11, 2018
KB4457135Resolved
KB4489891Resolved:
March 12, 2019
10:00 AM PT

Opened:
April 25, 2019
03:10 PM PT
Unable to access hotspots with third-party applications
After installing KB4480975, third-party applications may have difficulty authenticating hotspots.

Resolution: This issue is resolved in KB4480971.

Back to topJanuary 08, 2019
KB4480975Resolved
KB4480971Resolved:
January 15, 2019
10:00 AM PT

Opened:
April 25, 2019
03:14 PM PT
Applications using Microsoft Jet database fail to open
Applications that use a Microsoft Jet database with the Microsoft Access 97 file format may fail to open if the database has column names greater than 32 characters. The database will fail to open with the error, \"Unrecognized Database Format\".

Resolution: This issue is resolved in KB4487025.

Back to topJanuary 08, 2019
KB4480975Resolved
KB4487025Resolved:
February 12, 2019
10:00 AM PT

Opened:
April 25, 2019
03:19 PM PT
Virtual machines fail to restore
After installing KB4480975, virtual machines (VM) may fail to restore successfully if the VM has been saved and restored once before. The error message is, \"Failed to restore the virtual machine state: Cannot restore this virtual machine because the saved state data cannot be read. Delete the saved state data and then try to start the virtual machine. (0xC0370027).\"

This affects AMD Bulldozer Family 15h, AMD Jaguar Family 16h, and AMD Puma Family 16h (second generation) microarchitectures.

Resolution: This issue is resolved in KB4490516.

Back to topJanuary 08, 2019
KB4480975Resolved
KB4490516Resolved:
February 19, 2019
02:00 PM PT

Opened:
April 25, 2019
03:22 PM PT -
Internet Explorer 11 authentication issue with multiple concurrent logons
After installing KB4480975, Internet Explorer 11 and other applications that use WININET.DLL may have authentication issues. This occurs when two or more people use the same user account for multiple, concurrent login sessions on the same Windows Server machine, including Remote Desktop Protocol (RDP) and Terminal Server logons. Symptoms reported by customers include, but may not be limited to:
  • Cache size and location show zero or empty.
  • Keyboard shortcuts may not work properly.
  • Webpages may intermittently fail to load or render correctly.
  • Issues with credential prompts.
  • Issues when downloading files.

Resolution: This issue is resolved in KB4493451.

Back to topJanuary 08, 2019
KB4480975Resolved
KB4493451Resolved:
April 09, 2019
10:00 AM PT

Opened:
April 25, 2019
03:34 PM PT +
Internet Explorer 11 authentication issue with multiple concurrent logons
After installing KB4480975, Internet Explorer 11 and other applications that use WININET.DLL may have authentication issues. This occurs when two or more people use the same user account for multiple, concurrent login sessions on the same Windows Server machine, including Remote Desktop Protocol (RDP) and Terminal Server logons. Symptoms reported by customers include, but may not be limited to:
  • Cache size and location show zero or empty.
  • Keyboard shortcuts may not work properly.
  • Webpages may intermittently fail to load or render correctly.
  • Issues with credential prompts.
  • Issues when downloading files.
Resolution: This issue is resolved in KB4493451.

Back to topJanuary 08, 2019
KB4480975Resolved
KB4493451Resolved:
April 09, 2019
10:00 AM PT

Opened:
April 25, 2019
03:34 PM PT
MSXML6 may cause applications to stop responding
After installing KB4480975, MSXML6 causes applications to stop responding if an exception was thrown during node operations, such as appendChild(), insertBefore(), and moveNode().

The Group Policy editor may stop responding when editing a Group Policy Object (GPO) that contains Group Policy Preferences (GPP) for Internet Explorer 10 settings.

Resolution: This issue is resolved in KB4493451.

Back to topJanuary 08, 2019
KB4480975Resolved
KB4493451Resolved:
April 09, 2019
10:00 AM PT

Opened:
April 25, 2019
03:27 PM PT
Error 1309 when installing/uninstalling MSI or MSP files
After installing KB4487025, users may receive \"Error 1309\" while installing or uninstalling certain types of MSI and MSP files.

Resolution: This issue is resolved in KB4489891.

Back to topFebruary 12, 2019
KB4487025Resolved
KB4489891Resolved:
March 12, 2019
10:00 AM PT

Opened:
April 25, 2019
03:36 PM PT
Embedded objects may display incorrectly
Any compound document (OLE) server application that places embedded objects into the Windows Metafile (WMF) using the PatBlt API may display embedded objects incorrectly.

For example, if you paste a Microsoft Excel worksheet object into a Microsoft Word document, the cells may render with a different background color.

Resolution: This issue is resolved in KB4493451.

Back to topFebruary 12, 2019
KB4487025Resolved
KB4493451Resolved:
April 09, 2019
10:00 AM PT

Opened:
April 25, 2019
04:00 PM PT From 4e534972c11a14e238e7b022290435c41bb7961f Mon Sep 17 00:00:00 2001 From: MaratMussabekov <48041687+MaratMussabekov@users.noreply.github.com> Date: Fri, 26 Apr 2019 16:13:26 +0500 Subject: [PATCH 222/724] update hello-cert-trust-deploy-mfa.md --- .../hello-for-business/hello-cert-trust-deploy-mfa.md | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/windows/security/identity-protection/hello-for-business/hello-cert-trust-deploy-mfa.md b/windows/security/identity-protection/hello-for-business/hello-cert-trust-deploy-mfa.md index 561df3ca7b..afee1b6159 100644 --- a/windows/security/identity-protection/hello-for-business/hello-cert-trust-deploy-mfa.md +++ b/windows/security/identity-protection/hello-for-business/hello-cert-trust-deploy-mfa.md @@ -23,7 +23,7 @@ ms.date: 08/19/2018 - Certificate trust -On-premises deployments must use the On-premises Azure MFA Server using the AD FS adapter model Optionally, you can use a third-party MFA server that provides an AD FS Multifactor authentication adapter. +On-premises deployments must use on-premises MFA Server that provides an AD FS Multifactor authentication adapter. It could be Azure Multi-Factor Authentication Server or third-party MFA solution. >[!TIP] >Please make sure you've read [Validate and Deploy Multifactor Authentication Services (MFA)](hello-cert-trust-validate-deploy-mfa.md) before proceeding any further. From c80e0f4cd744d01ef566864800b0b6e771cc77e5 Mon Sep 17 00:00:00 2001 From: "Nisha Mittal (Wipro Ltd.)" Date: Fri, 26 Apr 2019 10:11:28 -0700 Subject: [PATCH 223/724] Added new announcement data --- .../resolved-issues-windows-10-1607.yml | 2 +- .../resolved-issues-windows-10-1803.yml | 10 +++++----- ...ssues-windows-10-1809-and-windows-server-2019.yml | 4 ++-- .../resolved-issues-windows-server-2008-sp2.yml | 4 ++-- .../release-information/status-windows-10-1803.yml | 2 +- ...tatus-windows-10-1809-and-windows-server-2019.yml | 2 +- ...status-windows-8.1-and-windows-server-2012-r2.yml | 4 ++-- .../status-windows-server-2008-sp2.yml | 4 ++-- .../status-windows-server-2012.yml | 4 ++-- .../release-information/windows-message-center.yml | 12 ++++++++++-- 10 files changed, 28 insertions(+), 20 deletions(-) diff --git a/windows/release-information/resolved-issues-windows-10-1607.yml b/windows/release-information/resolved-issues-windows-10-1607.yml index 6128e392d7..1bc6a41c0c 100644 --- a/windows/release-information/resolved-issues-windows-10-1607.yml +++ b/windows/release-information/resolved-issues-windows-10-1607.yml @@ -98,7 +98,7 @@ sections: text: " - +
DetailsOriginating updateStatusHistory
Instant search in Microsoft Outlook fails on Windows Server 2016
After installing KB4467684 on Windows Server 2016, instant search in Microsoft Outlook clients fail with the error, \"Outlook cannot perform the search\".

Affected platforms:
  • Client: Windows 10 Enterprise LTSC 2016
  • Server: Windows Server 2016
Resolution: This issue is resolved in KB4487026.

Back to top
OS Build 14393.2639

November 27, 2018
KB4467684
Resolved
KB4487026
Resolved:
February 12, 2019
10:00 AM PT

Opened:
November 27, 2018
10:00 AM PT
System becomes unresponsive when end-user-defined characters (EUDC) are used
When features related to end-user-defined characters (EUDC) are used, the entire system may become unresponsive. 

Affected platforms:
  • Client: Windows 10 Enterprise LTSC 2016
  • Server: Windows Server 2016
 
Resolution: This issue is resolved in KB4471321

Back to top
OS Build 14393.2639

November 27, 2018
KB4467684
Resolved
KB4471321
Resolved:
December 11, 2018
10:00 AM PT

Opened:
November 27, 2018
10:00 AM PT
System becomes unresponsive when end-user-defined characters (EUDC) are used
When features related to end-user-defined characters (EUDC) are used, the entire system may become unresponsive. 

Affected platforms:
  • Client: Windows 10 Enterprise LTSC 2016
  • Server: Windows Server 2016
Resolution: This issue is resolved in KB4471321

Back to top
OS Build 14393.2639

November 27, 2018
KB4467684
Resolved
KB4471321
Resolved:
December 11, 2018
10:00 AM PT

Opened:
November 27, 2018
10:00 AM PT
" diff --git a/windows/release-information/resolved-issues-windows-10-1803.yml b/windows/release-information/resolved-issues-windows-10-1803.yml index 68bc661462..d6e346cff5 100644 --- a/windows/release-information/resolved-issues-windows-10-1803.yml +++ b/windows/release-information/resolved-issues-windows-10-1803.yml @@ -65,7 +65,7 @@ sections: - type: markdown text: " - +
DetailsOriginating updateStatusHistory
End-user-defined characters (EUDC) may cause blue screen at startup
If you enable per font end-user-defined characters (EUDC), the system may stop working and a blue screen may appear at startup. This is not a common setting in non-Asian regions. 

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016
 
Resolution: This issue was resolved in KB4493464

Back to top
OS Build 17134.677

March 19, 2019
KB4489894
Resolved
KB4493464
Resolved:
April 09, 2019
10:00 AM PT

Opened:
March 19, 2019
10:00 AM PT
End-user-defined characters (EUDC) may cause blue screen at startup
If you enable per font end-user-defined characters (EUDC), the system may stop working and a blue screen may appear at startup. This is not a common setting in non-Asian regions. 

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016
Resolution: This issue was resolved in KB4493464

Back to top
OS Build 17134.677

March 19, 2019
KB4489894
Resolved
KB4493464
Resolved:
April 09, 2019
10:00 AM PT

Opened:
March 19, 2019
10:00 AM PT
Stop error when attempting to start SSH from WSL
After applying KB4489868, a stop error occurs when attempting to start the Secure Shell (SSH) client program from Windows Subsystem for Linux (WSL) with agent forwarding enabled using a command line switch (ssh -A) or a configuration setting.

Affected platforms:
  • Client: Windows 10, version 1803; Windows 10, version 1709
  • Server: Windows Server, version 1803; Windows Server, version 1709
Resolution: This issue was resolved in KB4493464.

Back to top
OS Build 17134.648

March 12, 2019
KB4489868
Resolved
KB4493464
Resolved:
April 09, 2019
10:00 AM PT

Opened:
March 12, 2019
10:00 AM PT
" @@ -108,7 +108,7 @@ sections: text: " - +
DetailsOriginating updateStatusHistory
Blue or black screen with \"System thread exception not handled\" error
After installing KB4467682, an optional update, some users may get a blue or black screen with the error code, \"System thread exception not handled.\"

Affected platforms:
  • Client: Windows 10, version 1803
  • Server: Windows Server, version 1803
Resolution: This issue is resolved in KB4471324

Back to top
OS Build 17134.441

November 27, 2018
KB4467682
Resolved
KB4471324
Resolved:
December 11, 2018
10:00 AM PT

Opened:
November 27, 2018
10:00 AM PT
Custom Start menu layouts display incorrectly
After installing KB4467682, custom Start menu layouts may display incorrectly. 

Affected platforms:
  • Client: Windows 10, version 1803
  • Server: Windows Server, version 1803
 
Resolution: This issue is resolved in KB4471324

Back to top
OS Build 17134.441

November 27, 2018
KB4467682
Resolved
KB4471324
Resolved:
December 11, 2018
10:00 AM PT

Opened:
November 27, 2018
10:00 AM PT
Custom Start menu layouts display incorrectly
After installing KB4467682, custom Start menu layouts may display incorrectly. 

Affected platforms:
  • Client: Windows 10, version 1803
  • Server: Windows Server, version 1803
Resolution: This issue is resolved in KB4471324

Back to top
OS Build 17134.441

November 27, 2018
KB4467682
Resolved
KB4471324
Resolved:
December 11, 2018
10:00 AM PT

Opened:
November 27, 2018
10:00 AM PT
" @@ -117,7 +117,7 @@ sections: - type: markdown text: " - +
DetailsOriginating updateStatusHistory
Developer Tools (F12) fail to start in Microsoft Edge
Developer Tools (F12) may fail to start in Microsoft Edge.

Affected platforms:
  • Client: Windows 10, version 1803
  • Server: Windows Server, version 1803
 
Resolution: This issue is resolved in KB4467702

Back to top
OS Build 17134.376

October 24, 2018
KB4462933
Resolved
KB4467702
Resolved:
November 13, 2018
10:00 AM PT

Opened:
October 24, 2018
02:00 PM PT
Developer Tools (F12) fail to start in Microsoft Edge
Developer Tools (F12) may fail to start in Microsoft Edge.

Affected platforms:
  • Client: Windows 10, version 1803
  • Server: Windows Server, version 1803
Resolution: This issue is resolved in KB4467702

Back to top
OS Build 17134.376

October 24, 2018
KB4462933
Resolved
KB4467702
Resolved:
November 13, 2018
10:00 AM PT

Opened:
October 24, 2018
02:00 PM PT
Unable to use Seek bar in Windows Media Player
After installing KB4462919, users may not be able to use the Seek bar in Windows Media Player when playing specific files. This issue does not affect normal playback.

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 8.1; Windows 7, Service Pack 1
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2; Windows Server 2008 R2 SP1
Resolution: This issue is resolved in KB4471324

Back to top
OS Build 17134.345

October 09, 2018
KB4462919
Resolved
KB4471324
Resolved:
December 11, 2018
10:00 AM PT

Opened:
October 09, 2018
10:00 AM PT
" @@ -127,7 +127,7 @@ sections: - type: markdown text: " - +
DetailsOriginating updateStatusHistory
Guest VMs running Unicast NLB fail to respond after restart
All guest virtual machines running Unicast NLB fail to respond to NLB requests after the virtual machines restart. 

Affected platforms:
  • Client: Windows 10, version 1803; Windows 10, version 1507
  • Server: Windows Server, version 1803
 
Resolution: This issue is resolved in KB4458469

Back to top
OS Build 17134.285

September 11, 2018
KB4457128
Resolved
KB4458469
Resolved:
September 20, 2018
10:00 AM PT

Opened:
September 11, 2018
10:00 AM PT
Guest VMs running Unicast NLB fail to respond after restart
All guest virtual machines running Unicast NLB fail to respond to NLB requests after the virtual machines restart. 

Affected platforms:
  • Client: Windows 10, version 1803; Windows 10, version 1507
  • Server: Windows Server, version 1803
Resolution: This issue is resolved in KB4458469

Back to top
OS Build 17134.285

September 11, 2018
KB4457128
Resolved
KB4458469
Resolved:
September 20, 2018
10:00 AM PT

Opened:
September 11, 2018
10:00 AM PT
SqlConnection instantiation exception on .NET 4.6 and later
After you install the August Preview of Quality Rollup or September 11, 2018 .NET Framework update, instantiation of SqlConnection can throw an exception.  

For more information about this issue, see the following article in the Microsoft Knowledge Base: 4470809, SqlConnection instantiation exception on .NET 4.6 and later after August-September 2018 .NET Framework updates.

Affected platforms:
  • Client: Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016
  • Server: Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016
Resolution: This issue is resolved in KB4480976

Back to top
OS Build 17134.285

September 11, 2018
KB4457128
Resolved
KB4480976
Resolved:
January 15, 2019
10:00 AM PT

Opened:
September 11, 2018
10:00 AM PT
Users cannot set Win32 program defaults
After installing KB4458469, some users cannot set Win32 program defaults for certain app and file type combinations using the Open with... command or Settings > Apps > Default apps
 
In some cases, Microsoft Notepad or other Win32 programs cannot be set as the default.

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803
Resolution: This issue is resolved in KB4467682

Back to top
OS Build 17134.320

September 26, 2018
KB4458469
Resolved
KB4467682
Resolved:
November 27, 2018
10:00 AM PT

Opened:
September 26, 2018
02:00 PM PT
@@ -138,6 +138,6 @@ sections: - type: markdown text: " - +
DetailsOriginating updateStatusHistory
Microsoft Intune takes a long time to deliver user profiles
After installing KB4457128, Windows no longer recognizes the Personal Information exchange (PFX) certificate that's used for authenticating to a Wi-Fi or VPN connection. As a result, Microsoft Intune takes a long time to deliver user profiles because it doesn't recognize that the required certificate is on the device. 

Affected platforms:
  • Client: Windows 10, version 1803
  • Server: Windows Server, version 1803
 
Resolution: This issue is resolved in KB4464218

Back to top
OS Build 17134.191

July 24, 2018
KB4340917
Resolved
KB4464218
Resolved:
September 17, 2018
10:00 AM PT

Opened:
July 24, 2018
10:00 AM PT
Microsoft Intune takes a long time to deliver user profiles
After installing KB4457128, Windows no longer recognizes the Personal Information exchange (PFX) certificate that's used for authenticating to a Wi-Fi or VPN connection. As a result, Microsoft Intune takes a long time to deliver user profiles because it doesn't recognize that the required certificate is on the device. 

Affected platforms:
  • Client: Windows 10, version 1803
  • Server: Windows Server, version 1803
Resolution: This issue is resolved in KB4464218

Back to top
OS Build 17134.191

July 24, 2018
KB4340917
Resolved
KB4464218
Resolved:
September 17, 2018
10:00 AM PT

Opened:
July 24, 2018
10:00 AM PT
" diff --git a/windows/release-information/resolved-issues-windows-10-1809-and-windows-server-2019.yml b/windows/release-information/resolved-issues-windows-10-1809-and-windows-server-2019.yml index bca4747983..e3085b3a52 100644 --- a/windows/release-information/resolved-issues-windows-10-1809-and-windows-server-2019.yml +++ b/windows/release-information/resolved-issues-windows-10-1809-and-windows-server-2019.yml @@ -99,7 +99,7 @@ sections: - type: markdown text: " - + @@ -121,7 +121,7 @@ sections: - type: markdown text: "
DetailsOriginating updateStatusHistory
Internet Explorer 11 authentication issue with multiple concurrent logons
After installing the February 12, 2019 update (KB4487044), Internet Explorer 11 and other applications that use WININET.DLL may have authentication issues. This occurs when two or more people use the same user account for multiple, concurrent login sessions on the same Windows Server machine, including Remote Desktop Protocol (RDP) and Terminal Server logons. Symptoms reported by customers include, but may not be limited to:  
  • Cache size and location show zero or empty. 
  • Keyboard shortcuts may not work properly. 
  • Webpages may intermittently fail to load or render correctly. 
  • Issues with credential prompts. 
  • Issues when downloading files. 
Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10 Enterprise LTSC 2016; Windows 8.1; Windows 7, Service Pack 1
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server 2016; Windows Server 2012 R2; Windows Server 2008 R2 SP1
 
Resolved: This issue was resolved in KB4493509

Back to top
OS Build 17763.253

January 08, 2019
KB4480116
Resolved
KB4493509
Resolved:
April 09, 2019
10:00 AM PT

Opened:
January 08, 2019
10:00 AM PT
Internet Explorer 11 authentication issue with multiple concurrent logons
After installing the February 12, 2019 update (KB4487044), Internet Explorer 11 and other applications that use WININET.DLL may have authentication issues. This occurs when two or more people use the same user account for multiple, concurrent login sessions on the same Windows Server machine, including Remote Desktop Protocol (RDP) and Terminal Server logons. Symptoms reported by customers include, but may not be limited to:  
  • Cache size and location show zero or empty. 
  • Keyboard shortcuts may not work properly. 
  • Webpages may intermittently fail to load or render correctly. 
  • Issues with credential prompts. 
  • Issues when downloading files. 
Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10 Enterprise LTSC 2016; Windows 8.1; Windows 7, Service Pack 1
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server 2016; Windows Server 2012 R2; Windows Server 2008 R2 SP1
Resolved: This issue was resolved in KB4493509

Back to top
OS Build 17763.253

January 08, 2019
KB4480116
Resolved
KB4493509
Resolved:
April 09, 2019
10:00 AM PT

Opened:
January 08, 2019
10:00 AM PT
Global DNS outage affects Windows Update customers
Windows Update customers were affected by a network infrastructure event on January 29, 2019 (21:00 UTC), caused by an external DNS service provider's global outage. A software update to the external provider's DNS servers resulted in the distribution of corrupted DNS records that affected connectivity to the Windows Update service. The DNS records were restored by January 30, 2019 (00:10 UTC), and the majority of local Internet Service Providers (ISP) have refreshed their DNS servers and customer services have been restored. 
 
Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019
  • Server: Windows Server, version 1809; Windows Server 2019
While this was not an issue with Microsoft's services, we take any service disruption for our customers seriously. We will work with partners to better understand this so we can provide higher quality service in the future even across diverse global network providers. 
 
If you are still unable to connect to Windows Update services due to this problem, please contact your local ISP or network administrator. You can also refer to our new KB4493784 for more information to determine if your network is affected, and to provide your local ISP or network administrator with additional information to assist you. 

Back to top
N/A

Resolved
Resolved:
March 08, 2019
11:15 AM PT

Opened:
January 29, 2019
02:00 PM PT
MSXML6 may cause applications to stop responding
After installing KB4480116, MSXML6 causes applications to stop responding if an exception was thrown during node operations, such as appendChild(), insertBefore(), and moveNode().
 
The Group Policy editor may stop responding when editing a Group Policy Object (GPO) that contains Group Policy Preferences (GPP) for Internet Explorer 10 settings. 

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 8.1
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2
Resolved: This issue was resolved in KB4493509

Back to top
OS Build 17763.253

January 08, 2019
KB4480116
Resolved
KB4493509
Resolved:
April 09, 2019
10:00 AM PT

Opened:
January 08, 2019
10:00 AM PT
Webpages become unresponsive in Microsoft Edge
After installing KB4480116, some Microsoft Edge users report that they:
  • Cannot load webpages using a local IP address. 
  • Cannot load webpages on the Internet using a VPN connection.
Browsing fails or the webpage may become unresponsive.

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709
Resolution: This issue is resolved in KB4487044

Back to top
OS Build 17763.253

January 08, 2019
KB4480116
Resolved
KB4487044
Resolved:
February 12, 2019
10:00 AM PT

Opened:
January 08, 2019
10:00 AM PT
- + diff --git a/windows/release-information/resolved-issues-windows-server-2008-sp2.yml b/windows/release-information/resolved-issues-windows-server-2008-sp2.yml index 2c0b474c10..6a1922fb60 100644 --- a/windows/release-information/resolved-issues-windows-server-2008-sp2.yml +++ b/windows/release-information/resolved-issues-windows-server-2008-sp2.yml @@ -35,7 +35,7 @@ sections: - + @@ -58,7 +58,7 @@ sections: - + diff --git a/windows/release-information/status-windows-10-1803.yml b/windows/release-information/status-windows-10-1803.yml index 8e5a0f7a8d..188fdc6b47 100644 --- a/windows/release-information/status-windows-10-1803.yml +++ b/windows/release-information/status-windows-10-1803.yml @@ -83,7 +83,7 @@ sections: - +
DetailsOriginating updateStatusHistory
Audio stops working after installing Intel audio driver
Upgrade block: Intel unintentionally released version 9.21.00.3755 of the Intel Smart Sound Technology (ISST) Driver through Windows Update and inadvertently offered it to a range of devices running Window 10, version 1709, 1803, and 1809. If a device contained a compatible audio driver, the new driver overrode it and caused audio to stop working.

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019
  • Server: Windows Server, version 1809; Windows Server 2019
 
Resolution: This issue was resolved in KB4468550 and the upgrade block removed. 

Back to top
OS Build 17763.134

November 13, 2018
KB4467708
Resolved
KB4468550
Resolved:
December 07, 2018
10:00 AM PT

Opened:
November 13, 2018
10:00 AM PT
Audio stops working after installing Intel audio driver
Upgrade block: Intel unintentionally released version 9.21.00.3755 of the Intel Smart Sound Technology (ISST) Driver through Windows Update and inadvertently offered it to a range of devices running Window 10, version 1709, 1803, and 1809. If a device contained a compatible audio driver, the new driver overrode it and caused audio to stop working.

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019
  • Server: Windows Server, version 1809; Windows Server 2019
Resolution: This issue was resolved in KB4468550 and the upgrade block removed. 

Back to top
OS Build 17763.134

November 13, 2018
KB4467708
Resolved
KB4468550
Resolved:
December 07, 2018
10:00 AM PT

Opened:
November 13, 2018
10:00 AM PT
Mapped drives fail to reconnect after login
Upgrade block: Network drives may fail to reconnect after booting and logging on to a Windows device. Symptoms include:  
  • In Windows Explorer, a red X appears on the mapped network drives. 
  • Mapped network drives show as Unavailable when you run the net use command from a command prompt. 
  • In the notification area, a notification displays the following message, \"Could not reconnect all network drives.\"
Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019
  • Server: Windows Server, version 1809; Windows Server 2019
Resolution: This issue was resolved in KB4469342 and the upgrade block removed. 

Back to top
OS Build 17763.134

November 13, 2018
KB4467708
Resolved
KB4469342
Resolved:
December 05, 2018
02:00 PM PT

Opened:
November 13, 2018
10:00 AM PT
Shared albums may not sync with iCloud for Windows
Upgrade block: Users who attempt to install iCloud for Windows (version 7.7.0.27) will see a message displayed that this version iCloud for Windows isn't supported and the install will fail.

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019
  • Server: Windows Server, version 1809; Windows Server 2019
To ensure a seamless experience, Microsoft is blocking devices with iCloud for Windows (version 7.7.0.27) software installed from being offered Window 10, version 1809 until this issue has been resolved. 

We recommend that you do not attempt to manually update using the Update now button or the Media Creation Tool from the Microsoft software download website until this issue is resolved. 
 
Resolution: Apple has released an updated version of iCloud for Windows (version 7.8.1) that resolves compatibility issues encountered when updating or synching Shared Albums after updating to Windows 10, version 1809. We recommend that you update your iCloud for Windows to version 7.8.1 when prompted before attempting to upgrade to Windows 10, version 1809. You can also manually download the latest version of iCloud for Windows by visiting https://support.apple.com/en-us/HT204283.

Back to top
OS Build 17763.134

November 13, 2018
KB4467708
Resolved
KB4482887
Resolved:
March 01, 2019
10:00 AM PT

Opened:
November 13, 2018
10:00 AM PT
Intel Audio Display (intcdaud.sys) notification during Windows 10 Setup
Upgrade block: Microsoft and Intel have identified a compatibility issue with a range of Intel Display Audio device drivers (intcdaud.sys, versions 10.25.0.3 - 10.25.0.8) that may result in excessive processor demand and reduced battery life. As a result, the update process to the Windows 10 October 2018 Update (Windows 10, version 1809) will fail and affected devices will automatically revert to the previous working configuration. 

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019
  • Server: Windows Server, version 1809; Windows Server 2019
If you see a \"What needs your attention\" notification during installation of the October 2018 Update, you have one of these affected drivers on your system. On the notification, click Back to remain on your current version of Windows 10. 
 
To ensure a seamless experience, we are blocking devices from being offered the October 2018 Update until updated Intel device drivers are installed on your current operating system. We recommend that you do not attempt to manually update to Windows 10, version 1809, using the Update Now button or the Media Creation Tool from the Microsoft Software Download Center until newer Intel device drivers are available with the update. You can either wait for newer drivers to be installed automatically through Windows Update or check with your computer manufacturer for the latest device driver software availability and installation procedures. For more information about this issue, see Intel's customer support guidance.
 
Resolution: This issue was resolved in KB4482887 and the upgrade block removed. 

Back to top
OS Build 17763.134

November 13, 2018
KB4467708
Resolved
KB4482887
Resolved:
March 01, 2019
10:00 AM PT

Opened:
November 13, 2018
10:00 AM PT
Unable to use Seek bar in Windows Media Player
Users may not be able to use the Seek bar in Windows Media Player when playing specific files.

See details >
October 09, 2018
KB4463097
Resolved
KB4471325
April 25, 2019
03:28 PM PT
Applications using Microsoft Jet database fail to open
Applications that use a Microsoft Jet database with the Microsoft Access 97 file format may fail to open if column names are greater than 32 characters.

See details >
January 08, 2019
KB4480968
Resolved
KB4487023
April 25, 2019
03:32 PM PT
Virtual machines fail to restore
Virtual machines (VMs) may fail to restore successfully if the VM has been saved and restored once before.

See details >
January 08, 2019
KB4480968
Resolved
KB4490514
April 25, 2019
03:26 PM PT
Embedded objects may display incorrectly
Any compound document (OLE) server application that places embedded objects into the Windows Metafile (WMF) using the PatBlt API may display embedded objects incorrectly.

See details >

Resolved
KB4493471
April 25, 2019
03:26 PM PT
Embedded objects may display incorrectly
Any compound document (OLE) server application that places embedded objects into the Windows Metafile (WMF) using the PatBlt API may display embedded objects incorrectly.

See details >
February 12, 2019
KB4487023
Resolved
KB4493471
April 25, 2019
03:26 PM PT
First character of the Japanese era name not recognized as an abbreviation
The first character of the Japanese era name is not recognized as an abbreviation and may cause date parsing issues.

See details >
January 17, 2019
KB4480974
Resolved
KB4489880
April 25, 2019
03:32 PM PT
Applications using Microsoft Jet database and Access 95 file format stop working
Applications that use a Microsoft Jet database with the Microsoft Access 95 file format may randomly stop working.

See details >
February 12, 2019
KB4487023
Resolved
KB4487022
April 25, 2019
03:26 PM PT
Local Administrators unable to remotely access shares
Local users who are part of the local Administrators group may not be able to remotely access shares on Windows Server 2008 R2 and Windows 7 machines.

See details >
January 08, 2019
KB4480968
Resolved
KB4487354
April 25, 2019
03:26 PM PT
Unable to use Seek bar in Windows Media Player
After installing KB4463097, users may not be able to use the Seek Bar in Windows Media Player when playing specific files. This issue does not affect normal playback.

Affected platforms: 
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 8.1; Windows 7, Service Pack 1
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2; Windows Server 2012; Windows Server 2008 R2 SP1; Windows Server 2008 SP2
Resolution: This issue is resolved in KB4471325.

Back to top
October 09, 2018
KB4463097
Resolved
KB4471325
Resolved:
December 11, 2018
10:00 AM PT

Opened:
April 25, 2019
03:28 PM PT
Applications using Microsoft Jet database fail to open
Applications that use a Microsoft Jet database with the Microsoft Access 97 file format may fail to open if the database has column names greater than 32 characters. The database will fail to open with the error, “Unrecognized Database Format”.

Affected platforms: 
  • Client: Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 8.1; Windows 7, Service Pack 1 
  • Server: Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2; Windows Server 2012; Windows Server 2008 R2 SP1; Windows Server 2008 SP2
Resolution: This issue is resolved in KB4487023.

Back to top
January 08, 2019
KB4480968
Resolved
KB4487023
Resolved:
February 12, 2019
10:00 AM PT

Opened:
April 25, 2019
03:32 PM PT
Virtual machines fail to restore
After installing KB4480968, virtual machines (VM) may fail to restore successfully if the VM has been saved and restored once before. The error message is, “Failed to restore the virtual machine state: Cannot restore this virtual machine because the saved state data cannot be read. Delete the saved state data and then try to start the virtual machine. (0xC0370027).”

This affects AMD Bulldozer Family 15h, AMD Jaguar Family 16h, and AMD Puma Family 16h (second generation) microarchitectures.

Affected platforms: 
  • Client: Windows 7, Service Pack 1 
  • Server: Windows Server 2012; Windows Server 2008 R2 SP1; Windows Server 2008 SP2
Resolution: This issue is resolved in KB4490514.

Back to top
January 08, 2019
KB4480968
Resolved
KB4490514
Resolved:
February 19, 2019
02:00 PM PT

Opened:
April 25, 2019
03:26 PM PT
Embedded objects may display incorrectly
Any compound document (OLE) server application that places embedded objects into the Windows Metafile (WMF) using the PatBlt API may display embedded objects incorrectly.

For example, if you paste a Microsoft Excel worksheet object into a Microsoft Word document, the cells may render with a different background color.

Affected platforms: 
  • Client: Windows 8.1 
  • Server: Windows Server 2012 R2; Windows Server 2012; Windows Server 2008 SP2
Resolution: This issue is resolved in KB4493471.

Back to top

Resolved
KB4493471
Resolved:
April 09, 2019
10:00 AM PT

Opened:
April 25, 2019
03:26 PM PT
Embedded objects may display incorrectly
Any compound document (OLE) server application that places embedded objects into the Windows Metafile (WMF) using the PatBlt API may display embedded objects incorrectly.

For example, if you paste a Microsoft Excel worksheet object into a Microsoft Word document, the cells may render with a different background color.

Affected platforms: 
  • Client: Windows 8.1 
  • Server: Windows Server 2012 R2; Windows Server 2012; Windows Server 2008 SP2
Resolution: This issue is resolved in KB4493471.

Back to top
February 12, 2019
KB4487023
Resolved
KB4493471
Resolved:
April 09, 2019
10:00 AM PT

Opened:
April 25, 2019
03:26 PM PT
First character of the Japanese era name not recognized as an abbreviation
After installing KB4480974, the first character of the Japanese era name is not recognized as an abbreviation and may cause date parsing issues.

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 8.1; Windows 7, Service Pack 1
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2; Windows Server 2012; Windows Server 2008 R2 SP1; Windows Server 2008 SP2
Resolution: This issue is resolved in KB4489880.

Back to top
January 17, 2019
KB4480974
Resolved
KB4489880
Resolved:
March 12, 2019
10:00 AM PT

Opened:
April 25, 2019
03:32 PM PT
Applications using Microsoft Jet database and Access 95 file format stop working
Applications that use a Microsoft Jet database with the Microsoft Access 95 file format may randomly stop working.

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 7, Service Pack 1
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012; Windows Server 2008 R2 SP1; Windows Server 2008 SP2
Resolution: This issue is resolved in KB4487022.

Back to top
February 12, 2019
KB4487023
Resolved
KB4487022
Resolved:
February 19, 2019
02:00 PM PT

Opened:
April 25, 2019
03:26 PM PT
Local Administrators unable to remotely access shares
Local users who are part of the local Administrators group may not be able to remotely access shares on Windows Server 2008 R2 and Windows 7 machines after installing KB4480968. This does not affect domain accounts in the local Administrators group.

Affected platforms: 
  • Client: Windows 7, Service Pack 1 
  • Server: Windows Server 2008 R2 SP1; Windows Server 2008 SP2
Resolution: This issue is resolved in KB4487354.

Back to top
January 08, 2019
KB4480968
Resolved
KB4487354
Resolved:
January 11, 2019
02:00 PM PT

Opened:
April 25, 2019
03:26 PM PT
Custom URI schemes may not start corresponding application
After installing KB4489868, custom URI schemes for application protocol handlers may not start the corresponding application for local intranet and trusted sites security zones on Internet Explorer. 

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 8.1; Windows 7, Service Pack 1 
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2; Windows Server 2008 R2 SP1
Workaround: Right-click the URL link to open it in a new window or tab, or enable Protected Mode in Internet Explorer for local intranet and trusted sites
  1. Go to Tools > Internet options > Security 
  2. Within Select a zone to view or change security settings, select Local intranet and then select Enable Protected Mode.
  3. Select Trusted sites and then select Enable Protected Mode
  4. Select OK
 You must restart the browser after making these changes. 
 
Next steps: Microsoft is working on a resolution and will provide an update in an upcoming release. 

Back to top
OS Build 17134.648

March 12, 2019
KB4489868
Mitigated
Last updated:
March 19, 2019
10:00 AM PT

Opened:
March 12, 2019
10:00 AM PT
Issue using PXE to start a device from WDS
After installing KB4489868, there may be issues using the Preboot Execution Environment (PXE) to start a device from a Windows Deployment Services (WDS) server configured to use Variable Window Extension. This may cause the connection to the WDS server to terminate prematurely while downloading the image. This issue does not affect clients or devices that are not using Variable Window Extension. 

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10 Enterprise LTSC 2016; Windows 8.1
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server 2016; Windows Server 2012 R2
Workaround: To mitigate the issue, disable the Variable Window Extension on WDS server using one of the following options:
Option 1: 
Open an Administrator Command prompt and type the following:  
Wdsutil /Set-TransportServer /EnableTftpVariableWindowExtension:No
 
 Option 2: 
Use the Windows Deployment Services UI to make the following adjustment:  
  1. Open Windows Deployment Services from Windows Administrative Tools. 
  2. Expand Servers and right-click a WDS server. 
  3. Open its properties and clear the?Enable Variable Window Extension?box on the TFTP tab.  
Option 3: 
Set the following registry value to 0:  
HKLM\\System\\CurrentControlSet\\Services\\WDSServer\\Providers\\WDSTFTP\\EnableVariableWindowExtension  
Restart the WDSServer service after disabling the Variable Window Extension. 
 
Next steps: Microsoft is working on a resolution and will provide an update in an upcoming release. 

Back to top
OS Build 17134.648

March 12, 2019
KB4489868
Mitigated
Last updated:
March 19, 2019
10:00 AM PT

Opened:
March 12, 2019
10:00 AM PT
End-user-defined characters (EUDC) may cause blue screen at startup
If you enable per font end-user-defined characters (EUDC), the system may stop working and a blue screen may appear at startup. This is not a common setting in non-Asian regions. 

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016
 
Resolution: This issue was resolved in KB4493464

Back to top
OS Build 17134.677

March 19, 2019
KB4489894
Resolved
KB4493464
Resolved:
April 09, 2019
10:00 AM PT

Opened:
March 19, 2019
10:00 AM PT
End-user-defined characters (EUDC) may cause blue screen at startup
If you enable per font end-user-defined characters (EUDC), the system may stop working and a blue screen may appear at startup. This is not a common setting in non-Asian regions. 

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016
Resolution: This issue was resolved in KB4493464

Back to top
OS Build 17134.677

March 19, 2019
KB4489894
Resolved
KB4493464
Resolved:
April 09, 2019
10:00 AM PT

Opened:
March 19, 2019
10:00 AM PT
Stop error when attempting to start SSH from WSL
After applying KB4489868, a stop error occurs when attempting to start the Secure Shell (SSH) client program from Windows Subsystem for Linux (WSL) with agent forwarding enabled using a command line switch (ssh -A) or a configuration setting.

Affected platforms:
  • Client: Windows 10, version 1803; Windows 10, version 1709
  • Server: Windows Server, version 1803; Windows Server, version 1709
Resolution: This issue was resolved in KB4493464.

Back to top
OS Build 17134.648

March 12, 2019
KB4489868
Resolved
KB4493464
Resolved:
April 09, 2019
10:00 AM PT

Opened:
March 12, 2019
10:00 AM PT
" diff --git a/windows/release-information/status-windows-10-1809-and-windows-server-2019.yml b/windows/release-information/status-windows-10-1809-and-windows-server-2019.yml index b2b54fd9fb..2445fa356b 100644 --- a/windows/release-information/status-windows-10-1809-and-windows-server-2019.yml +++ b/windows/release-information/status-windows-10-1809-and-windows-server-2019.yml @@ -108,7 +108,7 @@ sections: - type: markdown text: " - +
DetailsOriginating updateStatusHistory
Internet Explorer 11 authentication issue with multiple concurrent logons
After installing the February 12, 2019 update (KB4487044), Internet Explorer 11 and other applications that use WININET.DLL may have authentication issues. This occurs when two or more people use the same user account for multiple, concurrent login sessions on the same Windows Server machine, including Remote Desktop Protocol (RDP) and Terminal Server logons. Symptoms reported by customers include, but may not be limited to:  
  • Cache size and location show zero or empty. 
  • Keyboard shortcuts may not work properly. 
  • Webpages may intermittently fail to load or render correctly. 
  • Issues with credential prompts. 
  • Issues when downloading files. 
Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10 Enterprise LTSC 2016; Windows 8.1; Windows 7, Service Pack 1
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server 2016; Windows Server 2012 R2; Windows Server 2008 R2 SP1
 
Resolved: This issue was resolved in KB4493509

Back to top
OS Build 17763.253

January 08, 2019
KB4480116
Resolved
KB4493509
Resolved:
April 09, 2019
10:00 AM PT

Opened:
January 08, 2019
10:00 AM PT
Internet Explorer 11 authentication issue with multiple concurrent logons
After installing the February 12, 2019 update (KB4487044), Internet Explorer 11 and other applications that use WININET.DLL may have authentication issues. This occurs when two or more people use the same user account for multiple, concurrent login sessions on the same Windows Server machine, including Remote Desktop Protocol (RDP) and Terminal Server logons. Symptoms reported by customers include, but may not be limited to:  
  • Cache size and location show zero or empty. 
  • Keyboard shortcuts may not work properly. 
  • Webpages may intermittently fail to load or render correctly. 
  • Issues with credential prompts. 
  • Issues when downloading files. 
Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10 Enterprise LTSC 2016; Windows 8.1; Windows 7, Service Pack 1
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server 2016; Windows Server 2012 R2; Windows Server 2008 R2 SP1
Resolved: This issue was resolved in KB4493509

Back to top
OS Build 17763.253

January 08, 2019
KB4480116
Resolved
KB4493509
Resolved:
April 09, 2019
10:00 AM PT

Opened:
January 08, 2019
10:00 AM PT
MSXML6 may cause applications to stop responding
After installing KB4480116, MSXML6 causes applications to stop responding if an exception was thrown during node operations, such as appendChild(), insertBefore(), and moveNode().
 
The Group Policy editor may stop responding when editing a Group Policy Object (GPO) that contains Group Policy Preferences (GPP) for Internet Explorer 10 settings. 

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 8.1
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2
Resolved: This issue was resolved in KB4493509

Back to top
OS Build 17763.253

January 08, 2019
KB4480116
Resolved
KB4493509
Resolved:
April 09, 2019
10:00 AM PT

Opened:
January 08, 2019
10:00 AM PT
" diff --git a/windows/release-information/status-windows-8.1-and-windows-server-2012-r2.yml b/windows/release-information/status-windows-8.1-and-windows-server-2012-r2.yml index 92e95c5ed9..635a9eca17 100644 --- a/windows/release-information/status-windows-8.1-and-windows-server-2012-r2.yml +++ b/windows/release-information/status-windows-8.1-and-windows-server-2012-r2.yml @@ -64,7 +64,7 @@ sections:
Issue using PXE to start a device from WDS
There may be issues using the Preboot Execution Environment (PXE) to start a device from a Windows Deployment Services (WDS) server configured to use Variable Window Extension.

See details >March 12, 2019
KB4489881Mitigated
April 09, 2019
10:00 AM PT
System unresponsive after restart if Sophos Endpoint Protection installed
Devices with Sophos Endpoint Protection installed and managed by Sophos Central or Sophos Enterprise Console (SEC) may become unresponsive upon restart.

See details >April 09, 2019
KB4493446Mitigated
April 09, 2019
10:00 AM PT
System may be unresponsive after restart if ArcaBit antivirus software installed
Devices with ArcaBit antivirus software installed may become unresponsive upon restart.

See details >April 09, 2019
KB4493446Mitigated
April 09, 2019
10:00 AM PT -
Certain operations performed on on a Cluster Shared Volume may fail
Certain operations, such as rename, performed on files or folders on a Cluster Shared Volume (CSV) may fail with the error, “STATUS_BAD_IMPERSONATION_LEVEL (0xC00000A5)”.

See details >April 09, 2019
KB4493446Mitigated
April 09, 2019
10:00 AM PT +
Certain operations performed on a Cluster Shared Volume may fail
Certain operations, such as rename, performed on files or folders on a Cluster Shared Volume (CSV) may fail with the error, “STATUS_BAD_IMPERSONATION_LEVEL (0xC00000A5)”.

See details >April 09, 2019
KB4493446Mitigated
April 09, 2019
10:00 AM PT
Internet Explorer 11 authentication issue with multiple concurrent logons
Internet Explorer 11 users may encounter issues if two or more people use the same user account for multiple, concurrent login sessions on the same Windows Server machine.

See details >January 08, 2019
KB4480963Resolved
KB4493446April 09, 2019
10:00 AM PT
MSXML6 may cause applications to stop responding.
MSXML6 may cause applications to stop responding if an exception was thrown during node operations, such as appendChild(), insertBefore(), and moveNode().

See details >January 08, 2019
KB4480963Resolved
KB4493446April 09, 2019
10:00 AM PT
Custom URI schemes may not start corresponding application
Custom URI schemes for application protocol handlers may not start the corresponding application for local intranet and trusted sites in Internet Explorer.

See details >March 12, 2019
KB4489881Resolved
KB4493446April 09, 2019
10:00 AM PT @@ -88,7 +88,7 @@ sections:
System may be unresponsive after restart if Avira antivirus software installed
Microsoft and Avira have identified an issue on devices with Avira antivirus software installed that may cause the system to become unresponsive upon restart after installing KB4493446.

Microsoft has temporarily blocked devices from receiving this update if Avira antivirus software is installed.

Affected platforms: 
  • Client: Windows 8.1; Windows 7, Service Pack 1 
  • Server: Windows Server 2012 R2; Windows Server 2008 R2 SP1 
Next steps: We are presently investigating this issue with Avira and will provide an update when available.

Back to topApril 09, 2019
KB4493446Investigating
Last updated:
April 09, 2019
10:00 AM PT

Opened:
April 09, 2019
10:00 AM PT
System unresponsive after restart if Sophos Endpoint Protection installed
Microsoft and Sophos have identified an issue on devices with Sophos Endpoint Protection installed and managed by either Sophos Central or Sophos Enterprise Console (SEC) that may cause the system to become unresponsive upon restart after installing KB4493446.

Microsoft has temporarily blocked devices from receiving this update if the Sophos Endpoint is installed until a solution is available.

Affected platforms: 
  • Client: Windows 8.1; Windows 7, Service Pack 1 
  • Server: Windows Server 2012 R2; Windows Server 2008 R2 SP1 
Guidance for Sophos Endpoint and Sophos Enterprise Console customers can be found in the Sophos support article.

Back to topApril 09, 2019
KB4493446Mitigated
Last updated:
April 09, 2019
10:00 AM PT

Opened:
April 09, 2019
10:00 AM PT
System may be unresponsive after restart if ArcaBit antivirus software installed
Microsoft and ArcaBit have identified an issue on devices with ArcaBit antivirus software installed that may cause the system to become unresponsive upon restart after installing KB4493446.

Microsoft has temporarily blocked devices from receiving this update if ArcaBit antivirus software is installed.

Affected platforms: 
  • Client: Windows 8.1; Windows 7, Service Pack 1 
  • Server: Windows Server 2012 R2; Windows Server 2008 R2 SP1 
ArcaBit has released an update to address this issue. For more information, see the Arcabit support article.

Back to topApril 09, 2019
KB4493446Mitigated
Last updated:
April 09, 2019
10:00 AM PT

Opened:
April 09, 2019
10:00 AM PT -
Certain operations performed on on a Cluster Shared Volume may fail
Certain operations, such as rename, that you perform on files or folders that are on a Cluster Shared Volume (CSV) may fail with the error, “STATUS_BAD_IMPERSONATION_LEVEL (0xC00000A5)”. This occurs when you perform the operation on a CSV owner node from a process that doesn’t have administrator privilege.

Affected platforms: 
  • Client: Windows 8.1 
  • Server: Windows Server 2012 R2 
Workaround: Do one of the following:

  • Perform the operation from a process that has administrator privilege.
  • Perform the operation from a node that doesn’t have CSV ownership.
Next steps: Microsoft is working on a resolution and will provide an update in an upcoming release.

Back to topApril 09, 2019
KB4493446Mitigated
Last updated:
April 09, 2019
10:00 AM PT

Opened:
April 09, 2019
10:00 AM PT +
Certain operations performed on a Cluster Shared Volume may fail
Certain operations, such as rename, that you perform on files or folders that are on a Cluster Shared Volume (CSV) may fail with the error, “STATUS_BAD_IMPERSONATION_LEVEL (0xC00000A5)”. This occurs when you perform the operation on a CSV owner node from a process that doesn’t have administrator privilege.

Affected platforms: 
  • Client: Windows 8.1 
  • Server: Windows Server 2012 R2 
Workaround: Do one of the following:

  • Perform the operation from a process that has administrator privilege.
  • Perform the operation from a node that doesn’t have CSV ownership.
Next steps: Microsoft is working on a resolution and will provide an update in an upcoming release.

Back to topApril 09, 2019
KB4493446Mitigated
Last updated:
April 09, 2019
10:00 AM PT

Opened:
April 09, 2019
10:00 AM PT
Devices may not respond at login or Welcome screen if running certain Avast software
Microsoft and Avast have identified an issue on devices running Avast for Business, Avast CloudCare, and AVG Business Edition antivirus software after you install KB4493446 and restart. Devices may become unresponsive at the login or Welcome screen. Additionally, you may be unable to log in or log in after an extended period of time.

Affected platforms: 
  • Client: Windows 8.1; Windows 7, Service Pack 1 
  • Server: Windows Server 2012 R2; Windows Server 2008 R2 SP1 

Resolution: Avast has released emergency updates to address this issue. For more information and AV update schedule, see the Avast support KB article.

Back to topApril 09, 2019
KB4493446Resolved
Resolved:
April 09, 2019
10:00 AM PT

Opened:
April 09, 2019
10:00 AM PT " diff --git a/windows/release-information/status-windows-server-2008-sp2.yml b/windows/release-information/status-windows-server-2008-sp2.yml index d7186f2c35..9aa6c059f4 100644 --- a/windows/release-information/status-windows-server-2008-sp2.yml +++ b/windows/release-information/status-windows-server-2008-sp2.yml @@ -66,7 +66,7 @@ sections:
Unable to use Seek bar in Windows Media Player
Users may not be able to use the Seek bar in Windows Media Player when playing specific files.

See details >October 09, 2018
KB4463097Resolved
KB4471325April 25, 2019
03:28 PM PT
Applications using Microsoft Jet database fail to open
Applications that use a Microsoft Jet database with the Microsoft Access 97 file format may fail to open if column names are greater than 32 characters.

See details >January 08, 2019
KB4480968Resolved
KB4487023April 25, 2019
03:32 PM PT
Virtual machines fail to restore
Virtual machines (VMs) may fail to restore successfully if the VM has been saved and restored once before.

See details >January 08, 2019
KB4480968Resolved
KB4490514April 25, 2019
03:26 PM PT -
Embedded objects may display incorrectly
Any compound document (OLE) server application that places embedded objects into the Windows Metafile (WMF) using the PatBlt API may display embedded objects incorrectly.

See details >
Resolved
KB4493471April 25, 2019
03:26 PM PT +
Embedded objects may display incorrectly
Any compound document (OLE) server application that places embedded objects into the Windows Metafile (WMF) using the PatBlt API may display embedded objects incorrectly.

See details >February 12, 2019
KB4487023Resolved
KB4493471April 25, 2019
03:26 PM PT
First character of the Japanese era name not recognized as an abbreviation
The first character of the Japanese era name is not recognized as an abbreviation and may cause date parsing issues.

See details >January 17, 2019
KB4480974Resolved
KB4489880April 25, 2019
03:32 PM PT
Applications using Microsoft Jet database and Access 95 file format stop working
Applications that use a Microsoft Jet database with the Microsoft Access 95 file format may randomly stop working.

See details >February 12, 2019
KB4487023Resolved
KB4487022April 25, 2019
03:26 PM PT
Local Administrators unable to remotely access shares
Local users who are part of the local Administrators group may not be able to remotely access shares on Windows Server 2008 R2 and Windows 7 machines.

See details >January 08, 2019
KB4480968Resolved
KB4487354April 25, 2019
03:26 PM PT @@ -92,7 +92,7 @@ sections:
Unable to use Seek bar in Windows Media Player
After installing KB4463097, users may not be able to use the Seek Bar in Windows Media Player when playing specific files. This issue does not affect normal playback.

Affected platforms: 
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 8.1; Windows 7, Service Pack 1
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2; Windows Server 2012; Windows Server 2008 R2 SP1; Windows Server 2008 SP2
Resolution: This issue is resolved in KB4471325.

Back to topOctober 09, 2018
KB4463097Resolved
KB4471325Resolved:
December 11, 2018
10:00 AM PT

Opened:
April 25, 2019
03:28 PM PT
Applications using Microsoft Jet database fail to open
Applications that use a Microsoft Jet database with the Microsoft Access 97 file format may fail to open if the database has column names greater than 32 characters. The database will fail to open with the error, “Unrecognized Database Format”.

Affected platforms: 
  • Client: Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 8.1; Windows 7, Service Pack 1 
  • Server: Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2; Windows Server 2012; Windows Server 2008 R2 SP1; Windows Server 2008 SP2
Resolution: This issue is resolved in KB4487023.

Back to topJanuary 08, 2019
KB4480968Resolved
KB4487023Resolved:
February 12, 2019
10:00 AM PT

Opened:
April 25, 2019
03:32 PM PT
Virtual machines fail to restore
After installing KB4480968, virtual machines (VM) may fail to restore successfully if the VM has been saved and restored once before. The error message is, “Failed to restore the virtual machine state: Cannot restore this virtual machine because the saved state data cannot be read. Delete the saved state data and then try to start the virtual machine. (0xC0370027).”

This affects AMD Bulldozer Family 15h, AMD Jaguar Family 16h, and AMD Puma Family 16h (second generation) microarchitectures.

Affected platforms: 
  • Client: Windows 7, Service Pack 1 
  • Server: Windows Server 2012; Windows Server 2008 R2 SP1; Windows Server 2008 SP2
Resolution: This issue is resolved in KB4490514.

Back to topJanuary 08, 2019
KB4480968Resolved
KB4490514Resolved:
February 19, 2019
02:00 PM PT

Opened:
April 25, 2019
03:26 PM PT -
Embedded objects may display incorrectly
Any compound document (OLE) server application that places embedded objects into the Windows Metafile (WMF) using the PatBlt API may display embedded objects incorrectly.

For example, if you paste a Microsoft Excel worksheet object into a Microsoft Word document, the cells may render with a different background color.

Affected platforms: 
  • Client: Windows 8.1 
  • Server: Windows Server 2012 R2; Windows Server 2012; Windows Server 2008 SP2
Resolution: This issue is resolved in KB4493471.

Back to top
Resolved
KB4493471Resolved:
April 09, 2019
10:00 AM PT

Opened:
April 25, 2019
03:26 PM PT +
Embedded objects may display incorrectly
Any compound document (OLE) server application that places embedded objects into the Windows Metafile (WMF) using the PatBlt API may display embedded objects incorrectly.

For example, if you paste a Microsoft Excel worksheet object into a Microsoft Word document, the cells may render with a different background color.

Affected platforms: 
  • Client: Windows 8.1 
  • Server: Windows Server 2012 R2; Windows Server 2012; Windows Server 2008 SP2
Resolution: This issue is resolved in KB4493471.

Back to topFebruary 12, 2019
KB4487023Resolved
KB4493471Resolved:
April 09, 2019
10:00 AM PT

Opened:
April 25, 2019
03:26 PM PT
First character of the Japanese era name not recognized as an abbreviation
After installing KB4480974, the first character of the Japanese era name is not recognized as an abbreviation and may cause date parsing issues.

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 8.1; Windows 7, Service Pack 1
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2; Windows Server 2012; Windows Server 2008 R2 SP1; Windows Server 2008 SP2
Resolution: This issue is resolved in KB4489880.

Back to topJanuary 17, 2019
KB4480974Resolved
KB4489880Resolved:
March 12, 2019
10:00 AM PT

Opened:
April 25, 2019
03:32 PM PT
Applications using Microsoft Jet database and Access 95 file format stop working
Applications that use a Microsoft Jet database with the Microsoft Access 95 file format may randomly stop working.

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 7, Service Pack 1
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012; Windows Server 2008 R2 SP1; Windows Server 2008 SP2
Resolution: This issue is resolved in KB4487022.

Back to topFebruary 12, 2019
KB4487023Resolved
KB4487022Resolved:
February 19, 2019
02:00 PM PT

Opened:
April 25, 2019
03:26 PM PT
Local Administrators unable to remotely access shares
Local users who are part of the local Administrators group may not be able to remotely access shares on Windows Server 2008 R2 and Windows 7 machines after installing KB4480968. This does not affect domain accounts in the local Administrators group.

Affected platforms: 
  • Client: Windows 7, Service Pack 1 
  • Server: Windows Server 2008 R2 SP1; Windows Server 2008 SP2
Resolution: This issue is resolved in KB4487354.

Back to topJanuary 08, 2019
KB4480968Resolved
KB4487354Resolved:
January 11, 2019
02:00 PM PT

Opened:
April 25, 2019
03:26 PM PT diff --git a/windows/release-information/status-windows-server-2012.yml b/windows/release-information/status-windows-server-2012.yml index 95d688ad8a..1f47521e6e 100644 --- a/windows/release-information/status-windows-server-2012.yml +++ b/windows/release-information/status-windows-server-2012.yml @@ -63,7 +63,7 @@ sections:
System may be unresponsive after restart if Avira antivirus software installed
Devices with Avira antivirus software installed may become unresponsive upon restart.

See details >April 09, 2019
KB4493451Investigating
April 25, 2019
03:48 PM PT
Issue using PXE to start a device from WDS
There may be issues using the Preboot Execution Environment (PXE) to start a device from a Windows Deployment Services (WDS) server configured to use Variable Window Extension.

See details >March 12, 2019
KB4489891Mitigated
April 25, 2019
03:40 PM PT
System unresponsive after restart if Sophos Endpoint Protection installed
Devices with Sophos Endpoint Protection installed and managed by Sophos Central or Sophos Enterprise Console (SEC) may become unresponsive upon restart.

See details >April 09, 2019
KB4493451Mitigated
April 25, 2019
03:46 PM PT -
Certain operations performed on on a Cluster Shared Volume may fail
Certain operations, such as rename, performed on files or folders on a Cluster Shared Volume (CSV) may fail with the error, “STATUS_BAD_IMPERSONATION_LEVEL (0xC00000A5)”.

See details >January 08, 2019
KB4480975Mitigated
April 25, 2019
03:52 PM PT +
Certain operations performed on a Cluster Shared Volume may fail
Certain operations, such as rename, performed on files or folders on a Cluster Shared Volume (CSV) may fail with the error, “STATUS_BAD_IMPERSONATION_LEVEL (0xC00000A5)”.

See details >January 08, 2019
KB4480975Mitigated
April 25, 2019
03:52 PM PT
Unable to use Seek bar in Windows Media Player
Users may not be able to use the Seek bar in Windows Media Player when playing specific files.

See details >October 09, 2018
KB4462929Resolved
KB4471330April 25, 2019
02:47 PM PT
Event Viewer may not show some event descriptions for network interface cards
The Event Viewer may not show some event descriptions for network interface cards (NIC).

See details >September 11, 2018
KB4457135Resolved
KB4489891April 25, 2019
03:10 PM PT
Unable to access hotspots with third-party applications
Third-party applications may have difficulty authenticating hotspots.

See details >January 08, 2019
KB4480975Resolved
KB4480971April 25, 2019
03:14 PM PT @@ -94,7 +94,7 @@ sections:
Issue using PXE to start a device from WDS
After installing KB4489891, there may be issues using the Preboot Execution Environment (PXE) to start a device from a Windows Deployment Services (WDS) server configured to use Variable Window Extension. This may cause the connection to the WDS server to terminate prematurely while downloading the image. This issue does not affect clients or devices that are not using Variable Window Extension.

Workaround: To mitigate the issue, disable the Variable Window Extension on WDS server using one of the following options:
Option 1:
Open an Administrator Command prompt and type the following:
Wdsutil /Set-TransportServer /EnableTftpVariableWindowExtension:No
 
Option 2:
Use the Windows Deployment Services UI to make the following adjustment:
  1. Open Windows Deployment Services from Windows Administrative Tools.
  2. Expand Servers and right-click a WDS server.
  3. Open its properties and clear the Enable Variable Window Extension box on the TFTP tab.
Option 3:
Set the following registry value to 0:
HKLM\\System\\CurrentControlSet\\Services\\WDSServer\\Providers\\WDSTFTP\\EnableVariableWindowExtension
Restart the WDSServer service after disabling the Variable Window Extension.

Next steps: Microsoft is working on a resolution and will provide an update in an upcoming release.

Back to topMarch 12, 2019
KB4489891Mitigated
Last updated:
April 25, 2019
03:40 PM PT

Opened:
April 25, 2019
03:40 PM PT
System unresponsive after restart if Sophos Endpoint Protection installed
Microsoft and Sophos have identified an issue on devices with Sophos Endpoint Protection installed and managed by either Sophos Central or Sophos Enterprise Console (SEC) that may cause the system to become unresponsive upon restart after installing KB4493451.

Microsoft has temporarily blocked devices from receiving this update if the Sophos Endpoint is installed until a solution is available.

Guidance for Sophos Endpoint and Sophos Enterprise Console customers can be found in the Sophos support article.

Back to topApril 09, 2019
KB4493451Mitigated
Last updated:
April 25, 2019
03:46 PM PT

Opened:
April 25, 2019
03:46 PM PT -
Certain operations performed on on a Cluster Shared Volume may fail
Certain operations, such as rename, that you perform on files or folders that are on a Cluster Shared Volume (CSV) may fail with the error, \"STATUS_BAD_IMPERSONATION_LEVEL (0xC00000A5)\". This occurs when you perform the operation on a CSV owner node from a process that doesn’t have administrator privilege.

Workaround: Do one of the following:

  • Perform the operation from a process that has administrator privilege.
  • Perform the operation from a node that doesn’t have CSV ownership.
Next steps: Microsoft is working on a resolution and will provide an update in an upcoming release.

Back to topJanuary 08, 2019
KB4480975Mitigated
Last updated:
April 25, 2019
03:52 PM PT

Opened:
April 25, 2019
03:52 PM PT +
Certain operations performed on a Cluster Shared Volume may fail
Certain operations, such as rename, that you perform on files or folders that are on a Cluster Shared Volume (CSV) may fail with the error, \"STATUS_BAD_IMPERSONATION_LEVEL (0xC00000A5)\". This occurs when you perform the operation on a CSV owner node from a process that doesn’t have administrator privilege.

Workaround: Do one of the following:

  • Perform the operation from a process that has administrator privilege.
  • Perform the operation from a node that doesn’t have CSV ownership.
Next steps: Microsoft is working on a resolution and will provide an update in an upcoming release.

Back to topJanuary 08, 2019
KB4480975Mitigated
Last updated:
April 25, 2019
03:52 PM PT

Opened:
April 25, 2019
03:52 PM PT
Unable to use Seek bar in Windows Media Player
After installing KB4462929, users may not be able to use the Seek Bar in Windows Media Player when playing specific files. This issue does not affect normal playback.

Resolution: This issue is resolved in KB4471330.

Back to topOctober 09, 2018
KB4462929Resolved
KB4471330Resolved:
December 11, 2018
10:00 AM PT

Opened:
April 25, 2019
02:47 PM PT
Event Viewer may not show some event descriptions for network interface cards
After installing KB4457135, the Event Viewer may not show some event descriptions for network interface cards (NICs).

Resolution: This issue is resolved in KB4489891.

Back to topSeptember 11, 2018
KB4457135Resolved
KB4489891Resolved:
March 12, 2019
10:00 AM PT

Opened:
April 25, 2019
03:10 PM PT
Unable to access hotspots with third-party applications
After installing KB4480975, third-party applications may have difficulty authenticating hotspots.

Resolution: This issue is resolved in KB4480971.

Back to topJanuary 08, 2019
KB4480975Resolved
KB4480971Resolved:
January 15, 2019
10:00 AM PT

Opened:
April 25, 2019
03:14 PM PT diff --git a/windows/release-information/windows-message-center.yml b/windows/release-information/windows-message-center.yml index 1fb1e9a74c..ea715bd5dd 100644 --- a/windows/release-information/windows-message-center.yml +++ b/windows/release-information/windows-message-center.yml @@ -50,6 +50,7 @@ sections: text: " + @@ -62,6 +63,11 @@ sections: In order avoid this, you need to set your feature update deferral policy to 273 days or less. + + + + + +
If you are still unable to connect to Windows Update services due to this problem, please contact your local ISP or network administrator. You can also refer to our new KB4493784 for more information to determine if your network is affected, and to provide your local ISP or network administrator with additional information to assist you.
- + +
MessageDate
Take action: Install servicing stack update for Windows Server 2008 SP2 for SHA-2 code sign support

A standalone update, KB4493730, that introduce SHA-2 code sign support for the servicing stack (SSU) was released today as a security update.
April 19, 2019
10: 00 AM PT
The benefits of Windows 10 Dynamic Update

Dynamic Update can help organizations and end users alike ensure that their Windows 10 devices have the latest feature update content (as part of an in-place upgrade)—and preserve precious features on demand (FODs) and language packs (LPs) that may have been previously installed.

Find out which components are updated by Dynamic Update, how Dynamic Update is initiated, and how to enable or disable it.
April 17, 2019
11: 26 AM PT
April 03, 2019
05: 47 PM PT
Find a list of currently supported versions and previous releases

Every Windows product has a lifecycle. The lifecycle begins when a product is released and ends when it is no longer serviced or supported. Knowing key dates in this lifecycle helps you make informed decisions about when to update, upgrade, or make other changes to your software. Check out the updated Windows 10 release information page for a list of current versions by servicing option as well as end of service dates.
March 28, 2019
02: 00 PM PT
Windows 10, version 1809 designated for broad deployment

Based on the data and the feedback we’ve received from consumers, OEMs, ISVs, partners, and commercial customers, Windows 10, version 1809 has transitioned to broad deployment. With this, the Windows 10 release information page will now reflect Semi-Annual Channel (SAC) for version 1809.
March 28, 2019
10: 00 AM PT
Reminder: Additional servicing for the Windows 10 Enterprise, Education, and IoT Enterprise, version 1607 ends April 9, 2019

The additional servicing for Windows 10 Enterprise, Education, and IoT Enterprise editions ends on April 9, 2019 and doesn't extend beyond this date. To continue receiving security and quality updates, Microsoft recommends updating to the latest version of Windows 10.

Devices running Windows 10 Enterprise 2016 LTSB will continue to receive updates until October 2026 per the Fixed Lifecycle Policy. Windows 10, version 1607 devices running the Intel “Clovertrail” chipset will continue to receive updates until January 2023.
March 12, 2019
10: 00 AM PT
Reminder: Windows 10 Home, Pro, Pro for Workstations, and IoT Core, version 1709 will reach end of service on April 9, 2019

Windows 10, version 1709, will reach end of service on April 9, 2019 for devices running Windows 10 Home, Pro, Pro for Workstations, and IoT Core editions. These devices will no longer receive monthly security and quality updates that contain protection from the latest security threats. To continue receiving security and quality updates, Microsoft recommends updating to the latest version of Windows 10.

Windows 10 Enterprise, Education, and IoT Enterprise editions will continue to receive servicing for 12 months at no cost per the lifecycle announcement on October 2018.
March 12, 2019
10: 00 AM PT
Take action: Install standalone security updates to introduce SHA-2 code sign support for Windows 7 amd Windows Server 2008 R2

A standalone SHA-2 code signing support update for Windows Server 2008 R2 and Windows 7 is now available, as is a servicing stack update for Windows 7 SP1 and Windows Server 2008 R2 SP1 that includes the SHA-2 code signing support update.
March 12, 2019
10: 00 AM PT
Take action: Install standalone update for WSUS 3.0 SP2 to support the delivery of SHA-2 signed updates

A standalone update, KB4484071 is available on Windows Update Catalog for WSUS 3.0 SP2 that supports delivering SHA-2 signed updates. For those customers using WSUS 3.0 SP2, this update should be manually installed no later than June 18, 2019.
March 12, 2019
10: 00 AM PT
Reminder: Final Delta update for Windows 10, version 1607, 1703, 1709, and 1803 will be April 9, 2019

March 12th and April 9th will be the last two Delta updates for Windows 10, version 1607, 1703, 1709, and 1803. Security and quality updates will continue to be available via the express and full cumulative update packages.
March 12, 2019
10: 00 AM PT
How do we measure and improve the quality of Windows?

We rely heavily on feedback and data to detect and fix potential issues before we release new updates to the general population. Explore some of the practices we’ve developed during the last few years to measure and improve the quality of Windows.
March 06, 2019
10: 23 AM PT
Data, insights and listening to improve the customer experience

Measuring the quality of Windows is a complex undertaking that requires gathering a variety of diagnostic signals from millions of devices within the Windows ecosystem. In addition to rigorous internal testing, we rely heavily on the feedback provided through diagnostic data to detect and fix problems before we release new updates of Windows to the general population, and to monitor the impact of those updates after each release.

@@ -70,11 +76,12 @@ In order avoid this, you need to set your feature update deferral policy to 273
While this was not an issue with Microsoft’s services, we take any service disruption for our customers seriously. We will work with partners to better understand this so we can provide higher quality service in the future even across diverse global network providers.

-
If you are still unable to connect to Windows Update services due to this problem, please contact your local ISP or network administrator. You can also refer to our new KB4493784 for more information to determine if your network is affected, and to provide your local ISP or network administrator with additional information to assist you.
February 21, 2019
06: 37 PM PT
February 21, 2019
06: 37 PM PT
Share your feedback: Windows update history

We read every comment you leave on our update history pages, and are always looking to improve these pages and the monthly knowledge base (KB) articles that accompany each monthly update. Take our survey and let us know how we can improve our transparency further and make these more compelling and useful to you and your organization.
February 21, 2019
12: 00 PM PT
Plan for change: Windows Update for Business and the retirement of SAC-T

Beginning with Windows 10, version 1903 (the next feature update for Windows 10), the Windows 10 release information page will no longer list SAC-T information for version 1903 and future feature updates. Instead, you will find a single entry for each new SAC release. In addition, if you are using Windows Update for Business, you will see new UI and behavior to reflect that there is only one release date for each SAC release. If you use System Center Configuration Manager, Windows Server Update Services (WSUS), or other management tools, there will now only be one feature update published to WSUS, and this will occur at the time of release. Learn how this change will affect Windows Business for Update customers.
February 14, 2019
12: 00 PM PT
Champs corner: Classifying Windows updates in common deployment tools

If you utilize automated update deployment tools, such as Windows Server Update Services (WSUS) or System Center Configuration Manager, you likely use automatic rules to streamline the approval and deployment of Windows updates. Using the correct update classification is, therefore, an important component of your organization’s device update process. Explore the options available and how to approach it in a WSUS or Configuration Manager environment.
February 05, 2019
10: 34 AM PT
Global DNS outage affecting Windows Update customers

Windows Update customers were affected by a network infrastructure event on January 29, 2019 (21:00 UTC), caused by an external DNS service provider’s global outage. A software update to the external provider’s DNS servers resulted in the distribution of corrupted DNS records that affected connectivity to the Windows Update service. The DNS records were restored by January 30, 2019 (00:10 UTC), and the majority of local Internet Service Providers (ISP) have refreshed their DNS servers and customer services have been restored. +
Update: Delta updates for Windows 10, version 1607, 1703, 1709, and 1803 will be available until April 9, 2019

Based on customer feedback, we are extending Delta update publication for Windows 10 versions 1607, 1703, 1709, and 1803. We will continue to provide Delta updates via the Microsoft Update Catalog through April 9th, 2019, which will be the last delta update available.
February 05, 2019
09: 00 AM PT
Global DNS outage affecting Windows Update customers

Windows Update customers were affected by a network infrastructure event on January 29, 2019 (21:00 UTC), caused by an external DNS service provider’s global outage. A software update to the external provider’s DNS servers resulted in the distribution of corrupted DNS records that affected connectivity to the Windows Update service. The DNS records were restored by January 30, 2019 (00:10 UTC), and the majority of local Internet Service Providers (ISP) have refreshed their DNS servers and customer services have been restored. While this was not an issue with Microsoft’s services, we take any service disruption for our customers seriously. We will work with partners to better understand this so we can provide higher quality service in the future even across diverse global network providers. @@ -90,5 +97,6 @@ If you are still unable to connect to Windows Update services due to this proble
Windows 10 Quality approach for a complex ecosystem

While our measurements of quality show improving trends on aggregate for each successive Windows 10 release, if a single customer experiences an issue with any of our updates, we take it seriously. In this blog post, Windows CVP Mike Fortin shares an overview of how we work to continuously improve the quality of Windows and our Windows as a service approach. This blog will be the first in a series of more in-depth explanations of the work we do to deliver quality in our Windows releases.
November 13, 2018
10: 00 AM PT
Windows 10, version 1809 rollout resumes; now available on VLSC

Today we are resuming the rollout of the latest Windows 10 feature update—Windows 10, version 1809—via the Software Download Center (via Update Assistant or the Media Creation Tool), Windows Server Update Services (WSUS), and Windows Update for Business. Windows 10, version 1809 is also now available on the Volume Licensing Service Center (VLSC).
November 13, 2018
10: 00 AM PT
Express updates for Windows Server 2016 re-enabled for November 2018 update

Starting with the November 13, 2018 Update Tuesday release, Windows will again publish Express updates for Windows Server 2016. That means that system administrators for WSUS and System Center Configuration Manager will once again see two packages for the Windows Server 2016 update: a Full update and an Express update. Read this article for more details.
November 12, 2018
03: 00 PM PT
Plan for change: 2019 SHA-2 code signing support requirement for Windows and WSUS

To protect your security, Windows operating system updates are dual-signed using both the SHA-1 and SHA-2 hash algorithms to authenticate that updates come directly from Microsoft and were not tampered with during delivery. Due to weaknesses in the SHA-1 algorithm and to align to industry standards Microsoft will only sign Windows updates using the more secure SHA-2 algorithm exclusively.

Customers running legacy OS versions (Windows 7 SP1, Windows Server 2008 R2 SP1 and Windows Server 2008 SP2) will be required to have SHA-2 code signing support installed on their devices by July 2019. Any devices without SHA-2 support will not be offered Windows updates after July 2019. To help prepare you for this change, we will release support for SHA-2 signing in 2019. Windows Server Update Services (WSUS) 3.0 SP2 will receive SHA-2 support to properly deliver SHA-2 signed updates. Please make note of the dates in the migration timeline and plan accordingly.
November 09, 2018
10: 00 AM PT
" From 803dc6f1a14e4ccb4e05c2bfb05775d0adbc1a48 Mon Sep 17 00:00:00 2001 From: "Nisha Mittal (Wipro Ltd.)" Date: Fri, 26 Apr 2019 10:23:31 -0700 Subject: [PATCH 224/724] Fixed Links Ordering in Left Menu --- windows/release-information/TOC.md | 4 +- .../resolved-issues-windows-10-1507.yml | 18 ++++---- .../resolved-issues-windows-10-1607.yml | 32 +++++++------- .../resolved-issues-windows-10-1703.yml | 24 +++++----- .../resolved-issues-windows-10-1709.yml | 22 +++++----- .../resolved-issues-windows-10-1803.yml | 34 +++++++------- ...indows-10-1809-and-windows-server-2019.yml | 42 +++++++++--------- ...ndows-7-and-windows-server-2008-r2-sp1.yml | 20 ++++----- ...windows-8.1-and-windows-server-2012-r2.yml | 20 ++++----- ...esolved-issues-windows-server-2008-sp2.yml | 8 ++-- .../resolved-issues-windows-server-2012.yml | 36 +++++++-------- ...indows-10-1809-and-windows-server-2019.yml | 2 +- ...ndows-7-and-windows-server-2008-r2-sp1.yml | 4 +- .../status-windows-server-2008-sp2.yml | 8 ++-- .../status-windows-server-2012.yml | 44 +++++++++---------- 15 files changed, 159 insertions(+), 159 deletions(-) diff --git a/windows/release-information/TOC.md b/windows/release-information/TOC.md index 5beeab7019..188c87f7a3 100644 --- a/windows/release-information/TOC.md +++ b/windows/release-information/TOC.md @@ -15,9 +15,9 @@ ## Previous versions ### [Windows 8.1 and Windows Server 2012 R2](status-windows-8.1-and-windows-server-2012-r2.yml) ####[Resolved issues](resolved-issues-windows-8.1-and-windows-server-2012-r2.yml) -### [Windows 7 and Windows Server 2008 R2](status-windows-7-and-windows-server-2008-r2-sp1.yml) -####[Resolved issues](resolved-issues-windows-7-and-windows-server-2008-r2-sp1.yml) ### [Windows Server 2012](status-windows-server-2012.yml) ####[Resolved issues](resolved-issues-windows-server-2012.yml) +### [Windows 7 and Windows Server 2008 R2](status-windows-7-and-windows-server-2008-r2-sp1.yml) +####[Resolved issues](resolved-issues-windows-7-and-windows-server-2008-r2-sp1.yml) ### [Windows Server 2008 SP2](status-windows-server-2008-sp2.yml) ####[Resolved issues](resolved-issues-windows-server-2008-sp2.yml) \ No newline at end of file diff --git a/windows/release-information/resolved-issues-windows-10-1507.yml b/windows/release-information/resolved-issues-windows-10-1507.yml index c049c963bc..bef0598b37 100644 --- a/windows/release-information/resolved-issues-windows-10-1507.yml +++ b/windows/release-information/resolved-issues-windows-10-1507.yml @@ -32,16 +32,16 @@ sections: - type: markdown text: " - - - - - - - + + + + + + +
SummaryOriginating updateStatusDate resolved
Guest VMs running Unicast NLB fail to respond after restart
All guest virtual machines running Unicast NLB fail to respond to NLB requests after the virtual machines restart.

See details >
OS Build 10240.17976

September 11, 2018
KB4457132
Resolved
KB4462922
October 09, 2018
10:00 AM PT
Unable to use Seek bar in Windows Media Player
Users may not be able to use the Seek bar in Windows Media Player when playing specific files.

See details >
OS Build 10240.18005

October 09, 2018
KB4462922
Resolved
KB4471323
December 11, 2018
10:00 AM PT
Applications using Microsoft Jet database fail to open
Applications that use a Microsoft Jet database with the Microsoft Access 97 file format may fail to open if column names are greater than 32 characters.

See details >
OS Build 10240.18094

January 08, 2019
KB4480962
Resolved
KB4487018
February 12, 2019
10:00 AM PT
Applications using Microsoft Jet database and Access 95 file format stop working
Applications that use a Microsoft Jet database with the Microsoft Access 95 file format may randomly stop working.

See details >
OS Build 10240.18132

February 12, 2019
KB4487018
Resolved
KB4489872
March 12, 2019
10:00 AM PT
MSXML6 may cause applications to stop responding
MSXML6 may cause applications to stop responding if an exception was thrown during node operations, such as appendChild(), insertBefore(), and moveNode().

See details >
OS Build 10240.18094

January 08, 2019
KB4480962
Resolved
KB4493475
April 09, 2019
10:00 AM PT
Internet Explorer may fail to load images
Internet Explorer may fail to load images with a backslash (\\) in their relative source path.

See details >
OS Build 10240.18132

February 12, 2019
KB4487018
Resolved
KB4491101
February 21, 2019
02:00 PM PT
Error 1309 when installing/uninstalling MSI or MSP files
Users may receive \"Error 1309\" while installing or uninstalling certain types of MSI and MSP files.

See details >
OS Build 10240.18132

February 12, 2019
KB4487018
Resolved
KB4489872
March 12, 2019
10:00 AM PT
Custom URI schemes may not start corresponding application
Custom URI schemes for application protocol handlers may not start the corresponding application for local intranet and trusted sites in Internet Explorer.

See details >
OS Build 10240.18158

March 12, 2019
KB4489872
Resolved
KB4493475
April 09, 2019
10:00 AM PT
Unable to access hotspots with third-party applications
Third-party applications may have difficulty authenticating hotspots.

See details >
OS Build 10240.18094

January 08, 2019
KB4480962
Resolved
KB4487018
February 12, 2019
10:00 AM PT
Applications using Microsoft Jet database and Access 95 file format stop working
Applications that use a Microsoft Jet database with the Microsoft Access 95 file format may randomly stop working.

See details >
OS Build 10240.18132

February 12, 2019
KB4487018
Resolved
KB4489872
March 12, 2019
10:00 AM PT
Error 1309 when installing/uninstalling MSI or MSP files
Users may receive \"Error 1309\" while installing or uninstalling certain types of MSI and MSP files.

See details >
OS Build 10240.18132

February 12, 2019
KB4487018
Resolved
KB4489872
March 12, 2019
10:00 AM PT
First character of Japanese era name not recognized
The first character of the Japanese era name is not recognized as an abbreviation and may cause date parsing issues.

See details >
OS Build 10240.18132

February 12, 2019
KB4487018
Resolved
KB4489872
March 12, 2019
10:00 AM PT
Internet Explorer may fail to load images
Internet Explorer may fail to load images with a backslash (\\) in their relative source path.

See details >
OS Build 10240.18132

February 12, 2019
KB4487018
Resolved
KB4491101
February 21, 2019
02:00 PM PT
Applications using Microsoft Jet database fail to open
Applications that use a Microsoft Jet database with the Microsoft Access 97 file format may fail to open if column names are greater than 32 characters.

See details >
OS Build 10240.18094

January 08, 2019
KB4480962
Resolved
KB4487018
February 12, 2019
10:00 AM PT
Unable to access hotspots with third-party applications
Third-party applications may have difficulty authenticating hotspots.

See details >
OS Build 10240.18094

January 08, 2019
KB4480962
Resolved
KB4487018
February 12, 2019
10:00 AM PT
Unable to use Seek bar in Windows Media Player
Users may not be able to use the Seek bar in Windows Media Player when playing specific files.

See details >
OS Build 10240.18005

October 09, 2018
KB4462922
Resolved
KB4471323
December 11, 2018
10:00 AM PT
Guest VMs running Unicast NLB fail to respond after restart
All guest virtual machines running Unicast NLB fail to respond to NLB requests after the virtual machines restart.

See details >
OS Build 10240.17976

September 11, 2018
KB4457132
Resolved
KB4462922
October 09, 2018
10:00 AM PT
" @@ -67,9 +67,9 @@ sections: text: " - +
DetailsOriginating updateStatusHistory
Applications using Microsoft Jet database and Access 95 file format stop working
Applications that use a Microsoft Jet database with the Microsoft Access 95 file format may randomly stop working.

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 7, Service Pack 1
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2008 R2 SP1
Resolution: This issue is resolved in KB4489872.

Back to top
OS Build 10240.18132

February 12, 2019
KB4487018
Resolved
KB4489872
Resolved:
March 12, 2019
10:00 AM PT

Opened:
February 12, 2019
10:00 AM PT
Internet Explorer may fail to load images
After installing KB4487018, Internet Explorer may fail to load images with a backslash (\\) in their relative source path.

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 8.1; Windows 7, Service Pack 1
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2; Windows Server 2008 R2 SP1
Resolution: This issue is resolved in KB4491101.

Back to top
OS Build 10240.18132

February 12, 2019
KB4487018
Resolved
KB4491101
Resolved:
February 21, 2019
02:00 PM PT

Opened:
February 12, 2019
10:00 AM PT
Error 1309 when installing/uninstalling MSI or MSP files
After installing KB4487018, users may receive “Error 1309” while installing or uninstalling certain types of MSI and MSP files.

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 8.1
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2
Resolution: This issue is resolved in KB4489872.

Back to top
OS Build 10240.18132

February 12, 2019
KB4487018
Resolved
KB4489872
Resolved:
March 12, 2019
10:00 AM PT

Opened:
February 12, 2019
10:00 AM PT
First character of Japanese era name not recognized
After installing KB4487018, the first character of the Japanese era name is not recognized as an abbreviation and may cause date parsing issues.

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 8.1; Windows 7, Service Pack 1
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2; Windows Server 2008 R2 SP1
Resolution: This issue is resolved in KB4489872.

Back to top
OS Build 10240.18132

February 12, 2019
KB4487018
Resolved
KB4489872
Resolved:
March 12, 2019
10:00 AM PT

Opened:
February 12, 2019
10:00 AM PT
Internet Explorer may fail to load images
After installing KB4487018, Internet Explorer may fail to load images with a backslash (\\) in their relative source path.

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 8.1; Windows 7, Service Pack 1
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2; Windows Server 2008 R2 SP1
Resolution: This issue is resolved in KB4491101.

Back to top
OS Build 10240.18132

February 12, 2019
KB4487018
Resolved
KB4491101
Resolved:
February 21, 2019
02:00 PM PT

Opened:
February 12, 2019
10:00 AM PT
" @@ -78,8 +78,8 @@ sections: - type: markdown text: " - +
DetailsOriginating updateStatusHistory
Applications using Microsoft Jet database fail to open
Applications that use a Microsoft Jet database with the Microsoft Access 97 file format may fail to open if the database has column names greater than 32 characters. The database will fail to open with the error, \"Unrecognized Database Format\".

Affected platforms:
  • Client: Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 8.1; Windows 7, Service Pack 1
  • Server: Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2; Windows Server 2008 R2 SP1
Resolution: This issue is resolved in KB4487018.

Back to top
OS Build 10240.18094

January 08, 2019
KB4480962
Resolved
KB4487018
Resolved:
February 12, 2019
10:00 AM PT

Opened:
January 08, 2019
10:00 AM PT
MSXML6 may cause applications to stop responding
After installing KB4480962, MSXML6 causes applications to stop responding if an exception was thrown during node operations, such as appendChild(), insertBefore(), and moveNode().

The Group Policy editor may stop responding when editing a Group Policy Object (GPO) that contains Group Policy Preferences (GPP) for Internet Explorer 10 settings.

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 8.1
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2
Resolution: This issue was resolved in KB4493475.

Back to top
OS Build 10240.18094

January 08, 2019
KB4480962
Resolved
KB4493475
Resolved:
April 09, 2019
10:00 AM PT

Opened:
January 08, 2019
10:00 AM PT
Applications using Microsoft Jet database fail to open
Applications that use a Microsoft Jet database with the Microsoft Access 97 file format may fail to open if the database has column names greater than 32 characters. The database will fail to open with the error, \"Unrecognized Database Format\".

Affected platforms:
  • Client: Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 8.1; Windows 7, Service Pack 1
  • Server: Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2; Windows Server 2008 R2 SP1
Resolution: This issue is resolved in KB4487018.

Back to top
OS Build 10240.18094

January 08, 2019
KB4480962
Resolved
KB4487018
Resolved:
February 12, 2019
10:00 AM PT

Opened:
January 08, 2019
10:00 AM PT
Unable to access hotspots with third-party applications
After installing KB4480962, third-party applications may have difficulty authenticating hotspots.

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 8.1
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2
Resolution: This issue is resolved in KB4487018.

Back to top
OS Build 10240.18094

January 08, 2019
KB4480962
Resolved
KB4487018
Resolved:
February 12, 2019
10:00 AM PT

Opened:
January 08, 2019
10:00 AM PT
" diff --git a/windows/release-information/resolved-issues-windows-10-1607.yml b/windows/release-information/resolved-issues-windows-10-1607.yml index 1bc6a41c0c..105aad8ddb 100644 --- a/windows/release-information/resolved-issues-windows-10-1607.yml +++ b/windows/release-information/resolved-issues-windows-10-1607.yml @@ -32,22 +32,22 @@ sections: - type: markdown text: " - - - - - - - - - - - + + + + + + + + + + +
SummaryOriginating updateStatusDate resolved
Applications using Microsoft Jet database and Access 95 file format stop working
Applications that use a Microsoft Jet database with the Microsoft Access 95 file format may randomly stop working.

See details >
OS Build 14393.2791

February 12, 2019
KB4487026
Resolved
KB4487006
February 19, 2019
02:00 PM PT
Applications using Microsoft Jet database fail to open
Applications that use a Microsoft Jet database with the Microsoft Access 97 file format may fail to open if column names are greater than 32 characters.

See details >
OS Build 14393.2724

January 08, 2019
KB4480961
Resolved
KB4487026
February 12, 2019
10:00 AM PT
End-user-defined characters (EUDC) cause blue screen at startup
If you enable per font end-user-defined characters (EUDC), the system will stop working and a blue screen may appear at startup.

See details >
OS Build 14393.2879

March 19, 2019
KB4489889
Resolved
KB4493470
April 09, 2019
10:00 AM PT
First character of the Japanese era name not recognized as an abbreviation
The first character of the Japanese era name is not recognized as an abbreviation and may cause date parsing issues.

See details >
OS Build 14393.2759

January 17, 2019
KB4480977
Resolved
KB4487006
February 19, 2019
02:00 PM PT
Instant search in Microsoft Outlook fails on Windows Server 2016
Instant search in Microsoft Outlook clients fail with the error, \"Outlook cannot perform the search\" on Windows Server 2016.

See details >
OS Build 14393.2639

November 27, 2018
KB4467684
Resolved
KB4487026
February 12, 2019
10:00 AM PT
Internet Explorer 11 authentication issue with multiple concurrent logons
Internet Explorer 11 users may encounter issues if two or more people use the same user account for multiple, concurrent login sessions on the same Windows Server machine.

See details >
OS Build 14393.2724

January 08, 2019
KB4480961
Resolved
KB4493470
April 09, 2019
10:00 AM PT
Internet Explorer may fail to load images
Internet Explorer may fail to load images with a backslash (\\) in their relative source path.

See details >
OS Build 14393.2791

February 12, 2019
KB4487026
Resolved
KB4487006
February 19, 2019
02:00 PM PT
Issue hosting multiple terminal server sessions and a user logs off on Windows Server
In some cases, Windows Server will stop working and restart when hosting multiple terminal server sessions and a user logs off.

See details >
OS Build 14393.2828

February 19, 2019
KB4487006
Resolved
KB4489882
March 12, 2019
10:00 AM PT
Issues with install and activation of Key Management Service (KMS) (CSVLK) host keys
Installation and client activation of Windows Server 2019 and 1809 LTSC Key Management Service (KMS) (CSVLK) host keys do not work as expected.

See details >
OS Build 14393.2457

August 30, 2018
KB4343884
Resolved
KB4467684
November 27, 2018
10:00 AM PT
MSXML6 may cause applications to stop responding
MSXML6 may cause applications to stop responding if an exception was thrown during node operations, such as appendChild(), insertBefore(), and moveNode().

See details >
OS Build 14393.2724

January 08, 2019
KB4480961
Resolved
KB4493470
April 09, 2019
10:00 AM PT
Promotions that create non-root domains fail with optional features enabled
Windows Server 2016 promotions that create non-root domains fail in forests in which optional features like Active Directory recycle have been enabled.

See details >
OS Build 14393.2515

September 20, 2018
KB4457127
Resolved
KB4467684
November 27, 2018
10:00 AM PT
SqlConnection instantiation exception on .NET 4.6 and later
Instantiation of SqlConnection can throw an exception after certain updates have been installed.

See details >
OS Build 14393.2457

August 30, 2018
KB4343884
Resolved
KB4480977
January 17, 2019
02:00 PM PT
System becomes unresponsive when end-user-defined characters (EUDC) are used
When features related to end-user-defined characters (EUDC) are used, the entire system may become unresponsive.

See details >
OS Build 14393.2639

November 27, 2018
KB4467684
Resolved
KB4471321
December 11, 2018
10:00 AM PT
Unable to access hotspots with third-party applications
Third-party applications may have difficulty authenticating hotspots.

See details >
OS Build 14393.2724

January 08, 2019
KB4480961
Resolved
KB4480977
January 17, 2019
02:00 PM PT
Issue hosting multiple terminal server sessions and a user logs off on Windows Server
In some cases, Windows Server will stop working and restart when hosting multiple terminal server sessions and a user logs off.

See details >
OS Build 14393.2828

February 19, 2019
KB4487006
Resolved
KB4489882
March 12, 2019
10:00 AM PT
Error 1309 when installing/uninstalling MSI or MSP files
Users may receive “Error 1309” while installing or uninstalling certain types of MSI and MSP files.

See details >
OS Build 14393.2791

February 12, 2019
KB4487026
Resolved
KB4489882
March 12, 2019
10:00 AM PT
Applications using Microsoft Jet database and Access 95 file format stop working
Applications that use a Microsoft Jet database with the Microsoft Access 95 file format may randomly stop working.

See details >
OS Build 14393.2791

February 12, 2019
KB4487026
Resolved
KB4487006
February 19, 2019
02:00 PM PT
First character of the Japanese era name not recognized as an abbreviation
The first character of the Japanese era name is not recognized as an abbreviation and may cause date parsing issues.

See details >
OS Build 14393.2759

January 17, 2019
KB4480977
Resolved
KB4487006
February 19, 2019
02:00 PM PT
Internet Explorer may fail to load images
Internet Explorer may fail to load images with a backslash (\\) in their relative source path.

See details >
OS Build 14393.2791

February 12, 2019
KB4487026
Resolved
KB4487006
February 19, 2019
02:00 PM PT
Applications using Microsoft Jet database fail to open
Applications that use a Microsoft Jet database with the Microsoft Access 97 file format may fail to open if column names are greater than 32 characters.

See details >
OS Build 14393.2724

January 08, 2019
KB4480961
Resolved
KB4487026
February 12, 2019
10:00 AM PT
Instant search in Microsoft Outlook fails on Windows Server 2016
Instant search in Microsoft Outlook clients fail with the error, \"Outlook cannot perform the search\" on Windows Server 2016.

See details >
OS Build 14393.2639

November 27, 2018
KB4467684
Resolved
KB4487026
February 12, 2019
10:00 AM PT
SqlConnection instantiation exception on .NET 4.6 and later
Instantiation of SqlConnection can throw an exception after certain updates have been installed.

See details >
OS Build 14393.2457

August 30, 2018
KB4343884
Resolved
KB4480977
January 17, 2019
02:00 PM PT
Unable to access hotspots with third-party applications
Third-party applications may have difficulty authenticating hotspots.

See details >
OS Build 14393.2724

January 08, 2019
KB4480961
Resolved
KB4480977
January 17, 2019
02:00 PM PT
System becomes unresponsive when end-user-defined characters (EUDC) are used
When features related to end-user-defined characters (EUDC) are used, the entire system may become unresponsive.

See details >
OS Build 14393.2639

November 27, 2018
KB4467684
Resolved
KB4471321
December 11, 2018
10:00 AM PT
Unable to use Seek bar in Windows Media Player
Users may not be able to use the Seek bar in Windows Media Player when playing specific files.

See details >
OS Build 14393.2551

October 09, 2018
KB4462917
Resolved
KB4471321
December 11, 2018
10:00 AM PT
Issues with install and activation of Key Management Service (KMS) (CSVLK) host keys
Installation and client activation of Windows Server 2019 and 1809 LTSC Key Management Service (KMS) (CSVLK) host keys do not work as expected.

See details >
OS Build 14393.2457

August 30, 2018
KB4343884
Resolved
KB4467684
November 27, 2018
10:00 AM PT
Promotions that create non-root domains fail with optional features enabled
Windows Server 2016 promotions that create non-root domains fail in forests in which optional features like Active Directory recycle have been enabled.

See details >
OS Build 14393.2515

September 20, 2018
KB4457127
Resolved
KB4467684
November 27, 2018
10:00 AM PT
" @@ -72,10 +72,10 @@ sections: - type: markdown text: " - - + +
DetailsOriginating updateStatusHistory
Applications using Microsoft Jet database and Access 95 file format stop working
Applications that use a Microsoft Jet database with the Microsoft Access 95 file format may randomly stop working.

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 7, Service Pack 1
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2008 R2 SP1
Resolution: This issue is resolved in KB4487006.

Back to top
OS Build 14393.2791

February 12, 2019
KB4487026
Resolved
KB4487006
Resolved:
February 19, 2019
02:00 PM PT

Opened:
February 12, 2019
10:00 AM PT
Internet Explorer may fail to load images
After installing KB4487026, Internet Explorer may fail to load images with a backslash (\\) in their relative source path.

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 8.1; Windows 7, Service Pack 1
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2; Windows Server 2008 R2 SP1
Resolution: This issue is resolved in KB4487006.

Back to top
OS Build 14393.2791

February 12, 2019
KB4487026
Resolved
KB4487006
Resolved:
February 19, 2019
02:00 PM PT

Opened:
February 12, 2019
10:00 AM PT
Issue hosting multiple terminal server sessions and a user logs off on Windows Server
In some cases, Windows Server will stop working and restart when hosting multiple terminal server sessions and a user logs off. The faulting driver is win32kbase.sys.

Affected platforms:
  • Client: Windows 10 Enterprise LTSC 2016
  • Server: Windows Server 2016
Resolution: This issue is resolved in KB4489882.

Back to top
OS Build 14393.2828

February 19, 2019
KB4487006
Resolved
KB4489882
Resolved:
March 12, 2019
10:00 AM PT

Opened:
February 19, 2019
02:00 PM PT
Error 1309 when installing/uninstalling MSI or MSP files
After installing KB4487026, users may receive “Error 1309” while installing or uninstalling certain types of MSI and MSP files.

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 8.1
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2
Resolution: This issue is resolved in KB4489882.

Back to top
OS Build 14393.2791

February 12, 2019
KB4487026
Resolved
KB4489882
Resolved:
March 12, 2019
10:00 AM PT

Opened:
February 12, 2019
10:00 AM PT
Applications using Microsoft Jet database and Access 95 file format stop working
Applications that use a Microsoft Jet database with the Microsoft Access 95 file format may randomly stop working.

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 7, Service Pack 1
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2008 R2 SP1
Resolution: This issue is resolved in KB4487006.

Back to top
OS Build 14393.2791

February 12, 2019
KB4487026
Resolved
KB4487006
Resolved:
February 19, 2019
02:00 PM PT

Opened:
February 12, 2019
10:00 AM PT
Internet Explorer may fail to load images
After installing KB4487026, Internet Explorer may fail to load images with a backslash (\\) in their relative source path.

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 8.1; Windows 7, Service Pack 1
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2; Windows Server 2008 R2 SP1
Resolution: This issue is resolved in KB4487006.

Back to top
OS Build 14393.2791

February 12, 2019
KB4487026
Resolved
KB4487006
Resolved:
February 19, 2019
02:00 PM PT

Opened:
February 12, 2019
10:00 AM PT
" @@ -84,10 +84,10 @@ sections: - type: markdown text: " - - + +
DetailsOriginating updateStatusHistory
Applications using Microsoft Jet database fail to open
Applications that use a Microsoft Jet database with the Microsoft Access 97 file format may fail to open if the database has column names greater than 32 characters. The database will fail to open with the error, “Unrecognized Database Format”.

Affected platforms:
  • Client: Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 8.1; Windows 7, Service Pack 1 
  • Server: Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2; Windows Server 2008 R2 SP1 
Resolution: This issue is resolved in KB4487026.

Back to top
OS Build 14393.2724

January 08, 2019
KB4480961
Resolved
KB4487026
Resolved:
February 12, 2019
10:00 AM PT

Opened:
January 08, 2019
10:00 AM PT
First character of the Japanese era name not recognized as an abbreviation
After installing KB4480977, the first character of the Japanese era name is not recognized as an abbreviation and may cause date parsing issues.

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 8.1; Windows 7, Service Pack 1
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2; Windows Server 2008 R2 SP1
Resolution: This issue is resolved in KB4487006.

Back to top
OS Build 14393.2759

January 17, 2019
KB4480977
Resolved
KB4487006
Resolved:
February 19, 2019
02:00 PM PT

Opened:
January 17, 2019
02:00 PM PT
Internet Explorer 11 authentication issue with multiple concurrent logons
After installing KB4480961, Internet Explorer 11 and other applications that use WININET.DLL may have authentication issues. This occurs when two or more people use the same user account for multiple, concurrent login sessions on the same Windows Server machine, including Remote Desktop Protocol (RDP) and Terminal Server logons. Symptoms reported by customers include, but may not be limited to:
  • Cache size and location show zero or empty.
  • Keyboard shortcuts may not work properly.
  • Webpages may intermittently fail to load or render correctly.
  • Issues with credential prompts.
  • Issues when downloading files.
Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10 Enterprise LTSC 2016; Windows 8.1; Windows 7, Service Pack 1
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server 2016; Windows Server 2012 R2; Windows Server 2008 R2 SP1
Resolution: This issue was resolved in KB4493470.

Back to top
OS Build 14393.2724

January 08, 2019
KB4480961
Resolved
KB4493470
Resolved:
April 09, 2019
10:00 AM PT

Opened:
January 08, 2019
10:00 AM PT
MSXML6 may cause applications to stop responding
After installing KB4480961, MSXML6 causes applications to stop responding if an exception was thrown during node operations, such as appendChild(), insertBefore(), and moveNode().

The Group Policy editor may stop responding when editing a Group Policy Object (GPO) that contains Group Policy Preferences (GPP) for Internet Explorer 10 settings.

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 8.1
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2
Resolution: This issue was resolved in KB4493470.

Back to top
OS Build 14393.2724

January 08, 2019
KB4480961
Resolved
KB4493470
Resolved:
April 09, 2019
10:00 AM PT

Opened:
January 08, 2019
10:00 AM PT
First character of the Japanese era name not recognized as an abbreviation
After installing KB4480977, the first character of the Japanese era name is not recognized as an abbreviation and may cause date parsing issues.

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 8.1; Windows 7, Service Pack 1
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2; Windows Server 2008 R2 SP1
Resolution: This issue is resolved in KB4487006.

Back to top
OS Build 14393.2759

January 17, 2019
KB4480977
Resolved
KB4487006
Resolved:
February 19, 2019
02:00 PM PT

Opened:
January 17, 2019
02:00 PM PT
Applications using Microsoft Jet database fail to open
Applications that use a Microsoft Jet database with the Microsoft Access 97 file format may fail to open if the database has column names greater than 32 characters. The database will fail to open with the error, “Unrecognized Database Format”.

Affected platforms:
  • Client: Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 8.1; Windows 7, Service Pack 1 
  • Server: Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2; Windows Server 2008 R2 SP1 
Resolution: This issue is resolved in KB4487026.

Back to top
OS Build 14393.2724

January 08, 2019
KB4480961
Resolved
KB4487026
Resolved:
February 12, 2019
10:00 AM PT

Opened:
January 08, 2019
10:00 AM PT
Unable to access hotspots with third-party applications
After installing KB4480961, third-party applications may have difficulty authenticating hotspots.

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 8.1
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2
Resolution: This issue is resolved in KB4480977.

Back to top
OS Build 14393.2724

January 08, 2019
KB4480961
Resolved
KB4480977
Resolved:
January 17, 2019
02:00 PM PT

Opened:
January 08, 2019
10:00 AM PT
" @@ -125,7 +125,7 @@ sections: - type: markdown text: " - +
DetailsOriginating updateStatusHistory
Issues with install and activation of Key Management Service (KMS) (CSVLK) host keys
After installing KB4343884, installation and client activation of Windows Server 2019 and Windows 10 Enterprise 2019 LTSC Key Management Service (KMS) CSVLK host keys do not work as expected.

Affected platforms:
  • Client: Windows 10 Enterprise LTSC 2016
  • Server: Windows Server 2016
Resolution: This issue is resolved in KB4467684.

Back to top
OS Build 14393.2457

August 30, 2018
KB4343884
Resolved
KB4467684
Resolved:
November 27, 2018
10:00 AM PT

Opened:
August 30, 2018
05:00 PM PT
SqlConnection instantiation exception on .NET 4.6 and later
After you install the August Preview of Quality Rollup or September 11, 2018 .NET Framework update, instantiation of SqlConnection can throw an exception.

For more information about this issue, see the following article in the Microsoft Knowledge Base: 4470809, SqlConnection instantiation exception on .NET 4.6 and later after August-September 2018 .NET Framework updates.

Affected platforms:
  • Client: Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016
  • Server: Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016
Resolution: This issue is resolved in KB4480977.

Back to top
OS Build 14393.2457

August 30, 2018
KB4343884
Resolved
KB4480977
Resolved:
January 17, 2019
02:00 PM PT

Opened:
August 30, 2018
05:00 PM PT
Issues with install and activation of Key Management Service (KMS) (CSVLK) host keys
After installing KB4343884, installation and client activation of Windows Server 2019 and Windows 10 Enterprise 2019 LTSC Key Management Service (KMS) CSVLK host keys do not work as expected.

Affected platforms:
  • Client: Windows 10 Enterprise LTSC 2016
  • Server: Windows Server 2016
Resolution: This issue is resolved in KB4467684.

Back to top
OS Build 14393.2457

August 30, 2018
KB4343884
Resolved
KB4467684
Resolved:
November 27, 2018
10:00 AM PT

Opened:
August 30, 2018
05:00 PM PT
" diff --git a/windows/release-information/resolved-issues-windows-10-1703.yml b/windows/release-information/resolved-issues-windows-10-1703.yml index 9d1ea03cc3..6ea50b5ecf 100644 --- a/windows/release-information/resolved-issues-windows-10-1703.yml +++ b/windows/release-information/resolved-issues-windows-10-1703.yml @@ -32,19 +32,19 @@ sections: - type: markdown text: " - - + - - - + + + - + +
SummaryOriginating updateStatusDate resolved
Applications using Microsoft Jet database and Access 95 file format stop working
Applications that use a Microsoft Jet database with the Microsoft Access 95 file format may randomly stop working.

See details >
OS Build 15063.1631

February 12, 2019
KB4487020
Resolved
KB4487011
February 19, 2019
10:00 AM PT
Applications using Microsoft Jet database fail to open
Applications that use a Microsoft Jet database with the Microsoft Access 97 file format may fail to open if column names are greater than 32 characters.

See details >
OS Build 15063.1563

January 08, 2019
KB4480973
Resolved
KB4487020
February 12, 2019
10:00 AM PT
End-user-defined characters (EUDC) may cause blue screen at startup
If you enable per font end-user-defined characters (EUDC), the system may stop working and a blue screen may appear at startup.

See details >
OS Build 15063.1716

March 19, 2019
KB4489888
Resolved
KB4493474
April 09, 2019
10:00 AM PT
MSXML6 may cause applications to stop responding
MSXML6 may cause applications to stop responding if an exception was thrown during node operations, such as appendChild(), insertBefore(), and moveNode().

See details >
OS Build 15063.1563

January 08, 2019
KB4480973
Resolved
KB4493474
April 09, 2019
10:00 AM PT
Error 1309 when installing/uninstalling MSI or MSP files
Users may receive “Error 1309” while installing or uninstalling certain types of MSI and MSP files.

See details >
OS Build 15063.1659

February 19, 2019
KB4487011
Resolved
KB4489871
March 12, 2019
10:00 AM PT
Error message beginning with “Hosted by…” when launching Microsoft Edge
Some users may encounter an error message beginning with “Hosted by…” when launching Microsoft Edge.

See details >
OS Build 15063.1387

October 09, 2018
KB4462937
Resolved
KB4462939
October 18, 2018
10:00 AM PT
First character of the Japanese era name not recognized as an abbreviation
The first character of the Japanese era name is not recognized as an abbreviation and may cause date parsing issues.

See details >
OS Build 15063.1596

January 15, 2019
KB4480959
Resolved
KB4487011
February 19, 2019
02:00 PM PT
Internet Explorer may fail to load images
Internet Explorer may fail to load images with a backslash (\\) in their relative source path.

See details >
OS Build 15063.1631

February 12, 2019
KB4487020
Resolved
KB4487011
February 19, 2019
02:00 PM PT
LongonUI.exe stops working intermittently
LongonUI.exe stops working intermittently.

See details >
OS Build 15063.1387

October 09, 2018
KB4462937
Resolved
KB4467699
November 27, 2018
10:00 AM PT
MSXML6 may cause applications to stop responding
MSXML6 may cause applications to stop responding if an exception was thrown during node operations, such as appendChild(), insertBefore(), and moveNode().

See details >
OS Build 15063.1563

January 08, 2019
KB4480973
Resolved
KB4493474
April 09, 2019
10:00 AM PT
Applications using Microsoft Jet database and Access 95 file format stop working
Applications that use a Microsoft Jet database with the Microsoft Access 95 file format may randomly stop working.

See details >
OS Build 15063.1631

February 12, 2019
KB4487020
Resolved
KB4487011
February 19, 2019
10:00 AM PT
Applications using Microsoft Jet database fail to open
Applications that use a Microsoft Jet database with the Microsoft Access 97 file format may fail to open if column names are greater than 32 characters.

See details >
OS Build 15063.1563

January 08, 2019
KB4480973
Resolved
KB4487020
February 12, 2019
10:00 AM PT
Webpages become unresponsive in Microsoft Edge
Microsoft Edge users report difficulty browsing and loading webpages.

See details >
OS Build 15063.1563

January 08, 2019
KB4480973
Resolved
KB4487020
February 12, 2019
10:00 AM PT
SqlConnection instantiation exception on .NET 4.6 and later
Instantiation of SqlConnection can throw an exception after certain updates have been installed.

See details >
OS Build 15063.1292

August 30, 2018
KB4343889
Resolved
KB4480959
January 15, 2019
10:00 AM PT
Unable to access hotspots with third-party applications
Third-party applications may have difficulty authenticating hotspots.

See details >
OS Build 15063.1563

January 08, 2019
KB4480973
Resolved
KB4480959
January 15, 2019
10:00 AM PT
Unable to use Seek bar in Windows Media Player
Users may not be able to use the Seek bar in Windows Media Player when playing specific files.

See details >
OS Build 15063.1387

October 09, 2018
KB4462937
Resolved
KB4471327
December 11, 2018
10:00 AM PT
Webpages become unresponsive in Microsoft Edge
Microsoft Edge users report difficulty browsing and loading webpages.

See details >
OS Build 15063.1563

January 08, 2019
KB4480973
Resolved
KB4487020
February 12, 2019
10:00 AM PT
LongonUI.exe stops working intermittently
LongonUI.exe stops working intermittently.

See details >
OS Build 15063.1387

October 09, 2018
KB4462937
Resolved
KB4467699
November 27, 2018
10:00 AM PT
Error message beginning with “Hosted by…” when launching Microsoft Edge
Some users may encounter an error message beginning with “Hosted by…” when launching Microsoft Edge.

See details >
OS Build 15063.1387

October 09, 2018
KB4462937
Resolved
KB4462939
October 18, 2018
10:00 AM PT
" @@ -69,9 +69,9 @@ sections: - type: markdown text: " - +
DetailsOriginating updateStatusHistory
Applications using Microsoft Jet database and Access 95 file format stop working
Applications that use a Microsoft Jet database with the Microsoft Access 95 file format may randomly stop working.

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 7, Service Pack 1
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2008 R2 SP1
Resolution: This issue is resolved in KB4487011.

Back to top
OS Build 15063.1631

February 12, 2019
KB4487020
Resolved
KB4487011
Resolved:
February 19, 2019
02:00 PM PT

Opened:
February 12, 2019
10:00 AM PT
Error 1309 when installing/uninstalling MSI or MSP files
After installing KB4487011, users may receive “Error 1309” while installing or uninstalling certain types of MSI and MSP files.

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 8.1
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2
Resolution: This issue is resolved in KB4489871.

Back to top
OS Build 15063.1659

February 19, 2019
KB4487011
Resolved
KB4489871
Resolved:
March 12, 2019
10:00 AM PT

Opened:
February 19, 2019
02:00 PM PT
Internet Explorer may fail to load images
After installing KB4487020, Internet Explorer may fail to load images with a backslash (\\) in their relative source path.

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 8.1; Windows 7, Service Pack 1
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2; Windows Server 2008 R2 SP1
Resolution: This issue is resolved in KB4487011.

Back to top
OS Build 15063.1631

February 12, 2019
KB4487020
Resolved
KB4487011
Resolved:
February 19, 2019
02:00 PM PT

Opened:
February 12, 2019
10:00 AM PT
Applications using Microsoft Jet database and Access 95 file format stop working
Applications that use a Microsoft Jet database with the Microsoft Access 95 file format may randomly stop working.

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 7, Service Pack 1
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2008 R2 SP1
Resolution: This issue is resolved in KB4487011.

Back to top
OS Build 15063.1631

February 12, 2019
KB4487020
Resolved
KB4487011
Resolved:
February 19, 2019
02:00 PM PT

Opened:
February 12, 2019
10:00 AM PT
" @@ -80,11 +80,11 @@ sections: - type: markdown text: " - - - + + +
DetailsOriginating updateStatusHistory
Applications using Microsoft Jet database fail to open
Applications that use a Microsoft Jet database with the Microsoft Access 97 file format may fail to open if the database has column names greater than 32 characters. The database will fail to open with the error, “Unrecognized Database Format”.

Affected platforms:
  • Client: Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 8.1; Windows 7, Service Pack 1 
  • Server: Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2; Windows Server 2008 R2 SP1
Resolution: This issue is resolved in KB4487020.

Back to top
OS Build 15063.1563

January 08, 2019
KB4480973
Resolved
KB4487020
Resolved:
February 12, 2019
10:00 AM PT

Opened:
January 08, 2019
10:00 AM PT
First character of the Japanese era name not recognized as an abbreviation
After installing KB4480959, the first character of the Japanese era name is not recognized as an abbreviation and may cause date parsing issues.

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 8.1; Windows 7, Service Pack 1
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2; Windows Server 2008 R2 SP1
Resolution: This issue is resolved in KB4487011.

Back to top
OS Build 15063.1596

January 15, 2019
KB4480959
Resolved
KB4487011
Resolved:
February 19, 2019
02:00 PM PT

Opened:
January 15, 2019
10:00 AM PT
MSXML6 may cause applications to stop responding
After installing KB4480973, MSXML6 causes applications to stop responding if an exception was thrown during node operations, such as appendChild(), insertBefore(), and moveNode().

The Group Policy editor may stop responding when editing a Group Policy Object (GPO) that contains Group Policy Preferences (GPP) for Internet Explorer 10 settings.

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 8.1
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2
Resolution: This issue was resolved in KB4493474.

Back to top
OS Build 15063.1563

January 08, 2019
KB4480973
Resolved
KB4493474
Resolved:
April 09, 2019
10:00 AM PT

Opened:
January 08, 2019
10:00 AM PT
Unable to access hotspots with third-party applications
After installing KB4480973, third-party applications may have difficulty authenticating hotspots.

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 8.1
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2
Resolution: This issue is resolved in KB4480959.

Back to top
OS Build 15063.1563

January 08, 2019
KB4480973
Resolved
KB4480959
Resolved:
January 15, 2019
10:00 AM PT

Opened:
January 08, 2019
10:00 AM PT
First character of the Japanese era name not recognized as an abbreviation
After installing KB4480959, the first character of the Japanese era name is not recognized as an abbreviation and may cause date parsing issues.

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 8.1; Windows 7, Service Pack 1
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2; Windows Server 2008 R2 SP1
Resolution: This issue is resolved in KB4487011.

Back to top
OS Build 15063.1596

January 15, 2019
KB4480959
Resolved
KB4487011
Resolved:
February 19, 2019
02:00 PM PT

Opened:
January 15, 2019
10:00 AM PT
Applications using Microsoft Jet database fail to open
Applications that use a Microsoft Jet database with the Microsoft Access 97 file format may fail to open if the database has column names greater than 32 characters. The database will fail to open with the error, “Unrecognized Database Format”.

Affected platforms:
  • Client: Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 8.1; Windows 7, Service Pack 1 
  • Server: Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2; Windows Server 2008 R2 SP1
Resolution: This issue is resolved in KB4487020.

Back to top
OS Build 15063.1563

January 08, 2019
KB4480973
Resolved
KB4487020
Resolved:
February 12, 2019
10:00 AM PT

Opened:
January 08, 2019
10:00 AM PT
Webpages become unresponsive in Microsoft Edge
After installing KB4480973, some Microsoft Edge users report that they:
  • Cannot load webpages using a local IP address.
  • Cannot load webpages on the Internet using a VPN connection.
Browsing fails or the webpage may become unresponsive.

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709
Resolution: This issue is resolved in KB4487020.

Back to top
OS Build 15063.1563

January 08, 2019
KB4480973
Resolved
KB4487020
Resolved:
February 12, 2019
10:00 AM PT

Opened:
January 08, 2019
10:00 AM PT
Unable to access hotspots with third-party applications
After installing KB4480973, third-party applications may have difficulty authenticating hotspots.

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 8.1
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2
Resolution: This issue is resolved in KB4480959.

Back to top
OS Build 15063.1563

January 08, 2019
KB4480973
Resolved
KB4480959
Resolved:
January 15, 2019
10:00 AM PT

Opened:
January 08, 2019
10:00 AM PT
" @@ -93,9 +93,9 @@ sections: - type: markdown text: " - - + +
DetailsOriginating updateStatusHistory
Error message beginning with “Hosted by…” when launching Microsoft Edge
After installing KB4462937, some users may see a dialog box with a non-applicable message beginning with the words “Hosted by...” when first starting Microsoft Edge.

This dialog will only appear once if they have turned on “Block only third-party cookies” in Microsoft Edge and applied certain language packs before installing this update.

Affected platforms:
  • Client: Windows 10, version 1709; Windows 10, version 1703
  • Server: Windows Server, version 1709
Resolution: This issue is resolved in KB4462939.

Back to top
OS Build 15063.1387

October 09, 2018
KB4462937
Resolved
KB4462939
Resolved:
October 18, 2018
10:00 AM PT

Opened:
October 09, 2018
10:00 AM PT
LongonUI.exe stops working intermittently
After installing KB4462937, LogonUI.exe stops working intermittently.

Affected platforms:
  • Windows 10, version 1703
Resolution: This issue is resolved in KB4467699.

Back to top
OS Build 15063.1387

October 09, 2018
KB4462937
Resolved
KB4467699
Resolved:
November 27, 2018
10:00 AM PT

Opened:
October 09, 2018
10:00 AM PT
Unable to use Seek bar in Windows Media Player
After installing KB4462937, users may not be able to use the Seek Bar in Windows Media Player when playing specific files. This issue does not affect normal playback.

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 8.1; Windows 7, Service Pack 1
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2; Windows Server 2008 R2 SP1
Resolution: This issue is resolved in KB4471327.

Back to top
OS Build 15063.1387

October 09, 2018
KB4462937
Resolved
KB4471327
Resolved:
December 11, 2018
10:00 AM PT

Opened:
October 09, 2018
10:00 AM PT
LongonUI.exe stops working intermittently
After installing KB4462937, LogonUI.exe stops working intermittently.

Affected platforms:
  • Windows 10, version 1703
Resolution: This issue is resolved in KB4467699.

Back to top
OS Build 15063.1387

October 09, 2018
KB4462937
Resolved
KB4467699
Resolved:
November 27, 2018
10:00 AM PT

Opened:
October 09, 2018
10:00 AM PT
Error message beginning with “Hosted by…” when launching Microsoft Edge
After installing KB4462937, some users may see a dialog box with a non-applicable message beginning with the words “Hosted by...” when first starting Microsoft Edge.

This dialog will only appear once if they have turned on “Block only third-party cookies” in Microsoft Edge and applied certain language packs before installing this update.

Affected platforms:
  • Client: Windows 10, version 1709; Windows 10, version 1703
  • Server: Windows Server, version 1709
Resolution: This issue is resolved in KB4462939.

Back to top
OS Build 15063.1387

October 09, 2018
KB4462937
Resolved
KB4462939
Resolved:
October 18, 2018
10:00 AM PT

Opened:
October 09, 2018
10:00 AM PT
" diff --git a/windows/release-information/resolved-issues-windows-10-1709.yml b/windows/release-information/resolved-issues-windows-10-1709.yml index d07a0b5a13..58c0125d9a 100644 --- a/windows/release-information/resolved-issues-windows-10-1709.yml +++ b/windows/release-information/resolved-issues-windows-10-1709.yml @@ -32,19 +32,19 @@ sections: - type: markdown text: " - - + + - + - + + - - +
SummaryOriginating updateStatusDate resolved
Applications using Microsoft Jet database and Access 95 file format stop working
Applications that use a Microsoft Jet database with the Microsoft Access 95 file format may randomly stop working.

See details >
OS Build 16299.967

February 12, 2019
KB4486996
Resolved
KB4487021
February 19, 2019
02:00 PM PT
Applications using Microsoft Jet database fail to open
Applications that use a Microsoft Jet database with the Microsoft Access 97 file format may fail to open if column names are greater than 32 characters.

See details >
OS Build 16299.904

January 08, 2019
KB4480978
Resolved
KB4486996
February 12, 2019
10:00 AM PT
End-user-defined characters (EUDC) may cause blue screen at startup
If you enable per font end-user-defined characters (EUDC), the system may stop working and a blue screen may appear at startup.

See details >
OS Build 16299.1059

March 19, 2019
KB4489890
Resolved
KB4493441
April 09, 2019
10:00 AM PT
MSXML6 causes applications to stop responding if an exception was thrown
MSXML6 causes applications to stop responding if an exception was thrown during node operations, such as appendChild(), insertBefore(), and moveNode().

See details >
OS Build 16299.904

January 08, 2019
KB4480978
Resolved
KB4493441
April 09, 2019
10:00 AM PT
Stop error when attempting to start SSH from WSL
A stop error occurs when attempting to start the Secure Shell client program from Windows Subsystem for Linux with agent forwarding enabled using a command line switch (ssh –A) or

See details >
OS Build 16299.1029

March 12, 2019
KB4489886
Resolved
KB4493441
April 09, 2019
10:00 AM PT
Error 1309 when installing/uninstalling MSI or MSP files
Users may receive “Error 1309” while installing or uninstalling certain types of MSI and MSP files.

See details >
OS Build 16299.967

February 12, 2019
KB4486996
Resolved
KB4489886
March 12, 2019
10:00 AM PT
Error message beginning with “Hosted by…” when launching Microsoft Edge
Some users may encounter an error message beginning with “Hosted by…” when launching Microsoft Edge.

See details >
OS Build 16299.726

October 09, 2018
KB4462918
Resolved
KB4462932
October 18, 2018
10:00 AM PT
Applications using Microsoft Jet database and Access 95 file format stop working
Applications that use a Microsoft Jet database with the Microsoft Access 95 file format may randomly stop working.

See details >
OS Build 16299.967

February 12, 2019
KB4486996
Resolved
KB4487021
February 19, 2019
02:00 PM PT
First character of the Japanese era name not recognized as an abbreviation
The first character of the Japanese era name is not recognized as an abbreviation and may cause date parsing issues.

See details >
OS Build 16299.936

January 15, 2019
KB4480967
Resolved
KB4487021
February 19, 2019
02:00 PM PT
Internet Explorer may fail to load images
Internet Explorer may fail to load images with a backslash (\\) in their relative source path.

See details >
OS Build 16299.967

February 12, 2019
KB4486996
Resolved
KB4487021
February 19, 2019
02:00 PM PT
MSXML6 causes applications to stop responding if an exception was thrown
MSXML6 causes applications to stop responding if an exception was thrown during node operations, such as appendChild(), insertBefore(), and moveNode().

See details >
OS Build 16299.904

January 08, 2019
KB4480978
Resolved
KB4493441
April 09, 2019
10:00 AM PT
Applications using Microsoft Jet database fail to open
Applications that use a Microsoft Jet database with the Microsoft Access 97 file format may fail to open if column names are greater than 32 characters.

See details >
OS Build 16299.904

January 08, 2019
KB4480978
Resolved
KB4486996
February 12, 2019
10:00 AM PT
Webpages become unresponsive in Microsoft Edge
Microsoft Edge users report difficulty browsing and loading webpages.

See details >
OS Build 16299.904

January 08, 2019
KB4480978
Resolved
KB4486996
February 12, 2019
10:00 AM PT
SqlConnection instantiation exception on .NET 4.6 and later
Instantiation of SqlConnection can throw an exception after certain updates have been installed.

See details >
OS Build 16299.637

August 30, 2018
KB4343893
Resolved
KB4480967
January 15, 2019
10:00 AM PT
Stop error when attempting to start SSH from WSL
A stop error occurs when attempting to start the Secure Shell client program from Windows Subsystem for Linux with agent forwarding enabled using a command line switch (ssh –A) or

See details >
OS Build 16299.1029

March 12, 2019
KB4489886
Resolved
KB4493441
April 09, 2019
10:00 AM PT
Unable to access hotspots with third-party applications
Third-party applications may have difficulty authenticating hotspots.

See details >
OS Build 16299.904

January 08, 2019
KB4480978
Resolved
KB4480967
January 15, 2019
10:00 AM PT
Unable to use Seek bar in Windows Media Player
Users may not be able to use the Seek bar in Windows Media Player when playing specific files.

See details >
OS Build 16299.726

October 09, 2018
KB4462918
Resolved
KB4471329
December 11, 2018
10:00 AM PT
Webpages become unresponsive in Microsoft Edge
Microsoft Edge users report difficulty browsing and loading webpages.

See details >
OS Build 16299.904

January 08, 2019
KB4480978
Resolved
KB4486996
February 12, 2019
10:00 AM PT
Error message beginning with “Hosted by…” when launching Microsoft Edge
Some users may encounter an error message beginning with “Hosted by…” when launching Microsoft Edge.

See details >
OS Build 16299.726

October 09, 2018
KB4462918
Resolved
KB4462932
October 18, 2018
10:00 AM PT
" @@ -70,8 +70,8 @@ sections: - type: markdown text: " - +
DetailsOriginating updateStatusHistory
Applications using Microsoft Jet database and Access 95 file format stop working
Applications that use a Microsoft Jet database with the Microsoft Access 95 file format may randomly stop working.

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 7, Service Pack 1
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2008 R2 SP1
Resolution: This issue is resolved in KB4487021.

Back to top
OS Build 16299.967

February 12, 2019
KB4486996
Resolved
KB4487021
Resolved:
February 19, 2019
02:00 PM PT

Opened:
February 12, 2019
10:00 AM PT
Error 1309 when installing/uninstalling MSI or MSP files
After installing KB4486996, users may receive “Error 1309” while installing or uninstalling certain types of MSI and MSP files.

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 8.1
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2
Resolution: This issue is resolved in KB4489886.

Back to top
OS Build 16299.967

February 12, 2019
KB4486996
Resolved
KB4489886
Resolved:
March 12, 2019
10:00 AM PT

Opened:
February 12, 2019
10:00 AM PT
Applications using Microsoft Jet database and Access 95 file format stop working
Applications that use a Microsoft Jet database with the Microsoft Access 95 file format may randomly stop working.

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 7, Service Pack 1
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2008 R2 SP1
Resolution: This issue is resolved in KB4487021.

Back to top
OS Build 16299.967

February 12, 2019
KB4486996
Resolved
KB4487021
Resolved:
February 19, 2019
02:00 PM PT

Opened:
February 12, 2019
10:00 AM PT
Internet Explorer may fail to load images
After installing KB4486996, Internet Explorer may fail to load images with a backslash (\\) in their relative source path.

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 8.1; Windows 7, Service Pack 1
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2; Windows Server 2008 R2 SP1
Resolution: This issue is resolved in KB4487021.

Back to top
OS Build 16299.967

February 12, 2019
KB4486996
Resolved
KB4487021
Resolved:
February 19, 2019
02:00 PM PT

Opened:
February 12, 2019
10:00 AM PT
" @@ -81,11 +81,11 @@ sections: - type: markdown text: " - - - + + +
DetailsOriginating updateStatusHistory
Applications using Microsoft Jet database fail to open
Applications that use a Microsoft Jet database with the Microsoft Access 97 file format may fail to open if the database has column names greater than 32 characters. The database will fail to open with the error, “Unrecognized Database Format.”

Affected platforms:
  • Client: Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 8.1; Windows 7, Service Pack 1 
  • Server: Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2; Windows Server 2008 R2 SP1 
Resolution: This issue is resolved in KB4486996.

Back to top
OS Build 16299.904

January 08, 2019
KB4480978
Resolved
KB4486996
Resolved:
February 12, 2019
10:00 AM PT

Opened:
January 08, 2019
10:00 AM PT
First character of the Japanese era name not recognized as an abbreviation
After installing KB4480967, the first character of the Japanese era name is not recognized as an abbreviation and may cause date parsing issues.

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 8.1; Windows 7, Service Pack 1
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2; Windows Server 2008 R2 SP1
Resolution: This issue is resolved in KB4487021.

Back to top
OS Build 16299.936

January 15, 2019
KB4480967
Resolved
KB4487021
Resolved:
February 19, 2019
02:00 PM PT

Opened:
January 15, 2019
10:00 AM PT
MSXML6 causes applications to stop responding if an exception was thrown
After installing KB4480978, MSXML6 causes applications to stop responding if an exception was thrown during node operations, such as appendChild(), insertBefore(), and moveNode().

The Group Policy editor may stop responding when editing a Group Policy Object (GPO) that contains Group Policy Preferences (GPP) for Internet Explorer 10 settings.

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 8.1
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2
Resolution: This issue is resolved in KB4493441.

Back to top
OS Build 16299.904

January 08, 2019
KB4480978
Resolved
KB4493441
Resolved:
April 09, 2019
10:00 AM PT

Opened:
January 08, 2019
10:00 AM PT
Unable to access hotspots with third-party applications
After installing KB4480978, third-party applications may have difficulty authenticating hotspots.

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 8.1
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2
Resolution: This issue is resolved in KB4480967.

Back to top
OS Build 16299.904

January 08, 2019
KB4480978
Resolved
KB4480967
Resolved:
January 15, 2019
10:00 AM PT

Opened:
January 08, 2019
10:00 AM PT
First character of the Japanese era name not recognized as an abbreviation
After installing KB4480967, the first character of the Japanese era name is not recognized as an abbreviation and may cause date parsing issues.

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 8.1; Windows 7, Service Pack 1
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2; Windows Server 2008 R2 SP1
Resolution: This issue is resolved in KB4487021.

Back to top
OS Build 16299.936

January 15, 2019
KB4480967
Resolved
KB4487021
Resolved:
February 19, 2019
02:00 PM PT

Opened:
January 15, 2019
10:00 AM PT
Applications using Microsoft Jet database fail to open
Applications that use a Microsoft Jet database with the Microsoft Access 97 file format may fail to open if the database has column names greater than 32 characters. The database will fail to open with the error, “Unrecognized Database Format.”

Affected platforms:
  • Client: Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 8.1; Windows 7, Service Pack 1 
  • Server: Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2; Windows Server 2008 R2 SP1 
Resolution: This issue is resolved in KB4486996.

Back to top
OS Build 16299.904

January 08, 2019
KB4480978
Resolved
KB4486996
Resolved:
February 12, 2019
10:00 AM PT

Opened:
January 08, 2019
10:00 AM PT
Webpages become unresponsive in Microsoft Edge
After installing KB4480978, some Microsoft Edge users report that they:
  • Cannot load webpages using a local IP address.
  • Cannot load webpages on the Internet using a VPN connection.
Browsing fails or the webpage may become unresponsive.

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709
Resolution: This issue is resolved in KB4486996.

Back to top
OS Build 16299.904

January 08, 2019
KB4480978
Resolved
KB4486996
Resolved:
February 12, 2019
10:00 AM PT

Opened:
January 08, 2019
10:00 AM PT
Unable to access hotspots with third-party applications
After installing KB4480978, third-party applications may have difficulty authenticating hotspots.

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 8.1
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2
Resolution: This issue is resolved in KB4480967.

Back to top
OS Build 16299.904

January 08, 2019
KB4480978
Resolved
KB4480967
Resolved:
January 15, 2019
10:00 AM PT

Opened:
January 08, 2019
10:00 AM PT
" @@ -94,8 +94,8 @@ sections: - type: markdown text: " - +
DetailsOriginating updateStatusHistory
Error message beginning with “Hosted by…” when launching Microsoft Edge
After installing KB4462918, some users may see a dialog box with a non-applicable message beginning with the words “Hosted by...” when first starting Microsoft Edge.

This dialog will only appear once if they have turned on “Block only third-party cookies” in Microsoft Edge and applied certain language packs before installing this update.

Affected platforms:
  • Client: Windows 10, version 1709; Windows 10, version 1703
  • Server: Windows Server, version 1709
Resolution: This issue is resolved in KB4462932.

Back to top
OS Build 16299.726

October 09, 2018
KB4462918
Resolved
KB4462932
Resolved:
October 18, 2018
10:00 AM PT

Opened:
October 09, 2018
10:00 AM PT
Unable to use Seek bar in Windows Media Player
After installing KB4462918, users may not be able to use the Seek Bar in Windows Media Player when playing specific files. This issue does not affect normal playback.

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 8.1; Windows 7, Service Pack 1
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2; Windows Server 2008 R2 SP1
Resolution: This issue is resolved in KB4471329.

Back to top
OS Build 16299.726

October 09, 2018
KB4462918
Resolved
KB4471329
Resolved:
December 11, 2018
10:00 AM PT

Opened:
October 09, 2018
10:00 AM PT
Error message beginning with “Hosted by…” when launching Microsoft Edge
After installing KB4462918, some users may see a dialog box with a non-applicable message beginning with the words “Hosted by...” when first starting Microsoft Edge.

This dialog will only appear once if they have turned on “Block only third-party cookies” in Microsoft Edge and applied certain language packs before installing this update.

Affected platforms:
  • Client: Windows 10, version 1709; Windows 10, version 1703
  • Server: Windows Server, version 1709
Resolution: This issue is resolved in KB4462932.

Back to top
OS Build 16299.726

October 09, 2018
KB4462918
Resolved
KB4462932
Resolved:
October 18, 2018
10:00 AM PT

Opened:
October 09, 2018
10:00 AM PT
" diff --git a/windows/release-information/resolved-issues-windows-10-1803.yml b/windows/release-information/resolved-issues-windows-10-1803.yml index d6e346cff5..30cdc45b91 100644 --- a/windows/release-information/resolved-issues-windows-10-1803.yml +++ b/windows/release-information/resolved-issues-windows-10-1803.yml @@ -32,24 +32,24 @@ sections: - type: markdown text: " - - - - - - - - - - - + + + + + + + + + - + + +
SummaryOriginating updateStatusDate resolved
Applications using Microsoft Jet database and Access 95 file format stop working
Applications that use a Microsoft Jet database with the Microsoft Access 95 file format may randomly stop working.

See details >
OS Build 17134.523

January 08, 2019
KB4480966
Resolved
KB4487017
February 12, 2019
10:00 AM PT
Blue or black screen with \"System thread exception not handled\" error
Some users may get a blue or black screen with the error code, “System thread exception not handled.”

See details >
OS Build 17134.441

November 27, 2018
KB4467682
Resolved
KB4471324
December 11, 2018
10:00 AM PT
Cannot pin a web link on the Start menu or the taskbar
Some users cannot pin a web link on the Start menu or the taskbar.

See details >
OS Build 17134.471

December 11, 2018
KB4471324
Resolved
KB4487029
February 19, 2019
02:00 PM PT
Custom Start menu layouts display incorrectly
Custom Start menu layouts may display incorrectly.

See details >
OS Build 17134.441

November 27, 2018
KB4467682
Resolved
KB4471324
December 11, 2018
10:00 AM PT
Developer Tools (F12) fail to start in Microsoft Edge
Developer Tools (F12) may fail to start in Microsoft Edge.

See details >
OS Build 17134.376

October 24, 2018
KB4462933
Resolved
KB4467702
November 13, 2018
10:00 AM PT
End-user-defined characters (EUDC) may cause blue screen at startup
If you enable per font end-user-defined characters (EUDC), the system may stop working and a blue screen may appear at startup.

See details >
OS Build 17134.677

March 19, 2019
KB4489894
Resolved
KB4493464
April 09, 2019
10:00 AM PT
Error 1309 when installing/uninstalling MSI or MSP files
Users may receive \"Error 1309\" while installing or uninstalling certain types of MSI and MSP files.

See details >
OS Build 17134.590

February 12, 2019
KB4487017
Resolved
KB4489868
March 12, 2019
10:00 AM PT
First character of Japanese era name not recognized
The first character of the Japanese era name is not recognized as an abbreviation and may cause date parsing issues.

See details >
OS Build 17134.556

January 15, 2019
KB4480976
Resolved
KB4487029
February 19, 2019
02:00 PM PT
Guest VMs running Unicast NLB fail to respond after restart
All guest virtual machines running Unicast NLB fail to respond to NLB requests after the virtual machines restart.

See details >
OS Build 17134.285

September 11, 2018
KB4457128
Resolved
KB4458469
September 20, 2018
10:00 AM PT
Internet Explorer may fail to load images
Internet Explorer may fail to load images with a backslash (\\) in their relative source path.

See details >
OS Build 17134.590

February 12, 2019
KB4487017
Resolved
KB4487029
February 19, 2019
02:00 PM PT
Microsoft Intune takes a long time to deliver user profiles
Windows no longer recognizes the Personal Information exchange (PFX) certificate used for Wi-Fi or VPN authentication, causing delays in Microsoft Intune delivering user profiles.

See details >
OS Build 17134.191

July 24, 2018
KB4340917
Resolved
KB4464218
September 17, 2018
10:00 AM PT
MSXML6 may cause applications to stop responding
MSXML6 may cause applications to stop responding if an exception was thrown during node operations, such as appendChild(), insertBefore(), and moveNode().

See details >
OS Build 17134.523

January 08, 2019
KB4480966
Resolved
KB4493464
April 09, 2019
10:00 AM PT
SqlConnection instantiation exception on .NET 4.6 and later
After you install the August Preview of Quality Rollup or the September 11, 2018 .NET Framework update, instantiation of SqlConnection can throw an exception.

See details >
OS Build 17134.285

September 11, 2018
KB4457128
Resolved
KB4480976
January 15, 2019
10:00 AM PT
Stop error when attempting to start SSH from WSL
A stop error occurs when attempting to start Secure Shell from Windows Subsystem for Linux with agent forwarding using a command line switch (ssh –A) or a configuration setting.

See details >
OS Build 17134.648

March 12, 2019
KB4489868
Resolved
KB4493464
April 09, 2019
10:00 AM PT
Error 1309 when installing/uninstalling MSI or MSP files
Users may receive \"Error 1309\" while installing or uninstalling certain types of MSI and MSP files.

See details >
OS Build 17134.590

February 12, 2019
KB4487017
Resolved
KB4489868
March 12, 2019
10:00 AM PT
Cannot pin a web link on the Start menu or the taskbar
Some users cannot pin a web link on the Start menu or the taskbar.

See details >
OS Build 17134.471

December 11, 2018
KB4471324
Resolved
KB4487029
February 19, 2019
02:00 PM PT
First character of Japanese era name not recognized
The first character of the Japanese era name is not recognized as an abbreviation and may cause date parsing issues.

See details >
OS Build 17134.556

January 15, 2019
KB4480976
Resolved
KB4487029
February 19, 2019
02:00 PM PT
Internet Explorer may fail to load images
Internet Explorer may fail to load images with a backslash (\\) in their relative source path.

See details >
OS Build 17134.590

February 12, 2019
KB4487017
Resolved
KB4487029
February 19, 2019
02:00 PM PT
Applications using Microsoft Jet database and Access 95 file format stop working
Applications that use a Microsoft Jet database with the Microsoft Access 95 file format may randomly stop working.

See details >
OS Build 17134.523

January 08, 2019
KB4480966
Resolved
KB4487017
February 12, 2019
10:00 AM PT
Webpages become unresponsive in Microsoft Edge
Microsoft Edge users report difficulty browsing and loading webpages.

See details >
OS Build 17134.523

January 08, 2019
KB4480966
Resolved
KB4487017
February 12, 2019
10:00 AM PT
SqlConnection instantiation exception on .NET 4.6 and later
After you install the August Preview of Quality Rollup or the September 11, 2018 .NET Framework update, instantiation of SqlConnection can throw an exception.

See details >
OS Build 17134.285

September 11, 2018
KB4457128
Resolved
KB4480976
January 15, 2019
10:00 AM PT
Unable to access hotspots with third-party applications
Third-party applications may have difficulty authenticating hotspots.

See details >
OS Build 17134.523

January 08, 2019
KB4480966
Resolved
KB4480976
January 15, 2019
10:00 AM PT
Blue or black screen with \"System thread exception not handled\" error
Some users may get a blue or black screen with the error code, “System thread exception not handled.”

See details >
OS Build 17134.441

November 27, 2018
KB4467682
Resolved
KB4471324
December 11, 2018
10:00 AM PT
Custom Start menu layouts display incorrectly
Custom Start menu layouts may display incorrectly.

See details >
OS Build 17134.441

November 27, 2018
KB4467682
Resolved
KB4471324
December 11, 2018
10:00 AM PT
Unable to use Seek bar in Windows Media Player
Users may not be able to use the Seek Bar in Windows Media Player when playing specific files.

See details >
OS Build 17134.345

October 09, 2018
KB4462919
Resolved
KB4471324
December 11, 2018
10:00 AM PT
Users cannot set Win32 program defaults
Some users cannot set Win32 program defaults for certain app and file type combinations.

See details >
OS Build 17134.320

September 26, 2018
KB4458469
Resolved
KB4467682
November 27, 2018
10:00 AM PT
Webpages become unresponsive in Microsoft Edge
Microsoft Edge users report difficulty browsing and loading webpages.

See details >
OS Build 17134.523

January 08, 2019
KB4480966
Resolved
KB4487017
February 12, 2019
10:00 AM PT
Developer Tools (F12) fail to start in Microsoft Edge
Developer Tools (F12) may fail to start in Microsoft Edge.

See details >
OS Build 17134.376

October 24, 2018
KB4462933
Resolved
KB4467702
November 13, 2018
10:00 AM PT
Guest VMs running Unicast NLB fail to respond after restart
All guest virtual machines running Unicast NLB fail to respond to NLB requests after the virtual machines restart.

See details >
OS Build 17134.285

September 11, 2018
KB4457128
Resolved
KB4458469
September 20, 2018
10:00 AM PT
Microsoft Intune takes a long time to deliver user profiles
Windows no longer recognizes the Personal Information exchange (PFX) certificate used for Wi-Fi or VPN authentication, causing delays in Microsoft Intune delivering user profiles.

See details >
OS Build 17134.191

July 24, 2018
KB4340917
Resolved
KB4464218
September 17, 2018
10:00 AM PT
" @@ -85,11 +85,11 @@ sections: - type: markdown text: " - - - + + +
DetailsOriginating updateStatusHistory
Applications using Microsoft Jet database and Access 95 file format stop working
Applications that use a Microsoft Jet database with the Microsoft Access 95 file format may randomly stop working. 

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 7, Service Pack 1
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2008 R2 SP1
Resolution: This issue is resolved in KB4487017.

Back to top
OS Build 17134.523

January 08, 2019
KB4480966
Resolved
KB4487017
Resolved:
February 12, 2019
10:00 AM PT

Opened:
January 08, 2019
10:00 AM PT
First character of Japanese era name not recognized
After installing KB4480976, the first character of the Japanese era name is not recognized as an abbreviation and may cause date parsing issues.

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 8.1; Windows 7, Service Pack 1
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2; Windows Server 2008 R2 SP1
Resolution: This issue is resolved in KB4487029

Back to top
OS Build 17134.556

January 15, 2019
KB4480976
Resolved
KB4487029
Resolved:
February 19, 2019
02:00 PM PT

Opened:
January 15, 2019
10:00 AM PT
MSXML6 may cause applications to stop responding
After installing KB4480966, MSXML6 causes applications to stop responding if an exception was thrown during node operations, such as appendChild(), insertBefore(), and moveNode().

The Group Policy editor may stop responding when editing a Group Policy Object (GPO) that contains Group Policy Preferences (GPP) for Internet Explorer 10 settings.

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 8.1
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2
Resolution: This issue was resolved in KB4493464

Back to top
OS Build 17134.523

January 08, 2019
KB4480966
Resolved
KB4493464
Resolved:
April 09, 2019
10:00 AM PT

Opened:
January 08, 2019
10:00 AM PT
Unable to access hotspots with third-party applications
After installing KB4480966, third-party applications may have difficulty authenticating hotspots.

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 8.1
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2
Resolution: This issue is resolved in KB4480976

Back to top
OS Build 17134.523

January 08, 2019
KB4480966
Resolved
KB4480976
Resolved:
January 15, 2019
10:00 AM PT

Opened:
January 08, 2019
10:00 AM PT
First character of Japanese era name not recognized
After installing KB4480976, the first character of the Japanese era name is not recognized as an abbreviation and may cause date parsing issues.

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 8.1; Windows 7, Service Pack 1
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2; Windows Server 2008 R2 SP1
Resolution: This issue is resolved in KB4487029

Back to top
OS Build 17134.556

January 15, 2019
KB4480976
Resolved
KB4487029
Resolved:
February 19, 2019
02:00 PM PT

Opened:
January 15, 2019
10:00 AM PT
Applications using Microsoft Jet database and Access 95 file format stop working
Applications that use a Microsoft Jet database with the Microsoft Access 95 file format may randomly stop working. 

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 7, Service Pack 1
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2008 R2 SP1
Resolution: This issue is resolved in KB4487017.

Back to top
OS Build 17134.523

January 08, 2019
KB4480966
Resolved
KB4487017
Resolved:
February 12, 2019
10:00 AM PT

Opened:
January 08, 2019
10:00 AM PT
Webpages become unresponsive in Microsoft Edge
After installing KB4480966, some Microsoft Edge users report that they: 
  • Cannot load webpages using a local IP address. 
  • Cannot load webpages on the Internet using a VPN connection.  
Browsing fails or the webpage may become unresponsive. 

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709
Resolution: This issue is resolved in KB4487017

Back to top
OS Build 17134.523

January 08, 2019
KB4480966
Resolved
KB4487017
Resolved:
February 12, 2019
10:00 AM PT

Opened:
January 08, 2019
10:00 AM PT
Unable to access hotspots with third-party applications
After installing KB4480966, third-party applications may have difficulty authenticating hotspots.

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 8.1
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2
Resolution: This issue is resolved in KB4480976

Back to top
OS Build 17134.523

January 08, 2019
KB4480966
Resolved
KB4480976
Resolved:
January 15, 2019
10:00 AM PT

Opened:
January 08, 2019
10:00 AM PT
" @@ -117,8 +117,8 @@ sections: - type: markdown text: " - +
DetailsOriginating updateStatusHistory
Developer Tools (F12) fail to start in Microsoft Edge
Developer Tools (F12) may fail to start in Microsoft Edge.

Affected platforms:
  • Client: Windows 10, version 1803
  • Server: Windows Server, version 1803
Resolution: This issue is resolved in KB4467702

Back to top
OS Build 17134.376

October 24, 2018
KB4462933
Resolved
KB4467702
Resolved:
November 13, 2018
10:00 AM PT

Opened:
October 24, 2018
02:00 PM PT
Unable to use Seek bar in Windows Media Player
After installing KB4462919, users may not be able to use the Seek bar in Windows Media Player when playing specific files. This issue does not affect normal playback.

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 8.1; Windows 7, Service Pack 1
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2; Windows Server 2008 R2 SP1
Resolution: This issue is resolved in KB4471324

Back to top
OS Build 17134.345

October 09, 2018
KB4462919
Resolved
KB4471324
Resolved:
December 11, 2018
10:00 AM PT

Opened:
October 09, 2018
10:00 AM PT
Developer Tools (F12) fail to start in Microsoft Edge
Developer Tools (F12) may fail to start in Microsoft Edge.

Affected platforms:
  • Client: Windows 10, version 1803
  • Server: Windows Server, version 1803
Resolution: This issue is resolved in KB4467702

Back to top
OS Build 17134.376

October 24, 2018
KB4462933
Resolved
KB4467702
Resolved:
November 13, 2018
10:00 AM PT

Opened:
October 24, 2018
02:00 PM PT
" @@ -127,9 +127,9 @@ sections: - type: markdown text: " - +
DetailsOriginating updateStatusHistory
Guest VMs running Unicast NLB fail to respond after restart
All guest virtual machines running Unicast NLB fail to respond to NLB requests after the virtual machines restart. 

Affected platforms:
  • Client: Windows 10, version 1803; Windows 10, version 1507
  • Server: Windows Server, version 1803
Resolution: This issue is resolved in KB4458469

Back to top
OS Build 17134.285

September 11, 2018
KB4457128
Resolved
KB4458469
Resolved:
September 20, 2018
10:00 AM PT

Opened:
September 11, 2018
10:00 AM PT
SqlConnection instantiation exception on .NET 4.6 and later
After you install the August Preview of Quality Rollup or September 11, 2018 .NET Framework update, instantiation of SqlConnection can throw an exception.  

For more information about this issue, see the following article in the Microsoft Knowledge Base: 4470809, SqlConnection instantiation exception on .NET 4.6 and later after August-September 2018 .NET Framework updates.

Affected platforms:
  • Client: Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016
  • Server: Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016
Resolution: This issue is resolved in KB4480976

Back to top
OS Build 17134.285

September 11, 2018
KB4457128
Resolved
KB4480976
Resolved:
January 15, 2019
10:00 AM PT

Opened:
September 11, 2018
10:00 AM PT
Users cannot set Win32 program defaults
After installing KB4458469, some users cannot set Win32 program defaults for certain app and file type combinations using the Open with... command or Settings > Apps > Default apps
 
In some cases, Microsoft Notepad or other Win32 programs cannot be set as the default.

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803
Resolution: This issue is resolved in KB4467682

Back to top
OS Build 17134.320

September 26, 2018
KB4458469
Resolved
KB4467682
Resolved:
November 27, 2018
10:00 AM PT

Opened:
September 26, 2018
02:00 PM PT
Guest VMs running Unicast NLB fail to respond after restart
All guest virtual machines running Unicast NLB fail to respond to NLB requests after the virtual machines restart. 

Affected platforms:
  • Client: Windows 10, version 1803; Windows 10, version 1507
  • Server: Windows Server, version 1803
Resolution: This issue is resolved in KB4458469

Back to top
OS Build 17134.285

September 11, 2018
KB4457128
Resolved
KB4458469
Resolved:
September 20, 2018
10:00 AM PT

Opened:
September 11, 2018
10:00 AM PT
" diff --git a/windows/release-information/resolved-issues-windows-10-1809-and-windows-server-2019.yml b/windows/release-information/resolved-issues-windows-10-1809-and-windows-server-2019.yml index e3085b3a52..9ede7ba611 100644 --- a/windows/release-information/resolved-issues-windows-10-1809-and-windows-server-2019.yml +++ b/windows/release-information/resolved-issues-windows-10-1809-and-windows-server-2019.yml @@ -34,26 +34,26 @@ sections: - - - - - - - - + + + - - - - - + + + + + + + + + +
SummaryOriginating updateStatusDate resolved
End-user-defined characters (EUDC) may cause blue screen at startup
If you enable per font end-user-defined characters (EUDC), the system may stop working and a blue screen may appear at startup.

See details >
OS Build 17763.404

April 02, 2019
KB4490481
Resolved
KB4493509
April 09, 2019
10:00 AM PT
Internet Explorer 11 authentication issue with multiple concurrent logons
Internet Explorer 11 users may encounter issues if two or more people use the same user account for multiple, concurrent login sessions on the same Windows Server machine.

See details >
OS Build 17763.253

January 08, 2019
KB4480116
Resolved
KB4493509
April 09, 2019
10:00 AM PT
Apps may stop working after selecting an audio output device other than the default
Users with multiple audio devices that select an audio output device different from the \"Default Audio Device\" may find certain applications stop working unexpectedly.

See details >
OS Build 17763.348

March 01, 2019
KB4482887
Resolved
KB4490481
April 02, 2019
10:00 AM PT
Global DNS outage affects Windows Update customers
Windows Update customers were recently affected by a network infrastructure event caused by an external DNS service provider's global outage.

See details >
N/A

Resolved
March 08, 2019
11:15 AM PT
MSXML6 may cause applications to stop responding
MSXML6 may cause applications to stop responding if an exception was thrown during node operations, such as appendChild(), insertBefore(), and moveNode().

See details >
OS Build 17763.253

January 08, 2019
KB4480116
Resolved
KB4493509
April 09, 2019
10:00 AM PT
Internet Explorer may fail to load images
Internet Explorer may fail to load images with a backslash (\\) in their relative source path.

See details >
OS Build 17763.316

February 12, 2019
KB4487044
Resolved
KB4482887
March 01, 2019
10:00 AM PT
Users cannot set Win32 program defaults
Some users cannot set Win32 program defaults for certain app and file type combinations.

See details >
OS Build 17763.55

October 09, 2018
KB4464330
Resolved
KB4469342
December 05, 2018
02:00 PM PT
Microsoft Edge may crash or hang while playing video
Following an nVidia driver update, Microsoft Edge may crash or hang while playing video.

See details >
OS Build 17763.165

December 05, 2018
KB4469342
Resolved
November 29, 2018
10:03 AM PT
Unable to use Seek bar in Windows Media Player
Users may not be able to use the Seek bar in Windows Media Player when playing specific files.

See details >
OS Build 17763.55

October 09, 2018
KB4464330
Resolved
KB4471332
December 11, 2018
10:00 AM PT
Webpages become unresponsive in Microsoft Edge
Microsoft Edge users report difficulty browsing and loading webpages.

See details >
OS Build 17763.253

January 08, 2019
KB4480116
Resolved
KB4487044
February 12, 2019
10:00 AM PT
Unable to access hotspots with third-party applications
Third-party applications may have difficulty authenticating hotspots.

See details >
OS Build 17763.253

January 08, 2019
KB4480116
Resolved
KB4476976
January 22, 2019
02:00 PM PT
Apps may stop working after selecting an audio output device other than the default
Users with multiple audio devices that select an audio output device different from the \"Default Audio Device\" may find certain applications stop working unexpectedly.

See details >
OS Build 17763.348

March 01, 2019
KB4482887
Resolved
KB4490481
April 02, 2019
10:00 AM PT
Error 1309 when installing/uninstalling MSI or MSP files
Users may receive \"Error 1309\" while installing or uninstalling certain types of MSI and MSP files.

See details >
OS Build 17763.316

February 12, 2019
KB4487044
Resolved
KB4489899
March 12, 2019
10:00 AM PT
Global DNS outage affects Windows Update customers
Windows Update customers were recently affected by a network infrastructure event caused by an external DNS service provider's global outage.

See details >
N/A

Resolved
March 08, 2019
11:15 AM PT
Internet Explorer may fail to load images
Internet Explorer may fail to load images with a backslash (\\) in their relative source path.

See details >
OS Build 17763.316

February 12, 2019
KB4487044
Resolved
KB4482887
March 01, 2019
10:00 AM PT
Applications using Microsoft Jet database and Access 95 file format stop working
Applications that use a Microsoft Jet database with the Microsoft Access 9 file format may randomly stop working.

See details >
OS Build 17763.316

February 12, 2019
KB4487044
Resolved
KB4482887
March 01, 2019
10:00 AM PT
First character of the Japanese era name not recognized
The first character of the Japanese era name is not recognized as an abbreviation and may cause date parsing issues.

See details >
OS Build 17763.316

February 12, 2019
KB4487044
Resolved
KB4482887
March 01, 2019
10:00 AM PT
Audio stops working after installing Intel audio driver
Upgrade block: Windows 10 audio stops working after installing Intel Smart Sound Technology driver (version 09.21.00.3755).

See details >
OS Build 17763.134

November 13, 2018
KB4467708
Resolved
KB4468550
December 07, 2018
10:00 AM PT
Mapped drives fail to reconnect after login
Upgrade block: Mapped drives may fail to reconnect after booting and logging on to a Windows device.

See details >
OS Build 17763.134

November 13, 2018
KB4467708
Resolved
KB4469342
December 05, 2018
02:00 PM PT
Shared albums may not sync with iCloud for Windows
Upgrade block: Apple has identified an incompatibility with iCloud for Windows (version 7.7.0.27) where users may experience issues updating or synching Shared Albums.

See details >
OS Build 17763.134

November 13, 2018
KB4467708
Resolved
KB4482887
March 01, 2019
10:00 AM PT
Intel Audio Display (intcdaud.sys) notification during Windows 10 Setup
Upgrade block: Users may see an Intel Audio Display (intcdaud.sys) notification during setup for devices with certain Intel Display Audio Drivers.

See details >
OS Build 17763.134

November 13, 2018
KB4467708
Resolved
KB4482887
March 01, 2019
10:00 AM PT
Office apps (32-bit) unable to use 'Save As…' function
Upgrade block: Devices using Morphisec Protector (or other application that uses the Morphisec SDK) may be unable to save documents when using 32-bit Microsoft Office apps.

See details >
OS Build 17763.134

November 13, 2018
KB4467708
Resolved
December 06, 2018
12:00 PM PT
Trend Micro OfficeScan and Worry-Free Business Security AV software not compatible
Upgrade block: Microsoft and Trend Micro identified a compatibility issue with the Trend Micro business endpoint security solutions OfficeScan and Worry-Free Business Security.

See details >
OS Build 17763.134

November 13, 2018
KB4467708
Resolved
February 01, 2019
09:00 AM PT
Issues with lock screen and Microsoft Edge tabs for certain AMD Radeon video cards
Upgrade block: Devices utilizing AMD Radeon HD2000 or HD4000 series video cards may experience issues with the lock screen and Microsoft Edge tabs.

See details >
OS Build 17763.134

November 13, 2018
KB4467708
Resolved
KB4487044
February 12, 2019
10:00 AM PT
F5 VPN clients losing network connectivity
Upgrade block: After updating to Window 10, version 1809, F5 VPN clients may lose network connectivity when the VPN service is in a split tunnel configuration.

See details >
OS Build 17763.134

November 13, 2018
KB4467708
Resolved
KB4482887
March 01, 2019
10:00 AM PT
Webpages become unresponsive in Microsoft Edge
Microsoft Edge users report difficulty browsing and loading webpages.

See details >
OS Build 17763.253

January 08, 2019
KB4480116
Resolved
KB4487044
February 12, 2019
10:00 AM PT
Issues with lock screen and Microsoft Edge tabs for certain AMD Radeon video cards
Upgrade block: Devices utilizing AMD Radeon HD2000 or HD4000 series video cards may experience issues with the lock screen and Microsoft Edge tabs.

See details >
OS Build 17763.134

November 13, 2018
KB4467708
Resolved
KB4487044
February 12, 2019
10:00 AM PT
Trend Micro OfficeScan and Worry-Free Business Security AV software not compatible
Upgrade block: Microsoft and Trend Micro identified a compatibility issue with the Trend Micro business endpoint security solutions OfficeScan and Worry-Free Business Security.

See details >
OS Build 17763.134

November 13, 2018
KB4467708
Resolved
February 01, 2019
09:00 AM PT
Unable to access hotspots with third-party applications
Third-party applications may have difficulty authenticating hotspots.

See details >
OS Build 17763.253

January 08, 2019
KB4480116
Resolved
KB4476976
January 22, 2019
02:00 PM PT
Unable to use Seek bar in Windows Media Player
Users may not be able to use the Seek bar in Windows Media Player when playing specific files.

See details >
OS Build 17763.55

October 09, 2018
KB4464330
Resolved
KB4471332
December 11, 2018
10:00 AM PT
Audio stops working after installing Intel audio driver
Upgrade block: Windows 10 audio stops working after installing Intel Smart Sound Technology driver (version 09.21.00.3755).

See details >
OS Build 17763.134

November 13, 2018
KB4467708
Resolved
KB4468550
December 07, 2018
10:00 AM PT
Office apps (32-bit) unable to use 'Save As…' function
Upgrade block: Devices using Morphisec Protector (or other application that uses the Morphisec SDK) may be unable to save documents when using 32-bit Microsoft Office apps.

See details >
OS Build 17763.134

November 13, 2018
KB4467708
Resolved
December 06, 2018
12:00 PM PT
Users cannot set Win32 program defaults
Some users cannot set Win32 program defaults for certain app and file type combinations.

See details >
OS Build 17763.55

October 09, 2018
KB4464330
Resolved
KB4469342
December 05, 2018
02:00 PM PT
Mapped drives fail to reconnect after login
Upgrade block: Mapped drives may fail to reconnect after booting and logging on to a Windows device.

See details >
OS Build 17763.134

November 13, 2018
KB4467708
Resolved
KB4469342
December 05, 2018
02:00 PM PT
Microsoft Edge may crash or hang while playing video
Following an nVidia driver update, Microsoft Edge may crash or hang while playing video.

See details >
OS Build 17763.165

December 05, 2018
KB4469342
Resolved
November 29, 2018
10:03 AM PT
" @@ -87,8 +87,8 @@ sections: - type: markdown text: " - +
DetailsOriginating updateStatusHistory
Internet Explorer may fail to load images
After installing KB4487044, Internet Explorer may fail to load images with a backslash (\\) in their relative source path.

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 8.1; Windows 7, Service Pack 1
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2; Windows Server 2008 R2 SP1
Resolution: This issue is resolved in KB4482887.

Back to top
OS Build 17763.316

February 12, 2019
KB4487044
Resolved
KB4482887
Resolved:
March 01, 2019
10:00 AM PT

Opened:
February 12, 2019
10:00 AM PT
Error 1309 when installing/uninstalling MSI or MSP files
After installing KB4487044, users may receive \"Error 1309\" while installing or uninstalling certain types of MSI and MSP files. 

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 8.1
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2
Resolution: This issue is resolved in KB4489899

Back to top
OS Build 17763.316

February 12, 2019
KB4487044
Resolved
KB4489899
Resolved:
March 12, 2019
10:00 AM PT

Opened:
February 12, 2019
10:00 AM PT
Internet Explorer may fail to load images
After installing KB4487044, Internet Explorer may fail to load images with a backslash (\\) in their relative source path.

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 8.1; Windows 7, Service Pack 1
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2; Windows Server 2008 R2 SP1
Resolution: This issue is resolved in KB4482887.

Back to top
OS Build 17763.316

February 12, 2019
KB4487044
Resolved
KB4482887
Resolved:
March 01, 2019
10:00 AM PT

Opened:
February 12, 2019
10:00 AM PT
Applications using Microsoft Jet database and Access 95 file format stop working
Applications that use a Microsoft Jet database with the Microsoft Access 95 file format may randomly stop working.

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 7, Service Pack 1
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2008 R2 SP1
Resolution: This issue is resolved in KB4482887.

Back to top
OS Build 17763.316

February 12, 2019
KB4487044
Resolved
KB4482887
Resolved:
March 01, 2019
10:00 AM PT

Opened:
February 12, 2019
10:00 AM PT
First character of the Japanese era name not recognized
After installing KB4487044, the first character of the Japanese era name is not recognized as an abbreviation and may cause date parsing issues. 

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 8.1; Windows 7, Service Pack 1
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2; Windows Server 2008 R2 SP1
Resolution: This issue is resolved in KB4482887

Back to top
OS Build 17763.316

February 12, 2019
KB4487044
Resolved
KB4482887
Resolved:
March 01, 2019
10:00 AM PT

Opened:
February 12, 2019
10:00 AM PT
@@ -100,8 +100,8 @@ sections: text: " - +
DetailsOriginating updateStatusHistory
Internet Explorer 11 authentication issue with multiple concurrent logons
After installing the February 12, 2019 update (KB4487044), Internet Explorer 11 and other applications that use WININET.DLL may have authentication issues. This occurs when two or more people use the same user account for multiple, concurrent login sessions on the same Windows Server machine, including Remote Desktop Protocol (RDP) and Terminal Server logons. Symptoms reported by customers include, but may not be limited to:  
  • Cache size and location show zero or empty. 
  • Keyboard shortcuts may not work properly. 
  • Webpages may intermittently fail to load or render correctly. 
  • Issues with credential prompts. 
  • Issues when downloading files. 
Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10 Enterprise LTSC 2016; Windows 8.1; Windows 7, Service Pack 1
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server 2016; Windows Server 2012 R2; Windows Server 2008 R2 SP1
Resolved: This issue was resolved in KB4493509

Back to top
OS Build 17763.253

January 08, 2019
KB4480116
Resolved
KB4493509
Resolved:
April 09, 2019
10:00 AM PT

Opened:
January 08, 2019
10:00 AM PT
Global DNS outage affects Windows Update customers
Windows Update customers were affected by a network infrastructure event on January 29, 2019 (21:00 UTC), caused by an external DNS service provider's global outage. A software update to the external provider's DNS servers resulted in the distribution of corrupted DNS records that affected connectivity to the Windows Update service. The DNS records were restored by January 30, 2019 (00:10 UTC), and the majority of local Internet Service Providers (ISP) have refreshed their DNS servers and customer services have been restored. 
 
Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019
  • Server: Windows Server, version 1809; Windows Server 2019
While this was not an issue with Microsoft's services, we take any service disruption for our customers seriously. We will work with partners to better understand this so we can provide higher quality service in the future even across diverse global network providers. 
 
If you are still unable to connect to Windows Update services due to this problem, please contact your local ISP or network administrator. You can also refer to our new KB4493784 for more information to determine if your network is affected, and to provide your local ISP or network administrator with additional information to assist you. 

Back to top
N/A

Resolved
Resolved:
March 08, 2019
11:15 AM PT

Opened:
January 29, 2019
02:00 PM PT
MSXML6 may cause applications to stop responding
After installing KB4480116, MSXML6 causes applications to stop responding if an exception was thrown during node operations, such as appendChild(), insertBefore(), and moveNode().
 
The Group Policy editor may stop responding when editing a Group Policy Object (GPO) that contains Group Policy Preferences (GPP) for Internet Explorer 10 settings. 

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 8.1
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2
Resolved: This issue was resolved in KB4493509

Back to top
OS Build 17763.253

January 08, 2019
KB4480116
Resolved
KB4493509
Resolved:
April 09, 2019
10:00 AM PT

Opened:
January 08, 2019
10:00 AM PT
Global DNS outage affects Windows Update customers
Windows Update customers were affected by a network infrastructure event on January 29, 2019 (21:00 UTC), caused by an external DNS service provider's global outage. A software update to the external provider's DNS servers resulted in the distribution of corrupted DNS records that affected connectivity to the Windows Update service. The DNS records were restored by January 30, 2019 (00:10 UTC), and the majority of local Internet Service Providers (ISP) have refreshed their DNS servers and customer services have been restored. 
 
Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019
  • Server: Windows Server, version 1809; Windows Server 2019
While this was not an issue with Microsoft's services, we take any service disruption for our customers seriously. We will work with partners to better understand this so we can provide higher quality service in the future even across diverse global network providers. 
 
If you are still unable to connect to Windows Update services due to this problem, please contact your local ISP or network administrator. You can also refer to our new KB4493784 for more information to determine if your network is affected, and to provide your local ISP or network administrator with additional information to assist you. 

Back to top
N/A

Resolved
Resolved:
March 08, 2019
11:15 AM PT

Opened:
January 29, 2019
02:00 PM PT
Webpages become unresponsive in Microsoft Edge
After installing KB4480116, some Microsoft Edge users report that they:
  • Cannot load webpages using a local IP address. 
  • Cannot load webpages on the Internet using a VPN connection.
Browsing fails or the webpage may become unresponsive.

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709
Resolution: This issue is resolved in KB4487044

Back to top
OS Build 17763.253

January 08, 2019
KB4480116
Resolved
KB4487044
Resolved:
February 12, 2019
10:00 AM PT

Opened:
January 08, 2019
10:00 AM PT
Unable to access hotspots with third-party applications
After installing KB4480116, third-party applications may have difficulty authenticating hotspots. 

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 8.1
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2
Resolution: This issue is resolved in KB4476976

Back to top
OS Build 17763.253

January 08, 2019
KB4480116
Resolved
KB4476976
Resolved:
January 22, 2019
02:00 PM PT

Opened:
January 08, 2019
10:00 AM PT
@@ -121,14 +121,14 @@ sections: - type: markdown text: " - - - - - + + + + +
DetailsOriginating updateStatusHistory
Audio stops working after installing Intel audio driver
Upgrade block: Intel unintentionally released version 9.21.00.3755 of the Intel Smart Sound Technology (ISST) Driver through Windows Update and inadvertently offered it to a range of devices running Window 10, version 1709, 1803, and 1809. If a device contained a compatible audio driver, the new driver overrode it and caused audio to stop working.

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019
  • Server: Windows Server, version 1809; Windows Server 2019
Resolution: This issue was resolved in KB4468550 and the upgrade block removed. 

Back to top
OS Build 17763.134

November 13, 2018
KB4467708
Resolved
KB4468550
Resolved:
December 07, 2018
10:00 AM PT

Opened:
November 13, 2018
10:00 AM PT
Mapped drives fail to reconnect after login
Upgrade block: Network drives may fail to reconnect after booting and logging on to a Windows device. Symptoms include:  
  • In Windows Explorer, a red X appears on the mapped network drives. 
  • Mapped network drives show as Unavailable when you run the net use command from a command prompt. 
  • In the notification area, a notification displays the following message, \"Could not reconnect all network drives.\"
Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019
  • Server: Windows Server, version 1809; Windows Server 2019
Resolution: This issue was resolved in KB4469342 and the upgrade block removed. 

Back to top
OS Build 17763.134

November 13, 2018
KB4467708
Resolved
KB4469342
Resolved:
December 05, 2018
02:00 PM PT

Opened:
November 13, 2018
10:00 AM PT
Shared albums may not sync with iCloud for Windows
Upgrade block: Users who attempt to install iCloud for Windows (version 7.7.0.27) will see a message displayed that this version iCloud for Windows isn't supported and the install will fail.

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019
  • Server: Windows Server, version 1809; Windows Server 2019
To ensure a seamless experience, Microsoft is blocking devices with iCloud for Windows (version 7.7.0.27) software installed from being offered Window 10, version 1809 until this issue has been resolved. 

We recommend that you do not attempt to manually update using the Update now button or the Media Creation Tool from the Microsoft software download website until this issue is resolved. 
 
Resolution: Apple has released an updated version of iCloud for Windows (version 7.8.1) that resolves compatibility issues encountered when updating or synching Shared Albums after updating to Windows 10, version 1809. We recommend that you update your iCloud for Windows to version 7.8.1 when prompted before attempting to upgrade to Windows 10, version 1809. You can also manually download the latest version of iCloud for Windows by visiting https://support.apple.com/en-us/HT204283.

Back to top
OS Build 17763.134

November 13, 2018
KB4467708
Resolved
KB4482887
Resolved:
March 01, 2019
10:00 AM PT

Opened:
November 13, 2018
10:00 AM PT
Intel Audio Display (intcdaud.sys) notification during Windows 10 Setup
Upgrade block: Microsoft and Intel have identified a compatibility issue with a range of Intel Display Audio device drivers (intcdaud.sys, versions 10.25.0.3 - 10.25.0.8) that may result in excessive processor demand and reduced battery life. As a result, the update process to the Windows 10 October 2018 Update (Windows 10, version 1809) will fail and affected devices will automatically revert to the previous working configuration. 

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019
  • Server: Windows Server, version 1809; Windows Server 2019
If you see a \"What needs your attention\" notification during installation of the October 2018 Update, you have one of these affected drivers on your system. On the notification, click Back to remain on your current version of Windows 10. 
 
To ensure a seamless experience, we are blocking devices from being offered the October 2018 Update until updated Intel device drivers are installed on your current operating system. We recommend that you do not attempt to manually update to Windows 10, version 1809, using the Update Now button or the Media Creation Tool from the Microsoft Software Download Center until newer Intel device drivers are available with the update. You can either wait for newer drivers to be installed automatically through Windows Update or check with your computer manufacturer for the latest device driver software availability and installation procedures. For more information about this issue, see Intel's customer support guidance.
 
Resolution: This issue was resolved in KB4482887 and the upgrade block removed. 

Back to top
OS Build 17763.134

November 13, 2018
KB4467708
Resolved
KB4482887
Resolved:
March 01, 2019
10:00 AM PT

Opened:
November 13, 2018
10:00 AM PT
Office apps (32-bit) unable to use 'Save As…' function
Upgrade block: Microsoft and Morphisec have identified an issue on devices that have installed Morphisec Protector or another application that uses the Morphisec Software Development Kit (SDK) including Cisco AMP for Endpoints. These applications may impact customers' ability to use the 'Save As.'dialog when saving documents in 32-bit versions of Microsoft Office applications. Saving of files is not impacted.

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019
  • Server: Windows Server, version 1809; Windows Server 2019
Resolution: Morphisec and Cisco have released updated versions of their applications to address this issue. We recommend customers update to these minimum versions before attempting to attempting to upgrade to Windows 10, version 1809:
  • Morphisec Protector version 2.4.8 
  • Cisco AMP for Endpoints version 6.2.3.10814
An upgrade block remains in place for earlier versions of the applications than those listed above.

Back to top
OS Build 17763.134

November 13, 2018
KB4467708
Resolved
Resolved:
December 06, 2018
12:00 PM PT

Opened:
November 13, 2018
10:00 AM PT
Trend Micro OfficeScan and Worry-Free Business Security AV software not compatible
Upgrade block: Microsoft and Trend Micro have identified a compatibility issue with Trend Micro's OfficeScan and Worry-Free Business Security software when attempting to update to Windows 10, version 1809.

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019
  • Server: Windows Server, version 1809; Windows Server 2019 
Resolution: Trend Micro has released a new version of these products that resolves the issue. To download them, please visit the Trend Micro Business Support Portal.

Once you have updated your version of Trend Micro's OfficeScan or Worry-Free Business Security software, you will be offered Windows 10, version 1809 automatically. 

Back to top
OS Build 17763.134

November 13, 2018
KB4467708
Resolved
Resolved:
February 01, 2019
09:00 AM PT

Opened:
November 13, 2018
10:00 AM PT
Issues with lock screen and Microsoft Edge tabs for certain AMD Radeon video cards
Note: AMD no longer supports Radeon HD2000 and HD4000 series graphic processor units (GPUs).
 
Upgrade block: After updating to Window 10, version 1809, Microsoft Edge tabs may stop working when a device is configured with AMD Radeon HD2000 or HD4000 series video cards. Customers may get the following error code: \"INVALID_POINTER_READ_c0000005_atidxx64.dll\". 
 
Some users may also experience performance issues with the lock screen or the ShellExperienceHost. (The lock screen hosts widgets, and the ShellExperienceHost is responsible for assorted shell functionality.) 

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019
  • Server: Windows Server, version 1809; Windows Server 2019
Resolution: This issue was resolved in KB4487044, and the block was removed.

Back to top
OS Build 17763.134

November 13, 2018
KB4467708
Resolved
KB4487044
Resolved:
February 12, 2019
10:00 AM PT

Opened:
November 13, 2018
10:00 AM PT
F5 VPN clients losing network connectivity
Upgrade block: After updating to Window 10, version 1809, F5 VPN clients may lose network connectivity when the VPN service is in a split tunnel configuration.

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019
  • Server: Windows Server, version 1809; Windows Server 2019
Resolution: This issue was resolved in KB4482887 and the upgrade block removed. 

Back to top
OS Build 17763.134

November 13, 2018
KB4467708
Resolved
KB4482887
Resolved:
March 01, 2019
10:00 AM PT

Opened:
November 13, 2018
10:00 AM PT
Issues with lock screen and Microsoft Edge tabs for certain AMD Radeon video cards
Note: AMD no longer supports Radeon HD2000 and HD4000 series graphic processor units (GPUs).
 
Upgrade block: After updating to Window 10, version 1809, Microsoft Edge tabs may stop working when a device is configured with AMD Radeon HD2000 or HD4000 series video cards. Customers may get the following error code: \"INVALID_POINTER_READ_c0000005_atidxx64.dll\". 
 
Some users may also experience performance issues with the lock screen or the ShellExperienceHost. (The lock screen hosts widgets, and the ShellExperienceHost is responsible for assorted shell functionality.) 

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019
  • Server: Windows Server, version 1809; Windows Server 2019
Resolution: This issue was resolved in KB4487044, and the block was removed.

Back to top
OS Build 17763.134

November 13, 2018
KB4467708
Resolved
KB4487044
Resolved:
February 12, 2019
10:00 AM PT

Opened:
November 13, 2018
10:00 AM PT
Trend Micro OfficeScan and Worry-Free Business Security AV software not compatible
Upgrade block: Microsoft and Trend Micro have identified a compatibility issue with Trend Micro's OfficeScan and Worry-Free Business Security software when attempting to update to Windows 10, version 1809.

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019
  • Server: Windows Server, version 1809; Windows Server 2019 
Resolution: Trend Micro has released a new version of these products that resolves the issue. To download them, please visit the Trend Micro Business Support Portal.

Once you have updated your version of Trend Micro's OfficeScan or Worry-Free Business Security software, you will be offered Windows 10, version 1809 automatically. 

Back to top
OS Build 17763.134

November 13, 2018
KB4467708
Resolved
Resolved:
February 01, 2019
09:00 AM PT

Opened:
November 13, 2018
10:00 AM PT
Audio stops working after installing Intel audio driver
Upgrade block: Intel unintentionally released version 9.21.00.3755 of the Intel Smart Sound Technology (ISST) Driver through Windows Update and inadvertently offered it to a range of devices running Window 10, version 1709, 1803, and 1809. If a device contained a compatible audio driver, the new driver overrode it and caused audio to stop working.

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019
  • Server: Windows Server, version 1809; Windows Server 2019
Resolution: This issue was resolved in KB4468550 and the upgrade block removed. 

Back to top
OS Build 17763.134

November 13, 2018
KB4467708
Resolved
KB4468550
Resolved:
December 07, 2018
10:00 AM PT

Opened:
November 13, 2018
10:00 AM PT
Office apps (32-bit) unable to use 'Save As…' function
Upgrade block: Microsoft and Morphisec have identified an issue on devices that have installed Morphisec Protector or another application that uses the Morphisec Software Development Kit (SDK) including Cisco AMP for Endpoints. These applications may impact customers' ability to use the 'Save As.'dialog when saving documents in 32-bit versions of Microsoft Office applications. Saving of files is not impacted.

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019
  • Server: Windows Server, version 1809; Windows Server 2019
Resolution: Morphisec and Cisco have released updated versions of their applications to address this issue. We recommend customers update to these minimum versions before attempting to attempting to upgrade to Windows 10, version 1809:
  • Morphisec Protector version 2.4.8 
  • Cisco AMP for Endpoints version 6.2.3.10814
An upgrade block remains in place for earlier versions of the applications than those listed above.

Back to top
OS Build 17763.134

November 13, 2018
KB4467708
Resolved
Resolved:
December 06, 2018
12:00 PM PT

Opened:
November 13, 2018
10:00 AM PT
Mapped drives fail to reconnect after login
Upgrade block: Network drives may fail to reconnect after booting and logging on to a Windows device. Symptoms include:  
  • In Windows Explorer, a red X appears on the mapped network drives. 
  • Mapped network drives show as Unavailable when you run the net use command from a command prompt. 
  • In the notification area, a notification displays the following message, \"Could not reconnect all network drives.\"
Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019
  • Server: Windows Server, version 1809; Windows Server 2019
Resolution: This issue was resolved in KB4469342 and the upgrade block removed. 

Back to top
OS Build 17763.134

November 13, 2018
KB4467708
Resolved
KB4469342
Resolved:
December 05, 2018
02:00 PM PT

Opened:
November 13, 2018
10:00 AM PT
" @@ -137,7 +137,7 @@ sections: - type: markdown text: " - +
DetailsOriginating updateStatusHistory
Users cannot set Win32 program defaults
After installing KB4464330, some users cannot set Win32 program defaults for certain app and file type combinations using the Open with... command or Settings > Apps > Default apps.
 
In some cases, Microsoft Notepad or other Win32 programs cannot be set as the default. 

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803
Resolution: This issue is resolved in KB4469342

Back to top
OS Build 17763.55

October 09, 2018
KB4464330
Resolved
KB4469342
Resolved:
December 05, 2018
02:00 PM PT

Opened:
October 09, 2018
10:00 AM PT
Unable to use Seek bar in Windows Media Player
After installing KB4464330, users may not be able to use the Seek bar in Windows Media Player when playing specific files. This issue does not affect normal playback. 

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 8.1; Windows 7, Service Pack 1
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2; Windows Server 2008 R2 SP1
Resolution: This issue is resolved in KB4471332

Back to top
OS Build 17763.55

October 09, 2018
KB4464330
Resolved
KB4471332
Resolved:
December 11, 2018
10:00 AM PT

Opened:
October 09, 2018
10:00 AM PT
Users cannot set Win32 program defaults
After installing KB4464330, some users cannot set Win32 program defaults for certain app and file type combinations using the Open with... command or Settings > Apps > Default apps.
 
In some cases, Microsoft Notepad or other Win32 programs cannot be set as the default. 

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803
Resolution: This issue is resolved in KB4469342

Back to top
OS Build 17763.55

October 09, 2018
KB4464330
Resolved
KB4469342
Resolved:
December 05, 2018
02:00 PM PT

Opened:
October 09, 2018
10:00 AM PT
" diff --git a/windows/release-information/resolved-issues-windows-7-and-windows-server-2008-r2-sp1.yml b/windows/release-information/resolved-issues-windows-7-and-windows-server-2008-r2-sp1.yml index 8cd2595df5..12e2a0d6a9 100644 --- a/windows/release-information/resolved-issues-windows-7-and-windows-server-2008-r2-sp1.yml +++ b/windows/release-information/resolved-issues-windows-7-and-windows-server-2008-r2-sp1.yml @@ -32,18 +32,18 @@ sections: - type: markdown text: " - - - - + - - - + + + + + +
SummaryOriginating updateStatusDate resolved
Unable to use Seek bar in Windows Media Player
Users may not be able to use the Seek bar in Windows Media Player when playing specific files.

See details >
October 09, 2018
KB4462923
Resolved
KB4471318
December 11, 2018
10:00 AM PT
Event Viewer may not show some event descriptions for network interface cards.
The Event Viewer may not show some event descriptions for network interface cards (NIC).

See details >
October 18, 2018
KB4462927
Resolved
KB4489878
March 12, 2019
10:00 AM PT
Local Administrators unable to remotely access shares.
Local users who are part of the local Administrators group may not be able to remotely access shares on Windows Server 2008 R2 and Windows 7 machines.

See details >
January 08, 2019
KB4480970
Resolved
KB4487345
April 20, 2019
11:53 PM PT
Applications using Microsoft Jet database fail to open.
Applications that use a Microsoft Jet database with the Microsoft Access 97 file format may fail to open if column names are greater than 32 characters.

See details >
January 08, 2019
KB4480970
Resolved
KB4486563
February 12, 2019
10:00 AM PT
Virtual machines fail to restore.
Virtual machines (VMs) may fail to restore successfully if the VM has been saved and restored once before.

See details >
January 08, 2019
KB4480970
Resolved
KB4490511
April 21, 2019
12:00 AM PT
Local Administrators unable to remotely access shares.
Local users who are part of the local Administrators group may not be able to remotely access shares on Windows Server 2008 R2 and Windows 7 machines.

See details >
January 08, 2019
KB4480970
Resolved
KB4487345
April 20, 2019
11:53 PM PT
Internet Explorer 11 authentication issue with multiple concurrent logons.
Internet Explorer 11 users may encounter issues if two or more people use the same user account for multiple, concurrent login sessions on the same Windows Server machine.

See details >
January 08, 2019
KB4480970
Resolved
KB4493472
April 09, 2019
10:00 AM PT
First character of the Japanese era name not recognized as an abbreviation.
The first character of the Japanese era name is not recognized as an abbreviation and may cause date parsing issues.

See details >
January 17, 2019
KB4480955
Resolved
KB4486565
February 19, 2019
02:00 PM PT
Internet Explorer may fail to load images.
Internet Explorer may fail to load images with a backslash (\\) in their relative source path.

See details >
February 12, 2019
KB4486563
Resolved
KB4486565
February 19, 2019
02:00 PM PT
Applications using Microsoft Jet database and Access 95 file format stop working.
Applications that use a Microsoft Jet database with the Microsoft Access 95 file format may randomly stop working.

See details >
February 12, 2019
KB4486563
Resolved
KB4486565
February 19, 2019
02:00 PM PT
Custom URI schemes may not start corresponding application.
Custom URI schemes for application protocol handlers may not start the corresponding application for local intranet and trusted sites in Internet Explorer.

See details >
March 12, 2019
KB4489878
Resolved
KB4493472
April 09, 2019
10:00 AM PT
NETDOM.EXE fails to run.
NETDOM.EXE fails to run and the error, “The command failed to complete successfully.” appears on screen.

See details >
March 12, 2019
KB4489878
Resolved
KB4493472
April 09, 2019
10:00 AM PT
Devices may not respond at login or Welcome screen if running certain Avast software.
Devices running Avast for Business, Avast CloudCare, and AVG Business Edition antivirus software may become unresponsive after restart.

See details >
April 09, 2019
KB4493472
Resolved
April 09, 2019
10:00 AM PT
Event Viewer may not show some event descriptions for network interface cards.
The Event Viewer may not show some event descriptions for network interface cards (NIC).

See details >
October 18, 2018
KB4462927
Resolved
KB4489878
March 12, 2019
10:00 AM PT
First character of the Japanese era name not recognized as an abbreviation.
The first character of the Japanese era name is not recognized as an abbreviation and may cause date parsing issues.

See details >
January 17, 2019
KB4480955
Resolved
KB4486565
February 19, 2019
02:00 PM PT
Internet Explorer may fail to load images.
Internet Explorer may fail to load images with a backslash (\\) in their relative source path.

See details >
February 12, 2019
KB4486563
Resolved
KB4486565
February 19, 2019
02:00 PM PT
Applications using Microsoft Jet database and Access 95 file format stop working.
Applications that use a Microsoft Jet database with the Microsoft Access 95 file format may randomly stop working.

See details >
February 12, 2019
KB4486563
Resolved
KB4486565
February 19, 2019
02:00 PM PT
Applications using Microsoft Jet database fail to open.
Applications that use a Microsoft Jet database with the Microsoft Access 97 file format may fail to open if column names are greater than 32 characters.

See details >
January 08, 2019
KB4480970
Resolved
KB4486563
February 12, 2019
10:00 AM PT
Unable to use Seek bar in Windows Media Player
Users may not be able to use the Seek bar in Windows Media Player when playing specific files.

See details >
October 09, 2018
KB4462923
Resolved
KB4471318
December 11, 2018
10:00 AM PT
" @@ -88,11 +88,11 @@ sections: - type: markdown text: " - - + +
DetailsOriginating updateStatusHistory
Local Administrators unable to remotely access shares.
Local users who are part of the local Administrators group may not be able to remotely access shares on Windows Server 2008 R2 and Windows 7 machines after installing KB4480970. This does not affect domain accounts in the local Administrators group.
 
Affected platforms: 
  • Client: Windows 7, Service Pack 1 
  • Server: Windows Server 2008 R2 SP1 
Resolution: This issue is resolved in KB4487345.

Back to top
January 08, 2019
KB4480970
Resolved
KB4487345
Resolved:
January 11, 2019
02:00 PM PT

Opened:
January 08, 2019
10:00 AM PT
Applications using Microsoft Jet database fail to open.
Applications that use a Microsoft Jet database with the Microsoft Access 97 file format may fail to open if the database has column names greater than 32 characters. The database will fail to open with the error, “Unrecognized Database Format”.

Affected Platforms:
  • Client: Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 8.1; Windows 7, Service Pack 1 
  • Server: Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2; Windows Server 2008 R2 SP1 

Resolution: This issue is resolved in KB4486563.

Back to top
January 08, 2019
KB4480970
Resolved
KB4486563
Resolved:
February 12, 2019
10:00 AM PT

Opened:
January 08, 2019
10:00 AM PT
Virtual machines fail to restore.
After installing KB4480970, virtual machines (VM) may fail to restore successfully if the VM has been saved and restored once before. The error message is, “Failed to restore the virtual machine state: Cannot restore this virtual machine because the saved state data cannot be read. Delete the saved state data and then try to start the virtual machine. (0xC0370027).”

This affects AMD Bulldozer Family 15h, AMD Jaguar Family 16h, and AMD Puma Family 16h (second generation) microarchitectures.

Affected platforms: 
  • Client: Windows 7, Service Pack 1 
  • Server: Windows Server 2008 R2 SP1 
Resolution: This issue is resolved in KB4490511.

Back to top
January 08, 2019
KB4480970
Resolved
KB4490511
Resolved:
February 19, 2019
02:00 PM PT

Opened:
January 08, 2019
10:00 AM PT
Local Administrators unable to remotely access shares.
Local users who are part of the local Administrators group may not be able to remotely access shares on Windows Server 2008 R2 and Windows 7 machines after installing KB4480970. This does not affect domain accounts in the local Administrators group.
 
Affected platforms: 
  • Client: Windows 7, Service Pack 1 
  • Server: Windows Server 2008 R2 SP1 
Resolution: This issue is resolved in KB4487345.

Back to top
January 08, 2019
KB4480970
Resolved
KB4487345
Resolved:
January 11, 2019
02:00 PM PT

Opened:
January 08, 2019
10:00 AM PT
Internet Explorer 11 authentication issue with multiple concurrent logons.
After installing KB4480970, Internet Explorer 11 and other applications that use WININET.DLL may have authentication issues. This occurs when two or more people use the same user account for multiple, concurrent login sessions on the same Windows Server machine, including Remote Desktop Protocol (RDP) and Terminal Server logons. Symptoms reported by customers include, but may not be limited to:
  • Cache size and location show zero or empty.
  • Keyboard shortcuts may not work properly.
  • Webpages may intermittently fail to load or render correctly.
  • Issues with credential prompts.
  • Issues when downloading files.
Affected platforms: 
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10 Enterprise LTSC 2016; Windows 8.1; Windows 7, Service Pack 1 
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server 2016; Windows Server 2012 R2; Windows Server 2008 R2 SP1 
Resolution: This issue is resolved in KB4493472.

Back to top
January 08, 2019
KB4480970
Resolved
KB4493472
Resolved:
April 09, 2019
10:00 AM PT

Opened:
January 08, 2019
10:00 AM PT
First character of the Japanese era name not recognized as an abbreviation.
After installing KB4480955, the first character of the Japanese era name is not recognized as an abbreviation and may cause date parsing issues.

Affected platforms: 
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 8.1; Windows 7, Service Pack 1 
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2; Windows Server 2008 R2 SP1 
Resolution: This issue is resolved in KB4486565.

Back to top
January 17, 2019
KB4480955
Resolved
KB4486565
Resolved:
February 19, 2019
02:00 PM PT

Opened:
January 17, 2019
10:00 AM PT
Applications using Microsoft Jet database fail to open.
Applications that use a Microsoft Jet database with the Microsoft Access 97 file format may fail to open if the database has column names greater than 32 characters. The database will fail to open with the error, “Unrecognized Database Format”.

Affected Platforms:
  • Client: Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 8.1; Windows 7, Service Pack 1 
  • Server: Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2; Windows Server 2008 R2 SP1 

Resolution: This issue is resolved in KB4486563.

Back to top
January 08, 2019
KB4480970
Resolved
KB4486563
Resolved:
February 12, 2019
10:00 AM PT

Opened:
January 08, 2019
10:00 AM PT
" @@ -101,7 +101,7 @@ sections: - type: markdown text: " - +
DetailsOriginating updateStatusHistory
Unable to use Seek bar in Windows Media Player
After installing KB4462923, users may not be able to use the Seek Bar in Windows Media Player when playing specific files. This issue does not affect normal playback.

Affected platforms: 
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 8.1; Windows 7, Service Pack 1.
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2; Windows Server 2008 R2 SP1
Resolution: This issue is resolved in KB4471318.

Back to top
October 09, 2018
KB4462923
Resolved
KB4471318
Resolved:
December 11, 2018
10:00 AM PT

Opened:
October 09, 2018
10:00 AM PT
Event Viewer may not show some event descriptions for network interface cards.
After installing KB4462927, the Event Viewer may not show some event descriptions for network interface cards (NICs).

Affected Platforms:
  • Client: Windows 7, Service Pack 1 
  • Server: Windows Server 2008 R2 SP1 
Resolution: This issue is resolved in KB4489878.

Back to top
October 18, 2018
KB4462927
Resolved
KB4489878
Resolved:
March 12, 2019
10:00 AM PT

Opened:
October 18, 2018
10:00 AM PT
Unable to use Seek bar in Windows Media Player
After installing KB4462923, users may not be able to use the Seek Bar in Windows Media Player when playing specific files. This issue does not affect normal playback.

Affected platforms: 
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 8.1; Windows 7, Service Pack 1.
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2; Windows Server 2008 R2 SP1
Resolution: This issue is resolved in KB4471318.

Back to top
October 09, 2018
KB4462923
Resolved
KB4471318
Resolved:
December 11, 2018
10:00 AM PT

Opened:
October 09, 2018
10:00 AM PT
" diff --git a/windows/release-information/resolved-issues-windows-8.1-and-windows-server-2012-r2.yml b/windows/release-information/resolved-issues-windows-8.1-and-windows-server-2012-r2.yml index 384753a964..263bfc7ab0 100644 --- a/windows/release-information/resolved-issues-windows-8.1-and-windows-server-2012-r2.yml +++ b/windows/release-information/resolved-issues-windows-8.1-and-windows-server-2012-r2.yml @@ -32,19 +32,19 @@ sections: - type: markdown text: " - - - - - - + + + + + +
SummaryOriginating updateStatusDate resolved
Unable to use Seek bar in Windows Media Player
Users may not be able to use the Seek bar in Windows Media Player when playing specific files.

See details >
October 09, 2018
KB4462926
Resolved
KB4471320
December 11, 2018
10:00 AM PT
Unable to access hotspots with third-party applications
Third-party applications may have difficulty authenticating hotspots.

See details >
January 08, 2019
KB4480963
Resolved
KB4480969
January 15, 2019
10:00 AM PT
Applications using Microsoft Jet database fail to open
Applications that use a Microsoft Jet database with the Microsoft Access 97 file format may fail to open if column names are greater than 32 characters.

See details >
January 08, 2019
KB4480963
Resolved
KB4487000
February 12, 2019
10:00 AM PT
Virtual machines fail to restore
Virtual machines (VMs) may fail to restore successfully if the VM has been saved and restored once before.

See details >
January 08, 2019
KB4480963
Resolved
KB4490512
February 19, 2019
10:00 AM PT
Internet Explorer 11 authentication issue with multiple concurrent logons
Internet Explorer 11 users may encounter issues if two or more people use the same user account for multiple, concurrent login sessions on the same Windows Server machine.

See details >
January 08, 2019
KB4480963
Resolved
KB4493446
April 09, 2019
10:00 AM PT
MSXML6 may cause applications to stop responding.
MSXML6 may cause applications to stop responding if an exception was thrown during node operations, such as appendChild(), insertBefore(), and moveNode().

See details >
January 08, 2019
KB4480963
Resolved
KB4493446
April 09, 2019
10:00 AM PT
Error 1309 when installing/uninstalling MSI or MSP files
Users may receive “Error 1309” while installing or uninstalling certain types of MSI and MSP files.

See details >
February 19, 2019
KB4487016
Resolved
KB4489881
March 12, 2019
10:00 AM PT
Custom URI schemes may not start corresponding application
Custom URI schemes for application protocol handlers may not start the corresponding application for local intranet and trusted sites in Internet Explorer.

See details >
March 12, 2019
KB4489881
Resolved
KB4493446
April 09, 2019
10:00 AM PT
Devices with winsock kernel client may receive error
Devices with a winsock kernel client may receive D1, FC, and other errors.

See details >
March 12, 2019
KB4489881
Resolved
KB4489893
March 19, 2019
10:00 AM PT
Devices may not respond at login or Welcome screen if running certain Avast software
Devices running Avast for Business, Avast CloudCare, and AVG Business Edition antivirus software may become unresponsive after restart.

See details >
April 09, 2019
KB4493446
Resolved
April 09, 2019
10:00 AM PT
Embedded objects may display incorrectly
Any compound document (OLE) server application that places embedded objects into the Windows Metafile (WMF) using the PatBlt API may display embedded objects incorrectly.

See details >
February 12, 2019
KB4487000
Resolved
KB4493446
April 09, 2019
10:00 AM PT
Devices with winsock kernel client may receive error
Devices with a winsock kernel client may receive D1, FC, and other errors.

See details >
March 12, 2019
KB4489881
Resolved
KB4489893
March 19, 2019
10:00 AM PT
Error 1309 when installing/uninstalling MSI or MSP files
Users may receive “Error 1309” while installing or uninstalling certain types of MSI and MSP files.

See details >
February 19, 2019
KB4487016
Resolved
KB4489881
March 12, 2019
10:00 AM PT
First character of the Japanese era name not recognized as an abbreviation
The first character of the Japanese era name is not recognized as an abbreviation and may cause date parsing issues.

See details >
January 15, 2019
KB4480969
Resolved
KB4487016
February 19, 2019
02:00 PM PT
Internet Explorer may fail to load images
Internet Explorer may fail to load images with a backslash (\\) in their relative source path.

See details >
February 12, 2019
KB4487000
Resolved
KB4487016
February 19, 2019
02:00 PM PT
Virtual machines fail to restore
Virtual machines (VMs) may fail to restore successfully if the VM has been saved and restored once before.

See details >
January 08, 2019
KB4480963
Resolved
KB4490512
February 19, 2019
10:00 AM PT
Applications using Microsoft Jet database fail to open
Applications that use a Microsoft Jet database with the Microsoft Access 97 file format may fail to open if column names are greater than 32 characters.

See details >
January 08, 2019
KB4480963
Resolved
KB4487000
February 12, 2019
10:00 AM PT
Unable to access hotspots with third-party applications
Third-party applications may have difficulty authenticating hotspots.

See details >
January 08, 2019
KB4480963
Resolved
KB4480969
January 15, 2019
10:00 AM PT
Unable to use Seek bar in Windows Media Player
Users may not be able to use the Seek bar in Windows Media Player when playing specific files.

See details >
October 09, 2018
KB4462926
Resolved
KB4471320
December 11, 2018
10:00 AM PT
" @@ -79,8 +79,8 @@ sections: - type: markdown text: " - +
DetailsOriginating updateStatusHistory
Error 1309 when installing/uninstalling MSI or MSP files
After installing KB4487016, users may receive “Error 1309” while installing or uninstalling certain types of MSI and MSP files.

Affected platforms: 
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 8.1 
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2 
Resolution: This issue is resolved in KB4489881.

Back to top
February 19, 2019
KB4487016
Resolved
KB4489881
Resolved:
March 12, 2019
10:00 AM PT

Opened:
February 19, 2019
02:00 PM PT
Embedded objects may display incorrectly
Any compound document (OLE) server application that places embedded objects into the Windows Metafile (WMF) using the PatBlt API may display embedded objects incorrectly.

For example, if you paste a Microsoft Excel worksheet object into a Microsoft Word document, the cells may render with a different background color.

Affected platforms: 
  • Client: Windows 8.1 
  • Server: Windows Server 2012 R2 
Resolution: This issue is resolved in KB4493446.

Back to top
February 12, 2019
KB4487000
Resolved
KB4493446
Resolved:
April 09, 2019
10:00 AM PT

Opened:
February 12, 2019
10:00 AM PT
Error 1309 when installing/uninstalling MSI or MSP files
After installing KB4487016, users may receive “Error 1309” while installing or uninstalling certain types of MSI and MSP files.

Affected platforms: 
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 8.1 
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2 
Resolution: This issue is resolved in KB4489881.

Back to top
February 19, 2019
KB4487016
Resolved
KB4489881
Resolved:
March 12, 2019
10:00 AM PT

Opened:
February 19, 2019
02:00 PM PT
Internet Explorer may fail to load images
After installing KB4487000, Internet Explorer may fail to load images with a backslash (\\) in their relative source path.

Affected platforms: 
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 8.1; Windows 7, Service Pack 1 
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2; Windows Server 2008 R2 SP1 
Resolution: This issue is resolved in KB4487016.

Back to top
February 12, 2019
KB4487000
Resolved
KB4487016
Resolved:
February 19, 2019
02:00 PM PT

Opened:
February 12, 2019
10:00 AM PT
" @@ -90,12 +90,12 @@ sections: - type: markdown text: " - - - + + +
DetailsOriginating updateStatusHistory
Unable to access hotspots with third-party applications
After installing KB4480963, third-party applications may have difficulty authenticating hotspots.

Affected platforms: 
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 8.1 
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2 
Resolution: This issue is resolved in KB4480969.

Back to top
January 08, 2019
KB4480963
Resolved
KB4480969
Resolved:
January 15, 2019
10:00 AM PT

Opened:
January 08, 2019
10:00 AM PT
Applications using Microsoft Jet database fail to open
Applications that use a Microsoft Jet database with the Microsoft Access 97 file format may fail to open if the database has column names greater than 32 characters. The database will fail to open with the error, “Unrecognized Database Format”.

Affected platforms: 
  • Client: Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 8.1; Windows 7, Service Pack 1 
  • Server: Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2; Windows Server 2008 R2 SP1 
Resolution: This issue is resolved in KB4487000.

Back to top
January 08, 2019
KB4480963
Resolved
KB4487000
Resolved:
February 12, 2019
10:00 AM PT

Opened:
January 08, 2019
10:00 AM PT
Virtual machines fail to restore
After installing KB4480963, virtual machines (VM) may fail to restore successfully if the VM has been saved and restored once before. The error message is, “Failed to restore the virtual machine state: Cannot restore this virtual machine because the saved state data cannot be read. Delete the saved state data and then try to start the virtual machine. (0xC0370027).”

This affects AMD Bulldozer Family 15h, AMD Jaguar Family 16h, and AMD Puma Family 16h (second generation) microarchitectures.

Resolution: This issue is resolved in KB4490512.

Back to top
January 08, 2019
KB4480963
Resolved
KB4490512
Resolved:
February 19, 2019
02:00 PM PT

Opened:
January 08, 2019
10:00 AM PT
Internet Explorer 11 authentication issue with multiple concurrent logons
After installing KB4480963, Internet Explorer 11 and other applications that use WININET.DLL may have authentication issues. This occurs when two or more people use the same user account for multiple, concurrent login sessions on the same Windows Server machine, including Remote Desktop Protocol (RDP) and Terminal Server logons. Symptoms reported by customers include, but may not be limited to:
  • Cache size and location show zero or empty.
  • Keyboard shortcuts may not work properly.
  • Webpages may intermittently fail to load or render correctly.
  • Issues with credential prompts.
  • Issues when downloading files.
Affected platforms: 
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10 Enterprise LTSC 2016; Windows 8.1; Windows 7, Service Pack 1 
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server 2016; Windows Server 2012 R2; Windows Server 2008 R2 SP1 
Resolution: This issue is resolved in KB4493446.

Back to top
January 08, 2019
KB4480963
Resolved
KB4493446
Resolved:
April 09, 2019
10:00 AM PT

Opened:
January 08, 2019
10:00 AM PT
MSXML6 may cause applications to stop responding.
After installing KB4480963, MSXML6 causes applications to stop responding if an exception was thrown during node operations, such as appendChild(), insertBefore(), and moveNode().

The Group Policy editor may stop responding when editing a Group Policy Object (GPO) that contains Group Policy Preferences (GPP) for Internet Explorer 10 settings.

Resolution: This issue is resolved in KB4493446.

Back to top
January 08, 2019
KB4480963
Resolved
KB4493446
Resolved:
April 09, 2019
10:00 AM PT

Opened:
January 08, 2019
10:00 AM PT
First character of the Japanese era name not recognized as an abbreviation
After installing KB4480969, the first character of the Japanese era name is not recognized as an abbreviation and may cause date parsing issues.

Affected platforms: 
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 8.1; Windows 7, Service Pack 1 
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2; Windows Server 2008 R2 SP1 
Resolution: This issue is resolved in KB4487016.

Back to top
January 15, 2019
KB4480969
Resolved
KB4487016
Resolved:
February 19, 2019
02:00 PM PT

Opened:
January 15, 2019
10:00 AM PT
Virtual machines fail to restore
After installing KB4480963, virtual machines (VM) may fail to restore successfully if the VM has been saved and restored once before. The error message is, “Failed to restore the virtual machine state: Cannot restore this virtual machine because the saved state data cannot be read. Delete the saved state data and then try to start the virtual machine. (0xC0370027).”

This affects AMD Bulldozer Family 15h, AMD Jaguar Family 16h, and AMD Puma Family 16h (second generation) microarchitectures.

Resolution: This issue is resolved in KB4490512.

Back to top
January 08, 2019
KB4480963
Resolved
KB4490512
Resolved:
February 19, 2019
02:00 PM PT

Opened:
January 08, 2019
10:00 AM PT
Applications using Microsoft Jet database fail to open
Applications that use a Microsoft Jet database with the Microsoft Access 97 file format may fail to open if the database has column names greater than 32 characters. The database will fail to open with the error, “Unrecognized Database Format”.

Affected platforms: 
  • Client: Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 8.1; Windows 7, Service Pack 1 
  • Server: Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2; Windows Server 2008 R2 SP1 
Resolution: This issue is resolved in KB4487000.

Back to top
January 08, 2019
KB4480963
Resolved
KB4487000
Resolved:
February 12, 2019
10:00 AM PT

Opened:
January 08, 2019
10:00 AM PT
Unable to access hotspots with third-party applications
After installing KB4480963, third-party applications may have difficulty authenticating hotspots.

Affected platforms: 
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 8.1 
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2 
Resolution: This issue is resolved in KB4480969.

Back to top
January 08, 2019
KB4480963
Resolved
KB4480969
Resolved:
January 15, 2019
10:00 AM PT

Opened:
January 08, 2019
10:00 AM PT
" diff --git a/windows/release-information/resolved-issues-windows-server-2008-sp2.yml b/windows/release-information/resolved-issues-windows-server-2008-sp2.yml index 6a1922fb60..268887f9d8 100644 --- a/windows/release-information/resolved-issues-windows-server-2008-sp2.yml +++ b/windows/release-information/resolved-issues-windows-server-2008-sp2.yml @@ -32,11 +32,11 @@ sections: - type: markdown text: " - + + - @@ -55,11 +55,11 @@ sections: - type: markdown text: "
SummaryOriginating updateStatusDate resolved
Unable to use Seek bar in Windows Media Player
Users may not be able to use the Seek bar in Windows Media Player when playing specific files.

See details >
October 09, 2018
KB4463097
Resolved
KB4471325
April 25, 2019
03:28 PM PT
First character of the Japanese era name not recognized as an abbreviation
The first character of the Japanese era name is not recognized as an abbreviation and may cause date parsing issues.

See details >
January 17, 2019
KB4480974
Resolved
KB4489880
April 25, 2019
03:32 PM PT
Applications using Microsoft Jet database fail to open
Applications that use a Microsoft Jet database with the Microsoft Access 97 file format may fail to open if column names are greater than 32 characters.

See details >
January 08, 2019
KB4480968
Resolved
KB4487023
April 25, 2019
03:32 PM PT
Unable to use Seek bar in Windows Media Player
Users may not be able to use the Seek bar in Windows Media Player when playing specific files.

See details >
October 09, 2018
KB4463097
Resolved
KB4471325
April 25, 2019
03:28 PM PT
Virtual machines fail to restore
Virtual machines (VMs) may fail to restore successfully if the VM has been saved and restored once before.

See details >
January 08, 2019
KB4480968
Resolved
KB4490514
April 25, 2019
03:26 PM PT
Embedded objects may display incorrectly
Any compound document (OLE) server application that places embedded objects into the Windows Metafile (WMF) using the PatBlt API may display embedded objects incorrectly.

See details >
February 12, 2019
KB4487023
Resolved
KB4493471
April 25, 2019
03:26 PM PT
First character of the Japanese era name not recognized as an abbreviation
The first character of the Japanese era name is not recognized as an abbreviation and may cause date parsing issues.

See details >
January 17, 2019
KB4480974
Resolved
KB4489880
April 25, 2019
03:32 PM PT
Applications using Microsoft Jet database and Access 95 file format stop working
Applications that use a Microsoft Jet database with the Microsoft Access 95 file format may randomly stop working.

See details >
February 12, 2019
KB4487023
Resolved
KB4487022
April 25, 2019
03:26 PM PT
Local Administrators unable to remotely access shares
Local users who are part of the local Administrators group may not be able to remotely access shares on Windows Server 2008 R2 and Windows 7 machines.

See details >
January 08, 2019
KB4480968
Resolved
KB4487354
April 25, 2019
03:26 PM PT
NETDOM.EXE fails to run
NETDOM.EXE fails to run and the error, “The command failed to complete successfully.” appears on screen.

See details >
March 12, 2019
KB4489880
Resolved
KB4493471
April 25, 2019
03:25 PM PT
- + + - diff --git a/windows/release-information/resolved-issues-windows-server-2012.yml b/windows/release-information/resolved-issues-windows-server-2012.yml index 99f2455313..37579944b1 100644 --- a/windows/release-information/resolved-issues-windows-server-2012.yml +++ b/windows/release-information/resolved-issues-windows-server-2012.yml @@ -32,17 +32,17 @@ sections: - type: markdown text: "
DetailsOriginating updateStatusHistory
Unable to use Seek bar in Windows Media Player
After installing KB4463097, users may not be able to use the Seek Bar in Windows Media Player when playing specific files. This issue does not affect normal playback.

Affected platforms: 
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 8.1; Windows 7, Service Pack 1
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2; Windows Server 2012; Windows Server 2008 R2 SP1; Windows Server 2008 SP2
Resolution: This issue is resolved in KB4471325.

Back to top
October 09, 2018
KB4463097
Resolved
KB4471325
Resolved:
December 11, 2018
10:00 AM PT

Opened:
April 25, 2019
03:28 PM PT
First character of the Japanese era name not recognized as an abbreviation
After installing KB4480974, the first character of the Japanese era name is not recognized as an abbreviation and may cause date parsing issues.

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 8.1; Windows 7, Service Pack 1
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2; Windows Server 2012; Windows Server 2008 R2 SP1; Windows Server 2008 SP2
Resolution: This issue is resolved in KB4489880.

Back to top
January 17, 2019
KB4480974
Resolved
KB4489880
Resolved:
March 12, 2019
10:00 AM PT

Opened:
April 25, 2019
03:32 PM PT
Applications using Microsoft Jet database fail to open
Applications that use a Microsoft Jet database with the Microsoft Access 97 file format may fail to open if the database has column names greater than 32 characters. The database will fail to open with the error, “Unrecognized Database Format”.

Affected platforms: 
  • Client: Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 8.1; Windows 7, Service Pack 1 
  • Server: Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2; Windows Server 2012; Windows Server 2008 R2 SP1; Windows Server 2008 SP2
Resolution: This issue is resolved in KB4487023.

Back to top
January 08, 2019
KB4480968
Resolved
KB4487023
Resolved:
February 12, 2019
10:00 AM PT

Opened:
April 25, 2019
03:32 PM PT
Unable to use Seek bar in Windows Media Player
After installing KB4463097, users may not be able to use the Seek Bar in Windows Media Player when playing specific files. This issue does not affect normal playback.

Affected platforms: 
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 8.1; Windows 7, Service Pack 1
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2; Windows Server 2012; Windows Server 2008 R2 SP1; Windows Server 2008 SP2
Resolution: This issue is resolved in KB4471325.

Back to top
October 09, 2018
KB4463097
Resolved
KB4471325
Resolved:
December 11, 2018
10:00 AM PT

Opened:
April 25, 2019
03:28 PM PT
Virtual machines fail to restore
After installing KB4480968, virtual machines (VM) may fail to restore successfully if the VM has been saved and restored once before. The error message is, “Failed to restore the virtual machine state: Cannot restore this virtual machine because the saved state data cannot be read. Delete the saved state data and then try to start the virtual machine. (0xC0370027).”

This affects AMD Bulldozer Family 15h, AMD Jaguar Family 16h, and AMD Puma Family 16h (second generation) microarchitectures.

Affected platforms: 
  • Client: Windows 7, Service Pack 1 
  • Server: Windows Server 2012; Windows Server 2008 R2 SP1; Windows Server 2008 SP2
Resolution: This issue is resolved in KB4490514.

Back to top
January 08, 2019
KB4480968
Resolved
KB4490514
Resolved:
February 19, 2019
02:00 PM PT

Opened:
April 25, 2019
03:26 PM PT
Embedded objects may display incorrectly
Any compound document (OLE) server application that places embedded objects into the Windows Metafile (WMF) using the PatBlt API may display embedded objects incorrectly.

For example, if you paste a Microsoft Excel worksheet object into a Microsoft Word document, the cells may render with a different background color.

Affected platforms: 
  • Client: Windows 8.1 
  • Server: Windows Server 2012 R2; Windows Server 2012; Windows Server 2008 SP2
Resolution: This issue is resolved in KB4493471.

Back to top
February 12, 2019
KB4487023
Resolved
KB4493471
Resolved:
April 09, 2019
10:00 AM PT

Opened:
April 25, 2019
03:26 PM PT
First character of the Japanese era name not recognized as an abbreviation
After installing KB4480974, the first character of the Japanese era name is not recognized as an abbreviation and may cause date parsing issues.

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 8.1; Windows 7, Service Pack 1
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2; Windows Server 2012; Windows Server 2008 R2 SP1; Windows Server 2008 SP2
Resolution: This issue is resolved in KB4489880.

Back to top
January 17, 2019
KB4480974
Resolved
KB4489880
Resolved:
March 12, 2019
10:00 AM PT

Opened:
April 25, 2019
03:32 PM PT
Applications using Microsoft Jet database and Access 95 file format stop working
Applications that use a Microsoft Jet database with the Microsoft Access 95 file format may randomly stop working.

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 7, Service Pack 1
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012; Windows Server 2008 R2 SP1; Windows Server 2008 SP2
Resolution: This issue is resolved in KB4487022.

Back to top
February 12, 2019
KB4487023
Resolved
KB4487022
Resolved:
February 19, 2019
02:00 PM PT

Opened:
April 25, 2019
03:26 PM PT
Local Administrators unable to remotely access shares
Local users who are part of the local Administrators group may not be able to remotely access shares on Windows Server 2008 R2 and Windows 7 machines after installing KB4480968. This does not affect domain accounts in the local Administrators group.

Affected platforms: 
  • Client: Windows 7, Service Pack 1 
  • Server: Windows Server 2008 R2 SP1; Windows Server 2008 SP2
Resolution: This issue is resolved in KB4487354.

Back to top
January 08, 2019
KB4480968
Resolved
KB4487354
Resolved:
January 11, 2019
02:00 PM PT

Opened:
April 25, 2019
03:26 PM PT
NETDOM.EXE fails to run
After installing KB4489880, NETDOM.EXE fails to run, and the on-screen error, “The command failed to complete successfully.” appears.

Affected platforms: 
  • Client: Windows 7, Service Pack 1 
  • Server: Windows Server 2008 R2 SP1; Windows Server 2008 SP2
Resolution: This issue is resolved in KB4493471.

Back to top
March 12, 2019
KB4489880
Resolved
KB4493471
Resolved:
April 09, 2019
10:00 AM PT

Opened:
April 25, 2019
03:25 PM PT
- - - - - + + + + - - - - + + + + +
SummaryOriginating updateStatusDate resolved
Unable to use Seek bar in Windows Media Player
Users may not be able to use the Seek bar in Windows Media Player when playing specific files.

See details >
October 09, 2018
KB4462929
Resolved
KB4471330
April 25, 2019
02:47 PM PT
Event Viewer may not show some event descriptions for network interface cards
The Event Viewer may not show some event descriptions for network interface cards (NIC).

See details >
September 11, 2018
KB4457135
Resolved
KB4489891
April 25, 2019
03:10 PM PT
Unable to access hotspots with third-party applications
Third-party applications may have difficulty authenticating hotspots.

See details >
January 08, 2019
KB4480975
Resolved
KB4480971
April 25, 2019
03:14 PM PT
Applications using Microsoft Jet database fail to open
Applications that use a Microsoft Jet database with the Microsoft Access 97 file format may fail to open if column names are greater than 32 characters.

See details >
January 08, 2019
KB4480975
Resolved
KB4487025
April 25, 2019
03:19 PM PT
Virtual machines fail to restore
Virtual machines (VMs) may fail to restore successfully if the VM has been saved and restored once before.

See details >
January 08, 2019
KB4480975
Resolved
KB4490516
April 25, 2019
03:22 PM PT
Applications using Microsoft Jet database and Access 95 file format stop working
Applications that use a Microsoft Jet database with the Microsoft Access 95 file format may randomly stop working.

See details >
February 12, 2019
KB4487025
Resolved
KB4487024
April 25, 2019
04:04 PM PT
First character of the Japanese era name not recognized as an abbreviation
The first character of the Japanese era name is not recognized as an abbreviation and may cause date parsing issues.

See details >
January 15, 2019
KB4480971
Resolved
KB4487024
April 25, 2019
04:02 PM PT
Embedded objects may display incorrectly
Any compound document (OLE) server application that places embedded objects into the Windows Metafile (WMF) using the PatBlt API may display embedded objects incorrectly.

See details >
February 12, 2019
KB4487025
Resolved
KB4493451
April 25, 2019
04:00 PM PT
Error 1309 when installing/uninstalling MSI or MSP files
Users may receive “Error 1309” while installing or uninstalling certain types of MSI and MSP files.

See details >
February 12, 2019
KB4487025
Resolved
KB4489891
April 25, 2019
03:36 PM PT
Internet Explorer 11 authentication issue with multiple concurrent logons
Internet Explorer 11 users may encounter issues if two or more people use the same user account for multiple, concurrent login sessions on the same Windows Server machine.

See details >
January 08, 2019
KB4480975
Resolved
KB4493451
April 25, 2019
03:34 PM PT
MSXML6 may cause applications to stop responding
MSXML6 may cause applications to stop responding if an exception was thrown during node operations, such as appendChild(), insertBefore(), and moveNode().

See details >
January 08, 2019
KB4480975
Resolved
KB4493451
April 25, 2019
03:27 PM PT
Error 1309 when installing/uninstalling MSI or MSP files
Users may receive “Error 1309” while installing or uninstalling certain types of MSI and MSP files.

See details >
February 12, 2019
KB4487025
Resolved
KB4489891
April 25, 2019
03:36 PM PT
Embedded objects may display incorrectly
Any compound document (OLE) server application that places embedded objects into the Windows Metafile (WMF) using the PatBlt API may display embedded objects incorrectly.

See details >
February 12, 2019
KB4487025
Resolved
KB4493451
April 25, 2019
04:00 PM PT
First character of the Japanese era name not recognized as an abbreviation
The first character of the Japanese era name is not recognized as an abbreviation and may cause date parsing issues.

See details >
January 15, 2019
KB4480971
Resolved
KB4487024
April 25, 2019
04:02 PM PT
Applications using Microsoft Jet database and Access 95 file format stop working
Applications that use a Microsoft Jet database with the Microsoft Access 95 file format may randomly stop working.

See details >
February 12, 2019
KB4487025
Resolved
KB4487024
April 25, 2019
04:04 PM PT
Virtual machines fail to restore
Virtual machines (VMs) may fail to restore successfully if the VM has been saved and restored once before.

See details >
January 08, 2019
KB4480975
Resolved
KB4490516
April 25, 2019
03:22 PM PT
Applications using Microsoft Jet database fail to open
Applications that use a Microsoft Jet database with the Microsoft Access 97 file format may fail to open if column names are greater than 32 characters.

See details >
January 08, 2019
KB4480975
Resolved
KB4487025
April 25, 2019
03:19 PM PT
Unable to access hotspots with third-party applications
Third-party applications may have difficulty authenticating hotspots.

See details >
January 08, 2019
KB4480975
Resolved
KB4480971
April 25, 2019
03:14 PM PT
Event Viewer may not show some event descriptions for network interface cards
The Event Viewer may not show some event descriptions for network interface cards (NIC).

See details >
September 11, 2018
KB4457135
Resolved
KB4489891
April 25, 2019
03:10 PM PT
Unable to use Seek bar in Windows Media Player
Users may not be able to use the Seek bar in Windows Media Player when playing specific files.

See details >
October 09, 2018
KB4462929
Resolved
KB4471330
April 25, 2019
02:47 PM PT
" @@ -58,16 +58,16 @@ sections: - type: markdown text: " - - - - - + + + + - - - - + + + + +
DetailsOriginating updateStatusHistory
Unable to use Seek bar in Windows Media Player
After installing KB4462929, users may not be able to use the Seek Bar in Windows Media Player when playing specific files. This issue does not affect normal playback.

Resolution: This issue is resolved in KB4471330.

Back to top
October 09, 2018
KB4462929
Resolved
KB4471330
Resolved:
December 11, 2018
10:00 AM PT

Opened:
April 25, 2019
02:47 PM PT
Event Viewer may not show some event descriptions for network interface cards
After installing KB4457135, the Event Viewer may not show some event descriptions for network interface cards (NICs).

Resolution: This issue is resolved in KB4489891.

Back to top
September 11, 2018
KB4457135
Resolved
KB4489891
Resolved:
March 12, 2019
10:00 AM PT

Opened:
April 25, 2019
03:10 PM PT
Unable to access hotspots with third-party applications
After installing KB4480975, third-party applications may have difficulty authenticating hotspots.

Resolution: This issue is resolved in KB4480971.

Back to top
January 08, 2019
KB4480975
Resolved
KB4480971
Resolved:
January 15, 2019
10:00 AM PT

Opened:
April 25, 2019
03:14 PM PT
Applications using Microsoft Jet database fail to open
Applications that use a Microsoft Jet database with the Microsoft Access 97 file format may fail to open if the database has column names greater than 32 characters. The database will fail to open with the error, \"Unrecognized Database Format\".

Resolution: This issue is resolved in KB4487025.

Back to top
January 08, 2019
KB4480975
Resolved
KB4487025
Resolved:
February 12, 2019
10:00 AM PT

Opened:
April 25, 2019
03:19 PM PT
Virtual machines fail to restore
After installing KB4480975, virtual machines (VM) may fail to restore successfully if the VM has been saved and restored once before. The error message is, \"Failed to restore the virtual machine state: Cannot restore this virtual machine because the saved state data cannot be read. Delete the saved state data and then try to start the virtual machine. (0xC0370027).\"

This affects AMD Bulldozer Family 15h, AMD Jaguar Family 16h, and AMD Puma Family 16h (second generation) microarchitectures.

Resolution: This issue is resolved in KB4490516.

Back to top
January 08, 2019
KB4480975
Resolved
KB4490516
Resolved:
February 19, 2019
02:00 PM PT

Opened:
April 25, 2019
03:22 PM PT
Applications using Microsoft Jet database and Access 95 file format stop working
Applications that use a Microsoft Jet database with the Microsoft Access 95 file format may randomly stop working.

Resolution: This issue is resolved in KB4487024.

Back to top
February 12, 2019
KB4487025
Resolved
KB4487024
Resolved:
February 19, 2019
02:00 PM PT

Opened:
April 25, 2019
04:04 PM PT
First character of the Japanese era name not recognized as an abbreviation
After installing KB4480971, the first character of the Japanese era name is not recognized as an abbreviation and may cause date parsing issues.

Resolution: This issue is resolved in KB4487024.

Back to top
January 15, 2019
KB4480971
Resolved
KB4487024
Resolved:
February 19, 2019
02:00 PM PT

Opened:
April 25, 2019
04:01 PM PT
Embedded objects may display incorrectly
Any compound document (OLE) server application that places embedded objects into the Windows Metafile (WMF) using the PatBlt API may display embedded objects incorrectly.

For example, if you paste a Microsoft Excel worksheet object into a Microsoft Word document, the cells may render with a different background color.

Resolution: This issue is resolved in KB4493451.

Back to top
February 12, 2019
KB4487025
Resolved
KB4493451
Resolved:
April 09, 2019
10:00 AM PT

Opened:
April 25, 2019
04:00 PM PT
Error 1309 when installing/uninstalling MSI or MSP files
After installing KB4487025, users may receive \"Error 1309\" while installing or uninstalling certain types of MSI and MSP files.

Resolution: This issue is resolved in KB4489891.

Back to top
February 12, 2019
KB4487025
Resolved
KB4489891
Resolved:
March 12, 2019
10:00 AM PT

Opened:
April 25, 2019
03:36 PM PT
Internet Explorer 11 authentication issue with multiple concurrent logons
After installing KB4480975, Internet Explorer 11 and other applications that use WININET.DLL may have authentication issues. This occurs when two or more people use the same user account for multiple, concurrent login sessions on the same Windows Server machine, including Remote Desktop Protocol (RDP) and Terminal Server logons. Symptoms reported by customers include, but may not be limited to:
  • Cache size and location show zero or empty.
  • Keyboard shortcuts may not work properly.
  • Webpages may intermittently fail to load or render correctly.
  • Issues with credential prompts.
  • Issues when downloading files.
Resolution: This issue is resolved in KB4493451.

Back to top
January 08, 2019
KB4480975
Resolved
KB4493451
Resolved:
April 09, 2019
10:00 AM PT

Opened:
April 25, 2019
03:34 PM PT
MSXML6 may cause applications to stop responding
After installing KB4480975, MSXML6 causes applications to stop responding if an exception was thrown during node operations, such as appendChild(), insertBefore(), and moveNode().

The Group Policy editor may stop responding when editing a Group Policy Object (GPO) that contains Group Policy Preferences (GPP) for Internet Explorer 10 settings.

Resolution: This issue is resolved in KB4493451.

Back to top
January 08, 2019
KB4480975
Resolved
KB4493451
Resolved:
April 09, 2019
10:00 AM PT

Opened:
April 25, 2019
03:27 PM PT
Error 1309 when installing/uninstalling MSI or MSP files
After installing KB4487025, users may receive \"Error 1309\" while installing or uninstalling certain types of MSI and MSP files.

Resolution: This issue is resolved in KB4489891.

Back to top
February 12, 2019
KB4487025
Resolved
KB4489891
Resolved:
March 12, 2019
10:00 AM PT

Opened:
April 25, 2019
03:36 PM PT
Embedded objects may display incorrectly
Any compound document (OLE) server application that places embedded objects into the Windows Metafile (WMF) using the PatBlt API may display embedded objects incorrectly.

For example, if you paste a Microsoft Excel worksheet object into a Microsoft Word document, the cells may render with a different background color.

Resolution: This issue is resolved in KB4493451.

Back to top
February 12, 2019
KB4487025
Resolved
KB4493451
Resolved:
April 09, 2019
10:00 AM PT

Opened:
April 25, 2019
04:00 PM PT
First character of the Japanese era name not recognized as an abbreviation
After installing KB4480971, the first character of the Japanese era name is not recognized as an abbreviation and may cause date parsing issues.

Resolution: This issue is resolved in KB4487024.

Back to top
January 15, 2019
KB4480971
Resolved
KB4487024
Resolved:
February 19, 2019
02:00 PM PT

Opened:
April 25, 2019
04:01 PM PT
Applications using Microsoft Jet database and Access 95 file format stop working
Applications that use a Microsoft Jet database with the Microsoft Access 95 file format may randomly stop working.

Resolution: This issue is resolved in KB4487024.

Back to top
February 12, 2019
KB4487025
Resolved
KB4487024
Resolved:
February 19, 2019
02:00 PM PT

Opened:
April 25, 2019
04:04 PM PT
Virtual machines fail to restore
After installing KB4480975, virtual machines (VM) may fail to restore successfully if the VM has been saved and restored once before. The error message is, \"Failed to restore the virtual machine state: Cannot restore this virtual machine because the saved state data cannot be read. Delete the saved state data and then try to start the virtual machine. (0xC0370027).\"

This affects AMD Bulldozer Family 15h, AMD Jaguar Family 16h, and AMD Puma Family 16h (second generation) microarchitectures.

Resolution: This issue is resolved in KB4490516.

Back to top
January 08, 2019
KB4480975
Resolved
KB4490516
Resolved:
February 19, 2019
02:00 PM PT

Opened:
April 25, 2019
03:22 PM PT
Applications using Microsoft Jet database fail to open
Applications that use a Microsoft Jet database with the Microsoft Access 97 file format may fail to open if the database has column names greater than 32 characters. The database will fail to open with the error, \"Unrecognized Database Format\".

Resolution: This issue is resolved in KB4487025.

Back to top
January 08, 2019
KB4480975
Resolved
KB4487025
Resolved:
February 12, 2019
10:00 AM PT

Opened:
April 25, 2019
03:19 PM PT
Unable to access hotspots with third-party applications
After installing KB4480975, third-party applications may have difficulty authenticating hotspots.

Resolution: This issue is resolved in KB4480971.

Back to top
January 08, 2019
KB4480975
Resolved
KB4480971
Resolved:
January 15, 2019
10:00 AM PT

Opened:
April 25, 2019
03:14 PM PT
Event Viewer may not show some event descriptions for network interface cards
After installing KB4457135, the Event Viewer may not show some event descriptions for network interface cards (NICs).

Resolution: This issue is resolved in KB4489891.

Back to top
September 11, 2018
KB4457135
Resolved
KB4489891
Resolved:
March 12, 2019
10:00 AM PT

Opened:
April 25, 2019
03:10 PM PT
Unable to use Seek bar in Windows Media Player
After installing KB4462929, users may not be able to use the Seek Bar in Windows Media Player when playing specific files. This issue does not affect normal playback.

Resolution: This issue is resolved in KB4471330.

Back to top
October 09, 2018
KB4462929
Resolved
KB4471330
Resolved:
December 11, 2018
10:00 AM PT

Opened:
April 25, 2019
02:47 PM PT
" diff --git a/windows/release-information/status-windows-10-1809-and-windows-server-2019.yml b/windows/release-information/status-windows-10-1809-and-windows-server-2019.yml index 2445fa356b..7af6ee2e61 100644 --- a/windows/release-information/status-windows-10-1809-and-windows-server-2019.yml +++ b/windows/release-information/status-windows-10-1809-and-windows-server-2019.yml @@ -70,8 +70,8 @@ sections:
Audio not working on monitors or TV connected to a PC via HDMI, USB, or DisplayPort
Upgrade block: Microsoft has identified issues with certain new Intel display drivers, which accidentally turn on unsupported features in Windows.

See details >OS Build 17763.134

November 13, 2018
KB4467708Mitigated
March 15, 2019
12:00 PM PT
End-user-defined characters (EUDC) may cause blue screen at startup
If you enable per font end-user-defined characters (EUDC), the system may stop working and a blue screen may appear at startup.

See details >OS Build 17763.404

April 02, 2019
KB4490481Resolved
KB4493509April 09, 2019
10:00 AM PT
Internet Explorer 11 authentication issue with multiple concurrent logons
Internet Explorer 11 users may encounter issues if two or more people use the same user account for multiple, concurrent login sessions on the same Windows Server machine.

See details >OS Build 17763.253

January 08, 2019
KB4480116Resolved
KB4493509April 09, 2019
10:00 AM PT -
Apps may stop working after selecting an audio output device other than the default
Users with multiple audio devices that select an audio output device different from the \"Default Audio Device\" may find certain applications stop working unexpectedly.

See details >OS Build 17763.348

March 01, 2019
KB4482887Resolved
KB4490481April 02, 2019
10:00 AM PT
MSXML6 may cause applications to stop responding
MSXML6 may cause applications to stop responding if an exception was thrown during node operations, such as appendChild(), insertBefore(), and moveNode().

See details >OS Build 17763.253

January 08, 2019
KB4480116Resolved
KB4493509April 09, 2019
10:00 AM PT +
Apps may stop working after selecting an audio output device other than the default
Users with multiple audio devices that select an audio output device different from the \"Default Audio Device\" may find certain applications stop working unexpectedly.

See details >OS Build 17763.348

March 01, 2019
KB4482887Resolved
KB4490481April 02, 2019
10:00 AM PT " diff --git a/windows/release-information/status-windows-7-and-windows-server-2008-r2-sp1.yml b/windows/release-information/status-windows-7-and-windows-server-2008-r2-sp1.yml index a037436879..916fee0d5e 100644 --- a/windows/release-information/status-windows-7-and-windows-server-2008-r2-sp1.yml +++ b/windows/release-information/status-windows-7-and-windows-server-2008-r2-sp1.yml @@ -64,8 +64,8 @@ sections:
Authentication may fail for services after the Kerberos ticket expires.
Authentication may fail for services that require unconstrained delegation after the Kerberos ticket expires.

See details >March 12, 2019
KB4489878Mitigated
April 09, 2019
10:00 AM PT
System unresponsive after restart if Sophos Endpoint Protection installed.
Devices with Sophos Endpoint Protection installed and managed by Sophos Central or Sophos Enterprise Console (SEC) may become unresponsive upon restart.

See details >April 09, 2019
KB4493472Mitigated
April 09, 2019
10:00 AM PT
System may be unresponsive after restart if ArcaBit antivirus software installed.
Devices with ArcaBit antivirus software installed may become unresponsive upon restart.

See details >April 09, 2019
KB4493472Mitigated
April 09, 2019
10:00 AM PT -
Local Administrators unable to remotely access shares.
Local users who are part of the local Administrators group may not be able to remotely access shares on Windows Server 2008 R2 and Windows 7 machines.

See details >January 08, 2019
KB4480970Resolved
KB4487345April 20, 2019
11:53 PM PT
Virtual machines fail to restore.
Virtual machines (VMs) may fail to restore successfully if the VM has been saved and restored once before.

See details >January 08, 2019
KB4480970Resolved
KB4490511April 21, 2019
12:00 AM PT +
Local Administrators unable to remotely access shares.
Local users who are part of the local Administrators group may not be able to remotely access shares on Windows Server 2008 R2 and Windows 7 machines.

See details >January 08, 2019
KB4480970Resolved
KB4487345April 20, 2019
11:53 PM PT
Internet Explorer 11 authentication issue with multiple concurrent logons.
Internet Explorer 11 users may encounter issues if two or more people use the same user account for multiple, concurrent login sessions on the same Windows Server machine.

See details >January 08, 2019
KB4480970Resolved
KB4493472April 09, 2019
10:00 AM PT
Custom URI schemes may not start corresponding application.
Custom URI schemes for application protocol handlers may not start the corresponding application for local intranet and trusted sites in Internet Explorer.

See details >March 12, 2019
KB4489878Resolved
KB4493472April 09, 2019
10:00 AM PT
NETDOM.EXE fails to run.
NETDOM.EXE fails to run and the error, “The command failed to complete successfully.” appears on screen.

See details >March 12, 2019
KB4489878Resolved
KB4493472April 09, 2019
10:00 AM PT @@ -108,8 +108,8 @@ sections: - type: markdown text: " - +
DetailsOriginating updateStatusHistory
Local Administrators unable to remotely access shares.
Local users who are part of the local Administrators group may not be able to remotely access shares on Windows Server 2008 R2 and Windows 7 machines after installing KB4480970. This does not affect domain accounts in the local Administrators group.
 
Affected platforms: 
  • Client: Windows 7, Service Pack 1 
  • Server: Windows Server 2008 R2 SP1 
Resolution: This issue is resolved in KB4487345.

Back to top
January 08, 2019
KB4480970
Resolved
KB4487345
Resolved:
January 11, 2019
02:00 PM PT

Opened:
January 08, 2019
10:00 AM PT
Virtual machines fail to restore.
After installing KB4480970, virtual machines (VM) may fail to restore successfully if the VM has been saved and restored once before. The error message is, “Failed to restore the virtual machine state: Cannot restore this virtual machine because the saved state data cannot be read. Delete the saved state data and then try to start the virtual machine. (0xC0370027).”

This affects AMD Bulldozer Family 15h, AMD Jaguar Family 16h, and AMD Puma Family 16h (second generation) microarchitectures.

Affected platforms: 
  • Client: Windows 7, Service Pack 1 
  • Server: Windows Server 2008 R2 SP1 
Resolution: This issue is resolved in KB4490511.

Back to top
January 08, 2019
KB4480970
Resolved
KB4490511
Resolved:
February 19, 2019
02:00 PM PT

Opened:
January 08, 2019
10:00 AM PT
Local Administrators unable to remotely access shares.
Local users who are part of the local Administrators group may not be able to remotely access shares on Windows Server 2008 R2 and Windows 7 machines after installing KB4480970. This does not affect domain accounts in the local Administrators group.
 
Affected platforms: 
  • Client: Windows 7, Service Pack 1 
  • Server: Windows Server 2008 R2 SP1 
Resolution: This issue is resolved in KB4487345.

Back to top
January 08, 2019
KB4480970
Resolved
KB4487345
Resolved:
January 11, 2019
02:00 PM PT

Opened:
January 08, 2019
10:00 AM PT
Internet Explorer 11 authentication issue with multiple concurrent logons.
After installing KB4480970, Internet Explorer 11 and other applications that use WININET.DLL may have authentication issues. This occurs when two or more people use the same user account for multiple, concurrent login sessions on the same Windows Server machine, including Remote Desktop Protocol (RDP) and Terminal Server logons. Symptoms reported by customers include, but may not be limited to:
  • Cache size and location show zero or empty.
  • Keyboard shortcuts may not work properly.
  • Webpages may intermittently fail to load or render correctly.
  • Issues with credential prompts.
  • Issues when downloading files.
Affected platforms: 
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10 Enterprise LTSC 2016; Windows 8.1; Windows 7, Service Pack 1 
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server 2016; Windows Server 2012 R2; Windows Server 2008 R2 SP1 
Resolution: This issue is resolved in KB4493472.

Back to top
January 08, 2019
KB4480970
Resolved
KB4493472
Resolved:
April 09, 2019
10:00 AM PT

Opened:
January 08, 2019
10:00 AM PT
" diff --git a/windows/release-information/status-windows-server-2008-sp2.yml b/windows/release-information/status-windows-server-2008-sp2.yml index 9aa6c059f4..935a789240 100644 --- a/windows/release-information/status-windows-server-2008-sp2.yml +++ b/windows/release-information/status-windows-server-2008-sp2.yml @@ -63,11 +63,11 @@ sections:
System may be unresponsive after restart if Avira antivirus software installed
Devices with Avira antivirus software installed may become unresponsive upon restart.

See details >April 09, 2019
KB4493471Investigating
April 25, 2019
03:26 PM PT
System unresponsive after restart if Sophos Endpoint Protection installed
Devices with Sophos Endpoint Protection installed and managed by Sophos Central or Sophos Enterprise Console (SEC) may become unresponsive upon restart.

See details >April 09, 2019
KB4493471Mitigated
April 25, 2019
03:26 PM PT
Authentication may fail for services after the Kerberos ticket expires
Authentication may fail for services that require unconstrained delegation after the Kerberos ticket expires.

See details >March 12, 2019
KB4489880Mitigated
April 25, 2019
03:24 PM PT -
Unable to use Seek bar in Windows Media Player
Users may not be able to use the Seek bar in Windows Media Player when playing specific files.

See details >October 09, 2018
KB4463097Resolved
KB4471325April 25, 2019
03:28 PM PT +
First character of the Japanese era name not recognized as an abbreviation
The first character of the Japanese era name is not recognized as an abbreviation and may cause date parsing issues.

See details >January 17, 2019
KB4480974Resolved
KB4489880April 25, 2019
03:32 PM PT
Applications using Microsoft Jet database fail to open
Applications that use a Microsoft Jet database with the Microsoft Access 97 file format may fail to open if column names are greater than 32 characters.

See details >January 08, 2019
KB4480968Resolved
KB4487023April 25, 2019
03:32 PM PT +
Unable to use Seek bar in Windows Media Player
Users may not be able to use the Seek bar in Windows Media Player when playing specific files.

See details >October 09, 2018
KB4463097Resolved
KB4471325April 25, 2019
03:28 PM PT
Virtual machines fail to restore
Virtual machines (VMs) may fail to restore successfully if the VM has been saved and restored once before.

See details >January 08, 2019
KB4480968Resolved
KB4490514April 25, 2019
03:26 PM PT
Embedded objects may display incorrectly
Any compound document (OLE) server application that places embedded objects into the Windows Metafile (WMF) using the PatBlt API may display embedded objects incorrectly.

See details >February 12, 2019
KB4487023Resolved
KB4493471April 25, 2019
03:26 PM PT -
First character of the Japanese era name not recognized as an abbreviation
The first character of the Japanese era name is not recognized as an abbreviation and may cause date parsing issues.

See details >January 17, 2019
KB4480974Resolved
KB4489880April 25, 2019
03:32 PM PT
Applications using Microsoft Jet database and Access 95 file format stop working
Applications that use a Microsoft Jet database with the Microsoft Access 95 file format may randomly stop working.

See details >February 12, 2019
KB4487023Resolved
KB4487022April 25, 2019
03:26 PM PT
Local Administrators unable to remotely access shares
Local users who are part of the local Administrators group may not be able to remotely access shares on Windows Server 2008 R2 and Windows 7 machines.

See details >January 08, 2019
KB4480968Resolved
KB4487354April 25, 2019
03:26 PM PT
NETDOM.EXE fails to run
NETDOM.EXE fails to run and the error, “The command failed to complete successfully.” appears on screen.

See details >March 12, 2019
KB4489880Resolved
KB4493471April 25, 2019
03:25 PM PT @@ -89,11 +89,11 @@ sections:
System may be unresponsive after restart if Avira antivirus software installed
Microsoft and Avira have identified an issue on devices with Avira antivirus software installed that may cause the system to become unresponsive upon restart after installing KB4493471.

Microsoft has temporarily blocked devices from receiving this update if Avira antivirus software is installed.

Affected platforms: 
  • Client: Windows 8.1; Windows 7, Service Pack 1 
  • Server: Windows Server 2012 R2; Windows Server 2012; Windows Server 2008 R2 SP1; Windows Server 2008 SP2
Next steps: We are presently investigating this issue with Avira and will provide an update when available.

Back to topApril 09, 2019
KB4493471Investigating
Last updated:
April 25, 2019
03:26 PM PT

Opened:
April 25, 2019
03:26 PM PT
System unresponsive after restart if Sophos Endpoint Protection installed
Microsoft and Sophos have identified an issue on devices with Sophos Endpoint Protection installed and managed by either Sophos Central or Sophos Enterprise Console (SEC) that may cause the system to become unresponsive upon restart after installing KB4493471.

Microsoft has temporarily blocked devices from receiving this update if the Sophos Endpoint is installed until a solution is available.

Guidance for Sophos Endpoint and Sophos Enterprise Console customers can be found in the Sophos support article.

Affected platforms: 
  • Client: Windows 8.1; Windows 7, Service Pack 1 
  • Server: Windows Server 2012 R2; Windows Server 2012; Windows Server 2008 R2 SP1; Windows Server 2008 SP2

Back to topApril 09, 2019
KB4493471Mitigated
Last updated:
April 25, 2019
03:26 PM PT

Opened:
April 25, 2019
03:26 PM PT
Authentication may fail for services after the Kerberos ticket expires
After installing KB4489880, some customers report that authentication fails for services that require unconstrained delegation after the Kerberos ticket expires (the default is 10 hours). For example, the SQL server service fails.

Affected platforms: 
  • Client: Windows 7, Service Pack 1 
  • Server: Windows Server 2008 R2 SP1; Windows Server 2008 SP2
Workaround: To mitigate this issue, use one of the following options:

  • Option 1: Purge the Kerberos tickets on the application server. After the Kerberos ticket expires, the issue will occur again, and you must purge the tickets again.
  • Option 2: If purging does not mitigate the issue, restart the application; for example, restart the Internet Information Services (IIS) app pool associated with the SQL server.
  • Option 3: Use constrained delegation.
Next steps: Microsoft is working on a resolution and will provide an update in an upcoming release.

Back to topMarch 12, 2019
KB4489880Mitigated
Last updated:
April 25, 2019
03:24 PM PT

Opened:
April 25, 2019
03:24 PM PT -
Unable to use Seek bar in Windows Media Player
After installing KB4463097, users may not be able to use the Seek Bar in Windows Media Player when playing specific files. This issue does not affect normal playback.

Affected platforms: 
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 8.1; Windows 7, Service Pack 1
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2; Windows Server 2012; Windows Server 2008 R2 SP1; Windows Server 2008 SP2
Resolution: This issue is resolved in KB4471325.

Back to topOctober 09, 2018
KB4463097Resolved
KB4471325Resolved:
December 11, 2018
10:00 AM PT

Opened:
April 25, 2019
03:28 PM PT +
First character of the Japanese era name not recognized as an abbreviation
After installing KB4480974, the first character of the Japanese era name is not recognized as an abbreviation and may cause date parsing issues.

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 8.1; Windows 7, Service Pack 1
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2; Windows Server 2012; Windows Server 2008 R2 SP1; Windows Server 2008 SP2
Resolution: This issue is resolved in KB4489880.

Back to topJanuary 17, 2019
KB4480974Resolved
KB4489880Resolved:
March 12, 2019
10:00 AM PT

Opened:
April 25, 2019
03:32 PM PT
Applications using Microsoft Jet database fail to open
Applications that use a Microsoft Jet database with the Microsoft Access 97 file format may fail to open if the database has column names greater than 32 characters. The database will fail to open with the error, “Unrecognized Database Format”.

Affected platforms: 
  • Client: Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 8.1; Windows 7, Service Pack 1 
  • Server: Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2; Windows Server 2012; Windows Server 2008 R2 SP1; Windows Server 2008 SP2
Resolution: This issue is resolved in KB4487023.

Back to topJanuary 08, 2019
KB4480968Resolved
KB4487023Resolved:
February 12, 2019
10:00 AM PT

Opened:
April 25, 2019
03:32 PM PT +
Unable to use Seek bar in Windows Media Player
After installing KB4463097, users may not be able to use the Seek Bar in Windows Media Player when playing specific files. This issue does not affect normal playback.

Affected platforms: 
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 8.1; Windows 7, Service Pack 1
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2; Windows Server 2012; Windows Server 2008 R2 SP1; Windows Server 2008 SP2
Resolution: This issue is resolved in KB4471325.

Back to topOctober 09, 2018
KB4463097Resolved
KB4471325Resolved:
December 11, 2018
10:00 AM PT

Opened:
April 25, 2019
03:28 PM PT
Virtual machines fail to restore
After installing KB4480968, virtual machines (VM) may fail to restore successfully if the VM has been saved and restored once before. The error message is, “Failed to restore the virtual machine state: Cannot restore this virtual machine because the saved state data cannot be read. Delete the saved state data and then try to start the virtual machine. (0xC0370027).”

This affects AMD Bulldozer Family 15h, AMD Jaguar Family 16h, and AMD Puma Family 16h (second generation) microarchitectures.

Affected platforms: 
  • Client: Windows 7, Service Pack 1 
  • Server: Windows Server 2012; Windows Server 2008 R2 SP1; Windows Server 2008 SP2
Resolution: This issue is resolved in KB4490514.

Back to topJanuary 08, 2019
KB4480968Resolved
KB4490514Resolved:
February 19, 2019
02:00 PM PT

Opened:
April 25, 2019
03:26 PM PT
Embedded objects may display incorrectly
Any compound document (OLE) server application that places embedded objects into the Windows Metafile (WMF) using the PatBlt API may display embedded objects incorrectly.

For example, if you paste a Microsoft Excel worksheet object into a Microsoft Word document, the cells may render with a different background color.

Affected platforms: 
  • Client: Windows 8.1 
  • Server: Windows Server 2012 R2; Windows Server 2012; Windows Server 2008 SP2
Resolution: This issue is resolved in KB4493471.

Back to topFebruary 12, 2019
KB4487023Resolved
KB4493471Resolved:
April 09, 2019
10:00 AM PT

Opened:
April 25, 2019
03:26 PM PT -
First character of the Japanese era name not recognized as an abbreviation
After installing KB4480974, the first character of the Japanese era name is not recognized as an abbreviation and may cause date parsing issues.

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 8.1; Windows 7, Service Pack 1
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2; Windows Server 2012; Windows Server 2008 R2 SP1; Windows Server 2008 SP2
Resolution: This issue is resolved in KB4489880.

Back to topJanuary 17, 2019
KB4480974Resolved
KB4489880Resolved:
March 12, 2019
10:00 AM PT

Opened:
April 25, 2019
03:32 PM PT
Applications using Microsoft Jet database and Access 95 file format stop working
Applications that use a Microsoft Jet database with the Microsoft Access 95 file format may randomly stop working.

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 7, Service Pack 1
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012; Windows Server 2008 R2 SP1; Windows Server 2008 SP2
Resolution: This issue is resolved in KB4487022.

Back to topFebruary 12, 2019
KB4487023Resolved
KB4487022Resolved:
February 19, 2019
02:00 PM PT

Opened:
April 25, 2019
03:26 PM PT
Local Administrators unable to remotely access shares
Local users who are part of the local Administrators group may not be able to remotely access shares on Windows Server 2008 R2 and Windows 7 machines after installing KB4480968. This does not affect domain accounts in the local Administrators group.

Affected platforms: 
  • Client: Windows 7, Service Pack 1 
  • Server: Windows Server 2008 R2 SP1; Windows Server 2008 SP2
Resolution: This issue is resolved in KB4487354.

Back to topJanuary 08, 2019
KB4480968Resolved
KB4487354Resolved:
January 11, 2019
02:00 PM PT

Opened:
April 25, 2019
03:26 PM PT
NETDOM.EXE fails to run
After installing KB4489880, NETDOM.EXE fails to run, and the on-screen error, “The command failed to complete successfully.” appears.

Affected platforms: 
  • Client: Windows 7, Service Pack 1 
  • Server: Windows Server 2008 R2 SP1; Windows Server 2008 SP2
Resolution: This issue is resolved in KB4493471.

Back to topMarch 12, 2019
KB4489880Resolved
KB4493471Resolved:
April 09, 2019
10:00 AM PT

Opened:
April 25, 2019
03:25 PM PT diff --git a/windows/release-information/status-windows-server-2012.yml b/windows/release-information/status-windows-server-2012.yml index 1f47521e6e..eff3fd061d 100644 --- a/windows/release-information/status-windows-server-2012.yml +++ b/windows/release-information/status-windows-server-2012.yml @@ -61,20 +61,20 @@ sections: text: "
This table offers a summary of current active issues and those issues that have been resolved in the last 30 days.
- - - - - - - + + + + + + - - - - + + + + +
SummaryOriginating updateStatusLast updated
System may be unresponsive after restart if Avira antivirus software installed
Devices with Avira antivirus software installed may become unresponsive upon restart.

See details >
April 09, 2019
KB4493451
Investigating
April 25, 2019
03:48 PM PT
Issue using PXE to start a device from WDS
There may be issues using the Preboot Execution Environment (PXE) to start a device from a Windows Deployment Services (WDS) server configured to use Variable Window Extension.

See details >
March 12, 2019
KB4489891
Mitigated
April 25, 2019
03:40 PM PT
System unresponsive after restart if Sophos Endpoint Protection installed
Devices with Sophos Endpoint Protection installed and managed by Sophos Central or Sophos Enterprise Console (SEC) may become unresponsive upon restart.

See details >
April 09, 2019
KB4493451
Mitigated
April 25, 2019
03:46 PM PT
Certain operations performed on a Cluster Shared Volume may fail
Certain operations, such as rename, performed on files or folders on a Cluster Shared Volume (CSV) may fail with the error, “STATUS_BAD_IMPERSONATION_LEVEL (0xC00000A5)”.

See details >
January 08, 2019
KB4480975
Mitigated
April 25, 2019
03:52 PM PT
Unable to use Seek bar in Windows Media Player
Users may not be able to use the Seek bar in Windows Media Player when playing specific files.

See details >
October 09, 2018
KB4462929
Resolved
KB4471330
April 25, 2019
02:47 PM PT
Event Viewer may not show some event descriptions for network interface cards
The Event Viewer may not show some event descriptions for network interface cards (NIC).

See details >
September 11, 2018
KB4457135
Resolved
KB4489891
April 25, 2019
03:10 PM PT
Unable to access hotspots with third-party applications
Third-party applications may have difficulty authenticating hotspots.

See details >
January 08, 2019
KB4480975
Resolved
KB4480971
April 25, 2019
03:14 PM PT
Applications using Microsoft Jet database fail to open
Applications that use a Microsoft Jet database with the Microsoft Access 97 file format may fail to open if column names are greater than 32 characters.

See details >
January 08, 2019
KB4480975
Resolved
KB4487025
April 25, 2019
03:19 PM PT
Virtual machines fail to restore
Virtual machines (VMs) may fail to restore successfully if the VM has been saved and restored once before.

See details >
January 08, 2019
KB4480975
Resolved
KB4490516
April 25, 2019
03:22 PM PT
System unresponsive after restart if Sophos Endpoint Protection installed
Devices with Sophos Endpoint Protection installed and managed by Sophos Central or Sophos Enterprise Console (SEC) may become unresponsive upon restart.

See details >
April 09, 2019
KB4493451
Mitigated
April 25, 2019
03:46 PM PT
Issue using PXE to start a device from WDS
There may be issues using the Preboot Execution Environment (PXE) to start a device from a Windows Deployment Services (WDS) server configured to use Variable Window Extension.

See details >
March 12, 2019
KB4489891
Mitigated
April 25, 2019
03:40 PM PT
Applications using Microsoft Jet database and Access 95 file format stop working
Applications that use a Microsoft Jet database with the Microsoft Access 95 file format may randomly stop working.

See details >
February 12, 2019
KB4487025
Resolved
KB4487024
April 25, 2019
04:04 PM PT
First character of the Japanese era name not recognized as an abbreviation
The first character of the Japanese era name is not recognized as an abbreviation and may cause date parsing issues.

See details >
January 15, 2019
KB4480971
Resolved
KB4487024
April 25, 2019
04:02 PM PT
Embedded objects may display incorrectly
Any compound document (OLE) server application that places embedded objects into the Windows Metafile (WMF) using the PatBlt API may display embedded objects incorrectly.

See details >
February 12, 2019
KB4487025
Resolved
KB4493451
April 25, 2019
04:00 PM PT
Error 1309 when installing/uninstalling MSI or MSP files
Users may receive “Error 1309” while installing or uninstalling certain types of MSI and MSP files.

See details >
February 12, 2019
KB4487025
Resolved
KB4489891
April 25, 2019
03:36 PM PT
Internet Explorer 11 authentication issue with multiple concurrent logons
Internet Explorer 11 users may encounter issues if two or more people use the same user account for multiple, concurrent login sessions on the same Windows Server machine.

See details >
January 08, 2019
KB4480975
Resolved
KB4493451
April 25, 2019
03:34 PM PT
MSXML6 may cause applications to stop responding
MSXML6 may cause applications to stop responding if an exception was thrown during node operations, such as appendChild(), insertBefore(), and moveNode().

See details >
January 08, 2019
KB4480975
Resolved
KB4493451
April 25, 2019
03:27 PM PT
Error 1309 when installing/uninstalling MSI or MSP files
Users may receive “Error 1309” while installing or uninstalling certain types of MSI and MSP files.

See details >
February 12, 2019
KB4487025
Resolved
KB4489891
April 25, 2019
03:36 PM PT
Embedded objects may display incorrectly
Any compound document (OLE) server application that places embedded objects into the Windows Metafile (WMF) using the PatBlt API may display embedded objects incorrectly.

See details >
February 12, 2019
KB4487025
Resolved
KB4493451
April 25, 2019
04:00 PM PT
First character of the Japanese era name not recognized as an abbreviation
The first character of the Japanese era name is not recognized as an abbreviation and may cause date parsing issues.

See details >
January 15, 2019
KB4480971
Resolved
KB4487024
April 25, 2019
04:02 PM PT
Applications using Microsoft Jet database and Access 95 file format stop working
Applications that use a Microsoft Jet database with the Microsoft Access 95 file format may randomly stop working.

See details >
February 12, 2019
KB4487025
Resolved
KB4487024
April 25, 2019
04:04 PM PT
Virtual machines fail to restore
Virtual machines (VMs) may fail to restore successfully if the VM has been saved and restored once before.

See details >
January 08, 2019
KB4480975
Resolved
KB4490516
April 25, 2019
03:22 PM PT
Applications using Microsoft Jet database fail to open
Applications that use a Microsoft Jet database with the Microsoft Access 97 file format may fail to open if column names are greater than 32 characters.

See details >
January 08, 2019
KB4480975
Resolved
KB4487025
April 25, 2019
03:19 PM PT
Unable to access hotspots with third-party applications
Third-party applications may have difficulty authenticating hotspots.

See details >
January 08, 2019
KB4480975
Resolved
KB4480971
April 25, 2019
03:14 PM PT
Event Viewer may not show some event descriptions for network interface cards
The Event Viewer may not show some event descriptions for network interface cards (NIC).

See details >
September 11, 2018
KB4457135
Resolved
KB4489891
April 25, 2019
03:10 PM PT
Unable to use Seek bar in Windows Media Player
Users may not be able to use the Seek bar in Windows Media Player when playing specific files.

See details >
October 09, 2018
KB4462929
Resolved
KB4471330
April 25, 2019
02:47 PM PT
" @@ -91,20 +91,20 @@ sections: text: " + + - - - - - - - + + + + - - - - + + + + +
DetailsOriginating updateStatusHistory
System may be unresponsive after restart if Avira antivirus software installed
Microsoft and Avira have identified an issue on devices with Avira antivirus software installed that may cause the system to become unresponsive upon restart after installing KB4493451.

Microsoft has temporarily blocked devices from receiving this update if Avira antivirus software is installed.

Next steps: We are presently investigating this issue with Avira and will provide an update when available.

Back to top
April 09, 2019
KB4493451
Investigating
Last updated:
April 25, 2019
03:48 PM PT

Opened:
April 25, 2019
03:48 PM PT
Certain operations performed on a Cluster Shared Volume may fail
Certain operations, such as rename, that you perform on files or folders that are on a Cluster Shared Volume (CSV) may fail with the error, \"STATUS_BAD_IMPERSONATION_LEVEL (0xC00000A5)\". This occurs when you perform the operation on a CSV owner node from a process that doesn’t have administrator privilege.

Workaround: Do one of the following:

  • Perform the operation from a process that has administrator privilege.
  • Perform the operation from a node that doesn’t have CSV ownership.
Next steps: Microsoft is working on a resolution and will provide an update in an upcoming release.

Back to top
January 08, 2019
KB4480975
Mitigated
Last updated:
April 25, 2019
03:52 PM PT

Opened:
April 25, 2019
03:52 PM PT
System unresponsive after restart if Sophos Endpoint Protection installed
Microsoft and Sophos have identified an issue on devices with Sophos Endpoint Protection installed and managed by either Sophos Central or Sophos Enterprise Console (SEC) that may cause the system to become unresponsive upon restart after installing KB4493451.

Microsoft has temporarily blocked devices from receiving this update if the Sophos Endpoint is installed until a solution is available.

Guidance for Sophos Endpoint and Sophos Enterprise Console customers can be found in the Sophos support article.

Back to top
April 09, 2019
KB4493451
Mitigated
Last updated:
April 25, 2019
03:46 PM PT

Opened:
April 25, 2019
03:46 PM PT
Issue using PXE to start a device from WDS
After installing KB4489891, there may be issues using the Preboot Execution Environment (PXE) to start a device from a Windows Deployment Services (WDS) server configured to use Variable Window Extension. This may cause the connection to the WDS server to terminate prematurely while downloading the image. This issue does not affect clients or devices that are not using Variable Window Extension.

Workaround: To mitigate the issue, disable the Variable Window Extension on WDS server using one of the following options:
Option 1:
Open an Administrator Command prompt and type the following:
Wdsutil /Set-TransportServer /EnableTftpVariableWindowExtension:No
 
Option 2:
Use the Windows Deployment Services UI to make the following adjustment:
  1. Open Windows Deployment Services from Windows Administrative Tools.
  2. Expand Servers and right-click a WDS server.
  3. Open its properties and clear the Enable Variable Window Extension box on the TFTP tab.
Option 3:
Set the following registry value to 0:
HKLM\\System\\CurrentControlSet\\Services\\WDSServer\\Providers\\WDSTFTP\\EnableVariableWindowExtension
Restart the WDSServer service after disabling the Variable Window Extension.

Next steps: Microsoft is working on a resolution and will provide an update in an upcoming release.

Back to top
March 12, 2019
KB4489891
Mitigated
Last updated:
April 25, 2019
03:40 PM PT

Opened:
April 25, 2019
03:40 PM PT
System unresponsive after restart if Sophos Endpoint Protection installed
Microsoft and Sophos have identified an issue on devices with Sophos Endpoint Protection installed and managed by either Sophos Central or Sophos Enterprise Console (SEC) that may cause the system to become unresponsive upon restart after installing KB4493451.

Microsoft has temporarily blocked devices from receiving this update if the Sophos Endpoint is installed until a solution is available.

Guidance for Sophos Endpoint and Sophos Enterprise Console customers can be found in the Sophos support article.

Back to top
April 09, 2019
KB4493451
Mitigated
Last updated:
April 25, 2019
03:46 PM PT

Opened:
April 25, 2019
03:46 PM PT
Certain operations performed on a Cluster Shared Volume may fail
Certain operations, such as rename, that you perform on files or folders that are on a Cluster Shared Volume (CSV) may fail with the error, \"STATUS_BAD_IMPERSONATION_LEVEL (0xC00000A5)\". This occurs when you perform the operation on a CSV owner node from a process that doesn’t have administrator privilege.

Workaround: Do one of the following:

  • Perform the operation from a process that has administrator privilege.
  • Perform the operation from a node that doesn’t have CSV ownership.
Next steps: Microsoft is working on a resolution and will provide an update in an upcoming release.

Back to top
January 08, 2019
KB4480975
Mitigated
Last updated:
April 25, 2019
03:52 PM PT

Opened:
April 25, 2019
03:52 PM PT
Unable to use Seek bar in Windows Media Player
After installing KB4462929, users may not be able to use the Seek Bar in Windows Media Player when playing specific files. This issue does not affect normal playback.

Resolution: This issue is resolved in KB4471330.

Back to top
October 09, 2018
KB4462929
Resolved
KB4471330
Resolved:
December 11, 2018
10:00 AM PT

Opened:
April 25, 2019
02:47 PM PT
Event Viewer may not show some event descriptions for network interface cards
After installing KB4457135, the Event Viewer may not show some event descriptions for network interface cards (NICs).

Resolution: This issue is resolved in KB4489891.

Back to top
September 11, 2018
KB4457135
Resolved
KB4489891
Resolved:
March 12, 2019
10:00 AM PT

Opened:
April 25, 2019
03:10 PM PT
Unable to access hotspots with third-party applications
After installing KB4480975, third-party applications may have difficulty authenticating hotspots.

Resolution: This issue is resolved in KB4480971.

Back to top
January 08, 2019
KB4480975
Resolved
KB4480971
Resolved:
January 15, 2019
10:00 AM PT

Opened:
April 25, 2019
03:14 PM PT
Applications using Microsoft Jet database fail to open
Applications that use a Microsoft Jet database with the Microsoft Access 97 file format may fail to open if the database has column names greater than 32 characters. The database will fail to open with the error, \"Unrecognized Database Format\".

Resolution: This issue is resolved in KB4487025.

Back to top
January 08, 2019
KB4480975
Resolved
KB4487025
Resolved:
February 12, 2019
10:00 AM PT

Opened:
April 25, 2019
03:19 PM PT
Virtual machines fail to restore
After installing KB4480975, virtual machines (VM) may fail to restore successfully if the VM has been saved and restored once before. The error message is, \"Failed to restore the virtual machine state: Cannot restore this virtual machine because the saved state data cannot be read. Delete the saved state data and then try to start the virtual machine. (0xC0370027).\"

This affects AMD Bulldozer Family 15h, AMD Jaguar Family 16h, and AMD Puma Family 16h (second generation) microarchitectures.

Resolution: This issue is resolved in KB4490516.

Back to top
January 08, 2019
KB4480975
Resolved
KB4490516
Resolved:
February 19, 2019
02:00 PM PT

Opened:
April 25, 2019
03:22 PM PT
Applications using Microsoft Jet database and Access 95 file format stop working
Applications that use a Microsoft Jet database with the Microsoft Access 95 file format may randomly stop working.

Resolution: This issue is resolved in KB4487024.

Back to top
February 12, 2019
KB4487025
Resolved
KB4487024
Resolved:
February 19, 2019
02:00 PM PT

Opened:
April 25, 2019
04:04 PM PT
First character of the Japanese era name not recognized as an abbreviation
After installing KB4480971, the first character of the Japanese era name is not recognized as an abbreviation and may cause date parsing issues.

Resolution: This issue is resolved in KB4487024.

Back to top
January 15, 2019
KB4480971
Resolved
KB4487024
Resolved:
February 19, 2019
02:00 PM PT

Opened:
April 25, 2019
04:01 PM PT
Embedded objects may display incorrectly
Any compound document (OLE) server application that places embedded objects into the Windows Metafile (WMF) using the PatBlt API may display embedded objects incorrectly.

For example, if you paste a Microsoft Excel worksheet object into a Microsoft Word document, the cells may render with a different background color.

Resolution: This issue is resolved in KB4493451.

Back to top
February 12, 2019
KB4487025
Resolved
KB4493451
Resolved:
April 09, 2019
10:00 AM PT

Opened:
April 25, 2019
04:00 PM PT
Error 1309 when installing/uninstalling MSI or MSP files
After installing KB4487025, users may receive \"Error 1309\" while installing or uninstalling certain types of MSI and MSP files.

Resolution: This issue is resolved in KB4489891.

Back to top
February 12, 2019
KB4487025
Resolved
KB4489891
Resolved:
March 12, 2019
10:00 AM PT

Opened:
April 25, 2019
03:36 PM PT
Internet Explorer 11 authentication issue with multiple concurrent logons
After installing KB4480975, Internet Explorer 11 and other applications that use WININET.DLL may have authentication issues. This occurs when two or more people use the same user account for multiple, concurrent login sessions on the same Windows Server machine, including Remote Desktop Protocol (RDP) and Terminal Server logons. Symptoms reported by customers include, but may not be limited to:
  • Cache size and location show zero or empty.
  • Keyboard shortcuts may not work properly.
  • Webpages may intermittently fail to load or render correctly.
  • Issues with credential prompts.
  • Issues when downloading files.
Resolution: This issue is resolved in KB4493451.

Back to top
January 08, 2019
KB4480975
Resolved
KB4493451
Resolved:
April 09, 2019
10:00 AM PT

Opened:
April 25, 2019
03:34 PM PT
MSXML6 may cause applications to stop responding
After installing KB4480975, MSXML6 causes applications to stop responding if an exception was thrown during node operations, such as appendChild(), insertBefore(), and moveNode().

The Group Policy editor may stop responding when editing a Group Policy Object (GPO) that contains Group Policy Preferences (GPP) for Internet Explorer 10 settings.

Resolution: This issue is resolved in KB4493451.

Back to top
January 08, 2019
KB4480975
Resolved
KB4493451
Resolved:
April 09, 2019
10:00 AM PT

Opened:
April 25, 2019
03:27 PM PT
Error 1309 when installing/uninstalling MSI or MSP files
After installing KB4487025, users may receive \"Error 1309\" while installing or uninstalling certain types of MSI and MSP files.

Resolution: This issue is resolved in KB4489891.

Back to top
February 12, 2019
KB4487025
Resolved
KB4489891
Resolved:
March 12, 2019
10:00 AM PT

Opened:
April 25, 2019
03:36 PM PT
Embedded objects may display incorrectly
Any compound document (OLE) server application that places embedded objects into the Windows Metafile (WMF) using the PatBlt API may display embedded objects incorrectly.

For example, if you paste a Microsoft Excel worksheet object into a Microsoft Word document, the cells may render with a different background color.

Resolution: This issue is resolved in KB4493451.

Back to top
February 12, 2019
KB4487025
Resolved
KB4493451
Resolved:
April 09, 2019
10:00 AM PT

Opened:
April 25, 2019
04:00 PM PT
First character of the Japanese era name not recognized as an abbreviation
After installing KB4480971, the first character of the Japanese era name is not recognized as an abbreviation and may cause date parsing issues.

Resolution: This issue is resolved in KB4487024.

Back to top
January 15, 2019
KB4480971
Resolved
KB4487024
Resolved:
February 19, 2019
02:00 PM PT

Opened:
April 25, 2019
04:01 PM PT
Applications using Microsoft Jet database and Access 95 file format stop working
Applications that use a Microsoft Jet database with the Microsoft Access 95 file format may randomly stop working.

Resolution: This issue is resolved in KB4487024.

Back to top
February 12, 2019
KB4487025
Resolved
KB4487024
Resolved:
February 19, 2019
02:00 PM PT

Opened:
April 25, 2019
04:04 PM PT
Virtual machines fail to restore
After installing KB4480975, virtual machines (VM) may fail to restore successfully if the VM has been saved and restored once before. The error message is, \"Failed to restore the virtual machine state: Cannot restore this virtual machine because the saved state data cannot be read. Delete the saved state data and then try to start the virtual machine. (0xC0370027).\"

This affects AMD Bulldozer Family 15h, AMD Jaguar Family 16h, and AMD Puma Family 16h (second generation) microarchitectures.

Resolution: This issue is resolved in KB4490516.

Back to top
January 08, 2019
KB4480975
Resolved
KB4490516
Resolved:
February 19, 2019
02:00 PM PT

Opened:
April 25, 2019
03:22 PM PT
Applications using Microsoft Jet database fail to open
Applications that use a Microsoft Jet database with the Microsoft Access 97 file format may fail to open if the database has column names greater than 32 characters. The database will fail to open with the error, \"Unrecognized Database Format\".

Resolution: This issue is resolved in KB4487025.

Back to top
January 08, 2019
KB4480975
Resolved
KB4487025
Resolved:
February 12, 2019
10:00 AM PT

Opened:
April 25, 2019
03:19 PM PT
Unable to access hotspots with third-party applications
After installing KB4480975, third-party applications may have difficulty authenticating hotspots.

Resolution: This issue is resolved in KB4480971.

Back to top
January 08, 2019
KB4480975
Resolved
KB4480971
Resolved:
January 15, 2019
10:00 AM PT

Opened:
April 25, 2019
03:14 PM PT
Event Viewer may not show some event descriptions for network interface cards
After installing KB4457135, the Event Viewer may not show some event descriptions for network interface cards (NICs).

Resolution: This issue is resolved in KB4489891.

Back to top
September 11, 2018
KB4457135
Resolved
KB4489891
Resolved:
March 12, 2019
10:00 AM PT

Opened:
April 25, 2019
03:10 PM PT
Unable to use Seek bar in Windows Media Player
After installing KB4462929, users may not be able to use the Seek Bar in Windows Media Player when playing specific files. This issue does not affect normal playback.

Resolution: This issue is resolved in KB4471330.

Back to top
October 09, 2018
KB4462929
Resolved
KB4471330
Resolved:
December 11, 2018
10:00 AM PT

Opened:
April 25, 2019
02:47 PM PT
" From 550a945326a838ab03031c6e04a44a5d35199b9a Mon Sep 17 00:00:00 2001 From: "Nisha Mittal (Wipro Ltd.)" Date: Fri, 26 Apr 2019 12:35:17 -0700 Subject: [PATCH 225/724] Updated Last Updated Time for Downlevel products --- .../resolved-issues-windows-10-1507.yml | 12 ++-- .../resolved-issues-windows-10-1607.yml | 12 ++-- .../resolved-issues-windows-10-1703.yml | 10 +-- .../resolved-issues-windows-10-1709.yml | 12 ++-- .../resolved-issues-windows-10-1803.yml | 10 +-- ...indows-10-1809-and-windows-server-2019.yml | 8 +-- ...ndows-7-and-windows-server-2008-r2-sp1.yml | 8 +-- ...windows-8.1-and-windows-server-2012-r2.yml | 12 ++-- ...esolved-issues-windows-server-2008-sp2.yml | 58 ++++++++++----- .../resolved-issues-windows-server-2012.yml | 70 ++++++++++++------ .../status-windows-10-1507.yml | 16 ++++- ...indows-10-1607-and-windows-server-2016.yml | 30 +++++--- .../status-windows-10-1703.yml | 16 ++++- .../status-windows-10-1709.yml | 18 +++-- .../status-windows-10-1803.yml | 22 ++++-- ...indows-10-1809-and-windows-server-2019.yml | 16 +++-- ...ndows-7-and-windows-server-2008-r2-sp1.yml | 6 +- ...windows-8.1-and-windows-server-2012-r2.yml | 6 +- .../status-windows-server-2008-sp2.yml | 50 +++++++------ .../status-windows-server-2012.yml | 72 ++++++++++--------- 20 files changed, 290 insertions(+), 174 deletions(-) diff --git a/windows/release-information/resolved-issues-windows-10-1507.yml b/windows/release-information/resolved-issues-windows-10-1507.yml index bef0598b37..a3cf92fa0c 100644 --- a/windows/release-information/resolved-issues-windows-10-1507.yml +++ b/windows/release-information/resolved-issues-windows-10-1507.yml @@ -57,7 +57,7 @@ sections: - type: markdown text: " - +
DetailsOriginating updateStatusHistory
Custom URI schemes may not start corresponding application
After installing KB4489872, Custom URI Schemes for Application Protocol handlers may not start the corresponding application for local intranet and trusted sites on Internet Explorer.

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 8.1; Windows 7, Service Pack 1 
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2; Windows Server 2008 R2 SP1
Resolution: This issue was resolved in KB4493475.

Back to top
OS Build 10240.18158

March 12, 2019
KB4489872
Resolved
KB4493475
Resolved:
April 09, 2019
10:00 AM PT

Opened:
March 12, 2019
10:00 AM PT
Custom URI schemes may not start corresponding application
After installing KB4489872, Custom URI Schemes for Application Protocol handlers may not start the corresponding application for local intranet and trusted sites on Internet Explorer.

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 8.1; Windows 7 SP1 
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2; Windows Server 2008 R2 SP1
Resolution: This issue was resolved in KB4493475.

Back to top
OS Build 10240.18158

March 12, 2019
KB4489872
Resolved
KB4493475
Resolved:
April 09, 2019
10:00 AM PT

Opened:
March 12, 2019
10:00 AM PT
" @@ -66,10 +66,10 @@ sections: - type: markdown text: " - - - - + + + +
DetailsOriginating updateStatusHistory
Applications using Microsoft Jet database and Access 95 file format stop working
Applications that use a Microsoft Jet database with the Microsoft Access 95 file format may randomly stop working.

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 7, Service Pack 1
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2008 R2 SP1
Resolution: This issue is resolved in KB4489872.

Back to top
OS Build 10240.18132

February 12, 2019
KB4487018
Resolved
KB4489872
Resolved:
March 12, 2019
10:00 AM PT

Opened:
February 12, 2019
10:00 AM PT
Error 1309 when installing/uninstalling MSI or MSP files
After installing KB4487018, users may receive “Error 1309” while installing or uninstalling certain types of MSI and MSP files.

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 8.1
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2
Resolution: This issue is resolved in KB4489872.

Back to top
OS Build 10240.18132

February 12, 2019
KB4487018
Resolved
KB4489872
Resolved:
March 12, 2019
10:00 AM PT

Opened:
February 12, 2019
10:00 AM PT
First character of Japanese era name not recognized
After installing KB4487018, the first character of the Japanese era name is not recognized as an abbreviation and may cause date parsing issues.

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 8.1; Windows 7, Service Pack 1
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2; Windows Server 2008 R2 SP1
Resolution: This issue is resolved in KB4489872.

Back to top
OS Build 10240.18132

February 12, 2019
KB4487018
Resolved
KB4489872
Resolved:
March 12, 2019
10:00 AM PT

Opened:
February 12, 2019
10:00 AM PT
Internet Explorer may fail to load images
After installing KB4487018, Internet Explorer may fail to load images with a backslash (\\) in their relative source path.

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 8.1; Windows 7, Service Pack 1
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2; Windows Server 2008 R2 SP1
Resolution: This issue is resolved in KB4491101.

Back to top
OS Build 10240.18132

February 12, 2019
KB4487018
Resolved
KB4491101
Resolved:
February 21, 2019
02:00 PM PT

Opened:
February 12, 2019
10:00 AM PT
Applications using Microsoft Jet database and Access 95 file format stop working
Applications that use a Microsoft Jet database with the Microsoft Access 95 file format may randomly stop working.

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 7 SP1
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2; Windows Server 2012; Windows Server 2008 R2 SP1; Windows Server 2008 SP2
Resolution: This issue is resolved in KB4489872.

Back to top
OS Build 10240.18132

February 12, 2019
KB4487018
Resolved
KB4489872
Resolved:
March 12, 2019
10:00 AM PT

Opened:
February 12, 2019
10:00 AM PT
Error 1309 when installing/uninstalling MSI or MSP files
After installing KB4487018, users may receive “Error 1309” while installing or uninstalling certain types of MSI and MSP files.

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 8.1
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2; Windows Server 2012
Resolution: This issue is resolved in KB4489872.

Back to top
OS Build 10240.18132

February 12, 2019
KB4487018
Resolved
KB4489872
Resolved:
March 12, 2019
10:00 AM PT

Opened:
February 12, 2019
10:00 AM PT
First character of Japanese era name not recognized
After installing KB4487018, the first character of the Japanese era name is not recognized as an abbreviation and may cause date parsing issues.

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 8.1; Windows 7 SP1
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2; Windows Server 2012; Windows Server 2008 R2 SP1; Windows Server 2008 SP2
Resolution: This issue is resolved in KB4489872.

Back to top
OS Build 10240.18132

February 12, 2019
KB4487018
Resolved
KB4489872
Resolved:
March 12, 2019
10:00 AM PT

Opened:
February 12, 2019
10:00 AM PT
Internet Explorer may fail to load images
After installing KB4487018, Internet Explorer may fail to load images with a backslash (\\) in their relative source path.

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 8.1; Windows 7 SP1
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2; Windows Server 2008 R2 SP1
Resolution: This issue is resolved in KB4491101.

Back to top
OS Build 10240.18132

February 12, 2019
KB4487018
Resolved
KB4491101
Resolved:
February 21, 2019
02:00 PM PT

Opened:
February 12, 2019
10:00 AM PT
" @@ -78,7 +78,7 @@ sections: - type: markdown text: " - +
DetailsOriginating updateStatusHistory
MSXML6 may cause applications to stop responding
After installing KB4480962, MSXML6 causes applications to stop responding if an exception was thrown during node operations, such as appendChild(), insertBefore(), and moveNode().

The Group Policy editor may stop responding when editing a Group Policy Object (GPO) that contains Group Policy Preferences (GPP) for Internet Explorer 10 settings.

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 8.1
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2
Resolution: This issue was resolved in KB4493475.

Back to top
OS Build 10240.18094

January 08, 2019
KB4480962
Resolved
KB4493475
Resolved:
April 09, 2019
10:00 AM PT

Opened:
January 08, 2019
10:00 AM PT
MSXML6 may cause applications to stop responding
After installing KB4480962, MSXML6 causes applications to stop responding if an exception was thrown during node operations, such as appendChild(), insertBefore(), and moveNode().

The Group Policy editor may stop responding when editing a Group Policy Object (GPO) that contains Group Policy Preferences (GPP) for Internet Explorer 10 settings.

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 8.1
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2; Windows Server 2012
Resolution: This issue was resolved in KB4493475.

Back to top
OS Build 10240.18094

January 08, 2019
KB4480962
Resolved
KB4493475
Resolved:
April 09, 2019
10:00 AM PT

Opened:
January 08, 2019
10:00 AM PT
Applications using Microsoft Jet database fail to open
Applications that use a Microsoft Jet database with the Microsoft Access 97 file format may fail to open if the database has column names greater than 32 characters. The database will fail to open with the error, \"Unrecognized Database Format\".

Affected platforms:
  • Client: Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 8.1; Windows 7, Service Pack 1
  • Server: Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2; Windows Server 2008 R2 SP1
Resolution: This issue is resolved in KB4487018.

Back to top
OS Build 10240.18094

January 08, 2019
KB4480962
Resolved
KB4487018
Resolved:
February 12, 2019
10:00 AM PT

Opened:
January 08, 2019
10:00 AM PT
Unable to access hotspots with third-party applications
After installing KB4480962, third-party applications may have difficulty authenticating hotspots.

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 8.1
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2
Resolution: This issue is resolved in KB4487018.

Back to top
OS Build 10240.18094

January 08, 2019
KB4480962
Resolved
KB4487018
Resolved:
February 12, 2019
10:00 AM PT

Opened:
January 08, 2019
10:00 AM PT
diff --git a/windows/release-information/resolved-issues-windows-10-1607.yml b/windows/release-information/resolved-issues-windows-10-1607.yml index 105aad8ddb..20e27b4280 100644 --- a/windows/release-information/resolved-issues-windows-10-1607.yml +++ b/windows/release-information/resolved-issues-windows-10-1607.yml @@ -73,9 +73,9 @@ sections: text: " - - - + + +
DetailsOriginating updateStatusHistory
Issue hosting multiple terminal server sessions and a user logs off on Windows Server
In some cases, Windows Server will stop working and restart when hosting multiple terminal server sessions and a user logs off. The faulting driver is win32kbase.sys.

Affected platforms:
  • Client: Windows 10 Enterprise LTSC 2016
  • Server: Windows Server 2016
Resolution: This issue is resolved in KB4489882.

Back to top
OS Build 14393.2828

February 19, 2019
KB4487006
Resolved
KB4489882
Resolved:
March 12, 2019
10:00 AM PT

Opened:
February 19, 2019
02:00 PM PT
Error 1309 when installing/uninstalling MSI or MSP files
After installing KB4487026, users may receive “Error 1309” while installing or uninstalling certain types of MSI and MSP files.

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 8.1
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2
Resolution: This issue is resolved in KB4489882.

Back to top
OS Build 14393.2791

February 12, 2019
KB4487026
Resolved
KB4489882
Resolved:
March 12, 2019
10:00 AM PT

Opened:
February 12, 2019
10:00 AM PT
Applications using Microsoft Jet database and Access 95 file format stop working
Applications that use a Microsoft Jet database with the Microsoft Access 95 file format may randomly stop working.

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 7, Service Pack 1
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2008 R2 SP1
Resolution: This issue is resolved in KB4487006.

Back to top
OS Build 14393.2791

February 12, 2019
KB4487026
Resolved
KB4487006
Resolved:
February 19, 2019
02:00 PM PT

Opened:
February 12, 2019
10:00 AM PT
Internet Explorer may fail to load images
After installing KB4487026, Internet Explorer may fail to load images with a backslash (\\) in their relative source path.

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 8.1; Windows 7, Service Pack 1
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2; Windows Server 2008 R2 SP1
Resolution: This issue is resolved in KB4487006.

Back to top
OS Build 14393.2791

February 12, 2019
KB4487026
Resolved
KB4487006
Resolved:
February 19, 2019
02:00 PM PT

Opened:
February 12, 2019
10:00 AM PT
Error 1309 when installing/uninstalling MSI or MSP files
After installing KB4487026, users may receive “Error 1309” while installing or uninstalling certain types of MSI and MSP files.

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 8.1
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2; Windows Server 2012
Resolution: This issue is resolved in KB4489882.

Back to top
OS Build 14393.2791

February 12, 2019
KB4487026
Resolved
KB4489882
Resolved:
March 12, 2019
10:00 AM PT

Opened:
February 12, 2019
10:00 AM PT
Applications using Microsoft Jet database and Access 95 file format stop working
Applications that use a Microsoft Jet database with the Microsoft Access 95 file format may randomly stop working.

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 7 SP1
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2; Windows Server 2012; Windows Server 2008 R2 SP1; Windows Server 2008 SP2
Resolution: This issue is resolved in KB4487006.

Back to top
OS Build 14393.2791

February 12, 2019
KB4487026
Resolved
KB4487006
Resolved:
February 19, 2019
02:00 PM PT

Opened:
February 12, 2019
10:00 AM PT
Internet Explorer may fail to load images
After installing KB4487026, Internet Explorer may fail to load images with a backslash (\\) in their relative source path.

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 8.1; Windows 7 SP1
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2; Windows Server 2008 R2 SP1
Resolution: This issue is resolved in KB4487006.

Back to top
OS Build 14393.2791

February 12, 2019
KB4487026
Resolved
KB4487006
Resolved:
February 19, 2019
02:00 PM PT

Opened:
February 12, 2019
10:00 AM PT
" @@ -85,9 +85,9 @@ sections: text: " - - - + + +
DetailsOriginating updateStatusHistory
Internet Explorer 11 authentication issue with multiple concurrent logons
After installing KB4480961, Internet Explorer 11 and other applications that use WININET.DLL may have authentication issues. This occurs when two or more people use the same user account for multiple, concurrent login sessions on the same Windows Server machine, including Remote Desktop Protocol (RDP) and Terminal Server logons. Symptoms reported by customers include, but may not be limited to:
  • Cache size and location show zero or empty.
  • Keyboard shortcuts may not work properly.
  • Webpages may intermittently fail to load or render correctly.
  • Issues with credential prompts.
  • Issues when downloading files.
Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10 Enterprise LTSC 2016; Windows 8.1; Windows 7, Service Pack 1
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server 2016; Windows Server 2012 R2; Windows Server 2008 R2 SP1
Resolution: This issue was resolved in KB4493470.

Back to top
OS Build 14393.2724

January 08, 2019
KB4480961
Resolved
KB4493470
Resolved:
April 09, 2019
10:00 AM PT

Opened:
January 08, 2019
10:00 AM PT
MSXML6 may cause applications to stop responding
After installing KB4480961, MSXML6 causes applications to stop responding if an exception was thrown during node operations, such as appendChild(), insertBefore(), and moveNode().

The Group Policy editor may stop responding when editing a Group Policy Object (GPO) that contains Group Policy Preferences (GPP) for Internet Explorer 10 settings.

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 8.1
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2
Resolution: This issue was resolved in KB4493470.

Back to top
OS Build 14393.2724

January 08, 2019
KB4480961
Resolved
KB4493470
Resolved:
April 09, 2019
10:00 AM PT

Opened:
January 08, 2019
10:00 AM PT
First character of the Japanese era name not recognized as an abbreviation
After installing KB4480977, the first character of the Japanese era name is not recognized as an abbreviation and may cause date parsing issues.

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 8.1; Windows 7, Service Pack 1
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2; Windows Server 2008 R2 SP1
Resolution: This issue is resolved in KB4487006.

Back to top
OS Build 14393.2759

January 17, 2019
KB4480977
Resolved
KB4487006
Resolved:
February 19, 2019
02:00 PM PT

Opened:
January 17, 2019
02:00 PM PT
Applications using Microsoft Jet database fail to open
Applications that use a Microsoft Jet database with the Microsoft Access 97 file format may fail to open if the database has column names greater than 32 characters. The database will fail to open with the error, “Unrecognized Database Format”.

Affected platforms:
  • Client: Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 8.1; Windows 7, Service Pack 1 
  • Server: Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2; Windows Server 2008 R2 SP1 
Resolution: This issue is resolved in KB4487026.

Back to top
OS Build 14393.2724

January 08, 2019
KB4480961
Resolved
KB4487026
Resolved:
February 12, 2019
10:00 AM PT

Opened:
January 08, 2019
10:00 AM PT
MSXML6 may cause applications to stop responding
After installing KB4480961, MSXML6 causes applications to stop responding if an exception was thrown during node operations, such as appendChild(), insertBefore(), and moveNode().

The Group Policy editor may stop responding when editing a Group Policy Object (GPO) that contains Group Policy Preferences (GPP) for Internet Explorer 10 settings.

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 8.1
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2; Windows Server 2012
Resolution: This issue was resolved in KB4493470.

Back to top
OS Build 14393.2724

January 08, 2019
KB4480961
Resolved
KB4493470
Resolved:
April 09, 2019
10:00 AM PT

Opened:
January 08, 2019
10:00 AM PT
First character of the Japanese era name not recognized as an abbreviation
After installing KB4480977, the first character of the Japanese era name is not recognized as an abbreviation and may cause date parsing issues.

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 8.1; Windows 7 SP1
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2; Windows Server 2012; Windows Server 2008 R2 SP1; Windows Server 2008 SP2
Resolution: This issue is resolved in KB4487006.

Back to top
OS Build 14393.2759

January 17, 2019
KB4480977
Resolved
KB4487006
Resolved:
February 19, 2019
02:00 PM PT

Opened:
January 17, 2019
02:00 PM PT
Applications using Microsoft Jet database fail to open
Applications that use a Microsoft Jet database with the Microsoft Access 97 file format may fail to open if the database has column names greater than 32 characters. The database will fail to open with the error, “Unrecognized Database Format”.

Affected platforms:
  • Client: Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 8.1; Windows 7 SP1 
  • Server: Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2; Windows Server 2012; Windows Server 2008 R2 SP1; Windows Server 2008 SP2 
Resolution: This issue is resolved in KB4487026.

Back to top
OS Build 14393.2724

January 08, 2019
KB4480961
Resolved
KB4487026
Resolved:
February 12, 2019
10:00 AM PT

Opened:
January 08, 2019
10:00 AM PT
Unable to access hotspots with third-party applications
After installing KB4480961, third-party applications may have difficulty authenticating hotspots.

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 8.1
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2
Resolution: This issue is resolved in KB4480977.

Back to top
OS Build 14393.2724

January 08, 2019
KB4480961
Resolved
KB4480977
Resolved:
January 17, 2019
02:00 PM PT

Opened:
January 08, 2019
10:00 AM PT
" diff --git a/windows/release-information/resolved-issues-windows-10-1703.yml b/windows/release-information/resolved-issues-windows-10-1703.yml index 6ea50b5ecf..fd6f844af9 100644 --- a/windows/release-information/resolved-issues-windows-10-1703.yml +++ b/windows/release-information/resolved-issues-windows-10-1703.yml @@ -69,9 +69,9 @@ sections: - type: markdown text: " - - - + + +
DetailsOriginating updateStatusHistory
Error 1309 when installing/uninstalling MSI or MSP files
After installing KB4487011, users may receive “Error 1309” while installing or uninstalling certain types of MSI and MSP files.

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 8.1
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2
Resolution: This issue is resolved in KB4489871.

Back to top
OS Build 15063.1659

February 19, 2019
KB4487011
Resolved
KB4489871
Resolved:
March 12, 2019
10:00 AM PT

Opened:
February 19, 2019
02:00 PM PT
Internet Explorer may fail to load images
After installing KB4487020, Internet Explorer may fail to load images with a backslash (\\) in their relative source path.

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 8.1; Windows 7, Service Pack 1
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2; Windows Server 2008 R2 SP1
Resolution: This issue is resolved in KB4487011.

Back to top
OS Build 15063.1631

February 12, 2019
KB4487020
Resolved
KB4487011
Resolved:
February 19, 2019
02:00 PM PT

Opened:
February 12, 2019
10:00 AM PT
Applications using Microsoft Jet database and Access 95 file format stop working
Applications that use a Microsoft Jet database with the Microsoft Access 95 file format may randomly stop working.

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 7, Service Pack 1
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2008 R2 SP1
Resolution: This issue is resolved in KB4487011.

Back to top
OS Build 15063.1631

February 12, 2019
KB4487020
Resolved
KB4487011
Resolved:
February 19, 2019
02:00 PM PT

Opened:
February 12, 2019
10:00 AM PT
Error 1309 when installing/uninstalling MSI or MSP files
After installing KB4487011, users may receive “Error 1309” while installing or uninstalling certain types of MSI and MSP files.

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 8.1
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2; Windows Server 2012
Resolution: This issue is resolved in KB4489871.

Back to top
OS Build 15063.1659

February 19, 2019
KB4487011
Resolved
KB4489871
Resolved:
March 12, 2019
10:00 AM PT

Opened:
February 19, 2019
02:00 PM PT
Internet Explorer may fail to load images
After installing KB4487020, Internet Explorer may fail to load images with a backslash (\\) in their relative source path.

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 8.1; Windows 7 SP1
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2; Windows Server 2008 R2 SP1
Resolution: This issue is resolved in KB4487011.

Back to top
OS Build 15063.1631

February 12, 2019
KB4487020
Resolved
KB4487011
Resolved:
February 19, 2019
02:00 PM PT

Opened:
February 12, 2019
10:00 AM PT
Applications using Microsoft Jet database and Access 95 file format stop working
Applications that use a Microsoft Jet database with the Microsoft Access 95 file format may randomly stop working.

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 7 SP1
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2; Windows Server 2012; Windows Server 2008 R2 SP1; Windows Server 2008 SP2
Resolution: This issue is resolved in KB4487011.

Back to top
OS Build 15063.1631

February 12, 2019
KB4487020
Resolved
KB4487011
Resolved:
February 19, 2019
02:00 PM PT

Opened:
February 12, 2019
10:00 AM PT
" @@ -81,8 +81,8 @@ sections: text: " - - + +
DetailsOriginating updateStatusHistory
MSXML6 may cause applications to stop responding
After installing KB4480973, MSXML6 causes applications to stop responding if an exception was thrown during node operations, such as appendChild(), insertBefore(), and moveNode().

The Group Policy editor may stop responding when editing a Group Policy Object (GPO) that contains Group Policy Preferences (GPP) for Internet Explorer 10 settings.

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 8.1
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2
Resolution: This issue was resolved in KB4493474.

Back to top
OS Build 15063.1563

January 08, 2019
KB4480973
Resolved
KB4493474
Resolved:
April 09, 2019
10:00 AM PT

Opened:
January 08, 2019
10:00 AM PT
First character of the Japanese era name not recognized as an abbreviation
After installing KB4480959, the first character of the Japanese era name is not recognized as an abbreviation and may cause date parsing issues.

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 8.1; Windows 7, Service Pack 1
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2; Windows Server 2008 R2 SP1
Resolution: This issue is resolved in KB4487011.

Back to top
OS Build 15063.1596

January 15, 2019
KB4480959
Resolved
KB4487011
Resolved:
February 19, 2019
02:00 PM PT

Opened:
January 15, 2019
10:00 AM PT
Applications using Microsoft Jet database fail to open
Applications that use a Microsoft Jet database with the Microsoft Access 97 file format may fail to open if the database has column names greater than 32 characters. The database will fail to open with the error, “Unrecognized Database Format”.

Affected platforms:
  • Client: Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 8.1; Windows 7, Service Pack 1 
  • Server: Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2; Windows Server 2008 R2 SP1
Resolution: This issue is resolved in KB4487020.

Back to top
OS Build 15063.1563

January 08, 2019
KB4480973
Resolved
KB4487020
Resolved:
February 12, 2019
10:00 AM PT

Opened:
January 08, 2019
10:00 AM PT
First character of the Japanese era name not recognized as an abbreviation
After installing KB4480959, the first character of the Japanese era name is not recognized as an abbreviation and may cause date parsing issues.

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 8.1; Windows 7 SP1
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2; Windows Server 2012; Windows Server 2008 R2 SP1; Windows Server 2008 SP2
Resolution: This issue is resolved in KB4487011.

Back to top
OS Build 15063.1596

January 15, 2019
KB4480959
Resolved
KB4487011
Resolved:
February 19, 2019
02:00 PM PT

Opened:
January 15, 2019
10:00 AM PT
Applications using Microsoft Jet database fail to open
Applications that use a Microsoft Jet database with the Microsoft Access 97 file format may fail to open if the database has column names greater than 32 characters. The database will fail to open with the error, “Unrecognized Database Format”.

Affected platforms:
  • Client: Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 8.1; Windows 7 SP1 
  • Server: Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2; Windows Server 2012; Windows Server 2008 R2 SP1; Windows Server 2008 SP2
Resolution: This issue is resolved in KB4487020.

Back to top
OS Build 15063.1563

January 08, 2019
KB4480973
Resolved
KB4487020
Resolved:
February 12, 2019
10:00 AM PT

Opened:
January 08, 2019
10:00 AM PT
Webpages become unresponsive in Microsoft Edge
After installing KB4480973, some Microsoft Edge users report that they:
  • Cannot load webpages using a local IP address.
  • Cannot load webpages on the Internet using a VPN connection.
Browsing fails or the webpage may become unresponsive.

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709
Resolution: This issue is resolved in KB4487020.

Back to top
OS Build 15063.1563

January 08, 2019
KB4480973
Resolved
KB4487020
Resolved:
February 12, 2019
10:00 AM PT

Opened:
January 08, 2019
10:00 AM PT
Unable to access hotspots with third-party applications
After installing KB4480973, third-party applications may have difficulty authenticating hotspots.

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 8.1
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2
Resolution: This issue is resolved in KB4480959.

Back to top
OS Build 15063.1563

January 08, 2019
KB4480973
Resolved
KB4480959
Resolved:
January 15, 2019
10:00 AM PT

Opened:
January 08, 2019
10:00 AM PT
diff --git a/windows/release-information/resolved-issues-windows-10-1709.yml b/windows/release-information/resolved-issues-windows-10-1709.yml index 58c0125d9a..58d6d57eda 100644 --- a/windows/release-information/resolved-issues-windows-10-1709.yml +++ b/windows/release-information/resolved-issues-windows-10-1709.yml @@ -70,9 +70,9 @@ sections: - type: markdown text: " - - - + + +
DetailsOriginating updateStatusHistory
Error 1309 when installing/uninstalling MSI or MSP files
After installing KB4486996, users may receive “Error 1309” while installing or uninstalling certain types of MSI and MSP files.

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 8.1
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2
Resolution: This issue is resolved in KB4489886.

Back to top
OS Build 16299.967

February 12, 2019
KB4486996
Resolved
KB4489886
Resolved:
March 12, 2019
10:00 AM PT

Opened:
February 12, 2019
10:00 AM PT
Applications using Microsoft Jet database and Access 95 file format stop working
Applications that use a Microsoft Jet database with the Microsoft Access 95 file format may randomly stop working.

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 7, Service Pack 1
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2008 R2 SP1
Resolution: This issue is resolved in KB4487021.

Back to top
OS Build 16299.967

February 12, 2019
KB4486996
Resolved
KB4487021
Resolved:
February 19, 2019
02:00 PM PT

Opened:
February 12, 2019
10:00 AM PT
Internet Explorer may fail to load images
After installing KB4486996, Internet Explorer may fail to load images with a backslash (\\) in their relative source path.

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 8.1; Windows 7, Service Pack 1
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2; Windows Server 2008 R2 SP1
Resolution: This issue is resolved in KB4487021.

Back to top
OS Build 16299.967

February 12, 2019
KB4486996
Resolved
KB4487021
Resolved:
February 19, 2019
02:00 PM PT

Opened:
February 12, 2019
10:00 AM PT
Error 1309 when installing/uninstalling MSI or MSP files
After installing KB4486996, users may receive “Error 1309” while installing or uninstalling certain types of MSI and MSP files.

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 8.1
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2; Windows Server 2012
Resolution: This issue is resolved in KB4489886.

Back to top
OS Build 16299.967

February 12, 2019
KB4486996
Resolved
KB4489886
Resolved:
March 12, 2019
10:00 AM PT

Opened:
February 12, 2019
10:00 AM PT
Applications using Microsoft Jet database and Access 95 file format stop working
Applications that use a Microsoft Jet database with the Microsoft Access 95 file format may randomly stop working.

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 7 SP1
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2; Windows Server 2012; Windows Server 2008 R2 SP1; Windows Server 2008 SP2
Resolution: This issue is resolved in KB4487021.

Back to top
OS Build 16299.967

February 12, 2019
KB4486996
Resolved
KB4487021
Resolved:
February 19, 2019
02:00 PM PT

Opened:
February 12, 2019
10:00 AM PT
Internet Explorer may fail to load images
After installing KB4486996, Internet Explorer may fail to load images with a backslash (\\) in their relative source path.

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 8.1; Windows 7 SP1
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2; Windows Server 2008 R2 SP1
Resolution: This issue is resolved in KB4487021.

Back to top
OS Build 16299.967

February 12, 2019
KB4486996
Resolved
KB4487021
Resolved:
February 19, 2019
02:00 PM PT

Opened:
February 12, 2019
10:00 AM PT
" @@ -81,9 +81,9 @@ sections: - type: markdown text: " - - - + + +
DetailsOriginating updateStatusHistory
MSXML6 causes applications to stop responding if an exception was thrown
After installing KB4480978, MSXML6 causes applications to stop responding if an exception was thrown during node operations, such as appendChild(), insertBefore(), and moveNode().

The Group Policy editor may stop responding when editing a Group Policy Object (GPO) that contains Group Policy Preferences (GPP) for Internet Explorer 10 settings.

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 8.1
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2
Resolution: This issue is resolved in KB4493441.

Back to top
OS Build 16299.904

January 08, 2019
KB4480978
Resolved
KB4493441
Resolved:
April 09, 2019
10:00 AM PT

Opened:
January 08, 2019
10:00 AM PT
First character of the Japanese era name not recognized as an abbreviation
After installing KB4480967, the first character of the Japanese era name is not recognized as an abbreviation and may cause date parsing issues.

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 8.1; Windows 7, Service Pack 1
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2; Windows Server 2008 R2 SP1
Resolution: This issue is resolved in KB4487021.

Back to top
OS Build 16299.936

January 15, 2019
KB4480967
Resolved
KB4487021
Resolved:
February 19, 2019
02:00 PM PT

Opened:
January 15, 2019
10:00 AM PT
Applications using Microsoft Jet database fail to open
Applications that use a Microsoft Jet database with the Microsoft Access 97 file format may fail to open if the database has column names greater than 32 characters. The database will fail to open with the error, “Unrecognized Database Format.”

Affected platforms:
  • Client: Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 8.1; Windows 7, Service Pack 1 
  • Server: Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2; Windows Server 2008 R2 SP1 
Resolution: This issue is resolved in KB4486996.

Back to top
OS Build 16299.904

January 08, 2019
KB4480978
Resolved
KB4486996
Resolved:
February 12, 2019
10:00 AM PT

Opened:
January 08, 2019
10:00 AM PT
MSXML6 causes applications to stop responding if an exception was thrown
After installing KB4480978, MSXML6 causes applications to stop responding if an exception was thrown during node operations, such as appendChild(), insertBefore(), and moveNode().

The Group Policy editor may stop responding when editing a Group Policy Object (GPO) that contains Group Policy Preferences (GPP) for Internet Explorer 10 settings.

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 8.1
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2; Windows Server 2012
Resolution: This issue is resolved in KB4493441.

Back to top
OS Build 16299.904

January 08, 2019
KB4480978
Resolved
KB4493441
Resolved:
April 09, 2019
10:00 AM PT

Opened:
January 08, 2019
10:00 AM PT
First character of the Japanese era name not recognized as an abbreviation
After installing KB4480967, the first character of the Japanese era name is not recognized as an abbreviation and may cause date parsing issues.

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 8.1; Windows 7 SP1
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2; Windows Server 2012; Windows Server 2008 R2 SP1; Windows Server 2008 SP2
Resolution: This issue is resolved in KB4487021.

Back to top
OS Build 16299.936

January 15, 2019
KB4480967
Resolved
KB4487021
Resolved:
February 19, 2019
02:00 PM PT

Opened:
January 15, 2019
10:00 AM PT
Applications using Microsoft Jet database fail to open
Applications that use a Microsoft Jet database with the Microsoft Access 97 file format may fail to open if the database has column names greater than 32 characters. The database will fail to open with the error, “Unrecognized Database Format.”

Affected platforms:
  • Client: Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 8.1; Windows 7 SP1 
  • Server: Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2; Windows Server 2012; Windows Server 2008 R2 SP1; Windows Server 2008 SP2 
Resolution: This issue is resolved in KB4486996.

Back to top
OS Build 16299.904

January 08, 2019
KB4480978
Resolved
KB4486996
Resolved:
February 12, 2019
10:00 AM PT

Opened:
January 08, 2019
10:00 AM PT
Webpages become unresponsive in Microsoft Edge
After installing KB4480978, some Microsoft Edge users report that they:
  • Cannot load webpages using a local IP address.
  • Cannot load webpages on the Internet using a VPN connection.
Browsing fails or the webpage may become unresponsive.

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709
Resolution: This issue is resolved in KB4486996.

Back to top
OS Build 16299.904

January 08, 2019
KB4480978
Resolved
KB4486996
Resolved:
February 12, 2019
10:00 AM PT

Opened:
January 08, 2019
10:00 AM PT
Unable to access hotspots with third-party applications
After installing KB4480978, third-party applications may have difficulty authenticating hotspots.

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 8.1
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2
Resolution: This issue is resolved in KB4480967.

Back to top
OS Build 16299.904

January 08, 2019
KB4480978
Resolved
KB4480967
Resolved:
January 15, 2019
10:00 AM PT

Opened:
January 08, 2019
10:00 AM PT
diff --git a/windows/release-information/resolved-issues-windows-10-1803.yml b/windows/release-information/resolved-issues-windows-10-1803.yml index 30cdc45b91..9c6df068cc 100644 --- a/windows/release-information/resolved-issues-windows-10-1803.yml +++ b/windows/release-information/resolved-issues-windows-10-1803.yml @@ -75,8 +75,8 @@ sections: - type: markdown text: " - - + +
DetailsOriginating updateStatusHistory
Error 1309 when installing/uninstalling MSI or MSP files
After installing KB4487017, users may received \"Error 1309\" while installing or uninstalling certain types of MSI and MSP files. 

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 8.1
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2
Resolution: This issue is resolved in KB4489868.

Back to top
OS Build 17134.590

February 12, 2019
KB4487017
Resolved
KB4489868
Resolved:
March 12, 2019
10:00 AM PT

Opened:
February 12, 2019
10:00 AM PT
Internet Explorer may fail to load images
After installing KB4487017, Internet Explorer may fail to load images with a backslash (\\) in their relative source path. 

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 8.1; Windows 7, Service Pack 1
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2; Windows Server 2008 R2 SP1
Resolution: This issue is resolved in KB4487029

Back to top
OS Build 17134.590

February 12, 2019
KB4487017
Resolved
KB4487029
Resolved:
February 19, 2019
02:00 PM PT

Opened:
February 12, 2019
10:00 AM PT
Error 1309 when installing/uninstalling MSI or MSP files
After installing KB4487017, users may received \"Error 1309\" while installing or uninstalling certain types of MSI and MSP files. 

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 8.1
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2; Windows Server 2012
Resolution: This issue is resolved in KB4489868.

Back to top
OS Build 17134.590

February 12, 2019
KB4487017
Resolved
KB4489868
Resolved:
March 12, 2019
10:00 AM PT

Opened:
February 12, 2019
10:00 AM PT
Internet Explorer may fail to load images
After installing KB4487017, Internet Explorer may fail to load images with a backslash (\\) in their relative source path. 

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 8.1; Windows 7 SP1
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2; Windows Server 2008 R2 SP1
Resolution: This issue is resolved in KB4487029

Back to top
OS Build 17134.590

February 12, 2019
KB4487017
Resolved
KB4487029
Resolved:
February 19, 2019
02:00 PM PT

Opened:
February 12, 2019
10:00 AM PT
" @@ -85,9 +85,9 @@ sections: - type: markdown text: " - - - + + +
DetailsOriginating updateStatusHistory
MSXML6 may cause applications to stop responding
After installing KB4480966, MSXML6 causes applications to stop responding if an exception was thrown during node operations, such as appendChild(), insertBefore(), and moveNode().

The Group Policy editor may stop responding when editing a Group Policy Object (GPO) that contains Group Policy Preferences (GPP) for Internet Explorer 10 settings.

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 8.1
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2
Resolution: This issue was resolved in KB4493464

Back to top
OS Build 17134.523

January 08, 2019
KB4480966
Resolved
KB4493464
Resolved:
April 09, 2019
10:00 AM PT

Opened:
January 08, 2019
10:00 AM PT
First character of Japanese era name not recognized
After installing KB4480976, the first character of the Japanese era name is not recognized as an abbreviation and may cause date parsing issues.

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 8.1; Windows 7, Service Pack 1
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2; Windows Server 2008 R2 SP1
Resolution: This issue is resolved in KB4487029

Back to top
OS Build 17134.556

January 15, 2019
KB4480976
Resolved
KB4487029
Resolved:
February 19, 2019
02:00 PM PT

Opened:
January 15, 2019
10:00 AM PT
Applications using Microsoft Jet database and Access 95 file format stop working
Applications that use a Microsoft Jet database with the Microsoft Access 95 file format may randomly stop working. 

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 7, Service Pack 1
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2008 R2 SP1
Resolution: This issue is resolved in KB4487017.

Back to top
OS Build 17134.523

January 08, 2019
KB4480966
Resolved
KB4487017
Resolved:
February 12, 2019
10:00 AM PT

Opened:
January 08, 2019
10:00 AM PT
MSXML6 may cause applications to stop responding
After installing KB4480966, MSXML6 causes applications to stop responding if an exception was thrown during node operations, such as appendChild(), insertBefore(), and moveNode().

The Group Policy editor may stop responding when editing a Group Policy Object (GPO) that contains Group Policy Preferences (GPP) for Internet Explorer 10 settings.

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 8.1
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2; Windows Server 2012
Resolution: This issue was resolved in KB4493464

Back to top
OS Build 17134.523

January 08, 2019
KB4480966
Resolved
KB4493464
Resolved:
April 09, 2019
10:00 AM PT

Opened:
January 08, 2019
10:00 AM PT
First character of Japanese era name not recognized
After installing KB4480976, the first character of the Japanese era name is not recognized as an abbreviation and may cause date parsing issues.

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 8.1; Windows 7 SP1
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2; Windows Server 2012; Windows Server 2008 R2 SP1; Windows Server 2008 SP2
Resolution: This issue is resolved in KB4487029

Back to top
OS Build 17134.556

January 15, 2019
KB4480976
Resolved
KB4487029
Resolved:
February 19, 2019
02:00 PM PT

Opened:
January 15, 2019
10:00 AM PT
Applications using Microsoft Jet database and Access 95 file format stop working
Applications that use a Microsoft Jet database with the Microsoft Access 95 file format may randomly stop working. 

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 7 SP1
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2; Windows Server 2012; Windows Server 2008 R2 SP1; Windows Server 2008 SP2
Resolution: This issue is resolved in KB4487017.

Back to top
OS Build 17134.523

January 08, 2019
KB4480966
Resolved
KB4487017
Resolved:
February 12, 2019
10:00 AM PT

Opened:
January 08, 2019
10:00 AM PT
Webpages become unresponsive in Microsoft Edge
After installing KB4480966, some Microsoft Edge users report that they: 
  • Cannot load webpages using a local IP address. 
  • Cannot load webpages on the Internet using a VPN connection.  
Browsing fails or the webpage may become unresponsive. 

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709
Resolution: This issue is resolved in KB4487017

Back to top
OS Build 17134.523

January 08, 2019
KB4480966
Resolved
KB4487017
Resolved:
February 12, 2019
10:00 AM PT

Opened:
January 08, 2019
10:00 AM PT
Unable to access hotspots with third-party applications
After installing KB4480966, third-party applications may have difficulty authenticating hotspots.

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 8.1
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2
Resolution: This issue is resolved in KB4480976

Back to top
OS Build 17134.523

January 08, 2019
KB4480966
Resolved
KB4480976
Resolved:
January 15, 2019
10:00 AM PT

Opened:
January 08, 2019
10:00 AM PT
diff --git a/windows/release-information/resolved-issues-windows-10-1809-and-windows-server-2019.yml b/windows/release-information/resolved-issues-windows-10-1809-and-windows-server-2019.yml index 9ede7ba611..0cc6cac4d6 100644 --- a/windows/release-information/resolved-issues-windows-10-1809-and-windows-server-2019.yml +++ b/windows/release-information/resolved-issues-windows-10-1809-and-windows-server-2019.yml @@ -87,10 +87,10 @@ sections: - type: markdown text: " - - + + - +
DetailsOriginating updateStatusHistory
Error 1309 when installing/uninstalling MSI or MSP files
After installing KB4487044, users may receive \"Error 1309\" while installing or uninstalling certain types of MSI and MSP files. 

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 8.1
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2
Resolution: This issue is resolved in KB4489899

Back to top
OS Build 17763.316

February 12, 2019
KB4487044
Resolved
KB4489899
Resolved:
March 12, 2019
10:00 AM PT

Opened:
February 12, 2019
10:00 AM PT
Internet Explorer may fail to load images
After installing KB4487044, Internet Explorer may fail to load images with a backslash (\\) in their relative source path.

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 8.1; Windows 7, Service Pack 1
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2; Windows Server 2008 R2 SP1
Resolution: This issue is resolved in KB4482887.

Back to top
OS Build 17763.316

February 12, 2019
KB4487044
Resolved
KB4482887
Resolved:
March 01, 2019
10:00 AM PT

Opened:
February 12, 2019
10:00 AM PT
Error 1309 when installing/uninstalling MSI or MSP files
After installing KB4487044, users may receive \"Error 1309\" while installing or uninstalling certain types of MSI and MSP files. 

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 8.1
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2; Windows Server 2012
Resolution: This issue is resolved in KB4489899

Back to top
OS Build 17763.316

February 12, 2019
KB4487044
Resolved
KB4489899
Resolved:
March 12, 2019
10:00 AM PT

Opened:
February 12, 2019
10:00 AM PT
Internet Explorer may fail to load images
After installing KB4487044, Internet Explorer may fail to load images with a backslash (\\) in their relative source path.

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 8.1; Windows 7 SP1
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2; Windows Server 2008 R2 SP1
Resolution: This issue is resolved in KB4482887.

Back to top
OS Build 17763.316

February 12, 2019
KB4487044
Resolved
KB4482887
Resolved:
March 01, 2019
10:00 AM PT

Opened:
February 12, 2019
10:00 AM PT
Applications using Microsoft Jet database and Access 95 file format stop working
Applications that use a Microsoft Jet database with the Microsoft Access 95 file format may randomly stop working.

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 7, Service Pack 1
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2008 R2 SP1
Resolution: This issue is resolved in KB4482887.

Back to top
OS Build 17763.316

February 12, 2019
KB4487044
Resolved
KB4482887
Resolved:
March 01, 2019
10:00 AM PT

Opened:
February 12, 2019
10:00 AM PT
First character of the Japanese era name not recognized
After installing KB4487044, the first character of the Japanese era name is not recognized as an abbreviation and may cause date parsing issues. 

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 8.1; Windows 7, Service Pack 1
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2; Windows Server 2008 R2 SP1
Resolution: This issue is resolved in KB4482887

Back to top
OS Build 17763.316

February 12, 2019
KB4487044
Resolved
KB4482887
Resolved:
March 01, 2019
10:00 AM PT

Opened:
February 12, 2019
10:00 AM PT
First character of the Japanese era name not recognized
After installing KB4487044, the first character of the Japanese era name is not recognized as an abbreviation and may cause date parsing issues. 

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 8.1; Windows 7 SP1
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2; Windows Server 2012; Windows Server 2008 R2 SP1; Windows Server 2008 SP2
Resolution: This issue is resolved in KB4482887

Back to top
OS Build 17763.316

February 12, 2019
KB4487044
Resolved
KB4482887
Resolved:
March 01, 2019
10:00 AM PT

Opened:
February 12, 2019
10:00 AM PT
" @@ -100,7 +100,7 @@ sections: text: " - + diff --git a/windows/release-information/resolved-issues-windows-7-and-windows-server-2008-r2-sp1.yml b/windows/release-information/resolved-issues-windows-7-and-windows-server-2008-r2-sp1.yml index 12e2a0d6a9..5147f39d4f 100644 --- a/windows/release-information/resolved-issues-windows-7-and-windows-server-2008-r2-sp1.yml +++ b/windows/release-information/resolved-issues-windows-7-and-windows-server-2008-r2-sp1.yml @@ -68,7 +68,7 @@ sections: - type: markdown text: "
DetailsOriginating updateStatusHistory
Internet Explorer 11 authentication issue with multiple concurrent logons
After installing the February 12, 2019 update (KB4487044), Internet Explorer 11 and other applications that use WININET.DLL may have authentication issues. This occurs when two or more people use the same user account for multiple, concurrent login sessions on the same Windows Server machine, including Remote Desktop Protocol (RDP) and Terminal Server logons. Symptoms reported by customers include, but may not be limited to:  
  • Cache size and location show zero or empty. 
  • Keyboard shortcuts may not work properly. 
  • Webpages may intermittently fail to load or render correctly. 
  • Issues with credential prompts. 
  • Issues when downloading files. 
Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10 Enterprise LTSC 2016; Windows 8.1; Windows 7, Service Pack 1
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server 2016; Windows Server 2012 R2; Windows Server 2008 R2 SP1
Resolved: This issue was resolved in KB4493509

Back to top
OS Build 17763.253

January 08, 2019
KB4480116
Resolved
KB4493509
Resolved:
April 09, 2019
10:00 AM PT

Opened:
January 08, 2019
10:00 AM PT
MSXML6 may cause applications to stop responding
After installing KB4480116, MSXML6 causes applications to stop responding if an exception was thrown during node operations, such as appendChild(), insertBefore(), and moveNode().
 
The Group Policy editor may stop responding when editing a Group Policy Object (GPO) that contains Group Policy Preferences (GPP) for Internet Explorer 10 settings. 

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 8.1
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2
Resolved: This issue was resolved in KB4493509

Back to top
OS Build 17763.253

January 08, 2019
KB4480116
Resolved
KB4493509
Resolved:
April 09, 2019
10:00 AM PT

Opened:
January 08, 2019
10:00 AM PT
MSXML6 may cause applications to stop responding
After installing KB4480116, MSXML6 causes applications to stop responding if an exception was thrown during node operations, such as appendChild(), insertBefore(), and moveNode().
 
The Group Policy editor may stop responding when editing a Group Policy Object (GPO) that contains Group Policy Preferences (GPP) for Internet Explorer 10 settings. 

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 8.1
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2; Windows Server 2012
Resolved: This issue was resolved in KB4493509

Back to top
OS Build 17763.253

January 08, 2019
KB4480116
Resolved
KB4493509
Resolved:
April 09, 2019
10:00 AM PT

Opened:
January 08, 2019
10:00 AM PT
Global DNS outage affects Windows Update customers
Windows Update customers were affected by a network infrastructure event on January 29, 2019 (21:00 UTC), caused by an external DNS service provider's global outage. A software update to the external provider's DNS servers resulted in the distribution of corrupted DNS records that affected connectivity to the Windows Update service. The DNS records were restored by January 30, 2019 (00:10 UTC), and the majority of local Internet Service Providers (ISP) have refreshed their DNS servers and customer services have been restored. 
 
Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019
  • Server: Windows Server, version 1809; Windows Server 2019
While this was not an issue with Microsoft's services, we take any service disruption for our customers seriously. We will work with partners to better understand this so we can provide higher quality service in the future even across diverse global network providers. 
 
If you are still unable to connect to Windows Update services due to this problem, please contact your local ISP or network administrator. You can also refer to our new KB4493784 for more information to determine if your network is affected, and to provide your local ISP or network administrator with additional information to assist you. 

Back to top
N/A

Resolved
Resolved:
March 08, 2019
11:15 AM PT

Opened:
January 29, 2019
02:00 PM PT
Webpages become unresponsive in Microsoft Edge
After installing KB4480116, some Microsoft Edge users report that they:
  • Cannot load webpages using a local IP address. 
  • Cannot load webpages on the Internet using a VPN connection.
Browsing fails or the webpage may become unresponsive.

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709
Resolution: This issue is resolved in KB4487044

Back to top
OS Build 17763.253

January 08, 2019
KB4480116
Resolved
KB4487044
Resolved:
February 12, 2019
10:00 AM PT

Opened:
January 08, 2019
10:00 AM PT
Unable to access hotspots with third-party applications
After installing KB4480116, third-party applications may have difficulty authenticating hotspots. 

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 8.1
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2
Resolution: This issue is resolved in KB4476976

Back to top
OS Build 17763.253

January 08, 2019
KB4480116
Resolved
KB4476976
Resolved:
January 22, 2019
02:00 PM PT

Opened:
January 08, 2019
10:00 AM PT
- +
DetailsOriginating updateStatusHistory
Custom URI schemes may not start corresponding application.
After installing KB4489878, custom URI schemes for application protocol handlers may not start the corresponding application for local intranet and trusted sites on Internet Explorer.

Affected platforms: 
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 8.1; Windows 7, Service Pack 1 
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2; Windows Server 2008 R2 SP1 
Resolution: This issue is resolved in KB4493472.

Back to top
March 12, 2019
KB4489878
Resolved
KB4493472
Resolved:
April 09, 2019
10:00 AM PT

Opened:
March 12, 2019
10:00 AM PT
Custom URI schemes may not start corresponding application.
After installing KB4489878, custom URI schemes for application protocol handlers may not start the corresponding application for local intranet and trusted sites on Internet Explorer.

Affected platforms: 
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 8.1; Windows 7 SP1 
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2; Windows Server 2008 R2 SP1 
Resolution: This issue is resolved in KB4493472.

Back to top
March 12, 2019
KB4489878
Resolved
KB4493472
Resolved:
April 09, 2019
10:00 AM PT

Opened:
March 12, 2019
10:00 AM PT
NETDOM.EXE fails to run.
After installing KB4489878, NETDOM.EXE fails to run, and the on-screen error, “The command failed to complete successfully.” appears.

Affected platforms: 
  • Client: Windows 7, Service Pack 1 
  • Server: Windows Server 2008 R2 SP1 
Resolution: This issue is resolved in KB4493472.

Back to top
March 12, 2019
KB4489878
Resolved
KB4493472
Resolved:
April 09, 2019
10:00 AM PT

Opened:
March 12, 2019
10:00 AM PT
" @@ -78,7 +78,7 @@ sections: - type: markdown text: " - +
DetailsOriginating updateStatusHistory
Internet Explorer may fail to load images.
After installing KB4486563, Internet Explorer may fail to load images with a backslash (\\) in their relative source path.

Affected platforms: 
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 8.1; Windows 7, Service Pack 1 
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2; Windows Server 2008 R2 SP1 
Resolution: This issue is resolved in KB4486565.

Back to top
February 12, 2019
KB4486563
Resolved
KB4486565
Resolved:
February 19, 2019
02:00 PM PT

Opened:
February 12, 2019
10:00 AM PT
Internet Explorer may fail to load images.
After installing KB4486563, Internet Explorer may fail to load images with a backslash (\\) in their relative source path.

Affected platforms: 
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 8.1; Windows 7 SP1 
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2; Windows Server 2008 R2 SP1 
Resolution: This issue is resolved in KB4486565.

Back to top
February 12, 2019
KB4486563
Resolved
KB4486565
Resolved:
February 19, 2019
02:00 PM PT

Opened:
February 12, 2019
10:00 AM PT
Applications using Microsoft Jet database and Access 95 file format stop working.
Applications that use a Microsoft Jet database with the Microsoft Access 95 file format may randomly stop working.

Affected platforms: 
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 7, Service Pack 1 
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2008 R2 SP1 
Resolution: This issue is resolved in KB4486565.

Back to top
February 12, 2019
KB4486563
Resolved
KB4486565
Resolved:
February 19, 2019
02:00 PM PT

Opened:
February 12, 2019
10:00 AM PT
" @@ -91,8 +91,8 @@ sections:
Virtual machines fail to restore.
After installing KB4480970, virtual machines (VM) may fail to restore successfully if the VM has been saved and restored once before. The error message is, “Failed to restore the virtual machine state: Cannot restore this virtual machine because the saved state data cannot be read. Delete the saved state data and then try to start the virtual machine. (0xC0370027).”

This affects AMD Bulldozer Family 15h, AMD Jaguar Family 16h, and AMD Puma Family 16h (second generation) microarchitectures.

Affected platforms: 
  • Client: Windows 7, Service Pack 1 
  • Server: Windows Server 2008 R2 SP1 
Resolution: This issue is resolved in KB4490511.

Back to topJanuary 08, 2019
KB4480970Resolved
KB4490511Resolved:
February 19, 2019
02:00 PM PT

Opened:
January 08, 2019
10:00 AM PT
Local Administrators unable to remotely access shares.
Local users who are part of the local Administrators group may not be able to remotely access shares on Windows Server 2008 R2 and Windows 7 machines after installing KB4480970. This does not affect domain accounts in the local Administrators group.
 
Affected platforms: 
  • Client: Windows 7, Service Pack 1 
  • Server: Windows Server 2008 R2 SP1 
Resolution: This issue is resolved in KB4487345.

Back to topJanuary 08, 2019
KB4480970Resolved
KB4487345Resolved:
January 11, 2019
02:00 PM PT

Opened:
January 08, 2019
10:00 AM PT
Internet Explorer 11 authentication issue with multiple concurrent logons.
After installing KB4480970, Internet Explorer 11 and other applications that use WININET.DLL may have authentication issues. This occurs when two or more people use the same user account for multiple, concurrent login sessions on the same Windows Server machine, including Remote Desktop Protocol (RDP) and Terminal Server logons. Symptoms reported by customers include, but may not be limited to:
  • Cache size and location show zero or empty.
  • Keyboard shortcuts may not work properly.
  • Webpages may intermittently fail to load or render correctly.
  • Issues with credential prompts.
  • Issues when downloading files.
Affected platforms: 
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10 Enterprise LTSC 2016; Windows 8.1; Windows 7, Service Pack 1 
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server 2016; Windows Server 2012 R2; Windows Server 2008 R2 SP1 
Resolution: This issue is resolved in KB4493472.

Back to topJanuary 08, 2019
KB4480970Resolved
KB4493472Resolved:
April 09, 2019
10:00 AM PT

Opened:
January 08, 2019
10:00 AM PT -
First character of the Japanese era name not recognized as an abbreviation.
After installing KB4480955, the first character of the Japanese era name is not recognized as an abbreviation and may cause date parsing issues.

Affected platforms: 
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 8.1; Windows 7, Service Pack 1 
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2; Windows Server 2008 R2 SP1 
Resolution: This issue is resolved in KB4486565.

Back to topJanuary 17, 2019
KB4480955Resolved
KB4486565Resolved:
February 19, 2019
02:00 PM PT

Opened:
January 17, 2019
10:00 AM PT -
Applications using Microsoft Jet database fail to open.
Applications that use a Microsoft Jet database with the Microsoft Access 97 file format may fail to open if the database has column names greater than 32 characters. The database will fail to open with the error, “Unrecognized Database Format”.

Affected Platforms:
  • Client: Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 8.1; Windows 7, Service Pack 1 
  • Server: Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2; Windows Server 2008 R2 SP1 

Resolution: This issue is resolved in KB4486563.

Back to topJanuary 08, 2019
KB4480970Resolved
KB4486563Resolved:
February 12, 2019
10:00 AM PT

Opened:
January 08, 2019
10:00 AM PT +
First character of the Japanese era name not recognized as an abbreviation.
After installing KB4480955, the first character of the Japanese era name is not recognized as an abbreviation and may cause date parsing issues.

Affected platforms: 
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 8.1; Windows 7 SP1 
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2; Windows Server 2012; Windows Server 2008 R2 SP1; Windows Server 2008 SP2 
Resolution: This issue is resolved in KB4486565.

Back to topJanuary 17, 2019
KB4480955Resolved
KB4486565Resolved:
February 19, 2019
02:00 PM PT

Opened:
January 17, 2019
10:00 AM PT +
Applications using Microsoft Jet database fail to open.
Applications that use a Microsoft Jet database with the Microsoft Access 97 file format may fail to open if the database has column names greater than 32 characters. The database will fail to open with the error, “Unrecognized Database Format”.

Affected Platforms:
  • Client: Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 8.1; Windows 7 SP1 
  • Server: Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2; Windows Server 2012; Windows Server 2008 R2 SP1; Windows Server 2008 SP2 

Resolution: This issue is resolved in KB4486563.

Back to topJanuary 08, 2019
KB4480970Resolved
KB4486563Resolved:
February 12, 2019
10:00 AM PT

Opened:
January 08, 2019
10:00 AM PT " diff --git a/windows/release-information/resolved-issues-windows-8.1-and-windows-server-2012-r2.yml b/windows/release-information/resolved-issues-windows-8.1-and-windows-server-2012-r2.yml index 263bfc7ab0..87210c9a79 100644 --- a/windows/release-information/resolved-issues-windows-8.1-and-windows-server-2012-r2.yml +++ b/windows/release-information/resolved-issues-windows-8.1-and-windows-server-2012-r2.yml @@ -69,7 +69,7 @@ sections: - type: markdown text: " - +
DetailsOriginating updateStatusHistory
Custom URI schemes may not start corresponding application
After installing KB4489881, custom URI schemes for application protocol handlers may not start the corresponding application for local intranet and trusted sites security zones on Internet Explorer.

Affected platforms: 
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 8.1; Windows 7, Service Pack 1 
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2; Windows Server 2008 R2 SP1 
Resolution: This issue is resolved in KB4493446.

Back to top
March 12, 2019
KB4489881
Resolved
KB4493446
Resolved:
April 09, 2019
10:00 AM PT

Opened:
March 12, 2019
10:00 AM PT
Custom URI schemes may not start corresponding application
After installing KB4489881, custom URI schemes for application protocol handlers may not start the corresponding application for local intranet and trusted sites security zones on Internet Explorer.

Affected platforms: 
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 8.1; Windows 7 SP1 
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2; Windows Server 2008 R2 SP1 
Resolution: This issue is resolved in KB4493446.

Back to top
March 12, 2019
KB4489881
Resolved
KB4493446
Resolved:
April 09, 2019
10:00 AM PT

Opened:
March 12, 2019
10:00 AM PT
Devices with winsock kernel client may receive error
After installing KB4489881, devices with a winsock kernel client may receive D1, FC, and other errors. Additionally, systems that run the Skype for Business or Lync Server Edge Transport role may be affected by this issue.

Affected platforms: 
  • Client: Windows 8.1 
  • Server: Windows Server 2012 R2 
Resolution: This issue is resolved in KB4489893.

Back to top
March 12, 2019
KB4489881
Resolved
KB4489893
Resolved:
March 19, 2019
10:00 AM PT

Opened:
March 12, 2019
10:00 AM PT
" @@ -80,8 +80,8 @@ sections: text: " - - + +
DetailsOriginating updateStatusHistory
Embedded objects may display incorrectly
Any compound document (OLE) server application that places embedded objects into the Windows Metafile (WMF) using the PatBlt API may display embedded objects incorrectly.

For example, if you paste a Microsoft Excel worksheet object into a Microsoft Word document, the cells may render with a different background color.

Affected platforms: 
  • Client: Windows 8.1 
  • Server: Windows Server 2012 R2 
Resolution: This issue is resolved in KB4493446.

Back to top
February 12, 2019
KB4487000
Resolved
KB4493446
Resolved:
April 09, 2019
10:00 AM PT

Opened:
February 12, 2019
10:00 AM PT
Error 1309 when installing/uninstalling MSI or MSP files
After installing KB4487016, users may receive “Error 1309” while installing or uninstalling certain types of MSI and MSP files.

Affected platforms: 
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 8.1 
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2 
Resolution: This issue is resolved in KB4489881.

Back to top
February 19, 2019
KB4487016
Resolved
KB4489881
Resolved:
March 12, 2019
10:00 AM PT

Opened:
February 19, 2019
02:00 PM PT
Internet Explorer may fail to load images
After installing KB4487000, Internet Explorer may fail to load images with a backslash (\\) in their relative source path.

Affected platforms: 
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 8.1; Windows 7, Service Pack 1 
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2; Windows Server 2008 R2 SP1 
Resolution: This issue is resolved in KB4487016.

Back to top
February 12, 2019
KB4487000
Resolved
KB4487016
Resolved:
February 19, 2019
02:00 PM PT

Opened:
February 12, 2019
10:00 AM PT
Error 1309 when installing/uninstalling MSI or MSP files
After installing KB4487016, users may receive “Error 1309” while installing or uninstalling certain types of MSI and MSP files.

Affected platforms: 
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 8.1 
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2; Windows Server 2012 
Resolution: This issue is resolved in KB4489881.

Back to top
February 19, 2019
KB4487016
Resolved
KB4489881
Resolved:
March 12, 2019
10:00 AM PT

Opened:
February 19, 2019
02:00 PM PT
Internet Explorer may fail to load images
After installing KB4487000, Internet Explorer may fail to load images with a backslash (\\) in their relative source path.

Affected platforms: 
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 8.1; Windows 7 SP1 
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2; Windows Server 2008 R2 SP1 
Resolution: This issue is resolved in KB4487016.

Back to top
February 12, 2019
KB4487000
Resolved
KB4487016
Resolved:
February 19, 2019
02:00 PM PT

Opened:
February 12, 2019
10:00 AM PT
" @@ -91,10 +91,10 @@ sections: text: " - - + + - +
DetailsOriginating updateStatusHistory
Internet Explorer 11 authentication issue with multiple concurrent logons
After installing KB4480963, Internet Explorer 11 and other applications that use WININET.DLL may have authentication issues. This occurs when two or more people use the same user account for multiple, concurrent login sessions on the same Windows Server machine, including Remote Desktop Protocol (RDP) and Terminal Server logons. Symptoms reported by customers include, but may not be limited to:
  • Cache size and location show zero or empty.
  • Keyboard shortcuts may not work properly.
  • Webpages may intermittently fail to load or render correctly.
  • Issues with credential prompts.
  • Issues when downloading files.
Affected platforms: 
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10 Enterprise LTSC 2016; Windows 8.1; Windows 7, Service Pack 1 
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server 2016; Windows Server 2012 R2; Windows Server 2008 R2 SP1 
Resolution: This issue is resolved in KB4493446.

Back to top
January 08, 2019
KB4480963
Resolved
KB4493446
Resolved:
April 09, 2019
10:00 AM PT

Opened:
January 08, 2019
10:00 AM PT
MSXML6 may cause applications to stop responding.
After installing KB4480963, MSXML6 causes applications to stop responding if an exception was thrown during node operations, such as appendChild(), insertBefore(), and moveNode().

The Group Policy editor may stop responding when editing a Group Policy Object (GPO) that contains Group Policy Preferences (GPP) for Internet Explorer 10 settings.

Resolution: This issue is resolved in KB4493446.

Back to top
January 08, 2019
KB4480963
Resolved
KB4493446
Resolved:
April 09, 2019
10:00 AM PT

Opened:
January 08, 2019
10:00 AM PT
First character of the Japanese era name not recognized as an abbreviation
After installing KB4480969, the first character of the Japanese era name is not recognized as an abbreviation and may cause date parsing issues.

Affected platforms: 
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 8.1; Windows 7, Service Pack 1 
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2; Windows Server 2008 R2 SP1 
Resolution: This issue is resolved in KB4487016.

Back to top
January 15, 2019
KB4480969
Resolved
KB4487016
Resolved:
February 19, 2019
02:00 PM PT

Opened:
January 15, 2019
10:00 AM PT
MSXML6 may cause applications to stop responding.
After installing KB4480963, MSXML6 causes applications to stop responding if an exception was thrown during node operations, such as appendChild(), insertBefore(), and moveNode().

The Group Policy editor may stop responding when editing a Group Policy Object (GPO) that contains Group Policy Preferences (GPP) for Internet Explorer 10 settings.

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 8.1
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2; Windows Server 2012
Resolution: This issue is resolved in KB4493446.

Back to top
January 08, 2019
KB4480963
Resolved
KB4493446
Resolved:
April 09, 2019
10:00 AM PT

Opened:
January 08, 2019
10:00 AM PT
First character of the Japanese era name not recognized as an abbreviation
After installing KB4480969, the first character of the Japanese era name is not recognized as an abbreviation and may cause date parsing issues.

Affected platforms: 
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 8.1; Windows 7, SP1 
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2; Windows Server 2012; Windows Server 2008 R2 SP1; Windows Server 2008 SP2 
Resolution: This issue is resolved in KB4487016.

Back to top
January 15, 2019
KB4480969
Resolved
KB4487016
Resolved:
February 19, 2019
02:00 PM PT

Opened:
January 15, 2019
10:00 AM PT
Virtual machines fail to restore
After installing KB4480963, virtual machines (VM) may fail to restore successfully if the VM has been saved and restored once before. The error message is, “Failed to restore the virtual machine state: Cannot restore this virtual machine because the saved state data cannot be read. Delete the saved state data and then try to start the virtual machine. (0xC0370027).”

This affects AMD Bulldozer Family 15h, AMD Jaguar Family 16h, and AMD Puma Family 16h (second generation) microarchitectures.

Resolution: This issue is resolved in KB4490512.

Back to top
January 08, 2019
KB4480963
Resolved
KB4490512
Resolved:
February 19, 2019
02:00 PM PT

Opened:
January 08, 2019
10:00 AM PT
Applications using Microsoft Jet database fail to open
Applications that use a Microsoft Jet database with the Microsoft Access 97 file format may fail to open if the database has column names greater than 32 characters. The database will fail to open with the error, “Unrecognized Database Format”.

Affected platforms: 
  • Client: Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 8.1; Windows 7, Service Pack 1 
  • Server: Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2; Windows Server 2008 R2 SP1 
Resolution: This issue is resolved in KB4487000.

Back to top
January 08, 2019
KB4480963
Resolved
KB4487000
Resolved:
February 12, 2019
10:00 AM PT

Opened:
January 08, 2019
10:00 AM PT
Applications using Microsoft Jet database fail to open
Applications that use a Microsoft Jet database with the Microsoft Access 97 file format may fail to open if the database has column names greater than 32 characters. The database will fail to open with the error, “Unrecognized Database Format”.

Affected platforms: 
  • Client: Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 8.1; Windows 7 SP1 
  • Server: Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2; Windows Server 2012; Windows Server 2008 R2 SP1; Windows Server 2008 SP2 
Resolution: This issue is resolved in KB4487000.

Back to top
January 08, 2019
KB4480963
Resolved
KB4487000
Resolved:
February 12, 2019
10:00 AM PT

Opened:
January 08, 2019
10:00 AM PT
Unable to access hotspots with third-party applications
After installing KB4480963, third-party applications may have difficulty authenticating hotspots.

Affected platforms: 
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 8.1 
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2 
Resolution: This issue is resolved in KB4480969.

Back to top
January 08, 2019
KB4480963
Resolved
KB4480969
Resolved:
January 15, 2019
10:00 AM PT

Opened:
January 08, 2019
10:00 AM PT
" diff --git a/windows/release-information/resolved-issues-windows-server-2008-sp2.yml b/windows/release-information/resolved-issues-windows-server-2008-sp2.yml index 268887f9d8..7d454b6438 100644 --- a/windows/release-information/resolved-issues-windows-server-2008-sp2.yml +++ b/windows/release-information/resolved-issues-windows-server-2008-sp2.yml @@ -32,14 +32,14 @@ sections: - type: markdown text: " - - - - - - - - + + + + + + + +
SummaryOriginating updateStatusDate resolved
First character of the Japanese era name not recognized as an abbreviation
The first character of the Japanese era name is not recognized as an abbreviation and may cause date parsing issues.

See details >
January 17, 2019
KB4480974
Resolved
KB4489880
April 25, 2019
03:32 PM PT
Applications using Microsoft Jet database fail to open
Applications that use a Microsoft Jet database with the Microsoft Access 97 file format may fail to open if column names are greater than 32 characters.

See details >
January 08, 2019
KB4480968
Resolved
KB4487023
April 25, 2019
03:32 PM PT
Unable to use Seek bar in Windows Media Player
Users may not be able to use the Seek bar in Windows Media Player when playing specific files.

See details >
October 09, 2018
KB4463097
Resolved
KB4471325
April 25, 2019
03:28 PM PT
Virtual machines fail to restore
Virtual machines (VMs) may fail to restore successfully if the VM has been saved and restored once before.

See details >
January 08, 2019
KB4480968
Resolved
KB4490514
April 25, 2019
03:26 PM PT
Embedded objects may display incorrectly
Any compound document (OLE) server application that places embedded objects into the Windows Metafile (WMF) using the PatBlt API may display embedded objects incorrectly.

See details >
February 12, 2019
KB4487023
Resolved
KB4493471
April 25, 2019
03:26 PM PT
Applications using Microsoft Jet database and Access 95 file format stop working
Applications that use a Microsoft Jet database with the Microsoft Access 95 file format may randomly stop working.

See details >
February 12, 2019
KB4487023
Resolved
KB4487022
April 25, 2019
03:26 PM PT
Local Administrators unable to remotely access shares
Local users who are part of the local Administrators group may not be able to remotely access shares on Windows Server 2008 R2 and Windows 7 machines.

See details >
January 08, 2019
KB4480968
Resolved
KB4487354
April 25, 2019
03:26 PM PT
NETDOM.EXE fails to run
NETDOM.EXE fails to run and the error, “The command failed to complete successfully.” appears on screen.

See details >
March 12, 2019
KB4489880
Resolved
KB4493471
April 25, 2019
03:25 PM PT
Embedded objects may display incorrectly
Any compound document (OLE) server application that places embedded objects into the Windows Metafile (WMF) using the PatBlt API may display embedded objects incorrectly.

See details >
February 12, 2019
KB4487023
Resolved
KB4493471
April 09, 2019
10:00 AM PT
NETDOM.EXE fails to run
NETDOM.EXE fails to run and the error, “The command failed to complete successfully.” appears on screen.

See details >
March 12, 2019
KB4489880
Resolved
KB4493471
April 09, 2019
10:00 AM PT
First character of the Japanese era name not recognized as an abbreviation
The first character of the Japanese era name is not recognized as an abbreviation and may cause date parsing issues.

See details >
January 17, 2019
KB4480974
Resolved
KB4489880
March 12, 2019
10:00 AM PT
Virtual machines fail to restore
Virtual machines (VMs) may fail to restore successfully if the VM has been saved and restored once before.

See details >
January 08, 2019
KB4480968
Resolved
KB4490514
February 19, 2019
02:00 PM PT
Applications using Microsoft Jet database and Access 95 file format stop working
Applications that use a Microsoft Jet database with the Microsoft Access 95 file format may randomly stop working.

See details >
February 12, 2019
KB4487023
Resolved
KB4487022
February 19, 2019
02:00 PM PT
Applications using Microsoft Jet database fail to open
Applications that use a Microsoft Jet database with the Microsoft Access 97 file format may fail to open if column names are greater than 32 characters.

See details >
January 08, 2019
KB4480968
Resolved
KB4487023
February 12, 2019
10:00 AM PT
Local Administrators unable to remotely access shares
Local users who are part of the local Administrators group may not be able to remotely access shares on Windows Server 2008 R2 and Windows 7 machines.

See details >
January 08, 2019
KB4480968
Resolved
KB4487354
January 11, 2019
02:00 PM PT
Unable to use Seek bar in Windows Media Player
Users may not be able to use the Seek bar in Windows Media Player when playing specific files.

See details >
October 09, 2018
KB4463097
Resolved
KB4471325
December 11, 2018
10:00 AM PT
" @@ -50,18 +50,42 @@ sections:
" -- title: April 2019 +- title: March 2019 - items: - type: markdown text: " - - - - - - - - + +
DetailsOriginating updateStatusHistory
First character of the Japanese era name not recognized as an abbreviation
After installing KB4480974, the first character of the Japanese era name is not recognized as an abbreviation and may cause date parsing issues.

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 8.1; Windows 7, Service Pack 1
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2; Windows Server 2012; Windows Server 2008 R2 SP1; Windows Server 2008 SP2
Resolution: This issue is resolved in KB4489880.

Back to top
January 17, 2019
KB4480974
Resolved
KB4489880
Resolved:
March 12, 2019
10:00 AM PT

Opened:
April 25, 2019
03:32 PM PT
Applications using Microsoft Jet database fail to open
Applications that use a Microsoft Jet database with the Microsoft Access 97 file format may fail to open if the database has column names greater than 32 characters. The database will fail to open with the error, “Unrecognized Database Format”.

Affected platforms: 
  • Client: Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 8.1; Windows 7, Service Pack 1 
  • Server: Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2; Windows Server 2012; Windows Server 2008 R2 SP1; Windows Server 2008 SP2
Resolution: This issue is resolved in KB4487023.

Back to top
January 08, 2019
KB4480968
Resolved
KB4487023
Resolved:
February 12, 2019
10:00 AM PT

Opened:
April 25, 2019
03:32 PM PT
Unable to use Seek bar in Windows Media Player
After installing KB4463097, users may not be able to use the Seek Bar in Windows Media Player when playing specific files. This issue does not affect normal playback.

Affected platforms: 
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 8.1; Windows 7, Service Pack 1
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2; Windows Server 2012; Windows Server 2008 R2 SP1; Windows Server 2008 SP2
Resolution: This issue is resolved in KB4471325.

Back to top
October 09, 2018
KB4463097
Resolved
KB4471325
Resolved:
December 11, 2018
10:00 AM PT

Opened:
April 25, 2019
03:28 PM PT
Virtual machines fail to restore
After installing KB4480968, virtual machines (VM) may fail to restore successfully if the VM has been saved and restored once before. The error message is, “Failed to restore the virtual machine state: Cannot restore this virtual machine because the saved state data cannot be read. Delete the saved state data and then try to start the virtual machine. (0xC0370027).”

This affects AMD Bulldozer Family 15h, AMD Jaguar Family 16h, and AMD Puma Family 16h (second generation) microarchitectures.

Affected platforms: 
  • Client: Windows 7, Service Pack 1 
  • Server: Windows Server 2012; Windows Server 2008 R2 SP1; Windows Server 2008 SP2
Resolution: This issue is resolved in KB4490514.

Back to top
January 08, 2019
KB4480968
Resolved
KB4490514
Resolved:
February 19, 2019
02:00 PM PT

Opened:
April 25, 2019
03:26 PM PT
Embedded objects may display incorrectly
Any compound document (OLE) server application that places embedded objects into the Windows Metafile (WMF) using the PatBlt API may display embedded objects incorrectly.

For example, if you paste a Microsoft Excel worksheet object into a Microsoft Word document, the cells may render with a different background color.

Affected platforms: 
  • Client: Windows 8.1 
  • Server: Windows Server 2012 R2; Windows Server 2012; Windows Server 2008 SP2
Resolution: This issue is resolved in KB4493471.

Back to top
February 12, 2019
KB4487023
Resolved
KB4493471
Resolved:
April 09, 2019
10:00 AM PT

Opened:
April 25, 2019
03:26 PM PT
Applications using Microsoft Jet database and Access 95 file format stop working
Applications that use a Microsoft Jet database with the Microsoft Access 95 file format may randomly stop working.

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 7, Service Pack 1
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012; Windows Server 2008 R2 SP1; Windows Server 2008 SP2
Resolution: This issue is resolved in KB4487022.

Back to top
February 12, 2019
KB4487023
Resolved
KB4487022
Resolved:
February 19, 2019
02:00 PM PT

Opened:
April 25, 2019
03:26 PM PT
Local Administrators unable to remotely access shares
Local users who are part of the local Administrators group may not be able to remotely access shares on Windows Server 2008 R2 and Windows 7 machines after installing KB4480968. This does not affect domain accounts in the local Administrators group.

Affected platforms: 
  • Client: Windows 7, Service Pack 1 
  • Server: Windows Server 2008 R2 SP1; Windows Server 2008 SP2
Resolution: This issue is resolved in KB4487354.

Back to top
January 08, 2019
KB4480968
Resolved
KB4487354
Resolved:
January 11, 2019
02:00 PM PT

Opened:
April 25, 2019
03:26 PM PT
NETDOM.EXE fails to run
After installing KB4489880, NETDOM.EXE fails to run, and the on-screen error, “The command failed to complete successfully.” appears.

Affected platforms: 
  • Client: Windows 7, Service Pack 1 
  • Server: Windows Server 2008 R2 SP1; Windows Server 2008 SP2
Resolution: This issue is resolved in KB4493471.

Back to top
March 12, 2019
KB4489880
Resolved
KB4493471
Resolved:
April 09, 2019
10:00 AM PT

Opened:
April 25, 2019
03:25 PM PT
NETDOM.EXE fails to run
After installing KB4489880, NETDOM.EXE fails to run, and the on-screen error, “The command failed to complete successfully.” appears.

Affected platforms: 
  • Client: Windows 7, Service Pack 1 
  • Server: Windows Server 2008 R2 SP1; Windows Server 2008 SP2
Resolution: This issue is resolved in KB4493471.

Back to top
March 12, 2019
KB4489880
Resolved
KB4493471
Resolved:
April 09, 2019
10:00 AM PT

Opened:
March 12, 2019
10:00 AM PT
+ " + +- title: February 2019 +- items: + - type: markdown + text: " + + + +
DetailsOriginating updateStatusHistory
Embedded objects may display incorrectly
Any compound document (OLE) server application that places embedded objects into the Windows Metafile (WMF) using the PatBlt API may display embedded objects incorrectly.

For example, if you paste a Microsoft Excel worksheet object into a Microsoft Word document, the cells may render with a different background color.

Affected platforms: 
  • Client: Windows 8.1 
  • Server: Windows Server 2012 R2; Windows Server 2012; Windows Server 2008 SP2
Resolution: This issue is resolved in KB4493471.

Back to top
February 12, 2019
KB4487023
Resolved
KB4493471
Resolved:
April 09, 2019
10:00 AM PT

Opened:
February 12, 2019
10:00 AM PT
Applications using Microsoft Jet database and Access 95 file format stop working
Applications that use a Microsoft Jet database with the Microsoft Access 95 file format may randomly stop working.

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 7 SP1
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012; Windows Server 2008 R2 SP1; Windows Server 2008 SP2
Resolution: This issue is resolved in KB4487022.

Back to top
February 12, 2019
KB4487023
Resolved
KB4487022
Resolved:
February 19, 2019
02:00 PM PT

Opened:
February 12, 2019
10:00 AM PT
+ " + +- title: January 2019 +- items: + - type: markdown + text: " + + + + + +
DetailsOriginating updateStatusHistory
First character of the Japanese era name not recognized as an abbreviation
After installing KB4480974, the first character of the Japanese era name is not recognized as an abbreviation and may cause date parsing issues.

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 8.1; Windows 7 SP1
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2; Windows Server 2012; Windows Server 2008 R2 SP1; Windows Server 2008 SP2
Resolution: This issue is resolved in KB4489880.

Back to top
January 17, 2019
KB4480974
Resolved
KB4489880
Resolved:
March 12, 2019
10:00 AM PT

Opened:
January 17, 2019
10:00 AM PT
Virtual machines fail to restore
After installing KB4480968, virtual machines (VM) may fail to restore successfully if the VM has been saved and restored once before. The error message is, “Failed to restore the virtual machine state: Cannot restore this virtual machine because the saved state data cannot be read. Delete the saved state data and then try to start the virtual machine. (0xC0370027).”

This affects AMD Bulldozer Family 15h, AMD Jaguar Family 16h, and AMD Puma Family 16h (second generation) microarchitectures.

Affected platforms: 
  • Client: Windows 7, Service Pack 1 
  • Server: Windows Server 2012; Windows Server 2008 R2 SP1; Windows Server 2008 SP2
Resolution: This issue is resolved in KB4490514.

Back to top
January 08, 2019
KB4480968
Resolved
KB4490514
Resolved:
February 19, 2019
02:00 PM PT

Opened:
January 08, 2019
10:00 AM PT
Applications using Microsoft Jet database fail to open
Applications that use a Microsoft Jet database with the Microsoft Access 97 file format may fail to open if the database has column names greater than 32 characters. The database will fail to open with the error, “Unrecognized Database Format”.

Affected platforms: 
  • Client: Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 8.1; Windows 7 SP1 
  • Server: Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2; Windows Server 2012; Windows Server 2008 R2 SP1; Windows Server 2008 SP2
Resolution: This issue is resolved in KB4487023.

Back to top
January 08, 2019
KB4480968
Resolved
KB4487023
Resolved:
February 12, 2019
10:00 AM PT

Opened:
January 08, 2019
10:00 AM PT
Local Administrators unable to remotely access shares
Local users who are part of the local Administrators group may not be able to remotely access shares on Windows Server 2008 R2 and Windows 7 machines after installing KB4480968. This does not affect domain accounts in the local Administrators group.

Affected platforms: 
  • Client: Windows 7, Service Pack 1 
  • Server: Windows Server 2008 R2 SP1; Windows Server 2008 SP2
Resolution: This issue is resolved in KB4487354.

Back to top
January 08, 2019
KB4480968
Resolved
KB4487354
Resolved:
January 11, 2019
02:00 PM PT

Opened:
January 08, 2019
10:00 AM PT
+ " + +- title: October 2018 +- items: + - type: markdown + text: " + +
DetailsOriginating updateStatusHistory
Unable to use Seek bar in Windows Media Player
After installing KB4463097, users may not be able to use the Seek Bar in Windows Media Player when playing specific files. This issue does not affect normal playback.

Affected platforms: 
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 8.1; Windows 7, Service Pack 1
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2; Windows Server 2012; Windows Server 2008 R2 SP1; Windows Server 2008 SP2
Resolution: This issue is resolved in KB4471325.

Back to top
October 09, 2018
KB4463097
Resolved
KB4471325
Resolved:
December 11, 2018
10:00 AM PT

Opened:
October 09, 2018
10:00 AM PT
" diff --git a/windows/release-information/resolved-issues-windows-server-2012.yml b/windows/release-information/resolved-issues-windows-server-2012.yml index 37579944b1..d1d3a8fa37 100644 --- a/windows/release-information/resolved-issues-windows-server-2012.yml +++ b/windows/release-information/resolved-issues-windows-server-2012.yml @@ -32,17 +32,17 @@ sections: - type: markdown text: " - - - - - - - - - - - + + + + + + + + + + +
SummaryOriginating updateStatusDate resolved
Applications using Microsoft Jet database and Access 95 file format stop working
Applications that use a Microsoft Jet database with the Microsoft Access 95 file format may randomly stop working.

See details >
February 12, 2019
KB4487025
Resolved
KB4487024
April 25, 2019
04:04 PM PT
First character of the Japanese era name not recognized as an abbreviation
The first character of the Japanese era name is not recognized as an abbreviation and may cause date parsing issues.

See details >
January 15, 2019
KB4480971
Resolved
KB4487024
April 25, 2019
04:02 PM PT
Embedded objects may display incorrectly
Any compound document (OLE) server application that places embedded objects into the Windows Metafile (WMF) using the PatBlt API may display embedded objects incorrectly.

See details >
February 12, 2019
KB4487025
Resolved
KB4493451
April 25, 2019
04:00 PM PT
Error 1309 when installing/uninstalling MSI or MSP files
Users may receive “Error 1309” while installing or uninstalling certain types of MSI and MSP files.

See details >
February 12, 2019
KB4487025
Resolved
KB4489891
April 25, 2019
03:36 PM PT
Internet Explorer 11 authentication issue with multiple concurrent logons
Internet Explorer 11 users may encounter issues if two or more people use the same user account for multiple, concurrent login sessions on the same Windows Server machine.

See details >
January 08, 2019
KB4480975
Resolved
KB4493451
April 25, 2019
03:34 PM PT
MSXML6 may cause applications to stop responding
MSXML6 may cause applications to stop responding if an exception was thrown during node operations, such as appendChild(), insertBefore(), and moveNode().

See details >
January 08, 2019
KB4480975
Resolved
KB4493451
April 25, 2019
03:27 PM PT
Virtual machines fail to restore
Virtual machines (VMs) may fail to restore successfully if the VM has been saved and restored once before.

See details >
January 08, 2019
KB4480975
Resolved
KB4490516
April 25, 2019
03:22 PM PT
Applications using Microsoft Jet database fail to open
Applications that use a Microsoft Jet database with the Microsoft Access 97 file format may fail to open if column names are greater than 32 characters.

See details >
January 08, 2019
KB4480975
Resolved
KB4487025
April 25, 2019
03:19 PM PT
Unable to access hotspots with third-party applications
Third-party applications may have difficulty authenticating hotspots.

See details >
January 08, 2019
KB4480975
Resolved
KB4480971
April 25, 2019
03:14 PM PT
Event Viewer may not show some event descriptions for network interface cards
The Event Viewer may not show some event descriptions for network interface cards (NIC).

See details >
September 11, 2018
KB4457135
Resolved
KB4489891
April 25, 2019
03:10 PM PT
Unable to use Seek bar in Windows Media Player
Users may not be able to use the Seek bar in Windows Media Player when playing specific files.

See details >
October 09, 2018
KB4462929
Resolved
KB4471330
April 25, 2019
02:47 PM PT
Internet Explorer 11 authentication issue with multiple concurrent logons
Internet Explorer 11 users may encounter issues if two or more people use the same user account for multiple, concurrent login sessions on the same Windows Server machine.

See details >
January 08, 2019
KB4480975
Resolved
KB4493451
April 09, 2019
10:00 AM PT
MSXML6 may cause applications to stop responding
MSXML6 may cause applications to stop responding if an exception was thrown during node operations, such as appendChild(), insertBefore(), and moveNode().

See details >
January 08, 2019
KB4480975
Resolved
KB4493451
April 09, 2019
10:00 AM PT
Embedded objects may display incorrectly
Any compound document (OLE) server application that places embedded objects into the Windows Metafile (WMF) using the PatBlt API may display embedded objects incorrectly.

See details >
February 12, 2019
KB4487025
Resolved
KB4493451
April 09, 2019
10:00 AM PT
Event Viewer may not show some event descriptions for network interface cards
The Event Viewer may not show some event descriptions for network interface cards (NIC).

See details >
September 11, 2018
KB4457135
Resolved
KB4489891
March 12, 2019
10:00 AM PT
Error 1309 when installing/uninstalling MSI or MSP files
Users may receive “Error 1309” while installing or uninstalling certain types of MSI and MSP files.

See details >
February 12, 2019
KB4487025
Resolved
KB4489891
March 12, 2019
10:00 AM PT
Virtual machines fail to restore
Virtual machines (VMs) may fail to restore successfully if the VM has been saved and restored once before.

See details >
January 08, 2019
KB4480975
Resolved
KB4490516
February 19, 2019
02:00 PM PT
First character of the Japanese era name not recognized as an abbreviation
The first character of the Japanese era name is not recognized as an abbreviation and may cause date parsing issues.

See details >
January 15, 2019
KB4480971
Resolved
KB4487024
February 19, 2019
02:00 PM PT
Applications using Microsoft Jet database and Access 95 file format stop working
Applications that use a Microsoft Jet database with the Microsoft Access 95 file format may randomly stop working.

See details >
February 12, 2019
KB4487025
Resolved
KB4487024
February 19, 2019
02:00 PM PT
Applications using Microsoft Jet database fail to open
Applications that use a Microsoft Jet database with the Microsoft Access 97 file format may fail to open if column names are greater than 32 characters.

See details >
January 08, 2019
KB4480975
Resolved
KB4487025
February 12, 2019
10:00 AM PT
Unable to access hotspots with third-party applications
Third-party applications may have difficulty authenticating hotspots.

See details >
January 08, 2019
KB4480975
Resolved
KB4480971
January 15, 2019
10:00 AM PT
Unable to use Seek bar in Windows Media Player
Users may not be able to use the Seek bar in Windows Media Player when playing specific files.

See details >
October 09, 2018
KB4462929
Resolved
KB4471330
December 11, 2018
10:00 AM PT
" @@ -53,21 +53,45 @@ sections:
" -- title: April 2019 +- title: February 2019 - items: - type: markdown text: " - - - - - - - - - - - + + + +
DetailsOriginating updateStatusHistory
Applications using Microsoft Jet database and Access 95 file format stop working
Applications that use a Microsoft Jet database with the Microsoft Access 95 file format may randomly stop working.

Resolution: This issue is resolved in KB4487024.

Back to top
February 12, 2019
KB4487025
Resolved
KB4487024
Resolved:
February 19, 2019
02:00 PM PT

Opened:
April 25, 2019
04:04 PM PT
First character of the Japanese era name not recognized as an abbreviation
After installing KB4480971, the first character of the Japanese era name is not recognized as an abbreviation and may cause date parsing issues.

Resolution: This issue is resolved in KB4487024.

Back to top
January 15, 2019
KB4480971
Resolved
KB4487024
Resolved:
February 19, 2019
02:00 PM PT

Opened:
April 25, 2019
04:01 PM PT
Embedded objects may display incorrectly
Any compound document (OLE) server application that places embedded objects into the Windows Metafile (WMF) using the PatBlt API may display embedded objects incorrectly.

For example, if you paste a Microsoft Excel worksheet object into a Microsoft Word document, the cells may render with a different background color.

Resolution: This issue is resolved in KB4493451.

Back to top
February 12, 2019
KB4487025
Resolved
KB4493451
Resolved:
April 09, 2019
10:00 AM PT

Opened:
April 25, 2019
04:00 PM PT
Error 1309 when installing/uninstalling MSI or MSP files
After installing KB4487025, users may receive \"Error 1309\" while installing or uninstalling certain types of MSI and MSP files.

Resolution: This issue is resolved in KB4489891.

Back to top
February 12, 2019
KB4487025
Resolved
KB4489891
Resolved:
March 12, 2019
10:00 AM PT

Opened:
April 25, 2019
03:36 PM PT
Internet Explorer 11 authentication issue with multiple concurrent logons
After installing KB4480975, Internet Explorer 11 and other applications that use WININET.DLL may have authentication issues. This occurs when two or more people use the same user account for multiple, concurrent login sessions on the same Windows Server machine, including Remote Desktop Protocol (RDP) and Terminal Server logons. Symptoms reported by customers include, but may not be limited to:
  • Cache size and location show zero or empty.
  • Keyboard shortcuts may not work properly.
  • Webpages may intermittently fail to load or render correctly.
  • Issues with credential prompts.
  • Issues when downloading files.
Resolution: This issue is resolved in KB4493451.

Back to top
January 08, 2019
KB4480975
Resolved
KB4493451
Resolved:
April 09, 2019
10:00 AM PT

Opened:
April 25, 2019
03:34 PM PT
MSXML6 may cause applications to stop responding
After installing KB4480975, MSXML6 causes applications to stop responding if an exception was thrown during node operations, such as appendChild(), insertBefore(), and moveNode().

The Group Policy editor may stop responding when editing a Group Policy Object (GPO) that contains Group Policy Preferences (GPP) for Internet Explorer 10 settings.

Resolution: This issue is resolved in KB4493451.

Back to top
January 08, 2019
KB4480975
Resolved
KB4493451
Resolved:
April 09, 2019
10:00 AM PT

Opened:
April 25, 2019
03:27 PM PT
Virtual machines fail to restore
After installing KB4480975, virtual machines (VM) may fail to restore successfully if the VM has been saved and restored once before. The error message is, \"Failed to restore the virtual machine state: Cannot restore this virtual machine because the saved state data cannot be read. Delete the saved state data and then try to start the virtual machine. (0xC0370027).\"

This affects AMD Bulldozer Family 15h, AMD Jaguar Family 16h, and AMD Puma Family 16h (second generation) microarchitectures.

Resolution: This issue is resolved in KB4490516.

Back to top
January 08, 2019
KB4480975
Resolved
KB4490516
Resolved:
February 19, 2019
02:00 PM PT

Opened:
April 25, 2019
03:22 PM PT
Applications using Microsoft Jet database fail to open
Applications that use a Microsoft Jet database with the Microsoft Access 97 file format may fail to open if the database has column names greater than 32 characters. The database will fail to open with the error, \"Unrecognized Database Format\".

Resolution: This issue is resolved in KB4487025.

Back to top
January 08, 2019
KB4480975
Resolved
KB4487025
Resolved:
February 12, 2019
10:00 AM PT

Opened:
April 25, 2019
03:19 PM PT
Unable to access hotspots with third-party applications
After installing KB4480975, third-party applications may have difficulty authenticating hotspots.

Resolution: This issue is resolved in KB4480971.

Back to top
January 08, 2019
KB4480975
Resolved
KB4480971
Resolved:
January 15, 2019
10:00 AM PT

Opened:
April 25, 2019
03:14 PM PT
Event Viewer may not show some event descriptions for network interface cards
After installing KB4457135, the Event Viewer may not show some event descriptions for network interface cards (NICs).

Resolution: This issue is resolved in KB4489891.

Back to top
September 11, 2018
KB4457135
Resolved
KB4489891
Resolved:
March 12, 2019
10:00 AM PT

Opened:
April 25, 2019
03:10 PM PT
Unable to use Seek bar in Windows Media Player
After installing KB4462929, users may not be able to use the Seek Bar in Windows Media Player when playing specific files. This issue does not affect normal playback.

Resolution: This issue is resolved in KB4471330.

Back to top
October 09, 2018
KB4462929
Resolved
KB4471330
Resolved:
December 11, 2018
10:00 AM PT

Opened:
April 25, 2019
02:47 PM PT
Embedded objects may display incorrectly
Any compound document (OLE) server application that places embedded objects into the Windows Metafile (WMF) using the PatBlt API may display embedded objects incorrectly.

For example, if you paste a Microsoft Excel worksheet object into a Microsoft Word document, the cells may render with a different background color.

Resolution: This issue is resolved in KB4493451.

Back to top
February 12, 2019
KB4487025
Resolved
KB4493451
Resolved:
April 09, 2019
10:00 AM PT

Opened:
February 12, 2019
10:00 AM PT
Error 1309 when installing/uninstalling MSI or MSP files
After installing KB4487025, users may receive \"Error 1309\" while installing or uninstalling certain types of MSI and MSP files.

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 8.1
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2; Windows Server 2012
Resolution: This issue is resolved in KB4489891.

Back to top
February 12, 2019
KB4487025
Resolved
KB4489891
Resolved:
March 12, 2019
10:00 AM PT

Opened:
February 12, 2019
10:00 AM PT
Applications using Microsoft Jet database and Access 95 file format stop working
Applications that use a Microsoft Jet database with the Microsoft Access 95 file format may randomly stop working.

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 7 SP1
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012; Windows Server 2008 R2 SP1; Windows Server 2008 SP2
Resolution: This issue is resolved in KB4487024.

Back to top
February 12, 2019
KB4487025
Resolved
KB4487024
Resolved:
February 19, 2019
02:00 PM PT

Opened:
February 12, 2019
10:00 AM PT
+ " + +- title: January 2019 +- items: + - type: markdown + text: " + + + + + + + +
DetailsOriginating updateStatusHistory
Internet Explorer 11 authentication issue with multiple concurrent logons
After installing KB4480975, Internet Explorer 11 and other applications that use WININET.DLL may have authentication issues. This occurs when two or more people use the same user account for multiple, concurrent login sessions on the same Windows Server machine, including Remote Desktop Protocol (RDP) and Terminal Server logons. Symptoms reported by customers include, but may not be limited to:
  • Cache size and location show zero or empty.
  • Keyboard shortcuts may not work properly.
  • Webpages may intermittently fail to load or render correctly.
  • Issues with credential prompts.
  • Issues when downloading files.
Resolution: This issue is resolved in KB4493451.

Back to top
January 08, 2019
KB4480975
Resolved
KB4493451
Resolved:
April 09, 2019
10:00 AM PT

Opened:
January 08, 2019
10:00 AM PT
MSXML6 may cause applications to stop responding
After installing KB4480975, MSXML6 causes applications to stop responding if an exception was thrown during node operations, such as appendChild(), insertBefore(), and moveNode().

The Group Policy editor may stop responding when editing a Group Policy Object (GPO) that contains Group Policy Preferences (GPP) for Internet Explorer 10 settings.

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 8.1
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2; Windows Server 2012
Resolution: This issue is resolved in KB4493451.

Back to top
January 08, 2019
KB4480975
Resolved
KB4493451
Resolved:
April 09, 2019
10:00 AM PT

Opened:
January 08, 2019
10:00 AM PT
Virtual machines fail to restore
After installing KB4480975, virtual machines (VM) may fail to restore successfully if the VM has been saved and restored once before. The error message is, \"Failed to restore the virtual machine state: Cannot restore this virtual machine because the saved state data cannot be read. Delete the saved state data and then try to start the virtual machine. (0xC0370027).\"

This affects AMD Bulldozer Family 15h, AMD Jaguar Family 16h, and AMD Puma Family 16h (second generation) microarchitectures.

Resolution: This issue is resolved in KB4490516.

Back to top
January 08, 2019
KB4480975
Resolved
KB4490516
Resolved:
February 19, 2019
02:00 PM PT

Opened:
January 08, 2019
10:00 AM PT
First character of the Japanese era name not recognized as an abbreviation
After installing KB4480971, the first character of the Japanese era name is not recognized as an abbreviation and may cause date parsing issues.

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 8.1; Windows 7 SP1
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2; Windows Server 2012; Windows Server 2008 R2 SP1; Windows Server 2008 SP2
Resolution: This issue is resolved in KB4487024.

Back to top
January 15, 2019
KB4480971
Resolved
KB4487024
Resolved:
February 19, 2019
02:00 PM PT

Opened:
January 15, 2019
10:00 AM PT
Applications using Microsoft Jet database fail to open
Applications that use a Microsoft Jet database with the Microsoft Access 97 file format may fail to open if the database has column names greater than 32 characters. The database will fail to open with the error, \"Unrecognized Database Format\".

Affected platforms: 
  • Client: Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 8.1; Windows 7 SP1 
  • Server: Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2; Windows Server 2012; Windows Server 2008 R2 SP1; Windows Server 2008 SP2
Resolution: This issue is resolved in KB4487025.

Back to top
January 08, 2019
KB4480975
Resolved
KB4487025
Resolved:
February 12, 2019
10:00 AM PT

Opened:
January 08, 2019
10:00 AM PT
Unable to access hotspots with third-party applications
After installing KB4480975, third-party applications may have difficulty authenticating hotspots.

Resolution: This issue is resolved in KB4480971.

Back to top
January 08, 2019
KB4480975
Resolved
KB4480971
Resolved:
January 15, 2019
10:00 AM PT

Opened:
January 08, 2019
10:00 AM PT
+ " + +- title: October 2018 +- items: + - type: markdown + text: " + + +
DetailsOriginating updateStatusHistory
Unable to use Seek bar in Windows Media Player
After installing KB4462929, users may not be able to use the Seek Bar in Windows Media Player when playing specific files. This issue does not affect normal playback.

Resolution: This issue is resolved in KB4471330.

Back to top
October 09, 2018
KB4462929
Resolved
KB4471330
Resolved:
December 11, 2018
10:00 AM PT

Opened:
October 09, 2018
10:00 AM PT
+ " + +- title: September 2018 +- items: + - type: markdown + text: " + +
DetailsOriginating updateStatusHistory
Event Viewer may not show some event descriptions for network interface cards
After installing KB4457135, the Event Viewer may not show some event descriptions for network interface cards (NICs).

Resolution: This issue is resolved in KB4489891.

Back to top
September 11, 2018
KB4457135
Resolved
KB4489891
Resolved:
March 12, 2019
10:00 AM PT

Opened:
September 11, 2018
10:00 AM PT
" diff --git a/windows/release-information/status-windows-10-1507.yml b/windows/release-information/status-windows-10-1507.yml index 282ce48e19..88c9c0387b 100644 --- a/windows/release-information/status-windows-10-1507.yml +++ b/windows/release-information/status-windows-10-1507.yml @@ -47,7 +47,7 @@ sections: - items: - type: markdown text: " -
See all messages >
+
See all messages >
" - items: - type: markdown @@ -60,6 +60,7 @@ sections: - type: markdown text: "
This table offers a summary of current active issues and those issues that have been resolved in the last 30 days.
+
SummaryOriginating updateStatusLast updated
Certain operations performed on a Cluster Shared Volume may fail
Certain operations, such as rename, performed on files or folders on a Cluster Shared Volume (CSV) may fail with the error, \"STATUS_BAD_IMPERSONATION_LEVEL (0xC00000A5)\".

See details >
OS Build 10240.18186

April 09, 2019
KB4493475
Mitigated
April 26, 2019
10:47 AM PT
MSXML6 may cause applications to stop responding
MSXML6 may cause applications to stop responding if an exception was thrown during node operations, such as appendChild(), insertBefore(), and moveNode().

See details >
OS Build 10240.18094

January 08, 2019
KB4480962
Resolved
KB4493475
April 09, 2019
10:00 AM PT
Custom URI schemes may not start corresponding application
Custom URI schemes for application protocol handlers may not start the corresponding application for local intranet and trusted sites in Internet Explorer.

See details >
OS Build 10240.18158

March 12, 2019
KB4489872
Resolved
KB4493475
April 09, 2019
10:00 AM PT
@@ -72,12 +73,21 @@ sections:
" +- title: April 2019 +- items: + - type: markdown + text: " + + +
DetailsOriginating updateStatusHistory
Certain operations performed on a Cluster Shared Volume may fail
Certain operations, such as rename, that you perform on files or folders that are on a Cluster Shared Volume (CSV) may fail with the error, \"STATUS_BAD_IMPERSONATION_LEVEL (0xC00000A5)\". This occurs when you perform the operation on a CSV owner node from a process that doesn’t have administrator privilege.

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 8.1
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2; Windows Server 2012
Workaround: Do one of the following: 
 
  • Perform the operation from a process that has administrator privilege. 
  • Perform the operation from a node that doesn’t have CSV ownership. 
Next steps: Microsoft is working on a resolution and will provide an update in an upcoming release.

Back to top
OS Build 10240.18186

April 09, 2019
KB4493475
Mitigated
Last updated:
April 26, 2019
10:47 AM PT

Opened:
April 26, 2019
10:47 AM PT
+ " + - title: March 2019 - items: - type: markdown text: " - +
DetailsOriginating updateStatusHistory
Custom URI schemes may not start corresponding application
After installing KB4489872, Custom URI Schemes for Application Protocol handlers may not start the corresponding application for local intranet and trusted sites on Internet Explorer.

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 8.1; Windows 7, Service Pack 1 
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2; Windows Server 2008 R2 SP1
Resolution: This issue was resolved in KB4493475.

Back to top
OS Build 10240.18158

March 12, 2019
KB4489872
Resolved
KB4493475
Resolved:
April 09, 2019
10:00 AM PT

Opened:
March 12, 2019
10:00 AM PT
Custom URI schemes may not start corresponding application
After installing KB4489872, Custom URI Schemes for Application Protocol handlers may not start the corresponding application for local intranet and trusted sites on Internet Explorer.

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 8.1; Windows 7 SP1 
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2; Windows Server 2008 R2 SP1
Resolution: This issue was resolved in KB4493475.

Back to top
OS Build 10240.18158

March 12, 2019
KB4489872
Resolved
KB4493475
Resolved:
April 09, 2019
10:00 AM PT

Opened:
March 12, 2019
10:00 AM PT
" @@ -86,6 +96,6 @@ sections: - type: markdown text: " - +
DetailsOriginating updateStatusHistory
MSXML6 may cause applications to stop responding
After installing KB4480962, MSXML6 causes applications to stop responding if an exception was thrown during node operations, such as appendChild(), insertBefore(), and moveNode().

The Group Policy editor may stop responding when editing a Group Policy Object (GPO) that contains Group Policy Preferences (GPP) for Internet Explorer 10 settings.

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 8.1
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2
Resolution: This issue was resolved in KB4493475.

Back to top
OS Build 10240.18094

January 08, 2019
KB4480962
Resolved
KB4493475
Resolved:
April 09, 2019
10:00 AM PT

Opened:
January 08, 2019
10:00 AM PT
MSXML6 may cause applications to stop responding
After installing KB4480962, MSXML6 causes applications to stop responding if an exception was thrown during node operations, such as appendChild(), insertBefore(), and moveNode().

The Group Policy editor may stop responding when editing a Group Policy Object (GPO) that contains Group Policy Preferences (GPP) for Internet Explorer 10 settings.

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 8.1
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2; Windows Server 2012
Resolution: This issue was resolved in KB4493475.

Back to top
OS Build 10240.18094

January 08, 2019
KB4480962
Resolved
KB4493475
Resolved:
April 09, 2019
10:00 AM PT

Opened:
January 08, 2019
10:00 AM PT
" diff --git a/windows/release-information/status-windows-10-1607-and-windows-server-2016.yml b/windows/release-information/status-windows-10-1607-and-windows-server-2016.yml index 333b5bca2c..51cb38d936 100644 --- a/windows/release-information/status-windows-10-1607-and-windows-server-2016.yml +++ b/windows/release-information/status-windows-10-1607-and-windows-server-2016.yml @@ -47,7 +47,7 @@ sections: - items: - type: markdown text: " -
See all messages >
+
See all messages >
" - items: - type: markdown @@ -60,10 +60,11 @@ sections: - type: markdown text: "
This table offers a summary of current active issues and those issues that have been resolved in the last 30 days.
- - - - + + + + + @@ -78,14 +79,23 @@ sections:
" +- title: April 2019 +- items: + - type: markdown + text: " +
SummaryOriginating updateStatusLast updated
Cluster service may fail if the minimum password length is set to greater than 14
The cluster service may fail to start with the error “2245 (NERR_PasswordTooShort)” if the Group Policy “Minimum Password Length” is configured with greater than 14 characters.

See details >
OS Build 14393.2639

November 27, 2018
KB4467684
Mitigated
March 19, 2019
10:00 AM PT
Custom URI schemes may not start corresponding application
Custom URI schemes for application protocol handlers may not start the corresponding application for local intranet and trusted sites in Internet Explorer.

See details >
OS Build 14393.2848

March 12, 2019
KB4489882
Mitigated
March 19, 2019
10:00 AM PT
Issue using PXE to start a device from WDS
There may be issues using the Preboot Execution Environment (PXE) to start a device from a Windows Deployment Services (WDS) server configured to use Variable Window Extension.

See details >
OS Build 14393.2848

March 12, 2019
KB4489882
Mitigated
March 19, 2019
10:00 AM PT
SCVMM cannot enumerate and manage logical switches deployed on the host
For hosts managed by System Center Virtual Machine Manager (VMM), VMM cannot enumerate and manage logical switches deployed on the host.

See details >
OS Build 14393.2639

November 27, 2018
KB4467684
Mitigated
March 19, 2019
10:00 AM PT
Certain operations performed on a Cluster Shared Volume may fail
Certain operations, such as rename, performed on files or folders on a Cluster Shared Volume (CSV) may fail with the error, \"STATUS_BAD_IMPERSONATION_LEVEL (0xC00000A5)\".

See details >
OS Build 14393.2906

April 09, 2019
KB4493470
Mitigated
April 26, 2019
10:48 AM PT
Cluster service may fail if the minimum password length is set to greater than 14
The cluster service may fail to start with the error “2245 (NERR_PasswordTooShort)” if the Group Policy “Minimum Password Length” is configured with greater than 14 characters.

See details >
OS Build 14393.2639

November 27, 2018
KB4467684
Mitigated
April 09, 2019
10:00 AM PT
Custom URI schemes may not start corresponding application
Custom URI schemes for application protocol handlers may not start the corresponding application for local intranet and trusted sites in Internet Explorer.

See details >
OS Build 14393.2848

March 12, 2019
KB4489882
Mitigated
April 09, 2019
10:00 AM PT
Issue using PXE to start a device from WDS
There may be issues using the Preboot Execution Environment (PXE) to start a device from a Windows Deployment Services (WDS) server configured to use Variable Window Extension.

See details >
OS Build 14393.2848

March 12, 2019
KB4489882
Mitigated
April 09, 2019
10:00 AM PT
SCVMM cannot enumerate and manage logical switches deployed on the host
For hosts managed by System Center Virtual Machine Manager (VMM), VMM cannot enumerate and manage logical switches deployed on the host.

See details >
OS Build 14393.2639

November 27, 2018
KB4467684
Mitigated
April 09, 2019
10:00 AM PT
Windows may not start on certain Lenovo and Fujitsu laptops with less than 8GB of RAM
Windows may fail to start on certain Lenovo and Fujitsu laptops that have less than 8 GB of RAM.

See details >
OS Build 14393.2608

November 13, 2018
KB4467691
Mitigated
February 19, 2019
10:00 AM PT
End-user-defined characters (EUDC) cause blue screen at startup
If you enable per font end-user-defined characters (EUDC), the system will stop working and a blue screen may appear at startup.

See details >
OS Build 14393.2879

March 19, 2019
KB4489889
Resolved
KB4493470
April 09, 2019
10:00 AM PT
Internet Explorer 11 authentication issue with multiple concurrent logons
Internet Explorer 11 users may encounter issues if two or more people use the same user account for multiple, concurrent login sessions on the same Windows Server machine.

See details >
OS Build 14393.2724

January 08, 2019
KB4480961
Resolved
KB4493470
April 09, 2019
10:00 AM PT
+ +
DetailsOriginating updateStatusHistory
Certain operations performed on a Cluster Shared Volume may fail
Certain operations, such as rename, that you perform on files or folders that are on a Cluster Shared Volume (CSV) may fail with the error, \"STATUS_BAD_IMPERSONATION_LEVEL (0xC00000A5)\". This occurs when you perform the operation on a CSV owner node from a process that doesn’t have administrator privilege. 

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 8.1
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2; Windows Server 2012
Workaround: Do one of the following: 

  • Perform the operation from a process that has administrator privilege. 
  • Perform the operation from a node that doesn’t have CSV ownership. 
Next steps: Microsoft is working on a resolution and will provide an update in an upcoming release.

Back to top
OS Build 14393.2906

April 09, 2019
KB4493470
Mitigated
Last updated:
April 26, 2019
10:48 AM PT

Opened:
April 26, 2019
10:48 AM PT
+ " + - title: March 2019 - items: - type: markdown text: " - + +
Option 2:
Use the Windows Deployment Services UI to make the following adjustment:
  1. Open Windows Deployment Services from Windows Administrative Tools.
  2. Expand Servers and right-click a WDS server.
  3. Open its properties and clear the Enable Variable Window Extension box on the TFTP tab.
Option 3:
Set the following registry value to 0:
HKLM\\System\\CurrentControlSet\\Services\\WDSServer\\Providers\\WDSTFTP\\EnableVariableWindowExtension
Restart the WDSServer service after disabling the Variable Window Extension.

Next steps: Microsoft is working on a resolution and will provide an update in an upcoming release.

Back to top
DetailsOriginating updateStatusHistory
Custom URI schemes may not start corresponding application
After installing KB4489882, Custom URI schemes for application protocol handlers may not start the corresponding application for local intranet and trusted sites security zones on Internet Explorer.

Affected platforms: 
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 8.1; Windows 7, Service Pack 1 
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2; Windows Server 2008 R2 SP1
Workaround: Right-click the URL link to open it in a new window or tab, or enable Protected Mode in Internet Explorer for local intranet and trusted sites
  1. Go to Tools > Internet options > Security.
  2. Within Select a zone to view or change security settings, select Local intranet and then select Enable Protected Mode.
  3. Select Trusted sites and then select Enable Protected Mode.
  4. Select OK.
You must restart the browser after making these changes.

Next steps: Microsoft is working on a resolution and will provide an update in an upcoming release.

Back to top
OS Build 14393.2848

March 12, 2019
KB4489882
Mitigated
Last updated:
March 19, 2019
10:00 AM PT

Opened:
March 12, 2019
10:00 AM PT
Custom URI schemes may not start corresponding application
After installing KB4489882, Custom URI schemes for application protocol handlers may not start the corresponding application for local intranet and trusted sites security zones on Internet Explorer.

Affected platforms: 
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 8.1; Windows 7 SP1 
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2; Windows Server 2008 R2 SP1
Workaround: Right-click the URL link to open it in a new window or tab, or enable Protected Mode in Internet Explorer for local intranet and trusted sites
  1. Go to Tools > Internet options > Security.
  2. Within Select a zone to view or change security settings, select Local intranet and then select Enable Protected Mode.
  3. Select Trusted sites and then select Enable Protected Mode.
  4. Select OK.
You must restart the browser after making these changes.

Next steps: Microsoft is working on a resolution and will provide an update in an upcoming release.

Back to top
OS Build 14393.2848

March 12, 2019
KB4489882
Mitigated
Last updated:
April 09, 2019
10:00 AM PT

Opened:
March 12, 2019
10:00 AM PT
Issue using PXE to start a device from WDS
After installing KB4489882, there may be issues using the Preboot Execution Environment (PXE) to start a device from a Windows Deployment Services (WDS) server configured to use Variable Window Extension. This may cause the connection to the WDS server to terminate prematurely while downloading the image. This issue does not affect clients or devices that are not using Variable Window Extension.

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10 Enterprise LTSC 2016; Windows 8.1
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server 2016; Windows Server 2012 R2
Workaround: To mitigate the issue, disable the Variable Window Extension on WDS server using one of the following options:
Option 1:
Open an Administrator Command prompt and type the following:
Wdsutil /Set-TransportServer /EnableTftpVariableWindowExtension:No
-
Option 2:
Use the Windows Deployment Services UI to make the following adjustment:
  1. Open Windows Deployment Services from Windows Administrative Tools.
  2. Expand Servers and right-click a WDS server.
  3. Open its properties and clear the Enable Variable Window Extension box on the TFTP tab.
Option 3:
Set the following registry value to 0:
HKLM\\System\\CurrentControlSet\\Services\\WDSServer\\Providers\\WDSTFTP\\EnableVariableWindowExtension
Restart the WDSServer service after disabling the Variable Window Extension.

Next steps: Microsoft is working on a resolution and will provide an update in an upcoming release.

Back to top
OS Build 14393.2848

March 12, 2019
KB4489882
Mitigated
Last updated:
March 19, 2019
10:00 AM PT

Opened:
March 12, 2019
10:00 AM PT
OS Build 14393.2848

March 12, 2019
KB4489882
Mitigated
Last updated:
April 09, 2019
10:00 AM PT

Opened:
March 12, 2019
10:00 AM PT
End-user-defined characters (EUDC) cause blue screen at startup
If you enable per font end-user-defined characters (EUDC), the system will stop working and a blue screen may appear at startup. This is not a common setting in non-Asian regions.

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016
Resolution: This issue was resolved in KB4493470.

Back to top
OS Build 14393.2879

March 19, 2019
KB4489889
Resolved
KB4493470
Resolved:
April 09, 2019
10:00 AM PT

Opened:
March 19, 2019
10:00 AM PT
" @@ -96,7 +106,7 @@ sections: text: " - +
DetailsOriginating updateStatusHistory
Internet Explorer 11 authentication issue with multiple concurrent logons
After installing KB4480961, Internet Explorer 11 and other applications that use WININET.DLL may have authentication issues. This occurs when two or more people use the same user account for multiple, concurrent login sessions on the same Windows Server machine, including Remote Desktop Protocol (RDP) and Terminal Server logons. Symptoms reported by customers include, but may not be limited to:
  • Cache size and location show zero or empty.
  • Keyboard shortcuts may not work properly.
  • Webpages may intermittently fail to load or render correctly.
  • Issues with credential prompts.
  • Issues when downloading files.
Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10 Enterprise LTSC 2016; Windows 8.1; Windows 7, Service Pack 1
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server 2016; Windows Server 2012 R2; Windows Server 2008 R2 SP1
Resolution: This issue was resolved in KB4493470.

Back to top
OS Build 14393.2724

January 08, 2019
KB4480961
Resolved
KB4493470
Resolved:
April 09, 2019
10:00 AM PT

Opened:
January 08, 2019
10:00 AM PT
MSXML6 may cause applications to stop responding
After installing KB4480961, MSXML6 causes applications to stop responding if an exception was thrown during node operations, such as appendChild(), insertBefore(), and moveNode().

The Group Policy editor may stop responding when editing a Group Policy Object (GPO) that contains Group Policy Preferences (GPP) for Internet Explorer 10 settings.

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 8.1
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2
Resolution: This issue was resolved in KB4493470.

Back to top
OS Build 14393.2724

January 08, 2019
KB4480961
Resolved
KB4493470
Resolved:
April 09, 2019
10:00 AM PT

Opened:
January 08, 2019
10:00 AM PT
MSXML6 may cause applications to stop responding
After installing KB4480961, MSXML6 causes applications to stop responding if an exception was thrown during node operations, such as appendChild(), insertBefore(), and moveNode().

The Group Policy editor may stop responding when editing a Group Policy Object (GPO) that contains Group Policy Preferences (GPP) for Internet Explorer 10 settings.

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 8.1
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2; Windows Server 2012
Resolution: This issue was resolved in KB4493470.

Back to top
OS Build 14393.2724

January 08, 2019
KB4480961
Resolved
KB4493470
Resolved:
April 09, 2019
10:00 AM PT

Opened:
January 08, 2019
10:00 AM PT
" @@ -105,8 +115,8 @@ sections: - type: markdown text: " - - + +
DetailsOriginating updateStatusHistory
Cluster service may fail if the minimum password length is set to greater than 14
After installing KB4467684, the cluster service may fail to start with the error \"2245 (NERR_PasswordTooShort)\" if the Group Policy \"Minimum Password Length\" is configured with greater than 14 characters.

Affected platforms:
  • Client: Windows 10 Enterprise LTSC 2016
  • Server: Windows Server 2016
Workaround: Set the domain default \"Minimum Password Length\" policy to less than or equal to 14 characters.

Next steps: Microsoft is working on a resolution and will provide an update in an upcoming release.

Back to top
OS Build 14393.2639

November 27, 2018
KB4467684
Mitigated
Last updated:
March 19, 2019
10:00 AM PT

Opened:
November 27, 2018
10:00 AM PT
SCVMM cannot enumerate and manage logical switches deployed on the host
For hosts managed by System Center Virtual Machine Manager (VMM), VMM cannot enumerate and manage logical switches deployed on the host after installing KB4467684.

Additionally, if you do not follow the best practices, a stop error may occur in vfpext.sys on the hosts.

Affected platforms:
  • Client: Windows 10 Enterprise LTSC 2016
  • Server: Windows Server 2016
Workaround:
Run mofcomp on the following mof files on the affected host:

  • Scvmmswitchportsettings.mof
  • VMMDHCPSvr.mof
Follow the best practices while patching to avoid a stop error in vfpext.sys in an SDN v2 environment (NC managed hosts).

Back to top
OS Build 14393.2639

November 27, 2018
KB4467684
Mitigated
Last updated:
March 19, 2019
10:00 AM PT

Opened:
November 27, 2018
10:00 AM PT
Cluster service may fail if the minimum password length is set to greater than 14
After installing KB4467684, the cluster service may fail to start with the error \"2245 (NERR_PasswordTooShort)\" if the Group Policy \"Minimum Password Length\" is configured with greater than 14 characters.

Affected platforms:
  • Client: Windows 10 Enterprise LTSC 2016
  • Server: Windows Server 2016
Workaround: Set the domain default \"Minimum Password Length\" policy to less than or equal to 14 characters.

Next steps: Microsoft is working on a resolution and will provide an update in an upcoming release.

Back to top
OS Build 14393.2639

November 27, 2018
KB4467684
Mitigated
Last updated:
April 09, 2019
10:00 AM PT

Opened:
November 27, 2018
10:00 AM PT
SCVMM cannot enumerate and manage logical switches deployed on the host
For hosts managed by System Center Virtual Machine Manager (VMM), VMM cannot enumerate and manage logical switches deployed on the host after installing KB4467684.

Additionally, if you do not follow the best practices, a stop error may occur in vfpext.sys on the hosts.

Affected platforms:
  • Client: Windows 10 Enterprise LTSC 2016
  • Server: Windows Server 2016
Workaround:
Run mofcomp on the following mof files on the affected host:

  • Scvmmswitchportsettings.mof
  • VMMDHCPSvr.mof
Follow the best practices while patching to avoid a stop error in vfpext.sys in an SDN v2 environment (NC managed hosts).

Back to top
OS Build 14393.2639

November 27, 2018
KB4467684
Mitigated
Last updated:
April 09, 2019
10:00 AM PT

Opened:
November 27, 2018
10:00 AM PT
Windows may not start on certain Lenovo and Fujitsu laptops with less than 8GB of RAM
After installing KB4467691, Windows may fail to start on certain Lenovo and Fujitsu laptops that have less than 8 GB of RAM.

Affected platforms:
  • Client: Windows 10 Enterprise LTSC 2016
  • Server: Windows Server 2016
Workaround: Restart the affected machine using the Unified Extensible Firmware Interface (UEFI). Disable Secure Boot and then restart.

If BitLocker is enabled on your machine, you may have to go through BitLocker recovery after Secure Boot has been disabled.

Next steps: Lenovo and Fujitsu are aware of this issue. Please contact your OEM to ask if there is a firmware update available for your device.

Back to top
OS Build 14393.2608

November 13, 2018
KB4467691
Mitigated
Last updated:
February 19, 2019
10:00 AM PT

Opened:
November 13, 2018
10:00 AM PT
" diff --git a/windows/release-information/status-windows-10-1703.yml b/windows/release-information/status-windows-10-1703.yml index 5505fbc9ed..2e504fecf3 100644 --- a/windows/release-information/status-windows-10-1703.yml +++ b/windows/release-information/status-windows-10-1703.yml @@ -47,7 +47,7 @@ sections: - items: - type: markdown text: " -
See all messages >
+
See all messages >
" - items: - type: markdown @@ -60,7 +60,8 @@ sections: - type: markdown text: "
This table offers a summary of current active issues and those issues that have been resolved in the last 30 days.
- + +
SummaryOriginating updateStatusLast updated
Custom URI schemes may not start corresponding application
Custom URI schemes for application protocol handlers may not start the corresponding application for local intranet and trusted sites in Internet Explorer.

See details >
OS Build 15063.1689

March 12, 2019
KB4489871
Mitigated
March 19, 2019
10:00 AM PT
Certain operations performed on a Cluster Shared Volume may fail
Certain operations, such as rename, performed on files or folders on a Cluster Shared Volume (CSV) may fail with the error, \"STATUS_BAD_IMPERSONATION_LEVEL (0xC00000A5)\".

See details >
OS Build 15063.1746

April 09, 2019
KB4493474
Mitigated
April 26, 2019
10:49 AM PT
Custom URI schemes may not start corresponding application
Custom URI schemes for application protocol handlers may not start the corresponding application for local intranet and trusted sites in Internet Explorer.

See details >
OS Build 15063.1689

March 12, 2019
KB4489871
Mitigated
April 09, 2019
10:00 AM PT
End-user-defined characters (EUDC) may cause blue screen at startup
If you enable per font end-user-defined characters (EUDC), the system may stop working and a blue screen may appear at startup.

See details >
OS Build 15063.1716

March 19, 2019
KB4489888
Resolved
KB4493474
April 09, 2019
10:00 AM PT
MSXML6 may cause applications to stop responding
MSXML6 may cause applications to stop responding if an exception was thrown during node operations, such as appendChild(), insertBefore(), and moveNode().

See details >
OS Build 15063.1563

January 08, 2019
KB4480973
Resolved
KB4493474
April 09, 2019
10:00 AM PT
@@ -73,12 +74,21 @@ sections:
" +- title: April 2019 +- items: + - type: markdown + text: " + + +
DetailsOriginating updateStatusHistory
Certain operations performed on a Cluster Shared Volume may fail
Certain operations, such as rename, that you perform on files or folders that are on a Cluster Shared Volume (CSV) may fail with the error, “STATUS_BAD_IMPERSONATION_LEVEL (0xC00000A5)”. This occurs when you perform the operation on a CSV owner node from a process that doesn’t have administrator privilege. 

Affected platforms:
  • Client: Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 8.1
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2; Windows Server 2012
Workaround: Do one of the following: 
 
  • Perform the operation from a process that has administrator privilege. 
  • Perform the operation from a node that doesn’t have CSV ownership. 
Next steps: Microsoft is working on a resolution and will provide an update in an upcoming release.

Resolution:

Back to top
OS Build 15063.1746

April 09, 2019
KB4493474
Mitigated
Last updated:
April 26, 2019
10:49 AM PT

Opened:
April 26, 2019
10:49 AM PT
+ " + - title: March 2019 - items: - type: markdown text: " - +
DetailsOriginating updateStatusHistory
Custom URI schemes may not start corresponding application
After installing KB4489871, custom URI schemes for application protocol handlers may not start the corresponding application for local intranet and trusted sites security zones on Internet Explorer.

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 8.1; Windows 7, Service Pack 1 
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2; Windows Server 2008 R2 SP1
Workaround: Right-click the URL link to open it in a new window or tab, or enable Protected Mode in Internet Explorer for local intranet and trusted sites
1. Go to Tools > Internet options > Security.
2. Within Select a zone to view or change security settings, select Local intranet and then select Enable Protected Mode.
3. Select Trusted sites and then select Enable Protected Mode.
4. Select OK.
You must restart the browser after making these changes.

Next steps: Microsoft is working on a resolution and will provide an update in an upcoming release.

Back to top
OS Build 15063.1689

March 12, 2019
KB4489871
Mitigated
Last updated:
March 19, 2019
10:00 AM PT

Opened:
March 12, 2019
10:00 AM PT
Custom URI schemes may not start corresponding application
After installing KB4489871, custom URI schemes for application protocol handlers may not start the corresponding application for local intranet and trusted sites security zones on Internet Explorer.

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 8.1; Windows 7 SP1 
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2; Windows Server 2008 R2 SP1
Workaround: Right-click the URL link to open it in a new window or tab, or enable Protected Mode in Internet Explorer for local intranet and trusted sites
1. Go to Tools > Internet options > Security.
2. Within Select a zone to view or change security settings, select Local intranet and then select Enable Protected Mode.
3. Select Trusted sites and then select Enable Protected Mode.
4. Select OK.
You must restart the browser after making these changes.

Next steps: Microsoft is working on a resolution and will provide an update in an upcoming release.

Back to top
OS Build 15063.1689

March 12, 2019
KB4489871
Mitigated
Last updated:
April 09, 2019
10:00 AM PT

Opened:
March 12, 2019
10:00 AM PT
End-user-defined characters (EUDC) may cause blue screen at startup
If you enable per font end-user-defined characters (EUDC), the system may stop working and a blue screen may appear at startup. This is not a common setting in non-Asian regions.

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016
Resolution: This issue was resolved in KB4493474.

Back to top
OS Build 15063.1716

March 19, 2019
KB4489888
Resolved
KB4493474
Resolved:
April 09, 2019
10:00 AM PT

Opened:
March 19, 2019
10:00 AM PT
" diff --git a/windows/release-information/status-windows-10-1709.yml b/windows/release-information/status-windows-10-1709.yml index 0688f87235..f244b9bb3d 100644 --- a/windows/release-information/status-windows-10-1709.yml +++ b/windows/release-information/status-windows-10-1709.yml @@ -47,7 +47,7 @@ sections: - items: - type: markdown text: " -
See all messages >
+
See all messages >
" - items: - type: markdown @@ -60,7 +60,8 @@ sections: - type: markdown text: "
This table offers a summary of current active issues and those issues that have been resolved in the last 30 days.
- + + @@ -74,12 +75,21 @@ sections:
" +- title: April 2019 +- items: + - type: markdown + text: " +
SummaryOriginating updateStatusLast updated
Custom URI schemes may not start corresponding application
Custom URI schemes for application protocol handlers may not start the corresponding application for local intranet and trusted sites in Internet Explorer.

See details >
OS Build 16299.1029

March 12, 2019
KB4489886
Mitigated
March 19, 2019
10:00 AM PT
Certain operations performed on a Cluster Shared Volume may fail
Certain operations, such as rename, performed on files or folders on a Cluster Shared Volume (CSV) may fail with the error, \"STATUS_BAD_IMPERSONATION_LEVEL (0xC00000A5)\".

See details >
OS Build 16299.1087

April 09, 2019
KB4493441
Mitigated
April 26, 2019
10:49 AM PT
Custom URI schemes may not start corresponding application
Custom URI schemes for application protocol handlers may not start the corresponding application for local intranet and trusted sites in Internet Explorer.

See details >
OS Build 16299.1029

March 12, 2019
KB4489886
Mitigated
April 09, 2019
10:00 AM PT
End-user-defined characters (EUDC) may cause blue screen at startup
If you enable per font end-user-defined characters (EUDC), the system may stop working and a blue screen may appear at startup.

See details >
OS Build 16299.1059

March 19, 2019
KB4489890
Resolved
KB4493441
April 09, 2019
10:00 AM PT
MSXML6 causes applications to stop responding if an exception was thrown
MSXML6 causes applications to stop responding if an exception was thrown during node operations, such as appendChild(), insertBefore(), and moveNode().

See details >
OS Build 16299.904

January 08, 2019
KB4480978
Resolved
KB4493441
April 09, 2019
10:00 AM PT
Stop error when attempting to start SSH from WSL
A stop error occurs when attempting to start the Secure Shell client program from Windows Subsystem for Linux with agent forwarding enabled using a command line switch (ssh –A) or

See details >
OS Build 16299.1029

March 12, 2019
KB4489886
Resolved
KB4493441
April 09, 2019
10:00 AM PT
+ +
DetailsOriginating updateStatusHistory
Certain operations performed on a Cluster Shared Volume may fail
Certain operations, such as rename, that you perform on files or folders that are on a Cluster Shared Volume (CSV) may fail with the error, \"STATUS_BAD_IMPERSONATION_LEVEL (0xC00000A5)\". This occurs when you perform the operation on a CSV owner node from a process that doesn’t have administrator privilege. 

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 8.1
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2; Windows Server 2012
Workaround: Do one of the following: 

  • Perform the operation from a process that has administrator privilege. 
  • Perform the operation from a node that doesn’t have CSV ownership. 
Next steps: Microsoft is working on a resolution and will provide an update in an upcoming release.

Back to top
OS Build 16299.1087

April 09, 2019
KB4493441
Mitigated
Last updated:
April 26, 2019
10:49 AM PT

Opened:
April 26, 2019
10:49 AM PT
+ " + - title: March 2019 - items: - type: markdown text: " - +
DetailsOriginating updateStatusHistory
Custom URI schemes may not start corresponding application
After installing KB4489886, custom URI schemes for application protocol handlers may not start the corresponding application for local intranet and trusted sites security zones on Internet Explorer.

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 8.1; Windows 7, Service Pack 1 
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2; Windows Server 2008 R2 SP1
Workaround: Right-click the URL link to open it in a new window or tab, or enable Protected Mode in Internet Explorer for local intranet and trusted sites
1. Go to Tools > Internet options > Security.
2. Within Select a zone to view or change security settings, select Local intranet and then select Enable Protected Mode.
3. Select Trusted sites and then select Enable Protected Mode.
4. Select OK.
You must restart the browser after making these changes.

Next steps: Microsoft is working on a resolution and will provide an update in an upcoming release.

Back to top
OS Build 16299.1029

March 12, 2019
KB4489886
Mitigated
Last updated:
March 19, 2019
10:00 AM PT

Opened:
March 12, 2019
10:00 AM PT
Custom URI schemes may not start corresponding application
After installing KB4489886, custom URI schemes for application protocol handlers may not start the corresponding application for local intranet and trusted sites security zones on Internet Explorer.

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 8.1; Windows 7 SP1 
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2; Windows Server 2008 R2 SP1
Workaround: Right-click the URL link to open it in a new window or tab, or enable Protected Mode in Internet Explorer for local intranet and trusted sites
1. Go to Tools > Internet options > Security.
2. Within Select a zone to view or change security settings, select Local intranet and then select Enable Protected Mode.
3. Select Trusted sites and then select Enable Protected Mode.
4. Select OK.
You must restart the browser after making these changes.

Next steps: Microsoft is working on a resolution and will provide an update in an upcoming release.

Back to top
OS Build 16299.1029

March 12, 2019
KB4489886
Mitigated
Last updated:
April 09, 2019
10:00 AM PT

Opened:
March 12, 2019
10:00 AM PT
End-user-defined characters (EUDC) may cause blue screen at startup
If you enable per font end-user-defined characters (EUDC), the system may stop working and a blue screen may appear at startup. This is not a common setting in non-Asian regions.

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016
Resolution: This issue is resolved in KB4493441.

Back to top
OS Build 16299.1059

March 19, 2019
KB4489890
Resolved
KB4493441
Resolved:
April 09, 2019
10:00 AM PT

Opened:
March 19, 2019
10:00 AM PT
Stop error when attempting to start SSH from WSL
After applying KB4489886, a stop error occurs when attempting to start the Secure Shell (SSH) client program from Windows Subsystem for Linux (WSL) with agent forwarding enabled using a command line switch (ssh –A) or a configuration setting.

Affected platforms:
  • Client: Windows 10, version 1803; Windows 10, version 1709
  • Server: Windows Server, version 1803; Windows Server, version 1709
Resolution: This issue is resolved in KB4493441.

Back to top
OS Build 16299.1029

March 12, 2019
KB4489886
Resolved
KB4493441
Resolved:
April 09, 2019
10:00 AM PT

Opened:
March 12, 2019
10:00 AM PT
@@ -90,6 +100,6 @@ sections: - type: markdown text: " - +
DetailsOriginating updateStatusHistory
MSXML6 causes applications to stop responding if an exception was thrown
After installing KB4480978, MSXML6 causes applications to stop responding if an exception was thrown during node operations, such as appendChild(), insertBefore(), and moveNode().

The Group Policy editor may stop responding when editing a Group Policy Object (GPO) that contains Group Policy Preferences (GPP) for Internet Explorer 10 settings.

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 8.1
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2
Resolution: This issue is resolved in KB4493441.

Back to top
OS Build 16299.904

January 08, 2019
KB4480978
Resolved
KB4493441
Resolved:
April 09, 2019
10:00 AM PT

Opened:
January 08, 2019
10:00 AM PT
MSXML6 causes applications to stop responding if an exception was thrown
After installing KB4480978, MSXML6 causes applications to stop responding if an exception was thrown during node operations, such as appendChild(), insertBefore(), and moveNode().

The Group Policy editor may stop responding when editing a Group Policy Object (GPO) that contains Group Policy Preferences (GPP) for Internet Explorer 10 settings.

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 8.1
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2; Windows Server 2012
Resolution: This issue is resolved in KB4493441.

Back to top
OS Build 16299.904

January 08, 2019
KB4480978
Resolved
KB4493441
Resolved:
April 09, 2019
10:00 AM PT

Opened:
January 08, 2019
10:00 AM PT
" diff --git a/windows/release-information/status-windows-10-1803.yml b/windows/release-information/status-windows-10-1803.yml index 188fdc6b47..d72a1889c6 100644 --- a/windows/release-information/status-windows-10-1803.yml +++ b/windows/release-information/status-windows-10-1803.yml @@ -47,7 +47,7 @@ sections: - items: - type: markdown text: " -
See all messages >
+
See all messages >
" - items: - type: markdown @@ -60,8 +60,9 @@ sections: - type: markdown text: "
This table offers a summary of current active issues and those issues that have been resolved in the last 30 days.
- - + + + @@ -75,14 +76,23 @@ sections:
" +- title: April 2019 +- items: + - type: markdown + text: " +
SummaryOriginating updateStatusLast updated
Custom URI schemes may not start corresponding application
Custom URI schemes for application protocol handlers may not start the corresponding application for local intranet and trusted sites in Internet Explorer.

See details >
OS Build 17134.648

March 12, 2019
KB4489868
Mitigated
March 19, 2019
10:00 AM PT
Issue using PXE to start a device from WDS
Using PXE to start a device from a WDS server configured to use Variable Window Extension may cause the connection to the WDS server to terminate prematurely.

See details >
OS Build 17134.648

March 12, 2019
KB4489868
Mitigated
March 19, 2019
10:00 AM PT
Certain operations performed on a Cluster Shared Volume may fail
Certain operations, such as rename, performed on files or folders on a Cluster Shared Volume (CSV) may fail with the error, \"STATUS_BAD_IMPERSONATION_LEVEL (0xC00000A5)\".

See details >
OS Build 17134.706

April 09, 2019
KB4493464
Mitigated
April 26, 2019
10:49 AM PT
Custom URI schemes may not start corresponding application
Custom URI schemes for application protocol handlers may not start the corresponding application for local intranet and trusted sites in Internet Explorer.

See details >
OS Build 17134.648

March 12, 2019
KB4489868
Mitigated
April 09, 2019
10:00 AM PT
Issue using PXE to start a device from WDS
Using PXE to start a device from a WDS server configured to use Variable Window Extension may cause the connection to the WDS server to terminate prematurely.

See details >
OS Build 17134.648

March 12, 2019
KB4489868
Mitigated
April 09, 2019
10:00 AM PT
End-user-defined characters (EUDC) may cause blue screen at startup
If you enable per font end-user-defined characters (EUDC), the system may stop working and a blue screen may appear at startup.

See details >
OS Build 17134.677

March 19, 2019
KB4489894
Resolved
KB4493464
April 09, 2019
10:00 AM PT
MSXML6 may cause applications to stop responding
MSXML6 may cause applications to stop responding if an exception was thrown during node operations, such as appendChild(), insertBefore(), and moveNode().

See details >
OS Build 17134.523

January 08, 2019
KB4480966
Resolved
KB4493464
April 09, 2019
10:00 AM PT
Stop error when attempting to start SSH from WSL
A stop error occurs when attempting to start Secure Shell from Windows Subsystem for Linux with agent forwarding using a command line switch (ssh –A) or a configuration setting.

See details >
OS Build 17134.648

March 12, 2019
KB4489868
Resolved
KB4493464
April 09, 2019
10:00 AM PT
+ +
DetailsOriginating updateStatusHistory
Certain operations performed on a Cluster Shared Volume may fail
Certain operations, such as rename, that you perform on files or folders that are on a Cluster Shared Volume (CSV) may fail with the error, \"STATUS_BAD_IMPERSONATION_LEVEL (0xC00000A5)\". This occurs when you perform the operation on a CSV owner node from a process that doesn’t have administrator privilege.

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 8.1
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2; Windows Server 2012
Workaround: Do one of the following: 

  • Perform the operation from a process that has administrator privilege. 
  • Perform the operation from a node that doesn’t have CSV ownership. 
Next steps: Microsoft is working on a resolution and will provide an update in an upcoming release.

Back to top
OS Build 17134.706

April 09, 2019
KB4493464
Mitigated
Last updated:
April 26, 2019
10:49 AM PT

Opened:
April 26, 2019
10:49 AM PT
+ " + - title: March 2019 - items: - type: markdown text: " - + +
 Option 2: 
Use the Windows Deployment Services UI to make the following adjustment:  
  1. Open Windows Deployment Services from Windows Administrative Tools. 
  2. Expand Servers and right-click a WDS server. 
  3. Open its properties and clear the?Enable Variable Window Extension?box on the TFTP tab.  
Option 3: 
Set the following registry value to 0:  
HKLM\\System\\CurrentControlSet\\Services\\WDSServer\\Providers\\WDSTFTP\\EnableVariableWindowExtension  
Restart the WDSServer service after disabling the Variable Window Extension. 
 
Next steps: Microsoft is working on a resolution and will provide an update in an upcoming release. 

Back to top
DetailsOriginating updateStatusHistory
Custom URI schemes may not start corresponding application
After installing KB4489868, custom URI schemes for application protocol handlers may not start the corresponding application for local intranet and trusted sites security zones on Internet Explorer. 

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 8.1; Windows 7, Service Pack 1 
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2; Windows Server 2008 R2 SP1
Workaround: Right-click the URL link to open it in a new window or tab, or enable Protected Mode in Internet Explorer for local intranet and trusted sites
  1. Go to Tools > Internet options > Security 
  2. Within Select a zone to view or change security settings, select Local intranet and then select Enable Protected Mode.
  3. Select Trusted sites and then select Enable Protected Mode
  4. Select OK
 You must restart the browser after making these changes. 
 
Next steps: Microsoft is working on a resolution and will provide an update in an upcoming release. 

Back to top
OS Build 17134.648

March 12, 2019
KB4489868
Mitigated
Last updated:
March 19, 2019
10:00 AM PT

Opened:
March 12, 2019
10:00 AM PT
Custom URI schemes may not start corresponding application
After installing KB4489868, custom URI schemes for application protocol handlers may not start the corresponding application for local intranet and trusted sites security zones on Internet Explorer. 

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 8.1; Windows 7 SP1 
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2; Windows Server 2008 R2 SP1
Workaround: Right-click the URL link to open it in a new window or tab, or enable Protected Mode in Internet Explorer for local intranet and trusted sites
  1. Go to Tools > Internet options > Security 
  2. Within Select a zone to view or change security settings, select Local intranet and then select Enable Protected Mode.
  3. Select Trusted sites and then select Enable Protected Mode
  4. Select OK
 You must restart the browser after making these changes. 
 
Next steps: Microsoft is working on a resolution and will provide an update in an upcoming release. 

Back to top
OS Build 17134.648

March 12, 2019
KB4489868
Mitigated
Last updated:
April 09, 2019
10:00 AM PT

Opened:
March 12, 2019
10:00 AM PT
Issue using PXE to start a device from WDS
After installing KB4489868, there may be issues using the Preboot Execution Environment (PXE) to start a device from a Windows Deployment Services (WDS) server configured to use Variable Window Extension. This may cause the connection to the WDS server to terminate prematurely while downloading the image. This issue does not affect clients or devices that are not using Variable Window Extension. 

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10 Enterprise LTSC 2016; Windows 8.1
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server 2016; Windows Server 2012 R2
Workaround: To mitigate the issue, disable the Variable Window Extension on WDS server using one of the following options:
Option 1: 
Open an Administrator Command prompt and type the following:  
Wdsutil /Set-TransportServer /EnableTftpVariableWindowExtension:No
-
 Option 2: 
Use the Windows Deployment Services UI to make the following adjustment:  
  1. Open Windows Deployment Services from Windows Administrative Tools. 
  2. Expand Servers and right-click a WDS server. 
  3. Open its properties and clear the?Enable Variable Window Extension?box on the TFTP tab.  
Option 3: 
Set the following registry value to 0:  
HKLM\\System\\CurrentControlSet\\Services\\WDSServer\\Providers\\WDSTFTP\\EnableVariableWindowExtension  
Restart the WDSServer service after disabling the Variable Window Extension. 
 
Next steps: Microsoft is working on a resolution and will provide an update in an upcoming release. 

Back to top
OS Build 17134.648

March 12, 2019
KB4489868
Mitigated
Last updated:
March 19, 2019
10:00 AM PT

Opened:
March 12, 2019
10:00 AM PT
OS Build 17134.648

March 12, 2019
KB4489868
Mitigated
Last updated:
April 09, 2019
10:00 AM PT

Opened:
March 12, 2019
10:00 AM PT
End-user-defined characters (EUDC) may cause blue screen at startup
If you enable per font end-user-defined characters (EUDC), the system may stop working and a blue screen may appear at startup. This is not a common setting in non-Asian regions. 

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016
Resolution: This issue was resolved in KB4493464

Back to top
OS Build 17134.677

March 19, 2019
KB4489894
Resolved
KB4493464
Resolved:
April 09, 2019
10:00 AM PT

Opened:
March 19, 2019
10:00 AM PT
Stop error when attempting to start SSH from WSL
After applying KB4489868, a stop error occurs when attempting to start the Secure Shell (SSH) client program from Windows Subsystem for Linux (WSL) with agent forwarding enabled using a command line switch (ssh -A) or a configuration setting.

Affected platforms:
  • Client: Windows 10, version 1803; Windows 10, version 1709
  • Server: Windows Server, version 1803; Windows Server, version 1709
Resolution: This issue was resolved in KB4493464.

Back to top
OS Build 17134.648

March 12, 2019
KB4489868
Resolved
KB4493464
Resolved:
April 09, 2019
10:00 AM PT

Opened:
March 12, 2019
10:00 AM PT
@@ -93,6 +103,6 @@ sections: - type: markdown text: " - +
DetailsOriginating updateStatusHistory
MSXML6 may cause applications to stop responding
After installing KB4480966, MSXML6 causes applications to stop responding if an exception was thrown during node operations, such as appendChild(), insertBefore(), and moveNode().

The Group Policy editor may stop responding when editing a Group Policy Object (GPO) that contains Group Policy Preferences (GPP) for Internet Explorer 10 settings.

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 8.1
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2
Resolution: This issue was resolved in KB4493464

Back to top
OS Build 17134.523

January 08, 2019
KB4480966
Resolved
KB4493464
Resolved:
April 09, 2019
10:00 AM PT

Opened:
January 08, 2019
10:00 AM PT
MSXML6 may cause applications to stop responding
After installing KB4480966, MSXML6 causes applications to stop responding if an exception was thrown during node operations, such as appendChild(), insertBefore(), and moveNode().

The Group Policy editor may stop responding when editing a Group Policy Object (GPO) that contains Group Policy Preferences (GPP) for Internet Explorer 10 settings.

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 8.1
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2; Windows Server 2012
Resolution: This issue was resolved in KB4493464

Back to top
OS Build 17134.523

January 08, 2019
KB4480966
Resolved
KB4493464
Resolved:
April 09, 2019
10:00 AM PT

Opened:
January 08, 2019
10:00 AM PT
" diff --git a/windows/release-information/status-windows-10-1809-and-windows-server-2019.yml b/windows/release-information/status-windows-10-1809-and-windows-server-2019.yml index 7af6ee2e61..bc3291a8a0 100644 --- a/windows/release-information/status-windows-10-1809-and-windows-server-2019.yml +++ b/windows/release-information/status-windows-10-1809-and-windows-server-2019.yml @@ -52,7 +52,7 @@ sections: - items: - type: markdown text: " -
See all messages >
+
See all messages >
" - items: - type: markdown @@ -65,8 +65,10 @@ sections: - type: markdown text: "
This table offers a summary of current active issues and those issues that have been resolved in the last 30 days.
- - + + + + @@ -87,6 +89,8 @@ sections: - type: markdown text: "
SummaryOriginating updateStatusLast updated
Custom URI schemes may not start corresponding application
Custom URI schemes for application protocol handlers may not start the corresponding application for local intranet and trusted sites in Internet Explorer.

See details >
OS Build 17763.379

March 12, 2019
KB4489899
Mitigated
April 02, 2019
10:00 AM PT
Issue using PXE to start a device from WDS
Using PXE to start a device from a WDS server configured to use Variable Window Extension may cause the connection to the WDS server to terminate prematurely.

See details >
OS Build 17763.379

March 12, 2019
KB4489899
Mitigated
April 02, 2019
10:00 AM PT
System may be unresponsive after restart if ArcaBit antivirus software installed
Devices with ArcaBit antivirus software installed may become unresponsive upon restart.

See details >
OS Build 17763.437

April 09, 2019
KB4493509
Mitigated
April 26, 2019
10:50 AM PT
Certain operations performed on a Cluster Shared Volume may fail
Certain operations, such as rename, performed on files or folders on a Cluster Shared Volume (CSV) may fail with the error, \"STATUS_BAD_IMPERSONATION_LEVEL (0xC00000A5)\".

See details >
OS Build 17763.437

April 09, 2019
KB4493509
Mitigated
April 26, 2019
10:50 AM PT
Custom URI schemes may not start corresponding application
Custom URI schemes for application protocol handlers may not start the corresponding application for local intranet and trusted sites in Internet Explorer.

See details >
OS Build 17763.379

March 12, 2019
KB4489899
Mitigated
April 09, 2019
10:00 AM PT
Issue using PXE to start a device from WDS
Using PXE to start a device from a WDS server configured to use Variable Window Extension may cause the connection to the WDS server to terminate prematurely.

See details >
OS Build 17763.379

March 12, 2019
KB4489899
Mitigated
April 09, 2019
10:00 AM PT
Audio not working on monitors or TV connected to a PC via HDMI, USB, or DisplayPort
Upgrade block: Microsoft has identified issues with certain new Intel display drivers, which accidentally turn on unsupported features in Windows.

See details >
OS Build 17763.134

November 13, 2018
KB4467708
Mitigated
March 15, 2019
12:00 PM PT
End-user-defined characters (EUDC) may cause blue screen at startup
If you enable per font end-user-defined characters (EUDC), the system may stop working and a blue screen may appear at startup.

See details >
OS Build 17763.404

April 02, 2019
KB4490481
Resolved
KB4493509
April 09, 2019
10:00 AM PT
Internet Explorer 11 authentication issue with multiple concurrent logons
Internet Explorer 11 users may encounter issues if two or more people use the same user account for multiple, concurrent login sessions on the same Windows Server machine.

See details >
OS Build 17763.253

January 08, 2019
KB4480116
Resolved
KB4493509
April 09, 2019
10:00 AM PT
+ +
DetailsOriginating updateStatusHistory
System may be unresponsive after restart if ArcaBit antivirus software installed
Microsoft and ArcaBit have identified an issue on devices with ArcaBit antivirus software installed that may cause the system to become unresponsive upon restart after installing KB4493509
 
Microsoft has temporarily blocked devices from receiving this update if ArcaBit antivirus software is installed. 

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 8.1; Windows 7, SP 1
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server 2012 R2; Windows Server 2008 R2 SP1
ArcaBit has released an update to address this issue. For more information, see the Arcabit support article.

Back to top
OS Build 17763.437

April 09, 2019
KB4493509
Mitigated
Last updated:
April 26, 2019
10:50 AM PT

Opened:
April 26, 2019
10:50 AM PT
Certain operations performed on a Cluster Shared Volume may fail
Certain operations, such as rename, that you perform on files or folders that are on a Cluster Shared Volume (CSV) may fail with the error, \"STATUS_BAD_IMPERSONATION_LEVEL (0xC00000A5)\". This occurs when you perform the operation on a CSV owner node from a process that doesn’t have administrator privilege. 

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 8.1
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2; Windows Server 2012
Workaround: Do one of the following: 
 
  • Perform the operation from a process that has administrator privilege. 
  • Perform the operation from a node that doesn’t have CSV ownership. 
Next steps: Microsoft is working on a resolution and will provide an update in an upcoming release.

Back to top
OS Build 17763.437

April 09, 2019
KB4493509
Mitigated
Last updated:
April 26, 2019
10:50 AM PT

Opened:
April 26, 2019
10:50 AM PT
End-user-defined characters (EUDC) may cause blue screen at startup
If you enable per font end-user-defined characters (EUDC), the system will stop working and a blue screen may appear at startup. This is not a common setting in non-Asian regions.

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016
Workaround: To avoid this issue, don't enable per font EUDC. As an alternative, you can edit the registry to mitigate this issue; for more information, see KB4496149.

Resolved: This issue was resolved in KB4493509.

Back to top
OS Build 17763.404

April 02, 2019
KB4490481
Resolved
KB4493509
Resolved:
April 09, 2019
10:00 AM PT

Opened:
April 02, 2019
10:00 AM PT
" @@ -96,9 +100,9 @@ sections: - type: markdown text: " - + +
Option 2:
Use the Windows Deployment Services UI to make the following adjustment: 
  1. Open Windows Deployment Services from Windows Administrative Tools. 
  2. Expand Servers and right-click a WDS server. 
  3. Open its properties and clear the Enable Variable Window Extension box on the TFTP tab.
Option 3:
Set the following registry value to 0:  
HKLM\\System\\CurrentControlSet\\Services\\WDSServer\\Providers\\WDSTFTP\\EnableVariableWindowExtension  
Restart the WDSServer service after disabling the Variable Window Extension. 

Next steps: Microsoft is working on a resolution and will provide an update in an upcoming release. 

Back to top
DetailsOriginating updateStatusHistory
Custom URI schemes may not start corresponding application
After installing KB4489899, custom URI schemes for application protocol handlers may not start the corresponding application for local intranet and trusted sites security zones on Internet Explorer.

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 8.1; Windows 7, Service Pack 1 
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2; Windows Server 2008 R2 SP1
Workaround: Right-click the URL link to open it in a new window or tab, or enable Protected Mode in Internet Explorer for local intranet and trusted sites
  1. Go to Tools > Internet options > Security.
  2. Within Select a zone to view of change security settings, select Local intranet and then select Enable Protected Mode.
  3. Select Trusted Sites and then select Enable Protected Mode
  4. Select OK.
You must restart the browser after making these changes. 
 
Next steps: Microsoft is working on a resolution and will provide an update in an upcoming release. 

Back to top
OS Build 17763.379

March 12, 2019
KB4489899
Mitigated
Last updated:
April 02, 2019
10:00 AM PT

Opened:
March 12, 2019
10:00 AM PT
Custom URI schemes may not start corresponding application
After installing KB4489899, custom URI schemes for application protocol handlers may not start the corresponding application for local intranet and trusted sites security zones on Internet Explorer.

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 8.1; Windows 7 SP1 
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2; Windows Server 2008 R2 SP1
Workaround: Right-click the URL link to open it in a new window or tab, or enable Protected Mode in Internet Explorer for local intranet and trusted sites
  1. Go to Tools > Internet options > Security.
  2. Within Select a zone to view of change security settings, select Local intranet and then select Enable Protected Mode.
  3. Select Trusted Sites and then select Enable Protected Mode
  4. Select OK.
You must restart the browser after making these changes. 
 
Next steps: Microsoft is working on a resolution and will provide an update in an upcoming release. 

Back to top
OS Build 17763.379

March 12, 2019
KB4489899
Mitigated
Last updated:
April 09, 2019
10:00 AM PT

Opened:
March 12, 2019
10:00 AM PT
Issue using PXE to start a device from WDS
After installing KB4489899, there may be issues using the Preboot Execution Environment (PXE) to start a device from a Windows Deployment Services (WDS) server configured to use Variable Window Extension. This may cause the connection to the WDS server to terminate prematurely while downloading the image. This issue does not affect clients or devices that are not using Variable Window Extension. 

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10 Enterprise LTSC 2016; Windows 8.1
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server 2016; Windows Server 2012 R2
Workaround: To mitigate the issue, disable the Variable Window Extension on WDS server using one of the following options:
Option 1:
Open an Administrator Command prompt and type the following:
Wdsutil /Set-TransportServer /EnableTftpVariableWindowExtension:No 
-
Option 2:
Use the Windows Deployment Services UI to make the following adjustment: 
  1. Open Windows Deployment Services from Windows Administrative Tools. 
  2. Expand Servers and right-click a WDS server. 
  3. Open its properties and clear the Enable Variable Window Extension box on the TFTP tab.
Option 3:
Set the following registry value to 0:  
HKLM\\System\\CurrentControlSet\\Services\\WDSServer\\Providers\\WDSTFTP\\EnableVariableWindowExtension  
Restart the WDSServer service after disabling the Variable Window Extension. 

Next steps: Microsoft is working on a resolution and will provide an update in an upcoming release. 

Back to top
OS Build 17763.379

March 12, 2019
KB4489899
Mitigated
Last updated:
April 02, 2019
10:00 AM PT

Opened:
March 12, 2019
10:00 AM PT
OS Build 17763.379

March 12, 2019
KB4489899
Mitigated
Last updated:
April 09, 2019
10:00 AM PT

Opened:
March 12, 2019
10:00 AM PT
Apps may stop working after selecting an audio output device other than the default
After installing KB4482887 on machines that have multiple audio devices, applications that provide advanced options for internal or external audio output devices may stop working unexpectedly. This issue occurs for users that select an audio output device different from the \"Default Audio Device\". Examples of applications that may stop working include: 
  • Windows Media Player 
  • Realtek HD Audio Manager 
  • Sound Blaster Control Panel 
Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019
  • Server: Windows Server, version 1809; Windows Server 2019
Workaround: As a temporary solution, select the \"Default Audio Device\" in the options provided by the application; please refer to the application's user manual for details. 
For example, to set the Default Audio Device in Windows Media Player: 
  1. Open Windows Media Player > Tools > Options > Devices.
  2. Select the device and choose Properties.
  3. On the next dialog, from the drop-down menu under Select the Audio Device, choose Default Audio Device from the list. 
You can then send audio from the application to the audio device you want in the per-application audio settings found under Settings > System > Sound > App Volume and device preferences.

Resolved: This issue was resolved in KB4490481

Back to top
OS Build 17763.348

March 01, 2019
KB4482887
Resolved
KB4490481
Resolved:
April 02, 2019
10:00 AM PT

Opened:
March 01, 2019
10:00 AM PT
" @@ -109,7 +113,7 @@ sections: text: " - +
DetailsOriginating updateStatusHistory
Internet Explorer 11 authentication issue with multiple concurrent logons
After installing the February 12, 2019 update (KB4487044), Internet Explorer 11 and other applications that use WININET.DLL may have authentication issues. This occurs when two or more people use the same user account for multiple, concurrent login sessions on the same Windows Server machine, including Remote Desktop Protocol (RDP) and Terminal Server logons. Symptoms reported by customers include, but may not be limited to:  
  • Cache size and location show zero or empty. 
  • Keyboard shortcuts may not work properly. 
  • Webpages may intermittently fail to load or render correctly. 
  • Issues with credential prompts. 
  • Issues when downloading files. 
Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10 Enterprise LTSC 2016; Windows 8.1; Windows 7, Service Pack 1
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server 2016; Windows Server 2012 R2; Windows Server 2008 R2 SP1
Resolved: This issue was resolved in KB4493509

Back to top
OS Build 17763.253

January 08, 2019
KB4480116
Resolved
KB4493509
Resolved:
April 09, 2019
10:00 AM PT

Opened:
January 08, 2019
10:00 AM PT
MSXML6 may cause applications to stop responding
After installing KB4480116, MSXML6 causes applications to stop responding if an exception was thrown during node operations, such as appendChild(), insertBefore(), and moveNode().
 
The Group Policy editor may stop responding when editing a Group Policy Object (GPO) that contains Group Policy Preferences (GPP) for Internet Explorer 10 settings. 

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 8.1
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2
Resolved: This issue was resolved in KB4493509

Back to top
OS Build 17763.253

January 08, 2019
KB4480116
Resolved
KB4493509
Resolved:
April 09, 2019
10:00 AM PT

Opened:
January 08, 2019
10:00 AM PT
MSXML6 may cause applications to stop responding
After installing KB4480116, MSXML6 causes applications to stop responding if an exception was thrown during node operations, such as appendChild(), insertBefore(), and moveNode().
 
The Group Policy editor may stop responding when editing a Group Policy Object (GPO) that contains Group Policy Preferences (GPP) for Internet Explorer 10 settings. 

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 8.1
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2; Windows Server 2012
Resolved: This issue was resolved in KB4493509

Back to top
OS Build 17763.253

January 08, 2019
KB4480116
Resolved
KB4493509
Resolved:
April 09, 2019
10:00 AM PT

Opened:
January 08, 2019
10:00 AM PT
" diff --git a/windows/release-information/status-windows-7-and-windows-server-2008-r2-sp1.yml b/windows/release-information/status-windows-7-and-windows-server-2008-r2-sp1.yml index 916fee0d5e..1242deee30 100644 --- a/windows/release-information/status-windows-7-and-windows-server-2008-r2-sp1.yml +++ b/windows/release-information/status-windows-7-and-windows-server-2008-r2-sp1.yml @@ -47,7 +47,7 @@ sections: - items: - type: markdown text: " -
See all messages >
+
See all messages >
" - items: - type: markdown @@ -61,6 +61,7 @@ sections: text: "
This table offers a summary of current active issues and those issues that have been resolved in the last 30 days.
+ @@ -86,6 +87,7 @@ sections: text: "
SummaryOriginating updateStatusLast updated
System may be unresponsive after restart if Avira antivirus software installed.
Devices with Avira antivirus software installed may become unresponsive upon restart.

See details >
April 09, 2019
KB4493472
Investigating
April 09, 2019
10:00 AM PT
System may be unresponsive after restart with certain McAfee antivirus products
Devices with McAfee Endpoint Security Threat Prevention 10.x, Host Intrusion Prevention 8.0, or VirusScan Enterprise 8.8 may be slow or unresponsive at startup.

See details >
April 09, 2019
KB4493472
Mitigated
April 26, 2019
11:41 AM PT
Authentication may fail for services after the Kerberos ticket expires.
Authentication may fail for services that require unconstrained delegation after the Kerberos ticket expires.

See details >
March 12, 2019
KB4489878
Mitigated
April 09, 2019
10:00 AM PT
System unresponsive after restart if Sophos Endpoint Protection installed.
Devices with Sophos Endpoint Protection installed and managed by Sophos Central or Sophos Enterprise Console (SEC) may become unresponsive upon restart.

See details >
April 09, 2019
KB4493472
Mitigated
April 09, 2019
10:00 AM PT
System may be unresponsive after restart if ArcaBit antivirus software installed.
Devices with ArcaBit antivirus software installed may become unresponsive upon restart.

See details >
April 09, 2019
KB4493472
Mitigated
April 09, 2019
10:00 AM PT
+ @@ -98,7 +100,7 @@ sections: text: "
DetailsOriginating updateStatusHistory
System may be unresponsive after restart if Avira antivirus software installed.
Microsoft and Avira have identified an issue on devices with Avira antivirus software installed that may cause the system to become unresponsive upon restart after installing KB4493472.

Microsoft has temporarily blocked devices from receiving this update if Avira antivirus software is installed.

Next steps: We are presently investigating this issue with Avira and will provide an update when available.

Back to top
April 09, 2019
KB4493472
Investigating
Last updated:
April 09, 2019
10:00 AM PT

Opened:
April 09, 2019
10:00 AM PT
System may be unresponsive after restart with certain McAfee antivirus products
Microsoft and McAfee have identified an issue on devices with McAfee Endpoint Security (ENS) Threat Prevention 10.x or McAfee Host Intrusion Prevention (Host IPS) 8.0 or McAfee VirusScan Enterprise (VSE) 8.8 installed. It may cause the system to have slow startup or become unresponsive at restart after installing this update. 

Affected platforms:
  • Client: Windows 7, SP 1
  • Server: Windows Server 2008 R2 SP1
Workaround: Guidance for McAfee customers can be found in the following McAfee support articles: 

Next steps: We are presently investigating this issue with McAfee. We will provide an update once we have more information.

Back to top
April 09, 2019
KB4493472
Mitigated
Last updated:
April 26, 2019
11:41 AM PT

Opened:
April 26, 2019
11:41 AM PT
System unresponsive after restart if Sophos Endpoint Protection installed.
Microsoft and Sophos have identified an issue on devices with Sophos Endpoint Protection installed and managed by either Sophos Central or Sophos Enterprise Console (SEC) that may cause the system to become unresponsive upon restart after installing KB4493472.

Microsoft has temporarily blocked devices from receiving this update if the Sophos Endpoint is installed until a solution is available.

Guidance for Sophos Endpoint and Sophos Enterprise Console customers can be found in the Sophos support article.

Back to top
April 09, 2019
KB4493472
Mitigated
Last updated:
April 09, 2019
10:00 AM PT

Opened:
April 09, 2019
10:00 AM PT
System may be unresponsive after restart if ArcaBit antivirus software installed.
Microsoft and ArcaBit have identified an issue on devices with ArcaBit antivirus software installed that may cause the system to become unresponsive upon restart after installing KB4493472.

Microsoft has temporarily blocked devices from receiving this update if ArcaBit antivirus software is installed.

ArcaBit has released an update to address this issue. For more information, see the Arcabit support article.

Back to top
April 09, 2019
KB4493472
Mitigated
Last updated:
April 09, 2019
10:00 AM PT

Opened:
April 09, 2019
10:00 AM PT
Devices may not respond at login or Welcome screen if running certain Avast software.
Microsoft and Avast have identified an issue on devices running Avast for Business, Avast CloudCare, and AVG Business Edition antivirus software after you install KB4493472 and restart. Devices may become unresponsive at the login or Welcome screen. Additionally, you may be unable to log in or log in after an extended period of time.

Affected platforms: 
  • Client: Windows 8.1; Windows 7, Service Pack 1 
  • Server: Windows Server 2012 R2; Windows Server 2008 R2 SP1 
Resolution: Avast has released emergency updates to address this issue. For more information and AV update schedule, see the Avast support KB article.

Back to top
April 09, 2019
KB4493472
Resolved
Resolved:
April 09, 2019
10:00 AM PT

Opened:
April 09, 2019
10:00 AM PT
- +
DetailsOriginating updateStatusHistory
Authentication may fail for services after the Kerberos ticket expires.
After installing KB4489878, some customers report that authentication fails for services that require unconstrained delegation after the Kerberos ticket expires (the default is 10 hours). For example, the SQL server service fails.

Workaround: To mitigate this issue, use one of the following options:

  • Option 1: Purge the Kerberos tickets on the application server. After the Kerberos ticket expires, the issue will occur again, and you must purge the tickets again.
  • Option 2: If purging does not mitigate the issue, restart the application; for example, restart the Internet Information Services (IIS) app pool associated with the SQL server.
  • Option 3: Use constrained delegation.
Next steps: Microsoft is working on a resolution and will provide an update in an upcoming release.

Back to top
March 12, 2019
KB4489878
Mitigated
Last updated:
April 09, 2019
10:00 AM PT

Opened:
March 12, 2019
10:00 AM PT
Custom URI schemes may not start corresponding application.
After installing KB4489878, custom URI schemes for application protocol handlers may not start the corresponding application for local intranet and trusted sites on Internet Explorer.

Affected platforms: 
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 8.1; Windows 7, Service Pack 1 
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2; Windows Server 2008 R2 SP1 
Resolution: This issue is resolved in KB4493472.

Back to top
March 12, 2019
KB4489878
Resolved
KB4493472
Resolved:
April 09, 2019
10:00 AM PT

Opened:
March 12, 2019
10:00 AM PT
Custom URI schemes may not start corresponding application.
After installing KB4489878, custom URI schemes for application protocol handlers may not start the corresponding application for local intranet and trusted sites on Internet Explorer.

Affected platforms: 
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 8.1; Windows 7 SP1 
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2; Windows Server 2008 R2 SP1 
Resolution: This issue is resolved in KB4493472.

Back to top
March 12, 2019
KB4489878
Resolved
KB4493472
Resolved:
April 09, 2019
10:00 AM PT

Opened:
March 12, 2019
10:00 AM PT
NETDOM.EXE fails to run.
After installing KB4489878, NETDOM.EXE fails to run, and the on-screen error, “The command failed to complete successfully.” appears.

Affected platforms: 
  • Client: Windows 7, Service Pack 1 
  • Server: Windows Server 2008 R2 SP1 
Resolution: This issue is resolved in KB4493472.

Back to top
March 12, 2019
KB4489878
Resolved
KB4493472
Resolved:
April 09, 2019
10:00 AM PT

Opened:
March 12, 2019
10:00 AM PT
" diff --git a/windows/release-information/status-windows-8.1-and-windows-server-2012-r2.yml b/windows/release-information/status-windows-8.1-and-windows-server-2012-r2.yml index 635a9eca17..92fedb9d46 100644 --- a/windows/release-information/status-windows-8.1-and-windows-server-2012-r2.yml +++ b/windows/release-information/status-windows-8.1-and-windows-server-2012-r2.yml @@ -47,7 +47,7 @@ sections: - items: - type: markdown text: " -
See all messages >
+
See all messages >
" - items: - type: markdown @@ -100,7 +100,7 @@ sections: - +
DetailsOriginating updateStatusHistory
Issue using PXE to start a device from WDS
After installing KB4489881, there may be issues using the Preboot Execution Environment (PXE) to start a device from a Windows Deployment Services (WDS) server configured to use Variable Window Extension. This may cause the connection to the WDS server to terminate prematurely while downloading the image. This issue does not affect clients or devices that are not using Variable Window Extension.

Affected platforms: 
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10 Enterprise LTSC 2016; Windows 8.1 
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server 2016; Windows Server 2012 R2 
Workaround: To mitigate the issue, disable the Variable Window Extension on WDS server using one of the following options:
Option 1:
Open an Administrator Command prompt and type the following:
Wdsutil /Set-TransportServer /EnableTftpVariableWindowExtension:No
 
Option 2:
Use the Windows Deployment Services UI to make the following adjustment:
  1. Open Windows Deployment Services from Windows Administrative Tools.
  2. Expand Servers and right-click a WDS server.
  3. Open its properties and clear the Enable Variable Window Extension box on the TFTP tab.
Option 3:
Set the following registry value to 0:
HKLM\\System\\CurrentControlSet\\Services\\WDSServer\\Providers\\WDSTFTP\\EnableVariableWindowExtension
Restart the WDSServer service after disabling the Variable Window Extension.

Next steps: Microsoft is working on a resolution and will provide an update in an upcoming release.

Back to top
March 12, 2019
KB4489881
Mitigated
Last updated:
April 09, 2019
10:00 AM PT

Opened:
March 12, 2019
10:00 AM PT
Custom URI schemes may not start corresponding application
After installing KB4489881, custom URI schemes for application protocol handlers may not start the corresponding application for local intranet and trusted sites security zones on Internet Explorer.

Affected platforms: 
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 8.1; Windows 7, Service Pack 1 
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2; Windows Server 2008 R2 SP1 
Resolution: This issue is resolved in KB4493446.

Back to top
March 12, 2019
KB4489881
Resolved
KB4493446
Resolved:
April 09, 2019
10:00 AM PT

Opened:
March 12, 2019
10:00 AM PT
Custom URI schemes may not start corresponding application
After installing KB4489881, custom URI schemes for application protocol handlers may not start the corresponding application for local intranet and trusted sites security zones on Internet Explorer.

Affected platforms: 
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 8.1; Windows 7 SP1 
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2; Windows Server 2008 R2 SP1 
Resolution: This issue is resolved in KB4493446.

Back to top
March 12, 2019
KB4489881
Resolved
KB4493446
Resolved:
April 09, 2019
10:00 AM PT

Opened:
March 12, 2019
10:00 AM PT
" @@ -119,6 +119,6 @@ sections: text: " - +
DetailsOriginating updateStatusHistory
Internet Explorer 11 authentication issue with multiple concurrent logons
After installing KB4480963, Internet Explorer 11 and other applications that use WININET.DLL may have authentication issues. This occurs when two or more people use the same user account for multiple, concurrent login sessions on the same Windows Server machine, including Remote Desktop Protocol (RDP) and Terminal Server logons. Symptoms reported by customers include, but may not be limited to:
  • Cache size and location show zero or empty.
  • Keyboard shortcuts may not work properly.
  • Webpages may intermittently fail to load or render correctly.
  • Issues with credential prompts.
  • Issues when downloading files.
Affected platforms: 
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10 Enterprise LTSC 2016; Windows 8.1; Windows 7, Service Pack 1 
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server 2016; Windows Server 2012 R2; Windows Server 2008 R2 SP1 
Resolution: This issue is resolved in KB4493446.

Back to top
January 08, 2019
KB4480963
Resolved
KB4493446
Resolved:
April 09, 2019
10:00 AM PT

Opened:
January 08, 2019
10:00 AM PT
MSXML6 may cause applications to stop responding.
After installing KB4480963, MSXML6 causes applications to stop responding if an exception was thrown during node operations, such as appendChild(), insertBefore(), and moveNode().

The Group Policy editor may stop responding when editing a Group Policy Object (GPO) that contains Group Policy Preferences (GPP) for Internet Explorer 10 settings.

Resolution: This issue is resolved in KB4493446.

Back to top
January 08, 2019
KB4480963
Resolved
KB4493446
Resolved:
April 09, 2019
10:00 AM PT

Opened:
January 08, 2019
10:00 AM PT
MSXML6 may cause applications to stop responding.
After installing KB4480963, MSXML6 causes applications to stop responding if an exception was thrown during node operations, such as appendChild(), insertBefore(), and moveNode().

The Group Policy editor may stop responding when editing a Group Policy Object (GPO) that contains Group Policy Preferences (GPP) for Internet Explorer 10 settings.

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 8.1
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2; Windows Server 2012
Resolution: This issue is resolved in KB4493446.

Back to top
January 08, 2019
KB4480963
Resolved
KB4493446
Resolved:
April 09, 2019
10:00 AM PT

Opened:
January 08, 2019
10:00 AM PT
" diff --git a/windows/release-information/status-windows-server-2008-sp2.yml b/windows/release-information/status-windows-server-2008-sp2.yml index 935a789240..e409b51fd5 100644 --- a/windows/release-information/status-windows-server-2008-sp2.yml +++ b/windows/release-information/status-windows-server-2008-sp2.yml @@ -47,7 +47,7 @@ sections: - items: - type: markdown text: " -
See all messages >
+
See all messages >
" - items: - type: markdown @@ -60,17 +60,11 @@ sections: - type: markdown text: "
This table offers a summary of current active issues and those issues that have been resolved in the last 30 days.
- - - - - - - - - - - + + + + +
SummaryOriginating updateStatusLast updated
System may be unresponsive after restart if Avira antivirus software installed
Devices with Avira antivirus software installed may become unresponsive upon restart.

See details >
April 09, 2019
KB4493471
Investigating
April 25, 2019
03:26 PM PT
System unresponsive after restart if Sophos Endpoint Protection installed
Devices with Sophos Endpoint Protection installed and managed by Sophos Central or Sophos Enterprise Console (SEC) may become unresponsive upon restart.

See details >
April 09, 2019
KB4493471
Mitigated
April 25, 2019
03:26 PM PT
Authentication may fail for services after the Kerberos ticket expires
Authentication may fail for services that require unconstrained delegation after the Kerberos ticket expires.

See details >
March 12, 2019
KB4489880
Mitigated
April 25, 2019
03:24 PM PT
First character of the Japanese era name not recognized as an abbreviation
The first character of the Japanese era name is not recognized as an abbreviation and may cause date parsing issues.

See details >
January 17, 2019
KB4480974
Resolved
KB4489880
April 25, 2019
03:32 PM PT
Applications using Microsoft Jet database fail to open
Applications that use a Microsoft Jet database with the Microsoft Access 97 file format may fail to open if column names are greater than 32 characters.

See details >
January 08, 2019
KB4480968
Resolved
KB4487023
April 25, 2019
03:32 PM PT
Unable to use Seek bar in Windows Media Player
Users may not be able to use the Seek bar in Windows Media Player when playing specific files.

See details >
October 09, 2018
KB4463097
Resolved
KB4471325
April 25, 2019
03:28 PM PT
Virtual machines fail to restore
Virtual machines (VMs) may fail to restore successfully if the VM has been saved and restored once before.

See details >
January 08, 2019
KB4480968
Resolved
KB4490514
April 25, 2019
03:26 PM PT
Embedded objects may display incorrectly
Any compound document (OLE) server application that places embedded objects into the Windows Metafile (WMF) using the PatBlt API may display embedded objects incorrectly.

See details >
February 12, 2019
KB4487023
Resolved
KB4493471
April 25, 2019
03:26 PM PT
Applications using Microsoft Jet database and Access 95 file format stop working
Applications that use a Microsoft Jet database with the Microsoft Access 95 file format may randomly stop working.

See details >
February 12, 2019
KB4487023
Resolved
KB4487022
April 25, 2019
03:26 PM PT
Local Administrators unable to remotely access shares
Local users who are part of the local Administrators group may not be able to remotely access shares on Windows Server 2008 R2 and Windows 7 machines.

See details >
January 08, 2019
KB4480968
Resolved
KB4487354
April 25, 2019
03:26 PM PT
NETDOM.EXE fails to run
NETDOM.EXE fails to run and the error, “The command failed to complete successfully.” appears on screen.

See details >
March 12, 2019
KB4489880
Resolved
KB4493471
April 25, 2019
03:25 PM PT
System may be unresponsive after restart if Avira antivirus software installed
Devices with Avira antivirus software installed may become unresponsive upon restart.

See details >
April 09, 2019
KB4493471
Investigating
April 09, 2019
10:00 AM PT
System unresponsive after restart if Sophos Endpoint Protection installed
Devices with Sophos Endpoint Protection installed and managed by Sophos Central or Sophos Enterprise Console (SEC) may become unresponsive upon restart.

See details >
April 09, 2019
KB4493471
Mitigated
April 09, 2019
10:00 AM PT
Authentication may fail for services after the Kerberos ticket expires
Authentication may fail for services that require unconstrained delegation after the Kerberos ticket expires.

See details >
March 12, 2019
KB4489880
Mitigated
March 12, 2019
10:00 AM PT
Embedded objects may display incorrectly
Any compound document (OLE) server application that places embedded objects into the Windows Metafile (WMF) using the PatBlt API may display embedded objects incorrectly.

See details >
February 12, 2019
KB4487023
Resolved
KB4493471
April 09, 2019
10:00 AM PT
NETDOM.EXE fails to run
NETDOM.EXE fails to run and the error, “The command failed to complete successfully.” appears on screen.

See details >
March 12, 2019
KB4489880
Resolved
KB4493471
April 09, 2019
10:00 AM PT
" @@ -86,16 +80,26 @@ sections: - type: markdown text: " - - - - - - - - - - - + + +
DetailsOriginating updateStatusHistory
System may be unresponsive after restart if Avira antivirus software installed
Microsoft and Avira have identified an issue on devices with Avira antivirus software installed that may cause the system to become unresponsive upon restart after installing KB4493471.

Microsoft has temporarily blocked devices from receiving this update if Avira antivirus software is installed.

Affected platforms: 
  • Client: Windows 8.1; Windows 7, Service Pack 1 
  • Server: Windows Server 2012 R2; Windows Server 2012; Windows Server 2008 R2 SP1; Windows Server 2008 SP2
Next steps: We are presently investigating this issue with Avira and will provide an update when available.

Back to top
April 09, 2019
KB4493471
Investigating
Last updated:
April 25, 2019
03:26 PM PT

Opened:
April 25, 2019
03:26 PM PT
System unresponsive after restart if Sophos Endpoint Protection installed
Microsoft and Sophos have identified an issue on devices with Sophos Endpoint Protection installed and managed by either Sophos Central or Sophos Enterprise Console (SEC) that may cause the system to become unresponsive upon restart after installing KB4493471.

Microsoft has temporarily blocked devices from receiving this update if the Sophos Endpoint is installed until a solution is available.

Guidance for Sophos Endpoint and Sophos Enterprise Console customers can be found in the Sophos support article.

Affected platforms: 
  • Client: Windows 8.1; Windows 7, Service Pack 1 
  • Server: Windows Server 2012 R2; Windows Server 2012; Windows Server 2008 R2 SP1; Windows Server 2008 SP2

Back to top
April 09, 2019
KB4493471
Mitigated
Last updated:
April 25, 2019
03:26 PM PT

Opened:
April 25, 2019
03:26 PM PT
Authentication may fail for services after the Kerberos ticket expires
After installing KB4489880, some customers report that authentication fails for services that require unconstrained delegation after the Kerberos ticket expires (the default is 10 hours). For example, the SQL server service fails.

Affected platforms: 
  • Client: Windows 7, Service Pack 1 
  • Server: Windows Server 2008 R2 SP1; Windows Server 2008 SP2
Workaround: To mitigate this issue, use one of the following options:

  • Option 1: Purge the Kerberos tickets on the application server. After the Kerberos ticket expires, the issue will occur again, and you must purge the tickets again.
  • Option 2: If purging does not mitigate the issue, restart the application; for example, restart the Internet Information Services (IIS) app pool associated with the SQL server.
  • Option 3: Use constrained delegation.
Next steps: Microsoft is working on a resolution and will provide an update in an upcoming release.

Back to top
March 12, 2019
KB4489880
Mitigated
Last updated:
April 25, 2019
03:24 PM PT

Opened:
April 25, 2019
03:24 PM PT
First character of the Japanese era name not recognized as an abbreviation
After installing KB4480974, the first character of the Japanese era name is not recognized as an abbreviation and may cause date parsing issues.

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 8.1; Windows 7, Service Pack 1
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2; Windows Server 2012; Windows Server 2008 R2 SP1; Windows Server 2008 SP2
Resolution: This issue is resolved in KB4489880.

Back to top
January 17, 2019
KB4480974
Resolved
KB4489880
Resolved:
March 12, 2019
10:00 AM PT

Opened:
April 25, 2019
03:32 PM PT
Applications using Microsoft Jet database fail to open
Applications that use a Microsoft Jet database with the Microsoft Access 97 file format may fail to open if the database has column names greater than 32 characters. The database will fail to open with the error, “Unrecognized Database Format”.

Affected platforms: 
  • Client: Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 8.1; Windows 7, Service Pack 1 
  • Server: Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2; Windows Server 2012; Windows Server 2008 R2 SP1; Windows Server 2008 SP2
Resolution: This issue is resolved in KB4487023.

Back to top
January 08, 2019
KB4480968
Resolved
KB4487023
Resolved:
February 12, 2019
10:00 AM PT

Opened:
April 25, 2019
03:32 PM PT
Unable to use Seek bar in Windows Media Player
After installing KB4463097, users may not be able to use the Seek Bar in Windows Media Player when playing specific files. This issue does not affect normal playback.

Affected platforms: 
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 8.1; Windows 7, Service Pack 1
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2; Windows Server 2012; Windows Server 2008 R2 SP1; Windows Server 2008 SP2
Resolution: This issue is resolved in KB4471325.

Back to top
October 09, 2018
KB4463097
Resolved
KB4471325
Resolved:
December 11, 2018
10:00 AM PT

Opened:
April 25, 2019
03:28 PM PT
Virtual machines fail to restore
After installing KB4480968, virtual machines (VM) may fail to restore successfully if the VM has been saved and restored once before. The error message is, “Failed to restore the virtual machine state: Cannot restore this virtual machine because the saved state data cannot be read. Delete the saved state data and then try to start the virtual machine. (0xC0370027).”

This affects AMD Bulldozer Family 15h, AMD Jaguar Family 16h, and AMD Puma Family 16h (second generation) microarchitectures.

Affected platforms: 
  • Client: Windows 7, Service Pack 1 
  • Server: Windows Server 2012; Windows Server 2008 R2 SP1; Windows Server 2008 SP2
Resolution: This issue is resolved in KB4490514.

Back to top
January 08, 2019
KB4480968
Resolved
KB4490514
Resolved:
February 19, 2019
02:00 PM PT

Opened:
April 25, 2019
03:26 PM PT
Embedded objects may display incorrectly
Any compound document (OLE) server application that places embedded objects into the Windows Metafile (WMF) using the PatBlt API may display embedded objects incorrectly.

For example, if you paste a Microsoft Excel worksheet object into a Microsoft Word document, the cells may render with a different background color.

Affected platforms: 
  • Client: Windows 8.1 
  • Server: Windows Server 2012 R2; Windows Server 2012; Windows Server 2008 SP2
Resolution: This issue is resolved in KB4493471.

Back to top
February 12, 2019
KB4487023
Resolved
KB4493471
Resolved:
April 09, 2019
10:00 AM PT

Opened:
April 25, 2019
03:26 PM PT
Applications using Microsoft Jet database and Access 95 file format stop working
Applications that use a Microsoft Jet database with the Microsoft Access 95 file format may randomly stop working.

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 7, Service Pack 1
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012; Windows Server 2008 R2 SP1; Windows Server 2008 SP2
Resolution: This issue is resolved in KB4487022.

Back to top
February 12, 2019
KB4487023
Resolved
KB4487022
Resolved:
February 19, 2019
02:00 PM PT

Opened:
April 25, 2019
03:26 PM PT
Local Administrators unable to remotely access shares
Local users who are part of the local Administrators group may not be able to remotely access shares on Windows Server 2008 R2 and Windows 7 machines after installing KB4480968. This does not affect domain accounts in the local Administrators group.

Affected platforms: 
  • Client: Windows 7, Service Pack 1 
  • Server: Windows Server 2008 R2 SP1; Windows Server 2008 SP2
Resolution: This issue is resolved in KB4487354.

Back to top
January 08, 2019
KB4480968
Resolved
KB4487354
Resolved:
January 11, 2019
02:00 PM PT

Opened:
April 25, 2019
03:26 PM PT
NETDOM.EXE fails to run
After installing KB4489880, NETDOM.EXE fails to run, and the on-screen error, “The command failed to complete successfully.” appears.

Affected platforms: 
  • Client: Windows 7, Service Pack 1 
  • Server: Windows Server 2008 R2 SP1; Windows Server 2008 SP2
Resolution: This issue is resolved in KB4493471.

Back to top
March 12, 2019
KB4489880
Resolved
KB4493471
Resolved:
April 09, 2019
10:00 AM PT

Opened:
April 25, 2019
03:25 PM PT
System may be unresponsive after restart if Avira antivirus software installed
Microsoft and Avira have identified an issue on devices with Avira antivirus software installed that may cause the system to become unresponsive upon restart after installing KB4493471.

Microsoft has temporarily blocked devices from receiving this update if Avira antivirus software is installed.

Affected platforms: 
  • Client: Windows 8.1; Windows 7, Service Pack 1 
  • Server: Windows Server 2012 R2; Windows Server 2012; Windows Server 2008 R2 SP1; Windows Server 2008 SP2
Next steps: We are presently investigating this issue with Avira and will provide an update when available.

Back to top
April 09, 2019
KB4493471
Investigating
Last updated:
April 09, 2019
10:00 AM PT

Opened:
April 09, 2019
10:00 AM PT
System unresponsive after restart if Sophos Endpoint Protection installed
Microsoft and Sophos have identified an issue on devices with Sophos Endpoint Protection installed and managed by either Sophos Central or Sophos Enterprise Console (SEC) that may cause the system to become unresponsive upon restart after installing KB4493471.

Microsoft has temporarily blocked devices from receiving this update if the Sophos Endpoint is installed until a solution is available.

Guidance for Sophos Endpoint and Sophos Enterprise Console customers can be found in the Sophos support article.

Affected platforms: 
  • Client: Windows 8.1; Windows 7, Service Pack 1 
  • Server: Windows Server 2012 R2; Windows Server 2012; Windows Server 2008 R2 SP1; Windows Server 2008 SP2

Back to top
April 09, 2019
KB4493471
Mitigated
Last updated:
April 09, 2019
10:00 AM PT

Opened:
April 09, 2019
10:00 AM PT
+ " + +- title: March 2019 +- items: + - type: markdown + text: " + + + +
DetailsOriginating updateStatusHistory
Authentication may fail for services after the Kerberos ticket expires
After installing KB4489880, some customers report that authentication fails for services that require unconstrained delegation after the Kerberos ticket expires (the default is 10 hours). For example, the SQL server service fails.

Affected platforms: 
  • Client: Windows 7, Service Pack 1 
  • Server: Windows Server 2008 R2 SP1; Windows Server 2008 SP2
Workaround: To mitigate this issue, use one of the following options:

  • Option 1: Purge the Kerberos tickets on the application server. After the Kerberos ticket expires, the issue will occur again, and you must purge the tickets again.
  • Option 2: If purging does not mitigate the issue, restart the application; for example, restart the Internet Information Services (IIS) app pool associated with the SQL server.
  • Option 3: Use constrained delegation.
Next steps: Microsoft is working on a resolution and will provide an update in an upcoming release.

Back to top
March 12, 2019
KB4489880
Mitigated
Last updated:
March 12, 2019
10:00 AM PT

Opened:
March 12, 2019
10:00 AM PT
NETDOM.EXE fails to run
After installing KB4489880, NETDOM.EXE fails to run, and the on-screen error, “The command failed to complete successfully.” appears.

Affected platforms: 
  • Client: Windows 7, Service Pack 1 
  • Server: Windows Server 2008 R2 SP1; Windows Server 2008 SP2
Resolution: This issue is resolved in KB4493471.

Back to top
March 12, 2019
KB4489880
Resolved
KB4493471
Resolved:
April 09, 2019
10:00 AM PT

Opened:
March 12, 2019
10:00 AM PT
+ " + +- title: February 2019 +- items: + - type: markdown + text: " + +
DetailsOriginating updateStatusHistory
Embedded objects may display incorrectly
Any compound document (OLE) server application that places embedded objects into the Windows Metafile (WMF) using the PatBlt API may display embedded objects incorrectly.

For example, if you paste a Microsoft Excel worksheet object into a Microsoft Word document, the cells may render with a different background color.

Affected platforms: 
  • Client: Windows 8.1 
  • Server: Windows Server 2012 R2; Windows Server 2012; Windows Server 2008 SP2
Resolution: This issue is resolved in KB4493471.

Back to top
February 12, 2019
KB4487023
Resolved
KB4493471
Resolved:
April 09, 2019
10:00 AM PT

Opened:
February 12, 2019
10:00 AM PT
" diff --git a/windows/release-information/status-windows-server-2012.yml b/windows/release-information/status-windows-server-2012.yml index eff3fd061d..8034719114 100644 --- a/windows/release-information/status-windows-server-2012.yml +++ b/windows/release-information/status-windows-server-2012.yml @@ -47,7 +47,7 @@ sections: - items: - type: markdown text: " -
See all messages >
+
See all messages >
" - items: - type: markdown @@ -60,21 +60,13 @@ sections: - type: markdown text: "
This table offers a summary of current active issues and those issues that have been resolved in the last 30 days.
- - - - - - - - - - - - - - - + + + + + + +
SummaryOriginating updateStatusLast updated
System may be unresponsive after restart if Avira antivirus software installed
Devices with Avira antivirus software installed may become unresponsive upon restart.

See details >
April 09, 2019
KB4493451
Investigating
April 25, 2019
03:48 PM PT
Certain operations performed on a Cluster Shared Volume may fail
Certain operations, such as rename, performed on files or folders on a Cluster Shared Volume (CSV) may fail with the error, “STATUS_BAD_IMPERSONATION_LEVEL (0xC00000A5)”.

See details >
January 08, 2019
KB4480975
Mitigated
April 25, 2019
03:52 PM PT
System unresponsive after restart if Sophos Endpoint Protection installed
Devices with Sophos Endpoint Protection installed and managed by Sophos Central or Sophos Enterprise Console (SEC) may become unresponsive upon restart.

See details >
April 09, 2019
KB4493451
Mitigated
April 25, 2019
03:46 PM PT
Issue using PXE to start a device from WDS
There may be issues using the Preboot Execution Environment (PXE) to start a device from a Windows Deployment Services (WDS) server configured to use Variable Window Extension.

See details >
March 12, 2019
KB4489891
Mitigated
April 25, 2019
03:40 PM PT
Applications using Microsoft Jet database and Access 95 file format stop working
Applications that use a Microsoft Jet database with the Microsoft Access 95 file format may randomly stop working.

See details >
February 12, 2019
KB4487025
Resolved
KB4487024
April 25, 2019
04:04 PM PT
First character of the Japanese era name not recognized as an abbreviation
The first character of the Japanese era name is not recognized as an abbreviation and may cause date parsing issues.

See details >
January 15, 2019
KB4480971
Resolved
KB4487024
April 25, 2019
04:02 PM PT
Embedded objects may display incorrectly
Any compound document (OLE) server application that places embedded objects into the Windows Metafile (WMF) using the PatBlt API may display embedded objects incorrectly.

See details >
February 12, 2019
KB4487025
Resolved
KB4493451
April 25, 2019
04:00 PM PT
Error 1309 when installing/uninstalling MSI or MSP files
Users may receive “Error 1309” while installing or uninstalling certain types of MSI and MSP files.

See details >
February 12, 2019
KB4487025
Resolved
KB4489891
April 25, 2019
03:36 PM PT
Internet Explorer 11 authentication issue with multiple concurrent logons
Internet Explorer 11 users may encounter issues if two or more people use the same user account for multiple, concurrent login sessions on the same Windows Server machine.

See details >
January 08, 2019
KB4480975
Resolved
KB4493451
April 25, 2019
03:34 PM PT
MSXML6 may cause applications to stop responding
MSXML6 may cause applications to stop responding if an exception was thrown during node operations, such as appendChild(), insertBefore(), and moveNode().

See details >
January 08, 2019
KB4480975
Resolved
KB4493451
April 25, 2019
03:27 PM PT
Virtual machines fail to restore
Virtual machines (VMs) may fail to restore successfully if the VM has been saved and restored once before.

See details >
January 08, 2019
KB4480975
Resolved
KB4490516
April 25, 2019
03:22 PM PT
Applications using Microsoft Jet database fail to open
Applications that use a Microsoft Jet database with the Microsoft Access 97 file format may fail to open if column names are greater than 32 characters.

See details >
January 08, 2019
KB4480975
Resolved
KB4487025
April 25, 2019
03:19 PM PT
Unable to access hotspots with third-party applications
Third-party applications may have difficulty authenticating hotspots.

See details >
January 08, 2019
KB4480975
Resolved
KB4480971
April 25, 2019
03:14 PM PT
Event Viewer may not show some event descriptions for network interface cards
The Event Viewer may not show some event descriptions for network interface cards (NIC).

See details >
September 11, 2018
KB4457135
Resolved
KB4489891
April 25, 2019
03:10 PM PT
Unable to use Seek bar in Windows Media Player
Users may not be able to use the Seek bar in Windows Media Player when playing specific files.

See details >
October 09, 2018
KB4462929
Resolved
KB4471330
April 25, 2019
02:47 PM PT
System may be unresponsive after restart if Avira antivirus software installed
Devices with Avira antivirus software installed may become unresponsive upon restart.

See details >
April 09, 2019
KB4493451
Investigating
April 09, 2019
10:00 AM PT
System unresponsive after restart if Sophos Endpoint Protection installed
Devices with Sophos Endpoint Protection installed and managed by Sophos Central or Sophos Enterprise Console (SEC) may become unresponsive upon restart.

See details >
April 09, 2019
KB4493451
Mitigated
April 09, 2019
10:00 AM PT
Issue using PXE to start a device from WDS
There may be issues using the Preboot Execution Environment (PXE) to start a device from a Windows Deployment Services (WDS) server configured to use Variable Window Extension.

See details >
March 12, 2019
KB4489891
Mitigated
March 12, 2019
10:00 AM PT
Certain operations performed on a Cluster Shared Volume may fail
Certain operations, such as rename, performed on files or folders on a Cluster Shared Volume (CSV) may fail with the error, “STATUS_BAD_IMPERSONATION_LEVEL (0xC00000A5)”.

See details >
January 08, 2019
KB4480975
Mitigated
January 08, 2019
10:00 AM PT
Internet Explorer 11 authentication issue with multiple concurrent logons
Internet Explorer 11 users may encounter issues if two or more people use the same user account for multiple, concurrent login sessions on the same Windows Server machine.

See details >
January 08, 2019
KB4480975
Resolved
KB4493451
April 09, 2019
10:00 AM PT
MSXML6 may cause applications to stop responding
MSXML6 may cause applications to stop responding if an exception was thrown during node operations, such as appendChild(), insertBefore(), and moveNode().

See details >
January 08, 2019
KB4480975
Resolved
KB4493451
April 09, 2019
10:00 AM PT
Embedded objects may display incorrectly
Any compound document (OLE) server application that places embedded objects into the Windows Metafile (WMF) using the PatBlt API may display embedded objects incorrectly.

See details >
February 12, 2019
KB4487025
Resolved
KB4493451
April 09, 2019
10:00 AM PT
" @@ -90,21 +82,37 @@ sections: - type: markdown text: " - - - - - - - - - - - - - - - + + +
DetailsOriginating updateStatusHistory
System may be unresponsive after restart if Avira antivirus software installed
Microsoft and Avira have identified an issue on devices with Avira antivirus software installed that may cause the system to become unresponsive upon restart after installing KB4493451.

Microsoft has temporarily blocked devices from receiving this update if Avira antivirus software is installed.

Next steps: We are presently investigating this issue with Avira and will provide an update when available.

Back to top
April 09, 2019
KB4493451
Investigating
Last updated:
April 25, 2019
03:48 PM PT

Opened:
April 25, 2019
03:48 PM PT
Certain operations performed on a Cluster Shared Volume may fail
Certain operations, such as rename, that you perform on files or folders that are on a Cluster Shared Volume (CSV) may fail with the error, \"STATUS_BAD_IMPERSONATION_LEVEL (0xC00000A5)\". This occurs when you perform the operation on a CSV owner node from a process that doesn’t have administrator privilege.

Workaround: Do one of the following:

  • Perform the operation from a process that has administrator privilege.
  • Perform the operation from a node that doesn’t have CSV ownership.
Next steps: Microsoft is working on a resolution and will provide an update in an upcoming release.

Back to top
January 08, 2019
KB4480975
Mitigated
Last updated:
April 25, 2019
03:52 PM PT

Opened:
April 25, 2019
03:52 PM PT
System unresponsive after restart if Sophos Endpoint Protection installed
Microsoft and Sophos have identified an issue on devices with Sophos Endpoint Protection installed and managed by either Sophos Central or Sophos Enterprise Console (SEC) that may cause the system to become unresponsive upon restart after installing KB4493451.

Microsoft has temporarily blocked devices from receiving this update if the Sophos Endpoint is installed until a solution is available.

Guidance for Sophos Endpoint and Sophos Enterprise Console customers can be found in the Sophos support article.

Back to top
April 09, 2019
KB4493451
Mitigated
Last updated:
April 25, 2019
03:46 PM PT

Opened:
April 25, 2019
03:46 PM PT
Issue using PXE to start a device from WDS
After installing KB4489891, there may be issues using the Preboot Execution Environment (PXE) to start a device from a Windows Deployment Services (WDS) server configured to use Variable Window Extension. This may cause the connection to the WDS server to terminate prematurely while downloading the image. This issue does not affect clients or devices that are not using Variable Window Extension.

Workaround: To mitigate the issue, disable the Variable Window Extension on WDS server using one of the following options:
Option 1:
Open an Administrator Command prompt and type the following:
Wdsutil /Set-TransportServer /EnableTftpVariableWindowExtension:No
-
Option 2:
Use the Windows Deployment Services UI to make the following adjustment:
  1. Open Windows Deployment Services from Windows Administrative Tools.
  2. Expand Servers and right-click a WDS server.
  3. Open its properties and clear the Enable Variable Window Extension box on the TFTP tab.
Option 3:
Set the following registry value to 0:
HKLM\\System\\CurrentControlSet\\Services\\WDSServer\\Providers\\WDSTFTP\\EnableVariableWindowExtension
Restart the WDSServer service after disabling the Variable Window Extension.

Next steps: Microsoft is working on a resolution and will provide an update in an upcoming release.

Back to top
March 12, 2019
KB4489891
Mitigated
Last updated:
April 25, 2019
03:40 PM PT

Opened:
April 25, 2019
03:40 PM PT
Applications using Microsoft Jet database and Access 95 file format stop working
Applications that use a Microsoft Jet database with the Microsoft Access 95 file format may randomly stop working.

Resolution: This issue is resolved in KB4487024.

Back to top
February 12, 2019
KB4487025
Resolved
KB4487024
Resolved:
February 19, 2019
02:00 PM PT

Opened:
April 25, 2019
04:04 PM PT
First character of the Japanese era name not recognized as an abbreviation
After installing KB4480971, the first character of the Japanese era name is not recognized as an abbreviation and may cause date parsing issues.

Resolution: This issue is resolved in KB4487024.

Back to top
January 15, 2019
KB4480971
Resolved
KB4487024
Resolved:
February 19, 2019
02:00 PM PT

Opened:
April 25, 2019
04:01 PM PT
Embedded objects may display incorrectly
Any compound document (OLE) server application that places embedded objects into the Windows Metafile (WMF) using the PatBlt API may display embedded objects incorrectly.

For example, if you paste a Microsoft Excel worksheet object into a Microsoft Word document, the cells may render with a different background color.

Resolution: This issue is resolved in KB4493451.

Back to top
February 12, 2019
KB4487025
Resolved
KB4493451
Resolved:
April 09, 2019
10:00 AM PT

Opened:
April 25, 2019
04:00 PM PT
Error 1309 when installing/uninstalling MSI or MSP files
After installing KB4487025, users may receive \"Error 1309\" while installing or uninstalling certain types of MSI and MSP files.

Resolution: This issue is resolved in KB4489891.

Back to top
February 12, 2019
KB4487025
Resolved
KB4489891
Resolved:
March 12, 2019
10:00 AM PT

Opened:
April 25, 2019
03:36 PM PT
Internet Explorer 11 authentication issue with multiple concurrent logons
After installing KB4480975, Internet Explorer 11 and other applications that use WININET.DLL may have authentication issues. This occurs when two or more people use the same user account for multiple, concurrent login sessions on the same Windows Server machine, including Remote Desktop Protocol (RDP) and Terminal Server logons. Symptoms reported by customers include, but may not be limited to:
  • Cache size and location show zero or empty.
  • Keyboard shortcuts may not work properly.
  • Webpages may intermittently fail to load or render correctly.
  • Issues with credential prompts.
  • Issues when downloading files.
Resolution: This issue is resolved in KB4493451.

Back to top
January 08, 2019
KB4480975
Resolved
KB4493451
Resolved:
April 09, 2019
10:00 AM PT

Opened:
April 25, 2019
03:34 PM PT
MSXML6 may cause applications to stop responding
After installing KB4480975, MSXML6 causes applications to stop responding if an exception was thrown during node operations, such as appendChild(), insertBefore(), and moveNode().

The Group Policy editor may stop responding when editing a Group Policy Object (GPO) that contains Group Policy Preferences (GPP) for Internet Explorer 10 settings.

Resolution: This issue is resolved in KB4493451.

Back to top
January 08, 2019
KB4480975
Resolved
KB4493451
Resolved:
April 09, 2019
10:00 AM PT

Opened:
April 25, 2019
03:27 PM PT
Virtual machines fail to restore
After installing KB4480975, virtual machines (VM) may fail to restore successfully if the VM has been saved and restored once before. The error message is, \"Failed to restore the virtual machine state: Cannot restore this virtual machine because the saved state data cannot be read. Delete the saved state data and then try to start the virtual machine. (0xC0370027).\"

This affects AMD Bulldozer Family 15h, AMD Jaguar Family 16h, and AMD Puma Family 16h (second generation) microarchitectures.

Resolution: This issue is resolved in KB4490516.

Back to top
January 08, 2019
KB4480975
Resolved
KB4490516
Resolved:
February 19, 2019
02:00 PM PT

Opened:
April 25, 2019
03:22 PM PT
Applications using Microsoft Jet database fail to open
Applications that use a Microsoft Jet database with the Microsoft Access 97 file format may fail to open if the database has column names greater than 32 characters. The database will fail to open with the error, \"Unrecognized Database Format\".

Resolution: This issue is resolved in KB4487025.

Back to top
January 08, 2019
KB4480975
Resolved
KB4487025
Resolved:
February 12, 2019
10:00 AM PT

Opened:
April 25, 2019
03:19 PM PT
Unable to access hotspots with third-party applications
After installing KB4480975, third-party applications may have difficulty authenticating hotspots.

Resolution: This issue is resolved in KB4480971.

Back to top
January 08, 2019
KB4480975
Resolved
KB4480971
Resolved:
January 15, 2019
10:00 AM PT

Opened:
April 25, 2019
03:14 PM PT
Event Viewer may not show some event descriptions for network interface cards
After installing KB4457135, the Event Viewer may not show some event descriptions for network interface cards (NICs).

Resolution: This issue is resolved in KB4489891.

Back to top
September 11, 2018
KB4457135
Resolved
KB4489891
Resolved:
March 12, 2019
10:00 AM PT

Opened:
April 25, 2019
03:10 PM PT
Unable to use Seek bar in Windows Media Player
After installing KB4462929, users may not be able to use the Seek Bar in Windows Media Player when playing specific files. This issue does not affect normal playback.

Resolution: This issue is resolved in KB4471330.

Back to top
October 09, 2018
KB4462929
Resolved
KB4471330
Resolved:
December 11, 2018
10:00 AM PT

Opened:
April 25, 2019
02:47 PM PT
System may be unresponsive after restart if Avira antivirus software installed
Microsoft and Avira have identified an issue on devices with Avira antivirus software installed that may cause the system to become unresponsive upon restart after installing KB4493451.

Microsoft has temporarily blocked devices from receiving this update if Avira antivirus software is installed.

Next steps: We are presently investigating this issue with Avira and will provide an update when available.

Back to top
April 09, 2019
KB4493451
Investigating
Last updated:
April 09, 2019
10:00 AM PT

Opened:
April 09, 2019
10:00 AM PT
System unresponsive after restart if Sophos Endpoint Protection installed
Microsoft and Sophos have identified an issue on devices with Sophos Endpoint Protection installed and managed by either Sophos Central or Sophos Enterprise Console (SEC) that may cause the system to become unresponsive upon restart after installing KB4493451.

Microsoft has temporarily blocked devices from receiving this update if the Sophos Endpoint is installed until a solution is available.

Guidance for Sophos Endpoint and Sophos Enterprise Console customers can be found in the Sophos support article.

Back to top
April 09, 2019
KB4493451
Mitigated
Last updated:
April 09, 2019
10:00 AM PT

Opened:
April 09, 2019
10:00 AM PT
+ " + +- title: March 2019 +- items: + - type: markdown + text: " + + +
DetailsOriginating updateStatusHistory
Issue using PXE to start a device from WDS
After installing KB4489891, there may be issues using the Preboot Execution Environment (PXE) to start a device from a Windows Deployment Services (WDS) server configured to use Variable Window Extension. This may cause the connection to the WDS server to terminate prematurely while downloading the image. This issue does not affect clients or devices that are not using Variable Window Extension.

Workaround: To mitigate the issue, disable the Variable Window Extension on WDS server using one of the following options:
Option 1:
Open an Administrator Command prompt and type the following:
Wdsutil /Set-TransportServer /EnableTftpVariableWindowExtension:No
+
Option 2:
Use the Windows Deployment Services UI to make the following adjustment:
  1. Open Windows Deployment Services from Windows Administrative Tools.
  2. Expand Servers and right-click a WDS server.
  3. Open its properties and clear the Enable Variable Window Extension box on the TFTP tab.
Option 3:
Set the following registry value to 0:
HKLM\\System\\CurrentControlSet\\Services\\WDSServer\\Providers\\WDSTFTP\\EnableVariableWindowExtension
Restart the WDSServer service after disabling the Variable Window Extension.

Next steps: Microsoft is working on a resolution and will provide an update in an upcoming release.

Back to top
March 12, 2019
KB4489891
Mitigated
Last updated:
March 12, 2019
10:00 AM PT

Opened:
March 12, 2019
10:00 AM PT
+ " + +- title: February 2019 +- items: + - type: markdown + text: " + + +
DetailsOriginating updateStatusHistory
Embedded objects may display incorrectly
Any compound document (OLE) server application that places embedded objects into the Windows Metafile (WMF) using the PatBlt API may display embedded objects incorrectly.

For example, if you paste a Microsoft Excel worksheet object into a Microsoft Word document, the cells may render with a different background color.

Resolution: This issue is resolved in KB4493451.

Back to top
February 12, 2019
KB4487025
Resolved
KB4493451
Resolved:
April 09, 2019
10:00 AM PT

Opened:
February 12, 2019
10:00 AM PT
+ " + +- title: January 2019 +- items: + - type: markdown + text: " + + + +
DetailsOriginating updateStatusHistory
Certain operations performed on a Cluster Shared Volume may fail
Certain operations, such as rename, that you perform on files or folders that are on a Cluster Shared Volume (CSV) may fail with the error, \"STATUS_BAD_IMPERSONATION_LEVEL (0xC00000A5)\". This occurs when you perform the operation on a CSV owner node from a process that doesn’t have administrator privilege.

Workaround: Do one of the following:

  • Perform the operation from a process that has administrator privilege.
  • Perform the operation from a node that doesn’t have CSV ownership.
Next steps: Microsoft is working on a resolution and will provide an update in an upcoming release.

Back to top
January 08, 2019
KB4480975
Mitigated
Last updated:
January 08, 2019
10:00 AM PT

Opened:
January 08, 2019
10:00 AM PT
Internet Explorer 11 authentication issue with multiple concurrent logons
After installing KB4480975, Internet Explorer 11 and other applications that use WININET.DLL may have authentication issues. This occurs when two or more people use the same user account for multiple, concurrent login sessions on the same Windows Server machine, including Remote Desktop Protocol (RDP) and Terminal Server logons. Symptoms reported by customers include, but may not be limited to:
  • Cache size and location show zero or empty.
  • Keyboard shortcuts may not work properly.
  • Webpages may intermittently fail to load or render correctly.
  • Issues with credential prompts.
  • Issues when downloading files.
Resolution: This issue is resolved in KB4493451.

Back to top
January 08, 2019
KB4480975
Resolved
KB4493451
Resolved:
April 09, 2019
10:00 AM PT

Opened:
January 08, 2019
10:00 AM PT
MSXML6 may cause applications to stop responding
After installing KB4480975, MSXML6 causes applications to stop responding if an exception was thrown during node operations, such as appendChild(), insertBefore(), and moveNode().

The Group Policy editor may stop responding when editing a Group Policy Object (GPO) that contains Group Policy Preferences (GPP) for Internet Explorer 10 settings.

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 8.1
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2; Windows Server 2012
Resolution: This issue is resolved in KB4493451.

Back to top
January 08, 2019
KB4480975
Resolved
KB4493451
Resolved:
April 09, 2019
10:00 AM PT

Opened:
January 08, 2019
10:00 AM PT
" From d9797939b63ccc638229ab6d9a6b26edaad042ae Mon Sep 17 00:00:00 2001 From: "Nisha Mittal (Wipro Ltd.)" Date: Fri, 26 Apr 2019 15:17:08 -0700 Subject: [PATCH 226/724] Affected Platforms updated in messages --- .../resolved-issues-windows-10-1507.yml | 4 ++-- .../resolved-issues-windows-10-1607.yml | 8 ++++---- .../resolved-issues-windows-10-1703.yml | 4 ++-- .../resolved-issues-windows-10-1709.yml | 4 ++-- .../resolved-issues-windows-10-1803.yml | 4 ++-- ...indows-10-1809-and-windows-server-2019.yml | 6 +++--- ...ndows-7-and-windows-server-2008-r2-sp1.yml | 14 ++++++------- ...windows-8.1-and-windows-server-2012-r2.yml | 12 +++++------ ...esolved-issues-windows-server-2008-sp2.yml | 8 ++++---- .../resolved-issues-windows-server-2012.yml | 12 +++++------ .../status-windows-10-1507.yml | 2 +- ...indows-10-1607-and-windows-server-2016.yml | 6 +++--- .../status-windows-10-1703.yml | 2 +- .../status-windows-10-1709.yml | 2 +- .../status-windows-10-1803.yml | 4 ++-- ...indows-10-1809-and-windows-server-2019.yml | 8 ++++---- ...ndows-7-and-windows-server-2008-r2-sp1.yml | 20 +++++++++---------- ...windows-8.1-and-windows-server-2012-r2.yml | 16 +++++++-------- .../status-windows-server-2008-sp2.yml | 8 ++++---- .../status-windows-server-2012.yml | 12 +++++------ 20 files changed, 78 insertions(+), 78 deletions(-) diff --git a/windows/release-information/resolved-issues-windows-10-1507.yml b/windows/release-information/resolved-issues-windows-10-1507.yml index a3cf92fa0c..b1c919539a 100644 --- a/windows/release-information/resolved-issues-windows-10-1507.yml +++ b/windows/release-information/resolved-issues-windows-10-1507.yml @@ -80,7 +80,7 @@ sections: - +
DetailsOriginating updateStatusHistory
MSXML6 may cause applications to stop responding
After installing KB4480962, MSXML6 causes applications to stop responding if an exception was thrown during node operations, such as appendChild(), insertBefore(), and moveNode().

The Group Policy editor may stop responding when editing a Group Policy Object (GPO) that contains Group Policy Preferences (GPP) for Internet Explorer 10 settings.

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 8.1
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2; Windows Server 2012
Resolution: This issue was resolved in KB4493475.

Back to top
OS Build 10240.18094

January 08, 2019
KB4480962
Resolved
KB4493475
Resolved:
April 09, 2019
10:00 AM PT

Opened:
January 08, 2019
10:00 AM PT
Applications using Microsoft Jet database fail to open
Applications that use a Microsoft Jet database with the Microsoft Access 97 file format may fail to open if the database has column names greater than 32 characters. The database will fail to open with the error, \"Unrecognized Database Format\".

Affected platforms:
  • Client: Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 8.1; Windows 7, Service Pack 1
  • Server: Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2; Windows Server 2008 R2 SP1
Resolution: This issue is resolved in KB4487018.

Back to top
OS Build 10240.18094

January 08, 2019
KB4480962
Resolved
KB4487018
Resolved:
February 12, 2019
10:00 AM PT

Opened:
January 08, 2019
10:00 AM PT
Unable to access hotspots with third-party applications
After installing KB4480962, third-party applications may have difficulty authenticating hotspots.

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 8.1
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2
Resolution: This issue is resolved in KB4487018.

Back to top
OS Build 10240.18094

January 08, 2019
KB4480962
Resolved
KB4487018
Resolved:
February 12, 2019
10:00 AM PT

Opened:
January 08, 2019
10:00 AM PT
Unable to access hotspots with third-party applications
After installing KB4480962, third-party applications may have difficulty authenticating hotspots.

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 8.1
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2; Windows Server 2012
Resolution: This issue is resolved in KB4487018.

Back to top
OS Build 10240.18094

January 08, 2019
KB4480962
Resolved
KB4487018
Resolved:
February 12, 2019
10:00 AM PT

Opened:
January 08, 2019
10:00 AM PT
" @@ -89,7 +89,7 @@ sections: - type: markdown text: " - +
DetailsOriginating updateStatusHistory
Unable to use Seek bar in Windows Media Player
After installing KB4462922, users may not be able to use the Seek Bar in Windows Media Player when playing specific files. This issue does not affect normal playback.

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 8.1; Windows 7, Service Pack 1
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2; Windows Server 2008 R2 SP1
Resolution: This issue is resolved in KB4471323.

Back to top
OS Build 10240.18005

October 09, 2018
KB4462922
Resolved
KB4471323
Resolved:
December 11, 2018
10:00 AM PT

Opened:
October 09, 2018
10:00 AM PT
Unable to use Seek bar in Windows Media Player
After installing KB4462922, users may not be able to use the Seek Bar in Windows Media Player when playing specific files. This issue does not affect normal playback.

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 8.1; Windows 7 SP1
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2; Windows Server 2012; Windows Server 2008 R2 SP1; Windows Server 2008 SP2
Resolution: This issue is resolved in KB4471323.

Back to top
OS Build 10240.18005

October 09, 2018
KB4462922
Resolved
KB4471323
Resolved:
December 11, 2018
10:00 AM PT

Opened:
October 09, 2018
10:00 AM PT
" diff --git a/windows/release-information/resolved-issues-windows-10-1607.yml b/windows/release-information/resolved-issues-windows-10-1607.yml index 20e27b4280..6e6f8f9325 100644 --- a/windows/release-information/resolved-issues-windows-10-1607.yml +++ b/windows/release-information/resolved-issues-windows-10-1607.yml @@ -84,11 +84,11 @@ sections: - type: markdown text: " - + - +
DetailsOriginating updateStatusHistory
Internet Explorer 11 authentication issue with multiple concurrent logons
After installing KB4480961, Internet Explorer 11 and other applications that use WININET.DLL may have authentication issues. This occurs when two or more people use the same user account for multiple, concurrent login sessions on the same Windows Server machine, including Remote Desktop Protocol (RDP) and Terminal Server logons. Symptoms reported by customers include, but may not be limited to:
  • Cache size and location show zero or empty.
  • Keyboard shortcuts may not work properly.
  • Webpages may intermittently fail to load or render correctly.
  • Issues with credential prompts.
  • Issues when downloading files.
Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10 Enterprise LTSC 2016; Windows 8.1; Windows 7, Service Pack 1
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server 2016; Windows Server 2012 R2; Windows Server 2008 R2 SP1
Resolution: This issue was resolved in KB4493470.

Back to top
OS Build 14393.2724

January 08, 2019
KB4480961
Resolved
KB4493470
Resolved:
April 09, 2019
10:00 AM PT

Opened:
January 08, 2019
10:00 AM PT
Internet Explorer 11 authentication issue with multiple concurrent logons
After installing KB4480961, Internet Explorer 11 and other applications that use WININET.DLL may have authentication issues. This occurs when two or more people use the same user account for multiple, concurrent login sessions on the same Windows Server machine, including Remote Desktop Protocol (RDP) and Terminal Server logons. Symptoms reported by customers include, but may not be limited to:
  • Cache size and location show zero or empty.
  • Keyboard shortcuts may not work properly.
  • Webpages may intermittently fail to load or render correctly.
  • Issues with credential prompts.
  • Issues when downloading files.
Affected platforms: 
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10 Enterprise LTSC 2016; Windows 8.1; Windows 7 SP1
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server 2016; Windows Server 2012 R2; Windows Server 2012; Windows Server 2008 R2 SP1
Resolution: This issue was resolved in KB4493470.

Back to top
OS Build 14393.2724

January 08, 2019
KB4480961
Resolved
KB4493470
Resolved:
April 09, 2019
10:00 AM PT

Opened:
January 08, 2019
10:00 AM PT
MSXML6 may cause applications to stop responding
After installing KB4480961, MSXML6 causes applications to stop responding if an exception was thrown during node operations, such as appendChild(), insertBefore(), and moveNode().

The Group Policy editor may stop responding when editing a Group Policy Object (GPO) that contains Group Policy Preferences (GPP) for Internet Explorer 10 settings.

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 8.1
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2; Windows Server 2012
Resolution: This issue was resolved in KB4493470.

Back to top
OS Build 14393.2724

January 08, 2019
KB4480961
Resolved
KB4493470
Resolved:
April 09, 2019
10:00 AM PT

Opened:
January 08, 2019
10:00 AM PT
First character of the Japanese era name not recognized as an abbreviation
After installing KB4480977, the first character of the Japanese era name is not recognized as an abbreviation and may cause date parsing issues.

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 8.1; Windows 7 SP1
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2; Windows Server 2012; Windows Server 2008 R2 SP1; Windows Server 2008 SP2
Resolution: This issue is resolved in KB4487006.

Back to top
OS Build 14393.2759

January 17, 2019
KB4480977
Resolved
KB4487006
Resolved:
February 19, 2019
02:00 PM PT

Opened:
January 17, 2019
02:00 PM PT
Applications using Microsoft Jet database fail to open
Applications that use a Microsoft Jet database with the Microsoft Access 97 file format may fail to open if the database has column names greater than 32 characters. The database will fail to open with the error, “Unrecognized Database Format”.

Affected platforms:
  • Client: Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 8.1; Windows 7 SP1 
  • Server: Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2; Windows Server 2012; Windows Server 2008 R2 SP1; Windows Server 2008 SP2 
Resolution: This issue is resolved in KB4487026.

Back to top
OS Build 14393.2724

January 08, 2019
KB4480961
Resolved
KB4487026
Resolved:
February 12, 2019
10:00 AM PT

Opened:
January 08, 2019
10:00 AM PT
Unable to access hotspots with third-party applications
After installing KB4480961, third-party applications may have difficulty authenticating hotspots.

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 8.1
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2
Resolution: This issue is resolved in KB4480977.

Back to top
OS Build 14393.2724

January 08, 2019
KB4480961
Resolved
KB4480977
Resolved:
January 17, 2019
02:00 PM PT

Opened:
January 08, 2019
10:00 AM PT
Unable to access hotspots with third-party applications
After installing KB4480961, third-party applications may have difficulty authenticating hotspots.

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 8.1
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2; Windows Server 2012
Resolution: This issue is resolved in KB4480977.

Back to top
OS Build 14393.2724

January 08, 2019
KB4480961
Resolved
KB4480977
Resolved:
January 17, 2019
02:00 PM PT

Opened:
January 08, 2019
10:00 AM PT
" @@ -107,7 +107,7 @@ sections: - type: markdown text: " - +
DetailsOriginating updateStatusHistory
Unable to use Seek bar in Windows Media Player
After installing KB4462917, users may not be able to use the Seek Bar in Windows Media Player when playing specific files. This issue does not affect normal playback.

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 8.1; Windows 7, Service Pack 1
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2; Windows Server 2008 R2 SP1
Resolution: This issue is resolved in KB4471321.

Back to top
OS Build 14393.2551

October 09, 2018
KB4462917
Resolved
KB4471321
Resolved:
December 11, 2018
10:00 AM PT

Opened:
October 09, 2018
10:00 AM PT
Unable to use Seek bar in Windows Media Player
After installing KB4462917, users may not be able to use the Seek Bar in Windows Media Player when playing specific files. This issue does not affect normal playback.

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 8.1; Windows 7 SP1
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2; Windows Server 2012; Windows Server 2008 R2 SP1; Windows Server 2008 SP2
Resolution: This issue is resolved in KB4471321.

Back to top
OS Build 14393.2551

October 09, 2018
KB4462917
Resolved
KB4471321
Resolved:
December 11, 2018
10:00 AM PT

Opened:
October 09, 2018
10:00 AM PT
" @@ -116,7 +116,7 @@ sections: - type: markdown text: " - +
DetailsOriginating updateStatusHistory
Promotions that create non-root domains fail with optional features enabled
After installing KB4457127, Windows Server 2016 promotions that create non-root domains fail in forests in which optional features like Active Directory recycle have been enabled. The error is, “The replication operation encountered a database error.”

Affected platforms:
  • Client: Windows 10 Enterprise LTSC 2016
  • Server: Windows Server 2016
Resolution: This issue is resolved in KB4467684.

Back to top
OS Build 14393.2515

September 20, 2018
KB4457127
Resolved
KB4467684
Resolved:
November 27, 2018
10:00 AM PT

Opened:
September 20, 2018
10:00 AM PT
Promotions that create non-root domains fail with optional features enabled
After installing KB4457127, Windows Server 2016 promotions that create non-root domains fail in forests in which optional features like Active Directory recycle have been enabled. The error is, “The replication operation encountered a database error.”

Affected platforms:
  • Server: Windows Server 2016
Resolution: This issue is resolved in KB4467684.

Back to top
OS Build 14393.2515

September 20, 2018
KB4457127
Resolved
KB4467684
Resolved:
November 27, 2018
10:00 AM PT

Opened:
September 20, 2018
10:00 AM PT
" diff --git a/windows/release-information/resolved-issues-windows-10-1703.yml b/windows/release-information/resolved-issues-windows-10-1703.yml index fd6f844af9..9637247336 100644 --- a/windows/release-information/resolved-issues-windows-10-1703.yml +++ b/windows/release-information/resolved-issues-windows-10-1703.yml @@ -84,7 +84,7 @@ sections:
First character of the Japanese era name not recognized as an abbreviation
After installing KB4480959, the first character of the Japanese era name is not recognized as an abbreviation and may cause date parsing issues.

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 8.1; Windows 7 SP1
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2; Windows Server 2012; Windows Server 2008 R2 SP1; Windows Server 2008 SP2
Resolution: This issue is resolved in KB4487011.

Back to topOS Build 15063.1596

January 15, 2019
KB4480959Resolved
KB4487011Resolved:
February 19, 2019
02:00 PM PT

Opened:
January 15, 2019
10:00 AM PT
Applications using Microsoft Jet database fail to open
Applications that use a Microsoft Jet database with the Microsoft Access 97 file format may fail to open if the database has column names greater than 32 characters. The database will fail to open with the error, “Unrecognized Database Format”.

Affected platforms:
  • Client: Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 8.1; Windows 7 SP1 
  • Server: Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2; Windows Server 2012; Windows Server 2008 R2 SP1; Windows Server 2008 SP2
Resolution: This issue is resolved in KB4487020.

Back to topOS Build 15063.1563

January 08, 2019
KB4480973Resolved
KB4487020Resolved:
February 12, 2019
10:00 AM PT

Opened:
January 08, 2019
10:00 AM PT
Webpages become unresponsive in Microsoft Edge
After installing KB4480973, some Microsoft Edge users report that they:
  • Cannot load webpages using a local IP address.
  • Cannot load webpages on the Internet using a VPN connection.
Browsing fails or the webpage may become unresponsive.

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709
Resolution: This issue is resolved in KB4487020.

Back to topOS Build 15063.1563

January 08, 2019
KB4480973Resolved
KB4487020Resolved:
February 12, 2019
10:00 AM PT

Opened:
January 08, 2019
10:00 AM PT -
Unable to access hotspots with third-party applications
After installing KB4480973, third-party applications may have difficulty authenticating hotspots.

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 8.1
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2
Resolution: This issue is resolved in KB4480959.

Back to topOS Build 15063.1563

January 08, 2019
KB4480973Resolved
KB4480959Resolved:
January 15, 2019
10:00 AM PT

Opened:
January 08, 2019
10:00 AM PT +
Unable to access hotspots with third-party applications
After installing KB4480973, third-party applications may have difficulty authenticating hotspots.

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 8.1
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2; Windows Server 2012
Resolution: This issue is resolved in KB4480959.

Back to topOS Build 15063.1563

January 08, 2019
KB4480973Resolved
KB4480959Resolved:
January 15, 2019
10:00 AM PT

Opened:
January 08, 2019
10:00 AM PT " @@ -93,7 +93,7 @@ sections: - type: markdown text: " - +
DetailsOriginating updateStatusHistory
Unable to use Seek bar in Windows Media Player
After installing KB4462937, users may not be able to use the Seek Bar in Windows Media Player when playing specific files. This issue does not affect normal playback.

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 8.1; Windows 7, Service Pack 1
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2; Windows Server 2008 R2 SP1
Resolution: This issue is resolved in KB4471327.

Back to top
OS Build 15063.1387

October 09, 2018
KB4462937
Resolved
KB4471327
Resolved:
December 11, 2018
10:00 AM PT

Opened:
October 09, 2018
10:00 AM PT
Unable to use Seek bar in Windows Media Player
After installing KB4462937, users may not be able to use the Seek Bar in Windows Media Player when playing specific files. This issue does not affect normal playback.

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 8.1; Windows 7 SP1
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2; Windows Server 2012; Windows Server 2008 R2 SP1; Windows Server 2008 SP2
Resolution: This issue is resolved in KB4471327.

Back to top
OS Build 15063.1387

October 09, 2018
KB4462937
Resolved
KB4471327
Resolved:
December 11, 2018
10:00 AM PT

Opened:
October 09, 2018
10:00 AM PT
LongonUI.exe stops working intermittently
After installing KB4462937, LogonUI.exe stops working intermittently.

Affected platforms:
  • Windows 10, version 1703
Resolution: This issue is resolved in KB4467699.

Back to top
OS Build 15063.1387

October 09, 2018
KB4462937
Resolved
KB4467699
Resolved:
November 27, 2018
10:00 AM PT

Opened:
October 09, 2018
10:00 AM PT
Error message beginning with “Hosted by…” when launching Microsoft Edge
After installing KB4462937, some users may see a dialog box with a non-applicable message beginning with the words “Hosted by...” when first starting Microsoft Edge.

This dialog will only appear once if they have turned on “Block only third-party cookies” in Microsoft Edge and applied certain language packs before installing this update.

Affected platforms:
  • Client: Windows 10, version 1709; Windows 10, version 1703
  • Server: Windows Server, version 1709
Resolution: This issue is resolved in KB4462939.

Back to top
OS Build 15063.1387

October 09, 2018
KB4462937
Resolved
KB4462939
Resolved:
October 18, 2018
10:00 AM PT

Opened:
October 09, 2018
10:00 AM PT
diff --git a/windows/release-information/resolved-issues-windows-10-1709.yml b/windows/release-information/resolved-issues-windows-10-1709.yml index 58d6d57eda..ba2b74615a 100644 --- a/windows/release-information/resolved-issues-windows-10-1709.yml +++ b/windows/release-information/resolved-issues-windows-10-1709.yml @@ -85,7 +85,7 @@ sections:
First character of the Japanese era name not recognized as an abbreviation
After installing KB4480967, the first character of the Japanese era name is not recognized as an abbreviation and may cause date parsing issues.

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 8.1; Windows 7 SP1
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2; Windows Server 2012; Windows Server 2008 R2 SP1; Windows Server 2008 SP2
Resolution: This issue is resolved in KB4487021.

Back to topOS Build 16299.936

January 15, 2019
KB4480967Resolved
KB4487021Resolved:
February 19, 2019
02:00 PM PT

Opened:
January 15, 2019
10:00 AM PT
Applications using Microsoft Jet database fail to open
Applications that use a Microsoft Jet database with the Microsoft Access 97 file format may fail to open if the database has column names greater than 32 characters. The database will fail to open with the error, “Unrecognized Database Format.”

Affected platforms:
  • Client: Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 8.1; Windows 7 SP1 
  • Server: Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2; Windows Server 2012; Windows Server 2008 R2 SP1; Windows Server 2008 SP2 
Resolution: This issue is resolved in KB4486996.

Back to topOS Build 16299.904

January 08, 2019
KB4480978Resolved
KB4486996Resolved:
February 12, 2019
10:00 AM PT

Opened:
January 08, 2019
10:00 AM PT
Webpages become unresponsive in Microsoft Edge
After installing KB4480978, some Microsoft Edge users report that they:
  • Cannot load webpages using a local IP address.
  • Cannot load webpages on the Internet using a VPN connection.
Browsing fails or the webpage may become unresponsive.

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709
Resolution: This issue is resolved in KB4486996.

Back to topOS Build 16299.904

January 08, 2019
KB4480978Resolved
KB4486996Resolved:
February 12, 2019
10:00 AM PT

Opened:
January 08, 2019
10:00 AM PT -
Unable to access hotspots with third-party applications
After installing KB4480978, third-party applications may have difficulty authenticating hotspots.

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 8.1
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2
Resolution: This issue is resolved in KB4480967.

Back to topOS Build 16299.904

January 08, 2019
KB4480978Resolved
KB4480967Resolved:
January 15, 2019
10:00 AM PT

Opened:
January 08, 2019
10:00 AM PT +
Unable to access hotspots with third-party applications
After installing KB4480978, third-party applications may have difficulty authenticating hotspots.

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 8.1
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2; Windows Server 2012
Resolution: This issue is resolved in KB4480967.

Back to topOS Build 16299.904

January 08, 2019
KB4480978Resolved
KB4480967Resolved:
January 15, 2019
10:00 AM PT

Opened:
January 08, 2019
10:00 AM PT " @@ -94,7 +94,7 @@ sections: - type: markdown text: " - +
DetailsOriginating updateStatusHistory
Unable to use Seek bar in Windows Media Player
After installing KB4462918, users may not be able to use the Seek Bar in Windows Media Player when playing specific files. This issue does not affect normal playback.

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 8.1; Windows 7, Service Pack 1
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2; Windows Server 2008 R2 SP1
Resolution: This issue is resolved in KB4471329.

Back to top
OS Build 16299.726

October 09, 2018
KB4462918
Resolved
KB4471329
Resolved:
December 11, 2018
10:00 AM PT

Opened:
October 09, 2018
10:00 AM PT
Unable to use Seek bar in Windows Media Player
After installing KB4462918, users may not be able to use the Seek Bar in Windows Media Player when playing specific files. This issue does not affect normal playback.

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 8.1; Windows 7 SP1
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2; Windows Server 2012; Windows Server 2008 R2 SP1; Windows Server 2008 SP2
Resolution: This issue is resolved in KB4471329.

Back to top
OS Build 16299.726

October 09, 2018
KB4462918
Resolved
KB4471329
Resolved:
December 11, 2018
10:00 AM PT

Opened:
October 09, 2018
10:00 AM PT
Error message beginning with “Hosted by…” when launching Microsoft Edge
After installing KB4462918, some users may see a dialog box with a non-applicable message beginning with the words “Hosted by...” when first starting Microsoft Edge.

This dialog will only appear once if they have turned on “Block only third-party cookies” in Microsoft Edge and applied certain language packs before installing this update.

Affected platforms:
  • Client: Windows 10, version 1709; Windows 10, version 1703
  • Server: Windows Server, version 1709
Resolution: This issue is resolved in KB4462932.

Back to top
OS Build 16299.726

October 09, 2018
KB4462918
Resolved
KB4462932
Resolved:
October 18, 2018
10:00 AM PT

Opened:
October 09, 2018
10:00 AM PT
" diff --git a/windows/release-information/resolved-issues-windows-10-1803.yml b/windows/release-information/resolved-issues-windows-10-1803.yml index 9c6df068cc..56835371d0 100644 --- a/windows/release-information/resolved-issues-windows-10-1803.yml +++ b/windows/release-information/resolved-issues-windows-10-1803.yml @@ -89,7 +89,7 @@ sections:
First character of Japanese era name not recognized
After installing KB4480976, the first character of the Japanese era name is not recognized as an abbreviation and may cause date parsing issues.

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 8.1; Windows 7 SP1
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2; Windows Server 2012; Windows Server 2008 R2 SP1; Windows Server 2008 SP2
Resolution: This issue is resolved in KB4487029

Back to topOS Build 17134.556

January 15, 2019
KB4480976Resolved
KB4487029Resolved:
February 19, 2019
02:00 PM PT

Opened:
January 15, 2019
10:00 AM PT
Applications using Microsoft Jet database and Access 95 file format stop working
Applications that use a Microsoft Jet database with the Microsoft Access 95 file format may randomly stop working. 

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 7 SP1
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2; Windows Server 2012; Windows Server 2008 R2 SP1; Windows Server 2008 SP2
Resolution: This issue is resolved in KB4487017.

Back to topOS Build 17134.523

January 08, 2019
KB4480966Resolved
KB4487017Resolved:
February 12, 2019
10:00 AM PT

Opened:
January 08, 2019
10:00 AM PT
Webpages become unresponsive in Microsoft Edge
After installing KB4480966, some Microsoft Edge users report that they: 
  • Cannot load webpages using a local IP address. 
  • Cannot load webpages on the Internet using a VPN connection.  
Browsing fails or the webpage may become unresponsive. 

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709
Resolution: This issue is resolved in KB4487017

Back to topOS Build 17134.523

January 08, 2019
KB4480966Resolved
KB4487017Resolved:
February 12, 2019
10:00 AM PT

Opened:
January 08, 2019
10:00 AM PT -
Unable to access hotspots with third-party applications
After installing KB4480966, third-party applications may have difficulty authenticating hotspots.

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 8.1
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2
Resolution: This issue is resolved in KB4480976

Back to topOS Build 17134.523

January 08, 2019
KB4480966Resolved
KB4480976Resolved:
January 15, 2019
10:00 AM PT

Opened:
January 08, 2019
10:00 AM PT +
Unable to access hotspots with third-party applications
After installing KB4480966, third-party applications may have difficulty authenticating hotspots.

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 8.1
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2; Windows Server 2012
Resolution: This issue is resolved in KB4480976

Back to topOS Build 17134.523

January 08, 2019
KB4480966Resolved
KB4480976Resolved:
January 15, 2019
10:00 AM PT

Opened:
January 08, 2019
10:00 AM PT " @@ -117,7 +117,7 @@ sections: - type: markdown text: " - +
DetailsOriginating updateStatusHistory
Unable to use Seek bar in Windows Media Player
After installing KB4462919, users may not be able to use the Seek bar in Windows Media Player when playing specific files. This issue does not affect normal playback.

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 8.1; Windows 7, Service Pack 1
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2; Windows Server 2008 R2 SP1
Resolution: This issue is resolved in KB4471324

Back to top
OS Build 17134.345

October 09, 2018
KB4462919
Resolved
KB4471324
Resolved:
December 11, 2018
10:00 AM PT

Opened:
October 09, 2018
10:00 AM PT
Unable to use Seek bar in Windows Media Player
After installing KB4462919, users may not be able to use the Seek bar in Windows Media Player when playing specific files. This issue does not affect normal playback.

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 8.1; Windows 7 SP1
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2; Windows Server 2012; Windows Server 2008 R2 SP1; Windows Server 2008 SP2
Resolution: This issue is resolved in KB4471324

Back to top
OS Build 17134.345

October 09, 2018
KB4462919
Resolved
KB4471324
Resolved:
December 11, 2018
10:00 AM PT

Opened:
October 09, 2018
10:00 AM PT
Developer Tools (F12) fail to start in Microsoft Edge
Developer Tools (F12) may fail to start in Microsoft Edge.

Affected platforms:
  • Client: Windows 10, version 1803
  • Server: Windows Server, version 1803
Resolution: This issue is resolved in KB4467702

Back to top
OS Build 17134.376

October 24, 2018
KB4462933
Resolved
KB4467702
Resolved:
November 13, 2018
10:00 AM PT

Opened:
October 24, 2018
02:00 PM PT
" diff --git a/windows/release-information/resolved-issues-windows-10-1809-and-windows-server-2019.yml b/windows/release-information/resolved-issues-windows-10-1809-and-windows-server-2019.yml index 0cc6cac4d6..bd86acbf94 100644 --- a/windows/release-information/resolved-issues-windows-10-1809-and-windows-server-2019.yml +++ b/windows/release-information/resolved-issues-windows-10-1809-and-windows-server-2019.yml @@ -99,11 +99,11 @@ sections: - type: markdown text: " - + - +
DetailsOriginating updateStatusHistory
Internet Explorer 11 authentication issue with multiple concurrent logons
After installing the February 12, 2019 update (KB4487044), Internet Explorer 11 and other applications that use WININET.DLL may have authentication issues. This occurs when two or more people use the same user account for multiple, concurrent login sessions on the same Windows Server machine, including Remote Desktop Protocol (RDP) and Terminal Server logons. Symptoms reported by customers include, but may not be limited to:  
  • Cache size and location show zero or empty. 
  • Keyboard shortcuts may not work properly. 
  • Webpages may intermittently fail to load or render correctly. 
  • Issues with credential prompts. 
  • Issues when downloading files. 
Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10 Enterprise LTSC 2016; Windows 8.1; Windows 7, Service Pack 1
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server 2016; Windows Server 2012 R2; Windows Server 2008 R2 SP1
Resolved: This issue was resolved in KB4493509

Back to top
OS Build 17763.253

January 08, 2019
KB4480116
Resolved
KB4493509
Resolved:
April 09, 2019
10:00 AM PT

Opened:
January 08, 2019
10:00 AM PT
Internet Explorer 11 authentication issue with multiple concurrent logons
After installing the February 12, 2019 update (KB4487044), Internet Explorer 11 and other applications that use WININET.DLL may have authentication issues. This occurs when two or more people use the same user account for multiple, concurrent login sessions on the same Windows Server machine, including Remote Desktop Protocol (RDP) and Terminal Server logons. Symptoms reported by customers include, but may not be limited to:  
  • Cache size and location show zero or empty. 
  • Keyboard shortcuts may not work properly. 
  • Webpages may intermittently fail to load or render correctly. 
  • Issues with credential prompts. 
  • Issues when downloading files. 
Affected platforms: 
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10 Enterprise LTSC 2016; Windows 8.1; Windows 7 SP1
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server 2016; Windows Server 2012 R2; Windows Server 2012; Windows Server 2008 R2 SP1
Resolved: This issue was resolved in KB4493509

Back to top
OS Build 17763.253

January 08, 2019
KB4480116
Resolved
KB4493509
Resolved:
April 09, 2019
10:00 AM PT

Opened:
January 08, 2019
10:00 AM PT
MSXML6 may cause applications to stop responding
After installing KB4480116, MSXML6 causes applications to stop responding if an exception was thrown during node operations, such as appendChild(), insertBefore(), and moveNode().
 
The Group Policy editor may stop responding when editing a Group Policy Object (GPO) that contains Group Policy Preferences (GPP) for Internet Explorer 10 settings. 

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 8.1
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2; Windows Server 2012
Resolved: This issue was resolved in KB4493509

Back to top
OS Build 17763.253

January 08, 2019
KB4480116
Resolved
KB4493509
Resolved:
April 09, 2019
10:00 AM PT

Opened:
January 08, 2019
10:00 AM PT
Global DNS outage affects Windows Update customers
Windows Update customers were affected by a network infrastructure event on January 29, 2019 (21:00 UTC), caused by an external DNS service provider's global outage. A software update to the external provider's DNS servers resulted in the distribution of corrupted DNS records that affected connectivity to the Windows Update service. The DNS records were restored by January 30, 2019 (00:10 UTC), and the majority of local Internet Service Providers (ISP) have refreshed their DNS servers and customer services have been restored. 
 
Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019
  • Server: Windows Server, version 1809; Windows Server 2019
While this was not an issue with Microsoft's services, we take any service disruption for our customers seriously. We will work with partners to better understand this so we can provide higher quality service in the future even across diverse global network providers. 
 
If you are still unable to connect to Windows Update services due to this problem, please contact your local ISP or network administrator. You can also refer to our new KB4493784 for more information to determine if your network is affected, and to provide your local ISP or network administrator with additional information to assist you. 

Back to top
N/A

Resolved
Resolved:
March 08, 2019
11:15 AM PT

Opened:
January 29, 2019
02:00 PM PT
Webpages become unresponsive in Microsoft Edge
After installing KB4480116, some Microsoft Edge users report that they:
  • Cannot load webpages using a local IP address. 
  • Cannot load webpages on the Internet using a VPN connection.
Browsing fails or the webpage may become unresponsive.

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709
Resolution: This issue is resolved in KB4487044

Back to top
OS Build 17763.253

January 08, 2019
KB4480116
Resolved
KB4487044
Resolved:
February 12, 2019
10:00 AM PT

Opened:
January 08, 2019
10:00 AM PT
Unable to access hotspots with third-party applications
After installing KB4480116, third-party applications may have difficulty authenticating hotspots. 

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 8.1
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2
Resolution: This issue is resolved in KB4476976

Back to top
OS Build 17763.253

January 08, 2019
KB4480116
Resolved
KB4476976
Resolved:
January 22, 2019
02:00 PM PT

Opened:
January 08, 2019
10:00 AM PT
Unable to access hotspots with third-party applications
After installing KB4480116, third-party applications may have difficulty authenticating hotspots. 

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 8.1
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2; Windows Server 2012
Resolution: This issue is resolved in KB4476976

Back to top
OS Build 17763.253

January 08, 2019
KB4480116
Resolved
KB4476976
Resolved:
January 22, 2019
02:00 PM PT

Opened:
January 08, 2019
10:00 AM PT
" @@ -137,7 +137,7 @@ sections: - type: markdown text: " - +
DetailsOriginating updateStatusHistory
Unable to use Seek bar in Windows Media Player
After installing KB4464330, users may not be able to use the Seek bar in Windows Media Player when playing specific files. This issue does not affect normal playback. 

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 8.1; Windows 7, Service Pack 1
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2; Windows Server 2008 R2 SP1
Resolution: This issue is resolved in KB4471332

Back to top
OS Build 17763.55

October 09, 2018
KB4464330
Resolved
KB4471332
Resolved:
December 11, 2018
10:00 AM PT

Opened:
October 09, 2018
10:00 AM PT
Unable to use Seek bar in Windows Media Player
After installing KB4464330, users may not be able to use the Seek bar in Windows Media Player when playing specific files. This issue does not affect normal playback. 

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 8.1; Windows 7 SP1
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2; Windows Server 2012; Windows Server 2008 R2 SP1; Windows Server 2008 SP2
Resolution: This issue is resolved in KB4471332

Back to top
OS Build 17763.55

October 09, 2018
KB4464330
Resolved
KB4471332
Resolved:
December 11, 2018
10:00 AM PT

Opened:
October 09, 2018
10:00 AM PT
Users cannot set Win32 program defaults
After installing KB4464330, some users cannot set Win32 program defaults for certain app and file type combinations using the Open with... command or Settings > Apps > Default apps.
 
In some cases, Microsoft Notepad or other Win32 programs cannot be set as the default. 

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803
Resolution: This issue is resolved in KB4469342

Back to top
OS Build 17763.55

October 09, 2018
KB4464330
Resolved
KB4469342
Resolved:
December 05, 2018
02:00 PM PT

Opened:
October 09, 2018
10:00 AM PT
" diff --git a/windows/release-information/resolved-issues-windows-7-and-windows-server-2008-r2-sp1.yml b/windows/release-information/resolved-issues-windows-7-and-windows-server-2008-r2-sp1.yml index 5147f39d4f..e5d4b077a1 100644 --- a/windows/release-information/resolved-issues-windows-7-and-windows-server-2008-r2-sp1.yml +++ b/windows/release-information/resolved-issues-windows-7-and-windows-server-2008-r2-sp1.yml @@ -59,7 +59,7 @@ sections: - type: markdown text: " - +
DetailsOriginating updateStatusHistory
Devices may not respond at login or Welcome screen if running certain Avast software.
Microsoft and Avast have identified an issue on devices running Avast for Business, Avast CloudCare, and AVG Business Edition antivirus software after you install KB4493472 and restart. Devices may become unresponsive at the login or Welcome screen. Additionally, you may be unable to log in or log in after an extended period of time.

Affected platforms: 
  • Client: Windows 8.1; Windows 7, Service Pack 1 
  • Server: Windows Server 2012 R2; Windows Server 2008 R2 SP1 
Resolution: Avast has released emergency updates to address this issue. For more information and AV update schedule, see the Avast support KB article.

Back to top
April 09, 2019
KB4493472
Resolved
Resolved:
April 09, 2019
10:00 AM PT

Opened:
April 09, 2019
10:00 AM PT
Devices may not respond at login or Welcome screen if running certain Avast software.
Microsoft and Avast have identified an issue on devices running Avast for Business, Avast CloudCare, and AVG Business Edition antivirus software after you install KB4493472 and restart. Devices may become unresponsive at the login or Welcome screen. Additionally, you may be unable to log in or log in after an extended period of time.

Affected platforms: 
  • Client: Windows 8.1; Windows 7 SP1 
  • Server: Windows Server 2012 R2; Windows Server 2008 R2 SP1 
Resolution: Avast has released emergency updates to address this issue. For more information and AV update schedule, see the Avast support KB article.

Back to top
April 09, 2019
KB4493472
Resolved
Resolved:
April 09, 2019
10:00 AM PT

Opened:
April 09, 2019
10:00 AM PT
" @@ -69,7 +69,7 @@ sections: text: " - +
DetailsOriginating updateStatusHistory
Custom URI schemes may not start corresponding application.
After installing KB4489878, custom URI schemes for application protocol handlers may not start the corresponding application for local intranet and trusted sites on Internet Explorer.

Affected platforms: 
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 8.1; Windows 7 SP1 
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2; Windows Server 2008 R2 SP1 
Resolution: This issue is resolved in KB4493472.

Back to top
March 12, 2019
KB4489878
Resolved
KB4493472
Resolved:
April 09, 2019
10:00 AM PT

Opened:
March 12, 2019
10:00 AM PT
NETDOM.EXE fails to run.
After installing KB4489878, NETDOM.EXE fails to run, and the on-screen error, “The command failed to complete successfully.” appears.

Affected platforms: 
  • Client: Windows 7, Service Pack 1 
  • Server: Windows Server 2008 R2 SP1 
Resolution: This issue is resolved in KB4493472.

Back to top
March 12, 2019
KB4489878
Resolved
KB4493472
Resolved:
April 09, 2019
10:00 AM PT

Opened:
March 12, 2019
10:00 AM PT
NETDOM.EXE fails to run.
After installing KB4489878, NETDOM.EXE fails to run, and the on-screen error, “The command failed to complete successfully.” appears.

Affected platforms: 
  • Client: Windows 7 SP1
  • Server: Windows Server 2008 R2 SP1; Windows Server 2008 SP2
Resolution: This issue is resolved in KB4493472.

Back to top
March 12, 2019
KB4489878
Resolved
KB4493472
Resolved:
April 09, 2019
10:00 AM PT

Opened:
March 12, 2019
10:00 AM PT
" @@ -88,9 +88,9 @@ sections: - type: markdown text: " - - - + + +
DetailsOriginating updateStatusHistory
Virtual machines fail to restore.
After installing KB4480970, virtual machines (VM) may fail to restore successfully if the VM has been saved and restored once before. The error message is, “Failed to restore the virtual machine state: Cannot restore this virtual machine because the saved state data cannot be read. Delete the saved state data and then try to start the virtual machine. (0xC0370027).”

This affects AMD Bulldozer Family 15h, AMD Jaguar Family 16h, and AMD Puma Family 16h (second generation) microarchitectures.

Affected platforms: 
  • Client: Windows 7, Service Pack 1 
  • Server: Windows Server 2008 R2 SP1 
Resolution: This issue is resolved in KB4490511.

Back to top
January 08, 2019
KB4480970
Resolved
KB4490511
Resolved:
February 19, 2019
02:00 PM PT

Opened:
January 08, 2019
10:00 AM PT
Local Administrators unable to remotely access shares.
Local users who are part of the local Administrators group may not be able to remotely access shares on Windows Server 2008 R2 and Windows 7 machines after installing KB4480970. This does not affect domain accounts in the local Administrators group.
 
Affected platforms: 
  • Client: Windows 7, Service Pack 1 
  • Server: Windows Server 2008 R2 SP1 
Resolution: This issue is resolved in KB4487345.

Back to top
January 08, 2019
KB4480970
Resolved
KB4487345
Resolved:
January 11, 2019
02:00 PM PT

Opened:
January 08, 2019
10:00 AM PT
Internet Explorer 11 authentication issue with multiple concurrent logons.
After installing KB4480970, Internet Explorer 11 and other applications that use WININET.DLL may have authentication issues. This occurs when two or more people use the same user account for multiple, concurrent login sessions on the same Windows Server machine, including Remote Desktop Protocol (RDP) and Terminal Server logons. Symptoms reported by customers include, but may not be limited to:
  • Cache size and location show zero or empty.
  • Keyboard shortcuts may not work properly.
  • Webpages may intermittently fail to load or render correctly.
  • Issues with credential prompts.
  • Issues when downloading files.
Affected platforms: 
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10 Enterprise LTSC 2016; Windows 8.1; Windows 7, Service Pack 1 
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server 2016; Windows Server 2012 R2; Windows Server 2008 R2 SP1 
Resolution: This issue is resolved in KB4493472.

Back to top
January 08, 2019
KB4480970
Resolved
KB4493472
Resolved:
April 09, 2019
10:00 AM PT

Opened:
January 08, 2019
10:00 AM PT
Virtual machines fail to restore.
After installing KB4480970, virtual machines (VM) may fail to restore successfully if the VM has been saved and restored once before. The error message is, “Failed to restore the virtual machine state: Cannot restore this virtual machine because the saved state data cannot be read. Delete the saved state data and then try to start the virtual machine. (0xC0370027).”

This affects AMD Bulldozer Family 15h, AMD Jaguar Family 16h, and AMD Puma Family 16h (second generation) microarchitectures.

Affected platforms: 
  • Client: Windows 7 SP1 
  • Server: Windows Server 2012; Windows Server 2008 R2 SP1; Windows Server 2008 SP2
Resolution: This issue is resolved in KB4490511.

Back to top
January 08, 2019
KB4480970
Resolved
KB4490511
Resolved:
February 19, 2019
02:00 PM PT

Opened:
January 08, 2019
10:00 AM PT
Local Administrators unable to remotely access shares.
Local users who are part of the local Administrators group may not be able to remotely access shares on Windows Server 2008 R2 and Windows 7 machines after installing KB4480970. This does not affect domain accounts in the local Administrators group.
 
Affected platforms: 
  • Client: Windows 7 SP1 
  • Server: Windows Server 2008 R2 SP1; Windows Server 2008 SP2 
Resolution: This issue is resolved in KB4487345.

Back to top
January 08, 2019
KB4480970
Resolved
KB4487345
Resolved:
January 11, 2019
02:00 PM PT

Opened:
January 08, 2019
10:00 AM PT
Internet Explorer 11 authentication issue with multiple concurrent logons.
After installing KB4480970, Internet Explorer 11 and other applications that use WININET.DLL may have authentication issues. This occurs when two or more people use the same user account for multiple, concurrent login sessions on the same Windows Server machine, including Remote Desktop Protocol (RDP) and Terminal Server logons. Symptoms reported by customers include, but may not be limited to:
  • Cache size and location show zero or empty.
  • Keyboard shortcuts may not work properly.
  • Webpages may intermittently fail to load or render correctly.
  • Issues with credential prompts.
  • Issues when downloading files.
Affected platforms: 
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10 Enterprise LTSC 2016; Windows 8.1; Windows 7 SP1
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server 2016; Windows Server 2012 R2; Windows Server 2012; Windows Server 2008 R2 SP1
Resolution: This issue is resolved in KB4493472.

Back to top
January 08, 2019
KB4480970
Resolved
KB4493472
Resolved:
April 09, 2019
10:00 AM PT

Opened:
January 08, 2019
10:00 AM PT
First character of the Japanese era name not recognized as an abbreviation.
After installing KB4480955, the first character of the Japanese era name is not recognized as an abbreviation and may cause date parsing issues.

Affected platforms: 
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 8.1; Windows 7 SP1 
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2; Windows Server 2012; Windows Server 2008 R2 SP1; Windows Server 2008 SP2 
Resolution: This issue is resolved in KB4486565.

Back to top
January 17, 2019
KB4480955
Resolved
KB4486565
Resolved:
February 19, 2019
02:00 PM PT

Opened:
January 17, 2019
10:00 AM PT
Applications using Microsoft Jet database fail to open.
Applications that use a Microsoft Jet database with the Microsoft Access 97 file format may fail to open if the database has column names greater than 32 characters. The database will fail to open with the error, “Unrecognized Database Format”.

Affected Platforms:
  • Client: Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 8.1; Windows 7 SP1 
  • Server: Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2; Windows Server 2012; Windows Server 2008 R2 SP1; Windows Server 2008 SP2 

Resolution: This issue is resolved in KB4486563.

Back to top
January 08, 2019
KB4480970
Resolved
KB4486563
Resolved:
February 12, 2019
10:00 AM PT

Opened:
January 08, 2019
10:00 AM PT
@@ -101,7 +101,7 @@ sections: - type: markdown text: " - - + +
DetailsOriginating updateStatusHistory
Event Viewer may not show some event descriptions for network interface cards.
After installing KB4462927, the Event Viewer may not show some event descriptions for network interface cards (NICs).

Affected Platforms:
  • Client: Windows 7, Service Pack 1 
  • Server: Windows Server 2008 R2 SP1 
Resolution: This issue is resolved in KB4489878.

Back to top
October 18, 2018
KB4462927
Resolved
KB4489878
Resolved:
March 12, 2019
10:00 AM PT

Opened:
October 18, 2018
10:00 AM PT
Unable to use Seek bar in Windows Media Player
After installing KB4462923, users may not be able to use the Seek Bar in Windows Media Player when playing specific files. This issue does not affect normal playback.

Affected platforms: 
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 8.1; Windows 7, Service Pack 1.
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2; Windows Server 2008 R2 SP1
Resolution: This issue is resolved in KB4471318.

Back to top
October 09, 2018
KB4462923
Resolved
KB4471318
Resolved:
December 11, 2018
10:00 AM PT

Opened:
October 09, 2018
10:00 AM PT
Event Viewer may not show some event descriptions for network interface cards.
After installing KB4462927, the Event Viewer may not show some event descriptions for network interface cards (NICs).

Affected Platforms:
  • Client: Windows 7 SP1 
  • Server: Windows Server 2012; Windows Server 2008 R2 SP1
Resolution: This issue is resolved in KB4489878.

Back to top
October 18, 2018
KB4462927
Resolved
KB4489878
Resolved:
March 12, 2019
10:00 AM PT

Opened:
October 18, 2018
10:00 AM PT
Unable to use Seek bar in Windows Media Player
After installing KB4462923, users may not be able to use the Seek Bar in Windows Media Player when playing specific files. This issue does not affect normal playback.

Affected platforms: 
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 8.1; Windows 7 SP1
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2; Windows Server 2012; Windows Server 2008 R2 SP1; Windows Server 2008 SP2
Resolution: This issue is resolved in KB4471318.

Back to top
October 09, 2018
KB4462923
Resolved
KB4471318
Resolved:
December 11, 2018
10:00 AM PT

Opened:
October 09, 2018
10:00 AM PT
" diff --git a/windows/release-information/resolved-issues-windows-8.1-and-windows-server-2012-r2.yml b/windows/release-information/resolved-issues-windows-8.1-and-windows-server-2012-r2.yml index 87210c9a79..58f30aecc2 100644 --- a/windows/release-information/resolved-issues-windows-8.1-and-windows-server-2012-r2.yml +++ b/windows/release-information/resolved-issues-windows-8.1-and-windows-server-2012-r2.yml @@ -60,7 +60,7 @@ sections: - type: markdown text: " - +
DetailsOriginating updateStatusHistory
Devices may not respond at login or Welcome screen if running certain Avast software
Microsoft and Avast have identified an issue on devices running Avast for Business, Avast CloudCare, and AVG Business Edition antivirus software after you install KB4493446 and restart. Devices may become unresponsive at the login or Welcome screen. Additionally, you may be unable to log in or log in after an extended period of time.

Affected platforms: 
  • Client: Windows 8.1; Windows 7, Service Pack 1 
  • Server: Windows Server 2012 R2; Windows Server 2008 R2 SP1 

Resolution: Avast has released emergency updates to address this issue. For more information and AV update schedule, see the Avast support KB article.

Back to top
April 09, 2019
KB4493446
Resolved
Resolved:
April 09, 2019
10:00 AM PT

Opened:
April 09, 2019
10:00 AM PT
Devices may not respond at login or Welcome screen if running certain Avast software
Microsoft and Avast have identified an issue on devices running Avast for Business, Avast CloudCare, and AVG Business Edition antivirus software after you install KB4493446 and restart. Devices may become unresponsive at the login or Welcome screen. Additionally, you may be unable to log in or log in after an extended period of time.

Affected platforms: 
  • Client: Windows 8.1; Windows 7 SP1 
  • Server: Windows Server 2012 R2; Windows Server 2008 R2 SP1 
Resolution: Avast has released emergency updates to address this issue. For more information and AV update schedule, see the Avast support KB article.

Back to top
April 09, 2019
KB4493446
Resolved
Resolved:
April 09, 2019
10:00 AM PT

Opened:
April 09, 2019
10:00 AM PT
" @@ -79,7 +79,7 @@ sections: - type: markdown text: " - +
DetailsOriginating updateStatusHistory
Embedded objects may display incorrectly
Any compound document (OLE) server application that places embedded objects into the Windows Metafile (WMF) using the PatBlt API may display embedded objects incorrectly.

For example, if you paste a Microsoft Excel worksheet object into a Microsoft Word document, the cells may render with a different background color.

Affected platforms: 
  • Client: Windows 8.1 
  • Server: Windows Server 2012 R2 
Resolution: This issue is resolved in KB4493446.

Back to top
February 12, 2019
KB4487000
Resolved
KB4493446
Resolved:
April 09, 2019
10:00 AM PT

Opened:
February 12, 2019
10:00 AM PT
Embedded objects may display incorrectly
Any compound document (OLE) server application that places embedded objects into the Windows Metafile (WMF) using the PatBlt API may display embedded objects incorrectly.

For example, if you paste a Microsoft Excel worksheet object into a Microsoft Word document, the cells may render with a different background color.

Affected platforms: 
  • Client: Windows 8.1 
  • Server: Windows Server 2012 R2; Windows Server 2012; Windows Server 2008 SP2
Resolution: This issue is resolved in KB4493446.

Back to top
February 12, 2019
KB4487000
Resolved
KB4493446
Resolved:
April 09, 2019
10:00 AM PT

Opened:
February 12, 2019
10:00 AM PT
Error 1309 when installing/uninstalling MSI or MSP files
After installing KB4487016, users may receive “Error 1309” while installing or uninstalling certain types of MSI and MSP files.

Affected platforms: 
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 8.1 
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2; Windows Server 2012 
Resolution: This issue is resolved in KB4489881.

Back to top
February 19, 2019
KB4487016
Resolved
KB4489881
Resolved:
March 12, 2019
10:00 AM PT

Opened:
February 19, 2019
02:00 PM PT
Internet Explorer may fail to load images
After installing KB4487000, Internet Explorer may fail to load images with a backslash (\\) in their relative source path.

Affected platforms: 
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 8.1; Windows 7 SP1 
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2; Windows Server 2008 R2 SP1 
Resolution: This issue is resolved in KB4487016.

Back to top
February 12, 2019
KB4487000
Resolved
KB4487016
Resolved:
February 19, 2019
02:00 PM PT

Opened:
February 12, 2019
10:00 AM PT
@@ -90,12 +90,12 @@ sections: - type: markdown text: " - + - + - +
DetailsOriginating updateStatusHistory
Internet Explorer 11 authentication issue with multiple concurrent logons
After installing KB4480963, Internet Explorer 11 and other applications that use WININET.DLL may have authentication issues. This occurs when two or more people use the same user account for multiple, concurrent login sessions on the same Windows Server machine, including Remote Desktop Protocol (RDP) and Terminal Server logons. Symptoms reported by customers include, but may not be limited to:
  • Cache size and location show zero or empty.
  • Keyboard shortcuts may not work properly.
  • Webpages may intermittently fail to load or render correctly.
  • Issues with credential prompts.
  • Issues when downloading files.
Affected platforms: 
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10 Enterprise LTSC 2016; Windows 8.1; Windows 7, Service Pack 1 
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server 2016; Windows Server 2012 R2; Windows Server 2008 R2 SP1 
Resolution: This issue is resolved in KB4493446.

Back to top
January 08, 2019
KB4480963
Resolved
KB4493446
Resolved:
April 09, 2019
10:00 AM PT

Opened:
January 08, 2019
10:00 AM PT
Internet Explorer 11 authentication issue with multiple concurrent logons
After installing KB4480963, Internet Explorer 11 and other applications that use WININET.DLL may have authentication issues. This occurs when two or more people use the same user account for multiple, concurrent login sessions on the same Windows Server machine, including Remote Desktop Protocol (RDP) and Terminal Server logons. Symptoms reported by customers include, but may not be limited to:
  • Cache size and location show zero or empty.
  • Keyboard shortcuts may not work properly.
  • Webpages may intermittently fail to load or render correctly.
  • Issues with credential prompts.
  • Issues when downloading files.
Affected platforms: 
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10 Enterprise LTSC 2016; Windows 8.1; Windows 7 SP1
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server 2016; Windows Server 2012 R2; Windows Server 2012; Windows Server 2008 R2 SP1
Resolution: This issue is resolved in KB4493446.

Back to top
January 08, 2019
KB4480963
Resolved
KB4493446
Resolved:
April 09, 2019
10:00 AM PT

Opened:
January 08, 2019
10:00 AM PT
MSXML6 may cause applications to stop responding.
After installing KB4480963, MSXML6 causes applications to stop responding if an exception was thrown during node operations, such as appendChild(), insertBefore(), and moveNode().

The Group Policy editor may stop responding when editing a Group Policy Object (GPO) that contains Group Policy Preferences (GPP) for Internet Explorer 10 settings.

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 8.1
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2; Windows Server 2012
Resolution: This issue is resolved in KB4493446.

Back to top
January 08, 2019
KB4480963
Resolved
KB4493446
Resolved:
April 09, 2019
10:00 AM PT

Opened:
January 08, 2019
10:00 AM PT
First character of the Japanese era name not recognized as an abbreviation
After installing KB4480969, the first character of the Japanese era name is not recognized as an abbreviation and may cause date parsing issues.

Affected platforms: 
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 8.1; Windows 7, SP1 
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2; Windows Server 2012; Windows Server 2008 R2 SP1; Windows Server 2008 SP2 
Resolution: This issue is resolved in KB4487016.

Back to top
January 15, 2019
KB4480969
Resolved
KB4487016
Resolved:
February 19, 2019
02:00 PM PT

Opened:
January 15, 2019
10:00 AM PT
Virtual machines fail to restore
After installing KB4480963, virtual machines (VM) may fail to restore successfully if the VM has been saved and restored once before. The error message is, “Failed to restore the virtual machine state: Cannot restore this virtual machine because the saved state data cannot be read. Delete the saved state data and then try to start the virtual machine. (0xC0370027).”

This affects AMD Bulldozer Family 15h, AMD Jaguar Family 16h, and AMD Puma Family 16h (second generation) microarchitectures.

Resolution: This issue is resolved in KB4490512.

Back to top
January 08, 2019
KB4480963
Resolved
KB4490512
Resolved:
February 19, 2019
02:00 PM PT

Opened:
January 08, 2019
10:00 AM PT
Virtual machines fail to restore
After installing KB4480963, virtual machines (VM) may fail to restore successfully if the VM has been saved and restored once before. The error message is, “Failed to restore the virtual machine state: Cannot restore this virtual machine because the saved state data cannot be read. Delete the saved state data and then try to start the virtual machine. (0xC0370027).”

This affects AMD Bulldozer Family 15h, AMD Jaguar Family 16h, and AMD Puma Family 16h (second generation) microarchitectures.

Affected platforms: 
  • Client: Windows 7 SP1 
  • Server: Windows Server 2012; Windows Server 2008 R2 SP1; Windows Server 2008 SP2
Resolution: This issue is resolved in KB4490512.

Back to top
January 08, 2019
KB4480963
Resolved
KB4490512
Resolved:
February 19, 2019
02:00 PM PT

Opened:
January 08, 2019
10:00 AM PT
Applications using Microsoft Jet database fail to open
Applications that use a Microsoft Jet database with the Microsoft Access 97 file format may fail to open if the database has column names greater than 32 characters. The database will fail to open with the error, “Unrecognized Database Format”.

Affected platforms: 
  • Client: Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 8.1; Windows 7 SP1 
  • Server: Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2; Windows Server 2012; Windows Server 2008 R2 SP1; Windows Server 2008 SP2 
Resolution: This issue is resolved in KB4487000.

Back to top
January 08, 2019
KB4480963
Resolved
KB4487000
Resolved:
February 12, 2019
10:00 AM PT

Opened:
January 08, 2019
10:00 AM PT
Unable to access hotspots with third-party applications
After installing KB4480963, third-party applications may have difficulty authenticating hotspots.

Affected platforms: 
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 8.1 
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2 
Resolution: This issue is resolved in KB4480969.

Back to top
January 08, 2019
KB4480963
Resolved
KB4480969
Resolved:
January 15, 2019
10:00 AM PT

Opened:
January 08, 2019
10:00 AM PT
Unable to access hotspots with third-party applications
After installing KB4480963, third-party applications may have difficulty authenticating hotspots.

Affected platforms: 
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 8.1 
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2; Windows Server 2012
Resolution: This issue is resolved in KB4480969.

Back to top
January 08, 2019
KB4480963
Resolved
KB4480969
Resolved:
January 15, 2019
10:00 AM PT

Opened:
January 08, 2019
10:00 AM PT
" @@ -104,6 +104,6 @@ sections: - type: markdown text: " - +
DetailsOriginating updateStatusHistory
Unable to use Seek bar in Windows Media Player
After installing KB4462926, users may not be able to use the Seek Bar in Windows Media Player when playing specific files. This issue does not affect normal playback.

Affected platforms: 
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 8.1; Windows 7, Service Pack 1 
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2; Windows Server 2008 R2 SP1 
Resolution: This issue is resolved in KB4471320.

Back to top
October 09, 2018
KB4462926
Resolved
KB4471320
Resolved:
December 11, 2018
10:00 AM PT

Opened:
October 09, 2018
10:00 AM PT
Unable to use Seek bar in Windows Media Player
After installing KB4462926, users may not be able to use the Seek Bar in Windows Media Player when playing specific files. This issue does not affect normal playback.

Affected platforms: 
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 8.1; Windows 7 SP1 
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2; Windows Server 2012; Windows Server 2008 R2 SP1; Windows Server 2008 SP2
Resolution: This issue is resolved in KB4471320.

Back to top
October 09, 2018
KB4462926
Resolved
KB4471320
Resolved:
December 11, 2018
10:00 AM PT

Opened:
October 09, 2018
10:00 AM PT
" diff --git a/windows/release-information/resolved-issues-windows-server-2008-sp2.yml b/windows/release-information/resolved-issues-windows-server-2008-sp2.yml index 7d454b6438..4e04ae833d 100644 --- a/windows/release-information/resolved-issues-windows-server-2008-sp2.yml +++ b/windows/release-information/resolved-issues-windows-server-2008-sp2.yml @@ -55,7 +55,7 @@ sections: - type: markdown text: " - +
DetailsOriginating updateStatusHistory
NETDOM.EXE fails to run
After installing KB4489880, NETDOM.EXE fails to run, and the on-screen error, “The command failed to complete successfully.” appears.

Affected platforms: 
  • Client: Windows 7, Service Pack 1 
  • Server: Windows Server 2008 R2 SP1; Windows Server 2008 SP2
Resolution: This issue is resolved in KB4493471.

Back to top
March 12, 2019
KB4489880
Resolved
KB4493471
Resolved:
April 09, 2019
10:00 AM PT

Opened:
March 12, 2019
10:00 AM PT
NETDOM.EXE fails to run
After installing KB4489880, NETDOM.EXE fails to run, and the on-screen error, “The command failed to complete successfully.” appears.

Affected platforms: 
  • Client: Windows 7 SP1
  • Server: Windows Server 2008 R2 SP1; Windows Server 2008 SP2
Resolution: This issue is resolved in KB4493471.

Back to top
March 12, 2019
KB4489880
Resolved
KB4493471
Resolved:
April 09, 2019
10:00 AM PT

Opened:
March 12, 2019
10:00 AM PT
" @@ -75,9 +75,9 @@ sections: text: " - + - +
DetailsOriginating updateStatusHistory
First character of the Japanese era name not recognized as an abbreviation
After installing KB4480974, the first character of the Japanese era name is not recognized as an abbreviation and may cause date parsing issues.

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 8.1; Windows 7 SP1
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2; Windows Server 2012; Windows Server 2008 R2 SP1; Windows Server 2008 SP2
Resolution: This issue is resolved in KB4489880.

Back to top
January 17, 2019
KB4480974
Resolved
KB4489880
Resolved:
March 12, 2019
10:00 AM PT

Opened:
January 17, 2019
10:00 AM PT
Virtual machines fail to restore
After installing KB4480968, virtual machines (VM) may fail to restore successfully if the VM has been saved and restored once before. The error message is, “Failed to restore the virtual machine state: Cannot restore this virtual machine because the saved state data cannot be read. Delete the saved state data and then try to start the virtual machine. (0xC0370027).”

This affects AMD Bulldozer Family 15h, AMD Jaguar Family 16h, and AMD Puma Family 16h (second generation) microarchitectures.

Affected platforms: 
  • Client: Windows 7, Service Pack 1 
  • Server: Windows Server 2012; Windows Server 2008 R2 SP1; Windows Server 2008 SP2
Resolution: This issue is resolved in KB4490514.

Back to top
January 08, 2019
KB4480968
Resolved
KB4490514
Resolved:
February 19, 2019
02:00 PM PT

Opened:
January 08, 2019
10:00 AM PT
Virtual machines fail to restore
After installing KB4480968, virtual machines (VM) may fail to restore successfully if the VM has been saved and restored once before. The error message is, “Failed to restore the virtual machine state: Cannot restore this virtual machine because the saved state data cannot be read. Delete the saved state data and then try to start the virtual machine. (0xC0370027).”

This affects AMD Bulldozer Family 15h, AMD Jaguar Family 16h, and AMD Puma Family 16h (second generation) microarchitectures.

Affected platforms: 
  • Client: Windows 7 SP1 
  • Server: Windows Server 2012; Windows Server 2008 R2 SP1; Windows Server 2008 SP2
Resolution: This issue is resolved in KB4490514.

Back to top
January 08, 2019
KB4480968
Resolved
KB4490514
Resolved:
February 19, 2019
02:00 PM PT

Opened:
January 08, 2019
10:00 AM PT
Applications using Microsoft Jet database fail to open
Applications that use a Microsoft Jet database with the Microsoft Access 97 file format may fail to open if the database has column names greater than 32 characters. The database will fail to open with the error, “Unrecognized Database Format”.

Affected platforms: 
  • Client: Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 8.1; Windows 7 SP1 
  • Server: Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2; Windows Server 2012; Windows Server 2008 R2 SP1; Windows Server 2008 SP2
Resolution: This issue is resolved in KB4487023.

Back to top
January 08, 2019
KB4480968
Resolved
KB4487023
Resolved:
February 12, 2019
10:00 AM PT

Opened:
January 08, 2019
10:00 AM PT
Local Administrators unable to remotely access shares
Local users who are part of the local Administrators group may not be able to remotely access shares on Windows Server 2008 R2 and Windows 7 machines after installing KB4480968. This does not affect domain accounts in the local Administrators group.

Affected platforms: 
  • Client: Windows 7, Service Pack 1 
  • Server: Windows Server 2008 R2 SP1; Windows Server 2008 SP2
Resolution: This issue is resolved in KB4487354.

Back to top
January 08, 2019
KB4480968
Resolved
KB4487354
Resolved:
January 11, 2019
02:00 PM PT

Opened:
January 08, 2019
10:00 AM PT
Local Administrators unable to remotely access shares
Local users who are part of the local Administrators group may not be able to remotely access shares on Windows Server 2008 R2 and Windows 7 machines after installing KB4480968. This does not affect domain accounts in the local Administrators group.

Affected platforms: 
  • Client: Windows 7 SP1 
  • Server: Windows Server 2008 R2 SP1; Windows Server 2008 SP2
Resolution: This issue is resolved in KB4487354.

Back to top
January 08, 2019
KB4480968
Resolved
KB4487354
Resolved:
January 11, 2019
02:00 PM PT

Opened:
January 08, 2019
10:00 AM PT
" @@ -86,6 +86,6 @@ sections: - type: markdown text: " - +
DetailsOriginating updateStatusHistory
Unable to use Seek bar in Windows Media Player
After installing KB4463097, users may not be able to use the Seek Bar in Windows Media Player when playing specific files. This issue does not affect normal playback.

Affected platforms: 
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 8.1; Windows 7, Service Pack 1
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2; Windows Server 2012; Windows Server 2008 R2 SP1; Windows Server 2008 SP2
Resolution: This issue is resolved in KB4471325.

Back to top
October 09, 2018
KB4463097
Resolved
KB4471325
Resolved:
December 11, 2018
10:00 AM PT

Opened:
October 09, 2018
10:00 AM PT
Unable to use Seek bar in Windows Media Player
After installing KB4463097, users may not be able to use the Seek Bar in Windows Media Player when playing specific files. This issue does not affect normal playback.

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 8.1; Windows 7 SP1
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2; Windows Server 2012; Windows Server 2008 R2 SP1; Windows Server 2008 SP2
Resolution: This issue is resolved in KB4471325.

Back to top
October 09, 2018
KB4463097
Resolved
KB4471325
Resolved:
December 11, 2018
10:00 AM PT

Opened:
October 09, 2018
10:00 AM PT
" diff --git a/windows/release-information/resolved-issues-windows-server-2012.yml b/windows/release-information/resolved-issues-windows-server-2012.yml index d1d3a8fa37..0c9f4f538a 100644 --- a/windows/release-information/resolved-issues-windows-server-2012.yml +++ b/windows/release-information/resolved-issues-windows-server-2012.yml @@ -58,7 +58,7 @@ sections: - type: markdown text: " - +
DetailsOriginating updateStatusHistory
Embedded objects may display incorrectly
Any compound document (OLE) server application that places embedded objects into the Windows Metafile (WMF) using the PatBlt API may display embedded objects incorrectly.

For example, if you paste a Microsoft Excel worksheet object into a Microsoft Word document, the cells may render with a different background color.

Resolution: This issue is resolved in KB4493451.

Back to top
February 12, 2019
KB4487025
Resolved
KB4493451
Resolved:
April 09, 2019
10:00 AM PT

Opened:
February 12, 2019
10:00 AM PT
Embedded objects may display incorrectly
Any compound document (OLE) server application that places embedded objects into the Windows Metafile (WMF) using the PatBlt API may display embedded objects incorrectly.

For example, if you paste a Microsoft Excel worksheet object into a Microsoft Word document, the cells may render with a different background color.

Affected platforms: 
  • Client: Windows 8.1 
  • Server: Windows Server 2012 R2; Windows Server 2012; Windows Server 2008 SP2
Resolution: This issue is resolved in KB4493451.

Back to top
February 12, 2019
KB4487025
Resolved
KB4493451
Resolved:
April 09, 2019
10:00 AM PT

Opened:
February 12, 2019
10:00 AM PT
Error 1309 when installing/uninstalling MSI or MSP files
After installing KB4487025, users may receive \"Error 1309\" while installing or uninstalling certain types of MSI and MSP files.

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 8.1
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2; Windows Server 2012
Resolution: This issue is resolved in KB4489891.

Back to top
February 12, 2019
KB4487025
Resolved
KB4489891
Resolved:
March 12, 2019
10:00 AM PT

Opened:
February 12, 2019
10:00 AM PT
Applications using Microsoft Jet database and Access 95 file format stop working
Applications that use a Microsoft Jet database with the Microsoft Access 95 file format may randomly stop working.

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 7 SP1
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012; Windows Server 2008 R2 SP1; Windows Server 2008 SP2
Resolution: This issue is resolved in KB4487024.

Back to top
February 12, 2019
KB4487025
Resolved
KB4487024
Resolved:
February 19, 2019
02:00 PM PT

Opened:
February 12, 2019
10:00 AM PT
@@ -69,12 +69,12 @@ sections: - type: markdown text: " - + - + - +
DetailsOriginating updateStatusHistory
Internet Explorer 11 authentication issue with multiple concurrent logons
After installing KB4480975, Internet Explorer 11 and other applications that use WININET.DLL may have authentication issues. This occurs when two or more people use the same user account for multiple, concurrent login sessions on the same Windows Server machine, including Remote Desktop Protocol (RDP) and Terminal Server logons. Symptoms reported by customers include, but may not be limited to:
  • Cache size and location show zero or empty.
  • Keyboard shortcuts may not work properly.
  • Webpages may intermittently fail to load or render correctly.
  • Issues with credential prompts.
  • Issues when downloading files.
Resolution: This issue is resolved in KB4493451.

Back to top
January 08, 2019
KB4480975
Resolved
KB4493451
Resolved:
April 09, 2019
10:00 AM PT

Opened:
January 08, 2019
10:00 AM PT
Internet Explorer 11 authentication issue with multiple concurrent logons
After installing KB4480975, Internet Explorer 11 and other applications that use WININET.DLL may have authentication issues. This occurs when two or more people use the same user account for multiple, concurrent login sessions on the same Windows Server machine, including Remote Desktop Protocol (RDP) and Terminal Server logons. Symptoms reported by customers include, but may not be limited to:
  • Cache size and location show zero or empty.
  • Keyboard shortcuts may not work properly.
  • Webpages may intermittently fail to load or render correctly.
  • Issues with credential prompts.
  • Issues when downloading files.
Affected platforms: 
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10 Enterprise LTSC 2016; Windows 8.1; Windows 7 SP1
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server 2016; Windows Server 2012 R2; Windows Server 2012; Windows Server 2008 R2 SP1
Resolution: This issue is resolved in KB4493451.

Back to top
January 08, 2019
KB4480975
Resolved
KB4493451
Resolved:
April 09, 2019
10:00 AM PT

Opened:
January 08, 2019
10:00 AM PT
MSXML6 may cause applications to stop responding
After installing KB4480975, MSXML6 causes applications to stop responding if an exception was thrown during node operations, such as appendChild(), insertBefore(), and moveNode().

The Group Policy editor may stop responding when editing a Group Policy Object (GPO) that contains Group Policy Preferences (GPP) for Internet Explorer 10 settings.

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 8.1
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2; Windows Server 2012
Resolution: This issue is resolved in KB4493451.

Back to top
January 08, 2019
KB4480975
Resolved
KB4493451
Resolved:
April 09, 2019
10:00 AM PT

Opened:
January 08, 2019
10:00 AM PT
Virtual machines fail to restore
After installing KB4480975, virtual machines (VM) may fail to restore successfully if the VM has been saved and restored once before. The error message is, \"Failed to restore the virtual machine state: Cannot restore this virtual machine because the saved state data cannot be read. Delete the saved state data and then try to start the virtual machine. (0xC0370027).\"

This affects AMD Bulldozer Family 15h, AMD Jaguar Family 16h, and AMD Puma Family 16h (second generation) microarchitectures.

Resolution: This issue is resolved in KB4490516.

Back to top
January 08, 2019
KB4480975
Resolved
KB4490516
Resolved:
February 19, 2019
02:00 PM PT

Opened:
January 08, 2019
10:00 AM PT
Virtual machines fail to restore
After installing KB4480975, virtual machines (VM) may fail to restore successfully if the VM has been saved and restored once before. The error message is, \"Failed to restore the virtual machine state: Cannot restore this virtual machine because the saved state data cannot be read. Delete the saved state data and then try to start the virtual machine. (0xC0370027).\"

This affects AMD Bulldozer Family 15h, AMD Jaguar Family 16h, and AMD Puma Family 16h (second generation) microarchitectures.

Affected platforms: 
  • Client: Windows 7 SP1 
  • Server: Windows Server 2012; Windows Server 2008 R2 SP1; Windows Server 2008 SP2
Resolution: This issue is resolved in KB4490516.

Back to top
January 08, 2019
KB4480975
Resolved
KB4490516
Resolved:
February 19, 2019
02:00 PM PT

Opened:
January 08, 2019
10:00 AM PT
First character of the Japanese era name not recognized as an abbreviation
After installing KB4480971, the first character of the Japanese era name is not recognized as an abbreviation and may cause date parsing issues.

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 8.1; Windows 7 SP1
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2; Windows Server 2012; Windows Server 2008 R2 SP1; Windows Server 2008 SP2
Resolution: This issue is resolved in KB4487024.

Back to top
January 15, 2019
KB4480971
Resolved
KB4487024
Resolved:
February 19, 2019
02:00 PM PT

Opened:
January 15, 2019
10:00 AM PT
Applications using Microsoft Jet database fail to open
Applications that use a Microsoft Jet database with the Microsoft Access 97 file format may fail to open if the database has column names greater than 32 characters. The database will fail to open with the error, \"Unrecognized Database Format\".

Affected platforms: 
  • Client: Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 8.1; Windows 7 SP1 
  • Server: Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2; Windows Server 2012; Windows Server 2008 R2 SP1; Windows Server 2008 SP2
Resolution: This issue is resolved in KB4487025.

Back to top
January 08, 2019
KB4480975
Resolved
KB4487025
Resolved:
February 12, 2019
10:00 AM PT

Opened:
January 08, 2019
10:00 AM PT
Unable to access hotspots with third-party applications
After installing KB4480975, third-party applications may have difficulty authenticating hotspots.

Resolution: This issue is resolved in KB4480971.

Back to top
January 08, 2019
KB4480975
Resolved
KB4480971
Resolved:
January 15, 2019
10:00 AM PT

Opened:
January 08, 2019
10:00 AM PT
Unable to access hotspots with third-party applications
After installing KB4480975, third-party applications may have difficulty authenticating hotspots.

Affected platforms: 
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 8.1 
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2; Windows Server 2012
Resolution: This issue is resolved in KB4480971.

Back to top
January 08, 2019
KB4480975
Resolved
KB4480971
Resolved:
January 15, 2019
10:00 AM PT

Opened:
January 08, 2019
10:00 AM PT
" @@ -83,7 +83,7 @@ sections: - type: markdown text: " - +
DetailsOriginating updateStatusHistory
Unable to use Seek bar in Windows Media Player
After installing KB4462929, users may not be able to use the Seek Bar in Windows Media Player when playing specific files. This issue does not affect normal playback.

Resolution: This issue is resolved in KB4471330.

Back to top
October 09, 2018
KB4462929
Resolved
KB4471330
Resolved:
December 11, 2018
10:00 AM PT

Opened:
October 09, 2018
10:00 AM PT
Unable to use Seek bar in Windows Media Player
After installing KB4462929, users may not be able to use the Seek Bar in Windows Media Player when playing specific files. This issue does not affect normal playback.

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 8.1; Windows 7 SP1
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2; Windows Server 2012; Windows Server 2008 R2 SP1; Windows Server 2008 SP2
Resolution: This issue is resolved in KB4471330.

Back to top
October 09, 2018
KB4462929
Resolved
KB4471330
Resolved:
December 11, 2018
10:00 AM PT

Opened:
October 09, 2018
10:00 AM PT
" @@ -92,6 +92,6 @@ sections: - type: markdown text: " - +
DetailsOriginating updateStatusHistory
Event Viewer may not show some event descriptions for network interface cards
After installing KB4457135, the Event Viewer may not show some event descriptions for network interface cards (NICs).

Resolution: This issue is resolved in KB4489891.

Back to top
September 11, 2018
KB4457135
Resolved
KB4489891
Resolved:
March 12, 2019
10:00 AM PT

Opened:
September 11, 2018
10:00 AM PT
Event Viewer may not show some event descriptions for network interface cards
After installing KB4457135, the Event Viewer may not show some event descriptions for network interface cards (NICs).

Affected Platforms:
  • Client: Windows 7 SP1 
  • Server: Windows Server 2012; Windows Server 2008 R2 SP1
Resolution: This issue is resolved in KB4489891.

Back to top
September 11, 2018
KB4457135
Resolved
KB4489891
Resolved:
March 12, 2019
10:00 AM PT

Opened:
September 11, 2018
10:00 AM PT
" diff --git a/windows/release-information/status-windows-10-1507.yml b/windows/release-information/status-windows-10-1507.yml index 88c9c0387b..3799300742 100644 --- a/windows/release-information/status-windows-10-1507.yml +++ b/windows/release-information/status-windows-10-1507.yml @@ -78,7 +78,7 @@ sections: - type: markdown text: " - +
DetailsOriginating updateStatusHistory
Certain operations performed on a Cluster Shared Volume may fail
Certain operations, such as rename, that you perform on files or folders that are on a Cluster Shared Volume (CSV) may fail with the error, \"STATUS_BAD_IMPERSONATION_LEVEL (0xC00000A5)\". This occurs when you perform the operation on a CSV owner node from a process that doesn’t have administrator privilege.

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 8.1
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2; Windows Server 2012
Workaround: Do one of the following: 
 
  • Perform the operation from a process that has administrator privilege. 
  • Perform the operation from a node that doesn’t have CSV ownership. 
Next steps: Microsoft is working on a resolution and will provide an update in an upcoming release.

Back to top
OS Build 10240.18186

April 09, 2019
KB4493475
Mitigated
Last updated:
April 26, 2019
10:47 AM PT

Opened:
April 26, 2019
10:47 AM PT
Certain operations performed on a Cluster Shared Volume may fail
Certain operations, such as rename, that you perform on files or folders that are on a Cluster Shared Volume (CSV) may fail with the error, \"STATUS_BAD_IMPERSONATION_LEVEL (0xC00000A5)\". This occurs when you perform the operation on a CSV owner node from a process that doesn’t have administrator privilege.

Affected platforms: 
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 8.1
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2; Windows Server 2012
Workaround: Do one of the following: 
  • Perform the operation from a process that has administrator privilege. 
  • Perform the operation from a node that doesn’t have CSV ownership. 
Next steps: Microsoft is working on a resolution and will provide an update in an upcoming release.

Back to top
OS Build 10240.18186

April 09, 2019
KB4493475
Mitigated
Last updated:
April 26, 2019
10:47 AM PT

Opened:
April 26, 2019
10:47 AM PT
" diff --git a/windows/release-information/status-windows-10-1607-and-windows-server-2016.yml b/windows/release-information/status-windows-10-1607-and-windows-server-2016.yml index 51cb38d936..fa05010836 100644 --- a/windows/release-information/status-windows-10-1607-and-windows-server-2016.yml +++ b/windows/release-information/status-windows-10-1607-and-windows-server-2016.yml @@ -84,7 +84,7 @@ sections: - type: markdown text: " - +
DetailsOriginating updateStatusHistory
Certain operations performed on a Cluster Shared Volume may fail
Certain operations, such as rename, that you perform on files or folders that are on a Cluster Shared Volume (CSV) may fail with the error, \"STATUS_BAD_IMPERSONATION_LEVEL (0xC00000A5)\". This occurs when you perform the operation on a CSV owner node from a process that doesn’t have administrator privilege. 

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 8.1
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2; Windows Server 2012
Workaround: Do one of the following: 

  • Perform the operation from a process that has administrator privilege. 
  • Perform the operation from a node that doesn’t have CSV ownership. 
Next steps: Microsoft is working on a resolution and will provide an update in an upcoming release.

Back to top
OS Build 14393.2906

April 09, 2019
KB4493470
Mitigated
Last updated:
April 26, 2019
10:48 AM PT

Opened:
April 26, 2019
10:48 AM PT
Certain operations performed on a Cluster Shared Volume may fail
Certain operations, such as rename, that you perform on files or folders that are on a Cluster Shared Volume (CSV) may fail with the error, \"STATUS_BAD_IMPERSONATION_LEVEL (0xC00000A5)\". This occurs when you perform the operation on a CSV owner node from a process that doesn’t have administrator privilege. 

Affected platforms: 
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 8.1
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2; Windows Server 2012
Workaround: Do one of the following:
  • Perform the operation from a process that has administrator privilege. 
  • Perform the operation from a node that doesn’t have CSV ownership.
Next steps: Microsoft is working on a resolution and will provide an update in an upcoming release.

Back to top
OS Build 14393.2906

April 09, 2019
KB4493470
Mitigated
Last updated:
April 26, 2019
10:48 AM PT

Opened:
April 26, 2019
10:48 AM PT
" @@ -94,7 +94,7 @@ sections: text: " -
DetailsOriginating updateStatusHistory
Custom URI schemes may not start corresponding application
After installing KB4489882, Custom URI schemes for application protocol handlers may not start the corresponding application for local intranet and trusted sites security zones on Internet Explorer.

Affected platforms: 
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 8.1; Windows 7 SP1 
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2; Windows Server 2008 R2 SP1
Workaround: Right-click the URL link to open it in a new window or tab, or enable Protected Mode in Internet Explorer for local intranet and trusted sites
  1. Go to Tools > Internet options > Security.
  2. Within Select a zone to view or change security settings, select Local intranet and then select Enable Protected Mode.
  3. Select Trusted sites and then select Enable Protected Mode.
  4. Select OK.
You must restart the browser after making these changes.

Next steps: Microsoft is working on a resolution and will provide an update in an upcoming release.

Back to top
OS Build 14393.2848

March 12, 2019
KB4489882
Mitigated
Last updated:
April 09, 2019
10:00 AM PT

Opened:
March 12, 2019
10:00 AM PT
Issue using PXE to start a device from WDS
After installing KB4489882, there may be issues using the Preboot Execution Environment (PXE) to start a device from a Windows Deployment Services (WDS) server configured to use Variable Window Extension. This may cause the connection to the WDS server to terminate prematurely while downloading the image. This issue does not affect clients or devices that are not using Variable Window Extension.

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10 Enterprise LTSC 2016; Windows 8.1
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server 2016; Windows Server 2012 R2
Workaround: To mitigate the issue, disable the Variable Window Extension on WDS server using one of the following options:
Option 1:
Open an Administrator Command prompt and type the following:
Wdsutil /Set-TransportServer /EnableTftpVariableWindowExtension:No
+      
Issue using PXE to start a device from WDS
After installing KB4489882, there may be issues using the Preboot Execution Environment (PXE) to start a device from a Windows Deployment Services (WDS) server configured to use Variable Window Extension. This may cause the connection to the WDS server to terminate prematurely while downloading the image. This issue does not affect clients or devices that are not using Variable Window Extension.

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10 Enterprise LTSC 2016; Windows 8.1
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server 2016; Windows Server 2012 R2; Windows Server 2012
Workaround: To mitigate the issue, disable the Variable Window Extension on WDS server using one of the following options:
Option 1:
Open an Administrator Command prompt and type the following:
Wdsutil /Set-TransportServer /EnableTftpVariableWindowExtension:No
 
Option 2:
Use the Windows Deployment Services UI to make the following adjustment:
  1. Open Windows Deployment Services from Windows Administrative Tools.
  2. Expand Servers and right-click a WDS server.
  3. Open its properties and clear the Enable Variable Window Extension box on the TFTP tab.
Option 3:
Set the following registry value to 0:
HKLM\\System\\CurrentControlSet\\Services\\WDSServer\\Providers\\WDSTFTP\\EnableVariableWindowExtension
Restart the WDSServer service after disabling the Variable Window Extension.

Next steps: Microsoft is working on a resolution and will provide an update in an upcoming release.

Back to top
OS Build 14393.2848

March 12, 2019
KB4489882
Mitigated
Last updated:
April 09, 2019
10:00 AM PT

Opened:
March 12, 2019
10:00 AM PT
End-user-defined characters (EUDC) cause blue screen at startup
If you enable per font end-user-defined characters (EUDC), the system will stop working and a blue screen may appear at startup. This is not a common setting in non-Asian regions.

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016
Resolution: This issue was resolved in KB4493470.

Back to top
OS Build 14393.2879

March 19, 2019
KB4489889
Resolved
KB4493470
Resolved:
April 09, 2019
10:00 AM PT

Opened:
March 19, 2019
10:00 AM PT
@@ -105,7 +105,7 @@ sections: - type: markdown text: " - +
DetailsOriginating updateStatusHistory
Internet Explorer 11 authentication issue with multiple concurrent logons
After installing KB4480961, Internet Explorer 11 and other applications that use WININET.DLL may have authentication issues. This occurs when two or more people use the same user account for multiple, concurrent login sessions on the same Windows Server machine, including Remote Desktop Protocol (RDP) and Terminal Server logons. Symptoms reported by customers include, but may not be limited to:
  • Cache size and location show zero or empty.
  • Keyboard shortcuts may not work properly.
  • Webpages may intermittently fail to load or render correctly.
  • Issues with credential prompts.
  • Issues when downloading files.
Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10 Enterprise LTSC 2016; Windows 8.1; Windows 7, Service Pack 1
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server 2016; Windows Server 2012 R2; Windows Server 2008 R2 SP1
Resolution: This issue was resolved in KB4493470.

Back to top
OS Build 14393.2724

January 08, 2019
KB4480961
Resolved
KB4493470
Resolved:
April 09, 2019
10:00 AM PT

Opened:
January 08, 2019
10:00 AM PT
Internet Explorer 11 authentication issue with multiple concurrent logons
After installing KB4480961, Internet Explorer 11 and other applications that use WININET.DLL may have authentication issues. This occurs when two or more people use the same user account for multiple, concurrent login sessions on the same Windows Server machine, including Remote Desktop Protocol (RDP) and Terminal Server logons. Symptoms reported by customers include, but may not be limited to:
  • Cache size and location show zero or empty.
  • Keyboard shortcuts may not work properly.
  • Webpages may intermittently fail to load or render correctly.
  • Issues with credential prompts.
  • Issues when downloading files.
Affected platforms: 
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10 Enterprise LTSC 2016; Windows 8.1; Windows 7 SP1
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server 2016; Windows Server 2012 R2; Windows Server 2012; Windows Server 2008 R2 SP1
Resolution: This issue was resolved in KB4493470.

Back to top
OS Build 14393.2724

January 08, 2019
KB4480961
Resolved
KB4493470
Resolved:
April 09, 2019
10:00 AM PT

Opened:
January 08, 2019
10:00 AM PT
MSXML6 may cause applications to stop responding
After installing KB4480961, MSXML6 causes applications to stop responding if an exception was thrown during node operations, such as appendChild(), insertBefore(), and moveNode().

The Group Policy editor may stop responding when editing a Group Policy Object (GPO) that contains Group Policy Preferences (GPP) for Internet Explorer 10 settings.

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 8.1
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2; Windows Server 2012
Resolution: This issue was resolved in KB4493470.

Back to top
OS Build 14393.2724

January 08, 2019
KB4480961
Resolved
KB4493470
Resolved:
April 09, 2019
10:00 AM PT

Opened:
January 08, 2019
10:00 AM PT
" diff --git a/windows/release-information/status-windows-10-1703.yml b/windows/release-information/status-windows-10-1703.yml index 2e504fecf3..9e33ec0f4d 100644 --- a/windows/release-information/status-windows-10-1703.yml +++ b/windows/release-information/status-windows-10-1703.yml @@ -79,7 +79,7 @@ sections: - type: markdown text: " - +
DetailsOriginating updateStatusHistory
Certain operations performed on a Cluster Shared Volume may fail
Certain operations, such as rename, that you perform on files or folders that are on a Cluster Shared Volume (CSV) may fail with the error, “STATUS_BAD_IMPERSONATION_LEVEL (0xC00000A5)”. This occurs when you perform the operation on a CSV owner node from a process that doesn’t have administrator privilege. 

Affected platforms:
  • Client: Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 8.1
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2; Windows Server 2012
Workaround: Do one of the following: 
 
  • Perform the operation from a process that has administrator privilege. 
  • Perform the operation from a node that doesn’t have CSV ownership. 
Next steps: Microsoft is working on a resolution and will provide an update in an upcoming release.

Resolution:

Back to top
OS Build 15063.1746

April 09, 2019
KB4493474
Mitigated
Last updated:
April 26, 2019
10:49 AM PT

Opened:
April 26, 2019
10:49 AM PT
Certain operations performed on a Cluster Shared Volume may fail
Certain operations, such as rename, that you perform on files or folders that are on a Cluster Shared Volume (CSV) may fail with the error, “STATUS_BAD_IMPERSONATION_LEVEL (0xC00000A5)”. This occurs when you perform the operation on a CSV owner node from a process that doesn’t have administrator privilege. 

Affected platforms: 
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 8.1
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2; Windows Server 2012
Workaround: Do one of the following: 
  • Perform the operation from a process that has administrator privilege. 
  • Perform the operation from a node that doesn’t have CSV ownership. 
Next steps: Microsoft is working on a resolution and will provide an update in an upcoming release.

Back to top
OS Build 15063.1746

April 09, 2019
KB4493474
Mitigated
Last updated:
April 26, 2019
10:49 AM PT

Opened:
April 26, 2019
10:49 AM PT
" diff --git a/windows/release-information/status-windows-10-1709.yml b/windows/release-information/status-windows-10-1709.yml index f244b9bb3d..24c835a3d9 100644 --- a/windows/release-information/status-windows-10-1709.yml +++ b/windows/release-information/status-windows-10-1709.yml @@ -80,7 +80,7 @@ sections: - type: markdown text: " - +
DetailsOriginating updateStatusHistory
Certain operations performed on a Cluster Shared Volume may fail
Certain operations, such as rename, that you perform on files or folders that are on a Cluster Shared Volume (CSV) may fail with the error, \"STATUS_BAD_IMPERSONATION_LEVEL (0xC00000A5)\". This occurs when you perform the operation on a CSV owner node from a process that doesn’t have administrator privilege. 

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 8.1
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2; Windows Server 2012
Workaround: Do one of the following: 

  • Perform the operation from a process that has administrator privilege. 
  • Perform the operation from a node that doesn’t have CSV ownership. 
Next steps: Microsoft is working on a resolution and will provide an update in an upcoming release.

Back to top
OS Build 16299.1087

April 09, 2019
KB4493441
Mitigated
Last updated:
April 26, 2019
10:49 AM PT

Opened:
April 26, 2019
10:49 AM PT
Certain operations performed on a Cluster Shared Volume may fail
Certain operations, such as rename, that you perform on files or folders that are on a Cluster Shared Volume (CSV) may fail with the error, \"STATUS_BAD_IMPERSONATION_LEVEL (0xC00000A5)\". This occurs when you perform the operation on a CSV owner node from a process that doesn’t have administrator privilege. 

Affected platforms: 
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 8.1
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2; Windows Server 2012
Workaround: Do one of the following:
  • Perform the operation from a process that has administrator privilege. 
  • Perform the operation from a node that doesn’t have CSV ownership. 
Next steps: Microsoft is working on a resolution and will provide an update in an upcoming release.

Back to top
OS Build 16299.1087

April 09, 2019
KB4493441
Mitigated
Last updated:
April 26, 2019
10:49 AM PT

Opened:
April 26, 2019
10:49 AM PT
" diff --git a/windows/release-information/status-windows-10-1803.yml b/windows/release-information/status-windows-10-1803.yml index d72a1889c6..7d0efcb279 100644 --- a/windows/release-information/status-windows-10-1803.yml +++ b/windows/release-information/status-windows-10-1803.yml @@ -81,7 +81,7 @@ sections: - type: markdown text: " - +
DetailsOriginating updateStatusHistory
Certain operations performed on a Cluster Shared Volume may fail
Certain operations, such as rename, that you perform on files or folders that are on a Cluster Shared Volume (CSV) may fail with the error, \"STATUS_BAD_IMPERSONATION_LEVEL (0xC00000A5)\". This occurs when you perform the operation on a CSV owner node from a process that doesn’t have administrator privilege.

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 8.1
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2; Windows Server 2012
Workaround: Do one of the following: 

  • Perform the operation from a process that has administrator privilege. 
  • Perform the operation from a node that doesn’t have CSV ownership. 
Next steps: Microsoft is working on a resolution and will provide an update in an upcoming release.

Back to top
OS Build 17134.706

April 09, 2019
KB4493464
Mitigated
Last updated:
April 26, 2019
10:49 AM PT

Opened:
April 26, 2019
10:49 AM PT
Certain operations performed on a Cluster Shared Volume may fail
Certain operations, such as rename, that you perform on files or folders that are on a Cluster Shared Volume (CSV) may fail with the error, \"STATUS_BAD_IMPERSONATION_LEVEL (0xC00000A5)\". This occurs when you perform the operation on a CSV owner node from a process that doesn’t have administrator privilege.

Affected platforms: 
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 8.1
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2; Windows Server 2012
Workaround: Do one of the following:
  • Perform the operation from a process that has administrator privilege. 
  • Perform the operation from a node that doesn’t have CSV ownership. 
Next steps: Microsoft is working on a resolution and will provide an update in an upcoming release.

Back to top
OS Build 17134.706

April 09, 2019
KB4493464
Mitigated
Last updated:
April 26, 2019
10:49 AM PT

Opened:
April 26, 2019
10:49 AM PT
" @@ -91,7 +91,7 @@ sections: text: " - diff --git a/windows/release-information/status-windows-10-1809-and-windows-server-2019.yml b/windows/release-information/status-windows-10-1809-and-windows-server-2019.yml index bc3291a8a0..377593f13c 100644 --- a/windows/release-information/status-windows-10-1809-and-windows-server-2019.yml +++ b/windows/release-information/status-windows-10-1809-and-windows-server-2019.yml @@ -89,8 +89,8 @@ sections: - type: markdown text: "
DetailsOriginating updateStatusHistory
Custom URI schemes may not start corresponding application
After installing KB4489868, custom URI schemes for application protocol handlers may not start the corresponding application for local intranet and trusted sites security zones on Internet Explorer. 

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 8.1; Windows 7 SP1 
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2; Windows Server 2008 R2 SP1
Workaround: Right-click the URL link to open it in a new window or tab, or enable Protected Mode in Internet Explorer for local intranet and trusted sites
  1. Go to Tools > Internet options > Security 
  2. Within Select a zone to view or change security settings, select Local intranet and then select Enable Protected Mode.
  3. Select Trusted sites and then select Enable Protected Mode
  4. Select OK
 You must restart the browser after making these changes. 
 
Next steps: Microsoft is working on a resolution and will provide an update in an upcoming release. 

Back to top
OS Build 17134.648

March 12, 2019
KB4489868
Mitigated
Last updated:
April 09, 2019
10:00 AM PT

Opened:
March 12, 2019
10:00 AM PT
Issue using PXE to start a device from WDS
After installing KB4489868, there may be issues using the Preboot Execution Environment (PXE) to start a device from a Windows Deployment Services (WDS) server configured to use Variable Window Extension. This may cause the connection to the WDS server to terminate prematurely while downloading the image. This issue does not affect clients or devices that are not using Variable Window Extension. 

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10 Enterprise LTSC 2016; Windows 8.1
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server 2016; Windows Server 2012 R2
Workaround: To mitigate the issue, disable the Variable Window Extension on WDS server using one of the following options:
Option 1: 
Open an Administrator Command prompt and type the following:  
Wdsutil /Set-TransportServer /EnableTftpVariableWindowExtension:No
+      
Issue using PXE to start a device from WDS
After installing KB4489868, there may be issues using the Preboot Execution Environment (PXE) to start a device from a Windows Deployment Services (WDS) server configured to use Variable Window Extension. This may cause the connection to the WDS server to terminate prematurely while downloading the image. This issue does not affect clients or devices that are not using Variable Window Extension. 

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10 Enterprise LTSC 2016; Windows 8.1
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server 2016; Windows Server 2012 R2; Windows Server 2012
Workaround: To mitigate the issue, disable the Variable Window Extension on WDS server using one of the following options:
Option 1: 
Open an Administrator Command prompt and type the following:  
Wdsutil /Set-TransportServer /EnableTftpVariableWindowExtension:No
 
 Option 2: 
Use the Windows Deployment Services UI to make the following adjustment:  
  1. Open Windows Deployment Services from Windows Administrative Tools. 
  2. Expand Servers and right-click a WDS server. 
  3. Open its properties and clear the?Enable Variable Window Extension?box on the TFTP tab.  
Option 3: 
Set the following registry value to 0:  
HKLM\\System\\CurrentControlSet\\Services\\WDSServer\\Providers\\WDSTFTP\\EnableVariableWindowExtension  
Restart the WDSServer service after disabling the Variable Window Extension. 
 
Next steps: Microsoft is working on a resolution and will provide an update in an upcoming release. 

Back to top
OS Build 17134.648

March 12, 2019
KB4489868
Mitigated
Last updated:
April 09, 2019
10:00 AM PT

Opened:
March 12, 2019
10:00 AM PT
End-user-defined characters (EUDC) may cause blue screen at startup
If you enable per font end-user-defined characters (EUDC), the system may stop working and a blue screen may appear at startup. This is not a common setting in non-Asian regions. 

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016
Resolution: This issue was resolved in KB4493464

Back to top
OS Build 17134.677

March 19, 2019
KB4489894
Resolved
KB4493464
Resolved:
April 09, 2019
10:00 AM PT

Opened:
March 19, 2019
10:00 AM PT
Stop error when attempting to start SSH from WSL
After applying KB4489868, a stop error occurs when attempting to start the Secure Shell (SSH) client program from Windows Subsystem for Linux (WSL) with agent forwarding enabled using a command line switch (ssh -A) or a configuration setting.

Affected platforms:
  • Client: Windows 10, version 1803; Windows 10, version 1709
  • Server: Windows Server, version 1803; Windows Server, version 1709
Resolution: This issue was resolved in KB4493464.

Back to top
OS Build 17134.648

March 12, 2019
KB4489868
Resolved
KB4493464
Resolved:
April 09, 2019
10:00 AM PT

Opened:
March 12, 2019
10:00 AM PT
- - + +
DetailsOriginating updateStatusHistory
System may be unresponsive after restart if ArcaBit antivirus software installed
Microsoft and ArcaBit have identified an issue on devices with ArcaBit antivirus software installed that may cause the system to become unresponsive upon restart after installing KB4493509
 
Microsoft has temporarily blocked devices from receiving this update if ArcaBit antivirus software is installed. 

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 8.1; Windows 7, SP 1
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server 2012 R2; Windows Server 2008 R2 SP1
ArcaBit has released an update to address this issue. For more information, see the Arcabit support article.

Back to top
OS Build 17763.437

April 09, 2019
KB4493509
Mitigated
Last updated:
April 26, 2019
10:50 AM PT

Opened:
April 26, 2019
10:50 AM PT
Certain operations performed on a Cluster Shared Volume may fail
Certain operations, such as rename, that you perform on files or folders that are on a Cluster Shared Volume (CSV) may fail with the error, \"STATUS_BAD_IMPERSONATION_LEVEL (0xC00000A5)\". This occurs when you perform the operation on a CSV owner node from a process that doesn’t have administrator privilege. 

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 8.1
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2; Windows Server 2012
Workaround: Do one of the following: 
 
  • Perform the operation from a process that has administrator privilege. 
  • Perform the operation from a node that doesn’t have CSV ownership. 
Next steps: Microsoft is working on a resolution and will provide an update in an upcoming release.

Back to top
OS Build 17763.437

April 09, 2019
KB4493509
Mitigated
Last updated:
April 26, 2019
10:50 AM PT

Opened:
April 26, 2019
10:50 AM PT
System may be unresponsive after restart if ArcaBit antivirus software installed
Microsoft and ArcaBit have identified an issue on devices with ArcaBit antivirus software installed that may cause the system to become unresponsive upon restart after installing KB4493509
 
Microsoft has temporarily blocked devices from receiving this update if ArcaBit antivirus software is installed. 

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 8.1; Windows 7 SP1
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server 2012 R2; Windows Server 2008 R2 SP1
ArcaBit has released an update to address this issue. For more information, see the Arcabit support article.

Back to top
OS Build 17763.437

April 09, 2019
KB4493509
Mitigated
Last updated:
April 26, 2019
10:50 AM PT

Opened:
April 26, 2019
10:50 AM PT
Certain operations performed on a Cluster Shared Volume may fail
Certain operations, such as rename, that you perform on files or folders that are on a Cluster Shared Volume (CSV) may fail with the error, \"STATUS_BAD_IMPERSONATION_LEVEL (0xC00000A5)\". This occurs when you perform the operation on a CSV owner node from a process that doesn’t have administrator privilege. 

Affected platforms: 
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 8.1
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2; Windows Server 2012
Workaround: Do one of the following:  
  • Perform the operation from a process that has administrator privilege. 
  • Perform the operation from a node that doesn’t have CSV ownership. 
Next steps: Microsoft is working on a resolution and will provide an update in an upcoming release.

Back to top
OS Build 17763.437

April 09, 2019
KB4493509
Mitigated
Last updated:
April 26, 2019
10:50 AM PT

Opened:
April 26, 2019
10:50 AM PT
End-user-defined characters (EUDC) may cause blue screen at startup
If you enable per font end-user-defined characters (EUDC), the system will stop working and a blue screen may appear at startup. This is not a common setting in non-Asian regions.

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016
Workaround: To avoid this issue, don't enable per font EUDC. As an alternative, you can edit the registry to mitigate this issue; for more information, see KB4496149.

Resolved: This issue was resolved in KB4493509.

Back to top
OS Build 17763.404

April 02, 2019
KB4490481
Resolved
KB4493509
Resolved:
April 09, 2019
10:00 AM PT

Opened:
April 02, 2019
10:00 AM PT
" @@ -101,7 +101,7 @@ sections: text: " -
DetailsOriginating updateStatusHistory
Custom URI schemes may not start corresponding application
After installing KB4489899, custom URI schemes for application protocol handlers may not start the corresponding application for local intranet and trusted sites security zones on Internet Explorer.

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 8.1; Windows 7 SP1 
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2; Windows Server 2008 R2 SP1
Workaround: Right-click the URL link to open it in a new window or tab, or enable Protected Mode in Internet Explorer for local intranet and trusted sites
  1. Go to Tools > Internet options > Security.
  2. Within Select a zone to view of change security settings, select Local intranet and then select Enable Protected Mode.
  3. Select Trusted Sites and then select Enable Protected Mode
  4. Select OK.
You must restart the browser after making these changes. 
 
Next steps: Microsoft is working on a resolution and will provide an update in an upcoming release. 

Back to top
OS Build 17763.379

March 12, 2019
KB4489899
Mitigated
Last updated:
April 09, 2019
10:00 AM PT

Opened:
March 12, 2019
10:00 AM PT
Issue using PXE to start a device from WDS
After installing KB4489899, there may be issues using the Preboot Execution Environment (PXE) to start a device from a Windows Deployment Services (WDS) server configured to use Variable Window Extension. This may cause the connection to the WDS server to terminate prematurely while downloading the image. This issue does not affect clients or devices that are not using Variable Window Extension. 

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10 Enterprise LTSC 2016; Windows 8.1
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server 2016; Windows Server 2012 R2
Workaround: To mitigate the issue, disable the Variable Window Extension on WDS server using one of the following options:
Option 1:
Open an Administrator Command prompt and type the following:
Wdsutil /Set-TransportServer /EnableTftpVariableWindowExtension:No 
+      
Issue using PXE to start a device from WDS
After installing KB4489899, there may be issues using the Preboot Execution Environment (PXE) to start a device from a Windows Deployment Services (WDS) server configured to use Variable Window Extension. This may cause the connection to the WDS server to terminate prematurely while downloading the image. This issue does not affect clients or devices that are not using Variable Window Extension. 

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10 Enterprise LTSC 2016; Windows 8.1
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server 2016; Windows Server 2012 R2; Windows Server 2012
Workaround: To mitigate the issue, disable the Variable Window Extension on WDS server using one of the following options:
Option 1:
Open an Administrator Command prompt and type the following:
Wdsutil /Set-TransportServer /EnableTftpVariableWindowExtension:No 
 
Option 2:
Use the Windows Deployment Services UI to make the following adjustment: 
  1. Open Windows Deployment Services from Windows Administrative Tools. 
  2. Expand Servers and right-click a WDS server. 
  3. Open its properties and clear the Enable Variable Window Extension box on the TFTP tab.
Option 3:
Set the following registry value to 0:  
HKLM\\System\\CurrentControlSet\\Services\\WDSServer\\Providers\\WDSTFTP\\EnableVariableWindowExtension  
Restart the WDSServer service after disabling the Variable Window Extension. 

Next steps: Microsoft is working on a resolution and will provide an update in an upcoming release. 

Back to top
OS Build 17763.379

March 12, 2019
KB4489899
Mitigated
Last updated:
April 09, 2019
10:00 AM PT

Opened:
March 12, 2019
10:00 AM PT
Apps may stop working after selecting an audio output device other than the default
After installing KB4482887 on machines that have multiple audio devices, applications that provide advanced options for internal or external audio output devices may stop working unexpectedly. This issue occurs for users that select an audio output device different from the \"Default Audio Device\". Examples of applications that may stop working include: 
  • Windows Media Player 
  • Realtek HD Audio Manager 
  • Sound Blaster Control Panel 
Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019
  • Server: Windows Server, version 1809; Windows Server 2019
Workaround: As a temporary solution, select the \"Default Audio Device\" in the options provided by the application; please refer to the application's user manual for details. 
For example, to set the Default Audio Device in Windows Media Player: 
  1. Open Windows Media Player > Tools > Options > Devices.
  2. Select the device and choose Properties.
  3. On the next dialog, from the drop-down menu under Select the Audio Device, choose Default Audio Device from the list. 
You can then send audio from the application to the audio device you want in the per-application audio settings found under Settings > System > Sound > App Volume and device preferences.

Resolved: This issue was resolved in KB4490481

Back to top
OS Build 17763.348

March 01, 2019
KB4482887
Resolved
KB4490481
Resolved:
April 02, 2019
10:00 AM PT

Opened:
March 01, 2019
10:00 AM PT
@@ -112,7 +112,7 @@ sections: - type: markdown text: " - +
DetailsOriginating updateStatusHistory
Internet Explorer 11 authentication issue with multiple concurrent logons
After installing the February 12, 2019 update (KB4487044), Internet Explorer 11 and other applications that use WININET.DLL may have authentication issues. This occurs when two or more people use the same user account for multiple, concurrent login sessions on the same Windows Server machine, including Remote Desktop Protocol (RDP) and Terminal Server logons. Symptoms reported by customers include, but may not be limited to:  
  • Cache size and location show zero or empty. 
  • Keyboard shortcuts may not work properly. 
  • Webpages may intermittently fail to load or render correctly. 
  • Issues with credential prompts. 
  • Issues when downloading files. 
Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10 Enterprise LTSC 2016; Windows 8.1; Windows 7, Service Pack 1
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server 2016; Windows Server 2012 R2; Windows Server 2008 R2 SP1
Resolved: This issue was resolved in KB4493509

Back to top
OS Build 17763.253

January 08, 2019
KB4480116
Resolved
KB4493509
Resolved:
April 09, 2019
10:00 AM PT

Opened:
January 08, 2019
10:00 AM PT
Internet Explorer 11 authentication issue with multiple concurrent logons
After installing the February 12, 2019 update (KB4487044), Internet Explorer 11 and other applications that use WININET.DLL may have authentication issues. This occurs when two or more people use the same user account for multiple, concurrent login sessions on the same Windows Server machine, including Remote Desktop Protocol (RDP) and Terminal Server logons. Symptoms reported by customers include, but may not be limited to:  
  • Cache size and location show zero or empty. 
  • Keyboard shortcuts may not work properly. 
  • Webpages may intermittently fail to load or render correctly. 
  • Issues with credential prompts. 
  • Issues when downloading files. 
Affected platforms: 
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10 Enterprise LTSC 2016; Windows 8.1; Windows 7 SP1
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server 2016; Windows Server 2012 R2; Windows Server 2012; Windows Server 2008 R2 SP1
Resolved: This issue was resolved in KB4493509

Back to top
OS Build 17763.253

January 08, 2019
KB4480116
Resolved
KB4493509
Resolved:
April 09, 2019
10:00 AM PT

Opened:
January 08, 2019
10:00 AM PT
MSXML6 may cause applications to stop responding
After installing KB4480116, MSXML6 causes applications to stop responding if an exception was thrown during node operations, such as appendChild(), insertBefore(), and moveNode().
 
The Group Policy editor may stop responding when editing a Group Policy Object (GPO) that contains Group Policy Preferences (GPP) for Internet Explorer 10 settings. 

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 8.1
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2; Windows Server 2012
Resolved: This issue was resolved in KB4493509

Back to top
OS Build 17763.253

January 08, 2019
KB4480116
Resolved
KB4493509
Resolved:
April 09, 2019
10:00 AM PT

Opened:
January 08, 2019
10:00 AM PT
" diff --git a/windows/release-information/status-windows-7-and-windows-server-2008-r2-sp1.yml b/windows/release-information/status-windows-7-and-windows-server-2008-r2-sp1.yml index 1242deee30..64842126b7 100644 --- a/windows/release-information/status-windows-7-and-windows-server-2008-r2-sp1.yml +++ b/windows/release-information/status-windows-7-and-windows-server-2008-r2-sp1.yml @@ -86,11 +86,11 @@ sections: - type: markdown text: " - - - - - + + + + +
DetailsOriginating updateStatusHistory
System may be unresponsive after restart if Avira antivirus software installed.
Microsoft and Avira have identified an issue on devices with Avira antivirus software installed that may cause the system to become unresponsive upon restart after installing KB4493472.

Microsoft has temporarily blocked devices from receiving this update if Avira antivirus software is installed.

Next steps: We are presently investigating this issue with Avira and will provide an update when available.

Back to top
April 09, 2019
KB4493472
Investigating
Last updated:
April 09, 2019
10:00 AM PT

Opened:
April 09, 2019
10:00 AM PT
System may be unresponsive after restart with certain McAfee antivirus products
Microsoft and McAfee have identified an issue on devices with McAfee Endpoint Security (ENS) Threat Prevention 10.x or McAfee Host Intrusion Prevention (Host IPS) 8.0 or McAfee VirusScan Enterprise (VSE) 8.8 installed. It may cause the system to have slow startup or become unresponsive at restart after installing this update. 

Affected platforms:
  • Client: Windows 7, SP 1
  • Server: Windows Server 2008 R2 SP1
Workaround: Guidance for McAfee customers can be found in the following McAfee support articles: 

Next steps: We are presently investigating this issue with McAfee. We will provide an update once we have more information.

Back to top
April 09, 2019
KB4493472
Mitigated
Last updated:
April 26, 2019
11:41 AM PT

Opened:
April 26, 2019
11:41 AM PT
System unresponsive after restart if Sophos Endpoint Protection installed.
Microsoft and Sophos have identified an issue on devices with Sophos Endpoint Protection installed and managed by either Sophos Central or Sophos Enterprise Console (SEC) that may cause the system to become unresponsive upon restart after installing KB4493472.

Microsoft has temporarily blocked devices from receiving this update if the Sophos Endpoint is installed until a solution is available.

Guidance for Sophos Endpoint and Sophos Enterprise Console customers can be found in the Sophos support article.

Back to top
April 09, 2019
KB4493472
Mitigated
Last updated:
April 09, 2019
10:00 AM PT

Opened:
April 09, 2019
10:00 AM PT
System may be unresponsive after restart if ArcaBit antivirus software installed.
Microsoft and ArcaBit have identified an issue on devices with ArcaBit antivirus software installed that may cause the system to become unresponsive upon restart after installing KB4493472.

Microsoft has temporarily blocked devices from receiving this update if ArcaBit antivirus software is installed.

ArcaBit has released an update to address this issue. For more information, see the Arcabit support article.

Back to top
April 09, 2019
KB4493472
Mitigated
Last updated:
April 09, 2019
10:00 AM PT

Opened:
April 09, 2019
10:00 AM PT
Devices may not respond at login or Welcome screen if running certain Avast software.
Microsoft and Avast have identified an issue on devices running Avast for Business, Avast CloudCare, and AVG Business Edition antivirus software after you install KB4493472 and restart. Devices may become unresponsive at the login or Welcome screen. Additionally, you may be unable to log in or log in after an extended period of time.

Affected platforms: 
  • Client: Windows 8.1; Windows 7, Service Pack 1 
  • Server: Windows Server 2012 R2; Windows Server 2008 R2 SP1 
Resolution: Avast has released emergency updates to address this issue. For more information and AV update schedule, see the Avast support KB article.

Back to top
April 09, 2019
KB4493472
Resolved
Resolved:
April 09, 2019
10:00 AM PT

Opened:
April 09, 2019
10:00 AM PT
System may be unresponsive after restart if Avira antivirus software installed.
Microsoft and Avira have identified an issue on devices with Avira antivirus software installed that may cause the system to become unresponsive upon restart after installing KB4493472.

Microsoft has temporarily blocked devices from receiving this update if Avira antivirus software is installed.

Affected platforms: 
  • Client: Windows 8.1; Windows 7 SP1 
  • Server: Windows Server 2012 R2; Windows Server 2012; Windows Server 2008 R2 SP1; Windows Server 2008 SP2
Next steps: We are presently investigating this issue with Avira and will provide an update when available.

Back to top
April 09, 2019
KB4493472
Investigating
Last updated:
April 09, 2019
10:00 AM PT

Opened:
April 09, 2019
10:00 AM PT
System may be unresponsive after restart with certain McAfee antivirus products
Microsoft and McAfee have identified an issue on devices with McAfee Endpoint Security (ENS) Threat Prevention 10.x or McAfee Host Intrusion Prevention (Host IPS) 8.0 or McAfee VirusScan Enterprise (VSE) 8.8 installed. It may cause the system to have slow startup or become unresponsive at restart after installing this update. 

Affected platforms:
  • Client: Windows 7 SP 1
  • Server: Windows Server 2008 R2 SP1
Workaround: Guidance for McAfee customers can be found in the following McAfee support articles: 

Next steps: We are presently investigating this issue with McAfee. We will provide an update once we have more information.

Back to top
April 09, 2019
KB4493472
Mitigated
Last updated:
April 26, 2019
11:41 AM PT

Opened:
April 26, 2019
11:41 AM PT
System unresponsive after restart if Sophos Endpoint Protection installed.
Microsoft and Sophos have identified an issue on devices with Sophos Endpoint Protection installed and managed by either Sophos Central or Sophos Enterprise Console (SEC) that may cause the system to become unresponsive upon restart after installing KB4493472.

Microsoft has temporarily blocked devices from receiving this update if the Sophos Endpoint is installed until a solution is available.

Affected platforms: 
  • Client: Windows 8.1; Windows 7 SP1
  • Server: Windows Server 2012 R2; Windows Server 2012; Windows Server 2008 R2 SP1; Windows Server 2008 SP2
Guidance for Sophos Endpoint and Sophos Enterprise Console customers can be found in the Sophos support article.

Back to top
April 09, 2019
KB4493472
Mitigated
Last updated:
April 09, 2019
10:00 AM PT

Opened:
April 09, 2019
10:00 AM PT
System may be unresponsive after restart if ArcaBit antivirus software installed.
Microsoft and ArcaBit have identified an issue on devices with ArcaBit antivirus software installed that may cause the system to become unresponsive upon restart after installing KB4493472.

Microsoft has temporarily blocked devices from receiving this update if ArcaBit antivirus software is installed.

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 8.1; Windows 7 SP1
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server 2012 R2; Windows Server 2008 R2 SP1
ArcaBit has released an update to address this issue. For more information, see the Arcabit support article.

Back to top
April 09, 2019
KB4493472
Mitigated
Last updated:
April 09, 2019
10:00 AM PT

Opened:
April 09, 2019
10:00 AM PT
Devices may not respond at login or Welcome screen if running certain Avast software.
Microsoft and Avast have identified an issue on devices running Avast for Business, Avast CloudCare, and AVG Business Edition antivirus software after you install KB4493472 and restart. Devices may become unresponsive at the login or Welcome screen. Additionally, you may be unable to log in or log in after an extended period of time.

Affected platforms: 
  • Client: Windows 8.1; Windows 7 SP1 
  • Server: Windows Server 2012 R2; Windows Server 2008 R2 SP1 
Resolution: Avast has released emergency updates to address this issue. For more information and AV update schedule, see the Avast support KB article.

Back to top
April 09, 2019
KB4493472
Resolved
Resolved:
April 09, 2019
10:00 AM PT

Opened:
April 09, 2019
10:00 AM PT
" @@ -99,9 +99,9 @@ sections: - type: markdown text: " - + - +
DetailsOriginating updateStatusHistory
Authentication may fail for services after the Kerberos ticket expires.
After installing KB4489878, some customers report that authentication fails for services that require unconstrained delegation after the Kerberos ticket expires (the default is 10 hours). For example, the SQL server service fails.

Workaround: To mitigate this issue, use one of the following options:

  • Option 1: Purge the Kerberos tickets on the application server. After the Kerberos ticket expires, the issue will occur again, and you must purge the tickets again.
  • Option 2: If purging does not mitigate the issue, restart the application; for example, restart the Internet Information Services (IIS) app pool associated with the SQL server.
  • Option 3: Use constrained delegation.
Next steps: Microsoft is working on a resolution and will provide an update in an upcoming release.

Back to top
March 12, 2019
KB4489878
Mitigated
Last updated:
April 09, 2019
10:00 AM PT

Opened:
March 12, 2019
10:00 AM PT
Authentication may fail for services after the Kerberos ticket expires.
After installing KB4489878, some customers report that authentication fails for services that require unconstrained delegation after the Kerberos ticket expires (the default is 10 hours). For example, the SQL server service fails.

Affected platforms: 
  • Client: Windows 7 SP1
  • Server: Windows Server 2008 R2 SP1; Windows Server 2008 SP2
Workaround: To mitigate this issue, use one of the following options:

  • Option 1: Purge the Kerberos tickets on the application server. After the Kerberos ticket expires, the issue will occur again, and you must purge the tickets again.
  • Option 2: If purging does not mitigate the issue, restart the application; for example, restart the Internet Information Services (IIS) app pool associated with the SQL server.
  • Option 3: Use constrained delegation.
Next steps: Microsoft is working on a resolution and will provide an update in an upcoming release.

Back to top
March 12, 2019
KB4489878
Mitigated
Last updated:
April 09, 2019
10:00 AM PT

Opened:
March 12, 2019
10:00 AM PT
Custom URI schemes may not start corresponding application.
After installing KB4489878, custom URI schemes for application protocol handlers may not start the corresponding application for local intranet and trusted sites on Internet Explorer.

Affected platforms: 
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 8.1; Windows 7 SP1 
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2; Windows Server 2008 R2 SP1 
Resolution: This issue is resolved in KB4493472.

Back to top
March 12, 2019
KB4489878
Resolved
KB4493472
Resolved:
April 09, 2019
10:00 AM PT

Opened:
March 12, 2019
10:00 AM PT
NETDOM.EXE fails to run.
After installing KB4489878, NETDOM.EXE fails to run, and the on-screen error, “The command failed to complete successfully.” appears.

Affected platforms: 
  • Client: Windows 7, Service Pack 1 
  • Server: Windows Server 2008 R2 SP1 
Resolution: This issue is resolved in KB4493472.

Back to top
March 12, 2019
KB4489878
Resolved
KB4493472
Resolved:
April 09, 2019
10:00 AM PT

Opened:
March 12, 2019
10:00 AM PT
NETDOM.EXE fails to run.
After installing KB4489878, NETDOM.EXE fails to run, and the on-screen error, “The command failed to complete successfully.” appears.

Affected platforms: 
  • Client: Windows 7 SP1
  • Server: Windows Server 2008 R2 SP1; Windows Server 2008 SP2
Resolution: This issue is resolved in KB4493472.

Back to top
March 12, 2019
KB4489878
Resolved
KB4493472
Resolved:
April 09, 2019
10:00 AM PT

Opened:
March 12, 2019
10:00 AM PT
" @@ -110,8 +110,8 @@ sections: - type: markdown text: " - - - + + +
DetailsOriginating updateStatusHistory
Virtual machines fail to restore.
After installing KB4480970, virtual machines (VM) may fail to restore successfully if the VM has been saved and restored once before. The error message is, “Failed to restore the virtual machine state: Cannot restore this virtual machine because the saved state data cannot be read. Delete the saved state data and then try to start the virtual machine. (0xC0370027).”

This affects AMD Bulldozer Family 15h, AMD Jaguar Family 16h, and AMD Puma Family 16h (second generation) microarchitectures.

Affected platforms: 
  • Client: Windows 7, Service Pack 1 
  • Server: Windows Server 2008 R2 SP1 
Resolution: This issue is resolved in KB4490511.

Back to top
January 08, 2019
KB4480970
Resolved
KB4490511
Resolved:
February 19, 2019
02:00 PM PT

Opened:
January 08, 2019
10:00 AM PT
Local Administrators unable to remotely access shares.
Local users who are part of the local Administrators group may not be able to remotely access shares on Windows Server 2008 R2 and Windows 7 machines after installing KB4480970. This does not affect domain accounts in the local Administrators group.
 
Affected platforms: 
  • Client: Windows 7, Service Pack 1 
  • Server: Windows Server 2008 R2 SP1 
Resolution: This issue is resolved in KB4487345.

Back to top
January 08, 2019
KB4480970
Resolved
KB4487345
Resolved:
January 11, 2019
02:00 PM PT

Opened:
January 08, 2019
10:00 AM PT
Internet Explorer 11 authentication issue with multiple concurrent logons.
After installing KB4480970, Internet Explorer 11 and other applications that use WININET.DLL may have authentication issues. This occurs when two or more people use the same user account for multiple, concurrent login sessions on the same Windows Server machine, including Remote Desktop Protocol (RDP) and Terminal Server logons. Symptoms reported by customers include, but may not be limited to:
  • Cache size and location show zero or empty.
  • Keyboard shortcuts may not work properly.
  • Webpages may intermittently fail to load or render correctly.
  • Issues with credential prompts.
  • Issues when downloading files.
Affected platforms: 
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10 Enterprise LTSC 2016; Windows 8.1; Windows 7, Service Pack 1 
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server 2016; Windows Server 2012 R2; Windows Server 2008 R2 SP1 
Resolution: This issue is resolved in KB4493472.

Back to top
January 08, 2019
KB4480970
Resolved
KB4493472
Resolved:
April 09, 2019
10:00 AM PT

Opened:
January 08, 2019
10:00 AM PT
Virtual machines fail to restore.
After installing KB4480970, virtual machines (VM) may fail to restore successfully if the VM has been saved and restored once before. The error message is, “Failed to restore the virtual machine state: Cannot restore this virtual machine because the saved state data cannot be read. Delete the saved state data and then try to start the virtual machine. (0xC0370027).”

This affects AMD Bulldozer Family 15h, AMD Jaguar Family 16h, and AMD Puma Family 16h (second generation) microarchitectures.

Affected platforms: 
  • Client: Windows 7 SP1 
  • Server: Windows Server 2012; Windows Server 2008 R2 SP1; Windows Server 2008 SP2
Resolution: This issue is resolved in KB4490511.

Back to top
January 08, 2019
KB4480970
Resolved
KB4490511
Resolved:
February 19, 2019
02:00 PM PT

Opened:
January 08, 2019
10:00 AM PT
Local Administrators unable to remotely access shares.
Local users who are part of the local Administrators group may not be able to remotely access shares on Windows Server 2008 R2 and Windows 7 machines after installing KB4480970. This does not affect domain accounts in the local Administrators group.
 
Affected platforms: 
  • Client: Windows 7 SP1 
  • Server: Windows Server 2008 R2 SP1; Windows Server 2008 SP2 
Resolution: This issue is resolved in KB4487345.

Back to top
January 08, 2019
KB4480970
Resolved
KB4487345
Resolved:
January 11, 2019
02:00 PM PT

Opened:
January 08, 2019
10:00 AM PT
Internet Explorer 11 authentication issue with multiple concurrent logons.
After installing KB4480970, Internet Explorer 11 and other applications that use WININET.DLL may have authentication issues. This occurs when two or more people use the same user account for multiple, concurrent login sessions on the same Windows Server machine, including Remote Desktop Protocol (RDP) and Terminal Server logons. Symptoms reported by customers include, but may not be limited to:
  • Cache size and location show zero or empty.
  • Keyboard shortcuts may not work properly.
  • Webpages may intermittently fail to load or render correctly.
  • Issues with credential prompts.
  • Issues when downloading files.
Affected platforms: 
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10 Enterprise LTSC 2016; Windows 8.1; Windows 7 SP1
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server 2016; Windows Server 2012 R2; Windows Server 2012; Windows Server 2008 R2 SP1
Resolution: This issue is resolved in KB4493472.

Back to top
January 08, 2019
KB4480970
Resolved
KB4493472
Resolved:
April 09, 2019
10:00 AM PT

Opened:
January 08, 2019
10:00 AM PT
" diff --git a/windows/release-information/status-windows-8.1-and-windows-server-2012-r2.yml b/windows/release-information/status-windows-8.1-and-windows-server-2012-r2.yml index 92fedb9d46..03ab75ddbb 100644 --- a/windows/release-information/status-windows-8.1-and-windows-server-2012-r2.yml +++ b/windows/release-information/status-windows-8.1-and-windows-server-2012-r2.yml @@ -85,11 +85,11 @@ sections: - type: markdown text: " - - - - - + + + + +
DetailsOriginating updateStatusHistory
System may be unresponsive after restart if Avira antivirus software installed
Microsoft and Avira have identified an issue on devices with Avira antivirus software installed that may cause the system to become unresponsive upon restart after installing KB4493446.

Microsoft has temporarily blocked devices from receiving this update if Avira antivirus software is installed.

Affected platforms: 
  • Client: Windows 8.1; Windows 7, Service Pack 1 
  • Server: Windows Server 2012 R2; Windows Server 2008 R2 SP1 
Next steps: We are presently investigating this issue with Avira and will provide an update when available.

Back to top
April 09, 2019
KB4493446
Investigating
Last updated:
April 09, 2019
10:00 AM PT

Opened:
April 09, 2019
10:00 AM PT
System unresponsive after restart if Sophos Endpoint Protection installed
Microsoft and Sophos have identified an issue on devices with Sophos Endpoint Protection installed and managed by either Sophos Central or Sophos Enterprise Console (SEC) that may cause the system to become unresponsive upon restart after installing KB4493446.

Microsoft has temporarily blocked devices from receiving this update if the Sophos Endpoint is installed until a solution is available.

Affected platforms: 
  • Client: Windows 8.1; Windows 7, Service Pack 1 
  • Server: Windows Server 2012 R2; Windows Server 2008 R2 SP1 
Guidance for Sophos Endpoint and Sophos Enterprise Console customers can be found in the Sophos support article.

Back to top
April 09, 2019
KB4493446
Mitigated
Last updated:
April 09, 2019
10:00 AM PT

Opened:
April 09, 2019
10:00 AM PT
System may be unresponsive after restart if ArcaBit antivirus software installed
Microsoft and ArcaBit have identified an issue on devices with ArcaBit antivirus software installed that may cause the system to become unresponsive upon restart after installing KB4493446.

Microsoft has temporarily blocked devices from receiving this update if ArcaBit antivirus software is installed.

Affected platforms: 
  • Client: Windows 8.1; Windows 7, Service Pack 1 
  • Server: Windows Server 2012 R2; Windows Server 2008 R2 SP1 
ArcaBit has released an update to address this issue. For more information, see the Arcabit support article.

Back to top
April 09, 2019
KB4493446
Mitigated
Last updated:
April 09, 2019
10:00 AM PT

Opened:
April 09, 2019
10:00 AM PT
Certain operations performed on a Cluster Shared Volume may fail
Certain operations, such as rename, that you perform on files or folders that are on a Cluster Shared Volume (CSV) may fail with the error, “STATUS_BAD_IMPERSONATION_LEVEL (0xC00000A5)”. This occurs when you perform the operation on a CSV owner node from a process that doesn’t have administrator privilege.

Affected platforms: 
  • Client: Windows 8.1 
  • Server: Windows Server 2012 R2 
Workaround: Do one of the following:

  • Perform the operation from a process that has administrator privilege.
  • Perform the operation from a node that doesn’t have CSV ownership.
Next steps: Microsoft is working on a resolution and will provide an update in an upcoming release.

Back to top
April 09, 2019
KB4493446
Mitigated
Last updated:
April 09, 2019
10:00 AM PT

Opened:
April 09, 2019
10:00 AM PT
Devices may not respond at login or Welcome screen if running certain Avast software
Microsoft and Avast have identified an issue on devices running Avast for Business, Avast CloudCare, and AVG Business Edition antivirus software after you install KB4493446 and restart. Devices may become unresponsive at the login or Welcome screen. Additionally, you may be unable to log in or log in after an extended period of time.

Affected platforms: 
  • Client: Windows 8.1; Windows 7, Service Pack 1 
  • Server: Windows Server 2012 R2; Windows Server 2008 R2 SP1 

Resolution: Avast has released emergency updates to address this issue. For more information and AV update schedule, see the Avast support KB article.

Back to top
April 09, 2019
KB4493446
Resolved
Resolved:
April 09, 2019
10:00 AM PT

Opened:
April 09, 2019
10:00 AM PT
System may be unresponsive after restart if Avira antivirus software installed
Microsoft and Avira have identified an issue on devices with Avira antivirus software installed that may cause the system to become unresponsive upon restart after installing KB4493446.

Microsoft has temporarily blocked devices from receiving this update if Avira antivirus software is installed.

Affected platforms: 
  • Client: Windows 8.1; Windows 7 SP1 
  • Server: Windows Server 2012 R2; Windows Server 2012; Windows Server 2008 R2 SP1; Windows Server 2008 SP2 
Next steps: We are presently investigating this issue with Avira and will provide an update when available.

Back to top
April 09, 2019
KB4493446
Investigating
Last updated:
April 09, 2019
10:00 AM PT

Opened:
April 09, 2019
10:00 AM PT
System unresponsive after restart if Sophos Endpoint Protection installed
Microsoft and Sophos have identified an issue on devices with Sophos Endpoint Protection installed and managed by either Sophos Central or Sophos Enterprise Console (SEC) that may cause the system to become unresponsive upon restart after installing KB4493446.

Microsoft has temporarily blocked devices from receiving this update if the Sophos Endpoint is installed until a solution is available.

Affected platforms: 
  • Client: Windows 8.1; Windows 7 SP1
  • Server: Windows Server 2012 R2; Windows Server 2012; Windows Server 2008 R2 SP1; Windows Server 2008 SP2
Guidance for Sophos Endpoint and Sophos Enterprise Console customers can be found in the Sophos support article.

Back to top
April 09, 2019
KB4493446
Mitigated
Last updated:
April 09, 2019
10:00 AM PT

Opened:
April 09, 2019
10:00 AM PT
System may be unresponsive after restart if ArcaBit antivirus software installed
Microsoft and ArcaBit have identified an issue on devices with ArcaBit antivirus software installed that may cause the system to become unresponsive upon restart after installing KB4493446.

Microsoft has temporarily blocked devices from receiving this update if ArcaBit antivirus software is installed.

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 8.1; Windows 7 SP1
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server 2012 R2; Windows Server 2008 R2 SP1
ArcaBit has released an update to address this issue. For more information, see the Arcabit support article.

Back to top
April 09, 2019
KB4493446
Mitigated
Last updated:
April 09, 2019
10:00 AM PT

Opened:
April 09, 2019
10:00 AM PT
Certain operations performed on a Cluster Shared Volume may fail
Certain operations, such as rename, that you perform on files or folders that are on a Cluster Shared Volume (CSV) may fail with the error, “STATUS_BAD_IMPERSONATION_LEVEL (0xC00000A5)”. This occurs when you perform the operation on a CSV owner node from a process that doesn’t have administrator privilege.

Affected platforms: 
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 8.1
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2; Windows Server 2012
Workaround: Do one of the following:
  • Perform the operation from a process that has administrator privilege.
  • Perform the operation from a node that doesn’t have CSV ownership.
Next steps: Microsoft is working on a resolution and will provide an update in an upcoming release.

Back to top
April 09, 2019
KB4493446
Mitigated
Last updated:
April 09, 2019
10:00 AM PT

Opened:
April 09, 2019
10:00 AM PT
Devices may not respond at login or Welcome screen if running certain Avast software
Microsoft and Avast have identified an issue on devices running Avast for Business, Avast CloudCare, and AVG Business Edition antivirus software after you install KB4493446 and restart. Devices may become unresponsive at the login or Welcome screen. Additionally, you may be unable to log in or log in after an extended period of time.

Affected platforms: 
  • Client: Windows 8.1; Windows 7 SP1 
  • Server: Windows Server 2012 R2; Windows Server 2008 R2 SP1 
Resolution: Avast has released emergency updates to address this issue. For more information and AV update schedule, see the Avast support KB article.

Back to top
April 09, 2019
KB4493446
Resolved
Resolved:
April 09, 2019
10:00 AM PT

Opened:
April 09, 2019
10:00 AM PT
" @@ -98,7 +98,7 @@ sections: - type: markdown text: " -
DetailsOriginating updateStatusHistory
Issue using PXE to start a device from WDS
After installing KB4489881, there may be issues using the Preboot Execution Environment (PXE) to start a device from a Windows Deployment Services (WDS) server configured to use Variable Window Extension. This may cause the connection to the WDS server to terminate prematurely while downloading the image. This issue does not affect clients or devices that are not using Variable Window Extension.

Affected platforms: 
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10 Enterprise LTSC 2016; Windows 8.1 
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server 2016; Windows Server 2012 R2 
Workaround: To mitigate the issue, disable the Variable Window Extension on WDS server using one of the following options:
Option 1:
Open an Administrator Command prompt and type the following:
Wdsutil /Set-TransportServer /EnableTftpVariableWindowExtension:No
+      
Issue using PXE to start a device from WDS
After installing KB4489881, there may be issues using the Preboot Execution Environment (PXE) to start a device from a Windows Deployment Services (WDS) server configured to use Variable Window Extension. This may cause the connection to the WDS server to terminate prematurely while downloading the image. This issue does not affect clients or devices that are not using Variable Window Extension.

Affected platforms: 
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10 Enterprise LTSC 2016; Windows 8.1 
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server 2016; Windows Server 2012 R2; Windows Server 2012 
Workaround: To mitigate the issue, disable the Variable Window Extension on WDS server using one of the following options:
Option 1:
Open an Administrator Command prompt and type the following:
Wdsutil /Set-TransportServer /EnableTftpVariableWindowExtension:No
 
Option 2:
Use the Windows Deployment Services UI to make the following adjustment:
  1. Open Windows Deployment Services from Windows Administrative Tools.
  2. Expand Servers and right-click a WDS server.
  3. Open its properties and clear the Enable Variable Window Extension box on the TFTP tab.
Option 3:
Set the following registry value to 0:
HKLM\\System\\CurrentControlSet\\Services\\WDSServer\\Providers\\WDSTFTP\\EnableVariableWindowExtension
Restart the WDSServer service after disabling the Variable Window Extension.

Next steps: Microsoft is working on a resolution and will provide an update in an upcoming release.

Back to top
March 12, 2019
KB4489881
Mitigated
Last updated:
April 09, 2019
10:00 AM PT

Opened:
March 12, 2019
10:00 AM PT
Custom URI schemes may not start corresponding application
After installing KB4489881, custom URI schemes for application protocol handlers may not start the corresponding application for local intranet and trusted sites security zones on Internet Explorer.

Affected platforms: 
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 8.1; Windows 7 SP1 
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2; Windows Server 2008 R2 SP1 
Resolution: This issue is resolved in KB4493446.

Back to top
March 12, 2019
KB4489881
Resolved
KB4493446
Resolved:
April 09, 2019
10:00 AM PT

Opened:
March 12, 2019
10:00 AM PT
@@ -109,7 +109,7 @@ sections: - type: markdown text: " - +
DetailsOriginating updateStatusHistory
Embedded objects may display incorrectly
Any compound document (OLE) server application that places embedded objects into the Windows Metafile (WMF) using the PatBlt API may display embedded objects incorrectly.

For example, if you paste a Microsoft Excel worksheet object into a Microsoft Word document, the cells may render with a different background color.

Affected platforms: 
  • Client: Windows 8.1 
  • Server: Windows Server 2012 R2 
Resolution: This issue is resolved in KB4493446.

Back to top
February 12, 2019
KB4487000
Resolved
KB4493446
Resolved:
April 09, 2019
10:00 AM PT

Opened:
February 12, 2019
10:00 AM PT
Embedded objects may display incorrectly
Any compound document (OLE) server application that places embedded objects into the Windows Metafile (WMF) using the PatBlt API may display embedded objects incorrectly.

For example, if you paste a Microsoft Excel worksheet object into a Microsoft Word document, the cells may render with a different background color.

Affected platforms: 
  • Client: Windows 8.1 
  • Server: Windows Server 2012 R2; Windows Server 2012; Windows Server 2008 SP2
Resolution: This issue is resolved in KB4493446.

Back to top
February 12, 2019
KB4487000
Resolved
KB4493446
Resolved:
April 09, 2019
10:00 AM PT

Opened:
February 12, 2019
10:00 AM PT
" @@ -118,7 +118,7 @@ sections: - type: markdown text: " - +
DetailsOriginating updateStatusHistory
Internet Explorer 11 authentication issue with multiple concurrent logons
After installing KB4480963, Internet Explorer 11 and other applications that use WININET.DLL may have authentication issues. This occurs when two or more people use the same user account for multiple, concurrent login sessions on the same Windows Server machine, including Remote Desktop Protocol (RDP) and Terminal Server logons. Symptoms reported by customers include, but may not be limited to:
  • Cache size and location show zero or empty.
  • Keyboard shortcuts may not work properly.
  • Webpages may intermittently fail to load or render correctly.
  • Issues with credential prompts.
  • Issues when downloading files.
Affected platforms: 
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10 Enterprise LTSC 2016; Windows 8.1; Windows 7, Service Pack 1 
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server 2016; Windows Server 2012 R2; Windows Server 2008 R2 SP1 
Resolution: This issue is resolved in KB4493446.

Back to top
January 08, 2019
KB4480963
Resolved
KB4493446
Resolved:
April 09, 2019
10:00 AM PT

Opened:
January 08, 2019
10:00 AM PT
Internet Explorer 11 authentication issue with multiple concurrent logons
After installing KB4480963, Internet Explorer 11 and other applications that use WININET.DLL may have authentication issues. This occurs when two or more people use the same user account for multiple, concurrent login sessions on the same Windows Server machine, including Remote Desktop Protocol (RDP) and Terminal Server logons. Symptoms reported by customers include, but may not be limited to:
  • Cache size and location show zero or empty.
  • Keyboard shortcuts may not work properly.
  • Webpages may intermittently fail to load or render correctly.
  • Issues with credential prompts.
  • Issues when downloading files.
Affected platforms: 
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10 Enterprise LTSC 2016; Windows 8.1; Windows 7 SP1
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server 2016; Windows Server 2012 R2; Windows Server 2012; Windows Server 2008 R2 SP1
Resolution: This issue is resolved in KB4493446.

Back to top
January 08, 2019
KB4480963
Resolved
KB4493446
Resolved:
April 09, 2019
10:00 AM PT

Opened:
January 08, 2019
10:00 AM PT
MSXML6 may cause applications to stop responding.
After installing KB4480963, MSXML6 causes applications to stop responding if an exception was thrown during node operations, such as appendChild(), insertBefore(), and moveNode().

The Group Policy editor may stop responding when editing a Group Policy Object (GPO) that contains Group Policy Preferences (GPP) for Internet Explorer 10 settings.

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 8.1
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2; Windows Server 2012
Resolution: This issue is resolved in KB4493446.

Back to top
January 08, 2019
KB4480963
Resolved
KB4493446
Resolved:
April 09, 2019
10:00 AM PT

Opened:
January 08, 2019
10:00 AM PT
" diff --git a/windows/release-information/status-windows-server-2008-sp2.yml b/windows/release-information/status-windows-server-2008-sp2.yml index e409b51fd5..424793f5bc 100644 --- a/windows/release-information/status-windows-server-2008-sp2.yml +++ b/windows/release-information/status-windows-server-2008-sp2.yml @@ -80,8 +80,8 @@ sections: - type: markdown text: " - - + +
DetailsOriginating updateStatusHistory
System may be unresponsive after restart if Avira antivirus software installed
Microsoft and Avira have identified an issue on devices with Avira antivirus software installed that may cause the system to become unresponsive upon restart after installing KB4493471.

Microsoft has temporarily blocked devices from receiving this update if Avira antivirus software is installed.

Affected platforms: 
  • Client: Windows 8.1; Windows 7, Service Pack 1 
  • Server: Windows Server 2012 R2; Windows Server 2012; Windows Server 2008 R2 SP1; Windows Server 2008 SP2
Next steps: We are presently investigating this issue with Avira and will provide an update when available.

Back to top
April 09, 2019
KB4493471
Investigating
Last updated:
April 09, 2019
10:00 AM PT

Opened:
April 09, 2019
10:00 AM PT
System unresponsive after restart if Sophos Endpoint Protection installed
Microsoft and Sophos have identified an issue on devices with Sophos Endpoint Protection installed and managed by either Sophos Central or Sophos Enterprise Console (SEC) that may cause the system to become unresponsive upon restart after installing KB4493471.

Microsoft has temporarily blocked devices from receiving this update if the Sophos Endpoint is installed until a solution is available.

Guidance for Sophos Endpoint and Sophos Enterprise Console customers can be found in the Sophos support article.

Affected platforms: 
  • Client: Windows 8.1; Windows 7, Service Pack 1 
  • Server: Windows Server 2012 R2; Windows Server 2012; Windows Server 2008 R2 SP1; Windows Server 2008 SP2

Back to top
April 09, 2019
KB4493471
Mitigated
Last updated:
April 09, 2019
10:00 AM PT

Opened:
April 09, 2019
10:00 AM PT
System may be unresponsive after restart if Avira antivirus software installed
Microsoft and Avira have identified an issue on devices with Avira antivirus software installed that may cause the system to become unresponsive upon restart after installing KB4493471.

Microsoft has temporarily blocked devices from receiving this update if Avira antivirus software is installed.

Affected platforms: 
  • Client: Windows 8.1; Windows 7 SP1 
  • Server: Windows Server 2012 R2; Windows Server 2012; Windows Server 2008 R2 SP1; Windows Server 2008 SP2
Next steps: We are presently investigating this issue with Avira and will provide an update when available.

Back to top
April 09, 2019
KB4493471
Investigating
Last updated:
April 09, 2019
10:00 AM PT

Opened:
April 09, 2019
10:00 AM PT
System unresponsive after restart if Sophos Endpoint Protection installed
Microsoft and Sophos have identified an issue on devices with Sophos Endpoint Protection installed and managed by either Sophos Central or Sophos Enterprise Console (SEC) that may cause the system to become unresponsive upon restart after installing KB4493471.

Microsoft has temporarily blocked devices from receiving this update if the Sophos Endpoint is installed until a solution is available.

Affected platforms: 
  • Client: Windows 8.1; Windows 7 SP1
  • Server: Windows Server 2012 R2; Windows Server 2012; Windows Server 2008 R2 SP1; Windows Server 2008 SP2
Guidance for Sophos Endpoint and Sophos Enterprise Console customers can be found in the Sophos support article.

Back to top
April 09, 2019
KB4493471
Mitigated
Last updated:
April 09, 2019
10:00 AM PT

Opened:
April 09, 2019
10:00 AM PT
" @@ -90,8 +90,8 @@ sections: - type: markdown text: " - - + +
DetailsOriginating updateStatusHistory
Authentication may fail for services after the Kerberos ticket expires
After installing KB4489880, some customers report that authentication fails for services that require unconstrained delegation after the Kerberos ticket expires (the default is 10 hours). For example, the SQL server service fails.

Affected platforms: 
  • Client: Windows 7, Service Pack 1 
  • Server: Windows Server 2008 R2 SP1; Windows Server 2008 SP2
Workaround: To mitigate this issue, use one of the following options:

  • Option 1: Purge the Kerberos tickets on the application server. After the Kerberos ticket expires, the issue will occur again, and you must purge the tickets again.
  • Option 2: If purging does not mitigate the issue, restart the application; for example, restart the Internet Information Services (IIS) app pool associated with the SQL server.
  • Option 3: Use constrained delegation.
Next steps: Microsoft is working on a resolution and will provide an update in an upcoming release.

Back to top
March 12, 2019
KB4489880
Mitigated
Last updated:
March 12, 2019
10:00 AM PT

Opened:
March 12, 2019
10:00 AM PT
NETDOM.EXE fails to run
After installing KB4489880, NETDOM.EXE fails to run, and the on-screen error, “The command failed to complete successfully.” appears.

Affected platforms: 
  • Client: Windows 7, Service Pack 1 
  • Server: Windows Server 2008 R2 SP1; Windows Server 2008 SP2
Resolution: This issue is resolved in KB4493471.

Back to top
March 12, 2019
KB4489880
Resolved
KB4493471
Resolved:
April 09, 2019
10:00 AM PT

Opened:
March 12, 2019
10:00 AM PT
Authentication may fail for services after the Kerberos ticket expires
After installing KB4489880, some customers report that authentication fails for services that require unconstrained delegation after the Kerberos ticket expires (the default is 10 hours). For example, the SQL server service fails.

Affected platforms: 
  • Client: Windows 7 SP1
  • Server: Windows Server 2008 R2 SP1; Windows Server 2008 SP2
Workaround: To mitigate this issue, use one of the following options:

  • Option 1: Purge the Kerberos tickets on the application server. After the Kerberos ticket expires, the issue will occur again, and you must purge the tickets again.
  • Option 2: If purging does not mitigate the issue, restart the application; for example, restart the Internet Information Services (IIS) app pool associated with the SQL server.
  • Option 3: Use constrained delegation.
Next steps: Microsoft is working on a resolution and will provide an update in an upcoming release.

Back to top
March 12, 2019
KB4489880
Mitigated
Last updated:
March 12, 2019
10:00 AM PT

Opened:
March 12, 2019
10:00 AM PT
NETDOM.EXE fails to run
After installing KB4489880, NETDOM.EXE fails to run, and the on-screen error, “The command failed to complete successfully.” appears.

Affected platforms: 
  • Client: Windows 7 SP1
  • Server: Windows Server 2008 R2 SP1; Windows Server 2008 SP2
Resolution: This issue is resolved in KB4493471.

Back to top
March 12, 2019
KB4489880
Resolved
KB4493471
Resolved:
April 09, 2019
10:00 AM PT

Opened:
March 12, 2019
10:00 AM PT
" diff --git a/windows/release-information/status-windows-server-2012.yml b/windows/release-information/status-windows-server-2012.yml index 8034719114..9088b79602 100644 --- a/windows/release-information/status-windows-server-2012.yml +++ b/windows/release-information/status-windows-server-2012.yml @@ -82,8 +82,8 @@ sections: - type: markdown text: " - - + +
DetailsOriginating updateStatusHistory
System may be unresponsive after restart if Avira antivirus software installed
Microsoft and Avira have identified an issue on devices with Avira antivirus software installed that may cause the system to become unresponsive upon restart after installing KB4493451.

Microsoft has temporarily blocked devices from receiving this update if Avira antivirus software is installed.

Next steps: We are presently investigating this issue with Avira and will provide an update when available.

Back to top
April 09, 2019
KB4493451
Investigating
Last updated:
April 09, 2019
10:00 AM PT

Opened:
April 09, 2019
10:00 AM PT
System unresponsive after restart if Sophos Endpoint Protection installed
Microsoft and Sophos have identified an issue on devices with Sophos Endpoint Protection installed and managed by either Sophos Central or Sophos Enterprise Console (SEC) that may cause the system to become unresponsive upon restart after installing KB4493451.

Microsoft has temporarily blocked devices from receiving this update if the Sophos Endpoint is installed until a solution is available.

Guidance for Sophos Endpoint and Sophos Enterprise Console customers can be found in the Sophos support article.

Back to top
April 09, 2019
KB4493451
Mitigated
Last updated:
April 09, 2019
10:00 AM PT

Opened:
April 09, 2019
10:00 AM PT
System may be unresponsive after restart if Avira antivirus software installed
Microsoft and Avira have identified an issue on devices with Avira antivirus software installed that may cause the system to become unresponsive upon restart after installing KB4493451.

Microsoft has temporarily blocked devices from receiving this update if Avira antivirus software is installed.

Affected platforms: 
  • Client: Windows 8.1; Windows 7 SP1 
  • Server: Windows Server 2012 R2; Windows Server 2012; Windows Server 2008 R2 SP1; Windows Server 2008 SP2
Next steps: We are presently investigating this issue with Avira and will provide an update when available.

Back to top
April 09, 2019
KB4493451
Investigating
Last updated:
April 09, 2019
10:00 AM PT

Opened:
April 09, 2019
10:00 AM PT
System unresponsive after restart if Sophos Endpoint Protection installed
Microsoft and Sophos have identified an issue on devices with Sophos Endpoint Protection installed and managed by either Sophos Central or Sophos Enterprise Console (SEC) that may cause the system to become unresponsive upon restart after installing KB4493451.

Microsoft has temporarily blocked devices from receiving this update if the Sophos Endpoint is installed until a solution is available.

Affected platforms: 
  • Client: Windows 8.1; Windows 7 SP1
  • Server: Windows Server 2012 R2; Windows Server 2012; Windows Server 2008 R2 SP1; Windows Server 2008 SP2
Guidance for Sophos Endpoint and Sophos Enterprise Console customers can be found in the Sophos support article.

Back to top
April 09, 2019
KB4493451
Mitigated
Last updated:
April 09, 2019
10:00 AM PT

Opened:
April 09, 2019
10:00 AM PT
" @@ -92,7 +92,7 @@ sections: - type: markdown text: " -
DetailsOriginating updateStatusHistory
Issue using PXE to start a device from WDS
After installing KB4489891, there may be issues using the Preboot Execution Environment (PXE) to start a device from a Windows Deployment Services (WDS) server configured to use Variable Window Extension. This may cause the connection to the WDS server to terminate prematurely while downloading the image. This issue does not affect clients or devices that are not using Variable Window Extension.

Workaround: To mitigate the issue, disable the Variable Window Extension on WDS server using one of the following options:
Option 1:
Open an Administrator Command prompt and type the following:
Wdsutil /Set-TransportServer /EnableTftpVariableWindowExtension:No
+      
Issue using PXE to start a device from WDS
After installing KB4489891, there may be issues using the Preboot Execution Environment (PXE) to start a device from a Windows Deployment Services (WDS) server configured to use Variable Window Extension. This may cause the connection to the WDS server to terminate prematurely while downloading the image. This issue does not affect clients or devices that are not using Variable Window Extension.

Affected platforms: 
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10 Enterprise LTSC 2016; Windows 8.1 
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server 2016; Windows Server 2012 R2; Windows Server 2012 
Workaround: To mitigate the issue, disable the Variable Window Extension on WDS server using one of the following options:
Option 1:
Open an Administrator Command prompt and type the following:
Wdsutil /Set-TransportServer /EnableTftpVariableWindowExtension:No
 
Option 2:
Use the Windows Deployment Services UI to make the following adjustment:
  1. Open Windows Deployment Services from Windows Administrative Tools.
  2. Expand Servers and right-click a WDS server.
  3. Open its properties and clear the Enable Variable Window Extension box on the TFTP tab.
Option 3:
Set the following registry value to 0:
HKLM\\System\\CurrentControlSet\\Services\\WDSServer\\Providers\\WDSTFTP\\EnableVariableWindowExtension
Restart the WDSServer service after disabling the Variable Window Extension.

Next steps: Microsoft is working on a resolution and will provide an update in an upcoming release.

Back to top
March 12, 2019
KB4489891
Mitigated
Last updated:
March 12, 2019
10:00 AM PT

Opened:
March 12, 2019
10:00 AM PT
" @@ -102,7 +102,7 @@ sections: - type: markdown text: " - +
DetailsOriginating updateStatusHistory
Embedded objects may display incorrectly
Any compound document (OLE) server application that places embedded objects into the Windows Metafile (WMF) using the PatBlt API may display embedded objects incorrectly.

For example, if you paste a Microsoft Excel worksheet object into a Microsoft Word document, the cells may render with a different background color.

Resolution: This issue is resolved in KB4493451.

Back to top
February 12, 2019
KB4487025
Resolved
KB4493451
Resolved:
April 09, 2019
10:00 AM PT

Opened:
February 12, 2019
10:00 AM PT
Embedded objects may display incorrectly
Any compound document (OLE) server application that places embedded objects into the Windows Metafile (WMF) using the PatBlt API may display embedded objects incorrectly.

For example, if you paste a Microsoft Excel worksheet object into a Microsoft Word document, the cells may render with a different background color.

Affected platforms: 
  • Client: Windows 8.1 
  • Server: Windows Server 2012 R2; Windows Server 2012; Windows Server 2008 SP2
Resolution: This issue is resolved in KB4493451.

Back to top
February 12, 2019
KB4487025
Resolved
KB4493451
Resolved:
April 09, 2019
10:00 AM PT

Opened:
February 12, 2019
10:00 AM PT
" @@ -111,8 +111,8 @@ sections: - type: markdown text: " - - + +
DetailsOriginating updateStatusHistory
Certain operations performed on a Cluster Shared Volume may fail
Certain operations, such as rename, that you perform on files or folders that are on a Cluster Shared Volume (CSV) may fail with the error, \"STATUS_BAD_IMPERSONATION_LEVEL (0xC00000A5)\". This occurs when you perform the operation on a CSV owner node from a process that doesn’t have administrator privilege.

Workaround: Do one of the following:

  • Perform the operation from a process that has administrator privilege.
  • Perform the operation from a node that doesn’t have CSV ownership.
Next steps: Microsoft is working on a resolution and will provide an update in an upcoming release.

Back to top
January 08, 2019
KB4480975
Mitigated
Last updated:
January 08, 2019
10:00 AM PT

Opened:
January 08, 2019
10:00 AM PT
Internet Explorer 11 authentication issue with multiple concurrent logons
After installing KB4480975, Internet Explorer 11 and other applications that use WININET.DLL may have authentication issues. This occurs when two or more people use the same user account for multiple, concurrent login sessions on the same Windows Server machine, including Remote Desktop Protocol (RDP) and Terminal Server logons. Symptoms reported by customers include, but may not be limited to:
  • Cache size and location show zero or empty.
  • Keyboard shortcuts may not work properly.
  • Webpages may intermittently fail to load or render correctly.
  • Issues with credential prompts.
  • Issues when downloading files.
Resolution: This issue is resolved in KB4493451.

Back to top
January 08, 2019
KB4480975
Resolved
KB4493451
Resolved:
April 09, 2019
10:00 AM PT

Opened:
January 08, 2019
10:00 AM PT
Certain operations performed on a Cluster Shared Volume may fail
Certain operations, such as rename, that you perform on files or folders that are on a Cluster Shared Volume (CSV) may fail with the error, \"STATUS_BAD_IMPERSONATION_LEVEL (0xC00000A5)\". This occurs when you perform the operation on a CSV owner node from a process that doesn’t have administrator privilege.

Affected platforms: 
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 8.1
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2; Windows Server 2012
Workaround: Do one of the following:
  • Perform the operation from a process that has administrator privilege.
  • Perform the operation from a node that doesn’t have CSV ownership.
Next steps: Microsoft is working on a resolution and will provide an update in an upcoming release.

Back to top
January 08, 2019
KB4480975
Mitigated
Last updated:
January 08, 2019
10:00 AM PT

Opened:
January 08, 2019
10:00 AM PT
Internet Explorer 11 authentication issue with multiple concurrent logons
After installing KB4480975, Internet Explorer 11 and other applications that use WININET.DLL may have authentication issues. This occurs when two or more people use the same user account for multiple, concurrent login sessions on the same Windows Server machine, including Remote Desktop Protocol (RDP) and Terminal Server logons. Symptoms reported by customers include, but may not be limited to:
  • Cache size and location show zero or empty.
  • Keyboard shortcuts may not work properly.
  • Webpages may intermittently fail to load or render correctly.
  • Issues with credential prompts.
  • Issues when downloading files.
Affected platforms: 
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10 Enterprise LTSC 2016; Windows 8.1; Windows 7 SP1
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server 2016; Windows Server 2012 R2; Windows Server 2012; Windows Server 2008 R2 SP1
Resolution: This issue is resolved in KB4493451.

Back to top
January 08, 2019
KB4480975
Resolved
KB4493451
Resolved:
April 09, 2019
10:00 AM PT

Opened:
January 08, 2019
10:00 AM PT
MSXML6 may cause applications to stop responding
After installing KB4480975, MSXML6 causes applications to stop responding if an exception was thrown during node operations, such as appendChild(), insertBefore(), and moveNode().

The Group Policy editor may stop responding when editing a Group Policy Object (GPO) that contains Group Policy Preferences (GPP) for Internet Explorer 10 settings.

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 8.1
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2; Windows Server 2012
Resolution: This issue is resolved in KB4493451.

Back to top
January 08, 2019
KB4480975
Resolved
KB4493451
Resolved:
April 09, 2019
10:00 AM PT

Opened:
January 08, 2019
10:00 AM PT
" From 2275cece854b540c776dbb7ab30702b4e2bbaf67 Mon Sep 17 00:00:00 2001 From: "Nisha Mittal (Wipro Ltd.)" Date: Fri, 26 Apr 2019 17:08:03 -0700 Subject: [PATCH 227/724] Some more data changes --- .../resolved-issues-windows-10-1507.yml | 2 +- .../resolved-issues-windows-10-1607.yml | 30 +++++++++---------- .../status-windows-10-1507.yml | 4 +-- ...indows-10-1607-and-windows-server-2016.yml | 16 +++++----- .../status-windows-10-1703.yml | 2 +- .../status-windows-10-1709.yml | 2 +- .../status-windows-10-1803.yml | 2 +- ...indows-10-1809-and-windows-server-2019.yml | 2 +- ...ndows-7-and-windows-server-2008-r2-sp1.yml | 2 +- .../status-windows-server-2008-sp2.yml | 2 +- .../status-windows-server-2012.yml | 2 +- 11 files changed, 33 insertions(+), 33 deletions(-) diff --git a/windows/release-information/resolved-issues-windows-10-1507.yml b/windows/release-information/resolved-issues-windows-10-1507.yml index b1c919539a..95fe9914b0 100644 --- a/windows/release-information/resolved-issues-windows-10-1507.yml +++ b/windows/release-information/resolved-issues-windows-10-1507.yml @@ -57,7 +57,7 @@ sections: - type: markdown text: " - +
DetailsOriginating updateStatusHistory
Custom URI schemes may not start corresponding application
After installing KB4489872, Custom URI Schemes for Application Protocol handlers may not start the corresponding application for local intranet and trusted sites on Internet Explorer.

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 8.1; Windows 7 SP1 
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2; Windows Server 2008 R2 SP1
Resolution: This issue was resolved in KB4493475.

Back to top
OS Build 10240.18158

March 12, 2019
KB4489872
Resolved
KB4493475
Resolved:
April 09, 2019
10:00 AM PT

Opened:
March 12, 2019
10:00 AM PT
Custom URI schemes may not start corresponding application
After installing KB4489872, Custom URI Schemes for Application Protocol handlers may not start the corresponding application for local intranet and trusted sites on Internet Explorer.

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 8.1; Windows 7 SP1 
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2; Windows Server 2008 R2 SP1
Resolution: This issue was resolved in KB4493475.

Back to top
OS Build 10240.18158

March 12, 2019
KB4489872
Resolved
KB4493475
Resolved:
April 09, 2019
10:00 AM PT

Opened:
March 12, 2019
10:00 AM PT
" diff --git a/windows/release-information/resolved-issues-windows-10-1607.yml b/windows/release-information/resolved-issues-windows-10-1607.yml index 6e6f8f9325..f07398a7f7 100644 --- a/windows/release-information/resolved-issues-windows-10-1607.yml +++ b/windows/release-information/resolved-issues-windows-10-1607.yml @@ -63,7 +63,7 @@ sections: - type: markdown text: " - +
DetailsOriginating updateStatusHistory
End-user-defined characters (EUDC) cause blue screen at startup
If you enable per font end-user-defined characters (EUDC), the system will stop working and a blue screen may appear at startup. This is not a common setting in non-Asian regions.

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016
Resolution: This issue was resolved in KB4493470.

Back to top
OS Build 14393.2879

March 19, 2019
KB4489889
Resolved
KB4493470
Resolved:
April 09, 2019
10:00 AM PT

Opened:
March 19, 2019
10:00 AM PT
End-user-defined characters (EUDC) cause blue screen at startup
If you enable per font end-user-defined characters (EUDC), the system will stop working and a blue screen may appear at startup. This is not a common setting in non-Asian regions.

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10, version 1607; Windows 10 Enterprise LTSC 2016
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016
Resolution: This issue was resolved in KB4493470.

Back to top
OS Build 14393.2879

March 19, 2019
KB4489889
Resolved
KB4493470
Resolved:
April 09, 2019
10:00 AM PT

Opened:
March 19, 2019
10:00 AM PT
" @@ -72,10 +72,10 @@ sections: - type: markdown text: " - - - - + + + +
DetailsOriginating updateStatusHistory
Issue hosting multiple terminal server sessions and a user logs off on Windows Server
In some cases, Windows Server will stop working and restart when hosting multiple terminal server sessions and a user logs off. The faulting driver is win32kbase.sys.

Affected platforms:
  • Client: Windows 10 Enterprise LTSC 2016
  • Server: Windows Server 2016
Resolution: This issue is resolved in KB4489882.

Back to top
OS Build 14393.2828

February 19, 2019
KB4487006
Resolved
KB4489882
Resolved:
March 12, 2019
10:00 AM PT

Opened:
February 19, 2019
02:00 PM PT
Error 1309 when installing/uninstalling MSI or MSP files
After installing KB4487026, users may receive “Error 1309” while installing or uninstalling certain types of MSI and MSP files.

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 8.1
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2; Windows Server 2012
Resolution: This issue is resolved in KB4489882.

Back to top
OS Build 14393.2791

February 12, 2019
KB4487026
Resolved
KB4489882
Resolved:
March 12, 2019
10:00 AM PT

Opened:
February 12, 2019
10:00 AM PT
Applications using Microsoft Jet database and Access 95 file format stop working
Applications that use a Microsoft Jet database with the Microsoft Access 95 file format may randomly stop working.

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 7 SP1
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2; Windows Server 2012; Windows Server 2008 R2 SP1; Windows Server 2008 SP2
Resolution: This issue is resolved in KB4487006.

Back to top
OS Build 14393.2791

February 12, 2019
KB4487026
Resolved
KB4487006
Resolved:
February 19, 2019
02:00 PM PT

Opened:
February 12, 2019
10:00 AM PT
Internet Explorer may fail to load images
After installing KB4487026, Internet Explorer may fail to load images with a backslash (\\) in their relative source path.

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 8.1; Windows 7 SP1
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2; Windows Server 2008 R2 SP1
Resolution: This issue is resolved in KB4487006.

Back to top
OS Build 14393.2791

February 12, 2019
KB4487026
Resolved
KB4487006
Resolved:
February 19, 2019
02:00 PM PT

Opened:
February 12, 2019
10:00 AM PT
Issue hosting multiple terminal server sessions and a user logs off on Windows Server
In some cases, Windows Server will stop working and restart when hosting multiple terminal server sessions and a user logs off. The faulting driver is win32kbase.sys.

Affected platforms:
  • Client: Windows 10, version 1607; Windows 10 Enterprise LTSC 2016
  • Server: Windows Server 2016
Resolution: This issue is resolved in KB4489882.

Back to top
OS Build 14393.2828

February 19, 2019
KB4487006
Resolved
KB4489882
Resolved:
March 12, 2019
10:00 AM PT

Opened:
February 19, 2019
02:00 PM PT
Error 1309 when installing/uninstalling MSI or MSP files
After installing KB4487026, users may receive “Error 1309” while installing or uninstalling certain types of MSI and MSP files.

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10, version 1607; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 10 Enterprise LTSB 2015; Windows 8.1
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2; Windows Server 2012
Resolution: This issue is resolved in KB4489882.

Back to top
OS Build 14393.2791

February 12, 2019
KB4487026
Resolved
KB4489882
Resolved:
March 12, 2019
10:00 AM PT

Opened:
February 12, 2019
10:00 AM PT
Applications using Microsoft Jet database and Access 95 file format stop working
Applications that use a Microsoft Jet database with the Microsoft Access 95 file format may randomly stop working.

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10, version 1607; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 10 Enterprise LTSB 2015; Windows 7 SP1
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2; Windows Server 2012; Windows Server 2008 R2 SP1; Windows Server 2008 SP2
Resolution: This issue is resolved in KB4487006.

Back to top
OS Build 14393.2791

February 12, 2019
KB4487026
Resolved
KB4487006
Resolved:
February 19, 2019
02:00 PM PT

Opened:
February 12, 2019
10:00 AM PT
Internet Explorer may fail to load images
After installing KB4487026, Internet Explorer may fail to load images with a backslash (\\) in their relative source path.

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10, version 1607; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 10 Enterprise LTSB 2015; Windows 8.1; Windows 7 SP1
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2; Windows Server 2008 R2 SP1
Resolution: This issue is resolved in KB4487006.

Back to top
OS Build 14393.2791

February 12, 2019
KB4487026
Resolved
KB4487006
Resolved:
February 19, 2019
02:00 PM PT

Opened:
February 12, 2019
10:00 AM PT
" @@ -84,11 +84,11 @@ sections: - type: markdown text: " - - - - - + + + + +
DetailsOriginating updateStatusHistory
Internet Explorer 11 authentication issue with multiple concurrent logons
After installing KB4480961, Internet Explorer 11 and other applications that use WININET.DLL may have authentication issues. This occurs when two or more people use the same user account for multiple, concurrent login sessions on the same Windows Server machine, including Remote Desktop Protocol (RDP) and Terminal Server logons. Symptoms reported by customers include, but may not be limited to:
  • Cache size and location show zero or empty.
  • Keyboard shortcuts may not work properly.
  • Webpages may intermittently fail to load or render correctly.
  • Issues with credential prompts.
  • Issues when downloading files.
Affected platforms: 
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10 Enterprise LTSC 2016; Windows 8.1; Windows 7 SP1
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server 2016; Windows Server 2012 R2; Windows Server 2012; Windows Server 2008 R2 SP1
Resolution: This issue was resolved in KB4493470.

Back to top
OS Build 14393.2724

January 08, 2019
KB4480961
Resolved
KB4493470
Resolved:
April 09, 2019
10:00 AM PT

Opened:
January 08, 2019
10:00 AM PT
MSXML6 may cause applications to stop responding
After installing KB4480961, MSXML6 causes applications to stop responding if an exception was thrown during node operations, such as appendChild(), insertBefore(), and moveNode().

The Group Policy editor may stop responding when editing a Group Policy Object (GPO) that contains Group Policy Preferences (GPP) for Internet Explorer 10 settings.

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 8.1
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2; Windows Server 2012
Resolution: This issue was resolved in KB4493470.

Back to top
OS Build 14393.2724

January 08, 2019
KB4480961
Resolved
KB4493470
Resolved:
April 09, 2019
10:00 AM PT

Opened:
January 08, 2019
10:00 AM PT
First character of the Japanese era name not recognized as an abbreviation
After installing KB4480977, the first character of the Japanese era name is not recognized as an abbreviation and may cause date parsing issues.

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 8.1; Windows 7 SP1
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2; Windows Server 2012; Windows Server 2008 R2 SP1; Windows Server 2008 SP2
Resolution: This issue is resolved in KB4487006.

Back to top
OS Build 14393.2759

January 17, 2019
KB4480977
Resolved
KB4487006
Resolved:
February 19, 2019
02:00 PM PT

Opened:
January 17, 2019
02:00 PM PT
Applications using Microsoft Jet database fail to open
Applications that use a Microsoft Jet database with the Microsoft Access 97 file format may fail to open if the database has column names greater than 32 characters. The database will fail to open with the error, “Unrecognized Database Format”.

Affected platforms:
  • Client: Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 8.1; Windows 7 SP1 
  • Server: Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2; Windows Server 2012; Windows Server 2008 R2 SP1; Windows Server 2008 SP2 
Resolution: This issue is resolved in KB4487026.

Back to top
OS Build 14393.2724

January 08, 2019
KB4480961
Resolved
KB4487026
Resolved:
February 12, 2019
10:00 AM PT

Opened:
January 08, 2019
10:00 AM PT
Unable to access hotspots with third-party applications
After installing KB4480961, third-party applications may have difficulty authenticating hotspots.

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 8.1
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2; Windows Server 2012
Resolution: This issue is resolved in KB4480977.

Back to top
OS Build 14393.2724

January 08, 2019
KB4480961
Resolved
KB4480977
Resolved:
January 17, 2019
02:00 PM PT

Opened:
January 08, 2019
10:00 AM PT
Internet Explorer 11 authentication issue with multiple concurrent logons
After installing KB4480961, Internet Explorer 11 and other applications that use WININET.DLL may have authentication issues. This occurs when two or more people use the same user account for multiple, concurrent login sessions on the same Windows Server machine, including Remote Desktop Protocol (RDP) and Terminal Server logons. Symptoms reported by customers include, but may not be limited to:
  • Cache size and location show zero or empty.
  • Keyboard shortcuts may not work properly.
  • Webpages may intermittently fail to load or render correctly.
  • Issues with credential prompts.
  • Issues when downloading files.
Affected platforms: 
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1607; Windows 10 Enterprise LTSC 2016; Windows 8.1; Windows 7 SP1
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server 2016; Windows Server 2012 R2; Windows Server 2012; Windows Server 2008 R2 SP1
Resolution: This issue was resolved in KB4493470.

Back to top
OS Build 14393.2724

January 08, 2019
KB4480961
Resolved
KB4493470
Resolved:
April 09, 2019
10:00 AM PT

Opened:
January 08, 2019
10:00 AM PT
MSXML6 may cause applications to stop responding
After installing KB4480961, MSXML6 causes applications to stop responding if an exception was thrown during node operations, such as appendChild(), insertBefore(), and moveNode().

The Group Policy editor may stop responding when editing a Group Policy Object (GPO) that contains Group Policy Preferences (GPP) for Internet Explorer 10 settings.

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10, version 1607; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 10 Enterprise LTSB 2015; Windows 8.1
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2; Windows Server 2012
Resolution: This issue was resolved in KB4493470.

Back to top
OS Build 14393.2724

January 08, 2019
KB4480961
Resolved
KB4493470
Resolved:
April 09, 2019
10:00 AM PT

Opened:
January 08, 2019
10:00 AM PT
First character of the Japanese era name not recognized as an abbreviation
After installing KB4480977, the first character of the Japanese era name is not recognized as an abbreviation and may cause date parsing issues.

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10, version 1607; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 10 Enterprise LTSB 2015; Windows 8.1; Windows 7 SP1
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2; Windows Server 2012; Windows Server 2008 R2 SP1; Windows Server 2008 SP2
Resolution: This issue is resolved in KB4487006.

Back to top
OS Build 14393.2759

January 17, 2019
KB4480977
Resolved
KB4487006
Resolved:
February 19, 2019
02:00 PM PT

Opened:
January 17, 2019
02:00 PM PT
Applications using Microsoft Jet database fail to open
Applications that use a Microsoft Jet database with the Microsoft Access 97 file format may fail to open if the database has column names greater than 32 characters. The database will fail to open with the error, “Unrecognized Database Format”.

Affected platforms:
  • Client: Windows 10, version 1709; Windows 10, version 1703; Windows 10, version 1607; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 10 Enterprise LTSB 2015; Windows 8.1; Windows 7 SP1 
  • Server: Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2; Windows Server 2012; Windows Server 2008 R2 SP1; Windows Server 2008 SP2 
Resolution: This issue is resolved in KB4487026.

Back to top
OS Build 14393.2724

January 08, 2019
KB4480961
Resolved
KB4487026
Resolved:
February 12, 2019
10:00 AM PT

Opened:
January 08, 2019
10:00 AM PT
Unable to access hotspots with third-party applications
After installing KB4480961, third-party applications may have difficulty authenticating hotspots.

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10, version 1607; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 10 Enterprise LTSB 2015; Windows 8.1
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2; Windows Server 2012
Resolution: This issue is resolved in KB4480977.

Back to top
OS Build 14393.2724

January 08, 2019
KB4480961
Resolved
KB4480977
Resolved:
January 17, 2019
02:00 PM PT

Opened:
January 08, 2019
10:00 AM PT
" @@ -97,8 +97,8 @@ sections: - type: markdown text: " - - + +
DetailsOriginating updateStatusHistory
Instant search in Microsoft Outlook fails on Windows Server 2016
After installing KB4467684 on Windows Server 2016, instant search in Microsoft Outlook clients fail with the error, \"Outlook cannot perform the search\".

Affected platforms:
  • Client: Windows 10 Enterprise LTSC 2016
  • Server: Windows Server 2016
Resolution: This issue is resolved in KB4487026.

Back to top
OS Build 14393.2639

November 27, 2018
KB4467684
Resolved
KB4487026
Resolved:
February 12, 2019
10:00 AM PT

Opened:
November 27, 2018
10:00 AM PT
System becomes unresponsive when end-user-defined characters (EUDC) are used
When features related to end-user-defined characters (EUDC) are used, the entire system may become unresponsive. 

Affected platforms:
  • Client: Windows 10 Enterprise LTSC 2016
  • Server: Windows Server 2016
Resolution: This issue is resolved in KB4471321

Back to top
OS Build 14393.2639

November 27, 2018
KB4467684
Resolved
KB4471321
Resolved:
December 11, 2018
10:00 AM PT

Opened:
November 27, 2018
10:00 AM PT
Instant search in Microsoft Outlook fails on Windows Server 2016
After installing KB4467684 on Windows Server 2016, instant search in Microsoft Outlook clients fail with the error, \"Outlook cannot perform the search\".

Affected platforms:
  • Client: Windows 10, version 1607; Windows 10 Enterprise LTSC 2016
  • Server: Windows Server 2016
Resolution: This issue is resolved in KB4487026.

Back to top
OS Build 14393.2639

November 27, 2018
KB4467684
Resolved
KB4487026
Resolved:
February 12, 2019
10:00 AM PT

Opened:
November 27, 2018
10:00 AM PT
System becomes unresponsive when end-user-defined characters (EUDC) are used
When features related to end-user-defined characters (EUDC) are used, the entire system may become unresponsive. 

Affected platforms:
  • Client: Windows 10, version 1607; Windows 10 Enterprise LTSC 2016
  • Server: Windows Server 2016
Resolution: This issue is resolved in KB4471321

Back to top
OS Build 14393.2639

November 27, 2018
KB4467684
Resolved
KB4471321
Resolved:
December 11, 2018
10:00 AM PT

Opened:
November 27, 2018
10:00 AM PT
" @@ -107,7 +107,7 @@ sections: - type: markdown text: " - +
DetailsOriginating updateStatusHistory
Unable to use Seek bar in Windows Media Player
After installing KB4462917, users may not be able to use the Seek Bar in Windows Media Player when playing specific files. This issue does not affect normal playback.

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 8.1; Windows 7 SP1
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2; Windows Server 2012; Windows Server 2008 R2 SP1; Windows Server 2008 SP2
Resolution: This issue is resolved in KB4471321.

Back to top
OS Build 14393.2551

October 09, 2018
KB4462917
Resolved
KB4471321
Resolved:
December 11, 2018
10:00 AM PT

Opened:
October 09, 2018
10:00 AM PT
Unable to use Seek bar in Windows Media Player
After installing KB4462917, users may not be able to use the Seek Bar in Windows Media Player when playing specific files. This issue does not affect normal playback.

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10, version 1607; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 10 Enterprise LTSB 2015; Windows 8.1; Windows 7 SP1
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2; Windows Server 2012; Windows Server 2008 R2 SP1; Windows Server 2008 SP2
Resolution: This issue is resolved in KB4471321.

Back to top
OS Build 14393.2551

October 09, 2018
KB4462917
Resolved
KB4471321
Resolved:
December 11, 2018
10:00 AM PT

Opened:
October 09, 2018
10:00 AM PT
" @@ -125,7 +125,7 @@ sections: - type: markdown text: " - - + +
DetailsOriginating updateStatusHistory
SqlConnection instantiation exception on .NET 4.6 and later
After you install the August Preview of Quality Rollup or September 11, 2018 .NET Framework update, instantiation of SqlConnection can throw an exception.

For more information about this issue, see the following article in the Microsoft Knowledge Base: 4470809, SqlConnection instantiation exception on .NET 4.6 and later after August-September 2018 .NET Framework updates.

Affected platforms:
  • Client: Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016
  • Server: Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016
Resolution: This issue is resolved in KB4480977.

Back to top
OS Build 14393.2457

August 30, 2018
KB4343884
Resolved
KB4480977
Resolved:
January 17, 2019
02:00 PM PT

Opened:
August 30, 2018
05:00 PM PT
Issues with install and activation of Key Management Service (KMS) (CSVLK) host keys
After installing KB4343884, installation and client activation of Windows Server 2019 and Windows 10 Enterprise 2019 LTSC Key Management Service (KMS) CSVLK host keys do not work as expected.

Affected platforms:
  • Client: Windows 10 Enterprise LTSC 2016
  • Server: Windows Server 2016
Resolution: This issue is resolved in KB4467684.

Back to top
OS Build 14393.2457

August 30, 2018
KB4343884
Resolved
KB4467684
Resolved:
November 27, 2018
10:00 AM PT

Opened:
August 30, 2018
05:00 PM PT
SqlConnection instantiation exception on .NET 4.6 and later
After you install the August Preview of Quality Rollup or September 11, 2018 .NET Framework update, instantiation of SqlConnection can throw an exception.

For more information about this issue, see the following article in the Microsoft Knowledge Base: 4470809, SqlConnection instantiation exception on .NET 4.6 and later after August-September 2018 .NET Framework updates.

Affected platforms:
  • Client: Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10, version 1607; Windows 10 Enterprise LTSC 2016
  • Server: Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016
Resolution: This issue is resolved in KB4480977.

Back to top
OS Build 14393.2457

August 30, 2018
KB4343884
Resolved
KB4480977
Resolved:
January 17, 2019
02:00 PM PT

Opened:
August 30, 2018
05:00 PM PT
Issues with install and activation of Key Management Service (KMS) (CSVLK) host keys
After installing KB4343884, installation and client activation of Windows Server 2019 and Windows 10 Enterprise 2019 LTSC Key Management Service (KMS) CSVLK host keys do not work as expected.

Affected platforms:
  • Client: Windows 10, version 1607; Windows 10 Enterprise LTSC 2016
  • Server: Windows Server 2016
Resolution: This issue is resolved in KB4467684.

Back to top
OS Build 14393.2457

August 30, 2018
KB4343884
Resolved
KB4467684
Resolved:
November 27, 2018
10:00 AM PT

Opened:
August 30, 2018
05:00 PM PT
" diff --git a/windows/release-information/status-windows-10-1507.yml b/windows/release-information/status-windows-10-1507.yml index 3799300742..f3c067bf78 100644 --- a/windows/release-information/status-windows-10-1507.yml +++ b/windows/release-information/status-windows-10-1507.yml @@ -78,7 +78,7 @@ sections: - type: markdown text: " - +
DetailsOriginating updateStatusHistory
Certain operations performed on a Cluster Shared Volume may fail
Certain operations, such as rename, that you perform on files or folders that are on a Cluster Shared Volume (CSV) may fail with the error, \"STATUS_BAD_IMPERSONATION_LEVEL (0xC00000A5)\". This occurs when you perform the operation on a CSV owner node from a process that doesn’t have administrator privilege.

Affected platforms: 
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 8.1
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2; Windows Server 2012
Workaround: Do one of the following: 
  • Perform the operation from a process that has administrator privilege. 
  • Perform the operation from a node that doesn’t have CSV ownership. 
Next steps: Microsoft is working on a resolution and will provide an update in an upcoming release.

Back to top
OS Build 10240.18186

April 09, 2019
KB4493475
Mitigated
Last updated:
April 26, 2019
10:47 AM PT

Opened:
April 26, 2019
10:47 AM PT
Certain operations performed on a Cluster Shared Volume may fail
Certain operations, such as rename, that you perform on files or folders that are on a Cluster Shared Volume (CSV) may fail with the error, \"STATUS_BAD_IMPERSONATION_LEVEL (0xC00000A5)\". This occurs when you perform the operation on a CSV owner node from a process that doesn’t have administrator privilege.

Affected platforms: 
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10, version 1607; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 10 Enterprise LTSB 2015; Windows 8.1
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2; Windows Server 2012
Workaround: Do one of the following: 
  • Perform the operation from a process that has administrator privilege. 
  • Perform the operation from a node that doesn’t have CSV ownership. 
Next steps: Microsoft is working on a resolution and will provide an update in an upcoming release.

Back to top
OS Build 10240.18186

April 09, 2019
KB4493475
Mitigated
Last updated:
April 26, 2019
10:47 AM PT

Opened:
April 26, 2019
10:47 AM PT
" @@ -87,7 +87,7 @@ sections: - type: markdown text: " - +
DetailsOriginating updateStatusHistory
Custom URI schemes may not start corresponding application
After installing KB4489872, Custom URI Schemes for Application Protocol handlers may not start the corresponding application for local intranet and trusted sites on Internet Explorer.

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 8.1; Windows 7 SP1 
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2; Windows Server 2008 R2 SP1
Resolution: This issue was resolved in KB4493475.

Back to top
OS Build 10240.18158

March 12, 2019
KB4489872
Resolved
KB4493475
Resolved:
April 09, 2019
10:00 AM PT

Opened:
March 12, 2019
10:00 AM PT
Custom URI schemes may not start corresponding application
After installing KB4489872, Custom URI Schemes for Application Protocol handlers may not start the corresponding application for local intranet and trusted sites on Internet Explorer.

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 8.1; Windows 7 SP1 
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2; Windows Server 2008 R2 SP1
Resolution: This issue was resolved in KB4493475.

Back to top
OS Build 10240.18158

March 12, 2019
KB4489872
Resolved
KB4493475
Resolved:
April 09, 2019
10:00 AM PT

Opened:
March 12, 2019
10:00 AM PT
" diff --git a/windows/release-information/status-windows-10-1607-and-windows-server-2016.yml b/windows/release-information/status-windows-10-1607-and-windows-server-2016.yml index fa05010836..f64038ea76 100644 --- a/windows/release-information/status-windows-10-1607-and-windows-server-2016.yml +++ b/windows/release-information/status-windows-10-1607-and-windows-server-2016.yml @@ -84,7 +84,7 @@ sections: - type: markdown text: " - +
DetailsOriginating updateStatusHistory
Certain operations performed on a Cluster Shared Volume may fail
Certain operations, such as rename, that you perform on files or folders that are on a Cluster Shared Volume (CSV) may fail with the error, \"STATUS_BAD_IMPERSONATION_LEVEL (0xC00000A5)\". This occurs when you perform the operation on a CSV owner node from a process that doesn’t have administrator privilege. 

Affected platforms: 
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 8.1
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2; Windows Server 2012
Workaround: Do one of the following:
  • Perform the operation from a process that has administrator privilege. 
  • Perform the operation from a node that doesn’t have CSV ownership.
Next steps: Microsoft is working on a resolution and will provide an update in an upcoming release.

Back to top
OS Build 14393.2906

April 09, 2019
KB4493470
Mitigated
Last updated:
April 26, 2019
10:48 AM PT

Opened:
April 26, 2019
10:48 AM PT
Certain operations performed on a Cluster Shared Volume may fail
Certain operations, such as rename, that you perform on files or folders that are on a Cluster Shared Volume (CSV) may fail with the error, \"STATUS_BAD_IMPERSONATION_LEVEL (0xC00000A5)\". This occurs when you perform the operation on a CSV owner node from a process that doesn’t have administrator privilege. 

Affected platforms: 
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10, version 1607; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507;  Windows 10 Enterprise LTSB 2015; Windows 8.1
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2; Windows Server 2012
Workaround: Do one of the following:
  • Perform the operation from a process that has administrator privilege. 
  • Perform the operation from a node that doesn’t have CSV ownership.
Next steps: Microsoft is working on a resolution and will provide an update in an upcoming release.

Back to top
OS Build 14393.2906

April 09, 2019
KB4493470
Mitigated
Last updated:
April 26, 2019
10:48 AM PT

Opened:
April 26, 2019
10:48 AM PT
" @@ -93,10 +93,10 @@ sections: - type: markdown text: " - + - +
DetailsOriginating updateStatusHistory
Custom URI schemes may not start corresponding application
After installing KB4489882, Custom URI schemes for application protocol handlers may not start the corresponding application for local intranet and trusted sites security zones on Internet Explorer.

Affected platforms: 
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 8.1; Windows 7 SP1 
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2; Windows Server 2008 R2 SP1
Workaround: Right-click the URL link to open it in a new window or tab, or enable Protected Mode in Internet Explorer for local intranet and trusted sites
  1. Go to Tools > Internet options > Security.
  2. Within Select a zone to view or change security settings, select Local intranet and then select Enable Protected Mode.
  3. Select Trusted sites and then select Enable Protected Mode.
  4. Select OK.
You must restart the browser after making these changes.

Next steps: Microsoft is working on a resolution and will provide an update in an upcoming release.

Back to top
OS Build 14393.2848

March 12, 2019
KB4489882
Mitigated
Last updated:
April 09, 2019
10:00 AM PT

Opened:
March 12, 2019
10:00 AM PT
Custom URI schemes may not start corresponding application
After installing KB4489882, Custom URI schemes for application protocol handlers may not start the corresponding application for local intranet and trusted sites security zones on Internet Explorer.

Affected platforms: 
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10, version 1607; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 10 Enterprise LTSB 2015; Windows 8.1; Windows 7 SP1 
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2; Windows Server 2008 R2 SP1
Workaround: Right-click the URL link to open it in a new window or tab, or enable Protected Mode in Internet Explorer for local intranet and trusted sites
  1. Go to Tools > Internet options > Security.
  2. Within Select a zone to view or change security settings, select Local intranet and then select Enable Protected Mode.
  3. Select Trusted sites and then select Enable Protected Mode.
  4. Select OK.
You must restart the browser after making these changes.

Next steps: Microsoft is working on a resolution and will provide an update in an upcoming release.

Back to top
OS Build 14393.2848

March 12, 2019
KB4489882
Mitigated
Last updated:
April 09, 2019
10:00 AM PT

Opened:
March 12, 2019
10:00 AM PT
Issue using PXE to start a device from WDS
After installing KB4489882, there may be issues using the Preboot Execution Environment (PXE) to start a device from a Windows Deployment Services (WDS) server configured to use Variable Window Extension. This may cause the connection to the WDS server to terminate prematurely while downloading the image. This issue does not affect clients or devices that are not using Variable Window Extension.

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10 Enterprise LTSC 2016; Windows 8.1
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server 2016; Windows Server 2012 R2; Windows Server 2012
Workaround: To mitigate the issue, disable the Variable Window Extension on WDS server using one of the following options:
Option 1:
Open an Administrator Command prompt and type the following:
Wdsutil /Set-TransportServer /EnableTftpVariableWindowExtension:No
 
Option 2:
Use the Windows Deployment Services UI to make the following adjustment:
  1. Open Windows Deployment Services from Windows Administrative Tools.
  2. Expand Servers and right-click a WDS server.
  3. Open its properties and clear the Enable Variable Window Extension box on the TFTP tab.
Option 3:
Set the following registry value to 0:
HKLM\\System\\CurrentControlSet\\Services\\WDSServer\\Providers\\WDSTFTP\\EnableVariableWindowExtension
Restart the WDSServer service after disabling the Variable Window Extension.

Next steps: Microsoft is working on a resolution and will provide an update in an upcoming release.

Back to top
OS Build 14393.2848

March 12, 2019
KB4489882
Mitigated
Last updated:
April 09, 2019
10:00 AM PT

Opened:
March 12, 2019
10:00 AM PT
End-user-defined characters (EUDC) cause blue screen at startup
If you enable per font end-user-defined characters (EUDC), the system will stop working and a blue screen may appear at startup. This is not a common setting in non-Asian regions.

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016
Resolution: This issue was resolved in KB4493470.

Back to top
OS Build 14393.2879

March 19, 2019
KB4489889
Resolved
KB4493470
Resolved:
April 09, 2019
10:00 AM PT

Opened:
March 19, 2019
10:00 AM PT
End-user-defined characters (EUDC) cause blue screen at startup
If you enable per font end-user-defined characters (EUDC), the system will stop working and a blue screen may appear at startup. This is not a common setting in non-Asian regions.

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10, version 1607; Windows 10 Enterprise LTSC 2016
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016
Resolution: This issue was resolved in KB4493470.

Back to top
OS Build 14393.2879

March 19, 2019
KB4489889
Resolved
KB4493470
Resolved:
April 09, 2019
10:00 AM PT

Opened:
March 19, 2019
10:00 AM PT
" @@ -105,8 +105,8 @@ sections: - type: markdown text: " - - + +
DetailsOriginating updateStatusHistory
Internet Explorer 11 authentication issue with multiple concurrent logons
After installing KB4480961, Internet Explorer 11 and other applications that use WININET.DLL may have authentication issues. This occurs when two or more people use the same user account for multiple, concurrent login sessions on the same Windows Server machine, including Remote Desktop Protocol (RDP) and Terminal Server logons. Symptoms reported by customers include, but may not be limited to:
  • Cache size and location show zero or empty.
  • Keyboard shortcuts may not work properly.
  • Webpages may intermittently fail to load or render correctly.
  • Issues with credential prompts.
  • Issues when downloading files.
Affected platforms: 
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10 Enterprise LTSC 2016; Windows 8.1; Windows 7 SP1
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server 2016; Windows Server 2012 R2; Windows Server 2012; Windows Server 2008 R2 SP1
Resolution: This issue was resolved in KB4493470.

Back to top
OS Build 14393.2724

January 08, 2019
KB4480961
Resolved
KB4493470
Resolved:
April 09, 2019
10:00 AM PT

Opened:
January 08, 2019
10:00 AM PT
MSXML6 may cause applications to stop responding
After installing KB4480961, MSXML6 causes applications to stop responding if an exception was thrown during node operations, such as appendChild(), insertBefore(), and moveNode().

The Group Policy editor may stop responding when editing a Group Policy Object (GPO) that contains Group Policy Preferences (GPP) for Internet Explorer 10 settings.

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 8.1
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2; Windows Server 2012
Resolution: This issue was resolved in KB4493470.

Back to top
OS Build 14393.2724

January 08, 2019
KB4480961
Resolved
KB4493470
Resolved:
April 09, 2019
10:00 AM PT

Opened:
January 08, 2019
10:00 AM PT
Internet Explorer 11 authentication issue with multiple concurrent logons
After installing KB4480961, Internet Explorer 11 and other applications that use WININET.DLL may have authentication issues. This occurs when two or more people use the same user account for multiple, concurrent login sessions on the same Windows Server machine, including Remote Desktop Protocol (RDP) and Terminal Server logons. Symptoms reported by customers include, but may not be limited to:
  • Cache size and location show zero or empty.
  • Keyboard shortcuts may not work properly.
  • Webpages may intermittently fail to load or render correctly.
  • Issues with credential prompts.
  • Issues when downloading files.
Affected platforms: 
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1607; Windows 10 Enterprise LTSC 2016; Windows 8.1; Windows 7 SP1
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server 2016; Windows Server 2012 R2; Windows Server 2012; Windows Server 2008 R2 SP1
Resolution: This issue was resolved in KB4493470.

Back to top
OS Build 14393.2724

January 08, 2019
KB4480961
Resolved
KB4493470
Resolved:
April 09, 2019
10:00 AM PT

Opened:
January 08, 2019
10:00 AM PT
MSXML6 may cause applications to stop responding
After installing KB4480961, MSXML6 causes applications to stop responding if an exception was thrown during node operations, such as appendChild(), insertBefore(), and moveNode().

The Group Policy editor may stop responding when editing a Group Policy Object (GPO) that contains Group Policy Preferences (GPP) for Internet Explorer 10 settings.

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10, version 1607; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 10 Enterprise LTSB 2015; Windows 8.1
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2; Windows Server 2012
Resolution: This issue was resolved in KB4493470.

Back to top
OS Build 14393.2724

January 08, 2019
KB4480961
Resolved
KB4493470
Resolved:
April 09, 2019
10:00 AM PT

Opened:
January 08, 2019
10:00 AM PT
" @@ -115,8 +115,8 @@ sections: - type: markdown text: " - - - + + +
DetailsOriginating updateStatusHistory
Cluster service may fail if the minimum password length is set to greater than 14
After installing KB4467684, the cluster service may fail to start with the error \"2245 (NERR_PasswordTooShort)\" if the Group Policy \"Minimum Password Length\" is configured with greater than 14 characters.

Affected platforms:
  • Client: Windows 10 Enterprise LTSC 2016
  • Server: Windows Server 2016
Workaround: Set the domain default \"Minimum Password Length\" policy to less than or equal to 14 characters.

Next steps: Microsoft is working on a resolution and will provide an update in an upcoming release.

Back to top
OS Build 14393.2639

November 27, 2018
KB4467684
Mitigated
Last updated:
April 09, 2019
10:00 AM PT

Opened:
November 27, 2018
10:00 AM PT
SCVMM cannot enumerate and manage logical switches deployed on the host
For hosts managed by System Center Virtual Machine Manager (VMM), VMM cannot enumerate and manage logical switches deployed on the host after installing KB4467684.

Additionally, if you do not follow the best practices, a stop error may occur in vfpext.sys on the hosts.

Affected platforms:
  • Client: Windows 10 Enterprise LTSC 2016
  • Server: Windows Server 2016
Workaround:
Run mofcomp on the following mof files on the affected host:

  • Scvmmswitchportsettings.mof
  • VMMDHCPSvr.mof
Follow the best practices while patching to avoid a stop error in vfpext.sys in an SDN v2 environment (NC managed hosts).

Back to top
OS Build 14393.2639

November 27, 2018
KB4467684
Mitigated
Last updated:
April 09, 2019
10:00 AM PT

Opened:
November 27, 2018
10:00 AM PT
Windows may not start on certain Lenovo and Fujitsu laptops with less than 8GB of RAM
After installing KB4467691, Windows may fail to start on certain Lenovo and Fujitsu laptops that have less than 8 GB of RAM.

Affected platforms:
  • Client: Windows 10 Enterprise LTSC 2016
  • Server: Windows Server 2016
Workaround: Restart the affected machine using the Unified Extensible Firmware Interface (UEFI). Disable Secure Boot and then restart.

If BitLocker is enabled on your machine, you may have to go through BitLocker recovery after Secure Boot has been disabled.

Next steps: Lenovo and Fujitsu are aware of this issue. Please contact your OEM to ask if there is a firmware update available for your device.

Back to top
OS Build 14393.2608

November 13, 2018
KB4467691
Mitigated
Last updated:
February 19, 2019
10:00 AM PT

Opened:
November 13, 2018
10:00 AM PT
Cluster service may fail if the minimum password length is set to greater than 14
After installing KB4467684, the cluster service may fail to start with the error \"2245 (NERR_PasswordTooShort)\" if the Group Policy \"Minimum Password Length\" is configured with greater than 14 characters.

Affected platforms:
  • Client: Windows 10, version 1607; Windows 10 Enterprise LTSC 2016
  • Server: Windows Server 2016
Workaround: Set the domain default \"Minimum Password Length\" policy to less than or equal to 14 characters.

Next steps: Microsoft is working on a resolution and will provide an update in an upcoming release.

Back to top
OS Build 14393.2639

November 27, 2018
KB4467684
Mitigated
Last updated:
April 09, 2019
10:00 AM PT

Opened:
November 27, 2018
10:00 AM PT
SCVMM cannot enumerate and manage logical switches deployed on the host
For hosts managed by System Center Virtual Machine Manager (VMM), VMM cannot enumerate and manage logical switches deployed on the host after installing KB4467684.

Additionally, if you do not follow the best practices, a stop error may occur in vfpext.sys on the hosts.

Affected platforms:
  • Client: Windows 10, version 1607; Windows 10 Enterprise LTSC 2016
  • Server: Windows Server 2016
Workaround:
Run mofcomp on the following mof files on the affected host:

  • Scvmmswitchportsettings.mof
  • VMMDHCPSvr.mof
Follow the best practices while patching to avoid a stop error in vfpext.sys in an SDN v2 environment (NC managed hosts).

Back to top
OS Build 14393.2639

November 27, 2018
KB4467684
Mitigated
Last updated:
April 09, 2019
10:00 AM PT

Opened:
November 27, 2018
10:00 AM PT
Windows may not start on certain Lenovo and Fujitsu laptops with less than 8GB of RAM
After installing KB4467691, Windows may fail to start on certain Lenovo and Fujitsu laptops that have less than 8 GB of RAM.

Affected platforms:
  • Client: Windows 10, version 1607; Windows 10 Enterprise LTSC 2016
  • Server: Windows Server 2016
Workaround: Restart the affected machine using the Unified Extensible Firmware Interface (UEFI). Disable Secure Boot and then restart.

If BitLocker is enabled on your machine, you may have to go through BitLocker recovery after Secure Boot has been disabled.

Next steps: Lenovo and Fujitsu are aware of this issue. Please contact your OEM to ask if there is a firmware update available for your device.

Back to top
OS Build 14393.2608

November 13, 2018
KB4467691
Mitigated
Last updated:
February 19, 2019
10:00 AM PT

Opened:
November 13, 2018
10:00 AM PT
" diff --git a/windows/release-information/status-windows-10-1703.yml b/windows/release-information/status-windows-10-1703.yml index 9e33ec0f4d..c3bea56d97 100644 --- a/windows/release-information/status-windows-10-1703.yml +++ b/windows/release-information/status-windows-10-1703.yml @@ -79,7 +79,7 @@ sections: - type: markdown text: " - +
DetailsOriginating updateStatusHistory
Certain operations performed on a Cluster Shared Volume may fail
Certain operations, such as rename, that you perform on files or folders that are on a Cluster Shared Volume (CSV) may fail with the error, “STATUS_BAD_IMPERSONATION_LEVEL (0xC00000A5)”. This occurs when you perform the operation on a CSV owner node from a process that doesn’t have administrator privilege. 

Affected platforms: 
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 8.1
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2; Windows Server 2012
Workaround: Do one of the following: 
  • Perform the operation from a process that has administrator privilege. 
  • Perform the operation from a node that doesn’t have CSV ownership. 
Next steps: Microsoft is working on a resolution and will provide an update in an upcoming release.

Back to top
OS Build 15063.1746

April 09, 2019
KB4493474
Mitigated
Last updated:
April 26, 2019
10:49 AM PT

Opened:
April 26, 2019
10:49 AM PT
Certain operations performed on a Cluster Shared Volume may fail
Certain operations, such as rename, that you perform on files or folders that are on a Cluster Shared Volume (CSV) may fail with the error, “STATUS_BAD_IMPERSONATION_LEVEL (0xC00000A5)”. This occurs when you perform the operation on a CSV owner node from a process that doesn’t have administrator privilege. 

Affected platforms: 
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10, version 1607; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 10 Enterprise LTSB 2015; Windows 8.1
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2; Windows Server 2012
Workaround: Do one of the following: 
  • Perform the operation from a process that has administrator privilege. 
  • Perform the operation from a node that doesn’t have CSV ownership. 
Next steps: Microsoft is working on a resolution and will provide an update in an upcoming release.

Back to top
OS Build 15063.1746

April 09, 2019
KB4493474
Mitigated
Last updated:
April 26, 2019
10:49 AM PT

Opened:
April 26, 2019
10:49 AM PT
" diff --git a/windows/release-information/status-windows-10-1709.yml b/windows/release-information/status-windows-10-1709.yml index 24c835a3d9..a8062681f9 100644 --- a/windows/release-information/status-windows-10-1709.yml +++ b/windows/release-information/status-windows-10-1709.yml @@ -80,7 +80,7 @@ sections: - type: markdown text: " - +
DetailsOriginating updateStatusHistory
Certain operations performed on a Cluster Shared Volume may fail
Certain operations, such as rename, that you perform on files or folders that are on a Cluster Shared Volume (CSV) may fail with the error, \"STATUS_BAD_IMPERSONATION_LEVEL (0xC00000A5)\". This occurs when you perform the operation on a CSV owner node from a process that doesn’t have administrator privilege. 

Affected platforms: 
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 8.1
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2; Windows Server 2012
Workaround: Do one of the following:
  • Perform the operation from a process that has administrator privilege. 
  • Perform the operation from a node that doesn’t have CSV ownership. 
Next steps: Microsoft is working on a resolution and will provide an update in an upcoming release.

Back to top
OS Build 16299.1087

April 09, 2019
KB4493441
Mitigated
Last updated:
April 26, 2019
10:49 AM PT

Opened:
April 26, 2019
10:49 AM PT
Certain operations performed on a Cluster Shared Volume may fail
Certain operations, such as rename, that you perform on files or folders that are on a Cluster Shared Volume (CSV) may fail with the error, \"STATUS_BAD_IMPERSONATION_LEVEL (0xC00000A5)\". This occurs when you perform the operation on a CSV owner node from a process that doesn’t have administrator privilege. 

Affected platforms: 
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10, version 1607; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 10 Enterprise LTSB 2015; Windows 8.1
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2; Windows Server 2012
Workaround: Do one of the following:
  • Perform the operation from a process that has administrator privilege. 
  • Perform the operation from a node that doesn’t have CSV ownership. 
Next steps: Microsoft is working on a resolution and will provide an update in an upcoming release.

Back to top
OS Build 16299.1087

April 09, 2019
KB4493441
Mitigated
Last updated:
April 26, 2019
10:49 AM PT

Opened:
April 26, 2019
10:49 AM PT
" diff --git a/windows/release-information/status-windows-10-1803.yml b/windows/release-information/status-windows-10-1803.yml index 7d0efcb279..410fba505d 100644 --- a/windows/release-information/status-windows-10-1803.yml +++ b/windows/release-information/status-windows-10-1803.yml @@ -81,7 +81,7 @@ sections: - type: markdown text: " - +
DetailsOriginating updateStatusHistory
Certain operations performed on a Cluster Shared Volume may fail
Certain operations, such as rename, that you perform on files or folders that are on a Cluster Shared Volume (CSV) may fail with the error, \"STATUS_BAD_IMPERSONATION_LEVEL (0xC00000A5)\". This occurs when you perform the operation on a CSV owner node from a process that doesn’t have administrator privilege.

Affected platforms: 
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 8.1
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2; Windows Server 2012
Workaround: Do one of the following:
  • Perform the operation from a process that has administrator privilege. 
  • Perform the operation from a node that doesn’t have CSV ownership. 
Next steps: Microsoft is working on a resolution and will provide an update in an upcoming release.

Back to top
OS Build 17134.706

April 09, 2019
KB4493464
Mitigated
Last updated:
April 26, 2019
10:49 AM PT

Opened:
April 26, 2019
10:49 AM PT
Certain operations performed on a Cluster Shared Volume may fail
Certain operations, such as rename, that you perform on files or folders that are on a Cluster Shared Volume (CSV) may fail with the error, \"STATUS_BAD_IMPERSONATION_LEVEL (0xC00000A5)\". This occurs when you perform the operation on a CSV owner node from a process that doesn’t have administrator privilege.

Affected platforms: 
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10, version 1607; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 10 Enterprise LTSB 2015; Windows 8.1
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2; Windows Server 2012
Workaround: Do one of the following:
  • Perform the operation from a process that has administrator privilege. 
  • Perform the operation from a node that doesn’t have CSV ownership. 
Next steps: Microsoft is working on a resolution and will provide an update in an upcoming release.

Back to top
OS Build 17134.706

April 09, 2019
KB4493464
Mitigated
Last updated:
April 26, 2019
10:49 AM PT

Opened:
April 26, 2019
10:49 AM PT
" diff --git a/windows/release-information/status-windows-10-1809-and-windows-server-2019.yml b/windows/release-information/status-windows-10-1809-and-windows-server-2019.yml index 377593f13c..d181dd1890 100644 --- a/windows/release-information/status-windows-10-1809-and-windows-server-2019.yml +++ b/windows/release-information/status-windows-10-1809-and-windows-server-2019.yml @@ -90,7 +90,7 @@ sections: text: " - +
DetailsOriginating updateStatusHistory
System may be unresponsive after restart if ArcaBit antivirus software installed
Microsoft and ArcaBit have identified an issue on devices with ArcaBit antivirus software installed that may cause the system to become unresponsive upon restart after installing KB4493509
 
Microsoft has temporarily blocked devices from receiving this update if ArcaBit antivirus software is installed. 

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 8.1; Windows 7 SP1
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server 2012 R2; Windows Server 2008 R2 SP1
ArcaBit has released an update to address this issue. For more information, see the Arcabit support article.

Back to top
OS Build 17763.437

April 09, 2019
KB4493509
Mitigated
Last updated:
April 26, 2019
10:50 AM PT

Opened:
April 26, 2019
10:50 AM PT
Certain operations performed on a Cluster Shared Volume may fail
Certain operations, such as rename, that you perform on files or folders that are on a Cluster Shared Volume (CSV) may fail with the error, \"STATUS_BAD_IMPERSONATION_LEVEL (0xC00000A5)\". This occurs when you perform the operation on a CSV owner node from a process that doesn’t have administrator privilege. 

Affected platforms: 
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 8.1
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2; Windows Server 2012
Workaround: Do one of the following:  
  • Perform the operation from a process that has administrator privilege. 
  • Perform the operation from a node that doesn’t have CSV ownership. 
Next steps: Microsoft is working on a resolution and will provide an update in an upcoming release.

Back to top
OS Build 17763.437

April 09, 2019
KB4493509
Mitigated
Last updated:
April 26, 2019
10:50 AM PT

Opened:
April 26, 2019
10:50 AM PT
Certain operations performed on a Cluster Shared Volume may fail
Certain operations, such as rename, that you perform on files or folders that are on a Cluster Shared Volume (CSV) may fail with the error, \"STATUS_BAD_IMPERSONATION_LEVEL (0xC00000A5)\". This occurs when you perform the operation on a CSV owner node from a process that doesn’t have administrator privilege. 

Affected platforms: 
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10, version 1607; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 10 Enterprise LTSB 2015; Windows 8.1
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2; Windows Server 2012
Workaround: Do one of the following:  
  • Perform the operation from a process that has administrator privilege. 
  • Perform the operation from a node that doesn’t have CSV ownership. 
Next steps: Microsoft is working on a resolution and will provide an update in an upcoming release.

Back to top
OS Build 17763.437

April 09, 2019
KB4493509
Mitigated
Last updated:
April 26, 2019
10:50 AM PT

Opened:
April 26, 2019
10:50 AM PT
End-user-defined characters (EUDC) may cause blue screen at startup
If you enable per font end-user-defined characters (EUDC), the system will stop working and a blue screen may appear at startup. This is not a common setting in non-Asian regions.

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016
Workaround: To avoid this issue, don't enable per font EUDC. As an alternative, you can edit the registry to mitigate this issue; for more information, see KB4496149.

Resolved: This issue was resolved in KB4493509.

Back to top
OS Build 17763.404

April 02, 2019
KB4490481
Resolved
KB4493509
Resolved:
April 09, 2019
10:00 AM PT

Opened:
April 02, 2019
10:00 AM PT
" diff --git a/windows/release-information/status-windows-7-and-windows-server-2008-r2-sp1.yml b/windows/release-information/status-windows-7-and-windows-server-2008-r2-sp1.yml index 64842126b7..9b42a15cc7 100644 --- a/windows/release-information/status-windows-7-and-windows-server-2008-r2-sp1.yml +++ b/windows/release-information/status-windows-7-and-windows-server-2008-r2-sp1.yml @@ -87,7 +87,7 @@ sections: text: " - + diff --git a/windows/release-information/status-windows-server-2008-sp2.yml b/windows/release-information/status-windows-server-2008-sp2.yml index 424793f5bc..f2da47d071 100644 --- a/windows/release-information/status-windows-server-2008-sp2.yml +++ b/windows/release-information/status-windows-server-2008-sp2.yml @@ -90,7 +90,7 @@ sections: - type: markdown text: "
DetailsOriginating updateStatusHistory
System may be unresponsive after restart if Avira antivirus software installed.
Microsoft and Avira have identified an issue on devices with Avira antivirus software installed that may cause the system to become unresponsive upon restart after installing KB4493472.

Microsoft has temporarily blocked devices from receiving this update if Avira antivirus software is installed.

Affected platforms: 
  • Client: Windows 8.1; Windows 7 SP1 
  • Server: Windows Server 2012 R2; Windows Server 2012; Windows Server 2008 R2 SP1; Windows Server 2008 SP2
Next steps: We are presently investigating this issue with Avira and will provide an update when available.

Back to top
April 09, 2019
KB4493472
Investigating
Last updated:
April 09, 2019
10:00 AM PT

Opened:
April 09, 2019
10:00 AM PT
System may be unresponsive after restart with certain McAfee antivirus products
Microsoft and McAfee have identified an issue on devices with McAfee Endpoint Security (ENS) Threat Prevention 10.x or McAfee Host Intrusion Prevention (Host IPS) 8.0 or McAfee VirusScan Enterprise (VSE) 8.8 installed. It may cause the system to have slow startup or become unresponsive at restart after installing this update. 

Affected platforms:
  • Client: Windows 7 SP 1
  • Server: Windows Server 2008 R2 SP1
Workaround: Guidance for McAfee customers can be found in the following McAfee support articles: 

Next steps: We are presently investigating this issue with McAfee. We will provide an update once we have more information.

Back to top
April 09, 2019
KB4493472
Mitigated
Last updated:
April 26, 2019
11:41 AM PT

Opened:
April 26, 2019
11:41 AM PT
System may be unresponsive after restart with certain McAfee antivirus products
Microsoft and McAfee have identified an issue on devices with McAfee Endpoint Security (ENS) Threat Prevention 10.x or McAfee Host Intrusion Prevention (Host IPS) 8.0 or McAfee VirusScan Enterprise (VSE) 8.8 installed. It may cause the system to have slow startup or become unresponsive at restart after installing this update. 

Affected platforms:
  • Client: Windows 7 SP1
  • Server: Windows Server 2008 R2 SP1
Workaround: Guidance for McAfee customers can be found in the following McAfee support articles: 

Next steps: We are presently investigating this issue with McAfee. We will provide an update once we have more information.

Back to top
April 09, 2019
KB4493472
Mitigated
Last updated:
April 26, 2019
11:41 AM PT

Opened:
April 26, 2019
11:41 AM PT
System unresponsive after restart if Sophos Endpoint Protection installed.
Microsoft and Sophos have identified an issue on devices with Sophos Endpoint Protection installed and managed by either Sophos Central or Sophos Enterprise Console (SEC) that may cause the system to become unresponsive upon restart after installing KB4493472.

Microsoft has temporarily blocked devices from receiving this update if the Sophos Endpoint is installed until a solution is available.

Affected platforms: 
  • Client: Windows 8.1; Windows 7 SP1
  • Server: Windows Server 2012 R2; Windows Server 2012; Windows Server 2008 R2 SP1; Windows Server 2008 SP2
Guidance for Sophos Endpoint and Sophos Enterprise Console customers can be found in the Sophos support article.

Back to top
April 09, 2019
KB4493472
Mitigated
Last updated:
April 09, 2019
10:00 AM PT

Opened:
April 09, 2019
10:00 AM PT
System may be unresponsive after restart if ArcaBit antivirus software installed.
Microsoft and ArcaBit have identified an issue on devices with ArcaBit antivirus software installed that may cause the system to become unresponsive upon restart after installing KB4493472.

Microsoft has temporarily blocked devices from receiving this update if ArcaBit antivirus software is installed.

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 8.1; Windows 7 SP1
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server 2012 R2; Windows Server 2008 R2 SP1
ArcaBit has released an update to address this issue. For more information, see the Arcabit support article.

Back to top
April 09, 2019
KB4493472
Mitigated
Last updated:
April 09, 2019
10:00 AM PT

Opened:
April 09, 2019
10:00 AM PT
Devices may not respond at login or Welcome screen if running certain Avast software.
Microsoft and Avast have identified an issue on devices running Avast for Business, Avast CloudCare, and AVG Business Edition antivirus software after you install KB4493472 and restart. Devices may become unresponsive at the login or Welcome screen. Additionally, you may be unable to log in or log in after an extended period of time.

Affected platforms: 
  • Client: Windows 8.1; Windows 7 SP1 
  • Server: Windows Server 2012 R2; Windows Server 2008 R2 SP1 
Resolution: Avast has released emergency updates to address this issue. For more information and AV update schedule, see the Avast support KB article.

Back to top
April 09, 2019
KB4493472
Resolved
Resolved:
April 09, 2019
10:00 AM PT

Opened:
April 09, 2019
10:00 AM PT
- +
DetailsOriginating updateStatusHistory
Authentication may fail for services after the Kerberos ticket expires
After installing KB4489880, some customers report that authentication fails for services that require unconstrained delegation after the Kerberos ticket expires (the default is 10 hours). For example, the SQL server service fails.

Affected platforms: 
  • Client: Windows 7 SP1
  • Server: Windows Server 2008 R2 SP1; Windows Server 2008 SP2
Workaround: To mitigate this issue, use one of the following options:

  • Option 1: Purge the Kerberos tickets on the application server. After the Kerberos ticket expires, the issue will occur again, and you must purge the tickets again.
  • Option 2: If purging does not mitigate the issue, restart the application; for example, restart the Internet Information Services (IIS) app pool associated with the SQL server.
  • Option 3: Use constrained delegation.
Next steps: Microsoft is working on a resolution and will provide an update in an upcoming release.

Back to top
March 12, 2019
KB4489880
Mitigated
Last updated:
March 12, 2019
10:00 AM PT

Opened:
March 12, 2019
10:00 AM PT
Authentication may fail for services after the Kerberos ticket expires
After installing KB4489880, some customers report that authentication fails for services that require unconstrained delegation after the Kerberos ticket expires (the default is 10 hours). For example, the SQL server service fails.

Affected platforms: 
  • Client: Windows 7 SP1
  • Server: Windows Server 2008 R2 SP1; Windows Server 2008 SP2
Workaround: To mitigate this issue, use one of the following options:
  • Option 1: Purge the Kerberos tickets on the application server. After the Kerberos ticket expires, the issue will occur again, and you must purge the tickets again.
  • Option 2: If purging does not mitigate the issue, restart the application; for example, restart the Internet Information Services (IIS) app pool associated with the SQL server.
  • Option 3: Use constrained delegation.
Next steps: Microsoft is working on a resolution and will provide an update in an upcoming release.

Back to top
March 12, 2019
KB4489880
Mitigated
Last updated:
March 12, 2019
10:00 AM PT

Opened:
March 12, 2019
10:00 AM PT
NETDOM.EXE fails to run
After installing KB4489880, NETDOM.EXE fails to run, and the on-screen error, “The command failed to complete successfully.” appears.

Affected platforms: 
  • Client: Windows 7 SP1
  • Server: Windows Server 2008 R2 SP1; Windows Server 2008 SP2
Resolution: This issue is resolved in KB4493471.

Back to top
March 12, 2019
KB4489880
Resolved
KB4493471
Resolved:
April 09, 2019
10:00 AM PT

Opened:
March 12, 2019
10:00 AM PT
" diff --git a/windows/release-information/status-windows-server-2012.yml b/windows/release-information/status-windows-server-2012.yml index 9088b79602..666d54ff29 100644 --- a/windows/release-information/status-windows-server-2012.yml +++ b/windows/release-information/status-windows-server-2012.yml @@ -111,7 +111,7 @@ sections: - type: markdown text: " - +
DetailsOriginating updateStatusHistory
Certain operations performed on a Cluster Shared Volume may fail
Certain operations, such as rename, that you perform on files or folders that are on a Cluster Shared Volume (CSV) may fail with the error, \"STATUS_BAD_IMPERSONATION_LEVEL (0xC00000A5)\". This occurs when you perform the operation on a CSV owner node from a process that doesn’t have administrator privilege.

Affected platforms: 
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 8.1
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2; Windows Server 2012
Workaround: Do one of the following:
  • Perform the operation from a process that has administrator privilege.
  • Perform the operation from a node that doesn’t have CSV ownership.
Next steps: Microsoft is working on a resolution and will provide an update in an upcoming release.

Back to top
January 08, 2019
KB4480975
Mitigated
Last updated:
January 08, 2019
10:00 AM PT

Opened:
January 08, 2019
10:00 AM PT
Certain operations performed on a Cluster Shared Volume may fail
Certain operations, such as rename, that you perform on files or folders that are on a Cluster Shared Volume (CSV) may fail with the error, \"STATUS_BAD_IMPERSONATION_LEVEL (0xC00000A5)\". This occurs when you perform the operation on a CSV owner node from a process that doesn’t have administrator privilege.

Affected platforms: 
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10, version 1607; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 10 Enterprise LTSB 2015; Windows 8.1
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2; Windows Server 2012
Workaround: Do one of the following:
  • Perform the operation from a process that has administrator privilege.
  • Perform the operation from a node that doesn’t have CSV ownership.
Next steps: Microsoft is working on a resolution and will provide an update in an upcoming release.

Back to top
January 08, 2019
KB4480975
Mitigated
Last updated:
January 08, 2019
10:00 AM PT

Opened:
January 08, 2019
10:00 AM PT
Internet Explorer 11 authentication issue with multiple concurrent logons
After installing KB4480975, Internet Explorer 11 and other applications that use WININET.DLL may have authentication issues. This occurs when two or more people use the same user account for multiple, concurrent login sessions on the same Windows Server machine, including Remote Desktop Protocol (RDP) and Terminal Server logons. Symptoms reported by customers include, but may not be limited to:
  • Cache size and location show zero or empty.
  • Keyboard shortcuts may not work properly.
  • Webpages may intermittently fail to load or render correctly.
  • Issues with credential prompts.
  • Issues when downloading files.
Affected platforms: 
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10 Enterprise LTSC 2016; Windows 8.1; Windows 7 SP1
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server 2016; Windows Server 2012 R2; Windows Server 2012; Windows Server 2008 R2 SP1
Resolution: This issue is resolved in KB4493451.

Back to top
January 08, 2019
KB4480975
Resolved
KB4493451
Resolved:
April 09, 2019
10:00 AM PT

Opened:
January 08, 2019
10:00 AM PT
MSXML6 may cause applications to stop responding
After installing KB4480975, MSXML6 causes applications to stop responding if an exception was thrown during node operations, such as appendChild(), insertBefore(), and moveNode().

The Group Policy editor may stop responding when editing a Group Policy Object (GPO) that contains Group Policy Preferences (GPP) for Internet Explorer 10 settings.

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 8.1
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2; Windows Server 2012
Resolution: This issue is resolved in KB4493451.

Back to top
January 08, 2019
KB4480975
Resolved
KB4493451
Resolved:
April 09, 2019
10:00 AM PT

Opened:
January 08, 2019
10:00 AM PT
From 155886db97a778758f7cb5e93cb5efef72829dfa Mon Sep 17 00:00:00 2001 From: "Nisha Mittal (Wipro Ltd.)" Date: Fri, 26 Apr 2019 18:07:21 -0700 Subject: [PATCH 228/724] Fixed Cards Underline issue --- .../resolved-issues-windows-10-1507.yml | 14 +++++++------- .../resolved-issues-windows-10-1607.yml | 4 ++-- .../resolved-issues-windows-10-1703.yml | 12 ++++++------ .../resolved-issues-windows-10-1709.yml | 12 ++++++------ .../resolved-issues-windows-10-1803.yml | 12 ++++++------ ...s-windows-10-1809-and-windows-server-2019.yml | 16 ++++++++-------- ...-windows-7-and-windows-server-2008-r2-sp1.yml | 12 ++++++------ ...es-windows-8.1-and-windows-server-2012-r2.yml | 16 ++++++++-------- .../resolved-issues-windows-server-2008-sp2.yml | 4 ++-- .../resolved-issues-windows-server-2012.yml | 12 ++++++------ .../status-windows-10-1507.yml | 6 +++--- ...s-windows-10-1607-and-windows-server-2016.yml | 10 +++++----- .../status-windows-10-1703.yml | 6 +++--- .../status-windows-10-1709.yml | 6 +++--- .../status-windows-10-1803.yml | 10 +++++----- ...s-windows-10-1809-and-windows-server-2019.yml | 12 ++++++------ ...-windows-7-and-windows-server-2008-r2-sp1.yml | 6 +++--- ...us-windows-8.1-and-windows-server-2012-r2.yml | 12 ++++++------ .../status-windows-server-2008-sp2.yml | 2 +- .../status-windows-server-2012.yml | 8 ++++---- 20 files changed, 96 insertions(+), 96 deletions(-) diff --git a/windows/release-information/resolved-issues-windows-10-1507.yml b/windows/release-information/resolved-issues-windows-10-1507.yml index 95fe9914b0..34492a31b0 100644 --- a/windows/release-information/resolved-issues-windows-10-1507.yml +++ b/windows/release-information/resolved-issues-windows-10-1507.yml @@ -57,7 +57,7 @@ sections: - type: markdown text: " - +
DetailsOriginating updateStatusHistory
Custom URI schemes may not start corresponding application
After installing KB4489872, Custom URI Schemes for Application Protocol handlers may not start the corresponding application for local intranet and trusted sites on Internet Explorer.

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 8.1; Windows 7 SP1 
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2; Windows Server 2008 R2 SP1
Resolution: This issue was resolved in KB4493475.

Back to top
OS Build 10240.18158

March 12, 2019
KB4489872
Resolved
KB4493475
Resolved:
April 09, 2019
10:00 AM PT

Opened:
March 12, 2019
10:00 AM PT
Custom URI schemes may not start corresponding application
After installing KB4489872, Custom URI Schemes for Application Protocol handlers may not start the corresponding application for local intranet and trusted sites on Internet Explorer.

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10, version 1607; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 10 Enterprise LTSB 2015; Windows 8.1; Windows 7 SP1 
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2; Windows Server 2008 R2 SP1
Resolution: This issue was resolved in KB4493475.

Back to top
OS Build 10240.18158

March 12, 2019
KB4489872
Resolved
KB4493475
Resolved:
April 09, 2019
10:00 AM PT

Opened:
March 12, 2019
10:00 AM PT
" @@ -67,9 +67,9 @@ sections: text: " - - - + + +
DetailsOriginating updateStatusHistory
Applications using Microsoft Jet database and Access 95 file format stop working
Applications that use a Microsoft Jet database with the Microsoft Access 95 file format may randomly stop working.

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 7 SP1
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2; Windows Server 2012; Windows Server 2008 R2 SP1; Windows Server 2008 SP2
Resolution: This issue is resolved in KB4489872.

Back to top
OS Build 10240.18132

February 12, 2019
KB4487018
Resolved
KB4489872
Resolved:
March 12, 2019
10:00 AM PT

Opened:
February 12, 2019
10:00 AM PT
Error 1309 when installing/uninstalling MSI or MSP files
After installing KB4487018, users may receive “Error 1309” while installing or uninstalling certain types of MSI and MSP files.

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 8.1
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2; Windows Server 2012
Resolution: This issue is resolved in KB4489872.

Back to top
OS Build 10240.18132

February 12, 2019
KB4487018
Resolved
KB4489872
Resolved:
March 12, 2019
10:00 AM PT

Opened:
February 12, 2019
10:00 AM PT
First character of Japanese era name not recognized
After installing KB4487018, the first character of the Japanese era name is not recognized as an abbreviation and may cause date parsing issues.

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 8.1; Windows 7 SP1
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2; Windows Server 2012; Windows Server 2008 R2 SP1; Windows Server 2008 SP2
Resolution: This issue is resolved in KB4489872.

Back to top
OS Build 10240.18132

February 12, 2019
KB4487018
Resolved
KB4489872
Resolved:
March 12, 2019
10:00 AM PT

Opened:
February 12, 2019
10:00 AM PT
Internet Explorer may fail to load images
After installing KB4487018, Internet Explorer may fail to load images with a backslash (\\) in their relative source path.

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 8.1; Windows 7 SP1
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2; Windows Server 2008 R2 SP1
Resolution: This issue is resolved in KB4491101.

Back to top
OS Build 10240.18132

February 12, 2019
KB4487018
Resolved
KB4491101
Resolved:
February 21, 2019
02:00 PM PT

Opened:
February 12, 2019
10:00 AM PT
Error 1309 when installing/uninstalling MSI or MSP files
After installing KB4487018, users may receive “Error 1309” while installing or uninstalling certain types of MSI and MSP files.

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10, version 1607; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 10 Enterprise LTSB 2015; Windows 8.1
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2; Windows Server 2012
Resolution: This issue is resolved in KB4489872.

Back to top
OS Build 10240.18132

February 12, 2019
KB4487018
Resolved
KB4489872
Resolved:
March 12, 2019
10:00 AM PT

Opened:
February 12, 2019
10:00 AM PT
First character of Japanese era name not recognized
After installing KB4487018, the first character of the Japanese era name is not recognized as an abbreviation and may cause date parsing issues.

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10, version 1607; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 10 Enterprise LTSB 2015; Windows 8.1; Windows 7 SP1
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2; Windows Server 2012; Windows Server 2008 R2 SP1; Windows Server 2008 SP2
Resolution: This issue is resolved in KB4489872.

Back to top
OS Build 10240.18132

February 12, 2019
KB4487018
Resolved
KB4489872
Resolved:
March 12, 2019
10:00 AM PT

Opened:
February 12, 2019
10:00 AM PT
Internet Explorer may fail to load images
After installing KB4487018, Internet Explorer may fail to load images with a backslash (\\) in their relative source path.

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10, version 1607; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 10 Enterprise LTSB 2015; Windows 8.1; Windows 7 SP1
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2; Windows Server 2008 R2 SP1
Resolution: This issue is resolved in KB4491101.

Back to top
OS Build 10240.18132

February 12, 2019
KB4487018
Resolved
KB4491101
Resolved:
February 21, 2019
02:00 PM PT

Opened:
February 12, 2019
10:00 AM PT
" @@ -78,9 +78,9 @@ sections: - type: markdown text: " - + - +
DetailsOriginating updateStatusHistory
MSXML6 may cause applications to stop responding
After installing KB4480962, MSXML6 causes applications to stop responding if an exception was thrown during node operations, such as appendChild(), insertBefore(), and moveNode().

The Group Policy editor may stop responding when editing a Group Policy Object (GPO) that contains Group Policy Preferences (GPP) for Internet Explorer 10 settings.

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 8.1
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2; Windows Server 2012
Resolution: This issue was resolved in KB4493475.

Back to top
OS Build 10240.18094

January 08, 2019
KB4480962
Resolved
KB4493475
Resolved:
April 09, 2019
10:00 AM PT

Opened:
January 08, 2019
10:00 AM PT
MSXML6 may cause applications to stop responding
After installing KB4480962, MSXML6 causes applications to stop responding if an exception was thrown during node operations, such as appendChild(), insertBefore(), and moveNode().

The Group Policy editor may stop responding when editing a Group Policy Object (GPO) that contains Group Policy Preferences (GPP) for Internet Explorer 10 settings.

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10, version 1607; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 10 Enterprise LTSB 2015; Windows 8.1
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2; Windows Server 2012
Resolution: This issue was resolved in KB4493475.

Back to top
OS Build 10240.18094

January 08, 2019
KB4480962
Resolved
KB4493475
Resolved:
April 09, 2019
10:00 AM PT

Opened:
January 08, 2019
10:00 AM PT
Applications using Microsoft Jet database fail to open
Applications that use a Microsoft Jet database with the Microsoft Access 97 file format may fail to open if the database has column names greater than 32 characters. The database will fail to open with the error, \"Unrecognized Database Format\".

Affected platforms:
  • Client: Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 8.1; Windows 7, Service Pack 1
  • Server: Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2; Windows Server 2008 R2 SP1
Resolution: This issue is resolved in KB4487018.

Back to top
OS Build 10240.18094

January 08, 2019
KB4480962
Resolved
KB4487018
Resolved:
February 12, 2019
10:00 AM PT

Opened:
January 08, 2019
10:00 AM PT
Unable to access hotspots with third-party applications
After installing KB4480962, third-party applications may have difficulty authenticating hotspots.

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 8.1
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2; Windows Server 2012
Resolution: This issue is resolved in KB4487018.

Back to top
OS Build 10240.18094

January 08, 2019
KB4480962
Resolved
KB4487018
Resolved:
February 12, 2019
10:00 AM PT

Opened:
January 08, 2019
10:00 AM PT
Unable to access hotspots with third-party applications
After installing KB4480962, third-party applications may have difficulty authenticating hotspots.

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10, version 1607; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 10 Enterprise LTSB 2015; Windows 8.1
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2; Windows Server 2012
Resolution: This issue is resolved in KB4487018.

Back to top
OS Build 10240.18094

January 08, 2019
KB4480962
Resolved
KB4487018
Resolved:
February 12, 2019
10:00 AM PT

Opened:
January 08, 2019
10:00 AM PT
" @@ -89,7 +89,7 @@ sections: - type: markdown text: " - +
DetailsOriginating updateStatusHistory
Unable to use Seek bar in Windows Media Player
After installing KB4462922, users may not be able to use the Seek Bar in Windows Media Player when playing specific files. This issue does not affect normal playback.

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 8.1; Windows 7 SP1
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2; Windows Server 2012; Windows Server 2008 R2 SP1; Windows Server 2008 SP2
Resolution: This issue is resolved in KB4471323.

Back to top
OS Build 10240.18005

October 09, 2018
KB4462922
Resolved
KB4471323
Resolved:
December 11, 2018
10:00 AM PT

Opened:
October 09, 2018
10:00 AM PT
Unable to use Seek bar in Windows Media Player
After installing KB4462922, users may not be able to use the Seek Bar in Windows Media Player when playing specific files. This issue does not affect normal playback.

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10, version 1607; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 10 Enterprise LTSB 2015; Windows 8.1; Windows 7 SP1
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2; Windows Server 2012; Windows Server 2008 R2 SP1; Windows Server 2008 SP2
Resolution: This issue is resolved in KB4471323.

Back to top
OS Build 10240.18005

October 09, 2018
KB4462922
Resolved
KB4471323
Resolved:
December 11, 2018
10:00 AM PT

Opened:
October 09, 2018
10:00 AM PT
" diff --git a/windows/release-information/resolved-issues-windows-10-1607.yml b/windows/release-information/resolved-issues-windows-10-1607.yml index f07398a7f7..e45c68069d 100644 --- a/windows/release-information/resolved-issues-windows-10-1607.yml +++ b/windows/release-information/resolved-issues-windows-10-1607.yml @@ -32,7 +32,7 @@ sections: - type: markdown text: " - + @@ -63,7 +63,7 @@ sections: - type: markdown text: "
SummaryOriginating updateStatusDate resolved
End-user-defined characters (EUDC) cause blue screen at startup
If you enable per font end-user-defined characters (EUDC), the system will stop working and a blue screen may appear at startup.

See details >
OS Build 14393.2879

March 19, 2019
KB4489889
Resolved
KB4493470
April 09, 2019
10:00 AM PT
End-user-defined characters (EUDC) may cause blue screen at startup
If you enable per font end-user-defined characters (EUDC), the system will stop working and a blue screen may appear at startup.

See details >
OS Build 14393.2879

March 19, 2019
KB4489889
Resolved
KB4493470
April 09, 2019
10:00 AM PT
Internet Explorer 11 authentication issue with multiple concurrent logons
Internet Explorer 11 users may encounter issues if two or more people use the same user account for multiple, concurrent login sessions on the same Windows Server machine.

See details >
OS Build 14393.2724

January 08, 2019
KB4480961
Resolved
KB4493470
April 09, 2019
10:00 AM PT
MSXML6 may cause applications to stop responding
MSXML6 may cause applications to stop responding if an exception was thrown during node operations, such as appendChild(), insertBefore(), and moveNode().

See details >
OS Build 14393.2724

January 08, 2019
KB4480961
Resolved
KB4493470
April 09, 2019
10:00 AM PT
Issue hosting multiple terminal server sessions and a user logs off on Windows Server
In some cases, Windows Server will stop working and restart when hosting multiple terminal server sessions and a user logs off.

See details >
OS Build 14393.2828

February 19, 2019
KB4487006
Resolved
KB4489882
March 12, 2019
10:00 AM PT
- +
DetailsOriginating updateStatusHistory
End-user-defined characters (EUDC) cause blue screen at startup
If you enable per font end-user-defined characters (EUDC), the system will stop working and a blue screen may appear at startup. This is not a common setting in non-Asian regions.

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10, version 1607; Windows 10 Enterprise LTSC 2016
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016
Resolution: This issue was resolved in KB4493470.

Back to top
OS Build 14393.2879

March 19, 2019
KB4489889
Resolved
KB4493470
Resolved:
April 09, 2019
10:00 AM PT

Opened:
March 19, 2019
10:00 AM PT
End-user-defined characters (EUDC) may cause blue screen at startup
If you enable per font end-user-defined characters (EUDC), the system will stop working and a blue screen may appear at startup. This is not a common setting in non-Asian regions.

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10, version 1607; Windows 10 Enterprise LTSC 2016
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016
Resolution: This issue was resolved in KB4493470.

Back to top
OS Build 14393.2879

March 19, 2019
KB4489889
Resolved
KB4493470
Resolved:
April 09, 2019
10:00 AM PT

Opened:
March 19, 2019
10:00 AM PT
" diff --git a/windows/release-information/resolved-issues-windows-10-1703.yml b/windows/release-information/resolved-issues-windows-10-1703.yml index 9637247336..ac1f303a18 100644 --- a/windows/release-information/resolved-issues-windows-10-1703.yml +++ b/windows/release-information/resolved-issues-windows-10-1703.yml @@ -69,8 +69,8 @@ sections: - type: markdown text: " - - + +
DetailsOriginating updateStatusHistory
Error 1309 when installing/uninstalling MSI or MSP files
After installing KB4487011, users may receive “Error 1309” while installing or uninstalling certain types of MSI and MSP files.

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 8.1
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2; Windows Server 2012
Resolution: This issue is resolved in KB4489871.

Back to top
OS Build 15063.1659

February 19, 2019
KB4487011
Resolved
KB4489871
Resolved:
March 12, 2019
10:00 AM PT

Opened:
February 19, 2019
02:00 PM PT
Internet Explorer may fail to load images
After installing KB4487020, Internet Explorer may fail to load images with a backslash (\\) in their relative source path.

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 8.1; Windows 7 SP1
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2; Windows Server 2008 R2 SP1
Resolution: This issue is resolved in KB4487011.

Back to top
OS Build 15063.1631

February 12, 2019
KB4487020
Resolved
KB4487011
Resolved:
February 19, 2019
02:00 PM PT

Opened:
February 12, 2019
10:00 AM PT
Error 1309 when installing/uninstalling MSI or MSP files
After installing KB4487011, users may receive “Error 1309” while installing or uninstalling certain types of MSI and MSP files.

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10, version 1607; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 10 Enterprise LTSB 2015; Windows 8.1
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2; Windows Server 2012
Resolution: This issue is resolved in KB4489871.

Back to top
OS Build 15063.1659

February 19, 2019
KB4487011
Resolved
KB4489871
Resolved:
March 12, 2019
10:00 AM PT

Opened:
February 19, 2019
02:00 PM PT
Internet Explorer may fail to load images
After installing KB4487020, Internet Explorer may fail to load images with a backslash (\\) in their relative source path.

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10, version 1607; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 10 Enterprise LTSB 2015; Windows 8.1; Windows 7 SP1
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2; Windows Server 2008 R2 SP1
Resolution: This issue is resolved in KB4487011.

Back to top
OS Build 15063.1631

February 12, 2019
KB4487020
Resolved
KB4487011
Resolved:
February 19, 2019
02:00 PM PT

Opened:
February 12, 2019
10:00 AM PT
Applications using Microsoft Jet database and Access 95 file format stop working
Applications that use a Microsoft Jet database with the Microsoft Access 95 file format may randomly stop working.

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 7 SP1
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2; Windows Server 2012; Windows Server 2008 R2 SP1; Windows Server 2008 SP2
Resolution: This issue is resolved in KB4487011.

Back to top
OS Build 15063.1631

February 12, 2019
KB4487020
Resolved
KB4487011
Resolved:
February 19, 2019
02:00 PM PT

Opened:
February 12, 2019
10:00 AM PT
" @@ -80,11 +80,11 @@ sections: - type: markdown text: " - - + + - +
DetailsOriginating updateStatusHistory
MSXML6 may cause applications to stop responding
After installing KB4480973, MSXML6 causes applications to stop responding if an exception was thrown during node operations, such as appendChild(), insertBefore(), and moveNode().

The Group Policy editor may stop responding when editing a Group Policy Object (GPO) that contains Group Policy Preferences (GPP) for Internet Explorer 10 settings.

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 8.1
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2
Resolution: This issue was resolved in KB4493474.

Back to top
OS Build 15063.1563

January 08, 2019
KB4480973
Resolved
KB4493474
Resolved:
April 09, 2019
10:00 AM PT

Opened:
January 08, 2019
10:00 AM PT
First character of the Japanese era name not recognized as an abbreviation
After installing KB4480959, the first character of the Japanese era name is not recognized as an abbreviation and may cause date parsing issues.

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 8.1; Windows 7 SP1
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2; Windows Server 2012; Windows Server 2008 R2 SP1; Windows Server 2008 SP2
Resolution: This issue is resolved in KB4487011.

Back to top
OS Build 15063.1596

January 15, 2019
KB4480959
Resolved
KB4487011
Resolved:
February 19, 2019
02:00 PM PT

Opened:
January 15, 2019
10:00 AM PT
MSXML6 may cause applications to stop responding
After installing KB4480973, MSXML6 causes applications to stop responding if an exception was thrown during node operations, such as appendChild(), insertBefore(), and moveNode().

The Group Policy editor may stop responding when editing a Group Policy Object (GPO) that contains Group Policy Preferences (GPP) for Internet Explorer 10 settings.

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10, version 1607; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 10 Enterprise LTSB 2015; Windows 8.1
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2
Resolution: This issue was resolved in KB4493474.

Back to top
OS Build 15063.1563

January 08, 2019
KB4480973
Resolved
KB4493474
Resolved:
April 09, 2019
10:00 AM PT

Opened:
January 08, 2019
10:00 AM PT
First character of the Japanese era name not recognized as an abbreviation
After installing KB4480959, the first character of the Japanese era name is not recognized as an abbreviation and may cause date parsing issues.

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10, version 1607; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 10 Enterprise LTSB 2015; Windows 8.1; Windows 7 SP1
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2; Windows Server 2012; Windows Server 2008 R2 SP1; Windows Server 2008 SP2
Resolution: This issue is resolved in KB4487011.

Back to top
OS Build 15063.1596

January 15, 2019
KB4480959
Resolved
KB4487011
Resolved:
February 19, 2019
02:00 PM PT

Opened:
January 15, 2019
10:00 AM PT
Applications using Microsoft Jet database fail to open
Applications that use a Microsoft Jet database with the Microsoft Access 97 file format may fail to open if the database has column names greater than 32 characters. The database will fail to open with the error, “Unrecognized Database Format”.

Affected platforms:
  • Client: Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 8.1; Windows 7 SP1 
  • Server: Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2; Windows Server 2012; Windows Server 2008 R2 SP1; Windows Server 2008 SP2
Resolution: This issue is resolved in KB4487020.

Back to top
OS Build 15063.1563

January 08, 2019
KB4480973
Resolved
KB4487020
Resolved:
February 12, 2019
10:00 AM PT

Opened:
January 08, 2019
10:00 AM PT
Webpages become unresponsive in Microsoft Edge
After installing KB4480973, some Microsoft Edge users report that they:
  • Cannot load webpages using a local IP address.
  • Cannot load webpages on the Internet using a VPN connection.
Browsing fails or the webpage may become unresponsive.

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709
Resolution: This issue is resolved in KB4487020.

Back to top
OS Build 15063.1563

January 08, 2019
KB4480973
Resolved
KB4487020
Resolved:
February 12, 2019
10:00 AM PT

Opened:
January 08, 2019
10:00 AM PT
Unable to access hotspots with third-party applications
After installing KB4480973, third-party applications may have difficulty authenticating hotspots.

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 8.1
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2; Windows Server 2012
Resolution: This issue is resolved in KB4480959.

Back to top
OS Build 15063.1563

January 08, 2019
KB4480973
Resolved
KB4480959
Resolved:
January 15, 2019
10:00 AM PT

Opened:
January 08, 2019
10:00 AM PT
Unable to access hotspots with third-party applications
After installing KB4480973, third-party applications may have difficulty authenticating hotspots.

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10, version 1607; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 10 Enterprise LTSB 2015; Windows 8.1
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2; Windows Server 2012
Resolution: This issue is resolved in KB4480959.

Back to top
OS Build 15063.1563

January 08, 2019
KB4480973
Resolved
KB4480959
Resolved:
January 15, 2019
10:00 AM PT

Opened:
January 08, 2019
10:00 AM PT
" @@ -93,7 +93,7 @@ sections: - type: markdown text: " - +
DetailsOriginating updateStatusHistory
Unable to use Seek bar in Windows Media Player
After installing KB4462937, users may not be able to use the Seek Bar in Windows Media Player when playing specific files. This issue does not affect normal playback.

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 8.1; Windows 7 SP1
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2; Windows Server 2012; Windows Server 2008 R2 SP1; Windows Server 2008 SP2
Resolution: This issue is resolved in KB4471327.

Back to top
OS Build 15063.1387

October 09, 2018
KB4462937
Resolved
KB4471327
Resolved:
December 11, 2018
10:00 AM PT

Opened:
October 09, 2018
10:00 AM PT
Unable to use Seek bar in Windows Media Player
After installing KB4462937, users may not be able to use the Seek Bar in Windows Media Player when playing specific files. This issue does not affect normal playback.

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10, version 1607; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 10 Enterprise LTSB 2015; Windows 8.1; Windows 7 SP1
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2; Windows Server 2012; Windows Server 2008 R2 SP1; Windows Server 2008 SP2
Resolution: This issue is resolved in KB4471327.

Back to top
OS Build 15063.1387

October 09, 2018
KB4462937
Resolved
KB4471327
Resolved:
December 11, 2018
10:00 AM PT

Opened:
October 09, 2018
10:00 AM PT
LongonUI.exe stops working intermittently
After installing KB4462937, LogonUI.exe stops working intermittently.

Affected platforms:
  • Windows 10, version 1703
Resolution: This issue is resolved in KB4467699.

Back to top
OS Build 15063.1387

October 09, 2018
KB4462937
Resolved
KB4467699
Resolved:
November 27, 2018
10:00 AM PT

Opened:
October 09, 2018
10:00 AM PT
Error message beginning with “Hosted by…” when launching Microsoft Edge
After installing KB4462937, some users may see a dialog box with a non-applicable message beginning with the words “Hosted by...” when first starting Microsoft Edge.

This dialog will only appear once if they have turned on “Block only third-party cookies” in Microsoft Edge and applied certain language packs before installing this update.

Affected platforms:
  • Client: Windows 10, version 1709; Windows 10, version 1703
  • Server: Windows Server, version 1709
Resolution: This issue is resolved in KB4462939.

Back to top
OS Build 15063.1387

October 09, 2018
KB4462937
Resolved
KB4462939
Resolved:
October 18, 2018
10:00 AM PT

Opened:
October 09, 2018
10:00 AM PT
diff --git a/windows/release-information/resolved-issues-windows-10-1709.yml b/windows/release-information/resolved-issues-windows-10-1709.yml index ba2b74615a..da79bd1ae7 100644 --- a/windows/release-information/resolved-issues-windows-10-1709.yml +++ b/windows/release-information/resolved-issues-windows-10-1709.yml @@ -60,7 +60,7 @@ sections: - type: markdown text: " - +
DetailsOriginating updateStatusHistory
End-user-defined characters (EUDC) may cause blue screen at startup
If you enable per font end-user-defined characters (EUDC), the system may stop working and a blue screen may appear at startup. This is not a common setting in non-Asian regions.

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016
Resolution: This issue is resolved in KB4493441.

Back to top
OS Build 16299.1059

March 19, 2019
KB4489890
Resolved
KB4493441
Resolved:
April 09, 2019
10:00 AM PT

Opened:
March 19, 2019
10:00 AM PT
End-user-defined characters (EUDC) may cause blue screen at startup
If you enable per font end-user-defined characters (EUDC), the system may stop working and a blue screen may appear at startup. This is not a common setting in non-Asian regions.

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10, version 1607; Windows 10 Enterprise LTSC 2016
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016
Resolution: This issue is resolved in KB4493441.

Back to top
OS Build 16299.1059

March 19, 2019
KB4489890
Resolved
KB4493441
Resolved:
April 09, 2019
10:00 AM PT

Opened:
March 19, 2019
10:00 AM PT
Stop error when attempting to start SSH from WSL
After applying KB4489886, a stop error occurs when attempting to start the Secure Shell (SSH) client program from Windows Subsystem for Linux (WSL) with agent forwarding enabled using a command line switch (ssh –A) or a configuration setting.

Affected platforms:
  • Client: Windows 10, version 1803; Windows 10, version 1709
  • Server: Windows Server, version 1803; Windows Server, version 1709
Resolution: This issue is resolved in KB4493441.

Back to top
OS Build 16299.1029

March 12, 2019
KB4489886
Resolved
KB4493441
Resolved:
April 09, 2019
10:00 AM PT

Opened:
March 12, 2019
10:00 AM PT
" @@ -70,9 +70,9 @@ sections: - type: markdown text: " - + - +
DetailsOriginating updateStatusHistory
Error 1309 when installing/uninstalling MSI or MSP files
After installing KB4486996, users may receive “Error 1309” while installing or uninstalling certain types of MSI and MSP files.

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 8.1
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2; Windows Server 2012
Resolution: This issue is resolved in KB4489886.

Back to top
OS Build 16299.967

February 12, 2019
KB4486996
Resolved
KB4489886
Resolved:
March 12, 2019
10:00 AM PT

Opened:
February 12, 2019
10:00 AM PT
Error 1309 when installing/uninstalling MSI or MSP files
After installing KB4486996, users may receive “Error 1309” while installing or uninstalling certain types of MSI and MSP files.

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10, version 1607; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 10 Enterprise LTSB 2015; Windows 8.1
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2; Windows Server 2012
Resolution: This issue is resolved in KB4489886.

Back to top
OS Build 16299.967

February 12, 2019
KB4486996
Resolved
KB4489886
Resolved:
March 12, 2019
10:00 AM PT

Opened:
February 12, 2019
10:00 AM PT
Applications using Microsoft Jet database and Access 95 file format stop working
Applications that use a Microsoft Jet database with the Microsoft Access 95 file format may randomly stop working.

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 7 SP1
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2; Windows Server 2012; Windows Server 2008 R2 SP1; Windows Server 2008 SP2
Resolution: This issue is resolved in KB4487021.

Back to top
OS Build 16299.967

February 12, 2019
KB4486996
Resolved
KB4487021
Resolved:
February 19, 2019
02:00 PM PT

Opened:
February 12, 2019
10:00 AM PT
Internet Explorer may fail to load images
After installing KB4486996, Internet Explorer may fail to load images with a backslash (\\) in their relative source path.

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 8.1; Windows 7 SP1
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2; Windows Server 2008 R2 SP1
Resolution: This issue is resolved in KB4487021.

Back to top
OS Build 16299.967

February 12, 2019
KB4486996
Resolved
KB4487021
Resolved:
February 19, 2019
02:00 PM PT

Opened:
February 12, 2019
10:00 AM PT
Internet Explorer may fail to load images
After installing KB4486996, Internet Explorer may fail to load images with a backslash (\\) in their relative source path.

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10, version 1607; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 10 Enterprise LTSB 2015; Windows 8.1; Windows 7 SP1
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2; Windows Server 2008 R2 SP1
Resolution: This issue is resolved in KB4487021.

Back to top
OS Build 16299.967

February 12, 2019
KB4486996
Resolved
KB4487021
Resolved:
February 19, 2019
02:00 PM PT

Opened:
February 12, 2019
10:00 AM PT
" @@ -82,10 +82,10 @@ sections: text: " - + - +
DetailsOriginating updateStatusHistory
MSXML6 causes applications to stop responding if an exception was thrown
After installing KB4480978, MSXML6 causes applications to stop responding if an exception was thrown during node operations, such as appendChild(), insertBefore(), and moveNode().

The Group Policy editor may stop responding when editing a Group Policy Object (GPO) that contains Group Policy Preferences (GPP) for Internet Explorer 10 settings.

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 8.1
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2; Windows Server 2012
Resolution: This issue is resolved in KB4493441.

Back to top
OS Build 16299.904

January 08, 2019
KB4480978
Resolved
KB4493441
Resolved:
April 09, 2019
10:00 AM PT

Opened:
January 08, 2019
10:00 AM PT
First character of the Japanese era name not recognized as an abbreviation
After installing KB4480967, the first character of the Japanese era name is not recognized as an abbreviation and may cause date parsing issues.

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 8.1; Windows 7 SP1
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2; Windows Server 2012; Windows Server 2008 R2 SP1; Windows Server 2008 SP2
Resolution: This issue is resolved in KB4487021.

Back to top
OS Build 16299.936

January 15, 2019
KB4480967
Resolved
KB4487021
Resolved:
February 19, 2019
02:00 PM PT

Opened:
January 15, 2019
10:00 AM PT
First character of the Japanese era name not recognized as an abbreviation
After installing KB4480967, the first character of the Japanese era name is not recognized as an abbreviation and may cause date parsing issues.

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10, version 1607; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 10 Enterprise LTSB 2015; Windows 8.1; Windows 7 SP1
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2; Windows Server 2012; Windows Server 2008 R2 SP1; Windows Server 2008 SP2
Resolution: This issue is resolved in KB4487021.

Back to top
OS Build 16299.936

January 15, 2019
KB4480967
Resolved
KB4487021
Resolved:
February 19, 2019
02:00 PM PT

Opened:
January 15, 2019
10:00 AM PT
Applications using Microsoft Jet database fail to open
Applications that use a Microsoft Jet database with the Microsoft Access 97 file format may fail to open if the database has column names greater than 32 characters. The database will fail to open with the error, “Unrecognized Database Format.”

Affected platforms:
  • Client: Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 8.1; Windows 7 SP1 
  • Server: Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2; Windows Server 2012; Windows Server 2008 R2 SP1; Windows Server 2008 SP2 
Resolution: This issue is resolved in KB4486996.

Back to top
OS Build 16299.904

January 08, 2019
KB4480978
Resolved
KB4486996
Resolved:
February 12, 2019
10:00 AM PT

Opened:
January 08, 2019
10:00 AM PT
Webpages become unresponsive in Microsoft Edge
After installing KB4480978, some Microsoft Edge users report that they:
  • Cannot load webpages using a local IP address.
  • Cannot load webpages on the Internet using a VPN connection.
Browsing fails or the webpage may become unresponsive.

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709
Resolution: This issue is resolved in KB4486996.

Back to top
OS Build 16299.904

January 08, 2019
KB4480978
Resolved
KB4486996
Resolved:
February 12, 2019
10:00 AM PT

Opened:
January 08, 2019
10:00 AM PT
Unable to access hotspots with third-party applications
After installing KB4480978, third-party applications may have difficulty authenticating hotspots.

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 8.1
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2; Windows Server 2012
Resolution: This issue is resolved in KB4480967.

Back to top
OS Build 16299.904

January 08, 2019
KB4480978
Resolved
KB4480967
Resolved:
January 15, 2019
10:00 AM PT

Opened:
January 08, 2019
10:00 AM PT
Unable to access hotspots with third-party applications
After installing KB4480978, third-party applications may have difficulty authenticating hotspots.

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10, version 1607; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 10 Enterprise LTSB 2015; Windows 8.1
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2; Windows Server 2012
Resolution: This issue is resolved in KB4480967.

Back to top
OS Build 16299.904

January 08, 2019
KB4480978
Resolved
KB4480967
Resolved:
January 15, 2019
10:00 AM PT

Opened:
January 08, 2019
10:00 AM PT
" @@ -94,7 +94,7 @@ sections: - type: markdown text: " - +
DetailsOriginating updateStatusHistory
Unable to use Seek bar in Windows Media Player
After installing KB4462918, users may not be able to use the Seek Bar in Windows Media Player when playing specific files. This issue does not affect normal playback.

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 8.1; Windows 7 SP1
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2; Windows Server 2012; Windows Server 2008 R2 SP1; Windows Server 2008 SP2
Resolution: This issue is resolved in KB4471329.

Back to top
OS Build 16299.726

October 09, 2018
KB4462918
Resolved
KB4471329
Resolved:
December 11, 2018
10:00 AM PT

Opened:
October 09, 2018
10:00 AM PT
Unable to use Seek bar in Windows Media Player
After installing KB4462918, users may not be able to use the Seek Bar in Windows Media Player when playing specific files. This issue does not affect normal playback.

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10, version 1607; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 10 Enterprise LTSB 2015; Windows 8.1; Windows 7 SP1
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2; Windows Server 2012; Windows Server 2008 R2 SP1; Windows Server 2008 SP2
Resolution: This issue is resolved in KB4471329.

Back to top
OS Build 16299.726

October 09, 2018
KB4462918
Resolved
KB4471329
Resolved:
December 11, 2018
10:00 AM PT

Opened:
October 09, 2018
10:00 AM PT
Error message beginning with “Hosted by…” when launching Microsoft Edge
After installing KB4462918, some users may see a dialog box with a non-applicable message beginning with the words “Hosted by...” when first starting Microsoft Edge.

This dialog will only appear once if they have turned on “Block only third-party cookies” in Microsoft Edge and applied certain language packs before installing this update.

Affected platforms:
  • Client: Windows 10, version 1709; Windows 10, version 1703
  • Server: Windows Server, version 1709
Resolution: This issue is resolved in KB4462932.

Back to top
OS Build 16299.726

October 09, 2018
KB4462918
Resolved
KB4462932
Resolved:
October 18, 2018
10:00 AM PT

Opened:
October 09, 2018
10:00 AM PT
" diff --git a/windows/release-information/resolved-issues-windows-10-1803.yml b/windows/release-information/resolved-issues-windows-10-1803.yml index 56835371d0..0c631923e9 100644 --- a/windows/release-information/resolved-issues-windows-10-1803.yml +++ b/windows/release-information/resolved-issues-windows-10-1803.yml @@ -65,7 +65,7 @@ sections: - type: markdown text: " - +
DetailsOriginating updateStatusHistory
End-user-defined characters (EUDC) may cause blue screen at startup
If you enable per font end-user-defined characters (EUDC), the system may stop working and a blue screen may appear at startup. This is not a common setting in non-Asian regions. 

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016
Resolution: This issue was resolved in KB4493464

Back to top
OS Build 17134.677

March 19, 2019
KB4489894
Resolved
KB4493464
Resolved:
April 09, 2019
10:00 AM PT

Opened:
March 19, 2019
10:00 AM PT
End-user-defined characters (EUDC) may cause blue screen at startup
If you enable per font end-user-defined characters (EUDC), the system may stop working and a blue screen may appear at startup. This is not a common setting in non-Asian regions. 

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10, version 1607; Windows 10 Enterprise LTSC 2016
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016
Resolution: This issue was resolved in KB4493464

Back to top
OS Build 17134.677

March 19, 2019
KB4489894
Resolved
KB4493464
Resolved:
April 09, 2019
10:00 AM PT

Opened:
March 19, 2019
10:00 AM PT
Stop error when attempting to start SSH from WSL
After applying KB4489868, a stop error occurs when attempting to start the Secure Shell (SSH) client program from Windows Subsystem for Linux (WSL) with agent forwarding enabled using a command line switch (ssh -A) or a configuration setting.

Affected platforms:
  • Client: Windows 10, version 1803; Windows 10, version 1709
  • Server: Windows Server, version 1803; Windows Server, version 1709
Resolution: This issue was resolved in KB4493464.

Back to top
OS Build 17134.648

March 12, 2019
KB4489868
Resolved
KB4493464
Resolved:
April 09, 2019
10:00 AM PT

Opened:
March 12, 2019
10:00 AM PT
" @@ -75,8 +75,8 @@ sections: - type: markdown text: " - - + +
DetailsOriginating updateStatusHistory
Error 1309 when installing/uninstalling MSI or MSP files
After installing KB4487017, users may received \"Error 1309\" while installing or uninstalling certain types of MSI and MSP files. 

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 8.1
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2; Windows Server 2012
Resolution: This issue is resolved in KB4489868.

Back to top
OS Build 17134.590

February 12, 2019
KB4487017
Resolved
KB4489868
Resolved:
March 12, 2019
10:00 AM PT

Opened:
February 12, 2019
10:00 AM PT
Internet Explorer may fail to load images
After installing KB4487017, Internet Explorer may fail to load images with a backslash (\\) in their relative source path. 

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 8.1; Windows 7 SP1
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2; Windows Server 2008 R2 SP1
Resolution: This issue is resolved in KB4487029

Back to top
OS Build 17134.590

February 12, 2019
KB4487017
Resolved
KB4487029
Resolved:
February 19, 2019
02:00 PM PT

Opened:
February 12, 2019
10:00 AM PT
Error 1309 when installing/uninstalling MSI or MSP files
After installing KB4487017, users may received \"Error 1309\" while installing or uninstalling certain types of MSI and MSP files. 

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10, version 1607; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 10 Enterprise LTSB 2015; Windows 8.1
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2; Windows Server 2012
Resolution: This issue is resolved in KB4489868.

Back to top
OS Build 17134.590

February 12, 2019
KB4487017
Resolved
KB4489868
Resolved:
March 12, 2019
10:00 AM PT

Opened:
February 12, 2019
10:00 AM PT
Internet Explorer may fail to load images
After installing KB4487017, Internet Explorer may fail to load images with a backslash (\\) in their relative source path. 

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10, version 1607; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 10 Enterprise LTSB 2015; Windows 8.1; Windows 7 SP1
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2; Windows Server 2008 R2 SP1
Resolution: This issue is resolved in KB4487029

Back to top
OS Build 17134.590

February 12, 2019
KB4487017
Resolved
KB4487029
Resolved:
February 19, 2019
02:00 PM PT

Opened:
February 12, 2019
10:00 AM PT
" @@ -85,11 +85,11 @@ sections: - type: markdown text: " - + - +
DetailsOriginating updateStatusHistory
MSXML6 may cause applications to stop responding
After installing KB4480966, MSXML6 causes applications to stop responding if an exception was thrown during node operations, such as appendChild(), insertBefore(), and moveNode().

The Group Policy editor may stop responding when editing a Group Policy Object (GPO) that contains Group Policy Preferences (GPP) for Internet Explorer 10 settings.

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 8.1
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2; Windows Server 2012
Resolution: This issue was resolved in KB4493464

Back to top
OS Build 17134.523

January 08, 2019
KB4480966
Resolved
KB4493464
Resolved:
April 09, 2019
10:00 AM PT

Opened:
January 08, 2019
10:00 AM PT
MSXML6 may cause applications to stop responding
After installing KB4480966, MSXML6 causes applications to stop responding if an exception was thrown during node operations, such as appendChild(), insertBefore(), and moveNode().

The Group Policy editor may stop responding when editing a Group Policy Object (GPO) that contains Group Policy Preferences (GPP) for Internet Explorer 10 settings.

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10, version 1607; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 10 Enterprise LTSB 2015; Windows 8.1
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2; Windows Server 2012
Resolution: This issue was resolved in KB4493464

Back to top
OS Build 17134.523

January 08, 2019
KB4480966
Resolved
KB4493464
Resolved:
April 09, 2019
10:00 AM PT

Opened:
January 08, 2019
10:00 AM PT
First character of Japanese era name not recognized
After installing KB4480976, the first character of the Japanese era name is not recognized as an abbreviation and may cause date parsing issues.

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 8.1; Windows 7 SP1
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2; Windows Server 2012; Windows Server 2008 R2 SP1; Windows Server 2008 SP2
Resolution: This issue is resolved in KB4487029

Back to top
OS Build 17134.556

January 15, 2019
KB4480976
Resolved
KB4487029
Resolved:
February 19, 2019
02:00 PM PT

Opened:
January 15, 2019
10:00 AM PT
Applications using Microsoft Jet database and Access 95 file format stop working
Applications that use a Microsoft Jet database with the Microsoft Access 95 file format may randomly stop working. 

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 7 SP1
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2; Windows Server 2012; Windows Server 2008 R2 SP1; Windows Server 2008 SP2
Resolution: This issue is resolved in KB4487017.

Back to top
OS Build 17134.523

January 08, 2019
KB4480966
Resolved
KB4487017
Resolved:
February 12, 2019
10:00 AM PT

Opened:
January 08, 2019
10:00 AM PT
Webpages become unresponsive in Microsoft Edge
After installing KB4480966, some Microsoft Edge users report that they: 
  • Cannot load webpages using a local IP address. 
  • Cannot load webpages on the Internet using a VPN connection.  
Browsing fails or the webpage may become unresponsive. 

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709
Resolution: This issue is resolved in KB4487017

Back to top
OS Build 17134.523

January 08, 2019
KB4480966
Resolved
KB4487017
Resolved:
February 12, 2019
10:00 AM PT

Opened:
January 08, 2019
10:00 AM PT
Unable to access hotspots with third-party applications
After installing KB4480966, third-party applications may have difficulty authenticating hotspots.

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 8.1
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2; Windows Server 2012
Resolution: This issue is resolved in KB4480976

Back to top
OS Build 17134.523

January 08, 2019
KB4480966
Resolved
KB4480976
Resolved:
January 15, 2019
10:00 AM PT

Opened:
January 08, 2019
10:00 AM PT
Unable to access hotspots with third-party applications
After installing KB4480966, third-party applications may have difficulty authenticating hotspots.

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10, version 1607; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 10 Enterprise LTSB 2015; Windows 8.1
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2; Windows Server 2012
Resolution: This issue is resolved in KB4480976

Back to top
OS Build 17134.523

January 08, 2019
KB4480966
Resolved
KB4480976
Resolved:
January 15, 2019
10:00 AM PT

Opened:
January 08, 2019
10:00 AM PT
" @@ -117,7 +117,7 @@ sections: - type: markdown text: " - +
DetailsOriginating updateStatusHistory
Unable to use Seek bar in Windows Media Player
After installing KB4462919, users may not be able to use the Seek bar in Windows Media Player when playing specific files. This issue does not affect normal playback.

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 8.1; Windows 7 SP1
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2; Windows Server 2012; Windows Server 2008 R2 SP1; Windows Server 2008 SP2
Resolution: This issue is resolved in KB4471324

Back to top
OS Build 17134.345

October 09, 2018
KB4462919
Resolved
KB4471324
Resolved:
December 11, 2018
10:00 AM PT

Opened:
October 09, 2018
10:00 AM PT
Unable to use Seek bar in Windows Media Player
After installing KB4462919, users may not be able to use the Seek bar in Windows Media Player when playing specific files. This issue does not affect normal playback.

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10, version 1607; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 10 Enterprise LTSB 2015; Windows 8.1; Windows 7 SP1
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2; Windows Server 2012; Windows Server 2008 R2 SP1; Windows Server 2008 SP2
Resolution: This issue is resolved in KB4471324

Back to top
OS Build 17134.345

October 09, 2018
KB4462919
Resolved
KB4471324
Resolved:
December 11, 2018
10:00 AM PT

Opened:
October 09, 2018
10:00 AM PT
Developer Tools (F12) fail to start in Microsoft Edge
Developer Tools (F12) may fail to start in Microsoft Edge.

Affected platforms:
  • Client: Windows 10, version 1803
  • Server: Windows Server, version 1803
Resolution: This issue is resolved in KB4467702

Back to top
OS Build 17134.376

October 24, 2018
KB4462933
Resolved
KB4467702
Resolved:
November 13, 2018
10:00 AM PT

Opened:
October 24, 2018
02:00 PM PT
" diff --git a/windows/release-information/resolved-issues-windows-10-1809-and-windows-server-2019.yml b/windows/release-information/resolved-issues-windows-10-1809-and-windows-server-2019.yml index bd86acbf94..34c6e7aaee 100644 --- a/windows/release-information/resolved-issues-windows-10-1809-and-windows-server-2019.yml +++ b/windows/release-information/resolved-issues-windows-10-1809-and-windows-server-2019.yml @@ -69,7 +69,7 @@ sections: - type: markdown text: " - +
DetailsOriginating updateStatusHistory
End-user-defined characters (EUDC) may cause blue screen at startup
If you enable per font end-user-defined characters (EUDC), the system will stop working and a blue screen may appear at startup. This is not a common setting in non-Asian regions.

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016
Workaround: To avoid this issue, don't enable per font EUDC. As an alternative, you can edit the registry to mitigate this issue; for more information, see KB4496149.

Resolved: This issue was resolved in KB4493509.

Back to top
OS Build 17763.404

April 02, 2019
KB4490481
Resolved
KB4493509
Resolved:
April 09, 2019
10:00 AM PT

Opened:
April 02, 2019
10:00 AM PT
End-user-defined characters (EUDC) may cause blue screen at startup
If you enable per font end-user-defined characters (EUDC), the system will stop working and a blue screen may appear at startup. This is not a common setting in non-Asian regions.

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10, version 1607; Windows 10 Enterprise LTSC 2016
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016
Workaround: To avoid this issue, don't enable per font EUDC. As an alternative, you can edit the registry to mitigate this issue; for more information, see KB4496149.

Resolved: This issue was resolved in KB4493509.

Back to top
OS Build 17763.404

April 02, 2019
KB4490481
Resolved
KB4493509
Resolved:
April 09, 2019
10:00 AM PT

Opened:
April 02, 2019
10:00 AM PT
" @@ -87,10 +87,10 @@ sections: - type: markdown text: " - - + + - +
DetailsOriginating updateStatusHistory
Error 1309 when installing/uninstalling MSI or MSP files
After installing KB4487044, users may receive \"Error 1309\" while installing or uninstalling certain types of MSI and MSP files. 

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 8.1
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2; Windows Server 2012
Resolution: This issue is resolved in KB4489899

Back to top
OS Build 17763.316

February 12, 2019
KB4487044
Resolved
KB4489899
Resolved:
March 12, 2019
10:00 AM PT

Opened:
February 12, 2019
10:00 AM PT
Internet Explorer may fail to load images
After installing KB4487044, Internet Explorer may fail to load images with a backslash (\\) in their relative source path.

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 8.1; Windows 7 SP1
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2; Windows Server 2008 R2 SP1
Resolution: This issue is resolved in KB4482887.

Back to top
OS Build 17763.316

February 12, 2019
KB4487044
Resolved
KB4482887
Resolved:
March 01, 2019
10:00 AM PT

Opened:
February 12, 2019
10:00 AM PT
Error 1309 when installing/uninstalling MSI or MSP files
After installing KB4487044, users may receive \"Error 1309\" while installing or uninstalling certain types of MSI and MSP files. 

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10, version 1607; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 10 Enterprise LTSB 2015; Windows 8.1
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2; Windows Server 2012
Resolution: This issue is resolved in KB4489899

Back to top
OS Build 17763.316

February 12, 2019
KB4487044
Resolved
KB4489899
Resolved:
March 12, 2019
10:00 AM PT

Opened:
February 12, 2019
10:00 AM PT
Internet Explorer may fail to load images
After installing KB4487044, Internet Explorer may fail to load images with a backslash (\\) in their relative source path.

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10, version 1607; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 10 Enterprise LTSB 2015; Windows 8.1; Windows 7 SP1
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2; Windows Server 2008 R2 SP1
Resolution: This issue is resolved in KB4482887.

Back to top
OS Build 17763.316

February 12, 2019
KB4487044
Resolved
KB4482887
Resolved:
March 01, 2019
10:00 AM PT

Opened:
February 12, 2019
10:00 AM PT
Applications using Microsoft Jet database and Access 95 file format stop working
Applications that use a Microsoft Jet database with the Microsoft Access 95 file format may randomly stop working.

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 7, Service Pack 1
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2008 R2 SP1
Resolution: This issue is resolved in KB4482887.

Back to top
OS Build 17763.316

February 12, 2019
KB4487044
Resolved
KB4482887
Resolved:
March 01, 2019
10:00 AM PT

Opened:
February 12, 2019
10:00 AM PT
First character of the Japanese era name not recognized
After installing KB4487044, the first character of the Japanese era name is not recognized as an abbreviation and may cause date parsing issues. 

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 8.1; Windows 7 SP1
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2; Windows Server 2012; Windows Server 2008 R2 SP1; Windows Server 2008 SP2
Resolution: This issue is resolved in KB4482887

Back to top
OS Build 17763.316

February 12, 2019
KB4487044
Resolved
KB4482887
Resolved:
March 01, 2019
10:00 AM PT

Opened:
February 12, 2019
10:00 AM PT
First character of the Japanese era name not recognized
After installing KB4487044, the first character of the Japanese era name is not recognized as an abbreviation and may cause date parsing issues. 

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10, version 1607; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 10 Enterprise LTSB 2015; Windows 8.1; Windows 7 SP1
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2; Windows Server 2012; Windows Server 2008 R2 SP1; Windows Server 2008 SP2
Resolution: This issue is resolved in KB4482887

Back to top
OS Build 17763.316

February 12, 2019
KB4487044
Resolved
KB4482887
Resolved:
March 01, 2019
10:00 AM PT

Opened:
February 12, 2019
10:00 AM PT
" @@ -99,11 +99,11 @@ sections: - type: markdown text: " - - + + - +
DetailsOriginating updateStatusHistory
Internet Explorer 11 authentication issue with multiple concurrent logons
After installing the February 12, 2019 update (KB4487044), Internet Explorer 11 and other applications that use WININET.DLL may have authentication issues. This occurs when two or more people use the same user account for multiple, concurrent login sessions on the same Windows Server machine, including Remote Desktop Protocol (RDP) and Terminal Server logons. Symptoms reported by customers include, but may not be limited to:  
  • Cache size and location show zero or empty. 
  • Keyboard shortcuts may not work properly. 
  • Webpages may intermittently fail to load or render correctly. 
  • Issues with credential prompts. 
  • Issues when downloading files. 
Affected platforms: 
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10 Enterprise LTSC 2016; Windows 8.1; Windows 7 SP1
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server 2016; Windows Server 2012 R2; Windows Server 2012; Windows Server 2008 R2 SP1
Resolved: This issue was resolved in KB4493509

Back to top
OS Build 17763.253

January 08, 2019
KB4480116
Resolved
KB4493509
Resolved:
April 09, 2019
10:00 AM PT

Opened:
January 08, 2019
10:00 AM PT
MSXML6 may cause applications to stop responding
After installing KB4480116, MSXML6 causes applications to stop responding if an exception was thrown during node operations, such as appendChild(), insertBefore(), and moveNode().
 
The Group Policy editor may stop responding when editing a Group Policy Object (GPO) that contains Group Policy Preferences (GPP) for Internet Explorer 10 settings. 

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 8.1
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2; Windows Server 2012
Resolved: This issue was resolved in KB4493509

Back to top
OS Build 17763.253

January 08, 2019
KB4480116
Resolved
KB4493509
Resolved:
April 09, 2019
10:00 AM PT

Opened:
January 08, 2019
10:00 AM PT
Internet Explorer 11 authentication issue with multiple concurrent logons
After installing the February 12, 2019 update (KB4487044), Internet Explorer 11 and other applications that use WININET.DLL may have authentication issues. This occurs when two or more people use the same user account for multiple, concurrent login sessions on the same Windows Server machine, including Remote Desktop Protocol (RDP) and Terminal Server logons. Symptoms reported by customers include, but may not be limited to:  
  • Cache size and location show zero or empty. 
  • Keyboard shortcuts may not work properly. 
  • Webpages may intermittently fail to load or render correctly. 
  • Issues with credential prompts. 
  • Issues when downloading files. 
Affected platforms: 
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1607; Windows 10 Enterprise LTSC 2016; Windows 8.1; Windows 7 SP1
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server 2016; Windows Server 2012 R2; Windows Server 2012; Windows Server 2008 R2 SP1
Resolved: This issue was resolved in KB4493509

Back to top
OS Build 17763.253

January 08, 2019
KB4480116
Resolved
KB4493509
Resolved:
April 09, 2019
10:00 AM PT

Opened:
January 08, 2019
10:00 AM PT
MSXML6 may cause applications to stop responding
After installing KB4480116, MSXML6 causes applications to stop responding if an exception was thrown during node operations, such as appendChild(), insertBefore(), and moveNode().
 
The Group Policy editor may stop responding when editing a Group Policy Object (GPO) that contains Group Policy Preferences (GPP) for Internet Explorer 10 settings. 

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10, version 1607; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 10 Enterprise LTSB 2015; Windows 8.1
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2; Windows Server 2012
Resolved: This issue was resolved in KB4493509

Back to top
OS Build 17763.253

January 08, 2019
KB4480116
Resolved
KB4493509
Resolved:
April 09, 2019
10:00 AM PT

Opened:
January 08, 2019
10:00 AM PT
Global DNS outage affects Windows Update customers
Windows Update customers were affected by a network infrastructure event on January 29, 2019 (21:00 UTC), caused by an external DNS service provider's global outage. A software update to the external provider's DNS servers resulted in the distribution of corrupted DNS records that affected connectivity to the Windows Update service. The DNS records were restored by January 30, 2019 (00:10 UTC), and the majority of local Internet Service Providers (ISP) have refreshed their DNS servers and customer services have been restored. 
 
Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019
  • Server: Windows Server, version 1809; Windows Server 2019
While this was not an issue with Microsoft's services, we take any service disruption for our customers seriously. We will work with partners to better understand this so we can provide higher quality service in the future even across diverse global network providers. 
 
If you are still unable to connect to Windows Update services due to this problem, please contact your local ISP or network administrator. You can also refer to our new KB4493784 for more information to determine if your network is affected, and to provide your local ISP or network administrator with additional information to assist you. 

Back to top
N/A

Resolved
Resolved:
March 08, 2019
11:15 AM PT

Opened:
January 29, 2019
02:00 PM PT
Webpages become unresponsive in Microsoft Edge
After installing KB4480116, some Microsoft Edge users report that they:
  • Cannot load webpages using a local IP address. 
  • Cannot load webpages on the Internet using a VPN connection.
Browsing fails or the webpage may become unresponsive.

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709
Resolution: This issue is resolved in KB4487044

Back to top
OS Build 17763.253

January 08, 2019
KB4480116
Resolved
KB4487044
Resolved:
February 12, 2019
10:00 AM PT

Opened:
January 08, 2019
10:00 AM PT
Unable to access hotspots with third-party applications
After installing KB4480116, third-party applications may have difficulty authenticating hotspots. 

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 8.1
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2; Windows Server 2012
Resolution: This issue is resolved in KB4476976

Back to top
OS Build 17763.253

January 08, 2019
KB4480116
Resolved
KB4476976
Resolved:
January 22, 2019
02:00 PM PT

Opened:
January 08, 2019
10:00 AM PT
Unable to access hotspots with third-party applications
After installing KB4480116, third-party applications may have difficulty authenticating hotspots. 

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10, version 1607; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 10 Enterprise LTSB 2015; Windows 8.1
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2; Windows Server 2012
Resolution: This issue is resolved in KB4476976

Back to top
OS Build 17763.253

January 08, 2019
KB4480116
Resolved
KB4476976
Resolved:
January 22, 2019
02:00 PM PT

Opened:
January 08, 2019
10:00 AM PT
" @@ -137,7 +137,7 @@ sections: - type: markdown text: " - +
DetailsOriginating updateStatusHistory
Unable to use Seek bar in Windows Media Player
After installing KB4464330, users may not be able to use the Seek bar in Windows Media Player when playing specific files. This issue does not affect normal playback. 

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 8.1; Windows 7 SP1
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2; Windows Server 2012; Windows Server 2008 R2 SP1; Windows Server 2008 SP2
Resolution: This issue is resolved in KB4471332

Back to top
OS Build 17763.55

October 09, 2018
KB4464330
Resolved
KB4471332
Resolved:
December 11, 2018
10:00 AM PT

Opened:
October 09, 2018
10:00 AM PT
Unable to use Seek bar in Windows Media Player
After installing KB4464330, users may not be able to use the Seek bar in Windows Media Player when playing specific files. This issue does not affect normal playback. 

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10, version 1607; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 10 Enterprise LTSB 2015; Windows 8.1; Windows 7 SP1
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2; Windows Server 2012; Windows Server 2008 R2 SP1; Windows Server 2008 SP2
Resolution: This issue is resolved in KB4471332

Back to top
OS Build 17763.55

October 09, 2018
KB4464330
Resolved
KB4471332
Resolved:
December 11, 2018
10:00 AM PT

Opened:
October 09, 2018
10:00 AM PT
Users cannot set Win32 program defaults
After installing KB4464330, some users cannot set Win32 program defaults for certain app and file type combinations using the Open with... command or Settings > Apps > Default apps.
 
In some cases, Microsoft Notepad or other Win32 programs cannot be set as the default. 

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803
Resolution: This issue is resolved in KB4469342

Back to top
OS Build 17763.55

October 09, 2018
KB4464330
Resolved
KB4469342
Resolved:
December 05, 2018
02:00 PM PT

Opened:
October 09, 2018
10:00 AM PT
" diff --git a/windows/release-information/resolved-issues-windows-7-and-windows-server-2008-r2-sp1.yml b/windows/release-information/resolved-issues-windows-7-and-windows-server-2008-r2-sp1.yml index e5d4b077a1..b4f3b2e2e1 100644 --- a/windows/release-information/resolved-issues-windows-7-and-windows-server-2008-r2-sp1.yml +++ b/windows/release-information/resolved-issues-windows-7-and-windows-server-2008-r2-sp1.yml @@ -68,7 +68,7 @@ sections: - type: markdown text: " - +
DetailsOriginating updateStatusHistory
Custom URI schemes may not start corresponding application.
After installing KB4489878, custom URI schemes for application protocol handlers may not start the corresponding application for local intranet and trusted sites on Internet Explorer.

Affected platforms: 
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 8.1; Windows 7 SP1 
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2; Windows Server 2008 R2 SP1 
Resolution: This issue is resolved in KB4493472.

Back to top
March 12, 2019
KB4489878
Resolved
KB4493472
Resolved:
April 09, 2019
10:00 AM PT

Opened:
March 12, 2019
10:00 AM PT
Custom URI schemes may not start corresponding application.
After installing KB4489878, custom URI schemes for application protocol handlers may not start the corresponding application for local intranet and trusted sites on Internet Explorer.

Affected platforms: 
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10, version 1607; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 10 Enterprise LTSB 2015; Windows 8.1; Windows 7 SP1 
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2; Windows Server 2008 R2 SP1 
Resolution: This issue is resolved in KB4493472.

Back to top
March 12, 2019
KB4489878
Resolved
KB4493472
Resolved:
April 09, 2019
10:00 AM PT

Opened:
March 12, 2019
10:00 AM PT
NETDOM.EXE fails to run.
After installing KB4489878, NETDOM.EXE fails to run, and the on-screen error, “The command failed to complete successfully.” appears.

Affected platforms: 
  • Client: Windows 7 SP1
  • Server: Windows Server 2008 R2 SP1; Windows Server 2008 SP2
Resolution: This issue is resolved in KB4493472.

Back to top
March 12, 2019
KB4489878
Resolved
KB4493472
Resolved:
April 09, 2019
10:00 AM PT

Opened:
March 12, 2019
10:00 AM PT
" @@ -78,8 +78,8 @@ sections: - type: markdown text: " - - + +
DetailsOriginating updateStatusHistory
Internet Explorer may fail to load images.
After installing KB4486563, Internet Explorer may fail to load images with a backslash (\\) in their relative source path.

Affected platforms: 
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 8.1; Windows 7 SP1 
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2; Windows Server 2008 R2 SP1 
Resolution: This issue is resolved in KB4486565.

Back to top
February 12, 2019
KB4486563
Resolved
KB4486565
Resolved:
February 19, 2019
02:00 PM PT

Opened:
February 12, 2019
10:00 AM PT
Applications using Microsoft Jet database and Access 95 file format stop working.
Applications that use a Microsoft Jet database with the Microsoft Access 95 file format may randomly stop working.

Affected platforms: 
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 7, Service Pack 1 
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2008 R2 SP1 
Resolution: This issue is resolved in KB4486565.

Back to top
February 12, 2019
KB4486563
Resolved
KB4486565
Resolved:
February 19, 2019
02:00 PM PT

Opened:
February 12, 2019
10:00 AM PT
Internet Explorer may fail to load images.
After installing KB4486563, Internet Explorer may fail to load images with a backslash (\\) in their relative source path.

Affected platforms: 
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10, version 1607; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 10 Enterprise LTSB 2015; Windows 8.1; Windows 7 SP1 
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2; Windows Server 2008 R2 SP1 
Resolution: This issue is resolved in KB4486565.

Back to top
February 12, 2019
KB4486563
Resolved
KB4486565
Resolved:
February 19, 2019
02:00 PM PT

Opened:
February 12, 2019
10:00 AM PT
Applications using Microsoft Jet database and Access 95 file format stop working.
Applications that use a Microsoft Jet database with the Microsoft Access 95 file format may randomly stop working.

Affected platforms: 
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10, version 1607; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 10 Enterprise LTSB 2015; Windows 7, Service Pack 1 
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2008 R2 SP1 
Resolution: This issue is resolved in KB4486565.

Back to top
February 12, 2019
KB4486563
Resolved
KB4486565
Resolved:
February 19, 2019
02:00 PM PT

Opened:
February 12, 2019
10:00 AM PT
" @@ -90,8 +90,8 @@ sections: - - + +
DetailsOriginating updateStatusHistory
Virtual machines fail to restore.
After installing KB4480970, virtual machines (VM) may fail to restore successfully if the VM has been saved and restored once before. The error message is, “Failed to restore the virtual machine state: Cannot restore this virtual machine because the saved state data cannot be read. Delete the saved state data and then try to start the virtual machine. (0xC0370027).”

This affects AMD Bulldozer Family 15h, AMD Jaguar Family 16h, and AMD Puma Family 16h (second generation) microarchitectures.

Affected platforms: 
  • Client: Windows 7 SP1 
  • Server: Windows Server 2012; Windows Server 2008 R2 SP1; Windows Server 2008 SP2
Resolution: This issue is resolved in KB4490511.

Back to top
January 08, 2019
KB4480970
Resolved
KB4490511
Resolved:
February 19, 2019
02:00 PM PT

Opened:
January 08, 2019
10:00 AM PT
Local Administrators unable to remotely access shares.
Local users who are part of the local Administrators group may not be able to remotely access shares on Windows Server 2008 R2 and Windows 7 machines after installing KB4480970. This does not affect domain accounts in the local Administrators group.
 
Affected platforms: 
  • Client: Windows 7 SP1 
  • Server: Windows Server 2008 R2 SP1; Windows Server 2008 SP2 
Resolution: This issue is resolved in KB4487345.

Back to top
January 08, 2019
KB4480970
Resolved
KB4487345
Resolved:
January 11, 2019
02:00 PM PT

Opened:
January 08, 2019
10:00 AM PT
Internet Explorer 11 authentication issue with multiple concurrent logons.
After installing KB4480970, Internet Explorer 11 and other applications that use WININET.DLL may have authentication issues. This occurs when two or more people use the same user account for multiple, concurrent login sessions on the same Windows Server machine, including Remote Desktop Protocol (RDP) and Terminal Server logons. Symptoms reported by customers include, but may not be limited to:
  • Cache size and location show zero or empty.
  • Keyboard shortcuts may not work properly.
  • Webpages may intermittently fail to load or render correctly.
  • Issues with credential prompts.
  • Issues when downloading files.
Affected platforms: 
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10 Enterprise LTSC 2016; Windows 8.1; Windows 7 SP1
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server 2016; Windows Server 2012 R2; Windows Server 2012; Windows Server 2008 R2 SP1
Resolution: This issue is resolved in KB4493472.

Back to top
January 08, 2019
KB4480970
Resolved
KB4493472
Resolved:
April 09, 2019
10:00 AM PT

Opened:
January 08, 2019
10:00 AM PT
First character of the Japanese era name not recognized as an abbreviation.
After installing KB4480955, the first character of the Japanese era name is not recognized as an abbreviation and may cause date parsing issues.

Affected platforms: 
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 8.1; Windows 7 SP1 
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2; Windows Server 2012; Windows Server 2008 R2 SP1; Windows Server 2008 SP2 
Resolution: This issue is resolved in KB4486565.

Back to top
January 17, 2019
KB4480955
Resolved
KB4486565
Resolved:
February 19, 2019
02:00 PM PT

Opened:
January 17, 2019
10:00 AM PT
Internet Explorer 11 authentication issue with multiple concurrent logons.
After installing KB4480970, Internet Explorer 11 and other applications that use WININET.DLL may have authentication issues. This occurs when two or more people use the same user account for multiple, concurrent login sessions on the same Windows Server machine, including Remote Desktop Protocol (RDP) and Terminal Server logons. Symptoms reported by customers include, but may not be limited to:
  • Cache size and location show zero or empty.
  • Keyboard shortcuts may not work properly.
  • Webpages may intermittently fail to load or render correctly.
  • Issues with credential prompts.
  • Issues when downloading files.
Affected platforms: 
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1607; Windows 10 Enterprise LTSC 2016; Windows 8.1; Windows 7 SP1
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server 2016; Windows Server 2012 R2; Windows Server 2012; Windows Server 2008 R2 SP1
Resolution: This issue is resolved in KB4493472.

Back to top
January 08, 2019
KB4480970
Resolved
KB4493472
Resolved:
April 09, 2019
10:00 AM PT

Opened:
January 08, 2019
10:00 AM PT
First character of the Japanese era name not recognized as an abbreviation.
After installing KB4480955, the first character of the Japanese era name is not recognized as an abbreviation and may cause date parsing issues.

Affected platforms: 
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10, version 1607; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 10 Enterprise LTSB 2015; Windows 8.1; Windows 7 SP1 
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2; Windows Server 2012; Windows Server 2008 R2 SP1; Windows Server 2008 SP2 
Resolution: This issue is resolved in KB4486565.

Back to top
January 17, 2019
KB4480955
Resolved
KB4486565
Resolved:
February 19, 2019
02:00 PM PT

Opened:
January 17, 2019
10:00 AM PT
Applications using Microsoft Jet database fail to open.
Applications that use a Microsoft Jet database with the Microsoft Access 97 file format may fail to open if the database has column names greater than 32 characters. The database will fail to open with the error, “Unrecognized Database Format”.

Affected Platforms:
  • Client: Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 8.1; Windows 7 SP1 
  • Server: Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2; Windows Server 2012; Windows Server 2008 R2 SP1; Windows Server 2008 SP2 

Resolution: This issue is resolved in KB4486563.

Back to top
January 08, 2019
KB4480970
Resolved
KB4486563
Resolved:
February 12, 2019
10:00 AM PT

Opened:
January 08, 2019
10:00 AM PT
" @@ -102,6 +102,6 @@ sections: text: " - +
DetailsOriginating updateStatusHistory
Event Viewer may not show some event descriptions for network interface cards.
After installing KB4462927, the Event Viewer may not show some event descriptions for network interface cards (NICs).

Affected Platforms:
  • Client: Windows 7 SP1 
  • Server: Windows Server 2012; Windows Server 2008 R2 SP1
Resolution: This issue is resolved in KB4489878.

Back to top
October 18, 2018
KB4462927
Resolved
KB4489878
Resolved:
March 12, 2019
10:00 AM PT

Opened:
October 18, 2018
10:00 AM PT
Unable to use Seek bar in Windows Media Player
After installing KB4462923, users may not be able to use the Seek Bar in Windows Media Player when playing specific files. This issue does not affect normal playback.

Affected platforms: 
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 8.1; Windows 7 SP1
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2; Windows Server 2012; Windows Server 2008 R2 SP1; Windows Server 2008 SP2
Resolution: This issue is resolved in KB4471318.

Back to top
October 09, 2018
KB4462923
Resolved
KB4471318
Resolved:
December 11, 2018
10:00 AM PT

Opened:
October 09, 2018
10:00 AM PT
Unable to use Seek bar in Windows Media Player
After installing KB4462923, users may not be able to use the Seek Bar in Windows Media Player when playing specific files. This issue does not affect normal playback.

Affected platforms: 
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10, version 1607; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 10 Enterprise LTSB 2015; Windows 8.1; Windows 7 SP1
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2; Windows Server 2012; Windows Server 2008 R2 SP1; Windows Server 2008 SP2
Resolution: This issue is resolved in KB4471318.

Back to top
October 09, 2018
KB4462923
Resolved
KB4471318
Resolved:
December 11, 2018
10:00 AM PT

Opened:
October 09, 2018
10:00 AM PT
" diff --git a/windows/release-information/resolved-issues-windows-8.1-and-windows-server-2012-r2.yml b/windows/release-information/resolved-issues-windows-8.1-and-windows-server-2012-r2.yml index 58f30aecc2..1304589ed6 100644 --- a/windows/release-information/resolved-issues-windows-8.1-and-windows-server-2012-r2.yml +++ b/windows/release-information/resolved-issues-windows-8.1-and-windows-server-2012-r2.yml @@ -69,7 +69,7 @@ sections: - type: markdown text: " - +
DetailsOriginating updateStatusHistory
Custom URI schemes may not start corresponding application
After installing KB4489881, custom URI schemes for application protocol handlers may not start the corresponding application for local intranet and trusted sites security zones on Internet Explorer.

Affected platforms: 
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 8.1; Windows 7 SP1 
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2; Windows Server 2008 R2 SP1 
Resolution: This issue is resolved in KB4493446.

Back to top
March 12, 2019
KB4489881
Resolved
KB4493446
Resolved:
April 09, 2019
10:00 AM PT

Opened:
March 12, 2019
10:00 AM PT
Custom URI schemes may not start corresponding application
After installing KB4489881, custom URI schemes for application protocol handlers may not start the corresponding application for local intranet and trusted sites security zones on Internet Explorer.

Affected platforms: 
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10, version 1607; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 10 Enterprise LTSB 2015; Windows 8.1; Windows 7 SP1 
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2; Windows Server 2008 R2 SP1 
Resolution: This issue is resolved in KB4493446.

Back to top
March 12, 2019
KB4489881
Resolved
KB4493446
Resolved:
April 09, 2019
10:00 AM PT

Opened:
March 12, 2019
10:00 AM PT
Devices with winsock kernel client may receive error
After installing KB4489881, devices with a winsock kernel client may receive D1, FC, and other errors. Additionally, systems that run the Skype for Business or Lync Server Edge Transport role may be affected by this issue.

Affected platforms: 
  • Client: Windows 8.1 
  • Server: Windows Server 2012 R2 
Resolution: This issue is resolved in KB4489893.

Back to top
March 12, 2019
KB4489881
Resolved
KB4489893
Resolved:
March 19, 2019
10:00 AM PT

Opened:
March 12, 2019
10:00 AM PT
" @@ -80,8 +80,8 @@ sections: text: " - - + +
DetailsOriginating updateStatusHistory
Embedded objects may display incorrectly
Any compound document (OLE) server application that places embedded objects into the Windows Metafile (WMF) using the PatBlt API may display embedded objects incorrectly.

For example, if you paste a Microsoft Excel worksheet object into a Microsoft Word document, the cells may render with a different background color.

Affected platforms: 
  • Client: Windows 8.1 
  • Server: Windows Server 2012 R2; Windows Server 2012; Windows Server 2008 SP2
Resolution: This issue is resolved in KB4493446.

Back to top
February 12, 2019
KB4487000
Resolved
KB4493446
Resolved:
April 09, 2019
10:00 AM PT

Opened:
February 12, 2019
10:00 AM PT
Error 1309 when installing/uninstalling MSI or MSP files
After installing KB4487016, users may receive “Error 1309” while installing or uninstalling certain types of MSI and MSP files.

Affected platforms: 
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 8.1 
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2; Windows Server 2012 
Resolution: This issue is resolved in KB4489881.

Back to top
February 19, 2019
KB4487016
Resolved
KB4489881
Resolved:
March 12, 2019
10:00 AM PT

Opened:
February 19, 2019
02:00 PM PT
Internet Explorer may fail to load images
After installing KB4487000, Internet Explorer may fail to load images with a backslash (\\) in their relative source path.

Affected platforms: 
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 8.1; Windows 7 SP1 
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2; Windows Server 2008 R2 SP1 
Resolution: This issue is resolved in KB4487016.

Back to top
February 12, 2019
KB4487000
Resolved
KB4487016
Resolved:
February 19, 2019
02:00 PM PT

Opened:
February 12, 2019
10:00 AM PT
Error 1309 when installing/uninstalling MSI or MSP files
After installing KB4487016, users may receive “Error 1309” while installing or uninstalling certain types of MSI and MSP files.

Affected platforms: 
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10, version 1607; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 10 Enterprise LTSB 2015; Windows 8.1 
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2; Windows Server 2012 
Resolution: This issue is resolved in KB4489881.

Back to top
February 19, 2019
KB4487016
Resolved
KB4489881
Resolved:
March 12, 2019
10:00 AM PT

Opened:
February 19, 2019
02:00 PM PT
Internet Explorer may fail to load images
After installing KB4487000, Internet Explorer may fail to load images with a backslash (\\) in their relative source path.

Affected platforms: 
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10, version 1607; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 10 Enterprise LTSB 2015; Windows 8.1; Windows 7 SP1 
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2; Windows Server 2008 R2 SP1 
Resolution: This issue is resolved in KB4487016.

Back to top
February 12, 2019
KB4487000
Resolved
KB4487016
Resolved:
February 19, 2019
02:00 PM PT

Opened:
February 12, 2019
10:00 AM PT
" @@ -90,12 +90,12 @@ sections: - type: markdown text: " - - - + + + - +
DetailsOriginating updateStatusHistory
Internet Explorer 11 authentication issue with multiple concurrent logons
After installing KB4480963, Internet Explorer 11 and other applications that use WININET.DLL may have authentication issues. This occurs when two or more people use the same user account for multiple, concurrent login sessions on the same Windows Server machine, including Remote Desktop Protocol (RDP) and Terminal Server logons. Symptoms reported by customers include, but may not be limited to:
  • Cache size and location show zero or empty.
  • Keyboard shortcuts may not work properly.
  • Webpages may intermittently fail to load or render correctly.
  • Issues with credential prompts.
  • Issues when downloading files.
Affected platforms: 
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10 Enterprise LTSC 2016; Windows 8.1; Windows 7 SP1
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server 2016; Windows Server 2012 R2; Windows Server 2012; Windows Server 2008 R2 SP1
Resolution: This issue is resolved in KB4493446.

Back to top
January 08, 2019
KB4480963
Resolved
KB4493446
Resolved:
April 09, 2019
10:00 AM PT

Opened:
January 08, 2019
10:00 AM PT
MSXML6 may cause applications to stop responding.
After installing KB4480963, MSXML6 causes applications to stop responding if an exception was thrown during node operations, such as appendChild(), insertBefore(), and moveNode().

The Group Policy editor may stop responding when editing a Group Policy Object (GPO) that contains Group Policy Preferences (GPP) for Internet Explorer 10 settings.

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 8.1
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2; Windows Server 2012
Resolution: This issue is resolved in KB4493446.

Back to top
January 08, 2019
KB4480963
Resolved
KB4493446
Resolved:
April 09, 2019
10:00 AM PT

Opened:
January 08, 2019
10:00 AM PT
First character of the Japanese era name not recognized as an abbreviation
After installing KB4480969, the first character of the Japanese era name is not recognized as an abbreviation and may cause date parsing issues.

Affected platforms: 
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 8.1; Windows 7, SP1 
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2; Windows Server 2012; Windows Server 2008 R2 SP1; Windows Server 2008 SP2 
Resolution: This issue is resolved in KB4487016.

Back to top
January 15, 2019
KB4480969
Resolved
KB4487016
Resolved:
February 19, 2019
02:00 PM PT

Opened:
January 15, 2019
10:00 AM PT
Internet Explorer 11 authentication issue with multiple concurrent logons
After installing KB4480963, Internet Explorer 11 and other applications that use WININET.DLL may have authentication issues. This occurs when two or more people use the same user account for multiple, concurrent login sessions on the same Windows Server machine, including Remote Desktop Protocol (RDP) and Terminal Server logons. Symptoms reported by customers include, but may not be limited to:
  • Cache size and location show zero or empty.
  • Keyboard shortcuts may not work properly.
  • Webpages may intermittently fail to load or render correctly.
  • Issues with credential prompts.
  • Issues when downloading files.
Affected platforms: 
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1607; Windows 10 Enterprise LTSC 2016; Windows 8.1; Windows 7 SP1
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server 2016; Windows Server 2012 R2; Windows Server 2012; Windows Server 2008 R2 SP1
Resolution: This issue is resolved in KB4493446.

Back to top
January 08, 2019
KB4480963
Resolved
KB4493446
Resolved:
April 09, 2019
10:00 AM PT

Opened:
January 08, 2019
10:00 AM PT
MSXML6 may cause applications to stop responding.
After installing KB4480963, MSXML6 causes applications to stop responding if an exception was thrown during node operations, such as appendChild(), insertBefore(), and moveNode().

The Group Policy editor may stop responding when editing a Group Policy Object (GPO) that contains Group Policy Preferences (GPP) for Internet Explorer 10 settings.

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10, version 1607; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 10 Enterprise LTSB 2015; Windows 8.1
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2; Windows Server 2012
Resolution: This issue is resolved in KB4493446.

Back to top
January 08, 2019
KB4480963
Resolved
KB4493446
Resolved:
April 09, 2019
10:00 AM PT

Opened:
January 08, 2019
10:00 AM PT
First character of the Japanese era name not recognized as an abbreviation
After installing KB4480969, the first character of the Japanese era name is not recognized as an abbreviation and may cause date parsing issues.

Affected platforms: 
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10, version 1607; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 10 Enterprise LTSB 2015; Windows 8.1; Windows 7 SP1 
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2; Windows Server 2012; Windows Server 2008 R2 SP1; Windows Server 2008 SP2 
Resolution: This issue is resolved in KB4487016.

Back to top
January 15, 2019
KB4480969
Resolved
KB4487016
Resolved:
February 19, 2019
02:00 PM PT

Opened:
January 15, 2019
10:00 AM PT
Virtual machines fail to restore
After installing KB4480963, virtual machines (VM) may fail to restore successfully if the VM has been saved and restored once before. The error message is, “Failed to restore the virtual machine state: Cannot restore this virtual machine because the saved state data cannot be read. Delete the saved state data and then try to start the virtual machine. (0xC0370027).”

This affects AMD Bulldozer Family 15h, AMD Jaguar Family 16h, and AMD Puma Family 16h (second generation) microarchitectures.

Affected platforms: 
  • Client: Windows 7 SP1 
  • Server: Windows Server 2012; Windows Server 2008 R2 SP1; Windows Server 2008 SP2
Resolution: This issue is resolved in KB4490512.

Back to top
January 08, 2019
KB4480963
Resolved
KB4490512
Resolved:
February 19, 2019
02:00 PM PT

Opened:
January 08, 2019
10:00 AM PT
Applications using Microsoft Jet database fail to open
Applications that use a Microsoft Jet database with the Microsoft Access 97 file format may fail to open if the database has column names greater than 32 characters. The database will fail to open with the error, “Unrecognized Database Format”.

Affected platforms: 
  • Client: Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 8.1; Windows 7 SP1 
  • Server: Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2; Windows Server 2012; Windows Server 2008 R2 SP1; Windows Server 2008 SP2 
Resolution: This issue is resolved in KB4487000.

Back to top
January 08, 2019
KB4480963
Resolved
KB4487000
Resolved:
February 12, 2019
10:00 AM PT

Opened:
January 08, 2019
10:00 AM PT
Unable to access hotspots with third-party applications
After installing KB4480963, third-party applications may have difficulty authenticating hotspots.

Affected platforms: 
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 8.1 
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2; Windows Server 2012
Resolution: This issue is resolved in KB4480969.

Back to top
January 08, 2019
KB4480963
Resolved
KB4480969
Resolved:
January 15, 2019
10:00 AM PT

Opened:
January 08, 2019
10:00 AM PT
Unable to access hotspots with third-party applications
After installing KB4480963, third-party applications may have difficulty authenticating hotspots.

Affected platforms: 
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10, version 1607; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 10 Enterprise LTSB 2015; Windows 8.1 
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2; Windows Server 2012
Resolution: This issue is resolved in KB4480969.

Back to top
January 08, 2019
KB4480963
Resolved
KB4480969
Resolved:
January 15, 2019
10:00 AM PT

Opened:
January 08, 2019
10:00 AM PT
" @@ -104,6 +104,6 @@ sections: - type: markdown text: " - +
DetailsOriginating updateStatusHistory
Unable to use Seek bar in Windows Media Player
After installing KB4462926, users may not be able to use the Seek Bar in Windows Media Player when playing specific files. This issue does not affect normal playback.

Affected platforms: 
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 8.1; Windows 7 SP1 
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2; Windows Server 2012; Windows Server 2008 R2 SP1; Windows Server 2008 SP2
Resolution: This issue is resolved in KB4471320.

Back to top
October 09, 2018
KB4462926
Resolved
KB4471320
Resolved:
December 11, 2018
10:00 AM PT

Opened:
October 09, 2018
10:00 AM PT
Unable to use Seek bar in Windows Media Player
After installing KB4462926, users may not be able to use the Seek Bar in Windows Media Player when playing specific files. This issue does not affect normal playback.

Affected platforms: 
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10, version 1607; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 10 Enterprise LTSB 2015; Windows 8.1; Windows 7 SP1 
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2; Windows Server 2012; Windows Server 2008 R2 SP1; Windows Server 2008 SP2
Resolution: This issue is resolved in KB4471320.

Back to top
October 09, 2018
KB4462926
Resolved
KB4471320
Resolved:
December 11, 2018
10:00 AM PT

Opened:
October 09, 2018
10:00 AM PT
" diff --git a/windows/release-information/resolved-issues-windows-server-2008-sp2.yml b/windows/release-information/resolved-issues-windows-server-2008-sp2.yml index 4e04ae833d..04d9dd54bf 100644 --- a/windows/release-information/resolved-issues-windows-server-2008-sp2.yml +++ b/windows/release-information/resolved-issues-windows-server-2008-sp2.yml @@ -74,7 +74,7 @@ sections: - type: markdown text: " - + @@ -86,6 +86,6 @@ sections: - type: markdown text: "
DetailsOriginating updateStatusHistory
First character of the Japanese era name not recognized as an abbreviation
After installing KB4480974, the first character of the Japanese era name is not recognized as an abbreviation and may cause date parsing issues.

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 8.1; Windows 7 SP1
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2; Windows Server 2012; Windows Server 2008 R2 SP1; Windows Server 2008 SP2
Resolution: This issue is resolved in KB4489880.

Back to top
January 17, 2019
KB4480974
Resolved
KB4489880
Resolved:
March 12, 2019
10:00 AM PT

Opened:
January 17, 2019
10:00 AM PT
First character of the Japanese era name not recognized as an abbreviation
After installing KB4480974, the first character of the Japanese era name is not recognized as an abbreviation and may cause date parsing issues.

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10, version 1607; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 10 Enterprise LTSB 2015; Windows 8.1; Windows 7 SP1
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2; Windows Server 2012; Windows Server 2008 R2 SP1; Windows Server 2008 SP2
Resolution: This issue is resolved in KB4489880.

Back to top
January 17, 2019
KB4480974
Resolved
KB4489880
Resolved:
March 12, 2019
10:00 AM PT

Opened:
January 17, 2019
10:00 AM PT
Virtual machines fail to restore
After installing KB4480968, virtual machines (VM) may fail to restore successfully if the VM has been saved and restored once before. The error message is, “Failed to restore the virtual machine state: Cannot restore this virtual machine because the saved state data cannot be read. Delete the saved state data and then try to start the virtual machine. (0xC0370027).”

This affects AMD Bulldozer Family 15h, AMD Jaguar Family 16h, and AMD Puma Family 16h (second generation) microarchitectures.

Affected platforms: 
  • Client: Windows 7 SP1 
  • Server: Windows Server 2012; Windows Server 2008 R2 SP1; Windows Server 2008 SP2
Resolution: This issue is resolved in KB4490514.

Back to top
January 08, 2019
KB4480968
Resolved
KB4490514
Resolved:
February 19, 2019
02:00 PM PT

Opened:
January 08, 2019
10:00 AM PT
Applications using Microsoft Jet database fail to open
Applications that use a Microsoft Jet database with the Microsoft Access 97 file format may fail to open if the database has column names greater than 32 characters. The database will fail to open with the error, “Unrecognized Database Format”.

Affected platforms: 
  • Client: Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 8.1; Windows 7 SP1 
  • Server: Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2; Windows Server 2012; Windows Server 2008 R2 SP1; Windows Server 2008 SP2
Resolution: This issue is resolved in KB4487023.

Back to top
January 08, 2019
KB4480968
Resolved
KB4487023
Resolved:
February 12, 2019
10:00 AM PT

Opened:
January 08, 2019
10:00 AM PT
Local Administrators unable to remotely access shares
Local users who are part of the local Administrators group may not be able to remotely access shares on Windows Server 2008 R2 and Windows 7 machines after installing KB4480968. This does not affect domain accounts in the local Administrators group.

Affected platforms: 
  • Client: Windows 7 SP1 
  • Server: Windows Server 2008 R2 SP1; Windows Server 2008 SP2
Resolution: This issue is resolved in KB4487354.

Back to top
January 08, 2019
KB4480968
Resolved
KB4487354
Resolved:
January 11, 2019
02:00 PM PT

Opened:
January 08, 2019
10:00 AM PT
- +
DetailsOriginating updateStatusHistory
Unable to use Seek bar in Windows Media Player
After installing KB4463097, users may not be able to use the Seek Bar in Windows Media Player when playing specific files. This issue does not affect normal playback.

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 8.1; Windows 7 SP1
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2; Windows Server 2012; Windows Server 2008 R2 SP1; Windows Server 2008 SP2
Resolution: This issue is resolved in KB4471325.

Back to top
October 09, 2018
KB4463097
Resolved
KB4471325
Resolved:
December 11, 2018
10:00 AM PT

Opened:
October 09, 2018
10:00 AM PT
Unable to use Seek bar in Windows Media Player
After installing KB4463097, users may not be able to use the Seek Bar in Windows Media Player when playing specific files. This issue does not affect normal playback.

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10, version 1607; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 10 Enterprise LTSB 2015; Windows 8.1; Windows 7 SP1
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2; Windows Server 2012; Windows Server 2008 R2 SP1; Windows Server 2008 SP2
Resolution: This issue is resolved in KB4471325.

Back to top
October 09, 2018
KB4463097
Resolved
KB4471325
Resolved:
December 11, 2018
10:00 AM PT

Opened:
October 09, 2018
10:00 AM PT
" diff --git a/windows/release-information/resolved-issues-windows-server-2012.yml b/windows/release-information/resolved-issues-windows-server-2012.yml index 0c9f4f538a..27b009d318 100644 --- a/windows/release-information/resolved-issues-windows-server-2012.yml +++ b/windows/release-information/resolved-issues-windows-server-2012.yml @@ -59,7 +59,7 @@ sections: text: " - +
DetailsOriginating updateStatusHistory
Embedded objects may display incorrectly
Any compound document (OLE) server application that places embedded objects into the Windows Metafile (WMF) using the PatBlt API may display embedded objects incorrectly.

For example, if you paste a Microsoft Excel worksheet object into a Microsoft Word document, the cells may render with a different background color.

Affected platforms: 
  • Client: Windows 8.1 
  • Server: Windows Server 2012 R2; Windows Server 2012; Windows Server 2008 SP2
Resolution: This issue is resolved in KB4493451.

Back to top
February 12, 2019
KB4487025
Resolved
KB4493451
Resolved:
April 09, 2019
10:00 AM PT

Opened:
February 12, 2019
10:00 AM PT
Error 1309 when installing/uninstalling MSI or MSP files
After installing KB4487025, users may receive \"Error 1309\" while installing or uninstalling certain types of MSI and MSP files.

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 8.1
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2; Windows Server 2012
Resolution: This issue is resolved in KB4489891.

Back to top
February 12, 2019
KB4487025
Resolved
KB4489891
Resolved:
March 12, 2019
10:00 AM PT

Opened:
February 12, 2019
10:00 AM PT
Error 1309 when installing/uninstalling MSI or MSP files
After installing KB4487025, users may receive \"Error 1309\" while installing or uninstalling certain types of MSI and MSP files.

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10, version 1607; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 10 Enterprise LTSB 2015; Windows 8.1
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2; Windows Server 2012
Resolution: This issue is resolved in KB4489891.

Back to top
February 12, 2019
KB4487025
Resolved
KB4489891
Resolved:
March 12, 2019
10:00 AM PT

Opened:
February 12, 2019
10:00 AM PT
Applications using Microsoft Jet database and Access 95 file format stop working
Applications that use a Microsoft Jet database with the Microsoft Access 95 file format may randomly stop working.

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 7 SP1
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012; Windows Server 2008 R2 SP1; Windows Server 2008 SP2
Resolution: This issue is resolved in KB4487024.

Back to top
February 12, 2019
KB4487025
Resolved
KB4487024
Resolved:
February 19, 2019
02:00 PM PT

Opened:
February 12, 2019
10:00 AM PT
" @@ -69,12 +69,12 @@ sections: - type: markdown text: " - - + + - + - +
DetailsOriginating updateStatusHistory
Internet Explorer 11 authentication issue with multiple concurrent logons
After installing KB4480975, Internet Explorer 11 and other applications that use WININET.DLL may have authentication issues. This occurs when two or more people use the same user account for multiple, concurrent login sessions on the same Windows Server machine, including Remote Desktop Protocol (RDP) and Terminal Server logons. Symptoms reported by customers include, but may not be limited to:
  • Cache size and location show zero or empty.
  • Keyboard shortcuts may not work properly.
  • Webpages may intermittently fail to load or render correctly.
  • Issues with credential prompts.
  • Issues when downloading files.
Affected platforms: 
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10 Enterprise LTSC 2016; Windows 8.1; Windows 7 SP1
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server 2016; Windows Server 2012 R2; Windows Server 2012; Windows Server 2008 R2 SP1
Resolution: This issue is resolved in KB4493451.

Back to top
January 08, 2019
KB4480975
Resolved
KB4493451
Resolved:
April 09, 2019
10:00 AM PT

Opened:
January 08, 2019
10:00 AM PT
MSXML6 may cause applications to stop responding
After installing KB4480975, MSXML6 causes applications to stop responding if an exception was thrown during node operations, such as appendChild(), insertBefore(), and moveNode().

The Group Policy editor may stop responding when editing a Group Policy Object (GPO) that contains Group Policy Preferences (GPP) for Internet Explorer 10 settings.

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 8.1
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2; Windows Server 2012
Resolution: This issue is resolved in KB4493451.

Back to top
January 08, 2019
KB4480975
Resolved
KB4493451
Resolved:
April 09, 2019
10:00 AM PT

Opened:
January 08, 2019
10:00 AM PT
Internet Explorer 11 authentication issue with multiple concurrent logons
After installing KB4480975, Internet Explorer 11 and other applications that use WININET.DLL may have authentication issues. This occurs when two or more people use the same user account for multiple, concurrent login sessions on the same Windows Server machine, including Remote Desktop Protocol (RDP) and Terminal Server logons. Symptoms reported by customers include, but may not be limited to:
  • Cache size and location show zero or empty.
  • Keyboard shortcuts may not work properly.
  • Webpages may intermittently fail to load or render correctly.
  • Issues with credential prompts.
  • Issues when downloading files.
Affected platforms: 
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1607; Windows 10 Enterprise LTSC 2016; Windows 8.1; Windows 7 SP1
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server 2016; Windows Server 2012 R2; Windows Server 2012; Windows Server 2008 R2 SP1
Resolution: This issue is resolved in KB4493451.

Back to top
January 08, 2019
KB4480975
Resolved
KB4493451
Resolved:
April 09, 2019
10:00 AM PT

Opened:
January 08, 2019
10:00 AM PT
MSXML6 may cause applications to stop responding
After installing KB4480975, MSXML6 causes applications to stop responding if an exception was thrown during node operations, such as appendChild(), insertBefore(), and moveNode().

The Group Policy editor may stop responding when editing a Group Policy Object (GPO) that contains Group Policy Preferences (GPP) for Internet Explorer 10 settings.

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10, version 1607; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 10 Enterprise LTSB 2015; Windows 8.1
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2; Windows Server 2012
Resolution: This issue is resolved in KB4493451.

Back to top
January 08, 2019
KB4480975
Resolved
KB4493451
Resolved:
April 09, 2019
10:00 AM PT

Opened:
January 08, 2019
10:00 AM PT
Virtual machines fail to restore
After installing KB4480975, virtual machines (VM) may fail to restore successfully if the VM has been saved and restored once before. The error message is, \"Failed to restore the virtual machine state: Cannot restore this virtual machine because the saved state data cannot be read. Delete the saved state data and then try to start the virtual machine. (0xC0370027).\"

This affects AMD Bulldozer Family 15h, AMD Jaguar Family 16h, and AMD Puma Family 16h (second generation) microarchitectures.

Affected platforms: 
  • Client: Windows 7 SP1 
  • Server: Windows Server 2012; Windows Server 2008 R2 SP1; Windows Server 2008 SP2
Resolution: This issue is resolved in KB4490516.

Back to top
January 08, 2019
KB4480975
Resolved
KB4490516
Resolved:
February 19, 2019
02:00 PM PT

Opened:
January 08, 2019
10:00 AM PT
First character of the Japanese era name not recognized as an abbreviation
After installing KB4480971, the first character of the Japanese era name is not recognized as an abbreviation and may cause date parsing issues.

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 8.1; Windows 7 SP1
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2; Windows Server 2012; Windows Server 2008 R2 SP1; Windows Server 2008 SP2
Resolution: This issue is resolved in KB4487024.

Back to top
January 15, 2019
KB4480971
Resolved
KB4487024
Resolved:
February 19, 2019
02:00 PM PT

Opened:
January 15, 2019
10:00 AM PT
First character of the Japanese era name not recognized as an abbreviation
After installing KB4480971, the first character of the Japanese era name is not recognized as an abbreviation and may cause date parsing issues.

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10, version 1607; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 10 Enterprise LTSB 2015; Windows 8.1; Windows 7 SP1
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2; Windows Server 2012; Windows Server 2008 R2 SP1; Windows Server 2008 SP2
Resolution: This issue is resolved in KB4487024.

Back to top
January 15, 2019
KB4480971
Resolved
KB4487024
Resolved:
February 19, 2019
02:00 PM PT

Opened:
January 15, 2019
10:00 AM PT
Applications using Microsoft Jet database fail to open
Applications that use a Microsoft Jet database with the Microsoft Access 97 file format may fail to open if the database has column names greater than 32 characters. The database will fail to open with the error, \"Unrecognized Database Format\".

Affected platforms: 
  • Client: Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 8.1; Windows 7 SP1 
  • Server: Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2; Windows Server 2012; Windows Server 2008 R2 SP1; Windows Server 2008 SP2
Resolution: This issue is resolved in KB4487025.

Back to top
January 08, 2019
KB4480975
Resolved
KB4487025
Resolved:
February 12, 2019
10:00 AM PT

Opened:
January 08, 2019
10:00 AM PT
Unable to access hotspots with third-party applications
After installing KB4480975, third-party applications may have difficulty authenticating hotspots.

Affected platforms: 
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 8.1 
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2; Windows Server 2012
Resolution: This issue is resolved in KB4480971.

Back to top
January 08, 2019
KB4480975
Resolved
KB4480971
Resolved:
January 15, 2019
10:00 AM PT

Opened:
January 08, 2019
10:00 AM PT
Unable to access hotspots with third-party applications
After installing KB4480975, third-party applications may have difficulty authenticating hotspots.

Affected platforms: 
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10, version 1607; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 10 Enterprise LTSB 2015; Windows 8.1 
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2; Windows Server 2012
Resolution: This issue is resolved in KB4480971.

Back to top
January 08, 2019
KB4480975
Resolved
KB4480971
Resolved:
January 15, 2019
10:00 AM PT

Opened:
January 08, 2019
10:00 AM PT
" @@ -83,7 +83,7 @@ sections: - type: markdown text: " - +
DetailsOriginating updateStatusHistory
Unable to use Seek bar in Windows Media Player
After installing KB4462929, users may not be able to use the Seek Bar in Windows Media Player when playing specific files. This issue does not affect normal playback.

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 8.1; Windows 7 SP1
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2; Windows Server 2012; Windows Server 2008 R2 SP1; Windows Server 2008 SP2
Resolution: This issue is resolved in KB4471330.

Back to top
October 09, 2018
KB4462929
Resolved
KB4471330
Resolved:
December 11, 2018
10:00 AM PT

Opened:
October 09, 2018
10:00 AM PT
Unable to use Seek bar in Windows Media Player
After installing KB4462929, users may not be able to use the Seek Bar in Windows Media Player when playing specific files. This issue does not affect normal playback.

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10, version 1607; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 10 Enterprise LTSB 2015; Windows 8.1; Windows 7 SP1
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2; Windows Server 2012; Windows Server 2008 R2 SP1; Windows Server 2008 SP2
Resolution: This issue is resolved in KB4471330.

Back to top
October 09, 2018
KB4462929
Resolved
KB4471330
Resolved:
December 11, 2018
10:00 AM PT

Opened:
October 09, 2018
10:00 AM PT
" diff --git a/windows/release-information/status-windows-10-1507.yml b/windows/release-information/status-windows-10-1507.yml index f3c067bf78..0be6a687b8 100644 --- a/windows/release-information/status-windows-10-1507.yml +++ b/windows/release-information/status-windows-10-1507.yml @@ -47,7 +47,7 @@ sections: - items: - type: markdown text: " -
See all messages >
+ " - items: - type: markdown @@ -87,7 +87,7 @@ sections: - type: markdown text: " - +
DetailsOriginating updateStatusHistory
Custom URI schemes may not start corresponding application
After installing KB4489872, Custom URI Schemes for Application Protocol handlers may not start the corresponding application for local intranet and trusted sites on Internet Explorer.

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 8.1; Windows 7 SP1 
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2; Windows Server 2008 R2 SP1
Resolution: This issue was resolved in KB4493475.

Back to top
OS Build 10240.18158

March 12, 2019
KB4489872
Resolved
KB4493475
Resolved:
April 09, 2019
10:00 AM PT

Opened:
March 12, 2019
10:00 AM PT
Custom URI schemes may not start corresponding application
After installing KB4489872, Custom URI Schemes for Application Protocol handlers may not start the corresponding application for local intranet and trusted sites on Internet Explorer.

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10, version 1607; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 10 Enterprise LTSB 2015; Windows 8.1; Windows 7 SP1 
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2; Windows Server 2008 R2 SP1
Resolution: This issue was resolved in KB4493475.

Back to top
OS Build 10240.18158

March 12, 2019
KB4489872
Resolved
KB4493475
Resolved:
April 09, 2019
10:00 AM PT

Opened:
March 12, 2019
10:00 AM PT
" @@ -96,6 +96,6 @@ sections: - type: markdown text: " - +
DetailsOriginating updateStatusHistory
MSXML6 may cause applications to stop responding
After installing KB4480962, MSXML6 causes applications to stop responding if an exception was thrown during node operations, such as appendChild(), insertBefore(), and moveNode().

The Group Policy editor may stop responding when editing a Group Policy Object (GPO) that contains Group Policy Preferences (GPP) for Internet Explorer 10 settings.

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 8.1
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2; Windows Server 2012
Resolution: This issue was resolved in KB4493475.

Back to top
OS Build 10240.18094

January 08, 2019
KB4480962
Resolved
KB4493475
Resolved:
April 09, 2019
10:00 AM PT

Opened:
January 08, 2019
10:00 AM PT
MSXML6 may cause applications to stop responding
After installing KB4480962, MSXML6 causes applications to stop responding if an exception was thrown during node operations, such as appendChild(), insertBefore(), and moveNode().

The Group Policy editor may stop responding when editing a Group Policy Object (GPO) that contains Group Policy Preferences (GPP) for Internet Explorer 10 settings.

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10, version 1607; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 10 Enterprise LTSB 2015; Windows 8.1
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2; Windows Server 2012
Resolution: This issue was resolved in KB4493475.

Back to top
OS Build 10240.18094

January 08, 2019
KB4480962
Resolved
KB4493475
Resolved:
April 09, 2019
10:00 AM PT

Opened:
January 08, 2019
10:00 AM PT
" diff --git a/windows/release-information/status-windows-10-1607-and-windows-server-2016.yml b/windows/release-information/status-windows-10-1607-and-windows-server-2016.yml index f64038ea76..caf7922b53 100644 --- a/windows/release-information/status-windows-10-1607-and-windows-server-2016.yml +++ b/windows/release-information/status-windows-10-1607-and-windows-server-2016.yml @@ -47,7 +47,7 @@ sections: - items: - type: markdown text: " -
See all messages >
+ " - items: - type: markdown @@ -66,7 +66,7 @@ sections:
Issue using PXE to start a device from WDS
There may be issues using the Preboot Execution Environment (PXE) to start a device from a Windows Deployment Services (WDS) server configured to use Variable Window Extension.

See details >OS Build 14393.2848

March 12, 2019
KB4489882Mitigated
April 09, 2019
10:00 AM PT
SCVMM cannot enumerate and manage logical switches deployed on the host
For hosts managed by System Center Virtual Machine Manager (VMM), VMM cannot enumerate and manage logical switches deployed on the host.

See details >OS Build 14393.2639

November 27, 2018
KB4467684Mitigated
April 09, 2019
10:00 AM PT
Windows may not start on certain Lenovo and Fujitsu laptops with less than 8GB of RAM
Windows may fail to start on certain Lenovo and Fujitsu laptops that have less than 8 GB of RAM.

See details >OS Build 14393.2608

November 13, 2018
KB4467691Mitigated
February 19, 2019
10:00 AM PT -
End-user-defined characters (EUDC) cause blue screen at startup
If you enable per font end-user-defined characters (EUDC), the system will stop working and a blue screen may appear at startup.

See details >OS Build 14393.2879

March 19, 2019
KB4489889Resolved
KB4493470April 09, 2019
10:00 AM PT +
End-user-defined characters (EUDC) may cause blue screen at startup
If you enable per font end-user-defined characters (EUDC), the system will stop working and a blue screen may appear at startup.

See details >OS Build 14393.2879

March 19, 2019
KB4489889Resolved
KB4493470April 09, 2019
10:00 AM PT
Internet Explorer 11 authentication issue with multiple concurrent logons
Internet Explorer 11 users may encounter issues if two or more people use the same user account for multiple, concurrent login sessions on the same Windows Server machine.

See details >OS Build 14393.2724

January 08, 2019
KB4480961Resolved
KB4493470April 09, 2019
10:00 AM PT
MSXML6 may cause applications to stop responding
MSXML6 may cause applications to stop responding if an exception was thrown during node operations, such as appendChild(), insertBefore(), and moveNode().

See details >OS Build 14393.2724

January 08, 2019
KB4480961Resolved
KB4493470April 09, 2019
10:00 AM PT @@ -94,9 +94,9 @@ sections: text: " - - +
DetailsOriginating updateStatusHistory
Custom URI schemes may not start corresponding application
After installing KB4489882, Custom URI schemes for application protocol handlers may not start the corresponding application for local intranet and trusted sites security zones on Internet Explorer.

Affected platforms: 
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10, version 1607; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 10 Enterprise LTSB 2015; Windows 8.1; Windows 7 SP1 
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2; Windows Server 2008 R2 SP1
Workaround: Right-click the URL link to open it in a new window or tab, or enable Protected Mode in Internet Explorer for local intranet and trusted sites
  1. Go to Tools > Internet options > Security.
  2. Within Select a zone to view or change security settings, select Local intranet and then select Enable Protected Mode.
  3. Select Trusted sites and then select Enable Protected Mode.
  4. Select OK.
You must restart the browser after making these changes.

Next steps: Microsoft is working on a resolution and will provide an update in an upcoming release.

Back to top
OS Build 14393.2848

March 12, 2019
KB4489882
Mitigated
Last updated:
April 09, 2019
10:00 AM PT

Opened:
March 12, 2019
10:00 AM PT
Issue using PXE to start a device from WDS
After installing KB4489882, there may be issues using the Preboot Execution Environment (PXE) to start a device from a Windows Deployment Services (WDS) server configured to use Variable Window Extension. This may cause the connection to the WDS server to terminate prematurely while downloading the image. This issue does not affect clients or devices that are not using Variable Window Extension.

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10 Enterprise LTSC 2016; Windows 8.1
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server 2016; Windows Server 2012 R2; Windows Server 2012
Workaround: To mitigate the issue, disable the Variable Window Extension on WDS server using one of the following options:
Option 1:
Open an Administrator Command prompt and type the following:
Wdsutil /Set-TransportServer /EnableTftpVariableWindowExtension:No
+      
Issue using PXE to start a device from WDS
After installing KB4489882, there may be issues using the Preboot Execution Environment (PXE) to start a device from a Windows Deployment Services (WDS) server configured to use Variable Window Extension. This may cause the connection to the WDS server to terminate prematurely while downloading the image. This issue does not affect clients or devices that are not using Variable Window Extension.

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1607; Windows 10 Enterprise LTSC 2016; Windows 8.1
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server 2016; Windows Server 2012 R2; Windows Server 2012
Workaround: To mitigate the issue, disable the Variable Window Extension on WDS server using one of the following options:
Option 1:
Open an Administrator Command prompt and type the following:
Wdsutil /Set-TransportServer /EnableTftpVariableWindowExtension:No
 
Option 2:
Use the Windows Deployment Services UI to make the following adjustment:
  1. Open Windows Deployment Services from Windows Administrative Tools.
  2. Expand Servers and right-click a WDS server.
  3. Open its properties and clear the Enable Variable Window Extension box on the TFTP tab.
Option 3:
Set the following registry value to 0:
HKLM\\System\\CurrentControlSet\\Services\\WDSServer\\Providers\\WDSTFTP\\EnableVariableWindowExtension
Restart the WDSServer service after disabling the Variable Window Extension.

Next steps: Microsoft is working on a resolution and will provide an update in an upcoming release.

Back to top
OS Build 14393.2848

March 12, 2019
KB4489882
Mitigated
Last updated:
April 09, 2019
10:00 AM PT

Opened:
March 12, 2019
10:00 AM PT
End-user-defined characters (EUDC) cause blue screen at startup
If you enable per font end-user-defined characters (EUDC), the system will stop working and a blue screen may appear at startup. This is not a common setting in non-Asian regions.

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10, version 1607; Windows 10 Enterprise LTSC 2016
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016
Resolution: This issue was resolved in KB4493470.

Back to top
OS Build 14393.2879

March 19, 2019
KB4489889
Resolved
KB4493470
Resolved:
April 09, 2019
10:00 AM PT

Opened:
March 19, 2019
10:00 AM PT
End-user-defined characters (EUDC) may cause blue screen at startup
If you enable per font end-user-defined characters (EUDC), the system will stop working and a blue screen may appear at startup. This is not a common setting in non-Asian regions.

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10, version 1607; Windows 10 Enterprise LTSC 2016
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016
Resolution: This issue was resolved in KB4493470.

Back to top
OS Build 14393.2879

March 19, 2019
KB4489889
Resolved
KB4493470
Resolved:
April 09, 2019
10:00 AM PT

Opened:
March 19, 2019
10:00 AM PT
" @@ -116,7 +116,7 @@ sections: text: " - +
DetailsOriginating updateStatusHistory
Cluster service may fail if the minimum password length is set to greater than 14
After installing KB4467684, the cluster service may fail to start with the error \"2245 (NERR_PasswordTooShort)\" if the Group Policy \"Minimum Password Length\" is configured with greater than 14 characters.

Affected platforms:
  • Client: Windows 10, version 1607; Windows 10 Enterprise LTSC 2016
  • Server: Windows Server 2016
Workaround: Set the domain default \"Minimum Password Length\" policy to less than or equal to 14 characters.

Next steps: Microsoft is working on a resolution and will provide an update in an upcoming release.

Back to top
OS Build 14393.2639

November 27, 2018
KB4467684
Mitigated
Last updated:
April 09, 2019
10:00 AM PT

Opened:
November 27, 2018
10:00 AM PT
SCVMM cannot enumerate and manage logical switches deployed on the host
For hosts managed by System Center Virtual Machine Manager (VMM), VMM cannot enumerate and manage logical switches deployed on the host after installing KB4467684.

Additionally, if you do not follow the best practices, a stop error may occur in vfpext.sys on the hosts.

Affected platforms:
  • Client: Windows 10, version 1607; Windows 10 Enterprise LTSC 2016
  • Server: Windows Server 2016
Workaround:
Run mofcomp on the following mof files on the affected host:

  • Scvmmswitchportsettings.mof
  • VMMDHCPSvr.mof
Follow the best practices while patching to avoid a stop error in vfpext.sys in an SDN v2 environment (NC managed hosts).

Back to top
OS Build 14393.2639

November 27, 2018
KB4467684
Mitigated
Last updated:
April 09, 2019
10:00 AM PT

Opened:
November 27, 2018
10:00 AM PT
SCVMM cannot enumerate and manage logical switches deployed on the host
For hosts managed by System Center Virtual Machine Manager (VMM), VMM cannot enumerate and manage logical switches deployed on the host after installing KB4467684.

Additionally, if you do not follow the best practices, a stop error may occur in vfpext.sys on the hosts.

Affected platforms:
  • Client: Windows 10, version 1607; Windows 10 Enterprise LTSC 2016
  • Server: Windows Server 2016
Workaround:
Run mofcomp on the following mof files on the affected host:
  • Scvmmswitchportsettings.mof
  • VMMDHCPSvr.mof
Follow the best practices while patching to avoid a stop error in vfpext.sys in an SDN v2 environment (NC managed hosts).

Back to top
OS Build 14393.2639

November 27, 2018
KB4467684
Mitigated
Last updated:
April 09, 2019
10:00 AM PT

Opened:
November 27, 2018
10:00 AM PT
Windows may not start on certain Lenovo and Fujitsu laptops with less than 8GB of RAM
After installing KB4467691, Windows may fail to start on certain Lenovo and Fujitsu laptops that have less than 8 GB of RAM.

Affected platforms:
  • Client: Windows 10, version 1607; Windows 10 Enterprise LTSC 2016
  • Server: Windows Server 2016
Workaround: Restart the affected machine using the Unified Extensible Firmware Interface (UEFI). Disable Secure Boot and then restart.

If BitLocker is enabled on your machine, you may have to go through BitLocker recovery after Secure Boot has been disabled.

Next steps: Lenovo and Fujitsu are aware of this issue. Please contact your OEM to ask if there is a firmware update available for your device.

Back to top
OS Build 14393.2608

November 13, 2018
KB4467691
Mitigated
Last updated:
February 19, 2019
10:00 AM PT

Opened:
November 13, 2018
10:00 AM PT
" diff --git a/windows/release-information/status-windows-10-1703.yml b/windows/release-information/status-windows-10-1703.yml index c3bea56d97..00132830df 100644 --- a/windows/release-information/status-windows-10-1703.yml +++ b/windows/release-information/status-windows-10-1703.yml @@ -47,7 +47,7 @@ sections: - items: - type: markdown text: " -
See all messages >
+ " - items: - type: markdown @@ -88,7 +88,7 @@ sections: - type: markdown text: " - +
DetailsOriginating updateStatusHistory
Custom URI schemes may not start corresponding application
After installing KB4489871, custom URI schemes for application protocol handlers may not start the corresponding application for local intranet and trusted sites security zones on Internet Explorer.

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 8.1; Windows 7 SP1 
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2; Windows Server 2008 R2 SP1
Workaround: Right-click the URL link to open it in a new window or tab, or enable Protected Mode in Internet Explorer for local intranet and trusted sites
1. Go to Tools > Internet options > Security.
2. Within Select a zone to view or change security settings, select Local intranet and then select Enable Protected Mode.
3. Select Trusted sites and then select Enable Protected Mode.
4. Select OK.
You must restart the browser after making these changes.

Next steps: Microsoft is working on a resolution and will provide an update in an upcoming release.

Back to top
OS Build 15063.1689

March 12, 2019
KB4489871
Mitigated
Last updated:
April 09, 2019
10:00 AM PT

Opened:
March 12, 2019
10:00 AM PT
Custom URI schemes may not start corresponding application
After installing KB4489871, custom URI schemes for application protocol handlers may not start the corresponding application for local intranet and trusted sites security zones on Internet Explorer.

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10, version 1607; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 10 Enterprise LTSB 2015; Windows 8.1; Windows 7 SP1 
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2; Windows Server 2008 R2 SP1
Workaround: Right-click the URL link to open it in a new window or tab, or enable Protected Mode in Internet Explorer for local intranet and trusted sites
1. Go to Tools > Internet options > Security.
2. Within Select a zone to view or change security settings, select Local intranet and then select Enable Protected Mode.
3. Select Trusted sites and then select Enable Protected Mode.
4. Select OK.
You must restart the browser after making these changes.

Next steps: Microsoft is working on a resolution and will provide an update in an upcoming release.

Back to top
OS Build 15063.1689

March 12, 2019
KB4489871
Mitigated
Last updated:
April 09, 2019
10:00 AM PT

Opened:
March 12, 2019
10:00 AM PT
End-user-defined characters (EUDC) may cause blue screen at startup
If you enable per font end-user-defined characters (EUDC), the system may stop working and a blue screen may appear at startup. This is not a common setting in non-Asian regions.

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016
Resolution: This issue was resolved in KB4493474.

Back to top
OS Build 15063.1716

March 19, 2019
KB4489888
Resolved
KB4493474
Resolved:
April 09, 2019
10:00 AM PT

Opened:
March 19, 2019
10:00 AM PT
" @@ -98,6 +98,6 @@ sections: - type: markdown text: " - +
DetailsOriginating updateStatusHistory
MSXML6 may cause applications to stop responding
After installing KB4480973, MSXML6 causes applications to stop responding if an exception was thrown during node operations, such as appendChild(), insertBefore(), and moveNode().

The Group Policy editor may stop responding when editing a Group Policy Object (GPO) that contains Group Policy Preferences (GPP) for Internet Explorer 10 settings.

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 8.1
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2
Resolution: This issue was resolved in KB4493474.

Back to top
OS Build 15063.1563

January 08, 2019
KB4480973
Resolved
KB4493474
Resolved:
April 09, 2019
10:00 AM PT

Opened:
January 08, 2019
10:00 AM PT
MSXML6 may cause applications to stop responding
After installing KB4480973, MSXML6 causes applications to stop responding if an exception was thrown during node operations, such as appendChild(), insertBefore(), and moveNode().

The Group Policy editor may stop responding when editing a Group Policy Object (GPO) that contains Group Policy Preferences (GPP) for Internet Explorer 10 settings.

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10, version 1607; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 10 Enterprise LTSB 2015; Windows 8.1
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2
Resolution: This issue was resolved in KB4493474.

Back to top
OS Build 15063.1563

January 08, 2019
KB4480973
Resolved
KB4493474
Resolved:
April 09, 2019
10:00 AM PT

Opened:
January 08, 2019
10:00 AM PT
" diff --git a/windows/release-information/status-windows-10-1709.yml b/windows/release-information/status-windows-10-1709.yml index a8062681f9..85e402adbf 100644 --- a/windows/release-information/status-windows-10-1709.yml +++ b/windows/release-information/status-windows-10-1709.yml @@ -47,7 +47,7 @@ sections: - items: - type: markdown text: " -
See all messages >
+ " - items: - type: markdown @@ -89,8 +89,8 @@ sections: - type: markdown text: " - - + +
DetailsOriginating updateStatusHistory
Custom URI schemes may not start corresponding application
After installing KB4489886, custom URI schemes for application protocol handlers may not start the corresponding application for local intranet and trusted sites security zones on Internet Explorer.

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 8.1; Windows 7 SP1 
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2; Windows Server 2008 R2 SP1
Workaround: Right-click the URL link to open it in a new window or tab, or enable Protected Mode in Internet Explorer for local intranet and trusted sites
1. Go to Tools > Internet options > Security.
2. Within Select a zone to view or change security settings, select Local intranet and then select Enable Protected Mode.
3. Select Trusted sites and then select Enable Protected Mode.
4. Select OK.
You must restart the browser after making these changes.

Next steps: Microsoft is working on a resolution and will provide an update in an upcoming release.

Back to top
OS Build 16299.1029

March 12, 2019
KB4489886
Mitigated
Last updated:
April 09, 2019
10:00 AM PT

Opened:
March 12, 2019
10:00 AM PT
End-user-defined characters (EUDC) may cause blue screen at startup
If you enable per font end-user-defined characters (EUDC), the system may stop working and a blue screen may appear at startup. This is not a common setting in non-Asian regions.

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016
Resolution: This issue is resolved in KB4493441.

Back to top
OS Build 16299.1059

March 19, 2019
KB4489890
Resolved
KB4493441
Resolved:
April 09, 2019
10:00 AM PT

Opened:
March 19, 2019
10:00 AM PT
Custom URI schemes may not start corresponding application
After installing KB4489886, custom URI schemes for application protocol handlers may not start the corresponding application for local intranet and trusted sites security zones on Internet Explorer.

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10, version 1607; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 10 Enterprise LTSB 2015; Windows 8.1; Windows 7 SP1 
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2; Windows Server 2008 R2 SP1
Workaround: Right-click the URL link to open it in a new window or tab, or enable Protected Mode in Internet Explorer for local intranet and trusted sites
1. Go to Tools > Internet options > Security.
2. Within Select a zone to view or change security settings, select Local intranet and then select Enable Protected Mode.
3. Select Trusted sites and then select Enable Protected Mode.
4. Select OK.
You must restart the browser after making these changes.

Next steps: Microsoft is working on a resolution and will provide an update in an upcoming release.

Back to top
OS Build 16299.1029

March 12, 2019
KB4489886
Mitigated
Last updated:
April 09, 2019
10:00 AM PT

Opened:
March 12, 2019
10:00 AM PT
End-user-defined characters (EUDC) may cause blue screen at startup
If you enable per font end-user-defined characters (EUDC), the system may stop working and a blue screen may appear at startup. This is not a common setting in non-Asian regions.

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10, version 1607; Windows 10 Enterprise LTSC 2016
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016
Resolution: This issue is resolved in KB4493441.

Back to top
OS Build 16299.1059

March 19, 2019
KB4489890
Resolved
KB4493441
Resolved:
April 09, 2019
10:00 AM PT

Opened:
March 19, 2019
10:00 AM PT
Stop error when attempting to start SSH from WSL
After applying KB4489886, a stop error occurs when attempting to start the Secure Shell (SSH) client program from Windows Subsystem for Linux (WSL) with agent forwarding enabled using a command line switch (ssh –A) or a configuration setting.

Affected platforms:
  • Client: Windows 10, version 1803; Windows 10, version 1709
  • Server: Windows Server, version 1803; Windows Server, version 1709
Resolution: This issue is resolved in KB4493441.

Back to top
OS Build 16299.1029

March 12, 2019
KB4489886
Resolved
KB4493441
Resolved:
April 09, 2019
10:00 AM PT

Opened:
March 12, 2019
10:00 AM PT
" diff --git a/windows/release-information/status-windows-10-1803.yml b/windows/release-information/status-windows-10-1803.yml index 410fba505d..8256f9117b 100644 --- a/windows/release-information/status-windows-10-1803.yml +++ b/windows/release-information/status-windows-10-1803.yml @@ -47,7 +47,7 @@ sections: - items: - type: markdown text: " -
See all messages >
+ " - items: - type: markdown @@ -90,10 +90,10 @@ sections: - type: markdown text: " - - + - +
DetailsOriginating updateStatusHistory
Custom URI schemes may not start corresponding application
After installing KB4489868, custom URI schemes for application protocol handlers may not start the corresponding application for local intranet and trusted sites security zones on Internet Explorer. 

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 8.1; Windows 7 SP1 
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2; Windows Server 2008 R2 SP1
Workaround: Right-click the URL link to open it in a new window or tab, or enable Protected Mode in Internet Explorer for local intranet and trusted sites
  1. Go to Tools > Internet options > Security 
  2. Within Select a zone to view or change security settings, select Local intranet and then select Enable Protected Mode.
  3. Select Trusted sites and then select Enable Protected Mode
  4. Select OK
 You must restart the browser after making these changes. 
 
Next steps: Microsoft is working on a resolution and will provide an update in an upcoming release. 

Back to top
OS Build 17134.648

March 12, 2019
KB4489868
Mitigated
Last updated:
April 09, 2019
10:00 AM PT

Opened:
March 12, 2019
10:00 AM PT
Issue using PXE to start a device from WDS
After installing KB4489868, there may be issues using the Preboot Execution Environment (PXE) to start a device from a Windows Deployment Services (WDS) server configured to use Variable Window Extension. This may cause the connection to the WDS server to terminate prematurely while downloading the image. This issue does not affect clients or devices that are not using Variable Window Extension. 

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10 Enterprise LTSC 2016; Windows 8.1
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server 2016; Windows Server 2012 R2; Windows Server 2012
Workaround: To mitigate the issue, disable the Variable Window Extension on WDS server using one of the following options:
Option 1: 
Open an Administrator Command prompt and type the following:  
Wdsutil /Set-TransportServer /EnableTftpVariableWindowExtension:No
+      
Custom URI schemes may not start corresponding application
After installing KB4489868, custom URI schemes for application protocol handlers may not start the corresponding application for local intranet and trusted sites security zones on Internet Explorer. 

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10, version 1607; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 10 Enterprise LTSB 2015; Windows 8.1; Windows 7 SP1 
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2; Windows Server 2008 R2 SP1
Workaround: Right-click the URL link to open it in a new window or tab, or enable Protected Mode in Internet Explorer for local intranet and trusted sites
  1. Go to Tools > Internet options > Security 
  2. Within Select a zone to view or change security settings, select Local intranet and then select Enable Protected Mode.
  3. Select Trusted sites and then select Enable Protected Mode
  4. Select OK
 You must restart the browser after making these changes. 
 
Next steps: Microsoft is working on a resolution and will provide an update in an upcoming release. 

Back to top
OS Build 17134.648

March 12, 2019
KB4489868
Mitigated
Last updated:
April 09, 2019
10:00 AM PT

Opened:
March 12, 2019
10:00 AM PT
Issue using PXE to start a device from WDS
After installing KB4489868, there may be issues using the Preboot Execution Environment (PXE) to start a device from a Windows Deployment Services (WDS) server configured to use Variable Window Extension. This may cause the connection to the WDS server to terminate prematurely while downloading the image. This issue does not affect clients or devices that are not using Variable Window Extension. 

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1607; Windows 10 Enterprise LTSC 2016; Windows 8.1
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server 2016; Windows Server 2012 R2; Windows Server 2012
Workaround: To mitigate the issue, disable the Variable Window Extension on WDS server using one of the following options:
Option 1: 
Open an Administrator Command prompt and type the following:  
Wdsutil /Set-TransportServer /EnableTftpVariableWindowExtension:No
 
 Option 2: 
Use the Windows Deployment Services UI to make the following adjustment:  
  1. Open Windows Deployment Services from Windows Administrative Tools. 
  2. Expand Servers and right-click a WDS server. 
  3. Open its properties and clear the?Enable Variable Window Extension?box on the TFTP tab.  
Option 3: 
Set the following registry value to 0:  
HKLM\\System\\CurrentControlSet\\Services\\WDSServer\\Providers\\WDSTFTP\\EnableVariableWindowExtension  
Restart the WDSServer service after disabling the Variable Window Extension. 
 
Next steps: Microsoft is working on a resolution and will provide an update in an upcoming release. 

Back to top
OS Build 17134.648

March 12, 2019
KB4489868
Mitigated
Last updated:
April 09, 2019
10:00 AM PT

Opened:
March 12, 2019
10:00 AM PT
End-user-defined characters (EUDC) may cause blue screen at startup
If you enable per font end-user-defined characters (EUDC), the system may stop working and a blue screen may appear at startup. This is not a common setting in non-Asian regions. 

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016
Resolution: This issue was resolved in KB4493464

Back to top
OS Build 17134.677

March 19, 2019
KB4489894
Resolved
KB4493464
Resolved:
April 09, 2019
10:00 AM PT

Opened:
March 19, 2019
10:00 AM PT
End-user-defined characters (EUDC) may cause blue screen at startup
If you enable per font end-user-defined characters (EUDC), the system may stop working and a blue screen may appear at startup. This is not a common setting in non-Asian regions. 

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10, version 1607; Windows 10 Enterprise LTSC 2016
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016
Resolution: This issue was resolved in KB4493464

Back to top
OS Build 17134.677

March 19, 2019
KB4489894
Resolved
KB4493464
Resolved:
April 09, 2019
10:00 AM PT

Opened:
March 19, 2019
10:00 AM PT
Stop error when attempting to start SSH from WSL
After applying KB4489868, a stop error occurs when attempting to start the Secure Shell (SSH) client program from Windows Subsystem for Linux (WSL) with agent forwarding enabled using a command line switch (ssh -A) or a configuration setting.

Affected platforms:
  • Client: Windows 10, version 1803; Windows 10, version 1709
  • Server: Windows Server, version 1803; Windows Server, version 1709
Resolution: This issue was resolved in KB4493464.

Back to top
OS Build 17134.648

March 12, 2019
KB4489868
Resolved
KB4493464
Resolved:
April 09, 2019
10:00 AM PT

Opened:
March 12, 2019
10:00 AM PT
" @@ -103,6 +103,6 @@ sections: - type: markdown text: " - +
DetailsOriginating updateStatusHistory
MSXML6 may cause applications to stop responding
After installing KB4480966, MSXML6 causes applications to stop responding if an exception was thrown during node operations, such as appendChild(), insertBefore(), and moveNode().

The Group Policy editor may stop responding when editing a Group Policy Object (GPO) that contains Group Policy Preferences (GPP) for Internet Explorer 10 settings.

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 8.1
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2; Windows Server 2012
Resolution: This issue was resolved in KB4493464

Back to top
OS Build 17134.523

January 08, 2019
KB4480966
Resolved
KB4493464
Resolved:
April 09, 2019
10:00 AM PT

Opened:
January 08, 2019
10:00 AM PT
MSXML6 may cause applications to stop responding
After installing KB4480966, MSXML6 causes applications to stop responding if an exception was thrown during node operations, such as appendChild(), insertBefore(), and moveNode().

The Group Policy editor may stop responding when editing a Group Policy Object (GPO) that contains Group Policy Preferences (GPP) for Internet Explorer 10 settings.

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10, version 1607; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 10 Enterprise LTSB 2015; Windows 8.1
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2; Windows Server 2012
Resolution: This issue was resolved in KB4493464

Back to top
OS Build 17134.523

January 08, 2019
KB4480966
Resolved
KB4493464
Resolved:
April 09, 2019
10:00 AM PT

Opened:
January 08, 2019
10:00 AM PT
" diff --git a/windows/release-information/status-windows-10-1809-and-windows-server-2019.yml b/windows/release-information/status-windows-10-1809-and-windows-server-2019.yml index d181dd1890..b2aa3074c7 100644 --- a/windows/release-information/status-windows-10-1809-and-windows-server-2019.yml +++ b/windows/release-information/status-windows-10-1809-and-windows-server-2019.yml @@ -52,7 +52,7 @@ sections: - items: - type: markdown text: " -
See all messages >
+ " - items: - type: markdown @@ -91,7 +91,7 @@ sections: - +
DetailsOriginating updateStatusHistory
System may be unresponsive after restart if ArcaBit antivirus software installed
Microsoft and ArcaBit have identified an issue on devices with ArcaBit antivirus software installed that may cause the system to become unresponsive upon restart after installing KB4493509
 
Microsoft has temporarily blocked devices from receiving this update if ArcaBit antivirus software is installed. 

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 8.1; Windows 7 SP1
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server 2012 R2; Windows Server 2008 R2 SP1
ArcaBit has released an update to address this issue. For more information, see the Arcabit support article.

Back to top
OS Build 17763.437

April 09, 2019
KB4493509
Mitigated
Last updated:
April 26, 2019
10:50 AM PT

Opened:
April 26, 2019
10:50 AM PT
Certain operations performed on a Cluster Shared Volume may fail
Certain operations, such as rename, that you perform on files or folders that are on a Cluster Shared Volume (CSV) may fail with the error, \"STATUS_BAD_IMPERSONATION_LEVEL (0xC00000A5)\". This occurs when you perform the operation on a CSV owner node from a process that doesn’t have administrator privilege. 

Affected platforms: 
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10, version 1607; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 10 Enterprise LTSB 2015; Windows 8.1
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2; Windows Server 2012
Workaround: Do one of the following:  
  • Perform the operation from a process that has administrator privilege. 
  • Perform the operation from a node that doesn’t have CSV ownership. 
Next steps: Microsoft is working on a resolution and will provide an update in an upcoming release.

Back to top
OS Build 17763.437

April 09, 2019
KB4493509
Mitigated
Last updated:
April 26, 2019
10:50 AM PT

Opened:
April 26, 2019
10:50 AM PT
End-user-defined characters (EUDC) may cause blue screen at startup
If you enable per font end-user-defined characters (EUDC), the system will stop working and a blue screen may appear at startup. This is not a common setting in non-Asian regions.

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016
Workaround: To avoid this issue, don't enable per font EUDC. As an alternative, you can edit the registry to mitigate this issue; for more information, see KB4496149.

Resolved: This issue was resolved in KB4493509.

Back to top
OS Build 17763.404

April 02, 2019
KB4490481
Resolved
KB4493509
Resolved:
April 09, 2019
10:00 AM PT

Opened:
April 02, 2019
10:00 AM PT
End-user-defined characters (EUDC) may cause blue screen at startup
If you enable per font end-user-defined characters (EUDC), the system will stop working and a blue screen may appear at startup. This is not a common setting in non-Asian regions.

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10, version 1607; Windows 10 Enterprise LTSC 2016
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016
Workaround: To avoid this issue, don't enable per font EUDC. As an alternative, you can edit the registry to mitigate this issue; for more information, see KB4496149.

Resolved: This issue was resolved in KB4493509.

Back to top
OS Build 17763.404

April 02, 2019
KB4490481
Resolved
KB4493509
Resolved:
April 09, 2019
10:00 AM PT

Opened:
April 02, 2019
10:00 AM PT
" @@ -100,8 +100,8 @@ sections: - type: markdown text: " - - +
DetailsOriginating updateStatusHistory
Custom URI schemes may not start corresponding application
After installing KB4489899, custom URI schemes for application protocol handlers may not start the corresponding application for local intranet and trusted sites security zones on Internet Explorer.

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 8.1; Windows 7 SP1 
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2; Windows Server 2008 R2 SP1
Workaround: Right-click the URL link to open it in a new window or tab, or enable Protected Mode in Internet Explorer for local intranet and trusted sites
  1. Go to Tools > Internet options > Security.
  2. Within Select a zone to view of change security settings, select Local intranet and then select Enable Protected Mode.
  3. Select Trusted Sites and then select Enable Protected Mode
  4. Select OK.
You must restart the browser after making these changes. 
 
Next steps: Microsoft is working on a resolution and will provide an update in an upcoming release. 

Back to top
OS Build 17763.379

March 12, 2019
KB4489899
Mitigated
Last updated:
April 09, 2019
10:00 AM PT

Opened:
March 12, 2019
10:00 AM PT
Issue using PXE to start a device from WDS
After installing KB4489899, there may be issues using the Preboot Execution Environment (PXE) to start a device from a Windows Deployment Services (WDS) server configured to use Variable Window Extension. This may cause the connection to the WDS server to terminate prematurely while downloading the image. This issue does not affect clients or devices that are not using Variable Window Extension. 

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10 Enterprise LTSC 2016; Windows 8.1
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server 2016; Windows Server 2012 R2; Windows Server 2012
Workaround: To mitigate the issue, disable the Variable Window Extension on WDS server using one of the following options:
Option 1:
Open an Administrator Command prompt and type the following:
Wdsutil /Set-TransportServer /EnableTftpVariableWindowExtension:No 
+      
Custom URI schemes may not start corresponding application
After installing KB4489899, custom URI schemes for application protocol handlers may not start the corresponding application for local intranet and trusted sites security zones on Internet Explorer.

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10, version 1607; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 10 Enterprise LTSB 2015; Windows 8.1; Windows 7 SP1 
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2; Windows Server 2008 R2 SP1
Workaround: Right-click the URL link to open it in a new window or tab, or enable Protected Mode in Internet Explorer for local intranet and trusted sites
  1. Go to Tools > Internet options > Security.
  2. Within Select a zone to view of change security settings, select Local intranet and then select Enable Protected Mode.
  3. Select Trusted Sites and then select Enable Protected Mode
  4. Select OK.
You must restart the browser after making these changes. 
 
Next steps: Microsoft is working on a resolution and will provide an update in an upcoming release. 

Back to top
OS Build 17763.379

March 12, 2019
KB4489899
Mitigated
Last updated:
April 09, 2019
10:00 AM PT

Opened:
March 12, 2019
10:00 AM PT
Issue using PXE to start a device from WDS
After installing KB4489899, there may be issues using the Preboot Execution Environment (PXE) to start a device from a Windows Deployment Services (WDS) server configured to use Variable Window Extension. This may cause the connection to the WDS server to terminate prematurely while downloading the image. This issue does not affect clients or devices that are not using Variable Window Extension. 

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1607; Windows 10 Enterprise LTSC 2016; Windows 8.1
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server 2016; Windows Server 2012 R2; Windows Server 2012
Workaround: To mitigate the issue, disable the Variable Window Extension on WDS server using one of the following options:
Option 1:
Open an Administrator Command prompt and type the following:
Wdsutil /Set-TransportServer /EnableTftpVariableWindowExtension:No 
 
Option 2:
Use the Windows Deployment Services UI to make the following adjustment: 
  1. Open Windows Deployment Services from Windows Administrative Tools. 
  2. Expand Servers and right-click a WDS server. 
  3. Open its properties and clear the Enable Variable Window Extension box on the TFTP tab.
Option 3:
Set the following registry value to 0:  
HKLM\\System\\CurrentControlSet\\Services\\WDSServer\\Providers\\WDSTFTP\\EnableVariableWindowExtension  
Restart the WDSServer service after disabling the Variable Window Extension. 

Next steps: Microsoft is working on a resolution and will provide an update in an upcoming release. 

Back to top
OS Build 17763.379

March 12, 2019
KB4489899
Mitigated
Last updated:
April 09, 2019
10:00 AM PT

Opened:
March 12, 2019
10:00 AM PT
Apps may stop working after selecting an audio output device other than the default
After installing KB4482887 on machines that have multiple audio devices, applications that provide advanced options for internal or external audio output devices may stop working unexpectedly. This issue occurs for users that select an audio output device different from the \"Default Audio Device\". Examples of applications that may stop working include: 
  • Windows Media Player 
  • Realtek HD Audio Manager 
  • Sound Blaster Control Panel 
Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019
  • Server: Windows Server, version 1809; Windows Server 2019
Workaround: As a temporary solution, select the \"Default Audio Device\" in the options provided by the application; please refer to the application's user manual for details. 
For example, to set the Default Audio Device in Windows Media Player: 
  1. Open Windows Media Player > Tools > Options > Devices.
  2. Select the device and choose Properties.
  3. On the next dialog, from the drop-down menu under Select the Audio Device, choose Default Audio Device from the list. 
You can then send audio from the application to the audio device you want in the per-application audio settings found under Settings > System > Sound > App Volume and device preferences.

Resolved: This issue was resolved in KB4490481

Back to top
OS Build 17763.348

March 01, 2019
KB4482887
Resolved
KB4490481
Resolved:
April 02, 2019
10:00 AM PT

Opened:
March 01, 2019
10:00 AM PT
@@ -112,8 +112,8 @@ sections: - type: markdown text: " - - + +
DetailsOriginating updateStatusHistory
Internet Explorer 11 authentication issue with multiple concurrent logons
After installing the February 12, 2019 update (KB4487044), Internet Explorer 11 and other applications that use WININET.DLL may have authentication issues. This occurs when two or more people use the same user account for multiple, concurrent login sessions on the same Windows Server machine, including Remote Desktop Protocol (RDP) and Terminal Server logons. Symptoms reported by customers include, but may not be limited to:  
  • Cache size and location show zero or empty. 
  • Keyboard shortcuts may not work properly. 
  • Webpages may intermittently fail to load or render correctly. 
  • Issues with credential prompts. 
  • Issues when downloading files. 
Affected platforms: 
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10 Enterprise LTSC 2016; Windows 8.1; Windows 7 SP1
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server 2016; Windows Server 2012 R2; Windows Server 2012; Windows Server 2008 R2 SP1
Resolved: This issue was resolved in KB4493509

Back to top
OS Build 17763.253

January 08, 2019
KB4480116
Resolved
KB4493509
Resolved:
April 09, 2019
10:00 AM PT

Opened:
January 08, 2019
10:00 AM PT
MSXML6 may cause applications to stop responding
After installing KB4480116, MSXML6 causes applications to stop responding if an exception was thrown during node operations, such as appendChild(), insertBefore(), and moveNode().
 
The Group Policy editor may stop responding when editing a Group Policy Object (GPO) that contains Group Policy Preferences (GPP) for Internet Explorer 10 settings. 

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 8.1
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2; Windows Server 2012
Resolved: This issue was resolved in KB4493509

Back to top
OS Build 17763.253

January 08, 2019
KB4480116
Resolved
KB4493509
Resolved:
April 09, 2019
10:00 AM PT

Opened:
January 08, 2019
10:00 AM PT
Internet Explorer 11 authentication issue with multiple concurrent logons
After installing the February 12, 2019 update (KB4487044), Internet Explorer 11 and other applications that use WININET.DLL may have authentication issues. This occurs when two or more people use the same user account for multiple, concurrent login sessions on the same Windows Server machine, including Remote Desktop Protocol (RDP) and Terminal Server logons. Symptoms reported by customers include, but may not be limited to:  
  • Cache size and location show zero or empty. 
  • Keyboard shortcuts may not work properly. 
  • Webpages may intermittently fail to load or render correctly. 
  • Issues with credential prompts. 
  • Issues when downloading files. 
Affected platforms: 
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1607; Windows 10 Enterprise LTSC 2016; Windows 8.1; Windows 7 SP1
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server 2016; Windows Server 2012 R2; Windows Server 2012; Windows Server 2008 R2 SP1
Resolved: This issue was resolved in KB4493509

Back to top
OS Build 17763.253

January 08, 2019
KB4480116
Resolved
KB4493509
Resolved:
April 09, 2019
10:00 AM PT

Opened:
January 08, 2019
10:00 AM PT
MSXML6 may cause applications to stop responding
After installing KB4480116, MSXML6 causes applications to stop responding if an exception was thrown during node operations, such as appendChild(), insertBefore(), and moveNode().
 
The Group Policy editor may stop responding when editing a Group Policy Object (GPO) that contains Group Policy Preferences (GPP) for Internet Explorer 10 settings. 

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10, version 1607; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 10 Enterprise LTSB 2015; Windows 8.1
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2; Windows Server 2012
Resolved: This issue was resolved in KB4493509

Back to top
OS Build 17763.253

January 08, 2019
KB4480116
Resolved
KB4493509
Resolved:
April 09, 2019
10:00 AM PT

Opened:
January 08, 2019
10:00 AM PT
" diff --git a/windows/release-information/status-windows-7-and-windows-server-2008-r2-sp1.yml b/windows/release-information/status-windows-7-and-windows-server-2008-r2-sp1.yml index 9b42a15cc7..a89d0a6a0d 100644 --- a/windows/release-information/status-windows-7-and-windows-server-2008-r2-sp1.yml +++ b/windows/release-information/status-windows-7-and-windows-server-2008-r2-sp1.yml @@ -47,7 +47,7 @@ sections: - items: - type: markdown text: " -
See all messages >
+ " - items: - type: markdown @@ -100,7 +100,7 @@ sections: text: " - +
DetailsOriginating updateStatusHistory
Authentication may fail for services after the Kerberos ticket expires.
After installing KB4489878, some customers report that authentication fails for services that require unconstrained delegation after the Kerberos ticket expires (the default is 10 hours). For example, the SQL server service fails.

Affected platforms: 
  • Client: Windows 7 SP1
  • Server: Windows Server 2008 R2 SP1; Windows Server 2008 SP2
Workaround: To mitigate this issue, use one of the following options:

  • Option 1: Purge the Kerberos tickets on the application server. After the Kerberos ticket expires, the issue will occur again, and you must purge the tickets again.
  • Option 2: If purging does not mitigate the issue, restart the application; for example, restart the Internet Information Services (IIS) app pool associated with the SQL server.
  • Option 3: Use constrained delegation.
Next steps: Microsoft is working on a resolution and will provide an update in an upcoming release.

Back to top
March 12, 2019
KB4489878
Mitigated
Last updated:
April 09, 2019
10:00 AM PT

Opened:
March 12, 2019
10:00 AM PT
Custom URI schemes may not start corresponding application.
After installing KB4489878, custom URI schemes for application protocol handlers may not start the corresponding application for local intranet and trusted sites on Internet Explorer.

Affected platforms: 
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 8.1; Windows 7 SP1 
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2; Windows Server 2008 R2 SP1 
Resolution: This issue is resolved in KB4493472.

Back to top
March 12, 2019
KB4489878
Resolved
KB4493472
Resolved:
April 09, 2019
10:00 AM PT

Opened:
March 12, 2019
10:00 AM PT
Custom URI schemes may not start corresponding application.
After installing KB4489878, custom URI schemes for application protocol handlers may not start the corresponding application for local intranet and trusted sites on Internet Explorer.

Affected platforms: 
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10, version 1607; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 10 Enterprise LTSB 2015; Windows 8.1; Windows 7 SP1 
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2; Windows Server 2008 R2 SP1 
Resolution: This issue is resolved in KB4493472.

Back to top
March 12, 2019
KB4489878
Resolved
KB4493472
Resolved:
April 09, 2019
10:00 AM PT

Opened:
March 12, 2019
10:00 AM PT
NETDOM.EXE fails to run.
After installing KB4489878, NETDOM.EXE fails to run, and the on-screen error, “The command failed to complete successfully.” appears.

Affected platforms: 
  • Client: Windows 7 SP1
  • Server: Windows Server 2008 R2 SP1; Windows Server 2008 SP2
Resolution: This issue is resolved in KB4493472.

Back to top
March 12, 2019
KB4489878
Resolved
KB4493472
Resolved:
April 09, 2019
10:00 AM PT

Opened:
March 12, 2019
10:00 AM PT
" @@ -112,6 +112,6 @@ sections: - +
DetailsOriginating updateStatusHistory
Virtual machines fail to restore.
After installing KB4480970, virtual machines (VM) may fail to restore successfully if the VM has been saved and restored once before. The error message is, “Failed to restore the virtual machine state: Cannot restore this virtual machine because the saved state data cannot be read. Delete the saved state data and then try to start the virtual machine. (0xC0370027).”

This affects AMD Bulldozer Family 15h, AMD Jaguar Family 16h, and AMD Puma Family 16h (second generation) microarchitectures.

Affected platforms: 
  • Client: Windows 7 SP1 
  • Server: Windows Server 2012; Windows Server 2008 R2 SP1; Windows Server 2008 SP2
Resolution: This issue is resolved in KB4490511.

Back to top
January 08, 2019
KB4480970
Resolved
KB4490511
Resolved:
February 19, 2019
02:00 PM PT

Opened:
January 08, 2019
10:00 AM PT
Local Administrators unable to remotely access shares.
Local users who are part of the local Administrators group may not be able to remotely access shares on Windows Server 2008 R2 and Windows 7 machines after installing KB4480970. This does not affect domain accounts in the local Administrators group.
 
Affected platforms: 
  • Client: Windows 7 SP1 
  • Server: Windows Server 2008 R2 SP1; Windows Server 2008 SP2 
Resolution: This issue is resolved in KB4487345.

Back to top
January 08, 2019
KB4480970
Resolved
KB4487345
Resolved:
January 11, 2019
02:00 PM PT

Opened:
January 08, 2019
10:00 AM PT
Internet Explorer 11 authentication issue with multiple concurrent logons.
After installing KB4480970, Internet Explorer 11 and other applications that use WININET.DLL may have authentication issues. This occurs when two or more people use the same user account for multiple, concurrent login sessions on the same Windows Server machine, including Remote Desktop Protocol (RDP) and Terminal Server logons. Symptoms reported by customers include, but may not be limited to:
  • Cache size and location show zero or empty.
  • Keyboard shortcuts may not work properly.
  • Webpages may intermittently fail to load or render correctly.
  • Issues with credential prompts.
  • Issues when downloading files.
Affected platforms: 
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10 Enterprise LTSC 2016; Windows 8.1; Windows 7 SP1
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server 2016; Windows Server 2012 R2; Windows Server 2012; Windows Server 2008 R2 SP1
Resolution: This issue is resolved in KB4493472.

Back to top
January 08, 2019
KB4480970
Resolved
KB4493472
Resolved:
April 09, 2019
10:00 AM PT

Opened:
January 08, 2019
10:00 AM PT
Internet Explorer 11 authentication issue with multiple concurrent logons.
After installing KB4480970, Internet Explorer 11 and other applications that use WININET.DLL may have authentication issues. This occurs when two or more people use the same user account for multiple, concurrent login sessions on the same Windows Server machine, including Remote Desktop Protocol (RDP) and Terminal Server logons. Symptoms reported by customers include, but may not be limited to:
  • Cache size and location show zero or empty.
  • Keyboard shortcuts may not work properly.
  • Webpages may intermittently fail to load or render correctly.
  • Issues with credential prompts.
  • Issues when downloading files.
Affected platforms: 
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1607; Windows 10 Enterprise LTSC 2016; Windows 8.1; Windows 7 SP1
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server 2016; Windows Server 2012 R2; Windows Server 2012; Windows Server 2008 R2 SP1
Resolution: This issue is resolved in KB4493472.

Back to top
January 08, 2019
KB4480970
Resolved
KB4493472
Resolved:
April 09, 2019
10:00 AM PT

Opened:
January 08, 2019
10:00 AM PT
" diff --git a/windows/release-information/status-windows-8.1-and-windows-server-2012-r2.yml b/windows/release-information/status-windows-8.1-and-windows-server-2012-r2.yml index 03ab75ddbb..97b74694bf 100644 --- a/windows/release-information/status-windows-8.1-and-windows-server-2012-r2.yml +++ b/windows/release-information/status-windows-8.1-and-windows-server-2012-r2.yml @@ -47,7 +47,7 @@ sections: - items: - type: markdown text: " -
See all messages >
+ " - items: - type: markdown @@ -88,7 +88,7 @@ sections:
System may be unresponsive after restart if Avira antivirus software installed
Microsoft and Avira have identified an issue on devices with Avira antivirus software installed that may cause the system to become unresponsive upon restart after installing KB4493446.

Microsoft has temporarily blocked devices from receiving this update if Avira antivirus software is installed.

Affected platforms: 
  • Client: Windows 8.1; Windows 7 SP1 
  • Server: Windows Server 2012 R2; Windows Server 2012; Windows Server 2008 R2 SP1; Windows Server 2008 SP2 
Next steps: We are presently investigating this issue with Avira and will provide an update when available.

Back to topApril 09, 2019
KB4493446Investigating
Last updated:
April 09, 2019
10:00 AM PT

Opened:
April 09, 2019
10:00 AM PT
System unresponsive after restart if Sophos Endpoint Protection installed
Microsoft and Sophos have identified an issue on devices with Sophos Endpoint Protection installed and managed by either Sophos Central or Sophos Enterprise Console (SEC) that may cause the system to become unresponsive upon restart after installing KB4493446.

Microsoft has temporarily blocked devices from receiving this update if the Sophos Endpoint is installed until a solution is available.

Affected platforms: 
  • Client: Windows 8.1; Windows 7 SP1
  • Server: Windows Server 2012 R2; Windows Server 2012; Windows Server 2008 R2 SP1; Windows Server 2008 SP2
Guidance for Sophos Endpoint and Sophos Enterprise Console customers can be found in the Sophos support article.

Back to topApril 09, 2019
KB4493446Mitigated
Last updated:
April 09, 2019
10:00 AM PT

Opened:
April 09, 2019
10:00 AM PT
System may be unresponsive after restart if ArcaBit antivirus software installed
Microsoft and ArcaBit have identified an issue on devices with ArcaBit antivirus software installed that may cause the system to become unresponsive upon restart after installing KB4493446.

Microsoft has temporarily blocked devices from receiving this update if ArcaBit antivirus software is installed.

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 8.1; Windows 7 SP1
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server 2012 R2; Windows Server 2008 R2 SP1
ArcaBit has released an update to address this issue. For more information, see the Arcabit support article.

Back to topApril 09, 2019
KB4493446Mitigated
Last updated:
April 09, 2019
10:00 AM PT

Opened:
April 09, 2019
10:00 AM PT -
Certain operations performed on a Cluster Shared Volume may fail
Certain operations, such as rename, that you perform on files or folders that are on a Cluster Shared Volume (CSV) may fail with the error, “STATUS_BAD_IMPERSONATION_LEVEL (0xC00000A5)”. This occurs when you perform the operation on a CSV owner node from a process that doesn’t have administrator privilege.

Affected platforms: 
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 8.1
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2; Windows Server 2012
Workaround: Do one of the following:
  • Perform the operation from a process that has administrator privilege.
  • Perform the operation from a node that doesn’t have CSV ownership.
Next steps: Microsoft is working on a resolution and will provide an update in an upcoming release.

Back to topApril 09, 2019
KB4493446Mitigated
Last updated:
April 09, 2019
10:00 AM PT

Opened:
April 09, 2019
10:00 AM PT +
Certain operations performed on a Cluster Shared Volume may fail
Certain operations, such as rename, that you perform on files or folders that are on a Cluster Shared Volume (CSV) may fail with the error, “STATUS_BAD_IMPERSONATION_LEVEL (0xC00000A5)”. This occurs when you perform the operation on a CSV owner node from a process that doesn’t have administrator privilege.

Affected platforms: 
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10, version 1607; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 10 Enterprise LTSB 2015; Windows 8.1
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2; Windows Server 2012
Workaround: Do one of the following:
  • Perform the operation from a process that has administrator privilege.
  • Perform the operation from a node that doesn’t have CSV ownership.
Next steps: Microsoft is working on a resolution and will provide an update in an upcoming release.

Back to topApril 09, 2019
KB4493446Mitigated
Last updated:
April 09, 2019
10:00 AM PT

Opened:
April 09, 2019
10:00 AM PT
Devices may not respond at login or Welcome screen if running certain Avast software
Microsoft and Avast have identified an issue on devices running Avast for Business, Avast CloudCare, and AVG Business Edition antivirus software after you install KB4493446 and restart. Devices may become unresponsive at the login or Welcome screen. Additionally, you may be unable to log in or log in after an extended period of time.

Affected platforms: 
  • Client: Windows 8.1; Windows 7 SP1 
  • Server: Windows Server 2012 R2; Windows Server 2008 R2 SP1 
Resolution: Avast has released emergency updates to address this issue. For more information and AV update schedule, see the Avast support KB article.

Back to topApril 09, 2019
KB4493446Resolved
Resolved:
April 09, 2019
10:00 AM PT

Opened:
April 09, 2019
10:00 AM PT " @@ -98,9 +98,9 @@ sections: - type: markdown text: " - - +
DetailsOriginating updateStatusHistory
Issue using PXE to start a device from WDS
After installing KB4489881, there may be issues using the Preboot Execution Environment (PXE) to start a device from a Windows Deployment Services (WDS) server configured to use Variable Window Extension. This may cause the connection to the WDS server to terminate prematurely while downloading the image. This issue does not affect clients or devices that are not using Variable Window Extension.

Affected platforms: 
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10 Enterprise LTSC 2016; Windows 8.1 
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server 2016; Windows Server 2012 R2; Windows Server 2012 
Workaround: To mitigate the issue, disable the Variable Window Extension on WDS server using one of the following options:
Option 1:
Open an Administrator Command prompt and type the following:
Wdsutil /Set-TransportServer /EnableTftpVariableWindowExtension:No
+      
Issue using PXE to start a device from WDS
After installing KB4489881, there may be issues using the Preboot Execution Environment (PXE) to start a device from a Windows Deployment Services (WDS) server configured to use Variable Window Extension. This may cause the connection to the WDS server to terminate prematurely while downloading the image. This issue does not affect clients or devices that are not using Variable Window Extension.

Affected platforms: 
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1607; Windows 10 Enterprise LTSC 2016; Windows 8.1 
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server 2016; Windows Server 2012 R2; Windows Server 2012 
Workaround: To mitigate the issue, disable the Variable Window Extension on WDS server using one of the following options:
Option 1:
Open an Administrator Command prompt and type the following:
Wdsutil /Set-TransportServer /EnableTftpVariableWindowExtension:No
 
Option 2:
Use the Windows Deployment Services UI to make the following adjustment:
  1. Open Windows Deployment Services from Windows Administrative Tools.
  2. Expand Servers and right-click a WDS server.
  3. Open its properties and clear the Enable Variable Window Extension box on the TFTP tab.
Option 3:
Set the following registry value to 0:
HKLM\\System\\CurrentControlSet\\Services\\WDSServer\\Providers\\WDSTFTP\\EnableVariableWindowExtension
Restart the WDSServer service after disabling the Variable Window Extension.

Next steps: Microsoft is working on a resolution and will provide an update in an upcoming release.

Back to top
March 12, 2019
KB4489881
Mitigated
Last updated:
April 09, 2019
10:00 AM PT

Opened:
March 12, 2019
10:00 AM PT
Custom URI schemes may not start corresponding application
After installing KB4489881, custom URI schemes for application protocol handlers may not start the corresponding application for local intranet and trusted sites security zones on Internet Explorer.

Affected platforms: 
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 8.1; Windows 7 SP1 
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2; Windows Server 2008 R2 SP1 
Resolution: This issue is resolved in KB4493446.

Back to top
March 12, 2019
KB4489881
Resolved
KB4493446
Resolved:
April 09, 2019
10:00 AM PT

Opened:
March 12, 2019
10:00 AM PT
Custom URI schemes may not start corresponding application
After installing KB4489881, custom URI schemes for application protocol handlers may not start the corresponding application for local intranet and trusted sites security zones on Internet Explorer.

Affected platforms: 
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10, version 1607; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 10 Enterprise LTSB 2015; Windows 8.1; Windows 7 SP1 
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2; Windows Server 2008 R2 SP1 
Resolution: This issue is resolved in KB4493446.

Back to top
March 12, 2019
KB4489881
Resolved
KB4493446
Resolved:
April 09, 2019
10:00 AM PT

Opened:
March 12, 2019
10:00 AM PT
" @@ -118,7 +118,7 @@ sections: - type: markdown text: " - - + +
DetailsOriginating updateStatusHistory
Internet Explorer 11 authentication issue with multiple concurrent logons
After installing KB4480963, Internet Explorer 11 and other applications that use WININET.DLL may have authentication issues. This occurs when two or more people use the same user account for multiple, concurrent login sessions on the same Windows Server machine, including Remote Desktop Protocol (RDP) and Terminal Server logons. Symptoms reported by customers include, but may not be limited to:
  • Cache size and location show zero or empty.
  • Keyboard shortcuts may not work properly.
  • Webpages may intermittently fail to load or render correctly.
  • Issues with credential prompts.
  • Issues when downloading files.
Affected platforms: 
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10 Enterprise LTSC 2016; Windows 8.1; Windows 7 SP1
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server 2016; Windows Server 2012 R2; Windows Server 2012; Windows Server 2008 R2 SP1
Resolution: This issue is resolved in KB4493446.

Back to top
January 08, 2019
KB4480963
Resolved
KB4493446
Resolved:
April 09, 2019
10:00 AM PT

Opened:
January 08, 2019
10:00 AM PT
MSXML6 may cause applications to stop responding.
After installing KB4480963, MSXML6 causes applications to stop responding if an exception was thrown during node operations, such as appendChild(), insertBefore(), and moveNode().

The Group Policy editor may stop responding when editing a Group Policy Object (GPO) that contains Group Policy Preferences (GPP) for Internet Explorer 10 settings.

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 8.1
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2; Windows Server 2012
Resolution: This issue is resolved in KB4493446.

Back to top
January 08, 2019
KB4480963
Resolved
KB4493446
Resolved:
April 09, 2019
10:00 AM PT

Opened:
January 08, 2019
10:00 AM PT
Internet Explorer 11 authentication issue with multiple concurrent logons
After installing KB4480963, Internet Explorer 11 and other applications that use WININET.DLL may have authentication issues. This occurs when two or more people use the same user account for multiple, concurrent login sessions on the same Windows Server machine, including Remote Desktop Protocol (RDP) and Terminal Server logons. Symptoms reported by customers include, but may not be limited to:
  • Cache size and location show zero or empty.
  • Keyboard shortcuts may not work properly.
  • Webpages may intermittently fail to load or render correctly.
  • Issues with credential prompts.
  • Issues when downloading files.
Affected platforms: 
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1607; Windows 10 Enterprise LTSC 2016; Windows 8.1; Windows 7 SP1
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server 2016; Windows Server 2012 R2; Windows Server 2012; Windows Server 2008 R2 SP1
Resolution: This issue is resolved in KB4493446.

Back to top
January 08, 2019
KB4480963
Resolved
KB4493446
Resolved:
April 09, 2019
10:00 AM PT

Opened:
January 08, 2019
10:00 AM PT
MSXML6 may cause applications to stop responding.
After installing KB4480963, MSXML6 causes applications to stop responding if an exception was thrown during node operations, such as appendChild(), insertBefore(), and moveNode().

The Group Policy editor may stop responding when editing a Group Policy Object (GPO) that contains Group Policy Preferences (GPP) for Internet Explorer 10 settings.

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10, version 1607; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 10 Enterprise LTSB 2015; Windows 8.1
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2; Windows Server 2012
Resolution: This issue is resolved in KB4493446.

Back to top
January 08, 2019
KB4480963
Resolved
KB4493446
Resolved:
April 09, 2019
10:00 AM PT

Opened:
January 08, 2019
10:00 AM PT
" diff --git a/windows/release-information/status-windows-server-2008-sp2.yml b/windows/release-information/status-windows-server-2008-sp2.yml index f2da47d071..77e85e5cb0 100644 --- a/windows/release-information/status-windows-server-2008-sp2.yml +++ b/windows/release-information/status-windows-server-2008-sp2.yml @@ -47,7 +47,7 @@ sections: - items: - type: markdown text: " -
See all messages >
+ " - items: - type: markdown diff --git a/windows/release-information/status-windows-server-2012.yml b/windows/release-information/status-windows-server-2012.yml index 666d54ff29..beff36b8b8 100644 --- a/windows/release-information/status-windows-server-2012.yml +++ b/windows/release-information/status-windows-server-2012.yml @@ -47,7 +47,7 @@ sections: - items: - type: markdown text: " -
See all messages >
+ " - items: - type: markdown @@ -92,7 +92,7 @@ sections: - type: markdown text: " -
DetailsOriginating updateStatusHistory
Issue using PXE to start a device from WDS
After installing KB4489891, there may be issues using the Preboot Execution Environment (PXE) to start a device from a Windows Deployment Services (WDS) server configured to use Variable Window Extension. This may cause the connection to the WDS server to terminate prematurely while downloading the image. This issue does not affect clients or devices that are not using Variable Window Extension.

Affected platforms: 
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10 Enterprise LTSC 2016; Windows 8.1 
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server 2016; Windows Server 2012 R2; Windows Server 2012 
Workaround: To mitigate the issue, disable the Variable Window Extension on WDS server using one of the following options:
Option 1:
Open an Administrator Command prompt and type the following:
Wdsutil /Set-TransportServer /EnableTftpVariableWindowExtension:No
+      
Issue using PXE to start a device from WDS
After installing KB4489891, there may be issues using the Preboot Execution Environment (PXE) to start a device from a Windows Deployment Services (WDS) server configured to use Variable Window Extension. This may cause the connection to the WDS server to terminate prematurely while downloading the image. This issue does not affect clients or devices that are not using Variable Window Extension.

Affected platforms: 
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1607; Windows 10 Enterprise LTSC 2016; Windows 8.1 
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server 2016; Windows Server 2012 R2; Windows Server 2012 
Workaround: To mitigate the issue, disable the Variable Window Extension on WDS server using one of the following options:
Option 1:
Open an Administrator Command prompt and type the following:
Wdsutil /Set-TransportServer /EnableTftpVariableWindowExtension:No
 
Option 2:
Use the Windows Deployment Services UI to make the following adjustment:
  1. Open Windows Deployment Services from Windows Administrative Tools.
  2. Expand Servers and right-click a WDS server.
  3. Open its properties and clear the Enable Variable Window Extension box on the TFTP tab.
Option 3:
Set the following registry value to 0:
HKLM\\System\\CurrentControlSet\\Services\\WDSServer\\Providers\\WDSTFTP\\EnableVariableWindowExtension
Restart the WDSServer service after disabling the Variable Window Extension.

Next steps: Microsoft is working on a resolution and will provide an update in an upcoming release.

Back to top
March 12, 2019
KB4489891
Mitigated
Last updated:
March 12, 2019
10:00 AM PT

Opened:
March 12, 2019
10:00 AM PT
" @@ -112,7 +112,7 @@ sections: text: " - - + +
DetailsOriginating updateStatusHistory
Certain operations performed on a Cluster Shared Volume may fail
Certain operations, such as rename, that you perform on files or folders that are on a Cluster Shared Volume (CSV) may fail with the error, \"STATUS_BAD_IMPERSONATION_LEVEL (0xC00000A5)\". This occurs when you perform the operation on a CSV owner node from a process that doesn’t have administrator privilege.

Affected platforms: 
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10, version 1607; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 10 Enterprise LTSB 2015; Windows 8.1
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2; Windows Server 2012
Workaround: Do one of the following:
  • Perform the operation from a process that has administrator privilege.
  • Perform the operation from a node that doesn’t have CSV ownership.
Next steps: Microsoft is working on a resolution and will provide an update in an upcoming release.

Back to top
January 08, 2019
KB4480975
Mitigated
Last updated:
January 08, 2019
10:00 AM PT

Opened:
January 08, 2019
10:00 AM PT
Internet Explorer 11 authentication issue with multiple concurrent logons
After installing KB4480975, Internet Explorer 11 and other applications that use WININET.DLL may have authentication issues. This occurs when two or more people use the same user account for multiple, concurrent login sessions on the same Windows Server machine, including Remote Desktop Protocol (RDP) and Terminal Server logons. Symptoms reported by customers include, but may not be limited to:
  • Cache size and location show zero or empty.
  • Keyboard shortcuts may not work properly.
  • Webpages may intermittently fail to load or render correctly.
  • Issues with credential prompts.
  • Issues when downloading files.
Affected platforms: 
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10 Enterprise LTSC 2016; Windows 8.1; Windows 7 SP1
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server 2016; Windows Server 2012 R2; Windows Server 2012; Windows Server 2008 R2 SP1
Resolution: This issue is resolved in KB4493451.

Back to top
January 08, 2019
KB4480975
Resolved
KB4493451
Resolved:
April 09, 2019
10:00 AM PT

Opened:
January 08, 2019
10:00 AM PT
MSXML6 may cause applications to stop responding
After installing KB4480975, MSXML6 causes applications to stop responding if an exception was thrown during node operations, such as appendChild(), insertBefore(), and moveNode().

The Group Policy editor may stop responding when editing a Group Policy Object (GPO) that contains Group Policy Preferences (GPP) for Internet Explorer 10 settings.

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 8.1
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2; Windows Server 2012
Resolution: This issue is resolved in KB4493451.

Back to top
January 08, 2019
KB4480975
Resolved
KB4493451
Resolved:
April 09, 2019
10:00 AM PT

Opened:
January 08, 2019
10:00 AM PT
Internet Explorer 11 authentication issue with multiple concurrent logons
After installing KB4480975, Internet Explorer 11 and other applications that use WININET.DLL may have authentication issues. This occurs when two or more people use the same user account for multiple, concurrent login sessions on the same Windows Server machine, including Remote Desktop Protocol (RDP) and Terminal Server logons. Symptoms reported by customers include, but may not be limited to:
  • Cache size and location show zero or empty.
  • Keyboard shortcuts may not work properly.
  • Webpages may intermittently fail to load or render correctly.
  • Issues with credential prompts.
  • Issues when downloading files.
Affected platforms: 
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1607; Windows 10 Enterprise LTSC 2016; Windows 8.1; Windows 7 SP1
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server 2016; Windows Server 2012 R2; Windows Server 2012; Windows Server 2008 R2 SP1
Resolution: This issue is resolved in KB4493451.

Back to top
January 08, 2019
KB4480975
Resolved
KB4493451
Resolved:
April 09, 2019
10:00 AM PT

Opened:
January 08, 2019
10:00 AM PT
MSXML6 may cause applications to stop responding
After installing KB4480975, MSXML6 causes applications to stop responding if an exception was thrown during node operations, such as appendChild(), insertBefore(), and moveNode().

The Group Policy editor may stop responding when editing a Group Policy Object (GPO) that contains Group Policy Preferences (GPP) for Internet Explorer 10 settings.

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10, version 1607; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 10 Enterprise LTSB 2015; Windows 8.1
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2; Windows Server 2012
Resolution: This issue is resolved in KB4493451.

Back to top
January 08, 2019
KB4480975
Resolved
KB4493451
Resolved:
April 09, 2019
10:00 AM PT

Opened:
January 08, 2019
10:00 AM PT
" From 84e8a5a03ee541c5b5ae4fd9e849308b27308af5 Mon Sep 17 00:00:00 2001 From: Lindsay <45809756+lindspea@users.noreply.github.com> Date: Sat, 27 Apr 2019 16:35:21 +0200 Subject: [PATCH 229/724] Update assignedaccess-csp.md Added note about assigned access. --- windows/client-management/mdm/assignedaccess-csp.md | 3 +++ 1 file changed, 3 insertions(+) diff --git a/windows/client-management/mdm/assignedaccess-csp.md b/windows/client-management/mdm/assignedaccess-csp.md index 13f0987eca..55d8e8b012 100644 --- a/windows/client-management/mdm/assignedaccess-csp.md +++ b/windows/client-management/mdm/assignedaccess-csp.md @@ -22,6 +22,9 @@ For a step-by-step guide for setting up devices to run in kiosk mode, see [Set u > [!Warning] > You can only assign one single app kiosk profile to an individual user account on a device. The single app profile does not support domain groups. +> [!Note] +> If the application runs in assigned access mode, when the app calls KeyCredentialManager.IsSupportedAsync and it returns false on the first run, try invoking the settings screen to have the user select a convenience PIN to use with Windows Hello. This is the settings screen that is hidden by the application running in assigned access mode. This means you can only use Windows Hello if you first leave Assigned Access. The user must then select his/her convenience pin and then go into Assigned Access again. + > [!Note] > The AssignedAccess CSP is supported in Windows 10 Enterprise and Windows 10 Education. Starting from Windows 10, version 1709 it is also supported in Windows 10 Pro and Windows 10 S. Starting in Windows 10, version 1803, it is also supported in Windows Holographic for Business edition. From 94c56a08ecf1eceec1d2ce0d1a0852ac5cc6cbf8 Mon Sep 17 00:00:00 2001 From: illfated Date: Sun, 28 Apr 2019 18:23:56 +0200 Subject: [PATCH 230/724] Windows/Privacy: URL correction update This is a follow-up to my previous PR #3305 (Windows/Privacy: change formatting code to text). I found one URL that I missed in my previous solution. This is a 1 line change, making the starting and ending asterisk show up on the page, instead of formatting the text as italics. Addendum: For future web page documentation, it may be a good idea to use the HTML codes `*` + `\` for `*` and `\` respectively, to avoid situations where pages look OK on Github, but not translating well to the docs.microsoft.com pages. Ref. issue ticket #3304 (Domain misspelling) --- .../privacy/windows-endpoints-1809-non-enterprise-editions.md | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/windows/privacy/windows-endpoints-1809-non-enterprise-editions.md b/windows/privacy/windows-endpoints-1809-non-enterprise-editions.md index b6be3b5acd..1df90d39e0 100644 --- a/windows/privacy/windows-endpoints-1809-non-enterprise-editions.md +++ b/windows/privacy/windows-endpoints-1809-non-enterprise-editions.md @@ -98,7 +98,7 @@ We used the following methodology to derive these network endpoints: | *.e-msedge.net | HTTPS | Used by OfficeHub to get the metadata of Office apps. | | *.g.akamaiedge.net | HTTPS | Used to check for updates to maps that have been downloaded for offline use. | | *.s-msedge.net | HTTPS | Used by OfficeHub to get the metadata of Office apps. | -| *.tlu.dl.delivery.mp.microsoft.com/* | HTTP | Enables connections to Windows Update. | +| \*.tlu.dl.delivery.mp.microsoft.com/\* | HTTP | Enables connections to Windows Update. | | *geo-prod.dodsp.mp.microsoft.com.nsatc.net | HTTPS | Enables connections to Windows Update. | | arc.msn.com.nsatc.net | HTTPS | Used to retrieve Windows Spotlight metadata. | | au.download.windowsupdate.com/* | HTTP | Enables connections to Windows Update. | From aacdf73752e02cbc2bac019ebf26164b78376416 Mon Sep 17 00:00:00 2001 From: JohanFreelancer9 <48568725+JohanFreelancer9@users.noreply.github.com> Date: Mon, 29 Apr 2019 05:29:27 +0200 Subject: [PATCH 231/724] Update windows/client-management/mdm/assignedaccess-csp.md Changed wording. Co-Authored-By: lindspea <45809756+lindspea@users.noreply.github.com> --- windows/client-management/mdm/assignedaccess-csp.md | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/windows/client-management/mdm/assignedaccess-csp.md b/windows/client-management/mdm/assignedaccess-csp.md index 55d8e8b012..b6470b0c3d 100644 --- a/windows/client-management/mdm/assignedaccess-csp.md +++ b/windows/client-management/mdm/assignedaccess-csp.md @@ -23,7 +23,7 @@ For a step-by-step guide for setting up devices to run in kiosk mode, see [Set u > You can only assign one single app kiosk profile to an individual user account on a device. The single app profile does not support domain groups. > [!Note] -> If the application runs in assigned access mode, when the app calls KeyCredentialManager.IsSupportedAsync and it returns false on the first run, try invoking the settings screen to have the user select a convenience PIN to use with Windows Hello. This is the settings screen that is hidden by the application running in assigned access mode. This means you can only use Windows Hello if you first leave Assigned Access. The user must then select his/her convenience pin and then go into Assigned Access again. +> If the application calls KeyCredentialManager.IsSupportedAsync when it is running in assigned access mode and it returns false on the first run, invoke the settings screen and select a convenience PIN to use with Windows Hello. This is the settings screen that is hidden by the application running in assigned access mode. You can only use Windows Hello if you first leave assigned access mode, select your convenience pin, and then go back into assigned access mode again. > [!Note] > The AssignedAccess CSP is supported in Windows 10 Enterprise and Windows 10 Education. Starting from Windows 10, version 1709 it is also supported in Windows 10 Pro and Windows 10 S. Starting in Windows 10, version 1803, it is also supported in Windows Holographic for Business edition. From 155700d0bff06ef5090e89c5b267078ec6c8c576 Mon Sep 17 00:00:00 2001 From: Andres Mariano Gorzelany <36666927+get-itips@users.noreply.github.com> Date: Mon, 29 Apr 2019 12:06:05 -0300 Subject: [PATCH 232/724] Removed ADKPath param from Connect-AppvSequencerVM Connect-AppvSequencerVM cmdlet does not have ADKPath parameter. Also, changed the command's description. https://github.com/MicrosoftDocs/windows-itpro-docs/issues/3366 --- .../application-management/app-v/appv-auto-provision-a-vm.md | 4 ++-- 1 file changed, 2 insertions(+), 2 deletions(-) diff --git a/windows/application-management/app-v/appv-auto-provision-a-vm.md b/windows/application-management/app-v/appv-auto-provision-a-vm.md index 53a38b3f05..9cb9b8fade 100644 --- a/windows/application-management/app-v/appv-auto-provision-a-vm.md +++ b/windows/application-management/app-v/appv-auto-provision-a-vm.md @@ -95,12 +95,12 @@ If your apps require custom prerequisites, such as Microsoft SQL Server, we reco 2. Open PowerShell as an admin and run the **Connect-AppvSequencerVM** cmdlet, using the following parameters: ```ps1 - Connect-AppvSequencerVM -VMName "" -ADKPath "" + Connect-AppvSequencerVM -VMName "" ``` Where `````` is the name of the VM as shown in the Hyper-V Manager tool. -This command creates a new Hyper-V VM file using the provided VHD file and also creates a "clean" checkpoint, from where all sequencing and updating will start. +This command connects to an existing Hyper-V VM using the provided VM name for auto-sequencing. ### Review the provisioning log files From 0fec878bd730f8c7901690c826b9c101447d0c8c Mon Sep 17 00:00:00 2001 From: "Nisha Mittal (Wipro Ltd.)" Date: Mon, 29 Apr 2019 08:42:13 -0700 Subject: [PATCH 233/724] Issue fixed after final review --- .../resolved-issues-windows-10-1507.yml | 18 +++++-- .../resolved-issues-windows-10-1607.yml | 12 +++++ .../resolved-issues-windows-10-1703.yml | 10 ++-- .../resolved-issues-windows-10-1709.yml | 16 +++--- .../resolved-issues-windows-10-1803.yml | 16 +++--- ...indows-10-1809-and-windows-server-2019.yml | 22 +++----- ...ndows-7-and-windows-server-2008-r2-sp1.yml | 46 ++++++++-------- ...windows-8.1-and-windows-server-2012-r2.yml | 2 +- ...esolved-issues-windows-server-2008-sp2.yml | 6 +-- .../resolved-issues-windows-server-2012.yml | 4 +- .../status-windows-10-1507.yml | 10 ++-- ...indows-10-1607-and-windows-server-2016.yml | 18 ++++--- .../status-windows-10-1703.yml | 20 +++++-- .../status-windows-10-1709.yml | 26 +++++++--- .../status-windows-10-1803.yml | 28 +++++++--- ...indows-10-1809-and-windows-server-2019.yml | 30 +++++++---- ...ndows-7-and-windows-server-2008-r2-sp1.yml | 52 +++++++++++-------- ...windows-8.1-and-windows-server-2012-r2.yml | 10 ++-- .../status-windows-server-2008-sp2.yml | 6 +-- .../status-windows-server-2012.yml | 14 ++--- .../windows-message-center.yml | 14 +++-- 21 files changed, 234 insertions(+), 146 deletions(-) diff --git a/windows/release-information/resolved-issues-windows-10-1507.yml b/windows/release-information/resolved-issues-windows-10-1507.yml index 34492a31b0..cef51a414f 100644 --- a/windows/release-information/resolved-issues-windows-10-1507.yml +++ b/windows/release-information/resolved-issues-windows-10-1507.yml @@ -32,6 +32,7 @@ sections: - type: markdown text: " + @@ -52,6 +53,15 @@ sections:
" +- title: April 2019 +- items: + - type: markdown + text: " +
SummaryOriginating updateStatusDate resolved
Embedded objects may display incorrectly
Any compound document (OLE) server application that places embedded objects into the Windows Metafile (WMF) using the PatBlt API may display embedded objects incorrectly.

See details >
OS Build 10240.18132

February 12, 2019
KB4487018
Resolved
KB4493475
April 29, 2019
12:45 AM PT
MSXML6 may cause applications to stop responding
MSXML6 may cause applications to stop responding if an exception was thrown during node operations, such as appendChild(), insertBefore(), and moveNode().

See details >
OS Build 10240.18094

January 08, 2019
KB4480962
Resolved
KB4493475
April 09, 2019
10:00 AM PT
Custom URI schemes may not start corresponding application
Custom URI schemes for application protocol handlers may not start the corresponding application for local intranet and trusted sites in Internet Explorer.

See details >
OS Build 10240.18158

March 12, 2019
KB4489872
Resolved
KB4493475
April 09, 2019
10:00 AM PT
Applications using Microsoft Jet database and Access 95 file format stop working
Applications that use a Microsoft Jet database with the Microsoft Access 95 file format may randomly stop working.

See details >
OS Build 10240.18132

February 12, 2019
KB4487018
Resolved
KB4489872
March 12, 2019
10:00 AM PT
+ +
DetailsOriginating updateStatusHistory
Embedded objects may display incorrectly
Any compound document (OLE) server application that places embedded objects into the Windows Metafile (WMF) using the PatBlt API may display embedded objects incorrectly. 
 
For example, if you paste a Microsoft Excel worksheet object into a Microsoft Word document, the cells may render with a different background color. 
 
Affected platforms:  
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10, version 1607; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 10 Enterprise LTSB 2015; Windows 8.1; Windows 7 SP1 
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2; Windows Server 2012; Windows Server 2008 R2 SP1; Windows Server 2008 SP2 
Resolution: This issue is resolved in KB4493475

Back to top
OS Build 10240.18132

February 12, 2019
KB4487018
Resolved
KB4493475
Resolved:
April 09, 2019
10:00 AM PT

Opened:
April 29, 2019
12:45 AM PT
+ " + - title: March 2019 - items: - type: markdown @@ -66,7 +76,7 @@ sections: - type: markdown text: " - + @@ -78,8 +88,8 @@ sections: - type: markdown text: "
DetailsOriginating updateStatusHistory
Applications using Microsoft Jet database and Access 95 file format stop working
Applications that use a Microsoft Jet database with the Microsoft Access 95 file format may randomly stop working.

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 7 SP1
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2; Windows Server 2012; Windows Server 2008 R2 SP1; Windows Server 2008 SP2
Resolution: This issue is resolved in KB4489872.

Back to top
OS Build 10240.18132

February 12, 2019
KB4487018
Resolved
KB4489872
Resolved:
March 12, 2019
10:00 AM PT

Opened:
February 12, 2019
10:00 AM PT
Applications using Microsoft Jet database and Access 95 file format stop working
Applications that use a Microsoft Jet database with the Microsoft Access 95 file format may randomly stop working.

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10, version 1607; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 10 Enterprise LTSB 2015; Windows 7 SP1
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2; Windows Server 2012; Windows Server 2008 R2 SP1; Windows Server 2008 SP2
Resolution: This issue is resolved in KB4489872.

Back to top
OS Build 10240.18132

February 12, 2019
KB4487018
Resolved
KB4489872
Resolved:
March 12, 2019
10:00 AM PT

Opened:
February 12, 2019
10:00 AM PT
Error 1309 when installing/uninstalling MSI or MSP files
After installing KB4487018, users may receive “Error 1309” while installing or uninstalling certain types of MSI and MSP files.

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10, version 1607; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 10 Enterprise LTSB 2015; Windows 8.1
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2; Windows Server 2012
Resolution: This issue is resolved in KB4489872.

Back to top
OS Build 10240.18132

February 12, 2019
KB4487018
Resolved
KB4489872
Resolved:
March 12, 2019
10:00 AM PT

Opened:
February 12, 2019
10:00 AM PT
First character of Japanese era name not recognized
After installing KB4487018, the first character of the Japanese era name is not recognized as an abbreviation and may cause date parsing issues.

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10, version 1607; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 10 Enterprise LTSB 2015; Windows 8.1; Windows 7 SP1
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2; Windows Server 2012; Windows Server 2008 R2 SP1; Windows Server 2008 SP2
Resolution: This issue is resolved in KB4489872.

Back to top
OS Build 10240.18132

February 12, 2019
KB4487018
Resolved
KB4489872
Resolved:
March 12, 2019
10:00 AM PT

Opened:
February 12, 2019
10:00 AM PT
Internet Explorer may fail to load images
After installing KB4487018, Internet Explorer may fail to load images with a backslash (\\) in their relative source path.

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10, version 1607; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 10 Enterprise LTSB 2015; Windows 8.1; Windows 7 SP1
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2; Windows Server 2008 R2 SP1
Resolution: This issue is resolved in KB4491101.

Back to top
OS Build 10240.18132

February 12, 2019
KB4487018
Resolved
KB4491101
Resolved:
February 21, 2019
02:00 PM PT

Opened:
February 12, 2019
10:00 AM PT
- - + +
DetailsOriginating updateStatusHistory
MSXML6 may cause applications to stop responding
After installing KB4480962, MSXML6 causes applications to stop responding if an exception was thrown during node operations, such as appendChild(), insertBefore(), and moveNode().

The Group Policy editor may stop responding when editing a Group Policy Object (GPO) that contains Group Policy Preferences (GPP) for Internet Explorer 10 settings.

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10, version 1607; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 10 Enterprise LTSB 2015; Windows 8.1
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2; Windows Server 2012
Resolution: This issue was resolved in KB4493475.

Back to top
OS Build 10240.18094

January 08, 2019
KB4480962
Resolved
KB4493475
Resolved:
April 09, 2019
10:00 AM PT

Opened:
January 08, 2019
10:00 AM PT
Applications using Microsoft Jet database fail to open
Applications that use a Microsoft Jet database with the Microsoft Access 97 file format may fail to open if the database has column names greater than 32 characters. The database will fail to open with the error, \"Unrecognized Database Format\".

Affected platforms:
  • Client: Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 8.1; Windows 7, Service Pack 1
  • Server: Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2; Windows Server 2008 R2 SP1
Resolution: This issue is resolved in KB4487018.

Back to top
OS Build 10240.18094

January 08, 2019
KB4480962
Resolved
KB4487018
Resolved:
February 12, 2019
10:00 AM PT

Opened:
January 08, 2019
10:00 AM PT
MSXML6 may cause applications to stop responding
After installing KB4480962, MSXML6 causes applications to stop responding if an exception was thrown during node operations, such as appendChild(), insertBefore(), and moveNode().

The Group Policy editor may stop responding when editing a Group Policy Object (GPO) that contains Group Policy Preferences (GPP) for Internet Explorer 10 settings.

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10, version 1607; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 10 Enterprise LTSB 2015; Windows 8.1
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2; Windows Server 2012
Resolution: This issue was resolved in KB4493475.

Back to top
OS Build 10240.18094

January 08, 2019
KB4480962
Resolved
KB4493475
Resolved:
April 09, 2019
10:00 AM PT

Opened:
January 08, 2019
10:00 AM PT
Applications using Microsoft Jet database fail to open
Applications that use a Microsoft Jet database with the Microsoft Access 97 file format may fail to open if the database has column names greater than 32 characters. The database will fail to open with the error, \"Unrecognized Database Format\".

Affected platforms:
  • Client: Windows 10, version 1709; Windows 10, version 1703; Windows 10, version 1607; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 10 Enterprise LTSB 2015; Windows 8.1; Windows 7 SP1
  • Server: Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2; Windows Server 2008 R2 SP1
Resolution: This issue is resolved in KB4487018.

Back to top
OS Build 10240.18094

January 08, 2019
KB4480962
Resolved
KB4487018
Resolved:
February 12, 2019
10:00 AM PT

Opened:
January 08, 2019
10:00 AM PT
Unable to access hotspots with third-party applications
After installing KB4480962, third-party applications may have difficulty authenticating hotspots.

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10, version 1607; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 10 Enterprise LTSB 2015; Windows 8.1
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2; Windows Server 2012
Resolution: This issue is resolved in KB4487018.

Back to top
OS Build 10240.18094

January 08, 2019
KB4480962
Resolved
KB4487018
Resolved:
February 12, 2019
10:00 AM PT

Opened:
January 08, 2019
10:00 AM PT
" @@ -98,6 +108,6 @@ sections: - type: markdown text: " - +
DetailsOriginating updateStatusHistory
Guest VMs running Unicast NLB fail to respond after restart
All guest virtual machines running Unicast NLB fail to respond to NLB requests after the virtual machines restart.

Affected platforms:
  • Client: Windows 10, version 1803; Windows 10, version 1507
  • Server: Windows Server, version 1803
Resolution: This issue is resolved in KB4462922.

Back to top
OS Build 10240.17976

September 11, 2018
KB4457132
Resolved
KB4462922
Resolved:
October 09, 2018
10:00 AM PT

Opened:
September 11, 2018
10:00 AM PT
Guest VMs running Unicast NLB fail to respond after restart
All guest virtual machines running Unicast NLB fail to respond to NLB requests after the virtual machines restart.

Affected platforms:
  • Client: Windows 10, version 1803; Windows 10, version 1507; Windows 10 Enterprise LTSB 2015
  • Server: Windows Server, version 1803
Resolution: This issue is resolved in KB4462922.

Back to top
OS Build 10240.17976

September 11, 2018
KB4457132
Resolved
KB4462922
Resolved:
October 09, 2018
10:00 AM PT

Opened:
September 11, 2018
10:00 AM PT
" diff --git a/windows/release-information/resolved-issues-windows-10-1607.yml b/windows/release-information/resolved-issues-windows-10-1607.yml index e45c68069d..9175288b84 100644 --- a/windows/release-information/resolved-issues-windows-10-1607.yml +++ b/windows/release-information/resolved-issues-windows-10-1607.yml @@ -32,6 +32,8 @@ sections: - type: markdown text: " + + @@ -58,11 +60,21 @@ sections:
" +- title: April 2019 +- items: + - type: markdown + text: " +
SummaryOriginating updateStatusDate resolved
Embedded objects may display incorrectly
Any compound document (OLE) server application that places embedded objects into the Windows Metafile (WMF) using the PatBlt API may display embedded objects incorrectly.

See details >
OS Build 14393.2791

February 12, 2019
KB4487026
Resolved
KB4493470
April 29, 2019
12:43 AM PT
Custom URI schemes may not start corresponding application
Custom URI schemes for application protocol handlers may not start the corresponding application for local intranet and trusted sites in Internet Explorer.

See details >
OS Build 14393.2848

March 12, 2019
KB4489882
Resolved
KB4493473
April 25, 2019
02:00 PM PT
End-user-defined characters (EUDC) may cause blue screen at startup
If you enable per font end-user-defined characters (EUDC), the system will stop working and a blue screen may appear at startup.

See details >
OS Build 14393.2879

March 19, 2019
KB4489889
Resolved
KB4493470
April 09, 2019
10:00 AM PT
Internet Explorer 11 authentication issue with multiple concurrent logons
Internet Explorer 11 users may encounter issues if two or more people use the same user account for multiple, concurrent login sessions on the same Windows Server machine.

See details >
OS Build 14393.2724

January 08, 2019
KB4480961
Resolved
KB4493470
April 09, 2019
10:00 AM PT
MSXML6 may cause applications to stop responding
MSXML6 may cause applications to stop responding if an exception was thrown during node operations, such as appendChild(), insertBefore(), and moveNode().

See details >
OS Build 14393.2724

January 08, 2019
KB4480961
Resolved
KB4493470
April 09, 2019
10:00 AM PT
+ +
DetailsOriginating updateStatusHistory
Embedded objects may display incorrectly
Any compound document (OLE) server application that places embedded objects into the Windows Metafile (WMF) using the PatBlt API may display embedded objects incorrectly. 
 
For example, if you paste a Microsoft Excel worksheet object into a Microsoft Word document, the cells may render with a different background color. 
 
Affected platforms:  
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10, version 1607; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 10 Enterprise LTSB 2015; Windows 8.1; Windows 7 SP1 
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2; Windows Server 2012; Windows Server 2008 R2 SP1; Windows Server 2008 SP2 
Resolution: This issue is resolved in KB4493470

Back to top
OS Build 14393.2791

February 12, 2019
KB4487026
Resolved
KB4493470
Resolved:
April 09, 2019
10:00 AM PT

Opened:
April 29, 2019
12:43 AM PT
+ " + - title: March 2019 - items: - type: markdown text: " +
DetailsOriginating updateStatusHistory
Custom URI schemes may not start corresponding application
After installing KB4489882, Custom URI schemes for application protocol handlers may not start the corresponding application for local intranet and trusted sites security zones on Internet Explorer.

Affected platforms: 
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10, version 1607; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 10 Enterprise LTSB 2015; Windows 8.1; Windows 7 SP1 
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2; Windows Server 2008 R2 SP1
Resolution: This issue is resolved in KB4493473

Back to top
OS Build 14393.2848

March 12, 2019
KB4489882
Resolved
KB4493473
Resolved:
April 25, 2019
02:00 PM PT

Opened:
March 12, 2019
10:00 AM PT
End-user-defined characters (EUDC) may cause blue screen at startup
If you enable per font end-user-defined characters (EUDC), the system will stop working and a blue screen may appear at startup. This is not a common setting in non-Asian regions.

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10, version 1607; Windows 10 Enterprise LTSC 2016
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016
Resolution: This issue was resolved in KB4493470.

Back to top
OS Build 14393.2879

March 19, 2019
KB4489889
Resolved
KB4493470
Resolved:
April 09, 2019
10:00 AM PT

Opened:
March 19, 2019
10:00 AM PT
" diff --git a/windows/release-information/resolved-issues-windows-10-1703.yml b/windows/release-information/resolved-issues-windows-10-1703.yml index ac1f303a18..828dfa51d7 100644 --- a/windows/release-information/resolved-issues-windows-10-1703.yml +++ b/windows/release-information/resolved-issues-windows-10-1703.yml @@ -32,8 +32,10 @@ sections: - type: markdown text: " + + @@ -60,6 +62,7 @@ sections: - type: markdown text: "
SummaryOriginating updateStatusDate resolved
Custom URI schemes may not start corresponding application
Custom URI schemes for application protocol handlers may not start the corresponding application for local intranet and trusted sites in Internet Explorer.

See details >
OS Build 15063.1689

March 12, 2019
KB4489871
Resolved
KB4493436
April 25, 2019
02:00 PM PT
End-user-defined characters (EUDC) may cause blue screen at startup
If you enable per font end-user-defined characters (EUDC), the system may stop working and a blue screen may appear at startup.

See details >
OS Build 15063.1716

March 19, 2019
KB4489888
Resolved
KB4493474
April 09, 2019
10:00 AM PT
MSXML6 may cause applications to stop responding
MSXML6 may cause applications to stop responding if an exception was thrown during node operations, such as appendChild(), insertBefore(), and moveNode().

See details >
OS Build 15063.1563

January 08, 2019
KB4480973
Resolved
KB4493474
April 09, 2019
10:00 AM PT
Embedded objects may display incorrectly
Any compound document (OLE) server application that places embedded objects into the Windows Metafile (WMF) using the PatBlt API may display embedded objects incorrectly.

See details >
OS Build 15063.1631

February 12, 2019
KB4487020
Resolved
KB4493474
April 09, 2019
10:00 AM PT
Error 1309 when installing/uninstalling MSI or MSP files
Users may receive “Error 1309” while installing or uninstalling certain types of MSI and MSP files.

See details >
OS Build 15063.1659

February 19, 2019
KB4487011
Resolved
KB4489871
March 12, 2019
10:00 AM PT
First character of the Japanese era name not recognized as an abbreviation
The first character of the Japanese era name is not recognized as an abbreviation and may cause date parsing issues.

See details >
OS Build 15063.1596

January 15, 2019
KB4480959
Resolved
KB4487011
February 19, 2019
02:00 PM PT
Internet Explorer may fail to load images
Internet Explorer may fail to load images with a backslash (\\) in their relative source path.

See details >
OS Build 15063.1631

February 12, 2019
KB4487020
Resolved
KB4487011
February 19, 2019
02:00 PM PT
+
DetailsOriginating updateStatusHistory
Custom URI schemes may not start corresponding application
After installing KB4489871, custom URI schemes for application protocol handlers may not start the corresponding application for local intranet and trusted sites security zones on Internet Explorer.

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10, version 1607; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 10 Enterprise LTSB 2015; Windows 8.1; Windows 7 SP1 
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2; Windows Server 2008 R2 SP1
Resolution: This issue is resolved in KB4493436

Back to top
OS Build 15063.1689

March 12, 2019
KB4489871
Resolved
KB4493436
Resolved:
April 25, 2019
02:00 PM PT

Opened:
March 12, 2019
10:00 AM PT
End-user-defined characters (EUDC) may cause blue screen at startup
If you enable per font end-user-defined characters (EUDC), the system may stop working and a blue screen may appear at startup. This is not a common setting in non-Asian regions.

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016
Resolution: This issue was resolved in KB4493474.

Back to top
OS Build 15063.1716

March 19, 2019
KB4489888
Resolved
KB4493474
Resolved:
April 09, 2019
10:00 AM PT

Opened:
March 19, 2019
10:00 AM PT
" @@ -69,9 +72,10 @@ sections: - type: markdown text: " + - +
DetailsOriginating updateStatusHistory
Embedded objects may display incorrectly
Any compound document (OLE) server application that places embedded objects into the Windows Metafile (WMF) using the PatBlt API may display embedded objects incorrectly. 
 
For example, if you paste a Microsoft Excel worksheet object into a Microsoft Word document, the cells may render with a different background color. 
 
Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10, version 1607; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 10 Enterprise LTSB 2015; Windows 8.1; Windows 7 SP1 
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2; Windows Server 2012; Windows Server 2008 R2 SP1; Windows Server 2008 SP2 
Resolution: This issue is resolved in KB4493474

Back to top
OS Build 15063.1631

February 12, 2019
KB4487020
Resolved
KB4493474
Resolved:
April 09, 2019
10:00 AM PT

Opened:
February 12, 2019
10:00 AM PT
Error 1309 when installing/uninstalling MSI or MSP files
After installing KB4487011, users may receive “Error 1309” while installing or uninstalling certain types of MSI and MSP files.

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10, version 1607; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 10 Enterprise LTSB 2015; Windows 8.1
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2; Windows Server 2012
Resolution: This issue is resolved in KB4489871.

Back to top
OS Build 15063.1659

February 19, 2019
KB4487011
Resolved
KB4489871
Resolved:
March 12, 2019
10:00 AM PT

Opened:
February 19, 2019
02:00 PM PT
Internet Explorer may fail to load images
After installing KB4487020, Internet Explorer may fail to load images with a backslash (\\) in their relative source path.

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10, version 1607; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 10 Enterprise LTSB 2015; Windows 8.1; Windows 7 SP1
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2; Windows Server 2008 R2 SP1
Resolution: This issue is resolved in KB4487011.

Back to top
OS Build 15063.1631

February 12, 2019
KB4487020
Resolved
KB4487011
Resolved:
February 19, 2019
02:00 PM PT

Opened:
February 12, 2019
10:00 AM PT
Applications using Microsoft Jet database and Access 95 file format stop working
Applications that use a Microsoft Jet database with the Microsoft Access 95 file format may randomly stop working.

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 7 SP1
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2; Windows Server 2012; Windows Server 2008 R2 SP1; Windows Server 2008 SP2
Resolution: This issue is resolved in KB4487011.

Back to top
OS Build 15063.1631

February 12, 2019
KB4487020
Resolved
KB4487011
Resolved:
February 19, 2019
02:00 PM PT

Opened:
February 12, 2019
10:00 AM PT
Applications using Microsoft Jet database and Access 95 file format stop working
Applications that use a Microsoft Jet database with the Microsoft Access 95 file format may randomly stop working.

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10, version 1607; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 10 Enterprise LTSB 2015; Windows 7 SP1
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2; Windows Server 2012; Windows Server 2008 R2 SP1; Windows Server 2008 SP2
Resolution: This issue is resolved in KB4487011.

Back to top
OS Build 15063.1631

February 12, 2019
KB4487020
Resolved
KB4487011
Resolved:
February 19, 2019
02:00 PM PT

Opened:
February 12, 2019
10:00 AM PT
" @@ -82,7 +86,7 @@ sections: - +
DetailsOriginating updateStatusHistory
MSXML6 may cause applications to stop responding
After installing KB4480973, MSXML6 causes applications to stop responding if an exception was thrown during node operations, such as appendChild(), insertBefore(), and moveNode().

The Group Policy editor may stop responding when editing a Group Policy Object (GPO) that contains Group Policy Preferences (GPP) for Internet Explorer 10 settings.

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10, version 1607; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 10 Enterprise LTSB 2015; Windows 8.1
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2
Resolution: This issue was resolved in KB4493474.

Back to top
OS Build 15063.1563

January 08, 2019
KB4480973
Resolved
KB4493474
Resolved:
April 09, 2019
10:00 AM PT

Opened:
January 08, 2019
10:00 AM PT
First character of the Japanese era name not recognized as an abbreviation
After installing KB4480959, the first character of the Japanese era name is not recognized as an abbreviation and may cause date parsing issues.

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10, version 1607; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 10 Enterprise LTSB 2015; Windows 8.1; Windows 7 SP1
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2; Windows Server 2012; Windows Server 2008 R2 SP1; Windows Server 2008 SP2
Resolution: This issue is resolved in KB4487011.

Back to top
OS Build 15063.1596

January 15, 2019
KB4480959
Resolved
KB4487011
Resolved:
February 19, 2019
02:00 PM PT

Opened:
January 15, 2019
10:00 AM PT
Applications using Microsoft Jet database fail to open
Applications that use a Microsoft Jet database with the Microsoft Access 97 file format may fail to open if the database has column names greater than 32 characters. The database will fail to open with the error, “Unrecognized Database Format”.

Affected platforms:
  • Client: Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 8.1; Windows 7 SP1 
  • Server: Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2; Windows Server 2012; Windows Server 2008 R2 SP1; Windows Server 2008 SP2
Resolution: This issue is resolved in KB4487020.

Back to top
OS Build 15063.1563

January 08, 2019
KB4480973
Resolved
KB4487020
Resolved:
February 12, 2019
10:00 AM PT

Opened:
January 08, 2019
10:00 AM PT
Applications using Microsoft Jet database fail to open
Applications that use a Microsoft Jet database with the Microsoft Access 97 file format may fail to open if the database has column names greater than 32 characters. The database will fail to open with the error, “Unrecognized Database Format”.

Affected platforms:
  • Client: Windows 10, version 1709; Windows 10, version 1703; Windows 10, version 1607; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 10 Enterprise LTSB 2015; Windows 8.1; Windows 7 SP1 
  • Server: Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2; Windows Server 2012; Windows Server 2008 R2 SP1; Windows Server 2008 SP2
Resolution: This issue is resolved in KB4487020.

Back to top
OS Build 15063.1563

January 08, 2019
KB4480973
Resolved
KB4487020
Resolved:
February 12, 2019
10:00 AM PT

Opened:
January 08, 2019
10:00 AM PT
Webpages become unresponsive in Microsoft Edge
After installing KB4480973, some Microsoft Edge users report that they:
  • Cannot load webpages using a local IP address.
  • Cannot load webpages on the Internet using a VPN connection.
Browsing fails or the webpage may become unresponsive.

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709
Resolution: This issue is resolved in KB4487020.

Back to top
OS Build 15063.1563

January 08, 2019
KB4480973
Resolved
KB4487020
Resolved:
February 12, 2019
10:00 AM PT

Opened:
January 08, 2019
10:00 AM PT
Unable to access hotspots with third-party applications
After installing KB4480973, third-party applications may have difficulty authenticating hotspots.

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10, version 1607; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 10 Enterprise LTSB 2015; Windows 8.1
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2; Windows Server 2012
Resolution: This issue is resolved in KB4480959.

Back to top
OS Build 15063.1563

January 08, 2019
KB4480973
Resolved
KB4480959
Resolved:
January 15, 2019
10:00 AM PT

Opened:
January 08, 2019
10:00 AM PT
@@ -104,6 +108,6 @@ sections: - type: markdown text: " - +
DetailsOriginating updateStatusHistory
SqlConnection instantiation exception on .NET 4.6 and later
After you install the August Preview of Quality Rollup or September 11, 2018 .NET Framework update, instantiation of SqlConnection can throw an exception.

For more information about this issue, see the following article in the Microsoft Knowledge Base:
4470809 SqlConnection instantiation exception on .NET 4.6 and later after August-September 2018 .NET Framework updates.

Affected platforms:
  • Client: Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016
  • Server: Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016
Resolution: This issue is resolved in KB4480959.

Back to top
OS Build 15063.1292

August 30, 2018
KB4343889
Resolved
KB4480959
Resolved:
January 15, 2019
10:00 AM PT

Opened:
August 30, 2018
05:00 PM PT
SqlConnection instantiation exception on .NET 4.6 and later
After you install the August Preview of Quality Rollup or September 11, 2018 .NET Framework update, instantiation of SqlConnection can throw an exception.

For more information about this issue, see the following article in the Microsoft Knowledge Base:
4470809 SqlConnection instantiation exception on .NET 4.6 and later after August-September 2018 .NET Framework updates.

Affected platforms:
  • Client: Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10, version 1607; Windows 10 Enterprise LTSC 2016
  • Server: Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016
Resolution: This issue is resolved in KB4480959.

Back to top
OS Build 15063.1292

August 30, 2018
KB4343889
Resolved
KB4480959
Resolved:
January 15, 2019
10:00 AM PT

Opened:
August 30, 2018
05:00 PM PT
" diff --git a/windows/release-information/resolved-issues-windows-10-1709.yml b/windows/release-information/resolved-issues-windows-10-1709.yml index da79bd1ae7..25787d994b 100644 --- a/windows/release-information/resolved-issues-windows-10-1709.yml +++ b/windows/release-information/resolved-issues-windows-10-1709.yml @@ -32,9 +32,11 @@ sections: - type: markdown text: " + - + + @@ -60,6 +62,7 @@ sections: - type: markdown text: "
SummaryOriginating updateStatusDate resolved
Custom URI schemes may not start corresponding application
Custom URI schemes for application protocol handlers may not start the corresponding application for local intranet and trusted sites in Internet Explorer.

See details >
OS Build 16299.1029

March 12, 2019
KB4489886
Resolved
KB4493440
April 25, 2019
02:00 PM PT
End-user-defined characters (EUDC) may cause blue screen at startup
If you enable per font end-user-defined characters (EUDC), the system may stop working and a blue screen may appear at startup.

See details >
OS Build 16299.1059

March 19, 2019
KB4489890
Resolved
KB4493441
April 09, 2019
10:00 AM PT
MSXML6 causes applications to stop responding if an exception was thrown
MSXML6 causes applications to stop responding if an exception was thrown during node operations, such as appendChild(), insertBefore(), and moveNode().

See details >
OS Build 16299.904

January 08, 2019
KB4480978
Resolved
KB4493441
April 09, 2019
10:00 AM PT
Stop error when attempting to start SSH from WSL
A stop error occurs when attempting to start the Secure Shell client program from Windows Subsystem for Linux with agent forwarding enabled using a command line switch (ssh –A) or

See details >
OS Build 16299.1029

March 12, 2019
KB4489886
Resolved
KB4493441
April 09, 2019
10:00 AM PT
Stop error when attempting to start SSH from WSL
A stop error occurs when attempting to start Secure Shell from Windows Subsystem for Linux with agent forwarding using a command line switch (ssh –A) or a configuration setting.

See details >
OS Build 16299.1029

March 12, 2019
KB4489886
Resolved
KB4493441
April 09, 2019
10:00 AM PT
Embedded objects may display incorrectly
Any compound document (OLE) server application that places embedded objects into the Windows Metafile (WMF) using the PatBlt API may display embedded objects incorrectly.

See details >
OS Build 16299.967

February 12, 2019
KB4486996
Resolved
KB4493441
April 09, 2019
10:00 AM PT
Error 1309 when installing/uninstalling MSI or MSP files
Users may receive “Error 1309” while installing or uninstalling certain types of MSI and MSP files.

See details >
OS Build 16299.967

February 12, 2019
KB4486996
Resolved
KB4489886
March 12, 2019
10:00 AM PT
Applications using Microsoft Jet database and Access 95 file format stop working
Applications that use a Microsoft Jet database with the Microsoft Access 95 file format may randomly stop working.

See details >
OS Build 16299.967

February 12, 2019
KB4486996
Resolved
KB4487021
February 19, 2019
02:00 PM PT
First character of the Japanese era name not recognized as an abbreviation
The first character of the Japanese era name is not recognized as an abbreviation and may cause date parsing issues.

See details >
OS Build 16299.936

January 15, 2019
KB4480967
Resolved
KB4487021
February 19, 2019
02:00 PM PT
+
DetailsOriginating updateStatusHistory
Custom URI schemes may not start corresponding application
After installing KB4489886, custom URI schemes for application protocol handlers may not start the corresponding application for local intranet and trusted sites security zones on Internet Explorer.

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10, version 1607; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 10 Enterprise LTSB 2015; Windows 8.1; Windows 7 SP1 
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2; Windows Server 2008 R2 SP1
Resolution: This issue is resolved in KB4493440

Back to top
OS Build 16299.1029

March 12, 2019
KB4489886
Resolved
KB4493440
Resolved:
April 25, 2019
02:00 PM PT

Opened:
March 12, 2019
10:00 AM PT
End-user-defined characters (EUDC) may cause blue screen at startup
If you enable per font end-user-defined characters (EUDC), the system may stop working and a blue screen may appear at startup. This is not a common setting in non-Asian regions.

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10, version 1607; Windows 10 Enterprise LTSC 2016
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016
Resolution: This issue is resolved in KB4493441.

Back to top
OS Build 16299.1059

March 19, 2019
KB4489890
Resolved
KB4493441
Resolved:
April 09, 2019
10:00 AM PT

Opened:
March 19, 2019
10:00 AM PT
Stop error when attempting to start SSH from WSL
After applying KB4489886, a stop error occurs when attempting to start the Secure Shell (SSH) client program from Windows Subsystem for Linux (WSL) with agent forwarding enabled using a command line switch (ssh –A) or a configuration setting.

Affected platforms:
  • Client: Windows 10, version 1803; Windows 10, version 1709
  • Server: Windows Server, version 1803; Windows Server, version 1709
Resolution: This issue is resolved in KB4493441.

Back to top
OS Build 16299.1029

March 12, 2019
KB4489886
Resolved
KB4493441
Resolved:
April 09, 2019
10:00 AM PT

Opened:
March 12, 2019
10:00 AM PT
@@ -70,8 +73,9 @@ sections: - type: markdown text: " + - +
DetailsOriginating updateStatusHistory
Embedded objects may display incorrectly
Any compound document (OLE) server application that places embedded objects into the Windows Metafile (WMF) using the PatBlt API may display embedded objects incorrectly. 
 
For example, if you paste a Microsoft Excel worksheet object into a Microsoft Word document, the cells may render with a different background color. 
 
Affected platforms:  
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10, version 1607; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 10 Enterprise LTSB 2015; Windows 8.1; Windows 7 SP1 
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2; Windows Server 2012; Windows Server 2008 R2 SP1; Windows Server 2008 SP2 
Resolution: This issue is resolved in KB4493441

Back to top
OS Build 16299.967

February 12, 2019
KB4486996
Resolved
KB4493441
Resolved:
April 09, 2019
10:00 AM PT

Opened:
February 12, 2019
10:00 AM PT
Error 1309 when installing/uninstalling MSI or MSP files
After installing KB4486996, users may receive “Error 1309” while installing or uninstalling certain types of MSI and MSP files.

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10, version 1607; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 10 Enterprise LTSB 2015; Windows 8.1
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2; Windows Server 2012
Resolution: This issue is resolved in KB4489886.

Back to top
OS Build 16299.967

February 12, 2019
KB4486996
Resolved
KB4489886
Resolved:
March 12, 2019
10:00 AM PT

Opened:
February 12, 2019
10:00 AM PT
Applications using Microsoft Jet database and Access 95 file format stop working
Applications that use a Microsoft Jet database with the Microsoft Access 95 file format may randomly stop working.

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 7 SP1
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2; Windows Server 2012; Windows Server 2008 R2 SP1; Windows Server 2008 SP2
Resolution: This issue is resolved in KB4487021.

Back to top
OS Build 16299.967

February 12, 2019
KB4486996
Resolved
KB4487021
Resolved:
February 19, 2019
02:00 PM PT

Opened:
February 12, 2019
10:00 AM PT
Applications using Microsoft Jet database and Access 95 file format stop working
Applications that use a Microsoft Jet database with the Microsoft Access 95 file format may randomly stop working.

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10, version 1607; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 10 Enterprise LTSB 2015; Windows 7 SP1
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2; Windows Server 2012; Windows Server 2008 R2 SP1; Windows Server 2008 SP2
Resolution: This issue is resolved in KB4487021.

Back to top
OS Build 16299.967

February 12, 2019
KB4486996
Resolved
KB4487021
Resolved:
February 19, 2019
02:00 PM PT

Opened:
February 12, 2019
10:00 AM PT
Internet Explorer may fail to load images
After installing KB4486996, Internet Explorer may fail to load images with a backslash (\\) in their relative source path.

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10, version 1607; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 10 Enterprise LTSB 2015; Windows 8.1; Windows 7 SP1
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2; Windows Server 2008 R2 SP1
Resolution: This issue is resolved in KB4487021.

Back to top
OS Build 16299.967

February 12, 2019
KB4486996
Resolved
KB4487021
Resolved:
February 19, 2019
02:00 PM PT

Opened:
February 12, 2019
10:00 AM PT
" @@ -81,10 +85,10 @@ sections: - type: markdown text: " - + - - + +
DetailsOriginating updateStatusHistory
MSXML6 causes applications to stop responding if an exception was thrown
After installing KB4480978, MSXML6 causes applications to stop responding if an exception was thrown during node operations, such as appendChild(), insertBefore(), and moveNode().

The Group Policy editor may stop responding when editing a Group Policy Object (GPO) that contains Group Policy Preferences (GPP) for Internet Explorer 10 settings.

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 8.1
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2; Windows Server 2012
Resolution: This issue is resolved in KB4493441.

Back to top
OS Build 16299.904

January 08, 2019
KB4480978
Resolved
KB4493441
Resolved:
April 09, 2019
10:00 AM PT

Opened:
January 08, 2019
10:00 AM PT
MSXML6 causes applications to stop responding if an exception was thrown
After installing KB4480978, MSXML6 causes applications to stop responding if an exception was thrown during node operations, such as appendChild(), insertBefore(), and moveNode().

The Group Policy editor may stop responding when editing a Group Policy Object (GPO) that contains Group Policy Preferences (GPP) for Internet Explorer 10 settings.

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10, version 1607; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 10 Enterprise LTSB 2015; Windows 8.1
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2; Windows Server 2012
Resolution: This issue is resolved in KB4493441.

Back to top
OS Build 16299.904

January 08, 2019
KB4480978
Resolved
KB4493441
Resolved:
April 09, 2019
10:00 AM PT

Opened:
January 08, 2019
10:00 AM PT
First character of the Japanese era name not recognized as an abbreviation
After installing KB4480967, the first character of the Japanese era name is not recognized as an abbreviation and may cause date parsing issues.

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10, version 1607; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 10 Enterprise LTSB 2015; Windows 8.1; Windows 7 SP1
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2; Windows Server 2012; Windows Server 2008 R2 SP1; Windows Server 2008 SP2
Resolution: This issue is resolved in KB4487021.

Back to top
OS Build 16299.936

January 15, 2019
KB4480967
Resolved
KB4487021
Resolved:
February 19, 2019
02:00 PM PT

Opened:
January 15, 2019
10:00 AM PT
Applications using Microsoft Jet database fail to open
Applications that use a Microsoft Jet database with the Microsoft Access 97 file format may fail to open if the database has column names greater than 32 characters. The database will fail to open with the error, “Unrecognized Database Format.”

Affected platforms:
  • Client: Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 8.1; Windows 7 SP1 
  • Server: Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2; Windows Server 2012; Windows Server 2008 R2 SP1; Windows Server 2008 SP2 
Resolution: This issue is resolved in KB4486996.

Back to top
OS Build 16299.904

January 08, 2019
KB4480978
Resolved
KB4486996
Resolved:
February 12, 2019
10:00 AM PT

Opened:
January 08, 2019
10:00 AM PT
Webpages become unresponsive in Microsoft Edge
After installing KB4480978, some Microsoft Edge users report that they:
  • Cannot load webpages using a local IP address.
  • Cannot load webpages on the Internet using a VPN connection.
Browsing fails or the webpage may become unresponsive.

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709
Resolution: This issue is resolved in KB4486996.

Back to top
OS Build 16299.904

January 08, 2019
KB4480978
Resolved
KB4486996
Resolved:
February 12, 2019
10:00 AM PT

Opened:
January 08, 2019
10:00 AM PT
Applications using Microsoft Jet database fail to open
Applications that use a Microsoft Jet database with the Microsoft Access 97 file format may fail to open if the database has column names greater than 32 characters. The database will fail to open with the error, “Unrecognized Database Format.”

Affected platforms:
  • Client: Windows 10, version 1709; Windows 10, version 1703; Windows 10, version 1607; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 10 Enterprise LTSB 2015; Windows 8.1; Windows 7 SP1 
  • Server: Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2; Windows Server 2012; Windows Server 2008 R2 SP1; Windows Server 2008 SP2 
Resolution: This issue is resolved in KB4486996.

Back to top
OS Build 16299.904

January 08, 2019
KB4480978
Resolved
KB4486996
Resolved:
February 12, 2019
10:00 AM PT

Opened:
January 08, 2019
10:00 AM PT
Webpages become unresponsive in Microsoft Edge
Microsoft and ArcaBit have identified an issue on devices with ArcaBit antivirus software installed that may cause the system to become unresponsive upon restart after installing KB4493446.

Microsoft has temporarily blocked devices from receiving this update if ArcaBit antivirus software is installed.

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 8.1; Windows 7 SP1
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server 2012 R2; Windows Server 2008 R2 SP1
Workaround: ArcaBit has released an update to address this issue. For more information, see the Arcabit support article.

Back to top
OS Build 16299.904

January 08, 2019
KB4480978
Resolved
KB4486996
Resolved:
February 12, 2019
10:00 AM PT

Opened:
January 08, 2019
10:00 AM PT
Unable to access hotspots with third-party applications
After installing KB4480978, third-party applications may have difficulty authenticating hotspots.

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10, version 1607; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 10 Enterprise LTSB 2015; Windows 8.1
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2; Windows Server 2012
Resolution: This issue is resolved in KB4480967.

Back to top
OS Build 16299.904

January 08, 2019
KB4480978
Resolved
KB4480967
Resolved:
January 15, 2019
10:00 AM PT

Opened:
January 08, 2019
10:00 AM PT
" @@ -104,6 +108,6 @@ sections: - type: markdown text: " - +
DetailsOriginating updateStatusHistory
SqlConnection instantiation exception on .NET 4.6 and later
After you install the August Preview of Quality Rollup or September 11, 2018 .NET Framework update, instantiation of SqlConnection can throw an exception.

For more information about this issue, see the following article in the Microsoft Knowledge Base:
4470809 SqlConnection instantiation exception on .NET 4.6 and later after August-September 2018 .NET Framework updates.

Affected platforms:
  • Client: Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016
  • Server: Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016
Resolution: This issue is resolved in KB4480967.

Back to top
OS Build 16299.637

August 30, 2018
KB4343893
Resolved
KB4480967
Resolved:
January 15, 2019
10:00 AM PT

Opened:
August 30, 2018
05:00 PM PT
SqlConnection instantiation exception on .NET 4.6 and later
After you install the August Preview of Quality Rollup or September 11, 2018 .NET Framework update, instantiation of SqlConnection can throw an exception.

For more information about this issue, see the following article in the Microsoft Knowledge Base:
4470809 SqlConnection instantiation exception on .NET 4.6 and later after August-September 2018 .NET Framework updates.

Affected platforms:
  • Client: Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10, version 1607; Windows 10 Enterprise LTSC 2016
  • Server: Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016
Resolution: This issue is resolved in KB4480967.

Back to top
OS Build 16299.637

August 30, 2018
KB4343893
Resolved
KB4480967
Resolved:
January 15, 2019
10:00 AM PT

Opened:
August 30, 2018
05:00 PM PT
" diff --git a/windows/release-information/resolved-issues-windows-10-1803.yml b/windows/release-information/resolved-issues-windows-10-1803.yml index 0c631923e9..a3c036450b 100644 --- a/windows/release-information/resolved-issues-windows-10-1803.yml +++ b/windows/release-information/resolved-issues-windows-10-1803.yml @@ -32,12 +32,14 @@ sections: - type: markdown text: " + + + - @@ -48,7 +50,7 @@ sections: - +
SummaryOriginating updateStatusDate resolved
Custom URI schemes may not start corresponding application
Custom URI schemes for application protocol handlers may not start the corresponding application for local intranet and trusted sites in Internet Explorer.

See details >
OS Build 17134.648

March 12, 2019
KB4489868
Resolved
KB4493437
April 25, 2019
02:00 PM PT
End-user-defined characters (EUDC) may cause blue screen at startup
If you enable per font end-user-defined characters (EUDC), the system may stop working and a blue screen may appear at startup.

See details >
OS Build 17134.677

March 19, 2019
KB4489894
Resolved
KB4493464
April 09, 2019
10:00 AM PT
First character of Japanese era name not recognized
The first character of the Japanese era name is not recognized as an abbreviation and may cause date parsing issues.

See details >
OS Build 17134.556

January 15, 2019
KB4480976
Resolved
KB4487029
April 09, 2019
10:00 AM PT
MSXML6 may cause applications to stop responding
MSXML6 may cause applications to stop responding if an exception was thrown during node operations, such as appendChild(), insertBefore(), and moveNode().

See details >
OS Build 17134.523

January 08, 2019
KB4480966
Resolved
KB4493464
April 09, 2019
10:00 AM PT
Stop error when attempting to start SSH from WSL
A stop error occurs when attempting to start Secure Shell from Windows Subsystem for Linux with agent forwarding using a command line switch (ssh –A) or a configuration setting.

See details >
OS Build 17134.648

March 12, 2019
KB4489868
Resolved
KB4493464
April 09, 2019
10:00 AM PT
Embedded objects may display incorrectly
Any compound document (OLE) server application that places embedded objects into the Windows Metafile (WMF) using the PatBlt API may display embedded objects incorrectly.

See details >
OS Build 17134.590

February 12, 2019
KB4487017
Resolved
KB4493464
April 09, 2019
10:00 AM PT
Error 1309 when installing/uninstalling MSI or MSP files
Users may receive \"Error 1309\" while installing or uninstalling certain types of MSI and MSP files.

See details >
OS Build 17134.590

February 12, 2019
KB4487017
Resolved
KB4489868
March 12, 2019
10:00 AM PT
Cannot pin a web link on the Start menu or the taskbar
Some users cannot pin a web link on the Start menu or the taskbar.

See details >
OS Build 17134.471

December 11, 2018
KB4471324
Resolved
KB4487029
February 19, 2019
02:00 PM PT
First character of Japanese era name not recognized
The first character of the Japanese era name is not recognized as an abbreviation and may cause date parsing issues.

See details >
OS Build 17134.556

January 15, 2019
KB4480976
Resolved
KB4487029
February 19, 2019
02:00 PM PT
Internet Explorer may fail to load images
Internet Explorer may fail to load images with a backslash (\\) in their relative source path.

See details >
OS Build 17134.590

February 12, 2019
KB4487017
Resolved
KB4487029
February 19, 2019
02:00 PM PT
Applications using Microsoft Jet database and Access 95 file format stop working
Applications that use a Microsoft Jet database with the Microsoft Access 95 file format may randomly stop working.

See details >
OS Build 17134.523

January 08, 2019
KB4480966
Resolved
KB4487017
February 12, 2019
10:00 AM PT
Webpages become unresponsive in Microsoft Edge
Microsoft Edge users report difficulty browsing and loading webpages.

See details >
OS Build 17134.523

January 08, 2019
KB4480966
Resolved
KB4487017
February 12, 2019
10:00 AM PT
Unable to use Seek bar in Windows Media Player
Users may not be able to use the Seek Bar in Windows Media Player when playing specific files.

See details >
OS Build 17134.345

October 09, 2018
KB4462919
Resolved
KB4471324
December 11, 2018
10:00 AM PT
Users cannot set Win32 program defaults
Some users cannot set Win32 program defaults for certain app and file type combinations.

See details >
OS Build 17134.320

September 26, 2018
KB4458469
Resolved
KB4467682
November 27, 2018
10:00 AM PT
Developer Tools (F12) fail to start in Microsoft Edge
Developer Tools (F12) may fail to start in Microsoft Edge.

See details >
OS Build 17134.376

October 24, 2018
KB4462933
Resolved
KB4467702
November 13, 2018
10:00 AM PT
Guest VMs running Unicast NLB fail to respond after restart
All guest virtual machines running Unicast NLB fail to respond to NLB requests after the virtual machines restart.

See details >
OS Build 17134.285

September 11, 2018
KB4457128
Resolved
KB4458469
September 20, 2018
10:00 AM PT
Guest VMs running Unicast NLB fail to respond after restart
All guest virtual machines running Unicast NLB fail to respond to NLB requests after the virtual machines restart.

See details >
OS Build 17134.285

September 11, 2018
KB4457128
Resolved
KB4458469
September 26, 2018
10:00 AM PT
Microsoft Intune takes a long time to deliver user profiles
Windows no longer recognizes the Personal Information exchange (PFX) certificate used for Wi-Fi or VPN authentication, causing delays in Microsoft Intune delivering user profiles.

See details >
OS Build 17134.191

July 24, 2018
KB4340917
Resolved
KB4464218
September 17, 2018
10:00 AM PT
" @@ -65,6 +67,7 @@ sections: - type: markdown text: " +
DetailsOriginating updateStatusHistory
Custom URI schemes may not start corresponding application
After installing KB4489868, custom URI schemes for application protocol handlers may not start the corresponding application for local intranet and trusted sites security zones on Internet Explorer. 

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10, version 1607; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 10 Enterprise LTSB 2015; Windows 8.1; Windows 7 SP1 
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2; Windows Server 2008 R2 SP1
Resolution: This issue is resolved in KB4493437

Back to top
OS Build 17134.648

March 12, 2019
KB4489868
Resolved
KB4493437
Resolved:
April 25, 2019
02:00 PM PT

Opened:
March 12, 2019
10:00 AM PT
End-user-defined characters (EUDC) may cause blue screen at startup
If you enable per font end-user-defined characters (EUDC), the system may stop working and a blue screen may appear at startup. This is not a common setting in non-Asian regions. 

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10, version 1607; Windows 10 Enterprise LTSC 2016
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016
Resolution: This issue was resolved in KB4493464

Back to top
OS Build 17134.677

March 19, 2019
KB4489894
Resolved
KB4493464
Resolved:
April 09, 2019
10:00 AM PT

Opened:
March 19, 2019
10:00 AM PT
Stop error when attempting to start SSH from WSL
After applying KB4489868, a stop error occurs when attempting to start the Secure Shell (SSH) client program from Windows Subsystem for Linux (WSL) with agent forwarding enabled using a command line switch (ssh -A) or a configuration setting.

Affected platforms:
  • Client: Windows 10, version 1803; Windows 10, version 1709
  • Server: Windows Server, version 1803; Windows Server, version 1709
Resolution: This issue was resolved in KB4493464.

Back to top
OS Build 17134.648

March 12, 2019
KB4489868
Resolved
KB4493464
Resolved:
April 09, 2019
10:00 AM PT

Opened:
March 12, 2019
10:00 AM PT
@@ -75,6 +78,7 @@ sections: - type: markdown text: " +
DetailsOriginating updateStatusHistory
Embedded objects may display incorrectly
Any compound document (OLE) server application that places embedded objects into the Windows Metafile (WMF) using the PatBlt API may display embedded objects incorrectly. 
 
For example, if you paste a Microsoft Excel worksheet object into a Microsoft Word document, the cells may render with a different background color. 
 
Affected platforms:  
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10, version 1607; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 10 Enterprise LTSB 2015; Windows 8.1; Windows 7 SP1 
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2; Windows Server 2012; Windows Server 2008 R2 SP1; Windows Server 2008 SP2 
Resolution: This issue is resolved in KB4493464

Back to top
OS Build 17134.590

February 12, 2019
KB4487017
Resolved
KB4493464
Resolved:
April 09, 2019
10:00 AM PT

Opened:
February 12, 2019
10:00 AM PT
Error 1309 when installing/uninstalling MSI or MSP files
After installing KB4487017, users may received \"Error 1309\" while installing or uninstalling certain types of MSI and MSP files. 

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10, version 1607; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 10 Enterprise LTSB 2015; Windows 8.1
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2; Windows Server 2012
Resolution: This issue is resolved in KB4489868.

Back to top
OS Build 17134.590

February 12, 2019
KB4487017
Resolved
KB4489868
Resolved:
March 12, 2019
10:00 AM PT

Opened:
February 12, 2019
10:00 AM PT
Internet Explorer may fail to load images
After installing KB4487017, Internet Explorer may fail to load images with a backslash (\\) in their relative source path. 

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10, version 1607; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 10 Enterprise LTSB 2015; Windows 8.1; Windows 7 SP1
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2; Windows Server 2008 R2 SP1
Resolution: This issue is resolved in KB4487029

Back to top
OS Build 17134.590

February 12, 2019
KB4487017
Resolved
KB4487029
Resolved:
February 19, 2019
02:00 PM PT

Opened:
February 12, 2019
10:00 AM PT
@@ -85,9 +89,9 @@ sections: - type: markdown text: " + - - +
DetailsOriginating updateStatusHistory
First character of Japanese era name not recognized
After installing KB4480976, the first character of the Japanese era name is not recognized as an abbreviation and may cause date parsing issues.

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10, version 1607; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 10 Enterprise LTSB 2015; Windows 8.1; Windows 7 SP1
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2; Windows Server 2012; Windows Server 2008 R2 SP1; Windows Server 2008 SP2
Resolution: This issue is resolved in KB4487029

Back to top
OS Build 17134.556

January 15, 2019
KB4480976
Resolved
KB4487029
Resolved:
February 19, 2019
02:00 PM PT

Opened:
January 08, 2019
10:00 AM PT
MSXML6 may cause applications to stop responding
After installing KB4480966, MSXML6 causes applications to stop responding if an exception was thrown during node operations, such as appendChild(), insertBefore(), and moveNode().

The Group Policy editor may stop responding when editing a Group Policy Object (GPO) that contains Group Policy Preferences (GPP) for Internet Explorer 10 settings.

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10, version 1607; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 10 Enterprise LTSB 2015; Windows 8.1
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2; Windows Server 2012
Resolution: This issue was resolved in KB4493464

Back to top
OS Build 17134.523

January 08, 2019
KB4480966
Resolved
KB4493464
Resolved:
April 09, 2019
10:00 AM PT

Opened:
January 08, 2019
10:00 AM PT
First character of Japanese era name not recognized
After installing KB4480976, the first character of the Japanese era name is not recognized as an abbreviation and may cause date parsing issues.

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 8.1; Windows 7 SP1
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2; Windows Server 2012; Windows Server 2008 R2 SP1; Windows Server 2008 SP2
Resolution: This issue is resolved in KB4487029

Back to top
OS Build 17134.556

January 15, 2019
KB4480976
Resolved
KB4487029
Resolved:
February 19, 2019
02:00 PM PT

Opened:
January 15, 2019
10:00 AM PT
Applications using Microsoft Jet database and Access 95 file format stop working
Applications that use a Microsoft Jet database with the Microsoft Access 95 file format may randomly stop working. 

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 7 SP1
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2; Windows Server 2012; Windows Server 2008 R2 SP1; Windows Server 2008 SP2
Resolution: This issue is resolved in KB4487017.

Back to top
OS Build 17134.523

January 08, 2019
KB4480966
Resolved
KB4487017
Resolved:
February 12, 2019
10:00 AM PT

Opened:
January 08, 2019
10:00 AM PT
Applications using Microsoft Jet database and Access 95 file format stop working
Applications that use a Microsoft Jet database with the Microsoft Access 95 file format may randomly stop working. 

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10, version 1607; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 10 Enterprise LTSB 2015; Windows 7 SP1
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2; Windows Server 2012; Windows Server 2008 R2 SP1; Windows Server 2008 SP2
Resolution: This issue is resolved in KB4487017.

Back to top
OS Build 17134.523

January 08, 2019
KB4480966
Resolved
KB4487017
Resolved:
February 12, 2019
10:00 AM PT

Opened:
January 08, 2019
10:00 AM PT
Webpages become unresponsive in Microsoft Edge
After installing KB4480966, some Microsoft Edge users report that they: 
  • Cannot load webpages using a local IP address. 
  • Cannot load webpages on the Internet using a VPN connection.  
Browsing fails or the webpage may become unresponsive. 

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709
Resolution: This issue is resolved in KB4487017

Back to top
OS Build 17134.523

January 08, 2019
KB4480966
Resolved
KB4487017
Resolved:
February 12, 2019
10:00 AM PT

Opened:
January 08, 2019
10:00 AM PT
Unable to access hotspots with third-party applications
After installing KB4480966, third-party applications may have difficulty authenticating hotspots.

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10, version 1607; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 10 Enterprise LTSB 2015; Windows 8.1
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2; Windows Server 2012
Resolution: This issue is resolved in KB4480976

Back to top
OS Build 17134.523

January 08, 2019
KB4480966
Resolved
KB4480976
Resolved:
January 15, 2019
10:00 AM PT

Opened:
January 08, 2019
10:00 AM PT
@@ -127,9 +131,9 @@ sections: - type: markdown text: " - + - +
DetailsOriginating updateStatusHistory
SqlConnection instantiation exception on .NET 4.6 and later
After you install the August Preview of Quality Rollup or September 11, 2018 .NET Framework update, instantiation of SqlConnection can throw an exception.  

For more information about this issue, see the following article in the Microsoft Knowledge Base: 4470809, SqlConnection instantiation exception on .NET 4.6 and later after August-September 2018 .NET Framework updates.

Affected platforms:
  • Client: Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016
  • Server: Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016
Resolution: This issue is resolved in KB4480976

Back to top
OS Build 17134.285

September 11, 2018
KB4457128
Resolved
KB4480976
Resolved:
January 15, 2019
10:00 AM PT

Opened:
September 11, 2018
10:00 AM PT
SqlConnection instantiation exception on .NET 4.6 and later
After you install the August Preview of Quality Rollup or September 11, 2018 .NET Framework update, instantiation of SqlConnection can throw an exception.  

For more information about this issue, see the following article in the Microsoft Knowledge Base: 4470809, SqlConnection instantiation exception on .NET 4.6 and later after August-September 2018 .NET Framework updates.

Affected platforms:
  • Client: Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10, version 1607; Windows 10 Enterprise LTSC 2016
  • Server: Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016
Resolution: This issue is resolved in KB4480976

Back to top
OS Build 17134.285

September 11, 2018
KB4457128
Resolved
KB4480976
Resolved:
January 15, 2019
10:00 AM PT

Opened:
September 11, 2018
10:00 AM PT
Users cannot set Win32 program defaults
After installing KB4458469, some users cannot set Win32 program defaults for certain app and file type combinations using the Open with... command or Settings > Apps > Default apps
 
In some cases, Microsoft Notepad or other Win32 programs cannot be set as the default.

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803
Resolution: This issue is resolved in KB4467682

Back to top
OS Build 17134.320

September 26, 2018
KB4458469
Resolved
KB4467682
Resolved:
November 27, 2018
10:00 AM PT

Opened:
September 26, 2018
02:00 PM PT
Guest VMs running Unicast NLB fail to respond after restart
All guest virtual machines running Unicast NLB fail to respond to NLB requests after the virtual machines restart. 

Affected platforms:
  • Client: Windows 10, version 1803; Windows 10, version 1507
  • Server: Windows Server, version 1803
Resolution: This issue is resolved in KB4458469

Back to top
OS Build 17134.285

September 11, 2018
KB4457128
Resolved
KB4458469
Resolved:
September 20, 2018
10:00 AM PT

Opened:
September 11, 2018
10:00 AM PT
Guest VMs running Unicast NLB fail to respond after restart
All guest virtual machines running Unicast NLB fail to respond to NLB requests after the virtual machines restart. 

Affected platforms:
  • Client: Windows 10, version 1803; Windows 10, version 1507; Windows 10 Enterprise LTSB 2015
  • Server: Windows Server, version 1803
Resolution: This issue is resolved in KB4458469

Back to top
OS Build 17134.285

September 11, 2018
KB4457128
Resolved
KB4458469
Resolved:
September 26, 2018
10:00 AM PT

Opened:
September 11, 2018
10:00 AM PT
" diff --git a/windows/release-information/resolved-issues-windows-10-1809-and-windows-server-2019.yml b/windows/release-information/resolved-issues-windows-10-1809-and-windows-server-2019.yml index 34c6e7aaee..ff99855d88 100644 --- a/windows/release-information/resolved-issues-windows-10-1809-and-windows-server-2019.yml +++ b/windows/release-information/resolved-issues-windows-10-1809-and-windows-server-2019.yml @@ -35,6 +35,7 @@ sections:
End-user-defined characters (EUDC) may cause blue screen at startup
If you enable per font end-user-defined characters (EUDC), the system may stop working and a blue screen may appear at startup.

See details >OS Build 17763.404

April 02, 2019
KB4490481Resolved
KB4493509April 09, 2019
10:00 AM PT
Internet Explorer 11 authentication issue with multiple concurrent logons
Internet Explorer 11 users may encounter issues if two or more people use the same user account for multiple, concurrent login sessions on the same Windows Server machine.

See details >OS Build 17763.253

January 08, 2019
KB4480116Resolved
KB4493509April 09, 2019
10:00 AM PT
MSXML6 may cause applications to stop responding
MSXML6 may cause applications to stop responding if an exception was thrown during node operations, such as appendChild(), insertBefore(), and moveNode().

See details >OS Build 17763.253

January 08, 2019
KB4480116Resolved
KB4493509April 09, 2019
10:00 AM PT +
Embedded objects may display incorrectly
Any compound document (OLE) server application that places embedded objects into the Windows Metafile (WMF) using the PatBlt API may display embedded objects incorrectly.

See details >OS Build 17763.316

February 12, 2019
KB4487044Resolved
KB4493509April 09, 2019
10:00 AM PT
Apps may stop working after selecting an audio output device other than the default
Users with multiple audio devices that select an audio output device different from the \"Default Audio Device\" may find certain applications stop working unexpectedly.

See details >OS Build 17763.348

March 01, 2019
KB4482887Resolved
KB4490481April 02, 2019
10:00 AM PT
Error 1309 when installing/uninstalling MSI or MSP files
Users may receive \"Error 1309\" while installing or uninstalling certain types of MSI and MSP files.

See details >OS Build 17763.316

February 12, 2019
KB4487044Resolved
KB4489899March 12, 2019
10:00 AM PT
Global DNS outage affects Windows Update customers
Windows Update customers were recently affected by a network infrastructure event caused by an external DNS service provider's global outage.

See details >N/A

Resolved
March 08, 2019
11:15 AM PT @@ -53,7 +54,7 @@ sections:
Office apps (32-bit) unable to use 'Save As…' function
Upgrade block: Devices using Morphisec Protector (or other application that uses the Morphisec SDK) may be unable to save documents when using 32-bit Microsoft Office apps.

See details >OS Build 17763.134

November 13, 2018
KB4467708Resolved
December 06, 2018
12:00 PM PT
Users cannot set Win32 program defaults
Some users cannot set Win32 program defaults for certain app and file type combinations.

See details >OS Build 17763.55

October 09, 2018
KB4464330Resolved
KB4469342December 05, 2018
02:00 PM PT
Mapped drives fail to reconnect after login
Upgrade block: Mapped drives may fail to reconnect after booting and logging on to a Windows device.

See details >OS Build 17763.134

November 13, 2018
KB4467708Resolved
KB4469342December 05, 2018
02:00 PM PT -
Microsoft Edge may crash or hang while playing video
Following an nVidia driver update, Microsoft Edge may crash or hang while playing video.

See details >OS Build 17763.165

December 05, 2018
KB4469342Resolved
November 29, 2018
10:03 AM PT +
Microsoft Edge may crash or hang while playing video
Following an nVidia driver update, Microsoft Edge may crash or hang while playing video.

See details >OS Build 17763.134

November 13, 2018
KB4467708Resolved
December 05, 2018
10:00 AM PT " @@ -69,7 +70,7 @@ sections: - type: markdown text: " - +
DetailsOriginating updateStatusHistory
End-user-defined characters (EUDC) may cause blue screen at startup
If you enable per font end-user-defined characters (EUDC), the system will stop working and a blue screen may appear at startup. This is not a common setting in non-Asian regions.

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10, version 1607; Windows 10 Enterprise LTSC 2016
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016
Workaround: To avoid this issue, don't enable per font EUDC. As an alternative, you can edit the registry to mitigate this issue; for more information, see KB4496149.

Resolved: This issue was resolved in KB4493509.

Back to top
OS Build 17763.404

April 02, 2019
KB4490481
Resolved
KB4493509
Resolved:
April 09, 2019
10:00 AM PT

Opened:
April 02, 2019
10:00 AM PT
End-user-defined characters (EUDC) may cause blue screen at startup
If you enable per font end-user-defined characters (EUDC), the system will stop working and a blue screen may appear at startup. This is not a common setting in non-Asian regions.

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10, version 1607; Windows 10 Enterprise LTSC 2016
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016
Resolution: This issue was resolved in KB4493509.

Back to top
OS Build 17763.404

April 02, 2019
KB4490481
Resolved
KB4493509
Resolved:
April 09, 2019
10:00 AM PT

Opened:
April 02, 2019
10:00 AM PT
" @@ -78,7 +79,7 @@ sections: - type: markdown text: " - +
DetailsOriginating updateStatusHistory
Apps may stop working after selecting an audio output device other than the default
After installing KB4482887 on machines that have multiple audio devices, applications that provide advanced options for internal or external audio output devices may stop working unexpectedly. This issue occurs for users that select an audio output device different from the \"Default Audio Device\". Examples of applications that may stop working include: 
  • Windows Media Player 
  • Realtek HD Audio Manager 
  • Sound Blaster Control Panel 
Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019
  • Server: Windows Server, version 1809; Windows Server 2019
Workaround: As a temporary solution, select the \"Default Audio Device\" in the options provided by the application; please refer to the application's user manual for details. 
For example, to set the Default Audio Device in Windows Media Player: 
  1. Open Windows Media Player > Tools > Options > Devices.
  2. Select the device and choose Properties.
  3. On the next dialog, from the drop-down menu under Select the Audio Device, choose Default Audio Device from the list. 
You can then send audio from the application to the audio device you want in the per-application audio settings found under Settings > System > Sound > App Volume and device preferences.

Resolved: This issue was resolved in KB4490481

Back to top
OS Build 17763.348

March 01, 2019
KB4482887
Resolved
KB4490481
Resolved:
April 02, 2019
10:00 AM PT

Opened:
March 01, 2019
10:00 AM PT
Apps may stop working after selecting an audio output device other than the default
After installing KB4482887 on machines that have multiple audio devices, applications that provide advanced options for internal or external audio output devices may stop working unexpectedly. This issue occurs for users that select an audio output device different from the \"Default Audio Device\". Examples of applications that may stop working include: 
  • Windows Media Player 
  • Realtek HD Audio Manager 
  • Sound Blaster Control Panel 
Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019
  • Server: Windows Server, version 1809; Windows Server 2019
Resolution: This issue was resolved in KB4490481

Back to top
OS Build 17763.348

March 01, 2019
KB4482887
Resolved
KB4490481
Resolved:
April 02, 2019
10:00 AM PT

Opened:
March 01, 2019
10:00 AM PT
" @@ -87,9 +88,10 @@ sections: - type: markdown text: " + - +
DetailsOriginating updateStatusHistory
Embedded objects may display incorrectly
Any compound document (OLE) server application that places embedded objects into the Windows Metafile (WMF) using the PatBlt API may display embedded objects incorrectly. 
 
For example, if you paste a Microsoft Excel worksheet object into a Microsoft Word document, the cells may render with a different background color. 
 
Affected platforms:  
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10, version 1607; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 10 Enterprise LTSB 2015; Windows 8.1; Windows 7 SP1  
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2; Windows Server 2012; Windows Server 2008 R2 SP1; Windows Server 2008 SP2  
Resolution: This issue is resolved in KB4493509.  

Back to top
OS Build 17763.316

February 12, 2019
KB4487044
Resolved
KB4493509
Resolved:
April 09, 2019
10:00 AM PT

Opened:
February 12, 2019
10:00 AM PT
Error 1309 when installing/uninstalling MSI or MSP files
After installing KB4487044, users may receive \"Error 1309\" while installing or uninstalling certain types of MSI and MSP files. 

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10, version 1607; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 10 Enterprise LTSB 2015; Windows 8.1
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2; Windows Server 2012
Resolution: This issue is resolved in KB4489899

Back to top
OS Build 17763.316

February 12, 2019
KB4487044
Resolved
KB4489899
Resolved:
March 12, 2019
10:00 AM PT

Opened:
February 12, 2019
10:00 AM PT
Internet Explorer may fail to load images
After installing KB4487044, Internet Explorer may fail to load images with a backslash (\\) in their relative source path.

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10, version 1607; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 10 Enterprise LTSB 2015; Windows 8.1; Windows 7 SP1
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2; Windows Server 2008 R2 SP1
Resolution: This issue is resolved in KB4482887.

Back to top
OS Build 17763.316

February 12, 2019
KB4487044
Resolved
KB4482887
Resolved:
March 01, 2019
10:00 AM PT

Opened:
February 12, 2019
10:00 AM PT
Applications using Microsoft Jet database and Access 95 file format stop working
Applications that use a Microsoft Jet database with the Microsoft Access 95 file format may randomly stop working.

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 7, Service Pack 1
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2008 R2 SP1
Resolution: This issue is resolved in KB4482887.

Back to top
OS Build 17763.316

February 12, 2019
KB4487044
Resolved
KB4482887
Resolved:
March 01, 2019
10:00 AM PT

Opened:
February 12, 2019
10:00 AM PT
Applications using Microsoft Jet database and Access 95 file format stop working
Applications that use a Microsoft Jet database with the Microsoft Access 95 file format may randomly stop working.

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10, version 1607; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 10 Enterprise LTSB 2015; Windows 7 SP1
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2008 R2 SP1
Resolution: This issue is resolved in KB4482887.

Back to top
OS Build 17763.316

February 12, 2019
KB4487044
Resolved
KB4482887
Resolved:
March 01, 2019
10:00 AM PT

Opened:
February 12, 2019
10:00 AM PT
First character of the Japanese era name not recognized
After installing KB4487044, the first character of the Japanese era name is not recognized as an abbreviation and may cause date parsing issues. 

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10, version 1607; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 10 Enterprise LTSB 2015; Windows 8.1; Windows 7 SP1
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2; Windows Server 2012; Windows Server 2008 R2 SP1; Windows Server 2008 SP2
Resolution: This issue is resolved in KB4482887

Back to top
OS Build 17763.316

February 12, 2019
KB4487044
Resolved
KB4482887
Resolved:
March 01, 2019
10:00 AM PT

Opened:
February 12, 2019
10:00 AM PT
" @@ -99,7 +101,7 @@ sections: - type: markdown text: " - + @@ -107,15 +109,6 @@ sections:
DetailsOriginating updateStatusHistory
Internet Explorer 11 authentication issue with multiple concurrent logons
After installing the February 12, 2019 update (KB4487044), Internet Explorer 11 and other applications that use WININET.DLL may have authentication issues. This occurs when two or more people use the same user account for multiple, concurrent login sessions on the same Windows Server machine, including Remote Desktop Protocol (RDP) and Terminal Server logons. Symptoms reported by customers include, but may not be limited to:  
  • Cache size and location show zero or empty. 
  • Keyboard shortcuts may not work properly. 
  • Webpages may intermittently fail to load or render correctly. 
  • Issues with credential prompts. 
  • Issues when downloading files. 
Affected platforms: 
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1607; Windows 10 Enterprise LTSC 2016; Windows 8.1; Windows 7 SP1
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server 2016; Windows Server 2012 R2; Windows Server 2012; Windows Server 2008 R2 SP1
Resolved: This issue was resolved in KB4493509

Back to top
OS Build 17763.253

January 08, 2019
KB4480116
Resolved
KB4493509
Resolved:
April 09, 2019
10:00 AM PT

Opened:
January 08, 2019
10:00 AM PT
Internet Explorer 11 authentication issue with multiple concurrent logons
After installing KB4480116, Internet Explorer 11 and other applications that use WININET.DLL may have authentication issues. This occurs when two or more people use the same user account for multiple, concurrent login sessions on the same Windows Server machine, including Remote Desktop Protocol (RDP) and Terminal Server logons. Symptoms reported by customers include, but may not be limited to: 
 
  • Cache size and location show zero or empty. 
  • Keyboard shortcuts may not work properly. 
  • Webpages may intermittently fail to load or render correctly. 
  • Issues with credential prompts. 
  • Issues when downloading files. 
 
Resolved: This issue was resolved in KB4493509

Back to top
OS Build 17763.253

January 08, 2019
KB4480116
Resolved
KB4493509
Resolved:
April 09, 2019
10:00 AM PT

Opened:
January 08, 2019
10:00 AM PT
MSXML6 may cause applications to stop responding
After installing KB4480116, MSXML6 causes applications to stop responding if an exception was thrown during node operations, such as appendChild(), insertBefore(), and moveNode().
 
The Group Policy editor may stop responding when editing a Group Policy Object (GPO) that contains Group Policy Preferences (GPP) for Internet Explorer 10 settings. 

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10, version 1607; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 10 Enterprise LTSB 2015; Windows 8.1
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2; Windows Server 2012
Resolved: This issue was resolved in KB4493509

Back to top
OS Build 17763.253

January 08, 2019
KB4480116
Resolved
KB4493509
Resolved:
April 09, 2019
10:00 AM PT

Opened:
January 08, 2019
10:00 AM PT
Global DNS outage affects Windows Update customers
Windows Update customers were affected by a network infrastructure event on January 29, 2019 (21:00 UTC), caused by an external DNS service provider's global outage. A software update to the external provider's DNS servers resulted in the distribution of corrupted DNS records that affected connectivity to the Windows Update service. The DNS records were restored by January 30, 2019 (00:10 UTC), and the majority of local Internet Service Providers (ISP) have refreshed their DNS servers and customer services have been restored. 
 
Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019
  • Server: Windows Server, version 1809; Windows Server 2019
While this was not an issue with Microsoft's services, we take any service disruption for our customers seriously. We will work with partners to better understand this so we can provide higher quality service in the future even across diverse global network providers. 
 
If you are still unable to connect to Windows Update services due to this problem, please contact your local ISP or network administrator. You can also refer to our new KB4493784 for more information to determine if your network is affected, and to provide your local ISP or network administrator with additional information to assist you. 

Back to top
N/A

Resolved
Resolved:
March 08, 2019
11:15 AM PT

Opened:
January 29, 2019
02:00 PM PT
Webpages become unresponsive in Microsoft Edge
After installing KB4480116, some Microsoft Edge users report that they:
  • Cannot load webpages using a local IP address. 
  • Cannot load webpages on the Internet using a VPN connection.
Browsing fails or the webpage may become unresponsive.

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709
Resolution: This issue is resolved in KB4487044

Back to top
OS Build 17763.253

January 08, 2019
KB4480116
Resolved
KB4487044
Resolved:
February 12, 2019
10:00 AM PT

Opened:
January 08, 2019
10:00 AM PT
" -- title: December 2018 -- items: - - type: markdown - text: " - - -
DetailsOriginating updateStatusHistory
Microsoft Edge may crash or hang while playing video
nVidia has notified Microsoft of an issue where Microsoft Edge may crash or hang while playing video. This issue occurs following an nVidia driver update.

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019
  • Server: Windows Server, version 1809; Windows Server 2019
Resolution: nVidia has released an updated driver to address this issue. Please follow the instructions found in nVidia's support article

Back to top
OS Build 17763.165

December 05, 2018
KB4469342
Resolved
Resolved:
November 29, 2018
10:03 AM PT

Opened:
December 05, 2018
02:00 PM PT
- " - - title: November 2018 - items: - type: markdown @@ -129,6 +122,7 @@ sections:
Audio stops working after installing Intel audio driver
Upgrade block: Intel unintentionally released version 9.21.00.3755 of the Intel Smart Sound Technology (ISST) Driver through Windows Update and inadvertently offered it to a range of devices running Window 10, version 1709, 1803, and 1809. If a device contained a compatible audio driver, the new driver overrode it and caused audio to stop working.

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019
  • Server: Windows Server, version 1809; Windows Server 2019
Resolution: This issue was resolved in KB4468550 and the upgrade block removed. 

Back to topOS Build 17763.134

November 13, 2018
KB4467708Resolved
KB4468550Resolved:
December 07, 2018
10:00 AM PT

Opened:
November 13, 2018
10:00 AM PT
Office apps (32-bit) unable to use 'Save As…' function
Upgrade block: Microsoft and Morphisec have identified an issue on devices that have installed Morphisec Protector or another application that uses the Morphisec Software Development Kit (SDK) including Cisco AMP for Endpoints. These applications may impact customers' ability to use the 'Save As.'dialog when saving documents in 32-bit versions of Microsoft Office applications. Saving of files is not impacted.

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019
  • Server: Windows Server, version 1809; Windows Server 2019
Resolution: Morphisec and Cisco have released updated versions of their applications to address this issue. We recommend customers update to these minimum versions before attempting to attempting to upgrade to Windows 10, version 1809:
  • Morphisec Protector version 2.4.8 
  • Cisco AMP for Endpoints version 6.2.3.10814
An upgrade block remains in place for earlier versions of the applications than those listed above.

Back to topOS Build 17763.134

November 13, 2018
KB4467708Resolved
Resolved:
December 06, 2018
12:00 PM PT

Opened:
November 13, 2018
10:00 AM PT
Mapped drives fail to reconnect after login
Upgrade block: Network drives may fail to reconnect after booting and logging on to a Windows device. Symptoms include:  
  • In Windows Explorer, a red X appears on the mapped network drives. 
  • Mapped network drives show as Unavailable when you run the net use command from a command prompt. 
  • In the notification area, a notification displays the following message, \"Could not reconnect all network drives.\"
Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019
  • Server: Windows Server, version 1809; Windows Server 2019
Resolution: This issue was resolved in KB4469342 and the upgrade block removed. 

Back to topOS Build 17763.134

November 13, 2018
KB4467708Resolved
KB4469342Resolved:
December 05, 2018
02:00 PM PT

Opened:
November 13, 2018
10:00 AM PT +
Microsoft Edge may crash or hang while playing video
nVidia has notified Microsoft of an issue where Microsoft Edge may crash or hang while playing video. This issue occurs following an nVidia driver update.

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019
  • Server: Windows Server, version 1809; Windows Server 2019
Resolution: nVidia has released an updated driver to address this issue. Please follow the instructions found in nVidia's support article

Back to topOS Build 17763.134

November 13, 2018
KB4467708Resolved
Resolved:
December 05, 2018
10:00 AM PT

Opened:
November 13, 2018
10:00 AM PT " diff --git a/windows/release-information/resolved-issues-windows-7-and-windows-server-2008-r2-sp1.yml b/windows/release-information/resolved-issues-windows-7-and-windows-server-2008-r2-sp1.yml index b4f3b2e2e1..430a1a9900 100644 --- a/windows/release-information/resolved-issues-windows-7-and-windows-server-2008-r2-sp1.yml +++ b/windows/release-information/resolved-issues-windows-7-and-windows-server-2008-r2-sp1.yml @@ -32,17 +32,18 @@ sections: - type: markdown text: " - - - - - - - - - - - + + + + + + + + + + + +
SummaryOriginating updateStatusDate resolved
Virtual machines fail to restore.
Virtual machines (VMs) may fail to restore successfully if the VM has been saved and restored once before.

See details >
January 08, 2019
KB4480970
Resolved
KB4490511
April 21, 2019
12:00 AM PT
Local Administrators unable to remotely access shares.
Local users who are part of the local Administrators group may not be able to remotely access shares on Windows Server 2008 R2 and Windows 7 machines.

See details >
January 08, 2019
KB4480970
Resolved
KB4487345
April 20, 2019
11:53 PM PT
Internet Explorer 11 authentication issue with multiple concurrent logons.
Internet Explorer 11 users may encounter issues if two or more people use the same user account for multiple, concurrent login sessions on the same Windows Server machine.

See details >
January 08, 2019
KB4480970
Resolved
KB4493472
April 09, 2019
10:00 AM PT
Custom URI schemes may not start corresponding application.
Custom URI schemes for application protocol handlers may not start the corresponding application for local intranet and trusted sites in Internet Explorer.

See details >
March 12, 2019
KB4489878
Resolved
KB4493472
April 09, 2019
10:00 AM PT
NETDOM.EXE fails to run.
NETDOM.EXE fails to run and the error, “The command failed to complete successfully.” appears on screen.

See details >
March 12, 2019
KB4489878
Resolved
KB4493472
April 09, 2019
10:00 AM PT
Devices may not respond at login or Welcome screen if running certain Avast software.
Devices running Avast for Business, Avast CloudCare, and AVG Business Edition antivirus software may become unresponsive after restart.

See details >
April 09, 2019
KB4493472
Resolved
April 09, 2019
10:00 AM PT
Event Viewer may not show some event descriptions for network interface cards.
The Event Viewer may not show some event descriptions for network interface cards (NIC).

See details >
October 18, 2018
KB4462927
Resolved
KB4489878
March 12, 2019
10:00 AM PT
First character of the Japanese era name not recognized as an abbreviation.
The first character of the Japanese era name is not recognized as an abbreviation and may cause date parsing issues.

See details >
January 17, 2019
KB4480955
Resolved
KB4486565
February 19, 2019
02:00 PM PT
Internet Explorer may fail to load images.
Internet Explorer may fail to load images with a backslash (\\) in their relative source path.

See details >
February 12, 2019
KB4486563
Resolved
KB4486565
February 19, 2019
02:00 PM PT
Applications using Microsoft Jet database and Access 95 file format stop working.
Applications that use a Microsoft Jet database with the Microsoft Access 95 file format may randomly stop working.

See details >
February 12, 2019
KB4486563
Resolved
KB4486565
February 19, 2019
02:00 PM PT
Applications using Microsoft Jet database fail to open.
Applications that use a Microsoft Jet database with the Microsoft Access 97 file format may fail to open if column names are greater than 32 characters.

See details >
January 08, 2019
KB4480970
Resolved
KB4486563
February 12, 2019
10:00 AM PT
Internet Explorer 11 authentication issue with multiple concurrent logons
Internet Explorer 11 users may encounter issues if two or more people use the same user account for multiple, concurrent login sessions on the same Windows Server machine.

See details >
January 08, 2019
KB4480970
Resolved
KB4493472
April 09, 2019
10:00 AM PT
Custom URI schemes may not start corresponding application
Custom URI schemes for application protocol handlers may not start the corresponding application for local intranet and trusted sites in Internet Explorer.

See details >
March 12, 2019
KB4489878
Resolved
KB4493472
April 09, 2019
10:00 AM PT
NETDOM.EXE fails to run
NETDOM.EXE fails to run and the error, “The command failed to complete successfully.” appears on screen.

See details >
March 12, 2019
KB4489878
Resolved
KB4493472
April 09, 2019
10:00 AM PT
Devices may not respond at login or Welcome screen if running certain Avast software
Devices running Avast for Business, Avast CloudCare, and AVG Business Edition antivirus software may become unresponsive after restart.

See details >
April 09, 2019
KB4493472
Resolved
April 09, 2019
10:00 AM PT
Embedded objects may display incorrectly
Any compound document (OLE) server application that places embedded objects into the Windows Metafile (WMF) using the PatBlt API may display embedded objects incorrectly.

See details >
February 12, 2019
KB4486563
Resolved
KB4493472
April 09, 2019
10:00 AM PT
Event Viewer may not show some event descriptions for network interface cards
The Event Viewer may not show some event descriptions for network interface cards (NIC).

See details >
October 18, 2018
KB4462927
Resolved
KB4489878
March 12, 2019
10:00 AM PT
Virtual machines fail to restore
Virtual machines (VMs) may fail to restore successfully if the VM has been saved and restored once before.

See details >
January 08, 2019
KB4480970
Resolved
KB4490511
February 19, 2019
05:00 PM PT
First character of the Japanese era name not recognized as an abbreviation
The first character of the Japanese era name is not recognized as an abbreviation and may cause date parsing issues.

See details >
January 17, 2019
KB4480955
Resolved
KB4486565
February 19, 2019
02:00 PM PT
Internet Explorer may fail to load images
Internet Explorer may fail to load images with a backslash (\\) in their relative source path.

See details >
February 12, 2019
KB4486563
Resolved
KB4486565
February 19, 2019
02:00 PM PT
Applications using Microsoft Jet database and Access 95 file format stop working
Applications that use a Microsoft Jet database with the Microsoft Access 95 file format may randomly stop working.

See details >
February 12, 2019
KB4486563
Resolved
KB4486565
February 19, 2019
02:00 PM PT
Applications using Microsoft Jet database fail to open
Applications that use a Microsoft Jet database with the Microsoft Access 97 file format may fail to open if column names are greater than 32 characters.

See details >
January 08, 2019
KB4480970
Resolved
KB4486563
February 12, 2019
10:00 AM PT
Local Administrators unable to remotely access shares
Local users who are part of the local Administrators group may not be able to remotely access shares on Windows Server 2008 R2 and Windows 7 machines.

See details >
January 08, 2019
KB4480970
Resolved
KB4487345
January 11, 2019
02:00 PM PT
Unable to use Seek bar in Windows Media Player
Users may not be able to use the Seek bar in Windows Media Player when playing specific files.

See details >
October 09, 2018
KB4462923
Resolved
KB4471318
December 11, 2018
10:00 AM PT
" @@ -59,7 +60,7 @@ sections: - type: markdown text: " - +
DetailsOriginating updateStatusHistory
Devices may not respond at login or Welcome screen if running certain Avast software.
Microsoft and Avast have identified an issue on devices running Avast for Business, Avast CloudCare, and AVG Business Edition antivirus software after you install KB4493472 and restart. Devices may become unresponsive at the login or Welcome screen. Additionally, you may be unable to log in or log in after an extended period of time.

Affected platforms: 
  • Client: Windows 8.1; Windows 7 SP1 
  • Server: Windows Server 2012 R2; Windows Server 2008 R2 SP1 
Resolution: Avast has released emergency updates to address this issue. For more information and AV update schedule, see the Avast support KB article.

Back to top
April 09, 2019
KB4493472
Resolved
Resolved:
April 09, 2019
10:00 AM PT

Opened:
April 09, 2019
10:00 AM PT
Devices may not respond at login or Welcome screen if running certain Avast software
Microsoft and Avast have identified an issue on devices running Avast for Business, Avast CloudCare, and AVG Business Edition antivirus software after you install KB4493472 and restart. Devices may become unresponsive at the login or Welcome screen. Additionally, you may be unable to log in or log in after an extended period of time.

Affected platforms: 
  • Client: Windows 8.1; Windows 7 SP1 
  • Server: Windows Server 2012 R2; Windows Server 2008 R2 SP1 
Resolution: Avast has released emergency updates to address this issue. For more information and AV update schedule, see the Avast support KB article.

Back to top
April 09, 2019
KB4493472
Resolved
Resolved:
April 09, 2019
10:00 AM PT

Opened:
April 09, 2019
10:00 AM PT
" @@ -68,8 +69,8 @@ sections: - type: markdown text: " - - + +
DetailsOriginating updateStatusHistory
Custom URI schemes may not start corresponding application.
After installing KB4489878, custom URI schemes for application protocol handlers may not start the corresponding application for local intranet and trusted sites on Internet Explorer.

Affected platforms: 
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10, version 1607; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 10 Enterprise LTSB 2015; Windows 8.1; Windows 7 SP1 
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2; Windows Server 2008 R2 SP1 
Resolution: This issue is resolved in KB4493472.

Back to top
March 12, 2019
KB4489878
Resolved
KB4493472
Resolved:
April 09, 2019
10:00 AM PT

Opened:
March 12, 2019
10:00 AM PT
NETDOM.EXE fails to run.
After installing KB4489878, NETDOM.EXE fails to run, and the on-screen error, “The command failed to complete successfully.” appears.

Affected platforms: 
  • Client: Windows 7 SP1
  • Server: Windows Server 2008 R2 SP1; Windows Server 2008 SP2
Resolution: This issue is resolved in KB4493472.

Back to top
March 12, 2019
KB4489878
Resolved
KB4493472
Resolved:
April 09, 2019
10:00 AM PT

Opened:
March 12, 2019
10:00 AM PT
Custom URI schemes may not start corresponding application
After installing KB4489878, custom URI schemes for application protocol handlers may not start the corresponding application for local intranet and trusted sites on Internet Explorer.

Affected platforms: 
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10, version 1607; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 10 Enterprise LTSB 2015; Windows 8.1; Windows 7 SP1 
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2; Windows Server 2008 R2 SP1 
Resolution: This issue is resolved in KB4493472.

Back to top
March 12, 2019
KB4489878
Resolved
KB4493472
Resolved:
April 09, 2019
10:00 AM PT

Opened:
March 12, 2019
10:00 AM PT
NETDOM.EXE fails to run
After installing KB4489878, NETDOM.EXE fails to run, and the on-screen error, “The command failed to complete successfully.” appears.

Affected platforms: 
  • Client: Windows 7 SP1
  • Server: Windows Server 2008 R2 SP1; Windows Server 2008 SP2
Resolution: This issue is resolved in KB4493472.

Back to top
March 12, 2019
KB4489878
Resolved
KB4493472
Resolved:
April 09, 2019
10:00 AM PT

Opened:
March 12, 2019
10:00 AM PT
" @@ -78,8 +79,9 @@ sections: - type: markdown text: " - - + + +
DetailsOriginating updateStatusHistory
Internet Explorer may fail to load images.
After installing KB4486563, Internet Explorer may fail to load images with a backslash (\\) in their relative source path.

Affected platforms: 
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10, version 1607; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 10 Enterprise LTSB 2015; Windows 8.1; Windows 7 SP1 
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2; Windows Server 2008 R2 SP1 
Resolution: This issue is resolved in KB4486565.

Back to top
February 12, 2019
KB4486563
Resolved
KB4486565
Resolved:
February 19, 2019
02:00 PM PT

Opened:
February 12, 2019
10:00 AM PT
Applications using Microsoft Jet database and Access 95 file format stop working.
Applications that use a Microsoft Jet database with the Microsoft Access 95 file format may randomly stop working.

Affected platforms: 
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10, version 1607; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 10 Enterprise LTSB 2015; Windows 7, Service Pack 1 
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2008 R2 SP1 
Resolution: This issue is resolved in KB4486565.

Back to top
February 12, 2019
KB4486563
Resolved
KB4486565
Resolved:
February 19, 2019
02:00 PM PT

Opened:
February 12, 2019
10:00 AM PT
Embedded objects may display incorrectly
Any compound document (OLE) server application that places embedded objects into the Windows Metafile (WMF) using the PatBlt API may display embedded objects incorrectly. 
 
For example, if you paste a Microsoft Excel worksheet object into a Microsoft Word document, the cells may render with a different background color. 
 
Affected platforms:  
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10, version 1607; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 10 Enterprise LTSB 2015; Windows 8.1; Windows 7 SP1  
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2; Windows Server 2012; Windows Server 2008 R2 SP1; Windows Server 2008 SP2  
Resolution: This issue is resolved in KB4493472

Back to top
February 12, 2019
KB4486563
Resolved
KB4493472
Resolved:
April 09, 2019
10:00 AM PT

Opened:
February 12, 2019
10:00 AM PT
Internet Explorer may fail to load images
After installing KB4486563, Internet Explorer may fail to load images with a backslash (\\) in their relative source path.

Affected platforms: 
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10, version 1607; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 10 Enterprise LTSB 2015; Windows 8.1; Windows 7 SP1 
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2; Windows Server 2008 R2 SP1 
Resolution: This issue is resolved in KB4486565.

Back to top
February 12, 2019
KB4486563
Resolved
KB4486565
Resolved:
February 19, 2019
02:00 PM PT

Opened:
February 12, 2019
10:00 AM PT
Applications using Microsoft Jet database and Access 95 file format stop working
Applications that use a Microsoft Jet database with the Microsoft Access 95 file format may randomly stop working.

Affected platforms: 
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10, version 1607; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 10 Enterprise LTSB 2015; Windows 7 SP1 
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2008 R2 SP1 
Resolution: This issue is resolved in KB4486565.

Back to top
February 12, 2019
KB4486563
Resolved
KB4486565
Resolved:
February 19, 2019
02:00 PM PT

Opened:
February 12, 2019
10:00 AM PT
" @@ -88,11 +90,11 @@ sections: - type: markdown text: " - - - - - + + + + +
DetailsOriginating updateStatusHistory
Virtual machines fail to restore.
After installing KB4480970, virtual machines (VM) may fail to restore successfully if the VM has been saved and restored once before. The error message is, “Failed to restore the virtual machine state: Cannot restore this virtual machine because the saved state data cannot be read. Delete the saved state data and then try to start the virtual machine. (0xC0370027).”

This affects AMD Bulldozer Family 15h, AMD Jaguar Family 16h, and AMD Puma Family 16h (second generation) microarchitectures.

Affected platforms: 
  • Client: Windows 7 SP1 
  • Server: Windows Server 2012; Windows Server 2008 R2 SP1; Windows Server 2008 SP2
Resolution: This issue is resolved in KB4490511.

Back to top
January 08, 2019
KB4480970
Resolved
KB4490511
Resolved:
February 19, 2019
02:00 PM PT

Opened:
January 08, 2019
10:00 AM PT
Local Administrators unable to remotely access shares.
Local users who are part of the local Administrators group may not be able to remotely access shares on Windows Server 2008 R2 and Windows 7 machines after installing KB4480970. This does not affect domain accounts in the local Administrators group.
 
Affected platforms: 
  • Client: Windows 7 SP1 
  • Server: Windows Server 2008 R2 SP1; Windows Server 2008 SP2 
Resolution: This issue is resolved in KB4487345.

Back to top
January 08, 2019
KB4480970
Resolved
KB4487345
Resolved:
January 11, 2019
02:00 PM PT

Opened:
January 08, 2019
10:00 AM PT
Internet Explorer 11 authentication issue with multiple concurrent logons.
After installing KB4480970, Internet Explorer 11 and other applications that use WININET.DLL may have authentication issues. This occurs when two or more people use the same user account for multiple, concurrent login sessions on the same Windows Server machine, including Remote Desktop Protocol (RDP) and Terminal Server logons. Symptoms reported by customers include, but may not be limited to:
  • Cache size and location show zero or empty.
  • Keyboard shortcuts may not work properly.
  • Webpages may intermittently fail to load or render correctly.
  • Issues with credential prompts.
  • Issues when downloading files.
Affected platforms: 
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1607; Windows 10 Enterprise LTSC 2016; Windows 8.1; Windows 7 SP1
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server 2016; Windows Server 2012 R2; Windows Server 2012; Windows Server 2008 R2 SP1
Resolution: This issue is resolved in KB4493472.

Back to top
January 08, 2019
KB4480970
Resolved
KB4493472
Resolved:
April 09, 2019
10:00 AM PT

Opened:
January 08, 2019
10:00 AM PT
First character of the Japanese era name not recognized as an abbreviation.
After installing KB4480955, the first character of the Japanese era name is not recognized as an abbreviation and may cause date parsing issues.

Affected platforms: 
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10, version 1607; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 10 Enterprise LTSB 2015; Windows 8.1; Windows 7 SP1 
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2; Windows Server 2012; Windows Server 2008 R2 SP1; Windows Server 2008 SP2 
Resolution: This issue is resolved in KB4486565.

Back to top
January 17, 2019
KB4480955
Resolved
KB4486565
Resolved:
February 19, 2019
02:00 PM PT

Opened:
January 17, 2019
10:00 AM PT
Applications using Microsoft Jet database fail to open.
Applications that use a Microsoft Jet database with the Microsoft Access 97 file format may fail to open if the database has column names greater than 32 characters. The database will fail to open with the error, “Unrecognized Database Format”.

Affected Platforms:
  • Client: Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 8.1; Windows 7 SP1 
  • Server: Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2; Windows Server 2012; Windows Server 2008 R2 SP1; Windows Server 2008 SP2 

Resolution: This issue is resolved in KB4486563.

Back to top
January 08, 2019
KB4480970
Resolved
KB4486563
Resolved:
February 12, 2019
10:00 AM PT

Opened:
January 08, 2019
10:00 AM PT
Internet Explorer 11 authentication issue with multiple concurrent logons
After installing KB4480970, Internet Explorer 11 and other applications that use WININET.DLL may have authentication issues. This occurs when two or more people use the same user account for multiple, concurrent login sessions on the same Windows Server machine, including Remote Desktop Protocol (RDP) and Terminal Server logons. Symptoms reported by customers include, but may not be limited to:
  • Cache size and location show zero or empty.
  • Keyboard shortcuts may not work properly.
  • Webpages may intermittently fail to load or render correctly.
  • Issues with credential prompts.
  • Issues when downloading files.
Affected platforms: 
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1607; Windows 10 Enterprise LTSC 2016; Windows 8.1; Windows 7 SP1
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server 2016; Windows Server 2012 R2; Windows Server 2012; Windows Server 2008 R2 SP1
Resolution: This issue is resolved in KB4493472.

Back to top
January 08, 2019
KB4480970
Resolved
KB4493472
Resolved:
April 09, 2019
10:00 AM PT

Opened:
January 08, 2019
10:00 AM PT
Virtual machines fail to restore
After installing KB4480970, virtual machines (VM) may fail to restore successfully if the VM has been saved and restored once before. The error message is, “Failed to restore the virtual machine state: Cannot restore this virtual machine because the saved state data cannot be read. Delete the saved state data and then try to start the virtual machine. (0xC0370027).”

This affects AMD Bulldozer Family 15h, AMD Jaguar Family 16h, and AMD Puma Family 16h (second generation) microarchitectures.

Affected platforms: 
  • Client: Windows 7 SP1 
  • Server: Windows Server 2012; Windows Server 2008 R2 SP1; Windows Server 2008 SP2
Resolution: This issue is resolved in KB4490511.

Back to top
January 08, 2019
KB4480970
Resolved
KB4490511
Resolved:
February 19, 2019
02:00 PM PT

Opened:
January 08, 2019
10:00 AM PT
First character of the Japanese era name not recognized as an abbreviation
After installing KB4480955, the first character of the Japanese era name is not recognized as an abbreviation and may cause date parsing issues.

Affected platforms: 
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10, version 1607; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 10 Enterprise LTSB 2015; Windows 8.1; Windows 7 SP1 
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2; Windows Server 2012; Windows Server 2008 R2 SP1; Windows Server 2008 SP2 
Resolution: This issue is resolved in KB4486565.

Back to top
January 17, 2019
KB4480955
Resolved
KB4486565
Resolved:
February 19, 2019
02:00 PM PT

Opened:
January 17, 2019
10:00 AM PT
Applications using Microsoft Jet database fail to open
Applications that use a Microsoft Jet database with the Microsoft Access 97 file format may fail to open if the database has column names greater than 32 characters. The database will fail to open with the error, “Unrecognized Database Format”.

Affected Platforms:
  • Client: Windows 10, version 1709; Windows 10, version 1703; Windows 10, version 1607; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 10 Enterprise LTSB 2015; Windows 8.1; Windows 7 SP1 
  • Server: Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2; Windows Server 2012; Windows Server 2008 R2 SP1; Windows Server 2008 SP2 

Resolution: This issue is resolved in KB4486563.

Back to top
January 08, 2019
KB4480970
Resolved
KB4486563
Resolved:
February 12, 2019
10:00 AM PT

Opened:
January 08, 2019
10:00 AM PT
Local Administrators unable to remotely access shares
Local users who are part of the local Administrators group may not be able to remotely access shares on Windows Server 2008 R2 and Windows 7 machines after installing KB4480970. This does not affect domain accounts in the local Administrators group.
 
Affected platforms: 
  • Client: Windows 7 SP1 
  • Server: Windows Server 2008 R2 SP1; Windows Server 2008 SP2 
Resolution: This issue is resolved in KB4487345.

Back to top
January 08, 2019
KB4480970
Resolved
KB4487345
Resolved:
January 11, 2019
02:00 PM PT

Opened:
January 08, 2019
10:00 AM PT
" @@ -101,7 +103,7 @@ sections: - type: markdown text: " - +
DetailsOriginating updateStatusHistory
Event Viewer may not show some event descriptions for network interface cards.
After installing KB4462927, the Event Viewer may not show some event descriptions for network interface cards (NICs).

Affected Platforms:
  • Client: Windows 7 SP1 
  • Server: Windows Server 2012; Windows Server 2008 R2 SP1
Resolution: This issue is resolved in KB4489878.

Back to top
October 18, 2018
KB4462927
Resolved
KB4489878
Resolved:
March 12, 2019
10:00 AM PT

Opened:
October 18, 2018
10:00 AM PT
Event Viewer may not show some event descriptions for network interface cards
After installing KB4462927, the Event Viewer may not show some event descriptions for network interface cards (NICs).

Affected Platforms:
  • Client: Windows 7 SP1 
  • Server: Windows Server 2012; Windows Server 2008 R2 SP1
Resolution: This issue is resolved in KB4489878.

Back to top
October 18, 2018
KB4462927
Resolved
KB4489878
Resolved:
March 12, 2019
10:00 AM PT

Opened:
October 18, 2018
10:00 AM PT
Unable to use Seek bar in Windows Media Player
After installing KB4462923, users may not be able to use the Seek Bar in Windows Media Player when playing specific files. This issue does not affect normal playback.

Affected platforms: 
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10, version 1607; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 10 Enterprise LTSB 2015; Windows 8.1; Windows 7 SP1
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2; Windows Server 2012; Windows Server 2008 R2 SP1; Windows Server 2008 SP2
Resolution: This issue is resolved in KB4471318.

Back to top
October 09, 2018
KB4462923
Resolved
KB4471318
Resolved:
December 11, 2018
10:00 AM PT

Opened:
October 09, 2018
10:00 AM PT
" diff --git a/windows/release-information/resolved-issues-windows-8.1-and-windows-server-2012-r2.yml b/windows/release-information/resolved-issues-windows-8.1-and-windows-server-2012-r2.yml index 1304589ed6..fbcf474ae5 100644 --- a/windows/release-information/resolved-issues-windows-8.1-and-windows-server-2012-r2.yml +++ b/windows/release-information/resolved-issues-windows-8.1-and-windows-server-2012-r2.yml @@ -94,7 +94,7 @@ sections:
MSXML6 may cause applications to stop responding.
After installing KB4480963, MSXML6 causes applications to stop responding if an exception was thrown during node operations, such as appendChild(), insertBefore(), and moveNode().

The Group Policy editor may stop responding when editing a Group Policy Object (GPO) that contains Group Policy Preferences (GPP) for Internet Explorer 10 settings.

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10, version 1607; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 10 Enterprise LTSB 2015; Windows 8.1
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2; Windows Server 2012
Resolution: This issue is resolved in KB4493446.

Back to topJanuary 08, 2019
KB4480963Resolved
KB4493446Resolved:
April 09, 2019
10:00 AM PT

Opened:
January 08, 2019
10:00 AM PT
First character of the Japanese era name not recognized as an abbreviation
After installing KB4480969, the first character of the Japanese era name is not recognized as an abbreviation and may cause date parsing issues.

Affected platforms: 
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10, version 1607; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 10 Enterprise LTSB 2015; Windows 8.1; Windows 7 SP1 
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2; Windows Server 2012; Windows Server 2008 R2 SP1; Windows Server 2008 SP2 
Resolution: This issue is resolved in KB4487016.

Back to topJanuary 15, 2019
KB4480969Resolved
KB4487016Resolved:
February 19, 2019
02:00 PM PT

Opened:
January 15, 2019
10:00 AM PT
Virtual machines fail to restore
After installing KB4480963, virtual machines (VM) may fail to restore successfully if the VM has been saved and restored once before. The error message is, “Failed to restore the virtual machine state: Cannot restore this virtual machine because the saved state data cannot be read. Delete the saved state data and then try to start the virtual machine. (0xC0370027).”

This affects AMD Bulldozer Family 15h, AMD Jaguar Family 16h, and AMD Puma Family 16h (second generation) microarchitectures.

Affected platforms: 
  • Client: Windows 7 SP1 
  • Server: Windows Server 2012; Windows Server 2008 R2 SP1; Windows Server 2008 SP2
Resolution: This issue is resolved in KB4490512.

Back to topJanuary 08, 2019
KB4480963Resolved
KB4490512Resolved:
February 19, 2019
02:00 PM PT

Opened:
January 08, 2019
10:00 AM PT -
Applications using Microsoft Jet database fail to open
Applications that use a Microsoft Jet database with the Microsoft Access 97 file format may fail to open if the database has column names greater than 32 characters. The database will fail to open with the error, “Unrecognized Database Format”.

Affected platforms: 
  • Client: Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 8.1; Windows 7 SP1 
  • Server: Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2; Windows Server 2012; Windows Server 2008 R2 SP1; Windows Server 2008 SP2 
Resolution: This issue is resolved in KB4487000.

Back to topJanuary 08, 2019
KB4480963Resolved
KB4487000Resolved:
February 12, 2019
10:00 AM PT

Opened:
January 08, 2019
10:00 AM PT +
Applications using Microsoft Jet database fail to open
Applications that use a Microsoft Jet database with the Microsoft Access 97 file format may fail to open if the database has column names greater than 32 characters. The database will fail to open with the error, “Unrecognized Database Format”.

Affected platforms: 
  • Client: Windows 10, version 1709; Windows 10, version 1703; Windows 10, version 1607; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 10 Enterprise LTSB 2015; Windows 8.1; Windows 7 SP1 
  • Server: Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2; Windows Server 2012; Windows Server 2008 R2 SP1; Windows Server 2008 SP2 
Resolution: This issue is resolved in KB4487000.

Back to topJanuary 08, 2019
KB4480963Resolved
KB4487000Resolved:
February 12, 2019
10:00 AM PT

Opened:
January 08, 2019
10:00 AM PT
Unable to access hotspots with third-party applications
After installing KB4480963, third-party applications may have difficulty authenticating hotspots.

Affected platforms: 
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10, version 1607; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 10 Enterprise LTSB 2015; Windows 8.1 
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2; Windows Server 2012
Resolution: This issue is resolved in KB4480969.

Back to topJanuary 08, 2019
KB4480963Resolved
KB4480969Resolved:
January 15, 2019
10:00 AM PT

Opened:
January 08, 2019
10:00 AM PT " diff --git a/windows/release-information/resolved-issues-windows-server-2008-sp2.yml b/windows/release-information/resolved-issues-windows-server-2008-sp2.yml index 04d9dd54bf..8fa6c33769 100644 --- a/windows/release-information/resolved-issues-windows-server-2008-sp2.yml +++ b/windows/release-information/resolved-issues-windows-server-2008-sp2.yml @@ -65,7 +65,7 @@ sections: text: " - +
DetailsOriginating updateStatusHistory
Embedded objects may display incorrectly
Any compound document (OLE) server application that places embedded objects into the Windows Metafile (WMF) using the PatBlt API may display embedded objects incorrectly.

For example, if you paste a Microsoft Excel worksheet object into a Microsoft Word document, the cells may render with a different background color.

Affected platforms: 
  • Client: Windows 8.1 
  • Server: Windows Server 2012 R2; Windows Server 2012; Windows Server 2008 SP2
Resolution: This issue is resolved in KB4493471.

Back to top
February 12, 2019
KB4487023
Resolved
KB4493471
Resolved:
April 09, 2019
10:00 AM PT

Opened:
February 12, 2019
10:00 AM PT
Applications using Microsoft Jet database and Access 95 file format stop working
Applications that use a Microsoft Jet database with the Microsoft Access 95 file format may randomly stop working.

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 7 SP1
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012; Windows Server 2008 R2 SP1; Windows Server 2008 SP2
Resolution: This issue is resolved in KB4487022.

Back to top
February 12, 2019
KB4487023
Resolved
KB4487022
Resolved:
February 19, 2019
02:00 PM PT

Opened:
February 12, 2019
10:00 AM PT
Applications using Microsoft Jet database and Access 95 file format stop working
Applications that use a Microsoft Jet database with the Microsoft Access 95 file format may randomly stop working.

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10, version 1607; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 10 Enterprise LTSB 2015; Windows 7 SP1
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012; Windows Server 2008 R2 SP1; Windows Server 2008 SP2
Resolution: This issue is resolved in KB4487022.

Back to top
February 12, 2019
KB4487023
Resolved
KB4487022
Resolved:
February 19, 2019
02:00 PM PT

Opened:
February 12, 2019
10:00 AM PT
" @@ -76,7 +76,7 @@ sections: - +
DetailsOriginating updateStatusHistory
First character of the Japanese era name not recognized as an abbreviation
After installing KB4480974, the first character of the Japanese era name is not recognized as an abbreviation and may cause date parsing issues.

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10, version 1607; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 10 Enterprise LTSB 2015; Windows 8.1; Windows 7 SP1
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2; Windows Server 2012; Windows Server 2008 R2 SP1; Windows Server 2008 SP2
Resolution: This issue is resolved in KB4489880.

Back to top
January 17, 2019
KB4480974
Resolved
KB4489880
Resolved:
March 12, 2019
10:00 AM PT

Opened:
January 17, 2019
10:00 AM PT
Virtual machines fail to restore
After installing KB4480968, virtual machines (VM) may fail to restore successfully if the VM has been saved and restored once before. The error message is, “Failed to restore the virtual machine state: Cannot restore this virtual machine because the saved state data cannot be read. Delete the saved state data and then try to start the virtual machine. (0xC0370027).”

This affects AMD Bulldozer Family 15h, AMD Jaguar Family 16h, and AMD Puma Family 16h (second generation) microarchitectures.

Affected platforms: 
  • Client: Windows 7 SP1 
  • Server: Windows Server 2012; Windows Server 2008 R2 SP1; Windows Server 2008 SP2
Resolution: This issue is resolved in KB4490514.

Back to top
January 08, 2019
KB4480968
Resolved
KB4490514
Resolved:
February 19, 2019
02:00 PM PT

Opened:
January 08, 2019
10:00 AM PT
Applications using Microsoft Jet database fail to open
Applications that use a Microsoft Jet database with the Microsoft Access 97 file format may fail to open if the database has column names greater than 32 characters. The database will fail to open with the error, “Unrecognized Database Format”.

Affected platforms: 
  • Client: Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 8.1; Windows 7 SP1 
  • Server: Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2; Windows Server 2012; Windows Server 2008 R2 SP1; Windows Server 2008 SP2
Resolution: This issue is resolved in KB4487023.

Back to top
January 08, 2019
KB4480968
Resolved
KB4487023
Resolved:
February 12, 2019
10:00 AM PT

Opened:
January 08, 2019
10:00 AM PT
Applications using Microsoft Jet database fail to open
Applications that use a Microsoft Jet database with the Microsoft Access 97 file format may fail to open if the database has column names greater than 32 characters. The database will fail to open with the error, “Unrecognized Database Format”.

Affected platforms: 
  • Client: Windows 10, version 1709; Windows 10, version 1703; Windows 10, version 1607; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 10 Enterprise LTSB 2015; Windows 8.1; Windows 7 SP1 
  • Server: Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2; Windows Server 2012; Windows Server 2008 R2 SP1; Windows Server 2008 SP2
Resolution: This issue is resolved in KB4487023.

Back to top
January 08, 2019
KB4480968
Resolved
KB4487023
Resolved:
February 12, 2019
10:00 AM PT

Opened:
January 08, 2019
10:00 AM PT
Local Administrators unable to remotely access shares
Local users who are part of the local Administrators group may not be able to remotely access shares on Windows Server 2008 R2 and Windows 7 machines after installing KB4480968. This does not affect domain accounts in the local Administrators group.

Affected platforms: 
  • Client: Windows 7 SP1 
  • Server: Windows Server 2008 R2 SP1; Windows Server 2008 SP2
Resolution: This issue is resolved in KB4487354.

Back to top
January 08, 2019
KB4480968
Resolved
KB4487354
Resolved:
January 11, 2019
02:00 PM PT

Opened:
January 08, 2019
10:00 AM PT
" @@ -86,6 +86,6 @@ sections: - type: markdown text: " - +
DetailsOriginating updateStatusHistory
Unable to use Seek bar in Windows Media Player
After installing KB4463097, users may not be able to use the Seek Bar in Windows Media Player when playing specific files. This issue does not affect normal playback.

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10, version 1607; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 10 Enterprise LTSB 2015; Windows 8.1; Windows 7 SP1
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2; Windows Server 2012; Windows Server 2008 R2 SP1; Windows Server 2008 SP2
Resolution: This issue is resolved in KB4471325.

Back to top
October 09, 2018
KB4463097
Resolved
KB4471325
Resolved:
December 11, 2018
10:00 AM PT

Opened:
October 09, 2018
10:00 AM PT
Unable to use Seek bar in Windows Media Player
After installing KB4463097, users may not be able to use the Seek Bar in Windows Media Player when playing specific files. This issue does not affect normal playback.

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10, version 1607; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 10 Enterprise LTSB 2015; Windows 8.1; Windows 7 SP1
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2; Windows Server 2012; Windows Server 2008 R2 SP1; Windows Server 2008 SP2
Resolution: This issue is resolved in KB4471325.

Back to top
October 09, 2018
KB4463097
Resolved
KB4471325
Resolved:
December 11, 2018
10:00 AM PT

Opened:
October 09, 2018
10:00 AM PT
" diff --git a/windows/release-information/resolved-issues-windows-server-2012.yml b/windows/release-information/resolved-issues-windows-server-2012.yml index 27b009d318..87e6e8ea5b 100644 --- a/windows/release-information/resolved-issues-windows-server-2012.yml +++ b/windows/release-information/resolved-issues-windows-server-2012.yml @@ -58,7 +58,7 @@ sections: - type: markdown text: " - +
DetailsOriginating updateStatusHistory
Embedded objects may display incorrectly
Any compound document (OLE) server application that places embedded objects into the Windows Metafile (WMF) using the PatBlt API may display embedded objects incorrectly.

For example, if you paste a Microsoft Excel worksheet object into a Microsoft Word document, the cells may render with a different background color.

Affected platforms: 
  • Client: Windows 8.1 
  • Server: Windows Server 2012 R2; Windows Server 2012; Windows Server 2008 SP2
Resolution: This issue is resolved in KB4493451.

Back to top
February 12, 2019
KB4487025
Resolved
KB4493451
Resolved:
April 09, 2019
10:00 AM PT

Opened:
February 12, 2019
10:00 AM PT
Embedded objects may display incorrectly
Any compound document (OLE) server application that places embedded objects into the Windows Metafile (WMF) using the PatBlt API may display embedded objects incorrectly.

For example, if you paste a Microsoft Excel worksheet object into a Microsoft Word document, the cells may render with a different background color.

Affected platforms: 
  • Client:  Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 8.1 
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server 2012 R2; Windows Server 2012; Windows Server 2008 SP2
Resolution: This issue is resolved in KB4493451.

Back to top
February 12, 2019
KB4487025
Resolved
KB4493451
Resolved:
April 09, 2019
10:00 AM PT

Opened:
February 12, 2019
10:00 AM PT
Error 1309 when installing/uninstalling MSI or MSP files
After installing KB4487025, users may receive \"Error 1309\" while installing or uninstalling certain types of MSI and MSP files.

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10, version 1607; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 10 Enterprise LTSB 2015; Windows 8.1
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2; Windows Server 2012
Resolution: This issue is resolved in KB4489891.

Back to top
February 12, 2019
KB4487025
Resolved
KB4489891
Resolved:
March 12, 2019
10:00 AM PT

Opened:
February 12, 2019
10:00 AM PT
Applications using Microsoft Jet database and Access 95 file format stop working
Applications that use a Microsoft Jet database with the Microsoft Access 95 file format may randomly stop working.

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 7 SP1
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012; Windows Server 2008 R2 SP1; Windows Server 2008 SP2
Resolution: This issue is resolved in KB4487024.

Back to top
February 12, 2019
KB4487025
Resolved
KB4487024
Resolved:
February 19, 2019
02:00 PM PT

Opened:
February 12, 2019
10:00 AM PT
@@ -73,7 +73,7 @@ sections:
MSXML6 may cause applications to stop responding
After installing KB4480975, MSXML6 causes applications to stop responding if an exception was thrown during node operations, such as appendChild(), insertBefore(), and moveNode().

The Group Policy editor may stop responding when editing a Group Policy Object (GPO) that contains Group Policy Preferences (GPP) for Internet Explorer 10 settings.

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10, version 1607; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 10 Enterprise LTSB 2015; Windows 8.1
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2; Windows Server 2012
Resolution: This issue is resolved in KB4493451.

Back to topJanuary 08, 2019
KB4480975Resolved
KB4493451Resolved:
April 09, 2019
10:00 AM PT

Opened:
January 08, 2019
10:00 AM PT
Virtual machines fail to restore
After installing KB4480975, virtual machines (VM) may fail to restore successfully if the VM has been saved and restored once before. The error message is, \"Failed to restore the virtual machine state: Cannot restore this virtual machine because the saved state data cannot be read. Delete the saved state data and then try to start the virtual machine. (0xC0370027).\"

This affects AMD Bulldozer Family 15h, AMD Jaguar Family 16h, and AMD Puma Family 16h (second generation) microarchitectures.

Affected platforms: 
  • Client: Windows 7 SP1 
  • Server: Windows Server 2012; Windows Server 2008 R2 SP1; Windows Server 2008 SP2
Resolution: This issue is resolved in KB4490516.

Back to topJanuary 08, 2019
KB4480975Resolved
KB4490516Resolved:
February 19, 2019
02:00 PM PT

Opened:
January 08, 2019
10:00 AM PT
First character of the Japanese era name not recognized as an abbreviation
After installing KB4480971, the first character of the Japanese era name is not recognized as an abbreviation and may cause date parsing issues.

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10, version 1607; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 10 Enterprise LTSB 2015; Windows 8.1; Windows 7 SP1
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2; Windows Server 2012; Windows Server 2008 R2 SP1; Windows Server 2008 SP2
Resolution: This issue is resolved in KB4487024.

Back to topJanuary 15, 2019
KB4480971Resolved
KB4487024Resolved:
February 19, 2019
02:00 PM PT

Opened:
January 15, 2019
10:00 AM PT -
Applications using Microsoft Jet database fail to open
Applications that use a Microsoft Jet database with the Microsoft Access 97 file format may fail to open if the database has column names greater than 32 characters. The database will fail to open with the error, \"Unrecognized Database Format\".

Affected platforms: 
  • Client: Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 8.1; Windows 7 SP1 
  • Server: Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2; Windows Server 2012; Windows Server 2008 R2 SP1; Windows Server 2008 SP2
Resolution: This issue is resolved in KB4487025.

Back to topJanuary 08, 2019
KB4480975Resolved
KB4487025Resolved:
February 12, 2019
10:00 AM PT

Opened:
January 08, 2019
10:00 AM PT +
Applications using Microsoft Jet database fail to open
Applications that use a Microsoft Jet database with the Microsoft Access 97 file format may fail to open if the database has column names greater than 32 characters. The database will fail to open with the error, \"Unrecognized Database Format\".

Affected platforms: 
  • Client: Windows 10, version 1709; Windows 10, version 1703; Windows 10, version 1607; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 10 Enterprise LTSB 2015; Windows 8.1; Windows 7 SP1 
  • Server: Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2; Windows Server 2012; Windows Server 2008 R2 SP1; Windows Server 2008 SP2
Resolution: This issue is resolved in KB4487025.

Back to topJanuary 08, 2019
KB4480975Resolved
KB4487025Resolved:
February 12, 2019
10:00 AM PT

Opened:
January 08, 2019
10:00 AM PT
Unable to access hotspots with third-party applications
After installing KB4480975, third-party applications may have difficulty authenticating hotspots.

Affected platforms: 
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10, version 1607; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 10 Enterprise LTSB 2015; Windows 8.1 
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2; Windows Server 2012
Resolution: This issue is resolved in KB4480971.

Back to topJanuary 08, 2019
KB4480975Resolved
KB4480971Resolved:
January 15, 2019
10:00 AM PT

Opened:
January 08, 2019
10:00 AM PT " diff --git a/windows/release-information/status-windows-10-1507.yml b/windows/release-information/status-windows-10-1507.yml index 0be6a687b8..d590791a84 100644 --- a/windows/release-information/status-windows-10-1507.yml +++ b/windows/release-information/status-windows-10-1507.yml @@ -47,7 +47,7 @@ sections: - items: - type: markdown text: " - + " - items: - type: markdown @@ -60,7 +60,8 @@ sections: - type: markdown text: "
This table offers a summary of current active issues and those issues that have been resolved in the last 30 days.
- + +
SummaryOriginating updateStatusLast updated
Certain operations performed on a Cluster Shared Volume may fail
Certain operations, such as rename, performed on files or folders on a Cluster Shared Volume (CSV) may fail with the error, \"STATUS_BAD_IMPERSONATION_LEVEL (0xC00000A5)\".

See details >
OS Build 10240.18186

April 09, 2019
KB4493475
Mitigated
April 26, 2019
10:47 AM PT
Certain operations performed on a Cluster Shared Volume may fail
Certain operations, such as rename, performed on files or folders on a Cluster Shared Volume (CSV) may fail with the error, \"STATUS_BAD_IMPERSONATION_LEVEL (0xC00000A5)\".

See details >
OS Build 10240.18186

April 09, 2019
KB4493475
Mitigated
April 09, 2019
10:00 AM PT
Embedded objects may display incorrectly
Any compound document (OLE) server application that places embedded objects into the Windows Metafile (WMF) using the PatBlt API may display embedded objects incorrectly.

See details >
OS Build 10240.18132

February 12, 2019
KB4487018
Resolved
KB4493475
April 29, 2019
12:45 AM PT
MSXML6 may cause applications to stop responding
MSXML6 may cause applications to stop responding if an exception was thrown during node operations, such as appendChild(), insertBefore(), and moveNode().

See details >
OS Build 10240.18094

January 08, 2019
KB4480962
Resolved
KB4493475
April 09, 2019
10:00 AM PT
Custom URI schemes may not start corresponding application
Custom URI schemes for application protocol handlers may not start the corresponding application for local intranet and trusted sites in Internet Explorer.

See details >
OS Build 10240.18158

March 12, 2019
KB4489872
Resolved
KB4493475
April 09, 2019
10:00 AM PT
@@ -78,7 +79,8 @@ sections: - type: markdown text: " - + +
DetailsOriginating updateStatusHistory
Certain operations performed on a Cluster Shared Volume may fail
Certain operations, such as rename, that you perform on files or folders that are on a Cluster Shared Volume (CSV) may fail with the error, \"STATUS_BAD_IMPERSONATION_LEVEL (0xC00000A5)\". This occurs when you perform the operation on a CSV owner node from a process that doesn’t have administrator privilege.

Affected platforms: 
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10, version 1607; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 10 Enterprise LTSB 2015; Windows 8.1
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2; Windows Server 2012
Workaround: Do one of the following: 
  • Perform the operation from a process that has administrator privilege. 
  • Perform the operation from a node that doesn’t have CSV ownership. 
Next steps: Microsoft is working on a resolution and will provide an update in an upcoming release.

Back to top
OS Build 10240.18186

April 09, 2019
KB4493475
Mitigated
Last updated:
April 26, 2019
10:47 AM PT

Opened:
April 26, 2019
10:47 AM PT
Certain operations performed on a Cluster Shared Volume may fail
Certain operations, such as rename, that you perform on files or folders that are on a Cluster Shared Volume (CSV) may fail with the error, \"STATUS_BAD_IMPERSONATION_LEVEL (0xC00000A5)\". This occurs when you perform the operation on a CSV owner node from a process that doesn’t have administrator privilege.

Affected platforms: 
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10, version 1607; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 10 Enterprise LTSB 2015; Windows 8.1
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2; Windows Server 2012
Workaround: Do one of the following: 
  • Perform the operation from a process that has administrator privilege. 
  • Perform the operation from a node that doesn’t have CSV ownership. 
Next steps: Microsoft is working on a resolution and will provide an update in an upcoming release.

Back to top
OS Build 10240.18186

April 09, 2019
KB4493475
Mitigated
Last updated:
April 09, 2019
10:00 AM PT

Opened:
April 09, 2019
10:00 AM PT
Embedded objects may display incorrectly
Any compound document (OLE) server application that places embedded objects into the Windows Metafile (WMF) using the PatBlt API may display embedded objects incorrectly. 
 
For example, if you paste a Microsoft Excel worksheet object into a Microsoft Word document, the cells may render with a different background color. 
 
Affected platforms:  
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10, version 1607; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 10 Enterprise LTSB 2015; Windows 8.1; Windows 7 SP1 
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2; Windows Server 2012; Windows Server 2008 R2 SP1; Windows Server 2008 SP2 
Resolution: This issue is resolved in KB4493475

Back to top
OS Build 10240.18132

February 12, 2019
KB4487018
Resolved
KB4493475
Resolved:
April 09, 2019
10:00 AM PT

Opened:
April 29, 2019
12:45 AM PT
" @@ -96,6 +98,6 @@ sections: - type: markdown text: " - +
DetailsOriginating updateStatusHistory
MSXML6 may cause applications to stop responding
After installing KB4480962, MSXML6 causes applications to stop responding if an exception was thrown during node operations, such as appendChild(), insertBefore(), and moveNode().

The Group Policy editor may stop responding when editing a Group Policy Object (GPO) that contains Group Policy Preferences (GPP) for Internet Explorer 10 settings.

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10, version 1607; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 10 Enterprise LTSB 2015; Windows 8.1
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2; Windows Server 2012
Resolution: This issue was resolved in KB4493475.

Back to top
OS Build 10240.18094

January 08, 2019
KB4480962
Resolved
KB4493475
Resolved:
April 09, 2019
10:00 AM PT

Opened:
January 08, 2019
10:00 AM PT
MSXML6 may cause applications to stop responding
After installing KB4480962, MSXML6 causes applications to stop responding if an exception was thrown during node operations, such as appendChild(), insertBefore(), and moveNode().

The Group Policy editor may stop responding when editing a Group Policy Object (GPO) that contains Group Policy Preferences (GPP) for Internet Explorer 10 settings.

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10, version 1607; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 10 Enterprise LTSB 2015; Windows 8.1
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2; Windows Server 2012
Resolution: This issue was resolved in KB4493475.

Back to top
OS Build 10240.18094

January 08, 2019
KB4480962
Resolved
KB4493475
Resolved:
April 09, 2019
10:00 AM PT

Opened:
January 08, 2019
10:00 AM PT
" diff --git a/windows/release-information/status-windows-10-1607-and-windows-server-2016.yml b/windows/release-information/status-windows-10-1607-and-windows-server-2016.yml index caf7922b53..99fe06b9ad 100644 --- a/windows/release-information/status-windows-10-1607-and-windows-server-2016.yml +++ b/windows/release-information/status-windows-10-1607-and-windows-server-2016.yml @@ -47,7 +47,7 @@ sections: - items: - type: markdown text: " - + " - items: - type: markdown @@ -60,12 +60,14 @@ sections: - type: markdown text: "
This table offers a summary of current active issues and those issues that have been resolved in the last 30 days.
- + - + + + @@ -84,7 +86,9 @@ sections: - type: markdown text: "
SummaryOriginating updateStatusLast updated
Certain operations performed on a Cluster Shared Volume may fail
Certain operations, such as rename, performed on files or folders on a Cluster Shared Volume (CSV) may fail with the error, \"STATUS_BAD_IMPERSONATION_LEVEL (0xC00000A5)\".

See details >
OS Build 14393.2906

April 09, 2019
KB4493470
Mitigated
April 26, 2019
10:48 AM PT
Zone transfers over TCP may fail
Zone transfers between primary and secondary DNS servers over the Transmission Control Protocol (TCP) may fail.

See details >
OS Build 14393.2941

April 25, 2019
KB4493473
Investigating
April 25, 2019
02:00 PM PT
Cluster service may fail if the minimum password length is set to greater than 14
The cluster service may fail to start with the error “2245 (NERR_PasswordTooShort)” if the Group Policy “Minimum Password Length” is configured with greater than 14 characters.

See details >
OS Build 14393.2639

November 27, 2018
KB4467684
Mitigated
April 09, 2019
10:00 AM PT
Custom URI schemes may not start corresponding application
Custom URI schemes for application protocol handlers may not start the corresponding application for local intranet and trusted sites in Internet Explorer.

See details >
OS Build 14393.2848

March 12, 2019
KB4489882
Mitigated
April 09, 2019
10:00 AM PT
Issue using PXE to start a device from WDS
There may be issues using the Preboot Execution Environment (PXE) to start a device from a Windows Deployment Services (WDS) server configured to use Variable Window Extension.

See details >
OS Build 14393.2848

March 12, 2019
KB4489882
Mitigated
April 09, 2019
10:00 AM PT
SCVMM cannot enumerate and manage logical switches deployed on the host
For hosts managed by System Center Virtual Machine Manager (VMM), VMM cannot enumerate and manage logical switches deployed on the host.

See details >
OS Build 14393.2639

November 27, 2018
KB4467684
Mitigated
April 09, 2019
10:00 AM PT
Certain operations performed on a Cluster Shared Volume may fail
Certain operations, such as rename, performed on files or folders on a Cluster Shared Volume (CSV) may fail with the error, \"STATUS_BAD_IMPERSONATION_LEVEL (0xC00000A5)\".

See details >
OS Build 14393.2906

April 09, 2019
KB4493470
Mitigated
April 09, 2019
10:00 AM PT
Windows may not start on certain Lenovo and Fujitsu laptops with less than 8GB of RAM
Windows may fail to start on certain Lenovo and Fujitsu laptops that have less than 8 GB of RAM.

See details >
OS Build 14393.2608

November 13, 2018
KB4467691
Mitigated
February 19, 2019
10:00 AM PT
Embedded objects may display incorrectly
Any compound document (OLE) server application that places embedded objects into the Windows Metafile (WMF) using the PatBlt API may display embedded objects incorrectly.

See details >
OS Build 14393.2791

February 12, 2019
KB4487026
Resolved
KB4493470
April 29, 2019
12:43 AM PT
Custom URI schemes may not start corresponding application
Custom URI schemes for application protocol handlers may not start the corresponding application for local intranet and trusted sites in Internet Explorer.

See details >
OS Build 14393.2848

March 12, 2019
KB4489882
Resolved
KB4493473
April 25, 2019
02:00 PM PT
End-user-defined characters (EUDC) may cause blue screen at startup
If you enable per font end-user-defined characters (EUDC), the system will stop working and a blue screen may appear at startup.

See details >
OS Build 14393.2879

March 19, 2019
KB4489889
Resolved
KB4493470
April 09, 2019
10:00 AM PT
Internet Explorer 11 authentication issue with multiple concurrent logons
Internet Explorer 11 users may encounter issues if two or more people use the same user account for multiple, concurrent login sessions on the same Windows Server machine.

See details >
OS Build 14393.2724

January 08, 2019
KB4480961
Resolved
KB4493470
April 09, 2019
10:00 AM PT
MSXML6 may cause applications to stop responding
MSXML6 may cause applications to stop responding if an exception was thrown during node operations, such as appendChild(), insertBefore(), and moveNode().

See details >
OS Build 14393.2724

January 08, 2019
KB4480961
Resolved
KB4493470
April 09, 2019
10:00 AM PT
- + + +
DetailsOriginating updateStatusHistory
Certain operations performed on a Cluster Shared Volume may fail
Certain operations, such as rename, that you perform on files or folders that are on a Cluster Shared Volume (CSV) may fail with the error, \"STATUS_BAD_IMPERSONATION_LEVEL (0xC00000A5)\". This occurs when you perform the operation on a CSV owner node from a process that doesn’t have administrator privilege. 

Affected platforms: 
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10, version 1607; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507;  Windows 10 Enterprise LTSB 2015; Windows 8.1
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2; Windows Server 2012
Workaround: Do one of the following:
  • Perform the operation from a process that has administrator privilege. 
  • Perform the operation from a node that doesn’t have CSV ownership.
Next steps: Microsoft is working on a resolution and will provide an update in an upcoming release.

Back to top
OS Build 14393.2906

April 09, 2019
KB4493470
Mitigated
Last updated:
April 26, 2019
10:48 AM PT

Opened:
April 26, 2019
10:48 AM PT
Zone transfers over TCP may fail
Zone transfers between primary and secondary DNS servers over the Transmission Control Protocol (TCP) may fail after installing KB4493473
 
Affected platforms:  
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1607; Windows 10 Enterprise LTSC 2016 
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016 
Next steps: Microsoft is working on a resolution and will provide an update in an upcoming release. 

Back to top
OS Build 14393.2941

April 25, 2019
KB4493473
Investigating
Last updated:
April 25, 2019
02:00 PM PT

Opened:
April 25, 2019
02:00 PM PT
Certain operations performed on a Cluster Shared Volume may fail
Certain operations, such as rename, that you perform on files or folders that are on a Cluster Shared Volume (CSV) may fail with the error, \"STATUS_BAD_IMPERSONATION_LEVEL (0xC00000A5)\". This occurs when you perform the operation on a CSV owner node from a process that doesn’t have administrator privilege. 

Affected platforms: 
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10, version 1607; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507;  Windows 10 Enterprise LTSB 2015; Windows 8.1
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2; Windows Server 2012
Workaround: Do one of the following:
  • Perform the operation from a process that has administrator privilege. 
  • Perform the operation from a node that doesn’t have CSV ownership.
Next steps: Microsoft is working on a resolution and will provide an update in an upcoming release.

Back to top
OS Build 14393.2906

April 09, 2019
KB4493470
Mitigated
Last updated:
April 09, 2019
10:00 AM PT

Opened:
April 09, 2019
10:00 AM PT
Embedded objects may display incorrectly
Any compound document (OLE) server application that places embedded objects into the Windows Metafile (WMF) using the PatBlt API may display embedded objects incorrectly. 
 
For example, if you paste a Microsoft Excel worksheet object into a Microsoft Word document, the cells may render with a different background color. 
 
Affected platforms:  
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10, version 1607; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 10 Enterprise LTSB 2015; Windows 8.1; Windows 7 SP1 
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2; Windows Server 2012; Windows Server 2008 R2 SP1; Windows Server 2008 SP2 
Resolution: This issue is resolved in KB4493470

Back to top
OS Build 14393.2791

February 12, 2019
KB4487026
Resolved
KB4493470
Resolved:
April 09, 2019
10:00 AM PT

Opened:
April 29, 2019
12:43 AM PT
" @@ -93,9 +97,9 @@ sections: - type: markdown text: " - - + +
DetailsOriginating updateStatusHistory
Custom URI schemes may not start corresponding application
After installing KB4489882, Custom URI schemes for application protocol handlers may not start the corresponding application for local intranet and trusted sites security zones on Internet Explorer.

Affected platforms: 
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10, version 1607; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 10 Enterprise LTSB 2015; Windows 8.1; Windows 7 SP1 
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2; Windows Server 2008 R2 SP1
Workaround: Right-click the URL link to open it in a new window or tab, or enable Protected Mode in Internet Explorer for local intranet and trusted sites
  1. Go to Tools > Internet options > Security.
  2. Within Select a zone to view or change security settings, select Local intranet and then select Enable Protected Mode.
  3. Select Trusted sites and then select Enable Protected Mode.
  4. Select OK.
You must restart the browser after making these changes.

Next steps: Microsoft is working on a resolution and will provide an update in an upcoming release.

Back to top
OS Build 14393.2848

March 12, 2019
KB4489882
Mitigated
Last updated:
April 09, 2019
10:00 AM PT

Opened:
March 12, 2019
10:00 AM PT
Issue using PXE to start a device from WDS
After installing KB4489882, there may be issues using the Preboot Execution Environment (PXE) to start a device from a Windows Deployment Services (WDS) server configured to use Variable Window Extension. This may cause the connection to the WDS server to terminate prematurely while downloading the image. This issue does not affect clients or devices that are not using Variable Window Extension.

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1607; Windows 10 Enterprise LTSC 2016; Windows 8.1
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server 2016; Windows Server 2012 R2; Windows Server 2012
Workaround: To mitigate the issue, disable the Variable Window Extension on WDS server using one of the following options:
Option 1:
Open an Administrator Command prompt and type the following:
Wdsutil /Set-TransportServer /EnableTftpVariableWindowExtension:No
-
Option 2:
Use the Windows Deployment Services UI to make the following adjustment:
  1. Open Windows Deployment Services from Windows Administrative Tools.
  2. Expand Servers and right-click a WDS server.
  3. Open its properties and clear the Enable Variable Window Extension box on the TFTP tab.
Option 3:
Set the following registry value to 0:
HKLM\\System\\CurrentControlSet\\Services\\WDSServer\\Providers\\WDSTFTP\\EnableVariableWindowExtension
Restart the WDSServer service after disabling the Variable Window Extension.

Next steps: Microsoft is working on a resolution and will provide an update in an upcoming release.

Back to top
OS Build 14393.2848

March 12, 2019
KB4489882
Mitigated
Last updated:
April 09, 2019
10:00 AM PT

Opened:
March 12, 2019
10:00 AM PT
Issue using PXE to start a device from WDS
After installing KB4489882, there may be issues using the Preboot Execution Environment (PXE) to start a device from a Windows Deployment Services (WDS) server configured to use Variable Window Extension. This may cause the connection to the WDS server to terminate prematurely while downloading the image. This issue does not affect clients or devices that are not using Variable Window Extension.

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1607; Windows 10 Enterprise LTSC 2016; Windows 8.1
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server 2016; Windows Server 2012 R2; Windows Server 2012
Workaround: To mitigate the issue, disable the Variable Window Extension on WDS server using one of the following options:

Option 1:
Open an Administrator Command prompt and type the following:
Wdsutil /Set-TransportServer /EnableTftpVariableWindowExtension:No
+

Option 2:
Use the Windows Deployment Services UI to make the following adjustment:
  1. Open Windows Deployment Services from Windows Administrative Tools.
  2. Expand Servers and right-click a WDS server.
  3. Open its properties and clear the Enable Variable Window Extension box on the TFTP tab.
Option 3:
Set the following registry value to 0:
HKLM\\System\\CurrentControlSet\\Services\\WDSServer\\Providers\\WDSTFTP\\EnableVariableWindowExtension

Restart the WDSServer service after disabling the Variable Window Extension.

Next steps: Microsoft is working on a resolution and will provide an update in an upcoming release.

Back to top
OS Build 14393.2848

March 12, 2019
KB4489882
Mitigated
Last updated:
April 09, 2019
10:00 AM PT

Opened:
March 12, 2019
10:00 AM PT
Custom URI schemes may not start corresponding application
After installing KB4489882, Custom URI schemes for application protocol handlers may not start the corresponding application for local intranet and trusted sites security zones on Internet Explorer.

Affected platforms: 
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10, version 1607; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 10 Enterprise LTSB 2015; Windows 8.1; Windows 7 SP1 
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2; Windows Server 2008 R2 SP1
Resolution: This issue is resolved in KB4493473

Back to top
OS Build 14393.2848

March 12, 2019
KB4489882
Resolved
KB4493473
Resolved:
April 25, 2019
02:00 PM PT

Opened:
March 12, 2019
10:00 AM PT
End-user-defined characters (EUDC) may cause blue screen at startup
If you enable per font end-user-defined characters (EUDC), the system will stop working and a blue screen may appear at startup. This is not a common setting in non-Asian regions.

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10, version 1607; Windows 10 Enterprise LTSC 2016
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016
Resolution: This issue was resolved in KB4493470.

Back to top
OS Build 14393.2879

March 19, 2019
KB4489889
Resolved
KB4493470
Resolved:
April 09, 2019
10:00 AM PT

Opened:
March 19, 2019
10:00 AM PT
" diff --git a/windows/release-information/status-windows-10-1703.yml b/windows/release-information/status-windows-10-1703.yml index 00132830df..81d95d6d23 100644 --- a/windows/release-information/status-windows-10-1703.yml +++ b/windows/release-information/status-windows-10-1703.yml @@ -47,7 +47,7 @@ sections: - items: - type: markdown text: " - + " - items: - type: markdown @@ -60,10 +60,11 @@ sections: - type: markdown text: "
This table offers a summary of current active issues and those issues that have been resolved in the last 30 days.
- - + + +
SummaryOriginating updateStatusLast updated
Certain operations performed on a Cluster Shared Volume may fail
Certain operations, such as rename, performed on files or folders on a Cluster Shared Volume (CSV) may fail with the error, \"STATUS_BAD_IMPERSONATION_LEVEL (0xC00000A5)\".

See details >
OS Build 15063.1746

April 09, 2019
KB4493474
Mitigated
April 26, 2019
10:49 AM PT
Custom URI schemes may not start corresponding application
Custom URI schemes for application protocol handlers may not start the corresponding application for local intranet and trusted sites in Internet Explorer.

See details >
OS Build 15063.1689

March 12, 2019
KB4489871
Mitigated
April 09, 2019
10:00 AM PT
Certain operations performed on a Cluster Shared Volume may fail
Certain operations, such as rename, performed on files or folders on a Cluster Shared Volume (CSV) may fail with the error, \"STATUS_BAD_IMPERSONATION_LEVEL (0xC00000A5)\".

See details >
OS Build 15063.1746

April 09, 2019
KB4493474
Mitigated
April 09, 2019
10:00 AM PT
Custom URI schemes may not start corresponding application
Custom URI schemes for application protocol handlers may not start the corresponding application for local intranet and trusted sites in Internet Explorer.

See details >
OS Build 15063.1689

March 12, 2019
KB4489871
Resolved
KB4493436
April 25, 2019
02:00 PM PT
End-user-defined characters (EUDC) may cause blue screen at startup
If you enable per font end-user-defined characters (EUDC), the system may stop working and a blue screen may appear at startup.

See details >
OS Build 15063.1716

March 19, 2019
KB4489888
Resolved
KB4493474
April 09, 2019
10:00 AM PT
MSXML6 may cause applications to stop responding
MSXML6 may cause applications to stop responding if an exception was thrown during node operations, such as appendChild(), insertBefore(), and moveNode().

See details >
OS Build 15063.1563

January 08, 2019
KB4480973
Resolved
KB4493474
April 09, 2019
10:00 AM PT
Embedded objects may display incorrectly
Any compound document (OLE) server application that places embedded objects into the Windows Metafile (WMF) using the PatBlt API may display embedded objects incorrectly.

See details >
OS Build 15063.1631

February 12, 2019
KB4487020
Resolved
KB4493474
April 09, 2019
10:00 AM PT
" @@ -79,7 +80,7 @@ sections: - type: markdown text: " - +
DetailsOriginating updateStatusHistory
Certain operations performed on a Cluster Shared Volume may fail
Certain operations, such as rename, that you perform on files or folders that are on a Cluster Shared Volume (CSV) may fail with the error, “STATUS_BAD_IMPERSONATION_LEVEL (0xC00000A5)”. This occurs when you perform the operation on a CSV owner node from a process that doesn’t have administrator privilege. 

Affected platforms: 
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10, version 1607; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 10 Enterprise LTSB 2015; Windows 8.1
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2; Windows Server 2012
Workaround: Do one of the following: 
  • Perform the operation from a process that has administrator privilege. 
  • Perform the operation from a node that doesn’t have CSV ownership. 
Next steps: Microsoft is working on a resolution and will provide an update in an upcoming release.

Back to top
OS Build 15063.1746

April 09, 2019
KB4493474
Mitigated
Last updated:
April 26, 2019
10:49 AM PT

Opened:
April 26, 2019
10:49 AM PT
Certain operations performed on a Cluster Shared Volume may fail
Certain operations, such as rename, that you perform on files or folders that are on a Cluster Shared Volume (CSV) may fail with the error, “STATUS_BAD_IMPERSONATION_LEVEL (0xC00000A5)”. This occurs when you perform the operation on a CSV owner node from a process that doesn’t have administrator privilege. 

Affected platforms: 
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10, version 1607; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 10 Enterprise LTSB 2015; Windows 8.1
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2; Windows Server 2012
Workaround: Do one of the following: 
  • Perform the operation from a process that has administrator privilege. 
  • Perform the operation from a node that doesn’t have CSV ownership. 
Next steps: Microsoft is working on a resolution and will provide an update in an upcoming release.

Back to top
OS Build 15063.1746

April 09, 2019
KB4493474
Mitigated
Last updated:
April 09, 2019
10:00 AM PT

Opened:
April 09, 2019
10:00 AM PT
" @@ -88,11 +89,20 @@ sections: - type: markdown text: " - +
DetailsOriginating updateStatusHistory
Custom URI schemes may not start corresponding application
After installing KB4489871, custom URI schemes for application protocol handlers may not start the corresponding application for local intranet and trusted sites security zones on Internet Explorer.

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10, version 1607; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 10 Enterprise LTSB 2015; Windows 8.1; Windows 7 SP1 
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2; Windows Server 2008 R2 SP1
Workaround: Right-click the URL link to open it in a new window or tab, or enable Protected Mode in Internet Explorer for local intranet and trusted sites
1. Go to Tools > Internet options > Security.
2. Within Select a zone to view or change security settings, select Local intranet and then select Enable Protected Mode.
3. Select Trusted sites and then select Enable Protected Mode.
4. Select OK.
You must restart the browser after making these changes.

Next steps: Microsoft is working on a resolution and will provide an update in an upcoming release.

Back to top
OS Build 15063.1689

March 12, 2019
KB4489871
Mitigated
Last updated:
April 09, 2019
10:00 AM PT

Opened:
March 12, 2019
10:00 AM PT
Custom URI schemes may not start corresponding application
After installing KB4489871, custom URI schemes for application protocol handlers may not start the corresponding application for local intranet and trusted sites security zones on Internet Explorer.

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10, version 1607; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 10 Enterprise LTSB 2015; Windows 8.1; Windows 7 SP1 
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2; Windows Server 2008 R2 SP1
Resolution: This issue is resolved in KB4493436

Back to top
OS Build 15063.1689

March 12, 2019
KB4489871
Resolved
KB4493436
Resolved:
April 25, 2019
02:00 PM PT

Opened:
March 12, 2019
10:00 AM PT
End-user-defined characters (EUDC) may cause blue screen at startup
If you enable per font end-user-defined characters (EUDC), the system may stop working and a blue screen may appear at startup. This is not a common setting in non-Asian regions.

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016
Resolution: This issue was resolved in KB4493474.

Back to top
OS Build 15063.1716

March 19, 2019
KB4489888
Resolved
KB4493474
Resolved:
April 09, 2019
10:00 AM PT

Opened:
March 19, 2019
10:00 AM PT
" +- title: February 2019 +- items: + - type: markdown + text: " + + +
DetailsOriginating updateStatusHistory
Embedded objects may display incorrectly
Any compound document (OLE) server application that places embedded objects into the Windows Metafile (WMF) using the PatBlt API may display embedded objects incorrectly. 
 
For example, if you paste a Microsoft Excel worksheet object into a Microsoft Word document, the cells may render with a different background color. 
 
Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10, version 1607; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 10 Enterprise LTSB 2015; Windows 8.1; Windows 7 SP1 
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2; Windows Server 2012; Windows Server 2008 R2 SP1; Windows Server 2008 SP2 
Resolution: This issue is resolved in KB4493474

Back to top
OS Build 15063.1631

February 12, 2019
KB4487020
Resolved
KB4493474
Resolved:
April 09, 2019
10:00 AM PT

Opened:
February 12, 2019
10:00 AM PT
+ " + - title: January 2019 - items: - type: markdown diff --git a/windows/release-information/status-windows-10-1709.yml b/windows/release-information/status-windows-10-1709.yml index 85e402adbf..8ce7c13edd 100644 --- a/windows/release-information/status-windows-10-1709.yml +++ b/windows/release-information/status-windows-10-1709.yml @@ -47,7 +47,7 @@ sections: - items: - type: markdown text: " - + " - items: - type: markdown @@ -60,11 +60,13 @@ sections: - type: markdown text: "
This table offers a summary of current active issues and those issues that have been resolved in the last 30 days.
- - + + + - + +
SummaryOriginating updateStatusLast updated
Certain operations performed on a Cluster Shared Volume may fail
Certain operations, such as rename, performed on files or folders on a Cluster Shared Volume (CSV) may fail with the error, \"STATUS_BAD_IMPERSONATION_LEVEL (0xC00000A5)\".

See details >
OS Build 16299.1087

April 09, 2019
KB4493441
Mitigated
April 26, 2019
10:49 AM PT
Custom URI schemes may not start corresponding application
Custom URI schemes for application protocol handlers may not start the corresponding application for local intranet and trusted sites in Internet Explorer.

See details >
OS Build 16299.1029

March 12, 2019
KB4489886
Mitigated
April 09, 2019
10:00 AM PT
Zone transfers over TCP may fail
Zone transfers between primary and secondary DNS servers over the Transmission Control Protocol (TCP) may fail.

See details >
OS Build 16299.1127

April 25, 2019
KB4493440
Investigating
April 25, 2019
02:00 PM PT
Certain operations performed on a Cluster Shared Volume may fail
Certain operations, such as rename, performed on files or folders on a Cluster Shared Volume (CSV) may fail with the error, \"STATUS_BAD_IMPERSONATION_LEVEL (0xC00000A5)\".

See details >
OS Build 16299.1087

April 09, 2019
KB4493441
Mitigated
April 09, 2019
10:00 AM PT
Custom URI schemes may not start corresponding application
Custom URI schemes for application protocol handlers may not start the corresponding application for local intranet and trusted sites in Internet Explorer.

See details >
OS Build 16299.1029

March 12, 2019
KB4489886
Resolved
KB4493440
April 25, 2019
02:00 PM PT
End-user-defined characters (EUDC) may cause blue screen at startup
If you enable per font end-user-defined characters (EUDC), the system may stop working and a blue screen may appear at startup.

See details >
OS Build 16299.1059

March 19, 2019
KB4489890
Resolved
KB4493441
April 09, 2019
10:00 AM PT
MSXML6 causes applications to stop responding if an exception was thrown
MSXML6 causes applications to stop responding if an exception was thrown during node operations, such as appendChild(), insertBefore(), and moveNode().

See details >
OS Build 16299.904

January 08, 2019
KB4480978
Resolved
KB4493441
April 09, 2019
10:00 AM PT
Stop error when attempting to start SSH from WSL
A stop error occurs when attempting to start the Secure Shell client program from Windows Subsystem for Linux with agent forwarding enabled using a command line switch (ssh –A) or

See details >
OS Build 16299.1029

March 12, 2019
KB4489886
Resolved
KB4493441
April 09, 2019
10:00 AM PT
Stop error when attempting to start SSH from WSL
A stop error occurs when attempting to start Secure Shell from Windows Subsystem for Linux with agent forwarding using a command line switch (ssh –A) or a configuration setting.

See details >
OS Build 16299.1029

March 12, 2019
KB4489886
Resolved
KB4493441
April 09, 2019
10:00 AM PT
Embedded objects may display incorrectly
Any compound document (OLE) server application that places embedded objects into the Windows Metafile (WMF) using the PatBlt API may display embedded objects incorrectly.

See details >
OS Build 16299.967

February 12, 2019
KB4486996
Resolved
KB4493441
April 09, 2019
10:00 AM PT
" @@ -80,7 +82,8 @@ sections: - type: markdown text: " - + +
DetailsOriginating updateStatusHistory
Certain operations performed on a Cluster Shared Volume may fail
Certain operations, such as rename, that you perform on files or folders that are on a Cluster Shared Volume (CSV) may fail with the error, \"STATUS_BAD_IMPERSONATION_LEVEL (0xC00000A5)\". This occurs when you perform the operation on a CSV owner node from a process that doesn’t have administrator privilege. 

Affected platforms: 
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10, version 1607; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 10 Enterprise LTSB 2015; Windows 8.1
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2; Windows Server 2012
Workaround: Do one of the following:
  • Perform the operation from a process that has administrator privilege. 
  • Perform the operation from a node that doesn’t have CSV ownership. 
Next steps: Microsoft is working on a resolution and will provide an update in an upcoming release.

Back to top
OS Build 16299.1087

April 09, 2019
KB4493441
Mitigated
Last updated:
April 26, 2019
10:49 AM PT

Opened:
April 26, 2019
10:49 AM PT
Zone transfers over TCP may fail
Zone transfers between primary and secondary DNS servers over the Transmission Control Protocol (TCP) may fail after installing KB4493440
 
Affected platforms:  
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1607; Windows 10 Enterprise LTSC 2016 
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016 
Next steps: Microsoft is working on a resolution and will provide an update in an upcoming release. 

Back to top
OS Build 16299.1127

April 25, 2019
KB4493440
Investigating
Last updated:
April 25, 2019
02:00 PM PT

Opened:
April 25, 2019
02:00 PM PT
Certain operations performed on a Cluster Shared Volume may fail
Certain operations, such as rename, that you perform on files or folders that are on a Cluster Shared Volume (CSV) may fail with the error, \"STATUS_BAD_IMPERSONATION_LEVEL (0xC00000A5)\". This occurs when you perform the operation on a CSV owner node from a process that doesn’t have administrator privilege. 

Affected platforms: 
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10, version 1607; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 10 Enterprise LTSB 2015; Windows 8.1
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2; Windows Server 2012
Workaround: Do one of the following:
  • Perform the operation from a process that has administrator privilege. 
  • Perform the operation from a node that doesn’t have CSV ownership. 
Next steps: Microsoft is working on a resolution and will provide an update in an upcoming release.

Back to top
OS Build 16299.1087

April 09, 2019
KB4493441
Mitigated
Last updated:
April 09, 2019
10:00 AM PT

Opened:
April 09, 2019
10:00 AM PT
" @@ -89,17 +92,26 @@ sections: - type: markdown text: " - +
DetailsOriginating updateStatusHistory
Custom URI schemes may not start corresponding application
After installing KB4489886, custom URI schemes for application protocol handlers may not start the corresponding application for local intranet and trusted sites security zones on Internet Explorer.

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10, version 1607; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 10 Enterprise LTSB 2015; Windows 8.1; Windows 7 SP1 
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2; Windows Server 2008 R2 SP1
Workaround: Right-click the URL link to open it in a new window or tab, or enable Protected Mode in Internet Explorer for local intranet and trusted sites
1. Go to Tools > Internet options > Security.
2. Within Select a zone to view or change security settings, select Local intranet and then select Enable Protected Mode.
3. Select Trusted sites and then select Enable Protected Mode.
4. Select OK.
You must restart the browser after making these changes.

Next steps: Microsoft is working on a resolution and will provide an update in an upcoming release.

Back to top
OS Build 16299.1029

March 12, 2019
KB4489886
Mitigated
Last updated:
April 09, 2019
10:00 AM PT

Opened:
March 12, 2019
10:00 AM PT
Custom URI schemes may not start corresponding application
After installing KB4489886, custom URI schemes for application protocol handlers may not start the corresponding application for local intranet and trusted sites security zones on Internet Explorer.

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10, version 1607; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 10 Enterprise LTSB 2015; Windows 8.1; Windows 7 SP1 
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2; Windows Server 2008 R2 SP1
Resolution: This issue is resolved in KB4493440

Back to top
OS Build 16299.1029

March 12, 2019
KB4489886
Resolved
KB4493440
Resolved:
April 25, 2019
02:00 PM PT

Opened:
March 12, 2019
10:00 AM PT
End-user-defined characters (EUDC) may cause blue screen at startup
If you enable per font end-user-defined characters (EUDC), the system may stop working and a blue screen may appear at startup. This is not a common setting in non-Asian regions.

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10, version 1607; Windows 10 Enterprise LTSC 2016
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016
Resolution: This issue is resolved in KB4493441.

Back to top
OS Build 16299.1059

March 19, 2019
KB4489890
Resolved
KB4493441
Resolved:
April 09, 2019
10:00 AM PT

Opened:
March 19, 2019
10:00 AM PT
Stop error when attempting to start SSH from WSL
After applying KB4489886, a stop error occurs when attempting to start the Secure Shell (SSH) client program from Windows Subsystem for Linux (WSL) with agent forwarding enabled using a command line switch (ssh –A) or a configuration setting.

Affected platforms:
  • Client: Windows 10, version 1803; Windows 10, version 1709
  • Server: Windows Server, version 1803; Windows Server, version 1709
Resolution: This issue is resolved in KB4493441.

Back to top
OS Build 16299.1029

March 12, 2019
KB4489886
Resolved
KB4493441
Resolved:
April 09, 2019
10:00 AM PT

Opened:
March 12, 2019
10:00 AM PT
" +- title: February 2019 +- items: + - type: markdown + text: " + + +
DetailsOriginating updateStatusHistory
Embedded objects may display incorrectly
Any compound document (OLE) server application that places embedded objects into the Windows Metafile (WMF) using the PatBlt API may display embedded objects incorrectly. 
 
For example, if you paste a Microsoft Excel worksheet object into a Microsoft Word document, the cells may render with a different background color. 
 
Affected platforms:  
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10, version 1607; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 10 Enterprise LTSB 2015; Windows 8.1; Windows 7 SP1 
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2; Windows Server 2012; Windows Server 2008 R2 SP1; Windows Server 2008 SP2 
Resolution: This issue is resolved in KB4493441

Back to top
OS Build 16299.967

February 12, 2019
KB4486996
Resolved
KB4493441
Resolved:
April 09, 2019
10:00 AM PT

Opened:
February 12, 2019
10:00 AM PT
+ " + - title: January 2019 - items: - type: markdown text: " - +
DetailsOriginating updateStatusHistory
MSXML6 causes applications to stop responding if an exception was thrown
After installing KB4480978, MSXML6 causes applications to stop responding if an exception was thrown during node operations, such as appendChild(), insertBefore(), and moveNode().

The Group Policy editor may stop responding when editing a Group Policy Object (GPO) that contains Group Policy Preferences (GPP) for Internet Explorer 10 settings.

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 8.1
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2; Windows Server 2012
Resolution: This issue is resolved in KB4493441.

Back to top
OS Build 16299.904

January 08, 2019
KB4480978
Resolved
KB4493441
Resolved:
April 09, 2019
10:00 AM PT

Opened:
January 08, 2019
10:00 AM PT
MSXML6 causes applications to stop responding if an exception was thrown
After installing KB4480978, MSXML6 causes applications to stop responding if an exception was thrown during node operations, such as appendChild(), insertBefore(), and moveNode().

The Group Policy editor may stop responding when editing a Group Policy Object (GPO) that contains Group Policy Preferences (GPP) for Internet Explorer 10 settings.

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10, version 1607; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 10 Enterprise LTSB 2015; Windows 8.1
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2; Windows Server 2012
Resolution: This issue is resolved in KB4493441.

Back to top
OS Build 16299.904

January 08, 2019
KB4480978
Resolved
KB4493441
Resolved:
April 09, 2019
10:00 AM PT

Opened:
January 08, 2019
10:00 AM PT
" diff --git a/windows/release-information/status-windows-10-1803.yml b/windows/release-information/status-windows-10-1803.yml index 8256f9117b..fd58df28d5 100644 --- a/windows/release-information/status-windows-10-1803.yml +++ b/windows/release-information/status-windows-10-1803.yml @@ -47,7 +47,7 @@ sections: - items: - type: markdown text: " - + " - items: - type: markdown @@ -60,12 +60,15 @@ sections: - type: markdown text: "
This table offers a summary of current active issues and those issues that have been resolved in the last 30 days.
- - + + + + +
SummaryOriginating updateStatusLast updated
Certain operations performed on a Cluster Shared Volume may fail
Certain operations, such as rename, performed on files or folders on a Cluster Shared Volume (CSV) may fail with the error, \"STATUS_BAD_IMPERSONATION_LEVEL (0xC00000A5)\".

See details >
OS Build 17134.706

April 09, 2019
KB4493464
Mitigated
April 26, 2019
10:49 AM PT
Custom URI schemes may not start corresponding application
Custom URI schemes for application protocol handlers may not start the corresponding application for local intranet and trusted sites in Internet Explorer.

See details >
OS Build 17134.648

March 12, 2019
KB4489868
Mitigated
April 09, 2019
10:00 AM PT
Zone transfers over TCP may fail
Zone transfers between primary and secondary DNS servers over the Transmission Control Protocol (TCP) may fail.

See details >
OS Build 17134.753

April 25, 2019
KB4493437
Investigating
April 25, 2019
02:00 PM PT
Issue using PXE to start a device from WDS
Using PXE to start a device from a WDS server configured to use Variable Window Extension may cause the connection to the WDS server to terminate prematurely.

See details >
OS Build 17134.648

March 12, 2019
KB4489868
Mitigated
April 09, 2019
10:00 AM PT
Certain operations performed on a Cluster Shared Volume may fail
Certain operations, such as rename, performed on files or folders on a Cluster Shared Volume (CSV) may fail with the error, \"STATUS_BAD_IMPERSONATION_LEVEL (0xC00000A5)\".

See details >
OS Build 17134.706

April 09, 2019
KB4493464
Mitigated
April 09, 2019
10:00 AM PT
Custom URI schemes may not start corresponding application
Custom URI schemes for application protocol handlers may not start the corresponding application for local intranet and trusted sites in Internet Explorer.

See details >
OS Build 17134.648

March 12, 2019
KB4489868
Resolved
KB4493437
April 25, 2019
02:00 PM PT
End-user-defined characters (EUDC) may cause blue screen at startup
If you enable per font end-user-defined characters (EUDC), the system may stop working and a blue screen may appear at startup.

See details >
OS Build 17134.677

March 19, 2019
KB4489894
Resolved
KB4493464
April 09, 2019
10:00 AM PT
First character of Japanese era name not recognized
The first character of the Japanese era name is not recognized as an abbreviation and may cause date parsing issues.

See details >
OS Build 17134.556

January 15, 2019
KB4480976
Resolved
KB4487029
April 09, 2019
10:00 AM PT
MSXML6 may cause applications to stop responding
MSXML6 may cause applications to stop responding if an exception was thrown during node operations, such as appendChild(), insertBefore(), and moveNode().

See details >
OS Build 17134.523

January 08, 2019
KB4480966
Resolved
KB4493464
April 09, 2019
10:00 AM PT
Stop error when attempting to start SSH from WSL
A stop error occurs when attempting to start Secure Shell from Windows Subsystem for Linux with agent forwarding using a command line switch (ssh –A) or a configuration setting.

See details >
OS Build 17134.648

March 12, 2019
KB4489868
Resolved
KB4493464
April 09, 2019
10:00 AM PT
Embedded objects may display incorrectly
Any compound document (OLE) server application that places embedded objects into the Windows Metafile (WMF) using the PatBlt API may display embedded objects incorrectly.

See details >
OS Build 17134.590

February 12, 2019
KB4487017
Resolved
KB4493464
April 09, 2019
10:00 AM PT
" @@ -81,7 +84,8 @@ sections: - type: markdown text: " - + +
DetailsOriginating updateStatusHistory
Certain operations performed on a Cluster Shared Volume may fail
Certain operations, such as rename, that you perform on files or folders that are on a Cluster Shared Volume (CSV) may fail with the error, \"STATUS_BAD_IMPERSONATION_LEVEL (0xC00000A5)\". This occurs when you perform the operation on a CSV owner node from a process that doesn’t have administrator privilege.

Affected platforms: 
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10, version 1607; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 10 Enterprise LTSB 2015; Windows 8.1
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2; Windows Server 2012
Workaround: Do one of the following:
  • Perform the operation from a process that has administrator privilege. 
  • Perform the operation from a node that doesn’t have CSV ownership. 
Next steps: Microsoft is working on a resolution and will provide an update in an upcoming release.

Back to top
OS Build 17134.706

April 09, 2019
KB4493464
Mitigated
Last updated:
April 26, 2019
10:49 AM PT

Opened:
April 26, 2019
10:49 AM PT
Zone transfers over TCP may fail
Zone transfers between primary and secondary DNS servers over the Transmission Control Protocol (TCP) may fail after installing KB4493437
 
Affected platforms:  
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1607; Windows 10 Enterprise LTSC 2016 
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016 
Next steps: Microsoft is working on a resolution and will provide an update in an upcoming release. 

Back to top
OS Build 17134.753

April 25, 2019
KB4493437
Investigating
Last updated:
April 25, 2019
02:00 PM PT

Opened:
April 25, 2019
02:00 PM PT
Certain operations performed on a Cluster Shared Volume may fail
Certain operations, such as rename, that you perform on files or folders that are on a Cluster Shared Volume (CSV) may fail with the error, \"STATUS_BAD_IMPERSONATION_LEVEL (0xC00000A5)\". This occurs when you perform the operation on a CSV owner node from a process that doesn’t have administrator privilege.

Affected platforms: 
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10, version 1607; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 10 Enterprise LTSB 2015; Windows 8.1
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2; Windows Server 2012
Workaround: Do one of the following:
  • Perform the operation from a process that has administrator privilege. 
  • Perform the operation from a node that doesn’t have CSV ownership. 
Next steps: Microsoft is working on a resolution and will provide an update in an upcoming release.

Back to top
OS Build 17134.706

April 09, 2019
KB4493464
Mitigated
Last updated:
April 09, 2019
10:00 AM PT

Opened:
April 09, 2019
10:00 AM PT
" @@ -90,19 +94,29 @@ sections: - type: markdown text: " - - + +
DetailsOriginating updateStatusHistory
Custom URI schemes may not start corresponding application
After installing KB4489868, custom URI schemes for application protocol handlers may not start the corresponding application for local intranet and trusted sites security zones on Internet Explorer. 

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10, version 1607; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 10 Enterprise LTSB 2015; Windows 8.1; Windows 7 SP1 
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2; Windows Server 2008 R2 SP1
Workaround: Right-click the URL link to open it in a new window or tab, or enable Protected Mode in Internet Explorer for local intranet and trusted sites
  1. Go to Tools > Internet options > Security 
  2. Within Select a zone to view or change security settings, select Local intranet and then select Enable Protected Mode.
  3. Select Trusted sites and then select Enable Protected Mode
  4. Select OK
 You must restart the browser after making these changes. 
 
Next steps: Microsoft is working on a resolution and will provide an update in an upcoming release. 

Back to top
OS Build 17134.648

March 12, 2019
KB4489868
Mitigated
Last updated:
April 09, 2019
10:00 AM PT

Opened:
March 12, 2019
10:00 AM PT
Issue using PXE to start a device from WDS
After installing KB4489868, there may be issues using the Preboot Execution Environment (PXE) to start a device from a Windows Deployment Services (WDS) server configured to use Variable Window Extension. This may cause the connection to the WDS server to terminate prematurely while downloading the image. This issue does not affect clients or devices that are not using Variable Window Extension. 

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1607; Windows 10 Enterprise LTSC 2016; Windows 8.1
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server 2016; Windows Server 2012 R2; Windows Server 2012
Workaround: To mitigate the issue, disable the Variable Window Extension on WDS server using one of the following options:
Option 1: 
Open an Administrator Command prompt and type the following:  
Wdsutil /Set-TransportServer /EnableTftpVariableWindowExtension:No
-
 Option 2: 
Use the Windows Deployment Services UI to make the following adjustment:  
  1. Open Windows Deployment Services from Windows Administrative Tools. 
  2. Expand Servers and right-click a WDS server. 
  3. Open its properties and clear the?Enable Variable Window Extension?box on the TFTP tab.  
Option 3: 
Set the following registry value to 0:  
HKLM\\System\\CurrentControlSet\\Services\\WDSServer\\Providers\\WDSTFTP\\EnableVariableWindowExtension  
Restart the WDSServer service after disabling the Variable Window Extension. 
 
Next steps: Microsoft is working on a resolution and will provide an update in an upcoming release. 

Back to top
OS Build 17134.648

March 12, 2019
KB4489868
Mitigated
Last updated:
April 09, 2019
10:00 AM PT

Opened:
March 12, 2019
10:00 AM PT
Issue using PXE to start a device from WDS
After installing KB4489868, there may be issues using the Preboot Execution Environment (PXE) to start a device from a Windows Deployment Services (WDS) server configured to use Variable Window Extension. This may cause the connection to the WDS server to terminate prematurely while downloading the image. This issue does not affect clients or devices that are not using Variable Window Extension. 

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1607; Windows 10 Enterprise LTSC 2016; Windows 8.1
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server 2016; Windows Server 2012 R2; Windows Server 2012
Workaround: To mitigate the issue, disable the Variable Window Extension on WDS server using one of the following options:

Option 1: 
Open an Administrator Command prompt and type the following:  
Wdsutil /Set-TransportServer /EnableTftpVariableWindowExtension:No
+

 Option 2: 
Use the Windows Deployment Services UI to make the following adjustment:  
  1. Open Windows Deployment Services from Windows Administrative Tools. 
  2. Expand Servers and right-click a WDS server. 
  3. Open its properties and clear the Enable Variable Window Extension box on the TFTP tab.  
Option 3: 
Set the following registry value to 0:
HKLM\\System\\CurrentControlSet\\Services\\WDSServer\\Providers\\WDSTFTP\\EnableVariableWindowExtension  

Restart the WDSServer service after disabling the Variable Window Extension. 
 
Next steps: Microsoft is working on a resolution and will provide an update in an upcoming release. 

Back to top
OS Build 17134.648

March 12, 2019
KB4489868
Mitigated
Last updated:
April 09, 2019
10:00 AM PT

Opened:
March 12, 2019
10:00 AM PT
Custom URI schemes may not start corresponding application
After installing KB4489868, custom URI schemes for application protocol handlers may not start the corresponding application for local intranet and trusted sites security zones on Internet Explorer. 

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10, version 1607; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 10 Enterprise LTSB 2015; Windows 8.1; Windows 7 SP1 
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2; Windows Server 2008 R2 SP1
Resolution: This issue is resolved in KB4493437

Back to top
OS Build 17134.648

March 12, 2019
KB4489868
Resolved
KB4493437
Resolved:
April 25, 2019
02:00 PM PT

Opened:
March 12, 2019
10:00 AM PT
End-user-defined characters (EUDC) may cause blue screen at startup
If you enable per font end-user-defined characters (EUDC), the system may stop working and a blue screen may appear at startup. This is not a common setting in non-Asian regions. 

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10, version 1607; Windows 10 Enterprise LTSC 2016
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016
Resolution: This issue was resolved in KB4493464

Back to top
OS Build 17134.677

March 19, 2019
KB4489894
Resolved
KB4493464
Resolved:
April 09, 2019
10:00 AM PT

Opened:
March 19, 2019
10:00 AM PT
Stop error when attempting to start SSH from WSL
After applying KB4489868, a stop error occurs when attempting to start the Secure Shell (SSH) client program from Windows Subsystem for Linux (WSL) with agent forwarding enabled using a command line switch (ssh -A) or a configuration setting.

Affected platforms:
  • Client: Windows 10, version 1803; Windows 10, version 1709
  • Server: Windows Server, version 1803; Windows Server, version 1709
Resolution: This issue was resolved in KB4493464.

Back to top
OS Build 17134.648

March 12, 2019
KB4489868
Resolved
KB4493464
Resolved:
April 09, 2019
10:00 AM PT

Opened:
March 12, 2019
10:00 AM PT
" +- title: February 2019 +- items: + - type: markdown + text: " + + +
DetailsOriginating updateStatusHistory
Embedded objects may display incorrectly
Any compound document (OLE) server application that places embedded objects into the Windows Metafile (WMF) using the PatBlt API may display embedded objects incorrectly. 
 
For example, if you paste a Microsoft Excel worksheet object into a Microsoft Word document, the cells may render with a different background color. 
 
Affected platforms:  
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10, version 1607; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 10 Enterprise LTSB 2015; Windows 8.1; Windows 7 SP1 
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2; Windows Server 2012; Windows Server 2008 R2 SP1; Windows Server 2008 SP2 
Resolution: This issue is resolved in KB4493464

Back to top
OS Build 17134.590

February 12, 2019
KB4487017
Resolved
KB4493464
Resolved:
April 09, 2019
10:00 AM PT

Opened:
February 12, 2019
10:00 AM PT
+ " + - title: January 2019 - items: - type: markdown text: " +
DetailsOriginating updateStatusHistory
First character of Japanese era name not recognized
After installing KB4480976, the first character of the Japanese era name is not recognized as an abbreviation and may cause date parsing issues.

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10, version 1607; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 10 Enterprise LTSB 2015; Windows 8.1; Windows 7 SP1
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2; Windows Server 2012; Windows Server 2008 R2 SP1; Windows Server 2008 SP2
Resolution: This issue is resolved in KB4487029

Back to top
OS Build 17134.556

January 15, 2019
KB4480976
Resolved
KB4487029
Resolved:
February 19, 2019
02:00 PM PT

Opened:
January 08, 2019
10:00 AM PT
MSXML6 may cause applications to stop responding
After installing KB4480966, MSXML6 causes applications to stop responding if an exception was thrown during node operations, such as appendChild(), insertBefore(), and moveNode().

The Group Policy editor may stop responding when editing a Group Policy Object (GPO) that contains Group Policy Preferences (GPP) for Internet Explorer 10 settings.

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10, version 1607; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 10 Enterprise LTSB 2015; Windows 8.1
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2; Windows Server 2012
Resolution: This issue was resolved in KB4493464

Back to top
OS Build 17134.523

January 08, 2019
KB4480966
Resolved
KB4493464
Resolved:
April 09, 2019
10:00 AM PT

Opened:
January 08, 2019
10:00 AM PT
" diff --git a/windows/release-information/status-windows-10-1809-and-windows-server-2019.yml b/windows/release-information/status-windows-10-1809-and-windows-server-2019.yml index b2aa3074c7..268724f00f 100644 --- a/windows/release-information/status-windows-10-1809-and-windows-server-2019.yml +++ b/windows/release-information/status-windows-10-1809-and-windows-server-2019.yml @@ -52,7 +52,7 @@ sections: - items: - type: markdown text: " - + " - items: - type: markdown @@ -65,14 +65,15 @@ sections: - type: markdown text: "
This table offers a summary of current active issues and those issues that have been resolved in the last 30 days.
- - + + +
SummaryOriginating updateStatusLast updated
System may be unresponsive after restart if ArcaBit antivirus software installed
Devices with ArcaBit antivirus software installed may become unresponsive upon restart.

See details >
OS Build 17763.437

April 09, 2019
KB4493509
Mitigated
April 26, 2019
10:50 AM PT
Certain operations performed on a Cluster Shared Volume may fail
Certain operations, such as rename, performed on files or folders on a Cluster Shared Volume (CSV) may fail with the error, \"STATUS_BAD_IMPERSONATION_LEVEL (0xC00000A5)\".

See details >
OS Build 17763.437

April 09, 2019
KB4493509
Mitigated
April 26, 2019
10:50 AM PT
Custom URI schemes may not start corresponding application
Custom URI schemes for application protocol handlers may not start the corresponding application for local intranet and trusted sites in Internet Explorer.

See details >
OS Build 17763.379

March 12, 2019
KB4489899
Mitigated
April 09, 2019
10:00 AM PT
Issue using PXE to start a device from WDS
Using PXE to start a device from a WDS server configured to use Variable Window Extension may cause the connection to the WDS server to terminate prematurely.

See details >
OS Build 17763.379

March 12, 2019
KB4489899
Mitigated
April 09, 2019
10:00 AM PT
Certain operations performed on a Cluster Shared Volume may fail
Certain operations, such as rename, performed on files or folders on a Cluster Shared Volume (CSV) may fail with the error, \"STATUS_BAD_IMPERSONATION_LEVEL (0xC00000A5)\".

See details >
OS Build 17763.437

April 09, 2019
KB4493509
Mitigated
April 09, 2019
10:00 AM PT
System may be unresponsive after restart if ArcaBit antivirus software installed
Devices with ArcaBit antivirus software installed may become unresponsive upon restart.

See details >
OS Build 17763.437

April 09, 2019
KB4493509
Mitigated
April 09, 2019
10:00 AM PT
Audio not working on monitors or TV connected to a PC via HDMI, USB, or DisplayPort
Upgrade block: Microsoft has identified issues with certain new Intel display drivers, which accidentally turn on unsupported features in Windows.

See details >
OS Build 17763.134

November 13, 2018
KB4467708
Mitigated
March 15, 2019
12:00 PM PT
End-user-defined characters (EUDC) may cause blue screen at startup
If you enable per font end-user-defined characters (EUDC), the system may stop working and a blue screen may appear at startup.

See details >
OS Build 17763.404

April 02, 2019
KB4490481
Resolved
KB4493509
April 09, 2019
10:00 AM PT
Internet Explorer 11 authentication issue with multiple concurrent logons
Internet Explorer 11 users may encounter issues if two or more people use the same user account for multiple, concurrent login sessions on the same Windows Server machine.

See details >
OS Build 17763.253

January 08, 2019
KB4480116
Resolved
KB4493509
April 09, 2019
10:00 AM PT
MSXML6 may cause applications to stop responding
MSXML6 may cause applications to stop responding if an exception was thrown during node operations, such as appendChild(), insertBefore(), and moveNode().

See details >
OS Build 17763.253

January 08, 2019
KB4480116
Resolved
KB4493509
April 09, 2019
10:00 AM PT
Embedded objects may display incorrectly
Any compound document (OLE) server application that places embedded objects into the Windows Metafile (WMF) using the PatBlt API may display embedded objects incorrectly.

See details >
OS Build 17763.316

February 12, 2019
KB4487044
Resolved
KB4493509
April 09, 2019
10:00 AM PT
Apps may stop working after selecting an audio output device other than the default
Users with multiple audio devices that select an audio output device different from the \"Default Audio Device\" may find certain applications stop working unexpectedly.

See details >
OS Build 17763.348

March 01, 2019
KB4482887
Resolved
KB4490481
April 02, 2019
10:00 AM PT
" @@ -89,9 +90,8 @@ sections: - type: markdown text: " - - - + +
DetailsOriginating updateStatusHistory
System may be unresponsive after restart if ArcaBit antivirus software installed
Microsoft and ArcaBit have identified an issue on devices with ArcaBit antivirus software installed that may cause the system to become unresponsive upon restart after installing KB4493509
 
Microsoft has temporarily blocked devices from receiving this update if ArcaBit antivirus software is installed. 

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 8.1; Windows 7 SP1
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server 2012 R2; Windows Server 2008 R2 SP1
ArcaBit has released an update to address this issue. For more information, see the Arcabit support article.

Back to top
OS Build 17763.437

April 09, 2019
KB4493509
Mitigated
Last updated:
April 26, 2019
10:50 AM PT

Opened:
April 26, 2019
10:50 AM PT
Certain operations performed on a Cluster Shared Volume may fail
Certain operations, such as rename, that you perform on files or folders that are on a Cluster Shared Volume (CSV) may fail with the error, \"STATUS_BAD_IMPERSONATION_LEVEL (0xC00000A5)\". This occurs when you perform the operation on a CSV owner node from a process that doesn’t have administrator privilege. 

Affected platforms: 
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10, version 1607; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 10 Enterprise LTSB 2015; Windows 8.1
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2; Windows Server 2012
Workaround: Do one of the following:  
  • Perform the operation from a process that has administrator privilege. 
  • Perform the operation from a node that doesn’t have CSV ownership. 
Next steps: Microsoft is working on a resolution and will provide an update in an upcoming release.

Back to top
OS Build 17763.437

April 09, 2019
KB4493509
Mitigated
Last updated:
April 26, 2019
10:50 AM PT

Opened:
April 26, 2019
10:50 AM PT
End-user-defined characters (EUDC) may cause blue screen at startup
If you enable per font end-user-defined characters (EUDC), the system will stop working and a blue screen may appear at startup. This is not a common setting in non-Asian regions.

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10, version 1607; Windows 10 Enterprise LTSC 2016
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016
Workaround: To avoid this issue, don't enable per font EUDC. As an alternative, you can edit the registry to mitigate this issue; for more information, see KB4496149.

Resolved: This issue was resolved in KB4493509.

Back to top
OS Build 17763.404

April 02, 2019
KB4490481
Resolved
KB4493509
Resolved:
April 09, 2019
10:00 AM PT

Opened:
April 02, 2019
10:00 AM PT
Certain operations performed on a Cluster Shared Volume may fail
Certain operations, such as rename, that you perform on files or folders that are on a Cluster Shared Volume (CSV) may fail with the error, \"STATUS_BAD_IMPERSONATION_LEVEL (0xC00000A5)\". This occurs when you perform the operation on a CSV owner node from a process that doesn’t have administrator privilege. 

Affected platforms: 
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10, version 1607; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 10 Enterprise LTSB 2015; Windows 8.1
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2; Windows Server 2012
Workaround: Do one of the following:  
  • Perform the operation from a process that has administrator privilege. 
  • Perform the operation from a node that doesn’t have CSV ownership. 
Next steps: Microsoft is working on a resolution and will provide an update in an upcoming release.

Back to top
OS Build 17763.437

April 09, 2019
KB4493509
Mitigated
Last updated:
April 09, 2019
10:00 AM PT

Opened:
April 09, 2019
10:00 AM PT
End-user-defined characters (EUDC) may cause blue screen at startup
If you enable per font end-user-defined characters (EUDC), the system will stop working and a blue screen may appear at startup. This is not a common setting in non-Asian regions.

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10, version 1607; Windows 10 Enterprise LTSC 2016
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016
Resolution: This issue was resolved in KB4493509.

Back to top
OS Build 17763.404

April 02, 2019
KB4490481
Resolved
KB4493509
Resolved:
April 09, 2019
10:00 AM PT

Opened:
April 02, 2019
10:00 AM PT
" @@ -101,9 +101,18 @@ sections: text: " - - + + +
DetailsOriginating updateStatusHistory
Custom URI schemes may not start corresponding application
After installing KB4489899, custom URI schemes for application protocol handlers may not start the corresponding application for local intranet and trusted sites security zones on Internet Explorer.

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10, version 1607; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 10 Enterprise LTSB 2015; Windows 8.1; Windows 7 SP1 
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2; Windows Server 2008 R2 SP1
Workaround: Right-click the URL link to open it in a new window or tab, or enable Protected Mode in Internet Explorer for local intranet and trusted sites
  1. Go to Tools > Internet options > Security.
  2. Within Select a zone to view of change security settings, select Local intranet and then select Enable Protected Mode.
  3. Select Trusted Sites and then select Enable Protected Mode
  4. Select OK.
You must restart the browser after making these changes. 
 
Next steps: Microsoft is working on a resolution and will provide an update in an upcoming release. 

Back to top
OS Build 17763.379

March 12, 2019
KB4489899
Mitigated
Last updated:
April 09, 2019
10:00 AM PT

Opened:
March 12, 2019
10:00 AM PT
Issue using PXE to start a device from WDS
After installing KB4489899, there may be issues using the Preboot Execution Environment (PXE) to start a device from a Windows Deployment Services (WDS) server configured to use Variable Window Extension. This may cause the connection to the WDS server to terminate prematurely while downloading the image. This issue does not affect clients or devices that are not using Variable Window Extension. 

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1607; Windows 10 Enterprise LTSC 2016; Windows 8.1
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server 2016; Windows Server 2012 R2; Windows Server 2012
Workaround: To mitigate the issue, disable the Variable Window Extension on WDS server using one of the following options:
Option 1:
Open an Administrator Command prompt and type the following:
Wdsutil /Set-TransportServer /EnableTftpVariableWindowExtension:No 
-
Option 2:
Use the Windows Deployment Services UI to make the following adjustment: 
  1. Open Windows Deployment Services from Windows Administrative Tools. 
  2. Expand Servers and right-click a WDS server. 
  3. Open its properties and clear the Enable Variable Window Extension box on the TFTP tab.
Option 3:
Set the following registry value to 0:  
HKLM\\System\\CurrentControlSet\\Services\\WDSServer\\Providers\\WDSTFTP\\EnableVariableWindowExtension  
Restart the WDSServer service after disabling the Variable Window Extension. 

Next steps: Microsoft is working on a resolution and will provide an update in an upcoming release. 

Back to top
OS Build 17763.379

March 12, 2019
KB4489899
Mitigated
Last updated:
April 09, 2019
10:00 AM PT

Opened:
March 12, 2019
10:00 AM PT
Apps may stop working after selecting an audio output device other than the default
After installing KB4482887 on machines that have multiple audio devices, applications that provide advanced options for internal or external audio output devices may stop working unexpectedly. This issue occurs for users that select an audio output device different from the \"Default Audio Device\". Examples of applications that may stop working include: 
  • Windows Media Player 
  • Realtek HD Audio Manager 
  • Sound Blaster Control Panel 
Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019
  • Server: Windows Server, version 1809; Windows Server 2019
Workaround: As a temporary solution, select the \"Default Audio Device\" in the options provided by the application; please refer to the application's user manual for details. 
For example, to set the Default Audio Device in Windows Media Player: 
  1. Open Windows Media Player > Tools > Options > Devices.
  2. Select the device and choose Properties.
  3. On the next dialog, from the drop-down menu under Select the Audio Device, choose Default Audio Device from the list. 
You can then send audio from the application to the audio device you want in the per-application audio settings found under Settings > System > Sound > App Volume and device preferences.

Resolved: This issue was resolved in KB4490481

Back to top
OS Build 17763.348

March 01, 2019
KB4482887
Resolved
KB4490481
Resolved:
April 02, 2019
10:00 AM PT

Opened:
March 01, 2019
10:00 AM PT
Issue using PXE to start a device from WDS
After installing KB4489899, there may be issues using the Preboot Execution Environment (PXE) to start a device from a Windows Deployment Services (WDS) server configured to use Variable Window Extension. This may cause the connection to the WDS server to terminate prematurely while downloading the image. This issue does not affect clients or devices that are not using Variable Window Extension. 

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1607; Windows 10 Enterprise LTSC 2016; Windows 8.1
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server 2016; Windows Server 2012 R2; Windows Server 2012
Workaround: To mitigate the issue, disable the Variable Window Extension on WDS server using one of the following options:

Option 1:
Open an Administrator Command prompt and type the following:
Wdsutil /Set-TransportServer /EnableTftpVariableWindowExtension:No 
+

Option 2:
Use the Windows Deployment Services UI to make the following adjustment: 
  1. Open Windows Deployment Services from Windows Administrative Tools. 
  2. Expand Servers and right-click a WDS server. 
  3. Open its properties and clear the Enable Variable Window Extension box on the TFTP tab.
Option 3:
Set the following registry value to 0:
HKLM\\System\\CurrentControlSet\\Services\\WDSServer\\Providers\\WDSTFTP\\EnableVariableWindowExtension  

Restart the WDSServer service after disabling the Variable Window Extension. 

Next steps: Microsoft is working on a resolution and will provide an update in an upcoming release. 

Back to top
OS Build 17763.379

March 12, 2019
KB4489899
Mitigated
Last updated:
April 09, 2019
10:00 AM PT

Opened:
March 12, 2019
10:00 AM PT
Apps may stop working after selecting an audio output device other than the default
After installing KB4482887 on machines that have multiple audio devices, applications that provide advanced options for internal or external audio output devices may stop working unexpectedly. This issue occurs for users that select an audio output device different from the \"Default Audio Device\". Examples of applications that may stop working include: 
  • Windows Media Player 
  • Realtek HD Audio Manager 
  • Sound Blaster Control Panel 
Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019
  • Server: Windows Server, version 1809; Windows Server 2019
Resolution: This issue was resolved in KB4490481

Back to top
OS Build 17763.348

March 01, 2019
KB4482887
Resolved
KB4490481
Resolved:
April 02, 2019
10:00 AM PT

Opened:
March 01, 2019
10:00 AM PT
+ " + +- title: February 2019 +- items: + - type: markdown + text: " + +
DetailsOriginating updateStatusHistory
Embedded objects may display incorrectly
Any compound document (OLE) server application that places embedded objects into the Windows Metafile (WMF) using the PatBlt API may display embedded objects incorrectly. 
 
For example, if you paste a Microsoft Excel worksheet object into a Microsoft Word document, the cells may render with a different background color. 
 
Affected platforms:  
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10, version 1607; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 10 Enterprise LTSB 2015; Windows 8.1; Windows 7 SP1  
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2; Windows Server 2012; Windows Server 2008 R2 SP1; Windows Server 2008 SP2  
Resolution: This issue is resolved in KB4493509.  

Back to top
OS Build 17763.316

February 12, 2019
KB4487044
Resolved
KB4493509
Resolved:
April 09, 2019
10:00 AM PT

Opened:
February 12, 2019
10:00 AM PT
" @@ -112,7 +121,8 @@ sections: - type: markdown text: " - + +
DetailsOriginating updateStatusHistory
Internet Explorer 11 authentication issue with multiple concurrent logons
After installing the February 12, 2019 update (KB4487044), Internet Explorer 11 and other applications that use WININET.DLL may have authentication issues. This occurs when two or more people use the same user account for multiple, concurrent login sessions on the same Windows Server machine, including Remote Desktop Protocol (RDP) and Terminal Server logons. Symptoms reported by customers include, but may not be limited to:  
  • Cache size and location show zero or empty. 
  • Keyboard shortcuts may not work properly. 
  • Webpages may intermittently fail to load or render correctly. 
  • Issues with credential prompts. 
  • Issues when downloading files. 
Affected platforms: 
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1607; Windows 10 Enterprise LTSC 2016; Windows 8.1; Windows 7 SP1
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server 2016; Windows Server 2012 R2; Windows Server 2012; Windows Server 2008 R2 SP1
Resolved: This issue was resolved in KB4493509

Back to top
OS Build 17763.253

January 08, 2019
KB4480116
Resolved
KB4493509
Resolved:
April 09, 2019
10:00 AM PT

Opened:
January 08, 2019
10:00 AM PT
System may be unresponsive after restart if ArcaBit antivirus software installed
Microsoft and ArcaBit have identified an issue on devices with ArcaBit antivirus software installed that may cause the system to become unresponsive upon restart after installing KB4493509
 
Microsoft has temporarily blocked devices from receiving this update if ArcaBit antivirus software is installed. 

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 8.1; Windows 7 SP1
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server 2012 R2; Windows Server 2008 R2 SP1
Workaround: ArcaBit has released an update to address this issue. For more information, see the Arcabit support article.

Back to top
OS Build 17763.437

April 09, 2019
KB4493509
Mitigated
Last updated:
April 09, 2019
10:00 AM PT

Opened:
January 08, 2019
10:00 AM PT
Internet Explorer 11 authentication issue with multiple concurrent logons
After installing KB4480116, Internet Explorer 11 and other applications that use WININET.DLL may have authentication issues. This occurs when two or more people use the same user account for multiple, concurrent login sessions on the same Windows Server machine, including Remote Desktop Protocol (RDP) and Terminal Server logons. Symptoms reported by customers include, but may not be limited to: 
 
  • Cache size and location show zero or empty. 
  • Keyboard shortcuts may not work properly. 
  • Webpages may intermittently fail to load or render correctly. 
  • Issues with credential prompts. 
  • Issues when downloading files. 
 
Resolved: This issue was resolved in KB4493509

Back to top
OS Build 17763.253

January 08, 2019
KB4480116
Resolved
KB4493509
Resolved:
April 09, 2019
10:00 AM PT

Opened:
January 08, 2019
10:00 AM PT
MSXML6 may cause applications to stop responding
After installing KB4480116, MSXML6 causes applications to stop responding if an exception was thrown during node operations, such as appendChild(), insertBefore(), and moveNode().
 
The Group Policy editor may stop responding when editing a Group Policy Object (GPO) that contains Group Policy Preferences (GPP) for Internet Explorer 10 settings. 

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10, version 1607; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 10 Enterprise LTSB 2015; Windows 8.1
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2; Windows Server 2012
Resolved: This issue was resolved in KB4493509

Back to top
OS Build 17763.253

January 08, 2019
KB4480116
Resolved
KB4493509
Resolved:
April 09, 2019
10:00 AM PT

Opened:
January 08, 2019
10:00 AM PT
" diff --git a/windows/release-information/status-windows-7-and-windows-server-2008-r2-sp1.yml b/windows/release-information/status-windows-7-and-windows-server-2008-r2-sp1.yml index a89d0a6a0d..ed51da92e0 100644 --- a/windows/release-information/status-windows-7-and-windows-server-2008-r2-sp1.yml +++ b/windows/release-information/status-windows-7-and-windows-server-2008-r2-sp1.yml @@ -47,7 +47,7 @@ sections: - items: - type: markdown text: " - + " - items: - type: markdown @@ -60,17 +60,16 @@ sections: - type: markdown text: "
This table offers a summary of current active issues and those issues that have been resolved in the last 30 days.
- - - - - - - - - - - + + + + + + + + + +
SummaryOriginating updateStatusLast updated
System may be unresponsive after restart if Avira antivirus software installed.
Devices with Avira antivirus software installed may become unresponsive upon restart.

See details >
April 09, 2019
KB4493472
Investigating
April 09, 2019
10:00 AM PT
System may be unresponsive after restart with certain McAfee antivirus products
Devices with McAfee Endpoint Security Threat Prevention 10.x, Host Intrusion Prevention 8.0, or VirusScan Enterprise 8.8 may be slow or unresponsive at startup.

See details >
April 09, 2019
KB4493472
Mitigated
April 26, 2019
11:41 AM PT
Authentication may fail for services after the Kerberos ticket expires.
Authentication may fail for services that require unconstrained delegation after the Kerberos ticket expires.

See details >
March 12, 2019
KB4489878
Mitigated
April 09, 2019
10:00 AM PT
System unresponsive after restart if Sophos Endpoint Protection installed.
Devices with Sophos Endpoint Protection installed and managed by Sophos Central or Sophos Enterprise Console (SEC) may become unresponsive upon restart.

See details >
April 09, 2019
KB4493472
Mitigated
April 09, 2019
10:00 AM PT
System may be unresponsive after restart if ArcaBit antivirus software installed.
Devices with ArcaBit antivirus software installed may become unresponsive upon restart.

See details >
April 09, 2019
KB4493472
Mitigated
April 09, 2019
10:00 AM PT
Virtual machines fail to restore.
Virtual machines (VMs) may fail to restore successfully if the VM has been saved and restored once before.

See details >
January 08, 2019
KB4480970
Resolved
KB4490511
April 21, 2019
12:00 AM PT
Local Administrators unable to remotely access shares.
Local users who are part of the local Administrators group may not be able to remotely access shares on Windows Server 2008 R2 and Windows 7 machines.

See details >
January 08, 2019
KB4480970
Resolved
KB4487345
April 20, 2019
11:53 PM PT
Internet Explorer 11 authentication issue with multiple concurrent logons.
Internet Explorer 11 users may encounter issues if two or more people use the same user account for multiple, concurrent login sessions on the same Windows Server machine.

See details >
January 08, 2019
KB4480970
Resolved
KB4493472
April 09, 2019
10:00 AM PT
Custom URI schemes may not start corresponding application.
Custom URI schemes for application protocol handlers may not start the corresponding application for local intranet and trusted sites in Internet Explorer.

See details >
March 12, 2019
KB4489878
Resolved
KB4493472
April 09, 2019
10:00 AM PT
NETDOM.EXE fails to run.
NETDOM.EXE fails to run and the error, “The command failed to complete successfully.” appears on screen.

See details >
March 12, 2019
KB4489878
Resolved
KB4493472
April 09, 2019
10:00 AM PT
Devices may not respond at login or Welcome screen if running certain Avast software.
Devices running Avast for Business, Avast CloudCare, and AVG Business Edition antivirus software may become unresponsive after restart.

See details >
April 09, 2019
KB4493472
Resolved
April 09, 2019
10:00 AM PT
System may be unresponsive after restart if Avira antivirus software installed
Devices with Avira antivirus software installed may become unresponsive upon restart.

See details >
April 09, 2019
KB4493472
Investigating
April 09, 2019
10:00 AM PT
System may be unresponsive after restart with certain McAfee antivirus products
Devices with McAfee Endpoint Security Threat Prevention 10.x, Host Intrusion Prevention 8.0, or VirusScan Enterprise 8.8 may be slow or unresponsive at startup.

See details >
April 09, 2019
KB4493472
Mitigated
April 18, 2019
05:00 PM PT
Authentication may fail for services after the Kerberos ticket expires
Authentication may fail for services that require unconstrained delegation after the Kerberos ticket expires.

See details >
March 12, 2019
KB4489878
Mitigated
April 09, 2019
10:00 AM PT
System unresponsive after restart if Sophos Endpoint Protection installed
Devices with Sophos Endpoint Protection installed and managed by Sophos Central or Sophos Enterprise Console (SEC) may become unresponsive upon restart.

See details >
April 09, 2019
KB4493472
Mitigated
April 09, 2019
10:00 AM PT
System may be unresponsive after restart if ArcaBit antivirus software installed
Devices with ArcaBit antivirus software installed may become unresponsive upon restart.

See details >
April 09, 2019
KB4493472
Mitigated
April 09, 2019
10:00 AM PT
Internet Explorer 11 authentication issue with multiple concurrent logons
Internet Explorer 11 users may encounter issues if two or more people use the same user account for multiple, concurrent login sessions on the same Windows Server machine.

See details >
January 08, 2019
KB4480970
Resolved
KB4493472
April 09, 2019
10:00 AM PT
Custom URI schemes may not start corresponding application
Custom URI schemes for application protocol handlers may not start the corresponding application for local intranet and trusted sites in Internet Explorer.

See details >
March 12, 2019
KB4489878
Resolved
KB4493472
April 09, 2019
10:00 AM PT
NETDOM.EXE fails to run
NETDOM.EXE fails to run and the error, “The command failed to complete successfully.” appears on screen.

See details >
March 12, 2019
KB4489878
Resolved
KB4493472
April 09, 2019
10:00 AM PT
Devices may not respond at login or Welcome screen if running certain Avast software
Devices running Avast for Business, Avast CloudCare, and AVG Business Edition antivirus software may become unresponsive after restart.

See details >
April 09, 2019
KB4493472
Resolved
April 09, 2019
10:00 AM PT
Embedded objects may display incorrectly
Any compound document (OLE) server application that places embedded objects into the Windows Metafile (WMF) using the PatBlt API may display embedded objects incorrectly.

See details >
February 12, 2019
KB4486563
Resolved
KB4493472
April 09, 2019
10:00 AM PT
" @@ -86,11 +85,11 @@ sections: - type: markdown text: " - - - - - + + + + +
DetailsOriginating updateStatusHistory
System may be unresponsive after restart if Avira antivirus software installed.
Microsoft and Avira have identified an issue on devices with Avira antivirus software installed that may cause the system to become unresponsive upon restart after installing KB4493472.

Microsoft has temporarily blocked devices from receiving this update if Avira antivirus software is installed.

Affected platforms: 
  • Client: Windows 8.1; Windows 7 SP1 
  • Server: Windows Server 2012 R2; Windows Server 2012; Windows Server 2008 R2 SP1; Windows Server 2008 SP2
Next steps: We are presently investigating this issue with Avira and will provide an update when available.

Back to top
April 09, 2019
KB4493472
Investigating
Last updated:
April 09, 2019
10:00 AM PT

Opened:
April 09, 2019
10:00 AM PT
System may be unresponsive after restart with certain McAfee antivirus products
Microsoft and McAfee have identified an issue on devices with McAfee Endpoint Security (ENS) Threat Prevention 10.x or McAfee Host Intrusion Prevention (Host IPS) 8.0 or McAfee VirusScan Enterprise (VSE) 8.8 installed. It may cause the system to have slow startup or become unresponsive at restart after installing this update. 

Affected platforms:
  • Client: Windows 7 SP1
  • Server: Windows Server 2008 R2 SP1
Workaround: Guidance for McAfee customers can be found in the following McAfee support articles: 

Next steps: We are presently investigating this issue with McAfee. We will provide an update once we have more information.

Back to top
April 09, 2019
KB4493472
Mitigated
Last updated:
April 26, 2019
11:41 AM PT

Opened:
April 26, 2019
11:41 AM PT
System unresponsive after restart if Sophos Endpoint Protection installed.
Microsoft and Sophos have identified an issue on devices with Sophos Endpoint Protection installed and managed by either Sophos Central or Sophos Enterprise Console (SEC) that may cause the system to become unresponsive upon restart after installing KB4493472.

Microsoft has temporarily blocked devices from receiving this update if the Sophos Endpoint is installed until a solution is available.

Affected platforms: 
  • Client: Windows 8.1; Windows 7 SP1
  • Server: Windows Server 2012 R2; Windows Server 2012; Windows Server 2008 R2 SP1; Windows Server 2008 SP2
Guidance for Sophos Endpoint and Sophos Enterprise Console customers can be found in the Sophos support article.

Back to top
April 09, 2019
KB4493472
Mitigated
Last updated:
April 09, 2019
10:00 AM PT

Opened:
April 09, 2019
10:00 AM PT
System may be unresponsive after restart if ArcaBit antivirus software installed.
Microsoft and ArcaBit have identified an issue on devices with ArcaBit antivirus software installed that may cause the system to become unresponsive upon restart after installing KB4493472.

Microsoft has temporarily blocked devices from receiving this update if ArcaBit antivirus software is installed.

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 8.1; Windows 7 SP1
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server 2012 R2; Windows Server 2008 R2 SP1
ArcaBit has released an update to address this issue. For more information, see the Arcabit support article.

Back to top
April 09, 2019
KB4493472
Mitigated
Last updated:
April 09, 2019
10:00 AM PT

Opened:
April 09, 2019
10:00 AM PT
Devices may not respond at login or Welcome screen if running certain Avast software.
Microsoft and Avast have identified an issue on devices running Avast for Business, Avast CloudCare, and AVG Business Edition antivirus software after you install KB4493472 and restart. Devices may become unresponsive at the login or Welcome screen. Additionally, you may be unable to log in or log in after an extended period of time.

Affected platforms: 
  • Client: Windows 8.1; Windows 7 SP1 
  • Server: Windows Server 2012 R2; Windows Server 2008 R2 SP1 
Resolution: Avast has released emergency updates to address this issue. For more information and AV update schedule, see the Avast support KB article.

Back to top
April 09, 2019
KB4493472
Resolved
Resolved:
April 09, 2019
10:00 AM PT

Opened:
April 09, 2019
10:00 AM PT
System may be unresponsive after restart if Avira antivirus software installed
Microsoft and Avira have identified an issue on devices with Avira antivirus software installed that may cause the system to become unresponsive upon restart after installing KB4493472.

Microsoft has temporarily blocked devices from receiving this update if Avira antivirus software is installed.

Affected platforms: 
  • Client: Windows 8.1; Windows 7 SP1 
  • Server: Windows Server 2012 R2; Windows Server 2012; Windows Server 2008 R2 SP1; Windows Server 2008 SP2
Next steps: We are presently investigating this issue with Avira and will provide an update when available.

Back to top
April 09, 2019
KB4493472
Investigating
Last updated:
April 09, 2019
10:00 AM PT

Opened:
April 09, 2019
10:00 AM PT
System may be unresponsive after restart with certain McAfee antivirus products
Microsoft and McAfee have identified an issue on devices with McAfee Endpoint Security (ENS) Threat Prevention 10.x or McAfee Host Intrusion Prevention (Host IPS) 8.0 or McAfee VirusScan Enterprise (VSE) 8.8 installed. It may cause the system to have slow startup or become unresponsive at restart after installing this update. 

Affected platforms:
  • Client: Windows 7 SP1
  • Server: Windows Server 2008 R2 SP1
Workaround: Guidance for McAfee customers can be found in the following McAfee support articles: 
Next steps: We are presently investigating this issue with McAfee. We will provide an update once we have more information.

Back to top
April 09, 2019
KB4493472
Mitigated
Last updated:
April 18, 2019
05:00 PM PT

Opened:
April 09, 2019
10:00 AM PT
System unresponsive after restart if Sophos Endpoint Protection installed
Microsoft and Sophos have identified an issue on devices with Sophos Endpoint Protection installed and managed by either Sophos Central or Sophos Enterprise Console (SEC) that may cause the system to become unresponsive upon restart after installing KB4493472.

Microsoft has temporarily blocked devices from receiving this update if the Sophos Endpoint is installed until a solution is available.

Affected platforms: 
  • Client: Windows 8.1; Windows 7 SP1
  • Server: Windows Server 2012 R2; Windows Server 2012; Windows Server 2008 R2 SP1; Windows Server 2008 SP2
Guidance for Sophos Endpoint and Sophos Enterprise Console customers can be found in the Sophos support article.

Back to top
April 09, 2019
KB4493472
Mitigated
Last updated:
April 09, 2019
10:00 AM PT

Opened:
April 09, 2019
10:00 AM PT
System may be unresponsive after restart if ArcaBit antivirus software installed
Microsoft and ArcaBit have identified an issue on devices with ArcaBit antivirus software installed that may cause the system to become unresponsive upon restart after installing KB4493472.

Microsoft has temporarily blocked devices from receiving this update if ArcaBit antivirus software is installed.

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 8.1; Windows 7 SP1
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server 2012 R2; Windows Server 2008 R2 SP1
Workaround: ArcaBit has released an update to address this issue. For more information, see the Arcabit support article.

Back to top
April 09, 2019
KB4493472
Mitigated
Last updated:
April 09, 2019
10:00 AM PT

Opened:
April 09, 2019
10:00 AM PT
Devices may not respond at login or Welcome screen if running certain Avast software
Microsoft and Avast have identified an issue on devices running Avast for Business, Avast CloudCare, and AVG Business Edition antivirus software after you install KB4493472 and restart. Devices may become unresponsive at the login or Welcome screen. Additionally, you may be unable to log in or log in after an extended period of time.

Affected platforms: 
  • Client: Windows 8.1; Windows 7 SP1 
  • Server: Windows Server 2012 R2; Windows Server 2008 R2 SP1 
Resolution: Avast has released emergency updates to address this issue. For more information and AV update schedule, see the Avast support KB article.

Back to top
April 09, 2019
KB4493472
Resolved
Resolved:
April 09, 2019
10:00 AM PT

Opened:
April 09, 2019
10:00 AM PT
" @@ -99,9 +98,18 @@ sections: - type: markdown text: " - - - + + + +
DetailsOriginating updateStatusHistory
Authentication may fail for services after the Kerberos ticket expires.
After installing KB4489878, some customers report that authentication fails for services that require unconstrained delegation after the Kerberos ticket expires (the default is 10 hours). For example, the SQL server service fails.

Affected platforms: 
  • Client: Windows 7 SP1
  • Server: Windows Server 2008 R2 SP1; Windows Server 2008 SP2
Workaround: To mitigate this issue, use one of the following options:

  • Option 1: Purge the Kerberos tickets on the application server. After the Kerberos ticket expires, the issue will occur again, and you must purge the tickets again.
  • Option 2: If purging does not mitigate the issue, restart the application; for example, restart the Internet Information Services (IIS) app pool associated with the SQL server.
  • Option 3: Use constrained delegation.
Next steps: Microsoft is working on a resolution and will provide an update in an upcoming release.

Back to top
March 12, 2019
KB4489878
Mitigated
Last updated:
April 09, 2019
10:00 AM PT

Opened:
March 12, 2019
10:00 AM PT
Custom URI schemes may not start corresponding application.
After installing KB4489878, custom URI schemes for application protocol handlers may not start the corresponding application for local intranet and trusted sites on Internet Explorer.

Affected platforms: 
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10, version 1607; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 10 Enterprise LTSB 2015; Windows 8.1; Windows 7 SP1 
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2; Windows Server 2008 R2 SP1 
Resolution: This issue is resolved in KB4493472.

Back to top
March 12, 2019
KB4489878
Resolved
KB4493472
Resolved:
April 09, 2019
10:00 AM PT

Opened:
March 12, 2019
10:00 AM PT
NETDOM.EXE fails to run.
After installing KB4489878, NETDOM.EXE fails to run, and the on-screen error, “The command failed to complete successfully.” appears.

Affected platforms: 
  • Client: Windows 7 SP1
  • Server: Windows Server 2008 R2 SP1; Windows Server 2008 SP2
Resolution: This issue is resolved in KB4493472.

Back to top
March 12, 2019
KB4489878
Resolved
KB4493472
Resolved:
April 09, 2019
10:00 AM PT

Opened:
March 12, 2019
10:00 AM PT
Authentication may fail for services after the Kerberos ticket expires
After installing KB4489878, some customers report that authentication fails for services that require unconstrained delegation after the Kerberos ticket expires (the default is 10 hours). For example, the SQL server service fails.

Affected platforms: 
  • Client: Windows 7 SP1
  • Server: Windows Server 2008 R2 SP1; Windows Server 2008 SP2
Workaround: To mitigate this issue, use one of the following options:
  • Option 1: Purge the Kerberos tickets on the application server. After the Kerberos ticket expires, the issue will occur again, and you must purge the tickets again.
  • Option 2: If purging does not mitigate the issue, restart the application; for example, restart the Internet Information Services (IIS) app pool associated with the SQL server.
  • Option 3: Use constrained delegation.
Next steps: Microsoft is working on a resolution and will provide an update in an upcoming release.

Back to top
March 12, 2019
KB4489878
Mitigated
Last updated:
April 09, 2019
10:00 AM PT

Opened:
March 12, 2019
10:00 AM PT
Custom URI schemes may not start corresponding application
After installing KB4489878, custom URI schemes for application protocol handlers may not start the corresponding application for local intranet and trusted sites on Internet Explorer.

Affected platforms: 
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10, version 1607; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 10 Enterprise LTSB 2015; Windows 8.1; Windows 7 SP1 
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2; Windows Server 2008 R2 SP1 
Resolution: This issue is resolved in KB4493472.

Back to top
March 12, 2019
KB4489878
Resolved
KB4493472
Resolved:
April 09, 2019
10:00 AM PT

Opened:
March 12, 2019
10:00 AM PT
NETDOM.EXE fails to run
After installing KB4489878, NETDOM.EXE fails to run, and the on-screen error, “The command failed to complete successfully.” appears.

Affected platforms: 
  • Client: Windows 7 SP1
  • Server: Windows Server 2008 R2 SP1; Windows Server 2008 SP2
Resolution: This issue is resolved in KB4493472.

Back to top
March 12, 2019
KB4489878
Resolved
KB4493472
Resolved:
April 09, 2019
10:00 AM PT

Opened:
March 12, 2019
10:00 AM PT
+ " + +- title: February 2019 +- items: + - type: markdown + text: " + +
DetailsOriginating updateStatusHistory
Embedded objects may display incorrectly
Any compound document (OLE) server application that places embedded objects into the Windows Metafile (WMF) using the PatBlt API may display embedded objects incorrectly. 
 
For example, if you paste a Microsoft Excel worksheet object into a Microsoft Word document, the cells may render with a different background color. 
 
Affected platforms:  
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10, version 1607; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 10 Enterprise LTSB 2015; Windows 8.1; Windows 7 SP1  
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2; Windows Server 2012; Windows Server 2008 R2 SP1; Windows Server 2008 SP2  
Resolution: This issue is resolved in KB4493472

Back to top
February 12, 2019
KB4486563
Resolved
KB4493472
Resolved:
April 09, 2019
10:00 AM PT

Opened:
February 12, 2019
10:00 AM PT
" @@ -110,8 +118,6 @@ sections: - type: markdown text: " - - - +
DetailsOriginating updateStatusHistory
Virtual machines fail to restore.
After installing KB4480970, virtual machines (VM) may fail to restore successfully if the VM has been saved and restored once before. The error message is, “Failed to restore the virtual machine state: Cannot restore this virtual machine because the saved state data cannot be read. Delete the saved state data and then try to start the virtual machine. (0xC0370027).”

This affects AMD Bulldozer Family 15h, AMD Jaguar Family 16h, and AMD Puma Family 16h (second generation) microarchitectures.

Affected platforms: 
  • Client: Windows 7 SP1 
  • Server: Windows Server 2012; Windows Server 2008 R2 SP1; Windows Server 2008 SP2
Resolution: This issue is resolved in KB4490511.

Back to top
January 08, 2019
KB4480970
Resolved
KB4490511
Resolved:
February 19, 2019
02:00 PM PT

Opened:
January 08, 2019
10:00 AM PT
Local Administrators unable to remotely access shares.
Local users who are part of the local Administrators group may not be able to remotely access shares on Windows Server 2008 R2 and Windows 7 machines after installing KB4480970. This does not affect domain accounts in the local Administrators group.
 
Affected platforms: 
  • Client: Windows 7 SP1 
  • Server: Windows Server 2008 R2 SP1; Windows Server 2008 SP2 
Resolution: This issue is resolved in KB4487345.

Back to top
January 08, 2019
KB4480970
Resolved
KB4487345
Resolved:
January 11, 2019
02:00 PM PT

Opened:
January 08, 2019
10:00 AM PT
Internet Explorer 11 authentication issue with multiple concurrent logons.
After installing KB4480970, Internet Explorer 11 and other applications that use WININET.DLL may have authentication issues. This occurs when two or more people use the same user account for multiple, concurrent login sessions on the same Windows Server machine, including Remote Desktop Protocol (RDP) and Terminal Server logons. Symptoms reported by customers include, but may not be limited to:
  • Cache size and location show zero or empty.
  • Keyboard shortcuts may not work properly.
  • Webpages may intermittently fail to load or render correctly.
  • Issues with credential prompts.
  • Issues when downloading files.
Affected platforms: 
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1607; Windows 10 Enterprise LTSC 2016; Windows 8.1; Windows 7 SP1
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server 2016; Windows Server 2012 R2; Windows Server 2012; Windows Server 2008 R2 SP1
Resolution: This issue is resolved in KB4493472.

Back to top
January 08, 2019
KB4480970
Resolved
KB4493472
Resolved:
April 09, 2019
10:00 AM PT

Opened:
January 08, 2019
10:00 AM PT
Internet Explorer 11 authentication issue with multiple concurrent logons
After installing KB4480970, Internet Explorer 11 and other applications that use WININET.DLL may have authentication issues. This occurs when two or more people use the same user account for multiple, concurrent login sessions on the same Windows Server machine, including Remote Desktop Protocol (RDP) and Terminal Server logons. Symptoms reported by customers include, but may not be limited to:
  • Cache size and location show zero or empty.
  • Keyboard shortcuts may not work properly.
  • Webpages may intermittently fail to load or render correctly.
  • Issues with credential prompts.
  • Issues when downloading files.
Affected platforms: 
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1607; Windows 10 Enterprise LTSC 2016; Windows 8.1; Windows 7 SP1
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server 2016; Windows Server 2012 R2; Windows Server 2012; Windows Server 2008 R2 SP1
Resolution: This issue is resolved in KB4493472.

Back to top
January 08, 2019
KB4480970
Resolved
KB4493472
Resolved:
April 09, 2019
10:00 AM PT

Opened:
January 08, 2019
10:00 AM PT
" diff --git a/windows/release-information/status-windows-8.1-and-windows-server-2012-r2.yml b/windows/release-information/status-windows-8.1-and-windows-server-2012-r2.yml index 97b74694bf..a0427f8bcd 100644 --- a/windows/release-information/status-windows-8.1-and-windows-server-2012-r2.yml +++ b/windows/release-information/status-windows-8.1-and-windows-server-2012-r2.yml @@ -47,7 +47,7 @@ sections: - items: - type: markdown text: " - + " - items: - type: markdown @@ -61,6 +61,7 @@ sections: text: "
This table offers a summary of current active issues and those issues that have been resolved in the last 30 days.
+ @@ -86,8 +87,9 @@ sections: text: "
SummaryOriginating updateStatusLast updated
System may be unresponsive after restart if Avira antivirus software installed
Devices with Avira antivirus software installed may become unresponsive upon restart.

See details >
April 09, 2019
KB4493446
Investigating
April 09, 2019
10:00 AM PT
System may be unresponsive after restart with certain McAfee antivirus products
Devices with McAfee Endpoint Security Threat Prevention 10.x, Host Intrusion Prevention 8.0, or VirusScan Enterprise 8.8 may be slow or unresponsive at startup.

See details >
April 09, 2019
KB4493446
Mitigated
April 25, 2019
02:00 PM PT
Issue using PXE to start a device from WDS
There may be issues using the Preboot Execution Environment (PXE) to start a device from a Windows Deployment Services (WDS) server configured to use Variable Window Extension.

See details >
March 12, 2019
KB4489881
Mitigated
April 09, 2019
10:00 AM PT
System unresponsive after restart if Sophos Endpoint Protection installed
Devices with Sophos Endpoint Protection installed and managed by Sophos Central or Sophos Enterprise Console (SEC) may become unresponsive upon restart.

See details >
April 09, 2019
KB4493446
Mitigated
April 09, 2019
10:00 AM PT
System may be unresponsive after restart if ArcaBit antivirus software installed
Devices with ArcaBit antivirus software installed may become unresponsive upon restart.

See details >
April 09, 2019
KB4493446
Mitigated
April 09, 2019
10:00 AM PT
+ - +
DetailsOriginating updateStatusHistory
System may be unresponsive after restart if Avira antivirus software installed
Microsoft and Avira have identified an issue on devices with Avira antivirus software installed that may cause the system to become unresponsive upon restart after installing KB4493446.

Microsoft has temporarily blocked devices from receiving this update if Avira antivirus software is installed.

Affected platforms: 
  • Client: Windows 8.1; Windows 7 SP1 
  • Server: Windows Server 2012 R2; Windows Server 2012; Windows Server 2008 R2 SP1; Windows Server 2008 SP2 
Next steps: We are presently investigating this issue with Avira and will provide an update when available.

Back to top
April 09, 2019
KB4493446
Investigating
Last updated:
April 09, 2019
10:00 AM PT

Opened:
April 09, 2019
10:00 AM PT
System may be unresponsive after restart with certain McAfee antivirus products
Microsoft and McAfee have identified an issue on devices with McAfee Endpoint Security (ENS) Threat Prevention 10.x or McAfee Host Intrusion Prevention (Host IPS) 8.0 or McAfee VirusScan Enterprise (VSE) 8.8 installed. It may cause the system to have slow startup or become unresponsive at restart after installing this update. 
 
Workaround: Guidance for McAfee customers can be found in the following McAfee support articles:  
Next steps: We are presently investigating this issue with McAfee. We will provide an update once we have more information. 

Back to top
April 09, 2019
KB4493446
Mitigated
Last updated:
April 25, 2019
02:00 PM PT

Opened:
April 09, 2019
10:00 AM PT
System unresponsive after restart if Sophos Endpoint Protection installed
Microsoft and Sophos have identified an issue on devices with Sophos Endpoint Protection installed and managed by either Sophos Central or Sophos Enterprise Console (SEC) that may cause the system to become unresponsive upon restart after installing KB4493446.

Microsoft has temporarily blocked devices from receiving this update if the Sophos Endpoint is installed until a solution is available.

Affected platforms: 
  • Client: Windows 8.1; Windows 7 SP1
  • Server: Windows Server 2012 R2; Windows Server 2012; Windows Server 2008 R2 SP1; Windows Server 2008 SP2
Guidance for Sophos Endpoint and Sophos Enterprise Console customers can be found in the Sophos support article.

Back to top
April 09, 2019
KB4493446
Mitigated
Last updated:
April 09, 2019
10:00 AM PT

Opened:
April 09, 2019
10:00 AM PT
System may be unresponsive after restart if ArcaBit antivirus software installed
Microsoft and ArcaBit have identified an issue on devices with ArcaBit antivirus software installed that may cause the system to become unresponsive upon restart after installing KB4493446.

Microsoft has temporarily blocked devices from receiving this update if ArcaBit antivirus software is installed.

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 8.1; Windows 7 SP1
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server 2012 R2; Windows Server 2008 R2 SP1
ArcaBit has released an update to address this issue. For more information, see the Arcabit support article.

Back to top
April 09, 2019
KB4493446
Mitigated
Last updated:
April 09, 2019
10:00 AM PT

Opened:
April 09, 2019
10:00 AM PT
System may be unresponsive after restart if ArcaBit antivirus software installed
Microsoft and ArcaBit have identified an issue on devices with ArcaBit antivirus software installed that may cause the system to become unresponsive upon restart after installing KB4493446.

Microsoft has temporarily blocked devices from receiving this update if ArcaBit antivirus software is installed.

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 8.1; Windows 7 SP1
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server 2012 R2; Windows Server 2008 R2 SP1
Workaround: ArcaBit has released an update to address this issue. For more information, see the Arcabit support article.

Back to top
April 09, 2019
KB4493446
Mitigated
Last updated:
April 09, 2019
10:00 AM PT

Opened:
April 09, 2019
10:00 AM PT
Certain operations performed on a Cluster Shared Volume may fail
Certain operations, such as rename, that you perform on files or folders that are on a Cluster Shared Volume (CSV) may fail with the error, “STATUS_BAD_IMPERSONATION_LEVEL (0xC00000A5)”. This occurs when you perform the operation on a CSV owner node from a process that doesn’t have administrator privilege.

Affected platforms: 
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10, version 1607; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 10 Enterprise LTSB 2015; Windows 8.1
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2; Windows Server 2012
Workaround: Do one of the following:
  • Perform the operation from a process that has administrator privilege.
  • Perform the operation from a node that doesn’t have CSV ownership.
Next steps: Microsoft is working on a resolution and will provide an update in an upcoming release.

Back to top
April 09, 2019
KB4493446
Mitigated
Last updated:
April 09, 2019
10:00 AM PT

Opened:
April 09, 2019
10:00 AM PT
Devices may not respond at login or Welcome screen if running certain Avast software
Microsoft and Avast have identified an issue on devices running Avast for Business, Avast CloudCare, and AVG Business Edition antivirus software after you install KB4493446 and restart. Devices may become unresponsive at the login or Welcome screen. Additionally, you may be unable to log in or log in after an extended period of time.

Affected platforms: 
  • Client: Windows 8.1; Windows 7 SP1 
  • Server: Windows Server 2012 R2; Windows Server 2008 R2 SP1 
Resolution: Avast has released emergency updates to address this issue. For more information and AV update schedule, see the Avast support KB article.

Back to top
April 09, 2019
KB4493446
Resolved
Resolved:
April 09, 2019
10:00 AM PT

Opened:
April 09, 2019
10:00 AM PT
@@ -98,8 +100,8 @@ sections: - type: markdown text: " - +
DetailsOriginating updateStatusHistory
Issue using PXE to start a device from WDS
After installing KB4489881, there may be issues using the Preboot Execution Environment (PXE) to start a device from a Windows Deployment Services (WDS) server configured to use Variable Window Extension. This may cause the connection to the WDS server to terminate prematurely while downloading the image. This issue does not affect clients or devices that are not using Variable Window Extension.

Affected platforms: 
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1607; Windows 10 Enterprise LTSC 2016; Windows 8.1 
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server 2016; Windows Server 2012 R2; Windows Server 2012 
Workaround: To mitigate the issue, disable the Variable Window Extension on WDS server using one of the following options:
Option 1:
Open an Administrator Command prompt and type the following:
Wdsutil /Set-TransportServer /EnableTftpVariableWindowExtension:No
-
Option 2:
Use the Windows Deployment Services UI to make the following adjustment:
  1. Open Windows Deployment Services from Windows Administrative Tools.
  2. Expand Servers and right-click a WDS server.
  3. Open its properties and clear the Enable Variable Window Extension box on the TFTP tab.
Option 3:
Set the following registry value to 0:
HKLM\\System\\CurrentControlSet\\Services\\WDSServer\\Providers\\WDSTFTP\\EnableVariableWindowExtension
Restart the WDSServer service after disabling the Variable Window Extension.

Next steps: Microsoft is working on a resolution and will provide an update in an upcoming release.

Back to top
March 12, 2019
KB4489881
Mitigated
Last updated:
April 09, 2019
10:00 AM PT

Opened:
March 12, 2019
10:00 AM PT
Issue using PXE to start a device from WDS
After installing KB4489881, there may be issues using the Preboot Execution Environment (PXE) to start a device from a Windows Deployment Services (WDS) server configured to use Variable Window Extension. This may cause the connection to the WDS server to terminate prematurely while downloading the image. This issue does not affect clients or devices that are not using Variable Window Extension.

Affected platforms: 
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1607; Windows 10 Enterprise LTSC 2016; Windows 8.1 
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server 2016; Windows Server 2012 R2; Windows Server 2012 
Workaround: To mitigate the issue, disable the Variable Window Extension on WDS server using one of the following options:

Option 1:
Open an Administrator Command prompt and type the following:
Wdsutil /Set-TransportServer /EnableTftpVariableWindowExtension:No
+

Option 2:
Use the Windows Deployment Services UI to make the following adjustment:
  1. Open Windows Deployment Services from Windows Administrative Tools.
  2. Expand Servers and right-click a WDS server.
  3. Open its properties and clear the Enable Variable Window Extension box on the TFTP tab.
Option 3:
Set the following registry value to 0:
HKLM\\System\\CurrentControlSet\\Services\\WDSServer\\Providers\\WDSTFTP\\EnableVariableWindowExtension

Restart the WDSServer service after disabling the Variable Window Extension.

Next steps: Microsoft is working on a resolution and will provide an update in an upcoming release.

Back to top
March 12, 2019
KB4489881
Mitigated
Last updated:
April 09, 2019
10:00 AM PT

Opened:
March 12, 2019
10:00 AM PT
Custom URI schemes may not start corresponding application
After installing KB4489881, custom URI schemes for application protocol handlers may not start the corresponding application for local intranet and trusted sites security zones on Internet Explorer.

Affected platforms: 
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10, version 1607; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 10 Enterprise LTSB 2015; Windows 8.1; Windows 7 SP1 
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2; Windows Server 2008 R2 SP1 
Resolution: This issue is resolved in KB4493446.

Back to top
March 12, 2019
KB4489881
Resolved
KB4493446
Resolved:
April 09, 2019
10:00 AM PT

Opened:
March 12, 2019
10:00 AM PT
" diff --git a/windows/release-information/status-windows-server-2008-sp2.yml b/windows/release-information/status-windows-server-2008-sp2.yml index 77e85e5cb0..df8fb044a5 100644 --- a/windows/release-information/status-windows-server-2008-sp2.yml +++ b/windows/release-information/status-windows-server-2008-sp2.yml @@ -47,7 +47,7 @@ sections: - items: - type: markdown text: " - + " - items: - type: markdown @@ -62,7 +62,7 @@ sections: - +
SummaryOriginating updateStatusLast updated
System may be unresponsive after restart if Avira antivirus software installed
Devices with Avira antivirus software installed may become unresponsive upon restart.

See details >
April 09, 2019
KB4493471
Investigating
April 09, 2019
10:00 AM PT
System unresponsive after restart if Sophos Endpoint Protection installed
Devices with Sophos Endpoint Protection installed and managed by Sophos Central or Sophos Enterprise Console (SEC) may become unresponsive upon restart.

See details >
April 09, 2019
KB4493471
Mitigated
April 09, 2019
10:00 AM PT
Authentication may fail for services after the Kerberos ticket expires
Authentication may fail for services that require unconstrained delegation after the Kerberos ticket expires.

See details >
March 12, 2019
KB4489880
Mitigated
March 12, 2019
10:00 AM PT
Authentication may fail for services after the Kerberos ticket expires
Authentication may fail for services that require unconstrained delegation after the Kerberos ticket expires.

See details >
March 12, 2019
KB4489880
Mitigated
April 09, 2019
10:00 AM PT
Embedded objects may display incorrectly
Any compound document (OLE) server application that places embedded objects into the Windows Metafile (WMF) using the PatBlt API may display embedded objects incorrectly.

See details >
February 12, 2019
KB4487023
Resolved
KB4493471
April 09, 2019
10:00 AM PT
NETDOM.EXE fails to run
NETDOM.EXE fails to run and the error, “The command failed to complete successfully.” appears on screen.

See details >
March 12, 2019
KB4489880
Resolved
KB4493471
April 09, 2019
10:00 AM PT
@@ -90,7 +90,7 @@ sections: - type: markdown text: " - +
DetailsOriginating updateStatusHistory
Authentication may fail for services after the Kerberos ticket expires
After installing KB4489880, some customers report that authentication fails for services that require unconstrained delegation after the Kerberos ticket expires (the default is 10 hours). For example, the SQL server service fails.

Affected platforms: 
  • Client: Windows 7 SP1
  • Server: Windows Server 2008 R2 SP1; Windows Server 2008 SP2
Workaround: To mitigate this issue, use one of the following options:
  • Option 1: Purge the Kerberos tickets on the application server. After the Kerberos ticket expires, the issue will occur again, and you must purge the tickets again.
  • Option 2: If purging does not mitigate the issue, restart the application; for example, restart the Internet Information Services (IIS) app pool associated with the SQL server.
  • Option 3: Use constrained delegation.
Next steps: Microsoft is working on a resolution and will provide an update in an upcoming release.

Back to top
March 12, 2019
KB4489880
Mitigated
Last updated:
March 12, 2019
10:00 AM PT

Opened:
March 12, 2019
10:00 AM PT
Authentication may fail for services after the Kerberos ticket expires
After installing KB4489880, some customers report that authentication fails for services that require unconstrained delegation after the Kerberos ticket expires (the default is 10 hours). For example, the SQL server service fails.

Affected platforms: 
  • Client: Windows 7 SP1
  • Server: Windows Server 2008 R2 SP1; Windows Server 2008 SP2
Workaround: To mitigate this issue, use one of the following options:
  • Option 1: Purge the Kerberos tickets on the application server. After the Kerberos ticket expires, the issue will occur again, and you must purge the tickets again.
  • Option 2: If purging does not mitigate the issue, restart the application; for example, restart the Internet Information Services (IIS) app pool associated with the SQL server.
  • Option 3: Use constrained delegation.
Next steps: Microsoft is working on a resolution and will provide an update in an upcoming release.

Back to top
March 12, 2019
KB4489880
Mitigated
Last updated:
April 09, 2019
10:00 AM PT

Opened:
March 12, 2019
10:00 AM PT
NETDOM.EXE fails to run
After installing KB4489880, NETDOM.EXE fails to run, and the on-screen error, “The command failed to complete successfully.” appears.

Affected platforms: 
  • Client: Windows 7 SP1
  • Server: Windows Server 2008 R2 SP1; Windows Server 2008 SP2
Resolution: This issue is resolved in KB4493471.

Back to top
March 12, 2019
KB4489880
Resolved
KB4493471
Resolved:
April 09, 2019
10:00 AM PT

Opened:
March 12, 2019
10:00 AM PT
" diff --git a/windows/release-information/status-windows-server-2012.yml b/windows/release-information/status-windows-server-2012.yml index beff36b8b8..f108e183ac 100644 --- a/windows/release-information/status-windows-server-2012.yml +++ b/windows/release-information/status-windows-server-2012.yml @@ -47,7 +47,7 @@ sections: - items: - type: markdown text: " - + " - items: - type: markdown @@ -62,8 +62,8 @@ sections: + - @@ -83,7 +83,8 @@ sections: text: "
SummaryOriginating updateStatusLast updated
System may be unresponsive after restart if Avira antivirus software installed
Devices with Avira antivirus software installed may become unresponsive upon restart.

See details >
April 09, 2019
KB4493451
Investigating
April 09, 2019
10:00 AM PT
System unresponsive after restart if Sophos Endpoint Protection installed
Devices with Sophos Endpoint Protection installed and managed by Sophos Central or Sophos Enterprise Console (SEC) may become unresponsive upon restart.

See details >
April 09, 2019
KB4493451
Mitigated
April 09, 2019
10:00 AM PT
Certain operations performed on a Cluster Shared Volume may fail
Certain operations, such as rename, performed on files or folders on a Cluster Shared Volume (CSV) may fail with the error, “STATUS_BAD_IMPERSONATION_LEVEL (0xC00000A5)”.

See details >
January 08, 2019
KB4480975
Mitigated
April 09, 2019
10:00 AM PT
Issue using PXE to start a device from WDS
There may be issues using the Preboot Execution Environment (PXE) to start a device from a Windows Deployment Services (WDS) server configured to use Variable Window Extension.

See details >
March 12, 2019
KB4489891
Mitigated
March 12, 2019
10:00 AM PT
Certain operations performed on a Cluster Shared Volume may fail
Certain operations, such as rename, performed on files or folders on a Cluster Shared Volume (CSV) may fail with the error, “STATUS_BAD_IMPERSONATION_LEVEL (0xC00000A5)”.

See details >
January 08, 2019
KB4480975
Mitigated
January 08, 2019
10:00 AM PT
Internet Explorer 11 authentication issue with multiple concurrent logons
Internet Explorer 11 users may encounter issues if two or more people use the same user account for multiple, concurrent login sessions on the same Windows Server machine.

See details >
January 08, 2019
KB4480975
Resolved
KB4493451
April 09, 2019
10:00 AM PT
MSXML6 may cause applications to stop responding
MSXML6 may cause applications to stop responding if an exception was thrown during node operations, such as appendChild(), insertBefore(), and moveNode().

See details >
January 08, 2019
KB4480975
Resolved
KB4493451
April 09, 2019
10:00 AM PT
Embedded objects may display incorrectly
Any compound document (OLE) server application that places embedded objects into the Windows Metafile (WMF) using the PatBlt API may display embedded objects incorrectly.

See details >
February 12, 2019
KB4487025
Resolved
KB4493451
April 09, 2019
10:00 AM PT
- + +
DetailsOriginating updateStatusHistory
System may be unresponsive after restart if Avira antivirus software installed
Microsoft and Avira have identified an issue on devices with Avira antivirus software installed that may cause the system to become unresponsive upon restart after installing KB4493451.

Microsoft has temporarily blocked devices from receiving this update if Avira antivirus software is installed.

Affected platforms: 
  • Client: Windows 8.1; Windows 7 SP1 
  • Server: Windows Server 2012 R2; Windows Server 2012; Windows Server 2008 R2 SP1; Windows Server 2008 SP2
Next steps: We are presently investigating this issue with Avira and will provide an update when available.

Back to top
April 09, 2019
KB4493451
Investigating
Last updated:
April 09, 2019
10:00 AM PT

Opened:
April 09, 2019
10:00 AM PT
System unresponsive after restart if Sophos Endpoint Protection installed
Microsoft and Sophos have identified an issue on devices with Sophos Endpoint Protection installed and managed by either Sophos Central or Sophos Enterprise Console (SEC) that may cause the system to become unresponsive upon restart after installing KB4493451.

Microsoft has temporarily blocked devices from receiving this update if the Sophos Endpoint is installed until a solution is available.

Affected platforms: 
  • Client: Windows 8.1; Windows 7 SP1
  • Server: Windows Server 2012 R2; Windows Server 2012; Windows Server 2008 R2 SP1; Windows Server 2008 SP2
Guidance for Sophos Endpoint and Sophos Enterprise Console customers can be found in the Sophos support article.

Back to top
April 09, 2019
KB4493451
Mitigated
Last updated:
April 09, 2019
10:00 AM PT

Opened:
April 09, 2019
10:00 AM PT
System unresponsive after restart if Sophos Endpoint Protection installed
Microsoft and Sophos have identified an issue on devices with Sophos Endpoint Protection installed and managed by either Sophos Central or Sophos Enterprise Console (SEC) that may cause the system to become unresponsive upon restart after installing KB4493451.

Microsoft has temporarily blocked devices from receiving this update if the Sophos Endpoint is installed until a solution is available.

Affected platforms: 
  • Client: Windows 8.1; Windows 7 SP1
  • Server: Windows Server 2012 R2; Windows Server 2012; Windows Server 2008 R2 SP1; Windows Server 2008 SP2
Guidance for Sophos Endpoint and Sophos Enterprise Console customers can be found in the Sophos support article.

Back to top
April 09, 2019
KB4493451
Mitigated
Last updated:
April 09, 2019
10:00 AM PT

Opened:
April 09, 2019
10:00 AM PT
Certain operations performed on a Cluster Shared Volume may fail
Certain operations, such as rename, that you perform on files or folders that are on a Cluster Shared Volume (CSV) may fail with the error, \"STATUS_BAD_IMPERSONATION_LEVEL (0xC00000A5)\". This occurs when you perform the operation on a CSV owner node from a process that doesn’t have administrator privilege.

Affected platforms: 
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10, version 1607; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 10 Enterprise LTSB 2015; Windows 8.1
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2; Windows Server 2012
Workaround: Do one of the following:
  • Perform the operation from a process that has administrator privilege.
  • Perform the operation from a node that doesn’t have CSV ownership.
Next steps: Microsoft is working on a resolution and will provide an update in an upcoming release.

Back to top
January 08, 2019
KB4480975
Mitigated
Last updated:
April 09, 2019
10:00 AM PT

Opened:
April 09, 2019
10:00 AM PT
" @@ -92,8 +93,8 @@ sections: - type: markdown text: " - +
DetailsOriginating updateStatusHistory
Issue using PXE to start a device from WDS
After installing KB4489891, there may be issues using the Preboot Execution Environment (PXE) to start a device from a Windows Deployment Services (WDS) server configured to use Variable Window Extension. This may cause the connection to the WDS server to terminate prematurely while downloading the image. This issue does not affect clients or devices that are not using Variable Window Extension.

Affected platforms: 
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1607; Windows 10 Enterprise LTSC 2016; Windows 8.1 
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server 2016; Windows Server 2012 R2; Windows Server 2012 
Workaround: To mitigate the issue, disable the Variable Window Extension on WDS server using one of the following options:
Option 1:
Open an Administrator Command prompt and type the following:
Wdsutil /Set-TransportServer /EnableTftpVariableWindowExtension:No
-
Option 2:
Use the Windows Deployment Services UI to make the following adjustment:
  1. Open Windows Deployment Services from Windows Administrative Tools.
  2. Expand Servers and right-click a WDS server.
  3. Open its properties and clear the Enable Variable Window Extension box on the TFTP tab.
Option 3:
Set the following registry value to 0:
HKLM\\System\\CurrentControlSet\\Services\\WDSServer\\Providers\\WDSTFTP\\EnableVariableWindowExtension
Restart the WDSServer service after disabling the Variable Window Extension.

Next steps: Microsoft is working on a resolution and will provide an update in an upcoming release.

Back to top
March 12, 2019
KB4489891
Mitigated
Last updated:
March 12, 2019
10:00 AM PT

Opened:
March 12, 2019
10:00 AM PT
Issue using PXE to start a device from WDS
After installing KB4489891, there may be issues using the Preboot Execution Environment (PXE) to start a device from a Windows Deployment Services (WDS) server configured to use Variable Window Extension. This may cause the connection to the WDS server to terminate prematurely while downloading the image. This issue does not affect clients or devices that are not using Variable Window Extension.

Affected platforms: 
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1607; Windows 10 Enterprise LTSC 2016; Windows 8.1 
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server 2016; Windows Server 2012 R2; Windows Server 2012 
Workaround: To mitigate the issue, disable the Variable Window Extension on WDS server using one of the following options:

Option 1:
Open an Administrator Command prompt and type the following:
Wdsutil /Set-TransportServer /EnableTftpVariableWindowExtension:No
+

Option 2:
Use the Windows Deployment Services UI to make the following adjustment:
  1. Open Windows Deployment Services from Windows Administrative Tools.
  2. Expand Servers and right-click a WDS server.
  3. Open its properties and clear the Enable Variable Window Extension box on the TFTP tab.
Option 3:
Set the following registry value to 0:
HKLM\\System\\CurrentControlSet\\Services\\WDSServer\\Providers\\WDSTFTP\\EnableVariableWindowExtension

Restart the WDSServer service after disabling the Variable Window Extension.

Next steps: Microsoft is working on a resolution and will provide an update in an upcoming release.

Back to top
March 12, 2019
KB4489891
Mitigated
Last updated:
March 12, 2019
10:00 AM PT

Opened:
March 12, 2019
10:00 AM PT
" @@ -102,7 +103,7 @@ sections: - type: markdown text: " - +
DetailsOriginating updateStatusHistory
Embedded objects may display incorrectly
Any compound document (OLE) server application that places embedded objects into the Windows Metafile (WMF) using the PatBlt API may display embedded objects incorrectly.

For example, if you paste a Microsoft Excel worksheet object into a Microsoft Word document, the cells may render with a different background color.

Affected platforms: 
  • Client: Windows 8.1 
  • Server: Windows Server 2012 R2; Windows Server 2012; Windows Server 2008 SP2
Resolution: This issue is resolved in KB4493451.

Back to top
February 12, 2019
KB4487025
Resolved
KB4493451
Resolved:
April 09, 2019
10:00 AM PT

Opened:
February 12, 2019
10:00 AM PT
Embedded objects may display incorrectly
Any compound document (OLE) server application that places embedded objects into the Windows Metafile (WMF) using the PatBlt API may display embedded objects incorrectly.

For example, if you paste a Microsoft Excel worksheet object into a Microsoft Word document, the cells may render with a different background color.

Affected platforms: 
  • Client:  Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 8.1 
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server 2012 R2; Windows Server 2012; Windows Server 2008 SP2
Resolution: This issue is resolved in KB4493451.

Back to top
February 12, 2019
KB4487025
Resolved
KB4493451
Resolved:
April 09, 2019
10:00 AM PT

Opened:
February 12, 2019
10:00 AM PT
" @@ -111,7 +112,6 @@ sections: - type: markdown text: " -
DetailsOriginating updateStatusHistory
Certain operations performed on a Cluster Shared Volume may fail
Certain operations, such as rename, that you perform on files or folders that are on a Cluster Shared Volume (CSV) may fail with the error, \"STATUS_BAD_IMPERSONATION_LEVEL (0xC00000A5)\". This occurs when you perform the operation on a CSV owner node from a process that doesn’t have administrator privilege.

Affected platforms: 
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10, version 1607; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 10 Enterprise LTSB 2015; Windows 8.1
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2; Windows Server 2012
Workaround: Do one of the following:
  • Perform the operation from a process that has administrator privilege.
  • Perform the operation from a node that doesn’t have CSV ownership.
Next steps: Microsoft is working on a resolution and will provide an update in an upcoming release.

Back to top
January 08, 2019
KB4480975
Mitigated
Last updated:
January 08, 2019
10:00 AM PT

Opened:
January 08, 2019
10:00 AM PT
Internet Explorer 11 authentication issue with multiple concurrent logons
After installing KB4480975, Internet Explorer 11 and other applications that use WININET.DLL may have authentication issues. This occurs when two or more people use the same user account for multiple, concurrent login sessions on the same Windows Server machine, including Remote Desktop Protocol (RDP) and Terminal Server logons. Symptoms reported by customers include, but may not be limited to:
  • Cache size and location show zero or empty.
  • Keyboard shortcuts may not work properly.
  • Webpages may intermittently fail to load or render correctly.
  • Issues with credential prompts.
  • Issues when downloading files.
Affected platforms: 
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1607; Windows 10 Enterprise LTSC 2016; Windows 8.1; Windows 7 SP1
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server 2016; Windows Server 2012 R2; Windows Server 2012; Windows Server 2008 R2 SP1
Resolution: This issue is resolved in KB4493451.

Back to top
January 08, 2019
KB4480975
Resolved
KB4493451
Resolved:
April 09, 2019
10:00 AM PT

Opened:
January 08, 2019
10:00 AM PT
MSXML6 may cause applications to stop responding
After installing KB4480975, MSXML6 causes applications to stop responding if an exception was thrown during node operations, such as appendChild(), insertBefore(), and moveNode().

The Group Policy editor may stop responding when editing a Group Policy Object (GPO) that contains Group Policy Preferences (GPP) for Internet Explorer 10 settings.

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10, version 1607; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 10 Enterprise LTSB 2015; Windows 8.1
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2; Windows Server 2012
Resolution: This issue is resolved in KB4493451.

Back to top
January 08, 2019
KB4480975
Resolved
KB4493451
Resolved:
April 09, 2019
10:00 AM PT

Opened:
January 08, 2019
10:00 AM PT
diff --git a/windows/release-information/windows-message-center.yml b/windows/release-information/windows-message-center.yml index ea715bd5dd..79c48ed7cc 100644 --- a/windows/release-information/windows-message-center.yml +++ b/windows/release-information/windows-message-center.yml @@ -68,22 +68,20 @@ In order avoid this, you need to set your feature update deferral policy to 273 Take action: Install standalone security updates to introduce SHA-2 code sign support for Windows 7 amd Windows Server 2008 R2

A standalone SHA-2 code signing support update for Windows Server 2008 R2 and Windows 7 is now available, as is a servicing stack update for Windows 7 SP1 and Windows Server 2008 R2 SP1 that includes the SHA-2 code signing support update.March 12, 2019
10: 00 AM PT Take action: Install standalone update for WSUS 3.0 SP2 to support the delivery of SHA-2 signed updates

A standalone update, KB4484071 is available on Windows Update Catalog for WSUS 3.0 SP2 that supports delivering SHA-2 signed updates. For those customers using WSUS 3.0 SP2, this update should be manually installed no later than June 18, 2019.March 12, 2019
10: 00 AM PT Reminder: Final Delta update for Windows 10, version 1607, 1703, 1709, and 1803 will be April 9, 2019

March 12th and April 9th will be the last two Delta updates for Windows 10, version 1607, 1703, 1709, and 1803. Security and quality updates will continue to be available via the express and full cumulative update packages.March 12, 2019
10: 00 AM PT - How do we measure and improve the quality of Windows?

We rely heavily on feedback and data to detect and fix potential issues before we release new updates to the general population. Explore some of the practices we’ve developed during the last few years to measure and improve the quality of Windows.March 06, 2019
10: 23 AM PT + How do we measure and improve the quality of Windows?

Measuring the quality of Windows is a complex undertaking that requires gathering a variety of diagnostic signals from millions of devices within the Windows ecosystem. In addition to rigorous internal testing, we rely heavily on the feedback provided through diagnostic data to detect and fix problems before we release new updates of Windows to the general population, and to monitor the impact of those updates after each release.

+ +
Get insight into some of the practices we employ to measure and improve the quality of Windows.
March 06, 2019
10: 23 AM PT Data, insights and listening to improve the customer experience

Measuring the quality of Windows is a complex undertaking that requires gathering a variety of diagnostic signals from millions of devices within the Windows ecosystem. In addition to rigorous internal testing, we rely heavily on the feedback provided through diagnostic data to detect and fix problems before we release new updates of Windows to the general population, and to monitor the impact of those updates after each release.

Get insight into some of the practices we employ to measure and improve the quality of Windows.
March 06, 2019
10: 23 AM PT - Getting to know the Windows update history pages

Windows Update customers were affected by a network infrastructure event on January 29, 2019 (21:00 UTC), caused by an external DNS service provider’s global outage. A software update to the external provider’s DNS servers resulted in the distribution of corrupted DNS records that affected connectivity to the Windows Update service. The DNS records were restored by January 30, 2019 (00:10 UTC), and the majority of local Internet Service Providers (ISP) have refreshed their DNS servers and customer services have been restored.

- -
While this was not an issue with Microsoft’s services, we take any service disruption for our customers seriously. We will work with partners to better understand this so we can provide higher quality service in the future even across diverse global network providers.

- -
If you are still unable to connect to Windows Update services due to this problem, please contact your local ISP or network administrator. You can also refer to our new KB4493784 for more information to determine if your network is affected, and to provide your local ISP or network administrator with additional information to assist you.
February 21, 2019
06: 37 PM PT + Getting to know the Windows update history pages

Windows update history pages offer detailed information about each Windows update: the type of update, which operating systems it affects, the improvements and fixes included, and how to get the update. See how simple it is to use this important resource to access information for Windows 10, Windows Server 2019, and earlier versions of the Windows and Windows Server operating systems.
February 21, 2019
06: 37 PM PT Share your feedback: Windows update history

We read every comment you leave on our update history pages, and are always looking to improve these pages and the monthly knowledge base (KB) articles that accompany each monthly update. Take our survey and let us know how we can improve our transparency further and make these more compelling and useful to you and your organization.February 21, 2019
12: 00 PM PT Plan for change: Windows Update for Business and the retirement of SAC-T

Beginning with Windows 10, version 1903 (the next feature update for Windows 10), the Windows 10 release information page will no longer list SAC-T information for version 1903 and future feature updates. Instead, you will find a single entry for each new SAC release. In addition, if you are using Windows Update for Business, you will see new UI and behavior to reflect that there is only one release date for each SAC release. If you use System Center Configuration Manager, Windows Server Update Services (WSUS), or other management tools, there will now only be one feature update published to WSUS, and this will occur at the time of release. Learn how this change will affect Windows Business for Update customers.February 14, 2019
12: 00 PM PT Champs corner: Classifying Windows updates in common deployment tools

If you utilize automated update deployment tools, such as Windows Server Update Services (WSUS) or System Center Configuration Manager, you likely use automatic rules to streamline the approval and deployment of Windows updates. Using the correct update classification is, therefore, an important component of your organization’s device update process. Explore the options available and how to approach it in a WSUS or Configuration Manager environment.February 05, 2019
10: 34 AM PT Update: Delta updates for Windows 10, version 1607, 1703, 1709, and 1803 will be available until April 9, 2019

Based on customer feedback, we are extending Delta update publication for Windows 10 versions 1607, 1703, 1709, and 1803. We will continue to provide Delta updates via the Microsoft Update Catalog through April 9th, 2019, which will be the last delta update available.February 05, 2019
09: 00 AM PT - Global DNS outage affecting Windows Update customers

Windows Update customers were affected by a network infrastructure event on January 29, 2019 (21:00 UTC), caused by an external DNS service provider’s global outage. A software update to the external provider’s DNS servers resulted in the distribution of corrupted DNS records that affected connectivity to the Windows Update service. The DNS records were restored by January 30, 2019 (00:10 UTC), and the majority of local Internet Service Providers (ISP) have refreshed their DNS servers and customer services have been restored. + Global DNS outage affecting Windows Update customers

Windows Update customers were affected by a network infrastructure event on January 29, 2019 (21:00 UTC), caused by an external DNS service provider’s global outage. A software update to the external provider’s DNS servers resulted in the distribution of corrupted DNS records that affected connectivity to the Windows Update service. The DNS records were restored by January 30, 2019 (00:10 UTC), and the majority of local Internet Service Providers (ISP) have refreshed their DNS servers and customer services have been restored.

-While this was not an issue with Microsoft’s services, we take any service disruption for our customers seriously. We will work with partners to better understand this so we can provide higher quality service in the future even across diverse global network providers. +While this was not an issue with Microsoft’s services, we take any service disruption for our customers seriously. We will work with partners to better understand this so we can provide higher quality service in the future even across diverse global network providers.

If you are still unable to connect to Windows Update services due to this problem, please contact your local ISP or network administrator. You can also refer to our new KB4493784 for more information to determine if your network is affected, and to provide your local ISP or network administrator with additional information to assist you.January 29, 2019
04: 15 PM PT Application compatibility in the Windows ecosystem

Our application ecosystem is incredibly diverse, encompassing tens of millions of applications (apps) with numerous versions, languages, architectures, services and configuration options. While our ecosystem is complex, our vision is simple. All apps on Windows devices should just work! Explore the various programs and technologies we use to improve application compatibility.January 15, 2019
10: 00 AM PT From 7cdce548910b350180ad89259ac87bcbc812e520 Mon Sep 17 00:00:00 2001 From: "Nisha Mittal (Wipro Ltd.)" Date: Mon, 29 Apr 2019 09:49:05 -0700 Subject: [PATCH 234/724] Announcement fields updated --- .../status-windows-8.1-and-windows-server-2012-r2.yml | 4 ++-- windows/release-information/windows-message-center.yml | 6 +++--- 2 files changed, 5 insertions(+), 5 deletions(-) diff --git a/windows/release-information/status-windows-8.1-and-windows-server-2012-r2.yml b/windows/release-information/status-windows-8.1-and-windows-server-2012-r2.yml index a0427f8bcd..4a2e0e6b33 100644 --- a/windows/release-information/status-windows-8.1-and-windows-server-2012-r2.yml +++ b/windows/release-information/status-windows-8.1-and-windows-server-2012-r2.yml @@ -61,7 +61,7 @@ sections: text: "
This table offers a summary of current active issues and those issues that have been resolved in the last 30 days.
- + @@ -87,7 +87,7 @@ sections: text: "
SummaryOriginating updateStatusLast updated
System may be unresponsive after restart if Avira antivirus software installed
Devices with Avira antivirus software installed may become unresponsive upon restart.

See details >
April 09, 2019
KB4493446
Investigating
April 09, 2019
10:00 AM PT
System may be unresponsive after restart with certain McAfee antivirus products
Devices with McAfee Endpoint Security Threat Prevention 10.x, Host Intrusion Prevention 8.0, or VirusScan Enterprise 8.8 may be slow or unresponsive at startup.

See details >
April 09, 2019
KB4493446
Mitigated
April 25, 2019
02:00 PM PT
System may be unresponsive after restart with certain McAfee antivirus products
Devices with McAfee Endpoint Security Threat Prevention 10.x, Host Intrusion Prevention 8.0, or VirusScan Enterprise 8.8 may be slow or unresponsive at startup.

See details >
April 09, 2019
KB4493446
Mitigated
April 18, 2019
05:00 PM PT
Issue using PXE to start a device from WDS
There may be issues using the Preboot Execution Environment (PXE) to start a device from a Windows Deployment Services (WDS) server configured to use Variable Window Extension.

See details >
March 12, 2019
KB4489881
Mitigated
April 09, 2019
10:00 AM PT
System unresponsive after restart if Sophos Endpoint Protection installed
Devices with Sophos Endpoint Protection installed and managed by Sophos Central or Sophos Enterprise Console (SEC) may become unresponsive upon restart.

See details >
April 09, 2019
KB4493446
Mitigated
April 09, 2019
10:00 AM PT
System may be unresponsive after restart if ArcaBit antivirus software installed
Devices with ArcaBit antivirus software installed may become unresponsive upon restart.

See details >
April 09, 2019
KB4493446
Mitigated
April 09, 2019
10:00 AM PT
- + diff --git a/windows/release-information/windows-message-center.yml b/windows/release-information/windows-message-center.yml index 79c48ed7cc..84ed81b5b4 100644 --- a/windows/release-information/windows-message-center.yml +++ b/windows/release-information/windows-message-center.yml @@ -63,9 +63,9 @@ sections: In order avoid this, you need to set your feature update deferral policy to 273 days or less. - - - + + + - + - +
DetailsOriginating updateStatusHistory
System may be unresponsive after restart if Avira antivirus software installed
Microsoft and Avira have identified an issue on devices with Avira antivirus software installed that may cause the system to become unresponsive upon restart after installing KB4493446.

Microsoft has temporarily blocked devices from receiving this update if Avira antivirus software is installed.

Affected platforms: 
  • Client: Windows 8.1; Windows 7 SP1 
  • Server: Windows Server 2012 R2; Windows Server 2012; Windows Server 2008 R2 SP1; Windows Server 2008 SP2 
Next steps: We are presently investigating this issue with Avira and will provide an update when available.

Back to top
April 09, 2019
KB4493446
Investigating
Last updated:
April 09, 2019
10:00 AM PT

Opened:
April 09, 2019
10:00 AM PT
System may be unresponsive after restart with certain McAfee antivirus products
Microsoft and McAfee have identified an issue on devices with McAfee Endpoint Security (ENS) Threat Prevention 10.x or McAfee Host Intrusion Prevention (Host IPS) 8.0 or McAfee VirusScan Enterprise (VSE) 8.8 installed. It may cause the system to have slow startup or become unresponsive at restart after installing this update. 
 
Workaround: Guidance for McAfee customers can be found in the following McAfee support articles:  
Next steps: We are presently investigating this issue with McAfee. We will provide an update once we have more information. 

Back to top
April 09, 2019
KB4493446
Mitigated
Last updated:
April 25, 2019
02:00 PM PT

Opened:
April 09, 2019
10:00 AM PT
System may be unresponsive after restart with certain McAfee antivirus products
Microsoft and McAfee have identified an issue on devices with McAfee Endpoint Security (ENS) Threat Prevention 10.x or McAfee Host Intrusion Prevention (Host IPS) 8.0 or McAfee VirusScan Enterprise (VSE) 8.8 installed. It may cause the system to have slow startup or become unresponsive at restart after installing this update. 
 
Workaround: Guidance for McAfee customers can be found in the following McAfee support articles:  
Next steps: We are presently investigating this issue with McAfee. We will provide an update once we have more information. 

Back to top
April 09, 2019
KB4493446
Mitigated
Last updated:
April 18, 2019
05:00 PM PT

Opened:
April 09, 2019
10:00 AM PT
System unresponsive after restart if Sophos Endpoint Protection installed
Microsoft and Sophos have identified an issue on devices with Sophos Endpoint Protection installed and managed by either Sophos Central or Sophos Enterprise Console (SEC) that may cause the system to become unresponsive upon restart after installing KB4493446.

Microsoft has temporarily blocked devices from receiving this update if the Sophos Endpoint is installed until a solution is available.

Affected platforms: 
  • Client: Windows 8.1; Windows 7 SP1
  • Server: Windows Server 2012 R2; Windows Server 2012; Windows Server 2008 R2 SP1; Windows Server 2008 SP2
Guidance for Sophos Endpoint and Sophos Enterprise Console customers can be found in the Sophos support article.

Back to top
April 09, 2019
KB4493446
Mitigated
Last updated:
April 09, 2019
10:00 AM PT

Opened:
April 09, 2019
10:00 AM PT
System may be unresponsive after restart if ArcaBit antivirus software installed
Microsoft and ArcaBit have identified an issue on devices with ArcaBit antivirus software installed that may cause the system to become unresponsive upon restart after installing KB4493446.

Microsoft has temporarily blocked devices from receiving this update if ArcaBit antivirus software is installed.

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 8.1; Windows 7 SP1
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server 2012 R2; Windows Server 2008 R2 SP1
Workaround: ArcaBit has released an update to address this issue. For more information, see the Arcabit support article.

Back to top
April 09, 2019
KB4493446
Mitigated
Last updated:
April 09, 2019
10:00 AM PT

Opened:
April 09, 2019
10:00 AM PT
Certain operations performed on a Cluster Shared Volume may fail
Certain operations, such as rename, that you perform on files or folders that are on a Cluster Shared Volume (CSV) may fail with the error, “STATUS_BAD_IMPERSONATION_LEVEL (0xC00000A5)”. This occurs when you perform the operation on a CSV owner node from a process that doesn’t have administrator privilege.

Affected platforms: 
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10, version 1607; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 10 Enterprise LTSB 2015; Windows 8.1
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2; Windows Server 2012
Workaround: Do one of the following:
  • Perform the operation from a process that has administrator privilege.
  • Perform the operation from a node that doesn’t have CSV ownership.
Next steps: Microsoft is working on a resolution and will provide an update in an upcoming release.

Back to top
April 09, 2019
KB4493446
Mitigated
Last updated:
April 09, 2019
10:00 AM PT

Opened:
April 09, 2019
10:00 AM PT
April 03, 2019
05: 47 PM PT
Find a list of currently supported versions and previous releases

Every Windows product has a lifecycle. The lifecycle begins when a product is released and ends when it is no longer serviced or supported. Knowing key dates in this lifecycle helps you make informed decisions about when to update, upgrade, or make other changes to your software. Check out the updated Windows 10 release information page for a list of current versions by servicing option as well as end of service dates.
March 28, 2019
02: 00 PM PT
Windows 10, version 1809 designated for broad deployment

Based on the data and the feedback we’ve received from consumers, OEMs, ISVs, partners, and commercial customers, Windows 10, version 1809 has transitioned to broad deployment. With this, the Windows 10 release information page will now reflect Semi-Annual Channel (SAC) for version 1809.
March 28, 2019
10: 00 AM PT
Reminder: Additional servicing for the Windows 10 Enterprise, Education, and IoT Enterprise, version 1607 ends April 9, 2019

The additional servicing for Windows 10 Enterprise, Education, and IoT Enterprise editions ends on April 9, 2019 and doesn't extend beyond this date. To continue receiving security and quality updates, Microsoft recommends updating to the latest version of Windows 10.

Devices running Windows 10 Enterprise 2016 LTSB will continue to receive updates until October 2026 per the Fixed Lifecycle Policy. Windows 10, version 1607 devices running the Intel “Clovertrail” chipset will continue to receive updates until January 2023.
March 12, 2019
10: 00 AM PT
Reminder: Windows 10 Home, Pro, Pro for Workstations, and IoT Core, version 1709 will reach end of service on April 9, 2019

Windows 10, version 1709, will reach end of service on April 9, 2019 for devices running Windows 10 Home, Pro, Pro for Workstations, and IoT Core editions. These devices will no longer receive monthly security and quality updates that contain protection from the latest security threats. To continue receiving security and quality updates, Microsoft recommends updating to the latest version of Windows 10.

Windows 10 Enterprise, Education, and IoT Enterprise editions will continue to receive servicing for 12 months at no cost per the lifecycle announcement on October 2018.
March 12, 2019
10: 00 AM PT
Take action: Install standalone security updates to introduce SHA-2 code sign support for Windows 7 amd Windows Server 2008 R2

A standalone SHA-2 code signing support update for Windows Server 2008 R2 and Windows 7 is now available, as is a servicing stack update for Windows 7 SP1 and Windows Server 2008 R2 SP1 that includes the SHA-2 code signing support update.
March 12, 2019
10: 00 AM PT
Reminder: Additional servicing for the Windows 10 Enterprise, Education, and IoT Enterprise, version 1607 ends April 9, 2019

The additional servicing for Windows 10 Enterprise, Education, and IoT Enterprise editions ends on April 9, 2019 and doesn't extend beyond this date. To continue receiving security and quality updates, Microsoft recommends updating to the latest version of Windows 10.

Devices running Windows 10 Enterprise 2016 LTSB will continue to receive updates until October 2026 per the Fixed Lifecycle Policy. Windows 10, version 1607 devices running the Intel “Clovertrail” chipset will continue to receive updates until January 2023.
March 12, 2019
10: 00 AM PT
Reminder: Windows 10 Home, Pro, Pro for Workstations, and IoT Core, version 1709 will reach end of service on April 9, 2019

Windows 10, version 1709, will reach end of service on April 9, 2019 for devices running Windows 10 Home, Pro, Pro for Workstations, and IoT Core editions. These devices will no longer receive monthly security and quality updates that contain protection from the latest security threats. To continue receiving security and quality updates, Microsoft recommends updating to the latest version of Windows 10.

Windows 10 Enterprise, Education, and IoT Enterprise editions will continue to receive servicing for 12 months at no cost per the lifecycle announcement on October 2018.
March 12, 2019
10: 00 AM PT
Take action: Install standalone security updates to introduce SHA-2 code sign support for Windows 7 amd Windows Server 2008 R2

A standalone SHA-2 code signing support update for Windows Server 2008 R2 and Windows 7 is now available, as is a sservicing stack update for Windows 7 SP1 and Windows Server 2008 R2 SP1 that includes the SHA-2 code signing support update.
March 12, 2019
10: 00 AM PT
Take action: Install standalone update for WSUS 3.0 SP2 to support the delivery of SHA-2 signed updates

A standalone update, KB4484071 is available on Windows Update Catalog for WSUS 3.0 SP2 that supports delivering SHA-2 signed updates. For those customers using WSUS 3.0 SP2, this update should be manually installed no later than June 18, 2019.
March 12, 2019
10: 00 AM PT
Reminder: Final Delta update for Windows 10, version 1607, 1703, 1709, and 1803 will be April 9, 2019

March 12th and April 9th will be the last two Delta updates for Windows 10, version 1607, 1703, 1709, and 1803. Security and quality updates will continue to be available via the express and full cumulative update packages.
March 12, 2019
10: 00 AM PT
How do we measure and improve the quality of Windows?

Measuring the quality of Windows is a complex undertaking that requires gathering a variety of diagnostic signals from millions of devices within the Windows ecosystem. In addition to rigorous internal testing, we rely heavily on the feedback provided through diagnostic data to detect and fix problems before we release new updates of Windows to the general population, and to monitor the impact of those updates after each release.

From 936691f32c754a7600818dc122df29b2f46f3db7 Mon Sep 17 00:00:00 2001 From: "Nisha Mittal (Wipro Ltd.)" Date: Mon, 29 Apr 2019 10:15:51 -0700 Subject: [PATCH 235/724] Fixed issue after final review --- .../status-windows-10-1507.yml | 2 +- ...indows-10-1607-and-windows-server-2016.yml | 2 +- .../status-windows-10-1703.yml | 2 +- .../status-windows-10-1709.yml | 2 +- .../status-windows-10-1803.yml | 2 +- ...indows-10-1809-and-windows-server-2019.yml | 2 +- ...ndows-7-and-windows-server-2008-r2-sp1.yml | 2 +- ...windows-8.1-and-windows-server-2012-r2.yml | 2 +- .../status-windows-server-2008-sp2.yml | 2 +- .../status-windows-server-2012.yml | 2 +- .../windows-message-center.yml | 74 +++++++++---------- 11 files changed, 47 insertions(+), 47 deletions(-) diff --git a/windows/release-information/status-windows-10-1507.yml b/windows/release-information/status-windows-10-1507.yml index d590791a84..6cac3b9022 100644 --- a/windows/release-information/status-windows-10-1507.yml +++ b/windows/release-information/status-windows-10-1507.yml @@ -58,7 +58,7 @@ sections: - title: Known issues - items: - type: markdown - text: "
This table offers a summary of current active issues and those issues that have been resolved in the last 30 days.
+ text: "
This table offers a summary of current active issues and those issues that have been resolved in the last 30 days.

diff --git a/windows/release-information/status-windows-10-1607-and-windows-server-2016.yml b/windows/release-information/status-windows-10-1607-and-windows-server-2016.yml index 99fe06b9ad..b2d32681ac 100644 --- a/windows/release-information/status-windows-10-1607-and-windows-server-2016.yml +++ b/windows/release-information/status-windows-10-1607-and-windows-server-2016.yml @@ -58,7 +58,7 @@ sections: - title: Known issues - items: - type: markdown - text: "
This table offers a summary of current active issues and those issues that have been resolved in the last 30 days.
+ text: "
This table offers a summary of current active issues and those issues that have been resolved in the last 30 days.

SummaryOriginating updateStatusLast updated
Certain operations performed on a Cluster Shared Volume may fail
Certain operations, such as rename, performed on files or folders on a Cluster Shared Volume (CSV) may fail with the error, \"STATUS_BAD_IMPERSONATION_LEVEL (0xC00000A5)\".

See details >
OS Build 10240.18186

April 09, 2019
KB4493475
Mitigated
April 09, 2019
10:00 AM PT
Embedded objects may display incorrectly
Any compound document (OLE) server application that places embedded objects into the Windows Metafile (WMF) using the PatBlt API may display embedded objects incorrectly.

See details >
OS Build 10240.18132

February 12, 2019
KB4487018
Resolved
KB4493475
April 29, 2019
12:45 AM PT
diff --git a/windows/release-information/status-windows-10-1703.yml b/windows/release-information/status-windows-10-1703.yml index 81d95d6d23..ebe69ffbd0 100644 --- a/windows/release-information/status-windows-10-1703.yml +++ b/windows/release-information/status-windows-10-1703.yml @@ -58,7 +58,7 @@ sections: - title: Known issues - items: - type: markdown - text: "
This table offers a summary of current active issues and those issues that have been resolved in the last 30 days.
+ text: "
This table offers a summary of current active issues and those issues that have been resolved in the last 30 days.

SummaryOriginating updateStatusLast updated
Zone transfers over TCP may fail
Zone transfers between primary and secondary DNS servers over the Transmission Control Protocol (TCP) may fail.

See details >
OS Build 14393.2941

April 25, 2019
KB4493473
Investigating
April 25, 2019
02:00 PM PT
Cluster service may fail if the minimum password length is set to greater than 14
The cluster service may fail to start with the error “2245 (NERR_PasswordTooShort)” if the Group Policy “Minimum Password Length” is configured with greater than 14 characters.

See details >
OS Build 14393.2639

November 27, 2018
KB4467684
Mitigated
April 09, 2019
10:00 AM PT
diff --git a/windows/release-information/status-windows-10-1709.yml b/windows/release-information/status-windows-10-1709.yml index 8ce7c13edd..cd305c8947 100644 --- a/windows/release-information/status-windows-10-1709.yml +++ b/windows/release-information/status-windows-10-1709.yml @@ -58,7 +58,7 @@ sections: - title: Known issues - items: - type: markdown - text: "
This table offers a summary of current active issues and those issues that have been resolved in the last 30 days.
+ text: "
This table offers a summary of current active issues and those issues that have been resolved in the last 30 days.

SummaryOriginating updateStatusLast updated
Certain operations performed on a Cluster Shared Volume may fail
Certain operations, such as rename, performed on files or folders on a Cluster Shared Volume (CSV) may fail with the error, \"STATUS_BAD_IMPERSONATION_LEVEL (0xC00000A5)\".

See details >
OS Build 15063.1746

April 09, 2019
KB4493474
Mitigated
April 09, 2019
10:00 AM PT
Custom URI schemes may not start corresponding application
Custom URI schemes for application protocol handlers may not start the corresponding application for local intranet and trusted sites in Internet Explorer.

See details >
OS Build 15063.1689

March 12, 2019
KB4489871
Resolved
KB4493436
April 25, 2019
02:00 PM PT
diff --git a/windows/release-information/status-windows-10-1803.yml b/windows/release-information/status-windows-10-1803.yml index fd58df28d5..fa12dc925c 100644 --- a/windows/release-information/status-windows-10-1803.yml +++ b/windows/release-information/status-windows-10-1803.yml @@ -58,7 +58,7 @@ sections: - title: Known issues - items: - type: markdown - text: "
This table offers a summary of current active issues and those issues that have been resolved in the last 30 days.
+ text: "
This table offers a summary of current active issues and those issues that have been resolved in the last 30 days.

SummaryOriginating updateStatusLast updated
Zone transfers over TCP may fail
Zone transfers between primary and secondary DNS servers over the Transmission Control Protocol (TCP) may fail.

See details >
OS Build 16299.1127

April 25, 2019
KB4493440
Investigating
April 25, 2019
02:00 PM PT
Certain operations performed on a Cluster Shared Volume may fail
Certain operations, such as rename, performed on files or folders on a Cluster Shared Volume (CSV) may fail with the error, \"STATUS_BAD_IMPERSONATION_LEVEL (0xC00000A5)\".

See details >
OS Build 16299.1087

April 09, 2019
KB4493441
Mitigated
April 09, 2019
10:00 AM PT
diff --git a/windows/release-information/status-windows-10-1809-and-windows-server-2019.yml b/windows/release-information/status-windows-10-1809-and-windows-server-2019.yml index 268724f00f..1bc22681fd 100644 --- a/windows/release-information/status-windows-10-1809-and-windows-server-2019.yml +++ b/windows/release-information/status-windows-10-1809-and-windows-server-2019.yml @@ -63,7 +63,7 @@ sections: - title: Known issues - items: - type: markdown - text: "
This table offers a summary of current active issues and those issues that have been resolved in the last 30 days.
+ text: "
This table offers a summary of current active issues and those issues that have been resolved in the last 30 days.

SummaryOriginating updateStatusLast updated
Zone transfers over TCP may fail
Zone transfers between primary and secondary DNS servers over the Transmission Control Protocol (TCP) may fail.

See details >
OS Build 17134.753

April 25, 2019
KB4493437
Investigating
April 25, 2019
02:00 PM PT
Issue using PXE to start a device from WDS
Using PXE to start a device from a WDS server configured to use Variable Window Extension may cause the connection to the WDS server to terminate prematurely.

See details >
OS Build 17134.648

March 12, 2019
KB4489868
Mitigated
April 09, 2019
10:00 AM PT
diff --git a/windows/release-information/status-windows-7-and-windows-server-2008-r2-sp1.yml b/windows/release-information/status-windows-7-and-windows-server-2008-r2-sp1.yml index ed51da92e0..3462e7b4d8 100644 --- a/windows/release-information/status-windows-7-and-windows-server-2008-r2-sp1.yml +++ b/windows/release-information/status-windows-7-and-windows-server-2008-r2-sp1.yml @@ -58,7 +58,7 @@ sections: - title: Known issues - items: - type: markdown - text: "
This table offers a summary of current active issues and those issues that have been resolved in the last 30 days.
+ text: "
This table offers a summary of current active issues and those issues that have been resolved in the last 30 days.

SummaryOriginating updateStatusLast updated
Custom URI schemes may not start corresponding application
Custom URI schemes for application protocol handlers may not start the corresponding application for local intranet and trusted sites in Internet Explorer.

See details >
OS Build 17763.379

March 12, 2019
KB4489899
Mitigated
April 09, 2019
10:00 AM PT
Issue using PXE to start a device from WDS
Using PXE to start a device from a WDS server configured to use Variable Window Extension may cause the connection to the WDS server to terminate prematurely.

See details >
OS Build 17763.379

March 12, 2019
KB4489899
Mitigated
April 09, 2019
10:00 AM PT
diff --git a/windows/release-information/status-windows-8.1-and-windows-server-2012-r2.yml b/windows/release-information/status-windows-8.1-and-windows-server-2012-r2.yml index 4a2e0e6b33..28582ba03f 100644 --- a/windows/release-information/status-windows-8.1-and-windows-server-2012-r2.yml +++ b/windows/release-information/status-windows-8.1-and-windows-server-2012-r2.yml @@ -58,7 +58,7 @@ sections: - title: Known issues - items: - type: markdown - text: "
This table offers a summary of current active issues and those issues that have been resolved in the last 30 days.
+ text: "
This table offers a summary of current active issues and those issues that have been resolved in the last 30 days.

SummaryOriginating updateStatusLast updated
System may be unresponsive after restart if Avira antivirus software installed
Devices with Avira antivirus software installed may become unresponsive upon restart.

See details >
April 09, 2019
KB4493472
Investigating
April 09, 2019
10:00 AM PT
System may be unresponsive after restart with certain McAfee antivirus products
Devices with McAfee Endpoint Security Threat Prevention 10.x, Host Intrusion Prevention 8.0, or VirusScan Enterprise 8.8 may be slow or unresponsive at startup.

See details >
April 09, 2019
KB4493472
Mitigated
April 18, 2019
05:00 PM PT
diff --git a/windows/release-information/status-windows-server-2008-sp2.yml b/windows/release-information/status-windows-server-2008-sp2.yml index df8fb044a5..c2e4a54439 100644 --- a/windows/release-information/status-windows-server-2008-sp2.yml +++ b/windows/release-information/status-windows-server-2008-sp2.yml @@ -58,7 +58,7 @@ sections: - title: Known issues - items: - type: markdown - text: "
This table offers a summary of current active issues and those issues that have been resolved in the last 30 days.
+ text: "
This table offers a summary of current active issues and those issues that have been resolved in the last 30 days.

SummaryOriginating updateStatusLast updated
System may be unresponsive after restart if Avira antivirus software installed
Devices with Avira antivirus software installed may become unresponsive upon restart.

See details >
April 09, 2019
KB4493446
Investigating
April 09, 2019
10:00 AM PT
System may be unresponsive after restart with certain McAfee antivirus products
Devices with McAfee Endpoint Security Threat Prevention 10.x, Host Intrusion Prevention 8.0, or VirusScan Enterprise 8.8 may be slow or unresponsive at startup.

See details >
April 09, 2019
KB4493446
Mitigated
April 18, 2019
05:00 PM PT
diff --git a/windows/release-information/status-windows-server-2012.yml b/windows/release-information/status-windows-server-2012.yml index f108e183ac..2b6680cf87 100644 --- a/windows/release-information/status-windows-server-2012.yml +++ b/windows/release-information/status-windows-server-2012.yml @@ -58,7 +58,7 @@ sections: - title: Known issues - items: - type: markdown - text: "
This table offers a summary of current active issues and those issues that have been resolved in the last 30 days.
+ text: "
This table offers a summary of current active issues and those issues that have been resolved in the last 30 days.

SummaryOriginating updateStatusLast updated
System may be unresponsive after restart if Avira antivirus software installed
Devices with Avira antivirus software installed may become unresponsive upon restart.

See details >
April 09, 2019
KB4493471
Investigating
April 09, 2019
10:00 AM PT
System unresponsive after restart if Sophos Endpoint Protection installed
Devices with Sophos Endpoint Protection installed and managed by Sophos Central or Sophos Enterprise Console (SEC) may become unresponsive upon restart.

See details >
April 09, 2019
KB4493471
Mitigated
April 09, 2019
10:00 AM PT
diff --git a/windows/release-information/windows-message-center.yml b/windows/release-information/windows-message-center.yml index 84ed81b5b4..fd6a56b79c 100644 --- a/windows/release-information/windows-message-center.yml +++ b/windows/release-information/windows-message-center.yml @@ -48,53 +48,53 @@ sections: - items: - type: markdown text: " -
SummaryOriginating updateStatusLast updated
System may be unresponsive after restart if Avira antivirus software installed
Devices with Avira antivirus software installed may become unresponsive upon restart.

See details >
April 09, 2019
KB4493451
Investigating
April 09, 2019
10:00 AM PT
System unresponsive after restart if Sophos Endpoint Protection installed
Devices with Sophos Endpoint Protection installed and managed by Sophos Central or Sophos Enterprise Console (SEC) may become unresponsive upon restart.

See details >
April 09, 2019
KB4493451
Mitigated
April 09, 2019
10:00 AM PT
+
MessageDate
- - + - - + + - - - - - - - - + + + + + + + + - + - - - - - - + + + + + + - - - - - - - - - - - - +If you are still unable to connect to Windows Update services due to this problem, please contact your local ISP or network administrator. You can also refer to our new KB4493784 for more information to determine if your network is affected, and to provide your local ISP or network administrator with additional information to assist you. + + + + + + + + + + + +
MessageDate
Take action: Install servicing stack update for Windows Server 2008 SP2 for SHA-2 code sign support

A standalone update, KB4493730, that introduce SHA-2 code sign support for the servicing stack (SSU) was released today as a security update.
April 19, 2019
10: 00 AM PT
The benefits of Windows 10 Dynamic Update

Dynamic Update can help organizations and end users alike ensure that their Windows 10 devices have the latest feature update content (as part of an in-place upgrade)—and preserve precious features on demand (FODs) and language packs (LPs) that may have been previously installed.

+
Take action: Install servicing stack update for Windows Server 2008 SP2 for SHA-2 code sign support
A standalone update, KB4493730, that introduce SHA-2 code sign support for the servicing stack (SSU) was released today as a security update.
April 19, 2019
10:00 AM PT
The benefits of Windows 10 Dynamic Update
Dynamic Update can help organizations and end users alike ensure that their Windows 10 devices have the latest feature update content (as part of an in-place upgrade)—and preserve precious features on demand (FODs) and language packs (LPs) that may have been previously installed.

-
Find out which components are updated by Dynamic Update, how Dynamic Update is initiated, and how to enable or disable it.
April 17, 2019
11: 26 AM PT
Improvements to the Windows 10 update experience are coming

Find out about the changes coming to the Windows update process that will improve the experience, offer users more control, and improve the quality of Windows updates.
April 04, 2019
09: 00 AM PT
Take action: review your Windows Update for Business deferral values

If devices under your management are still running Windows 10 Pro or Windows 10 Pro for Workstations, version 1709, your devices will reach end of service on April 9, 2019 if you have configured both of the following Windows Update for Business policies:
+
Find out which components are updated by Dynamic Update, how Dynamic Update is initiated, and how to enable or disable it.
April 17, 2019
11:26 AM PT
Improvements to the Windows 10 update experience are coming
Find out about the changes coming to the Windows update process that will improve the experience, offer users more control, and improve the quality of Windows updates.
April 04, 2019
09:00 AM PT
Take action: review your Windows Update for Business deferral values
If devices under your management are still running Windows 10 Pro or Windows 10 Pro for Workstations, version 1709, your devices will reach end of service on April 9, 2019 if you have configured both of the following Windows Update for Business policies:
  • Branch readiness is configured as Semi-Annual Channel (SAC)
  • Feature update deferral is configured as 274 days or more
-In order avoid this, you need to set your feature update deferral policy to 273 days or less.
April 03, 2019
05: 47 PM PT
Find a list of currently supported versions and previous releases

Every Windows product has a lifecycle. The lifecycle begins when a product is released and ends when it is no longer serviced or supported. Knowing key dates in this lifecycle helps you make informed decisions about when to update, upgrade, or make other changes to your software. Check out the updated Windows 10 release information page for a list of current versions by servicing option as well as end of service dates.
March 28, 2019
02: 00 PM PT
Windows 10, version 1809 designated for broad deployment

Based on the data and the feedback we’ve received from consumers, OEMs, ISVs, partners, and commercial customers, Windows 10, version 1809 has transitioned to broad deployment. With this, the Windows 10 release information page will now reflect Semi-Annual Channel (SAC) for version 1809.
March 28, 2019
10: 00 AM PT
Reminder: Additional servicing for the Windows 10 Enterprise, Education, and IoT Enterprise, version 1607 ends April 9, 2019

The additional servicing for Windows 10 Enterprise, Education, and IoT Enterprise editions ends on April 9, 2019 and doesn't extend beyond this date. To continue receiving security and quality updates, Microsoft recommends updating to the latest version of Windows 10.

Devices running Windows 10 Enterprise 2016 LTSB will continue to receive updates until October 2026 per the Fixed Lifecycle Policy. Windows 10, version 1607 devices running the Intel “Clovertrail” chipset will continue to receive updates until January 2023.
March 12, 2019
10: 00 AM PT
Reminder: Windows 10 Home, Pro, Pro for Workstations, and IoT Core, version 1709 will reach end of service on April 9, 2019

Windows 10, version 1709, will reach end of service on April 9, 2019 for devices running Windows 10 Home, Pro, Pro for Workstations, and IoT Core editions. These devices will no longer receive monthly security and quality updates that contain protection from the latest security threats. To continue receiving security and quality updates, Microsoft recommends updating to the latest version of Windows 10.

Windows 10 Enterprise, Education, and IoT Enterprise editions will continue to receive servicing for 12 months at no cost per the lifecycle announcement on October 2018.
March 12, 2019
10: 00 AM PT
Take action: Install standalone security updates to introduce SHA-2 code sign support for Windows 7 amd Windows Server 2008 R2

A standalone SHA-2 code signing support update for Windows Server 2008 R2 and Windows 7 is now available, as is a sservicing stack update for Windows 7 SP1 and Windows Server 2008 R2 SP1 that includes the SHA-2 code signing support update.
March 12, 2019
10: 00 AM PT
Take action: Install standalone update for WSUS 3.0 SP2 to support the delivery of SHA-2 signed updates

A standalone update, KB4484071 is available on Windows Update Catalog for WSUS 3.0 SP2 that supports delivering SHA-2 signed updates. For those customers using WSUS 3.0 SP2, this update should be manually installed no later than June 18, 2019.
March 12, 2019
10: 00 AM PT
Reminder: Final Delta update for Windows 10, version 1607, 1703, 1709, and 1803 will be April 9, 2019

March 12th and April 9th will be the last two Delta updates for Windows 10, version 1607, 1703, 1709, and 1803. Security and quality updates will continue to be available via the express and full cumulative update packages.
March 12, 2019
10: 00 AM PT
How do we measure and improve the quality of Windows?

Measuring the quality of Windows is a complex undertaking that requires gathering a variety of diagnostic signals from millions of devices within the Windows ecosystem. In addition to rigorous internal testing, we rely heavily on the feedback provided through diagnostic data to detect and fix problems before we release new updates of Windows to the general population, and to monitor the impact of those updates after each release.

+In order avoid this, you need to set your feature update deferral policy to 273 days or less.
April 03, 2019
05:47 PM PT
Find a list of currently supported versions and previous releases
Every Windows product has a lifecycle. The lifecycle begins when a product is released and ends when it is no longer serviced or supported. Knowing key dates in this lifecycle helps you make informed decisions about when to update, upgrade, or make other changes to your software. Check out the updated Windows 10 release information page for a list of current versions by servicing option as well as end of service dates.
March 28, 2019
02:00 PM PT
Windows 10, version 1809 designated for broad deployment
Based on the data and the feedback we’ve received from consumers, OEMs, ISVs, partners, and commercial customers, Windows 10, version 1809 has transitioned to broad deployment. With this, the Windows 10 release information page will now reflect Semi-Annual Channel (SAC) for version 1809.
March 28, 2019
10:00 AM PT
Reminder: Additional servicing for the Windows 10 Enterprise, Education, and IoT Enterprise, version 1607 ends April 9, 2019
The additional servicing for Windows 10 Enterprise, Education, and IoT Enterprise editions ends on April 9, 2019 and doesn't extend beyond this date. To continue receiving security and quality updates, Microsoft recommends updating to the latest version of Windows 10.

Devices running Windows 10 Enterprise 2016 LTSB will continue to receive updates until October 2026 per the Fixed Lifecycle Policy. Windows 10, version 1607 devices running the Intel “Clovertrail” chipset will continue to receive updates until January 2023.
March 12, 2019
10:00 AM PT
Reminder: Windows 10 Home, Pro, Pro for Workstations, and IoT Core, version 1709 will reach end of service on April 9, 2019
Windows 10, version 1709, will reach end of service on April 9, 2019 for devices running Windows 10 Home, Pro, Pro for Workstations, and IoT Core editions. These devices will no longer receive monthly security and quality updates that contain protection from the latest security threats. To continue receiving security and quality updates, Microsoft recommends updating to the latest version of Windows 10.

Windows 10 Enterprise, Education, and IoT Enterprise editions will continue to receive servicing for 12 months at no cost per the lifecycle announcement on October 2018.
March 12, 2019
10:00 AM PT
Take action: Install standalone security updates to introduce SHA-2 code sign support for Windows 7 amd Windows Server 2008 R2
A standalone SHA-2 code signing support update for Windows Server 2008 R2 and Windows 7 is now available, as is a sservicing stack update for Windows 7 SP1 and Windows Server 2008 R2 SP1 that includes the SHA-2 code signing support update.
March 12, 2019
10:00 AM PT
Take action: Install standalone update for WSUS 3.0 SP2 to support the delivery of SHA-2 signed updates
A standalone update, KB4484071 is available on Windows Update Catalog for WSUS 3.0 SP2 that supports delivering SHA-2 signed updates. For those customers using WSUS 3.0 SP2, this update should be manually installed no later than June 18, 2019.
March 12, 2019
10:00 AM PT
Reminder: Final Delta update for Windows 10, version 1607, 1703, 1709, and 1803 will be April 9, 2019
March 12th and April 9th will be the last two Delta updates for Windows 10, version 1607, 1703, 1709, and 1803. Security and quality updates will continue to be available via the express and full cumulative update packages.
March 12, 2019
10:00 AM PT
How do we measure and improve the quality of Windows?
Measuring the quality of Windows is a complex undertaking that requires gathering a variety of diagnostic signals from millions of devices within the Windows ecosystem. In addition to rigorous internal testing, we rely heavily on the feedback provided through diagnostic data to detect and fix problems before we release new updates of Windows to the general population, and to monitor the impact of those updates after each release.

-
Get insight into some of the practices we employ to measure and improve the quality of Windows.
March 06, 2019
10: 23 AM PT
Data, insights and listening to improve the customer experience

Measuring the quality of Windows is a complex undertaking that requires gathering a variety of diagnostic signals from millions of devices within the Windows ecosystem. In addition to rigorous internal testing, we rely heavily on the feedback provided through diagnostic data to detect and fix problems before we release new updates of Windows to the general population, and to monitor the impact of those updates after each release.

+
Get insight into some of the practices we employ to measure and improve the quality of Windows.
March 06, 2019
10:23 AM PT
Data, insights and listening to improve the customer experience
Measuring the quality of Windows is a complex undertaking that requires gathering a variety of diagnostic signals from millions of devices within the Windows ecosystem. In addition to rigorous internal testing, we rely heavily on the feedback provided through diagnostic data to detect and fix problems before we release new updates of Windows to the general population, and to monitor the impact of those updates after each release.

-
Get insight into some of the practices we employ to measure and improve the quality of Windows.
March 06, 2019
10: 23 AM PT
Getting to know the Windows update history pages

Windows update history pages offer detailed information about each Windows update: the type of update, which operating systems it affects, the improvements and fixes included, and how to get the update. See how simple it is to use this important resource to access information for Windows 10, Windows Server 2019, and earlier versions of the Windows and Windows Server operating systems.
February 21, 2019
06: 37 PM PT
Share your feedback: Windows update history

We read every comment you leave on our update history pages, and are always looking to improve these pages and the monthly knowledge base (KB) articles that accompany each monthly update. Take our survey and let us know how we can improve our transparency further and make these more compelling and useful to you and your organization.
February 21, 2019
12: 00 PM PT
Plan for change: Windows Update for Business and the retirement of SAC-T

Beginning with Windows 10, version 1903 (the next feature update for Windows 10), the Windows 10 release information page will no longer list SAC-T information for version 1903 and future feature updates. Instead, you will find a single entry for each new SAC release. In addition, if you are using Windows Update for Business, you will see new UI and behavior to reflect that there is only one release date for each SAC release. If you use System Center Configuration Manager, Windows Server Update Services (WSUS), or other management tools, there will now only be one feature update published to WSUS, and this will occur at the time of release. Learn how this change will affect Windows Business for Update customers.
February 14, 2019
12: 00 PM PT
Champs corner: Classifying Windows updates in common deployment tools

If you utilize automated update deployment tools, such as Windows Server Update Services (WSUS) or System Center Configuration Manager, you likely use automatic rules to streamline the approval and deployment of Windows updates. Using the correct update classification is, therefore, an important component of your organization’s device update process. Explore the options available and how to approach it in a WSUS or Configuration Manager environment.
February 05, 2019
10: 34 AM PT
Update: Delta updates for Windows 10, version 1607, 1703, 1709, and 1803 will be available until April 9, 2019

Based on customer feedback, we are extending Delta update publication for Windows 10 versions 1607, 1703, 1709, and 1803. We will continue to provide Delta updates via the Microsoft Update Catalog through April 9th, 2019, which will be the last delta update available.
February 05, 2019
09: 00 AM PT
Global DNS outage affecting Windows Update customers

Windows Update customers were affected by a network infrastructure event on January 29, 2019 (21:00 UTC), caused by an external DNS service provider’s global outage. A software update to the external provider’s DNS servers resulted in the distribution of corrupted DNS records that affected connectivity to the Windows Update service. The DNS records were restored by January 30, 2019 (00:10 UTC), and the majority of local Internet Service Providers (ISP) have refreshed their DNS servers and customer services have been restored.

+
Get insight into some of the practices we employ to measure and improve the quality of Windows.
March 06, 2019
10:23 AM PT
Getting to know the Windows update history pages
Windows update history pages offer detailed information about each Windows update: the type of update, which operating systems it affects, the improvements and fixes included, and how to get the update. See how simple it is to use this important resource to access information for Windows 10, Windows Server 2019, and earlier versions of the Windows and Windows Server operating systems.
February 21, 2019
06:37 PM PT
Share your feedback: Windows update history
We read every comment you leave on our update history pages, and are always looking to improve these pages and the monthly knowledge base (KB) articles that accompany each monthly update. Take our survey and let us know how we can improve our transparency further and make these more compelling and useful to you and your organization.
February 21, 2019
12:00 PM PT
Plan for change: Windows Update for Business and the retirement of SAC-T
Beginning with Windows 10, version 1903 (the next feature update for Windows 10), the Windows 10 release information page will no longer list SAC-T information for version 1903 and future feature updates. Instead, you will find a single entry for each new SAC release. In addition, if you are using Windows Update for Business, you will see new UI and behavior to reflect that there is only one release date for each SAC release. If you use System Center Configuration Manager, Windows Server Update Services (WSUS), or other management tools, there will now only be one feature update published to WSUS, and this will occur at the time of release. Learn how this change will affect Windows Business for Update customers.
February 14, 2019
12:00 PM PT
Champs corner: Classifying Windows updates in common deployment tools
If you utilize automated update deployment tools, such as Windows Server Update Services (WSUS) or System Center Configuration Manager, you likely use automatic rules to streamline the approval and deployment of Windows updates. Using the correct update classification is, therefore, an important component of your organization’s device update process. Explore the options available and how to approach it in a WSUS or Configuration Manager environment.
February 05, 2019
10:34 AM PT
Update: Delta updates for Windows 10, version 1607, 1703, 1709, and 1803 will be available until April 9, 2019
Based on customer feedback, we are extending Delta update publication for Windows 10 versions 1607, 1703, 1709, and 1803. We will continue to provide Delta updates via the Microsoft Update Catalog through April 9th, 2019, which will be the last delta update available.
February 05, 2019
09:00 AM PT
Global DNS outage affecting Windows Update customers
Windows Update customers were affected by a network infrastructure event on January 29, 2019 (21:00 UTC), caused by an external DNS service provider’s global outage. A software update to the external provider’s DNS servers resulted in the distribution of corrupted DNS records that affected connectivity to the Windows Update service. The DNS records were restored by January 30, 2019 (00:10 UTC), and the majority of local Internet Service Providers (ISP) have refreshed their DNS servers and customer services have been restored.

While this was not an issue with Microsoft’s services, we take any service disruption for our customers seriously. We will work with partners to better understand this so we can provide higher quality service in the future even across diverse global network providers.

-If you are still unable to connect to Windows Update services due to this problem, please contact your local ISP or network administrator. You can also refer to our new KB4493784 for more information to determine if your network is affected, and to provide your local ISP or network administrator with additional information to assist you.
January 29, 2019
04: 15 PM PT
Application compatibility in the Windows ecosystem

Our application ecosystem is incredibly diverse, encompassing tens of millions of applications (apps) with numerous versions, languages, architectures, services and configuration options. While our ecosystem is complex, our vision is simple. All apps on Windows devices should just work! Explore the various programs and technologies we use to improve application compatibility.
January 15, 2019
10: 00 AM PT
Modern desktop servicing: the year in review

2018 was a pivotal year for the modern desktop and the servicing transformation journey we have been taking with you and your organization. In this post, John Wilcox takes a look back and recaps the progress that has been made, highlighting significant events, and provideing nsight into what 2019 has in store.
December 19, 2018
02: 20 PM PT
Driver quality in the Windows ecosystem

Ensuring Windows 10 works great with all the devices and accessories our customers use is a top priority. We work closely with this broad mix of partners to test new drivers, monitor health characteristics over time, and make Windows and our ecosystem more resilient architecturally. Our goal is to ensure that all the updates and drivers we deliver to non-Insider populations are validated and at production quality (including monthly optional releases) before pushing drivers broadly to all. Explore the driver distribution chain and learn how we measure driver quality and prevent conflicts.
December 19, 2018
10: 04 AM PT
Introducing the Modern Desktop podcast series

In this new podcast series, we'll explore the good, the bad, and, yes, the ugly of servicing and delivery for Windows 10 and Office 365 ProPlus. We'll talk about modern desktop management through Enterprise Mobility, security, and cloud-attached and co-managed environments. Listen to the first episode, in which we discuss monthly quality updates fpr Windows 10, the Microsoft 365 Stay Current pilot program, and interview a real customer to see how they ingest monthly updates in their organization.
December 18, 2018
01: 00 PM PT
Measuring Delivery Optimization and its impact to your network

If you've familiarized yourself with the configuration options for Delivery Optimization in Windows 10, and have started to configure the settings you feel will be the best fit for your organization’s network topology, now is the time to see how well those settings are working. This article provides tips on how evaluate performance at the device level or organization level.
December 13, 2018
03: 48 PM PT
Windows monthly security and quality updates overview

Today’s global cybersecurity threats are both dynamic and sophisticated, and new vulnerabilities are discovered almost every day. We focus on protecting customers from these security threats by providing security updates on a timely basis and with high quality. Find out how how we deliver these critical updates on a massive scale as a key component of our ongoing Windows as a service effort.
December 10, 2018
10: 00 AM PT
LTSC: What is it, and when should it be used?

With the Semi-Annual Channel, devices receive two feature updates per year, and benefit from the best performance, user experience, security, and stability. This servicing option continues to be our recommendation for managing Windows 10 updates; however, we acknowledge that certain devices and use cases (e.g. medical systems and industrial process controllers) dictate that functionality and features don’t change over time. Find out how we designed the Long-Term Servicing Channel (LTSC) with these types of use cases in mind, and what is offered through the LTSC.
November 29, 2018
07: 02 PM PT
Plan for change: Local Experience Packs: What are they and when should you use them?

When we released Windows 10, version 1803, we introduced Local Experience Packs (LXPs), which are modern language packs delivered through the Microsoft Store or Microsoft Store for Business. Learn about the biggest advantage to LXPs, and the retirement of legacy language packs (lp.cab) for all Language Interface Packs (LIP).
November 14, 2018
11: 10 AM PT
Windows 10 Quality approach for a complex ecosystem

While our measurements of quality show improving trends on aggregate for each successive Windows 10 release, if a single customer experiences an issue with any of our updates, we take it seriously. In this blog post, Windows CVP Mike Fortin shares an overview of how we work to continuously improve the quality of Windows and our Windows as a service approach. This blog will be the first in a series of more in-depth explanations of the work we do to deliver quality in our Windows releases.
November 13, 2018
10: 00 AM PT
Windows 10, version 1809 rollout resumes; now available on VLSC

Today we are resuming the rollout of the latest Windows 10 feature update—Windows 10, version 1809—via the Software Download Center (via Update Assistant or the Media Creation Tool), Windows Server Update Services (WSUS), and Windows Update for Business. Windows 10, version 1809 is also now available on the Volume Licensing Service Center (VLSC).
November 13, 2018
10: 00 AM PT
Express updates for Windows Server 2016 re-enabled for November 2018 update

Starting with the November 13, 2018 Update Tuesday release, Windows will again publish Express updates for Windows Server 2016. That means that system administrators for WSUS and System Center Configuration Manager will once again see two packages for the Windows Server 2016 update: a Full update and an Express update. Read this article for more details.
November 12, 2018
03: 00 PM PT
Plan for change: 2019 SHA-2 code signing support requirement for Windows and WSUS

To protect your security, Windows operating system updates are dual-signed using both the SHA-1 and SHA-2 hash algorithms to authenticate that updates come directly from Microsoft and were not tampered with during delivery. Due to weaknesses in the SHA-1 algorithm and to align to industry standards Microsoft will only sign Windows updates using the more secure SHA-2 algorithm exclusively.

Customers running legacy OS versions (Windows 7 SP1, Windows Server 2008 R2 SP1 and Windows Server 2008 SP2) will be required to have SHA-2 code signing support installed on their devices by July 2019. Any devices without SHA-2 support will not be offered Windows updates after July 2019. To help prepare you for this change, we will release support for SHA-2 signing in 2019. Windows Server Update Services (WSUS) 3.0 SP2 will receive SHA-2 support to properly deliver SHA-2 signed updates. Please make note of the dates in the migration timeline and plan accordingly.
November 09, 2018
10: 00 AM PT
January 29, 2019
04:15 PM PT
Application compatibility in the Windows ecosystem
Our application ecosystem is incredibly diverse, encompassing tens of millions of applications (apps) with numerous versions, languages, architectures, services and configuration options. While our ecosystem is complex, our vision is simple. All apps on Windows devices should just work! Explore the various programs and technologies we use to improve application compatibility.
January 15, 2019
10:00 AM PT
Modern desktop servicing: the year in review
2018 was a pivotal year for the modern desktop and the servicing transformation journey we have been taking with you and your organization. In this post, John Wilcox takes a look back and recaps the progress that has been made, highlighting significant events, and provideing nsight into what 2019 has in store.
December 19, 2018
02:20 PM PT
Driver quality in the Windows ecosystem
Ensuring Windows 10 works great with all the devices and accessories our customers use is a top priority. We work closely with this broad mix of partners to test new drivers, monitor health characteristics over time, and make Windows and our ecosystem more resilient architecturally. Our goal is to ensure that all the updates and drivers we deliver to non-Insider populations are validated and at production quality (including monthly optional releases) before pushing drivers broadly to all. Explore the driver distribution chain and learn how we measure driver quality and prevent conflicts.
December 19, 2018
10:04 AM PT
Introducing the Modern Desktop podcast series
In this new podcast series, we'll explore the good, the bad, and, yes, the ugly of servicing and delivery for Windows 10 and Office 365 ProPlus. We'll talk about modern desktop management through Enterprise Mobility, security, and cloud-attached and co-managed environments. Listen to the first episode, in which we discuss monthly quality updates fpr Windows 10, the Microsoft 365 Stay Current pilot program, and interview a real customer to see how they ingest monthly updates in their organization.
December 18, 2018
01:00 PM PT
Measuring Delivery Optimization and its impact to your network
If you've familiarized yourself with the configuration options for Delivery Optimization in Windows 10, and have started to configure the settings you feel will be the best fit for your organization’s network topology, now is the time to see how well those settings are working. This article provides tips on how evaluate performance at the device level or organization level.
December 13, 2018
03:48 PM PT
Windows monthly security and quality updates overview
Today’s global cybersecurity threats are both dynamic and sophisticated, and new vulnerabilities are discovered almost every day. We focus on protecting customers from these security threats by providing security updates on a timely basis and with high quality. Find out how how we deliver these critical updates on a massive scale as a key component of our ongoing Windows as a service effort.
December 10, 2018
10:00 AM PT
LTSC: What is it, and when should it be used?
With the Semi-Annual Channel, devices receive two feature updates per year, and benefit from the best performance, user experience, security, and stability. This servicing option continues to be our recommendation for managing Windows 10 updates; however, we acknowledge that certain devices and use cases (e.g. medical systems and industrial process controllers) dictate that functionality and features don’t change over time. Find out how we designed the Long-Term Servicing Channel (LTSC) with these types of use cases in mind, and what is offered through the LTSC.
November 29, 2018
07:02 PM PT
Plan for change: Local Experience Packs: What are they and when should you use them?
When we released Windows 10, version 1803, we introduced Local Experience Packs (LXPs), which are modern language packs delivered through the Microsoft Store or Microsoft Store for Business. Learn about the biggest advantage to LXPs, and the retirement of legacy language packs (lp.cab) for all Language Interface Packs (LIP).
November 14, 2018
11:10 AM PT
Windows 10 Quality approach for a complex ecosystem
While our measurements of quality show improving trends on aggregate for each successive Windows 10 release, if a single customer experiences an issue with any of our updates, we take it seriously. In this blog post, Windows CVP Mike Fortin shares an overview of how we work to continuously improve the quality of Windows and our Windows as a service approach. This blog will be the first in a series of more in-depth explanations of the work we do to deliver quality in our Windows releases.
November 13, 2018
10:00 AM PT
Windows 10, version 1809 rollout resumes; now available on VLSC
Today we are resuming the rollout of the latest Windows 10 feature update—Windows 10, version 1809—via the Software Download Center (via Update Assistant or the Media Creation Tool), Windows Server Update Services (WSUS), and Windows Update for Business. Windows 10, version 1809 is also now available on the Volume Licensing Service Center (VLSC).
November 13, 2018
10:00 AM PT
Express updates for Windows Server 2016 re-enabled for November 2018 update
Starting with the November 13, 2018 Update Tuesday release, Windows will again publish Express updates for Windows Server 2016. That means that system administrators for WSUS and System Center Configuration Manager will once again see two packages for the Windows Server 2016 update: a Full update and an Express update. Read this article for more details.
November 12, 2018
03:00 PM PT
Plan for change: 2019 SHA-2 code signing support requirement for Windows and WSUS
To protect your security, Windows operating system updates are dual-signed using both the SHA-1 and SHA-2 hash algorithms to authenticate that updates come directly from Microsoft and were not tampered with during delivery. Due to weaknesses in the SHA-1 algorithm and to align to industry standards Microsoft will only sign Windows updates using the more secure SHA-2 algorithm exclusively.

Customers running legacy OS versions (Windows 7 SP1, Windows Server 2008 R2 SP1 and Windows Server 2008 SP2) will be required to have SHA-2 code signing support installed on their devices by July 2019. Any devices without SHA-2 support will not be offered Windows updates after July 2019. To help prepare you for this change, we will release support for SHA-2 signing in 2019. Windows Server Update Services (WSUS) 3.0 SP2 will receive SHA-2 support to properly deliver SHA-2 signed updates. Please make note of the dates in the migration timeline and plan accordingly.
November 09, 2018
10:00 AM PT
" From 9ce30934b5ae8eb04097e071d68a2608656e130b Mon Sep 17 00:00:00 2001 From: "Nisha Mittal (Wipro Ltd.)" Date: Mon, 29 Apr 2019 13:16:29 -0700 Subject: [PATCH 236/724] Fixed Logged Issues --- .../resolved-issues-windows-10-1703.yml | 2 +- ...indows-10-1809-and-windows-server-2019.yml | 4 ++-- ...ndows-7-and-windows-server-2008-r2-sp1.yml | 8 +++---- ...windows-8.1-and-windows-server-2012-r2.yml | 8 +++---- ...esolved-issues-windows-server-2008-sp2.yml | 2 +- .../resolved-issues-windows-server-2012.yml | 4 ++-- .../status-windows-10-1507.yml | 4 ++-- ...indows-10-1607-and-windows-server-2016.yml | 16 ++++++------- .../status-windows-10-1703.yml | 6 ++--- .../status-windows-10-1709.yml | 4 ++-- .../status-windows-10-1803.yml | 8 +++---- ...indows-10-1809-and-windows-server-2019.yml | 8 +++---- ...ndows-7-and-windows-server-2008-r2-sp1.yml | 20 ++++++++-------- ...windows-8.1-and-windows-server-2012-r2.yml | 24 +++++++++---------- .../status-windows-server-2008-sp2.yml | 12 +++++----- .../status-windows-server-2012.yml | 16 ++++++------- .../windows-message-center.yml | 2 +- 17 files changed, 74 insertions(+), 74 deletions(-) diff --git a/windows/release-information/resolved-issues-windows-10-1703.yml b/windows/release-information/resolved-issues-windows-10-1703.yml index 828dfa51d7..9d14d877f7 100644 --- a/windows/release-information/resolved-issues-windows-10-1703.yml +++ b/windows/release-information/resolved-issues-windows-10-1703.yml @@ -63,7 +63,7 @@ sections: text: " - +
DetailsOriginating updateStatusHistory
Custom URI schemes may not start corresponding application
After installing KB4489871, custom URI schemes for application protocol handlers may not start the corresponding application for local intranet and trusted sites security zones on Internet Explorer.

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10, version 1607; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 10 Enterprise LTSB 2015; Windows 8.1; Windows 7 SP1 
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2; Windows Server 2008 R2 SP1
Resolution: This issue is resolved in KB4493436

Back to top
OS Build 15063.1689

March 12, 2019
KB4489871
Resolved
KB4493436
Resolved:
April 25, 2019
02:00 PM PT

Opened:
March 12, 2019
10:00 AM PT
End-user-defined characters (EUDC) may cause blue screen at startup
If you enable per font end-user-defined characters (EUDC), the system may stop working and a blue screen may appear at startup. This is not a common setting in non-Asian regions.

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016
Resolution: This issue was resolved in KB4493474.

Back to top
OS Build 15063.1716

March 19, 2019
KB4489888
Resolved
KB4493474
Resolved:
April 09, 2019
10:00 AM PT

Opened:
March 19, 2019
10:00 AM PT
End-user-defined characters (EUDC) may cause blue screen at startup
If you enable per font end-user-defined characters (EUDC), the system may stop working and a blue screen may appear at startup. This is not a common setting in non-Asian regions.

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10, version 1607; Windows 10 Enterprise LTSC 2016
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016
Resolution: This issue was resolved in KB4493474.

Back to top
OS Build 15063.1716

March 19, 2019
KB4489888
Resolved
KB4493474
Resolved:
April 09, 2019
10:00 AM PT

Opened:
March 19, 2019
10:00 AM PT
" diff --git a/windows/release-information/resolved-issues-windows-10-1809-and-windows-server-2019.yml b/windows/release-information/resolved-issues-windows-10-1809-and-windows-server-2019.yml index ff99855d88..e39219c9ba 100644 --- a/windows/release-information/resolved-issues-windows-10-1809-and-windows-server-2019.yml +++ b/windows/release-information/resolved-issues-windows-10-1809-and-windows-server-2019.yml @@ -101,8 +101,8 @@ sections: - type: markdown text: " - - + + diff --git a/windows/release-information/resolved-issues-windows-7-and-windows-server-2008-r2-sp1.yml b/windows/release-information/resolved-issues-windows-7-and-windows-server-2008-r2-sp1.yml index 430a1a9900..76c058d5a5 100644 --- a/windows/release-information/resolved-issues-windows-7-and-windows-server-2008-r2-sp1.yml +++ b/windows/release-information/resolved-issues-windows-7-and-windows-server-2008-r2-sp1.yml @@ -32,13 +32,13 @@ sections: - type: markdown text: "
DetailsOriginating updateStatusHistory
Internet Explorer 11 authentication issue with multiple concurrent logons
After installing KB4480116, Internet Explorer 11 and other applications that use WININET.DLL may have authentication issues. This occurs when two or more people use the same user account for multiple, concurrent login sessions on the same Windows Server machine, including Remote Desktop Protocol (RDP) and Terminal Server logons. Symptoms reported by customers include, but may not be limited to: 
 
  • Cache size and location show zero or empty. 
  • Keyboard shortcuts may not work properly. 
  • Webpages may intermittently fail to load or render correctly. 
  • Issues with credential prompts. 
  • Issues when downloading files. 
 
Resolved: This issue was resolved in KB4493509

Back to top
OS Build 17763.253

January 08, 2019
KB4480116
Resolved
KB4493509
Resolved:
April 09, 2019
10:00 AM PT

Opened:
January 08, 2019
10:00 AM PT
MSXML6 may cause applications to stop responding
After installing KB4480116, MSXML6 causes applications to stop responding if an exception was thrown during node operations, such as appendChild(), insertBefore(), and moveNode().
 
The Group Policy editor may stop responding when editing a Group Policy Object (GPO) that contains Group Policy Preferences (GPP) for Internet Explorer 10 settings. 

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10, version 1607; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 10 Enterprise LTSB 2015; Windows 8.1
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2; Windows Server 2012
Resolved: This issue was resolved in KB4493509

Back to top
OS Build 17763.253

January 08, 2019
KB4480116
Resolved
KB4493509
Resolved:
April 09, 2019
10:00 AM PT

Opened:
January 08, 2019
10:00 AM PT
Internet Explorer 11 authentication issue with multiple concurrent logons
After installing KB4480116, Internet Explorer 11 and other applications that use WININET.DLL may have authentication issues. This occurs when two or more people use the same user account for multiple, concurrent login sessions on the same Windows Server machine, including Remote Desktop Protocol (RDP) and Terminal Server logons. Symptoms reported by customers include, but may not be limited to: 
 
  • Cache size and location show zero or empty. 
  • Keyboard shortcuts may not work properly. 
  • Webpages may intermittently fail to load or render correctly. 
  • Issues with credential prompts. 
  • Issues when downloading files. 
Resolution: This issue was resolved in KB4493509

Back to top
OS Build 17763.253

January 08, 2019
KB4480116
Resolved
KB4493509
Resolved:
April 09, 2019
10:00 AM PT

Opened:
January 08, 2019
10:00 AM PT
MSXML6 may cause applications to stop responding
After installing KB4480116, MSXML6 causes applications to stop responding if an exception was thrown during node operations, such as appendChild(), insertBefore(), and moveNode().
 
The Group Policy editor may stop responding when editing a Group Policy Object (GPO) that contains Group Policy Preferences (GPP) for Internet Explorer 10 settings. 

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10, version 1607; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 10 Enterprise LTSB 2015; Windows 8.1
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2; Windows Server 2012
Resolution: This issue was resolved in KB4493509

Back to top
OS Build 17763.253

January 08, 2019
KB4480116
Resolved
KB4493509
Resolved:
April 09, 2019
10:00 AM PT

Opened:
January 08, 2019
10:00 AM PT
Global DNS outage affects Windows Update customers
Windows Update customers were affected by a network infrastructure event on January 29, 2019 (21:00 UTC), caused by an external DNS service provider's global outage. A software update to the external provider's DNS servers resulted in the distribution of corrupted DNS records that affected connectivity to the Windows Update service. The DNS records were restored by January 30, 2019 (00:10 UTC), and the majority of local Internet Service Providers (ISP) have refreshed their DNS servers and customer services have been restored. 
 
Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019
  • Server: Windows Server, version 1809; Windows Server 2019
While this was not an issue with Microsoft's services, we take any service disruption for our customers seriously. We will work with partners to better understand this so we can provide higher quality service in the future even across diverse global network providers. 
 
If you are still unable to connect to Windows Update services due to this problem, please contact your local ISP or network administrator. You can also refer to our new KB4493784 for more information to determine if your network is affected, and to provide your local ISP or network administrator with additional information to assist you. 

Back to top
N/A

Resolved
Resolved:
March 08, 2019
11:15 AM PT

Opened:
January 29, 2019
02:00 PM PT
Webpages become unresponsive in Microsoft Edge
After installing KB4480116, some Microsoft Edge users report that they:
  • Cannot load webpages using a local IP address. 
  • Cannot load webpages on the Internet using a VPN connection.
Browsing fails or the webpage may become unresponsive.

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709
Resolution: This issue is resolved in KB4487044

Back to top
OS Build 17763.253

January 08, 2019
KB4480116
Resolved
KB4487044
Resolved:
February 12, 2019
10:00 AM PT

Opened:
January 08, 2019
10:00 AM PT
Unable to access hotspots with third-party applications
After installing KB4480116, third-party applications may have difficulty authenticating hotspots. 

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10, version 1607; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 10 Enterprise LTSB 2015; Windows 8.1
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2; Windows Server 2012
Resolution: This issue is resolved in KB4476976

Back to top
OS Build 17763.253

January 08, 2019
KB4480116
Resolved
KB4476976
Resolved:
January 22, 2019
02:00 PM PT

Opened:
January 08, 2019
10:00 AM PT
+ - - + @@ -60,7 +60,7 @@ sections: - type: markdown text: "
SummaryOriginating updateStatusDate resolved
Devices may not respond at login or Welcome screen if running certain Avast software
Devices running Avast for Business, Avast CloudCare, and AVG Business Edition antivirus software may become unresponsive after restart.

See details >
April 09, 2019
KB4493472
Resolved
April 25, 2019
02:00 PM PT
Internet Explorer 11 authentication issue with multiple concurrent logons
Internet Explorer 11 users may encounter issues if two or more people use the same user account for multiple, concurrent login sessions on the same Windows Server machine.

See details >
January 08, 2019
KB4480970
Resolved
KB4493472
April 09, 2019
10:00 AM PT
Custom URI schemes may not start corresponding application
Custom URI schemes for application protocol handlers may not start the corresponding application for local intranet and trusted sites in Internet Explorer.

See details >
March 12, 2019
KB4489878
Resolved
KB4493472
April 09, 2019
10:00 AM PT
NETDOM.EXE fails to run
NETDOM.EXE fails to run and the error, “The command failed to complete successfully.” appears on screen.

See details >
March 12, 2019
KB4489878
Resolved
KB4493472
April 09, 2019
10:00 AM PT
Devices may not respond at login or Welcome screen if running certain Avast software
Devices running Avast for Business, Avast CloudCare, and AVG Business Edition antivirus software may become unresponsive after restart.

See details >
April 09, 2019
KB4493472
Resolved
April 09, 2019
10:00 AM PT
Embedded objects may display incorrectly
Any compound document (OLE) server application that places embedded objects into the Windows Metafile (WMF) using the PatBlt API may display embedded objects incorrectly.

See details >
February 12, 2019
KB4486563
Resolved
KB4493472
April 09, 2019
10:00 AM PT
Event Viewer may not show some event descriptions for network interface cards
The Event Viewer may not show some event descriptions for network interface cards (NIC).

See details >
October 18, 2018
KB4462927
Resolved
KB4489878
March 12, 2019
10:00 AM PT
Virtual machines fail to restore
Virtual machines (VMs) may fail to restore successfully if the VM has been saved and restored once before.

See details >
January 08, 2019
KB4480970
Resolved
KB4490511
February 19, 2019
05:00 PM PT
Virtual machines fail to restore
Virtual machines (VMs) may fail to restore successfully if the VM has been saved and restored once before.

See details >
January 08, 2019
KB4480970
Resolved
KB4490511
February 19, 2019
02:00 PM PT
First character of the Japanese era name not recognized as an abbreviation
The first character of the Japanese era name is not recognized as an abbreviation and may cause date parsing issues.

See details >
January 17, 2019
KB4480955
Resolved
KB4486565
February 19, 2019
02:00 PM PT
Internet Explorer may fail to load images
Internet Explorer may fail to load images with a backslash (\\) in their relative source path.

See details >
February 12, 2019
KB4486563
Resolved
KB4486565
February 19, 2019
02:00 PM PT
Applications using Microsoft Jet database and Access 95 file format stop working
Applications that use a Microsoft Jet database with the Microsoft Access 95 file format may randomly stop working.

See details >
February 12, 2019
KB4486563
Resolved
KB4486565
February 19, 2019
02:00 PM PT
- +
DetailsOriginating updateStatusHistory
Devices may not respond at login or Welcome screen if running certain Avast software
Microsoft and Avast have identified an issue on devices running Avast for Business, Avast CloudCare, and AVG Business Edition antivirus software after you install KB4493472 and restart. Devices may become unresponsive at the login or Welcome screen. Additionally, you may be unable to log in or log in after an extended period of time.

Affected platforms: 
  • Client: Windows 8.1; Windows 7 SP1 
  • Server: Windows Server 2012 R2; Windows Server 2008 R2 SP1 
Resolution: Avast has released emergency updates to address this issue. For more information and AV update schedule, see the Avast support KB article.

Back to top
April 09, 2019
KB4493472
Resolved
Resolved:
April 09, 2019
10:00 AM PT

Opened:
April 09, 2019
10:00 AM PT
Devices may not respond at login or Welcome screen if running certain Avast software
Microsoft and Avast have identified an issue on devices running Avast for Business, Avast CloudCare, and AVG Business Edition antivirus software after you install KB4493472 and restart. Devices may become unresponsive at the login or Welcome screen. Additionally, you may be unable to log in or log in after an extended period of time.

Affected platforms: 
  • Client: Windows 8.1; Windows 7 SP1 
  • Server: Windows Server 2012 R2; Windows Server 2008 R2 SP1 
Resolution: Avast has released emergency updates to address this issue. For more information and AV update schedule, see the Avast support KB article.

Back to top
April 09, 2019
KB4493472
Resolved
Resolved:
April 25, 2019
02:00 PM PT

Opened:
April 09, 2019
10:00 AM PT
" @@ -91,7 +91,7 @@ sections: text: " - + diff --git a/windows/release-information/resolved-issues-windows-8.1-and-windows-server-2012-r2.yml b/windows/release-information/resolved-issues-windows-8.1-and-windows-server-2012-r2.yml index fbcf474ae5..9e949ff535 100644 --- a/windows/release-information/resolved-issues-windows-8.1-and-windows-server-2012-r2.yml +++ b/windows/release-information/resolved-issues-windows-8.1-and-windows-server-2012-r2.yml @@ -32,16 +32,16 @@ sections: - type: markdown text: "
DetailsOriginating updateStatusHistory
Internet Explorer 11 authentication issue with multiple concurrent logons
After installing KB4480970, Internet Explorer 11 and other applications that use WININET.DLL may have authentication issues. This occurs when two or more people use the same user account for multiple, concurrent login sessions on the same Windows Server machine, including Remote Desktop Protocol (RDP) and Terminal Server logons. Symptoms reported by customers include, but may not be limited to:
  • Cache size and location show zero or empty.
  • Keyboard shortcuts may not work properly.
  • Webpages may intermittently fail to load or render correctly.
  • Issues with credential prompts.
  • Issues when downloading files.
Affected platforms: 
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1607; Windows 10 Enterprise LTSC 2016; Windows 8.1; Windows 7 SP1
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server 2016; Windows Server 2012 R2; Windows Server 2012; Windows Server 2008 R2 SP1
Resolution: This issue is resolved in KB4493472.

Back to top
January 08, 2019
KB4480970
Resolved
KB4493472
Resolved:
April 09, 2019
10:00 AM PT

Opened:
January 08, 2019
10:00 AM PT
Virtual machines fail to restore
After installing KB4480970, virtual machines (VM) may fail to restore successfully if the VM has been saved and restored once before. The error message is, “Failed to restore the virtual machine state: Cannot restore this virtual machine because the saved state data cannot be read. Delete the saved state data and then try to start the virtual machine. (0xC0370027).”

This affects AMD Bulldozer Family 15h, AMD Jaguar Family 16h, and AMD Puma Family 16h (second generation) microarchitectures.

Affected platforms: 
  • Client: Windows 7 SP1 
  • Server: Windows Server 2012; Windows Server 2008 R2 SP1; Windows Server 2008 SP2
Resolution: This issue is resolved in KB4490511.

Back to top
January 08, 2019
KB4480970
Resolved
KB4490511
Resolved:
February 19, 2019
02:00 PM PT

Opened:
January 08, 2019
10:00 AM PT
Virtual machines fail to restore
After installing KB4480970, virtual machines (VM) may fail to restore successfully if the VM has been saved and restored once before. The error message is, “Failed to restore the virtual machine state: Cannot restore this virtual machine because the saved state data cannot be read. Delete the saved state data and then try to start the virtual machine. (0xC0370027).”

This affects AMD Bulldozer Family 15h, AMD Jaguar Family 16h, and AMD Puma Family 16h (second generation) microarchitectures.

Affected platforms: 
  • Client: Windows 8.1; Windows 7 SP1 
  • Server: Windows Server 2012 R2; Windows Server 2012; Windows Server 2008 R2 SP1; Windows Server 2008 SP2
Resolution: This issue is resolved in KB4490511.

Back to top
January 08, 2019
KB4480970
Resolved
KB4490511
Resolved:
February 19, 2019
02:00 PM PT

Opened:
January 08, 2019
10:00 AM PT
First character of the Japanese era name not recognized as an abbreviation
After installing KB4480955, the first character of the Japanese era name is not recognized as an abbreviation and may cause date parsing issues.

Affected platforms: 
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10, version 1607; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 10 Enterprise LTSB 2015; Windows 8.1; Windows 7 SP1 
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2; Windows Server 2012; Windows Server 2008 R2 SP1; Windows Server 2008 SP2 
Resolution: This issue is resolved in KB4486565.

Back to top
January 17, 2019
KB4480955
Resolved
KB4486565
Resolved:
February 19, 2019
02:00 PM PT

Opened:
January 17, 2019
10:00 AM PT
Applications using Microsoft Jet database fail to open
Applications that use a Microsoft Jet database with the Microsoft Access 97 file format may fail to open if the database has column names greater than 32 characters. The database will fail to open with the error, “Unrecognized Database Format”.

Affected Platforms:
  • Client: Windows 10, version 1709; Windows 10, version 1703; Windows 10, version 1607; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 10 Enterprise LTSB 2015; Windows 8.1; Windows 7 SP1 
  • Server: Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2; Windows Server 2012; Windows Server 2008 R2 SP1; Windows Server 2008 SP2 

Resolution: This issue is resolved in KB4486563.

Back to top
January 08, 2019
KB4480970
Resolved
KB4486563
Resolved:
February 12, 2019
10:00 AM PT

Opened:
January 08, 2019
10:00 AM PT
Local Administrators unable to remotely access shares
Local users who are part of the local Administrators group may not be able to remotely access shares on Windows Server 2008 R2 and Windows 7 machines after installing KB4480970. This does not affect domain accounts in the local Administrators group.
 
Affected platforms: 
  • Client: Windows 7 SP1 
  • Server: Windows Server 2008 R2 SP1; Windows Server 2008 SP2 
Resolution: This issue is resolved in KB4487345.

Back to top
January 08, 2019
KB4480970
Resolved
KB4487345
Resolved:
January 11, 2019
02:00 PM PT

Opened:
January 08, 2019
10:00 AM PT
+ - + - @@ -60,7 +60,7 @@ sections: - type: markdown text: "
SummaryOriginating updateStatusDate resolved
Devices may not respond at login or Welcome screen if running certain Avast software
Devices running Avast for Business, Avast CloudCare, and AVG Business Edition antivirus software may become unresponsive after restart.

See details >
April 09, 2019
KB4493446
Resolved
April 25, 2019
02:00 PM PT
Internet Explorer 11 authentication issue with multiple concurrent logons
Internet Explorer 11 users may encounter issues if two or more people use the same user account for multiple, concurrent login sessions on the same Windows Server machine.

See details >
January 08, 2019
KB4480963
Resolved
KB4493446
April 09, 2019
10:00 AM PT
MSXML6 may cause applications to stop responding.
MSXML6 may cause applications to stop responding if an exception was thrown during node operations, such as appendChild(), insertBefore(), and moveNode().

See details >
January 08, 2019
KB4480963
Resolved
KB4493446
April 09, 2019
10:00 AM PT
Custom URI schemes may not start corresponding application
Custom URI schemes for application protocol handlers may not start the corresponding application for local intranet and trusted sites in Internet Explorer.

See details >
March 12, 2019
KB4489881
Resolved
KB4493446
April 09, 2019
10:00 AM PT
Devices may not respond at login or Welcome screen if running certain Avast software
Devices running Avast for Business, Avast CloudCare, and AVG Business Edition antivirus software may become unresponsive after restart.

See details >
April 09, 2019
KB4493446
Resolved
April 09, 2019
10:00 AM PT
Embedded objects may display incorrectly
Any compound document (OLE) server application that places embedded objects into the Windows Metafile (WMF) using the PatBlt API may display embedded objects incorrectly.

See details >
February 12, 2019
KB4487000
Resolved
KB4493446
April 09, 2019
10:00 AM PT
Devices with winsock kernel client may receive error
Devices with a winsock kernel client may receive D1, FC, and other errors.

See details >
March 12, 2019
KB4489881
Resolved
KB4489893
March 19, 2019
10:00 AM PT
Error 1309 when installing/uninstalling MSI or MSP files
Users may receive “Error 1309” while installing or uninstalling certain types of MSI and MSP files.

See details >
February 19, 2019
KB4487016
Resolved
KB4489881
March 12, 2019
10:00 AM PT
Virtual machines fail to restore
Virtual machines (VMs) may fail to restore successfully if the VM has been saved and restored once before.

See details >
January 08, 2019
KB4480963
Resolved
KB4490512
February 19, 2019
02:00 PM PT
First character of the Japanese era name not recognized as an abbreviation
The first character of the Japanese era name is not recognized as an abbreviation and may cause date parsing issues.

See details >
January 15, 2019
KB4480969
Resolved
KB4487016
February 19, 2019
02:00 PM PT
Internet Explorer may fail to load images
Internet Explorer may fail to load images with a backslash (\\) in their relative source path.

See details >
February 12, 2019
KB4487000
Resolved
KB4487016
February 19, 2019
02:00 PM PT
Virtual machines fail to restore
Virtual machines (VMs) may fail to restore successfully if the VM has been saved and restored once before.

See details >
January 08, 2019
KB4480963
Resolved
KB4490512
February 19, 2019
10:00 AM PT
Applications using Microsoft Jet database fail to open
Applications that use a Microsoft Jet database with the Microsoft Access 97 file format may fail to open if column names are greater than 32 characters.

See details >
January 08, 2019
KB4480963
Resolved
KB4487000
February 12, 2019
10:00 AM PT
Unable to access hotspots with third-party applications
Third-party applications may have difficulty authenticating hotspots.

See details >
January 08, 2019
KB4480963
Resolved
KB4480969
January 15, 2019
10:00 AM PT
Unable to use Seek bar in Windows Media Player
Users may not be able to use the Seek bar in Windows Media Player when playing specific files.

See details >
October 09, 2018
KB4462926
Resolved
KB4471320
December 11, 2018
10:00 AM PT
- +
DetailsOriginating updateStatusHistory
Devices may not respond at login or Welcome screen if running certain Avast software
Microsoft and Avast have identified an issue on devices running Avast for Business, Avast CloudCare, and AVG Business Edition antivirus software after you install KB4493446 and restart. Devices may become unresponsive at the login or Welcome screen. Additionally, you may be unable to log in or log in after an extended period of time.

Affected platforms: 
  • Client: Windows 8.1; Windows 7 SP1 
  • Server: Windows Server 2012 R2; Windows Server 2008 R2 SP1 
Resolution: Avast has released emergency updates to address this issue. For more information and AV update schedule, see the Avast support KB article.

Back to top
April 09, 2019
KB4493446
Resolved
Resolved:
April 09, 2019
10:00 AM PT

Opened:
April 09, 2019
10:00 AM PT
Devices may not respond at login or Welcome screen if running certain Avast software
Microsoft and Avast have identified an issue on devices running Avast for Business, Avast CloudCare, and AVG Business Edition antivirus software after you install KB4493446 and restart. Devices may become unresponsive at the login or Welcome screen. Additionally, you may be unable to log in or log in after an extended period of time.

Affected platforms: 
  • Client: Windows 8.1; Windows 7 SP1 
  • Server: Windows Server 2012 R2; Windows Server 2008 R2 SP1 
Resolution: Avast has released emergency updates to address this issue. For more information and AV update schedule, see the Avast support KB article.

Back to top
April 09, 2019
KB4493446
Resolved
Resolved:
April 25, 2019
02:00 PM PT

Opened:
April 09, 2019
10:00 AM PT
" @@ -92,8 +92,8 @@ sections: + -
DetailsOriginating updateStatusHistory
Internet Explorer 11 authentication issue with multiple concurrent logons
After installing KB4480963, Internet Explorer 11 and other applications that use WININET.DLL may have authentication issues. This occurs when two or more people use the same user account for multiple, concurrent login sessions on the same Windows Server machine, including Remote Desktop Protocol (RDP) and Terminal Server logons. Symptoms reported by customers include, but may not be limited to:
  • Cache size and location show zero or empty.
  • Keyboard shortcuts may not work properly.
  • Webpages may intermittently fail to load or render correctly.
  • Issues with credential prompts.
  • Issues when downloading files.
Affected platforms: 
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1607; Windows 10 Enterprise LTSC 2016; Windows 8.1; Windows 7 SP1
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server 2016; Windows Server 2012 R2; Windows Server 2012; Windows Server 2008 R2 SP1
Resolution: This issue is resolved in KB4493446.

Back to top
January 08, 2019
KB4480963
Resolved
KB4493446
Resolved:
April 09, 2019
10:00 AM PT

Opened:
January 08, 2019
10:00 AM PT
MSXML6 may cause applications to stop responding.
After installing KB4480963, MSXML6 causes applications to stop responding if an exception was thrown during node operations, such as appendChild(), insertBefore(), and moveNode().

The Group Policy editor may stop responding when editing a Group Policy Object (GPO) that contains Group Policy Preferences (GPP) for Internet Explorer 10 settings.

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10, version 1607; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 10 Enterprise LTSB 2015; Windows 8.1
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2; Windows Server 2012
Resolution: This issue is resolved in KB4493446.

Back to top
January 08, 2019
KB4480963
Resolved
KB4493446
Resolved:
April 09, 2019
10:00 AM PT

Opened:
January 08, 2019
10:00 AM PT
Virtual machines fail to restore
After installing KB4480963, virtual machines (VM) may fail to restore successfully if the VM has been saved and restored once before. The error message is, “Failed to restore the virtual machine state: Cannot restore this virtual machine because the saved state data cannot be read. Delete the saved state data and then try to start the virtual machine. (0xC0370027).”

This affects AMD Bulldozer Family 15h, AMD Jaguar Family 16h, and AMD Puma Family 16h (second generation) microarchitectures.

Affected platforms: 
  • Client: Windows 8.1; Windows 7 SP1 
  • Server: Windows Server 2012 R2; Windows Server 2012; Windows Server 2008 R2 SP1; Windows Server 2008 SP2
Resolution: This issue is resolved in KB4490512.

Back to top
January 08, 2019
KB4480963
Resolved
KB4490512
Resolved:
February 19, 2019
02:00 PM PT

Opened:
January 08, 2019
10:00 AM PT
First character of the Japanese era name not recognized as an abbreviation
After installing KB4480969, the first character of the Japanese era name is not recognized as an abbreviation and may cause date parsing issues.

Affected platforms: 
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10, version 1607; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 10 Enterprise LTSB 2015; Windows 8.1; Windows 7 SP1 
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2; Windows Server 2012; Windows Server 2008 R2 SP1; Windows Server 2008 SP2 
Resolution: This issue is resolved in KB4487016.

Back to top
January 15, 2019
KB4480969
Resolved
KB4487016
Resolved:
February 19, 2019
02:00 PM PT

Opened:
January 15, 2019
10:00 AM PT
Virtual machines fail to restore
After installing KB4480963, virtual machines (VM) may fail to restore successfully if the VM has been saved and restored once before. The error message is, “Failed to restore the virtual machine state: Cannot restore this virtual machine because the saved state data cannot be read. Delete the saved state data and then try to start the virtual machine. (0xC0370027).”

This affects AMD Bulldozer Family 15h, AMD Jaguar Family 16h, and AMD Puma Family 16h (second generation) microarchitectures.

Affected platforms: 
  • Client: Windows 7 SP1 
  • Server: Windows Server 2012; Windows Server 2008 R2 SP1; Windows Server 2008 SP2
Resolution: This issue is resolved in KB4490512.

Back to top
January 08, 2019
KB4480963
Resolved
KB4490512
Resolved:
February 19, 2019
02:00 PM PT

Opened:
January 08, 2019
10:00 AM PT
Applications using Microsoft Jet database fail to open
Applications that use a Microsoft Jet database with the Microsoft Access 97 file format may fail to open if the database has column names greater than 32 characters. The database will fail to open with the error, “Unrecognized Database Format”.

Affected platforms: 
  • Client: Windows 10, version 1709; Windows 10, version 1703; Windows 10, version 1607; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 10 Enterprise LTSB 2015; Windows 8.1; Windows 7 SP1 
  • Server: Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2; Windows Server 2012; Windows Server 2008 R2 SP1; Windows Server 2008 SP2 
Resolution: This issue is resolved in KB4487000.

Back to top
January 08, 2019
KB4480963
Resolved
KB4487000
Resolved:
February 12, 2019
10:00 AM PT

Opened:
January 08, 2019
10:00 AM PT
Unable to access hotspots with third-party applications
After installing KB4480963, third-party applications may have difficulty authenticating hotspots.

Affected platforms: 
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10, version 1607; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 10 Enterprise LTSB 2015; Windows 8.1 
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2; Windows Server 2012
Resolution: This issue is resolved in KB4480969.

Back to top
January 08, 2019
KB4480963
Resolved
KB4480969
Resolved:
January 15, 2019
10:00 AM PT

Opened:
January 08, 2019
10:00 AM PT
diff --git a/windows/release-information/resolved-issues-windows-server-2008-sp2.yml b/windows/release-information/resolved-issues-windows-server-2008-sp2.yml index 8fa6c33769..8a96794380 100644 --- a/windows/release-information/resolved-issues-windows-server-2008-sp2.yml +++ b/windows/release-information/resolved-issues-windows-server-2008-sp2.yml @@ -75,7 +75,7 @@ sections: text: " - +
DetailsOriginating updateStatusHistory
First character of the Japanese era name not recognized as an abbreviation
After installing KB4480974, the first character of the Japanese era name is not recognized as an abbreviation and may cause date parsing issues.

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10, version 1607; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 10 Enterprise LTSB 2015; Windows 8.1; Windows 7 SP1
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2; Windows Server 2012; Windows Server 2008 R2 SP1; Windows Server 2008 SP2
Resolution: This issue is resolved in KB4489880.

Back to top
January 17, 2019
KB4480974
Resolved
KB4489880
Resolved:
March 12, 2019
10:00 AM PT

Opened:
January 17, 2019
10:00 AM PT
Virtual machines fail to restore
After installing KB4480968, virtual machines (VM) may fail to restore successfully if the VM has been saved and restored once before. The error message is, “Failed to restore the virtual machine state: Cannot restore this virtual machine because the saved state data cannot be read. Delete the saved state data and then try to start the virtual machine. (0xC0370027).”

This affects AMD Bulldozer Family 15h, AMD Jaguar Family 16h, and AMD Puma Family 16h (second generation) microarchitectures.

Affected platforms: 
  • Client: Windows 7 SP1 
  • Server: Windows Server 2012; Windows Server 2008 R2 SP1; Windows Server 2008 SP2
Resolution: This issue is resolved in KB4490514.

Back to top
January 08, 2019
KB4480968
Resolved
KB4490514
Resolved:
February 19, 2019
02:00 PM PT

Opened:
January 08, 2019
10:00 AM PT
Virtual machines fail to restore
After installing KB4480968, virtual machines (VM) may fail to restore successfully if the VM has been saved and restored once before. The error message is, “Failed to restore the virtual machine state: Cannot restore this virtual machine because the saved state data cannot be read. Delete the saved state data and then try to start the virtual machine. (0xC0370027).”

This affects AMD Bulldozer Family 15h, AMD Jaguar Family 16h, and AMD Puma Family 16h (second generation) microarchitectures.

Affected platforms: 
  • Client: Windows 8.1; Windows 7 SP1 
  • Server: Windows Server 2012 R2; Windows Server 2012; Windows Server 2008 R2 SP1; Windows Server 2008 SP2
Resolution: This issue is resolved in KB4490514.

Back to top
January 08, 2019
KB4480968
Resolved
KB4490514
Resolved:
February 19, 2019
02:00 PM PT

Opened:
January 08, 2019
10:00 AM PT
Applications using Microsoft Jet database fail to open
Applications that use a Microsoft Jet database with the Microsoft Access 97 file format may fail to open if the database has column names greater than 32 characters. The database will fail to open with the error, “Unrecognized Database Format”.

Affected platforms: 
  • Client: Windows 10, version 1709; Windows 10, version 1703; Windows 10, version 1607; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 10 Enterprise LTSB 2015; Windows 8.1; Windows 7 SP1 
  • Server: Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2; Windows Server 2012; Windows Server 2008 R2 SP1; Windows Server 2008 SP2
Resolution: This issue is resolved in KB4487023.

Back to top
January 08, 2019
KB4480968
Resolved
KB4487023
Resolved:
February 12, 2019
10:00 AM PT

Opened:
January 08, 2019
10:00 AM PT
Local Administrators unable to remotely access shares
Local users who are part of the local Administrators group may not be able to remotely access shares on Windows Server 2008 R2 and Windows 7 machines after installing KB4480968. This does not affect domain accounts in the local Administrators group.

Affected platforms: 
  • Client: Windows 7 SP1 
  • Server: Windows Server 2008 R2 SP1; Windows Server 2008 SP2
Resolution: This issue is resolved in KB4487354.

Back to top
January 08, 2019
KB4480968
Resolved
KB4487354
Resolved:
January 11, 2019
02:00 PM PT

Opened:
January 08, 2019
10:00 AM PT
diff --git a/windows/release-information/resolved-issues-windows-server-2012.yml b/windows/release-information/resolved-issues-windows-server-2012.yml index 87e6e8ea5b..e4331cc2db 100644 --- a/windows/release-information/resolved-issues-windows-server-2012.yml +++ b/windows/release-information/resolved-issues-windows-server-2012.yml @@ -60,7 +60,7 @@ sections: - +
DetailsOriginating updateStatusHistory
Embedded objects may display incorrectly
Any compound document (OLE) server application that places embedded objects into the Windows Metafile (WMF) using the PatBlt API may display embedded objects incorrectly.

For example, if you paste a Microsoft Excel worksheet object into a Microsoft Word document, the cells may render with a different background color.

Affected platforms: 
  • Client:  Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 8.1 
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server 2012 R2; Windows Server 2012; Windows Server 2008 SP2
Resolution: This issue is resolved in KB4493451.

Back to top
February 12, 2019
KB4487025
Resolved
KB4493451
Resolved:
April 09, 2019
10:00 AM PT

Opened:
February 12, 2019
10:00 AM PT
Error 1309 when installing/uninstalling MSI or MSP files
After installing KB4487025, users may receive \"Error 1309\" while installing or uninstalling certain types of MSI and MSP files.

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10, version 1607; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 10 Enterprise LTSB 2015; Windows 8.1
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2; Windows Server 2012
Resolution: This issue is resolved in KB4489891.

Back to top
February 12, 2019
KB4487025
Resolved
KB4489891
Resolved:
March 12, 2019
10:00 AM PT

Opened:
February 12, 2019
10:00 AM PT
Applications using Microsoft Jet database and Access 95 file format stop working
Applications that use a Microsoft Jet database with the Microsoft Access 95 file format may randomly stop working.

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 7 SP1
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012; Windows Server 2008 R2 SP1; Windows Server 2008 SP2
Resolution: This issue is resolved in KB4487024.

Back to top
February 12, 2019
KB4487025
Resolved
KB4487024
Resolved:
February 19, 2019
02:00 PM PT

Opened:
February 12, 2019
10:00 AM PT
Applications using Microsoft Jet database and Access 95 file format stop working
Applications that use a Microsoft Jet database with the Microsoft Access 95 file format may randomly stop working.

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10, version 1607; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 10 Enterprise LTSB 2015; Windows 7 SP1
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012; Windows Server 2008 R2 SP1; Windows Server 2008 SP2
Resolution: This issue is resolved in KB4487024.

Back to top
February 12, 2019
KB4487025
Resolved
KB4487024
Resolved:
February 19, 2019
02:00 PM PT

Opened:
February 12, 2019
10:00 AM PT
" @@ -71,7 +71,7 @@ sections: - + diff --git a/windows/release-information/status-windows-10-1507.yml b/windows/release-information/status-windows-10-1507.yml index 6cac3b9022..5c8ad190ae 100644 --- a/windows/release-information/status-windows-10-1507.yml +++ b/windows/release-information/status-windows-10-1507.yml @@ -60,7 +60,7 @@ sections: - type: markdown text: "
This table offers a summary of current active issues and those issues that have been resolved in the last 30 days.

DetailsOriginating updateStatusHistory
Internet Explorer 11 authentication issue with multiple concurrent logons
After installing KB4480975, Internet Explorer 11 and other applications that use WININET.DLL may have authentication issues. This occurs when two or more people use the same user account for multiple, concurrent login sessions on the same Windows Server machine, including Remote Desktop Protocol (RDP) and Terminal Server logons. Symptoms reported by customers include, but may not be limited to:
  • Cache size and location show zero or empty.
  • Keyboard shortcuts may not work properly.
  • Webpages may intermittently fail to load or render correctly.
  • Issues with credential prompts.
  • Issues when downloading files.
Affected platforms: 
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1607; Windows 10 Enterprise LTSC 2016; Windows 8.1; Windows 7 SP1
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server 2016; Windows Server 2012 R2; Windows Server 2012; Windows Server 2008 R2 SP1
Resolution: This issue is resolved in KB4493451.

Back to top
January 08, 2019
KB4480975
Resolved
KB4493451
Resolved:
April 09, 2019
10:00 AM PT

Opened:
January 08, 2019
10:00 AM PT
MSXML6 may cause applications to stop responding
After installing KB4480975, MSXML6 causes applications to stop responding if an exception was thrown during node operations, such as appendChild(), insertBefore(), and moveNode().

The Group Policy editor may stop responding when editing a Group Policy Object (GPO) that contains Group Policy Preferences (GPP) for Internet Explorer 10 settings.

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10, version 1607; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 10 Enterprise LTSB 2015; Windows 8.1
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2; Windows Server 2012
Resolution: This issue is resolved in KB4493451.

Back to top
January 08, 2019
KB4480975
Resolved
KB4493451
Resolved:
April 09, 2019
10:00 AM PT

Opened:
January 08, 2019
10:00 AM PT
Virtual machines fail to restore
After installing KB4480975, virtual machines (VM) may fail to restore successfully if the VM has been saved and restored once before. The error message is, \"Failed to restore the virtual machine state: Cannot restore this virtual machine because the saved state data cannot be read. Delete the saved state data and then try to start the virtual machine. (0xC0370027).\"

This affects AMD Bulldozer Family 15h, AMD Jaguar Family 16h, and AMD Puma Family 16h (second generation) microarchitectures.

Affected platforms: 
  • Client: Windows 7 SP1 
  • Server: Windows Server 2012; Windows Server 2008 R2 SP1; Windows Server 2008 SP2
Resolution: This issue is resolved in KB4490516.

Back to top
January 08, 2019
KB4480975
Resolved
KB4490516
Resolved:
February 19, 2019
02:00 PM PT

Opened:
January 08, 2019
10:00 AM PT
Virtual machines fail to restore
After installing KB4480975, virtual machines (VM) may fail to restore successfully if the VM has been saved and restored once before. The error message is, \"Failed to restore the virtual machine state: Cannot restore this virtual machine because the saved state data cannot be read. Delete the saved state data and then try to start the virtual machine. (0xC0370027).\"

This affects AMD Bulldozer Family 15h, AMD Jaguar Family 16h, and AMD Puma Family 16h (second generation) microarchitectures.

Affected platforms: 
  • Client: Windows 8.1; Windows 7 SP1 
  • Server: Windows Server 2012 R2; Windows Server 2012; Windows Server 2008 R2 SP1; Windows Server 2008 SP2
Resolution: This issue is resolved in KB4490516.

Back to top
January 08, 2019
KB4480975
Resolved
KB4490516
Resolved:
February 19, 2019
02:00 PM PT

Opened:
January 08, 2019
10:00 AM PT
First character of the Japanese era name not recognized as an abbreviation
After installing KB4480971, the first character of the Japanese era name is not recognized as an abbreviation and may cause date parsing issues.

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10, version 1607; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 10 Enterprise LTSB 2015; Windows 8.1; Windows 7 SP1
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2; Windows Server 2012; Windows Server 2008 R2 SP1; Windows Server 2008 SP2
Resolution: This issue is resolved in KB4487024.

Back to top
January 15, 2019
KB4480971
Resolved
KB4487024
Resolved:
February 19, 2019
02:00 PM PT

Opened:
January 15, 2019
10:00 AM PT
Applications using Microsoft Jet database fail to open
Applications that use a Microsoft Jet database with the Microsoft Access 97 file format may fail to open if the database has column names greater than 32 characters. The database will fail to open with the error, \"Unrecognized Database Format\".

Affected platforms: 
  • Client: Windows 10, version 1709; Windows 10, version 1703; Windows 10, version 1607; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 10 Enterprise LTSB 2015; Windows 8.1; Windows 7 SP1 
  • Server: Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2; Windows Server 2012; Windows Server 2008 R2 SP1; Windows Server 2008 SP2
Resolution: This issue is resolved in KB4487025.

Back to top
January 08, 2019
KB4480975
Resolved
KB4487025
Resolved:
February 12, 2019
10:00 AM PT

Opened:
January 08, 2019
10:00 AM PT
Unable to access hotspots with third-party applications
After installing KB4480975, third-party applications may have difficulty authenticating hotspots.

Affected platforms: 
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10, version 1607; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 10 Enterprise LTSB 2015; Windows 8.1 
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2; Windows Server 2012
Resolution: This issue is resolved in KB4480971.

Back to top
January 08, 2019
KB4480975
Resolved
KB4480971
Resolved:
January 15, 2019
10:00 AM PT

Opened:
January 08, 2019
10:00 AM PT
- + @@ -79,7 +79,7 @@ sections: - type: markdown text: "
SummaryOriginating updateStatusLast updated
Certain operations performed on a Cluster Shared Volume may fail
Certain operations, such as rename, performed on files or folders on a Cluster Shared Volume (CSV) may fail with the error, \"STATUS_BAD_IMPERSONATION_LEVEL (0xC00000A5)\".

See details >
OS Build 10240.18186

April 09, 2019
KB4493475
Mitigated
April 09, 2019
10:00 AM PT
Certain operations performed on a Cluster Shared Volume may fail
Certain operations, such as rename, performed on files or folders on a Cluster Shared Volume (CSV) may fail with the error, \"STATUS_BAD_IMPERSONATION_LEVEL (0xC00000A5)\".

See details >
OS Build 10240.18186

April 09, 2019
KB4493475
Mitigated
April 25, 2019
02:00 PM PT
Embedded objects may display incorrectly
Any compound document (OLE) server application that places embedded objects into the Windows Metafile (WMF) using the PatBlt API may display embedded objects incorrectly.

See details >
OS Build 10240.18132

February 12, 2019
KB4487018
Resolved
KB4493475
April 29, 2019
12:45 AM PT
MSXML6 may cause applications to stop responding
MSXML6 may cause applications to stop responding if an exception was thrown during node operations, such as appendChild(), insertBefore(), and moveNode().

See details >
OS Build 10240.18094

January 08, 2019
KB4480962
Resolved
KB4493475
April 09, 2019
10:00 AM PT
Custom URI schemes may not start corresponding application
Custom URI schemes for application protocol handlers may not start the corresponding application for local intranet and trusted sites in Internet Explorer.

See details >
OS Build 10240.18158

March 12, 2019
KB4489872
Resolved
KB4493475
April 09, 2019
10:00 AM PT
- +
DetailsOriginating updateStatusHistory
Certain operations performed on a Cluster Shared Volume may fail
Certain operations, such as rename, that you perform on files or folders that are on a Cluster Shared Volume (CSV) may fail with the error, \"STATUS_BAD_IMPERSONATION_LEVEL (0xC00000A5)\". This occurs when you perform the operation on a CSV owner node from a process that doesn’t have administrator privilege.

Affected platforms: 
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10, version 1607; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 10 Enterprise LTSB 2015; Windows 8.1
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2; Windows Server 2012
Workaround: Do one of the following: 
  • Perform the operation from a process that has administrator privilege. 
  • Perform the operation from a node that doesn’t have CSV ownership. 
Next steps: Microsoft is working on a resolution and will provide an update in an upcoming release.

Back to top
OS Build 10240.18186

April 09, 2019
KB4493475
Mitigated
Last updated:
April 09, 2019
10:00 AM PT

Opened:
April 09, 2019
10:00 AM PT
Certain operations performed on a Cluster Shared Volume may fail
Certain operations, such as rename, that you perform on files or folders that are on a Cluster Shared Volume (CSV) may fail with the error, \"STATUS_BAD_IMPERSONATION_LEVEL (0xC00000A5)\". This occurs when you perform the operation on a CSV owner node from a process that doesn’t have administrator privilege.

Affected platforms: 
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10, version 1607; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 10 Enterprise LTSB 2015; Windows 8.1
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2; Windows Server 2012
Workaround: Do one of the following: 
  • Perform the operation from a process that has administrator privilege. 
  • Perform the operation from a node that doesn’t have CSV ownership. 
Next steps: Microsoft is working on a resolution and will provide an update in an upcoming release.

Back to top
OS Build 10240.18186

April 09, 2019
KB4493475
Mitigated
Last updated:
April 25, 2019
02:00 PM PT

Opened:
April 09, 2019
10:00 AM PT
Embedded objects may display incorrectly
Any compound document (OLE) server application that places embedded objects into the Windows Metafile (WMF) using the PatBlt API may display embedded objects incorrectly. 
 
For example, if you paste a Microsoft Excel worksheet object into a Microsoft Word document, the cells may render with a different background color. 
 
Affected platforms:  
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10, version 1607; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 10 Enterprise LTSB 2015; Windows 8.1; Windows 7 SP1 
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2; Windows Server 2012; Windows Server 2008 R2 SP1; Windows Server 2008 SP2 
Resolution: This issue is resolved in KB4493475

Back to top
OS Build 10240.18132

February 12, 2019
KB4487018
Resolved
KB4493475
Resolved:
April 09, 2019
10:00 AM PT

Opened:
April 29, 2019
12:45 AM PT
" diff --git a/windows/release-information/status-windows-10-1607-and-windows-server-2016.yml b/windows/release-information/status-windows-10-1607-and-windows-server-2016.yml index b2d32681ac..9bb03c6bbc 100644 --- a/windows/release-information/status-windows-10-1607-and-windows-server-2016.yml +++ b/windows/release-information/status-windows-10-1607-and-windows-server-2016.yml @@ -61,10 +61,10 @@ sections: text: "
This table offers a summary of current active issues and those issues that have been resolved in the last 30 days.

- - - - + + + + @@ -87,7 +87,7 @@ sections: text: "
SummaryOriginating updateStatusLast updated
Zone transfers over TCP may fail
Zone transfers between primary and secondary DNS servers over the Transmission Control Protocol (TCP) may fail.

See details >
OS Build 14393.2941

April 25, 2019
KB4493473
Investigating
April 25, 2019
02:00 PM PT
Cluster service may fail if the minimum password length is set to greater than 14
The cluster service may fail to start with the error “2245 (NERR_PasswordTooShort)” if the Group Policy “Minimum Password Length” is configured with greater than 14 characters.

See details >
OS Build 14393.2639

November 27, 2018
KB4467684
Mitigated
April 09, 2019
10:00 AM PT
Issue using PXE to start a device from WDS
There may be issues using the Preboot Execution Environment (PXE) to start a device from a Windows Deployment Services (WDS) server configured to use Variable Window Extension.

See details >
OS Build 14393.2848

March 12, 2019
KB4489882
Mitigated
April 09, 2019
10:00 AM PT
SCVMM cannot enumerate and manage logical switches deployed on the host
For hosts managed by System Center Virtual Machine Manager (VMM), VMM cannot enumerate and manage logical switches deployed on the host.

See details >
OS Build 14393.2639

November 27, 2018
KB4467684
Mitigated
April 09, 2019
10:00 AM PT
Certain operations performed on a Cluster Shared Volume may fail
Certain operations, such as rename, performed on files or folders on a Cluster Shared Volume (CSV) may fail with the error, \"STATUS_BAD_IMPERSONATION_LEVEL (0xC00000A5)\".

See details >
OS Build 14393.2906

April 09, 2019
KB4493470
Mitigated
April 09, 2019
10:00 AM PT
Cluster service may fail if the minimum password length is set to greater than 14
The cluster service may fail to start with the error “2245 (NERR_PasswordTooShort)” if the Group Policy “Minimum Password Length” is configured with greater than 14 characters.

See details >
OS Build 14393.2639

November 27, 2018
KB4467684
Mitigated
April 25, 2019
02:00 PM PT
Issue using PXE to start a device from WDS
There may be issues using the Preboot Execution Environment (PXE) to start a device from a Windows Deployment Services (WDS) server configured to use Variable Window Extension.

See details >
OS Build 14393.2848

March 12, 2019
KB4489882
Mitigated
April 25, 2019
02:00 PM PT
SCVMM cannot enumerate and manage logical switches deployed on the host
For hosts managed by System Center Virtual Machine Manager (VMM), VMM cannot enumerate and manage logical switches deployed on the host.

See details >
OS Build 14393.2639

November 27, 2018
KB4467684
Mitigated
April 25, 2019
02:00 PM PT
Certain operations performed on a Cluster Shared Volume may fail
Certain operations, such as rename, performed on files or folders on a Cluster Shared Volume (CSV) may fail with the error, \"STATUS_BAD_IMPERSONATION_LEVEL (0xC00000A5)\".

See details >
OS Build 14393.2906

April 09, 2019
KB4493470
Mitigated
April 25, 2019
02:00 PM PT
Windows may not start on certain Lenovo and Fujitsu laptops with less than 8GB of RAM
Windows may fail to start on certain Lenovo and Fujitsu laptops that have less than 8 GB of RAM.

See details >
OS Build 14393.2608

November 13, 2018
KB4467691
Mitigated
February 19, 2019
10:00 AM PT
Embedded objects may display incorrectly
Any compound document (OLE) server application that places embedded objects into the Windows Metafile (WMF) using the PatBlt API may display embedded objects incorrectly.

See details >
OS Build 14393.2791

February 12, 2019
KB4487026
Resolved
KB4493470
April 29, 2019
12:43 AM PT
Custom URI schemes may not start corresponding application
Custom URI schemes for application protocol handlers may not start the corresponding application for local intranet and trusted sites in Internet Explorer.

See details >
OS Build 14393.2848

March 12, 2019
KB4489882
Resolved
KB4493473
April 25, 2019
02:00 PM PT
- +
DetailsOriginating updateStatusHistory
Zone transfers over TCP may fail
Zone transfers between primary and secondary DNS servers over the Transmission Control Protocol (TCP) may fail after installing KB4493473
 
Affected platforms:  
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1607; Windows 10 Enterprise LTSC 2016 
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016 
Next steps: Microsoft is working on a resolution and will provide an update in an upcoming release. 

Back to top
OS Build 14393.2941

April 25, 2019
KB4493473
Investigating
Last updated:
April 25, 2019
02:00 PM PT

Opened:
April 25, 2019
02:00 PM PT
Certain operations performed on a Cluster Shared Volume may fail
Certain operations, such as rename, that you perform on files or folders that are on a Cluster Shared Volume (CSV) may fail with the error, \"STATUS_BAD_IMPERSONATION_LEVEL (0xC00000A5)\". This occurs when you perform the operation on a CSV owner node from a process that doesn’t have administrator privilege. 

Affected platforms: 
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10, version 1607; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507;  Windows 10 Enterprise LTSB 2015; Windows 8.1
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2; Windows Server 2012
Workaround: Do one of the following:
  • Perform the operation from a process that has administrator privilege. 
  • Perform the operation from a node that doesn’t have CSV ownership.
Next steps: Microsoft is working on a resolution and will provide an update in an upcoming release.

Back to top
OS Build 14393.2906

April 09, 2019
KB4493470
Mitigated
Last updated:
April 09, 2019
10:00 AM PT

Opened:
April 09, 2019
10:00 AM PT
Certain operations performed on a Cluster Shared Volume may fail
Certain operations, such as rename, that you perform on files or folders that are on a Cluster Shared Volume (CSV) may fail with the error, \"STATUS_BAD_IMPERSONATION_LEVEL (0xC00000A5)\". This occurs when you perform the operation on a CSV owner node from a process that doesn’t have administrator privilege. 

Affected platforms: 
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10, version 1607; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507;  Windows 10 Enterprise LTSB 2015; Windows 8.1
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2; Windows Server 2012
Workaround: Do one of the following:
  • Perform the operation from a process that has administrator privilege. 
  • Perform the operation from a node that doesn’t have CSV ownership.
Next steps: Microsoft is working on a resolution and will provide an update in an upcoming release.

Back to top
OS Build 14393.2906

April 09, 2019
KB4493470
Mitigated
Last updated:
April 25, 2019
02:00 PM PT

Opened:
April 09, 2019
10:00 AM PT
Embedded objects may display incorrectly
Any compound document (OLE) server application that places embedded objects into the Windows Metafile (WMF) using the PatBlt API may display embedded objects incorrectly. 
 
For example, if you paste a Microsoft Excel worksheet object into a Microsoft Word document, the cells may render with a different background color. 
 
Affected platforms:  
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10, version 1607; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 10 Enterprise LTSB 2015; Windows 8.1; Windows 7 SP1 
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2; Windows Server 2012; Windows Server 2008 R2 SP1; Windows Server 2008 SP2 
Resolution: This issue is resolved in KB4493470

Back to top
OS Build 14393.2791

February 12, 2019
KB4487026
Resolved
KB4493470
Resolved:
April 09, 2019
10:00 AM PT

Opened:
April 29, 2019
12:43 AM PT
" @@ -98,7 +98,7 @@ sections: text: " +

Option 2:
Use the Windows Deployment Services UI to make the following adjustment:
  1. Open Windows Deployment Services from Windows Administrative Tools.
  2. Expand Servers and right-click a WDS server.
  3. Open its properties and clear the Enable Variable Window Extension box on the TFTP tab.
Option 3:
Set the following registry value to 0:
HKLM\\System\\CurrentControlSet\\Services\\WDSServer\\Providers\\WDSTFTP\\EnableVariableWindowExtension

Restart the WDSServer service after disabling the Variable Window Extension.

Next steps: Microsoft is working on a resolution and will provide an update in an upcoming release.

Back to top
DetailsOriginating updateStatusHistory
Issue using PXE to start a device from WDS
After installing KB4489882, there may be issues using the Preboot Execution Environment (PXE) to start a device from a Windows Deployment Services (WDS) server configured to use Variable Window Extension. This may cause the connection to the WDS server to terminate prematurely while downloading the image. This issue does not affect clients or devices that are not using Variable Window Extension.

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1607; Windows 10 Enterprise LTSC 2016; Windows 8.1
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server 2016; Windows Server 2012 R2; Windows Server 2012
Workaround: To mitigate the issue, disable the Variable Window Extension on WDS server using one of the following options:

Option 1:
Open an Administrator Command prompt and type the following:
Wdsutil /Set-TransportServer /EnableTftpVariableWindowExtension:No
-

Option 2:
Use the Windows Deployment Services UI to make the following adjustment:
  1. Open Windows Deployment Services from Windows Administrative Tools.
  2. Expand Servers and right-click a WDS server.
  3. Open its properties and clear the Enable Variable Window Extension box on the TFTP tab.
Option 3:
Set the following registry value to 0:
HKLM\\System\\CurrentControlSet\\Services\\WDSServer\\Providers\\WDSTFTP\\EnableVariableWindowExtension

Restart the WDSServer service after disabling the Variable Window Extension.

Next steps: Microsoft is working on a resolution and will provide an update in an upcoming release.

Back to top
OS Build 14393.2848

March 12, 2019
KB4489882
Mitigated
Last updated:
April 09, 2019
10:00 AM PT

Opened:
March 12, 2019
10:00 AM PT
OS Build 14393.2848

March 12, 2019
KB4489882
Mitigated
Last updated:
April 25, 2019
02:00 PM PT

Opened:
March 12, 2019
10:00 AM PT
Custom URI schemes may not start corresponding application
After installing KB4489882, Custom URI schemes for application protocol handlers may not start the corresponding application for local intranet and trusted sites security zones on Internet Explorer.

Affected platforms: 
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10, version 1607; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 10 Enterprise LTSB 2015; Windows 8.1; Windows 7 SP1 
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2; Windows Server 2008 R2 SP1
Resolution: This issue is resolved in KB4493473

Back to top
OS Build 14393.2848

March 12, 2019
KB4489882
Resolved
KB4493473
Resolved:
April 25, 2019
02:00 PM PT

Opened:
March 12, 2019
10:00 AM PT
End-user-defined characters (EUDC) may cause blue screen at startup
If you enable per font end-user-defined characters (EUDC), the system will stop working and a blue screen may appear at startup. This is not a common setting in non-Asian regions.

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10, version 1607; Windows 10 Enterprise LTSC 2016
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016
Resolution: This issue was resolved in KB4493470.

Back to top
OS Build 14393.2879

March 19, 2019
KB4489889
Resolved
KB4493470
Resolved:
April 09, 2019
10:00 AM PT

Opened:
March 19, 2019
10:00 AM PT
@@ -119,8 +119,8 @@ sections: - type: markdown text: " - - + +
DetailsOriginating updateStatusHistory
Cluster service may fail if the minimum password length is set to greater than 14
After installing KB4467684, the cluster service may fail to start with the error \"2245 (NERR_PasswordTooShort)\" if the Group Policy \"Minimum Password Length\" is configured with greater than 14 characters.

Affected platforms:
  • Client: Windows 10, version 1607; Windows 10 Enterprise LTSC 2016
  • Server: Windows Server 2016
Workaround: Set the domain default \"Minimum Password Length\" policy to less than or equal to 14 characters.

Next steps: Microsoft is working on a resolution and will provide an update in an upcoming release.

Back to top
OS Build 14393.2639

November 27, 2018
KB4467684
Mitigated
Last updated:
April 09, 2019
10:00 AM PT

Opened:
November 27, 2018
10:00 AM PT
SCVMM cannot enumerate and manage logical switches deployed on the host
For hosts managed by System Center Virtual Machine Manager (VMM), VMM cannot enumerate and manage logical switches deployed on the host after installing KB4467684.

Additionally, if you do not follow the best practices, a stop error may occur in vfpext.sys on the hosts.

Affected platforms:
  • Client: Windows 10, version 1607; Windows 10 Enterprise LTSC 2016
  • Server: Windows Server 2016
Workaround:
Run mofcomp on the following mof files on the affected host:
  • Scvmmswitchportsettings.mof
  • VMMDHCPSvr.mof
Follow the best practices while patching to avoid a stop error in vfpext.sys in an SDN v2 environment (NC managed hosts).

Back to top
OS Build 14393.2639

November 27, 2018
KB4467684
Mitigated
Last updated:
April 09, 2019
10:00 AM PT

Opened:
November 27, 2018
10:00 AM PT
Cluster service may fail if the minimum password length is set to greater than 14
After installing KB4467684, the cluster service may fail to start with the error \"2245 (NERR_PasswordTooShort)\" if the Group Policy \"Minimum Password Length\" is configured with greater than 14 characters.

Affected platforms:
  • Client: Windows 10, version 1607; Windows 10 Enterprise LTSC 2016
  • Server: Windows Server 2016
Workaround: Set the domain default \"Minimum Password Length\" policy to less than or equal to 14 characters.

Next steps: Microsoft is working on a resolution and will provide an update in an upcoming release.

Back to top
OS Build 14393.2639

November 27, 2018
KB4467684
Mitigated
Last updated:
April 25, 2019
02:00 PM PT

Opened:
November 27, 2018
10:00 AM PT
SCVMM cannot enumerate and manage logical switches deployed on the host
For hosts managed by System Center Virtual Machine Manager (VMM), VMM cannot enumerate and manage logical switches deployed on the host after installing KB4467684.

Additionally, if you do not follow the best practices, a stop error may occur in vfpext.sys on the hosts.

Affected platforms:
  • Client: Windows 10, version 1607; Windows 10 Enterprise LTSC 2016
  • Server: Windows Server 2016
Workaround:
Run mofcomp on the following mof files on the affected host:
  • Scvmmswitchportsettings.mof
  • VMMDHCPSvr.mof
Follow the best practices while patching to avoid a stop error in vfpext.sys in an SDN v2 environment (NC managed hosts).

Back to top
OS Build 14393.2639

November 27, 2018
KB4467684
Mitigated
Last updated:
April 25, 2019
02:00 PM PT

Opened:
November 27, 2018
10:00 AM PT
Windows may not start on certain Lenovo and Fujitsu laptops with less than 8GB of RAM
After installing KB4467691, Windows may fail to start on certain Lenovo and Fujitsu laptops that have less than 8 GB of RAM.

Affected platforms:
  • Client: Windows 10, version 1607; Windows 10 Enterprise LTSC 2016
  • Server: Windows Server 2016
Workaround: Restart the affected machine using the Unified Extensible Firmware Interface (UEFI). Disable Secure Boot and then restart.

If BitLocker is enabled on your machine, you may have to go through BitLocker recovery after Secure Boot has been disabled.

Next steps: Lenovo and Fujitsu are aware of this issue. Please contact your OEM to ask if there is a firmware update available for your device.

Back to top
OS Build 14393.2608

November 13, 2018
KB4467691
Mitigated
Last updated:
February 19, 2019
10:00 AM PT

Opened:
November 13, 2018
10:00 AM PT
" diff --git a/windows/release-information/status-windows-10-1703.yml b/windows/release-information/status-windows-10-1703.yml index ebe69ffbd0..c80bc6109b 100644 --- a/windows/release-information/status-windows-10-1703.yml +++ b/windows/release-information/status-windows-10-1703.yml @@ -60,7 +60,7 @@ sections: - type: markdown text: "
This table offers a summary of current active issues and those issues that have been resolved in the last 30 days.

- + @@ -80,7 +80,7 @@ sections: - type: markdown text: "
SummaryOriginating updateStatusLast updated
Certain operations performed on a Cluster Shared Volume may fail
Certain operations, such as rename, performed on files or folders on a Cluster Shared Volume (CSV) may fail with the error, \"STATUS_BAD_IMPERSONATION_LEVEL (0xC00000A5)\".

See details >
OS Build 15063.1746

April 09, 2019
KB4493474
Mitigated
April 09, 2019
10:00 AM PT
Certain operations performed on a Cluster Shared Volume may fail
Certain operations, such as rename, performed on files or folders on a Cluster Shared Volume (CSV) may fail with the error, \"STATUS_BAD_IMPERSONATION_LEVEL (0xC00000A5)\".

See details >
OS Build 15063.1746

April 09, 2019
KB4493474
Mitigated
April 25, 2019
02:00 PM PT
Custom URI schemes may not start corresponding application
Custom URI schemes for application protocol handlers may not start the corresponding application for local intranet and trusted sites in Internet Explorer.

See details >
OS Build 15063.1689

March 12, 2019
KB4489871
Resolved
KB4493436
April 25, 2019
02:00 PM PT
End-user-defined characters (EUDC) may cause blue screen at startup
If you enable per font end-user-defined characters (EUDC), the system may stop working and a blue screen may appear at startup.

See details >
OS Build 15063.1716

March 19, 2019
KB4489888
Resolved
KB4493474
April 09, 2019
10:00 AM PT
MSXML6 may cause applications to stop responding
MSXML6 may cause applications to stop responding if an exception was thrown during node operations, such as appendChild(), insertBefore(), and moveNode().

See details >
OS Build 15063.1563

January 08, 2019
KB4480973
Resolved
KB4493474
April 09, 2019
10:00 AM PT
- +
DetailsOriginating updateStatusHistory
Certain operations performed on a Cluster Shared Volume may fail
Certain operations, such as rename, that you perform on files or folders that are on a Cluster Shared Volume (CSV) may fail with the error, “STATUS_BAD_IMPERSONATION_LEVEL (0xC00000A5)”. This occurs when you perform the operation on a CSV owner node from a process that doesn’t have administrator privilege. 

Affected platforms: 
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10, version 1607; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 10 Enterprise LTSB 2015; Windows 8.1
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2; Windows Server 2012
Workaround: Do one of the following: 
  • Perform the operation from a process that has administrator privilege. 
  • Perform the operation from a node that doesn’t have CSV ownership. 
Next steps: Microsoft is working on a resolution and will provide an update in an upcoming release.

Back to top
OS Build 15063.1746

April 09, 2019
KB4493474
Mitigated
Last updated:
April 09, 2019
10:00 AM PT

Opened:
April 09, 2019
10:00 AM PT
Certain operations performed on a Cluster Shared Volume may fail
Certain operations, such as rename, that you perform on files or folders that are on a Cluster Shared Volume (CSV) may fail with the error, “STATUS_BAD_IMPERSONATION_LEVEL (0xC00000A5)”. This occurs when you perform the operation on a CSV owner node from a process that doesn’t have administrator privilege. 

Affected platforms: 
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10, version 1607; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 10 Enterprise LTSB 2015; Windows 8.1
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2; Windows Server 2012
Workaround: Do one of the following: 
  • Perform the operation from a process that has administrator privilege. 
  • Perform the operation from a node that doesn’t have CSV ownership. 
Next steps: Microsoft is working on a resolution and will provide an update in an upcoming release.

Back to top
OS Build 15063.1746

April 09, 2019
KB4493474
Mitigated
Last updated:
April 25, 2019
02:00 PM PT

Opened:
April 09, 2019
10:00 AM PT
" @@ -90,7 +90,7 @@ sections: text: " - +
DetailsOriginating updateStatusHistory
Custom URI schemes may not start corresponding application
After installing KB4489871, custom URI schemes for application protocol handlers may not start the corresponding application for local intranet and trusted sites security zones on Internet Explorer.

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10, version 1607; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 10 Enterprise LTSB 2015; Windows 8.1; Windows 7 SP1 
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2; Windows Server 2008 R2 SP1
Resolution: This issue is resolved in KB4493436

Back to top
OS Build 15063.1689

March 12, 2019
KB4489871
Resolved
KB4493436
Resolved:
April 25, 2019
02:00 PM PT

Opened:
March 12, 2019
10:00 AM PT
End-user-defined characters (EUDC) may cause blue screen at startup
If you enable per font end-user-defined characters (EUDC), the system may stop working and a blue screen may appear at startup. This is not a common setting in non-Asian regions.

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016
Resolution: This issue was resolved in KB4493474.

Back to top
OS Build 15063.1716

March 19, 2019
KB4489888
Resolved
KB4493474
Resolved:
April 09, 2019
10:00 AM PT

Opened:
March 19, 2019
10:00 AM PT
End-user-defined characters (EUDC) may cause blue screen at startup
If you enable per font end-user-defined characters (EUDC), the system may stop working and a blue screen may appear at startup. This is not a common setting in non-Asian regions.

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10, version 1607; Windows 10 Enterprise LTSC 2016
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016
Resolution: This issue was resolved in KB4493474.

Back to top
OS Build 15063.1716

March 19, 2019
KB4489888
Resolved
KB4493474
Resolved:
April 09, 2019
10:00 AM PT

Opened:
March 19, 2019
10:00 AM PT
" diff --git a/windows/release-information/status-windows-10-1709.yml b/windows/release-information/status-windows-10-1709.yml index cd305c8947..6639482a7c 100644 --- a/windows/release-information/status-windows-10-1709.yml +++ b/windows/release-information/status-windows-10-1709.yml @@ -61,7 +61,7 @@ sections: text: "
This table offers a summary of current active issues and those issues that have been resolved in the last 30 days.

- + @@ -83,7 +83,7 @@ sections: text: "
SummaryOriginating updateStatusLast updated
Zone transfers over TCP may fail
Zone transfers between primary and secondary DNS servers over the Transmission Control Protocol (TCP) may fail.

See details >
OS Build 16299.1127

April 25, 2019
KB4493440
Investigating
April 25, 2019
02:00 PM PT
Certain operations performed on a Cluster Shared Volume may fail
Certain operations, such as rename, performed on files or folders on a Cluster Shared Volume (CSV) may fail with the error, \"STATUS_BAD_IMPERSONATION_LEVEL (0xC00000A5)\".

See details >
OS Build 16299.1087

April 09, 2019
KB4493441
Mitigated
April 09, 2019
10:00 AM PT
Certain operations performed on a Cluster Shared Volume may fail
Certain operations, such as rename, performed on files or folders on a Cluster Shared Volume (CSV) may fail with the error, \"STATUS_BAD_IMPERSONATION_LEVEL (0xC00000A5)\".

See details >
OS Build 16299.1087

April 09, 2019
KB4493441
Mitigated
April 25, 2019
02:00 PM PT
Custom URI schemes may not start corresponding application
Custom URI schemes for application protocol handlers may not start the corresponding application for local intranet and trusted sites in Internet Explorer.

See details >
OS Build 16299.1029

March 12, 2019
KB4489886
Resolved
KB4493440
April 25, 2019
02:00 PM PT
End-user-defined characters (EUDC) may cause blue screen at startup
If you enable per font end-user-defined characters (EUDC), the system may stop working and a blue screen may appear at startup.

See details >
OS Build 16299.1059

March 19, 2019
KB4489890
Resolved
KB4493441
April 09, 2019
10:00 AM PT
MSXML6 causes applications to stop responding if an exception was thrown
MSXML6 causes applications to stop responding if an exception was thrown during node operations, such as appendChild(), insertBefore(), and moveNode().

See details >
OS Build 16299.904

January 08, 2019
KB4480978
Resolved
KB4493441
April 09, 2019
10:00 AM PT
- +
DetailsOriginating updateStatusHistory
Zone transfers over TCP may fail
Zone transfers between primary and secondary DNS servers over the Transmission Control Protocol (TCP) may fail after installing KB4493440
 
Affected platforms:  
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1607; Windows 10 Enterprise LTSC 2016 
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016 
Next steps: Microsoft is working on a resolution and will provide an update in an upcoming release. 

Back to top
OS Build 16299.1127

April 25, 2019
KB4493440
Investigating
Last updated:
April 25, 2019
02:00 PM PT

Opened:
April 25, 2019
02:00 PM PT
Certain operations performed on a Cluster Shared Volume may fail
Certain operations, such as rename, that you perform on files or folders that are on a Cluster Shared Volume (CSV) may fail with the error, \"STATUS_BAD_IMPERSONATION_LEVEL (0xC00000A5)\". This occurs when you perform the operation on a CSV owner node from a process that doesn’t have administrator privilege. 

Affected platforms: 
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10, version 1607; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 10 Enterprise LTSB 2015; Windows 8.1
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2; Windows Server 2012
Workaround: Do one of the following:
  • Perform the operation from a process that has administrator privilege. 
  • Perform the operation from a node that doesn’t have CSV ownership. 
Next steps: Microsoft is working on a resolution and will provide an update in an upcoming release.

Back to top
OS Build 16299.1087

April 09, 2019
KB4493441
Mitigated
Last updated:
April 09, 2019
10:00 AM PT

Opened:
April 09, 2019
10:00 AM PT
Certain operations performed on a Cluster Shared Volume may fail
Certain operations, such as rename, that you perform on files or folders that are on a Cluster Shared Volume (CSV) may fail with the error, \"STATUS_BAD_IMPERSONATION_LEVEL (0xC00000A5)\". This occurs when you perform the operation on a CSV owner node from a process that doesn’t have administrator privilege. 

Affected platforms: 
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10, version 1607; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 10 Enterprise LTSB 2015; Windows 8.1
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2; Windows Server 2012
Workaround: Do one of the following:
  • Perform the operation from a process that has administrator privilege. 
  • Perform the operation from a node that doesn’t have CSV ownership. 
Next steps: Microsoft is working on a resolution and will provide an update in an upcoming release.

Back to top
OS Build 16299.1087

April 09, 2019
KB4493441
Mitigated
Last updated:
April 25, 2019
02:00 PM PT

Opened:
April 09, 2019
10:00 AM PT
" diff --git a/windows/release-information/status-windows-10-1803.yml b/windows/release-information/status-windows-10-1803.yml index fa12dc925c..e9325715e8 100644 --- a/windows/release-information/status-windows-10-1803.yml +++ b/windows/release-information/status-windows-10-1803.yml @@ -61,8 +61,8 @@ sections: text: "
This table offers a summary of current active issues and those issues that have been resolved in the last 30 days.

- - + + @@ -85,7 +85,7 @@ sections: text: "
SummaryOriginating updateStatusLast updated
Zone transfers over TCP may fail
Zone transfers between primary and secondary DNS servers over the Transmission Control Protocol (TCP) may fail.

See details >
OS Build 17134.753

April 25, 2019
KB4493437
Investigating
April 25, 2019
02:00 PM PT
Issue using PXE to start a device from WDS
Using PXE to start a device from a WDS server configured to use Variable Window Extension may cause the connection to the WDS server to terminate prematurely.

See details >
OS Build 17134.648

March 12, 2019
KB4489868
Mitigated
April 09, 2019
10:00 AM PT
Certain operations performed on a Cluster Shared Volume may fail
Certain operations, such as rename, performed on files or folders on a Cluster Shared Volume (CSV) may fail with the error, \"STATUS_BAD_IMPERSONATION_LEVEL (0xC00000A5)\".

See details >
OS Build 17134.706

April 09, 2019
KB4493464
Mitigated
April 09, 2019
10:00 AM PT
Issue using PXE to start a device from WDS
Using PXE to start a device from a WDS server configured to use Variable Window Extension may cause the connection to the WDS server to terminate prematurely.

See details >
OS Build 17134.648

March 12, 2019
KB4489868
Mitigated
April 25, 2019
02:00 PM PT
Certain operations performed on a Cluster Shared Volume may fail
Certain operations, such as rename, performed on files or folders on a Cluster Shared Volume (CSV) may fail with the error, \"STATUS_BAD_IMPERSONATION_LEVEL (0xC00000A5)\".

See details >
OS Build 17134.706

April 09, 2019
KB4493464
Mitigated
April 25, 2019
02:00 PM PT
Custom URI schemes may not start corresponding application
Custom URI schemes for application protocol handlers may not start the corresponding application for local intranet and trusted sites in Internet Explorer.

See details >
OS Build 17134.648

March 12, 2019
KB4489868
Resolved
KB4493437
April 25, 2019
02:00 PM PT
End-user-defined characters (EUDC) may cause blue screen at startup
If you enable per font end-user-defined characters (EUDC), the system may stop working and a blue screen may appear at startup.

See details >
OS Build 17134.677

March 19, 2019
KB4489894
Resolved
KB4493464
April 09, 2019
10:00 AM PT
First character of Japanese era name not recognized
The first character of the Japanese era name is not recognized as an abbreviation and may cause date parsing issues.

See details >
OS Build 17134.556

January 15, 2019
KB4480976
Resolved
KB4487029
April 09, 2019
10:00 AM PT
- +
DetailsOriginating updateStatusHistory
Zone transfers over TCP may fail
Zone transfers between primary and secondary DNS servers over the Transmission Control Protocol (TCP) may fail after installing KB4493437
 
Affected platforms:  
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1607; Windows 10 Enterprise LTSC 2016 
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016 
Next steps: Microsoft is working on a resolution and will provide an update in an upcoming release. 

Back to top
OS Build 17134.753

April 25, 2019
KB4493437
Investigating
Last updated:
April 25, 2019
02:00 PM PT

Opened:
April 25, 2019
02:00 PM PT
Certain operations performed on a Cluster Shared Volume may fail
Certain operations, such as rename, that you perform on files or folders that are on a Cluster Shared Volume (CSV) may fail with the error, \"STATUS_BAD_IMPERSONATION_LEVEL (0xC00000A5)\". This occurs when you perform the operation on a CSV owner node from a process that doesn’t have administrator privilege.

Affected platforms: 
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10, version 1607; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 10 Enterprise LTSB 2015; Windows 8.1
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2; Windows Server 2012
Workaround: Do one of the following:
  • Perform the operation from a process that has administrator privilege. 
  • Perform the operation from a node that doesn’t have CSV ownership. 
Next steps: Microsoft is working on a resolution and will provide an update in an upcoming release.

Back to top
OS Build 17134.706

April 09, 2019
KB4493464
Mitigated
Last updated:
April 09, 2019
10:00 AM PT

Opened:
April 09, 2019
10:00 AM PT
Certain operations performed on a Cluster Shared Volume may fail
Certain operations, such as rename, that you perform on files or folders that are on a Cluster Shared Volume (CSV) may fail with the error, \"STATUS_BAD_IMPERSONATION_LEVEL (0xC00000A5)\". This occurs when you perform the operation on a CSV owner node from a process that doesn’t have administrator privilege.

Affected platforms: 
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10, version 1607; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 10 Enterprise LTSB 2015; Windows 8.1
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2; Windows Server 2012
Workaround: Do one of the following:
  • Perform the operation from a process that has administrator privilege. 
  • Perform the operation from a node that doesn’t have CSV ownership. 
Next steps: Microsoft is working on a resolution and will provide an update in an upcoming release.

Back to top
OS Build 17134.706

April 09, 2019
KB4493464
Mitigated
Last updated:
April 25, 2019
02:00 PM PT

Opened:
April 09, 2019
10:00 AM PT
" @@ -95,7 +95,7 @@ sections: text: " +

 Option 2: 
Use the Windows Deployment Services UI to make the following adjustment:  
  1. Open Windows Deployment Services from Windows Administrative Tools. 
  2. Expand Servers and right-click a WDS server. 
  3. Open its properties and clear the Enable Variable Window Extension box on the TFTP tab.  
Option 3: 
Set the following registry value to 0:
HKLM\\System\\CurrentControlSet\\Services\\WDSServer\\Providers\\WDSTFTP\\EnableVariableWindowExtension  

Restart the WDSServer service after disabling the Variable Window Extension. 
 
Next steps: Microsoft is working on a resolution and will provide an update in an upcoming release. 

Back to top diff --git a/windows/release-information/status-windows-10-1809-and-windows-server-2019.yml b/windows/release-information/status-windows-10-1809-and-windows-server-2019.yml index 1bc22681fd..0e7d076964 100644 --- a/windows/release-information/status-windows-10-1809-and-windows-server-2019.yml +++ b/windows/release-information/status-windows-10-1809-and-windows-server-2019.yml @@ -65,10 +65,10 @@ sections: - type: markdown text: "
This table offers a summary of current active issues and those issues that have been resolved in the last 30 days.

DetailsOriginating updateStatusHistory
Issue using PXE to start a device from WDS
After installing KB4489868, there may be issues using the Preboot Execution Environment (PXE) to start a device from a Windows Deployment Services (WDS) server configured to use Variable Window Extension. This may cause the connection to the WDS server to terminate prematurely while downloading the image. This issue does not affect clients or devices that are not using Variable Window Extension. 

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1607; Windows 10 Enterprise LTSC 2016; Windows 8.1
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server 2016; Windows Server 2012 R2; Windows Server 2012
Workaround: To mitigate the issue, disable the Variable Window Extension on WDS server using one of the following options:

Option 1: 
Open an Administrator Command prompt and type the following:  
Wdsutil /Set-TransportServer /EnableTftpVariableWindowExtension:No
-

 Option 2: 
Use the Windows Deployment Services UI to make the following adjustment:  
  1. Open Windows Deployment Services from Windows Administrative Tools. 
  2. Expand Servers and right-click a WDS server. 
  3. Open its properties and clear the Enable Variable Window Extension box on the TFTP tab.  
Option 3: 
Set the following registry value to 0:
HKLM\\System\\CurrentControlSet\\Services\\WDSServer\\Providers\\WDSTFTP\\EnableVariableWindowExtension  

Restart the WDSServer service after disabling the Variable Window Extension. 
 
Next steps: Microsoft is working on a resolution and will provide an update in an upcoming release. 

Back to top
OS Build 17134.648

March 12, 2019
KB4489868
Mitigated
Last updated:
April 09, 2019
10:00 AM PT

Opened:
March 12, 2019
10:00 AM PT
OS Build 17134.648

March 12, 2019
KB4489868
Mitigated
Last updated:
April 25, 2019
02:00 PM PT

Opened:
March 12, 2019
10:00 AM PT
Custom URI schemes may not start corresponding application
After installing KB4489868, custom URI schemes for application protocol handlers may not start the corresponding application for local intranet and trusted sites security zones on Internet Explorer. 

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10, version 1607; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 10 Enterprise LTSB 2015; Windows 8.1; Windows 7 SP1 
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2; Windows Server 2008 R2 SP1
Resolution: This issue is resolved in KB4493437

Back to top
OS Build 17134.648

March 12, 2019
KB4489868
Resolved
KB4493437
Resolved:
April 25, 2019
02:00 PM PT

Opened:
March 12, 2019
10:00 AM PT
End-user-defined characters (EUDC) may cause blue screen at startup
If you enable per font end-user-defined characters (EUDC), the system may stop working and a blue screen may appear at startup. This is not a common setting in non-Asian regions. 

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10, version 1607; Windows 10 Enterprise LTSC 2016
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016
Resolution: This issue was resolved in KB4493464

Back to top
OS Build 17134.677

March 19, 2019
KB4489894
Resolved
KB4493464
Resolved:
April 09, 2019
10:00 AM PT

Opened:
March 19, 2019
10:00 AM PT
Stop error when attempting to start SSH from WSL
After applying KB4489868, a stop error occurs when attempting to start the Secure Shell (SSH) client program from Windows Subsystem for Linux (WSL) with agent forwarding enabled using a command line switch (ssh -A) or a configuration setting.

Affected platforms:
  • Client: Windows 10, version 1803; Windows 10, version 1709
  • Server: Windows Server, version 1803; Windows Server, version 1709
Resolution: This issue was resolved in KB4493464.

Back to top
OS Build 17134.648

March 12, 2019
KB4489868
Resolved
KB4493464
Resolved:
April 09, 2019
10:00 AM PT

Opened:
March 12, 2019
10:00 AM PT
+ - @@ -121,9 +121,9 @@ sections: - type: markdown text: "
SummaryOriginating updateStatusLast updated
System may be unresponsive after restart if ArcaBit antivirus software installed
Devices with ArcaBit antivirus software installed may become unresponsive upon restart.

See details >
OS Build 17763.437

April 09, 2019
KB4493509
Mitigated
April 25, 2019
02:00 PM PT
Custom URI schemes may not start corresponding application
Custom URI schemes for application protocol handlers may not start the corresponding application for local intranet and trusted sites in Internet Explorer.

See details >
OS Build 17763.379

March 12, 2019
KB4489899
Mitigated
April 09, 2019
10:00 AM PT
Issue using PXE to start a device from WDS
Using PXE to start a device from a WDS server configured to use Variable Window Extension may cause the connection to the WDS server to terminate prematurely.

See details >
OS Build 17763.379

March 12, 2019
KB4489899
Mitigated
April 09, 2019
10:00 AM PT
Certain operations performed on a Cluster Shared Volume may fail
Certain operations, such as rename, performed on files or folders on a Cluster Shared Volume (CSV) may fail with the error, \"STATUS_BAD_IMPERSONATION_LEVEL (0xC00000A5)\".

See details >
OS Build 17763.437

April 09, 2019
KB4493509
Mitigated
April 09, 2019
10:00 AM PT
System may be unresponsive after restart if ArcaBit antivirus software installed
Devices with ArcaBit antivirus software installed may become unresponsive upon restart.

See details >
OS Build 17763.437

April 09, 2019
KB4493509
Mitigated
April 09, 2019
10:00 AM PT
Audio not working on monitors or TV connected to a PC via HDMI, USB, or DisplayPort
Upgrade block: Microsoft has identified issues with certain new Intel display drivers, which accidentally turn on unsupported features in Windows.

See details >
OS Build 17763.134

November 13, 2018
KB4467708
Mitigated
March 15, 2019
12:00 PM PT
End-user-defined characters (EUDC) may cause blue screen at startup
If you enable per font end-user-defined characters (EUDC), the system may stop working and a blue screen may appear at startup.

See details >
OS Build 17763.404

April 02, 2019
KB4490481
Resolved
KB4493509
April 09, 2019
10:00 AM PT
Internet Explorer 11 authentication issue with multiple concurrent logons
Internet Explorer 11 users may encounter issues if two or more people use the same user account for multiple, concurrent login sessions on the same Windows Server machine.

See details >
OS Build 17763.253

January 08, 2019
KB4480116
Resolved
KB4493509
April 09, 2019
10:00 AM PT
- - - + + +
DetailsOriginating updateStatusHistory
System may be unresponsive after restart if ArcaBit antivirus software installed
Microsoft and ArcaBit have identified an issue on devices with ArcaBit antivirus software installed that may cause the system to become unresponsive upon restart after installing KB4493509
 
Microsoft has temporarily blocked devices from receiving this update if ArcaBit antivirus software is installed. 

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 8.1; Windows 7 SP1
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server 2012 R2; Windows Server 2008 R2 SP1
Workaround: ArcaBit has released an update to address this issue. For more information, see the Arcabit support article.

Back to top
OS Build 17763.437

April 09, 2019
KB4493509
Mitigated
Last updated:
April 09, 2019
10:00 AM PT

Opened:
January 08, 2019
10:00 AM PT
Internet Explorer 11 authentication issue with multiple concurrent logons
After installing KB4480116, Internet Explorer 11 and other applications that use WININET.DLL may have authentication issues. This occurs when two or more people use the same user account for multiple, concurrent login sessions on the same Windows Server machine, including Remote Desktop Protocol (RDP) and Terminal Server logons. Symptoms reported by customers include, but may not be limited to: 
 
  • Cache size and location show zero or empty. 
  • Keyboard shortcuts may not work properly. 
  • Webpages may intermittently fail to load or render correctly. 
  • Issues with credential prompts. 
  • Issues when downloading files. 
 
Resolved: This issue was resolved in KB4493509

Back to top
OS Build 17763.253

January 08, 2019
KB4480116
Resolved
KB4493509
Resolved:
April 09, 2019
10:00 AM PT

Opened:
January 08, 2019
10:00 AM PT
MSXML6 may cause applications to stop responding
After installing KB4480116, MSXML6 causes applications to stop responding if an exception was thrown during node operations, such as appendChild(), insertBefore(), and moveNode().
 
The Group Policy editor may stop responding when editing a Group Policy Object (GPO) that contains Group Policy Preferences (GPP) for Internet Explorer 10 settings. 

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10, version 1607; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 10 Enterprise LTSB 2015; Windows 8.1
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2; Windows Server 2012
Resolved: This issue was resolved in KB4493509

Back to top
OS Build 17763.253

January 08, 2019
KB4480116
Resolved
KB4493509
Resolved:
April 09, 2019
10:00 AM PT

Opened:
January 08, 2019
10:00 AM PT
System may be unresponsive after restart if ArcaBit antivirus software installed
Microsoft and ArcaBit have identified an issue on devices with ArcaBit antivirus software installed that may cause the system to become unresponsive upon restart after installing KB4493509
 
Microsoft has temporarily blocked devices from receiving this update if ArcaBit antivirus software is installed. 

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 8.1; Windows 7 SP1
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server 2012 R2; Windows Server 2008 R2 SP1
Workaround: ArcaBit has released an update to address this issue. For more information, see the Arcabit support article.

Back to top
OS Build 17763.437

April 09, 2019
KB4493509
Mitigated
Last updated:
April 25, 2019
02:00 PM PT

Opened:
January 08, 2019
10:00 AM PT
Internet Explorer 11 authentication issue with multiple concurrent logons
After installing KB4480116, Internet Explorer 11 and other applications that use WININET.DLL may have authentication issues. This occurs when two or more people use the same user account for multiple, concurrent login sessions on the same Windows Server machine, including Remote Desktop Protocol (RDP) and Terminal Server logons. Symptoms reported by customers include, but may not be limited to: 
 
  • Cache size and location show zero or empty. 
  • Keyboard shortcuts may not work properly. 
  • Webpages may intermittently fail to load or render correctly. 
  • Issues with credential prompts. 
  • Issues when downloading files. 
Resolution: This issue was resolved in KB4493509

Back to top
OS Build 17763.253

January 08, 2019
KB4480116
Resolved
KB4493509
Resolved:
April 09, 2019
10:00 AM PT

Opened:
January 08, 2019
10:00 AM PT
MSXML6 may cause applications to stop responding
After installing KB4480116, MSXML6 causes applications to stop responding if an exception was thrown during node operations, such as appendChild(), insertBefore(), and moveNode().
 
The Group Policy editor may stop responding when editing a Group Policy Object (GPO) that contains Group Policy Preferences (GPP) for Internet Explorer 10 settings. 

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10, version 1607; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 10 Enterprise LTSB 2015; Windows 8.1
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2; Windows Server 2012
Resolution: This issue was resolved in KB4493509

Back to top
OS Build 17763.253

January 08, 2019
KB4480116
Resolved
KB4493509
Resolved:
April 09, 2019
10:00 AM PT

Opened:
January 08, 2019
10:00 AM PT
" diff --git a/windows/release-information/status-windows-7-and-windows-server-2008-r2-sp1.yml b/windows/release-information/status-windows-7-and-windows-server-2008-r2-sp1.yml index 3462e7b4d8..b4327401bb 100644 --- a/windows/release-information/status-windows-7-and-windows-server-2008-r2-sp1.yml +++ b/windows/release-information/status-windows-7-and-windows-server-2008-r2-sp1.yml @@ -60,15 +60,15 @@ sections: - type: markdown text: "
This table offers a summary of current active issues and those issues that have been resolved in the last 30 days.

- + + + + - - - + -
SummaryOriginating updateStatusLast updated
System may be unresponsive after restart if Avira antivirus software installed
Devices with Avira antivirus software installed may become unresponsive upon restart.

See details >
April 09, 2019
KB4493472
Investigating
April 09, 2019
10:00 AM PT
System may be unresponsive after restart if Avira antivirus software installed
Devices with Avira antivirus software installed may become unresponsive upon restart.

See details >
April 09, 2019
KB4493472
Investigating
April 25, 2019
02:00 PM PT
Authentication may fail for services after the Kerberos ticket expires
Authentication may fail for services that require unconstrained delegation after the Kerberos ticket expires.

See details >
March 12, 2019
KB4489878
Mitigated
April 25, 2019
02:00 PM PT
System unresponsive after restart if Sophos Endpoint Protection installed
Devices with Sophos Endpoint Protection installed and managed by Sophos Central or Sophos Enterprise Console (SEC) may become unresponsive upon restart.

See details >
April 09, 2019
KB4493472
Mitigated
April 25, 2019
02:00 PM PT
System may be unresponsive after restart if ArcaBit antivirus software installed
Devices with ArcaBit antivirus software installed may become unresponsive upon restart.

See details >
April 09, 2019
KB4493472
Mitigated
April 25, 2019
02:00 PM PT
System may be unresponsive after restart with certain McAfee antivirus products
Devices with McAfee Endpoint Security Threat Prevention 10.x, Host Intrusion Prevention 8.0, or VirusScan Enterprise 8.8 may be slow or unresponsive at startup.

See details >
April 09, 2019
KB4493472
Mitigated
April 18, 2019
05:00 PM PT
Authentication may fail for services after the Kerberos ticket expires
Authentication may fail for services that require unconstrained delegation after the Kerberos ticket expires.

See details >
March 12, 2019
KB4489878
Mitigated
April 09, 2019
10:00 AM PT
System unresponsive after restart if Sophos Endpoint Protection installed
Devices with Sophos Endpoint Protection installed and managed by Sophos Central or Sophos Enterprise Console (SEC) may become unresponsive upon restart.

See details >
April 09, 2019
KB4493472
Mitigated
April 09, 2019
10:00 AM PT
System may be unresponsive after restart if ArcaBit antivirus software installed
Devices with ArcaBit antivirus software installed may become unresponsive upon restart.

See details >
April 09, 2019
KB4493472
Mitigated
April 09, 2019
10:00 AM PT
Devices may not respond at login or Welcome screen if running certain Avast software
Devices running Avast for Business, Avast CloudCare, and AVG Business Edition antivirus software may become unresponsive after restart.

See details >
April 09, 2019
KB4493472
Resolved
April 25, 2019
02:00 PM PT
Internet Explorer 11 authentication issue with multiple concurrent logons
Internet Explorer 11 users may encounter issues if two or more people use the same user account for multiple, concurrent login sessions on the same Windows Server machine.

See details >
January 08, 2019
KB4480970
Resolved
KB4493472
April 09, 2019
10:00 AM PT
Custom URI schemes may not start corresponding application
Custom URI schemes for application protocol handlers may not start the corresponding application for local intranet and trusted sites in Internet Explorer.

See details >
March 12, 2019
KB4489878
Resolved
KB4493472
April 09, 2019
10:00 AM PT
NETDOM.EXE fails to run
NETDOM.EXE fails to run and the error, “The command failed to complete successfully.” appears on screen.

See details >
March 12, 2019
KB4489878
Resolved
KB4493472
April 09, 2019
10:00 AM PT
Devices may not respond at login or Welcome screen if running certain Avast software
Devices running Avast for Business, Avast CloudCare, and AVG Business Edition antivirus software may become unresponsive after restart.

See details >
April 09, 2019
KB4493472
Resolved
April 09, 2019
10:00 AM PT
Embedded objects may display incorrectly
Any compound document (OLE) server application that places embedded objects into the Windows Metafile (WMF) using the PatBlt API may display embedded objects incorrectly.

See details >
February 12, 2019
KB4486563
Resolved
KB4493472
April 09, 2019
10:00 AM PT
" @@ -85,11 +85,11 @@ sections: - type: markdown text: " - + + + - - - +
DetailsOriginating updateStatusHistory
System may be unresponsive after restart if Avira antivirus software installed
Microsoft and Avira have identified an issue on devices with Avira antivirus software installed that may cause the system to become unresponsive upon restart after installing KB4493472.

Microsoft has temporarily blocked devices from receiving this update if Avira antivirus software is installed.

Affected platforms: 
  • Client: Windows 8.1; Windows 7 SP1 
  • Server: Windows Server 2012 R2; Windows Server 2012; Windows Server 2008 R2 SP1; Windows Server 2008 SP2
Next steps: We are presently investigating this issue with Avira and will provide an update when available.

Back to top
April 09, 2019
KB4493472
Investigating
Last updated:
April 09, 2019
10:00 AM PT

Opened:
April 09, 2019
10:00 AM PT
System may be unresponsive after restart if Avira antivirus software installed
Microsoft and Avira have identified an issue on devices with Avira antivirus software installed that may cause the system to become unresponsive upon restart after installing KB4493472.

Microsoft has temporarily blocked devices from receiving this update if Avira antivirus software is installed.

Affected platforms: 
  • Client: Windows 8.1; Windows 7 SP1 
  • Server: Windows Server 2012 R2; Windows Server 2012; Windows Server 2008 R2 SP1; Windows Server 2008 SP2
Next steps: We are presently investigating this issue with Avira and will provide an update when available.

Back to top
April 09, 2019
KB4493472
Investigating
Last updated:
April 25, 2019
02:00 PM PT

Opened:
April 09, 2019
10:00 AM PT
System unresponsive after restart if Sophos Endpoint Protection installed
Microsoft and Sophos have identified an issue on devices with Sophos Endpoint Protection installed and managed by either Sophos Central or Sophos Enterprise Console (SEC) that may cause the system to become unresponsive upon restart after installing KB4493472.

Microsoft has temporarily blocked devices from receiving this update if the Sophos Endpoint is installed until a solution is available.

Affected platforms: 
  • Client: Windows 8.1; Windows 7 SP1
  • Server: Windows Server 2012 R2; Windows Server 2012; Windows Server 2008 R2 SP1; Windows Server 2008 SP2
Guidance for Sophos Endpoint and Sophos Enterprise Console customers can be found in the Sophos support article.

Back to top
April 09, 2019
KB4493472
Mitigated
Last updated:
April 25, 2019
02:00 PM PT

Opened:
April 09, 2019
10:00 AM PT
System may be unresponsive after restart if ArcaBit antivirus software installed
Microsoft and ArcaBit have identified an issue on devices with ArcaBit antivirus software installed that may cause the system to become unresponsive upon restart after installing KB4493472.

Microsoft has temporarily blocked devices from receiving this update if ArcaBit antivirus software is installed.

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 8.1; Windows 7 SP1
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server 2012 R2; Windows Server 2008 R2 SP1
Workaround: ArcaBit has released an update to address this issue. For more information, see the Arcabit support article.

Back to top
April 09, 2019
KB4493472
Mitigated
Last updated:
April 25, 2019
02:00 PM PT

Opened:
April 09, 2019
10:00 AM PT
System may be unresponsive after restart with certain McAfee antivirus products
Microsoft and McAfee have identified an issue on devices with McAfee Endpoint Security (ENS) Threat Prevention 10.x or McAfee Host Intrusion Prevention (Host IPS) 8.0 or McAfee VirusScan Enterprise (VSE) 8.8 installed. It may cause the system to have slow startup or become unresponsive at restart after installing this update. 

Affected platforms:
  • Client: Windows 7 SP1
  • Server: Windows Server 2008 R2 SP1
Workaround: Guidance for McAfee customers can be found in the following McAfee support articles: 
Next steps: We are presently investigating this issue with McAfee. We will provide an update once we have more information.

Back to top
April 09, 2019
KB4493472
Mitigated
Last updated:
April 18, 2019
05:00 PM PT

Opened:
April 09, 2019
10:00 AM PT
System unresponsive after restart if Sophos Endpoint Protection installed
Microsoft and Sophos have identified an issue on devices with Sophos Endpoint Protection installed and managed by either Sophos Central or Sophos Enterprise Console (SEC) that may cause the system to become unresponsive upon restart after installing KB4493472.

Microsoft has temporarily blocked devices from receiving this update if the Sophos Endpoint is installed until a solution is available.

Affected platforms: 
  • Client: Windows 8.1; Windows 7 SP1
  • Server: Windows Server 2012 R2; Windows Server 2012; Windows Server 2008 R2 SP1; Windows Server 2008 SP2
Guidance for Sophos Endpoint and Sophos Enterprise Console customers can be found in the Sophos support article.

Back to top
April 09, 2019
KB4493472
Mitigated
Last updated:
April 09, 2019
10:00 AM PT

Opened:
April 09, 2019
10:00 AM PT
System may be unresponsive after restart if ArcaBit antivirus software installed
Microsoft and ArcaBit have identified an issue on devices with ArcaBit antivirus software installed that may cause the system to become unresponsive upon restart after installing KB4493472.

Microsoft has temporarily blocked devices from receiving this update if ArcaBit antivirus software is installed.

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 8.1; Windows 7 SP1
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server 2012 R2; Windows Server 2008 R2 SP1
Workaround: ArcaBit has released an update to address this issue. For more information, see the Arcabit support article.

Back to top
April 09, 2019
KB4493472
Mitigated
Last updated:
April 09, 2019
10:00 AM PT

Opened:
April 09, 2019
10:00 AM PT
Devices may not respond at login or Welcome screen if running certain Avast software
Microsoft and Avast have identified an issue on devices running Avast for Business, Avast CloudCare, and AVG Business Edition antivirus software after you install KB4493472 and restart. Devices may become unresponsive at the login or Welcome screen. Additionally, you may be unable to log in or log in after an extended period of time.

Affected platforms: 
  • Client: Windows 8.1; Windows 7 SP1 
  • Server: Windows Server 2012 R2; Windows Server 2008 R2 SP1 
Resolution: Avast has released emergency updates to address this issue. For more information and AV update schedule, see the Avast support KB article.

Back to top
April 09, 2019
KB4493472
Resolved
Resolved:
April 09, 2019
10:00 AM PT

Opened:
April 09, 2019
10:00 AM PT
Devices may not respond at login or Welcome screen if running certain Avast software
Microsoft and Avast have identified an issue on devices running Avast for Business, Avast CloudCare, and AVG Business Edition antivirus software after you install KB4493472 and restart. Devices may become unresponsive at the login or Welcome screen. Additionally, you may be unable to log in or log in after an extended period of time.

Affected platforms: 
  • Client: Windows 8.1; Windows 7 SP1 
  • Server: Windows Server 2012 R2; Windows Server 2008 R2 SP1 
Resolution: Avast has released emergency updates to address this issue. For more information and AV update schedule, see the Avast support KB article.

Back to top
April 09, 2019
KB4493472
Resolved
Resolved:
April 25, 2019
02:00 PM PT

Opened:
April 09, 2019
10:00 AM PT
" @@ -98,7 +98,7 @@ sections: - type: markdown text: " - +
DetailsOriginating updateStatusHistory
Authentication may fail for services after the Kerberos ticket expires
After installing KB4489878, some customers report that authentication fails for services that require unconstrained delegation after the Kerberos ticket expires (the default is 10 hours). For example, the SQL server service fails.

Affected platforms: 
  • Client: Windows 7 SP1
  • Server: Windows Server 2008 R2 SP1; Windows Server 2008 SP2
Workaround: To mitigate this issue, use one of the following options:
  • Option 1: Purge the Kerberos tickets on the application server. After the Kerberos ticket expires, the issue will occur again, and you must purge the tickets again.
  • Option 2: If purging does not mitigate the issue, restart the application; for example, restart the Internet Information Services (IIS) app pool associated with the SQL server.
  • Option 3: Use constrained delegation.
Next steps: Microsoft is working on a resolution and will provide an update in an upcoming release.

Back to top
March 12, 2019
KB4489878
Mitigated
Last updated:
April 09, 2019
10:00 AM PT

Opened:
March 12, 2019
10:00 AM PT
Authentication may fail for services after the Kerberos ticket expires
After installing KB4489878, some customers report that authentication fails for services that require unconstrained delegation after the Kerberos ticket expires (the default is 10 hours). For example, the SQL server service fails.

Affected platforms: 
  • Client: Windows 7 SP1
  • Server: Windows Server 2008 R2 SP1; Windows Server 2008 SP2
Workaround: To mitigate this issue, use one of the following options:
  • Option 1: Purge the Kerberos tickets on the application server. After the Kerberos ticket expires, the issue will occur again, and you must purge the tickets again.
  • Option 2: If purging does not mitigate the issue, restart the application; for example, restart the Internet Information Services (IIS) app pool associated with the SQL server.
  • Option 3: Use constrained delegation.
Next steps: Microsoft is working on a resolution and will provide an update in an upcoming release.

Back to top
March 12, 2019
KB4489878
Mitigated
Last updated:
April 25, 2019
02:00 PM PT

Opened:
March 12, 2019
10:00 AM PT
Custom URI schemes may not start corresponding application
After installing KB4489878, custom URI schemes for application protocol handlers may not start the corresponding application for local intranet and trusted sites on Internet Explorer.

Affected platforms: 
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10, version 1607; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 10 Enterprise LTSB 2015; Windows 8.1; Windows 7 SP1 
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2; Windows Server 2008 R2 SP1 
Resolution: This issue is resolved in KB4493472.

Back to top
March 12, 2019
KB4489878
Resolved
KB4493472
Resolved:
April 09, 2019
10:00 AM PT

Opened:
March 12, 2019
10:00 AM PT
NETDOM.EXE fails to run
After installing KB4489878, NETDOM.EXE fails to run, and the on-screen error, “The command failed to complete successfully.” appears.

Affected platforms: 
  • Client: Windows 7 SP1
  • Server: Windows Server 2008 R2 SP1; Windows Server 2008 SP2
Resolution: This issue is resolved in KB4493472.

Back to top
March 12, 2019
KB4489878
Resolved
KB4493472
Resolved:
April 09, 2019
10:00 AM PT

Opened:
March 12, 2019
10:00 AM PT
diff --git a/windows/release-information/status-windows-8.1-and-windows-server-2012-r2.yml b/windows/release-information/status-windows-8.1-and-windows-server-2012-r2.yml index 28582ba03f..f02d026290 100644 --- a/windows/release-information/status-windows-8.1-and-windows-server-2012-r2.yml +++ b/windows/release-information/status-windows-8.1-and-windows-server-2012-r2.yml @@ -60,16 +60,16 @@ sections: - type: markdown text: "
This table offers a summary of current active issues and those issues that have been resolved in the last 30 days.

- + + + + + - - - - + -
SummaryOriginating updateStatusLast updated
System may be unresponsive after restart if Avira antivirus software installed
Devices with Avira antivirus software installed may become unresponsive upon restart.

See details >
April 09, 2019
KB4493446
Investigating
April 09, 2019
10:00 AM PT
System may be unresponsive after restart if Avira antivirus software installed
Devices with Avira antivirus software installed may become unresponsive upon restart.

See details >
April 09, 2019
KB4493446
Investigating
April 25, 2019
02:00 PM PT
Issue using PXE to start a device from WDS
There may be issues using the Preboot Execution Environment (PXE) to start a device from a Windows Deployment Services (WDS) server configured to use Variable Window Extension.

See details >
March 12, 2019
KB4489881
Mitigated
April 25, 2019
02:00 PM PT
System unresponsive after restart if Sophos Endpoint Protection installed
Devices with Sophos Endpoint Protection installed and managed by Sophos Central or Sophos Enterprise Console (SEC) may become unresponsive upon restart.

See details >
April 09, 2019
KB4493446
Mitigated
April 25, 2019
02:00 PM PT
System may be unresponsive after restart if ArcaBit antivirus software installed
Devices with ArcaBit antivirus software installed may become unresponsive upon restart.

See details >
April 09, 2019
KB4493446
Mitigated
April 25, 2019
02:00 PM PT
Certain operations performed on a Cluster Shared Volume may fail
Certain operations, such as rename, performed on files or folders on a Cluster Shared Volume (CSV) may fail with the error, “STATUS_BAD_IMPERSONATION_LEVEL (0xC00000A5)”.

See details >
April 09, 2019
KB4493446
Mitigated
April 25, 2019
02:00 PM PT
System may be unresponsive after restart with certain McAfee antivirus products
Devices with McAfee Endpoint Security Threat Prevention 10.x, Host Intrusion Prevention 8.0, or VirusScan Enterprise 8.8 may be slow or unresponsive at startup.

See details >
April 09, 2019
KB4493446
Mitigated
April 18, 2019
05:00 PM PT
Issue using PXE to start a device from WDS
There may be issues using the Preboot Execution Environment (PXE) to start a device from a Windows Deployment Services (WDS) server configured to use Variable Window Extension.

See details >
March 12, 2019
KB4489881
Mitigated
April 09, 2019
10:00 AM PT
System unresponsive after restart if Sophos Endpoint Protection installed
Devices with Sophos Endpoint Protection installed and managed by Sophos Central or Sophos Enterprise Console (SEC) may become unresponsive upon restart.

See details >
April 09, 2019
KB4493446
Mitigated
April 09, 2019
10:00 AM PT
System may be unresponsive after restart if ArcaBit antivirus software installed
Devices with ArcaBit antivirus software installed may become unresponsive upon restart.

See details >
April 09, 2019
KB4493446
Mitigated
April 09, 2019
10:00 AM PT
Certain operations performed on a Cluster Shared Volume may fail
Certain operations, such as rename, performed on files or folders on a Cluster Shared Volume (CSV) may fail with the error, “STATUS_BAD_IMPERSONATION_LEVEL (0xC00000A5)”.

See details >
April 09, 2019
KB4493446
Mitigated
April 09, 2019
10:00 AM PT
Devices may not respond at login or Welcome screen if running certain Avast software
Devices running Avast for Business, Avast CloudCare, and AVG Business Edition antivirus software may become unresponsive after restart.

See details >
April 09, 2019
KB4493446
Resolved
April 25, 2019
02:00 PM PT
Internet Explorer 11 authentication issue with multiple concurrent logons
Internet Explorer 11 users may encounter issues if two or more people use the same user account for multiple, concurrent login sessions on the same Windows Server machine.

See details >
January 08, 2019
KB4480963
Resolved
KB4493446
April 09, 2019
10:00 AM PT
MSXML6 may cause applications to stop responding.
MSXML6 may cause applications to stop responding if an exception was thrown during node operations, such as appendChild(), insertBefore(), and moveNode().

See details >
January 08, 2019
KB4480963
Resolved
KB4493446
April 09, 2019
10:00 AM PT
Custom URI schemes may not start corresponding application
Custom URI schemes for application protocol handlers may not start the corresponding application for local intranet and trusted sites in Internet Explorer.

See details >
March 12, 2019
KB4489881
Resolved
KB4493446
April 09, 2019
10:00 AM PT
Devices may not respond at login or Welcome screen if running certain Avast software
Devices running Avast for Business, Avast CloudCare, and AVG Business Edition antivirus software may become unresponsive after restart.

See details >
April 09, 2019
KB4493446
Resolved
April 09, 2019
10:00 AM PT
Embedded objects may display incorrectly
Any compound document (OLE) server application that places embedded objects into the Windows Metafile (WMF) using the PatBlt API may display embedded objects incorrectly.

See details >
February 12, 2019
KB4487000
Resolved
KB4493446
April 09, 2019
10:00 AM PT
" @@ -86,12 +86,12 @@ sections: - type: markdown text: " - + + + + - - - - +
DetailsOriginating updateStatusHistory
System may be unresponsive after restart if Avira antivirus software installed
Microsoft and Avira have identified an issue on devices with Avira antivirus software installed that may cause the system to become unresponsive upon restart after installing KB4493446.

Microsoft has temporarily blocked devices from receiving this update if Avira antivirus software is installed.

Affected platforms: 
  • Client: Windows 8.1; Windows 7 SP1 
  • Server: Windows Server 2012 R2; Windows Server 2012; Windows Server 2008 R2 SP1; Windows Server 2008 SP2 
Next steps: We are presently investigating this issue with Avira and will provide an update when available.

Back to top
April 09, 2019
KB4493446
Investigating
Last updated:
April 09, 2019
10:00 AM PT

Opened:
April 09, 2019
10:00 AM PT
System may be unresponsive after restart if Avira antivirus software installed
Microsoft and Avira have identified an issue on devices with Avira antivirus software installed that may cause the system to become unresponsive upon restart after installing KB4493446.

Microsoft has temporarily blocked devices from receiving this update if Avira antivirus software is installed.

Affected platforms: 
  • Client: Windows 8.1; Windows 7 SP1 
  • Server: Windows Server 2012 R2; Windows Server 2012; Windows Server 2008 R2 SP1; Windows Server 2008 SP2 
Next steps: We are presently investigating this issue with Avira and will provide an update when available.

Back to top
April 09, 2019
KB4493446
Investigating
Last updated:
April 25, 2019
02:00 PM PT

Opened:
April 09, 2019
10:00 AM PT
System unresponsive after restart if Sophos Endpoint Protection installed
Microsoft and Sophos have identified an issue on devices with Sophos Endpoint Protection installed and managed by either Sophos Central or Sophos Enterprise Console (SEC) that may cause the system to become unresponsive upon restart after installing KB4493446.

Microsoft has temporarily blocked devices from receiving this update if the Sophos Endpoint is installed until a solution is available.

Affected platforms: 
  • Client: Windows 8.1; Windows 7 SP1
  • Server: Windows Server 2012 R2; Windows Server 2012; Windows Server 2008 R2 SP1; Windows Server 2008 SP2
Guidance for Sophos Endpoint and Sophos Enterprise Console customers can be found in the Sophos support article.

Back to top
April 09, 2019
KB4493446
Mitigated
Last updated:
April 25, 2019
02:00 PM PT

Opened:
April 09, 2019
10:00 AM PT
System may be unresponsive after restart if ArcaBit antivirus software installed
Microsoft and ArcaBit have identified an issue on devices with ArcaBit antivirus software installed that may cause the system to become unresponsive upon restart after installing KB4493446.

Microsoft has temporarily blocked devices from receiving this update if ArcaBit antivirus software is installed.

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 8.1; Windows 7 SP1
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server 2012 R2; Windows Server 2008 R2 SP1
Workaround: ArcaBit has released an update to address this issue. For more information, see the Arcabit support article.

Back to top
April 09, 2019
KB4493446
Mitigated
Last updated:
April 25, 2019
02:00 PM PT

Opened:
April 09, 2019
10:00 AM PT
Certain operations performed on a Cluster Shared Volume may fail
Certain operations, such as rename, that you perform on files or folders that are on a Cluster Shared Volume (CSV) may fail with the error, “STATUS_BAD_IMPERSONATION_LEVEL (0xC00000A5)”. This occurs when you perform the operation on a CSV owner node from a process that doesn’t have administrator privilege.

Affected platforms: 
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10, version 1607; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 10 Enterprise LTSB 2015; Windows 8.1
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2; Windows Server 2012
Workaround: Do one of the following:
  • Perform the operation from a process that has administrator privilege.
  • Perform the operation from a node that doesn’t have CSV ownership.
Next steps: Microsoft is working on a resolution and will provide an update in an upcoming release.

Back to top
April 09, 2019
KB4493446
Mitigated
Last updated:
April 25, 2019
02:00 PM PT

Opened:
April 09, 2019
10:00 AM PT
System may be unresponsive after restart with certain McAfee antivirus products
Microsoft and McAfee have identified an issue on devices with McAfee Endpoint Security (ENS) Threat Prevention 10.x or McAfee Host Intrusion Prevention (Host IPS) 8.0 or McAfee VirusScan Enterprise (VSE) 8.8 installed. It may cause the system to have slow startup or become unresponsive at restart after installing this update. 
 
Workaround: Guidance for McAfee customers can be found in the following McAfee support articles:  
Next steps: We are presently investigating this issue with McAfee. We will provide an update once we have more information. 

Back to top
April 09, 2019
KB4493446
Mitigated
Last updated:
April 18, 2019
05:00 PM PT

Opened:
April 09, 2019
10:00 AM PT
System unresponsive after restart if Sophos Endpoint Protection installed
Microsoft and Sophos have identified an issue on devices with Sophos Endpoint Protection installed and managed by either Sophos Central or Sophos Enterprise Console (SEC) that may cause the system to become unresponsive upon restart after installing KB4493446.

Microsoft has temporarily blocked devices from receiving this update if the Sophos Endpoint is installed until a solution is available.

Affected platforms: 
  • Client: Windows 8.1; Windows 7 SP1
  • Server: Windows Server 2012 R2; Windows Server 2012; Windows Server 2008 R2 SP1; Windows Server 2008 SP2
Guidance for Sophos Endpoint and Sophos Enterprise Console customers can be found in the Sophos support article.

Back to top
April 09, 2019
KB4493446
Mitigated
Last updated:
April 09, 2019
10:00 AM PT

Opened:
April 09, 2019
10:00 AM PT
System may be unresponsive after restart if ArcaBit antivirus software installed
Microsoft and ArcaBit have identified an issue on devices with ArcaBit antivirus software installed that may cause the system to become unresponsive upon restart after installing KB4493446.

Microsoft has temporarily blocked devices from receiving this update if ArcaBit antivirus software is installed.

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 8.1; Windows 7 SP1
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server 2012 R2; Windows Server 2008 R2 SP1
Workaround: ArcaBit has released an update to address this issue. For more information, see the Arcabit support article.

Back to top
April 09, 2019
KB4493446
Mitigated
Last updated:
April 09, 2019
10:00 AM PT

Opened:
April 09, 2019
10:00 AM PT
Certain operations performed on a Cluster Shared Volume may fail
Certain operations, such as rename, that you perform on files or folders that are on a Cluster Shared Volume (CSV) may fail with the error, “STATUS_BAD_IMPERSONATION_LEVEL (0xC00000A5)”. This occurs when you perform the operation on a CSV owner node from a process that doesn’t have administrator privilege.

Affected platforms: 
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10, version 1607; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 10 Enterprise LTSB 2015; Windows 8.1
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2; Windows Server 2012
Workaround: Do one of the following:
  • Perform the operation from a process that has administrator privilege.
  • Perform the operation from a node that doesn’t have CSV ownership.
Next steps: Microsoft is working on a resolution and will provide an update in an upcoming release.

Back to top
April 09, 2019
KB4493446
Mitigated
Last updated:
April 09, 2019
10:00 AM PT

Opened:
April 09, 2019
10:00 AM PT
Devices may not respond at login or Welcome screen if running certain Avast software
Microsoft and Avast have identified an issue on devices running Avast for Business, Avast CloudCare, and AVG Business Edition antivirus software after you install KB4493446 and restart. Devices may become unresponsive at the login or Welcome screen. Additionally, you may be unable to log in or log in after an extended period of time.

Affected platforms: 
  • Client: Windows 8.1; Windows 7 SP1 
  • Server: Windows Server 2012 R2; Windows Server 2008 R2 SP1 
Resolution: Avast has released emergency updates to address this issue. For more information and AV update schedule, see the Avast support KB article.

Back to top
April 09, 2019
KB4493446
Resolved
Resolved:
April 09, 2019
10:00 AM PT

Opened:
April 09, 2019
10:00 AM PT
Devices may not respond at login or Welcome screen if running certain Avast software
Microsoft and Avast have identified an issue on devices running Avast for Business, Avast CloudCare, and AVG Business Edition antivirus software after you install KB4493446 and restart. Devices may become unresponsive at the login or Welcome screen. Additionally, you may be unable to log in or log in after an extended period of time.

Affected platforms: 
  • Client: Windows 8.1; Windows 7 SP1 
  • Server: Windows Server 2012 R2; Windows Server 2008 R2 SP1 
Resolution: Avast has released emergency updates to address this issue. For more information and AV update schedule, see the Avast support KB article.

Back to top
April 09, 2019
KB4493446
Resolved
Resolved:
April 25, 2019
02:00 PM PT

Opened:
April 09, 2019
10:00 AM PT
" @@ -101,7 +101,7 @@ sections: text: " +

Option 2:
Use the Windows Deployment Services UI to make the following adjustment:
  1. Open Windows Deployment Services from Windows Administrative Tools.
  2. Expand Servers and right-click a WDS server.
  3. Open its properties and clear the Enable Variable Window Extension box on the TFTP tab.
Option 3:
Set the following registry value to 0:
HKLM\\System\\CurrentControlSet\\Services\\WDSServer\\Providers\\WDSTFTP\\EnableVariableWindowExtension

Restart the WDSServer service after disabling the Variable Window Extension.

Next steps: Microsoft is working on a resolution and will provide an update in an upcoming release.

Back to top
DetailsOriginating updateStatusHistory
Issue using PXE to start a device from WDS
After installing KB4489881, there may be issues using the Preboot Execution Environment (PXE) to start a device from a Windows Deployment Services (WDS) server configured to use Variable Window Extension. This may cause the connection to the WDS server to terminate prematurely while downloading the image. This issue does not affect clients or devices that are not using Variable Window Extension.

Affected platforms: 
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1607; Windows 10 Enterprise LTSC 2016; Windows 8.1 
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server 2016; Windows Server 2012 R2; Windows Server 2012 
Workaround: To mitigate the issue, disable the Variable Window Extension on WDS server using one of the following options:

Option 1:
Open an Administrator Command prompt and type the following:
Wdsutil /Set-TransportServer /EnableTftpVariableWindowExtension:No
-

Option 2:
Use the Windows Deployment Services UI to make the following adjustment:
  1. Open Windows Deployment Services from Windows Administrative Tools.
  2. Expand Servers and right-click a WDS server.
  3. Open its properties and clear the Enable Variable Window Extension box on the TFTP tab.
Option 3:
Set the following registry value to 0:
HKLM\\System\\CurrentControlSet\\Services\\WDSServer\\Providers\\WDSTFTP\\EnableVariableWindowExtension

Restart the WDSServer service after disabling the Variable Window Extension.

Next steps: Microsoft is working on a resolution and will provide an update in an upcoming release.

Back to top
March 12, 2019
KB4489881
Mitigated
Last updated:
April 09, 2019
10:00 AM PT

Opened:
March 12, 2019
10:00 AM PT
March 12, 2019
KB4489881
Mitigated
Last updated:
April 25, 2019
02:00 PM PT

Opened:
March 12, 2019
10:00 AM PT
Custom URI schemes may not start corresponding application
After installing KB4489881, custom URI schemes for application protocol handlers may not start the corresponding application for local intranet and trusted sites security zones on Internet Explorer.

Affected platforms: 
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10, version 1607; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 10 Enterprise LTSB 2015; Windows 8.1; Windows 7 SP1 
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2; Windows Server 2008 R2 SP1 
Resolution: This issue is resolved in KB4493446.

Back to top
March 12, 2019
KB4489881
Resolved
KB4493446
Resolved:
April 09, 2019
10:00 AM PT

Opened:
March 12, 2019
10:00 AM PT
" diff --git a/windows/release-information/status-windows-server-2008-sp2.yml b/windows/release-information/status-windows-server-2008-sp2.yml index c2e4a54439..e0487e003a 100644 --- a/windows/release-information/status-windows-server-2008-sp2.yml +++ b/windows/release-information/status-windows-server-2008-sp2.yml @@ -60,9 +60,9 @@ sections: - type: markdown text: "
This table offers a summary of current active issues and those issues that have been resolved in the last 30 days.

- - - + + +
SummaryOriginating updateStatusLast updated
System may be unresponsive after restart if Avira antivirus software installed
Devices with Avira antivirus software installed may become unresponsive upon restart.

See details >
April 09, 2019
KB4493471
Investigating
April 09, 2019
10:00 AM PT
System unresponsive after restart if Sophos Endpoint Protection installed
Devices with Sophos Endpoint Protection installed and managed by Sophos Central or Sophos Enterprise Console (SEC) may become unresponsive upon restart.

See details >
April 09, 2019
KB4493471
Mitigated
April 09, 2019
10:00 AM PT
Authentication may fail for services after the Kerberos ticket expires
Authentication may fail for services that require unconstrained delegation after the Kerberos ticket expires.

See details >
March 12, 2019
KB4489880
Mitigated
April 09, 2019
10:00 AM PT
System may be unresponsive after restart if Avira antivirus software installed
Devices with Avira antivirus software installed may become unresponsive upon restart.

See details >
April 09, 2019
KB4493471
Investigating
April 25, 2019
02:00 PM PT
System unresponsive after restart if Sophos Endpoint Protection installed
Devices with Sophos Endpoint Protection installed and managed by Sophos Central or Sophos Enterprise Console (SEC) may become unresponsive upon restart.

See details >
April 09, 2019
KB4493471
Mitigated
April 25, 2019
02:00 PM PT
Authentication may fail for services after the Kerberos ticket expires
Authentication may fail for services that require unconstrained delegation after the Kerberos ticket expires.

See details >
March 12, 2019
KB4489880
Mitigated
April 25, 2019
02:00 PM PT
Embedded objects may display incorrectly
Any compound document (OLE) server application that places embedded objects into the Windows Metafile (WMF) using the PatBlt API may display embedded objects incorrectly.

See details >
February 12, 2019
KB4487023
Resolved
KB4493471
April 09, 2019
10:00 AM PT
NETDOM.EXE fails to run
NETDOM.EXE fails to run and the error, “The command failed to complete successfully.” appears on screen.

See details >
March 12, 2019
KB4489880
Resolved
KB4493471
April 09, 2019
10:00 AM PT
@@ -80,8 +80,8 @@ sections: - type: markdown text: " - - + +
DetailsOriginating updateStatusHistory
System may be unresponsive after restart if Avira antivirus software installed
Microsoft and Avira have identified an issue on devices with Avira antivirus software installed that may cause the system to become unresponsive upon restart after installing KB4493471.

Microsoft has temporarily blocked devices from receiving this update if Avira antivirus software is installed.

Affected platforms: 
  • Client: Windows 8.1; Windows 7 SP1 
  • Server: Windows Server 2012 R2; Windows Server 2012; Windows Server 2008 R2 SP1; Windows Server 2008 SP2
Next steps: We are presently investigating this issue with Avira and will provide an update when available.

Back to top
April 09, 2019
KB4493471
Investigating
Last updated:
April 09, 2019
10:00 AM PT

Opened:
April 09, 2019
10:00 AM PT
System unresponsive after restart if Sophos Endpoint Protection installed
Microsoft and Sophos have identified an issue on devices with Sophos Endpoint Protection installed and managed by either Sophos Central or Sophos Enterprise Console (SEC) that may cause the system to become unresponsive upon restart after installing KB4493471.

Microsoft has temporarily blocked devices from receiving this update if the Sophos Endpoint is installed until a solution is available.

Affected platforms: 
  • Client: Windows 8.1; Windows 7 SP1
  • Server: Windows Server 2012 R2; Windows Server 2012; Windows Server 2008 R2 SP1; Windows Server 2008 SP2
Guidance for Sophos Endpoint and Sophos Enterprise Console customers can be found in the Sophos support article.

Back to top
April 09, 2019
KB4493471
Mitigated
Last updated:
April 09, 2019
10:00 AM PT

Opened:
April 09, 2019
10:00 AM PT
System may be unresponsive after restart if Avira antivirus software installed
Microsoft and Avira have identified an issue on devices with Avira antivirus software installed that may cause the system to become unresponsive upon restart after installing KB4493471.

Microsoft has temporarily blocked devices from receiving this update if Avira antivirus software is installed.

Affected platforms: 
  • Client: Windows 8.1; Windows 7 SP1 
  • Server: Windows Server 2012 R2; Windows Server 2012; Windows Server 2008 R2 SP1; Windows Server 2008 SP2
Next steps: We are presently investigating this issue with Avira and will provide an update when available.

Back to top
April 09, 2019
KB4493471
Investigating
Last updated:
April 25, 2019
02:00 PM PT

Opened:
April 09, 2019
10:00 AM PT
System unresponsive after restart if Sophos Endpoint Protection installed
Microsoft and Sophos have identified an issue on devices with Sophos Endpoint Protection installed and managed by either Sophos Central or Sophos Enterprise Console (SEC) that may cause the system to become unresponsive upon restart after installing KB4493471.

Microsoft has temporarily blocked devices from receiving this update if the Sophos Endpoint is installed until a solution is available.

Affected platforms: 
  • Client: Windows 8.1; Windows 7 SP1
  • Server: Windows Server 2012 R2; Windows Server 2012; Windows Server 2008 R2 SP1; Windows Server 2008 SP2
Guidance for Sophos Endpoint and Sophos Enterprise Console customers can be found in the Sophos support article.

Back to top
April 09, 2019
KB4493471
Mitigated
Last updated:
April 25, 2019
02:00 PM PT

Opened:
April 09, 2019
10:00 AM PT
" @@ -90,7 +90,7 @@ sections: - type: markdown text: " - +
DetailsOriginating updateStatusHistory
Authentication may fail for services after the Kerberos ticket expires
After installing KB4489880, some customers report that authentication fails for services that require unconstrained delegation after the Kerberos ticket expires (the default is 10 hours). For example, the SQL server service fails.

Affected platforms: 
  • Client: Windows 7 SP1
  • Server: Windows Server 2008 R2 SP1; Windows Server 2008 SP2
Workaround: To mitigate this issue, use one of the following options:
  • Option 1: Purge the Kerberos tickets on the application server. After the Kerberos ticket expires, the issue will occur again, and you must purge the tickets again.
  • Option 2: If purging does not mitigate the issue, restart the application; for example, restart the Internet Information Services (IIS) app pool associated with the SQL server.
  • Option 3: Use constrained delegation.
Next steps: Microsoft is working on a resolution and will provide an update in an upcoming release.

Back to top
March 12, 2019
KB4489880
Mitigated
Last updated:
April 09, 2019
10:00 AM PT

Opened:
March 12, 2019
10:00 AM PT
Authentication may fail for services after the Kerberos ticket expires
After installing KB4489880, some customers report that authentication fails for services that require unconstrained delegation after the Kerberos ticket expires (the default is 10 hours). For example, the SQL server service fails.

Affected platforms: 
  • Client: Windows 7 SP1
  • Server: Windows Server 2008 R2 SP1; Windows Server 2008 SP2
Workaround: To mitigate this issue, use one of the following options:
  • Option 1: Purge the Kerberos tickets on the application server. After the Kerberos ticket expires, the issue will occur again, and you must purge the tickets again.
  • Option 2: If purging does not mitigate the issue, restart the application; for example, restart the Internet Information Services (IIS) app pool associated with the SQL server.
  • Option 3: Use constrained delegation.
Next steps: Microsoft is working on a resolution and will provide an update in an upcoming release.

Back to top
March 12, 2019
KB4489880
Mitigated
Last updated:
April 25, 2019
02:00 PM PT

Opened:
March 12, 2019
10:00 AM PT
NETDOM.EXE fails to run
After installing KB4489880, NETDOM.EXE fails to run, and the on-screen error, “The command failed to complete successfully.” appears.

Affected platforms: 
  • Client: Windows 7 SP1
  • Server: Windows Server 2008 R2 SP1; Windows Server 2008 SP2
Resolution: This issue is resolved in KB4493471.

Back to top
March 12, 2019
KB4489880
Resolved
KB4493471
Resolved:
April 09, 2019
10:00 AM PT

Opened:
March 12, 2019
10:00 AM PT
" diff --git a/windows/release-information/status-windows-server-2012.yml b/windows/release-information/status-windows-server-2012.yml index 2b6680cf87..45a2e866e4 100644 --- a/windows/release-information/status-windows-server-2012.yml +++ b/windows/release-information/status-windows-server-2012.yml @@ -60,10 +60,10 @@ sections: - type: markdown text: "
This table offers a summary of current active issues and those issues that have been resolved in the last 30 days.

- - - - + + + + @@ -82,9 +82,9 @@ sections: - type: markdown text: "
SummaryOriginating updateStatusLast updated
System may be unresponsive after restart if Avira antivirus software installed
Devices with Avira antivirus software installed may become unresponsive upon restart.

See details >
April 09, 2019
KB4493451
Investigating
April 09, 2019
10:00 AM PT
System unresponsive after restart if Sophos Endpoint Protection installed
Devices with Sophos Endpoint Protection installed and managed by Sophos Central or Sophos Enterprise Console (SEC) may become unresponsive upon restart.

See details >
April 09, 2019
KB4493451
Mitigated
April 09, 2019
10:00 AM PT
Certain operations performed on a Cluster Shared Volume may fail
Certain operations, such as rename, performed on files or folders on a Cluster Shared Volume (CSV) may fail with the error, “STATUS_BAD_IMPERSONATION_LEVEL (0xC00000A5)”.

See details >
January 08, 2019
KB4480975
Mitigated
April 09, 2019
10:00 AM PT
Issue using PXE to start a device from WDS
There may be issues using the Preboot Execution Environment (PXE) to start a device from a Windows Deployment Services (WDS) server configured to use Variable Window Extension.

See details >
March 12, 2019
KB4489891
Mitigated
March 12, 2019
10:00 AM PT
System may be unresponsive after restart if Avira antivirus software installed
Devices with Avira antivirus software installed may become unresponsive upon restart.

See details >
April 09, 2019
KB4493451
Investigating
April 25, 2019
02:00 PM PT
Issue using PXE to start a device from WDS
There may be issues using the Preboot Execution Environment (PXE) to start a device from a Windows Deployment Services (WDS) server configured to use Variable Window Extension.

See details >
March 12, 2019
KB4489891
Mitigated
April 25, 2019
02:00 PM PT
System unresponsive after restart if Sophos Endpoint Protection installed
Devices with Sophos Endpoint Protection installed and managed by Sophos Central or Sophos Enterprise Console (SEC) may become unresponsive upon restart.

See details >
April 09, 2019
KB4493451
Mitigated
April 25, 2019
02:00 PM PT
Certain operations performed on a Cluster Shared Volume may fail
Certain operations, such as rename, performed on files or folders on a Cluster Shared Volume (CSV) may fail with the error, “STATUS_BAD_IMPERSONATION_LEVEL (0xC00000A5)”.

See details >
January 08, 2019
KB4480975
Mitigated
April 25, 2019
02:00 PM PT
Internet Explorer 11 authentication issue with multiple concurrent logons
Internet Explorer 11 users may encounter issues if two or more people use the same user account for multiple, concurrent login sessions on the same Windows Server machine.

See details >
January 08, 2019
KB4480975
Resolved
KB4493451
April 09, 2019
10:00 AM PT
MSXML6 may cause applications to stop responding
MSXML6 may cause applications to stop responding if an exception was thrown during node operations, such as appendChild(), insertBefore(), and moveNode().

See details >
January 08, 2019
KB4480975
Resolved
KB4493451
April 09, 2019
10:00 AM PT
Embedded objects may display incorrectly
Any compound document (OLE) server application that places embedded objects into the Windows Metafile (WMF) using the PatBlt API may display embedded objects incorrectly.

See details >
February 12, 2019
KB4487025
Resolved
KB4493451
April 09, 2019
10:00 AM PT
- - - + + +
DetailsOriginating updateStatusHistory
System may be unresponsive after restart if Avira antivirus software installed
Microsoft and Avira have identified an issue on devices with Avira antivirus software installed that may cause the system to become unresponsive upon restart after installing KB4493451.

Microsoft has temporarily blocked devices from receiving this update if Avira antivirus software is installed.

Affected platforms: 
  • Client: Windows 8.1; Windows 7 SP1 
  • Server: Windows Server 2012 R2; Windows Server 2012; Windows Server 2008 R2 SP1; Windows Server 2008 SP2
Next steps: We are presently investigating this issue with Avira and will provide an update when available.

Back to top
April 09, 2019
KB4493451
Investigating
Last updated:
April 09, 2019
10:00 AM PT

Opened:
April 09, 2019
10:00 AM PT
System unresponsive after restart if Sophos Endpoint Protection installed
Microsoft and Sophos have identified an issue on devices with Sophos Endpoint Protection installed and managed by either Sophos Central or Sophos Enterprise Console (SEC) that may cause the system to become unresponsive upon restart after installing KB4493451.

Microsoft has temporarily blocked devices from receiving this update if the Sophos Endpoint is installed until a solution is available.

Affected platforms: 
  • Client: Windows 8.1; Windows 7 SP1
  • Server: Windows Server 2012 R2; Windows Server 2012; Windows Server 2008 R2 SP1; Windows Server 2008 SP2
Guidance for Sophos Endpoint and Sophos Enterprise Console customers can be found in the Sophos support article.

Back to top
April 09, 2019
KB4493451
Mitigated
Last updated:
April 09, 2019
10:00 AM PT

Opened:
April 09, 2019
10:00 AM PT
Certain operations performed on a Cluster Shared Volume may fail
Certain operations, such as rename, that you perform on files or folders that are on a Cluster Shared Volume (CSV) may fail with the error, \"STATUS_BAD_IMPERSONATION_LEVEL (0xC00000A5)\". This occurs when you perform the operation on a CSV owner node from a process that doesn’t have administrator privilege.

Affected platforms: 
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10, version 1607; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 10 Enterprise LTSB 2015; Windows 8.1
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2; Windows Server 2012
Workaround: Do one of the following:
  • Perform the operation from a process that has administrator privilege.
  • Perform the operation from a node that doesn’t have CSV ownership.
Next steps: Microsoft is working on a resolution and will provide an update in an upcoming release.

Back to top
January 08, 2019
KB4480975
Mitigated
Last updated:
April 09, 2019
10:00 AM PT

Opened:
April 09, 2019
10:00 AM PT
System may be unresponsive after restart if Avira antivirus software installed
Microsoft and Avira have identified an issue on devices with Avira antivirus software installed that may cause the system to become unresponsive upon restart after installing KB4493451.

Microsoft has temporarily blocked devices from receiving this update if Avira antivirus software is installed.

Affected platforms: 
  • Client: Windows 8.1; Windows 7 SP1 
  • Server: Windows Server 2012 R2; Windows Server 2012; Windows Server 2008 R2 SP1; Windows Server 2008 SP2
Next steps: We are presently investigating this issue with Avira and will provide an update when available.

Back to top
April 09, 2019
KB4493451
Investigating
Last updated:
April 25, 2019
02:00 PM PT

Opened:
April 09, 2019
10:00 AM PT
System unresponsive after restart if Sophos Endpoint Protection installed
Microsoft and Sophos have identified an issue on devices with Sophos Endpoint Protection installed and managed by either Sophos Central or Sophos Enterprise Console (SEC) that may cause the system to become unresponsive upon restart after installing KB4493451.

Microsoft has temporarily blocked devices from receiving this update if the Sophos Endpoint is installed until a solution is available.

Affected platforms: 
  • Client: Windows 8.1; Windows 7 SP1
  • Server: Windows Server 2012 R2; Windows Server 2012; Windows Server 2008 R2 SP1; Windows Server 2008 SP2
Guidance for Sophos Endpoint and Sophos Enterprise Console customers can be found in the Sophos support article.

Back to top
April 09, 2019
KB4493451
Mitigated
Last updated:
April 25, 2019
02:00 PM PT

Opened:
April 09, 2019
10:00 AM PT
Certain operations performed on a Cluster Shared Volume may fail
Certain operations, such as rename, that you perform on files or folders that are on a Cluster Shared Volume (CSV) may fail with the error, \"STATUS_BAD_IMPERSONATION_LEVEL (0xC00000A5)\". This occurs when you perform the operation on a CSV owner node from a process that doesn’t have administrator privilege.

Affected platforms: 
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10, version 1607; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 10 Enterprise LTSB 2015; Windows 8.1
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2; Windows Server 2012
Workaround: Do one of the following:
  • Perform the operation from a process that has administrator privilege.
  • Perform the operation from a node that doesn’t have CSV ownership.
Next steps: Microsoft is working on a resolution and will provide an update in an upcoming release.

Back to top
January 08, 2019
KB4480975
Mitigated
Last updated:
April 25, 2019
02:00 PM PT

Opened:
April 09, 2019
10:00 AM PT
" @@ -94,7 +94,7 @@ sections: text: " +

Option 2:
Use the Windows Deployment Services UI to make the following adjustment:
  1. Open Windows Deployment Services from Windows Administrative Tools.
  2. Expand Servers and right-click a WDS server.
  3. Open its properties and clear the Enable Variable Window Extension box on the TFTP tab.
Option 3:
Set the following registry value to 0:
HKLM\\System\\CurrentControlSet\\Services\\WDSServer\\Providers\\WDSTFTP\\EnableVariableWindowExtension

Restart the WDSServer service after disabling the Variable Window Extension.

Next steps: Microsoft is working on a resolution and will provide an update in an upcoming release.

Back to top
DetailsOriginating updateStatusHistory
Issue using PXE to start a device from WDS
After installing KB4489891, there may be issues using the Preboot Execution Environment (PXE) to start a device from a Windows Deployment Services (WDS) server configured to use Variable Window Extension. This may cause the connection to the WDS server to terminate prematurely while downloading the image. This issue does not affect clients or devices that are not using Variable Window Extension.

Affected platforms: 
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1607; Windows 10 Enterprise LTSC 2016; Windows 8.1 
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server 2016; Windows Server 2012 R2; Windows Server 2012 
Workaround: To mitigate the issue, disable the Variable Window Extension on WDS server using one of the following options:

Option 1:
Open an Administrator Command prompt and type the following:
Wdsutil /Set-TransportServer /EnableTftpVariableWindowExtension:No
-

Option 2:
Use the Windows Deployment Services UI to make the following adjustment:
  1. Open Windows Deployment Services from Windows Administrative Tools.
  2. Expand Servers and right-click a WDS server.
  3. Open its properties and clear the Enable Variable Window Extension box on the TFTP tab.
Option 3:
Set the following registry value to 0:
HKLM\\System\\CurrentControlSet\\Services\\WDSServer\\Providers\\WDSTFTP\\EnableVariableWindowExtension

Restart the WDSServer service after disabling the Variable Window Extension.

Next steps: Microsoft is working on a resolution and will provide an update in an upcoming release.

Back to top
March 12, 2019
KB4489891
Mitigated
Last updated:
March 12, 2019
10:00 AM PT

Opened:
March 12, 2019
10:00 AM PT
March 12, 2019
KB4489891
Mitigated
Last updated:
April 25, 2019
02:00 PM PT

Opened:
March 12, 2019
10:00 AM PT
" diff --git a/windows/release-information/windows-message-center.yml b/windows/release-information/windows-message-center.yml index fd6a56b79c..938cc573f2 100644 --- a/windows/release-information/windows-message-center.yml +++ b/windows/release-information/windows-message-center.yml @@ -65,7 +65,7 @@ In order avoid this, you need to set your feature update deferral policy to 273
Windows 10, version 1809 designated for broad deployment
Based on the data and the feedback we’ve received from consumers, OEMs, ISVs, partners, and commercial customers, Windows 10, version 1809 has transitioned to broad deployment. With this, the Windows 10 release information page will now reflect Semi-Annual Channel (SAC) for version 1809.
March 28, 2019
10:00 AM PT
Reminder: Additional servicing for the Windows 10 Enterprise, Education, and IoT Enterprise, version 1607 ends April 9, 2019
The additional servicing for Windows 10 Enterprise, Education, and IoT Enterprise editions ends on April 9, 2019 and doesn't extend beyond this date. To continue receiving security and quality updates, Microsoft recommends updating to the latest version of Windows 10.

Devices running Windows 10 Enterprise 2016 LTSB will continue to receive updates until October 2026 per the Fixed Lifecycle Policy. Windows 10, version 1607 devices running the Intel “Clovertrail” chipset will continue to receive updates until January 2023.
March 12, 2019
10:00 AM PT
Reminder: Windows 10 Home, Pro, Pro for Workstations, and IoT Core, version 1709 will reach end of service on April 9, 2019
Windows 10, version 1709, will reach end of service on April 9, 2019 for devices running Windows 10 Home, Pro, Pro for Workstations, and IoT Core editions. These devices will no longer receive monthly security and quality updates that contain protection from the latest security threats. To continue receiving security and quality updates, Microsoft recommends updating to the latest version of Windows 10.

Windows 10 Enterprise, Education, and IoT Enterprise editions will continue to receive servicing for 12 months at no cost per the lifecycle announcement on October 2018.
March 12, 2019
10:00 AM PT
Take action: Install standalone security updates to introduce SHA-2 code sign support for Windows 7 amd Windows Server 2008 R2
A standalone SHA-2 code signing support update for Windows Server 2008 R2 and Windows 7 is now available, as is a sservicing stack update for Windows 7 SP1 and Windows Server 2008 R2 SP1 that includes the SHA-2 code signing support update.
March 12, 2019
10:00 AM PT
Take action: Install standalone security updates to introduce SHA-2 code sign support for Windows 7 amd Windows Server 2008 R2
A standalone SHA-2 code signing support update for Windows Server 2008 R2 and Windows 7 is now available, as is a servicing stack update for Windows 7 SP1 and Windows Server 2008 R2 SP1 that includes the SHA-2 code signing support update.
March 12, 2019
10:00 AM PT
Take action: Install standalone update for WSUS 3.0 SP2 to support the delivery of SHA-2 signed updates
A standalone update, KB4484071 is available on Windows Update Catalog for WSUS 3.0 SP2 that supports delivering SHA-2 signed updates. For those customers using WSUS 3.0 SP2, this update should be manually installed no later than June 18, 2019.
March 12, 2019
10:00 AM PT
Reminder: Final Delta update for Windows 10, version 1607, 1703, 1709, and 1803 will be April 9, 2019
March 12th and April 9th will be the last two Delta updates for Windows 10, version 1607, 1703, 1709, and 1803. Security and quality updates will continue to be available via the express and full cumulative update packages.
March 12, 2019
10:00 AM PT
How do we measure and improve the quality of Windows?
Measuring the quality of Windows is a complex undertaking that requires gathering a variety of diagnostic signals from millions of devices within the Windows ecosystem. In addition to rigorous internal testing, we rely heavily on the feedback provided through diagnostic data to detect and fix problems before we release new updates of Windows to the general population, and to monitor the impact of those updates after each release.

From 12f332f42a68a1a7e96b04f1ffc46c34d55ed4a9 Mon Sep 17 00:00:00 2001 From: "Nisha Mittal (Wipro Ltd.)" Date: Mon, 29 Apr 2019 14:36:52 -0700 Subject: [PATCH 237/724] Wrong Kbs are corrected --- .../resolved-issues-windows-10-1507.yml | 2 +- .../resolved-issues-windows-10-1607.yml | 2 +- .../resolved-issues-windows-10-1703.yml | 2 +- .../resolved-issues-windows-10-1709.yml | 2 +- .../resolved-issues-windows-10-1803.yml | 6 +++--- ...ssues-windows-10-1809-and-windows-server-2019.yml | 4 ++-- ...sues-windows-7-and-windows-server-2008-r2-sp1.yml | 2 +- ...issues-windows-8.1-and-windows-server-2012-r2.yml | 4 ++-- .../resolved-issues-windows-server-2008-sp2.yml | 4 ++-- .../resolved-issues-windows-server-2012.yml | 4 ++-- .../release-information/status-windows-10-1507.yml | 4 ++-- ...tatus-windows-10-1607-and-windows-server-2016.yml | 4 ++-- .../release-information/status-windows-10-1703.yml | 12 ++---------- .../release-information/status-windows-10-1709.yml | 4 ++-- .../release-information/status-windows-10-1803.yml | 8 ++++---- ...tatus-windows-10-1809-and-windows-server-2019.yml | 4 ++-- ...atus-windows-7-and-windows-server-2008-r2-sp1.yml | 2 +- ...status-windows-8.1-and-windows-server-2012-r2.yml | 8 ++++---- .../status-windows-server-2008-sp2.yml | 2 +- .../status-windows-server-2012.yml | 6 +++--- 20 files changed, 39 insertions(+), 47 deletions(-) diff --git a/windows/release-information/resolved-issues-windows-10-1507.yml b/windows/release-information/resolved-issues-windows-10-1507.yml index cef51a414f..cc1193bf44 100644 --- a/windows/release-information/resolved-issues-windows-10-1507.yml +++ b/windows/release-information/resolved-issues-windows-10-1507.yml @@ -99,7 +99,7 @@ sections: - type: markdown text: " - +
DetailsOriginating updateStatusHistory
Unable to use Seek bar in Windows Media Player
After installing KB4462922, users may not be able to use the Seek Bar in Windows Media Player when playing specific files. This issue does not affect normal playback.

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10, version 1607; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 10 Enterprise LTSB 2015; Windows 8.1; Windows 7 SP1
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2; Windows Server 2012; Windows Server 2008 R2 SP1; Windows Server 2008 SP2
Resolution: This issue is resolved in KB4471323.

Back to top
OS Build 10240.18005

October 09, 2018
KB4462922
Resolved
KB4471323
Resolved:
December 11, 2018
10:00 AM PT

Opened:
October 09, 2018
10:00 AM PT
Unable to use Seek bar in Windows Media Player
After installing KB4462922, users may not be able to use the Seek bar in Windows Media Player when playing specific files. This issue does not affect normal playback.

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10, version 1607; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 10 Enterprise LTSB 2015; Windows 8.1; Windows 7 SP1
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2; Windows Server 2012; Windows Server 2008 R2 SP1; Windows Server 2008 SP2
Resolution: This issue is resolved in KB4471323.

Back to top
OS Build 10240.18005

October 09, 2018
KB4462922
Resolved
KB4471323
Resolved:
December 11, 2018
10:00 AM PT

Opened:
October 09, 2018
10:00 AM PT
" diff --git a/windows/release-information/resolved-issues-windows-10-1607.yml b/windows/release-information/resolved-issues-windows-10-1607.yml index 9175288b84..6beb9c7a5d 100644 --- a/windows/release-information/resolved-issues-windows-10-1607.yml +++ b/windows/release-information/resolved-issues-windows-10-1607.yml @@ -119,7 +119,7 @@ sections: - type: markdown text: " - +
DetailsOriginating updateStatusHistory
Unable to use Seek bar in Windows Media Player
After installing KB4462917, users may not be able to use the Seek Bar in Windows Media Player when playing specific files. This issue does not affect normal playback.

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10, version 1607; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 10 Enterprise LTSB 2015; Windows 8.1; Windows 7 SP1
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2; Windows Server 2012; Windows Server 2008 R2 SP1; Windows Server 2008 SP2
Resolution: This issue is resolved in KB4471321.

Back to top
OS Build 14393.2551

October 09, 2018
KB4462917
Resolved
KB4471321
Resolved:
December 11, 2018
10:00 AM PT

Opened:
October 09, 2018
10:00 AM PT
Unable to use Seek bar in Windows Media Player
After installing KB4462917, users may not be able to use the Seek bar in Windows Media Player when playing specific files. This issue does not affect normal playback.

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10, version 1607; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 10 Enterprise LTSB 2015; Windows 8.1; Windows 7 SP1
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2; Windows Server 2012; Windows Server 2008 R2 SP1; Windows Server 2008 SP2
Resolution: This issue is resolved in KB4471321.

Back to top
OS Build 14393.2551

October 09, 2018
KB4462917
Resolved
KB4471321
Resolved:
December 11, 2018
10:00 AM PT

Opened:
October 09, 2018
10:00 AM PT
" diff --git a/windows/release-information/resolved-issues-windows-10-1703.yml b/windows/release-information/resolved-issues-windows-10-1703.yml index 9d14d877f7..7ec02137af 100644 --- a/windows/release-information/resolved-issues-windows-10-1703.yml +++ b/windows/release-information/resolved-issues-windows-10-1703.yml @@ -97,7 +97,7 @@ sections: - type: markdown text: " - +
DetailsOriginating updateStatusHistory
Unable to use Seek bar in Windows Media Player
After installing KB4462937, users may not be able to use the Seek Bar in Windows Media Player when playing specific files. This issue does not affect normal playback.

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10, version 1607; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 10 Enterprise LTSB 2015; Windows 8.1; Windows 7 SP1
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2; Windows Server 2012; Windows Server 2008 R2 SP1; Windows Server 2008 SP2
Resolution: This issue is resolved in KB4471327.

Back to top
OS Build 15063.1387

October 09, 2018
KB4462937
Resolved
KB4471327
Resolved:
December 11, 2018
10:00 AM PT

Opened:
October 09, 2018
10:00 AM PT
Unable to use Seek bar in Windows Media Player
After installing KB4462937, users may not be able to use the Seek bar in Windows Media Player when playing specific files. This issue does not affect normal playback.

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10, version 1607; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 10 Enterprise LTSB 2015; Windows 8.1; Windows 7 SP1
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2; Windows Server 2012; Windows Server 2008 R2 SP1; Windows Server 2008 SP2
Resolution: This issue is resolved in KB4471327.

Back to top
OS Build 15063.1387

October 09, 2018
KB4462937
Resolved
KB4471327
Resolved:
December 11, 2018
10:00 AM PT

Opened:
October 09, 2018
10:00 AM PT
LongonUI.exe stops working intermittently
After installing KB4462937, LogonUI.exe stops working intermittently.

Affected platforms:
  • Windows 10, version 1703
Resolution: This issue is resolved in KB4467699.

Back to top
OS Build 15063.1387

October 09, 2018
KB4462937
Resolved
KB4467699
Resolved:
November 27, 2018
10:00 AM PT

Opened:
October 09, 2018
10:00 AM PT
Error message beginning with “Hosted by…” when launching Microsoft Edge
After installing KB4462937, some users may see a dialog box with a non-applicable message beginning with the words “Hosted by...” when first starting Microsoft Edge.

This dialog will only appear once if they have turned on “Block only third-party cookies” in Microsoft Edge and applied certain language packs before installing this update.

Affected platforms:
  • Client: Windows 10, version 1709; Windows 10, version 1703
  • Server: Windows Server, version 1709
Resolution: This issue is resolved in KB4462939.

Back to top
OS Build 15063.1387

October 09, 2018
KB4462937
Resolved
KB4462939
Resolved:
October 18, 2018
10:00 AM PT

Opened:
October 09, 2018
10:00 AM PT
diff --git a/windows/release-information/resolved-issues-windows-10-1709.yml b/windows/release-information/resolved-issues-windows-10-1709.yml index 25787d994b..335de5ff85 100644 --- a/windows/release-information/resolved-issues-windows-10-1709.yml +++ b/windows/release-information/resolved-issues-windows-10-1709.yml @@ -76,7 +76,7 @@ sections:
Embedded objects may display incorrectly
Any compound document (OLE) server application that places embedded objects into the Windows Metafile (WMF) using the PatBlt API may display embedded objects incorrectly. 
 
For example, if you paste a Microsoft Excel worksheet object into a Microsoft Word document, the cells may render with a different background color. 
 
Affected platforms:  
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10, version 1607; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 10 Enterprise LTSB 2015; Windows 8.1; Windows 7 SP1 
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2; Windows Server 2012; Windows Server 2008 R2 SP1; Windows Server 2008 SP2 
Resolution: This issue is resolved in KB4493441

Back to top
OS Build 16299.967

February 12, 2019
KB4486996
Resolved
KB4493441
Resolved:
April 09, 2019
10:00 AM PT

Opened:
February 12, 2019
10:00 AM PT
Error 1309 when installing/uninstalling MSI or MSP files
After installing KB4486996, users may receive “Error 1309” while installing or uninstalling certain types of MSI and MSP files.

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10, version 1607; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 10 Enterprise LTSB 2015; Windows 8.1
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2; Windows Server 2012
Resolution: This issue is resolved in KB4489886.

Back to top
OS Build 16299.967

February 12, 2019
KB4486996
Resolved
KB4489886
Resolved:
March 12, 2019
10:00 AM PT

Opened:
February 12, 2019
10:00 AM PT
Applications using Microsoft Jet database and Access 95 file format stop working
Applications that use a Microsoft Jet database with the Microsoft Access 95 file format may randomly stop working.

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10, version 1607; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 10 Enterprise LTSB 2015; Windows 7 SP1
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2; Windows Server 2012; Windows Server 2008 R2 SP1; Windows Server 2008 SP2
Resolution: This issue is resolved in KB4487021.

Back to top
OS Build 16299.967

February 12, 2019
KB4486996
Resolved
KB4487021
Resolved:
February 19, 2019
02:00 PM PT

Opened:
February 12, 2019
10:00 AM PT
Internet Explorer may fail to load images
After installing KB4486996, Internet Explorer may fail to load images with a backslash (\\) in their relative source path.

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10, version 1607; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 10 Enterprise LTSB 2015; Windows 8.1; Windows 7 SP1
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2; Windows Server 2008 R2 SP1
Resolution: This issue is resolved in KB4487021.

Back to top
OS Build 16299.967

February 12, 2019
KB4486996
Resolved
KB4487021
Resolved:
February 19, 2019
02:00 PM PT

Opened:
February 12, 2019
10:00 AM PT
Internet Explorer may fail to load images
After installing KB4486996, Internet Explorer may fail to load images with a backslash (\\) in their relative source path.

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10, version 1607; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 10 Enterprise LTSB 2015; Windows 8.1; Windows 7 SP1
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2; Windows Server 2008 R2 SP1
Resolution: This issue is resolved in KB4487021.

Back to top
OS Build 16299.967

February 12, 2019
KB4486996
Resolved
KB4487021
Resolved:
February 19, 2019
02:00 PM PT

Opened:
February 12, 2019
10:00 AM PT
" diff --git a/windows/release-information/resolved-issues-windows-10-1803.yml b/windows/release-information/resolved-issues-windows-10-1803.yml index a3c036450b..3ef64b032f 100644 --- a/windows/release-information/resolved-issues-windows-10-1803.yml +++ b/windows/release-information/resolved-issues-windows-10-1803.yml @@ -34,7 +34,7 @@ sections: - + @@ -47,7 +47,7 @@ sections: - + @@ -89,7 +89,7 @@ sections: - type: markdown text: "
SummaryOriginating updateStatusDate resolved
Custom URI schemes may not start corresponding application
Custom URI schemes for application protocol handlers may not start the corresponding application for local intranet and trusted sites in Internet Explorer.

See details >
OS Build 17134.648

March 12, 2019
KB4489868
Resolved
KB4493437
April 25, 2019
02:00 PM PT
End-user-defined characters (EUDC) may cause blue screen at startup
If you enable per font end-user-defined characters (EUDC), the system may stop working and a blue screen may appear at startup.

See details >
OS Build 17134.677

March 19, 2019
KB4489894
Resolved
KB4493464
April 09, 2019
10:00 AM PT
First character of Japanese era name not recognized
The first character of the Japanese era name is not recognized as an abbreviation and may cause date parsing issues.

See details >
OS Build 17134.556

January 15, 2019
KB4480976
Resolved
KB4487029
April 09, 2019
10:00 AM PT
First character of the Japanese era name not recognized
The first character of the Japanese era name is not recognized as an abbreviation and may cause date parsing issues.

See details >
OS Build 17134.556

January 15, 2019
KB4480976
Resolved
KB4487029
April 09, 2019
10:00 AM PT
MSXML6 may cause applications to stop responding
MSXML6 may cause applications to stop responding if an exception was thrown during node operations, such as appendChild(), insertBefore(), and moveNode().

See details >
OS Build 17134.523

January 08, 2019
KB4480966
Resolved
KB4493464
April 09, 2019
10:00 AM PT
Stop error when attempting to start SSH from WSL
A stop error occurs when attempting to start Secure Shell from Windows Subsystem for Linux with agent forwarding using a command line switch (ssh –A) or a configuration setting.

See details >
OS Build 17134.648

March 12, 2019
KB4489868
Resolved
KB4493464
April 09, 2019
10:00 AM PT
Embedded objects may display incorrectly
Any compound document (OLE) server application that places embedded objects into the Windows Metafile (WMF) using the PatBlt API may display embedded objects incorrectly.

See details >
OS Build 17134.590

February 12, 2019
KB4487017
Resolved
KB4493464
April 09, 2019
10:00 AM PT
Unable to access hotspots with third-party applications
Third-party applications may have difficulty authenticating hotspots.

See details >
OS Build 17134.523

January 08, 2019
KB4480966
Resolved
KB4480976
January 15, 2019
10:00 AM PT
Blue or black screen with \"System thread exception not handled\" error
Some users may get a blue or black screen with the error code, “System thread exception not handled.”

See details >
OS Build 17134.441

November 27, 2018
KB4467682
Resolved
KB4471324
December 11, 2018
10:00 AM PT
Custom Start menu layouts display incorrectly
Custom Start menu layouts may display incorrectly.

See details >
OS Build 17134.441

November 27, 2018
KB4467682
Resolved
KB4471324
December 11, 2018
10:00 AM PT
Unable to use Seek bar in Windows Media Player
Users may not be able to use the Seek Bar in Windows Media Player when playing specific files.

See details >
OS Build 17134.345

October 09, 2018
KB4462919
Resolved
KB4471324
December 11, 2018
10:00 AM PT
Unable to use Seek bar in Windows Media Player
Users may not be able to use the Seek bar in Windows Media Player when playing specific files.

See details >
OS Build 17134.345

October 09, 2018
KB4462919
Resolved
KB4471324
December 11, 2018
10:00 AM PT
Users cannot set Win32 program defaults
Some users cannot set Win32 program defaults for certain app and file type combinations.

See details >
OS Build 17134.320

September 26, 2018
KB4458469
Resolved
KB4467682
November 27, 2018
10:00 AM PT
Developer Tools (F12) fail to start in Microsoft Edge
Developer Tools (F12) may fail to start in Microsoft Edge.

See details >
OS Build 17134.376

October 24, 2018
KB4462933
Resolved
KB4467702
November 13, 2018
10:00 AM PT
Guest VMs running Unicast NLB fail to respond after restart
All guest virtual machines running Unicast NLB fail to respond to NLB requests after the virtual machines restart.

See details >
OS Build 17134.285

September 11, 2018
KB4457128
Resolved
KB4458469
September 26, 2018
10:00 AM PT
- + diff --git a/windows/release-information/resolved-issues-windows-10-1809-and-windows-server-2019.yml b/windows/release-information/resolved-issues-windows-10-1809-and-windows-server-2019.yml index e39219c9ba..f53b7c2d35 100644 --- a/windows/release-information/resolved-issues-windows-10-1809-and-windows-server-2019.yml +++ b/windows/release-information/resolved-issues-windows-10-1809-and-windows-server-2019.yml @@ -114,8 +114,8 @@ sections: - type: markdown text: "
DetailsOriginating updateStatusHistory
First character of Japanese era name not recognized
After installing KB4480976, the first character of the Japanese era name is not recognized as an abbreviation and may cause date parsing issues.

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10, version 1607; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 10 Enterprise LTSB 2015; Windows 8.1; Windows 7 SP1
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2; Windows Server 2012; Windows Server 2008 R2 SP1; Windows Server 2008 SP2
Resolution: This issue is resolved in KB4487029

Back to top
OS Build 17134.556

January 15, 2019
KB4480976
Resolved
KB4487029
Resolved:
February 19, 2019
02:00 PM PT

Opened:
January 08, 2019
10:00 AM PT
First character of the Japanese era name not recognized
After installing KB4480976, the first character of the Japanese era name is not recognized as an abbreviation and may cause date parsing issues.

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10, version 1607; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 10 Enterprise LTSB 2015; Windows 8.1; Windows 7 SP1
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2; Windows Server 2012; Windows Server 2008 R2 SP1; Windows Server 2008 SP2
Resolution: This issue is resolved in KB4487029

Back to top
OS Build 17134.556

January 15, 2019
KB4480976
Resolved
KB4487029
Resolved:
February 19, 2019
02:00 PM PT

Opened:
January 08, 2019
10:00 AM PT
MSXML6 may cause applications to stop responding
After installing KB4480966, MSXML6 causes applications to stop responding if an exception was thrown during node operations, such as appendChild(), insertBefore(), and moveNode().

The Group Policy editor may stop responding when editing a Group Policy Object (GPO) that contains Group Policy Preferences (GPP) for Internet Explorer 10 settings.

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10, version 1607; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 10 Enterprise LTSB 2015; Windows 8.1
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2; Windows Server 2012
Resolution: This issue was resolved in KB4493464

Back to top
OS Build 17134.523

January 08, 2019
KB4480966
Resolved
KB4493464
Resolved:
April 09, 2019
10:00 AM PT

Opened:
January 08, 2019
10:00 AM PT
Applications using Microsoft Jet database and Access 95 file format stop working
Applications that use a Microsoft Jet database with the Microsoft Access 95 file format may randomly stop working. 

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10, version 1607; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 10 Enterprise LTSB 2015; Windows 7 SP1
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2; Windows Server 2012; Windows Server 2008 R2 SP1; Windows Server 2008 SP2
Resolution: This issue is resolved in KB4487017.

Back to top
OS Build 17134.523

January 08, 2019
KB4480966
Resolved
KB4487017
Resolved:
February 12, 2019
10:00 AM PT

Opened:
January 08, 2019
10:00 AM PT
Webpages become unresponsive in Microsoft Edge
After installing KB4480966, some Microsoft Edge users report that they: 
  • Cannot load webpages using a local IP address. 
  • Cannot load webpages on the Internet using a VPN connection.  
Browsing fails or the webpage may become unresponsive. 

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709
Resolution: This issue is resolved in KB4487017

Back to top
OS Build 17134.523

January 08, 2019
KB4480966
Resolved
KB4487017
Resolved:
February 12, 2019
10:00 AM PT

Opened:
January 08, 2019
10:00 AM PT
- - + + diff --git a/windows/release-information/resolved-issues-windows-7-and-windows-server-2008-r2-sp1.yml b/windows/release-information/resolved-issues-windows-7-and-windows-server-2008-r2-sp1.yml index 76c058d5a5..64dcb5d4ed 100644 --- a/windows/release-information/resolved-issues-windows-7-and-windows-server-2008-r2-sp1.yml +++ b/windows/release-information/resolved-issues-windows-7-and-windows-server-2008-r2-sp1.yml @@ -104,6 +104,6 @@ sections: text: "
DetailsOriginating updateStatusHistory
Shared albums may not sync with iCloud for Windows
Upgrade block: Users who attempt to install iCloud for Windows (version 7.7.0.27) will see a message displayed that this version iCloud for Windows isn't supported and the install will fail.

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019
  • Server: Windows Server, version 1809; Windows Server 2019
To ensure a seamless experience, Microsoft is blocking devices with iCloud for Windows (version 7.7.0.27) software installed from being offered Window 10, version 1809 until this issue has been resolved. 

We recommend that you do not attempt to manually update using the Update now button or the Media Creation Tool from the Microsoft software download website until this issue is resolved. 
 
Resolution: Apple has released an updated version of iCloud for Windows (version 7.8.1) that resolves compatibility issues encountered when updating or synching Shared Albums after updating to Windows 10, version 1809. We recommend that you update your iCloud for Windows to version 7.8.1 when prompted before attempting to upgrade to Windows 10, version 1809. You can also manually download the latest version of iCloud for Windows by visiting https://support.apple.com/en-us/HT204283.

Back to top
OS Build 17763.134

November 13, 2018
KB4467708
Resolved
KB4482887
Resolved:
March 01, 2019
10:00 AM PT

Opened:
November 13, 2018
10:00 AM PT
Intel Audio Display (intcdaud.sys) notification during Windows 10 Setup
Upgrade block: Microsoft and Intel have identified a compatibility issue with a range of Intel Display Audio device drivers (intcdaud.sys, versions 10.25.0.3 - 10.25.0.8) that may result in excessive processor demand and reduced battery life. As a result, the update process to the Windows 10 October 2018 Update (Windows 10, version 1809) will fail and affected devices will automatically revert to the previous working configuration. 

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019
  • Server: Windows Server, version 1809; Windows Server 2019
If you see a \"What needs your attention\" notification during installation of the October 2018 Update, you have one of these affected drivers on your system. On the notification, click Back to remain on your current version of Windows 10. 
 
To ensure a seamless experience, we are blocking devices from being offered the October 2018 Update until updated Intel device drivers are installed on your current operating system. We recommend that you do not attempt to manually update to Windows 10, version 1809, using the Update Now button or the Media Creation Tool from the Microsoft Software Download Center until newer Intel device drivers are available with the update. You can either wait for newer drivers to be installed automatically through Windows Update or check with your computer manufacturer for the latest device driver software availability and installation procedures. For more information about this issue, see Intel's customer support guidance.
 
Resolution: This issue was resolved in KB4482887 and the upgrade block removed. 

Back to top
OS Build 17763.134

November 13, 2018
KB4467708
Resolved
KB4482887
Resolved:
March 01, 2019
10:00 AM PT

Opened:
November 13, 2018
10:00 AM PT
Shared albums may not sync with iCloud for Windows
Upgrade block: Users who attempt to install iCloud for Windows (version 7.7.0.27) will see a message displayed that this version iCloud for Windows isn't supported and the install will fail.

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019
  • Server: Windows Server, version 1809; Windows Server 2019
To ensure a seamless experience, Microsoft is blocking devices with iCloud for Windows (version 7.7.0.27) software installed from being offered Window 10, version 1809 until this issue has been resolved. 

We recommend that you do not attempt to manually update using the Update now button or the Media Creation Tool from the Microsoft software download website until this issue is resolved. 
 
Resolution: Apple has released an updated version of iCloud for Windows (version 7.8.1) that resolves compatibility issues encountered when updating or synching Shared Albums after updating to Windows 10, version 1809. We recommend that you update your iCloud for Windows to version 7.8.1 when prompted before attempting to upgrade to Windows 10, version 1809. You can also manually download the latest version of iCloud for Windows by visiting https://support.apple.com/HT204283.

Back to top
OS Build 17763.134

November 13, 2018
KB4467708
Resolved
KB4482887
Resolved:
March 01, 2019
10:00 AM PT

Opened:
November 13, 2018
10:00 AM PT
Intel Audio Display (intcdaud.sys) notification during Windows 10 Setup
Upgrade block: Microsoft and Intel have identified a compatibility issue with a range of Intel Display Audio device drivers (intcdaud.sys, versions 10.25.0.3 - 10.25.0.8) that may result in excessive processor demand and reduced battery life. As a result, the update process to the Windows 10 October 2018 Update (Windows 10, version 1809) will fail and affected devices will automatically revert to the previous working configuration. 

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019
  • Server: Windows Server, version 1809; Windows Server 2019
If you see a \"What needs your attention\" notification during installation of the October 2018 Update, you have one of these affected drivers on your system. On the notification, click Back to remain on your current version of Windows 10. 
 
To ensure a seamless experience, we are blocking devices from being offered the October 2018 Update until updated Intel device drivers are installed on your current operating system. We recommend that you do not attempt to manually update to Windows 10, version 1809, using the Update Now button or the Media Creation Tool from the Microsoft Software Download Center until newer Intel device drivers are available with the update. You can either wait for newer drivers to be installed automatically through Windows Update or check with your computer manufacturer for the latest device driver software availability and installation procedures. For more information about this issue, see Intel's customer support guidance.
 
Resolution: This issue was resolved in KB4482887 and the upgrade block removed. 

Back to top
OS Build 17763.134

November 13, 2018
KB4467708
Resolved
KB4482887
Resolved:
March 01, 2019
10:00 AM PT

Opened:
November 13, 2018
10:00 AM PT
F5 VPN clients losing network connectivity
Upgrade block: After updating to Window 10, version 1809, F5 VPN clients may lose network connectivity when the VPN service is in a split tunnel configuration.

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019
  • Server: Windows Server, version 1809; Windows Server 2019
Resolution: This issue was resolved in KB4482887 and the upgrade block removed. 

Back to top
OS Build 17763.134

November 13, 2018
KB4467708
Resolved
KB4482887
Resolved:
March 01, 2019
10:00 AM PT

Opened:
November 13, 2018
10:00 AM PT
Issues with lock screen and Microsoft Edge tabs for certain AMD Radeon video cards
Note: AMD no longer supports Radeon HD2000 and HD4000 series graphic processor units (GPUs).
 
Upgrade block: After updating to Window 10, version 1809, Microsoft Edge tabs may stop working when a device is configured with AMD Radeon HD2000 or HD4000 series video cards. Customers may get the following error code: \"INVALID_POINTER_READ_c0000005_atidxx64.dll\". 
 
Some users may also experience performance issues with the lock screen or the ShellExperienceHost. (The lock screen hosts widgets, and the ShellExperienceHost is responsible for assorted shell functionality.) 

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019
  • Server: Windows Server, version 1809; Windows Server 2019
Resolution: This issue was resolved in KB4487044, and the block was removed.

Back to top
OS Build 17763.134

November 13, 2018
KB4467708
Resolved
KB4487044
Resolved:
February 12, 2019
10:00 AM PT

Opened:
November 13, 2018
10:00 AM PT
Trend Micro OfficeScan and Worry-Free Business Security AV software not compatible
Upgrade block: Microsoft and Trend Micro have identified a compatibility issue with Trend Micro's OfficeScan and Worry-Free Business Security software when attempting to update to Windows 10, version 1809.

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019
  • Server: Windows Server, version 1809; Windows Server 2019 
Resolution: Trend Micro has released a new version of these products that resolves the issue. To download them, please visit the Trend Micro Business Support Portal.

Once you have updated your version of Trend Micro's OfficeScan or Worry-Free Business Security software, you will be offered Windows 10, version 1809 automatically. 

Back to top
OS Build 17763.134

November 13, 2018
KB4467708
Resolved
Resolved:
February 01, 2019
09:00 AM PT

Opened:
November 13, 2018
10:00 AM PT
- +
DetailsOriginating updateStatusHistory
Event Viewer may not show some event descriptions for network interface cards
After installing KB4462927, the Event Viewer may not show some event descriptions for network interface cards (NICs).

Affected Platforms:
  • Client: Windows 7 SP1 
  • Server: Windows Server 2012; Windows Server 2008 R2 SP1
Resolution: This issue is resolved in KB4489878.

Back to top
October 18, 2018
KB4462927
Resolved
KB4489878
Resolved:
March 12, 2019
10:00 AM PT

Opened:
October 18, 2018
10:00 AM PT
Unable to use Seek bar in Windows Media Player
After installing KB4462923, users may not be able to use the Seek Bar in Windows Media Player when playing specific files. This issue does not affect normal playback.

Affected platforms: 
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10, version 1607; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 10 Enterprise LTSB 2015; Windows 8.1; Windows 7 SP1
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2; Windows Server 2012; Windows Server 2008 R2 SP1; Windows Server 2008 SP2
Resolution: This issue is resolved in KB4471318.

Back to top
October 09, 2018
KB4462923
Resolved
KB4471318
Resolved:
December 11, 2018
10:00 AM PT

Opened:
October 09, 2018
10:00 AM PT
Unable to use Seek bar in Windows Media Player
After installing KB4462923, users may not be able to use the Seek bar in Windows Media Player when playing specific files. This issue does not affect normal playback.

Affected platforms: 
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10, version 1607; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 10 Enterprise LTSB 2015; Windows 8.1; Windows 7 SP1
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2; Windows Server 2012; Windows Server 2008 R2 SP1; Windows Server 2008 SP2
Resolution: This issue is resolved in KB4471318.

Back to top
October 09, 2018
KB4462923
Resolved
KB4471318
Resolved:
December 11, 2018
10:00 AM PT

Opened:
October 09, 2018
10:00 AM PT
" diff --git a/windows/release-information/resolved-issues-windows-8.1-and-windows-server-2012-r2.yml b/windows/release-information/resolved-issues-windows-8.1-and-windows-server-2012-r2.yml index 9e949ff535..da694ca9c8 100644 --- a/windows/release-information/resolved-issues-windows-8.1-and-windows-server-2012-r2.yml +++ b/windows/release-information/resolved-issues-windows-8.1-and-windows-server-2012-r2.yml @@ -79,7 +79,7 @@ sections: - type: markdown text: " - +
DetailsOriginating updateStatusHistory
Embedded objects may display incorrectly
Any compound document (OLE) server application that places embedded objects into the Windows Metafile (WMF) using the PatBlt API may display embedded objects incorrectly.

For example, if you paste a Microsoft Excel worksheet object into a Microsoft Word document, the cells may render with a different background color.

Affected platforms: 
  • Client: Windows 8.1 
  • Server: Windows Server 2012 R2; Windows Server 2012; Windows Server 2008 SP2
Resolution: This issue is resolved in KB4493446.

Back to top
February 12, 2019
KB4487000
Resolved
KB4493446
Resolved:
April 09, 2019
10:00 AM PT

Opened:
February 12, 2019
10:00 AM PT
Embedded objects may display incorrectly
Any compound document (OLE) server application that places embedded objects into the Windows Metafile (WMF) using the PatBlt API may display embedded objects incorrectly.

For example, if you paste a Microsoft Excel worksheet object into a Microsoft Word document, the cells may render with a different background color.

Affected platforms 
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10, version 1607; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 10 Enterprise LTSB 2015; Windows 8.1; Windows 7 SP1 
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2; Windows Server 2012; Windows Server 2008 R2 SP1; Windows Server 2008 SP2 
Resolution: This issue is resolved in KB4493446.

Back to top
February 12, 2019
KB4487000
Resolved
KB4493446
Resolved:
April 09, 2019
10:00 AM PT

Opened:
February 12, 2019
10:00 AM PT
Error 1309 when installing/uninstalling MSI or MSP files
After installing KB4487016, users may receive “Error 1309” while installing or uninstalling certain types of MSI and MSP files.

Affected platforms: 
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10, version 1607; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 10 Enterprise LTSB 2015; Windows 8.1 
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2; Windows Server 2012 
Resolution: This issue is resolved in KB4489881.

Back to top
February 19, 2019
KB4487016
Resolved
KB4489881
Resolved:
March 12, 2019
10:00 AM PT

Opened:
February 19, 2019
02:00 PM PT
Internet Explorer may fail to load images
After installing KB4487000, Internet Explorer may fail to load images with a backslash (\\) in their relative source path.

Affected platforms: 
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10, version 1607; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 10 Enterprise LTSB 2015; Windows 8.1; Windows 7 SP1 
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2; Windows Server 2008 R2 SP1 
Resolution: This issue is resolved in KB4487016.

Back to top
February 12, 2019
KB4487000
Resolved
KB4487016
Resolved:
February 19, 2019
02:00 PM PT

Opened:
February 12, 2019
10:00 AM PT
@@ -104,6 +104,6 @@ sections: - type: markdown text: " - +
DetailsOriginating updateStatusHistory
Unable to use Seek bar in Windows Media Player
After installing KB4462926, users may not be able to use the Seek Bar in Windows Media Player when playing specific files. This issue does not affect normal playback.

Affected platforms: 
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10, version 1607; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 10 Enterprise LTSB 2015; Windows 8.1; Windows 7 SP1 
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2; Windows Server 2012; Windows Server 2008 R2 SP1; Windows Server 2008 SP2
Resolution: This issue is resolved in KB4471320.

Back to top
October 09, 2018
KB4462926
Resolved
KB4471320
Resolved:
December 11, 2018
10:00 AM PT

Opened:
October 09, 2018
10:00 AM PT
Unable to use Seek bar in Windows Media Player
After installing KB4462926, users may not be able to use the Seek bar in Windows Media Player when playing specific files. This issue does not affect normal playback.

Affected platforms: 
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10, version 1607; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 10 Enterprise LTSB 2015; Windows 8.1; Windows 7 SP1 
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2; Windows Server 2012; Windows Server 2008 R2 SP1; Windows Server 2008 SP2
Resolution: This issue is resolved in KB4471320.

Back to top
October 09, 2018
KB4462926
Resolved
KB4471320
Resolved:
December 11, 2018
10:00 AM PT

Opened:
October 09, 2018
10:00 AM PT
" diff --git a/windows/release-information/resolved-issues-windows-server-2008-sp2.yml b/windows/release-information/resolved-issues-windows-server-2008-sp2.yml index 8a96794380..88e32ae7c4 100644 --- a/windows/release-information/resolved-issues-windows-server-2008-sp2.yml +++ b/windows/release-information/resolved-issues-windows-server-2008-sp2.yml @@ -64,7 +64,7 @@ sections: - type: markdown text: " - +
DetailsOriginating updateStatusHistory
Embedded objects may display incorrectly
Any compound document (OLE) server application that places embedded objects into the Windows Metafile (WMF) using the PatBlt API may display embedded objects incorrectly.

For example, if you paste a Microsoft Excel worksheet object into a Microsoft Word document, the cells may render with a different background color.

Affected platforms: 
  • Client: Windows 8.1 
  • Server: Windows Server 2012 R2; Windows Server 2012; Windows Server 2008 SP2
Resolution: This issue is resolved in KB4493471.

Back to top
February 12, 2019
KB4487023
Resolved
KB4493471
Resolved:
April 09, 2019
10:00 AM PT

Opened:
February 12, 2019
10:00 AM PT
Embedded objects may display incorrectly
Any compound document (OLE) server application that places embedded objects into the Windows Metafile (WMF) using the PatBlt API may display embedded objects incorrectly.

For example, if you paste a Microsoft Excel worksheet object into a Microsoft Word document, the cells may render with a different background color.

Affected platforms 
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10, version 1607; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 10 Enterprise LTSB 2015; Windows 8.1; Windows 7 SP1 
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2; Windows Server 2012; Windows Server 2008 R2 SP1; Windows Server 2008 SP2
Resolution: This issue is resolved in KB4493471.

Back to top
February 12, 2019
KB4487023
Resolved
KB4493471
Resolved:
April 09, 2019
10:00 AM PT

Opened:
February 12, 2019
10:00 AM PT
Applications using Microsoft Jet database and Access 95 file format stop working
Applications that use a Microsoft Jet database with the Microsoft Access 95 file format may randomly stop working.

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10, version 1607; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 10 Enterprise LTSB 2015; Windows 7 SP1
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012; Windows Server 2008 R2 SP1; Windows Server 2008 SP2
Resolution: This issue is resolved in KB4487022.

Back to top
February 12, 2019
KB4487023
Resolved
KB4487022
Resolved:
February 19, 2019
02:00 PM PT

Opened:
February 12, 2019
10:00 AM PT
" @@ -86,6 +86,6 @@ sections: - type: markdown text: " - +
DetailsOriginating updateStatusHistory
Unable to use Seek bar in Windows Media Player
After installing KB4463097, users may not be able to use the Seek Bar in Windows Media Player when playing specific files. This issue does not affect normal playback.

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10, version 1607; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 10 Enterprise LTSB 2015; Windows 8.1; Windows 7 SP1
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2; Windows Server 2012; Windows Server 2008 R2 SP1; Windows Server 2008 SP2
Resolution: This issue is resolved in KB4471325.

Back to top
October 09, 2018
KB4463097
Resolved
KB4471325
Resolved:
December 11, 2018
10:00 AM PT

Opened:
October 09, 2018
10:00 AM PT
Unable to use Seek bar in Windows Media Player
After installing KB4463097, users may not be able to use the Seek bar in Windows Media Player when playing specific files. This issue does not affect normal playback.

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10, version 1607; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 10 Enterprise LTSB 2015; Windows 8.1; Windows 7 SP1
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2; Windows Server 2012; Windows Server 2008 R2 SP1; Windows Server 2008 SP2
Resolution: This issue is resolved in KB4471325.

Back to top
October 09, 2018
KB4463097
Resolved
KB4471325
Resolved:
December 11, 2018
10:00 AM PT

Opened:
October 09, 2018
10:00 AM PT
" diff --git a/windows/release-information/resolved-issues-windows-server-2012.yml b/windows/release-information/resolved-issues-windows-server-2012.yml index e4331cc2db..acc7d1ba20 100644 --- a/windows/release-information/resolved-issues-windows-server-2012.yml +++ b/windows/release-information/resolved-issues-windows-server-2012.yml @@ -58,7 +58,7 @@ sections: - type: markdown text: " - +
DetailsOriginating updateStatusHistory
Embedded objects may display incorrectly
Any compound document (OLE) server application that places embedded objects into the Windows Metafile (WMF) using the PatBlt API may display embedded objects incorrectly.

For example, if you paste a Microsoft Excel worksheet object into a Microsoft Word document, the cells may render with a different background color.

Affected platforms: 
  • Client:  Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 8.1 
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server 2012 R2; Windows Server 2012; Windows Server 2008 SP2
Resolution: This issue is resolved in KB4493451.

Back to top
February 12, 2019
KB4487025
Resolved
KB4493451
Resolved:
April 09, 2019
10:00 AM PT

Opened:
February 12, 2019
10:00 AM PT
Embedded objects may display incorrectly
Any compound document (OLE) server application that places embedded objects into the Windows Metafile (WMF) using the PatBlt API may display embedded objects incorrectly.

For example, if you paste a Microsoft Excel worksheet object into a Microsoft Word document, the cells may render with a different background color.

Affected platforms 
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10, version 1607; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 10 Enterprise LTSB 2015; Windows 8.1; Windows 7 SP1 
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2; Windows Server 2012; Windows Server 2008 R2 SP1; Windows Server 2008 SP2 
Resolution: This issue is resolved in KB4493451.

Back to top
February 12, 2019
KB4487025
Resolved
KB4493451
Resolved:
April 09, 2019
10:00 AM PT

Opened:
February 12, 2019
10:00 AM PT
Error 1309 when installing/uninstalling MSI or MSP files
After installing KB4487025, users may receive \"Error 1309\" while installing or uninstalling certain types of MSI and MSP files.

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10, version 1607; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 10 Enterprise LTSB 2015; Windows 8.1
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2; Windows Server 2012
Resolution: This issue is resolved in KB4489891.

Back to top
February 12, 2019
KB4487025
Resolved
KB4489891
Resolved:
March 12, 2019
10:00 AM PT

Opened:
February 12, 2019
10:00 AM PT
Applications using Microsoft Jet database and Access 95 file format stop working
Applications that use a Microsoft Jet database with the Microsoft Access 95 file format may randomly stop working.

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10, version 1607; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 10 Enterprise LTSB 2015; Windows 7 SP1
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012; Windows Server 2008 R2 SP1; Windows Server 2008 SP2
Resolution: This issue is resolved in KB4487024.

Back to top
February 12, 2019
KB4487025
Resolved
KB4487024
Resolved:
February 19, 2019
02:00 PM PT

Opened:
February 12, 2019
10:00 AM PT
@@ -83,7 +83,7 @@ sections: - type: markdown text: " - +
DetailsOriginating updateStatusHistory
Unable to use Seek bar in Windows Media Player
After installing KB4462929, users may not be able to use the Seek Bar in Windows Media Player when playing specific files. This issue does not affect normal playback.

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10, version 1607; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 10 Enterprise LTSB 2015; Windows 8.1; Windows 7 SP1
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2; Windows Server 2012; Windows Server 2008 R2 SP1; Windows Server 2008 SP2
Resolution: This issue is resolved in KB4471330.

Back to top
October 09, 2018
KB4462929
Resolved
KB4471330
Resolved:
December 11, 2018
10:00 AM PT

Opened:
October 09, 2018
10:00 AM PT
Unable to use Seek bar in Windows Media Player
After installing KB4462929, users may not be able to use the Seek bar in Windows Media Player when playing specific files. This issue does not affect normal playback.

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10, version 1607; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 10 Enterprise LTSB 2015; Windows 8.1; Windows 7 SP1
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2; Windows Server 2012; Windows Server 2008 R2 SP1; Windows Server 2008 SP2
Resolution: This issue is resolved in KB4471330.

Back to top
October 09, 2018
KB4462929
Resolved
KB4471330
Resolved:
December 11, 2018
10:00 AM PT

Opened:
October 09, 2018
10:00 AM PT
" diff --git a/windows/release-information/status-windows-10-1507.yml b/windows/release-information/status-windows-10-1507.yml index 5c8ad190ae..cd92781eb2 100644 --- a/windows/release-information/status-windows-10-1507.yml +++ b/windows/release-information/status-windows-10-1507.yml @@ -60,7 +60,7 @@ sections: - type: markdown text: "
This table offers a summary of current active issues and those issues that have been resolved in the last 30 days.

- + @@ -79,7 +79,6 @@ sections: - type: markdown text: "
SummaryOriginating updateStatusLast updated
Certain operations performed on a Cluster Shared Volume may fail
Certain operations, such as rename, performed on files or folders on a Cluster Shared Volume (CSV) may fail with the error, \"STATUS_BAD_IMPERSONATION_LEVEL (0xC00000A5)\".

See details >
OS Build 10240.18186

April 09, 2019
KB4493475
Mitigated
April 25, 2019
02:00 PM PT
Certain operations performed on a Cluster Shared Volume may fail
Certain operations, such as rename, performed on files or folders on a Cluster Shared Volume (CSV) may fail with the error, \"STATUS_BAD_IMPERSONATION_LEVEL (0xC00000A5)\".

See details >
OS Build 10240.18094

January 08, 2019
KB4480962
Mitigated
January 08, 2019
10:00 AM PT
Embedded objects may display incorrectly
Any compound document (OLE) server application that places embedded objects into the Windows Metafile (WMF) using the PatBlt API may display embedded objects incorrectly.

See details >
OS Build 10240.18132

February 12, 2019
KB4487018
Resolved
KB4493475
April 29, 2019
12:45 AM PT
MSXML6 may cause applications to stop responding
MSXML6 may cause applications to stop responding if an exception was thrown during node operations, such as appendChild(), insertBefore(), and moveNode().

See details >
OS Build 10240.18094

January 08, 2019
KB4480962
Resolved
KB4493475
April 09, 2019
10:00 AM PT
Custom URI schemes may not start corresponding application
Custom URI schemes for application protocol handlers may not start the corresponding application for local intranet and trusted sites in Internet Explorer.

See details >
OS Build 10240.18158

March 12, 2019
KB4489872
Resolved
KB4493475
April 09, 2019
10:00 AM PT
-
DetailsOriginating updateStatusHistory
Certain operations performed on a Cluster Shared Volume may fail
Certain operations, such as rename, that you perform on files or folders that are on a Cluster Shared Volume (CSV) may fail with the error, \"STATUS_BAD_IMPERSONATION_LEVEL (0xC00000A5)\". This occurs when you perform the operation on a CSV owner node from a process that doesn’t have administrator privilege.

Affected platforms: 
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10, version 1607; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 10 Enterprise LTSB 2015; Windows 8.1
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2; Windows Server 2012
Workaround: Do one of the following: 
  • Perform the operation from a process that has administrator privilege. 
  • Perform the operation from a node that doesn’t have CSV ownership. 
Next steps: Microsoft is working on a resolution and will provide an update in an upcoming release.

Back to top
OS Build 10240.18186

April 09, 2019
KB4493475
Mitigated
Last updated:
April 25, 2019
02:00 PM PT

Opened:
April 09, 2019
10:00 AM PT
Embedded objects may display incorrectly
Any compound document (OLE) server application that places embedded objects into the Windows Metafile (WMF) using the PatBlt API may display embedded objects incorrectly. 
 
For example, if you paste a Microsoft Excel worksheet object into a Microsoft Word document, the cells may render with a different background color. 
 
Affected platforms:  
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10, version 1607; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 10 Enterprise LTSB 2015; Windows 8.1; Windows 7 SP1 
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2; Windows Server 2012; Windows Server 2008 R2 SP1; Windows Server 2008 SP2 
Resolution: This issue is resolved in KB4493475

Back to top
OS Build 10240.18132

February 12, 2019
KB4487018
Resolved
KB4493475
Resolved:
April 09, 2019
10:00 AM PT

Opened:
April 29, 2019
12:45 AM PT
" @@ -98,6 +97,7 @@ sections: - type: markdown text: " +
DetailsOriginating updateStatusHistory
Certain operations performed on a Cluster Shared Volume may fail
Certain operations, such as rename, that you perform on files or folders that are on a Cluster Shared Volume (CSV) may fail with the error, \"STATUS_BAD_IMPERSONATION_LEVEL (0xC00000A5)\". This occurs when you perform the operation on a CSV owner node from a process that doesn’t have administrator privilege.

Affected platforms: 
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10, version 1607; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 10 Enterprise LTSB 2015; Windows 8.1
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2; Windows Server 2012
Workaround: Do one of the following: 
  • Perform the operation from a process that has administrator privilege. 
  • Perform the operation from a node that doesn’t have CSV ownership. 
Next steps: Microsoft is working on a resolution and will provide an update in an upcoming release.

Back to top
OS Build 10240.18094

January 08, 2019
KB4480962
Mitigated
Last updated:
January 08, 2019
10:00 AM PT

Opened:
January 08, 2019
10:00 AM PT
MSXML6 may cause applications to stop responding
After installing KB4480962, MSXML6 causes applications to stop responding if an exception was thrown during node operations, such as appendChild(), insertBefore(), and moveNode().

The Group Policy editor may stop responding when editing a Group Policy Object (GPO) that contains Group Policy Preferences (GPP) for Internet Explorer 10 settings.

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10, version 1607; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 10 Enterprise LTSB 2015; Windows 8.1
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2; Windows Server 2012
Resolution: This issue was resolved in KB4493475.

Back to top
OS Build 10240.18094

January 08, 2019
KB4480962
Resolved
KB4493475
Resolved:
April 09, 2019
10:00 AM PT

Opened:
January 08, 2019
10:00 AM PT
" diff --git a/windows/release-information/status-windows-10-1607-and-windows-server-2016.yml b/windows/release-information/status-windows-10-1607-and-windows-server-2016.yml index 9bb03c6bbc..81bcba1cf5 100644 --- a/windows/release-information/status-windows-10-1607-and-windows-server-2016.yml +++ b/windows/release-information/status-windows-10-1607-and-windows-server-2016.yml @@ -64,8 +64,8 @@ sections:
Cluster service may fail if the minimum password length is set to greater than 14
The cluster service may fail to start with the error “2245 (NERR_PasswordTooShort)” if the Group Policy “Minimum Password Length” is configured with greater than 14 characters.

See details >OS Build 14393.2639

November 27, 2018
KB4467684Mitigated
April 25, 2019
02:00 PM PT
Issue using PXE to start a device from WDS
There may be issues using the Preboot Execution Environment (PXE) to start a device from a Windows Deployment Services (WDS) server configured to use Variable Window Extension.

See details >OS Build 14393.2848

March 12, 2019
KB4489882Mitigated
April 25, 2019
02:00 PM PT
SCVMM cannot enumerate and manage logical switches deployed on the host
For hosts managed by System Center Virtual Machine Manager (VMM), VMM cannot enumerate and manage logical switches deployed on the host.

See details >OS Build 14393.2639

November 27, 2018
KB4467684Mitigated
April 25, 2019
02:00 PM PT -
Certain operations performed on a Cluster Shared Volume may fail
Certain operations, such as rename, performed on files or folders on a Cluster Shared Volume (CSV) may fail with the error, \"STATUS_BAD_IMPERSONATION_LEVEL (0xC00000A5)\".

See details >OS Build 14393.2906

April 09, 2019
KB4493470Mitigated
April 25, 2019
02:00 PM PT
Windows may not start on certain Lenovo and Fujitsu laptops with less than 8GB of RAM
Windows may fail to start on certain Lenovo and Fujitsu laptops that have less than 8 GB of RAM.

See details >OS Build 14393.2608

November 13, 2018
KB4467691Mitigated
February 19, 2019
10:00 AM PT +
Certain operations performed on a Cluster Shared Volume may fail
Certain operations, such as rename, performed on files or folders on a Cluster Shared Volume (CSV) may fail with the error, \"STATUS_BAD_IMPERSONATION_LEVEL (0xC00000A5)\".

See details >OS Build 14393.2724

January 08, 2019
KB4480961Mitigated
January 08, 2019
10:00 AM PT
Embedded objects may display incorrectly
Any compound document (OLE) server application that places embedded objects into the Windows Metafile (WMF) using the PatBlt API may display embedded objects incorrectly.

See details >OS Build 14393.2791

February 12, 2019
KB4487026Resolved
KB4493470April 29, 2019
12:43 AM PT
Custom URI schemes may not start corresponding application
Custom URI schemes for application protocol handlers may not start the corresponding application for local intranet and trusted sites in Internet Explorer.

See details >OS Build 14393.2848

March 12, 2019
KB4489882Resolved
KB4493473April 25, 2019
02:00 PM PT
End-user-defined characters (EUDC) may cause blue screen at startup
If you enable per font end-user-defined characters (EUDC), the system will stop working and a blue screen may appear at startup.

See details >OS Build 14393.2879

March 19, 2019
KB4489889Resolved
KB4493470April 09, 2019
10:00 AM PT @@ -87,7 +87,6 @@ sections: text: " -
DetailsOriginating updateStatusHistory
Zone transfers over TCP may fail
Zone transfers between primary and secondary DNS servers over the Transmission Control Protocol (TCP) may fail after installing KB4493473
 
Affected platforms:  
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1607; Windows 10 Enterprise LTSC 2016 
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016 
Next steps: Microsoft is working on a resolution and will provide an update in an upcoming release. 

Back to top
OS Build 14393.2941

April 25, 2019
KB4493473
Investigating
Last updated:
April 25, 2019
02:00 PM PT

Opened:
April 25, 2019
02:00 PM PT
Certain operations performed on a Cluster Shared Volume may fail
Certain operations, such as rename, that you perform on files or folders that are on a Cluster Shared Volume (CSV) may fail with the error, \"STATUS_BAD_IMPERSONATION_LEVEL (0xC00000A5)\". This occurs when you perform the operation on a CSV owner node from a process that doesn’t have administrator privilege. 

Affected platforms: 
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10, version 1607; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507;  Windows 10 Enterprise LTSB 2015; Windows 8.1
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2; Windows Server 2012
Workaround: Do one of the following:
  • Perform the operation from a process that has administrator privilege. 
  • Perform the operation from a node that doesn’t have CSV ownership.
Next steps: Microsoft is working on a resolution and will provide an update in an upcoming release.

Back to top
OS Build 14393.2906

April 09, 2019
KB4493470
Mitigated
Last updated:
April 25, 2019
02:00 PM PT

Opened:
April 09, 2019
10:00 AM PT
Embedded objects may display incorrectly
Any compound document (OLE) server application that places embedded objects into the Windows Metafile (WMF) using the PatBlt API may display embedded objects incorrectly. 
 
For example, if you paste a Microsoft Excel worksheet object into a Microsoft Word document, the cells may render with a different background color. 
 
Affected platforms:  
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10, version 1607; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 10 Enterprise LTSB 2015; Windows 8.1; Windows 7 SP1 
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2; Windows Server 2012; Windows Server 2008 R2 SP1; Windows Server 2008 SP2 
Resolution: This issue is resolved in KB4493470

Back to top
OS Build 14393.2791

February 12, 2019
KB4487026
Resolved
KB4493470
Resolved:
April 09, 2019
10:00 AM PT

Opened:
April 29, 2019
12:43 AM PT
" @@ -109,6 +108,7 @@ sections: - type: markdown text: " +
DetailsOriginating updateStatusHistory
Certain operations performed on a Cluster Shared Volume may fail
Certain operations, such as rename, that you perform on files or folders that are on a Cluster Shared Volume (CSV) may fail with the error, \"STATUS_BAD_IMPERSONATION_LEVEL (0xC00000A5)\". This occurs when you perform the operation on a CSV owner node from a process that doesn’t have administrator privilege. 

Affected platforms: 
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10, version 1607; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507;  Windows 10 Enterprise LTSB 2015; Windows 8.1
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2; Windows Server 2012
Workaround: Do one of the following:
  • Perform the operation from a process that has administrator privilege. 
  • Perform the operation from a node that doesn’t have CSV ownership.
Next steps: Microsoft is working on a resolution and will provide an update in an upcoming release.

Back to top
OS Build 14393.2724

January 08, 2019
KB4480961
Mitigated
Last updated:
January 08, 2019
10:00 AM PT

Opened:
January 08, 2019
10:00 AM PT
Internet Explorer 11 authentication issue with multiple concurrent logons
After installing KB4480961, Internet Explorer 11 and other applications that use WININET.DLL may have authentication issues. This occurs when two or more people use the same user account for multiple, concurrent login sessions on the same Windows Server machine, including Remote Desktop Protocol (RDP) and Terminal Server logons. Symptoms reported by customers include, but may not be limited to:
  • Cache size and location show zero or empty.
  • Keyboard shortcuts may not work properly.
  • Webpages may intermittently fail to load or render correctly.
  • Issues with credential prompts.
  • Issues when downloading files.
Affected platforms: 
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1607; Windows 10 Enterprise LTSC 2016; Windows 8.1; Windows 7 SP1
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server 2016; Windows Server 2012 R2; Windows Server 2012; Windows Server 2008 R2 SP1
Resolution: This issue was resolved in KB4493470.

Back to top
OS Build 14393.2724

January 08, 2019
KB4480961
Resolved
KB4493470
Resolved:
April 09, 2019
10:00 AM PT

Opened:
January 08, 2019
10:00 AM PT
MSXML6 may cause applications to stop responding
After installing KB4480961, MSXML6 causes applications to stop responding if an exception was thrown during node operations, such as appendChild(), insertBefore(), and moveNode().

The Group Policy editor may stop responding when editing a Group Policy Object (GPO) that contains Group Policy Preferences (GPP) for Internet Explorer 10 settings.

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10, version 1607; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 10 Enterprise LTSB 2015; Windows 8.1
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2; Windows Server 2012
Resolution: This issue was resolved in KB4493470.

Back to top
OS Build 14393.2724

January 08, 2019
KB4480961
Resolved
KB4493470
Resolved:
April 09, 2019
10:00 AM PT

Opened:
January 08, 2019
10:00 AM PT
diff --git a/windows/release-information/status-windows-10-1703.yml b/windows/release-information/status-windows-10-1703.yml index c80bc6109b..4d6ac25a66 100644 --- a/windows/release-information/status-windows-10-1703.yml +++ b/windows/release-information/status-windows-10-1703.yml @@ -60,7 +60,7 @@ sections: - type: markdown text: "
This table offers a summary of current active issues and those issues that have been resolved in the last 30 days.

- + @@ -75,15 +75,6 @@ sections:
" -- title: April 2019 -- items: - - type: markdown - text: " -
SummaryOriginating updateStatusLast updated
Certain operations performed on a Cluster Shared Volume may fail
Certain operations, such as rename, performed on files or folders on a Cluster Shared Volume (CSV) may fail with the error, \"STATUS_BAD_IMPERSONATION_LEVEL (0xC00000A5)\".

See details >
OS Build 15063.1746

April 09, 2019
KB4493474
Mitigated
April 25, 2019
02:00 PM PT
Certain operations performed on a Cluster Shared Volume may fail
Certain operations, such as rename, performed on files or folders on a Cluster Shared Volume (CSV) may fail with the error, \"STATUS_BAD_IMPERSONATION_LEVEL (0xC00000A5)\".

See details >
OS Build 15063.1563

January 08, 2019
KB4480973
Mitigated
January 08, 2019
10:00 AM PT
Custom URI schemes may not start corresponding application
Custom URI schemes for application protocol handlers may not start the corresponding application for local intranet and trusted sites in Internet Explorer.

See details >
OS Build 15063.1689

March 12, 2019
KB4489871
Resolved
KB4493436
April 25, 2019
02:00 PM PT
End-user-defined characters (EUDC) may cause blue screen at startup
If you enable per font end-user-defined characters (EUDC), the system may stop working and a blue screen may appear at startup.

See details >
OS Build 15063.1716

March 19, 2019
KB4489888
Resolved
KB4493474
April 09, 2019
10:00 AM PT
MSXML6 may cause applications to stop responding
MSXML6 may cause applications to stop responding if an exception was thrown during node operations, such as appendChild(), insertBefore(), and moveNode().

See details >
OS Build 15063.1563

January 08, 2019
KB4480973
Resolved
KB4493474
April 09, 2019
10:00 AM PT
- -
DetailsOriginating updateStatusHistory
Certain operations performed on a Cluster Shared Volume may fail
Certain operations, such as rename, that you perform on files or folders that are on a Cluster Shared Volume (CSV) may fail with the error, “STATUS_BAD_IMPERSONATION_LEVEL (0xC00000A5)”. This occurs when you perform the operation on a CSV owner node from a process that doesn’t have administrator privilege. 

Affected platforms: 
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10, version 1607; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 10 Enterprise LTSB 2015; Windows 8.1
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2; Windows Server 2012
Workaround: Do one of the following: 
  • Perform the operation from a process that has administrator privilege. 
  • Perform the operation from a node that doesn’t have CSV ownership. 
Next steps: Microsoft is working on a resolution and will provide an update in an upcoming release.

Back to top
OS Build 15063.1746

April 09, 2019
KB4493474
Mitigated
Last updated:
April 25, 2019
02:00 PM PT

Opened:
April 09, 2019
10:00 AM PT
- " - - title: March 2019 - items: - type: markdown @@ -108,6 +99,7 @@ sections: - type: markdown text: " +
DetailsOriginating updateStatusHistory
Certain operations performed on a Cluster Shared Volume may fail
Certain operations, such as rename, that you perform on files or folders that are on a Cluster Shared Volume (CSV) may fail with the error, “STATUS_BAD_IMPERSONATION_LEVEL (0xC00000A5)”. This occurs when you perform the operation on a CSV owner node from a process that doesn’t have administrator privilege. 

Affected platforms: 
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10, version 1607; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 10 Enterprise LTSB 2015; Windows 8.1
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2; Windows Server 2012
Workaround: Do one of the following: 
  • Perform the operation from a process that has administrator privilege. 
  • Perform the operation from a node that doesn’t have CSV ownership. 
Next steps: Microsoft is working on a resolution and will provide an update in an upcoming release.

Back to top
OS Build 15063.1563

January 08, 2019
KB4480973
Mitigated
Last updated:
January 08, 2019
10:00 AM PT

Opened:
January 08, 2019
10:00 AM PT
MSXML6 may cause applications to stop responding
After installing KB4480973, MSXML6 causes applications to stop responding if an exception was thrown during node operations, such as appendChild(), insertBefore(), and moveNode().

The Group Policy editor may stop responding when editing a Group Policy Object (GPO) that contains Group Policy Preferences (GPP) for Internet Explorer 10 settings.

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10, version 1607; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 10 Enterprise LTSB 2015; Windows 8.1
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2
Resolution: This issue was resolved in KB4493474.

Back to top
OS Build 15063.1563

January 08, 2019
KB4480973
Resolved
KB4493474
Resolved:
April 09, 2019
10:00 AM PT

Opened:
January 08, 2019
10:00 AM PT
" diff --git a/windows/release-information/status-windows-10-1709.yml b/windows/release-information/status-windows-10-1709.yml index 6639482a7c..8f7a6f1ec8 100644 --- a/windows/release-information/status-windows-10-1709.yml +++ b/windows/release-information/status-windows-10-1709.yml @@ -61,7 +61,7 @@ sections: text: "
This table offers a summary of current active issues and those issues that have been resolved in the last 30 days.

- + @@ -83,7 +83,6 @@ sections: text: "
SummaryOriginating updateStatusLast updated
Zone transfers over TCP may fail
Zone transfers between primary and secondary DNS servers over the Transmission Control Protocol (TCP) may fail.

See details >
OS Build 16299.1127

April 25, 2019
KB4493440
Investigating
April 25, 2019
02:00 PM PT
Certain operations performed on a Cluster Shared Volume may fail
Certain operations, such as rename, performed on files or folders on a Cluster Shared Volume (CSV) may fail with the error, \"STATUS_BAD_IMPERSONATION_LEVEL (0xC00000A5)\".

See details >
OS Build 16299.1087

April 09, 2019
KB4493441
Mitigated
April 25, 2019
02:00 PM PT
Certain operations performed on a Cluster Shared Volume may fail
Certain operations, such as rename, performed on files or folders on a Cluster Shared Volume (CSV) may fail with the error, \"STATUS_BAD_IMPERSONATION_LEVEL (0xC00000A5)\".

See details >
OS Build 16299.904

January 08, 2019
KB4480978
Mitigated
January 08, 2019
10:00 AM PT
Custom URI schemes may not start corresponding application
Custom URI schemes for application protocol handlers may not start the corresponding application for local intranet and trusted sites in Internet Explorer.

See details >
OS Build 16299.1029

March 12, 2019
KB4489886
Resolved
KB4493440
April 25, 2019
02:00 PM PT
End-user-defined characters (EUDC) may cause blue screen at startup
If you enable per font end-user-defined characters (EUDC), the system may stop working and a blue screen may appear at startup.

See details >
OS Build 16299.1059

March 19, 2019
KB4489890
Resolved
KB4493441
April 09, 2019
10:00 AM PT
MSXML6 causes applications to stop responding if an exception was thrown
MSXML6 causes applications to stop responding if an exception was thrown during node operations, such as appendChild(), insertBefore(), and moveNode().

See details >
OS Build 16299.904

January 08, 2019
KB4480978
Resolved
KB4493441
April 09, 2019
10:00 AM PT
-
DetailsOriginating updateStatusHistory
Zone transfers over TCP may fail
Zone transfers between primary and secondary DNS servers over the Transmission Control Protocol (TCP) may fail after installing KB4493440
 
Affected platforms:  
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1607; Windows 10 Enterprise LTSC 2016 
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016 
Next steps: Microsoft is working on a resolution and will provide an update in an upcoming release. 

Back to top
OS Build 16299.1127

April 25, 2019
KB4493440
Investigating
Last updated:
April 25, 2019
02:00 PM PT

Opened:
April 25, 2019
02:00 PM PT
Certain operations performed on a Cluster Shared Volume may fail
Certain operations, such as rename, that you perform on files or folders that are on a Cluster Shared Volume (CSV) may fail with the error, \"STATUS_BAD_IMPERSONATION_LEVEL (0xC00000A5)\". This occurs when you perform the operation on a CSV owner node from a process that doesn’t have administrator privilege. 

Affected platforms: 
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10, version 1607; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 10 Enterprise LTSB 2015; Windows 8.1
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2; Windows Server 2012
Workaround: Do one of the following:
  • Perform the operation from a process that has administrator privilege. 
  • Perform the operation from a node that doesn’t have CSV ownership. 
Next steps: Microsoft is working on a resolution and will provide an update in an upcoming release.

Back to top
OS Build 16299.1087

April 09, 2019
KB4493441
Mitigated
Last updated:
April 25, 2019
02:00 PM PT

Opened:
April 09, 2019
10:00 AM PT
" @@ -112,6 +111,7 @@ sections: - type: markdown text: " +
DetailsOriginating updateStatusHistory
Certain operations performed on a Cluster Shared Volume may fail
Certain operations, such as rename, that you perform on files or folders that are on a Cluster Shared Volume (CSV) may fail with the error, \"STATUS_BAD_IMPERSONATION_LEVEL (0xC00000A5)\". This occurs when you perform the operation on a CSV owner node from a process that doesn’t have administrator privilege. 

Affected platforms: 
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10, version 1607; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 10 Enterprise LTSB 2015; Windows 8.1
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2; Windows Server 2012
Workaround: Do one of the following:
  • Perform the operation from a process that has administrator privilege. 
  • Perform the operation from a node that doesn’t have CSV ownership. 
Next steps: Microsoft is working on a resolution and will provide an update in an upcoming release.

Back to top
OS Build 16299.904

January 08, 2019
KB4480978
Mitigated
Last updated:
January 08, 2019
10:00 AM PT

Opened:
January 08, 2019
10:00 AM PT
MSXML6 causes applications to stop responding if an exception was thrown
After installing KB4480978, MSXML6 causes applications to stop responding if an exception was thrown during node operations, such as appendChild(), insertBefore(), and moveNode().

The Group Policy editor may stop responding when editing a Group Policy Object (GPO) that contains Group Policy Preferences (GPP) for Internet Explorer 10 settings.

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10, version 1607; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 10 Enterprise LTSB 2015; Windows 8.1
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2; Windows Server 2012
Resolution: This issue is resolved in KB4493441.

Back to top
OS Build 16299.904

January 08, 2019
KB4480978
Resolved
KB4493441
Resolved:
April 09, 2019
10:00 AM PT

Opened:
January 08, 2019
10:00 AM PT
" diff --git a/windows/release-information/status-windows-10-1803.yml b/windows/release-information/status-windows-10-1803.yml index e9325715e8..f2b56f713a 100644 --- a/windows/release-information/status-windows-10-1803.yml +++ b/windows/release-information/status-windows-10-1803.yml @@ -62,10 +62,10 @@ sections: - + - + @@ -85,7 +85,6 @@ sections: text: "
SummaryOriginating updateStatusLast updated
Zone transfers over TCP may fail
Zone transfers between primary and secondary DNS servers over the Transmission Control Protocol (TCP) may fail.

See details >
OS Build 17134.753

April 25, 2019
KB4493437
Investigating
April 25, 2019
02:00 PM PT
Issue using PXE to start a device from WDS
Using PXE to start a device from a WDS server configured to use Variable Window Extension may cause the connection to the WDS server to terminate prematurely.

See details >
OS Build 17134.648

March 12, 2019
KB4489868
Mitigated
April 25, 2019
02:00 PM PT
Certain operations performed on a Cluster Shared Volume may fail
Certain operations, such as rename, performed on files or folders on a Cluster Shared Volume (CSV) may fail with the error, \"STATUS_BAD_IMPERSONATION_LEVEL (0xC00000A5)\".

See details >
OS Build 17134.706

April 09, 2019
KB4493464
Mitigated
April 25, 2019
02:00 PM PT
Certain operations performed on a Cluster Shared Volume may fail
Certain operations, such as rename, performed on files or folders on a Cluster Shared Volume (CSV) may fail with the error, \"STATUS_BAD_IMPERSONATION_LEVEL (0xC00000A5)\".

See details >
OS Build 17134.523

January 08, 2019
KB4480966
Mitigated
January 08, 2019
10:00 AM PT
Custom URI schemes may not start corresponding application
Custom URI schemes for application protocol handlers may not start the corresponding application for local intranet and trusted sites in Internet Explorer.

See details >
OS Build 17134.648

March 12, 2019
KB4489868
Resolved
KB4493437
April 25, 2019
02:00 PM PT
End-user-defined characters (EUDC) may cause blue screen at startup
If you enable per font end-user-defined characters (EUDC), the system may stop working and a blue screen may appear at startup.

See details >
OS Build 17134.677

March 19, 2019
KB4489894
Resolved
KB4493464
April 09, 2019
10:00 AM PT
First character of Japanese era name not recognized
The first character of the Japanese era name is not recognized as an abbreviation and may cause date parsing issues.

See details >
OS Build 17134.556

January 15, 2019
KB4480976
Resolved
KB4487029
April 09, 2019
10:00 AM PT
First character of the Japanese era name not recognized
The first character of the Japanese era name is not recognized as an abbreviation and may cause date parsing issues.

See details >
OS Build 17134.556

January 15, 2019
KB4480976
Resolved
KB4487029
April 09, 2019
10:00 AM PT
MSXML6 may cause applications to stop responding
MSXML6 may cause applications to stop responding if an exception was thrown during node operations, such as appendChild(), insertBefore(), and moveNode().

See details >
OS Build 17134.523

January 08, 2019
KB4480966
Resolved
KB4493464
April 09, 2019
10:00 AM PT
Stop error when attempting to start SSH from WSL
A stop error occurs when attempting to start Secure Shell from Windows Subsystem for Linux with agent forwarding using a command line switch (ssh –A) or a configuration setting.

See details >
OS Build 17134.648

March 12, 2019
KB4489868
Resolved
KB4493464
April 09, 2019
10:00 AM PT
Embedded objects may display incorrectly
Any compound document (OLE) server application that places embedded objects into the Windows Metafile (WMF) using the PatBlt API may display embedded objects incorrectly.

See details >
OS Build 17134.590

February 12, 2019
KB4487017
Resolved
KB4493464
April 09, 2019
10:00 AM PT
-
DetailsOriginating updateStatusHistory
Zone transfers over TCP may fail
Zone transfers between primary and secondary DNS servers over the Transmission Control Protocol (TCP) may fail after installing KB4493437
 
Affected platforms:  
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1607; Windows 10 Enterprise LTSC 2016 
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016 
Next steps: Microsoft is working on a resolution and will provide an update in an upcoming release. 

Back to top
OS Build 17134.753

April 25, 2019
KB4493437
Investigating
Last updated:
April 25, 2019
02:00 PM PT

Opened:
April 25, 2019
02:00 PM PT
Certain operations performed on a Cluster Shared Volume may fail
Certain operations, such as rename, that you perform on files or folders that are on a Cluster Shared Volume (CSV) may fail with the error, \"STATUS_BAD_IMPERSONATION_LEVEL (0xC00000A5)\". This occurs when you perform the operation on a CSV owner node from a process that doesn’t have administrator privilege.

Affected platforms: 
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10, version 1607; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 10 Enterprise LTSB 2015; Windows 8.1
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2; Windows Server 2012
Workaround: Do one of the following:
  • Perform the operation from a process that has administrator privilege. 
  • Perform the operation from a node that doesn’t have CSV ownership. 
Next steps: Microsoft is working on a resolution and will provide an update in an upcoming release.

Back to top
OS Build 17134.706

April 09, 2019
KB4493464
Mitigated
Last updated:
April 25, 2019
02:00 PM PT

Opened:
April 09, 2019
10:00 AM PT
" @@ -116,7 +115,8 @@ sections: - type: markdown text: " - + +
DetailsOriginating updateStatusHistory
First character of Japanese era name not recognized
After installing KB4480976, the first character of the Japanese era name is not recognized as an abbreviation and may cause date parsing issues.

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10, version 1607; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 10 Enterprise LTSB 2015; Windows 8.1; Windows 7 SP1
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2; Windows Server 2012; Windows Server 2008 R2 SP1; Windows Server 2008 SP2
Resolution: This issue is resolved in KB4487029

Back to top
OS Build 17134.556

January 15, 2019
KB4480976
Resolved
KB4487029
Resolved:
February 19, 2019
02:00 PM PT

Opened:
January 08, 2019
10:00 AM PT
Certain operations performed on a Cluster Shared Volume may fail
Certain operations, such as rename, that you perform on files or folders that are on a Cluster Shared Volume (CSV) may fail with the error, \"STATUS_BAD_IMPERSONATION_LEVEL (0xC00000A5)\". This occurs when you perform the operation on a CSV owner node from a process that doesn’t have administrator privilege.

Affected platforms: 
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10, version 1607; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 10 Enterprise LTSB 2015; Windows 8.1
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2; Windows Server 2012
Workaround: Do one of the following:
  • Perform the operation from a process that has administrator privilege. 
  • Perform the operation from a node that doesn’t have CSV ownership. 
Next steps: Microsoft is working on a resolution and will provide an update in an upcoming release.

Back to top
OS Build 17134.523

January 08, 2019
KB4480966
Mitigated
Last updated:
January 08, 2019
10:00 AM PT

Opened:
January 08, 2019
10:00 AM PT
First character of the Japanese era name not recognized
After installing KB4480976, the first character of the Japanese era name is not recognized as an abbreviation and may cause date parsing issues.

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10, version 1607; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 10 Enterprise LTSB 2015; Windows 8.1; Windows 7 SP1
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2; Windows Server 2012; Windows Server 2008 R2 SP1; Windows Server 2008 SP2
Resolution: This issue is resolved in KB4487029

Back to top
OS Build 17134.556

January 15, 2019
KB4480976
Resolved
KB4487029
Resolved:
February 19, 2019
02:00 PM PT

Opened:
January 08, 2019
10:00 AM PT
MSXML6 may cause applications to stop responding
After installing KB4480966, MSXML6 causes applications to stop responding if an exception was thrown during node operations, such as appendChild(), insertBefore(), and moveNode().

The Group Policy editor may stop responding when editing a Group Policy Object (GPO) that contains Group Policy Preferences (GPP) for Internet Explorer 10 settings.

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10, version 1607; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 10 Enterprise LTSB 2015; Windows 8.1
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2; Windows Server 2012
Resolution: This issue was resolved in KB4493464

Back to top
OS Build 17134.523

January 08, 2019
KB4480966
Resolved
KB4493464
Resolved:
April 09, 2019
10:00 AM PT

Opened:
January 08, 2019
10:00 AM PT
" diff --git a/windows/release-information/status-windows-10-1809-and-windows-server-2019.yml b/windows/release-information/status-windows-10-1809-and-windows-server-2019.yml index 0e7d076964..0b0b5eb29c 100644 --- a/windows/release-information/status-windows-10-1809-and-windows-server-2019.yml +++ b/windows/release-information/status-windows-10-1809-and-windows-server-2019.yml @@ -68,8 +68,8 @@ sections:
System may be unresponsive after restart if ArcaBit antivirus software installed
Devices with ArcaBit antivirus software installed may become unresponsive upon restart.

See details >OS Build 17763.437

April 09, 2019
KB4493509Mitigated
April 25, 2019
02:00 PM PT
Custom URI schemes may not start corresponding application
Custom URI schemes for application protocol handlers may not start the corresponding application for local intranet and trusted sites in Internet Explorer.

See details >OS Build 17763.379

March 12, 2019
KB4489899Mitigated
April 09, 2019
10:00 AM PT
Issue using PXE to start a device from WDS
Using PXE to start a device from a WDS server configured to use Variable Window Extension may cause the connection to the WDS server to terminate prematurely.

See details >OS Build 17763.379

March 12, 2019
KB4489899Mitigated
April 09, 2019
10:00 AM PT -
Certain operations performed on a Cluster Shared Volume may fail
Certain operations, such as rename, performed on files or folders on a Cluster Shared Volume (CSV) may fail with the error, \"STATUS_BAD_IMPERSONATION_LEVEL (0xC00000A5)\".

See details >OS Build 17763.437

April 09, 2019
KB4493509Mitigated
April 09, 2019
10:00 AM PT
Audio not working on monitors or TV connected to a PC via HDMI, USB, or DisplayPort
Upgrade block: Microsoft has identified issues with certain new Intel display drivers, which accidentally turn on unsupported features in Windows.

See details >OS Build 17763.134

November 13, 2018
KB4467708Mitigated
March 15, 2019
12:00 PM PT +
Certain operations performed on a Cluster Shared Volume may fail
Certain operations, such as rename, performed on files or folders on a Cluster Shared Volume (CSV) may fail with the error, \"STATUS_BAD_IMPERSONATION_LEVEL (0xC00000A5)\".

See details >OS Build 17763.253

January 08, 2019
KB4480116Mitigated
January 08, 2019
10:00 AM PT
End-user-defined characters (EUDC) may cause blue screen at startup
If you enable per font end-user-defined characters (EUDC), the system may stop working and a blue screen may appear at startup.

See details >OS Build 17763.404

April 02, 2019
KB4490481Resolved
KB4493509April 09, 2019
10:00 AM PT
Internet Explorer 11 authentication issue with multiple concurrent logons
Internet Explorer 11 users may encounter issues if two or more people use the same user account for multiple, concurrent login sessions on the same Windows Server machine.

See details >OS Build 17763.253

January 08, 2019
KB4480116Resolved
KB4493509April 09, 2019
10:00 AM PT
MSXML6 may cause applications to stop responding
MSXML6 may cause applications to stop responding if an exception was thrown during node operations, such as appendChild(), insertBefore(), and moveNode().

See details >OS Build 17763.253

January 08, 2019
KB4480116Resolved
KB4493509April 09, 2019
10:00 AM PT @@ -90,7 +90,6 @@ sections: - type: markdown text: " -
DetailsOriginating updateStatusHistory
Certain operations performed on a Cluster Shared Volume may fail
Certain operations, such as rename, that you perform on files or folders that are on a Cluster Shared Volume (CSV) may fail with the error, \"STATUS_BAD_IMPERSONATION_LEVEL (0xC00000A5)\". This occurs when you perform the operation on a CSV owner node from a process that doesn’t have administrator privilege. 

Affected platforms: 
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10, version 1607; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 10 Enterprise LTSB 2015; Windows 8.1
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2; Windows Server 2012
Workaround: Do one of the following:  
  • Perform the operation from a process that has administrator privilege. 
  • Perform the operation from a node that doesn’t have CSV ownership. 
Next steps: Microsoft is working on a resolution and will provide an update in an upcoming release.

Back to top
OS Build 17763.437

April 09, 2019
KB4493509
Mitigated
Last updated:
April 09, 2019
10:00 AM PT

Opened:
April 09, 2019
10:00 AM PT
End-user-defined characters (EUDC) may cause blue screen at startup
If you enable per font end-user-defined characters (EUDC), the system will stop working and a blue screen may appear at startup. This is not a common setting in non-Asian regions.

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10, version 1607; Windows 10 Enterprise LTSC 2016
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016
Resolution: This issue was resolved in KB4493509.

Back to top
OS Build 17763.404

April 02, 2019
KB4490481
Resolved
KB4493509
Resolved:
April 09, 2019
10:00 AM PT

Opened:
April 02, 2019
10:00 AM PT
" @@ -122,6 +121,7 @@ sections: text: " +
DetailsOriginating updateStatusHistory
System may be unresponsive after restart if ArcaBit antivirus software installed
Microsoft and ArcaBit have identified an issue on devices with ArcaBit antivirus software installed that may cause the system to become unresponsive upon restart after installing KB4493509
 
Microsoft has temporarily blocked devices from receiving this update if ArcaBit antivirus software is installed. 

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 8.1; Windows 7 SP1
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server 2012 R2; Windows Server 2008 R2 SP1
Workaround: ArcaBit has released an update to address this issue. For more information, see the Arcabit support article.

Back to top
OS Build 17763.437

April 09, 2019
KB4493509
Mitigated
Last updated:
April 25, 2019
02:00 PM PT

Opened:
January 08, 2019
10:00 AM PT
Certain operations performed on a Cluster Shared Volume may fail
Certain operations, such as rename, that you perform on files or folders that are on a Cluster Shared Volume (CSV) may fail with the error, \"STATUS_BAD_IMPERSONATION_LEVEL (0xC00000A5)\". This occurs when you perform the operation on a CSV owner node from a process that doesn’t have administrator privilege. 

Affected platforms: 
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10, version 1607; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 10 Enterprise LTSB 2015; Windows 8.1
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2; Windows Server 2012
Workaround: Do one of the following:  
  • Perform the operation from a process that has administrator privilege. 
  • Perform the operation from a node that doesn’t have CSV ownership. 
Next steps: Microsoft is working on a resolution and will provide an update in an upcoming release.

Back to top
OS Build 17763.253

January 08, 2019
KB4480116
Mitigated
Last updated:
January 08, 2019
10:00 AM PT

Opened:
January 08, 2019
10:00 AM PT
Internet Explorer 11 authentication issue with multiple concurrent logons
After installing KB4480116, Internet Explorer 11 and other applications that use WININET.DLL may have authentication issues. This occurs when two or more people use the same user account for multiple, concurrent login sessions on the same Windows Server machine, including Remote Desktop Protocol (RDP) and Terminal Server logons. Symptoms reported by customers include, but may not be limited to: 
 
  • Cache size and location show zero or empty. 
  • Keyboard shortcuts may not work properly. 
  • Webpages may intermittently fail to load or render correctly. 
  • Issues with credential prompts. 
  • Issues when downloading files. 
Resolution: This issue was resolved in KB4493509

Back to top
OS Build 17763.253

January 08, 2019
KB4480116
Resolved
KB4493509
Resolved:
April 09, 2019
10:00 AM PT

Opened:
January 08, 2019
10:00 AM PT
MSXML6 may cause applications to stop responding
After installing KB4480116, MSXML6 causes applications to stop responding if an exception was thrown during node operations, such as appendChild(), insertBefore(), and moveNode().
 
The Group Policy editor may stop responding when editing a Group Policy Object (GPO) that contains Group Policy Preferences (GPP) for Internet Explorer 10 settings. 

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10, version 1607; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 10 Enterprise LTSB 2015; Windows 8.1
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2; Windows Server 2012
Resolution: This issue was resolved in KB4493509

Back to top
OS Build 17763.253

January 08, 2019
KB4480116
Resolved
KB4493509
Resolved:
April 09, 2019
10:00 AM PT

Opened:
January 08, 2019
10:00 AM PT
diff --git a/windows/release-information/status-windows-7-and-windows-server-2008-r2-sp1.yml b/windows/release-information/status-windows-7-and-windows-server-2008-r2-sp1.yml index b4327401bb..eef4f70da6 100644 --- a/windows/release-information/status-windows-7-and-windows-server-2008-r2-sp1.yml +++ b/windows/release-information/status-windows-7-and-windows-server-2008-r2-sp1.yml @@ -88,7 +88,7 @@ sections:
System may be unresponsive after restart if Avira antivirus software installed
Microsoft and Avira have identified an issue on devices with Avira antivirus software installed that may cause the system to become unresponsive upon restart after installing KB4493472.

Microsoft has temporarily blocked devices from receiving this update if Avira antivirus software is installed.

Affected platforms: 
  • Client: Windows 8.1; Windows 7 SP1 
  • Server: Windows Server 2012 R2; Windows Server 2012; Windows Server 2008 R2 SP1; Windows Server 2008 SP2
Next steps: We are presently investigating this issue with Avira and will provide an update when available.

Back to topApril 09, 2019
KB4493472Investigating
Last updated:
April 25, 2019
02:00 PM PT

Opened:
April 09, 2019
10:00 AM PT
System unresponsive after restart if Sophos Endpoint Protection installed
Microsoft and Sophos have identified an issue on devices with Sophos Endpoint Protection installed and managed by either Sophos Central or Sophos Enterprise Console (SEC) that may cause the system to become unresponsive upon restart after installing KB4493472.

Microsoft has temporarily blocked devices from receiving this update if the Sophos Endpoint is installed until a solution is available.

Affected platforms: 
  • Client: Windows 8.1; Windows 7 SP1
  • Server: Windows Server 2012 R2; Windows Server 2012; Windows Server 2008 R2 SP1; Windows Server 2008 SP2
Guidance for Sophos Endpoint and Sophos Enterprise Console customers can be found in the Sophos support article.

Back to topApril 09, 2019
KB4493472Mitigated
Last updated:
April 25, 2019
02:00 PM PT

Opened:
April 09, 2019
10:00 AM PT
System may be unresponsive after restart if ArcaBit antivirus software installed
Microsoft and ArcaBit have identified an issue on devices with ArcaBit antivirus software installed that may cause the system to become unresponsive upon restart after installing KB4493472.

Microsoft has temporarily blocked devices from receiving this update if ArcaBit antivirus software is installed.

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 8.1; Windows 7 SP1
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server 2012 R2; Windows Server 2008 R2 SP1
Workaround: ArcaBit has released an update to address this issue. For more information, see the Arcabit support article.

Back to topApril 09, 2019
KB4493472Mitigated
Last updated:
April 25, 2019
02:00 PM PT

Opened:
April 09, 2019
10:00 AM PT -
System may be unresponsive after restart with certain McAfee antivirus products
Microsoft and McAfee have identified an issue on devices with McAfee Endpoint Security (ENS) Threat Prevention 10.x or McAfee Host Intrusion Prevention (Host IPS) 8.0 or McAfee VirusScan Enterprise (VSE) 8.8 installed. It may cause the system to have slow startup or become unresponsive at restart after installing this update. 

Affected platforms:
  • Client: Windows 7 SP1
  • Server: Windows Server 2008 R2 SP1
Workaround: Guidance for McAfee customers can be found in the following McAfee support articles: 
Next steps: We are presently investigating this issue with McAfee. We will provide an update once we have more information.

Back to topApril 09, 2019
KB4493472Mitigated
Last updated:
April 18, 2019
05:00 PM PT

Opened:
April 09, 2019
10:00 AM PT +
System may be unresponsive after restart with certain McAfee antivirus products
Microsoft and McAfee have identified an issue on devices with McAfee Endpoint Security (ENS) Threat Prevention 10.x or McAfee Host Intrusion Prevention (Host IPS) 8.0 or McAfee VirusScan Enterprise (VSE) 8.8 installed. It may cause the system to have slow startup or become unresponsive at restart after installing this update. 

Affected platforms:
  • Client:  Windows 8.1; Windows 7 SP1
  • Server:  Windows Server 2012 R2; Windows Server 2008 R2 SP1
Workaround: Guidance for McAfee customers can be found in the following McAfee support articles: 
Next steps: We are presently investigating this issue with McAfee. We will provide an update once we have more information.

Back to topApril 09, 2019
KB4493472Mitigated
Last updated:
April 18, 2019
05:00 PM PT

Opened:
April 09, 2019
10:00 AM PT
Devices may not respond at login or Welcome screen if running certain Avast software
Microsoft and Avast have identified an issue on devices running Avast for Business, Avast CloudCare, and AVG Business Edition antivirus software after you install KB4493472 and restart. Devices may become unresponsive at the login or Welcome screen. Additionally, you may be unable to log in or log in after an extended period of time.

Affected platforms: 
  • Client: Windows 8.1; Windows 7 SP1 
  • Server: Windows Server 2012 R2; Windows Server 2008 R2 SP1 
Resolution: Avast has released emergency updates to address this issue. For more information and AV update schedule, see the Avast support KB article.

Back to topApril 09, 2019
KB4493472Resolved
Resolved:
April 25, 2019
02:00 PM PT

Opened:
April 09, 2019
10:00 AM PT " diff --git a/windows/release-information/status-windows-8.1-and-windows-server-2012-r2.yml b/windows/release-information/status-windows-8.1-and-windows-server-2012-r2.yml index f02d026290..c51f4b8a9c 100644 --- a/windows/release-information/status-windows-8.1-and-windows-server-2012-r2.yml +++ b/windows/release-information/status-windows-8.1-and-windows-server-2012-r2.yml @@ -64,8 +64,8 @@ sections:
Issue using PXE to start a device from WDS
There may be issues using the Preboot Execution Environment (PXE) to start a device from a Windows Deployment Services (WDS) server configured to use Variable Window Extension.

See details >March 12, 2019
KB4489881Mitigated
April 25, 2019
02:00 PM PT
System unresponsive after restart if Sophos Endpoint Protection installed
Devices with Sophos Endpoint Protection installed and managed by Sophos Central or Sophos Enterprise Console (SEC) may become unresponsive upon restart.

See details >April 09, 2019
KB4493446Mitigated
April 25, 2019
02:00 PM PT
System may be unresponsive after restart if ArcaBit antivirus software installed
Devices with ArcaBit antivirus software installed may become unresponsive upon restart.

See details >April 09, 2019
KB4493446Mitigated
April 25, 2019
02:00 PM PT -
Certain operations performed on a Cluster Shared Volume may fail
Certain operations, such as rename, performed on files or folders on a Cluster Shared Volume (CSV) may fail with the error, “STATUS_BAD_IMPERSONATION_LEVEL (0xC00000A5)”.

See details >April 09, 2019
KB4493446Mitigated
April 25, 2019
02:00 PM PT
System may be unresponsive after restart with certain McAfee antivirus products
Devices with McAfee Endpoint Security Threat Prevention 10.x, Host Intrusion Prevention 8.0, or VirusScan Enterprise 8.8 may be slow or unresponsive at startup.

See details >April 09, 2019
KB4493446Mitigated
April 18, 2019
05:00 PM PT +
Certain operations performed on a Cluster Shared Volume may fail
Certain operations, such as rename, performed on files or folders on a Cluster Shared Volume (CSV) may fail with the error, “STATUS_BAD_IMPERSONATION_LEVEL (0xC00000A5)”.

See details >January 08, 2019
KB4480963Mitigated
January 08, 2019
10:00 AM PT
Devices may not respond at login or Welcome screen if running certain Avast software
Devices running Avast for Business, Avast CloudCare, and AVG Business Edition antivirus software may become unresponsive after restart.

See details >April 09, 2019
KB4493446Resolved
April 25, 2019
02:00 PM PT
Internet Explorer 11 authentication issue with multiple concurrent logons
Internet Explorer 11 users may encounter issues if two or more people use the same user account for multiple, concurrent login sessions on the same Windows Server machine.

See details >January 08, 2019
KB4480963Resolved
KB4493446April 09, 2019
10:00 AM PT
MSXML6 may cause applications to stop responding.
MSXML6 may cause applications to stop responding if an exception was thrown during node operations, such as appendChild(), insertBefore(), and moveNode().

See details >January 08, 2019
KB4480963Resolved
KB4493446April 09, 2019
10:00 AM PT @@ -89,8 +89,7 @@ sections:
System may be unresponsive after restart if Avira antivirus software installed
Microsoft and Avira have identified an issue on devices with Avira antivirus software installed that may cause the system to become unresponsive upon restart after installing KB4493446.

Microsoft has temporarily blocked devices from receiving this update if Avira antivirus software is installed.

Affected platforms: 
  • Client: Windows 8.1; Windows 7 SP1 
  • Server: Windows Server 2012 R2; Windows Server 2012; Windows Server 2008 R2 SP1; Windows Server 2008 SP2 
Next steps: We are presently investigating this issue with Avira and will provide an update when available.

Back to topApril 09, 2019
KB4493446Investigating
Last updated:
April 25, 2019
02:00 PM PT

Opened:
April 09, 2019
10:00 AM PT
System unresponsive after restart if Sophos Endpoint Protection installed
Microsoft and Sophos have identified an issue on devices with Sophos Endpoint Protection installed and managed by either Sophos Central or Sophos Enterprise Console (SEC) that may cause the system to become unresponsive upon restart after installing KB4493446.

Microsoft has temporarily blocked devices from receiving this update if the Sophos Endpoint is installed until a solution is available.

Affected platforms: 
  • Client: Windows 8.1; Windows 7 SP1
  • Server: Windows Server 2012 R2; Windows Server 2012; Windows Server 2008 R2 SP1; Windows Server 2008 SP2
Guidance for Sophos Endpoint and Sophos Enterprise Console customers can be found in the Sophos support article.

Back to topApril 09, 2019
KB4493446Mitigated
Last updated:
April 25, 2019
02:00 PM PT

Opened:
April 09, 2019
10:00 AM PT
System may be unresponsive after restart if ArcaBit antivirus software installed
Microsoft and ArcaBit have identified an issue on devices with ArcaBit antivirus software installed that may cause the system to become unresponsive upon restart after installing KB4493446.

Microsoft has temporarily blocked devices from receiving this update if ArcaBit antivirus software is installed.

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 8.1; Windows 7 SP1
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server 2012 R2; Windows Server 2008 R2 SP1
Workaround: ArcaBit has released an update to address this issue. For more information, see the Arcabit support article.

Back to topApril 09, 2019
KB4493446Mitigated
Last updated:
April 25, 2019
02:00 PM PT

Opened:
April 09, 2019
10:00 AM PT -
Certain operations performed on a Cluster Shared Volume may fail
Certain operations, such as rename, that you perform on files or folders that are on a Cluster Shared Volume (CSV) may fail with the error, “STATUS_BAD_IMPERSONATION_LEVEL (0xC00000A5)”. This occurs when you perform the operation on a CSV owner node from a process that doesn’t have administrator privilege.

Affected platforms: 
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10, version 1607; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 10 Enterprise LTSB 2015; Windows 8.1
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2; Windows Server 2012
Workaround: Do one of the following:
  • Perform the operation from a process that has administrator privilege.
  • Perform the operation from a node that doesn’t have CSV ownership.
Next steps: Microsoft is working on a resolution and will provide an update in an upcoming release.

Back to topApril 09, 2019
KB4493446Mitigated
Last updated:
April 25, 2019
02:00 PM PT

Opened:
April 09, 2019
10:00 AM PT -
System may be unresponsive after restart with certain McAfee antivirus products
Microsoft and McAfee have identified an issue on devices with McAfee Endpoint Security (ENS) Threat Prevention 10.x or McAfee Host Intrusion Prevention (Host IPS) 8.0 or McAfee VirusScan Enterprise (VSE) 8.8 installed. It may cause the system to have slow startup or become unresponsive at restart after installing this update. 
 
Workaround: Guidance for McAfee customers can be found in the following McAfee support articles:  
Next steps: We are presently investigating this issue with McAfee. We will provide an update once we have more information. 

Back to topApril 09, 2019
KB4493446Mitigated
Last updated:
April 18, 2019
05:00 PM PT

Opened:
April 09, 2019
10:00 AM PT +
System may be unresponsive after restart with certain McAfee antivirus products
Microsoft and McAfee have identified an issue on devices with McAfee Endpoint Security (ENS) Threat Prevention 10.x or McAfee Host Intrusion Prevention (Host IPS) 8.0 or McAfee VirusScan Enterprise (VSE) 8.8 installed. It may cause the system to have slow startup or become unresponsive at restart after installing this update. 

Affected platforms:
  • Client:  Windows 8.1; Windows 7 SP1
  • Server:  Windows Server 2012 R2; Windows Server 2008 R2 SP1
Workaround: Guidance for McAfee customers can be found in the following McAfee support articles:  
Next steps: We are presently investigating this issue with McAfee. We will provide an update once we have more information. 

Back to topApril 09, 2019
KB4493446Mitigated
Last updated:
April 18, 2019
05:00 PM PT

Opened:
April 09, 2019
10:00 AM PT
Devices may not respond at login or Welcome screen if running certain Avast software
Microsoft and Avast have identified an issue on devices running Avast for Business, Avast CloudCare, and AVG Business Edition antivirus software after you install KB4493446 and restart. Devices may become unresponsive at the login or Welcome screen. Additionally, you may be unable to log in or log in after an extended period of time.

Affected platforms: 
  • Client: Windows 8.1; Windows 7 SP1 
  • Server: Windows Server 2012 R2; Windows Server 2008 R2 SP1 
Resolution: Avast has released emergency updates to address this issue. For more information and AV update schedule, see the Avast support KB article.

Back to topApril 09, 2019
KB4493446Resolved
Resolved:
April 25, 2019
02:00 PM PT

Opened:
April 09, 2019
10:00 AM PT " @@ -111,7 +110,7 @@ sections: - type: markdown text: " - +
DetailsOriginating updateStatusHistory
Embedded objects may display incorrectly
Any compound document (OLE) server application that places embedded objects into the Windows Metafile (WMF) using the PatBlt API may display embedded objects incorrectly.

For example, if you paste a Microsoft Excel worksheet object into a Microsoft Word document, the cells may render with a different background color.

Affected platforms: 
  • Client: Windows 8.1 
  • Server: Windows Server 2012 R2; Windows Server 2012; Windows Server 2008 SP2
Resolution: This issue is resolved in KB4493446.

Back to top
February 12, 2019
KB4487000
Resolved
KB4493446
Resolved:
April 09, 2019
10:00 AM PT

Opened:
February 12, 2019
10:00 AM PT
Embedded objects may display incorrectly
Any compound document (OLE) server application that places embedded objects into the Windows Metafile (WMF) using the PatBlt API may display embedded objects incorrectly.

For example, if you paste a Microsoft Excel worksheet object into a Microsoft Word document, the cells may render with a different background color.

Affected platforms 
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10, version 1607; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 10 Enterprise LTSB 2015; Windows 8.1; Windows 7 SP1 
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2; Windows Server 2012; Windows Server 2008 R2 SP1; Windows Server 2008 SP2 
Resolution: This issue is resolved in KB4493446.

Back to top
February 12, 2019
KB4487000
Resolved
KB4493446
Resolved:
April 09, 2019
10:00 AM PT

Opened:
February 12, 2019
10:00 AM PT
" @@ -120,6 +119,7 @@ sections: - type: markdown text: " +
DetailsOriginating updateStatusHistory
Certain operations performed on a Cluster Shared Volume may fail
Certain operations, such as rename, that you perform on files or folders that are on a Cluster Shared Volume (CSV) may fail with the error, “STATUS_BAD_IMPERSONATION_LEVEL (0xC00000A5)”. This occurs when you perform the operation on a CSV owner node from a process that doesn’t have administrator privilege.

Affected platforms: 
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10, version 1607; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 10 Enterprise LTSB 2015; Windows 8.1
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2; Windows Server 2012
Workaround: Do one of the following:
  • Perform the operation from a process that has administrator privilege.
  • Perform the operation from a node that doesn’t have CSV ownership.
Next steps: Microsoft is working on a resolution and will provide an update in an upcoming release.

Back to top
January 08, 2019
KB4480963
Mitigated
Last updated:
January 08, 2019
10:00 AM PT

Opened:
January 08, 2019
10:00 AM PT
Internet Explorer 11 authentication issue with multiple concurrent logons
After installing KB4480963, Internet Explorer 11 and other applications that use WININET.DLL may have authentication issues. This occurs when two or more people use the same user account for multiple, concurrent login sessions on the same Windows Server machine, including Remote Desktop Protocol (RDP) and Terminal Server logons. Symptoms reported by customers include, but may not be limited to:
  • Cache size and location show zero or empty.
  • Keyboard shortcuts may not work properly.
  • Webpages may intermittently fail to load or render correctly.
  • Issues with credential prompts.
  • Issues when downloading files.
Affected platforms: 
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1607; Windows 10 Enterprise LTSC 2016; Windows 8.1; Windows 7 SP1
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server 2016; Windows Server 2012 R2; Windows Server 2012; Windows Server 2008 R2 SP1
Resolution: This issue is resolved in KB4493446.

Back to top
January 08, 2019
KB4480963
Resolved
KB4493446
Resolved:
April 09, 2019
10:00 AM PT

Opened:
January 08, 2019
10:00 AM PT
MSXML6 may cause applications to stop responding.
After installing KB4480963, MSXML6 causes applications to stop responding if an exception was thrown during node operations, such as appendChild(), insertBefore(), and moveNode().

The Group Policy editor may stop responding when editing a Group Policy Object (GPO) that contains Group Policy Preferences (GPP) for Internet Explorer 10 settings.

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10, version 1607; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 10 Enterprise LTSB 2015; Windows 8.1
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2; Windows Server 2012
Resolution: This issue is resolved in KB4493446.

Back to top
January 08, 2019
KB4480963
Resolved
KB4493446
Resolved:
April 09, 2019
10:00 AM PT

Opened:
January 08, 2019
10:00 AM PT
diff --git a/windows/release-information/status-windows-server-2008-sp2.yml b/windows/release-information/status-windows-server-2008-sp2.yml index e0487e003a..cdc26f6015 100644 --- a/windows/release-information/status-windows-server-2008-sp2.yml +++ b/windows/release-information/status-windows-server-2008-sp2.yml @@ -100,6 +100,6 @@ sections: - type: markdown text: " - +
DetailsOriginating updateStatusHistory
Embedded objects may display incorrectly
Any compound document (OLE) server application that places embedded objects into the Windows Metafile (WMF) using the PatBlt API may display embedded objects incorrectly.

For example, if you paste a Microsoft Excel worksheet object into a Microsoft Word document, the cells may render with a different background color.

Affected platforms: 
  • Client: Windows 8.1 
  • Server: Windows Server 2012 R2; Windows Server 2012; Windows Server 2008 SP2
Resolution: This issue is resolved in KB4493471.

Back to top
February 12, 2019
KB4487023
Resolved
KB4493471
Resolved:
April 09, 2019
10:00 AM PT

Opened:
February 12, 2019
10:00 AM PT
Embedded objects may display incorrectly
Any compound document (OLE) server application that places embedded objects into the Windows Metafile (WMF) using the PatBlt API may display embedded objects incorrectly.

For example, if you paste a Microsoft Excel worksheet object into a Microsoft Word document, the cells may render with a different background color.

Affected platforms 
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10, version 1607; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 10 Enterprise LTSB 2015; Windows 8.1; Windows 7 SP1 
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2; Windows Server 2012; Windows Server 2008 R2 SP1; Windows Server 2008 SP2
Resolution: This issue is resolved in KB4493471.

Back to top
February 12, 2019
KB4487023
Resolved
KB4493471
Resolved:
April 09, 2019
10:00 AM PT

Opened:
February 12, 2019
10:00 AM PT
" diff --git a/windows/release-information/status-windows-server-2012.yml b/windows/release-information/status-windows-server-2012.yml index 45a2e866e4..9fde41147b 100644 --- a/windows/release-information/status-windows-server-2012.yml +++ b/windows/release-information/status-windows-server-2012.yml @@ -63,7 +63,7 @@ sections:
System may be unresponsive after restart if Avira antivirus software installed
Devices with Avira antivirus software installed may become unresponsive upon restart.

See details >April 09, 2019
KB4493451Investigating
April 25, 2019
02:00 PM PT
Issue using PXE to start a device from WDS
There may be issues using the Preboot Execution Environment (PXE) to start a device from a Windows Deployment Services (WDS) server configured to use Variable Window Extension.

See details >March 12, 2019
KB4489891Mitigated
April 25, 2019
02:00 PM PT
System unresponsive after restart if Sophos Endpoint Protection installed
Devices with Sophos Endpoint Protection installed and managed by Sophos Central or Sophos Enterprise Console (SEC) may become unresponsive upon restart.

See details >April 09, 2019
KB4493451Mitigated
April 25, 2019
02:00 PM PT -
Certain operations performed on a Cluster Shared Volume may fail
Certain operations, such as rename, performed on files or folders on a Cluster Shared Volume (CSV) may fail with the error, “STATUS_BAD_IMPERSONATION_LEVEL (0xC00000A5)”.

See details >January 08, 2019
KB4480975Mitigated
April 25, 2019
02:00 PM PT +
Certain operations performed on a Cluster Shared Volume may fail
Certain operations, such as rename, performed on files or folders on a Cluster Shared Volume (CSV) may fail with the error, “STATUS_BAD_IMPERSONATION_LEVEL (0xC00000A5)”.

See details >January 08, 2019
KB4480975Mitigated
January 08, 2019
10:00 AM PT
Internet Explorer 11 authentication issue with multiple concurrent logons
Internet Explorer 11 users may encounter issues if two or more people use the same user account for multiple, concurrent login sessions on the same Windows Server machine.

See details >January 08, 2019
KB4480975Resolved
KB4493451April 09, 2019
10:00 AM PT
MSXML6 may cause applications to stop responding
MSXML6 may cause applications to stop responding if an exception was thrown during node operations, such as appendChild(), insertBefore(), and moveNode().

See details >January 08, 2019
KB4480975Resolved
KB4493451April 09, 2019
10:00 AM PT
Embedded objects may display incorrectly
Any compound document (OLE) server application that places embedded objects into the Windows Metafile (WMF) using the PatBlt API may display embedded objects incorrectly.

See details >February 12, 2019
KB4487025Resolved
KB4493451April 09, 2019
10:00 AM PT @@ -84,7 +84,6 @@ sections: -
DetailsOriginating updateStatusHistory
System may be unresponsive after restart if Avira antivirus software installed
Microsoft and Avira have identified an issue on devices with Avira antivirus software installed that may cause the system to become unresponsive upon restart after installing KB4493451.

Microsoft has temporarily blocked devices from receiving this update if Avira antivirus software is installed.

Affected platforms: 
  • Client: Windows 8.1; Windows 7 SP1 
  • Server: Windows Server 2012 R2; Windows Server 2012; Windows Server 2008 R2 SP1; Windows Server 2008 SP2
Next steps: We are presently investigating this issue with Avira and will provide an update when available.

Back to top
April 09, 2019
KB4493451
Investigating
Last updated:
April 25, 2019
02:00 PM PT

Opened:
April 09, 2019
10:00 AM PT
System unresponsive after restart if Sophos Endpoint Protection installed
Microsoft and Sophos have identified an issue on devices with Sophos Endpoint Protection installed and managed by either Sophos Central or Sophos Enterprise Console (SEC) that may cause the system to become unresponsive upon restart after installing KB4493451.

Microsoft has temporarily blocked devices from receiving this update if the Sophos Endpoint is installed until a solution is available.

Affected platforms: 
  • Client: Windows 8.1; Windows 7 SP1
  • Server: Windows Server 2012 R2; Windows Server 2012; Windows Server 2008 R2 SP1; Windows Server 2008 SP2
Guidance for Sophos Endpoint and Sophos Enterprise Console customers can be found in the Sophos support article.

Back to top
April 09, 2019
KB4493451
Mitigated
Last updated:
April 25, 2019
02:00 PM PT

Opened:
April 09, 2019
10:00 AM PT
Certain operations performed on a Cluster Shared Volume may fail
Certain operations, such as rename, that you perform on files or folders that are on a Cluster Shared Volume (CSV) may fail with the error, \"STATUS_BAD_IMPERSONATION_LEVEL (0xC00000A5)\". This occurs when you perform the operation on a CSV owner node from a process that doesn’t have administrator privilege.

Affected platforms: 
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10, version 1607; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 10 Enterprise LTSB 2015; Windows 8.1
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2; Windows Server 2012
Workaround: Do one of the following:
  • Perform the operation from a process that has administrator privilege.
  • Perform the operation from a node that doesn’t have CSV ownership.
Next steps: Microsoft is working on a resolution and will provide an update in an upcoming release.

Back to top
January 08, 2019
KB4480975
Mitigated
Last updated:
April 25, 2019
02:00 PM PT

Opened:
April 09, 2019
10:00 AM PT
" @@ -103,7 +102,7 @@ sections: - type: markdown text: " - +
DetailsOriginating updateStatusHistory
Embedded objects may display incorrectly
Any compound document (OLE) server application that places embedded objects into the Windows Metafile (WMF) using the PatBlt API may display embedded objects incorrectly.

For example, if you paste a Microsoft Excel worksheet object into a Microsoft Word document, the cells may render with a different background color.

Affected platforms: 
  • Client:  Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 8.1 
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server 2012 R2; Windows Server 2012; Windows Server 2008 SP2
Resolution: This issue is resolved in KB4493451.

Back to top
February 12, 2019
KB4487025
Resolved
KB4493451
Resolved:
April 09, 2019
10:00 AM PT

Opened:
February 12, 2019
10:00 AM PT
Embedded objects may display incorrectly
Any compound document (OLE) server application that places embedded objects into the Windows Metafile (WMF) using the PatBlt API may display embedded objects incorrectly.

For example, if you paste a Microsoft Excel worksheet object into a Microsoft Word document, the cells may render with a different background color.

Affected platforms 
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10, version 1607; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 10 Enterprise LTSB 2015; Windows 8.1; Windows 7 SP1 
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2; Windows Server 2012; Windows Server 2008 R2 SP1; Windows Server 2008 SP2 
Resolution: This issue is resolved in KB4493451.

Back to top
February 12, 2019
KB4487025
Resolved
KB4493451
Resolved:
April 09, 2019
10:00 AM PT

Opened:
February 12, 2019
10:00 AM PT
" @@ -112,6 +111,7 @@ sections: - type: markdown text: " +
DetailsOriginating updateStatusHistory
Certain operations performed on a Cluster Shared Volume may fail
Certain operations, such as rename, that you perform on files or folders that are on a Cluster Shared Volume (CSV) may fail with the error, \"STATUS_BAD_IMPERSONATION_LEVEL (0xC00000A5)\". This occurs when you perform the operation on a CSV owner node from a process that doesn’t have administrator privilege.

Affected platforms: 
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10, version 1607; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 10 Enterprise LTSB 2015; Windows 8.1
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2; Windows Server 2012
Workaround: Do one of the following:
  • Perform the operation from a process that has administrator privilege.
  • Perform the operation from a node that doesn’t have CSV ownership.
Next steps: Microsoft is working on a resolution and will provide an update in an upcoming release.

Back to top
January 08, 2019
KB4480975
Mitigated
Last updated:
January 08, 2019
10:00 AM PT

Opened:
January 08, 2019
10:00 AM PT
Internet Explorer 11 authentication issue with multiple concurrent logons
After installing KB4480975, Internet Explorer 11 and other applications that use WININET.DLL may have authentication issues. This occurs when two or more people use the same user account for multiple, concurrent login sessions on the same Windows Server machine, including Remote Desktop Protocol (RDP) and Terminal Server logons. Symptoms reported by customers include, but may not be limited to:
  • Cache size and location show zero or empty.
  • Keyboard shortcuts may not work properly.
  • Webpages may intermittently fail to load or render correctly.
  • Issues with credential prompts.
  • Issues when downloading files.
Affected platforms: 
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1607; Windows 10 Enterprise LTSC 2016; Windows 8.1; Windows 7 SP1
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server 2016; Windows Server 2012 R2; Windows Server 2012; Windows Server 2008 R2 SP1
Resolution: This issue is resolved in KB4493451.

Back to top
January 08, 2019
KB4480975
Resolved
KB4493451
Resolved:
April 09, 2019
10:00 AM PT

Opened:
January 08, 2019
10:00 AM PT
MSXML6 may cause applications to stop responding
After installing KB4480975, MSXML6 causes applications to stop responding if an exception was thrown during node operations, such as appendChild(), insertBefore(), and moveNode().

The Group Policy editor may stop responding when editing a Group Policy Object (GPO) that contains Group Policy Preferences (GPP) for Internet Explorer 10 settings.

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10, version 1607; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 10 Enterprise LTSB 2015; Windows 8.1
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2; Windows Server 2012
Resolution: This issue is resolved in KB4493451.

Back to top
January 08, 2019
KB4480975
Resolved
KB4493451
Resolved:
April 09, 2019
10:00 AM PT

Opened:
January 08, 2019
10:00 AM PT
From 3505db71ed77db2a369a4ebf60c2b25a3d259240 Mon Sep 17 00:00:00 2001 From: "Nisha Mittal (Wipro Ltd.)" Date: Mon, 29 Apr 2019 15:22:53 -0700 Subject: [PATCH 238/724] Fixed soem more issues --- ...resolved-issues-windows-10-1809-and-windows-server-2019.yml | 2 +- .../status-windows-10-1809-and-windows-server-2019.yml | 2 +- windows/release-information/windows-message-center.yml | 3 --- 3 files changed, 2 insertions(+), 5 deletions(-) diff --git a/windows/release-information/resolved-issues-windows-10-1809-and-windows-server-2019.yml b/windows/release-information/resolved-issues-windows-10-1809-and-windows-server-2019.yml index f53b7c2d35..b58f333fb0 100644 --- a/windows/release-information/resolved-issues-windows-10-1809-and-windows-server-2019.yml +++ b/windows/release-information/resolved-issues-windows-10-1809-and-windows-server-2019.yml @@ -101,7 +101,7 @@ sections: - type: markdown text: " - + diff --git a/windows/release-information/status-windows-10-1809-and-windows-server-2019.yml b/windows/release-information/status-windows-10-1809-and-windows-server-2019.yml index 0b0b5eb29c..a78c82b2e2 100644 --- a/windows/release-information/status-windows-10-1809-and-windows-server-2019.yml +++ b/windows/release-information/status-windows-10-1809-and-windows-server-2019.yml @@ -122,7 +122,7 @@ sections:
DetailsOriginating updateStatusHistory
Internet Explorer 11 authentication issue with multiple concurrent logons
After installing KB4480116, Internet Explorer 11 and other applications that use WININET.DLL may have authentication issues. This occurs when two or more people use the same user account for multiple, concurrent login sessions on the same Windows Server machine, including Remote Desktop Protocol (RDP) and Terminal Server logons. Symptoms reported by customers include, but may not be limited to: 
 
  • Cache size and location show zero or empty. 
  • Keyboard shortcuts may not work properly. 
  • Webpages may intermittently fail to load or render correctly. 
  • Issues with credential prompts. 
  • Issues when downloading files. 
Resolution: This issue was resolved in KB4493509

Back to top
OS Build 17763.253

January 08, 2019
KB4480116
Resolved
KB4493509
Resolved:
April 09, 2019
10:00 AM PT

Opened:
January 08, 2019
10:00 AM PT
Internet Explorer 11 authentication issue with multiple concurrent logons
After installing KB4480116, Internet Explorer 11 and other applications that use WININET.DLL may have authentication issues. This occurs when two or more people use the same user account for multiple, concurrent login sessions on the same Windows Server machine, including Remote Desktop Protocol (RDP) and Terminal Server logons. Symptoms reported by customers include, but may not be limited to: 
  • Cache size and location show zero or empty. 
  • Keyboard shortcuts may not work properly. 
  • Webpages may intermittently fail to load or render correctly. 
  • Issues with credential prompts. 
  • Issues when downloading files. 
Resolution: This issue was resolved in KB4493509

Back to top
OS Build 17763.253

January 08, 2019
KB4480116
Resolved
KB4493509
Resolved:
April 09, 2019
10:00 AM PT

Opened:
January 08, 2019
10:00 AM PT
MSXML6 may cause applications to stop responding
After installing KB4480116, MSXML6 causes applications to stop responding if an exception was thrown during node operations, such as appendChild(), insertBefore(), and moveNode().
 
The Group Policy editor may stop responding when editing a Group Policy Object (GPO) that contains Group Policy Preferences (GPP) for Internet Explorer 10 settings. 

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10, version 1607; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 10 Enterprise LTSB 2015; Windows 8.1
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2; Windows Server 2012
Resolution: This issue was resolved in KB4493509

Back to top
OS Build 17763.253

January 08, 2019
KB4480116
Resolved
KB4493509
Resolved:
April 09, 2019
10:00 AM PT

Opened:
January 08, 2019
10:00 AM PT
Global DNS outage affects Windows Update customers
Windows Update customers were affected by a network infrastructure event on January 29, 2019 (21:00 UTC), caused by an external DNS service provider's global outage. A software update to the external provider's DNS servers resulted in the distribution of corrupted DNS records that affected connectivity to the Windows Update service. The DNS records were restored by January 30, 2019 (00:10 UTC), and the majority of local Internet Service Providers (ISP) have refreshed their DNS servers and customer services have been restored. 
 
Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019
  • Server: Windows Server, version 1809; Windows Server 2019
While this was not an issue with Microsoft's services, we take any service disruption for our customers seriously. We will work with partners to better understand this so we can provide higher quality service in the future even across diverse global network providers. 
 
If you are still unable to connect to Windows Update services due to this problem, please contact your local ISP or network administrator. You can also refer to our new KB4493784 for more information to determine if your network is affected, and to provide your local ISP or network administrator with additional information to assist you. 

Back to top
N/A

Resolved
Resolved:
March 08, 2019
11:15 AM PT

Opened:
January 29, 2019
02:00 PM PT
Webpages become unresponsive in Microsoft Edge
After installing KB4480116, some Microsoft Edge users report that they:
  • Cannot load webpages using a local IP address. 
  • Cannot load webpages on the Internet using a VPN connection.
Browsing fails or the webpage may become unresponsive.

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709
Resolution: This issue is resolved in KB4487044

Back to top
OS Build 17763.253

January 08, 2019
KB4480116
Resolved
KB4487044
Resolved:
February 12, 2019
10:00 AM PT

Opened:
January 08, 2019
10:00 AM PT
- +
DetailsOriginating updateStatusHistory
System may be unresponsive after restart if ArcaBit antivirus software installed
Microsoft and ArcaBit have identified an issue on devices with ArcaBit antivirus software installed that may cause the system to become unresponsive upon restart after installing KB4493509
 
Microsoft has temporarily blocked devices from receiving this update if ArcaBit antivirus software is installed. 

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 8.1; Windows 7 SP1
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server 2012 R2; Windows Server 2008 R2 SP1
Workaround: ArcaBit has released an update to address this issue. For more information, see the Arcabit support article.

Back to top
OS Build 17763.437

April 09, 2019
KB4493509
Mitigated
Last updated:
April 25, 2019
02:00 PM PT

Opened:
January 08, 2019
10:00 AM PT
Certain operations performed on a Cluster Shared Volume may fail
Certain operations, such as rename, that you perform on files or folders that are on a Cluster Shared Volume (CSV) may fail with the error, \"STATUS_BAD_IMPERSONATION_LEVEL (0xC00000A5)\". This occurs when you perform the operation on a CSV owner node from a process that doesn’t have administrator privilege. 

Affected platforms: 
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10, version 1607; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 10 Enterprise LTSB 2015; Windows 8.1
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2; Windows Server 2012
Workaround: Do one of the following:  
  • Perform the operation from a process that has administrator privilege. 
  • Perform the operation from a node that doesn’t have CSV ownership. 
Next steps: Microsoft is working on a resolution and will provide an update in an upcoming release.

Back to top
OS Build 17763.253

January 08, 2019
KB4480116
Mitigated
Last updated:
January 08, 2019
10:00 AM PT

Opened:
January 08, 2019
10:00 AM PT
Internet Explorer 11 authentication issue with multiple concurrent logons
After installing KB4480116, Internet Explorer 11 and other applications that use WININET.DLL may have authentication issues. This occurs when two or more people use the same user account for multiple, concurrent login sessions on the same Windows Server machine, including Remote Desktop Protocol (RDP) and Terminal Server logons. Symptoms reported by customers include, but may not be limited to: 
 
  • Cache size and location show zero or empty. 
  • Keyboard shortcuts may not work properly. 
  • Webpages may intermittently fail to load or render correctly. 
  • Issues with credential prompts. 
  • Issues when downloading files. 
Resolution: This issue was resolved in KB4493509

Back to top
OS Build 17763.253

January 08, 2019
KB4480116
Resolved
KB4493509
Resolved:
April 09, 2019
10:00 AM PT

Opened:
January 08, 2019
10:00 AM PT
Internet Explorer 11 authentication issue with multiple concurrent logons
After installing KB4480116, Internet Explorer 11 and other applications that use WININET.DLL may have authentication issues. This occurs when two or more people use the same user account for multiple, concurrent login sessions on the same Windows Server machine, including Remote Desktop Protocol (RDP) and Terminal Server logons. Symptoms reported by customers include, but may not be limited to: 
  • Cache size and location show zero or empty. 
  • Keyboard shortcuts may not work properly. 
  • Webpages may intermittently fail to load or render correctly. 
  • Issues with credential prompts. 
  • Issues when downloading files. 
Resolution: This issue was resolved in KB4493509

Back to top
OS Build 17763.253

January 08, 2019
KB4480116
Resolved
KB4493509
Resolved:
April 09, 2019
10:00 AM PT

Opened:
January 08, 2019
10:00 AM PT
MSXML6 may cause applications to stop responding
After installing KB4480116, MSXML6 causes applications to stop responding if an exception was thrown during node operations, such as appendChild(), insertBefore(), and moveNode().
 
The Group Policy editor may stop responding when editing a Group Policy Object (GPO) that contains Group Policy Preferences (GPP) for Internet Explorer 10 settings. 

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10, version 1607; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 10 Enterprise LTSB 2015; Windows 8.1
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2; Windows Server 2012
Resolution: This issue was resolved in KB4493509

Back to top
OS Build 17763.253

January 08, 2019
KB4480116
Resolved
KB4493509
Resolved:
April 09, 2019
10:00 AM PT

Opened:
January 08, 2019
10:00 AM PT
" diff --git a/windows/release-information/windows-message-center.yml b/windows/release-information/windows-message-center.yml index 938cc573f2..4e87c5da55 100644 --- a/windows/release-information/windows-message-center.yml +++ b/windows/release-information/windows-message-center.yml @@ -70,9 +70,6 @@ In order avoid this, you need to set your feature update deferral policy to 273 Reminder: Final Delta update for Windows 10, version 1607, 1703, 1709, and 1803 will be April 9, 2019
March 12th and April 9th will be the last two Delta updates for Windows 10, version 1607, 1703, 1709, and 1803. Security and quality updates will continue to be available via the express and full cumulative update packages.March 12, 2019
10:00 AM PT How do we measure and improve the quality of Windows?
Measuring the quality of Windows is a complex undertaking that requires gathering a variety of diagnostic signals from millions of devices within the Windows ecosystem. In addition to rigorous internal testing, we rely heavily on the feedback provided through diagnostic data to detect and fix problems before we release new updates of Windows to the general population, and to monitor the impact of those updates after each release.

-
Get insight into some of the practices we employ to measure and improve the quality of Windows.
March 06, 2019
10:23 AM PT - Data, insights and listening to improve the customer experience
Measuring the quality of Windows is a complex undertaking that requires gathering a variety of diagnostic signals from millions of devices within the Windows ecosystem. In addition to rigorous internal testing, we rely heavily on the feedback provided through diagnostic data to detect and fix problems before we release new updates of Windows to the general population, and to monitor the impact of those updates after each release.

-
Get insight into some of the practices we employ to measure and improve the quality of Windows.
March 06, 2019
10:23 AM PT Getting to know the Windows update history pages
Windows update history pages offer detailed information about each Windows update: the type of update, which operating systems it affects, the improvements and fixes included, and how to get the update. See how simple it is to use this important resource to access information for Windows 10, Windows Server 2019, and earlier versions of the Windows and Windows Server operating systems.
February 21, 2019
06:37 PM PT Share your feedback: Windows update history
We read every comment you leave on our update history pages, and are always looking to improve these pages and the monthly knowledge base (KB) articles that accompany each monthly update. Take our survey and let us know how we can improve our transparency further and make these more compelling and useful to you and your organization.February 21, 2019
12:00 PM PT From acbc136fac657607140bf4fb07a136a87adc0906 Mon Sep 17 00:00:00 2001 From: Dani Halfin Date: Mon, 29 Apr 2019 15:54:40 -0700 Subject: [PATCH 239/724] Changing known-issues name --- windows/hub/breadcrumb/toc.yml | 6 +++--- 1 file changed, 3 insertions(+), 3 deletions(-) diff --git a/windows/hub/breadcrumb/toc.yml b/windows/hub/breadcrumb/toc.yml index 4539d3b751..a28aaa3b77 100644 --- a/windows/hub/breadcrumb/toc.yml +++ b/windows/hub/breadcrumb/toc.yml @@ -25,9 +25,9 @@ - name: Mobile Device Management tocHref: /windows/client-management/mdm/ topicHref: /windows/client-management/mdm/index - - name: Known issues - tocHref: /windows/known-issues/ - topicHref: /windows/known-issues/index + - name: Release information + tocHref: /windows/release-information/ + topicHref: /windows/release-information/index - name: Privacy tocHref: /windows/privacy/ topicHref: /windows/privacy/index From cf8f5cc22d0331ec5e7c176ab53f8c72423a364a Mon Sep 17 00:00:00 2001 From: Dani Halfin Date: Mon, 29 Apr 2019 15:55:47 -0700 Subject: [PATCH 240/724] fixing config for bc and prod tag --- windows/release-information/docfx.json | 5 +++-- 1 file changed, 3 insertions(+), 2 deletions(-) diff --git a/windows/release-information/docfx.json b/windows/release-information/docfx.json index 6a0fb3e804..dd9fcd85dd 100644 --- a/windows/release-information/docfx.json +++ b/windows/release-information/docfx.json @@ -35,7 +35,8 @@ "overwrite": [], "externalReference": [], "globalMetadata": { - "breadcrumb_path": "/release-information/breadcrumb/toc.json", + "breadcrumb_path": "/windows/windows-10/breadcrumb/toc.json", + "ms.prod": "w10", "extendBreadcrumb": true, "feedback_system": "None" }, @@ -44,4 +45,4 @@ "dest": "release-information", "markdownEngineName": "markdig" } -} \ No newline at end of file +} From 0d1d48bae3b94a09888bc1864075a972c0d308b8 Mon Sep 17 00:00:00 2001 From: "Nisha Mittal (Wipro Ltd.)" Date: Mon, 29 Apr 2019 16:10:57 -0700 Subject: [PATCH 241/724] Removed 1809 from Affected Platform list --- ...resolved-issues-windows-7-and-windows-server-2008-r2-sp1.yml | 2 +- .../status-windows-10-1607-and-windows-server-2016.yml | 2 +- windows/release-information/status-windows-10-1709.yml | 2 +- windows/release-information/status-windows-10-1803.yml | 2 +- .../status-windows-7-and-windows-server-2008-r2-sp1.yml | 2 +- 5 files changed, 5 insertions(+), 5 deletions(-) diff --git a/windows/release-information/resolved-issues-windows-7-and-windows-server-2008-r2-sp1.yml b/windows/release-information/resolved-issues-windows-7-and-windows-server-2008-r2-sp1.yml index 64dcb5d4ed..ad071bf048 100644 --- a/windows/release-information/resolved-issues-windows-7-and-windows-server-2008-r2-sp1.yml +++ b/windows/release-information/resolved-issues-windows-7-and-windows-server-2008-r2-sp1.yml @@ -79,7 +79,7 @@ sections: - type: markdown text: " - +
DetailsOriginating updateStatusHistory
Embedded objects may display incorrectly
Any compound document (OLE) server application that places embedded objects into the Windows Metafile (WMF) using the PatBlt API may display embedded objects incorrectly. 
 
For example, if you paste a Microsoft Excel worksheet object into a Microsoft Word document, the cells may render with a different background color. 
 
Affected platforms:  
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10, version 1607; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 10 Enterprise LTSB 2015; Windows 8.1; Windows 7 SP1  
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2; Windows Server 2012; Windows Server 2008 R2 SP1; Windows Server 2008 SP2  
Resolution: This issue is resolved in KB4493472

Back to top
February 12, 2019
KB4486563
Resolved
KB4493472
Resolved:
April 09, 2019
10:00 AM PT

Opened:
February 12, 2019
10:00 AM PT
Embedded objects may display incorrectly
Any compound document (OLE) server application that places embedded objects into the Windows Metafile (WMF) using the PatBlt API may display embedded objects incorrectly. 
 
For example, if you paste a Microsoft Excel worksheet object into a Microsoft Word document, the cells may render with a different background color. 
 
Affected platforms:  
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10, version 1607; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 10 Enterprise LTSB 2015; Windows 8.1; Windows 7 SP1 
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2; Windows Server 2012; Windows Server 2008 R2 SP1; Windows Server 2008 SP2 
Resolution: This issue is resolved in KB4493472

Back to top
February 12, 2019
KB4486563
Resolved
KB4493472
Resolved:
April 09, 2019
10:00 AM PT

Opened:
February 12, 2019
10:00 AM PT
Internet Explorer may fail to load images
After installing KB4486563, Internet Explorer may fail to load images with a backslash (\\) in their relative source path.

Affected platforms: 
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10, version 1607; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 10 Enterprise LTSB 2015; Windows 8.1; Windows 7 SP1 
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2; Windows Server 2008 R2 SP1 
Resolution: This issue is resolved in KB4486565.

Back to top
February 12, 2019
KB4486563
Resolved
KB4486565
Resolved:
February 19, 2019
02:00 PM PT

Opened:
February 12, 2019
10:00 AM PT
Applications using Microsoft Jet database and Access 95 file format stop working
Applications that use a Microsoft Jet database with the Microsoft Access 95 file format may randomly stop working.

Affected platforms: 
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10, version 1607; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 10 Enterprise LTSB 2015; Windows 7 SP1 
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2008 R2 SP1 
Resolution: This issue is resolved in KB4486565.

Back to top
February 12, 2019
KB4486563
Resolved
KB4486565
Resolved:
February 19, 2019
02:00 PM PT

Opened:
February 12, 2019
10:00 AM PT
diff --git a/windows/release-information/status-windows-10-1607-and-windows-server-2016.yml b/windows/release-information/status-windows-10-1607-and-windows-server-2016.yml index 81bcba1cf5..9be29baa01 100644 --- a/windows/release-information/status-windows-10-1607-and-windows-server-2016.yml +++ b/windows/release-information/status-windows-10-1607-and-windows-server-2016.yml @@ -86,7 +86,7 @@ sections: - type: markdown text: " - +
DetailsOriginating updateStatusHistory
Zone transfers over TCP may fail
Zone transfers between primary and secondary DNS servers over the Transmission Control Protocol (TCP) may fail after installing KB4493473
 
Affected platforms:  
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1607; Windows 10 Enterprise LTSC 2016 
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016 
Next steps: Microsoft is working on a resolution and will provide an update in an upcoming release. 

Back to top
OS Build 14393.2941

April 25, 2019
KB4493473
Investigating
Last updated:
April 25, 2019
02:00 PM PT

Opened:
April 25, 2019
02:00 PM PT
Zone transfers over TCP may fail
Zone transfers between primary and secondary DNS servers over the Transmission Control Protocol (TCP) may fail after installing KB4493473
 
Affected platforms:  
  • Client: Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1607; Windows 10 Enterprise LTSC 2016 
  • Server: Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016 
Next steps: Microsoft is working on a resolution and will provide an update in an upcoming release. 

Back to top
OS Build 14393.2941

April 25, 2019
KB4493473
Investigating
Last updated:
April 25, 2019
02:00 PM PT

Opened:
April 25, 2019
02:00 PM PT
Embedded objects may display incorrectly
Any compound document (OLE) server application that places embedded objects into the Windows Metafile (WMF) using the PatBlt API may display embedded objects incorrectly. 
 
For example, if you paste a Microsoft Excel worksheet object into a Microsoft Word document, the cells may render with a different background color. 
 
Affected platforms:  
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10, version 1607; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 10 Enterprise LTSB 2015; Windows 8.1; Windows 7 SP1 
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2; Windows Server 2012; Windows Server 2008 R2 SP1; Windows Server 2008 SP2 
Resolution: This issue is resolved in KB4493470

Back to top
OS Build 14393.2791

February 12, 2019
KB4487026
Resolved
KB4493470
Resolved:
April 09, 2019
10:00 AM PT

Opened:
April 29, 2019
12:43 AM PT
" diff --git a/windows/release-information/status-windows-10-1709.yml b/windows/release-information/status-windows-10-1709.yml index 8f7a6f1ec8..7f9f310686 100644 --- a/windows/release-information/status-windows-10-1709.yml +++ b/windows/release-information/status-windows-10-1709.yml @@ -82,7 +82,7 @@ sections: - type: markdown text: " - +
DetailsOriginating updateStatusHistory
Zone transfers over TCP may fail
Zone transfers between primary and secondary DNS servers over the Transmission Control Protocol (TCP) may fail after installing KB4493440
 
Affected platforms:  
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1607; Windows 10 Enterprise LTSC 2016 
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016 
Next steps: Microsoft is working on a resolution and will provide an update in an upcoming release. 

Back to top
OS Build 16299.1127

April 25, 2019
KB4493440
Investigating
Last updated:
April 25, 2019
02:00 PM PT

Opened:
April 25, 2019
02:00 PM PT
Zone transfers over TCP may fail
Zone transfers between primary and secondary DNS servers over the Transmission Control Protocol (TCP) may fail after installing KB4493440
 
Affected platforms:  
  • Client: Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1607; Windows 10 Enterprise LTSC 2016 
  • Server: Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016 
Next steps: Microsoft is working on a resolution and will provide an update in an upcoming release. 

Back to top
OS Build 16299.1127

April 25, 2019
KB4493440
Investigating
Last updated:
April 25, 2019
02:00 PM PT

Opened:
April 25, 2019
02:00 PM PT
" diff --git a/windows/release-information/status-windows-10-1803.yml b/windows/release-information/status-windows-10-1803.yml index f2b56f713a..ba58d76fc8 100644 --- a/windows/release-information/status-windows-10-1803.yml +++ b/windows/release-information/status-windows-10-1803.yml @@ -84,7 +84,7 @@ sections: - type: markdown text: " - +
DetailsOriginating updateStatusHistory
Zone transfers over TCP may fail
Zone transfers between primary and secondary DNS servers over the Transmission Control Protocol (TCP) may fail after installing KB4493437
 
Affected platforms:  
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1607; Windows 10 Enterprise LTSC 2016 
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016 
Next steps: Microsoft is working on a resolution and will provide an update in an upcoming release. 

Back to top
OS Build 17134.753

April 25, 2019
KB4493437
Investigating
Last updated:
April 25, 2019
02:00 PM PT

Opened:
April 25, 2019
02:00 PM PT
Zone transfers over TCP may fail
Zone transfers between primary and secondary DNS servers over the Transmission Control Protocol (TCP) may fail after installing KB4493437
 
Affected platforms:  
  • Client: Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1607; Windows 10 Enterprise LTSC 2016 
  • Server: Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016 
Next steps: Microsoft is working on a resolution and will provide an update in an upcoming release. 

Back to top
OS Build 17134.753

April 25, 2019
KB4493437
Investigating
Last updated:
April 25, 2019
02:00 PM PT

Opened:
April 25, 2019
02:00 PM PT
" diff --git a/windows/release-information/status-windows-7-and-windows-server-2008-r2-sp1.yml b/windows/release-information/status-windows-7-and-windows-server-2008-r2-sp1.yml index eef4f70da6..e035655450 100644 --- a/windows/release-information/status-windows-7-and-windows-server-2008-r2-sp1.yml +++ b/windows/release-information/status-windows-7-and-windows-server-2008-r2-sp1.yml @@ -109,7 +109,7 @@ sections: - type: markdown text: " - +
DetailsOriginating updateStatusHistory
Embedded objects may display incorrectly
Any compound document (OLE) server application that places embedded objects into the Windows Metafile (WMF) using the PatBlt API may display embedded objects incorrectly. 
 
For example, if you paste a Microsoft Excel worksheet object into a Microsoft Word document, the cells may render with a different background color. 
 
Affected platforms:  
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10, version 1607; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 10 Enterprise LTSB 2015; Windows 8.1; Windows 7 SP1  
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2; Windows Server 2012; Windows Server 2008 R2 SP1; Windows Server 2008 SP2  
Resolution: This issue is resolved in KB4493472

Back to top
February 12, 2019
KB4486563
Resolved
KB4493472
Resolved:
April 09, 2019
10:00 AM PT

Opened:
February 12, 2019
10:00 AM PT
Embedded objects may display incorrectly
Any compound document (OLE) server application that places embedded objects into the Windows Metafile (WMF) using the PatBlt API may display embedded objects incorrectly. 
 
For example, if you paste a Microsoft Excel worksheet object into a Microsoft Word document, the cells may render with a different background color. 
 
Affected platforms:  
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10, version 1607; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 10 Enterprise LTSB 2015; Windows 8.1; Windows 7 SP1 
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2; Windows Server 2012; Windows Server 2008 R2 SP1; Windows Server 2008 SP2 
Resolution: This issue is resolved in KB4493472

Back to top
February 12, 2019
KB4486563
Resolved
KB4493472
Resolved:
April 09, 2019
10:00 AM PT

Opened:
February 12, 2019
10:00 AM PT
" From 6ff865cc648be234d88654af371ea8014e7d14a9 Mon Sep 17 00:00:00 2001 From: Dani Halfin Date: Mon, 29 Apr 2019 17:30:03 -0700 Subject: [PATCH 242/724] fixing toc to old release-info + cats checks --- windows/hub/TOC.md | 2 +- windows/hub/release-information.md | 30 +++++++++++++++++++ ...windows-8.1-and-windows-server-2012-r2.yml | 6 ++-- 3 files changed, 34 insertions(+), 4 deletions(-) create mode 100644 windows/hub/release-information.md diff --git a/windows/hub/TOC.md b/windows/hub/TOC.md index a811ff7119..1883594880 100644 --- a/windows/hub/TOC.md +++ b/windows/hub/TOC.md @@ -1,6 +1,6 @@ # [Windows 10 and Windows 10 Mobile](index.md) ## [What's new](/windows/whats-new) -## [Release information](/windows/release-information) +## [Release information](release-information.md) ## [Deployment](/windows/deployment) ## [Configuration](/windows/configuration) ## [Client management](/windows/client-management) diff --git a/windows/hub/release-information.md b/windows/hub/release-information.md new file mode 100644 index 0000000000..2aa38be1de --- /dev/null +++ b/windows/hub/release-information.md @@ -0,0 +1,30 @@ +--- +title: Windows 10 - release information +description: Learn release information for Windows 10 releases +keywords: ["Windows 10", "Windows 10 October 2018 Update"] +ms.prod: w10 +layout: LandingPage +ms.topic: landing-page +ms.mktglfcycl: deploy +ms.sitesec: library +author: lizap +ms.author: elizapo +ms.localizationpriority: high +--- +# Windows 10 release information + +Feature updates for Windows 10 are released twice a year, targeting March and September, via the Semi-Annual Channel (SAC) and will be serviced with monthly quality updates for 18 months from the date of the release. We recommend that you begin deployment of each SAC release immediately to devices selected for early adoption and ramp up to full deployment at your discretion. This will enable you to gain access to new features, experiences, and integrated security as soon as possible. + +Starting with Windows 10, version 1809, feature updates for Windows 10 Enterprise and Education editions with a targeted release month of September will be serviced for 30 months from their release date. For information about servicing timelines, see the [Windows lifecycle fact sheet](https://support.microsoft.com/help/13853). + +>[!NOTE] +>If you are not using Windows Update for Business today, the "Semi-Annual Channel (Targeted)" servicing option has no impact on when your devices will be updated. It merely reflects a milestone for the semi-annual release, the period of time during which Microsoft recommends that your IT team make the release available to specific, "targeted" devices for the purpose of validating and generating data in order to get to a broad deployment decision. For more information, see [this blog post](https://techcommunity.microsoft.com/t5/Windows-IT-Pro-Blog/Windows-Update-for-Business-and-the-retirement-of-SAC-T/ba-p/339523). + + +
+
+ + +
+ + diff --git a/windows/release-information/resolved-issues-windows-8.1-and-windows-server-2012-r2.yml b/windows/release-information/resolved-issues-windows-8.1-and-windows-server-2012-r2.yml index da694ca9c8..58f6c1cbac 100644 --- a/windows/release-information/resolved-issues-windows-8.1-and-windows-server-2012-r2.yml +++ b/windows/release-information/resolved-issues-windows-8.1-and-windows-server-2012-r2.yml @@ -1,12 +1,12 @@ ### YamlMime:YamlDocument documentType: LandingData -title: Resolved issues in Windows 7 and Windows Server 2008 R2 SP1 +title: Resolved issues in Windows 8.1 and Windows Server 2012 R2 metadata: document_id: - title: Resolved issues in Windows 7 and Windows Server 2008 R2 SP1 + title: Resolved issues in Windows 8.1 and Windows Server 2012 R2 description: Resolved issues in Windows 8.1 and Windows Server 2012 R2 - keywords: ["Resolved issues in Windows 7", "Windows 7", "Windows Server 2012 R2"] + keywords: ["Resolved issues in Windows 8.1", "Windows 8.1", "Windows Server 2012 R2"] ms.localizationpriority: high author: greg-lindsay ms.author: greglin From f4ae0248d1e1d33702338ad1379df8aaad6e112e Mon Sep 17 00:00:00 2001 From: "Nisha Mittal (Wipro Ltd.)" Date: Mon, 29 Apr 2019 18:02:59 -0700 Subject: [PATCH 243/724] Fixed few more issues --- .../release-information/resolved-issues-windows-10-1507.yml | 6 +++--- .../release-information/resolved-issues-windows-10-1607.yml | 4 ++-- .../release-information/resolved-issues-windows-10-1703.yml | 6 +++--- .../release-information/resolved-issues-windows-10-1709.yml | 4 ++-- .../release-information/resolved-issues-windows-10-1803.yml | 4 ++-- ...olved-issues-windows-10-1809-and-windows-server-2019.yml | 6 +++--- ...lved-issues-windows-7-and-windows-server-2008-r2-sp1.yml | 4 ++-- windows/release-information/status-windows-10-1507.yml | 6 +++--- .../status-windows-10-1607-and-windows-server-2016.yml | 4 ++-- windows/release-information/status-windows-10-1703.yml | 6 +++--- windows/release-information/status-windows-10-1709.yml | 4 ++-- windows/release-information/status-windows-10-1803.yml | 4 ++-- .../status-windows-10-1809-and-windows-server-2019.yml | 4 ++-- .../status-windows-7-and-windows-server-2008-r2-sp1.yml | 6 +++--- .../status-windows-8.1-and-windows-server-2012-r2.yml | 4 ++-- windows/release-information/status-windows-server-2012.yml | 4 ++-- 16 files changed, 38 insertions(+), 38 deletions(-) diff --git a/windows/release-information/resolved-issues-windows-10-1507.yml b/windows/release-information/resolved-issues-windows-10-1507.yml index cc1193bf44..669c290b8b 100644 --- a/windows/release-information/resolved-issues-windows-10-1507.yml +++ b/windows/release-information/resolved-issues-windows-10-1507.yml @@ -58,7 +58,7 @@ sections: - type: markdown text: " - +
DetailsOriginating updateStatusHistory
Embedded objects may display incorrectly
Any compound document (OLE) server application that places embedded objects into the Windows Metafile (WMF) using the PatBlt API may display embedded objects incorrectly. 
 
For example, if you paste a Microsoft Excel worksheet object into a Microsoft Word document, the cells may render with a different background color. 
 
Affected platforms:  
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10, version 1607; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 10 Enterprise LTSB 2015; Windows 8.1; Windows 7 SP1 
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2; Windows Server 2012; Windows Server 2008 R2 SP1; Windows Server 2008 SP2 
Resolution: This issue is resolved in KB4493475

Back to top
OS Build 10240.18132

February 12, 2019
KB4487018
Resolved
KB4493475
Resolved:
April 09, 2019
10:00 AM PT

Opened:
April 29, 2019
12:45 AM PT
Embedded objects may display incorrectly
Any compound document (OLE) server application that places embedded objects into the Windows Metafile (WMF) using the PatBlt API may display embedded objects incorrectly. 
 
For example, if you paste a Microsoft Excel worksheet object into a Microsoft Word document, the cells may render with a different background color. 
 
Affected platforms:  
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10, version 1607; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 10 Enterprise LTSB 2015; Windows 8.1; Windows 7 SP1
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2; Windows Server 2012; Windows Server 2008 R2 SP1; Windows Server 2008 SP2 
Resolution: This issue is resolved in KB4493475

Back to top
OS Build 10240.18132

February 12, 2019
KB4487018
Resolved
KB4493475
Resolved:
April 09, 2019
10:00 AM PT

Opened:
April 29, 2019
12:45 AM PT
" @@ -76,7 +76,7 @@ sections: - type: markdown text: " - + @@ -89,7 +89,7 @@ sections: text: "
DetailsOriginating updateStatusHistory
Applications using Microsoft Jet database and Access 95 file format stop working
Applications that use a Microsoft Jet database with the Microsoft Access 95 file format may randomly stop working.

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10, version 1607; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 10 Enterprise LTSB 2015; Windows 7 SP1
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2; Windows Server 2012; Windows Server 2008 R2 SP1; Windows Server 2008 SP2
Resolution: This issue is resolved in KB4489872.

Back to top
OS Build 10240.18132

February 12, 2019
KB4487018
Resolved
KB4489872
Resolved:
March 12, 2019
10:00 AM PT

Opened:
February 12, 2019
10:00 AM PT
Applications using Microsoft Jet database and Access 95 file format stop working
Applications that use a Microsoft Jet database with the Microsoft Access 95 file format may randomly stop working.

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10, version 1607; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 10 Enterprise LTSB 2015; Windows 7 SP1
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012; Windows Server 2008 R2 SP1; Windows Server 2008 SP2
Resolution: This issue is resolved in KB4489872.

Back to top
OS Build 10240.18132

February 12, 2019
KB4487018
Resolved
KB4489872
Resolved:
March 12, 2019
10:00 AM PT

Opened:
February 12, 2019
10:00 AM PT
Error 1309 when installing/uninstalling MSI or MSP files
After installing KB4487018, users may receive “Error 1309” while installing or uninstalling certain types of MSI and MSP files.

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10, version 1607; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 10 Enterprise LTSB 2015; Windows 8.1
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2; Windows Server 2012
Resolution: This issue is resolved in KB4489872.

Back to top
OS Build 10240.18132

February 12, 2019
KB4487018
Resolved
KB4489872
Resolved:
March 12, 2019
10:00 AM PT

Opened:
February 12, 2019
10:00 AM PT
First character of Japanese era name not recognized
After installing KB4487018, the first character of the Japanese era name is not recognized as an abbreviation and may cause date parsing issues.

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10, version 1607; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 10 Enterprise LTSB 2015; Windows 8.1; Windows 7 SP1
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2; Windows Server 2012; Windows Server 2008 R2 SP1; Windows Server 2008 SP2
Resolution: This issue is resolved in KB4489872.

Back to top
OS Build 10240.18132

February 12, 2019
KB4487018
Resolved
KB4489872
Resolved:
March 12, 2019
10:00 AM PT

Opened:
February 12, 2019
10:00 AM PT
Internet Explorer may fail to load images
After installing KB4487018, Internet Explorer may fail to load images with a backslash (\\) in their relative source path.

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10, version 1607; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 10 Enterprise LTSB 2015; Windows 8.1; Windows 7 SP1
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2; Windows Server 2008 R2 SP1
Resolution: This issue is resolved in KB4491101.

Back to top
OS Build 10240.18132

February 12, 2019
KB4487018
Resolved
KB4491101
Resolved:
February 21, 2019
02:00 PM PT

Opened:
February 12, 2019
10:00 AM PT
- +
DetailsOriginating updateStatusHistory
MSXML6 may cause applications to stop responding
After installing KB4480962, MSXML6 causes applications to stop responding if an exception was thrown during node operations, such as appendChild(), insertBefore(), and moveNode().

The Group Policy editor may stop responding when editing a Group Policy Object (GPO) that contains Group Policy Preferences (GPP) for Internet Explorer 10 settings.

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10, version 1607; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 10 Enterprise LTSB 2015; Windows 8.1
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2; Windows Server 2012
Resolution: This issue was resolved in KB4493475.

Back to top
OS Build 10240.18094

January 08, 2019
KB4480962
Resolved
KB4493475
Resolved:
April 09, 2019
10:00 AM PT

Opened:
January 08, 2019
10:00 AM PT
Applications using Microsoft Jet database fail to open
Applications that use a Microsoft Jet database with the Microsoft Access 97 file format may fail to open if the database has column names greater than 32 characters. The database will fail to open with the error, \"Unrecognized Database Format\".

Affected platforms:
  • Client: Windows 10, version 1709; Windows 10, version 1703; Windows 10, version 1607; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 10 Enterprise LTSB 2015; Windows 8.1; Windows 7 SP1
  • Server: Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2; Windows Server 2008 R2 SP1
Resolution: This issue is resolved in KB4487018.

Back to top
OS Build 10240.18094

January 08, 2019
KB4480962
Resolved
KB4487018
Resolved:
February 12, 2019
10:00 AM PT

Opened:
January 08, 2019
10:00 AM PT
Applications using Microsoft Jet database fail to open
Applications that use a Microsoft Jet database with the Microsoft Access 97 file format may fail to open if the database has column names greater than 32 characters. The database will fail to open with the error, \"Unrecognized Database Format\".

Affected platforms:
  • Client: Windows 10, version 1709; Windows 10, version 1703; Windows 10, version 1607; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 10 Enterprise LTSB 2015; Windows 8.1; Windows 7 SP1
  • Server: Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2; Windows Server 2012; Windows Server 2008 R2 SP1; Windows Server 2008 SP2
Resolution: This issue is resolved in KB4487018.

Back to top
OS Build 10240.18094

January 08, 2019
KB4480962
Resolved
KB4487018
Resolved:
February 12, 2019
10:00 AM PT

Opened:
January 08, 2019
10:00 AM PT
Unable to access hotspots with third-party applications
After installing KB4480962, third-party applications may have difficulty authenticating hotspots.

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10, version 1607; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 10 Enterprise LTSB 2015; Windows 8.1
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2; Windows Server 2012
Resolution: This issue is resolved in KB4487018.

Back to top
OS Build 10240.18094

January 08, 2019
KB4480962
Resolved
KB4487018
Resolved:
February 12, 2019
10:00 AM PT

Opened:
January 08, 2019
10:00 AM PT
" diff --git a/windows/release-information/resolved-issues-windows-10-1607.yml b/windows/release-information/resolved-issues-windows-10-1607.yml index 6beb9c7a5d..ce9e393e85 100644 --- a/windows/release-information/resolved-issues-windows-10-1607.yml +++ b/windows/release-information/resolved-issues-windows-10-1607.yml @@ -86,7 +86,7 @@ sections: - +
DetailsOriginating updateStatusHistory
Issue hosting multiple terminal server sessions and a user logs off on Windows Server
In some cases, Windows Server will stop working and restart when hosting multiple terminal server sessions and a user logs off. The faulting driver is win32kbase.sys.

Affected platforms:
  • Client: Windows 10, version 1607; Windows 10 Enterprise LTSC 2016
  • Server: Windows Server 2016
Resolution: This issue is resolved in KB4489882.

Back to top
OS Build 14393.2828

February 19, 2019
KB4487006
Resolved
KB4489882
Resolved:
March 12, 2019
10:00 AM PT

Opened:
February 19, 2019
02:00 PM PT
Error 1309 when installing/uninstalling MSI or MSP files
After installing KB4487026, users may receive “Error 1309” while installing or uninstalling certain types of MSI and MSP files.

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10, version 1607; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 10 Enterprise LTSB 2015; Windows 8.1
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2; Windows Server 2012
Resolution: This issue is resolved in KB4489882.

Back to top
OS Build 14393.2791

February 12, 2019
KB4487026
Resolved
KB4489882
Resolved:
March 12, 2019
10:00 AM PT

Opened:
February 12, 2019
10:00 AM PT
Applications using Microsoft Jet database and Access 95 file format stop working
Applications that use a Microsoft Jet database with the Microsoft Access 95 file format may randomly stop working.

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10, version 1607; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 10 Enterprise LTSB 2015; Windows 7 SP1
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2; Windows Server 2012; Windows Server 2008 R2 SP1; Windows Server 2008 SP2
Resolution: This issue is resolved in KB4487006.

Back to top
OS Build 14393.2791

February 12, 2019
KB4487026
Resolved
KB4487006
Resolved:
February 19, 2019
02:00 PM PT

Opened:
February 12, 2019
10:00 AM PT
Applications using Microsoft Jet database and Access 95 file format stop working
Applications that use a Microsoft Jet database with the Microsoft Access 95 file format may randomly stop working.

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10, version 1607; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 10 Enterprise LTSB 2015; Windows 7 SP1
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012; Windows Server 2008 R2 SP1; Windows Server 2008 SP2
Resolution: This issue is resolved in KB4487006.

Back to top
OS Build 14393.2791

February 12, 2019
KB4487026
Resolved
KB4487006
Resolved:
February 19, 2019
02:00 PM PT

Opened:
February 12, 2019
10:00 AM PT
Internet Explorer may fail to load images
After installing KB4487026, Internet Explorer may fail to load images with a backslash (\\) in their relative source path.

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10, version 1607; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 10 Enterprise LTSB 2015; Windows 8.1; Windows 7 SP1
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2; Windows Server 2008 R2 SP1
Resolution: This issue is resolved in KB4487006.

Back to top
OS Build 14393.2791

February 12, 2019
KB4487026
Resolved
KB4487006
Resolved:
February 19, 2019
02:00 PM PT

Opened:
February 12, 2019
10:00 AM PT
" @@ -128,7 +128,7 @@ sections: - type: markdown text: " - +
DetailsOriginating updateStatusHistory
Promotions that create non-root domains fail with optional features enabled
After installing KB4457127, Windows Server 2016 promotions that create non-root domains fail in forests in which optional features like Active Directory recycle have been enabled. The error is, “The replication operation encountered a database error.”

Affected platforms:
  • Server: Windows Server 2016
Resolution: This issue is resolved in KB4467684.

Back to top
OS Build 14393.2515

September 20, 2018
KB4457127
Resolved
KB4467684
Resolved:
November 27, 2018
10:00 AM PT

Opened:
September 20, 2018
10:00 AM PT
Promotions that create non-root domains fail with optional features enabled
After installing KB4457127, Windows Server 2016 promotions that create non-root domains fail in forests in which optional features like Active Directory recycle have been enabled. The error is, “The replication operation encountered a database error.”

Affected platforms:
  • Client: Windows 10, version 1607; Windows 10 Enterprise LTSC 2016
  • Server: Windows Server 2016
Resolution: This issue is resolved in KB4467684.

Back to top
OS Build 14393.2515

September 20, 2018
KB4457127
Resolved
KB4467684
Resolved:
November 27, 2018
10:00 AM PT

Opened:
September 20, 2018
10:00 AM PT
" diff --git a/windows/release-information/resolved-issues-windows-10-1703.yml b/windows/release-information/resolved-issues-windows-10-1703.yml index 7ec02137af..1abdfc3ae9 100644 --- a/windows/release-information/resolved-issues-windows-10-1703.yml +++ b/windows/release-information/resolved-issues-windows-10-1703.yml @@ -75,7 +75,7 @@ sections:
Embedded objects may display incorrectly
Any compound document (OLE) server application that places embedded objects into the Windows Metafile (WMF) using the PatBlt API may display embedded objects incorrectly. 
 
For example, if you paste a Microsoft Excel worksheet object into a Microsoft Word document, the cells may render with a different background color. 
 
Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10, version 1607; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 10 Enterprise LTSB 2015; Windows 8.1; Windows 7 SP1 
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2; Windows Server 2012; Windows Server 2008 R2 SP1; Windows Server 2008 SP2 
Resolution: This issue is resolved in KB4493474

Back to topOS Build 15063.1631

February 12, 2019
KB4487020Resolved
KB4493474Resolved:
April 09, 2019
10:00 AM PT

Opened:
February 12, 2019
10:00 AM PT
Error 1309 when installing/uninstalling MSI or MSP files
After installing KB4487011, users may receive “Error 1309” while installing or uninstalling certain types of MSI and MSP files.

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10, version 1607; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 10 Enterprise LTSB 2015; Windows 8.1
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2; Windows Server 2012
Resolution: This issue is resolved in KB4489871.

Back to topOS Build 15063.1659

February 19, 2019
KB4487011Resolved
KB4489871Resolved:
March 12, 2019
10:00 AM PT

Opened:
February 19, 2019
02:00 PM PT
Internet Explorer may fail to load images
After installing KB4487020, Internet Explorer may fail to load images with a backslash (\\) in their relative source path.

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10, version 1607; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 10 Enterprise LTSB 2015; Windows 8.1; Windows 7 SP1
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2; Windows Server 2008 R2 SP1
Resolution: This issue is resolved in KB4487011.

Back to topOS Build 15063.1631

February 12, 2019
KB4487020Resolved
KB4487011Resolved:
February 19, 2019
02:00 PM PT

Opened:
February 12, 2019
10:00 AM PT -
Applications using Microsoft Jet database and Access 95 file format stop working
Applications that use a Microsoft Jet database with the Microsoft Access 95 file format may randomly stop working.

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10, version 1607; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 10 Enterprise LTSB 2015; Windows 7 SP1
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2; Windows Server 2012; Windows Server 2008 R2 SP1; Windows Server 2008 SP2
Resolution: This issue is resolved in KB4487011.

Back to topOS Build 15063.1631

February 12, 2019
KB4487020Resolved
KB4487011Resolved:
February 19, 2019
02:00 PM PT

Opened:
February 12, 2019
10:00 AM PT +
Applications using Microsoft Jet database and Access 95 file format stop working
Applications that use a Microsoft Jet database with the Microsoft Access 95 file format may randomly stop working.

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10, version 1607; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 10 Enterprise LTSB 2015; Windows 7 SP1
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012; Windows Server 2008 R2 SP1; Windows Server 2008 SP2
Resolution: This issue is resolved in KB4487011.

Back to topOS Build 15063.1631

February 12, 2019
KB4487020Resolved
KB4487011Resolved:
February 19, 2019
02:00 PM PT

Opened:
February 12, 2019
10:00 AM PT " @@ -84,10 +84,10 @@ sections: - type: markdown text: " - + - +
DetailsOriginating updateStatusHistory
MSXML6 may cause applications to stop responding
After installing KB4480973, MSXML6 causes applications to stop responding if an exception was thrown during node operations, such as appendChild(), insertBefore(), and moveNode().

The Group Policy editor may stop responding when editing a Group Policy Object (GPO) that contains Group Policy Preferences (GPP) for Internet Explorer 10 settings.

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10, version 1607; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 10 Enterprise LTSB 2015; Windows 8.1
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2
Resolution: This issue was resolved in KB4493474.

Back to top
OS Build 15063.1563

January 08, 2019
KB4480973
Resolved
KB4493474
Resolved:
April 09, 2019
10:00 AM PT

Opened:
January 08, 2019
10:00 AM PT
MSXML6 may cause applications to stop responding
After installing KB4480973, MSXML6 causes applications to stop responding if an exception was thrown during node operations, such as appendChild(), insertBefore(), and moveNode().

The Group Policy editor may stop responding when editing a Group Policy Object (GPO) that contains Group Policy Preferences (GPP) for Internet Explorer 10 settings.

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10, version 1607; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 10 Enterprise LTSB 2015; Windows 8.1
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2; Windows Server 2012
Resolution: This issue was resolved in KB4493474.

Back to top
OS Build 15063.1563

January 08, 2019
KB4480973
Resolved
KB4493474
Resolved:
April 09, 2019
10:00 AM PT

Opened:
January 08, 2019
10:00 AM PT
First character of the Japanese era name not recognized as an abbreviation
After installing KB4480959, the first character of the Japanese era name is not recognized as an abbreviation and may cause date parsing issues.

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10, version 1607; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 10 Enterprise LTSB 2015; Windows 8.1; Windows 7 SP1
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2; Windows Server 2012; Windows Server 2008 R2 SP1; Windows Server 2008 SP2
Resolution: This issue is resolved in KB4487011.

Back to top
OS Build 15063.1596

January 15, 2019
KB4480959
Resolved
KB4487011
Resolved:
February 19, 2019
02:00 PM PT

Opened:
January 15, 2019
10:00 AM PT
Applications using Microsoft Jet database fail to open
Applications that use a Microsoft Jet database with the Microsoft Access 97 file format may fail to open if the database has column names greater than 32 characters. The database will fail to open with the error, “Unrecognized Database Format”.

Affected platforms:
  • Client: Windows 10, version 1709; Windows 10, version 1703; Windows 10, version 1607; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 10 Enterprise LTSB 2015; Windows 8.1; Windows 7 SP1 
  • Server: Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2; Windows Server 2012; Windows Server 2008 R2 SP1; Windows Server 2008 SP2
Resolution: This issue is resolved in KB4487020.

Back to top
OS Build 15063.1563

January 08, 2019
KB4480973
Resolved
KB4487020
Resolved:
February 12, 2019
10:00 AM PT

Opened:
January 08, 2019
10:00 AM PT
Webpages become unresponsive in Microsoft Edge
After installing KB4480973, some Microsoft Edge users report that they:
  • Cannot load webpages using a local IP address.
  • Cannot load webpages on the Internet using a VPN connection.
Browsing fails or the webpage may become unresponsive.

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709
Resolution: This issue is resolved in KB4487020.

Back to top
OS Build 15063.1563

January 08, 2019
KB4480973
Resolved
KB4487020
Resolved:
February 12, 2019
10:00 AM PT

Opened:
January 08, 2019
10:00 AM PT
Webpages become unresponsive in Microsoft Edge
After installing KB4480973, some Microsoft Edge users report that they:
  • Cannot load webpages using a local IP address.
  • Cannot load webpages on the Internet using a VPN connection.
Browsing fails or the webpage may become unresponsive.

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10, version 1607; Windows 10 Enterprise LTSC 2016
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016
Resolution: This issue is resolved in KB4487020.

Back to top
OS Build 15063.1563

January 08, 2019
KB4480973
Resolved
KB4487020
Resolved:
February 12, 2019
10:00 AM PT

Opened:
January 08, 2019
10:00 AM PT
Unable to access hotspots with third-party applications
After installing KB4480973, third-party applications may have difficulty authenticating hotspots.

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10, version 1607; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 10 Enterprise LTSB 2015; Windows 8.1
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2; Windows Server 2012
Resolution: This issue is resolved in KB4480959.

Back to top
OS Build 15063.1563

January 08, 2019
KB4480973
Resolved
KB4480959
Resolved:
January 15, 2019
10:00 AM PT

Opened:
January 08, 2019
10:00 AM PT
" diff --git a/windows/release-information/resolved-issues-windows-10-1709.yml b/windows/release-information/resolved-issues-windows-10-1709.yml index 335de5ff85..54eb385db9 100644 --- a/windows/release-information/resolved-issues-windows-10-1709.yml +++ b/windows/release-information/resolved-issues-windows-10-1709.yml @@ -75,7 +75,7 @@ sections: - +
DetailsOriginating updateStatusHistory
Embedded objects may display incorrectly
Any compound document (OLE) server application that places embedded objects into the Windows Metafile (WMF) using the PatBlt API may display embedded objects incorrectly. 
 
For example, if you paste a Microsoft Excel worksheet object into a Microsoft Word document, the cells may render with a different background color. 
 
Affected platforms:  
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10, version 1607; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 10 Enterprise LTSB 2015; Windows 8.1; Windows 7 SP1 
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2; Windows Server 2012; Windows Server 2008 R2 SP1; Windows Server 2008 SP2 
Resolution: This issue is resolved in KB4493441

Back to top
OS Build 16299.967

February 12, 2019
KB4486996
Resolved
KB4493441
Resolved:
April 09, 2019
10:00 AM PT

Opened:
February 12, 2019
10:00 AM PT
Error 1309 when installing/uninstalling MSI or MSP files
After installing KB4486996, users may receive “Error 1309” while installing or uninstalling certain types of MSI and MSP files.

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10, version 1607; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 10 Enterprise LTSB 2015; Windows 8.1
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2; Windows Server 2012
Resolution: This issue is resolved in KB4489886.

Back to top
OS Build 16299.967

February 12, 2019
KB4486996
Resolved
KB4489886
Resolved:
March 12, 2019
10:00 AM PT

Opened:
February 12, 2019
10:00 AM PT
Applications using Microsoft Jet database and Access 95 file format stop working
Applications that use a Microsoft Jet database with the Microsoft Access 95 file format may randomly stop working.

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10, version 1607; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 10 Enterprise LTSB 2015; Windows 7 SP1
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2; Windows Server 2012; Windows Server 2008 R2 SP1; Windows Server 2008 SP2
Resolution: This issue is resolved in KB4487021.

Back to top
OS Build 16299.967

February 12, 2019
KB4486996
Resolved
KB4487021
Resolved:
February 19, 2019
02:00 PM PT

Opened:
February 12, 2019
10:00 AM PT
Applications using Microsoft Jet database and Access 95 file format stop working
Applications that use a Microsoft Jet database with the Microsoft Access 95 file format may randomly stop working.

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10, version 1607; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 10 Enterprise LTSB 2015; Windows 7 SP1
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012; Windows Server 2008 R2 SP1; Windows Server 2008 SP2
Resolution: This issue is resolved in KB4487021.

Back to top
OS Build 16299.967

February 12, 2019
KB4486996
Resolved
KB4487021
Resolved:
February 19, 2019
02:00 PM PT

Opened:
February 12, 2019
10:00 AM PT
Internet Explorer may fail to load images
After installing KB4486996, Internet Explorer may fail to load images with a backslash (\\) in their relative source path.

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10, version 1607; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 10 Enterprise LTSB 2015; Windows 8.1; Windows 7 SP1
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2; Windows Server 2008 R2 SP1
Resolution: This issue is resolved in KB4487021.

Back to top
OS Build 16299.967

February 12, 2019
KB4486996
Resolved
KB4487021
Resolved:
February 19, 2019
02:00 PM PT

Opened:
February 12, 2019
10:00 AM PT
" @@ -88,7 +88,7 @@ sections:
MSXML6 causes applications to stop responding if an exception was thrown
After installing KB4480978, MSXML6 causes applications to stop responding if an exception was thrown during node operations, such as appendChild(), insertBefore(), and moveNode().

The Group Policy editor may stop responding when editing a Group Policy Object (GPO) that contains Group Policy Preferences (GPP) for Internet Explorer 10 settings.

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10, version 1607; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 10 Enterprise LTSB 2015; Windows 8.1
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2; Windows Server 2012
Resolution: This issue is resolved in KB4493441.

Back to topOS Build 16299.904

January 08, 2019
KB4480978Resolved
KB4493441Resolved:
April 09, 2019
10:00 AM PT

Opened:
January 08, 2019
10:00 AM PT
First character of the Japanese era name not recognized as an abbreviation
After installing KB4480967, the first character of the Japanese era name is not recognized as an abbreviation and may cause date parsing issues.

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10, version 1607; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 10 Enterprise LTSB 2015; Windows 8.1; Windows 7 SP1
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2; Windows Server 2012; Windows Server 2008 R2 SP1; Windows Server 2008 SP2
Resolution: This issue is resolved in KB4487021.

Back to topOS Build 16299.936

January 15, 2019
KB4480967Resolved
KB4487021Resolved:
February 19, 2019
02:00 PM PT

Opened:
January 15, 2019
10:00 AM PT
Applications using Microsoft Jet database fail to open
Applications that use a Microsoft Jet database with the Microsoft Access 97 file format may fail to open if the database has column names greater than 32 characters. The database will fail to open with the error, “Unrecognized Database Format.”

Affected platforms:
  • Client: Windows 10, version 1709; Windows 10, version 1703; Windows 10, version 1607; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 10 Enterprise LTSB 2015; Windows 8.1; Windows 7 SP1 
  • Server: Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2; Windows Server 2012; Windows Server 2008 R2 SP1; Windows Server 2008 SP2 
Resolution: This issue is resolved in KB4486996.

Back to topOS Build 16299.904

January 08, 2019
KB4480978Resolved
KB4486996Resolved:
February 12, 2019
10:00 AM PT

Opened:
January 08, 2019
10:00 AM PT -
Webpages become unresponsive in Microsoft Edge
Microsoft and ArcaBit have identified an issue on devices with ArcaBit antivirus software installed that may cause the system to become unresponsive upon restart after installing KB4493446.

Microsoft has temporarily blocked devices from receiving this update if ArcaBit antivirus software is installed.

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 8.1; Windows 7 SP1
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server 2012 R2; Windows Server 2008 R2 SP1
Workaround: ArcaBit has released an update to address this issue. For more information, see the Arcabit support article.

Back to topOS Build 16299.904

January 08, 2019
KB4480978Resolved
KB4486996Resolved:
February 12, 2019
10:00 AM PT

Opened:
January 08, 2019
10:00 AM PT +
Webpages become unresponsive in Microsoft Edge
Microsoft and ArcaBit have identified an issue on devices with ArcaBit antivirus software installed that may cause the system to become unresponsive upon restart after installing KB4493446.

Microsoft has temporarily blocked devices from receiving this update if ArcaBit antivirus software is installed.

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10, version 1607; Windows 10 Enterprise LTSC 2016
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016
Workaround: ArcaBit has released an update to address this issue. For more information, see the Arcabit support article.

Back to topOS Build 16299.904

January 08, 2019
KB4480978Resolved
KB4486996Resolved:
February 12, 2019
10:00 AM PT

Opened:
January 08, 2019
10:00 AM PT
Unable to access hotspots with third-party applications
After installing KB4480978, third-party applications may have difficulty authenticating hotspots.

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10, version 1607; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 10 Enterprise LTSB 2015; Windows 8.1
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2; Windows Server 2012
Resolution: This issue is resolved in KB4480967.

Back to topOS Build 16299.904

January 08, 2019
KB4480978Resolved
KB4480967Resolved:
January 15, 2019
10:00 AM PT

Opened:
January 08, 2019
10:00 AM PT " diff --git a/windows/release-information/resolved-issues-windows-10-1803.yml b/windows/release-information/resolved-issues-windows-10-1803.yml index 3ef64b032f..62c4545e79 100644 --- a/windows/release-information/resolved-issues-windows-10-1803.yml +++ b/windows/release-information/resolved-issues-windows-10-1803.yml @@ -91,8 +91,8 @@ sections: - - + +
DetailsOriginating updateStatusHistory
First character of the Japanese era name not recognized
After installing KB4480976, the first character of the Japanese era name is not recognized as an abbreviation and may cause date parsing issues.

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10, version 1607; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 10 Enterprise LTSB 2015; Windows 8.1; Windows 7 SP1
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2; Windows Server 2012; Windows Server 2008 R2 SP1; Windows Server 2008 SP2
Resolution: This issue is resolved in KB4487029

Back to top
OS Build 17134.556

January 15, 2019
KB4480976
Resolved
KB4487029
Resolved:
February 19, 2019
02:00 PM PT

Opened:
January 08, 2019
10:00 AM PT
MSXML6 may cause applications to stop responding
After installing KB4480966, MSXML6 causes applications to stop responding if an exception was thrown during node operations, such as appendChild(), insertBefore(), and moveNode().

The Group Policy editor may stop responding when editing a Group Policy Object (GPO) that contains Group Policy Preferences (GPP) for Internet Explorer 10 settings.

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10, version 1607; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 10 Enterprise LTSB 2015; Windows 8.1
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2; Windows Server 2012
Resolution: This issue was resolved in KB4493464

Back to top
OS Build 17134.523

January 08, 2019
KB4480966
Resolved
KB4493464
Resolved:
April 09, 2019
10:00 AM PT

Opened:
January 08, 2019
10:00 AM PT
Applications using Microsoft Jet database and Access 95 file format stop working
Applications that use a Microsoft Jet database with the Microsoft Access 95 file format may randomly stop working. 

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10, version 1607; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 10 Enterprise LTSB 2015; Windows 7 SP1
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2; Windows Server 2012; Windows Server 2008 R2 SP1; Windows Server 2008 SP2
Resolution: This issue is resolved in KB4487017.

Back to top
OS Build 17134.523

January 08, 2019
KB4480966
Resolved
KB4487017
Resolved:
February 12, 2019
10:00 AM PT

Opened:
January 08, 2019
10:00 AM PT
Webpages become unresponsive in Microsoft Edge
After installing KB4480966, some Microsoft Edge users report that they: 
  • Cannot load webpages using a local IP address. 
  • Cannot load webpages on the Internet using a VPN connection.  
Browsing fails or the webpage may become unresponsive. 

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709
Resolution: This issue is resolved in KB4487017

Back to top
OS Build 17134.523

January 08, 2019
KB4480966
Resolved
KB4487017
Resolved:
February 12, 2019
10:00 AM PT

Opened:
January 08, 2019
10:00 AM PT
Applications using Microsoft Jet database and Access 95 file format stop working
Applications that use a Microsoft Jet database with the Microsoft Access 95 file format may randomly stop working. 

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10, version 1607; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 10 Enterprise LTSB 2015; Windows 7 SP1
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012; Windows Server 2008 R2 SP1; Windows Server 2008 SP2
Resolution: This issue is resolved in KB4487017.

Back to top
OS Build 17134.523

January 08, 2019
KB4480966
Resolved
KB4487017
Resolved:
February 12, 2019
10:00 AM PT

Opened:
January 08, 2019
10:00 AM PT
Webpages become unresponsive in Microsoft Edge
After installing KB4480966, some Microsoft Edge users report that they: 
  • Cannot load webpages using a local IP address. 
  • Cannot load webpages on the Internet using a VPN connection.  
Browsing fails or the webpage may become unresponsive. 

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10, version 1607; Windows 10 Enterprise LTSC 2016
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016
Resolution: This issue is resolved in KB4487017

Back to top
OS Build 17134.523

January 08, 2019
KB4480966
Resolved
KB4487017
Resolved:
February 12, 2019
10:00 AM PT

Opened:
January 08, 2019
10:00 AM PT
Unable to access hotspots with third-party applications
After installing KB4480966, third-party applications may have difficulty authenticating hotspots.

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10, version 1607; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 10 Enterprise LTSB 2015; Windows 8.1
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2; Windows Server 2012
Resolution: This issue is resolved in KB4480976

Back to top
OS Build 17134.523

January 08, 2019
KB4480966
Resolved
KB4480976
Resolved:
January 15, 2019
10:00 AM PT

Opened:
January 08, 2019
10:00 AM PT
" diff --git a/windows/release-information/resolved-issues-windows-10-1809-and-windows-server-2019.yml b/windows/release-information/resolved-issues-windows-10-1809-and-windows-server-2019.yml index b58f333fb0..0c2f62c022 100644 --- a/windows/release-information/resolved-issues-windows-10-1809-and-windows-server-2019.yml +++ b/windows/release-information/resolved-issues-windows-10-1809-and-windows-server-2019.yml @@ -91,7 +91,7 @@ sections:
Embedded objects may display incorrectly
Any compound document (OLE) server application that places embedded objects into the Windows Metafile (WMF) using the PatBlt API may display embedded objects incorrectly. 
 
For example, if you paste a Microsoft Excel worksheet object into a Microsoft Word document, the cells may render with a different background color. 
 
Affected platforms:  
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10, version 1607; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 10 Enterprise LTSB 2015; Windows 8.1; Windows 7 SP1  
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2; Windows Server 2012; Windows Server 2008 R2 SP1; Windows Server 2008 SP2  
Resolution: This issue is resolved in KB4493509.  

Back to topOS Build 17763.316

February 12, 2019
KB4487044Resolved
KB4493509Resolved:
April 09, 2019
10:00 AM PT

Opened:
February 12, 2019
10:00 AM PT
Error 1309 when installing/uninstalling MSI or MSP files
After installing KB4487044, users may receive \"Error 1309\" while installing or uninstalling certain types of MSI and MSP files. 

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10, version 1607; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 10 Enterprise LTSB 2015; Windows 8.1
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2; Windows Server 2012
Resolution: This issue is resolved in KB4489899

Back to topOS Build 17763.316

February 12, 2019
KB4487044Resolved
KB4489899Resolved:
March 12, 2019
10:00 AM PT

Opened:
February 12, 2019
10:00 AM PT
Internet Explorer may fail to load images
After installing KB4487044, Internet Explorer may fail to load images with a backslash (\\) in their relative source path.

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10, version 1607; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 10 Enterprise LTSB 2015; Windows 8.1; Windows 7 SP1
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2; Windows Server 2008 R2 SP1
Resolution: This issue is resolved in KB4482887.

Back to topOS Build 17763.316

February 12, 2019
KB4487044Resolved
KB4482887Resolved:
March 01, 2019
10:00 AM PT

Opened:
February 12, 2019
10:00 AM PT -
Applications using Microsoft Jet database and Access 95 file format stop working
Applications that use a Microsoft Jet database with the Microsoft Access 95 file format may randomly stop working.

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10, version 1607; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 10 Enterprise LTSB 2015; Windows 7 SP1
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2008 R2 SP1
Resolution: This issue is resolved in KB4482887.

Back to topOS Build 17763.316

February 12, 2019
KB4487044Resolved
KB4482887Resolved:
March 01, 2019
10:00 AM PT

Opened:
February 12, 2019
10:00 AM PT +
Applications using Microsoft Jet database and Access 95 file format stop working
Applications that use a Microsoft Jet database with the Microsoft Access 95 file format may randomly stop working.

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10, version 1607; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 10 Enterprise LTSB 2015; Windows 7 SP1
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012; Windows Server 2008 R2 SP1; Windows Server 2008 SP2
Resolution: This issue is resolved in KB4482887.

Back to topOS Build 17763.316

February 12, 2019
KB4487044Resolved
KB4482887Resolved:
March 01, 2019
10:00 AM PT

Opened:
February 12, 2019
10:00 AM PT
First character of the Japanese era name not recognized
After installing KB4487044, the first character of the Japanese era name is not recognized as an abbreviation and may cause date parsing issues. 

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10, version 1607; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 10 Enterprise LTSB 2015; Windows 8.1; Windows 7 SP1
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2; Windows Server 2012; Windows Server 2008 R2 SP1; Windows Server 2008 SP2
Resolution: This issue is resolved in KB4482887

Back to topOS Build 17763.316

February 12, 2019
KB4487044Resolved
KB4482887Resolved:
March 01, 2019
10:00 AM PT

Opened:
February 12, 2019
10:00 AM PT " @@ -101,10 +101,10 @@ sections: - type: markdown text: " - + - +
DetailsOriginating updateStatusHistory
Internet Explorer 11 authentication issue with multiple concurrent logons
After installing KB4480116, Internet Explorer 11 and other applications that use WININET.DLL may have authentication issues. This occurs when two or more people use the same user account for multiple, concurrent login sessions on the same Windows Server machine, including Remote Desktop Protocol (RDP) and Terminal Server logons. Symptoms reported by customers include, but may not be limited to: 
  • Cache size and location show zero or empty. 
  • Keyboard shortcuts may not work properly. 
  • Webpages may intermittently fail to load or render correctly. 
  • Issues with credential prompts. 
  • Issues when downloading files. 
Resolution: This issue was resolved in KB4493509

Back to top
OS Build 17763.253

January 08, 2019
KB4480116
Resolved
KB4493509
Resolved:
April 09, 2019
10:00 AM PT

Opened:
January 08, 2019
10:00 AM PT
Internet Explorer 11 authentication issue with multiple concurrent logons
After installing KB4480116, Internet Explorer 11 and other applications that use WININET.DLL may have authentication issues. This occurs when two or more people use the same user account for multiple, concurrent login sessions on the same Windows Server machine, including Remote Desktop Protocol (RDP) and Terminal Server logons. Symptoms reported by customers include, but may not be limited to: 
  • Cache size and location show zero or empty. 
  • Keyboard shortcuts may not work properly. 
  • Webpages may intermittently fail to load or render correctly. 
  • Issues with credential prompts. 
  • Issues when downloading files. 
Affected platforms: 
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1607; Windows 10 Enterprise LTSC 2016; Windows 8.1; Windows 7 SP1
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server 2016; Windows Server 2012 R2; Windows Server 2012; Windows Server 2008 R2 SP1
Resolution: This issue was resolved in KB4493509

Back to top
OS Build 17763.253

January 08, 2019
KB4480116
Resolved
KB4493509
Resolved:
April 09, 2019
10:00 AM PT

Opened:
January 08, 2019
10:00 AM PT
MSXML6 may cause applications to stop responding
After installing KB4480116, MSXML6 causes applications to stop responding if an exception was thrown during node operations, such as appendChild(), insertBefore(), and moveNode().
 
The Group Policy editor may stop responding when editing a Group Policy Object (GPO) that contains Group Policy Preferences (GPP) for Internet Explorer 10 settings. 

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10, version 1607; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 10 Enterprise LTSB 2015; Windows 8.1
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2; Windows Server 2012
Resolution: This issue was resolved in KB4493509

Back to top
OS Build 17763.253

January 08, 2019
KB4480116
Resolved
KB4493509
Resolved:
April 09, 2019
10:00 AM PT

Opened:
January 08, 2019
10:00 AM PT
Global DNS outage affects Windows Update customers
Windows Update customers were affected by a network infrastructure event on January 29, 2019 (21:00 UTC), caused by an external DNS service provider's global outage. A software update to the external provider's DNS servers resulted in the distribution of corrupted DNS records that affected connectivity to the Windows Update service. The DNS records were restored by January 30, 2019 (00:10 UTC), and the majority of local Internet Service Providers (ISP) have refreshed their DNS servers and customer services have been restored. 
 
Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019
  • Server: Windows Server, version 1809; Windows Server 2019
While this was not an issue with Microsoft's services, we take any service disruption for our customers seriously. We will work with partners to better understand this so we can provide higher quality service in the future even across diverse global network providers. 
 
If you are still unable to connect to Windows Update services due to this problem, please contact your local ISP or network administrator. You can also refer to our new KB4493784 for more information to determine if your network is affected, and to provide your local ISP or network administrator with additional information to assist you. 

Back to top
N/A

Resolved
Resolved:
March 08, 2019
11:15 AM PT

Opened:
January 29, 2019
02:00 PM PT
Webpages become unresponsive in Microsoft Edge
After installing KB4480116, some Microsoft Edge users report that they:
  • Cannot load webpages using a local IP address. 
  • Cannot load webpages on the Internet using a VPN connection.
Browsing fails or the webpage may become unresponsive.

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709
Resolution: This issue is resolved in KB4487044

Back to top
OS Build 17763.253

January 08, 2019
KB4480116
Resolved
KB4487044
Resolved:
February 12, 2019
10:00 AM PT

Opened:
January 08, 2019
10:00 AM PT
Webpages become unresponsive in Microsoft Edge
After installing KB4480116, some Microsoft Edge users report that they:
  • Cannot load webpages using a local IP address. 
  • Cannot load webpages on the Internet using a VPN connection.
Browsing fails or the webpage may become unresponsive.

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10, version 1607; Windows 10 Enterprise LTSC 2016
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016
Resolution: This issue is resolved in KB4487044

Back to top
OS Build 17763.253

January 08, 2019
KB4480116
Resolved
KB4487044
Resolved:
February 12, 2019
10:00 AM PT

Opened:
January 08, 2019
10:00 AM PT
Unable to access hotspots with third-party applications
After installing KB4480116, third-party applications may have difficulty authenticating hotspots. 

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10, version 1607; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 10 Enterprise LTSB 2015; Windows 8.1
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2; Windows Server 2012
Resolution: This issue is resolved in KB4476976

Back to top
OS Build 17763.253

January 08, 2019
KB4480116
Resolved
KB4476976
Resolved:
January 22, 2019
02:00 PM PT

Opened:
January 08, 2019
10:00 AM PT
" diff --git a/windows/release-information/resolved-issues-windows-7-and-windows-server-2008-r2-sp1.yml b/windows/release-information/resolved-issues-windows-7-and-windows-server-2008-r2-sp1.yml index ad071bf048..607d6cbcc7 100644 --- a/windows/release-information/resolved-issues-windows-7-and-windows-server-2008-r2-sp1.yml +++ b/windows/release-information/resolved-issues-windows-7-and-windows-server-2008-r2-sp1.yml @@ -79,9 +79,9 @@ sections: - type: markdown text: " - + - +
DetailsOriginating updateStatusHistory
Embedded objects may display incorrectly
Any compound document (OLE) server application that places embedded objects into the Windows Metafile (WMF) using the PatBlt API may display embedded objects incorrectly. 
 
For example, if you paste a Microsoft Excel worksheet object into a Microsoft Word document, the cells may render with a different background color. 
 
Affected platforms:  
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10, version 1607; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 10 Enterprise LTSB 2015; Windows 8.1; Windows 7 SP1 
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2; Windows Server 2012; Windows Server 2008 R2 SP1; Windows Server 2008 SP2 
Resolution: This issue is resolved in KB4493472

Back to top
February 12, 2019
KB4486563
Resolved
KB4493472
Resolved:
April 09, 2019
10:00 AM PT

Opened:
February 12, 2019
10:00 AM PT
Embedded objects may display incorrectly
Any compound document (OLE) server application that places embedded objects into the Windows Metafile (WMF) using the PatBlt API may display embedded objects incorrectly. 
 
For example, if you paste a Microsoft Excel worksheet object into a Microsoft Word document, the cells may render with a different background color. 
 
Affected platforms:  
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10, version 1607; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 10 Enterprise LTSB 2015; Windows 8.1; Windows 7 SP1 
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2; Windows Server 2012; Windows Server 2008 R2 SP1; Windows Server 2008 SP2 
Resolution: This issue is resolved in KB4493472

Back to top
February 12, 2019
KB4486563
Resolved
KB4493472
Resolved:
April 09, 2019
10:00 AM PT

Opened:
February 12, 2019
10:00 AM PT
Internet Explorer may fail to load images
After installing KB4486563, Internet Explorer may fail to load images with a backslash (\\) in their relative source path.

Affected platforms: 
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10, version 1607; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 10 Enterprise LTSB 2015; Windows 8.1; Windows 7 SP1 
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2; Windows Server 2008 R2 SP1 
Resolution: This issue is resolved in KB4486565.

Back to top
February 12, 2019
KB4486563
Resolved
KB4486565
Resolved:
February 19, 2019
02:00 PM PT

Opened:
February 12, 2019
10:00 AM PT
Applications using Microsoft Jet database and Access 95 file format stop working
Applications that use a Microsoft Jet database with the Microsoft Access 95 file format may randomly stop working.

Affected platforms: 
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10, version 1607; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 10 Enterprise LTSB 2015; Windows 7 SP1 
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2008 R2 SP1 
Resolution: This issue is resolved in KB4486565.

Back to top
February 12, 2019
KB4486563
Resolved
KB4486565
Resolved:
February 19, 2019
02:00 PM PT

Opened:
February 12, 2019
10:00 AM PT
Applications using Microsoft Jet database and Access 95 file format stop working
Applications that use a Microsoft Jet database with the Microsoft Access 95 file format may randomly stop working.

Affected platforms: 
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10, version 1607; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 10 Enterprise LTSB 2015; Windows 7 SP1 
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012; Windows Server 2008 R2 SP1; Windows Server 2008 SP2 
Resolution: This issue is resolved in KB4486565.

Back to top
February 12, 2019
KB4486563
Resolved
KB4486565
Resolved:
February 19, 2019
02:00 PM PT

Opened:
February 12, 2019
10:00 AM PT
" diff --git a/windows/release-information/status-windows-10-1507.yml b/windows/release-information/status-windows-10-1507.yml index cd92781eb2..c606f75d55 100644 --- a/windows/release-information/status-windows-10-1507.yml +++ b/windows/release-information/status-windows-10-1507.yml @@ -60,7 +60,7 @@ sections: - type: markdown text: "
This table offers a summary of current active issues and those issues that have been resolved in the last 30 days.

- + @@ -79,7 +79,7 @@ sections: - type: markdown text: "
SummaryOriginating updateStatusLast updated
Certain operations performed on a Cluster Shared Volume may fail
Certain operations, such as rename, performed on files or folders on a Cluster Shared Volume (CSV) may fail with the error, \"STATUS_BAD_IMPERSONATION_LEVEL (0xC00000A5)\".

See details >
OS Build 10240.18094

January 08, 2019
KB4480962
Mitigated
January 08, 2019
10:00 AM PT
Certain operations performed on a Cluster Shared Volume may fail
Certain operations, such as rename, performed on files or folders on a Cluster Shared Volume (CSV) may fail with the error, \"STATUS_BAD_IMPERSONATION_LEVEL (0xC00000A5)\".

See details >
OS Build 10240.18094

January 08, 2019
KB4480962
Mitigated
April 25, 2019
02:00 PM PT
Embedded objects may display incorrectly
Any compound document (OLE) server application that places embedded objects into the Windows Metafile (WMF) using the PatBlt API may display embedded objects incorrectly.

See details >
OS Build 10240.18132

February 12, 2019
KB4487018
Resolved
KB4493475
April 29, 2019
12:45 AM PT
MSXML6 may cause applications to stop responding
MSXML6 may cause applications to stop responding if an exception was thrown during node operations, such as appendChild(), insertBefore(), and moveNode().

See details >
OS Build 10240.18094

January 08, 2019
KB4480962
Resolved
KB4493475
April 09, 2019
10:00 AM PT
Custom URI schemes may not start corresponding application
Custom URI schemes for application protocol handlers may not start the corresponding application for local intranet and trusted sites in Internet Explorer.

See details >
OS Build 10240.18158

March 12, 2019
KB4489872
Resolved
KB4493475
April 09, 2019
10:00 AM PT
- +
DetailsOriginating updateStatusHistory
Embedded objects may display incorrectly
Any compound document (OLE) server application that places embedded objects into the Windows Metafile (WMF) using the PatBlt API may display embedded objects incorrectly. 
 
For example, if you paste a Microsoft Excel worksheet object into a Microsoft Word document, the cells may render with a different background color. 
 
Affected platforms:  
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10, version 1607; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 10 Enterprise LTSB 2015; Windows 8.1; Windows 7 SP1 
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2; Windows Server 2012; Windows Server 2008 R2 SP1; Windows Server 2008 SP2 
Resolution: This issue is resolved in KB4493475

Back to top
OS Build 10240.18132

February 12, 2019
KB4487018
Resolved
KB4493475
Resolved:
April 09, 2019
10:00 AM PT

Opened:
April 29, 2019
12:45 AM PT
Embedded objects may display incorrectly
Any compound document (OLE) server application that places embedded objects into the Windows Metafile (WMF) using the PatBlt API may display embedded objects incorrectly. 
 
For example, if you paste a Microsoft Excel worksheet object into a Microsoft Word document, the cells may render with a different background color. 
 
Affected platforms:  
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10, version 1607; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 10 Enterprise LTSB 2015; Windows 8.1; Windows 7 SP1
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2; Windows Server 2012; Windows Server 2008 R2 SP1; Windows Server 2008 SP2 
Resolution: This issue is resolved in KB4493475

Back to top
OS Build 10240.18132

February 12, 2019
KB4487018
Resolved
KB4493475
Resolved:
April 09, 2019
10:00 AM PT

Opened:
April 29, 2019
12:45 AM PT
" @@ -97,7 +97,7 @@ sections: - type: markdown text: " - +
DetailsOriginating updateStatusHistory
Certain operations performed on a Cluster Shared Volume may fail
Certain operations, such as rename, that you perform on files or folders that are on a Cluster Shared Volume (CSV) may fail with the error, \"STATUS_BAD_IMPERSONATION_LEVEL (0xC00000A5)\". This occurs when you perform the operation on a CSV owner node from a process that doesn’t have administrator privilege.

Affected platforms: 
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10, version 1607; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 10 Enterprise LTSB 2015; Windows 8.1
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2; Windows Server 2012
Workaround: Do one of the following: 
  • Perform the operation from a process that has administrator privilege. 
  • Perform the operation from a node that doesn’t have CSV ownership. 
Next steps: Microsoft is working on a resolution and will provide an update in an upcoming release.

Back to top
OS Build 10240.18094

January 08, 2019
KB4480962
Mitigated
Last updated:
January 08, 2019
10:00 AM PT

Opened:
January 08, 2019
10:00 AM PT
Certain operations performed on a Cluster Shared Volume may fail
Certain operations, such as rename, that you perform on files or folders that are on a Cluster Shared Volume (CSV) may fail with the error, \"STATUS_BAD_IMPERSONATION_LEVEL (0xC00000A5)\". This occurs when you perform the operation on a CSV owner node from a process that doesn’t have administrator privilege.

Affected platforms: 
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10, version 1607; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 10 Enterprise LTSB 2015; Windows 8.1
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2; Windows Server 2012
Workaround: Do one of the following: 
  • Perform the operation from a process that has administrator privilege. 
  • Perform the operation from a node that doesn’t have CSV ownership. 
Next steps: Microsoft is working on a resolution and will provide an update in an upcoming release.

Back to top
OS Build 10240.18094

January 08, 2019
KB4480962
Mitigated
Last updated:
April 25, 2019
02:00 PM PT

Opened:
January 08, 2019
10:00 AM PT
MSXML6 may cause applications to stop responding
After installing KB4480962, MSXML6 causes applications to stop responding if an exception was thrown during node operations, such as appendChild(), insertBefore(), and moveNode().

The Group Policy editor may stop responding when editing a Group Policy Object (GPO) that contains Group Policy Preferences (GPP) for Internet Explorer 10 settings.

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10, version 1607; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 10 Enterprise LTSB 2015; Windows 8.1
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2; Windows Server 2012
Resolution: This issue was resolved in KB4493475.

Back to top
OS Build 10240.18094

January 08, 2019
KB4480962
Resolved
KB4493475
Resolved:
April 09, 2019
10:00 AM PT

Opened:
January 08, 2019
10:00 AM PT
" diff --git a/windows/release-information/status-windows-10-1607-and-windows-server-2016.yml b/windows/release-information/status-windows-10-1607-and-windows-server-2016.yml index 9be29baa01..c5c5e91012 100644 --- a/windows/release-information/status-windows-10-1607-and-windows-server-2016.yml +++ b/windows/release-information/status-windows-10-1607-and-windows-server-2016.yml @@ -64,8 +64,8 @@ sections:
Cluster service may fail if the minimum password length is set to greater than 14
The cluster service may fail to start with the error “2245 (NERR_PasswordTooShort)” if the Group Policy “Minimum Password Length” is configured with greater than 14 characters.

See details >OS Build 14393.2639

November 27, 2018
KB4467684Mitigated
April 25, 2019
02:00 PM PT
Issue using PXE to start a device from WDS
There may be issues using the Preboot Execution Environment (PXE) to start a device from a Windows Deployment Services (WDS) server configured to use Variable Window Extension.

See details >OS Build 14393.2848

March 12, 2019
KB4489882Mitigated
April 25, 2019
02:00 PM PT
SCVMM cannot enumerate and manage logical switches deployed on the host
For hosts managed by System Center Virtual Machine Manager (VMM), VMM cannot enumerate and manage logical switches deployed on the host.

See details >OS Build 14393.2639

November 27, 2018
KB4467684Mitigated
April 25, 2019
02:00 PM PT +
Certain operations performed on a Cluster Shared Volume may fail
Certain operations, such as rename, performed on files or folders on a Cluster Shared Volume (CSV) may fail with the error, \"STATUS_BAD_IMPERSONATION_LEVEL (0xC00000A5)\".

See details >OS Build 14393.2724

January 08, 2019
KB4480961Mitigated
April 25, 2019
02:00 PM PT
Windows may not start on certain Lenovo and Fujitsu laptops with less than 8GB of RAM
Windows may fail to start on certain Lenovo and Fujitsu laptops that have less than 8 GB of RAM.

See details >OS Build 14393.2608

November 13, 2018
KB4467691Mitigated
February 19, 2019
10:00 AM PT -
Certain operations performed on a Cluster Shared Volume may fail
Certain operations, such as rename, performed on files or folders on a Cluster Shared Volume (CSV) may fail with the error, \"STATUS_BAD_IMPERSONATION_LEVEL (0xC00000A5)\".

See details >OS Build 14393.2724

January 08, 2019
KB4480961Mitigated
January 08, 2019
10:00 AM PT
Embedded objects may display incorrectly
Any compound document (OLE) server application that places embedded objects into the Windows Metafile (WMF) using the PatBlt API may display embedded objects incorrectly.

See details >OS Build 14393.2791

February 12, 2019
KB4487026Resolved
KB4493470April 29, 2019
12:43 AM PT
Custom URI schemes may not start corresponding application
Custom URI schemes for application protocol handlers may not start the corresponding application for local intranet and trusted sites in Internet Explorer.

See details >OS Build 14393.2848

March 12, 2019
KB4489882Resolved
KB4493473April 25, 2019
02:00 PM PT
End-user-defined characters (EUDC) may cause blue screen at startup
If you enable per font end-user-defined characters (EUDC), the system will stop working and a blue screen may appear at startup.

See details >OS Build 14393.2879

March 19, 2019
KB4489889Resolved
KB4493470April 09, 2019
10:00 AM PT @@ -108,7 +108,7 @@ sections: - type: markdown text: " - +
DetailsOriginating updateStatusHistory
Certain operations performed on a Cluster Shared Volume may fail
Certain operations, such as rename, that you perform on files or folders that are on a Cluster Shared Volume (CSV) may fail with the error, \"STATUS_BAD_IMPERSONATION_LEVEL (0xC00000A5)\". This occurs when you perform the operation on a CSV owner node from a process that doesn’t have administrator privilege. 

Affected platforms: 
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10, version 1607; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507;  Windows 10 Enterprise LTSB 2015; Windows 8.1
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2; Windows Server 2012
Workaround: Do one of the following:
  • Perform the operation from a process that has administrator privilege. 
  • Perform the operation from a node that doesn’t have CSV ownership.
Next steps: Microsoft is working on a resolution and will provide an update in an upcoming release.

Back to top
OS Build 14393.2724

January 08, 2019
KB4480961
Mitigated
Last updated:
January 08, 2019
10:00 AM PT

Opened:
January 08, 2019
10:00 AM PT
Certain operations performed on a Cluster Shared Volume may fail
Certain operations, such as rename, that you perform on files or folders that are on a Cluster Shared Volume (CSV) may fail with the error, \"STATUS_BAD_IMPERSONATION_LEVEL (0xC00000A5)\". This occurs when you perform the operation on a CSV owner node from a process that doesn’t have administrator privilege. 

Affected platforms: 
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10, version 1607; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507;  Windows 10 Enterprise LTSB 2015; Windows 8.1
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2; Windows Server 2012
Workaround: Do one of the following:
  • Perform the operation from a process that has administrator privilege. 
  • Perform the operation from a node that doesn’t have CSV ownership.
Next steps: Microsoft is working on a resolution and will provide an update in an upcoming release.

Back to top
OS Build 14393.2724

January 08, 2019
KB4480961
Mitigated
Last updated:
April 25, 2019
02:00 PM PT

Opened:
January 08, 2019
10:00 AM PT
Internet Explorer 11 authentication issue with multiple concurrent logons
After installing KB4480961, Internet Explorer 11 and other applications that use WININET.DLL may have authentication issues. This occurs when two or more people use the same user account for multiple, concurrent login sessions on the same Windows Server machine, including Remote Desktop Protocol (RDP) and Terminal Server logons. Symptoms reported by customers include, but may not be limited to:
  • Cache size and location show zero or empty.
  • Keyboard shortcuts may not work properly.
  • Webpages may intermittently fail to load or render correctly.
  • Issues with credential prompts.
  • Issues when downloading files.
Affected platforms: 
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1607; Windows 10 Enterprise LTSC 2016; Windows 8.1; Windows 7 SP1
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server 2016; Windows Server 2012 R2; Windows Server 2012; Windows Server 2008 R2 SP1
Resolution: This issue was resolved in KB4493470.

Back to top
OS Build 14393.2724

January 08, 2019
KB4480961
Resolved
KB4493470
Resolved:
April 09, 2019
10:00 AM PT

Opened:
January 08, 2019
10:00 AM PT
MSXML6 may cause applications to stop responding
After installing KB4480961, MSXML6 causes applications to stop responding if an exception was thrown during node operations, such as appendChild(), insertBefore(), and moveNode().

The Group Policy editor may stop responding when editing a Group Policy Object (GPO) that contains Group Policy Preferences (GPP) for Internet Explorer 10 settings.

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10, version 1607; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 10 Enterprise LTSB 2015; Windows 8.1
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2; Windows Server 2012
Resolution: This issue was resolved in KB4493470.

Back to top
OS Build 14393.2724

January 08, 2019
KB4480961
Resolved
KB4493470
Resolved:
April 09, 2019
10:00 AM PT

Opened:
January 08, 2019
10:00 AM PT
diff --git a/windows/release-information/status-windows-10-1703.yml b/windows/release-information/status-windows-10-1703.yml index 4d6ac25a66..f65d9e3c4d 100644 --- a/windows/release-information/status-windows-10-1703.yml +++ b/windows/release-information/status-windows-10-1703.yml @@ -60,7 +60,7 @@ sections: - type: markdown text: "
This table offers a summary of current active issues and those issues that have been resolved in the last 30 days.

- + @@ -99,7 +99,7 @@ sections: - type: markdown text: "
SummaryOriginating updateStatusLast updated
Certain operations performed on a Cluster Shared Volume may fail
Certain operations, such as rename, performed on files or folders on a Cluster Shared Volume (CSV) may fail with the error, \"STATUS_BAD_IMPERSONATION_LEVEL (0xC00000A5)\".

See details >
OS Build 15063.1563

January 08, 2019
KB4480973
Mitigated
January 08, 2019
10:00 AM PT
Certain operations performed on a Cluster Shared Volume may fail
Certain operations, such as rename, performed on files or folders on a Cluster Shared Volume (CSV) may fail with the error, \"STATUS_BAD_IMPERSONATION_LEVEL (0xC00000A5)\".

See details >
OS Build 15063.1563

January 08, 2019
KB4480973
Mitigated
April 25, 2019
02:00 PM PT
Custom URI schemes may not start corresponding application
Custom URI schemes for application protocol handlers may not start the corresponding application for local intranet and trusted sites in Internet Explorer.

See details >
OS Build 15063.1689

March 12, 2019
KB4489871
Resolved
KB4493436
April 25, 2019
02:00 PM PT
End-user-defined characters (EUDC) may cause blue screen at startup
If you enable per font end-user-defined characters (EUDC), the system may stop working and a blue screen may appear at startup.

See details >
OS Build 15063.1716

March 19, 2019
KB4489888
Resolved
KB4493474
April 09, 2019
10:00 AM PT
MSXML6 may cause applications to stop responding
MSXML6 may cause applications to stop responding if an exception was thrown during node operations, such as appendChild(), insertBefore(), and moveNode().

See details >
OS Build 15063.1563

January 08, 2019
KB4480973
Resolved
KB4493474
April 09, 2019
10:00 AM PT
- - + +
DetailsOriginating updateStatusHistory
Certain operations performed on a Cluster Shared Volume may fail
Certain operations, such as rename, that you perform on files or folders that are on a Cluster Shared Volume (CSV) may fail with the error, “STATUS_BAD_IMPERSONATION_LEVEL (0xC00000A5)”. This occurs when you perform the operation on a CSV owner node from a process that doesn’t have administrator privilege. 

Affected platforms: 
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10, version 1607; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 10 Enterprise LTSB 2015; Windows 8.1
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2; Windows Server 2012
Workaround: Do one of the following: 
  • Perform the operation from a process that has administrator privilege. 
  • Perform the operation from a node that doesn’t have CSV ownership. 
Next steps: Microsoft is working on a resolution and will provide an update in an upcoming release.

Back to top
OS Build 15063.1563

January 08, 2019
KB4480973
Mitigated
Last updated:
January 08, 2019
10:00 AM PT

Opened:
January 08, 2019
10:00 AM PT
MSXML6 may cause applications to stop responding
After installing KB4480973, MSXML6 causes applications to stop responding if an exception was thrown during node operations, such as appendChild(), insertBefore(), and moveNode().

The Group Policy editor may stop responding when editing a Group Policy Object (GPO) that contains Group Policy Preferences (GPP) for Internet Explorer 10 settings.

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10, version 1607; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 10 Enterprise LTSB 2015; Windows 8.1
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2
Resolution: This issue was resolved in KB4493474.

Back to top
OS Build 15063.1563

January 08, 2019
KB4480973
Resolved
KB4493474
Resolved:
April 09, 2019
10:00 AM PT

Opened:
January 08, 2019
10:00 AM PT
Certain operations performed on a Cluster Shared Volume may fail
Certain operations, such as rename, that you perform on files or folders that are on a Cluster Shared Volume (CSV) may fail with the error, “STATUS_BAD_IMPERSONATION_LEVEL (0xC00000A5)”. This occurs when you perform the operation on a CSV owner node from a process that doesn’t have administrator privilege. 

Affected platforms: 
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10, version 1607; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 10 Enterprise LTSB 2015; Windows 8.1
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2; Windows Server 2012
Workaround: Do one of the following: 
  • Perform the operation from a process that has administrator privilege. 
  • Perform the operation from a node that doesn’t have CSV ownership. 
Next steps: Microsoft is working on a resolution and will provide an update in an upcoming release.

Back to top
OS Build 15063.1563

January 08, 2019
KB4480973
Mitigated
Last updated:
April 25, 2019
02:00 PM PT

Opened:
January 08, 2019
10:00 AM PT
MSXML6 may cause applications to stop responding
After installing KB4480973, MSXML6 causes applications to stop responding if an exception was thrown during node operations, such as appendChild(), insertBefore(), and moveNode().

The Group Policy editor may stop responding when editing a Group Policy Object (GPO) that contains Group Policy Preferences (GPP) for Internet Explorer 10 settings.

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10, version 1607; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 10 Enterprise LTSB 2015; Windows 8.1
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2; Windows Server 2012
Resolution: This issue was resolved in KB4493474.

Back to top
OS Build 15063.1563

January 08, 2019
KB4480973
Resolved
KB4493474
Resolved:
April 09, 2019
10:00 AM PT

Opened:
January 08, 2019
10:00 AM PT
" diff --git a/windows/release-information/status-windows-10-1709.yml b/windows/release-information/status-windows-10-1709.yml index 7f9f310686..dd3b7632b0 100644 --- a/windows/release-information/status-windows-10-1709.yml +++ b/windows/release-information/status-windows-10-1709.yml @@ -61,7 +61,7 @@ sections: text: "
This table offers a summary of current active issues and those issues that have been resolved in the last 30 days.

- + @@ -111,7 +111,7 @@ sections: - type: markdown text: "
SummaryOriginating updateStatusLast updated
Zone transfers over TCP may fail
Zone transfers between primary and secondary DNS servers over the Transmission Control Protocol (TCP) may fail.

See details >
OS Build 16299.1127

April 25, 2019
KB4493440
Investigating
April 25, 2019
02:00 PM PT
Certain operations performed on a Cluster Shared Volume may fail
Certain operations, such as rename, performed on files or folders on a Cluster Shared Volume (CSV) may fail with the error, \"STATUS_BAD_IMPERSONATION_LEVEL (0xC00000A5)\".

See details >
OS Build 16299.904

January 08, 2019
KB4480978
Mitigated
January 08, 2019
10:00 AM PT
Certain operations performed on a Cluster Shared Volume may fail
Certain operations, such as rename, performed on files or folders on a Cluster Shared Volume (CSV) may fail with the error, \"STATUS_BAD_IMPERSONATION_LEVEL (0xC00000A5)\".

See details >
OS Build 16299.904

January 08, 2019
KB4480978
Mitigated
April 25, 2019
02:00 PM PT
Custom URI schemes may not start corresponding application
Custom URI schemes for application protocol handlers may not start the corresponding application for local intranet and trusted sites in Internet Explorer.

See details >
OS Build 16299.1029

March 12, 2019
KB4489886
Resolved
KB4493440
April 25, 2019
02:00 PM PT
End-user-defined characters (EUDC) may cause blue screen at startup
If you enable per font end-user-defined characters (EUDC), the system may stop working and a blue screen may appear at startup.

See details >
OS Build 16299.1059

March 19, 2019
KB4489890
Resolved
KB4493441
April 09, 2019
10:00 AM PT
MSXML6 causes applications to stop responding if an exception was thrown
MSXML6 causes applications to stop responding if an exception was thrown during node operations, such as appendChild(), insertBefore(), and moveNode().

See details >
OS Build 16299.904

January 08, 2019
KB4480978
Resolved
KB4493441
April 09, 2019
10:00 AM PT
- +
DetailsOriginating updateStatusHistory
Certain operations performed on a Cluster Shared Volume may fail
Certain operations, such as rename, that you perform on files or folders that are on a Cluster Shared Volume (CSV) may fail with the error, \"STATUS_BAD_IMPERSONATION_LEVEL (0xC00000A5)\". This occurs when you perform the operation on a CSV owner node from a process that doesn’t have administrator privilege. 

Affected platforms: 
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10, version 1607; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 10 Enterprise LTSB 2015; Windows 8.1
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2; Windows Server 2012
Workaround: Do one of the following:
  • Perform the operation from a process that has administrator privilege. 
  • Perform the operation from a node that doesn’t have CSV ownership. 
Next steps: Microsoft is working on a resolution and will provide an update in an upcoming release.

Back to top
OS Build 16299.904

January 08, 2019
KB4480978
Mitigated
Last updated:
January 08, 2019
10:00 AM PT

Opened:
January 08, 2019
10:00 AM PT
Certain operations performed on a Cluster Shared Volume may fail
Certain operations, such as rename, that you perform on files or folders that are on a Cluster Shared Volume (CSV) may fail with the error, \"STATUS_BAD_IMPERSONATION_LEVEL (0xC00000A5)\". This occurs when you perform the operation on a CSV owner node from a process that doesn’t have administrator privilege. 

Affected platforms: 
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10, version 1607; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 10 Enterprise LTSB 2015; Windows 8.1
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2; Windows Server 2012
Workaround: Do one of the following:
  • Perform the operation from a process that has administrator privilege. 
  • Perform the operation from a node that doesn’t have CSV ownership. 
Next steps: Microsoft is working on a resolution and will provide an update in an upcoming release.

Back to top
OS Build 16299.904

January 08, 2019
KB4480978
Mitigated
Last updated:
April 25, 2019
02:00 PM PT

Opened:
January 08, 2019
10:00 AM PT
MSXML6 causes applications to stop responding if an exception was thrown
After installing KB4480978, MSXML6 causes applications to stop responding if an exception was thrown during node operations, such as appendChild(), insertBefore(), and moveNode().

The Group Policy editor may stop responding when editing a Group Policy Object (GPO) that contains Group Policy Preferences (GPP) for Internet Explorer 10 settings.

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10, version 1607; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 10 Enterprise LTSB 2015; Windows 8.1
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2; Windows Server 2012
Resolution: This issue is resolved in KB4493441.

Back to top
OS Build 16299.904

January 08, 2019
KB4480978
Resolved
KB4493441
Resolved:
April 09, 2019
10:00 AM PT

Opened:
January 08, 2019
10:00 AM PT
" diff --git a/windows/release-information/status-windows-10-1803.yml b/windows/release-information/status-windows-10-1803.yml index ba58d76fc8..b1412e97e8 100644 --- a/windows/release-information/status-windows-10-1803.yml +++ b/windows/release-information/status-windows-10-1803.yml @@ -62,7 +62,7 @@ sections: - + @@ -115,7 +115,7 @@ sections: - type: markdown text: "
SummaryOriginating updateStatusLast updated
Zone transfers over TCP may fail
Zone transfers between primary and secondary DNS servers over the Transmission Control Protocol (TCP) may fail.

See details >
OS Build 17134.753

April 25, 2019
KB4493437
Investigating
April 25, 2019
02:00 PM PT
Issue using PXE to start a device from WDS
Using PXE to start a device from a WDS server configured to use Variable Window Extension may cause the connection to the WDS server to terminate prematurely.

See details >
OS Build 17134.648

March 12, 2019
KB4489868
Mitigated
April 25, 2019
02:00 PM PT
Certain operations performed on a Cluster Shared Volume may fail
Certain operations, such as rename, performed on files or folders on a Cluster Shared Volume (CSV) may fail with the error, \"STATUS_BAD_IMPERSONATION_LEVEL (0xC00000A5)\".

See details >
OS Build 17134.523

January 08, 2019
KB4480966
Mitigated
January 08, 2019
10:00 AM PT
Certain operations performed on a Cluster Shared Volume may fail
Certain operations, such as rename, performed on files or folders on a Cluster Shared Volume (CSV) may fail with the error, \"STATUS_BAD_IMPERSONATION_LEVEL (0xC00000A5)\".

See details >
OS Build 17134.523

January 08, 2019
KB4480966
Mitigated
April 25, 2019
02:00 PM PT
Custom URI schemes may not start corresponding application
Custom URI schemes for application protocol handlers may not start the corresponding application for local intranet and trusted sites in Internet Explorer.

See details >
OS Build 17134.648

March 12, 2019
KB4489868
Resolved
KB4493437
April 25, 2019
02:00 PM PT
End-user-defined characters (EUDC) may cause blue screen at startup
If you enable per font end-user-defined characters (EUDC), the system may stop working and a blue screen may appear at startup.

See details >
OS Build 17134.677

March 19, 2019
KB4489894
Resolved
KB4493464
April 09, 2019
10:00 AM PT
First character of the Japanese era name not recognized
The first character of the Japanese era name is not recognized as an abbreviation and may cause date parsing issues.

See details >
OS Build 17134.556

January 15, 2019
KB4480976
Resolved
KB4487029
April 09, 2019
10:00 AM PT
- +
DetailsOriginating updateStatusHistory
Certain operations performed on a Cluster Shared Volume may fail
Certain operations, such as rename, that you perform on files or folders that are on a Cluster Shared Volume (CSV) may fail with the error, \"STATUS_BAD_IMPERSONATION_LEVEL (0xC00000A5)\". This occurs when you perform the operation on a CSV owner node from a process that doesn’t have administrator privilege.

Affected platforms: 
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10, version 1607; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 10 Enterprise LTSB 2015; Windows 8.1
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2; Windows Server 2012
Workaround: Do one of the following:
  • Perform the operation from a process that has administrator privilege. 
  • Perform the operation from a node that doesn’t have CSV ownership. 
Next steps: Microsoft is working on a resolution and will provide an update in an upcoming release.

Back to top
OS Build 17134.523

January 08, 2019
KB4480966
Mitigated
Last updated:
January 08, 2019
10:00 AM PT

Opened:
January 08, 2019
10:00 AM PT
Certain operations performed on a Cluster Shared Volume may fail
Certain operations, such as rename, that you perform on files or folders that are on a Cluster Shared Volume (CSV) may fail with the error, \"STATUS_BAD_IMPERSONATION_LEVEL (0xC00000A5)\". This occurs when you perform the operation on a CSV owner node from a process that doesn’t have administrator privilege.

Affected platforms: 
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10, version 1607; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 10 Enterprise LTSB 2015; Windows 8.1
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2; Windows Server 2012
Workaround: Do one of the following:
  • Perform the operation from a process that has administrator privilege. 
  • Perform the operation from a node that doesn’t have CSV ownership. 
Next steps: Microsoft is working on a resolution and will provide an update in an upcoming release.

Back to top
OS Build 17134.523

January 08, 2019
KB4480966
Mitigated
Last updated:
April 25, 2019
02:00 PM PT

Opened:
January 08, 2019
10:00 AM PT
First character of the Japanese era name not recognized
After installing KB4480976, the first character of the Japanese era name is not recognized as an abbreviation and may cause date parsing issues.

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10, version 1607; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 10 Enterprise LTSB 2015; Windows 8.1; Windows 7 SP1
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2; Windows Server 2012; Windows Server 2008 R2 SP1; Windows Server 2008 SP2
Resolution: This issue is resolved in KB4487029

Back to top
OS Build 17134.556

January 15, 2019
KB4480976
Resolved
KB4487029
Resolved:
February 19, 2019
02:00 PM PT

Opened:
January 08, 2019
10:00 AM PT
MSXML6 may cause applications to stop responding
After installing KB4480966, MSXML6 causes applications to stop responding if an exception was thrown during node operations, such as appendChild(), insertBefore(), and moveNode().

The Group Policy editor may stop responding when editing a Group Policy Object (GPO) that contains Group Policy Preferences (GPP) for Internet Explorer 10 settings.

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10, version 1607; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 10 Enterprise LTSB 2015; Windows 8.1
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2; Windows Server 2012
Resolution: This issue was resolved in KB4493464

Back to top
OS Build 17134.523

January 08, 2019
KB4480966
Resolved
KB4493464
Resolved:
April 09, 2019
10:00 AM PT

Opened:
January 08, 2019
10:00 AM PT
diff --git a/windows/release-information/status-windows-10-1809-and-windows-server-2019.yml b/windows/release-information/status-windows-10-1809-and-windows-server-2019.yml index a78c82b2e2..760ba2533b 100644 --- a/windows/release-information/status-windows-10-1809-and-windows-server-2019.yml +++ b/windows/release-information/status-windows-10-1809-and-windows-server-2019.yml @@ -90,6 +90,7 @@ sections: - type: markdown text: " +
DetailsOriginating updateStatusHistory
System may be unresponsive after restart if ArcaBit antivirus software installed
Microsoft and ArcaBit have identified an issue on devices with ArcaBit antivirus software installed that may cause the system to become unresponsive upon restart after installing KB4493509
 
Microsoft has temporarily blocked devices from receiving this update if ArcaBit antivirus software is installed. 

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 8.1; Windows 7 SP1
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server 2012 R2; Windows Server 2008 R2 SP1
Workaround: ArcaBit has released an update to address this issue. For more information, see the Arcabit support article.

Back to top
OS Build 17763.437

April 09, 2019
KB4493509
Mitigated
Last updated:
April 25, 2019
02:00 PM PT

Opened:
April 09, 2019
10:00 AM PT
End-user-defined characters (EUDC) may cause blue screen at startup
If you enable per font end-user-defined characters (EUDC), the system will stop working and a blue screen may appear at startup. This is not a common setting in non-Asian regions.

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10, version 1607; Windows 10 Enterprise LTSC 2016
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016
Resolution: This issue was resolved in KB4493509.

Back to top
OS Build 17763.404

April 02, 2019
KB4490481
Resolved
KB4493509
Resolved:
April 09, 2019
10:00 AM PT

Opened:
April 02, 2019
10:00 AM PT
" @@ -120,9 +121,8 @@ sections: - type: markdown text: " - - +
DetailsOriginating updateStatusHistory
System may be unresponsive after restart if ArcaBit antivirus software installed
Microsoft and ArcaBit have identified an issue on devices with ArcaBit antivirus software installed that may cause the system to become unresponsive upon restart after installing KB4493509
 
Microsoft has temporarily blocked devices from receiving this update if ArcaBit antivirus software is installed. 

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 8.1; Windows 7 SP1
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server 2012 R2; Windows Server 2008 R2 SP1
Workaround: ArcaBit has released an update to address this issue. For more information, see the Arcabit support article.

Back to top
OS Build 17763.437

April 09, 2019
KB4493509
Mitigated
Last updated:
April 25, 2019
02:00 PM PT

Opened:
January 08, 2019
10:00 AM PT
Certain operations performed on a Cluster Shared Volume may fail
Certain operations, such as rename, that you perform on files or folders that are on a Cluster Shared Volume (CSV) may fail with the error, \"STATUS_BAD_IMPERSONATION_LEVEL (0xC00000A5)\". This occurs when you perform the operation on a CSV owner node from a process that doesn’t have administrator privilege. 

Affected platforms: 
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10, version 1607; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 10 Enterprise LTSB 2015; Windows 8.1
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2; Windows Server 2012
Workaround: Do one of the following:  
  • Perform the operation from a process that has administrator privilege. 
  • Perform the operation from a node that doesn’t have CSV ownership. 
Next steps: Microsoft is working on a resolution and will provide an update in an upcoming release.

Back to top
OS Build 17763.253

January 08, 2019
KB4480116
Mitigated
Last updated:
January 08, 2019
10:00 AM PT

Opened:
January 08, 2019
10:00 AM PT
Internet Explorer 11 authentication issue with multiple concurrent logons
After installing KB4480116, Internet Explorer 11 and other applications that use WININET.DLL may have authentication issues. This occurs when two or more people use the same user account for multiple, concurrent login sessions on the same Windows Server machine, including Remote Desktop Protocol (RDP) and Terminal Server logons. Symptoms reported by customers include, but may not be limited to: 
  • Cache size and location show zero or empty. 
  • Keyboard shortcuts may not work properly. 
  • Webpages may intermittently fail to load or render correctly. 
  • Issues with credential prompts. 
  • Issues when downloading files. 
Resolution: This issue was resolved in KB4493509

Back to top
OS Build 17763.253

January 08, 2019
KB4480116
Resolved
KB4493509
Resolved:
April 09, 2019
10:00 AM PT

Opened:
January 08, 2019
10:00 AM PT
Internet Explorer 11 authentication issue with multiple concurrent logons
After installing KB4480116, Internet Explorer 11 and other applications that use WININET.DLL may have authentication issues. This occurs when two or more people use the same user account for multiple, concurrent login sessions on the same Windows Server machine, including Remote Desktop Protocol (RDP) and Terminal Server logons. Symptoms reported by customers include, but may not be limited to: 
  • Cache size and location show zero or empty. 
  • Keyboard shortcuts may not work properly. 
  • Webpages may intermittently fail to load or render correctly. 
  • Issues with credential prompts. 
  • Issues when downloading files. 
Affected platforms: 
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1607; Windows 10 Enterprise LTSC 2016; Windows 8.1; Windows 7 SP1
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server 2016; Windows Server 2012 R2; Windows Server 2012; Windows Server 2008 R2 SP1
Resolution: This issue was resolved in KB4493509

Back to top
OS Build 17763.253

January 08, 2019
KB4480116
Resolved
KB4493509
Resolved:
April 09, 2019
10:00 AM PT

Opened:
January 08, 2019
10:00 AM PT
MSXML6 may cause applications to stop responding
After installing KB4480116, MSXML6 causes applications to stop responding if an exception was thrown during node operations, such as appendChild(), insertBefore(), and moveNode().
 
The Group Policy editor may stop responding when editing a Group Policy Object (GPO) that contains Group Policy Preferences (GPP) for Internet Explorer 10 settings. 

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10, version 1607; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 10 Enterprise LTSB 2015; Windows 8.1
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2; Windows Server 2012
Resolution: This issue was resolved in KB4493509

Back to top
OS Build 17763.253

January 08, 2019
KB4480116
Resolved
KB4493509
Resolved:
April 09, 2019
10:00 AM PT

Opened:
January 08, 2019
10:00 AM PT
" diff --git a/windows/release-information/status-windows-7-and-windows-server-2008-r2-sp1.yml b/windows/release-information/status-windows-7-and-windows-server-2008-r2-sp1.yml index e035655450..93244396c1 100644 --- a/windows/release-information/status-windows-7-and-windows-server-2008-r2-sp1.yml +++ b/windows/release-information/status-windows-7-and-windows-server-2008-r2-sp1.yml @@ -64,7 +64,7 @@ sections:
Authentication may fail for services after the Kerberos ticket expires
Authentication may fail for services that require unconstrained delegation after the Kerberos ticket expires.

See details >March 12, 2019
KB4489878Mitigated
April 25, 2019
02:00 PM PT
System unresponsive after restart if Sophos Endpoint Protection installed
Devices with Sophos Endpoint Protection installed and managed by Sophos Central or Sophos Enterprise Console (SEC) may become unresponsive upon restart.

See details >April 09, 2019
KB4493472Mitigated
April 25, 2019
02:00 PM PT
System may be unresponsive after restart if ArcaBit antivirus software installed
Devices with ArcaBit antivirus software installed may become unresponsive upon restart.

See details >April 09, 2019
KB4493472Mitigated
April 25, 2019
02:00 PM PT -
System may be unresponsive after restart with certain McAfee antivirus products
Devices with McAfee Endpoint Security Threat Prevention 10.x, Host Intrusion Prevention 8.0, or VirusScan Enterprise 8.8 may be slow or unresponsive at startup.

See details >April 09, 2019
KB4493472Mitigated
April 18, 2019
05:00 PM PT +
System may be unresponsive after restart with certain McAfee antivirus products
Devices with McAfee Endpoint Security Threat Prevention 10.x, Host Intrusion Prevention 8.0, or VirusScan Enterprise 8.8 may be slow or unresponsive at startup.

See details >April 09, 2019
KB4493472Mitigated
April 25, 2019
02:00 PM PT
Devices may not respond at login or Welcome screen if running certain Avast software
Devices running Avast for Business, Avast CloudCare, and AVG Business Edition antivirus software may become unresponsive after restart.

See details >April 09, 2019
KB4493472Resolved
April 25, 2019
02:00 PM PT
Internet Explorer 11 authentication issue with multiple concurrent logons
Internet Explorer 11 users may encounter issues if two or more people use the same user account for multiple, concurrent login sessions on the same Windows Server machine.

See details >January 08, 2019
KB4480970Resolved
KB4493472April 09, 2019
10:00 AM PT
Custom URI schemes may not start corresponding application
Custom URI schemes for application protocol handlers may not start the corresponding application for local intranet and trusted sites in Internet Explorer.

See details >March 12, 2019
KB4489878Resolved
KB4493472April 09, 2019
10:00 AM PT @@ -88,7 +88,7 @@ sections:
System may be unresponsive after restart if Avira antivirus software installed
Microsoft and Avira have identified an issue on devices with Avira antivirus software installed that may cause the system to become unresponsive upon restart after installing KB4493472.

Microsoft has temporarily blocked devices from receiving this update if Avira antivirus software is installed.

Affected platforms: 
  • Client: Windows 8.1; Windows 7 SP1 
  • Server: Windows Server 2012 R2; Windows Server 2012; Windows Server 2008 R2 SP1; Windows Server 2008 SP2
Next steps: We are presently investigating this issue with Avira and will provide an update when available.

Back to topApril 09, 2019
KB4493472Investigating
Last updated:
April 25, 2019
02:00 PM PT

Opened:
April 09, 2019
10:00 AM PT
System unresponsive after restart if Sophos Endpoint Protection installed
Microsoft and Sophos have identified an issue on devices with Sophos Endpoint Protection installed and managed by either Sophos Central or Sophos Enterprise Console (SEC) that may cause the system to become unresponsive upon restart after installing KB4493472.

Microsoft has temporarily blocked devices from receiving this update if the Sophos Endpoint is installed until a solution is available.

Affected platforms: 
  • Client: Windows 8.1; Windows 7 SP1
  • Server: Windows Server 2012 R2; Windows Server 2012; Windows Server 2008 R2 SP1; Windows Server 2008 SP2
Guidance for Sophos Endpoint and Sophos Enterprise Console customers can be found in the Sophos support article.

Back to topApril 09, 2019
KB4493472Mitigated
Last updated:
April 25, 2019
02:00 PM PT

Opened:
April 09, 2019
10:00 AM PT
System may be unresponsive after restart if ArcaBit antivirus software installed
Microsoft and ArcaBit have identified an issue on devices with ArcaBit antivirus software installed that may cause the system to become unresponsive upon restart after installing KB4493472.

Microsoft has temporarily blocked devices from receiving this update if ArcaBit antivirus software is installed.

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 8.1; Windows 7 SP1
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server 2012 R2; Windows Server 2008 R2 SP1
Workaround: ArcaBit has released an update to address this issue. For more information, see the Arcabit support article.

Back to topApril 09, 2019
KB4493472Mitigated
Last updated:
April 25, 2019
02:00 PM PT

Opened:
April 09, 2019
10:00 AM PT -
System may be unresponsive after restart with certain McAfee antivirus products
Microsoft and McAfee have identified an issue on devices with McAfee Endpoint Security (ENS) Threat Prevention 10.x or McAfee Host Intrusion Prevention (Host IPS) 8.0 or McAfee VirusScan Enterprise (VSE) 8.8 installed. It may cause the system to have slow startup or become unresponsive at restart after installing this update. 

Affected platforms:
  • Client:  Windows 8.1; Windows 7 SP1
  • Server:  Windows Server 2012 R2; Windows Server 2008 R2 SP1
Workaround: Guidance for McAfee customers can be found in the following McAfee support articles: 
Next steps: We are presently investigating this issue with McAfee. We will provide an update once we have more information.

Back to topApril 09, 2019
KB4493472Mitigated
Last updated:
April 18, 2019
05:00 PM PT

Opened:
April 09, 2019
10:00 AM PT +
System may be unresponsive after restart with certain McAfee antivirus products
Microsoft and McAfee have identified an issue on devices with McAfee Endpoint Security (ENS) Threat Prevention 10.x or McAfee Host Intrusion Prevention (Host IPS) 8.0 or McAfee VirusScan Enterprise (VSE) 8.8 installed. It may cause the system to have slow startup or become unresponsive at restart after installing this update. 

Affected platforms:
  • Client:  Windows 8.1; Windows 7 SP1
  • Server:  Windows Server 2012 R2; Windows Server 2008 R2 SP1
Workaround: Guidance for McAfee customers can be found in the following McAfee support articles: 
Next steps: We are presently investigating this issue with McAfee. We will provide an update once we have more information.

Back to topApril 09, 2019
KB4493472Mitigated
Last updated:
April 25, 2019
02:00 PM PT

Opened:
April 09, 2019
10:00 AM PT
Devices may not respond at login or Welcome screen if running certain Avast software
Microsoft and Avast have identified an issue on devices running Avast for Business, Avast CloudCare, and AVG Business Edition antivirus software after you install KB4493472 and restart. Devices may become unresponsive at the login or Welcome screen. Additionally, you may be unable to log in or log in after an extended period of time.

Affected platforms: 
  • Client: Windows 8.1; Windows 7 SP1 
  • Server: Windows Server 2012 R2; Windows Server 2008 R2 SP1 
Resolution: Avast has released emergency updates to address this issue. For more information and AV update schedule, see the Avast support KB article.

Back to topApril 09, 2019
KB4493472Resolved
Resolved:
April 25, 2019
02:00 PM PT

Opened:
April 09, 2019
10:00 AM PT " @@ -109,7 +109,7 @@ sections: - type: markdown text: " - +
DetailsOriginating updateStatusHistory
Embedded objects may display incorrectly
Any compound document (OLE) server application that places embedded objects into the Windows Metafile (WMF) using the PatBlt API may display embedded objects incorrectly. 
 
For example, if you paste a Microsoft Excel worksheet object into a Microsoft Word document, the cells may render with a different background color. 
 
Affected platforms:  
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10, version 1607; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 10 Enterprise LTSB 2015; Windows 8.1; Windows 7 SP1 
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2; Windows Server 2012; Windows Server 2008 R2 SP1; Windows Server 2008 SP2 
Resolution: This issue is resolved in KB4493472

Back to top
February 12, 2019
KB4486563
Resolved
KB4493472
Resolved:
April 09, 2019
10:00 AM PT

Opened:
February 12, 2019
10:00 AM PT
Embedded objects may display incorrectly
Any compound document (OLE) server application that places embedded objects into the Windows Metafile (WMF) using the PatBlt API may display embedded objects incorrectly. 
 
For example, if you paste a Microsoft Excel worksheet object into a Microsoft Word document, the cells may render with a different background color. 
 
Affected platforms:  
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10, version 1607; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 10 Enterprise LTSB 2015; Windows 8.1; Windows 7 SP1 
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2; Windows Server 2012; Windows Server 2008 R2 SP1; Windows Server 2008 SP2 
Resolution: This issue is resolved in KB4493472

Back to top
February 12, 2019
KB4486563
Resolved
KB4493472
Resolved:
April 09, 2019
10:00 AM PT

Opened:
February 12, 2019
10:00 AM PT
" diff --git a/windows/release-information/status-windows-8.1-and-windows-server-2012-r2.yml b/windows/release-information/status-windows-8.1-and-windows-server-2012-r2.yml index c51f4b8a9c..5efe01fae9 100644 --- a/windows/release-information/status-windows-8.1-and-windows-server-2012-r2.yml +++ b/windows/release-information/status-windows-8.1-and-windows-server-2012-r2.yml @@ -64,8 +64,8 @@ sections:
Issue using PXE to start a device from WDS
There may be issues using the Preboot Execution Environment (PXE) to start a device from a Windows Deployment Services (WDS) server configured to use Variable Window Extension.

See details >March 12, 2019
KB4489881Mitigated
April 25, 2019
02:00 PM PT
System unresponsive after restart if Sophos Endpoint Protection installed
Devices with Sophos Endpoint Protection installed and managed by Sophos Central or Sophos Enterprise Console (SEC) may become unresponsive upon restart.

See details >April 09, 2019
KB4493446Mitigated
April 25, 2019
02:00 PM PT
System may be unresponsive after restart if ArcaBit antivirus software installed
Devices with ArcaBit antivirus software installed may become unresponsive upon restart.

See details >April 09, 2019
KB4493446Mitigated
April 25, 2019
02:00 PM PT +
Certain operations performed on a Cluster Shared Volume may fail
Certain operations, such as rename, performed on files or folders on a Cluster Shared Volume (CSV) may fail with the error, “STATUS_BAD_IMPERSONATION_LEVEL (0xC00000A5)”.

See details >January 08, 2019
KB4480963Mitigated
April 25, 2019
02:00 PM PT
System may be unresponsive after restart with certain McAfee antivirus products
Devices with McAfee Endpoint Security Threat Prevention 10.x, Host Intrusion Prevention 8.0, or VirusScan Enterprise 8.8 may be slow or unresponsive at startup.

See details >April 09, 2019
KB4493446Mitigated
April 18, 2019
05:00 PM PT -
Certain operations performed on a Cluster Shared Volume may fail
Certain operations, such as rename, performed on files or folders on a Cluster Shared Volume (CSV) may fail with the error, “STATUS_BAD_IMPERSONATION_LEVEL (0xC00000A5)”.

See details >January 08, 2019
KB4480963Mitigated
January 08, 2019
10:00 AM PT
Devices may not respond at login or Welcome screen if running certain Avast software
Devices running Avast for Business, Avast CloudCare, and AVG Business Edition antivirus software may become unresponsive after restart.

See details >April 09, 2019
KB4493446Resolved
April 25, 2019
02:00 PM PT
Internet Explorer 11 authentication issue with multiple concurrent logons
Internet Explorer 11 users may encounter issues if two or more people use the same user account for multiple, concurrent login sessions on the same Windows Server machine.

See details >January 08, 2019
KB4480963Resolved
KB4493446April 09, 2019
10:00 AM PT
MSXML6 may cause applications to stop responding.
MSXML6 may cause applications to stop responding if an exception was thrown during node operations, such as appendChild(), insertBefore(), and moveNode().

See details >January 08, 2019
KB4480963Resolved
KB4493446April 09, 2019
10:00 AM PT @@ -119,7 +119,7 @@ sections: - type: markdown text: " - +
DetailsOriginating updateStatusHistory
Certain operations performed on a Cluster Shared Volume may fail
Certain operations, such as rename, that you perform on files or folders that are on a Cluster Shared Volume (CSV) may fail with the error, “STATUS_BAD_IMPERSONATION_LEVEL (0xC00000A5)”. This occurs when you perform the operation on a CSV owner node from a process that doesn’t have administrator privilege.

Affected platforms: 
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10, version 1607; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 10 Enterprise LTSB 2015; Windows 8.1
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2; Windows Server 2012
Workaround: Do one of the following:
  • Perform the operation from a process that has administrator privilege.
  • Perform the operation from a node that doesn’t have CSV ownership.
Next steps: Microsoft is working on a resolution and will provide an update in an upcoming release.

Back to top
January 08, 2019
KB4480963
Mitigated
Last updated:
January 08, 2019
10:00 AM PT

Opened:
January 08, 2019
10:00 AM PT
Certain operations performed on a Cluster Shared Volume may fail
Certain operations, such as rename, that you perform on files or folders that are on a Cluster Shared Volume (CSV) may fail with the error, “STATUS_BAD_IMPERSONATION_LEVEL (0xC00000A5)”. This occurs when you perform the operation on a CSV owner node from a process that doesn’t have administrator privilege.

Affected platforms: 
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10, version 1607; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 10 Enterprise LTSB 2015; Windows 8.1
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2; Windows Server 2012
Workaround: Do one of the following:
  • Perform the operation from a process that has administrator privilege.
  • Perform the operation from a node that doesn’t have CSV ownership.
Next steps: Microsoft is working on a resolution and will provide an update in an upcoming release.

Back to top
January 08, 2019
KB4480963
Mitigated
Last updated:
April 25, 2019
02:00 PM PT

Opened:
January 08, 2019
10:00 AM PT
Internet Explorer 11 authentication issue with multiple concurrent logons
After installing KB4480963, Internet Explorer 11 and other applications that use WININET.DLL may have authentication issues. This occurs when two or more people use the same user account for multiple, concurrent login sessions on the same Windows Server machine, including Remote Desktop Protocol (RDP) and Terminal Server logons. Symptoms reported by customers include, but may not be limited to:
  • Cache size and location show zero or empty.
  • Keyboard shortcuts may not work properly.
  • Webpages may intermittently fail to load or render correctly.
  • Issues with credential prompts.
  • Issues when downloading files.
Affected platforms: 
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1607; Windows 10 Enterprise LTSC 2016; Windows 8.1; Windows 7 SP1
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server 2016; Windows Server 2012 R2; Windows Server 2012; Windows Server 2008 R2 SP1
Resolution: This issue is resolved in KB4493446.

Back to top
January 08, 2019
KB4480963
Resolved
KB4493446
Resolved:
April 09, 2019
10:00 AM PT

Opened:
January 08, 2019
10:00 AM PT
MSXML6 may cause applications to stop responding.
After installing KB4480963, MSXML6 causes applications to stop responding if an exception was thrown during node operations, such as appendChild(), insertBefore(), and moveNode().

The Group Policy editor may stop responding when editing a Group Policy Object (GPO) that contains Group Policy Preferences (GPP) for Internet Explorer 10 settings.

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10, version 1607; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 10 Enterprise LTSB 2015; Windows 8.1
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2; Windows Server 2012
Resolution: This issue is resolved in KB4493446.

Back to top
January 08, 2019
KB4480963
Resolved
KB4493446
Resolved:
April 09, 2019
10:00 AM PT

Opened:
January 08, 2019
10:00 AM PT
diff --git a/windows/release-information/status-windows-server-2012.yml b/windows/release-information/status-windows-server-2012.yml index 9fde41147b..120c7a32f3 100644 --- a/windows/release-information/status-windows-server-2012.yml +++ b/windows/release-information/status-windows-server-2012.yml @@ -63,7 +63,7 @@ sections:
System may be unresponsive after restart if Avira antivirus software installed
Devices with Avira antivirus software installed may become unresponsive upon restart.

See details >April 09, 2019
KB4493451Investigating
April 25, 2019
02:00 PM PT
Issue using PXE to start a device from WDS
There may be issues using the Preboot Execution Environment (PXE) to start a device from a Windows Deployment Services (WDS) server configured to use Variable Window Extension.

See details >March 12, 2019
KB4489891Mitigated
April 25, 2019
02:00 PM PT
System unresponsive after restart if Sophos Endpoint Protection installed
Devices with Sophos Endpoint Protection installed and managed by Sophos Central or Sophos Enterprise Console (SEC) may become unresponsive upon restart.

See details >April 09, 2019
KB4493451Mitigated
April 25, 2019
02:00 PM PT -
Certain operations performed on a Cluster Shared Volume may fail
Certain operations, such as rename, performed on files or folders on a Cluster Shared Volume (CSV) may fail with the error, “STATUS_BAD_IMPERSONATION_LEVEL (0xC00000A5)”.

See details >January 08, 2019
KB4480975Mitigated
January 08, 2019
10:00 AM PT +
Certain operations performed on a Cluster Shared Volume may fail
Certain operations, such as rename, performed on files or folders on a Cluster Shared Volume (CSV) may fail with the error, “STATUS_BAD_IMPERSONATION_LEVEL (0xC00000A5)”.

See details >January 08, 2019
KB4480975Mitigated
April 25, 2019
02:00 PM PT
Internet Explorer 11 authentication issue with multiple concurrent logons
Internet Explorer 11 users may encounter issues if two or more people use the same user account for multiple, concurrent login sessions on the same Windows Server machine.

See details >January 08, 2019
KB4480975Resolved
KB4493451April 09, 2019
10:00 AM PT
MSXML6 may cause applications to stop responding
MSXML6 may cause applications to stop responding if an exception was thrown during node operations, such as appendChild(), insertBefore(), and moveNode().

See details >January 08, 2019
KB4480975Resolved
KB4493451April 09, 2019
10:00 AM PT
Embedded objects may display incorrectly
Any compound document (OLE) server application that places embedded objects into the Windows Metafile (WMF) using the PatBlt API may display embedded objects incorrectly.

See details >February 12, 2019
KB4487025Resolved
KB4493451April 09, 2019
10:00 AM PT @@ -111,7 +111,7 @@ sections: - type: markdown text: " - +
DetailsOriginating updateStatusHistory
Certain operations performed on a Cluster Shared Volume may fail
Certain operations, such as rename, that you perform on files or folders that are on a Cluster Shared Volume (CSV) may fail with the error, \"STATUS_BAD_IMPERSONATION_LEVEL (0xC00000A5)\". This occurs when you perform the operation on a CSV owner node from a process that doesn’t have administrator privilege.

Affected platforms: 
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10, version 1607; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 10 Enterprise LTSB 2015; Windows 8.1
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2; Windows Server 2012
Workaround: Do one of the following:
  • Perform the operation from a process that has administrator privilege.
  • Perform the operation from a node that doesn’t have CSV ownership.
Next steps: Microsoft is working on a resolution and will provide an update in an upcoming release.

Back to top
January 08, 2019
KB4480975
Mitigated
Last updated:
January 08, 2019
10:00 AM PT

Opened:
January 08, 2019
10:00 AM PT
Certain operations performed on a Cluster Shared Volume may fail
Certain operations, such as rename, that you perform on files or folders that are on a Cluster Shared Volume (CSV) may fail with the error, \"STATUS_BAD_IMPERSONATION_LEVEL (0xC00000A5)\". This occurs when you perform the operation on a CSV owner node from a process that doesn’t have administrator privilege.

Affected platforms: 
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10, version 1607; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 10 Enterprise LTSB 2015; Windows 8.1
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2; Windows Server 2012
Workaround: Do one of the following:
  • Perform the operation from a process that has administrator privilege.
  • Perform the operation from a node that doesn’t have CSV ownership.
Next steps: Microsoft is working on a resolution and will provide an update in an upcoming release.

Back to top
January 08, 2019
KB4480975
Mitigated
Last updated:
April 25, 2019
02:00 PM PT

Opened:
January 08, 2019
10:00 AM PT
Internet Explorer 11 authentication issue with multiple concurrent logons
After installing KB4480975, Internet Explorer 11 and other applications that use WININET.DLL may have authentication issues. This occurs when two or more people use the same user account for multiple, concurrent login sessions on the same Windows Server machine, including Remote Desktop Protocol (RDP) and Terminal Server logons. Symptoms reported by customers include, but may not be limited to:
  • Cache size and location show zero or empty.
  • Keyboard shortcuts may not work properly.
  • Webpages may intermittently fail to load or render correctly.
  • Issues with credential prompts.
  • Issues when downloading files.
Affected platforms: 
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1607; Windows 10 Enterprise LTSC 2016; Windows 8.1; Windows 7 SP1
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server 2016; Windows Server 2012 R2; Windows Server 2012; Windows Server 2008 R2 SP1
Resolution: This issue is resolved in KB4493451.

Back to top
January 08, 2019
KB4480975
Resolved
KB4493451
Resolved:
April 09, 2019
10:00 AM PT

Opened:
January 08, 2019
10:00 AM PT
MSXML6 may cause applications to stop responding
After installing KB4480975, MSXML6 causes applications to stop responding if an exception was thrown during node operations, such as appendChild(), insertBefore(), and moveNode().

The Group Policy editor may stop responding when editing a Group Policy Object (GPO) that contains Group Policy Preferences (GPP) for Internet Explorer 10 settings.

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10, version 1607; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 10 Enterprise LTSB 2015; Windows 8.1
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2; Windows Server 2012
Resolution: This issue is resolved in KB4493451.

Back to top
January 08, 2019
KB4480975
Resolved
KB4493451
Resolved:
April 09, 2019
10:00 AM PT

Opened:
January 08, 2019
10:00 AM PT
From 9112fc3991f5e5510c578ad7125213e2747b466e Mon Sep 17 00:00:00 2001 From: "Nisha Mittal (Wipro Ltd.)" Date: Mon, 29 Apr 2019 19:02:16 -0700 Subject: [PATCH 244/724] Updated LastUpdated Time for two messages --- .../resolved-issues-windows-10-1507.yml | 12 ++--------- .../resolved-issues-windows-10-1607.yml | 12 ++--------- .../status-windows-10-1507.yml | 20 +++++++++---------- ...indows-10-1607-and-windows-server-2016.yml | 12 +++++++++-- 4 files changed, 24 insertions(+), 32 deletions(-) diff --git a/windows/release-information/resolved-issues-windows-10-1507.yml b/windows/release-information/resolved-issues-windows-10-1507.yml index 669c290b8b..8bc1336ec1 100644 --- a/windows/release-information/resolved-issues-windows-10-1507.yml +++ b/windows/release-information/resolved-issues-windows-10-1507.yml @@ -32,9 +32,9 @@ sections: - type: markdown text: " - + @@ -53,15 +53,6 @@ sections:
" -- title: April 2019 -- items: - - type: markdown - text: " -
SummaryOriginating updateStatusDate resolved
Embedded objects may display incorrectly
Any compound document (OLE) server application that places embedded objects into the Windows Metafile (WMF) using the PatBlt API may display embedded objects incorrectly.

See details >
OS Build 10240.18132

February 12, 2019
KB4487018
Resolved
KB4493475
April 29, 2019
12:45 AM PT
MSXML6 may cause applications to stop responding
MSXML6 may cause applications to stop responding if an exception was thrown during node operations, such as appendChild(), insertBefore(), and moveNode().

See details >
OS Build 10240.18094

January 08, 2019
KB4480962
Resolved
KB4493475
April 09, 2019
10:00 AM PT
Custom URI schemes may not start corresponding application
Custom URI schemes for application protocol handlers may not start the corresponding application for local intranet and trusted sites in Internet Explorer.

See details >
OS Build 10240.18158

March 12, 2019
KB4489872
Resolved
KB4493475
April 09, 2019
10:00 AM PT
Embedded objects may display incorrectly
Any compound document (OLE) server application that places embedded objects into the Windows Metafile (WMF) using the PatBlt API may display embedded objects incorrectly.

See details >
OS Build 10240.18132

February 12, 2019
KB4487018
Resolved
KB4493475
April 09, 2019
10:00 AM PT
Applications using Microsoft Jet database and Access 95 file format stop working
Applications that use a Microsoft Jet database with the Microsoft Access 95 file format may randomly stop working.

See details >
OS Build 10240.18132

February 12, 2019
KB4487018
Resolved
KB4489872
March 12, 2019
10:00 AM PT
Error 1309 when installing/uninstalling MSI or MSP files
Users may receive \"Error 1309\" while installing or uninstalling certain types of MSI and MSP files.

See details >
OS Build 10240.18132

February 12, 2019
KB4487018
Resolved
KB4489872
March 12, 2019
10:00 AM PT
First character of Japanese era name not recognized
The first character of the Japanese era name is not recognized as an abbreviation and may cause date parsing issues.

See details >
OS Build 10240.18132

February 12, 2019
KB4487018
Resolved
KB4489872
March 12, 2019
10:00 AM PT
- -
DetailsOriginating updateStatusHistory
Embedded objects may display incorrectly
Any compound document (OLE) server application that places embedded objects into the Windows Metafile (WMF) using the PatBlt API may display embedded objects incorrectly. 
 
For example, if you paste a Microsoft Excel worksheet object into a Microsoft Word document, the cells may render with a different background color. 
 
Affected platforms:  
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10, version 1607; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 10 Enterprise LTSB 2015; Windows 8.1; Windows 7 SP1
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2; Windows Server 2012; Windows Server 2008 R2 SP1; Windows Server 2008 SP2 
Resolution: This issue is resolved in KB4493475

Back to top
OS Build 10240.18132

February 12, 2019
KB4487018
Resolved
KB4493475
Resolved:
April 09, 2019
10:00 AM PT

Opened:
April 29, 2019
12:45 AM PT
- " - - title: March 2019 - items: - type: markdown @@ -76,6 +67,7 @@ sections: - type: markdown text: " + diff --git a/windows/release-information/resolved-issues-windows-10-1607.yml b/windows/release-information/resolved-issues-windows-10-1607.yml index ce9e393e85..a9f18fa22d 100644 --- a/windows/release-information/resolved-issues-windows-10-1607.yml +++ b/windows/release-information/resolved-issues-windows-10-1607.yml @@ -32,11 +32,11 @@ sections: - type: markdown text: "
DetailsOriginating updateStatusHistory
Embedded objects may display incorrectly
Any compound document (OLE) server application that places embedded objects into the Windows Metafile (WMF) using the PatBlt API may display embedded objects incorrectly. 
 
For example, if you paste a Microsoft Excel worksheet object into a Microsoft Word document, the cells may render with a different background color. 
 
Affected platforms:  
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10, version 1607; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 10 Enterprise LTSB 2015; Windows 8.1; Windows 7 SP1
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2; Windows Server 2012; Windows Server 2008 R2 SP1; Windows Server 2008 SP2 
Resolution: This issue is resolved in KB4493475

Back to top
OS Build 10240.18132

February 12, 2019
KB4487018
Resolved
KB4493475
Resolved:
April 09, 2019
10:00 AM PT

Opened:
February 12, 2019
10:00 AM PT
Applications using Microsoft Jet database and Access 95 file format stop working
Applications that use a Microsoft Jet database with the Microsoft Access 95 file format may randomly stop working.

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10, version 1607; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 10 Enterprise LTSB 2015; Windows 7 SP1
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012; Windows Server 2008 R2 SP1; Windows Server 2008 SP2
Resolution: This issue is resolved in KB4489872.

Back to top
OS Build 10240.18132

February 12, 2019
KB4487018
Resolved
KB4489872
Resolved:
March 12, 2019
10:00 AM PT

Opened:
February 12, 2019
10:00 AM PT
Error 1309 when installing/uninstalling MSI or MSP files
After installing KB4487018, users may receive “Error 1309” while installing or uninstalling certain types of MSI and MSP files.

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10, version 1607; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 10 Enterprise LTSB 2015; Windows 8.1
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2; Windows Server 2012
Resolution: This issue is resolved in KB4489872.

Back to top
OS Build 10240.18132

February 12, 2019
KB4487018
Resolved
KB4489872
Resolved:
March 12, 2019
10:00 AM PT

Opened:
February 12, 2019
10:00 AM PT
First character of Japanese era name not recognized
After installing KB4487018, the first character of the Japanese era name is not recognized as an abbreviation and may cause date parsing issues.

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10, version 1607; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 10 Enterprise LTSB 2015; Windows 8.1; Windows 7 SP1
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2; Windows Server 2012; Windows Server 2008 R2 SP1; Windows Server 2008 SP2
Resolution: This issue is resolved in KB4489872.

Back to top
OS Build 10240.18132

February 12, 2019
KB4487018
Resolved
KB4489872
Resolved:
March 12, 2019
10:00 AM PT

Opened:
February 12, 2019
10:00 AM PT
- + @@ -60,15 +60,6 @@ sections:
" -- title: April 2019 -- items: - - type: markdown - text: " -
SummaryOriginating updateStatusDate resolved
Embedded objects may display incorrectly
Any compound document (OLE) server application that places embedded objects into the Windows Metafile (WMF) using the PatBlt API may display embedded objects incorrectly.

See details >
OS Build 14393.2791

February 12, 2019
KB4487026
Resolved
KB4493470
April 29, 2019
12:43 AM PT
Custom URI schemes may not start corresponding application
Custom URI schemes for application protocol handlers may not start the corresponding application for local intranet and trusted sites in Internet Explorer.

See details >
OS Build 14393.2848

March 12, 2019
KB4489882
Resolved
KB4493473
April 25, 2019
02:00 PM PT
End-user-defined characters (EUDC) may cause blue screen at startup
If you enable per font end-user-defined characters (EUDC), the system will stop working and a blue screen may appear at startup.

See details >
OS Build 14393.2879

March 19, 2019
KB4489889
Resolved
KB4493470
April 09, 2019
10:00 AM PT
Internet Explorer 11 authentication issue with multiple concurrent logons
Internet Explorer 11 users may encounter issues if two or more people use the same user account for multiple, concurrent login sessions on the same Windows Server machine.

See details >
OS Build 14393.2724

January 08, 2019
KB4480961
Resolved
KB4493470
April 09, 2019
10:00 AM PT
MSXML6 may cause applications to stop responding
MSXML6 may cause applications to stop responding if an exception was thrown during node operations, such as appendChild(), insertBefore(), and moveNode().

See details >
OS Build 14393.2724

January 08, 2019
KB4480961
Resolved
KB4493470
April 09, 2019
10:00 AM PT
Embedded objects may display incorrectly
Any compound document (OLE) server application that places embedded objects into the Windows Metafile (WMF) using the PatBlt API may display embedded objects incorrectly.

See details >
OS Build 14393.2791

February 12, 2019
KB4487026
Resolved
KB4493470
April 09, 2019
10:00 AM PT
Issue hosting multiple terminal server sessions and a user logs off on Windows Server
In some cases, Windows Server will stop working and restart when hosting multiple terminal server sessions and a user logs off.

See details >
OS Build 14393.2828

February 19, 2019
KB4487006
Resolved
KB4489882
March 12, 2019
10:00 AM PT
Error 1309 when installing/uninstalling MSI or MSP files
Users may receive “Error 1309” while installing or uninstalling certain types of MSI and MSP files.

See details >
OS Build 14393.2791

February 12, 2019
KB4487026
Resolved
KB4489882
March 12, 2019
10:00 AM PT
Applications using Microsoft Jet database and Access 95 file format stop working
Applications that use a Microsoft Jet database with the Microsoft Access 95 file format may randomly stop working.

See details >
OS Build 14393.2791

February 12, 2019
KB4487026
Resolved
KB4487006
February 19, 2019
02:00 PM PT
- -
DetailsOriginating updateStatusHistory
Embedded objects may display incorrectly
Any compound document (OLE) server application that places embedded objects into the Windows Metafile (WMF) using the PatBlt API may display embedded objects incorrectly. 
 
For example, if you paste a Microsoft Excel worksheet object into a Microsoft Word document, the cells may render with a different background color. 
 
Affected platforms:  
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10, version 1607; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 10 Enterprise LTSB 2015; Windows 8.1; Windows 7 SP1 
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2; Windows Server 2012; Windows Server 2008 R2 SP1; Windows Server 2008 SP2 
Resolution: This issue is resolved in KB4493470

Back to top
OS Build 14393.2791

February 12, 2019
KB4487026
Resolved
KB4493470
Resolved:
April 09, 2019
10:00 AM PT

Opened:
April 29, 2019
12:43 AM PT
- " - - title: March 2019 - items: - type: markdown @@ -84,6 +75,7 @@ sections: - type: markdown text: " + diff --git a/windows/release-information/status-windows-10-1507.yml b/windows/release-information/status-windows-10-1507.yml index c606f75d55..0a9bcbadc7 100644 --- a/windows/release-information/status-windows-10-1507.yml +++ b/windows/release-information/status-windows-10-1507.yml @@ -61,9 +61,9 @@ sections: text: "
This table offers a summary of current active issues and those issues that have been resolved in the last 30 days.

DetailsOriginating updateStatusHistory
Embedded objects may display incorrectly
Any compound document (OLE) server application that places embedded objects into the Windows Metafile (WMF) using the PatBlt API may display embedded objects incorrectly. 
 
For example, if you paste a Microsoft Excel worksheet object into a Microsoft Word document, the cells may render with a different background color. 
 
Affected platforms:  
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10, version 1607; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 10 Enterprise LTSB 2015; Windows 8.1; Windows 7 SP1 
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2; Windows Server 2012; Windows Server 2008 R2 SP1; Windows Server 2008 SP2 
Resolution: This issue is resolved in KB4493470

Back to top
OS Build 14393.2791

February 12, 2019
KB4487026
Resolved
KB4493470
Resolved:
April 09, 2019
10:00 AM PT

Opened:
February 12, 2019
10:00 AM PT
Issue hosting multiple terminal server sessions and a user logs off on Windows Server
In some cases, Windows Server will stop working and restart when hosting multiple terminal server sessions and a user logs off. The faulting driver is win32kbase.sys.

Affected platforms:
  • Client: Windows 10, version 1607; Windows 10 Enterprise LTSC 2016
  • Server: Windows Server 2016
Resolution: This issue is resolved in KB4489882.

Back to top
OS Build 14393.2828

February 19, 2019
KB4487006
Resolved
KB4489882
Resolved:
March 12, 2019
10:00 AM PT

Opened:
February 19, 2019
02:00 PM PT
Error 1309 when installing/uninstalling MSI or MSP files
After installing KB4487026, users may receive “Error 1309” while installing or uninstalling certain types of MSI and MSP files.

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10, version 1607; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 10 Enterprise LTSB 2015; Windows 8.1
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2; Windows Server 2012
Resolution: This issue is resolved in KB4489882.

Back to top
OS Build 14393.2791

February 12, 2019
KB4487026
Resolved
KB4489882
Resolved:
March 12, 2019
10:00 AM PT

Opened:
February 12, 2019
10:00 AM PT
Applications using Microsoft Jet database and Access 95 file format stop working
Applications that use a Microsoft Jet database with the Microsoft Access 95 file format may randomly stop working.

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10, version 1607; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 10 Enterprise LTSB 2015; Windows 7 SP1
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012; Windows Server 2008 R2 SP1; Windows Server 2008 SP2
Resolution: This issue is resolved in KB4487006.

Back to top
OS Build 14393.2791

February 12, 2019
KB4487026
Resolved
KB4487006
Resolved:
February 19, 2019
02:00 PM PT

Opened:
February 12, 2019
10:00 AM PT
- +
SummaryOriginating updateStatusLast updated
Certain operations performed on a Cluster Shared Volume may fail
Certain operations, such as rename, performed on files or folders on a Cluster Shared Volume (CSV) may fail with the error, \"STATUS_BAD_IMPERSONATION_LEVEL (0xC00000A5)\".

See details >
OS Build 10240.18094

January 08, 2019
KB4480962
Mitigated
April 25, 2019
02:00 PM PT
Embedded objects may display incorrectly
Any compound document (OLE) server application that places embedded objects into the Windows Metafile (WMF) using the PatBlt API may display embedded objects incorrectly.

See details >
OS Build 10240.18132

February 12, 2019
KB4487018
Resolved
KB4493475
April 29, 2019
12:45 AM PT
MSXML6 may cause applications to stop responding
MSXML6 may cause applications to stop responding if an exception was thrown during node operations, such as appendChild(), insertBefore(), and moveNode().

See details >
OS Build 10240.18094

January 08, 2019
KB4480962
Resolved
KB4493475
April 09, 2019
10:00 AM PT
Custom URI schemes may not start corresponding application
Custom URI schemes for application protocol handlers may not start the corresponding application for local intranet and trusted sites in Internet Explorer.

See details >
OS Build 10240.18158

March 12, 2019
KB4489872
Resolved
KB4493475
April 09, 2019
10:00 AM PT
Embedded objects may display incorrectly
Any compound document (OLE) server application that places embedded objects into the Windows Metafile (WMF) using the PatBlt API may display embedded objects incorrectly.

See details >
OS Build 10240.18132

February 12, 2019
KB4487018
Resolved
KB4493475
April 09, 2019
10:00 AM PT
" @@ -74,15 +74,6 @@ sections:
" -- title: April 2019 -- items: - - type: markdown - text: " - - -
DetailsOriginating updateStatusHistory
Embedded objects may display incorrectly
Any compound document (OLE) server application that places embedded objects into the Windows Metafile (WMF) using the PatBlt API may display embedded objects incorrectly. 
 
For example, if you paste a Microsoft Excel worksheet object into a Microsoft Word document, the cells may render with a different background color. 
 
Affected platforms:  
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10, version 1607; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 10 Enterprise LTSB 2015; Windows 8.1; Windows 7 SP1
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2; Windows Server 2012; Windows Server 2008 R2 SP1; Windows Server 2008 SP2 
Resolution: This issue is resolved in KB4493475

Back to top
OS Build 10240.18132

February 12, 2019
KB4487018
Resolved
KB4493475
Resolved:
April 09, 2019
10:00 AM PT

Opened:
April 29, 2019
12:45 AM PT
- " - - title: March 2019 - items: - type: markdown @@ -92,6 +83,15 @@ sections: " +- title: February 2019 +- items: + - type: markdown + text: " + + +
DetailsOriginating updateStatusHistory
Embedded objects may display incorrectly
Any compound document (OLE) server application that places embedded objects into the Windows Metafile (WMF) using the PatBlt API may display embedded objects incorrectly. 
 
For example, if you paste a Microsoft Excel worksheet object into a Microsoft Word document, the cells may render with a different background color. 
 
Affected platforms:  
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10, version 1607; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 10 Enterprise LTSB 2015; Windows 8.1; Windows 7 SP1
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2; Windows Server 2012; Windows Server 2008 R2 SP1; Windows Server 2008 SP2 
Resolution: This issue is resolved in KB4493475

Back to top
OS Build 10240.18132

February 12, 2019
KB4487018
Resolved
KB4493475
Resolved:
April 09, 2019
10:00 AM PT

Opened:
February 12, 2019
10:00 AM PT
+ " + - title: January 2019 - items: - type: markdown diff --git a/windows/release-information/status-windows-10-1607-and-windows-server-2016.yml b/windows/release-information/status-windows-10-1607-and-windows-server-2016.yml index c5c5e91012..de704f0e29 100644 --- a/windows/release-information/status-windows-10-1607-and-windows-server-2016.yml +++ b/windows/release-information/status-windows-10-1607-and-windows-server-2016.yml @@ -66,11 +66,11 @@ sections:
SCVMM cannot enumerate and manage logical switches deployed on the host
For hosts managed by System Center Virtual Machine Manager (VMM), VMM cannot enumerate and manage logical switches deployed on the host.

See details >OS Build 14393.2639

November 27, 2018
KB4467684Mitigated
April 25, 2019
02:00 PM PT
Certain operations performed on a Cluster Shared Volume may fail
Certain operations, such as rename, performed on files or folders on a Cluster Shared Volume (CSV) may fail with the error, \"STATUS_BAD_IMPERSONATION_LEVEL (0xC00000A5)\".

See details >OS Build 14393.2724

January 08, 2019
KB4480961Mitigated
April 25, 2019
02:00 PM PT
Windows may not start on certain Lenovo and Fujitsu laptops with less than 8GB of RAM
Windows may fail to start on certain Lenovo and Fujitsu laptops that have less than 8 GB of RAM.

See details >OS Build 14393.2608

November 13, 2018
KB4467691Mitigated
February 19, 2019
10:00 AM PT -
Embedded objects may display incorrectly
Any compound document (OLE) server application that places embedded objects into the Windows Metafile (WMF) using the PatBlt API may display embedded objects incorrectly.

See details >OS Build 14393.2791

February 12, 2019
KB4487026Resolved
KB4493470April 29, 2019
12:43 AM PT
Custom URI schemes may not start corresponding application
Custom URI schemes for application protocol handlers may not start the corresponding application for local intranet and trusted sites in Internet Explorer.

See details >OS Build 14393.2848

March 12, 2019
KB4489882Resolved
KB4493473April 25, 2019
02:00 PM PT
End-user-defined characters (EUDC) may cause blue screen at startup
If you enable per font end-user-defined characters (EUDC), the system will stop working and a blue screen may appear at startup.

See details >OS Build 14393.2879

March 19, 2019
KB4489889Resolved
KB4493470April 09, 2019
10:00 AM PT
Internet Explorer 11 authentication issue with multiple concurrent logons
Internet Explorer 11 users may encounter issues if two or more people use the same user account for multiple, concurrent login sessions on the same Windows Server machine.

See details >OS Build 14393.2724

January 08, 2019
KB4480961Resolved
KB4493470April 09, 2019
10:00 AM PT
MSXML6 may cause applications to stop responding
MSXML6 may cause applications to stop responding if an exception was thrown during node operations, such as appendChild(), insertBefore(), and moveNode().

See details >OS Build 14393.2724

January 08, 2019
KB4480961Resolved
KB4493470April 09, 2019
10:00 AM PT +
Embedded objects may display incorrectly
Any compound document (OLE) server application that places embedded objects into the Windows Metafile (WMF) using the PatBlt API may display embedded objects incorrectly.

See details >OS Build 14393.2791

February 12, 2019
KB4487026Resolved
KB4493470April 09, 2019
10:00 AM PT " @@ -87,7 +87,6 @@ sections: text: " -
DetailsOriginating updateStatusHistory
Zone transfers over TCP may fail
Zone transfers between primary and secondary DNS servers over the Transmission Control Protocol (TCP) may fail after installing KB4493473
 
Affected platforms:  
  • Client: Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1607; Windows 10 Enterprise LTSC 2016 
  • Server: Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016 
Next steps: Microsoft is working on a resolution and will provide an update in an upcoming release. 

Back to top
OS Build 14393.2941

April 25, 2019
KB4493473
Investigating
Last updated:
April 25, 2019
02:00 PM PT

Opened:
April 25, 2019
02:00 PM PT
Embedded objects may display incorrectly
Any compound document (OLE) server application that places embedded objects into the Windows Metafile (WMF) using the PatBlt API may display embedded objects incorrectly. 
 
For example, if you paste a Microsoft Excel worksheet object into a Microsoft Word document, the cells may render with a different background color. 
 
Affected platforms:  
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10, version 1607; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 10 Enterprise LTSB 2015; Windows 8.1; Windows 7 SP1 
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2; Windows Server 2012; Windows Server 2008 R2 SP1; Windows Server 2008 SP2 
Resolution: This issue is resolved in KB4493470

Back to top
OS Build 14393.2791

February 12, 2019
KB4487026
Resolved
KB4493470
Resolved:
April 09, 2019
10:00 AM PT

Opened:
April 29, 2019
12:43 AM PT
" @@ -103,6 +102,15 @@ sections: " +- title: February 2019 +- items: + - type: markdown + text: " + + +
DetailsOriginating updateStatusHistory
Embedded objects may display incorrectly
Any compound document (OLE) server application that places embedded objects into the Windows Metafile (WMF) using the PatBlt API may display embedded objects incorrectly. 
 
For example, if you paste a Microsoft Excel worksheet object into a Microsoft Word document, the cells may render with a different background color. 
 
Affected platforms:  
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10, version 1607; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 10 Enterprise LTSB 2015; Windows 8.1; Windows 7 SP1 
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2; Windows Server 2012; Windows Server 2008 R2 SP1; Windows Server 2008 SP2 
Resolution: This issue is resolved in KB4493470

Back to top
OS Build 14393.2791

February 12, 2019
KB4487026
Resolved
KB4493470
Resolved:
April 09, 2019
10:00 AM PT

Opened:
February 12, 2019
10:00 AM PT
+ " + - title: January 2019 - items: - type: markdown From bbcbdc8025e955ccab8eb12eec1b7d6f9efb688e Mon Sep 17 00:00:00 2001 From: "Nisha Mittal (Wipro Ltd.)" Date: Mon, 29 Apr 2019 19:14:47 -0700 Subject: [PATCH 245/724] Updated Affected platform data for few more messages --- windows/release-information/resolved-issues-windows-10-1607.yml | 2 +- windows/release-information/resolved-issues-windows-10-1703.yml | 2 +- windows/release-information/resolved-issues-windows-10-1709.yml | 2 +- windows/release-information/resolved-issues-windows-10-1803.yml | 2 +- .../resolved-issues-windows-10-1809-and-windows-server-2019.yml | 2 +- 5 files changed, 5 insertions(+), 5 deletions(-) diff --git a/windows/release-information/resolved-issues-windows-10-1607.yml b/windows/release-information/resolved-issues-windows-10-1607.yml index a9f18fa22d..b34d0a46a7 100644 --- a/windows/release-information/resolved-issues-windows-10-1607.yml +++ b/windows/release-information/resolved-issues-windows-10-1607.yml @@ -120,7 +120,7 @@ sections: - type: markdown text: " - +
DetailsOriginating updateStatusHistory
Promotions that create non-root domains fail with optional features enabled
After installing KB4457127, Windows Server 2016 promotions that create non-root domains fail in forests in which optional features like Active Directory recycle have been enabled. The error is, “The replication operation encountered a database error.”

Affected platforms:
  • Client: Windows 10, version 1607; Windows 10 Enterprise LTSC 2016
  • Server: Windows Server 2016
Resolution: This issue is resolved in KB4467684.

Back to top
OS Build 14393.2515

September 20, 2018
KB4457127
Resolved
KB4467684
Resolved:
November 27, 2018
10:00 AM PT

Opened:
September 20, 2018
10:00 AM PT
Promotions that create non-root domains fail with optional features enabled
After installing KB4457127, Windows Server 2016 promotions that create non-root domains fail in forests in which optional features like Active Directory recycle have been enabled. The error is, “The replication operation encountered a database error.”

Affected platforms:
  • Server: Windows Server 2016
Resolution: This issue is resolved in KB4467684.

Back to top
OS Build 14393.2515

September 20, 2018
KB4457127
Resolved
KB4467684
Resolved:
November 27, 2018
10:00 AM PT

Opened:
September 20, 2018
10:00 AM PT
" diff --git a/windows/release-information/resolved-issues-windows-10-1703.yml b/windows/release-information/resolved-issues-windows-10-1703.yml index 1abdfc3ae9..206c6add4d 100644 --- a/windows/release-information/resolved-issues-windows-10-1703.yml +++ b/windows/release-information/resolved-issues-windows-10-1703.yml @@ -87,7 +87,7 @@ sections:
MSXML6 may cause applications to stop responding
After installing KB4480973, MSXML6 causes applications to stop responding if an exception was thrown during node operations, such as appendChild(), insertBefore(), and moveNode().

The Group Policy editor may stop responding when editing a Group Policy Object (GPO) that contains Group Policy Preferences (GPP) for Internet Explorer 10 settings.

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10, version 1607; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 10 Enterprise LTSB 2015; Windows 8.1
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2; Windows Server 2012
Resolution: This issue was resolved in KB4493474.

Back to topOS Build 15063.1563

January 08, 2019
KB4480973Resolved
KB4493474Resolved:
April 09, 2019
10:00 AM PT

Opened:
January 08, 2019
10:00 AM PT
First character of the Japanese era name not recognized as an abbreviation
After installing KB4480959, the first character of the Japanese era name is not recognized as an abbreviation and may cause date parsing issues.

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10, version 1607; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 10 Enterprise LTSB 2015; Windows 8.1; Windows 7 SP1
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2; Windows Server 2012; Windows Server 2008 R2 SP1; Windows Server 2008 SP2
Resolution: This issue is resolved in KB4487011.

Back to topOS Build 15063.1596

January 15, 2019
KB4480959Resolved
KB4487011Resolved:
February 19, 2019
02:00 PM PT

Opened:
January 15, 2019
10:00 AM PT
Applications using Microsoft Jet database fail to open
Applications that use a Microsoft Jet database with the Microsoft Access 97 file format may fail to open if the database has column names greater than 32 characters. The database will fail to open with the error, “Unrecognized Database Format”.

Affected platforms:
  • Client: Windows 10, version 1709; Windows 10, version 1703; Windows 10, version 1607; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 10 Enterprise LTSB 2015; Windows 8.1; Windows 7 SP1 
  • Server: Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2; Windows Server 2012; Windows Server 2008 R2 SP1; Windows Server 2008 SP2
Resolution: This issue is resolved in KB4487020.

Back to topOS Build 15063.1563

January 08, 2019
KB4480973Resolved
KB4487020Resolved:
February 12, 2019
10:00 AM PT

Opened:
January 08, 2019
10:00 AM PT -
Webpages become unresponsive in Microsoft Edge
After installing KB4480973, some Microsoft Edge users report that they:
  • Cannot load webpages using a local IP address.
  • Cannot load webpages on the Internet using a VPN connection.
Browsing fails or the webpage may become unresponsive.

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10, version 1607; Windows 10 Enterprise LTSC 2016
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016
Resolution: This issue is resolved in KB4487020.

Back to topOS Build 15063.1563

January 08, 2019
KB4480973Resolved
KB4487020Resolved:
February 12, 2019
10:00 AM PT

Opened:
January 08, 2019
10:00 AM PT +
Webpages become unresponsive in Microsoft Edge
After installing KB4480973, some Microsoft Edge users report that they:
  • Cannot load webpages using a local IP address.
  • Cannot load webpages on the Internet using a VPN connection.
Browsing fails or the webpage may become unresponsive.

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709
Resolution: This issue is resolved in KB4487020.

Back to topOS Build 15063.1563

January 08, 2019
KB4480973Resolved
KB4487020Resolved:
February 12, 2019
10:00 AM PT

Opened:
January 08, 2019
10:00 AM PT
Unable to access hotspots with third-party applications
After installing KB4480973, third-party applications may have difficulty authenticating hotspots.

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10, version 1607; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 10 Enterprise LTSB 2015; Windows 8.1
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2; Windows Server 2012
Resolution: This issue is resolved in KB4480959.

Back to topOS Build 15063.1563

January 08, 2019
KB4480973Resolved
KB4480959Resolved:
January 15, 2019
10:00 AM PT

Opened:
January 08, 2019
10:00 AM PT " diff --git a/windows/release-information/resolved-issues-windows-10-1709.yml b/windows/release-information/resolved-issues-windows-10-1709.yml index 54eb385db9..637fbe1a70 100644 --- a/windows/release-information/resolved-issues-windows-10-1709.yml +++ b/windows/release-information/resolved-issues-windows-10-1709.yml @@ -88,7 +88,7 @@ sections:
MSXML6 causes applications to stop responding if an exception was thrown
After installing KB4480978, MSXML6 causes applications to stop responding if an exception was thrown during node operations, such as appendChild(), insertBefore(), and moveNode().

The Group Policy editor may stop responding when editing a Group Policy Object (GPO) that contains Group Policy Preferences (GPP) for Internet Explorer 10 settings.

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10, version 1607; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 10 Enterprise LTSB 2015; Windows 8.1
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2; Windows Server 2012
Resolution: This issue is resolved in KB4493441.

Back to topOS Build 16299.904

January 08, 2019
KB4480978Resolved
KB4493441Resolved:
April 09, 2019
10:00 AM PT

Opened:
January 08, 2019
10:00 AM PT
First character of the Japanese era name not recognized as an abbreviation
After installing KB4480967, the first character of the Japanese era name is not recognized as an abbreviation and may cause date parsing issues.

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10, version 1607; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 10 Enterprise LTSB 2015; Windows 8.1; Windows 7 SP1
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2; Windows Server 2012; Windows Server 2008 R2 SP1; Windows Server 2008 SP2
Resolution: This issue is resolved in KB4487021.

Back to topOS Build 16299.936

January 15, 2019
KB4480967Resolved
KB4487021Resolved:
February 19, 2019
02:00 PM PT

Opened:
January 15, 2019
10:00 AM PT
Applications using Microsoft Jet database fail to open
Applications that use a Microsoft Jet database with the Microsoft Access 97 file format may fail to open if the database has column names greater than 32 characters. The database will fail to open with the error, “Unrecognized Database Format.”

Affected platforms:
  • Client: Windows 10, version 1709; Windows 10, version 1703; Windows 10, version 1607; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 10 Enterprise LTSB 2015; Windows 8.1; Windows 7 SP1 
  • Server: Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2; Windows Server 2012; Windows Server 2008 R2 SP1; Windows Server 2008 SP2 
Resolution: This issue is resolved in KB4486996.

Back to topOS Build 16299.904

January 08, 2019
KB4480978Resolved
KB4486996Resolved:
February 12, 2019
10:00 AM PT

Opened:
January 08, 2019
10:00 AM PT -
Webpages become unresponsive in Microsoft Edge
Microsoft and ArcaBit have identified an issue on devices with ArcaBit antivirus software installed that may cause the system to become unresponsive upon restart after installing KB4493446.

Microsoft has temporarily blocked devices from receiving this update if ArcaBit antivirus software is installed.

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10, version 1607; Windows 10 Enterprise LTSC 2016
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016
Workaround: ArcaBit has released an update to address this issue. For more information, see the Arcabit support article.

Back to topOS Build 16299.904

January 08, 2019
KB4480978Resolved
KB4486996Resolved:
February 12, 2019
10:00 AM PT

Opened:
January 08, 2019
10:00 AM PT +
Webpages become unresponsive in Microsoft Edge
Microsoft and ArcaBit have identified an issue on devices with ArcaBit antivirus software installed that may cause the system to become unresponsive upon restart after installing KB4493446.

Microsoft has temporarily blocked devices from receiving this update if ArcaBit antivirus software is installed.

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709
Workaround: ArcaBit has released an update to address this issue. For more information, see the Arcabit support article.

Back to topOS Build 16299.904

January 08, 2019
KB4480978Resolved
KB4486996Resolved:
February 12, 2019
10:00 AM PT

Opened:
January 08, 2019
10:00 AM PT
Unable to access hotspots with third-party applications
After installing KB4480978, third-party applications may have difficulty authenticating hotspots.

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10, version 1607; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 10 Enterprise LTSB 2015; Windows 8.1
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2; Windows Server 2012
Resolution: This issue is resolved in KB4480967.

Back to topOS Build 16299.904

January 08, 2019
KB4480978Resolved
KB4480967Resolved:
January 15, 2019
10:00 AM PT

Opened:
January 08, 2019
10:00 AM PT " diff --git a/windows/release-information/resolved-issues-windows-10-1803.yml b/windows/release-information/resolved-issues-windows-10-1803.yml index 62c4545e79..3b4fa2eade 100644 --- a/windows/release-information/resolved-issues-windows-10-1803.yml +++ b/windows/release-information/resolved-issues-windows-10-1803.yml @@ -92,7 +92,7 @@ sections:
First character of the Japanese era name not recognized
After installing KB4480976, the first character of the Japanese era name is not recognized as an abbreviation and may cause date parsing issues.

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10, version 1607; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 10 Enterprise LTSB 2015; Windows 8.1; Windows 7 SP1
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2; Windows Server 2012; Windows Server 2008 R2 SP1; Windows Server 2008 SP2
Resolution: This issue is resolved in KB4487029

Back to topOS Build 17134.556

January 15, 2019
KB4480976Resolved
KB4487029Resolved:
February 19, 2019
02:00 PM PT

Opened:
January 08, 2019
10:00 AM PT
MSXML6 may cause applications to stop responding
After installing KB4480966, MSXML6 causes applications to stop responding if an exception was thrown during node operations, such as appendChild(), insertBefore(), and moveNode().

The Group Policy editor may stop responding when editing a Group Policy Object (GPO) that contains Group Policy Preferences (GPP) for Internet Explorer 10 settings.

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10, version 1607; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 10 Enterprise LTSB 2015; Windows 8.1
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2; Windows Server 2012
Resolution: This issue was resolved in KB4493464

Back to topOS Build 17134.523

January 08, 2019
KB4480966Resolved
KB4493464Resolved:
April 09, 2019
10:00 AM PT

Opened:
January 08, 2019
10:00 AM PT
Applications using Microsoft Jet database and Access 95 file format stop working
Applications that use a Microsoft Jet database with the Microsoft Access 95 file format may randomly stop working. 

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10, version 1607; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 10 Enterprise LTSB 2015; Windows 7 SP1
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012; Windows Server 2008 R2 SP1; Windows Server 2008 SP2
Resolution: This issue is resolved in KB4487017.

Back to topOS Build 17134.523

January 08, 2019
KB4480966Resolved
KB4487017Resolved:
February 12, 2019
10:00 AM PT

Opened:
January 08, 2019
10:00 AM PT -
Webpages become unresponsive in Microsoft Edge
After installing KB4480966, some Microsoft Edge users report that they: 
  • Cannot load webpages using a local IP address. 
  • Cannot load webpages on the Internet using a VPN connection.  
Browsing fails or the webpage may become unresponsive. 

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10, version 1607; Windows 10 Enterprise LTSC 2016
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016
Resolution: This issue is resolved in KB4487017

Back to topOS Build 17134.523

January 08, 2019
KB4480966Resolved
KB4487017Resolved:
February 12, 2019
10:00 AM PT

Opened:
January 08, 2019
10:00 AM PT +
Webpages become unresponsive in Microsoft Edge
After installing KB4480966, some Microsoft Edge users report that they: 
  • Cannot load webpages using a local IP address. 
  • Cannot load webpages on the Internet using a VPN connection.  
Browsing fails or the webpage may become unresponsive. 

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709
Resolution: This issue is resolved in KB4487017

Back to topOS Build 17134.523

January 08, 2019
KB4480966Resolved
KB4487017Resolved:
February 12, 2019
10:00 AM PT

Opened:
January 08, 2019
10:00 AM PT
Unable to access hotspots with third-party applications
After installing KB4480966, third-party applications may have difficulty authenticating hotspots.

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10, version 1607; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 10 Enterprise LTSB 2015; Windows 8.1
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2; Windows Server 2012
Resolution: This issue is resolved in KB4480976

Back to topOS Build 17134.523

January 08, 2019
KB4480966Resolved
KB4480976Resolved:
January 15, 2019
10:00 AM PT

Opened:
January 08, 2019
10:00 AM PT " diff --git a/windows/release-information/resolved-issues-windows-10-1809-and-windows-server-2019.yml b/windows/release-information/resolved-issues-windows-10-1809-and-windows-server-2019.yml index 0c2f62c022..ed891ec80d 100644 --- a/windows/release-information/resolved-issues-windows-10-1809-and-windows-server-2019.yml +++ b/windows/release-information/resolved-issues-windows-10-1809-and-windows-server-2019.yml @@ -104,7 +104,7 @@ sections:
Internet Explorer 11 authentication issue with multiple concurrent logons
After installing KB4480116, Internet Explorer 11 and other applications that use WININET.DLL may have authentication issues. This occurs when two or more people use the same user account for multiple, concurrent login sessions on the same Windows Server machine, including Remote Desktop Protocol (RDP) and Terminal Server logons. Symptoms reported by customers include, but may not be limited to: 
  • Cache size and location show zero or empty. 
  • Keyboard shortcuts may not work properly. 
  • Webpages may intermittently fail to load or render correctly. 
  • Issues with credential prompts. 
  • Issues when downloading files. 
Affected platforms: 
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1607; Windows 10 Enterprise LTSC 2016; Windows 8.1; Windows 7 SP1
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server 2016; Windows Server 2012 R2; Windows Server 2012; Windows Server 2008 R2 SP1
Resolution: This issue was resolved in KB4493509

Back to topOS Build 17763.253

January 08, 2019
KB4480116Resolved
KB4493509Resolved:
April 09, 2019
10:00 AM PT

Opened:
January 08, 2019
10:00 AM PT
MSXML6 may cause applications to stop responding
After installing KB4480116, MSXML6 causes applications to stop responding if an exception was thrown during node operations, such as appendChild(), insertBefore(), and moveNode().
 
The Group Policy editor may stop responding when editing a Group Policy Object (GPO) that contains Group Policy Preferences (GPP) for Internet Explorer 10 settings. 

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10, version 1607; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 10 Enterprise LTSB 2015; Windows 8.1
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2; Windows Server 2012
Resolution: This issue was resolved in KB4493509

Back to topOS Build 17763.253

January 08, 2019
KB4480116Resolved
KB4493509Resolved:
April 09, 2019
10:00 AM PT

Opened:
January 08, 2019
10:00 AM PT
Global DNS outage affects Windows Update customers
Windows Update customers were affected by a network infrastructure event on January 29, 2019 (21:00 UTC), caused by an external DNS service provider's global outage. A software update to the external provider's DNS servers resulted in the distribution of corrupted DNS records that affected connectivity to the Windows Update service. The DNS records were restored by January 30, 2019 (00:10 UTC), and the majority of local Internet Service Providers (ISP) have refreshed their DNS servers and customer services have been restored. 
 
Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019
  • Server: Windows Server, version 1809; Windows Server 2019
While this was not an issue with Microsoft's services, we take any service disruption for our customers seriously. We will work with partners to better understand this so we can provide higher quality service in the future even across diverse global network providers. 
 
If you are still unable to connect to Windows Update services due to this problem, please contact your local ISP or network administrator. You can also refer to our new KB4493784 for more information to determine if your network is affected, and to provide your local ISP or network administrator with additional information to assist you. 

Back to topN/A

Resolved
Resolved:
March 08, 2019
11:15 AM PT

Opened:
January 29, 2019
02:00 PM PT -
Webpages become unresponsive in Microsoft Edge
After installing KB4480116, some Microsoft Edge users report that they:
  • Cannot load webpages using a local IP address. 
  • Cannot load webpages on the Internet using a VPN connection.
Browsing fails or the webpage may become unresponsive.

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10, version 1607; Windows 10 Enterprise LTSC 2016
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016
Resolution: This issue is resolved in KB4487044

Back to topOS Build 17763.253

January 08, 2019
KB4480116Resolved
KB4487044Resolved:
February 12, 2019
10:00 AM PT

Opened:
January 08, 2019
10:00 AM PT +
Webpages become unresponsive in Microsoft Edge
After installing KB4480116, some Microsoft Edge users report that they:
  • Cannot load webpages using a local IP address. 
  • Cannot load webpages on the Internet using a VPN connection.
Browsing fails or the webpage may become unresponsive.

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709
Resolution: This issue is resolved in KB4487044

Back to topOS Build 17763.253

January 08, 2019
KB4480116Resolved
KB4487044Resolved:
February 12, 2019
10:00 AM PT

Opened:
January 08, 2019
10:00 AM PT
Unable to access hotspots with third-party applications
After installing KB4480116, third-party applications may have difficulty authenticating hotspots. 

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10, version 1607; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 10 Enterprise LTSB 2015; Windows 8.1
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2; Windows Server 2012
Resolution: This issue is resolved in KB4476976

Back to topOS Build 17763.253

January 08, 2019
KB4480116Resolved
KB4476976Resolved:
January 22, 2019
02:00 PM PT

Opened:
January 08, 2019
10:00 AM PT " From 2f70fd91f48382821c95a3f620f12385688e4445 Mon Sep 17 00:00:00 2001 From: "Nisha Mittal (Wipro Ltd.)" Date: Mon, 29 Apr 2019 19:37:13 -0700 Subject: [PATCH 246/724] Fixed issue with same description --- windows/release-information/resolved-issues-windows-10-1703.yml | 2 +- windows/release-information/resolved-issues-windows-10-1709.yml | 2 +- windows/release-information/resolved-issues-windows-10-1803.yml | 2 +- .../resolved-issues-windows-10-1809-and-windows-server-2019.yml | 2 +- 4 files changed, 4 insertions(+), 4 deletions(-) diff --git a/windows/release-information/resolved-issues-windows-10-1703.yml b/windows/release-information/resolved-issues-windows-10-1703.yml index 206c6add4d..f92d1ca1e6 100644 --- a/windows/release-information/resolved-issues-windows-10-1703.yml +++ b/windows/release-information/resolved-issues-windows-10-1703.yml @@ -87,7 +87,7 @@ sections:
MSXML6 may cause applications to stop responding
After installing KB4480973, MSXML6 causes applications to stop responding if an exception was thrown during node operations, such as appendChild(), insertBefore(), and moveNode().

The Group Policy editor may stop responding when editing a Group Policy Object (GPO) that contains Group Policy Preferences (GPP) for Internet Explorer 10 settings.

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10, version 1607; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 10 Enterprise LTSB 2015; Windows 8.1
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2; Windows Server 2012
Resolution: This issue was resolved in KB4493474.

Back to topOS Build 15063.1563

January 08, 2019
KB4480973Resolved
KB4493474Resolved:
April 09, 2019
10:00 AM PT

Opened:
January 08, 2019
10:00 AM PT
First character of the Japanese era name not recognized as an abbreviation
After installing KB4480959, the first character of the Japanese era name is not recognized as an abbreviation and may cause date parsing issues.

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10, version 1607; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 10 Enterprise LTSB 2015; Windows 8.1; Windows 7 SP1
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2; Windows Server 2012; Windows Server 2008 R2 SP1; Windows Server 2008 SP2
Resolution: This issue is resolved in KB4487011.

Back to topOS Build 15063.1596

January 15, 2019
KB4480959Resolved
KB4487011Resolved:
February 19, 2019
02:00 PM PT

Opened:
January 15, 2019
10:00 AM PT
Applications using Microsoft Jet database fail to open
Applications that use a Microsoft Jet database with the Microsoft Access 97 file format may fail to open if the database has column names greater than 32 characters. The database will fail to open with the error, “Unrecognized Database Format”.

Affected platforms:
  • Client: Windows 10, version 1709; Windows 10, version 1703; Windows 10, version 1607; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 10 Enterprise LTSB 2015; Windows 8.1; Windows 7 SP1 
  • Server: Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2; Windows Server 2012; Windows Server 2008 R2 SP1; Windows Server 2008 SP2
Resolution: This issue is resolved in KB4487020.

Back to topOS Build 15063.1563

January 08, 2019
KB4480973Resolved
KB4487020Resolved:
February 12, 2019
10:00 AM PT

Opened:
January 08, 2019
10:00 AM PT -
Webpages become unresponsive in Microsoft Edge
After installing KB4480973, some Microsoft Edge users report that they:
  • Cannot load webpages using a local IP address.
  • Cannot load webpages on the Internet using a VPN connection.
Browsing fails or the webpage may become unresponsive.

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709
Resolution: This issue is resolved in KB4487020.

Back to topOS Build 15063.1563

January 08, 2019
KB4480973Resolved
KB4487020Resolved:
February 12, 2019
10:00 AM PT

Opened:
January 08, 2019
10:00 AM PT +
Webpages become unresponsive in Microsoft Edge
After installing KB4480973, some Microsoft Edge users report that they:
  • Cannot load web pages using a local IP address.
  • Cannot load web pages on the Internet using a VPN connection.
Browsing fails or the web page may become unresponsive.

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709
Resolution: This issue is resolved in KB4486996

Back to topOS Build 15063.1563

January 08, 2019
KB4480973Resolved
KB4487020Resolved:
February 12, 2019
10:00 AM PT

Opened:
January 08, 2019
10:00 AM PT
Unable to access hotspots with third-party applications
After installing KB4480973, third-party applications may have difficulty authenticating hotspots.

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10, version 1607; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 10 Enterprise LTSB 2015; Windows 8.1
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2; Windows Server 2012
Resolution: This issue is resolved in KB4480959.

Back to topOS Build 15063.1563

January 08, 2019
KB4480973Resolved
KB4480959Resolved:
January 15, 2019
10:00 AM PT

Opened:
January 08, 2019
10:00 AM PT " diff --git a/windows/release-information/resolved-issues-windows-10-1709.yml b/windows/release-information/resolved-issues-windows-10-1709.yml index 637fbe1a70..aa110ad6b2 100644 --- a/windows/release-information/resolved-issues-windows-10-1709.yml +++ b/windows/release-information/resolved-issues-windows-10-1709.yml @@ -88,7 +88,7 @@ sections:
MSXML6 causes applications to stop responding if an exception was thrown
After installing KB4480978, MSXML6 causes applications to stop responding if an exception was thrown during node operations, such as appendChild(), insertBefore(), and moveNode().

The Group Policy editor may stop responding when editing a Group Policy Object (GPO) that contains Group Policy Preferences (GPP) for Internet Explorer 10 settings.

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10, version 1607; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 10 Enterprise LTSB 2015; Windows 8.1
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2; Windows Server 2012
Resolution: This issue is resolved in KB4493441.

Back to topOS Build 16299.904

January 08, 2019
KB4480978Resolved
KB4493441Resolved:
April 09, 2019
10:00 AM PT

Opened:
January 08, 2019
10:00 AM PT
First character of the Japanese era name not recognized as an abbreviation
After installing KB4480967, the first character of the Japanese era name is not recognized as an abbreviation and may cause date parsing issues.

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10, version 1607; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 10 Enterprise LTSB 2015; Windows 8.1; Windows 7 SP1
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2; Windows Server 2012; Windows Server 2008 R2 SP1; Windows Server 2008 SP2
Resolution: This issue is resolved in KB4487021.

Back to topOS Build 16299.936

January 15, 2019
KB4480967Resolved
KB4487021Resolved:
February 19, 2019
02:00 PM PT

Opened:
January 15, 2019
10:00 AM PT
Applications using Microsoft Jet database fail to open
Applications that use a Microsoft Jet database with the Microsoft Access 97 file format may fail to open if the database has column names greater than 32 characters. The database will fail to open with the error, “Unrecognized Database Format.”

Affected platforms:
  • Client: Windows 10, version 1709; Windows 10, version 1703; Windows 10, version 1607; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 10 Enterprise LTSB 2015; Windows 8.1; Windows 7 SP1 
  • Server: Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2; Windows Server 2012; Windows Server 2008 R2 SP1; Windows Server 2008 SP2 
Resolution: This issue is resolved in KB4486996.

Back to topOS Build 16299.904

January 08, 2019
KB4480978Resolved
KB4486996Resolved:
February 12, 2019
10:00 AM PT

Opened:
January 08, 2019
10:00 AM PT -
Webpages become unresponsive in Microsoft Edge
Microsoft and ArcaBit have identified an issue on devices with ArcaBit antivirus software installed that may cause the system to become unresponsive upon restart after installing KB4493446.

Microsoft has temporarily blocked devices from receiving this update if ArcaBit antivirus software is installed.

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709
Workaround: ArcaBit has released an update to address this issue. For more information, see the Arcabit support article.

Back to topOS Build 16299.904

January 08, 2019
KB4480978Resolved
KB4486996Resolved:
February 12, 2019
10:00 AM PT

Opened:
January 08, 2019
10:00 AM PT +
Webpages become unresponsive in Microsoft Edge
After installing KB4480978, some Microsoft Edge users report that they:
  • Cannot load web pages using a local IP address. 
  • Cannot load web pages on the Internet using a VPN connection.  
Browsing fails or the web page may become unresponsive. 

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709
Resolution: This issue is resolved in KB4486996.

Back to topOS Build 16299.904

January 08, 2019
KB4480978Resolved
KB4486996Resolved:
February 12, 2019
10:00 AM PT

Opened:
January 08, 2019
10:00 AM PT
Unable to access hotspots with third-party applications
After installing KB4480978, third-party applications may have difficulty authenticating hotspots.

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10, version 1607; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 10 Enterprise LTSB 2015; Windows 8.1
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2; Windows Server 2012
Resolution: This issue is resolved in KB4480967.

Back to topOS Build 16299.904

January 08, 2019
KB4480978Resolved
KB4480967Resolved:
January 15, 2019
10:00 AM PT

Opened:
January 08, 2019
10:00 AM PT " diff --git a/windows/release-information/resolved-issues-windows-10-1803.yml b/windows/release-information/resolved-issues-windows-10-1803.yml index 3b4fa2eade..c4147211ce 100644 --- a/windows/release-information/resolved-issues-windows-10-1803.yml +++ b/windows/release-information/resolved-issues-windows-10-1803.yml @@ -92,7 +92,7 @@ sections:
First character of the Japanese era name not recognized
After installing KB4480976, the first character of the Japanese era name is not recognized as an abbreviation and may cause date parsing issues.

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10, version 1607; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 10 Enterprise LTSB 2015; Windows 8.1; Windows 7 SP1
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2; Windows Server 2012; Windows Server 2008 R2 SP1; Windows Server 2008 SP2
Resolution: This issue is resolved in KB4487029

Back to topOS Build 17134.556

January 15, 2019
KB4480976Resolved
KB4487029Resolved:
February 19, 2019
02:00 PM PT

Opened:
January 08, 2019
10:00 AM PT
MSXML6 may cause applications to stop responding
After installing KB4480966, MSXML6 causes applications to stop responding if an exception was thrown during node operations, such as appendChild(), insertBefore(), and moveNode().

The Group Policy editor may stop responding when editing a Group Policy Object (GPO) that contains Group Policy Preferences (GPP) for Internet Explorer 10 settings.

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10, version 1607; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 10 Enterprise LTSB 2015; Windows 8.1
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2; Windows Server 2012
Resolution: This issue was resolved in KB4493464

Back to topOS Build 17134.523

January 08, 2019
KB4480966Resolved
KB4493464Resolved:
April 09, 2019
10:00 AM PT

Opened:
January 08, 2019
10:00 AM PT
Applications using Microsoft Jet database and Access 95 file format stop working
Applications that use a Microsoft Jet database with the Microsoft Access 95 file format may randomly stop working. 

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10, version 1607; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 10 Enterprise LTSB 2015; Windows 7 SP1
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012; Windows Server 2008 R2 SP1; Windows Server 2008 SP2
Resolution: This issue is resolved in KB4487017.

Back to topOS Build 17134.523

January 08, 2019
KB4480966Resolved
KB4487017Resolved:
February 12, 2019
10:00 AM PT

Opened:
January 08, 2019
10:00 AM PT -
Webpages become unresponsive in Microsoft Edge
After installing KB4480966, some Microsoft Edge users report that they: 
  • Cannot load webpages using a local IP address. 
  • Cannot load webpages on the Internet using a VPN connection.  
Browsing fails or the webpage may become unresponsive. 

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709
Resolution: This issue is resolved in KB4487017

Back to topOS Build 17134.523

January 08, 2019
KB4480966Resolved
KB4487017Resolved:
February 12, 2019
10:00 AM PT

Opened:
January 08, 2019
10:00 AM PT +
Webpages become unresponsive in Microsoft Edge
After installing KB4480966, some Microsoft Edge users report that they: 
  • Cannot load web pages using a local IP address. 
  • Cannot load web pages on the Internet using a VPN connection.  
Browsing fails or the web page may become unresponsive. 

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709
Resolution: This issue is resolved in KB4487017

Back to topOS Build 17134.523

January 08, 2019
KB4480966Resolved
KB4487017Resolved:
February 12, 2019
10:00 AM PT

Opened:
January 08, 2019
10:00 AM PT
Unable to access hotspots with third-party applications
After installing KB4480966, third-party applications may have difficulty authenticating hotspots.

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10, version 1607; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 10 Enterprise LTSB 2015; Windows 8.1
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2; Windows Server 2012
Resolution: This issue is resolved in KB4480976

Back to topOS Build 17134.523

January 08, 2019
KB4480966Resolved
KB4480976Resolved:
January 15, 2019
10:00 AM PT

Opened:
January 08, 2019
10:00 AM PT " diff --git a/windows/release-information/resolved-issues-windows-10-1809-and-windows-server-2019.yml b/windows/release-information/resolved-issues-windows-10-1809-and-windows-server-2019.yml index ed891ec80d..349c914c2b 100644 --- a/windows/release-information/resolved-issues-windows-10-1809-and-windows-server-2019.yml +++ b/windows/release-information/resolved-issues-windows-10-1809-and-windows-server-2019.yml @@ -104,7 +104,7 @@ sections:
Internet Explorer 11 authentication issue with multiple concurrent logons
After installing KB4480116, Internet Explorer 11 and other applications that use WININET.DLL may have authentication issues. This occurs when two or more people use the same user account for multiple, concurrent login sessions on the same Windows Server machine, including Remote Desktop Protocol (RDP) and Terminal Server logons. Symptoms reported by customers include, but may not be limited to: 
  • Cache size and location show zero or empty. 
  • Keyboard shortcuts may not work properly. 
  • Webpages may intermittently fail to load or render correctly. 
  • Issues with credential prompts. 
  • Issues when downloading files. 
Affected platforms: 
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1607; Windows 10 Enterprise LTSC 2016; Windows 8.1; Windows 7 SP1
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server 2016; Windows Server 2012 R2; Windows Server 2012; Windows Server 2008 R2 SP1
Resolution: This issue was resolved in KB4493509

Back to topOS Build 17763.253

January 08, 2019
KB4480116Resolved
KB4493509Resolved:
April 09, 2019
10:00 AM PT

Opened:
January 08, 2019
10:00 AM PT
MSXML6 may cause applications to stop responding
After installing KB4480116, MSXML6 causes applications to stop responding if an exception was thrown during node operations, such as appendChild(), insertBefore(), and moveNode().
 
The Group Policy editor may stop responding when editing a Group Policy Object (GPO) that contains Group Policy Preferences (GPP) for Internet Explorer 10 settings. 

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10, version 1607; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 10 Enterprise LTSB 2015; Windows 8.1
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2; Windows Server 2012
Resolution: This issue was resolved in KB4493509

Back to topOS Build 17763.253

January 08, 2019
KB4480116Resolved
KB4493509Resolved:
April 09, 2019
10:00 AM PT

Opened:
January 08, 2019
10:00 AM PT
Global DNS outage affects Windows Update customers
Windows Update customers were affected by a network infrastructure event on January 29, 2019 (21:00 UTC), caused by an external DNS service provider's global outage. A software update to the external provider's DNS servers resulted in the distribution of corrupted DNS records that affected connectivity to the Windows Update service. The DNS records were restored by January 30, 2019 (00:10 UTC), and the majority of local Internet Service Providers (ISP) have refreshed their DNS servers and customer services have been restored. 
 
Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019
  • Server: Windows Server, version 1809; Windows Server 2019
While this was not an issue with Microsoft's services, we take any service disruption for our customers seriously. We will work with partners to better understand this so we can provide higher quality service in the future even across diverse global network providers. 
 
If you are still unable to connect to Windows Update services due to this problem, please contact your local ISP or network administrator. You can also refer to our new KB4493784 for more information to determine if your network is affected, and to provide your local ISP or network administrator with additional information to assist you. 

Back to topN/A

Resolved
Resolved:
March 08, 2019
11:15 AM PT

Opened:
January 29, 2019
02:00 PM PT -
Webpages become unresponsive in Microsoft Edge
After installing KB4480116, some Microsoft Edge users report that they:
  • Cannot load webpages using a local IP address. 
  • Cannot load webpages on the Internet using a VPN connection.
Browsing fails or the webpage may become unresponsive.

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709
Resolution: This issue is resolved in KB4487044

Back to topOS Build 17763.253

January 08, 2019
KB4480116Resolved
KB4487044Resolved:
February 12, 2019
10:00 AM PT

Opened:
January 08, 2019
10:00 AM PT +
Webpages become unresponsive in Microsoft Edge
After installing KB4480116, some Microsoft Edge users report that they:
  • Cannot load web pages using a local IP address. 
  • Cannot load web pages on the Internet using a VPN connection.
Browsing fails or the web page may become unresponsive.

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709
Resolution: This issue is resolved in KB4487020

Back to topOS Build 17763.253

January 08, 2019
KB4480116Resolved
KB4487044Resolved:
February 12, 2019
10:00 AM PT

Opened:
January 08, 2019
10:00 AM PT
Unable to access hotspots with third-party applications
After installing KB4480116, third-party applications may have difficulty authenticating hotspots. 

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10, version 1607; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 10 Enterprise LTSB 2015; Windows 8.1
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2; Windows Server 2012
Resolution: This issue is resolved in KB4476976

Back to topOS Build 17763.253

January 08, 2019
KB4480116Resolved
KB4476976Resolved:
January 22, 2019
02:00 PM PT

Opened:
January 08, 2019
10:00 AM PT " From e94540d85d1fbfa673712bd553f48bfd97946986 Mon Sep 17 00:00:00 2001 From: Dani Halfin Date: Mon, 29 Apr 2019 22:41:26 -0700 Subject: [PATCH 247/724] fixing conflicts --- .../resolved-issues-windows-10-1507.yml | 14 ------------- .../resolved-issues-windows-10-1607.yml | 13 ------------ .../resolved-issues-windows-10-1703.yml | 11 ---------- .../resolved-issues-windows-10-1709.yml | 8 -------- .../resolved-issues-windows-10-1803.yml | 5 ----- ...indows-10-1809-and-windows-server-2019.yml | 11 ---------- ...ndows-7-and-windows-server-2008-r2-sp1.yml | 6 ------ .../status-windows-10-1507.yml | 14 ------------- ...indows-10-1607-and-windows-server-2016.yml | 20 ------------------- .../status-windows-10-1703.yml | 9 --------- .../status-windows-10-1709.yml | 8 -------- .../status-windows-10-1803.yml | 8 -------- ...indows-10-1809-and-windows-server-2019.yml | 9 --------- ...ndows-7-and-windows-server-2008-r2-sp1.yml | 12 ----------- ...windows-8.1-and-windows-server-2012-r2.yml | 9 --------- .../status-windows-server-2012.yml | 8 -------- 16 files changed, 165 deletions(-) diff --git a/windows/release-information/resolved-issues-windows-10-1507.yml b/windows/release-information/resolved-issues-windows-10-1507.yml index c72e8798b2..8a5fe18b13 100644 --- a/windows/release-information/resolved-issues-windows-10-1507.yml +++ b/windows/release-information/resolved-issues-windows-10-1507.yml @@ -32,15 +32,9 @@ sections: - type: markdown text: " -<<<<<<< HEAD -======= - - - ->>>>>>> master @@ -82,12 +76,8 @@ sections: - type: markdown text: "
SummaryOriginating updateStatusDate resolved
MSXML6 may cause applications to stop responding
MSXML6 may cause applications to stop responding if an exception was thrown during node operations, such as appendChild(), insertBefore(), and moveNode().

See details >
OS Build 10240.18094

January 08, 2019
KB4480962
Resolved
KB4493475
April 09, 2019
10:00 AM PT
Custom URI schemes may not start corresponding application
Custom URI schemes for application protocol handlers may not start the corresponding application for local intranet and trusted sites in Internet Explorer.

See details >
OS Build 10240.18158

March 12, 2019
KB4489872
Resolved
KB4493475
April 09, 2019
10:00 AM PT
Embedded objects may display incorrectly
Any compound document (OLE) server application that places embedded objects into the Windows Metafile (WMF) using the PatBlt API may display embedded objects incorrectly.

See details >
OS Build 10240.18132

February 12, 2019
KB4487018
Resolved
KB4493475
April 09, 2019
10:00 AM PT
Embedded objects may display incorrectly
Any compound document (OLE) server application that places embedded objects into the Windows Metafile (WMF) using the PatBlt API may display embedded objects incorrectly.

See details >
OS Build 10240.18132

February 12, 2019
KB4487018
Resolved
KB4493475
April 29, 2019
12:45 AM PT
MSXML6 may cause applications to stop responding
MSXML6 may cause applications to stop responding if an exception was thrown during node operations, such as appendChild(), insertBefore(), and moveNode().

See details >
OS Build 10240.18094

January 08, 2019
KB4480962
Resolved
KB4493475
April 09, 2019
10:00 AM PT
Custom URI schemes may not start corresponding application
Custom URI schemes for application protocol handlers may not start the corresponding application for local intranet and trusted sites in Internet Explorer.

See details >
OS Build 10240.18158

March 12, 2019
KB4489872
Resolved
KB4493475
April 09, 2019
10:00 AM PT
Applications using Microsoft Jet database and Access 95 file format stop working
Applications that use a Microsoft Jet database with the Microsoft Access 95 file format may randomly stop working.

See details >
OS Build 10240.18132

February 12, 2019
KB4487018
Resolved
KB4489872
March 12, 2019
10:00 AM PT
Error 1309 when installing/uninstalling MSI or MSP files
Users may receive \"Error 1309\" while installing or uninstalling certain types of MSI and MSP files.

See details >
OS Build 10240.18132

February 12, 2019
KB4487018
Resolved
KB4489872
March 12, 2019
10:00 AM PT
First character of Japanese era name not recognized
The first character of the Japanese era name is not recognized as an abbreviation and may cause date parsing issues.

See details >
OS Build 10240.18132

February 12, 2019
KB4487018
Resolved
KB4489872
March 12, 2019
10:00 AM PT
-<<<<<<< HEAD -======= - ->>>>>>> master @@ -100,11 +90,7 @@ sections: text: "
DetailsOriginating updateStatusHistory
Embedded objects may display incorrectly
Any compound document (OLE) server application that places embedded objects into the Windows Metafile (WMF) using the PatBlt API may display embedded objects incorrectly. 
 
For example, if you paste a Microsoft Excel worksheet object into a Microsoft Word document, the cells may render with a different background color. 
 
Affected platforms:  
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10, version 1607; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 10 Enterprise LTSB 2015; Windows 8.1; Windows 7 SP1
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2; Windows Server 2012; Windows Server 2008 R2 SP1; Windows Server 2008 SP2 
Resolution: This issue is resolved in KB4493475

Back to top
OS Build 10240.18132

February 12, 2019
KB4487018
Resolved
KB4493475
Resolved:
April 09, 2019
10:00 AM PT

Opened:
February 12, 2019
10:00 AM PT
Applications using Microsoft Jet database and Access 95 file format stop working
Applications that use a Microsoft Jet database with the Microsoft Access 95 file format may randomly stop working.

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10, version 1607; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 10 Enterprise LTSB 2015; Windows 7 SP1
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012; Windows Server 2008 R2 SP1; Windows Server 2008 SP2
Resolution: This issue is resolved in KB4489872.

Back to top
OS Build 10240.18132

February 12, 2019
KB4487018
Resolved
KB4489872
Resolved:
March 12, 2019
10:00 AM PT

Opened:
February 12, 2019
10:00 AM PT
Applications using Microsoft Jet database and Access 95 file format stop working
Applications that use a Microsoft Jet database with the Microsoft Access 95 file format may randomly stop working.

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10, version 1607; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 10 Enterprise LTSB 2015; Windows 7 SP1
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2; Windows Server 2012; Windows Server 2008 R2 SP1; Windows Server 2008 SP2
Resolution: This issue is resolved in KB4489872.

Back to top
OS Build 10240.18132

February 12, 2019
KB4487018
Resolved
KB4489872
Resolved:
March 12, 2019
10:00 AM PT

Opened:
February 12, 2019
10:00 AM PT
Error 1309 when installing/uninstalling MSI or MSP files
After installing KB4487018, users may receive “Error 1309” while installing or uninstalling certain types of MSI and MSP files.

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10, version 1607; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 10 Enterprise LTSB 2015; Windows 8.1
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2; Windows Server 2012
Resolution: This issue is resolved in KB4489872.

Back to top
OS Build 10240.18132

February 12, 2019
KB4487018
Resolved
KB4489872
Resolved:
March 12, 2019
10:00 AM PT

Opened:
February 12, 2019
10:00 AM PT
First character of Japanese era name not recognized
After installing KB4487018, the first character of the Japanese era name is not recognized as an abbreviation and may cause date parsing issues.

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10, version 1607; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 10 Enterprise LTSB 2015; Windows 8.1; Windows 7 SP1
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2; Windows Server 2012; Windows Server 2008 R2 SP1; Windows Server 2008 SP2
Resolution: This issue is resolved in KB4489872.

Back to top
OS Build 10240.18132

February 12, 2019
KB4487018
Resolved
KB4489872
Resolved:
March 12, 2019
10:00 AM PT

Opened:
February 12, 2019
10:00 AM PT
Internet Explorer may fail to load images
After installing KB4487018, Internet Explorer may fail to load images with a backslash (\\) in their relative source path.

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10, version 1607; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 10 Enterprise LTSB 2015; Windows 8.1; Windows 7 SP1
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2; Windows Server 2008 R2 SP1
Resolution: This issue is resolved in KB4491101.

Back to top
OS Build 10240.18132

February 12, 2019
KB4487018
Resolved
KB4491101
Resolved:
February 21, 2019
02:00 PM PT

Opened:
February 12, 2019
10:00 AM PT
-<<<<<<< HEAD -======= - ->>>>>>> master
DetailsOriginating updateStatusHistory
MSXML6 may cause applications to stop responding
After installing KB4480962, MSXML6 causes applications to stop responding if an exception was thrown during node operations, such as appendChild(), insertBefore(), and moveNode().

The Group Policy editor may stop responding when editing a Group Policy Object (GPO) that contains Group Policy Preferences (GPP) for Internet Explorer 10 settings.

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10, version 1607; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 10 Enterprise LTSB 2015; Windows 8.1
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2; Windows Server 2012
Resolution: This issue was resolved in KB4493475.

Back to top
OS Build 10240.18094

January 08, 2019
KB4480962
Resolved
KB4493475
Resolved:
April 09, 2019
10:00 AM PT

Opened:
January 08, 2019
10:00 AM PT
Applications using Microsoft Jet database fail to open
Applications that use a Microsoft Jet database with the Microsoft Access 97 file format may fail to open if the database has column names greater than 32 characters. The database will fail to open with the error, \"Unrecognized Database Format\".

Affected platforms:
  • Client: Windows 10, version 1709; Windows 10, version 1703; Windows 10, version 1607; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 10 Enterprise LTSB 2015; Windows 8.1; Windows 7 SP1
  • Server: Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2; Windows Server 2012; Windows Server 2008 R2 SP1; Windows Server 2008 SP2
Resolution: This issue is resolved in KB4487018.

Back to top
OS Build 10240.18094

January 08, 2019
KB4480962
Resolved
KB4487018
Resolved:
February 12, 2019
10:00 AM PT

Opened:
January 08, 2019
10:00 AM PT
Applications using Microsoft Jet database fail to open
Applications that use a Microsoft Jet database with the Microsoft Access 97 file format may fail to open if the database has column names greater than 32 characters. The database will fail to open with the error, \"Unrecognized Database Format\".

Affected platforms:
  • Client: Windows 10, version 1709; Windows 10, version 1703; Windows 10, version 1607; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 10 Enterprise LTSB 2015; Windows 8.1; Windows 7 SP1
  • Server: Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2; Windows Server 2008 R2 SP1
Resolution: This issue is resolved in KB4487018.

Back to top
OS Build 10240.18094

January 08, 2019
KB4480962
Resolved
KB4487018
Resolved:
February 12, 2019
10:00 AM PT

Opened:
January 08, 2019
10:00 AM PT
Unable to access hotspots with third-party applications
After installing KB4480962, third-party applications may have difficulty authenticating hotspots.

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10, version 1607; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 10 Enterprise LTSB 2015; Windows 8.1
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2; Windows Server 2012
Resolution: This issue is resolved in KB4487018.

Back to top
OS Build 10240.18094

January 08, 2019
KB4480962
Resolved
KB4487018
Resolved:
February 12, 2019
10:00 AM PT

Opened:
January 08, 2019
10:00 AM PT
" diff --git a/windows/release-information/resolved-issues-windows-10-1607.yml b/windows/release-information/resolved-issues-windows-10-1607.yml index d6e800728c..55ae2e2749 100644 --- a/windows/release-information/resolved-issues-windows-10-1607.yml +++ b/windows/release-information/resolved-issues-windows-10-1607.yml @@ -32,18 +32,11 @@ sections: - type: markdown text: " -<<<<<<< HEAD -======= - ->>>>>>> master -<<<<<<< HEAD -======= ->>>>>>> master @@ -91,16 +84,10 @@ sections: - type: markdown text: "
SummaryOriginating updateStatusDate resolved
Embedded objects may display incorrectly
Any compound document (OLE) server application that places embedded objects into the Windows Metafile (WMF) using the PatBlt API may display embedded objects incorrectly.

See details >
OS Build 14393.2791

February 12, 2019
KB4487026
Resolved
KB4493470
April 29, 2019
12:43 AM PT
Custom URI schemes may not start corresponding application
Custom URI schemes for application protocol handlers may not start the corresponding application for local intranet and trusted sites in Internet Explorer.

See details >
OS Build 14393.2848

March 12, 2019
KB4489882
Resolved
KB4493473
April 25, 2019
02:00 PM PT
End-user-defined characters (EUDC) may cause blue screen at startup
If you enable per font end-user-defined characters (EUDC), the system will stop working and a blue screen may appear at startup.

See details >
OS Build 14393.2879

March 19, 2019
KB4489889
Resolved
KB4493470
April 09, 2019
10:00 AM PT
Internet Explorer 11 authentication issue with multiple concurrent logons
Internet Explorer 11 users may encounter issues if two or more people use the same user account for multiple, concurrent login sessions on the same Windows Server machine.

See details >
OS Build 14393.2724

January 08, 2019
KB4480961
Resolved
KB4493470
April 09, 2019
10:00 AM PT
MSXML6 may cause applications to stop responding
MSXML6 may cause applications to stop responding if an exception was thrown during node operations, such as appendChild(), insertBefore(), and moveNode().

See details >
OS Build 14393.2724

January 08, 2019
KB4480961
Resolved
KB4493470
April 09, 2019
10:00 AM PT
Embedded objects may display incorrectly
Any compound document (OLE) server application that places embedded objects into the Windows Metafile (WMF) using the PatBlt API may display embedded objects incorrectly.

See details >
OS Build 14393.2791

February 12, 2019
KB4487026
Resolved
KB4493470
April 09, 2019
10:00 AM PT
Issue hosting multiple terminal server sessions and a user logs off on Windows Server
In some cases, Windows Server will stop working and restart when hosting multiple terminal server sessions and a user logs off.

See details >
OS Build 14393.2828

February 19, 2019
KB4487006
Resolved
KB4489882
March 12, 2019
10:00 AM PT
Error 1309 when installing/uninstalling MSI or MSP files
Users may receive “Error 1309” while installing or uninstalling certain types of MSI and MSP files.

See details >
OS Build 14393.2791

February 12, 2019
KB4487026
Resolved
KB4489882
March 12, 2019
10:00 AM PT
Applications using Microsoft Jet database and Access 95 file format stop working
Applications that use a Microsoft Jet database with the Microsoft Access 95 file format may randomly stop working.

See details >
OS Build 14393.2791

February 12, 2019
KB4487026
Resolved
KB4487006
February 19, 2019
02:00 PM PT
-<<<<<<< HEAD -======= - - - ->>>>>>> master
DetailsOriginating updateStatusHistory
Embedded objects may display incorrectly
Any compound document (OLE) server application that places embedded objects into the Windows Metafile (WMF) using the PatBlt API may display embedded objects incorrectly. 
 
For example, if you paste a Microsoft Excel worksheet object into a Microsoft Word document, the cells may render with a different background color. 
 
Affected platforms:  
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10, version 1607; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 10 Enterprise LTSB 2015; Windows 8.1; Windows 7 SP1 
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2; Windows Server 2012; Windows Server 2008 R2 SP1; Windows Server 2008 SP2 
Resolution: This issue is resolved in KB4493470

Back to top
OS Build 14393.2791

February 12, 2019
KB4487026
Resolved
KB4493470
Resolved:
April 09, 2019
10:00 AM PT

Opened:
February 12, 2019
10:00 AM PT
Issue hosting multiple terminal server sessions and a user logs off on Windows Server
In some cases, Windows Server will stop working and restart when hosting multiple terminal server sessions and a user logs off. The faulting driver is win32kbase.sys.

Affected platforms:
  • Client: Windows 10, version 1607; Windows 10 Enterprise LTSC 2016
  • Server: Windows Server 2016
Resolution: This issue is resolved in KB4489882.

Back to top
OS Build 14393.2828

February 19, 2019
KB4487006
Resolved
KB4489882
Resolved:
March 12, 2019
10:00 AM PT

Opened:
February 19, 2019
02:00 PM PT
Error 1309 when installing/uninstalling MSI or MSP files
After installing KB4487026, users may receive “Error 1309” while installing or uninstalling certain types of MSI and MSP files.

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10, version 1607; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 10 Enterprise LTSB 2015; Windows 8.1
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2; Windows Server 2012
Resolution: This issue is resolved in KB4489882.

Back to top
OS Build 14393.2791

February 12, 2019
KB4487026
Resolved
KB4489882
Resolved:
March 12, 2019
10:00 AM PT

Opened:
February 12, 2019
10:00 AM PT
Applications using Microsoft Jet database and Access 95 file format stop working
Applications that use a Microsoft Jet database with the Microsoft Access 95 file format may randomly stop working.

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10, version 1607; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 10 Enterprise LTSB 2015; Windows 7 SP1
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012; Windows Server 2008 R2 SP1; Windows Server 2008 SP2
Resolution: This issue is resolved in KB4487006.

Back to top
OS Build 14393.2791

February 12, 2019
KB4487026
Resolved
KB4487006
Resolved:
February 19, 2019
02:00 PM PT

Opened:
February 12, 2019
10:00 AM PT
Issue hosting multiple terminal server sessions and a user logs off on Windows Server
In some cases, Windows Server will stop working and restart when hosting multiple terminal server sessions and a user logs off. The faulting driver is win32kbase.sys.

Affected platforms:
  • Client: Windows 10, version 1607; Windows 10 Enterprise LTSC 2016
  • Server: Windows Server 2016
Resolution: This issue is resolved in KB4489882.

Back to top
OS Build 14393.2828

February 19, 2019
KB4487006
Resolved
KB4489882
Resolved:
March 12, 2019
10:00 AM PT

Opened:
February 19, 2019
02:00 PM PT
Error 1309 when installing/uninstalling MSI or MSP files
After installing KB4487026, users may receive “Error 1309” while installing or uninstalling certain types of MSI and MSP files.

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10, version 1607; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 10 Enterprise LTSB 2015; Windows 8.1
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2; Windows Server 2012
Resolution: This issue is resolved in KB4489882.

Back to top
OS Build 14393.2791

February 12, 2019
KB4487026
Resolved
KB4489882
Resolved:
March 12, 2019
10:00 AM PT

Opened:
February 12, 2019
10:00 AM PT
Applications using Microsoft Jet database and Access 95 file format stop working
Applications that use a Microsoft Jet database with the Microsoft Access 95 file format may randomly stop working.

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10, version 1607; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 10 Enterprise LTSB 2015; Windows 7 SP1
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2; Windows Server 2012; Windows Server 2008 R2 SP1; Windows Server 2008 SP2
Resolution: This issue is resolved in KB4487006.

Back to top
OS Build 14393.2791

February 12, 2019
KB4487026
Resolved
KB4487006
Resolved:
February 19, 2019
02:00 PM PT

Opened:
February 12, 2019
10:00 AM PT
Internet Explorer may fail to load images
After installing KB4487026, Internet Explorer may fail to load images with a backslash (\\) in their relative source path.

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10, version 1607; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 10 Enterprise LTSB 2015; Windows 8.1; Windows 7 SP1
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2; Windows Server 2008 R2 SP1
Resolution: This issue is resolved in KB4487006.

Back to top
OS Build 14393.2791

February 12, 2019
KB4487026
Resolved
KB4487006
Resolved:
February 19, 2019
02:00 PM PT

Opened:
February 12, 2019
10:00 AM PT
" diff --git a/windows/release-information/resolved-issues-windows-10-1703.yml b/windows/release-information/resolved-issues-windows-10-1703.yml index c3cc3c3b55..f92d1ca1e6 100644 --- a/windows/release-information/resolved-issues-windows-10-1703.yml +++ b/windows/release-information/resolved-issues-windows-10-1703.yml @@ -75,11 +75,7 @@ sections:
Embedded objects may display incorrectly
Any compound document (OLE) server application that places embedded objects into the Windows Metafile (WMF) using the PatBlt API may display embedded objects incorrectly. 
 
For example, if you paste a Microsoft Excel worksheet object into a Microsoft Word document, the cells may render with a different background color. 
 
Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10, version 1607; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 10 Enterprise LTSB 2015; Windows 8.1; Windows 7 SP1 
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2; Windows Server 2012; Windows Server 2008 R2 SP1; Windows Server 2008 SP2 
Resolution: This issue is resolved in KB4493474

Back to topOS Build 15063.1631

February 12, 2019
KB4487020Resolved
KB4493474Resolved:
April 09, 2019
10:00 AM PT

Opened:
February 12, 2019
10:00 AM PT
Error 1309 when installing/uninstalling MSI or MSP files
After installing KB4487011, users may receive “Error 1309” while installing or uninstalling certain types of MSI and MSP files.

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10, version 1607; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 10 Enterprise LTSB 2015; Windows 8.1
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2; Windows Server 2012
Resolution: This issue is resolved in KB4489871.

Back to topOS Build 15063.1659

February 19, 2019
KB4487011Resolved
KB4489871Resolved:
March 12, 2019
10:00 AM PT

Opened:
February 19, 2019
02:00 PM PT
Internet Explorer may fail to load images
After installing KB4487020, Internet Explorer may fail to load images with a backslash (\\) in their relative source path.

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10, version 1607; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 10 Enterprise LTSB 2015; Windows 8.1; Windows 7 SP1
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2; Windows Server 2008 R2 SP1
Resolution: This issue is resolved in KB4487011.

Back to topOS Build 15063.1631

February 12, 2019
KB4487020Resolved
KB4487011Resolved:
February 19, 2019
02:00 PM PT

Opened:
February 12, 2019
10:00 AM PT -<<<<<<< HEAD
Applications using Microsoft Jet database and Access 95 file format stop working
Applications that use a Microsoft Jet database with the Microsoft Access 95 file format may randomly stop working.

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10, version 1607; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 10 Enterprise LTSB 2015; Windows 7 SP1
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012; Windows Server 2008 R2 SP1; Windows Server 2008 SP2
Resolution: This issue is resolved in KB4487011.

Back to topOS Build 15063.1631

February 12, 2019
KB4487020Resolved
KB4487011Resolved:
February 19, 2019
02:00 PM PT

Opened:
February 12, 2019
10:00 AM PT -======= -
Applications using Microsoft Jet database and Access 95 file format stop working
Applications that use a Microsoft Jet database with the Microsoft Access 95 file format may randomly stop working.

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10, version 1607; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 10 Enterprise LTSB 2015; Windows 7 SP1
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2; Windows Server 2012; Windows Server 2008 R2 SP1; Windows Server 2008 SP2
Resolution: This issue is resolved in KB4487011.

Back to topOS Build 15063.1631

February 12, 2019
KB4487020Resolved
KB4487011Resolved:
February 19, 2019
02:00 PM PT

Opened:
February 12, 2019
10:00 AM PT ->>>>>>> master " @@ -88,17 +84,10 @@ sections: - type: markdown text: " -<<<<<<< HEAD -======= - - - - ->>>>>>> master
DetailsOriginating updateStatusHistory
MSXML6 may cause applications to stop responding
After installing KB4480973, MSXML6 causes applications to stop responding if an exception was thrown during node operations, such as appendChild(), insertBefore(), and moveNode().

The Group Policy editor may stop responding when editing a Group Policy Object (GPO) that contains Group Policy Preferences (GPP) for Internet Explorer 10 settings.

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10, version 1607; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 10 Enterprise LTSB 2015; Windows 8.1
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2; Windows Server 2012
Resolution: This issue was resolved in KB4493474.

Back to top
OS Build 15063.1563

January 08, 2019
KB4480973
Resolved
KB4493474
Resolved:
April 09, 2019
10:00 AM PT

Opened:
January 08, 2019
10:00 AM PT
First character of the Japanese era name not recognized as an abbreviation
After installing KB4480959, the first character of the Japanese era name is not recognized as an abbreviation and may cause date parsing issues.

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10, version 1607; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 10 Enterprise LTSB 2015; Windows 8.1; Windows 7 SP1
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2; Windows Server 2012; Windows Server 2008 R2 SP1; Windows Server 2008 SP2
Resolution: This issue is resolved in KB4487011.

Back to top
OS Build 15063.1596

January 15, 2019
KB4480959
Resolved
KB4487011
Resolved:
February 19, 2019
02:00 PM PT

Opened:
January 15, 2019
10:00 AM PT
Applications using Microsoft Jet database fail to open
Applications that use a Microsoft Jet database with the Microsoft Access 97 file format may fail to open if the database has column names greater than 32 characters. The database will fail to open with the error, “Unrecognized Database Format”.

Affected platforms:
  • Client: Windows 10, version 1709; Windows 10, version 1703; Windows 10, version 1607; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 10 Enterprise LTSB 2015; Windows 8.1; Windows 7 SP1 
  • Server: Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2; Windows Server 2012; Windows Server 2008 R2 SP1; Windows Server 2008 SP2
Resolution: This issue is resolved in KB4487020.

Back to top
OS Build 15063.1563

January 08, 2019
KB4480973
Resolved
KB4487020
Resolved:
February 12, 2019
10:00 AM PT

Opened:
January 08, 2019
10:00 AM PT
Webpages become unresponsive in Microsoft Edge
After installing KB4480973, some Microsoft Edge users report that they:
  • Cannot load web pages using a local IP address.
  • Cannot load web pages on the Internet using a VPN connection.
Browsing fails or the web page may become unresponsive.

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709
Resolution: This issue is resolved in KB4486996

Back to top
OS Build 15063.1563

January 08, 2019
KB4480973
Resolved
KB4487020
Resolved:
February 12, 2019
10:00 AM PT

Opened:
January 08, 2019
10:00 AM PT
MSXML6 may cause applications to stop responding
After installing KB4480973, MSXML6 causes applications to stop responding if an exception was thrown during node operations, such as appendChild(), insertBefore(), and moveNode().

The Group Policy editor may stop responding when editing a Group Policy Object (GPO) that contains Group Policy Preferences (GPP) for Internet Explorer 10 settings.

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10, version 1607; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 10 Enterprise LTSB 2015; Windows 8.1
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2
Resolution: This issue was resolved in KB4493474.

Back to top
OS Build 15063.1563

January 08, 2019
KB4480973
Resolved
KB4493474
Resolved:
April 09, 2019
10:00 AM PT

Opened:
January 08, 2019
10:00 AM PT
First character of the Japanese era name not recognized as an abbreviation
After installing KB4480959, the first character of the Japanese era name is not recognized as an abbreviation and may cause date parsing issues.

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10, version 1607; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 10 Enterprise LTSB 2015; Windows 8.1; Windows 7 SP1
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2; Windows Server 2012; Windows Server 2008 R2 SP1; Windows Server 2008 SP2
Resolution: This issue is resolved in KB4487011.

Back to top
OS Build 15063.1596

January 15, 2019
KB4480959
Resolved
KB4487011
Resolved:
February 19, 2019
02:00 PM PT

Opened:
January 15, 2019
10:00 AM PT
Applications using Microsoft Jet database fail to open
Applications that use a Microsoft Jet database with the Microsoft Access 97 file format may fail to open if the database has column names greater than 32 characters. The database will fail to open with the error, “Unrecognized Database Format”.

Affected platforms:
  • Client: Windows 10, version 1709; Windows 10, version 1703; Windows 10, version 1607; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 10 Enterprise LTSB 2015; Windows 8.1; Windows 7 SP1 
  • Server: Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2; Windows Server 2012; Windows Server 2008 R2 SP1; Windows Server 2008 SP2
Resolution: This issue is resolved in KB4487020.

Back to top
OS Build 15063.1563

January 08, 2019
KB4480973
Resolved
KB4487020
Resolved:
February 12, 2019
10:00 AM PT

Opened:
January 08, 2019
10:00 AM PT
Webpages become unresponsive in Microsoft Edge
After installing KB4480973, some Microsoft Edge users report that they:
  • Cannot load webpages using a local IP address.
  • Cannot load webpages on the Internet using a VPN connection.
Browsing fails or the webpage may become unresponsive.

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709
Resolution: This issue is resolved in KB4487020.

Back to top
OS Build 15063.1563

January 08, 2019
KB4480973
Resolved
KB4487020
Resolved:
February 12, 2019
10:00 AM PT

Opened:
January 08, 2019
10:00 AM PT
Unable to access hotspots with third-party applications
After installing KB4480973, third-party applications may have difficulty authenticating hotspots.

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10, version 1607; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 10 Enterprise LTSB 2015; Windows 8.1
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2; Windows Server 2012
Resolution: This issue is resolved in KB4480959.

Back to top
OS Build 15063.1563

January 08, 2019
KB4480973
Resolved
KB4480959
Resolved:
January 15, 2019
10:00 AM PT

Opened:
January 08, 2019
10:00 AM PT
" diff --git a/windows/release-information/resolved-issues-windows-10-1709.yml b/windows/release-information/resolved-issues-windows-10-1709.yml index 0a7da0ffa3..aa110ad6b2 100644 --- a/windows/release-information/resolved-issues-windows-10-1709.yml +++ b/windows/release-information/resolved-issues-windows-10-1709.yml @@ -75,11 +75,7 @@ sections: -<<<<<<< HEAD -======= - ->>>>>>> master
DetailsOriginating updateStatusHistory
Embedded objects may display incorrectly
Any compound document (OLE) server application that places embedded objects into the Windows Metafile (WMF) using the PatBlt API may display embedded objects incorrectly. 
 
For example, if you paste a Microsoft Excel worksheet object into a Microsoft Word document, the cells may render with a different background color. 
 
Affected platforms:  
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10, version 1607; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 10 Enterprise LTSB 2015; Windows 8.1; Windows 7 SP1 
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2; Windows Server 2012; Windows Server 2008 R2 SP1; Windows Server 2008 SP2 
Resolution: This issue is resolved in KB4493441

Back to top
OS Build 16299.967

February 12, 2019
KB4486996
Resolved
KB4493441
Resolved:
April 09, 2019
10:00 AM PT

Opened:
February 12, 2019
10:00 AM PT
Error 1309 when installing/uninstalling MSI or MSP files
After installing KB4486996, users may receive “Error 1309” while installing or uninstalling certain types of MSI and MSP files.

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10, version 1607; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 10 Enterprise LTSB 2015; Windows 8.1
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2; Windows Server 2012
Resolution: This issue is resolved in KB4489886.

Back to top
OS Build 16299.967

February 12, 2019
KB4486996
Resolved
KB4489886
Resolved:
March 12, 2019
10:00 AM PT

Opened:
February 12, 2019
10:00 AM PT
Applications using Microsoft Jet database and Access 95 file format stop working
Applications that use a Microsoft Jet database with the Microsoft Access 95 file format may randomly stop working.

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10, version 1607; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 10 Enterprise LTSB 2015; Windows 7 SP1
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012; Windows Server 2008 R2 SP1; Windows Server 2008 SP2
Resolution: This issue is resolved in KB4487021.

Back to top
OS Build 16299.967

February 12, 2019
KB4486996
Resolved
KB4487021
Resolved:
February 19, 2019
02:00 PM PT

Opened:
February 12, 2019
10:00 AM PT
Applications using Microsoft Jet database and Access 95 file format stop working
Applications that use a Microsoft Jet database with the Microsoft Access 95 file format may randomly stop working.

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10, version 1607; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 10 Enterprise LTSB 2015; Windows 7 SP1
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2; Windows Server 2012; Windows Server 2008 R2 SP1; Windows Server 2008 SP2
Resolution: This issue is resolved in KB4487021.

Back to top
OS Build 16299.967

February 12, 2019
KB4486996
Resolved
KB4487021
Resolved:
February 19, 2019
02:00 PM PT

Opened:
February 12, 2019
10:00 AM PT
Internet Explorer may fail to load images
After installing KB4486996, Internet Explorer may fail to load images with a backslash (\\) in their relative source path.

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10, version 1607; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 10 Enterprise LTSB 2015; Windows 8.1; Windows 7 SP1
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2; Windows Server 2008 R2 SP1
Resolution: This issue is resolved in KB4487021.

Back to top
OS Build 16299.967

February 12, 2019
KB4486996
Resolved
KB4487021
Resolved:
February 19, 2019
02:00 PM PT

Opened:
February 12, 2019
10:00 AM PT
" @@ -92,11 +88,7 @@ sections:
MSXML6 causes applications to stop responding if an exception was thrown
After installing KB4480978, MSXML6 causes applications to stop responding if an exception was thrown during node operations, such as appendChild(), insertBefore(), and moveNode().

The Group Policy editor may stop responding when editing a Group Policy Object (GPO) that contains Group Policy Preferences (GPP) for Internet Explorer 10 settings.

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10, version 1607; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 10 Enterprise LTSB 2015; Windows 8.1
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2; Windows Server 2012
Resolution: This issue is resolved in KB4493441.

Back to topOS Build 16299.904

January 08, 2019
KB4480978Resolved
KB4493441Resolved:
April 09, 2019
10:00 AM PT

Opened:
January 08, 2019
10:00 AM PT
First character of the Japanese era name not recognized as an abbreviation
After installing KB4480967, the first character of the Japanese era name is not recognized as an abbreviation and may cause date parsing issues.

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10, version 1607; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 10 Enterprise LTSB 2015; Windows 8.1; Windows 7 SP1
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2; Windows Server 2012; Windows Server 2008 R2 SP1; Windows Server 2008 SP2
Resolution: This issue is resolved in KB4487021.

Back to topOS Build 16299.936

January 15, 2019
KB4480967Resolved
KB4487021Resolved:
February 19, 2019
02:00 PM PT

Opened:
January 15, 2019
10:00 AM PT
Applications using Microsoft Jet database fail to open
Applications that use a Microsoft Jet database with the Microsoft Access 97 file format may fail to open if the database has column names greater than 32 characters. The database will fail to open with the error, “Unrecognized Database Format.”

Affected platforms:
  • Client: Windows 10, version 1709; Windows 10, version 1703; Windows 10, version 1607; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 10 Enterprise LTSB 2015; Windows 8.1; Windows 7 SP1 
  • Server: Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2; Windows Server 2012; Windows Server 2008 R2 SP1; Windows Server 2008 SP2 
Resolution: This issue is resolved in KB4486996.

Back to topOS Build 16299.904

January 08, 2019
KB4480978Resolved
KB4486996Resolved:
February 12, 2019
10:00 AM PT

Opened:
January 08, 2019
10:00 AM PT -<<<<<<< HEAD
Webpages become unresponsive in Microsoft Edge
After installing KB4480978, some Microsoft Edge users report that they:
  • Cannot load web pages using a local IP address. 
  • Cannot load web pages on the Internet using a VPN connection.  
Browsing fails or the web page may become unresponsive. 

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709
Resolution: This issue is resolved in KB4486996.

Back to topOS Build 16299.904

January 08, 2019
KB4480978Resolved
KB4486996Resolved:
February 12, 2019
10:00 AM PT

Opened:
January 08, 2019
10:00 AM PT -======= -
Webpages become unresponsive in Microsoft Edge
Microsoft and ArcaBit have identified an issue on devices with ArcaBit antivirus software installed that may cause the system to become unresponsive upon restart after installing KB4493446.

Microsoft has temporarily blocked devices from receiving this update if ArcaBit antivirus software is installed.

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 8.1; Windows 7 SP1
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server 2012 R2; Windows Server 2008 R2 SP1
Workaround: ArcaBit has released an update to address this issue. For more information, see the Arcabit support article.

Back to topOS Build 16299.904

January 08, 2019
KB4480978Resolved
KB4486996Resolved:
February 12, 2019
10:00 AM PT

Opened:
January 08, 2019
10:00 AM PT ->>>>>>> master
Unable to access hotspots with third-party applications
After installing KB4480978, third-party applications may have difficulty authenticating hotspots.

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10, version 1607; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 10 Enterprise LTSB 2015; Windows 8.1
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2; Windows Server 2012
Resolution: This issue is resolved in KB4480967.

Back to topOS Build 16299.904

January 08, 2019
KB4480978Resolved
KB4480967Resolved:
January 15, 2019
10:00 AM PT

Opened:
January 08, 2019
10:00 AM PT " diff --git a/windows/release-information/resolved-issues-windows-10-1803.yml b/windows/release-information/resolved-issues-windows-10-1803.yml index 66765e23b2..c4147211ce 100644 --- a/windows/release-information/resolved-issues-windows-10-1803.yml +++ b/windows/release-information/resolved-issues-windows-10-1803.yml @@ -91,13 +91,8 @@ sections: -<<<<<<< HEAD -======= - - ->>>>>>> master
DetailsOriginating updateStatusHistory
First character of the Japanese era name not recognized
After installing KB4480976, the first character of the Japanese era name is not recognized as an abbreviation and may cause date parsing issues.

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10, version 1607; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 10 Enterprise LTSB 2015; Windows 8.1; Windows 7 SP1
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2; Windows Server 2012; Windows Server 2008 R2 SP1; Windows Server 2008 SP2
Resolution: This issue is resolved in KB4487029

Back to top
OS Build 17134.556

January 15, 2019
KB4480976
Resolved
KB4487029
Resolved:
February 19, 2019
02:00 PM PT

Opened:
January 08, 2019
10:00 AM PT
MSXML6 may cause applications to stop responding
After installing KB4480966, MSXML6 causes applications to stop responding if an exception was thrown during node operations, such as appendChild(), insertBefore(), and moveNode().

The Group Policy editor may stop responding when editing a Group Policy Object (GPO) that contains Group Policy Preferences (GPP) for Internet Explorer 10 settings.

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10, version 1607; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 10 Enterprise LTSB 2015; Windows 8.1
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2; Windows Server 2012
Resolution: This issue was resolved in KB4493464

Back to top
OS Build 17134.523

January 08, 2019
KB4480966
Resolved
KB4493464
Resolved:
April 09, 2019
10:00 AM PT

Opened:
January 08, 2019
10:00 AM PT
Applications using Microsoft Jet database and Access 95 file format stop working
Applications that use a Microsoft Jet database with the Microsoft Access 95 file format may randomly stop working. 

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10, version 1607; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 10 Enterprise LTSB 2015; Windows 7 SP1
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012; Windows Server 2008 R2 SP1; Windows Server 2008 SP2
Resolution: This issue is resolved in KB4487017.

Back to top
OS Build 17134.523

January 08, 2019
KB4480966
Resolved
KB4487017
Resolved:
February 12, 2019
10:00 AM PT

Opened:
January 08, 2019
10:00 AM PT
Webpages become unresponsive in Microsoft Edge
After installing KB4480966, some Microsoft Edge users report that they: 
  • Cannot load web pages using a local IP address. 
  • Cannot load web pages on the Internet using a VPN connection.  
Browsing fails or the web page may become unresponsive. 

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709
Resolution: This issue is resolved in KB4487017

Back to top
OS Build 17134.523

January 08, 2019
KB4480966
Resolved
KB4487017
Resolved:
February 12, 2019
10:00 AM PT

Opened:
January 08, 2019
10:00 AM PT
Applications using Microsoft Jet database and Access 95 file format stop working
Applications that use a Microsoft Jet database with the Microsoft Access 95 file format may randomly stop working. 

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10, version 1607; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 10 Enterprise LTSB 2015; Windows 7 SP1
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2; Windows Server 2012; Windows Server 2008 R2 SP1; Windows Server 2008 SP2
Resolution: This issue is resolved in KB4487017.

Back to top
OS Build 17134.523

January 08, 2019
KB4480966
Resolved
KB4487017
Resolved:
February 12, 2019
10:00 AM PT

Opened:
January 08, 2019
10:00 AM PT
Webpages become unresponsive in Microsoft Edge
After installing KB4480966, some Microsoft Edge users report that they: 
  • Cannot load webpages using a local IP address. 
  • Cannot load webpages on the Internet using a VPN connection.  
Browsing fails or the webpage may become unresponsive. 

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709
Resolution: This issue is resolved in KB4487017

Back to top
OS Build 17134.523

January 08, 2019
KB4480966
Resolved
KB4487017
Resolved:
February 12, 2019
10:00 AM PT

Opened:
January 08, 2019
10:00 AM PT
Unable to access hotspots with third-party applications
After installing KB4480966, third-party applications may have difficulty authenticating hotspots.

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10, version 1607; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 10 Enterprise LTSB 2015; Windows 8.1
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2; Windows Server 2012
Resolution: This issue is resolved in KB4480976

Back to top
OS Build 17134.523

January 08, 2019
KB4480966
Resolved
KB4480976
Resolved:
January 15, 2019
10:00 AM PT

Opened:
January 08, 2019
10:00 AM PT
" diff --git a/windows/release-information/resolved-issues-windows-10-1809-and-windows-server-2019.yml b/windows/release-information/resolved-issues-windows-10-1809-and-windows-server-2019.yml index a921998d3f..349c914c2b 100644 --- a/windows/release-information/resolved-issues-windows-10-1809-and-windows-server-2019.yml +++ b/windows/release-information/resolved-issues-windows-10-1809-and-windows-server-2019.yml @@ -91,11 +91,7 @@ sections:
Embedded objects may display incorrectly
Any compound document (OLE) server application that places embedded objects into the Windows Metafile (WMF) using the PatBlt API may display embedded objects incorrectly. 
 
For example, if you paste a Microsoft Excel worksheet object into a Microsoft Word document, the cells may render with a different background color. 
 
Affected platforms:  
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10, version 1607; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 10 Enterprise LTSB 2015; Windows 8.1; Windows 7 SP1  
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2; Windows Server 2012; Windows Server 2008 R2 SP1; Windows Server 2008 SP2  
Resolution: This issue is resolved in KB4493509.  

Back to topOS Build 17763.316

February 12, 2019
KB4487044Resolved
KB4493509Resolved:
April 09, 2019
10:00 AM PT

Opened:
February 12, 2019
10:00 AM PT
Error 1309 when installing/uninstalling MSI or MSP files
After installing KB4487044, users may receive \"Error 1309\" while installing or uninstalling certain types of MSI and MSP files. 

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10, version 1607; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 10 Enterprise LTSB 2015; Windows 8.1
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2; Windows Server 2012
Resolution: This issue is resolved in KB4489899

Back to topOS Build 17763.316

February 12, 2019
KB4487044Resolved
KB4489899Resolved:
March 12, 2019
10:00 AM PT

Opened:
February 12, 2019
10:00 AM PT
Internet Explorer may fail to load images
After installing KB4487044, Internet Explorer may fail to load images with a backslash (\\) in their relative source path.

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10, version 1607; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 10 Enterprise LTSB 2015; Windows 8.1; Windows 7 SP1
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2; Windows Server 2008 R2 SP1
Resolution: This issue is resolved in KB4482887.

Back to topOS Build 17763.316

February 12, 2019
KB4487044Resolved
KB4482887Resolved:
March 01, 2019
10:00 AM PT

Opened:
February 12, 2019
10:00 AM PT -<<<<<<< HEAD
Applications using Microsoft Jet database and Access 95 file format stop working
Applications that use a Microsoft Jet database with the Microsoft Access 95 file format may randomly stop working.

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10, version 1607; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 10 Enterprise LTSB 2015; Windows 7 SP1
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012; Windows Server 2008 R2 SP1; Windows Server 2008 SP2
Resolution: This issue is resolved in KB4482887.

Back to topOS Build 17763.316

February 12, 2019
KB4487044Resolved
KB4482887Resolved:
March 01, 2019
10:00 AM PT

Opened:
February 12, 2019
10:00 AM PT -======= -
Applications using Microsoft Jet database and Access 95 file format stop working
Applications that use a Microsoft Jet database with the Microsoft Access 95 file format may randomly stop working.

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10, version 1607; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 10 Enterprise LTSB 2015; Windows 7 SP1
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2008 R2 SP1
Resolution: This issue is resolved in KB4482887.

Back to topOS Build 17763.316

February 12, 2019
KB4487044Resolved
KB4482887Resolved:
March 01, 2019
10:00 AM PT

Opened:
February 12, 2019
10:00 AM PT ->>>>>>> master
First character of the Japanese era name not recognized
After installing KB4487044, the first character of the Japanese era name is not recognized as an abbreviation and may cause date parsing issues. 

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10, version 1607; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 10 Enterprise LTSB 2015; Windows 8.1; Windows 7 SP1
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2; Windows Server 2012; Windows Server 2008 R2 SP1; Windows Server 2008 SP2
Resolution: This issue is resolved in KB4482887

Back to topOS Build 17763.316

February 12, 2019
KB4487044Resolved
KB4482887Resolved:
March 01, 2019
10:00 AM PT

Opened:
February 12, 2019
10:00 AM PT " @@ -105,17 +101,10 @@ sections: - type: markdown text: " -<<<<<<< HEAD -======= - - - - ->>>>>>> master
DetailsOriginating updateStatusHistory
Internet Explorer 11 authentication issue with multiple concurrent logons
After installing KB4480116, Internet Explorer 11 and other applications that use WININET.DLL may have authentication issues. This occurs when two or more people use the same user account for multiple, concurrent login sessions on the same Windows Server machine, including Remote Desktop Protocol (RDP) and Terminal Server logons. Symptoms reported by customers include, but may not be limited to: 
  • Cache size and location show zero or empty. 
  • Keyboard shortcuts may not work properly. 
  • Webpages may intermittently fail to load or render correctly. 
  • Issues with credential prompts. 
  • Issues when downloading files. 
Affected platforms: 
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1607; Windows 10 Enterprise LTSC 2016; Windows 8.1; Windows 7 SP1
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server 2016; Windows Server 2012 R2; Windows Server 2012; Windows Server 2008 R2 SP1
Resolution: This issue was resolved in KB4493509

Back to top
OS Build 17763.253

January 08, 2019
KB4480116
Resolved
KB4493509
Resolved:
April 09, 2019
10:00 AM PT

Opened:
January 08, 2019
10:00 AM PT
MSXML6 may cause applications to stop responding
After installing KB4480116, MSXML6 causes applications to stop responding if an exception was thrown during node operations, such as appendChild(), insertBefore(), and moveNode().
 
The Group Policy editor may stop responding when editing a Group Policy Object (GPO) that contains Group Policy Preferences (GPP) for Internet Explorer 10 settings. 

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10, version 1607; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 10 Enterprise LTSB 2015; Windows 8.1
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2; Windows Server 2012
Resolution: This issue was resolved in KB4493509

Back to top
OS Build 17763.253

January 08, 2019
KB4480116
Resolved
KB4493509
Resolved:
April 09, 2019
10:00 AM PT

Opened:
January 08, 2019
10:00 AM PT
Global DNS outage affects Windows Update customers
Windows Update customers were affected by a network infrastructure event on January 29, 2019 (21:00 UTC), caused by an external DNS service provider's global outage. A software update to the external provider's DNS servers resulted in the distribution of corrupted DNS records that affected connectivity to the Windows Update service. The DNS records were restored by January 30, 2019 (00:10 UTC), and the majority of local Internet Service Providers (ISP) have refreshed their DNS servers and customer services have been restored. 
 
Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019
  • Server: Windows Server, version 1809; Windows Server 2019
While this was not an issue with Microsoft's services, we take any service disruption for our customers seriously. We will work with partners to better understand this so we can provide higher quality service in the future even across diverse global network providers. 
 
If you are still unable to connect to Windows Update services due to this problem, please contact your local ISP or network administrator. You can also refer to our new KB4493784 for more information to determine if your network is affected, and to provide your local ISP or network administrator with additional information to assist you. 

Back to top
N/A

Resolved
Resolved:
March 08, 2019
11:15 AM PT

Opened:
January 29, 2019
02:00 PM PT
Webpages become unresponsive in Microsoft Edge
After installing KB4480116, some Microsoft Edge users report that they:
  • Cannot load web pages using a local IP address. 
  • Cannot load web pages on the Internet using a VPN connection.
Browsing fails or the web page may become unresponsive.

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709
Resolution: This issue is resolved in KB4487020

Back to top
OS Build 17763.253

January 08, 2019
KB4480116
Resolved
KB4487044
Resolved:
February 12, 2019
10:00 AM PT

Opened:
January 08, 2019
10:00 AM PT
Internet Explorer 11 authentication issue with multiple concurrent logons
After installing KB4480116, Internet Explorer 11 and other applications that use WININET.DLL may have authentication issues. This occurs when two or more people use the same user account for multiple, concurrent login sessions on the same Windows Server machine, including Remote Desktop Protocol (RDP) and Terminal Server logons. Symptoms reported by customers include, but may not be limited to: 
  • Cache size and location show zero or empty. 
  • Keyboard shortcuts may not work properly. 
  • Webpages may intermittently fail to load or render correctly. 
  • Issues with credential prompts. 
  • Issues when downloading files. 
Resolution: This issue was resolved in KB4493509

Back to top
OS Build 17763.253

January 08, 2019
KB4480116
Resolved
KB4493509
Resolved:
April 09, 2019
10:00 AM PT

Opened:
January 08, 2019
10:00 AM PT
MSXML6 may cause applications to stop responding
After installing KB4480116, MSXML6 causes applications to stop responding if an exception was thrown during node operations, such as appendChild(), insertBefore(), and moveNode().
 
The Group Policy editor may stop responding when editing a Group Policy Object (GPO) that contains Group Policy Preferences (GPP) for Internet Explorer 10 settings. 

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10, version 1607; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 10 Enterprise LTSB 2015; Windows 8.1
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2; Windows Server 2012
Resolution: This issue was resolved in KB4493509

Back to top
OS Build 17763.253

January 08, 2019
KB4480116
Resolved
KB4493509
Resolved:
April 09, 2019
10:00 AM PT

Opened:
January 08, 2019
10:00 AM PT
Global DNS outage affects Windows Update customers
Windows Update customers were affected by a network infrastructure event on January 29, 2019 (21:00 UTC), caused by an external DNS service provider's global outage. A software update to the external provider's DNS servers resulted in the distribution of corrupted DNS records that affected connectivity to the Windows Update service. The DNS records were restored by January 30, 2019 (00:10 UTC), and the majority of local Internet Service Providers (ISP) have refreshed their DNS servers and customer services have been restored. 
 
Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019
  • Server: Windows Server, version 1809; Windows Server 2019
While this was not an issue with Microsoft's services, we take any service disruption for our customers seriously. We will work with partners to better understand this so we can provide higher quality service in the future even across diverse global network providers. 
 
If you are still unable to connect to Windows Update services due to this problem, please contact your local ISP or network administrator. You can also refer to our new KB4493784 for more information to determine if your network is affected, and to provide your local ISP or network administrator with additional information to assist you. 

Back to top
N/A

Resolved
Resolved:
March 08, 2019
11:15 AM PT

Opened:
January 29, 2019
02:00 PM PT
Webpages become unresponsive in Microsoft Edge
After installing KB4480116, some Microsoft Edge users report that they:
  • Cannot load webpages using a local IP address. 
  • Cannot load webpages on the Internet using a VPN connection.
Browsing fails or the webpage may become unresponsive.

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709
Resolution: This issue is resolved in KB4487044

Back to top
OS Build 17763.253

January 08, 2019
KB4480116
Resolved
KB4487044
Resolved:
February 12, 2019
10:00 AM PT

Opened:
January 08, 2019
10:00 AM PT
Unable to access hotspots with third-party applications
After installing KB4480116, third-party applications may have difficulty authenticating hotspots. 

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10, version 1607; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 10 Enterprise LTSB 2015; Windows 8.1
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2; Windows Server 2012
Resolution: This issue is resolved in KB4476976

Back to top
OS Build 17763.253

January 08, 2019
KB4480116
Resolved
KB4476976
Resolved:
January 22, 2019
02:00 PM PT

Opened:
January 08, 2019
10:00 AM PT
" diff --git a/windows/release-information/resolved-issues-windows-7-and-windows-server-2008-r2-sp1.yml b/windows/release-information/resolved-issues-windows-7-and-windows-server-2008-r2-sp1.yml index 0b3106e484..607d6cbcc7 100644 --- a/windows/release-information/resolved-issues-windows-7-and-windows-server-2008-r2-sp1.yml +++ b/windows/release-information/resolved-issues-windows-7-and-windows-server-2008-r2-sp1.yml @@ -79,15 +79,9 @@ sections: - type: markdown text: " -<<<<<<< HEAD -======= - - - ->>>>>>> master
DetailsOriginating updateStatusHistory
Embedded objects may display incorrectly
Any compound document (OLE) server application that places embedded objects into the Windows Metafile (WMF) using the PatBlt API may display embedded objects incorrectly. 
 
For example, if you paste a Microsoft Excel worksheet object into a Microsoft Word document, the cells may render with a different background color. 
 
Affected platforms:  
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10, version 1607; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 10 Enterprise LTSB 2015; Windows 8.1; Windows 7 SP1 
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2; Windows Server 2012; Windows Server 2008 R2 SP1; Windows Server 2008 SP2 
Resolution: This issue is resolved in KB4493472

Back to top
February 12, 2019
KB4486563
Resolved
KB4493472
Resolved:
April 09, 2019
10:00 AM PT

Opened:
February 12, 2019
10:00 AM PT
Internet Explorer may fail to load images
After installing KB4486563, Internet Explorer may fail to load images with a backslash (\\) in their relative source path.

Affected platforms: 
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10, version 1607; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 10 Enterprise LTSB 2015; Windows 8.1; Windows 7 SP1 
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2; Windows Server 2008 R2 SP1 
Resolution: This issue is resolved in KB4486565.

Back to top
February 12, 2019
KB4486563
Resolved
KB4486565
Resolved:
February 19, 2019
02:00 PM PT

Opened:
February 12, 2019
10:00 AM PT
Applications using Microsoft Jet database and Access 95 file format stop working
Applications that use a Microsoft Jet database with the Microsoft Access 95 file format may randomly stop working.

Affected platforms: 
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10, version 1607; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 10 Enterprise LTSB 2015; Windows 7 SP1 
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012; Windows Server 2008 R2 SP1; Windows Server 2008 SP2 
Resolution: This issue is resolved in KB4486565.

Back to top
February 12, 2019
KB4486563
Resolved
KB4486565
Resolved:
February 19, 2019
02:00 PM PT

Opened:
February 12, 2019
10:00 AM PT
Embedded objects may display incorrectly
Any compound document (OLE) server application that places embedded objects into the Windows Metafile (WMF) using the PatBlt API may display embedded objects incorrectly. 
 
For example, if you paste a Microsoft Excel worksheet object into a Microsoft Word document, the cells may render with a different background color. 
 
Affected platforms:  
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10, version 1607; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 10 Enterprise LTSB 2015; Windows 8.1; Windows 7 SP1 
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2; Windows Server 2012; Windows Server 2008 R2 SP1; Windows Server 2008 SP2 
Resolution: This issue is resolved in KB4493472

Back to top
February 12, 2019
KB4486563
Resolved
KB4493472
Resolved:
April 09, 2019
10:00 AM PT

Opened:
February 12, 2019
10:00 AM PT
Internet Explorer may fail to load images
After installing KB4486563, Internet Explorer may fail to load images with a backslash (\\) in their relative source path.

Affected platforms: 
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10, version 1607; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 10 Enterprise LTSB 2015; Windows 8.1; Windows 7 SP1 
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2; Windows Server 2008 R2 SP1 
Resolution: This issue is resolved in KB4486565.

Back to top
February 12, 2019
KB4486563
Resolved
KB4486565
Resolved:
February 19, 2019
02:00 PM PT

Opened:
February 12, 2019
10:00 AM PT
Applications using Microsoft Jet database and Access 95 file format stop working
Applications that use a Microsoft Jet database with the Microsoft Access 95 file format may randomly stop working.

Affected platforms: 
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10, version 1607; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 10 Enterprise LTSB 2015; Windows 7 SP1 
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2008 R2 SP1 
Resolution: This issue is resolved in KB4486565.

Back to top
February 12, 2019
KB4486563
Resolved
KB4486565
Resolved:
February 19, 2019
02:00 PM PT

Opened:
February 12, 2019
10:00 AM PT
" diff --git a/windows/release-information/status-windows-10-1507.yml b/windows/release-information/status-windows-10-1507.yml index 1ea65f3b08..4ca52dfab9 100644 --- a/windows/release-information/status-windows-10-1507.yml +++ b/windows/release-information/status-windows-10-1507.yml @@ -60,17 +60,10 @@ sections: - type: markdown text: "
This table offers a summary of current active issues and those issues that have been resolved in the last 30 days.

-<<<<<<< HEAD -======= - - - - ->>>>>>> master
SummaryOriginating updateStatusLast updated
Certain operations performed on a Cluster Shared Volume may fail
Certain operations, such as rename, performed on files or folders on a Cluster Shared Volume (CSV) may fail with the error, \"STATUS_BAD_IMPERSONATION_LEVEL (0xC00000A5)\".

See details >
OS Build 10240.18094

January 08, 2019
KB4480962
Mitigated
April 25, 2019
02:00 PM PT
MSXML6 may cause applications to stop responding
MSXML6 may cause applications to stop responding if an exception was thrown during node operations, such as appendChild(), insertBefore(), and moveNode().

See details >
OS Build 10240.18094

January 08, 2019
KB4480962
Resolved
KB4493475
April 09, 2019
10:00 AM PT
Custom URI schemes may not start corresponding application
Custom URI schemes for application protocol handlers may not start the corresponding application for local intranet and trusted sites in Internet Explorer.

See details >
OS Build 10240.18158

March 12, 2019
KB4489872
Resolved
KB4493475
April 09, 2019
10:00 AM PT
Embedded objects may display incorrectly
Any compound document (OLE) server application that places embedded objects into the Windows Metafile (WMF) using the PatBlt API may display embedded objects incorrectly.

See details >
OS Build 10240.18132

February 12, 2019
KB4487018
Resolved
KB4493475
April 09, 2019
10:00 AM PT
Certain operations performed on a Cluster Shared Volume may fail
Certain operations, such as rename, performed on files or folders on a Cluster Shared Volume (CSV) may fail with the error, \"STATUS_BAD_IMPERSONATION_LEVEL (0xC00000A5)\".

See details >
OS Build 10240.18094

January 08, 2019
KB4480962
Mitigated
January 08, 2019
10:00 AM PT
Embedded objects may display incorrectly
Any compound document (OLE) server application that places embedded objects into the Windows Metafile (WMF) using the PatBlt API may display embedded objects incorrectly.

See details >
OS Build 10240.18132

February 12, 2019
KB4487018
Resolved
KB4493475
April 29, 2019
12:45 AM PT
MSXML6 may cause applications to stop responding
MSXML6 may cause applications to stop responding if an exception was thrown during node operations, such as appendChild(), insertBefore(), and moveNode().

See details >
OS Build 10240.18094

January 08, 2019
KB4480962
Resolved
KB4493475
April 09, 2019
10:00 AM PT
Custom URI schemes may not start corresponding application
Custom URI schemes for application protocol handlers may not start the corresponding application for local intranet and trusted sites in Internet Explorer.

See details >
OS Build 10240.18158

March 12, 2019
KB4489872
Resolved
KB4493475
April 09, 2019
10:00 AM PT
" @@ -96,7 +89,6 @@ sections: text: " -<<<<<<< HEAD
DetailsOriginating updateStatusHistory
Custom URI schemes may not start corresponding application
After installing KB4489872, Custom URI Schemes for Application Protocol handlers may not start the corresponding application for local intranet and trusted sites on Internet Explorer.

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10, version 1607; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 10 Enterprise LTSB 2015; Windows 8.1; Windows 7 SP1 
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2; Windows Server 2008 R2 SP1
Resolution: This issue was resolved in KB4493475.

Back to top
OS Build 10240.18158

March 12, 2019
KB4489872
Resolved
KB4493475
Resolved:
April 09, 2019
10:00 AM PT

Opened:
March 12, 2019
10:00 AM PT
" @@ -106,8 +98,6 @@ sections: text: " -======= ->>>>>>> master
DetailsOriginating updateStatusHistory
Embedded objects may display incorrectly
Any compound document (OLE) server application that places embedded objects into the Windows Metafile (WMF) using the PatBlt API may display embedded objects incorrectly. 
 
For example, if you paste a Microsoft Excel worksheet object into a Microsoft Word document, the cells may render with a different background color. 
 
Affected platforms:  
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10, version 1607; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 10 Enterprise LTSB 2015; Windows 8.1; Windows 7 SP1
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2; Windows Server 2012; Windows Server 2008 R2 SP1; Windows Server 2008 SP2 
Resolution: This issue is resolved in KB4493475

Back to top
OS Build 10240.18132

February 12, 2019
KB4487018
Resolved
KB4493475
Resolved:
April 09, 2019
10:00 AM PT

Opened:
February 12, 2019
10:00 AM PT
" @@ -116,11 +106,7 @@ sections: - type: markdown text: " -<<<<<<< HEAD -======= - ->>>>>>> master
DetailsOriginating updateStatusHistory
Certain operations performed on a Cluster Shared Volume may fail
Certain operations, such as rename, that you perform on files or folders that are on a Cluster Shared Volume (CSV) may fail with the error, \"STATUS_BAD_IMPERSONATION_LEVEL (0xC00000A5)\". This occurs when you perform the operation on a CSV owner node from a process that doesn’t have administrator privilege.

Affected platforms: 
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10, version 1607; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 10 Enterprise LTSB 2015; Windows 8.1
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2; Windows Server 2012
Workaround: Do one of the following: 
  • Perform the operation from a process that has administrator privilege. 
  • Perform the operation from a node that doesn’t have CSV ownership. 
Next steps: Microsoft is working on a resolution and will provide an update in an upcoming release.

Back to top
OS Build 10240.18094

January 08, 2019
KB4480962
Mitigated
Last updated:
April 25, 2019
02:00 PM PT

Opened:
January 08, 2019
10:00 AM PT
Certain operations performed on a Cluster Shared Volume may fail
Certain operations, such as rename, that you perform on files or folders that are on a Cluster Shared Volume (CSV) may fail with the error, \"STATUS_BAD_IMPERSONATION_LEVEL (0xC00000A5)\". This occurs when you perform the operation on a CSV owner node from a process that doesn’t have administrator privilege.

Affected platforms: 
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10, version 1607; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 10 Enterprise LTSB 2015; Windows 8.1
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2; Windows Server 2012
Workaround: Do one of the following: 
  • Perform the operation from a process that has administrator privilege. 
  • Perform the operation from a node that doesn’t have CSV ownership. 
Next steps: Microsoft is working on a resolution and will provide an update in an upcoming release.

Back to top
OS Build 10240.18094

January 08, 2019
KB4480962
Mitigated
Last updated:
January 08, 2019
10:00 AM PT

Opened:
January 08, 2019
10:00 AM PT
MSXML6 may cause applications to stop responding
After installing KB4480962, MSXML6 causes applications to stop responding if an exception was thrown during node operations, such as appendChild(), insertBefore(), and moveNode().

The Group Policy editor may stop responding when editing a Group Policy Object (GPO) that contains Group Policy Preferences (GPP) for Internet Explorer 10 settings.

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10, version 1607; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 10 Enterprise LTSB 2015; Windows 8.1
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2; Windows Server 2012
Resolution: This issue was resolved in KB4493475.

Back to top
OS Build 10240.18094

January 08, 2019
KB4480962
Resolved
KB4493475
Resolved:
April 09, 2019
10:00 AM PT

Opened:
January 08, 2019
10:00 AM PT
" diff --git a/windows/release-information/status-windows-10-1607-and-windows-server-2016.yml b/windows/release-information/status-windows-10-1607-and-windows-server-2016.yml index aae29511cf..de704f0e29 100644 --- a/windows/release-information/status-windows-10-1607-and-windows-server-2016.yml +++ b/windows/release-information/status-windows-10-1607-and-windows-server-2016.yml @@ -64,22 +64,13 @@ sections:
Cluster service may fail if the minimum password length is set to greater than 14
The cluster service may fail to start with the error “2245 (NERR_PasswordTooShort)” if the Group Policy “Minimum Password Length” is configured with greater than 14 characters.

See details >OS Build 14393.2639

November 27, 2018
KB4467684Mitigated
April 25, 2019
02:00 PM PT
Issue using PXE to start a device from WDS
There may be issues using the Preboot Execution Environment (PXE) to start a device from a Windows Deployment Services (WDS) server configured to use Variable Window Extension.

See details >OS Build 14393.2848

March 12, 2019
KB4489882Mitigated
April 25, 2019
02:00 PM PT
SCVMM cannot enumerate and manage logical switches deployed on the host
For hosts managed by System Center Virtual Machine Manager (VMM), VMM cannot enumerate and manage logical switches deployed on the host.

See details >OS Build 14393.2639

November 27, 2018
KB4467684Mitigated
April 25, 2019
02:00 PM PT -<<<<<<< HEAD
Certain operations performed on a Cluster Shared Volume may fail
Certain operations, such as rename, performed on files or folders on a Cluster Shared Volume (CSV) may fail with the error, \"STATUS_BAD_IMPERSONATION_LEVEL (0xC00000A5)\".

See details >OS Build 14393.2724

January 08, 2019
KB4480961Mitigated
April 25, 2019
02:00 PM PT
Windows may not start on certain Lenovo and Fujitsu laptops with less than 8GB of RAM
Windows may fail to start on certain Lenovo and Fujitsu laptops that have less than 8 GB of RAM.

See details >OS Build 14393.2608

November 13, 2018
KB4467691Mitigated
February 19, 2019
10:00 AM PT -======= -
Windows may not start on certain Lenovo and Fujitsu laptops with less than 8GB of RAM
Windows may fail to start on certain Lenovo and Fujitsu laptops that have less than 8 GB of RAM.

See details >OS Build 14393.2608

November 13, 2018
KB4467691Mitigated
February 19, 2019
10:00 AM PT -
Certain operations performed on a Cluster Shared Volume may fail
Certain operations, such as rename, performed on files or folders on a Cluster Shared Volume (CSV) may fail with the error, \"STATUS_BAD_IMPERSONATION_LEVEL (0xC00000A5)\".

See details >OS Build 14393.2724

January 08, 2019
KB4480961Mitigated
January 08, 2019
10:00 AM PT -
Embedded objects may display incorrectly
Any compound document (OLE) server application that places embedded objects into the Windows Metafile (WMF) using the PatBlt API may display embedded objects incorrectly.

See details >OS Build 14393.2791

February 12, 2019
KB4487026Resolved
KB4493470April 29, 2019
12:43 AM PT ->>>>>>> master
Custom URI schemes may not start corresponding application
Custom URI schemes for application protocol handlers may not start the corresponding application for local intranet and trusted sites in Internet Explorer.

See details >OS Build 14393.2848

March 12, 2019
KB4489882Resolved
KB4493473April 25, 2019
02:00 PM PT
End-user-defined characters (EUDC) may cause blue screen at startup
If you enable per font end-user-defined characters (EUDC), the system will stop working and a blue screen may appear at startup.

See details >OS Build 14393.2879

March 19, 2019
KB4489889Resolved
KB4493470April 09, 2019
10:00 AM PT
Internet Explorer 11 authentication issue with multiple concurrent logons
Internet Explorer 11 users may encounter issues if two or more people use the same user account for multiple, concurrent login sessions on the same Windows Server machine.

See details >OS Build 14393.2724

January 08, 2019
KB4480961Resolved
KB4493470April 09, 2019
10:00 AM PT
MSXML6 may cause applications to stop responding
MSXML6 may cause applications to stop responding if an exception was thrown during node operations, such as appendChild(), insertBefore(), and moveNode().

See details >OS Build 14393.2724

January 08, 2019
KB4480961Resolved
KB4493470April 09, 2019
10:00 AM PT -<<<<<<< HEAD
Embedded objects may display incorrectly
Any compound document (OLE) server application that places embedded objects into the Windows Metafile (WMF) using the PatBlt API may display embedded objects incorrectly.

See details >OS Build 14393.2791

February 12, 2019
KB4487026Resolved
KB4493470April 09, 2019
10:00 AM PT -======= ->>>>>>> master " @@ -96,10 +87,6 @@ sections: text: " -<<<<<<< HEAD -======= - ->>>>>>> master
DetailsOriginating updateStatusHistory
Zone transfers over TCP may fail
Zone transfers between primary and secondary DNS servers over the Transmission Control Protocol (TCP) may fail after installing KB4493473
 
Affected platforms:  
  • Client: Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1607; Windows 10 Enterprise LTSC 2016 
  • Server: Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016 
Next steps: Microsoft is working on a resolution and will provide an update in an upcoming release. 

Back to top
OS Build 14393.2941

April 25, 2019
KB4493473
Investigating
Last updated:
April 25, 2019
02:00 PM PT

Opened:
April 25, 2019
02:00 PM PT
Embedded objects may display incorrectly
Any compound document (OLE) server application that places embedded objects into the Windows Metafile (WMF) using the PatBlt API may display embedded objects incorrectly. 
 
For example, if you paste a Microsoft Excel worksheet object into a Microsoft Word document, the cells may render with a different background color. 
 
Affected platforms:  
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10, version 1607; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 10 Enterprise LTSB 2015; Windows 8.1; Windows 7 SP1 
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2; Windows Server 2012; Windows Server 2008 R2 SP1; Windows Server 2008 SP2 
Resolution: This issue is resolved in KB4493470

Back to top
OS Build 14393.2791

February 12, 2019
KB4487026
Resolved
KB4493470
Resolved:
April 09, 2019
10:00 AM PT

Opened:
April 29, 2019
12:43 AM PT
" @@ -112,7 +99,6 @@ sections:

Option 2:
Use the Windows Deployment Services UI to make the following adjustment:
  1. Open Windows Deployment Services from Windows Administrative Tools.
  2. Expand Servers and right-click a WDS server.
  3. Open its properties and clear the Enable Variable Window Extension box on the TFTP tab.
Option 3:
Set the following registry value to 0:
HKLM\\System\\CurrentControlSet\\Services\\WDSServer\\Providers\\WDSTFTP\\EnableVariableWindowExtension

Restart the WDSServer service after disabling the Variable Window Extension.

Next steps: Microsoft is working on a resolution and will provide an update in an upcoming release.

Back to topOS Build 14393.2848

March 12, 2019
KB4489882Mitigated
Last updated:
April 25, 2019
02:00 PM PT

Opened:
March 12, 2019
10:00 AM PT
Custom URI schemes may not start corresponding application
After installing KB4489882, Custom URI schemes for application protocol handlers may not start the corresponding application for local intranet and trusted sites security zones on Internet Explorer.

Affected platforms: 
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10, version 1607; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 10 Enterprise LTSB 2015; Windows 8.1; Windows 7 SP1 
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2; Windows Server 2008 R2 SP1
Resolution: This issue is resolved in KB4493473

Back to topOS Build 14393.2848

March 12, 2019
KB4489882Resolved
KB4493473Resolved:
April 25, 2019
02:00 PM PT

Opened:
March 12, 2019
10:00 AM PT
End-user-defined characters (EUDC) may cause blue screen at startup
If you enable per font end-user-defined characters (EUDC), the system will stop working and a blue screen may appear at startup. This is not a common setting in non-Asian regions.

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10, version 1607; Windows 10 Enterprise LTSC 2016
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016
Resolution: This issue was resolved in KB4493470.

Back to topOS Build 14393.2879

March 19, 2019
KB4489889Resolved
KB4493470Resolved:
April 09, 2019
10:00 AM PT

Opened:
March 19, 2019
10:00 AM PT -<<<<<<< HEAD " @@ -122,8 +108,6 @@ sections: text: " -======= ->>>>>>> master
DetailsOriginating updateStatusHistory
Embedded objects may display incorrectly
Any compound document (OLE) server application that places embedded objects into the Windows Metafile (WMF) using the PatBlt API may display embedded objects incorrectly. 
 
For example, if you paste a Microsoft Excel worksheet object into a Microsoft Word document, the cells may render with a different background color. 
 
Affected platforms:  
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10, version 1607; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 10 Enterprise LTSB 2015; Windows 8.1; Windows 7 SP1 
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2; Windows Server 2012; Windows Server 2008 R2 SP1; Windows Server 2008 SP2 
Resolution: This issue is resolved in KB4493470

Back to top
OS Build 14393.2791

February 12, 2019
KB4487026
Resolved
KB4493470
Resolved:
April 09, 2019
10:00 AM PT

Opened:
February 12, 2019
10:00 AM PT
" @@ -132,11 +116,7 @@ sections: - type: markdown text: " -<<<<<<< HEAD -======= - ->>>>>>> master
DetailsOriginating updateStatusHistory
Certain operations performed on a Cluster Shared Volume may fail
Certain operations, such as rename, that you perform on files or folders that are on a Cluster Shared Volume (CSV) may fail with the error, \"STATUS_BAD_IMPERSONATION_LEVEL (0xC00000A5)\". This occurs when you perform the operation on a CSV owner node from a process that doesn’t have administrator privilege. 

Affected platforms: 
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10, version 1607; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507;  Windows 10 Enterprise LTSB 2015; Windows 8.1
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2; Windows Server 2012
Workaround: Do one of the following:
  • Perform the operation from a process that has administrator privilege. 
  • Perform the operation from a node that doesn’t have CSV ownership.
Next steps: Microsoft is working on a resolution and will provide an update in an upcoming release.

Back to top
OS Build 14393.2724

January 08, 2019
KB4480961
Mitigated
Last updated:
April 25, 2019
02:00 PM PT

Opened:
January 08, 2019
10:00 AM PT
Certain operations performed on a Cluster Shared Volume may fail
Certain operations, such as rename, that you perform on files or folders that are on a Cluster Shared Volume (CSV) may fail with the error, \"STATUS_BAD_IMPERSONATION_LEVEL (0xC00000A5)\". This occurs when you perform the operation on a CSV owner node from a process that doesn’t have administrator privilege. 

Affected platforms: 
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10, version 1607; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507;  Windows 10 Enterprise LTSB 2015; Windows 8.1
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2; Windows Server 2012
Workaround: Do one of the following:
  • Perform the operation from a process that has administrator privilege. 
  • Perform the operation from a node that doesn’t have CSV ownership.
Next steps: Microsoft is working on a resolution and will provide an update in an upcoming release.

Back to top
OS Build 14393.2724

January 08, 2019
KB4480961
Mitigated
Last updated:
January 08, 2019
10:00 AM PT

Opened:
January 08, 2019
10:00 AM PT
Internet Explorer 11 authentication issue with multiple concurrent logons
After installing KB4480961, Internet Explorer 11 and other applications that use WININET.DLL may have authentication issues. This occurs when two or more people use the same user account for multiple, concurrent login sessions on the same Windows Server machine, including Remote Desktop Protocol (RDP) and Terminal Server logons. Symptoms reported by customers include, but may not be limited to:
  • Cache size and location show zero or empty.
  • Keyboard shortcuts may not work properly.
  • Webpages may intermittently fail to load or render correctly.
  • Issues with credential prompts.
  • Issues when downloading files.
Affected platforms: 
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1607; Windows 10 Enterprise LTSC 2016; Windows 8.1; Windows 7 SP1
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server 2016; Windows Server 2012 R2; Windows Server 2012; Windows Server 2008 R2 SP1
Resolution: This issue was resolved in KB4493470.

Back to top
OS Build 14393.2724

January 08, 2019
KB4480961
Resolved
KB4493470
Resolved:
April 09, 2019
10:00 AM PT

Opened:
January 08, 2019
10:00 AM PT
MSXML6 may cause applications to stop responding
After installing KB4480961, MSXML6 causes applications to stop responding if an exception was thrown during node operations, such as appendChild(), insertBefore(), and moveNode().

The Group Policy editor may stop responding when editing a Group Policy Object (GPO) that contains Group Policy Preferences (GPP) for Internet Explorer 10 settings.

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10, version 1607; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 10 Enterprise LTSB 2015; Windows 8.1
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2; Windows Server 2012
Resolution: This issue was resolved in KB4493470.

Back to top
OS Build 14393.2724

January 08, 2019
KB4480961
Resolved
KB4493470
Resolved:
April 09, 2019
10:00 AM PT

Opened:
January 08, 2019
10:00 AM PT
diff --git a/windows/release-information/status-windows-10-1703.yml b/windows/release-information/status-windows-10-1703.yml index 286be74d3c..f65d9e3c4d 100644 --- a/windows/release-information/status-windows-10-1703.yml +++ b/windows/release-information/status-windows-10-1703.yml @@ -60,11 +60,7 @@ sections: - type: markdown text: "
This table offers a summary of current active issues and those issues that have been resolved in the last 30 days.

-<<<<<<< HEAD -======= - ->>>>>>> master @@ -103,12 +99,7 @@ sections: - type: markdown text: "
SummaryOriginating updateStatusLast updated
Certain operations performed on a Cluster Shared Volume may fail
Certain operations, such as rename, performed on files or folders on a Cluster Shared Volume (CSV) may fail with the error, \"STATUS_BAD_IMPERSONATION_LEVEL (0xC00000A5)\".

See details >
OS Build 15063.1563

January 08, 2019
KB4480973
Mitigated
April 25, 2019
02:00 PM PT
Certain operations performed on a Cluster Shared Volume may fail
Certain operations, such as rename, performed on files or folders on a Cluster Shared Volume (CSV) may fail with the error, \"STATUS_BAD_IMPERSONATION_LEVEL (0xC00000A5)\".

See details >
OS Build 15063.1563

January 08, 2019
KB4480973
Mitigated
January 08, 2019
10:00 AM PT
Custom URI schemes may not start corresponding application
Custom URI schemes for application protocol handlers may not start the corresponding application for local intranet and trusted sites in Internet Explorer.

See details >
OS Build 15063.1689

March 12, 2019
KB4489871
Resolved
KB4493436
April 25, 2019
02:00 PM PT
End-user-defined characters (EUDC) may cause blue screen at startup
If you enable per font end-user-defined characters (EUDC), the system may stop working and a blue screen may appear at startup.

See details >
OS Build 15063.1716

March 19, 2019
KB4489888
Resolved
KB4493474
April 09, 2019
10:00 AM PT
MSXML6 may cause applications to stop responding
MSXML6 may cause applications to stop responding if an exception was thrown during node operations, such as appendChild(), insertBefore(), and moveNode().

See details >
OS Build 15063.1563

January 08, 2019
KB4480973
Resolved
KB4493474
April 09, 2019
10:00 AM PT
-<<<<<<< HEAD -======= - - ->>>>>>> master
DetailsOriginating updateStatusHistory
Certain operations performed on a Cluster Shared Volume may fail
Certain operations, such as rename, that you perform on files or folders that are on a Cluster Shared Volume (CSV) may fail with the error, “STATUS_BAD_IMPERSONATION_LEVEL (0xC00000A5)”. This occurs when you perform the operation on a CSV owner node from a process that doesn’t have administrator privilege. 

Affected platforms: 
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10, version 1607; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 10 Enterprise LTSB 2015; Windows 8.1
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2; Windows Server 2012
Workaround: Do one of the following: 
  • Perform the operation from a process that has administrator privilege. 
  • Perform the operation from a node that doesn’t have CSV ownership. 
Next steps: Microsoft is working on a resolution and will provide an update in an upcoming release.

Back to top
OS Build 15063.1563

January 08, 2019
KB4480973
Mitigated
Last updated:
April 25, 2019
02:00 PM PT

Opened:
January 08, 2019
10:00 AM PT
MSXML6 may cause applications to stop responding
After installing KB4480973, MSXML6 causes applications to stop responding if an exception was thrown during node operations, such as appendChild(), insertBefore(), and moveNode().

The Group Policy editor may stop responding when editing a Group Policy Object (GPO) that contains Group Policy Preferences (GPP) for Internet Explorer 10 settings.

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10, version 1607; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 10 Enterprise LTSB 2015; Windows 8.1
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2; Windows Server 2012
Resolution: This issue was resolved in KB4493474.

Back to top
OS Build 15063.1563

January 08, 2019
KB4480973
Resolved
KB4493474
Resolved:
April 09, 2019
10:00 AM PT

Opened:
January 08, 2019
10:00 AM PT
Certain operations performed on a Cluster Shared Volume may fail
Certain operations, such as rename, that you perform on files or folders that are on a Cluster Shared Volume (CSV) may fail with the error, “STATUS_BAD_IMPERSONATION_LEVEL (0xC00000A5)”. This occurs when you perform the operation on a CSV owner node from a process that doesn’t have administrator privilege. 

Affected platforms: 
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10, version 1607; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 10 Enterprise LTSB 2015; Windows 8.1
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2; Windows Server 2012
Workaround: Do one of the following: 
  • Perform the operation from a process that has administrator privilege. 
  • Perform the operation from a node that doesn’t have CSV ownership. 
Next steps: Microsoft is working on a resolution and will provide an update in an upcoming release.

Back to top
OS Build 15063.1563

January 08, 2019
KB4480973
Mitigated
Last updated:
January 08, 2019
10:00 AM PT

Opened:
January 08, 2019
10:00 AM PT
MSXML6 may cause applications to stop responding
After installing KB4480973, MSXML6 causes applications to stop responding if an exception was thrown during node operations, such as appendChild(), insertBefore(), and moveNode().

The Group Policy editor may stop responding when editing a Group Policy Object (GPO) that contains Group Policy Preferences (GPP) for Internet Explorer 10 settings.

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10, version 1607; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 10 Enterprise LTSB 2015; Windows 8.1
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2
Resolution: This issue was resolved in KB4493474.

Back to top
OS Build 15063.1563

January 08, 2019
KB4480973
Resolved
KB4493474
Resolved:
April 09, 2019
10:00 AM PT

Opened:
January 08, 2019
10:00 AM PT
" diff --git a/windows/release-information/status-windows-10-1709.yml b/windows/release-information/status-windows-10-1709.yml index a74f028a86..dd3b7632b0 100644 --- a/windows/release-information/status-windows-10-1709.yml +++ b/windows/release-information/status-windows-10-1709.yml @@ -61,11 +61,7 @@ sections: text: "
This table offers a summary of current active issues and those issues that have been resolved in the last 30 days.

-<<<<<<< HEAD -======= - ->>>>>>> master @@ -115,11 +111,7 @@ sections: - type: markdown text: "
SummaryOriginating updateStatusLast updated
Zone transfers over TCP may fail
Zone transfers between primary and secondary DNS servers over the Transmission Control Protocol (TCP) may fail.

See details >
OS Build 16299.1127

April 25, 2019
KB4493440
Investigating
April 25, 2019
02:00 PM PT
Certain operations performed on a Cluster Shared Volume may fail
Certain operations, such as rename, performed on files or folders on a Cluster Shared Volume (CSV) may fail with the error, \"STATUS_BAD_IMPERSONATION_LEVEL (0xC00000A5)\".

See details >
OS Build 16299.904

January 08, 2019
KB4480978
Mitigated
April 25, 2019
02:00 PM PT
Certain operations performed on a Cluster Shared Volume may fail
Certain operations, such as rename, performed on files or folders on a Cluster Shared Volume (CSV) may fail with the error, \"STATUS_BAD_IMPERSONATION_LEVEL (0xC00000A5)\".

See details >
OS Build 16299.904

January 08, 2019
KB4480978
Mitigated
January 08, 2019
10:00 AM PT
Custom URI schemes may not start corresponding application
Custom URI schemes for application protocol handlers may not start the corresponding application for local intranet and trusted sites in Internet Explorer.

See details >
OS Build 16299.1029

March 12, 2019
KB4489886
Resolved
KB4493440
April 25, 2019
02:00 PM PT
End-user-defined characters (EUDC) may cause blue screen at startup
If you enable per font end-user-defined characters (EUDC), the system may stop working and a blue screen may appear at startup.

See details >
OS Build 16299.1059

March 19, 2019
KB4489890
Resolved
KB4493441
April 09, 2019
10:00 AM PT
MSXML6 causes applications to stop responding if an exception was thrown
MSXML6 causes applications to stop responding if an exception was thrown during node operations, such as appendChild(), insertBefore(), and moveNode().

See details >
OS Build 16299.904

January 08, 2019
KB4480978
Resolved
KB4493441
April 09, 2019
10:00 AM PT
-<<<<<<< HEAD -======= - ->>>>>>> master
DetailsOriginating updateStatusHistory
Certain operations performed on a Cluster Shared Volume may fail
Certain operations, such as rename, that you perform on files or folders that are on a Cluster Shared Volume (CSV) may fail with the error, \"STATUS_BAD_IMPERSONATION_LEVEL (0xC00000A5)\". This occurs when you perform the operation on a CSV owner node from a process that doesn’t have administrator privilege. 

Affected platforms: 
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10, version 1607; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 10 Enterprise LTSB 2015; Windows 8.1
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2; Windows Server 2012
Workaround: Do one of the following:
  • Perform the operation from a process that has administrator privilege. 
  • Perform the operation from a node that doesn’t have CSV ownership. 
Next steps: Microsoft is working on a resolution and will provide an update in an upcoming release.

Back to top
OS Build 16299.904

January 08, 2019
KB4480978
Mitigated
Last updated:
April 25, 2019
02:00 PM PT

Opened:
January 08, 2019
10:00 AM PT
Certain operations performed on a Cluster Shared Volume may fail
Certain operations, such as rename, that you perform on files or folders that are on a Cluster Shared Volume (CSV) may fail with the error, \"STATUS_BAD_IMPERSONATION_LEVEL (0xC00000A5)\". This occurs when you perform the operation on a CSV owner node from a process that doesn’t have administrator privilege. 

Affected platforms: 
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10, version 1607; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 10 Enterprise LTSB 2015; Windows 8.1
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2; Windows Server 2012
Workaround: Do one of the following:
  • Perform the operation from a process that has administrator privilege. 
  • Perform the operation from a node that doesn’t have CSV ownership. 
Next steps: Microsoft is working on a resolution and will provide an update in an upcoming release.

Back to top
OS Build 16299.904

January 08, 2019
KB4480978
Mitigated
Last updated:
January 08, 2019
10:00 AM PT

Opened:
January 08, 2019
10:00 AM PT
MSXML6 causes applications to stop responding if an exception was thrown
After installing KB4480978, MSXML6 causes applications to stop responding if an exception was thrown during node operations, such as appendChild(), insertBefore(), and moveNode().

The Group Policy editor may stop responding when editing a Group Policy Object (GPO) that contains Group Policy Preferences (GPP) for Internet Explorer 10 settings.

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10, version 1607; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 10 Enterprise LTSB 2015; Windows 8.1
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2; Windows Server 2012
Resolution: This issue is resolved in KB4493441.

Back to top
OS Build 16299.904

January 08, 2019
KB4480978
Resolved
KB4493441
Resolved:
April 09, 2019
10:00 AM PT

Opened:
January 08, 2019
10:00 AM PT
" diff --git a/windows/release-information/status-windows-10-1803.yml b/windows/release-information/status-windows-10-1803.yml index aadb338bd5..b1412e97e8 100644 --- a/windows/release-information/status-windows-10-1803.yml +++ b/windows/release-information/status-windows-10-1803.yml @@ -62,11 +62,7 @@ sections: -<<<<<<< HEAD -======= - ->>>>>>> master @@ -119,11 +115,7 @@ sections: - type: markdown text: "
SummaryOriginating updateStatusLast updated
Zone transfers over TCP may fail
Zone transfers between primary and secondary DNS servers over the Transmission Control Protocol (TCP) may fail.

See details >
OS Build 17134.753

April 25, 2019
KB4493437
Investigating
April 25, 2019
02:00 PM PT
Issue using PXE to start a device from WDS
Using PXE to start a device from a WDS server configured to use Variable Window Extension may cause the connection to the WDS server to terminate prematurely.

See details >
OS Build 17134.648

March 12, 2019
KB4489868
Mitigated
April 25, 2019
02:00 PM PT
Certain operations performed on a Cluster Shared Volume may fail
Certain operations, such as rename, performed on files or folders on a Cluster Shared Volume (CSV) may fail with the error, \"STATUS_BAD_IMPERSONATION_LEVEL (0xC00000A5)\".

See details >
OS Build 17134.523

January 08, 2019
KB4480966
Mitigated
April 25, 2019
02:00 PM PT
Certain operations performed on a Cluster Shared Volume may fail
Certain operations, such as rename, performed on files or folders on a Cluster Shared Volume (CSV) may fail with the error, \"STATUS_BAD_IMPERSONATION_LEVEL (0xC00000A5)\".

See details >
OS Build 17134.523

January 08, 2019
KB4480966
Mitigated
January 08, 2019
10:00 AM PT
Custom URI schemes may not start corresponding application
Custom URI schemes for application protocol handlers may not start the corresponding application for local intranet and trusted sites in Internet Explorer.

See details >
OS Build 17134.648

March 12, 2019
KB4489868
Resolved
KB4493437
April 25, 2019
02:00 PM PT
End-user-defined characters (EUDC) may cause blue screen at startup
If you enable per font end-user-defined characters (EUDC), the system may stop working and a blue screen may appear at startup.

See details >
OS Build 17134.677

March 19, 2019
KB4489894
Resolved
KB4493464
April 09, 2019
10:00 AM PT
First character of the Japanese era name not recognized
The first character of the Japanese era name is not recognized as an abbreviation and may cause date parsing issues.

See details >
OS Build 17134.556

January 15, 2019
KB4480976
Resolved
KB4487029
April 09, 2019
10:00 AM PT
-<<<<<<< HEAD -======= - ->>>>>>> master
DetailsOriginating updateStatusHistory
Certain operations performed on a Cluster Shared Volume may fail
Certain operations, such as rename, that you perform on files or folders that are on a Cluster Shared Volume (CSV) may fail with the error, \"STATUS_BAD_IMPERSONATION_LEVEL (0xC00000A5)\". This occurs when you perform the operation on a CSV owner node from a process that doesn’t have administrator privilege.

Affected platforms: 
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10, version 1607; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 10 Enterprise LTSB 2015; Windows 8.1
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2; Windows Server 2012
Workaround: Do one of the following:
  • Perform the operation from a process that has administrator privilege. 
  • Perform the operation from a node that doesn’t have CSV ownership. 
Next steps: Microsoft is working on a resolution and will provide an update in an upcoming release.

Back to top
OS Build 17134.523

January 08, 2019
KB4480966
Mitigated
Last updated:
April 25, 2019
02:00 PM PT

Opened:
January 08, 2019
10:00 AM PT
Certain operations performed on a Cluster Shared Volume may fail
Certain operations, such as rename, that you perform on files or folders that are on a Cluster Shared Volume (CSV) may fail with the error, \"STATUS_BAD_IMPERSONATION_LEVEL (0xC00000A5)\". This occurs when you perform the operation on a CSV owner node from a process that doesn’t have administrator privilege.

Affected platforms: 
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10, version 1607; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 10 Enterprise LTSB 2015; Windows 8.1
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2; Windows Server 2012
Workaround: Do one of the following:
  • Perform the operation from a process that has administrator privilege. 
  • Perform the operation from a node that doesn’t have CSV ownership. 
Next steps: Microsoft is working on a resolution and will provide an update in an upcoming release.

Back to top
OS Build 17134.523

January 08, 2019
KB4480966
Mitigated
Last updated:
January 08, 2019
10:00 AM PT

Opened:
January 08, 2019
10:00 AM PT
First character of the Japanese era name not recognized
After installing KB4480976, the first character of the Japanese era name is not recognized as an abbreviation and may cause date parsing issues.

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10, version 1607; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 10 Enterprise LTSB 2015; Windows 8.1; Windows 7 SP1
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2; Windows Server 2012; Windows Server 2008 R2 SP1; Windows Server 2008 SP2
Resolution: This issue is resolved in KB4487029

Back to top
OS Build 17134.556

January 15, 2019
KB4480976
Resolved
KB4487029
Resolved:
February 19, 2019
02:00 PM PT

Opened:
January 08, 2019
10:00 AM PT
MSXML6 may cause applications to stop responding
After installing KB4480966, MSXML6 causes applications to stop responding if an exception was thrown during node operations, such as appendChild(), insertBefore(), and moveNode().

The Group Policy editor may stop responding when editing a Group Policy Object (GPO) that contains Group Policy Preferences (GPP) for Internet Explorer 10 settings.

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10, version 1607; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 10 Enterprise LTSB 2015; Windows 8.1
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2; Windows Server 2012
Resolution: This issue was resolved in KB4493464

Back to top
OS Build 17134.523

January 08, 2019
KB4480966
Resolved
KB4493464
Resolved:
April 09, 2019
10:00 AM PT

Opened:
January 08, 2019
10:00 AM PT
diff --git a/windows/release-information/status-windows-10-1809-and-windows-server-2019.yml b/windows/release-information/status-windows-10-1809-and-windows-server-2019.yml index 63e954f822..760ba2533b 100644 --- a/windows/release-information/status-windows-10-1809-and-windows-server-2019.yml +++ b/windows/release-information/status-windows-10-1809-and-windows-server-2019.yml @@ -90,10 +90,7 @@ sections: - type: markdown text: " -<<<<<<< HEAD -======= ->>>>>>> master
DetailsOriginating updateStatusHistory
System may be unresponsive after restart if ArcaBit antivirus software installed
Microsoft and ArcaBit have identified an issue on devices with ArcaBit antivirus software installed that may cause the system to become unresponsive upon restart after installing KB4493509
 
Microsoft has temporarily blocked devices from receiving this update if ArcaBit antivirus software is installed. 

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 8.1; Windows 7 SP1
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server 2012 R2; Windows Server 2008 R2 SP1
Workaround: ArcaBit has released an update to address this issue. For more information, see the Arcabit support article.

Back to top
OS Build 17763.437

April 09, 2019
KB4493509
Mitigated
Last updated:
April 25, 2019
02:00 PM PT

Opened:
April 09, 2019
10:00 AM PT
End-user-defined characters (EUDC) may cause blue screen at startup
If you enable per font end-user-defined characters (EUDC), the system will stop working and a blue screen may appear at startup. This is not a common setting in non-Asian regions.

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10, version 1607; Windows 10 Enterprise LTSC 2016
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016
Resolution: This issue was resolved in KB4493509.

Back to top
OS Build 17763.404

April 02, 2019
KB4490481
Resolved
KB4493509
Resolved:
April 09, 2019
10:00 AM PT

Opened:
April 02, 2019
10:00 AM PT
" @@ -124,14 +121,8 @@ sections: - type: markdown text: " -<<<<<<< HEAD -======= - - - ->>>>>>> master
DetailsOriginating updateStatusHistory
Certain operations performed on a Cluster Shared Volume may fail
Certain operations, such as rename, that you perform on files or folders that are on a Cluster Shared Volume (CSV) may fail with the error, \"STATUS_BAD_IMPERSONATION_LEVEL (0xC00000A5)\". This occurs when you perform the operation on a CSV owner node from a process that doesn’t have administrator privilege. 

Affected platforms: 
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10, version 1607; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 10 Enterprise LTSB 2015; Windows 8.1
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2; Windows Server 2012
Workaround: Do one of the following:  
  • Perform the operation from a process that has administrator privilege. 
  • Perform the operation from a node that doesn’t have CSV ownership. 
Next steps: Microsoft is working on a resolution and will provide an update in an upcoming release.

Back to top
OS Build 17763.253

January 08, 2019
KB4480116
Mitigated
Last updated:
January 08, 2019
10:00 AM PT

Opened:
January 08, 2019
10:00 AM PT
Internet Explorer 11 authentication issue with multiple concurrent logons
After installing KB4480116, Internet Explorer 11 and other applications that use WININET.DLL may have authentication issues. This occurs when two or more people use the same user account for multiple, concurrent login sessions on the same Windows Server machine, including Remote Desktop Protocol (RDP) and Terminal Server logons. Symptoms reported by customers include, but may not be limited to: 
  • Cache size and location show zero or empty. 
  • Keyboard shortcuts may not work properly. 
  • Webpages may intermittently fail to load or render correctly. 
  • Issues with credential prompts. 
  • Issues when downloading files. 
Affected platforms: 
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1607; Windows 10 Enterprise LTSC 2016; Windows 8.1; Windows 7 SP1
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server 2016; Windows Server 2012 R2; Windows Server 2012; Windows Server 2008 R2 SP1
Resolution: This issue was resolved in KB4493509

Back to top
OS Build 17763.253

January 08, 2019
KB4480116
Resolved
KB4493509
Resolved:
April 09, 2019
10:00 AM PT

Opened:
January 08, 2019
10:00 AM PT
System may be unresponsive after restart if ArcaBit antivirus software installed
Microsoft and ArcaBit have identified an issue on devices with ArcaBit antivirus software installed that may cause the system to become unresponsive upon restart after installing KB4493509
 
Microsoft has temporarily blocked devices from receiving this update if ArcaBit antivirus software is installed. 

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 8.1; Windows 7 SP1
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server 2012 R2; Windows Server 2008 R2 SP1
Workaround: ArcaBit has released an update to address this issue. For more information, see the Arcabit support article.

Back to top
OS Build 17763.437

April 09, 2019
KB4493509
Mitigated
Last updated:
April 25, 2019
02:00 PM PT

Opened:
January 08, 2019
10:00 AM PT
Certain operations performed on a Cluster Shared Volume may fail
Certain operations, such as rename, that you perform on files or folders that are on a Cluster Shared Volume (CSV) may fail with the error, \"STATUS_BAD_IMPERSONATION_LEVEL (0xC00000A5)\". This occurs when you perform the operation on a CSV owner node from a process that doesn’t have administrator privilege. 

Affected platforms: 
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10, version 1607; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 10 Enterprise LTSB 2015; Windows 8.1
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2; Windows Server 2012
Workaround: Do one of the following:  
  • Perform the operation from a process that has administrator privilege. 
  • Perform the operation from a node that doesn’t have CSV ownership. 
Next steps: Microsoft is working on a resolution and will provide an update in an upcoming release.

Back to top
OS Build 17763.253

January 08, 2019
KB4480116
Mitigated
Last updated:
January 08, 2019
10:00 AM PT

Opened:
January 08, 2019
10:00 AM PT
Internet Explorer 11 authentication issue with multiple concurrent logons
After installing KB4480116, Internet Explorer 11 and other applications that use WININET.DLL may have authentication issues. This occurs when two or more people use the same user account for multiple, concurrent login sessions on the same Windows Server machine, including Remote Desktop Protocol (RDP) and Terminal Server logons. Symptoms reported by customers include, but may not be limited to: 
  • Cache size and location show zero or empty. 
  • Keyboard shortcuts may not work properly. 
  • Webpages may intermittently fail to load or render correctly. 
  • Issues with credential prompts. 
  • Issues when downloading files. 
Resolution: This issue was resolved in KB4493509

Back to top
OS Build 17763.253

January 08, 2019
KB4480116
Resolved
KB4493509
Resolved:
April 09, 2019
10:00 AM PT

Opened:
January 08, 2019
10:00 AM PT
MSXML6 may cause applications to stop responding
After installing KB4480116, MSXML6 causes applications to stop responding if an exception was thrown during node operations, such as appendChild(), insertBefore(), and moveNode().
 
The Group Policy editor may stop responding when editing a Group Policy Object (GPO) that contains Group Policy Preferences (GPP) for Internet Explorer 10 settings. 

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10, version 1607; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 10 Enterprise LTSB 2015; Windows 8.1
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2; Windows Server 2012
Resolution: This issue was resolved in KB4493509

Back to top
OS Build 17763.253

January 08, 2019
KB4480116
Resolved
KB4493509
Resolved:
April 09, 2019
10:00 AM PT

Opened:
January 08, 2019
10:00 AM PT
" diff --git a/windows/release-information/status-windows-7-and-windows-server-2008-r2-sp1.yml b/windows/release-information/status-windows-7-and-windows-server-2008-r2-sp1.yml index ebf0c4be16..93244396c1 100644 --- a/windows/release-information/status-windows-7-and-windows-server-2008-r2-sp1.yml +++ b/windows/release-information/status-windows-7-and-windows-server-2008-r2-sp1.yml @@ -64,11 +64,7 @@ sections:
Authentication may fail for services after the Kerberos ticket expires
Authentication may fail for services that require unconstrained delegation after the Kerberos ticket expires.

See details >March 12, 2019
KB4489878Mitigated
April 25, 2019
02:00 PM PT
System unresponsive after restart if Sophos Endpoint Protection installed
Devices with Sophos Endpoint Protection installed and managed by Sophos Central or Sophos Enterprise Console (SEC) may become unresponsive upon restart.

See details >April 09, 2019
KB4493472Mitigated
April 25, 2019
02:00 PM PT
System may be unresponsive after restart if ArcaBit antivirus software installed
Devices with ArcaBit antivirus software installed may become unresponsive upon restart.

See details >April 09, 2019
KB4493472Mitigated
April 25, 2019
02:00 PM PT -<<<<<<< HEAD
System may be unresponsive after restart with certain McAfee antivirus products
Devices with McAfee Endpoint Security Threat Prevention 10.x, Host Intrusion Prevention 8.0, or VirusScan Enterprise 8.8 may be slow or unresponsive at startup.

See details >April 09, 2019
KB4493472Mitigated
April 25, 2019
02:00 PM PT -======= -
System may be unresponsive after restart with certain McAfee antivirus products
Devices with McAfee Endpoint Security Threat Prevention 10.x, Host Intrusion Prevention 8.0, or VirusScan Enterprise 8.8 may be slow or unresponsive at startup.

See details >April 09, 2019
KB4493472Mitigated
April 18, 2019
05:00 PM PT ->>>>>>> master
Devices may not respond at login or Welcome screen if running certain Avast software
Devices running Avast for Business, Avast CloudCare, and AVG Business Edition antivirus software may become unresponsive after restart.

See details >April 09, 2019
KB4493472Resolved
April 25, 2019
02:00 PM PT
Internet Explorer 11 authentication issue with multiple concurrent logons
Internet Explorer 11 users may encounter issues if two or more people use the same user account for multiple, concurrent login sessions on the same Windows Server machine.

See details >January 08, 2019
KB4480970Resolved
KB4493472April 09, 2019
10:00 AM PT
Custom URI schemes may not start corresponding application
Custom URI schemes for application protocol handlers may not start the corresponding application for local intranet and trusted sites in Internet Explorer.

See details >March 12, 2019
KB4489878Resolved
KB4493472April 09, 2019
10:00 AM PT @@ -92,11 +88,7 @@ sections:
System may be unresponsive after restart if Avira antivirus software installed
Microsoft and Avira have identified an issue on devices with Avira antivirus software installed that may cause the system to become unresponsive upon restart after installing KB4493472.

Microsoft has temporarily blocked devices from receiving this update if Avira antivirus software is installed.

Affected platforms: 
  • Client: Windows 8.1; Windows 7 SP1 
  • Server: Windows Server 2012 R2; Windows Server 2012; Windows Server 2008 R2 SP1; Windows Server 2008 SP2
Next steps: We are presently investigating this issue with Avira and will provide an update when available.

Back to topApril 09, 2019
KB4493472Investigating
Last updated:
April 25, 2019
02:00 PM PT

Opened:
April 09, 2019
10:00 AM PT
System unresponsive after restart if Sophos Endpoint Protection installed
Microsoft and Sophos have identified an issue on devices with Sophos Endpoint Protection installed and managed by either Sophos Central or Sophos Enterprise Console (SEC) that may cause the system to become unresponsive upon restart after installing KB4493472.

Microsoft has temporarily blocked devices from receiving this update if the Sophos Endpoint is installed until a solution is available.

Affected platforms: 
  • Client: Windows 8.1; Windows 7 SP1
  • Server: Windows Server 2012 R2; Windows Server 2012; Windows Server 2008 R2 SP1; Windows Server 2008 SP2
Guidance for Sophos Endpoint and Sophos Enterprise Console customers can be found in the Sophos support article.

Back to topApril 09, 2019
KB4493472Mitigated
Last updated:
April 25, 2019
02:00 PM PT

Opened:
April 09, 2019
10:00 AM PT
System may be unresponsive after restart if ArcaBit antivirus software installed
Microsoft and ArcaBit have identified an issue on devices with ArcaBit antivirus software installed that may cause the system to become unresponsive upon restart after installing KB4493472.

Microsoft has temporarily blocked devices from receiving this update if ArcaBit antivirus software is installed.

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 8.1; Windows 7 SP1
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server 2012 R2; Windows Server 2008 R2 SP1
Workaround: ArcaBit has released an update to address this issue. For more information, see the Arcabit support article.

Back to topApril 09, 2019
KB4493472Mitigated
Last updated:
April 25, 2019
02:00 PM PT

Opened:
April 09, 2019
10:00 AM PT -<<<<<<< HEAD
System may be unresponsive after restart with certain McAfee antivirus products
Microsoft and McAfee have identified an issue on devices with McAfee Endpoint Security (ENS) Threat Prevention 10.x or McAfee Host Intrusion Prevention (Host IPS) 8.0 or McAfee VirusScan Enterprise (VSE) 8.8 installed. It may cause the system to have slow startup or become unresponsive at restart after installing this update. 

Affected platforms:
  • Client:  Windows 8.1; Windows 7 SP1
  • Server:  Windows Server 2012 R2; Windows Server 2008 R2 SP1
Workaround: Guidance for McAfee customers can be found in the following McAfee support articles: 
Next steps: We are presently investigating this issue with McAfee. We will provide an update once we have more information.

Back to topApril 09, 2019
KB4493472Mitigated
Last updated:
April 25, 2019
02:00 PM PT

Opened:
April 09, 2019
10:00 AM PT -======= -
System may be unresponsive after restart with certain McAfee antivirus products
Microsoft and McAfee have identified an issue on devices with McAfee Endpoint Security (ENS) Threat Prevention 10.x or McAfee Host Intrusion Prevention (Host IPS) 8.0 or McAfee VirusScan Enterprise (VSE) 8.8 installed. It may cause the system to have slow startup or become unresponsive at restart after installing this update. 

Affected platforms:
  • Client:  Windows 8.1; Windows 7 SP1
  • Server:  Windows Server 2012 R2; Windows Server 2008 R2 SP1
Workaround: Guidance for McAfee customers can be found in the following McAfee support articles: 
Next steps: We are presently investigating this issue with McAfee. We will provide an update once we have more information.

Back to topApril 09, 2019
KB4493472Mitigated
Last updated:
April 18, 2019
05:00 PM PT

Opened:
April 09, 2019
10:00 AM PT ->>>>>>> master
Devices may not respond at login or Welcome screen if running certain Avast software
Microsoft and Avast have identified an issue on devices running Avast for Business, Avast CloudCare, and AVG Business Edition antivirus software after you install KB4493472 and restart. Devices may become unresponsive at the login or Welcome screen. Additionally, you may be unable to log in or log in after an extended period of time.

Affected platforms: 
  • Client: Windows 8.1; Windows 7 SP1 
  • Server: Windows Server 2012 R2; Windows Server 2008 R2 SP1 
Resolution: Avast has released emergency updates to address this issue. For more information and AV update schedule, see the Avast support KB article.

Back to topApril 09, 2019
KB4493472Resolved
Resolved:
April 25, 2019
02:00 PM PT

Opened:
April 09, 2019
10:00 AM PT " @@ -117,11 +109,7 @@ sections: - type: markdown text: " -<<<<<<< HEAD -======= - ->>>>>>> master
DetailsOriginating updateStatusHistory
Embedded objects may display incorrectly
Any compound document (OLE) server application that places embedded objects into the Windows Metafile (WMF) using the PatBlt API may display embedded objects incorrectly. 
 
For example, if you paste a Microsoft Excel worksheet object into a Microsoft Word document, the cells may render with a different background color. 
 
Affected platforms:  
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10, version 1607; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 10 Enterprise LTSB 2015; Windows 8.1; Windows 7 SP1 
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2; Windows Server 2012; Windows Server 2008 R2 SP1; Windows Server 2008 SP2 
Resolution: This issue is resolved in KB4493472

Back to top
February 12, 2019
KB4486563
Resolved
KB4493472
Resolved:
April 09, 2019
10:00 AM PT

Opened:
February 12, 2019
10:00 AM PT
Embedded objects may display incorrectly
Any compound document (OLE) server application that places embedded objects into the Windows Metafile (WMF) using the PatBlt API may display embedded objects incorrectly. 
 
For example, if you paste a Microsoft Excel worksheet object into a Microsoft Word document, the cells may render with a different background color. 
 
Affected platforms:  
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10, version 1607; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 10 Enterprise LTSB 2015; Windows 8.1; Windows 7 SP1 
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2; Windows Server 2012; Windows Server 2008 R2 SP1; Windows Server 2008 SP2 
Resolution: This issue is resolved in KB4493472

Back to top
February 12, 2019
KB4486563
Resolved
KB4493472
Resolved:
April 09, 2019
10:00 AM PT

Opened:
February 12, 2019
10:00 AM PT
" diff --git a/windows/release-information/status-windows-8.1-and-windows-server-2012-r2.yml b/windows/release-information/status-windows-8.1-and-windows-server-2012-r2.yml index 2cd437c0b0..5efe01fae9 100644 --- a/windows/release-information/status-windows-8.1-and-windows-server-2012-r2.yml +++ b/windows/release-information/status-windows-8.1-and-windows-server-2012-r2.yml @@ -64,13 +64,8 @@ sections:
Issue using PXE to start a device from WDS
There may be issues using the Preboot Execution Environment (PXE) to start a device from a Windows Deployment Services (WDS) server configured to use Variable Window Extension.

See details >March 12, 2019
KB4489881Mitigated
April 25, 2019
02:00 PM PT
System unresponsive after restart if Sophos Endpoint Protection installed
Devices with Sophos Endpoint Protection installed and managed by Sophos Central or Sophos Enterprise Console (SEC) may become unresponsive upon restart.

See details >April 09, 2019
KB4493446Mitigated
April 25, 2019
02:00 PM PT
System may be unresponsive after restart if ArcaBit antivirus software installed
Devices with ArcaBit antivirus software installed may become unresponsive upon restart.

See details >April 09, 2019
KB4493446Mitigated
April 25, 2019
02:00 PM PT -<<<<<<< HEAD
Certain operations performed on a Cluster Shared Volume may fail
Certain operations, such as rename, performed on files or folders on a Cluster Shared Volume (CSV) may fail with the error, “STATUS_BAD_IMPERSONATION_LEVEL (0xC00000A5)”.

See details >January 08, 2019
KB4480963Mitigated
April 25, 2019
02:00 PM PT
System may be unresponsive after restart with certain McAfee antivirus products
Devices with McAfee Endpoint Security Threat Prevention 10.x, Host Intrusion Prevention 8.0, or VirusScan Enterprise 8.8 may be slow or unresponsive at startup.

See details >April 09, 2019
KB4493446Mitigated
April 18, 2019
05:00 PM PT -======= -
System may be unresponsive after restart with certain McAfee antivirus products
Devices with McAfee Endpoint Security Threat Prevention 10.x, Host Intrusion Prevention 8.0, or VirusScan Enterprise 8.8 may be slow or unresponsive at startup.

See details >April 09, 2019
KB4493446Mitigated
April 18, 2019
05:00 PM PT -
Certain operations performed on a Cluster Shared Volume may fail
Certain operations, such as rename, performed on files or folders on a Cluster Shared Volume (CSV) may fail with the error, “STATUS_BAD_IMPERSONATION_LEVEL (0xC00000A5)”.

See details >January 08, 2019
KB4480963Mitigated
January 08, 2019
10:00 AM PT ->>>>>>> master
Devices may not respond at login or Welcome screen if running certain Avast software
Devices running Avast for Business, Avast CloudCare, and AVG Business Edition antivirus software may become unresponsive after restart.

See details >April 09, 2019
KB4493446Resolved
April 25, 2019
02:00 PM PT
Internet Explorer 11 authentication issue with multiple concurrent logons
Internet Explorer 11 users may encounter issues if two or more people use the same user account for multiple, concurrent login sessions on the same Windows Server machine.

See details >January 08, 2019
KB4480963Resolved
KB4493446April 09, 2019
10:00 AM PT
MSXML6 may cause applications to stop responding.
MSXML6 may cause applications to stop responding if an exception was thrown during node operations, such as appendChild(), insertBefore(), and moveNode().

See details >January 08, 2019
KB4480963Resolved
KB4493446April 09, 2019
10:00 AM PT @@ -124,11 +119,7 @@ sections: - type: markdown text: " -<<<<<<< HEAD -======= - ->>>>>>> master
DetailsOriginating updateStatusHistory
Certain operations performed on a Cluster Shared Volume may fail
Certain operations, such as rename, that you perform on files or folders that are on a Cluster Shared Volume (CSV) may fail with the error, “STATUS_BAD_IMPERSONATION_LEVEL (0xC00000A5)”. This occurs when you perform the operation on a CSV owner node from a process that doesn’t have administrator privilege.

Affected platforms: 
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10, version 1607; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 10 Enterprise LTSB 2015; Windows 8.1
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2; Windows Server 2012
Workaround: Do one of the following:
  • Perform the operation from a process that has administrator privilege.
  • Perform the operation from a node that doesn’t have CSV ownership.
Next steps: Microsoft is working on a resolution and will provide an update in an upcoming release.

Back to top
January 08, 2019
KB4480963
Mitigated
Last updated:
April 25, 2019
02:00 PM PT

Opened:
January 08, 2019
10:00 AM PT
Certain operations performed on a Cluster Shared Volume may fail
Certain operations, such as rename, that you perform on files or folders that are on a Cluster Shared Volume (CSV) may fail with the error, “STATUS_BAD_IMPERSONATION_LEVEL (0xC00000A5)”. This occurs when you perform the operation on a CSV owner node from a process that doesn’t have administrator privilege.

Affected platforms: 
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10, version 1607; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 10 Enterprise LTSB 2015; Windows 8.1
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2; Windows Server 2012
Workaround: Do one of the following:
  • Perform the operation from a process that has administrator privilege.
  • Perform the operation from a node that doesn’t have CSV ownership.
Next steps: Microsoft is working on a resolution and will provide an update in an upcoming release.

Back to top
January 08, 2019
KB4480963
Mitigated
Last updated:
January 08, 2019
10:00 AM PT

Opened:
January 08, 2019
10:00 AM PT
Internet Explorer 11 authentication issue with multiple concurrent logons
After installing KB4480963, Internet Explorer 11 and other applications that use WININET.DLL may have authentication issues. This occurs when two or more people use the same user account for multiple, concurrent login sessions on the same Windows Server machine, including Remote Desktop Protocol (RDP) and Terminal Server logons. Symptoms reported by customers include, but may not be limited to:
  • Cache size and location show zero or empty.
  • Keyboard shortcuts may not work properly.
  • Webpages may intermittently fail to load or render correctly.
  • Issues with credential prompts.
  • Issues when downloading files.
Affected platforms: 
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1607; Windows 10 Enterprise LTSC 2016; Windows 8.1; Windows 7 SP1
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server 2016; Windows Server 2012 R2; Windows Server 2012; Windows Server 2008 R2 SP1
Resolution: This issue is resolved in KB4493446.

Back to top
January 08, 2019
KB4480963
Resolved
KB4493446
Resolved:
April 09, 2019
10:00 AM PT

Opened:
January 08, 2019
10:00 AM PT
MSXML6 may cause applications to stop responding.
After installing KB4480963, MSXML6 causes applications to stop responding if an exception was thrown during node operations, such as appendChild(), insertBefore(), and moveNode().

The Group Policy editor may stop responding when editing a Group Policy Object (GPO) that contains Group Policy Preferences (GPP) for Internet Explorer 10 settings.

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10, version 1607; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 10 Enterprise LTSB 2015; Windows 8.1
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2; Windows Server 2012
Resolution: This issue is resolved in KB4493446.

Back to top
January 08, 2019
KB4480963
Resolved
KB4493446
Resolved:
April 09, 2019
10:00 AM PT

Opened:
January 08, 2019
10:00 AM PT
diff --git a/windows/release-information/status-windows-server-2012.yml b/windows/release-information/status-windows-server-2012.yml index 5a3ffd1a49..120c7a32f3 100644 --- a/windows/release-information/status-windows-server-2012.yml +++ b/windows/release-information/status-windows-server-2012.yml @@ -63,11 +63,7 @@ sections:
System may be unresponsive after restart if Avira antivirus software installed
Devices with Avira antivirus software installed may become unresponsive upon restart.

See details >April 09, 2019
KB4493451Investigating
April 25, 2019
02:00 PM PT
Issue using PXE to start a device from WDS
There may be issues using the Preboot Execution Environment (PXE) to start a device from a Windows Deployment Services (WDS) server configured to use Variable Window Extension.

See details >March 12, 2019
KB4489891Mitigated
April 25, 2019
02:00 PM PT
System unresponsive after restart if Sophos Endpoint Protection installed
Devices with Sophos Endpoint Protection installed and managed by Sophos Central or Sophos Enterprise Console (SEC) may become unresponsive upon restart.

See details >April 09, 2019
KB4493451Mitigated
April 25, 2019
02:00 PM PT -<<<<<<< HEAD
Certain operations performed on a Cluster Shared Volume may fail
Certain operations, such as rename, performed on files or folders on a Cluster Shared Volume (CSV) may fail with the error, “STATUS_BAD_IMPERSONATION_LEVEL (0xC00000A5)”.

See details >January 08, 2019
KB4480975Mitigated
April 25, 2019
02:00 PM PT -======= -
Certain operations performed on a Cluster Shared Volume may fail
Certain operations, such as rename, performed on files or folders on a Cluster Shared Volume (CSV) may fail with the error, “STATUS_BAD_IMPERSONATION_LEVEL (0xC00000A5)”.

See details >January 08, 2019
KB4480975Mitigated
January 08, 2019
10:00 AM PT ->>>>>>> master
Internet Explorer 11 authentication issue with multiple concurrent logons
Internet Explorer 11 users may encounter issues if two or more people use the same user account for multiple, concurrent login sessions on the same Windows Server machine.

See details >January 08, 2019
KB4480975Resolved
KB4493451April 09, 2019
10:00 AM PT
MSXML6 may cause applications to stop responding
MSXML6 may cause applications to stop responding if an exception was thrown during node operations, such as appendChild(), insertBefore(), and moveNode().

See details >January 08, 2019
KB4480975Resolved
KB4493451April 09, 2019
10:00 AM PT
Embedded objects may display incorrectly
Any compound document (OLE) server application that places embedded objects into the Windows Metafile (WMF) using the PatBlt API may display embedded objects incorrectly.

See details >February 12, 2019
KB4487025Resolved
KB4493451April 09, 2019
10:00 AM PT @@ -115,11 +111,7 @@ sections: - type: markdown text: " -<<<<<<< HEAD -======= - ->>>>>>> master
DetailsOriginating updateStatusHistory
Certain operations performed on a Cluster Shared Volume may fail
Certain operations, such as rename, that you perform on files or folders that are on a Cluster Shared Volume (CSV) may fail with the error, \"STATUS_BAD_IMPERSONATION_LEVEL (0xC00000A5)\". This occurs when you perform the operation on a CSV owner node from a process that doesn’t have administrator privilege.

Affected platforms: 
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10, version 1607; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 10 Enterprise LTSB 2015; Windows 8.1
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2; Windows Server 2012
Workaround: Do one of the following:
  • Perform the operation from a process that has administrator privilege.
  • Perform the operation from a node that doesn’t have CSV ownership.
Next steps: Microsoft is working on a resolution and will provide an update in an upcoming release.

Back to top
January 08, 2019
KB4480975
Mitigated
Last updated:
April 25, 2019
02:00 PM PT

Opened:
January 08, 2019
10:00 AM PT
Certain operations performed on a Cluster Shared Volume may fail
Certain operations, such as rename, that you perform on files or folders that are on a Cluster Shared Volume (CSV) may fail with the error, \"STATUS_BAD_IMPERSONATION_LEVEL (0xC00000A5)\". This occurs when you perform the operation on a CSV owner node from a process that doesn’t have administrator privilege.

Affected platforms: 
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10, version 1607; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 10 Enterprise LTSB 2015; Windows 8.1
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2; Windows Server 2012
Workaround: Do one of the following:
  • Perform the operation from a process that has administrator privilege.
  • Perform the operation from a node that doesn’t have CSV ownership.
Next steps: Microsoft is working on a resolution and will provide an update in an upcoming release.

Back to top
January 08, 2019
KB4480975
Mitigated
Last updated:
January 08, 2019
10:00 AM PT

Opened:
January 08, 2019
10:00 AM PT
Internet Explorer 11 authentication issue with multiple concurrent logons
After installing KB4480975, Internet Explorer 11 and other applications that use WININET.DLL may have authentication issues. This occurs when two or more people use the same user account for multiple, concurrent login sessions on the same Windows Server machine, including Remote Desktop Protocol (RDP) and Terminal Server logons. Symptoms reported by customers include, but may not be limited to:
  • Cache size and location show zero or empty.
  • Keyboard shortcuts may not work properly.
  • Webpages may intermittently fail to load or render correctly.
  • Issues with credential prompts.
  • Issues when downloading files.
Affected platforms: 
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1607; Windows 10 Enterprise LTSC 2016; Windows 8.1; Windows 7 SP1
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server 2016; Windows Server 2012 R2; Windows Server 2012; Windows Server 2008 R2 SP1
Resolution: This issue is resolved in KB4493451.

Back to top
January 08, 2019
KB4480975
Resolved
KB4493451
Resolved:
April 09, 2019
10:00 AM PT

Opened:
January 08, 2019
10:00 AM PT
MSXML6 may cause applications to stop responding
After installing KB4480975, MSXML6 causes applications to stop responding if an exception was thrown during node operations, such as appendChild(), insertBefore(), and moveNode().

The Group Policy editor may stop responding when editing a Group Policy Object (GPO) that contains Group Policy Preferences (GPP) for Internet Explorer 10 settings.

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10, version 1607; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 10 Enterprise LTSB 2015; Windows 8.1
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2; Windows Server 2012
Resolution: This issue is resolved in KB4493451.

Back to top
January 08, 2019
KB4480975
Resolved
KB4493451
Resolved:
April 09, 2019
10:00 AM PT

Opened:
January 08, 2019
10:00 AM PT
From d6e9845c2f0051758fab9f25c0f97565a7a87c93 Mon Sep 17 00:00:00 2001 From: Jose Ortega Date: Tue, 30 Apr 2019 01:04:38 -0500 Subject: [PATCH 248/724] update logging section #3050 --- .../windows-defender-smartscreen-overview.md | 16 ++++++++++++++++ 1 file changed, 16 insertions(+) diff --git a/windows/security/threat-protection/windows-defender-smartscreen/windows-defender-smartscreen-overview.md b/windows/security/threat-protection/windows-defender-smartscreen/windows-defender-smartscreen-overview.md index 00899f714f..0f7b20d9d7 100644 --- a/windows/security/threat-protection/windows-defender-smartscreen/windows-defender-smartscreen-overview.md +++ b/windows/security/threat-protection/windows-defender-smartscreen/windows-defender-smartscreen-overview.md @@ -50,6 +50,20 @@ Windows Defender SmartScreen helps to provide an early warning system against we ## Viewing Windows Defender SmartScreen anti-phishing events When Windows Defender SmartScreen warns or blocks an employee from a website, it's logged as [Event 1035 - Anti-Phishing](https://technet.microsoft.com/scriptcenter/dd565657(v=msdn.10).aspx). + +## Viewing Windows event logs for SmartScreen +SmartScreen also have it's own events Ids on the "Microsoft-Windows-SmartScreen/Debug" + + +|EventID | Description | +| :---: | :---: | +|1000 | Application SmartScreen Event| +|1001 | Uri SmartScreen Event| +|1002 | User Decision SmartScreen Event| + +>[!IMPORTANT] +> This log is not enabled by default: Microsoft-Windows-SmartScreen/Debug, an required an MDM Policy to enable it. + ## Related topics - [SmartScreen Frequently Asked Questions (FAQ)](https://feedback.smartscreen.microsoft.com/smartscreenfaq.aspx) @@ -57,5 +71,7 @@ When Windows Defender SmartScreen warns or blocks an employee from a website, it - [Threat protection](../index.md) +- [Available Windows Defender SmartScreen Group Policy and mobile device management (MDM) settings](https://docs.microsoft.com/en-us/windows/security/threat-protection/windows-defender-smartscreen/windows-defender-smartscreen-available-settings) + >[!NOTE] >Help to make this topic better by providing us with edits, additions, and feedback. For info about how to contribute to this topic, see [Contributing to TechNet content](https://github.com/Microsoft/windows-itpro-docs/blob/master/CONTRIBUTING.md). \ No newline at end of file From 1e86197c4bfcb17939094546a921d98c89740eb3 Mon Sep 17 00:00:00 2001 From: "Nisha Mittal (Wipro Ltd.)" Date: Mon, 29 Apr 2019 23:46:02 -0700 Subject: [PATCH 249/724] Fixed Merge Issues from Master --- .../resolved-issues-windows-10-1507.yml | 9 --------- .../resolved-issues-windows-10-1607.yml | 9 --------- windows/release-information/status-windows-10-1507.yml | 9 --------- 3 files changed, 27 deletions(-) diff --git a/windows/release-information/resolved-issues-windows-10-1507.yml b/windows/release-information/resolved-issues-windows-10-1507.yml index 8a5fe18b13..8bc1336ec1 100644 --- a/windows/release-information/resolved-issues-windows-10-1507.yml +++ b/windows/release-information/resolved-issues-windows-10-1507.yml @@ -53,15 +53,6 @@ sections:
" -- title: April 2019 -- items: - - type: markdown - text: " - - -
DetailsOriginating updateStatusHistory
Embedded objects may display incorrectly
Any compound document (OLE) server application that places embedded objects into the Windows Metafile (WMF) using the PatBlt API may display embedded objects incorrectly. 
 
For example, if you paste a Microsoft Excel worksheet object into a Microsoft Word document, the cells may render with a different background color. 
 
Affected platforms:  
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10, version 1607; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 10 Enterprise LTSB 2015; Windows 8.1; Windows 7 SP1 
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2; Windows Server 2012; Windows Server 2008 R2 SP1; Windows Server 2008 SP2 
Resolution: This issue is resolved in KB4493475

Back to top
OS Build 10240.18132

February 12, 2019
KB4487018
Resolved
KB4493475
Resolved:
April 09, 2019
10:00 AM PT

Opened:
April 29, 2019
12:45 AM PT
- " - - title: March 2019 - items: - type: markdown diff --git a/windows/release-information/resolved-issues-windows-10-1607.yml b/windows/release-information/resolved-issues-windows-10-1607.yml index 55ae2e2749..b34d0a46a7 100644 --- a/windows/release-information/resolved-issues-windows-10-1607.yml +++ b/windows/release-information/resolved-issues-windows-10-1607.yml @@ -60,15 +60,6 @@ sections:
" -- title: April 2019 -- items: - - type: markdown - text: " - - -
DetailsOriginating updateStatusHistory
Embedded objects may display incorrectly
Any compound document (OLE) server application that places embedded objects into the Windows Metafile (WMF) using the PatBlt API may display embedded objects incorrectly. 
 
For example, if you paste a Microsoft Excel worksheet object into a Microsoft Word document, the cells may render with a different background color. 
 
Affected platforms:  
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10, version 1607; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 10 Enterprise LTSB 2015; Windows 8.1; Windows 7 SP1 
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2; Windows Server 2012; Windows Server 2008 R2 SP1; Windows Server 2008 SP2 
Resolution: This issue is resolved in KB4493470

Back to top
OS Build 14393.2791

February 12, 2019
KB4487026
Resolved
KB4493470
Resolved:
April 09, 2019
10:00 AM PT

Opened:
April 29, 2019
12:43 AM PT
- " - - title: March 2019 - items: - type: markdown diff --git a/windows/release-information/status-windows-10-1507.yml b/windows/release-information/status-windows-10-1507.yml index 4ca52dfab9..0a9bcbadc7 100644 --- a/windows/release-information/status-windows-10-1507.yml +++ b/windows/release-information/status-windows-10-1507.yml @@ -74,15 +74,6 @@ sections:
" -- title: April 2019 -- items: - - type: markdown - text: " - - -
DetailsOriginating updateStatusHistory
Embedded objects may display incorrectly
Any compound document (OLE) server application that places embedded objects into the Windows Metafile (WMF) using the PatBlt API may display embedded objects incorrectly. 
 
For example, if you paste a Microsoft Excel worksheet object into a Microsoft Word document, the cells may render with a different background color. 
 
Affected platforms:  
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10, version 1607; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 10 Enterprise LTSB 2015; Windows 8.1; Windows 7 SP1 
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2; Windows Server 2012; Windows Server 2008 R2 SP1; Windows Server 2008 SP2 
Resolution: This issue is resolved in KB4493475

Back to top
OS Build 10240.18132

February 12, 2019
KB4487018
Resolved
KB4493475
Resolved:
April 09, 2019
10:00 AM PT

Opened:
April 29, 2019
12:45 AM PT
- " - - title: March 2019 - items: - type: markdown From c926b335cf2e035afca3c14c9e28a4810155a9d6 Mon Sep 17 00:00:00 2001 From: Reece Peacock <49645174+Reeced40@users.noreply.github.com> Date: Tue, 30 Apr 2019 11:43:40 +0200 Subject: [PATCH 250/724] Update configure-server-endpoints-windows-defender-advanced-threat-protection.md Fixed the screenshot. --- ...-endpoints-windows-defender-advanced-threat-protection.md | 5 +++-- 1 file changed, 3 insertions(+), 2 deletions(-) diff --git a/windows/security/threat-protection/windows-defender-atp/configure-server-endpoints-windows-defender-advanced-threat-protection.md b/windows/security/threat-protection/windows-defender-atp/configure-server-endpoints-windows-defender-advanced-threat-protection.md index 03df5ce551..79496fd118 100644 --- a/windows/security/threat-protection/windows-defender-atp/configure-server-endpoints-windows-defender-advanced-threat-protection.md +++ b/windows/security/threat-protection/windows-defender-atp/configure-server-endpoints-windows-defender-advanced-threat-protection.md @@ -67,7 +67,8 @@ You'll need to tak the following steps if you choose to onboard servers through >This step is required only if your organization uses System Center Endpoint Protection (SCEP) and you're onboarding Windows Server 2012 R2. - Turn on server monitoring from Windows Defender Security Center. -- If you're already leveraging System Center Operations Manager (SCOM) or Azure Monitor (formerly known as Operations Management Suite (OMS)), simply attach the Microsoft Monitoring Agent (MMA) to report to your Windows Defender ATP workspace through Multi Homing support. Otherwise, install and configure MMA to report sensor data to Windows Defender ATP as instructed below. For more information, see [Collect log data with Azure Log Analytics agent](https://docs.microsoft.com/azure/azure-monitor/platform/log-analytics-agent). +- If you're already leveraging System Center Operations Manager (SCOM) or Azure Monitor (formerly known as Operations Management Suite (OMS)), simply attach the Microsoft Monitoring Agent (MMA) to report to your Windows Defender ATP workspace through Multi Homing support. Otherwise, install and configure MMA to report sensor data to Windows Defender ATP as instructed below. For more information, see [Collect log data with Azure Log Analytics agent](https://docs.microsoft.com/azure/azure-monitor/platform/log-analytics-agent). + >[!TIP] > After onboarding the machine, you can choose to run a detection test to verify that it is properly onboarded to the service. For more information, see [Run a detection test on a newly onboarded Windows Defender ATP endpoint](run-detection-test-windows-defender-advanced-threat-protection.md). @@ -217,7 +218,7 @@ To offboard the server, you can use either of the following methods: b. Select **Windows Server 2012 R2 and 2016** as the operating system and get your Workspace ID: - ![Image of server onboarding](images/atp-server-offboarding-workspaceid.png) + ![Image of server onboarding](images/atp-server-offboarding-workspaceid.png) 2. Open an elevated PowerShell and run the following command. Use the Workspace ID you obtained and replacing `WorkspaceID`: From b493cec836c7b3b70c8a0ee052d4fb08304e38ff Mon Sep 17 00:00:00 2001 From: Jiying Ren Date: Tue, 30 Apr 2019 08:16:39 -0700 Subject: [PATCH 251/724] Remove the bgcolor which doesn't work well under dark theme --- .../resolved-issues-windows-10-1507.yml | 12 ++++++------ .../resolved-issues-windows-10-1607.yml | 16 ++++++++-------- .../resolved-issues-windows-10-1703.yml | 12 ++++++------ .../resolved-issues-windows-10-1709.yml | 12 ++++++------ .../resolved-issues-windows-10-1803.yml | 18 +++++++++--------- ...windows-10-1809-and-windows-server-2019.yml | 14 +++++++------- ...indows-7-and-windows-server-2008-r2-sp1.yml | 12 ++++++------ ...-windows-8.1-and-windows-server-2012-r2.yml | 12 ++++++------ ...resolved-issues-windows-server-2008-sp2.yml | 10 +++++----- .../resolved-issues-windows-server-2012.yml | 10 +++++----- .../status-windows-10-1507.yml | 8 ++++---- ...windows-10-1607-and-windows-server-2016.yml | 12 ++++++------ .../status-windows-10-1703.yml | 8 ++++---- .../status-windows-10-1709.yml | 10 +++++----- .../status-windows-10-1803.yml | 10 +++++----- ...windows-10-1809-and-windows-server-2019.yml | 12 ++++++------ ...indows-7-and-windows-server-2008-r2-sp1.yml | 10 +++++----- ...-windows-8.1-and-windows-server-2012-r2.yml | 10 +++++----- .../status-windows-server-2008-sp2.yml | 8 ++++---- .../status-windows-server-2012.yml | 10 +++++----- .../windows-message-center.yml | 2 +- 21 files changed, 114 insertions(+), 114 deletions(-) diff --git a/windows/release-information/resolved-issues-windows-10-1507.yml b/windows/release-information/resolved-issues-windows-10-1507.yml index 8bc1336ec1..380ff97270 100644 --- a/windows/release-information/resolved-issues-windows-10-1507.yml +++ b/windows/release-information/resolved-issues-windows-10-1507.yml @@ -31,7 +31,7 @@ sections: - items: - type: markdown text: " - +
SummaryOriginating updateStatusDate resolved
@@ -57,7 +57,7 @@ sections: - items: - type: markdown text: " -
SummaryOriginating updateStatusDate resolved
MSXML6 may cause applications to stop responding
MSXML6 may cause applications to stop responding if an exception was thrown during node operations, such as appendChild(), insertBefore(), and moveNode().

See details >
OS Build 10240.18094

January 08, 2019
KB4480962
Resolved
KB4493475
April 09, 2019
10:00 AM PT
Custom URI schemes may not start corresponding application
Custom URI schemes for application protocol handlers may not start the corresponding application for local intranet and trusted sites in Internet Explorer.

See details >
OS Build 10240.18158

March 12, 2019
KB4489872
Resolved
KB4493475
April 09, 2019
10:00 AM PT
Embedded objects may display incorrectly
Any compound document (OLE) server application that places embedded objects into the Windows Metafile (WMF) using the PatBlt API may display embedded objects incorrectly.

See details >
OS Build 10240.18132

February 12, 2019
KB4487018
Resolved
KB4493475
April 09, 2019
10:00 AM PT
+
DetailsOriginating updateStatusHistory
DetailsOriginating updateStatusHistory
Custom URI schemes may not start corresponding application
After installing KB4489872, Custom URI Schemes for Application Protocol handlers may not start the corresponding application for local intranet and trusted sites on Internet Explorer.

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10, version 1607; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 10 Enterprise LTSB 2015; Windows 8.1; Windows 7 SP1 
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2; Windows Server 2008 R2 SP1
Resolution: This issue was resolved in KB4493475.

Back to top
OS Build 10240.18158

March 12, 2019
KB4489872
Resolved
KB4493475
Resolved:
April 09, 2019
10:00 AM PT

Opened:
March 12, 2019
10:00 AM PT
" @@ -66,7 +66,7 @@ sections: - items: - type: markdown text: " - +
DetailsOriginating updateStatusHistory
@@ -79,7 +79,7 @@ sections: - items: - type: markdown text: " -
DetailsOriginating updateStatusHistory
Embedded objects may display incorrectly
Any compound document (OLE) server application that places embedded objects into the Windows Metafile (WMF) using the PatBlt API may display embedded objects incorrectly. 
 
For example, if you paste a Microsoft Excel worksheet object into a Microsoft Word document, the cells may render with a different background color. 
 
Affected platforms:  
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10, version 1607; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 10 Enterprise LTSB 2015; Windows 8.1; Windows 7 SP1
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2; Windows Server 2012; Windows Server 2008 R2 SP1; Windows Server 2008 SP2 
Resolution: This issue is resolved in KB4493475

Back to top
OS Build 10240.18132

February 12, 2019
KB4487018
Resolved
KB4493475
Resolved:
April 09, 2019
10:00 AM PT

Opened:
February 12, 2019
10:00 AM PT
Applications using Microsoft Jet database and Access 95 file format stop working
Applications that use a Microsoft Jet database with the Microsoft Access 95 file format may randomly stop working.

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10, version 1607; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 10 Enterprise LTSB 2015; Windows 7 SP1
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012; Windows Server 2008 R2 SP1; Windows Server 2008 SP2
Resolution: This issue is resolved in KB4489872.

Back to top
OS Build 10240.18132

February 12, 2019
KB4487018
Resolved
KB4489872
Resolved:
March 12, 2019
10:00 AM PT

Opened:
February 12, 2019
10:00 AM PT
Error 1309 when installing/uninstalling MSI or MSP files
After installing KB4487018, users may receive “Error 1309” while installing or uninstalling certain types of MSI and MSP files.

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10, version 1607; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 10 Enterprise LTSB 2015; Windows 8.1
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2; Windows Server 2012
Resolution: This issue is resolved in KB4489872.

Back to top
OS Build 10240.18132

February 12, 2019
KB4487018
Resolved
KB4489872
Resolved:
March 12, 2019
10:00 AM PT

Opened:
February 12, 2019
10:00 AM PT
+
DetailsOriginating updateStatusHistory
@@ -90,7 +90,7 @@ sections: - items: - type: markdown text: " -
DetailsOriginating updateStatusHistory
MSXML6 may cause applications to stop responding
After installing KB4480962, MSXML6 causes applications to stop responding if an exception was thrown during node operations, such as appendChild(), insertBefore(), and moveNode().

The Group Policy editor may stop responding when editing a Group Policy Object (GPO) that contains Group Policy Preferences (GPP) for Internet Explorer 10 settings.

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10, version 1607; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 10 Enterprise LTSB 2015; Windows 8.1
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2; Windows Server 2012
Resolution: This issue was resolved in KB4493475.

Back to top
OS Build 10240.18094

January 08, 2019
KB4480962
Resolved
KB4493475
Resolved:
April 09, 2019
10:00 AM PT

Opened:
January 08, 2019
10:00 AM PT
Applications using Microsoft Jet database fail to open
Applications that use a Microsoft Jet database with the Microsoft Access 97 file format may fail to open if the database has column names greater than 32 characters. The database will fail to open with the error, \"Unrecognized Database Format\".

Affected platforms:
  • Client: Windows 10, version 1709; Windows 10, version 1703; Windows 10, version 1607; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 10 Enterprise LTSB 2015; Windows 8.1; Windows 7 SP1
  • Server: Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2; Windows Server 2012; Windows Server 2008 R2 SP1; Windows Server 2008 SP2
Resolution: This issue is resolved in KB4487018.

Back to top
OS Build 10240.18094

January 08, 2019
KB4480962
Resolved
KB4487018
Resolved:
February 12, 2019
10:00 AM PT

Opened:
January 08, 2019
10:00 AM PT
Unable to access hotspots with third-party applications
After installing KB4480962, third-party applications may have difficulty authenticating hotspots.

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10, version 1607; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 10 Enterprise LTSB 2015; Windows 8.1
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2; Windows Server 2012
Resolution: This issue is resolved in KB4487018.

Back to top
OS Build 10240.18094

January 08, 2019
KB4480962
Resolved
KB4487018
Resolved:
February 12, 2019
10:00 AM PT

Opened:
January 08, 2019
10:00 AM PT
+
DetailsOriginating updateStatusHistory
DetailsOriginating updateStatusHistory
Unable to use Seek bar in Windows Media Player
After installing KB4462922, users may not be able to use the Seek bar in Windows Media Player when playing specific files. This issue does not affect normal playback.

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10, version 1607; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 10 Enterprise LTSB 2015; Windows 8.1; Windows 7 SP1
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2; Windows Server 2012; Windows Server 2008 R2 SP1; Windows Server 2008 SP2
Resolution: This issue is resolved in KB4471323.

Back to top
OS Build 10240.18005

October 09, 2018
KB4462922
Resolved
KB4471323
Resolved:
December 11, 2018
10:00 AM PT

Opened:
October 09, 2018
10:00 AM PT
" @@ -99,7 +99,7 @@ sections: - items: - type: markdown text: " - +
DetailsOriginating updateStatusHistory
DetailsOriginating updateStatusHistory
Guest VMs running Unicast NLB fail to respond after restart
All guest virtual machines running Unicast NLB fail to respond to NLB requests after the virtual machines restart.

Affected platforms:
  • Client: Windows 10, version 1803; Windows 10, version 1507; Windows 10 Enterprise LTSB 2015
  • Server: Windows Server, version 1803
Resolution: This issue is resolved in KB4462922.

Back to top
OS Build 10240.17976

September 11, 2018
KB4457132
Resolved
KB4462922
Resolved:
October 09, 2018
10:00 AM PT

Opened:
September 11, 2018
10:00 AM PT
" diff --git a/windows/release-information/resolved-issues-windows-10-1607.yml b/windows/release-information/resolved-issues-windows-10-1607.yml index b34d0a46a7..72407b6ba9 100644 --- a/windows/release-information/resolved-issues-windows-10-1607.yml +++ b/windows/release-information/resolved-issues-windows-10-1607.yml @@ -31,7 +31,7 @@ sections: - items: - type: markdown text: " - +
SummaryOriginating updateStatusDate resolved
@@ -64,7 +64,7 @@ sections: - items: - type: markdown text: " -
SummaryOriginating updateStatusDate resolved
Custom URI schemes may not start corresponding application
Custom URI schemes for application protocol handlers may not start the corresponding application for local intranet and trusted sites in Internet Explorer.

See details >
OS Build 14393.2848

March 12, 2019
KB4489882
Resolved
KB4493473
April 25, 2019
02:00 PM PT
End-user-defined characters (EUDC) may cause blue screen at startup
If you enable per font end-user-defined characters (EUDC), the system will stop working and a blue screen may appear at startup.

See details >
OS Build 14393.2879

March 19, 2019
KB4489889
Resolved
KB4493470
April 09, 2019
10:00 AM PT
Internet Explorer 11 authentication issue with multiple concurrent logons
Internet Explorer 11 users may encounter issues if two or more people use the same user account for multiple, concurrent login sessions on the same Windows Server machine.

See details >
OS Build 14393.2724

January 08, 2019
KB4480961
Resolved
KB4493470
April 09, 2019
10:00 AM PT
+
DetailsOriginating updateStatusHistory
DetailsOriginating updateStatusHistory
Custom URI schemes may not start corresponding application
After installing KB4489882, Custom URI schemes for application protocol handlers may not start the corresponding application for local intranet and trusted sites security zones on Internet Explorer.

Affected platforms: 
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10, version 1607; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 10 Enterprise LTSB 2015; Windows 8.1; Windows 7 SP1 
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2; Windows Server 2008 R2 SP1
Resolution: This issue is resolved in KB4493473

Back to top
OS Build 14393.2848

March 12, 2019
KB4489882
Resolved
KB4493473
Resolved:
April 25, 2019
02:00 PM PT

Opened:
March 12, 2019
10:00 AM PT
End-user-defined characters (EUDC) may cause blue screen at startup
If you enable per font end-user-defined characters (EUDC), the system will stop working and a blue screen may appear at startup. This is not a common setting in non-Asian regions.

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10, version 1607; Windows 10 Enterprise LTSC 2016
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016
Resolution: This issue was resolved in KB4493470.

Back to top
OS Build 14393.2879

March 19, 2019
KB4489889
Resolved
KB4493470
Resolved:
April 09, 2019
10:00 AM PT

Opened:
March 19, 2019
10:00 AM PT
@@ -74,7 +74,7 @@ sections: - items: - type: markdown text: " - +
DetailsOriginating updateStatusHistory
@@ -87,7 +87,7 @@ sections: - items: - type: markdown text: " -
DetailsOriginating updateStatusHistory
Embedded objects may display incorrectly
Any compound document (OLE) server application that places embedded objects into the Windows Metafile (WMF) using the PatBlt API may display embedded objects incorrectly. 
 
For example, if you paste a Microsoft Excel worksheet object into a Microsoft Word document, the cells may render with a different background color. 
 
Affected platforms:  
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10, version 1607; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 10 Enterprise LTSB 2015; Windows 8.1; Windows 7 SP1 
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2; Windows Server 2012; Windows Server 2008 R2 SP1; Windows Server 2008 SP2 
Resolution: This issue is resolved in KB4493470

Back to top
OS Build 14393.2791

February 12, 2019
KB4487026
Resolved
KB4493470
Resolved:
April 09, 2019
10:00 AM PT

Opened:
February 12, 2019
10:00 AM PT
Issue hosting multiple terminal server sessions and a user logs off on Windows Server
In some cases, Windows Server will stop working and restart when hosting multiple terminal server sessions and a user logs off. The faulting driver is win32kbase.sys.

Affected platforms:
  • Client: Windows 10, version 1607; Windows 10 Enterprise LTSC 2016
  • Server: Windows Server 2016
Resolution: This issue is resolved in KB4489882.

Back to top
OS Build 14393.2828

February 19, 2019
KB4487006
Resolved
KB4489882
Resolved:
March 12, 2019
10:00 AM PT

Opened:
February 19, 2019
02:00 PM PT
Error 1309 when installing/uninstalling MSI or MSP files
After installing KB4487026, users may receive “Error 1309” while installing or uninstalling certain types of MSI and MSP files.

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10, version 1607; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 10 Enterprise LTSB 2015; Windows 8.1
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2; Windows Server 2012
Resolution: This issue is resolved in KB4489882.

Back to top
OS Build 14393.2791

February 12, 2019
KB4487026
Resolved
KB4489882
Resolved:
March 12, 2019
10:00 AM PT

Opened:
February 12, 2019
10:00 AM PT
+
DetailsOriginating updateStatusHistory
@@ -100,7 +100,7 @@ sections: - items: - type: markdown text: " -
DetailsOriginating updateStatusHistory
Internet Explorer 11 authentication issue with multiple concurrent logons
After installing KB4480961, Internet Explorer 11 and other applications that use WININET.DLL may have authentication issues. This occurs when two or more people use the same user account for multiple, concurrent login sessions on the same Windows Server machine, including Remote Desktop Protocol (RDP) and Terminal Server logons. Symptoms reported by customers include, but may not be limited to:
  • Cache size and location show zero or empty.
  • Keyboard shortcuts may not work properly.
  • Webpages may intermittently fail to load or render correctly.
  • Issues with credential prompts.
  • Issues when downloading files.
Affected platforms: 
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1607; Windows 10 Enterprise LTSC 2016; Windows 8.1; Windows 7 SP1
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server 2016; Windows Server 2012 R2; Windows Server 2012; Windows Server 2008 R2 SP1
Resolution: This issue was resolved in KB4493470.

Back to top
OS Build 14393.2724

January 08, 2019
KB4480961
Resolved
KB4493470
Resolved:
April 09, 2019
10:00 AM PT

Opened:
January 08, 2019
10:00 AM PT
MSXML6 may cause applications to stop responding
After installing KB4480961, MSXML6 causes applications to stop responding if an exception was thrown during node operations, such as appendChild(), insertBefore(), and moveNode().

The Group Policy editor may stop responding when editing a Group Policy Object (GPO) that contains Group Policy Preferences (GPP) for Internet Explorer 10 settings.

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10, version 1607; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 10 Enterprise LTSB 2015; Windows 8.1
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2; Windows Server 2012
Resolution: This issue was resolved in KB4493470.

Back to top
OS Build 14393.2724

January 08, 2019
KB4480961
Resolved
KB4493470
Resolved:
April 09, 2019
10:00 AM PT

Opened:
January 08, 2019
10:00 AM PT
First character of the Japanese era name not recognized as an abbreviation
After installing KB4480977, the first character of the Japanese era name is not recognized as an abbreviation and may cause date parsing issues.

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10, version 1607; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 10 Enterprise LTSB 2015; Windows 8.1; Windows 7 SP1
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2; Windows Server 2012; Windows Server 2008 R2 SP1; Windows Server 2008 SP2
Resolution: This issue is resolved in KB4487006.

Back to top
OS Build 14393.2759

January 17, 2019
KB4480977
Resolved
KB4487006
Resolved:
February 19, 2019
02:00 PM PT

Opened:
January 17, 2019
02:00 PM PT
+
DetailsOriginating updateStatusHistory
DetailsOriginating updateStatusHistory
Instant search in Microsoft Outlook fails on Windows Server 2016
After installing KB4467684 on Windows Server 2016, instant search in Microsoft Outlook clients fail with the error, \"Outlook cannot perform the search\".

Affected platforms:
  • Client: Windows 10, version 1607; Windows 10 Enterprise LTSC 2016
  • Server: Windows Server 2016
Resolution: This issue is resolved in KB4487026.

Back to top
OS Build 14393.2639

November 27, 2018
KB4467684
Resolved
KB4487026
Resolved:
February 12, 2019
10:00 AM PT

Opened:
November 27, 2018
10:00 AM PT
System becomes unresponsive when end-user-defined characters (EUDC) are used
When features related to end-user-defined characters (EUDC) are used, the entire system may become unresponsive. 

Affected platforms:
  • Client: Windows 10, version 1607; Windows 10 Enterprise LTSC 2016
  • Server: Windows Server 2016
Resolution: This issue is resolved in KB4471321

Back to top
OS Build 14393.2639

November 27, 2018
KB4467684
Resolved
KB4471321
Resolved:
December 11, 2018
10:00 AM PT

Opened:
November 27, 2018
10:00 AM PT
@@ -110,7 +110,7 @@ sections: - items: - type: markdown text: " - +
DetailsOriginating updateStatusHistory
DetailsOriginating updateStatusHistory
Unable to use Seek bar in Windows Media Player
After installing KB4462917, users may not be able to use the Seek bar in Windows Media Player when playing specific files. This issue does not affect normal playback.

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10, version 1607; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 10 Enterprise LTSB 2015; Windows 8.1; Windows 7 SP1
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2; Windows Server 2012; Windows Server 2008 R2 SP1; Windows Server 2008 SP2
Resolution: This issue is resolved in KB4471321.

Back to top
OS Build 14393.2551

October 09, 2018
KB4462917
Resolved
KB4471321
Resolved:
December 11, 2018
10:00 AM PT

Opened:
October 09, 2018
10:00 AM PT
" @@ -119,7 +119,7 @@ sections: - items: - type: markdown text: " - +
DetailsOriginating updateStatusHistory
DetailsOriginating updateStatusHistory
Promotions that create non-root domains fail with optional features enabled
After installing KB4457127, Windows Server 2016 promotions that create non-root domains fail in forests in which optional features like Active Directory recycle have been enabled. The error is, “The replication operation encountered a database error.”

Affected platforms:
  • Server: Windows Server 2016
Resolution: This issue is resolved in KB4467684.

Back to top
OS Build 14393.2515

September 20, 2018
KB4457127
Resolved
KB4467684
Resolved:
November 27, 2018
10:00 AM PT

Opened:
September 20, 2018
10:00 AM PT
" @@ -128,7 +128,7 @@ sections: - items: - type: markdown text: " - +
DetailsOriginating updateStatusHistory
DetailsOriginating updateStatusHistory
SqlConnection instantiation exception on .NET 4.6 and later
After you install the August Preview of Quality Rollup or September 11, 2018 .NET Framework update, instantiation of SqlConnection can throw an exception.

For more information about this issue, see the following article in the Microsoft Knowledge Base: 4470809, SqlConnection instantiation exception on .NET 4.6 and later after August-September 2018 .NET Framework updates.

Affected platforms:
  • Client: Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10, version 1607; Windows 10 Enterprise LTSC 2016
  • Server: Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016
Resolution: This issue is resolved in KB4480977.

Back to top
OS Build 14393.2457

August 30, 2018
KB4343884
Resolved
KB4480977
Resolved:
January 17, 2019
02:00 PM PT

Opened:
August 30, 2018
05:00 PM PT
Issues with install and activation of Key Management Service (KMS) (CSVLK) host keys
After installing KB4343884, installation and client activation of Windows Server 2019 and Windows 10 Enterprise 2019 LTSC Key Management Service (KMS) CSVLK host keys do not work as expected.

Affected platforms:
  • Client: Windows 10, version 1607; Windows 10 Enterprise LTSC 2016
  • Server: Windows Server 2016
Resolution: This issue is resolved in KB4467684.

Back to top
OS Build 14393.2457

August 30, 2018
KB4343884
Resolved
KB4467684
Resolved:
November 27, 2018
10:00 AM PT

Opened:
August 30, 2018
05:00 PM PT
diff --git a/windows/release-information/resolved-issues-windows-10-1703.yml b/windows/release-information/resolved-issues-windows-10-1703.yml index f92d1ca1e6..a32bfe383c 100644 --- a/windows/release-information/resolved-issues-windows-10-1703.yml +++ b/windows/release-information/resolved-issues-windows-10-1703.yml @@ -31,7 +31,7 @@ sections: - items: - type: markdown text: " - +
SummaryOriginating updateStatusDate resolved
@@ -61,7 +61,7 @@ sections: - items: - type: markdown text: " -
SummaryOriginating updateStatusDate resolved
Custom URI schemes may not start corresponding application
Custom URI schemes for application protocol handlers may not start the corresponding application for local intranet and trusted sites in Internet Explorer.

See details >
OS Build 15063.1689

March 12, 2019
KB4489871
Resolved
KB4493436
April 25, 2019
02:00 PM PT
End-user-defined characters (EUDC) may cause blue screen at startup
If you enable per font end-user-defined characters (EUDC), the system may stop working and a blue screen may appear at startup.

See details >
OS Build 15063.1716

March 19, 2019
KB4489888
Resolved
KB4493474
April 09, 2019
10:00 AM PT
MSXML6 may cause applications to stop responding
MSXML6 may cause applications to stop responding if an exception was thrown during node operations, such as appendChild(), insertBefore(), and moveNode().

See details >
OS Build 15063.1563

January 08, 2019
KB4480973
Resolved
KB4493474
April 09, 2019
10:00 AM PT
+
DetailsOriginating updateStatusHistory
DetailsOriginating updateStatusHistory
Custom URI schemes may not start corresponding application
After installing KB4489871, custom URI schemes for application protocol handlers may not start the corresponding application for local intranet and trusted sites security zones on Internet Explorer.

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10, version 1607; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 10 Enterprise LTSB 2015; Windows 8.1; Windows 7 SP1 
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2; Windows Server 2008 R2 SP1
Resolution: This issue is resolved in KB4493436

Back to top
OS Build 15063.1689

March 12, 2019
KB4489871
Resolved
KB4493436
Resolved:
April 25, 2019
02:00 PM PT

Opened:
March 12, 2019
10:00 AM PT
End-user-defined characters (EUDC) may cause blue screen at startup
If you enable per font end-user-defined characters (EUDC), the system may stop working and a blue screen may appear at startup. This is not a common setting in non-Asian regions.

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10, version 1607; Windows 10 Enterprise LTSC 2016
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016
Resolution: This issue was resolved in KB4493474.

Back to top
OS Build 15063.1716

March 19, 2019
KB4489888
Resolved
KB4493474
Resolved:
April 09, 2019
10:00 AM PT

Opened:
March 19, 2019
10:00 AM PT
@@ -71,7 +71,7 @@ sections: - items: - type: markdown text: " - +
DetailsOriginating updateStatusHistory
@@ -83,7 +83,7 @@ sections: - items: - type: markdown text: " -
DetailsOriginating updateStatusHistory
Embedded objects may display incorrectly
Any compound document (OLE) server application that places embedded objects into the Windows Metafile (WMF) using the PatBlt API may display embedded objects incorrectly. 
 
For example, if you paste a Microsoft Excel worksheet object into a Microsoft Word document, the cells may render with a different background color. 
 
Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10, version 1607; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 10 Enterprise LTSB 2015; Windows 8.1; Windows 7 SP1 
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2; Windows Server 2012; Windows Server 2008 R2 SP1; Windows Server 2008 SP2 
Resolution: This issue is resolved in KB4493474

Back to top
OS Build 15063.1631

February 12, 2019
KB4487020
Resolved
KB4493474
Resolved:
April 09, 2019
10:00 AM PT

Opened:
February 12, 2019
10:00 AM PT
Error 1309 when installing/uninstalling MSI or MSP files
After installing KB4487011, users may receive “Error 1309” while installing or uninstalling certain types of MSI and MSP files.

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10, version 1607; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 10 Enterprise LTSB 2015; Windows 8.1
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2; Windows Server 2012
Resolution: This issue is resolved in KB4489871.

Back to top
OS Build 15063.1659

February 19, 2019
KB4487011
Resolved
KB4489871
Resolved:
March 12, 2019
10:00 AM PT

Opened:
February 19, 2019
02:00 PM PT
Internet Explorer may fail to load images
After installing KB4487020, Internet Explorer may fail to load images with a backslash (\\) in their relative source path.

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10, version 1607; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 10 Enterprise LTSB 2015; Windows 8.1; Windows 7 SP1
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2; Windows Server 2008 R2 SP1
Resolution: This issue is resolved in KB4487011.

Back to top
OS Build 15063.1631

February 12, 2019
KB4487020
Resolved
KB4487011
Resolved:
February 19, 2019
02:00 PM PT

Opened:
February 12, 2019
10:00 AM PT
+
DetailsOriginating updateStatusHistory
@@ -96,7 +96,7 @@ sections: - items: - type: markdown text: " -
DetailsOriginating updateStatusHistory
MSXML6 may cause applications to stop responding
After installing KB4480973, MSXML6 causes applications to stop responding if an exception was thrown during node operations, such as appendChild(), insertBefore(), and moveNode().

The Group Policy editor may stop responding when editing a Group Policy Object (GPO) that contains Group Policy Preferences (GPP) for Internet Explorer 10 settings.

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10, version 1607; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 10 Enterprise LTSB 2015; Windows 8.1
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2; Windows Server 2012
Resolution: This issue was resolved in KB4493474.

Back to top
OS Build 15063.1563

January 08, 2019
KB4480973
Resolved
KB4493474
Resolved:
April 09, 2019
10:00 AM PT

Opened:
January 08, 2019
10:00 AM PT
First character of the Japanese era name not recognized as an abbreviation
After installing KB4480959, the first character of the Japanese era name is not recognized as an abbreviation and may cause date parsing issues.

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10, version 1607; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 10 Enterprise LTSB 2015; Windows 8.1; Windows 7 SP1
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2; Windows Server 2012; Windows Server 2008 R2 SP1; Windows Server 2008 SP2
Resolution: This issue is resolved in KB4487011.

Back to top
OS Build 15063.1596

January 15, 2019
KB4480959
Resolved
KB4487011
Resolved:
February 19, 2019
02:00 PM PT

Opened:
January 15, 2019
10:00 AM PT
Applications using Microsoft Jet database fail to open
Applications that use a Microsoft Jet database with the Microsoft Access 97 file format may fail to open if the database has column names greater than 32 characters. The database will fail to open with the error, “Unrecognized Database Format”.

Affected platforms:
  • Client: Windows 10, version 1709; Windows 10, version 1703; Windows 10, version 1607; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 10 Enterprise LTSB 2015; Windows 8.1; Windows 7 SP1 
  • Server: Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2; Windows Server 2012; Windows Server 2008 R2 SP1; Windows Server 2008 SP2
Resolution: This issue is resolved in KB4487020.

Back to top
OS Build 15063.1563

January 08, 2019
KB4480973
Resolved
KB4487020
Resolved:
February 12, 2019
10:00 AM PT

Opened:
January 08, 2019
10:00 AM PT
+
DetailsOriginating updateStatusHistory
@@ -107,7 +107,7 @@ sections: - items: - type: markdown text: " -
DetailsOriginating updateStatusHistory
Unable to use Seek bar in Windows Media Player
After installing KB4462937, users may not be able to use the Seek bar in Windows Media Player when playing specific files. This issue does not affect normal playback.

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10, version 1607; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 10 Enterprise LTSB 2015; Windows 8.1; Windows 7 SP1
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2; Windows Server 2012; Windows Server 2008 R2 SP1; Windows Server 2008 SP2
Resolution: This issue is resolved in KB4471327.

Back to top
OS Build 15063.1387

October 09, 2018
KB4462937
Resolved
KB4471327
Resolved:
December 11, 2018
10:00 AM PT

Opened:
October 09, 2018
10:00 AM PT
LongonUI.exe stops working intermittently
After installing KB4462937, LogonUI.exe stops working intermittently.

Affected platforms:
  • Windows 10, version 1703
Resolution: This issue is resolved in KB4467699.

Back to top
OS Build 15063.1387

October 09, 2018
KB4462937
Resolved
KB4467699
Resolved:
November 27, 2018
10:00 AM PT

Opened:
October 09, 2018
10:00 AM PT
Error message beginning with “Hosted by…” when launching Microsoft Edge
After installing KB4462937, some users may see a dialog box with a non-applicable message beginning with the words “Hosted by...” when first starting Microsoft Edge.

This dialog will only appear once if they have turned on “Block only third-party cookies” in Microsoft Edge and applied certain language packs before installing this update.

Affected platforms:
  • Client: Windows 10, version 1709; Windows 10, version 1703
  • Server: Windows Server, version 1709
Resolution: This issue is resolved in KB4462939.

Back to top
OS Build 15063.1387

October 09, 2018
KB4462937
Resolved
KB4462939
Resolved:
October 18, 2018
10:00 AM PT

Opened:
October 09, 2018
10:00 AM PT
+
DetailsOriginating updateStatusHistory
DetailsOriginating updateStatusHistory
SqlConnection instantiation exception on .NET 4.6 and later
After you install the August Preview of Quality Rollup or September 11, 2018 .NET Framework update, instantiation of SqlConnection can throw an exception.

For more information about this issue, see the following article in the Microsoft Knowledge Base:
4470809 SqlConnection instantiation exception on .NET 4.6 and later after August-September 2018 .NET Framework updates.

Affected platforms:
  • Client: Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10, version 1607; Windows 10 Enterprise LTSC 2016
  • Server: Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016
Resolution: This issue is resolved in KB4480959.

Back to top
OS Build 15063.1292

August 30, 2018
KB4343889
Resolved
KB4480959
Resolved:
January 15, 2019
10:00 AM PT

Opened:
August 30, 2018
05:00 PM PT
" diff --git a/windows/release-information/resolved-issues-windows-10-1709.yml b/windows/release-information/resolved-issues-windows-10-1709.yml index aa110ad6b2..e030af13f9 100644 --- a/windows/release-information/resolved-issues-windows-10-1709.yml +++ b/windows/release-information/resolved-issues-windows-10-1709.yml @@ -31,7 +31,7 @@ sections: - items: - type: markdown text: " - +
SummaryOriginating updateStatusDate resolved
@@ -61,7 +61,7 @@ sections: - items: - type: markdown text: " -
SummaryOriginating updateStatusDate resolved
Custom URI schemes may not start corresponding application
Custom URI schemes for application protocol handlers may not start the corresponding application for local intranet and trusted sites in Internet Explorer.

See details >
OS Build 16299.1029

March 12, 2019
KB4489886
Resolved
KB4493440
April 25, 2019
02:00 PM PT
End-user-defined characters (EUDC) may cause blue screen at startup
If you enable per font end-user-defined characters (EUDC), the system may stop working and a blue screen may appear at startup.

See details >
OS Build 16299.1059

March 19, 2019
KB4489890
Resolved
KB4493441
April 09, 2019
10:00 AM PT
MSXML6 causes applications to stop responding if an exception was thrown
MSXML6 causes applications to stop responding if an exception was thrown during node operations, such as appendChild(), insertBefore(), and moveNode().

See details >
OS Build 16299.904

January 08, 2019
KB4480978
Resolved
KB4493441
April 09, 2019
10:00 AM PT
+
DetailsOriginating updateStatusHistory
@@ -72,7 +72,7 @@ sections: - items: - type: markdown text: " -
DetailsOriginating updateStatusHistory
Custom URI schemes may not start corresponding application
After installing KB4489886, custom URI schemes for application protocol handlers may not start the corresponding application for local intranet and trusted sites security zones on Internet Explorer.

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10, version 1607; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 10 Enterprise LTSB 2015; Windows 8.1; Windows 7 SP1 
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2; Windows Server 2008 R2 SP1
Resolution: This issue is resolved in KB4493440

Back to top
OS Build 16299.1029

March 12, 2019
KB4489886
Resolved
KB4493440
Resolved:
April 25, 2019
02:00 PM PT

Opened:
March 12, 2019
10:00 AM PT
End-user-defined characters (EUDC) may cause blue screen at startup
If you enable per font end-user-defined characters (EUDC), the system may stop working and a blue screen may appear at startup. This is not a common setting in non-Asian regions.

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10, version 1607; Windows 10 Enterprise LTSC 2016
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016
Resolution: This issue is resolved in KB4493441.

Back to top
OS Build 16299.1059

March 19, 2019
KB4489890
Resolved
KB4493441
Resolved:
April 09, 2019
10:00 AM PT

Opened:
March 19, 2019
10:00 AM PT
Stop error when attempting to start SSH from WSL
After applying KB4489886, a stop error occurs when attempting to start the Secure Shell (SSH) client program from Windows Subsystem for Linux (WSL) with agent forwarding enabled using a command line switch (ssh –A) or a configuration setting.

Affected platforms:
  • Client: Windows 10, version 1803; Windows 10, version 1709
  • Server: Windows Server, version 1803; Windows Server, version 1709
Resolution: This issue is resolved in KB4493441.

Back to top
OS Build 16299.1029

March 12, 2019
KB4489886
Resolved
KB4493441
Resolved:
April 09, 2019
10:00 AM PT

Opened:
March 12, 2019
10:00 AM PT
+
DetailsOriginating updateStatusHistory
@@ -84,7 +84,7 @@ sections: - items: - type: markdown text: " -
DetailsOriginating updateStatusHistory
Embedded objects may display incorrectly
Any compound document (OLE) server application that places embedded objects into the Windows Metafile (WMF) using the PatBlt API may display embedded objects incorrectly. 
 
For example, if you paste a Microsoft Excel worksheet object into a Microsoft Word document, the cells may render with a different background color. 
 
Affected platforms:  
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10, version 1607; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 10 Enterprise LTSB 2015; Windows 8.1; Windows 7 SP1 
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2; Windows Server 2012; Windows Server 2008 R2 SP1; Windows Server 2008 SP2 
Resolution: This issue is resolved in KB4493441

Back to top
OS Build 16299.967

February 12, 2019
KB4486996
Resolved
KB4493441
Resolved:
April 09, 2019
10:00 AM PT

Opened:
February 12, 2019
10:00 AM PT
Error 1309 when installing/uninstalling MSI or MSP files
After installing KB4486996, users may receive “Error 1309” while installing or uninstalling certain types of MSI and MSP files.

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10, version 1607; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 10 Enterprise LTSB 2015; Windows 8.1
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2; Windows Server 2012
Resolution: This issue is resolved in KB4489886.

Back to top
OS Build 16299.967

February 12, 2019
KB4486996
Resolved
KB4489886
Resolved:
March 12, 2019
10:00 AM PT

Opened:
February 12, 2019
10:00 AM PT
Applications using Microsoft Jet database and Access 95 file format stop working
Applications that use a Microsoft Jet database with the Microsoft Access 95 file format may randomly stop working.

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10, version 1607; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 10 Enterprise LTSB 2015; Windows 7 SP1
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012; Windows Server 2008 R2 SP1; Windows Server 2008 SP2
Resolution: This issue is resolved in KB4487021.

Back to top
OS Build 16299.967

February 12, 2019
KB4486996
Resolved
KB4487021
Resolved:
February 19, 2019
02:00 PM PT

Opened:
February 12, 2019
10:00 AM PT
+
DetailsOriginating updateStatusHistory
@@ -97,7 +97,7 @@ sections: - items: - type: markdown text: " -
DetailsOriginating updateStatusHistory
MSXML6 causes applications to stop responding if an exception was thrown
After installing KB4480978, MSXML6 causes applications to stop responding if an exception was thrown during node operations, such as appendChild(), insertBefore(), and moveNode().

The Group Policy editor may stop responding when editing a Group Policy Object (GPO) that contains Group Policy Preferences (GPP) for Internet Explorer 10 settings.

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10, version 1607; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 10 Enterprise LTSB 2015; Windows 8.1
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2; Windows Server 2012
Resolution: This issue is resolved in KB4493441.

Back to top
OS Build 16299.904

January 08, 2019
KB4480978
Resolved
KB4493441
Resolved:
April 09, 2019
10:00 AM PT

Opened:
January 08, 2019
10:00 AM PT
First character of the Japanese era name not recognized as an abbreviation
After installing KB4480967, the first character of the Japanese era name is not recognized as an abbreviation and may cause date parsing issues.

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10, version 1607; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 10 Enterprise LTSB 2015; Windows 8.1; Windows 7 SP1
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2; Windows Server 2012; Windows Server 2008 R2 SP1; Windows Server 2008 SP2
Resolution: This issue is resolved in KB4487021.

Back to top
OS Build 16299.936

January 15, 2019
KB4480967
Resolved
KB4487021
Resolved:
February 19, 2019
02:00 PM PT

Opened:
January 15, 2019
10:00 AM PT
Applications using Microsoft Jet database fail to open
Applications that use a Microsoft Jet database with the Microsoft Access 97 file format may fail to open if the database has column names greater than 32 characters. The database will fail to open with the error, “Unrecognized Database Format.”

Affected platforms:
  • Client: Windows 10, version 1709; Windows 10, version 1703; Windows 10, version 1607; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 10 Enterprise LTSB 2015; Windows 8.1; Windows 7 SP1 
  • Server: Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2; Windows Server 2012; Windows Server 2008 R2 SP1; Windows Server 2008 SP2 
Resolution: This issue is resolved in KB4486996.

Back to top
OS Build 16299.904

January 08, 2019
KB4480978
Resolved
KB4486996
Resolved:
February 12, 2019
10:00 AM PT

Opened:
January 08, 2019
10:00 AM PT
+
DetailsOriginating updateStatusHistory
DetailsOriginating updateStatusHistory
Unable to use Seek bar in Windows Media Player
After installing KB4462918, users may not be able to use the Seek Bar in Windows Media Player when playing specific files. This issue does not affect normal playback.

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10, version 1607; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 10 Enterprise LTSB 2015; Windows 8.1; Windows 7 SP1
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2; Windows Server 2012; Windows Server 2008 R2 SP1; Windows Server 2008 SP2
Resolution: This issue is resolved in KB4471329.

Back to top
OS Build 16299.726

October 09, 2018
KB4462918
Resolved
KB4471329
Resolved:
December 11, 2018
10:00 AM PT

Opened:
October 09, 2018
10:00 AM PT
Error message beginning with “Hosted by…” when launching Microsoft Edge
After installing KB4462918, some users may see a dialog box with a non-applicable message beginning with the words “Hosted by...” when first starting Microsoft Edge.

This dialog will only appear once if they have turned on “Block only third-party cookies” in Microsoft Edge and applied certain language packs before installing this update.

Affected platforms:
  • Client: Windows 10, version 1709; Windows 10, version 1703
  • Server: Windows Server, version 1709
Resolution: This issue is resolved in KB4462932.

Back to top
OS Build 16299.726

October 09, 2018
KB4462918
Resolved
KB4462932
Resolved:
October 18, 2018
10:00 AM PT

Opened:
October 09, 2018
10:00 AM PT
@@ -107,7 +107,7 @@ sections: - items: - type: markdown text: " - +
DetailsOriginating updateStatusHistory
DetailsOriginating updateStatusHistory
SqlConnection instantiation exception on .NET 4.6 and later
After you install the August Preview of Quality Rollup or September 11, 2018 .NET Framework update, instantiation of SqlConnection can throw an exception.

For more information about this issue, see the following article in the Microsoft Knowledge Base:
4470809 SqlConnection instantiation exception on .NET 4.6 and later after August-September 2018 .NET Framework updates.

Affected platforms:
  • Client: Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10, version 1607; Windows 10 Enterprise LTSC 2016
  • Server: Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016
Resolution: This issue is resolved in KB4480967.

Back to top
OS Build 16299.637

August 30, 2018
KB4343893
Resolved
KB4480967
Resolved:
January 15, 2019
10:00 AM PT

Opened:
August 30, 2018
05:00 PM PT
" diff --git a/windows/release-information/resolved-issues-windows-10-1803.yml b/windows/release-information/resolved-issues-windows-10-1803.yml index c4147211ce..8eaaa3f3c9 100644 --- a/windows/release-information/resolved-issues-windows-10-1803.yml +++ b/windows/release-information/resolved-issues-windows-10-1803.yml @@ -31,7 +31,7 @@ sections: - items: - type: markdown text: " - +
SummaryOriginating updateStatusDate resolved
@@ -66,7 +66,7 @@ sections: - items: - type: markdown text: " -
SummaryOriginating updateStatusDate resolved
Custom URI schemes may not start corresponding application
Custom URI schemes for application protocol handlers may not start the corresponding application for local intranet and trusted sites in Internet Explorer.

See details >
OS Build 17134.648

March 12, 2019
KB4489868
Resolved
KB4493437
April 25, 2019
02:00 PM PT
End-user-defined characters (EUDC) may cause blue screen at startup
If you enable per font end-user-defined characters (EUDC), the system may stop working and a blue screen may appear at startup.

See details >
OS Build 17134.677

March 19, 2019
KB4489894
Resolved
KB4493464
April 09, 2019
10:00 AM PT
First character of the Japanese era name not recognized
The first character of the Japanese era name is not recognized as an abbreviation and may cause date parsing issues.

See details >
OS Build 17134.556

January 15, 2019
KB4480976
Resolved
KB4487029
April 09, 2019
10:00 AM PT
+
DetailsOriginating updateStatusHistory
@@ -77,7 +77,7 @@ sections: - items: - type: markdown text: " -
DetailsOriginating updateStatusHistory
Custom URI schemes may not start corresponding application
After installing KB4489868, custom URI schemes for application protocol handlers may not start the corresponding application for local intranet and trusted sites security zones on Internet Explorer. 

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10, version 1607; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 10 Enterprise LTSB 2015; Windows 8.1; Windows 7 SP1 
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2; Windows Server 2008 R2 SP1
Resolution: This issue is resolved in KB4493437

Back to top
OS Build 17134.648

March 12, 2019
KB4489868
Resolved
KB4493437
Resolved:
April 25, 2019
02:00 PM PT

Opened:
March 12, 2019
10:00 AM PT
End-user-defined characters (EUDC) may cause blue screen at startup
If you enable per font end-user-defined characters (EUDC), the system may stop working and a blue screen may appear at startup. This is not a common setting in non-Asian regions. 

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10, version 1607; Windows 10 Enterprise LTSC 2016
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016
Resolution: This issue was resolved in KB4493464

Back to top
OS Build 17134.677

March 19, 2019
KB4489894
Resolved
KB4493464
Resolved:
April 09, 2019
10:00 AM PT

Opened:
March 19, 2019
10:00 AM PT
Stop error when attempting to start SSH from WSL
After applying KB4489868, a stop error occurs when attempting to start the Secure Shell (SSH) client program from Windows Subsystem for Linux (WSL) with agent forwarding enabled using a command line switch (ssh -A) or a configuration setting.

Affected platforms:
  • Client: Windows 10, version 1803; Windows 10, version 1709
  • Server: Windows Server, version 1803; Windows Server, version 1709
Resolution: This issue was resolved in KB4493464.

Back to top
OS Build 17134.648

March 12, 2019
KB4489868
Resolved
KB4493464
Resolved:
April 09, 2019
10:00 AM PT

Opened:
March 12, 2019
10:00 AM PT
+
DetailsOriginating updateStatusHistory
@@ -88,7 +88,7 @@ sections: - items: - type: markdown text: " -
DetailsOriginating updateStatusHistory
Embedded objects may display incorrectly
Any compound document (OLE) server application that places embedded objects into the Windows Metafile (WMF) using the PatBlt API may display embedded objects incorrectly. 
 
For example, if you paste a Microsoft Excel worksheet object into a Microsoft Word document, the cells may render with a different background color. 
 
Affected platforms:  
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10, version 1607; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 10 Enterprise LTSB 2015; Windows 8.1; Windows 7 SP1 
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2; Windows Server 2012; Windows Server 2008 R2 SP1; Windows Server 2008 SP2 
Resolution: This issue is resolved in KB4493464

Back to top
OS Build 17134.590

February 12, 2019
KB4487017
Resolved
KB4493464
Resolved:
April 09, 2019
10:00 AM PT

Opened:
February 12, 2019
10:00 AM PT
Error 1309 when installing/uninstalling MSI or MSP files
After installing KB4487017, users may received \"Error 1309\" while installing or uninstalling certain types of MSI and MSP files. 

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10, version 1607; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 10 Enterprise LTSB 2015; Windows 8.1
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2; Windows Server 2012
Resolution: This issue is resolved in KB4489868.

Back to top
OS Build 17134.590

February 12, 2019
KB4487017
Resolved
KB4489868
Resolved:
March 12, 2019
10:00 AM PT

Opened:
February 12, 2019
10:00 AM PT
Internet Explorer may fail to load images
After installing KB4487017, Internet Explorer may fail to load images with a backslash (\\) in their relative source path. 

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10, version 1607; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 10 Enterprise LTSB 2015; Windows 8.1; Windows 7 SP1
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2; Windows Server 2008 R2 SP1
Resolution: This issue is resolved in KB4487029

Back to top
OS Build 17134.590

February 12, 2019
KB4487017
Resolved
KB4487029
Resolved:
February 19, 2019
02:00 PM PT

Opened:
February 12, 2019
10:00 AM PT
+
DetailsOriginating updateStatusHistory
@@ -101,7 +101,7 @@ sections: - items: - type: markdown text: " -
DetailsOriginating updateStatusHistory
First character of the Japanese era name not recognized
After installing KB4480976, the first character of the Japanese era name is not recognized as an abbreviation and may cause date parsing issues.

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10, version 1607; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 10 Enterprise LTSB 2015; Windows 8.1; Windows 7 SP1
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2; Windows Server 2012; Windows Server 2008 R2 SP1; Windows Server 2008 SP2
Resolution: This issue is resolved in KB4487029

Back to top
OS Build 17134.556

January 15, 2019
KB4480976
Resolved
KB4487029
Resolved:
February 19, 2019
02:00 PM PT

Opened:
January 08, 2019
10:00 AM PT
MSXML6 may cause applications to stop responding
After installing KB4480966, MSXML6 causes applications to stop responding if an exception was thrown during node operations, such as appendChild(), insertBefore(), and moveNode().

The Group Policy editor may stop responding when editing a Group Policy Object (GPO) that contains Group Policy Preferences (GPP) for Internet Explorer 10 settings.

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10, version 1607; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 10 Enterprise LTSB 2015; Windows 8.1
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2; Windows Server 2012
Resolution: This issue was resolved in KB4493464

Back to top
OS Build 17134.523

January 08, 2019
KB4480966
Resolved
KB4493464
Resolved:
April 09, 2019
10:00 AM PT

Opened:
January 08, 2019
10:00 AM PT
Applications using Microsoft Jet database and Access 95 file format stop working
Applications that use a Microsoft Jet database with the Microsoft Access 95 file format may randomly stop working. 

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10, version 1607; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 10 Enterprise LTSB 2015; Windows 7 SP1
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012; Windows Server 2008 R2 SP1; Windows Server 2008 SP2
Resolution: This issue is resolved in KB4487017.

Back to top
OS Build 17134.523

January 08, 2019
KB4480966
Resolved
KB4487017
Resolved:
February 12, 2019
10:00 AM PT

Opened:
January 08, 2019
10:00 AM PT
+
DetailsOriginating updateStatusHistory
DetailsOriginating updateStatusHistory
Cannot pin a web link on the Start menu or the taskbar
After installing KB4471324, some users cannot pin a web link on the Start menu or the taskbar. 

Affected platforms:
  • Client: Windows 10, version 1803
  • Server: Windows Server, version 1803
Resolution: This issue is resolved in KB4487029

Back to top
OS Build 17134.471

December 11, 2018
KB4471324
Resolved
KB4487029
Resolved:
February 19, 2019
02:00 PM PT

Opened:
December 11, 2018
10:00 AM PT
" @@ -110,7 +110,7 @@ sections: - items: - type: markdown text: " - +
DetailsOriginating updateStatusHistory
DetailsOriginating updateStatusHistory
Blue or black screen with \"System thread exception not handled\" error
After installing KB4467682, an optional update, some users may get a blue or black screen with the error code, \"System thread exception not handled.\"

Affected platforms:
  • Client: Windows 10, version 1803
  • Server: Windows Server, version 1803
Resolution: This issue is resolved in KB4471324

Back to top
OS Build 17134.441

November 27, 2018
KB4467682
Resolved
KB4471324
Resolved:
December 11, 2018
10:00 AM PT

Opened:
November 27, 2018
10:00 AM PT
Custom Start menu layouts display incorrectly
After installing KB4467682, custom Start menu layouts may display incorrectly. 

Affected platforms:
  • Client: Windows 10, version 1803
  • Server: Windows Server, version 1803
Resolution: This issue is resolved in KB4471324

Back to top
OS Build 17134.441

November 27, 2018
KB4467682
Resolved
KB4471324
Resolved:
December 11, 2018
10:00 AM PT

Opened:
November 27, 2018
10:00 AM PT
@@ -120,7 +120,7 @@ sections: - items: - type: markdown text: " - +
DetailsOriginating updateStatusHistory
DetailsOriginating updateStatusHistory
Unable to use Seek bar in Windows Media Player
After installing KB4462919, users may not be able to use the Seek bar in Windows Media Player when playing specific files. This issue does not affect normal playback.

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10, version 1607; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 10 Enterprise LTSB 2015; Windows 8.1; Windows 7 SP1
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2; Windows Server 2012; Windows Server 2008 R2 SP1; Windows Server 2008 SP2
Resolution: This issue is resolved in KB4471324

Back to top
OS Build 17134.345

October 09, 2018
KB4462919
Resolved
KB4471324
Resolved:
December 11, 2018
10:00 AM PT

Opened:
October 09, 2018
10:00 AM PT
Developer Tools (F12) fail to start in Microsoft Edge
Developer Tools (F12) may fail to start in Microsoft Edge.

Affected platforms:
  • Client: Windows 10, version 1803
  • Server: Windows Server, version 1803
Resolution: This issue is resolved in KB4467702

Back to top
OS Build 17134.376

October 24, 2018
KB4462933
Resolved
KB4467702
Resolved:
November 13, 2018
10:00 AM PT

Opened:
October 24, 2018
02:00 PM PT
@@ -130,7 +130,7 @@ sections: - items: - type: markdown text: " - +
DetailsOriginating updateStatusHistory
@@ -141,7 +141,7 @@ sections: - items: - type: markdown text: " -
DetailsOriginating updateStatusHistory
SqlConnection instantiation exception on .NET 4.6 and later
After you install the August Preview of Quality Rollup or September 11, 2018 .NET Framework update, instantiation of SqlConnection can throw an exception.  

For more information about this issue, see the following article in the Microsoft Knowledge Base: 4470809, SqlConnection instantiation exception on .NET 4.6 and later after August-September 2018 .NET Framework updates.

Affected platforms:
  • Client: Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10, version 1607; Windows 10 Enterprise LTSC 2016
  • Server: Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016
Resolution: This issue is resolved in KB4480976

Back to top
OS Build 17134.285

September 11, 2018
KB4457128
Resolved
KB4480976
Resolved:
January 15, 2019
10:00 AM PT

Opened:
September 11, 2018
10:00 AM PT
Users cannot set Win32 program defaults
After installing KB4458469, some users cannot set Win32 program defaults for certain app and file type combinations using the Open with... command or Settings > Apps > Default apps
 
In some cases, Microsoft Notepad or other Win32 programs cannot be set as the default.

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803
Resolution: This issue is resolved in KB4467682

Back to top
OS Build 17134.320

September 26, 2018
KB4458469
Resolved
KB4467682
Resolved:
November 27, 2018
10:00 AM PT

Opened:
September 26, 2018
02:00 PM PT
Guest VMs running Unicast NLB fail to respond after restart
All guest virtual machines running Unicast NLB fail to respond to NLB requests after the virtual machines restart. 

Affected platforms:
  • Client: Windows 10, version 1803; Windows 10, version 1507; Windows 10 Enterprise LTSB 2015
  • Server: Windows Server, version 1803
Resolution: This issue is resolved in KB4458469

Back to top
OS Build 17134.285

September 11, 2018
KB4457128
Resolved
KB4458469
Resolved:
September 26, 2018
10:00 AM PT

Opened:
September 11, 2018
10:00 AM PT
+
DetailsOriginating updateStatusHistory
DetailsOriginating updateStatusHistory
Microsoft Intune takes a long time to deliver user profiles
After installing KB4457128, Windows no longer recognizes the Personal Information exchange (PFX) certificate that's used for authenticating to a Wi-Fi or VPN connection. As a result, Microsoft Intune takes a long time to deliver user profiles because it doesn't recognize that the required certificate is on the device. 

Affected platforms:
  • Client: Windows 10, version 1803
  • Server: Windows Server, version 1803
Resolution: This issue is resolved in KB4464218

Back to top
OS Build 17134.191

July 24, 2018
KB4340917
Resolved
KB4464218
Resolved:
September 17, 2018
10:00 AM PT

Opened:
July 24, 2018
10:00 AM PT
" diff --git a/windows/release-information/resolved-issues-windows-10-1809-and-windows-server-2019.yml b/windows/release-information/resolved-issues-windows-10-1809-and-windows-server-2019.yml index 349c914c2b..9e6e80d5cc 100644 --- a/windows/release-information/resolved-issues-windows-10-1809-and-windows-server-2019.yml +++ b/windows/release-information/resolved-issues-windows-10-1809-and-windows-server-2019.yml @@ -31,7 +31,7 @@ sections: - items: - type: markdown text: " - +
SummaryOriginating updateStatusDate resolved
@@ -69,7 +69,7 @@ sections: - items: - type: markdown text: " -
SummaryOriginating updateStatusDate resolved
End-user-defined characters (EUDC) may cause blue screen at startup
If you enable per font end-user-defined characters (EUDC), the system may stop working and a blue screen may appear at startup.

See details >
OS Build 17763.404

April 02, 2019
KB4490481
Resolved
KB4493509
April 09, 2019
10:00 AM PT
Internet Explorer 11 authentication issue with multiple concurrent logons
Internet Explorer 11 users may encounter issues if two or more people use the same user account for multiple, concurrent login sessions on the same Windows Server machine.

See details >
OS Build 17763.253

January 08, 2019
KB4480116
Resolved
KB4493509
April 09, 2019
10:00 AM PT
MSXML6 may cause applications to stop responding
MSXML6 may cause applications to stop responding if an exception was thrown during node operations, such as appendChild(), insertBefore(), and moveNode().

See details >
OS Build 17763.253

January 08, 2019
KB4480116
Resolved
KB4493509
April 09, 2019
10:00 AM PT
+
DetailsOriginating updateStatusHistory
DetailsOriginating updateStatusHistory
End-user-defined characters (EUDC) may cause blue screen at startup
If you enable per font end-user-defined characters (EUDC), the system will stop working and a blue screen may appear at startup. This is not a common setting in non-Asian regions.

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10, version 1607; Windows 10 Enterprise LTSC 2016
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016
Resolution: This issue was resolved in KB4493509.

Back to top
OS Build 17763.404

April 02, 2019
KB4490481
Resolved
KB4493509
Resolved:
April 09, 2019
10:00 AM PT

Opened:
April 02, 2019
10:00 AM PT
" @@ -78,7 +78,7 @@ sections: - items: - type: markdown text: " - +
DetailsOriginating updateStatusHistory
DetailsOriginating updateStatusHistory
Apps may stop working after selecting an audio output device other than the default
After installing KB4482887 on machines that have multiple audio devices, applications that provide advanced options for internal or external audio output devices may stop working unexpectedly. This issue occurs for users that select an audio output device different from the \"Default Audio Device\". Examples of applications that may stop working include: 
  • Windows Media Player 
  • Realtek HD Audio Manager 
  • Sound Blaster Control Panel 
Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019
  • Server: Windows Server, version 1809; Windows Server 2019
Resolution: This issue was resolved in KB4490481

Back to top
OS Build 17763.348

March 01, 2019
KB4482887
Resolved
KB4490481
Resolved:
April 02, 2019
10:00 AM PT

Opened:
March 01, 2019
10:00 AM PT
" @@ -87,7 +87,7 @@ sections: - items: - type: markdown text: " - +
DetailsOriginating updateStatusHistory
@@ -100,7 +100,7 @@ sections: - items: - type: markdown text: " -
DetailsOriginating updateStatusHistory
Embedded objects may display incorrectly
Any compound document (OLE) server application that places embedded objects into the Windows Metafile (WMF) using the PatBlt API may display embedded objects incorrectly. 
 
For example, if you paste a Microsoft Excel worksheet object into a Microsoft Word document, the cells may render with a different background color. 
 
Affected platforms:  
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10, version 1607; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 10 Enterprise LTSB 2015; Windows 8.1; Windows 7 SP1  
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2; Windows Server 2012; Windows Server 2008 R2 SP1; Windows Server 2008 SP2  
Resolution: This issue is resolved in KB4493509.  

Back to top
OS Build 17763.316

February 12, 2019
KB4487044
Resolved
KB4493509
Resolved:
April 09, 2019
10:00 AM PT

Opened:
February 12, 2019
10:00 AM PT
Error 1309 when installing/uninstalling MSI or MSP files
After installing KB4487044, users may receive \"Error 1309\" while installing or uninstalling certain types of MSI and MSP files. 

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10, version 1607; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 10 Enterprise LTSB 2015; Windows 8.1
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2; Windows Server 2012
Resolution: This issue is resolved in KB4489899

Back to top
OS Build 17763.316

February 12, 2019
KB4487044
Resolved
KB4489899
Resolved:
March 12, 2019
10:00 AM PT

Opened:
February 12, 2019
10:00 AM PT
Internet Explorer may fail to load images
After installing KB4487044, Internet Explorer may fail to load images with a backslash (\\) in their relative source path.

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10, version 1607; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 10 Enterprise LTSB 2015; Windows 8.1; Windows 7 SP1
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2; Windows Server 2008 R2 SP1
Resolution: This issue is resolved in KB4482887.

Back to top
OS Build 17763.316

February 12, 2019
KB4487044
Resolved
KB4482887
Resolved:
March 01, 2019
10:00 AM PT

Opened:
February 12, 2019
10:00 AM PT
+
DetailsOriginating updateStatusHistory
@@ -113,7 +113,7 @@ sections: - items: - type: markdown text: " -
DetailsOriginating updateStatusHistory
Internet Explorer 11 authentication issue with multiple concurrent logons
After installing KB4480116, Internet Explorer 11 and other applications that use WININET.DLL may have authentication issues. This occurs when two or more people use the same user account for multiple, concurrent login sessions on the same Windows Server machine, including Remote Desktop Protocol (RDP) and Terminal Server logons. Symptoms reported by customers include, but may not be limited to: 
  • Cache size and location show zero or empty. 
  • Keyboard shortcuts may not work properly. 
  • Webpages may intermittently fail to load or render correctly. 
  • Issues with credential prompts. 
  • Issues when downloading files. 
Affected platforms: 
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1607; Windows 10 Enterprise LTSC 2016; Windows 8.1; Windows 7 SP1
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server 2016; Windows Server 2012 R2; Windows Server 2012; Windows Server 2008 R2 SP1
Resolution: This issue was resolved in KB4493509

Back to top
OS Build 17763.253

January 08, 2019
KB4480116
Resolved
KB4493509
Resolved:
April 09, 2019
10:00 AM PT

Opened:
January 08, 2019
10:00 AM PT
MSXML6 may cause applications to stop responding
After installing KB4480116, MSXML6 causes applications to stop responding if an exception was thrown during node operations, such as appendChild(), insertBefore(), and moveNode().
 
The Group Policy editor may stop responding when editing a Group Policy Object (GPO) that contains Group Policy Preferences (GPP) for Internet Explorer 10 settings. 

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10, version 1607; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 10 Enterprise LTSB 2015; Windows 8.1
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2; Windows Server 2012
Resolution: This issue was resolved in KB4493509

Back to top
OS Build 17763.253

January 08, 2019
KB4480116
Resolved
KB4493509
Resolved:
April 09, 2019
10:00 AM PT

Opened:
January 08, 2019
10:00 AM PT
Global DNS outage affects Windows Update customers
Windows Update customers were affected by a network infrastructure event on January 29, 2019 (21:00 UTC), caused by an external DNS service provider's global outage. A software update to the external provider's DNS servers resulted in the distribution of corrupted DNS records that affected connectivity to the Windows Update service. The DNS records were restored by January 30, 2019 (00:10 UTC), and the majority of local Internet Service Providers (ISP) have refreshed their DNS servers and customer services have been restored. 
 
Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019
  • Server: Windows Server, version 1809; Windows Server 2019
While this was not an issue with Microsoft's services, we take any service disruption for our customers seriously. We will work with partners to better understand this so we can provide higher quality service in the future even across diverse global network providers. 
 
If you are still unable to connect to Windows Update services due to this problem, please contact your local ISP or network administrator. You can also refer to our new KB4493784 for more information to determine if your network is affected, and to provide your local ISP or network administrator with additional information to assist you. 

Back to top
N/A

Resolved
Resolved:
March 08, 2019
11:15 AM PT

Opened:
January 29, 2019
02:00 PM PT
+
DetailsOriginating updateStatusHistory
@@ -130,7 +130,7 @@ sections: - items: - type: markdown text: " -
DetailsOriginating updateStatusHistory
Shared albums may not sync with iCloud for Windows
Upgrade block: Users who attempt to install iCloud for Windows (version 7.7.0.27) will see a message displayed that this version iCloud for Windows isn't supported and the install will fail.

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019
  • Server: Windows Server, version 1809; Windows Server 2019
To ensure a seamless experience, Microsoft is blocking devices with iCloud for Windows (version 7.7.0.27) software installed from being offered Window 10, version 1809 until this issue has been resolved. 

We recommend that you do not attempt to manually update using the Update now button or the Media Creation Tool from the Microsoft software download website until this issue is resolved. 
 
Resolution: Apple has released an updated version of iCloud for Windows (version 7.8.1) that resolves compatibility issues encountered when updating or synching Shared Albums after updating to Windows 10, version 1809. We recommend that you update your iCloud for Windows to version 7.8.1 when prompted before attempting to upgrade to Windows 10, version 1809. You can also manually download the latest version of iCloud for Windows by visiting https://support.apple.com/HT204283.

Back to top
OS Build 17763.134

November 13, 2018
KB4467708
Resolved
KB4482887
Resolved:
March 01, 2019
10:00 AM PT

Opened:
November 13, 2018
10:00 AM PT
Intel Audio Display (intcdaud.sys) notification during Windows 10 Setup
Upgrade block: Microsoft and Intel have identified a compatibility issue with a range of Intel Display Audio device drivers (intcdaud.sys, versions 10.25.0.3 - 10.25.0.8) that may result in excessive processor demand and reduced battery life. As a result, the update process to the Windows 10 October 2018 Update (Windows 10, version 1809) will fail and affected devices will automatically revert to the previous working configuration. 

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019
  • Server: Windows Server, version 1809; Windows Server 2019
If you see a \"What needs your attention\" notification during installation of the October 2018 Update, you have one of these affected drivers on your system. On the notification, click Back to remain on your current version of Windows 10. 
 
To ensure a seamless experience, we are blocking devices from being offered the October 2018 Update until updated Intel device drivers are installed on your current operating system. We recommend that you do not attempt to manually update to Windows 10, version 1809, using the Update Now button or the Media Creation Tool from the Microsoft Software Download Center until newer Intel device drivers are available with the update. You can either wait for newer drivers to be installed automatically through Windows Update or check with your computer manufacturer for the latest device driver software availability and installation procedures. For more information about this issue, see Intel's customer support guidance.
 
Resolution: This issue was resolved in KB4482887 and the upgrade block removed. 

Back to top
OS Build 17763.134

November 13, 2018
KB4467708
Resolved
KB4482887
Resolved:
March 01, 2019
10:00 AM PT

Opened:
November 13, 2018
10:00 AM PT
F5 VPN clients losing network connectivity
Upgrade block: After updating to Window 10, version 1809, F5 VPN clients may lose network connectivity when the VPN service is in a split tunnel configuration.

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019
  • Server: Windows Server, version 1809; Windows Server 2019
Resolution: This issue was resolved in KB4482887 and the upgrade block removed. 

Back to top
OS Build 17763.134

November 13, 2018
KB4467708
Resolved
KB4482887
Resolved:
March 01, 2019
10:00 AM PT

Opened:
November 13, 2018
10:00 AM PT
+
DetailsOriginating updateStatusHistory
DetailsOriginating updateStatusHistory
Unable to use Seek bar in Windows Media Player
After installing KB4464330, users may not be able to use the Seek bar in Windows Media Player when playing specific files. This issue does not affect normal playback. 

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10, version 1607; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 10 Enterprise LTSB 2015; Windows 8.1; Windows 7 SP1
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2; Windows Server 2012; Windows Server 2008 R2 SP1; Windows Server 2008 SP2
Resolution: This issue is resolved in KB4471332

Back to top
OS Build 17763.55

October 09, 2018
KB4464330
Resolved
KB4471332
Resolved:
December 11, 2018
10:00 AM PT

Opened:
October 09, 2018
10:00 AM PT
Users cannot set Win32 program defaults
After installing KB4464330, some users cannot set Win32 program defaults for certain app and file type combinations using the Open with... command or Settings > Apps > Default apps.
 
In some cases, Microsoft Notepad or other Win32 programs cannot be set as the default. 

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803
Resolution: This issue is resolved in KB4469342

Back to top
OS Build 17763.55

October 09, 2018
KB4464330
Resolved
KB4469342
Resolved:
December 05, 2018
02:00 PM PT

Opened:
October 09, 2018
10:00 AM PT
diff --git a/windows/release-information/resolved-issues-windows-7-and-windows-server-2008-r2-sp1.yml b/windows/release-information/resolved-issues-windows-7-and-windows-server-2008-r2-sp1.yml index 607d6cbcc7..d034127b65 100644 --- a/windows/release-information/resolved-issues-windows-7-and-windows-server-2008-r2-sp1.yml +++ b/windows/release-information/resolved-issues-windows-7-and-windows-server-2008-r2-sp1.yml @@ -31,7 +31,7 @@ sections: - items: - type: markdown text: " - +
SummaryOriginating updateStatusDate resolved
@@ -59,7 +59,7 @@ sections: - items: - type: markdown text: " -
SummaryOriginating updateStatusDate resolved
Devices may not respond at login or Welcome screen if running certain Avast software
Devices running Avast for Business, Avast CloudCare, and AVG Business Edition antivirus software may become unresponsive after restart.

See details >
April 09, 2019
KB4493472
Resolved
April 25, 2019
02:00 PM PT
Internet Explorer 11 authentication issue with multiple concurrent logons
Internet Explorer 11 users may encounter issues if two or more people use the same user account for multiple, concurrent login sessions on the same Windows Server machine.

See details >
January 08, 2019
KB4480970
Resolved
KB4493472
April 09, 2019
10:00 AM PT
Custom URI schemes may not start corresponding application
Custom URI schemes for application protocol handlers may not start the corresponding application for local intranet and trusted sites in Internet Explorer.

See details >
March 12, 2019
KB4489878
Resolved
KB4493472
April 09, 2019
10:00 AM PT
+
DetailsOriginating updateStatusHistory
DetailsOriginating updateStatusHistory
Devices may not respond at login or Welcome screen if running certain Avast software
Microsoft and Avast have identified an issue on devices running Avast for Business, Avast CloudCare, and AVG Business Edition antivirus software after you install KB4493472 and restart. Devices may become unresponsive at the login or Welcome screen. Additionally, you may be unable to log in or log in after an extended period of time.

Affected platforms: 
  • Client: Windows 8.1; Windows 7 SP1 
  • Server: Windows Server 2012 R2; Windows Server 2008 R2 SP1 
Resolution: Avast has released emergency updates to address this issue. For more information and AV update schedule, see the Avast support KB article.

Back to top
April 09, 2019
KB4493472
Resolved
Resolved:
April 25, 2019
02:00 PM PT

Opened:
April 09, 2019
10:00 AM PT
" @@ -68,7 +68,7 @@ sections: - items: - type: markdown text: " - +
DetailsOriginating updateStatusHistory
DetailsOriginating updateStatusHistory
Custom URI schemes may not start corresponding application
After installing KB4489878, custom URI schemes for application protocol handlers may not start the corresponding application for local intranet and trusted sites on Internet Explorer.

Affected platforms: 
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10, version 1607; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 10 Enterprise LTSB 2015; Windows 8.1; Windows 7 SP1 
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2; Windows Server 2008 R2 SP1 
Resolution: This issue is resolved in KB4493472.

Back to top
March 12, 2019
KB4489878
Resolved
KB4493472
Resolved:
April 09, 2019
10:00 AM PT

Opened:
March 12, 2019
10:00 AM PT
NETDOM.EXE fails to run
After installing KB4489878, NETDOM.EXE fails to run, and the on-screen error, “The command failed to complete successfully.” appears.

Affected platforms: 
  • Client: Windows 7 SP1
  • Server: Windows Server 2008 R2 SP1; Windows Server 2008 SP2
Resolution: This issue is resolved in KB4493472.

Back to top
March 12, 2019
KB4489878
Resolved
KB4493472
Resolved:
April 09, 2019
10:00 AM PT

Opened:
March 12, 2019
10:00 AM PT
@@ -78,7 +78,7 @@ sections: - items: - type: markdown text: " - +
DetailsOriginating updateStatusHistory
@@ -89,7 +89,7 @@ sections: - items: - type: markdown text: " -
DetailsOriginating updateStatusHistory
Embedded objects may display incorrectly
Any compound document (OLE) server application that places embedded objects into the Windows Metafile (WMF) using the PatBlt API may display embedded objects incorrectly. 
 
For example, if you paste a Microsoft Excel worksheet object into a Microsoft Word document, the cells may render with a different background color. 
 
Affected platforms:  
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10, version 1607; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 10 Enterprise LTSB 2015; Windows 8.1; Windows 7 SP1 
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2; Windows Server 2012; Windows Server 2008 R2 SP1; Windows Server 2008 SP2 
Resolution: This issue is resolved in KB4493472

Back to top
February 12, 2019
KB4486563
Resolved
KB4493472
Resolved:
April 09, 2019
10:00 AM PT

Opened:
February 12, 2019
10:00 AM PT
Internet Explorer may fail to load images
After installing KB4486563, Internet Explorer may fail to load images with a backslash (\\) in their relative source path.

Affected platforms: 
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10, version 1607; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 10 Enterprise LTSB 2015; Windows 8.1; Windows 7 SP1 
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2; Windows Server 2008 R2 SP1 
Resolution: This issue is resolved in KB4486565.

Back to top
February 12, 2019
KB4486563
Resolved
KB4486565
Resolved:
February 19, 2019
02:00 PM PT

Opened:
February 12, 2019
10:00 AM PT
Applications using Microsoft Jet database and Access 95 file format stop working
Applications that use a Microsoft Jet database with the Microsoft Access 95 file format may randomly stop working.

Affected platforms: 
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10, version 1607; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 10 Enterprise LTSB 2015; Windows 7 SP1 
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012; Windows Server 2008 R2 SP1; Windows Server 2008 SP2 
Resolution: This issue is resolved in KB4486565.

Back to top
February 12, 2019
KB4486563
Resolved
KB4486565
Resolved:
February 19, 2019
02:00 PM PT

Opened:
February 12, 2019
10:00 AM PT
+
DetailsOriginating updateStatusHistory
@@ -102,7 +102,7 @@ sections: - items: - type: markdown text: " -
DetailsOriginating updateStatusHistory
Internet Explorer 11 authentication issue with multiple concurrent logons
After installing KB4480970, Internet Explorer 11 and other applications that use WININET.DLL may have authentication issues. This occurs when two or more people use the same user account for multiple, concurrent login sessions on the same Windows Server machine, including Remote Desktop Protocol (RDP) and Terminal Server logons. Symptoms reported by customers include, but may not be limited to:
  • Cache size and location show zero or empty.
  • Keyboard shortcuts may not work properly.
  • Webpages may intermittently fail to load or render correctly.
  • Issues with credential prompts.
  • Issues when downloading files.
Affected platforms: 
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1607; Windows 10 Enterprise LTSC 2016; Windows 8.1; Windows 7 SP1
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server 2016; Windows Server 2012 R2; Windows Server 2012; Windows Server 2008 R2 SP1
Resolution: This issue is resolved in KB4493472.

Back to top
January 08, 2019
KB4480970
Resolved
KB4493472
Resolved:
April 09, 2019
10:00 AM PT

Opened:
January 08, 2019
10:00 AM PT
Virtual machines fail to restore
After installing KB4480970, virtual machines (VM) may fail to restore successfully if the VM has been saved and restored once before. The error message is, “Failed to restore the virtual machine state: Cannot restore this virtual machine because the saved state data cannot be read. Delete the saved state data and then try to start the virtual machine. (0xC0370027).”

This affects AMD Bulldozer Family 15h, AMD Jaguar Family 16h, and AMD Puma Family 16h (second generation) microarchitectures.

Affected platforms: 
  • Client: Windows 8.1; Windows 7 SP1 
  • Server: Windows Server 2012 R2; Windows Server 2012; Windows Server 2008 R2 SP1; Windows Server 2008 SP2
Resolution: This issue is resolved in KB4490511.

Back to top
January 08, 2019
KB4480970
Resolved
KB4490511
Resolved:
February 19, 2019
02:00 PM PT

Opened:
January 08, 2019
10:00 AM PT
First character of the Japanese era name not recognized as an abbreviation
After installing KB4480955, the first character of the Japanese era name is not recognized as an abbreviation and may cause date parsing issues.

Affected platforms: 
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10, version 1607; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 10 Enterprise LTSB 2015; Windows 8.1; Windows 7 SP1 
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2; Windows Server 2012; Windows Server 2008 R2 SP1; Windows Server 2008 SP2 
Resolution: This issue is resolved in KB4486565.

Back to top
January 17, 2019
KB4480955
Resolved
KB4486565
Resolved:
February 19, 2019
02:00 PM PT

Opened:
January 17, 2019
10:00 AM PT
+
DetailsOriginating updateStatusHistory
DetailsOriginating updateStatusHistory
Event Viewer may not show some event descriptions for network interface cards
After installing KB4462927, the Event Viewer may not show some event descriptions for network interface cards (NICs).

Affected Platforms:
  • Client: Windows 7 SP1 
  • Server: Windows Server 2012; Windows Server 2008 R2 SP1
Resolution: This issue is resolved in KB4489878.

Back to top
October 18, 2018
KB4462927
Resolved
KB4489878
Resolved:
March 12, 2019
10:00 AM PT

Opened:
October 18, 2018
10:00 AM PT
Unable to use Seek bar in Windows Media Player
After installing KB4462923, users may not be able to use the Seek bar in Windows Media Player when playing specific files. This issue does not affect normal playback.

Affected platforms: 
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10, version 1607; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 10 Enterprise LTSB 2015; Windows 8.1; Windows 7 SP1
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2; Windows Server 2012; Windows Server 2008 R2 SP1; Windows Server 2008 SP2
Resolution: This issue is resolved in KB4471318.

Back to top
October 09, 2018
KB4462923
Resolved
KB4471318
Resolved:
December 11, 2018
10:00 AM PT

Opened:
October 09, 2018
10:00 AM PT
diff --git a/windows/release-information/resolved-issues-windows-8.1-and-windows-server-2012-r2.yml b/windows/release-information/resolved-issues-windows-8.1-and-windows-server-2012-r2.yml index 58f6c1cbac..1ef62bfe75 100644 --- a/windows/release-information/resolved-issues-windows-8.1-and-windows-server-2012-r2.yml +++ b/windows/release-information/resolved-issues-windows-8.1-and-windows-server-2012-r2.yml @@ -31,7 +31,7 @@ sections: - items: - type: markdown text: " - +
SummaryOriginating updateStatusDate resolved
@@ -59,7 +59,7 @@ sections: - items: - type: markdown text: " -
SummaryOriginating updateStatusDate resolved
Devices may not respond at login or Welcome screen if running certain Avast software
Devices running Avast for Business, Avast CloudCare, and AVG Business Edition antivirus software may become unresponsive after restart.

See details >
April 09, 2019
KB4493446
Resolved
April 25, 2019
02:00 PM PT
Internet Explorer 11 authentication issue with multiple concurrent logons
Internet Explorer 11 users may encounter issues if two or more people use the same user account for multiple, concurrent login sessions on the same Windows Server machine.

See details >
January 08, 2019
KB4480963
Resolved
KB4493446
April 09, 2019
10:00 AM PT
MSXML6 may cause applications to stop responding.
MSXML6 may cause applications to stop responding if an exception was thrown during node operations, such as appendChild(), insertBefore(), and moveNode().

See details >
January 08, 2019
KB4480963
Resolved
KB4493446
April 09, 2019
10:00 AM PT
+
DetailsOriginating updateStatusHistory
DetailsOriginating updateStatusHistory
Devices may not respond at login or Welcome screen if running certain Avast software
Microsoft and Avast have identified an issue on devices running Avast for Business, Avast CloudCare, and AVG Business Edition antivirus software after you install KB4493446 and restart. Devices may become unresponsive at the login or Welcome screen. Additionally, you may be unable to log in or log in after an extended period of time.

Affected platforms: 
  • Client: Windows 8.1; Windows 7 SP1 
  • Server: Windows Server 2012 R2; Windows Server 2008 R2 SP1 
Resolution: Avast has released emergency updates to address this issue. For more information and AV update schedule, see the Avast support KB article.

Back to top
April 09, 2019
KB4493446
Resolved
Resolved:
April 25, 2019
02:00 PM PT

Opened:
April 09, 2019
10:00 AM PT
" @@ -68,7 +68,7 @@ sections: - items: - type: markdown text: " - +
DetailsOriginating updateStatusHistory
DetailsOriginating updateStatusHistory
Custom URI schemes may not start corresponding application
After installing KB4489881, custom URI schemes for application protocol handlers may not start the corresponding application for local intranet and trusted sites security zones on Internet Explorer.

Affected platforms: 
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10, version 1607; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 10 Enterprise LTSB 2015; Windows 8.1; Windows 7 SP1 
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2; Windows Server 2008 R2 SP1 
Resolution: This issue is resolved in KB4493446.

Back to top
March 12, 2019
KB4489881
Resolved
KB4493446
Resolved:
April 09, 2019
10:00 AM PT

Opened:
March 12, 2019
10:00 AM PT
Devices with winsock kernel client may receive error
After installing KB4489881, devices with a winsock kernel client may receive D1, FC, and other errors. Additionally, systems that run the Skype for Business or Lync Server Edge Transport role may be affected by this issue.

Affected platforms: 
  • Client: Windows 8.1 
  • Server: Windows Server 2012 R2 
Resolution: This issue is resolved in KB4489893.

Back to top
March 12, 2019
KB4489881
Resolved
KB4489893
Resolved:
March 19, 2019
10:00 AM PT

Opened:
March 12, 2019
10:00 AM PT
@@ -78,7 +78,7 @@ sections: - items: - type: markdown text: " - +
DetailsOriginating updateStatusHistory
@@ -89,7 +89,7 @@ sections: - items: - type: markdown text: " -
DetailsOriginating updateStatusHistory
Embedded objects may display incorrectly
Any compound document (OLE) server application that places embedded objects into the Windows Metafile (WMF) using the PatBlt API may display embedded objects incorrectly.

For example, if you paste a Microsoft Excel worksheet object into a Microsoft Word document, the cells may render with a different background color.

Affected platforms 
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10, version 1607; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 10 Enterprise LTSB 2015; Windows 8.1; Windows 7 SP1 
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2; Windows Server 2012; Windows Server 2008 R2 SP1; Windows Server 2008 SP2 
Resolution: This issue is resolved in KB4493446.

Back to top
February 12, 2019
KB4487000
Resolved
KB4493446
Resolved:
April 09, 2019
10:00 AM PT

Opened:
February 12, 2019
10:00 AM PT
Error 1309 when installing/uninstalling MSI or MSP files
After installing KB4487016, users may receive “Error 1309” while installing or uninstalling certain types of MSI and MSP files.

Affected platforms: 
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10, version 1607; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 10 Enterprise LTSB 2015; Windows 8.1 
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2; Windows Server 2012 
Resolution: This issue is resolved in KB4489881.

Back to top
February 19, 2019
KB4487016
Resolved
KB4489881
Resolved:
March 12, 2019
10:00 AM PT

Opened:
February 19, 2019
02:00 PM PT
Internet Explorer may fail to load images
After installing KB4487000, Internet Explorer may fail to load images with a backslash (\\) in their relative source path.

Affected platforms: 
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10, version 1607; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 10 Enterprise LTSB 2015; Windows 8.1; Windows 7 SP1 
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2; Windows Server 2008 R2 SP1 
Resolution: This issue is resolved in KB4487016.

Back to top
February 12, 2019
KB4487000
Resolved
KB4487016
Resolved:
February 19, 2019
02:00 PM PT

Opened:
February 12, 2019
10:00 AM PT
+
DetailsOriginating updateStatusHistory
@@ -103,7 +103,7 @@ sections: - items: - type: markdown text: " -
DetailsOriginating updateStatusHistory
Internet Explorer 11 authentication issue with multiple concurrent logons
After installing KB4480963, Internet Explorer 11 and other applications that use WININET.DLL may have authentication issues. This occurs when two or more people use the same user account for multiple, concurrent login sessions on the same Windows Server machine, including Remote Desktop Protocol (RDP) and Terminal Server logons. Symptoms reported by customers include, but may not be limited to:
  • Cache size and location show zero or empty.
  • Keyboard shortcuts may not work properly.
  • Webpages may intermittently fail to load or render correctly.
  • Issues with credential prompts.
  • Issues when downloading files.
Affected platforms: 
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1607; Windows 10 Enterprise LTSC 2016; Windows 8.1; Windows 7 SP1
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server 2016; Windows Server 2012 R2; Windows Server 2012; Windows Server 2008 R2 SP1
Resolution: This issue is resolved in KB4493446.

Back to top
January 08, 2019
KB4480963
Resolved
KB4493446
Resolved:
April 09, 2019
10:00 AM PT

Opened:
January 08, 2019
10:00 AM PT
MSXML6 may cause applications to stop responding.
After installing KB4480963, MSXML6 causes applications to stop responding if an exception was thrown during node operations, such as appendChild(), insertBefore(), and moveNode().

The Group Policy editor may stop responding when editing a Group Policy Object (GPO) that contains Group Policy Preferences (GPP) for Internet Explorer 10 settings.

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10, version 1607; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 10 Enterprise LTSB 2015; Windows 8.1
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2; Windows Server 2012
Resolution: This issue is resolved in KB4493446.

Back to top
January 08, 2019
KB4480963
Resolved
KB4493446
Resolved:
April 09, 2019
10:00 AM PT

Opened:
January 08, 2019
10:00 AM PT
Virtual machines fail to restore
After installing KB4480963, virtual machines (VM) may fail to restore successfully if the VM has been saved and restored once before. The error message is, “Failed to restore the virtual machine state: Cannot restore this virtual machine because the saved state data cannot be read. Delete the saved state data and then try to start the virtual machine. (0xC0370027).”

This affects AMD Bulldozer Family 15h, AMD Jaguar Family 16h, and AMD Puma Family 16h (second generation) microarchitectures.

Affected platforms: 
  • Client: Windows 8.1; Windows 7 SP1 
  • Server: Windows Server 2012 R2; Windows Server 2012; Windows Server 2008 R2 SP1; Windows Server 2008 SP2
Resolution: This issue is resolved in KB4490512.

Back to top
January 08, 2019
KB4480963
Resolved
KB4490512
Resolved:
February 19, 2019
02:00 PM PT

Opened:
January 08, 2019
10:00 AM PT
+
DetailsOriginating updateStatusHistory
DetailsOriginating updateStatusHistory
Unable to use Seek bar in Windows Media Player
After installing KB4462926, users may not be able to use the Seek bar in Windows Media Player when playing specific files. This issue does not affect normal playback.

Affected platforms: 
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10, version 1607; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 10 Enterprise LTSB 2015; Windows 8.1; Windows 7 SP1 
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2; Windows Server 2012; Windows Server 2008 R2 SP1; Windows Server 2008 SP2
Resolution: This issue is resolved in KB4471320.

Back to top
October 09, 2018
KB4462926
Resolved
KB4471320
Resolved:
December 11, 2018
10:00 AM PT

Opened:
October 09, 2018
10:00 AM PT
" diff --git a/windows/release-information/resolved-issues-windows-server-2008-sp2.yml b/windows/release-information/resolved-issues-windows-server-2008-sp2.yml index 88e32ae7c4..fe19c4b36e 100644 --- a/windows/release-information/resolved-issues-windows-server-2008-sp2.yml +++ b/windows/release-information/resolved-issues-windows-server-2008-sp2.yml @@ -31,7 +31,7 @@ sections: - items: - type: markdown text: " - +
SummaryOriginating updateStatusDate resolved
@@ -54,7 +54,7 @@ sections: - items: - type: markdown text: " -
SummaryOriginating updateStatusDate resolved
Embedded objects may display incorrectly
Any compound document (OLE) server application that places embedded objects into the Windows Metafile (WMF) using the PatBlt API may display embedded objects incorrectly.

See details >
February 12, 2019
KB4487023
Resolved
KB4493471
April 09, 2019
10:00 AM PT
NETDOM.EXE fails to run
NETDOM.EXE fails to run and the error, “The command failed to complete successfully.” appears on screen.

See details >
March 12, 2019
KB4489880
Resolved
KB4493471
April 09, 2019
10:00 AM PT
First character of the Japanese era name not recognized as an abbreviation
The first character of the Japanese era name is not recognized as an abbreviation and may cause date parsing issues.

See details >
January 17, 2019
KB4480974
Resolved
KB4489880
March 12, 2019
10:00 AM PT
+
DetailsOriginating updateStatusHistory
DetailsOriginating updateStatusHistory
NETDOM.EXE fails to run
After installing KB4489880, NETDOM.EXE fails to run, and the on-screen error, “The command failed to complete successfully.” appears.

Affected platforms: 
  • Client: Windows 7 SP1
  • Server: Windows Server 2008 R2 SP1; Windows Server 2008 SP2
Resolution: This issue is resolved in KB4493471.

Back to top
March 12, 2019
KB4489880
Resolved
KB4493471
Resolved:
April 09, 2019
10:00 AM PT

Opened:
March 12, 2019
10:00 AM PT
" @@ -63,7 +63,7 @@ sections: - items: - type: markdown text: " - +
DetailsOriginating updateStatusHistory
DetailsOriginating updateStatusHistory
Embedded objects may display incorrectly
Any compound document (OLE) server application that places embedded objects into the Windows Metafile (WMF) using the PatBlt API may display embedded objects incorrectly.

For example, if you paste a Microsoft Excel worksheet object into a Microsoft Word document, the cells may render with a different background color.

Affected platforms 
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10, version 1607; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 10 Enterprise LTSB 2015; Windows 8.1; Windows 7 SP1 
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2; Windows Server 2012; Windows Server 2008 R2 SP1; Windows Server 2008 SP2
Resolution: This issue is resolved in KB4493471.

Back to top
February 12, 2019
KB4487023
Resolved
KB4493471
Resolved:
April 09, 2019
10:00 AM PT

Opened:
February 12, 2019
10:00 AM PT
Applications using Microsoft Jet database and Access 95 file format stop working
Applications that use a Microsoft Jet database with the Microsoft Access 95 file format may randomly stop working.

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10, version 1607; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 10 Enterprise LTSB 2015; Windows 7 SP1
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012; Windows Server 2008 R2 SP1; Windows Server 2008 SP2
Resolution: This issue is resolved in KB4487022.

Back to top
February 12, 2019
KB4487023
Resolved
KB4487022
Resolved:
February 19, 2019
02:00 PM PT

Opened:
February 12, 2019
10:00 AM PT
@@ -73,7 +73,7 @@ sections: - items: - type: markdown text: " - +
DetailsOriginating updateStatusHistory
@@ -85,7 +85,7 @@ sections: - items: - type: markdown text: " -
DetailsOriginating updateStatusHistory
First character of the Japanese era name not recognized as an abbreviation
After installing KB4480974, the first character of the Japanese era name is not recognized as an abbreviation and may cause date parsing issues.

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10, version 1607; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 10 Enterprise LTSB 2015; Windows 8.1; Windows 7 SP1
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2; Windows Server 2012; Windows Server 2008 R2 SP1; Windows Server 2008 SP2
Resolution: This issue is resolved in KB4489880.

Back to top
January 17, 2019
KB4480974
Resolved
KB4489880
Resolved:
March 12, 2019
10:00 AM PT

Opened:
January 17, 2019
10:00 AM PT
Virtual machines fail to restore
After installing KB4480968, virtual machines (VM) may fail to restore successfully if the VM has been saved and restored once before. The error message is, “Failed to restore the virtual machine state: Cannot restore this virtual machine because the saved state data cannot be read. Delete the saved state data and then try to start the virtual machine. (0xC0370027).”

This affects AMD Bulldozer Family 15h, AMD Jaguar Family 16h, and AMD Puma Family 16h (second generation) microarchitectures.

Affected platforms: 
  • Client: Windows 8.1; Windows 7 SP1 
  • Server: Windows Server 2012 R2; Windows Server 2012; Windows Server 2008 R2 SP1; Windows Server 2008 SP2
Resolution: This issue is resolved in KB4490514.

Back to top
January 08, 2019
KB4480968
Resolved
KB4490514
Resolved:
February 19, 2019
02:00 PM PT

Opened:
January 08, 2019
10:00 AM PT
Applications using Microsoft Jet database fail to open
Applications that use a Microsoft Jet database with the Microsoft Access 97 file format may fail to open if the database has column names greater than 32 characters. The database will fail to open with the error, “Unrecognized Database Format”.

Affected platforms: 
  • Client: Windows 10, version 1709; Windows 10, version 1703; Windows 10, version 1607; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 10 Enterprise LTSB 2015; Windows 8.1; Windows 7 SP1 
  • Server: Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2; Windows Server 2012; Windows Server 2008 R2 SP1; Windows Server 2008 SP2
Resolution: This issue is resolved in KB4487023.

Back to top
January 08, 2019
KB4480968
Resolved
KB4487023
Resolved:
February 12, 2019
10:00 AM PT

Opened:
January 08, 2019
10:00 AM PT
+
DetailsOriginating updateStatusHistory
DetailsOriginating updateStatusHistory
Unable to use Seek bar in Windows Media Player
After installing KB4463097, users may not be able to use the Seek bar in Windows Media Player when playing specific files. This issue does not affect normal playback.

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10, version 1607; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 10 Enterprise LTSB 2015; Windows 8.1; Windows 7 SP1
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2; Windows Server 2012; Windows Server 2008 R2 SP1; Windows Server 2008 SP2
Resolution: This issue is resolved in KB4471325.

Back to top
October 09, 2018
KB4463097
Resolved
KB4471325
Resolved:
December 11, 2018
10:00 AM PT

Opened:
October 09, 2018
10:00 AM PT
" diff --git a/windows/release-information/resolved-issues-windows-server-2012.yml b/windows/release-information/resolved-issues-windows-server-2012.yml index acc7d1ba20..b2a7ce07c1 100644 --- a/windows/release-information/resolved-issues-windows-server-2012.yml +++ b/windows/release-information/resolved-issues-windows-server-2012.yml @@ -31,7 +31,7 @@ sections: - items: - type: markdown text: " - +
SummaryOriginating updateStatusDate resolved
@@ -57,7 +57,7 @@ sections: - items: - type: markdown text: " -
SummaryOriginating updateStatusDate resolved
Internet Explorer 11 authentication issue with multiple concurrent logons
Internet Explorer 11 users may encounter issues if two or more people use the same user account for multiple, concurrent login sessions on the same Windows Server machine.

See details >
January 08, 2019
KB4480975
Resolved
KB4493451
April 09, 2019
10:00 AM PT
MSXML6 may cause applications to stop responding
MSXML6 may cause applications to stop responding if an exception was thrown during node operations, such as appendChild(), insertBefore(), and moveNode().

See details >
January 08, 2019
KB4480975
Resolved
KB4493451
April 09, 2019
10:00 AM PT
Embedded objects may display incorrectly
Any compound document (OLE) server application that places embedded objects into the Windows Metafile (WMF) using the PatBlt API may display embedded objects incorrectly.

See details >
February 12, 2019
KB4487025
Resolved
KB4493451
April 09, 2019
10:00 AM PT
+
DetailsOriginating updateStatusHistory
@@ -68,7 +68,7 @@ sections: - items: - type: markdown text: " -
DetailsOriginating updateStatusHistory
Embedded objects may display incorrectly
Any compound document (OLE) server application that places embedded objects into the Windows Metafile (WMF) using the PatBlt API may display embedded objects incorrectly.

For example, if you paste a Microsoft Excel worksheet object into a Microsoft Word document, the cells may render with a different background color.

Affected platforms 
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10, version 1607; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 10 Enterprise LTSB 2015; Windows 8.1; Windows 7 SP1 
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2; Windows Server 2012; Windows Server 2008 R2 SP1; Windows Server 2008 SP2 
Resolution: This issue is resolved in KB4493451.

Back to top
February 12, 2019
KB4487025
Resolved
KB4493451
Resolved:
April 09, 2019
10:00 AM PT

Opened:
February 12, 2019
10:00 AM PT
Error 1309 when installing/uninstalling MSI or MSP files
After installing KB4487025, users may receive \"Error 1309\" while installing or uninstalling certain types of MSI and MSP files.

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10, version 1607; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 10 Enterprise LTSB 2015; Windows 8.1
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2; Windows Server 2012
Resolution: This issue is resolved in KB4489891.

Back to top
February 12, 2019
KB4487025
Resolved
KB4489891
Resolved:
March 12, 2019
10:00 AM PT

Opened:
February 12, 2019
10:00 AM PT
Applications using Microsoft Jet database and Access 95 file format stop working
Applications that use a Microsoft Jet database with the Microsoft Access 95 file format may randomly stop working.

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10, version 1607; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 10 Enterprise LTSB 2015; Windows 7 SP1
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012; Windows Server 2008 R2 SP1; Windows Server 2008 SP2
Resolution: This issue is resolved in KB4487024.

Back to top
February 12, 2019
KB4487025
Resolved
KB4487024
Resolved:
February 19, 2019
02:00 PM PT

Opened:
February 12, 2019
10:00 AM PT
+
DetailsOriginating updateStatusHistory
@@ -82,7 +82,7 @@ sections: - items: - type: markdown text: " -
DetailsOriginating updateStatusHistory
Internet Explorer 11 authentication issue with multiple concurrent logons
After installing KB4480975, Internet Explorer 11 and other applications that use WININET.DLL may have authentication issues. This occurs when two or more people use the same user account for multiple, concurrent login sessions on the same Windows Server machine, including Remote Desktop Protocol (RDP) and Terminal Server logons. Symptoms reported by customers include, but may not be limited to:
  • Cache size and location show zero or empty.
  • Keyboard shortcuts may not work properly.
  • Webpages may intermittently fail to load or render correctly.
  • Issues with credential prompts.
  • Issues when downloading files.
Affected platforms: 
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1607; Windows 10 Enterprise LTSC 2016; Windows 8.1; Windows 7 SP1
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server 2016; Windows Server 2012 R2; Windows Server 2012; Windows Server 2008 R2 SP1
Resolution: This issue is resolved in KB4493451.

Back to top
January 08, 2019
KB4480975
Resolved
KB4493451
Resolved:
April 09, 2019
10:00 AM PT

Opened:
January 08, 2019
10:00 AM PT
MSXML6 may cause applications to stop responding
After installing KB4480975, MSXML6 causes applications to stop responding if an exception was thrown during node operations, such as appendChild(), insertBefore(), and moveNode().

The Group Policy editor may stop responding when editing a Group Policy Object (GPO) that contains Group Policy Preferences (GPP) for Internet Explorer 10 settings.

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10, version 1607; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 10 Enterprise LTSB 2015; Windows 8.1
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2; Windows Server 2012
Resolution: This issue is resolved in KB4493451.

Back to top
January 08, 2019
KB4480975
Resolved
KB4493451
Resolved:
April 09, 2019
10:00 AM PT

Opened:
January 08, 2019
10:00 AM PT
Virtual machines fail to restore
After installing KB4480975, virtual machines (VM) may fail to restore successfully if the VM has been saved and restored once before. The error message is, \"Failed to restore the virtual machine state: Cannot restore this virtual machine because the saved state data cannot be read. Delete the saved state data and then try to start the virtual machine. (0xC0370027).\"

This affects AMD Bulldozer Family 15h, AMD Jaguar Family 16h, and AMD Puma Family 16h (second generation) microarchitectures.

Affected platforms: 
  • Client: Windows 8.1; Windows 7 SP1 
  • Server: Windows Server 2012 R2; Windows Server 2012; Windows Server 2008 R2 SP1; Windows Server 2008 SP2
Resolution: This issue is resolved in KB4490516.

Back to top
January 08, 2019
KB4480975
Resolved
KB4490516
Resolved:
February 19, 2019
02:00 PM PT

Opened:
January 08, 2019
10:00 AM PT
+
DetailsOriginating updateStatusHistory
DetailsOriginating updateStatusHistory
Unable to use Seek bar in Windows Media Player
After installing KB4462929, users may not be able to use the Seek bar in Windows Media Player when playing specific files. This issue does not affect normal playback.

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10, version 1607; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 10 Enterprise LTSB 2015; Windows 8.1; Windows 7 SP1
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2; Windows Server 2012; Windows Server 2008 R2 SP1; Windows Server 2008 SP2
Resolution: This issue is resolved in KB4471330.

Back to top
October 09, 2018
KB4462929
Resolved
KB4471330
Resolved:
December 11, 2018
10:00 AM PT

Opened:
October 09, 2018
10:00 AM PT
" @@ -91,7 +91,7 @@ sections: - items: - type: markdown text: " - +
DetailsOriginating updateStatusHistory
DetailsOriginating updateStatusHistory
Event Viewer may not show some event descriptions for network interface cards
After installing KB4457135, the Event Viewer may not show some event descriptions for network interface cards (NICs).

Affected Platforms:
  • Client: Windows 7 SP1 
  • Server: Windows Server 2012; Windows Server 2008 R2 SP1
Resolution: This issue is resolved in KB4489891.

Back to top
September 11, 2018
KB4457135
Resolved
KB4489891
Resolved:
March 12, 2019
10:00 AM PT

Opened:
September 11, 2018
10:00 AM PT
" diff --git a/windows/release-information/status-windows-10-1507.yml b/windows/release-information/status-windows-10-1507.yml index 0a9bcbadc7..3cab3fb9e9 100644 --- a/windows/release-information/status-windows-10-1507.yml +++ b/windows/release-information/status-windows-10-1507.yml @@ -59,7 +59,7 @@ sections: - items: - type: markdown text: "
This table offers a summary of current active issues and those issues that have been resolved in the last 30 days.

- +
SummaryOriginating updateStatusLast updated
@@ -78,7 +78,7 @@ sections: - items: - type: markdown text: " -
SummaryOriginating updateStatusLast updated
Certain operations performed on a Cluster Shared Volume may fail
Certain operations, such as rename, performed on files or folders on a Cluster Shared Volume (CSV) may fail with the error, \"STATUS_BAD_IMPERSONATION_LEVEL (0xC00000A5)\".

See details >
OS Build 10240.18094

January 08, 2019
KB4480962
Mitigated
April 25, 2019
02:00 PM PT
MSXML6 may cause applications to stop responding
MSXML6 may cause applications to stop responding if an exception was thrown during node operations, such as appendChild(), insertBefore(), and moveNode().

See details >
OS Build 10240.18094

January 08, 2019
KB4480962
Resolved
KB4493475
April 09, 2019
10:00 AM PT
Custom URI schemes may not start corresponding application
Custom URI schemes for application protocol handlers may not start the corresponding application for local intranet and trusted sites in Internet Explorer.

See details >
OS Build 10240.18158

March 12, 2019
KB4489872
Resolved
KB4493475
April 09, 2019
10:00 AM PT
+
DetailsOriginating updateStatusHistory
DetailsOriginating updateStatusHistory
Custom URI schemes may not start corresponding application
After installing KB4489872, Custom URI Schemes for Application Protocol handlers may not start the corresponding application for local intranet and trusted sites on Internet Explorer.

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10, version 1607; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 10 Enterprise LTSB 2015; Windows 8.1; Windows 7 SP1 
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2; Windows Server 2008 R2 SP1
Resolution: This issue was resolved in KB4493475.

Back to top
OS Build 10240.18158

March 12, 2019
KB4489872
Resolved
KB4493475
Resolved:
April 09, 2019
10:00 AM PT

Opened:
March 12, 2019
10:00 AM PT
" @@ -87,7 +87,7 @@ sections: - items: - type: markdown text: " - +
DetailsOriginating updateStatusHistory
DetailsOriginating updateStatusHistory
Embedded objects may display incorrectly
Any compound document (OLE) server application that places embedded objects into the Windows Metafile (WMF) using the PatBlt API may display embedded objects incorrectly. 
 
For example, if you paste a Microsoft Excel worksheet object into a Microsoft Word document, the cells may render with a different background color. 
 
Affected platforms:  
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10, version 1607; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 10 Enterprise LTSB 2015; Windows 8.1; Windows 7 SP1
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2; Windows Server 2012; Windows Server 2008 R2 SP1; Windows Server 2008 SP2 
Resolution: This issue is resolved in KB4493475

Back to top
OS Build 10240.18132

February 12, 2019
KB4487018
Resolved
KB4493475
Resolved:
April 09, 2019
10:00 AM PT

Opened:
February 12, 2019
10:00 AM PT
" @@ -96,7 +96,7 @@ sections: - items: - type: markdown text: " - +
DetailsOriginating updateStatusHistory
DetailsOriginating updateStatusHistory
Certain operations performed on a Cluster Shared Volume may fail
Certain operations, such as rename, that you perform on files or folders that are on a Cluster Shared Volume (CSV) may fail with the error, \"STATUS_BAD_IMPERSONATION_LEVEL (0xC00000A5)\". This occurs when you perform the operation on a CSV owner node from a process that doesn’t have administrator privilege.

Affected platforms: 
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10, version 1607; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 10 Enterprise LTSB 2015; Windows 8.1
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2; Windows Server 2012
Workaround: Do one of the following: 
  • Perform the operation from a process that has administrator privilege. 
  • Perform the operation from a node that doesn’t have CSV ownership. 
Next steps: Microsoft is working on a resolution and will provide an update in an upcoming release.

Back to top
OS Build 10240.18094

January 08, 2019
KB4480962
Mitigated
Last updated:
April 25, 2019
02:00 PM PT

Opened:
January 08, 2019
10:00 AM PT
MSXML6 may cause applications to stop responding
After installing KB4480962, MSXML6 causes applications to stop responding if an exception was thrown during node operations, such as appendChild(), insertBefore(), and moveNode().

The Group Policy editor may stop responding when editing a Group Policy Object (GPO) that contains Group Policy Preferences (GPP) for Internet Explorer 10 settings.

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10, version 1607; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 10 Enterprise LTSB 2015; Windows 8.1
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2; Windows Server 2012
Resolution: This issue was resolved in KB4493475.

Back to top
OS Build 10240.18094

January 08, 2019
KB4480962
Resolved
KB4493475
Resolved:
April 09, 2019
10:00 AM PT

Opened:
January 08, 2019
10:00 AM PT
diff --git a/windows/release-information/status-windows-10-1607-and-windows-server-2016.yml b/windows/release-information/status-windows-10-1607-and-windows-server-2016.yml index de704f0e29..b22aced938 100644 --- a/windows/release-information/status-windows-10-1607-and-windows-server-2016.yml +++ b/windows/release-information/status-windows-10-1607-and-windows-server-2016.yml @@ -59,7 +59,7 @@ sections: - items: - type: markdown text: "
This table offers a summary of current active issues and those issues that have been resolved in the last 30 days.

- +
SummaryOriginating updateStatusLast updated
@@ -85,7 +85,7 @@ sections: - items: - type: markdown text: " -
SummaryOriginating updateStatusLast updated
Zone transfers over TCP may fail
Zone transfers between primary and secondary DNS servers over the Transmission Control Protocol (TCP) may fail.

See details >
OS Build 14393.2941

April 25, 2019
KB4493473
Investigating
April 25, 2019
02:00 PM PT
Cluster service may fail if the minimum password length is set to greater than 14
The cluster service may fail to start with the error “2245 (NERR_PasswordTooShort)” if the Group Policy “Minimum Password Length” is configured with greater than 14 characters.

See details >
OS Build 14393.2639

November 27, 2018
KB4467684
Mitigated
April 25, 2019
02:00 PM PT
Issue using PXE to start a device from WDS
There may be issues using the Preboot Execution Environment (PXE) to start a device from a Windows Deployment Services (WDS) server configured to use Variable Window Extension.

See details >
OS Build 14393.2848

March 12, 2019
KB4489882
Mitigated
April 25, 2019
02:00 PM PT
+
DetailsOriginating updateStatusHistory
DetailsOriginating updateStatusHistory
Zone transfers over TCP may fail
Zone transfers between primary and secondary DNS servers over the Transmission Control Protocol (TCP) may fail after installing KB4493473
 
Affected platforms:  
  • Client: Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1607; Windows 10 Enterprise LTSC 2016 
  • Server: Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016 
Next steps: Microsoft is working on a resolution and will provide an update in an upcoming release. 

Back to top
OS Build 14393.2941

April 25, 2019
KB4493473
Investigating
Last updated:
April 25, 2019
02:00 PM PT

Opened:
April 25, 2019
02:00 PM PT
" @@ -94,7 +94,7 @@ sections: - items: - type: markdown text: " - +
DetailsOriginating updateStatusHistory
@@ -106,7 +106,7 @@ sections: - items: - type: markdown text: " -
DetailsOriginating updateStatusHistory
Issue using PXE to start a device from WDS
After installing KB4489882, there may be issues using the Preboot Execution Environment (PXE) to start a device from a Windows Deployment Services (WDS) server configured to use Variable Window Extension. This may cause the connection to the WDS server to terminate prematurely while downloading the image. This issue does not affect clients or devices that are not using Variable Window Extension.

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1607; Windows 10 Enterprise LTSC 2016; Windows 8.1
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server 2016; Windows Server 2012 R2; Windows Server 2012
Workaround: To mitigate the issue, disable the Variable Window Extension on WDS server using one of the following options:

Option 1:
Open an Administrator Command prompt and type the following:
Wdsutil /Set-TransportServer /EnableTftpVariableWindowExtension:No
 

Option 2:
Use the Windows Deployment Services UI to make the following adjustment:
  1. Open Windows Deployment Services from Windows Administrative Tools.
  2. Expand Servers and right-click a WDS server.
  3. Open its properties and clear the Enable Variable Window Extension box on the TFTP tab.
Option 3:
Set the following registry value to 0:
HKLM\\System\\CurrentControlSet\\Services\\WDSServer\\Providers\\WDSTFTP\\EnableVariableWindowExtension

Restart the WDSServer service after disabling the Variable Window Extension.

Next steps: Microsoft is working on a resolution and will provide an update in an upcoming release.

Back to top
OS Build 14393.2848

March 12, 2019
KB4489882
Mitigated
Last updated:
April 25, 2019
02:00 PM PT

Opened:
March 12, 2019
10:00 AM PT
Custom URI schemes may not start corresponding application
After installing KB4489882, Custom URI schemes for application protocol handlers may not start the corresponding application for local intranet and trusted sites security zones on Internet Explorer.

Affected platforms: 
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10, version 1607; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 10 Enterprise LTSB 2015; Windows 8.1; Windows 7 SP1 
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2; Windows Server 2008 R2 SP1
Resolution: This issue is resolved in KB4493473

Back to top
OS Build 14393.2848

March 12, 2019
KB4489882
Resolved
KB4493473
Resolved:
April 25, 2019
02:00 PM PT

Opened:
March 12, 2019
10:00 AM PT
+
DetailsOriginating updateStatusHistory
DetailsOriginating updateStatusHistory
Embedded objects may display incorrectly
Any compound document (OLE) server application that places embedded objects into the Windows Metafile (WMF) using the PatBlt API may display embedded objects incorrectly. 
 
For example, if you paste a Microsoft Excel worksheet object into a Microsoft Word document, the cells may render with a different background color. 
 
Affected platforms:  
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10, version 1607; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 10 Enterprise LTSB 2015; Windows 8.1; Windows 7 SP1 
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2; Windows Server 2012; Windows Server 2008 R2 SP1; Windows Server 2008 SP2 
Resolution: This issue is resolved in KB4493470

Back to top
OS Build 14393.2791

February 12, 2019
KB4487026
Resolved
KB4493470
Resolved:
April 09, 2019
10:00 AM PT

Opened:
February 12, 2019
10:00 AM PT
" @@ -115,7 +115,7 @@ sections: - items: - type: markdown text: " - +
DetailsOriginating updateStatusHistory
@@ -126,7 +126,7 @@ sections: - items: - type: markdown text: " -
DetailsOriginating updateStatusHistory
Certain operations performed on a Cluster Shared Volume may fail
Certain operations, such as rename, that you perform on files or folders that are on a Cluster Shared Volume (CSV) may fail with the error, \"STATUS_BAD_IMPERSONATION_LEVEL (0xC00000A5)\". This occurs when you perform the operation on a CSV owner node from a process that doesn’t have administrator privilege. 

Affected platforms: 
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10, version 1607; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507;  Windows 10 Enterprise LTSB 2015; Windows 8.1
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2; Windows Server 2012
Workaround: Do one of the following:
  • Perform the operation from a process that has administrator privilege. 
  • Perform the operation from a node that doesn’t have CSV ownership.
Next steps: Microsoft is working on a resolution and will provide an update in an upcoming release.

Back to top
OS Build 14393.2724

January 08, 2019
KB4480961
Mitigated
Last updated:
April 25, 2019
02:00 PM PT

Opened:
January 08, 2019
10:00 AM PT
Internet Explorer 11 authentication issue with multiple concurrent logons
After installing KB4480961, Internet Explorer 11 and other applications that use WININET.DLL may have authentication issues. This occurs when two or more people use the same user account for multiple, concurrent login sessions on the same Windows Server machine, including Remote Desktop Protocol (RDP) and Terminal Server logons. Symptoms reported by customers include, but may not be limited to:
  • Cache size and location show zero or empty.
  • Keyboard shortcuts may not work properly.
  • Webpages may intermittently fail to load or render correctly.
  • Issues with credential prompts.
  • Issues when downloading files.
Affected platforms: 
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1607; Windows 10 Enterprise LTSC 2016; Windows 8.1; Windows 7 SP1
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server 2016; Windows Server 2012 R2; Windows Server 2012; Windows Server 2008 R2 SP1
Resolution: This issue was resolved in KB4493470.

Back to top
OS Build 14393.2724

January 08, 2019
KB4480961
Resolved
KB4493470
Resolved:
April 09, 2019
10:00 AM PT

Opened:
January 08, 2019
10:00 AM PT
MSXML6 may cause applications to stop responding
After installing KB4480961, MSXML6 causes applications to stop responding if an exception was thrown during node operations, such as appendChild(), insertBefore(), and moveNode().

The Group Policy editor may stop responding when editing a Group Policy Object (GPO) that contains Group Policy Preferences (GPP) for Internet Explorer 10 settings.

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10, version 1607; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 10 Enterprise LTSB 2015; Windows 8.1
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2; Windows Server 2012
Resolution: This issue was resolved in KB4493470.

Back to top
OS Build 14393.2724

January 08, 2019
KB4480961
Resolved
KB4493470
Resolved:
April 09, 2019
10:00 AM PT

Opened:
January 08, 2019
10:00 AM PT
+
DetailsOriginating updateStatusHistory
diff --git a/windows/release-information/status-windows-10-1703.yml b/windows/release-information/status-windows-10-1703.yml index f65d9e3c4d..10d69d6cc5 100644 --- a/windows/release-information/status-windows-10-1703.yml +++ b/windows/release-information/status-windows-10-1703.yml @@ -59,7 +59,7 @@ sections: - items: - type: markdown text: "
This table offers a summary of current active issues and those issues that have been resolved in the last 30 days.

-
DetailsOriginating updateStatusHistory
Cluster service may fail if the minimum password length is set to greater than 14
After installing KB4467684, the cluster service may fail to start with the error \"2245 (NERR_PasswordTooShort)\" if the Group Policy \"Minimum Password Length\" is configured with greater than 14 characters.

Affected platforms:
  • Client: Windows 10, version 1607; Windows 10 Enterprise LTSC 2016
  • Server: Windows Server 2016
Workaround: Set the domain default \"Minimum Password Length\" policy to less than or equal to 14 characters.

Next steps: Microsoft is working on a resolution and will provide an update in an upcoming release.

Back to top
OS Build 14393.2639

November 27, 2018
KB4467684
Mitigated
Last updated:
April 25, 2019
02:00 PM PT

Opened:
November 27, 2018
10:00 AM PT
SCVMM cannot enumerate and manage logical switches deployed on the host
For hosts managed by System Center Virtual Machine Manager (VMM), VMM cannot enumerate and manage logical switches deployed on the host after installing KB4467684.

Additionally, if you do not follow the best practices, a stop error may occur in vfpext.sys on the hosts.

Affected platforms:
  • Client: Windows 10, version 1607; Windows 10 Enterprise LTSC 2016
  • Server: Windows Server 2016
Workaround:
Run mofcomp on the following mof files on the affected host:
  • Scvmmswitchportsettings.mof
  • VMMDHCPSvr.mof
Follow the best practices while patching to avoid a stop error in vfpext.sys in an SDN v2 environment (NC managed hosts).

Back to top
OS Build 14393.2639

November 27, 2018
KB4467684
Mitigated
Last updated:
April 25, 2019
02:00 PM PT

Opened:
November 27, 2018
10:00 AM PT
Windows may not start on certain Lenovo and Fujitsu laptops with less than 8GB of RAM
After installing KB4467691, Windows may fail to start on certain Lenovo and Fujitsu laptops that have less than 8 GB of RAM.

Affected platforms:
  • Client: Windows 10, version 1607; Windows 10 Enterprise LTSC 2016
  • Server: Windows Server 2016
Workaround: Restart the affected machine using the Unified Extensible Firmware Interface (UEFI). Disable Secure Boot and then restart.

If BitLocker is enabled on your machine, you may have to go through BitLocker recovery after Secure Boot has been disabled.

Next steps: Lenovo and Fujitsu are aware of this issue. Please contact your OEM to ask if there is a firmware update available for your device.

Back to top
OS Build 14393.2608

November 13, 2018
KB4467691
Mitigated
Last updated:
February 19, 2019
10:00 AM PT

Opened:
November 13, 2018
10:00 AM PT
+
SummaryOriginating updateStatusLast updated
@@ -79,7 +79,7 @@ sections: - items: - type: markdown text: " -
SummaryOriginating updateStatusLast updated
Certain operations performed on a Cluster Shared Volume may fail
Certain operations, such as rename, performed on files or folders on a Cluster Shared Volume (CSV) may fail with the error, \"STATUS_BAD_IMPERSONATION_LEVEL (0xC00000A5)\".

See details >
OS Build 15063.1563

January 08, 2019
KB4480973
Mitigated
April 25, 2019
02:00 PM PT
Custom URI schemes may not start corresponding application
Custom URI schemes for application protocol handlers may not start the corresponding application for local intranet and trusted sites in Internet Explorer.

See details >
OS Build 15063.1689

March 12, 2019
KB4489871
Resolved
KB4493436
April 25, 2019
02:00 PM PT
End-user-defined characters (EUDC) may cause blue screen at startup
If you enable per font end-user-defined characters (EUDC), the system may stop working and a blue screen may appear at startup.

See details >
OS Build 15063.1716

March 19, 2019
KB4489888
Resolved
KB4493474
April 09, 2019
10:00 AM PT
+
DetailsOriginating updateStatusHistory
DetailsOriginating updateStatusHistory
Custom URI schemes may not start corresponding application
After installing KB4489871, custom URI schemes for application protocol handlers may not start the corresponding application for local intranet and trusted sites security zones on Internet Explorer.

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10, version 1607; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 10 Enterprise LTSB 2015; Windows 8.1; Windows 7 SP1 
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2; Windows Server 2008 R2 SP1
Resolution: This issue is resolved in KB4493436

Back to top
OS Build 15063.1689

March 12, 2019
KB4489871
Resolved
KB4493436
Resolved:
April 25, 2019
02:00 PM PT

Opened:
March 12, 2019
10:00 AM PT
End-user-defined characters (EUDC) may cause blue screen at startup
If you enable per font end-user-defined characters (EUDC), the system may stop working and a blue screen may appear at startup. This is not a common setting in non-Asian regions.

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10, version 1607; Windows 10 Enterprise LTSC 2016
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016
Resolution: This issue was resolved in KB4493474.

Back to top
OS Build 15063.1716

March 19, 2019
KB4489888
Resolved
KB4493474
Resolved:
April 09, 2019
10:00 AM PT

Opened:
March 19, 2019
10:00 AM PT
@@ -89,7 +89,7 @@ sections: - items: - type: markdown text: " - +
DetailsOriginating updateStatusHistory
DetailsOriginating updateStatusHistory
Embedded objects may display incorrectly
Any compound document (OLE) server application that places embedded objects into the Windows Metafile (WMF) using the PatBlt API may display embedded objects incorrectly. 
 
For example, if you paste a Microsoft Excel worksheet object into a Microsoft Word document, the cells may render with a different background color. 
 
Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10, version 1607; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 10 Enterprise LTSB 2015; Windows 8.1; Windows 7 SP1 
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2; Windows Server 2012; Windows Server 2008 R2 SP1; Windows Server 2008 SP2 
Resolution: This issue is resolved in KB4493474

Back to top
OS Build 15063.1631

February 12, 2019
KB4487020
Resolved
KB4493474
Resolved:
April 09, 2019
10:00 AM PT

Opened:
February 12, 2019
10:00 AM PT
" @@ -98,7 +98,7 @@ sections: - items: - type: markdown text: " - +
DetailsOriginating updateStatusHistory
DetailsOriginating updateStatusHistory
Certain operations performed on a Cluster Shared Volume may fail
Certain operations, such as rename, that you perform on files or folders that are on a Cluster Shared Volume (CSV) may fail with the error, “STATUS_BAD_IMPERSONATION_LEVEL (0xC00000A5)”. This occurs when you perform the operation on a CSV owner node from a process that doesn’t have administrator privilege. 

Affected platforms: 
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10, version 1607; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 10 Enterprise LTSB 2015; Windows 8.1
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2; Windows Server 2012
Workaround: Do one of the following: 
  • Perform the operation from a process that has administrator privilege. 
  • Perform the operation from a node that doesn’t have CSV ownership. 
Next steps: Microsoft is working on a resolution and will provide an update in an upcoming release.

Back to top
OS Build 15063.1563

January 08, 2019
KB4480973
Mitigated
Last updated:
April 25, 2019
02:00 PM PT

Opened:
January 08, 2019
10:00 AM PT
MSXML6 may cause applications to stop responding
After installing KB4480973, MSXML6 causes applications to stop responding if an exception was thrown during node operations, such as appendChild(), insertBefore(), and moveNode().

The Group Policy editor may stop responding when editing a Group Policy Object (GPO) that contains Group Policy Preferences (GPP) for Internet Explorer 10 settings.

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10, version 1607; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 10 Enterprise LTSB 2015; Windows 8.1
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2; Windows Server 2012
Resolution: This issue was resolved in KB4493474.

Back to top
OS Build 15063.1563

January 08, 2019
KB4480973
Resolved
KB4493474
Resolved:
April 09, 2019
10:00 AM PT

Opened:
January 08, 2019
10:00 AM PT
diff --git a/windows/release-information/status-windows-10-1709.yml b/windows/release-information/status-windows-10-1709.yml index dd3b7632b0..45e3ada4b8 100644 --- a/windows/release-information/status-windows-10-1709.yml +++ b/windows/release-information/status-windows-10-1709.yml @@ -59,7 +59,7 @@ sections: - items: - type: markdown text: "
This table offers a summary of current active issues and those issues that have been resolved in the last 30 days.

- +
SummaryOriginating updateStatusLast updated
@@ -81,7 +81,7 @@ sections: - items: - type: markdown text: " -
SummaryOriginating updateStatusLast updated
Zone transfers over TCP may fail
Zone transfers between primary and secondary DNS servers over the Transmission Control Protocol (TCP) may fail.

See details >
OS Build 16299.1127

April 25, 2019
KB4493440
Investigating
April 25, 2019
02:00 PM PT
Certain operations performed on a Cluster Shared Volume may fail
Certain operations, such as rename, performed on files or folders on a Cluster Shared Volume (CSV) may fail with the error, \"STATUS_BAD_IMPERSONATION_LEVEL (0xC00000A5)\".

See details >
OS Build 16299.904

January 08, 2019
KB4480978
Mitigated
April 25, 2019
02:00 PM PT
Custom URI schemes may not start corresponding application
Custom URI schemes for application protocol handlers may not start the corresponding application for local intranet and trusted sites in Internet Explorer.

See details >
OS Build 16299.1029

March 12, 2019
KB4489886
Resolved
KB4493440
April 25, 2019
02:00 PM PT
+
DetailsOriginating updateStatusHistory
DetailsOriginating updateStatusHistory
Zone transfers over TCP may fail
Zone transfers between primary and secondary DNS servers over the Transmission Control Protocol (TCP) may fail after installing KB4493440
 
Affected platforms:  
  • Client: Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1607; Windows 10 Enterprise LTSC 2016 
  • Server: Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016 
Next steps: Microsoft is working on a resolution and will provide an update in an upcoming release. 

Back to top
OS Build 16299.1127

April 25, 2019
KB4493440
Investigating
Last updated:
April 25, 2019
02:00 PM PT

Opened:
April 25, 2019
02:00 PM PT
" @@ -90,7 +90,7 @@ sections: - items: - type: markdown text: " - +
DetailsOriginating updateStatusHistory
@@ -101,7 +101,7 @@ sections: - items: - type: markdown text: " -
DetailsOriginating updateStatusHistory
Custom URI schemes may not start corresponding application
After installing KB4489886, custom URI schemes for application protocol handlers may not start the corresponding application for local intranet and trusted sites security zones on Internet Explorer.

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10, version 1607; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 10 Enterprise LTSB 2015; Windows 8.1; Windows 7 SP1 
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2; Windows Server 2008 R2 SP1
Resolution: This issue is resolved in KB4493440

Back to top
OS Build 16299.1029

March 12, 2019
KB4489886
Resolved
KB4493440
Resolved:
April 25, 2019
02:00 PM PT

Opened:
March 12, 2019
10:00 AM PT
End-user-defined characters (EUDC) may cause blue screen at startup
If you enable per font end-user-defined characters (EUDC), the system may stop working and a blue screen may appear at startup. This is not a common setting in non-Asian regions.

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10, version 1607; Windows 10 Enterprise LTSC 2016
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016
Resolution: This issue is resolved in KB4493441.

Back to top
OS Build 16299.1059

March 19, 2019
KB4489890
Resolved
KB4493441
Resolved:
April 09, 2019
10:00 AM PT

Opened:
March 19, 2019
10:00 AM PT
Stop error when attempting to start SSH from WSL
After applying KB4489886, a stop error occurs when attempting to start the Secure Shell (SSH) client program from Windows Subsystem for Linux (WSL) with agent forwarding enabled using a command line switch (ssh –A) or a configuration setting.

Affected platforms:
  • Client: Windows 10, version 1803; Windows 10, version 1709
  • Server: Windows Server, version 1803; Windows Server, version 1709
Resolution: This issue is resolved in KB4493441.

Back to top
OS Build 16299.1029

March 12, 2019
KB4489886
Resolved
KB4493441
Resolved:
April 09, 2019
10:00 AM PT

Opened:
March 12, 2019
10:00 AM PT
+
DetailsOriginating updateStatusHistory
DetailsOriginating updateStatusHistory
Embedded objects may display incorrectly
Any compound document (OLE) server application that places embedded objects into the Windows Metafile (WMF) using the PatBlt API may display embedded objects incorrectly. 
 
For example, if you paste a Microsoft Excel worksheet object into a Microsoft Word document, the cells may render with a different background color. 
 
Affected platforms:  
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10, version 1607; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 10 Enterprise LTSB 2015; Windows 8.1; Windows 7 SP1 
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2; Windows Server 2012; Windows Server 2008 R2 SP1; Windows Server 2008 SP2 
Resolution: This issue is resolved in KB4493441

Back to top
OS Build 16299.967

February 12, 2019
KB4486996
Resolved
KB4493441
Resolved:
April 09, 2019
10:00 AM PT

Opened:
February 12, 2019
10:00 AM PT
" @@ -110,7 +110,7 @@ sections: - items: - type: markdown text: " - +
DetailsOriginating updateStatusHistory
DetailsOriginating updateStatusHistory
Certain operations performed on a Cluster Shared Volume may fail
Certain operations, such as rename, that you perform on files or folders that are on a Cluster Shared Volume (CSV) may fail with the error, \"STATUS_BAD_IMPERSONATION_LEVEL (0xC00000A5)\". This occurs when you perform the operation on a CSV owner node from a process that doesn’t have administrator privilege. 

Affected platforms: 
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10, version 1607; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 10 Enterprise LTSB 2015; Windows 8.1
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2; Windows Server 2012
Workaround: Do one of the following:
  • Perform the operation from a process that has administrator privilege. 
  • Perform the operation from a node that doesn’t have CSV ownership. 
Next steps: Microsoft is working on a resolution and will provide an update in an upcoming release.

Back to top
OS Build 16299.904

January 08, 2019
KB4480978
Mitigated
Last updated:
April 25, 2019
02:00 PM PT

Opened:
January 08, 2019
10:00 AM PT
MSXML6 causes applications to stop responding if an exception was thrown
After installing KB4480978, MSXML6 causes applications to stop responding if an exception was thrown during node operations, such as appendChild(), insertBefore(), and moveNode().

The Group Policy editor may stop responding when editing a Group Policy Object (GPO) that contains Group Policy Preferences (GPP) for Internet Explorer 10 settings.

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10, version 1607; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 10 Enterprise LTSB 2015; Windows 8.1
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2; Windows Server 2012
Resolution: This issue is resolved in KB4493441.

Back to top
OS Build 16299.904

January 08, 2019
KB4480978
Resolved
KB4493441
Resolved:
April 09, 2019
10:00 AM PT

Opened:
January 08, 2019
10:00 AM PT
diff --git a/windows/release-information/status-windows-10-1803.yml b/windows/release-information/status-windows-10-1803.yml index b1412e97e8..3e58d9c048 100644 --- a/windows/release-information/status-windows-10-1803.yml +++ b/windows/release-information/status-windows-10-1803.yml @@ -59,7 +59,7 @@ sections: - items: - type: markdown text: "
This table offers a summary of current active issues and those issues that have been resolved in the last 30 days.

- +
SummaryOriginating updateStatusLast updated
@@ -83,7 +83,7 @@ sections: - items: - type: markdown text: " -
SummaryOriginating updateStatusLast updated
Zone transfers over TCP may fail
Zone transfers between primary and secondary DNS servers over the Transmission Control Protocol (TCP) may fail.

See details >
OS Build 17134.753

April 25, 2019
KB4493437
Investigating
April 25, 2019
02:00 PM PT
Issue using PXE to start a device from WDS
Using PXE to start a device from a WDS server configured to use Variable Window Extension may cause the connection to the WDS server to terminate prematurely.

See details >
OS Build 17134.648

March 12, 2019
KB4489868
Mitigated
April 25, 2019
02:00 PM PT
Certain operations performed on a Cluster Shared Volume may fail
Certain operations, such as rename, performed on files or folders on a Cluster Shared Volume (CSV) may fail with the error, \"STATUS_BAD_IMPERSONATION_LEVEL (0xC00000A5)\".

See details >
OS Build 17134.523

January 08, 2019
KB4480966
Mitigated
April 25, 2019
02:00 PM PT
+
DetailsOriginating updateStatusHistory
DetailsOriginating updateStatusHistory
Zone transfers over TCP may fail
Zone transfers between primary and secondary DNS servers over the Transmission Control Protocol (TCP) may fail after installing KB4493437
 
Affected platforms:  
  • Client: Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1607; Windows 10 Enterprise LTSC 2016 
  • Server: Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016 
Next steps: Microsoft is working on a resolution and will provide an update in an upcoming release. 

Back to top
OS Build 17134.753

April 25, 2019
KB4493437
Investigating
Last updated:
April 25, 2019
02:00 PM PT

Opened:
April 25, 2019
02:00 PM PT
" @@ -92,7 +92,7 @@ sections: - items: - type: markdown text: " - +
DetailsOriginating updateStatusHistory
@@ -105,7 +105,7 @@ sections: - items: - type: markdown text: " -
DetailsOriginating updateStatusHistory
Issue using PXE to start a device from WDS
After installing KB4489868, there may be issues using the Preboot Execution Environment (PXE) to start a device from a Windows Deployment Services (WDS) server configured to use Variable Window Extension. This may cause the connection to the WDS server to terminate prematurely while downloading the image. This issue does not affect clients or devices that are not using Variable Window Extension. 

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1607; Windows 10 Enterprise LTSC 2016; Windows 8.1
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server 2016; Windows Server 2012 R2; Windows Server 2012
Workaround: To mitigate the issue, disable the Variable Window Extension on WDS server using one of the following options:

Option 1: 
Open an Administrator Command prompt and type the following:  
Wdsutil /Set-TransportServer /EnableTftpVariableWindowExtension:No
 

 Option 2: 
Use the Windows Deployment Services UI to make the following adjustment:  
  1. Open Windows Deployment Services from Windows Administrative Tools. 
  2. Expand Servers and right-click a WDS server. 
  3. Open its properties and clear the Enable Variable Window Extension box on the TFTP tab.  
Option 3: 
Set the following registry value to 0:
HKLM\\System\\CurrentControlSet\\Services\\WDSServer\\Providers\\WDSTFTP\\EnableVariableWindowExtension  

Restart the WDSServer service after disabling the Variable Window Extension. 
 
Next steps: Microsoft is working on a resolution and will provide an update in an upcoming release. 

Back to top
OS Build 17134.648

March 12, 2019
KB4489868
Mitigated
Last updated:
April 25, 2019
02:00 PM PT

Opened:
March 12, 2019
10:00 AM PT
Custom URI schemes may not start corresponding application
After installing KB4489868, custom URI schemes for application protocol handlers may not start the corresponding application for local intranet and trusted sites security zones on Internet Explorer. 

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10, version 1607; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 10 Enterprise LTSB 2015; Windows 8.1; Windows 7 SP1 
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2; Windows Server 2008 R2 SP1
Resolution: This issue is resolved in KB4493437

Back to top
OS Build 17134.648

March 12, 2019
KB4489868
Resolved
KB4493437
Resolved:
April 25, 2019
02:00 PM PT

Opened:
March 12, 2019
10:00 AM PT
+
DetailsOriginating updateStatusHistory
DetailsOriginating updateStatusHistory
Embedded objects may display incorrectly
Any compound document (OLE) server application that places embedded objects into the Windows Metafile (WMF) using the PatBlt API may display embedded objects incorrectly. 
 
For example, if you paste a Microsoft Excel worksheet object into a Microsoft Word document, the cells may render with a different background color. 
 
Affected platforms:  
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10, version 1607; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 10 Enterprise LTSB 2015; Windows 8.1; Windows 7 SP1 
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2; Windows Server 2012; Windows Server 2008 R2 SP1; Windows Server 2008 SP2 
Resolution: This issue is resolved in KB4493464

Back to top
OS Build 17134.590

February 12, 2019
KB4487017
Resolved
KB4493464
Resolved:
April 09, 2019
10:00 AM PT

Opened:
February 12, 2019
10:00 AM PT
" @@ -114,7 +114,7 @@ sections: - items: - type: markdown text: " - +
DetailsOriginating updateStatusHistory
diff --git a/windows/release-information/status-windows-10-1809-and-windows-server-2019.yml b/windows/release-information/status-windows-10-1809-and-windows-server-2019.yml index 760ba2533b..82bcf3314f 100644 --- a/windows/release-information/status-windows-10-1809-and-windows-server-2019.yml +++ b/windows/release-information/status-windows-10-1809-and-windows-server-2019.yml @@ -64,7 +64,7 @@ sections: - items: - type: markdown text: "
This table offers a summary of current active issues and those issues that have been resolved in the last 30 days.

-
DetailsOriginating updateStatusHistory
Certain operations performed on a Cluster Shared Volume may fail
Certain operations, such as rename, that you perform on files or folders that are on a Cluster Shared Volume (CSV) may fail with the error, \"STATUS_BAD_IMPERSONATION_LEVEL (0xC00000A5)\". This occurs when you perform the operation on a CSV owner node from a process that doesn’t have administrator privilege.

Affected platforms: 
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10, version 1607; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 10 Enterprise LTSB 2015; Windows 8.1
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2; Windows Server 2012
Workaround: Do one of the following:
  • Perform the operation from a process that has administrator privilege. 
  • Perform the operation from a node that doesn’t have CSV ownership. 
Next steps: Microsoft is working on a resolution and will provide an update in an upcoming release.

Back to top
OS Build 17134.523

January 08, 2019
KB4480966
Mitigated
Last updated:
April 25, 2019
02:00 PM PT

Opened:
January 08, 2019
10:00 AM PT
First character of the Japanese era name not recognized
After installing KB4480976, the first character of the Japanese era name is not recognized as an abbreviation and may cause date parsing issues.

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10, version 1607; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 10 Enterprise LTSB 2015; Windows 8.1; Windows 7 SP1
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2; Windows Server 2012; Windows Server 2008 R2 SP1; Windows Server 2008 SP2
Resolution: This issue is resolved in KB4487029

Back to top
OS Build 17134.556

January 15, 2019
KB4480976
Resolved
KB4487029
Resolved:
February 19, 2019
02:00 PM PT

Opened:
January 08, 2019
10:00 AM PT
MSXML6 may cause applications to stop responding
After installing KB4480966, MSXML6 causes applications to stop responding if an exception was thrown during node operations, such as appendChild(), insertBefore(), and moveNode().

The Group Policy editor may stop responding when editing a Group Policy Object (GPO) that contains Group Policy Preferences (GPP) for Internet Explorer 10 settings.

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10, version 1607; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 10 Enterprise LTSB 2015; Windows 8.1
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2; Windows Server 2012
Resolution: This issue was resolved in KB4493464

Back to top
OS Build 17134.523

January 08, 2019
KB4480966
Resolved
KB4493464
Resolved:
April 09, 2019
10:00 AM PT

Opened:
January 08, 2019
10:00 AM PT
+
SummaryOriginating updateStatusLast updated
@@ -89,7 +89,7 @@ sections: - items: - type: markdown text: " -
SummaryOriginating updateStatusLast updated
System may be unresponsive after restart if ArcaBit antivirus software installed
Devices with ArcaBit antivirus software installed may become unresponsive upon restart.

See details >
OS Build 17763.437

April 09, 2019
KB4493509
Mitigated
April 25, 2019
02:00 PM PT
Custom URI schemes may not start corresponding application
Custom URI schemes for application protocol handlers may not start the corresponding application for local intranet and trusted sites in Internet Explorer.

See details >
OS Build 17763.379

March 12, 2019
KB4489899
Mitigated
April 09, 2019
10:00 AM PT
Issue using PXE to start a device from WDS
Using PXE to start a device from a WDS server configured to use Variable Window Extension may cause the connection to the WDS server to terminate prematurely.

See details >
OS Build 17763.379

March 12, 2019
KB4489899
Mitigated
April 09, 2019
10:00 AM PT
+
DetailsOriginating updateStatusHistory
DetailsOriginating updateStatusHistory
System may be unresponsive after restart if ArcaBit antivirus software installed
Microsoft and ArcaBit have identified an issue on devices with ArcaBit antivirus software installed that may cause the system to become unresponsive upon restart after installing KB4493509
 
Microsoft has temporarily blocked devices from receiving this update if ArcaBit antivirus software is installed. 

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 8.1; Windows 7 SP1
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server 2012 R2; Windows Server 2008 R2 SP1
Workaround: ArcaBit has released an update to address this issue. For more information, see the Arcabit support article.

Back to top
OS Build 17763.437

April 09, 2019
KB4493509
Mitigated
Last updated:
April 25, 2019
02:00 PM PT

Opened:
April 09, 2019
10:00 AM PT
End-user-defined characters (EUDC) may cause blue screen at startup
If you enable per font end-user-defined characters (EUDC), the system will stop working and a blue screen may appear at startup. This is not a common setting in non-Asian regions.

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10, version 1607; Windows 10 Enterprise LTSC 2016
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016
Resolution: This issue was resolved in KB4493509.

Back to top
OS Build 17763.404

April 02, 2019
KB4490481
Resolved
KB4493509
Resolved:
April 09, 2019
10:00 AM PT

Opened:
April 02, 2019
10:00 AM PT
@@ -99,7 +99,7 @@ sections: - items: - type: markdown text: " - +
DetailsOriginating updateStatusHistory
@@ -111,7 +111,7 @@ sections: - items: - type: markdown text: " -
DetailsOriginating updateStatusHistory
Custom URI schemes may not start corresponding application
After installing KB4489899, custom URI schemes for application protocol handlers may not start the corresponding application for local intranet and trusted sites security zones on Internet Explorer.

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10, version 1607; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 10 Enterprise LTSB 2015; Windows 8.1; Windows 7 SP1 
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2; Windows Server 2008 R2 SP1
Workaround: Right-click the URL link to open it in a new window or tab, or enable Protected Mode in Internet Explorer for local intranet and trusted sites
  1. Go to Tools > Internet options > Security.
  2. Within Select a zone to view of change security settings, select Local intranet and then select Enable Protected Mode.
  3. Select Trusted Sites and then select Enable Protected Mode
  4. Select OK.
You must restart the browser after making these changes. 
 
Next steps: Microsoft is working on a resolution and will provide an update in an upcoming release. 

Back to top
OS Build 17763.379

March 12, 2019
KB4489899
Mitigated
Last updated:
April 09, 2019
10:00 AM PT

Opened:
March 12, 2019
10:00 AM PT
Issue using PXE to start a device from WDS
After installing KB4489899, there may be issues using the Preboot Execution Environment (PXE) to start a device from a Windows Deployment Services (WDS) server configured to use Variable Window Extension. This may cause the connection to the WDS server to terminate prematurely while downloading the image. This issue does not affect clients or devices that are not using Variable Window Extension. 

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1607; Windows 10 Enterprise LTSC 2016; Windows 8.1
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server 2016; Windows Server 2012 R2; Windows Server 2012
Workaround: To mitigate the issue, disable the Variable Window Extension on WDS server using one of the following options:

Option 1:
Open an Administrator Command prompt and type the following:
Wdsutil /Set-TransportServer /EnableTftpVariableWindowExtension:No 
 

Option 2:
Use the Windows Deployment Services UI to make the following adjustment: 
  1. Open Windows Deployment Services from Windows Administrative Tools. 
  2. Expand Servers and right-click a WDS server. 
  3. Open its properties and clear the Enable Variable Window Extension box on the TFTP tab.
Option 3:
Set the following registry value to 0:
HKLM\\System\\CurrentControlSet\\Services\\WDSServer\\Providers\\WDSTFTP\\EnableVariableWindowExtension  

Restart the WDSServer service after disabling the Variable Window Extension. 

Next steps: Microsoft is working on a resolution and will provide an update in an upcoming release. 

Back to top
OS Build 17763.379

March 12, 2019
KB4489899
Mitigated
Last updated:
April 09, 2019
10:00 AM PT

Opened:
March 12, 2019
10:00 AM PT
+
DetailsOriginating updateStatusHistory
DetailsOriginating updateStatusHistory
Embedded objects may display incorrectly
Any compound document (OLE) server application that places embedded objects into the Windows Metafile (WMF) using the PatBlt API may display embedded objects incorrectly. 
 
For example, if you paste a Microsoft Excel worksheet object into a Microsoft Word document, the cells may render with a different background color. 
 
Affected platforms:  
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10, version 1607; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 10 Enterprise LTSB 2015; Windows 8.1; Windows 7 SP1  
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2; Windows Server 2012; Windows Server 2008 R2 SP1; Windows Server 2008 SP2  
Resolution: This issue is resolved in KB4493509.  

Back to top
OS Build 17763.316

February 12, 2019
KB4487044
Resolved
KB4493509
Resolved:
April 09, 2019
10:00 AM PT

Opened:
February 12, 2019
10:00 AM PT
" @@ -120,7 +120,7 @@ sections: - items: - type: markdown text: " - +
DetailsOriginating updateStatusHistory
@@ -131,7 +131,7 @@ sections: - items: - type: markdown text: " -
DetailsOriginating updateStatusHistory
Certain operations performed on a Cluster Shared Volume may fail
Certain operations, such as rename, that you perform on files or folders that are on a Cluster Shared Volume (CSV) may fail with the error, \"STATUS_BAD_IMPERSONATION_LEVEL (0xC00000A5)\". This occurs when you perform the operation on a CSV owner node from a process that doesn’t have administrator privilege. 

Affected platforms: 
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10, version 1607; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 10 Enterprise LTSB 2015; Windows 8.1
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2; Windows Server 2012
Workaround: Do one of the following:  
  • Perform the operation from a process that has administrator privilege. 
  • Perform the operation from a node that doesn’t have CSV ownership. 
Next steps: Microsoft is working on a resolution and will provide an update in an upcoming release.

Back to top
OS Build 17763.253

January 08, 2019
KB4480116
Mitigated
Last updated:
January 08, 2019
10:00 AM PT

Opened:
January 08, 2019
10:00 AM PT
Internet Explorer 11 authentication issue with multiple concurrent logons
After installing KB4480116, Internet Explorer 11 and other applications that use WININET.DLL may have authentication issues. This occurs when two or more people use the same user account for multiple, concurrent login sessions on the same Windows Server machine, including Remote Desktop Protocol (RDP) and Terminal Server logons. Symptoms reported by customers include, but may not be limited to: 
  • Cache size and location show zero or empty. 
  • Keyboard shortcuts may not work properly. 
  • Webpages may intermittently fail to load or render correctly. 
  • Issues with credential prompts. 
  • Issues when downloading files. 
Affected platforms: 
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1607; Windows 10 Enterprise LTSC 2016; Windows 8.1; Windows 7 SP1
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server 2016; Windows Server 2012 R2; Windows Server 2012; Windows Server 2008 R2 SP1
Resolution: This issue was resolved in KB4493509

Back to top
OS Build 17763.253

January 08, 2019
KB4480116
Resolved
KB4493509
Resolved:
April 09, 2019
10:00 AM PT

Opened:
January 08, 2019
10:00 AM PT
MSXML6 may cause applications to stop responding
After installing KB4480116, MSXML6 causes applications to stop responding if an exception was thrown during node operations, such as appendChild(), insertBefore(), and moveNode().
 
The Group Policy editor may stop responding when editing a Group Policy Object (GPO) that contains Group Policy Preferences (GPP) for Internet Explorer 10 settings. 

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10, version 1607; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 10 Enterprise LTSB 2015; Windows 8.1
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2; Windows Server 2012
Resolution: This issue was resolved in KB4493509

Back to top
OS Build 17763.253

January 08, 2019
KB4480116
Resolved
KB4493509
Resolved:
April 09, 2019
10:00 AM PT

Opened:
January 08, 2019
10:00 AM PT
+
DetailsOriginating updateStatusHistory
DetailsOriginating updateStatusHistory
Audio not working on monitors or TV connected to a PC via HDMI, USB, or DisplayPort
Upgrade block: Microsoft has identified issues with certain new Intel display drivers. Intel inadvertently released versions of its display driver (versions 24.20.100.6344, 24.20.100.6345) to OEMs that accidentally turned on unsupported features in Windows. 
 
As a result, after updating to Windows 10, version 1809, audio playback from a monitor or television connected to a PC via HDMI, USB-C, or a DisplayPort may not function correctly on devices with these drivers.

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019
  • Server: Windows Server, version 1809; Windows Server 2019 
Next steps: Intel has released updated drivers to OEM device manufacturers. OEMs need to make the updated driver available via Windows Update.

For more information, see the Intel Customer Support article.

Note: This Intel display driver issue is different from the Intel Smart Sound Technology driver (version 09.21.00.3755) audio issue previously documented.

Back to top
OS Build 17763.134

November 13, 2018
KB4467708
Mitigated
Last updated:
March 15, 2019
12:00 PM PT

Opened:
November 13, 2018
10:00 AM PT
" diff --git a/windows/release-information/status-windows-7-and-windows-server-2008-r2-sp1.yml b/windows/release-information/status-windows-7-and-windows-server-2008-r2-sp1.yml index 93244396c1..9c9b11c520 100644 --- a/windows/release-information/status-windows-7-and-windows-server-2008-r2-sp1.yml +++ b/windows/release-information/status-windows-7-and-windows-server-2008-r2-sp1.yml @@ -59,7 +59,7 @@ sections: - items: - type: markdown text: "
This table offers a summary of current active issues and those issues that have been resolved in the last 30 days.

- +
SummaryOriginating updateStatusLast updated
@@ -84,7 +84,7 @@ sections: - items: - type: markdown text: " -
SummaryOriginating updateStatusLast updated
System may be unresponsive after restart if Avira antivirus software installed
Devices with Avira antivirus software installed may become unresponsive upon restart.

See details >
April 09, 2019
KB4493472
Investigating
April 25, 2019
02:00 PM PT
Authentication may fail for services after the Kerberos ticket expires
Authentication may fail for services that require unconstrained delegation after the Kerberos ticket expires.

See details >
March 12, 2019
KB4489878
Mitigated
April 25, 2019
02:00 PM PT
System unresponsive after restart if Sophos Endpoint Protection installed
Devices with Sophos Endpoint Protection installed and managed by Sophos Central or Sophos Enterprise Console (SEC) may become unresponsive upon restart.

See details >
April 09, 2019
KB4493472
Mitigated
April 25, 2019
02:00 PM PT
+
DetailsOriginating updateStatusHistory
@@ -97,7 +97,7 @@ sections: - items: - type: markdown text: " -
DetailsOriginating updateStatusHistory
System may be unresponsive after restart if Avira antivirus software installed
Microsoft and Avira have identified an issue on devices with Avira antivirus software installed that may cause the system to become unresponsive upon restart after installing KB4493472.

Microsoft has temporarily blocked devices from receiving this update if Avira antivirus software is installed.

Affected platforms: 
  • Client: Windows 8.1; Windows 7 SP1 
  • Server: Windows Server 2012 R2; Windows Server 2012; Windows Server 2008 R2 SP1; Windows Server 2008 SP2
Next steps: We are presently investigating this issue with Avira and will provide an update when available.

Back to top
April 09, 2019
KB4493472
Investigating
Last updated:
April 25, 2019
02:00 PM PT

Opened:
April 09, 2019
10:00 AM PT
System unresponsive after restart if Sophos Endpoint Protection installed
Microsoft and Sophos have identified an issue on devices with Sophos Endpoint Protection installed and managed by either Sophos Central or Sophos Enterprise Console (SEC) that may cause the system to become unresponsive upon restart after installing KB4493472.

Microsoft has temporarily blocked devices from receiving this update if the Sophos Endpoint is installed until a solution is available.

Affected platforms: 
  • Client: Windows 8.1; Windows 7 SP1
  • Server: Windows Server 2012 R2; Windows Server 2012; Windows Server 2008 R2 SP1; Windows Server 2008 SP2
Guidance for Sophos Endpoint and Sophos Enterprise Console customers can be found in the Sophos support article.

Back to top
April 09, 2019
KB4493472
Mitigated
Last updated:
April 25, 2019
02:00 PM PT

Opened:
April 09, 2019
10:00 AM PT
System may be unresponsive after restart if ArcaBit antivirus software installed
Microsoft and ArcaBit have identified an issue on devices with ArcaBit antivirus software installed that may cause the system to become unresponsive upon restart after installing KB4493472.

Microsoft has temporarily blocked devices from receiving this update if ArcaBit antivirus software is installed.

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 8.1; Windows 7 SP1
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server 2012 R2; Windows Server 2008 R2 SP1
Workaround: ArcaBit has released an update to address this issue. For more information, see the Arcabit support article.

Back to top
April 09, 2019
KB4493472
Mitigated
Last updated:
April 25, 2019
02:00 PM PT

Opened:
April 09, 2019
10:00 AM PT
+
DetailsOriginating updateStatusHistory
@@ -108,7 +108,7 @@ sections: - items: - type: markdown text: " -
DetailsOriginating updateStatusHistory
Authentication may fail for services after the Kerberos ticket expires
After installing KB4489878, some customers report that authentication fails for services that require unconstrained delegation after the Kerberos ticket expires (the default is 10 hours). For example, the SQL server service fails.

Affected platforms: 
  • Client: Windows 7 SP1
  • Server: Windows Server 2008 R2 SP1; Windows Server 2008 SP2
Workaround: To mitigate this issue, use one of the following options:
  • Option 1: Purge the Kerberos tickets on the application server. After the Kerberos ticket expires, the issue will occur again, and you must purge the tickets again.
  • Option 2: If purging does not mitigate the issue, restart the application; for example, restart the Internet Information Services (IIS) app pool associated with the SQL server.
  • Option 3: Use constrained delegation.
Next steps: Microsoft is working on a resolution and will provide an update in an upcoming release.

Back to top
March 12, 2019
KB4489878
Mitigated
Last updated:
April 25, 2019
02:00 PM PT

Opened:
March 12, 2019
10:00 AM PT
Custom URI schemes may not start corresponding application
After installing KB4489878, custom URI schemes for application protocol handlers may not start the corresponding application for local intranet and trusted sites on Internet Explorer.

Affected platforms: 
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10, version 1607; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 10 Enterprise LTSB 2015; Windows 8.1; Windows 7 SP1 
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2; Windows Server 2008 R2 SP1 
Resolution: This issue is resolved in KB4493472.

Back to top
March 12, 2019
KB4489878
Resolved
KB4493472
Resolved:
April 09, 2019
10:00 AM PT

Opened:
March 12, 2019
10:00 AM PT
NETDOM.EXE fails to run
After installing KB4489878, NETDOM.EXE fails to run, and the on-screen error, “The command failed to complete successfully.” appears.

Affected platforms: 
  • Client: Windows 7 SP1
  • Server: Windows Server 2008 R2 SP1; Windows Server 2008 SP2
Resolution: This issue is resolved in KB4493472.

Back to top
March 12, 2019
KB4489878
Resolved
KB4493472
Resolved:
April 09, 2019
10:00 AM PT

Opened:
March 12, 2019
10:00 AM PT
+
DetailsOriginating updateStatusHistory
DetailsOriginating updateStatusHistory
Embedded objects may display incorrectly
Any compound document (OLE) server application that places embedded objects into the Windows Metafile (WMF) using the PatBlt API may display embedded objects incorrectly. 
 
For example, if you paste a Microsoft Excel worksheet object into a Microsoft Word document, the cells may render with a different background color. 
 
Affected platforms:  
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10, version 1607; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 10 Enterprise LTSB 2015; Windows 8.1; Windows 7 SP1 
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2; Windows Server 2012; Windows Server 2008 R2 SP1; Windows Server 2008 SP2 
Resolution: This issue is resolved in KB4493472

Back to top
February 12, 2019
KB4486563
Resolved
KB4493472
Resolved:
April 09, 2019
10:00 AM PT

Opened:
February 12, 2019
10:00 AM PT
" @@ -117,7 +117,7 @@ sections: - items: - type: markdown text: " - +
DetailsOriginating updateStatusHistory
DetailsOriginating updateStatusHistory
Internet Explorer 11 authentication issue with multiple concurrent logons
After installing KB4480970, Internet Explorer 11 and other applications that use WININET.DLL may have authentication issues. This occurs when two or more people use the same user account for multiple, concurrent login sessions on the same Windows Server machine, including Remote Desktop Protocol (RDP) and Terminal Server logons. Symptoms reported by customers include, but may not be limited to:
  • Cache size and location show zero or empty.
  • Keyboard shortcuts may not work properly.
  • Webpages may intermittently fail to load or render correctly.
  • Issues with credential prompts.
  • Issues when downloading files.
Affected platforms: 
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1607; Windows 10 Enterprise LTSC 2016; Windows 8.1; Windows 7 SP1
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server 2016; Windows Server 2012 R2; Windows Server 2012; Windows Server 2008 R2 SP1
Resolution: This issue is resolved in KB4493472.

Back to top
January 08, 2019
KB4480970
Resolved
KB4493472
Resolved:
April 09, 2019
10:00 AM PT

Opened:
January 08, 2019
10:00 AM PT
" diff --git a/windows/release-information/status-windows-8.1-and-windows-server-2012-r2.yml b/windows/release-information/status-windows-8.1-and-windows-server-2012-r2.yml index 5efe01fae9..4a94eba224 100644 --- a/windows/release-information/status-windows-8.1-and-windows-server-2012-r2.yml +++ b/windows/release-information/status-windows-8.1-and-windows-server-2012-r2.yml @@ -59,7 +59,7 @@ sections: - items: - type: markdown text: "
This table offers a summary of current active issues and those issues that have been resolved in the last 30 days.

- +
SummaryOriginating updateStatusLast updated
@@ -85,7 +85,7 @@ sections: - items: - type: markdown text: " -
SummaryOriginating updateStatusLast updated
System may be unresponsive after restart if Avira antivirus software installed
Devices with Avira antivirus software installed may become unresponsive upon restart.

See details >
April 09, 2019
KB4493446
Investigating
April 25, 2019
02:00 PM PT
Issue using PXE to start a device from WDS
There may be issues using the Preboot Execution Environment (PXE) to start a device from a Windows Deployment Services (WDS) server configured to use Variable Window Extension.

See details >
March 12, 2019
KB4489881
Mitigated
April 25, 2019
02:00 PM PT
System unresponsive after restart if Sophos Endpoint Protection installed
Devices with Sophos Endpoint Protection installed and managed by Sophos Central or Sophos Enterprise Console (SEC) may become unresponsive upon restart.

See details >
April 09, 2019
KB4493446
Mitigated
April 25, 2019
02:00 PM PT
+
DetailsOriginating updateStatusHistory
@@ -98,7 +98,7 @@ sections: - items: - type: markdown text: " -
DetailsOriginating updateStatusHistory
System may be unresponsive after restart if Avira antivirus software installed
Microsoft and Avira have identified an issue on devices with Avira antivirus software installed that may cause the system to become unresponsive upon restart after installing KB4493446.

Microsoft has temporarily blocked devices from receiving this update if Avira antivirus software is installed.

Affected platforms: 
  • Client: Windows 8.1; Windows 7 SP1 
  • Server: Windows Server 2012 R2; Windows Server 2012; Windows Server 2008 R2 SP1; Windows Server 2008 SP2 
Next steps: We are presently investigating this issue with Avira and will provide an update when available.

Back to top
April 09, 2019
KB4493446
Investigating
Last updated:
April 25, 2019
02:00 PM PT

Opened:
April 09, 2019
10:00 AM PT
System unresponsive after restart if Sophos Endpoint Protection installed
Microsoft and Sophos have identified an issue on devices with Sophos Endpoint Protection installed and managed by either Sophos Central or Sophos Enterprise Console (SEC) that may cause the system to become unresponsive upon restart after installing KB4493446.

Microsoft has temporarily blocked devices from receiving this update if the Sophos Endpoint is installed until a solution is available.

Affected platforms: 
  • Client: Windows 8.1; Windows 7 SP1
  • Server: Windows Server 2012 R2; Windows Server 2012; Windows Server 2008 R2 SP1; Windows Server 2008 SP2
Guidance for Sophos Endpoint and Sophos Enterprise Console customers can be found in the Sophos support article.

Back to top
April 09, 2019
KB4493446
Mitigated
Last updated:
April 25, 2019
02:00 PM PT

Opened:
April 09, 2019
10:00 AM PT
System may be unresponsive after restart if ArcaBit antivirus software installed
Microsoft and ArcaBit have identified an issue on devices with ArcaBit antivirus software installed that may cause the system to become unresponsive upon restart after installing KB4493446.

Microsoft has temporarily blocked devices from receiving this update if ArcaBit antivirus software is installed.

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 8.1; Windows 7 SP1
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server 2012 R2; Windows Server 2008 R2 SP1
Workaround: ArcaBit has released an update to address this issue. For more information, see the Arcabit support article.

Back to top
April 09, 2019
KB4493446
Mitigated
Last updated:
April 25, 2019
02:00 PM PT

Opened:
April 09, 2019
10:00 AM PT
+
DetailsOriginating updateStatusHistory
@@ -109,7 +109,7 @@ sections: - items: - type: markdown text: " -
DetailsOriginating updateStatusHistory
Issue using PXE to start a device from WDS
After installing KB4489881, there may be issues using the Preboot Execution Environment (PXE) to start a device from a Windows Deployment Services (WDS) server configured to use Variable Window Extension. This may cause the connection to the WDS server to terminate prematurely while downloading the image. This issue does not affect clients or devices that are not using Variable Window Extension.

Affected platforms: 
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1607; Windows 10 Enterprise LTSC 2016; Windows 8.1 
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server 2016; Windows Server 2012 R2; Windows Server 2012 
Workaround: To mitigate the issue, disable the Variable Window Extension on WDS server using one of the following options:

Option 1:
Open an Administrator Command prompt and type the following:
Wdsutil /Set-TransportServer /EnableTftpVariableWindowExtension:No
 

Option 2:
Use the Windows Deployment Services UI to make the following adjustment:
  1. Open Windows Deployment Services from Windows Administrative Tools.
  2. Expand Servers and right-click a WDS server.
  3. Open its properties and clear the Enable Variable Window Extension box on the TFTP tab.
Option 3:
Set the following registry value to 0:
HKLM\\System\\CurrentControlSet\\Services\\WDSServer\\Providers\\WDSTFTP\\EnableVariableWindowExtension

Restart the WDSServer service after disabling the Variable Window Extension.

Next steps: Microsoft is working on a resolution and will provide an update in an upcoming release.

Back to top
March 12, 2019
KB4489881
Mitigated
Last updated:
April 25, 2019
02:00 PM PT

Opened:
March 12, 2019
10:00 AM PT
Custom URI schemes may not start corresponding application
After installing KB4489881, custom URI schemes for application protocol handlers may not start the corresponding application for local intranet and trusted sites security zones on Internet Explorer.

Affected platforms: 
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10, version 1607; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 10 Enterprise LTSB 2015; Windows 8.1; Windows 7 SP1 
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2; Windows Server 2008 R2 SP1 
Resolution: This issue is resolved in KB4493446.

Back to top
March 12, 2019
KB4489881
Resolved
KB4493446
Resolved:
April 09, 2019
10:00 AM PT

Opened:
March 12, 2019
10:00 AM PT
+
DetailsOriginating updateStatusHistory
DetailsOriginating updateStatusHistory
Embedded objects may display incorrectly
Any compound document (OLE) server application that places embedded objects into the Windows Metafile (WMF) using the PatBlt API may display embedded objects incorrectly.

For example, if you paste a Microsoft Excel worksheet object into a Microsoft Word document, the cells may render with a different background color.

Affected platforms 
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10, version 1607; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 10 Enterprise LTSB 2015; Windows 8.1; Windows 7 SP1 
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2; Windows Server 2012; Windows Server 2008 R2 SP1; Windows Server 2008 SP2 
Resolution: This issue is resolved in KB4493446.

Back to top
February 12, 2019
KB4487000
Resolved
KB4493446
Resolved:
April 09, 2019
10:00 AM PT

Opened:
February 12, 2019
10:00 AM PT
" @@ -118,7 +118,7 @@ sections: - items: - type: markdown text: " - +
DetailsOriginating updateStatusHistory
diff --git a/windows/release-information/status-windows-server-2008-sp2.yml b/windows/release-information/status-windows-server-2008-sp2.yml index cdc26f6015..40672e97b4 100644 --- a/windows/release-information/status-windows-server-2008-sp2.yml +++ b/windows/release-information/status-windows-server-2008-sp2.yml @@ -59,7 +59,7 @@ sections: - items: - type: markdown text: "
This table offers a summary of current active issues and those issues that have been resolved in the last 30 days.

-
DetailsOriginating updateStatusHistory
Certain operations performed on a Cluster Shared Volume may fail
Certain operations, such as rename, that you perform on files or folders that are on a Cluster Shared Volume (CSV) may fail with the error, “STATUS_BAD_IMPERSONATION_LEVEL (0xC00000A5)”. This occurs when you perform the operation on a CSV owner node from a process that doesn’t have administrator privilege.

Affected platforms: 
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10, version 1607; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 10 Enterprise LTSB 2015; Windows 8.1
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2; Windows Server 2012
Workaround: Do one of the following:
  • Perform the operation from a process that has administrator privilege.
  • Perform the operation from a node that doesn’t have CSV ownership.
Next steps: Microsoft is working on a resolution and will provide an update in an upcoming release.

Back to top
January 08, 2019
KB4480963
Mitigated
Last updated:
April 25, 2019
02:00 PM PT

Opened:
January 08, 2019
10:00 AM PT
Internet Explorer 11 authentication issue with multiple concurrent logons
After installing KB4480963, Internet Explorer 11 and other applications that use WININET.DLL may have authentication issues. This occurs when two or more people use the same user account for multiple, concurrent login sessions on the same Windows Server machine, including Remote Desktop Protocol (RDP) and Terminal Server logons. Symptoms reported by customers include, but may not be limited to:
  • Cache size and location show zero or empty.
  • Keyboard shortcuts may not work properly.
  • Webpages may intermittently fail to load or render correctly.
  • Issues with credential prompts.
  • Issues when downloading files.
Affected platforms: 
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1607; Windows 10 Enterprise LTSC 2016; Windows 8.1; Windows 7 SP1
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server 2016; Windows Server 2012 R2; Windows Server 2012; Windows Server 2008 R2 SP1
Resolution: This issue is resolved in KB4493446.

Back to top
January 08, 2019
KB4480963
Resolved
KB4493446
Resolved:
April 09, 2019
10:00 AM PT

Opened:
January 08, 2019
10:00 AM PT
MSXML6 may cause applications to stop responding.
After installing KB4480963, MSXML6 causes applications to stop responding if an exception was thrown during node operations, such as appendChild(), insertBefore(), and moveNode().

The Group Policy editor may stop responding when editing a Group Policy Object (GPO) that contains Group Policy Preferences (GPP) for Internet Explorer 10 settings.

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10, version 1607; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 10 Enterprise LTSB 2015; Windows 8.1
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2; Windows Server 2012
Resolution: This issue is resolved in KB4493446.

Back to top
January 08, 2019
KB4480963
Resolved
KB4493446
Resolved:
April 09, 2019
10:00 AM PT

Opened:
January 08, 2019
10:00 AM PT
+
SummaryOriginating updateStatusLast updated
@@ -79,7 +79,7 @@ sections: - items: - type: markdown text: " -
SummaryOriginating updateStatusLast updated
System may be unresponsive after restart if Avira antivirus software installed
Devices with Avira antivirus software installed may become unresponsive upon restart.

See details >
April 09, 2019
KB4493471
Investigating
April 25, 2019
02:00 PM PT
System unresponsive after restart if Sophos Endpoint Protection installed
Devices with Sophos Endpoint Protection installed and managed by Sophos Central or Sophos Enterprise Console (SEC) may become unresponsive upon restart.

See details >
April 09, 2019
KB4493471
Mitigated
April 25, 2019
02:00 PM PT
Authentication may fail for services after the Kerberos ticket expires
Authentication may fail for services that require unconstrained delegation after the Kerberos ticket expires.

See details >
March 12, 2019
KB4489880
Mitigated
April 25, 2019
02:00 PM PT
+
DetailsOriginating updateStatusHistory
DetailsOriginating updateStatusHistory
System may be unresponsive after restart if Avira antivirus software installed
Microsoft and Avira have identified an issue on devices with Avira antivirus software installed that may cause the system to become unresponsive upon restart after installing KB4493471.

Microsoft has temporarily blocked devices from receiving this update if Avira antivirus software is installed.

Affected platforms: 
  • Client: Windows 8.1; Windows 7 SP1 
  • Server: Windows Server 2012 R2; Windows Server 2012; Windows Server 2008 R2 SP1; Windows Server 2008 SP2
Next steps: We are presently investigating this issue with Avira and will provide an update when available.

Back to top
April 09, 2019
KB4493471
Investigating
Last updated:
April 25, 2019
02:00 PM PT

Opened:
April 09, 2019
10:00 AM PT
System unresponsive after restart if Sophos Endpoint Protection installed
Microsoft and Sophos have identified an issue on devices with Sophos Endpoint Protection installed and managed by either Sophos Central or Sophos Enterprise Console (SEC) that may cause the system to become unresponsive upon restart after installing KB4493471.

Microsoft has temporarily blocked devices from receiving this update if the Sophos Endpoint is installed until a solution is available.

Affected platforms: 
  • Client: Windows 8.1; Windows 7 SP1
  • Server: Windows Server 2012 R2; Windows Server 2012; Windows Server 2008 R2 SP1; Windows Server 2008 SP2
Guidance for Sophos Endpoint and Sophos Enterprise Console customers can be found in the Sophos support article.

Back to top
April 09, 2019
KB4493471
Mitigated
Last updated:
April 25, 2019
02:00 PM PT

Opened:
April 09, 2019
10:00 AM PT
@@ -89,7 +89,7 @@ sections: - items: - type: markdown text: " - +
DetailsOriginating updateStatusHistory
DetailsOriginating updateStatusHistory
Authentication may fail for services after the Kerberos ticket expires
After installing KB4489880, some customers report that authentication fails for services that require unconstrained delegation after the Kerberos ticket expires (the default is 10 hours). For example, the SQL server service fails.

Affected platforms: 
  • Client: Windows 7 SP1
  • Server: Windows Server 2008 R2 SP1; Windows Server 2008 SP2
Workaround: To mitigate this issue, use one of the following options:
  • Option 1: Purge the Kerberos tickets on the application server. After the Kerberos ticket expires, the issue will occur again, and you must purge the tickets again.
  • Option 2: If purging does not mitigate the issue, restart the application; for example, restart the Internet Information Services (IIS) app pool associated with the SQL server.
  • Option 3: Use constrained delegation.
Next steps: Microsoft is working on a resolution and will provide an update in an upcoming release.

Back to top
March 12, 2019
KB4489880
Mitigated
Last updated:
April 25, 2019
02:00 PM PT

Opened:
March 12, 2019
10:00 AM PT
NETDOM.EXE fails to run
After installing KB4489880, NETDOM.EXE fails to run, and the on-screen error, “The command failed to complete successfully.” appears.

Affected platforms: 
  • Client: Windows 7 SP1
  • Server: Windows Server 2008 R2 SP1; Windows Server 2008 SP2
Resolution: This issue is resolved in KB4493471.

Back to top
March 12, 2019
KB4489880
Resolved
KB4493471
Resolved:
April 09, 2019
10:00 AM PT

Opened:
March 12, 2019
10:00 AM PT
@@ -99,7 +99,7 @@ sections: - items: - type: markdown text: " - +
DetailsOriginating updateStatusHistory
DetailsOriginating updateStatusHistory
Embedded objects may display incorrectly
Any compound document (OLE) server application that places embedded objects into the Windows Metafile (WMF) using the PatBlt API may display embedded objects incorrectly.

For example, if you paste a Microsoft Excel worksheet object into a Microsoft Word document, the cells may render with a different background color.

Affected platforms 
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10, version 1607; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 10 Enterprise LTSB 2015; Windows 8.1; Windows 7 SP1 
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2; Windows Server 2012; Windows Server 2008 R2 SP1; Windows Server 2008 SP2
Resolution: This issue is resolved in KB4493471.

Back to top
February 12, 2019
KB4487023
Resolved
KB4493471
Resolved:
April 09, 2019
10:00 AM PT

Opened:
February 12, 2019
10:00 AM PT
" diff --git a/windows/release-information/status-windows-server-2012.yml b/windows/release-information/status-windows-server-2012.yml index 120c7a32f3..046f75de26 100644 --- a/windows/release-information/status-windows-server-2012.yml +++ b/windows/release-information/status-windows-server-2012.yml @@ -59,7 +59,7 @@ sections: - items: - type: markdown text: "
This table offers a summary of current active issues and those issues that have been resolved in the last 30 days.

- +
SummaryOriginating updateStatusLast updated
@@ -81,7 +81,7 @@ sections: - items: - type: markdown text: " -
SummaryOriginating updateStatusLast updated
System may be unresponsive after restart if Avira antivirus software installed
Devices with Avira antivirus software installed may become unresponsive upon restart.

See details >
April 09, 2019
KB4493451
Investigating
April 25, 2019
02:00 PM PT
Issue using PXE to start a device from WDS
There may be issues using the Preboot Execution Environment (PXE) to start a device from a Windows Deployment Services (WDS) server configured to use Variable Window Extension.

See details >
March 12, 2019
KB4489891
Mitigated
April 25, 2019
02:00 PM PT
System unresponsive after restart if Sophos Endpoint Protection installed
Devices with Sophos Endpoint Protection installed and managed by Sophos Central or Sophos Enterprise Console (SEC) may become unresponsive upon restart.

See details >
April 09, 2019
KB4493451
Mitigated
April 25, 2019
02:00 PM PT
+
DetailsOriginating updateStatusHistory
DetailsOriginating updateStatusHistory
System may be unresponsive after restart if Avira antivirus software installed
Microsoft and Avira have identified an issue on devices with Avira antivirus software installed that may cause the system to become unresponsive upon restart after installing KB4493451.

Microsoft has temporarily blocked devices from receiving this update if Avira antivirus software is installed.

Affected platforms: 
  • Client: Windows 8.1; Windows 7 SP1 
  • Server: Windows Server 2012 R2; Windows Server 2012; Windows Server 2008 R2 SP1; Windows Server 2008 SP2
Next steps: We are presently investigating this issue with Avira and will provide an update when available.

Back to top
April 09, 2019
KB4493451
Investigating
Last updated:
April 25, 2019
02:00 PM PT

Opened:
April 09, 2019
10:00 AM PT
System unresponsive after restart if Sophos Endpoint Protection installed
Microsoft and Sophos have identified an issue on devices with Sophos Endpoint Protection installed and managed by either Sophos Central or Sophos Enterprise Console (SEC) that may cause the system to become unresponsive upon restart after installing KB4493451.

Microsoft has temporarily blocked devices from receiving this update if the Sophos Endpoint is installed until a solution is available.

Affected platforms: 
  • Client: Windows 8.1; Windows 7 SP1
  • Server: Windows Server 2012 R2; Windows Server 2012; Windows Server 2008 R2 SP1; Windows Server 2008 SP2
Guidance for Sophos Endpoint and Sophos Enterprise Console customers can be found in the Sophos support article.

Back to top
April 09, 2019
KB4493451
Mitigated
Last updated:
April 25, 2019
02:00 PM PT

Opened:
April 09, 2019
10:00 AM PT
@@ -91,7 +91,7 @@ sections: - items: - type: markdown text: " - +
DetailsOriginating updateStatusHistory
DetailsOriginating updateStatusHistory
Issue using PXE to start a device from WDS
After installing KB4489891, there may be issues using the Preboot Execution Environment (PXE) to start a device from a Windows Deployment Services (WDS) server configured to use Variable Window Extension. This may cause the connection to the WDS server to terminate prematurely while downloading the image. This issue does not affect clients or devices that are not using Variable Window Extension.

Affected platforms: 
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1607; Windows 10 Enterprise LTSC 2016; Windows 8.1 
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server 2016; Windows Server 2012 R2; Windows Server 2012 
Workaround: To mitigate the issue, disable the Variable Window Extension on WDS server using one of the following options:

Option 1:
Open an Administrator Command prompt and type the following:
Wdsutil /Set-TransportServer /EnableTftpVariableWindowExtension:No
 

Option 2:
Use the Windows Deployment Services UI to make the following adjustment:
  1. Open Windows Deployment Services from Windows Administrative Tools.
  2. Expand Servers and right-click a WDS server.
  3. Open its properties and clear the Enable Variable Window Extension box on the TFTP tab.
Option 3:
Set the following registry value to 0:
HKLM\\System\\CurrentControlSet\\Services\\WDSServer\\Providers\\WDSTFTP\\EnableVariableWindowExtension

Restart the WDSServer service after disabling the Variable Window Extension.

Next steps: Microsoft is working on a resolution and will provide an update in an upcoming release.

Back to top
March 12, 2019
KB4489891
Mitigated
Last updated:
April 25, 2019
02:00 PM PT

Opened:
March 12, 2019
10:00 AM PT
@@ -101,7 +101,7 @@ sections: - items: - type: markdown text: " - +
DetailsOriginating updateStatusHistory
DetailsOriginating updateStatusHistory
Embedded objects may display incorrectly
Any compound document (OLE) server application that places embedded objects into the Windows Metafile (WMF) using the PatBlt API may display embedded objects incorrectly.

For example, if you paste a Microsoft Excel worksheet object into a Microsoft Word document, the cells may render with a different background color.

Affected platforms 
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10, version 1607; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 10 Enterprise LTSB 2015; Windows 8.1; Windows 7 SP1 
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2; Windows Server 2012; Windows Server 2008 R2 SP1; Windows Server 2008 SP2 
Resolution: This issue is resolved in KB4493451.

Back to top
February 12, 2019
KB4487025
Resolved
KB4493451
Resolved:
April 09, 2019
10:00 AM PT

Opened:
February 12, 2019
10:00 AM PT
" @@ -110,7 +110,7 @@ sections: - items: - type: markdown text: " - +
DetailsOriginating updateStatusHistory
diff --git a/windows/release-information/windows-message-center.yml b/windows/release-information/windows-message-center.yml index 4e87c5da55..2a4ba41456 100644 --- a/windows/release-information/windows-message-center.yml +++ b/windows/release-information/windows-message-center.yml @@ -48,7 +48,7 @@ sections: - items: - type: markdown text: " -
DetailsOriginating updateStatusHistory
Certain operations performed on a Cluster Shared Volume may fail
Certain operations, such as rename, that you perform on files or folders that are on a Cluster Shared Volume (CSV) may fail with the error, \"STATUS_BAD_IMPERSONATION_LEVEL (0xC00000A5)\". This occurs when you perform the operation on a CSV owner node from a process that doesn’t have administrator privilege.

Affected platforms: 
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10, version 1607; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 10 Enterprise LTSB 2015; Windows 8.1
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2; Windows Server 2012
Workaround: Do one of the following:
  • Perform the operation from a process that has administrator privilege.
  • Perform the operation from a node that doesn’t have CSV ownership.
Next steps: Microsoft is working on a resolution and will provide an update in an upcoming release.

Back to top
January 08, 2019
KB4480975
Mitigated
Last updated:
April 25, 2019
02:00 PM PT

Opened:
January 08, 2019
10:00 AM PT
Internet Explorer 11 authentication issue with multiple concurrent logons
After installing KB4480975, Internet Explorer 11 and other applications that use WININET.DLL may have authentication issues. This occurs when two or more people use the same user account for multiple, concurrent login sessions on the same Windows Server machine, including Remote Desktop Protocol (RDP) and Terminal Server logons. Symptoms reported by customers include, but may not be limited to:
  • Cache size and location show zero or empty.
  • Keyboard shortcuts may not work properly.
  • Webpages may intermittently fail to load or render correctly.
  • Issues with credential prompts.
  • Issues when downloading files.
Affected platforms: 
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1607; Windows 10 Enterprise LTSC 2016; Windows 8.1; Windows 7 SP1
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server 2016; Windows Server 2012 R2; Windows Server 2012; Windows Server 2008 R2 SP1
Resolution: This issue is resolved in KB4493451.

Back to top
January 08, 2019
KB4480975
Resolved
KB4493451
Resolved:
April 09, 2019
10:00 AM PT

Opened:
January 08, 2019
10:00 AM PT
MSXML6 may cause applications to stop responding
After installing KB4480975, MSXML6 causes applications to stop responding if an exception was thrown during node operations, such as appendChild(), insertBefore(), and moveNode().

The Group Policy editor may stop responding when editing a Group Policy Object (GPO) that contains Group Policy Preferences (GPP) for Internet Explorer 10 settings.

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10, version 1607; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 10 Enterprise LTSB 2015; Windows 8.1
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2; Windows Server 2012
Resolution: This issue is resolved in KB4493451.

Back to top
January 08, 2019
KB4480975
Resolved
KB4493451
Resolved:
April 09, 2019
10:00 AM PT

Opened:
January 08, 2019
10:00 AM PT
+
MessageDate
-
MessageDate
Take action: Install servicing stack update for Windows Server 2008 SP2 for SHA-2 code sign support
A standalone update, KB4493730, that introduce SHA-2 code sign support for the servicing stack (SSU) was released today as a security update.
April 19, 2019
10:00 AM PT
The benefits of Windows 10 Dynamic Update
Dynamic Update can help organizations and end users alike ensure that their Windows 10 devices have the latest feature update content (as part of an in-place upgrade)—and preserve precious features on demand (FODs) and language packs (LPs) that may have been previously installed.

From 0d41df34f72bc5d1cccbb97f1c3b3e85e758cf65 Mon Sep 17 00:00:00 2001 From: Nicole Turner <39884432+nenonix@users.noreply.github.com> Date: Tue, 30 Apr 2019 10:32:19 -0500 Subject: [PATCH 252/724] Nenonix Copy Review Update Applying suggeste4d change Co-Authored-By: j0rt3g4 --- .../windows-defender-smartscreen-overview.md | 4 ++-- 1 file changed, 2 insertions(+), 2 deletions(-) diff --git a/windows/security/threat-protection/windows-defender-smartscreen/windows-defender-smartscreen-overview.md b/windows/security/threat-protection/windows-defender-smartscreen/windows-defender-smartscreen-overview.md index 0f7b20d9d7..384a5ef080 100644 --- a/windows/security/threat-protection/windows-defender-smartscreen/windows-defender-smartscreen-overview.md +++ b/windows/security/threat-protection/windows-defender-smartscreen/windows-defender-smartscreen-overview.md @@ -52,7 +52,7 @@ When Windows Defender SmartScreen warns or blocks an employee from a website, it ## Viewing Windows event logs for SmartScreen -SmartScreen also have it's own events Ids on the "Microsoft-Windows-SmartScreen/Debug" +SmartScreen has it's own events IDs on the "Microsoft-Windows-SmartScreen/Debug" |EventID | Description | @@ -74,4 +74,4 @@ SmartScreen also have it's own events Ids on the "Microsoft-Windows-SmartScreen/ - [Available Windows Defender SmartScreen Group Policy and mobile device management (MDM) settings](https://docs.microsoft.com/en-us/windows/security/threat-protection/windows-defender-smartscreen/windows-defender-smartscreen-available-settings) >[!NOTE] ->Help to make this topic better by providing us with edits, additions, and feedback. For info about how to contribute to this topic, see [Contributing to TechNet content](https://github.com/Microsoft/windows-itpro-docs/blob/master/CONTRIBUTING.md). \ No newline at end of file +>Help to make this topic better by providing us with edits, additions, and feedback. For info about how to contribute to this topic, see [Contributing to TechNet content](https://github.com/Microsoft/windows-itpro-docs/blob/master/CONTRIBUTING.md). From 41906bb08ccbd12dfbe1cb82c6a42b34759e2fec Mon Sep 17 00:00:00 2001 From: Nicole Turner <39884432+nenonix@users.noreply.github.com> Date: Tue, 30 Apr 2019 10:33:05 -0500 Subject: [PATCH 253/724] Removing en-us from link Removing en-us from the link Co-Authored-By: j0rt3g4 --- .../windows-defender-smartscreen-overview.md | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/windows/security/threat-protection/windows-defender-smartscreen/windows-defender-smartscreen-overview.md b/windows/security/threat-protection/windows-defender-smartscreen/windows-defender-smartscreen-overview.md index 384a5ef080..8e5327315b 100644 --- a/windows/security/threat-protection/windows-defender-smartscreen/windows-defender-smartscreen-overview.md +++ b/windows/security/threat-protection/windows-defender-smartscreen/windows-defender-smartscreen-overview.md @@ -71,7 +71,7 @@ SmartScreen has it's own events IDs on the "Microsoft-Windows-SmartScreen/Debug" - [Threat protection](../index.md) -- [Available Windows Defender SmartScreen Group Policy and mobile device management (MDM) settings](https://docs.microsoft.com/en-us/windows/security/threat-protection/windows-defender-smartscreen/windows-defender-smartscreen-available-settings) +- [Available Windows Defender SmartScreen Group Policy and mobile device management (MDM) settings](https://docs.microsoft.com/windows/security/threat-protection/windows-defender-smartscreen/windows-defender-smartscreen-available-settings) >[!NOTE] >Help to make this topic better by providing us with edits, additions, and feedback. For info about how to contribute to this topic, see [Contributing to TechNet content](https://github.com/Microsoft/windows-itpro-docs/blob/master/CONTRIBUTING.md). From d1181d525e07c7b8b86735fbce71be35a42a7d21 Mon Sep 17 00:00:00 2001 From: Dani Halfin Date: Tue, 30 Apr 2019 10:04:22 -0700 Subject: [PATCH 254/724] fixing some release information issues --- windows/hub/TOC.md | 2 +- windows/release-information/docfx.json | 2 ++ 2 files changed, 3 insertions(+), 1 deletion(-) diff --git a/windows/hub/TOC.md b/windows/hub/TOC.md index 1883594880..a811ff7119 100644 --- a/windows/hub/TOC.md +++ b/windows/hub/TOC.md @@ -1,6 +1,6 @@ # [Windows 10 and Windows 10 Mobile](index.md) ## [What's new](/windows/whats-new) -## [Release information](release-information.md) +## [Release information](/windows/release-information) ## [Deployment](/windows/deployment) ## [Configuration](/windows/configuration) ## [Client management](/windows/client-management) diff --git a/windows/release-information/docfx.json b/windows/release-information/docfx.json index dd9fcd85dd..a91619d79b 100644 --- a/windows/release-information/docfx.json +++ b/windows/release-information/docfx.json @@ -37,6 +37,8 @@ "globalMetadata": { "breadcrumb_path": "/windows/windows-10/breadcrumb/toc.json", "ms.prod": "w10", + "ms.date": "4/30/2019", + "titleSuffix": "Windows Release Information", "extendBreadcrumb": true, "feedback_system": "None" }, From d4b5f113b40e0b1ceddb81841c8af8ae90f926e6 Mon Sep 17 00:00:00 2001 From: Dani Halfin Date: Tue, 30 Apr 2019 10:19:36 -0700 Subject: [PATCH 255/724] Pushing to live for release info and Bilbao (#79) --- windows/hub/TOC.md | 2 +- windows/release-information/docfx.json | 2 ++ .../resolved-issues-windows-10-1507.yml | 28 ++++++---------- .../resolved-issues-windows-10-1607.yml | 30 +++++++----------- .../resolved-issues-windows-10-1703.yml | 18 +++++------ .../resolved-issues-windows-10-1709.yml | 16 +++++----- .../resolved-issues-windows-10-1803.yml | 22 ++++++------- ...indows-10-1809-and-windows-server-2019.yml | 20 ++++++------ ...ndows-7-and-windows-server-2008-r2-sp1.yml | 16 +++++----- ...windows-8.1-and-windows-server-2012-r2.yml | 12 +++---- ...esolved-issues-windows-server-2008-sp2.yml | 10 +++--- .../resolved-issues-windows-server-2012.yml | 10 +++--- .../status-windows-10-1507.yml | 30 +++++++++--------- ...indows-10-1607-and-windows-server-2016.yml | 26 +++++++++------ .../status-windows-10-1703.yml | 14 ++++---- .../status-windows-10-1709.yml | 14 ++++---- .../status-windows-10-1803.yml | 14 ++++---- ...indows-10-1809-and-windows-server-2019.yml | 16 +++++----- ...ndows-7-and-windows-server-2008-r2-sp1.yml | 16 +++++----- ...windows-8.1-and-windows-server-2012-r2.yml | 14 ++++---- .../status-windows-server-2008-sp2.yml | 8 ++--- .../status-windows-server-2012.yml | 14 ++++---- .../windows-message-center.yml | 2 +- windows/security/threat-protection/index.md | 2 +- .../windows-defender-atp/TOC.md | 1 - .../configure-microsoft-threat-experts.md | 30 ++++++++++-------- .../windows-defender-atp/get-started.md | 5 ++- .../images/MTE_applicationconfirmation.png | Bin 0 -> 7795 bytes .../windows-defender-atp/images/MTE_apply.png | Bin 0 -> 9115 bytes .../images/MTE_collaboratewithmte.png | Bin 0 -> 10826 bytes .../microsoft-threat-experts.md | 5 ++- .../windows-defender-atp/onboard.md | 1 + .../windows-defender-atp/overview.md | 3 +- .../whats-new-in-windows-defender-atp.md | 4 ++- 34 files changed, 205 insertions(+), 200 deletions(-) create mode 100644 windows/security/threat-protection/windows-defender-atp/images/MTE_applicationconfirmation.png create mode 100644 windows/security/threat-protection/windows-defender-atp/images/MTE_apply.png create mode 100644 windows/security/threat-protection/windows-defender-atp/images/MTE_collaboratewithmte.png diff --git a/windows/hub/TOC.md b/windows/hub/TOC.md index 1883594880..a811ff7119 100644 --- a/windows/hub/TOC.md +++ b/windows/hub/TOC.md @@ -1,6 +1,6 @@ # [Windows 10 and Windows 10 Mobile](index.md) ## [What's new](/windows/whats-new) -## [Release information](release-information.md) +## [Release information](/windows/release-information) ## [Deployment](/windows/deployment) ## [Configuration](/windows/configuration) ## [Client management](/windows/client-management) diff --git a/windows/release-information/docfx.json b/windows/release-information/docfx.json index dd9fcd85dd..a91619d79b 100644 --- a/windows/release-information/docfx.json +++ b/windows/release-information/docfx.json @@ -37,6 +37,8 @@ "globalMetadata": { "breadcrumb_path": "/windows/windows-10/breadcrumb/toc.json", "ms.prod": "w10", + "ms.date": "4/30/2019", + "titleSuffix": "Windows Release Information", "extendBreadcrumb": true, "feedback_system": "None" }, diff --git a/windows/release-information/resolved-issues-windows-10-1507.yml b/windows/release-information/resolved-issues-windows-10-1507.yml index cc1193bf44..380ff97270 100644 --- a/windows/release-information/resolved-issues-windows-10-1507.yml +++ b/windows/release-information/resolved-issues-windows-10-1507.yml @@ -31,10 +31,10 @@ sections: - items: - type: markdown text: " - - +
SummaryOriginating updateStatusDate resolved
Embedded objects may display incorrectly
Any compound document (OLE) server application that places embedded objects into the Windows Metafile (WMF) using the PatBlt API may display embedded objects incorrectly.

See details >
OS Build 10240.18132

February 12, 2019
KB4487018
Resolved
KB4493475
April 29, 2019
12:45 AM PT
+ @@ -53,20 +53,11 @@ sections:
" -- title: April 2019 -- items: - - type: markdown - text: " -
SummaryOriginating updateStatusDate resolved
MSXML6 may cause applications to stop responding
MSXML6 may cause applications to stop responding if an exception was thrown during node operations, such as appendChild(), insertBefore(), and moveNode().

See details >
OS Build 10240.18094

January 08, 2019
KB4480962
Resolved
KB4493475
April 09, 2019
10:00 AM PT
Custom URI schemes may not start corresponding application
Custom URI schemes for application protocol handlers may not start the corresponding application for local intranet and trusted sites in Internet Explorer.

See details >
OS Build 10240.18158

March 12, 2019
KB4489872
Resolved
KB4493475
April 09, 2019
10:00 AM PT
Embedded objects may display incorrectly
Any compound document (OLE) server application that places embedded objects into the Windows Metafile (WMF) using the PatBlt API may display embedded objects incorrectly.

See details >
OS Build 10240.18132

February 12, 2019
KB4487018
Resolved
KB4493475
April 09, 2019
10:00 AM PT
Applications using Microsoft Jet database and Access 95 file format stop working
Applications that use a Microsoft Jet database with the Microsoft Access 95 file format may randomly stop working.

See details >
OS Build 10240.18132

February 12, 2019
KB4487018
Resolved
KB4489872
March 12, 2019
10:00 AM PT
Error 1309 when installing/uninstalling MSI or MSP files
Users may receive \"Error 1309\" while installing or uninstalling certain types of MSI and MSP files.

See details >
OS Build 10240.18132

February 12, 2019
KB4487018
Resolved
KB4489872
March 12, 2019
10:00 AM PT
First character of Japanese era name not recognized
The first character of the Japanese era name is not recognized as an abbreviation and may cause date parsing issues.

See details >
OS Build 10240.18132

February 12, 2019
KB4487018
Resolved
KB4489872
March 12, 2019
10:00 AM PT
- -
DetailsOriginating updateStatusHistory
Embedded objects may display incorrectly
Any compound document (OLE) server application that places embedded objects into the Windows Metafile (WMF) using the PatBlt API may display embedded objects incorrectly. 
 
For example, if you paste a Microsoft Excel worksheet object into a Microsoft Word document, the cells may render with a different background color. 
 
Affected platforms:  
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10, version 1607; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 10 Enterprise LTSB 2015; Windows 8.1; Windows 7 SP1 
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2; Windows Server 2012; Windows Server 2008 R2 SP1; Windows Server 2008 SP2 
Resolution: This issue is resolved in KB4493475

Back to top
OS Build 10240.18132

February 12, 2019
KB4487018
Resolved
KB4493475
Resolved:
April 09, 2019
10:00 AM PT

Opened:
April 29, 2019
12:45 AM PT
- " - - title: March 2019 - items: - type: markdown text: " - +
DetailsOriginating updateStatusHistory
DetailsOriginating updateStatusHistory
Custom URI schemes may not start corresponding application
After installing KB4489872, Custom URI Schemes for Application Protocol handlers may not start the corresponding application for local intranet and trusted sites on Internet Explorer.

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10, version 1607; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 10 Enterprise LTSB 2015; Windows 8.1; Windows 7 SP1 
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2; Windows Server 2008 R2 SP1
Resolution: This issue was resolved in KB4493475.

Back to top
OS Build 10240.18158

March 12, 2019
KB4489872
Resolved
KB4493475
Resolved:
April 09, 2019
10:00 AM PT

Opened:
March 12, 2019
10:00 AM PT
" @@ -75,8 +66,9 @@ sections: - items: - type: markdown text: " - - +
DetailsOriginating updateStatusHistory
Applications using Microsoft Jet database and Access 95 file format stop working
Applications that use a Microsoft Jet database with the Microsoft Access 95 file format may randomly stop working.

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10, version 1607; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 10 Enterprise LTSB 2015; Windows 7 SP1
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2; Windows Server 2012; Windows Server 2008 R2 SP1; Windows Server 2008 SP2
Resolution: This issue is resolved in KB4489872.

Back to top
OS Build 10240.18132

February 12, 2019
KB4487018
Resolved
KB4489872
Resolved:
March 12, 2019
10:00 AM PT

Opened:
February 12, 2019
10:00 AM PT
+ + @@ -87,9 +79,9 @@ sections: - items: - type: markdown text: " -
DetailsOriginating updateStatusHistory
Embedded objects may display incorrectly
Any compound document (OLE) server application that places embedded objects into the Windows Metafile (WMF) using the PatBlt API may display embedded objects incorrectly. 
 
For example, if you paste a Microsoft Excel worksheet object into a Microsoft Word document, the cells may render with a different background color. 
 
Affected platforms:  
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10, version 1607; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 10 Enterprise LTSB 2015; Windows 8.1; Windows 7 SP1
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2; Windows Server 2012; Windows Server 2008 R2 SP1; Windows Server 2008 SP2 
Resolution: This issue is resolved in KB4493475

Back to top
OS Build 10240.18132

February 12, 2019
KB4487018
Resolved
KB4493475
Resolved:
April 09, 2019
10:00 AM PT

Opened:
February 12, 2019
10:00 AM PT
Applications using Microsoft Jet database and Access 95 file format stop working
Applications that use a Microsoft Jet database with the Microsoft Access 95 file format may randomly stop working.

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10, version 1607; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 10 Enterprise LTSB 2015; Windows 7 SP1
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012; Windows Server 2008 R2 SP1; Windows Server 2008 SP2
Resolution: This issue is resolved in KB4489872.

Back to top
OS Build 10240.18132

February 12, 2019
KB4487018
Resolved
KB4489872
Resolved:
March 12, 2019
10:00 AM PT

Opened:
February 12, 2019
10:00 AM PT
Error 1309 when installing/uninstalling MSI or MSP files
After installing KB4487018, users may receive “Error 1309” while installing or uninstalling certain types of MSI and MSP files.

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10, version 1607; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 10 Enterprise LTSB 2015; Windows 8.1
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2; Windows Server 2012
Resolution: This issue is resolved in KB4489872.

Back to top
OS Build 10240.18132

February 12, 2019
KB4487018
Resolved
KB4489872
Resolved:
March 12, 2019
10:00 AM PT

Opened:
February 12, 2019
10:00 AM PT
First character of Japanese era name not recognized
After installing KB4487018, the first character of the Japanese era name is not recognized as an abbreviation and may cause date parsing issues.

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10, version 1607; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 10 Enterprise LTSB 2015; Windows 8.1; Windows 7 SP1
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2; Windows Server 2012; Windows Server 2008 R2 SP1; Windows Server 2008 SP2
Resolution: This issue is resolved in KB4489872.

Back to top
OS Build 10240.18132

February 12, 2019
KB4487018
Resolved
KB4489872
Resolved:
March 12, 2019
10:00 AM PT

Opened:
February 12, 2019
10:00 AM PT
Internet Explorer may fail to load images
After installing KB4487018, Internet Explorer may fail to load images with a backslash (\\) in their relative source path.

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10, version 1607; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 10 Enterprise LTSB 2015; Windows 8.1; Windows 7 SP1
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2; Windows Server 2008 R2 SP1
Resolution: This issue is resolved in KB4491101.

Back to top
OS Build 10240.18132

February 12, 2019
KB4487018
Resolved
KB4491101
Resolved:
February 21, 2019
02:00 PM PT

Opened:
February 12, 2019
10:00 AM PT
+
DetailsOriginating updateStatusHistory
- +
DetailsOriginating updateStatusHistory
MSXML6 may cause applications to stop responding
After installing KB4480962, MSXML6 causes applications to stop responding if an exception was thrown during node operations, such as appendChild(), insertBefore(), and moveNode().

The Group Policy editor may stop responding when editing a Group Policy Object (GPO) that contains Group Policy Preferences (GPP) for Internet Explorer 10 settings.

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10, version 1607; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 10 Enterprise LTSB 2015; Windows 8.1
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2; Windows Server 2012
Resolution: This issue was resolved in KB4493475.

Back to top
OS Build 10240.18094

January 08, 2019
KB4480962
Resolved
KB4493475
Resolved:
April 09, 2019
10:00 AM PT

Opened:
January 08, 2019
10:00 AM PT
Applications using Microsoft Jet database fail to open
Applications that use a Microsoft Jet database with the Microsoft Access 97 file format may fail to open if the database has column names greater than 32 characters. The database will fail to open with the error, \"Unrecognized Database Format\".

Affected platforms:
  • Client: Windows 10, version 1709; Windows 10, version 1703; Windows 10, version 1607; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 10 Enterprise LTSB 2015; Windows 8.1; Windows 7 SP1
  • Server: Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2; Windows Server 2008 R2 SP1
Resolution: This issue is resolved in KB4487018.

Back to top
OS Build 10240.18094

January 08, 2019
KB4480962
Resolved
KB4487018
Resolved:
February 12, 2019
10:00 AM PT

Opened:
January 08, 2019
10:00 AM PT
Applications using Microsoft Jet database fail to open
Applications that use a Microsoft Jet database with the Microsoft Access 97 file format may fail to open if the database has column names greater than 32 characters. The database will fail to open with the error, \"Unrecognized Database Format\".

Affected platforms:
  • Client: Windows 10, version 1709; Windows 10, version 1703; Windows 10, version 1607; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 10 Enterprise LTSB 2015; Windows 8.1; Windows 7 SP1
  • Server: Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2; Windows Server 2012; Windows Server 2008 R2 SP1; Windows Server 2008 SP2
Resolution: This issue is resolved in KB4487018.

Back to top
OS Build 10240.18094

January 08, 2019
KB4480962
Resolved
KB4487018
Resolved:
February 12, 2019
10:00 AM PT

Opened:
January 08, 2019
10:00 AM PT
Unable to access hotspots with third-party applications
After installing KB4480962, third-party applications may have difficulty authenticating hotspots.

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10, version 1607; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 10 Enterprise LTSB 2015; Windows 8.1
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2; Windows Server 2012
Resolution: This issue is resolved in KB4487018.

Back to top
OS Build 10240.18094

January 08, 2019
KB4480962
Resolved
KB4487018
Resolved:
February 12, 2019
10:00 AM PT

Opened:
January 08, 2019
10:00 AM PT
" @@ -98,7 +90,7 @@ sections: - items: - type: markdown text: " - +
DetailsOriginating updateStatusHistory
DetailsOriginating updateStatusHistory
Unable to use Seek bar in Windows Media Player
After installing KB4462922, users may not be able to use the Seek bar in Windows Media Player when playing specific files. This issue does not affect normal playback.

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10, version 1607; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 10 Enterprise LTSB 2015; Windows 8.1; Windows 7 SP1
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2; Windows Server 2012; Windows Server 2008 R2 SP1; Windows Server 2008 SP2
Resolution: This issue is resolved in KB4471323.

Back to top
OS Build 10240.18005

October 09, 2018
KB4462922
Resolved
KB4471323
Resolved:
December 11, 2018
10:00 AM PT

Opened:
October 09, 2018
10:00 AM PT
" @@ -107,7 +99,7 @@ sections: - items: - type: markdown text: " - +
DetailsOriginating updateStatusHistory
DetailsOriginating updateStatusHistory
Guest VMs running Unicast NLB fail to respond after restart
All guest virtual machines running Unicast NLB fail to respond to NLB requests after the virtual machines restart.

Affected platforms:
  • Client: Windows 10, version 1803; Windows 10, version 1507; Windows 10 Enterprise LTSB 2015
  • Server: Windows Server, version 1803
Resolution: This issue is resolved in KB4462922.

Back to top
OS Build 10240.17976

September 11, 2018
KB4457132
Resolved
KB4462922
Resolved:
October 09, 2018
10:00 AM PT

Opened:
September 11, 2018
10:00 AM PT
" diff --git a/windows/release-information/resolved-issues-windows-10-1607.yml b/windows/release-information/resolved-issues-windows-10-1607.yml index 6beb9c7a5d..72407b6ba9 100644 --- a/windows/release-information/resolved-issues-windows-10-1607.yml +++ b/windows/release-information/resolved-issues-windows-10-1607.yml @@ -31,12 +31,12 @@ sections: - items: - type: markdown text: " - - +
SummaryOriginating updateStatusDate resolved
Embedded objects may display incorrectly
Any compound document (OLE) server application that places embedded objects into the Windows Metafile (WMF) using the PatBlt API may display embedded objects incorrectly.

See details >
OS Build 14393.2791

February 12, 2019
KB4487026
Resolved
KB4493470
April 29, 2019
12:43 AM PT
+ @@ -60,20 +60,11 @@ sections:
" -- title: April 2019 -- items: - - type: markdown - text: " -
SummaryOriginating updateStatusDate resolved
Custom URI schemes may not start corresponding application
Custom URI schemes for application protocol handlers may not start the corresponding application for local intranet and trusted sites in Internet Explorer.

See details >
OS Build 14393.2848

March 12, 2019
KB4489882
Resolved
KB4493473
April 25, 2019
02:00 PM PT
End-user-defined characters (EUDC) may cause blue screen at startup
If you enable per font end-user-defined characters (EUDC), the system will stop working and a blue screen may appear at startup.

See details >
OS Build 14393.2879

March 19, 2019
KB4489889
Resolved
KB4493470
April 09, 2019
10:00 AM PT
Internet Explorer 11 authentication issue with multiple concurrent logons
Internet Explorer 11 users may encounter issues if two or more people use the same user account for multiple, concurrent login sessions on the same Windows Server machine.

See details >
OS Build 14393.2724

January 08, 2019
KB4480961
Resolved
KB4493470
April 09, 2019
10:00 AM PT
MSXML6 may cause applications to stop responding
MSXML6 may cause applications to stop responding if an exception was thrown during node operations, such as appendChild(), insertBefore(), and moveNode().

See details >
OS Build 14393.2724

January 08, 2019
KB4480961
Resolved
KB4493470
April 09, 2019
10:00 AM PT
Embedded objects may display incorrectly
Any compound document (OLE) server application that places embedded objects into the Windows Metafile (WMF) using the PatBlt API may display embedded objects incorrectly.

See details >
OS Build 14393.2791

February 12, 2019
KB4487026
Resolved
KB4493470
April 09, 2019
10:00 AM PT
Issue hosting multiple terminal server sessions and a user logs off on Windows Server
In some cases, Windows Server will stop working and restart when hosting multiple terminal server sessions and a user logs off.

See details >
OS Build 14393.2828

February 19, 2019
KB4487006
Resolved
KB4489882
March 12, 2019
10:00 AM PT
Error 1309 when installing/uninstalling MSI or MSP files
Users may receive “Error 1309” while installing or uninstalling certain types of MSI and MSP files.

See details >
OS Build 14393.2791

February 12, 2019
KB4487026
Resolved
KB4489882
March 12, 2019
10:00 AM PT
Applications using Microsoft Jet database and Access 95 file format stop working
Applications that use a Microsoft Jet database with the Microsoft Access 95 file format may randomly stop working.

See details >
OS Build 14393.2791

February 12, 2019
KB4487026
Resolved
KB4487006
February 19, 2019
02:00 PM PT
- -
DetailsOriginating updateStatusHistory
Embedded objects may display incorrectly
Any compound document (OLE) server application that places embedded objects into the Windows Metafile (WMF) using the PatBlt API may display embedded objects incorrectly. 
 
For example, if you paste a Microsoft Excel worksheet object into a Microsoft Word document, the cells may render with a different background color. 
 
Affected platforms:  
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10, version 1607; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 10 Enterprise LTSB 2015; Windows 8.1; Windows 7 SP1 
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2; Windows Server 2012; Windows Server 2008 R2 SP1; Windows Server 2008 SP2 
Resolution: This issue is resolved in KB4493470

Back to top
OS Build 14393.2791

February 12, 2019
KB4487026
Resolved
KB4493470
Resolved:
April 09, 2019
10:00 AM PT

Opened:
April 29, 2019
12:43 AM PT
- " - - title: March 2019 - items: - type: markdown text: " - +
DetailsOriginating updateStatusHistory
DetailsOriginating updateStatusHistory
Custom URI schemes may not start corresponding application
After installing KB4489882, Custom URI schemes for application protocol handlers may not start the corresponding application for local intranet and trusted sites security zones on Internet Explorer.

Affected platforms: 
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10, version 1607; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 10 Enterprise LTSB 2015; Windows 8.1; Windows 7 SP1 
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2; Windows Server 2008 R2 SP1
Resolution: This issue is resolved in KB4493473

Back to top
OS Build 14393.2848

March 12, 2019
KB4489882
Resolved
KB4493473
Resolved:
April 25, 2019
02:00 PM PT

Opened:
March 12, 2019
10:00 AM PT
End-user-defined characters (EUDC) may cause blue screen at startup
If you enable per font end-user-defined characters (EUDC), the system will stop working and a blue screen may appear at startup. This is not a common setting in non-Asian regions.

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10, version 1607; Windows 10 Enterprise LTSC 2016
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016
Resolution: This issue was resolved in KB4493470.

Back to top
OS Build 14393.2879

March 19, 2019
KB4489889
Resolved
KB4493470
Resolved:
April 09, 2019
10:00 AM PT

Opened:
March 19, 2019
10:00 AM PT
@@ -83,10 +74,11 @@ sections: - items: - type: markdown text: " - +
DetailsOriginating updateStatusHistory
+ - +
DetailsOriginating updateStatusHistory
Embedded objects may display incorrectly
Any compound document (OLE) server application that places embedded objects into the Windows Metafile (WMF) using the PatBlt API may display embedded objects incorrectly. 
 
For example, if you paste a Microsoft Excel worksheet object into a Microsoft Word document, the cells may render with a different background color. 
 
Affected platforms:  
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10, version 1607; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 10 Enterprise LTSB 2015; Windows 8.1; Windows 7 SP1 
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2; Windows Server 2012; Windows Server 2008 R2 SP1; Windows Server 2008 SP2 
Resolution: This issue is resolved in KB4493470

Back to top
OS Build 14393.2791

February 12, 2019
KB4487026
Resolved
KB4493470
Resolved:
April 09, 2019
10:00 AM PT

Opened:
February 12, 2019
10:00 AM PT
Issue hosting multiple terminal server sessions and a user logs off on Windows Server
In some cases, Windows Server will stop working and restart when hosting multiple terminal server sessions and a user logs off. The faulting driver is win32kbase.sys.

Affected platforms:
  • Client: Windows 10, version 1607; Windows 10 Enterprise LTSC 2016
  • Server: Windows Server 2016
Resolution: This issue is resolved in KB4489882.

Back to top
OS Build 14393.2828

February 19, 2019
KB4487006
Resolved
KB4489882
Resolved:
March 12, 2019
10:00 AM PT

Opened:
February 19, 2019
02:00 PM PT
Error 1309 when installing/uninstalling MSI or MSP files
After installing KB4487026, users may receive “Error 1309” while installing or uninstalling certain types of MSI and MSP files.

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10, version 1607; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 10 Enterprise LTSB 2015; Windows 8.1
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2; Windows Server 2012
Resolution: This issue is resolved in KB4489882.

Back to top
OS Build 14393.2791

February 12, 2019
KB4487026
Resolved
KB4489882
Resolved:
March 12, 2019
10:00 AM PT

Opened:
February 12, 2019
10:00 AM PT
Applications using Microsoft Jet database and Access 95 file format stop working
Applications that use a Microsoft Jet database with the Microsoft Access 95 file format may randomly stop working.

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10, version 1607; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 10 Enterprise LTSB 2015; Windows 7 SP1
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2; Windows Server 2012; Windows Server 2008 R2 SP1; Windows Server 2008 SP2
Resolution: This issue is resolved in KB4487006.

Back to top
OS Build 14393.2791

February 12, 2019
KB4487026
Resolved
KB4487006
Resolved:
February 19, 2019
02:00 PM PT

Opened:
February 12, 2019
10:00 AM PT
Applications using Microsoft Jet database and Access 95 file format stop working
Applications that use a Microsoft Jet database with the Microsoft Access 95 file format may randomly stop working.

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10, version 1607; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 10 Enterprise LTSB 2015; Windows 7 SP1
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012; Windows Server 2008 R2 SP1; Windows Server 2008 SP2
Resolution: This issue is resolved in KB4487006.

Back to top
OS Build 14393.2791

February 12, 2019
KB4487026
Resolved
KB4487006
Resolved:
February 19, 2019
02:00 PM PT

Opened:
February 12, 2019
10:00 AM PT
Internet Explorer may fail to load images
After installing KB4487026, Internet Explorer may fail to load images with a backslash (\\) in their relative source path.

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10, version 1607; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 10 Enterprise LTSB 2015; Windows 8.1; Windows 7 SP1
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2; Windows Server 2008 R2 SP1
Resolution: This issue is resolved in KB4487006.

Back to top
OS Build 14393.2791

February 12, 2019
KB4487026
Resolved
KB4487006
Resolved:
February 19, 2019
02:00 PM PT

Opened:
February 12, 2019
10:00 AM PT
" @@ -95,7 +87,7 @@ sections: - items: - type: markdown text: " - +
DetailsOriginating updateStatusHistory
@@ -108,7 +100,7 @@ sections: - items: - type: markdown text: " -
DetailsOriginating updateStatusHistory
Internet Explorer 11 authentication issue with multiple concurrent logons
After installing KB4480961, Internet Explorer 11 and other applications that use WININET.DLL may have authentication issues. This occurs when two or more people use the same user account for multiple, concurrent login sessions on the same Windows Server machine, including Remote Desktop Protocol (RDP) and Terminal Server logons. Symptoms reported by customers include, but may not be limited to:
  • Cache size and location show zero or empty.
  • Keyboard shortcuts may not work properly.
  • Webpages may intermittently fail to load or render correctly.
  • Issues with credential prompts.
  • Issues when downloading files.
Affected platforms: 
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1607; Windows 10 Enterprise LTSC 2016; Windows 8.1; Windows 7 SP1
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server 2016; Windows Server 2012 R2; Windows Server 2012; Windows Server 2008 R2 SP1
Resolution: This issue was resolved in KB4493470.

Back to top
OS Build 14393.2724

January 08, 2019
KB4480961
Resolved
KB4493470
Resolved:
April 09, 2019
10:00 AM PT

Opened:
January 08, 2019
10:00 AM PT
MSXML6 may cause applications to stop responding
After installing KB4480961, MSXML6 causes applications to stop responding if an exception was thrown during node operations, such as appendChild(), insertBefore(), and moveNode().

The Group Policy editor may stop responding when editing a Group Policy Object (GPO) that contains Group Policy Preferences (GPP) for Internet Explorer 10 settings.

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10, version 1607; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 10 Enterprise LTSB 2015; Windows 8.1
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2; Windows Server 2012
Resolution: This issue was resolved in KB4493470.

Back to top
OS Build 14393.2724

January 08, 2019
KB4480961
Resolved
KB4493470
Resolved:
April 09, 2019
10:00 AM PT

Opened:
January 08, 2019
10:00 AM PT
First character of the Japanese era name not recognized as an abbreviation
After installing KB4480977, the first character of the Japanese era name is not recognized as an abbreviation and may cause date parsing issues.

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10, version 1607; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 10 Enterprise LTSB 2015; Windows 8.1; Windows 7 SP1
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2; Windows Server 2012; Windows Server 2008 R2 SP1; Windows Server 2008 SP2
Resolution: This issue is resolved in KB4487006.

Back to top
OS Build 14393.2759

January 17, 2019
KB4480977
Resolved
KB4487006
Resolved:
February 19, 2019
02:00 PM PT

Opened:
January 17, 2019
02:00 PM PT
+
DetailsOriginating updateStatusHistory
DetailsOriginating updateStatusHistory
Instant search in Microsoft Outlook fails on Windows Server 2016
After installing KB4467684 on Windows Server 2016, instant search in Microsoft Outlook clients fail with the error, \"Outlook cannot perform the search\".

Affected platforms:
  • Client: Windows 10, version 1607; Windows 10 Enterprise LTSC 2016
  • Server: Windows Server 2016
Resolution: This issue is resolved in KB4487026.

Back to top
OS Build 14393.2639

November 27, 2018
KB4467684
Resolved
KB4487026
Resolved:
February 12, 2019
10:00 AM PT

Opened:
November 27, 2018
10:00 AM PT
System becomes unresponsive when end-user-defined characters (EUDC) are used
When features related to end-user-defined characters (EUDC) are used, the entire system may become unresponsive. 

Affected platforms:
  • Client: Windows 10, version 1607; Windows 10 Enterprise LTSC 2016
  • Server: Windows Server 2016
Resolution: This issue is resolved in KB4471321

Back to top
OS Build 14393.2639

November 27, 2018
KB4467684
Resolved
KB4471321
Resolved:
December 11, 2018
10:00 AM PT

Opened:
November 27, 2018
10:00 AM PT
@@ -118,7 +110,7 @@ sections: - items: - type: markdown text: " - +
DetailsOriginating updateStatusHistory
DetailsOriginating updateStatusHistory
Unable to use Seek bar in Windows Media Player
After installing KB4462917, users may not be able to use the Seek bar in Windows Media Player when playing specific files. This issue does not affect normal playback.

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10, version 1607; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 10 Enterprise LTSB 2015; Windows 8.1; Windows 7 SP1
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2; Windows Server 2012; Windows Server 2008 R2 SP1; Windows Server 2008 SP2
Resolution: This issue is resolved in KB4471321.

Back to top
OS Build 14393.2551

October 09, 2018
KB4462917
Resolved
KB4471321
Resolved:
December 11, 2018
10:00 AM PT

Opened:
October 09, 2018
10:00 AM PT
" @@ -127,7 +119,7 @@ sections: - items: - type: markdown text: " - +
DetailsOriginating updateStatusHistory
DetailsOriginating updateStatusHistory
Promotions that create non-root domains fail with optional features enabled
After installing KB4457127, Windows Server 2016 promotions that create non-root domains fail in forests in which optional features like Active Directory recycle have been enabled. The error is, “The replication operation encountered a database error.”

Affected platforms:
  • Server: Windows Server 2016
Resolution: This issue is resolved in KB4467684.

Back to top
OS Build 14393.2515

September 20, 2018
KB4457127
Resolved
KB4467684
Resolved:
November 27, 2018
10:00 AM PT

Opened:
September 20, 2018
10:00 AM PT
" @@ -136,7 +128,7 @@ sections: - items: - type: markdown text: " - +
DetailsOriginating updateStatusHistory
DetailsOriginating updateStatusHistory
SqlConnection instantiation exception on .NET 4.6 and later
After you install the August Preview of Quality Rollup or September 11, 2018 .NET Framework update, instantiation of SqlConnection can throw an exception.

For more information about this issue, see the following article in the Microsoft Knowledge Base: 4470809, SqlConnection instantiation exception on .NET 4.6 and later after August-September 2018 .NET Framework updates.

Affected platforms:
  • Client: Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10, version 1607; Windows 10 Enterprise LTSC 2016
  • Server: Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016
Resolution: This issue is resolved in KB4480977.

Back to top
OS Build 14393.2457

August 30, 2018
KB4343884
Resolved
KB4480977
Resolved:
January 17, 2019
02:00 PM PT

Opened:
August 30, 2018
05:00 PM PT
Issues with install and activation of Key Management Service (KMS) (CSVLK) host keys
After installing KB4343884, installation and client activation of Windows Server 2019 and Windows 10 Enterprise 2019 LTSC Key Management Service (KMS) CSVLK host keys do not work as expected.

Affected platforms:
  • Client: Windows 10, version 1607; Windows 10 Enterprise LTSC 2016
  • Server: Windows Server 2016
Resolution: This issue is resolved in KB4467684.

Back to top
OS Build 14393.2457

August 30, 2018
KB4343884
Resolved
KB4467684
Resolved:
November 27, 2018
10:00 AM PT

Opened:
August 30, 2018
05:00 PM PT
diff --git a/windows/release-information/resolved-issues-windows-10-1703.yml b/windows/release-information/resolved-issues-windows-10-1703.yml index 7ec02137af..a32bfe383c 100644 --- a/windows/release-information/resolved-issues-windows-10-1703.yml +++ b/windows/release-information/resolved-issues-windows-10-1703.yml @@ -31,7 +31,7 @@ sections: - items: - type: markdown text: " - +
SummaryOriginating updateStatusDate resolved
@@ -61,7 +61,7 @@ sections: - items: - type: markdown text: " -
SummaryOriginating updateStatusDate resolved
Custom URI schemes may not start corresponding application
Custom URI schemes for application protocol handlers may not start the corresponding application for local intranet and trusted sites in Internet Explorer.

See details >
OS Build 15063.1689

March 12, 2019
KB4489871
Resolved
KB4493436
April 25, 2019
02:00 PM PT
End-user-defined characters (EUDC) may cause blue screen at startup
If you enable per font end-user-defined characters (EUDC), the system may stop working and a blue screen may appear at startup.

See details >
OS Build 15063.1716

March 19, 2019
KB4489888
Resolved
KB4493474
April 09, 2019
10:00 AM PT
MSXML6 may cause applications to stop responding
MSXML6 may cause applications to stop responding if an exception was thrown during node operations, such as appendChild(), insertBefore(), and moveNode().

See details >
OS Build 15063.1563

January 08, 2019
KB4480973
Resolved
KB4493474
April 09, 2019
10:00 AM PT
+
DetailsOriginating updateStatusHistory
DetailsOriginating updateStatusHistory
Custom URI schemes may not start corresponding application
After installing KB4489871, custom URI schemes for application protocol handlers may not start the corresponding application for local intranet and trusted sites security zones on Internet Explorer.

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10, version 1607; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 10 Enterprise LTSB 2015; Windows 8.1; Windows 7 SP1 
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2; Windows Server 2008 R2 SP1
Resolution: This issue is resolved in KB4493436

Back to top
OS Build 15063.1689

March 12, 2019
KB4489871
Resolved
KB4493436
Resolved:
April 25, 2019
02:00 PM PT

Opened:
March 12, 2019
10:00 AM PT
End-user-defined characters (EUDC) may cause blue screen at startup
If you enable per font end-user-defined characters (EUDC), the system may stop working and a blue screen may appear at startup. This is not a common setting in non-Asian regions.

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10, version 1607; Windows 10 Enterprise LTSC 2016
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016
Resolution: This issue was resolved in KB4493474.

Back to top
OS Build 15063.1716

March 19, 2019
KB4489888
Resolved
KB4493474
Resolved:
April 09, 2019
10:00 AM PT

Opened:
March 19, 2019
10:00 AM PT
@@ -71,11 +71,11 @@ sections: - items: - type: markdown text: " - +
DetailsOriginating updateStatusHistory
- +
DetailsOriginating updateStatusHistory
Embedded objects may display incorrectly
Any compound document (OLE) server application that places embedded objects into the Windows Metafile (WMF) using the PatBlt API may display embedded objects incorrectly. 
 
For example, if you paste a Microsoft Excel worksheet object into a Microsoft Word document, the cells may render with a different background color. 
 
Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10, version 1607; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 10 Enterprise LTSB 2015; Windows 8.1; Windows 7 SP1 
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2; Windows Server 2012; Windows Server 2008 R2 SP1; Windows Server 2008 SP2 
Resolution: This issue is resolved in KB4493474

Back to top
OS Build 15063.1631

February 12, 2019
KB4487020
Resolved
KB4493474
Resolved:
April 09, 2019
10:00 AM PT

Opened:
February 12, 2019
10:00 AM PT
Error 1309 when installing/uninstalling MSI or MSP files
After installing KB4487011, users may receive “Error 1309” while installing or uninstalling certain types of MSI and MSP files.

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10, version 1607; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 10 Enterprise LTSB 2015; Windows 8.1
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2; Windows Server 2012
Resolution: This issue is resolved in KB4489871.

Back to top
OS Build 15063.1659

February 19, 2019
KB4487011
Resolved
KB4489871
Resolved:
March 12, 2019
10:00 AM PT

Opened:
February 19, 2019
02:00 PM PT
Internet Explorer may fail to load images
After installing KB4487020, Internet Explorer may fail to load images with a backslash (\\) in their relative source path.

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10, version 1607; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 10 Enterprise LTSB 2015; Windows 8.1; Windows 7 SP1
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2; Windows Server 2008 R2 SP1
Resolution: This issue is resolved in KB4487011.

Back to top
OS Build 15063.1631

February 12, 2019
KB4487020
Resolved
KB4487011
Resolved:
February 19, 2019
02:00 PM PT

Opened:
February 12, 2019
10:00 AM PT
Applications using Microsoft Jet database and Access 95 file format stop working
Applications that use a Microsoft Jet database with the Microsoft Access 95 file format may randomly stop working.

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10, version 1607; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 10 Enterprise LTSB 2015; Windows 7 SP1
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2; Windows Server 2012; Windows Server 2008 R2 SP1; Windows Server 2008 SP2
Resolution: This issue is resolved in KB4487011.

Back to top
OS Build 15063.1631

February 12, 2019
KB4487020
Resolved
KB4487011
Resolved:
February 19, 2019
02:00 PM PT

Opened:
February 12, 2019
10:00 AM PT
Applications using Microsoft Jet database and Access 95 file format stop working
Applications that use a Microsoft Jet database with the Microsoft Access 95 file format may randomly stop working.

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10, version 1607; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 10 Enterprise LTSB 2015; Windows 7 SP1
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012; Windows Server 2008 R2 SP1; Windows Server 2008 SP2
Resolution: This issue is resolved in KB4487011.

Back to top
OS Build 15063.1631

February 12, 2019
KB4487020
Resolved
KB4487011
Resolved:
February 19, 2019
02:00 PM PT

Opened:
February 12, 2019
10:00 AM PT
" @@ -83,11 +83,11 @@ sections: - items: - type: markdown text: " - - +
DetailsOriginating updateStatusHistory
MSXML6 may cause applications to stop responding
After installing KB4480973, MSXML6 causes applications to stop responding if an exception was thrown during node operations, such as appendChild(), insertBefore(), and moveNode().

The Group Policy editor may stop responding when editing a Group Policy Object (GPO) that contains Group Policy Preferences (GPP) for Internet Explorer 10 settings.

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10, version 1607; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 10 Enterprise LTSB 2015; Windows 8.1
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2
Resolution: This issue was resolved in KB4493474.

Back to top
OS Build 15063.1563

January 08, 2019
KB4480973
Resolved
KB4493474
Resolved:
April 09, 2019
10:00 AM PT

Opened:
January 08, 2019
10:00 AM PT
+ - +
DetailsOriginating updateStatusHistory
MSXML6 may cause applications to stop responding
After installing KB4480973, MSXML6 causes applications to stop responding if an exception was thrown during node operations, such as appendChild(), insertBefore(), and moveNode().

The Group Policy editor may stop responding when editing a Group Policy Object (GPO) that contains Group Policy Preferences (GPP) for Internet Explorer 10 settings.

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10, version 1607; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 10 Enterprise LTSB 2015; Windows 8.1
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2; Windows Server 2012
Resolution: This issue was resolved in KB4493474.

Back to top
OS Build 15063.1563

January 08, 2019
KB4480973
Resolved
KB4493474
Resolved:
April 09, 2019
10:00 AM PT

Opened:
January 08, 2019
10:00 AM PT
First character of the Japanese era name not recognized as an abbreviation
After installing KB4480959, the first character of the Japanese era name is not recognized as an abbreviation and may cause date parsing issues.

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10, version 1607; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 10 Enterprise LTSB 2015; Windows 8.1; Windows 7 SP1
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2; Windows Server 2012; Windows Server 2008 R2 SP1; Windows Server 2008 SP2
Resolution: This issue is resolved in KB4487011.

Back to top
OS Build 15063.1596

January 15, 2019
KB4480959
Resolved
KB4487011
Resolved:
February 19, 2019
02:00 PM PT

Opened:
January 15, 2019
10:00 AM PT
Applications using Microsoft Jet database fail to open
Applications that use a Microsoft Jet database with the Microsoft Access 97 file format may fail to open if the database has column names greater than 32 characters. The database will fail to open with the error, “Unrecognized Database Format”.

Affected platforms:
  • Client: Windows 10, version 1709; Windows 10, version 1703; Windows 10, version 1607; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 10 Enterprise LTSB 2015; Windows 8.1; Windows 7 SP1 
  • Server: Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2; Windows Server 2012; Windows Server 2008 R2 SP1; Windows Server 2008 SP2
Resolution: This issue is resolved in KB4487020.

Back to top
OS Build 15063.1563

January 08, 2019
KB4480973
Resolved
KB4487020
Resolved:
February 12, 2019
10:00 AM PT

Opened:
January 08, 2019
10:00 AM PT
Webpages become unresponsive in Microsoft Edge
After installing KB4480973, some Microsoft Edge users report that they:
  • Cannot load webpages using a local IP address.
  • Cannot load webpages on the Internet using a VPN connection.
Browsing fails or the webpage may become unresponsive.

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709
Resolution: This issue is resolved in KB4487020.

Back to top
OS Build 15063.1563

January 08, 2019
KB4480973
Resolved
KB4487020
Resolved:
February 12, 2019
10:00 AM PT

Opened:
January 08, 2019
10:00 AM PT
Webpages become unresponsive in Microsoft Edge
After installing KB4480973, some Microsoft Edge users report that they:
  • Cannot load web pages using a local IP address.
  • Cannot load web pages on the Internet using a VPN connection.
Browsing fails or the web page may become unresponsive.

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709
Resolution: This issue is resolved in KB4486996

Back to top
OS Build 15063.1563

January 08, 2019
KB4480973
Resolved
KB4487020
Resolved:
February 12, 2019
10:00 AM PT

Opened:
January 08, 2019
10:00 AM PT
Unable to access hotspots with third-party applications
After installing KB4480973, third-party applications may have difficulty authenticating hotspots.

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10, version 1607; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 10 Enterprise LTSB 2015; Windows 8.1
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2; Windows Server 2012
Resolution: This issue is resolved in KB4480959.

Back to top
OS Build 15063.1563

January 08, 2019
KB4480973
Resolved
KB4480959
Resolved:
January 15, 2019
10:00 AM PT

Opened:
January 08, 2019
10:00 AM PT
" @@ -96,7 +96,7 @@ sections: - items: - type: markdown text: " - +
DetailsOriginating updateStatusHistory
@@ -107,7 +107,7 @@ sections: - items: - type: markdown text: " -
DetailsOriginating updateStatusHistory
Unable to use Seek bar in Windows Media Player
After installing KB4462937, users may not be able to use the Seek bar in Windows Media Player when playing specific files. This issue does not affect normal playback.

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10, version 1607; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 10 Enterprise LTSB 2015; Windows 8.1; Windows 7 SP1
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2; Windows Server 2012; Windows Server 2008 R2 SP1; Windows Server 2008 SP2
Resolution: This issue is resolved in KB4471327.

Back to top
OS Build 15063.1387

October 09, 2018
KB4462937
Resolved
KB4471327
Resolved:
December 11, 2018
10:00 AM PT

Opened:
October 09, 2018
10:00 AM PT
LongonUI.exe stops working intermittently
After installing KB4462937, LogonUI.exe stops working intermittently.

Affected platforms:
  • Windows 10, version 1703
Resolution: This issue is resolved in KB4467699.

Back to top
OS Build 15063.1387

October 09, 2018
KB4462937
Resolved
KB4467699
Resolved:
November 27, 2018
10:00 AM PT

Opened:
October 09, 2018
10:00 AM PT
Error message beginning with “Hosted by…” when launching Microsoft Edge
After installing KB4462937, some users may see a dialog box with a non-applicable message beginning with the words “Hosted by...” when first starting Microsoft Edge.

This dialog will only appear once if they have turned on “Block only third-party cookies” in Microsoft Edge and applied certain language packs before installing this update.

Affected platforms:
  • Client: Windows 10, version 1709; Windows 10, version 1703
  • Server: Windows Server, version 1709
Resolution: This issue is resolved in KB4462939.

Back to top
OS Build 15063.1387

October 09, 2018
KB4462937
Resolved
KB4462939
Resolved:
October 18, 2018
10:00 AM PT

Opened:
October 09, 2018
10:00 AM PT
+
DetailsOriginating updateStatusHistory
DetailsOriginating updateStatusHistory
SqlConnection instantiation exception on .NET 4.6 and later
After you install the August Preview of Quality Rollup or September 11, 2018 .NET Framework update, instantiation of SqlConnection can throw an exception.

For more information about this issue, see the following article in the Microsoft Knowledge Base:
4470809 SqlConnection instantiation exception on .NET 4.6 and later after August-September 2018 .NET Framework updates.

Affected platforms:
  • Client: Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10, version 1607; Windows 10 Enterprise LTSC 2016
  • Server: Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016
Resolution: This issue is resolved in KB4480959.

Back to top
OS Build 15063.1292

August 30, 2018
KB4343889
Resolved
KB4480959
Resolved:
January 15, 2019
10:00 AM PT

Opened:
August 30, 2018
05:00 PM PT
" diff --git a/windows/release-information/resolved-issues-windows-10-1709.yml b/windows/release-information/resolved-issues-windows-10-1709.yml index 335de5ff85..e030af13f9 100644 --- a/windows/release-information/resolved-issues-windows-10-1709.yml +++ b/windows/release-information/resolved-issues-windows-10-1709.yml @@ -31,7 +31,7 @@ sections: - items: - type: markdown text: " - +
SummaryOriginating updateStatusDate resolved
@@ -61,7 +61,7 @@ sections: - items: - type: markdown text: " -
SummaryOriginating updateStatusDate resolved
Custom URI schemes may not start corresponding application
Custom URI schemes for application protocol handlers may not start the corresponding application for local intranet and trusted sites in Internet Explorer.

See details >
OS Build 16299.1029

March 12, 2019
KB4489886
Resolved
KB4493440
April 25, 2019
02:00 PM PT
End-user-defined characters (EUDC) may cause blue screen at startup
If you enable per font end-user-defined characters (EUDC), the system may stop working and a blue screen may appear at startup.

See details >
OS Build 16299.1059

March 19, 2019
KB4489890
Resolved
KB4493441
April 09, 2019
10:00 AM PT
MSXML6 causes applications to stop responding if an exception was thrown
MSXML6 causes applications to stop responding if an exception was thrown during node operations, such as appendChild(), insertBefore(), and moveNode().

See details >
OS Build 16299.904

January 08, 2019
KB4480978
Resolved
KB4493441
April 09, 2019
10:00 AM PT
+
DetailsOriginating updateStatusHistory
@@ -72,10 +72,10 @@ sections: - items: - type: markdown text: " -
DetailsOriginating updateStatusHistory
Custom URI schemes may not start corresponding application
After installing KB4489886, custom URI schemes for application protocol handlers may not start the corresponding application for local intranet and trusted sites security zones on Internet Explorer.

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10, version 1607; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 10 Enterprise LTSB 2015; Windows 8.1; Windows 7 SP1 
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2; Windows Server 2008 R2 SP1
Resolution: This issue is resolved in KB4493440

Back to top
OS Build 16299.1029

March 12, 2019
KB4489886
Resolved
KB4493440
Resolved:
April 25, 2019
02:00 PM PT

Opened:
March 12, 2019
10:00 AM PT
End-user-defined characters (EUDC) may cause blue screen at startup
If you enable per font end-user-defined characters (EUDC), the system may stop working and a blue screen may appear at startup. This is not a common setting in non-Asian regions.

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10, version 1607; Windows 10 Enterprise LTSC 2016
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016
Resolution: This issue is resolved in KB4493441.

Back to top
OS Build 16299.1059

March 19, 2019
KB4489890
Resolved
KB4493441
Resolved:
April 09, 2019
10:00 AM PT

Opened:
March 19, 2019
10:00 AM PT
Stop error when attempting to start SSH from WSL
After applying KB4489886, a stop error occurs when attempting to start the Secure Shell (SSH) client program from Windows Subsystem for Linux (WSL) with agent forwarding enabled using a command line switch (ssh –A) or a configuration setting.

Affected platforms:
  • Client: Windows 10, version 1803; Windows 10, version 1709
  • Server: Windows Server, version 1803; Windows Server, version 1709
Resolution: This issue is resolved in KB4493441.

Back to top
OS Build 16299.1029

March 12, 2019
KB4489886
Resolved
KB4493441
Resolved:
April 09, 2019
10:00 AM PT

Opened:
March 12, 2019
10:00 AM PT
+
DetailsOriginating updateStatusHistory
- +
DetailsOriginating updateStatusHistory
Embedded objects may display incorrectly
Any compound document (OLE) server application that places embedded objects into the Windows Metafile (WMF) using the PatBlt API may display embedded objects incorrectly. 
 
For example, if you paste a Microsoft Excel worksheet object into a Microsoft Word document, the cells may render with a different background color. 
 
Affected platforms:  
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10, version 1607; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 10 Enterprise LTSB 2015; Windows 8.1; Windows 7 SP1 
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2; Windows Server 2012; Windows Server 2008 R2 SP1; Windows Server 2008 SP2 
Resolution: This issue is resolved in KB4493441

Back to top
OS Build 16299.967

February 12, 2019
KB4486996
Resolved
KB4493441
Resolved:
April 09, 2019
10:00 AM PT

Opened:
February 12, 2019
10:00 AM PT
Error 1309 when installing/uninstalling MSI or MSP files
After installing KB4486996, users may receive “Error 1309” while installing or uninstalling certain types of MSI and MSP files.

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10, version 1607; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 10 Enterprise LTSB 2015; Windows 8.1
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2; Windows Server 2012
Resolution: This issue is resolved in KB4489886.

Back to top
OS Build 16299.967

February 12, 2019
KB4486996
Resolved
KB4489886
Resolved:
March 12, 2019
10:00 AM PT

Opened:
February 12, 2019
10:00 AM PT
Applications using Microsoft Jet database and Access 95 file format stop working
Applications that use a Microsoft Jet database with the Microsoft Access 95 file format may randomly stop working.

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10, version 1607; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 10 Enterprise LTSB 2015; Windows 7 SP1
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2; Windows Server 2012; Windows Server 2008 R2 SP1; Windows Server 2008 SP2
Resolution: This issue is resolved in KB4487021.

Back to top
OS Build 16299.967

February 12, 2019
KB4486996
Resolved
KB4487021
Resolved:
February 19, 2019
02:00 PM PT

Opened:
February 12, 2019
10:00 AM PT
Applications using Microsoft Jet database and Access 95 file format stop working
Applications that use a Microsoft Jet database with the Microsoft Access 95 file format may randomly stop working.

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10, version 1607; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 10 Enterprise LTSB 2015; Windows 7 SP1
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012; Windows Server 2008 R2 SP1; Windows Server 2008 SP2
Resolution: This issue is resolved in KB4487021.

Back to top
OS Build 16299.967

February 12, 2019
KB4486996
Resolved
KB4487021
Resolved:
February 19, 2019
02:00 PM PT

Opened:
February 12, 2019
10:00 AM PT
Internet Explorer may fail to load images
After installing KB4486996, Internet Explorer may fail to load images with a backslash (\\) in their relative source path.

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10, version 1607; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 10 Enterprise LTSB 2015; Windows 8.1; Windows 7 SP1
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2; Windows Server 2008 R2 SP1
Resolution: This issue is resolved in KB4487021.

Back to top
OS Build 16299.967

February 12, 2019
KB4486996
Resolved
KB4487021
Resolved:
February 19, 2019
02:00 PM PT

Opened:
February 12, 2019
10:00 AM PT
" @@ -84,11 +84,11 @@ sections: - items: - type: markdown text: " - +
DetailsOriginating updateStatusHistory
- +
DetailsOriginating updateStatusHistory
MSXML6 causes applications to stop responding if an exception was thrown
After installing KB4480978, MSXML6 causes applications to stop responding if an exception was thrown during node operations, such as appendChild(), insertBefore(), and moveNode().

The Group Policy editor may stop responding when editing a Group Policy Object (GPO) that contains Group Policy Preferences (GPP) for Internet Explorer 10 settings.

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10, version 1607; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 10 Enterprise LTSB 2015; Windows 8.1
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2; Windows Server 2012
Resolution: This issue is resolved in KB4493441.

Back to top
OS Build 16299.904

January 08, 2019
KB4480978
Resolved
KB4493441
Resolved:
April 09, 2019
10:00 AM PT

Opened:
January 08, 2019
10:00 AM PT
First character of the Japanese era name not recognized as an abbreviation
After installing KB4480967, the first character of the Japanese era name is not recognized as an abbreviation and may cause date parsing issues.

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10, version 1607; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 10 Enterprise LTSB 2015; Windows 8.1; Windows 7 SP1
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2; Windows Server 2012; Windows Server 2008 R2 SP1; Windows Server 2008 SP2
Resolution: This issue is resolved in KB4487021.

Back to top
OS Build 16299.936

January 15, 2019
KB4480967
Resolved
KB4487021
Resolved:
February 19, 2019
02:00 PM PT

Opened:
January 15, 2019
10:00 AM PT
Applications using Microsoft Jet database fail to open
Applications that use a Microsoft Jet database with the Microsoft Access 97 file format may fail to open if the database has column names greater than 32 characters. The database will fail to open with the error, “Unrecognized Database Format.”

Affected platforms:
  • Client: Windows 10, version 1709; Windows 10, version 1703; Windows 10, version 1607; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 10 Enterprise LTSB 2015; Windows 8.1; Windows 7 SP1 
  • Server: Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2; Windows Server 2012; Windows Server 2008 R2 SP1; Windows Server 2008 SP2 
Resolution: This issue is resolved in KB4486996.

Back to top
OS Build 16299.904

January 08, 2019
KB4480978
Resolved
KB4486996
Resolved:
February 12, 2019
10:00 AM PT

Opened:
January 08, 2019
10:00 AM PT
Webpages become unresponsive in Microsoft Edge
Microsoft and ArcaBit have identified an issue on devices with ArcaBit antivirus software installed that may cause the system to become unresponsive upon restart after installing KB4493446.

Microsoft has temporarily blocked devices from receiving this update if ArcaBit antivirus software is installed.

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 8.1; Windows 7 SP1
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server 2012 R2; Windows Server 2008 R2 SP1
Workaround: ArcaBit has released an update to address this issue. For more information, see the Arcabit support article.

Back to top
OS Build 16299.904

January 08, 2019
KB4480978
Resolved
KB4486996
Resolved:
February 12, 2019
10:00 AM PT

Opened:
January 08, 2019
10:00 AM PT
Webpages become unresponsive in Microsoft Edge
After installing KB4480978, some Microsoft Edge users report that they:
  • Cannot load web pages using a local IP address. 
  • Cannot load web pages on the Internet using a VPN connection.  
Browsing fails or the web page may become unresponsive. 

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709
Resolution: This issue is resolved in KB4486996.

Back to top
OS Build 16299.904

January 08, 2019
KB4480978
Resolved
KB4486996
Resolved:
February 12, 2019
10:00 AM PT

Opened:
January 08, 2019
10:00 AM PT
Unable to access hotspots with third-party applications
After installing KB4480978, third-party applications may have difficulty authenticating hotspots.

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10, version 1607; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 10 Enterprise LTSB 2015; Windows 8.1
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2; Windows Server 2012
Resolution: This issue is resolved in KB4480967.

Back to top
OS Build 16299.904

January 08, 2019
KB4480978
Resolved
KB4480967
Resolved:
January 15, 2019
10:00 AM PT

Opened:
January 08, 2019
10:00 AM PT
" @@ -97,7 +97,7 @@ sections: - items: - type: markdown text: " - +
DetailsOriginating updateStatusHistory
DetailsOriginating updateStatusHistory
Unable to use Seek bar in Windows Media Player
After installing KB4462918, users may not be able to use the Seek Bar in Windows Media Player when playing specific files. This issue does not affect normal playback.

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10, version 1607; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 10 Enterprise LTSB 2015; Windows 8.1; Windows 7 SP1
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2; Windows Server 2012; Windows Server 2008 R2 SP1; Windows Server 2008 SP2
Resolution: This issue is resolved in KB4471329.

Back to top
OS Build 16299.726

October 09, 2018
KB4462918
Resolved
KB4471329
Resolved:
December 11, 2018
10:00 AM PT

Opened:
October 09, 2018
10:00 AM PT
Error message beginning with “Hosted by…” when launching Microsoft Edge
After installing KB4462918, some users may see a dialog box with a non-applicable message beginning with the words “Hosted by...” when first starting Microsoft Edge.

This dialog will only appear once if they have turned on “Block only third-party cookies” in Microsoft Edge and applied certain language packs before installing this update.

Affected platforms:
  • Client: Windows 10, version 1709; Windows 10, version 1703
  • Server: Windows Server, version 1709
Resolution: This issue is resolved in KB4462932.

Back to top
OS Build 16299.726

October 09, 2018
KB4462918
Resolved
KB4462932
Resolved:
October 18, 2018
10:00 AM PT

Opened:
October 09, 2018
10:00 AM PT
@@ -107,7 +107,7 @@ sections: - items: - type: markdown text: " - +
DetailsOriginating updateStatusHistory
DetailsOriginating updateStatusHistory
SqlConnection instantiation exception on .NET 4.6 and later
After you install the August Preview of Quality Rollup or September 11, 2018 .NET Framework update, instantiation of SqlConnection can throw an exception.

For more information about this issue, see the following article in the Microsoft Knowledge Base:
4470809 SqlConnection instantiation exception on .NET 4.6 and later after August-September 2018 .NET Framework updates.

Affected platforms:
  • Client: Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10, version 1607; Windows 10 Enterprise LTSC 2016
  • Server: Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016
Resolution: This issue is resolved in KB4480967.

Back to top
OS Build 16299.637

August 30, 2018
KB4343893
Resolved
KB4480967
Resolved:
January 15, 2019
10:00 AM PT

Opened:
August 30, 2018
05:00 PM PT
" diff --git a/windows/release-information/resolved-issues-windows-10-1803.yml b/windows/release-information/resolved-issues-windows-10-1803.yml index 3ef64b032f..8eaaa3f3c9 100644 --- a/windows/release-information/resolved-issues-windows-10-1803.yml +++ b/windows/release-information/resolved-issues-windows-10-1803.yml @@ -31,7 +31,7 @@ sections: - items: - type: markdown text: " - +
SummaryOriginating updateStatusDate resolved
@@ -66,7 +66,7 @@ sections: - items: - type: markdown text: " -
SummaryOriginating updateStatusDate resolved
Custom URI schemes may not start corresponding application
Custom URI schemes for application protocol handlers may not start the corresponding application for local intranet and trusted sites in Internet Explorer.

See details >
OS Build 17134.648

March 12, 2019
KB4489868
Resolved
KB4493437
April 25, 2019
02:00 PM PT
End-user-defined characters (EUDC) may cause blue screen at startup
If you enable per font end-user-defined characters (EUDC), the system may stop working and a blue screen may appear at startup.

See details >
OS Build 17134.677

March 19, 2019
KB4489894
Resolved
KB4493464
April 09, 2019
10:00 AM PT
First character of the Japanese era name not recognized
The first character of the Japanese era name is not recognized as an abbreviation and may cause date parsing issues.

See details >
OS Build 17134.556

January 15, 2019
KB4480976
Resolved
KB4487029
April 09, 2019
10:00 AM PT
+
DetailsOriginating updateStatusHistory
@@ -77,7 +77,7 @@ sections: - items: - type: markdown text: " -
DetailsOriginating updateStatusHistory
Custom URI schemes may not start corresponding application
After installing KB4489868, custom URI schemes for application protocol handlers may not start the corresponding application for local intranet and trusted sites security zones on Internet Explorer. 

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10, version 1607; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 10 Enterprise LTSB 2015; Windows 8.1; Windows 7 SP1 
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2; Windows Server 2008 R2 SP1
Resolution: This issue is resolved in KB4493437

Back to top
OS Build 17134.648

March 12, 2019
KB4489868
Resolved
KB4493437
Resolved:
April 25, 2019
02:00 PM PT

Opened:
March 12, 2019
10:00 AM PT
End-user-defined characters (EUDC) may cause blue screen at startup
If you enable per font end-user-defined characters (EUDC), the system may stop working and a blue screen may appear at startup. This is not a common setting in non-Asian regions. 

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10, version 1607; Windows 10 Enterprise LTSC 2016
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016
Resolution: This issue was resolved in KB4493464

Back to top
OS Build 17134.677

March 19, 2019
KB4489894
Resolved
KB4493464
Resolved:
April 09, 2019
10:00 AM PT

Opened:
March 19, 2019
10:00 AM PT
Stop error when attempting to start SSH from WSL
After applying KB4489868, a stop error occurs when attempting to start the Secure Shell (SSH) client program from Windows Subsystem for Linux (WSL) with agent forwarding enabled using a command line switch (ssh -A) or a configuration setting.

Affected platforms:
  • Client: Windows 10, version 1803; Windows 10, version 1709
  • Server: Windows Server, version 1803; Windows Server, version 1709
Resolution: This issue was resolved in KB4493464.

Back to top
OS Build 17134.648

March 12, 2019
KB4489868
Resolved
KB4493464
Resolved:
April 09, 2019
10:00 AM PT

Opened:
March 12, 2019
10:00 AM PT
+
DetailsOriginating updateStatusHistory
@@ -88,11 +88,11 @@ sections: - items: - type: markdown text: " -
DetailsOriginating updateStatusHistory
Embedded objects may display incorrectly
Any compound document (OLE) server application that places embedded objects into the Windows Metafile (WMF) using the PatBlt API may display embedded objects incorrectly. 
 
For example, if you paste a Microsoft Excel worksheet object into a Microsoft Word document, the cells may render with a different background color. 
 
Affected platforms:  
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10, version 1607; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 10 Enterprise LTSB 2015; Windows 8.1; Windows 7 SP1 
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2; Windows Server 2012; Windows Server 2008 R2 SP1; Windows Server 2008 SP2 
Resolution: This issue is resolved in KB4493464

Back to top
OS Build 17134.590

February 12, 2019
KB4487017
Resolved
KB4493464
Resolved:
April 09, 2019
10:00 AM PT

Opened:
February 12, 2019
10:00 AM PT
Error 1309 when installing/uninstalling MSI or MSP files
After installing KB4487017, users may received \"Error 1309\" while installing or uninstalling certain types of MSI and MSP files. 

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10, version 1607; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 10 Enterprise LTSB 2015; Windows 8.1
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2; Windows Server 2012
Resolution: This issue is resolved in KB4489868.

Back to top
OS Build 17134.590

February 12, 2019
KB4487017
Resolved
KB4489868
Resolved:
March 12, 2019
10:00 AM PT

Opened:
February 12, 2019
10:00 AM PT
Internet Explorer may fail to load images
After installing KB4487017, Internet Explorer may fail to load images with a backslash (\\) in their relative source path. 

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10, version 1607; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 10 Enterprise LTSB 2015; Windows 8.1; Windows 7 SP1
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2; Windows Server 2008 R2 SP1
Resolution: This issue is resolved in KB4487029

Back to top
OS Build 17134.590

February 12, 2019
KB4487017
Resolved
KB4487029
Resolved:
February 19, 2019
02:00 PM PT

Opened:
February 12, 2019
10:00 AM PT
+
DetailsOriginating updateStatusHistory
- - + +
DetailsOriginating updateStatusHistory
First character of the Japanese era name not recognized
After installing KB4480976, the first character of the Japanese era name is not recognized as an abbreviation and may cause date parsing issues.

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10, version 1607; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 10 Enterprise LTSB 2015; Windows 8.1; Windows 7 SP1
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2; Windows Server 2012; Windows Server 2008 R2 SP1; Windows Server 2008 SP2
Resolution: This issue is resolved in KB4487029

Back to top
OS Build 17134.556

January 15, 2019
KB4480976
Resolved
KB4487029
Resolved:
February 19, 2019
02:00 PM PT

Opened:
January 08, 2019
10:00 AM PT
MSXML6 may cause applications to stop responding
After installing KB4480966, MSXML6 causes applications to stop responding if an exception was thrown during node operations, such as appendChild(), insertBefore(), and moveNode().

The Group Policy editor may stop responding when editing a Group Policy Object (GPO) that contains Group Policy Preferences (GPP) for Internet Explorer 10 settings.

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10, version 1607; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 10 Enterprise LTSB 2015; Windows 8.1
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2; Windows Server 2012
Resolution: This issue was resolved in KB4493464

Back to top
OS Build 17134.523

January 08, 2019
KB4480966
Resolved
KB4493464
Resolved:
April 09, 2019
10:00 AM PT

Opened:
January 08, 2019
10:00 AM PT
Applications using Microsoft Jet database and Access 95 file format stop working
Applications that use a Microsoft Jet database with the Microsoft Access 95 file format may randomly stop working. 

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10, version 1607; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 10 Enterprise LTSB 2015; Windows 7 SP1
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2; Windows Server 2012; Windows Server 2008 R2 SP1; Windows Server 2008 SP2
Resolution: This issue is resolved in KB4487017.

Back to top
OS Build 17134.523

January 08, 2019
KB4480966
Resolved
KB4487017
Resolved:
February 12, 2019
10:00 AM PT

Opened:
January 08, 2019
10:00 AM PT
Webpages become unresponsive in Microsoft Edge
After installing KB4480966, some Microsoft Edge users report that they: 
  • Cannot load webpages using a local IP address. 
  • Cannot load webpages on the Internet using a VPN connection.  
Browsing fails or the webpage may become unresponsive. 

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709
Resolution: This issue is resolved in KB4487017

Back to top
OS Build 17134.523

January 08, 2019
KB4480966
Resolved
KB4487017
Resolved:
February 12, 2019
10:00 AM PT

Opened:
January 08, 2019
10:00 AM PT
Applications using Microsoft Jet database and Access 95 file format stop working
Applications that use a Microsoft Jet database with the Microsoft Access 95 file format may randomly stop working. 

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10, version 1607; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 10 Enterprise LTSB 2015; Windows 7 SP1
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012; Windows Server 2008 R2 SP1; Windows Server 2008 SP2
Resolution: This issue is resolved in KB4487017.

Back to top
OS Build 17134.523

January 08, 2019
KB4480966
Resolved
KB4487017
Resolved:
February 12, 2019
10:00 AM PT

Opened:
January 08, 2019
10:00 AM PT
Webpages become unresponsive in Microsoft Edge
After installing KB4480966, some Microsoft Edge users report that they: 
  • Cannot load web pages using a local IP address. 
  • Cannot load web pages on the Internet using a VPN connection.  
Browsing fails or the web page may become unresponsive. 

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709
Resolution: This issue is resolved in KB4487017

Back to top
OS Build 17134.523

January 08, 2019
KB4480966
Resolved
KB4487017
Resolved:
February 12, 2019
10:00 AM PT

Opened:
January 08, 2019
10:00 AM PT
Unable to access hotspots with third-party applications
After installing KB4480966, third-party applications may have difficulty authenticating hotspots.

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10, version 1607; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 10 Enterprise LTSB 2015; Windows 8.1
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2; Windows Server 2012
Resolution: This issue is resolved in KB4480976

Back to top
OS Build 17134.523

January 08, 2019
KB4480966
Resolved
KB4480976
Resolved:
January 15, 2019
10:00 AM PT

Opened:
January 08, 2019
10:00 AM PT
" @@ -101,7 +101,7 @@ sections: - items: - type: markdown text: " - +
DetailsOriginating updateStatusHistory
DetailsOriginating updateStatusHistory
Cannot pin a web link on the Start menu or the taskbar
After installing KB4471324, some users cannot pin a web link on the Start menu or the taskbar. 

Affected platforms:
  • Client: Windows 10, version 1803
  • Server: Windows Server, version 1803
Resolution: This issue is resolved in KB4487029

Back to top
OS Build 17134.471

December 11, 2018
KB4471324
Resolved
KB4487029
Resolved:
February 19, 2019
02:00 PM PT

Opened:
December 11, 2018
10:00 AM PT
" @@ -110,7 +110,7 @@ sections: - items: - type: markdown text: " - +
DetailsOriginating updateStatusHistory
DetailsOriginating updateStatusHistory
Blue or black screen with \"System thread exception not handled\" error
After installing KB4467682, an optional update, some users may get a blue or black screen with the error code, \"System thread exception not handled.\"

Affected platforms:
  • Client: Windows 10, version 1803
  • Server: Windows Server, version 1803
Resolution: This issue is resolved in KB4471324

Back to top
OS Build 17134.441

November 27, 2018
KB4467682
Resolved
KB4471324
Resolved:
December 11, 2018
10:00 AM PT

Opened:
November 27, 2018
10:00 AM PT
Custom Start menu layouts display incorrectly
After installing KB4467682, custom Start menu layouts may display incorrectly. 

Affected platforms:
  • Client: Windows 10, version 1803
  • Server: Windows Server, version 1803
Resolution: This issue is resolved in KB4471324

Back to top
OS Build 17134.441

November 27, 2018
KB4467682
Resolved
KB4471324
Resolved:
December 11, 2018
10:00 AM PT

Opened:
November 27, 2018
10:00 AM PT
@@ -120,7 +120,7 @@ sections: - items: - type: markdown text: " - +
DetailsOriginating updateStatusHistory
DetailsOriginating updateStatusHistory
Unable to use Seek bar in Windows Media Player
After installing KB4462919, users may not be able to use the Seek bar in Windows Media Player when playing specific files. This issue does not affect normal playback.

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10, version 1607; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 10 Enterprise LTSB 2015; Windows 8.1; Windows 7 SP1
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2; Windows Server 2012; Windows Server 2008 R2 SP1; Windows Server 2008 SP2
Resolution: This issue is resolved in KB4471324

Back to top
OS Build 17134.345

October 09, 2018
KB4462919
Resolved
KB4471324
Resolved:
December 11, 2018
10:00 AM PT

Opened:
October 09, 2018
10:00 AM PT
Developer Tools (F12) fail to start in Microsoft Edge
Developer Tools (F12) may fail to start in Microsoft Edge.

Affected platforms:
  • Client: Windows 10, version 1803
  • Server: Windows Server, version 1803
Resolution: This issue is resolved in KB4467702

Back to top
OS Build 17134.376

October 24, 2018
KB4462933
Resolved
KB4467702
Resolved:
November 13, 2018
10:00 AM PT

Opened:
October 24, 2018
02:00 PM PT
@@ -130,7 +130,7 @@ sections: - items: - type: markdown text: " - +
DetailsOriginating updateStatusHistory
@@ -141,7 +141,7 @@ sections: - items: - type: markdown text: " -
DetailsOriginating updateStatusHistory
SqlConnection instantiation exception on .NET 4.6 and later
After you install the August Preview of Quality Rollup or September 11, 2018 .NET Framework update, instantiation of SqlConnection can throw an exception.  

For more information about this issue, see the following article in the Microsoft Knowledge Base: 4470809, SqlConnection instantiation exception on .NET 4.6 and later after August-September 2018 .NET Framework updates.

Affected platforms:
  • Client: Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10, version 1607; Windows 10 Enterprise LTSC 2016
  • Server: Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016
Resolution: This issue is resolved in KB4480976

Back to top
OS Build 17134.285

September 11, 2018
KB4457128
Resolved
KB4480976
Resolved:
January 15, 2019
10:00 AM PT

Opened:
September 11, 2018
10:00 AM PT
Users cannot set Win32 program defaults
After installing KB4458469, some users cannot set Win32 program defaults for certain app and file type combinations using the Open with... command or Settings > Apps > Default apps
 
In some cases, Microsoft Notepad or other Win32 programs cannot be set as the default.

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803
Resolution: This issue is resolved in KB4467682

Back to top
OS Build 17134.320

September 26, 2018
KB4458469
Resolved
KB4467682
Resolved:
November 27, 2018
10:00 AM PT

Opened:
September 26, 2018
02:00 PM PT
Guest VMs running Unicast NLB fail to respond after restart
All guest virtual machines running Unicast NLB fail to respond to NLB requests after the virtual machines restart. 

Affected platforms:
  • Client: Windows 10, version 1803; Windows 10, version 1507; Windows 10 Enterprise LTSB 2015
  • Server: Windows Server, version 1803
Resolution: This issue is resolved in KB4458469

Back to top
OS Build 17134.285

September 11, 2018
KB4457128
Resolved
KB4458469
Resolved:
September 26, 2018
10:00 AM PT

Opened:
September 11, 2018
10:00 AM PT
+
DetailsOriginating updateStatusHistory
DetailsOriginating updateStatusHistory
Microsoft Intune takes a long time to deliver user profiles
After installing KB4457128, Windows no longer recognizes the Personal Information exchange (PFX) certificate that's used for authenticating to a Wi-Fi or VPN connection. As a result, Microsoft Intune takes a long time to deliver user profiles because it doesn't recognize that the required certificate is on the device. 

Affected platforms:
  • Client: Windows 10, version 1803
  • Server: Windows Server, version 1803
Resolution: This issue is resolved in KB4464218

Back to top
OS Build 17134.191

July 24, 2018
KB4340917
Resolved
KB4464218
Resolved:
September 17, 2018
10:00 AM PT

Opened:
July 24, 2018
10:00 AM PT
" diff --git a/windows/release-information/resolved-issues-windows-10-1809-and-windows-server-2019.yml b/windows/release-information/resolved-issues-windows-10-1809-and-windows-server-2019.yml index b58f333fb0..9e6e80d5cc 100644 --- a/windows/release-information/resolved-issues-windows-10-1809-and-windows-server-2019.yml +++ b/windows/release-information/resolved-issues-windows-10-1809-and-windows-server-2019.yml @@ -31,7 +31,7 @@ sections: - items: - type: markdown text: " - +
SummaryOriginating updateStatusDate resolved
@@ -69,7 +69,7 @@ sections: - items: - type: markdown text: " -
SummaryOriginating updateStatusDate resolved
End-user-defined characters (EUDC) may cause blue screen at startup
If you enable per font end-user-defined characters (EUDC), the system may stop working and a blue screen may appear at startup.

See details >
OS Build 17763.404

April 02, 2019
KB4490481
Resolved
KB4493509
April 09, 2019
10:00 AM PT
Internet Explorer 11 authentication issue with multiple concurrent logons
Internet Explorer 11 users may encounter issues if two or more people use the same user account for multiple, concurrent login sessions on the same Windows Server machine.

See details >
OS Build 17763.253

January 08, 2019
KB4480116
Resolved
KB4493509
April 09, 2019
10:00 AM PT
MSXML6 may cause applications to stop responding
MSXML6 may cause applications to stop responding if an exception was thrown during node operations, such as appendChild(), insertBefore(), and moveNode().

See details >
OS Build 17763.253

January 08, 2019
KB4480116
Resolved
KB4493509
April 09, 2019
10:00 AM PT
+
DetailsOriginating updateStatusHistory
DetailsOriginating updateStatusHistory
End-user-defined characters (EUDC) may cause blue screen at startup
If you enable per font end-user-defined characters (EUDC), the system will stop working and a blue screen may appear at startup. This is not a common setting in non-Asian regions.

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10, version 1607; Windows 10 Enterprise LTSC 2016
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016
Resolution: This issue was resolved in KB4493509.

Back to top
OS Build 17763.404

April 02, 2019
KB4490481
Resolved
KB4493509
Resolved:
April 09, 2019
10:00 AM PT

Opened:
April 02, 2019
10:00 AM PT
" @@ -78,7 +78,7 @@ sections: - items: - type: markdown text: " - +
DetailsOriginating updateStatusHistory
DetailsOriginating updateStatusHistory
Apps may stop working after selecting an audio output device other than the default
After installing KB4482887 on machines that have multiple audio devices, applications that provide advanced options for internal or external audio output devices may stop working unexpectedly. This issue occurs for users that select an audio output device different from the \"Default Audio Device\". Examples of applications that may stop working include: 
  • Windows Media Player 
  • Realtek HD Audio Manager 
  • Sound Blaster Control Panel 
Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019
  • Server: Windows Server, version 1809; Windows Server 2019
Resolution: This issue was resolved in KB4490481

Back to top
OS Build 17763.348

March 01, 2019
KB4482887
Resolved
KB4490481
Resolved:
April 02, 2019
10:00 AM PT

Opened:
March 01, 2019
10:00 AM PT
" @@ -87,11 +87,11 @@ sections: - items: - type: markdown text: " - +
DetailsOriginating updateStatusHistory
- +
DetailsOriginating updateStatusHistory
Embedded objects may display incorrectly
Any compound document (OLE) server application that places embedded objects into the Windows Metafile (WMF) using the PatBlt API may display embedded objects incorrectly. 
 
For example, if you paste a Microsoft Excel worksheet object into a Microsoft Word document, the cells may render with a different background color. 
 
Affected platforms:  
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10, version 1607; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 10 Enterprise LTSB 2015; Windows 8.1; Windows 7 SP1  
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2; Windows Server 2012; Windows Server 2008 R2 SP1; Windows Server 2008 SP2  
Resolution: This issue is resolved in KB4493509.  

Back to top
OS Build 17763.316

February 12, 2019
KB4487044
Resolved
KB4493509
Resolved:
April 09, 2019
10:00 AM PT

Opened:
February 12, 2019
10:00 AM PT
Error 1309 when installing/uninstalling MSI or MSP files
After installing KB4487044, users may receive \"Error 1309\" while installing or uninstalling certain types of MSI and MSP files. 

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10, version 1607; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 10 Enterprise LTSB 2015; Windows 8.1
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2; Windows Server 2012
Resolution: This issue is resolved in KB4489899

Back to top
OS Build 17763.316

February 12, 2019
KB4487044
Resolved
KB4489899
Resolved:
March 12, 2019
10:00 AM PT

Opened:
February 12, 2019
10:00 AM PT
Internet Explorer may fail to load images
After installing KB4487044, Internet Explorer may fail to load images with a backslash (\\) in their relative source path.

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10, version 1607; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 10 Enterprise LTSB 2015; Windows 8.1; Windows 7 SP1
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2; Windows Server 2008 R2 SP1
Resolution: This issue is resolved in KB4482887.

Back to top
OS Build 17763.316

February 12, 2019
KB4487044
Resolved
KB4482887
Resolved:
March 01, 2019
10:00 AM PT

Opened:
February 12, 2019
10:00 AM PT
Applications using Microsoft Jet database and Access 95 file format stop working
Applications that use a Microsoft Jet database with the Microsoft Access 95 file format may randomly stop working.

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10, version 1607; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 10 Enterprise LTSB 2015; Windows 7 SP1
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2008 R2 SP1
Resolution: This issue is resolved in KB4482887.

Back to top
OS Build 17763.316

February 12, 2019
KB4487044
Resolved
KB4482887
Resolved:
March 01, 2019
10:00 AM PT

Opened:
February 12, 2019
10:00 AM PT
Applications using Microsoft Jet database and Access 95 file format stop working
Applications that use a Microsoft Jet database with the Microsoft Access 95 file format may randomly stop working.

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10, version 1607; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 10 Enterprise LTSB 2015; Windows 7 SP1
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012; Windows Server 2008 R2 SP1; Windows Server 2008 SP2
Resolution: This issue is resolved in KB4482887.

Back to top
OS Build 17763.316

February 12, 2019
KB4487044
Resolved
KB4482887
Resolved:
March 01, 2019
10:00 AM PT

Opened:
February 12, 2019
10:00 AM PT
First character of the Japanese era name not recognized
After installing KB4487044, the first character of the Japanese era name is not recognized as an abbreviation and may cause date parsing issues. 

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10, version 1607; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 10 Enterprise LTSB 2015; Windows 8.1; Windows 7 SP1
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2; Windows Server 2012; Windows Server 2008 R2 SP1; Windows Server 2008 SP2
Resolution: This issue is resolved in KB4482887

Back to top
OS Build 17763.316

February 12, 2019
KB4487044
Resolved
KB4482887
Resolved:
March 01, 2019
10:00 AM PT

Opened:
February 12, 2019
10:00 AM PT
" @@ -100,11 +100,11 @@ sections: - items: - type: markdown text: " - - +
DetailsOriginating updateStatusHistory
Internet Explorer 11 authentication issue with multiple concurrent logons
After installing KB4480116, Internet Explorer 11 and other applications that use WININET.DLL may have authentication issues. This occurs when two or more people use the same user account for multiple, concurrent login sessions on the same Windows Server machine, including Remote Desktop Protocol (RDP) and Terminal Server logons. Symptoms reported by customers include, but may not be limited to: 
  • Cache size and location show zero or empty. 
  • Keyboard shortcuts may not work properly. 
  • Webpages may intermittently fail to load or render correctly. 
  • Issues with credential prompts. 
  • Issues when downloading files. 
Resolution: This issue was resolved in KB4493509

Back to top
OS Build 17763.253

January 08, 2019
KB4480116
Resolved
KB4493509
Resolved:
April 09, 2019
10:00 AM PT

Opened:
January 08, 2019
10:00 AM PT
+ - +
DetailsOriginating updateStatusHistory
Internet Explorer 11 authentication issue with multiple concurrent logons
After installing KB4480116, Internet Explorer 11 and other applications that use WININET.DLL may have authentication issues. This occurs when two or more people use the same user account for multiple, concurrent login sessions on the same Windows Server machine, including Remote Desktop Protocol (RDP) and Terminal Server logons. Symptoms reported by customers include, but may not be limited to: 
  • Cache size and location show zero or empty. 
  • Keyboard shortcuts may not work properly. 
  • Webpages may intermittently fail to load or render correctly. 
  • Issues with credential prompts. 
  • Issues when downloading files. 
Affected platforms: 
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1607; Windows 10 Enterprise LTSC 2016; Windows 8.1; Windows 7 SP1
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server 2016; Windows Server 2012 R2; Windows Server 2012; Windows Server 2008 R2 SP1
Resolution: This issue was resolved in KB4493509

Back to top
OS Build 17763.253

January 08, 2019
KB4480116
Resolved
KB4493509
Resolved:
April 09, 2019
10:00 AM PT

Opened:
January 08, 2019
10:00 AM PT
MSXML6 may cause applications to stop responding
After installing KB4480116, MSXML6 causes applications to stop responding if an exception was thrown during node operations, such as appendChild(), insertBefore(), and moveNode().
 
The Group Policy editor may stop responding when editing a Group Policy Object (GPO) that contains Group Policy Preferences (GPP) for Internet Explorer 10 settings. 

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10, version 1607; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 10 Enterprise LTSB 2015; Windows 8.1
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2; Windows Server 2012
Resolution: This issue was resolved in KB4493509

Back to top
OS Build 17763.253

January 08, 2019
KB4480116
Resolved
KB4493509
Resolved:
April 09, 2019
10:00 AM PT

Opened:
January 08, 2019
10:00 AM PT
Global DNS outage affects Windows Update customers
Windows Update customers were affected by a network infrastructure event on January 29, 2019 (21:00 UTC), caused by an external DNS service provider's global outage. A software update to the external provider's DNS servers resulted in the distribution of corrupted DNS records that affected connectivity to the Windows Update service. The DNS records were restored by January 30, 2019 (00:10 UTC), and the majority of local Internet Service Providers (ISP) have refreshed their DNS servers and customer services have been restored. 
 
Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019
  • Server: Windows Server, version 1809; Windows Server 2019
While this was not an issue with Microsoft's services, we take any service disruption for our customers seriously. We will work with partners to better understand this so we can provide higher quality service in the future even across diverse global network providers. 
 
If you are still unable to connect to Windows Update services due to this problem, please contact your local ISP or network administrator. You can also refer to our new KB4493784 for more information to determine if your network is affected, and to provide your local ISP or network administrator with additional information to assist you. 

Back to top
N/A

Resolved
Resolved:
March 08, 2019
11:15 AM PT

Opened:
January 29, 2019
02:00 PM PT
Webpages become unresponsive in Microsoft Edge
After installing KB4480116, some Microsoft Edge users report that they:
  • Cannot load webpages using a local IP address. 
  • Cannot load webpages on the Internet using a VPN connection.
Browsing fails or the webpage may become unresponsive.

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709
Resolution: This issue is resolved in KB4487044

Back to top
OS Build 17763.253

January 08, 2019
KB4480116
Resolved
KB4487044
Resolved:
February 12, 2019
10:00 AM PT

Opened:
January 08, 2019
10:00 AM PT
Webpages become unresponsive in Microsoft Edge
After installing KB4480116, some Microsoft Edge users report that they:
  • Cannot load web pages using a local IP address. 
  • Cannot load web pages on the Internet using a VPN connection.
Browsing fails or the web page may become unresponsive.

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709
Resolution: This issue is resolved in KB4487020

Back to top
OS Build 17763.253

January 08, 2019
KB4480116
Resolved
KB4487044
Resolved:
February 12, 2019
10:00 AM PT

Opened:
January 08, 2019
10:00 AM PT
Unable to access hotspots with third-party applications
After installing KB4480116, third-party applications may have difficulty authenticating hotspots. 

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10, version 1607; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 10 Enterprise LTSB 2015; Windows 8.1
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2; Windows Server 2012
Resolution: This issue is resolved in KB4476976

Back to top
OS Build 17763.253

January 08, 2019
KB4480116
Resolved
KB4476976
Resolved:
January 22, 2019
02:00 PM PT

Opened:
January 08, 2019
10:00 AM PT
" @@ -113,7 +113,7 @@ sections: - items: - type: markdown text: " - +
DetailsOriginating updateStatusHistory
@@ -130,7 +130,7 @@ sections: - items: - type: markdown text: " -
DetailsOriginating updateStatusHistory
Shared albums may not sync with iCloud for Windows
Upgrade block: Users who attempt to install iCloud for Windows (version 7.7.0.27) will see a message displayed that this version iCloud for Windows isn't supported and the install will fail.

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019
  • Server: Windows Server, version 1809; Windows Server 2019
To ensure a seamless experience, Microsoft is blocking devices with iCloud for Windows (version 7.7.0.27) software installed from being offered Window 10, version 1809 until this issue has been resolved. 

We recommend that you do not attempt to manually update using the Update now button or the Media Creation Tool from the Microsoft software download website until this issue is resolved. 
 
Resolution: Apple has released an updated version of iCloud for Windows (version 7.8.1) that resolves compatibility issues encountered when updating or synching Shared Albums after updating to Windows 10, version 1809. We recommend that you update your iCloud for Windows to version 7.8.1 when prompted before attempting to upgrade to Windows 10, version 1809. You can also manually download the latest version of iCloud for Windows by visiting https://support.apple.com/HT204283.

Back to top
OS Build 17763.134

November 13, 2018
KB4467708
Resolved
KB4482887
Resolved:
March 01, 2019
10:00 AM PT

Opened:
November 13, 2018
10:00 AM PT
Intel Audio Display (intcdaud.sys) notification during Windows 10 Setup
Upgrade block: Microsoft and Intel have identified a compatibility issue with a range of Intel Display Audio device drivers (intcdaud.sys, versions 10.25.0.3 - 10.25.0.8) that may result in excessive processor demand and reduced battery life. As a result, the update process to the Windows 10 October 2018 Update (Windows 10, version 1809) will fail and affected devices will automatically revert to the previous working configuration. 

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019
  • Server: Windows Server, version 1809; Windows Server 2019
If you see a \"What needs your attention\" notification during installation of the October 2018 Update, you have one of these affected drivers on your system. On the notification, click Back to remain on your current version of Windows 10. 
 
To ensure a seamless experience, we are blocking devices from being offered the October 2018 Update until updated Intel device drivers are installed on your current operating system. We recommend that you do not attempt to manually update to Windows 10, version 1809, using the Update Now button or the Media Creation Tool from the Microsoft Software Download Center until newer Intel device drivers are available with the update. You can either wait for newer drivers to be installed automatically through Windows Update or check with your computer manufacturer for the latest device driver software availability and installation procedures. For more information about this issue, see Intel's customer support guidance.
 
Resolution: This issue was resolved in KB4482887 and the upgrade block removed. 

Back to top
OS Build 17763.134

November 13, 2018
KB4467708
Resolved
KB4482887
Resolved:
March 01, 2019
10:00 AM PT

Opened:
November 13, 2018
10:00 AM PT
F5 VPN clients losing network connectivity
Upgrade block: After updating to Window 10, version 1809, F5 VPN clients may lose network connectivity when the VPN service is in a split tunnel configuration.

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019
  • Server: Windows Server, version 1809; Windows Server 2019
Resolution: This issue was resolved in KB4482887 and the upgrade block removed. 

Back to top
OS Build 17763.134

November 13, 2018
KB4467708
Resolved
KB4482887
Resolved:
March 01, 2019
10:00 AM PT

Opened:
November 13, 2018
10:00 AM PT
+
DetailsOriginating updateStatusHistory
DetailsOriginating updateStatusHistory
Unable to use Seek bar in Windows Media Player
After installing KB4464330, users may not be able to use the Seek bar in Windows Media Player when playing specific files. This issue does not affect normal playback. 

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10, version 1607; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 10 Enterprise LTSB 2015; Windows 8.1; Windows 7 SP1
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2; Windows Server 2012; Windows Server 2008 R2 SP1; Windows Server 2008 SP2
Resolution: This issue is resolved in KB4471332

Back to top
OS Build 17763.55

October 09, 2018
KB4464330
Resolved
KB4471332
Resolved:
December 11, 2018
10:00 AM PT

Opened:
October 09, 2018
10:00 AM PT
Users cannot set Win32 program defaults
After installing KB4464330, some users cannot set Win32 program defaults for certain app and file type combinations using the Open with... command or Settings > Apps > Default apps.
 
In some cases, Microsoft Notepad or other Win32 programs cannot be set as the default. 

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803
Resolution: This issue is resolved in KB4469342

Back to top
OS Build 17763.55

October 09, 2018
KB4464330
Resolved
KB4469342
Resolved:
December 05, 2018
02:00 PM PT

Opened:
October 09, 2018
10:00 AM PT
diff --git a/windows/release-information/resolved-issues-windows-7-and-windows-server-2008-r2-sp1.yml b/windows/release-information/resolved-issues-windows-7-and-windows-server-2008-r2-sp1.yml index ad071bf048..d034127b65 100644 --- a/windows/release-information/resolved-issues-windows-7-and-windows-server-2008-r2-sp1.yml +++ b/windows/release-information/resolved-issues-windows-7-and-windows-server-2008-r2-sp1.yml @@ -31,7 +31,7 @@ sections: - items: - type: markdown text: " - +
SummaryOriginating updateStatusDate resolved
@@ -59,7 +59,7 @@ sections: - items: - type: markdown text: " -
SummaryOriginating updateStatusDate resolved
Devices may not respond at login or Welcome screen if running certain Avast software
Devices running Avast for Business, Avast CloudCare, and AVG Business Edition antivirus software may become unresponsive after restart.

See details >
April 09, 2019
KB4493472
Resolved
April 25, 2019
02:00 PM PT
Internet Explorer 11 authentication issue with multiple concurrent logons
Internet Explorer 11 users may encounter issues if two or more people use the same user account for multiple, concurrent login sessions on the same Windows Server machine.

See details >
January 08, 2019
KB4480970
Resolved
KB4493472
April 09, 2019
10:00 AM PT
Custom URI schemes may not start corresponding application
Custom URI schemes for application protocol handlers may not start the corresponding application for local intranet and trusted sites in Internet Explorer.

See details >
March 12, 2019
KB4489878
Resolved
KB4493472
April 09, 2019
10:00 AM PT
+
DetailsOriginating updateStatusHistory
DetailsOriginating updateStatusHistory
Devices may not respond at login or Welcome screen if running certain Avast software
Microsoft and Avast have identified an issue on devices running Avast for Business, Avast CloudCare, and AVG Business Edition antivirus software after you install KB4493472 and restart. Devices may become unresponsive at the login or Welcome screen. Additionally, you may be unable to log in or log in after an extended period of time.

Affected platforms: 
  • Client: Windows 8.1; Windows 7 SP1 
  • Server: Windows Server 2012 R2; Windows Server 2008 R2 SP1 
Resolution: Avast has released emergency updates to address this issue. For more information and AV update schedule, see the Avast support KB article.

Back to top
April 09, 2019
KB4493472
Resolved
Resolved:
April 25, 2019
02:00 PM PT

Opened:
April 09, 2019
10:00 AM PT
" @@ -68,7 +68,7 @@ sections: - items: - type: markdown text: " - +
DetailsOriginating updateStatusHistory
DetailsOriginating updateStatusHistory
Custom URI schemes may not start corresponding application
After installing KB4489878, custom URI schemes for application protocol handlers may not start the corresponding application for local intranet and trusted sites on Internet Explorer.

Affected platforms: 
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10, version 1607; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 10 Enterprise LTSB 2015; Windows 8.1; Windows 7 SP1 
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2; Windows Server 2008 R2 SP1 
Resolution: This issue is resolved in KB4493472.

Back to top
March 12, 2019
KB4489878
Resolved
KB4493472
Resolved:
April 09, 2019
10:00 AM PT

Opened:
March 12, 2019
10:00 AM PT
NETDOM.EXE fails to run
After installing KB4489878, NETDOM.EXE fails to run, and the on-screen error, “The command failed to complete successfully.” appears.

Affected platforms: 
  • Client: Windows 7 SP1
  • Server: Windows Server 2008 R2 SP1; Windows Server 2008 SP2
Resolution: This issue is resolved in KB4493472.

Back to top
March 12, 2019
KB4489878
Resolved
KB4493472
Resolved:
April 09, 2019
10:00 AM PT

Opened:
March 12, 2019
10:00 AM PT
@@ -78,10 +78,10 @@ sections: - items: - type: markdown text: " - - +
DetailsOriginating updateStatusHistory
Embedded objects may display incorrectly
Any compound document (OLE) server application that places embedded objects into the Windows Metafile (WMF) using the PatBlt API may display embedded objects incorrectly. 
 
For example, if you paste a Microsoft Excel worksheet object into a Microsoft Word document, the cells may render with a different background color. 
 
Affected platforms:  
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10, version 1607; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 10 Enterprise LTSB 2015; Windows 8.1; Windows 7 SP1 
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2; Windows Server 2012; Windows Server 2008 R2 SP1; Windows Server 2008 SP2 
Resolution: This issue is resolved in KB4493472

Back to top
February 12, 2019
KB4486563
Resolved
KB4493472
Resolved:
April 09, 2019
10:00 AM PT

Opened:
February 12, 2019
10:00 AM PT
+ - +
DetailsOriginating updateStatusHistory
Embedded objects may display incorrectly
Any compound document (OLE) server application that places embedded objects into the Windows Metafile (WMF) using the PatBlt API may display embedded objects incorrectly. 
 
For example, if you paste a Microsoft Excel worksheet object into a Microsoft Word document, the cells may render with a different background color. 
 
Affected platforms:  
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10, version 1607; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 10 Enterprise LTSB 2015; Windows 8.1; Windows 7 SP1 
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2; Windows Server 2012; Windows Server 2008 R2 SP1; Windows Server 2008 SP2 
Resolution: This issue is resolved in KB4493472

Back to top
February 12, 2019
KB4486563
Resolved
KB4493472
Resolved:
April 09, 2019
10:00 AM PT

Opened:
February 12, 2019
10:00 AM PT
Internet Explorer may fail to load images
After installing KB4486563, Internet Explorer may fail to load images with a backslash (\\) in their relative source path.

Affected platforms: 
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10, version 1607; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 10 Enterprise LTSB 2015; Windows 8.1; Windows 7 SP1 
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2; Windows Server 2008 R2 SP1 
Resolution: This issue is resolved in KB4486565.

Back to top
February 12, 2019
KB4486563
Resolved
KB4486565
Resolved:
February 19, 2019
02:00 PM PT

Opened:
February 12, 2019
10:00 AM PT
Applications using Microsoft Jet database and Access 95 file format stop working
Applications that use a Microsoft Jet database with the Microsoft Access 95 file format may randomly stop working.

Affected platforms: 
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10, version 1607; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 10 Enterprise LTSB 2015; Windows 7 SP1 
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2008 R2 SP1 
Resolution: This issue is resolved in KB4486565.

Back to top
February 12, 2019
KB4486563
Resolved
KB4486565
Resolved:
February 19, 2019
02:00 PM PT

Opened:
February 12, 2019
10:00 AM PT
Applications using Microsoft Jet database and Access 95 file format stop working
Applications that use a Microsoft Jet database with the Microsoft Access 95 file format may randomly stop working.

Affected platforms: 
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10, version 1607; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 10 Enterprise LTSB 2015; Windows 7 SP1 
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012; Windows Server 2008 R2 SP1; Windows Server 2008 SP2 
Resolution: This issue is resolved in KB4486565.

Back to top
February 12, 2019
KB4486563
Resolved
KB4486565
Resolved:
February 19, 2019
02:00 PM PT

Opened:
February 12, 2019
10:00 AM PT
" @@ -89,7 +89,7 @@ sections: - items: - type: markdown text: " - +
DetailsOriginating updateStatusHistory
@@ -102,7 +102,7 @@ sections: - items: - type: markdown text: " -
DetailsOriginating updateStatusHistory
Internet Explorer 11 authentication issue with multiple concurrent logons
After installing KB4480970, Internet Explorer 11 and other applications that use WININET.DLL may have authentication issues. This occurs when two or more people use the same user account for multiple, concurrent login sessions on the same Windows Server machine, including Remote Desktop Protocol (RDP) and Terminal Server logons. Symptoms reported by customers include, but may not be limited to:
  • Cache size and location show zero or empty.
  • Keyboard shortcuts may not work properly.
  • Webpages may intermittently fail to load or render correctly.
  • Issues with credential prompts.
  • Issues when downloading files.
Affected platforms: 
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1607; Windows 10 Enterprise LTSC 2016; Windows 8.1; Windows 7 SP1
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server 2016; Windows Server 2012 R2; Windows Server 2012; Windows Server 2008 R2 SP1
Resolution: This issue is resolved in KB4493472.

Back to top
January 08, 2019
KB4480970
Resolved
KB4493472
Resolved:
April 09, 2019
10:00 AM PT

Opened:
January 08, 2019
10:00 AM PT
Virtual machines fail to restore
After installing KB4480970, virtual machines (VM) may fail to restore successfully if the VM has been saved and restored once before. The error message is, “Failed to restore the virtual machine state: Cannot restore this virtual machine because the saved state data cannot be read. Delete the saved state data and then try to start the virtual machine. (0xC0370027).”

This affects AMD Bulldozer Family 15h, AMD Jaguar Family 16h, and AMD Puma Family 16h (second generation) microarchitectures.

Affected platforms: 
  • Client: Windows 8.1; Windows 7 SP1 
  • Server: Windows Server 2012 R2; Windows Server 2012; Windows Server 2008 R2 SP1; Windows Server 2008 SP2
Resolution: This issue is resolved in KB4490511.

Back to top
January 08, 2019
KB4480970
Resolved
KB4490511
Resolved:
February 19, 2019
02:00 PM PT

Opened:
January 08, 2019
10:00 AM PT
First character of the Japanese era name not recognized as an abbreviation
After installing KB4480955, the first character of the Japanese era name is not recognized as an abbreviation and may cause date parsing issues.

Affected platforms: 
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10, version 1607; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 10 Enterprise LTSB 2015; Windows 8.1; Windows 7 SP1 
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2; Windows Server 2012; Windows Server 2008 R2 SP1; Windows Server 2008 SP2 
Resolution: This issue is resolved in KB4486565.

Back to top
January 17, 2019
KB4480955
Resolved
KB4486565
Resolved:
February 19, 2019
02:00 PM PT

Opened:
January 17, 2019
10:00 AM PT
+
DetailsOriginating updateStatusHistory
DetailsOriginating updateStatusHistory
Event Viewer may not show some event descriptions for network interface cards
After installing KB4462927, the Event Viewer may not show some event descriptions for network interface cards (NICs).

Affected Platforms:
  • Client: Windows 7 SP1 
  • Server: Windows Server 2012; Windows Server 2008 R2 SP1
Resolution: This issue is resolved in KB4489878.

Back to top
October 18, 2018
KB4462927
Resolved
KB4489878
Resolved:
March 12, 2019
10:00 AM PT

Opened:
October 18, 2018
10:00 AM PT
Unable to use Seek bar in Windows Media Player
After installing KB4462923, users may not be able to use the Seek bar in Windows Media Player when playing specific files. This issue does not affect normal playback.

Affected platforms: 
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10, version 1607; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 10 Enterprise LTSB 2015; Windows 8.1; Windows 7 SP1
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2; Windows Server 2012; Windows Server 2008 R2 SP1; Windows Server 2008 SP2
Resolution: This issue is resolved in KB4471318.

Back to top
October 09, 2018
KB4462923
Resolved
KB4471318
Resolved:
December 11, 2018
10:00 AM PT

Opened:
October 09, 2018
10:00 AM PT
diff --git a/windows/release-information/resolved-issues-windows-8.1-and-windows-server-2012-r2.yml b/windows/release-information/resolved-issues-windows-8.1-and-windows-server-2012-r2.yml index 58f6c1cbac..1ef62bfe75 100644 --- a/windows/release-information/resolved-issues-windows-8.1-and-windows-server-2012-r2.yml +++ b/windows/release-information/resolved-issues-windows-8.1-and-windows-server-2012-r2.yml @@ -31,7 +31,7 @@ sections: - items: - type: markdown text: " - +
SummaryOriginating updateStatusDate resolved
@@ -59,7 +59,7 @@ sections: - items: - type: markdown text: " -
SummaryOriginating updateStatusDate resolved
Devices may not respond at login or Welcome screen if running certain Avast software
Devices running Avast for Business, Avast CloudCare, and AVG Business Edition antivirus software may become unresponsive after restart.

See details >
April 09, 2019
KB4493446
Resolved
April 25, 2019
02:00 PM PT
Internet Explorer 11 authentication issue with multiple concurrent logons
Internet Explorer 11 users may encounter issues if two or more people use the same user account for multiple, concurrent login sessions on the same Windows Server machine.

See details >
January 08, 2019
KB4480963
Resolved
KB4493446
April 09, 2019
10:00 AM PT
MSXML6 may cause applications to stop responding.
MSXML6 may cause applications to stop responding if an exception was thrown during node operations, such as appendChild(), insertBefore(), and moveNode().

See details >
January 08, 2019
KB4480963
Resolved
KB4493446
April 09, 2019
10:00 AM PT
+
DetailsOriginating updateStatusHistory
DetailsOriginating updateStatusHistory
Devices may not respond at login or Welcome screen if running certain Avast software
Microsoft and Avast have identified an issue on devices running Avast for Business, Avast CloudCare, and AVG Business Edition antivirus software after you install KB4493446 and restart. Devices may become unresponsive at the login or Welcome screen. Additionally, you may be unable to log in or log in after an extended period of time.

Affected platforms: 
  • Client: Windows 8.1; Windows 7 SP1 
  • Server: Windows Server 2012 R2; Windows Server 2008 R2 SP1 
Resolution: Avast has released emergency updates to address this issue. For more information and AV update schedule, see the Avast support KB article.

Back to top
April 09, 2019
KB4493446
Resolved
Resolved:
April 25, 2019
02:00 PM PT

Opened:
April 09, 2019
10:00 AM PT
" @@ -68,7 +68,7 @@ sections: - items: - type: markdown text: " - +
DetailsOriginating updateStatusHistory
DetailsOriginating updateStatusHistory
Custom URI schemes may not start corresponding application
After installing KB4489881, custom URI schemes for application protocol handlers may not start the corresponding application for local intranet and trusted sites security zones on Internet Explorer.

Affected platforms: 
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10, version 1607; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 10 Enterprise LTSB 2015; Windows 8.1; Windows 7 SP1 
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2; Windows Server 2008 R2 SP1 
Resolution: This issue is resolved in KB4493446.

Back to top
March 12, 2019
KB4489881
Resolved
KB4493446
Resolved:
April 09, 2019
10:00 AM PT

Opened:
March 12, 2019
10:00 AM PT
Devices with winsock kernel client may receive error
After installing KB4489881, devices with a winsock kernel client may receive D1, FC, and other errors. Additionally, systems that run the Skype for Business or Lync Server Edge Transport role may be affected by this issue.

Affected platforms: 
  • Client: Windows 8.1 
  • Server: Windows Server 2012 R2 
Resolution: This issue is resolved in KB4489893.

Back to top
March 12, 2019
KB4489881
Resolved
KB4489893
Resolved:
March 19, 2019
10:00 AM PT

Opened:
March 12, 2019
10:00 AM PT
@@ -78,7 +78,7 @@ sections: - items: - type: markdown text: " - +
DetailsOriginating updateStatusHistory
@@ -89,7 +89,7 @@ sections: - items: - type: markdown text: " -
DetailsOriginating updateStatusHistory
Embedded objects may display incorrectly
Any compound document (OLE) server application that places embedded objects into the Windows Metafile (WMF) using the PatBlt API may display embedded objects incorrectly.

For example, if you paste a Microsoft Excel worksheet object into a Microsoft Word document, the cells may render with a different background color.

Affected platforms 
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10, version 1607; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 10 Enterprise LTSB 2015; Windows 8.1; Windows 7 SP1 
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2; Windows Server 2012; Windows Server 2008 R2 SP1; Windows Server 2008 SP2 
Resolution: This issue is resolved in KB4493446.

Back to top
February 12, 2019
KB4487000
Resolved
KB4493446
Resolved:
April 09, 2019
10:00 AM PT

Opened:
February 12, 2019
10:00 AM PT
Error 1309 when installing/uninstalling MSI or MSP files
After installing KB4487016, users may receive “Error 1309” while installing or uninstalling certain types of MSI and MSP files.

Affected platforms: 
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10, version 1607; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 10 Enterprise LTSB 2015; Windows 8.1 
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2; Windows Server 2012 
Resolution: This issue is resolved in KB4489881.

Back to top
February 19, 2019
KB4487016
Resolved
KB4489881
Resolved:
March 12, 2019
10:00 AM PT

Opened:
February 19, 2019
02:00 PM PT
Internet Explorer may fail to load images
After installing KB4487000, Internet Explorer may fail to load images with a backslash (\\) in their relative source path.

Affected platforms: 
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10, version 1607; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 10 Enterprise LTSB 2015; Windows 8.1; Windows 7 SP1 
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2; Windows Server 2008 R2 SP1 
Resolution: This issue is resolved in KB4487016.

Back to top
February 12, 2019
KB4487000
Resolved
KB4487016
Resolved:
February 19, 2019
02:00 PM PT

Opened:
February 12, 2019
10:00 AM PT
+
DetailsOriginating updateStatusHistory
@@ -103,7 +103,7 @@ sections: - items: - type: markdown text: " -
DetailsOriginating updateStatusHistory
Internet Explorer 11 authentication issue with multiple concurrent logons
After installing KB4480963, Internet Explorer 11 and other applications that use WININET.DLL may have authentication issues. This occurs when two or more people use the same user account for multiple, concurrent login sessions on the same Windows Server machine, including Remote Desktop Protocol (RDP) and Terminal Server logons. Symptoms reported by customers include, but may not be limited to:
  • Cache size and location show zero or empty.
  • Keyboard shortcuts may not work properly.
  • Webpages may intermittently fail to load or render correctly.
  • Issues with credential prompts.
  • Issues when downloading files.
Affected platforms: 
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1607; Windows 10 Enterprise LTSC 2016; Windows 8.1; Windows 7 SP1
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server 2016; Windows Server 2012 R2; Windows Server 2012; Windows Server 2008 R2 SP1
Resolution: This issue is resolved in KB4493446.

Back to top
January 08, 2019
KB4480963
Resolved
KB4493446
Resolved:
April 09, 2019
10:00 AM PT

Opened:
January 08, 2019
10:00 AM PT
MSXML6 may cause applications to stop responding.
After installing KB4480963, MSXML6 causes applications to stop responding if an exception was thrown during node operations, such as appendChild(), insertBefore(), and moveNode().

The Group Policy editor may stop responding when editing a Group Policy Object (GPO) that contains Group Policy Preferences (GPP) for Internet Explorer 10 settings.

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10, version 1607; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 10 Enterprise LTSB 2015; Windows 8.1
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2; Windows Server 2012
Resolution: This issue is resolved in KB4493446.

Back to top
January 08, 2019
KB4480963
Resolved
KB4493446
Resolved:
April 09, 2019
10:00 AM PT

Opened:
January 08, 2019
10:00 AM PT
Virtual machines fail to restore
After installing KB4480963, virtual machines (VM) may fail to restore successfully if the VM has been saved and restored once before. The error message is, “Failed to restore the virtual machine state: Cannot restore this virtual machine because the saved state data cannot be read. Delete the saved state data and then try to start the virtual machine. (0xC0370027).”

This affects AMD Bulldozer Family 15h, AMD Jaguar Family 16h, and AMD Puma Family 16h (second generation) microarchitectures.

Affected platforms: 
  • Client: Windows 8.1; Windows 7 SP1 
  • Server: Windows Server 2012 R2; Windows Server 2012; Windows Server 2008 R2 SP1; Windows Server 2008 SP2
Resolution: This issue is resolved in KB4490512.

Back to top
January 08, 2019
KB4480963
Resolved
KB4490512
Resolved:
February 19, 2019
02:00 PM PT

Opened:
January 08, 2019
10:00 AM PT
+
DetailsOriginating updateStatusHistory
DetailsOriginating updateStatusHistory
Unable to use Seek bar in Windows Media Player
After installing KB4462926, users may not be able to use the Seek bar in Windows Media Player when playing specific files. This issue does not affect normal playback.

Affected platforms: 
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10, version 1607; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 10 Enterprise LTSB 2015; Windows 8.1; Windows 7 SP1 
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2; Windows Server 2012; Windows Server 2008 R2 SP1; Windows Server 2008 SP2
Resolution: This issue is resolved in KB4471320.

Back to top
October 09, 2018
KB4462926
Resolved
KB4471320
Resolved:
December 11, 2018
10:00 AM PT

Opened:
October 09, 2018
10:00 AM PT
" diff --git a/windows/release-information/resolved-issues-windows-server-2008-sp2.yml b/windows/release-information/resolved-issues-windows-server-2008-sp2.yml index 88e32ae7c4..fe19c4b36e 100644 --- a/windows/release-information/resolved-issues-windows-server-2008-sp2.yml +++ b/windows/release-information/resolved-issues-windows-server-2008-sp2.yml @@ -31,7 +31,7 @@ sections: - items: - type: markdown text: " - +
SummaryOriginating updateStatusDate resolved
@@ -54,7 +54,7 @@ sections: - items: - type: markdown text: " -
SummaryOriginating updateStatusDate resolved
Embedded objects may display incorrectly
Any compound document (OLE) server application that places embedded objects into the Windows Metafile (WMF) using the PatBlt API may display embedded objects incorrectly.

See details >
February 12, 2019
KB4487023
Resolved
KB4493471
April 09, 2019
10:00 AM PT
NETDOM.EXE fails to run
NETDOM.EXE fails to run and the error, “The command failed to complete successfully.” appears on screen.

See details >
March 12, 2019
KB4489880
Resolved
KB4493471
April 09, 2019
10:00 AM PT
First character of the Japanese era name not recognized as an abbreviation
The first character of the Japanese era name is not recognized as an abbreviation and may cause date parsing issues.

See details >
January 17, 2019
KB4480974
Resolved
KB4489880
March 12, 2019
10:00 AM PT
+
DetailsOriginating updateStatusHistory
DetailsOriginating updateStatusHistory
NETDOM.EXE fails to run
After installing KB4489880, NETDOM.EXE fails to run, and the on-screen error, “The command failed to complete successfully.” appears.

Affected platforms: 
  • Client: Windows 7 SP1
  • Server: Windows Server 2008 R2 SP1; Windows Server 2008 SP2
Resolution: This issue is resolved in KB4493471.

Back to top
March 12, 2019
KB4489880
Resolved
KB4493471
Resolved:
April 09, 2019
10:00 AM PT

Opened:
March 12, 2019
10:00 AM PT
" @@ -63,7 +63,7 @@ sections: - items: - type: markdown text: " - +
DetailsOriginating updateStatusHistory
DetailsOriginating updateStatusHistory
Embedded objects may display incorrectly
Any compound document (OLE) server application that places embedded objects into the Windows Metafile (WMF) using the PatBlt API may display embedded objects incorrectly.

For example, if you paste a Microsoft Excel worksheet object into a Microsoft Word document, the cells may render with a different background color.

Affected platforms 
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10, version 1607; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 10 Enterprise LTSB 2015; Windows 8.1; Windows 7 SP1 
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2; Windows Server 2012; Windows Server 2008 R2 SP1; Windows Server 2008 SP2
Resolution: This issue is resolved in KB4493471.

Back to top
February 12, 2019
KB4487023
Resolved
KB4493471
Resolved:
April 09, 2019
10:00 AM PT

Opened:
February 12, 2019
10:00 AM PT
Applications using Microsoft Jet database and Access 95 file format stop working
Applications that use a Microsoft Jet database with the Microsoft Access 95 file format may randomly stop working.

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10, version 1607; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 10 Enterprise LTSB 2015; Windows 7 SP1
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012; Windows Server 2008 R2 SP1; Windows Server 2008 SP2
Resolution: This issue is resolved in KB4487022.

Back to top
February 12, 2019
KB4487023
Resolved
KB4487022
Resolved:
February 19, 2019
02:00 PM PT

Opened:
February 12, 2019
10:00 AM PT
@@ -73,7 +73,7 @@ sections: - items: - type: markdown text: " - +
DetailsOriginating updateStatusHistory
@@ -85,7 +85,7 @@ sections: - items: - type: markdown text: " -
DetailsOriginating updateStatusHistory
First character of the Japanese era name not recognized as an abbreviation
After installing KB4480974, the first character of the Japanese era name is not recognized as an abbreviation and may cause date parsing issues.

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10, version 1607; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 10 Enterprise LTSB 2015; Windows 8.1; Windows 7 SP1
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2; Windows Server 2012; Windows Server 2008 R2 SP1; Windows Server 2008 SP2
Resolution: This issue is resolved in KB4489880.

Back to top
January 17, 2019
KB4480974
Resolved
KB4489880
Resolved:
March 12, 2019
10:00 AM PT

Opened:
January 17, 2019
10:00 AM PT
Virtual machines fail to restore
After installing KB4480968, virtual machines (VM) may fail to restore successfully if the VM has been saved and restored once before. The error message is, “Failed to restore the virtual machine state: Cannot restore this virtual machine because the saved state data cannot be read. Delete the saved state data and then try to start the virtual machine. (0xC0370027).”

This affects AMD Bulldozer Family 15h, AMD Jaguar Family 16h, and AMD Puma Family 16h (second generation) microarchitectures.

Affected platforms: 
  • Client: Windows 8.1; Windows 7 SP1 
  • Server: Windows Server 2012 R2; Windows Server 2012; Windows Server 2008 R2 SP1; Windows Server 2008 SP2
Resolution: This issue is resolved in KB4490514.

Back to top
January 08, 2019
KB4480968
Resolved
KB4490514
Resolved:
February 19, 2019
02:00 PM PT

Opened:
January 08, 2019
10:00 AM PT
Applications using Microsoft Jet database fail to open
Applications that use a Microsoft Jet database with the Microsoft Access 97 file format may fail to open if the database has column names greater than 32 characters. The database will fail to open with the error, “Unrecognized Database Format”.

Affected platforms: 
  • Client: Windows 10, version 1709; Windows 10, version 1703; Windows 10, version 1607; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 10 Enterprise LTSB 2015; Windows 8.1; Windows 7 SP1 
  • Server: Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2; Windows Server 2012; Windows Server 2008 R2 SP1; Windows Server 2008 SP2
Resolution: This issue is resolved in KB4487023.

Back to top
January 08, 2019
KB4480968
Resolved
KB4487023
Resolved:
February 12, 2019
10:00 AM PT

Opened:
January 08, 2019
10:00 AM PT
+
DetailsOriginating updateStatusHistory
DetailsOriginating updateStatusHistory
Unable to use Seek bar in Windows Media Player
After installing KB4463097, users may not be able to use the Seek bar in Windows Media Player when playing specific files. This issue does not affect normal playback.

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10, version 1607; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 10 Enterprise LTSB 2015; Windows 8.1; Windows 7 SP1
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2; Windows Server 2012; Windows Server 2008 R2 SP1; Windows Server 2008 SP2
Resolution: This issue is resolved in KB4471325.

Back to top
October 09, 2018
KB4463097
Resolved
KB4471325
Resolved:
December 11, 2018
10:00 AM PT

Opened:
October 09, 2018
10:00 AM PT
" diff --git a/windows/release-information/resolved-issues-windows-server-2012.yml b/windows/release-information/resolved-issues-windows-server-2012.yml index acc7d1ba20..b2a7ce07c1 100644 --- a/windows/release-information/resolved-issues-windows-server-2012.yml +++ b/windows/release-information/resolved-issues-windows-server-2012.yml @@ -31,7 +31,7 @@ sections: - items: - type: markdown text: " - +
SummaryOriginating updateStatusDate resolved
@@ -57,7 +57,7 @@ sections: - items: - type: markdown text: " -
SummaryOriginating updateStatusDate resolved
Internet Explorer 11 authentication issue with multiple concurrent logons
Internet Explorer 11 users may encounter issues if two or more people use the same user account for multiple, concurrent login sessions on the same Windows Server machine.

See details >
January 08, 2019
KB4480975
Resolved
KB4493451
April 09, 2019
10:00 AM PT
MSXML6 may cause applications to stop responding
MSXML6 may cause applications to stop responding if an exception was thrown during node operations, such as appendChild(), insertBefore(), and moveNode().

See details >
January 08, 2019
KB4480975
Resolved
KB4493451
April 09, 2019
10:00 AM PT
Embedded objects may display incorrectly
Any compound document (OLE) server application that places embedded objects into the Windows Metafile (WMF) using the PatBlt API may display embedded objects incorrectly.

See details >
February 12, 2019
KB4487025
Resolved
KB4493451
April 09, 2019
10:00 AM PT
+
DetailsOriginating updateStatusHistory
@@ -68,7 +68,7 @@ sections: - items: - type: markdown text: " -
DetailsOriginating updateStatusHistory
Embedded objects may display incorrectly
Any compound document (OLE) server application that places embedded objects into the Windows Metafile (WMF) using the PatBlt API may display embedded objects incorrectly.

For example, if you paste a Microsoft Excel worksheet object into a Microsoft Word document, the cells may render with a different background color.

Affected platforms 
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10, version 1607; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 10 Enterprise LTSB 2015; Windows 8.1; Windows 7 SP1 
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2; Windows Server 2012; Windows Server 2008 R2 SP1; Windows Server 2008 SP2 
Resolution: This issue is resolved in KB4493451.

Back to top
February 12, 2019
KB4487025
Resolved
KB4493451
Resolved:
April 09, 2019
10:00 AM PT

Opened:
February 12, 2019
10:00 AM PT
Error 1309 when installing/uninstalling MSI or MSP files
After installing KB4487025, users may receive \"Error 1309\" while installing or uninstalling certain types of MSI and MSP files.

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10, version 1607; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 10 Enterprise LTSB 2015; Windows 8.1
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2; Windows Server 2012
Resolution: This issue is resolved in KB4489891.

Back to top
February 12, 2019
KB4487025
Resolved
KB4489891
Resolved:
March 12, 2019
10:00 AM PT

Opened:
February 12, 2019
10:00 AM PT
Applications using Microsoft Jet database and Access 95 file format stop working
Applications that use a Microsoft Jet database with the Microsoft Access 95 file format may randomly stop working.

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10, version 1607; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 10 Enterprise LTSB 2015; Windows 7 SP1
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012; Windows Server 2008 R2 SP1; Windows Server 2008 SP2
Resolution: This issue is resolved in KB4487024.

Back to top
February 12, 2019
KB4487025
Resolved
KB4487024
Resolved:
February 19, 2019
02:00 PM PT

Opened:
February 12, 2019
10:00 AM PT
+
DetailsOriginating updateStatusHistory
@@ -82,7 +82,7 @@ sections: - items: - type: markdown text: " -
DetailsOriginating updateStatusHistory
Internet Explorer 11 authentication issue with multiple concurrent logons
After installing KB4480975, Internet Explorer 11 and other applications that use WININET.DLL may have authentication issues. This occurs when two or more people use the same user account for multiple, concurrent login sessions on the same Windows Server machine, including Remote Desktop Protocol (RDP) and Terminal Server logons. Symptoms reported by customers include, but may not be limited to:
  • Cache size and location show zero or empty.
  • Keyboard shortcuts may not work properly.
  • Webpages may intermittently fail to load or render correctly.
  • Issues with credential prompts.
  • Issues when downloading files.
Affected platforms: 
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1607; Windows 10 Enterprise LTSC 2016; Windows 8.1; Windows 7 SP1
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server 2016; Windows Server 2012 R2; Windows Server 2012; Windows Server 2008 R2 SP1
Resolution: This issue is resolved in KB4493451.

Back to top
January 08, 2019
KB4480975
Resolved
KB4493451
Resolved:
April 09, 2019
10:00 AM PT

Opened:
January 08, 2019
10:00 AM PT
MSXML6 may cause applications to stop responding
After installing KB4480975, MSXML6 causes applications to stop responding if an exception was thrown during node operations, such as appendChild(), insertBefore(), and moveNode().

The Group Policy editor may stop responding when editing a Group Policy Object (GPO) that contains Group Policy Preferences (GPP) for Internet Explorer 10 settings.

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10, version 1607; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 10 Enterprise LTSB 2015; Windows 8.1
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2; Windows Server 2012
Resolution: This issue is resolved in KB4493451.

Back to top
January 08, 2019
KB4480975
Resolved
KB4493451
Resolved:
April 09, 2019
10:00 AM PT

Opened:
January 08, 2019
10:00 AM PT
Virtual machines fail to restore
After installing KB4480975, virtual machines (VM) may fail to restore successfully if the VM has been saved and restored once before. The error message is, \"Failed to restore the virtual machine state: Cannot restore this virtual machine because the saved state data cannot be read. Delete the saved state data and then try to start the virtual machine. (0xC0370027).\"

This affects AMD Bulldozer Family 15h, AMD Jaguar Family 16h, and AMD Puma Family 16h (second generation) microarchitectures.

Affected platforms: 
  • Client: Windows 8.1; Windows 7 SP1 
  • Server: Windows Server 2012 R2; Windows Server 2012; Windows Server 2008 R2 SP1; Windows Server 2008 SP2
Resolution: This issue is resolved in KB4490516.

Back to top
January 08, 2019
KB4480975
Resolved
KB4490516
Resolved:
February 19, 2019
02:00 PM PT

Opened:
January 08, 2019
10:00 AM PT
+
DetailsOriginating updateStatusHistory
DetailsOriginating updateStatusHistory
Unable to use Seek bar in Windows Media Player
After installing KB4462929, users may not be able to use the Seek bar in Windows Media Player when playing specific files. This issue does not affect normal playback.

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10, version 1607; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 10 Enterprise LTSB 2015; Windows 8.1; Windows 7 SP1
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2; Windows Server 2012; Windows Server 2008 R2 SP1; Windows Server 2008 SP2
Resolution: This issue is resolved in KB4471330.

Back to top
October 09, 2018
KB4462929
Resolved
KB4471330
Resolved:
December 11, 2018
10:00 AM PT

Opened:
October 09, 2018
10:00 AM PT
" @@ -91,7 +91,7 @@ sections: - items: - type: markdown text: " - +
DetailsOriginating updateStatusHistory
DetailsOriginating updateStatusHistory
Event Viewer may not show some event descriptions for network interface cards
After installing KB4457135, the Event Viewer may not show some event descriptions for network interface cards (NICs).

Affected Platforms:
  • Client: Windows 7 SP1 
  • Server: Windows Server 2012; Windows Server 2008 R2 SP1
Resolution: This issue is resolved in KB4489891.

Back to top
September 11, 2018
KB4457135
Resolved
KB4489891
Resolved:
March 12, 2019
10:00 AM PT

Opened:
September 11, 2018
10:00 AM PT
" diff --git a/windows/release-information/status-windows-10-1507.yml b/windows/release-information/status-windows-10-1507.yml index cd92781eb2..3cab3fb9e9 100644 --- a/windows/release-information/status-windows-10-1507.yml +++ b/windows/release-information/status-windows-10-1507.yml @@ -59,11 +59,11 @@ sections: - items: - type: markdown text: "
This table offers a summary of current active issues and those issues that have been resolved in the last 30 days.

- - - +
SummaryOriginating updateStatusLast updated
Certain operations performed on a Cluster Shared Volume may fail
Certain operations, such as rename, performed on files or folders on a Cluster Shared Volume (CSV) may fail with the error, \"STATUS_BAD_IMPERSONATION_LEVEL (0xC00000A5)\".

See details >
OS Build 10240.18094

January 08, 2019
KB4480962
Mitigated
January 08, 2019
10:00 AM PT
Embedded objects may display incorrectly
Any compound document (OLE) server application that places embedded objects into the Windows Metafile (WMF) using the PatBlt API may display embedded objects incorrectly.

See details >
OS Build 10240.18132

February 12, 2019
KB4487018
Resolved
KB4493475
April 29, 2019
12:45 AM PT
+ +
SummaryOriginating updateStatusLast updated
Certain operations performed on a Cluster Shared Volume may fail
Certain operations, such as rename, performed on files or folders on a Cluster Shared Volume (CSV) may fail with the error, \"STATUS_BAD_IMPERSONATION_LEVEL (0xC00000A5)\".

See details >
OS Build 10240.18094

January 08, 2019
KB4480962
Mitigated
April 25, 2019
02:00 PM PT
MSXML6 may cause applications to stop responding
MSXML6 may cause applications to stop responding if an exception was thrown during node operations, such as appendChild(), insertBefore(), and moveNode().

See details >
OS Build 10240.18094

January 08, 2019
KB4480962
Resolved
KB4493475
April 09, 2019
10:00 AM PT
Custom URI schemes may not start corresponding application
Custom URI schemes for application protocol handlers may not start the corresponding application for local intranet and trusted sites in Internet Explorer.

See details >
OS Build 10240.18158

March 12, 2019
KB4489872
Resolved
KB4493475
April 09, 2019
10:00 AM PT
Embedded objects may display incorrectly
Any compound document (OLE) server application that places embedded objects into the Windows Metafile (WMF) using the PatBlt API may display embedded objects incorrectly.

See details >
OS Build 10240.18132

February 12, 2019
KB4487018
Resolved
KB4493475
April 09, 2019
10:00 AM PT
" @@ -74,30 +74,30 @@ sections:
" -- title: April 2019 -- items: - - type: markdown - text: " - - -
DetailsOriginating updateStatusHistory
Embedded objects may display incorrectly
Any compound document (OLE) server application that places embedded objects into the Windows Metafile (WMF) using the PatBlt API may display embedded objects incorrectly. 
 
For example, if you paste a Microsoft Excel worksheet object into a Microsoft Word document, the cells may render with a different background color. 
 
Affected platforms:  
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10, version 1607; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 10 Enterprise LTSB 2015; Windows 8.1; Windows 7 SP1 
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2; Windows Server 2012; Windows Server 2008 R2 SP1; Windows Server 2008 SP2 
Resolution: This issue is resolved in KB4493475

Back to top
OS Build 10240.18132

February 12, 2019
KB4487018
Resolved
KB4493475
Resolved:
April 09, 2019
10:00 AM PT

Opened:
April 29, 2019
12:45 AM PT
- " - - title: March 2019 - items: - type: markdown text: " - +
DetailsOriginating updateStatusHistory
DetailsOriginating updateStatusHistory
Custom URI schemes may not start corresponding application
After installing KB4489872, Custom URI Schemes for Application Protocol handlers may not start the corresponding application for local intranet and trusted sites on Internet Explorer.

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10, version 1607; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 10 Enterprise LTSB 2015; Windows 8.1; Windows 7 SP1 
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2; Windows Server 2008 R2 SP1
Resolution: This issue was resolved in KB4493475.

Back to top
OS Build 10240.18158

March 12, 2019
KB4489872
Resolved
KB4493475
Resolved:
April 09, 2019
10:00 AM PT

Opened:
March 12, 2019
10:00 AM PT
" +- title: February 2019 +- items: + - type: markdown + text: " + + +
DetailsOriginating updateStatusHistory
Embedded objects may display incorrectly
Any compound document (OLE) server application that places embedded objects into the Windows Metafile (WMF) using the PatBlt API may display embedded objects incorrectly. 
 
For example, if you paste a Microsoft Excel worksheet object into a Microsoft Word document, the cells may render with a different background color. 
 
Affected platforms:  
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10, version 1607; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 10 Enterprise LTSB 2015; Windows 8.1; Windows 7 SP1
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2; Windows Server 2012; Windows Server 2008 R2 SP1; Windows Server 2008 SP2 
Resolution: This issue is resolved in KB4493475

Back to top
OS Build 10240.18132

February 12, 2019
KB4487018
Resolved
KB4493475
Resolved:
April 09, 2019
10:00 AM PT

Opened:
February 12, 2019
10:00 AM PT
+ " + - title: January 2019 - items: - type: markdown text: " - - +
DetailsOriginating updateStatusHistory
Certain operations performed on a Cluster Shared Volume may fail
Certain operations, such as rename, that you perform on files or folders that are on a Cluster Shared Volume (CSV) may fail with the error, \"STATUS_BAD_IMPERSONATION_LEVEL (0xC00000A5)\". This occurs when you perform the operation on a CSV owner node from a process that doesn’t have administrator privilege.

Affected platforms: 
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10, version 1607; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 10 Enterprise LTSB 2015; Windows 8.1
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2; Windows Server 2012
Workaround: Do one of the following: 
  • Perform the operation from a process that has administrator privilege. 
  • Perform the operation from a node that doesn’t have CSV ownership. 
Next steps: Microsoft is working on a resolution and will provide an update in an upcoming release.

Back to top
OS Build 10240.18094

January 08, 2019
KB4480962
Mitigated
Last updated:
January 08, 2019
10:00 AM PT

Opened:
January 08, 2019
10:00 AM PT
+
DetailsOriginating updateStatusHistory
Certain operations performed on a Cluster Shared Volume may fail
Certain operations, such as rename, that you perform on files or folders that are on a Cluster Shared Volume (CSV) may fail with the error, \"STATUS_BAD_IMPERSONATION_LEVEL (0xC00000A5)\". This occurs when you perform the operation on a CSV owner node from a process that doesn’t have administrator privilege.

Affected platforms: 
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10, version 1607; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 10 Enterprise LTSB 2015; Windows 8.1
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2; Windows Server 2012
Workaround: Do one of the following: 
  • Perform the operation from a process that has administrator privilege. 
  • Perform the operation from a node that doesn’t have CSV ownership. 
Next steps: Microsoft is working on a resolution and will provide an update in an upcoming release.

Back to top
OS Build 10240.18094

January 08, 2019
KB4480962
Mitigated
Last updated:
April 25, 2019
02:00 PM PT

Opened:
January 08, 2019
10:00 AM PT
MSXML6 may cause applications to stop responding
After installing KB4480962, MSXML6 causes applications to stop responding if an exception was thrown during node operations, such as appendChild(), insertBefore(), and moveNode().

The Group Policy editor may stop responding when editing a Group Policy Object (GPO) that contains Group Policy Preferences (GPP) for Internet Explorer 10 settings.

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10, version 1607; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 10 Enterprise LTSB 2015; Windows 8.1
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2; Windows Server 2012
Resolution: This issue was resolved in KB4493475.

Back to top
OS Build 10240.18094

January 08, 2019
KB4480962
Resolved
KB4493475
Resolved:
April 09, 2019
10:00 AM PT

Opened:
January 08, 2019
10:00 AM PT
" diff --git a/windows/release-information/status-windows-10-1607-and-windows-server-2016.yml b/windows/release-information/status-windows-10-1607-and-windows-server-2016.yml index 9be29baa01..b22aced938 100644 --- a/windows/release-information/status-windows-10-1607-and-windows-server-2016.yml +++ b/windows/release-information/status-windows-10-1607-and-windows-server-2016.yml @@ -59,18 +59,18 @@ sections: - items: - type: markdown text: "
This table offers a summary of current active issues and those issues that have been resolved in the last 30 days.

- +
SummaryOriginating updateStatusLast updated
+ - - +
SummaryOriginating updateStatusLast updated
Zone transfers over TCP may fail
Zone transfers between primary and secondary DNS servers over the Transmission Control Protocol (TCP) may fail.

See details >
OS Build 14393.2941

April 25, 2019
KB4493473
Investigating
April 25, 2019
02:00 PM PT
Cluster service may fail if the minimum password length is set to greater than 14
The cluster service may fail to start with the error “2245 (NERR_PasswordTooShort)” if the Group Policy “Minimum Password Length” is configured with greater than 14 characters.

See details >
OS Build 14393.2639

November 27, 2018
KB4467684
Mitigated
April 25, 2019
02:00 PM PT
Issue using PXE to start a device from WDS
There may be issues using the Preboot Execution Environment (PXE) to start a device from a Windows Deployment Services (WDS) server configured to use Variable Window Extension.

See details >
OS Build 14393.2848

March 12, 2019
KB4489882
Mitigated
April 25, 2019
02:00 PM PT
SCVMM cannot enumerate and manage logical switches deployed on the host
For hosts managed by System Center Virtual Machine Manager (VMM), VMM cannot enumerate and manage logical switches deployed on the host.

See details >
OS Build 14393.2639

November 27, 2018
KB4467684
Mitigated
April 25, 2019
02:00 PM PT
Certain operations performed on a Cluster Shared Volume may fail
Certain operations, such as rename, performed on files or folders on a Cluster Shared Volume (CSV) may fail with the error, \"STATUS_BAD_IMPERSONATION_LEVEL (0xC00000A5)\".

See details >
OS Build 14393.2724

January 08, 2019
KB4480961
Mitigated
April 25, 2019
02:00 PM PT
Windows may not start on certain Lenovo and Fujitsu laptops with less than 8GB of RAM
Windows may fail to start on certain Lenovo and Fujitsu laptops that have less than 8 GB of RAM.

See details >
OS Build 14393.2608

November 13, 2018
KB4467691
Mitigated
February 19, 2019
10:00 AM PT
Certain operations performed on a Cluster Shared Volume may fail
Certain operations, such as rename, performed on files or folders on a Cluster Shared Volume (CSV) may fail with the error, \"STATUS_BAD_IMPERSONATION_LEVEL (0xC00000A5)\".

See details >
OS Build 14393.2724

January 08, 2019
KB4480961
Mitigated
January 08, 2019
10:00 AM PT
Embedded objects may display incorrectly
Any compound document (OLE) server application that places embedded objects into the Windows Metafile (WMF) using the PatBlt API may display embedded objects incorrectly.

See details >
OS Build 14393.2791

February 12, 2019
KB4487026
Resolved
KB4493470
April 29, 2019
12:43 AM PT
Custom URI schemes may not start corresponding application
Custom URI schemes for application protocol handlers may not start the corresponding application for local intranet and trusted sites in Internet Explorer.

See details >
OS Build 14393.2848

March 12, 2019
KB4489882
Resolved
KB4493473
April 25, 2019
02:00 PM PT
End-user-defined characters (EUDC) may cause blue screen at startup
If you enable per font end-user-defined characters (EUDC), the system will stop working and a blue screen may appear at startup.

See details >
OS Build 14393.2879

March 19, 2019
KB4489889
Resolved
KB4493470
April 09, 2019
10:00 AM PT
Internet Explorer 11 authentication issue with multiple concurrent logons
Internet Explorer 11 users may encounter issues if two or more people use the same user account for multiple, concurrent login sessions on the same Windows Server machine.

See details >
OS Build 14393.2724

January 08, 2019
KB4480961
Resolved
KB4493470
April 09, 2019
10:00 AM PT
MSXML6 may cause applications to stop responding
MSXML6 may cause applications to stop responding if an exception was thrown during node operations, such as appendChild(), insertBefore(), and moveNode().

See details >
OS Build 14393.2724

January 08, 2019
KB4480961
Resolved
KB4493470
April 09, 2019
10:00 AM PT
Embedded objects may display incorrectly
Any compound document (OLE) server application that places embedded objects into the Windows Metafile (WMF) using the PatBlt API may display embedded objects incorrectly.

See details >
OS Build 14393.2791

February 12, 2019
KB4487026
Resolved
KB4493470
April 09, 2019
10:00 AM PT
" @@ -85,9 +85,8 @@ sections: - items: - type: markdown text: " - +
DetailsOriginating updateStatusHistory
-
DetailsOriginating updateStatusHistory
Zone transfers over TCP may fail
Zone transfers between primary and secondary DNS servers over the Transmission Control Protocol (TCP) may fail after installing KB4493473
 
Affected platforms:  
  • Client: Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1607; Windows 10 Enterprise LTSC 2016 
  • Server: Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016 
Next steps: Microsoft is working on a resolution and will provide an update in an upcoming release. 

Back to top
OS Build 14393.2941

April 25, 2019
KB4493473
Investigating
Last updated:
April 25, 2019
02:00 PM PT

Opened:
April 25, 2019
02:00 PM PT
Embedded objects may display incorrectly
Any compound document (OLE) server application that places embedded objects into the Windows Metafile (WMF) using the PatBlt API may display embedded objects incorrectly. 
 
For example, if you paste a Microsoft Excel worksheet object into a Microsoft Word document, the cells may render with a different background color. 
 
Affected platforms:  
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10, version 1607; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 10 Enterprise LTSB 2015; Windows 8.1; Windows 7 SP1 
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2; Windows Server 2012; Windows Server 2008 R2 SP1; Windows Server 2008 SP2 
Resolution: This issue is resolved in KB4493470

Back to top
OS Build 14393.2791

February 12, 2019
KB4487026
Resolved
KB4493470
Resolved:
April 09, 2019
10:00 AM PT

Opened:
April 29, 2019
12:43 AM PT
" @@ -95,7 +94,7 @@ sections: - items: - type: markdown text: " - +
DetailsOriginating updateStatusHistory
@@ -103,12 +102,21 @@ sections:
DetailsOriginating updateStatusHistory
Issue using PXE to start a device from WDS
After installing KB4489882, there may be issues using the Preboot Execution Environment (PXE) to start a device from a Windows Deployment Services (WDS) server configured to use Variable Window Extension. This may cause the connection to the WDS server to terminate prematurely while downloading the image. This issue does not affect clients or devices that are not using Variable Window Extension.

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1607; Windows 10 Enterprise LTSC 2016; Windows 8.1
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server 2016; Windows Server 2012 R2; Windows Server 2012
Workaround: To mitigate the issue, disable the Variable Window Extension on WDS server using one of the following options:

Option 1:
Open an Administrator Command prompt and type the following:
Wdsutil /Set-TransportServer /EnableTftpVariableWindowExtension:No
 

Option 2:
Use the Windows Deployment Services UI to make the following adjustment:
  1. Open Windows Deployment Services from Windows Administrative Tools.
  2. Expand Servers and right-click a WDS server.
  3. Open its properties and clear the Enable Variable Window Extension box on the TFTP tab.
Option 3:
Set the following registry value to 0:
HKLM\\System\\CurrentControlSet\\Services\\WDSServer\\Providers\\WDSTFTP\\EnableVariableWindowExtension

Restart the WDSServer service after disabling the Variable Window Extension.

Next steps: Microsoft is working on a resolution and will provide an update in an upcoming release.

Back to top
OS Build 14393.2848

March 12, 2019
KB4489882
Mitigated
Last updated:
April 25, 2019
02:00 PM PT

Opened:
March 12, 2019
10:00 AM PT
Custom URI schemes may not start corresponding application
After installing KB4489882, Custom URI schemes for application protocol handlers may not start the corresponding application for local intranet and trusted sites security zones on Internet Explorer.

Affected platforms: 
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10, version 1607; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 10 Enterprise LTSB 2015; Windows 8.1; Windows 7 SP1 
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2; Windows Server 2008 R2 SP1
Resolution: This issue is resolved in KB4493473

Back to top
OS Build 14393.2848

March 12, 2019
KB4489882
Resolved
KB4493473
Resolved:
April 25, 2019
02:00 PM PT

Opened:
March 12, 2019
10:00 AM PT
" +- title: February 2019 +- items: + - type: markdown + text: " + + +
DetailsOriginating updateStatusHistory
Embedded objects may display incorrectly
Any compound document (OLE) server application that places embedded objects into the Windows Metafile (WMF) using the PatBlt API may display embedded objects incorrectly. 
 
For example, if you paste a Microsoft Excel worksheet object into a Microsoft Word document, the cells may render with a different background color. 
 
Affected platforms:  
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10, version 1607; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 10 Enterprise LTSB 2015; Windows 8.1; Windows 7 SP1 
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2; Windows Server 2012; Windows Server 2008 R2 SP1; Windows Server 2008 SP2 
Resolution: This issue is resolved in KB4493470

Back to top
OS Build 14393.2791

February 12, 2019
KB4487026
Resolved
KB4493470
Resolved:
April 09, 2019
10:00 AM PT

Opened:
February 12, 2019
10:00 AM PT
+ " + - title: January 2019 - items: - type: markdown text: " - - +
DetailsOriginating updateStatusHistory
Certain operations performed on a Cluster Shared Volume may fail
Certain operations, such as rename, that you perform on files or folders that are on a Cluster Shared Volume (CSV) may fail with the error, \"STATUS_BAD_IMPERSONATION_LEVEL (0xC00000A5)\". This occurs when you perform the operation on a CSV owner node from a process that doesn’t have administrator privilege. 

Affected platforms: 
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10, version 1607; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507;  Windows 10 Enterprise LTSB 2015; Windows 8.1
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2; Windows Server 2012
Workaround: Do one of the following:
  • Perform the operation from a process that has administrator privilege. 
  • Perform the operation from a node that doesn’t have CSV ownership.
Next steps: Microsoft is working on a resolution and will provide an update in an upcoming release.

Back to top
OS Build 14393.2724

January 08, 2019
KB4480961
Mitigated
Last updated:
January 08, 2019
10:00 AM PT

Opened:
January 08, 2019
10:00 AM PT
+
DetailsOriginating updateStatusHistory
Certain operations performed on a Cluster Shared Volume may fail
Certain operations, such as rename, that you perform on files or folders that are on a Cluster Shared Volume (CSV) may fail with the error, \"STATUS_BAD_IMPERSONATION_LEVEL (0xC00000A5)\". This occurs when you perform the operation on a CSV owner node from a process that doesn’t have administrator privilege. 

Affected platforms: 
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10, version 1607; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507;  Windows 10 Enterprise LTSB 2015; Windows 8.1
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2; Windows Server 2012
Workaround: Do one of the following:
  • Perform the operation from a process that has administrator privilege. 
  • Perform the operation from a node that doesn’t have CSV ownership.
Next steps: Microsoft is working on a resolution and will provide an update in an upcoming release.

Back to top
OS Build 14393.2724

January 08, 2019
KB4480961
Mitigated
Last updated:
April 25, 2019
02:00 PM PT

Opened:
January 08, 2019
10:00 AM PT
Internet Explorer 11 authentication issue with multiple concurrent logons
After installing KB4480961, Internet Explorer 11 and other applications that use WININET.DLL may have authentication issues. This occurs when two or more people use the same user account for multiple, concurrent login sessions on the same Windows Server machine, including Remote Desktop Protocol (RDP) and Terminal Server logons. Symptoms reported by customers include, but may not be limited to:
  • Cache size and location show zero or empty.
  • Keyboard shortcuts may not work properly.
  • Webpages may intermittently fail to load or render correctly.
  • Issues with credential prompts.
  • Issues when downloading files.
Affected platforms: 
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1607; Windows 10 Enterprise LTSC 2016; Windows 8.1; Windows 7 SP1
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server 2016; Windows Server 2012 R2; Windows Server 2012; Windows Server 2008 R2 SP1
Resolution: This issue was resolved in KB4493470.

Back to top
OS Build 14393.2724

January 08, 2019
KB4480961
Resolved
KB4493470
Resolved:
April 09, 2019
10:00 AM PT

Opened:
January 08, 2019
10:00 AM PT
MSXML6 may cause applications to stop responding
After installing KB4480961, MSXML6 causes applications to stop responding if an exception was thrown during node operations, such as appendChild(), insertBefore(), and moveNode().

The Group Policy editor may stop responding when editing a Group Policy Object (GPO) that contains Group Policy Preferences (GPP) for Internet Explorer 10 settings.

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10, version 1607; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 10 Enterprise LTSB 2015; Windows 8.1
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2; Windows Server 2012
Resolution: This issue was resolved in KB4493470.

Back to top
OS Build 14393.2724

January 08, 2019
KB4480961
Resolved
KB4493470
Resolved:
April 09, 2019
10:00 AM PT

Opened:
January 08, 2019
10:00 AM PT
@@ -118,7 +126,7 @@ sections: - items: - type: markdown text: " - +
DetailsOriginating updateStatusHistory
diff --git a/windows/release-information/status-windows-10-1703.yml b/windows/release-information/status-windows-10-1703.yml index 4d6ac25a66..10d69d6cc5 100644 --- a/windows/release-information/status-windows-10-1703.yml +++ b/windows/release-information/status-windows-10-1703.yml @@ -59,8 +59,8 @@ sections: - items: - type: markdown text: "
This table offers a summary of current active issues and those issues that have been resolved in the last 30 days.

-
DetailsOriginating updateStatusHistory
Cluster service may fail if the minimum password length is set to greater than 14
After installing KB4467684, the cluster service may fail to start with the error \"2245 (NERR_PasswordTooShort)\" if the Group Policy \"Minimum Password Length\" is configured with greater than 14 characters.

Affected platforms:
  • Client: Windows 10, version 1607; Windows 10 Enterprise LTSC 2016
  • Server: Windows Server 2016
Workaround: Set the domain default \"Minimum Password Length\" policy to less than or equal to 14 characters.

Next steps: Microsoft is working on a resolution and will provide an update in an upcoming release.

Back to top
OS Build 14393.2639

November 27, 2018
KB4467684
Mitigated
Last updated:
April 25, 2019
02:00 PM PT

Opened:
November 27, 2018
10:00 AM PT
SCVMM cannot enumerate and manage logical switches deployed on the host
For hosts managed by System Center Virtual Machine Manager (VMM), VMM cannot enumerate and manage logical switches deployed on the host after installing KB4467684.

Additionally, if you do not follow the best practices, a stop error may occur in vfpext.sys on the hosts.

Affected platforms:
  • Client: Windows 10, version 1607; Windows 10 Enterprise LTSC 2016
  • Server: Windows Server 2016
Workaround:
Run mofcomp on the following mof files on the affected host:
  • Scvmmswitchportsettings.mof
  • VMMDHCPSvr.mof
Follow the best practices while patching to avoid a stop error in vfpext.sys in an SDN v2 environment (NC managed hosts).

Back to top
OS Build 14393.2639

November 27, 2018
KB4467684
Mitigated
Last updated:
April 25, 2019
02:00 PM PT

Opened:
November 27, 2018
10:00 AM PT
Windows may not start on certain Lenovo and Fujitsu laptops with less than 8GB of RAM
After installing KB4467691, Windows may fail to start on certain Lenovo and Fujitsu laptops that have less than 8 GB of RAM.

Affected platforms:
  • Client: Windows 10, version 1607; Windows 10 Enterprise LTSC 2016
  • Server: Windows Server 2016
Workaround: Restart the affected machine using the Unified Extensible Firmware Interface (UEFI). Disable Secure Boot and then restart.

If BitLocker is enabled on your machine, you may have to go through BitLocker recovery after Secure Boot has been disabled.

Next steps: Lenovo and Fujitsu are aware of this issue. Please contact your OEM to ask if there is a firmware update available for your device.

Back to top
OS Build 14393.2608

November 13, 2018
KB4467691
Mitigated
Last updated:
February 19, 2019
10:00 AM PT

Opened:
November 13, 2018
10:00 AM PT
- +
SummaryOriginating updateStatusLast updated
Certain operations performed on a Cluster Shared Volume may fail
Certain operations, such as rename, performed on files or folders on a Cluster Shared Volume (CSV) may fail with the error, \"STATUS_BAD_IMPERSONATION_LEVEL (0xC00000A5)\".

See details >
OS Build 15063.1563

January 08, 2019
KB4480973
Mitigated
January 08, 2019
10:00 AM PT
+ @@ -79,7 +79,7 @@ sections: - items: - type: markdown text: " -
SummaryOriginating updateStatusLast updated
Certain operations performed on a Cluster Shared Volume may fail
Certain operations, such as rename, performed on files or folders on a Cluster Shared Volume (CSV) may fail with the error, \"STATUS_BAD_IMPERSONATION_LEVEL (0xC00000A5)\".

See details >
OS Build 15063.1563

January 08, 2019
KB4480973
Mitigated
April 25, 2019
02:00 PM PT
Custom URI schemes may not start corresponding application
Custom URI schemes for application protocol handlers may not start the corresponding application for local intranet and trusted sites in Internet Explorer.

See details >
OS Build 15063.1689

March 12, 2019
KB4489871
Resolved
KB4493436
April 25, 2019
02:00 PM PT
End-user-defined characters (EUDC) may cause blue screen at startup
If you enable per font end-user-defined characters (EUDC), the system may stop working and a blue screen may appear at startup.

See details >
OS Build 15063.1716

March 19, 2019
KB4489888
Resolved
KB4493474
April 09, 2019
10:00 AM PT
MSXML6 may cause applications to stop responding
MSXML6 may cause applications to stop responding if an exception was thrown during node operations, such as appendChild(), insertBefore(), and moveNode().

See details >
OS Build 15063.1563

January 08, 2019
KB4480973
Resolved
KB4493474
April 09, 2019
10:00 AM PT
+
DetailsOriginating updateStatusHistory
DetailsOriginating updateStatusHistory
Custom URI schemes may not start corresponding application
After installing KB4489871, custom URI schemes for application protocol handlers may not start the corresponding application for local intranet and trusted sites security zones on Internet Explorer.

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10, version 1607; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 10 Enterprise LTSB 2015; Windows 8.1; Windows 7 SP1 
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2; Windows Server 2008 R2 SP1
Resolution: This issue is resolved in KB4493436

Back to top
OS Build 15063.1689

March 12, 2019
KB4489871
Resolved
KB4493436
Resolved:
April 25, 2019
02:00 PM PT

Opened:
March 12, 2019
10:00 AM PT
End-user-defined characters (EUDC) may cause blue screen at startup
If you enable per font end-user-defined characters (EUDC), the system may stop working and a blue screen may appear at startup. This is not a common setting in non-Asian regions.

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10, version 1607; Windows 10 Enterprise LTSC 2016
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016
Resolution: This issue was resolved in KB4493474.

Back to top
OS Build 15063.1716

March 19, 2019
KB4489888
Resolved
KB4493474
Resolved:
April 09, 2019
10:00 AM PT

Opened:
March 19, 2019
10:00 AM PT
@@ -89,7 +89,7 @@ sections: - items: - type: markdown text: " - +
DetailsOriginating updateStatusHistory
DetailsOriginating updateStatusHistory
Embedded objects may display incorrectly
Any compound document (OLE) server application that places embedded objects into the Windows Metafile (WMF) using the PatBlt API may display embedded objects incorrectly. 
 
For example, if you paste a Microsoft Excel worksheet object into a Microsoft Word document, the cells may render with a different background color. 
 
Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10, version 1607; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 10 Enterprise LTSB 2015; Windows 8.1; Windows 7 SP1 
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2; Windows Server 2012; Windows Server 2008 R2 SP1; Windows Server 2008 SP2 
Resolution: This issue is resolved in KB4493474

Back to top
OS Build 15063.1631

February 12, 2019
KB4487020
Resolved
KB4493474
Resolved:
April 09, 2019
10:00 AM PT

Opened:
February 12, 2019
10:00 AM PT
" @@ -98,8 +98,8 @@ sections: - items: - type: markdown text: " - - - +
DetailsOriginating updateStatusHistory
Certain operations performed on a Cluster Shared Volume may fail
Certain operations, such as rename, that you perform on files or folders that are on a Cluster Shared Volume (CSV) may fail with the error, “STATUS_BAD_IMPERSONATION_LEVEL (0xC00000A5)”. This occurs when you perform the operation on a CSV owner node from a process that doesn’t have administrator privilege. 

Affected platforms: 
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10, version 1607; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 10 Enterprise LTSB 2015; Windows 8.1
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2; Windows Server 2012
Workaround: Do one of the following: 
  • Perform the operation from a process that has administrator privilege. 
  • Perform the operation from a node that doesn’t have CSV ownership. 
Next steps: Microsoft is working on a resolution and will provide an update in an upcoming release.

Back to top
OS Build 15063.1563

January 08, 2019
KB4480973
Mitigated
Last updated:
January 08, 2019
10:00 AM PT

Opened:
January 08, 2019
10:00 AM PT
MSXML6 may cause applications to stop responding
After installing KB4480973, MSXML6 causes applications to stop responding if an exception was thrown during node operations, such as appendChild(), insertBefore(), and moveNode().

The Group Policy editor may stop responding when editing a Group Policy Object (GPO) that contains Group Policy Preferences (GPP) for Internet Explorer 10 settings.

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10, version 1607; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 10 Enterprise LTSB 2015; Windows 8.1
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2
Resolution: This issue was resolved in KB4493474.

Back to top
OS Build 15063.1563

January 08, 2019
KB4480973
Resolved
KB4493474
Resolved:
April 09, 2019
10:00 AM PT

Opened:
January 08, 2019
10:00 AM PT
+ +
DetailsOriginating updateStatusHistory
Certain operations performed on a Cluster Shared Volume may fail
Certain operations, such as rename, that you perform on files or folders that are on a Cluster Shared Volume (CSV) may fail with the error, “STATUS_BAD_IMPERSONATION_LEVEL (0xC00000A5)”. This occurs when you perform the operation on a CSV owner node from a process that doesn’t have administrator privilege. 

Affected platforms: 
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10, version 1607; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 10 Enterprise LTSB 2015; Windows 8.1
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2; Windows Server 2012
Workaround: Do one of the following: 
  • Perform the operation from a process that has administrator privilege. 
  • Perform the operation from a node that doesn’t have CSV ownership. 
Next steps: Microsoft is working on a resolution and will provide an update in an upcoming release.

Back to top
OS Build 15063.1563

January 08, 2019
KB4480973
Mitigated
Last updated:
April 25, 2019
02:00 PM PT

Opened:
January 08, 2019
10:00 AM PT
MSXML6 may cause applications to stop responding
After installing KB4480973, MSXML6 causes applications to stop responding if an exception was thrown during node operations, such as appendChild(), insertBefore(), and moveNode().

The Group Policy editor may stop responding when editing a Group Policy Object (GPO) that contains Group Policy Preferences (GPP) for Internet Explorer 10 settings.

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10, version 1607; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 10 Enterprise LTSB 2015; Windows 8.1
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2; Windows Server 2012
Resolution: This issue was resolved in KB4493474.

Back to top
OS Build 15063.1563

January 08, 2019
KB4480973
Resolved
KB4493474
Resolved:
April 09, 2019
10:00 AM PT

Opened:
January 08, 2019
10:00 AM PT
" diff --git a/windows/release-information/status-windows-10-1709.yml b/windows/release-information/status-windows-10-1709.yml index 7f9f310686..45e3ada4b8 100644 --- a/windows/release-information/status-windows-10-1709.yml +++ b/windows/release-information/status-windows-10-1709.yml @@ -59,9 +59,9 @@ sections: - items: - type: markdown text: "
This table offers a summary of current active issues and those issues that have been resolved in the last 30 days.

- +
SummaryOriginating updateStatusLast updated
- + @@ -81,7 +81,7 @@ sections: - items: - type: markdown text: " -
SummaryOriginating updateStatusLast updated
Zone transfers over TCP may fail
Zone transfers between primary and secondary DNS servers over the Transmission Control Protocol (TCP) may fail.

See details >
OS Build 16299.1127

April 25, 2019
KB4493440
Investigating
April 25, 2019
02:00 PM PT
Certain operations performed on a Cluster Shared Volume may fail
Certain operations, such as rename, performed on files or folders on a Cluster Shared Volume (CSV) may fail with the error, \"STATUS_BAD_IMPERSONATION_LEVEL (0xC00000A5)\".

See details >
OS Build 16299.904

January 08, 2019
KB4480978
Mitigated
January 08, 2019
10:00 AM PT
Certain operations performed on a Cluster Shared Volume may fail
Certain operations, such as rename, performed on files or folders on a Cluster Shared Volume (CSV) may fail with the error, \"STATUS_BAD_IMPERSONATION_LEVEL (0xC00000A5)\".

See details >
OS Build 16299.904

January 08, 2019
KB4480978
Mitigated
April 25, 2019
02:00 PM PT
Custom URI schemes may not start corresponding application
Custom URI schemes for application protocol handlers may not start the corresponding application for local intranet and trusted sites in Internet Explorer.

See details >
OS Build 16299.1029

March 12, 2019
KB4489886
Resolved
KB4493440
April 25, 2019
02:00 PM PT
End-user-defined characters (EUDC) may cause blue screen at startup
If you enable per font end-user-defined characters (EUDC), the system may stop working and a blue screen may appear at startup.

See details >
OS Build 16299.1059

March 19, 2019
KB4489890
Resolved
KB4493441
April 09, 2019
10:00 AM PT
MSXML6 causes applications to stop responding if an exception was thrown
MSXML6 causes applications to stop responding if an exception was thrown during node operations, such as appendChild(), insertBefore(), and moveNode().

See details >
OS Build 16299.904

January 08, 2019
KB4480978
Resolved
KB4493441
April 09, 2019
10:00 AM PT
+
DetailsOriginating updateStatusHistory
DetailsOriginating updateStatusHistory
Zone transfers over TCP may fail
Zone transfers between primary and secondary DNS servers over the Transmission Control Protocol (TCP) may fail after installing KB4493440
 
Affected platforms:  
  • Client: Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1607; Windows 10 Enterprise LTSC 2016 
  • Server: Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016 
Next steps: Microsoft is working on a resolution and will provide an update in an upcoming release. 

Back to top
OS Build 16299.1127

April 25, 2019
KB4493440
Investigating
Last updated:
April 25, 2019
02:00 PM PT

Opened:
April 25, 2019
02:00 PM PT
" @@ -90,7 +90,7 @@ sections: - items: - type: markdown text: " - +
DetailsOriginating updateStatusHistory
@@ -101,7 +101,7 @@ sections: - items: - type: markdown text: " -
DetailsOriginating updateStatusHistory
Custom URI schemes may not start corresponding application
After installing KB4489886, custom URI schemes for application protocol handlers may not start the corresponding application for local intranet and trusted sites security zones on Internet Explorer.

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10, version 1607; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 10 Enterprise LTSB 2015; Windows 8.1; Windows 7 SP1 
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2; Windows Server 2008 R2 SP1
Resolution: This issue is resolved in KB4493440

Back to top
OS Build 16299.1029

March 12, 2019
KB4489886
Resolved
KB4493440
Resolved:
April 25, 2019
02:00 PM PT

Opened:
March 12, 2019
10:00 AM PT
End-user-defined characters (EUDC) may cause blue screen at startup
If you enable per font end-user-defined characters (EUDC), the system may stop working and a blue screen may appear at startup. This is not a common setting in non-Asian regions.

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10, version 1607; Windows 10 Enterprise LTSC 2016
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016
Resolution: This issue is resolved in KB4493441.

Back to top
OS Build 16299.1059

March 19, 2019
KB4489890
Resolved
KB4493441
Resolved:
April 09, 2019
10:00 AM PT

Opened:
March 19, 2019
10:00 AM PT
Stop error when attempting to start SSH from WSL
After applying KB4489886, a stop error occurs when attempting to start the Secure Shell (SSH) client program from Windows Subsystem for Linux (WSL) with agent forwarding enabled using a command line switch (ssh –A) or a configuration setting.

Affected platforms:
  • Client: Windows 10, version 1803; Windows 10, version 1709
  • Server: Windows Server, version 1803; Windows Server, version 1709
Resolution: This issue is resolved in KB4493441.

Back to top
OS Build 16299.1029

March 12, 2019
KB4489886
Resolved
KB4493441
Resolved:
April 09, 2019
10:00 AM PT

Opened:
March 12, 2019
10:00 AM PT
+
DetailsOriginating updateStatusHistory
DetailsOriginating updateStatusHistory
Embedded objects may display incorrectly
Any compound document (OLE) server application that places embedded objects into the Windows Metafile (WMF) using the PatBlt API may display embedded objects incorrectly. 
 
For example, if you paste a Microsoft Excel worksheet object into a Microsoft Word document, the cells may render with a different background color. 
 
Affected platforms:  
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10, version 1607; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 10 Enterprise LTSB 2015; Windows 8.1; Windows 7 SP1 
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2; Windows Server 2012; Windows Server 2008 R2 SP1; Windows Server 2008 SP2 
Resolution: This issue is resolved in KB4493441

Back to top
OS Build 16299.967

February 12, 2019
KB4486996
Resolved
KB4493441
Resolved:
April 09, 2019
10:00 AM PT

Opened:
February 12, 2019
10:00 AM PT
" @@ -110,8 +110,8 @@ sections: - items: - type: markdown text: " - - +
DetailsOriginating updateStatusHistory
Certain operations performed on a Cluster Shared Volume may fail
Certain operations, such as rename, that you perform on files or folders that are on a Cluster Shared Volume (CSV) may fail with the error, \"STATUS_BAD_IMPERSONATION_LEVEL (0xC00000A5)\". This occurs when you perform the operation on a CSV owner node from a process that doesn’t have administrator privilege. 

Affected platforms: 
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10, version 1607; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 10 Enterprise LTSB 2015; Windows 8.1
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2; Windows Server 2012
Workaround: Do one of the following:
  • Perform the operation from a process that has administrator privilege. 
  • Perform the operation from a node that doesn’t have CSV ownership. 
Next steps: Microsoft is working on a resolution and will provide an update in an upcoming release.

Back to top
OS Build 16299.904

January 08, 2019
KB4480978
Mitigated
Last updated:
January 08, 2019
10:00 AM PT

Opened:
January 08, 2019
10:00 AM PT
+
DetailsOriginating updateStatusHistory
Certain operations performed on a Cluster Shared Volume may fail
Certain operations, such as rename, that you perform on files or folders that are on a Cluster Shared Volume (CSV) may fail with the error, \"STATUS_BAD_IMPERSONATION_LEVEL (0xC00000A5)\". This occurs when you perform the operation on a CSV owner node from a process that doesn’t have administrator privilege. 

Affected platforms: 
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10, version 1607; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 10 Enterprise LTSB 2015; Windows 8.1
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2; Windows Server 2012
Workaround: Do one of the following:
  • Perform the operation from a process that has administrator privilege. 
  • Perform the operation from a node that doesn’t have CSV ownership. 
Next steps: Microsoft is working on a resolution and will provide an update in an upcoming release.

Back to top
OS Build 16299.904

January 08, 2019
KB4480978
Mitigated
Last updated:
April 25, 2019
02:00 PM PT

Opened:
January 08, 2019
10:00 AM PT
MSXML6 causes applications to stop responding if an exception was thrown
After installing KB4480978, MSXML6 causes applications to stop responding if an exception was thrown during node operations, such as appendChild(), insertBefore(), and moveNode().

The Group Policy editor may stop responding when editing a Group Policy Object (GPO) that contains Group Policy Preferences (GPP) for Internet Explorer 10 settings.

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10, version 1607; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 10 Enterprise LTSB 2015; Windows 8.1
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2; Windows Server 2012
Resolution: This issue is resolved in KB4493441.

Back to top
OS Build 16299.904

January 08, 2019
KB4480978
Resolved
KB4493441
Resolved:
April 09, 2019
10:00 AM PT

Opened:
January 08, 2019
10:00 AM PT
" diff --git a/windows/release-information/status-windows-10-1803.yml b/windows/release-information/status-windows-10-1803.yml index ba58d76fc8..3e58d9c048 100644 --- a/windows/release-information/status-windows-10-1803.yml +++ b/windows/release-information/status-windows-10-1803.yml @@ -59,10 +59,10 @@ sections: - items: - type: markdown text: "
This table offers a summary of current active issues and those issues that have been resolved in the last 30 days.

- +
SummaryOriginating updateStatusLast updated
- + @@ -83,7 +83,7 @@ sections: - items: - type: markdown text: " -
SummaryOriginating updateStatusLast updated
Zone transfers over TCP may fail
Zone transfers between primary and secondary DNS servers over the Transmission Control Protocol (TCP) may fail.

See details >
OS Build 17134.753

April 25, 2019
KB4493437
Investigating
April 25, 2019
02:00 PM PT
Issue using PXE to start a device from WDS
Using PXE to start a device from a WDS server configured to use Variable Window Extension may cause the connection to the WDS server to terminate prematurely.

See details >
OS Build 17134.648

March 12, 2019
KB4489868
Mitigated
April 25, 2019
02:00 PM PT
Certain operations performed on a Cluster Shared Volume may fail
Certain operations, such as rename, performed on files or folders on a Cluster Shared Volume (CSV) may fail with the error, \"STATUS_BAD_IMPERSONATION_LEVEL (0xC00000A5)\".

See details >
OS Build 17134.523

January 08, 2019
KB4480966
Mitigated
January 08, 2019
10:00 AM PT
Certain operations performed on a Cluster Shared Volume may fail
Certain operations, such as rename, performed on files or folders on a Cluster Shared Volume (CSV) may fail with the error, \"STATUS_BAD_IMPERSONATION_LEVEL (0xC00000A5)\".

See details >
OS Build 17134.523

January 08, 2019
KB4480966
Mitigated
April 25, 2019
02:00 PM PT
Custom URI schemes may not start corresponding application
Custom URI schemes for application protocol handlers may not start the corresponding application for local intranet and trusted sites in Internet Explorer.

See details >
OS Build 17134.648

March 12, 2019
KB4489868
Resolved
KB4493437
April 25, 2019
02:00 PM PT
End-user-defined characters (EUDC) may cause blue screen at startup
If you enable per font end-user-defined characters (EUDC), the system may stop working and a blue screen may appear at startup.

See details >
OS Build 17134.677

March 19, 2019
KB4489894
Resolved
KB4493464
April 09, 2019
10:00 AM PT
First character of the Japanese era name not recognized
The first character of the Japanese era name is not recognized as an abbreviation and may cause date parsing issues.

See details >
OS Build 17134.556

January 15, 2019
KB4480976
Resolved
KB4487029
April 09, 2019
10:00 AM PT
+
DetailsOriginating updateStatusHistory
DetailsOriginating updateStatusHistory
Zone transfers over TCP may fail
Zone transfers between primary and secondary DNS servers over the Transmission Control Protocol (TCP) may fail after installing KB4493437
 
Affected platforms:  
  • Client: Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1607; Windows 10 Enterprise LTSC 2016 
  • Server: Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016 
Next steps: Microsoft is working on a resolution and will provide an update in an upcoming release. 

Back to top
OS Build 17134.753

April 25, 2019
KB4493437
Investigating
Last updated:
April 25, 2019
02:00 PM PT

Opened:
April 25, 2019
02:00 PM PT
" @@ -92,7 +92,7 @@ sections: - items: - type: markdown text: " - +
DetailsOriginating updateStatusHistory
@@ -105,7 +105,7 @@ sections: - items: - type: markdown text: " -
DetailsOriginating updateStatusHistory
Issue using PXE to start a device from WDS
After installing KB4489868, there may be issues using the Preboot Execution Environment (PXE) to start a device from a Windows Deployment Services (WDS) server configured to use Variable Window Extension. This may cause the connection to the WDS server to terminate prematurely while downloading the image. This issue does not affect clients or devices that are not using Variable Window Extension. 

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1607; Windows 10 Enterprise LTSC 2016; Windows 8.1
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server 2016; Windows Server 2012 R2; Windows Server 2012
Workaround: To mitigate the issue, disable the Variable Window Extension on WDS server using one of the following options:

Option 1: 
Open an Administrator Command prompt and type the following:  
Wdsutil /Set-TransportServer /EnableTftpVariableWindowExtension:No
 

 Option 2: 
Use the Windows Deployment Services UI to make the following adjustment:  
  1. Open Windows Deployment Services from Windows Administrative Tools. 
  2. Expand Servers and right-click a WDS server. 
  3. Open its properties and clear the Enable Variable Window Extension box on the TFTP tab.  
Option 3: 
Set the following registry value to 0:
HKLM\\System\\CurrentControlSet\\Services\\WDSServer\\Providers\\WDSTFTP\\EnableVariableWindowExtension  

Restart the WDSServer service after disabling the Variable Window Extension. 
 
Next steps: Microsoft is working on a resolution and will provide an update in an upcoming release. 

Back to top
OS Build 17134.648

March 12, 2019
KB4489868
Mitigated
Last updated:
April 25, 2019
02:00 PM PT

Opened:
March 12, 2019
10:00 AM PT
Custom URI schemes may not start corresponding application
After installing KB4489868, custom URI schemes for application protocol handlers may not start the corresponding application for local intranet and trusted sites security zones on Internet Explorer. 

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10, version 1607; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 10 Enterprise LTSB 2015; Windows 8.1; Windows 7 SP1 
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2; Windows Server 2008 R2 SP1
Resolution: This issue is resolved in KB4493437

Back to top
OS Build 17134.648

March 12, 2019
KB4489868
Resolved
KB4493437
Resolved:
April 25, 2019
02:00 PM PT

Opened:
March 12, 2019
10:00 AM PT
+
DetailsOriginating updateStatusHistory
DetailsOriginating updateStatusHistory
Embedded objects may display incorrectly
Any compound document (OLE) server application that places embedded objects into the Windows Metafile (WMF) using the PatBlt API may display embedded objects incorrectly. 
 
For example, if you paste a Microsoft Excel worksheet object into a Microsoft Word document, the cells may render with a different background color. 
 
Affected platforms:  
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10, version 1607; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 10 Enterprise LTSB 2015; Windows 8.1; Windows 7 SP1 
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2; Windows Server 2012; Windows Server 2008 R2 SP1; Windows Server 2008 SP2 
Resolution: This issue is resolved in KB4493464

Back to top
OS Build 17134.590

February 12, 2019
KB4487017
Resolved
KB4493464
Resolved:
April 09, 2019
10:00 AM PT

Opened:
February 12, 2019
10:00 AM PT
" @@ -114,8 +114,8 @@ sections: - items: - type: markdown text: " - - +
DetailsOriginating updateStatusHistory
Certain operations performed on a Cluster Shared Volume may fail
Certain operations, such as rename, that you perform on files or folders that are on a Cluster Shared Volume (CSV) may fail with the error, \"STATUS_BAD_IMPERSONATION_LEVEL (0xC00000A5)\". This occurs when you perform the operation on a CSV owner node from a process that doesn’t have administrator privilege.

Affected platforms: 
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10, version 1607; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 10 Enterprise LTSB 2015; Windows 8.1
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2; Windows Server 2012
Workaround: Do one of the following:
  • Perform the operation from a process that has administrator privilege. 
  • Perform the operation from a node that doesn’t have CSV ownership. 
Next steps: Microsoft is working on a resolution and will provide an update in an upcoming release.

Back to top
OS Build 17134.523

January 08, 2019
KB4480966
Mitigated
Last updated:
January 08, 2019
10:00 AM PT

Opened:
January 08, 2019
10:00 AM PT
+
DetailsOriginating updateStatusHistory
Certain operations performed on a Cluster Shared Volume may fail
Certain operations, such as rename, that you perform on files or folders that are on a Cluster Shared Volume (CSV) may fail with the error, \"STATUS_BAD_IMPERSONATION_LEVEL (0xC00000A5)\". This occurs when you perform the operation on a CSV owner node from a process that doesn’t have administrator privilege.

Affected platforms: 
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10, version 1607; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 10 Enterprise LTSB 2015; Windows 8.1
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2; Windows Server 2012
Workaround: Do one of the following:
  • Perform the operation from a process that has administrator privilege. 
  • Perform the operation from a node that doesn’t have CSV ownership. 
Next steps: Microsoft is working on a resolution and will provide an update in an upcoming release.

Back to top
OS Build 17134.523

January 08, 2019
KB4480966
Mitigated
Last updated:
April 25, 2019
02:00 PM PT

Opened:
January 08, 2019
10:00 AM PT
First character of the Japanese era name not recognized
After installing KB4480976, the first character of the Japanese era name is not recognized as an abbreviation and may cause date parsing issues.

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10, version 1607; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 10 Enterprise LTSB 2015; Windows 8.1; Windows 7 SP1
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2; Windows Server 2012; Windows Server 2008 R2 SP1; Windows Server 2008 SP2
Resolution: This issue is resolved in KB4487029

Back to top
OS Build 17134.556

January 15, 2019
KB4480976
Resolved
KB4487029
Resolved:
February 19, 2019
02:00 PM PT

Opened:
January 08, 2019
10:00 AM PT
MSXML6 may cause applications to stop responding
After installing KB4480966, MSXML6 causes applications to stop responding if an exception was thrown during node operations, such as appendChild(), insertBefore(), and moveNode().

The Group Policy editor may stop responding when editing a Group Policy Object (GPO) that contains Group Policy Preferences (GPP) for Internet Explorer 10 settings.

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10, version 1607; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 10 Enterprise LTSB 2015; Windows 8.1
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2; Windows Server 2012
Resolution: This issue was resolved in KB4493464

Back to top
OS Build 17134.523

January 08, 2019
KB4480966
Resolved
KB4493464
Resolved:
April 09, 2019
10:00 AM PT

Opened:
January 08, 2019
10:00 AM PT
diff --git a/windows/release-information/status-windows-10-1809-and-windows-server-2019.yml b/windows/release-information/status-windows-10-1809-and-windows-server-2019.yml index a78c82b2e2..82bcf3314f 100644 --- a/windows/release-information/status-windows-10-1809-and-windows-server-2019.yml +++ b/windows/release-information/status-windows-10-1809-and-windows-server-2019.yml @@ -64,7 +64,7 @@ sections: - items: - type: markdown text: "
This table offers a summary of current active issues and those issues that have been resolved in the last 30 days.

- +
SummaryOriginating updateStatusLast updated
@@ -89,7 +89,8 @@ sections: - items: - type: markdown text: " -
SummaryOriginating updateStatusLast updated
System may be unresponsive after restart if ArcaBit antivirus software installed
Devices with ArcaBit antivirus software installed may become unresponsive upon restart.

See details >
OS Build 17763.437

April 09, 2019
KB4493509
Mitigated
April 25, 2019
02:00 PM PT
Custom URI schemes may not start corresponding application
Custom URI schemes for application protocol handlers may not start the corresponding application for local intranet and trusted sites in Internet Explorer.

See details >
OS Build 17763.379

March 12, 2019
KB4489899
Mitigated
April 09, 2019
10:00 AM PT
Issue using PXE to start a device from WDS
Using PXE to start a device from a WDS server configured to use Variable Window Extension may cause the connection to the WDS server to terminate prematurely.

See details >
OS Build 17763.379

March 12, 2019
KB4489899
Mitigated
April 09, 2019
10:00 AM PT
+
DetailsOriginating updateStatusHistory
+
DetailsOriginating updateStatusHistory
System may be unresponsive after restart if ArcaBit antivirus software installed
Microsoft and ArcaBit have identified an issue on devices with ArcaBit antivirus software installed that may cause the system to become unresponsive upon restart after installing KB4493509
 
Microsoft has temporarily blocked devices from receiving this update if ArcaBit antivirus software is installed. 

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 8.1; Windows 7 SP1
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server 2012 R2; Windows Server 2008 R2 SP1
Workaround: ArcaBit has released an update to address this issue. For more information, see the Arcabit support article.

Back to top
OS Build 17763.437

April 09, 2019
KB4493509
Mitigated
Last updated:
April 25, 2019
02:00 PM PT

Opened:
April 09, 2019
10:00 AM PT
End-user-defined characters (EUDC) may cause blue screen at startup
If you enable per font end-user-defined characters (EUDC), the system will stop working and a blue screen may appear at startup. This is not a common setting in non-Asian regions.

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10, version 1607; Windows 10 Enterprise LTSC 2016
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016
Resolution: This issue was resolved in KB4493509.

Back to top
OS Build 17763.404

April 02, 2019
KB4490481
Resolved
KB4493509
Resolved:
April 09, 2019
10:00 AM PT

Opened:
April 02, 2019
10:00 AM PT
" @@ -98,7 +99,7 @@ sections: - items: - type: markdown text: " - +
DetailsOriginating updateStatusHistory
@@ -110,7 +111,7 @@ sections: - items: - type: markdown text: " -
DetailsOriginating updateStatusHistory
Custom URI schemes may not start corresponding application
After installing KB4489899, custom URI schemes for application protocol handlers may not start the corresponding application for local intranet and trusted sites security zones on Internet Explorer.

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10, version 1607; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 10 Enterprise LTSB 2015; Windows 8.1; Windows 7 SP1 
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2; Windows Server 2008 R2 SP1
Workaround: Right-click the URL link to open it in a new window or tab, or enable Protected Mode in Internet Explorer for local intranet and trusted sites
  1. Go to Tools > Internet options > Security.
  2. Within Select a zone to view of change security settings, select Local intranet and then select Enable Protected Mode.
  3. Select Trusted Sites and then select Enable Protected Mode
  4. Select OK.
You must restart the browser after making these changes. 
 
Next steps: Microsoft is working on a resolution and will provide an update in an upcoming release. 

Back to top
OS Build 17763.379

March 12, 2019
KB4489899
Mitigated
Last updated:
April 09, 2019
10:00 AM PT

Opened:
March 12, 2019
10:00 AM PT
Issue using PXE to start a device from WDS
After installing KB4489899, there may be issues using the Preboot Execution Environment (PXE) to start a device from a Windows Deployment Services (WDS) server configured to use Variable Window Extension. This may cause the connection to the WDS server to terminate prematurely while downloading the image. This issue does not affect clients or devices that are not using Variable Window Extension. 

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1607; Windows 10 Enterprise LTSC 2016; Windows 8.1
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server 2016; Windows Server 2012 R2; Windows Server 2012
Workaround: To mitigate the issue, disable the Variable Window Extension on WDS server using one of the following options:

Option 1:
Open an Administrator Command prompt and type the following:
Wdsutil /Set-TransportServer /EnableTftpVariableWindowExtension:No 
 

Option 2:
Use the Windows Deployment Services UI to make the following adjustment: 
  1. Open Windows Deployment Services from Windows Administrative Tools. 
  2. Expand Servers and right-click a WDS server. 
  3. Open its properties and clear the Enable Variable Window Extension box on the TFTP tab.
Option 3:
Set the following registry value to 0:
HKLM\\System\\CurrentControlSet\\Services\\WDSServer\\Providers\\WDSTFTP\\EnableVariableWindowExtension  

Restart the WDSServer service after disabling the Variable Window Extension. 

Next steps: Microsoft is working on a resolution and will provide an update in an upcoming release. 

Back to top
OS Build 17763.379

March 12, 2019
KB4489899
Mitigated
Last updated:
April 09, 2019
10:00 AM PT

Opened:
March 12, 2019
10:00 AM PT
+
DetailsOriginating updateStatusHistory
DetailsOriginating updateStatusHistory
Embedded objects may display incorrectly
Any compound document (OLE) server application that places embedded objects into the Windows Metafile (WMF) using the PatBlt API may display embedded objects incorrectly. 
 
For example, if you paste a Microsoft Excel worksheet object into a Microsoft Word document, the cells may render with a different background color. 
 
Affected platforms:  
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10, version 1607; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 10 Enterprise LTSB 2015; Windows 8.1; Windows 7 SP1  
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2; Windows Server 2012; Windows Server 2008 R2 SP1; Windows Server 2008 SP2  
Resolution: This issue is resolved in KB4493509.  

Back to top
OS Build 17763.316

February 12, 2019
KB4487044
Resolved
KB4493509
Resolved:
April 09, 2019
10:00 AM PT

Opened:
February 12, 2019
10:00 AM PT
" @@ -119,10 +120,9 @@ sections: - items: - type: markdown text: " - - +
DetailsOriginating updateStatusHistory
System may be unresponsive after restart if ArcaBit antivirus software installed
Microsoft and ArcaBit have identified an issue on devices with ArcaBit antivirus software installed that may cause the system to become unresponsive upon restart after installing KB4493509
 
Microsoft has temporarily blocked devices from receiving this update if ArcaBit antivirus software is installed. 

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 8.1; Windows 7 SP1
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server 2012 R2; Windows Server 2008 R2 SP1
Workaround: ArcaBit has released an update to address this issue. For more information, see the Arcabit support article.

Back to top
OS Build 17763.437

April 09, 2019
KB4493509
Mitigated
Last updated:
April 25, 2019
02:00 PM PT

Opened:
January 08, 2019
10:00 AM PT
- +
DetailsOriginating updateStatusHistory
Certain operations performed on a Cluster Shared Volume may fail
Certain operations, such as rename, that you perform on files or folders that are on a Cluster Shared Volume (CSV) may fail with the error, \"STATUS_BAD_IMPERSONATION_LEVEL (0xC00000A5)\". This occurs when you perform the operation on a CSV owner node from a process that doesn’t have administrator privilege. 

Affected platforms: 
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10, version 1607; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 10 Enterprise LTSB 2015; Windows 8.1
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2; Windows Server 2012
Workaround: Do one of the following:  
  • Perform the operation from a process that has administrator privilege. 
  • Perform the operation from a node that doesn’t have CSV ownership. 
Next steps: Microsoft is working on a resolution and will provide an update in an upcoming release.

Back to top
OS Build 17763.253

January 08, 2019
KB4480116
Mitigated
Last updated:
January 08, 2019
10:00 AM PT

Opened:
January 08, 2019
10:00 AM PT
Internet Explorer 11 authentication issue with multiple concurrent logons
After installing KB4480116, Internet Explorer 11 and other applications that use WININET.DLL may have authentication issues. This occurs when two or more people use the same user account for multiple, concurrent login sessions on the same Windows Server machine, including Remote Desktop Protocol (RDP) and Terminal Server logons. Symptoms reported by customers include, but may not be limited to: 
  • Cache size and location show zero or empty. 
  • Keyboard shortcuts may not work properly. 
  • Webpages may intermittently fail to load or render correctly. 
  • Issues with credential prompts. 
  • Issues when downloading files. 
Resolution: This issue was resolved in KB4493509

Back to top
OS Build 17763.253

January 08, 2019
KB4480116
Resolved
KB4493509
Resolved:
April 09, 2019
10:00 AM PT

Opened:
January 08, 2019
10:00 AM PT
Internet Explorer 11 authentication issue with multiple concurrent logons
After installing KB4480116, Internet Explorer 11 and other applications that use WININET.DLL may have authentication issues. This occurs when two or more people use the same user account for multiple, concurrent login sessions on the same Windows Server machine, including Remote Desktop Protocol (RDP) and Terminal Server logons. Symptoms reported by customers include, but may not be limited to: 
  • Cache size and location show zero or empty. 
  • Keyboard shortcuts may not work properly. 
  • Webpages may intermittently fail to load or render correctly. 
  • Issues with credential prompts. 
  • Issues when downloading files. 
Affected platforms: 
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1607; Windows 10 Enterprise LTSC 2016; Windows 8.1; Windows 7 SP1
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server 2016; Windows Server 2012 R2; Windows Server 2012; Windows Server 2008 R2 SP1
Resolution: This issue was resolved in KB4493509

Back to top
OS Build 17763.253

January 08, 2019
KB4480116
Resolved
KB4493509
Resolved:
April 09, 2019
10:00 AM PT

Opened:
January 08, 2019
10:00 AM PT
MSXML6 may cause applications to stop responding
After installing KB4480116, MSXML6 causes applications to stop responding if an exception was thrown during node operations, such as appendChild(), insertBefore(), and moveNode().
 
The Group Policy editor may stop responding when editing a Group Policy Object (GPO) that contains Group Policy Preferences (GPP) for Internet Explorer 10 settings. 

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10, version 1607; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 10 Enterprise LTSB 2015; Windows 8.1
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2; Windows Server 2012
Resolution: This issue was resolved in KB4493509

Back to top
OS Build 17763.253

January 08, 2019
KB4480116
Resolved
KB4493509
Resolved:
April 09, 2019
10:00 AM PT

Opened:
January 08, 2019
10:00 AM PT
" @@ -131,7 +131,7 @@ sections: - items: - type: markdown text: " - +
DetailsOriginating updateStatusHistory
DetailsOriginating updateStatusHistory
Audio not working on monitors or TV connected to a PC via HDMI, USB, or DisplayPort
Upgrade block: Microsoft has identified issues with certain new Intel display drivers. Intel inadvertently released versions of its display driver (versions 24.20.100.6344, 24.20.100.6345) to OEMs that accidentally turned on unsupported features in Windows. 
 
As a result, after updating to Windows 10, version 1809, audio playback from a monitor or television connected to a PC via HDMI, USB-C, or a DisplayPort may not function correctly on devices with these drivers.

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019
  • Server: Windows Server, version 1809; Windows Server 2019 
Next steps: Intel has released updated drivers to OEM device manufacturers. OEMs need to make the updated driver available via Windows Update.

For more information, see the Intel Customer Support article.

Note: This Intel display driver issue is different from the Intel Smart Sound Technology driver (version 09.21.00.3755) audio issue previously documented.

Back to top
OS Build 17763.134

November 13, 2018
KB4467708
Mitigated
Last updated:
March 15, 2019
12:00 PM PT

Opened:
November 13, 2018
10:00 AM PT
" diff --git a/windows/release-information/status-windows-7-and-windows-server-2008-r2-sp1.yml b/windows/release-information/status-windows-7-and-windows-server-2008-r2-sp1.yml index e035655450..9c9b11c520 100644 --- a/windows/release-information/status-windows-7-and-windows-server-2008-r2-sp1.yml +++ b/windows/release-information/status-windows-7-and-windows-server-2008-r2-sp1.yml @@ -59,12 +59,12 @@ sections: - items: - type: markdown text: "
This table offers a summary of current active issues and those issues that have been resolved in the last 30 days.

- +
SummaryOriginating updateStatusLast updated
- + @@ -84,11 +84,11 @@ sections: - items: - type: markdown text: " -
SummaryOriginating updateStatusLast updated
System may be unresponsive after restart if Avira antivirus software installed
Devices with Avira antivirus software installed may become unresponsive upon restart.

See details >
April 09, 2019
KB4493472
Investigating
April 25, 2019
02:00 PM PT
Authentication may fail for services after the Kerberos ticket expires
Authentication may fail for services that require unconstrained delegation after the Kerberos ticket expires.

See details >
March 12, 2019
KB4489878
Mitigated
April 25, 2019
02:00 PM PT
System unresponsive after restart if Sophos Endpoint Protection installed
Devices with Sophos Endpoint Protection installed and managed by Sophos Central or Sophos Enterprise Console (SEC) may become unresponsive upon restart.

See details >
April 09, 2019
KB4493472
Mitigated
April 25, 2019
02:00 PM PT
System may be unresponsive after restart if ArcaBit antivirus software installed
Devices with ArcaBit antivirus software installed may become unresponsive upon restart.

See details >
April 09, 2019
KB4493472
Mitigated
April 25, 2019
02:00 PM PT
System may be unresponsive after restart with certain McAfee antivirus products
Devices with McAfee Endpoint Security Threat Prevention 10.x, Host Intrusion Prevention 8.0, or VirusScan Enterprise 8.8 may be slow or unresponsive at startup.

See details >
April 09, 2019
KB4493472
Mitigated
April 18, 2019
05:00 PM PT
System may be unresponsive after restart with certain McAfee antivirus products
Devices with McAfee Endpoint Security Threat Prevention 10.x, Host Intrusion Prevention 8.0, or VirusScan Enterprise 8.8 may be slow or unresponsive at startup.

See details >
April 09, 2019
KB4493472
Mitigated
April 25, 2019
02:00 PM PT
Devices may not respond at login or Welcome screen if running certain Avast software
Devices running Avast for Business, Avast CloudCare, and AVG Business Edition antivirus software may become unresponsive after restart.

See details >
April 09, 2019
KB4493472
Resolved
April 25, 2019
02:00 PM PT
Internet Explorer 11 authentication issue with multiple concurrent logons
Internet Explorer 11 users may encounter issues if two or more people use the same user account for multiple, concurrent login sessions on the same Windows Server machine.

See details >
January 08, 2019
KB4480970
Resolved
KB4493472
April 09, 2019
10:00 AM PT
Custom URI schemes may not start corresponding application
Custom URI schemes for application protocol handlers may not start the corresponding application for local intranet and trusted sites in Internet Explorer.

See details >
March 12, 2019
KB4489878
Resolved
KB4493472
April 09, 2019
10:00 AM PT
+
DetailsOriginating updateStatusHistory
- +
DetailsOriginating updateStatusHistory
System may be unresponsive after restart if Avira antivirus software installed
Microsoft and Avira have identified an issue on devices with Avira antivirus software installed that may cause the system to become unresponsive upon restart after installing KB4493472.

Microsoft has temporarily blocked devices from receiving this update if Avira antivirus software is installed.

Affected platforms: 
  • Client: Windows 8.1; Windows 7 SP1 
  • Server: Windows Server 2012 R2; Windows Server 2012; Windows Server 2008 R2 SP1; Windows Server 2008 SP2
Next steps: We are presently investigating this issue with Avira and will provide an update when available.

Back to top
April 09, 2019
KB4493472
Investigating
Last updated:
April 25, 2019
02:00 PM PT

Opened:
April 09, 2019
10:00 AM PT
System unresponsive after restart if Sophos Endpoint Protection installed
Microsoft and Sophos have identified an issue on devices with Sophos Endpoint Protection installed and managed by either Sophos Central or Sophos Enterprise Console (SEC) that may cause the system to become unresponsive upon restart after installing KB4493472.

Microsoft has temporarily blocked devices from receiving this update if the Sophos Endpoint is installed until a solution is available.

Affected platforms: 
  • Client: Windows 8.1; Windows 7 SP1
  • Server: Windows Server 2012 R2; Windows Server 2012; Windows Server 2008 R2 SP1; Windows Server 2008 SP2
Guidance for Sophos Endpoint and Sophos Enterprise Console customers can be found in the Sophos support article.

Back to top
April 09, 2019
KB4493472
Mitigated
Last updated:
April 25, 2019
02:00 PM PT

Opened:
April 09, 2019
10:00 AM PT
System may be unresponsive after restart if ArcaBit antivirus software installed
Microsoft and ArcaBit have identified an issue on devices with ArcaBit antivirus software installed that may cause the system to become unresponsive upon restart after installing KB4493472.

Microsoft has temporarily blocked devices from receiving this update if ArcaBit antivirus software is installed.

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 8.1; Windows 7 SP1
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server 2012 R2; Windows Server 2008 R2 SP1
Workaround: ArcaBit has released an update to address this issue. For more information, see the Arcabit support article.

Back to top
April 09, 2019
KB4493472
Mitigated
Last updated:
April 25, 2019
02:00 PM PT

Opened:
April 09, 2019
10:00 AM PT
System may be unresponsive after restart with certain McAfee antivirus products
Microsoft and McAfee have identified an issue on devices with McAfee Endpoint Security (ENS) Threat Prevention 10.x or McAfee Host Intrusion Prevention (Host IPS) 8.0 or McAfee VirusScan Enterprise (VSE) 8.8 installed. It may cause the system to have slow startup or become unresponsive at restart after installing this update. 

Affected platforms:
  • Client:  Windows 8.1; Windows 7 SP1
  • Server:  Windows Server 2012 R2; Windows Server 2008 R2 SP1
Workaround: Guidance for McAfee customers can be found in the following McAfee support articles: 
Next steps: We are presently investigating this issue with McAfee. We will provide an update once we have more information.

Back to top
April 09, 2019
KB4493472
Mitigated
Last updated:
April 18, 2019
05:00 PM PT

Opened:
April 09, 2019
10:00 AM PT
System may be unresponsive after restart with certain McAfee antivirus products
Microsoft and McAfee have identified an issue on devices with McAfee Endpoint Security (ENS) Threat Prevention 10.x or McAfee Host Intrusion Prevention (Host IPS) 8.0 or McAfee VirusScan Enterprise (VSE) 8.8 installed. It may cause the system to have slow startup or become unresponsive at restart after installing this update. 

Affected platforms:
  • Client:  Windows 8.1; Windows 7 SP1
  • Server:  Windows Server 2012 R2; Windows Server 2008 R2 SP1
Workaround: Guidance for McAfee customers can be found in the following McAfee support articles: 
Next steps: We are presently investigating this issue with McAfee. We will provide an update once we have more information.

Back to top
April 09, 2019
KB4493472
Mitigated
Last updated:
April 25, 2019
02:00 PM PT

Opened:
April 09, 2019
10:00 AM PT
Devices may not respond at login or Welcome screen if running certain Avast software
Microsoft and Avast have identified an issue on devices running Avast for Business, Avast CloudCare, and AVG Business Edition antivirus software after you install KB4493472 and restart. Devices may become unresponsive at the login or Welcome screen. Additionally, you may be unable to log in or log in after an extended period of time.

Affected platforms: 
  • Client: Windows 8.1; Windows 7 SP1 
  • Server: Windows Server 2012 R2; Windows Server 2008 R2 SP1 
Resolution: Avast has released emergency updates to address this issue. For more information and AV update schedule, see the Avast support KB article.

Back to top
April 09, 2019
KB4493472
Resolved
Resolved:
April 25, 2019
02:00 PM PT

Opened:
April 09, 2019
10:00 AM PT
" @@ -97,7 +97,7 @@ sections: - items: - type: markdown text: " - +
DetailsOriginating updateStatusHistory
@@ -108,8 +108,8 @@ sections: - items: - type: markdown text: " -
DetailsOriginating updateStatusHistory
Authentication may fail for services after the Kerberos ticket expires
After installing KB4489878, some customers report that authentication fails for services that require unconstrained delegation after the Kerberos ticket expires (the default is 10 hours). For example, the SQL server service fails.

Affected platforms: 
  • Client: Windows 7 SP1
  • Server: Windows Server 2008 R2 SP1; Windows Server 2008 SP2
Workaround: To mitigate this issue, use one of the following options:
  • Option 1: Purge the Kerberos tickets on the application server. After the Kerberos ticket expires, the issue will occur again, and you must purge the tickets again.
  • Option 2: If purging does not mitigate the issue, restart the application; for example, restart the Internet Information Services (IIS) app pool associated with the SQL server.
  • Option 3: Use constrained delegation.
Next steps: Microsoft is working on a resolution and will provide an update in an upcoming release.

Back to top
March 12, 2019
KB4489878
Mitigated
Last updated:
April 25, 2019
02:00 PM PT

Opened:
March 12, 2019
10:00 AM PT
Custom URI schemes may not start corresponding application
After installing KB4489878, custom URI schemes for application protocol handlers may not start the corresponding application for local intranet and trusted sites on Internet Explorer.

Affected platforms: 
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10, version 1607; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 10 Enterprise LTSB 2015; Windows 8.1; Windows 7 SP1 
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2; Windows Server 2008 R2 SP1 
Resolution: This issue is resolved in KB4493472.

Back to top
March 12, 2019
KB4489878
Resolved
KB4493472
Resolved:
April 09, 2019
10:00 AM PT

Opened:
March 12, 2019
10:00 AM PT
NETDOM.EXE fails to run
After installing KB4489878, NETDOM.EXE fails to run, and the on-screen error, “The command failed to complete successfully.” appears.

Affected platforms: 
  • Client: Windows 7 SP1
  • Server: Windows Server 2008 R2 SP1; Windows Server 2008 SP2
Resolution: This issue is resolved in KB4493472.

Back to top
March 12, 2019
KB4489878
Resolved
KB4493472
Resolved:
April 09, 2019
10:00 AM PT

Opened:
March 12, 2019
10:00 AM PT
- +
DetailsOriginating updateStatusHistory
Embedded objects may display incorrectly
Any compound document (OLE) server application that places embedded objects into the Windows Metafile (WMF) using the PatBlt API may display embedded objects incorrectly. 
 
For example, if you paste a Microsoft Excel worksheet object into a Microsoft Word document, the cells may render with a different background color. 
 
Affected platforms:  
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10, version 1607; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 10 Enterprise LTSB 2015; Windows 8.1; Windows 7 SP1 
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2; Windows Server 2012; Windows Server 2008 R2 SP1; Windows Server 2008 SP2 
Resolution: This issue is resolved in KB4493472

Back to top
February 12, 2019
KB4486563
Resolved
KB4493472
Resolved:
April 09, 2019
10:00 AM PT

Opened:
February 12, 2019
10:00 AM PT
+
DetailsOriginating updateStatusHistory
Embedded objects may display incorrectly
Any compound document (OLE) server application that places embedded objects into the Windows Metafile (WMF) using the PatBlt API may display embedded objects incorrectly. 
 
For example, if you paste a Microsoft Excel worksheet object into a Microsoft Word document, the cells may render with a different background color. 
 
Affected platforms:  
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10, version 1607; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 10 Enterprise LTSB 2015; Windows 8.1; Windows 7 SP1 
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2; Windows Server 2012; Windows Server 2008 R2 SP1; Windows Server 2008 SP2 
Resolution: This issue is resolved in KB4493472

Back to top
February 12, 2019
KB4486563
Resolved
KB4493472
Resolved:
April 09, 2019
10:00 AM PT

Opened:
February 12, 2019
10:00 AM PT
" @@ -117,7 +117,7 @@ sections: - items: - type: markdown text: " - +
DetailsOriginating updateStatusHistory
DetailsOriginating updateStatusHistory
Internet Explorer 11 authentication issue with multiple concurrent logons
After installing KB4480970, Internet Explorer 11 and other applications that use WININET.DLL may have authentication issues. This occurs when two or more people use the same user account for multiple, concurrent login sessions on the same Windows Server machine, including Remote Desktop Protocol (RDP) and Terminal Server logons. Symptoms reported by customers include, but may not be limited to:
  • Cache size and location show zero or empty.
  • Keyboard shortcuts may not work properly.
  • Webpages may intermittently fail to load or render correctly.
  • Issues with credential prompts.
  • Issues when downloading files.
Affected platforms: 
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1607; Windows 10 Enterprise LTSC 2016; Windows 8.1; Windows 7 SP1
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server 2016; Windows Server 2012 R2; Windows Server 2012; Windows Server 2008 R2 SP1
Resolution: This issue is resolved in KB4493472.

Back to top
January 08, 2019
KB4480970
Resolved
KB4493472
Resolved:
April 09, 2019
10:00 AM PT

Opened:
January 08, 2019
10:00 AM PT
" diff --git a/windows/release-information/status-windows-8.1-and-windows-server-2012-r2.yml b/windows/release-information/status-windows-8.1-and-windows-server-2012-r2.yml index c51f4b8a9c..4a94eba224 100644 --- a/windows/release-information/status-windows-8.1-and-windows-server-2012-r2.yml +++ b/windows/release-information/status-windows-8.1-and-windows-server-2012-r2.yml @@ -59,13 +59,13 @@ sections: - items: - type: markdown text: "
This table offers a summary of current active issues and those issues that have been resolved in the last 30 days.

- +
SummaryOriginating updateStatusLast updated
+ - @@ -85,7 +85,7 @@ sections: - items: - type: markdown text: " -
SummaryOriginating updateStatusLast updated
System may be unresponsive after restart if Avira antivirus software installed
Devices with Avira antivirus software installed may become unresponsive upon restart.

See details >
April 09, 2019
KB4493446
Investigating
April 25, 2019
02:00 PM PT
Issue using PXE to start a device from WDS
There may be issues using the Preboot Execution Environment (PXE) to start a device from a Windows Deployment Services (WDS) server configured to use Variable Window Extension.

See details >
March 12, 2019
KB4489881
Mitigated
April 25, 2019
02:00 PM PT
System unresponsive after restart if Sophos Endpoint Protection installed
Devices with Sophos Endpoint Protection installed and managed by Sophos Central or Sophos Enterprise Console (SEC) may become unresponsive upon restart.

See details >
April 09, 2019
KB4493446
Mitigated
April 25, 2019
02:00 PM PT
System may be unresponsive after restart if ArcaBit antivirus software installed
Devices with ArcaBit antivirus software installed may become unresponsive upon restart.

See details >
April 09, 2019
KB4493446
Mitigated
April 25, 2019
02:00 PM PT
Certain operations performed on a Cluster Shared Volume may fail
Certain operations, such as rename, performed on files or folders on a Cluster Shared Volume (CSV) may fail with the error, “STATUS_BAD_IMPERSONATION_LEVEL (0xC00000A5)”.

See details >
January 08, 2019
KB4480963
Mitigated
April 25, 2019
02:00 PM PT
System may be unresponsive after restart with certain McAfee antivirus products
Devices with McAfee Endpoint Security Threat Prevention 10.x, Host Intrusion Prevention 8.0, or VirusScan Enterprise 8.8 may be slow or unresponsive at startup.

See details >
April 09, 2019
KB4493446
Mitigated
April 18, 2019
05:00 PM PT
Certain operations performed on a Cluster Shared Volume may fail
Certain operations, such as rename, performed on files or folders on a Cluster Shared Volume (CSV) may fail with the error, “STATUS_BAD_IMPERSONATION_LEVEL (0xC00000A5)”.

See details >
January 08, 2019
KB4480963
Mitigated
January 08, 2019
10:00 AM PT
Devices may not respond at login or Welcome screen if running certain Avast software
Devices running Avast for Business, Avast CloudCare, and AVG Business Edition antivirus software may become unresponsive after restart.

See details >
April 09, 2019
KB4493446
Resolved
April 25, 2019
02:00 PM PT
Internet Explorer 11 authentication issue with multiple concurrent logons
Internet Explorer 11 users may encounter issues if two or more people use the same user account for multiple, concurrent login sessions on the same Windows Server machine.

See details >
January 08, 2019
KB4480963
Resolved
KB4493446
April 09, 2019
10:00 AM PT
MSXML6 may cause applications to stop responding.
MSXML6 may cause applications to stop responding if an exception was thrown during node operations, such as appendChild(), insertBefore(), and moveNode().

See details >
January 08, 2019
KB4480963
Resolved
KB4493446
April 09, 2019
10:00 AM PT
+
DetailsOriginating updateStatusHistory
@@ -98,7 +98,7 @@ sections: - items: - type: markdown text: " -
DetailsOriginating updateStatusHistory
System may be unresponsive after restart if Avira antivirus software installed
Microsoft and Avira have identified an issue on devices with Avira antivirus software installed that may cause the system to become unresponsive upon restart after installing KB4493446.

Microsoft has temporarily blocked devices from receiving this update if Avira antivirus software is installed.

Affected platforms: 
  • Client: Windows 8.1; Windows 7 SP1 
  • Server: Windows Server 2012 R2; Windows Server 2012; Windows Server 2008 R2 SP1; Windows Server 2008 SP2 
Next steps: We are presently investigating this issue with Avira and will provide an update when available.

Back to top
April 09, 2019
KB4493446
Investigating
Last updated:
April 25, 2019
02:00 PM PT

Opened:
April 09, 2019
10:00 AM PT
System unresponsive after restart if Sophos Endpoint Protection installed
Microsoft and Sophos have identified an issue on devices with Sophos Endpoint Protection installed and managed by either Sophos Central or Sophos Enterprise Console (SEC) that may cause the system to become unresponsive upon restart after installing KB4493446.

Microsoft has temporarily blocked devices from receiving this update if the Sophos Endpoint is installed until a solution is available.

Affected platforms: 
  • Client: Windows 8.1; Windows 7 SP1
  • Server: Windows Server 2012 R2; Windows Server 2012; Windows Server 2008 R2 SP1; Windows Server 2008 SP2
Guidance for Sophos Endpoint and Sophos Enterprise Console customers can be found in the Sophos support article.

Back to top
April 09, 2019
KB4493446
Mitigated
Last updated:
April 25, 2019
02:00 PM PT

Opened:
April 09, 2019
10:00 AM PT
System may be unresponsive after restart if ArcaBit antivirus software installed
Microsoft and ArcaBit have identified an issue on devices with ArcaBit antivirus software installed that may cause the system to become unresponsive upon restart after installing KB4493446.

Microsoft has temporarily blocked devices from receiving this update if ArcaBit antivirus software is installed.

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 8.1; Windows 7 SP1
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server 2012 R2; Windows Server 2008 R2 SP1
Workaround: ArcaBit has released an update to address this issue. For more information, see the Arcabit support article.

Back to top
April 09, 2019
KB4493446
Mitigated
Last updated:
April 25, 2019
02:00 PM PT

Opened:
April 09, 2019
10:00 AM PT
+
DetailsOriginating updateStatusHistory
@@ -109,7 +109,7 @@ sections: - items: - type: markdown text: " -
DetailsOriginating updateStatusHistory
Issue using PXE to start a device from WDS
After installing KB4489881, there may be issues using the Preboot Execution Environment (PXE) to start a device from a Windows Deployment Services (WDS) server configured to use Variable Window Extension. This may cause the connection to the WDS server to terminate prematurely while downloading the image. This issue does not affect clients or devices that are not using Variable Window Extension.

Affected platforms: 
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1607; Windows 10 Enterprise LTSC 2016; Windows 8.1 
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server 2016; Windows Server 2012 R2; Windows Server 2012 
Workaround: To mitigate the issue, disable the Variable Window Extension on WDS server using one of the following options:

Option 1:
Open an Administrator Command prompt and type the following:
Wdsutil /Set-TransportServer /EnableTftpVariableWindowExtension:No
 

Option 2:
Use the Windows Deployment Services UI to make the following adjustment:
  1. Open Windows Deployment Services from Windows Administrative Tools.
  2. Expand Servers and right-click a WDS server.
  3. Open its properties and clear the Enable Variable Window Extension box on the TFTP tab.
Option 3:
Set the following registry value to 0:
HKLM\\System\\CurrentControlSet\\Services\\WDSServer\\Providers\\WDSTFTP\\EnableVariableWindowExtension

Restart the WDSServer service after disabling the Variable Window Extension.

Next steps: Microsoft is working on a resolution and will provide an update in an upcoming release.

Back to top
March 12, 2019
KB4489881
Mitigated
Last updated:
April 25, 2019
02:00 PM PT

Opened:
March 12, 2019
10:00 AM PT
Custom URI schemes may not start corresponding application
After installing KB4489881, custom URI schemes for application protocol handlers may not start the corresponding application for local intranet and trusted sites security zones on Internet Explorer.

Affected platforms: 
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10, version 1607; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 10 Enterprise LTSB 2015; Windows 8.1; Windows 7 SP1 
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2; Windows Server 2008 R2 SP1 
Resolution: This issue is resolved in KB4493446.

Back to top
March 12, 2019
KB4489881
Resolved
KB4493446
Resolved:
April 09, 2019
10:00 AM PT

Opened:
March 12, 2019
10:00 AM PT
+
DetailsOriginating updateStatusHistory
DetailsOriginating updateStatusHistory
Embedded objects may display incorrectly
Any compound document (OLE) server application that places embedded objects into the Windows Metafile (WMF) using the PatBlt API may display embedded objects incorrectly.

For example, if you paste a Microsoft Excel worksheet object into a Microsoft Word document, the cells may render with a different background color.

Affected platforms 
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10, version 1607; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 10 Enterprise LTSB 2015; Windows 8.1; Windows 7 SP1 
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2; Windows Server 2012; Windows Server 2008 R2 SP1; Windows Server 2008 SP2 
Resolution: This issue is resolved in KB4493446.

Back to top
February 12, 2019
KB4487000
Resolved
KB4493446
Resolved:
April 09, 2019
10:00 AM PT

Opened:
February 12, 2019
10:00 AM PT
" @@ -118,8 +118,8 @@ sections: - items: - type: markdown text: " - - +
DetailsOriginating updateStatusHistory
Certain operations performed on a Cluster Shared Volume may fail
Certain operations, such as rename, that you perform on files or folders that are on a Cluster Shared Volume (CSV) may fail with the error, “STATUS_BAD_IMPERSONATION_LEVEL (0xC00000A5)”. This occurs when you perform the operation on a CSV owner node from a process that doesn’t have administrator privilege.

Affected platforms: 
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10, version 1607; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 10 Enterprise LTSB 2015; Windows 8.1
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2; Windows Server 2012
Workaround: Do one of the following:
  • Perform the operation from a process that has administrator privilege.
  • Perform the operation from a node that doesn’t have CSV ownership.
Next steps: Microsoft is working on a resolution and will provide an update in an upcoming release.

Back to top
January 08, 2019
KB4480963
Mitigated
Last updated:
January 08, 2019
10:00 AM PT

Opened:
January 08, 2019
10:00 AM PT
+
DetailsOriginating updateStatusHistory
Certain operations performed on a Cluster Shared Volume may fail
Certain operations, such as rename, that you perform on files or folders that are on a Cluster Shared Volume (CSV) may fail with the error, “STATUS_BAD_IMPERSONATION_LEVEL (0xC00000A5)”. This occurs when you perform the operation on a CSV owner node from a process that doesn’t have administrator privilege.

Affected platforms: 
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10, version 1607; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 10 Enterprise LTSB 2015; Windows 8.1
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2; Windows Server 2012
Workaround: Do one of the following:
  • Perform the operation from a process that has administrator privilege.
  • Perform the operation from a node that doesn’t have CSV ownership.
Next steps: Microsoft is working on a resolution and will provide an update in an upcoming release.

Back to top
January 08, 2019
KB4480963
Mitigated
Last updated:
April 25, 2019
02:00 PM PT

Opened:
January 08, 2019
10:00 AM PT
Internet Explorer 11 authentication issue with multiple concurrent logons
After installing KB4480963, Internet Explorer 11 and other applications that use WININET.DLL may have authentication issues. This occurs when two or more people use the same user account for multiple, concurrent login sessions on the same Windows Server machine, including Remote Desktop Protocol (RDP) and Terminal Server logons. Symptoms reported by customers include, but may not be limited to:
  • Cache size and location show zero or empty.
  • Keyboard shortcuts may not work properly.
  • Webpages may intermittently fail to load or render correctly.
  • Issues with credential prompts.
  • Issues when downloading files.
Affected platforms: 
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1607; Windows 10 Enterprise LTSC 2016; Windows 8.1; Windows 7 SP1
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server 2016; Windows Server 2012 R2; Windows Server 2012; Windows Server 2008 R2 SP1
Resolution: This issue is resolved in KB4493446.

Back to top
January 08, 2019
KB4480963
Resolved
KB4493446
Resolved:
April 09, 2019
10:00 AM PT

Opened:
January 08, 2019
10:00 AM PT
MSXML6 may cause applications to stop responding.
After installing KB4480963, MSXML6 causes applications to stop responding if an exception was thrown during node operations, such as appendChild(), insertBefore(), and moveNode().

The Group Policy editor may stop responding when editing a Group Policy Object (GPO) that contains Group Policy Preferences (GPP) for Internet Explorer 10 settings.

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10, version 1607; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 10 Enterprise LTSB 2015; Windows 8.1
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2; Windows Server 2012
Resolution: This issue is resolved in KB4493446.

Back to top
January 08, 2019
KB4480963
Resolved
KB4493446
Resolved:
April 09, 2019
10:00 AM PT

Opened:
January 08, 2019
10:00 AM PT
diff --git a/windows/release-information/status-windows-server-2008-sp2.yml b/windows/release-information/status-windows-server-2008-sp2.yml index cdc26f6015..40672e97b4 100644 --- a/windows/release-information/status-windows-server-2008-sp2.yml +++ b/windows/release-information/status-windows-server-2008-sp2.yml @@ -59,7 +59,7 @@ sections: - items: - type: markdown text: "
This table offers a summary of current active issues and those issues that have been resolved in the last 30 days.

- +
SummaryOriginating updateStatusLast updated
@@ -79,7 +79,7 @@ sections: - items: - type: markdown text: " -
SummaryOriginating updateStatusLast updated
System may be unresponsive after restart if Avira antivirus software installed
Devices with Avira antivirus software installed may become unresponsive upon restart.

See details >
April 09, 2019
KB4493471
Investigating
April 25, 2019
02:00 PM PT
System unresponsive after restart if Sophos Endpoint Protection installed
Devices with Sophos Endpoint Protection installed and managed by Sophos Central or Sophos Enterprise Console (SEC) may become unresponsive upon restart.

See details >
April 09, 2019
KB4493471
Mitigated
April 25, 2019
02:00 PM PT
Authentication may fail for services after the Kerberos ticket expires
Authentication may fail for services that require unconstrained delegation after the Kerberos ticket expires.

See details >
March 12, 2019
KB4489880
Mitigated
April 25, 2019
02:00 PM PT
+
DetailsOriginating updateStatusHistory
DetailsOriginating updateStatusHistory
System may be unresponsive after restart if Avira antivirus software installed
Microsoft and Avira have identified an issue on devices with Avira antivirus software installed that may cause the system to become unresponsive upon restart after installing KB4493471.

Microsoft has temporarily blocked devices from receiving this update if Avira antivirus software is installed.

Affected platforms: 
  • Client: Windows 8.1; Windows 7 SP1 
  • Server: Windows Server 2012 R2; Windows Server 2012; Windows Server 2008 R2 SP1; Windows Server 2008 SP2
Next steps: We are presently investigating this issue with Avira and will provide an update when available.

Back to top
April 09, 2019
KB4493471
Investigating
Last updated:
April 25, 2019
02:00 PM PT

Opened:
April 09, 2019
10:00 AM PT
System unresponsive after restart if Sophos Endpoint Protection installed
Microsoft and Sophos have identified an issue on devices with Sophos Endpoint Protection installed and managed by either Sophos Central or Sophos Enterprise Console (SEC) that may cause the system to become unresponsive upon restart after installing KB4493471.

Microsoft has temporarily blocked devices from receiving this update if the Sophos Endpoint is installed until a solution is available.

Affected platforms: 
  • Client: Windows 8.1; Windows 7 SP1
  • Server: Windows Server 2012 R2; Windows Server 2012; Windows Server 2008 R2 SP1; Windows Server 2008 SP2
Guidance for Sophos Endpoint and Sophos Enterprise Console customers can be found in the Sophos support article.

Back to top
April 09, 2019
KB4493471
Mitigated
Last updated:
April 25, 2019
02:00 PM PT

Opened:
April 09, 2019
10:00 AM PT
@@ -89,7 +89,7 @@ sections: - items: - type: markdown text: " - +
DetailsOriginating updateStatusHistory
DetailsOriginating updateStatusHistory
Authentication may fail for services after the Kerberos ticket expires
After installing KB4489880, some customers report that authentication fails for services that require unconstrained delegation after the Kerberos ticket expires (the default is 10 hours). For example, the SQL server service fails.

Affected platforms: 
  • Client: Windows 7 SP1
  • Server: Windows Server 2008 R2 SP1; Windows Server 2008 SP2
Workaround: To mitigate this issue, use one of the following options:
  • Option 1: Purge the Kerberos tickets on the application server. After the Kerberos ticket expires, the issue will occur again, and you must purge the tickets again.
  • Option 2: If purging does not mitigate the issue, restart the application; for example, restart the Internet Information Services (IIS) app pool associated with the SQL server.
  • Option 3: Use constrained delegation.
Next steps: Microsoft is working on a resolution and will provide an update in an upcoming release.

Back to top
March 12, 2019
KB4489880
Mitigated
Last updated:
April 25, 2019
02:00 PM PT

Opened:
March 12, 2019
10:00 AM PT
NETDOM.EXE fails to run
After installing KB4489880, NETDOM.EXE fails to run, and the on-screen error, “The command failed to complete successfully.” appears.

Affected platforms: 
  • Client: Windows 7 SP1
  • Server: Windows Server 2008 R2 SP1; Windows Server 2008 SP2
Resolution: This issue is resolved in KB4493471.

Back to top
March 12, 2019
KB4489880
Resolved
KB4493471
Resolved:
April 09, 2019
10:00 AM PT

Opened:
March 12, 2019
10:00 AM PT
@@ -99,7 +99,7 @@ sections: - items: - type: markdown text: " - +
DetailsOriginating updateStatusHistory
DetailsOriginating updateStatusHistory
Embedded objects may display incorrectly
Any compound document (OLE) server application that places embedded objects into the Windows Metafile (WMF) using the PatBlt API may display embedded objects incorrectly.

For example, if you paste a Microsoft Excel worksheet object into a Microsoft Word document, the cells may render with a different background color.

Affected platforms 
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10, version 1607; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 10 Enterprise LTSB 2015; Windows 8.1; Windows 7 SP1 
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2; Windows Server 2012; Windows Server 2008 R2 SP1; Windows Server 2008 SP2
Resolution: This issue is resolved in KB4493471.

Back to top
February 12, 2019
KB4487023
Resolved
KB4493471
Resolved:
April 09, 2019
10:00 AM PT

Opened:
February 12, 2019
10:00 AM PT
" diff --git a/windows/release-information/status-windows-server-2012.yml b/windows/release-information/status-windows-server-2012.yml index 9fde41147b..046f75de26 100644 --- a/windows/release-information/status-windows-server-2012.yml +++ b/windows/release-information/status-windows-server-2012.yml @@ -59,11 +59,11 @@ sections: - items: - type: markdown text: "
This table offers a summary of current active issues and those issues that have been resolved in the last 30 days.

- +
SummaryOriginating updateStatusLast updated
- + @@ -81,7 +81,7 @@ sections: - items: - type: markdown text: " -
SummaryOriginating updateStatusLast updated
System may be unresponsive after restart if Avira antivirus software installed
Devices with Avira antivirus software installed may become unresponsive upon restart.

See details >
April 09, 2019
KB4493451
Investigating
April 25, 2019
02:00 PM PT
Issue using PXE to start a device from WDS
There may be issues using the Preboot Execution Environment (PXE) to start a device from a Windows Deployment Services (WDS) server configured to use Variable Window Extension.

See details >
March 12, 2019
KB4489891
Mitigated
April 25, 2019
02:00 PM PT
System unresponsive after restart if Sophos Endpoint Protection installed
Devices with Sophos Endpoint Protection installed and managed by Sophos Central or Sophos Enterprise Console (SEC) may become unresponsive upon restart.

See details >
April 09, 2019
KB4493451
Mitigated
April 25, 2019
02:00 PM PT
Certain operations performed on a Cluster Shared Volume may fail
Certain operations, such as rename, performed on files or folders on a Cluster Shared Volume (CSV) may fail with the error, “STATUS_BAD_IMPERSONATION_LEVEL (0xC00000A5)”.

See details >
January 08, 2019
KB4480975
Mitigated
January 08, 2019
10:00 AM PT
Certain operations performed on a Cluster Shared Volume may fail
Certain operations, such as rename, performed on files or folders on a Cluster Shared Volume (CSV) may fail with the error, “STATUS_BAD_IMPERSONATION_LEVEL (0xC00000A5)”.

See details >
January 08, 2019
KB4480975
Mitigated
April 25, 2019
02:00 PM PT
Internet Explorer 11 authentication issue with multiple concurrent logons
Internet Explorer 11 users may encounter issues if two or more people use the same user account for multiple, concurrent login sessions on the same Windows Server machine.

See details >
January 08, 2019
KB4480975
Resolved
KB4493451
April 09, 2019
10:00 AM PT
MSXML6 may cause applications to stop responding
MSXML6 may cause applications to stop responding if an exception was thrown during node operations, such as appendChild(), insertBefore(), and moveNode().

See details >
January 08, 2019
KB4480975
Resolved
KB4493451
April 09, 2019
10:00 AM PT
Embedded objects may display incorrectly
Any compound document (OLE) server application that places embedded objects into the Windows Metafile (WMF) using the PatBlt API may display embedded objects incorrectly.

See details >
February 12, 2019
KB4487025
Resolved
KB4493451
April 09, 2019
10:00 AM PT
+
DetailsOriginating updateStatusHistory
DetailsOriginating updateStatusHistory
System may be unresponsive after restart if Avira antivirus software installed
Microsoft and Avira have identified an issue on devices with Avira antivirus software installed that may cause the system to become unresponsive upon restart after installing KB4493451.

Microsoft has temporarily blocked devices from receiving this update if Avira antivirus software is installed.

Affected platforms: 
  • Client: Windows 8.1; Windows 7 SP1 
  • Server: Windows Server 2012 R2; Windows Server 2012; Windows Server 2008 R2 SP1; Windows Server 2008 SP2
Next steps: We are presently investigating this issue with Avira and will provide an update when available.

Back to top
April 09, 2019
KB4493451
Investigating
Last updated:
April 25, 2019
02:00 PM PT

Opened:
April 09, 2019
10:00 AM PT
System unresponsive after restart if Sophos Endpoint Protection installed
Microsoft and Sophos have identified an issue on devices with Sophos Endpoint Protection installed and managed by either Sophos Central or Sophos Enterprise Console (SEC) that may cause the system to become unresponsive upon restart after installing KB4493451.

Microsoft has temporarily blocked devices from receiving this update if the Sophos Endpoint is installed until a solution is available.

Affected platforms: 
  • Client: Windows 8.1; Windows 7 SP1
  • Server: Windows Server 2012 R2; Windows Server 2012; Windows Server 2008 R2 SP1; Windows Server 2008 SP2
Guidance for Sophos Endpoint and Sophos Enterprise Console customers can be found in the Sophos support article.

Back to top
April 09, 2019
KB4493451
Mitigated
Last updated:
April 25, 2019
02:00 PM PT

Opened:
April 09, 2019
10:00 AM PT
@@ -91,7 +91,7 @@ sections: - items: - type: markdown text: " - +
DetailsOriginating updateStatusHistory
DetailsOriginating updateStatusHistory
Issue using PXE to start a device from WDS
After installing KB4489891, there may be issues using the Preboot Execution Environment (PXE) to start a device from a Windows Deployment Services (WDS) server configured to use Variable Window Extension. This may cause the connection to the WDS server to terminate prematurely while downloading the image. This issue does not affect clients or devices that are not using Variable Window Extension.

Affected platforms: 
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1607; Windows 10 Enterprise LTSC 2016; Windows 8.1 
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server 2016; Windows Server 2012 R2; Windows Server 2012 
Workaround: To mitigate the issue, disable the Variable Window Extension on WDS server using one of the following options:

Option 1:
Open an Administrator Command prompt and type the following:
Wdsutil /Set-TransportServer /EnableTftpVariableWindowExtension:No
 

Option 2:
Use the Windows Deployment Services UI to make the following adjustment:
  1. Open Windows Deployment Services from Windows Administrative Tools.
  2. Expand Servers and right-click a WDS server.
  3. Open its properties and clear the Enable Variable Window Extension box on the TFTP tab.
Option 3:
Set the following registry value to 0:
HKLM\\System\\CurrentControlSet\\Services\\WDSServer\\Providers\\WDSTFTP\\EnableVariableWindowExtension

Restart the WDSServer service after disabling the Variable Window Extension.

Next steps: Microsoft is working on a resolution and will provide an update in an upcoming release.

Back to top
March 12, 2019
KB4489891
Mitigated
Last updated:
April 25, 2019
02:00 PM PT

Opened:
March 12, 2019
10:00 AM PT
@@ -101,7 +101,7 @@ sections: - items: - type: markdown text: " - +
DetailsOriginating updateStatusHistory
DetailsOriginating updateStatusHistory
Embedded objects may display incorrectly
Any compound document (OLE) server application that places embedded objects into the Windows Metafile (WMF) using the PatBlt API may display embedded objects incorrectly.

For example, if you paste a Microsoft Excel worksheet object into a Microsoft Word document, the cells may render with a different background color.

Affected platforms 
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10, version 1607; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 10 Enterprise LTSB 2015; Windows 8.1; Windows 7 SP1 
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2; Windows Server 2012; Windows Server 2008 R2 SP1; Windows Server 2008 SP2 
Resolution: This issue is resolved in KB4493451.

Back to top
February 12, 2019
KB4487025
Resolved
KB4493451
Resolved:
April 09, 2019
10:00 AM PT

Opened:
February 12, 2019
10:00 AM PT
" @@ -110,8 +110,8 @@ sections: - items: - type: markdown text: " - - +
DetailsOriginating updateStatusHistory
Certain operations performed on a Cluster Shared Volume may fail
Certain operations, such as rename, that you perform on files or folders that are on a Cluster Shared Volume (CSV) may fail with the error, \"STATUS_BAD_IMPERSONATION_LEVEL (0xC00000A5)\". This occurs when you perform the operation on a CSV owner node from a process that doesn’t have administrator privilege.

Affected platforms: 
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10, version 1607; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 10 Enterprise LTSB 2015; Windows 8.1
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2; Windows Server 2012
Workaround: Do one of the following:
  • Perform the operation from a process that has administrator privilege.
  • Perform the operation from a node that doesn’t have CSV ownership.
Next steps: Microsoft is working on a resolution and will provide an update in an upcoming release.

Back to top
January 08, 2019
KB4480975
Mitigated
Last updated:
January 08, 2019
10:00 AM PT

Opened:
January 08, 2019
10:00 AM PT
+
DetailsOriginating updateStatusHistory
Certain operations performed on a Cluster Shared Volume may fail
Certain operations, such as rename, that you perform on files or folders that are on a Cluster Shared Volume (CSV) may fail with the error, \"STATUS_BAD_IMPERSONATION_LEVEL (0xC00000A5)\". This occurs when you perform the operation on a CSV owner node from a process that doesn’t have administrator privilege.

Affected platforms: 
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10, version 1607; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 10 Enterprise LTSB 2015; Windows 8.1
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2; Windows Server 2012
Workaround: Do one of the following:
  • Perform the operation from a process that has administrator privilege.
  • Perform the operation from a node that doesn’t have CSV ownership.
Next steps: Microsoft is working on a resolution and will provide an update in an upcoming release.

Back to top
January 08, 2019
KB4480975
Mitigated
Last updated:
April 25, 2019
02:00 PM PT

Opened:
January 08, 2019
10:00 AM PT
Internet Explorer 11 authentication issue with multiple concurrent logons
After installing KB4480975, Internet Explorer 11 and other applications that use WININET.DLL may have authentication issues. This occurs when two or more people use the same user account for multiple, concurrent login sessions on the same Windows Server machine, including Remote Desktop Protocol (RDP) and Terminal Server logons. Symptoms reported by customers include, but may not be limited to:
  • Cache size and location show zero or empty.
  • Keyboard shortcuts may not work properly.
  • Webpages may intermittently fail to load or render correctly.
  • Issues with credential prompts.
  • Issues when downloading files.
Affected platforms: 
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1607; Windows 10 Enterprise LTSC 2016; Windows 8.1; Windows 7 SP1
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server 2016; Windows Server 2012 R2; Windows Server 2012; Windows Server 2008 R2 SP1
Resolution: This issue is resolved in KB4493451.

Back to top
January 08, 2019
KB4480975
Resolved
KB4493451
Resolved:
April 09, 2019
10:00 AM PT

Opened:
January 08, 2019
10:00 AM PT
MSXML6 may cause applications to stop responding
After installing KB4480975, MSXML6 causes applications to stop responding if an exception was thrown during node operations, such as appendChild(), insertBefore(), and moveNode().

The Group Policy editor may stop responding when editing a Group Policy Object (GPO) that contains Group Policy Preferences (GPP) for Internet Explorer 10 settings.

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10, version 1607; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 10 Enterprise LTSB 2015; Windows 8.1
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2; Windows Server 2012
Resolution: This issue is resolved in KB4493451.

Back to top
January 08, 2019
KB4480975
Resolved
KB4493451
Resolved:
April 09, 2019
10:00 AM PT

Opened:
January 08, 2019
10:00 AM PT
diff --git a/windows/release-information/windows-message-center.yml b/windows/release-information/windows-message-center.yml index 4e87c5da55..2a4ba41456 100644 --- a/windows/release-information/windows-message-center.yml +++ b/windows/release-information/windows-message-center.yml @@ -48,7 +48,7 @@ sections: - items: - type: markdown text: " - +
MessageDate
-
MessageDate
Take action: Install servicing stack update for Windows Server 2008 SP2 for SHA-2 code sign support
A standalone update, KB4493730, that introduce SHA-2 code sign support for the servicing stack (SSU) was released today as a security update.
April 19, 2019
10:00 AM PT
The benefits of Windows 10 Dynamic Update
Dynamic Update can help organizations and end users alike ensure that their Windows 10 devices have the latest feature update content (as part of an in-place upgrade)—and preserve precious features on demand (FODs) and language packs (LPs) that may have been previously installed.

diff --git a/windows/security/threat-protection/index.md b/windows/security/threat-protection/index.md index 4c4b362d5c..0359a92351 100644 --- a/windows/security/threat-protection/index.md +++ b/windows/security/threat-protection/index.md @@ -113,7 +113,7 @@ Windows Defender ATP's new managed threat hunting service provides proactive hun - [Targeted attack notification](windows-defender-atp/microsoft-threat-experts.md) - [Experts-on-demand](windows-defender-atp/microsoft-threat-experts.md) -- [Configure your Microsoft Threat Protection managed hunting service](windows-defender-atp/configure-microsoft-threat-experts.md) +- [Configure your Microsoft Threat Experts managed hunting service](windows-defender-atp/configure-microsoft-threat-experts.md) diff --git a/windows/security/threat-protection/windows-defender-atp/TOC.md b/windows/security/threat-protection/windows-defender-atp/TOC.md index bf7a2585b8..d3ade96a48 100644 --- a/windows/security/threat-protection/windows-defender-atp/TOC.md +++ b/windows/security/threat-protection/windows-defender-atp/TOC.md @@ -389,7 +389,6 @@ #### [Configure Windows Security app time zone settings](time-settings-windows-defender-advanced-threat-protection.md) - ## [Troubleshoot Windows Defender ATP](troubleshoot-wdatp.md) ###Troubleshoot sensor state #### [Check sensor state](check-sensor-status-windows-defender-advanced-threat-protection.md) diff --git a/windows/security/threat-protection/windows-defender-atp/configure-microsoft-threat-experts.md b/windows/security/threat-protection/windows-defender-atp/configure-microsoft-threat-experts.md index 37481f2312..04731316ec 100644 --- a/windows/security/threat-protection/windows-defender-atp/configure-microsoft-threat-experts.md +++ b/windows/security/threat-protection/windows-defender-atp/configure-microsoft-threat-experts.md @@ -26,27 +26,26 @@ ms.date: 02/28/2019 [!include[Prerelease information](prerelease.md)] ## Before you begin -To experience the full Microsoft Threat Experts preview capability in Windows Defender ATP, you need to have a valid Premier customer service and support account. However, Premier charges will not be incurred during the preview. +To experience the full Microsoft Threat Experts targeted attack notification capability in Windows Defender ATP, and preview the experts-on-demand capability, you need to have a valid Premier customer service and support account. Premier charges will not be incurred during for the capability in preview, but for the generally available capability, there will be charges. You also need to ensure that you have Windows Defender ATP deployed in your environment with machines enrolled, and not just on a laboratory set-up. -## Register to Microsoft Threat Experts preview -If you're already a Windows Defender ATP customer, you can apply for preview through the Windows Defender ATP portal. +## Register to Microsoft Threat Experts managed threat hunting service +If you're already a Windows Defender ATP customer, you can apply through the Windows Defender ATP portal. -1. From the navigation pane, go to **Settings > General > Advanced features > Threat Experts**. +1. From the navigation pane, go to **Settings > General > Advanced features > Microsoft Threat Experts**. -2. Click **Apply for preview**. +2. Click **Apply**. +![Image of Microsoft Threat Experts settings](images/MTE_collaboratewithmte.png) -3. In the **Apply for preview** dialog box, read and make sure you understand the preview's terms of agreement. +3. Enter your name and email address so that Microsoft can get back to you on your application. +![Image of Microsoft Threat Experts application](images/MTE_apply.png) -4. Enter your name and email address so that Microsoft can get back to you on your application. - -5. Read the privacy statement, then click **Submit** when you're done. - - >[!NOTE] - >You will receive a welcome email once your application is approved. Then, from the navigation pane, go to **Settings** > **General** > **Advanced features** to turn the **Threat Experts** toggle on. Click **Save preferences**. +4. Read the privacy statement, then click **Submit** when you're done. You will receive a welcome email once your application is approved. +![Image of Microsoft Threat Experts application confirmation](images/MTE_applicationconfirmation.png) +6. From the navigation pane, go to **Settings** > **General** > **Advanced features** to turn the **Threat Experts** toggle on. Click **Save preferences**. ## Receive targeted attack notification from Microsoft Threat Experts You can receive targeted attack notification from Microsoft Threat Experts through the following: @@ -56,7 +55,7 @@ You can receive targeted attack notification from Microsoft Threat Experts throu To receive targeted attack notifications through email, you need to create an email notification rule. ### Create an email notification rule -You can create rules to send email notifications for notification recipients. See Configure alert notifications to create, edit, delete, or troubleshoot email notification, for details. +You can create rules to send email notifications for notification recipients. See [Configure alert notifications](configure-email-notifications-windows-defender-advanced-threat-protection.md) to create, edit, delete, or troubleshoot email notification, for details. ## View the targeted attack notification @@ -68,6 +67,9 @@ You'll start receiving targeted attack notification from Microsoft Threat Expert ## Ask a Microsoft threat expert about suspicious cybersecurity activities in your organization +>[!NOTE] +>The Microsoft Threat Experts' experts-on-demand capability is still in preview. You can only use the experts-on-demand capability if you have applied for preview and your application has been approved. + You can partner with Microsoft Threat Experts who can be engaged directly from within the Windows Defender Security Center for timely and accurate response. Experts provide insights needed to better understand complex threats, targeted attack notifications that you get, or if you need more information about the alerts, a potentially compromised machine, or a threat intelligence context that you see on your portal dashboard. 1. Navigate to the portal page with the relevant information that you'd like to investigate, for example, the **Incident** page. Ensure that the page for the relevant alert or machine is in view before raising an inquiry. @@ -115,7 +117,7 @@ You can partner with Microsoft Threat Experts who can be engaged directly from w **Threat intelligence details** - This morning, we detected a phishing email that delivered a malicious Word document to a user. This caused a series of suspicious events which triggered multiple Windows Defender alerts for [malware name] malware. Do you have any information on this malware? If yes, can you please send me a link? -- I recently saw a [social media reference e.g. Twitter or blog] post about a threat that is targeting my industry. Can you help me understand what protection WDATP provides against this threat actor? +- I recently saw a [social media reference e.g. Twitter or blog] post about a threat that is targeting my industry. Can you help me understand what protection Windows Defender ATP provides against this threat actor? **Microsoft Threat Experts’ alert communications** - Can your incident response team help us address the targeted attack notification that we got? diff --git a/windows/security/threat-protection/windows-defender-atp/get-started.md b/windows/security/threat-protection/windows-defender-atp/get-started.md index 96a02d2c87..f3b11e8133 100644 --- a/windows/security/threat-protection/windows-defender-atp/get-started.md +++ b/windows/security/threat-protection/windows-defender-atp/get-started.md @@ -49,6 +49,9 @@ In conjunction with being able to quickly respond to advanced attacks, Windows D **Secure score**
Windows Defender ATP provides a security posture capability to help you dynamically assess the security state of your enterprise network, identify unprotected systems, and take recommended actions to improve the overall security state of your network. +**Microsoft Threat Experts**
+Microsoft Threat Experts is the new managed threat hunting service in Windows Defender ATP that provides proactive hunting, prioritization, and additional context and insights that further empower security operations centers (SOCs) to identify and respond to threats quickly and accurately. It provides additional layer of expertise and optics that Microsoft customers can utilize to augment security operation capabilities as part of Microsoft 365. + **Advanced hunting**
Advanced hunting allows you to hunt for possible threats across your organization using a powerful search and query tool. You can also create custom detection rules based on the queries you created and surface alerts in Windows Defender Security Center. @@ -67,4 +70,4 @@ Topic | Description [Data storage and privacy](data-storage-privacy-windows-defender-advanced-threat-protection.md) | Explains the data storage and privacy details related to Windows Defender ATP. [Assign user access to the portal](assign-portal-access-windows-defender-advanced-threat-protection.md) | Set permissions to manage who can access the portal. You can set basic permissions or set granular permissions using role-based access control (RBAC). [Evaluate Windows Defender ATP](evaluate-atp.md) | Evaluate the various capabilities in Windows Defender ATP and test features out. -[Access the Windows Defender Security Center Community Center](community-windows-defender-advanced-threat-protection.md) | The Windows Defender ATP Community Center is a place where community members can learn, collaborate, and share experiences about the product. \ No newline at end of file +[Access the Windows Defender Security Center Community Center](community-windows-defender-advanced-threat-protection.md) | The Windows Defender ATP Community Center is a place where community members can learn, collaborate, and share experiences about the product. diff --git a/windows/security/threat-protection/windows-defender-atp/images/MTE_applicationconfirmation.png b/windows/security/threat-protection/windows-defender-atp/images/MTE_applicationconfirmation.png new file mode 100644 index 0000000000000000000000000000000000000000..2c04ad2fc80f23a15f5e158584301e54d7e62333 GIT binary patch literal 7795 zcmdUUeLR!<|Np8}O2tVxPD)Cm6qTaP%}$X}A@_|@xyjv(*(?((2?3BFjiMC z$PN9Xy6d3&?TmF+|ClbgV$NYPeke4gl-OwrOj|I(WbPB@h4v4@_@ja$+czCJ2<-AQ zyBR7Z0_}gx4+E)C?1TcV!ar8D&kfnq{TP3w4@6(AxCxxuBs=4P^2Ok8pnV{S5UFhW z=6^2kALbQw11v>D$nW2!0`o?h+2sa0*gyCdCajah^ncT`8mhie@t;r{0>g2w#-ToO$2YsJld~k zxG^$rt;e$7Eq&JbqfaSuP8vaW2WBkx+H18E6a|l5ADFox+)jP-=&r-YJzI7ee)+hc zw0=!_-Hw~pHSCW8&!2pJo5WD6)qHR`E+RM5_cXpL&!l5Pyv`TtKbmzbH)4@tT)>>` z`trr~5(M(*n;Z+V2J(LDTnPkHv6!~l^6}&S_|YI;v4!j4n<0=XUc{K{ z;s?d({jlXh#X?8zC^2R6^2kU>Cd=Ls@}41@88lll;(9_Lfg5*1?&?2~hrCxgzaDaZ zYyMiun}>F5Ag*SzTO4qNK>B~x{*PM5u#2I@fxvxss#liQ8IP|#Bofm&P5V+Jts>>j^)!ZV}qWy~`3f~(uM`JYyy zOE^wD<=1bDJMY}_X-ZrmAl~)&@-ma|OSU+a-e!4rFTGg>;h~|FHZsI`ryoqXe!{OXs)}9l`0-;)XwI%}X&5LW zMs7*p5vNUV`}woBPk?0witvcNEwZbwz^maIzwZz6YTORFd`8c)Ggxo#xhHmANnVga zIo|v<1{Im*FP)u>aGf0#RokXiNA*F74!0HN)Ny+ArIQT`KVn^+|{vHlD zAY2DeW%f}-0cX<5CY?)VD<`uVOVgx6dn;U9nb=6D*e!}CNvkss%PHt7dDh``WLFZN zlZ6Ocd6!j&I<2BQ?)pLJlz~CNJ*?3?I+~6R3HgRcMnu%mhr#$S^YT!Ugx=+jjt=4kE<79#u1+BaP-0`(xkz4$ zXhGb}%uKg7Z~F!^ozBB@>pM;NiG~vqj5Y4)UwoT z7J6BIf*9}waQZb*eGv0QuN2c5I({wJw1KN(7Mn* zZFV*kK~g^Mk6JX}Mmrx(w;5fkHSZtl7DVdIUc3jqspT1uM? zq0mX!?v_+F0Y8%AshjD8#X2=8CpBsOwxzwl|9N>-c{# zYhE&gzIpTfqo!90?hoRj2g=@T`eiNH?ZCc)NLc8Qi!du|ciY(9Q=8&K`_k60U;hZq zsrNBgPfHQa=e{svkk)>wAeFl7UaE5sE-z+KaPS(nFhhw%LPRfrJpAj%*2TpL{s?aK z=_ab~D1CyAxKdD15XEZ3;PC^M!63(fEG`$ePZcw!`3-!7D+N8j`B4XbsiFCwlf}A? zoMIjbbs8vrc2LcfwnG#}Qzf~5MIt`5D@n8^Gvw^Cd%yoKA9w$#vG1*0g|5fihlgJa z9%!RO*Xn0-3E%ISl1T3vRJoQ=_q^A89E%qjV`kA>iP7uCdRXE7)yZI&j{%0v0H=k8 z1&#DJOb&@1G)ZkM4>+x&l-eSTEuV&s)KphTM@RGYOI|X3JoWW*n4EB``wCt!=&YKO@m6ftc!%ibls}MPoo}Q~wKF=Ax2t}8b zvndB7BO{43c8CMuTkqt_e9yd`oD6i`S8*ewuFmkq7uQ^-i5S*mSc}D7|>fkIQ^ZQ=^aHGA!Ht`TNVwzpOEIC64A&A`z{Tv|m|{asI87Q0K5|L+n#a4a^y*{lA8&{vP`UV4mG!jS=*<8Z!A% zUbi5&FZ7Rlrc{`zsqP4xy>nmLALzR8c+>4$HUMW4;i7GLMt0bnjxz_5^&f ziRMZD#+|e?UfY+tm+smAlWu(Hr=2u9kkSBwO*;5P=xPt-gAa-FHe`eJP`d-UE(iGk z?$Lb7X2^{5|38j@sOt!rYlnQCfM}6@KL3Or4IBa*3+(9ft#WRsw5cRNd~p5%%eER$ zn+~{P`P%-7RiQl#k!*w-Ki||b+Qu&OJKer%D$?=r4vl@O9g~w~eF6F_RkgKepD7HhbN&YNggoY22e5u=m{ z@|6ZoK`(ur8{bJOT@Zu^&kE=UsYy1R;UbkuyHaMr-)B?2^>%|FNUaPu`x?OhB_WUx z+qOl_{vDU#9^{AB)6TGd+C7FqXf@sJ!LGIUVFu{4dA#QU7i#Xse)tpkA3!tZXi+-w z;pWYoDaK(Dap%uXiYUaSp|er2GeApGuJqOOVn4XMpxCpwzv@dzM}50}!jF>NqDDtY zhkyQbwRI!05S$7C<(-|ESw5iP+lGg|Tf`SFEQY^-uNZ^=BqRYBYA2e1tj+@*Wd*1! z(R`jls;IEkOz*+j0!&LuO%>e%FiuegNpwtCcQVQsVC61lWkd(}>(^&+f+m$prAwl< zGtkUHZ|_g!Rlo;tX*5Fd+;j^-3t{G9h$|_Tt(imFLCxTnMgtTju9%t6FMJQ*yT#r^ z%gxP=E*RnNtA=0su~?7V&D*S;ChXD~45=lBT{_M~qSLoxOXijSK}4E^aB9j5Y)z{Y zXgb;zzs!3MR;9) zk-2)$tO-`#PIB+12ja~z+7Ph*(y%uXxBu5C?z+WN4>jFD9zGbs5lt%g{h#f zo~j0$hRc{;-nJ^G2m_s>K!9&1y$_>9(K`QD4W0m<8XFt$bxb=p06H*)!EiJpPw+1n zjp7*$#>9^Wu^7QIdo2k)0oVYL$r5VrW=S4!(x^e*L^OuGv$m|Q&8pN<8!);z2IC0! zJfDFBWyoYYnIHj-Gxlu!Wq5wxQECE(4mi{6<`gDZS0o6&*rRlzgSv0B+PA7y@wV`E zfJt|Echr~~Cd-$KEl-8o0V%&%RaK^{f!ZEV#}o(a^a8=rlKw|)Q_kh$@^Bcf=28_q zNT8BruD&D&VrKD<2jB@r@6Rb%5xVXeUr^0Z3E&C0_mL+?y33o(1$YmC!ze0$M8Ox~vWMo>6~aDp}P zIi5BR50>RgrlDp$Gg&bsF>wOlE{r11fM@LcoKC__vvU0s z-0Rocl~hegJpvj%^)!&kT0m$byN5d)7*QdsO4s1x_GlS)^3Zh*h!sNLV9<4M$LRys3QC8()$KSc-~@h_PgkvF9K*pj?QG zTM(l2!7sM1xl}$hXaj|=#U3JUPv-rgmlw;mhx*1@WK z_r8M@oCTmc0X;c)fX(iidl^H96Z+@pF@aH0G@yduMn*;iZ@me;5Ui3NgEpM#Bm1WU zxEg4!@zK>=s#4m#KUW(I^+w0W5OX9Fi7fje%+z(|zKzr(9JA#zYdak6@GM>)s%L4iU80}lGutrmTxUKS>UG+9Zf6USt& zwO;-54AV*ks^EP%a&(QO~z2OdkWbjAi63y8k?P$ z$Lf92P>#>WHqM+3^B$je>?GwFwDdSrk|nz6lg{^W%c5Yj9_`VR2LWtA{{V;rAE(dG z&eG++%5ETgS6&H!i(f@bCRL~i-MjoKVR(M z^v-W~E8i81EH%`DSdy_63e}BWE3V0dv(8=2+%aLiuRcM#%0o(NF;cqVeDGguNudK)NLT%=?qpDfa<@il-V zr#V*G6!~>NvQsp9-kD3{ovY+EOLbxqX3UkHNlh{Vs;k&QObH&MC%Mm4%WX4DCM1Sy zM$v{Vo0P%S(hBI6+r~uO+i8}curESd2(T4GNM-YV|w*!ueqk8>y@}uyTqc)&cno##E=l3aP zmkG^g5#_3kfCkOP%8+k_{r`bO^8d&=zpPDwKzhmi=t!Ttr`JBuTk>gsQ6YBa^u+;kLuar9+iMA$5d z_4H%ebl)5d_Mci84!6KoD-#lyht#CCT>)I}2l97~21NoE$hYA}McA`q+q`y(upx%) zM9BbhB}8j^3Kf%n2E}VtTb+r&x7G)Vywcp#GQy)p{`erLHcr$7gQGnD$}|qi^;1`m zSrK@O?hFkL{rJv4RW3MH0bbGIKEkAnw%fKXGD*=)v9V|LVj-9=EY9}=4N%%TmKURY z^ypEj@mqF$Zn>OUz5ZEy2 z1k}OYJJ&cuT`gw0(m3LWdGun3XM1z=!`x|4=~CvhgfD%b3R`tu{n-M0l+fzp8Fff4 zYCbJjC~lC_5)zD~mgeF8BNFoxNUg)tiZ=^P!GUAG--3nFR@=1lTC>lf%*{12JFLKP z`(o<8I!bLWEJn9G560r&1W&k&b-fmBX8HlR8B1OLN0YK=tAIs{w2{u`N!`r{V7nLo zZrU6nq>0VVhl^n=rQn8+K-`XK!4?yZ@$;7E=B7*I2P0;_-J9O!04q}<@6KQQ&E_^Z z2EAIu>T=zkA8lG7phYpJlJ8YD6Z{xyRK)yv+VaTpn6&C@{l(F2ls5=m#RS!x{3b5M@{XweCxXXV>t0~a&nu@ zDFCOv#9MF0Q* literal 0 HcmV?d00001 diff --git a/windows/security/threat-protection/windows-defender-atp/images/MTE_apply.png b/windows/security/threat-protection/windows-defender-atp/images/MTE_apply.png new file mode 100644 index 0000000000000000000000000000000000000000..a7096ee4aa3c1b4f0ddd6f1d3b744bc8eb50469f GIT binary patch literal 9115 zcmch7c|4SD`}ZY#B`tT!E~Q15WXrBawvZ(nYskJcL&h@h5|t2zvW>D2W{5Gip%Mz& z8M`Eg8OAc!8OD35_kMoQ@BX~c^LwB7kN1!Ha2?liuGeuK=kfg>=hNGU+Fbkj_5%RG zrK@wp1OS*)z@IY*8z^~OKqv$MaQf;%0s!F9=e-|O(#1pkppYG^YoNtG#Ugk@RA%~8 zz`!q&)?MgT7}V9rA1Fk(>wuzzP*8NkDZtU+%@^wC;|(0+JarnB@86SO_wfz(cXM%t z0>#|z%AoYnFR8zi{hq1_)XmEYkl*0u1mAG(y)pH1h6dUDI{`MnyL;*fes%5^;OJ=& zs`>-C4;AsCm}5_DVejwl=IsJ};Gc;GW$eG(!~7kcfVJI6_Pg%7$VecEn{&xNKP~S)XA4ija(N}4SVk&DZRiD zVX@cxAo}D4hol!)e2wPX6%AWcALS2>DU!5K@zN)c#bB|d<6Jzq-R+Z3oZ-}yd|bMI zEqxzfxc)T}G0qzgs}Z-HFS~>rtr*M@$XgGVL}ZESi(Bck=cpZ9nX*&^aS4g}Kft-! zoS54O0L#(7Ou)&MdB%5g48=mbMa!lJs*AL%$>}hJw*vq}Oib*;-21jy>FLFaw)9wX zuznR3YTeg+Jboj@4~Q5f3P~kyX$ zU&SxdTjsBZpICu=0+W9=(5?c2=cla!p!tZ@f9wA*HJMM|xT50XTU=aRSBWLX#b#Ps zS{i24X=2vsTeYetFaUU1I^vy)hn=l#p;l{-bEOBpWcx4DP_^^F;Y%yImUL)R@))a!>JUCePv{@L^)_ zL54xuACnhx${G-fVyPXwV!1EMmnq_8cUM=Iq*Wyg{$e}tB@OyeC#_8RqPG@X#L0w= zj1nRep`H^=>_jfs+)+AuC4jS$nOijrxw}nFkYWbj+1`qb8S}RA^D9f1wiB8I-SX6v zr@lj__Kz-KzFZMZozY3z2XI`y6{!z{Ve6?Giv_v4T4@Si&!9>`gvdK}YXz_2oR{Z} z+y{ywsY(HPBO-)VWQc?qZlR}}yF>*wffWAu;n09J zGc%k0lU;}d@rX&}&<$9XoSd91b>>^mTwdB4UED-?Z4|dK8aEDaTfEH9E!5YOs}G}o zQ}mc_O|q=^&+X~$U7O90ryYDfFkqgPlHxH~YHwNT`NkY=UC1lz?Ar9~IMd?6w98J< z_IAK)L;(r2u(0qLu5eQubO)Y<8Sf~ic#TxLZ7xmL?5vO2bQ+|}>H0M6R8sI8w#c^a z8O4U~VXTLw@Fj6c$^O&vs_%|pG%u*A=)1fNin0FFdTrF)+*~~)BZ74J@`16y5wG_{ zp0?z#9UTKXx-Tn0L&Jo8&G_@!*N}E5k;HejcBdWMTB@8|;&ioJZ{FO8KbhZ;EU2gW z1-=d5Gg0WuPhHIP3YCiAr=57Q&fUXfXMl)F2FJ{yh1TN((6ii&=8DNmv11FfA&7-m6aHSsszs84iB$KH!x@%7HmMm zG3=y?jZFz?L|dxI+}zx{!7qVz>pk1H_F8irmd)z_<1=Thpo+qGRoqx$nr-N^*3d%W zkf%b470xhdA}nZ-yf5Ox(WFU}J9l#TOpG#GtuCFX-=i;$&)JwjOkA`+B&0e^< zDgnP$U7p|--w!TyaJAr?`o1Yn2$Y(qeaiz^<q&L9MUK>So~V4bl_} z>*}m|d3i10-+yYM0>)0u8fYPC)_1_Spxvvjd^wFODd~Uj)OHOO-1_PQI9p@T<0km` z10o4GY;c2>UL$=yJ@1|#JI9vZ>0DlzlXJtW(z7fy^FC;qe6r5ZGeam!8LGi1;2?X( zk}LuFL47W&p8_=u3Tx z+|D6*>BNns*@Y}%v#6|mImDk|U#7}9-uyyliFj}VHs(;~x!TY%r8`GD7^G$LV8L~E^4ciEvmb?2FX}5ziT2yh{9s@fec*cv-Z%wX{oXS{iX}q2 zj9*G^=i=9r+J!ik87MLkUP)N1GKA3vdJx@j<9AUZW5kV$?B*WWMxSh(5o32)tP$Znh8;<5Ezc$uFG@gCC7961t-kfUWV#+$hY z&<1u`+Q`kIb>(kcA2mo_Er|Y5oVN)ALvG~OKrN0TkgcutxsA$vG=*p?-xc!8ok!C4 zLeU*kb{k&HVe^V4D<`K^Wf;mS6YF8SZrPcxLYY-Q(LqKcLrtXXmg+W^`Lhf*;CY4_ zs6uY_pF1_tD{$K2xn#%B*%_tb4XVQ%(B7@o~~-wj}JRYspx3={)_`BBv$a&U%Y7E zK?B7@8FUTOcwCBY$*OIBi+>WPz7L-s50hX}!p3^tQ7R1$KiM<9KDsY@lD9u5E(Uda zK=K#eC<{{7rCnITQ;XcfYwelxMRY8+c7oZ{@dJz{+{UFdwO>s#-Rlrhp2O@>d>|Yy zV2Nvb={PbPe{N%EV=6zT+V+vK2ELg7dfu{wS_Qqu-IeE}X4|555|d9<=Ukyht<$GJ zc9wk)L9n9Kx)}SzCDs{u5qLFG*9=*`SuB&@{#V<@o>LZg$PRd~_;g?oGCJ?{o?I9g@iJXDJc$-uwJRKH8DA72}; zUS#H08*UcCc))4*oPy^EGQGI(7cBH6w1}10~651hY8l!xOZSHl`Rd0 z=Tl!Ls}B;fe`2FG4mq+y;9FQE8MHr3OFzBDiuuBlu?AoJD(6)mvyJ8DC7yX!1pNal zdgSC!7?;=BTaMdyS$wL5v6!h#gOzgW%IGcA{6O4%pnzT>Jdm-^pyV#f$;gZAHPhuSvm}jvXwvzFxb<;Q=`DQ)QpTRP>2f z9ffyDv?lld>SQX@?#lkBc*BXiHMiP!7jWXGx^W{MyCGdoGqHRnsEm-ty9ra$S9E*g z_>xL!$@|aN3#@0DN2@b#*qyXFJY%wx%RVw_f$_Mq_Sp2g@IYFItcmm{o{l!2p!dhX zHz%XleqieJA3kL)_E?2%I!+&K8yM`9+x3cqHVY4vd6$CTMmN~K<)~}8rg0*J?%{5m zX}j>zgP##{bv1_MEi>f_arf~u&!AqLj8m4!RjM!&mtI${cOp#mJ<>e7D+dA?wUT^% zYtJZ78xPQH*dx-QEWi1Vmc`VPj|&1msz zSj|lPo9sDU@@%valG|VKw0mE(A|n67OC(26o?;tWsN^`y#R~~lXz&F4j zNJLR>51&3tZr6gqgNGViJGd!bJp<;s`P>7$+c-tZojm=E0{LIcXF3)r)Ok`gV)kQU zy;1DBa4m#|QXdSC|DHC{mxAU!eoZkNE7Yc}21af7t?Q|@EJwjpgmI^zOGT?#G>sDW zy(pqhaJF+o(>r@Rr+i zTZ24|maw_GD}Mmr56ezf-;I=Iiz4v!RL72VSvb0}@CIC4k!4)x=&f6Im_N_}S3blF zY#vq-es|EN?qDt{ivOJJ$ojPSo6X1p#+FfPD7hp~aY9`{|8&>uW0~nw8tKU!isLo$ zxs&=n&Gkz~6U{f6UT`=N+nc-&9*q7lb*A0wim8iXII2+@)eu@Wv0@Q)Wg)WNtDUo@ z;7t-!=Si>&Yq3RHV53Yf^o^o>MVYcS&AkE8(J>a3N-jI~N$A`u{l+M}LY&5V24F?fMFcR*zFa}e$%kTr3sT?WW9`Y*`r7Y2$&E=x=vRSb$@0z{wvCwRMC zrM-+Bb52aFh6Q+{dq7#`QRn^Jw;spz?W%A94mM{Pm-4L+0{7CztQEXRPyWL5pN~p` zd1TCAIRD7$n>SF008N3()IDzCFYNwLoWM=3-|s;@{u}*E*?-!@N|tyyHcnWBBJZ_E z>L14W*s-AYMQpyhG%2bJqLAV00GFILAfhVe_M}7kP~YHS0k`_5NKY=HX&qCI8C{I6 ztW=2QS2V<8v8k8rA5Lu922URcA9VfG7bGkzbP_9kCe#(Q(P=D1|!&@E7uoBh^c3F!Au{dRpjcufWrnyN$pyRXK%gE8XdI;lj0%bY8ZX} zt8=;A@{cCVx(8)FJw26S@kj`;@NK#rFS=sc0goK&7`3XgC;7JH)zvPVfXqDeEJ_Oe(h5DAJNdA&=8r=ec zK-6qI6HaSaz}MW{0wg6R)x5a@hpV5W+9ElRL04yu@pMY9p1yv7S_24ObMx}t!Q~|8 zfB??Iz`#JwHvXG)uOx1?XT+aLB=5|9-0R+0#qsmCV-!+zq5#1RT|*KlOl51wuUGBV z)v1CA5Q!{dig=J*>H;pz|ECTJ2tgqsfMAEfySuwv2R)jenXyDyM`o9n-Ug=wCzs%? zJF6$c*nnm6!qU>x-mNT<+c|#xctY{HEW*pgimYQF0q<4Y5Q$+pM z|A{90ZE8FLcDpNZ6O$Z$0AM*{I{C?>0nqf!+OyvOfO7iRFhoW^vkl}pL~Zr~pK~4` z;8`cr9K@}27!y~4!(`FrXr;fAWdGd}{)T@XD931OJ$+eNt4h?)4=s#tVc{crDn&_8 zwhE1NSMTZ@vNKJkcjDbE3>rqN?i|x|zMvwT?gkv@eR@PH(Zp1C70Zebd&zy(xzhO? z!_p4J3cTa{HG!iu?P66iw8oJJ!i)4t+Mu@uy(y;k8~xo`9-AqWN!#9kMl~O0=m~KA zd;BoA!o%{4jXh&{>2=^8!?=lQiQZJcRiyBIcW&H)ny&Go{xL$HBEf5*no7ji0%OCx zm+rmDGfX3lVNba70W1lZCjA+qF#`=N&j{3HMW`-Uekzpskd?1%Ew8S+q-nXT@G5_0 zf5BVb)(+3!G~xN4oUbvjQZCNv;B66$%<^($S@SP0?(d4yrVH=nnqzktG3qJhhA%th zk=>DLJXePMw00&J7Wfn=y$N+A6O2dR84PZ|EQKBK&gj%|x~R6RKp|m9AM?>L*b;Br$WU(ryoCPU zz=^1g`O1>Y2K?!VyK7WYITv6vqkMhSaShq$�?b@GoD3v_S+lemvOhwwr%zKz*fT zR`^KD^g5x=-M!0-ACX^)Mk*GMWJR47Zes=eIi>SjmIuMJnkxj|`We^P6-KvS2rG1b z{ywTw32mIiZY!6gaJg5`MXzwcJJ_b5N1DW!_H7~6Fv~5IZB{tXC=lkOv`Eu?nbYq1 zEyEXYJM{A|;tRMc7Tw2>A7^y1J2^R_3JRXwS7R!Hl;1qSBlR503mi73k@4jP1z*-= z|1Z4+@+r6Q=^`BfRx`z{0~dz>nMzKUM%VdHUdthI4E=A16yeaXYR^8k~+T+pR!1O@Jz`e0l?=Ydx_S+qMZM=|NmmX_naC$3l9ma3;gD`W%o$& zuOD5WM(SJA+8Rg=B&)i-oP&A;@9E876+U&oYq5mw7O}5wz9VmU9*gCZn*HK*p%ssc zpNWsWTW~}ZS(;w`oKIfd1hy%+J0Lw9oBvF5_r$B2**7T~W-l8aqYVktyE4rWr|%X~ z5Z!1ha;KbU7(!>4!lZhU* zZL5aw3Jus0?`y_!nGyl%VQb>5bW%MDTpM%Y4*u*aB>NhFDx2+SxFznn=W>MZgB44AA>~{qwos%*=QbpqN zv!95%;^$vLZz%_$Z48K)SDQ_n;&|h*B#Xq$CYR;L10M(WW%Q4Jh3F-nvFQ<_Pe4bw zPQNPbT>YN<2tG?$Mk|_XFQs=q{|afHhdUa4)#>FoI<7;z#jS3Yzd^b=H?yxWv^}YY zh->LPqcrYWJDh23@*VP?9Q$A{s3j*=)`yqSh72TL?Z(A9}7~Xys`jLauLRloTtB%DVSFeu2B>TR*>s*~h7R zca|4A?`o`yS2mEd9nWl%5eP<32^~X}!ab*kmAF!{*P)fw2HJ*DHNW|XamcM(O_dUb zO1is@L6|opS7pY?kYqOXloH&aJ~Xthxf4y_w(BSj>=dlclJ!EWToHHrPU91GXqz_A4L931<1QYsup!YQ<>>Zn`yobdLSGiFT)Qh(CN)jP+}YZutc^qb zTH#!cqT9nO0ns%zMRfumT)}Cy8Ux_zDO7FK^G*LKWvL1>UL&*rO=YKiWANFE1}$ET zoH@d7{$f!6U}-&wCT^-507A5W;>GSMqC79?)r%re`}UH`nZ!yU8BL;=Dd zCTwD4I`t+wX+p@{vHU*2Uv=`>u9oD^v>nVP!b2)%iFMVAF#oli^VYeCaJ~s__g~OoAEXUya&sRD~bCL98k&NZf$J^%REQE z!X1nVE?(hPIbFMN4ghB&Ks-z6(SvAvhu11}O6If~nTkgeWIr*&}(GUQ*=FFMWeoIOptii?qC$Qxo!T4{fT?{JW zyp@&JX`5@KVBsbn$_X6haQQzM7yo^vuPUHZ0k;zr4Emb^pB1f+c!q(k`ASvx*m1%z$M^GP8D}bbMs9Y6navPI$HuF zD_4;GN4F3=GE4&k%A*eQ9{q>{KBR+cA0M&nCmJHvOTgk729t>aYZ8-<(ei=wcc-VP zbrUOnCeSl8&iVip3UvjWE5k^yEO4m-;b5KRdi0^f?Ck5Owd4BwE$k#~$M!UHb8-r* zs_wpd^ClUspsO6ZSxVk*jOMl)H~^HLr%2DbI6Jq3)eLY!BRC&IM}|s>oOgSnY5uFs zOmvxJi+fkrRj}HH!eDUi0qgS+Fsr|yre@O;FC1iJ!K((Zkg~240kK3srNB5_4!-KD zYhq{^*BmD}QqIL1asKEAi1}DqSwYZb3}Pa~4CUN~5ghsR(_{A7gqJU~WgMH&OG_I~ zwZx~K$xsStz8oJ=Lp^w2R@QWDYiqBlVq#*_H$G13_Xb;|tA6a)HPO?1<^choIB|mc z@|3}LGrv!tMFZ`Q?n>~9BRc;6LEH|YYG-h|jW;vf!6i#)Z~^uuAYg)gij3)fa^&>h z!oYpe?Mbq*y`Y<1+oG(jT$dbxkQyx)0^S50YXZPN%e}h*I&yx9s}1$_w&x7fZ^Pj= zCZ?t^a0lcS6)&DUr=2M0`(2X|3XahQ0=!V$mrCH50HGpSj-Rg?_)#a~qvzpK1PZRv zwz+^Cu>%-{KxgIf)YN9O&9k8&q&Ab^WP}rMqMDBWf{pK)BgpS_codKx&`HL4#!5aGK zXLDa|tT|$dl7qlKOJm~%G7%h?30T$mx1i-87XbF0Lq=We5U~8`ul(mvU?f-lC z`x}k$H}v$6iTwXm120B&s4V`bI>2nw&(H67HmP5A-`V-*KQSQsRcFM+{>nProKpNm znSog~{nRs{Is8&9i)@QvV*Y)7;uk-7vxWoE44oAHi$59NW&iR`;_TLv%v10V3ZScH LcmsXy-oyU|tAu!? literal 0 HcmV?d00001 diff --git a/windows/security/threat-protection/windows-defender-atp/images/MTE_collaboratewithmte.png b/windows/security/threat-protection/windows-defender-atp/images/MTE_collaboratewithmte.png new file mode 100644 index 0000000000000000000000000000000000000000..862c5ffbd7d2f21196ca8646733e66490ddca672 GIT binary patch literal 10826 zcmcI~cT|(v*Dhn5K~ctvih!et3JNMsK|lp5(rf6bNQVTeLP)TTprgRh1q4(&p-2r7 z0y+ptmy#egFi1;)NJ}IkaQ8dEd)K=6`|G=F&9@f%CMPH7?6b?WpS^RQ8yRTr-g$H< zA0OXt9c>L0KEACec%Agi4*0*}^M^cm@Ox`p`SS7Y`GoxYDPC%iFbw|er=x%K=ZS41 zhs3vH$xpxhGj!9^@4COAE5?T}uc%!ch6MazNW;n3(Z|i(&kcj-+t2^oNf_UWjH_e3 zgM8dvT>bb81lyHhbk9GdK2CR#smJ}?yqx&t*@FD=2|x0QDaP3^@Q#lYpPlz6GJV%S zi@W(cdftJlK77Ov{-6cTH>(CDU2tW%?1P3oH6ZH_24{X5zh;m^(j#n0!r*YTbxh_#S%v^zk6_;=ys(&56&^C-=wiLEcu; z&CJX!H*=;D!}49d=Di(xiXN}pf;Eq*LA}uQ?m-*mo(fWGGT8QfE>Z(r6&Ye5Iu?>q} zT|D$6ufE>l(Y51_oVz8jI2_Km<+X2Y?&R`XoVK{Q&Xp@yTHD&nmLz`tCB#1bLjJu= zc^ez}Q?WX`1qF3u*75bQkc9qGIOszuFOwap@I4|uqhzdn=thVN>#L*WxpRIY>DuDu z9{tiH$^m*b4wdNFtFJh#rN)Wg_xyL!;F;eJ3JDn+wQBv*JTXWLEFKMJoR5!>&&$r% z^quZBKmM!sk;|g0A(jyl5wKX_moI8E>|8jdHX_cvskEYOk853;$9sC z#@NRvoUtc@<#=8&uL-jr)|swWEaVVkteYrJu?rlLzq^*Dn@GpfxM?6dYknxFs7P9c zx6&IUy=t4PinCTxQGvs!>v9ZVUw)gNEpgtuTsx443v6|Q4Z#rQ=nMKZ#uSzGkSh8kcR5%Bg0Gfj{*Z>m0FN!=ILgpeNz$V~ z5mfzC{OOI~bYi-uP0{G0u<&pZ^1&xho*X@PEKYp;lk1>^vq^fA(b}J%L zsMA6+_T`n)iHSMG!?qqaTeofnpDL|1H!`|CPXMO@6~!F*Wt*H+>j96{{ihAIV=C4g zUkFh~Mhcgwy9hZsT5D@-k)m&rZ`Ye<>lx$mb^foXET4RQ6QY_fZCiEWgi1q01BhUD z{MRpIV{bqzc~}e%p{2CEyj;k8bqDAC<84bU_^zv*dlr#MM1f!@gWv1n4<0;trAO)N z)q>Gc`{s*a@!h+3=e>Dz4NQlxrybqlP9u&R48@%_1qlm8_&IALL7au+V#jyJ^PRT~b17mrng77_Or5O5tRbyD*A_H3bQVvkf6=X--7g+j@S ziP^WhvSO(?qPDRZMd|I$2p0|3eru$ij_2edwq>ybK>iW$hTWXO{<`cawGGQ~K`{#* zo#&Av%Gub3YAx_?cQ?0gsp8squU{X7fIM$oWd!r8AXE=TXs!xweiu{ZR)XclAO$lEt|90}WB}ef-VJdI68FT}uyHdTx(jbCS9iGFQ^<*LI$G=Fp2-%q9yX zj~TsMK_u$NC}2hl9zFVr$D?hMJ5!ZU*VBr@t^_0`r`o%tPin2u3B~mGB-vZy`y|hv z?dGg94uarao9kUl`1PttF}0$|$UP(A!r)jGBn0_TE#tU}e&T8MSEPnJQtY9WY?YHVx-Nhn-qeeo6FDc8~3pg%M- zs7hc2*xB^>uSO_TBK}8%nES$THD^L?!|~KUe!#bOdJBDSt`AkWbdb{5cjmAFeOhg^ zdNgENUxhQ1VO{PT-I=CBup6IQ`8Ml_0Q#ITL zQha*4T6Qh}jwed~^f>X^B$qVAKLX|lv(h)$rzNGNVrk6&wdHC5rEfaCQ6?|Vx$|{i zZS7Sa*dTSPJt+f&W7z!Bcz3YcH)j;j^)g4H7=3xB96G8#e`(1lRmuMrfbl>05-@MA z@?-4DAQ6*(NZK|Ry!*6MFoZY6_M1feU?h7iae4Wpj7Ddo_O zWs-9e5)SF7tBy$K$hvgSbZd!GIuvQ=(z|kaTsA|f{>Rfg-aLkoo2$)bGy6*%n^%yH zTI0?lo0{$@0K0#9px-*y`njvCKjxIK-}kZWBlnv{T3cF-#rJhL2&$a}uh$m8d!E7O z7V4Z(Qc?oA&!G@d9ssT}nScL%clVw>^qKCAn#Cqzf9^a{>cGy~vM$x$@rLl#NtsY9 zA`MT<)NR;}DzeQ}9DSh99>o^#+_g*o^5tBO6K@|s-h$&X98ds!2oQjC!2|s&ptgj(J zgZLzAp+;9-UHz!2sKx#JC5Z1Cs`1S5^$xPm?Vn$b0sznU<}k*?#Vmq?s>Q9YQ+F#4 zzd0ynF;hq!HGxB<29D+lqpLn9?=E@w?uHbq$jsO{+PNb+OL?J6T`Nk|9Ckes{p`lu zKkI%p%Ct@|=fSki4d!N%q3W6jWFLT%o#72N^OZvdza=}HL>QgP{Ohk99jVIwbn_JD zz#@wR%eS|^O;A{{oNboGyj^w>dlt??eYEvwzqzj$?P?zwBiVhp+IN-Uz>}N|p0dk? z%+vAuN-t-a$+ltcg_ouvgg{3Zpn^^CuwB9eR~~J2qYdPCk0pq34#(|I``~A z^<<^6fX;wa3~>2Ah!Z~=j-6LkW!W4hW=Kjql1=UHbzHRtc$50GR5teHYqikP#WldC z0ziz8Bw4NM>T2tHJlWmdeWg>G>B?Rh;dBPpWq^O%Re4{>;cynmg`%2~L@A7^HU4

E)3a z>Fr$rM355oS_6CZk~=WZA?X&{ldS_sgK}zWYF45)e?&>1Ib&pQPH_@Jbn|EDH%`UK zW{jT1!KmiK5BD1XI0(2N2c|hs9KNgn=63L-cBSVUH-G`{I&=;(>MFP*{jaCHICEuP z2);1@86f;DWMcgCn)5R=HJD^}+8)uXxx0jUU2iRj^{DPt)3Q1i|CJKTZH0}q`@9*#50%7sd z3%qim%msWfU5D^da1Hw51_*BCvBCSlNVCaysEq+}=j@)ag zMgi#%_#^|uSyy?#b#8z4wzTw8>eV0)3fSi-bWGjj~=>GOO38yY|;HcU9DbB0tVc_bJvrGX_bvcQL3EJ7hhrk?>U_Q`Xa!A`BAbBYy$)c z32b#il}x}~h?(g$tO0OF7?-jr_yRek09@B=xXPFm$fWvqspLR-01zR?OtM;N9U%Jf z-0V4NX=-b{)GC-RKO;jOc;Q)>UFF3dF4@7vdPO8r8C20gQbCk)BujJ8g8x_B5q~U zdC1bp=naUS=zzD<*Vl)lAz1}miLU1b@P_JnDSwT>N0V1AfD8Nk`MLHN*#-ao{B&G; zdhrmNq%T8WiFwzZ3s{mM<4^?14McyIh-VP{AT)7Y7Q#pp#5_xO=aW1_BKe{`~{gxS0er+MxWI6blFtR3Cz61SAu?B(jJ-Eyxd znhFYm`9S?F-JUhx1^1<5>{i)qslx(FmC8^c04y`?GRMd7c$7v!9{W%ENw zi9J$opO`*L6BijN4?7Dmt=$DkvHbS!Z%7>lg#r|o33x6s)COu9z;>jd{Z=?YoPB#~ z4bwV2*NlJdZ1EXR2Q?IIYBTA+iIYLRxE7+jVAHTQO-eSTtrMp{XWumPVIu5*&{N=*OMpv$PsEl1O`}4>y=T|zHds^b` zdwb*mP^PsD?o6?7f1L(6i|oHPP_HXgi?kfmkZA{;osup+wLc@yEhMFHDTuP$WluGogWQ4rXLJpZ+hg@nI%g+IfBLZw=7 zLS0g3T}&q1Ra8_^X#hIz9v*E~_P)MlmFSV+f!Wl8vIzCRM8_f{w9^`_PO9x`E{6)n$`TO&WP#t)B-x4Zsy>i*4^U$xpMw)KAe+4}hf1?#U(;;p^B3e#{bE6CUpZe$K8 z`00(easC1Z3pEd_gCYs2%K4ydg{`Pa?w|<@mE+H#;)=Y=NnW2>N(pD@XNyu2+i+1qH9aV_&p*ny_ri-~ZZ`pO<&!zNviLZN5>d^XK)~4qS#b0cmpopYKYZ zYi0m**q+##o!`a87x-pN1K2c(?!vx=v!S z>#*UyIR>e|xUkS%Uq2!_Ik~{AzrSB<-*d~hS2>!_%0S?OA(W~TnY6mv)LE61P!tI6 zec5w+)>O+T;7VayLZJ;YzpSh`nhM>Wy+O(Js(HXGi$d!xVES5C;68a!x)Ur4eU6oJ z&nA-A^^__xH1uTpSySJFFjD(mb6oyallXXLF?8LUGw#QDIF;s@XNYFuYT8^V`R2&} zJ%6iKCMO@2QX5(Q5aLp72#eHB^w+2lRh33d@CR z$KA`TVne}DRlm#O@-Yh!55h@9B5W>F#;r10Ekf}BXvD1;Fn^)bCCXE?Ij*lvdPlXy zSwe_TMToBMi-Vt1*5w(bsG$*qul0)4K2SbZ)RBu`@t}=iH65?gl@&ed>_A&_*2*yU z4+zLUx1W8*Lk-Vf%vMsxCQ}BW+&51+jERVb0v(u*NGCHNoQo%Cu6lhpzzTV0z)g_AfwlAzkimD`Es@J`BtNi|i zCgCbjdGK4%YTv-XY?XwriMsj|=nt8hnr0vd+sMk#(aa7`%U98%C{zvY;nvM@18Ig| zd(oSt-%?1!bJH`fleeoFY1QHHF|s4oC%)*ru^hvo?G^nh2U`H3GA#%<9)@jDP~iX z=KMgJmQAH+$zu_2OD~nGaNgsCx7B^H8S(qWEM^47jBG z7bMdEMmNbZY4x=3Kb=~;=ydmr^77om!j9H1_3%AskL`&v*-~G3=9Qx-2GbAKZXr`y zSy@ZqV_D(=wa~`g!J!zC#Ky64e$C^hg@wdSJbvV4vYX{?g*l-d00BZl1ftoI3m-Fi z+4;4#woXn?ks%lS>uPES-M5t;Ipivh?JHppD}i98rs>7?Fd+vUXIF$s@+B*(MJRpwp*DB~v@?M%!Aw;C52z)RvTv>ID6| zOq)^9q1quADh3*@(A*XIXexJ9#CQ}4iiNO?;H8c$-$sc?@}ueRTri1xoELxmQ6Q&r zBHB1ST2#r;^%JKpQHIF6qh`-u^ctz5?ET_$^lz0kT$VCsc&$8i6R$NC3j7kRj8Jj{ zs<<*i-m5&Xcz~J&L}9Ps#nL;P=&zVtFSW(r<>yOkDW?`~q=cWz8`LCu7P-y7q;3o* z`FPWAr-XYu)4(K11190TO&^t-?J7sFl1^f`>f!q-lq={jka{YB&UlCcd5WyLjUmlt zNNWxmfcY~FA|_MGot*~Iwt1P$cFwKkzIDuJxFPuOl|z`G;vL0SXL<;~G@I7Q=jG^< z?4Y%rQLE2s-|UT7mq;oq)-*Sd-y@>*?ZGRl7AR6Wc^Tu2qeQU>bCcJ&E*t#=+J%|Vw7wvOClMMRH0 zbG;f5uB7DzaE7?S=B%p;)#<|#7*q5nAJ5+iOJS(-Y zaF1UN4LsV`+6q$(ul3qv+83kb=Tj8CdH_Qp3+~a%umoIy){IA2n##%Gy@0v}JfzK^ zpWm8~I)DCrj{!kMAh7v18AiTjM>E)zttY%lD*_{8? zV|xhY<$cznYfF>VHK$Ht?i$LQooj zO4i-3W++Rb2~Ie6>dI0NKE%t*3(;6XdLHVB4|~!+uza~`MdN6+wnkgRdEaxrpjx9d z_a@nvbUn~`rqqxy(a$T{FYo1CXt51Z+DSxCF_u-UU9q`X8Jm$s=^V}+V)Qpf2%Fp4 z&3{eg_nx1dr$XlvTBDTFQS?aM5ZlV!JPSIb%`{D@!!jKb&7lQ&@OV^ZD){#4^pGA- zXF=j_>`05|-n zbnw3>NTMRmcS2{B)3{nEO{?t%h01Pv+>t#U?xj84C=JYrsEn`_$u{3zpcP(Zu$jzG+@h@kAirzYeKN6BYbtn?@D zRFSM@-MqZ~{R(gSc+$?u$Pg=sC=@68Gl)WGWhO<_$AS&q@_nN42GfFZ=_C?YCTd=0!D6W)=OMm;uOE z^QuZ_UsC6z?Ck8ls{?W$25K8vPz||rS@Z6$u7{W3KkTO8$Pdwp7sV!JD)$dhzmL1( z&?IF}Cg#XfN?vBERzC1+ltm)51|On-bn3> zf_ot=Xb#_YRvLAcQ+k({NlHtMkB2s$zQxFUHZ^M~GOs>yXezRzUph-QzGnWtWCTpZJ897 zQ$PfVKwZz} z-03*wt`VWy2w_F{iKYmEPT!Z^q8?WIzxy!*vX0h_P4ZEWxfNLCv|QfF;5Q!r>0SR&po2JxL@FD_=l_;8ktBgFUl-}BYYHBH zRoPZMblW9NzB*#k`OAiAIPS8IgmX23zi~J@@{mSEfTNS*Xuu^qZi-hhAbU0$%eE$a zW!SOjr%BaoVr_b^thA-UL2HJy%1A)_MvqGEVzSDaXBsEm#4McirycnZ47blb@9gZn zsP?8pc>beRzR&mIsVi8S*UH+p!`$YQ!-iN7hvvhGX4}8pVb>nq?;3Bs=pZFA`ThgY zMJU%_9)95=85?wG6#qy;rpIMpgl3_T)2WD=oeKaUbNzKAlWmDnKSo~?4Ew*=q<s%mn76(l;fC0LQ~ zH>Igy3nnU}7Kwt2Rj*59YC973=2RlkP=@*nF!bWp21c)D^?<_y_G>Vxg~G3NVt@a-TvJzv|8zmY&C|aLUwiZBP3pyS zmhZ1cYk#W2%PT4>M|Rbvk=Q+UoAbdj{cJ#=yCAN5Eq;`!_P zcPKC-S#?F+!*kQ5BPOrrm6ZW0B5QX&y`dDiFq}K2Gw626qtnk-Go{zzApx z13Z^kx`ow8#&fS{99f_Z3?wN$6Dv$h8Mk1iU;+oCSjXGT%UFTqrTQeC@WPTpPyCa9 zz3Q4LpY+&K_Hm5Ka^kr6SL3d^{nxaUn094OJ%8h0T^PkiF4{Y`KcRXwW-_W{q*D(# zPhDmg+?~SeoOLm4{j?384W;+1#DoN;F!uo$8U$rom|Rv0uH6fgELE^7dyqz_5GY^1 z++O8Wgt8^R#IE-Fe-alf>Os?7-2k^xf{G&+~s%);MzsX5w?-6FYi*bOOXSp_kPI2xEU+$ z_;Mtng#?McT=4@?93v=U9a$HMz|ow;6v|S8x-}c6`^^{I<$F|;QD26?*I>zdbzd2e zc_D#0BOwV3wfBi45_TD0%{cTRjd*d|3JMCS$z%2$C7Q{M8Hzv;Z0})fijLw}Y zL*&5Aj*y%gPlfFNj0>Ln2zl@&`>1c>;(4pmdtcY@fBPK$TyNJyepb+W?keS3NOgez zC&6m_Ju>)pTxm^0)V$C4lVhV*gQ3qh+}%>Vb#C5#y1J=z<=n4u1)@VheSFI4ZiLg1 zFBP5bW7@anRhvbu6DeIsj2S>O(U6q zyC(NH=X=fT4~U8C#9}#i6xT$s2>qYl%)_=%@2?>}n(v4IXReL>H!rPR^M1E~Y>FFu za)0XY1nPITl!Ov;MdpM5i?o0BR?Aq8KvCLelaSmxZ)fTndhOuAMtEqsb_1=r>ckLo zYwE%kyTp%_(F3WYdAQx`DcULVuCgjT;bnl+CosZP;uatR<*_>*B zZmBvNzo-=CZUgQuU3d{&8Bz8Y-whTZFHYFpPWkATx%*`p(P5rS=_lM zmU^T|MS0USb>t#kt~kdt@3_iigxdDS9ji}BJdg`ZY_5gEj~<4Gmn+ScPHNS!i#fTg zDQDVj($xyOxR3 z=jUkgLcwr3!i6{K>!s7J$BrY1ge2kye{(xQnWH zZG^&OsGByMWis=sn;7wY!;FiC$qr|9c830Di1E*M5JeWF%+>@?ORhh?it}^UR(rsG zy*ePGIOQ=>dL-DHGPjqhcf=t%DR#;CWbex-*wBHD9Ok*6W!jI&JAKzV%L%fMhF6hO z>&(~i7j3Mh-90$3(_g?KzAZD^uU7U ziqf;e8^R7>);4}m`_U?(b4yr`7u0ryM;vl-Z7BQ=1aj?5lZNH_P&o{Vs+!OiIi0+% zZ@_}*WzHH=5_cAMS*tGevYF%qf5M9W86?&F1bd0nn`OR;`yu|+vqRtc?u*G& z+Xq+e`x-Kke(eP-Tg8tQ*WNVRTD`Jn2rD%`O;($R&BTO#?Tvm0YF(EDNT z2MPlYC(+9B)}~CFR@7!*Q{z3H?ME(Nc^v#mIarBph@ihXwOYJ+-?(&ru9 z`TwBW3-K2A>HX+Z;pCP&g{G{8(?-N^r[!NOTE] +>The Microsoft Threat Experts' experts-on-demand capability is still in preview. You can only use the experts-on-demand capability if you have applied for preview and your application has been approved. + Customers can engage our security experts directly from within Windows Defender Security Center for timely and accurate response. Experts provide insights needed to better understand the complex threats affecting your organization, from alert inquiries, potentially compromised machines, root cause of a suspicious network connection, to additional threat intelligence regarding ongoing advanced persistent threat campaigns. With this capability, you can: - Get additional clarification on alerts including root cause or scope of the incident - Gain clarity into suspicious machine behavior and next steps if faced with an advanced attacker @@ -44,4 +47,4 @@ Customers can engage our security experts directly from within Windows Defender ## Related topic -- [Configure Microsoft Threat Experts capabilities](configure-microsoft-threat-experts.md) \ No newline at end of file +- [Configure Microsoft Threat Experts capabilities](configure-microsoft-threat-experts.md) diff --git a/windows/security/threat-protection/windows-defender-atp/onboard.md b/windows/security/threat-protection/windows-defender-atp/onboard.md index 979917a18f..33c43ec774 100644 --- a/windows/security/threat-protection/windows-defender-atp/onboard.md +++ b/windows/security/threat-protection/windows-defender-atp/onboard.md @@ -31,6 +31,7 @@ Topic | Description [Configure attack surface reduction capabilities](configure-attack-surface-reduction.md) | By ensuring configuration settings are properly set and exploit mitigation techniques are applied, these set of capabilities resist attacks and exploitations. [Configure next generation protection](../windows-defender-antivirus/configure-windows-defender-antivirus-features.md) | Configure next generation protection to catch all types of emerging threats. [Configure Secure score dashboard security controls](secure-score-dashboard-windows-defender-advanced-threat-protection.md) | Configure the security controls in Secure score to increase the security posture of your organization. +[Configure Microsoft Threat Experts capabilities](configure-microsoft-threat-experts.md) | Configure and manage how you would like to get cybersecurity threat intelligence from Microsoft Threat Experts. Configure Microsoft Threat Protection integration| Configure other solutions that integrate with Windows Defender ATP. Management and API support| Pull alerts to your SIEM or use APIs to create custom alerts. Create and build Power BI reports. [Configure Windows Defender Security Center settings](preferences-setup-windows-defender-advanced-threat-protection.md) | Configure portal related settings such as general settings, advanced features, enable the preview experience and others. diff --git a/windows/security/threat-protection/windows-defender-atp/overview.md b/windows/security/threat-protection/windows-defender-atp/overview.md index f91e35c7df..d2421506b2 100644 --- a/windows/security/threat-protection/windows-defender-atp/overview.md +++ b/windows/security/threat-protection/windows-defender-atp/overview.md @@ -38,9 +38,10 @@ Topic | Description [Endpoint detection and response](overview-endpoint-detection-response.md) | Understand how Windows Defender ATP continuously monitors your organization for possible attacks against systems, networks, or users in your organization and the features you can use to mitigate and remediate threats. [Automated investigation and remediation](automated-investigations-windows-defender-advanced-threat-protection.md) | In conjunction with being able to quickly respond to advanced attacks, Windows Defender ATP offers automatic investigation and remediation capabilities that help reduce the volume of alerts in minutes at scale. [Secure score](overview-secure-score-windows-defender-advanced-threat-protection.md) | Quickly assess the security posture of your organization, see machines that require attention, as well as recommendations for actions to better protect your organization - all in one place. +[Microsoft Threat Experts](microsoft-threat-experts.md) | Managed cybersecurity threat hunting service. Learn how you can get expert-driven insights and data through targeted attack notification and access to experts on demand. [Advanced hunting](overview-hunting-windows-defender-advanced-threat-protection.md) | Use a powerful search and query language to create custom queries and detection rules. [Management and APIs](management-apis.md) | Windows Defender ATP supports a wide variety of tools to help you manage and interact with the platform so that you can integrate the service into your existing workflows. -[Microsoft Threat Protection](threat-protection-integration.md) | Microsoft security products work better together. Learn about other security capabilities in the Microsoft threat protection stack. +[Microsoft Threat Protection](threat-protection-integration.md) | Microsoft security products work better together. Learn about other security capabilities in the Microsoft threat protection stack. [Portal overview](portal-overview-windows-defender-advanced-threat-protection.md) |Learn to navigate your way around Windows Defender Security Center. diff --git a/windows/security/threat-protection/windows-defender-atp/whats-new-in-windows-defender-atp.md b/windows/security/threat-protection/windows-defender-atp/whats-new-in-windows-defender-atp.md index b8352cb7d6..450fdcb9a5 100644 --- a/windows/security/threat-protection/windows-defender-atp/whats-new-in-windows-defender-atp.md +++ b/windows/security/threat-protection/windows-defender-atp/whats-new-in-windows-defender-atp.md @@ -26,6 +26,8 @@ Here are the new features in the latest release of Windows Defender ATP as well ## April 2019 The following capability is generally available (GA). +- [Microsoft Threat Experts Targeted Attack Notification capability](https://docs.microsoft.com/en-us/windows/security/threat-protection/windows-defender-atp/microsoft-threat-experts#targeted-attack-notification)
Microsoft Threat Experts' Targeted Attack Notification alerts are tailored to organizations to provide as much information as can be quickly delivered thus bringing attention to critical threats in their network, including the timeline, scope of breach, and the methods of intrusion. + - [Microsoft Defender ATP API](https://docs.microsoft.com/windows/security/threat-protection/windows-defender-atp/use-apis)
Microsoft Defender ATP exposes much of its data and actions through a set of programmatic APIs. Those APIs will enable you to automate workflows and innovate based on Windows Defender ATP capabilities. @@ -40,7 +42,7 @@ The following capabilities are included in the April 2019 preview release. ### In preview The following capability are included in the March 2019 preview release. -- [Machine health and compliance report](https://docs.microsoft.com/windows/security/threat-protection/windows-defender-atp/machine-reports-windows-defender-advanced-threat-protection)
The machine health and compliance report provides high-level information about the devices in your organization. +- [Machine health and compliance report](https://docs.microsoft.com/windows/security/threat-protection/windows-defender-atp/machine-reports-windows-defender-advanced-threat-rotection) The machine health and compliance report provides high-level information about the devices in your organization. ## February 2019 From c3f873aa2373e0f13343454669a49738b39a0401 Mon Sep 17 00:00:00 2001 From: Khairunj Date: Tue, 30 Apr 2019 17:49:17 +0000 Subject: [PATCH 256/724] Initialize Docs repository: https://github.com/MicrosoftDocs/windows-docs-pr of branch live --- .openpublishing.publish.config.json | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/.openpublishing.publish.config.json b/.openpublishing.publish.config.json index 2a308af532..91b80c451e 100644 --- a/.openpublishing.publish.config.json +++ b/.openpublishing.publish.config.json @@ -104,7 +104,7 @@ "locale": "en-us", "monikers": [], "moniker_ranges": [], - "open_to_public_contributors": true, + "open_to_public_contributors": false, "type_mapping": { "Conceptual": "Content", "ManagedReference": "Content", From aec019813997679f10ee28ac89d497f8cd1d5ff9 Mon Sep 17 00:00:00 2001 From: Nicole Turner <39884432+nenonix@users.noreply.github.com> Date: Tue, 30 Apr 2019 13:48:52 -0500 Subject: [PATCH 257/724] Update windows/security/threat-protection/windows-defender-smartscreen/windows-defender-smartscreen-overview.md Co-Authored-By: j0rt3g4 --- .../windows-defender-smartscreen-overview.md | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/windows/security/threat-protection/windows-defender-smartscreen/windows-defender-smartscreen-overview.md b/windows/security/threat-protection/windows-defender-smartscreen/windows-defender-smartscreen-overview.md index 8e5327315b..feb72a51a8 100644 --- a/windows/security/threat-protection/windows-defender-smartscreen/windows-defender-smartscreen-overview.md +++ b/windows/security/threat-protection/windows-defender-smartscreen/windows-defender-smartscreen-overview.md @@ -62,7 +62,7 @@ SmartScreen has it's own events IDs on the "Microsoft-Windows-SmartScreen/Debug" |1002 | User Decision SmartScreen Event| >[!IMPORTANT] -> This log is not enabled by default: Microsoft-Windows-SmartScreen/Debug, an required an MDM Policy to enable it. +> Microsoft-Windows-SmartScreen/Debug is not enabled by default. This log requires an MDM Policy to enable it. ## Related topics - [SmartScreen Frequently Asked Questions (FAQ)](https://feedback.smartscreen.microsoft.com/smartscreenfaq.aspx) From 932af0bc7733b9713e375db9b2aac9ed97c74930 Mon Sep 17 00:00:00 2001 From: Dani Halfin Date: Tue, 30 Apr 2019 14:12:37 -0700 Subject: [PATCH 258/724] Going live to fix redirect issue (#83) * config change * Wip endpoint dlp (#81) * fixing redirect (#82) --- .openpublishing.redirection.json | 5 + .../create-wip-policy-using-sccm.md | 4 +- .../how-wip-works-with-labels.md | 98 +++++++++++------- .../images/azure-data-discovery.png | Bin 0 -> 155589 bytes .../images/sensitive-info-types.png | Bin 0 -> 52099 bytes .../images/sensitivity-label-auto-label.png | Bin 0 -> 65930 bytes .../images/sensitivity-label-endpoint-dlp.png | Bin 0 -> 61888 bytes 7 files changed, 69 insertions(+), 38 deletions(-) create mode 100644 windows/security/information-protection/windows-information-protection/images/azure-data-discovery.png create mode 100644 windows/security/information-protection/windows-information-protection/images/sensitive-info-types.png create mode 100644 windows/security/information-protection/windows-information-protection/images/sensitivity-label-auto-label.png create mode 100644 windows/security/information-protection/windows-information-protection/images/sensitivity-label-endpoint-dlp.png diff --git a/.openpublishing.redirection.json b/.openpublishing.redirection.json index f6b41f4ac4..7fe80d11dc 100644 --- a/.openpublishing.redirection.json +++ b/.openpublishing.redirection.json @@ -13949,5 +13949,10 @@ "redirect_url": "/windows/security/threat-protection/windows-defender-atp/manage-indicators", "redirect_document_id": true }, +{ + "source_path": "windows/windows-10/release-information/release-information.md", + "redirect_url": "/windows/release-information", + "redirect_document_id": true +} ] } diff --git a/windows/security/information-protection/windows-information-protection/create-wip-policy-using-sccm.md b/windows/security/information-protection/windows-information-protection/create-wip-policy-using-sccm.md index 5df397e284..6edf443eb3 100644 --- a/windows/security/information-protection/windows-information-protection/create-wip-policy-using-sccm.md +++ b/windows/security/information-protection/windows-information-protection/create-wip-policy-using-sccm.md @@ -14,7 +14,7 @@ manager: dansimp audience: ITPro ms.collection: M365-security-compliance ms.topic: conceptual -ms.date: 04/26/2019 +ms.date: 04/30/2019 --- # Create and deploy a Windows Information Protection (WIP) policy using System Center Configuration Manager @@ -480,7 +480,7 @@ After you've decided where your protected apps can access enterprise data on you - **No.** Stop local encryption keys from being revoked from a device during unenrollment. For example, if you’re migrating between Mobile Device Management (MDM) solutions. - - **Allow Azure RMS.** Enables secure sharing of files by using removable media such as USB drives. For more information, see [Choose to set up Azure Rights Management with WIP](create-wip-policy-using-intune-azure.md#choose-to-set-up-azure-rights-management-with-wip). + - **Allow Azure RMS.** Enables secure sharing of files by using removable media such as USB drives. For more information about how RMS works with WIP, see [Choose to set up Azure Rights Management with WIP](create-wip-policy-using-intune-azure.md#choose-to-set-up-azure-rights-management-with-wip). To confirm what templates your tenant has, run [Get-AadrmTemplate](https://docs.microsoft.com/powershell/module/aadrm/get-aadrmtemplate) from the [AADRM PowerShell module](https://docs.microsoft.com/azure/information-protection/administer-powershell). 2. After you pick all of the settings you want to include, click **Summary**. diff --git a/windows/security/information-protection/windows-information-protection/how-wip-works-with-labels.md b/windows/security/information-protection/windows-information-protection/how-wip-works-with-labels.md index cfcae5b9de..02d2fe3e81 100644 --- a/windows/security/information-protection/windows-information-protection/how-wip-works-with-labels.md +++ b/windows/security/information-protection/windows-information-protection/how-wip-works-with-labels.md @@ -13,15 +13,20 @@ manager: dansimp audience: ITPro ms.collection: M365-security-compliance ms.topic: conceptual -ms.date: 04/15/2019 +ms.date: 04/30/2019 --- # How Windows Information Protection (WIP) protects a file that has a sensitivity label **Applies to:** +- [Windows Defender Advanced Threat Protection (Windows Defender ATP)](https://go.microsoft.com/fwlink/p/?linkid=2069559) +- Windows 10, version 1903 - Windows 10, version 1809 +>[!IMPORTANT] +>Some information relates to prereleased product which may be substantially modified before it's commercially released. Microsoft makes no warranties, express or implied, with respect to the information provided here. + This topic explains how Windows Information Protection works with other Microsoft information protection technologies to protect files that have a sensitivity label. Microsoft information protection technologies work together as an integrated solution to help enterprises: @@ -38,52 +43,73 @@ Microsoft information protection technologies include: - [Microsoft Cloud App Security](https://docs.microsoft.com/cloud-app-security/what-is-cloud-app-security) is a cloud access security broker (CASB) solution that allows you to discover, classify, protect, and monitor user data in first-party and third-party Software-as-a-Service (SaaS) apps used by your organization. -End users can choose and apply sensitivity labels from a bar that appears below the ribbon in Office apps: +## How WIP protects sensitivity labels with endpoint data loss prevention + +You can create and manage [sensitivity labels](https://docs.microsoft.com/office365/securitycompliance/labels) in the Microsoft 365 compliance center. +When you create a sensitivity label, you can specify that endpoint data loss prevention applies to content with that label. + +![Endpoint data loss prevention](images/sensitivity-label-endpoint-dlp.png) + +Office app users can choose a sensitivity label from a menu and apply it to a file. ![Sensitivity labels](images/sensitivity-labels.png) -## Default WIP behaviors for a sensitivity label +WIP enforces default endpoint protection as follows: -Enterprises can create and manage sensitivity labels on the **Labels** page in the Office 365 Security & Compliance Center. -When you create a sensitivity label, you can specify that endpoint protection should apply to content with that label. -WIP enforces default endpoint protection depending on how the sensitivity label is configured: +- If endpoint data loss prevention is enabled, the device enforces work protection for any file with the label +- If endpoint data loss prevention is not enabled: + - The device enforces work protection to a file downloaded from a work site + - The device does not enforce work protection to a file downloaded from a personal site -- When the sensitivity label is configured for endpoint protection of content that includes business data, the device enforces work protection for documents with the label -- When the sensitivity label is *not configured* for endpoint protection, the device reverts to whatever WIP policy has been defined in Intune or System Center Configuration Manager (SCCM): - - If the document is downloaded from a work site, the device enforces work protection - - If the document is downloaded from a personal site, no work protection is applied - -For more information about labels, see [Overview of labels](https://docs.microsoft.com/office365/securitycompliance/labels). - -## Use cases - -This section covers how WIP works with sensitivity labels in specific use cases. - -### User downloads from or creates a document on a work site - -If WIP policy is deployed, any document that is downloaded from a work site, or created on a work site, will have WIP protection regardless of whether the document has a sensitivity label. - -If the document also has a sensitivity label, which can be Office or PDF files, WIP protection is applied according to the label. - -### User downloads a confidential Office or PDF document from a personal site - -Windows Defender Advanced Threat Protection (Windows Defender ATP) scans for any file that gets modified or created, including files that were created on a personal site. -If the file has a sensitivity label, the corresponding WIP protection gets applied even though the file came from a personal site. -For example: +Here's an example where a file remains protected without any work context beyond the sensitivity label: 1. Sara creates a PDF file on a Mac and labels it as **Confidential**. -2. She emails the PDF from her Gmail account to Laura. -3. Laura opens the PDF file on her Windows 10 device. -4. WIP policy gets applied and the file is protected. +1. She emails the PDF from her Gmail account to Laura. +1. Laura opens the PDF file on her Windows 10 device. +1. Windows Defender Advanced Threat Protection (Windows Defender ATP) scans Windows 10 for any file that gets modified or created, including files that were created on a personal site. +1. Windows Defender ATP triggers WIP policy. +1. WIP policy protects the file even though it came from a personal site. -The PDF file doesn't need any work context beyond the sensitivity label. +## How WIP protects automatically classified files + +The next sections cover how Windows Defender ATP extends discovery and protection of sensitive information with improvements in Windows 10 version 1903. + +### Discovery + +Windows Defender ATP can extract the content of the file itself and evaluate whether it contains sensitive information types such as credit card numbers or employee ID numbers. +When you create a sensitivity label, you can specify that the label be added to any file that contains a sensitive information type. + +![Sensitivity labels](images/sensitivity-label-auto-label.png) + +A default set of [sensitive information types](https://docs.microsoft.com/office365/securitycompliance/what-the-sensitive-information-types-look-for) in Microsoft 365 compliance center includes credit card numbers, phone numbers, driver’s license numbers, and so on. +You can also [create a custom sensitive information type](https://docs.microsoft.com/office365/securitycompliance/create-a-custom-sensitive-information-type), which can include any keyword or expression that you want to evaluate. + +### Protection + +When a file is created or edited on a Windows 10 endpoint, Windows Defender ATP extracts the content and evaluates if it contains any default or custom sensitive information types that have been defined. +If the file has a match, Windows Defender ATP applies endpoint data loss prevention even if the file had no label previously. + +Windows Defender ATP is integrated with Azure Information Protection for data discovery and reports sensitive information types that were discovered. +Azure Information Protection aggregates the files with sensitivity labels and the sensitive information types they contain across the enterprise. + +![Image of Azure Information Protection - Data discovery](images/azure-data-discovery.png) + +You can see sensitive information types in Microsoft 365 compliance under **Classifications**. Default sensitive information types have Microsoft as the publisher. The publisher for custom types is the tenant name. + +![Sensitive information types](images/sensitive-info-types.png) + +>[!NOTE] +>Automatic classification does not change the file itself, but it applies protection based on the label. +>WIP protects a file that contains a sensitive information type as a work file. +>Azure Information Protection works differently in that it extends a file with a new attribute so the protection persists if the file is copied. ## Prerequisites -- Windows 10, version 1809 -- [Windows Defender ATP](https://docs.microsoft.com/windows/security/threat-protection/windows-defender-atp/windows-defender-advanced-threat-protection) scans content for a label and applies corresponding WIP protection -- [Sensitivity labels](https://docs.microsoft.com/office365/securitycompliance/labels) need to be configured in the Office 365 Security & Compliance Center -- WIP policy needs to be applied to endpoint devices by using [Intune](create-wip-policy-using-intune-azure.md) or [System Center Configuration Manager (SCCM)](overview-create-wip-policy-sccm.md). +- Endpoint data loss prevention requires Windows 10, version 1809 +- Auto labelling requires Windows 10, version 1903 +- Devices need to be onboarded to [Windows Defender ATP](https://docs.microsoft.com/windows/security/threat-protection/windows-defender-atp/windows-defender-advanced-threat-protection), which scans content for a label and applies WIP policy +- [Sensitivity labels](https://docs.microsoft.com/office365/securitycompliance/labels) need to be configured in Microsoft 365 compliance center +- WIP policy needs to be applied to endpoint devices by using [Intune](create-wip-policy-using-intune-azure.md) or [System Center Configuration Manager (SCCM)](overview-create-wip-policy-sccm.md) diff --git a/windows/security/information-protection/windows-information-protection/images/azure-data-discovery.png b/windows/security/information-protection/windows-information-protection/images/azure-data-discovery.png new file mode 100644 index 0000000000000000000000000000000000000000..0148a800b27f4a914bcb8a082cafb83971de3ffc GIT binary patch literal 155589 zcmZsCWk6iZvMv@ZSQ3J3@Zb>KNpKGY_X+OqPH+hloWU)4aM$24_}~N`++l(Yyvg3@ zp11Eg_fIp_>h4utUEN*%)wd#5m1VFoNiY!*5U}NBKYT<$Knp@ZKvqRZg-hsP5ck9X zU^vR^xF8_lz<=ZPBYtDXA%zRkT;-Ic&^9q~U%!2k(eW+kFOihCtAv}YrGqm< zT!iHc7kw~u0XSPZx>`BdBfP?(rh&^b|H$7vIC?o-Sy;LvRN#&Y!lgKWNuAA1{#2!M zwX!oq;DO>|z@K3Jd7|!M?&@LUY=&Uq`1Ggx^S?T`ask+yz^ghVG52;HQ+;cyw+-|gL;0cHr-Pa%i@Q|-Njot>GzE5glKN*7#)`lp(Pm8-28Lg~pg z0|EjSg4_oQ4bQBjRWDzSxz*q2pzQRc;m<(`7#N6jrMVJ$3*r&z5*ndPy5D~2e6W3i zKZ(zLa9Sp+LOJ!;I8VAff>DBk(3VxcoDNe`7H=`Xl&%7UR&t2<>sPasbxP=js9YG{ zk6%!jx54IIuuV5{eKmyD9GLQNi#x%IR8uhS1o_5(Bh;n*VCQ`6hw3=07`?)R)8}ClCA&adUlg)>M<6!0QG(ZXl<)gH4jN z^|*Xy@(gb!av1Mh*=n228w}fmjgl7<^Sn$9^s{YQHzd@0RJ)tTt2YMU$$AY`7fh4fA;<4fgMnpF>Q`vtTi~+aceV&-}$|*_!D?k*7&dL=LIG> z3i$^aUuFm5k)_tBHvWt{KRYz#A#(_(fWbk&x2O8oJoVFUmbc<-ep>%>{U)wOWGSut z`$5|j6K@!bpNk<_{$J*Lu+%W9`?|E&Pb-ovHJ+^mA=HOfihd zrBfn043@vN@qcH%HR$Gw{^uQgj9kwn{&EjXWVl@xHG~r76+S0HP>8NV!@o?H%kbsD z=|#uAR7L{N0t>iULVrYAfBz0LZPcz=v=tpKumA9)%$+u&m75lg;+k1m=hfdc|KK^q z9`FTEGJ=xTCa|{P{of9l8VCi&Kr8{0NrSJYs99*!LJe!L6!xT=EDQ9Ih^RQa#a%z6 zM4s2`rx3|}{y>E4ciGh>2shTf#lSsz32hL(!@rF1?;`)1QC1reu)8)6d}TcO>XjWW zQyzn0_H=IxYO55fTtqY-%e&^E_mtew-Dnr^{p)f?G}eDEoMT%HIlQSJg1f;qA;Dx` zv&P=%UI|BR*uvF^YaMk*Z=_~##xxf^Ig%f?B=9q@Xh~QfXsdwBs97|!r#>X0i80$R z<1!(`tT?-oS8uTd8LQ?m4^GgFi)J0Ang-%^2z&`ShV#TBoW1D%E5(Kn$Kq_=NLkdrk$VJf3?nSLTuv5VW*h>eq|jm`Q#b#7}< zyYFyy@X-y?(<6Y9M)POF^(U0J0QBu^krxP`AB9lWL*j-H+g$F2M1HGyi9e@vV-r#c zZWd@m6OajRDV9N|xu10@tvkc=}A6$;8 z-Vs;Q^nug#lYVM>DxSgAT3FDZ^?lwRQG*w=kq7zYZXAdR_&}6L%^Hu&X1g~EufPff z3p|ER!K6!9u^Pz9|8`)!PMG5b?XB0Xb_Kzk-acXhXWG0x2$azK@1=c2p-^7DR^bS} zuWk3SSft~A^EKa0S#QywOheIF7+#v_5&NAoprIsVt*EaAV zS7!k0lMCRrNzjB^*EPYHKN|0ZXs>k^j3uC)9>J$sv9mQSTwMuY>#$|#7`UB--kTdD zwyqB!XTkcx+>{A0b-K>m+-`3G{x)+g(ZdBXz?qJFDk|5GLoM8|Ru-D7kPEIrJ($RK zVkfBG2g{?x1g9|lMVVr;27yEs-0&J#eY)Db@%T6RlJygO*T}lUGHUq2!AKaG!d=9i z2)&Xa7}yy3cZ#t_wJSu4>qi3QVlO>q*;XzE#+H_+60&jv-=%qz5iC&6V0o;~O})VQ zW0r{M?N#X7Rs&e`CB+NnE`L~Qc{!x(@eKd|=C!M<0A4*%@w%K_*F6~ z7B#B-G)~v6fyWTH8$aK>f+vN*8z>*3ZKMVX*LY z^Z0=F!QJ1Q1pfpk<8ddQe(N~Rl!IZ65Q5{+o13CioZYKYy)~sYbxc-?Gm^H63|xejbC10_Qj+N0P4u+)fsY(c>|?A!DKaKDcYQG3OyTCOH>iK_p}Jc$ zDq=;AyJSzN!wf{32|ZsAtF|n}GKcb|;%n)JGAWgTwtgEeqiG^;Bd$`tGcywhALUU%OOvtC zPHaGcPT=~?o8_dgNBUTyk%5rBw8}FvK208ecdrjWwPonXr zqqW9xr;G#iy*g;|QDu!xIFOwVd5wA%6+3s|o8HD5b~V=_=ojo`AxG78CnfX14>*_G&fJx)aHg#S;$7EsB2F5iIJE2=N zr4NJgmZzlA#f2hc%rt-uBpR2wGnuoS3zlNX$@GQ7ZW3|8aoV z5Lf&xtirW?dTO}8pOw^pn|;UlaBx5Z_j4h)U{d4#X899}S=X1%GHDGn3_qAB_O+o( zL;;;Y(-GEmUT*IZf?SRZTDE#wg*ksjeew}{lC_|2%>cwI#Rj^8jd=mJjrQ)*cLUNS zBrqe2P0Qz;4R$YouUOR}b^tG&97X%x!^4Wf0egay;)pdpU)bhMRAMsY5T%Klw~?OX z!{=bXj^q4h3!j}|`8;?=kv5t5FoxA=K1(?b;aX;5z>+sKlhM#IYjtbclQoCk$JKWF zdXz#qpfP3cd7QfN;)j9XAEQpIsR{}g{_5$~{Fa?*6fvBpXr18)LgykBQ`B`KY-ll6&Wv$AovGq`ErxW68O7nQa&>v+ z!N`~hQH6&9%^ELzDmjJoI%ibS{OU)3L6e6frK6YkmL|5vb`T#*gah}Pcvez;;}~Yj zBe5Hd8+*5Mq_{U@`6*WM$A5JVTn^{qA=oR34z8G3$eyZ${J_ASryGwGwc^@5g5WD9 zhC@Ee=OobH-2}(q9v3 z)W11cIxx}0^_nEQKBHqiV^M`7lL4PUJ*YDClS$i$_ViKl6Ili>v2X0S9{+A|g!tg) zARyjsN!38vhL#Uw2m?> z>Ah#6haWstb9Hw6jBRh+CyFdEnTOFESJS1dV*B~MOt_QUcGmoR&(-)U6(Q0NW#_fl0{a*Td>GPa(tBj1TUAXGC{i4l3R%k zX9Bh@qw|STlO+l1Q7Tb57j!3FZj?1|I&BOkh12JNO%cJ5{^DknUix#DPZpC=KUZx4 zHK}{1Y({RJwjI~}irLu2^oU#Ji^jU`AQpE4Hm44V5KBgDJbvok(qSR+5+}OYKJPyC zGp5+mmtp_P zCzO4PXd5A93Q)i+P_q$?>CYY`8bDN}%;Woa%t8zUu(_hhLrlJV#A#k#Ies7J^t(Dk zSw952zpML1zH=BKL1j~ty|$!L{l0p^(_N1iwj+3>Mcrdb z-_QiT-x@hFwzX`3da-4Me8-0rk349OmQydM-`;`a1|DG8hlc6c5XPdfB`ndz%Fup zht`a`c`P??W3tN|fukO;rBMcr-NWs3=}ttUTNjsd;4nlD6D$=)B6yX>7Q)d1ecVMA zH4-Ba4!pqqwMUt|37I_RA_7y2ik1S^{m~^2<`r<{18dMrS21&t3t&eiZG~MywV8Ky zYeki$3LAT<4IycYUZ?~;6!KosUn6a`aBNq#YS zn?^xvul3Y=_7IIBygu{c{PQ(#&CcOV&o#4_nLp1LI$eAIG_a&{3j|`LT}|BoZk0(I zB}d_gG@RI$)(+|_WDODvkZz?pbw6Sspc1h0{}cuvD!VhB2Y!icN==*tb)1CG{a6z9 zz8R&UJ>eEIvbokH_gb>Sue}5Yjd^m;c3_J%HzkOO9{VpFJd*5ASKWA1lG+9z-*_Io zIkL{kZbnO6h_(DYU2|umQLGV(p-tslIW*sHB+MQ>KIY^UPR3?9hHV>~M<2)DVU0P) zpx(5v=`iTu8JnC^0h^#@dTp+vYHDg4$y%yB_4hU|RYFtL=54C*vSG>VeS9HpF@RUq%8P}<*L z%WizKWXsdia^h6%tMPMEVA0ytZFP&KR|nerc;i!su}#;KBs-qd7xq0bt{GNqpD-WC z-o`+fdB~mvOR(Flr@8OSrZd7%ct@Q%48K&q{;-@>Qdz2HKDD)UnXm)Z7`s8ShwHQE zPMcOo{poNk@ohwK{11Qu@YS)umFQ+Y!$l^#@oK)+iCq_51$->``^`Y^6c6opJke5z z(#^gb-M0@AHm@w-O5BMiu|GF!czmdYLYR34zvkJFLRk6NaHbwSv7@UkX0DRPo@m2b zo?=YKK`O{+@lT;=)1Hvoz7SK=mebZcTTzm++y!ZQ&_ViHfXMBs+PF%?O8U3C@1S1` z{%&KfRW1xc(MsO*IF6mraE93=zDu+mh$wgQw2hHNK|1mdq}Fyv>LukAuhDn=a_6Oy zMcxc$;g$FXpcKSuVDpIu{o9-c#&ZnnH^TTGRXgm@7HxU0L38S6f(lBNPj%$L+OV0* z^eww5w?cNXxCovL+JXgrgg0u8cj;q){C*Oo4|_j%wi_(=rHj6g6nUco*bEv>LkT0V z;X+Em3Jh(^^T6ex3~p*G2e$(ea_rEM^168C8{1OOL|j=ba&Qi-zkp@R?xiampW3>Q5HVVP-&{FIEFkqfGub0cRr_)KB`trm!KF$4 zV^Lg|YXwu=35`2va!Z_A!h}^xv~p(P=i+;wj~YTBCgOiH$&ViuIhNB%O=w8UnR*$vcogLv>9Hyr_d?27 z&m1Gu4w(|xgT7gi`{Q%lJcV`4!8trAy|WyixhV&?#=8gE#Iy)8z7rT#f3^74v>Ko* zJQa6;8=Dp-_g;Y^He`(kp+ccbg0>=J7QC% zH^HB@17oQ=Vh5+cXFr)cF2cd5vD1Xc&EC*wOS12DYqYZ?E4-sOdA|HGwCFQ+5g4pE zyDsZi?gCb^-=Lhu%DKg{>$;i~lsikDqJ=1vcd&)-5%Dy*WmQ!a=TC=@&pZEEx2|)# z>X%cru+bF;D?OJo3Ki3Q!V-HxkbhHnt>qD`g!Vm`s&0`PQMN^ooLsMtT-459(Dc=j ze2DcisSvoRbVfS03$;XFnc0(U0x6822t8|V;9V4l%bGiv zS^bE~5NhI+I*H;&Z1O@1Fdr0#2uCQ$Wk6xLuVj5WgZc^QX!B|0ew%STGieaslqJdV z{EV<208tc80phrmWrDZS4QO(*>N%V$MoH>nZ_}pKPc;eNarDtiWLz5HnTgnBVf6aH z9@`@xV(3itm605-cIxt9`}~S2POGOvEYCyE@%_MWl8?%$d>!uR*CqNdi|Or8_I1~J z-D$(-7)Z7ExT1IfzRxZLcfye($yN6g89$XAvkAR8xXErzelcd#(A$!xd^y^P5FII5-?$ zyb|#4h+Eb z&yve#(zx87uR<)<5vrF5Ih))XdSZJQC@yAqq&%rC93f z!$PdYLaxE1j0?M_W-p^5SVb2FR*GKY<(VRe@t*pJzYHncUnauORHAT2N8+7>41PBY z$}d7cDb@*V$L6FBO3chTIjsrVTj+o3ad@4Rg=yLukIV|NIBAr&@SdIE28ym8A2!>_ zDfwi!(y8cavD1t7tx$imO%se=RA{_cV|EiUlu2AQWRM|Sa^dQ66Le1Hckxi&dr{)? zW_?H7pSoBy#NbYab)Clwn7k=Cy|mNJ>*w`7K3H!i2fk=NSTs1R@aqWCv~Dy0f`gcF zWH#-<&2WYq8q0M#mL_jF6z!@Av(?fpw>TLf@^{+tdc4rfYJ!;|#u&`Js(bzDY|{dG z8c)sHT3nHp*{ms+*l<`6cLpThoi;T)K0iDa{CPr&M4Y)=M&<7(({7n%$B;zB3_Egn*K0_5UMy!BF0oIM#PI}BFsy>faOT2H z_)@&Hnxqu=+{00RZ5fIG4xenp)xYj?+ySUw(YAMyAvG8c%u-%4Zs|2(y{{(;&{Iqh zKEY|Y#s-&1YVma#?^QZ(=deK>Len_hNcM0IZD4*XB9I3G!_3sS4Jxt`sA$szY<^t^ zow{FYo73)0kmj79$=q4H+*J2C9j7sy50&5K(Kav^Vy zpBY1mK6++XIBh@y7uFd zE^cG9DJGqxUBYxC+ExlWYt3a6p~2u=yV_%2kPD{c1FWe7ly=a}MRuWbzxTwJTh$4K z0Aa7dMq)8~4jo_MfI;W&F6mq5x5Td3RK?2KisItSiq+pzGR8>k{EX$lXXt}8l&Y}Z z>A}vawM9d2cgE}LOf%#Tx)=7zS{L>;r)oXAT<#hfgSX?A9T_(q)rDp1gw;Afvg;Ka zyr=AKep=I5s2|CR(+t1L8U*{*KTmQhrJ+s_nEY^s%?5^~{1Uk(=1)ppWGj$gRWi&P z-*$`V-YFQ=;kzXkD^~e)hAkzpERGH-`7|#+Ud&PER-zfGjpzy2BI@!PT~vJj&)2cw$ysWpDV z?4a+1%=C(^2iSpn`y_YrGi^(}JA20C^v_#p2|ODzb?dr=!qHuUy-GH01p2_a*7e( z;NUa`iTRr%i;%4>YA0;r6wUEbBVxbgB`@*{j+#2!h*bMZcsA>Sm!mP^;g!S~xjSm0 z&(lS#aXLk?|h=S<&B7p60e?7Tc0eo z!`7};!iDl2Oz_^5HbryyNYBAk&4OwUjq@8%j`z(T4SbZJYXtziYAfgbmq~xMB>rMV zN8qni8gD0DlMB`w=;?9jAwiS_^~7#W=EB|x54rT8idV*r@aobuiSRLItva zD14mVh(LsZTS#Ov>zWnIY}b92q_8I3+_NEU?P*5JH?PHvRebNrR+myDm(7=}+>Q>> zg-V)4;~lX17Af$+9fu5oh^;^SIS#@|f8T-}EEZJ43{{alSKp*26fV5VwtmCP%0mp8 zB52xjw>no-{gfa3eRU%7$RN#;e$O|y`)Fo0V*eKogeO{GnyiiPbQY!jo>7rdR2qYi zupAx&)*gZeG1r`|qOt#kPr)=8rIo4CtrLeSZwnN%eQ7afHY1B8knZz=MJy>*wiw8%OkT1%w#W!nZ^tydoe@VrW}nOg-8dT3v% zz2F~FDQuhiVA2W86kFn6vq;Vux@p!rNgV7r++O2+y+y88;y>0V>hywB9{%P6#B1sc!*5A)G4*F_O(uUX zN(w?WjOBBH$sUC*X3w2QX9{JW^Nm9FxP|~eN^JA%PDePNQe*9a($(5(6T861Pb@1R zj~XLkVBx<#tOc&AWL)4R`3+{W@N!jucY1>Bmbu%qmVY)qf&SPk6l|nlb^~Szmn^N) zB3djtgz4!=OpKLgowuy#f?pAkC^lKrhyVbxF^3W#B~@N-nMQJjxfJh`4aVhctEw># zDrXgzZsSYQmGFB%pvB?Cy5Z*!(UrHiYjnPYq{qO|)UFg{2lL$mej;xAl70SqdzIh%mmw@kZJ&4t30Z6~O%T4EG9C0|XLLiT=} z(~AVBPa^#DRQ3{L+)fMNtWT^U+@i7b?{P*q10rGO&zvg;BohH&(-KtlW$FhqA}cXW zJ471UeVXGvMT}t9a@fyj=NUD3Y-3CWI8HB6M^=_34C2$*8VE%(iDv!n8;|SNmf2=h z*p0x`89htr<}$sS*>TGbqD$}XwovWuotMrhhP9BIE0vTZO||CV4Z3!ceh=dU*RCD( zDN+V6I}KhnCNXf}yNxU}sn>0U<=JCY=g+Lk>4UADOBBcRYuW@~*FoP+iN360^HpYE z{amrEa}nqRI~rDoB#$g{(qA+J{1)UCiA=W_WDaV16agB^@Fl2>cEojjHEX4Ki!Sp~ znAIgi!AA)YCDPM&;sntc(P@jAFBUX}CR|!n-?67}weJ?Z4O6yh>GHh}CrQi5b<2z* zWtC_ZQpg-=d3`-%Fkm~_iLHT?E^VICic<%(a7aq~_40{Cnsat1??U;rk0NFE4M)LU z8X1_dP?2^RY&;YKUA^FEwS|B{j~i#D0e2nTO_Uw^p`q2&fU* z4QJ8JHbW0hcV>~K_w%*RrULLhR$^x>p$p#ths}GwDkI{-r(@i$RihM6#>Rvw7s1DM zh}whuo{kPcFM>A(-*LqzC!g^{X!taHEg=~DKxO0`Y%g;%$*`95YJW8(2>C8?l9?bx z0+e3Yki}A7xV>#9uM8}1pAP+LN=MI?wcXj#@;!jk`{%%<2z_GVnh0@PRzHu{O@T-C z37n^q|64n5RZG$Syi%ubfcJR&>UqW8--tdPa=qW>Mi1efTKA5ENkb#WSvUKyc~}0X z*FWsf{INMs{y^`Ig8VKYlrTwKdp3Yyw+;;vHaPb2Xs-|y1T=DxvR}OM4(UYgq$sQ6 z6rRBfLd*S3h@y|&f%abfwJ!yBTlJUpWhy}|68R0=Z{F(>6x~bC3FGo zrx-W6v77MwF0=v)YaB@c%{KOx^2(YHrd-FbE0?ofz}mP#C5bo5+*Zj+Xi%!q;r4f9 zDtzJRxDSR(FTrGLVEi~)1Ue!tw)63NiFaoWNI9*^3FqYcK6H}^#eR-Ia5k&I)KCg9 zX~AQ6h%p>g?2~O>^?P@8;fC>7#t5qQ)d`-;qim%|Ii8X6QT#?$oPDZ0Ah%K+>7GNf zAb`z-AY)2&krzb#JnL`?>C6oGWm8)f&2qOS$YteVOHsKvhNH(FdgrC0azwFyFf;$@KH*Nen{R-1Dvd2l~SSNR%w+r9(Guz`xHPM5v<+NOX!eD^l^+pD?jAdeIjr^1ga-XBGrHV7221;eTjem&sgSrw zUL<|0`n-`VN6W}>j(H7EZM!q251LBMRy#98x1GDWO+umncQ&g=d=>X=4nkXoJQDI% z;Casbr%@`ZKRK?Dvs=sGh6=fBUSyj9YARJBLlmFW;P#G#^T2n_G^E}G<&cGgUt`J( z{1nOy;h*@vp`d=`?Zqa>!$(i~xIl!9rVprR7(6uAVzIs9)DY@GsOmx;dz~APNV(|O zojyr^!4yMOv^L|5+3AH{<=HFJS)ACd)Nq~frAAE}`8gb;FpyT4^V%55p*>4s?=+sp z=BxJv{$VP$638J%PwahEKv?c*6H9(&fh8J$9j7Xj;a)^rQ+*wK3THL=3vFY;i7@a~ z@HRa0GXJny5BAD#G0YVWxi%tqEea@e!OyG`w_a5QTF|elje8P zF8lSFstd*+mWId7zN#y+&bXfQ%4;yhb9=_pJ5)zUpf+nkl~{+p|L0lih|llh4NL@A zL2@nq6mk7{BFXm|IY6*=!}O$O@sw>(v6&OLH#s6AA_`GPP9(^@&O}g8!O4nPia}X$ z9=%g=PfVETngEoZ)3G4;H~VeMss2Ut27T&v&KLH_zsXrnR*AGVd$td92$=_N?VSwm z!(84nY2=5E?sPxryrtV;3?}W*JviBXE>S_czt}6byof_{8vNE^D@vd!8JeCtpyleS z4Y5;_AcF7R&VHw;2jiH1n}=R|-mkiRtI^=0*`h9fs03O-OT&uY2M?`}`jsVX`L2uX zx_^@Ar;UuFzeSTX*~JFoY%19Z4nQpv92@ZUW(^ZU^l=te;6M(!CIFRu8-Ou~I>)zRlWC4**dYHti{ z;eU}IUHv1a6{2YZ$2A#wc|;@`RUO)h@(f&i5D(B7;oLAd9p`j*hK_FsmrvslvkUGt zMCsatSvgtzdtY_UyydYyaKG>LoxUFup%{A)&g9rL9#(o?v0$~W0$^^_4_;GWJEwvZ zOs?YhGyL!gEVt4*zdhJ{@;ve5jWn4d+OlBv{gz*d_e=@@E*ECSBIrvKabBiKsfD(>Tx;JmJXaS?UL zbFSq8k`*lET8lVS_0lXBGIqL2!erjJ47YG^Us#_US3x>hUyz+afDG4J^*SxBIrl>wc`%Ya^BI>j z+6U7!0q?m`j?*Voug?y6C9|0>?F4KprA~5KA?F9EY%+sRAg>ZoA2zkoG~X{2i6BJA z<200cCd{6opet;C3GcnsM+27xz)Se<3s0Z_Df0XFN!Vjw`26(`c`qt~ElQ)ah`}cs zXc2g_Nie3w{aL-7_CVoV(Z^5EpsrdAx1X@O9>Q}lcAuYJPR7e}Wm$r0Yw{WO2|R<1 zLj8`QJpV&579+`{dpg;}``3&9Z1_NJZV`^J&{z*^IK+$jEvWri(71^@rd>WF{#;wD zeVG_2U+Z{vD2vlrPv1TzpPavyNpq48F_1xG;!A5OE@`Bx0JdzYoI81ov?k?!&f$1P ziV_|dzH!GRKEoG8)+_0(!Zx%M*7q=b!(@{3oam!3u$N`0@NH)EisQnm4eh@PzHgxH zblc&eZu9-W8OT#{lFI%Pzk7Jd$;1BG99LA|ED!pN08LFDb*EjIS^y zNS;dPiQ~t<2EwzFV6P3z7e{I&EiR5BT58B)noe5U2m%bcvg*=6vk5azWr_&%Aa_tZ zj8oW4TqWM$Vzng4p2IO$UWJA?7COzXaWyulpC_JX)&Z@l^WH@W>o$tz<)aoZEvzjXe~&L0Q?yWl1b z)i$Om=mp^SEGB&WY|BrC$^bWtoX&<)IDo%7u()~O#A35FS4Qn8bdFeWZ*cP1KIsw7 zjjzp&!~))W1~aAv5chSMPm)$(5oruhZyca+HIVw$K7aOex2;?~Iq&>)RJi0Q!e`Q`O)$mY*JocHDtkbR4U$<9( zny=6SWV$=wNuewJ+YSG6KX}1r;D%Uxr0AP*FxjYtA~XLOZt^pLs=2me*agTfHd5*Uy_rO@PAO?NqS< zuoP>I!x4YjW3toB>d{sB_!ISIxo94vw=i8oK^c0-UHeEx87%Dg0Z8uq!X&*7_J6bY z>vMROyD_G8_A0QiSf7OaMxT@o#92yu!__Ew(^>5^hV&&Ix2%FmNB1=A z;wdaVc!iE#Y-InBj{%lc9Rb9CZ~3N6oB`o0Mqp}>KgqEFzmWd?a#H)hTC!221}5`W zqh_{ZHrh_D<)V!SbT2Kt<|p3t|YjA;$_y1eil6!HD~(Mw4ugM&t4|{50~bj z{p-r9;a5K`^R4+c4Ig6VR(08_T)&N?p*&(7;^t%t-NVAKhqm1eG@QCofcHPwbp7wv zAGGE*-ZTq@(MR?2?3dGr9Y2%f(vDD;aC*$;?;6+;u9)0J`_E4<_Evo90$|EW z!q**T%}P&44^?4;BK7}4Xon-hZnyGCZI4|{sP}TbnM&CxO8_-vA1^xOaG^)aMM~o?|j(<6uaNlf2A$5obb@lg-QwVH&ZjF76cCZo?3GeHG%(U zUxQ|1qZWvV`u(YK$Z2A2dIiY2X&9Ke9n87h^V@ zk$8U}kK%t@_P!zl6SDkFWc3Ep;hDDl9jVOoZJxoF0Ohl1&k73*^&JJ+ z*rGS=@U)ga)19V9_q)!8emvkDm<>pYO(+{LaDVf?>z2Z*Zn)TWocj$T_A|T|q@3V& zB)Y-+mi>eC9bt#k!_@_UKIQs;Z5?5f(0l#Sdz({`@UA`&5G3QU-G+mGusNLR@_I{* za(v+Qhw;Rx7$a!N=u|YAvI=UKxj6@YlYLz$`~Mv|!rf8y5HUpN<$_aQ9ZD07>rpG> zhWl=Sl!?7M_tzm3g1`U$@zG*kI6z7&P+?O`%`w135ZdJNQoCeN4L=*~=N3hQ?^luy zZ0+m>j%V_@{5~`Bza2Gd?94r`({Xz6uF~R7>Ua+tdSOSn^<^qAH+S#q_wq9x043yi za)60<(Tqm$ab5MVl#okKyNrSpqFXJTG`3xGH^zR>9it}+yRhT2&P{@Rhj{^jWo$() z(bGy!01Wb)t=?_9OX;CdoytDShrDjUl#FtGm+5I!%wI&y+J`dBVN)_=nVC&Wq6A!E zK^t(4AM2K2n=|frcz0H@Umb(e$c(A~RB@>@OcL$%AdWwHx#}+cc#UAU`~x@fvf80} zGbQu(FeKBmd{E*a#;WRHZwNdlvq3_(pOLs{Y5yjHK|KN5n=0_KT=OMhNsC8X@q^M9 zE9Fdt;7+);HvgO7a;u>AZ5ra_m>;mUd0IW!=5 z(&2Ik<(*5T0Hsc4@EuB3K7zFfTRr{pI=%nJr$IEat)s8&iNYti?GM&CtX)E`*7wYh zqD_@ChcB%F(eIXJ6BanUmlG!`86_GAG*I)fqEI|ZNq zVF35p+4@N(r+f0!!=c{Gar)=fO9N?~fV8e(CKQGoIr)IWw0HYjig$C>o_jql_~b&n zZvHN(I@!wLs?2=GI9f-A`?|+Nju%j&rrJfe!MgYtwYd=$MKbkUGM>M^em>jyN)giBaWM$EDMXvCqq@;Y$deACM11KE)P>H#vxtyg@orFZGMt3~djz0JH z^{qC=u(-Agn=^zbCG33ET(eE=<0b<`#+B)X0laldeHgeZ=I+31F7A~RNarFLZPL)f z3=b%r$pSv){!#BzH-t_(xb$)1+z0G@S%1IGXF*nFHZh?ZZ}IsS&eBlQ42!?F21$jT z`g}GE&jO316t_Se95I0nY~?2OYd zHslzbB=8BPpRJz;PB+B3M1u~6Sp(VR!^p1B zgxMWaU-q={c_-XIP!CiIDZ2aOLDpnvC-^RxL9Pe4 z_%2%=u^iqAkdxXjQHb-37&SHZSSDZmYi7+Ff0*}4>ml0{`-EQ-8P||9IB(04Ym-a+ zDKX9qw=8@{iz3gy2)3egHOjc1zzu1xM`b@S%VNnIIL zz>QgM#?T_hKhjH&;^IZtP1at$52Lsh@90oo6`N8tL`}NuT|6u9I6z@l)%P_;*hjlBzdnHuXV1mQWJ(S{?qAN% z*-f3a#jJ0S1I#kKd%S@qRVUQP1U)Ri7j&BTUJ+h;2SkG9l*C`+RUxGXJ{`^$*IUI$ zqQXWVD3vJE&({0*dUQo*!?vfcmtZYu8Fj}?J;&M?%r0mr z^ATFQzbUr86E+I3D+_M1x-vd!6fP7+3z2!z{w_U>#(I5mnU8@cy!D&a(jiu**pb=p z*93KlWrmLVo4$ZqHa>|_eCHhtUYq)YMD)W5brCX^%)!O}VswVF_8B&YG$Gs`# zQU9btVWZkR%O6|_n=JlA$cC87+> zm|kA{ncMr*4G{BZhaUZ$tQHi8l-DiK@TbCsX0nf~X9Ne%A-z!y!)!1n5Xhxb%F3NO zes*rd^Laexu39{_@XppVV4%{Ii?n!$L#5<$F939-2e+Wl@9_>9ZGlr||GT}9YhyDB zK-3n8T~&D|fg9dY)?7xm5Q}>6!g5?(FF|s`Ggr)iM+xXtMYowBS2f;v`+{YyHElHyLcoIy7 zhV7M1P4^EdiQIj_Guh2_iSRUY_EX`7E)l>JeQZ~XSOPXcOg$;2klV$U3^4!nZ1us5 z!oq&5(`u2nW3tg>JeI=Gr!0D z%yU;On2~UH5nx{EexM-W`1p{8A^TH$8A@mMK*vL*ZQ5hH z!V}11?rkdGQiIaNwvJ5od)=|irp=>^+m&yvHTw`eD!{+r2;5%&FCbwEVOK z5zEagKnl^Fg_hqluaV&!AxWpBuVJYJ_~(SD_QV~zlj4)D=mcI#o$G;h!|oIZJ4>Cl{qxs6~!X+-AP%&GGW+lg|YP(EqN>3x33t ziFnUebCJ=6+8v8!81+DBXK%n!`Q2TW_)Oj>WF^g&+@kMvWvq&HG6i)Ns2G<7wytP9 zutUhfrGr!R;%n|Bs63inCnDPvs#&+~OS$kM626m9HaQrbbl#s_mfkwAfx@RBI8myc zR=bjQS}wg-%{s<+_5njJ`z~?gO@l@JFV*5yU;A8)-Uj&il-{UnW8QW>r#Umg9^sWW2@G}fZ+h^a8y*PoCm!p8%LN^7_%7d`Pr zeo!moc#VE^24iTL#qXR#lJ43n3-5hh=MLNNc-$~z^*XxfH*HB$8&@>N zUleV}WAuykYuqqmUTVVPW&@$xd1Dr97tmo97`fhYPjkIXm9E-=rxw1HoW)+Cr$6)& zGx_$+e@cmEO)#zZPjxIaqqtrr8v~#pC8+!#7rtJ;>V)p7eAzeJ5jZ~_)(r_nZiqmz zeHG!G`}L%xq>y~Z_Qnf0g2xk&qt&*-!;Ibe3wtQj>g#JUL#NW7()+>v{kq1WU?t2E zr4vZM44PoIn}YEI)Qc9k;i&{VEAcI8;HRH1xwoI6$Y?6NgA@|c?@OQU!S%k~{7=or zeUHM^-HCk8YSS`H9$$4_aWk8W+Gsh16MO92vLfGJ7r{#Mup;6ux|gLYF1}^iM#*rE z3ngqScDDR{=ZbJnhqh43XjpK1ho$V0r$~7(eE+Ep)R^u^gTdUOMiqFr2)vWuDQBpxFU?OsxT6>7GW2=u4|B~4r z!sZs*S>xa(ps5YlcBzDJITI@{d+GBd@6qZOZguC=<(sul3SOJY$#g$y7pj?0Nv zs{?_0O3E7IOWp?7#_^-RSTx_kgL3x9V`d~&&;FfIlE$?AncAl~Eom z2yzehCi6KDo4tzhTdoaoq?8?hS2u3qbN5?coLq@AV9SR^>sQBv#>vwB2QCdn;k7z{ zk;AH-_5G0j_ixj8?S7y9*(fuHeXKbO*BZtT{qh+xY38C#Zw%BdvQyqqE&M;`-ZHMO zW{VrerBEoPP#lU=+#M=NTdZhtDeg{iE$;4wqNO;&-Cc^iI|PCT33Aitoc5ga-Y@s} ze!BA^dqeijUbAMcnI-?3n11{sWwCu66eqT{ecP&tP|lwBA4dY?mFKD8Y>}zbN4SY; z*=D`k+VXqk&zFD?-8Hki((>{+W1>wd#_X;AytCSya3^9x)VpsFo^v9Y9S{AuM1X61 zf6urG-n9}MoU$e8#fbzIB};3#ChXtdt{?;@^VoHzmxece|L(Uvlss9kCr&Sy=Cm@) z?jsJouH^oBHP^Owyq;jCnLp#WD0^!}Xg{`S>zYv*^<%`xrvd6t%3atj8M^z!BHGd< zDzL6#*s0ba+$%sU-7R_lcGy)!e4m?`6sTZw>#*Cpy>GOGyL*f}lDKb3DYvX_05AwO z?9Ok|(J8-DZ3XG>50jB9c$)|fk@qFXXQhsvG`+mG3ZNgdDp=MON_u#lZ@Q}ZaoGI0 zsUTr5;)`q+p5U*R(vaf%VO*qqiXv=mvH@o`B;rENLOBifC1yGp{UCp%2+bF6i7a0wex)kOe zYDK4F3v9;T5I(Zn8BLH_Gq-FJECo|6UQ<*0yJI_f`<&~cCe}LZM^jycQS0o}k3I;N ztx0Shmkc;l7uj7FmAp`M{e#|LCtL!t<*^)W*{_)sfkU?-Q`cxI5UV z7mHkv>ahdW<|+YZFN#48WUo!MDSl{7D&>wkT{q5xJvkm3o53-%P6haBdD(AbvY*S= z*ImBy#!DH)V&4+(`%V50d-LbxhI!~t8zaVn;;~L~wAk%l?*HpUd|E-Zn!ci6wI2^d z%%k?1FFf&{5Eq9>2baNx3P=?a9i*5Dlp^zc<;WT>g(~AsD6fW~qS|rnB zKeg3K$S8FZ95trW!Pn0;p0Zk6f+^ODpt0`mnc&)xfIsekPHbSa$4aR-<9ILf z<+*@4w{-H;uQ%g8*k(!#fV$c~W4l;H9{UDB=S#ins|NetJgFyYNp0fnjVqk?EGg9? z9i!fXhT0B&UIHQ8r|Uea`=PtCo8HX#IL|(~y6SIRv+~=lv*?nIMoAhUfAsKbd3UDW z%M|l5J^H!nlIwPv`C8tHtE;Pucq>A{SKeY8({Hrfi^kPCnw1tzfvj=jXc~sOt z(JHi?T)Xd1h8ad$PF>DW{%I@L{p9X^?0mtpJaJLXc16S(DO`JuLrPKIakR`ST8|>EK z8S=mV?>0$N;4RKpBBSH*xZwZy7kPe67%UFthYK~9|3{TFUtF>4>r*nU}4e#b*$p2jrUZDI(0Dd>u5cMxU|A!S0vmvUp^oAXW|!u21_yaEK~2#@xNc?{kzZo3Ipwa z$n&+WTD!w$nVY~|&H<~oHxkeuK z^uyR&kp|A_4XhC}W4=vEdr{uA*VVjP_6lXj=L;GUZdRs-eBH!WjxZi;KLtB+`nKlG z_{h1&pco?I*!;s;(1jnA0{o7`+t6-f;~I{&f7Re5M-Wzz$M&G_St4q-kLoijMs=jy&IH^?Wj! zlnYcyF;?K6QZA5Pznry9{!joPYi;6rpUnW|DE7b-AEwGv?@DjpPa2(RG<@wqP6%*g zDU~||##2_QrD`fYvCDNFrLT#rx6w*-EpKxU{burZ>AZN6w9sC)QloO~$f$=BZQSiw z;*)P=ue^>0jxlWH=GTjS^iFoRUO6?at5GnW_dRLp^fwD)Sh?@ByGpc?dJnJoVyDvd z{>cLe6#`Jq@i6A&e9Uao>y9P2bp9+Jn!PMNdjc`uFXBU=dgVQ%l?zseH3<4fRLMQQ zr)2tqCA z^&^G(d5t>x)^UN_$GEdan~dRJ9moCE87$oB0&E91-&)QId zpH#I7yK z#@Zg@Psbm+fA4>4K0f6g^|Evku)bnCST=SD2W-}gZ!R2@?q3;^7usDOOZJZ~@vHi< zXBxq{uO{-nESp8Ndka>b;v86w2Z<&2Ph16toP*L?o33HsI2IORTjSNJ{NLnUmd}<2;s~v} zl~d?+8;Ble7=Bn<<*Wl!o+Y$)Ey^>>0UvMU=dl59K5jKQCa$Tw4L?mS@4wadimk$! z>N4(Dh?fr5{et^OWXq}5%sF%MSm|V+YeQll`P-e?!_?DeZIY3jcAtsl{_mA5mU)EtS+mhVoDjP2dKwne7@eE9LRefE z5k>kzm1ttHbYGn2z8m#~9Sd#QoIe4_C8Yw-$y)c@6okcNRTdZ6NYzUdJ#G`wVIjc? z*h5q}Vy%P1*=(@K%48|NJxci{0;zZsg6Bxw1Hf*~KXOY$w4umD@7;pi*OA5k_yBh< zH$!r6^f6l_2ViLPB_(q~61_-6d(pk+&B!lla9fIPVEKGRLt<_+eCdKT*)k(wkum^i zoHmqPb~NgL4U>ZANhc)@TLu}>mq%NenFoKc8O^7lt9!MFJ*`NrS3t_Bb7jPZH(WxG zKT=^JTA7|7OOqmYWfL^KFkC06IsTJ)u7qK(WdpHy6i`INnWTs{bME{q#pcN?+H3;3 z62ddS(XVUEG7;^q$;5gfV%zw_7Ohh7?Bq+(m+da&d4W`$@Aw*x+_*!5Ca&otuIX$_ zo}S`|K(g+mtFpYDl^xdOfoz64hpN=vWmK@|j@a>in~+huPfM21Vt|jeFj^C&_(J!I zNqhX^yiYTcCh?UmesN%PrcCNwA-hkNv|;mbYp=5tPV~L^74N1oHcEWcUIr(x%3^6=^#$~CK!kPzWmu}fZhka+o0;M$+W&NKp>mw&oqy20W-||0Q8fs+k2wqrHFYk zdf{aGJcU(p;`@D$fR6wYZ`P&Mk}xw&9*>Z55S$+9DphH(>3tF+pI*ClUy~^0TWg#% zH6WyzuNDoDb{a>x>GPtO@U=^Q#N_p`k(OuRdX^m%X)I*;QG2A#+Si<8($wikvkoc4 zWa+A{Mhgsu&k@6`3EiM7Q~xR~^rBM1LyV)5(!|%_imzTfFCoFl5OobhSe#|K@~Q>< z3Bp)~-t(h50gg0pleKm}r9=t#e=jK$Yc@?sd|9p=m?pz19ry|&iiHRqQ_9ckClioW zy)|9nnkWc%s_9cRmuD9uG>J|5JpC3ryxjf5@aNvuE=f8K{>_x}?cSCkTVcZduD3i7 zIVV1!c=~W;=&03Zf45We{tsn4)-r9-Dj>75@n^}#r-f1NIOg=*#-H9JAMMk*nyN+m z+>Vc;WM$cvO(m_FxC!cpQtD?5!TUfK8S2pVQs2-APN-h1baY`G<{AR!-3YI9F}qBw zNLMO%K2QhLxPhsEFv7h*R5V!?(sxx+w=JO*^}>FCg08mjEi}R-WK|K{FScYznI+hjTIjK; zus1RZZS@f#U}5faSPi3@Gn0(gAeIs|4ZD7DMFY84BQ0Xij71dQ#nm)`Z*JwY9yU;t z*>pD2w~?2jgc+@&lCajoyXWFs zY}IHDBeKV=9Bxy_+Xn$+ko&JEqzp4-w5|S^ZdmfG-Q0Sa|JbI?*BFLqYhP<0?k}GN z^r{LEbW|tbZ2xK_LZng_P%cQq>{oGScXQDnUevQcSRx+H5bP@|UonwIS7019KBe3- z#2!n|5IldC-(}dg+ot_akEMjngOWLFj>8$)W4h|q*E-g^cG93tc)|Df6vsq7&J1NN zYS zWPSdGq<@mQ@1}JRJNW8obFM*q$LR{C1gs8qe_Dp${`4Z{f=@3~s4vwJHV3E=fvk`l zqOf2o{oHrt0~L~7HJJv7dK$H@jwO=mUw%+%Wi5Hz2W{<~An)-_?FY1OHhBS0=UWXk znETh*$Gv+wdF!RA(uuFS4YkiWo2`A4Ml*zazSu^0)Nh5~bluVT@>f;{a3X?r`nZzQ zsbD}Y&adrIUn?l~ap>w>PCtpV(e0&m_G_zEfM+sa>>DdG4bDUd?x$Z)tT-JA+YYd| zkqhT(y`7$&yt<`dO*wq5r~O(Ku>gxoZ|6 zHu92z4KBd^ER^b#yDn5d5y#kX)^})=0d;}XhY@d_6XypS|SUZdb%VlfsU(P`@&C{|9goYEW(IJ3XT99tX~7yuJ72Ho*PjVufmL$~K@e9s^Ff z6-v#i=mR6pd{{{_H$FFrn(I6JtRyK(VOpM~lWgjf_=N*zF~`p& z=Z+l`TMs?99y&(Ih7J2XH-*?PdhBpL5W=EH<27zwztCW;iAJohTH<nwxqn?ut5~ z;445RmD@COM=_8P*-zGWThLvYhKv9FT7qWSctmqdN*}VJ3a&+bFm&~hndgKtjN!6q zxyns_XLoK~Ezg)tIy0|{ZUqH0+%_%u$VPG%+RTg(M z;huB=!o$+zf!5Nd)!;~k$CYu;Fz=7mzVsvn_3I7F!%u})Hj6+a4?PQ~XsdhXV%#~f zwOcZgX>jvC2`Hlwja2zs_<^Wf*yVYEtS@VDbS7f&8RC4YkIo1pscX<9`^S8C_2%IF zAiQ3zq|$BO3S%IvF9!v13RxlBZgX&g={pGjW{+yxWVF+KG=u+Eo3Cg!(Xr7Mh;z~E z!_*Y+r=}CCb;-3&LFY(2B<6;+%Unx1W<3Wv-X!!@UbJK5x6zQBaA95>^NQ|KODhF? zDxk@)CGNT>Qvl94iKf*DG~4hPb=+UUXka{h9;-CD2uKWfX<}LWLpM`mNu=}e9T|(9fDy;?~AI1cu$`#pQae^vly=@a0 zaUY}rT=76%p?fC_E1?^557oG*BEY@zeCv<>!|1^5*Z#T3*6{P9M1b8^doOe}{T1x; z9QEG$Z&pXWFlqa|z^>#bAWG?2xKNU*UCXMBNfZ83r(i=qgtxcj2gEsJMAkLaN{Cxi zaSfQ#!lGM4O1kE@>-sgbtrSY{a+fI;Wc&7Yxk}7@s4-0&@QzU0YE68{S}e5K5rqf| zVw9)FnF?k{sHilAW1()l0@R3zt(`F}kbX^&iq}2;?)0ER*OvrJUv}%I9C0FX5Z``B zW?+bc>l+pzr$a1Ob{0{m=3SQWO!Fi2l-)5J&t~4q%eJk^AH+(wT`(=)Cl?-7qj2Kl?e`_?-BA!^&WRXR0n{3`6uqWn12v2V8#LqoB zZutbE!*4kz*EqI=oZ{V){TRQm_TcX|257X+p4yj?>$pa|Zx71sjUX=2Rg{>flUb1? zzf}r`EjI)e9TqML^(1d%q@sh(YpjKzgXgRS2MY)$iTRB%04T7H!%2U6%$l}vg=4qq zUHa9b7;haj$f1m7`FQh}c$O7%J(AR^0^I~k6Y*xPnd}Ih$DwfL0JES-8i?GM%PQg0 zoUPE%RYF;G^;z08d2tDyqL@8_>b^atH7Sd zV38Ah=>y2ik%s)VB!GHj=jV&1Z}e#=hs0gjrsr1UQJINU zcHEdsdtIfa9=V27zITW{y^Zy;*+MY6l^iqpz@L5MD7J)YCAR~5x0Yle`{Q*I+n)f( z(@tIl&siM+q8-wGcj7jbU90ZiCWc@` z5gny>jE%X+oTa@L^u=&-1NiyqV^R|lZU#mpmZ>Ni2U#Xl!0|7n>gY-~OlC@0B~uA9 zET>G5&1{1$x!LQu8u*MKBXPl?M$)&w!~|qUV_>pUWM6sC(bMAmItAouWgXM#inA46k?IE&zO?Z{F#He<_lXs!2zGwR zuF5@+f6#tu6HxBDVySw*#x%z{@M?UU!*R%0xW2Lz7}%zG@&^kr?1g~{6}BjC`=m2v zs`qnu*7R8bE~Vq@Tq~}#_g$-Z<_p-uW+u86sgJC^5#1HkJ>-(Xs@Hw`fqx?3)I+wf z)#&^oZM8@1(Mh=NPKK?=_3IgQ$29XeJG?wFKo}(OwbbBM!Ho6;hX*&frt5{Qcj|R2 z*7a@~(i0ap<3aKvx1%2Rx#P1wZr(;|i}9o%a~OB4S|deZ=aSm)aqd$Z8Y*FdnQdHe z>=7jQUu_#NS&l4k{V$`oD`6C-n+M8P@|w7cE3`I@*^R>*fSwF7r0vI?-e0hN?%s<@ zXQg{bEbhnQnvdq-e-)y_r&JvjQD%k?#LQ_h{M&8sW);9O)1|l87lDlyA>Y0w4%Ztjo1KA zvOnOSpR~E@N6=^bmg)|Y|oqEKc zJ3X$-HEX%BD!qKUknZ;mwveN!68lCS>vAqxbC2(coKLQ}?F^v;{1uwgR?&x6P10`| zP3kq@B+!9@fG)o^`PeMEZ|#Xrj&I@qvV3bl*^#MN0)nb{*5KHB`{MYDT*vEKy|Tyf z8-sP5!Kdf3POaCqy)AjxkE@_N&?;ytZm2jH{j4dnaE=qEsMhQCt}tzhW?2}&9VhC` z6d{Xe^T@-jNLlI>O(8yUeHsDkqDE$OGP}6ohk0Ksz^2qj=hIyE8gp;s%2^UpL34qJ z;xCQ|lLRGtxJ9UMcJ(-m7f4reSCiI;b=#ho-@>Op1acGEjnSK?dHWN5wd0of@>;D9 z5PCdCxu>yVE{Q4Y9i#wIRF#IKOf-GORo%%g=+Q-$oXdu6gN;s^(8-ej!~AppG_LYN#HPdXBD@+qZ_pqdBv>f z!^e9=B``bAO2dUg8P@M8!Aq07ud?0fS=8(kLQ)PO-LWk=NpQ^9-MKhW?-?if&`;ZD z=#=^(G)y;d%(?+q4rD9bHgq`zReEy-$3-I8SWrkN$cM@qQFC|x)QI7D74PY&U{YVg zEW$8O6#Q-2Q>d{7#3C+v=teh<(eJ);L$;a$ca6D#wz`}%gguR!dDBp5x;nAWU)SU> zCc{o7DbK%3w&6m?1E>ty%$0z80W`@EhrFE4)x~_)WKzRan{Y4=OKbG}q7LYcb&Fn3 z|GK(SLCWK%IW(0h3bVrIjt0O!+*5f=&rrwh0Up{yLXpDzBG>+XB||KrveAN62u1Ln zD8r3_SmnWf_LVJNkJ2>a8aa2YT`uVE^f)m8Fx?^U2-J60HLj6EQUa>sj96VF$7t{P zl6wt|mVwa8*gTJ?goV6oe<2oFM1YbFwUuLPsa@fWI9SJg5qAcIeH?TquaCC^E(h;D za<@wMND^Cq0lFs-0NON7hUrfV9qJ%;Mz+_tVbJZLc4t)P>5&V#@x3bjtpH^l{hWP_kW%48!dqz~CV#{?~0qp@L60gJPHUc3iBj4fM) z4)OHobJBsnp(jkrIva(^H-=88?SpN4nV$|2+kFJ$wUMg2zM>KPNYt5fUX83oEt2x_ zhhlaWPTMp>VnNrcrfXA$BB$Ma@`!aySHeGW(vh5KNVd!cQ>^_$`e2cqTPAqV_a=)~;89r7TU6F`0?B&QNs_A#s?;+c~44i?Q zX4iZXMq`=lsiPbHq+zUw50zMe3`WfJwK~pBhsV4@AoY0OII%FBJkymtWvEB88b!=@ zm|NSF+VoiAuft&F>JBiR5EfpValtvpGrB|kbd1zkTN`b?rXGc&>iY7FLnfJ_=7$4h z{xPZwu(Z^^x+*6opjwIZRV^c&w2s!=s-Zyye5KR0|~EJ#A2swygPzU zuk$Ee9m1BIu-ZZBZCM&1%n0(sP45QIh9u`171k^*gyzsp9t`{nabZ$sdNc)~;yw4Y z0h{gU(Oc#|p1LDBVgm2?)i@}n3qQhRAn^SY&pbYntWxtYJfa3k_w55pT8-lS7QkbRA=MK)#?9WQVPq+ zWXEahJbXXvcg3MQbmL!FcuCj4*xj@7?g>`-chzTJ3@zPBZbqA0LYzs+l zD|J>vwrU&G5#v(mOQn{dwmt&vUw=z6So< z_eu zB`|(s=Cc8U zqVPQJcomYB%=Cs$)E9rh zW@rIFHcY446)%0nEkW7a5i+4hH3gfSBPCSdKTxPL z{C|O<`lojfdAsk7(fLI7AND}Uhq$v6!O}M;kJM(y%aWbt$=L#SJuFP|#E&kBrJXNN zE4d2(HbE*!niF>i5aN~i2WsF@s>KyT=m_X?!%`#VITVWDK4-U8w1A+CuWOfbh4{EP z=dNsT<@eeI{$b-3|GzreKi!4Jrp}_CUQKN_hg1vkq}VPD`}>f5fYHC$Fx8){b$vSC zYxC{Tcl|YTssC4aum3M-DaB|1KZ9@m-x2g-^7eJV?TJ}hEp*#TO-P(f7`)`Yo9T6W zepL>=!+Obfvfsux^~F&FWwYT=O8vKJ#R8MuF_AoKt>m~Jg%LEDoIqM|hLDW;A)}Kt zVg7MDeqSfr59lzggne)UxeJR~H{XSF5lS9t&6eqq{;s#R zvvc4@`?tQ*nAr7Nz^AL}MWAeD4=Ot`3uYRve>?Hd&6jvMzxYor6(-+uM%mt_R4z0?dfQ2V^SL$x z>!k$+N)$XN6Rb!=dk*ob44;5cPJl@)Q74}H3h?4TbKCf^87y~jA* zFR^pKI23@Q;B@@j|3zl#F(zmPlZY4T+tzkefG2Lwa|-Dle^lh+MbxIB+bQ&WxA@OF z%~y4~KE`b3z2M5VH&?(j;KmQFhL9e`_b5ZX6!Ldt!LXFTR^%$?b5gtIdIMrL{WeHtK2(R8)xx;UKn90N`BvNq=;k3ow#;E zOf#{j>4RPS$^&5DmldYx@C5T-2}j};u4u2w?nA=`SiS!{|LgwAOn6&WuCHsI^xj#O zR2F}cegfJ}fYPixR|Sjp?tRF0OIdtwVryaHKST6C*vZ(l18X^bwuM1d-|}yQEkgbc zH0M=Ssk>EPAHLFJR@P*Y3Gybb)1K|$S#j;Y_jVu}$9$u%HSA>Mq{f%46U{CXN~5dY z`orlf2;8wJ*s_-bly^c!mqLTRQ8Ym{mUzB}yc30KWYQ1}I`8uR#^@gV&IDd@NEV;< ze*|jdv%=donYDGl!Xn;U$k?<(ECCmn)etj(fY^C#Bg;r`;PFJ8HPjTf)L8M~|{{JI_Q@W7V6G@VUVt$j=9U^2DTnY@Kfb z3x@VKwqd5;I7P@C$fFiY(ifZrZ6-{Kgjq~;{hoUMmYbp<$+Bzoy7aqkqF$bdx&2RC zIIC#_gLTWPgnxH&Ji^)lTjGkB0GZ`~_P(v;8nGTs*yiZo}St+>9&j zEqQOs@x$kkaEr0F&klag&0Wqm!Tkz7J>f4a=dGY)l2$LRwOP(vve(oN`IRNg@GWP{ zjNwTE&xe~`6cm&Sqk-oS4_9sR>FHWW4e;W0v{17EkA99ZoNI_wTEjuKnODe^Mg*YK zF@BwOwa~v*O#uV3UY`BIY&YL(;uDQh-u~=7S|tOIrz^Mvi>m*pzb$qtQp)5Hk=-$7}}Ibi(7MEWQpMeapm*)Ah{9^s*&UG}Q2P454~T=(-Tz){adAi#=S zVP!fMb@I9&I>ir%$F_${cJKQ`z4M!0pyQ%-U8U!Z1KjHQ;Nk*Rr9?pEsJlQ}D>7>% zA=fj*MS7Xl7SdoG&pglbm#|poPruuJ85Sbxo0AEgg1FE5;Hx0i>~kd>BH zep?Di^EuAdk|QpB>D!`wyhgXTw}1L;qLE3&))CF0Tx>;IHadF;rJCun^)*W^A|t|Y zwEDlwtcawQM4m2>^+Ez6t0s>Nw?rOV>*E8AgnYKq*%H37gXZ^P6KCznxF@5+keIBj z(O=)+3wl6V6htql2yD#n=My}#yz8phZl<`0BcZt!*VF|j6ex9;J0b-|h3FmD>8grh zT}ofw3!hzEk%Yr@uIbEW0Ahw<5gE-EHSOdFBI~b%Y;gtChVg$Ae-e4}2?xKaOLRc- zkERqKMaC6*1JB8SR8ZLc-8pWPVKeZ~^jw8$+q&y|^eAMkFw3BaFMN@c|Au#aExhCD zQdOEvxWc;82Mq8>n$k*=N}iwMI1se0@|5_=(kp6?C&-)bhhNFEvR~i!ogGy91 zvnv>v-=^ze;1nc&_F)6yDkt`)Pn=?7e0%jY_ejZ*zc_+t0{Z4^Abx+8K8f8L4E-yl z{nN7lVBd?>4rkyeh?+d@=;%Ozi+xN+#!`Lc&(4A+2r(4Q&nv`dvTrXtA~N@wOr`b! zHT8699}Fn>_P9x8kNggRtmFezs_+)`y9KVKpSAI1g{*L@5YNiV7~(F&6@n_Ki4w-W z6fGYfoedaPO6pCRA;p8Fv1dqmev?UmT{NaB-(Zb*$`TfxeN}aD=Z^2=l4P53=<-QZ z1g~YNj)qk%XW{nm>XqmH8&e;-vC$K5WMWd~ercgrrab@`tsCf~5Q>h3gf^Krne0S0 zLLCIoT{?43-%7p{Wb2#FWs?Wx&z-+DY9inW!)7+(m5$b#PrU6KB~arhW6Kj6!@U+T z?fb0do-&=Lxtc?bpbYJu=P|50?`P*IahcKubmS_{%{{U`Q1IXz9sqYx(*)d{V?C)} z1dj&gcLFWuc%v4R6O4NgR_5t<(D>(i-b(vt#)Yx9yF9NH!$b5Eddrwzt?_>|1swf! z)!C?arG97*J|2Bg_}=6N%aOBAtr{9{MdT%x`>RV0vT%j{5WvjDv|d`bl2c!w^6Gui zNwMC27#xxvla@9(nkh`$P#FthY(vVVb^4WQhmC$mrA)W zvdPhvbsrRSEpq$Vmb>&&C~}L14dLSuEj9rTb|3O4?k<0d~r9c zI6@tl5y@2*svrz#3{jU*36b#?V2u5GEtveMC65<7l#rApRj%8zH&dGKxH!VUDjSSLu3lq7P`B(tYQ0e106uf%E1}z! z2t98Ce8$ctq1tEJz1H}YR>x4iV_IQgjbpm_jmt&i$9a>?WQTA_iXt)?27Q}c8S$gq zA6s6lnFCeN2A!{hZx@Bm75@eIlkNS1nlkB_(CR*9=4HxX1x$5!CBzJ@e6>f9SxxUW zPjZi*j};P5KnN#|r&4;q$NzG9lZrjBg?uWk)9!-^LsW@*uho!G4Bq8|JuaoM__)kx zJy%$$mgHr#G?%qaIs(i;Q#!SuMEh33LKn$HO=XRX9a?VCUK{s-ECH8fS8A{qMru_t zkN$s5k4t&DTAF`WD^9d+yHD!x?{|PTH#ZY;enq*tx%n0}Ba(1HZ%8i4kOrrJ2IK3F zmHvCh%rtF7$(iTP_ZAdFBkIWkHD1_;=xf;R6Kn}YrV0GPPc3od5wWu|EI&Hl{Uk}s zIKNw)4qD^t+pMOzRmnMxTdJN4cFeU z8n)Pl!gLw4r9V4HWj(}hnp)p^=mrn{;PjWbejLtvZ~mE&=kR5JX_OC8v^t8c6Pb~z!P)xXNm!gCle_vc_?B-Wwe`X)z=sg+MfqHCefZ%u>@9E^UNVH zZ(5R=l;u3?qxjR1SwrNopP>9lN|^r92_dgro`;8r#A96e6v)mFsTvv+d_;DwV;}kY zl)M9DS6;e+`7`}ujTN+l8=2pb{A1xg26ePZ_{*breO%O2qK32mJfrJ(xVkBxTD z_p1{`4W+uF`H@ad?PAc!fe}hSXh-+^>5L8WxiAOv!Y3&USr9~FULoJS zfrZYnjdGbG`RPx2!#Dk0N)|6r+0wsTmYmBhe)8zpdd0+|SsgNIoja!*UcG&GulLFG zu9W4VI)f+<{B~6f^CDpI>#u(=p48MzfPeVMl|GUo?$bJPzdHtmALwC{tmADqw6m2V zAk`o-lkv1H?^c9Vf`1J zL>*?Pp9MEL=;#Qe@IFQ0HPD%M;ku@JvKdZs33%oRzU4$F3;1yEwL9Q9^n@{78%rCx z-Tvwt=|mja;`}bdB!2N?*c;o8FH&+cZcY-rMF-kod@994ebmNzp*xelG6de0Blcgd z3VWYpe#!*CI+Sl9;)wD+bVz!xm}ac~9X`Xc0*bk5^A1!)Xuur@F+aG98Yk(wX}8Dj z8UVJ0Pu-HLC5=f{TOVI3yL6PAXWW5uyekasZBI7FbD&GuyJkS)aR2+o8prog`) zxeu}T6t(Usma|JloQ;?yY}O`({T>_Fn%wZAsqs-UV$%c@TI3iBC5nU*U$lPpNa|_-S~V&Qp)}PLXCQZsL4Nn*7#-t5Bh&_`7d(;g z!HhL0RPdcGav*CLogJTGn_ws7@w=KOx-inDHN2CoRY_~p^zHfNlIk+eOsp;lx!}|m z)iTTske{J=b?(p)E>VjWC5?6m9S@gg@k!}~$M*?AbqOiPuv1d5hBJNJ0FZ)#=$1x8 z3G*M#aIjYTJ)Tno@eK2ohUi|m7wf>sJBHTQ*6W*_SRgPuIvN+BUN-w3HnQF)y2i72`{$djKHKiB`vcHDNDtAMarH%2%Y|E|G-I`xw_)^b4S6>B|n zo+Qn5YeLG(&>Wxz8U=TY?j_A(c~P0abVxZ$!8(Kf~f$s~%6CChb%2PkB8^@8I}&heV}pp~YP%+y*Q=i^5~ z1lJlYV{pi4qGz&AHG*5Tbg`S$QQ0oKWL*tZb`9+odm(IO0J3QKbT9p86m2w#r_f6^ zwbAD2+oWWf78=LvUifn8_~Da7Ed_)M_Os(Vt9e$uH2hV;0bhx>mEX>kM`M;Zi^R>m zl}&X6zL$KSjQj146_&KGwl)^t=;cb@A(_ag?j>J8t{p=pWurILVc?$8QAH# zgtmfsFl3NA3t0+JId^j?Nk=ku4iv3m>btl#rJAYS*lOEzsVMpQI;oN^nsOnqQ6V}L zO0O^}Q+s^_N&_3b(w8t`TNh`yK9i< z2>rEKf8WFcOVCnr8Wm=rBXl-BzF8P0bY^DZidERX>IPRai3>*TpaUhD}*;h*E>aLq(ogU6(=@ObW!ajbrD~`ai@dyGy z>=kvc9v<~_L!=sdWMqku32ko&~eMq z(F~046QLMhu`I7KnF|+9A1fKV?Q~oDfrYj<+<;k~39@_e4{Yq}K(^__54r5`Z|)#B zi~OXGYn4-S@!nwre`yTy?0K#);em`OqCVt}1O2q{DT@E;)7RpiGZ9=6ed~u7+BBr` z6j-vNL=;fW^u>{}TLRNb`j_q*#5R2DFF{dJIHN#u2msi{S)pXUdQ^R%WE zvs;=j4t*;*QRz{1(vd3!2U%0h$W#MOtL-H!EANX26U<~|5S=4C>E=riuOU9}O|_Cs zePZOP;&2E$n`5udT?9t^xpxe3xl}ZEJf}ofc}_CV^a%cgkN-tdtUVk|JyWlR=DDT? zt-H7JxoKDBp~&nX%-^ktMLBv8ISHR*vuTW6x|-=;u;7=AR%quXwdc3rR-(dkg_;yf{@w)i%B&o z2qf5}ys-Z{rSC*G*auQwXVrEer;>4|q1 zc7oQ07wal{vbravLI(5PcW)7(Uihh)qm7|d^xU~)H2OIzH% zK!Fx5?of&sE6_r5x8m;F;#SH- z-5UvfWt>qJymtBcu*xbN;D@=uu8_8^eJ`Aq z&ze}4Iv@WzzrZt+=60681uWHkKADIXiPO+ftIPAL+pRl&P_muBukKPu$CW<@0z}w& z=+>GG`Mu7oY;V=K(xY#^3k$U`3esJi$U~Bbwb9YvP zZdHBEsLWheXwp#p#^_bbmrs^|Yk_~Py(f#?a{6+~#{GIHpF+#$+O3UDzV%M%DMWAe z!B-%?)-e;kw<_QDq|-KYyD)>g`A*D^jXOlf_PUDR&hd0C<{&Qw4cN$kmntw$7CIf` z6z9dOzh2TG&}%JPxG>76KWU}P8i_a>`TqGYyz`&5H(n&I0!7#qaxH`pogT#woA?GNIR>AWTF32$X;dZ3PSSiQ)UJPLi` zn(sTdr^J<8`<_SkAJaPol8zkHb1WwimFLZlkWA29?wWXEp0)&Gl&W3}y)>HeE45uH zC>PgOL*J9SH2kDn9<;9d^rbyU-&EQw^t0Ks)4D$Fx7yQjwD**KFE?T7m9d(YDT9LE z6B@i-ykVHO;x=cEQxfZaxAsU7^~BXTIgw6L?Z}pS3Bnk)G+PHm{Nyl-xM53B2ZVIHRFWC9W3jjf?(uOki0; zD#v;Z-i(`#hx0r*ys^c-I=a%I8am09U zRWtHCPIf&)vm&h3`FU%1Fk zXzP~u+&o~iXYPCZUN~9&SibVbSh*2Bv`o*s5uaE=LH08dQvHK3dm>K)zHn)%D)7SX zlxXQYue4beTXv-GUiG?MH#+x#clKtXper4PlA0_Go8mS_awd7+k>ZK&7I_vImud4i1a{bDjR6OL=_Kj~YLl3sYb+TZ&W!Jh8+vH8v1%i?v_^M&6Wn!y1YGH5)d8C&2kDm%rTxTq({dk`$qlJ;m7^=wQoGZJaZSUz1rE^zTd z7nkD;c}Y)RzY?$M34p zKN;Q3>0eqM+IHoE>6`0IgVS!DOoNFWi?TkJMb#J;p%tsf`?}~q<(p`52D56RdU4;w0lF{kw@@~vM-cb)4 zilsF!aySu^K#Vh~>AC78%oFCRsLZ{IIPS{nuAh4jK~&ro<(A87SX7B-@e?K@+; zo=G>nhJc1?0%rUB{NiSP3_*`qzFidh^HN}cmK9&+GE>L?&k?>sW#9FqN@+PTpS^?| zziV{)8Le-lwD%lfFn*>YQ5M+ipuwkYu4-#Bs_6zEqPzGcI$piuuom!^UFk!{#{fV& zkTul$_;T!@SJ~;C&gWIxh#^}R4Zg~!G*mk~QSZc$Uy!QHPEr50m+6$B#x}Af)d;%c zX011Uu<79w_0+`@$mmL@fEKWtEfg+;A`a4(SAK723&NeZ|*R zLJL>+YZQ!|pU4ROUcKQ(f>P7uD3g_KE{;H`ZV3+M<*9G~~Fnf&$nL9N$Nc%y}NqxMPD z%DDr|RhUc!zk-epMZSWiD7;;dVjv{2yz}7QSiGX)(3_bwT$1_<-erkWZE3{}_PeU4 z^j(jvkD_Uq9@A21?<|^9KUv~6dFqA?W90@B?v&m*4<|(N*9Jd0 zoPw;8g-Z-p28k7wUeNyx{c?a9xmVuzX~MdhZ(`U*Nl6e5*kc90%;-GlGgticdksE6 zwO(9ZJuyjdx4P;E1yo^}*MftqXCjs+Mfg;)t#C6+ZV)AJLF)*1aT>g8_O61nrf@(f z(YISyZ0r*?cOctSM8^g^w$qI2R!Bdu(zu8P%Bi(ddCq0ASJ=DClJHr|tLK)2y4ysy znLnA%s=Qpy2(%Kv3Siw~TKGP^u+6kG8;`h}&72iGRu@H1(D+1TZ3Yy46q##^i?&?| z*tpse`gZN@;$xToGy^XM*PTdo1%^A9MY>!kDIt|?>%nBnNS8Kq`~uLTE`Gk{$*-2z zgT25fE-Z8T!hZ9`Nv*7ahr+1)vo6|aXHt9Aa6m*9$gmhx%@B>KS2Z9xSa;8+H$-{d z^H}Re*t##cER<864ZV|9iZGD27iPB*aSrNYZy5<1-geI@HPx|*8#;_u@f4WhMEB#wY?eq?lb!3jnM2Vu}iK!?AAI&E|PY0^>qt1 zO=s?c8@m2<&Y5#b0Z*i5@sy>)>Y4M?g7WpnG;+91h}ss z+SuFPT^{D3du!}6NkLmLtur#~frRLA>D^rG(#XQfyRCLn-OiqC&1ov0 zfVSRJ-*1(vW|!mgtLIterVt^})sdI!Oew8N_tW%uD$c6uHi8Jw!@QYe8JTq9>grKzMHl^rQ4|16J(HjdiO6! z!-~5sE*io8WUMDAq481E%ix|7_3bKWg##Zxc1`J;Q0WE*p zsvC;#@Tf|?F?srBAt9IS1LI<5<>v`r>$F}xyos^(UK3k0y46XMoEI0L)b(zH<(5Y@ z4}?;B$Dx%t`@tcD!^&0JC&Ksn7>QpId>@`&Oghf;{xrB@Gy7gtcNL;2GJxJ0Yb3yT z9SecT#-Veo-yR1yBOhHzk6z*M8xVR3IL$jv;BVrgULMzhx>cLV_?^E;);@jX^hUQR zq%Xlpi?w!1LFygd($Sxx$q3pWE4>>M+JsUNJ~NHOR?5*iOuG7RWs!R~pe?9p+>PT@ z2OQC6=d3^@h<8BOT8AiUEW_L{qd#x^koIfO(%nf;XsFp=%d}(VtwKKvE(AxGh1d4( ztMJ@+5$+Ecn!fAJG6gLuzp|j;55+|dRp)7VyiQE+H?Y8Q9)tEiPNy`rSSK~1eZP(8 zCQNUS#>ucfg%@9wEekyBRTQ6xtPUZ&mEx+g1)}2t9;hI&HdYo0^WK)0E92{#8=ouA zyNmWBy4Myo@h$MYx~RMw-w)8p?~y?1a6}7hJL+qDt{t1QN4=ku1<4E{ZQtqL9$qdw zl4(Bm3-~YaqG(R$*hefE@}b138NDd7-W;MHFHF*?|%iTps0V>#T~a}|V)&5oh#P1ce3wgY3- z4MA5FNl$@ifS?s&5Cq5hR)0nCwKMLbOU`j-vl^;iQ|C)qTFcRvL^1(NSqoxZ!0Ltj z=q>MM+|qBsHrofJ!mKZIIPcF(D_C|+`KA$?9uTm6#%3>|BA15b61vuB`7MYCm(R#; zxtGDV%sd0a52TAYmd&=d%~+6mgE6z!O_JGjvp!A3_!}^ylK^fjr9)JDtVfs8 z7Ze~W4X4`IR`|E)FPl$sZkLF%iw7^4RSom?D6j`~uwVim1?+H zSq+o@W3}PJ2cqL1)NsGzk4IxUj9jdgQLa)cm^f|^9$fFYl8(Jvk6cPUEioQ$Kww9T z!;_o4e7_y3lz6Lgn!3}WM$gOR^VZGfJ|4`wU7`=ZcO*Vuo`+NU#`!o6cO=tGr$(g@ zTP+f`6zl4(1>1Yz+vI~_9>+~%hSv$BqnIMsI@D$4;++1HJ>OTP#K)s!&0YEU7Ay?r zZ

7>_NHANsMP%BN*P=Xf7bR#8S=G?N9WLq-J;wm+a&3+m6`BIh|c`ZuKS zSHJG&2tE4Q#J>bjME=_Pem~D)>p3u zJp!k%JFi)zwzm>jLRE))3GglY6>Z$QTe$LDGzRW3fKS5>U0)^fL0EZLJ{)LXHd!uh zncgnwXxp`#)uj#$2YH${4N6+c^0w4%J5;S6&>c8@PgC9L_;^65+K?h&&y-NBxB=s~ zzQ>&afs=jICsN`w73G497c=r4D)Jm~0xZb29Ke6& zg}}ZnHUBN@46-lnzU<@lGRx-l0}?3i#J-I6?WoUE^6L4`LJW9 z_(Z!4T53>kLHP0`ezaIQZT&n*4D%4qW+<>$ zcrG%)xiMGVl1Tbl3-$IQ)Ch*xdvyZibx>c7)*t8kad<^{kJXYP&AT`( zw{k_nwEnK);(&XRhfL(j<{&`~(~6w!x3ioVhIvXmHJ^+{i=R62lL#n#6T#~%iVj9j z@^e5T<7~zHJL_Upl=%2vAJugT+Au>S6o9OWR;U2LSJ%>i^3{Lnh8J?oGakf+mY%^E z43z*2Wb`YkRopSvIc!8&z(EDQ!l>d~iIRIhD~-nT$GK%c>y!JMfqpD?#Qlv-rR%R; zfJe$w(MNNfXee2j64&f)M7G)Xc$^HKOPIvICskT^n6Zy8=gt|zdl5D80%A-Vif&S` zqI~$O$Q~su63*_EHD%~Xo4wSSE)PgWVn5buz%ODbWwL33)exN5Z8bc*Stv^5PvV)e z-xL*n^$i1kE^n2mI{n$u0zEDtr|dl>$?Y)9lNE>bCc4?_lIjjB`@Ozjtiob&9uafe zBkIKkm0rig_iir!uofO~#v8iS%3&=Zn^NLlO$p-Am+fL&`mz35<-#uvWswLCU7KmDa&g&-M8*3iAxyvI( zdS<}u``voZ&GD7P-bzRqFZOG%DoQicv_d;k!cgEW z3{z;5f7-J-r(jI~#zNs2d(N~{BLu!sSS*~=QMYIDwfV1}rdm?PT4PfGWscvOtfU@M zJM^zh)BI&Vum@e%|>LX8Zx=$rwrk=-7C(rOLNSJoe3+<$ncs=I>=9dna4Ygw;Gy2gF zm-VKc>6_)*#^$vf$Dm!EXio2dH)3B8`xEP>^oLN~SSNXcbWMFTNKO_sI&uYTU z9g^*o{*~`3dz;q?j-Ohp7}jJI-0hZ@tNNnnmtyVR^5zUSJkzyjuJdx!nGe*BkOlh&HuRPP{>Z zErzIqj8J&Cg`B&lmvc1_C%eCWji8LL3}#dRlkgk^^uyG~<72E!+$EjqOx8%N_lnDZ zbFVrX+a{%+BB464Rf!S;cBN`fANL7mrg6ti}|(qj2B7(~j18rnERd(woo5?*3WZZ}7tEp^zsa|ErD~g>a>Mxsfz- z=IisfiE~!WT6|o?{pJ9$z3*u3@t!5MrRjVW86WyHLY>^&lvO< zwD{E-%|)e6*e+x@pgKyhJH%qDh-@35Xu(6eG4RMiuhnh?CUDIB>GuExe0bM;7$7QIgfuxhn4924{ctHxy5q}j{oHV>>oO?+u1 zEdvRreFB1KT>RkGYKJwImlHPxFDPW@GH3Z+*^`eNl89sul=qNX6*5P#r&x`?mfCX6 zBb{9HEOIRySO2{dGp^{mww=w$3~7I5fjZ`f5!B7H0AY?hg-pT%v%K9548!&{=6IpQaW>~Yq&VnPeziXK@ zyG2#O^YC=?@WJ_T<>Omfak6S|x9jaRkNI0lx8YhBkeQ2W+5ok%)Xp`1j$C$`ZKvFZ zf)r6C?+kq;FNp`KZK(pOEytM@%13T;T0=#6-pHC5$a{kYPnqsgw;bSx0uY-`F;vGO|R32}s;tjwgY- zD1i29K(4cAbH!s?5|+>r9MC}0>v|&Vpa#UL6J;QeN&zfx)MYZgXI8&#*8k3l&z^^j zM~l3QmC_kS4OUhB6aI(wtQC)yeH9ueCS;!PHNvkXJ|BFW%DHkDEpsGMvgh-r@zI%H z?a3C49{zIa+byaS05+m)_(|S={KIPg-NuA=qf>g$;wJOcUaUh`*oxJ|+Q#cW`f;!P z&BlO{9y~^uS$+yihz|z2FBt#R#hmNN^4^|q{g9N?%db)k<#TG^2qAGE^DtpF>zsCq z-_~0lbbNQqo_28E3(iy0pN-_2h1Q zsBV=i%<=Nl_=oyWlAXwXD#v;LaF>Tt6xNZj(-P+efJkxq0)rVFH0?u;{qE#0j8U~X zq%A|jO>S!(8<4yFc|SWF2Q_>M*)X?7iyivg9F4UIXzE~)0{ZqkzggF$Zu?kxRehlr z(kzLL%emu&L6i|Akt@quds6-AuB{&F;P|?S?-CU9LF;wqR!~M^ep%${1EoAxU^qmG z^N0UYnp!f#%r?m&huUv|XbO)+lLd%I7Rd{+=d5}2_hb4_(?{M+l^GBvwnSh8+~FZ1 z5yFQ&Bzx%>h2MyZXk;CiLVx1Nr5WGXes&E#rCAaM^mG21ZvTNFPhi6_eed^ndQ4yQ zay`n9rM&OZ(rCVMwb_s~=NJ_A=WY+L=FM~36F{>*{(Dw~pMDc8a?OHu&W7BqTiWPg zCHm>@M!uF;0u%4`lD2ilXNogzOunRW&!~ppElMgK<|}TGBO4KH+yzH-&V9(&*b9_9 zsGhk|s=*=m`K8298?xuCM^(1q6BWKaW34E>G~v1W?D>MI$Z+oHo)El#8L)7d$Azmt z2Nn)UQz?c>UVsw;;R+lUFDZ!I(`v=#S$8DAY@CBoAgZRLqvLfpCjEH%lVn>=FaPgy$E7voFRmHe~DF*x2aC}G4QUyuNvYcN88!! zY;+2MO3K}i4Jq9>ai)K1@vf4kenTg8+o!m^7#5#hI9MOIS>K>=StLmj&xv#z(T!N$ zc5*Fu6b+8nGjynSTs~|FM+yd?V`g7tnAbYAGrj%{*_cR5_R3f}`lXa6H8;AKjvA~$ zefgUodhsL*cR0)j-fSb;k!YCH*`U(B=$B*Osk42XL6-NO+fq-->Q3g&K3U(nJ66Pp zF~^Kx-4jfon`t_uFMzBLL*BjSu>uYQ{)F2Ez(+a9dBBk{n~bcZw!5EoPkyY6kJL7$ zt|vUMgB=5(D%1esDlmGx9pF=ft}Q#g%@|wD$G3WZRrbwz&@_yZI+qIe(o$W@$oot= zWF%J>#>Fu-#LEM~p{(XAP1<<5%o@qRHRy+U{I;Gcy<>Jn_5gV1TIKbc0h}tD&Fksh z^N|wrp7>Q1+V{<)G8juzud5dE{DI4}amTN|P`;Me&P}w7KNqp}>aH{3a;58KHftzU|@%`h{p9xe?n(RTHahQZR&!hb}oNhhSEg7E_Sm zkRn*ao*48jIa7ol3F{Wcu&;tY*5VZ)5Xui2c!_x1ytAbjROrXWyR6yFtAA}6wDW1L9T0- z%oaM{CQ4>GBr$N2l9isjmz}2YlZ|NmPUv;!VK3T|d&-7Z1lgE#@s#a=r2H-n-N=0s z5iS@f-d8?-WX|++Xc4EITDn<_L78{^P#7lyfFiV^rK@RaSCs8H_+dTxiI^vFH3%hQ z+iMx|Z6t?ZtHua~b)7;cX-sK`mxPuTcFn^K9HxjrTm_FRjM;~XI%?Cu9jr1iaS4=y z;^Od;5k*K&_(-W@qgN&`FBQd(O<2f#b#-YVC8@mDV(wDl&>Nz*JzW2pSd;0++zB9< zP>Fq47~(5dNBd6~fy4(pt9tMEy`neJDrP-UdT}Xf)UgZQEVwjQRo)d=&uJ| zY=}bzoJ;S4%gAlwTtNz8{{NV)fJGJr-ioS2*Yg!^6DCbwSv+qveN^lEh|g^BsPRO2 znH4?)DwDyKW8?Q2WhUbQ)fwA;AE6WLJRD&ZmZ+4w7S>w!bFIZ+gLups%_RLyn2RUR6^v&; zdjuflQ2$Z*3O%2gP6FNn;5RT=ou zGR)TiHwsL}CJedb%c>Kq_U~Nna^zCXfLcXVNMj?c|NK-!fBOaB#8&HJX%-7%J$=EU z16&n-dxKAW8V(YXhZ}fkizdLs$98z@EyG))`$2`aw_5qfOnZeTEq_z zjJtcu>kRz*zIW2o6#cb0OuMraLFWX)G0cpXNr*tw{WN?Mf*s(yXgl*sm&0RzU7X}- z9NTRek>F{w;o#)tWOsjiHCQBWEcE;LZ!{SS;B0zN{9DhyL^5oSIHTjWf;f?9zfLa?Ym8$(;Si`(_b%j=BS?zp!Vq}wAwv;1}i=*yy?k>*&PJ8X5~ z7if|NNbZ{mOE^~(U*-%oN$bx+zE?fHH^LGsN6S+P3TthH+SNO=df7dL1{+-Mufl~f z>TgkCyAVL#pPGK{xFyc9<)&)$mhB;{w8mPjgQLl7FSZq*{UB2hPpZ_m7ra{BFV(QF zu0KblFNFs6M9otSSg_$*j+@zCwR9!k@~I*MrK44Ktk$^dt6(pRV5L5w_*Rm6qh9W3 zJwJDREr?LG%w0>j^sHA?AEvk3&PKYBxrC}0@ujag^1j-&jUvl`<5$nkRb;nR14QqO zpkX9zKN7a4Ey#TREL{k(>He99T!h1ed)sfNN%?{+Y)x=`M%|l1jmxqxJ%^O5twqn* zRA0kL-Kr=RYum@QzMl&%!`#hz-X0;eE~MX zdVBr6p{7BcoSKp}Gs{06lQdIj&=CQrrA1@P>5Y$%*B|$gp*lk&NI3hzU@W_6iOqK^ ze~L93SMmR_7{FZGZrdqlT!10Ox)RB|+$RiM{IX<2HEPe37MXRs$sj(-^q2Pmc#Jug z1@iFFLy~koLUZMkI6N<)J_&5EUVX2qun+O1`-``MM~?eP$Rqse71%ekprF7f!F#`E zCa9kGU;je0G4VC#z%QgvpMYMg{F6MEC1JvsLfVFMutS2zv`@l6$YCH?(gHpWJ^h;@ zHG8+G)|@Scv5@)k{PZH)VJm<|C0Sm0_^`b?s^z~M8KPa7nwEx+g#}p)rlNoOGUVI0 zZ(@@wvWd<(3mV-b((I+8!U-B`gc>C!^D`3m@5%`3e+jSZ??3l=%@_DWi-*$|?v5-~ z;BWc>6k>k*3Hx$a0~>FTVm54q2htH)=3S67;5 z{=O&x@~kuI?_>w-EQfzE3sQb`+9q5<=QRd17*0Q>>Y$KFLg%>R)PV?m@Rr88~w*>wYK8?PkAj4%iW($C3fCB-%ys=z)^q4|LY;Ya=f*-d2D+ngaVr z;OwY&^2iVv615Q+`RJK#$fs|D8CE1GfzzTA|h` z%xKLICaByu%`<1#f*5Izjm@<+b>cUY1!bqKo(Ds3Gzazf)?bs7QPXoG4h&q2NJs=} ztE$G$oc8s}uxi)0#lKQ*u6=--i5ksUTimXqis}Q^(GjiaV%%ef$%{~0udVdV~+;yG zR>0TBzje`k5zb?#+)(Q&unpK~sc{Y@K&$vJ_ZTi1u?|XXZFwL$p@xB8+yi&0jyJQ7 z!~19WfFyV^A^v<84UTHSx!#P5h+b<}Cp%y(y>C3W#T8v6a>V$9bRr9@ACV zBm_uAQ!;!@S!0kAFOXBqd=B+IFR#Ldk#-;J_PQg7qAn8A!ZoL>m}MMW6$l%A z#&Qv;V@RyUeGoQV<;w|4zf=QSKo5HON?bo8vy|1;ruXd+TVN*%WnO{2D_(Ix>F_`P zt|{}zcx?)2W@dK!h3Zxxn}w9qx=zB@ECz6#U45!f6XR*Ra>Y(k+`Xk_A=lcxhtQpdG7PZPo$pE~RnQt3As*mK@ea5$W}aI|O{hgMu{>|u%XLX-~bn?g4B^d#|PD<8vK zZdAH5lp~??vzyC$iTlqm1s5D!w{PyXPP}hu`hi zaXH|cPL($=H2C6pVdq3#t#(tb=NXVVl+q>M`lW5@dfXvk-bOIug679bVd*jEAx{tD z)f{tfh;Z8H!eyk$++$|1%?`Z-$YZ_s|8 z7RylblJ`x-+@1LgwwQuMthpVsjN!68_H~p*EUPP>hkB;5dZs#eNcYCO5T}jBGCScV?um9&cwcDr?dqU9DD2ll++2$)Cm3%97~NmvvYpIvV^Gx%~VRw z2Qvf~ZfJ?M!Bqt48bM31pLblzh`g?SZaJvIbIx2*YyX{+j%Pr*!ibCZ-6->afhJ-2ruM?cycGaw^9Z`qzZd>5 zvf+@lA`l{h>_*%!uNTlCw%ByhJ`Da_a|Bd^A5Q-OdH;CJNT%%%vpGcj)$Z=DRO8cs zJ^|p*?-@ZF*rFu+~;5NS3;r( z`wzqHU$6b|dBwvHP<~<#0{&9;Li+sv1XZj{8yHX@A0K<&9{18N5&XRuG4SZ-*nB|y zUyZ8Lo!TW_fiI!QJD=$FrmR=e_sYz6Cky?dLBO~5nY?0Ve!2|#ChZ^uS zj^z{cwlqf|ytM%~V^z5(^QS6C=|+aXiSCesfQy8QiAm3Tpk|}@t*iQ*MJ5H_mt?mE zVWgE-|Llb%yxTS@`Y!q}-4j;k<}Y1;GOy>Q*_Z-b(LLK?+_^58wxW5@yaQrx)d6cb~sbQ*8<#>PpJ}w&IoL`Bl4CzMyTO(F9K2VtTip^xCdD4^lbn$?^BtVuf>dABlZ$ z7G7bhQH=gkype<*1h1deh8*zJ{X1jq$LL?@O}x2$Nk6yug*46M6>2}pT=e7UBwMu` z&i~F(n@?A1jAbrHwp63mP20T0A<*(ZlDmgRwI4&L&v&aRZ`v5;JmQ-^;|&r z=O>0YuW0|KQYYNA~%GyYLO-v-D^u0Z{f!8N;e13V{OGTwkn_xTshU?UGsJ1yVL3Z@W zH1`HlMAY0-qARx9Vf>We>R9oW^?9c3VzW1=5TtF*{Kw^rdaMM&@<-5{kDH9QJ-JL( z<*Y@|t+SY{&k29jv2g@+y_)+enYvfBIgFBhg*{cOFcoYbl`g&RxBTMovyA@L56NFA zZ|Rc1W7|6_YDuzM-72Se%{mJgvrViQwWhlD)>1&%Gf^r3r{hQCGrxHY=12zib~mV1 zgy9vFq%jiovHn$`8(@{T-yF6c^1?yapCA$8<3B5nfk%;?Ayw7~%g=WZ6@QjdG)8Zkld{c7Bdm(y`-@w&;9y%V6;u}N3c7^!)%cZja8H(v8J;>Nw>}M z2D=C_Wzu|>;={7O!eFAh=85YprF2TW(y}xUO_ufY)BOTWK0*mFfOe|n-@nHe6BGMl z+a;u0%VybPcHn{hu^4Mio`9dwQQ$Xuk@@zwLjOMZP?3+Rh=V;t>(y4i2AW2uwx<`8 zdDkq=^UKdLY*luO2Cp1Vl#zc5_ZV5kjHC=DG|!EyF8zISI3^KDkz7&?Tm1PoM2%f~ zJ_jsB+3(C@I6;}#RQgd$v7Q=g97JEu(~25SL+8Xt84{Z1y4?i>?d5LPR!qMCv0Dx_0A>z z67=33@Ej9#uDxpMdubT0#JCS+_2hAs@(dlOfIVMl&phWK?zxUX;C|V(ugEjq05yQU z->bdP1+b0Nr7uEJmZ8VdLALLw(<$fm+IT`)FoOjts`u>M9%4I}ZuB!X7Qgg;ylI>| zG-u>N7_(FtFr!pg`2cS*_v+_RbY8=ckO3fSn(8U%{jcq_kO^pm!=qQAUw>*b)PIeG zbJ{8c5iGMen|7^#h{5PuauLL1Gb4=D0`SO5a5YLXhaUIuMA*;WN1VpoCxc8Hzr_8c zzZa*{Tv)x!o=P`u^|(^V{N8o{Vxkl$Z=bLU~^xo3$s z2(_>_TA9IDQZS@f26fZmCM#P*!9%@haDX+v_qp>**9{qTgD-ZQC-FIbpB^v(TKlJz zHdqGo^Bwf6YrFUhG??`0n5Ua{b<7LC9Ra22Cerl z`vWg%3p9bq)b`{^=xGR)JA2WSiZP7wmDl&MpNs31S9R@lq=e06IM7IxC4- zQf_}ElPCR9QbK+kZd%FayUSfmeetkw*gWB(PtdUQRBh<3mvMU21qc^gr%15+ytb#}(FqozehVX7c=uboKJ7%23zX6&VOaj- zRW}GZpgC>SXHGPJ;$N%o5Ryd_(T&^naoTfs%J85Y72o@u-V{YE;%>%^;8YG9hrMLW zud|)dp?PNhmyA(XPCw_w3=5F-U~Y3jS+3)$PgOiSLgOkN&R1QTpVG3;SS6d&aG28g zs+-GN_6K8c{Eoq?5G7~tkE)3fq%uESAn7?923Pgh7KA+erA&h4@@mj0T@$y@K9{dl zSWHe1gA7;5A_GrhC#4+?iGjYW>iazkj{stO4TF|E=htCPi!@d~Y6R zn{JNkcLg3Ez!PVfPprRZb5ysI_jFCR^?lvL2C^f|x;z-G*pR(E*Cq5~2(t(} zrn+Ozx-|c`MCAMR@T=?bX43ZQTi4yuoOaO-HXo;uSk%l7z->kF@PUJDfi5KE=W(#K zh8Zual2O+A!*{4K*F|J4WqC~*n_zLe0Gs8pK9g8R?Hm=QprR73Hwh$y@*iGHXK`0R z$nv;CR=l{Uw`_9XMS?rs9v+;ZX@R&$wO0DZa@JOEw=2GEh-OK6WBK%EUv`Zv!D=qE z=-%4f;yL%b!SFMpylG4n%e&Q%)&baa3b+ zEceCbVa`{Hg`M;2+0tKo??q`eNGDr9a0(1fqICbR7~^yn$)VcCJTRxz85)o`k+SH~{)-!_G23_pbJyHtc%S82 zywy9)8Y?&I? z+LYy38WioH23b}V*=bqU=a~4#M%LC&We7@X_`1=4+}n3_Ri2MAQdpHwJNUtD9i^b% z)HMeMxy ztJCclK2hZm6SsvX+l}4LiW!HgEjz}{9SZKuugFOZ;Jc~PB;qv>n+D+-ZM*Yps^edR zM8|2@3EC~2Pu_jbs-`RYx0ySVId?^DJObr!o>3inxb?t7#iIQA(9p|YxksdZFHN;} za?&);2o!JNYiFyq&2j97#X%n0r_@!wIx)xvJ@VpZnJjIMMc*IwXa7jnqX$03T zN@^&KWJ|U3;J`&y8r`W~5R~Y53afVxk`=ye&6*K8qqyG)J~W%#^92hIro~FPwrne3 zf5trV+Q`2e&Hr+FprvqF*UPCCvG%_x^QKL;WWgZV4CB?!iS$rR@XARA>1m zR++GoP>PM$jh4Uq>>aaRle2ezFjTrZBUSpQfd5h`GV2~Y3-h|()|qVu(!}YwT(g-Zx}0q@4xFP~hbsWBLtL`)RVcs#l7tpl|HlKLZ zEVk9_=m)ww2PWUEhe3IN7X4ppZsgx5+|?N658@C#wSj3%RrjkP zM}Gui*=7G`_DCMj7ZO!g=(#6w(0ZzTzuTL&y2N6;G4cSTUmh5o1`U>NpN+I`P8Tb& ztGuS_{pH&`jcS8TvynX2J^;HVa!tC&3pPBpU%X=RAuK1{V?n=-plUuw7r|?ebA6aV zb4)B*RTaI&S-F6Vz)@m7ynZ5jH(mDXq1f7MerX7IhUju47IN7-)6RK|=&k{VZhkjD@B4Y)?^?g} z7qb?_+?+XQ$8}wM@6>il@&J<;vL3-CQxqA6TmNg{fN>gfUaAk-Jg*w+mOp2jwkh{t z^!Uto?S6GEKM62Y-Q%+yUW(1-1NV-m>g?XKm))$sQfa#U(A@sN-UyhY@p6sl@ik1( zVI%fXmEC6qKVy&VhtrZUQ&~gAXNF*}-CX|!BQK79H&*kl*l=xON8Wb>1t~a(0nLYO z!bdq>zCr))+x<^2;(dDf=g~!l7oTzFls5sHGL-6e{pIAFwC>C~PdX~ED+^?Yqrz~j zjXRZa8w*v5lnD_V4OJf6XSp_$i!iZTNPXOZa5_@ymF$42xD|7T!nm zhqb`$KM>mq&A))jz1xj>`oS=^_36TjNpJ28=NtLB zQ!NaXT33e$nQUOE_O%ze6jxMi&Eh-Zj^>dZXHPH_=PtV&@h+l$ztB=!y$2`}5fPCw zilC65h_Q(Yo_`KP4}bjk?@F7VB0Kku$J4~xXrtMNayhFFtNoh&R{moL%=mQ>^vbijPP-$h?9Ov^{lTqzJ&Tb-<+1c)F$A63bI^ zQ5(jkqpD~{__g<}$)2q#T=^m+uQHH<*RcB*;%;!i#jJYuuCD<(^8I50E5g*={7aM1 znaZ~Qe;x=vKLD9`?N`M=58^zf6zx@ZZ1_^*(M$s}nzZY_@SZG60|Z_ZRyngx$4_o| zyO;xar4ByTwD_cPX;xaSNqGA#%@itFr!U*vaB}ELXqXn(V?fm(US!l)2MK+@1`xoQ z+E1Sz0#OMUaEE}^^ZXAambbKg8;yA5GOhkAa34S`7Z^-S~xRa?~ zxve|3F#4pb(l0>ltHll^N>{%!bTkUTPeGB98D#RqT+N%>)%i79pWyP9;*{vSz97W( z3W{d82xpd#>3_Dvay7WD8=v+s?nFTKO z1*O~9o=WejM%|eDMpw&lu$Mi2)7#$#w4?T8TMMIwfkeB7+sTI zE>_VQSTonbt*iv0a8yM+r~7pCMR|BSGJ7EI9zNILt(ENiN z%`*d%(8*hsJ)>%l3->W#ApOcu?Aq|kQT)Ay017hBLWiBcCtLg8A*-&bl-c3OeM|G{ zJiTk5xy(wLnSTZZC`PS)om5kMXn>P9qzug}WzH#I$l#xslhpE!T&?{&sZM_e>WeWZ z>P-avMC4UcN(yNLo6!&elM79l^h$m89hcQF1|3JZd<^aa8Ip@M45ixIsVbvK$w3PL zhk0536q`s}E+E{I6{jh2*6}Vv?wC;oHNVau>C2n=!g(b&95UpE?0J2={(`Myy~58v zq;cT$uyh^dAeL)LLrc?I14*w-;rPaa+*(OU#CL?W3#tY>aLIh6|80;P<#A1!gu zo-c#>{W3d2-^ZSRl>@E&LdQsFLh1`iAjCB}shhu!zSzSdX8jXgLe(s?xrdCIMt?x5 z%p5^CTvavbXXEddLjDxL`JZte`fq_$O7s-2QmVs^^Kk>4d}YU=tn$?%=Uv_1GuBM8 zRJQr;)nSLm*oH*IUfBhI0rVgZq>yP!8gbYI%@3Y)V*V#sTqVHXWR{-L_3{pBhOZhD z8R_v{rZjiN<(U<{S;mr`vi}L;dv60*7)CjUns=z{nife7K?`yw3zhBK}M4kCjekeO)|HO}CzbTCP;N(rX{OgTu9coo3&Qr0!Mk%mDG(YLNoX zE`*&<%FA7nX14=sJ~cz-#D&2&9m0w;`Vj%2{7y#}J%V|b@5 zO;h~1y^DWZc{ko3cR@TTK&OZqUHs)}c0 z+*@|nq$UuGGF1Hs1Y=kmO2_W5vd+&FBb{Hp@;$*LC*=8Q`xSBIS&Zi7MMj7?ohqJ! z6uEpZwtKk0PCjDpj~z&zqNx{Z5KtX%ttTnGMV6h#@??aU6klM|Km@skE!+a892 zX9kWYL&e9i;fgjja=1^>X}O!l^V57?aR$)#4-aSWtF=zLv!A*`TD0&%-@EaxO-)V5r>B-0n3-EQ;~}GS zcy}W!-I+c5m+jDMs~h!(5Awf_!DzuAU?%x(8}ro37*fvhw|e9AoYRskx-ViX6qF6@ zH9UEBQ?<_>{=?s$o6j*L;U~v=8kb%`_SMf{{q?=W{ zQ5uYd4S=(`;~5H_OIAIMW@@*Nv?n^CJ15+gFv4gN2ov9wQpbC7x)wqO`Xqv%Edt;`7RmK#EFtFd;HT}#36ldvd zXqB)nhgQ{I{u2$Qlk3)oMh!9Py~&|Vk+w|ACPc3O$}A6^_)tegZs>D3TDV^Q;#@GS z1kvFAnT_E5i(DKF(X@FI4S`;yIKogX4EnmLUaF z8yy5KX5dB8zFFhNDmI{O8)d_my`jLBq>#0p*4uGZ|>-r@RNd=9Ozo(|Y&Ph^?{)&6Ip>k5Aq8FT5##`EOI!pvbm zKw6rkJXJ*uD{^8cW2)3!JIB>ylaEBL1m^6N2RxH){(#;&3iTI0QHh)#0re9l60SHs zhm@2#$8Ny@Nj-L0O{7>wid@*kMICWG&~9H0J7q)s(Yd+dl~g>TkkfO={$E5;q}EDd zbzw#-4QpY09d;N)(_{)X3~_wJLx|m%`WbC2%M^ksjC2-ysjHsuhJNw?Xl6IU8>>EJ z5R1Bf8VJU)NPv$HQQ-RcKHUhOVBTSGUmogVw~BYm56A`#uX-^p?j2yr|E4;=3mc zdD#1aZk9DHr^P7nTiu7qZFRBKrYTq*2t&)(T-A)~LE^;TG&@$rL^-UPo}H5PigTS8 zYu4<|r{r%UgH!>!48){*#>@Eyi zB0PlrqcHjmGyp9Qq=w%NW(*r4sPVVt>2|@$V4JhkpQ4!Utxhxe3mK$LArjKcht1y! zCAqh$Sum9_=XBuzb1f`+&476~mWyqedFBT?;0^Hmk!J&jwO^(a-&h_PQ|05xkO&@M zrA_>%=Jc=7jsRvEoilgI*?-aQy0Si=fZ&IZZLI?6Zp!h+!u2}e5wY?u`W(hdCnBeY ze`w#nHqtwcp&Z-M&`PXmQt(7Vlwobojstuap8zr6pKp3&Q14pb&d&z4@Tst$=3F1> zHFWr^As>1sDJi)-4GE5o9ZBTqmmc<}rlun#vHhYxh9y(pFhCv;RZgL za3}J`tq)T^ZVdRXpWjU~j-V0x+_((6C*N?y&&}lX_6I4EF0;%sdeLXX_^x^y5mki`2|cK-sg{pzyB-{8&InIpJXQ{^c{dY zbU4fq1amPy{$Jtsm?`WY*7$$cMGozKpw#n~dbQn#m>7t~te5jK=P-gyjB7uS5#2NC zArbT;@bZjF`lH$eUziVM*vHD?QRY|}Tp$-Gso*O0DtAKH_NI6>Hc&B?UhyVfIzfmr$F~!{b9ZW5hF>a3b+pTBT+*uei*~w%836Y$XCvTKv z^@QP!fVaeJz?}^nh1?Uq0v`~~bM*%PPR!#Ez&{AAH{u?edJQAG+h2W$#+_BDwqz}! zePAw2$+lvzVW-BwkFI(s(67w?T|1%uw$VbQhOX!%O*IMPCq(ZhTu7QB^KrW9CuHVa z+cDzR6(mC_q{$DgxwBo7A^X`O;*h?W-06GXVF!4V5%FWJl&`_tbDS8G0qXXH#GUm~ z%FYPCx*BENI^%_)ddwW1qLnEF4}}IGLiZ0@`=>Oc7&MZ1xXZIfUHzR;8iDyfLzpoH z{)?_D)%eTI2!4Y&U)RNm&pY5vtHMNCyvc7PTg1ldTV7EO6>kWJjIWt1DY-FT7hi1Pcr+5z|0^WHzHy~5wgp^s29x|%(i zg?0!-0zwIGhOYAlq+hNOQxBpAek+^5BSxde*tPN?O3KSL_<_M00L&1pGqyK?r06Z}W3lvs&2puRE$+eErYeg|hYQqg|3B&HYI%UO3)h;o3)O(ea19 zZkNn1Pn2t7i6Q&FF=XFhWmWyEs^)j9Ii@JEU3k6W>TZQielCU5uG!wa(e#JHf<$^e z4rBGJw(U@&kz|cJuk{6cI_n%f>i05rTA{GvDP0-Kktfk55;K%yxUO*gCcy2C>S=Fm z*Wb&rUhw{7DOmY6t3SrrS8sHj`I;JKm*^Kpf}tH81w?+KynzKofu{m}Hl%A$8@~

ExhX0?;k1o`}id^)Iz8-^Cqv0csM76P&)uj8~}4&zm$~J+u4u=SmlT9D73WdVi$RwTkR2*$+^e&gu)Yk)iWXRR~kA*4LC%^e1w}% z2~p=#K~Ii%*OBlxgK!4r$Su1i%$fD!`n1>3F)e&$YVx)ky!dQtAC!GLy^NDu<-?_^ zL& znVZwzhH>DNy-GlelKQ#Tw?D@-`Tuim04|qxZzp>ggMxylAXYeZbaVuQs>9w~T7M|Y zQrywm5!2J(aICxt-rp?c0KeyDRypiFh5+h~EKk){T?REIuMzptPMynm{1olP#19vf z7g!g?XkI9v9RKTQ)ZTm-e`ud$5o1OnCprCgBI9WiIwLFqr#SaRK zEXXjt|1bZp)i)nX{%BD+(Q)h={CI@bj4fnI0Xsx?znMJqss>q6;-)Q+IA z;-4q>N(KPZhuU;Zl<*!iZK9tj`RB0T9$4T1Vhs>R0w@q(^KmX)g-JU`Gf*(0}PL71K++$awMc6ljMk^3S94z z@So%(^ZeXK@nC&k<7tE#o^RGK0DY^;`Jz%^Tap#4%wt7&@`lqUM()ero`ax}P#nDZ zq{PvAC6cewa*#AEJUpM{@4OR%7c6>E`}+T8xXJGU42ae941vXaC&~E$>!7p-2VX?n z7{T_j#*o((!O!t~*xjH{)!$3r_G26>me`Hty1Kvnq5LAi)lPY$tH#gA7ble1PxS`T z3BA^Z?);-~!IH|O?AdIidWBNug z*?9Z12K2_lnRC5EL{1+}5v-YKs#x~ZP*rjHvWqaTC%NfrZePWx#d?G~;f>DkEXm+Q zVYNq@khHvP6w9eQ`mV>zytc25UGhvmIegZg-}UWnW8V(9*|+OBT9-{N|28at4-ol9 zE`mSIKd(l(0V!^d^OJ{=;nd8f?z;6$;GcEouB=rkP*7w40yBglJ+w`;T8KClzw{~OWZl+f__vVG;wao%`$gz) zLufZaD@qB^3V97cqPzg6c%F{e*?WhS#-}n?v#r8`w@`PVvAqtQjZ?3*uz1xZv>(>8 zAZO)BSfgQK8R#?Z&~OV&NgsF3V+i-rv!56$;SsLRV+N&lDk`jqR{^bYu=`VwVKvS1 z0oUCDtAId#$&BiX7-BWN4vZHQ07k8vwS7YON@t!TZ_@yMh!k&P`*P>2*rAfMSWkZd zjRv|g1wZB{)mN zK7L5J?z=f(EOii{80mBrna>dwU4B#dRT$#qe^}K^`|%Yd-8tjCe%tcxXV*2vtfn^x zuQP%tJ|cFFLeGM5k~OIF^b6nHC6V!wzRkpi-mKerGweCHUzzY_F-KjEhwz5Y&Ega% z2?N^1r6m)UOwqwcucLEd+AvNlF!pjFUdym|OjRtheQB|Nr?kIaNj&8q=2+~O2Kk}B z5+=D&00zI&B4LC-nrcPoPx&S4M!vMeRg7rP)7D(ecpfKSI3;*MU{xC5gFe9fd{z1y zCQXC-i#5mJzx)t2vf2u7PS`v24jU`9Vi+yt|4vHKGZ8Cb?g-y~g8PHF1b|g}e<|yi zw+kusuK{=lCShuK-(Jwvgqct~=$+AS?yrK-N30K#S8?FxKT~IaGBrZeZv}KRLm3)O zg;v{j=4GT0GtivLLaz{6dB4T$D(?rrZ&b%@ETo(^8(#$4gaLkVHkat~-j;JxLJoPp zd0o;2IJ z=rDz+jmztazQP^tS-6CbO(;S`Rx2P&!$7$3L&6(MJF)NP9;UwL?@?|DoZrXxmy?t=_Kb|~B-;ESi3a38U?|R- z;TRMpy+?80&+G=GrH1l1+EY3{tYyTFp6tMSKBB%ykEh_mGS_jty{`U{=;dY}v^#Zn zq1nBYQ4NtDOsyFakBVKI^LiVYjN?&NkZL>DQN{34zLSj6*0h?9JJ9FRbf((J?7WF{ z33Ij+yKii-06AH{$xQXwLTPay73n z2&1c7${`9|0BkX!l|aUcq7J!wf$=Q`5Fg4VG}QlgkAGM)Cbr0~aWL z>32M|!$G(-f7uSjaXMpW@^ZA*{1c(PZi73EN`74C&8}4=Q1ogA4D80j!Qo}=ox_rtRTaeQBb z;8*i!q8a{|TfM48wm(>&#OTr_R~1LT9Z&E@Y(_0J4k>`6!taR%IS7wtd2)yy%Zi}` zf5{V=txl7>FoTCH!Jxu`cX^ne9RBN5I^akOJ-flah}CVhbyAjfPwLuyOFBE5bP~^kAR$|s zWLu5iRs0ER5}^LZIf2zcK}+j$dkVZUWO24PSF2wTJ2BVbp{A|Pzf~vk3?yanV4zCc zy~MpQl+L6-i~=dOY##dsumRPY)HMR1iUfrN!63Ua)9PZ%$!RDPY#=0D)AJ+tOGCm` z;g`)0juj%u?0K2zmvt(>Bz8|2A~`2(y)@rRb=9}nba~*20LZ!zsLRR*Zlo5N)0k|G z>&?Ww(ndg4gPJX^Ze{qk^obR4=906P`)#Du^zB2r&erSc6^-&Ag!$z9`;1O}$W>agC7B=3 zGyeY6keQVeS{wxg7@fU+(S6SpY_zhPx%M~kma1ICfVSN)r{i}<3vtDlCt3}g1!bxwk11Z*TGQxONf-qIFqA&-r`kxD zdVpk5p+BW94u9+7!<41F%9IVNMtCvBwJZ8W4KZRn`uOVI8|5tutxtne z?X)K~+n_Q){=cO-K*pH;n#2s(ZBUo;<}0}UlEinZ+Qm;p?gpB&r&yq(JB zVl5G3-it4a3{_PbBAzv%oKL*;$DV}tLDh9dUKE5p zo^tvd&|NFRJ4>c|GWsOfdngn*>t6Ve7o&YwY4ihbPI{S)={~hh)w>mucpe09MM+B0 zGZKY!aB|`YbP|U~;`Vz|MK%l0nXEs5gm&Lq05V-%q+tU*3>+7|l_9XY3=sf^r9SZxu&?c?> zB28tAcZRCb0{S_s#tr+zsZ>wgh z;R9#Z(Q)y8DJUmLS#wIpQI8S|oG!LCxg@Kse!KATpun_M)7I%hJB}(y$Qmz3-`38~ z>!1zuqF2?Qb1q9M(vxhXTJ1Vgzo*7~yl|82kh^jaE?EN320a~?22ere=jh*2fNidO z`PG*nQXe}77q=3nIe&~9X04lOCIVzho6YL+4pjxh^A#N#C>Wmxk2{Lo0j}l`Z_M^A zwdNG%i<_nM#)(1VUaKlbJQ%&+d$k>UJU1QWuke6-9OM2{W%%sXr9C#5qYF4gz&)Vt zf>!rf|Jd^I-SzMVU<>%>OjdPpYfOyCPZvSM0TP_6;Jj)>R!1fUyB8ww0bIF?jc?cp z$ed^kvjA=4YGZYF4=h%oIm4l0lH>NlwaLTr<)IkNA-W2Br&hu&(PV3EAb|LZ-vPLs z90L2t>0Hoz5*t4;QFrgRYPDTe+&?CbRk%p2Y$zFpa{o5j;jd_l&V z*P6eF1z1fl3^!QUm#MR&0MW#DfBJbJ{Q~wh74{$d;=IB49bwLyV?(SPw!T@Sq&7dE zu_5vh(c7OKBHYADyH6%;LuvF__(Q z5ZyFs00WH6ZoFDM!Q6wkZtxVmZu&;Mqo8|vPH26glQ9VuVrfDQVK-|x{v;s$s9h3e zAjJbOXhqP{s3mRMF#rc$djIE-gY@Um=bcXXzYgeU$Xw3&@%KNA=->@bJQc;kefXCb zM;erVl&^gQ#uZz7%Oz6+QmYDe$$8E3a{g45bc`X-Sr2{4g)j5u^lc~fn7p)wR13r< ze*N})p3CPB>(dk863K8U4;0Fx6-6%>JhK;pQl`^X^ndJ)iK}}(i!UU0vp=OAwdDQ> z!c)Tg4>vR<`}wMbc7N*yyXtOWTT@cL&rA1*mIhBCmXf>N9V*5s94G`>W@rO=12JmT zW~4|nl=h@&d5l2rcyO-acO*=23B?0ClE<^#NG)@A?nX5OdVF$eh%j*(H4WoZPOP ze6O2P`=dM-cvZWQ6u%fY1f4Ajjh|8$vv#Hb=q2cXZoM_nl}^P#ks4d-Bipe!U{}}Ms{0g?FK2Lp_0&OBZ z0Xx9WS{4qn`%3`1Y?Vfp>H&^!o=ne%IS+g&RJ-^}UDf$&b+YUQVEnzf{sWr}$R>4X z1g*Rppb_g9u6~hYj7MyY-933k;bn&JRu^ZCvhF1O>zW}Dq4ZH33%po<;&1&e%L-2H zeQPri*goLhPsN_Udo$oR*E^fa%+9JKoQv!^X43XIzQ_2I1%T@}Be&he{E=knj4DQ( z<$P?tm@TiVET-ZxL%c@Z+j?s!PZizn#;y2dUc^SosWb@WXVwh>3@?awJmSMYl0aF8 zO>dBDYUAD;2N`4mXl}2j0j+E*0{o6l@%*M zp{fE#{@LesQ?{sLgCZLyg=_4m@5ZYx$$95n~V|Y0Ej#5kDCE$Voed{m}@BeW8&#siK`(IBZLv2at%yKRk0w z0Q#4v_sPN5r?DzugEcUp!(O8`2>5tD(M*DNb|*}Nd=lcI6BkS09MA$V00IB^Mium{ zuS(G&|BRFu%sJHAb_)r$Qm6H?#$qURDxq~Q<^SY>nm=rX@aQ6_d$kkpP19VmqI8yL zN*0(+uNi$A=?Bot$){iadp49h@m$UL{mx_0+LhT6x7zz-u0Okzc)@?t8(~#`Hb?yN z#<+L_slt)R$@EJpy9NN6tUnRDU~-?x*AJif%bH*QhmCegNRoBOy)q!A@mctMG1Fq4 zF&|Ar_9X_uk#vd1$SZDrE?2o_V@*-kkq>rwoRY?(12S)Y9F`(g=X!br?yO858+qqm z0imT*1EA=Vl^!I~C6l!_Bg?a?Ho?9~gKp2dGtKnH$x|2J!V0 zpH3YiD7#@Mg=;bFogFbZd?DYWC5L;W9eUpM^f}M_jQR?G(8LUa5L5tciM6r`UJO`T zr{c35c=>JuwqLzmY4c3pTnU(2X^!E8-1UeCR01(r>!BNq2kjk~9>&Cw(9X#j9vN(9 zuz3!byvD=Silwb*mRJ=u!R#Mn5(D}}^8yynC$9(U3OhR2vfqKEU{kn*+zn~5h7x|4JE1Oan2PY09UtUkJ+WLfzElloHqamFs zJZo~-4;)WF7|ko;iXq8T8!7KqvlCD-=;$7yZUba04a1=(;}4^D-PWatH~>OhABFW| zENlx~T#D5=5v2;6zQrCx(oKFYux@u3;bqDf^dRXoa&^0IIE-%|~dj@G!ytF*Ujm81<5GYdml%CMX#0JvPObmLl7QO zA^8-LV8$_Rx-C+ead(^dmjNNoAV!fN&+(e|nSg~bGh?>U1@DY{RE+=Fma%DO8gRE* zVEezIVeU#}lBV)#R?)QOXE(Uzr*fvtHJvcCL+sOG-6au0F=yp~nI1tuLUd_gx<))B9i5XT zwLL@FQ@cU3!yg{fBS8CCz$o7?xiZsxJwzzr^B=R`iwX%4qG|DCTW1c46gbCEVqiCA zSk5inc+oCb@>t2<-1~DfcidE~$-wO-|MWQy`Q^b{n(uigAa2SNVh2uS!P-JZB7I*v z5G3YGik>mj!SYzkxbiy`CrrLR|WL?=x4F9+*wIz4&sY__YnD-yqMV)0i@!^AS+LHoe?Q{DR7S z{+c*nWgti`kswlLYjbz8#s7pEVB**bUjg)Kl%Fb#j`Zs8J7({?cS(-dkB+J_*@F$c zxr1AUfm)CzFM8r$+Jm||Y;R#xRM=%d1Jo~`K<_T*B4BxAS+xXkxyC6paY~pXThGSI z9;F8dNWY@yMBE1@#ZF}3;oi@L8WG1jbIg$QcEqkrLiZ#;+Ld5%@|AudN@)+H-9rE_ zD`Cr@wf;@W{@5y^+M9HXOKXvL7xb;9PT06)BGp)7DpcZj<)x+n9nq1(w8g$ItS zN+_rU%)oVIY7sc_m_2UpznFcoH*ED!eVAI8@agl4y)%>M%QN=bZ~+%{8M==Tuu#BL z-r#xYXG(+J9&yur6&KqpK7s2{YL%PgtSxN$f6^K$+OoqL?8~~qufB)%Vk;AYyoO@8 zWb^zJ!;3vH+bfn$2j_7MN zOM{0MW@8j1&%?EhyDY8g@*b@BuAq?Lb?K_ytittO7Fsy3()pCZ#`kgK3s#L?!0WH7 z8Zrm&+uTx|-JU+VB! zR|yUf{ikHCm-*<0ja4f9L6*sZY$M zHMry9bf)}vyV8xGA|)vm+lD|+M|z!KmEG|58JVlqoa&Voh=TO@#(*2(7J;>@pEyZ- z;56_PIXzh?P@78UW^lb0%}RX`F7|V48t!?0A-0;|;xD$a<5W@VCd!ANxv>{)w20iJ zxxo4>L7;UUAZQ@=TKe2!IEPjd$L`Cn^HOMxq$931)cgSJg%AvTDpNi}Xc z2Z!9QTy3RB>yKte#^Rt?b3b}@U7X*o6Sbz6?QXf4 zl|8^+IK3UK_sxGMsV&JDlbL0J=5p=h#P4lAL@oxn1{qYyxCqu;1Y^J>6j;kwU3+jc z+OO)^3P8S2G+oNDnv;PNs+W2yK)>(dKKp9Hc81A?BGn!5eESvdX`B)%-)CkT7$8n{ zo_SsBLC_(&0yW+4Rx13P9`@8RmdP78+{U%rFMyM}tc)0@ZkcedcWZ=ak%G~?qDtqv zIcdacyNU8UHe0*dG#4}C23>gZ&xAl%U@A#~N6xVS;WEmxYu>-ALaAqgs=6AcwMu?A zv!5enw3Ys6=eQub+CLk>yJ$HEHW%>WXX3=Zk7Y1wjVoJdOSugnkT)O)L>{i;iW*uSfQkF0V{`-^+1ZxE_CjyNZwZ%lF2%UH5)PEyO#swEtLvMo}7xVr;@D`(K;*>bm$5o^;l^^7fC zs%_?(Tam%*BE99u5W#v#Z?ZH+Fi2&TN>J5gg^no z+;b3xvx%Bbp{9^C=<5^RYL>6_HitJiF>tP+$<3 zv3$P%%^N2BeHZ*;E=fgR_Ho{N{kdkeV3CayTUJho6gcw@==x{k_qQEQm5IEuYSv-S zL6O(m4Nj&d_Fd|Pw@t=i9&|A!<08hNC8J>k46si!E=<`BlUHM-f+2L!w27*9_4AeT z#m#r`4K9|t%`J?r;gt2K$5@rEiN*9o!}+)pk6wMjH64%C#rITS)jawQUE4KEm4|(} z%egfh<>{TO9CUzLxI?@OPKmYa29=vwlPC0f9Y*XNUa3T9E&v)|MCXRh#g(F@_pDJx z6pq+8p0=;J5)mx6lX0H&x)C)y@(UQMiOmnT-adHeCvU8gevbHY#Xs@1J9=^Y1_RTv z_6tqRMa(>2D5IcVW&6yU<)qYA!>Eb@B=q|B&^DdN+z!5HIr(Sb=+~{SF{CaQ`a4WC z)G%#=J67`j_n%-zJBB>QHtmF;W7B|ywOv}n`x!b%pJHlwPK|dI1=wG^(`xhj;K|Y( zS(dM$PQMumoD@h(*RiktR1Y7|S;;So2Uc!0TNk_w)g5$gvr5k26J|khNYB1ny51)< z`Qp}Mb>4gk?RGGht~Da!^v23W-kYI>)a?0A+f(p7fVmRpUmR>r^Xv%zlVgqb7u-_d?yv+az36?|546b7gLJz4O zp7s>H^*&I$Tu!_@iqPcUv;R`xGml?6WMUIAh z2eScx4bAIpKJ2WCsIbauG7b4l~+#h?4 zr=RuDVU)nhiAB4uL5I|eIX>_x<;VFroFNvMsb7->FJ))nh%g^Y$><1RT+mT$jae26T*St6<~(N>))ylaU6#Kt>`+7z z$G+jj0@>qS%UgmkVCIq2%^v0Lmd0{M664oJ7LT{mORA)%L7B*U4xj6 z{UoDJbqaGs(x3{(DnhxD0#ZAFglnaIJI;*0#UVgJ?>@jPzqo#GIXRS@(!b>i%PB($ z%PR#zb8WJI6cIvUM(SFRITbkhQ3-gF20&pHueWbIo(n<_GB)6XE^@80@ z;o+UX^Y$N12gc>XO9#%$hMeM!R7LM6t}Srfl~vI0zJi7O`a6a}i$ zk;d)Co@;*j2XIrJ7kG-mI<(21%)qAq^W(Y7L9d^+l4dRE4llbHYTRJeJ7!zg=b6|E z=uiVqLZokm3bp5S5VpI`1_cLM^j+PzAs$QKPLR^84$o{#&*#HJ0>7Ftm&W~@+DW*c z`^p=ioWD<}At4*zyIB;F9yVB5c3KPA0?r8c9clA)yJFb0=*Td@eYD3WyAN0j5y?K@ z;+bBGPjTm(=Gl4=BkGzYN-=#xDvKL67x7_MW(gOTQq6DMYxCwuC5Z88e8j#m?AH*i z*lm_AfUc-8+nxWCwg}-iXfn}XNUE#m;d0yd3jEcj&xRN<6(8dysRum)l>b|+f#Fys0;)_NvKs0JUS71#nE6x|8&TBNjKzc)~ zCHv5CIwsyp89Fs$@a}I>yPbX*e1NcTt_)eklh$i5Od<;_eO%q@@XJb7%0-A<6LoE^ z8TCqCK2huo8OXv_!5Xx7crsE{@Rhi=?g)!`Nb#x9fPw(Q$AHFT>O0RZX?u_FU_~Ti zw%$@C^4ZCN7#ry0drX_^aDxEWFWm}sF&?D$^$?6^!?r?g%wl)sO26PV&QCdQs-7^+;KIM?3}f3U$3 zF`Ux>rC|+wufdqdl>N*_EG1lW2mK7PUYO81BCe*AV_C8!cxb@u+dIVcr?|IB-SW@R zE(ZpCutv=M^gdIk->@Ja)rf_-JB= zUY6xJ>ke7JP!G#0+&_!UWejGd>s{(TpZtOyF{Y_acHL}aqr4vg0{z#CaWTm+x(zqU z_Nsw|HC#FNDf!zN)|F^pi!a62ja{6}vB|1>%L>a%j<{4Nz{b*bRQyQZqJrjb=!_CM zg{s4E_Fk!c7YH6Njo!MeIyfC-#*7(bf|CpS8?3+87=cewoo4)mu0hJ?T;E>wDe=a= z7)hAXqDxQFDYd!KSFtP<^O}9vp<(9%F>Z1+YC8Tz)PB5#neN&=NqM@tC5ra;$jHce z!XxZ+w@Ny1B)reRk1Bwy`#UI8Dx++MZ#&wM#7#ff=DU%~0KSYQjo3^`x6@ zq|MW^yfXZ!Ti5tb&w`TTYPd5KkaJIq?gS;z+{T^^x?$=G<2Zp#Ks8tMEsJhal#}+I z@32Dq9ru)-2mU zQ`$cIdOp(oj;4Ft$v70RW{_}Ams%(6|D)Hz$sOle2zkW^-M{&$!!P*1~xtX$Fk?Yn%oCn+aC(Lf!t_;GL+IXUWcdLn>ufCn^ z)*|4fY2B}H%}bjaO3A4((TW$*oV8}}-^U>ey)$f9+<7x2!p)HuJBDkyq&RX|melDy zp0aoshCw`N%%OIOUY7uxJmNWSw6HkrAg#v4nh-ckUhs5J-P!vy>o{#~MqLq$p^Y5VdV@!M@`NX@ zvFK)hzR2DqulvD$m~?TJI;lrH9lb~(WC&feX8Q!~>fjPZCYIXi@2sCy!6W{2*-%+; zcVU!v5793$j*whRh?6(#N_e3yyt~vg>1LpE&E0%dW~-YpSnk8!_;IucR5q<2JYAs6 zZVPFqvAOtUQxN0GKfR*qP9W*F4vVQ)fo8RErB1Kr5^!{tkB#h-)kJN^wzTi#ecM*g z9CcNJ+-(RC>N(o?WEC*Y9eJv4J+&pj8w*=(O&f9J+Pv%kTF*(e(9myJrcc_Vp6C4V z63V02SroZC<&7l*{nQL9wIX@>Yc|o@ zfWef)1*yMA00|3cMR=*Pl=2Qfm^hs8h6+GyLm#sy}XSv3I2;S z{qt809?|Z#WeKy@pHQ2%?vs{JE#^|UjJN8kNh=@ApIYNvv6d_<^b5K4-Yx9vw8zpH zJJ4P=*fO@5(H6n6RzzX5`%*kdyD&AhahW1A2s5dAjcU0L0?qpn@65nF%LRaczo+i;n!ItF>K zpHSl^yev_@1AjT8JoYvC(!vad5S&konV>r^PQd54kk6hlyloEo9My!i!S=i0T z6f~h840gl+5VCY>&w`=^I}N7tCKNBf8%DJtfyl8wah)4a6gvg*)(*PxJ!oqsqB=G1 zU@H=|`hYwf54vTU=NoUU4bs7AiF*Bvjh6@cs}8q=-Qkt3?2hR1-Vh@O(Fk^19_ zu;cFkasUpC6A|US4af7vq?X+!`tesQ@DN2QkzT`LcD#hT5E-gK+L_b2oUZ+v1*nYL zQsP_3@-N+G*yurY>Mj?mGgb~YtcRP<3uGTVilj6ehKHN=#ugiuYH%t>-B06%9_sBi z>*MZrfB?hF&DN*RgX>_X#Y_X5QovV=(de5}50;in2maKVovBUqjO{Zn1QKQQxxOZ7 z@yFTCx+avQ{3ouBeGRLvmo~&-)+RIDeweKeNR6M|2P@V_P{@v?R^7>uED~D6O1>%R zvB23_`oy(CkEmE^FQo=46ByU_sJ%z0XCF;$7yIsf1ZAyth8zM%W`E56!j)XG*37b< z{gW)rc;MsTN!)IzM(u!WjLKbYM8I9BZI%08MKI-kIG-$v2S0PAoy&f1G^=iV6#PXcyTWm z^C|&5{neuWDW$%lj#i_Zj*TCBGOc)7@Xy|aUG3Vj4($tPbyT^A9r@cOjLY1as^Aac z1>^*qcMI=qgnphJVuATMR{2iRu`Y7Kona`Q$Yw=w#J{e_yp=N#78C5Y`9`B%^)n(R zg9Vc}lrPYLz_72Ch{yT=$dmzza2S!V&2wy$=lks*Q%6(>gPPHRlHQ%{Av&T2)DhPB4j!ynNk{Wo4nD8&3a4CkPtMR zxUw}lDQ4zAN^zduHUDXkVCC%kxfW@8Vl07zq?%3 zjop!kTor=X!cdUE`^e}i0|yiW-Ax6CxI@dQjYsZpCMmo``AsPR1jq545$YrCz+Xd( zIp8pQag|^96Kj^uw}8Z(>2jo}XRf9BmWxRi=3vv90a)AUV=S_A&~=;z0`K;PRmJL@ zUcp(L^GKSB-rf#l0q9cSyUJSTtAVRgT~vU@LZh=%W^YwHovYm{s=BV!+FYRXeRc2N zv3;HmMB~MwGB3{EwG91`C9-D~g`lk77P;1sulv^VI{IjWfw^>Brx z@u*is9%d8d-LHJ9x7~@zejpb=F!dW?vG15!o6;k9X+0$px?dlez#-$N(eM zg7WwWN6B8REv5F3r?D+{AziSCuF<|l-N|d=S9Zw{p29LiUQG#1+np;MdYnvUqo6~k zM~|txABbCi$;UVy2`W`3Qd+3yS*NO)D6=#lzQXFgKVuaRdjMSyJ&=&-1KCBQ2A-vf z<$AwMifz9-rt5eYJF+77Q5VN$ozG>(g@yg404hF^V!T zk(^0;;A{__cw10jFu9`b6Ag3bWYav>w@#qBn??|e%A^a8Myh6mAKRr{xVQU@|3X`T zUqr)C0j6uA$`u%MR!~k_AgH?tg)7>gv>@7KO(JFetXOi zYY5`ljD6XMCFFnR-sZ|n{L~%Vf6z&Aav{aDf~dF6;qYUJ=+SDUuy+&K=HBl8=-u^@ zyUdt*hY?DN8lB?=kUP-|Q(H{>k?@k+Pnx_}|8fBqT^g^lRw6W|4SupGYPjn5eIGDL zE=z1*(&gE)GtSl?#mn-7a5dv&MHHY^Tji-d~H%Fgh_p6vWyIX=9hDrSZ6{Wye9 zDB~=#^UHOBfN;4sA}3{Lk7&3t2PPz&d1E_+c|+@D&yx($9m{3!lm=`};=7+k{rm=(cRnQHYXNTzr{FVw>n-!O z6CXEj(ki`7jI+ZXr3}mWFm}f=c|o=rB7+4?fB2OxF7-Q-ja^}vU80cxodKr=49fG5 ze%eX#-O_2evYf}waYn8S|2*}i-{B4P z$n&${$>lE5u>S_-)K{$wNy_6waq-L@ACPQUX^lAOP|98Gqbyg|yPBfC*Pd3{l1}=t zhsFWx+hbArbl3^QKJnAy&W30*L}(v6vr6%#62{i5eV4;9yjhD;hWa4Nj+~Wx{iRqr zTrk4=m_%q#rV67CHwIl-(DyC)8<)u3@v(s!IZebvqV;NytFI6aQb>l`ZURGi83&1K z-qB{pqXkhO65kv}YCD8K%ZWc0chkm$^owpqT8+uv4x>&hXGGMiHf{I4Jog~xa&gN4 ztcy!)OU0SWlRIEm2K{qiNM;h%0*fLRFdNEh#l761+g+5#bO2bKZ~dj;CN;COi+zKr zUP{LqdthVHCqjH3CRy@06!o0?2$$vOu()+o%utCwE7{&t*}tn%5W?)?T=5S!kRg1> zuEwmYWNW!{ao%>$os5dGKv&iS`cX)&xR5AZ*8OAB{Pl89zR*I*@Lbgzof+f`^sfx@ z1SpU`{M{{m*wCW`d5;yu(U)z)Nn=x=2~5op`OK#_`sMRwx5l0xSix7|ah_DWUbC{? zvdUoo8;ydvL1Ro6eICokWMnppN%r4Nq;2`%uQz!ZIJt|N+0@XObqMfpeEkoO=MNTW zO3NsNM2mwk+S|}1Jyk#qWoe104_Cj}Gkd1`oT>Fn-WSxl{~R!SR>bGg8Aeg~{>_(q z8nfzG;QCkmm7-q|%M>Gn^2ff5EeJ+ZLD#G~ofFHS?y#qFCLV1oiwQ^zXe1}s<5jt3 zZoKGC8KlIamU)zooq;8EX~{o!r)$&L=4nEHWYdh(yWCYq*@Sq56jJaOt&Obpn1AZq^AqwioOsl!Oz~=`$EqPJnEq)%Xr2)Cm>O~Syu?4Nq-Wr83}9N0 zrB|MO3g_9+Qn;FX0Bb4~7JIwqRk%Ew;~u#Os7V3M8)+CRK>w9IEUTZK^o~2Ynd))kugI?MA3rG~$T_~CC z3(f0~7qhglb*0jdo%-%f`b(9g$FcBM0;R$ijvqe(y$d&JPn!V|E6dyd* zPQzIg7Ed2I%^gg`6aolSFfEK63I{n`0!K#HR3Wz*Z$VB!>3^FNSRMj)jocDq@AQSl z@+B;S`M2TY@i$v8F@Tz-ah2g=2Q-HXy?$2WPwiSNb-_ZgiINmAKlCyFYZO_4HUq2k zE$=Y$4~PbH*Gk|njee*U!SP#7kuMW2tBY3Li2&n0v&0Ul#SUuNuT2@AV?dLfu=tI3 z;APgIsx9n3#bILESe)6IX$LocO$W1pOn+OS718@#zKHrUSl=nPQJNohoExDTCo8k3 zr!@EIu|0YIM)@u5@MG>MF0lj2lS=D5S0&RYhta-JURisx% zN>s&KvI90G$l<2l0htI22)g0q6PzLKnA8s=Fn7t;ZaQkeTnSvF^ zoxqTiaDBT`4PYGF*$cLl*{)I0k`{&=%f^(lf7_#znoHf3!2PI`&e zNr@!>m~^L=)zX!=a8|>3z^`iKAQH)_hRq{~_{0=R_QJ0!c9vdi5y9foSSlJe+@CiD zFh*4I6py^Cj!Rxm$ft`#OL2B#?_7SowDn@jiYGK=_j{09)>wYURks#wsl}ha&V4x7 zkzx8u+M-yo8~m$!tH99uWHXZxS^OVw`-s%zGYi-l<`6{p@pgxQ?; z3x!my;55Z?)kAk}Id|m~zSN4K$uV-5iH0m9n<+kQEDY0#(ra|OaTgW&Q>pZ>Kdpw( zTc5S{%^ze+_HvYA8#=$7$tJCLt4|rQ9zq&{*1j7!@)xr5d^>AgAEaZL5_(XmsPYw7 zr-4e)$|1{G^!x~6zY9c1DK9ivZZlWSTlp6xp<5JHP|06x^=s%)a3bs{DO&DZk1JP7%SBl1T$p! ztGa2F@&|4^{PY3Iac3V@H%%p~G~tK^F=-GUxTb_gfXLVP$L?F&*>J2Fvmy13WMbj! z1l6OwzH9dcABe^`kfmov+3wJW5o?Gn>*uZjxf_c1j?K~mpa-8mi7E@=jDjv~9!Qc; zD2d1sYu1oKjhZxrEU!<68J#69GAkuw)azB`)iplXVSd2zxv%qmU_X`VRkn74!KrK# zs@RJsvwto8@TRq58dTJSow~AKm{(c#o($AMUkY77{#1r7t>T+oVxuc#v5Lvjy;ExK z-?cF2VC--05B-~E>Ap%1>1nTz%RQ9k0n4C9jhj~-KgkxI2gs?DLLo!X$ zk@A@awH*F>6EfKdP#9ovzEgac(L+s z%GPh{scZ=`I=tD{4(rDj;s@v1(uDEY?6vKs4(nEYOJ75f!xwP+=UrKI z*(+_TAHnO?h|fi*{?4zd$s-Y2rG8flb;!5~s`<_QMVIac85EEtfaq!0l)``L3uvVD zmEl7Eqee$T*>CaXuh(NSD{6CHwD#@6|1vWWJSm9!&@M*jd-47NHgsIi&hbkT7^QLz zx&95dkhHP}ejp9f5RN7fIc8PWoUKZpl9C>(1^XeOfYuC1%rr`E;hW1#PQQ&=spw`qD#uTZx&rhLWzWQzT`x{KTh06&ShoKzyHbu@bo{K zq!iEsw+AaFby}Jdjg=l(1>g)E6ykJ*tMZZS^6D^!nJo@-o9!yGivcA{o5E5Trr*BR zvP5g;cS9*lOa4|>lPoAluxU}W^c6pO1&B_#K7fovhA(#uA~Cc;!LnApb;}{sTtDtC zY03KEcoWH5Y>lN~z2`CR-HjYp3ns#wu~xm^;{-&2>EC9ZSdk%=>TRciId_2@cP>Xa z#6zN~8|2f5zrb-8Z8X&EivL1qR00j^8IZ(BV!-M}95XPq)a1Z*wd9b*?L>FA@+8GR zJKIlA@sCJli|&XDgVF_6BBcm+IhEw)6%?@KV=1P3lrb=rNKY)MaZ3KOj!3dd5(62NW*foj8(w=35GA@DKnW`Hfw?P388@zQyS5WSr={>G|o}27G1j zrYJ79<+0G^6QJjPF_mn-FO}jd+^5$wa|Xkr%ib(m(Bu{wn%WpGepQ*G?X3;)N(;A< zgr$n97n&9o(WjiBM`p{XQ&!tlr%Q~JZv~hV+z68flYu40jE)QlnECq3Fj|B}%4XXf zSgH!9g;PDVJqsd@Q5xc@c|CC5MPb+OrCP zP3ig>Ex;{~oT6msmydVkqi#bP0zTsX=vOv;ZG5-8IVVMM2(F7|_Iepm?KF*yN5Vi) z0t)|TnbG9v-#4^MTrQ%lzlI*o@OiI#J|3F8&oubVlxE4OUs5o*(KgO9?&Jr$YKz>* zS~=IS%G6}FrI*GXIE9+z-hM^@Jj;I6TKx(F87%`3HV-L71Pw2_FrI}mx8dbOB-y2` z3`GLM7lB&}HB7xhUJPR$!LCCBz2=I23Og)e@xk8|wB#{+$yVS#8HnGfn?o8_ygh!^Y*pL2AwwXQ@0mDs65db)rK@dY$_qfq zuld8Bl;bzH|w6UKUffL}Y3!A5zz2~6RUjUG{Fxyxx* zca&iTrS=q{e{enYD6n2Xom6y?ezL7E#%LQLUWG$~^i@su}us0;*);F0UdGPL)bODvAc!o8VBBPY$R{69Nt}6+4Rhv8` zt!Eh2zBl$I4HMOF3`Qy4qkk^?32+=r@7~%y zEI8ctu)IROXxWnt)!zE*JgI0a@JTfK{I5hyTJPxO`Ic$SE5KP{5)19Q(}3k1X$$BX zJtRNLZjTIwv(2T=7@)fFrP{u~z%rR5e$Vwl)+YRp1S6W$K0^jd^REzJv7q&^A@O=# zTJk$RHhDUOr9rmd$Y&$s2$?xM6r+dy;*%cBo&8cod_&T*o1q!0quN^sZjU!Rh+I;P z^tc`Aw+NZO!ye7ze>4demVuIdXMC?wV@qb+V=^fP>7;rGAE2w7#n}kD7)}oXhZ+YY z4iI+5Qv(XAk2}8>E?ADd`*o!r*nR43D~;@t>HP-gzp_8t(k@^4S`?aSsk^#;usUfl zw3aj6V&~|6bgkK6lo)R1!qNiBTcxuRTQ+O0ZdSHFcE%hjuvaA@qcIoS!mMy>Me$kV z_{q~B!CP^(i-qr)X&IkWO$kU3PvPAW{HQ`3IerY5h@isvT;UtStuv1d90Pu9P;`;DFqEo2~qg{6I1t%g920;*jbO6U|+iIjAC9W^!%6;*!6Z z55oI0%_x4(#>FiiQV>8&uaYvQ}Xat{D_IU0gMdP$)Vch>DM;hA4$Kdyi$}}W}rT+Jkdy2 zjcPw1Q>s;&!lM>ZDoN(xY!2Ly^@p8hMYu7qdoy3LUu0=5^ z4QZ@HMlHU|M6k&QG;EO*ftgy7F}N`_U*rf`!2u~~H7)*!Bl7UVs{Ae{MHYFvwwLab zp*?VzTq5}y-7^qULgx#1|3*+;V6o~){TBYc8N1|yjrje!04bX;^p|XkKYRw+^a;0# zz$4=TzEo7+kM5$+LIxOo?bl5I7pla=0oti^fNo@rN0NIZXG+($Ofrxc6AEck1uW=3 zMq^eoawlN#6}5V;;tfNu#tu~G#}5g+q%Aa(X97H|3ft@|QBQyH4r?}86pc!CdfB`s zxB7AjUJ*&icXC*@Q>n%2AD^L#;N4ud7MCcnL2e3t=(Mzk<cEf_;v^h4?fu{S~q6@XFT-r9k%lXHik1*VVkn)DJDVk)5gZE_5DSlb=X zX?;i#7y~gWFQNSzuN%+IG+4ZrYD(~UV(>^y^#~l>X`!Ga;AfTXuW2T*@IwrWq zknB9zWVsYA7IK#^kFxUukgeGwV*=m6VC`dpW#I~HQbQGsGRM;ICjIkA1}uwmXLso5|Wn9jP{|y#uhoeKDSH$zf|{kM;aE@5F+Zr^I44HQQZ1 zOKlP0W{logJjO3e8=Lbiu1}a~K2HQQxZ$k7a9;xJA{LyrD~0rkjx@5DzSTnklpN`ONmAx(JAB}%@9(dS*w5tsJU4h zfEJRB_$D&cE^8XO!^x62D_5rpF6a|p6R;ge4Nn6bR}XMD&;h~G8aual+8+Bk%2(wk zS{`&s9Ay`j%1WecHD4#Y+)9{&7v;ai5wJc$BDJbD=a%?8a#2OTs;m%ko1~<~Kh87) z%3GRu;TSXw-41#1HJ`uO6gkvw(Bp8?!7tPV_dUk89(#3LnLV3gi-xG^0y85SJ`LZK zB@&CvxEehua&S%y?t}B5pKJm369#8 zf}cjA7$ReNAdQs+6}o&eoGD#=N~n1{e<^{&IL;Hx(tUQMmFgH?do}L5-D9pSA3N4< z841!pfgINu&K!Nzv=b#74dYv=ec}8uWIh5wRWigBm^IVphDA$-&D<&fHK#pE{}zot zW((@fRmTAhQ|uZGg7!Wd+m4IiuAR8L-snP43a(_2bt-IRR%wHgY10h}P2Hkq+V6dp z`q5!mHLmfao!i*gL*E*(p8UTml9S2KoqG_i|C__5rWh&4sN7-O#${`uo%a`e`)Y7j zPg=tn+LWIU+$e<{4D9~7bTt1BfGgsup*Ff~L$*?r+^K?^(N0!vyoIIylo0Z{V_{$<8aKY7bVGj8 ze+BY$A8a^EVRhoB2HAfs;CJHU)u%Qyap3Lxr`lkc)PU&p)SZb2A|LY4q57U3&H3ca zSs;fX^;&P+g+A%jW_HYLF=4fbMSfaho>CJ6>7A^P0ViaT-&A9}2RUeRmBrO!vyZd< zCLu{F35N7pNm0IvX#oF- zhJTLgp2eT#2N)HgxkW$JN0-2>VD`_+)g!joO0XeC-KX_5kC(wv(A!9P0Q!!`EMZAW zJ};(;!y>P|k_dS^5FBYNi*G4Ug+I)`-M0i?SyK1!;7puf@dE4yk^~92>g#sb67IrZO#Uq3k&WkpkR5`jZ#5Pq+ z8Gt@FZRS=8iQCx(pbg+O#y78Yru!2j;@TIEXALG9c`W)!5EtzMW-)A`p94~S0WLmlu2d^4-XZHu z>Sbzt)bOp$XgWzpphOy|8dpoPLDQzbQeuvC`W6GoA6KLh;r1v|A2sdK@ zDMu_34;3^h<5|8eP57@7+Jy1c9D&_MBZjsIP2QdZ5w(J>?*})>XFkcQyB4%byA9iW-$8zuQ%ap=wl}Y^* zYo{W;!zCwjrKWrZUZy5X32D}Wv!ppcwrfe)F91!3y$P`8rzGlSZ6~lIR4OQMe5syM zmiSy3#n~Sfay7kzLHiwMY>IErUQ8L&F1#;c_2gI zY6^?fXQ+EJqIG-PqD^}m zVmesl!3C&we;wUnN*s6&I`f&SYZ4jwK-zp--a|X#lM;$pv9uotnm1%JgBS!JdHePx zXhOPTlQfo2s6fT&BAu3qK-ENX>9wO`Oj+hNJHpi+f=^sX38UUN7QBdrf%`U5>%1@F}AOcX*B$FJ$0ncowh9 z$MPDpMPtat`+;ry^|pURckT+%yB)gFTVf&59R+c=*0`fu-Mm}5MXDI7JRK_6K6D=% zYz4!v-t({A4wMX4@^_bOx3~^*M}lG3gc+L-;K7Yvw9JtfK351fyzat1xh<7Gd&t&L zCAfe1Mo;?)#AhUY{^bIU>iyZ>`s{PEbZmN^$h6cO{ZnDNm&%^r*|r>l4|eVD_0v5) zon5S0y$$lH6&s)OrkAtwh$r!GPT+v_Djyli&jQ{GGx+v|O1VM|$}CF{-+R^WFdMC> zUIA<)xKL9z=2K8COi=6OP6F3y28oPN}rFq>| zn+=%>Iicp~t95T@hZuytO)>^7r{%1rgLT31FTrox=?*-bSOf0=)V~2!dCo$$Ac#WR z*AVaH+|_DX>`u8tXoF1@W=%DCJwZPh7np;&^yMDk3o2mK-CnG0 z%c2#Ot~Mj4Z*w0rEN*igw1#SYa-sXxQF?|09N2R)-S#|t={@b~FJYj>LmypnBW0L!_Zlv2H^Lt`SZ~U^L(Fgz zRgLUzPKce`VF?9r9-4vR`iG)`_Y2-2s_E=9x?hQxQsTq2Jh2kwW}O9zXXh_3bzO+f zuLRq=xvZvg_);z1(v@r)emRa)m|^bQz!DiDMxe!+dU#qka%WpLtnR+5$ggjj0zonv zM83tUZuG2MP+QrJjhpZS$5-%`d(i&lP5|ShqWD+aLMKOj(ZSns>AsQhyYn|ZAeUZ| zA%TMr#{S&sX7YYrDf|-Cx0MXQ1|b)Kaz$NT=oTL1CTSi3<*Znvb0jpL!5? z5=IBzccJwkL6k2`gUmiAKAgYA$R9mdGn7M<6v7bm(aLhci}?;O=1o7Zpe1rQH{2_a zVKuD(?}k}F{{?Ue40_7HRwbG>-b`OLFxwJe<6BpI#_anwO>t_uUVX!+8U|~qsjfY` z3V1YtCHs6$8jYqad^NsmY;A8mc+9(7ARwkU1*o(W8~jSp`TdoDH5~T}jW+!;N!^j( z^SCe6Uv#iqay4n+nInWnEre+IdYJZVbN;wd0G_LG^W zum@iOXVV3GVG#9B^I}2V@U)GGS&EcV;c~%$NW4NnU8A2zzG;2W=8}?M)nE*dlAxh+ zR+Dj3lkpG+)o%OM$}chO;?|Cm$Qq+TXtbF8P6z$yj?L}Q%<OY|B=XDjPyR=^Y&~=Qw@bKCY!Bx!Qt1&#f0X6sWOR&v0}t- zU&@-Vh}$;a2)&M)J?PyyxhB!!)jKkO=a)MvU!>=E@9 zD#^dUA(VI#sXuvUCEd2}-qy{@fMJ|(->RPj*8i{Qgv6rZ{)sqqM3Rj`#Y zBwBZ|fixaAQRNX4V;k>t(%cjNCWQa@fL$x&KV+5Xq)(Jl0{Y@_s?r0u#TUFV`D&jQ zfROl#nfl98)m|b^o=1qj?wa?R>waWP_uW@GVLMI#j&)2dAO!t08tpls0DS&D5`(c= zT=#Q;5X*w_|M2ggYt||OnCAnXuSgwph!?`5nT3HROn@1>he0w~$#kJGsEp2Mt~nQ^ zvV@tF6I{FAMs*MR*H{1*d+~n>PRJJ>hK1?YK=#6iOhGY9e$oXT7kMlE>EcgG;%)B_ zq%;K8NTO~3l9#~Yvi}2L_@m_#)jmJn|7SZ`c8Z*_EeB6qM;`YvIJj;7q=)Tbq@VMo z0fE!mKUfnxm6xW28}a+uLDx$p?fE-W-Z6>Xg_pHi@)(mV<~>-nZ1bI)C8o0gY$?h&9U2{5>OuodUKaN` z=0i^l;wHoa$QpyMSK8UA_1JJeTOsPF7>1h^3pvdPl4SG>iV=E4fQopvg^-$A zu_C^Ny0C#m7Q&9b0h{rpChPf)*X)Y`nYUM9v)-#%&YzdDz}n(@J?Dir!F1CB(5>YN z4cdG;gg^4)N$lWJ5wkChx^Up=CymEitV;eWJ?HZ4fKNqq#ZTjJ*;;sB z$%de$SP=D0dq&f0pr8x$>a%f73Mz2!UqG2+IH< zh5CPUI=aqcZ6I?v#0U+GtBlQKM7WOX7v`p6ij_Pln$(8TuFjHh~% zFdfUj!sq99&vWb({rs7O|D?gIk2|O!mzwFah~gf^A_+vO$RQZ6{tNaC!wV2(W0`i@ zXI4;{Yt6D*FCOP_Ycw7;7T~Ja?Nu)4A<64&Q7hfy!ks%qRjmXhyzRp)jwAk+PHks0X`I6!fl!7 z(Agw>v`bSpoZ4ac^a!(X(PR*lh!JqDU5Iysx&N#XTupO?*G zAN9Mv33;a)MTJIyW|ggV*Zl6L`R!%$K?c+D!W*21%epU}mKW{Ti4f36xN7Pg3;q0* zqmVLtD=xo<$$HTUs+>aJ19}7znCja;7X-fNI%GqW~njO74iH>y~{kKAlws z#6o-%WiB))J9}H-CSy`hbg|vVFib$ImdZuR&Z&=l#sLP!@_sz`!D290-2d|JO2bfU zWu`}P?Y`%4rBt968lcsQK|J`sBVqO?Lh3;_Sn!J>3x5HRx003TZW~}7v6{~BSrZ|X zI4i}l9@-xf{Cp)#Fc)o05d25iPNO}U_ytKPN!0=UQg61H18P=!mvD{0ac1T|M=9IHuXGEN) z^0ZLqaQXDSZ?}R};CR?Fjwvk-aOQ}XEXcBYSSq{ryR!is&ZO#`|NfIc`a`Sc?%CO1 zt$|f=YKMfA#qQ1@YgHQd#VXX}h~_*R#OfLrrr?Pm^Jcy3uT_deY&6N|ja!(!Tkt6@ zGvfG3d&ibu$rSH<5LM3JG%VN_X}pDGLJ~vhi=2P-x-bKYkmT1YT|t1FwI2&pD#D^^ zkDgl-ID>&bz11ER@}o%d%xR7flAF)!$lzR)?dA;!8ykBfCR4;V3UD-pohgS2hn(ds=ZF6ToCQqV}%EF2$ zs5jbX{Z$1TQvDzCt-&mv9=jUy9v5ijk67^eJ~+{vuvnPmVFcbiQ7cR3E_gXzHCI+s zN3b-sCI>{4OPv1zJ8!qbpZ+o#lk^G7^C5UBo)Su?e)kv?p<>6z9(X7b5pAEm#xd)yVM!UWEqt;5`@Yo(*^6?j{TnP!pzF*7bTOT3QjM>x#}Kx#aL=< zCnWk_AkG)%!0ATx2ajzO$Fk4>M~Ud9hLA%P z2_M&xJZJ&BQ!f4-(38Mum90ky_wmfk?%KdsG^|1*V&PNLnpVlymO6uu+$dtx45UG!S`&4H~n3j_LKK{O0RQ==&hwkp$E zSn9Om z2_lO%@wZl5^NA=x&kmv0l>({xm|DxCZAaO8HEV$@>e{CObFUmMOgSMTn1O+T(_cZn zee>ijEDF#BbQZy)0<^9HKEM*wVX25nEM~gk8N^DrXJO?Je@^=zJ`{&fd)`bv)7&u~ z{!0mKizwkA<|t-qJY}v+y?JpPz}lNIEbpAth#{(rbF>8LC*z~&7EeiAne~<7>-tx4 z^-8nx!co0K3TU5H`>SvZ+9K*x$vyz=Cev@5!Y+z2M5ffmW&{iMX{Gm$=8}HldR3}I z!G;oHcB$(0DH6IE4@C9xGqTb*ULP^yDfb-fZzpgfqJeJ?$Ij#`We@*g!xgjAU;Iiq z-aNCNP1hE9__&a`o0edA4UbAiPQ%_2k!8bG%zUWE)44`ZKBpeRO6u@X~#4Y&CjlPAsR~S%+WJiT!Xk zbL%iiQ=C_F@P@&4ekHwAT`0M9PzL@JV*BiJON!xR>N|JENgAsx%$}w|%L9jlQPFOZ zkC36Ut$2|y7=3L(r=gdB!hTg!97lgb44qKCY1vkDJ3N+l-1CA13j6 zdzwzZ{H-iB%5phbPW4LvatihWyL42mzwCni^(ThtdZn^-Et^3juU>HuQJ}HXx9Aae z{oD`rJRxwldLv#u5w-LXv@aN@z}>-mdaRF;C9*c#9q_l_Dkd&?lXAzymplfW8?1xx z{DNcftVH`e+#gr#$7Dwt2NzsqEg5>{v*Y#Xrvj4`B@Tmaq1NbBGaGSwBblXkiEzqW zXuy{cHMKn~On*m2HKJ3KhM3Y=r!Hw)#PQHr*aYqiV$Z=(ugwlDY}aQl5T4#5V(4jc zDq~p;Pktv2Hn-tQ5(%1{Fmv;>wXGKU7P7VT4Nl;_{&ZJXxnbPbq2$;L>|l8!%G7OqgTk41?-ETqt9v95G{b z$Vpzd&k^}k%>9siA`)HTeNEm}>>G~KCZUGZO68HradPJH8!z?OcTyYMAZ2zHzY^Qs z=9Z0ZW0$iz44T!Rnv%po{o-FixP?Da)f%v;C#KmhL$qD=!-|)V$F>eFBb1MDrk%&J z`{B;yW$8i|=QWN{OLGWH8VV@|d6pK2--w&m_0uSXmVb7vrs5%<_VF$5HvgKV_Ok_r zg}s|m>ELPbe7%&0Du?UVkLE}ScetvV2F_X3r_ICS71Nq_Q}B=S-9eQrqB^~sN=eb0 zt-D?=*_%u#5%lr0(A?nas7eK<1trJF*~8-9Pk)uq4nr9bU>F~>FWvt9f%O>~CCzbj zacyZC>vc7c4nn?9UDR$&xvVDIxaN9usJvE8S*_R{!#1xSg}&qZXa4IV_T4$lUdT~j zCD$!mj`LZfKp~bo>;l1S`j4liNvoP&bnkJZaG`Bp$VQ5Qgiya~MH3 z@|w_0t+O@G8Iep$@39~B+PHce#_!1$7nD;mMsc0uBR*$IGIrxn->s9HR%d#m84?MwQ;DhF!+TGW~HsjJuK>TCd5-PGp?2LWUrJazpaVy@)Vw2 z=PRZkN;bVqtl%!cO(262{szHENdzOVmhNR7^O}+z-5Nn%l5Qsfplfm2QcFsI{gUtR zPrt?_SFcMDxFD(Jf@8s8aS_1@2;Yo0fX^-J zf%?NoqqxAnVIw&)?xu#wu}f~g$hswyq=HY;y9`D8&`WFuyAO=0lqC%cYR!rD#~`m; zu~MMvaYsi=A}+T$h*Cu+j2>FU^D2o9h2MjTGumR=5tA8*YQDKc7CkMz_mes}7u-fG zZ>KSj^|glee)~z*{+*cV!PogOPR_U+#YG{K<&Bx#&6;fH41@Y~S*hvTSdoURHhQF+ zySWBiRLEU%7TO9n3y}|e9yUX4@nr`ZqPjMPKg#E$^@8hEtsQxjgwYDWiLrE3?1(W_ z#DB&>{=*IOovAh~>cXR(k+ML~2|JCOY zY4tRZJjU=|)+FH++Wf7E);v~Qg+ne>m^ytVN)t9{W{W7_UVtuswF#Ke8gzX3BqceS ztV)!KV~`E48KI!y+@qa5POpRg!_-SuErb?)F!?;ub+JCeO##2`Lp`q*N@tVAJV!!WfwBByh?kI=@-i@C9%XVSK#&3wqhv9&#i_D{Z$fI7^g%e>DU*wjU5X*GU z&Tq9w4>KLt%C#N3wJawM$EhvR@&XW<`NKv;GwPa`3VL0&^Brp-YE4VrzC1=N=m)ip zl_5lh@-rW09=$kp4i}#XXpKb=M|PvNY)dFfDsr`zzRtHHqOV)+zpP3Em?zPUI1I{Q@Eq2 z5oVgOSZ>kesfmL>g^m$sl`~HYLgYJfy4M17rj4rzCMJiCLNVdC!{iR@dxYH87u*Iq zHU+^Z{tAZe2qT3Dq23H1W{=LtxUNNzi7?N=k*CReO_5OphCUCj-1yB+tlJjc*NHN4 z(Gzjqo~Uq|?%nx#4O(BKBkv+Ks~Zv}{hu$iwZe#p1Fe2^JDpbIb-5=zsE&VO>)kP$ z6|=)-=Z$gD6A&GjNBQ}GnEL9lD4(!v8j+Hc1|>zh8${_8P?2tsZkAp`DFLM$L{jPQ zlJ4&A-ldz}?^*r5@B7Vl`Iqby^UU0H&pGFw!!j@->fx-&^L?SfhMjSsBG>fw#^l7Z zX4kluY(EXYpcakNM5FMSKvq}}Bgjg`EPi}khoZXqP8zE$eOwI1E?+6D(e5CL^*3;G zFN0@tKKRR;qz#D7$=s+d2G>30xuz{F9~PWZ3e)}(I1Mpc|Fqi0avk!ym+eD6eaPUT z^Qow*R;%ZL;KbV|o6gPpPzGes^WZ|^vYPtGaNv@ivRFzeAylF(BM?a{%pdg!u6o@? z)_X=94H`8Vh3|E)dUN~yNnwFVh3E(V+E9jc<3{A(k4Xod6{2Va$q648sQr5*h->)+R+N~BTRIj; z&rk%@y!;lwz0WtKxifpu?wYex&MlZ8m2l(~+7eHMSQ>GQGa4fsG?b|A6$HNSWr@da zu(6nXdQs&?ns?Tt*w9&inb}5HwD$OP@Lip$7|3-t{TMGBdKmd9zszuzF|`ak-8T+k;Br1#PX4w32C`5l zCIBDfZ1#9G!6yuc-H&2z50Y05?VK6kKBzAYBQGuGcMEN}>xe4$_3!_1qcd-Nk3U{h z65go0;E1kEzTyRD@vhYx8`nX1Ez2(nDspSz2x2b~tf?s{_|X^?1;H8=eVRS^-mo0c z`qByXNph*mPDz>Sz=bx~+?z65%p24DRN(FV6}&ZXbl1t~(w9cas_7zKzcj~Iday}3 z%=X4RCx?Ken)%kD?dOd9qztJ^7~Ngw?sCrsw6DLUpFiB+1%x{`28AUGyPUW+y;9ts za+d=>=HG^8A$EV6N zA+I9_otrkqhIBK+)ORzEt763sr5S#uOZxAL+JK0i%>KmSFHnD;wHVEm3K(gfY|t{!FmK72*#btRC~cJ^5~Ax)S>daq&?a7=sL)V`fR@C=sAu*# zZJll9o4)QLbQAvN=j=&6jfZ&jeqJMMl1{`u<0r)dz_bjf%Z4zCr2bY+Lm^bkD@ZL-q`)nKnT}|LY$d>H>}Hp@hnA89rr*T7 z0e{tQpJ7nzoj&kQOX|AUiiM?}vcq~5o;}yAigk7{Ulo2;`E^J*GAWPfSR+GQ+QL&J zorXC8tql9O%AjK4h@fWq&>+kIXaNky$b}_4^+SPdRdynX=$MHvi=B=~^Sn92n5~U( zWR_Y%kBljY4LA`SWg9jJ-#Qm$jbX-L1P26kU>-)j2EtKRY3ay6UtKedx4^;K>+7cj zoIClF4=l8|qaodCk6`Phtz=h1X&Fp^ZgecsyU44ltOJg_1NV*okhX<$(NFp z7iJ}(Aux{_q=Pp`a-Z#@B0&5ObEH}aea>lFu#T}2(FN~SprkY zRAl|(DpvpJOg$|$o2y$9vnTV0+wg9-v2K4|Cg;mH6?52np~p;5i|j-DgeEvy^O@U? zXuEurGl=LobFT&px6s({UFlKN!|iUthoiKdB|A~(%l z>pUYRBYne{g6gA(;Wv3#-+%RE({BjPe5VdMmXWr2IRU~LL~iT|&5Wy^rEWhzJH=-) ztWT0fOoB2bJ!I1g5|LpHf2P86xX2w+vxK3eJT2H-fc{p;Y z1nizGDk>1Mb)DDIoM@YiIwf6&siTuz|S`pdsC z70QqVSn|ZYRZ8RlPO)eIJ4wPe58BU}`(l1!eD_LTQt#~J`B0=M5WF$(7%xF$1x>36 z=ByXw5&}0KH}JIFWrNo@X0)%0eynz^upJOG*$d`qV_j3xd>qtt)1@#D&ID zueezx4vdhRcYtN|UvEhhD*yA6Fmv{?jG;%yNy-bLH)ji**mSzR1D&oaMazyTNuJ`? z=#%>@t9HE+duXzJi!!_Z6Sq#XcD^DjF{l-`a*b(2Kfz_;hm!P)aN!)+$Y8fx6mSvw z+Z3MtGn_HgP==E?z6qr#8n@6Syf$}Vu1$1wS&f_Wfn?z03GWAykaX_j*}0j+_;YkK z?l|;9H6td1qRrs0JR@m{Jn+BE{n+$k{u_GpGC2FDNz+y0+u&zzunTe}l4D03npk6{+iQqPI3^m9+8I^ z;MN1jP0#+9%Xe9QUj&zO^zJw?V55Q2BFr(q{6lStD#xux7(}&MmPTYztC@psaAhK8 zB2=P@)0H-1i|e}=_w43<$9OOSUMh@sP92<%04p-UG*B4_Cj=FTet#sm16hbmQ>#U z0l9-fzC}dC!~q)yIu2R2=HYgPI#^9~rI}N-WJY5##1$MID3|3B_+>f#gii#2Uj-ZZZFJ6R($}@jo5J?n z?{x(<5Zs18?Yk4|_x>p-?Dh%(iY zN3e)-{eTwC(|(M}>W%q_q-E`;q3NMv`;LLgV4%$hhJAOy4&iSb0(OJL1`~1+Oig+4 z*PyGN#S#7i3ID5J@x%Otd;HtoM#l^yPEN(ib3}H-BZFfq!NeI*%_V#L?v`s z)^g9Jjvjp=7sZK)BL+r-DNJwrzUS%)@BRNw^4{oBDXq1^kE_bF-CG%*8iOlN zI52$fo%*$!zb^bFY)d?CfgX0aXjV)iVJ1DGx`%Kv<*j@Z=JIcaqrjF8fM?`(yyZj9 z_u7STC~%|+Nv#|>#PB#|EM);%9D{%2sdCVubLmn*=Qc+t*JGyz>JXqO2Om4Bp@itX zGW7WZ9Ic26jrP9Y`f7-}+Jh;f;BxnHj+p2CMq$Av)5ff~63gk*URCjOF-!MUXe9Et{L08xuob zKP|1#i-4fqk<^4tb~4)$!<@ExEBVd3plmY|bB1cH>Nnnu=(ickeRZe(kUz8K9|Vk3 zRNi&7*9c+z4dLJ}sbs~>(D4k^VMk`sE}kUBl3#!(gy4Qpl1-dcP;`mfI`*h{^H#t# zufh;SVH45m zkn(OrgVFA%x!EXWT>NRY_8_JFIb@iHo_-n@!9&pj7IY(=8KDmA)Lx8f%R)OIkH~s6 ztb*&?zxcyp_1$F431gs=$8MOwevPWca`|jSeq=L0W5;LUXohLIRoeY2 zM~r-B%BZhw&2g3j9cUP;0OE^Mtxlwmp}a>n;IAgBJ}kO&^=ukt^@~l-=|UoS*s@d! z_FIF9D25(CB043Uo_z?y1!NKGi(iQOi6?~W)+hI}`fgRLt2KlwsY>0vErhqeWIfJ* z^>ypdsr-eeMZMr}ikA%!6{)Y4;^W*h8%Lj2E~NyO`#7R;zSDT71;-# z$b5sck3@9xZXeJRf1c4n7Z^6PaTmDm0 z;jYK~%T`aCAtQ}OL?t#aoa_!r^5UB@wtUU=LV*P#4yom^_{ME=qVwAiqzx#Xk%m zwCrJLItGz!NQ3bJs61h}a3k553D2#~Mn$5>k~lO%VL6L6rFI}72pei{OpaI&k6!r! zz}i;7i0#?zfAprDAN<}L&D(vPzl||V^7};z`=41`-xlGRkFL;QYo&{FH`>wnjYRI~ ztlrouJ?XYZi|<}(y-{I^rl9|Tltw~q$yX^V)|8ln@uI{r>g+b%L*$KVBMY1Lk2>ym z$O6gJ!}gC+x8~Qph>lY;4NUe}V(KvcLPP{;B}f#tVV9V zL%rrt&D_J42(Q&7mq*MU(nm5|H=dU?)%g!H3VyHO#3<2s=Otyo=7S$ks>2Rexgqv` zK?fz*m?he`$R!OP>{|Lw36zyDJHl4qQyP4g6Z#t@M+B`)0+Eg3Tm7D{>q zCbEr`*6$^7R|QH8T{%41G+DkG(X6XDBo({L{ubTDiX?Ynzl6`wV@Zwk%q;-nci6|_ zJ;X)Q+72pQ0!_Z2i*iJn&{kKLy@Sb{@MlL*2UVn^>xu<*R#XPAN3@SL3QZD3~*RZA)6)(O+n)d9WlVolXw~Y806sxJ8Cgoj#UQ-*45&p|j_3$<*HrBLx zy3Y}sSN~()xm3*KCGr*Zq)GCMwv>}>V{R-6c`7URC**;vJW|AfO;xP1fAXo0v{_ky zUV-`3d40fwEw6U64u^--e(*Pgsgnc}t-+0>$I6J|-Zp}tMGfdVu++SfULN^5+{#@T zqooQ9C!OW3f2C+W+bI6+eDn-J{TqG--j1FXe;e0GA(3cmv|~MB-Dl5-Za@~#kL&Hk zH_|JE#62ksC^me?IzDb=i0nJF6bHV-K75$~DGVCdK*@HSsIjB2oyG^Xn8SZ~6Os## zLcET`K6p8w^*-*RAvqiML@X-7@+z3yNTi2RW~a(TXZL6Ba?#K7Z^k$?E5*Rr;L|Kn zl;3>e)H|p+rDw(o7OcaCsPYGrP|+Qz72jvHT{)PKOXw-nn8-369iis46Y~Bl0pkyZ z@)*!4s)_fypVe)|3;h#%wPROv#VSMROGeLd`h!JX9bbdk{?0}#WhW8VaAOx-gS4te zb*0OvM9iaqq)S)A@+(Dv4L&;hlm$bWsOs{=k=f>E&+;5#OXccFT!r)o4^+WKi5K~F z0T6?`maF17_Vcj3bk&^W>;6hekgO6Y$t*bI(f$i#j7Pl7PGxn)y>4&cYE2K$?dP)^ zdw<==?0Ju0Tj@N9qN@MsJTi5I%VVd4n8xaXR}66HI-6`buIFs34}qPr5aB;dIz0R} zz$nRiJUbEFvy|Wls@?9$SZ%p)z#DgwBr=$&&9R^baY_#AXFc2{M5mH?{|;pnSjL-b zcY#>z4t6tJKPsjZ8}|tcwA>i)T?AFT#a46h;Jx}_B~hGpurJSib=eDhUOq!zvlvT4 zHTQI}r8vGTckF;He}@A*sxjbY%|B}9pC2t#yhKxHLYHnXmYp9MKV!TR*ozB9<|%rOD+H3Apix|kIyV#D4_G(wNPi*hF6sf~gbHw|?hT+m@&vyrAyA7$o2rk>3wOBrtRp#-$T+B9duw*Uve-N$6W zUan%@^j7y1=}p@P@Xr_+5r@o+$57#}$3-=freu`ZFxT5-v|3n9oQ3&YhEPS%Ut^R<~Yii{s$UM&^=KGeFxq)3RB%L$3 z_#4JIo9wRnaW6i`IkvozOR~Os;3D7OQ;^qIM@DLwUH?u>{$wPY>*@BELde}=$gu~J zl}IObzeZt=9QMg0zi-7Zod?un>3$Ws2k&zYVOM8x;k{j4D%elTXommV81F72ctM zrk={I3kH&OZydHB7QG1Gwx}pJZzF2)1N~TX=E?|O?_MJsAL39tr?)Zcm{HgNXUxF3yr0>=>AdgzK)fSW=85 zebg6gOS|D(h2}auI}TQN*lm4yv+^oj4u$N;k+dLX;x=+nWmY?y6~OM-a&GiBEgEed z2<+>;sm3o(+vUK0*A}eC`P`e^(L_vrvz$-dqd)Wvx8g!wXPSDaqzN}*FK8!9!BI|9q*ywL0jq8Z+dM zNvPEdzN{|T(S{CIvcx3!9722ibL7!Pw};IQrge`HSZSXB#6;L$avN-v;!iX^(8s1= ziA|pa4&H{X3V@N{5!#^CDry%t!Qs0+_%^RFaV*-y)&1kBqf_AYvR(5FWbaWquHdp! zN2mC;fwrL>z^|T)j)z{UN}C0fpIDak4nCP_@dcpf00YdOJ2jx6I*fB-619=r7C0B4 zxcM{@wmq@UN_(%Eo;!6iEuL%UR)rQ*RzDyQl~Apl1=+OZ^3-Nr()^rRTe>B8mSgW3 zGAYj05#TZ`dpHd}lVPp5=02|qaj64%&29s%L3bU@VuHbG3YwQ#i$uwaIk&DO) zqWAfdFunS_VX1i0ZDMx2@^|U1oQw?%dvQQpqo@d(+C=m7@`?70m;R5ZcO(=CE(LUI z84)Xoop1%E9JfmzOw zbaLE*pE`B5LV6XTb-%~$9B#;bHeP#1YUB5(>rCs|8bpL&+mZ>{AYK1}%*La8^WX<) z+>Y0JcCOZF&zlMlcH=rLye_OWJhzjR?j)}2M@~+@fz#sRh+AM6rK|*OJlNEK=_$>r zIq9nE>T>5T#qGglQ_zd-(}%UC(W{>TLii1trEs$A^=e-lXdHY>+^4yRcVHkPzrWsv z_+l}9w|95Kj;l!Z_4OMf4onXv%)l4qp{5cSxk>9G(bD5C*E}i391pf zPgN40Jbo(jt@)MRfY(0$ayNbkER?W~uJWCf6f$s76@IFq!v~vB1kns;gUwHIOwUm* z9~14uvX<0)`9@ckRCpNuH762ZAS1RRh@S993Vdu~93qPo>QFMS~kCb)Rv`t8Bh!IMdL7Y$&G)q4x_y$AaEcv!Af zxh#MiTe5w`?WO}jWZH=~@P0mmKNM}S0r6~skw1Rtuc`j$Pz!_$i?0JIZS=y3ce>d} z;i%tdbD+`#dhm=;JU3LCUU0>ScSPcjjhZ^(eR*lqsUpCdaI{=CLr=C-9ZuKq!AWUp zX(#vy<{=-G8I7q#p?h z$>!!}8St$o;5Q=^qoZ8)3TZU%@%&|;t)wVc#sKDEZKZ|k>n=wih}U+Wj=_OsB_K!d zEVt*3+5;QL*M{7ylq2!ro4m&yj4J;B_5%pR@lAbYb z0S#)X;2C`ZIXZXYn}wBiQC}u2!ZsvX>zCLi_4A00_1|U&RF<&OX|5m6Rla-o4#<54 zD;!oNXnc;P{&w_PCfw&V$a`RJE=|hmOYEzPX&G;A`aCO>6eh&V$1^}a;M}r&svJ%c zZiSO!^MUl+UR^h^Q*Jjat@Yupo|{^`DHK$J5z0vCiTC)(*LOl*tPggI-MncGdXh?Y z69Q)V#naZ-R`0_04p?IUJ<$gQ6GaFCo@mi|fPE1-onp~_!H!L@?z;o{Zeh{)YH87B zM4X7SsxaZ_+gv+@IxF2H&EH#ah}`_}RC@lksJQNnUF#nflWf3AEY?}JiOl2g8peYx zU_aMdwSZ!%U{9)`lFy;YmQpVhuj~^mnLci6f6bB zs;DGcI2WN)nFvu0j`Uajf8zu}O}+j?*p_)SXjykuvw(y+N28#iz-XpKpO~0f*>*Le zLcY3Wj$C!p>#Fw6Wr`Fl>P~FzSXWkpdiOabKizgZqM^tUJEY;qoVlIw(a&V}OYio* zy`1v8=Sevg#!=8(-j4QISj&(V+!%ewoB{!|Cewv z3rBoREK?OEhuJdZM-2Xg4$Fh$SBtzSXvdGzY$~#UJJR#?_R(ILRRo1CMsLN&MoVdD zliS~j36US2yJ9RT1StV9R5JThVQ!7>Ick}-YWM(Zl0pKCsy0_Hi>3{)1ru?i>h((d(pdH+C8YqZcjS4{o0B>of@rIek01S4K)?uHA3&ODLRymi zeEw~YI#M}0BM98~tX@Y7m5tTF0g>$zV*2_5Oz}Tx-5=P?6N0iC{Tmw^cK7$`=;`T^ zD*?6C>n!!p>XeIdK#8rjzA7X?rA!+m*q0r*c7i~5s`B=%56$ZO0~kP;RDDQ4u4jYp~`XlS{_C* z*efd^Q+I&(Nre)cMj(z1?NJYhmPr;Bx&Fpu3(oS|Wq<+~z|HVZ&*XFun_3l2Xta{%}?KX^al|gWcWT(OVhdSGMZUuSXd4S@kFQvf%teccP7NqR~Wd zgO=PwzLN#FSFB(C9}A}ZygKM- z%vDyWpgM1?t@}TZK#z{L{(Qks6ZMWNDH-lS(Q5oB)=7?B*TC`ts?eM=T>w=MAeNE=WJ+SM5&s=+1spxe$u%Mn z;Mom%OZW%vIJ4cyiM_j8ZJsJJqUY;EYkP7KCosBR=W^)vnlsW?{areuowzSEYJf07 z-aU~>Q!e@$OS{>tdg*!SEEB-M)f!&m0m36W#s1mgvm2lD%S+k!NLQDa*KtV;0~s*RiDvO{BZ60S0l#1mW<%c8Pp>f zX+LX9qJm@mey%*K36_AVT~8=E4uTVx2>M=RynJ{;hLNOjH-@Hc)ULbIFH`to9wEW` z+h#kb`2%{2bAp?T4}{9u6YrZ=vmrurj9E(vf?#Nw%rYp3;<84f|3l*j(4j!!uiK1m zLvQSme?fm9lBjfq^QQZUTZi0nx%K>?jiOgYynM1q_a90wP0padoBr3yd11yG z9iUI_EW&E@)KQ(sO$UW(pKgnnjFqugl6lR1d@2#Q>W$byV2y8dl~Z2!xZA#QqEDyU zd51`t99>1*PAXtKHNnDJzi_t*qE{vpEvSUy>F3x+)AwKn%Q+ zYPvi(^FV*GR{#<@^2`ZQ`$Z4la33%Opj-;7^2T^^xesMddlCcOjAG}~B=vh8X|(2V zeGt1cP4tV7quPk~8kOG~J7UpHOKFc%P|MkuNE;;4UjBsxR=ESbE53=xVL(}2YwgT^ zWqc>A9c=APO<&L)h=&15k+ighDE$L{60_LqL5*nK=hIXsS*X-K=L30^jh_Wb$mC=^ z3jE_N8veKnQX`tgQs!~-a@+9c!{6E1=rPd8_B)rg>3L8^9Wy;ZCFGk}p$mQq{<-Fgt~13U(Wv!6t5Ul(eE7vxr^YLX&@h8bJ% zSwuAwib^bpSk>7rw9~;vUMd}af*N)Ih99H5NFE8m zPqzBQo&WW*dED41g!D)|UFB%oxyikU&zRh-s_}*E0=1kN;|70NC<7KyRTSI~N#o%$ zIjV(G+q^_(o6!9;g9f1#k}`y!T;qPMe*S${tRfJQn$GI-zP5I;kxC%o@smaLh1tUutr@zkC<-&-dY>9sG`RKN6NGve&4^JP zGy#fNi+ap*?aLX5d__Qc31n6=H7KT1%SA8RaklD*G$lL0u1PC!v;MUEBL`uRJ1t~X z-Z{xHPt0<19J|3_lo_0;|bPQMwl<>^!XVsgA0ge=l!2SkDi`R8ZgScVZ zNG!U1k(lDmNOd>FoizB$QYWa|mi9rU+f!xQn=Hy@^nnwf;pHDEPfT%Ip3URZMmNLF zMX9qFHh_jHVB$@_)%ZICQ$wJZpkn4nQ|TbFlM)L4c^TahroaolPKk!~wfX!5~dsnb95#Uz|YL-88|x;2*;3r1)3(EK5ezy4^RcYGptj zhf!kO+1Uh)z(K`s^Z3<|z~Z6VFLp^Sbm`z8!foRQhddea-D6GilTug1iMb@)Rf2e6IlNj8zF_Y{b6u3LPljF=6Hei1NAuJQ~XitJ<&ISaM^^sEu4I zvE4ic>^uM=DWQ{FG0}nGRXZ4;H}g|f=xIv1{OF(F+v_aic%)^AYgc)gD>eaaI8Cob z3Y~Bje+X>MH?x#UKC!*_s|UStJ8t6E@9`+H!bzbt(h@46ix`^TNzFE#u^?>}OkO+q zRNDj@D|Msq!j(~1SU(oq*JP(d87krS{jO*x5~@pBw=eN=Xj7|59A@9A(?47xh#J$=a- z2t-zf@bc>iGAm%u*&WA&yfW6fdf_lj-CyLg|7(M-!Cv@lNpr&F*QZ0lbgs&6lB@Iw zm0)ww3j{!f#%hS$@uNT>l|9QKe%aYwfK)m|vo9}@1Fsr~rfrD2`fUw;%z2^h?>wVF z$THimABbbQuRY)8I@=K+)KnOBf; z!Z^BXezOBCvqvve|IkuU+y_uZ@4c{BSY;fbW%iX3-(%g^PP#B;Yuazrb6#q#JWQ`P z^x!Ih)=lRm@eYzRypjrbK%_6!qdNlB zeF9-L*pZBpzo_~hRKu``;O7pN0Z=DV+&9;DAssBD3`%elUn8XXJtzC@CS4VBl;Gx9 zJB>DTNPU!YUJiuM_IiA2uPK%xJ*+OZIHSyaXnb3THh7-!OTB2^rNu&;Y<2!M8C2C{Tesv zk~4VJo;lz5YJWgzyG3EYDc000XHYbZ{^EW&wu;))=~wQMvklASR`5(oF@Vm>eE`r| zyY^12A1Y32_V2IL8WU-^O8^6j&lqcccuJx>3yEVBc1z7s;_7#6eFYk8UiQr_Uc>TY zL3a6hxX!g9Q3D}(2X9G=R;I1%w_hd@eZtqT=1vqB_gtj57j9-ts-t;GDHNFg0@YMH z&@wV)4GK?}vuKv{u95N;{kXj#Pkq2z^#ZZ0k>(v2G!fyb5shH6MB1hW`@`dbBusH! z)KQmr#P=7uau6xhek0dA(|D*=vU9u|`rLf%Iw3RJ3S&5JZC|v-8nNl-VaNS_8L9XL zlO{dmlc{ZVJ{G&8; z88&gP>|ehjx*{3;cAxd5q=~%~KrSuxlnse&Hay2#`yE;TE|LqV%hJ87!qsU6Z3@e! zf=7`%49K!JaLS!EA8IUaENU8)c*rtbA|) zeCukX&I^ay(QMIglx%Sdyv6fKZFj`yph+n2m!z)Gz`@JmV05X8cWZ9>cbXWLeI11<2= ztU9Oj%O3WS-3o@U&HT8o>S6(`;chCg{P4(2mg;`x5IT}Je9ALYP9)JhQ|)h#2jIEJ zCt5DZQz}pVim{j8y*y#1Kzta?DVRbMb^YN*L&|V@|5;`$W&PlOA#*7lB_bw}Af4=_36v{ra^;Cp=>Q zcp}i6_xpVZAQeb?ogLZ>LHRw@J74oWUM2EygzXQPUOV@1mQTynE+YAs*yzEm9=6C+ zQ|LG@pQzAuUI-FT$%>D#@jUvh^D2N}OTRv-B3*`W>Z+b*A87m@$)^E0`1>T~7tMT?af9=Eb*tM&>n+GTiq+!aih$z*p=0I6g zS*USa{7qG+%-y>3ZDa>q;{N(x;yx$?$cVJcYKmy(Qx+DVQ@=y zp}n{0i0_U2^8KDEPMWx=j5;NmOTH?R>RELMI1gCzlk?3th-NN;DTZsnqB z%gjDlKRsit&`gG@ch(yqbfnG5)C|2kAy1ghF7^R{{F#&M`R=9*jTTU#Qx}!F3-xmM z-i(%8*Yq1*JWut&;pKg2_Y9n4FoxLS^U!UK!$aUheZG&JEO<{+QIn_*+jc!skTZV;7L)tK@6m z;Z_xB!TOvCr;fFBu<7nxrM~jTre}=Lmb`cHu^bti9p02xeEe0b)THm?CYu%@Vt7;` zuTixs&EH7z=Xn_*Hqe7)|B#yAI2XNJ8J`}Q@b~uAEUY>YE@TXm6Y}-&2z2m9hc4)N#Jpp#5 zIWJQOpC6!oWk{)q(fyU%{wl8MRsIiSQWo#gqe}E8fv2uuz*!oz%OjDEQreKVQ&+k{ z>yq-?C%#Fg{i=l%BWar;@Fn(b!>}=h>~V(5A}>j6w>)?6&D~3Rh1|+ZW1r?`r*L=c z91fk{t}p0%8t3+nZxGvXpha8B|I=QVe{q^4UEKs58`Sw54^Ju%3h^l8tYGVX_tBqyhQ*zYEap|l3`o40CPE!Y67wgM@v#+>*dV<)!0oSssVsz!b*Q; za9l|3%9e+f=ZSpQ2_pAkB7)n1=BYLQi0N-{S-P~2V1vYDpa+_F7o(@q%pM!%GapZ; z7PMg`qyPof9Vg4>9yKZ4PdR z#~T>kfFsu};0OSvaaKb{NU&Yw)j4IK5Ql)X)>_dV1<{)W!IN$H=N>Bfunm6eXJ{a2 z8GZXyYq{9PPV44SkEpi#4P!}*3wBP9vhR~@dHt$T0BH0#hc@>iwh@1uS&Ak=|1ce$ zUrF}Qi-L#yYPBjF_q0>|-gRZRnr1B-hlTdyn6MT5SFy%FqWKaQW_;O^Y`ErK{y6|u zYXjOqL{=tRmNJ-`^vNf*zSl17^5)NXsy6t+Za*&uI2Y%Gnp+HR*Z!5CL|M; z5$nK`ujnD(e-9vS;lFoY5*#}C_AXPXP22gV-*jcO1D%!S`grDAYDw@qb`+Tt{{3`u zASu(@h|G%ZZk7Yd-~nbR{X0Z+C)U#imlG8br%klg!HDXd6QeE2aySga4#Fk^PJoa{ zfiVOABLk`6!=aDwV%7ib-r+<8f6Xy49(c9|17AWUOZIPJaQKniF!Igw&{h({$$maC zO7&+H89B+hn5kYnD7v@l!g6u*%3B95Z)l{7rvudMieuLMuF5yjwnE3{-5biO{=pcG zsX$Y6ZHt$3U2H07;11zZDD94;(7i@GD(10YvtE?*@Y#iz1a0ZeTtr7u&qi{GW~N7Q zcr14WS&T!9OwQ0Vru+)9eN1R*TKs#vtdVFbo9@YVk#J8(++mQZqpt^g$wQ%IdI`3x ze>#=l1`>4n1Z0qWN<5-Fa|~O8ub%HPiz^)Y6T{pOiVqCe&u}l4Z(*S14<3>MYATI$ zbaGGbI6+S+C@FXU_q#tq(0;?ZiVzj$iWZgjs;>LPsb;<#Jb~uds`G*`9sqq%#mnWw zTXt+&Kjc@wzG#MbL#(#&O`?nzbK;AUm9BK~vG7a_c~9#@{5&bt!s6_Xct^4`!@UC! zc2rv3_J zxdaH~_Og!6A_`L51$aiIaqyNmf9;G+cyr-Pgx{3&!~OY%6{Np+g4SuDgJ)DFFqk|; zX1>P~BP*;thei9iAKjA`?97ZD`g4+$Gg;yh46e!T4gB(0H;455p9jeh*j}A0Y@$KW?TQX4^%$__F>P)aT4FbJeh9I^`(q6KgdaR%`#?le{57ptJ@+;i7^ySL8=o~#D(A=46_+ZAc;nqAlaK|KQ`^0riB97+Os4!28Z8H6%N~_f~x>Q!^a0q;yd) zFAeQoHI3+PBlE@dIl)vu^Z3z0j^d-sQLENZv2Der7F38;x#cnvjgdwbz}cY0oMR4SD}^jVf|WPPNWXbuQ^r&#)DEB_jcwYD!)maUX33J68h>sm38FOZ3Sz! z7CTT%q?P^BOoE;L@zd1=-l(Osv-8zo-j?vm-4zrc@kW;bTYC24Cg^5x$9Kc_#?!ve~??HV_(~Q z@i80TaSJ{iGS=8HDP9;t)-(N1^9(IW38G=fVFqEswvU7Dq<_4rH>%1F_a&@js?*~b zQKBYlw6mm=@c2BDpAy#KjDvXQ?!Sm zyVBI5!-)99D%IdZ$QFz;`(`~^H#z;7KO;pb@x(8jc`K3g?BL)}fxahorR9i4`wyech|$EOmxddU^{C&=y5Ie+LZZXj^baKq2qD=MO_t|R+}t2+XkU^m85a%YPMYj zIpoi{WG={+K(Sk`ALzdD-ziUD<7~Z8-UNb2*@&&6Vtn$7@@o z2|;wg0GR*@?=1n_-KkT(>XmtmiU^ljE35V8Gt}0Lqa!_WOFWCSQRRhNzM5m%d2EJe zclr(crT|ayHMOoi+_LOr+t%rUjubr|xyw;v^7V!8y+|n{*9MxN(7S(`6>5U{WHHye zMZ}MSS0T>E++wsuUf(@dZpLWnwj(+{f95)vP#~q?XKqKza5~${5t){@MtOqS+${Uq zVRs+Rad8^l&)5to-BUM^4sf)lJ;g-s<@;yT)1d7Ip#n-!;YDVYoYXz)f1bZgW7ngCiqaPho9`gl2%I|NnCk1gLeGr zcA`)={&;{@g`!Sm=U0U4p=9)>s!VHpk^uu>*u|RU&SrngKH)xa-Y&rXuc|-vI&3AT zOyQqB>=|)l-C8ebs zR7#{oy1To(kq+qw3F+<*=|;M{Ysevn`2X;EeBbBGxz0IX&RN&xfCDqb-h1u6SKase zDf^2sI1*&B5h3cmxs~5Xz~e0#GImce>7YyEWfh{MZa~>ZEwdJSHFjy6`@GJ8*u6QE z#F}H>KX*b}`|*WlGmk^BvJt8R&A!$h-A3+S_lI%FTIhK?yNI-*M9`7t2R#O~=0P6$ zmFK9CNFcoAQ8~-U%}!p{@hnu$JX|U4oS@cvXRn%|wX-*{5y&Sw9q@VjWL)Pv8?Sh- zmh2#Pe`^75k+RELV!GS;;qrVL$v47xRl9ywd<%+Jc~lS*{U6mqZnv1hb=XX27kVnF zhrTKDUK!}0(?2RA?V53Xb@uZpJ-qFv;QBUxzB$R}7Bicg#Q3n9h1+@I4Q1L|>IILY zoAxz|VqEp%$;UhcqxYibgU)bBm1sw5%ixw4&In=prRfg1!y^WM1xbAm=t}N_O7R$c zGPv%lsu`KKR-c|mq~p;SOVhth5gNVa%J>@7fW=Tmaxs@7-lk+ybwqdW!tA=-f5oS-n#A48-t@+j5I3ye)|69*O#1xdD?%H?toO5_jL>lB|T6&k>>0&`v23{CQ}d^nkn zX8cVsY`8X^??{3XBEgBL*T$!pP$M)YP-(nY=GQGf7tV+FP!yEV7gHhCB?_HQnrI@@ z1DADnqi-e5&Eb|K3T{}YsJmm6Y}i&uq$w(wUZB-3WxfQ-)MfaG53?MpVan=#}>0j>(2im2RwlUH%FwWT4nXkcsLy@Z;8$MBTvNHb;B-G%X}*y`V3WfY=c33 zGa)bM??uw4*DQF!R9RQwZdgQk%sj9CJ*$+fPMR9&bnt(PQh9=d@q(% zP8wwisJ8mJn)D@tX)0TGG^~MWb#U;iD)S>spd;*`OP9b7wZvy%8a}hQi3C!i!Wb?^ z7{xK=2F4Cd$}0_W)&IR}B50S=-)O(gn8AqWCnn;=J7Zz`=5gTbuY65HpHKfDKL!OC z&mfSWeTZr|vMTw#FkddZ4LBb_4uWpBdWmDlhLskN?WP_zy3kNF^I;WI5Ul*!SLu$W zV8$#q6;>+bK49E+epVGiPAk(zxQ$%(ib%?F)x~c@f1mBTIl+L%)$~hr=BW`xdK? zT4#+#vbXbC`eP{;YShB{LTwfvS-BATxx5j&kCj+|aMA~DlJ&kMNK&>zh#FsD3H#=> zlOm1ZHWU*nrxI4vMMB4?*ST$Ng!w5VA%HAK$C3Lt_x)|}I?|!)Mx|_Nd}JN0VrL{o znaY`}tKYG~^c#GR^H+vYVb8Z2viWpjR2xY}2E27PKZtLGiG?MQN)l35&C=O1>JI zI326o?u}ieh6m7Q(HE%mcY8}o8GuQlAVBM%iOG+oKd3e=+XgN6E-4>|WMW+BOd2{> zfY))1=1MA!EhYh*5!h_sxxd;6b4_X+JoX+E2Y8|ao4xmy zlNpJ$C{vh#W${3byw>>Dt(|VA3WM8TR^MxPd;yCyI@TZGMmt$=F-~A@#?Ip>NG2!I z33K`&(AM78G+oS5ybxbujV|@fiycSi4gTLBZ+<4)^)%(%eU%SB~3^3#4I+Q$|eH zC5##w06W4B-*Fb%+-Az?t5(IqQn49|xs5?yrOjuG@*O|-@-6p%*;M3aQn1nu-VC=& zj4MVl8y)}iX7Y4~KBD8+$E{eTW5xc_QujTAs^J=zNkx{2%YDOPwfc8!g8_jW10ITg zUnJVIhim7{7RcOzRZpnA%!(@cE>9A-bGPRrj66{HlDoX^B1fP>gL*wt%M_9_4y*q@*j<%7b3)qgjvCZiFaxWD`>Rf55q z(o6BM<(t&J;+o7J_%$c+{;od*P$3^OxtHyq4R}CVaC(Ewb&|irt8@_J?b*QdI8)hJ zrvOb3j(XUo#k5%9Df&TVT=414bQq^#Wv=sENk|+N9%i(cd@{CwG=^wi$o$=08k#!1 z8^PhXEbjTe%SVe0r5Pc`-rv8cwy!_@tO@S_B9|;2uKR_PF?Fx3H>Z03=;2x&NrzxA zypPO#iNS4a{e9mXa)B+oMjPJrj3AW!p^)OPi@UoAUvznq0L#TX7X9Av_dzUg=Z~F? zMp8t-eEIT2m_S3uqOoo{laKRes46HqG_glLs>6KrOg zTCCIuvOQ`n)MIh*HXj3Bx#n$u#wm%%wz@JhNE^DlaXS7yImq8T8aWzbJW~=DHMTa& zyv|<(wCJ{Grr|CUmxhR+y)^g|?KW-(rbbCcF$Oz!5WFpjTNF=1XS)auQm8#Bo3Zmw zS5SbxZQE=+yHT>hjkVzKuE}=b+;T5!QY*IQQ`oQ5EaxNjn6V#gOgk>bU>T_=ENQ-8 zCte|2Jv{TYUYhRPH<*q8sguP(n3?vvLhFl}IwhRM zJUxah&$gP<(AoynP>-T0&pw~Ki6EU)_m;PXDfe4?ufHu_niLH!=oK)`L(OAk)C$-d z%AnrjxYCYC7VgfDMYcqCKf5Q^ zl9j6>b!v6avV^`pnfcfA{?A3m!V-($@DdecYg+8Hua7{oEQTwG^HQ8Y8LnD=Pq?5b zQ~9qO1=+%?&>1_LW2%f8=N&W50lzh)aJ26oDr(nwdk*W`zY%=lNR}f#hQt=wx-%Uj z0$@jxh0#FF@yEjw#@(GyX!J%urS+w-xVIFat{Ed$>gm{t-s(|%URS*j0*I?#{b+C% zr0v}>0AUoPjmZ{=ffy|lb)*NRX_~B1RuuFdI5C|1+uX2IXd83IojtV1z=UJIu8Nkp zxf%MNqQ>P{)Cm_=F&))b5PUk?d8qwH)0l zR^|+7Ev6KVbdkt_+*o%FspLSdNIh|iG||)2@XgDRNmuHk1*_MMB-T0;c9~|I=(FOa z09SgNCbIdAQ88mp@F&@A#o9%qEGD5mZ?)U7%b0)C3#^m`AM`6V?pVdf6)Na3m#_l? zcj$Mjw6E_m=(wAAN$ispzL<4Yzkd=VIbxR)koBHr^OCUm(FH`PP!yU)j1DnM_$Uz$ zCFK`mx(a_z0hL_v-UXC2y=>*t2d0pvh;CC$2xHz>%qaY4I^RJo&hMkD_8m~&w!LX) zp0tI5*8GAwicPSzD!nmAz2>V z!6&o;LoG5);QC?t;zxl_i7sc1c6;=16!*Hm@4(60z6H!^dsaa8!zbQ>#g7eFzimOw zD<+GJvx}oQX%|JbC90%-fia(*>G!H@YryBFM{soYUv~M@6sFdBJ;6;^#r&khWjQ5t zlgLe}tZUV+LMNWyiSGK#9(6=}>YZo`R)vS)@yKVO|JMDKh0qZ5K``vU86MUx)x44( z{4?Cw?11-&F1FYgutMnv#3MHB8u8=#N!61^GNaKxQNQFj!|&4j)p%E0{*uR8;fF95 zumq|r{s!`&&7@@NLwZ|ED2pJuxHf2uhdId!d#-A#zXCJvJ@}c!8qluoK!Mx|3cTO@Z3YmYA$F}~VO7Sc=Rm6X}@S(aO^WDceo*wHN`ecP)e`ZSPi zrK5!>arLuC(~IRgqtvd!vpb`19Ei&`(`PS&jhU$Doio>;&6k;{W1Luvn!1mU%0Bd2 z4CKP9wpC-^eDwA%1-y5}bxbdji2n(~Z29Rl?&&gYE(=AlMSO=6XB$_2ah=f7Dp#*h zrj!~V+?dnBdnxH_srw=P){Y&ej_D0MC;#|55axhmehyS|=3Aed`djF13Co!yS!m&= zRv-3X6GWX2GDLCG?*1_Hd+5%+7B-pF__(UFVA5ZGM3dj zFIY&E)@&Q|Y#s#ge}OFc-L~eHSXBB#h0YKJiNqy0lVSBvF!MZ<&u+SYnr@>L4T1I#M<}(eu4|M zndW6ILHYjw?gD)gGGbL<4cwqseK|Qfstq=}PjHmvFKR6pIgN&sF!$cUQ#CJ-mZ(-E zA|oR^ycHg*q|IH{U!$gDHH$@(Ye1ld%%wecAK~hYr;^G&9o=NMFYujj&Gz1 z)VU@8RP&al=kg1tWF7)_k(Z3pBacYt9q*7xas70wZMIQR2wHVM{(!;4#3Uf312l>$ zwbq~Y1uD*}r0J5K6aZrctYxU@ywd%sQMK)==d~l>Mr zCv}0E^(B|0KQvt3%pATqxj?fOXAj&`$s&7 zxdpE_!kA+c5_$nnNW4D@FkY74)gZ&q1c6l0C2~OY0m>ATG`=WuO0#%i)2I>NVnp2g zW#QGFp3QF|?a$|{)(X(Tb>3~g1lda2(Xq@)6ORWFd5XI&iIu=ie$sx4Uj?zqr-rbrK;GMfx2cz0{Z;Enl!}XF~&(a?OgSFYclmN zP#Sf6u-z+p=;?a!&#e6M$n3;wrn~{7fO%D46i^A8R9oXYm_zGga_YB-l8CvHJ zLd-jV8(4F)NMlbfNjYhHkx}_Aw?}Jik7yQwm>67#J;Euo$jUINh4)iG_f#! z9h`JYYro%UR9dl|d29ISPWI9K`)3dkU&^Cm64clghkhy=6*5oV+}HwJCi0PhOqq|p zDCH+y1D#4!7i&|?hTrT++1HaQRr%iKmau`)6sptjoGz$iW3eZ_MyzHIi@rH7n#XT- zI|P?5bM%e#diFUjJg+PZk7daI##Y_#vyq`JpT|%UjLMO9QK8XH^lY5aQL(u)k(*I-i!k9Pv-d<&b6IPCMX=bBSq-kFzKUx&U83eE;_l8Qp8sXK6`HNI9kAI z%9@&)b6C+4O>i~GwrU+OiZ>UBByM`r8lnxw^2axj6x)Rj6-3I=)Q6o+rkC-6K2)7i zx?NO#Dq596gW|BDNj=JStDE)Vqea~pjHQ+d%Ucn6OAc6Tb-(d#+xu9zB@j~(XE0Io zLT9whOJO;~FN$CRMr{P9{IGu49K=xkIf=_3m>=+!{0D^6MmId`S=M*v-Ut0<)SWPY z#=QMVyw>4#DYo}iu*!<$=H1a+#7c~}C_JR&Iph;1nM#Z~nDpbRty!`6LN*6mQhN#) zxtH`ou*GAS)utEKj@{uo77w#{+cnJ(?+<1u9gxivXylFupkF;3=SwuV%TA&V%(T*7q3`IkFcmB%o+~ogmv*-(B6bC3E&jsLL z?fHR!E4vrFW4qu*>+7eF!1|?<2p>!k2VZ!4lG<8y#8O!HEvL*ckGcp4!I;&}LZmPe z78CWA9F;dxf2DX*o1Y#Dq)FBH%{bzI!l0B1qjpF@@(zoI0N;=h z`f=T>7brTNYxj1`&&L@`6()}}&S(y!SLlc~Dub?4pe$MEu=c32!Fj`bgukn`!S(PJ ziQjHVQL1s<9W^R-hHNOLABx2tY|(Z*V(mr-3>H*f`*o&-D)sB-tg)NC~WkbG4y#uFYZU)0(0%OdaYJSPtoSLuq;(xgt^P=R9~B}bs;HcrtXvZ;hmc*CIOU|_k&}G$GHUPq9^PXo28oe1M8<}->3RbZOw8q;6+jr zbKL-Ueowb+aI3ROUsD*(a1m8Pwiq8Muvc4XDKfS})olA&+>yShdZR%KvUkdYk z-eP6e@qpub^i!;%1BaYE?qErcuC{E0a0UOmVyW!@lJn8z#CQ=eFOvDxv5L=tF%s>Ij%Q|D@SjUmF-3U+m>XL09N>`Z?)G3EsVBGalWFkz_&=F@f5BZ@t28I1d{>T@idwI-SuDlb{hw$Ep1-j@AXpIjL|`D5Ucu40s;d5 zyS<$5-d?c2g0FI##p!s>i19MSxuRe=T|Zj&#Whn=J<2sT7);k40UIo-{y<=x1Ox>*tT2?S+wo8w+~%u zYxjd8$48It7$#QSQQ>w`$v(au!(yiaUzi>Sh^Zf{o3Md%+na-ntJ?8UX=8KK-9gK` zeYUuer=3au*%a|tba0qm=2pjUD-BtT9P^Y;f!&UWv6%<+PF~5xULZOk(+_Aa3@T_eKh8-`I&vyaX!kb8(xryg2Uacf-xhjgr z5foC69a;&ke8}Zao|@ne9q#l3*sLG*14g=%zQWVgZ!A37n=BwE*u0Bkxp5OETJ~7B zCu?s{y)5SeA}&R%$hl}xsc>D$>xq#%3xh7y9*kw)c+cfW`XM19&qg*7xp@r+ftpT_ zNBKaPO0exukC0_*A7*yX@84LG9lC^E0U}8Ycy6w9Iz6k(rlbj7@Np z?4|`?x~I-V*wIdcz=E+wt~#%JKHvF;m^u-ovw0WW$s#s;XDPZ{+l ztj+|%m%knHetJ@ITf;@R2sVDpi(*K34?>u$i5ehD$Y7?uOx(74*z)saAVdIYmvAerAPo2Cw7V>9eQmu5Sy5PWqA5`w2A=9j>VfU zg4TlkkTq1Le9;Y?j<{jpZP86~4-@Z54Fx^J+cr<#^N|Y~m+@$J{ z@%_QyKF>|oFJ_4~T5U)f*9(3xmv^xg!YxQ^%i=PaW{%AEHvzHELPDeKu_GEJ*qvMb zF9Q)&D}nVmxw8feABybN-%-TU9_1Qb$pp7|JtV}&Y9@JF)gL>|N6OST+$nBKAeV+S6P*Ow$gXz`a)8ipQ z%6`2HNN_Xs+|d{Q)05r4MoPMH!%435>a83Rv})g;UvorOLity$togsn?C9tQ=civv z`dQ;O3~}~lI1R!b^3`%$DZBnticrEdFCuN(H`{ETyd?2~yfTsySyi-@qUg|U+wY2G z;hk~C9WI}w-W$5Miqh#?nmp*HvNX%56nAt`OKVZp@k{$=_nnOPmSWnF*}t^_-S$Gf zEi1=O>1ETNtIECNA1sW5+?)K)%T}6a3TNi$RlaWU7zwl=pJWt#s|Az|6)Vt^y*G)k zLTWMGQH)V+7zRIjR#z?O9V(Fu1@z0fX3HpD{F4aZvB^FVsCRzDpnFNKCe4KB@C+{% zC^kS0(|yU|&5(#oT~WXk_HEHxw^vx1mE88ywePRt0;K7vkStu>_@Xc{HpYL`30k}T zTz080wnu5SDehe9^3FQzP8GqxfPZb$on)`V=uaiDqwEUzzB<2+5=WBn}8=fa$?=gM~?~$uU26ABta`LQ;G?ahJ1Jvnv zaBGRP{S3o4RCj%VVuBE$9OQ7^zcJf`2CXtg(7gOL7wJ*4^14hn9;>19hs9cPBe0pQ z9wZAsTa3nmkCYEC6l+7kGJCAbDsdM1o8(60>ch_Wq?fWrSrE5DbGDG0S1#%btJYBl z5{UWUO!c@~br!&(y^G@*i06DXhDIe4&c5SAgyQkV@|p zB87(_epd$;a>6=PlBWutg^M6HzE=^v)6rbm&^9>`eAb{zOUJ0dR}r>^3ednA4Jen@ zJpsu#JkHfW>+Qgk8&6i{x>v|wo!$DVbJ0ghgW>hLKMAQtZneAnl&`_T0P&5k4Ba({ z-BC@oJQlZ^%F9ZMk0!{pn`D_JoBqPuP&P-g*Q0GJoh04Wu@C`*HlR#ptK5#}1s}B= z+vk%vZIx-=q?QGTYtu`0m%3s*3faV|3s_aSjV(>XCuM>sW-H-Xc)h$Xjv>3Qx@eKZ z>aF3(p4unQLFp_>qKBPI6CVtE<7jMk8*RNox_gauFlb`)a|32VJSlu zyV=2v7HRrjg&)pZd}~g* zKT`|9U{Mj1eOY#zPhLf~h7_B!v9}@S3)(2}6LzlgqSg4k$QyD{KFyf@bt2&VFpb${ z)hFoZC%~A_9J%JQ%mOOU5gQKGv$zv|4!r>6|5Pqg!QObd|F{;>ZwxoOfooa!3sBzU zVmx0S+-OBh!IU97FOE=22)~-l5y`hJv*x|BGJ7&tp!?z8_$w+A30h0VMaA`1Ua2Cn z$97?Lnc{bR6uHWhlG^HtT}NxIarZShC7Jnwhpz zhmeO-)jB2Iw2(Giz$uhKW8srbcf4`8&Nj`Qdsg+zeIsX_GyP!ly2&PX;@rbe&98)b zLj#3tcU?}CXO9PJpR@bDDd?3mb_H)@f1f$HV}9d6PslZl`2c4i0|)66D7b%~Is%bj z<-f4JaHUjEyu8d1b_%0dWG(!$K{^@th&ew=hbMJhz<5q1eeBCfn*Md3PGiH>G!?pO zhe($EVJZxGetwn>Qn7$pKR#s>w;sJ7E=4f5bCM08-{#PgOg0*8hBAV+uCB1ta zW?r9fBy&s0u3A5YFB(T~X9SoO2?-!~1nc6p30Xsza}(Y!j>3a(r9sN}r}6nb53UcY zN@^cITEKvDNz|xbmE`xv!j_y8D`yadc=n9!E@RDk75IJ&B6X?{6r`7>-#DKE_m(mz zR{T~k^#JGY5a7A@x>Bz9Y9bd2+kZ8jf9Lk@Z5&Ujh2d z3)Xmq?(?JXNW9ZL*$mei%V<}6m);;5BHKjoi-rPkb9ZSf)uD$E8w9&0R~XL(-C15-WeXdm38ogIcXxLcZx)jG+6an zvvj)W%_of&a#POGkF8k9#jS8WYz>KKeKAjm!GJ|TJ zU-&TlMvl+TM>8{ZwusW{u0|X~E4^(xK8|82ah^lsN(TPPY}`hMNNri^Lmnt@6`++x zzKCgO6>K)~wkG8lfr0TFELLRu!hUK080nJBx-V88ZNEGX)(_P1%II?Qz@*N@ngI$b zn?I=8upr2*O0&2O>T&N~OF@p4jdYFa=$2_jW{pBw`O}leTGvvu2P>f2WwS-kd!Piv zL`Yef@j6r3v6@dc(?>tn`&#JFmX2XqKN0`3sKqN5)c%4xuuJwy+p9g0`i~L;54&S7 z_h)@0+2W+&!`v*}NrLLV!vN{@o`RP|#W8EAm5E45jqy(|4=+cUVu9J&7|+Y+cI;T6 zt=)!>e=ge7cc~5Ay8p8M|0@0ee3V98vH!o!Be=O%< zhkRLp?S|%{&UP<8|INr+$5b*g_Y7*sZ%b?2FSs2WGz3(sDg+4v}68U61)sWMz{y5IfaIABC;FD;o^`=fV7y=&VxN zSb$+CN8IM#%21p6?{58fwtc9^U;OuDfbXB4F%JI~)`0&f&-}rO055kK+jsZ}9)QW? ze{t(2y?Xc@!$h_4zlCu8lUjqX08&VBe;@>y`xJLtvd_l--7|;)5Eumy504+he>jZ< zvq4wSKg(q{mHjvH^6$8!--t;3|M^V!%&XW)QjQe*UF{yjNoM1z{^<1Hc5aWP>y`Om zMAizn_j6}$h|iw#|H_u%7SQmFfQ@MvBGeF;n_G-Tz!}~Zgn^BPC1ucUqb8G?m$m** zH!DlSUK&~Z>Fz62s$kdZo8V9F^wjh30E_pm80`vO-cog*XVH?DT581!CheXY| z!ykm)ELgi3LTEhBFB!v&yfd0l?qQ(7_lLJD7vf26_o6Gso-uHX#f8_ZlNp&Jz1HZJ zYxSUtU4ITrPo+UFD^1Z|_?iDMlYb&$%b?)pV&dTiju`2S7{KNsby-A1&4ug2s&+LP z4A)8#)F$L*)GADn& z)*h+HnaUMcleNQ{nE{jg2H>>D-3m1rG|KPle@COgNs}7vXoNy4%KwoTwNV}_`;u8 zYZmJ@LQEQe2MByM@Hqtxe1KW7hMkMe=|}~g*fYv#m&J+L&G&T8RwZIhrjJHsm(}Wq zA^Rgu^~0LI2EQX68d?x={Bj3PXZyhGVJkZj4!o71m|5?zeN3bzZ{?uPY{r8;z@R3bW2)yyrnr?pcJp+-QfB388nr8#OKM zl}@$k&T}-mP3w%I)zQ|RybTD);+$D1H1%{aq0y`WVoEW%CrXnU`X2P2%bNrp$b;r6 zAyIyFQhXe>hi9Zp6>XM}YJ41r9*-<)tBvpsPGliES+iip%y>?Z4J@r?7<1&0UNxIo?{+-IkhPMbGu2OXN8 zW~BaK0KRr^HOrnS;9u#7+N`IvQBmR60XjN_g!O5NOKrukRO(NA|JdKuB(7~=*v={3 zFs@;*ztpK!jGKGol`P9zyN13oKhPA49%K|(VXFuov3*8K-9UCoh^;dJ29pRk6F#b; z4^+?fGIc+8?Mju4E$dH2V)NP8|7b(w!$whAZlak3s$ErtFiXdZ zxcq4C;m98Tcp$Llq`3BUoO#~my53Svm+U&=Y;U&{Zl88TchdSKmfh|WsBTPiTANSJ z>g=(&H&Htl!-YY25tCfMXFS*D2=iOeIRF0K(92U3zm~pSAAB^=(9r6qpD60A_Se^X zR%e5E)wky4T^GhC<0ewoaEbE?QzTwPPqq$vtX}$lVRF|M z$RH+{n0gXc29rZRgnC52b<1vUn_%FT z_HR!cI^iW4d{N05hkdgoG{{dU|}?o2$?;- z+-Tl*17rFE^ML*Vg7hFlbiM07EOI*;F-_7=ns$xP=STCD#<&;j{Zd|JVdTrGYaJzbBUnrT_C{zm^Ce|d9O zi9W-)&zo~-MU*b#+DXSMpt|AbnB2`fIB+y?woF%ITS0k2s${I-qV^F8K%T(PDgL0- ziS}Z@Kp>iX@P9AgOpfUICxd!ewPj_@iMn(;eC%O%4Y2HH~=GIHrNCET`CHgV`2OP-Zb-FV# z`77kap>LD>m;4&snlc(B8MCthL^X+=++wkg@%8G~|4z0>aE8kU($f(V>RLhZ=It&W zA__{*4w>~upU`7SU|=9ql)&k{@%_nlyT0~=AW*0r4^&?NSI)2j=!TVHd1=O znIyw?GH5+5HG1EY_9tv^}}7*d6rKexl_Yi~~{l8A_iM^vD1!hdATZ+n*V zU57iUtqXz7V*5O~y5Xp5UqrkQO2@5NJRHB%7Y5-*=g{5bv=hReF5~?VXEN}%=TFtn z*Xx$k*AGvbpNX+P6D|eXQOKtntR=`b%^8(^jh6heqt^wYA}u`x6UO>YS{^$uQpN8O znJ@=Yt*D(}y(c_eI9@dQgk~;Z|G;xQ-CDPS$yQveQh1CrxQ8lT5!NFeyAc3ur?1{F zG#c&TU_4Z3fepE8VA4)>v=Yo5Zx_`+zrez%z6bxm>-_xPr?a=f=l)l! zg8#pM=0eZL=KIc$QBiTREjKYh;CgycT+ZZB{U1#b!6Sk56*U-r=n}ezX@7#Wj{)S! zh(TTVzsVjjpU#<|eyw)}5fBln@9q3s>GEfo40Omq?ME7~$IUz6_dec`dhbmDOV7;X zdQRyMK3Z>HePDvRy1GJH`uIN+2>9m<6gx}&o z|0paBiNW$j`|ro#Or~AKw%rt6+jeO`qSXs|_$-nMzF%Gi?ZR9KHF#WPR(ec}+H1B3 zGgRbfdZnaVH6i%`eF*H1YiC&n1!d&ru`z`1ZR}RUVbkU;IEON0-$yT4D)~$@ED{8- z(N@dtgy7T$)))KO?<^9Y#p%*td|47OTz=|(G6i}5J{(fCj)qOMKUMuVko!CoiR4Kp z7iC_n?SH(vov&A)9HLZIy2#_ zE&sTFs%=1niJq~pmQ)Du^?GF}^L`*xsya{*Uf+q%oLZZ1 zgEog#!&gX94~)kNoiK`KD`~y{w#`ZC%%z-XRXjF7Ir@9zii@;T%I14FxVUL2xmoPK zemu*Ps8%~Qb!-%jDn`=$Sq~DMh0}E!(rapMBFjO{7ZI=oC5IAupTKd`6FVVm(o94Y zOYj0`+)VauV=;c*0BL`^Q%A^1efs;iInEqfgd~Csewa4N+wcn^3(J=-tqm>n5Zat* zmqD}rBFUfA=q~&_b*ht=;)q*F!D8rWA4E5EKRk7S-?0R(PJr>(J1uwIQ3kI2$ol4L zU!>Jh^N&yjv_x=wSmtuF_~kQ(>Z>y|eFA9`+vwrw&s$5Arig!ZAtJe1@Ds6FXC+g5 zJrmEsWoLruzHDXBr(sdxQznf0)(+bI?+F$C?MF@9*S9}0Gs#5vkvtwUZ|vZGRtZyI zJDoF#N4AUZ4+(A7Jv|!p%aJ+X--B*D`n`R4%(jZ?%W1{fL=1eT@u1p(N*8XRJqy`w zzj(uLhI_DB4jUrWtHC42qk4Gu)+49IkUYm$hc#I-rik0h&RxPy{G>emK|k_`(+`1^#|&5J&0fUI4a=I` z+!OtmTvpqa*84*iot8@~H46JnXQQ?`rEVAL0>zsresA>%7W^ z+l~FHgClP)fuJeLop8fH^Cfvs*4HWUAO(qoHyix>o>NCO2_)wQjhzTUg;*^q(4$|Bf%VD9Zq$T3xIyh#`s zq^l|XL2k{j)~YPq=%Oq;fwpQ6mk?+iS~V2={K@UW0_K z*>@~tPoz`$PrG8Ux&GDyoE&p3YR!rsQ~IvWgOeOB3!s98^xM_^`pS$B_Q>%EPAbi5 z;c}9OuW6!@`D!zvkA=kuR>X*ZJ3)K;ciVY@LmyxJ{+)&3U_^TySV1n*-4Y)7)1aV7 z?a$?Jb+`E#P^7};Si#7kwtH!fu}3y~CN0VNd_mcsOz*}D@*1mPDvjGH$=!YrHHZu=(vg>?>0wxvr9 z8gS#3(v)GolY%Rza7pn=1u>5 z_s5J5O0X-Dp{4M?X+r*nWj7|uWZZ%rEI%o^$SJoxDAQb6^sy=IxBuc|FvS7IQ<>v$ z4Ft`_df5g2*~Pv78x6y_35_7nf{3~-5dz@c6RxQ>^a6)p(_cOQ$GpKAOM~?-9b6$c z+7?Yf!q&Grr@|K+`c}M7VjOu<7TXT3qd0%(H&|k=f+5bkcXYJYZ^ARplik4xLD)Ow zdIEE)D50ObJo#RBR2r&zR`4;BIH>U;_~+h{5YgtvUa)?ZC)$P`F+`SDXSDM&v$o#N z3L;HOgsSM2wC0a&Cl_cfFD+%|*(s)H{}|)JXBWt%BU>m}K5RNtzsZD5!*EGlL|Fi)S}Ix|~ZQ$!~5oScNa?jPH- z84!ri8PRt&nQM+XzKr-<$tcU$;jvnpSsbn~1L#|@ui@}k%I9Fi2$rQjoebNc{{$?I zhU%O_D-BOs2*!&2j?zzI*Syw}ZKP3suKN+yQr(*#S-VkX!%i{jq*M$ zIHzGSr`vq)Jhf(wKz|gWYj3;Ig@bwfQ&JZb3U$5+ox{=EWmDQTbudOna^zOcoemdY z@n?dQg6ynX;G9xdUDOm6HaELXjjFXVw>NfkWklFpbcuslo91B`SkJ#GZQkpCn{yyi zgsz4@J_`jY=K7sdf(`G4e~d$07ZQTh+t)YJj?_!jo80e064uJkY)MN`zq$JKu-XVf zPJA2Dq1rt~`3sN7FrEe6~4>UX^R0cMKKJ+TX#7 zVXSd!OThcQka>U?W3I9{n^x&-T60?81KP^E?B(}-RglCCb=~x zs2LY3fvWTH>bx?_GaP}`#V0Q>kBR__dLxULm|m@EzdqduTYIXr4h|6trr{&R2IKbp zGE{I3Hf<`9{**Zy>h$*Y2JO%Rfz@cId_wy*H`EJbwXuhqjCD*5!<|bJx^th>nHS zeeEn`3prj@ck&k{eWGoa1KJ?%^_rivsVXxB{k2+pjXsSl3aTih;yZQQgJhYvUdD{E zw;A&j6XP`3#vArn5}smJ;A$Rb%XS$hZ#%8tFNn8wfVPE_L$3KOtB-o~s${Y5mZ)@fd02}wux*%D*ktb%08 zne_Tjk*tgt7hZS~(A7H+)0Dg0ya17^$VB^4EXXnP!cBj|U{>>+CbNM0w{dx`eCJf*_;+vMtt5yM4ETOh=RJ*rjGF z5d>k}bbo!w4084T9jO7Kv0SjIGk>$SfWcGlTzbrTExlmOSP4ppwbR0otrNPq56q3{ zn`eo4OTQ)h?!-^CfGyD?ejAjIO&gdE>$|zRd4IkNKKnn+eFa-vTeme*phb%nhZYJH zceg@uOL3PLEADQk6f0JwSkPj{-Q8V^dvFQ_f(D0gbIyD2d+u}pz?TP}kc8~)tUcFS zbIviwoR>uRNu@XUNqsPgJS6cxwF~DS<)MzR_t+?7-3E}NR`>SdKTqL!(QKQo@tu-K@zZ#{N+4lnVah&O zC~m2e!AoF<&H1R1`OUgNo_rsT$phSGK0% zLvH-gx;t%fHj}i*?QQnzMDF-rACuXoB1`(liB$h6i;&3K3yc2hfZMJ^MwhS@Ou6(! z?FDss%(5`so})>0kY%OMJ@hbrYDa8O0Ymxn=X{2NMSDFR_h@*>b;FRTy^_z1(~K&A zpTScn3N6m)pSE#m>y>`^=*@S6Vt(~T4U`+A#1r0!CFS;74&YjVtzfn4Zn@J9N{jAx!@KbcXbst+pB%z zJQssN4nzB$=k(g|q;#2UQ)+T&W}E&{@p>K9PQ`OA)rB|f@{zbg`G*?~%wKw}0{wC+ zJ2mMI)n|=#QVyF>l_~u$KeS%y4owvnOEwJBchB6K(zNS$501I(Li_P7mbl$l-4-Y9-* z^s{`4NBVIiSZn)V1y5Mh6X?bhDX6}gMP>XvXKVy-PLYpLQ_SvbavZDzPccLv&!-9U z#}BFRK&!Gh`UaZ*dq>1GExz&l ztLm{xk<&GeCJ`ofA%m4=>6bhUl<=&sd z%+gUjQ;cf-9&rQnzH!ObN)AcqgG-U&F>jl(PLzj;#{KQ?#= zN{qsCwCj0UL>#E=iAz~lFH4HLJm5m#m(0BlCipd9drCgNKM_Y2|!c)>}QE2g! z+k?$d0uVJ7+x7Z1Pp)I8Q@v~nP4W}f@S;IQ5h7$mBq9^yZbpj+XE^joZD}?wxj_Lu zSkjGu?h$=l^m?E0*1$RR4M$S~%Hr7U7O$w)4>%{4FZkZ}Npsn{xKa3GmA84RtyBX3 z*QQULSZ1O=^%&9&SSM@+>-Vl?07fwt0?aPk{p*;VLkiDp;+6oDN0a1x&HB|x^1#lk zSc@TnTV7#p-E5F7)RXOvS^$FmiTRp~T{?lb7y_%rVnp>%rSx}`MQ;J;gWhv;3EViJ z=2^veEVQr@>|pC9KW};0t2-eWHC!FCVKZ2s1A?B%%FbHm%=6fPVfV_uRRRl7`WdxoOVMiu5k~cfvl&M3T+t5TVU16I>+M8mDR* zHv*%vx3`*0*G^iH>l?M@oxqb>d?pF(41i79_iLL6&weGrLCUZ40lii;%?B^LwcO=Q zh|{aSp;wi_nMkaSK7Hfjzb$l?vYv!A42=;XHk$3di%&J0og5*i=X`hi;)$Ups!yLy z?Pm4XBqox5OYS#4uyeki-Lk&a$hM^Jj&kivtUQsg^(kxZimKE*-LGy$Skv=cuDte& zKjLIjZ0~c+G7M#uq!IW_$RFov*_3)-zB4DW$cF>hk$O5TC|$Z6Z$@be7MTe$Xyb|h z;PqsJa_%I0h%>gZI>Kou!w!BGNb z{=FwFh7oJDU7H@n06Sn?{Nt@;Hc{xvLZa%w{J6r!f>+|yWeEF(b zpHfV%I3M~gbL^PyFzREv@v6f?J^VsV-=kE9Z?pr%Ysc9+`Wkfqy+*-VNyC)MZbQetjSn_>Xrujz|iqce-a z1iW!m%7C3~2=ns`W3Sopu#jM9ERwi>Y66;s{j~{6O$>i&`$E`bwI0{c{5UJ--yPLDQ{E2-#5dUuVfagn70f(j4Gn@|h+K{SVPKBsvY7T5) z3--r0(GN^kHrf*^3SJlpHb&Sw2T6zCP!wD=@nRmPt6$S=g~rrV$uOU%&-#}DZr?;IMIKmG)28Sv#;0|;4BJy}CUr`i{#XAmi zak@T7=s(vP238y%3av^6bnMT{r(PV#ZzW3|Lq;I^&=okYu6b+$!k1Wb+doutOV$Pu|P43Ll=44 zVj&@|zmAQ4r8k`Xjp#VR9G)|w3>Oyg3p>L&3N_4JKQXIFG)nlEFMrouUXPoQ)QX{v z_r+o44V9O}D3h*;=;*-KP+VDJ&xSs6w6oQGb5EAkiy!|tSZ^L5A;4X0*h$}5ur4$B zWByN)OE#uO(mU{V1KJJ=I9&LBM4HP~|wtDf*A(?LY4tPH$ZM zHw_1{ZE65q`{$T{-T(jh3@yeo0~J-L>xUx*?YOn@4U!){2xj6V`4of zSMD!Z^|2K*PzNH=`>-Kox=0ITz5MniyG+SHwH6-#RVU>yg!N`nt5t%Xcry=dmjZ8u z+-~#jWC9If|9ewN?0rOH$tWrFnwx$87lunsJ*@WJtc`rdui6Bp+c!mTVorWh_;)iHWT0;9Wkg+R8Y3JQoC57qbLl_gke+hX5aM z1G?Pg?)Rk~$fDGI_!u^eEp}{JCQuZy&|!OdycSMcb#O>2Em1mk4Gi0q;;pN}C2C!= z*%OC_g?sUmvr*vPH+_oZTszOm!&Im`9qO9^#0>eJO}Eu*c1 z{B&vpbPiF`QJ|G~Ur|}>pjqO`0Www0>PuGLRjqEQRmDqjF;Xq*MpSfJ=_ctE(i-^q}p}r_8y`IMy6Fw-pAp&4tX4Me6 z_Qmi-1ZBwc!_8)dfcZn_7%6E>BdI47lig(iVE|F@?`v9F{fAW1Tp|P9P-P>^sN)-u z2GP9fi2+?O2DiZn~se}=QJM+qIS0?%!y&hDe1 z=OMKMsZA&cYRUX-@_Y3$U6|cc!c_qLjoXD?b3y0aPA#a&59lCk<@*=NLx33i9Qti- z&K&h~WYDo5(lCHWaP;vi+`O}Kmb3&(d$TOApR8-J{hN0^ko8M^bxT0rdu$JjTjN}{ z=^l339ZU(e79C8ksH*y9hDHH^Ewm5V47u0WUIhJs$%^-nGJG1 zQ}@ZnMzQsNDqpmxuJydc^OwNqN%JoAst;Aucu`6%!LK^AUj3S5AL_U2ey3CEM^(^0 z?u*$ARacIMx7o9!s$?{j9`A&Aj%Phx&E-2p%iw4k#!og7`d1Fu^f#l`a}OVC?*-Sy zhO3O()*c#AOLTgdQO@Y>zC0N_M3B2j8=ssZBg0k%#x|quJ}CD;7>};b^>o9 z9WS};lW$gK+%Z$#uA*J7qKWle zh~4O*qM>;LuWgracPF(tt^;Wt51dJ8zcs49+BGUh6g7Akj5hxQGzA;$f1UQ5X&zIU zeoB3zqRD&MRn5PEBdFypWl>{Rqv-9w7xhiSkS*%Nhh@i@N5<Pyo0 z-74mBKG|VIxyma0%;gFEIfX|!gfcd3u^nEWK3KXf_>?b(tCs9|RdLjzBJ1b)!M~Q` zm|Sz^z;>>{sbXqe7p ze|LSZuA$+$+8!{kv3@WjpG;2mYz?WoWyZ4QEUJ6=oV2Jxf~FgvErQ`I^XY)D*pomG z=uCi*!7J(5bNKo>oNiw^K2g7|E^+1ZX@R!w_H7E(F|?|-gecoHOnp4ewPf*M%qr?w zPGCZWm%7H`ZVFe5W@|B31Bo@kqw^{LmJ%ZigsL3}-|yg|koh(N!mkH5c6mp0+w352 z5Dka({wzsm%C_YD8X!G0tUfdO9#Wn@v397ww?As0PRyFWfLBdH;lVD@R@DIhFtbU; z*3cT@nmc2=XKH=HzQvQU(jIiC{9?eN3ybe)y3CIU26SjVFIoZ~1J&Slp7I|{9Zd0z zDMc@a=7%{9i)XJl{AbgCyi=8=?O`6S6;6kH35yzzdzsj?WVjimjgak{0;^_;OSQ|y zxGt!N^bL!BZkd>flYl;o!?WCM8ImM7C9dg#dzy>#Ds!~*@Prhn;3mE;=)vOE`ZKrE zqD;yYIBKb`9{Lv6**Ra15|s$=yl&jD#;>Y_^Gjmw+tozfZhe*B1I z1s8=JElLA>mtZfO+mgskdUF*%u+v&oJRwHAHw76z`cMD4#jL-vdVX1BRJwUm)Qi9` z;+McT7P+l|2%Q_Ko~8G1u?prn{OMmG050R~On67HtFxF!@9KD`B2C7c_3aA7!Oe}l zx2`Doh1+`rQN@RCVT@Wh$5MIB$oY73z9VvtLpiaRr3mYI4N*2A|maBtk6!XNM z?N}h9zY#E+cg|Xm-7){UJtYu$dfN$NU9U69*RG`=9jKze>Tve&z)8OeXPCXwfHa{O zWo{u**i=68bboJvO@AH1Zf*@>_r*f{WVsxlw%q_E*fOlmPVXtIQy8-L1H}tdz?Qzp zPlSrBJ|XG`T(63#|LAo1P%>Cnl}ulY?Qq(`!+x~-x**>jmwc{&)BxEG}cKd26%s`K;_d%h8(A;p*HI0uWM^MRF?lT z2kMV1Qyc;QTuz9053MO17AwX+AAe@L8hWgA8dA0XDo00+s?7WFx%Ix=2-!vZOI``M z-rpDte8VzCj`#@8IQJZf%tz%M?{x_^sYt*E@x z@2yM+%D0?H&$)BH%7UnoWEa%$Ir0xs8m{|iny;;Qn#{8u3y}aAXMcx90tN3RN7=3o|91b9#hjh6;3skAV<=3T zfj1-`J3o3Dv{ras4n!{~eb0Wc=LITztc58ET+0&(uLYCkwUkbX|2K+yieTT0`fyI0L>$PKeY6RA zyDY}yQY1O5;EeYK)njWuT;OuO#>aT_sae~p*TR`an^7;g%!pk}qm88+N@eUU5P@Co zV13{5S?WcQ|81ZDrnS)x>6qBVZS`!+ZXS61F+_>etFxn^jLy$A!=VuD26&Y9K-ra@ zS``GqvsNm%fBn^ZM(T&kqJ|6zckrLxHknB5f#`DULaprKhU~o`Msu0t+Cuk`&DAi& zr}`8bJMUzc3;{W<9xKDfi*G14as5-<%ug{L;OfurAjPZw(X1bqm1I13^I_{X9X!rD zTZ_{B+l&M^KXN|;9M?;q)*!p!(Ee%y(kZMU2}~?3rAEa^s$q??<7)K9dYb2{`3NCt z);KO7bvmaNS{*LTp#Mdih$N*)Ky~#aRW7egog=4$CCc zV#bbh#n$c+?V!($45>rYteN2xy;_S+_95(TQdTh=r|6Vd z3pO)E$zns>*|D=BY(F2sgbH*Bj}%^o=q@UHO3*Ef4T84$s74F9w@t)nGu_SUXU3^8 z;g8Auc=YCM94kA0Q4U)MW2b5EKa9tik7BxfOg{-cG+dCja#dV$~voXha)akt?qjFk++P|YI8yX3Ajc)8H1&TdkJ zl`hhg(05YYXy)tG5&|`Dv#Yrh#6_S4hFfHeUMI>V1qh~f-r$0Seu#uY{KW{@bW;O1 z6;nD1FGo(1{iTxVK&G$2Oq}+>mG-%GrXr(O(0l?)#=)D7x<~J2!8 z0rYIy%m>@{z)?q1wSx1<8l4dGOE5w0?~)rz0gvo;k&oVJB~3b~O_-4FUm-XmNXKb@ ziW&U-9m5{iLirR-2~zv5aT@=YnWWz**`EX{WVv^|sNl2ZD$&Lqq^48ff`aX!C74Rf zf{5s{hd+u8KVX8%W3zXwJ6Kt5&aU-K6Vt?gqkxl=gr;#pT4}{8`0A+R z*^;~2*;$J%g&3>VUg4I{euCLop(uiS-{iro;}vU<-IXmVo4C;aC8r=S7Lod9Zb9Qe z->+Ea05AG?k`Mdv;-8nibBWmmF+Fq=L$8&~ zMbT9El^-~%Rl}aZeD_Sp5sTGjJ@^27v?z<={q?^rD`Y;Fc^{=#*qr4i=oUvcoFL%K zqae3((+6ro1&9TIUM`SD(zkdoJ-3rb)kPlFZQS!3ro_9+WKm?cT_#@RowL{#R|i8S z9zo+g>Urdbkj7FuFYWHm>WVR+^(FBs3t`8@gUHE^+CYFFSgLO7fYMe)r>xcHiFh$* z*{D5=T*n$>dgPV_>$aKF01>|RP0mOwSJ5#~RyXhR<5bRig)nP2#4K(?^U}b5KWK_$ zv@MC~TYyo7NtyN!v6eqHCX!lgJBL@YCCz3cI3*+-ag&E1n5ip?CHc8c^GoM%rArHd zG9e(i`wHH=^FGESh&; z`3%3jGg8WMb9$nzdl;KaqLlkBy?ePXf&C1BziU964Jh5CmCKft(6CQR*%{lwWU^An z4;JN~sE(NIky3=V1V1!mcY0^+#LWPOslV%*TK$!O>yO1l57KV&;t_H`G~F3ZBNue} z^=3=jw}7&twpz9r+5cm)!6R#zIMDZP_d7j+xMDgrE%hlwh$gL^;-YnGE?{N(aC2lc zG(YlJ7s!g(h$zc8>Q;mqY6qv?JKAL8|sGJfo+t*9N z_~w^aRL5|5_hN!t%;iH&R{?z#OfXdlYbgPbe84O6^VxEp4)U~grU1!zUNtof5tU|h z&zRoK2>g|s<}J%VP~$T93wcI51q>GIN?DZDny*Z?xs<=0f{1quaz=#3J{3(R{Q`h1 zfR-#!lE>*ihZ#dl=k#X3KQm8NCip4Bm4i&VCy>Ec<{Lqgtqs_t;oR#8^6lV)_H9ht>!pS_*Q_bu8)MA1F5Ux%a=l?U&GC^+y_cuBH=y4whiOkG!geGiv=InP>tSH@)g21F);^~G?ZqN%{ z0SJ)JvZ?0F%RrU{7$GUDBqH$N@gmiM{U75UN70EzUK0Iep|+M^$ir{l;l50 zzcqD-pFLdhV&1X)E_4%<-wrXLa|eI?cHb!rBlqx$Kv#G>%jm^^{{6Hva3jHbC!*Mp zdWQi}TL22XfvfQl(e4pG$ned|g(!ld=N6%%&v8$xzf80;&&n`!H|k^tJaundd-M6b zgm%Z7`Y$@WJ*MV^SM|QYmcu#h{&DE4{;InC;;vW96teF~4r600XXg40X2+xF-Mws? z$2&*$<47-bS9lgRM;s8t&*3eXj=))92Fja|84EYn{o}00#zgI8h_PB-Gf5mBcaN$4 z)mRI&uU1_eN9z+=ls1vLRDhYB?3f@vK!Ozn5e~?PQ+DukyO{RlU2MFdnRdue* zd0+QOueMR8H4n28t&2J)utbxu!IVwmNXoMQ{hl9TJc>RnxXh#V31dHY6*h%4Up^*E zm_31H#&%rB?Q0DU4V(E&+5;Gx*d-z%;XKG@ETt$}&^x}i8=*t;s9K8a#W&m)O4$*6 z^mhhatnJhKApoN$0@0=z_9>N{{0&N>XJX`^4lc%JzLYV_NWQ64NjnU-Kd&b*y&-fQqojbMH;)E%cuU> z3!66=XRw(L9MNR&mFPq8&vB;uCZtZZzKB=pCnICY9ee19rR6%MTdz*qbvR*juj^U$ z63A824b2t$k}8e*7o`Uz_yCkw(lqPp&JQpIsainy=k9(n#kBeSe7^h&uM8j}Nk3I; z3=SU;rOGdPp*N@B2kTuiH|ULOs-)2SX&jQ_@sU{^0C_0i6e&&bA6dX97$cafu|h^d zMrO>b_4x859X-=2vZ-0x8@~)rTZEP-|J*5=PB<4n3*WiwHyA?(JPIB*LV~xo^?-*$ zLI2ERO7E1FtUG~_;Je$hHxGU^x%vFc&NCPfeJSgjSX+Yp4!Ovs@DMhg;k*OHl_%Qt zg=y5YROY}fVQx9beJY4kk{KF(o?T{Wzvtfg`)vUPWA{lwokB?30jtjS>jNCn9dzPw zX3^4d(IvB*fw8tOs#$@&r>qh;O9|HeX!jnnBAZh3WxdBWsm=11- z4Pz_qmsS*+BSz?7onj9d;fuT(&8$O{==r! z65qF3s*h1%ZTJd67pI*VY~xEy!%St(5=KT;V%NW;>+j%;h?hqpV#6~fdOJDGLC=6$ zrBaYt++RJs>HVJ~6Xw#h#+>;7;bf|d{Iv{NCR_e1c8@s?0+5Y=;`qPrbtI?owI#nD z&Q+KQUv0(-pAK_bP68rCRlCMrIz}cYqF-h}K^Awt&jv<}NPrzkjPdu4jNU z$gPRuv;W>^N0(-Bc;;%LuMujhq&jwyk_~AID6)eL=clx0002P{>yLZMt~!ZY-&$H)I^7p)6xE-O3S9xIogSlyb0g&O z<>e6>;F1J=`d^CfpBiWB?L+eG`c20KRCh%iOGg!x@diR2w1h`d?xm~WE}8?aXUf*$ zBSc5ZY|+j``J;qQUVwHhFc7GaR@QpGSB+3Ujm5Y0{q|wrA|p-543VA}%yKYBlBA<@ zO1sX`rMdm8avUpJ74Ur{IYGyIUiVPs|9;(=Q$3Zyc9FR|Gs9I0M=~kGhwCx z(UCZ?rCmDjscOEsivt#9dw*Kmf^MWR$__O^bO-hfa^nN^G=O#hAP>HRK#@BTEh@fb zNWYw3pw#;G^-}h!7Op&7VQ2^^I8I#+P<^dOd^KO3IQ>NRPx|F?wdIt;Kx#XUb>zKW zW0<)+-0ftlo3GD1LAq}j=@6Rf4xc8#)v?ll1#dXOq)??&`|o+<#{5JHD7*W^z*;5@ z=JACVN1AlecBhB%t&p2gr&B;#s>)UqK*K*}GDDev(WiTSk)iZ_eRZ8LcE7Z+DhuO$#0vKSLiEAe>nMJ{e11^YKQyL=DsQ$qS?dQo9Y9Xcr zr(Pe6_D^cINyI8XVV2t7l4uU*)l9y++q|#62-v1X|6OL}b8G=o@`AnZAEnYl(Kz0N zB|Toht2hkL)*Xoz{#s#yyS+k3yKDbmojN}hUYmj4*$1HNmftbCuL0Ay->-3#Wisxd z7GXWA;&WO?zCVCp*TM70sep_l+zx23gqlz#g{y(Y;z8|e(kM4^P-;C>g)B+U8v5-q zZu48}_q$8a^JlGd-ma`x|JIz3lMf<)M6jd`K&juEju##wC_WW)fUM)l)#KP6h{o1( zOe$9$*D7zIh$rbd~!+gq*_@BH^+G(L=H=O*QdJNi49nsX+_ zt>gMickR_2<Xh7+6Zy-8tcCR@ zo@se$NPUGfz?6LybYZcKi$1U5citYJ!U*gCnGZwy%Qj-JvaQ*Z!*Wj=bQ+wtnrC(5 zUmn@}pRvdT>Z`SzNm$8tKZtEu7akO_)y!U=3c80?>3c7u4D1q>>W^a8DUQ!-$VQ$+ z1?J>6EUgCryv3;Fbsu%WK%cGj|2(qQ1ua{Vv>rtPSo7~k9b^cx1c<(`FN(|fBX7;f zbx};&teD*zQEeU@>d8$0O&>j zf>HQdkFneimvp|$cTFvHZes`?rbo1Ant-=lAKji1|8BfLXO)Y~(zf0R%>vo+l7K9$ zc&lE*#(9oi^Vy?jk#dN*ZsmEF!~*5B2}0*ps*0)o<;bRzgz9bn+X93_0snFwC+x!g zgWTCl+emCG+Ysu{Lzqj~BM9uD!`}y}r~`5oBfalWS@py2>PMLS2|2%Xm?w|8x^;Sz z@#EaQ?Oxvzd$^L|6PJ9^@6GbC-}LAX01koOE&w!sWbm`Iva;H483nl55YGXRh5bZ7 zKXFZj`t4w{KR3IexU#klqmG?6&R!wS+!Tl1Efns2(f*C5!Vj52DW>Cf=^{5|zw+aB zf&%og$Lo&YTtFs-Ed{c(t?LD}LDrh%4e0UV-z+4xYs&b=QX;hOoG#9_-WeX&XNwBhLQ^9jt~|Y9YlK5K zigsueO@#u#Ret>5uZt@I)8j0?(A#Z9-Q%LK^+{n2CZSC03ugZKD7X2PJdgr#f`fUq z%v#=Yg5>4pFaOAh$@7zM1N*_&kkP%9)5_}VDipbWQuAG|i22#e5%r2!_VpEc6H&{{ z?}RBqH)PKm+G_&PgZa7RURhZ)R`j6`ET<-;eMYOxUHDV?#KfBMpxepL=aoM9thg4t z#OpZ}*O7rcLiR}u`aLM1+hVKzbMv=R{AC%Ec;6_WP>NZYa3`!}UjTS7ef+oBTcZ;gf@MW_0&;@qGPHnC^~nWK{5wk?p&K+0VSYJ; zV_80A^~qG+Oq&7*i~5^=)8M+jz~zMN31l$v?LCC+14YoB#~w{;#&*7qCR=r=mK<{e z4?3z%=WC>0SG1yEYvzCLS6RzvEoNGsziMjld znFy>o(t@A)DxYF5{-s_EeN7a$@!W^uqWRw=&&TJRV^X3% z5FhN^?+vH-CST7lh$vq58W-}FlXyVK(BA{_>cNLYP^}rauSjOK6^*cIGUPit^$eeW zXN;-d4G9Y*3EjMwJhKcD4mO(=e!{1RCeM3;La}|jhpnu>97l=CVxQSKmel4y_jLT) zV_dt{Bx#}$l#i4$P~oa}0APodN5f4lCEy4+mrZruACtob)tVv9-owIeNtp^&X#L+528=WiWt(Wn|sQNiz5`+S_nR`t$pyjp3FEI<{CqgW?QYO zs6eqy{EwjQF(b&ODtxn1aBPnFC{MMnm>-NVE@kQtZTsS2`;mf-SC8>K^dNGh?5P?! zX@{&kG_3Kdt@HEqTsC`4tgINyrFX6B4WdVV-pM+*li|P5B*_*hCpnuWBF^ebPH4Ah zCw|CwL(wZnaCzY2Tp;7QX+;W^pM*1x2_=i4y3DOVmUk}Td$j(a>)8BJBQ?B?Kauyq z-@Yx;d1ti3?SR&Dvdqu^+DYmI`~_U^OZ}rNC9%}Pne$R-aG|h!*r0m!b+n7Mk!~`J zUeSlueF3EC-GV|PA#5&PK=G77D~(3U-B-!8I7rI4hhN4=yYqX#Bj&gIqMp?tNexgq zIl{j^He9f1=Zy6Wa(QV79t!0ld+!K}?oBYF0?xurYjy1uUva)m{o+LWe~?X-bQ?YN zkGu2D4djDlC+F=W+$rc#tvUyr4T6>i4Bo-^cVQQ0aV5)L<$0Y?*DVep%C(|XW2$4Q z_bo8rXdGZIfG#!Qf1a7qO!tNBG&VJnkdjgpV~)1s0bpIs?FJ%%ig$Zgy$dTHm(|tX zDVEZICA|)CAY#8s*`G8Eq(%+gdyy9|Kg#i* z;15o%_0dVyv*%B%T>|IRQ{mU2_TU#F=umt5-js9KXQ#>3t#L&w ze?-KiTsFh#^wfA^DRv+g>&7)rRSMtz0&Qe^!(pn9(l#q4&KB37_h}lr@uelBEu8>Y zK_;5>dwz3aP44@Z?+FWD&Ym%SE4It=(2f>=;^4RzoBYYD*{8j+)=S&ejKvn$69nNs zM>lusT3XIG2X&JxE02}vKyq@=+*ds5t!GOO{?PrKvB#`StH#Dz6W6BGyXOviZDe%k zolkOTG{E#wh4+~c;uB}@?`^aom@XzffabSvvryfa-t2JlP4|Y_ZmxgZ>(4O0=e`dB zXwH%Zte;6q3nWC?9sbPnB6<%HaY}?KO~0LudG1*q<~6hhi*)eB|hfQ zjuzq1_T_;AWR&=9XQQ!{h%w!1S_M%Gmpu9mpV-IW$$XGA5GS5asev4!+S~o}{{<8Q zT$~xu$KRgeXj&*WU4cLj2Fr3l-X~wlsDe@1wM(wF6|OiV_+Ye2p*Cd-Z(ZhjE2C?- z>IH}L_08KJnABI3X5@z0`yNpi@(ms^+=(^u9Y#Doq|d>VnW z=t9a{k6wQ8MX~1ZcyDDkL#uUY`VjNGn8VwiwXPVl(C6U!uD3O%0njFX7sxwWR2A{& zP2lp%F;Vv3B`s(vvQ%zCgwAV=&NGJ3ND&!uZ*gYaEbTmokOf6W;E)%97PtQava%c^ zAYJx2x zWMf~9^|_9?azMaiJ9l^3$fs!+7pM0Kf8C7tz75H)LIh&X?uX5mlPMITbg#Y68pPUi znw-Qm$C6+Bx`@g-+c{hNEodk;4P-wYCB-{=rBo7m?x5Vu?JHeJLzJm%%kn0CcnCH3 z$Kh@Q#T{Ft!HPzm_D#h)s_*o2$!%MaIz?=~ynfgl&gQXNHhoB|5}ywcaA+%o-^zdGYaUuo4l13{C1v+|OXk{Y3M@2t!1>cE#z+>`3$^%ai++_DNUfx8K{-lC zwal{}eZi!Q-s%LzjLil!w!0s83S|x!PXbS`4a4(POGbrX_5tUDBw(LUYQi#YBTQ-0 zRZbJn6wVo&H*H%E+ke*(D&V@r>>w|`!;tAla8y!fn#{9(+Xw2Fot1pyP* z9fq$9B;Z1;?`}GcT>}TZn*tb+RR7x6B)!C&-x_K zQ?h_RylpZ|*cDuaAI-2_o{hn2a&X+mNZ`50UeTR6uWw1!4#O(-bY*CMp>{&m#R zf>W_+kl!g!TH73MWpmR7QEZM$si3dpuGn6!&P9ZjNBdXF$2TYnM2oZcp`ZZQQ-d*1pZw~{t&X;Gz ze)rz!);JvQ$k3Murs-D5(CJ zt(REEUgcvXFd=Wh4Vh!(YvOm(|Auh5Vl51(^9=v}% zQRP@Rb9*sYBFudYT2HnYIBr%SeA`?unA7GPUtS-(WN3DNaF4IQb^O|E5%mcJp_c~i zq`1}5X3!%uZ9ulg#H|;lxMjd7x=`||C}5!flEicT0+oG>_`yEustrN*`cI{T*wx7F z$CY~s;(hWC zo`AGwqFJF@0weOwd%%xHVDI6i^goW`>uhhL)a2*Z<86nG5BSgDW=6*WkGPq|D4G#Bjq_iS zUWm*U1c6)!5BFgKr0;}4SbqAoEc7)FGWqU{`GRI*z^lQ25>cMvT=E#Lez*Hp%4l^| zKaC>nUk4x}AV{kh4PKO;uk89(YZvMf$yP5oolNOFOz}y4%&0C>F8%InP`F5Ya2m;8 zDqp5%X#6xtNx;)p9w*|hXyKRbSJK+`d({dzKJKY{Q@V#O8_mT%+1Wkj1FE#qA*!Ym zNWOMaG9$LFn;RXXJWMJ=n)LDkn7YEn>y1ezymgt;&hAgQL?Fqv+wsll3sf)p4av@*uDL8Iav+WSCgfi`N{a8-_(%H$lf%y z_T7~2cd2GLFIr`3L*cR(xu)`5@w#tK0M3G$P`H`hG8_1{_W)~+ZXrQxFP~Nom?bc} zoSn!zqphs6rt+79&+K!9`H9s}%k4e0DU!KHN3@2(@>-1T-j_ySR>fP}K!`+RL5!U=+=hj8Ajm6RaMAgEPLLGC_3zYn0 z-MB3Kq^`V==*~WU47Php6JuR*`P(D`-}D-E!aBgM)}oqev1hSa*P8QtIqf4`^L${W zN#XewlK0|X5~~dx$U#fbDI%uzSccC#ro}h7A--y7y92=uukNIbz6h}=o&WyH$ZDtDiEku53H&Z^Z#4}Fm6?}6GT5MUd=~N=Ovh8L6q_$i9Oo&sS z+@Cdgv7qO-2NV)GR7CxJJeWrwCwDU&?1x&u6|bP7KHpA208iG4b$_y{-HjAM(=bG{ zLgM6dG>U+y7#5ImLFKQWSemLf&>~X}cV^qipWLyAI0EJ7-oeTZ+35#;6ki25vSJm@ z(b}uJ9qooL6?*G2)?#y!&Uj4L5qNUJfib#i1&AFdpwrE%p%!4mTE{Zq@3409_$4hZ zmT~3Q(Y>?Klmq`<{_2-y(+q~MU0*7237l6lsYG8N?y=~l{F-r3b@Ew_F|#aw zCJ)NYiF<8N?cRUoO>=cq)3SjLZvw_$tIcMavSC;*@b!1XCAdVn&)Ki1@etBm>@8Vk zk@6M2ZAR0>j|jxGHiH}ov%1kTuP#2%D^wRvYcu5NmpB!$j&Wa3VYTPr>ALp%6)UVe zGd|aRvCIn73v@@#t3{~_)aut-B06iMK-p_r$d;-T&Y`-!<~aAcZ3^`rt}>}Fq&#cn zh6)<=lC@{cO&w}HD-6#vbqPHJR{-;E>p|35snR_qpVWVM$5MCQdxd9-=l=Wz651-i zV4Aw&t{LkF5qaLIh`wSiSzI;r~gr(>ZMFZE#Ul;*>etS5mhZghsu3m6k{0uHbt9!5u~k zokHdlc89GtZ`H9Du{OVkzqHX~RVYFw!^J|_h;y&DSJ;Gd(DIfF17>sf}uOrXt+nlIe0!G&9 z#lrt9?LB~++P*hXY4A?H}mG586e@Dob0pr+H0@%eQWJSwL`yju%ouMty1YqJPkF3 zYza<*BM3QL*lXE$U3Z7SjmzdjsRKFRu!9veUi|7*4*-R=0xATIS30H*3=S$V0h?)l z0(QHYHJ$h;;p%7%5@w2>SwdFSf>+%<8+?aBNts;~b>@wZzNu>i`9rv3?gWGUjm&Rr z7q*jf!@EcJzBxPKp6ls%nuU7Xv~`1H^e(7;I_Qvwb{bVTNJlUm`a>wNf_aj@!>9;n zqv(P+Tu09_cCc#(52QS>&nOGP|0MK^r{5np&8@$LN2-2&j5iqlj9Q+Dx<*8rH7&V9wgLy)P(r z1+?8n9AzS{{S4FU=Zh6$Q)>6ar(Zm395*B&a^bN*?u8aA8OJR-7_F!}$!%1f8p zaPCB=GtSgiqL+6k7wM||WfcgU5&i`vN*!%mT%V&Da>IJ8)MC8Rzfo93Wapcp-;)UW zdAej7M+i>aG0An&iXYJA|!Kse{5}OYiedn6X zJLtLqaoTO?^=5$WUR0$A-k3cMNcH820BXr%d7*^hSV3qJDSn_2*#A@w2W*el-rf#) z)(JoZ^F6ngR-=@d`hk2h{z4$Nu0VlY=-iZ3D`Q7*FSQH?WgExjy?&=2z-nMwp`n*R z1FR7;!n-cyXMVOv)wwJOQ*^?)rF0Om<==i>Yw0%ogUEu_bg0ohv1s4Ycb|ZUKY7>m z6>uf*8T#zczUSfN8v?eSwJ3R7Zav813nYR*c6KghTLrQUA%1=h;S7=)a9&+xUY_#N z(UI3m`ui3MXEM!h63AV$4m9-ETjihMOg7`;Kd$Qr{Ip74G8v$K&Gt!&DWNWmlYMn- z4^u2pi0VF;)>c;fg0J(Q#zwo)nvo18mV* z8iLg--h0O(b|)D5we&ZqyHlif1N@Ei#%oRrQ!vxnF)=aw9+W1kb%doPu&OEm<;k+Q zOP?$Q1&*(lOs%2w-M-J<2MuH>hHMu)`l^T};Sz~ufEN;T)j}Td5fSXAt)t=mt=ERb zjo1;t-I&aR#vCqfn9ab)TBt(7TPDX)JIU#Jif!AD{+-Gj7x5+D#7n7zP4jfdnOMBI zv05w_ItKYtjN(_*$(ocyh{`4rGGGl2&7BaGl*^LQ5gK}Z)iBL<5NBQUqC(SSTG-%Z ztC|ssAqpN~Q4wnc*(#ewwo=Pm_2F1NE^y5&Awy^wbYefM*KYq8nt&R3WBpadg--!nuSLpM3&Uf;8 zcm5Ms2`;LUN$^?pXYCN0P>Hb#o{nv7yw^UTyk<)&mSyf-4r|$kX()?lC+7mLWYv(Nnwr%g0r`4)kL`PDcG?ptG>rj=tFhR$JkvSF6hSUCEu2y& z=UY6zuU(s?kyZp$Xl|80O9lvJqx^#Bvu7ET4ts7mddH#~qXD@H8K#Kv8%bz=CVM$U z$6K>JA?5;dJQ2ADs9BJz_Xo&UqV|iSiP&YUl9~>MXv8A&N72?xS65Kknqf(+^@N}{ zVRuJMZvi<$LuYAQJ#3v;e3Z$v!9&d<{r&^)QO}coC){8WOGGDN|A3)#3;#eTVx_A2 zY$>xVjF8x;SX^ed>h#$c)mn?vOd9Y3?6BwZBEJD|NWR`@p8_NHT78Q#hHR~^%ggMQ z<@c6`k3P>&Vt5eR#G{K0j4XG6T!K#YEbR}O|3uLEt1N|&3phBOSvu#q)3?T29c)5) zWt!Mx?c&hSe6p_u8pti;rZCKteLsPIe5E=kqr~Vvl69Fm3_16T;eGz~`C+oaEBv$G zvtI(@cX8|Mp&k+}UEheODW)dJy8-8?waDyVZheiOKQpylO`B(0?9R?@unD^($FYtbe+d!G>5Ka+*4{b`<`Ii9FZv@<-LA z@68>+4f$5<{Z-QxMP;8>tXsyUv-q_2jT0`_d*caELi!_LIiMv-`y{Uh+%*1Ytf;XO z%Bhj6Wor8U#--fBTNsnTTLE7642%K@lp%+vXPfgDO>J?VQ_b+Sa_cTl_7a*~q7A5x zu3(>5|M1vwJ+fq~Z7itOiSQIDWAg!)7dCAlw_u~4iV!Hcg6I1Jc$_F(Bh-2a9GR3o z=Nmi>%n=LE8kJfk4u(W0H|R`dx5m^I>AOpoH=;98{3A{ue?KZ&=otWZrBCrI)Z6P) zL2na0R*-@eK7>8I%`qYRU@lt21}NLXI(D>@C-JXRg~FKPM5`2yNml{1(YRNRSOBno z%*rq+DXDFM1k?b+Y^laJ;JU{Bf_|G9eX#}@7+d}RT!q@b=qVK}e#EhZyRm)GBUi^P03D*AT2B_8S=Li$%c0-`FpoJ|z4@R3mDG}aK zq0@o#oM1zVJZX7v6KYroB_+mrL#Mri?$D@DM#& zdw&qpxDPWFh?8q@wSMQd7aQ(gPGAa~2%IcRzwJu2V$XGy$XH|j{BoQs?{?NnB&8eI zC%LC%aODai^;ZbfSzx*vz9 zAkUxYIMm|Afbe7xES67?#_b&*TijSAYCEh911eLc-!y)C-+#};-vh@OTL}NAo$JOP zI9InzQ<$%5r8g_l!OtIgxHa&oZJ4G^#m(T&P8^QCc8Jb)KAfsL6r?n9+~#ZGaqFOh zJ6A@6dZVvo>eVFVy5YRjw`@CSK;P?k!bN}*xrXo?%H0MPd3u0KWfPHJ_uT9jtjm|2 z(p4WH*(iFB_;{CX)^-9zhw2jjBR%u|LE!)cFx}&^&76XN$LF0*EC+%y;aCTe?s0+l zqRyVZo+las<1ST@TPfE&1ne)!IOdHCVE=Us8!Uj15bP5=9AL$leq6y>_l~sWV5vm3 zOi>*o-spHZ9x&5N)J9;I>g@$uItn?ZA#B!3bmKhe$NlCKsdum2OXcR42`|dNWA$2k zfg0C^BilU=6Y42Dj2G!k44v+UCdHblq9Y0+N#0);%n{*e;avL%70yZ@*fA;MH2m&kt`UVC&+k+a|L&DYpvGK%PTUXb1y3TW?-ylI>1`^J# z@j3YO^XtsG;h;-_@GQW)(p_wev4nh5E>YA@y#eReMNKJX57pgUHFa@<2X`;71!dy^ z_i7q`lh5C-q>ZK_Ec>3mC9GZi!ib@d*3_}j9x$_m4AJhoh-NJ&q7%Fjp6wHd#6dRP z8gE$GNP4LvJUPzsO1^JssLnnIF-{rC*C%IA0mg=VP+z6G110$))j2M=Q+p(PF0!lC zsI{hxXS7{nW^-dN;G7xb=~qrmK+yo;1!=%kZyCOw^-_gn=ucb|GuwZg|2~s+hSl|t z+PN#0VMT`fk2(GJGkTvB`aH?zTsDYrq+dqzVDOXi3YH%DQY>8P$Ca|cDU zTAkG5zO{jzm39@gu_b^mT1Xol3_NT7GKmGJIGPhEmOqeD;3W32Wr?z0|9yoZWVzz| zSLc}H=DCO)DyBPEWJT~ndoMFMY%3Az{LtmfMcd4bLTa3NmaJmLnfcED%a>)+4Fc;h z3P>Yl=j6nG;7on&=~?Z!-^^?SxQ$*wHM^a54L=A71VSPZ{qn$OF*bm^l1axr_t^mH z)qa`6!yAPB5y-PF(?9BLK8|{*RBOw9-Zur9VRxS4J!l%q0)K3XNViCxC3RQ)kQ`xq zxPt_ud|+DR4BfiwWacRMVhkH=5I>@neKxuG?&Z=HRm6EPT1|`oFKVG`aA!ZN`T5JKm>i%{oG^ktKzS8pHJe_DYDv|HK zu-?@0kjyX(X$*j)sY+xHWCBWT^a;4JZ9K5vRoB0wZe#O!IR^~ay@}+ukz7``CZKr= zw%NmYsq(nG5iJ=K9Lm7U`_x2OgS`~S4DRu7vByJ)=euH{3HIwYy*Yf@ZMRCj!An<> zkE1L3Tu3S>d)L0Dztvh_&nOR!+0?nK4_~s2M1f#+%b9sjNjxEMSmWzkX&V*J3K3#Z zFCAVOoBnDZS@d=Bl{51rd2FwVvP|9WUXPhH7G5CVCCS}6Eh}a{kK_|A*Y4=Q!C)h; zMe*D+S8IB>$dU~tYlDepo{*`6Q}gD$Uc)Wlwe+rK(7_L;?p`R|b$hHg^szuJpTSG=4f5QECf~ z7&*vRev{fy-~TbHG`|4(5O5(n#_IF&kFWghJmAlxW>VJymEivSS5qD>O7eAUG4NQT z$_a~38KqnP1_AeA_uZ7-mrKFW<5J;$YT^mA_P@VsMk%RKUQ_^dp;f~JE zolNEV5`4zTB*#x-C0*FZ`?Z=Y?gTe0lAN%kd)o9`Cw!)2H z&Ys)Z+rzvd0**}rM8!Og%|QM8GQ~F%a4cC-5^nY;PqOgcPOj+CYAK1N;_s>Qu*W!o zFM1@0dDk}YNbZ-AcwF_h*L2Ml8gA-Md%qgk^i|;}kqsh!3jolFdTbbGXJxh7pw=!z z_ul}yBDotI4%e?;Tlo@j@eazO^G>_Du$;4bbPS1C1}JW&ZRJP$z(U7_iXo(`kD9yN ziOINu>8a@AlEX^v^2l#kfAov$2*fxKja8hzT585Zg2@gwTW0X@69-vg4Ch}(E!OLG zoZR{s#kMY=#m~75TrdN$Fyn*L8Z?1;~Ml;U%zN7{@thVo8a z)_Fi`+U5R=yRe~8IA6TN^s9I_Wk4ieapx8nds4OykdZM~fgax1($LA*CKZ4|xnXtc zfo%W|#zz`*Iy%6B<+KW9(hTZ0{J1WAu#$PF(i-ujZGKZ;zr}*)a9ucPa^opt>cOMEwE zs)iOLO=2m}Wd|C-?G3cz9HO$_916S9Y7CS5I+fWHrSKLy={>=uRY1-{kl|76kW?> zoe#-zfv{v>xG7r!5Cp(KIeWK&nped4ljcRrBk4e^z1MUg zdIyLT9v<|hJL-s5Nltp_-qXhZN7v{hTt4-;T*=N1+bovPraV7bKEH9w*D^*$|4dU@ zTcQ0E`x)=%UsP`0$+>lOH)OM?Da@2amMvXWRHc{}M2C2g`w>xPqXol9hr4D-UQHF1 z@9wjc1E&*=7#n&w#c+-&t1_Svm_wnMfuT(i$HhyANvCo7U|pcAc|MI+-tJr@Pf zJ?|Um!)-+fF*!iv*4#nFj4-LvI4)G3%D2EPDiL1r*XLNaN>a(0%R__mc5rrEgi;-+VNIx$OU3=nCW{`9mq?OB*=aFwxU+ka1 zol+_L`Ut@I^CbH=jJ$l`-W|$&ZYF;wpGHepe!H$ET^c&vsp3m4(twQ2(so!fuMa&i zJItqH2LZS+M3;FHa!U2FJ0n*3{G(_IDMK*SVILn^Yq+{LaOb$qbigIA8D7)}J#j@~ zX;0=)u>zEBENVI_V7+z7!Z^dOd2OBjd9@V7+x1H(k1hC-;Nrm=)4(&{R~uTS9Hx`* z499{1kIQE2n-)|2{_h?K$~WoPxUPPhAZb3!p5zaR?qO%mb(iC@iahmi7cPaj@oT^K z3=$0B50ut?KQ#i-r=LB8!ZO3{4A!#dd|6my-EVYycz71oVY-bb*n9fyAAM-FE984! zJC$kV8dh&*5zQJ~2-2z{cl8M}x7@%{K#ILrFae^syksL8)CV({`p`?YmdNL7LgfD5 zyNtR+HmOWcbAi*V4w@#7>q%uvk@^@pV=4>dXj#{haF!3VO|DZ zZ5T}8z}t?AdsK%)8Q+B}!}dbXolGrS@GEKeC38k|*O_ni1=@%}64DDG-vuU|*!9O2 zf-J1Pe0?(#vCW;F^m}?)X}PsKA4?2fueCrrlD;$&?tn!Dd^~L$JjXvK0X#&(R1L$E zXZp6n+hLMN<5K2tJYLI*TjuR3bT*9LT^9?dmH{`)cC=aX1JNH8Na?%b%L3%D{+V9A zwp+Z@c9m;uwZ57sMuAb`DCImy$fw>kSO!PcD@2DejAu~FI<4dY5<}0v9_4ZMRFGbR zejwLH`#p7XyZw!pqP6F7vm85I;#Fs^Uj9Y@t^z!&6R9!?*pk{h=v1n zvCVLS9`MI68%QB!J%0TZ`37W$$z&fkUqP+Y>*(PlRe!lsz>f+BZP@Y(=M?oBBIBl=Lb9%5)7s&~)%nlo}!@Nm}NHFpFyBjvrL* z#w(JCJRGQE?WcVy70kaV9Z1Q2eeXWI+86UKTT5Pl+tUxRv# zVMw>}n@26C3g6h;r3;%Lk7xs!8rMZezvvo|4X=}HOw)>J8}|Sm&(3_8cJ0alTTNA~ zUlz=ddFGR+y|R1BK-!3wp&^4P#X4pQNR}LqB^pJBbv$zZ=Fy$;jTm=0%)uav_F?AT=|Xpsb+5@~=8HEw5(7B~rj*FUV)=O1UV zHz2#S6&oO+o3bf2T=7jP;JyD70P()N9!SjO5hL;@oVuzxpnO-#cFY%Cjc4(Fwz&+< zxl90Gr^eU~XJZ;fX-Hnk!=0J8)HcA54Ept6D4@0>U^&GG*~{%9G*;isAEpE5-8Qh% zpQ?r&!8|#WOS7}z4BRc!uC-xcE->7`LEE8BU0ba8O=Y)p0cwqawfb9V4&RP&Ht!HY z^fco7H<~5`*b$zeFJ?CRnR;}^;U!Lv6S^}SJZlLWJDF+D2&X%WLA0W*j_8}D*=o|JXb=u76 zC*?E3UyC2&il~bO3{tZ2cU?OgSl(VyAZtOH88uvCT?`C3KIsI8N;erP6AfB~telve zz&Z=3a_5HXnk*qIaLf4K_f6MkRw6smNEuC|wr6-ZxVRn)6T^wO!Mk0rR3{Ths`6_S zEqJJ7bt`d>a0~koQ~IRc%0%tUo97gZz!$qZCbVyR>+xYm$mSyu4Gq(pC?cUsbpHc; zLQUohh`qbPbJSk25kEu>J1J-o$(n`kI+HpBa6kcvVoAN(7TEk)od;O1HNG5;r@mlfr1m;*LU$ zy+8_mBqI~=08C}Kfd&UyP5dFy4EmF(rY$DE3v90hk9PTezaK=nE>eFk*&TEg#m2(@ z5lI8FHZ3@7Fkw*CD}v2r&7HaX*5Aiv&8%NDX~<`{j`x6VTQr^NNDUHtGM1l|{l=H= z)g6nkq7*Xxi#pv;BUwOnRfi=#%+tjYDU2)=hB(4ofE;u`_eODhmJUxmZKtMZVBL4*?$~nHKaY$s}3!t9AbpgN+ zu4(1m=-pQ@j76!wTfh%NDz*fSuaX{s>=lTErKpg-WjeVQ|4b+-YjtE=_uDDS@o=kN ziKL9;pR7hPe_n8lyCmRwTTO~Rcrumu04M2#YjsnT)neXEecNPqSYMI;=s5Z34S)U` zVQm1-JkiXPCAciOf^Q8|q`u3S_?RJS?Y&F)2 zVjwhLFJW3qp;)*QV|Dvw65SkJl_}rl4=Y1PW|&z8f14`ik-8)Rz4bCx!lh#4({bhf zN)6T2Tl=0p_4z}CKk&}b1Fnjm3xyqh*4ntJj!OCT3!;c0UT2ui0z7)6yclo8X>)#< ziaxL8<<*>9_}l7|5CfY1aFl;BAUEWxoT?hb$pz=l#yzIr`Xj8%mRIWo@h#=P>26U& zgu2AUtPC}H2Qu=s-VE?0-+k!pVOGUk}6Sdp3NL&M5l? zpntu(mP7`N=Q(+~Q&lpfIb|%G!||m(6GMHm#aooQaMK+;KIGeo$CE@hy+x}s@`*x; zf8UFCU-o-z8uO{Rd)FBFC}Eg8gV}Lij}(f|Ux3M5ZpXY&$7fWyUnj%@giUlk9Wh-zGGk3k8`l2ksA4RCbnd z(?Usbj%F=)er!W2 z^~7;Y24?Gs$BMTgmI~2X9HQ>KT>KM4aSoaY9iqwwOYOXRC1)`iA4=AM!I<=AcnaKF znGAqJ#h^(O<9Aza_%6yMU$X#~*w-%yv=)+xm8D#o8s2BL++**Yk^vGMF0~4^(uwWa z1q&}r)?v@In<~gpjAwO$CC5wA&sRLM)59KM412$@nc(c( zF2y)HtalHHn7YvA>Kz?fBKs3Ey429Y)xs{{u6C$8A-lhS$u{rVLs=@5?FGg~?$(Q` zW$UM)|IPKPTONof>yg0mH>SW5xf9E0jj8=lOJtVaercF;C-r}NCYglR6eqi^9-R<< zeYbZ7w?Ese9jsIx9nc|PK1h%%e1w_l%n2L>S{R-f!(VV*BkWE8i~)sR9?B1lN(mTN z1UoTNgqzs&p!0j~;#cP5xAS}}{omO|i!nKYT?Wpp1?rgRB65#Bn}hW5a@@Ccn&kla z>}qPz-R;4lk3CGlDPqGyrMOC`WB6zhHZ* zxq3zN$VpcwT@{7s_44oG1c03L?m#LH~*rxHD9NJQc!FK@vIT-0&t_w({AA-6oJZaj>w6U-HFXBf)d3h3&+^k>SyYG-i( znE(8@84i8Bva$FJ62QxKepf#0xj z7$YJ52HJTX(9@1dbOkO$4Y*l)^%YbazQ1FuH)5c!Sb^;hD^05S7xCin6{>nkSxpQL zcQ&T{8k7{bN^hHK71uoCeJl0wS)E7Uf=5!%-U9Y;w zQm9-=YOIB42x4Dg-hHz@}cOCqPI*1K*`YAZE*B2yS?v>dcP=vsz$f|A6r_Zk08=An3DF zAtRSiiirpL!jNZ}DT6l?NOFa-#o$Nz1IgjG@!kY-QPI3Xp~h12pffz+iz!MHcATQ_ zHs7m1@G?5*m?I{IJe(EXLbqsj86q>g<#k;FHRM3uHE;OT_hESRh!C^zpN=Pcab`}8 zX4GnTYL9o;@dUb4(TKdrIX&bp4{&_@*7eUZ_EE$y=fO1uoo;Bodd??UU-MXWT25*Y zUI`TFpqn&^%m|y%vg+1-9!$~$r^oJ{tjt2R^&(ahNVG!Sg5Bdx5jEcTYvl;7d=cul zS&R~FAvC^N%z=klr{Vz-Yh4_KS6;}0)Yp_4Dca+BU|CGL$+B+?B6KpUfsbexDojvX zz>9&xX@+;L=XtDqXTb`Hjqf8CwaAIB`r^GDG1+>gmRdHU!_JPHpOY!b_h-Ua(yT}8 z*o?hn6|iQ}>Iy&`{(|_g*sNPZZ)HyB{;|gB9jri$Cm(7ieOFm`Dvk`9nES4x^F3V<2A4HPp>}Vds4s8vAynj#dAvB~;gN4@&k^S{^t;L5jjQnucdUKlUm zQF~R;;9a1#LubFUFH3J;IQQQmljRgtg`M@opBG%IXRf;K-+?5BP9 z=Yn5A^q+SoG%OVV%~>+C=zmDQ@Sh|8Aqh12b2PC%_@B%tGL9?%AF=O0_xbYqq*!V>*?B*n5%)`KS_hi%+wM@;*NcE?E09J3qs!t^~mYhCu^32Tqv_zNM z#hch+!2;bmwX#RT41X_--+pwLLS|2c8B!|AnqzP2zvS25-NW4e;_oFU1N0?q-?s_R zvnPptkrOg;Nk9zY;g_Z@y);y)mc-u+h1f$4Y4(S;KoDohn;$oN`f(z;igsHctkb7B zF{xsZ*}s=I#RxqE%~)?a#Ibd!#^wq7Z%|oG-H^oKv-8ie^s0fPKFmEPkt;@&*EfTO zb*B9o!zLbOO<|>(@D1;g7v~xNF0ZdX@EwCpG~cL}EpwZCIk(M)=uW}1fEGURUDd2q z4rZW`anP1Y?=sF!wjQI~IV^($At@+Ep>0f7SiUf-rrf&V_FofHi0Yf*MO*OWxqAPi zTi>K(T=8j21wg*_6WDfwXIiA^uq!Bv6`N~}Pse84 z(Bs%S(sKX&kb|a9qNcqf#3Ddbk)U%O$vyh~cN`6U)@@t;AwOQa3GHj~8&yiU{)4T` z=$%hI3bFi<+)Uksv1#()@o{ZH#ku#p|H`qv&}=pHGdr;l?pXVMYtF7MMzrrQC-kbF zO@Q_F)w0IRiDapMnlr5tMKwG1^LPYq?Y7g~nnxVoCUfiYP>0e^=kST1HFM74axsgk4oIRK8jH^1Q>b5kfW4h95n(ldm73Sv zAjxY%%Sm%k)Xa3WzGfyK zoOj(;EuLw|c!zyh3GZ-u<3*19a-)T}j5{EUY_9QZvSsviGz!`suaFoSJ$i?yb_(y@i2U z_Swzc-5_1_C#xLxGILt`ekezy^k8AgC12{oPf}28mR3O8vOoJSPp;yfYI$y*`>U~3 z^*2ee+aCwk18fMzH~8aaS z`b~q|T9@}BL$7fIu_Q`Kdrx9Gvd!hvgJ<`s#58@`J~cK=eH}HMSDpvf?4g`B+N%{$ zBA~D#K<;^l5}vH$8t-&)ng7>+WYLd&md?fw`Bmtm!##HTEh^boAc#?t%JD+&`wJX0dy4$wnVkl71~0ym zKJM%%Hc`=J9gRe7%0QNy>tVxv1Rr<~9R2x0*LC``7-6fBw{SBDh?!-?K&cu16MDG^ zmAAcD^n!rl2i=0|dOmklUR|4g$mE~CtK}G7u0|Qy--uiGe&+C3=QMr2TFLe)%6g*^ zyuZB+|GwIb4KI)pJ&ZWXK|}Xl5^h*@Z1tPWJD6GW^{xX}G>2Rg80BS&agFq`;)L126>Wt@@+8g_L7M0=*j$Q z;NUeKrK;De@tF2KIXU@)d#!K8sp|8SbpLp7IHxdTg-+f39njt)^+%rLX-LRRT2#{p zlp!*A*%vghi}qMW5Z|yz^g?TpjkaC}{PvAH{@BKEnY9w!L#b+dQLGNFPfd45;0Q5o zV6X1~Mx9KR7PM*g)n%u&=y=^5Y*_JNVu>C5X5yNm2LVRzH^{T+I2}28w7Ie&dzQS!^-z9xx|*G7(7p7|d>`(qW`Yxef7&%`xHLi#wyOFM^f(E?m;l$yG? zDCxl=utkQcB5~^Bn)!f}CmY`U*K`oN^Oc`seVMRwC;>Y7tLdADuEt6Jucb17=Ksz7 oc!n%4-U|gn^8Y(t?eCwQdYyKU%RBvnHtD}0MfHb84@}(nVB6kg6geH7X)1O$}9=qJY$ZlmLOm1_%fU(yM@ggc9jB ziS*uUXpvr%&=LY^C+PFM+x>p${5WHL&-upq#`(d>xNmZ=d#<%+x#l(JO7H_cE%svq z$5>cc*zeuF{fLF-U^olQAGt^VVBU$Q%T_Z#4!A$ky2Vo1eR`RB@u%HQ-J2{dMGVU8Z2LE$bX5JhQ7`iToI1U$~!B$ z*A8qq$K-ygbqE5P6%vPAzS@qbDbolAxrSd=@}m;qftS|LeDvslt1W0@DW{s~(PUckcW z6O+cf35GG3{xOF)S7QvC07A4b{;hVBw(pj)`et^Q>K5p*i~U!f-cbYTrb;j%C;_ctkm_!;s*UHXE!7nR(0Q$(+f~A9z7TK9(cibmy-G*a za3d(ryo9C&qEqKKkYKvcbw&@~Z=2kfhThEt(RbGI!6EJL`L}bACHWCr%r=L9-^qkL zoBO%P+IvOs8&YwZAUiD9&1u|R5BvKjoILf28y747&kYx~x@%Z!_RlSTWR@KZCpR)G zAtP^V(3=3dy9>R)hu%Z+B8*X+xOas`r4g#`HW=&#V?rNF$D?Z|zN68Q&3VGas9EWD z38Qjn{u7#B0A(zq(UdL4Gzy8mV{es?Ljf^wfE3U!0qZ;c#qpMaw~KbU7R+lA#YLcA zGy~cq`TT@iy2|@eNen8fC7jVIPoDz8+^iV@x+X(KWrp+Bw!(IW(KGi8=K_ z&_0WeC|NCiuHQGou55o37=8p@NYuYQx@YrXOTiliYuqtYs@D|2s3I3$frne zf+Ct86G)f!Z;-aA_QL9yNxD3geY!Cv3oYFMmRH-HfD%j6P?C{!1Qd6bYbHel+cn%} zi+OA}r9?hB{&oH@I&OaUahBEMq%df?Y~mxl(ha5{EyDU@2X)(9O-GU3JMmJEEvdZ-2APOkj2t zoZP%2)$gh2x2W&CC7s+&-TYA<*e+)~+At(a2!CxWVq)T1$)7pXnZV#VXn#SGQUU(WbANxd=lk)X8a3+3$M%lBdJq5qDbk zVt`fE4eI2q8AbR}uT|Lz5%`@qL922E(SvU1~_ z?K$WzSv;#)3%*aOEH?yk+6{Ypqn(uJVLx>E1{}zpMlZzgq5X2=vx_Jy_4@zNf~zmH zLUThz)5b_qHT=_)if0B8-;bk=wg$|sUSc(N@f#o#RAUfUkgb1!Y1VEFiU>6)t5Kh} z5L}Bz1FiF}Gu%4KjJ#?G8flNquhd6Zxvv{E3DcGp!^aB=w0g19H;l(!`u>aWw3D{c zZou|pG=|td?R4pPk0J6fI~q;~VU_54Fu>Ln!jdv2t-c-eVmA~(ZUarJY!Lu3ybBEc zDteP?babj9U|4p;15Hg}6!infy*gv(q50dBihDvy_u(^&1XLc{a15kGmhT-i(3HhY zL!TQMF?Q0!FPCS&Opgco|vJVX?`$i$_8=$#8w@9LqaM7aFo z=GwKUN)znpxbM>JF?QelW?+7lDn(df5z|J(MQM z&UF9R%Lr^0INx16bX)&H0&O9Mt1cqqelDXhB!bZtD~#He94UY?hJtBes_D>0hezCx z=v(YNH1Ud62w`phzKp5c$TOyg9wW+Vn^37;!nntFfP(wK#m)93(f2vnzwq}6sp>Z{6$7Z*>YEjV(HA06yV!;rF$oE9&OdR7 z&B}gMyl?W)@OG7W3vNC3-*8U0Ng%VGZDu|Cbik zMItu@*Wrx&v!lXHgvB=Gx0#f5zSdM=QEn{exaah4f3B~FBjGH{9se8Gx}t`4BMyIv zbp7^>>B9H(f-FMTra>1JZtV|yWA&~fON!0^#x)ZM{cx0j9cla9Gg9tPBH3SY6y(7XNoW{^RT6YNUfIw;{oal3hInE zl8R@PZA!HIuHiOVE@IVRV)rCtlPfN(T)q|FRa_=lb(3iu7hGkBnATzO{HLaWs2%{F zoMSR5G+(phZ zv#QX{v`r*c_AO_csh3>_Kj_p_JX0aTd;#B4l5*GI_V}T&ts-s8Q_QS0=s;weSir1rb10Ez9Xj=Mxx~G?y8#0!|&U`i;saMi^=thvq@VVfy z6C%rl;T?xNf$vS@;qiW6lZOj-;AFS=BIAf&kk@6KbT7a7JG-oByCABD2$#oB&O1`% zPPHH_TAMy}b7h)hgqWDP-~Hs{&yo2db4voyZF9$9eCsi0y0N zm<=yxg!3+&wvmh9b_{&3bxsyW{YtShMCXn&0vt*lwjFpS z#_gUS!&WGv96)U{yl{UfZK@%!hEV-u;uY$taA>VVE_FCLWYM9GdzIj`($YX@!N1ZU zpFRv27>`u~O_mJb7VjR$7=JWU#TJXz%!w08&!(y{Km-4%#CJKQZNVUd8QL17Sw}e3 zqhbuZMyA`{A(}DCzwb-Myr-C}_V9}06?e=rX2j@}#ThJ?vd2V==xqM~)1bK{W0OSGcFjewCgX+P=4Tn!?iATc!7PQmb@&aG(L#GPq; zj9<1jS;NF}$)M@87T}!WL$o752APi9eb$>(K$e#ho^Tx;TY`wSzt~=hR>S6SI9FEs z8T0tPTrJvkyf~fftopoUQ}7v6PK*sgM5;I;#P|%d?3(0LOo*AVf0L~a=Wh}>MJ5WQ zp+FTz>p%=l<&n|Y~fLvDz*Kn594o0~G+ zJre}*Nc1@3$esY_qb_kK?PL6GHUV%~Za9(c5Ns^mrIm5=zQ@_C8*;Obr^<_G3ik$F z>fpuEW9$03Tx6a@DtnLtlN;qrM23HBy=ZEfdaLVp`5Puo`xW!~G(R17fq(e0ZzRsn z%`?P;xI2-fWU8jIIe0R}2A^~FkE))S#=i(;Zw*ymln{L{HUeWVTf+_ua2mu)r?K6$ zQ#R~N&J(Xi3;UhBJ992y-W+cIJ`-RLpCM;2Tvxliqz~uVDCO>sxvUu-oR&cEl3{fg z1<~QiDuT~F9|vt{q!>jiJfGXoFYuS35bi5Y2Ack7h#hF7EvuQrPEp9e{ z5o$RRQ^b1x#ypB5wD_Z{Y3;J1nIhdQY@>tF;r|0b`M_9-NqRe4tM1x!ZRD%2;VF=A zu)uq$t?2brZ9(6RXmp+VrJduhjUli1M&F1!5>%)Tw{`doJ!IDH!_=9QpEj~ z#o7&T_vm~py=Hg?S|?x5ia3J;;iBqaA2ZX3ILvZB_g~)%s+W|d^hdC#?bW~2Wy03u z?Uv>y&p&;iztqeFCDEHfnb&<8cD&)bX64r33<9))+hX!VKTe*6w#yDz^I9&&)$k*O zU-TDfm;aIZ3v%(9erhQnhVHzL2X6!}u^pVL$Y--UwYyfmULbRg_$-@k&DU14)`@56Gn+cZ)C)a zNKz6b9Nwxr2iRTQVN={~NK%Qp|A<={DaqiEi8^hCCN}0MOy!&_QDpi#?zN@>O@#*K zjmGMTUvyEl?Pkdy1VsT&1xq!9Oj>q^L;WU(7$&#RnaEIYtrXSB6l*pg?r6eF@mrB| z*&~Mibh4P!xv)Q-!8?t8iCYNl$m+@|j;95Cw1oCPg1xGBKu+!nxZN@A^pzhR@SCaS z^`U75T6a3nFDu2-H<;}|do(Wv#e%gLc?7rryylu%-u`SMrFz=(v;l3;%j{TYu zPpdkh$jj8G*}6`i3+Y-oSD_(5ex(?GMYei1UV1rUqNF}Hfo^x=7-%GEV>i^uMM~TB znpWxC##&--$gSQnwCDL_j~m{DkNr}_<)x%%5rx)s+yRJPzID`JcHf#d)|3N} zxaSS`+}UWs#;p=2@bhK{8KbI~m8DicHr{!UdA5lY*@ppXGF2-iUT8SoS*!X_4v1nFvGyY2SXbNl!5lWo|!$? z+b>U+C4@9DjvL_YRMDoOu01Q31TcLOFG-o=V@m2vvfh_elu4N9TVC~?_jx}--Na>O zNo1E1Zm9fAs_gBGi#caLu%CQ3Y^+3UFWkHx(&jIFYisz>lD_+r0IdJUr;~loth5>MXs)feXLp=_xYwtr`411*>sRtR5=h~j+hSV>b`cK^PUCnO+RL;K#S#FrgdHjnR(l`A_`Qz0naGayNu{fOEl1&C%x+XmC=0oJdm@B z&5(vpWbo=V*NsM*d5ujO`DE`nA7pKeXEo^Sfj6QlFL?6RUJM<2;qWSq{X}(hRY-o! zl4adke{s!A6xZH{b~J$yr=<-4@>jG4 z%>K3Gyp*HBq`Si;<3av_U7=gyOn(7r9(G*L<=?8<(g(_aP&xT|eKIAXUQzD2JFw}7eo}C1 zVkllYS_Pp!ETxLIK{q|TJGYBWM&%6C_FSfUGM+wCX3CnPZ+Jxa%J!eRfz~hwAUA*9 z?s~oG_an@do|(Jc`N+1@EK3fR-X(x9=R{0#!=&Fa)Y`6J7EVH2>u)zd{}O@({KuclC1a!gjvmUxmy zuICrzx_PrxiHY}(CyFJd^{P=W!S+n)+~t(^CnH+ zfP|1JY@QC_UD?Wxw}ckj?v+A@Y{@AMq8;DOk>@>~3n>gnAGV?P7qI%Hvg|(Q6d*>^ zQu~i<6}e5m*0O4?mhHK_p%*lPNV%w9#s#Z+K~&RkLO+w+B^7d4bq4A4?Z=*GOU-@l z-t+ALK)YrCbB?#j%#{7Z=j#jkiYRX&-+|OIH=k3^aG%B0IMY#vK=3kKtp5=ub=b5I z6E3<%#GD6PqHsd2Il|Z|Zv&0t;as%`?2(I-(}2ew6o~ z3Zt=5zUQ88*^Qr{mX-SLrv}8t7zNqK<->>jSaT%Wr&bWh-?KLC<9vuJ6BEcSU6FUe z&MC2xbiE2T`33LO26%$E?havhAJF~Mpf+(%9fc<+2mQ4ipf|MGHwIIo^SKnosq>x< z+7DMbJkBxoExKfcn+L2$s?uCg3B?um|ax1_pf+5FAfF0Qj%2G(u%I}upQ4$MNiqayiN_7aJ|-8rhHP% z)}y)KUhVWiv6-nz0kUzeaTRm7RR68&C7Fj;CUZl06&Y*uk4Pn|t8i=^%mrqiD;!DyTxG5OAdphz@tCuvbj@h^uA}S~l?`8olemGi z`XQ-F14(f2Z32CERB17J3)SQH?4YZH=`YG?Aw?KqPlGI_BMPpAoSc@O6+}~g)bje9 z(rKLu6&GF1yy~!eqk~5hD{cLp{D!9PCFyuPr*LblU&%-xS*rD3eLr0|cz}apke2>X zo#Gn%VXk#mCIzFw=eZ^8Ue-r@d*yq_*Km4SQtV{AfIaRue#VgNr&P8Q*>Z-FlaJiG z)2Le{v@ZjLEV9N{v$ZtGf+{XO;V4F{?K447xu1C}TAc{nvqY8=`x#S4g&XOSLbnR-y&O5BYAuc&ZN0E;sv(nY~|T*y|~R=|qZCOAuyusdt#5l@6mL!t=j* zVKl3CF-w{q!_E2{-)S^Xe~(!_yYOkjBqouW_w)^Ig;;_H^_R>T?Gr>^38`#N^DgP0 zSIzdyM9R+^`JPg^6IA2^93BS-DOmbI%Ta*u4XW~XbB*08SF3;!Uxi4>Og-}SkK1{V zhuY8=gS(6O)K&`wPyeV7pG)dFUOO&oXN5>f@3wxpruo!zQc3aIi2d4&fuR`t(cK0A z0#%W%2}`l#Md!g|e`?7Ufo^hFsM-yIOB&?7mWMw>_`y!Lh=)sj;VLkP}#I zHEnO8c)8`!Xq=A6JKp9T+vPS}VD}F@7o6w=Fz%Y#0IqN?n!S#RzLSYXZyEVXn^ET?N_KNdmL(5n#sXmZog~joz zooe{>`rFz3=qg!celioKFhRH46*YHNRPuQF5dYkk6VJ zwUv{sl1yqk8SKvnj}EK#J$Sn+gjKN%q26iwmKb-N=5CvLpHa$~4cOw5`l#2a!uwT8 zid8iaU)h@0yH%#|+q;OU2DQKs;vt_P$m2aa6?(J><}b?+)m$EGcy1ShMXae-_oKYC zpFRm^|0df%mmNC)l`N91CjBsm%5et*XiPAJ938Y!VGX9(NN|w9!*C9Vs?Mc_70;S% z?sYfkcYY62Q0~=RuG9 zD$cMkH#|vZ&AhF9!PZ7L)*W&J>eKiUVm|tK0D7e2&iZ1r^VN!wUi3{vkh*OK;PD2e zw!X<2d2zyM3&H~!A1kVP15F+)xfLEL1M?iP_R;hjxl-|6$-jC=cWEK>0Xo+bv{eJ3 z0=K%@Ro*Cy>rH|aN|$@m?Jsv7nOS2ro&`pidcE04T zAmg-G8~V@z-%pNE@}x|%zrCGXI`?1QdFqRS0RBy_UZIS=)oVHQ6@llANu)CBhYzBh zMWhmqIuqf$Yi6~NJw9mTKf7W=C!TiNqb?+B#ZYBZr@;QCezhqj1peFc&HNR&qfr!> zEI-9r)wse>5cvI|87f9#t^O3}C$_Lz+EteZc~*C)UjN|mZ-F2hSNh!ZEeL>|Fz$ME zur`oSXFGrUxR+%%^=W}s(d{<3PNAx$Tz=~Zt@^n$bv_-PH)&YDL`jA^WnZYw%80w^{VWiazXZyOj~DNBlhgSa^sV%r zG;$rmsJ4=PCf^X#X8k1gXO-vT9g}NQ#7azGD`QQ0*YSzrWYYJ=0?4rL_UW3{jNlS5n2KM@EUh#uyK`#rs|g07>5iDWOV%6SMWhi6o6m`8^nM@}jmS zvc@4)(U2Z%KV8#-ZUw zuI_s|wX2%sY?rrAth7Uu23_t8q;gmPs;Z4{;-FCM>(rqcH@Ccbg!;%q;mQ@|4PXp5 zX6bIM8sPOb2XH%i?ixpD(SpC5E|213IF&3Xs}CdU^6#g+k3iY03xe7=;5p%^)c#8W7`p zcdFsbGu=%C=M(2ILJ+CNM}_-pM6)DF*IlaJ08U|0Aw_-~&b@eu>R6RA6FXrROE-Q{ z!fRWnpHba)yQl2P-olyK{&^;UZo8u#ZXFfav8=07sj z?@Ex%!CtS0%u0_Gn0WR1EMmko{pan+8uu$`gUq^T4L(G4F$J9JKQjmzDXi<~k_Of| zc)ic~)F{j42{G~|7lc`6ecO$m><0IY@$E^4o3+g?7^b*4fR&Wr7@Bnp%_S%1Ietz7 zO&B|8dj~Iwaumf_c$}p0AQmL%IX`Rn5LYTcOHJu@pNMMmo#0&0_=^2#u z(zHBfs^oET$J022!GnsXDyLeyY(wiU;$Js>F-JbC5?XPbii3Am$#-mdS0TY%tSME6 zwwLlA(gdt8S3!w3{_*WrHSK_WT}hsRpv+pdOR6D1wYM24k!;)-J04)kJ8?S~PRj)h zJPV-d?ot3q$^-Cw$vB(wuY6C6HLEl%yUr(h?1FNSxF3-NKht!Pe5ig7ASBCXR~gjj ze-cys#0aYK-Dy9caGBt<@ADo3DvWoP)b*-azU{_>1v^qQfnq&G|@RB0~(H@$P+!S@x-)p2{ZvMn26BHCU)_lI~` zV96RRz9@q8b=%`22yaP{Fj+Rq38t|ZAk6PG|ILxc9a@aun`J{>LV~UVhbx>c5v*ZJ z63Yci@{Pa&%De3576S<{@kfk6O3ETHB@l(L zy-+?@nKDM&eAbgQ?bq&FV`qliC91aHP2HWIIw*xgss;4_oV@5;m)XKh){byi4wh-BGBmOa51F!1D~J+tD9deZQ6*!@YlT&{)*v0H2Rnj2N>W z>uzXsO=>a5C6zr8uigz;d?JtxouBGh+D@hVT;fA$(vZn%SCg+5&MTjL-M`diUh~OraKMCi(K4> z7IT3V9^uCR`}8No@YF8ZUTF@$dtcX;B!vwpPVgdzfnbwEzDC+!N^4R5Y8}EIw<7A( zue&HrxLZKrLAf(gr)NN~9Hw}8D&s%*Kg@T!9zsIxcH#=IcYZ#B{8xnZ_ztA+`_n-o zEiUz^Z-pPHzy;5@bE0Yj{dfZ>gq_i(9!JYc^d%T$vLaB2psusS!li!6@E82i%~%Qo zgjAgC{2s=gs4l*FG~n#PNY9+x0K>oR&fQCSR<;3kaMPysQ5T*+pGOlLztBVT92$B?aN^PKuFB^r3Q^yO^Yi7FAP zwGz0fRiVKSvcGU>sqC#Q4NXM}ZGx2!<|d~883D1)r#yyxjqWhD9AMlGkGVGjC31M@hCq4H~Sr;4X=;H07P$XOL^DPrF4xs=cQAxE_pYkj5xyZW3yi;YAs{xIGwjnObc`iQwM_7(+oE(_+G*e?QSJ<;X(aa7#Oa%sy=vT=G_6? zk6UW1h0L1!JwNRLa~WY^BD+E9cg!#K6B z{mh-~7q(mOyBlu$hjTh~0i&&o=qJCTyo$GM{iavwJ!)~G6q`g&Z`{oSN`vxTNuTR! zxxIJ060E{w3+HB1f*rr)(i1NAY}Om*ZKjR#IlvC>Z3(pFnCif=#~yy@{(jb`i?#FY zzw9`qUYdJ8d#5?%ENA2Z!(6NI{^gn{l?Ix$t53dEvZ+Oe35w)8z77oJFyOW_d zBTQ<334AiFOJ%24R8mp>FY2ELOXTht?X~gH=0#ca;yu(NMRrh7z+unbYQV!yRu5;k zs!mi=AW&t6I&GtIU$a{}n6B44f=yQu7bJdqx-)l?U^a=ZV~Z{560W(*gg=(c>h3D) zjCRlt!R70y?CRojCiZb|OS7|$eyPDob!pjKR1B2X;S=Bdp!>%+SB`>M*4ma>RrioFrQJ!E*~kMo}4tjT53T2 zdgXif2;Py%&!1R-LNWy$ms}vz;*J?ZszYM?D`sv=eW-0m(ndb!p3ty3DPh%MA%GNl zB8FV`sePV?8z82A!b$+OV8p9cScqzF=a{iSVINDE=Ainl^J9 zVhZLMbQGJh1FEO#?c?23++O7i`$}P}Z1@oJVD)fSdTLnn?2E1XDGulh!N4PKD-RF| zDr2zb}ke-His^M z3&~?EGlyr8{SUeu#06T@^FPl{hy{cQmkC+OJd8};ClAG|ntsGArui)F8ave|l?zJ3 z<+$sLZ|T)ZZ&0K94FU>N+IS4}kAArRs~~foGGXyalwh@)crqRi&tvl}h7@UoZYLx$ zyZ=f8rnHQS1?HKp^`KCv!05?GS4gM`>ayM8Qol9^$Y~FD?9UrY{~Bji0*juL7rm@G zA@uQ;;KTFGW^K$(G}Kvhv(sTYyTw~DX?*6?dg95uLmr;#?Xw#-EC7+%{I#V1qX3*;_>=}i@VW+(aCUz6D{#{9dpoLMtx7OMWU*T6Dx%!h9c zw7V43U5lM*MdiaVsQTFaS`}@nc~;?ICx`obdx{sH@8t&Tcbx&9gUt5!w?F$Lj_7db zhHwOXB^VsE%~bN9*HZx>uOc6Kl5L;8-|uzvS7j_4&OBN<-00jPLmoex^s@W@g)7uM zi%-6D;jZR}JUxwpHbv<>sY`0*&7Du`Soje$uBf~CMkUak%5r(&8t~@d>jE5#hKnB+ z{BHv!H)YBn)*n)K-*eR&=&rG?{C^4%VxSpxyG93Y&G$v(PE)e_>4DO%LVg)2OT2wz z?pbE5{l{PB%#e#%sBcHRDBEI$-LsKe_qhD2t+6lCo3gj{g~q(+cekEb!E}9@EV5&q zg@=oRtl4UYjbp>m{n@WnRY%iu)J8koM6=B}lj~G@@nuADvb}aIt^h{GsSPoCZ0qo0 z$;n49vT`{b#0n35RE!x%O7X$@L|T3%T}OVQ8OY3-Sr zWks9G_TbK*k*Ze6*8Q}Y{7@xY=CDUBX3B=Q6!M7a`1?bGYea(eI^W1M?2Y!-3tNK2$l*L&niZ!Y#5% z-=n`?$NCCMe^?;mj4h=LtCHzg9Qd-$laSIfk9P|)wMxoYn49z6qqW)Q_bT`UlCQhp zv@ilGwz{A;Vty8JhSyxK4>G@I83tYJ*SD<2FP{x|bs)&I%^&mv6;Kolso!eFg{*2f zOb~jeg9&MikN=AxrsqeprFcL+{$7!Ic z-xd@Wgg2$My!^9;=kCN4d5wPlVQ zr`hd}Cf};WWVU=}4BDj(^pLb_2uxx?O%eeR`BWht(}0?B#6$(9Qj3J}%_W^A{LGd` z=H7=7{@aCWg1kL7KN6i_xL4b0Uuye9*ND=>l5-Lh_D_tr&gOXGa<2|9o9?V#6Hady z%W9P_6n+BNSHiuNp@0`sgyMFz>H{6We%|vN2yf2x0aAu65CX1AftSWJ(9!csAE$xg ze=xmiygkNI;pe`$SsG;(Gkb=F7z=?ybxALB@HIMt-?$-8;Se`Lq!qP$%5ZZG(5n4> zdngwXk3h^!lF!oC$!F#sBUcpV-NLq~ z0ISxU+so_A#EUzHQF@fG*Vyg?e3!GfDEj$qCHYz|aq7OtuE}~h({nYwW@@mH_w^HR zOeXBDWH-@L-1O3hDQE99cLb+N$EcOfzEo01W|~*Ntv{GVTfEY95VHXUWlVx!ZaJjI z%=EonRYU@%kA(em&~=n?zCeuIqlzb>>5hszW*h$ zmL#6U+dIjY6y{Y(k9G%31O$!S`1tBO(_UZts)EhW-0iC^qV45n&5d4T2fBp$aq1Il zEPXA&8>}qZ0msXknfQP8b+9dIk4!nc>0fWmKOhzbUzh=0>y2q5zdM-zjq(q*u$)z zVN(gi?`zVZhI&Cqp$cvf^9okZ*B;Cx%>iJ*X3Z?5<#P*V&}6z3Kwt1m0}7_LZ5r z-1q3#l$Q^EMdRk}uU{@2+bYP<)F_wTG}hkOUo-sE>3gp3k`+f;;xAr(XZLsWN8?>( zTJ!XzAgJnRFOf=*I(E%Uu9`Pvx3a4%#BxFz<2X9SM!$7hbaU&NtXn{mouPyR7xICO zxczWfJ3+%uJ8MSm0V`2zB*N+8xkp@uk7R3RFJ`!eKua1(B~Lcv0MM0G;)n&fDQc@* zMIWGrukm)kj;$%+)*y<*Q($sf;(Khs`D)EB1J%5e?f1_y*_L4Q5p9f-`{8@5Bl!DW z3CccBc@!xPQrk{g1f3jLcEx$}wKz_baj&(~q}aGg^qvF+NBXvA-FBPl3>JsfBmU34~+r44e^=;%xyr&fX9>bg<0_Zm1Hfo8uxUTTMJEkc%M^i_tTHz_Ot+&SIc%H z#eetU@F^jCT+(WoV5`t9&ELbD;yFET7QmaKkheDEN)qr$1ag;6>*m5a6rJtcq*aIs z$1uh$w-2qDx@2N9>K<`7sdWqwfh&V>cB%g8Rw^^!sKm#vyuy!4NSM*Blb-g$Pp+?B3|W&l$30f)2*}1HWkU5!3SmFcPQ`kGYjU_g89U>N^E;i+rKc4vKP1)FofChIe)ud7-;cNV|-Fd!7 z$7r3l$z=usSz^~3yQkos*fH4xL{d?bVsTJeP6*%ncD|3-A*EY3{sl`g{doyw=9o9` zpyH$FL07JOy*(ZOYTRjP*J!ven&?6VcB>4_vJqj~;GexBr;gzo{PZ(E*wd4id zPt+ZMB)@|^qN~>7T#9dYhh_SYW~o=e&kQ}KBxDu@3Eu-(_{0gd4(OYk+))qQGwev@`Ux6(nbaqm*XI*lAHc;Da zn77%eNq6q;z&_0)e-gp-(s5oStXaBh=h~JTd|usbs<(uCXHtOqgA5}KYrl%-(Zc|k zcxBC`e|jbW-awKwAY0#}6}DRPZdu)0u8(YgrB$O0?HWs3*pV~B>e(jxB*+w)M>0V61$(F^`&}K*RM_^QpXK6ZZp^&#HAn@sZF2L?~%lJ-} z(QF3?%jL=E-?~hmvwqh2)&CqhYgrR<7+_Gb&${5@C-&ThHzHydZoQgKnjG#IS9IV1*gM%EC4Nh zozbr?nz7{RMu4xGu}oa0AnPyp82s3i@Mm)|Z;b+OE%x+aJ5HpC7f%xZZ@rTbz;F&OxCo1L3BQF5TlG;k?y5!j0_uHw z#zfiFy?5t}fk^2gbxHh>Fj_bl!}H|Ah<*IC;3v8I!k^M*A*;lj7zm_||3KL6u3mv{z`5(vgmzAK z)_A*n>;1u!{r33uuc!$nt*9Z|9LFwSaPajf>^I3|k-D851TNt|f*r7rcRUXk1FT*G zHkEo~_0YwRxU0Crd>_2e{%NiAWSh=6*{R%$%DZD+f`zrMs92Y&ssQ#;ft(1aV-^WL z@=e-Up4KVw)d!)pMDT?Pevj)XM=i*MP0Xg99gb+n zy^M98V2(%hKZA!-a|x#_pP4d7Ej{J~6U7ju8__%Gtu(3>Ba-B}Z$-QovSb3{GKdvH z`WSenJuFCXp5q>^7`5Py%zdHTgkyC#n@>6JoFn1w#lj-4@$0nt zJ|~dk>bE7vJfu14OB1MOW;)%dM37UR7_o-E&!z=kH7&VU@G%(B)UU~vPQbge|IlN5}>GlX7kz4XMV?wsEInq!|qJ$3bwCSU~MwxKov#5@2cELG_>@yhv$nCNZ0r$42fZE@%RV;*&CuD0e(t=?nqFyYX z!v48{R8z;g$jHrJ(Hd#30aUc3Gs`CsvU;NfLj2xMp)h5j57f(H=O%#^VbyPIY+j=! zFKG>n{R!_pW!H zwa%Xd_uO;epW1t0``Xv$#nGJnhWtb=Akq|%**NA>@y_Cu6TwQbrT`x-28EDtiJ=Fd zfhV3qwpvCBVhBYrXHMzgb$)FH_hJT-r5n^=HX6kowwK>(E);d-v&v2`a?xDWQF+(i zLvq%mf1KigYc72AOJl!m=gxgFPyi(_}30W@dp@R47yj{cTaX+$x!1nhAKh`S2A3==2YO~w1<7uZLt9*rS zJu~}`d#z&|M6W&;Lma0B)kxKa)=TBeKSXQD_yeC}B!s!aC7pH&ZO5fM5bv|`sdSI- zmFxNm`%I1F#OYMMlY(7; zu6T7q!q}!Kt4;gH)^{Wx_{93`FKyU$t37C&Z3&i`Mjd z5>o@#oLT$aEJ}oP5;Wq9i zLdb+*nn}1cQ8HTX{c6Ti&FlP&Sj3_o*kkj36*pvInhle3%z1_%Mua^@G5}n&LEHFc zTezNlvexx@#|6FgqA2YGGy7}mtq{!^Q@->Lb1l;sw}3Fc0geZ8^?S$HJ^2|M^**_7!$wn~)s3v#L!kVCzh!tV*n zH4})<<+~!4RT6@Yr{BWcHo3=H@=36_S;l-&)8KLE%2i?Zv%zzY;Fe13nR2@c7xMO# z@W|q+3w)7%NblIuO#Qy^WUECRxA0uyEl^4*lhfN*f=Wx{)txRk%5X0lO=x{lO+Qtv zUt;7xC72?9iC?ssr}UlI9rWD!;QX%KR;#37$IfGV+qHlKBt2!S?MZX}Imy+1(lFm) z$XJI%>&1->Jx^_Glz?m@1;t9a^8IQ?18Eyn(j?q^iuXPFPpB%b*2_w_!8OYrgpu-r z*_4y{+bzOkUPrE&Y&Kfq)Bd0MNa#ig_WmdSn*0VgZ%|jMi=;eE`+%k$OSj?2P1-+4 zMiPDB?eFzj0lb5?1|1({_zhdQ?OD^c!i5^IlPzz1xp%GAL|u2Q4(5D)$lD7KcAw3S zuYB3=2w(Egy7ub#>*1Kyk_aYEpQF1QEsujI-EMl@O*u7W^P`r3ado0LG1@zjYja?3ig#SI@{caZ4{soxd8e&;7mW zi;ipbq6(7TMq~R`XK!uX+S<4` zRow2SDK-u5bJ`!{8$8dgXWM?n{1Rk>%6NPJ=xh_!wM6Q)Yi2i+v^!M`rqW{=(5MOR zA3eoTKEs=D7zxnYW-=>NAw?l$j;uSLVVg6iqmAvkWLumxFpFe=*0SFxCe;~oLijVf z8EC!tHs1cze43er`lCl}*l%YbLwTJw+P@{#OB7L9Kx~`+Xc9u3b9m$W_&8rv%z4){ zx30ZX5k}8t3xrqCf?e=T>6|C8!y0uxxpxP4NhFmaDlmAzX{9gC;cjx+{2jw+4x3Zf z&`DyCH7xQQyAcdamdylCcYP<&Od@$3;`I7gnkYUQX?%Av)o%jc>~ zVlAnXrml7Pgi6Ev7#`GxWh)H*IecSS@>u^W!B3b*#VTKW!0>k+iest!p=s8%;HJb4 z+QvjqS#b}PQAg#&R^4qj$`*ItKI}oVnY!U@^wY!aaR`a29p#A6{M3{cW*630u9x7X zFeCKzxLXEeG||A@D~ElW8W^wbAldF$+Nixh5$ z3AX*2OA!>nLW&ms1tG}bDnJ+DAtCNB`IlY=wF$-niFmKn21jrlnlW}$_;3c>c&z$qhGKN`PJN{7iDs3=4&o-=#= zPMB&Z2{w<3+$n50JJP()(pLdKDm3B*+JBb>;_v|OfF@bmqk zBccvl!|dCB))~0)q9?$tVsD3V5|n#-yMo`sXVs}NlO3O*ez%<^?;E*@S8!BKoBnf%3 z&rk97O)ynLLvxs3qBpWl#atrItu=v0gv)D!JIvfVZqo&NGK^#;kE|t!<}%cb0~RJ;g!lQ zWHe)QH&pW*bVvD|{&Lt@_Oi%jWn_5?T1=CSj=VPi5*ZseC7UL&# zr?`C+Y&g5V;>4T;F{en+hA~x3pCj1UEISI)wDzCWfwDGb-RtURVHJxLYaVOK!!A2X z;B&4O`OflJE+k7V!nBFimi1dy+4`M=4}p6a zuLa7I*gBucQaO-g@6UWIZ-+PnitSffhSUkMALZi2-5M5m_(b_oVb8!m+ID2^$#o7F z)1d~$f#{E&CO({Z%B%dt+`exyhCWquEQ=#}EP4HRjhUCSOwTX9q_d?Im1pj|bv-lS zvg7E3O*Er7nxRcoMfa&h;jtor#FJ>PJ6yJ}aQHvlWv%DnaY9Gsg(>(AgK}5su=wBc zfE?x#`9uwGBCmCe{b8})Tr!kAhJTh?czMw==Dm0@{f(OB-sishck`h=h@EZ;euu?6 zuA8O5^iy2!&h|wZ#Q0SHOvB$ETY>Ce1cso~R^hl#rReN2M$eGX4JY*;GmOv~clhTo zjdaJ=c4C;x^{0(1gLotv!wfU-jr|cm&2UuQx5s;f@jWUvr9xh-^VAKLJ_`%4 z-Jj{YlTuE0%&W;@s*R`Wz@DDwndwB-?&W6-+uPj7E%_FMEFnB*Pe8``F^xo@r|$N{ zTfS#Cy2@tnEw9MOKC5Ne?=wT>9prnecEqe|uF(oHi5ZlKLuT26vwO{#>=9mYPq~-w zALzGTQ}#+vy;__Sf>^g@-1BO4Ni(gF7sb!OuJ`N4(YP3_Q*bUF5M66`?6K=hdZ<1c zm9`uDI;jkJ$JIN58w0>@#Us~3WXuhcoC+{=s;grHlTS?yg2co;-7tG zKSg=bQ;3@k*f)m2Vp!cn4Ia<&rESS<{e8GrsgW|JVSeo+BU2Be^=MP`tO3a>9e81N z>QRv`invT!d7=1miFsG`#P5nBYAwEM(r&ze4&c+$v&|PcT+h-Pibsj!9itBkQqro7$d<_MdOba_!Wug$v$xb30L@GUcokOd7Y}&mgU<(+&M8Hw!fPtQ zpGOWmg%7v&kmqlYY09X-oCx1HjEw&t+T+R>CRHvJ-{SS%;AH#^b@1M+W11*E>t+6v zU$~4`5?E?`YqqNA6yumTOTWmc9hkJYz1Xt(`fKv_B(P@AsE(G>fRop}d`+4|{c=+R z0;rs`A>vqSU8V#Z&?0_s!)BYLdBXs6-90_k)5-AD@btdYIQZIQEADe_VmC|B&zN~| zI(qC!UyZ2e4AN6Y@~=trjLo9G7T()8IP|o!rt=nIgBE?gO0gTq*jZNRge7CTgmZL2 z4OrN@f`0gozV4Ir_$2u$oabkIEZg!O9h$r!PxQWc?jr}JdxB!dAt%&?+s^CNU{~vw zYlzezOEa^4-SSzREvA^Aha8qPNiB+{OcP;s8Zrx}+Tz{UpWg_3$5Hlh+^7IAAzye! z0yDg|A%1?o)~RU$%i^V|Zsm)DJrI7XZpx@mT3a>6^8jVt8XL(3`@5v}3o)~q8+mCj z#P;z=CZ}kXxhieUy{7ZRZ+W<1?V)85E?qlPr07%6%G2W(1TqSxTvJcP`nEP}Xy;aX zS9_q^Df&LjtJo>o@F5&Mv8#B~pf?v8Dkgqs`)CzF?JQ%G<_pI*Tldy6dbHkRp0zu+ zkNSK(^!!->d4U@=nEO6UrCMW#$mzH(Ck%AIvEd%>(u|7hQ5z75y=cM_njGy#rFc@L zWv??;GhbK>rhYM1Nc)+m5qORz%_%gxSgZ_=Wt*St6Qep;3j#npq8+_eXv<*01n*G+ z9!7R}|FtHZfyeELuuU9m@WS%bCXSoa#9+!JR(OFVys#O1SYULKnbHVlb<^G_6x3%C zK-+?^-#c^eNcC&# z;id7lxrs5}SoV9051&V@KyYghtpw0;Lscq_!mFw>V-w^O5zY*C_Kc<;!dh5IerUD& z;!Yaut4$ol#&W>|yc?EK(g9I2*-_qR(p40Q=&n`lGx55c&)Te-yT{A^jObcM2>vSI z4-9mvi`nz1xX+hF!l9@8IOLkxn1)-Ovks05mS5VVkxD1c+#`!&~=j`^9;xFaq{b|x;r>vS7fZM7=t z)Zg2v<4>3bQ%Yi!eG;Yy_6~htd-us-K$d5&kO*6y{&K;j}2?~+RIOvs$;5;nZE?>Jh%J%@VKIxpnHe@=!CI^k}Uw| z9x&C56a(LtqJ=tNd=eSBk9Yb-q5)~l})&umkUIIFc{ z(iGoS1HGmRR&n5u1DuBWC^V4si!9pSnVnAd-%LGi8Vb{A0=&*9e?gVi9_&Cc=hy7R ziEN^s(aK3p!;i;>%OWtS;{o7M9E9lR?LHCAXI-@Jft0+NpWK{KDqD4!BTv)T8&x@) z(4u+jF0(T`VF;C|>yygKVO?BvN6$K)|4wy_(HC#?bn9HDN0;e|6mr!qtfA9N-G@%d zOKqn3jlo45ytr(%CwpvxZu=_K+X9I`FM5WWc5Kr`4q_5)57EqW%Zlh~sv-E`Ww*YW6%&GO6g0QZx!&^l+&vFK6ny7bK$zH%7VP( zeSYIL>0!Vc^;mFk&#OdeW%|S9v$eDyon`Q7qLf-2ngk-Lms&&Bbt43>GOWU;Py9S8cM{A9=p_Vxmi9kwvHzXHSdN_4( zVSG`Yc45;iCAS>Vto;StTnNy`s`*Bo5enUK+~Vsjft;4B9NeKq!GKnK!J#52}%_kM&w_ zhWWfe-D)18OsT>{P;48QhH{jQIWk(GHoHu;#3>%S>5d+NyeL`A7^#(xze#i+@ zJqS!Tcukgc154Jg)t?MOz=8XogJ%zYvG#eUql}a7b^Sjo5q}dqUGVr4w z+$YmAFnI1Lw3V<-f#;?pAmo#|S~|DBQl(LAYSSe|t;M-A!lKc&9AB!nXjW$y4KzHP@a%6}7Bdo`Y^X(sH1Yc~lCP}`T|4Fg|h@hgO7f5qn6}r>AHsVz--@f77wV)6S%*$I^ z6>S(n>F_nzx+v9(wY&a=Sv0~(4IR$A!G-iGeTgQzPx&%o!U+W;V zL7lqK{|KU94>?R>p=n$T7MPI1#1BjOW1zph5KQ&MPB~2SEHyIHKd|-~-v#HLD40%&$x``{oLq||-Fz}j zUk?*OE;OWNQI_NAqu3a@-*dB#3(B18o?4_Z%=t$C4^8?O-`-I}*EVF_CqEB8_!Jl; za%-R5i5*$j--;=X5RJslr-!*mTbJDh7t$JAtG^r zl35{8vXm%pYSJ)vqI3XEgSY%^&Jhyl?VVcsv^CF)e5Jb3k!>ZG^IOuKF$=RZU7>;0 z#(hhC_*xmw%5uDOPLAYg8bB>2_@mbO!ze<+(+ENCI8&i@Y~zIg!$s=rb{o0!KjVaxZE7KibQp`T-3?Q^_TrcJ&YX8rI*+h>}uIaYb;yb~P`3 zEtt%kuT!_Gb9I2!vsOF4(y^J-WHuO7UzPf%;#(F7F+?Rx_9;YY9*vYSR6djYqrm!y z1D_E1?NS{P)Rx4@5!yYq7+BkTQ$W98?;bsJnbhsEe)5clhMT4GC|AU>YE9tYvPKD_ zu_zn{()fnox^-OJLol##_I=agcijB)4TdA0n^)-eEAwM_a#;BddwV*D`&%(zg!IPJ z*|&oV?Ygp++Ds_~P{lH(o#kEeZ#63e&(8 zZckFkOZq21wR1K1|KZ4AviB_v$XxM&8V1dK%T+nVt!4%tGEIRL2!hhDwh$rx4>mom zgtew9LA4ZHT`FrO`BsZ}k|mENyBd?`>smR5QSoP%nosp9gdVzz=q49yuKJdyAJM}d zU&6VszJfVjCa`I`u6G4$S)ZJ~Zp18xRfz_fCS6Yv#qagR`HyRbS~XhL-3;sOEiQqr z;t0B0uREbavK1dRTCJ~YsOKfZetaBn6iXnrPp=a$3;{H8%fqgu{V%HlLI)OYvv5B? zk9hxIzRZ5B>K_rc%VGGJ2>xZx@Be=OzvIzg*QwDu2BwXELxN>ScV##J-B#iMv*H(_ z#|5F;MBa1drswZUL0J9Qul%+U=JJ1M!%)$c&qyC5<7wzg>bGx86UDFatGH+>|AG*c zSrD4MHro%mng1Y9KhG}L^ADnhF@hb+C}B_*N28=zx(8$&vcQw*Tp5tgQRVi zneu)7(IW=(cWw&262tVdX`LSo1zHtf>O8Uwale7w25w_?=j-k?eadqwSQfvE!%4b0 zB*J?3v(w_t#R2Ux{7rd&pc#wf!1td>8$h^`L&?Km$CBRqy#}`BXZO?ei$x3qb#X3H z(5rc=d%pBnleY{PogzRl`Zhrd?92D``M>J3lJaR9moA(sJuljJSf?GLbLc*$hiJ%5 zJKNE{0%3uGcQ}_otzghwk{(sff7$KJ9s7Qy_N*yZopd-Iy<7I+l+{6XbwmNF)@%Fs>G3zqe>V?6&*8lyD=LC;i*gcy;3Jf@UzfFe zt$}vab@^cRh>%cKZ%Iz4uRb2cwe=>x#h>jg zX6lwobWxLEdMsFzf9FW*bYX1kMNuHXV`qncsS?R4eDIWV>ky`MHHf4S^46o3@P2%; z_IbE@i_9NWefg^uy)rcg1);tN_b1A+x}b`IKL=LMmZ~RPq*2U`8sbh-B#Sr8bX#3J z0TmZnJzOT7)%2K&*Zmw!qw+5knwJpsllzih?{!-C@2m3CzgBCyGQ{ul=s7@pzw=CY zXuW1gXM`<>ma@bGnQzwz^FMz?V|FJNf909Mguwmb!eq+ohcLC2(`fmKhnTmAdquds_V zXt;s>28m!?o(M6Km9}jLc~`IqR`js5BVl|`kDb8!3+{&;w=D`GIwfzEVf5?YZZDe= zE+uFoua)<__rQxQwEj!L?Q(dYZ|L)j$CVBjb!f&eu}r%!%x+z@jiJvi^ObWgKmJ6M z;yFM(X48vbe@;zFnX&jCXv915TxTUqAnW0tuCY*gXdn#^X=oSzMDr%UMw---*3}jq zI*&Nnf88cXh7so?Lifd5LzqTqrT3}Eu`5Sj;KK#WXQQEE=Bg^F-ycAcrNn@yR)S-__v%F6#r`W0jSiq zY6N~LBjr@#5p-=5czQ}V67p8XRtJTKJN4q6m+ddmzi^C(@JNk5l>D;2egvz zPlFq1PZRojDs>WBbsi|KbG@&rI#bfh&1Z$0Lmpf%a4G&5ocOJUQCO6R;zX&6%_ZRs?X1tuA_ai!!R?*5v zs~Um*)~(tXPP9xB&oH~yjps-8JB{cK@WuAegVGvZtnojhe1GPYU!6y}0MB7Qq`oAq zG5z`v#MOW1Jq2AeGWpYO;qvnTc54q<3+(rZ-YYxhf3xYA9THX3goZ`J%?TY z4|nu2i03At31@KC^LA4wwGAO(Wc2*2B~j7`J!UYO4SRK9#Uc)O%#{mMvB${}-QsbV zm-#RHc8MKY)@rl{k{^!_#=d|ImQs~a*s{at{>TQkUwsgrG$}xI2))R6E3VA4Ve^GJ zX=YhKKo1@b?EItsTg2q@)^+okE3dfW3TvLaH>Xp{Z8I=rmzU_b%7rhqOhZ0?O*Z7p zWkZh|y$bMpo}4f^e9Ghn8E=r*xU^{UijzqFy8if2D1EujfSp`q6Wy~(Vos!CY%BcO zOFtgg@8Lqb$vl&2$_~@K-up-A{!a+Ca*q_y!LC`GCJ>751Km98qST1%D#M=C@r{0a z0-x>1%(a~pfr8P>8%;`Q^l}luMR``>xnD!y1<+KueNMTWSpqBoB8%O zSUCe|Uvk-U>ymd(upC5bd(s~)&d&eH+sSjK1Fup zOGas_n1`t;KCDBr6lOW-*QhaM=3+MRu@N%y?QI*>pUvWofdW@ERqp$AzK)|Xnl znS~{Fp#<36!X7>hhkHMN{(OW8l~f}=GTT0yh@gII;?_9dexr;u{2#KQ5%)IN8sUC0 zhc}@D5UvvgMdbuCU@#!W#^;D?moXtBl@$c-VRoS4sOLZQ748Sf zgu`1sNZO~aO6IcA^~G=OqytLDd0{3IO6v=&k>5&(PUI-CxRaYT0>$Dbs7|#{;EyOi zqTtxgmcnJfmv2FB-0DY_N|u-}j*Gyf6r2?n;HCZ+`2x@%FFT!Gy5#I2i(bSE$O0w>k1)|HlPOw9H(3 zoV`m%%%tf6v}b_{bAvROb#ZXlO{M)UbO42NM6KrL=-l#o$at~7!P!vbjaD0yxC8d@ zxH0ubaK5xhRvhFjdv$+FQ$Q>5C7R)w)o<{C5w3#*$3 zVx+~Jh<>kdPPO{BfEcs2JKPMvD+OCir_3lk+hDufsD!tIUu&rV*14_I1%7?5w$G;s zR$mLUrnk^%4Ia&FT#SJp`BsSmvd#YgaNd2J0Or?{O7eLi{)H$WrYrx<+vCx}k;5T! zu)2Uyw&D(!5m|^DDdaQJi$}EN9;XRXEtwxK@UJ_6(tqSy@>H;z1$5Vtd@hX5BjYx9 z!EC9pj_PtSxmk_I$xDwY7y3Q`uLT#+0Kxg})ipJcu7rwVyj+$6=MKVPn)V#=l9!-> z@EcfW1bqqix;8HjNak2Q}qmK~!^UJIN z!hJX`5X*|8q-$oDr?Fth?!J3o`T9w>GHwA$9&2+Ud(m2H#-NsFW3)v<`bWcjk2x99 z|2ld#@SIwSTwWGv^;x>8M-j_yjMwr?*Ns#zm>Q|nGP-S0>QI3ki<|AfIw^(RyZ1RJ z5g$>F$?W?JaIp{PN@I^RvKOClJ?lGSh*_pS{09H97#F8xIsY8&{7ztwHW-0(!P{-u z#RZzn5yLIjEH2d>;JD-WUk3BMPfz~b76rH2cYDR?^6F5i?;`v+yz*3A+Gc&-a#tc4 z>-_+ohHU zOk&Sttw`SGILT#Aj%}-wDi!$85e6j4c~n2?21t^>-=+ic2>(O%1j4{y`lQ~CF8~u< z7ycj53LN%csovEsTtij?VlW<>F=JE#1@3-?QRWdhk{1QY^>LU_kz5rflGqo3^Z`fHbLRU1E96>BkVLL1u};&`;Ky27^|fLhIN zag_FVHO*pjL~y3J3NdOW1}jS<+xBg(wJ#pbTrr!p<(DI2F!h(oH#WKFA3trq`H#kf z$px#Hu;wKqvBLP`PhBz}>Si0^MYeBEUtUXBVeWZwvv`T(*lO5@8+Lyy61-0FA>mE$ z)gYPTryCb2lcx@RPm}HT7P`x(;d-_0m_iXd+ny88C_T1D@6@waS)*Y1<1{aR}rlz2z^u(UC}fUG+wot6HpGYLRAzK!fFz zjcJtUD!~;50q|O;&{*ZG$STs5X(yR(gvo`)^1TXKXYc5$NBPbuw zfGv-0RB?5>)kuecMy0ZmSKK+kH&q5)*u($V%l=h0^S`^5ealzIzP-gEqN(@`RpO-k zcRh~pwMqLHLfX^*;F7v^))ZI3X<_6e=g@WDUwoM&@I=Re;8SswvOF!|IKc|r{V)Bc z__%1n?9=LL&q5ALn=*Ca_u!!cj9U{%~ z(}=O@fNP2D3wNdjG+TfL=Saw^ggf$-Q*sJILT;y|@k~_N4Efxz8!aZTn!DU z>xD-S6gK678ZxV_39;`yvazCM>9aEZ=x_gkH5VJFTsNzqs&^~ZDbI74Y5&X(nxpN) zR&znQgKX{;@_?GKpORknMWAm3r*HE7^^L(rU)pPJ!1lrT*ERgWLPzOr6e8lN;+122>+eGFECvLWo#@w_mRYuLK8ZU@Y&fFiX%S&oE9wD5r4ss4xeyD@Ep6 zAWL0tDwzUdQ*B#j{Kp19NbGxU@s-1&v^Syc-j}YNpVJiaR>H*|*D?!Fh^KHSL<=%& zg8HAjZU2@rCgz+NHd_KCq?O+nr{MadMJF1)*Xe%p$-^%stO~5%{$4?>T(w^JEFIdnTz?oy%r0q7n zvW5r<9Rh#0h<6@+tBCrc9j_q99_h2VGcz%o2u{EQ_N8JJSESDu+FNr{RZD!-Wos~# zfS?UyDE&CY%(c6&FKN-?coza$yx^1gN-yItTmqF5W@;5o;>EK>ft!K7A$Md7=C>_6 zTbQg46D^o39mg1^0*)o0vO76P_va5v2w-u`+$*fXZMPuK+WScKrTI|$L_1*M)rl}( zMRVJ8A^Ag^W!z>g@$cTvZEDJ^3uv&FuxJVn*kPfFaQWMS=UH@t7=bTx3q(t;J?0 z0jatQ##)=ov+;I)S*Kl-=oo_n(8{QY3d*yh0 z*(NIrw%d&V(@ezEfp9txmnqk5By>S*uOo2xG>%QxJapCX=%__B&6a+%kLpTp;>94b z5JBxxG30g-!}hQ?kZ}(jxj#VVvzaoe)CTNOfnUdx?$UO|#Hxalt0OHF^z`G`w$kv_ zNu{KGrl?cbc3$_3G!`b4@5U&k49*_>`AyDSmY$_+%%HU8v8qethsWT{mP7dl7)-^9IoELgcDHsDjIFl;u}24 z5;+|c$`$#bXV(Ct4G_YWp7eCk=JZAnY&}TR?B8a&J(?}@W~DbZS!nN|To&Jp`iOh3 z1TQltx8g25bTFwcf_jMN)FiZ*Xoq>=dr(x{c=cBaEba#V3f{*Bc$rp#N4~bWB-a$^ zy`kq_BH*|;UwGV8npHY)KntcRy@O@OlEwOOO1lS|C0KE%x%YUxjQL~bd)t2dDMrsHy-2<#Ulq21NGpQjyxo}n=jsHW zHt~6^0qmc`c&zE_jC_1-+Dh4m7r{`{gkz^WSB`hOmp|FO&x-bT>5&su_n55YORqWc zP(&`TE^yx;eG*uqNzj~Y>XA`>?*oimPs#x-cfxtQI3s2}`K*u@*?(td8`7ojDoxw& z?NMa)uFaXF!A`20zOaibbL-^nLw9rska@zL(yWkY>!P2+o_W>-KWU+NTI_#`Jtb*C zj+OU{p7^$y6fa+=oOH~+>Gm91>9V>=aGb1FC=gAEWrO zig!bx2Cmi*5O3+fx-2CEHAeq#LSFuJYuicySe&}2AnHpT3CoOJjgZJ9mYOeGVG0B#Z{UF%K+CTk#F5OTdYH_xU?rDD@ z44U&hJ7eH%F6&ax(E7;+6n1+FoY7vmgY?xhpsPIOz; zpWh<7$mlCw4+z&<#&s+-v1(s1YJuFSO}n+V^i=0tlEu=uCAURUn72w9&VVEvzkV%y zbwTL1QQegv5e=gTxWy0s^H@*mJai5>nir<8Ykec1YqMG+Gb=oDBAiIjW6)}|V@z4s zx`(OU-v~46nGD*e?(VYb87?&Bn&C^iV^*_XOA}a@+h{u(%Q@mwZc1+GZmc1a%)a#& zPMF$hgT?o!k@4kQy&rigob;{T%!B|Cue50YeEaRJ)NktUcDdmsW_lv>ByX=kT}k1z z$nF-{z^6|SpVbzdR$3l&NGw?f$H{0sW`fZiF(*2QOQ#Z&$+6wyDi^S&^AFmZ zfA^eS1;kAL5}Cd9>7<5MiJZKyQs7M=Ebiv9Bw`vY6Q z)YEFAS@LPYt6II-=-Lp^ z+G5htE*p-S^1<-M!o~X=XrC^w{qh?akK7avdkk}h-@~hH68)?!s{*|6#Bw?;-}@;GTJwj~N_62gN3idTht+)ACb6Vd3@bKnv>a^R1m|tDOBW z!#4E!CSHkuH(k4&!wOs1eAXvoy@9g#a{GGV25O#dvsMn?2 zxuaui<HJW3Gmz0&HsWv9`L{~c>>%xz@a7D1w0e`Woun5tm1zV z&i~zD^#Anl`-&{Qh)}*96m!ylj(mdU;|aS2;R_(KP`1WreuqY^#$tdzsrIixZ(Khw zix)&!pG^wH*JkCPyEyBW%%(jziUqgYb9z4~Cfc(dy~I%3)<`bv4U5^>tPSQ0`YeB> zQZx7_AL*(gITE)bH460p`>`o=1$zfzWG0m~_V78mq_D${ZJ2hQbAiTKty8{o{nYPD z6LXvRY&55U4@@fJV?PS!ZgTnCUE+sy>0MElbtU~Wf)2x=aX+!Bq(Pz7wT;zvEN=S$ z##lR%8RXDHDAZl|9?^Q@Qh+yAz}70NJ z2b7&$et2mCR4G#QO9PvHQ=|KTmRL-7m`I3ZaJ_H;XSWbADuFDp;LdAmv<-cDgXYF0 zrq1wYN@j0a+4G}`t&jNr&tJ zu*gJ?vNCz>eOs<+-qKdgRPv>c&vLnz&WDC)+rUhO0?pGgklui zpB&g+U%lC&wCHO_=A8El^{ycFm*5hZw6cKj2&Pd-XCPAwX6OkbFY8wnSWo1@A3xL! z5fv1QhCOJu$YaGr1JXpl{yNNl81ak6CxYAk-z09?J&#I0)%Nr5A#Y#URVNjd)9uGe z5wrm^EIs!v=AR$jNoMbVNypLkb}dA&@05{GfG4xiLPEfa4v0ZPuvJ~p8-Zp*Ia=c+ zaFKV)i~=~SaWGoNR7= z?ro3e>RY*2SejZ(>ijDsa# z_-V6Q3%=&bsnq%j=up!AHX6t2VL>Qe_a_Z(qrcaX?9erZW(ah~cW~?}LB5Yk$+e5Y zSs^YH7doOtK|I=TiqwS70_qty3eUIgTz8S+_7MOWh=%W^sC-zhQ)@%2OGMK-mxV&A zq$UPH&LnjrHp(;>7cy^Q&9o#sGK`hjsL|rzaGw`zN-3+iC!$a5$_I5TII%t({I>?< zFMt+Sh}M72msI>$9f|Lch^&3H`NH^rjOdZ_4`jT&*@JEIv&0x~#^0QqyeaIunV3hA z1;25JaCL!hb%JRw&w~&3V{-BKij4JrcOVFyJRo-KTPFx%P1W%n8 zfJSr_6;IDH){oT>&7`E*Qge&%3-IP{6myGSuao4$OR;CFy?G$0Di3m>!+ujv)lhTG zPCXz-jnAreukd71${o`g_k~Z!x#{%Om|8{X?y-5qhApg_W6w{!k$l`d>3v#F;J)cm zL8yJId$EOAtsrc~311(M@qeF!9EDPEzb#eE^gMq(M&`)3Ffu^+Cm(TZL7nto-3G_4 zg2|c8;ok3cwgAvF4xjE`9+Lv?DCKwMIi{u4{f9Se z`$K_Pc{IbYT~tmQAcMoCUi!SF)3@p^dp%5_g2?Cfx+Jwh>aCxb#w$|myBk9}2*(d% zAWQbco#D52M!=t}q*D6q;4_dTPsz?qF%%_XFJ6R#Bx@$D)z7Hmt8T^8q=}#^!n-xExhJFkUkASe zjzyl4>WBn>dMb&SCttC2=7ZFdAjpW2!UK3 z_tUr_24h>`gdqzoB$t@y3~ScLU%f>*YLg{5?=7KDb5bF7QuFJt5Soa;HDlE59Zag7 zzV<;2Sr-1t=&0*iotpCbk(R?diIoi7eAcoL-}_*sQeFdgc@KUf6Nc@SYVZuB%-Zcr zfu?qzwfrw^oRJ}747 zuewVy958UV|C;0N0Lexs^Lp8nxpxw?4BQ%*NROHaJOAkGI9SxiZ!Wa~Y|0U2Sb*Vd z+3!66Oe4;r*&2ZQ65i_6v06&IH}xh_vd!zI##9YVc8Bf3to3owRBlc~kC| z=un*0GeD?Er8o_U1<9+_tJ6}ti&xD8;09Uqp0)3)1C0o$9>Nu~W+<}Z zRqjE+MNSK12~83zzJ2NYcQcby_8n`;{0v-cx}J2WWpDFaciH#%Bsl9R%>!d7=rwHx z6Ufim*QO7oR_n?-+VxCxyi|(F+pW^oxWR~|%GLJOH%aG!zkego!x!+Tt)=(x1GoOc z{MBffp7LYWn~@t|t`ZV~;#B(93HJA*S5nXbk*p{hJ%-DT^&gSa8?sd&a%>Mgf~(j- zEpZ|M7+vN3M*IUHU4{Y`|L1=G`N4zea_p!83f-TS=H!nLC;{M4m&x_NDIm3fMQs*9 zg!wOW)#Y3NAOCrZAeS{l+#Vx!}4pF1W1R4CF=#Z_H`B&f>-q!ly1V|NgCtNmH#vbTW19@ucyWGi|md$+#ar6mmd@qJl z=5;dfWlsI1GoYP|awJp8Au@`Alz;M-_~h zqfP%KNbHxZv&-V);!V8Oq<{rdj|{o=S(j`AGHdG4@;X%n6Xob3BNYc*B1$F4SE?p< zi>A4D-xHu;QHIbFY(28;I#YUZTAbnZYAux>nQ5&aACQvp_ub=bm!)boPY$nz19uDK zVJ>13s33Fz-a*2CX_^o5Fk2wOuFF*T|AP8}D`sjWZ`5sOfEo^@0PM_$^h&iEjh6Uz zD(Jx&O?E@cAmvfdz7<%v%QB1fET0o{NBCgEfBAp9Py{*drS#o^vR(HVWz3!<3Kaeh zw0j;};Tqq%1&Hl(0rX69rXN}vF#9}h@Vl+YyNU23bSG0`)~z99W1|5yBMza)a&543 zCjhoPTMw0lxdc3PIV0FKn39&b2gv==wS3A_9F7f7WLL3f^}HWJtTzDH_9X`bq1QWV z=Gse!3^_I*EO{P#{Be5dUbbMF(DRy}q5An-_XLH))!iVOYw^B-0&2WhDl|e!5s0O(Kuv6dC!#;H%n8q(y54{rt9MdwgAC8JTwMnpw zXCuGL>+7(jwFw`jn0{|La#C|OY2|l0{%yGief&w>-)cJ}>wsPAWYiTtPW(f)cIW$! zMwYN0x}DOR^5vt44^#Vz1-5kU3|O9*R92Ij&IdGCCxII1vnIKQ!mP~}y>U6(ue0Gitc#yMqm&d^)U<2oKJ>w!MCISm!(Or?(oo!-BRv;= z-{C27{^aw~OrHMu*+G}Nzh%P`I;WpMgU2PuIsJR+)$11Z?p+{pR;8YBUYBg|q9R)u z(x*@!MISuArNvg3JKI$4sQ4d0(QH!N7WQA)x|d(vM?W}^b?b9 z>E76M$PZ8nIQUo580_P3N?e{lG5A4Nq=Da*a(7c#28mFq;)z+emZwg0dHlXbdLv3W zVZm#s2zuD6d^#=EePZJL)x2s?fFghsq(n&DUSJEUC(B4a_Rt-u#`b^PnDq&?zL|*} zFH(G!2hUxqLl5%#FGAc=eRX!Q>$5fU_P}kg>mJN+USk)j&VdM%iRZMcF#cPv-w2T;Y-_1#B1jCzp@^}MWm-wo+Kx6qtjgH3{uG~bdaGM!S>}SnsOF`WplG4cnHRbu?(FrRlLK+L6?*P)tOpRRjz3>(tr7*b2qpq`dv>d z6EJYnV>RJTD_^^hfu*m7*WXpQeP>M(F210grr>AyODot>jH(FVzWaRVF$MgSL}zzALg3(2dB6{v*ICaH`VM;fEo^ z4SxocT^A~&s2?Ljpqu2vv~|smv1T$G9@RGu*o3`r_CLEA^IpKb?%9iOzp3%m)T=Mx zZ_sx8{u=OzCD)|gFVl^+dE`TlI`$7(DksPS*J+BD{@_N7j9IC}_>}XFlVNAT%6pNH zQ{(<=gt19{pvMHb25=zq@;s>B2&%RvA-m{+tZBBt`QRlw^gwXenQw+ZsoSgBz3r*% zQ4*`x5NZMw3xRdQjcugM=rU+L-y47DJ#8Nh4ISmR3t}j`hyz+p_8GI4LH#aUHnvJ|S?uGy|A5@m;Xs;%aEUC_tolPy4c%zmI@aPl(HAZ9z3QbLp4ZbC z_09fWqJg|X&cX!qhxhb9;&Xv2=Xt6LcJqexzwPl4%E?;=^9Qv?WO7?BvCjFMZPbDY zddr5Iye0SuV$gBLPreFr*nzQ-8TYM6P$@x}+av1ap6zz3 za>3{OwI&~!$Vu}|s}azJWGRir`l&g#ISK+onT^;D9J=|3g?uR5#e$EpAtVTEIGbtv zDUp{EX`ivQh;8#rlE=hr7a0d#rDWaxLSgp6YI^6fW3&sa0elGZ!CuNHLbKYAj;8N3 zDfS07ol$BRVwf7t;Dpc}v<7_zEgr-8O70hn;-Ageo3>bcKFS3YG(R2W30l{@JAWc| zROjy<__D)nar+nK;pN3&Wd4{!*(P|+6ZRQFgP$J?rx$#gwr-qeuPEKb2oI^4BWUs9 z{|axSzZq&hsL?zRGG%hfVAn|b_Bem3b>Z!JpU~pWnJz%YFN#-aWtb)Mrx);7uJKY| zH*VGYTm4U*7&Ny6p~|Q%63qEDhfTlHMK&otPbHt?TlSFB=L!EQv!u^(BOu6*!9Wyo zmzE*p{t8op3bwPgE)%2Cd_S+ThOHx$APl>ZDGzO#80)p4)|e*%)FuPE)GW$`Lvxdh z51!ao=L5X3nR4@@0$kzBJqqmhuIJ?%m~tOXQ;YGT3c@|!D`zh-ett51o7B5wbQ$m= zrtNFxnt7d~uF%(SdG|wec+B}r3{pIn5hp3!JHtDKoGZvSG_@&c~;Cc6kuSI1Y7 zU_-pBH;~IU7N{f^nuqrz0cP1_>cqgSD*W!MWHqp|h~Q!x_uwWn(R+$r=Oh@<2juQ894T4tnY;HE z1LY|o*VaGZ2$OW-{R&kFy+n+trH>P3zK*cD)8$xaGfGv!v{>mI#gm@?vZ{y!(0hj> z)fZpT-&|iFhsPpmPy~MGjfu-UqZk>V`s?YE0W|reT{*_<1_qQdoEx2384xt&LnBc1 z--Y~_X(7#e%ac5hB-Xin6+3pz+C$+L|0ANGo#!0|;LyrL2YH|s1tps5Uset9^S_?~ zC;q?p{YI!;@(-AFLt|Q`(f_|3|+^(jy}y z3B-i)0box1&pZJvx(R^FDRla^$ti18yaF!pZK7DMrsI5*Xk%{V2Rq6w`?hTEC5fJ zz&3|8=6dK)06NaPOH;I89tI)Z&ZNorWOqBU8Zb2h2$NFjfU6jNtQQN@$bJ0p zKH$ak?=+J&XCP2y2pW-{yS&&ZUbsh@^ohJTs8duaCljDBo4pu9%Vt-ie=GTFKhI!% zkR$VS+#|eQs#jT&lGj8Z# z*gSQI0IIY`7^!GMiwHm}40Zk*syZjk+xyBZbXyXEP5(sD9id&khi1Db54>vu&!LIS zv30%^L*@}*i)5`)gAw0ijVkJZ0HXkN_sk$0nBl9cN91d({#cbzVBOTEHXwj5oeTNU zyjsctb_Gb;qv_GzVi*>LMxMdI4WbXlrkMk{OCAbVgSN_XW_`YdXWE)Ochp8E08mxB z;7BbzRP$9fF)TnQ_RyCt_o36RdW|09Q_%Q{tek6g?#5fge0X*VQBd0t%kv%a4 zcm@u0YZAy0dnj5{;@z1xBTL`4W0lhCs#63YSiKP)1%=GuW>I^g_-)Tlw*)3w^WRqKuLWX>c$QO}; z&X`dagaeUL!9!iJk4lsaC%+!Gp-*F&b-8m@8Qg!#%Y1csQ#O@c2@l+;)a!p@b~JYY zfqFh&g+6F{9y{u$BwexLw}2GU#ifw zKirzUTi-e|r3@w?ECQvD+O5;Na;C@^)fbG+?1RP2b>2BDAg7!LY3QI^EYL^b*C(dP zgpNV0d8lN(%6xpqoL1V@c5+3!5Hsfxqm!xx52AT5r;@E`PDe|&)ofJg6!dB$*`T68 ztAh6a{L5G7uZ1aTcPe#6l$00Tbq$jH#r4((Xa{$(vXhIO0&=*gcZTvKa$NmsL*H6V zgm{8mOJ9`i9~DB#q;Un8Ya?l6v@W-N%NNn`V#E*YunY<49PSpxh4wuZMjZ+8X>w3@ zY%qmBDs6oVqN)g=d80T63Ogys$tVwQjo2K}WgzGVV#EMMfV*~9ANG5(RPtDxAT=Mt z$jj}_X@?ni!p2`-Xbh}c>(UwSB!KSCrDe*}4KvO{L9yaI{^RyY?@m?M!VYvJg}7tE zdi~xC6!BmF*RHOIEXn(yI+?4_A||{Bgcy&O$|T8woW^}HtG{SFV0UL1(g|P}8pW6$ zaUDjOGy*(}m|-ir$xX)m$5YK_7fh(NT5YfR&A-TdBr338>DrmDLH)}X${ic&;|QJD zGD&;Ia*hEGdffAqmEd^)WEF4i%tIo#yG0=jOjmdjxuo^gBMDV=?n|diNgcV@i{br6 z%A6JZPuORPWJhf-uCp za(6&(s(~(Rq9mNq>xbHhsl-CbF$Hy{i>k%n^W<2l*}N>aqsdH-3^e zmQFun9Ab!jP7PQ>HAuT10fKBY_oeS%!n17-cO6Pe&e0;}2Ba3Yt5Yz^*i^EN-I&5E zZdTd4_ZLnxD)dduM`lG8Ti;!H++)AZ6FM1^uDv=Jv>T^A(hl+4P#0w_z~qYF7i!C& zCmaMaLP^C-Um@A5Dof+BM2fVG*o~TDffDRkbFXx;;;$HdgOZ%Gs% zNQ;~{%!hxto?vT#>RuulaXKu2M)nxHQ%Hhd=(*jKS)PNU*uG6mI(cvy=Ydm35>#P(l!x~R9NjrFRFXQZ)e@q-KguA zSW9{+pk^}TQ5Kvf2foFVLEMb{IB15S8k67HrC?ML*KMs9X_$-xByT(pX<3nk0o)N6njj+?=7e_`i=JvDGa#k&_$tM9KyTMpq zI2*MuKS8!)=Mm1O#CduM&4GfPQ1c$>4CEJ}u)ICYPs0Jk2^X6{u!~KRw9AnqXUE55 zpr~)Kc;?O6i2a(vQmZ-QXK;HWj_jKJ8))a}ZcqdplHlxfls%Hb%bXN~+F|nreVj>>=&D>s#1^We}-z{jYG^fB}hKkEU;IR z?<$D0BCFZPbbP`i+|^m%JWlSn42}PmPTwz|>f;j^CRt^yv^ro7mU{DRD$LB{(%q$< zWA_L74eOx0nUY67)rzbPK^f$sG#pWoZk0&B<+?G7TTVvtFXs0rPj3K%b}GWEDZI7S zapad;<9fhfl1sCaFcGcY&Wy%B-R>Ua&>dSxqsxb(`dBm5@w)3pik+6CReNQ_she@N^O(#%NT zv?)tI#yY5x{0xu9q9*Og%^V)*8e(6%C|6T()l{Z9`&=X-uJn^AV5=V2?Td%W(vKN2 zggVMje67sW-EeCgQb6vAEe47@4%4Rn7xSl~1X2asnCsE|BNT2rr#~g%KRqNKKa=H- z*~W2&2as0dMpjfQ5?(q;s2U(L3hV>iM{%l1j>Skl)lbPPkY2tE&Z>ZbC9v^mw<<9r zz05TX;u3Mi&1a^I#m&9+LXQfk3kU6P(`$d{yrW^go{oTitse-FAc{0Bj)i_ehQw!r zT=Te;A9&OBrnW}KL7#Kcbtu9^SY;~R%U=aT@3wa&5i6^Gw`}H)D@MzdAe>-!viy>> zrMocA_NZo-J)30LN>Hi5eJ7`q`{FN?V?iOp-Q;mvpWX*2g1Gc#j^c#OFzY}Mie>E! z{gA!Vkssb9c9SQ1X;FW@jpsh7!p^-jnK5yHq2tg%oMbmPFeHi4v-ifH*}gl!mtfH@yW4Z!WcNlW?O!{|e(R zc>Avxf%#tqf&ZJ3mni|(d~`i*uRs?QjdW$CUG(Ifj3ve4zGY6nql!rKvi%eH%z}5=)G7L zcy&x-@6axE;c9-NeK}FBdrFZHtdseATugRz*e?rfy^5xIYj^J5-em5z`zwNoM~~f> zBe=$DnBgVvLSK2xdEQ*Ub5njWOJsr(P5Vcrzf{J{2iA>wBU^AaQ4@Z8SSsZtbnvom zN4Sc2vOEgLGZjB};TURO@nrHHNq|RL>6;*;KNE;csGKPpP>65Bv2k~-* zz`)^#P+2mt*95P>ov=rYFe$~Jj@r4&ubys4>U(mo=#tgz@%PUpi1BYouuGIlFiu}? zc47Uwa8&+U8=q0G97Bbsm>}-uojZ&p=6<`7+{ujdA5r%;z+b)Bvc=DQJ5PL#WoX3Q zwWabzjwT9OmGwqZ#wPJ##`I=MarU z{yVDnKs=7qQc;gAzy$HmZe2aUYT8+cR_&&zog~fFEpnHMH}kjX10rmjtuRkMt8R4a zO&D`_R5y+@R7!wU2SYueW29&$93P2J1`~KK8RCw5=>Kz6vu)6CosW`r8cYV3Dq6v0Kc^@l zE$u$Mu!d_`-2IQ;{%%r_tSKN^3l)oQT50$FPt7WAb@2AwJD$t8p;)Xy-sl2f{&n78 z{i-6)-zp)D6Ln17gN#7fn16xgjwNna*`K9<{vP6ct-$k1&;Z4)IB>Tt6X&Y#Uw0ml zQHn&BVD~KGi{fGKqlyOcNbg49eW8h!5I;a4PJC%PX{P9Fe!dZuOTEc3t z_G#+bH`XT}hF)O9ld#3+_u_22>qTe%rhwI{3mB0)dph;iHxo8B60aFEAe;2TB0hb_U*n=2%yO zA+?$Kunc0{x3BLK!5G6^87x=4`Lv`P%9q6qyH^px3KfGwNTSM93vc#1fvGS|+$YpM z)4XTqRju!Oy}r-G&3)>qKai*FMaW;My9m6gI5582mH+MWH(!p8d8k&*YMcg*79N%#hA@91Tce|)e-|FxLYta zmJE&yusUVW5I0=O33c^)Iueigiq7K0nC)TU+hbBkFQhk%b(ZIWy02oogbMPAb0E;# zo!dh0g|a%0UA(U1_yjV!WI6_3g}_K$KG!h`JPs+GsL0YVPaHuUzu@Bn(3!lRA~;&$Xu0zvl*ocTm;!w+SPvR)3Mh-l$@5zz8+-S>OZv08Y1 z?+RV_GVH5U$h8li*mv^@6P0Y-71TJ6_LK)^+NR;Rkc5xRv*0Il$P%@Ebip~uR(}g+ z^wcQKvNt$L85Av%R-NWrM3Q5^p~U@Z>IHtknft7K3ZUw@S- z7R9tUknsr9aY{fRetA5-lGIePq9|QxmycgrR#je65%RL6>Tp@jVC041T2fWPyf^(p zad3@kG@p`8B9pjOJZLa?FC+er98AusY`2jMy+BwwNxnb5lg?}>@uOuXDSuk)OFFwF zpH5}5(y&ju=!)1Lwh&5mDj}9!^}_tc4K+}PdNx62v1p8NRUKiju$(GdvM2WkH}~nB zxdfyTNI=FZ?1}77s-&20W};S_Dd-;*-hgFG12^Z)oc!U%1 z{#r8p6=8@(Ow0TR4O}o%#jK%Kkpz2h#1z}AsNFBo{)IFn+jMA9jOQtgeVq*sC!Y{> zlAo$Vbs8{!t;n#&B(y^_s_~p^=xhuv*mRf@BL7f~_)3}wKb}}N>bWD@ZaJoXn@S#1 z*amHRI%nv<_7r@p*L*KcT%bIY2Kg3mdRHRYS#NO!;bZ~{Dmf<6cr(@|>*rRD3Z{w} zlYeRbQVBlyjkDSMGSv^`t3PUI>l$IMP;Sf4&AtB+b6Z9dnTVYCt*wdaq*S_Xn-KX& zsfP-d1(X|%OhPU8h_@K^W#Z$u_AQJnkJzgZ?V+n>3ri0CVv`05q4OFI;;PPgCJ44% zU)=kVC3br$KKEd8wM_WTsvbPi+_^KJ zVQLYG#OQj1b+3&)5%m4ys?!27SaiVw^y!Z>XUs*-LS0UJcP|EvC&nZ}*+b8*xv|K% zqiuZO7MksI@lFBiAetT)TB9XF=7X>hv#^r%Ltjoh6I?E~gV>=sS!A|aeG%_G!)c{- zP2RgA_z0|i<}#s1*VIc@9-Vmy>Ud0I%EAKPRp-*DJFODys;qm!1biL6PGOmu#wX8M5)kMB43 zx2yF~dO{y_1X>_!$yY(8^P!5<_dnxYo8qQ=-L$Pe?_e@eF(zU|Jyns7Q7^Wa&~g#l_k`5e z?XgF5Sw1nBQXv425j0uI8bT+{KAw*YPS-QK=yHgRfec&;`yVFV8DKRKS`!U@_-SR9 z{eO`lb9$+`NlPBc~G)YP($7B|~SySd?2w-qn-oYVH8TOpKt z;ugY}W!bv_z1!e1W7`oeB7XZT{VYcLAs$-He?*TK=l3@d?|X8gBOk_-uwv zcSD7-`v^LOpQqD^hye^4w!oN))TiJyttqD5P1V_0A2%7xlFH|#`uM1K4A{pA6?-WP zX;TYQ$E$c=m+hm{+#!NP-H#}n61k(Km#Ktx2#LQrEn+^L^sJ(adL(-w(TPsnQ`|8& z&M4iu&rZSUFawk3x(njNkD5f{O^CcH7T{SI_lo226&GozyNVZ44Uo?$=yo-hW2BF%mYNl`V6XIxVV&A-6 z{no1V0WcMX)$|`25NTmS2#QV!!v~O;^P+iIysFnKo3F#B6t9LTw6`~gts~XHVl(0o zvdY;TJ{B`hOm4)U9N!mG88?pNIUaIMVK|MxCU8mq^4S*l7oTHj%$7@#Cs(#UX_1W2 z_i7`<`*-lc=rJ@?GjxY1 z1DcJ}Dj+v)k}h&8tv!a%r1#b=_Kf&-)X`$x+F-yF(MDZ=%)w7yV7L6;K62-eGXZ$) z_Sum^*FP-b-;J8Ff9TNL7XnX0-2OC5el?~ieg8w@{QYUZzPB_$H)bE{csx;%Wcbw| zzSZSFckJ&**8V?w`Kve4Vq*VKy7-n2{ClWCU*4kMT>cEa!%x-1j3(W7>lji|(3G#1 HwFvn?d?lT- literal 0 HcmV?d00001 diff --git a/windows/security/information-protection/windows-information-protection/images/sensitivity-label-auto-label.png b/windows/security/information-protection/windows-information-protection/images/sensitivity-label-auto-label.png new file mode 100644 index 0000000000000000000000000000000000000000..dd6450af372954cc430e5b39d07c5389d157b8a4 GIT binary patch literal 65930 zcmeFZXH=72yDo~NpcGLNkZwbeDqU$25s)r5Qls?VYam2HL_t95MS2G*(jkzj2uKgT z_udkEAR%NwyszI{d!HZYjIqc0xqdK6neDmTyytygGap}QD$`Q2P?3?5(W*Rurb9+X zendugzUtC>;FCvs=PZDK=R9c2YSV9O$?SWwvytptUh+z2j^qm+w~ln zlZi#)0vL`o#sofEAwUdcB1jzoxbcUjn`Olh7lndT{bJUlEcN*i6#1ybK8# z-_@eSZ;M;cpll_1vNYvEpjX5Gn}~$xY|+OJ`43(Vb5D+gk{Et~za)yAY&pzC)*BSf z@%?9PMQVJ5U_w$bmz zSGMOhSIEhph)>p10G9fv(N><+TGKaK9^GqXysMxB?CM%j@LVk zaP(#)=h}H|c5ho=mJEo3V%&UuaHBr^^AQ)gAaKZ*e7bZRqQ>R1Pt)$HAOj`mG|FNn z(#gMfx-(vsp<|M7C316Tw0dA_fRBIYXB?}_z@0`dj>-DY)Wb1u8ACPwl{aHJg%=CZ&O)0n`Rk!k;`fjv5Eyww*Q zYZ|Q8&PFYE&|;(mdYr1oTC>(99kda-tsWGJV++2G|9zqvfhujFi(0IP!(67V%uB#G zSF>ar43pp_VT9kXF(=&NHE7LIwVGfx%&{NQw%7Lhqg6nvyic|otn?5?9i&F<$Gv5I zf~PAD@;)WHNPRN(sf{;#+1{=Q69_z+^!)=NtiX+F$3Gi;BicGmT8vjNO7oGCZ9kop zLtF#=Vp)+2Z>4ZdcfIqjo%%!lHuf6)`x0M5r`CjqT4FLeiirT12u@b>v)%uzJvGqQhnC z`V_C>ZT$_uu>cRVLfkyXiIXVjw(7=9Bt!OLhKo#^HN7r&W?(*eZYb<()*tm9I%BSZ~y0B%V3Y9b^?$xpCo_0dUx-Y3(NEQejLSz?F`i6u7 z=T46#VV$Ty6(=*OH)wHz5notyIodsenu!_qWpIEk?@0( z`<&m7Ek~t2rk9shkS}4`HPjU9GWS*!X7-!X9xPBRF^wF~2ip6RVv;6Z1I(}QbESJ4 z#kPYzZuqx}E%X$_M;l4vr?1I!CqiMp!zxg0>1n{5Um1ZYRC|~2M*2q9Q3EjXuC@)< zp6THXJ|zA2+LE12hud8_3rX%m+}?97?-wMPKLOU&bLVUWHU9 zAxBCis#@;4P4u~?x5K1Y!3%1%@lbuOMz70w1`d5uWP#k>2_HWN@6~`N_{*>Si+mbR zA~sAh&ykR;zreEZwp;4Nd45SGewR(E1z})_^)U083{rpVx=Zr4>b1%uWvnyGP?I6~ zS9sIW3>$QKGwUV|x9PV;fyRBasIAK;8mU328>aF2!MZoYO|sIVr?%8Wd-}EUfxk_s zwiOZ0!s4WCoqL!US*@UQGIiSC6MZt#onEXmKD7Zmbf3UFnbLEzE$Cg7EIo%H1Jar|1+M8+fFADb zJ-q<)n#}Q@)UOSa^Pu7ryByWNafHvmy04E^gSxvN#hhb0Zdl)Ky1$pO7r1`^t2QU& zer~=w|G8$|qX%bY1?~ z#k@UOOF3RQ3JNqDdU2vmi3)M_x5!7^q$hCe#lmYAjx_`ECfq-Uvq`fz1Y*BHvK)Z z(tPKuA)R{)M#^Pm#}*T`+;D+7!YW_|mwk9J3&rqbJGNBl+lHzqGYa_a2g^1c&oV;o z{{+m7m+&m8I9T0h;&?)8D?*b^vL^YXZr*{tf!Bj?sobcmUsC5BK$|{=1yILtAD9WO zl3KS`S<7Ht4dvab8TGhO{!4k2} zU*F7h;%k$_slt0q-C*7Mq%ZZj6uQwJxpX5;WB0S&`4qn6wl^yG-89}2z2rgeP2{+V zU$yLQDQ5ORwXM@@tXA%v1rqANfg}x%23z+QHsn<-iJpRu0_8$sE zE+czy08J^{4}Fe{A|Ip5zS&ziY0Aq9gp(A`=lCz3P&a@4>phNG1(52qPyp+FA`%f>nnVWpSE^*x#X75R%~!m zo*{JX_|*6NPFc3rW7I5n;PghMM+Bw1-z)1O)3?*M{v!3`ik;A0v6XdbTL=#E9Bzu1 zyg5$+Zvi#qs)z3?h+;VTtv0=5Y~s(39{&}^)BMpm4%|7?&JMvIS;W{cOMl$?a)xMS zEd{ZwYg|3$YJ@yiH*R`8@P5bxAwqo5iJTLnFS)kw1(uWo6Cb_k{pHuUED%n3>@=Hp zFE?tZocJl7`*<6iUl=awG+FN5(kQ1~k%xELqm^YmnV2z>)w`=IU{sq&`V)MDvL|DR@4 zQg?6k$&3#%kAJ#iz#=NNEl+&U)DfB8;A1dJN}VsG!N2dn3#(UcMe$pgOqRP5lP_9q zC8p$@4ldg`UjqFfai=jj(17W*S)uN&Dh;&PkyuGTv!VSwRUKyK#t@^&8Gw9E2_ zI1@&*xPjUFAj1WHFTI)+l-}a+5xvu$FeTf6V2o_Y^XVS(Ym-rxDmgHpoKN9c##U|! z51Ai+Tqy1u+a!F>0Ij~9eYQYvizR^DsOcsL@5}zKR35^T)2*BDdcHx4t+LYa;^v$_ zMPZw;q37f-gWvB(b)B6IuhL^GS%EX2Wtt0m>(aarav+$F>mO*IV!0D?L+?6FS`~zu#lr(y(5;-iPVKCuQzS07 zTdr33#(g?O0}9_~bIf}k@wx28{gsJ|zQb1am4Geo0nPlKIDLBvodU-i;=6xvk;O}_ zasDwO>F0|Ibl?eAlCkHiNEL{r7qi-+Pql5AZp%H#fJ_rvomNJv%SYnO3^HogLW9dN)ZGw66<0P5BiN z+};!loY_O#-~nfOz~u`t--bmS|L6Be6)Y8-?n*;(H*$CUtq+cuIrSwKh~HM0&d2Zp z^PTm0^Its%AE)lGot5#s!r*Jqsiy> z@EL?rJN3NKv9ID{(UE(qiboK!31dk-PE~ThOHN*@6gOlStX07;!*B_|?YTyeo2Ydd zn%#g`)ZQ%F-8D`pz8ZE|5>0j@pcac=pC41tZ{|(;O`coOfhjg|tLLv}6<75;pi-@{LoJM0;jX zxWncnfr{@ejrZ_xDGxwl+=h&4R2N`J)I6eDWyfictJ<0^aF{87860Q5>yGpFQ=cnj zw+!Ggw9t;5TwK1PMp_gWHL_AP)ATNU+Llo1B51g}%wV-ELsE|Ac=V(6AYkS?^2jy8;ISur z(|ycsBK_;XqB*O6Y%*Vfkpj0ILuq_!zO%dWR*naIsS1{?qrIv~GlBvb);%>8v+~}t zj;SJoWWMGqhTlnl`Z0rqI`?mRMK(ACJJDT4s8HaRj97mq-O=p1=qn%(F=g==9o+~@ zaCv3xX~3+TJ+k=h-Pfk;x#*k9AL8362#|&ZW3Tmzj2`5Q|BjKfpTI|D{m-7VkA6%{ zbmHdYR`;U`g@(pyzI=lt6P?_%?w-)Xo!8MJm*>oGcil|Mdbe>-&P*;a!TFv6C;8oO zq{mWLSyV!T%a4*#w#T};?F}A%phs`>tPHOu2vPQOnveM}&MPpT?@320VKsE)Vd6g| zd9@tSjPD4ksH7K;lO9ScC(JIScTXcS`M0uq$1YgE?fX#pyDCmWuDMUMyW#i<*vM)oiogrCRK z4HjP89}3a-XN;<--H>qoGiw%k7)j)2Yg90Vz`890_6!z+)ry^uKC?fnun4~*h+z&G zb9G74MIb$#m$ntN=cSeNrEzP+*}bo9Rsw93Y;USzEWISo0;lC z_U0(OHr%8+9xAcude4u9T27VU?rAo`PgK`pMmv{YJsVoO*iy?B!HzC*s6D4(0`;jb z-$2|68Y}GB6Lp;MBm^IFZ}gXbZ>Bi(ULDOf#>)4Q`+KJ{DHw+%AC7hexV@^Ek7>w4 z`K^p8^J-KW4$o;v@Q31;SjBvBV>L%}QHa=*1#f|ylI8H;$ka_Joh!#^?Ml&`Z%#y( z(WsedNB4p7lMGsk2qOgdP79%kk~sOfx(VUwzA27wv3e!Rmx3(iD>XP^0!((;p<|a? z8K=P}1 zbQPq>ov2m@yz{Uuq4HCy{xo|fs(5Krqk4Yi_Kz5|u;GI$wuc^&fO^%!7qQFtW{}Xk zDYB5Qrt)y7nL;ydKPqd5r2GWB>UHFHp1RG$f?v40vD(`2oJ|sidJn)wi|wZ|h#D_8 zWWpAuo{33+Z{9?fLyLW`iC{5*MExpzXCqS~_JqTm+*=fpZP0I2U?Jk#ihL)M+8ABm zQzzB~_Z+!W98@rn)#Uf8K_iqIoYU$WU*q)IDWQI)@LQcvU8u&u)HS_Aef$0Q8`8-> ztMyo;x0+nJuhRT~ReL44$z5*cOI8brr*oP1aT0h?21V0NJ#G`_*SeqYlPzA*+*)1n zwd#OMavS7p%2|BK4%INBPczAQ!4n&1GIL;IR9(LR;T3!io$JW#45TK@9|A(23WAG0 z4Coxk92)$k{I|q{PCbAEBj5$U()7`E>NeEhEd&Jcz0%3u_f-ZmARLHln~k5L78;lz zFXdF$iNpw?k_B6tEqz_hY)ug#eH>)k-e@_?<^S6=@BoMb8DFa^3d>-^WMz*h&*GkT!znhff8aCNOH2dAUAg z8Sto7`8%@7~PA#7d_7^*|PiTRB!=+ivG!as{Q3qX>)l)|KHNtpkgsOq|eK50k zq@+jka#Cw#Mnhwsa;4xxPfMjjjxTcx<+yk1iUt<6({+AhxapUAC^HwpON7rb`y%q!x^!B*vy@8y&EH-}~T`kzPi(Lro)FhfLAvRN;Q`Q;mEi zLIT?m^q4Ny$EN4=wX{O1^s&^?l3j~C>(#VdQc;a26EPFy!*u1jK|phQ#`T-!mK+Zk6WSh_k` z)O{33DLDP19X0c|fO#LMVJqdjJl9p^l}G^#<{g3=VQVZ7zk66_PPEp3hv@ufw5K5Y zBOa`BB8`V`_dRF?A7aGY z>MdzECw}QbUfa0rt!*ytp)09fF7i=5M44Th-8T%`CDK}Q42+9yY}`^Wn0nb#M!FlZ zd7mxqnciiP8vlh4%5B*9Y2TkLR1&;5tHo4pKAW03(cm*T@HJb5P8oaX+rh<;=ve1O ze5c)(^S&~_-HgJ40oTS)qzt!zbg}hCq%GiTRnCiyQ&OJVCdY{lv>dd(F zlOYVBOS<$!A9XDU2gJ_>CTLr1Wn2_Ju*O7sYNv6U#yruRybHshHYGeM;cz18GT!s* zQ}4rdv6Fx+A^t6EEt=#^X>n6C8uWScD1PYFqVra&HCA@P=fNWMsdZnCn+75Z(tB}V zt(c9i^;<+4G_iDca zTXMQ#L=Wu^s#dN}TqDdUO3-D-s)S?Nw```rk-D7hSQO@tnM)8fhiW3LdLn_+I!Pw? zODvT}iW4(HwuTsmU^#{C*tmNadNwQu`t00!M9rTY7^6YE(4r-PiP!Bu@W4 z@lUXD#03ws>_<(C*Wb3A-g-^+6BO9@5_Uxd~!?tqNpdeD8A7T zzzce#vx7>+D1pv+y2x=y0hwoMEU&Xn$D{})U0 zzapQWWAd^u*DpVgAnApbdrysL=;MHu5FBY$mRMZHL>3mZJ9^aDmLCmSOic>23VwIG z!Ii>IYgp^%h3mPJ&sjHfMJ-#H86tR)Jk+@H9Q7c~F5=rG>^CIkKtV)c zA|9+NCr?M|`B|(i4l8(DU*N~gH9lH@-OIcXEXS@-+zK8jNr@CL?SEA#(GX&YZ4W@B z8f$C@dKBp1+f-J*+*zR#`PAbmnapm&)T@Ta=F{KlILwf-lqJB!ae6J?CeU8AXdhd&xwgw znJ`U0{aGM)wFev2>3v$#wNCISFQ1vX>!|7kY}f3RY_?r^NZ>BJw%@d3II*ANhcPnW zjJP@e%C9@a)9|mXS4dlSJw%w}BXv_E-=pFOD6#TmI?xy`E^INlq3G7`cE^tCxS`K#e@kY#g=D_AT9ldO@+*b0 zY=8So3Co2tujj0oVgR?NQIc!vvp5Se7GgV`nvZk%~Ne1+z-w_$L#_m4f zmIQa`a~T$oiCJTiJRB7xdUt9dpG$jK|18&Z5|}VD)&g0c_}%j8eV696Nx=~X^=(u; zT({pT-Y`65G1hQfo#sj%Pd4_!tfM`)=bN>q+X8K5eJ}g`fib-tqj8sZpPfxSjWm_= zsj-`}`w^>;++AcOO^5Q)Dd#CDTrhTVVsDgv>~Q2q<| zZkEyErTm-?G?RXL4pNuh5#r-RJW3{rl$Pm|#$q#s+$0Ld;P=Ebx z(9SZXK1s3PXt+yT@5ai?lC@}YXW0vVNRpgow<=fwRcSZNY z`P3zIz$zY;_c==LnFmNO@nr#qMqW#F1Z!P z_`V*VFj2c8>BX@A$;ms*21*st0pqHgX0I=T9#feUz!FniV~Kq z9dW#IVP(V(h8s5qi@{NHh_0?KOA%&>aY|!jqvT9L zj8WjpPFujxT{U%eOVBMYa>^??^WQDn>ax<)IY)p4%&cN7%;}75(iMJn-)>`Tym~=S zK@Pu~?T^Fkh;p10U}a@Ryl#GvnL_O8M`hR5CDuHjsII9o;JFdtW?L&YXvq{vLp=q^mmxayF<;0oQPO9c>=9PG`>285IaPY^Wi z==Hsjl$1m|?uFYvP@M}HTJRM-^UEhDbuPj{0sf2MwV>0lk3Cig7EmN2_VaB8+h4=O z!(twsvQW>78mCs_eH9fIcsY-(gIKcP-m;rKshJKW6L93}>-(rSR;Q4LmUgPrCJKQd z)O)Oig@x7OSvY9$o?=14!8kw*9xFY2E4>MEac%+;@}xFScurPrE$(n@!mfMLBztpn z)1oc1ufnD`t-HN_j@RJ=@%Qg%3&t7d&!1mv`bi|<1~mKm>FDU7omH%xSu*x2*bwX7 zoSYXaQwSe_D0F#gX{Qq4WSpu_)}Aqd{>b1mgc3T9tL+ujIn?6$>s{y0<5Z%*e(ma& zxH;{Ql`RsE%*?0huFlL!`SRtb2I~QKCVl*QZa;@Cw2^>81e84M&yXh%!*1e>{2s1) zDBdlKiipUCTA*vIsysbB{MT|5>L{8+>1;-RU!tPIpAxY3(5I}l)YRE{7Wwo$a^RfW zCyL|x$$`g92}}Y;&zded8?5xC7WV%5Hu!4$;6QvhB_%~#TH0ga?c2Bis1J1m*A#rF zzFyhYnL4*%!hT&KQ7XjF89GvGdg2&77cPX%V6nJ5Q|rPxVof?F>h0rjBn$#ua5QF< z9v2sVcx7q6r$lRXvjEmGlUP z7ZcBzz6kd8@>+tjh)tE6N|zWoY<_l?pJ{Fm=Hqzm{w^$-f;P*}qW9-2I#WR`p+T}W z)@8k0a;7ohSVSB!>!aeG8QHVq?|eNaF;gM5Us-u?xx3yRC}0*oFHGQz4!sCV&bVW> z3JE+834_267$&|lSNDpSS5_|Af3iU*2tj&=ZVpK)rJF-_bfTl8wDL7mZ5czn;#Bo@ zbbeigMSuSMq&t#B7QbFxrt<}HB~iLh)8(F=TpG(vlYfE}UuJVkYHGIz^#zzn;E6A< zS)*@X)#}<>J43_*p`JPcU^$S@Ce0x~p6xKp^^`D7cD6=}#0@wd+oK;BVdiYJf^7RS zF)?ub8aJFEGH zw`Pvry0)I4o~wtX)A%#-gN+eo0EBpB6HGJ%0^rq@71n(P1%>0@NXo8c@oTA#`kbTv$SfDv&d>{U^yuv!GPR8WCwC0_Kw!3%k zKo8axTi_(ZOzduid^&^}4rH2pial3a{Qg?=(9KYcYcpPB=n@_RCyHyZww<_+ zrJjn@;)PHrB9cA}tr2?nELuNhW@TsJ)j%DNI{<-tmSwWhF9so?Wn{!MQgKBd-V(-O z(%0P`5jJQu8~F1Fnw^Zy*SgN-&Oh-hQXW-a{uz;dMbQ!&rf8SQyD?PUmTQTLt?A<{ zYy73*Di6u-^IS#0ExtWj#{y^%={SEd0e1l4y45*3C@<5_XJX6 zV}FB_ZVH=U=!QmTq`y4SGtKsy_6t32VFvI@U|ykHf9HkI{R){}X+1gKJLZi~NMHib zWGmD0GBPl@aUZl}Q6yv_5$X&D+~0(t5PHS!yNur zBXT58b7~bA?>tro-~Yl zoJ;ZZBXb_rDybd0*E(V4u2>3wV#`H3Y6I1E1QPKYsZs~I31(RtoGdII z|M;$&+l)Mrv)$Qa3zoxW@K7Ou-64QMjW>=%#@Cf_xFshiCzTp$KR-VY1Zib~2MIv# z`{Kp@*tGh?MPQ%O^O*mAIc&isV&|>YAV%0v2C$6 zg0*TKu(RTqV!(zN3G4!PVl3;Xo6}7bM*)J_M@PQ)N)8!K5n*BT!-j^2^?(VFcMKJS z3!hJ2K4jPPf5q4&zd&AI(EKDq1FYF}!)OJtZo9I&PLCNF&UC$Z``@T<(gQfs)ua_^ zB~FfnrGj=-eBC$bdS!PESwAF13ik zXdX|Gj7UmKCZq$q&$c??DF4@lQfOaLpnUG~Q?vri^QOTF~GWRT{`2aniXWA4&D1k_~^Olv+mJn-zyc4wiAwC z6OLy7uC=0AoaLqY(RvuPnKqTy#aHMa*bMaCb_MjGwI6hWSa)8(jNDKinSbl_Ml-S5 ztm>mmUs*#7Fwr6oXh_BZpnJd^?=sT0i%$KVM7Xf|^gDK3x)zB8hZc9Z?%qutS-q6^ zs2Y#A8;`Ra^H!EZouL;mSOIxzLoxE8{HJ?s{r8qlPIXm|2NHiiP8U$~+RN^LyI1D9+xlXP~phpyzB4SUaX5 zPK>#?*Zs-&5KK1^;Tm7^6-2Fv-t@U2#XM@!pqQM-Hs$VMRA|yEd0p@2%h4kJVqhQ5 za9d~v+>-wCpD_i~lDg0V7R!OrBa5r=S#`oJ;n#<)>`nIs3cGG{ z3|Nh&pYLhW+l{yY+v}Eu1njf`3DJ^!y=pG6kWjj`k01=6`p7NF<;;X|zm@|2h82*M z*3R~9 z-1!nDckJ$WT~uerleUUACTl<~B$7PWj|yXw3`euNG=8_~2y>9|)9= zrvTDC($PYcR|Dv{1h9+Qke2@v6TE9p#`@dI05$%c*3Ero<-GVy?4db1Ik;(mApwC1 zAuz5-8Vh7K?d|RR%@2izzk~t#$wDVEig|PEnXJG2MaskX3s;!-!Gj$8x)*{2?d{ir z47Jf8=Zti`BP0|hM@A$P?HaVw<r4>ZvjP_M{k4T0kiCw|v}K@h24j5Aj=v;mC%ybN!u=dHOdXSgkaLcIqPov z*mvc3UZ>85yZiKHWZc4MOdw&>5NpL}&l*Xm1R%;Shn*eCw zl-Zu|v*Thq?}zu54jw1w4xb)#RT6O6{9Y+h(aKb5A0QEqMeGmv_g6GFesw?t<3-8g zKcw8Br1g8~2~g^PhpQaFI}3-vTD8(J{otTOz;#*Ev`pau~?#1~Qi;=5IhCueI$961qvl%*-51D1)GS5&+ZrO>q`$06qpP zRUqM0cz{&%z8zOgHuqOTOulaSc27drheB_ubjGjOolcdFl1{W*w*bkVxSSV>3pGFoeg($Nq4W=d3z0t>eRF%_AAQF zA^<4}*({v-?AC!SEF1rK2{;?ql;@NpY~Ti3r)xiUmEu$0dDtmb>UlbCe3Sd^3Kwt@Kl0-~XtW zYs{o`vb6i`K1S=4x#l)Wv1~^>TKG#OL8SK?cy|JzPP_>{yULKu#J%d#!7#3?y`&Je zGKy{Y-0p&|muYe&bqX;|cf~q*KKcSggze}5JUzf-2jx zeK5}eHu;Im-w!;Z;jCxY@Gpq;e|rbzFg6%z=E4J>t0S|tK~3;S|E0Lc5F%Q9NGSBtB2 zRlOJ`fl52u7twoS$C9W~$;K?M{j87ZMMz=AGw&payWsqRJ0I|5T0n9DEajc79U5#G zp40KnSxOF`2boNn78W}G-8j!mXmD|a9Ue$A6h>QXlb2eBi0I@iJULe&{da*m@+gzQ z(3HBEu@%Rh-;#&oRJhnRhsM$0Bo^@uYZJnC!-taR$h_YC#e#WO!9`j19~Xb+PJb67 zv?8_d&ZHm%EFe3Ph05Ip!nJyZClo;YsK50}SrzmMU$x&piI?Gv{71;q??#=wV`m-i zt40X;86Oxhg3pBTvJD**5b^s!KQ{F&H zq*8omP?qsAC#c1&FWN|X(^W|Ic*Pw4sW_HJjP)ezUhF{(6=PozaOk=VKUFU9z?7!T zp#yiAktcd8)IA7q$B8~K*>r1;v44zHvCO*3C_ zqoXWO>@d==Ua3wJ$+HA`{!lI6jy72qJa2Xo2}@;xXxKfaUOzBW9NL0%MDSZ~yxdC< zJjrb9r$WBhj<2qqu%T6Urv0+R(ECozzWY&|H={t8QPrBPhfREZ8Dn01ot*!R2}m1u zrBf@;Aikp6>BB_iEveC<8*WTfrc(P-h76kvS^_s8y8oakI-vhV!Fv~U?-B=`W5uV^c8^ic`iTC&y0(~RqJ zUq$!j>F=%i(|?j&{niCq?H{$qPjA~C@t3OOv{NUfx}_LB#gG2rPYt>O`fFS7wRnFA zWVlAQ3gz+qUgjk;P|q$7lW^@?3ve^*%;<(>S2y-q@ZeHS5GU781Z;>ePerG1v)Ju= zS<$!NoRg#bZgFuG2WhP89q{s_cMmlXOu}2gx z+80y8V0Pw5A7zcfr7yojiIE;7x`|CWj>a4{{-?>JKK&KgqcTX7d-Gwo&#qnMouh3| zhmmhn^J^*AA{DZr4*10Q5}!c{Zok0}KkyUQGGc-lf8Ro70VsV_`$AIFnBgW~07{5OzPxvJRITHbEDJ zNjynEKeIPDtWn?`+>*eWj;0M$5c?N+Od1MfTcGZM?wF4%H7>{LH1L8tEQr8XTgyiC z!E!h|J|xZLaiFV<@kVJ3Q;A_M;iXaTZCnu{x_Y8CAM6!Nbw?9BRTDV1uD>CXMx`Rb zkyx&t*&>Qm&%h<<>XcdE+%M zh2?%DDGk*Hbj(kK&A9+;K$8EEQwwLzY4O6hHMqwHo$eoMw59RUe6^geD@#$nf~XQ+ z)m4EcRoW*SrU+`rQH6224Z-5xuis@TP8`JRTkCa^#aS0I_|?PVb?Lp zHL=i1+lL@XI*-6e0yPV(1tj#(_G7MtpM|lW1ZwECzA|eTi%t> z-zq&^VoPmHZK{I52SxJ&pxPEj?-+9mvicdfi~aAZqigLp-PP^Up-!8l6~Vtr zeiB9TMjTiHu&1Ua1j4 z5Lv`#$MC1Tq#O7CI7Q^u_76?2tpIpkrgwa-n?&H%Y8Hq!|IXF27mOmEeUrZe`$N>d z;funZ$`g|IQg7=gzR1J8Hg0U(Z+cqP)20li5ylQ;T`zdW_SamgsNR(5$X~w-?cN&f zvY+iK?vj?7A0KQqMTs*-Co(7hX=zGMp*4*&J+=jN|M>U99oa7+Jo3f$8KpkW2hX%` z&N1BG2`|Rd-@W{N^F@X>PezRC%hdDqCHr zCYoY(F4vK8;?db!Wj8Kb(0>(f{Z@gx?XiE)#fwMBri}r<*$&*DGb>Q0%5Dr_qB)8LGvlD6aQo_^ z;8Pkz9x=i6#r8s=yd-`^bNkJFbY*?yY-?2bgiSo7mDPiWR} z{cgZHPrhD8rij5T-Lt&~_gt(hiRAh%Z^ukiq=l%(rU7S6<%@eN2a6aM!#47xDp{ueGHj`p z@x;?kJ9w$zR(kiExseVNpve^td~acH3j3(%D>PoV9zS`yNtx*!9|FQ-715?>+BO&Ibk8ndx1<} zw`+RIS9aF``F>Yz{+c2f7gAa5=h>Rk3wh59vsVeNG0>H%iKs14{hnZGyxKY~Aa!Nu zQdo?g=WbZ+P;kn4Zyo1;aSz^M;XGIu4e>}~4d}TzllC+2eO-))w50cFK-{`GRmjsq zy^RBw>V|RKub&(^g1-f(LxWJB1`M!{mQsZkj4WcG*>6!|?}D)I$jE`Stu)?OjFj?* zm(TI=$8ba*TjrXyvcnYP2s#5?d_71;X*7APTc!Z~p60ZB((30ImW8iJw#EV|SGYHA2y-PontV%YP|ASs7*hjP_n#-5Z?@wL)_MAc3R{8ub!u7f)_JCWQR8x z8a?WP{?3@W`@$NXL)ma>H)cPI=T8c&sLc|yUZKK?)qK&`9xQabBG7F*yi_}&mY5Lql@cX98o{2+(7EKZL?;dG~6Q=nv1 z(zhknK<`iIz%Y%l%NTq)_eLJr!}WU5DfNZFCkkye_flBOYN z94}!?LC5mQ8eh|{i89m})h-hLvwL_*bP3;)F0E)b5$lr+mkJ!QR(W*|5oVsg)ZC5S z@O}G{80Vwu%se!eSFeaLBT{&7IZnV@cal{MbiEI@@z}oGH4OS>t|T~AQIf=6c=#Ss>?A#L zs_@nSah1=i1Av2db%Uai#6ptpI|IA%{6H#ak!y)MFTmJ{h-%y z5QlPV#qwy2%ER-5Ti&>pE`-u-PIvz7XpG3-`xRbzazO6)n&U3?rKHnv74cTBwBmbP zoE&aM7izOsCx4dz40Tk*h4_J)YRMCH>*-JYl>#TSdaH`<94lg(wh~7%ZQk_c;T%w7 z?IX3ngh*~$JhVx(NOiapHz@QaWKtcw%5XPRy>~ivh1UC-+}nV4w9ny+@}1XzEC;+xb~dX6UB17=}`s#(p!#DFHD8C4zuzHq8NSr6Hy zbbSwF^_;RUl}psSdpn1_O*dIm&FtAEa*F>TVd8&!d$}JjLfy~pDX7|+|G9|Dh&4a8 zT@?@egBINnEd0jXBr{do{zoHWSC^jH)N~?f`ms~k&$V1L*>k0+EUGtmLwm_c!B409 z;AW0t?NdRDBLbenB(l4nzH_-rm&c0kgF&39=&Z?)ZW#tl!(PDO6DAUoLL!tKaF{sLtJWji_n0%H58Apq7|{ zt-#;usU?~I)fI5J^D)=11GMSAy9^}oO=PMuKjQhdkg_1ur>xcfdmHJg@puD0!VdYV z98dxRcmSii)c9w4n%V`TvFkGRQl=#W*_K*D$u9~-m)6w_dCl@ft{A>W#T&7}J*Q5l zru+19eW9qc0{>YRLM&LWZ^Mhq>k8BU82t&r{Zz_Kcey~O_4kw}y9Auwdx0N302=?l z|I)@rMq{JQty^z|fR-myXK>^7pg{J3gCX#~o6lN57xKgwfU@y@%ACaP4r7-laku&3 zpFYt99;Rn@r^>;Sg=CN?CnrF)I3YfMcL~)+kKxWVJ=oqZ__mln|y!|!L>LGMPeh-bx5epALdMv`YP zpvxd2Q`0decE9I0*+oqY&(9(XxmYw1!$5 z8YTf~B7k^CCnt9Rm!_4n{Q&8uFRCB^`Epl)pa19=WVsy|qn;*H?=(>pkSPVF-dD1H znyVx3F#PGt12Abdt=sJu>0|{|Z+emJh;`QetR(&C)+#8gqeE5oIF{e5fuI$Y9jj%S zejNm1+<%4U9w~$5s}2ZroI7_8KwUgMfwU{&acxOK0S{&$4m@i?u1?`1Z@zkxxs8n^ zps}zpDsOEwPtW~CVGAiAOyjGcLBD=IEy|Qg57=!-V3BI)q=2fwgEjA?M|E)0=~RQ) zM5CXml`V2OClC;C>ztslurLvSkUc+KV(jGPq#VKGg`JiyD)Rz)czCSzrfWI4y18Xu z9AkLc;JNlxxp!s;1>oIPH9(==_^!4WnC24)Y9_t_Rfm~s6Ctky2F5l04SvK_u5*J*ZK|caemuv5s~OC>;j4elNT?3 zj3f{CetjHM^G9E9^AXzE+ruM!;mJg@91JLXRSXkvSE)^=L7JdmN857%&>GGpl!uy{ ztoN`>c2HOy1t<>5>vkcN24rMuTzGYh?SJmd5ta7=vc-$!LHp`}`i}M(ZqA*?z!G@~ zZ=8h7^vQ$^YAI}@)+Jv8Kq>jS{s4IYP#GkhcVS_n-ilSyxzT=zw=`ONfPdGY6TH9M++C!v#`o?ZhN zLx@^mN`M3|#er>UQ7609-6E0enQLblK-J3Nm!qxPnF8PaRqdj538!%|1g3~kh20dq zL)wS)qHsFz}(nOk#-n$S10qFutl`c|4i}X%Z6r@X+ z5{eLdkq)5=NbiK+dkusVT0&q?p7(jb_gicK*y}jf-aq#GD*LA;%wbjSRw4b3=&hl9Pt~FLrlCk;ehs&crkN@FZ3N89a$z2Uh`Dg zhzV-G%4@iTxulX8Q#qr8o*mq*ImALGOq#~hH4q-?i!Qdb!9S}#33<%`U!6S#FKQv<4RbX={6v44@(| z@(>7wGw{n7qXzFdR(I4y^QhKR)%HRrU zk5k%>7c-s|i^rk?5)A6HoN2Rf5Gm*6B(RgbUy>3XEo*1^>zxc3%%K)WFBVb2Rsk6y zOAl5};FUx@yMxRC-N4B~y?65iu3!g4i)8+sy*$r_-`A6Nfw#3Mo~PDZ@WaAy#oFSV z*A_T_YCI)0y>Tt-#UO2be7uze@1&md^gX`SZR-k@ku zKeqf~XG+9i#&e?+ASN_m67o>}{3fqMR#Q9v6hIobwILf}{22@k-wbtw@P4x*oH;2r zb`$I{G&E#yxW;#}mJD&6t_si23wSxpwiWg@C`hY1#tzVQxQB?S0{(?9kQml`3dmOz zDWaZ#)4VvDhw^=IwI##GwiOi?N?n|qC#61fdMx63i9g|ZGTao~G#RO*{N~LYFRxmG z7g`IM-M|`{Y^QLk$sAw{Kz)E1szw>hI_ai&`0L{~u=?e`$s|HsDx;I4t2aIIMTXVG z-Qdq8*zB9T;TdDX8$<*Iqvk{Oi^qq+gaIeuc!4xZ;=c%cQS)JdY#aI~9b#oA3gA_a zG#TN;*_quQ_T{gC~A1R)CQXIO%#2!LJAj?*Z7Gzv<(DKXY1vQUhxHi} zW>he^?1zDX`B}MR5MXLr5FZAw2*4xd-I?0fgaUiup_kQcx|PlxA;rbTjRs4Oo{jvV znP5hyLr}SQkm&;%O$UJVY*6i}R^aUHEVvVJ{o48Hf2OUpM1z1U?lU*Kt|ms1MNNx) z&FZe5-S*X;XJu#9BwitG_+TA700VW1nsMuwtpE_JhMF3%wx?flKj)s;I;7Z6B?IatgxSqj)1zl3Xi(b61xBm$(JG{najm_xkt}F zAc5Hkep^~v`V-zO_G+|Qfx%s)F~G#C)dSR=jilH1#xn;5{+W!RRyFAw&HKY}RVw$* z`JqfjEizi7+w#@G8c-_}Kv)f#2g(D}ax1dF)!l|pV_ns=WcqS5YwMG4u9DY|*`8ag ztMcVFr>aS!4p^Xm(3$|S){I~3eN_N)d<5XEfJBd03jpPml^q~8q~YKFPIisAID3H# zLUsi}O*oty0Sc9>ro^~T0n|GCDF{TwcLx)W>w@X8BLq@YQ%8INZpjnfaAG586c5J+ z5#RxQ*bgWrUGLbQKbL*f2;jk@qN1*Ma^+BPsBFs|(EmC5>3yfmF#n zlZ9vBtLMB!5pPGt7kN`WCoZ0=45k5f4o{f}+63#OB~}8gEdbyG#V{uU^$dd_vA`)1 z>~ZV!h0yZC!f)tn-Lt(`3ZM+P^KRyX8>(ypk09rVlK227Sk(`A441cIiFM*waoe3q zeDK;eTZOo!{o@Z9Y!)cME^$qlnLpIuxXsmj&G1w2X7hfzAvQj|fj!#hF|5i8Zv<-d zOYC@4uFvmLU^UnJk&RI{1c>JgA-gedN1Yj%*Q<_fty05k$C(Nz=~}7V4POC#`w$q? zIVw}caFb#>YK{YE4CU%tCJtFYTdF3zan>TLQ#Q%0mUr|#$f_cnkEWdzEj*iCpG?kW?Qcc!o zszEG%f4n}U#J0Hn+s!#Q=0(BkanTsw3xINKeCV7U!Y&0?*48wgfRa~O4Qe#Se)QOe zXk$PH1g^KDy|yr!{$I-_)QUZT6_|;1m6ep(IXD*A6Tf#^0E`P2^Cr4Quatd8%hKCh z!Xxzx?-U*dc$g2FbK$v4i_uo2HJk}kTK#J+c4W@ADfIgT1eQ;x=%#e?#dg96ALN#9 zDu9{8NX8~KWb0(?(&cNm$)3fgs+F+AH|(+gLPA1dJ!XbLb$WO}s{>5e4p9v#Jy>)i zmlePpvE~MX4jGx52aXXZ$SJ#UevTUQfeqz-7_e1j`rlX3{|`@b)R5lL<1|-U9gp2Is;tt^8+)`l$L0H)9SUqTa#|4mhvP4r1+g66(_fTC+soSAM;ux45~Z6*@k|UEE*<%NSCw1z*ekce@}9 zKyeGcb8@V1+eqY`e^46MFcG-teb(N%Mvo(G@O^Izuh9?@4h0%X#O#7P(fb(bYa`eH zX{-*Xn{tz^v6l6m_;l32N$}2tMz2krFs!?-=hq$p(JY8<44A&kS(Sw(*!0*R-l#`@Q^+4@H9t(?cb;VOlHk zMEHyr_&(tl5bQyCoM#)LrM{(Z21)oI^izQ*q|Qt?-|310G56;)&2d^cu`f5UEyq zL&{+NJkCVZ*(Y!2BulNnAb&SswHh$noBYe#QpicqV~qTp-GT%k6Xo@g@$r)j!1ml| zSZj25q2%w#$iEdVc>XPzdeImS0gHcISbwBnc*9K9R9sDO?fHgxbx#%{e$9+$+#Lo+8X2=i(pR=rZ=B8Kl@CLXDb`@) zM2{w04}laJV8~smWg-%E_=4Bg{QHtssU9dXk1_;dhe~}xStF!yMHU5Z34PD8s+e;z z&4p!AIkWe}yS%wqn5#aoL& z@OjkQ9}{xS;nCqCNqwA}(8!tnVM}-6#K+L<8RI1cu#?7QOC#AtfBa8$+q7leLCs$1 z`saJDfg!oSLj4;rWX6{!{DTF>j{Ea;%ndwTe^dcEc;ll~l`=68{M*@t^M2)zXYgp$ z)4LDN4-8x`Rd#C2>-^p9EH|qqv>b!ImNuOaHH(t(1ixncFLgGpZk~MAO=YL|G$ofX zj!@3&lkvl3fa^WGtkv=Dc=s(#=_1HOr`tN24YMjRgBdU5CIrwce)V zR>3@0ePUB|Xl|?wo>=QPE!B}6te&|>{4Nns3q+YsUEI~NrB($e+ z)I|YWn!ACbFsV(yg6kQz$?ILg?QRIw8JiSTD)2^o8 z>;{nUK`0a9Ld67f*p3f|ez2qigVdDUY#h3D7_#orInH>OU$I=kirKJmm_)c0=+cO~ z`^~zaCGZPT>3O`eIWnC83YsOHp02V5k4+)AJHr!xh+m8RCwuowx*PTK#_Gi^)2dG5 zMbhpoD4=Z2zP&TGzdCo1@A?}Ci3Zid}ODFpeMutBDXXI1Y+=}L1L9;;e^ z;r_$FX^vc|in^1O&~0;0f7YOSOW4uwm#jV=?Us0%9ZC6JrizckEWeA=+R#;$C00E> zsv*SAp{uVBzw6H$RzvK>Y+YWIYUlTcy%p;(&1;$r5=SGid>_R51 zjxe+1AzbiPaWgJL*Rn0qnMlU?G&jf8M78Qs6DRLDO>2HChNPK^c1y@Jq))IUf3{^$ zKhlH1B0)EnHXCLjS{SaMBa*NIvjt!77*?0jSBq$6a0inZKQFV>D!;2EN&2zlKZH#W z)#3x#s{*~5-i<$VhKFP&HeGNk>%8XIi4doTtO=mICa{VOeK4H~xCw4xs z8CTMGo-7JY4By@j$qz~PvGTB)+EpS}qs0|7jpmQWK272dHI&Y?)+!(nw}0}O%xJL2 zVcc?k8H{-R?hR#uBR#KRSLzCL${#|!Q9y=`QxM^7j=f3|0{bG$$+ zYG0){MLlt53H};tBLh?C(P1m&@_9)?ms!F+37Re59~>nB^s~$1njmU*zZr<0REb?G~p*0D(YA={PB6k9Xk<>xK9S-V!~ zI}mKl(7w}1<22Qlk7IsgU$qW|$sVyf4mmO= zsG`fz`ZeJS6r!6i6lO_^eYL-W84I5xo1#<6NW1Iv-f5k6t(eVuLI8Ue+4b)$CdOvH zrBMkEV2uum_v)x$VLTKB1?E`&ISKa*fZ;R^_6hxE!2DwSHix~|J41i7BT%Z|v z&b6h{Hz1?eFZxJBUDbtaq7>aGP|)sPBS- zw`cUxfV!$*?V66J)%1^Q+iA;-Pj$YozyQmGOsC2P9&b$9{r+9N!_zliX}SgL>l3!{ z233JatBT}Rh1PGb1|9?~Lv2@AnA#&&q7;jm!SmTV+f}+_y1GR?JfMiT&`*+08aU~^ zQ4RIf+L_VoZH)!(RoJ5(7%Jk%bDCRt>+Bc#!CiU^%SS0Du6yQ(ap%kck;v2$L+ICF z!llLf;mHR<)!6{bru~q3&kiL3hqONQ^D|wOG0;97UR`0%yIvh@6qi4w!|Z>kG{TX= zCR%LN;696}EY#_tWo}f@&}Z`gTi017b~maQ?m!QYeLbYuXImnRdvm=*tXRL&eKyYw|ZpK3|@)2u3=t_K0;!~W~pBuX>IO#xAVm*q!|}Sy^2`7paEKH zZ&PIl*}NNym1us`k`flF7Z0v<>f|}QAv9w$NB1dehPOrJ%U%?zcOMa(kYZDE%X_TD z=!XilxVUo6@3IaoaRwU;jb(glRXNtzyT*6*aN8X<*0Kvu?|V9iSQvCY1&a5N2u}%_ zG_B$qHXW9&qp1f2b)%c3nCJo|XDr{6Wsdksga-4B%R)`9UbtBAdMwM1$uq?EhVe{5 z#WfRlAc=#N03VK`^Yi2-&U*0opYuwRNy~g~-KpIram+3C)xWapRknIuo)!jco6vaU zcg%}HsMQ@z8sF82C48{Jo*?x)aAkxtmuFWsajp>X10YQQzkTRm+%w*K?QX!u_hoU+ z63HIs>fIdq8-{-b+{MWI7&h2ICavkm9DsJemj1T~=eEpcB4Dvj%*qXQDp zu6W)5eB^BV^Tk2>W92l%`C|3_*ITFgTc{JO3v-zprn%0X2qVD_NBd9Fe9{!l1FKGp zKD~)E5Iq(hPPf}%yDy8?5s6(hZ_j4E_LuwD%E;2LVCjz%|LuYslOfj|PFph1-pemV z+C^VBJl)rg?-Ht2d&WF)26hlM&Ak`P85b6*!drZ7)M9Nv)b_J_z5S3NzN2XPWSz|- zK^ngf|JRrOm(c~dPl*6QqQ_qGL}RsTHfnAT2A$mLIIF%=qDpwUTYkn(oZIt3_3Cw;7ngxU{LD$Xatc zI)S}%7G~DK)ljZzWiP`s`*Gx+&WT@Qh1I&bc$>3S6uMSNCG_piD`uw8)}W%^|QWrb5Cgg6<7PyFCmwC??~G4~xu-)!@nTT2*CLnC*<# z!vD^kIEGp3SoIWT&@gHZ?j?BrhB{fr&@2QwUvXR8_H|ynZ19d z(Un#(rJbsD#cse8i1VCj8cIsvj6C`2y>(BCRi3*0i$BrTy8oZIgvn{6U%TYF_x@Mu z7|oy2uOi%=x>C3!`LtEC+qmmHNpX|Tl`jRC{5Q~U{M#pF9C4hp(lk%+4}25K@G`2* z01;O! z#QFYsD}2&PtKs0uAyq|M$K#$!7E-p%9*+6>o;QW{M%;A$O^RO?PKLuKDl^Uv3#frz z_zT#-bomRRLp`IgI;o1cf)dWf&}PKo`|dHoa!4j7DCcU0qi%#aAMvoD2)DI{Rdhxu zJM$h~Fhv!ltIKL0Wq=+OUA%o+iwoE6>ip&oLb6b1R+*Mm4W#j^7CL>he;XJ!=JND2 zv$79XZKEUY?d%NeSaG9^`?>VJ`?!UI%7L2@;DD($@<;nyx?-xUt$(%eu zgr}1_>v+NisI`}QWvcfDdqx3=jP*}0U9G{i79tPgeJV_~38h5+)t=1lpEl7zuNDPX zB|Nq46spIzL&^sqQO$s+La$p+b{e%stI9`jmimH_>C#Wy**-D%T)Z31Ns(N6du-iv zkCuqWyG_SRFLyqLvih(cUwX9CoDSV-PL~$JM%uw~j-&T510C99X_N`3A`IWiJA)$W zF+C&EPHz%4vwG?9U00VeaN}PMFKHnS!2RDFubTbxtF_?G`EYie`eC=V!YpZ1&dA;q z3vXSr*|QI3pL=d!e4Zr=+Kuh3VCGZjcf{K!y%H4Y4q&9Uu#j+7EE*M=iCs!~=x67c z;>1A!a$R45l}U;L`A=;L#B!RJ(WQ4Sb!chE?<3@7pyT1g&|Wb{L`(aUpsTf! zwsz|0+B|mPS^pLS_UczhfDH6LA;b?^J8!npGO1^ddQ2vt0dL8{md7$3lvi)*L5y)W z-G`?*nAg6%U{SJ0qlJpFhfg1JpC5(1?P1gpP=6%ZrgAqhNkc2mZCQL?e*++*Je9CB-i%B@*No!kq z*4;R~+bSbE4@Cn@95#flPMt3b_cWoeR zI|_Jnjh#z7oqY_N{w#1Vj8yob{GQ%NMb(|ohlyXB^J_qZ?kbvv1t?6c zw!WTwJC>I8g|u$h)^80&_;^`yUv>a4osNG-EYM;4|I7J3$C!Xd%@{5%wt`Aa16Y`e zwsvm$CVYJRl;+yrpMUTyBq=s7Bv-|f+tNExqV4I%`kQb~wM#2)_Qz-0*Y*H+`@bPB z_(1`u+9&mrr5=jGZ8r&6nKlz(tX#PL&%Ox&!$zlm3ZA(&n5ZH#kWyiGQD_--rViMm z`gADCYWatDGHE_08QY?=cQH;puTnAmt$yehH=eebv--P8ldre^OoPo9Qf<}DJPyM8LztmpXUW{ zs_;faSF4+ZRSiI!G}TmdAb~#VBJGJ)IIWK6SPrzjhg{RV!9**grlO*2GzL}Kp=*^kw-Mkh_Cc}K8Z4i8(Gx{jn$@;Q^ zfAIZw<@~s5)T;*m3s+(3I(3EAZ%I4JziGF!(lu9oh2QJ!l`D;Y3YMQQLG%K1B7BI2 zMujWx!IhBcvHw!WG(Ri@x|+Yz(^SPbmj@$SoQPE^JkA++(>JaX@hG>UY4tXoqn+=VnKt$K#gR})ix2~$mYhm4Ebt|xc}k?AA$T+S}BZ)G*qFaKq@=kN^hbgN+h%k{3&^PGi-lmj)rVVflji`_LYFp;D6x-NU( zTXr4B+63INa0x4Y393HTiIp?W!BL4Xj=3?p{E_g^MnlSHm28$^zVEx_1F`uPis;p0 zZUg>IZS^C4OJXs!XO}jg;YqS#adyXwp7V|xxWc>Xw57;w6ZjWc4vh}m6vQHSr!h(y z1ROpU;q<&gr2xbfMIUdXA_6M5v~P-Eq&HPM!bpE#SXqjwYhlUkN7ca^a0AKM_?_*T~VFgF2k9>q)5bHOof8?I0l!dvZ1zCUIzhbu>P4UAci zC@oNV_>P~Qe@$1u_eMuJB#B}h0KvIQ%zngtBz_{uKLLMRf9Q;Z5uxrvVcz(8i}hp* zwP@@!AfeZva49=n7ld;YWL|o6=ya>>ye8EDg5z1{Wz#Jg)B2_5Wq^|tv7g{?Jf|Jp zBt!QfG5bFc;gfz?U^L`39)6j;gF8(6-cDa!|GaN{3{NO#7q3zO=j_iZQlP1b%mJ|< zV$o8|>*J{DXAoR}nc;I!uLR0NS}{o{)ykF1DW@3%HS$ZeEp-3VBso3cJS|cg?S}76*IvyqBEdYRiC~oB^a^tu^rA0U-n8WQ|*Tsx)ov z%b=9e06V-pac&R}eC@y>4PG{=;_bG+nd(*>Ezcb(1KU`}ffEH!+$GUx0QB|D<=%3(Slx3DwcByEbTkYCeQVl{on zY={dFbCbXin%|9eg;>PrRRGljRDv_|#=ft#)gC_j_sgz{a`hmzbCjRuYr#GV=DxJ1 z67(7}fe|5hNzkor(A_--Y9)d9*6w_djjp!BX-a>}_L%RCC6xxRJH;fuaS|`G7}+$` z?>+lIt#26(o+CMru`%fA7ZKU(YR$jfya$rSY z;@j{%R}&t^DbiGYJL4Hsw1KQ0S6l%H3|jN>BVcy9eA)GSEuVk40acqQf_eM2!Ey@M zD=6MKbtg&v$p7|NU|Nox>C4z``_x-ZF4-?CbbqGAdYIex1rpMCoJoFDZEz|&)S^a} z;#&PFU@t`6@~f=+A(cVBWsjcF^D}2z&jfLht}5q2N?Sd*%9jsV8tLpfR%xlL_986$ zSGBsWLD!D*R3GYD52|2L3u%gQ9_ea}cZW3YJ-&&N%S2sB*)_7Qk$U~i!0;qdwD7sC z_NekPzqasBt^&NO;)K_ZKb>2=xmvujZfo z5Ur8h0WiwmWM@-;5{7W=o@cAp@mwiC3re zD}!#&8%}8a#ldfZ<#wE1ILxyS+4K?eJ^8aH?bk5H<}X2apl0{4J^#gW>WTLYB9FkM|=hwe2K%@CobFV8d@kHK~FX5I$`B|$(g zzKUf-q7=Pc;=Z_odmY5L^7%JbV0((mDztq{5ml4&);sF*=%_ML3QsY+oUIjN8Lhld zG1uSEtM__~M=KYEn78>Q8f#S>WUXmb{CY3bafyU8&$RUE_uD70Y(0()?*D!ztt5Cp zGOQ{B-P~!o?3boJn1oUOc>6T*gJ`DqBR#t&!@KqkPf{eV%@pd4hu9$a!z4=`?8XCYP^Ecq-6M-y6;p6P+aMR_mpsR?QF|)%vc%IjBKq?(~AlQ)@@f=lwNK+RS}~A=A^6vG~-` z8N0Em{2=5v0xq!~P>sjb$73E;Aaf-5C@o7WsMhxd*YuF82adobqm5~L?)KIqBgSBU?LS27TjSl0)4%gVt9K4(8sEuYR;l%k8IM1((7($jcI1Yd z@L8g1D#)mgAud20Y$E1(K<+z2-n&W0I0|0++1cT$asG8P^90A|3#ESXF5^~XPx`ao z0Ep<}2BP+`I+cw0NUGlHOQt3L`e>JS5%28w+C(-Gvg@b7XHvfU_O*e`%;d4dr*qN@tt9oa{aCICj8A{;2v8)6od)QE<1L&zK&$v*zzT z)wx4SUtRG)(qqg>PCgXYsBd?ODP0sM_J8r?a=EEakexz2` z0p_am`ox%Rif+!BCb97}`X0v$lxDYKxi9$hZR}{P05vVq-hgUGI;8%-Sn%hI4P+W` z?P*#Yt+f81`rHD3>{A!LG}yS%)0lzv(g0jnLy9x;$>C)A>5Q<4!lg{~B3tB4&nk%y zdj|+r+eZ7=!-dl%bvMR{J2U-q=U~Cn2jaAjx?O%L7crkE>cv+fJz{-oCBJu4zzap3 z{`@oQa~IcWOX#Op(wRc+e*31|?WZyQL(>_XoioJAjEf_Zr|$B5jfVQ)aM$*hmKzV`QCK=0%sKve{GUIK&0=UO(RD+fMbT)ZV_;{wS_mRU?x7US?)u1INm6fNcqsXe? zGp4Y-ys(cUA;q#k)UGFj+|FJo1}`%9ZcrYkKUV2x8kv7+beG6#TDVf&(Bd^Kf%?{L z{m!0)Q3PKtqCle~KA<{K=<7^R|7;^Vl}2N#0M7;>dCCa*g4KQ{h9JS zu7F}Tzq+e&Tc=qz+N}=b^sHKFvPV@XyCe4xgMC}O{wMMiW2md;}&au_l!RyKp(CA z7xwYjbUqUT0sNw^E!58p^tY=2pUBOUtoRy+Pz(R=8Z8_Ih%Mra0P0ESGqrH_Y_W}9ONyF1 zJb=r1z#0$4zZh4^nmQOYf(K7R;%EAp(#34tB;eX-_XC!>oKM8X>_y+>Skt+*T2A&CpIl?h0TQ1;N9fhTJo)7`4@LSBj!%?6!kdi|XUa*PPa=-1A+wMu zX_v@A%-I09v7~mAf*q_hjk-}9sDm(C~L+*4wWrqgJ1XSx+ZsvPsNcP;=y5V@8cLOxxnkHyh?}z(zNWOMB zp8=e~mcQ+mc?>+)Cj|JKWj~NU>7?JK?A&*eh`+E)K#DDN%ff=mQn%~0ys3o5p;o+b zD3FV<)>}=Y=lSK+>=#(H{3kxOL+1&fx{ix!NX?mlZ5Um;#@ZRH5|()}TUYGdiB^c+6v)CjEm^l3dj$Y6)TDeZYyi{Im<|&%}Cy zOoPwX_`57hjzKL0Z6oy|4;x=#j~SY<<-T>O+EMUH-~4#c7r0Q`o2p$g_77rj=_N3p zf1rAVO%ko^5{9Oat#=VfC%qb#R;YT?F7&nYzMYU?<6Cd=X>ezSrg%||?r__(ZgoR- zlPTkQbNw|jch?v_qfZv6d3cnus|_1i4;%#8mYVzr=`*V3kVjUYVw0YhdqaQq?2MZv zZyK7TD6jn{$=#Jni|tA*e> zd+BLS^R;FmJ%3EjT7Q%{%mDM&W8MFlhx?t>uIjQa2{v>hJ#9-mH(94i++QbeT01-) zT5B*!F~9vDIdSym6?6G$h8eE5qjsp`!F*hRp$MbD^hRA_zu0XoUZVOzsk8*rLuXyr zA*hIKMg2(nJ|0$F-4O8fAz(8nx#}8C* zilsOTQQSS1F1bkgVQ)gF;0a$AwPtdfpI>%dHyjf`U!sLFwWT(c{%qzOqI2Rqi5Mf& zM<_K&S6C`m{4laSE<tj;rj)02 zc8f2+%-v|X>kSfaz#AxB%6WjRgP1~VjNR^Ezh+_qz=%3YvWZD&-roz5pJV*@-V^SP zkOBnb7O9as_Dw(UPiAofD-&c&E8%K_wv(xvd5#jSX;DKR&_@wGB z5V$WfJw3p1E$qYYXhz$&AVR$QT0d?HIMmKuHK?NOmvNU#c=D083>4qSjg@`gl%A$f zkIPfNoT!^OKPH zE{?+eT7lkL{&OG#C=#lXY1xviz{QhrNMY?|e*m20rsrNQYIkLr!_QR!ktueOvy1)~ zaXDZ6QL|Oxn7}46@UYWD%J+(Vz)&Uz#Tu6f*R|Gm+^0F^u{pC`9s&Yjgha6+s)lTD zt8LDa6iwV@7E=i?iFg^zruVAbdAJSSP~z@}>@iu1({@$(`W;}i?G=#m+}ERnM%p#S zJ01k5guXYcvueU)?UM6+S_-6T(?3Y@h}hiqAX3%;G~c4sfX>67l#9)K+0X z57c&YHS$+9)um-TYxTJO@oY|VLBI9v)Y6`1YgK4}`FO*obCtRiKjc(Z&LtVV>rrwp z@Jsn*|DrU~Nm97}**`txznKyqJ?jnE^O)aSA!8=$SjdZW+?>EYAm~YtGzORFDZYuz zYLPdh53l-ZmG`ZzdYdCQM{_Tg#dv0j1;}Im zQEfBVQt0K9Y|=9`0N38jyu8{T{JT;9vLJ>-#0y^b>%IPWm7W=4wH!SlYK^5VUGvN> z7@DvCv#Uh%|IIwO|HEl^ zV5I!~@-HYDcs?)xK}7#0GygxE#{WOP#}k0?VgNJBjEU=%CE>!aZfOIv`r)IHeVbPPB^FZytjGp0&4qltkPn=`QO7Lhb`yPQG2W zPvd7cU85sw2C!I~sQe`ngo?Y!wY`ad-YZH1yyh9Tt8n9!QUIDQso=|`~aq1#AU6=`Zy`9CO1rz+VnGRI459`n{eha#nJzx~K3J(vrXwrFDR3yZ^bmgWIW3b@+8fE$p&x$G(dSJ1l~KQ#>Y)`G6kIoW;>5e9M!~RTGYZL=e?qV~Wy3`o zaap=}Ix4)V)s9%YHBft#K61V_fq*e(q_f@9#FO>t3lk@HqmcI|n~%H{Hd!YS4Rb_J ztiHRLKbQU1QfF<1t8xOx3{bl5)OP+=h5^555OCy4Qesl+hfxy;Z&+4+~2 z0ImSfjzWgOiv=b`V#00F9Y=|US{-X#cj9}J32%v(9_l+^bXa9 zJaF@kPCHwpT#uT~_P<67g|Mynn~w;AbO(-`9Wq$3vY zo|oLh|Kv(WR5{e3x-*#*n}CyLfs49xl}u-y8f*EzV7Omi8K58=@0e?`gS>>)ol}RO zxB0mnU2J|SuC)zNmlArW&;s{m#dnNJ({n7QW#Byb!+@Pm(gdX51n*l^hWQhcVZ6>X zvNmHV;`Uma4ahKRP(Agk2-VNI{2~6!V?INu`cEK?c`Qc`%DZ80oG5DhyTZXteDgxJ z9dxoI^e)f($0mQmv&&gWa~KSJLN5xw*sMFp#=^(JT0-tdQJZ92f>z$U%|7BM_1WZG z%PWFT1s>d$QPe3(W3{1v3H?>Zbw@iQHvP=aCmz||vy^shAPN-dUGMR>V49azdwNN4 z__JT$Nj)Dg8gQ7jM(o?9lr6zXb*53cDw|zD7{qi^+-~E; z_;RlZ1EKz(E}j7F(Z;s$`^`^w7$QAtn8)_msM|V=_O}GGX~lTZ!p&*KkSq5SAqbTh)PeI~-?p;C8VpCVw-1TVSW<{jb zE_xSt`rrCzLIx%bgX6Uy#A?}k!UTA4+Mjb>+H{!w^6Ho^ueN$yhJ+HW-n~Y){RqDR z)ie7+=&abW8eAgCSec-%O!3bxd}<#mJ|(<>o#S25M!DQ-919b2hX--=U}Hhp5wU%L zT}pHyP`?Ya5Zm%BHy&)h4(pbw?elo;eWk;k?T=)>tZf4>g( zL;Lv_5=$eV}A6FYtDLD}5lZh(N!pd5&d5+yg!cAkekZQZT!}c@J zp+H6^Q2#0&sen|EF@jXT#x1SmLA42Eui8kol$Kom{M4?4f%}GtJ+_xF zrh|O*{baBGf_GAeDuvt5bd}D!%=QVxWa;~+MVTENX(MfO8GiMm& zUUfUC<~)JlbQM~7(5rVLigG49%)9nS#wu=(=QV_WE~Iig5jEawxsT)SG@^Y+Q1_IjCd%Zh?p4}5h${p@Jf&Num8 z97RgKRyxn^x2JV*{DVtjtG>7d!fG3fN%;Jau3{nUS6j0gIt9DSzDqxv6y`oD_Z9A7 zFs_d(_#89@l95GF~7WC;%FMyW($NjdgOAZMV#~*J8$93 zdK}4l>{Il#9gaV$cCeCjeV&y4(_*$mueQoeXrzXi@8lgLUlz?dY_iHixI4~)pD|-X zhj&e5d|Z7Cbk&O!Vtx#%jf-OJhh3a)9(auDYZ=7n6k-Kd<}&C+$$T#Fwl#%w`VLBK z=L)kU#YiF3*_YAVMr`frb@dJgKIJs@j<%}1J8o5A;de-5$3WS3Ox>~C>Fm$>u=ISF zC2AItG43N%l!Y16p{>iam;vhRTxT^)lNO$}Ie6s9&21l4B;JN6{(kRQhV^uRLF*ai zCSYE2K-NsNBtF_7IalvPIAq*ZF~j#qnThhSG340rf}Zy@+YU+`S2G33FjfAU?0(xit@>AR+%oos)w{QQ&N(!U zL@4rQP|Q~|dY=kgkkz5QM9Wvj>?D2HBn0RSEOXyPC`-r1dSIku%U$Xp(Xwqx!v4#6nze0OrnDktZOFF4wBq^dt3{b32)pa2-lOiMsXI$^ISVdjG zu#33Cg&DvDfn}dl>I@If zG02-iuI0O+>5gZCl8!kp=F^L8ODh~~?a6K%NxMZ28@8miQZLY#3zRcLnaxowt5j{B0l6okHFeji2Xs?lKg6|-YWunEq2H_OUQ z*Nbn84M7PRV9(uZwVvSUQmNKMBVIY$uP%9oG6KrV?38qYIkI@WWaL>OpYVUmow0)< z&g%1Ak1!xP+l_bIr^6qXA-J*XcqRYv*{%TqkX0UtCwH8_2DC3N=or>Gi{)p{ozLMm z``p;Gb*|#RArGFxax^4~IH~>gt$(kS$y?sS`RcR3SWG(FW)$l5ZuFOf+)S}qIEWlX zlk;tl!G36R(;{qt27x{Pq`w1Yc255lpRR$_NhZtc6HV<+`Lq@w1u~Y)zkCqn9-d%= zxTJ|dl*vekB1l34V(O+RC*8ND?YmQsxL7^xCav$$?iLXEHLQiK&!jSfsyyy5NI-Yb z^<(OiJdAzL%w$YUxFq;%WP&D%&<~zu2yVT+?5DXolbG|M$K`!Q5j|um*DRS_a^2g+ z(uclm;`IPW14vlF4r#sOI#0Fiw7@Sjk4QdbS<4ca)87>u8n!>33Vk(b+Jjn$d%8=D zP+xEbRbI)Ru|P=1D^{(XK3CZDW247-7A<#;9lNz(#WU|FBs1K`6BRizfWxqD)0mrq zC_HsbA{;DbxfMoNOi9a-?FtQL4*cWRtpenlg69kOnbz389p^gXRx> z)_;LCo1`rL<|p)cUn*Z!wSXs14}OjX?4cliNjGm+SZt?UZ5#9CGJ#)r%;Gd_1$e9C zNorH4uJ_>!Q;_QNAnehs1Ge|M8L0=8c^?l^Z+)uu;1_O)y;=1FdrW}7r8Vs_WD2}x zsq%j@_m*){cWuCgzHz))v% z-_P^b`JGSa%j*YzA~^G(9oKd3b*;S?bUONQiWpH!Q)27+`rP)T3LCRkJ+lh}GVI++k@i^{3MfL`O@#*x^2ah}-zLjg1f@x1PIoCoP1c0WCTKlXyFH<{6q&U&{Q z3Q@O9m)d2d#6&cx?itj!47 z2jdTAx&!EJ*Xgv~I$ZO!K3d^pn=95&SQ(!PU0{2nw|!9hf_lAt=3Mi2(d^VuJ4V*X zRCUZ*Qs_OaGcA?VLVF+dokg>g8IE|9>)_a^{(F>`IM+!O6TgLduY+d0U>9qLZ&i~V z5*bZY&3_#jBegwyJ-*BcKmBqb2HY3`C z+6F=S2^Y!4`QH2qU$9}fdFs@|#>P_r^V!R|?Z8rJf;jaq|BLg*x()|Un%Sqo5AjLz zWUikh-S{WH*&T@=%dNi5-)@gN*(6lI?0glMcYQV#DR4ss>~K>o7E1m)IZB_l_PQL* zZO4hgNG7#Y<-I(F>?M3hSZ)l_as|zQ-@~aKmH*|`MoL8D%`;b(1X;Lo=Pu#HXc{Ce zoH%bFX)|o3@08qEw|;KCh)18a7FQW1@CqYwXZ)*e|M4=ndtbvmvyG<7AD1TB^`h&x z)AIm1L;{IDg){b(l4}Y~&AaNBnJ&G*_aec27j2F(6Y zQsHI`G%Gi!GpHEX*L`9&M<)56ir|~w_{TLKS_+Jb!RCaz^NL?#`)*#VDq5Rw*Jy7p zr;jDR5tA`~c_BV8c-!Hsnzc-lcxb#dU6FZ>aR0Wmf{^)@`>A8F#zer`XZG*=@81jw zOzK5iGgPyqCSK-|rDDuwh&VgVd~8z7n_u85N)u?^%J3U8(J?Np=bX@E=Q& zy&h6rvKNvRbIp!3wXRuwdk@az%qw;Kb3V*XmKYQcey=(xacF6`n9}&}ulD(^?9=!w zX>iJSoUiY2Y_>T4OaF59*u?)0k5_w};M!G0?!kww>*f4%`!reVdaKyLtoKz_ZTQ|s zjX{N32WM3j7qdQyjH}^Kd}>|0JGtMBJRBjhv!61TJ{pM#0iKiRrL4{iWIw-wakG`|APSHGUt`vN4+6XQyY=1bu zXxYPszf2Igblw{fO8Os>8@OQ1QX|~-Dxx~3OSH4RMJfr<{QLj|7^qtOj`7W8ZLzc- zbt#S#%dD6zFRFOtgc#k><`_P4cXK~IaT61p_kHzk=VW+2`&$@4t%#gLDL2RP$grSk zXeBq#@Q<%wx!6;wJ)V5{#*-p|ml@|;l}&E;k(V9Ez1}wH)t@@JA;i}r$ka()T~_OJ ztdT&6Sx(pzssDA=vh|1gk6}v=)7>Nq?JW#RpNzC^jgeBmwv4BACvi4Mdc_7}Xe`f! zAMd?;h1RIzXJi*{`XMj#MUm!db9?$bH*ZodtC=KYt zt+6I}#uBVqCZ{(@7Y$%?Y?hUmHCmdlgui~}s9vqn*VHH9`n9cX;$&J7e{`N<`33In z{W;A^Gflf;5$3k>3LhO}kh>%0zPSZKtj?d_wq7yXi`GFl&0z9?HPI(MYu3w0OyLB4ICJ_48Q9^s3xI!4f>eL^WJ8zg#-U8{MXtfFD|4T) z=*~j&Cc4O^#G7>5)z?H#pTITl*_{f!*S=D7ajutKh^{>CwG>cR47*}Vh@78?pNQ{ZP8=S|M2unA0lFw&Bu1FsZ5GZe{8-PW)kms z8~d%W2|Gjav`B4S@ zgKn<^2}GeZDC=dp(F6j$`hP>4gRP(fw|Aja^okAf>Nl76}(Ob$h z)3+9e$LV5<=cS~Cp0P!RJ7{SUZF7l;yl|+3sHk9l+TPq8@|9Db zjDl%Ek@;|H^h5a3k@Krpf8gWHpUXCv{0jg9fKv4(Y)5THN{ zv{PAygf^&2N=q$%>WJogLCGx_lpJsB7&Iv4{21L>uMI46Mi zqU~(;67UuVHkS%9RH2hepyGcu@*dbt%6kE2NM#@@XySk-`VOdNF?9gtS0Lf`E%)gq zB;_7skqQ_Jg+NWj-WHJi0+O6j1U=i3uRv%Fh@h^3>YY}?3-f+t%-@|!jB2dCNXbAT zdkd7eiQiFk0WrFU*Wcyxwyroro5z4ws8SN$^?T!EV4uvalxSRUtzv6iZj7L@wY4?d zm67B2a~vKXc7X%lJ);8&3s8<7cnq`=Ew!{#*tM81E-uE9z!ehw%L9Y<7X>Fk_!2_3 z#(~}DvEv5BAWckE5WoMv>WD84aj9GesYjZ(~Uvv!}lYNw5X@87HLbT}ov(oSpocP2~6hxX?iwyv_! ze`_~8EfH#dy=c``xc$zZ-utj$1^D4M4`Gkz3EI9Lsz`q*@Orhw@9Nw&1?cn<#sF<% zpdM>Q1(b3jSU&z{Q-pH582_%J8VdME7#hy1qR}S@Sz&&DVmWD_V{=h6pqy!usi&uB zKl3q^6xe-IkTD=T{QiKs9{_fs(wF-U`c;NN<57L~t%9=h5OB+j@7?~M#j%wo;;cx% z)(;ez>zX|GW^_u`$+GN#4RO8O)-ae&fU%tb(Y_X+-%QvefNfr5mPD@5AX@DvEPcKj z4rG$AdcrY)Qs2M~c$<|rZ-On#l$X#4Qr8HbjMkTaiInIGgcG(gsfrsGH)rLkm~q&4)xwGak1880gK-6nMjgF7qnhbu?Q{R2-X#-n7L< zb~ZrG(vm4E{ART(?7|t?d;=-RG~dC8U*?IF=%oTgUtE#EO#icf<>xy5MIs1@;{{P& zSGz-jmFrTi1`#q-q>0SVcC|om%#Y-DbP#~ zz-f~Y(+UDgur2!`_ffWgY~tcS7Z+*Pp?1lt>?J_#vpS1^Osb6c)8C_&+wm=QEjV&>)Z_{eEUtrVQc9YAE=ewZ4P+5|p#3bPVZLN~6ne>^6wg!?uwer#xI zX=z+8re<(&1lIbPC?O3+4w04Yt8WDA9Eo9pT4Ew16z*Z;Yw<@vn{bxGC*_B=@S^*= zT}>IbGJITfz;&2610<%aNu#bzBQjTba>3j1O2;YC1K$2gVdL;4L~J&KXGF{KZCqX8pcB@ z{b}8pl$_j>lae(NIw=BNwddN;4e!xb3f-~65XlxWj;JHP4 zMNG>MnOk)a44@edJrsA}8YU|OPS=`=_^7C;3~|_^*iRVnoK`v$s*Vj)$gq8WuR|0l zC`F@!kqFx~B}GNcb103Zq-1g=5sWB)@8Z>>9AX?(m&~B-i2|WStj{XYySZN@mCL2sSTWfVo8R!*3j)U7Bfh#n51d7GITBU?ayczDR(SX(ROTu`9g zSK(^MD>ebH!f4t}DdYj=&Zt71hiFiG7cT|F`#tDCb@lPqJo?P|$V8dyL0Ik4_aLzC z54F)RkMVx+nqO3uvhT}g-wos?$t)`Y%C@)H3luKNs1=tGhAjV-6 zp~fcdZhT3q#U&DH9EUyUk9<((XK(mgnOrV#h!;huBhmC0zNzl{1YN}~5rA0S|@|2jkeDQ|k z9QfF~C{UJW&w|i$pE9F`okM11tO>}qGvg&G>ByaoW%5}K=AVGHpWM{Y(8mfv3^ZdO z4}r9}Ayca-7R0#s`|%3@4-WuOuhuwQeKjAkh?$3q}Mq(o9#)^<-$k{FO$ zlHfmDCs80x_K$d|Q}VorbPYacnbs%k%K7{;D|sT66PeV4nMIl=ganS%LvkV(?}y}M z2JAu%tV4_<{!Q;R&jO8xifQzg4arVJ5RiLX8uO+$z*`$=!Aa3@v zZ(O4cl%g&SmSpi1*AYidaUCu;Q~lKCqh}$+ze3W|(!|`i8FIB)Y0S@SgFWbU7@v*F z3x<{OroyF{^OA$IbsT!L8bA$@fof)E_EO@5TzCeHgWNY>_wDD1E8lT&;qT=l8tJ$a zl~w-&3g6qg2tu5r0Gff35e`t|1>f*BQxesKO6t?6Ps-hY#`PjpPA4qatJIhM83iX#k^h;`bNonI(qS7Ua`uS5y%Cb~@4dLED+FS2e?KaWrxzuEr35bK#m9h@qgh*lriHW|#>qLzMFM$mP)#vvhhgs} zKCb#3`Z)HNA-8c0Vd`g~2;44hF^8Fl3+;3<0P^q%aswYWJM8fn=#gTJ!1}fV)Mc{1 zuH3x4@41W=6%}`>QneJ!F8F1kQoC`L`$*z=FVgWZTK!#6tU4?<9NT^_QS8CQ&b8~) zEC22wTEBlT%`e3nrf! zB}Hp=t~3u)bUcGTI}L+?jsXW3DwUYXJVPAliuqd)rM{q`U`Sj-f_b=ib5#M5;FOie zgk&)Psp0RoQfRiMZ#@u#*Brc$f)0JR1(aNmgXRc49FJFf+T1XN; z9>@qirW+F9mE=J-Rm0`~XeK7h8^Cd!h*iB6ljyi|nF#PA1`ft7_1!R%)b41sXUdtW-d4yfv79u~fA4R_+G zjNujh#=Fex^J4ZxFa!}E9zI^uVnUg9tRh?Bvp^^}h52tu>&(DQElLkz5f(&aRQD5-JAoH z&J3OG5fr`4U?)V=RhzWwe||`zHvJg6yu3__kHA@r{rp*MpO99boIiT-E;8Um6ZRG1 zK|5<|oIwRec;zr(Up$)Sx7A#;DamvAOc}wQ)8a=rvoJ0h{E>YvpjH-x;pLy1-*PcgEkDc9)|*q56iw%8r1Vn>^hJC6?Xmn{QP8z8aP+{ z08uHN6QNZ&E(o&ZyF_5)O@JPA^1bzoeIg~FoSmF^A)8lE;_y5FNZ>Ehvi(ckd~R5W zV(o0bJkExOu4Iww5-9rTZz;91amkf4`j+KOQW6O<#)*=15*jq35cRu^jh5yG#SYz% zgfsrN11BsP)sp&;My%BjFsYBaX_);RLR#D~qAGn356wm15D=Eo>RzL3$0-60^@PWe z;QW|%BE^jR2sOz=9ZtnwYO?q7!>iY4D@vmG$FE*uG}4jn9~`)TxB*mT^Y$UR77&t5 z%984UI|xbS-MMo!RYNn(ZLYMXu7%tN&n{6u?u&h{R3Me@oFp!#k$q0#>Z*A>nhx7* z4I4pqc2;bVuq+3*E+{%M>_Xi`b;6lr#VtMCDC68<19p52bTu)^v!fLyVPhFIZ(~iNo`3~eH0BsbRE{DMTmV~IP!V685(;&W09!45DX)lx_73?(C3RAooBii}@ z1A>g~#dg*Pcx#LxjCYP$v9VSACUNLkewlp1!Lr`M6A~)h-nOWOn9IzvZR-8^)lF3q zjC+O&;b&G~!Yp@cGDAKxDcx?WjB0(ak`HpEvyPx39zwDOXPIoW?~86NCJcEVAayaG4vk|U3ti@=7xmbJ~F z8CP$XVB9SJAMb5~prxU4bUZj!&4WheK8p7xG`A)@Q5|}k-8rNB=Bi5pO_$`)>4-7- z6(6m<-6&70--zfRYy9WR99 zYgpdSat>j>J5_y9Yvm-HmeT>T@-nU(T-NvFEDIG<#HaF?FrudRPsn!0oEsRNnK3OK z7#+>+lh>Lh&=dCLh^4*R$ARJ+L9tK`l0;fdZ1^B4AC^1r>^{jmFX&ioB7q*_)PfJAty zsi_Sh$^c`CYK91SC;^%j)p^JeJ(=8)M$QY;K!5+}TFOh{kaSWJFbkg{?~$%#IUB}# z?@YcdRZ&)7vfi!=mo|vF!hUB`xRCZ@YkEpoNuh0ly4BQ_0-wshZS{%Ck*Z}_&f4Lh z&z+kaLBC%K2}Kgga^ragQu@j~r%KdL-n6oR(F|W$_#DM%$sm+TG~@Nxt=wY&z=4T> zJbky{#oOM#IU~NezBk_7dk5KR9G-j!!Lf32IRZHBTm(RqIfO72dW@|?#$a7cMrlt| zJ;XsH-*2h8u12N-afI1Nxu93HKw^`DdE`yaUYz|!?bYyvdoIzf9nqDB{)FYVnFYl@ zbjfNX{NTX!^>kce_{{R4m^j6yzG}3_UpLRO;n(T1*GLvmC31S@$m~4r z?X_RDUwGMIDL(##9TJ~Lco@3z)6mH9rQy8FIL12BRFjg>XDj&h1dNw?3Q>oa*HxRQzSC3PII2FafCA#tZPQrwTrLa6YrvsAQ zB6}{e-W6JXp3Jt6s&FNl=i0H28isBeH3Gwb6jqi72U#AmiZQeBjZvGpLByYmNe!)V zajO4h5tBNp%TmOaHNP-ax*h5#-GP^<6llm<>NIFu8k=Opk!mEdofgMpq2JTqz5D7b z2gMIy2at^5V^b3ZNh)(~u!?V(Q|QePdbG~;Xotf9M@-|}S&i8(im9oWEfJJ4_7`sV z@-K}H!SJxLekpkTc^rK;zpmjlfqPJ+GFw!7Wyno1h1$tBj$F`7_`ZR5r=+lqA-D4z zs~pCvqsMr^-EowME6c;`UcAuLTklF^P)%qv`=EXuoX;<eaD|pTCWJ18&=KO-zQN# zvAWw0g;sg({ZxS%RUIAn*4k2D&+&MhUH+)P{njEmx2zbB**z#-*w|XqD)`fk{95qq zWt==pha>0rY&jygsZCU=y5`2lnU=`XXA9UQbVeCQFJIcCST-bcjl_)oyv|4dfOb}O zR0eB8OUb9de{(>A2^5#;Tz~wS9SMIyR^qc@kS}xwcd%BSv|RjXk_zxz7%z`~gAxI~ zI0RNcysw~(b192hdV9j*8Tej7ny==;2CS8Xd$xL!EORwf^rftL~02j#w85$F??%pZEdV*y;AALJT+(D8(Vpa zPCc)PP^n>m{MCfiP_wLy+pI32UGqYv*Jb~ui3vHST|x;JG+e*%&xyt)*QYaHf#yaJ z%n2+%r}(&pj*k1|%?(XnNom#Dzar7a=jSC_eXV;FpEOA3&+Ulzk%3R9njFw?pHa47fU#vlC+2S zVy_;*@^uaEDX=K$3FUj+l3s%RY!Fd0%Z1c#EfEyIr{rGS@F_VgWp|y>?8PO!ZH9p> zqxz@6hGiXbs@hn>TVND8|Ibmts47g|3y*bEDJF3nHHx}QJ*;_k{qsRJ{e`FaV&PT% zO>4kbq+MBdhC7{vep#~;(d_#z~@o!=h3W*0rLmYAHTOIAU0;eo{HA5OF^$nlu zu!fT9^bES-5}*Ay`zBT2E*jGm`MWgz{p4if3wJko9io;4I|6z9Sd?A7Qq!)kq_zH| zaed|6cwPu%?W&bUnTnc2+BQYaB1}Wqr_LkP)L>UfCvufl`XVMyc09QHwnxLbgSd!| zv{>PCkB+Uv)5BFm5ry=c6&JF?3sUWF1WZF&XG0IN(lb7)o|U}@WqrmmVGJ|M#CW)) zdo%mKN4g>5e2DSNj4Q7VEd7cCH-kuo4y%|B$5P`@8J%~MD?*}G)hmm71IbpZ95rbV zls#1%^WIf;%nWLKL#_yKLMRR`zP{MWBqdnB2d9TQ!!yoVO{j+Ntf4qVx=I@MSD+399JT0*Vw>GH?L zKex2Dwu)Mrv9VR1BO%iLv(qf2@XOIRh9-dVG;-V+h#CtbTC#3$1wsF+W{m)wdbV~~c znN@SW;2R7H4vvhvrsB_;8n8xdY3awkUx!&abqr}!b4b_L_BW}RxV+2DgPtJQCaA98 zreV?(h_JnR)1~nB(*A_mB*(;fDesZ>GrTtgKJ)M;-h3XU;Ss~m+hDcMB>g=&U2+Bs zt@3Sbke;hoepXyVrMG3L$3tm>pDW9YEUZegY!e&TuB0|WGS-G}#$`?KrYB1e1(gx< z*GpW+g<}aHh8Krqcp6DEm}nmu#0I5C!kjZ$Igr5OkSXQE2gB;i!9Pm*z^715%wSZI zvfXoXaDf zT2vJKudEztGr9h7icKsH4?l$%2IxMdV2`<(Y~(~{YRAF5niJkRzI5w6X)A+?3Q%l( zT%X7(!2x@LhXbkkR6?Syww70HMHCYYi%&oxRRC|pyX!JX8TTRoBVJz3q7`A_Vg?#g z=>mAH+}wx23GwTH&CH?IPBzNjfLpjak1uA^bhzAEu$B_4VJ!6bZ(_CSea3<{i#5jk zNlydlFrp!-m%gyMJy)5RJ`s7%4bI7jLySG9++KghZxvnE_Y?4A=pxaOzHOp5A?ao= z3NPVSJa7E{f3bxYtQGVuABy%8*zQ+N&s|0-NF8)_ROK*#dWIK?F8$X{EwWqpb(;<% z>j?;|?H}R4wzqG9A)r~4-Meg&p#*9X2B_P%T6pT-;UV{g%M2P0In)E?VqxWmmH2pe zY)msHXu(_<9gphK8(d-?p|<8=5SXTr#rLPoJV)%WUkQys_Uupewb0 z)UxnFh2SjUd`QC7uu3Ud6wnqZ6oAi$mdT})%LL&Qs_1s5tNB%X0Xq2l-oxUE`u$g%aSyt;Z2 z_l>o(nL-!lKZ$&nIPl(&2=}>{5~vX?ZuuVEluk9nVG@8 zoqER1inkvboJBhFLj<|lkx{+|BqGc$nH3JVJ%Y9aWmQ@}7P-xx|!0h|QoJIOEx4gru{Mo31+GRhq9 z4lFA{6I5=a%*@cRqHB>x7IRe8kT4RC>jzB+4H-FKYIvN~@af43!l;`YPU)dJx+l{B zyR9|V3X`|WAR{A#Q{tB@Gd|PS(Mjoc)sp7ZLTqISWwM70ivX#* z*WW1P@wev0fdL-ChJgWJyquW^AI)=CbfeOS-8d=5XbV`Xjar%v!u#N7WC~1@lN0wK z&h36;@rt`ptQ5K^Fzx;29NV3&rUtIYi8A~$y9dcjE*S*iL0CslYTTEc4Ah$JcKF0_ zLAz|WM3^ciW`EwbkJqXRsB^PSk0u1|mcxWkya0=EfaPDRAk>mtW`|m-}2IET( zMZvHWq)Lws;6u?$2T9s}$jXXaBJ;=vY{{_1P%C{c zyf%M-|H84E8S+x}@34Ty7S{|K3JQue=4Ze@@BuPD^PyBg3lyF|VrSfXy4r)1jWn!Y zAsoT@CtN!}M}+F{Svxx)ZThWz`N7XH#QaE*kmpgr)yHgOpq#Y;3p0M#PV;te;qjbm zWsJ>*+Cy-nGJS>sexPlhd-{(mDl4Ud0p=DHLWw?*l!k_LVwE8HJiJBnYNs@h_0c1! z+ zH5w%qI{SpEQbsJmJD~gEX?U%ayY*8DogEP5b$GpxOvoOpoO%X!XZDUm7#Ar*?-RoV z043qw{NR*@TXIX_r7)1#{Q`Oxa2G(6Lgp)uV*p&cKT}WY2G~-9PI!hgHDC#WqEjta zYOHG0b;6EDh^lUt#wKOUkXCM);Vwg@!R6ua{6&BpbTE93F(t?pF@Pj2mIS>)wJhP* z1b%iAVPQqf-KlcmOb8=ny*}%@H7UB!`4?E8G9~n1U7UiocDZMEOZ7K~c;5%mSL(%*z;PN7DlAD*wQfs{AP6mP1^SY?QVseg#mtP145y`5M!r|W zq^>cv`6tphzX?*%$M}g(;Zy7dZxNnKozQS8+8I#xxT%JKg zw*)HH?aEiI`3rbC4h#;)%Ax7%D@Z?njHOt;7$4Wc>-8w;Z$sYWQWTG!i7g2177!(X zBBhicf}N4^ejXG!qZbn9L?icjG?3>TNgW*>Y|k@}fx+}cq7)l)w%@>7`p4*~ehnNY zn>2n4%L{-l zu!F6@Z#TvM2>3o4y(-4TrQ3coaqlPInqo4;l@U-Lq=#DdNRT<}RKs};8{uGq!8BL5 zw@ZS@JHW*KFdL`H;RIbiaUmhH!H>aK)%Vs9kB)dIK)7`^-OA8I zm2*o;1m@td)SaE3Sop%+oXpB^@_{ax0)0GeM#r1_V72*& zqAk3`{|p<=?2|+0iS;!gadd$;h#cbG$S?DsjkdKeDWjl4xZKfpPVyp^RgE9?jC4Wt ztLeHiOrsI^fH!wtSG}}t0KpwtyvMi!i|FxC(1!0Tf`p51xVpNQ#rw#=sN4pV7JPfT z^1E6F={t^LL-?};w6asC-+*wx&M$3E;dVPfVa9;RsJIU1YgVuP&g2WwYKVc$Bw^rI zl3szoWz%y@OBfR}A9OOo`Xw_HntD(d(Q;^NVv+z9q_07|XQX83OuO+BTPI0SWS+o| zg#&kEJrBBHuQrEL0J%+piatR-M;!3CR4OVYVwg64fJ1tV>jo2Zv2-o8keQdAi>qon zy5yg*_Xk$XTb>x3GcelS#oC|Pjq&6b^&{92-S12{mZVv%-lImi#RXS{EQtO z7}$Zs;b5BwBX>&YaQLyUW)2>i)G1!vUa#D)yVJcLo)^Z>gk6M`F zTs9z*ms8pd*~h$kvNa<5F8F%SjL$?A^}_%ZaXChs4=0(J0$=V(0#Ua4a1kP7W8?mT z6Lc8o!-~k0_JF=`St1%2gW-b0|C~1e<%e}zup^NmR!Ih&YmN%ugLc-xR-uP>-Vo=A z_xRV(r1~lshTSC)(3SXyYZ?XPscmSW<~8pId=k^$z!Q+we@D045rG;r_pvVE9IyZ` zA)Tbp@#$In+d-7OvhBa~j|(wN&dH&rqC(c6YJ!K`bJoRr^5n^`F`TEYq9QgSLGLDw z(l+~lizxpC8pHdyll8wqiT@#%;>iPCQT>1WNUMCHEK3oHAbff}em5*0{~ealFCPt? zh9e12XwGf!-bVbtfeVnQasjP_hH+Euc)S}!;iimGE@<~ZKmA|XyZ@iG-v9Rx;y95r z5rldcz?S*wNaLUW+E83F#B7vEZb}}QIs=F9Y{t7Toi91~Y!yYVt>S!qDgSnVDDFPo zJMjMC7cB44(+YqcfhHc|9agBt0zwb?hVqU8{N&$GRsS8pq>J@$(<=)68|)bv67b@D zca1PTfW3lmpkT5i%80?sfp2iZxcy)I7RmH^4W?oOof;1V_$=m%`yojabWxil)S%g@ z1wP9^&wat?3gx~@!dsIzBbqq1UfjQYEO1oZ_>{(~QSdyqLyK?zijr84>hXUDCYe5g z>+eIwhAV=$S0fjty83!QTGAb?sXUf=G`N`}k_Y>#{$uPt@G(Vp~RaF&~zG5|oP8Yv! z7m&3ZhfQ2&7B}H((vAt3%8%cjMi5Te`1HZdjE%G3zb6O3`zH->w5;zdpn?)!Dx)MFa|lDZ4kzv-HJhN20TKaaB?Ef z&H(Aq9uz_W0Rfxe@zAA{L3KRS>S+&Z^UrXuS`f`alK+sAF?8|fGoWTL;fYN`A3v$I za~FMG<=L7&TQ|dcy}n^AR%kUe5P>D~_P9Ll?qNlJbYNy5a^6zrCEqKJp8o=ePBTu( zoo!f=#BCwL(}sbkJwE5@y1FC8fXp0tbzWy|sI#%TIn@<>3yi0+jlk(n&%od@cx1r! zX#;KajlqO)cxiF*pP7`jv`1hRL6pr11@*kulTBDNusy{9JNE*dwZHm4ovAj7E8IZ+ zdZ8Gv^L)*DHVUm&%Dw5PU8CC3x*&Vpf=vH7kGfCi#0QhW>lZ7XkM0(W&5>#677g347{7e@>1NNh?o_-qX0R( zg41;#P?AtRKqh5h=?d<0gGd9SJ_LgphRT4etgarVS12iAWZDkc{s7{Om2)6gB>{7% z$rPd(XZN6Z9-w{uP*g#aWqlnKHHrhu^HGwve1k@JaM(c5!178jWn)bcXT%*3Kruq8 z>*~r!^<#MW2^SXxi%LseUlsA&R4!%?5KGgG2a@XwhhVZ(veE;afFfCzM0~A`l^QPx zUVfW?T$gKHNen6Ax~_m~4vPGt@89)iykcXB0|{B0WYlQzo&8e=1YuH7IA{q|AB!_Q z3&|i)gQ}pwXo(nD9zDt@fVHcmn<;0z6ne2YO*}dHct+q%oUEgL(NkSEqJb*}0c}eu zXGMgn>gmS%qpb9f8#E|3dQjf9(ksQHq@3cWgovi9s=@CfyP0uM@Yt4|C!3#2IY^Cf zl-@w>Awd;g&Hm4~b!b06QNupw8H#P#WcLTu zH+SaUI27Cp7BVt2E1iLWyq0hR+`nIb3=;Ez6YiRuT}imC%4|LJRZu`}ZwH$NJ#*e;)>0+H-55aXlPH=VVNSwRqDSs>ME-QHoxhJ)5e(` zm;F7!W3G9m-j&Yz2834EV{`@jF4o_Bn#QB)9ybF3aW1HD|D~$4@8`Dm;y~PUFLXu9 zY(3qqCe%ueV7_bEyLfuQwR2Qoy+``u5}oO=ijLO@0pYpO);FmB@z>c;ecmFo^t5kx zozv`%QR(UnDdx=_+3^|*s8oqmF71PvWG96s$vHba&xuK% z1DFMH5oN@RNVe_}m_%@YWx_@fgvRA2dy0Nqs;4$%40E-Wl^hOp6BEQ0c$t9WNq2Pv z4kk7ja!E@%I^c46=7VU{&VbM9=@d5*vA>aFRvgGNFuwzF6dP~=ARo?DQSXy)A!VL3 z!uz7|B)ku4DheL^R1sc(`}Q1@FNDy_X6z80rexE{=`%QjmOo@>S`^g=$3LK5X!jN9 zr9*(L8tj0#3GHmrA>Zib?1|wE5KOeoU}=;FM;yVu?d>RWIyySosdC@Rcq+KzVUA9y z)a1N!0}c%A6g}uNFTmv)ymw!?n-se8^H;%z4?q!)4lcCHm}_sByowXU$dHdmBO-cE z>&|g>N-7~C0Vvfx^%;tM)R>Svq9AwR>30!PK^R425;n9aJ|Te*OG-)#o-`3Wjz21j z4h{KU3-^{JZur*zS7YdqZR5S+)XmR=mHBhq6&+AsB*cj@AVDv})%Euu!_Irt#KgqU zRLu@{P>XXZ-k;f?9b}HRtY2Nl+x!T0AM|iqIei9g&y>{o*5oWfl@v_K^~Sy;Q2&p! z&_RB5HcLe$NC||2a{>WWiw%1tLDbhs!VWDQ0lAKB>S0%)6vO zkbAiBLD;@u0|`V$IWOQ+Fbg=%ulWovPsrzh>n@BP08x5A0upJ8l<&zSzZU;9CtXm+ z@;FQSx(uMf~f}!uD?@e)^sVp zE7LkaSawvhc;V|D%a7O~H`9S&XKe4d4M!VLoD5JC23`%@4s8WQ4h<<^ai@6)i7_BY z{F-z9p6c9KPz5=kuJRaFHTfVV6WY6%+|j*{77I)+d6cR|a~^!3KBOJncMd=E86mTK z(2RRHQN5yl+xT%LE-DBSoSNsvjvwG-?(#$Z{N2^o>ci5;a}y)GPqtGS-`N(Q&3FpU z+h4S(2k$i+U$rOsG?uG2bREq!Y-Q)ChA-c`OtCgRxDa_=GC!m8ePz#zEAS%w$l2BU z=W1@1;U~MvL)BC=wyOz`I6tfG=Sqz?_CN4WntOe7<1W4S=YU{0yC4 z1l6gWIdxo~i5xC?=sP0cg9B9!0q3*bPnv)5`g z;%2pjLQU5nfNn5#H@Etjm>5jrTuER4fOD6kf(A^Lh++%mQtMlJXyo4;E zXoQ3}DbQo_aUcds&G!#{I(g#&2ph8);HfKa*o1JZaM{+ zHgY^=DEp$!B7lsN6?TE~(?OY8!SgJ{3`qePf z8YpHng65vkS9r}a=)EhsuBE6}F`2?g>+jr@I#XJ5zRXYiM=w3G?^{vUyqjS3w&#&J zebtqW?QkYqVB7OKI@2;Em9*VvPs2Q?k_ie#l5@4t;f(*p@YD1fV<~Ts1w_wN30xx< zlP1*@Ly;SNg# zkV@ycaOCi9+L|QyfhE8CA`%ec|tyHK$BO&ev5faE#j2lV+iAMGKu_N_ybf~ z5Sg$PKYxECLqp4RO5KV>iwi=t#waAzG>roZE&};bSl9se_+pzkk72hi12`Iz?>`95 zmGI`K`V8Rp2O*$m(7Www9FIR4S>C5mumBRt5p22P$mS)h%{ zJX?*H2*F}3O34==H=FMo87fxNFo}#kG!&{gyLFyjn&v`za@tv2;T>J@T7&xUQ}ObJ zkaDj&F?A(1|4$ELZS|%X=ffX@9R1DGgHl;dXJdj0-~M*09Q3Ad?UDV7S2U+iHT7!O zbp3 zz-A*=mM$H=hASQuEJ$^_cNr+9nPDf@R3EJrFDYKGfB5z#N+I|vc{!ZT*e$&?D(HQf zNncj*(^nm(S3-( zc(prjH+_Bq@6^>*K#PzA^Q)XEhK}9$3FaCH>JYB(?mD>w zlf|kOq`j|*f@I$CnPOnQu)OaH{xJ$}m z^qRsiASu=L`(H@ucE|9wWdz}g{zV;xzKh^E?pR16_)oIw(>6~B&=voG$~()jD7$Fy z(=90_IiN^)gLEq?tuRW5f)diDbR!^0JA^1DB^}ZYgCZc^-96OV!}ECFbG@I=d9U;B z{levi!_0lp-h1t}_W!s3cik~GYTT7aeNaKR;i`HKs@>gtxo18uJyh7NLEFsZ5DLRCzY@`%twfM=i$kypSzke{~4UJdBWaHB=d}SWmw>$t*mTd!&>OT zLbSB(pM|#iW9CsMijf4%>9jw2EAJ1?5+fAiW`LhhItvu9p!?Y5WC~x=Z=w21{(gEw zN#ujx1%dL$7o)k?p|}TCrfR>VqbRy_y+c={w!GqY!LO z4Cn={e6M!HSEWPx>1e5Ch;M5r&)91|1$x{wKIHktbb}Yf*(|_IL7@%wV=^Z38kZ(u zzRiESqp70euirxW{2Ck!1+xugJfK-pX)bymo=?#96!f771+}ljv$e4aXoL&FQ4na- z)LI9{YxB-$jdZ-yVAgDYGxSqIwXAQT!%i73notY1E^7}cYgO>eqXI|QSz?f}$k#}H zdqs=(HOiqmnU6M~OOi%fjt|cQHRrl3j@bs=Bn1fDgdrKT_lrPNjVF^C4J{q263~hH z?%N1+aNsW}s`zWb=GwZH_oUCKPQ-#@e{TM%#XhFf<~9Y>v7% z5Lb2q#nxSVfVqVrjqQ+(uDK$s@$={Vh+y>R>qECNRG8Mkm6pmr2RXiLk#Okwk258F zG-XrOM_oS4WGksUliq%ZO+`c}njTg!i6DW3q@axe#D-N|^)fyU}JB3_5nYVXxi{9ZsN#g6>PoT0Q+`w!#Mfw;m91`JB= z_3A2ASpMW9YY)}BX%!8Al2`)0S4}%3>bE&-S|q*WoM?aO$H|H~LUW`Su<8S8up$LF z4t~AcPDWSDA4mkK1Iepk9}*K^PS>9SmMg%fg|4B#UaQ&$&XjylO^dtu@*H#m<^{#b zMSv5K-0v<#Fxds?<-UNn*7tBUPO_y_qY(5@aUKWDAbkMcomC*wG~?NfRvNm^-j^vY zeK3x_i%&~SJEZyRqmVsCG~p9P^{xjNbjqkIKuV!|{niHCM+x^$n+i!Sr{Omg{afft z%=s*T`UVD+a0$7@*-{kod0j6qWDr1_fw35tnqf{F*FX$sH#Q_d$nJZ$TC>kg7t;K6 z&M?_qFsQ93k)u7&m=oGaOQ&@GKr&~CKJkoFp7_Vu!LttD?&Nh4y3PDUSwU*=?CcD> z*>d`tYh5=M{|E_z=-i{)R?4e$o5@?wvW*I+f!@tgwCTYDWvm zE}!uo$vvyB&zod&DhqSBLZwua7)sbCE+UAN4#3$)`{)o)4DltK!Ot8XjIRQcRT@{d zNB)?QVFCUKx@ey5snQv}H5#XnX}>sMC;O8Lcts_@S^RYcN2jnUbK&sG2=^s63sk9V zH*egm(lyrPd7PG!>pb=}rkok!HsQYh>%unm!r9*L?I01AsNK&Gm93w595-i# z2T2Uhy6?W5}(}m|#V-bpe<#~B53x84^>%P<3U%B8wC@I`lrEI2Lo4%&>y!~t+ z(UbY~j{W58Q(;>pfin^ygZVN}g1X;HsfySJhfykR})QhtQ~;oV%xd zwOkp4@)z$P9!pqrRXu`QCi?aW)cwZv1;xjUdTKZi2ZzlnLtl89$4KwlEHxav)G7q) zWK+~NUTA+ro5=cj$4=6tz1#j|^JU=xgRzv?6x|uZu%%zt#4C!5@5Mag$$pHb(V?rz zg1)uXq)>x>5-JCwX|=Vbx$Da0{$Bh}Xj4P-Mx)baY{0wDftfR{6UL>^ys0|y)q7t- z>S`sM^75LUx5i|dm7?e*9HIH%sP!#J>v#)1UVe2>JBb`ggY@Hwspbr*`c%pJ1Mn~| zuVsUDPo6)nS3N;wH2VE_UQT+A1@<3>`L5?46%0;RzJBxDyQ#Cne)Ou2ORHdZ`VSwS zXXMkGlX-L+nu90z4f-;lQ*e%G)YPp;@I+acj63g_DO%X7yZY`b#S=EDQ_xGjx%jT> zsg79iRPc-EYRPvmZ+PeFLM!06F&>emvHhgZCR{b9B&4{G9_Lndo$X0?ov?#O3e9=a z(e{|_mb{b_LisIh<}@rO1`0R|&}In8m3pvSffCbqubr~T@~A3`332*^gR+4DX!`)# zF#-5f4E+QB5>u`uQaK!La&Sg%ZxuRgwYD0m???ZJ zUE5>xHR33!gP{^(cX={Qxtcro!5Q1laiUf|gxjR)j^M%-ksl$4mwD!iw4Kf zJvpO3qsI-M_8;yU)0+-8sP_tQNw{r^J?n_}(md(A@|A5OYFur+YIHBt?B8>gI?Za& zq7(kagHUTZ0YqCJk)g+4NTv9-)bi-#t;MqB0UYgtoA%w2i=+C z0R6LkdHL`)XkP_xFZlrR>3L8Fv_{>|R8pTXkPDC1JKTy1Y@E*~UK2OSx~j+@-p&~E znYAbo-+}3Ifp%&H^x54R=v47aY=ge5&y0*O*i&v~%)ZpyK3c}cDL^`7U?3`w84kcG z`|{;WEcAt{h)zP!EdbbVR{b)yq} zS+Jw|BG&GoCOhKR`sZ-$U7}TAAo;km9eJ}R6&7nG)RLf_^} zeKz^Y{5+aYyyCiSFh@~>7M9`HEPbZ^SA2Ce1)Utgjg3vU+m;$rT6O1ZG3UUbs=BI% zs;avBU>}c1We7{0$p4Ezdn@+8_QVm(rO*R^1wTM7`a*R6(Sp%)a&v)u1l_fjg+&gs zAyYjpEsZux$r%V27jilOXu(+i^S~Xbu1x2O>=*b#RpMLP+m`^DrSh+!jE;j0a`8a; zlT&%zGCuwhXv^WBR%vef8FSc>V(}Dc(7Wjq9Zo4+AFy z3=Em0egcdyUO7A4S66m+bT~{_lRVy9UuUOmAocL@00Is!KK{+EnGzu}0??!29~_G0 z!I1bVLl7`<8Ux18B_QO0vkW=lF(j8DNPGAj4kuAoxT6fbZftaQ6UG#9 zAd5nOzc`!FRR+;lGEWJy!6XL61R(*z?QsM2kb(opy(=78%tGV72q`r+HIO`ddV9&n zhlh3QD-~)@pRHtMWH>F~>mD4O`Sx5MI3^9t9RmEfodt}0337h9%ELuu0BJMV8sen1 zQfOR60i2{>Y=%-K;7>o$pVt(KwY8ANs@$2tae{!AB#X;vev@FgwzOPYUS1zW5B8t# zp*HzFI_lOQP7Z-UV6aZ~}i%jY$UZdqvqDuq!8X($5bJrFzyqJ|q=BwDfIKi@^R!$PAoq!~G$S~XB zL1^=I6Br>Z(2s@$(9QR;vCmGY!2PfPojbFZiVX3%lqbi>N}l6omH=&(c3B+)cw1ah z7jT-Pd)^FSx!KAeKYs9zB2R2<2`Wt*JcaPIWh+qJ>VcsEa1e;06?>b#2|TpwvT2Py z)`ssTWbXlZzU7x;P87umjzCe*Dh5E)=(kg^wGudB3=9lS z_M_Zi!cy+=@bLVSU3slVu-+1c54JGURFpq{yR!jlU%u?^?TyzsuK?C;NEIxNWCS=M z4HO3%;~_Yf?R0rD_H7P`5{QTIh+Wg9{d~LM-=i7;rchb4tLzB>1(+1x>)UfnJ>F)= zZH*{&9j^f}UD^x8Et2~(hj7AU#Y}@D<6O?SPOh$sNxZN603&Kxhg6wBsf9$Hlf@s2 zlKT4k+AtIWFHyxwX@Bb0!tn9dJW#6L1`ELrSa6-1R0A82X^0HY85-qQ zB{Wk9D=RGK+Z*kWYU0NxT=TShrmg`Z32qM6;P?52iOHz5}W>X+4 zgoE;|n^z;})2Gu?jvf+HPU8w3T%T9fLHLwd7#N|OK&Ne=17qX^+FZkEAdM;< zuuOmpsPP5@o|%jgOyeHaSrjJXGvBGcTHy2z} zSy{PSv^H>oiHQ_1x|ES!#)4_<;&vpV0E@K?Sr9iQ;2kjJLgO-54y3)Wk=AVVd*rCs%eldXC`a-Jll!RKaY zUoH1hi#>iE9~)~yMJHTa#5_^Alw|UT~ zv`+~FsL3)8b^!Y0DNZsq2h8?V9s|#={M1w$()_TGBtd8xa`SF|U-b$S&VB*-0lTiP zt&K5Cwe@xTC?(1YS}HLvI4dRE=Eg(yb%b=q35WxO4jcjA_#Om9Bu?DB{iwkGW0`Xp zK#VThkk}P+mvH~WfvEJSFgH{51mVFlkW;HA2zrgCrW4mi^n6$vza0hnG)%uf~o z5J4F9Bi%{-T;tDr!U3c`-|Nw zz+z>{@{)!K1AN=WGh$hTtDjhP{a4Mk1|y`FQO)6cam_oCKuH{_oiHTv!4Mc@$HUC$ z(T6`12DhmUJp@*9NPJe(6+3857nnB*1JpR|*`q!xQV=^vpgfTf7cUbH||u+uA>fxXU* zI+Brz2~8G_bTHxy>ED+o3eg)z4?z7R>smDK7xQW;4=?p@MkTI-`#z+S_eW=4KVuyO$dvT z+j$mgvX5+4Rl9-RM8@^EtayOj#{-^jpX@&)ta_N#1$iUKhyE<2-;;cHdm1)2w){*I zrxC1x^;03d>D62d*kBbux##tR6&M$M3e;3BPI&+j|F#jVWtX0vpEt9!V|Snr@&Lkt zvSjXbUmw9O@Xdxh(W)c>lOEn>py{$bv?O*94XlO$g`9Xc!f%P(%VwFS9|IHx>J5BVq}@o`K4(7U_4g9oFM z0%00^1uYEd>wOug?RkAD8Xr%E(NUX63Jlt7S_9hBhrldCW;VX>|BfbD$5k)JnYhJ9 z&E{Hy!e65$3(~q3JLKN-wZYrN1SLH(_=xo43BUYv_kwho;3c`ehQ_)U#UV46e=^J) zj6mgwRP-W!{CAy=;CKXhLetmYr{{m?2P}@!;{o_Dd_iNY?NEG^&nywIqTi(v3MiYO z`T5fsz(_5#_MjII6*oiNl^uaQ2dIg1_jSTxbX+BA60t&~^5rvYi~y6mH)5iqp@Pe_ zaGcsGgbJ(3+V2!iAL8aL{=Cw!U-8u0PLM`mJf`)AhZI}LlZ*J^WV|1d?vt@nRCkui z1it&6zafwItyVC4*f0%F)~qdzv3hYZVV{@Cy(-F#*huV zx^pQK8Wf~hl71%GiMWCrTRc!|IO^Vo0k7(2-W;AHP_TA8H- zuNs0_Ph)`i4G1``H?36_zrkMjFaw$ZxJL!@zXOr4dl=ygInL|L~fwa4< zy!-$O$;#a%f{6UWLe3jLGA1+>hlq%X8Tlt3gkU-R0eEUT-d{VLi(V*Y?A7KMekD|6+mGhh4O`jhZ$i^iqm>)( z7&L)sp5V_~&lNS^IW=MoqylwiXpj2}OnTS5MZ4;SnEW*1ZYnx=@M7M#ieU(6c0F%Z z9%oF6$i-JqoES}^2X?|PZ8jdYP!wr=X|y9>3LFTs_=NFK*Q^qWX1?kQayoc(wrn+w z`p$q4UyVbav>YoVN;qZSQBc6YMC2@m{^Csh+(dbhkU>B;W1F&huq8&O0o+(9vP#X5 z>|jJ-vxzu<3=Z=>78x~*0`8VvL~|SJjUR$tXSS;k#)5)FrKIs4X~3wI0ID51B#wAm zhcinNu$g3VCHprlIrZ&J(DQI@(#VR4!u?-;seg}xpY1pJ{IfM^u7%Mz_i|X~@8AFvb37MwP^x8j^g_rbsqk&(xVu(jk3s8r~gOB^3E}eZ8x%>|$6= zY{o__ewF7Iz^9+@Y(-x5uWK3oOv1c&(qmP-vV6Jvu=;9v*3X0n(aANpGkr9|jBuY= z=-)|w`aTT`yrJpX3%)Y*_lEZtEMCL_1Gm`Gf9D^^p#-J1pvbr0y|G5?h4b_XKS$-9 z?xVXNPg?!ysrzq@Z6&a+(A=^kz4Qp6tal#DH6b+8vHpNb1DZ+S2k6&)HmZTBL#rlM95|&~V?!dRWfI22ZK>WF8-4#c+pLOSSQf*udp~Y0yY~jod;K>{ zs>N{KrX0x;|yVMx@_<}{@zU43O&PNyx`g1`{=N)0aY$C>_`>fS61J|Ko zU3$>{v$h-26s{S(V8i&9qpE#Hr&}q!gMnsobY5JloMeur(sxpr@G|cvUikV@^~_9= zeAL&{erk#dm(C;enMs(x9;cnYQi;qzbI?v&WpIkCO-VB#i8W?V-lsia>TpdVAAA~b!?2GDib#vm>%Tt@t=eE=2g1^52eo zH@1|X%?+1c|B!BEIDVqr;fLD0xrAi3UGlW9kT_H~Y9yn{1*)0bQF8MO542;wFi;v?>`$(}9#_NP1M>se{qAAcCAO+u{A;Chbh)3s zjYNGbcYInG6ZOAKlO8a^LlVrT4jyutm-h~OE`1jz9zn$3-Xp9hzCNLg1JIeT*g%T& zi#dw(K4=jkNzk(&t-5JF1D$48Gnyp#^z=p;wxW%#Q!}3EsDhD>`gg|(GPXbbiO+FW z&jtI*r)s~+gdbw6=HGbj;nn8mrsLbl51L$-8%*MyGwwv9Aodw(TnZGHv5UVY@Vphq z`o)T9dO~@;G4d(S$Wqq!o;){;uATu=Lqhe~qZGZ)Ri^Txx5^Mqh;44ym5(yUi^g<^ zL|se0N_gOX9f{kQSOT-&7fp^h@dAUToox1tiEWuhI6suLMt<0|8RwFZpmVp0%Bve0Thxv1DnBa% zkN7g?jq<&vZX$|6{$ok<6A&0xuHU>|RhoE&bBm>qrCudes^0IaRae_cOIQD>K=0E~ z`a`K2;(pKtwV$Rg6n^FBfFoi|Y*QhMGxbw}(ke-purc{n*F72&Iv2=X>r@=TDlYw= zv|M{cZGTL~fBRw83}t9tCeme)Te0Z}r?93#%KCll4E}Rpycg5#^(gTk%|aafWR6!U z-Bt0s)NBO_3fJX6m5P4b?-EWj$uIYNzCsHLrt-QYd)ZDj*=`NS(n~$j){D}l2J2Jk z@A_m!WNt?Fc-XDr)+}9@LM9KNV;io$vNR!6Q z6x4{`;d4t41gv69HH=a??kt~Y_im8-tW-1EeqX@~mD`O-gk%@rjjl}@I)3G18|3oX z(c9sSM?XlT`eTAY4+q%Pk&R9uzbYBJ_Li)8k*J4|`ds*q+h~|Be1e&y;OpGsR&<+h z*?qeh^WUBmk=J8XRuzoArYE!MU?(7INOm7)22bI%!9e-3mP@?UFfe?X^}JRvEpNW) zL1g`0{=-9_QW2tz=6eyZr)RqXd~kOTW_c*1gUr1O+U}KnY~^~ zhWR~Vu&OYul^Zfaem@q5gf_?M$Ip^Z zPOkS>>Ye3>bAuL|IV)zXy)>SWOPn5LRw9!N!u3~oty-dTpv8EJ8N;FP!80%a+~M1i zUH6h;&V6{)D~DyOVtC5xT54om$IJ(UlrckihL7}8tBJPGiaI)WTFmvf#y()6kvYU# ztFE9T+!06BW63>ap}$E!^~?3=!pZrFy-&?~*$(6G6PZT?-8@AKt4EhVrTOBZ#zBLM zW*HZKM&7hJnz8aMcW&P+9bY;<&AQ03CY-iq{Sh)>VXe{fv-8(g@_*TveILuH!(v9~ z8Nbl9?6=#8Rp3Dpl(wuA-ZpBaz{ zrY;LYx|C9}i4P?0i?07>?CPlDS9RY1SDrQlnl_ty|3@$FPi-neK|ys;Rgl&FZ+!v~ z8kFy@MAm$;5EN;#(Y_0H+^=NJo6@HY_hkl2Ti3=-;US0xm!5-M-qYPbPIi(Q|2C=n z>(`{$`!|OvXIDQBh%y=mMrpk1M7=Ki+BpC)N+b2%7rtUW_ww;H2!(Nj}i8sW_t)gJH$#a0R;g@90>gmq(q3cP>hreNTSfI#T=@PoKwL;Df| z;kS;Wtd#ak(}P=$O6vvhZwY6f6XD-~oEa59xj5R!`x5Df+#RIIB1`u%Z%!G*T2vi+ zfxoUiKpaNMO4?4P;&zQj;u8Ofm`g>4a!FgH>6Wda`p0}-r3{EYt#gB4{wkdPvg#YO;|sps zQ)_|8Zv2PfZNt7@=6$=&D!9zb%gYm-wuqjU@X5vE@8=-c>HZh`YTpI z#(1Y1D=S3&C%$qyx3x^L6#wUa;c`OL;s53S^Q)#W#f1NJe`xNFq2Uwk|D@-jn0Q{| zw&LE)K9yd@NaX>pp*4(%bCM|t^ z&#z9ue|cl_A^1Lsh}?3F?y2j_rgYF2OwVxnVY~94j}Iym-QV_(VH!M#o^6MCaCm6i z>Lz8HC+d61QQouJVOQKZ#QwHps{D5^k(&6ab{a(^O$L{V!-t(%7MJDr+0s9R#ey%J zo4oWtgCb@pLG&2=3uZ z=d0VR(~5lm{jbfAkS1$@*ZfN#gA0^lqS|)F;qNTl;PYavZp(sy3H7gf6It5h#eeXC zG=tnWj5iRs?vDwxR1|i_10h0dz`icor=iSW$==I1Ui1<{bG(KDNtORvc`$k- zDFzZl%@F{%HvZuj7pYG-UhwF||6IS*JyQJ7s>x?g07|DVek4}R#`D?$qW7`NmO+M` zkWDa)O~?*F8o?8?lz;*l5U)@^2t}B}_i*X5&+Mj8hUq<^B0)RT1$SOGxzGM@@8G9m z=POnRAY^z|V>B{h8|<>uF;uVB4XB?CuFaCPoy4aV)4Th*KF@)mL2je zM!g>;KGv5~apN0D71g&4%;^XFQN~YI(9b>XBHW%=8QB)iYz~q!k$`ed3?#rrOMgCV z6vr(SgYU-UzhE5MF5`&zkv9nR%V6yBuqu%M62@Akqk_s=V^MMLmRFCohoSh+Y~Ahl z%3Bas7)eWDw!X$2$`BxXk{;VHQh@vi#nI1wNjF+f0k>l)#@xn(>wQ_9nI-alim8B% zKeM=52hFe`Fxx8x6sPAaJ(#mCRID)YG!eo+(B5WhY;2rv!pp)E zt^EzdPn-L(Dk(LD0+H%9j1DYMB}MeKua4HvuNYyq&G5e(HE2K2>Da4VzLCeiG^~Q{hw# z7sM*nr{u~LP}$Ue9oDO6R<&sBjClkvdz_x_&mN{9WZ1@KzS-CXTOxP;5EfS#vdt32 zth2D|&eC0wcQD4apn69;92&XAo}S7D5m4u1{Uq%un)yw*TfbNly~$N$9_usvTl{e+ zqHdcILr2O*$|pY&PjbA>dy-Ofp~9P%*wT-3A``q;7q%zv88}$Tz9VV-y z&QKWqc#|Aa%Y4Xi5gbu3h-VeKWJ14X!aGopad7iuYeFN2e2cyP<9dVM!uDi8(j(;Z zISMp5>dG~LKe1jBzNOe=={PEsr^L#(GZ!#|(vIyTH!E^E9sloA*ht385gG2|B|FmKrzNhS zAr33&1x%N~-Y00JN1^jnc)lmD>r`Tvu_+NiBG}L2_L2&I%mK-^!$F2L3FV;sL|tx5 zC+_d|?ijFmPV!GXj;gDaF?!fUAKA&VJ%b*J`N{FXB8RfNawFN6J$<+bMYOJi9RxSx z#z=`*D>jpRT8H!@0wH$zeaN-kt>T*w7E%{MqicG)6a)8;B0JGinu@-8wI38^po2t4AOaj`@FSw=R zNMlzl>qur-+-$#$miTx+eRW{RKy+n;bizVZtG=7`onkMVOf#XB(?4^Mir<;Wr*;*sVer2D`l zDH~ndZ6nm9a`#dzag{(>6@#%Rz;g2a@mFG91w8#6DFbUQ$H$L^_`T_zibI(xO8y~z zLe^3sA(YwhXC^3d^?uuSb&h93)^WNW*p&=oSr|+B^aCyPPm65Gs{-#cWUA2%V%gTy zJ%7PHNg~Ju6i@@Y`yZxmhfBgXUv@G9ztJ-i&!^>J06u*h>sK~MFX8LMeygB+_u;u0 zqZQn*D<^(d7Kl`mFZJt)6gMFotFt0ZKNotX0bV_MNJTPxHm)C8ju5(YsaQ2a1pcA! zD`1qe?cyI`GT=Vp4AB48_L$%8U%dV2PskrWeApu3bicdt+lE!hwVf{5ZUxQv{tt?2 z4{QgJ0=gD&OK*#y6`5HYHcHNUhkj*GF8HAmgr&+Sum~6o1&;U1nNRn-(1a{{R>6Tt zk>rX1u4$dtQ9gv@KY0rTy|O}!z;g-6O#|WvoLOP4$Poc`_6ZOA@(sHBrF{l75W@rt zNg%fXM$|B8&bctQ-;M%UkWA~+?zYxFn)CFyAdok2PAJ`2zl~Oi7u=`vmYLeFnD^+L zg6b{gNf2MjAY$ww3JGr6Qlkyk(XoL6Kr_3ZLw-jh{C7RHZso@%q~Bo~Eqj;lIL(BG zcrd45YP@1oT#J_AyT08hGQ{e^a(KQBkg)iZ_{BO2(b82!eUP~QFatyu!eyyL@+Sdg zW6_s4R7&)sAw3Wg;5MXb{9ll0v@kEZwmY-|-9OPijE2OkeWo%hc%v7D=Df{PaKy}Z zPhzfiSMQU_ixsVjdlYZOXQy=^xvnA^Mzs&qIviS%F#-QZPwngh5byvlscn`Is;tRR z6T-g?Z_^TJrSsSM6~_Mcut`5z;(3*UkThkqe~lbYtAn}#{$teMjqMt+6pRah-mVbl zTL@jZO2Y;8FQ*{Xs7I2hZj?E6R2bK0vNSfAZkMECA?Ue~02r0PC9vJpk)pJUjrwNt zoDI009Vx^1T8x2gS^8kUs&oe+F%>&ciD}#|=)UTyxMBt0iRY44E#RhOarq<`yron0 zB%<8`TgEn=H3x)*e`A_~bE3c5@u1Cd&$Edgx;Uh!sE077r}|EpU5f)M^O9=Y!q&Dz z;`{az4)Ha>PT6axAT$>oU0k2w(c(y;jb5a%Z@h!>ppbQ*X{j07aw zb@IPweVr=Vs{{OFnk`Ci^|#!J7D3;n7o#YQX}){A_+c03?{o--UHs$|T)r?Q&0Yb9 z2w-WBQAPf{;V#(Z)0>#gdaC~fY6^b_)<)@QTOc&osOYN*6_^z5vhopjT-bz$gv2FM z-69y$jt9Re+_2Nfc;gkk1ueKn$hB~wpw{(qeXzX`U=aHa#H52vHczeVfG{k_4#B!i z=%uZf|5jq)e$kC$p(bUoaPb!kG+f63%qY9Se*Z0P;=&LK8OAfJVRlpn!xluwuOulb zMW0F=3R3P0JGvgswRHL;Vj;cuybt3M_3_>KFDYp>3#$_%$|J~gHRR1-SMvxir3|EY z0g1zi+T-CmXF9Hkn~H4VOaZ|?givQ3WJ6Q~1QR8xdjeid;r{`4TP{)|8L*q_A_u8l zv!KeSp+*>*VatP-mWp9&B^482Yq{+@Qxnz!T6wl`gKeC+@EO|N%^aFXVQ8$j@TP-E zb}Y$C+LLHQYjY^^ESpwSC*TjAaIUBOrHPRl^- z@R9_;qywf7mZlR|S0VVe-SCUoD=+sQ&e#77ipazrw$W|*_~t>#`-B2}2(wjCbliC6 z?%q11mU1e5tz!p3h5zvX`ut~-zo2#9&R{5$uGSE#)4F7hN-2$8T53^S(Ql2pJ=jwR zyiib*ZtR?xlpk)TBFio)dE=lXl`@38tcCM!P9Q#b-_f zZd7KzK0e8n_Gq}jDvPLCOfl!%f^M(0A0w2qW!n{43L|fjxW`l&5~q^~`zKQAN7)=s zrr7mPuxsJDeP5;htua>fuIP8Z;45B~4VwXs7@t9Hv}k>TPfO1!!|PVKdjXHQXB!bc z&!#Ng+>A>pSEq1BRmqn(No*lGP%a*#49KJ>aaQ2L3Vv5fFB{T(YGKtn_kLwIZc+Xs zMt{KLKmCj_QQJFy`RiU2Y=kT*w3BV}i2L7v>5M8`1`aYYtp96WP`@Ph^w*IHomMJrNNNw~Gi~{A4 z#lpaKJb@HmTiSoBCL=|5=ZSwZ!%uDRoF@Q-nLU`dJzJXybXTGnJuuYL|kCq)O6$S<-)#-0ABdldyidu17hfh12|mM-Q8 zz-Kqd<1JUeLq~fI!O|IQiIY$Rj{nQ&_$t&Eczrg2mjCLojd{QDG|M*M9yWls(~UdK zo6YyS@1HLRC|F!2_OOs_Q^b>=w#>w$-0DxDB;_`Bf^CEknso*Ef$qM0MmWvzGQa!h z3;(O~$dZTk>T0jT@8iqg>*45lhB9HyJKZSmbQEAW(5u2E{0Md1P=WB%`oio3+NK!7dE|oMxhNN&R#miG(C#AYs zbW{I5rU-yJcBi;bAQ|+FGoZNoJ_?a4=Yl?Tbc1@1_f7QwQox-&SBQk{j>gU_v?hQGrDi zoKlYh{!~Uh$VoDOi!SXa8}5;l^a22GPLHuXxOL@C=(t&-d6M!F`ieEUTbTom;=dFP zNQ7`yIY}S0CFKt7lUz~FB~U(9*YW^mNZC^}DdjH)KT+&X4IY{hft{p`2bz_+Znk+L zM9+eDBYCD|pthRI;h{1+-I)xtxfSfe^Yc6LjE}ISZH}eQ8}+$P(qF;#tIx2MmKuy5 zZYTWsYx&!SzyHes0EHsTTthBwsM}DgF)XOm8)*oJKDnWnQj_}m)%l?b&0zOUroL1X zx5YcgMoHm}uD6@;qmyI8sgwd9e#{A!I=;di?V1CIqJC6}ghWy~im_F593GvbK0c<# z9ls*ewVVk_r?t7U3VpBIdJ*i4P5?-FSocz-yvVYfyiYzQ-re{yE(nz2` zGoKvMk)msN`JYy6n){n8T@sf?+f0c7DxgukzqjVQbiASA;fiVPC%1#jWX8{rd5|R< z06d3B+=7KzYKVFOf?@+|;j2RhlDt8lL_TYBp2z|(?v*o>u-Z1;7ZiKrnS4pu|Lx0j zu|D|zT$x6OZ(E^miB@Xv#$vzLG`VtSJD8A_vh3u!$y@GwO*&jC9-r9Yp@Top#U|f_ zPtjBuFt^)*fV$bya&^K=r&xn+w+m$a-I=1B9|>n^6{

X&HweM|4+`TZA5sq-Wb#hE;j_6c-cQ&-~ztS~js z+O2ST^y?l^0sOqa_G8sZED!7C_q<0?T5SWh_A0Tyc(&ughXVJXps+vF+3l*0M?Fq{ zFH>DTo#npo8|zhgSB>6V@cELbaCmq`HH|w+INNXLx!+^hF|x6^)^YaumracjzDf?_ zvfN)J#571EdGQt_iIQ*8*#7Xn>ULzM|5xV%0FTzbsK4~%+*IYCp&H1nUU zDTu%PC288}_Uofysj@=(w$70te+h!Mx`8>q;?TOHz6x7iIq}pk>l!lDo!>uR`6o)7 zA`5G}puZ5iC_Yye)}}e3g*e7z2bC-kmf?2d?_}uYC`0T&t_ons`_E52EbwDfYk{BF zq}&f2*kvWxj$b01GEJss)>J}O0@a~Y%cTTbf2-_gP@SLr#{WbXQLv3THnYmlUap84 zORGd36&A_d*E@-~ksYM?(!y%Dvtmj1nwXZ35Assls)0?MKu${{Bmaeg6he7aa+O6z z>COz(wkio~-(%ZS2Iw-ffeeIv=tZ2b&VSIR3D__yEsdAIRzDw)OT5*_V9nFcH`F9V zHw>gb&AxXOjnT$pl_z2Yh29Q+MW9(}b!YJU!=vL8g%!{>j}}f`7h}A%pr$lpf69Qq z)NiSdclXz~9T~Q7n@}#>>e&2;dkvP?_GfGK(^U&T6)O@Uw#RefcR~e`!z6`Y%_h0f zi2pY`#zktAJ`QL~!OFdac!IFWzyA@qPRNM5|FF8C6RhblGW73&1Fjb~KHsS|*4@ko zSgHb^`A-f7yf^{z2aRuj;Mu}X{wvjwblYaDe8Zpr&5#2z#sKxL>@D!Eu1l?xvi%$g z|9$n}Bh(6rh4?^Vn$1?8P4mzH&q5S5SBj%f1DlFFlZA2tTNLKP~FvN4nSE3 zx;6ViCZSEeHA9NE@idoAMFp2~l_)&>+(8XLp! zopP8BdG2^}D+0o@#Gg1ob+lLgev$=#QrOmV1*R~m=@`p?V?|G!FaH{(ha#H3OZ~;e z2}ab~Mcj`~FEZq4OQg#8ygSOG7HF^G7f(82)J=dMop2ks;&0t#)he?Uil(1xpw)t@ z@lJ0wv5_9Xn>MSPqUwwzZDmsRD3Z4zaSJg&BJfYWhaZtmof-dqETT4^z~=8ZVSK;( zhV-6Ame(_02yM|VgOKGvG(MFNe@66UlJfJ9&na>_jkDw6UY>6Y1(@Gubx1S7I1#v6 z7;PUo3*|aX<=|XKuhW;D6aNebLZ@>_XK^(=q4*jSQ6YbBT8aY8W3eL z-rBg*7RvWYjOvfR1EnF!GAlz(l!Sw==;fuMXVL{-Fadl$5l8n*6m?#VD+MS|u-asV zn?UA~pR!Rg&(&!Haz*om*6y^o2A6m>{*L(HI{A^OMF8w*&7kWb1N)qOYufajcCmGl zNBk=fOMvb1E+_9a+fYoJZC<77-Y#0k;^9pjFMrit!)&-v#l_EA{t*=`C@e*+_OtW! ztJkk8*6CeVM`m`0>dh_=^s#}+Po$WEyTTo5iruyQ#!4-oK~~2^b@`a>*N;tKS6VqR zcJpVUk2xYM;C{%|0P#EB`R20?T%LaY3Oy)k-db! zn)&9(+tjBiQv1La31)GtegS)P!GkDP-jc4 zFNkIxZA>LFpXxgDEhOjOA(kIRm^U>nsgQU+>>kv>@*pv;io;9d3!kG8z5?+|pPgtb zH}WR!ojY#S^|gmT20!RgP3=8bVK(g(c0}^Llq20bzJQOLRC8kd^i#+$QdkQnWfi8= z-^*Hf)slZx#cG=Y0ZRWb`E+|)w0rAc;_2>=1aEjGNyA>Dl9Y;pQ2h5+kXmuzW{Vc- zM6dHXcf@_EL~c<872h;)WCUZ+Q0rgn4TO1JiLzjCQ}W?zWaI9tvdgR8wZOp&yHg-b z^U%a>Zv3=g1#3@qSvT42YOC}ipY<=OEZ6ied9fayUUYh~_L|W3wnAgE%Ng;!zK)pi zd3}*c3qy0jnWkhwqERqSwybNwOQj0XAwjt{5nd!r$FCprslF7hc74L+ z5G7l`bg+ZQHYeTZ!4WW<1)C10Hh~Q@~#XD|tF@Y^IFfA{MO<ABBAwWQ_cLW;7@+H94gC95P|iWcL> zNW-ZzG%3>a#F{p8*@etp^oTooe3n&u3UoXX z;S)qAhJlica^MIgJL5eB2VR4)G<0c$BgwfC)aP2|yR$#t1UC4jaI`RVaLDwsp=J2$ zc?J;S_yYb{T_Mat@8Jm4d$XYHoZMI*Zt{#=B%SSIkUDHfS|e@{BT8l-bgh=#30q9m10-t=wfB6mOs#pC7} zE&nST1v`;TtsifgmtlC8HFqy=I?f}@18>Mr6-IqXOA znBKn%W04eCh^-#eca|3Zv<#d)a!x2`B$o6=BTgQaS@wax>h;JGL`}b3afTr-SN18& z__*O+W0z8L`$t+|zV#^Ns+*EB8^v&(pMlWx7b_l5xiJy*(AH?QE}DnoTUKEKz3Wv@ z>Ah9Sk$OQ|WB=yu95Qn)>sz1&MJ{Rw$6ZB+sMu!0LlZ&+jmxSBWiz@(K3BxKhE!Ey z5EBa+KhNU&iX2}y=dFua)Q^MJ{u^f?lR(D>Jw@IvDpG{BJ|R%r7bl{tS`z`aPDht> zD_i4vqUuNs9j&3YPYvm}LStibCYKBRw7%@^$c_;#fyZ!Sn-_wXQaXiLn797`l0>t- zN|!?&A!vI)QzXrdks- zF9)8EJ~xfL6G@x3#fnI5#}{D(f@P_+NHKsq@zuBuYL3?w<%pNZk<$? zJKD`==q!~a5*e(gv)+UXT4T0}%Gl9Q^x~e>6eb_35}nlxMYtVGuzs?6k8s3TOkYqR zB8AzZ{03B49Tw#RJM<_1>QvVtF`&QhCx?Tk!Y@}a$)Q1F4M(Nwe|dlcue12b@H0-R zu|!Y^nXs9!GI!0y#OAS~&NgBA*|qU&Ldr)u*mb6w6Z^eFlBVSxZi2?e2wy=BNf3Yf zO=?>@UCbilT~U&!(=rohe>?eDO^|1O_`oUsPaheS{;X z9t2B0#Vl!YB;%fx;V*7ct;H1BqQotF+5dyXdQfU2&%f5&)ZbrY%vXaQPyNn%$b!n99B6mFa_Nu{bcUE|UB~+mv^~3j0o?9GO z?^vs!XQoi{c-n8$qqvL&tbV^rNFaqDC~mrUniCC!WZX@slk7s;<+Z9j_(38zf%Q&j!h5 z!nGz;(<3I?GH~z*dFAX+$Nbnv-j+*?H152*(yg`5c~*PD^V%sFX}06Bwx{H#(MZgX zP&P()dkjWvO)cVZ)TqQsTLES5Yfg>ipvz*7BG)OxjAatb*p-&z^8FF;7w=G6olr_v zSrpd7l7_*>2D%JGriF16Mh;TTHn$NajIT6*$9d}Ek+8Qtrj?6@9^VT-vgvT0b8WrS zvoW$R3|JUe2$*)9aPvkBq}{pJ=!z#--3s`YwWciI)p%@-#As2f?&6}`t#9Fwr*B=} zKlQ_DzR1``ig=}!WxCaGuMw=#9ST-Lf($;jc(K*bsw@TvtXp;`N&7f^2^K2nx1_LK z4HVrsVdc6m6Nnbin8W=x9=RO$;JRciYSE3gF`!jdV?&3n1l3i5ux;!+G*fGAa%`{# zyDOpJSjEJp#17B#xuhk`xnCb+SQD)eY3uSIgymCN@hTe7WNjYzU5v$kg zJ{24kac$}@uzXklq+nX;Z8Ld2HvlU6G-gK8fd4s#QVWefc->yFGPk7Ex++}1Z&3-2o#ti#NZ=u-YIQ}-nFb+LS!7`$0^nSy(Y1VU*&UfFG zDLQpT1e7lDv@LBh7qqhqH4Y^r9)UfcJLS<4&y*#TYGYc*k|SB<*U~XZH0iXH+qaAa z5J9p?vSS1yujH`57>vSRbyZ+v_A%?ZLp@PgNrQJ`$i?K=JS2KbA!0w%$gl9N$wUDA zqOFZ}D@bE!@W}k5TZHu;QEP4CZXmluwcJRgzkPw42?vIyUAxw3$q3y>ok!+tcV-tG z;;{FBGa&sSE~jlUv!wGKWya4zU@d9&7gmF!fWF6~od$vKQPJ(4F(9ImmdxYbJDGE) zEvoL;LJv9c`4+;EoqY1nt+Ui8<99>E??NmWp#9lNI&zjIfuUmEuxNay4r}A(1zEvw zU(a~7M#IRr42HK^HCe&&PZ%EJEU`RI5KK88GBJD;Gp$*E)Cc3a-}sJjM2lr>(QiE-gWmma)k~*Hr+0GTfbnCHx9iw& zs>{9cC{$OF-+HH8P23>3i(|u5CJ{$m&Xr5!bwq_6HH>@W@I3TrM{^K;Faq&R~W`7oviR~q&C5Oc!-=U3^7Ws)z&}Qc6+kw3Gl9} zYRQPmPZN|uUS*l@EoVZ8A!ttTm5L|ldgWvG!Wz>O)05g2YWI0|JPYevE-;GHef zmQ`XURpe_s`D&I%#qx7r8_>o#aXxA&QkIh@I`obUEyeE}GT_I)94c{1bc{~I+s`O2 zCDDw^YS27X!0{sXy3+sdS(eLlQvEKxIL(x=z|-fCcO8wk3Q6VO<`)-Mv-kH7`9UIiwa#M7)=%g1j? zpR}vNwNh=#da|)Elo&=ecJ3*@Bven;p7Mfj`FZ3h&1rFRAlY*{Lu=ZEDG-t4XXhq4 z*VBmpzBO?@TurfzuE83feG)oswO!Tb0_yKHf$}5>3>MMSH0*fva7nEV8yl|}1cEKJV$!r5t#K;OszU|vVw+Q#=r@-&$(5ynO2z&r zZk=(fmRXB~D>6*i4_>>=A}xHKKAh#0{$D8Zg8f!3u6gETzZ7V1nUSb)BzYSzCuQqp zD$bAA{Oy<0EIB0NdlH!&ClMx>=apu1@=(JXuYQc0Is8_?)AhNtH8+fDoQ?wvBH6@r z@hPkAJ3Cs%!7%S7&wi=FBdNubKeJmvG+q8G5oRX5yGg{od#&=#sL)jw7H&#*E?Kvt zF%tKp;^|_r`~FH~sKEM6iaGJ2#4|RH)j7sPWrVd#wi9n`}p**(Kzv@o^1N!~Z+befojr?LxJ1tVL*YilG%rXzC0R|S?_@%mTmXhasW zn2;tla=RdVB(HVNY+E>;6ss~nzgO&jkvSc+s_(jt_ZG{q-M{jEyMkoL63-=&ZP={) zGx@Xb!s-hFc6z&4O%HwF@JOI)|JDyIW_ws4a*YtP$bqT7NAfMBb-Lg|*L++_2Mw$J+UXMjBtycy?JWH1V>u zw7z>rq#iW!HHpchxAFY_NIk7y%lqu>n?PGrL5xQBr)bm~gOk93%!PK*v+w}5(UW`47WGSEqJm&U!*L9>zv#EduY zu+=%MXJRHBm0X-G!)WmmkUNBRnl0XEC?2Gs?_>XVVchQGN%jqM_T?uOYi&>L;h5~b z8;7%D6a~10O=kD*ITle-Y}Xd3C-`yX+?{19wsrvJb5D*hUx-W4+SWI1)5o#v2sG?Y zb)d7_z6Pe3k5tTvm0s#`om58q$wj>Oi2Vo-esb66yy<6;$+rTcG>*4nLUB&|)0lsE zV@zfyebumY7yeeKD<}lXO!>EtEFvmnfH?Bie(_J$!m4`|8j>isu8loanCrqtm!4xL zNgpm;`?7lb+SKf_#4J}Ol>BrKUv-%q6G@tThO8y_ES3@}z}zlsBE#Qtrbm3N z(u;m$($9AAn!5%39B}VR`;#9R&{3;Y4UhcbbJ&mMvoA>!3F&k>~g06ujo7D8cS8eTCR8dw8PO8mW0t}MM z_%N*iqv$&it@+=&NA%dQesjE1v?SmHtRQW5n(%e15kKB6(ZO7x7zBGn zr4a~M>8g`PysRN`2R|8^c**C#Mm)E`62jO)f{jzhCn*~G^%ha_5(5ha;87GD(xbuXMf*J!09RFl@i+9;Wp4>R8KX8tgS&WG>Q zVGXYXJDFb=S%1U=Q+6nHboGL@I-pFT?b8|9X^uc;e;R;Tce1H zPq;+Z*_AwuAuoaV+uY{1kS#Cqh4F)KzlX|09G~kyo0%tBAcuy|k-2Y4C;2OoSm@i# zR`Q9YhlYu*nP3ukv$K(glam9XlE{aM%0Bk?cU=RZMq z>&ma+>IZiA`Bq$2Q^jM3)_bKP>Tie&9!AF*OfD7;PkdPBNeFW9$MLGcb4w%Wv`N0z zXg&~&yj#p}lVxmkPoY#WJSN-aDefNr;7>mQb%~LZK8UCiwA9%h06i@kw8YTp78T*L zkc!#TEuf1+i#kkDamJP;FUroYw6y-E!|A|;B#xbseL~XIDllh^Iu*7; zlCT2mDYnz%{d{pVg8SApa4moX9h_m(^cPP2m|JOeU-oQK{4l?AGOhMG1(+jQJLCPh zTxo&TEJPERE`X>hB7tcQ+kMb99BJCMI1qn3)Qv>ZRk%dQ1$OFTK_10m=a&}qP#==_ zrYX-NC3ZdT9gbTKxI;mU(sE4Pya8ZSNxo&?-ZIGnt^L@>_N#A%TCyfnaKgS$qK^|NH@D4Qf-_*p zx8q%JZ==r0#^+u1F5Ydgwdt3(S3k>Jq7N0Xa6Q-a(%gMQB z5jS29Ry8J)#)-I65hF(9c;ji2BsLZ)4t6>Ubp_6Q70T~N<$Mr7nKrjwrxm63)GzSg^k>1(3Q4h;+N^O{O5jh%COBl=h5`jTu~`>vwo_9i$8ZUD#*{_*VjNKXEJi zHW6%GXEi;OvV-W3NY7KC$*SuV2r01s-)qeJop@LP2inAf@5BmP{&WX{S+Xm~5xSRQ zU+yzCvE!-no3FGj@RDxVpgp6J?-@bo>~%pZVwVft0T+5*^B@}%Bg05P-8TexKux{* zO7n7e=i^P0+Q)$F@2*Y$16aXl)WqPsMPH-9bl4p3a1r>a(0y`|sGMORnWZYSi|+Z~ zLY^%Xsn7BDC~zndpk=S|q^crcdg?2oQc0oWccA~744lK8`raLhr2wT~H06q)>``1{ z`_?JyQIn8dZb9?PL3pp^M82q5-0&Icd%~UW^x$7BH<|5{W9nQgZ?;KG0yaJ0ng(8S zXZM4T)8LO^uI)TxDe`~cgn0~%pv67RJ~YxV)gJymYm;7pwYa=I8+s2M)dKpkZ9;Aq zFUMZ{8s@Boc&OCzJ)D_hbhM!rim2x@Y45!T$a6bg`gD7JZgl(!m?kT&*#Ue5q&=0x)=(pq%z)@xxu zUJ17B{F?*PZj3{|KdZd#OIn& z-jGOpdy_$MxBtVn=_7PSKWGqj0`GRjnvM5A zk=8Hc%&8~8S!__nk74)v9^6FlGmXi3yvFv7firXf%j@|10X6IBF2M|qi}d6IPCUQA z2|wQ+m_cob;J~ik=#NjFvgoK0`9nj?$Gd*`WDA^7w`ja*6^{^TNAY+6ZtrXpY=3*- z=FYmMapf)0pGg#zGy6}A6llST_Kds2BqBy8s+(d6(X)cjf8Lp}|0p@Zj7(K*3%I|@u$?^etqRr3jc1)XG?y0pJK=Ss~T(3UKfp&u8}`!W(adX3#0k*mv^ zviEuMUB9S{a79)7hYFy3{OCbc`E96Ty-pfmD*8xcF`XO&udgsTE4g z`NFQ>85U~FA`|f9;83rW=s=WM-3BwN1|3Jb#T6(`xV+fide?jptp~N!P~9E#vp5eiBUDBQI|=PfDlxi?kU$Pky@#O zs0EUF15)RAPdCUsBDa$!#Ei(697Q3r=0v}W(;PwF5UApS(oMS^J>DTljTQSGBQR{t zs{XukKfsKQA5~5s(Jw-PS=x*d)MMexQ9gmU0X6CgLfBf|op4{9h(K~Ul6V`|t`I#G zl`_{6_v~ehe^?qlxYOorj-ywu0$AGEkBC$_FD!mLxT8Mq$5Ot2x3 zhXY&Hv)!UHyt?c2$@NIc<)Cbs6smRAM__Mp2cO9} zn+WAVo&Lh&Xk6>aJS4(BegpU}_CAiYM1r6zWZ7K?Q(9{{WqcxHRF}N^E6uLs^fqd- zQnDZK8=J2K#$1s|a~RqOWd{=c#cb(GTnj{&@e71YcR&8Rj>q{}8zmqAg2W_AYCOs}zR<;_I@j`Hb zBI_47-}^R719M`XNHiR3c!)$b658)yOF@Px3>uHMruAA4tubn;Faoy;$LK0_tOsXP zCH9L*Yy#3FYu)be0vUTNW<}vI*uqQre0C`xaY$zAj$-+Z-2oNaa)WJY`kd^a?AF^P zh$zBDT3Qi0Xq-}W1q<~@brBki}!Iu2C;t^=@p~z<|-|gZU z)ljfNq?vS(E&MUw%!}|7~87JENmJDZf)Ey%f1`& z4MfyMvhBUu20zXgh;&s+L+xv!YC*cHg~C;&mSxPOblsZd1h#e+6%=$}t{Nl@7S%bg@{)x~6he_%g5lV}WoFvS@ueDU_oQ^=%SI6zquK6O+abVUIPv%y5;#q+nca$@wKIECxtS z{5tCEbQQ|m7Ecz$%M}F)iNfmf`#V^7P}0@ApPRB}HK-m*cM9YdSJZDxG$!(?kFmpQ zFpoysr`xA?2CY!%#~H>-25UIRJzrpKv>BSmR%{oG^AL?J>A`RJ`TaMC)o~^8K3J9| zRdvuuKJLue$ba&-E6_zll;^F70o$ckZf>!JCmI#%FdKz>Vvn;_#V$`-kA*ObQf4E6 zNGUCAVRP=wWAYEV3dq7GGicFMtjKe$o@9v|?p&l3rLIGgY<6wAo~)k)Hi(xC*67s` z1;(Z>8v5TIV>5?atdh6 z1(L1O@?9{5sGjWSu@VeNn&*CVz9g&z6rpcobjiuQ%k_p;+NuXf4otH+sZ)ASE0>iE zwMU6Ftb`oXZwsIGcEEMo%9|$!Y^yCgqII3#D@C6@bl2;{K37CpH5JQKc^s;kOGFLc zu^;ev0sk~XXm!Q)|19q4Q(epZ?XPMnYZvLDLDlVGh}A_Ub9WRDK*)gGE7CqH1Qm_;&()G)z0)=q*Vda{g1+vHpHd{Y&L^>U+6Ge zi6T+mVz*iRlHe=2t(a&SJBVZI4@u zZ048JM-W55!2Q0r=_rsSLQJLUhZwcNw3dRfj<|+=;{|>jocyw6DDjH9=)KF&v$rdE z{n1h1UcER0Po^7u(~+cc1j3Fcct|-zOSmZ~|5mk1LRTq|!(+vlgQadXk2GG02>Tjb zow=Oz4rq@xY#mG~IZB?pslVaKWS!+S`q>F>9~m%f`#Dr17etFe1! zZE}HN&NAZF$NviEs7i$^$2ZOFMyra~FoIVPs4LDx9ClCYLUDfpNl=A)=I@Ha9Y^hQ z2J00a62h@kG&@dyOgEWJ?k6FrpBBYXsH>`}CfJjnIeZi|Lj&?BX!G&T_)e)}s4gdZ z;$9Iw+EkiUg!BThM*rw+Ngw023cIBSFsJ>dmT9%LJChXGD%TgT!lNcz#k)Niu%`^0 zt7=onV6o_O)xd4QMfK92(~n-R2jXp8uWeN`PI7ahsKG%d%z3I)oaBK3Hd5ffBVZoK z=L@5HBqj>LG7^1qIbpJ^Zm$VUMe>RZ54YS{K!IqiW43pWnfyaNu^x_Jj4e>Dl{u-= zA3b0F5IBQz`QHh6S!mf4m%V&fxRy^9B;lg&l%^@n5G=5u@r}_6x$!B6_eb>P)eub< zZ1HAAKvS)%b^706K;&J}I}I&nW_e~m&N$B0ax}pazQhRB(<+WkwfN@nrBZpWhsbsj z98&@Lo@4>f)y?NLg_?vgn-Qb}@VEs}e(mY%GRH?%WD)LZgaQK@RXy#ie?sz>>&@JZ7$q9xjOPe>uP zaC4JMNL#|_zBur+E4gc5>;d&v2-k7iuX!@#Z)Nd{8UCF!SPj8XmkW$EJ4Ue4&r@S!wVt#?p!D; z^CotWkcfaYz=3=NqV1j8B5=ZbGiLk=5vr%ZVmoMU5TIWXX_)FMjd+BIf=*W9V!!Ka zsHRwH_H}eOQ`as0t;n--o0l!j)Rg&B6g{Q5%E7o;*9MW&rF??eTH{eqX&t_yma{@B z97WJnhY-D4b4Z^I9*d9lI6gY%kFiQcxGH3M1)0xyqnmia)+A&n%Q@TrqAdLJT;Vf(dvd~L|W1|`U zysVAH#@MdhX`~koEOiyE6Nf9>^-2nc=x;K#1DR4g+P~nf7-#}HMr*a6mc;^-gxy76 zB4=zlGPL$G>%(DE1Ml0XSi^YPfW)-TyWUD0J4Kdz6tBUPKnvg`P1JPxpP(4B==V$J zz~Wk{^4q6L55^`!^P3ah>>oEaQf`M)QzhO_0Y6+BLh5wnt2%NUGRb83VwB#2_#3_w z-xyoWW&28J4sYXW4?W3idJ_1UN?ii#wf2dZ3Eo+SgJpuQ)LyK)h4+ap+vu-K(EhbC zttfuF0ci`V*?T1 z=dwK+7>@~J+e&Dxj1)S5SwKelUTlM)UTTy@b3D{s-ej1%g;BlQKweeV^i*RypI{Y* z!0TLm`^#M&520*Ve|IH=ZKgZ{r?`IoKS`|AWE7zMThHQmpicJm zj4B0ws*2@7u^fC)qvAcdMid1QvY?2Dbgrb)Zx~cU*W5HX*D&XRk`XsaGUHM^r~(kL zZ*`dWBE;Pm2CpX%CYKq}%MgcGP4jH+Lzl%KG^Y_eeL~5!;a*jCE?Jxi-gbnlm15;b zrd=i9&;h$Ias-nSttwn;AG4;@nnw+h0ef>a+`{xPTj{TVWP)LL{rTYSsyGq$0r$O z67%V^;Kw`>M2z!N)zuJ%YN&ChxaB_O&1bG}iaZ6q3Z>fVjtAMoy(MY(J|Mbhdk$8G zEB%JER#Rf}bpUmFFBHjZQc+R8&@t5U({*CU6mFH|D@yi8Xm@#!Bp*~ISH=@(Vv1H6 zFBAT$jzMZor4nG27ORsYH87C@ZfEiJcc{IyfYE~`w0)yuoZOB?b(5edFlHdK881)k z%!@nThg6(lnaji>QMFr2_%Sntsb76u>p9snYnV9X6*oH3H8ZY!_BzWZvAQVF$+ykn z{L~qm6Jecww;{AdcrJ7b-K0K$UTW+x?fk=!DvGNn71^{ZGf`hMvlhcQoY2|RXi6qu)3ev7%Ctix@KQuD^`=Rj) zg{XE6?24r}B9n%?6W1RK(l?|rlPq)N_g_oh8F|SpvQqMWfRZhfqSET$#zc?{umz>D z0cK1>_pS>hD3+%UGu%FL%b7lfqEBkFIO>@sCNYREv+&4ad9PCe1qVH;xN z+AamJ({g=vB)g$f;GgVP>Jz!qB$z`L_UU;rY^c88{AJhxJ~0BJ%iwC2!^1-wr)Owh z&?Qr}2m{hQ6EERhwvk6WQBo1kfWJieqwcuk9X#b8ryV-rJ7XymZ3?)2PSWPKF8j#` zc7NvxpH1=3CUVJ1ZlxMW3M8ND+h85SDhaNJvy+pKCNozi{Xxr|#!a45aHH~u-+(HD zQ^`XQPT4%djAJjEie-c0UMun&ANK(&cAiKJg)FUgP;m^x-6uFKL*xRo3WX5)zQ(fV zAs6<^z*Q{+s#x9`G+lVR%_`nkFBh{{YyCU(l@V1mVk2Io>Vh95T;mDF>4%1im(Z(7 z&$dIz-Sjq47dmHO0A4w_iw$<>d~Cm`@YfzM%tEy4DKf5+-GbuB{lk+gm(A*+3NSU&B zjg~f>Yk&e|a{&GJz-tL(LW+vThXQcM-Y;VWM$i0qdg2qN=6*heW`Gh#`{7-!-#AKR zVPd8%M;>qtGAL`8yOfK9Ri$deouMX+_Td2{t*F_DpATeHe&%rbQw{dGxrRwpG8=>K zBLE}dNdDjb*7$fsL8?!#cqMq*xX~l7x_5s*yX=y2mjB`BmcrQbYW7st%`%ukRa9^%se#hpF)9~HOQq#r`X1}{>BUrR-@tdy^ z#&;cHl~h8iPJsAPop$#2AX&OkeXSP=xTR6AOC*c&;ovI6_2`W{f=CA+>&N6X2v-6! znWdZ}3%9}3-IJv%(n1&OFICkSFXZ1ZQh>I}ltLG|G$ljpCr zlnV~qMD1g!rbCq8bXhtj;0}Nk_9VJ3H=Ct5h;S7KT`cf3R3a?1JFJ44Z0L{@HO6h_ zEqMspiuJVn9-@uYXdb(%Q*RxB;k75#OJ5>i=kAg4M6lA$j~^T}Qeo*U-)pY-hJd7! zAkQrm5qGEMP+C=|UC-+nL9yq90>78a_R#Ld^h3dK-9xXFr5RXcIk2yO4!XM?%yXd0 zB-ccCFwo^}X_L`SW2w*~CYhy}_;gIPDZ#gs;~J-3RrZxKx7u_P`vm{;u8)44IK!_# z%h=3~k6;Hq<5Ra;)nmv%anmwjg}GCIu$H=6B}4wf%w;!`rJ8BTKt5_*Pjx=V2^jxA zP-ikUDJ$2tke3Ky40-Vd$C52`^{(i9{~27bfU6WS4FHb{pRnk<^BQ*`$y`7BEBe{M zO?+tiCirYFZ>T;f?u%-y7Cx$Oe@ag(Gk&PTaKbH6+LvQ~$LBt|k5aXzN7=qhzE?!L zTJ(swzqPzrm8*014osr1!m*{6*_Be}&{v{R#M(?j{sb@jsIZhvjwD70@u>q0hhc#y z*?Sg4HsjqJL~F0zR=^C|lTJArS)g9{twA#A3%`uyesw1UDyRLvdRSdqWoDZuF^Fyt zzB%C&XpEG42?xABAT~N1Ik6{Bybc&e5yD6r4f|udZgsb^-ox7BMq$WOTGK5K` zhk{7?)jSi~!3wM53r-iWzZOwEL*{UX5*%pY*A{yh${4C{En?Dl^huWHel>PzDvmR!9d?H`V_mkn&H%hj z2`i;EC#9LbQHHj&>4egSEL)Z$*(t=); zp{Z9)_?gu-*8^$+MUT|vlC8zVWMpH<&*8QpehK+_yh&_^AHc)W9=3r7lEi}0Q8J{v zKKV@VadFx4)NU2}B~4|TaQ{ktX@T=)#YQ>Yk=lRvES?%bx^92;Q}eKD-J>mBd+{P! z_34ty)I)^)Hi-rx=JLHy2?ewgTN*-8PVpO1J_9Ze1yWUh;e_Xw|M^DjR1;4b6WMM( zM_1*B)yGUo4CvKSGH&}+A1?BZ6zgaWF1v*k68Lqpu_sHtaX+iHgICN*rRT@>8U+Pn zI-p-^74!l_ni%$V4gX%m9w!fcp!YpC$rxeF>spA&b-Q>ePa4yp|}HUoYDPJ{I8B#guvEX-SIr_Gtu#&a7i>o6c$@u13$OPW%TYt@Ml@Af5@$ z)0;yF^E+9u{F&((ZjYt)Cl!33DFJG2oSW5-{q+^M@a*3cjSNzxCEa(y8kdvXcV*WqsZ}ul;^Z%o;^C8l)i1w?a8`$1` z@5F7lZ}5dshre}oF09Hm=%oLc`?+V&Z;b-%&-@Prmh>SY1wra=21syf>ja+5y$U*ESO@4P<C)Ljn~cc!#|_T(Y_eRu-?`D4I10EZQr7i@jC{X(F)SmW+o zH`o9Bsm03*|G(kx+cbaPLJEy|cz>$PEWY^*>A%?zY7ZcZQG5}$VEU^G*xhO>!>ot7 z)D8J+YRWyi@}K#Ep#477CGq_>{D#GWSSo^E?2y@eG<9`18DA zzH@gj@XyXOK*IO?j26QVYpz+np>}=KHPh zKCT2_-lbgC-fDLIdO_}y^)QmE)wkDW6K#==>T`dMAXUJho&mq#p3xjUH-T|cOtA-@ zVz|Ctv07YSZU>lUx|$Nj)iFRC(f7kcAfV4ywe;7+<4mF(zXy>BC>y*3MqKYieehm% z_SDR=z=FN+Afftxqoh#~h}}s5IaI6I#GGbLg1^0Ez|mti^{;u@#^n9WoP{v%^k{6q z>6yPe7#h9R+zY-RaTRD60J;G@e+!%?A9&z$H^5OWrWyh$sE;kbG z)3Y(eGNlr4+hIR_$XzA2`MhAat1$H$(=g|S4?o){nS1)i$FZw`@PVuMUn3@>`?s-d zGu&MBAZ2$8!FQS}b$g2zx-j2OkZZ@y%UWEnw!7Aaj`_3swXe;d51{f2FW}Jm#x)LT zxU8HS1Y|h10|72d7T~;V#hUQ9@Vp;4r^EbX^(O;KaHmpApSrOh*Ctv>oo6m&O|z<$ zJA*)U#wBJX#{hb`5%@x2#GB!yg#T*5m?UhN6tb@5&$WG5^%cy*#=r?W8 zR4V)c+WIe@3>b_qmn@q1`ii&@Xd}W_^6fu8=>Mk&z&a6``B-d7e#i~N*qTcB7M%_&H2$!S%0&=JWk?1P1Y$ zfcw$cX5cf=gN670rYUW^@KCt_UZ)UXo!(o(CSXC^B9%6QcVDEg&B;B;yj1?L7WSI$ zO999NvqfM#*3!@I*5e5&yaDHTEx6{G$i~Cw8|K>@rvvU-L@LaNtJB3ywpn%hy0f0`$;`A7F< z{Cb#PObFcM#^+^h!Qxdyvlu2W0iPPO|6-x})q2OlgO zuD-ZbZI$}fd$|%^u?NJ&5gmjcZaDb;srJJZfc^iS`sG$!RCU|s{iSJ8D2glaM7wJv z5HIk0_{zV2NlszPdDwp0*{MOq9`=$AXh`Ot6#?*Z;+g++;b57o0op~5;~M_g|5owZcHeK3!`8N> zU}CylCY}n1%a%P_3WSGPT`QJ?o zjzs{R>y8sCn7p#zSm*tSg~Z&8mp{7S9^dX50IcPI<>*Gm0Z07_^3JOP*!!ZEdH*}0 z(>lxRC{ou?fzST4{rs7%dMrU`#COTt$Al|>eyt46^TF-+7sn$?SLZ=CqZ^RF92dYy zf9js{v^s8w-T8qJJ8$Q78G8j_*QX1>s<>Z(scjh^!GcIbd{=LL*fNVfZZ5u)3q2Qq zxX2@+ua<--LGYi&30Xo`oQRO{yGch6zUhS#DSz-bhuu}fmS8Vn>lW=ln-lvI;=kYL zNjTciuV3xt!XA*3qkI!UcIJ<>8BM-jfU;+Dr$q4@@6_?(UXVZX4v^2z%#3c8H?Cp6 z4Aqi&0|#udQ;VTloR?===!$C>-@j0kHvtSX0>;^Jjfz}B0L|$42d@}ys3~=K<~bqZ z8y;1p!ALydCVV@s%GGd9w#NKAIV>2Fe%t-u_(97Qv&9P5uXh(38ZKjP3ItYd-zFGV z17IA4@zR?;Ye0`(r-K+QG&m0dR%LfC0F6^rI9zhbefG@RlNGp;qlWmJ5otC1_u1s{ zDTvR(c)fb@V(WgDtGQ}wL5~iy0Eiol?lBCuqQ8y`0M&wneF4oo&z)BiQDg%oL`U%f za7(>&fVJtNId={)vBZD-k^d2N31T8Sm4k~r*!S<$_oTzne*xc}UpPt@fr4OIZLVLzP}Q3_fo?Z?fm33q!l^d* z?FYCioD7P2_SJLZyt#%{$gzM-w}f~jUQnLDM{>iO09QwzB)u>;o;{DKsxDDmmj~Vi z?^-2Jc!w~F@&zpfb@S+dLOJd>*Zk6C=yW?CR&r`TAFnv>xcr`sZJLQHw$hnY6zH$? zW;55`PKVBSz( z&az`D^@J>(Kq8JXrXGu`)e2TzbRv`887OWSY4?%701JXVF&3f~^NChDH1zst?>k%D zj~)!2M_FL{7;~%5@pocmvbrfdxCdzx!-Ydx{|&eke!+RTo?x=QtJ(1r$HTg!sMmn0 z$InWpg%f|r6k2x zE~?cVTc#JDlAjYFv@TM^;wRoLk7Txz+iS~c^*?(+qWyKG5Cl5v0_f86A3N2sk>oG2 zUW=kJ+~!7!Wj0sA4Ep*P3?7V6vs6UVW+AB?GF1V+tK9J_dius?jM|t)R7IT);o0p4 zqFJjkOY)&;sot!f6yEd{@qrcqOkh{nDV7$!N>Zz&WFP3@`*LY`yze>@F1B7z(UHLY zOq$juxSGQaE&iMTQ-2NvaA2;4_ZLyHs?AS+ER>%#09ik9g>|U4UyV~&xFOONPw%6^ zbad2{;{5?Q9tKz24*-WMnQ~9Zbs|>2{dEk2sCR@GMjAO#3xH*>i{F^H)Wf_ormdjI zkb8GKJQdG%{5P#az)fX#a%-6fZ9E^lAGC+ z(B^XVJ{?;Bmy)f~<~&@chUv2f{pdEl-{}NDXz!n@RzL21P4_n+Izx2`>uS>yRftI& zxiNmPBrpHcVe;K*U<|vq{SH7QyzYIRmpJp7R3bBNMie)}S^Yfrs}?x?i`CPCxBvwF z&>Z!dKmq=#XmeoRWwG_#^$X=H^%#eyo(v?FqU+JZDD8L(VkWiq6O%|#s>%=ZfTXCRWHXM}$5*&|4WK!`v&o-dSU=XkmGy}5LX zOL^IZbV!S0rCxvNfR67_CKp<9-d8god^WlXLiDrDB+v^@e)|7q^qe>`PfpG5U@Ri% zvV8bfIKf_Au=xR97v*pZ~!zLc--$QOQ6wwVl+Uv@^5NUwxszZ}g+U zq`KeDA+T~F18zP_|1Xu0W0oO2>-w_&^4_!+2j+Gv703VnwWpQ6>VFBp11ILoAB6!A z3&7MatMhI>_%TrNWjp}f8pZhUBT_t2|FLrQ(*l_9G@;e24eItwO6B{78&|2@p9?F% zDRT9$dqnEjlp!OKfXDLhCqE?vwowMw|3~SPhiY95gMde2j+J=`2sHo!u!&tDt+4Zt zF$EL{6_fx5HEl3p)#@#?LVAoKi~C>J863R$7ZLmxS#4^}!4Fpo%`Mm$Z;j@sDjLg{ zzQ$3+e&WX4dIqVxea+SzwF1~tCR?T4tGZW{=206bRe>zxye>AalI67~!?*8xZySfV zsmmP>Qg-kx(QX1ypLrUQ95qRPr(UNVY5PxY9!Yj}le}ZvgTG)E`>XWFYsnVHuglBD zYU`T``YpL#?QenP#ujhq`*@#txFSmYiAh!X z@_E=Zmj#Y~l^emZaP6bj&Q<=4B>M^qx!fnDsX|xWqob=Lqkc$lgG+O6nI~+<@g)fa zR|TUY))$AX>PQoQ#M_zwsi+4?rW%;fv40WmPFQ{wqUn4v$&bUhJIp+<`X=*h^+i8j zM#QOO7c8A@`wCKEW{kH*6fcJYwkaAQu9o+UHE2P2JN`OkroOl-GlTU+TCI)#O?lB`Q zSrfAr{T*Uha~1WJ^tscTQS+Cj#F@KnDW7=3cfHTwdUJmCe;8P8;tm_35dXgtUjPRU z58$EbZ0+Uxg>2YW8;z4+Zq`f^!& z3`7jD?fgB3(sB1~F0D?VwCMkMw(YSZ_`dF&;yp0ZfA_a090zQ)lj5V|;OpCXoB0FM zFg3w>xAdzPCBM(-Wqe^gWo!id7HIH@YM!cC^~P~V5_2@yaSp zeJI2Pl?ujD0p9#W3%7U`9OywY#^=vF9iN_rLxuOcUS3(D+zlvZfF zCPg5)vU_ra{?+_5hmnC9zB$_bzUMu)ZM#;qJ)9#|{+Rw5ag#{vS-Fj@e02KA1+U2L zID7>$rqD6FWwlW0t?ffo@$BEK5h(lU;3bal%4*ieyY?|0^o`r1ZnC1RKSO*kfJxKW zW9h_Y(Cqyb)J10BP5 z)@+N7GwCp=wMYLv0ICb%BO(D=$cf^H2pZlpXL_OT zO^Wo6g1XDY%i&x973oHn-!1`|2}w>FA7t%K^6@Z^kv^BX+6Rak5CZE~8A=K{<}OFQ z`c&9;7rt435(iXRZH**Ut9kv3-=svFn-~A8_QS61SnqI#IO3Pi!llG&)~=F_MK6yv z+~96cv^1Ps%%w{`tVe!J_)Izc&Q^To9~2)A(J?DXcO&Wj%WFGSCTq6^qZzd3+DY%Kefm; zDk-tsD`hK0<*%4&@>9{V849Uwis`0ytJv#3{&Da;v8fHw0ah*ky7@yRA-KxmQdMDt z+rxZs)^X{yGB|ox>{LA7L{N=dT0Dt%7f-SACb^1NiCI=>o-}@BG+Kd~7y7OxLGVWk z@P?1`mju>i3LdO&TI?l;;5Y{yhiN=H= zUAKryT3CiM^&^EeN!?`;RCYnDeu{7cpc<~hO$YO!JVHBkbd8l$JK?M%Gyq%vgsulu z#rPy`^lciSQcX-Fo=*dOmLA?Ti0F~Bi=lNfEf|wF_qMN)Ublq)7!&S00JG0>O>3F1QA77}7(c4k``J#)-is+Q<@?)puxv zKWF?brxReqdQ!{JOLCzY_0|F!%AVKtZQx$6XI~D{mPi>Bkxj}{+aS@YfWlN>c4h9h zJ5O>UhnN+SdQ1IdKO7;N7SQCBLY$v(b;>+vH9Hio(N;( zyjF^%pe{HNNJ2ax?d?YuUd(AuestX@3P~Onm7h~i2O3t3DjS$2YlWi8tJ(@*G4Wy5 zkDyHaRS6B0*)s%=oXB?xHI@hB>C72&S@_Y2Si}xp#p@AXbVy;VoW+r>h6Yxh6lWY0 zdIi(ObiBBdoihqu$NdB)SqwK=62fmJzQPbI{~3Yh_gc>4N6^9SGc3>u?!5y>e=vOV zGgirbi)?E74Qs(eE$QSiTxVvj0k*V;tfgnEPH7ESzaTo1$mOW@IGw67Ub>!{Af5WL{&w|%-IeJ++$vs~D;he3UuAXQG8-8k>y{27NLSP&lx!rrk!_)|(m5LOo}`WM zF_}N+Ek(8Qw@jW;O%{BFc0oCjOnNo@Yrs1aBCg_}5Iv9tQQrF^G#HqO3wQprpN6lu zay*Z}Qh8nXeA2r$&*MI_kSvRC6>isnWmP-`ugC5v0*eJG%N83@O-`{?( zKznxeZ6augCEaQOR+&E4?)MSe(}uvixH?Yfl7?NC3T??B*6<)8m;=N@);V5kC^JwK z&6s0Qt~FFcm*)@LJ&+8{G++(u9g=S1Yga}&eohLzg-KM)M04%PZa zTrEq?J>@qKtWZ~JA=$TFBV%V!=vFG7qcuiI5e^R z#r3+-x{wLm_ zoS(kpDAzj-Fq(MY<_pu;nPi5Ri+)TME0=X8rT0?&z=UcTV23A4<_mIC$qyIhqjrD} znc7iv)Vh>YV55);z3GiI)4$X%>e}5xk0_Jj<1_u3P;N$6?Bq2xw5uN}j-tLYuuHnh z^LiS?;DtP`am4eN%25BSa-vWPHut<6^hOzOqRRhbp@u;4oeoMD^Acj?1JB9 zemGAK9Me9pk57jCO>1Y{)`CA05KEO-IJwk%&hQbXZd#^KhVhbL=to}xC%aN%F;REP&dS0G5Swz$PHnXJE zp!Q&01o-j{$}MVU4$ZNqwcM~$-&$e6E^Mbsm?IyY9ZfIcwlkO{Gmi_Uv?QmJqL0|8!k62c>LUruvH(lk&bmS-*UK~0_CjBmVi@aA-X5|9 z1Y!bEDBN$ifKPTnbYMuXjM3Id$d>y&W_avx#*5rogXphv-8&iWVni5zSO{$fs| zcoHmc#JG{nbW6Cl%4#j4njv>r!n*bt4N%GHscubO>4K71=0*n1zY;6h0NKHh0B*>^ ziv|u|lB`%)O<=Rd*RdQeuYX;?@{Uv`FWcC5X6!e<<=613-(zK^s_zMKVzS_uhN)F}p0CJ;AU{nz z|8$v(J!SLMzt+BzaCKg$H9Ce*5#VZ|=Q*q3XFO;EMamH(&{bv?ujudXUe?%5U8?8H z1pJ#s+-!r@_YnQB2=K!7#qURvKYmlIfXEz-E;t|KIM!MDtjHSI=@1qcc0sGFsCoz= zqo8|Ws*nn#Ar;!zr@l@~dxE~JcmRFa*+UCUw^f_+Li}9M`@=|sCp_TE_SLz0=CK1mqxaD;(93&+RxechW>-gZ3jY`BL@ICu$MmdMli!(R4>f0(< zw@Tq{)}N{wD_+*M^DRx}q`8-vwGbG2(P3xF8pA)aSoZ~#5)%) zD+t~xesr1@JIGbQx1VJ=-4yV z`{%J3h-x}7b@e;Q+q`Uj`c|H}%j!FY|G1bPgFhX<#HjJyyNJJ=V7FNZ8o5ba6H zJXW>UwF6BFFyV7kDnl9A5ySAO+qQtEy+H^OP3NGvXjSO73kwHx*(I<~*3O}Pe75Zn zf?MzJ91_lB5ZqYrp-S*$#ih#(AftALRK8+1!q_uZRsjDEAStSsqB;6miP0`?Q3Bk*6F`Z5mOhKJ1{g?98?5@<#b+Zjt? zItQ_rkb=b_SdQ(^P^nfK4(vvsyo}JS=v+%+8wOW`TTXGw=mBwb1~s5_&>^JBXD3X6 zdE?2TEkDP`5tZmN{L$NX?z)U1=Ff{lU5s_}xZ2&)V#1kq5_ys7L8(b=??KWzdCF|q zTJo75&pGn3CyN9im+mDHT+|W>+b4H%>1b^8{6gbA7G=4-Us~mL(!QIiJjq<($<+E3 zbc}2D4I0EK126ESh&uVXCtK3y>Jhcl&hrd3dZu3%eZD<$pUEjI49u(Kd;r1b`d2SX zS*07Su#9-9eL}&o(mjyp3jLbZiiFSmg_VHY!iz>6nFq6~G=VR0Lx9(;0%Q&HmR?UN4d?2nQG+4GvH%A!fmAU@JIIB0V}FILuC2a(3EBB8{EG}NjS;Td{Dd<=zECWBj8u)J2C+^5I z?du>K_>7O=BhNMPvaqBK?h@|ooeC6H6pD>p_F+RxpM9j`NXmmv3p;{IR7r~7k_c6Q zU?+oSMn?C^ESY1;UCyLhfzFB;(t8qd;{4WO>aFoM>7WD zI5+)rzI_A^HA&q-j)$A`FYWphwNjp_h$kQamda5Q&rfU5p+HI%m48#>ggPwu1#=`o z@&oQOq)cDF%Pr`Xx+BLJs6=S}2Q8Svv+dHoocfSXl>)S@2;8n_;PLX8rc*}4Bu-S^ zJ^VYKsL;6o%^M!>Xj`NY^R!}X=DnSWR3jb7k{X3AN)kB46F*}OPA0QSkN8(=&;JVr zWE@e3=Kc}YF+kXmSE4e_M$%BPzp(&o)KUacn z0r{{3Q|vA-sY{#Xk^loxPhXN9D5wfD=rq3CVtM0cOiTZoCk>N1Rc&n_(nL4kET_t{ws&<~W zS~#6=g}C}f=T<$}z~Q|54^S~uL#1#x{)f>K*H~H2s9A>3ED);Npt{L(F~Rl&Vrmwi zg9VX%O-1`mF+kYJ-i?zT$WkKR>JyAij|usO>%++&hO~SozAX;CN9xo$_$#Xe77!J^ zb{jtalaToks%awJUeV5`c1&|#aFkttco*rn`@0(;|MH8eyF}w0>mYhmOYf0>>K=Yn z!<6j~d^(5Q8ZelOZW~(U+e3wj7-$QbmZy%?nZW2hqu=l>om0fx zdK_d%92+r)1rLNph(E>QXwrEuzS}li%nAhfY4<}r=Fig5B+tJY<^uRW6Fb0?+v;Nc zkDo?wji{y*Lp=RP)iZMOA~xZ9y^Tx`^?rP=(>AB@ryp+%wgOQ7nu-}E{U5p$e>jjY zIJ%wkM5$>U@jVIKfZdsah$OZE{j8u@q0!=38q0Mrsn$>HUHS9!04I;>01+K&_OF)~ z*Z#eL4)xXm4k((~|MJpK3Vb)0bs_nYOWYrBs;Yq}6ze3-SpRol3V1BNoB00|iA4Vz zaxP@$9<00$jOF!wlh@w#(b4l6l05z38{{pgz~!jr7Vp>QAZt|iNw1f`u)Ob-RBDa8 zWHDu`Z|e^RdBY)VB0l`OEvcE-q*p-Ip?==$O&|kWksv6%zYN#-Q2W9t>4`yHI6 zn!3Gbwv2g$imzcD(qVWCgi|B}z=n|SJwn%2#Uw#<<>9>^(INvAC`9{X#pf6_3!AP_ z-%#PBn_QCcFpMUx7g0ZygdDfGW$|$NRI=xh67gFr+=Cif=%*|;uuYytHEzQpv1a$x zL3YqCD3&~vOchb$VrUd;XJ^Sao#QTf#VTnN%y|%7ooAVnF(p4n##88weULLJm<0o1 zY-QZSHGg)*<2z=3rtRtdn*$Ph>rZ{+gXL=39+ga#r%&yzwb)guoePPvZOU*9E%{vQ zf9=kvnVZRz(&9z$J6c3DmT>RmCqoJ-+l%O}@j|qrZPtLT_#U?;bl#2oGblEx?2&y> zra|uAeEjfJ1f?kWxe}f(+o`G9XseZ%jAlV+_SfhweW?QcNLBryC8kLUSJfPd)M>c{PwA{ zk}<0}^)&!BuTO-Z2hW^MO$1*#x8lq>r+O>+uTOLkh(3hQf+nY;+rV1Dh46BDh_vjw z+fOJr3yy92wiVOP{Y@63pt)#;OL82Ky1l#teYu> z<`8%V64}eZEhdj%THA2{VeEmuP(*rn)3P$!m?b!&NuzjkBWV=pr)fJMx4+D!b?_)+ zfdp$`F?iVuw!(Q->qj2{n%uF^qU9E5pHjzENMYjC9gV;%D|p3lI6~c0+KL=&fTZHt zP4+=S7nwS713~K%k{n*|w%(%RLgOoe2cw0uv<6KFmp`ANBIUP48b41BBb8h;s-R%F zMAG*k#7>#kf1G)gYLi9cLWy0EpdWeVog@?PFIPE?bw(QTB!ruK2e_YX1_>!!=Djek zpdFm8jB2Ge_?2k+f~6%6%Or;8B-)_K={-_tVu>3PFq*d$Zh;KhKRbUI<))6XKR zF1}ZgDQKRQPbn_UdcjZJQbEQkuOuL_4MqypbXGG9(NFohLFt^)AH{7tnRg~1MSC&} z-KQT`*fc+zKC4wAptRG?f)@w}5RyS5+NG?Yb-?+LWu7<|S2|W0lECd*Dk@z2I~{@L zFj;71jM0&hr@=-gk5FxP=u?wk8YUpu&^XA3!0U^wij^23(?!-o!!bZui8e|_U1D~a z<@!V_qlKcY#BOLoUe-uI5tZjz&4)J^g7#V`q}-gD&?dXKM-Eo#C2cOE#m1eOESIAVs3b496?) z z5e3cS{Xj%J9#v)GyG@{-OmO2-geLa}D(bFHFa9C83KRRVx``oG)g>H#Y#M_$YPIa> zW_}ScX};6ZcUz5&hqg$K`-an4eJUf@J=!$6qiG6}t-uT`pa`QH!JQuTTz-ZAoEq=s z1MAQHED5;q;y2GF7_}d1Yo%mds?%~f(`w3sA1wV%^9qX5h;#bL-lyogbr3E6L@7R1 z$V;cODe#((9}?Mz$|rcx-h!Dza~?dfjZEf~Ofdk3v~4RZq5+aVOH2hyg)OuMqO_9_ zaR!q53WhShee$4e3-ZXP(aDo+k(MKNH?f*}`F%3jn>9nSIV^MHVB5wJ-c2^`{OE|p zTw}PXOp|#Qm!oFnv5OlSyQ02qR@tgTq6o%l)Ufaj9sLjK?lyCef*3?1+g&AgchZo) z8#$iSjvLEZaf#JHbUujP+NK)pfr&PC7Kvl?$6?bG=<8G`0#f?6w(l@@w5XRM=HFs? zpXlWrS1^{emaw2w_85@9{`7)&Vh$fhmzs1nHj|GoH$$K$H$+Hr8( zNtk77eSDqv5-MmtkW)>I5=#&HVI!AD;2BiXc0#vOK?q`%I8<;;1WPS8M!vg>FNspM z`6nb$*2Q7ijE1o6l=kIkpmXufh=(sY!fbrdWNqa`w&$aUKwV)R-+=Y+wV1T@TjoSf zBbZ{4XpIiGIe)R-E*Tl!K)vzCPVQsV4!a2&2+IyFeDeY;%DJ7V*HM;VM)Fo=vqwxO z_GZ9OQa6^i&_L5%tDxGlx`BNJon0H9fl%I7Uf)#UmMXnol&(1s!SS=8GW)HUMEzDQ zm4K!)Z|2mcPhXBkR8JF7OhZ7902f-!lPRxE=smV5HLSoy7pb8c{3co;Kz$rhLa@&2 za&#pc7Efk{h6}wadu?dU>^*BszfD$9DF%dRMkgq1AhO2BiM>_RA-PM3P;F@fr?hw% zD<~sY`4y`fUM%Ja9OG;u1R3}G_uMaOPO?_C)Kxdi#MZZ)@{;#j2)%KJ0+XKU3Qv;a4H-iDUQGWbbzsS&-N1 za{~l&a-mnP(r9J7(cSon#*!b*jE4K{1OkT=Uc~%R+~X)AV5za}DBN5Buhox|?%E^Q z+zGmxSJ~2ju_cWzVV8#~6!FnxAv)zNTOq{?u+j?^ETdJ(qv1taG5Q@qnaQ%Gdgu~5 zDa`+az4r=>s_DW7QB)KVP>>u%KvGLaGA%(sP@u^T2sSw>&?rbYkhA0*C4;m?k)%y- zvPeb{$qJI2OrL7;`~Lqt=giH_&CERK4#d5ycGXI?R;~9vE+j-ezfsXT@xx@8s0!H? zaqJ~!a&t-w;tvWm!ScN5pWFGNXP;1&Aw~N$YmIMC47R@&GqKW#o<4kKrX^5scXsGy!TYGo_FN=z;i3@?4k{iTUx?V^|rY$-jgts1MkEC}gfNua2t3yJ-iDgKH| z1ap+&AcxJbHZ$ORbcDNn{6^R`8wzj*>890_Yu zeOD3x2K!5YTIs+kF&{m3%gBx9!=^efMy3Jz!Y{}FtI$3q7N++q=2E^msa6jT?FCT? zqkkz)0YC$(m)K@X#7AXc{I1~6eBrzt>OMUeEFyfdnKHI;^IZ|wZ%gl&va>f94dh8V zAe0I7D^6V7BH_n`6%iQH@eI&CP@$hoKX;vqJpWEs!A@H)Wd(0MEJE(?TvH`smx4jk zmm0C5zHD)6(Vjvk+5?%pfDAM2oO?03#U(7=6O{9d#OF}{J6DX(o!Amy z`$*D}K3O_d&KhOYWwrFr@}n?`HXb}nS%Lb^i9QRdy?a3gzgJcsQGBp+Df6MqZs*7> zzH@LuVB5nqhK^Nx!3aQgMGpHo47Rj$-HaUe1}=Mj%go_vyjw(-w% zq3|2KJ?b{Dnpe*Gre)bwtN*pR1{w6LztGT0aA~UAD;NSWQV>a?xn2k%|JlvEj!AX{ z%W|x3*K#Vl>|&Fy5YNXAngE#b3&L8=0?buL`8l0Vwtrgy!HM%4_Q}}Cx=(R#hLgFl z^v)|`Q-RL!f_xoKi6B(RUi#h;g$|W{ebXmmSCDF@JZxIJZ~%Awm{>Z@ z#^IH;M4x~udh4lBil_Q++-r==*gFWF{KGKA*prznV{|gjyItp6Ctzt|vO#F8PkEQ6 zgrdd5q{%CexjuZp7Q2|DeN6^vr@ZL{IWqk`FFwl!sIJJ;0Zl}dr*MYO3$>;1MP9?3 zpD~S!AlJ*tQSV);R>tOg8yj(#e)=`LWP0EtU--W%i2So|kM?igFR35= zVvAVFbJ>;+t5fisT&z0a(d^yL+~ld3iD$KVt9VBVEmW$bOZLGz@TBF&oZY4G^^Q5L zx(QBYBLfeFD-S3t`}u#{me(@6d|ma7z+yP~+F*QJJ@{xTguKFj=jGMPA2U=xNTOT)cVDQbfvK6P{_c2>j;zMdV+hdDZ&T|>Ufj8 zEFtEGdG$`Q5|3|m4|Y2Ic5gB|kh5ebit6dJfDP(?s#9;>&yEtfz!Q@j6-d!)G;gN* zF~8rJg8L>ynb7il_*I47oXn^MEy_!;Wi0ugDnkRQ*kc*S=rrBp)F?ND4CERFCVmnM z)2R0=msmUUlH+#m-$SQsAn&<8FXue;DD?2_Ya8gaDnB3fW^-Q;QdW5>mt;Q4@v*Ks z=f&00_0lGG;c^O0uH>{^8vhuxUj1~RybDwwa5jxQmI|T5)2gEjsWgtXbc@~klVdbh znNQ6pI<6KKm*chc-8a2JxzmhlOu3+l>-7R-%%dM;7yl4SEPf^apjx)ly|jYlyFay% z@u@F1UXwH!8%hb+$;l85Vs>c+DkWG^yQ|Rmny2WaUHtx!-ZMcW242Rv}3e z2V}S~qcab8Lr5{Inp}3#6x8rGF>r-xD}-alQLz5J4i@w$!3j1ukg;(3**8dX(sGr7gKFU3m=&S5b>r>O5INL$i% z4sxr^bflLF7ZjCT$q_i0H5_54$W36$zCy>C$+k8Q9ZfhZPi0n4wMhX$C}|6Y;x9b@ z^1A=6bJfH~l-zte)f{a+H(*NEA^jHl>I%CcJghi$+Y@6f@PVfPxQ_^8V-lPDLiXw$ zF;%k85LJUy)gHV*^8=H1jO-J!@Zh2L>u3Y+$ww`dB&YzgUQL_qm-~%&ps2tKwbiPM zbe&e)&=1lCT zLisH!o8u(Y!&y8j2D=XQV4q)k)BjJR0UXWhL^j^(47^`N57V8$WG9XVN4P8ps_2dz zu*?vO#j?gDn)=v%d2QnBQiwSan(00)FMh++jQ%={e5y?JAZ%S;NU|=Kgiv>$xnb$m z`DXy;LgCEp^EgUhVWtP<32pxt?z9nW>Zm#r<3)9n4~~Q3*PRC2!jqrOX6jR?lEP*K z?l;gHy4mJDdaxUG=VjyAggM=fFilOGZ{7gc5^~)!?py;}=0Iy9PdJ%^S_<_=?BjQW z2TM+Un9}O6hFeZs;r>~>Q;+!wukCUL%9gsn6i{~)g((HSD!Kz#*qTzTP)p@RPgWE% z8xxnka!8fGq`x-9#kFk*Q6yv2#UPpt+60Sui1q@aB&rY2ruWl*Ss~ zb;N1{%LBO`>K87jD@Pb+e^~fTL=gxb233>W2AR9Rth=4%1~J{-%S37R4uaF!K1R;+ zT+05J&`_B>&=ngP`f}zq_xr9-O&V&vWNq}j9qvkhW_e0LWX5W^B@q9kS?a?4J?4*L z*-5I=gg55XefaiYN4V989AB~tX#SwMdr@cmtcPWaKW*%*j~zPp%(M@^GxbYiCwYs5 zp>}pVE%!~qqOhR*^wzRv#(!PR2-l9eY;(&s@#fXl%b(x#=lg8*ar|^kY8>RG-b}u z4vC<8KJYNOh%_3tzA@dXrWG|j-+u>Bc zMkmmK&3L9!3Tsnk{sZ5CefS!B1Uj5SOHbL!dP4&h_nISao!7BpE5E}w4s^)h2R&yJ z?w~yf0GHduJ^sOVEM0=G9W!l*o=GJ!y8hoU4B!78X>xc{hnv<*S_lvH-EQ7J`KSv> zkwDL`%ObRQn#s?W+dyB}%9DGqbj~Hh3w+cNyB-Djz$2RT50o z==utUsW@mvCL@_<@~j+(xvw3s0sSTNQJxJCH1%5DF+CYy0UECC!Ta1- z{=2(sl#2$mFqRd88JqIld$(gc?R^OC=wKi}o>rwdr~mJvLBIGsOFiz(O62@*8PxX} ze46iZpN`K?3Us8z>EJ=rXWWO4@1I|Tmh;I*@4BII_xk@H=}#Lhk#7Ndm)S=!+W1%f z$)PE(0=IM0+~hIq!s2)#2__!P%bTlW%1ckn?6`C^LhhF%1&G2r9&8HXs|iBosYzL!Hb@t z_kO_fr%!px6ZiN}x4NPC7#On~aET?wEaEw_08G6?jQDozz%_4W|0Cm3 zqqX{j-=5Qa%c!_u6y zeqaAAJHPJ7r_!(gJIsxvD2mJZruFsRabdBjEgK5Uss-3}s&f6d)Q9+H3!jCNlf7VT zlk9c1ro%X3PS0cNwe^bc1dRiJfB>o+2t|Av4uX_U&4>knq@0N=G z?beRR0C)xH9!#nscAA72|9t``6Ne3`4n}U83#yJU({qXa7t=i>egf%a(r`Tg#_FT< zYydkwiKVXGx1CA7=T~hDiO89`_WhIDH-eIiC>nIUXZ&fntbOtPI!6ze+MCS|GPvY) z&3gfSQyRPKC2vsY%X8Y9Z~C75l{`96@NEdd&ySMDeUVP?$VpgHEK<2w9KGrRiW^&i z2n~XG+licdaFy|53PyxUf+kOg{sOlE*QNkRpl;ja%i&~}N3mW$5$F7tZTRr9ODxA< zF@(hDETS86Pr3%`u?PGKlX`EPhwuGS5nm4N_D!6MY)oROOvCmUwJ-X*wm1EXtd{O- zpFmmUYD@d|ccvOVW1C}+7DHNJ#?=a3ravLEoSeHiKok(;mv>WWq5FsN=)LSCb@#k` z%P5sgumwPHXFB0M3cZx;m4s0>ocE&_pqAWzymLI4z>cr(!g>n@qd1j&{b5|(MYIno z_311mHjM?K%I+z`-tH!+lAmaa+%_IfS*tW}V<2xbKpNG@k{NLVObJi&iO<{)%r9ld zVw3u0miZZVf5QxUn47M8TvXHWDfFaG0Q$gR%)?Ha24*|IKvBelEX(F+=WYm-2nBiY zXfBS}E#q}`hBqgt2bXfR+S1EHmH6P)0xgM?>sM%ROi*FCxC!I7%;fGxG2N!QnIh4A ztppHl^}z=BK}Gf%@o8^=qHxP!EDpVc@2~Zn_FXs{T7Q+gnLOmYg3Wb2F|I%_6@N} zrq=LKt}&UoM6l5NjFi0X{tLO%HMdkN@ch>|tTh|nyvLG`9F(m!ep9D%ls;m+7SU$& zgiGA;_q~4n>cd6)H0}v*NTqwPWPuBg8AZ8_ov@-Ub3V{WO z8L;bGTJk@D5?wi+shmZ`fj&(08W-CDIWjImONSJubjGlPQ>YmEg53?G8uf= z*qMZq8Hn{3(ql(Ig0||nl_t+;&U3`&ArS}ep3k~*p5_J-_x1M2Jfonb`8-s<+hU2^ z*=6hqMU!jZtie=a5`(AvuXEC`0hRCtYNr{8?Bv7KliWykr!CUBl@<2(DBNNJSeL4! zYMPFiXcAuEfnfGJ{h~9ybJIA(BoZTu_7_Xbk%GqnLgtU8l30TPseYqZgL&cO;c8m+ z&t%`MX%FT~7m*uc+ud@pKHwp+>FGibUX0@{HCLfx95RFC^-}bp1|mssrT?K_Y>Lvs zypLZrjW0nhyFnB{AFVNAVejk(*I)o^B|A)&EBe8D)we(v=99n{m8dMua${E_2a15?;U!f0Njzh*b6C4%F$kXuDZbQnvAe{i#gA z=|Lp%y~pk3Z5-LwQv;tHE8yqthTUnqxSXrCS+9@=yeyTo%=rHOXLVXHd|{vW=X~pvD9zPmNgyDRveTqVf^Dn z#%$s-v@TqDFBE(AVEn{%|E_F-C^;9)SDxTvew@D+tRBy$h@$XiFMxb;bnUyxinj{7 zG{>!G%xX`rC&*c5aw(rBp_P~2%C1YF!u+1+p+>P;8uwh1rL&DY14`ktA_LoubYdFk z-1oa4{DlcQD-i&M2mmMHBT*yE@1EpMd*i=wKQ(ZhEIu3di>4=AP0dpCBPO_cF%Yqm z1Bkmtjov3W@E9i;cW|+xEEo?{1a2^Zi66xFXD|H|LD0Hb08FKujl1hOyWE{SzM#2Z z`dYd-c5LrV*@+`(+CLBd+lMbL%Xr%94|?_8Hr--hugM&pO)f=VfZbU6(HhF%AcFLG z3hrC=;6?M_5N~VGsk;{SXqU)$?=_3hPT<;ckLOy`1HjI#0;U?d6&VVUp1AM=@o!Mc z%u*eP@ArRzZ{hu~7o7tC{Tqh~S~1{%{y%u@|3AZ9AMIRcF!k69Ha+<{V1heznYPjU z>#!D9{t*FJp?}4|eG(5@QK1L~obEre`s5$cNCP+c=uVZ1Sq%So$Q9s5!Ck$-?~G)? z|2-a@IXRmFgQ_P8`F&0neH(S-&zyYMEoP(yaN&o0?NA?J^z_6I0np(hWyan)!6uI# zo*~mcf78sOyonk|HeUc(r7Lp{?|8iSB5@ng>I2&L^1zWK2eRG+#@k_BjvsJhH7E&7 zSOoRQ?)N3-ctaEct{DCShac^9Dli_MJ`~%T;$feU#(w^ z^cl{*t$mVtai?pdSz!$FdZm!D?zffadRn&ng!yz=y5BZGnf$Op(zH%eT7G5}0l5jF zf#C9dC4tv}U8(+l(KE5|y^{NniIf$@t(^Lqlj%wH0wV&pAmREN?;YVR_#IGdsYS&g zdW;P+F3vvlGaha5+!a6k29}t{XNJZHU`{sNi%dD6E|B09ZOZ8@n45EMkW+ReIJG-D zNvG+Y2d$meK&1VUlTTYO_KQNw3pI{t<)DC@z2}U+)uLt>K2+N{tz5tZyjB2M_J1~6 zvKBRhyF2^VT#)^g~kWIP=bHI#?;TiZvQj9vXp+ahN8KC zhPmdR%UKVW*xdbWY<}EF4W*GtJ&CXnz0m%oAAdyn^^L49BQ{f$W9`Xg%HQ~^=q(rBX5xB37(v(AnGM1UgD11a7$xPn5ZJVVAHC-fk`>-O2k-oOhO!{0s!S!`T1306meUXSe#S~Kxtt`69e z|86!b0Bek##;JF@_ppOix=oX}f{qK~Xqu=TZ7qVAUN&)K+lm{Pt&}`f4#5Cn=AGj1JkAiu=XYaOCy8@ON+|u(f3R!b z`W$(wh+c|log#Qs+}nPNmhLirg?XQiQc=&c>g&w7eGwSHU*yY(Cb5hqtaS*n5U1@u5VLu zzO=jKbDu)$$`*m;vON?9u8azX+;(wLlLoz$GuC`v3evD^<$PaQ3|Xj^ zgcw#Aeq;EYl;!t6ke3Pc>M3!jP>v>bRPip*ob3$hp8@*D*4fkh%}x> z%Djj|RqNQ)yK-b<*;kZhy7>wx^VKN=Jad%pc9?_WP8xihUShABbK zu1}-bs8Zd*hhiv2vUDYvzD!&?7LuFO@su|m9)+%CmwS>ZD#1Bd1+kyX)^J2uRQ+4t z#q==7NM}cxmzHak#V_|nyt9Jw-WKJ1lB0K3A!$lztHF8p!j(^FzuEc^-=3)r>!1vu zplm?8Q`NU-6zi8|w|Q6|3(XVw_h-F`z|i>#_GHHdYHCMPi44l#l@%@cV`B*Z-F?J% z%@%H|sTSvZbmA6*@&z)04W8kzPzt6}@cl%+PZv{Yehb@Gt7F-*UpCM#c2?rkn{;`( z+zQs<0#>@{Ss$`o5oy(Ojmfg16~vX2R4ShT*7`m}r^)aFTF>rh>omgg`Qh(N>iY-~GN;kiLu4wmjqhR{yEl z%HU;2p&hTw1#0f-?6|0C<}4LzmGa@C!3Jk%_VimxCMaP^wPdRfuZ$+y8YBBl7CzD%@^-&1-AAO zxIm#-nyRv8$8G(CXl23?TMmwE57X?f| zvlo|w_N~v#%DPd-^sk(4(L_D3cIzpf0+w3oclxh*e>L|-@V)v}KS~fjxkMn? zO;GolcueiiM9OG4pEN^co0M?!rI`V%$E*Dn>A5~(0gT~3uxu4)x&;_C*G+BcL5KrZ z?b=udIdS-|_pj1j?_$GSnN07?g6^Q7nBI4TA`R8I8_W6YWVzClmJTG_`- z))!AJJ-2E0ZiNDgUDEEoff=}(mcp#ys2V$=hG_^ag&LYUmIy0FAfJYwU!)p4Lm+Nm zE|3{%fv}z>Ek_+)O*HKdv{a2V3?;2U=Qtsmtt0R&$ zg=>dVhOatS2L^xMDnj!}1_cKgNmV%D7vtQbMHR6{x_pM%sz z66N|UtcDTdyR=31+OUpa@Ph>H2zfrCKEB<&CB{|v8~jRiknf5aA96-m%qp?V31SUn zmkCmD!D;)I%Te54_g~3q?Hf*fjl9)VEEXsBQ#}9DeT?(TAcfkQPnB={&v>(wq{#1- zqk7Dxd46?wpua;p(F89Lrz@{rU_u?Q%ydjxBg{tfx`LgAkRYHF{X#a{|3MZ#e3a#Q zfaQ4Od*`-HEjQ$Uc~ps-It|zQ{S5X&1Ca&7Dc%A>@JZm$v;+tU2<)Q%j7>;DkQu-O zADueM=_zfh-`y_D`29}C(?_^y<6wQPDzH!X!|q&J&g3?sxF3X+fZzrF%~XFGkLr)L zI|-hLk;wC1IU4Y}jV*23OrmIMdYPhVsF&kzu3 zHW!wokisKrfz!)=#>$S+Z+kV+#;rOyUmuxgwVM>lcK;BF5{zrhYiq~8W(oayt!P+= ze;m=&+A37~0I{F8+V1AFOLM5tPj4|o@z?r+ZLofIV{C5?K{ zW8(72;{LA75o9Hl6WW1p8{Spz-5D>X^qbdva=8xd0VK5zj7dXHZDnoEe_0XXMKubA`uH(9+}_?^O--#FH4^PVz+3)DCTXE0p4cNR>Z$!P zM~k=5cC2v@_KUbS`%ASLS49fy3B__$G#AtH{o&iuOBeKGDDs+1eT%<#e48yV?LjPirsnqBF)ES58Y z_NLs0!_BMqeb^^%KTtWZQIp7mK?4JW461DJcW2gGr!}V=WOI#JQCW7}3-N z=jZ1~C)5+n^kXZ$pFI;jP@X+H@`A8+aYT11Wcx-Wb;3H76L0bH#ly`UZ5H8oE0qJw zQ7bG%r08r8&hYq^jC*=I<}w^_d7TXoMO^f4!?Lm&X?Wb?cw=H*ivrVh4B+t2_|dqo zt}`xP&w&jBVvCor$E!!|Bx%zsu0K$-=MZa0D`Ln3pc8P~=E>_Y9z>4{2mi$6WOqE6 z9?i?1E(*@AOwA{~nCpdU-=9kQ-G3!SLz1M>L;9qen2zDDC};S{ifO#z?@ySYDrs^U z)?7>QDMm;H?D2H&Ga!~LsYA$QXE{u6N1OCuDqpXRo4*6Mz0c~s)^`PMd+=LK$p4<3 z%v5cvQ$b(VttByO+7FI% zT}xsFHKoev$coAhZ{$l`yj>AyWO!ypmu@z?e!c8*@K!id#L5%%Fzx(Xhwd)gva}4l zh3l5<>Y|nHjC7v!wyyLu0{@CQZ(r~9gs%Z}#`F~P6H_U53T$&#S!{+8b*cV)&B~UdF7KiOyL)?;veNw(C0W&tT$d&{M8x*OEto|af7IV5=^_InQ_aN0;7<=XSb)!uWTtUTlBnbg zmRT$gqk5k<11H)&%B$4zuyCtO^B)CKkMoxqJ%MRUitnv2K-c_?+sA$sAhp3t`=w5+wn!~Poo zIDh|5zcL`^X;7~H@mmKPb0cqB7Zw&KyTnV_Do|BbRrf7^>}<|=<+{|yIf%2<_o6oo z7+EXQNx#akgtSr2o3|;k#vlLqE{CNGul*V^BNy?+mR|@Xh}2QQu0XC=F?7X+jZ97? zz0?;;QgR?7DRQ0R1Ty5viB+FrDtzW!o>d}Ul*+!t{vDF*FWhC!sDa*GmcTjvKJ z>f!xM*7VGCOYyYqj;~1GCms!$b)+|wTuf_2a_TcO58=0lJd*B~yVeFh3GHtJW#H@a z-pRHC)gS!+xAakOhw^g5E$q8#oCe3mi3#7YC#4)Tx>MZoo%Hqbf4z8=zdvW4y^$2u zmWPnRX!;QNWZtY%@{z{PseIG$_(O0$rh>G<@P0E7eZKs|htbB*rIRLNn>3jMf1N-~ zCmKC<(o8h5b~|p?z22qa_)wKE`sm91mC zK>Y36WG5HNrw-QF8mAcv1r$$3GNubX1+T5zKeqZh8+_99o}lcn8?q=z0ZN)*UF|Hl z704!i53ubF(_Xm6rX4J2(+LQ0?dp~GXTu%6_P19-Ox#e)vfs)6kBU)tpus(?()_w# zJkbzvnl3jAB0@j5LlK+Ip}sN`E`nVZ89P<4+Jh^A$cS#k(qnmYq7X z;@p>X2u<%1Bcd+M}4uv+GJwk)S+X`0d9$>~=pZY=EL z^*{O;p>2s^Ir+xV67PE?g&sFL{EZ@q9&A||Kl*tZmd@zFM;CWfh-Q4>SADru8`0$b zen(%TW0721l+@;QG6)d4HthNW(lGJ}FN2eH>|nU>;jC0s%DnwAQ+p)|@#nkarXo3} zni*c3oo#JxRrVvvlG@7$JHK{+e+wPS>*e~_t=54(atY$kXnZLDZq@-GcQ=jtdTgEe z^4;3axV@Xun%J`>v);*>F;|p)z`nA!*8YNlf#E?z#Oms5;ykz_^q?V+UVjw z`2F+8Kf`XEnjH`ThX?Ar1VxH9!n8_9o;1rDIIuX1Xk4D~LXC&{AUR@}ZCo>q!(**I zJw1JWeZ9RK3Y*kRW;SNqIWIp@kM$21yUR-ASqkouwahz1)LhwTzA zhfrLpE9zOxZK2Z;gc*A5E_~3L77AH;DDHTC3YyGu62p`M!u^Uc234*ivk^d)VTv~qDFn2`QLz0l#r1zR^`{v zzLT-xUR?Od7p-cxSE$M4_v%*)8JRG#EsJg83;-trHZ?uH))L{Um$|yaO)Su6ng;81I9|~(ktV)UB{xbpNfW=^4A?ApcXw-Q zYSiAr&=CMC#9B3)soWad39h5z(=8caniQ`J8ZHZ$D~Kqm-9udPt|L^E*j*6H<`~am zEN_?vAN?AUe6PZ{J|12!Xp&=1Cx8n=h>&T#v8G>*Br~IZ$W8U! z3J+S&HVTq|R}n@jydc@d$|Pac_!`zL&jq@QS}wXX$&0iZMaj%o83!ivy3W^8-+G;6 z3NDr^RkqCRw^;@nyVPE%3#`KF`XL(!gxiDTjg``2CT+$Dog7BYc=lq4u%t(PsOrCG zvB+wiY~YeKe+gw^!)G9GAXkfqBy5<=j0u;yN;&h=WU-YYJVT5T9fOdy zXU16MkNuPC={nhKnFlB*wNz;r>1<|RRbjH4qZ+unsk%THXP;iK;JJ={*1=o7 zA;i+{#)=c1v*A!AS=DB46z70{*_r!ukGVT<|O$J+wqbBg0L@!8K-{AG}w^wd8MQKT{vYPgqk)Y8$gicQvt_atwv!#?SlrrkUPN zM_PwSw>vP(=9G7g4!sGC-IXNX-)a`}RHrHHIdkiMO;~E0c6IEvg^OeOgB8-BP5I(# zPK0n*E8D-ue|`UW!RH-+^+{2T6O-?unLP*5{?TWno)6{{5N(y!ZPu#81g^QZE^B%J z?pk@h3g5*9wyWY?ylBjHO#8ji!Y_>}!ki!N#=JDs2l@ z-5W(Y{0`QRWF|fiiO4sr8FT?37Lv*@XFPl-A+n=?S!2NcP|2in#i@l{z(vsQ_hhHh zDyGSgv9w~(Y_7F4ezSVvRTq${Yh)jrHXZrrQfPk#Z~jL)oQgnP(sbw}-2M4;d&;-` z04D3uoa9+@GTEc0CehglORy89i)?8pbTYA;%i~=Wg{pyHn%)YCnRxSf=~O7_DbT&0 zyPjrX(SN)HH<0T5$@TK#JuS?`hY~8*e&q{ndC#4lcuBgVxGbu2Tm3TTES+qLI?)U=J<{B97tY}^t%V^iX zTL393;kj^WZ1l?N7-vK{@_sT@xLarmKZE2% zbILcuG1f}ZEU1RTN()$byFK39R;Z4xsX8hSGB+=TME| z-RhHSx)pY}z^b*2bu~LV#cL%Z&Eeo%ndqv({x$ET4-P!qC=L$~2bu=6bQ~u?z&^?_ zA9w~?My&%@Y})*9tke{%wQr-ojXNvlD?DHSE_Z=L&~R|Oh!z_E#{0**fr&NP#E(>E z@9Rg@udvOfsj@2ZA>gjRX&b|`x@mvd#op(P&2@Es3~;j)vMJb}@;ShUP2-tnW3NM6 z-r0mb0eKRvd+STs6VrVP`>uv&ZMWV6h~wO{wHlqYM|GKXC21Mz_+~)w_nc>#9$x@aneg?X>=MchC(=i+i(gZDqmyd5ocV^F!2MtN#)L z0T&L9cB_59l1i-457t1Z_S*1qR1I{0hvjHne^wO30{Bc%1{a(Um#2oO(?hR=G`WX7 z^=*#7uSkMGsxp{d8EYE%GV*b@b4hRfcl;m@s(*viXt=@NdJYtKbi(WA6aIAf^KOo{ zOSc3o$*)WB(by#yYAo+`Jwj^4XiEv1b$sHx&+=edCC!(i+NDO+k)7bvz5C)MYHKEk zQ{fs-bsI~8k=4HS6}#~J6%}r~0~IXFUC^T=qcxxPZ}?+`N4mfFFP!wzG}O~h%FU?W zxgEE8G}FV0`?c0onby9_;QMjYvuW3}hryklWpS%6ZE2R2pkEK<)x~qutq~idC52A! zS{U4p`1|mWcy&lr?pd!L|MGWafs$-F%jTA%SMsI-_M0KL` z@Rb4Dl+&XlI6LJbV*DRm0XIC~-w9NaxRQYk_bi=eQ^aMNMTkf;A%r6=4J;kR*P0dn?Eo|ldIObgKvuGq{ zj?MeR@L#j1d;=d{@x_%ClF!xr8uTiR_up~q>gIiFRyJsjSSxkxLibK(_^e+a9zMxz zC6X|dWLd1huO=VuX8wbN&1aFe`AJ071Ss%mZ`D4Ne^-Bvqee)blccL* z^^E5)v^BzagWPCi{3LhIi5mN3(uAiFo}WD1Vow@ZhqgUiRWZqThdMr^Zl;^p@W*RC zS$o_JQObOYIq$0bbDgety}oBR_HWgVXG~&WtoD5X`}^V1=^ouQv!JFnb)MKwQ4CbC z@*;XN?e~S5M>1A+V9(xnFB1N{i6q1Sc%yFDJQQtu)U1~;gK0YE`~~B?2ftu4z*=mn z@9OF3Ej96t#ufWxYiB%Cmy@4&U!ObSiqH&C%_}8OYyHE5H{XDMemW0aFc7`lSLhyH zcI4>9IHKo&Jq_Y-*gr2GdCN3R!ACbjz7w5o*mx_0WH8GAu7u+PCZ&FS6|BFq#Ni^f zjG9P1t6}|==Rv5e7<_cheo-?pm~54*?)c^7MYF=E%qJZ+(B8nyT>rf>9gY}DcrW%6DlD8=$a%^u8C>|g4+g;^y( zq=g%JR$}8>oPe@9eLl@vJZQ16K+UXmw|ApA*Hd5Apbmyn#5(g=HPp^y3RM|EMaZvjH`A_5WhHUE%d~(PuXKO<%XWO~ZkU_HVedaVfm2Y8G`= z8Q*6Z+r?zEFBo#{Xkv9w_byOpcA4 zMsFECc>?R5P{L^BZvJu}O9@|vKrAwju1>iO#{0MG`EbJxFK~_o&D zQVJH~qctae&3p7#|2n%v+)g0QW9Dv=nUvc^)6p(&V-KDfxh3)KKc4IB7NpztUClzc z^p`bU0&c@I)uqSN{cUg4<%!yfWU;FR-`VkYYDWT$L-73wWY~bS!xx?}{O>B?{~!Fv zf;j)jj~{<)@O1O`mTBzC0~n`wy8s3JAmMkX(^OcZ7d7?tBgg5+wEYp4_im1kWy_ZZ zLjGp;Q}It*e%~>SWR|guI79n4#dXgLL5F0@5GVbodU6vK@qhoeLO;9V1CekBm#!O- z^O%JNEA7Cod#8t0$}Y4l;LZ)JQJ(|6$UPf0U0=Qc@X!Q4)5giKkyJ9xpzNG-aH$pI z{JcAH2$ZY~OlpxF#ZKyfOV&d0Q7qQg%E-K6BY|UaVd295mt0Vj$y*-%5!Kq-3d*H< zvhiYx{&$~QSy@?H{?AW>ei7kO`sTJaC1H$TNolF&N2<0DGCu(|sJnwUOBX{o`n%cR z{20itf;F;4i3aTK>{!KKf*Tvx0}xJ7cdd_b_Dq0~{xLzIWDTknLPPXM;DvL96~n{B z<)BJEzC!!_ic|x=bXCP$NKITiti$V8O9u%FiL!J?Be1Gw*|?Pz2WD9@u@Mv9+iiQ! zI`6=R5}!F*m)47xj#B$SEf9ga2?+@rp6*`R6?kxed_>_~?%xX70lVm4T$CpiERDh*dJT(%SGaV5H8u8@QA-#AP9xp%~vD zZ=G~kw54N!*1KGRD>Mv_)ZH*tN(5E!28rjv@09cciTEoPA3tT)xJB&lS}rgJIZgi6 z??W8Qo8ELA)ocnP^og2WQhs+(cH#Iu%h?UQ2^OhPAaSxGb*g zrdwjomgJ~(59Z*CYI;&xCQrLQ@VI>JJy6!m@g*~{>LU}Bk5!PU`l9upPXtRkJTijc zDLk1UOuf`kk3$DDnSV}(RVtN>B=jNdR;Lbzp;S6Jet9F)L;u z+MdDPZY*o?;yN~By0=^J2*OuwPzU0K5C@=d5I8BgWExpbV< zT&6BM=Yf3etOO%_Uo>fCI3D#2LDmr({Ce5si?3YxAVb^467q#6fGA+WLzAO@0-THpS-ud@p+is#@fmly3j>G=j+buXT*+Lw^A_1lXw&pa3{xSVTOhM!Ja1QXtm6Lw-usb(G1~ z$?EhJs>w?-TmM1C$^E)-2i+u98^fu5gHu?g5hxJ%$^DWJCY|~p?Vb5s66hAk>vpS| z(Z`xmDH<^M4KPJbQ8OpVT#_=}P)Z5G1)FloBpvlmA$i3m7X(F38JAK?u{1}VX~t4O z)YPX%QfDerlk_HbU9zeBn$FDg+&|#{a_3im;D-a}obNf`&-=dm>-qbqHT9Q;`O(7s zDA0LYO6^tjViaLf%!47UJOe4+WCAY<57z#jWKEM5{FPndKDdyB~<2>Zqzc#N7pd0+4NAkIBO5njnCE=C!tbCi5AR79SrEFc2EeQ~|Dr=@p7| zV*sI6Z{dWaxS|h!Wx{@7@W&Qw@u>1EvMDG^|tOYQX zO=|mX6lC}ZW#c!|UE1e`p4Wv!;iSIN-n2*MhM&!zcW-}HQc= zq2|B8bBDXx%k_CQgMk74^8j`{ARw;JoW(U+vO*$p_HTO}F|xQNi{}{mKa<0)ZIGzl3Xpwb&kdl|3Kt-(_~6 zv9A0xviMADqPAC)$Xb&B+`b-=dC-Oiq0pW2V5zvw8RIwC$2U1r4%!qK8E#l`uv_kC zmdqhzTf^@KRPkHondnk)Xz*>b?5z>+bgJ@H1Iw>)#3y8jW6E@8e?w3jz8D&syx1Sj zirB#*o(?1&G}g!>FL-s+foAp)*8aw!vS0@LXp$~$!$K3`MGAm^*I=B|fuBv^e<|(V z!sE*2@^E~i2JMnVuIK;1xQj6pKqzo%)PLSKIXO-WkJqxWkc zEBm?&u4ap{ysA#FIDMp&)O_`EK|EOJtqIcqR%^8rriWKeYph2rCCHl5SzRSwOLrT* z6p8HZLSK`)2$ReZgRVd+o1vXdv8`1`cAQuX|3;VLrz64!5cK@t zUdFcxoY}AzxP6V|P5DmjDtwBxQP{vJF*dfA;;*L%1+>CpsMbaFUg@g%M53c1LR!iO za-H?B@jbAM(`SvHfs2Bol*wb!Gfr~38xkC@(5`^BEKu&U-^Ja1Hep_?K|DZ%aQ1Ic zJ7?=Om5y2d9I=-dqAZ~V686p{Ca_3pr0mfm#lfnWEClBzIoYm%-ygL}1KbAGAEUxO zubW&Ze5rMDf2ix8A1@p6#PWfG9$}0$achiz;5=}8^+-{bvFRxIJ_6l_3l0aJP0qD6ePOx8TBWkca1 zZhB5tDgUNudrWQ152vygtLYacZq|iMb^N%OdBqOOYI<(>%0`XLq>@3|hn_8yfDteL z-SuqEi%#>$Jx{DL$UAWMgd#)d%l+`65w7P0@T1lQGm@@s7L**o9<`fxeV$3FG>$bY zqEKGr2l#dq-w~~rq7P4zQiPT@{r=2X*6J_L-y7#rV`F1eQ(ccB22Ys!7(@)*FN|y; z%|z}P;VzwHPFJX0d?66oCpNUioI_$7%SB+`1GJMG(ev7EQ_1))G634tS>qX7_W(M&2!NlDZ$+anfMb0``){M$zUfpC1 zS=kY8tnYf{zWTWP|9BK&eIpEjDX_R-GX(zcKm5puZ`x$_L+DD;haJ9`E{Lxte31qM Pw8`@@9w$5$_U(TF+wlRo literal 0 HcmV?d00001 From 8d32eea85633ce5d7f70731f7602bc1851ca9c6f Mon Sep 17 00:00:00 2001 From: ManikaDhiman Date: Tue, 30 Apr 2019 16:17:49 -0700 Subject: [PATCH 259/724] Updates per bug 3122154 --- windows/client-management/mdm/devicestatus-csp.md | 14 +++++++++++++- 1 file changed, 13 insertions(+), 1 deletion(-) diff --git a/windows/client-management/mdm/devicestatus-csp.md b/windows/client-management/mdm/devicestatus-csp.md index a20317c21f..568485b1b6 100644 --- a/windows/client-management/mdm/devicestatus-csp.md +++ b/windows/client-management/mdm/devicestatus-csp.md @@ -7,7 +7,7 @@ ms.topic: article ms.prod: w10 ms.technology: windows author: MariciaAlforque -ms.date: 07/26/2018 +ms.date: 04/30/2019 --- # DeviceStatus CSP @@ -157,6 +157,12 @@ Valid values: Supported operation is Get. +If more than one antivirus provider is active, the **DeviceStatus/Antivirus/SignatureStatus** node returns: +- 1 – If every active antivirus provider has a valid signature status +- 0 – If any of the active antivirus providers has an invalid signature status + +The **DeviceStatus/Antivirus/SignatureStatus** node also returns 0 when no antivirus provider is active. + **DeviceStatus/Antivirus/Status** Added in Windows, version 1607. Integer that specifies the status of the antivirus. @@ -186,6 +192,12 @@ Valid values: Supported operation is Get. +If more than one antispyware provider is active, the **DeviceStatus/Antispyware/SignatureStatus** node returns: +- 1 – If every active antispyware provider has a valid signature status +- 0 – If any of the active antispyware providers has an invalid signature status + +The **DeviceStatus/Antispyware/SignatureStatus** node also returns 0 when no antispyware provider is active. + **DeviceStatus/Antispyware/Status** Added in Windows, version 1607. Integer that specifies the status of the antispyware. From cc151d53a7e4e511dc8dc79e11499c72e268ac88 Mon Sep 17 00:00:00 2001 From: ManikaDhiman Date: Tue, 30 Apr 2019 16:53:19 -0700 Subject: [PATCH 260/724] Updater per bug 3122154 --- .../client-management/mdm/devicestatus-csp.md | 16 ++++++++-------- 1 file changed, 8 insertions(+), 8 deletions(-) diff --git a/windows/client-management/mdm/devicestatus-csp.md b/windows/client-management/mdm/devicestatus-csp.md index 568485b1b6..d286f6f918 100644 --- a/windows/client-management/mdm/devicestatus-csp.md +++ b/windows/client-management/mdm/devicestatus-csp.md @@ -157,11 +157,11 @@ Valid values: Supported operation is Get. -If more than one antivirus provider is active, the **DeviceStatus/Antivirus/SignatureStatus** node returns: -- 1 – If every active antivirus provider has a valid signature status -- 0 – If any of the active antivirus providers has an invalid signature status +If more than one antivirus provider is active, this node returns: +- 1 – If every active antivirus provider has a valid signature status. +- 0 – If any of the active antivirus providers has an invalid signature status. -The **DeviceStatus/Antivirus/SignatureStatus** node also returns 0 when no antivirus provider is active. +This node also returns 0 when no antivirus provider is active. **DeviceStatus/Antivirus/Status** Added in Windows, version 1607. Integer that specifies the status of the antivirus. @@ -192,11 +192,11 @@ Valid values: Supported operation is Get. -If more than one antispyware provider is active, the **DeviceStatus/Antispyware/SignatureStatus** node returns: -- 1 – If every active antispyware provider has a valid signature status -- 0 – If any of the active antispyware providers has an invalid signature status +If more than one antispyware provider is active, this node returns: +- 1 – If every active antispyware provider has a valid signature status. +- 0 – If any of the active antispyware providers has an invalid signature status. -The **DeviceStatus/Antispyware/SignatureStatus** node also returns 0 when no antispyware provider is active. +This node also returns 0 when no antispyware provider is active. **DeviceStatus/Antispyware/Status** Added in Windows, version 1607. Integer that specifies the status of the antispyware. From 48dd3a2e973f03b24f27b3088601b546d71ac5a2 Mon Sep 17 00:00:00 2001 From: Jose Ortega Date: Tue, 30 Apr 2019 19:01:11 -0500 Subject: [PATCH 261/724] Updates from @justinha --- .../windows-defender-smartscreen-overview.md | 2 -- 1 file changed, 2 deletions(-) diff --git a/windows/security/threat-protection/windows-defender-smartscreen/windows-defender-smartscreen-overview.md b/windows/security/threat-protection/windows-defender-smartscreen/windows-defender-smartscreen-overview.md index 0f7b20d9d7..a5f8f3cd5d 100644 --- a/windows/security/threat-protection/windows-defender-smartscreen/windows-defender-smartscreen-overview.md +++ b/windows/security/threat-protection/windows-defender-smartscreen/windows-defender-smartscreen-overview.md @@ -61,8 +61,6 @@ SmartScreen also have it's own events Ids on the "Microsoft-Windows-SmartScreen/ |1001 | Uri SmartScreen Event| |1002 | User Decision SmartScreen Event| ->[!IMPORTANT] -> This log is not enabled by default: Microsoft-Windows-SmartScreen/Debug, an required an MDM Policy to enable it. ## Related topics - [SmartScreen Frequently Asked Questions (FAQ)](https://feedback.smartscreen.microsoft.com/smartscreenfaq.aspx) From 6316a44027e72f3c897a61d665c05d472b3b15b9 Mon Sep 17 00:00:00 2001 From: Jose Gabriel Ortega Castro Date: Tue, 30 Apr 2019 19:07:26 -0500 Subject: [PATCH 262/724] Not changed anything new commit --- .../windows-defender-smartscreen-overview.md | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/windows/security/threat-protection/windows-defender-smartscreen/windows-defender-smartscreen-overview.md b/windows/security/threat-protection/windows-defender-smartscreen/windows-defender-smartscreen-overview.md index 8dea2b97b6..546050fc5f 100644 --- a/windows/security/threat-protection/windows-defender-smartscreen/windows-defender-smartscreen-overview.md +++ b/windows/security/threat-protection/windows-defender-smartscreen/windows-defender-smartscreen-overview.md @@ -70,5 +70,5 @@ SmartScreen has it's own events IDs on the "Microsoft-Windows-SmartScreen/Debug" - [Available Windows Defender SmartScreen Group Policy and mobile device management (MDM) settings](https://docs.microsoft.com/windows/security/threat-protection/windows-defender-smartscreen/windows-defender-smartscreen-available-settings) ->[!NOTE] +>[!NOTE] >Help to make this topic better by providing us with edits, additions, and feedback. For info about how to contribute to this topic, see [Contributing to TechNet content](https://github.com/Microsoft/windows-itpro-docs/blob/master/CONTRIBUTING.md). From d29584a74782371199fed5437b6b262c9894ce5e Mon Sep 17 00:00:00 2001 From: Jose Ortega Date: Tue, 30 Apr 2019 20:03:20 -0500 Subject: [PATCH 263/724] Solving Issue #3055 --- ...xtension-file-exclusions-windows-defender-antivirus.md | 8 +++++--- 1 file changed, 5 insertions(+), 3 deletions(-) diff --git a/windows/security/threat-protection/windows-defender-antivirus/configure-extension-file-exclusions-windows-defender-antivirus.md b/windows/security/threat-protection/windows-defender-antivirus/configure-extension-file-exclusions-windows-defender-antivirus.md index 492af0b7b7..52adc53122 100644 --- a/windows/security/threat-protection/windows-defender-antivirus/configure-extension-file-exclusions-windows-defender-antivirus.md +++ b/windows/security/threat-protection/windows-defender-antivirus/configure-extension-file-exclusions-windows-defender-antivirus.md @@ -20,6 +20,10 @@ ms.date: 12/10/2018 - [Windows Defender Advanced Threat Protection (Windows Defender ATP)](https://go.microsoft.com/fwlink/p/?linkid=2069559) +>[!IMPORTANT] +> [Windows Defender ATP](https://docs.microsoft.com/windows/security/threat-protection/windows-defender-atp/defender-compatibility-windows-defender-advanced-threat-protection) does not adhere to the Windows Defender Antivirus Exclusions settings. In other words, Windows Defender Exclusions,however they are created, are not used by ATP. + + You can exclude certain files from Windows Defender Antivirus scans by modifying exclusion lists. Generally, you shouldn't need to apply exclusions. Windows Defender Antivirus includes a number of automatic exclusions based on known operating system behaviors and typical management files, such as those used in enterprise management, database management, and other enterprise scenarios and situations. @@ -46,9 +50,7 @@ This means the exclusion lists have the following characteristics: >[!IMPORTANT] >The use of wildcards such as the asterisk (\*) will alter how the exclusion rules are interpreted. See the [Use wildcards in the file name and folder path or extension exclusion lists](#use-wildcards-in-the-file-name-and-folder-path-or-extension-exclusion-lists) section for important information about how wildcards work. -> >You cannot exclude mapped network drives. You must specify the actual network path. -> >Folders that are reparse points that are created after the Windows Defender Antivirus service starts and that have been added to the exclusion list will not be included. You must restart the service (by restarting Windows) for new reparse points to be recognized as a valid exclusion target. To exclude files opened by a specific process, see [Configure and validate exclusions for files opened by processes](configure-process-opened-file-exclusions-windows-defender-antivirus.md). @@ -57,13 +59,13 @@ The exclusions apply to [scheduled scans](scheduled-catch-up-scans-windows-defen >[!IMPORTANT] >Exclusion list changes made with Group Policy **will show** in the lists in the [Windows Security app](windows-defender-security-center-antivirus.md#exclusions). -> >Changes made in the Windows Security app **will not show** in the Group Policy lists. By default, local changes made to the lists (by users with administrator privileges, including changes made with PowerShell and WMI) will be merged with the lists as defined (and deployed) by Group Policy, Configuration Manager, or Intune. The Group Policy lists will take precedence in case of conflicts. You can [configure how locally and globally defined exclusions lists are merged](configure-local-policy-overrides-windows-defender-antivirus.md#merge-lists) to allow local changes to override managed deployment settings. + ## Configure the list of exclusions based on folder name or file extension **Use Intune to configure file name, folder, or file extension exclusions:** From d168459622bf3c0119a2d623bddccf50cc506ec9 Mon Sep 17 00:00:00 2001 From: Reece Peacock <49645174+Reeced40@users.noreply.github.com> Date: Wed, 1 May 2019 11:47:51 +0200 Subject: [PATCH 264/724] Update use-upgrade-readiness-to-manage-windows-upgrades.md Added important note. --- .../use-upgrade-readiness-to-manage-windows-upgrades.md | 3 +++ 1 file changed, 3 insertions(+) diff --git a/windows/deployment/upgrade/use-upgrade-readiness-to-manage-windows-upgrades.md b/windows/deployment/upgrade/use-upgrade-readiness-to-manage-windows-upgrades.md index 5b149323f8..257580ff5a 100644 --- a/windows/deployment/upgrade/use-upgrade-readiness-to-manage-windows-upgrades.md +++ b/windows/deployment/upgrade/use-upgrade-readiness-to-manage-windows-upgrades.md @@ -12,6 +12,9 @@ ms.topic: article # Use Upgrade Readiness to manage Windows upgrades +>[!IMPORTANT] +>**The OMS portal has been deprecated; you should start using the [Azure portal](https://portal.azure.com) instead as soon as possible.** Many experiences are the same in the two portals, but there are some key differences. See [Windows Analytics in the Azure Portal](../update/windows-analytics-azure-portal.md) for steps to use Windows Analytics in the Azure portal. For much more information about the transition from OMS to Azure, see [OMS portal moving to Azure](https://docs.microsoft.com/azure/log-analytics/log-analytics-oms-portal-transition). + You can use Upgrade Readiness to prioritize and work through application and driver issues, assign and track issue resolution status, and identify computers that are ready to upgrade. Upgrade Readiness enables you to deploy Windows with confidence, knowing that you’ve addressed potential blocking issues. - Based on diagnostic data from user computers, Upgrade Readiness identifies application and driver compatibility issues that may block Windows upgrades, allowing you to make data-driven decisions about your organization’s upgrade readiness. From 96c1cb6e993f0ef8112377976d9a4d7c5ecf9e77 Mon Sep 17 00:00:00 2001 From: Reece Peacock <49645174+Reeced40@users.noreply.github.com> Date: Wed, 1 May 2019 12:14:06 +0200 Subject: [PATCH 265/724] Update use-upgrade-readiness-to-manage-windows-upgrades.md Added link to updated article. --- .../upgrade/use-upgrade-readiness-to-manage-windows-upgrades.md | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/windows/deployment/upgrade/use-upgrade-readiness-to-manage-windows-upgrades.md b/windows/deployment/upgrade/use-upgrade-readiness-to-manage-windows-upgrades.md index 257580ff5a..7758956656 100644 --- a/windows/deployment/upgrade/use-upgrade-readiness-to-manage-windows-upgrades.md +++ b/windows/deployment/upgrade/use-upgrade-readiness-to-manage-windows-upgrades.md @@ -13,7 +13,7 @@ ms.topic: article # Use Upgrade Readiness to manage Windows upgrades >[!IMPORTANT] ->**The OMS portal has been deprecated; you should start using the [Azure portal](https://portal.azure.com) instead as soon as possible.** Many experiences are the same in the two portals, but there are some key differences. See [Windows Analytics in the Azure Portal](../update/windows-analytics-azure-portal.md) for steps to use Windows Analytics in the Azure portal. For much more information about the transition from OMS to Azure, see [OMS portal moving to Azure](https://docs.microsoft.com/azure/log-analytics/log-analytics-oms-portal-transition). +>**The OMS portal has been deprecated; you should start using the [Azure portal](https://portal.azure.com) instead as soon as possible.** Many experiences are the same in the two portals, but there are some key differences. See [Windows Analytics in the Azure Portal](../update/windows-analytics-azure-portal.md) for steps to use Windows Analytics in the Azure portal. For much more information about the transition from OMS to Azure, see [OMS portal moving to Azure](https://docs.microsoft.com/azure/log-analytics/log-analytics-oms-portal-transition). [Get started with Upgrade Readiness](https://docs.microsoft.com/windows/deployment/upgrade/upgrade-readiness-get-started) You can use Upgrade Readiness to prioritize and work through application and driver issues, assign and track issue resolution status, and identify computers that are ready to upgrade. Upgrade Readiness enables you to deploy Windows with confidence, knowing that you’ve addressed potential blocking issues. From 704aedfcc57f816e6070101c1f0fb30b42f1d914 Mon Sep 17 00:00:00 2001 From: Justin Hall Date: Wed, 1 May 2019 06:10:48 -0700 Subject: [PATCH 266/724] Update windows-defender-smartscreen-overview.md --- .../windows-defender-smartscreen-overview.md | 4 +--- 1 file changed, 1 insertion(+), 3 deletions(-) diff --git a/windows/security/threat-protection/windows-defender-smartscreen/windows-defender-smartscreen-overview.md b/windows/security/threat-protection/windows-defender-smartscreen/windows-defender-smartscreen-overview.md index 546050fc5f..ccc35c4967 100644 --- a/windows/security/threat-protection/windows-defender-smartscreen/windows-defender-smartscreen-overview.md +++ b/windows/security/threat-protection/windows-defender-smartscreen/windows-defender-smartscreen-overview.md @@ -52,7 +52,7 @@ When Windows Defender SmartScreen warns or blocks an employee from a website, it ## Viewing Windows event logs for SmartScreen -SmartScreen has it's own events IDs on the "Microsoft-Windows-SmartScreen/Debug" +SmartScreen events appear in the Microsoft-Windows-SmartScreen/Debug log in Event Viewer. |EventID | Description | @@ -64,8 +64,6 @@ SmartScreen has it's own events IDs on the "Microsoft-Windows-SmartScreen/Debug" ## Related topics - [SmartScreen Frequently Asked Questions (FAQ)](https://feedback.smartscreen.microsoft.com/smartscreenfaq.aspx) -- [How to recognize phishing email messages, links, or phone calls](https://www.microsoft.com/en-us/safety/online-privacy/phishing-symptoms.aspx) - - [Threat protection](../index.md) - [Available Windows Defender SmartScreen Group Policy and mobile device management (MDM) settings](https://docs.microsoft.com/windows/security/threat-protection/windows-defender-smartscreen/windows-defender-smartscreen-available-settings) From 10c2e071926991cb45c29ecd63517d5fc2c35e7d Mon Sep 17 00:00:00 2001 From: Marty Hernandez Avedon Date: Wed, 1 May 2019 10:07:20 -0400 Subject: [PATCH 267/724] Added some caveats on system requirements --- .../microsoft-defender-atp-mac.md | 7 ++++++- 1 file changed, 6 insertions(+), 1 deletion(-) diff --git a/windows/security/threat-protection/windows-defender-antivirus/microsoft-defender-atp-mac.md b/windows/security/threat-protection/windows-defender-antivirus/microsoft-defender-atp-mac.md index f643a3b454..546c1e7081 100644 --- a/windows/security/threat-protection/windows-defender-antivirus/microsoft-defender-atp-mac.md +++ b/windows/security/threat-protection/windows-defender-antivirus/microsoft-defender-atp-mac.md @@ -33,7 +33,12 @@ You should also have access to Windows Defender Security Center. ### System Requirements Microsoft Defender ATP for Mac system requirements: - macOS version: 10.14 (Mojave), 10.13 (High Sierra), 10.12 (Sierra) -- Disk space during preview: 1GB +- Disk space during preview: 1GB + +Beta versions are not supported. + +> [!CAUTION] +> Running any additional third party endpoint protection alongside Microsoft Defender ATP for Mac may lead to and performance problems and unpredictable side effects. After you've enabled the service, you may need to configure your network or firewall to allow outbound connections between it and your endpoints. From 783fc36d3e55d39c1a9a7e4dcdc873a504476bbc Mon Sep 17 00:00:00 2001 From: ImranHabib <47118050+joinimran@users.noreply.github.com> Date: Wed, 1 May 2019 19:08:57 +0500 Subject: [PATCH 268/724] cloud experience host information Cloud experience host related information was missing in the document. Required information has been added. Problem: https://github.com/MicrosoftDocs/windows-itpro-docs/issues/3276 --- .../hello-how-it-works-technology.md | 10 ++++++++++ 1 file changed, 10 insertions(+) diff --git a/windows/security/identity-protection/hello-for-business/hello-how-it-works-technology.md b/windows/security/identity-protection/hello-for-business/hello-how-it-works-technology.md index d12e00c028..401dcdc382 100644 --- a/windows/security/identity-protection/hello-for-business/hello-how-it-works-technology.md +++ b/windows/security/identity-protection/hello-for-business/hello-how-it-works-technology.md @@ -39,6 +39,7 @@ ms.date: 10/08/2018 - [Storage Root Key](#storage-root-key) - [Trust Type](#trust-type) - [Trusted Platform Module](#trusted-platform-module) +- [Cloud Experience Host](#cloud-experience-host)


## Attestation Identity Keys @@ -304,7 +305,16 @@ In a simplified manner, the TPM is a passive component with limited resources. I [Return to Top](hello-how-it-works-technology.md) +## Cloud Experience Host +In Windows 10 Enterprise edition, cloud experience host is a component that helps you join the workplace environment or Azure AD using your company provided credentials. Once you enroll your device to your workplace environment or Azure AD, your organization will be able to manage your PC and collect information about you(including your location). It might add or remove apps or content, change settings, disable features, prevent you from removing your company account, or reset your PC. +### Related topics +[Windows Hello for Business](https://docs.microsoft.com/en-us/windows/security/identity-protection/hello-for-business/hello-identity-verification), [Managed Windows Hello in Organization](https://docs.microsoft.com/en-us/windows/security/identity-protection/hello-for-business/hello-manage-in-organization) + +### More information +- [Windows Hello for Business and Device Registration](https://docs.microsoft.com/en-us/windows/security/identity-protection/hello-for-business/hello-how-it-works-device-registration) + +[Return to Top](hello-how-it-works-technology.md) From 516a00b153a899ba80256385771790a00cfd92c9 Mon Sep 17 00:00:00 2001 From: Michael Niehaus Date: Wed, 1 May 2019 10:26:12 -0400 Subject: [PATCH 269/724] Update user-driven-hybrid.md Adjusted the AD DC requirements to make them more clear. --- windows/deployment/windows-autopilot/user-driven-hybrid.md | 3 ++- 1 file changed, 2 insertions(+), 1 deletion(-) diff --git a/windows/deployment/windows-autopilot/user-driven-hybrid.md b/windows/deployment/windows-autopilot/user-driven-hybrid.md index d69c5869ba..c75f3e2df4 100644 --- a/windows/deployment/windows-autopilot/user-driven-hybrid.md +++ b/windows/deployment/windows-autopilot/user-driven-hybrid.md @@ -29,7 +29,8 @@ To perform a user-driven hybrid AAD joined deployment using Windows Autopilot: - **Hybrid Azure AD joined** must be specified as the selected option under **Join to Azure AD as** in the Autopilot profile. - If using Intune, a device group in Azure Active Directory must exist with the Windows Autopilot profile assigned to that group. - The device must be running Windows 10, version 1809 or later. -- The device must be connected to the Internet and have access to an Active Directory domain controller. +- The device must be able to access an Active Directory domain controller, so it must be connected to the organization's network (where it can resolve the DNS records for the AD domain and the AD domain controller, and communicate with the domain controller to authenticate the user). +- The device must be able to access the Internet, following the [documented Windows Autopilot network requirements](windows-autopilot-requirements-network.md). - The Intune Connector for Active Directory must be installed. - Note: The Intune Connector will perform an on-prem AD join, therefore users do not need on-prem AD-join permission, assuming the Connector is [configured to perform this action](https://docs.microsoft.com/intune/windows-autopilot-hybrid#increase-the-computer-account-limit-in-the-organizational-unit) on the user's behalf. - If using Proxy, WPAD Proxy settings option must be enabled and configured. From ad562adc9b30c6c2877cb2b1da3e47f5f0201f6f Mon Sep 17 00:00:00 2001 From: Marty Hernandez Avedon Date: Wed, 1 May 2019 10:26:26 -0400 Subject: [PATCH 270/724] refined caution & cut redundant description --- .../windows-defender-antivirus/microsoft-defender-atp-mac.md | 3 +-- 1 file changed, 1 insertion(+), 2 deletions(-) diff --git a/windows/security/threat-protection/windows-defender-antivirus/microsoft-defender-atp-mac.md b/windows/security/threat-protection/windows-defender-antivirus/microsoft-defender-atp-mac.md index 546c1e7081..8e10fb83f5 100644 --- a/windows/security/threat-protection/windows-defender-antivirus/microsoft-defender-atp-mac.md +++ b/windows/security/threat-protection/windows-defender-antivirus/microsoft-defender-atp-mac.md @@ -31,14 +31,13 @@ You should have beginner-level experience in macOS and BASH scripting. You must You should also have access to Windows Defender Security Center. ### System Requirements -Microsoft Defender ATP for Mac system requirements: - macOS version: 10.14 (Mojave), 10.13 (High Sierra), 10.12 (Sierra) - Disk space during preview: 1GB Beta versions are not supported. > [!CAUTION] -> Running any additional third party endpoint protection alongside Microsoft Defender ATP for Mac may lead to and performance problems and unpredictable side effects. +> Running other third-party endpoint protection along with Microsoft Defender ATP for Mac may lead to performance problems and unpredictable side effects. After you've enabled the service, you may need to configure your network or firewall to allow outbound connections between it and your endpoints. From d63cbb046cada5d46ccb65027e86907272386cba Mon Sep 17 00:00:00 2001 From: Marty Hernandez Avedon Date: Wed, 1 May 2019 10:36:55 -0400 Subject: [PATCH 271/724] specified beta versions *of macOS* --- .../windows-defender-antivirus/microsoft-defender-atp-mac.md | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/windows/security/threat-protection/windows-defender-antivirus/microsoft-defender-atp-mac.md b/windows/security/threat-protection/windows-defender-antivirus/microsoft-defender-atp-mac.md index 8e10fb83f5..cccde77573 100644 --- a/windows/security/threat-protection/windows-defender-antivirus/microsoft-defender-atp-mac.md +++ b/windows/security/threat-protection/windows-defender-antivirus/microsoft-defender-atp-mac.md @@ -34,7 +34,7 @@ You should also have access to Windows Defender Security Center. - macOS version: 10.14 (Mojave), 10.13 (High Sierra), 10.12 (Sierra) - Disk space during preview: 1GB -Beta versions are not supported. +Beta versions of macOS are not supported. > [!CAUTION] > Running other third-party endpoint protection along with Microsoft Defender ATP for Mac may lead to performance problems and unpredictable side effects. From 3020dfae762b7ad5ae675a3346cc1e5f2d580dd3 Mon Sep 17 00:00:00 2001 From: martyav Date: Wed, 1 May 2019 11:48:22 -0400 Subject: [PATCH 272/724] first pass at updating known issues section --- .../microsoft-defender-atp-mac.md | 15 +++++++++------ 1 file changed, 9 insertions(+), 6 deletions(-) diff --git a/windows/security/threat-protection/windows-defender-antivirus/microsoft-defender-atp-mac.md b/windows/security/threat-protection/windows-defender-antivirus/microsoft-defender-atp-mac.md index f643a3b454..82acdc4d29 100644 --- a/windows/security/threat-protection/windows-defender-antivirus/microsoft-defender-atp-mac.md +++ b/windows/security/threat-protection/windows-defender-antivirus/microsoft-defender-atp-mac.md @@ -464,12 +464,15 @@ Or, from a command line: - ```sudo rm -rf '/Applications/Microsoft Defender ATP'``` ## Known issues -- Microsoft Defender ATP is not yet optimized for performance or disk space. -- Centrally managed uninstall using Intune is still in development. To uninstall (as a workaround) a manual uninstall action has to be completed on each client device). -- Geo preference for telemetry traffic is not yet supported. Cloud traffic (definition updates) routed to US only. -- Full Windows Defender ATP integration is not yet available -- Not localized yet -- There might be accessibility issues + +- Not localized yet. +- There might be accessibility issues. +- Not optimized for performance or disk space yet. +- Full Windows Defender ATP integration is not available yet. +- Mac devices that switch networks may appear multiple times in the APT portal. +- Geo preference for telemetry traffic is not supported yet. Cloud traffic is routed to the US only. +- Centrally managed uninstall is still being developed. As a workaround, a manual uninstall must be performed on each client device. + ## Collecting diagnostic information If you can reproduce a problem, please increase the logging level, run the system for some time, and restore the logging level to the default. From 95053d19546fa083f8870336ca940e30910b4f01 Mon Sep 17 00:00:00 2001 From: Nicole Turner <39884432+nenonix@users.noreply.github.com> Date: Wed, 1 May 2019 11:24:52 -0500 Subject: [PATCH 273/724] Update windows/security/threat-protection/windows-defender-antivirus/configure-extension-file-exclusions-windows-defender-antivirus.md Nenonix suggestion 1 Co-Authored-By: j0rt3g4 --- ...gure-extension-file-exclusions-windows-defender-antivirus.md | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/windows/security/threat-protection/windows-defender-antivirus/configure-extension-file-exclusions-windows-defender-antivirus.md b/windows/security/threat-protection/windows-defender-antivirus/configure-extension-file-exclusions-windows-defender-antivirus.md index 52adc53122..493247b756 100644 --- a/windows/security/threat-protection/windows-defender-antivirus/configure-extension-file-exclusions-windows-defender-antivirus.md +++ b/windows/security/threat-protection/windows-defender-antivirus/configure-extension-file-exclusions-windows-defender-antivirus.md @@ -20,7 +20,7 @@ ms.date: 12/10/2018 - [Windows Defender Advanced Threat Protection (Windows Defender ATP)](https://go.microsoft.com/fwlink/p/?linkid=2069559) ->[!IMPORTANT] +> [!IMPORTANT] > [Windows Defender ATP](https://docs.microsoft.com/windows/security/threat-protection/windows-defender-atp/defender-compatibility-windows-defender-advanced-threat-protection) does not adhere to the Windows Defender Antivirus Exclusions settings. In other words, Windows Defender Exclusions,however they are created, are not used by ATP. From ee6b88e60ca1da6944b555264933283a35cba453 Mon Sep 17 00:00:00 2001 From: Nicole Turner <39884432+nenonix@users.noreply.github.com> Date: Wed, 1 May 2019 11:25:05 -0500 Subject: [PATCH 274/724] Update windows/security/threat-protection/windows-defender-antivirus/configure-extension-file-exclusions-windows-defender-antivirus.md Nenonix suggestion #2 Co-Authored-By: j0rt3g4 --- ...gure-extension-file-exclusions-windows-defender-antivirus.md | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/windows/security/threat-protection/windows-defender-antivirus/configure-extension-file-exclusions-windows-defender-antivirus.md b/windows/security/threat-protection/windows-defender-antivirus/configure-extension-file-exclusions-windows-defender-antivirus.md index 493247b756..f29bb4bd78 100644 --- a/windows/security/threat-protection/windows-defender-antivirus/configure-extension-file-exclusions-windows-defender-antivirus.md +++ b/windows/security/threat-protection/windows-defender-antivirus/configure-extension-file-exclusions-windows-defender-antivirus.md @@ -21,7 +21,7 @@ ms.date: 12/10/2018 - [Windows Defender Advanced Threat Protection (Windows Defender ATP)](https://go.microsoft.com/fwlink/p/?linkid=2069559) > [!IMPORTANT] -> [Windows Defender ATP](https://docs.microsoft.com/windows/security/threat-protection/windows-defender-atp/defender-compatibility-windows-defender-advanced-threat-protection) does not adhere to the Windows Defender Antivirus Exclusions settings. In other words, Windows Defender Exclusions,however they are created, are not used by ATP. +> [Windows Defender Advanced Threat Protection ](https://docs.microsoft.com/windows/security/threat-protection/windows-defender-atp/defender-compatibility-windows-defender-advanced-threat-protection) does not adhere to Windows Defender Antivirus exclusion settings. This means that any Windows Defender exclusions, no matter how you created them, are not applied by Windows Defender ATP. You can exclude certain files from Windows Defender Antivirus scans by modifying exclusion lists. From d94154c14a160a37d6b1d670cdb9f9cb5b88518a Mon Sep 17 00:00:00 2001 From: Nicole Turner <39884432+nenonix@users.noreply.github.com> Date: Wed, 1 May 2019 11:25:24 -0500 Subject: [PATCH 275/724] Update windows/security/threat-protection/windows-defender-antivirus/configure-extension-file-exclusions-windows-defender-antivirus.md Nenonix suggestion #3 Co-Authored-By: j0rt3g4 --- ...igure-extension-file-exclusions-windows-defender-antivirus.md | 1 - 1 file changed, 1 deletion(-) diff --git a/windows/security/threat-protection/windows-defender-antivirus/configure-extension-file-exclusions-windows-defender-antivirus.md b/windows/security/threat-protection/windows-defender-antivirus/configure-extension-file-exclusions-windows-defender-antivirus.md index f29bb4bd78..4e0ee50bfd 100644 --- a/windows/security/threat-protection/windows-defender-antivirus/configure-extension-file-exclusions-windows-defender-antivirus.md +++ b/windows/security/threat-protection/windows-defender-antivirus/configure-extension-file-exclusions-windows-defender-antivirus.md @@ -23,7 +23,6 @@ ms.date: 12/10/2018 > [!IMPORTANT] > [Windows Defender Advanced Threat Protection ](https://docs.microsoft.com/windows/security/threat-protection/windows-defender-atp/defender-compatibility-windows-defender-advanced-threat-protection) does not adhere to Windows Defender Antivirus exclusion settings. This means that any Windows Defender exclusions, no matter how you created them, are not applied by Windows Defender ATP. - You can exclude certain files from Windows Defender Antivirus scans by modifying exclusion lists. Generally, you shouldn't need to apply exclusions. Windows Defender Antivirus includes a number of automatic exclusions based on known operating system behaviors and typical management files, such as those used in enterprise management, database management, and other enterprise scenarios and situations. From ae4e3f030b3929ef801e9478c85f25d610924bb0 Mon Sep 17 00:00:00 2001 From: Nicole Turner <39884432+nenonix@users.noreply.github.com> Date: Wed, 1 May 2019 11:25:46 -0500 Subject: [PATCH 276/724] Update windows/security/threat-protection/windows-defender-antivirus/configure-extension-file-exclusions-windows-defender-antivirus.md Nenonix suggestion #4 Co-Authored-By: j0rt3g4 --- ...igure-extension-file-exclusions-windows-defender-antivirus.md | 1 - 1 file changed, 1 deletion(-) diff --git a/windows/security/threat-protection/windows-defender-antivirus/configure-extension-file-exclusions-windows-defender-antivirus.md b/windows/security/threat-protection/windows-defender-antivirus/configure-extension-file-exclusions-windows-defender-antivirus.md index 4e0ee50bfd..e2bdef688e 100644 --- a/windows/security/threat-protection/windows-defender-antivirus/configure-extension-file-exclusions-windows-defender-antivirus.md +++ b/windows/security/threat-protection/windows-defender-antivirus/configure-extension-file-exclusions-windows-defender-antivirus.md @@ -64,7 +64,6 @@ By default, local changes made to the lists (by users with administrator privile You can [configure how locally and globally defined exclusions lists are merged](configure-local-policy-overrides-windows-defender-antivirus.md#merge-lists) to allow local changes to override managed deployment settings. - ## Configure the list of exclusions based on folder name or file extension **Use Intune to configure file name, folder, or file extension exclusions:** From c77397e197a5bf176ada23cd8883e8c1946aa22f Mon Sep 17 00:00:00 2001 From: martyav Date: Wed, 1 May 2019 12:45:00 -0400 Subject: [PATCH 277/724] added what's new section --- .../microsoft-defender-atp-mac.md | 15 +++++++++++++++ 1 file changed, 15 insertions(+) diff --git a/windows/security/threat-protection/windows-defender-antivirus/microsoft-defender-atp-mac.md b/windows/security/threat-protection/windows-defender-antivirus/microsoft-defender-atp-mac.md index 82acdc4d29..fd141aaa08 100644 --- a/windows/security/threat-protection/windows-defender-antivirus/microsoft-defender-atp-mac.md +++ b/windows/security/threat-protection/windows-defender-antivirus/microsoft-defender-atp-mac.md @@ -25,6 +25,21 @@ ms.topic: conceptual This topic describes how to install and use Microsoft Defender ATP for Mac. It supports the preview program and the information here is subject to change. Microsoft Defender ATP for Mac is not yet widely available, and this topic only applies to enterprise customers who have been accepted into the preview program. +## What’s new in the public preview + +- Fully accessible +- Various bug fixes +- Improved performance +- Improved user experience +- Improved threat handling +- Localized for 37 languages +- Improved anti-tampering protections +- Feedback can now be submitted via the Mac Client UI. +- Product health can now be queried via Jamf or the command line. +- Reduced delay for Mac devices to appear in the ATP console, following deployment. +- Admins can now set their cloud geo preference for any location, not just those in the US. + + ## Prerequisites You should have beginner-level experience in macOS and BASH scripting. You must have administrative privileges on the machine. From 5733e9b39311dab6057bd7c8bea356c63838ecbc Mon Sep 17 00:00:00 2001 From: martyav Date: Wed, 1 May 2019 12:59:11 -0400 Subject: [PATCH 278/724] refining what's new section text --- .../microsoft-defender-atp-mac.md | 6 +++--- 1 file changed, 3 insertions(+), 3 deletions(-) diff --git a/windows/security/threat-protection/windows-defender-antivirus/microsoft-defender-atp-mac.md b/windows/security/threat-protection/windows-defender-antivirus/microsoft-defender-atp-mac.md index fd141aaa08..44e8b765e4 100644 --- a/windows/security/threat-protection/windows-defender-antivirus/microsoft-defender-atp-mac.md +++ b/windows/security/threat-protection/windows-defender-antivirus/microsoft-defender-atp-mac.md @@ -34,10 +34,10 @@ Microsoft Defender ATP for Mac is not yet widely available, and this topic only - Improved threat handling - Localized for 37 languages - Improved anti-tampering protections -- Feedback can now be submitted via the Mac Client UI. -- Product health can now be queried via Jamf or the command line. +- Feedback and samples can be submitted via the GUI. +- Product health can be queried via Jamf or the command line. - Reduced delay for Mac devices to appear in the ATP console, following deployment. -- Admins can now set their cloud geo preference for any location, not just those in the US. +- Admins can set their cloud preference for any location, not just those in the US. ## Prerequisites From 522bb702bb2177779c7b30dc037ee2df0e1f9cf7 Mon Sep 17 00:00:00 2001 From: Nicole Turner <39884432+nenonix@users.noreply.github.com> Date: Wed, 1 May 2019 22:21:50 +0500 Subject: [PATCH 279/724] Update windows/security/identity-protection/hello-for-business/hello-how-it-works-technology.md Co-Authored-By: joinimran <47118050+joinimran@users.noreply.github.com> --- .../hello-for-business/hello-how-it-works-technology.md | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/windows/security/identity-protection/hello-for-business/hello-how-it-works-technology.md b/windows/security/identity-protection/hello-for-business/hello-how-it-works-technology.md index 401dcdc382..6fb3df408c 100644 --- a/windows/security/identity-protection/hello-for-business/hello-how-it-works-technology.md +++ b/windows/security/identity-protection/hello-for-business/hello-how-it-works-technology.md @@ -312,7 +312,7 @@ In Windows 10 Enterprise edition, cloud experience host is a component that help [Windows Hello for Business](https://docs.microsoft.com/en-us/windows/security/identity-protection/hello-for-business/hello-identity-verification), [Managed Windows Hello in Organization](https://docs.microsoft.com/en-us/windows/security/identity-protection/hello-for-business/hello-manage-in-organization) ### More information -- [Windows Hello for Business and Device Registration](https://docs.microsoft.com/en-us/windows/security/identity-protection/hello-for-business/hello-how-it-works-device-registration) +- [Windows Hello for Business and Device Registration](https://docs.microsoft.com/windows/security/identity-protection/hello-for-business/hello-how-it-works-device-registration) [Return to Top](hello-how-it-works-technology.md) From 0ceb9f2a5e6fa6c0d1d8f7a5bfb8b5592c34dc44 Mon Sep 17 00:00:00 2001 From: Nicole Turner <39884432+nenonix@users.noreply.github.com> Date: Wed, 1 May 2019 22:22:06 +0500 Subject: [PATCH 280/724] Update windows/security/identity-protection/hello-for-business/hello-how-it-works-technology.md Co-Authored-By: joinimran <47118050+joinimran@users.noreply.github.com> --- .../hello-for-business/hello-how-it-works-technology.md | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/windows/security/identity-protection/hello-for-business/hello-how-it-works-technology.md b/windows/security/identity-protection/hello-for-business/hello-how-it-works-technology.md index 6fb3df408c..23acc75c13 100644 --- a/windows/security/identity-protection/hello-for-business/hello-how-it-works-technology.md +++ b/windows/security/identity-protection/hello-for-business/hello-how-it-works-technology.md @@ -306,7 +306,7 @@ In a simplified manner, the TPM is a passive component with limited resources. I [Return to Top](hello-how-it-works-technology.md) ## Cloud Experience Host -In Windows 10 Enterprise edition, cloud experience host is a component that helps you join the workplace environment or Azure AD using your company provided credentials. Once you enroll your device to your workplace environment or Azure AD, your organization will be able to manage your PC and collect information about you(including your location). It might add or remove apps or content, change settings, disable features, prevent you from removing your company account, or reset your PC. +In Windows 10 Enterprise edition, Cloud Experience Host is an application that helps you join the workplace environment or Azure AD using your company-provided credentials. Once you enroll your device to your workplace environment or Azure AD, your organization will be able to manage your PC and collect information about you (including your location). It might add or remove apps or content, change settings, disable features, prevent you from removing your company account, or reset your PC. ### Related topics [Windows Hello for Business](https://docs.microsoft.com/en-us/windows/security/identity-protection/hello-for-business/hello-identity-verification), [Managed Windows Hello in Organization](https://docs.microsoft.com/en-us/windows/security/identity-protection/hello-for-business/hello-manage-in-organization) From 53e037095bc9b0837f79c9d7c882b2dfc5883d4c Mon Sep 17 00:00:00 2001 From: Nicole Turner <39884432+nenonix@users.noreply.github.com> Date: Wed, 1 May 2019 22:22:25 +0500 Subject: [PATCH 281/724] Update windows/security/identity-protection/hello-for-business/hello-how-it-works-technology.md Co-Authored-By: joinimran <47118050+joinimran@users.noreply.github.com> --- .../hello-for-business/hello-how-it-works-technology.md | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/windows/security/identity-protection/hello-for-business/hello-how-it-works-technology.md b/windows/security/identity-protection/hello-for-business/hello-how-it-works-technology.md index 23acc75c13..5f740c9437 100644 --- a/windows/security/identity-protection/hello-for-business/hello-how-it-works-technology.md +++ b/windows/security/identity-protection/hello-for-business/hello-how-it-works-technology.md @@ -309,7 +309,7 @@ In a simplified manner, the TPM is a passive component with limited resources. I In Windows 10 Enterprise edition, Cloud Experience Host is an application that helps you join the workplace environment or Azure AD using your company-provided credentials. Once you enroll your device to your workplace environment or Azure AD, your organization will be able to manage your PC and collect information about you (including your location). It might add or remove apps or content, change settings, disable features, prevent you from removing your company account, or reset your PC. ### Related topics -[Windows Hello for Business](https://docs.microsoft.com/en-us/windows/security/identity-protection/hello-for-business/hello-identity-verification), [Managed Windows Hello in Organization](https://docs.microsoft.com/en-us/windows/security/identity-protection/hello-for-business/hello-manage-in-organization) +[Windows Hello for Business](https://docs.microsoft.com/windows/security/identity-protection/hello-for-business/hello-identity-verification), [Managed Windows Hello in Organization](https://docs.microsoft.com/windows/security/identity-protection/hello-for-business/hello-manage-in-organization) ### More information - [Windows Hello for Business and Device Registration](https://docs.microsoft.com/windows/security/identity-protection/hello-for-business/hello-how-it-works-device-registration) From 8162acd4cddfe26b4f61e0c31e295214b6bcba01 Mon Sep 17 00:00:00 2001 From: martyav Date: Wed, 1 May 2019 14:21:07 -0400 Subject: [PATCH 282/724] added atp portal section --- .../microsoft-defender-atp-mac.md | 26 +++++++++++++++++++ 1 file changed, 26 insertions(+) diff --git a/windows/security/threat-protection/windows-defender-antivirus/microsoft-defender-atp-mac.md b/windows/security/threat-protection/windows-defender-antivirus/microsoft-defender-atp-mac.md index 44e8b765e4..eff522741e 100644 --- a/windows/security/threat-protection/windows-defender-antivirus/microsoft-defender-atp-mac.md +++ b/windows/security/threat-protection/windows-defender-antivirus/microsoft-defender-atp-mac.md @@ -468,6 +468,32 @@ After installation, you'll see the Microsoft Defender icon in the macOS status b ![Microsoft Defender icon in status bar screenshot](images/MDATP_Icon_Bar.png) +## What to expect in the ATP portal + +- Severity +- Scan type +- Antivirus alerts +- Device information: + - Machine identifier + - Tenant identifier + - App version + - Hostname + - OS type + - OS version + - Computer model + - Processor architecture + - Whether the device is a virtual machine +- File information: + - Hashes + - Size + - Path + - Name +- Threat information: + - Type + - State + - Name + + ## Uninstallation ### Removing Microsoft Defender ATP from Mac devices To remove Microsoft Defender ATP from your macOS devices: From 5b2c2255ca10709f714ac3ec4557e6c93fd90f2d Mon Sep 17 00:00:00 2001 From: Jose Gabriel Ortega Castro Date: Wed, 1 May 2019 14:04:08 -0500 Subject: [PATCH 283/724] Ading lines --- ...ure-extension-file-exclusions-windows-defender-antivirus.md | 3 +++ 1 file changed, 3 insertions(+) diff --git a/windows/security/threat-protection/windows-defender-antivirus/configure-extension-file-exclusions-windows-defender-antivirus.md b/windows/security/threat-protection/windows-defender-antivirus/configure-extension-file-exclusions-windows-defender-antivirus.md index e2bdef688e..fb528fe1b5 100644 --- a/windows/security/threat-protection/windows-defender-antivirus/configure-extension-file-exclusions-windows-defender-antivirus.md +++ b/windows/security/threat-protection/windows-defender-antivirus/configure-extension-file-exclusions-windows-defender-antivirus.md @@ -47,8 +47,10 @@ This means the exclusion lists have the following characteristics: - Folder exclusions will apply to all files and folders under that folder, unless the subfolder is a reparse point. Reparse point subfolders must be excluded separately. - File extensions will apply to any file name with the defined extension if a path or folder is not defined. + >[!IMPORTANT] >The use of wildcards such as the asterisk (\*) will alter how the exclusion rules are interpreted. See the [Use wildcards in the file name and folder path or extension exclusion lists](#use-wildcards-in-the-file-name-and-folder-path-or-extension-exclusion-lists) section for important information about how wildcards work. + >You cannot exclude mapped network drives. You must specify the actual network path. >Folders that are reparse points that are created after the Windows Defender Antivirus service starts and that have been added to the exclusion list will not be included. You must restart the service (by restarting Windows) for new reparse points to be recognized as a valid exclusion target. @@ -56,6 +58,7 @@ To exclude files opened by a specific process, see [Configure and validate exclu The exclusions apply to [scheduled scans](scheduled-catch-up-scans-windows-defender-antivirus.md), [on-demand scans](run-scan-windows-defender-antivirus.md), and [real-time protection](configure-real-time-protection-windows-defender-antivirus.md). + >[!IMPORTANT] >Exclusion list changes made with Group Policy **will show** in the lists in the [Windows Security app](windows-defender-security-center-antivirus.md#exclusions). >Changes made in the Windows Security app **will not show** in the Group Policy lists. From 5980d15305a14680ce91918d0618ddbf822d0bab Mon Sep 17 00:00:00 2001 From: illfated Date: Wed, 1 May 2019 21:34:03 +0200 Subject: [PATCH 284/724] Add back 3 removed unrelated note lines Adding back the 3 lines you removed outside of the added note. One of the last line changes was correctly placed, but missing the > character to keep the block together. --- ...-extension-file-exclusions-windows-defender-antivirus.md | 6 +++--- 1 file changed, 3 insertions(+), 3 deletions(-) diff --git a/windows/security/threat-protection/windows-defender-antivirus/configure-extension-file-exclusions-windows-defender-antivirus.md b/windows/security/threat-protection/windows-defender-antivirus/configure-extension-file-exclusions-windows-defender-antivirus.md index fb528fe1b5..eb2bdd0120 100644 --- a/windows/security/threat-protection/windows-defender-antivirus/configure-extension-file-exclusions-windows-defender-antivirus.md +++ b/windows/security/threat-protection/windows-defender-antivirus/configure-extension-file-exclusions-windows-defender-antivirus.md @@ -47,10 +47,10 @@ This means the exclusion lists have the following characteristics: - Folder exclusions will apply to all files and folders under that folder, unless the subfolder is a reparse point. Reparse point subfolders must be excluded separately. - File extensions will apply to any file name with the defined extension if a path or folder is not defined. - >[!IMPORTANT] +> >The use of wildcards such as the asterisk (\*) will alter how the exclusion rules are interpreted. See the [Use wildcards in the file name and folder path or extension exclusion lists](#use-wildcards-in-the-file-name-and-folder-path-or-extension-exclusion-lists) section for important information about how wildcards work. - +> >You cannot exclude mapped network drives. You must specify the actual network path. >Folders that are reparse points that are created after the Windows Defender Antivirus service starts and that have been added to the exclusion list will not be included. You must restart the service (by restarting Windows) for new reparse points to be recognized as a valid exclusion target. @@ -58,9 +58,9 @@ To exclude files opened by a specific process, see [Configure and validate exclu The exclusions apply to [scheduled scans](scheduled-catch-up-scans-windows-defender-antivirus.md), [on-demand scans](run-scan-windows-defender-antivirus.md), and [real-time protection](configure-real-time-protection-windows-defender-antivirus.md). - >[!IMPORTANT] >Exclusion list changes made with Group Policy **will show** in the lists in the [Windows Security app](windows-defender-security-center-antivirus.md#exclusions). +> >Changes made in the Windows Security app **will not show** in the Group Policy lists. By default, local changes made to the lists (by users with administrator privileges, including changes made with PowerShell and WMI) will be merged with the lists as defined (and deployed) by Group Policy, Configuration Manager, or Intune. The Group Policy lists will take precedence in case of conflicts. From 24efe934039130e2c78fcc911d0470adb413b0fa Mon Sep 17 00:00:00 2001 From: ManikaDhiman Date: Wed, 1 May 2019 12:53:52 -0700 Subject: [PATCH 285/724] Updates per task 3309387 --- .../mdm/policy-csp-deliveryoptimization.md | 10 +++++----- 1 file changed, 5 insertions(+), 5 deletions(-) diff --git a/windows/client-management/mdm/policy-csp-deliveryoptimization.md b/windows/client-management/mdm/policy-csp-deliveryoptimization.md index 95e6d74539..47a3305652 100644 --- a/windows/client-management/mdm/policy-csp-deliveryoptimization.md +++ b/windows/client-management/mdm/policy-csp-deliveryoptimization.md @@ -6,13 +6,13 @@ ms.topic: article ms.prod: w10 ms.technology: windows author: MariciaAlforque -ms.date: 07/06/2018 +ms.date: 05/01/2019 --- # Policy CSP - DeliveryOptimization > [!WARNING] -> Some information relates to prereleased product which may be substantially modified before it's commercially released. Microsoft makes no warranties, express or implied, with respect to the information provided here. +> Some information relates to prereleased products, which may be substantially modified before it's commercially released. Microsoft makes no warranties, expressed or implied, concerning the information provided here.
@@ -985,7 +985,7 @@ ADMX Info: > This policy is only enforced in Windows 10 Pro, Business, Enterprise, and Education editions and not supported in Windows 10 Mobile. -Added in Windows 10, version 1703. Specifies the required minimum disk size (capacity in GB) for the device to use Peer Caching. The value 0 means "not-limited" which means the cloud service set default value will be used. Recommended values: 64 GB to 256 GB. +Added in Windows 10, version 1703. Specifies the required minimum disk size (capacity in GB) for the device to use Peer Caching. Recommended values: 64 GB to 256 GB. > [!NOTE] > If the DOMofidyCacheDrive policy is set, the disk size check will apply to the new working directory specified by this policy. @@ -1046,7 +1046,7 @@ ADMX Info: > This policy is only enforced in Windows 10 Pro, Business, Enterprise, and Education editions and not supported in Windows 10 Mobile. -Added in Windows 10, version 1703. Specifies the minimum content file size in MB enabled to use Peer Caching. The value 0 means "unlimited" which means the cloud service set default value will be used. Recommended values: 1 MB to 100,000 MB. +Added in Windows 10, version 1703. Specifies the minimum content file size in MB enabled to use Peer Caching. Recommended values: 1 MB to 100,000 MB. The default value is 100 MB. @@ -1104,7 +1104,7 @@ ADMX Info: > This policy is only enforced in Windows 10 Pro, Business, Enterprise, and Education editions and not supported in Windows 10 Mobile. -Added in Windows 10, version 1703. Specifies the minimum RAM size in GB required to use Peer Caching. The value 0 means "not-limited" which means the cloud service set default value will be used. For example if the minimum set is 1 GB, then devices with 1 GB or higher available RAM will be allowed to use Peer caching. Recommended values: 1 GB to 4 GB. +Added in Windows 10, version 1703. Specifies the minimum RAM size in GB required to use Peer Caching. For example, if the minimum set is 1 GB, then devices with 1 GB or higher available RAM will be allowed to use Peer caching. Recommended values: 1 GB to 4 GB. The default value is 4 GB. From 4535992c16391611358d5efa0d4f550ba7bdc4fc Mon Sep 17 00:00:00 2001 From: Jose Gabriel Ortega Castro Date: Wed, 1 May 2019 15:20:51 -0500 Subject: [PATCH 286/724] Lines Corrections --- ...gure-extension-file-exclusions-windows-defender-antivirus.md | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/windows/security/threat-protection/windows-defender-antivirus/configure-extension-file-exclusions-windows-defender-antivirus.md b/windows/security/threat-protection/windows-defender-antivirus/configure-extension-file-exclusions-windows-defender-antivirus.md index eb2bdd0120..7e70db0e6b 100644 --- a/windows/security/threat-protection/windows-defender-antivirus/configure-extension-file-exclusions-windows-defender-antivirus.md +++ b/windows/security/threat-protection/windows-defender-antivirus/configure-extension-file-exclusions-windows-defender-antivirus.md @@ -48,10 +48,10 @@ This means the exclusion lists have the following characteristics: - File extensions will apply to any file name with the defined extension if a path or folder is not defined. >[!IMPORTANT] -> >The use of wildcards such as the asterisk (\*) will alter how the exclusion rules are interpreted. See the [Use wildcards in the file name and folder path or extension exclusion lists](#use-wildcards-in-the-file-name-and-folder-path-or-extension-exclusion-lists) section for important information about how wildcards work. > >You cannot exclude mapped network drives. You must specify the actual network path. +> >Folders that are reparse points that are created after the Windows Defender Antivirus service starts and that have been added to the exclusion list will not be included. You must restart the service (by restarting Windows) for new reparse points to be recognized as a valid exclusion target. To exclude files opened by a specific process, see [Configure and validate exclusions for files opened by processes](configure-process-opened-file-exclusions-windows-defender-antivirus.md). From 3463aff605cfa1003ddf196f328527a7b23f912e Mon Sep 17 00:00:00 2001 From: JohanFreelancer9 <48568725+JohanFreelancer9@users.noreply.github.com> Date: Thu, 2 May 2019 08:21:25 +0200 Subject: [PATCH 287/724] Update windows/deployment/upgrade/use-upgrade-readiness-to-manage-windows-upgrades.md Changed wording. Co-Authored-By: Reeced40 <49645174+Reeced40@users.noreply.github.com> --- .../upgrade/use-upgrade-readiness-to-manage-windows-upgrades.md | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/windows/deployment/upgrade/use-upgrade-readiness-to-manage-windows-upgrades.md b/windows/deployment/upgrade/use-upgrade-readiness-to-manage-windows-upgrades.md index 7758956656..32fb97cc0f 100644 --- a/windows/deployment/upgrade/use-upgrade-readiness-to-manage-windows-upgrades.md +++ b/windows/deployment/upgrade/use-upgrade-readiness-to-manage-windows-upgrades.md @@ -13,7 +13,7 @@ ms.topic: article # Use Upgrade Readiness to manage Windows upgrades >[!IMPORTANT] ->**The OMS portal has been deprecated; you should start using the [Azure portal](https://portal.azure.com) instead as soon as possible.** Many experiences are the same in the two portals, but there are some key differences. See [Windows Analytics in the Azure Portal](../update/windows-analytics-azure-portal.md) for steps to use Windows Analytics in the Azure portal. For much more information about the transition from OMS to Azure, see [OMS portal moving to Azure](https://docs.microsoft.com/azure/log-analytics/log-analytics-oms-portal-transition). [Get started with Upgrade Readiness](https://docs.microsoft.com/windows/deployment/upgrade/upgrade-readiness-get-started) +>**The OMS portal has been deprecated; you should start using the [Azure portal](https://portal.azure.com) instead as soon as possible.** Many experiences are the same in the two portals, but there are some key differences. See [Windows Analytics in the Azure Portal](../update/windows-analytics-azure-portal.md) for steps to use Windows Analytics in the Azure portal. For much more information about the transition from OMS to Azure, see [OMS portal moving to Azure](https://docs.microsoft.com/azure/log-analytics/log-analytics-oms-portal-transition) and [Get started with Upgrade Readiness](https://docs.microsoft.com/windows/deployment/upgrade/upgrade-readiness-get-started). You can use Upgrade Readiness to prioritize and work through application and driver issues, assign and track issue resolution status, and identify computers that are ready to upgrade. Upgrade Readiness enables you to deploy Windows with confidence, knowing that you’ve addressed potential blocking issues. From 8ea83fd5bb1e6b45be66f7fa1e5d5b4023c4f84d Mon Sep 17 00:00:00 2001 From: ImranHabib <47118050+joinimran@users.noreply.github.com> Date: Thu, 2 May 2019 12:21:31 +0500 Subject: [PATCH 288/724] Reset netsh proxy As user requested, I have added netsh reset command for reference as well as attached the help doc to get more details related to netsh. Problem: https://github.com/MicrosoftDocs/windows-itpro-docs/issues/3372 --- ...-internet-windows-defender-advanced-threat-protection.md | 6 ++++++ 1 file changed, 6 insertions(+) diff --git a/windows/security/threat-protection/windows-defender-atp/configure-proxy-internet-windows-defender-advanced-threat-protection.md b/windows/security/threat-protection/windows-defender-atp/configure-proxy-internet-windows-defender-advanced-threat-protection.md index 595b8af148..ad4ee5fc7e 100644 --- a/windows/security/threat-protection/windows-defender-atp/configure-proxy-internet-windows-defender-advanced-threat-protection.md +++ b/windows/security/threat-protection/windows-defender-atp/configure-proxy-internet-windows-defender-advanced-threat-protection.md @@ -87,6 +87,12 @@ netsh winhttp set proxy : ``` For example: netsh winhttp set proxy 10.0.0.6:8080 +To reset the winhttp proxy, enter the following command and press **Enter** +``` +netsh winhttp reset proxy +``` +To get more details how to use netsh command,[please see help doc](https://docs.microsoft.com/en-us/windows-server/networking/technologies/netsh/netsh-contexts). + ## Enable access to Windows Defender ATP service URLs in the proxy server If a proxy or firewall is blocking all traffic by default and allowing only specific domains through or HTTPS scanning (SSL inspection) is enabled, make sure that the following URLs are not blocked by default. Do not disable security monitoring or inspection of these URLs, but allow them as you would other internet traffic. They permit communication with Windows Defender ATP service in port 80 and 443: From c68e5f808b4324e0d7b8c465732ae4d405fe761b Mon Sep 17 00:00:00 2001 From: ImranHabib <47118050+joinimran@users.noreply.github.com> Date: Thu, 2 May 2019 12:52:36 +0500 Subject: [PATCH 289/724] Changes applied Changes applied as suggested by copy/edit review. --- .../hello-how-it-works-technology.md | 24 +++++++++---------- 1 file changed, 12 insertions(+), 12 deletions(-) diff --git a/windows/security/identity-protection/hello-for-business/hello-how-it-works-technology.md b/windows/security/identity-protection/hello-for-business/hello-how-it-works-technology.md index 5f740c9437..015c33f72a 100644 --- a/windows/security/identity-protection/hello-for-business/hello-how-it-works-technology.md +++ b/windows/security/identity-protection/hello-for-business/hello-how-it-works-technology.md @@ -24,6 +24,7 @@ ms.date: 10/08/2018 - [Azure AD Registered](#azure-ad-registered) - [Certificate Trust](#certificate-trust) - [Cloud Deployment](#cloud-deployment) +- [Cloud Experience Host](#cloud-experience-host) - [Deployment Type](#deployment-type) - [Endorsement Key](#endorsement-key) - [Federated Environment](#federated-environment) @@ -39,7 +40,6 @@ ms.date: 10/08/2018 - [Storage Root Key](#storage-root-key) - [Trust Type](#trust-type) - [Trusted Platform Module](#trusted-platform-module) -- [Cloud Experience Host](#cloud-experience-host)
## Attestation Identity Keys @@ -100,6 +100,17 @@ The Windows Hello for Business Cloud deployment is exclusively for organizations [Azure AD Joined](#azure-ad-joined), [Azure AD Registered](#azure-ad-registered), [Deployment Type](#deployment-type), [Join Type](#join-type) [Return to Top](hello-how-it-works-technology.md) +## Cloud Experience Host +In Windows 10 Enterprise edition, Cloud Experience Host is an application that helps you join the workplace environment or Azure AD using your company-provided credentials. Once you enroll your device to your workplace environment or Azure AD, your organization will be able to manage your PC and collect information about you (including your location). It might add or remove apps or content, change settings, disable features, prevent you from removing your company account, or reset your PC. + +### Related topics +[Windows Hello for Business](https://docs.microsoft.com/windows/security/identity-protection/hello-for-business/hello-identity-verification), [Managed Windows Hello in Organization](https://docs.microsoft.com/windows/security/identity-protection/hello-for-business/hello-manage-in-organization) + +### More information +- [Windows Hello for Business and Device Registration](https://docs.microsoft.com/windows/security/identity-protection/hello-for-business/hello-how-it-works-device-registration) + +[Return to Top](hello-how-it-works-technology.md) + ## Deployment Type Windows Hello for Business has three deployment models to accommodate the needs of different organizations. The three deployment models include: - Cloud @@ -305,17 +316,6 @@ In a simplified manner, the TPM is a passive component with limited resources. I [Return to Top](hello-how-it-works-technology.md) -## Cloud Experience Host -In Windows 10 Enterprise edition, Cloud Experience Host is an application that helps you join the workplace environment or Azure AD using your company-provided credentials. Once you enroll your device to your workplace environment or Azure AD, your organization will be able to manage your PC and collect information about you (including your location). It might add or remove apps or content, change settings, disable features, prevent you from removing your company account, or reset your PC. - -### Related topics -[Windows Hello for Business](https://docs.microsoft.com/windows/security/identity-protection/hello-for-business/hello-identity-verification), [Managed Windows Hello in Organization](https://docs.microsoft.com/windows/security/identity-protection/hello-for-business/hello-manage-in-organization) - -### More information -- [Windows Hello for Business and Device Registration](https://docs.microsoft.com/windows/security/identity-protection/hello-for-business/hello-how-it-works-device-registration) - -[Return to Top](hello-how-it-works-technology.md) - From 7b810981ee868e7227279be91bbc7ad0bce3785b Mon Sep 17 00:00:00 2001 From: Nicole Turner <39884432+nenonix@users.noreply.github.com> Date: Thu, 2 May 2019 10:54:38 +0200 Subject: [PATCH 290/724] Update windows/deployment/upgrade/use-upgrade-readiness-to-manage-windows-upgrades.md Changed wording. Co-Authored-By: Reeced40 <49645174+Reeced40@users.noreply.github.com> --- .../upgrade/use-upgrade-readiness-to-manage-windows-upgrades.md | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/windows/deployment/upgrade/use-upgrade-readiness-to-manage-windows-upgrades.md b/windows/deployment/upgrade/use-upgrade-readiness-to-manage-windows-upgrades.md index 32fb97cc0f..e3ad02a8ae 100644 --- a/windows/deployment/upgrade/use-upgrade-readiness-to-manage-windows-upgrades.md +++ b/windows/deployment/upgrade/use-upgrade-readiness-to-manage-windows-upgrades.md @@ -13,7 +13,7 @@ ms.topic: article # Use Upgrade Readiness to manage Windows upgrades >[!IMPORTANT] ->**The OMS portal has been deprecated; you should start using the [Azure portal](https://portal.azure.com) instead as soon as possible.** Many experiences are the same in the two portals, but there are some key differences. See [Windows Analytics in the Azure Portal](../update/windows-analytics-azure-portal.md) for steps to use Windows Analytics in the Azure portal. For much more information about the transition from OMS to Azure, see [OMS portal moving to Azure](https://docs.microsoft.com/azure/log-analytics/log-analytics-oms-portal-transition) and [Get started with Upgrade Readiness](https://docs.microsoft.com/windows/deployment/upgrade/upgrade-readiness-get-started). +>>**The OMS portal has been deprecated, so you need to switch to the [Azure portal](https://portal.azure.com) now.** The two portals offer the same experience, with some key differences. Learn how to use [Windows Analytics in the Azure Portal](../update/windows-analytics-azure-portal.md). Find out more about the [OMS portal moving to Azure](https://docs.microsoft.com/azure/log-analytics/log-analytics-oms-portal-transition), or jump right in and [Get started with Upgrade Readiness](https://docs.microsoft.com/windows/deployment/upgrade/upgrade-readiness-get-started). You can use Upgrade Readiness to prioritize and work through application and driver issues, assign and track issue resolution status, and identify computers that are ready to upgrade. Upgrade Readiness enables you to deploy Windows with confidence, knowing that you’ve addressed potential blocking issues. From 33f1c7e37a5e64a7b30c5214c8aea7b1fbcd46bc Mon Sep 17 00:00:00 2001 From: MaratMussabekov <48041687+MaratMussabekov@users.noreply.github.com> Date: Thu, 2 May 2019 15:39:26 +0500 Subject: [PATCH 291/724] update hello-planning-guide.md --- .../hello-for-business/hello-planning-guide.md | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/windows/security/identity-protection/hello-for-business/hello-planning-guide.md b/windows/security/identity-protection/hello-for-business/hello-planning-guide.md index 1700566e52..a936892039 100644 --- a/windows/security/identity-protection/hello-for-business/hello-planning-guide.md +++ b/windows/security/identity-protection/hello-for-business/hello-planning-guide.md @@ -274,7 +274,7 @@ Public key infrastructure prerequisites already exist in your planning worksheet If box **1a** on your planning worksheet reads **cloud only**, ignore the public key infrastructure section of your planning worksheet. Cloud only deployments do not use a public key infrastructure. -If box **1b** on your planning worksheet reads **key trust**, write **N/A** in box **5b** on your planning worksheet. +If box **1b** on your planning worksheet reads **key trust**, write **N/A** in box **5b** on your planning worksheet. Key trust doesn't require any change in public key infrastructure, skip this part and go to **Cloud** section. The registration authority only relates to certificate trust deployments and the management used for domain and non-domain joined devices. Hybrid Azure AD joined devices managed by Group Policy need the Windows Server 2016 AD FS role to issue certificates. Hybrid Azure AD joined devices and Azure AD joined devices managed by Intune or a compatible MDM need the Windows Server NDES server role to issue certificates. From 58618eb4e7609e299ce616f5f9294c95910ff2f6 Mon Sep 17 00:00:00 2001 From: martyav Date: Thu, 2 May 2019 07:40:59 -0400 Subject: [PATCH 292/724] added configuring via the command line section & table --- .../microsoft-defender-atp-mac.md | 22 +++++++++++++++++++ 1 file changed, 22 insertions(+) diff --git a/windows/security/threat-protection/windows-defender-antivirus/microsoft-defender-atp-mac.md b/windows/security/threat-protection/windows-defender-antivirus/microsoft-defender-atp-mac.md index eff522741e..274a348c8b 100644 --- a/windows/security/threat-protection/windows-defender-antivirus/microsoft-defender-atp-mac.md +++ b/windows/security/threat-protection/windows-defender-antivirus/microsoft-defender-atp-mac.md @@ -468,6 +468,28 @@ After installation, you'll see the Microsoft Defender icon in the macOS status b ![Microsoft Defender icon in status bar screenshot](images/MDATP_Icon_Bar.png) +## Configuring with the command line + +Controlling product settings, triggering on-demand scans, and several other important tasks can be done via the following CLI commands: + +|Group |Scenario |Command | +|-------------|-------------------------------------------|-----------------------------------------------------------------------| +|Configuration|Turn on/off real-time protection |`mdatp config --rtp [true/false]` | +|Configuration|Turn on/off cloud protection |`mdatp config --cloud [true/false]` | +|Configuration|Turn on/off product diagnostics |`mdatp config --diagnostic [true/false]` | +|Configuration|Turn on/off automatic sample submission |`mdatp config --sample-submission [true/false]` | +|Configuration|Turn on PUA protection |`mdatp threat --type-handling --potentially_unwanted_application block`| +|Configuration|Turn off PUA protection |`mdatp threat --type-handling --potentially_unwanted_application off` | +|Configuration|Turn on audit mode for PUA protection |`mdatp threat --type-handling --potentially_unwanted_application audit`| +|Diagnostics |Change the log level |`mdatp log-level --[error/warning/info/verbose]` | +|Diagnostics |Generate diagnostic logs |`mdatp --diagnostic` | +|Health |Check the product's health |`mdatp --health` | +|Protection |Scan a path |`mdatp scan --path [path]` | +|Protection |Do a quick scan |`mdatp scan --quick` | +|Protection |Do a full scan |`mdatp scan --full` | +|Protection |Cancel an ongoing on-demand scan |`mdatp scan --cancel` | +|Protection |Request a definition update |`mdatp --signature-update` | + ## What to expect in the ATP portal - Severity From 3c6938f6d81c091be95028cec8c18598fc7c2b5c Mon Sep 17 00:00:00 2001 From: martyav Date: Thu, 2 May 2019 07:54:37 -0400 Subject: [PATCH 293/724] fixed inaccuracies in portal section --- .../microsoft-defender-atp-mac.md | 23 ++++++++----------- 1 file changed, 9 insertions(+), 14 deletions(-) diff --git a/windows/security/threat-protection/windows-defender-antivirus/microsoft-defender-atp-mac.md b/windows/security/threat-protection/windows-defender-antivirus/microsoft-defender-atp-mac.md index 274a348c8b..1e0f483f69 100644 --- a/windows/security/threat-protection/windows-defender-antivirus/microsoft-defender-atp-mac.md +++ b/windows/security/threat-protection/windows-defender-antivirus/microsoft-defender-atp-mac.md @@ -470,7 +470,7 @@ After installation, you'll see the Microsoft Defender icon in the macOS status b ## Configuring with the command line -Controlling product settings, triggering on-demand scans, and several other important tasks can be done via the following CLI commands: +Controlling product settings, triggering on-demand scans, and several other important tasks can be done with the following CLI commands: |Group |Scenario |Command | |-------------|-------------------------------------------|-----------------------------------------------------------------------| @@ -492,9 +492,12 @@ Controlling product settings, triggering on-demand scans, and several other impo ## What to expect in the ATP portal -- Severity -- Scan type -- Antivirus alerts +- AV alerts: + - Severity + - Scan type + - Device information (hostname, machine identifier, tenant identifier, app version, and OS type) + - File information (name, path, size, and hash) + - Threat information (name, type, and state) - Device information: - Machine identifier - Tenant identifier @@ -505,19 +508,11 @@ Controlling product settings, triggering on-demand scans, and several other impo - Computer model - Processor architecture - Whether the device is a virtual machine -- File information: - - Hashes - - Size - - Path - - Name -- Threat information: - - Type - - State - - Name - ## Uninstallation + ### Removing Microsoft Defender ATP from Mac devices + To remove Microsoft Defender ATP from your macOS devices: - Open **Finder > Applications**. Right click on **Microsoft Defender ATP > Move to Trash**. From 38811a81906227c6da50e83308f429cd4bc87f84 Mon Sep 17 00:00:00 2001 From: MaratMussabekov <48041687+MaratMussabekov@users.noreply.github.com> Date: Thu, 2 May 2019 17:02:24 +0500 Subject: [PATCH 294/724] update hello-planning-guide.md --- .../hello-for-business/hello-planning-guide.md | 3 +-- 1 file changed, 1 insertion(+), 2 deletions(-) diff --git a/windows/security/identity-protection/hello-for-business/hello-planning-guide.md b/windows/security/identity-protection/hello-for-business/hello-planning-guide.md index a936892039..05fb09a45a 100644 --- a/windows/security/identity-protection/hello-for-business/hello-planning-guide.md +++ b/windows/security/identity-protection/hello-for-business/hello-planning-guide.md @@ -77,7 +77,7 @@ A deployment's trust type defines how each Windows Hello for Business client aut The key trust type does not require issuing authentication certificates to end users. Users authenticate using a hardware-bound key created during the built-in provisioning experience. This requires an adequate distribution of Windows Server 2016 domain controllers relative to your existing authentication and the number of users included in your Windows Hello for Business deployment. Read the [Planning an adequate number of Windows Server 2016 Domain Controllers for Windows Hello for Business deployments](hello-adequate-domain-controllers.md) to learn more. -The certificate trust type issues authentication certificates to end users. Users authenticate using a certificate requested using a hardware-bound key created during the built-in provisioning experience. Unlike key trust, certificate trust does not require Windows Server 2016 domain controllers. Users can authenticate using their certificate to any Windows Server 2008 R2 or later domain controller. +The certificate trust type issues authentication certificates to end users. Users authenticate using a certificate requested using a hardware-bound key created during the built-in provisioning experience. Unlike key trust, certificate trust does not require Windows Server 2016 domain controllers (but still requires [Windows Server 2016 Active Directory schema](https://docs.microsoft.com/windows/security/identity-protection/hello-for-business/hello-hybrid-cert-trust-prereqs#directories)). Users can authenticate using their certificate to any Windows Server 2008 R2 or later domain controller. #### Device registration @@ -101,7 +101,6 @@ Cloud only and hybrid deployments provide many choices for multi-factor authenti > * Azure Active Directory Premium > * Enterprise Mobility Suite > * Enterprise Cloud Suite ->* A per-user and per-authentication consumption-based model that is billed monthly against Azure monetary commitment (Read [Multi-Factor Authentication Pricing](https://azure.microsoft.com/pricing/details/multi-factor-authentication/) for more information) #### Directory synchronization From 5b548688ea5cf4cea1d854835acd1096ea926e5d Mon Sep 17 00:00:00 2001 From: Nicole Turner <39884432+nenonix@users.noreply.github.com> Date: Thu, 2 May 2019 17:14:14 +0500 Subject: [PATCH 295/724] Update windows/security/threat-protection/windows-defender-atp/configure-proxy-internet-windows-defender-advanced-threat-protection.md Co-Authored-By: joinimran <47118050+joinimran@users.noreply.github.com> --- ...roxy-internet-windows-defender-advanced-threat-protection.md | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/windows/security/threat-protection/windows-defender-atp/configure-proxy-internet-windows-defender-advanced-threat-protection.md b/windows/security/threat-protection/windows-defender-atp/configure-proxy-internet-windows-defender-advanced-threat-protection.md index ad4ee5fc7e..4f6abf1d7e 100644 --- a/windows/security/threat-protection/windows-defender-atp/configure-proxy-internet-windows-defender-advanced-threat-protection.md +++ b/windows/security/threat-protection/windows-defender-atp/configure-proxy-internet-windows-defender-advanced-threat-protection.md @@ -91,7 +91,7 @@ To reset the winhttp proxy, enter the following command and press **Enter** ``` netsh winhttp reset proxy ``` -To get more details how to use netsh command,[please see help doc](https://docs.microsoft.com/en-us/windows-server/networking/technologies/netsh/netsh-contexts). +See [Netsh Command Syntax, Contexts, and Formatting](https://docs.microsoft.com/windows-server/networking/technologies/netsh/netsh-contexts) to learn more. ## Enable access to Windows Defender ATP service URLs in the proxy server If a proxy or firewall is blocking all traffic by default and allowing only specific domains through or HTTPS scanning (SSL inspection) is enabled, make sure that the following URLs are not blocked by default. Do not disable security monitoring or inspection of these URLs, but allow them as you would other internet traffic. They permit communication with Windows Defender ATP service in port 80 and 443: From 9584215fd34e27cfa6c5a264f536a7a31f6d9f1a Mon Sep 17 00:00:00 2001 From: msjbja <49055479+msjbja@users.noreply.github.com> Date: Thu, 2 May 2019 08:50:14 -0500 Subject: [PATCH 296/724] Update windows-local-autopilot-reset.md Addition of the permission required to perform this task --- .../windows-autopilot/windows-autopilot-reset-local.md | 2 ++ 1 file changed, 2 insertions(+) diff --git a/windows/deployment/windows-autopilot/windows-autopilot-reset-local.md b/windows/deployment/windows-autopilot/windows-autopilot-reset-local.md index ac25a597f7..2df22358c3 100644 --- a/windows/deployment/windows-autopilot/windows-autopilot-reset-local.md +++ b/windows/deployment/windows-autopilot/windows-autopilot-reset-local.md @@ -19,6 +19,8 @@ ms.topic: article **Applies to: Windows 10, version 1709 and above +The Microsoft Intune Service Administrator Directory role is required to perform this task. The process of adding directory roles is documented at https://docs.microsoft.com/en-us/azure/active-directory/fundamentals/active-directory-users-assign-role-azure-portal + IT admins can perform a local Windows Autopilot Reset to quickly remove personal files, apps, and settings, and reset Windows 10 devices from the lock screen any time and apply original settings and management enrollment (Azure Active Directory and device management) so the devices are ready to use. With a local Autopilot Reset, devices are returned to a fully configured or known IT-approved state. To enable local Autopilot Reset in Windows 10: From 1372d3faed690728d953a85eba6a7a9efb1eaeaa Mon Sep 17 00:00:00 2001 From: martyav Date: Thu, 2 May 2019 10:37:07 -0400 Subject: [PATCH 297/724] refining what's new section --- .../microsoft-defender-atp-mac.md | 19 ++++++++----------- 1 file changed, 8 insertions(+), 11 deletions(-) diff --git a/windows/security/threat-protection/windows-defender-antivirus/microsoft-defender-atp-mac.md b/windows/security/threat-protection/windows-defender-antivirus/microsoft-defender-atp-mac.md index 1e0f483f69..52531fa8c9 100644 --- a/windows/security/threat-protection/windows-defender-antivirus/microsoft-defender-atp-mac.md +++ b/windows/security/threat-protection/windows-defender-antivirus/microsoft-defender-atp-mac.md @@ -27,18 +27,15 @@ Microsoft Defender ATP for Mac is not yet widely available, and this topic only ## What’s new in the public preview -- Fully accessible -- Various bug fixes -- Improved performance -- Improved user experience -- Improved threat handling -- Localized for 37 languages -- Improved anti-tampering protections -- Feedback and samples can be submitted via the GUI. -- Product health can be queried via Jamf or the command line. -- Reduced delay for Mac devices to appear in the ATP console, following deployment. -- Admins can set their cloud preference for any location, not just those in the US. +We've been working hard through the private preview period, and we've heard your concerns. We've reduced the delay for when new Mac devices appear in the ATP console after they've been deployed. We've improved threat handling, and enhanced the user experience. We've also made numerous bug fixes. Other updates to Microsoft Defender ATP include: +- Full accessibility +- Improved performance +- Localization for 37 languages +- Improved anti-tampering protections +- Feedback and samples can now be submitted via the GUI. +- Product health can be queried with JAMF or the command line. +- Admins can set their cloud preference for any location, not just for those in the US. ## Prerequisites You should have beginner-level experience in macOS and BASH scripting. You must have administrative privileges on the machine. From 12bebd56e8258562ec62b79d7bc13e2f90c26a86 Mon Sep 17 00:00:00 2001 From: martyav Date: Thu, 2 May 2019 11:01:29 -0400 Subject: [PATCH 298/724] markdown linting --- .../microsoft-defender-atp-mac.md | 221 ++++++++++-------- 1 file changed, 127 insertions(+), 94 deletions(-) diff --git a/windows/security/threat-protection/windows-defender-antivirus/microsoft-defender-atp-mac.md b/windows/security/threat-protection/windows-defender-antivirus/microsoft-defender-atp-mac.md index 52531fa8c9..17df14a9be 100644 --- a/windows/security/threat-protection/windows-defender-antivirus/microsoft-defender-atp-mac.md +++ b/windows/security/threat-protection/windows-defender-antivirus/microsoft-defender-atp-mac.md @@ -22,8 +22,8 @@ ms.topic: conceptual >[!IMPORTANT] >Some information relates to prereleased product which may be substantially modified before it's commercially released. Microsoft makes no warranties, express or implied, with respect to the information provided here. -This topic describes how to install and use Microsoft Defender ATP for Mac. It supports the preview program and the information here is subject to change. -Microsoft Defender ATP for Mac is not yet widely available, and this topic only applies to enterprise customers who have been accepted into the preview program. +This topic describes how to install and use Microsoft Defender ATP for Mac. It supports the preview program and the information here is subject to change. +Microsoft Defender ATP for Mac is not yet widely available, and this topic only applies to enterprise customers who have been accepted into the preview program. ## What’s new in the public preview @@ -38,14 +38,17 @@ We've been working hard through the private preview period, and we've heard your - Admins can set their cloud preference for any location, not just for those in the US. ## Prerequisites + You should have beginner-level experience in macOS and BASH scripting. You must have administrative privileges on the machine. You should also have access to Windows Defender Security Center. ### System Requirements + Microsoft Defender ATP for Mac system requirements: + - macOS version: 10.14 (Mojave), 10.13 (High Sierra), 10.12 (Sierra) -- Disk space during preview: 1GB +- Disk space during preview: 1GB After you've enabled the service, you may need to configure your network or firewall to allow outbound connections between it and your endpoints. @@ -57,39 +60,43 @@ The following table lists the services and their associated URLs that your netwo To test that a connection is not blocked, open `https://x.cp.wd.microsoft.com/api/report` and `https://wu-cdn.x.cp.wd.microsoft.com/` in a browser, or run the following command in Terminal: -``` +```bash mavel-mojave:~ testuser$ curl 'https://x.cp.wd.microsoft.com/api/report' OK ``` -We recommend to keep [System Integrity Protection](https://support.apple.com/en-us/HT204899) ([Wiki](https://en.wikipedia.org/wiki/System_Integrity_Protection)) enabled (default setting) on client machines. +We recommend to keep [System Integrity Protection](https://support.apple.com/en-us/HT204899) ([Wiki](https://en.wikipedia.org/wiki/System_Integrity_Protection)) enabled (default setting) on client machines. SIP is a built-in macOS security feature that prevents low-level tampering with the OS. ## Installation and configuration overview -There are various methods and deployment tools that you can use to install and configure Microsoft Defender ATP for Mac. + +There are various methods and deployment tools that you can use to install and configure Microsoft Defender ATP for Mac. In general you'll need to take the following steps: - - Ensure you have a Windows Defender ATP subscription and have access to the Windows Defender ATP Portal - - Deploy Microsoft Defender ATP for Mac using one of the following deployment methods: - * [Microsoft Intune based deployment](#microsoft-intune-based-deployment) - * [JAMF based deployment](#jamf-based-deployment) - * [Manual deployment](#manual-deployment) + +- Ensure you have a Windows Defender ATP subscription and have access to the Windows Defender ATP Portal +- Deploy Microsoft Defender ATP for Mac using one of the following deployment methods: + - [Microsoft Intune based deployment](#microsoft-intune-based-deployment) + - [JAMF based deployment](#jamf-based-deployment) + - [Manual deployment](#manual-deployment) ## Microsoft Intune based deployment ### Download installation and onboarding packages + Download the installation and onboarding packages from Windows Defender Security Center: -1. In Windows Defender Security Center, go to **Settings > Machine Management > Onboarding**. -2. In Section 1 of the page, set operating system to **Linux, macOS, iOS or Android** and Deployment method to **Mobile Device Management / Microsoft Intune**. -3. In Section 2 of the page, select **Download installation package**. Save it as wdav.pkg to a local directory. -4. In Section 2 of the page, select **Download onboarding package**. Save it as WindowsDefenderATPOnboardingPackage.zip to the same directory. -5. Download IntuneAppUtil from https://docs.microsoft.com/en-us/intune/lob-apps-macos. + +1. In Windows Defender Security Center, go to **Settings > Machine Management > Onboarding**. +2. In Section 1 of the page, set operating system to **Linux, macOS, iOS or Android** and Deployment method to **Mobile Device Management / Microsoft Intune**. +3. In Section 2 of the page, select **Download installation package**. Save it as wdav.pkg to a local directory. +4. In Section 2 of the page, select **Download onboarding package**. Save it as WindowsDefenderATPOnboardingPackage.zip to the same directory. +5. Download IntuneAppUtil from [https://docs.microsoft.com/en-us/intune/lob-apps-macos](https://docs.microsoft.com/en-us/intune/lob-apps-macos). ![Windows Defender Security Center screenshot](images/MDATP_2_IntuneAppUtil.png) -6. From a command prompt, verify that you have the three files. +6. From a command prompt, verify that you have the three files. Extract the contents of the .zip files: - - ``` + + ```bash mavel-macmini:Downloads test$ ls -l total 721688 -rw-r--r-- 1 test staff 269280 Mar 15 11:25 IntuneAppUtil @@ -103,13 +110,14 @@ Download the installation and onboarding packages from Windows Defender Security inflating: jamf/WindowsDefenderATPOnboarding.plist mavel-macmini:Downloads test$ ``` -7. Make IntuneAppUtil an executable: + +7. Make IntuneAppUtil an executable: ```mavel-macmini:Downloads test$ chmod +x IntuneAppUtil``` 8. Create the wdav.pkg.intunemac package from wdav.pkg: - ``` + ```bash mavel-macmini:Downloads test$ ./IntuneAppUtil -c wdav.pkg -o . -i "com.microsoft.wdav" -n "1.0.0" Microsoft Intune Application Utility for Mac OS X Version: 1.0.0.0 @@ -124,6 +132,7 @@ Download the installation and onboarding packages from Windows Defender Security ``` ### Client Machine Setup + You need no special provisioning for a Mac machine beyond a standard [Company Portal installation](https://docs.microsoft.com/en-us/intune-user-help/enroll-your-device-in-intune-macos-cp). 1. You'll be asked to confirm device management. @@ -143,17 +152,18 @@ You can enroll additional machines. Optionally, you can do it later, after syste ![Add Devices screenshot](images/MDATP_5_allDevices.png) ### Create System Configuration profiles -1. In Intune open the **Manage > Device configuration** blade. Select **Manage > Profiles > Create Profile**. -2. Choose a name for the profile. Change **Platform=macOS**, **Profile type=Custom**. Select **Configure**. -3. Open the configuration profile and upload intune/kext.xml. This file was created during the Generate settings step above. -4. Select **OK**. + +1. In Intune open the **Manage > Device configuration** blade. Select **Manage > Profiles > Create Profile**. +2. Choose a name for the profile. Change **Platform=macOS**, **Profile type=Custom**. Select **Configure**. +3. Open the configuration profile and upload intune/kext.xml. This file was created during the Generate settings step above. +4. Select **OK**. ![System configuration profiles screenshot](images/MDATP_6_SystemConfigurationProfiles.png) -5. Select **Manage > Assignments**. In the **Include** tab, select **Assign to All Users & All devices**. -7. Repeat these steps with the second profile. -8. Create Profile one more time, give it a name, upload the intune/WindowsDefenderATPOnboarding.xml file. -9. Select **Manage > Assignments**. In the Include tab, select **Assign to All Users & All devices**. +5. Select **Manage > Assignments**. In the **Include** tab, select **Assign to All Users & All devices**. +6. Repeat these steps with the second profile. +7. Create Profile one more time, give it a name, upload the intune/WindowsDefenderATPOnboarding.xml file. +8. Select **Manage > Assignments**. In the Include tab, select **Assign to All Users & All devices**. After Intune changes are propagated to the enrolled machines, you'll see it on the **Monitor > Device status** blade: @@ -161,16 +171,16 @@ After Intune changes are propagated to the enrolled machines, you'll see it on t ### Publish application -1. In Intune, open the **Manage > Client apps** blade. Select **Apps > Add**. -2. Select **App type=Other/Line-of-business app**. -3. Select **file=wdav.pkg.intunemac**. Select **OK** to upload. -4. Select **Configure** and add the required information. -5. Use **macOS Sierra 10.12** as the minimum OS. Other settings can be any other value. +1. In Intune, open the **Manage > Client apps** blade. Select **Apps > Add**. +2. Select **App type=Other/Line-of-business app**. +3. Select **file=wdav.pkg.intunemac**. Select **OK** to upload. +4. Select **Configure** and add the required information. +5. Use **macOS Sierra 10.12** as the minimum OS. Other settings can be any other value. ![Device status blade screenshot](images/MDATP_8_IntuneAppInfo.png) 6. Select **OK** and **Add**. - + ![Device status blade screenshot](images/MDATP_9_IntunePkgInfo.png) 7. It will take a while to upload the package. After it's done, select the name and then go to **Assignments** and **Add group**. @@ -187,7 +197,8 @@ After Intune changes are propagated to the enrolled machines, you'll see it on t ![Intune device status screenshot](images/MDATP_12_DeviceInstall.png) ### Verify client machine state -1. After the configuration profiles are deployed to your machines, on your Mac device, open **System Preferences > Profiles**. + +1. After the configuration profiles are deployed to your machines, on your Mac device, open **System Preferences > Profiles**. ![System Preferences screenshot](images/MDATP_13_SystemPreferences.png) ![System Preferences Profiles screenshot](images/MDATP_14_SystemPreferencesProfiles.png) @@ -195,30 +206,33 @@ After Intune changes are propagated to the enrolled machines, you'll see it on t 2. Verify the three profiles listed there: ![Profiles screenshot](images/MDATP_15_ManagementProfileConfig.png) -3. The **Management Profile** should be the Intune system profile. -4. wdav-config and wdav-kext are system configuration profiles that we added in Intune. -5. You should also see the Microsoft Defender icon in the top-right corner: +3. The **Management Profile** should be the Intune system profile. +4. wdav-config and wdav-kext are system configuration profiles that we added in Intune. +5. You should also see the Microsoft Defender icon in the top-right corner: ![Microsoft Defender icon in status bar screenshot](images/MDATP_Icon_Bar.png) ## JAMF based deployment -### Prerequsites -You need to be familiar with JAMF administration tasks, have a JAMF tenant, and know how to deploy packages. This includes a properly configured distribution point. JAMF has many alternative ways to complete the same task. These instructions provide you an example for most common processes. Your organization might use a different workflow. +### Prerequsites + +You need to be familiar with JAMF administration tasks, have a JAMF tenant, and know how to deploy packages. This includes a properly configured distribution point. JAMF has many alternative ways to complete the same task. These instructions provide you an example for most common processes. Your organization might use a different workflow. ### Download installation and onboarding packages + Download the installation and onboarding packages from Windows Defender Security Center: -1. In Windows Defender Security Center, go to **Settings > Machine Management > Onboarding**. -2. In Section 1 of the page, set operating system to **Linux, macOS, iOS or Android** and Deployment method to **Mobile Device Management / Microsoft Intune**. -3. In Section 2 of the page, select **Download installation package**. Save it as wdav.pkg to a local directory. -4. In Section 2 of the page, select **Download onboarding package**. Save it as WindowsDefenderATPOnboardingPackage.zip to the same directory. + +1. In Windows Defender Security Center, go to **Settings > Machine Management > Onboarding**. +2. In Section 1 of the page, set operating system to **Linux, macOS, iOS or Android** and Deployment method to **Mobile Device Management / Microsoft Intune**. +3. In Section 2 of the page, select **Download installation package**. Save it as wdav.pkg to a local directory. +4. In Section 2 of the page, select **Download onboarding package**. Save it as WindowsDefenderATPOnboardingPackage.zip to the same directory. ![Windows Defender Security Center screenshot](images/MDATP_2_IntuneAppUtil.png) -5. From a command prompt, verify that you have the two files. +5. From a command prompt, verify that you have the two files. Extract the contents of the .zip files: - - ``` + + ```bash mavel-macmini:Downloads test$ ls -l total 721160 -rw-r--r-- 1 test staff 11821 Mar 15 09:23 WindowsDefenderATPOnboardingPackage.zip @@ -230,18 +244,19 @@ Download the installation and onboarding packages from Windows Defender Security inflating: intune/WindowsDefenderATPOnboarding.xml inflating: jamf/WindowsDefenderATPOnboarding.plist mavel-macmini:Downloads test$ - ``` + ``` ### Create JAMF Policies + You need to create a configuration profile and a policy to start deploying Microsoft Defender ATP for Mac to client machines. #### Configuration Profile + The configuration profile contains one custom settings payload that includes: -- Microsoft Defender ATP for Mac onboarding information +- Microsoft Defender ATP for Mac onboarding information - Approved Kernel Extensions payload to enable the Microsoft kernel driver to run - 1. Upload jamf/WindowsDefenderATPOnboarding.plist as the Property List File. >[!NOTE] @@ -252,15 +267,17 @@ The configuration profile contains one custom settings payload that includes: #### Approved Kernel Extension To approve the kernel extension: -1. In **Computers > Configuration Profiles** select **Options > Approved Kernel Extensions**. -2. Use **UBF8T346G9** for Team Id. + +1. In **Computers > Configuration Profiles** select **Options > Approved Kernel Extensions**. +2. Use **UBF8T346G9** for Team Id. ![Approved kernel extensions screenshot](images/MDATP_17_approvedKernelExtensions.png) -#### Configuration Profile's Scope +#### Configuration Profile's Scope + Configure the appropriate scope to specify the machines that will receive this configuration profile. -Open Computers -> Configuration Profiles, select **Scope > Targets**. Select the appropriate Target computers. +Open Computers -> Configuration Profiles, select **Scope > Targets**. Select the appropriate Target computers. ![Configuration profile scope screenshot](images/MDATP_18_ConfigurationProfilesScope.png) @@ -269,14 +286,16 @@ Save the **Configuration Profile**. Use the **Logs** tab to monitor deployment status for each enrolled machine. #### Package + 1. Create a package in **Settings > Computer Management > Packages**. ![Computer management packages screenshot](images/MDATP_19_MicrosoftDefenderWDAVPKG.png) -2. Upload wdav.pkg to the Distribution Point. +2. Upload wdav.pkg to the Distribution Point. 3. In the **filename** field, enter the name of the package. For example, wdav.pkg. #### Policy + Your policy should contain a single package for Microsoft Defender. ![Microsoft Defender packages screenshot](images/MDATP_20_MicrosoftDefenderPackages.png) @@ -286,34 +305,38 @@ Configure the appropriate scope to specify the computers that will receive this After you save the Configuration Profile, you can use the Logs tab to monitor the deployment status for each enrolled machine. ### Client machine setup + You need no special provisioning for a macOS computer beyond the standard JAMF Enrollment. > [!NOTE] -> After a computer is enrolled, it will show up in the Computers inventory (All Computers). +> After a computer is enrolled, it will show up in the Computers inventory (All Computers). -1. Open the machine details, from **General** tab, and make sure that **User Approved MDM** is set to **Yes**. If it's set to No, the user needs to open **System Preferences > Profiles** and select **Approve** on the MDM Profile. +1. Open the machine details, from **General** tab, and make sure that **User Approved MDM** is set to **Yes**. If it's set to No, the user needs to open **System Preferences > Profiles** and select **Approve** on the MDM Profile. ![MDM approve button screenshot](images/MDATP_21_MDMProfile1.png) ![MDM screenshot](images/MDATP_22_MDMProfileApproved.png) -After some time, the machine's User Approved MDM status will change to Yes. +After some time, the machine's User Approved MDM status will change to Yes. ![MDM status screenshot](images/MDATP_23_MDMStatus.png) You can enroll additional machines now. Optionally, can do it after system configuration and application packages are provisioned. ### Deployment + Enrolled client machines periodically poll the JAMF Server and install new configuration profiles and policies as soon as they are detected. #### Status on server + You can monitor the deployment status in the Logs tab: - - **Pending** means that the deployment is scheduled but has not yet happened - - **Completed** means that the deployment succeeded and is no longer scheduled + +- **Pending** means that the deployment is scheduled but has not yet happened +- **Completed** means that the deployment succeeded and is no longer scheduled ![Status on server screenshot](images/MDATP_24_StatusOnServer.png) - #### Status on client machine + After the Configuration Profile is deployed, you'll see the profile on the machine in the **System Preferences > Profiles >** Name of Configuration Profile. ![Status on client screenshot](images/MDATP_25_StatusOnClient.png) @@ -324,7 +347,7 @@ After the policy is applied, you'll see the Microsoft Defender icon in the macOS You can monitor policy installation on a machine by following the JAMF's log file: -``` +```bash mavel-mojave:~ testuser$ tail -f /var/log/jamf.log Thu Feb 21 11:11:41 mavel-mojave jamf[7960]: No patch policies were found. Thu Feb 21 11:16:41 mavel-mojave jamf[8051]: Checking for policies triggered by "recurring check-in" for user "testuser"... @@ -336,7 +359,8 @@ Thu Feb 21 11:17:23 mavel-mojave jamf[8051]: No patch policies were found. ``` You can also check the onboarding status: -``` + +```bash mavel-mojave:~ testuser$ sudo /Library/Extensions/wdavkext.kext/Contents/Resources/Tools/wdavconfig.py uuid : 69EDB575-22E1-53E1-83B8-2E1AB1E410A6 orgid : 79109c9d-83bb-4f3e-9152-8d75ee59ae22 @@ -349,6 +373,7 @@ orgid effective : 79109c9d-83bb-4f3e-9152-8d75ee59ae22 - **orgid effective**: This is the Microsoft Defender ATP org id currently in use. If it does not match the value in the Configuration Profile, then the configuration has not been refreshed. ### Uninstalling Microsoft Defender ATP for Mac + #### Uninstalling with a script Create a script in **Settings > Computer Management > Scripts**. @@ -357,7 +382,7 @@ Create a script in **Settings > Computer Management > Scripts**. For example, this script removes Microsoft Defender ATP from the /Applications directory: -``` +```bash echo "Is WDAV installed?" ls -ld '/Applications/Microsoft Defender ATP.app' 2>/dev/null @@ -371,6 +396,7 @@ echo "Done!" ``` #### Uninstalling with a policy + Your policy should contain a single script: ![Microsoft Defender uninstall script screenshot](images/MDATP_27_UninstallScript.png) @@ -381,7 +407,7 @@ Configure the appropriate scope in the **Scope** tab to specify the machines tha You can check that machines are correctly onboarded by creating a script. For example, the following script checks that enrolled machines are onboarded: -``` +```bash sudo /Library/Extensions/wdavkext.kext/Contents/Resources/Tools/wdavconfig.py | grep -E 'orgid effective : [-a-zA-Z0-9]+' ``` @@ -390,18 +416,20 @@ This script returns 0 if Microsoft Defender ATP is registered with the Windows D ## Manual deployment ### Download installation and onboarding packages + Download the installation and onboarding packages from Windows Defender Security Center: -1. In Windows Defender Security Center, go to **Settings > Machine Management > Onboarding**. -2. In Section 1 of the page, set operating system to **Linux, macOS, iOS or Android** and Deployment method to **Local script**. -3. In Section 2 of the page, select **Download installation package**. Save it as wdav.pkg to a local directory. -4. In Section 2 of the page, select **Download onboarding package**. Save it as WindowsDefenderATPOnboardingPackage.zip to the same directory. + +1. In Windows Defender Security Center, go to **Settings > Machine Management > Onboarding**. +2. In Section 1 of the page, set operating system to **Linux, macOS, iOS or Android** and Deployment method to **Local script**. +3. In Section 2 of the page, select **Download installation package**. Save it as wdav.pkg to a local directory. +4. In Section 2 of the page, select **Download onboarding package**. Save it as WindowsDefenderATPOnboardingPackage.zip to the same directory. ![Windows Defender Security Center screenshot](images/MDATP_2_IntuneAppUtil.png) -5. From a command prompt, verify that you have the two files. +5. From a command prompt, verify that you have the two files. Extract the contents of the .zip files: - - ``` + + ```bash mavel-macmini:Downloads test$ ls -l total 721152 -rw-r--r-- 1 test staff 6185 Mar 15 10:45 WindowsDefenderATPOnboardingPackage.zip @@ -409,9 +437,10 @@ Download the installation and onboarding packages from Windows Defender Security mavel-macmini:Downloads test$ unzip WindowsDefenderATPOnboardingPackage.zip Archive: WindowsDefenderATPOnboardingPackage.zip inflating: WindowsDefenderATPOnboarding.py - ``` + ``` ### Application installation + To complete this process, you must have admin privileges on the machine. 1. Navigate to the downloaded wdav.pkg in Finder and open it. @@ -431,36 +460,38 @@ To complete this process, you must have admin privileges on the machine. ![Security and privacy window screenshot](images/MDATP_31_SecurityPrivacySettings.png) - The installation will proceed. > [!NOTE] > If you don't select **Allow**, the installation will fail after 5 minutes. You can restart it again at any time. ### Client configuration -1. Copy wdav.pkg and WindowsDefenderATPOnboarding.py to the machine where you deploy Microsoft Defender ATP for Mac. + +1. Copy wdav.pkg and WindowsDefenderATPOnboarding.py to the machine where you deploy Microsoft Defender ATP for Mac. The client machine is not associated with orgId. Note that the orgid is blank. - ``` + ```bash mavel-mojave:wdavconfig testuser$ sudo /Library/Extensions/wdavkext.kext/Contents/Resources/Tools/wdavconfig.py uuid : 69EDB575-22E1-53E1-83B8-2E1AB1E410A6 orgid : ``` -2. Install the configuration file on a client machine: - ``` +2. Install the configuration file on a client machine: + + ```bash mavel-mojave:wdavconfig testuser$ python WindowsDefenderATPOnboarding.py Generating /Library/Application Support/Microsoft/Defender/com.microsoft.wdav.atp.plist ... (You may be required to enter sudos password) ``` -3. Verify that the machine is now associated with orgId: +3. Verify that the machine is now associated with orgId: - ``` + ```bash mavel-mojave:wdavconfig testuser$ sudo /Library/Extensions/wdavkext.kext/Contents/Resources/Tools/wdavconfig.py uuid : 69EDB575-22E1-53E1-83B8-2E1AB1E410A6 orgid : E6875323-A6C0-4C60-87AD-114BBE7439B8 ``` + After installation, you'll see the Microsoft Defender icon in the macOS status bar in the top-right corner. ![Microsoft Defender icon in status bar screenshot](images/MDATP_Icon_Bar.png) @@ -490,7 +521,7 @@ Controlling product settings, triggering on-demand scans, and several other impo ## What to expect in the ATP portal - AV alerts: - - Severity + - Severity - Scan type - Device information (hostname, machine identifier, tenant identifier, app version, and OS type) - File information (name, path, size, and hash) @@ -528,37 +559,39 @@ Or, from a command line: - Geo preference for telemetry traffic is not supported yet. Cloud traffic is routed to the US only. - Centrally managed uninstall is still being developed. As a workaround, a manual uninstall must be performed on each client device. - ## Collecting diagnostic information + If you can reproduce a problem, please increase the logging level, run the system for some time, and restore the logging level to the default. 1) Increase logging level: -``` - mavel-mojave:~ testuser$ mdatp log-level --verbose - Creating connection to daemon - Connection established - Operation succeeded + +```bash + mavel-mojave:~ testuser$ mdatp log-level --verbose + Creating connection to daemon + Connection established + Operation succeeded ``` 2) Reproduce the problem 3) Run `mdatp --diagnostic` to backup Defender ATP's logs. The command will print out location with generated zip file. - ``` + ```bash mavel-mojave:~ testuser$ mdatp --diagnostic Creating connection to daemon Connection established "/Library/Application Support/Microsoft/Defender/wdavdiag/d85e7032-adf8-434a-95aa-ad1d450b9a2f.zip" - ``` - + ``` + 4) Restore logging level: -``` + + ```bash mavel-mojave:~ testuser$ mdatp log-level --info Creating connection to daemon Connection established Operation succeeded -``` + ``` - ### Installation issues + If an error occurs during installation, the installer will only report a general failure. The detailed log is saved to /Library/Logs/Microsoft/wdav.install.log. If you experience issues during installation, send us this file so we can help diagnose the cause. From 4336fb97432614ec0cfe4b69e2c61bbb200e404c Mon Sep 17 00:00:00 2001 From: JohanFreelancer9 <48568725+JohanFreelancer9@users.noreply.github.com> Date: Thu, 2 May 2019 12:13:50 -0500 Subject: [PATCH 299/724] Update windows/deployment/windows-autopilot/windows-autopilot-reset-local.md Adjusting the wording based on suggestion by JohnFreelancer9 Co-Authored-By: msjbja <49055479+msjbja@users.noreply.github.com> --- .../windows-autopilot/windows-autopilot-reset-local.md | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/windows/deployment/windows-autopilot/windows-autopilot-reset-local.md b/windows/deployment/windows-autopilot/windows-autopilot-reset-local.md index 2df22358c3..5f82790f46 100644 --- a/windows/deployment/windows-autopilot/windows-autopilot-reset-local.md +++ b/windows/deployment/windows-autopilot/windows-autopilot-reset-local.md @@ -19,7 +19,7 @@ ms.topic: article **Applies to: Windows 10, version 1709 and above -The Microsoft Intune Service Administrator Directory role is required to perform this task. The process of adding directory roles is documented at https://docs.microsoft.com/en-us/azure/active-directory/fundamentals/active-directory-users-assign-role-azure-portal +The Microsoft Intune Service Administrator Directory role is required to perform this task. To learn more about the process of adding directory roles, refer to https://docs.microsoft.com/en-us/azure/active-directory/fundamentals/active-directory-users-assign-role-azure-portal IT admins can perform a local Windows Autopilot Reset to quickly remove personal files, apps, and settings, and reset Windows 10 devices from the lock screen any time and apply original settings and management enrollment (Azure Active Directory and device management) so the devices are ready to use. With a local Autopilot Reset, devices are returned to a fully configured or known IT-approved state. From b37b1b9e69ebd787de443bc26d601baa6d431bf2 Mon Sep 17 00:00:00 2001 From: Joyce Y <47188252+mypil@users.noreply.github.com> Date: Thu, 2 May 2019 12:44:43 -0500 Subject: [PATCH 300/724] Update windows/deployment/windows-autopilot/windows-autopilot-reset-local.md Changes committed to fit Microsoft style Co-Authored-By: msjbja <49055479+msjbja@users.noreply.github.com> --- .../windows-autopilot/windows-autopilot-reset-local.md | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/windows/deployment/windows-autopilot/windows-autopilot-reset-local.md b/windows/deployment/windows-autopilot/windows-autopilot-reset-local.md index 5f82790f46..c94be655bb 100644 --- a/windows/deployment/windows-autopilot/windows-autopilot-reset-local.md +++ b/windows/deployment/windows-autopilot/windows-autopilot-reset-local.md @@ -19,7 +19,7 @@ ms.topic: article **Applies to: Windows 10, version 1709 and above -The Microsoft Intune Service Administrator Directory role is required to perform this task. To learn more about the process of adding directory roles, refer to https://docs.microsoft.com/en-us/azure/active-directory/fundamentals/active-directory-users-assign-role-azure-portal +The Intune Service Administrator role is required to perform this task. Learn more about how to [Assign Azure Active Directory roles](https://docs.microsoft.com/azure/active-directory/fundamentals/active-directory-users-assign-role-azure-portal). IT admins can perform a local Windows Autopilot Reset to quickly remove personal files, apps, and settings, and reset Windows 10 devices from the lock screen any time and apply original settings and management enrollment (Azure Active Directory and device management) so the devices are ready to use. With a local Autopilot Reset, devices are returned to a fully configured or known IT-approved state. From 78cf0150a08587a7321277c9fe4090762cdf6a53 Mon Sep 17 00:00:00 2001 From: martyav Date: Thu, 2 May 2019 14:22:37 -0400 Subject: [PATCH 301/724] updated known issues + small refinements to other owned sections --- .../microsoft-defender-atp-mac.md | 9 +++------ 1 file changed, 3 insertions(+), 6 deletions(-) diff --git a/windows/security/threat-protection/windows-defender-antivirus/microsoft-defender-atp-mac.md b/windows/security/threat-protection/windows-defender-antivirus/microsoft-defender-atp-mac.md index a145ddc2d6..e159d86a94 100644 --- a/windows/security/threat-protection/windows-defender-antivirus/microsoft-defender-atp-mac.md +++ b/windows/security/threat-protection/windows-defender-antivirus/microsoft-defender-atp-mac.md @@ -27,7 +27,7 @@ Microsoft Defender ATP for Mac is not yet widely available, and this topic only ## What’s new in the public preview -We've been working hard through the private preview period, and we've heard your concerns. We've reduced the delay for when new Mac devices appear in the ATP console after they've been deployed. We've improved threat handling, and enhanced the user experience. We've also made numerous bug fixes. Other updates to Microsoft Defender ATP include: +We've been working hard through the private preview period, and we've heard your concerns. We've reduced the delay for when new Mac devices appear in the ATP console after they've been deployed. We've improved threat handling, and enhanced the user experience. We've also made numerous bug fixes. Other updates to Microsoft Defender ATP for Mac include: - Full accessibility - Improved performance @@ -501,7 +501,7 @@ After installation, you'll see the Microsoft Defender icon in the macOS status b ## Configuring with the command line -Controlling product settings, triggering on-demand scans, and several other important tasks can be done with the following CLI commands: +Controlling product settings, triggering on-demand scans, and several other important tasks can be done from the command line with the following commands: |Group |Scenario |Command | |-------------|-------------------------------------------|-----------------------------------------------------------------------| @@ -554,12 +554,9 @@ Or, from a command line: ## Known issues -- Not localized yet. -- There might be accessibility issues. -- Not optimized for performance or disk space yet. +- Not fully optimized for performance or disk space yet. - Full Windows Defender ATP integration is not available yet. - Mac devices that switch networks may appear multiple times in the APT portal. -- Geo preference for telemetry traffic is not supported yet. Cloud traffic is routed to the US only. - Centrally managed uninstall is still being developed. As a workaround, a manual uninstall must be performed on each client device. ## Collecting diagnostic information From 43e1ab45f44c74d6e99d53bb91ec4216c5f36e6a Mon Sep 17 00:00:00 2001 From: "Nisha Mittal (Wipro Ltd.)" Date: Thu, 2 May 2019 17:12:09 -0700 Subject: [PATCH 302/724] New Content added for product 1809 --- ...windows-10-1809-and-windows-server-2019.yml | 18 ++++++++++++++---- 1 file changed, 14 insertions(+), 4 deletions(-) diff --git a/windows/release-information/status-windows-10-1809-and-windows-server-2019.yml b/windows/release-information/status-windows-10-1809-and-windows-server-2019.yml index 82bcf3314f..1a0496c699 100644 --- a/windows/release-information/status-windows-10-1809-and-windows-server-2019.yml +++ b/windows/release-information/status-windows-10-1809-and-windows-server-2019.yml @@ -65,16 +65,17 @@ sections: - type: markdown text: "
This table offers a summary of current active issues and those issues that have been resolved in the last 30 days.

+ + + - -
SummaryOriginating updateStatusLast updated
Printing from Microsoft Edge or other UWP apps, you may receive the error 0x80070007
Attempting to print from Microsoft Edge or other Universal Windows Platform (UWP) applications, you may receive an error.

See details >
OS Build 17763.379

March 12, 2019
KB4489899
Mitigated
May 02, 2019
04:47 PM PT
Devices with some Asian language packs installed may receive an error
After installing KB4493509, devices with some Asian language packs installed may receive the error, \"0x800f0982 - PSFX_E_MATCHING_COMPONENT_NOT_FOUND.\"

See details >
OS Build 17763.437

April 09, 2019
KB4493509
Mitigated
May 02, 2019
04:36 PM PT
System may be unresponsive after restart if ArcaBit antivirus software installed
Devices with ArcaBit antivirus software installed may become unresponsive upon restart.

See details >
OS Build 17763.437

April 09, 2019
KB4493509
Mitigated
April 25, 2019
02:00 PM PT
Custom URI schemes may not start corresponding application
Custom URI schemes for application protocol handlers may not start the corresponding application for local intranet and trusted sites in Internet Explorer.

See details >
OS Build 17763.379

March 12, 2019
KB4489899
Mitigated
April 09, 2019
10:00 AM PT
Issue using PXE to start a device from WDS
Using PXE to start a device from a WDS server configured to use Variable Window Extension may cause the connection to the WDS server to terminate prematurely.

See details >
OS Build 17763.379

March 12, 2019
KB4489899
Mitigated
April 09, 2019
10:00 AM PT
Certain operations performed on a Cluster Shared Volume may fail
Certain operations, such as rename, performed on files or folders on a Cluster Shared Volume (CSV) may fail with the error, \"STATUS_BAD_IMPERSONATION_LEVEL (0xC00000A5)\".

See details >
OS Build 17763.253

January 08, 2019
KB4480116
Mitigated
April 09, 2019
10:00 AM PT
Audio not working on monitors or TV connected to a PC via HDMI, USB, or DisplayPort
Upgrade block: Microsoft has identified issues with certain new Intel display drivers, which accidentally turn on unsupported features in Windows.

See details >
OS Build 17763.134

November 13, 2018
KB4467708
Mitigated
March 15, 2019
12:00 PM PT
Certain operations performed on a Cluster Shared Volume may fail
Certain operations, such as rename, performed on files or folders on a Cluster Shared Volume (CSV) may fail with the error, \"STATUS_BAD_IMPERSONATION_LEVEL (0xC00000A5)\".

See details >
OS Build 17763.253

January 08, 2019
KB4480116
Mitigated
January 08, 2019
10:00 AM PT
End-user-defined characters (EUDC) may cause blue screen at startup
If you enable per font end-user-defined characters (EUDC), the system may stop working and a blue screen may appear at startup.

See details >
OS Build 17763.404

April 02, 2019
KB4490481
Resolved
KB4493509
April 09, 2019
10:00 AM PT
Internet Explorer 11 authentication issue with multiple concurrent logons
Internet Explorer 11 users may encounter issues if two or more people use the same user account for multiple, concurrent login sessions on the same Windows Server machine.

See details >
OS Build 17763.253

January 08, 2019
KB4480116
Resolved
KB4493509
April 09, 2019
10:00 AM PT
MSXML6 may cause applications to stop responding
MSXML6 may cause applications to stop responding if an exception was thrown during node operations, such as appendChild(), insertBefore(), and moveNode().

See details >
OS Build 17763.253

January 08, 2019
KB4480116
Resolved
KB4493509
April 09, 2019
10:00 AM PT
Embedded objects may display incorrectly
Any compound document (OLE) server application that places embedded objects into the Windows Metafile (WMF) using the PatBlt API may display embedded objects incorrectly.

See details >
OS Build 17763.316

February 12, 2019
KB4487044
Resolved
KB4493509
April 09, 2019
10:00 AM PT
Apps may stop working after selecting an audio output device other than the default
Users with multiple audio devices that select an audio output device different from the \"Default Audio Device\" may find certain applications stop working unexpectedly.

See details >
OS Build 17763.348

March 01, 2019
KB4482887
Resolved
KB4490481
April 02, 2019
10:00 AM PT
" @@ -85,6 +86,16 @@ sections:
" +- title: May 2019 +- items: + - type: markdown + text: " + + + +
DetailsOriginating updateStatusHistory
Printing from Microsoft Edge or other UWP apps, you may receive the error 0x80070007
When attempting to print from Microsoft Edge or other Universal Windows Platform (UWP) applications you may receive the error, \"Your printer has experienced an unexpected configuration problem. 0x80070007e.\"
 
Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019
  • Server: Windows Server, version 1809; Windows Server 2019
Workaround: You can use another browser, such as Internet Explorer to print your documents.
 
Next steps: Microsoft is working on a resolution and will provide an update in an upcoming release.

Back to top
OS Build 17763.379

March 12, 2019
KB4489899
Mitigated
Last updated:
May 02, 2019
04:47 PM PT

Opened:
May 02, 2019
04:47 PM PT
Devices with some Asian language packs installed may receive an error
After installing KB4493509, devices with some Asian language packs installed may receive the error, \"0x800f0982 - PSFX_E_MATCHING_COMPONENT_NOT_FOUND.\"

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019
  • Server: Windows Server, version 1809; Windows Server 2019
Workaround:
  1. Uninstall and reinstall any recently added language packs. For instructions, see \"Manage the input and display language settings in Windows 10\".
  2. Click Check for Updates and install the April 2019 Cumulative Update. For instructions, see \"Update Windows 10\".
  3. Reset your PC:
  4. Go to Settings app -> Recovery.
  5. Click on Get Started under \"Reset this PC\" recovery option.
  6. Select \"Keep my Files\".

Next steps: Microsoft is working on a resolution and will provide an update in an upcoming release.

Back to top
OS Build 17763.437

April 09, 2019
KB4493509
Mitigated
Last updated:
May 02, 2019
04:36 PM PT

Opened:
May 02, 2019
04:36 PM PT
+ " + - title: April 2019 - items: - type: markdown @@ -103,7 +114,6 @@ sections:
Custom URI schemes may not start corresponding application
After installing KB4489899, custom URI schemes for application protocol handlers may not start the corresponding application for local intranet and trusted sites security zones on Internet Explorer.

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10, version 1607; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 10 Enterprise LTSB 2015; Windows 8.1; Windows 7 SP1 
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2; Windows Server 2008 R2 SP1
Workaround: Right-click the URL link to open it in a new window or tab, or enable Protected Mode in Internet Explorer for local intranet and trusted sites
  1. Go to Tools > Internet options > Security.
  2. Within Select a zone to view of change security settings, select Local intranet and then select Enable Protected Mode.
  3. Select Trusted Sites and then select Enable Protected Mode
  4. Select OK.
You must restart the browser after making these changes. 
 
Next steps: Microsoft is working on a resolution and will provide an update in an upcoming release. 

Back to top
OS Build 17763.379

March 12, 2019
KB4489899
Mitigated
Last updated:
April 09, 2019
10:00 AM PT

Opened:
March 12, 2019
10:00 AM PT
Issue using PXE to start a device from WDS
After installing KB4489899, there may be issues using the Preboot Execution Environment (PXE) to start a device from a Windows Deployment Services (WDS) server configured to use Variable Window Extension. This may cause the connection to the WDS server to terminate prematurely while downloading the image. This issue does not affect clients or devices that are not using Variable Window Extension. 

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1607; Windows 10 Enterprise LTSC 2016; Windows 8.1
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server 2016; Windows Server 2012 R2; Windows Server 2012
Workaround: To mitigate the issue, disable the Variable Window Extension on WDS server using one of the following options:

Option 1:
Open an Administrator Command prompt and type the following:
Wdsutil /Set-TransportServer /EnableTftpVariableWindowExtension:No 
 

Option 2:
Use the Windows Deployment Services UI to make the following adjustment: 
  1. Open Windows Deployment Services from Windows Administrative Tools. 
  2. Expand Servers and right-click a WDS server. 
  3. Open its properties and clear the Enable Variable Window Extension box on the TFTP tab.
Option 3:
Set the following registry value to 0:
HKLM\\System\\CurrentControlSet\\Services\\WDSServer\\Providers\\WDSTFTP\\EnableVariableWindowExtension  

Restart the WDSServer service after disabling the Variable Window Extension. 

Next steps: Microsoft is working on a resolution and will provide an update in an upcoming release. 

Back to top
OS Build 17763.379

March 12, 2019
KB4489899
Mitigated
Last updated:
April 09, 2019
10:00 AM PT

Opened:
March 12, 2019
10:00 AM PT
Apps may stop working after selecting an audio output device other than the default
After installing KB4482887 on machines that have multiple audio devices, applications that provide advanced options for internal or external audio output devices may stop working unexpectedly. This issue occurs for users that select an audio output device different from the \"Default Audio Device\". Examples of applications that may stop working include: 
  • Windows Media Player 
  • Realtek HD Audio Manager 
  • Sound Blaster Control Panel 
Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019
  • Server: Windows Server, version 1809; Windows Server 2019
Resolution: This issue was resolved in KB4490481

Back to top
OS Build 17763.348

March 01, 2019
KB4482887
Resolved
KB4490481
Resolved:
April 02, 2019
10:00 AM PT

Opened:
March 01, 2019
10:00 AM PT
" @@ -121,7 +131,7 @@ sections: - type: markdown text: " - +
DetailsOriginating updateStatusHistory
Certain operations performed on a Cluster Shared Volume may fail
Certain operations, such as rename, that you perform on files or folders that are on a Cluster Shared Volume (CSV) may fail with the error, \"STATUS_BAD_IMPERSONATION_LEVEL (0xC00000A5)\". This occurs when you perform the operation on a CSV owner node from a process that doesn’t have administrator privilege. 

Affected platforms: 
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10, version 1607; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 10 Enterprise LTSB 2015; Windows 8.1
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2; Windows Server 2012
Workaround: Do one of the following:  
  • Perform the operation from a process that has administrator privilege. 
  • Perform the operation from a node that doesn’t have CSV ownership. 
Next steps: Microsoft is working on a resolution and will provide an update in an upcoming release.

Back to top
OS Build 17763.253

January 08, 2019
KB4480116
Mitigated
Last updated:
January 08, 2019
10:00 AM PT

Opened:
January 08, 2019
10:00 AM PT
Certain operations performed on a Cluster Shared Volume may fail
Certain operations, such as rename, that you perform on files or folders that are on a Cluster Shared Volume (CSV) may fail with the error, \"STATUS_BAD_IMPERSONATION_LEVEL (0xC00000A5)\". This occurs when you perform the operation on a CSV owner node from a process that doesn’t have administrator privilege. 

Affected platforms: 
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10, version 1607; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 10 Enterprise LTSB 2015; Windows 8.1
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2; Windows Server 2012
Workaround: Do one of the following:  
  • Perform the operation from a process that has administrator privilege. 
  • Perform the operation from a node that doesn’t have CSV ownership. 
Next steps: Microsoft is working on a resolution and will provide an update in an upcoming release.

Back to top
OS Build 17763.253

January 08, 2019
KB4480116
Mitigated
Last updated:
April 09, 2019
10:00 AM PT

Opened:
January 08, 2019
10:00 AM PT
Internet Explorer 11 authentication issue with multiple concurrent logons
After installing KB4480116, Internet Explorer 11 and other applications that use WININET.DLL may have authentication issues. This occurs when two or more people use the same user account for multiple, concurrent login sessions on the same Windows Server machine, including Remote Desktop Protocol (RDP) and Terminal Server logons. Symptoms reported by customers include, but may not be limited to: 
  • Cache size and location show zero or empty. 
  • Keyboard shortcuts may not work properly. 
  • Webpages may intermittently fail to load or render correctly. 
  • Issues with credential prompts. 
  • Issues when downloading files. 
Affected platforms: 
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1607; Windows 10 Enterprise LTSC 2016; Windows 8.1; Windows 7 SP1
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server 2016; Windows Server 2012 R2; Windows Server 2012; Windows Server 2008 R2 SP1
Resolution: This issue was resolved in KB4493509

Back to top
OS Build 17763.253

January 08, 2019
KB4480116
Resolved
KB4493509
Resolved:
April 09, 2019
10:00 AM PT

Opened:
January 08, 2019
10:00 AM PT
MSXML6 may cause applications to stop responding
After installing KB4480116, MSXML6 causes applications to stop responding if an exception was thrown during node operations, such as appendChild(), insertBefore(), and moveNode().
 
The Group Policy editor may stop responding when editing a Group Policy Object (GPO) that contains Group Policy Preferences (GPP) for Internet Explorer 10 settings. 

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10, version 1607; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 10 Enterprise LTSB 2015; Windows 8.1
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2; Windows Server 2012
Resolution: This issue was resolved in KB4493509

Back to top
OS Build 17763.253

January 08, 2019
KB4480116
Resolved
KB4493509
Resolved:
April 09, 2019
10:00 AM PT

Opened:
January 08, 2019
10:00 AM PT
From 2fe10d06eafcb705dd0e111860aadbdaa624a26b Mon Sep 17 00:00:00 2001 From: Dani Halfin Date: Thu, 2 May 2019 18:01:30 -0700 Subject: [PATCH 303/724] push to live (#109) --- ...windows-10-1809-and-windows-server-2019.yml | 18 ++++++++++++++---- .../whats-new-in-windows-defender-atp.md | 2 +- 2 files changed, 15 insertions(+), 5 deletions(-) diff --git a/windows/release-information/status-windows-10-1809-and-windows-server-2019.yml b/windows/release-information/status-windows-10-1809-and-windows-server-2019.yml index 82bcf3314f..1a0496c699 100644 --- a/windows/release-information/status-windows-10-1809-and-windows-server-2019.yml +++ b/windows/release-information/status-windows-10-1809-and-windows-server-2019.yml @@ -65,16 +65,17 @@ sections: - type: markdown text: "
This table offers a summary of current active issues and those issues that have been resolved in the last 30 days.

+ + + - -
SummaryOriginating updateStatusLast updated
Printing from Microsoft Edge or other UWP apps, you may receive the error 0x80070007
Attempting to print from Microsoft Edge or other Universal Windows Platform (UWP) applications, you may receive an error.

See details >
OS Build 17763.379

March 12, 2019
KB4489899
Mitigated
May 02, 2019
04:47 PM PT
Devices with some Asian language packs installed may receive an error
After installing KB4493509, devices with some Asian language packs installed may receive the error, \"0x800f0982 - PSFX_E_MATCHING_COMPONENT_NOT_FOUND.\"

See details >
OS Build 17763.437

April 09, 2019
KB4493509
Mitigated
May 02, 2019
04:36 PM PT
System may be unresponsive after restart if ArcaBit antivirus software installed
Devices with ArcaBit antivirus software installed may become unresponsive upon restart.

See details >
OS Build 17763.437

April 09, 2019
KB4493509
Mitigated
April 25, 2019
02:00 PM PT
Custom URI schemes may not start corresponding application
Custom URI schemes for application protocol handlers may not start the corresponding application for local intranet and trusted sites in Internet Explorer.

See details >
OS Build 17763.379

March 12, 2019
KB4489899
Mitigated
April 09, 2019
10:00 AM PT
Issue using PXE to start a device from WDS
Using PXE to start a device from a WDS server configured to use Variable Window Extension may cause the connection to the WDS server to terminate prematurely.

See details >
OS Build 17763.379

March 12, 2019
KB4489899
Mitigated
April 09, 2019
10:00 AM PT
Certain operations performed on a Cluster Shared Volume may fail
Certain operations, such as rename, performed on files or folders on a Cluster Shared Volume (CSV) may fail with the error, \"STATUS_BAD_IMPERSONATION_LEVEL (0xC00000A5)\".

See details >
OS Build 17763.253

January 08, 2019
KB4480116
Mitigated
April 09, 2019
10:00 AM PT
Audio not working on monitors or TV connected to a PC via HDMI, USB, or DisplayPort
Upgrade block: Microsoft has identified issues with certain new Intel display drivers, which accidentally turn on unsupported features in Windows.

See details >
OS Build 17763.134

November 13, 2018
KB4467708
Mitigated
March 15, 2019
12:00 PM PT
Certain operations performed on a Cluster Shared Volume may fail
Certain operations, such as rename, performed on files or folders on a Cluster Shared Volume (CSV) may fail with the error, \"STATUS_BAD_IMPERSONATION_LEVEL (0xC00000A5)\".

See details >
OS Build 17763.253

January 08, 2019
KB4480116
Mitigated
January 08, 2019
10:00 AM PT
End-user-defined characters (EUDC) may cause blue screen at startup
If you enable per font end-user-defined characters (EUDC), the system may stop working and a blue screen may appear at startup.

See details >
OS Build 17763.404

April 02, 2019
KB4490481
Resolved
KB4493509
April 09, 2019
10:00 AM PT
Internet Explorer 11 authentication issue with multiple concurrent logons
Internet Explorer 11 users may encounter issues if two or more people use the same user account for multiple, concurrent login sessions on the same Windows Server machine.

See details >
OS Build 17763.253

January 08, 2019
KB4480116
Resolved
KB4493509
April 09, 2019
10:00 AM PT
MSXML6 may cause applications to stop responding
MSXML6 may cause applications to stop responding if an exception was thrown during node operations, such as appendChild(), insertBefore(), and moveNode().

See details >
OS Build 17763.253

January 08, 2019
KB4480116
Resolved
KB4493509
April 09, 2019
10:00 AM PT
Embedded objects may display incorrectly
Any compound document (OLE) server application that places embedded objects into the Windows Metafile (WMF) using the PatBlt API may display embedded objects incorrectly.

See details >
OS Build 17763.316

February 12, 2019
KB4487044
Resolved
KB4493509
April 09, 2019
10:00 AM PT
Apps may stop working after selecting an audio output device other than the default
Users with multiple audio devices that select an audio output device different from the \"Default Audio Device\" may find certain applications stop working unexpectedly.

See details >
OS Build 17763.348

March 01, 2019
KB4482887
Resolved
KB4490481
April 02, 2019
10:00 AM PT
" @@ -85,6 +86,16 @@ sections:
" +- title: May 2019 +- items: + - type: markdown + text: " + + + +
DetailsOriginating updateStatusHistory
Printing from Microsoft Edge or other UWP apps, you may receive the error 0x80070007
When attempting to print from Microsoft Edge or other Universal Windows Platform (UWP) applications you may receive the error, \"Your printer has experienced an unexpected configuration problem. 0x80070007e.\"
 
Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019
  • Server: Windows Server, version 1809; Windows Server 2019
Workaround: You can use another browser, such as Internet Explorer to print your documents.
 
Next steps: Microsoft is working on a resolution and will provide an update in an upcoming release.

Back to top
OS Build 17763.379

March 12, 2019
KB4489899
Mitigated
Last updated:
May 02, 2019
04:47 PM PT

Opened:
May 02, 2019
04:47 PM PT
Devices with some Asian language packs installed may receive an error
After installing KB4493509, devices with some Asian language packs installed may receive the error, \"0x800f0982 - PSFX_E_MATCHING_COMPONENT_NOT_FOUND.\"

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019
  • Server: Windows Server, version 1809; Windows Server 2019
Workaround:
  1. Uninstall and reinstall any recently added language packs. For instructions, see \"Manage the input and display language settings in Windows 10\".
  2. Click Check for Updates and install the April 2019 Cumulative Update. For instructions, see \"Update Windows 10\".
  3. Reset your PC:
  4. Go to Settings app -> Recovery.
  5. Click on Get Started under \"Reset this PC\" recovery option.
  6. Select \"Keep my Files\".

Next steps: Microsoft is working on a resolution and will provide an update in an upcoming release.

Back to top
OS Build 17763.437

April 09, 2019
KB4493509
Mitigated
Last updated:
May 02, 2019
04:36 PM PT

Opened:
May 02, 2019
04:36 PM PT
+ " + - title: April 2019 - items: - type: markdown @@ -103,7 +114,6 @@ sections:
Custom URI schemes may not start corresponding application
After installing KB4489899, custom URI schemes for application protocol handlers may not start the corresponding application for local intranet and trusted sites security zones on Internet Explorer.

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10, version 1607; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 10 Enterprise LTSB 2015; Windows 8.1; Windows 7 SP1 
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2; Windows Server 2008 R2 SP1
Workaround: Right-click the URL link to open it in a new window or tab, or enable Protected Mode in Internet Explorer for local intranet and trusted sites
  1. Go to Tools > Internet options > Security.
  2. Within Select a zone to view of change security settings, select Local intranet and then select Enable Protected Mode.
  3. Select Trusted Sites and then select Enable Protected Mode
  4. Select OK.
You must restart the browser after making these changes. 
 
Next steps: Microsoft is working on a resolution and will provide an update in an upcoming release. 

Back to top
OS Build 17763.379

March 12, 2019
KB4489899
Mitigated
Last updated:
April 09, 2019
10:00 AM PT

Opened:
March 12, 2019
10:00 AM PT
Issue using PXE to start a device from WDS
After installing KB4489899, there may be issues using the Preboot Execution Environment (PXE) to start a device from a Windows Deployment Services (WDS) server configured to use Variable Window Extension. This may cause the connection to the WDS server to terminate prematurely while downloading the image. This issue does not affect clients or devices that are not using Variable Window Extension. 

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1607; Windows 10 Enterprise LTSC 2016; Windows 8.1
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server 2016; Windows Server 2012 R2; Windows Server 2012
Workaround: To mitigate the issue, disable the Variable Window Extension on WDS server using one of the following options:

Option 1:
Open an Administrator Command prompt and type the following:
Wdsutil /Set-TransportServer /EnableTftpVariableWindowExtension:No 
 

Option 2:
Use the Windows Deployment Services UI to make the following adjustment: 
  1. Open Windows Deployment Services from Windows Administrative Tools. 
  2. Expand Servers and right-click a WDS server. 
  3. Open its properties and clear the Enable Variable Window Extension box on the TFTP tab.
Option 3:
Set the following registry value to 0:
HKLM\\System\\CurrentControlSet\\Services\\WDSServer\\Providers\\WDSTFTP\\EnableVariableWindowExtension  

Restart the WDSServer service after disabling the Variable Window Extension. 

Next steps: Microsoft is working on a resolution and will provide an update in an upcoming release. 

Back to top
OS Build 17763.379

March 12, 2019
KB4489899
Mitigated
Last updated:
April 09, 2019
10:00 AM PT

Opened:
March 12, 2019
10:00 AM PT
Apps may stop working after selecting an audio output device other than the default
After installing KB4482887 on machines that have multiple audio devices, applications that provide advanced options for internal or external audio output devices may stop working unexpectedly. This issue occurs for users that select an audio output device different from the \"Default Audio Device\". Examples of applications that may stop working include: 
  • Windows Media Player 
  • Realtek HD Audio Manager 
  • Sound Blaster Control Panel 
Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019
  • Server: Windows Server, version 1809; Windows Server 2019
Resolution: This issue was resolved in KB4490481

Back to top
OS Build 17763.348

March 01, 2019
KB4482887
Resolved
KB4490481
Resolved:
April 02, 2019
10:00 AM PT

Opened:
March 01, 2019
10:00 AM PT
" @@ -121,7 +131,7 @@ sections: - type: markdown text: " - +
DetailsOriginating updateStatusHistory
Certain operations performed on a Cluster Shared Volume may fail
Certain operations, such as rename, that you perform on files or folders that are on a Cluster Shared Volume (CSV) may fail with the error, \"STATUS_BAD_IMPERSONATION_LEVEL (0xC00000A5)\". This occurs when you perform the operation on a CSV owner node from a process that doesn’t have administrator privilege. 

Affected platforms: 
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10, version 1607; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 10 Enterprise LTSB 2015; Windows 8.1
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2; Windows Server 2012
Workaround: Do one of the following:  
  • Perform the operation from a process that has administrator privilege. 
  • Perform the operation from a node that doesn’t have CSV ownership. 
Next steps: Microsoft is working on a resolution and will provide an update in an upcoming release.

Back to top
OS Build 17763.253

January 08, 2019
KB4480116
Mitigated
Last updated:
January 08, 2019
10:00 AM PT

Opened:
January 08, 2019
10:00 AM PT
Certain operations performed on a Cluster Shared Volume may fail
Certain operations, such as rename, that you perform on files or folders that are on a Cluster Shared Volume (CSV) may fail with the error, \"STATUS_BAD_IMPERSONATION_LEVEL (0xC00000A5)\". This occurs when you perform the operation on a CSV owner node from a process that doesn’t have administrator privilege. 

Affected platforms: 
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10, version 1607; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 10 Enterprise LTSB 2015; Windows 8.1
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2; Windows Server 2012
Workaround: Do one of the following:  
  • Perform the operation from a process that has administrator privilege. 
  • Perform the operation from a node that doesn’t have CSV ownership. 
Next steps: Microsoft is working on a resolution and will provide an update in an upcoming release.

Back to top
OS Build 17763.253

January 08, 2019
KB4480116
Mitigated
Last updated:
April 09, 2019
10:00 AM PT

Opened:
January 08, 2019
10:00 AM PT
Internet Explorer 11 authentication issue with multiple concurrent logons
After installing KB4480116, Internet Explorer 11 and other applications that use WININET.DLL may have authentication issues. This occurs when two or more people use the same user account for multiple, concurrent login sessions on the same Windows Server machine, including Remote Desktop Protocol (RDP) and Terminal Server logons. Symptoms reported by customers include, but may not be limited to: 
  • Cache size and location show zero or empty. 
  • Keyboard shortcuts may not work properly. 
  • Webpages may intermittently fail to load or render correctly. 
  • Issues with credential prompts. 
  • Issues when downloading files. 
Affected platforms: 
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1607; Windows 10 Enterprise LTSC 2016; Windows 8.1; Windows 7 SP1
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server 2016; Windows Server 2012 R2; Windows Server 2012; Windows Server 2008 R2 SP1
Resolution: This issue was resolved in KB4493509

Back to top
OS Build 17763.253

January 08, 2019
KB4480116
Resolved
KB4493509
Resolved:
April 09, 2019
10:00 AM PT

Opened:
January 08, 2019
10:00 AM PT
MSXML6 may cause applications to stop responding
After installing KB4480116, MSXML6 causes applications to stop responding if an exception was thrown during node operations, such as appendChild(), insertBefore(), and moveNode().
 
The Group Policy editor may stop responding when editing a Group Policy Object (GPO) that contains Group Policy Preferences (GPP) for Internet Explorer 10 settings. 

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10, version 1607; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 10 Enterprise LTSB 2015; Windows 8.1
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2; Windows Server 2012
Resolution: This issue was resolved in KB4493509

Back to top
OS Build 17763.253

January 08, 2019
KB4480116
Resolved
KB4493509
Resolved:
April 09, 2019
10:00 AM PT

Opened:
January 08, 2019
10:00 AM PT
diff --git a/windows/security/threat-protection/windows-defender-atp/whats-new-in-windows-defender-atp.md b/windows/security/threat-protection/windows-defender-atp/whats-new-in-windows-defender-atp.md index a125e6e506..8ce696c455 100644 --- a/windows/security/threat-protection/windows-defender-atp/whats-new-in-windows-defender-atp.md +++ b/windows/security/threat-protection/windows-defender-atp/whats-new-in-windows-defender-atp.md @@ -51,7 +51,7 @@ The following capabilities are included in the April 2019 preview release. ### In preview The following capability are included in the March 2019 preview release. -- [Machine health and compliance report](https://docs.microsoft.com/windows/security/threat-protection/windows-defender-atp/machine-reports-windows-defender-advanced-threat-rotection) The machine health and compliance report provides high-level information about the devices in your organization. +- [Machine health and compliance report](https://docs.microsoft.com/windows/security/threat-protection/windows-defender-atp/machine-reports-windows-defender-advanced-threat-protection) The machine health and compliance report provides high-level information about the devices in your organization. ## February 2019 From 69b54b8d9640c97fc9fedf589dff4c622c995178 Mon Sep 17 00:00:00 2001 From: Jie RONG Date: Fri, 3 May 2019 14:32:52 +0800 Subject: [PATCH 304/724] Update set-up-enterprise-mode-portal.md In previous doc: Step 3, following 10 of To create the website will change the connectionstring to like following: But for Model first connection string, it should be like following as displayed in Web.config in the project folder. This will introduce data access error, throwing "Keyword not supported: 'server'." 2. The fix is in step 1 - 6, just update server name and database name, then remove the manual setting steps in Step 2. --- .../set-up-enterprise-mode-portal.md | 18 +++++------------- 1 file changed, 5 insertions(+), 13 deletions(-) diff --git a/browsers/internet-explorer/ie11-deploy-guide/set-up-enterprise-mode-portal.md b/browsers/internet-explorer/ie11-deploy-guide/set-up-enterprise-mode-portal.md index 47c4caf92b..c6c5cf099e 100644 --- a/browsers/internet-explorer/ie11-deploy-guide/set-up-enterprise-mode-portal.md +++ b/browsers/internet-explorer/ie11-deploy-guide/set-up-enterprise-mode-portal.md @@ -43,7 +43,10 @@ You must download the deployment folder (**EMIEWebPortal/**), which includes all Installs the npm package manager and bulk adds all the third-party libraries back into your codebase. -6. Go back up a directory, open the solution file **EMIEWebPortal.sln** in Visual Studio, and then build the entire solution. +6. Go back up a directory, open the solution file **EMIEWebPortal.sln** in Visual Studio, open **Web.config** from **EMIEWebPortal/** folder, and replace MSIT-LOB-COMPAT with your server name hosting your database, replace LOBMerged with your database name, and build the entire solution. + + >[!Note] + >Step 3 of this topic provides the steps to create your database. 7. Copy the contents of the **EMIEWebPortal/** folder to a dedicated folder on your file system. For example, _D:\EMIEWebApp_. In a later step, you'll designate this folder as your website in the IIS Manager. @@ -105,17 +108,6 @@ Create a new Application Pool and the website, by using the IIS Manager. >[!Note] >You must also make sure that **Anonymous Authentication** is marked as **Enabled**. -10. Return to the **<website_name> Home** pane, and double-click the **Connection Strings** icon. - -11. Open the **LOBMergedEntities Connection String** to edit: - - - **Data source.** Type the name of your local computer. - - - **Initial catalog.** The name of your database. - - >[!Note] - >Step 3 of this topic provides the steps to create your database. - ## Step 3 - Create and prep your database Create a SQL Server database and run our custom query to create the Enterprise Mode Site List tables. @@ -229,4 +221,4 @@ Register the EMIEScheduler tool and service for production site list changes. - [Enterprise Mode and the Enterprise Mode Site List](what-is-enterprise-mode.md) -- [Use the Enterprise Mode Site List Manager tool or page](use-the-enterprise-mode-site-list-manager.md) \ No newline at end of file +- [Use the Enterprise Mode Site List Manager tool or page](use-the-enterprise-mode-site-list-manager.md) From 07120081bf9e857679d3206b06f47f00adb65b01 Mon Sep 17 00:00:00 2001 From: MaratMussabekov <48041687+MaratMussabekov@users.noreply.github.com> Date: Fri, 3 May 2019 12:25:57 +0500 Subject: [PATCH 305/724] update hello-planning-guide.md --- .../hello-for-business/hello-planning-guide.md | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/windows/security/identity-protection/hello-for-business/hello-planning-guide.md b/windows/security/identity-protection/hello-for-business/hello-planning-guide.md index 05fb09a45a..77945e6f69 100644 --- a/windows/security/identity-protection/hello-for-business/hello-planning-guide.md +++ b/windows/security/identity-protection/hello-for-business/hello-planning-guide.md @@ -77,7 +77,7 @@ A deployment's trust type defines how each Windows Hello for Business client aut The key trust type does not require issuing authentication certificates to end users. Users authenticate using a hardware-bound key created during the built-in provisioning experience. This requires an adequate distribution of Windows Server 2016 domain controllers relative to your existing authentication and the number of users included in your Windows Hello for Business deployment. Read the [Planning an adequate number of Windows Server 2016 Domain Controllers for Windows Hello for Business deployments](hello-adequate-domain-controllers.md) to learn more. -The certificate trust type issues authentication certificates to end users. Users authenticate using a certificate requested using a hardware-bound key created during the built-in provisioning experience. Unlike key trust, certificate trust does not require Windows Server 2016 domain controllers (but still requires [Windows Server 2016 Active Directory schema](https://docs.microsoft.com/windows/security/identity-protection/hello-for-business/hello-hybrid-cert-trust-prereqs#directories)). Users can authenticate using their certificate to any Windows Server 2008 R2 or later domain controller. +The certificate trust type issues authentication certificates to end users. Users authenticate using a certificate requested using a hardware-bound key created during the built-in provisioning experience. Unlike key trust, certificate trust does not require Windows Server 2016 domain controllers (but still requires [Windows Server 2016 Active Directory schema](https://docs.microsoft.com/windows/security/identity-protection/hello-for-business/hello-hybrid-cert-trust-prereqs#directories)). Users can use their certificate to authenticate to any Windows Server 2008 R2, or later, domain controller. #### Device registration From 355c7ccc34fd830e040373cd7156aa1a33ae36d7 Mon Sep 17 00:00:00 2001 From: MaratMussabekov <48041687+MaratMussabekov@users.noreply.github.com> Date: Fri, 3 May 2019 16:11:27 +0500 Subject: [PATCH 306/724] update nodecache-csp.md removed DFType value, as it is out of the scope of this article --- windows/client-management/mdm/nodecache-csp.md | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/windows/client-management/mdm/nodecache-csp.md b/windows/client-management/mdm/nodecache-csp.md index 28bcf637f6..d04fa8b63b 100644 --- a/windows/client-management/mdm/nodecache-csp.md +++ b/windows/client-management/mdm/nodecache-csp.md @@ -30,7 +30,7 @@ The following diagram shows the NodeCache configuration service provider in tree ![nodecache csp](images/provisioning-csp-nodecache.png) **./Device/Vendor/MSFT and ./User/Vendor/MSFT** -Required. The root node for the NodeCache object. Supported operation is Get. This configuration service provider is used for enterprise device management only. This is a predefined MIME type to identify this managed object in OMA DM syntax. Starting in Windows 10, version 1607 the value is com.microsoft/\/MDM/NodeCache. +Required. The root node for the NodeCache object. Supported operation is Get. This configuration service provider is used for enterprise device management only. This is a predefined MIME type to identify this managed object in OMA DM syntax. ***ProviderID*** Optional. Group settings per DM server. Each group of settings is distinguished by the server’s Provider ID. It should be the same DM server **PROVIDER-ID** value that was supplied through the [w7 APPLICATION configuration service provider](w7-application-csp.md) XML during the enrollment process. Only one enterprise management server is supported. That is, there should be only one *ProviderID* node under **NodeCache**. Scope is dynamic. From 31978baa1a4bb4a0c509349a7d91026e98e8a5c3 Mon Sep 17 00:00:00 2001 From: Mike Edgar <49731348+medgarmedgar@users.noreply.github.com> Date: Fri, 3 May 2019 08:25:55 -0700 Subject: [PATCH 307/724] Update manage-connections-from-windows-operating-system-components-to-microsoft-services.md --- ...system-components-to-microsoft-services.md | 22 +++---------------- 1 file changed, 3 insertions(+), 19 deletions(-) diff --git a/windows/privacy/manage-connections-from-windows-operating-system-components-to-microsoft-services.md b/windows/privacy/manage-connections-from-windows-operating-system-components-to-microsoft-services.md index b46666da35..096932fb04 100644 --- a/windows/privacy/manage-connections-from-windows-operating-system-components-to-microsoft-services.md +++ b/windows/privacy/manage-connections-from-windows-operating-system-components-to-microsoft-services.md @@ -1824,9 +1824,6 @@ You can disable Teredo by using Group Policy or by using the netsh.exe command. - Create a new REG_SZ registry setting named **Teredo_State** in **HKEY_LOCAL_MACHINE\\SOFTWARE\\Policies\\Microsoft\\Windows\\TCPIP\\v6Transition** with a value of **Disabled**. - -or- - -- From an elevated command prompt, run **netsh interface teredo set state disabled** ### 23. Wi-Fi Sense @@ -1847,13 +1844,6 @@ To turn off **Connect to suggested open hotspots** and **Connect to networks sha - Create a new REG_DWORD registry setting named **AutoConnectAllowedOEM** in **HKEY_LOCAL_MACHINE\\SOFTWARE\\Microsoft\\WcmSvc\\wifinetworkmanager\\config** with a **value of 0 (zero)**. - -or- - -- Change the Windows Provisioning setting, WiFISenseAllowed, to **0 (zero)**. For more info, see the Windows Provisioning Settings reference doc, [WiFiSenseAllowed](https://go.microsoft.com/fwlink/p/?LinkId=620909). - - -or- - -- Use the Unattended settings to set the value of WiFiSenseAllowed to **0 (zero)**. For more info, see the Unattended Windows Setup reference doc, [WiFiSenseAllowed](https://go.microsoft.com/fwlink/p/?LinkId=620910). When turned off, the Wi-Fi Sense settings still appear on the Wi-Fi Settings screen, but they’re non-functional and they can’t be controlled by the employee. @@ -1863,21 +1853,15 @@ You can disconnect from the Microsoft Antimalware Protection Service. - **Enable** the Group Policy **Computer Configuration** > **Administrative Templates** > **Windows Components** > **Windows Defender Antivirus** > **MAPS** > **Join Microsoft MAPS** and then select **Disabled** from the drop down box named **Join Microsoft MAPS** - -or- +-OR- - Use the registry to set the REG_DWORD value **HKEY_LOCAL_MACHINE\\Software\\Policies\\Microsoft\\Windows Defender\\Spynet\\SpyNetReporting** to **0 (zero)**. - -or- -- Delete the registry setting **named** in **HKEY_LOCAL_MACHINE\\SOFTWARE\\Policies\\Microsoft\\Windows Defender\\Updates**. - - -or- +-OR- - For Windows 10 only, apply the Defender/AllowClouldProtection MDM policy from the [Defender CSP](https://msdn.microsoft.com/library/windows/hardware/dn904962.aspx). - -and- - - From an elevated Windows PowerShell prompt, run **set-mppreference -Mapsreporting 0** You can stop sending file samples back to Microsoft. @@ -2076,7 +2060,7 @@ On Windows Server 2016, this will block Microsoft Store calls from Universal Win You can turn off apps for websites, preventing customers who visit websites that are registered with their associated app from directly launching the app. -**Disable** the Group Policy: **Computer Configuration** > **Administrative Templates** > **System** > **Group Policy** > **Configure web-to-app linking with URI handlers** +- **Disable** the Group Policy: **Computer Configuration** > **Administrative Templates** > **System** > **Group Policy** > **Configure web-to-app linking with URI handlers** -or- From 044a63d2edd628d97a8c2f279e0dec7d276aeac8 Mon Sep 17 00:00:00 2001 From: "Nisha Mittal (Wipro Ltd.)" Date: Fri, 3 May 2019 09:15:27 -0700 Subject: [PATCH 308/724] Status changed to Mitigated from Investigated for few issues --- .../status-windows-7-and-windows-server-2008-r2-sp1.yml | 4 ++-- .../status-windows-8.1-and-windows-server-2012-r2.yml | 4 ++-- .../release-information/status-windows-server-2008-sp2.yml | 4 ++-- windows/release-information/status-windows-server-2012.yml | 4 ++-- 4 files changed, 8 insertions(+), 8 deletions(-) diff --git a/windows/release-information/status-windows-7-and-windows-server-2008-r2-sp1.yml b/windows/release-information/status-windows-7-and-windows-server-2008-r2-sp1.yml index 9c9b11c520..a15923a007 100644 --- a/windows/release-information/status-windows-7-and-windows-server-2008-r2-sp1.yml +++ b/windows/release-information/status-windows-7-and-windows-server-2008-r2-sp1.yml @@ -60,7 +60,7 @@ sections: - type: markdown text: "
This table offers a summary of current active issues and those issues that have been resolved in the last 30 days.

- + @@ -85,7 +85,7 @@ sections: - type: markdown text: "
SummaryOriginating updateStatusLast updated
System may be unresponsive after restart if Avira antivirus software installed
Devices with Avira antivirus software installed may become unresponsive upon restart.

See details >
April 09, 2019
KB4493472
Investigating
April 25, 2019
02:00 PM PT
System may be unresponsive after restart if Avira antivirus software installed
Devices with Avira antivirus software installed may become unresponsive upon restart.

See details >
April 09, 2019
KB4493472
Mitigated
May 03, 2019
08:50 AM PT
Authentication may fail for services after the Kerberos ticket expires
Authentication may fail for services that require unconstrained delegation after the Kerberos ticket expires.

See details >
March 12, 2019
KB4489878
Mitigated
April 25, 2019
02:00 PM PT
System unresponsive after restart if Sophos Endpoint Protection installed
Devices with Sophos Endpoint Protection installed and managed by Sophos Central or Sophos Enterprise Console (SEC) may become unresponsive upon restart.

See details >
April 09, 2019
KB4493472
Mitigated
April 25, 2019
02:00 PM PT
System may be unresponsive after restart if ArcaBit antivirus software installed
Devices with ArcaBit antivirus software installed may become unresponsive upon restart.

See details >
April 09, 2019
KB4493472
Mitigated
April 25, 2019
02:00 PM PT
- + diff --git a/windows/release-information/status-windows-8.1-and-windows-server-2012-r2.yml b/windows/release-information/status-windows-8.1-and-windows-server-2012-r2.yml index 4a94eba224..75805707fb 100644 --- a/windows/release-information/status-windows-8.1-and-windows-server-2012-r2.yml +++ b/windows/release-information/status-windows-8.1-and-windows-server-2012-r2.yml @@ -60,7 +60,7 @@ sections: - type: markdown text: "
This table offers a summary of current active issues and those issues that have been resolved in the last 30 days.

DetailsOriginating updateStatusHistory
System may be unresponsive after restart if Avira antivirus software installed
Microsoft and Avira have identified an issue on devices with Avira antivirus software installed that may cause the system to become unresponsive upon restart after installing KB4493472.

Microsoft has temporarily blocked devices from receiving this update if Avira antivirus software is installed.

Affected platforms: 
  • Client: Windows 8.1; Windows 7 SP1 
  • Server: Windows Server 2012 R2; Windows Server 2012; Windows Server 2008 R2 SP1; Windows Server 2008 SP2
Next steps: We are presently investigating this issue with Avira and will provide an update when available.

Back to top
April 09, 2019
KB4493472
Investigating
Last updated:
April 25, 2019
02:00 PM PT

Opened:
April 09, 2019
10:00 AM PT
System may be unresponsive after restart if Avira antivirus software installed
Microsoft and Avira have identified an issue on devices with Avira antivirus software installed that may cause the system to become unresponsive upon restart after installing KB4493472.

Microsoft has temporarily blocked devices from receiving this update if Avira antivirus software is installed.

Affected platforms: 
  • Client: Windows 8.1; Windows 7 SP1 
  • Server: Windows Server 2012 R2; Windows Server 2012; Windows Server 2008 R2 SP1; Windows Server 2008 SP2
Next steps: Avira has released an automatic update to address this issue. Guidance for Avira customers can be found in the Avira support article.

Back to top
April 09, 2019
KB4493472
Mitigated
Last updated:
May 03, 2019
08:50 AM PT

Opened:
April 09, 2019
10:00 AM PT
System unresponsive after restart if Sophos Endpoint Protection installed
Microsoft and Sophos have identified an issue on devices with Sophos Endpoint Protection installed and managed by either Sophos Central or Sophos Enterprise Console (SEC) that may cause the system to become unresponsive upon restart after installing KB4493472.

Microsoft has temporarily blocked devices from receiving this update if the Sophos Endpoint is installed until a solution is available.

Affected platforms: 
  • Client: Windows 8.1; Windows 7 SP1
  • Server: Windows Server 2012 R2; Windows Server 2012; Windows Server 2008 R2 SP1; Windows Server 2008 SP2
Guidance for Sophos Endpoint and Sophos Enterprise Console customers can be found in the Sophos support article.

Back to top
April 09, 2019
KB4493472
Mitigated
Last updated:
April 25, 2019
02:00 PM PT

Opened:
April 09, 2019
10:00 AM PT
System may be unresponsive after restart if ArcaBit antivirus software installed
Microsoft and ArcaBit have identified an issue on devices with ArcaBit antivirus software installed that may cause the system to become unresponsive upon restart after installing KB4493472.

Microsoft has temporarily blocked devices from receiving this update if ArcaBit antivirus software is installed.

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 8.1; Windows 7 SP1
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server 2012 R2; Windows Server 2008 R2 SP1
Workaround: ArcaBit has released an update to address this issue. For more information, see the Arcabit support article.

Back to top
April 09, 2019
KB4493472
Mitigated
Last updated:
April 25, 2019
02:00 PM PT

Opened:
April 09, 2019
10:00 AM PT
System may be unresponsive after restart with certain McAfee antivirus products
Microsoft and McAfee have identified an issue on devices with McAfee Endpoint Security (ENS) Threat Prevention 10.x or McAfee Host Intrusion Prevention (Host IPS) 8.0 or McAfee VirusScan Enterprise (VSE) 8.8 installed. It may cause the system to have slow startup or become unresponsive at restart after installing this update. 

Affected platforms:
  • Client:  Windows 8.1; Windows 7 SP1
  • Server:  Windows Server 2012 R2; Windows Server 2008 R2 SP1
Workaround: Guidance for McAfee customers can be found in the following McAfee support articles: 
Next steps: We are presently investigating this issue with McAfee. We will provide an update once we have more information.

Back to top
April 09, 2019
KB4493472
Mitigated
Last updated:
April 25, 2019
02:00 PM PT

Opened:
April 09, 2019
10:00 AM PT
- + @@ -86,7 +86,7 @@ sections: - type: markdown text: "
SummaryOriginating updateStatusLast updated
System may be unresponsive after restart if Avira antivirus software installed
Devices with Avira antivirus software installed may become unresponsive upon restart.

See details >
April 09, 2019
KB4493446
Investigating
April 25, 2019
02:00 PM PT
System may be unresponsive after restart if Avira antivirus software installed
Devices with Avira antivirus software installed may become unresponsive upon restart.

See details >
April 09, 2019
KB4493446
Mitigated
May 03, 2019
08:50 AM PT
Issue using PXE to start a device from WDS
There may be issues using the Preboot Execution Environment (PXE) to start a device from a Windows Deployment Services (WDS) server configured to use Variable Window Extension.

See details >
March 12, 2019
KB4489881
Mitigated
April 25, 2019
02:00 PM PT
System unresponsive after restart if Sophos Endpoint Protection installed
Devices with Sophos Endpoint Protection installed and managed by Sophos Central or Sophos Enterprise Console (SEC) may become unresponsive upon restart.

See details >
April 09, 2019
KB4493446
Mitigated
April 25, 2019
02:00 PM PT
System may be unresponsive after restart if ArcaBit antivirus software installed
Devices with ArcaBit antivirus software installed may become unresponsive upon restart.

See details >
April 09, 2019
KB4493446
Mitigated
April 25, 2019
02:00 PM PT
- + diff --git a/windows/release-information/status-windows-server-2008-sp2.yml b/windows/release-information/status-windows-server-2008-sp2.yml index 40672e97b4..102f665769 100644 --- a/windows/release-information/status-windows-server-2008-sp2.yml +++ b/windows/release-information/status-windows-server-2008-sp2.yml @@ -60,7 +60,7 @@ sections: - type: markdown text: "
This table offers a summary of current active issues and those issues that have been resolved in the last 30 days.

DetailsOriginating updateStatusHistory
System may be unresponsive after restart if Avira antivirus software installed
Microsoft and Avira have identified an issue on devices with Avira antivirus software installed that may cause the system to become unresponsive upon restart after installing KB4493446.

Microsoft has temporarily blocked devices from receiving this update if Avira antivirus software is installed.

Affected platforms: 
  • Client: Windows 8.1; Windows 7 SP1 
  • Server: Windows Server 2012 R2; Windows Server 2012; Windows Server 2008 R2 SP1; Windows Server 2008 SP2 
Next steps: We are presently investigating this issue with Avira and will provide an update when available.

Back to top
April 09, 2019
KB4493446
Investigating
Last updated:
April 25, 2019
02:00 PM PT

Opened:
April 09, 2019
10:00 AM PT
System may be unresponsive after restart if Avira antivirus software installed
Microsoft and Avira have identified an issue on devices with Avira antivirus software installed that may cause the system to become unresponsive upon restart after installing KB4493446.

Microsoft has temporarily blocked devices from receiving this update if Avira antivirus software is installed.

Affected platforms: 
  • Client: Windows 8.1; Windows 7 SP1 
  • Server: Windows Server 2012 R2; Windows Server 2012; Windows Server 2008 R2 SP1; Windows Server 2008 SP2 
Next steps: Avira has released an automatic update to address this issue. Guidance for Avira customers can be found in the Avira support article.

Back to top
April 09, 2019
KB4493446
Mitigated
Last updated:
May 03, 2019
08:50 AM PT

Opened:
April 09, 2019
10:00 AM PT
System unresponsive after restart if Sophos Endpoint Protection installed
Microsoft and Sophos have identified an issue on devices with Sophos Endpoint Protection installed and managed by either Sophos Central or Sophos Enterprise Console (SEC) that may cause the system to become unresponsive upon restart after installing KB4493446.

Microsoft has temporarily blocked devices from receiving this update if the Sophos Endpoint is installed until a solution is available.

Affected platforms: 
  • Client: Windows 8.1; Windows 7 SP1
  • Server: Windows Server 2012 R2; Windows Server 2012; Windows Server 2008 R2 SP1; Windows Server 2008 SP2
Guidance for Sophos Endpoint and Sophos Enterprise Console customers can be found in the Sophos support article.

Back to top
April 09, 2019
KB4493446
Mitigated
Last updated:
April 25, 2019
02:00 PM PT

Opened:
April 09, 2019
10:00 AM PT
System may be unresponsive after restart if ArcaBit antivirus software installed
Microsoft and ArcaBit have identified an issue on devices with ArcaBit antivirus software installed that may cause the system to become unresponsive upon restart after installing KB4493446.

Microsoft has temporarily blocked devices from receiving this update if ArcaBit antivirus software is installed.

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 8.1; Windows 7 SP1
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server 2012 R2; Windows Server 2008 R2 SP1
Workaround: ArcaBit has released an update to address this issue. For more information, see the Arcabit support article.

Back to top
April 09, 2019
KB4493446
Mitigated
Last updated:
April 25, 2019
02:00 PM PT

Opened:
April 09, 2019
10:00 AM PT
System may be unresponsive after restart with certain McAfee antivirus products
Microsoft and McAfee have identified an issue on devices with McAfee Endpoint Security (ENS) Threat Prevention 10.x or McAfee Host Intrusion Prevention (Host IPS) 8.0 or McAfee VirusScan Enterprise (VSE) 8.8 installed. It may cause the system to have slow startup or become unresponsive at restart after installing this update. 

Affected platforms:
  • Client:  Windows 8.1; Windows 7 SP1
  • Server:  Windows Server 2012 R2; Windows Server 2008 R2 SP1
Workaround: Guidance for McAfee customers can be found in the following McAfee support articles:  
Next steps: We are presently investigating this issue with McAfee. We will provide an update once we have more information. 

Back to top
April 09, 2019
KB4493446
Mitigated
Last updated:
April 18, 2019
05:00 PM PT

Opened:
April 09, 2019
10:00 AM PT
- + @@ -80,7 +80,7 @@ sections: - type: markdown text: "
SummaryOriginating updateStatusLast updated
System may be unresponsive after restart if Avira antivirus software installed
Devices with Avira antivirus software installed may become unresponsive upon restart.

See details >
April 09, 2019
KB4493471
Investigating
April 25, 2019
02:00 PM PT
System may be unresponsive after restart if Avira antivirus software installed
Devices with Avira antivirus software installed may become unresponsive upon restart.

See details >
April 09, 2019
KB4493471
Mitigated
May 03, 2019
08:51 AM PT
System unresponsive after restart if Sophos Endpoint Protection installed
Devices with Sophos Endpoint Protection installed and managed by Sophos Central or Sophos Enterprise Console (SEC) may become unresponsive upon restart.

See details >
April 09, 2019
KB4493471
Mitigated
April 25, 2019
02:00 PM PT
Authentication may fail for services after the Kerberos ticket expires
Authentication may fail for services that require unconstrained delegation after the Kerberos ticket expires.

See details >
March 12, 2019
KB4489880
Mitigated
April 25, 2019
02:00 PM PT
Embedded objects may display incorrectly
Any compound document (OLE) server application that places embedded objects into the Windows Metafile (WMF) using the PatBlt API may display embedded objects incorrectly.

See details >
February 12, 2019
KB4487023
Resolved
KB4493471
April 09, 2019
10:00 AM PT
- +
DetailsOriginating updateStatusHistory
System may be unresponsive after restart if Avira antivirus software installed
Microsoft and Avira have identified an issue on devices with Avira antivirus software installed that may cause the system to become unresponsive upon restart after installing KB4493471.

Microsoft has temporarily blocked devices from receiving this update if Avira antivirus software is installed.

Affected platforms: 
  • Client: Windows 8.1; Windows 7 SP1 
  • Server: Windows Server 2012 R2; Windows Server 2012; Windows Server 2008 R2 SP1; Windows Server 2008 SP2
Next steps: We are presently investigating this issue with Avira and will provide an update when available.

Back to top
April 09, 2019
KB4493471
Investigating
Last updated:
April 25, 2019
02:00 PM PT

Opened:
April 09, 2019
10:00 AM PT
System may be unresponsive after restart if Avira antivirus software installed
Microsoft and Avira have identified an issue on devices with Avira antivirus software installed that may cause the system to become unresponsive upon restart after installing KB4493471.

Microsoft has temporarily blocked devices from receiving this update if Avira antivirus software is installed.

Affected platforms: 
  • Client: Windows 8.1; Windows 7 SP1 
  • Server: Windows Server 2012 R2; Windows Server 2012; Windows Server 2008 R2 SP1; Windows Server 2008 SP2
Next steps: Avira has released an automatic update to address this issue. Guidance for Avira customers can be found in the Avira support article

Back to top
April 09, 2019
KB4493471
Mitigated
Last updated:
May 03, 2019
08:51 AM PT

Opened:
April 09, 2019
10:00 AM PT
System unresponsive after restart if Sophos Endpoint Protection installed
Microsoft and Sophos have identified an issue on devices with Sophos Endpoint Protection installed and managed by either Sophos Central or Sophos Enterprise Console (SEC) that may cause the system to become unresponsive upon restart after installing KB4493471.

Microsoft has temporarily blocked devices from receiving this update if the Sophos Endpoint is installed until a solution is available.

Affected platforms: 
  • Client: Windows 8.1; Windows 7 SP1
  • Server: Windows Server 2012 R2; Windows Server 2012; Windows Server 2008 R2 SP1; Windows Server 2008 SP2
Guidance for Sophos Endpoint and Sophos Enterprise Console customers can be found in the Sophos support article.

Back to top
April 09, 2019
KB4493471
Mitigated
Last updated:
April 25, 2019
02:00 PM PT

Opened:
April 09, 2019
10:00 AM PT
" diff --git a/windows/release-information/status-windows-server-2012.yml b/windows/release-information/status-windows-server-2012.yml index 046f75de26..831a726f86 100644 --- a/windows/release-information/status-windows-server-2012.yml +++ b/windows/release-information/status-windows-server-2012.yml @@ -60,7 +60,7 @@ sections: - type: markdown text: "
This table offers a summary of current active issues and those issues that have been resolved in the last 30 days.

- + @@ -82,7 +82,7 @@ sections: - type: markdown text: "
SummaryOriginating updateStatusLast updated
System may be unresponsive after restart if Avira antivirus software installed
Devices with Avira antivirus software installed may become unresponsive upon restart.

See details >
April 09, 2019
KB4493451
Investigating
April 25, 2019
02:00 PM PT
System may be unresponsive after restart if Avira antivirus software installed
Devices with Avira antivirus software installed may become unresponsive upon restart.

See details >
April 09, 2019
KB4493451
Mitigated
May 03, 2019
08:51 AM PT
Issue using PXE to start a device from WDS
There may be issues using the Preboot Execution Environment (PXE) to start a device from a Windows Deployment Services (WDS) server configured to use Variable Window Extension.

See details >
March 12, 2019
KB4489891
Mitigated
April 25, 2019
02:00 PM PT
System unresponsive after restart if Sophos Endpoint Protection installed
Devices with Sophos Endpoint Protection installed and managed by Sophos Central or Sophos Enterprise Console (SEC) may become unresponsive upon restart.

See details >
April 09, 2019
KB4493451
Mitigated
April 25, 2019
02:00 PM PT
Certain operations performed on a Cluster Shared Volume may fail
Certain operations, such as rename, performed on files or folders on a Cluster Shared Volume (CSV) may fail with the error, “STATUS_BAD_IMPERSONATION_LEVEL (0xC00000A5)”.

See details >
January 08, 2019
KB4480975
Mitigated
April 25, 2019
02:00 PM PT
- +
DetailsOriginating updateStatusHistory
System may be unresponsive after restart if Avira antivirus software installed
Microsoft and Avira have identified an issue on devices with Avira antivirus software installed that may cause the system to become unresponsive upon restart after installing KB4493451.

Microsoft has temporarily blocked devices from receiving this update if Avira antivirus software is installed.

Affected platforms: 
  • Client: Windows 8.1; Windows 7 SP1 
  • Server: Windows Server 2012 R2; Windows Server 2012; Windows Server 2008 R2 SP1; Windows Server 2008 SP2
Next steps: We are presently investigating this issue with Avira and will provide an update when available.

Back to top
April 09, 2019
KB4493451
Investigating
Last updated:
April 25, 2019
02:00 PM PT

Opened:
April 09, 2019
10:00 AM PT
System may be unresponsive after restart if Avira antivirus software installed
Microsoft and Avira have identified an issue on devices with Avira antivirus software installed that may cause the system to become unresponsive upon restart after installing KB4493451.

Microsoft has temporarily blocked devices from receiving this update if Avira antivirus software is installed.

Affected platforms: 
  • Client: Windows 8.1; Windows 7 SP1 
  • Server: Windows Server 2012 R2; Windows Server 2012; Windows Server 2008 R2 SP1; Windows Server 2008 SP2
Next steps: Avira has released an automatic update to address this issue. Guidance for Avira customers can be found in the Avira support article.

Back to top
April 09, 2019
KB4493451
Mitigated
Last updated:
May 03, 2019
08:51 AM PT

Opened:
April 09, 2019
10:00 AM PT
System unresponsive after restart if Sophos Endpoint Protection installed
Microsoft and Sophos have identified an issue on devices with Sophos Endpoint Protection installed and managed by either Sophos Central or Sophos Enterprise Console (SEC) that may cause the system to become unresponsive upon restart after installing KB4493451.

Microsoft has temporarily blocked devices from receiving this update if the Sophos Endpoint is installed until a solution is available.

Affected platforms: 
  • Client: Windows 8.1; Windows 7 SP1
  • Server: Windows Server 2012 R2; Windows Server 2012; Windows Server 2008 R2 SP1; Windows Server 2008 SP2
Guidance for Sophos Endpoint and Sophos Enterprise Console customers can be found in the Sophos support article.

Back to top
April 09, 2019
KB4493451
Mitigated
Last updated:
April 25, 2019
02:00 PM PT

Opened:
April 09, 2019
10:00 AM PT
" From 344448c0789f47fd5fbf51adeca6b0f78fc5db43 Mon Sep 17 00:00:00 2001 From: John Kaiser <35939694+CoveMiner@users.noreply.github.com> Date: Fri, 3 May 2019 10:05:51 -0700 Subject: [PATCH 309/724] Update surface-diagnostic-toolkit-business.md --- .../surface-diagnostic-toolkit-business.md | 58 ++++++++++++------- 1 file changed, 37 insertions(+), 21 deletions(-) diff --git a/devices/surface/surface-diagnostic-toolkit-business.md b/devices/surface/surface-diagnostic-toolkit-business.md index 0a73499333..f67a2cb1db 100644 --- a/devices/surface/surface-diagnostic-toolkit-business.md +++ b/devices/surface/surface-diagnostic-toolkit-business.md @@ -27,8 +27,6 @@ Specifically, SDT for Business enables you to: To run SDT for Business, download the components listed in the following table. ->[!NOTE] ->In contrast to the way you typically install MSI packages, the SDT distributable MSI package can only be created by running Windows Installer (msiexec.exe) at a command prompt and setting the custom flag `ADMINMODE = 1`. For details, see [Run Surface Diagnostic Toolkit using commands](surface-diagnostic-toolkit-command-line.md). Mode | Primary scenarios | Download | Learn more --- | --- | --- | --- @@ -57,16 +55,40 @@ SDT for Business is supported on Surface 3 and later devices, including: ## Installing Surface Diagnostic Toolkit for Business -To create an SDT package that you can distribute to users in your organization, you first need to install SDT at a command prompt and set a custom flag to install the tool in admin mode. SDT contains the following install option flags: +To create an SDT package that you can distribute to users in your organization: + +1. Sign in to your Surface device using the Administrator account. +2. Download SDT Windows Installer Package (.msi) from the [Surface Tools for IT download page](https://www.microsoft.com/download/details.aspx?id=46703) and copy it to a preferred location on your Surface device, such as Desktop. +3. The SDT setup wizard appears, as shown in figure 1. Click **Next**. + + >[!NOTE] + >If the setup wizard does not appear, ensure that you are signed into the Administrator account on your computer. + + ![welcome to the Surface Diagnostic Toolkit setup wizard](images/sdt-1.png) + + *Figure 1. Surface Diagnostic Toolkit setup wizard* + +4. When the SDT setup wizard appears, click **Next**, accept the End User License Agreement (EULA) + +5. On the Install Options screen, change the default install location if desired. +6. Under Setup Type, select **Advanced**. + + >[!NOTE] + >The standard option allows users to run the diagnostic tool directly on their Surface device provided they are signed into their device using an Administrator account. + + ![Install Options: Advanced](images/sdt-install.png) + +7. Click **Next** and then click **Install**. + +## Installing using the command line +If desired, you can install SDT at a command prompt and set a custom flag to install the tool in admin mode. SDT contains the following install option flags: - `SENDTELEMETRY` sends telemetry data to Microsoft. The flag accepts `0` for disabled or `1` for enabled. The default value is `1` to send telemetry. - `ADMINMODE` configures the tool to be installed in admin mode. The flag accepts `0` for client mode or `1` for IT Administrator mode. The default value is `0`. -**To install SDT in ADMINMODE:** +### To install SDT from the command line: -1. Sign in to your Surface device using the Administrator account. -2. Download SDT Windows Installer Package (.msi) from the [Surface Tools for IT download page](https://www.microsoft.com/download/details.aspx?id=46703) and copy it to a preferred location on your Surface device, such as Desktop. -3. Open a command prompt and enter: +1. Open a command prompt and enter: ``` msiexec.exe /i ADMINMODE=1. @@ -77,19 +99,6 @@ To create an SDT package that you can distribute to users in your organization, C:\Users\Administrator> msiexec.exe/I"C:\Users\Administrator\Desktop\Microsoft_Surface_Diagnostic_Toolkit_for_Business_Installer.msi" ADMINMODE=1 ``` -4. The SDT setup wizard appears, as shown in figure 1. Click **Next**. - - >[!NOTE] - >If the setup wizard does not appear, ensure that you are signed into the Administrator account on your computer. - - ![welcome to the Surface Diagnostic Toolkit setup wizard](images/sdt-1.png) - - *Figure 1. Surface Diagnostic Toolkit setup wizard* - -5. When the SDT setup wizard appears, click **Next**, accept the End User License Agreement (EULA), and select a location to install the package. - -6. Click **Next** and then click **Install**. - ## Locating SDT on your Surface device Both SDT and the SDT app console are installed at `C:\Program Files\Microsoft\Surface\Microsoft Surface Diagnostic Toolkit for Business`. @@ -154,7 +163,14 @@ You can select to run a wide range of logs across applications, drivers, hardwar - [Use Surface Diagnostic Toolkit for Business using commands](surface-diagnostic-toolkit-command-line.md) - +# Version history +## Version 2.36.139.0 +Release date: April 26, 2019
+This version of Surface Diagnostic Toolkit for Business adds support for the following: +- Advanced Setup option to unlock admin capabilities through the installer UI , without requiring command line configuration. +- Accessibility improvements. +- Surface brightness control settings included in logs. +- External monitor compatibility support link in report generator. From fb4b95f0f364dfc73b92f32946b62b7d253738d9 Mon Sep 17 00:00:00 2001 From: Jiying Ren <30674468+jiyingren@users.noreply.github.com> Date: Fri, 3 May 2019 10:11:09 -0700 Subject: [PATCH 310/724] Release info preview (#110) --- .../status-windows-7-and-windows-server-2008-r2-sp1.yml | 4 ++-- .../status-windows-8.1-and-windows-server-2012-r2.yml | 4 ++-- .../release-information/status-windows-server-2008-sp2.yml | 4 ++-- windows/release-information/status-windows-server-2012.yml | 4 ++-- 4 files changed, 8 insertions(+), 8 deletions(-) diff --git a/windows/release-information/status-windows-7-and-windows-server-2008-r2-sp1.yml b/windows/release-information/status-windows-7-and-windows-server-2008-r2-sp1.yml index 9c9b11c520..a15923a007 100644 --- a/windows/release-information/status-windows-7-and-windows-server-2008-r2-sp1.yml +++ b/windows/release-information/status-windows-7-and-windows-server-2008-r2-sp1.yml @@ -60,7 +60,7 @@ sections: - type: markdown text: "
This table offers a summary of current active issues and those issues that have been resolved in the last 30 days.

- + @@ -85,7 +85,7 @@ sections: - type: markdown text: "
SummaryOriginating updateStatusLast updated
System may be unresponsive after restart if Avira antivirus software installed
Devices with Avira antivirus software installed may become unresponsive upon restart.

See details >
April 09, 2019
KB4493472
Investigating
April 25, 2019
02:00 PM PT
System may be unresponsive after restart if Avira antivirus software installed
Devices with Avira antivirus software installed may become unresponsive upon restart.

See details >
April 09, 2019
KB4493472
Mitigated
May 03, 2019
08:50 AM PT
Authentication may fail for services after the Kerberos ticket expires
Authentication may fail for services that require unconstrained delegation after the Kerberos ticket expires.

See details >
March 12, 2019
KB4489878
Mitigated
April 25, 2019
02:00 PM PT
System unresponsive after restart if Sophos Endpoint Protection installed
Devices with Sophos Endpoint Protection installed and managed by Sophos Central or Sophos Enterprise Console (SEC) may become unresponsive upon restart.

See details >
April 09, 2019
KB4493472
Mitigated
April 25, 2019
02:00 PM PT
System may be unresponsive after restart if ArcaBit antivirus software installed
Devices with ArcaBit antivirus software installed may become unresponsive upon restart.

See details >
April 09, 2019
KB4493472
Mitigated
April 25, 2019
02:00 PM PT
- + diff --git a/windows/release-information/status-windows-8.1-and-windows-server-2012-r2.yml b/windows/release-information/status-windows-8.1-and-windows-server-2012-r2.yml index 4a94eba224..75805707fb 100644 --- a/windows/release-information/status-windows-8.1-and-windows-server-2012-r2.yml +++ b/windows/release-information/status-windows-8.1-and-windows-server-2012-r2.yml @@ -60,7 +60,7 @@ sections: - type: markdown text: "
This table offers a summary of current active issues and those issues that have been resolved in the last 30 days.

DetailsOriginating updateStatusHistory
System may be unresponsive after restart if Avira antivirus software installed
Microsoft and Avira have identified an issue on devices with Avira antivirus software installed that may cause the system to become unresponsive upon restart after installing KB4493472.

Microsoft has temporarily blocked devices from receiving this update if Avira antivirus software is installed.

Affected platforms: 
  • Client: Windows 8.1; Windows 7 SP1 
  • Server: Windows Server 2012 R2; Windows Server 2012; Windows Server 2008 R2 SP1; Windows Server 2008 SP2
Next steps: We are presently investigating this issue with Avira and will provide an update when available.

Back to top
April 09, 2019
KB4493472
Investigating
Last updated:
April 25, 2019
02:00 PM PT

Opened:
April 09, 2019
10:00 AM PT
System may be unresponsive after restart if Avira antivirus software installed
Microsoft and Avira have identified an issue on devices with Avira antivirus software installed that may cause the system to become unresponsive upon restart after installing KB4493472.

Microsoft has temporarily blocked devices from receiving this update if Avira antivirus software is installed.

Affected platforms: 
  • Client: Windows 8.1; Windows 7 SP1 
  • Server: Windows Server 2012 R2; Windows Server 2012; Windows Server 2008 R2 SP1; Windows Server 2008 SP2
Next steps: Avira has released an automatic update to address this issue. Guidance for Avira customers can be found in the Avira support article.

Back to top
April 09, 2019
KB4493472
Mitigated
Last updated:
May 03, 2019
08:50 AM PT

Opened:
April 09, 2019
10:00 AM PT
System unresponsive after restart if Sophos Endpoint Protection installed
Microsoft and Sophos have identified an issue on devices with Sophos Endpoint Protection installed and managed by either Sophos Central or Sophos Enterprise Console (SEC) that may cause the system to become unresponsive upon restart after installing KB4493472.

Microsoft has temporarily blocked devices from receiving this update if the Sophos Endpoint is installed until a solution is available.

Affected platforms: 
  • Client: Windows 8.1; Windows 7 SP1
  • Server: Windows Server 2012 R2; Windows Server 2012; Windows Server 2008 R2 SP1; Windows Server 2008 SP2
Guidance for Sophos Endpoint and Sophos Enterprise Console customers can be found in the Sophos support article.

Back to top
April 09, 2019
KB4493472
Mitigated
Last updated:
April 25, 2019
02:00 PM PT

Opened:
April 09, 2019
10:00 AM PT
System may be unresponsive after restart if ArcaBit antivirus software installed
Microsoft and ArcaBit have identified an issue on devices with ArcaBit antivirus software installed that may cause the system to become unresponsive upon restart after installing KB4493472.

Microsoft has temporarily blocked devices from receiving this update if ArcaBit antivirus software is installed.

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 8.1; Windows 7 SP1
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server 2012 R2; Windows Server 2008 R2 SP1
Workaround: ArcaBit has released an update to address this issue. For more information, see the Arcabit support article.

Back to top
April 09, 2019
KB4493472
Mitigated
Last updated:
April 25, 2019
02:00 PM PT

Opened:
April 09, 2019
10:00 AM PT
System may be unresponsive after restart with certain McAfee antivirus products
Microsoft and McAfee have identified an issue on devices with McAfee Endpoint Security (ENS) Threat Prevention 10.x or McAfee Host Intrusion Prevention (Host IPS) 8.0 or McAfee VirusScan Enterprise (VSE) 8.8 installed. It may cause the system to have slow startup or become unresponsive at restart after installing this update. 

Affected platforms:
  • Client:  Windows 8.1; Windows 7 SP1
  • Server:  Windows Server 2012 R2; Windows Server 2008 R2 SP1
Workaround: Guidance for McAfee customers can be found in the following McAfee support articles: 
Next steps: We are presently investigating this issue with McAfee. We will provide an update once we have more information.

Back to top
April 09, 2019
KB4493472
Mitigated
Last updated:
April 25, 2019
02:00 PM PT

Opened:
April 09, 2019
10:00 AM PT
- + @@ -86,7 +86,7 @@ sections: - type: markdown text: "
SummaryOriginating updateStatusLast updated
System may be unresponsive after restart if Avira antivirus software installed
Devices with Avira antivirus software installed may become unresponsive upon restart.

See details >
April 09, 2019
KB4493446
Investigating
April 25, 2019
02:00 PM PT
System may be unresponsive after restart if Avira antivirus software installed
Devices with Avira antivirus software installed may become unresponsive upon restart.

See details >
April 09, 2019
KB4493446
Mitigated
May 03, 2019
08:50 AM PT
Issue using PXE to start a device from WDS
There may be issues using the Preboot Execution Environment (PXE) to start a device from a Windows Deployment Services (WDS) server configured to use Variable Window Extension.

See details >
March 12, 2019
KB4489881
Mitigated
April 25, 2019
02:00 PM PT
System unresponsive after restart if Sophos Endpoint Protection installed
Devices with Sophos Endpoint Protection installed and managed by Sophos Central or Sophos Enterprise Console (SEC) may become unresponsive upon restart.

See details >
April 09, 2019
KB4493446
Mitigated
April 25, 2019
02:00 PM PT
System may be unresponsive after restart if ArcaBit antivirus software installed
Devices with ArcaBit antivirus software installed may become unresponsive upon restart.

See details >
April 09, 2019
KB4493446
Mitigated
April 25, 2019
02:00 PM PT
- + diff --git a/windows/release-information/status-windows-server-2008-sp2.yml b/windows/release-information/status-windows-server-2008-sp2.yml index 40672e97b4..102f665769 100644 --- a/windows/release-information/status-windows-server-2008-sp2.yml +++ b/windows/release-information/status-windows-server-2008-sp2.yml @@ -60,7 +60,7 @@ sections: - type: markdown text: "
This table offers a summary of current active issues and those issues that have been resolved in the last 30 days.

DetailsOriginating updateStatusHistory
System may be unresponsive after restart if Avira antivirus software installed
Microsoft and Avira have identified an issue on devices with Avira antivirus software installed that may cause the system to become unresponsive upon restart after installing KB4493446.

Microsoft has temporarily blocked devices from receiving this update if Avira antivirus software is installed.

Affected platforms: 
  • Client: Windows 8.1; Windows 7 SP1 
  • Server: Windows Server 2012 R2; Windows Server 2012; Windows Server 2008 R2 SP1; Windows Server 2008 SP2 
Next steps: We are presently investigating this issue with Avira and will provide an update when available.

Back to top
April 09, 2019
KB4493446
Investigating
Last updated:
April 25, 2019
02:00 PM PT

Opened:
April 09, 2019
10:00 AM PT
System may be unresponsive after restart if Avira antivirus software installed
Microsoft and Avira have identified an issue on devices with Avira antivirus software installed that may cause the system to become unresponsive upon restart after installing KB4493446.

Microsoft has temporarily blocked devices from receiving this update if Avira antivirus software is installed.

Affected platforms: 
  • Client: Windows 8.1; Windows 7 SP1 
  • Server: Windows Server 2012 R2; Windows Server 2012; Windows Server 2008 R2 SP1; Windows Server 2008 SP2 
Next steps: Avira has released an automatic update to address this issue. Guidance for Avira customers can be found in the Avira support article.

Back to top
April 09, 2019
KB4493446
Mitigated
Last updated:
May 03, 2019
08:50 AM PT

Opened:
April 09, 2019
10:00 AM PT
System unresponsive after restart if Sophos Endpoint Protection installed
Microsoft and Sophos have identified an issue on devices with Sophos Endpoint Protection installed and managed by either Sophos Central or Sophos Enterprise Console (SEC) that may cause the system to become unresponsive upon restart after installing KB4493446.

Microsoft has temporarily blocked devices from receiving this update if the Sophos Endpoint is installed until a solution is available.

Affected platforms: 
  • Client: Windows 8.1; Windows 7 SP1
  • Server: Windows Server 2012 R2; Windows Server 2012; Windows Server 2008 R2 SP1; Windows Server 2008 SP2
Guidance for Sophos Endpoint and Sophos Enterprise Console customers can be found in the Sophos support article.

Back to top
April 09, 2019
KB4493446
Mitigated
Last updated:
April 25, 2019
02:00 PM PT

Opened:
April 09, 2019
10:00 AM PT
System may be unresponsive after restart if ArcaBit antivirus software installed
Microsoft and ArcaBit have identified an issue on devices with ArcaBit antivirus software installed that may cause the system to become unresponsive upon restart after installing KB4493446.

Microsoft has temporarily blocked devices from receiving this update if ArcaBit antivirus software is installed.

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 8.1; Windows 7 SP1
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server 2012 R2; Windows Server 2008 R2 SP1
Workaround: ArcaBit has released an update to address this issue. For more information, see the Arcabit support article.

Back to top
April 09, 2019
KB4493446
Mitigated
Last updated:
April 25, 2019
02:00 PM PT

Opened:
April 09, 2019
10:00 AM PT
System may be unresponsive after restart with certain McAfee antivirus products
Microsoft and McAfee have identified an issue on devices with McAfee Endpoint Security (ENS) Threat Prevention 10.x or McAfee Host Intrusion Prevention (Host IPS) 8.0 or McAfee VirusScan Enterprise (VSE) 8.8 installed. It may cause the system to have slow startup or become unresponsive at restart after installing this update. 

Affected platforms:
  • Client:  Windows 8.1; Windows 7 SP1
  • Server:  Windows Server 2012 R2; Windows Server 2008 R2 SP1
Workaround: Guidance for McAfee customers can be found in the following McAfee support articles:  
Next steps: We are presently investigating this issue with McAfee. We will provide an update once we have more information. 

Back to top
April 09, 2019
KB4493446
Mitigated
Last updated:
April 18, 2019
05:00 PM PT

Opened:
April 09, 2019
10:00 AM PT
- + @@ -80,7 +80,7 @@ sections: - type: markdown text: "
SummaryOriginating updateStatusLast updated
System may be unresponsive after restart if Avira antivirus software installed
Devices with Avira antivirus software installed may become unresponsive upon restart.

See details >
April 09, 2019
KB4493471
Investigating
April 25, 2019
02:00 PM PT
System may be unresponsive after restart if Avira antivirus software installed
Devices with Avira antivirus software installed may become unresponsive upon restart.

See details >
April 09, 2019
KB4493471
Mitigated
May 03, 2019
08:51 AM PT
System unresponsive after restart if Sophos Endpoint Protection installed
Devices with Sophos Endpoint Protection installed and managed by Sophos Central or Sophos Enterprise Console (SEC) may become unresponsive upon restart.

See details >
April 09, 2019
KB4493471
Mitigated
April 25, 2019
02:00 PM PT
Authentication may fail for services after the Kerberos ticket expires
Authentication may fail for services that require unconstrained delegation after the Kerberos ticket expires.

See details >
March 12, 2019
KB4489880
Mitigated
April 25, 2019
02:00 PM PT
Embedded objects may display incorrectly
Any compound document (OLE) server application that places embedded objects into the Windows Metafile (WMF) using the PatBlt API may display embedded objects incorrectly.

See details >
February 12, 2019
KB4487023
Resolved
KB4493471
April 09, 2019
10:00 AM PT
- +
DetailsOriginating updateStatusHistory
System may be unresponsive after restart if Avira antivirus software installed
Microsoft and Avira have identified an issue on devices with Avira antivirus software installed that may cause the system to become unresponsive upon restart after installing KB4493471.

Microsoft has temporarily blocked devices from receiving this update if Avira antivirus software is installed.

Affected platforms: 
  • Client: Windows 8.1; Windows 7 SP1 
  • Server: Windows Server 2012 R2; Windows Server 2012; Windows Server 2008 R2 SP1; Windows Server 2008 SP2
Next steps: We are presently investigating this issue with Avira and will provide an update when available.

Back to top
April 09, 2019
KB4493471
Investigating
Last updated:
April 25, 2019
02:00 PM PT

Opened:
April 09, 2019
10:00 AM PT
System may be unresponsive after restart if Avira antivirus software installed
Microsoft and Avira have identified an issue on devices with Avira antivirus software installed that may cause the system to become unresponsive upon restart after installing KB4493471.

Microsoft has temporarily blocked devices from receiving this update if Avira antivirus software is installed.

Affected platforms: 
  • Client: Windows 8.1; Windows 7 SP1 
  • Server: Windows Server 2012 R2; Windows Server 2012; Windows Server 2008 R2 SP1; Windows Server 2008 SP2
Next steps: Avira has released an automatic update to address this issue. Guidance for Avira customers can be found in the Avira support article

Back to top
April 09, 2019
KB4493471
Mitigated
Last updated:
May 03, 2019
08:51 AM PT

Opened:
April 09, 2019
10:00 AM PT
System unresponsive after restart if Sophos Endpoint Protection installed
Microsoft and Sophos have identified an issue on devices with Sophos Endpoint Protection installed and managed by either Sophos Central or Sophos Enterprise Console (SEC) that may cause the system to become unresponsive upon restart after installing KB4493471.

Microsoft has temporarily blocked devices from receiving this update if the Sophos Endpoint is installed until a solution is available.

Affected platforms: 
  • Client: Windows 8.1; Windows 7 SP1
  • Server: Windows Server 2012 R2; Windows Server 2012; Windows Server 2008 R2 SP1; Windows Server 2008 SP2
Guidance for Sophos Endpoint and Sophos Enterprise Console customers can be found in the Sophos support article.

Back to top
April 09, 2019
KB4493471
Mitigated
Last updated:
April 25, 2019
02:00 PM PT

Opened:
April 09, 2019
10:00 AM PT
" diff --git a/windows/release-information/status-windows-server-2012.yml b/windows/release-information/status-windows-server-2012.yml index 046f75de26..831a726f86 100644 --- a/windows/release-information/status-windows-server-2012.yml +++ b/windows/release-information/status-windows-server-2012.yml @@ -60,7 +60,7 @@ sections: - type: markdown text: "
This table offers a summary of current active issues and those issues that have been resolved in the last 30 days.

- + @@ -82,7 +82,7 @@ sections: - type: markdown text: "
SummaryOriginating updateStatusLast updated
System may be unresponsive after restart if Avira antivirus software installed
Devices with Avira antivirus software installed may become unresponsive upon restart.

See details >
April 09, 2019
KB4493451
Investigating
April 25, 2019
02:00 PM PT
System may be unresponsive after restart if Avira antivirus software installed
Devices with Avira antivirus software installed may become unresponsive upon restart.

See details >
April 09, 2019
KB4493451
Mitigated
May 03, 2019
08:51 AM PT
Issue using PXE to start a device from WDS
There may be issues using the Preboot Execution Environment (PXE) to start a device from a Windows Deployment Services (WDS) server configured to use Variable Window Extension.

See details >
March 12, 2019
KB4489891
Mitigated
April 25, 2019
02:00 PM PT
System unresponsive after restart if Sophos Endpoint Protection installed
Devices with Sophos Endpoint Protection installed and managed by Sophos Central or Sophos Enterprise Console (SEC) may become unresponsive upon restart.

See details >
April 09, 2019
KB4493451
Mitigated
April 25, 2019
02:00 PM PT
Certain operations performed on a Cluster Shared Volume may fail
Certain operations, such as rename, performed on files or folders on a Cluster Shared Volume (CSV) may fail with the error, “STATUS_BAD_IMPERSONATION_LEVEL (0xC00000A5)”.

See details >
January 08, 2019
KB4480975
Mitigated
April 25, 2019
02:00 PM PT
- +
DetailsOriginating updateStatusHistory
System may be unresponsive after restart if Avira antivirus software installed
Microsoft and Avira have identified an issue on devices with Avira antivirus software installed that may cause the system to become unresponsive upon restart after installing KB4493451.

Microsoft has temporarily blocked devices from receiving this update if Avira antivirus software is installed.

Affected platforms: 
  • Client: Windows 8.1; Windows 7 SP1 
  • Server: Windows Server 2012 R2; Windows Server 2012; Windows Server 2008 R2 SP1; Windows Server 2008 SP2
Next steps: We are presently investigating this issue with Avira and will provide an update when available.

Back to top
April 09, 2019
KB4493451
Investigating
Last updated:
April 25, 2019
02:00 PM PT

Opened:
April 09, 2019
10:00 AM PT
System may be unresponsive after restart if Avira antivirus software installed
Microsoft and Avira have identified an issue on devices with Avira antivirus software installed that may cause the system to become unresponsive upon restart after installing KB4493451.

Microsoft has temporarily blocked devices from receiving this update if Avira antivirus software is installed.

Affected platforms: 
  • Client: Windows 8.1; Windows 7 SP1 
  • Server: Windows Server 2012 R2; Windows Server 2012; Windows Server 2008 R2 SP1; Windows Server 2008 SP2
Next steps: Avira has released an automatic update to address this issue. Guidance for Avira customers can be found in the Avira support article.

Back to top
April 09, 2019
KB4493451
Mitigated
Last updated:
May 03, 2019
08:51 AM PT

Opened:
April 09, 2019
10:00 AM PT
System unresponsive after restart if Sophos Endpoint Protection installed
Microsoft and Sophos have identified an issue on devices with Sophos Endpoint Protection installed and managed by either Sophos Central or Sophos Enterprise Console (SEC) that may cause the system to become unresponsive upon restart after installing KB4493451.

Microsoft has temporarily blocked devices from receiving this update if the Sophos Endpoint is installed until a solution is available.

Affected platforms: 
  • Client: Windows 8.1; Windows 7 SP1
  • Server: Windows Server 2012 R2; Windows Server 2012; Windows Server 2008 R2 SP1; Windows Server 2008 SP2
Guidance for Sophos Endpoint and Sophos Enterprise Console customers can be found in the Sophos support article.

Back to top
April 09, 2019
KB4493451
Mitigated
Last updated:
April 25, 2019
02:00 PM PT

Opened:
April 09, 2019
10:00 AM PT
" From d3d97220593b00a1c9e77bf451e98e741ca68ef8 Mon Sep 17 00:00:00 2001 From: martyav Date: Fri, 3 May 2019 13:11:09 -0400 Subject: [PATCH 311/724] added intune back into known issues --- .../windows-defender-antivirus/microsoft-defender-atp-mac.md | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/windows/security/threat-protection/windows-defender-antivirus/microsoft-defender-atp-mac.md b/windows/security/threat-protection/windows-defender-antivirus/microsoft-defender-atp-mac.md index e159d86a94..e05ea856f0 100644 --- a/windows/security/threat-protection/windows-defender-antivirus/microsoft-defender-atp-mac.md +++ b/windows/security/threat-protection/windows-defender-antivirus/microsoft-defender-atp-mac.md @@ -557,7 +557,7 @@ Or, from a command line: - Not fully optimized for performance or disk space yet. - Full Windows Defender ATP integration is not available yet. - Mac devices that switch networks may appear multiple times in the APT portal. -- Centrally managed uninstall is still being developed. As a workaround, a manual uninstall must be performed on each client device. +- Centrally managed uninstall via Intune is still in development. As an alternative, manually uninstall Microsoft Defender ATP for Mac from each client device. ## Collecting diagnostic information From 85af1f78f5d607f1fbe68cd63d9e470349b01cb3 Mon Sep 17 00:00:00 2001 From: John Kaiser <35939694+CoveMiner@users.noreply.github.com> Date: Fri, 3 May 2019 10:14:00 -0700 Subject: [PATCH 312/724] Add files via upload --- devices/surface/images/sdt-install.png | Bin 0 -> 91335 bytes 1 file changed, 0 insertions(+), 0 deletions(-) create mode 100644 devices/surface/images/sdt-install.png diff --git a/devices/surface/images/sdt-install.png b/devices/surface/images/sdt-install.png new file mode 100644 index 0000000000000000000000000000000000000000..ce0fe297d7d1f9f717738cbbb4b873e45ff85e89 GIT binary patch literal 91335 zcmX_{V{~QB*0!Hcx?|hv*tR>iZSUB2$2NCt+fK)}?d;g**XKF!`R<>!#u_zNRn1v< z&AL{&f}A)!3=Ygc|NH|lDIuct&p%)+|NQf95DMaN3#5a)_CNpp{6|tmP{lp-JnM(M z>fzTP0S;GVz9n1|vHst)n|X}^P+?)jx>BKyO4Jfi5`p>o0Ra+jZf@4r*2cJJt-4>J zOdCd%Qp)G~9?%`{`sF1Th|ey|sT-tSQ|Ve10qXDT2R9wDKG;M0;(WF-`EgG2mSvnR zrpFZow+tHPgI(L7#Wrd4;wIqHQv0=uFaNG?p8?BValXsMm2(&4%=wF)#z0^E za*MfEptAD3E_?Lt{MqG@fM)vUK)uH@&fZtE8w1)Vb^Pu#{_vgQ+}uwkW=228n<8b@ zQ3~mldfX=Uw+^S?=W`gJH4k&1gtcoe7r_-^SBX zM?_-M57E%5SE$`bs#bJ;ir7g?{8#VtCyNy=Qnn4NaC40RYr{o8z&a$Xa&vWMhY1ER zQo0E$pR#VwQ=pu+Y?>2^`>&q0UxfRjCIR~(eP6L~Y=$OS@<4Q4<^^U*m@2SDAxUQ$ zu&vY2Qs_9azDH*G-w&u`--e0lGR~j2F^m1BT(Jbys z|Eo{6q+0>^=A^eWld*S*sY|N3buy*mCv%~nSfeP^XV`JqFA6DQar9yJ3 zr>p*P#ivs97P|+p=S{;FDcq0$=o~VW-}85dq#9$f{o{h9?Xa0Zs3%38+Z_sk{u$WH z8p(=EO8OaWVruH}bgBDyC?#ZN$;ikK!wGlao}b+>H#?qU?RJ7;F^|`K1fH(8za~Gn z2>CNj$5Zl@%CgtnOc8p&X?zx-HRtu@6W5ziOx&!J;*h3=m6elZZe%<3&er0e%xfcgk^V!y4&@>cgS-la+IdbwB{BoE?6~-uoGo1 zRLNOZASVUPsb|BQz1P0eTfAEB)do-Y(E4$vqpq0NciV96bFHR0o02QTWzXGmRfCa< zKS8jnI9-A{%Y9!eS#!qnEQTv@DnQ3<&0WkF`#w18C(V(CsY8NwyQ{I2b6JMb(r-1p zhn3Hpj)-)b17WHl%8y$p&(A~2_`W3fMspWJI7YTPYm+hkevQ@CFsTS7a)Dys0R)CG_0gsM z<%%`7bYmD#pWwroQT?{VM(l?stgb6{8ni3t^65r)IUADh#4^8X&JOoJm5t_ z!fbDEj~Iq3VDxZVpzo=V-?HhIP=M6e*LNbD3)RohFQoe^o6`Gm*M0??%M#6vq(GzF z8ryU%#pe>FepHl<83fera1H0s5hR&!^l)nax`lnPTo%hw4GCN5xc5{IC6bNZG!!k4 z+pjGlQ6G1>X&p+T6L0nXNT-BCXVBx_rZP!-L_l-Kquuh3VP})t&!N!4NnGi=(f*Sh zG36Rm?1p!T55KLx_plCV>4E0a`Z8E^r48))S)w^1lC?ETWQv z`(f1$Eo#Q@(>s!F%_;8#tnSRh_!}a9W+&bI)8}V5&1`cUWcmrEZK{gAKbn&ujj|YO z&(z?uI^0Uq&-6R|DU&QaeLftPq0X>MsSYlpJ03^>>AP%Tzb+RJ?#W0f#9dx-x<*nZ z7bu#kbQT&*E^(c_ZQH+BcgS_2k<{qma4#@r990!=U2#RiZQd?Yd)k}UX-@Rx0(`i` zWt_e&TmmI|d*7k&7(-+YX9wJzVr&0tCCwVezmKe`$a8)$C zq5{^j2(MsPP%0uOEe%VpQlt0&Wd1H|Fl?d)s!E$zHi|Ni0@<@OCzqu!iJoVcE;EWq7($3U+}m-cA|vNGop z`i(fj;TA66F?la-F4LU9mO?bK=616gzZEi-^kswJmplH?xX;i`i?Hf#WrSqO^4)6s z$H3V{sV>;@j2~JR^--9@Qej1<&O4P?wW;xKRbMSKNoi(tybC0QJ)Q9Mz^>;O9!rd6 z2)K3EnPAHlok*g_-l2^*za6}y7&hR`{uL2VDltJGCl?L_8>R?MIeTb1rFWGu_4cK> zVg+ApLl}3?Zscd*J0ZT4?L6L+EsuQhBzBWDS;*9}yoY*GYjMOTU|iQ~++ViS;SkLm zlqwIb`{d1{@Dp@@6nq@OED$|$#+Y9H6P?yELGVlfTI(K4vxO(nEo|3NW6+(Rev@~2 z?4=||8D=U}_UT*%xYB2g6tf`CWT-r+T2358Z(e^xxx_ObzC_JUae8-zscJ_&NIvzC zrM`;GQ{suV3k7ox#%s&K{U#Vp^hO?;QaN0rhuFRVk6!5U=-cr-acQjc&C}_9an)Lr z*T2e4nUR{Wbj{+sa7L?>?Y8G$XU2R15V52CCEZ+t(vD!=b=51jFoHncHw{*DFx#%ggk-dN=#w?24p7fDlS8R|q_L$OS z8gn76=*F!@i4O0zD|3STJ}=X+u;-!>p_lXg5bX{iza7aFoa=iZFh|#?>_1JmB+Q`vMbu+ZxTy^h8_X&K!UEa-K?S4myB7JvY?k!_GZG4 zNNI^5TX@XjA)%*%Rl&qM{EXmf&k0CzlU#+`+GHqWh-<$wZA-dm`mx8Nq^C zBSsv}F3ZD6WE02u@!OXPs6yO<5j(C-$nfwn?!JeAGYwsAD~hOt66vyhcB|DOe(y#O zV914DfpCLkrZ#IfRZb1@5JGt+PbDsU!mN{<@vS%>ShhC9REzi(ERKS~{#_vg@v~rc55tF;jrxSrM z-o^IE!w>!}`|j3&7B9qoo$ArO)V3=olcjG$XD+#3Eplk>Uv%J*KEF(+1|Q6^`8(i4 zl>)8oHCtcduMje2gbe7)Qylltr^lb22NBa$h*(SU#eUl%xumz0Xu8i1KS0sK#6`__O%IK`{kbvjfn&2ddq=9Z6Z3cX+R~nJe8X$=VFL>ix0v zTl*ET)s2_e+;liey;S4hUrAkk_+l437$TkCN7AA1@#~XJzA$8PXM!5^qfPtDg`rY1 zqayX0oX4njs9OqT3zW|F`2v4X+-qEA8!W_GkU}~i1U_*qE=~Ucsz#nn;E2h+LbTMT zbiSxr!B`y}EBhY)bD`W%PB@NS6>(y?hH*@dfE_8uHG!FLrW7w}~YSKL?6 zFP+K$#>c(qVaEaXH6GYPAj?o=4_55g2q*-a2>|PgjOiiYazgc{21h zMRs0f%hgs~zH`A1W>YBW_>yHxMKk6LK_MX#a=&6ph7(d`Qp`-ZaCK6*?s|^Iu3lC4 z@G`1#+(G^7*K54!U2LGbt3ubJxE9E7^tEsE=q4%F!n# zfiMp3-H7mhY4W=V7exLI=2!$HKUF|8Nj5v`Qr*=BK~j%fxOU4uT-n-h2-A1-2WCpT zGHcyeBFIY97t2l7zMy_;RUsQWgFgv_?;E+$7ZvP8l?&9)O}KN7T1+~X{3=wJ!i81b z_~{Epxlc9ZR}99|59F0PO=)>Hmi5(doEVem^0iXokr|M-S|y=fHFNEICr8xX9%pbs zH0s&7<&LLZ*J`B_u@i$BjfmNL3%&q8Rn9)`xlIm#WdXaR=NGGusLr89P98c!YrvZ% zexRAp!1`psZ_h^I-rd-aS{k-YGAB>Pw$_MW7wE4tTBFr^7v?8-!+u_$c`SIVE$Mfu)efhpy6I*(M5ofeEAf4~!A|ZCa*~2FBoco9s4Ufy z753T_YBIr%td{G^YKBBe?7%8jpErEELRlw&+f!dunZRhls(B20pYeZEr>qcK=i0zArT+6^a zT1~ItsU_7rUFwzxQJNlPT^(`;qw+U0<+M>%!i|^(GdpLvQJ43_a2sveJ9_$cCQ{x&oqOyT&R&+x%?rjG8EUp!qXM&Jh9M)0;yI@vEhZfTEFHwyLnTl!q6K| zu+%g*DpVBM?GRtmldtZN*otsm6dcx^FGM@mer(DlQ68LZ@c#7#Pn(P@yb9X)I+H=n zICQp`*{!9?h|@LbN55C$dzHN3t_77~VvEEIQg5763*xALK0s)3AZ}!-<{MZwnU~IV zQrWqdi6Jc>yFDYZAYPI*o6)(_>ID`|A#Hh8@CAqWIoKjfFL{d(3la=uw@N8Iy#_5( ziJjo6sYtapgBURxcyl+C)*35ur4nD+(SCGhK`xyQy#|tLbO4AFhg(cGF>N&KZK>#_ zTCe*%S9KoE`}>Iapq^NiIXxJo%jy6e>ad`Q7 zXDCfLt=Thme9B%t1=`uB+d!&tYL17Sl9lWBA*Vj&U-7Uqd-6Ydjj7ctpF>$$`h*|a zxYMQHiN2Q{s#d7~^%xfAYE@$;Ilf~P*esL>AA6Z-1PBeZ+sw~k7!}Fq6SN5h`wFaO zF?kMrkD_h%d({b*Q9lE~!9BX9&64Eg@C1A_<@sMkl76qZ*nL$fk0^{qlMa|7&;7MR znTebZpWGB2-jYGuY{MHw;`g|hdz*4lprOynnjMDO)%u^b(X5KP z?+}Zlf9;WlM%TA*p5P8{drm2|En1>PT(Gz#T1;Tsp-LC@y#n&()P91>w}1%OE-chDHltiB@O&M7OLPWFOGg;Dn$13QIP2VxkRxKiJ?6N!}7!%0>ku-g!hO+iNVjS65T5>YpUdiYGzT9HBv**64R^tJz2Y z*tr-qt<|nLT6%&uWRt4V%Py~;>{E$}qD%Lxcl*lFGIchtq2Px&cBr<5UHLG)sPu5} zp#P>olapb>T^DbJE(+h+{$W&x=u^YZpgI)`T?MKrESVXvM_MUz+Cup+j$@7|%z<1d zAY74BaH0|sOg(c=Ur=x=xg7xF1yjhF&9GsMf{7gXOtQ^nA>#Mi`Si_7Zg{U;vcJPf zTrApZcr;kHY|#l$pP-wLK)V}6E7pTPvN!r+@pJ@v-W4CAt5{3u&s<1;CHEdtVb(Gq z0Ny!o1B0wKA~l=n;lbcUj#zN@JI}lRgt(f(QHC>)>pRQOmBF+A7~$ey1xvXTS=2C1 zI892iEQc=G(pj(r}az~nJ35lQmgqG-J6+W zYuT))?VRRILy#4lVyjr<4H-5zDWgsN1H4scSXNLYlV4om|CGV2y1d_ zVarDlOcP3yWh}}u`0Rv#M%bE~@J*KNIqx5IYM4EtD`jIgn%|d{LG>vk+}ouUKT*!) zczxz)XA|&N0y6CpnX}GX&<02)=7~7I|qr1_=~L;x zaGRWD6%ZUMgQwLJksB669^Ec`V>UeYP>^8i;-Yc1$*%-#U0JgZ-HKm7+1*jTmIjl+rpe` zUq;AS@o>gdf*Y`3Ju!(fyhkT&cRN2$$kW9|>)*~!;LbK8>(12X8rrw_efHg18wtL- zq_NatuIq1)z1)RAds-+$s^;3|a9l5p#q+$OpzTFsu5L)N8KhQ>C}x+(uSOYJMue(S zM_84ICbC+B7C@q5bX-$k(=wcKfV##*kcjYF-TqAcAP6P8ab8 zbe339-d(Y!E(e#8Uv^@+rN^Ak#)SO)%HJdu9PXDhAf@KX4HV0I{ta`rMX*1JiYJX& zG%W3#@0>q9^^--JfxvsETdawe68>2@r-G4yiMZ)47wxlW)taVo1BOYZQ1Ml zkUKUL#Z;}$hbz692nsf~tkJpRl5QkfqZ(Ofmrj{ZUvP!jvJ($K@VEi;+2e(y5H?<} zk3~C2(o&23$a@+uk|;4sCJSqdCecD+gl}|ieYR-B1T;BGLjf`Kv=2w2H(EyiJU6^)8qgN)`*GKNj0(SBP;o96N0jhUg9#5GHBrci*w`OxlDG%Zs0l-ahu@e- zB;~uDF|t>t4{(4`BxAaIcS%64sEW15fs;wHT3XydcDi7i=3>`)k)xQj{)++9x%sOG z-$$dE<4*T73sW@oHKi^Yhz3yQ(Vs!{y?heRR&Q>K$=>@@oo@wH!G(>^9}k$-|6>8} z0ocb%Z3Jeya@%Cy0=2}EZ%xHlp!EUBqQycI5*F=+ozhNThe8UcLjW2y6}CL}xHUQR z{QOLYQ&8`%ZiljnYs%=I@7~;n*G7j!$fW)RS(^kO1Zz;?f(FX`9Fs}W-YVQDBSXdJn_|~%@g6>?RR(Dw9Gmy^4$-~p?x{H%aLg)Ub zTBMB6kU%hCFcd?@k_^|S+4<;#Jz97Mhq!JyXBMB16FYh!`?kc^>h}c49Sp0dSACqQ zBoQ@JART+S(_Jx8^g44{w5CF3M9fA8EGNB+@SBW2DK+!d!(qb3yAMM*Cd8-57LoAl_hX~!Y`z%BS4*}!6%EVapSU8Zl8?8^kVyY1}fN_fbE)$JNkrgM$Z940-iT<@sF z%8ZO+*dx05Qx9j2fe$a7u0H$WlKbN;iu;r}S_yl=*jvA6wTs^L7csHP^vQ}V>pwhf zFeQDm8ZR%9NsE8By0-6D-NfU)+VfedPxx%uZNLO^IpYrJWn{iO3HjuM;(a;%|CE2c zoE8v;G3+6b`4W*i+&E4-3?y~TR8GI0W3fjQDc^VUIaAlD``%*!q+9zyr~+hcjjToQ zS)<)fh&8EVEG`Eb?rkF$tA5PG6j24sJH1H{>W1{o2@rz;NCeXKTSQ3+!NXuIox+rA zoWGo{mD<$Jo{zJmzMTL0pbySd^qeX5;q$&g{L_FM?gr%oE)HaQG%lPwrs2tHWR^bz0n$S;}*MHTx&Geteiinp!Ren@%y^Z zPHhJri};isE!dLDQO8frk3Br~m9RK-C@^Ib2Q?S{`<#7BRr+K{ASUxoSI!NMHgL{G zTgl4~21u^J<%OhG&iZ-jaq}Vt7LiiaT7uC4u7}eQ<)CT&eBOWK4g-BqkKc&X6c-;I znSkt(l5-??(AbM^r_6n6XjgmN{|Tjd2mcyXJk(Y;0pv`XkjGTaH~Arj#XB?3>)~=Q zWaNwr-0ot*9S<06p)VMo$T#`cpn8EUVNOXosg|U->&@xLuT0@1GuA#;W{uV$p7UpLJ`$~qVxRvrj@&mcy{cFveD1kpRB&G|{+FAC)Bxx( zcJ=cF+;b9ZFmq;XfeuqHZ3?$-1NvzU-vhLWI)TFz64df~qgYcMt6yj-4}(eLU!#2) z-Pb|pbTn!78nh~d{Xv4!0ahUmpW@9AEvO$~c2lS_I_EAx$ML%pX;4aIrN$LXq)rA8$)!dyfdxp*hrgAFE^|v zRTgO-{*-wlnfak+c!NkdR~lvz=#_J_X$<6b!uh0koUPovthbOI>%SD4&tV9aRqOXm?F~i_4zTN2=}J3W(?(~o7F#WE zu~z4sL=uI>Iv1U24q^7NfL1yVAXDhHV@}H?ea^9hI9Q5ssD-t@y#={2Jr}J;a>{L&1%d4_fS}r8(*K%5FXw+`C%d`yz^_HP^<_g*!@6j z?~l=(apUMLx0ND{O?3BITL+R_5lSzC7%fIGv`Vl}X(dUrHgZ`hpHS_##;>az5YTrA z*OG?z*qIy+$BflT7(eZPRl`)sk{aDN!Al_ob^ni-2>1+N#_85@+CtGD?cvX~o`DwRot(1G5y6(+PFAZ93R z$5>!Lm+LxaVd_1=CW9jY1L+xYCt9Tx3EdWKwey-huE7_HLU8)kN<3+cF&oh__7JDyx&PdtTceu zpG*TiyU?Fr#+vdONl06fZwKHAc+;+WzOs#nV{RVT`5ZVi6|5FmE6ImT$_epfUQnFg z*x|1Ti~ItooX;MQoXX+`zQE_EZYLjU%mc<0+5g~wbg_7|9-`t^nKfASjWaMt)&&i0 zi@Tl!*3|ID%BB%&JH3$0KxCw!p-_Dj#yIEfHfv#1odIaimmOEkwi}$5OO=0dA-on_ zUC{H5kNpY6t{cK!lRKx)8hpND1;!kf6mMUDC?o}Y-O1W=YX>I@icH(!prZ!0Vm0{ zGSm7)p-U+|04($`rPjn5bPp%ifVEhxBn1{7H1L(svUTdw^H1d6JT%Nb*lwr*>6^s6 zy2Dd}H=BUPGuh`haS*_&agJCH1?B6zNl)Er`hU^9znv2TWl#YBqxv=_`l9|1+UvoQ zOpE_N2vMB`n&toK!Y@lwLouO$wYMEvYhJ?Y{l6!Gq`Bk&BOak}5DdGdJHQ>-Ja=nq z^)l0jMW1QP1wQ?;6-@uf9o`TQ396+4li*;(u`!ffT$S$C5@h2nU3RWW`^D+{l`H;C z%lfx;pmys~H%@(3s&3gQzv{a9AZ+OWDEte|6*3+gB1ZhA z)tMtB(9Jnhvd*}H%h3cmbl(9e0>K2}VOrf2vrlt+N-Rj?F~=&*7o@^0M{_EY3QIu} zfUp0W74rW7-}IFkWP%!MXL9|q>f9`fJFAWS1FZ=!U<1wFJekw#aIddSDj2Tln1rPN z(%zuKe-JQiQfJJ%DmmGlQ0i98u+`T+;0!hmm?2*Ps`v4gY0k;A3V&2_{%_3pzUbH^ zv-;KNG<|84>Eb=>;aqE192^yuR-{E`?Z{*!d6daDgyUKuI55emn}pEJ516spJA@ZD z(q!1@8fZz2fUQV22KtTuETb5E4YUI#TAJ}$gHs)1YsnKko3C3c@GhZdT4S#@ME{%c zFGNWxwz?Y;=A4|-9j)>oq43{TWfl$KH)&euN&|R$`EfcMVHN@+j#^|ys-?iX7L#c9 zgreuzxv_0F!ddK}0p$96^TI@Grg6na7{3n(wBWo8` zKXf}a*Afp?2I}t?aXeJnU51X>T9{8dXQNGE9!ed6F7rfS~%ArM+K<%qWG|`X3-1p{(K2e zzNF`v)WrKw%1al*)E>?F*;B##-#Pf`Dj3az9wog^;F->jBq3qKCQ z>(8D&rv4F|+75=M6I^U(&Q*4>z1o_JePghH%ox2_=4miol*le#@WA5&0-svrkPtC1 z6HF#>kAH5xd13}ux}r&;Qzsv+k^Vbl>l>XV#qS`yit#|xzj zXQ{|?(Xx}(0FH;ay3TaeOy>DEyH$Q}@Z!E)ErdGyt^T1ne8Gwbdo`b)jYd7+GFq$g zcs3MhC70_}D&t_#0`jhh<;ob9+^4m5;C;=^sT}#B)op}C-O=yjv2ydB402%6=y3Rv z$diKk#M|M?CvYJRk*~qMhp*LgJP<0q)L^lwqQz?cs{z4|(RfqQVS61HlNoUSn#n?n zXLOojm{fC*p??{BblOW6g+G(k%d(7`oK>(|Z@Oi)U-;Qrt(shW?dg2nmWIkvPq=h_ z9s+dsYa_=G_5SO6DKvOpkZQVbVY&c*qwrZDyS^aE2=trZ*2T z8NdCzoqZzIH_&=J@digPH`M(sNK)&qedUMq z8UP0usKS<)nDc;ey&Sv^#GH8!K{`L2cu2l$bperooQC9MfbEEGW23GDEi{79gO(_p zeb}{;|H zU(&OqeZn}M(g@wMhg$E*#g{8aMkM-4pZBeKBvb;zyK)|gPWCXiE??=_?MU}A6oTfm zF&^o1#;tzY z%$EPiuU0W<3FyaUaJX3zM9Ast#r(+FwUz)(FK;{DcY_0^-X<`b?+Z!mf2@wGN-vI) z5v(5_;s(iAKiN5Yme-HuEM;JNL>vdK=Jqs!FhOyOlbSS%_(p?Po)$nLoOcYkO|gz!e>Dwd@AVv+aJ6HBR)P} zvKXNc%-dd3xcr3QDKy%|t1jKy8-zY2b1Da&9F+sdMNQK&8KVUclZ;v#P^QBXH`0&$ zY}9Mgye&t@c8LPft3G5+uKm1I=?*Xy%Nt2HxTpOo6ERlaWdQA1=sJk&z*dHH5=aoRwJfYOMLup&i z;xj`8WQEf<;F#t7tlMbhF?-3C z_F@lOERe3Lp18t^XgOnX4f~Iu9{55d0&c38%yA)G{bLyJzej&xsSH)5<-cf7L^Ur0 zXbxtygU_~=gBn98bYnXOYowLpYPCp4dvGQmx%@e5urJgeUnos*A&`!0h)!<>eYbcs2x>YfGK5o*3sUn&7wNe0T=6`7@cmMdt16Vs zB{7SA+_dnlquG}W)Jr3YK^xOjdAYy5gN*83GI=~->I#f6b#`ro+`+(LUm}ntQ*=Cr zE!mHjWc@QrQddrdEX@mk9;Z8zbOqtV*e}FGOYvt=xe<@rD_IgCq(^4(^Z`fa;w&1#6rI+6Hch|W)7FfH%XM&G}=Q0)PTPfropz4`o?(--r`pRd9j_#Hg| zHSm742=rT1dpmr5qhgTBT}jT>J5sB}Tz18M#==yo%1he)xkq^u7plqOy417Xz7Fr+ ze^Vd)wQG@0R({l#PJHY(jG22!{dafs0rA8=h7||PWLHoXBS%1^BeN{RP3D%WB zu4hkMW~XCNmi98!LlsVGC3dF3HGBrWro-JBQzew5K!gs($;W!i-D36KF9(2kL-ahw zV}pf}w0Bmo(KjGT$%6-%g~{H}QGySKMD(;8a>`CBhUCQvqQ#OWzupa>x->e#p1iHW zR-=3y$x;XTZjm&&XH;8Xvd|%QVLUSCNkqGY?t+*{+l%rVB3y_Lw9w4!$lZBreI|F9 z)K4C%WF9?&sr=tbDfr^)t+6o!$J!z=gu?Gsic`%V+F?A4gYhw1Dk`BW{aPcAU zz&-I^!O!LI`{hZfdsTzW($aOmIK26qN|WU+0YM|Hp>Jr8M65ILMM5!ExnXH$zpB(` z>dGmS1K9GN#>>8wZ0n5tl>U0p^gm=^W#!q0OKj&Tc(^tdfiA`$RxR$l!Kr!F4camg zr02Yd=##&2`#+{B1Ip9N&#dS3_uJ$lKf-cLl*9 zJpQS9IQEA`peNKEN`epN{J6tOseTiq?QscQT2K+P_HM_r2;NHDf2Ii&2$882lH(7= zb~9yO2e{_C2fD5L4hPQ|?S6N65AQ2*YGO{J!hQy$2>f@J?nE@?c78==vnFOm1fw<5 zpNZveC$^bbw?&Hb(*QE|+dT5osLq9kZ*9?@6ynltjQtw@TS-5h&Z03ZfTMCdbHV$C zz{-&%xzbD%(&4S61>kyGFdlWAnL6dc-dJW>I+TZ85iPef;7605t)S?eM~It^Sdmn+ zhw+Qvdj*^E{V<^d#Z2O@>{g*ZpB*iM9yzLXk>UhshZLW9j@7SA!{=Yr09iLT8c5L&GU{azm>d z%zx)=viiJ?boU6fX`}ub#@CtPTa|I6v|WeSDQZDyeR;9e6BXq#0DN^ zcB3vxA(B}@1`yT@0eX)v#oJQ3b342Imn~C&7V4l5`S?KfXxV69uX5t>S-l$lx849v z-jzJh!6G>eJ&l7cE8VKlvLe8P*CeZ{eu_2=!%l<3JdxR!MMsU14avaH+9BaHG^rzd z=0!!xMy&`~>_FnFN+M2Gjyp?3JZaD|Nm3c;O4Vvp!@E@N2*we0qPA!h~696l?~(8UrQTx7S4td;}gD{qmgB->A* zTsF7s(rn!(A|}R7ZRSSJVJoy~6ig@?%FGq9!31-~n$G01(H5T>Y^6YnuV)pherZeH zqa~wT4;-qo-5=wl5o`ISwLl+jck`5nxdtO`AS<+~lD||kd_dM{J)13SW}9fKq}=Mv zvesDkYpWjfp&ijwu`cAet3tWUUhXT&h9@Ohug36+Qk03qEMV(7s-Q^Ea5$c3WkM_| zSbDZtm1fMnqqEiHzvpV5@ag*chZwo{3dK<>^%d-Cp=l1HESdWjcV9&zK|!rC7%L&& zW#mLl(`9`8i_?`Gg-_A0h@BLsgUyybj7kmM`%Y?_cSf5Xc!(imB@v-y?ah6>{pvLbDfD$Vndm*6bW%Rt6i}Xw3)9bMG(rTpKQTGgIUenZ4Vji zn?N|6X0>pFZt5-NoYa47aSXdZsTPA2N32VJbBi`5UDLbs<#ZN(d>#`|yfCFtw0*M2 zl(g#c@+1ecs=%v7x)OD*%AJE7`^R@qk2yu%rntlPyvpd-#tUJr-SVikbtdOdGP|Xf|{&GgR{A^+w z2Z{O!0us~N6Q&)egx=xQLQjoUIPjRt;IJRFR(rrE17pT#-5tmV*2}wXB({W)G zl+;f&reNtH4N0ai4I7oVk4hc=f$=jb%5sEV#?sjeL*@8TGJTA@t#%_zpFHEs4Qqvh zzc*{7xvlKgVfEXQ*Fa>b?_mBr--Z4kRc{>?$MXDtCm}!}NN|S)XK{B3?hqUncX#*T zy12V6?(XjH?(XjX<8$x*KIc6D>2ns;-*e>3-F_@8WC%k;Rp`*i}>coK8CQi&gsz zOQ#~M8{ONgLu}_S=ar+)=u6iQ2~ou+igaLwkJ~+Lb)ztg>lH8W&@miC(?eZ%7+=Ej z!cOM>uA6oMU8cS90G6{74nw9`&3swp=RpdfsgFbUiBlFo6(h_?r@yTUWm6*A3WAcr zA9@Mb)obN|B_`=Cp}M#(2 zF@Ve=52tCqTak~+YvJzoIvAYLTu!yR0N|@m4nWu>019*|+sv8azE@^*itmw|bk<_~ zR86%5pKc>g@i{=)V!2%y5FX~c8kM=QQi+otvNeZ~#^$)B>Jz@W| z`zzTG^t2H3YH^s&D1ScUr{O&KG}&=TZdg%zGnd^IWJd-6MNJK1egH{q>?v_Ha;^R! z-&oP9#;i0i`|(`2VoAxqi~toQj)j701r!hQ)WDd zu%SkLDZ+Gxp0E#CwZA|%{M8LfSNMPZ`=ESF(G&_72nCiIr^O1?Zr_qdW?(=9OOw;_ zY)ulkwY8EGd<}T&P+cDDh%-@R&C@Kh&Afd{8(DzN*3lV;N=3#5-(4sU!K4)CTnC%2 z)Mx_+@XahzB*-#XyWs$ywcR|MJbyb510DKT1vp3|F)-MV@B5-7b-;Skr8Gau|G5E~ zB_`kn6;BuxqRroh5)>UoJb~%yBA$>Fl)SfOl59qVA6#i-1%HSW5=;`EI!T{$M$K5E zdLwSpsl{J9NuE)9C+uvc$8Kd&w6Tge8&XSx9yUeS+aZ*{H{I$mCv%T1LC$W4N}n?y znNieR@a%Ec47i2a`h;6bz1@tbMnSbQbf*FRjl|Q8w40bO14HZQi-^9IlD#(7PHt6I zz=hWzrPuP`;(eD&&DPId?T-hSqMxivBMxZy)Qh%Wdl4&Na$W^5tGAN+osWyVaZjHW z6&^l^;=70AF?;z>4cBM#tM3yiXwx8S!v+*{_q-S2?ti=|8t5@+cfdyz z!xC&T!N|&AWiIL^g#k5C+^UC$RVA)f)W9maFqP6iEi?v^ie51dJg^?+d< z5+tdKd;Iwd_zb}i9~Goq!=cY}bTzjxt!a$Ef+LQPfiQsm_PJtMI`%%4?# zbo4v#BdA||W9k!-y?T+4n6up1X>RQd3F9<;R?2fcUoLiYS%LqidxcPV^2jLB z^*M)JfKp+E6LECQdpF}fR~7YTy=^EAX8O@qqV(!oIbwXTs`B1$;&!>W^7qe&G-D=x zqr{2fV@{i3D@1<^TLLfs79zoH2X@WutAv+|Hz}d7iePrB)HU|NYYwAn`eFVILune$ z+Rxm}20APR%}O(4S9Jcpzjg-s>IQa2hAsfR^W!) z>%{^tnuabP2t`h*{Du|za%qcjD^2gQ*EAb_N&{Q`UXYM0>6qhsQR5Ug5OEikWE?FS zvB7GxIYjwlj8{`sykg=ejyn@A270)>D#GwCW)zeT@5JB1v65S51wFfWv-iq>i$Zim z#EUN=kFC__Kl6Cr8}KZ)#4t48-cT@^E`55wxB6O@(3Ua-YB(^KSg{s zZzk2#St&yfkpNua4jNL_o3#pc?K^H?1+cp^ks`yiy!|};o%&)pN-oOyHiG1%psc(B z+k4z316%2}o!?S>q~|!u2~Rv=K9x=bx6W28#|z2|2)v;762k<2WDhvOYRKf8I5cH>8omHq7FcYtj-& zE}_Y9YP!P&VP@7<;d*Tp1X^^-7$}mQbxdx{e9R`;s*ZS%x3`IN%7TlEx69{5akljm z?OPVtl+S<6=+x{7V0?BNAf@xgGy|U&$E^UN6^m#B;S{uy)cj-XS`8Og1j(;!BNSA{ zCtYR|_?s(pw>D>ZoOU6o2InFYjn8V_IhHu$@$Yn2T$fZrF8g$sSC$G^?*48V?IU%* zVoO?FK3+AYyVi2uZL>0TZhiP=$&MJ@@{X4yK1uEkMEt-Qgs@belynoDx)Sv<=;M$- zfklhT4JgO{dW|iiJraxW`V?y;4Yo?oUB8Zksf9|SOA7dx-1{KMI zI}s~Jc%sCeq<+LBcuS7pwLER`;PdIjTBRD=*7AM2!QvWf-U?T&`J+=5HC3AvOaNma zeTxW!%y?6rjH3b)E357bp3_u)QaJbdd#G}KGM2~jpDN#H7neynQ?)l=dS3=-vq@WV zP@yw|dw2RD=)84$AK^j=2%+4`=^82Mc|7-M(w|O# zn5tp7(&F*e4>7M)o8tlXK1q051f|KVmTy{Ca&(<1b!ms{e97 z7PrFvj&$ctg=)_cqh_QbRaO)hC$X;WVe?7x^w*r#z1<*QHP%$lrtHz$_*~rhb%%Vh zm{PEpV6?-{An+t+Hlv&&&-Fa!4>=Yxu$D^EpW;rgTZPJs%>#+ zdrB?O+Tq;Lq1oDEXDlhAy1FTT&PZB!ub@o9(k%mHjh3vLFBVag7W_OQrp{Y18xfAn zb@ADW%GqC_?9&(x2Hkah7E`Rd`&Czr`F8`|V5{xMdkJ=r2ha%iQe2mXkV3CIl@?bF z*b&zQSfg*Pgf5-K)wX4>*%;I);{k!ri8oHrjhB!rxO1VT>3WHV;1A~cjw#lV4S0Pg&K^$_j|I z%X+EftI#xDO=^tNmvKRmAX_w;C0Zf=KBj#G3b_PS(aID?Rz}!cl&jT-^h|)1FuLBz zB5%t*%)8K6m=FdwIwl}H;R~^ONKsa~xj7yfjD|tIK8r!Tyu+x{@x)`*5i@j6k1ns0KO4Tz?#l4a<1hFDt%@TM^;dCbAG$Kk0qn{>kI$^G7FR+Vk! z(&2^#(|s#^{%!0S>FY_#=Z&BQmKW>7PMi`5xgDO#g3Hdu@MQYeYN*AL`v4M z`*#)*qZj9ApeKMTj~9!C5-MLq$Zoaa$If7}iPJ4e|5R5 zN#eNXz-^AVn>Dy5xAFquEwkop)Q_cl8akyyuN&RPK9j@w!6=sPhF`|0>Tv{4`U0!1 zdbz_|ZUxvSAdc6Phi?McgjX;5q4rPo`l#(xJ$_oxV1{LjQ)ZsKbT>TKrI=)_^z3YI zKO&$sx2ufQEDi@VpZD*U7A3Jh(kKx`*WX{Blw6LyF%4lErFCQF-;s0=DaoNlm*r z(S}^KIITFh$?i|wpG=dxzbU1wY6Ubq64gsL$MvRcr8-Tj)=*l%JanWxNMdnBf!^$) z;CK=)LLOJRuJK;pKA9z~jK;crr!aBG&ylXZzRZbn*_igQKVS37Qw1F?l@dU>ruEE` zATrp!4TtO&-W8K2G96-7J*A4A8w#%_@`OY4Kns9_dh16wE6W{iuNH77N>qnpn>7VB zb=*(KY^bPfCiX}8ZcGzIYVuCV=BT}YUtF`91EsCZNV@YBCGX7cp%-1rFH(Rb1=E?c zrsPE+ISRFdci$8`bP2g_c=^K!l$g`2r3?%*t<&r3M)IH*g_m&o&+7BP!K}S{} z!Lv6phtpt&tnmqq$~Mr7ECp2o^Fj|AHY z11>ca7~PGb-PQ2-;%EU4ma_mF4*`Xh2Xw;D4wpu9X1TRGz}nAcUr|}Y?K22t`ktjW|&Tt5DDAtqxWTNQYr-I z5OKGE)^YJ5!|GV7p(dhj24$_f+8ssmz@=X^FAsNAm#3z=B~R#d_}`cnD7qUCIV_t* z?(ao!CQLPYdOa>4Kb#C}^vuE_D4ppj3;n2`3=<}K6>p?v*T_Z7hfv~uqgxl2(Yb7K zxfu^&31perk5XP>sbM~EYYA}_NMJlnMljCxOZA6=!^YMx--{^^fgvGsuYc#9ft;VJ zlX6SGZ~uz~!GZL~lv1)n#lZ9nq0Bu*hBCS0rTX~b8(7RHVBLY2VEl-`EQbUGfuOG; z>s5?B$1j&`b^OUg=*Hv);(Gu`90K9eTy%(kb%9FXLqzBjirkY8WE@QW&P;ha0Khd6~3Z%sWH|)Z)>nbx_g=`Mh0wZ zm$JpU-k|b!<6$aK&4W8)H!ZfPqc%=4!sEf*K7%E9I}TH;PaFik;ryN4m;{yH;J$30 z7hC)==dLc$fi{BYf)z?fSkDrbn#|;JLzJa<<*ss0nEw$eb2otxTp?PlZw(VT)4XYV zum!R!3_ZNMHJE?@O7;zaW`VP8oUSz7w)B%SwCiT&G+)3Q^3(=sgsX%nU7X&XjtLF$ z70j^-TUxI>+5Rp}UWSk@PAXb`M4uAwabnEYdBsnlrQCyhEprUVJ^DS|pz>|};TdQ+ z0>y+4(tYCC6Oh&{i;NbDCKTWjk1Iy4qS@aw*{{6Q5-|3#^&+L#l!(Rb)DJ3(<|Zbj zUs*;#v2sCf15GchRludd9cHC3TX!Ryt`|#Ux@g@Cjo{Ls)a;jXKuKPl&C)@Mk~e7JU0L zz%|IdNv@~Y@{JEym+tm#KGR8jo}Tzh4yh_HZ2GO{(=%$ZcPr>xPr) z$(D9nzu9DAOW!ZJVg#FhN;aPImc3U$l|tdGr3G}?5yFxzuqN`(0uTg;Z6LQ2!(o$3 zmLBkGA5RaLGBe*;L5EI2(zxY%*{Wi6tp%B=DNP$fQwWpznWhN;S>sbj+f>pPA$-xx zYUepAb#{A9T0F_zpIS0CeZK6}zCL>2u#(`P)xi$DNhMGYh{#g?={1%co19u-OQj`> zh}z#`3Tuqjf1|kh;ThO)F_S3tAHmKRI@t1Ji;45pDIS}wmaDCj7D?L5917-b{^V>C zlf!i!*{f-iXH~Jm)T=6nV;xTuoUY2p^0btp!L%b-b|;lp6Z-i8+F`R-UtAMMX%5hr z>rHTbEm?Pa=_TIvbB1T60;|=W(B6_i8hL)N;_Q5rqg|G8XR^gKPO^}_T73B`wpHDQ zJ%9ZRM5R^VfyT)=p-(+z{l) zTnq8uV2-+7hBerNv9|4<0&Qz=naPu{^&3&-7mA2XcAl!%)6J+N*KA=~W}g->c?>gZ z0&#^wZnlK8sOZzvF-zoGO=k3{z`>*mO2aCBIGR>=k<*M^Pb@GLfYpsrW;dtsqOO2E zXblfW-0@eWbU8{dJm66qDe))xlWw0meKZhTJKky4_@2IN?7G?+eK=2dxAj@y6h+}V z$G8SavZiH%0}`g-e2=;QQz$Fp5I$Zgj5j$1Sh;;G?A(Giq-yWKyVKBBQdAI*2ho-f%$Wkh)kHl`iVhtXtUIVgUP*$ z5^?i_!rPLPO+RXDZ!JhTb&u^2n2!js0NZHI&L?je1*W|I22SAyCkFe|6F+4SWwPhR zoVhQXPGexAvGIUu*tN4^9JrnG=lYft1{*cT!34G8snIDuqvu__+*cPDHVxzf?A&<1 zLo&D!4#>ZKH7PeEaBX;`qZN)LXRytoV0=k4ekG_6HeBj8yjCi^xbN-i3y0dc>CU`` z^|G_}N@ll&{qg8X*a7tKGR9cW0FGBLoh#mA@Kk*pJ&&J41d zhUq8iIU^{~S)maBIU^;`jWn400q=hybd1+v&~H*39rVSbKdR;NvUw!U8ZxeYtvfBk z)Ab|y-)XUW!3VkB+(0F;AFd?Lxc1&`XOA+$A7?(7yXXgrXh&3-?SwQ_Tc;rLv~2wYYd(`Bt;Odyl4TT8}WJ&GtEgRN+k;qU*RAGTiSxZf1HXp6|bu zQ1k89I;8b?R0|51`ts;z+?$hgtvvk4soHf!3JMD{Nv%)*sIrfTFr$wmxR#1>R zrMD%@4YPHf z-lo?BNnQl`8AqHERVg1T)hG02GvW|l&!GBtMtW;)qbh8U%ck$D)X)gM{Lbo%3iC6R zF)DwLwg?dvn*QA4OF~P)Hwz#%-5m*(<1%krQ!`hRpNV5kW~lP>+;4p!WNY!+Usn^b zAndv7kKdBvjf*KI{gQjr^qzc~ z9_eTgYiaQX&o)d%~`3rSK)1FGNU3mVaLq=U z5&qWGGKS4|96>ak2o}e^=Gb6W43`6H&eN&>((X3a#H3)T{CH+5@|)hzb_25!)o{J! zV?`i@3pEgVjOp)~c(;^r~H)_roW!PsfhF>sVD8)NGIS|JhLINB`Gdx*2&r^qX=yN8DsO|CWQSP}j z_xCu<^xRF932AUNn(Ka}Ff&};>4R)f}(D3P{QTmxmkO&UEtDSyMyN zO}?o%*}mt*{N*;D#-1+u*;-Z_cF1J4>;rck0U5|qineVevpEqaq)xxbn2Ltak>Lo- zent7mmy{`L>d5k^2Viu$uBUKT&mp}p6;dzp?t)m@YcGDQT zVcnHBCeQ-}K;C&tagk)>VT9V){1N?lvZ9hnDy1R z4;=p7EXoChKZaaEC^BI)$8iSieZru(SqU8RaQ_k`c|V!!qSj=3J!vwF3YXCh5{gM= zv?NE+_@?%L`JoJ#da;McWWJo-GSgIHZ{{cftdZoocC(#W-@~fWRc!Aw~F0YCfF+lp^5v< zc%CwtB%gOYbT3Ip3lifh#>eYZjzKT0vxNc24pYUJeNcOucLIsG#nxW>dZ(!I2`7mc z9pRN79j#5x`p479y+Ta84mL>;d2h>C+ONMAmXhbKC<=Um2h@g-1c2h0+Y0J^T1l7_ z<)^H%cR0`tPaK&Qg#yVZ*ukLxV*wnVWpU(;qV-Xkh(QE?z9?B2jFiBj z69uq~@o%yP#G1oiG13=xqvDZwZAWA>=T2n)yvG!(H+6OyD{VPC8|i}XkGb}3Zx}|9 z`?aq^pEp%wL*we8q4c*RKiWfRR%MFO8k4D@*08sFRbEwUYNx}5@l8;0#^949QIec> zGO=lq*`LAp`omyIu7+2bRII{+R~m%DN0%++yAffgfeL_x{G}-M^L>1l)7}*MIKRWC zr?^=(7|b@2Vi2f_A}d2JTM9yLMkpWl*SFuQIP$Wmnam6XYQd?wa){UWxW}TR$sdBE z=Q3$nr8KO>1Wm;kw15(Fdc@4_6zqH73YQm>A--{x!!uN%=T)5LlcXqAiI9d)50lk! zjI2ujiVz6l+Z)ntNw`_As9u&P&6q6sBVjnAGbv;=Q}GH~5%&qfNhP%Vu*Y~Rdv@7I z#q;TGgMwF3wKmXiOe}`Gh zpS*+OPhP%ENjh*w`PAZaxF;quhf)Qm3#x~%S_*w`;a9CFdq`jMt2 z^v*>T1Fb(*+6aGJ`Jxh@-G{Q}3s2&%q9T^d%D*kisDYgynPJ&yI7J!kZT5)%B>z8{bNdiWkZAAd2CNVzccfUc=x?R^0I zfu3x4OEGgjh@lb02}b&cK(Wx#)j4r^EOW}@1$u?76X;y?uo9puRTQttkYn~@NCCWQ zYzIHFFZC2mYF8hb#OcX0ygOPZ2fP&wEp`4$MPzAGz41>O2V{rvj&Jm#8>XcQ7590m zf1O4Oh`?3@z)HRK7FK1Z?LK!&mar#uN&CQ3Y+co$nX|qc z5GYqxvy6pg({0KW?_feoo1F`mzZ>xB)nXsa{z}Pn`4E#W&{=&0vcy8d^q`3U4iqTP z){75LFP$=(CXZtZM4FZL#>cmcbz+&Ta+YE~UV#z%bUVgKS828M9vYd&(;*a;)Q)Kf zWU-j8de2|}eR2OgcQR_Rpz#3y!!JVl%8Uh}F@KmkyJ%O<%Y&#2-jm^$Qh^VUz=QoHLdB?9O# zHY6YN2kJylsd1f!7VplyNd&kWL0JEwFmGyfAF2h`asb2DWD%ZnLpz5ssWY}-t@)~4 zt`S9zGv?rh@v=f{#p+hq7q*={7-z6=5B)6L7?2h%_in;Q)cWW^EzVYC}+I@@im zq#JXKcf8q*aKvAR|IjWEv>!VjA7$86#v3!&FF@8|$ESjV;0qtxzWrV#SJo?ARZ7bI znpj^}IP0)f?RHU*F;Mi-&*QrX7nl4D_}*W4vwe{$b*y5O^fjQkU)_8V(AxAuh>!LcAo|a-5gG^Xg^bZTCr-Nh@uv)se4;*)) zG=ys_)Tr#FjGRZJ0~>DtcJQ@^No1{oEK6+Qq8gT=n?sn2oWE>to*D#qw~Vc|W*}-6 zqo;w`aRk3OEd77|kpPTWI=aAAMEOirS7&!Xo<#y(JA+tIFA@v7kn{XTu0?$Mivpg> zhm=}1dQPg5B(;&Pa#U=LBU!Xx7mWL7_G;%;h&Wl;VnRP%KyOr^`JYK5nQ^R9i`3br zp~2CTi|>$R@5aPJBQI(4pT7U=L=EFx>?eEsshq~7IDgHxRTS-Z%8|1na-lV1Ep(v` zYgC1|ClazkX&8!PnP~NkvNyL^)q*2je>JeFNt8jRL!Gx>vfAM+aP0kdKRA)7zz?G0 zA0Fr(=U~)zjF%*>x|w6qu48;C?K2N`=%2j^N(s?5?Jrhr!CEx%MDqy}bF)MZ=#g&e21u8k@;l&sdOk zs;#o0t&<<2a;%(8DuY+_l(kQYaWoVZe4{X0k`gn#{Ou0-U|^IkDm}a3a^^*+m(UBN z>$A!~#L&A`4Um~asr72MsY9HQ21!CxaF=#bSvWd2n%s4fBL}Kg33S9JPV|EIE#tqC zo|i40IM|_mh|!IFV^b*7LsvonAMEz~C!5Zn@BcOWO2+VC1bt+jF!H~6(wENQP-2+j ze_1IX6x`cMgBHktn5}QpsQPF*QsQDhS&>)1#KCM9|JiA!FAz3qyc5JHd|X&+a6DJq zqenmK@b5iubpu-@=%HEj$A>e8D5NpLf(*fP#&ppsG4ctVGAjQj$d4D07-@_#6ZYUB4o^!tp6~tFP$(TU{}| zN;ViVf2CqR@jfx)cXhW9nH8vNv@}34F-a7%P1hx{9D~aV{ETVM5y6o{uppPs3bWAe zYmoyfl`y=Rm|Ph)h$W>to*BkRI%KX05wSviRT{n`&R`3{M8SM zo^4{;oJr%!g6N)Y8?e^kI9RTD(tRD;fl#4MDQ*QLm>A}8{_X+-Oe|J|DTOY%^o>Ug z6~u=>57W{XIb|sFB%CvuMJUbXJ=I5y(i0LlwjNqc^$(H@V)oX!vGd(|liD8>lNV}(K?XNwrcP(Xo zzstUN+1QMza5@tf2n=v;IXk2dO*Uo|WTMcS!HEs51kYth>3$XXg$$quD*9yd{>Fvp z7|k%6h*kiMC^3H2H}=mIB39U*{+e30&+DK-k|^-h2TG8}9E2%RLBS{sVa3s~YI+4F zf_sf;Y`IK@Expou!`an)7_Y62CaOEx-kQrr(y4ZXS@99KKR|=Vl?HCj z2{kbZhs^jbVq_bB?@v)*4|WFkXbF?TkU-=`pGpB@YzJhRV%f9DUcVgbxYCLF*RTN^ zG+b{#Y{Uq$3$lu)gh0G-91w;%;oI`($bdAoeC~n#@wNVFMSN-OiKx->(e1|Z)|%55 z>_9&B%_{Avae7fU1lP1=W8&-}>)O4*TYVDZ+Ryo`9Zw1S^!so94?B?|;do2Yrh-U3 z{p$%;{1QK4ovoD{t><08eVjgUDjk;mwNmBk0n(a5yn}$Sa1L-kpFu=TtQ$pMFOh>-;-t-lsnS z$QDWm@51yNGwCoSRjA;pF#lRhV)Zsb^az;M>9?H7n#G|{kxCpjyy2h*{&aPw9?oz9 zy{2PMMq4>Q`a7}XD&));?_y}ek#agp{KYU-7oX-KddyV!UES<4sjs@rKslVuh6v>; z?aN#q1`n5M_n9rnu>xJDrf`nJ4Hyn4hfvZrBc#jwe`e&%mZx%J;|a^Jx(uU)QK9d! zOP0=3&XZ@9^W`h9we1Fr?uIUTrL{Fqx6ad=v?@IE69Gd*1_MP-cx%C=s-uf5t z9L=k41=Ih6znZq9h0>25<>xaTEy1jK?yrutIDDCxa{s$Z&y5g+lqQ{1lP^wPpRbwZ zy!(y==W5S^M;Zzds<|~9XmoudOti1T<1?+cpPlgTxWj?^T`?N0&`uE3*oJ36#5`>E z3bh?kp5*#HW^%71ooaJ1rA&V#vpC7)o&T))71$S+G@y5W`kO(ul2d(!(~*3B<(kK} z`tjLg(88dE0A=V>Hj5cEPVZyMJ4_e?sG4eedjRhW2bEKm#+P4+(GWdl<**Gd1J#-; zzSb5@%zCZq*KJs1l0O?-S_Nktj_;RW4Y{o&3kG%?cbMB~Pt9CRJYjnTm0F_l@H$bRr(n3$zVEm%dA3A^>G zV&d?quUJ!UK0{0lG;5gSJ}M^+*Ax~!y+>ztXHN zX7$L$#3AtNT%}#FR%A@G$U-?VWh3~A>6MohIfFX*v}T66^B!w&|f0A&6;PyPOofo-*|icXIT zkuByksECS>^5KiO78CQ798|Im>dUNyTd$+0a?^vrkU4^J?++=Tt17RHHkJ7?7%Q-T zJuW;=tXK(^L}mDG{*U@rzjn2b9dLrUHn9eIb{5Sq+VvzH^`wtYaTm=G8GFjEimup4 z5SasxgZb=Ammjl2%>r}A6ix}JC@5hl8nBgTZ#!LbP%Gx>{zjw5MKOZs3XsZyegNB( z`Nut5_jeon%uxG_3d>P(u+TI{Roe0B_Yjp^zb=+u;;(hhYn=(=h5evEME#uELOncB zORGAlR4RyDI_J%?nNw7R+-gaC?%otkia`UGpO+`E5OW?5y%gRuzOi*P)K+qVA%#v{D_LmI59a$|i zQJElZsNk3H;`7Ayij$(9H2bys)f6_Rgu9IwJoD$puB_gqc%ft|5eth?F}(;#h`YNq zxmKl0&`^s|SM0-xMD07j~QQ=}&+o3+QhC*n!vW^8`;)nuIn7$wVjqqFZ0RSZo zKm<1|wpBM@ix8^K`VkP61*5iXmTuV-B-9}>yZ%mw37zLQ6-8^S2Qqet1Bt%peA@)a zkNK8uR#Hw)D0}u&Cm`sVZ67^jG|`cy#*#DJ@^k-hk3EG?m+6oW+J!mbuz z8$OCO^rXZ{7=`c$#KP{Frlv|ln8$V`iAc1g)fDE89!x2Ni)-w8wsCFkl93(as;u^< zUsMBw$vC%V1|%Y?J~2@!CCjXPLOVT)rOs7iXe@yVNoI|8HN`1Cj7uFE7*9m;c`pU8 zo+~vqPXx?tv{?#8iH{g8pAazQfGLA32Jbs9c~G$HiNiwkQlzD-7>4QVpC}IG$CPv9 z6MisHYL8u8L0_`VBM$2pj1^X*#n=+3jHXv$?j$3r@)R7emP_AxKvTXU@|W z>zD_yq3xpeFe6k=h4~TM>_QHl)AXXq=~M&hQ>ayL06vjC=OK|unk}kdW*oM zDjLN#QLok{X8>sIYKUS!fdzR!St*~eRC9Bd@1M(MR1GD+@)LuKIIgoN7(f05!=7qw zeJUtfJdPbCC+Q9Djw+J0cbli$Zk&guU#!J_d!p2B6=rZdVgqt~Eb44&tvvR)DL^6b zIA9GJa5K4A76z40$yugq4nMv&|9QIw@GL6%s-h7!Pd~1(>3wCXeuF06@#5qX7x7dQ z=-Tg1T?*2a!gFRVH4v#G``GoA(=+W5qfS$)HQkz|;~-9T46H)k<*o?uzo*%_ZvACW z-OPB>B_HHo9e=Li*pho(See%CF)duR4RTAWHK*QGNi{SIH+pKg7MoS5e##Y5tuTk* zOpKd*rO_Lkk*E~DyBH{G{-`LR_$ALmlqYGVU`0mIc2B?iY^K6?i?CKNak8S)Lvt%9 z98sn{a6zx`DE$59*Q2YC`^DWe>Mp#lc6s~-0p=daFj?zt4(*0n0pMq1qndUY%MCKU4Es6}yUaGkW@7D@R8zBuGv->6U(Aq3}3 zl}jWsU7GK(J1#>b+O1Dp$pTY4CieL8Q$2`|R>$q8Us$c7vs3L4^)1_~So{0}|7?k} z7SI9lz-)LbyCzGC-6Zny+2!0Ro7d-iU7iu!bjCqoedKG5%NLF7#|A1NG4UUSe26Lscg_L4vLq^i@PF;<3;@R$n};jy?j)r*v^_I@8Cplf<@2aX-_O)Ee^ znjnN-xrZjO5@ZZjAvz%kB^x`e)k?M-enOY>6Q%NAGw#!$&HTP(!zORdVKG!|N<|tC zfL8KIL`+ZYtfs6(x+p$yKBSgxE8=xTnK^q7^S@u~4-l}CJfy~AxBIov$~v5*h}9mF z5gM!TVrWmgaJ`3X>3+vKmc-_Lhd|Usg_gqNIhwrM>+E}PYv7KNQ-(GER~kz+I>h-g zzXT{h(CP8qXl0nFBcEqu8Hzc+=7n=^S=y;Bxt|L2z2T__cdq>vv%IY2XS+#QZE@Q+ z*z8REq&IEi>BYejt`sS7T1-5IkL4kHDHF2vDlHK?(8c48sD$;#;7rO0W#NKQp5P_y z48@Rc2UX>*gGy7aIzy#LvYgUNf5Ak!#FX2`rBT6LtCt9|O|0i*dH7mF94BqK#-x5K zhYy>$+x=?99AB+6?Qi|(9Q2jW+_dS%>qWUet~=PcS)lC_g8q}hd{pH#gyHHlu^NI) zCDX}ZX|?6fOaP1f8YYxRP`PqzcT==3*eEXxz>#4iZ}rRS9%rO!U&k@FZ_wO}rGBIV zWT{&CW3BJz7Yh5tmFZcEC#1>OZ+*!9?kzB1eRy$ZwXjBsXW3zgNRRc?9@ksVm=UQx z{kW4_Rq33_4a!&gedg==&GDu!lcm7hXd{WtF?PxMy0pfE`z-Lrb2>lu%JBuC_X_Qg zSVL5=(QU?e7#CkhEF?W2P+G>|s9Z~R{U6zx#CXwozH5vT2*%v}SXOH54{2?-uHyiO z!|y^HN9!9C(9!^V0-L||m?2zDfLO1j4J7hLQ~D;RIddr2hL6WbjXG0Oj9HD5r!CuJ zr=0fb442H9IL%O5H9T1SWkz+*LOIEoE|FPBoa4ghsdlmki4HZjMFJBrEL)PHm0TO# z=TKJW7>8E%NH3SdzvbT?3TtYbK_L?KUPz4P$X}}`*YJkIuxbd^?@{>idm>k2YUeq% zr&k9#}5FTx(IBD%)kD?8Yw?*@>sl3qyc4w9@jOEC14N$HhVsY&m zTDG|U7-eKQoH%C)&~WBxWCvkd&z@2xxwTt{GNb@wmUe zFk8VVM>3y_yN_NYq==Jm#cyuJ=mlf#gD&ZvRQKd6p6y! zF}L+v;%Z4xTfP*q1kUbmBuZj=#y4D}OI$eeSGRkv9@0!t;z@>Xhh;E*A`0Ur3WPuB z8J+K?0XVu3PUQ|qxx#H8@sVB55>>mHD>83v4W{%}TvTJu^FC3{*A;5tH7q}DS;t1; zr*_F}9bj^sprgFoU>~}o!8bdBZ5%0S(&_w*pICKYryi+P?ntUgmzsv@0!V#;G1 zb;q=XoVdiOTwBB%^-KWTX;C>JeTJ+T-ol_CX@m^(yc|(D=p}ipy)j8H8Zta>RfEvvplAU zW2_god+ezikKP@)Imo`rTgXXjuL~dYYkh0itsZIhvI~?9%_|vE(=KxO9KZ)C<)fl5 zGHtnPl9D1)?@iROxfEJS;G9-TWT~U|W*yJPjx}8`V>9Z2X!{#KRhW5GKQ{A3mHOAv zHSAX}#u~5uWrlc#$=dB7!V#E~no1-_wVpnR^XFuaHaxj)fNX=@1zYH;R(a@)glh{; z0K6pL!D^n_DuONI<&_!j#ho`qLkp5_EwdjAaVxh&~M8n&F4x z+AuAl1NN|k04?!4a(BHUvs3FUlt2nc0f&mPSW-mZHuRKqDM^bBJz{%P%JrFRTvTiF z@ABq@+rHkGw?j)ytEJczD!kV51HR{t&nzq>8;VvJ|#_8sX&K!#dg9QYY4S7UMPSmW2&|tbTxy8l!C1|{#i6RQDWd_iOU_{rZM#i z(d7;`Rl{w%TEb3WK(M1NeO}WA}De^;z-J|%>%UID4u;%1*L4rOzYIKa-&^mu7>c*EKj%7bZKmBd_*xE=V~oc z9S54lmu5TZerrcP#(XTtX!r#k-H*Azv?I0m!W5gby#*8PBG^ew%HlIcyRQ3iX6(vU z?UxT-D`dhhAZqWiMM(G!G#!(U8pz(vU5aC{ZL3nbfcqeulY>84Nly$&na;9PJ6cq# zvb|Pyl~MbBjUixhU=icd-6 z-~T6WiM+USL)t-3X){+7h<>}>eRPD!_c~&)du!@$M5TbCq+Jjg##xv$=v8i?JhLz#GBJ5$YXb6x^?5SS`dxAaJILoRBVHYR{xoYDq#y6q1oA zvk}=0S*?XFERNa21PXS|o`ac$cH+*?7;6YN3ar!7-Cf}g?oB95@oVsr3W{s>W zq-R6~wl8Gpw7=@X?{W>MaCD|GmZ6^$s_>n-SiBFf_vqie*Yu$>wpLBHAGQWu2z}!) zRyENWCWpu~=`SFM!m0i^Dl1Ye<>To&3S`cuTgoVe+Lq4ICRR?-A zFsBP{zVvLPpHpL)+nudb;8Ar+TWbRns2B4$W7`kF4wnr#As=+d9M!nKEYW@#T{q6a;hbx!nRJ@l7< zuM-efIrKZr!jb?s4pveq*7-${;)eyol=}XcE^9`Br>6VPpKHGUXagOR2dWQt; z^~kU#>tqzS;>cWPu!-D;tK_RI(@>-+y<>PKUDvLCcX!aS?T&3H zE1jfc+bgz{j@7a4tk|~Mv2EK}vGL`7p7-8+fAzO&)EtGQYR-Y{^t0?N7ETPUT#;1C zF6Zc$WuS;cb|Fs$BK3O+>_#SMnvA88Hyg}`cI7ZC6#@br-?(_3kNdWg1qS2SKsZEz z@PoO--@_KtMf$e(edT1@M1InjmvJxlZDq{MXU!GtJ2m=(zA!qo6nhYRjEZT6v6%V? zo*EKcer9>}p-i8`z7LnW+LrGMzrZLhu!%oXQ!bf=@=$-}b^R6HLOSyhg8$yluX)gO z5Ud*Q`PWx?HRbu2V+&z#gamNjXqfX=29Twxg40+?0-?vGoz4^5> z9AvUP;c_*0dstFcX7I86V@(#CMJN9eG)Oym`tSqI2)pHL%UW>T#GNKdAEH93JoWtJ zx--YbdkCM02M2>|h8Pi{P@6h}idhK4>^5C_wsg!vf-mQtc(;d0QumQPn%mtxr$)Oz z8W>=YW|Jqer2Fmr27Q=9LXgnV@Er-R*cXa)Z;P&8SESBLt?J9J>7n%E);55{P%X z!=ljVG4|*v<>m}rG!-cJSx(#DJOvJ&43MgfX7D!UPi9GOJibT5MWAPBlC(zVMU(cN z7PgiP@jXuk1fkJA>^?kKqNj_1OMkZKhUYPmWPZ1WG>uAD)N(nV^ZilY4U^9f+w1fU zL0R^7(NYQlpV1CEGwGLW2wIgK`N^*^+VeF&=P$IGp~kOM!B06;e%ct(niN2j_2mF z13#eaor>)&E zUQgf~Dn3{xb+BZbb~2E8Y@s8jQyI+nHR5YL(h-%f_{-&xh~scA3>T|rgt6`Z z>NHAMgg$Z=*j@4}G?vS>TUfq_-9Mp6wbDCc3ozC4WY@(EsJ`PcxebzH%nN z$h&!W8&$e*{N_QoY^uD<$Z&3aLRz|OjpN0cM3^Q1+~|?W0~=#_VOP%uX`4oqHz}UW zSwU%gz_o>?4t*Z>Z!sbZPM=^`7bGWJs0Va!u|I5)>G2Mcw^dPR z_hm1vu*R;JS=Ak~BQl6&jn5+I0bjPdP#(k%(+U z@HhogA>xnv&*-8u?;&?>NOqThWj8#|5Yh#$o2wixdv@B--ppZ4VO?qsjw#Rh32?QdSQJBmUUaZhDGV=Sj{%J{bPo-`)Hntk!9XY8I&|j$~svga4=>Y59nyOuO zztD1f8}Z*@T2Z_Y_|}KB)}HE-6gMcpwzQ4W*uQws;Hotu zsZ%>QoGdKxo@Z(8Rqz=zSosAL%+~#N`u^XWCxx z<$&ly2LAjOO_y)z{_KBpOs8cKOF|a&m&O69O>QUqp+=}y9UTxb#m6gsQbv_bN9;Xb zi)UJ=%L1c}!5uwG{=83~8^0G+3z=WvZPaDKMw`G7^Dr=Uxy9`7tMt2P7!`I6FumdVIP z^O%zDPmatjG91x|Gm$#f=2v&q8M-j zx;>qWNW%zqW_Uy*G3JbTO_fG(B&2tB4nwly!bGU@vCkq}6r5=>zvE7MAI*pHWfMU| zC+^TV3+L@mBP^wo9L)P~kW?T9J-uXQh1uupJb$;XM6lhElbOmQ!+Y%KbTpA_McY5y zP3R2S=NO1N@sY9%g~Q;8AVI$pTgs}SURW^t7npBBpT6dmuyqDp+t8RC!TH#UC*Q2m zpT%hfJmJdSn#sPEqlak9=;}#k9`2L+z~XVD0shA&HM6D!LJ_E(`nv9f_#?8E6+j8 z3K=8$$4W=*eDQq|->*A?f1AW46~qc-Q{sdl2-ibvu+%H~GKMByGI-8H(^)c)pVZCbC9NAAJ4KKAb2|)x5eh6uKTo8A>Qd*HlJ-KfKf^Om>! z0etOOZc1a4x#-9r9CL4BpwT!T(OSpVX)5lo(d&^EOJY}7!b?4Pv%3e{ zJ;FU^8yv}LZ&K=ychP$pP7aF+sqnTq!>PRLF- zHn3v)liga0>!vLvw39`K%m&t~vzn{UIW!&9NztoOf3GjTQQ!=%Bl4vod#V(1ySAo1LUG2R z>K`s`@Tag{8F5tNhM2&Mb+0S@q{ztJ=~Ld0yE^w0oz zTZy3xW`Pa?M^4RUvW`?;X(9R2afZsS=?rTD$S4d&wU=a&hZcQi{R$eKQ%oG+lgIru z@dEa5nWJ!D*~~T~sIn09)^Q$JinXabuiyr0a?c|cX$PuMc4o|kdSke0x#~HyvX9tU zSPZH`R>ch@M{IyFxjp;ZAz6c6x*gKIX-o8kOun&HSkkm&HV4HYS8iXY%>owWOH#9fV+&SQWfTdFP}?$zVIL3zv+6MbeHD&o07z>flQ z8CJvY^KMg4dDqfEG@yvRLV9s{453%y>Ynk?UN?3B-C@aa!DHv0tKsj62*T%8drLWJ z%G?b`9OFWiSkLP&sVaeVQ_YWjJ8Vl<5xj*Ekur0o0yr{zAflt-CrjJ-KQ~)b zjHwdQ$PgpvZoYVM5_Y++nOD*0H5X&oiAhKc2|LW(anT{7^UycOq2Y5`QnYC>*u!#) z7OBb4C?xo#*J@%hr;ZOrzztYbZzaQJP0R1NJpHOjl1nKDGNZFP82>eqshCGAueU$@ zt590uovVm9&7>M$QvN3ovY^=TWVYF!r~9!OpeEjZ?0MFTuE}N|0yOD0bKFT@6#11j z3^NO*;B|ui1VwZliHBC^Kf)TkthSY{V8ePM1|5zvqT`LRWHsbJZ@>gtX0KyUh>2-N z&yXGbh6GRBLeUfPC_|#cwB4HBN(<1ICDBU>lh61HS`Hb{qo9)x9x?4VyF$sG%_)6} zOBl2nuyP?)E1n7r3=1m%>?LT@5;QA5$i-cwY#z-;&-3At5#^(yZzU#|mC6V&q(gpF z37ILIJ&kF@PZ{U%9Qkuey5tma;uq5*okBn(Bn-Kz4kucsRnI+jEc{IY+KW)zPsSJd z0CF}|`zh=(4 zQ%6(5+Dzs5;a`)|Z#-Go#yXjl} zaD*;SfGS>CAp>{L1P2Hdb7|*y8in}kjYQ#(Q-zGcp-$8c_kG70NYW!U zx}ussy)#3Xm4<@0sEBETj-RGknGOgv|8`EBxx>wjO=pmANOA;{$1m#r5yiayA_k0x zw>G1~O_cKl+7Vy{U{nC3H3{uNE-TV0R@oT24$zPTp}pi0B+IsMTQ_;At73Pch}|25 zChVHlw_-M-`U_3IFge;UXhcBJyy;k3V#{l<&xJUrY|Vjq~+w-MXHz>&t+>ev0lWG z%LBOyamhsCond$9swkw1%vjrH=`cZ$en0wVr-OsCV_Hci2Xi`iyY(8( zEo-@)5ogge&;IQn)!shp69P7)0u`gW!#9i(ppTNS_l)+B1@*V{oUV;%AJQx-aEn9K zM?c%g2-oYV;ak;1)Bl9R!LMozdQR5q&0hEqO=Iz& zRI)K~?Jn^X@Bawaent87ft2uH3fJe89SQ){qMgf%yB0F;>vhL8N5Ie|GghO z&ms)TISD$w#cmEQ_^HxCn~X5Z|F!vG!@AeYnsixj>>w7Rsxtl(FrZYToGVWX!}h-i z;A27HfX0J_a*#iK_;(&&AoLHiuzmzUp#`M)LnApnUh1DYw^2>~ub;21-(ewxdj&t+ z2acz5zR4D$RV{kxz_Kq&vyzJY&d+}~#_z|1K(z0=GZX(cc?FYxr?Y7SZEfkr#l`)C z^v_mr27dnC#vtdD26suAnPc^PgF<~i_75So@U|nsAFSJA6l%mbFYl@y#w^_o5?n|f znJbb(LM6x*E$xJpBJ0~9HabQ_7_e7{#(=8e4?4J1vzUX2r%Kuz_f+jrAv>5$_p5g_ zM=1(1YNHUMszKV8AKI2iU6EQ@x&Vz~JHx~$#95KI z&IoPoy2$#v|DmY!%7BL%jHMFtS=lL&iUsf-QqVSyytv_JO64#1cY=5muHtqM$BEVs z2FMlkhf_QXtjD}-c*^q57aUTTP!*N729-*p70(ax z$>IaKS>)L9Iv>Nny5OgV=J>Q&1-7ZxS#T_V*KPMEcg!!y(jw{qg`gFW8TRLMR&yxk)1)?U-^d5Jdsy9}o>Tgsybc zQH>DgrSg~8skK~x5J;l3hqHI_v8 znfi_>j3d&2SW;Zte{zXd4u`oB@hK*j=z)3jT+aB|@>e!*ZQ$r5ocGV>X^*mosDuX2 z{yqk_j%5AHR=8jFqJFoYbMBnkdv(;u>Z2DBUzOG-3qMiOchPuIuX;ON&%i{S3qb z1skRSrN}~TK1#QDFV&z(b$o!Izp_sox(_qjeWmWefDq)d#PsX>4bhGZaTa>? zYm=j9Z`>_1F%6W;@{So1_>#(cMOn|SgS~PqG{~bN-~tP`K=`*ZLdd2h*E=}2o$np- z2b)jBO~n|9$+w>z=JsU8H)SgOqZkU%=Ig||vG<2J_!x-|wJKx1Hi1%XtnjVNO{~ za9#8yomn5V5`dmN2PhpEyzM*$5H`Q4_Uy?w-wS7|n{Dks&6?pkS#RX=H;{YY-Gi_- z0sSewbyOQQVS|+PhJR_nH+IR70$vLaHk^*Y#}G6JZo)R0_-{gY`j2!JEVdp2rkU8{ zJ)2faN*mGb&$nU`=B@(cJ&V^XkK}yIw-jmQCyWUxv!^Ckd#||f4c7=pT8GT08Gfc4 zgd#H-CG(fv&4=px;(2OK+CPNf$FI%=2K}zko+^hViy6Mx^~?T}0{r>f$5*Kt8n z$#URRy@*p)K~lHt0^{K#>sq=d!6trj>ofJ{R;9SU!`mG*JFq3xMAA+2ar}Eo`2e-)B&so0}V^S$E@tAZ-LoX6W`e06*wyXyLqA1Nk}cDsz6mP;9;`Aj>h^bi{j3ULqAV-^&dHRd=O zu^lym5R+Q^F?Ar4a)8CQJnbH6AL)`sATX0}jP|CWH7&f|jN0{e#CnBhAN0y&*D z-W2e0Ed?GUAyLhsR=b5zeT-s+7QUJPz4du++`bA+ScYCr)>42&3c;A2L%WMMb6#G` z$tiNFP*(UeYe8qcesAcjNb4UG5lSq6w>ki>NiD7{?(xp4JDD2b+^(!aOW`v|Qr zTUC<@Mya|!p+#${Qp5XkQvcPvEjDdLaxHT-Yw)mJRm->AtkYE@C!CC(Hp5Qv@_X11 zc2*qgOGv@V;QoW3g)rnSG=9WZ=}TANbU&(nzv_o^=_EgV)KsN3Ri=0wirtJEx=hnC ztJgo=q?8piV>j0>zN(KkD8rmC6u`8EEj{j17;*dKyqv-D3FI;^I1ycMJ@%_PzkuyD z0vjuZ*vu1Yzr!L36XAMFaCfMW&12Iy(h@o27FRIqnq(b1wUsb17A+XORJ;Q85on8M z&X5;ZCwie~rG5Nl0_R<;q*Zo&Q1%<@TW{ckGI2ACQ`G?vP8>tf*Kc7DM`WD{h4Hib z2rjUBq8A6Nixf4bWQmJFpA`4lNbwnqr8;-UdJEbSBNPdQqx98869wieQ#Pd_@a_fq z=<>BN-H0UZ1uCJq1%}!Ihd{dN>@d7@*&$@6| z>a<)=XAmbB(RMDD&df>4HxBd@xfCB+L3} zhJGgV8x_`;=CM9~qUNm+j;|+md?2LBU|~VURbo^Rh9j?7Z3?C+ff$C&DG9+K>KNwq zuz;z|68>m&N6YewdE;OY>WNHGbTOU@f5_!;4j8^!wCkJ^ihq}5Hj$^Shh;px_a3c( zP}RE*jB(yQZ|7=7(u6P1eEAaIx#>^+BV1oD+R)C1k2a}tP#O4ljGD2gATv`5+G>ug z%dl^WIMdVYpK%^G!?*k16rxk1Vz8RY#7o+x$HC>ESJRJ90Si9Wga+N^^!Xd_ z-`8=6xNFR*1@ONgbQgiM?~`qpYA0n~)nRyDRP@R=L=p?az`%^42jAc$jjA9(R2JSzDCzwcQeEoZlO|0CPueX(KWp^wzP1NP3dXgc#u{{_Kri1)gxkIb zYnl0nqMi zeC-!%+sXA1_IyHu=ldeD+~~SMD7qxW@=d*+&JxC%3PA+0v}dreF($f1MatzFl|#=b zd-I{zZo!J<04G%3dfZdFGU)-S_ghR$p^M`?KA8!@*ZC1 zF7(f|J8HFVq>Hqo&eQ=5l!7u3nxai*yHq12yL@>)c!v-k6rWEyrM-OkCy1fnW7wcJ z1d;&Od3_18);fR3L{6D#*^1{;*v?oIplu=#iWnCa_G|6j2LJbcOYabHYd=|(;UD**`LF{B3g0zme7Q#UAQHY2!juDzO-Oji!69I1f5*h zdEO16Tf7ML^m*9kUjJn&Z0~}q(-c!};!S0#XH~}6UtR=NpO8{>KcOYAT=4Ne+w7c7 z#J&N@Yq;snJmmyd8s~%^`3p9^|H6sMIbM4b3i#a7o{Pa#ika$-r$sT#2qleGJ zrP=XthWBMY5I}uZeFQ|qmAy1I(G-YAHhRO?uH?1z9+Oa13{$p9;5nc=ouvz;Ud=X5 zwGPtval^TqFMaP6pygBP8;wRX?oL8=-|!+*=m$M+HK=hb8t8xI9!I$ExLy0Rm@SY& zT8ks&(A%0E^+wOO01?0u?lItzzx7V+c>~eLU8Hfqw>b6ZS1-Qn*M~lKE6G*|M#gCO zRDU(suH%sJvG!)Ynt*q2gi%b!o%l(gz4~qRGSkkHLE7l;ON*FMqoIVJFmt`9vRyYH z5e%frv!QJSA{Nu-FYv3Tmt%Nk@&!(Lwl9TLmXkYo&BseLkSg7{umRjRjR&GQv}jWnTEMmcagbsxIkKk)$)7 z$>UM5y8W8)X{FBbN+F7UP7Rwyg0QS4`gOJ)Zc}HZM-XDJ{Sh~?*@X-*LvMp8d@w6h zL}lds_ADiA@TlN6d7kfPhHq_J=4dHDWU)|oI|d~;&L%%pAew;Jvi~|EfxBe$n1S#d zOK_u8Cw;9WQpk(r;oi)5;Ber;?@hOTyll1$4IyLFI(>9@cSG3OP>#o>2+fMlWOj`c zhws*YApGp?g&vNaU|Bd+)sd0DhTIlT#p>d1A77|L@BIu#nXeDYg`}@aTO?`6G^-=d4DrU#f`|@ z;{%xp^zxn(7&Vy%KVJs7zfMPMSK`NpLxB%YSm+8jD^GX@`m+%Q&$#VUge@_zM`+=O zTv`ROBjb5%@FFN(DkTH{#vg{v<&GBQ|4W`bmxo^)s3mMiV3-0*piaPsv zPbJNqgrSnG;XXT30#n4!C!Qi)&j_N9-C1&Vxx#@sy=A)l{%)j(gB{^KEigJZ7BclE zY1x-twFac(LuN9I6BW#0t;xsj$(pBh;{N@cwQqUL?vjFsK%Gz)94cydpfQTmPRVCd zbs?hUIc{{rP}*G&V)M|$Z2g7<-*VGv>?X_b%9To!Grnk$k+^j9ynafJ`DJ*Uj_aS; zY0W*X-!+6-7CQLDIo=C$UBTw3ld+lTBIoxle7slul7_qD=5eCh(tPLc4HS96M`KJl z>eP}xQL>qGebO}J`CeB~?p?wxAt(R)dN~AxQM^1?ZxMF02s$4pHl&U=bTv&ip8dky zmc2Q-LixOEl{&YpLpqJdbPe0d-5aHn_PZ;`ltu5qduo8~=HlaWCwRBBI>B1wkghU+Vg z^HNVsjt<(wqq%TM{Tj4st!HpSJ-hqQy44=}qw=sZBUD3+^^Bd&26rp4fTjQQflz_!$ z12!32!@&g^D&akB_`tIzg|Vq-JDZb7>}UXcCf+Fy&h0kOL_OhH_8`v=Z=R7;6C^%O z@WE#)nDH~AM^5hXPq`oVPvWD#KxhMbx(qbEbw=N2h% zul^7X;L%Gl_u8vKQsuBg8~Z+rg6vTEZeU#?q%P6cJ<>hvbK_r>WJ(`WEt5ir#Td#I zp7t(R>x)ZX?p*L>+_2Jcq+diGG)|2jwF|q%&f#t%eCkpvO4Gvfm-M$xb5_;q-G6f{xzqoBufY;=E5^KL<(k_*|Icg|L-*`0BEZWKqO~n-xm!L!azK?b97udvjiSC^d`+!%~1*rg_FA@MP*5CMg$#1R$7Z*WP}r3ItZC@G8Y~*;mFTMYge&%PG~cUDSFy)Xjz*Un4iwkMF1t zGu%F_qt0ZzPHTBOvP9vOnM_p$LR~y;+dcR1KRc{Sr*0udXj62J8D8yC+SWYEvw?kX zK1J$8g?d>Wz`EU&q$~1FE+{8>S*8ocBtL2W;J}9WVp7e!1>y>{R6z}kzfdne|2w-B zTa#wJre#?L9_2y3aGhi{Ghz@mMlLoYyQtiGK}b6fm;i2ikbIXnw{Q@Ap48~CB!2d| z-DknGR5nx$C`I)C2+$Ki?w(NEz`-yG5qo$q*d5q%OFLJ*rW$4Y5ruHzDk+z>Ri8&F zQ9^^hB0htcpNrK%M6-j68<&Rdzu*%TDJC1U(MFAg*oL9dZA$lxKqWe0N&brLC*fSo z=Y;T}1#nK{j?4>wj6idv;7J}c>E^)s(0qXKO6$+n_7% zEd|3hUf)RYqq*M}%1PQ@4M}9HbQNOju89B}BKM}MX-~Ed$qf`Bjd9jm&HIbsoAb`dfrOqH~- z)f*HRe|{-ql~EtT+hIFW>n?N*0nY87aS*yL0T>hQrXYT%~ewbbfzT zOAExIu4;&5eMBi_e2j?(JcdLIxcX|<WvB1FIMNUru@>F;)QVnNZ-j3;hGxZ*!W=mZ!6~h4)UArqdN(EEA=y_*{yS^QtnP zo3zi|NeOt&>Z2`}vZZp9Bx*%Pua{N6_OWxB)I^@cBW_hw4fZS|mK*wyq)J@M@F6HqNS*!)IFcbVkU6nz;}iX{O;YWw%KN$b#bNmz9U;;5 zCXqm(+OEsc&uCaCrrimHZVnTe_>u&$sZ|##J-Ub2 zp;Tkdo|=lgJuR25iY88a#ne4?Xz&(vp8WP~O`8I#8T+DVBV4%T2j}Z7>oE|YcHf4^!X%^qEm#`CZ#lq963ZkzGZrm;> zNX9;%;1QeR9wV%T#@*6s9%hdR@D*ZE?4XBHOma7Of91@h5tV#jlE?At8yMUvO0mfE z8*@JYB`BIbYCZnFgxin19%(md@3QI&X}aWv7^vll*+e8+YEgsz6@flpi-amc4*{P? zH{b_rWWXNWjjU{pXt%Bt%d%H{#3kmr_*ewIw%JDNS`eWu5r4mZe9}Rab8#DMVm&A= zTMgZACjVy{VqdBtQE@|Y51RVclCt3r9IjO|-Vw(m3D-aLS3B8H`o&xO6lx*9T z((jKj$?AEeEXh_w7Dx?~5(VRziIue+ps|oCfpl;5wpVj||BTUc`Gc;n7-aH`!LeX}hjCl^Eh#3NrEWv0sG@+h~{rA}8<6D9&HW@$fZ1W3xcvn}N zHhdOQnUtT=0epm=%o(eM=|j(TPX5*Qax;9gQTSBJXD08035&NW!{FZYYEr3@9Akey z6Dw`W{hRZUC%EX7JD6MBvi&k8KV~!5S8wuhEoT$6E)dggd$coWBZ&sWJO>GJaw4qH z&;25KF_a5tB@G*tB%f-n{;oHi8ZxR;yCv=15#67J<;c6%k6t|{yS+AaNFhEKu&NWD z(K1m{_!?{()nOI*fLlZrC|-*ed{7Q-kzE4%kHKT7UAB}yNT8=<9Nd@fO0(|@r>NzN zBkQ6#0}>ACheF_Y_uXilcjqKb z_+F8Bv!-I&4s>wE`dGFK-P?8QQPBCPOE7Zb_;M<6Se|WQK@G@}e+VczuX(!kTeN-G zD1|Gd$;S5k-9vTqr7Kaf>Tnk!ce~Ag__yQJR1KU!>PK=Wsv6eQDp;bmm_Ea%Apj>2 z9SfP>O7!bf?zpIP^!Rn53~W8PbQvQ2?Sy(O4A{)3LzTWaSl8vL2I|%?|4fz{1jV_5 zk5KL%q3KT;Xi4jiIN8FzBS(f#9uRmZ>Y-9$D}aoJRpF83;+WOY^1~QQ7Bn@m{fnef z_lndi#Sq^}&OGlIg3m(T0y@BvJx)eg`;(o*iF7F`TY9n!+733pnes?|#=mpG*?_*% zvjBm32~kZih2vB=L(3k{D$@pNmImB*lRQ_5*}B2qJ@ek72|t!1u`yj$EOdn^q5??? zWjiJjjATMuDg~Oqib{A)F)G64)!oVo22C&-dEKWKIn8q-Ua3g~{8@X8I_v5HQyw&m zDB_xBD2LkFWv4>e?JcRLG>b_!!$h%MwNm*C814s++7Kh}K`0#3fR;wo zxcWmoF$8WxzjA@Fo4_6UNTkpfdbj>&-y%1b!-SCgjzP zTdrYyF{A=j0Jbhr+nLg#AZ(~CLBd{N_Q}{FdhqD4qPFT`%So?6dG{V7IfZKYreV>F zVT=1dgt>A71s}(k4C1kViuibt_;S-A6+6371tO{VZveaq7K-oMK6(bEdnZ%$9shlu zW&djX<4)dhn->gs9lMNs$w2MxUhU+f>MHwH-Ao7!^19(m0$s4`lPuZsaTc)YRqt zfESHMH(I=|*N9;`8G{6tIGwsIz5PN}eE!ZPQ$qKMqJiM+-owdw%(WCCy`P5D4zZ2x zH}tsmF@ZnT{y^bPt5oc!pG)|t%^tTOhG4$zJgP;3*D)*GV;C}IR333K@mE;CC3!&< zJeph}oq9E}ZP8ohtRuPX{rt@U3~6<{fj0AU&+&01gZgXE5=(XSFr9z-Y;0m;!jpH? z_A{Jx3(3iR=VuDq)eEUHdG~2~D?y?T?|lufJghCt$}eSi`g@*dcdJLkVU<7qeO6vo z#J$b;jNQfuaot0W$B2U#igfL#iW|mu(ioDOJJG=T&UV+srtiqA#?4jP>tTlj)LA3Z z8*hDq^EU4osA)?3VcZmW2r^bF6rqyWl8_N@-j|iri2rS612XT?{+I^wU0oL)$wJ3c zB#zITZ8(*H<#kmAy@*ZTL(pPHX-3Pwdo#X}NMt+1fjH)F*73%;BIgt5I7DPdg>;@U zX=pyzshj=^>$TKn#io6a64LnGF^$`io_F14o&?TQE=#|nGT0zonxpinEP&E0XMps9 zYZldF;;x?r1^WeLLx?>#DPP#`l4GZilLv!)k2$piksr#GCSpo ziH;kFZ5JQRj1il+C^#5!xJm`YJv<&P_J9 z6eWY=nzXPJ3QhhM%{e(^4aj%9o4(WE=3MZcz@GA_9Ra?ZWmx?62R(4kH;t#0kE|i~3_oH<@0+7( znhSV-A46Gn9+WDw{VX{mIZ}PlXuOu$t8sJk)~*YOP@qEh@=D54UPYE3F&(EY{O}E_ z(DaDa#^=e=LKvmf^+Z+mb_$dEQ9ToZ z)OP3VGDJ|1B*G2DVZA0@(X~u}JWfx1qC4_B37V~J?AR`OKcTP8dO;6goG(TbdOK-y zJ+9LnkVzFP0=6h8Ga8r+C1O7X3}(IrKs7D4qgB!~7FANW-&vs96zAlYMydDwY+Ai6 z)T(jyMAqzmaar#j1T{{%t)WDi;~lho@JS>(WYDSijf6QzoUaC5TX2$!Mw{-W=v)q1 znyoR&s2SHu}%QCUG&4uJ`{D(O0O9g$=D>2O99L`4(-qq z3-GAQ{^-A)$$9q|@x81Rk%inGwy79K#?{rU0EGeT?e-MY?h(*M3FdxwC~@M_g9HF zudmT_yzZe>TyxS3XUAM`{dt`2(In@!-^Ugwh5}u+9ha+1HG!}ykXuHMI5#~Cb#CXWRF0Kx zVOK95(p~rhWvZOhA4fN4hJjeRt^v?$NV}J*(6OftY470lMt|xx2Z0;R=-gsUPF3S$ zEz5;^gR4Eoxss6Eg}A~f=|UZMG&~0WtX>MDKjb^6L*^elul$LgfXr1}%|V1{qW-=` ziYZ>4o>hw3b~96S^y!V*D7R7LQRA7jo5vGBT5OLYY4<^nxLI?mj9MKomK!P>4!bmq zHCYfML8u9P(W>S;H@XwutM85;NA0Rp;Zp3lOVzNm101ixu!DZhl9`h7uNj=6u`lWN zcOvN?!}IW);16+DK75u_vilLbLqBdxMVzJ_NY<9EgPUXBDbLZgB<=_xLe=H{AVxjy zg`hr5#qyw;b&K_s_MXd`G}oy0h1_axl)5LbtlF2NH9HtA-D_LKtY`Fva)SXm{DD7! z4t3C7MQ{10fX!ZQT6_z*boa4}T)eoK>>yJBMfZ}Oux)E|E&t-PX{QkQn;$K46#QDI z?z)hO&uatQ`2X?rm0@xAOxqQTLy_X{?(W4FDDLjA#a&8qFD{F_yK8Y>Y;kv&;tt=o z_xpVRt|Q4YnOsRGlbJI!_7uGntqGdjOR?@?fUlw#|DGKWj>pNv$>YN?zTdTt9PcY) zbjoDxct%@|bgz?*MoaK@tLcjGZWRAq!{@^qw7Hqp zq&Z-YEgx`wF@7~uPTa$+Fe!{JK6kv|WT|}b<@#EB-1IfoiO1-1*+jgQ=42IJB3^Di ze%$!B72NE4q;WQlZgS>H*`(uuzE2swy|f5!9!!p6^THZ`p2sO3!c$j64yes-zgmm9 zr@ARppKnbXX~oo%E-$rd%|-Swb5Z$jM{)|^&aOF)EpTOI_FXWB2ZrEl8eNoN+j;kf z-p51j%)1I64lh!!bqDCT<}*NHmsgWz4bSm79?m++SjYU@=*Q$WVYNy5+ion!voS&w z#XcUY%8gFC!i&y+dE?FZD}N?@s3rB~JPk=w4?%fVPiG-)PoYfBTh%YH>288W8La+e zNik!?)0(eaw(XBS0rgDd6dIj4cYRJR-g{>|&`WH#ect1OJ0_IZjlYEK)mwMDfqpRk z88v2JO|P6CJg3x*W6CaZ7rW=(7)2-JmRJNsQXR`ms1~ACf;?iwThH1|=8NfVDf}0< zBJW|SbX<|l1)cevqWR+Uiuj{P&GNvRgO0D|XUora<@M*&!1Bj8dr*nQg)^>-4K0;l zm$duF2~NF>aDhOK>jN_B;%SQa_+q=?EfT(G50!~(WnQu0cbywJfDU)^Vq#s3>k{E} z(}cp2ttIGvtrXR1M8uFIr+Sk@jhy%?SSI3YR;s$a;-V%$zcqW6_Q!iKqG6*}D7OwHj_4;hE{OE!8uuU645q9ePVVV>C{>GyAc-L zGDC3lVCMB^t;@FIBC|rm-fAi!?_^gDA@NBw0Cfhpmr#g5ZWK*W_X^&7C4>z6#qVdLuFeh z`ccYQTuyMc2Qpr)HBEP0^I#xC%WHKODC3$~07jXiBp?r`9kRpcVz!?cOg zmYOTyYmJaIao7iYc;9M_;N{ph-tqCJBhD%6p;K1KW*+KUdL$~`Kqr-#^&Nq7MU(AJ zfDZjEA7VYfjaYxRmIoswJ6_hkuWWtOa%BotMsJJBVa=ah1i;ohGQK~CI>jg@?rUeAnqN#>RSuaCRxDB|aKZbu3NlRX7uebeTmcDfP zEpD8i)d%y4uJkw1)^4=^F`>fz;nB)IA6%mSd8zqlxn4_fS|Rh*03$3z9to>+#0-^MI5i2GzaJy+Z90#d_5*M3+jO#Q_ zR&2#~u|QjbbwzEfG+5dveXOyix!m(=^=)sqyfS>Uv6?Q(!wyX0I=C2e={HQX;`K1x z%;hU*`Ss=p%OA|^Z0XL=9Aa@b#K%eH#0FPWjkcIt(;{km&^3?nRsm{`OQlXT-dLJ? zi-A;BG3=@xAW5YT4+>ye@BMV$m{lpEKII`H-exfET&1SC=!~$QqIx*ObPb?XqsEgh zDu=vs?AG~w1=DL3`{A-bg8ML*;rS{lWMN%dye~Pz8Yo4jqAsP|2Y`g&y$FWKHIj2& zGD$He#xFMMk822|C%lXZx7e24_-viOYj$ZX@S7W`UXh(k5-3nd;M4jgWxvdI6nZX6 zCAQj=hW<#VEj{V#OS#!iE0PKarR97bR!}N!0ENtKk`}$7ODB-w3#uOm9cE?kQeldn z?vf2z?Y2sVe(&B904>dGaU-{vQDBH=woSOWGNHhlPRbgbL|=pf+9TuZ6|uFXfRo4M z!8zM&RcgSP5wF^iVJQqy7lSFl$x+3xM&4-N#)n1;R=~x>};?b zseIQ11&2eju4*=W>rI3C-E|#kt;B|gOq6F z36~m1MPvFMJnR0H3LCN4_}+NZT8S>y!XHeP5M-X;Tr$I!oll$mO3Vs5=8Fih(P&5- zSt34rX1t~zvn%;wgJQSTQ)>#8;%2j$uc7;7iHVj202`$yY5!3FZXzv?@?DS75}6Lr zi>YQ~^*cE^h{KX1&zAGs=%*vjI%i89oc`5=rPt-iLX&3y%aM1T?fl*hKPd?-I0l_i zV0eOb4-$?CLTS1D7?SFBYQcWR8m8$>acCpf$FKk+3uGqS2(L-Tiie0`t5MAcZ-HCa zpq*xdgJ||za799e?r@TpkcNP>nrdGKG*Ti)U7@j_!^A!WK;ktW=N4OW5(#*Yp?CJ7>+v7`){v1gG; z-dC@y{*_BrK0=?J_AEz+H+KIZowurE50{3Jnhp+3dOM@_Lvyz6-@ea^pQ_*ZMd%;9 zj=A?sn41K>ICPbtm%X3=2tDi@-{`pS6GWb0vaMAIQ0qU#*Flg1!bPjSE%CnGLy8ML zB|3j#i`JiM4Zo|mR;M6scBlIe6envo zt+x-L+p>%g(f~r;r~T7sz9V~Zr`tq^fkdEwBwtL9@ttw##e5qktREzn)rZy>4#p;$ z?r2%inp7-8GBGU3La41Vf*6($IuWPBnoo4uMi>Q37$s1@TTbD<#@|n<&8C{({>WzM zzu&_53XFd3>WkSxknz%XJXrWqBskYpGN{#U!L=;Xjp z$VF6ot4&)c+82q&aI}Gei8)=OOr<>2w>{k}^0%8;nVA*qy2Y`*?2^btf(M;0QFMMyTxJ7}F z4BR9v!Q;z2>>lyr7W^gqvm&I8#)iHZrCHm=kZgw`cVi0w-r>c;{fKEVwAZE~b zfGCXn%U|~8PJY=?ay-zo)Y+}_Dvz0%n51+|^e{=Z93@cOfD4g2yzV$F*htMFZ3DXy zmZHbZl+Y{FLiwBz4CMMoWJ#YL6Uywsg|daAQl}Qq{|2**&Bx23E!#fAkbAk@&w6#N zFepnPipm1vs%JfsfY!{SW>S(aKtBeb3(|h`JSwNv>@AT>G{A&ZN@>sQAC1x6H`UIR zSQ$Ie4of6C+-_@+l$@|&Dj}UzUFxn}bsmJ)PvYmwlgV6U--D_ZSLCjZ)$_ zA~lBRa@vig`y=;)g$23$+uI_==3|t70*A*-dM~4Yt1E`Q!F0e-u>N7juIfVn(`~<$)YYYz!4>mp+k3S4v z@awAf3Fg6UtzEKQb?S%?=QEaTb|vNJV}x*J(0|8mFa;JP;JQ!OSpv7MAFiQZmsr2i zMlNlllOu?S4eT=I?y-ABCT_h#=BZ;&jz1NqZC&>bQf%6P@S!sf*J}a`j$-;UO*o( z)%y;G%)XooFqS?mIxb@xs4#9mOeFoNLedS7aNs4b^Fj59W=42@;--5Jio_F2KN-`q zIu^B1bNK#mVu%KjPtsnrr=0QRtkbLX{Zc}NqFMIW_!jC=tVSDAX41secTswtzQ`1^zrWV=gcs+$Y>VqeG~q~8+;dZ!%n5D%PPmf*p4fl*WG(rq(`SVjs>O<3H~(cI zigAF$1f`=kr;_&TYFf;_g-1G>S*F}N@~7(~p*R6oysujANe@}RJ$n$lOE0flvYJwZ z2M3XFLv;0CpDA0T6x@0zcQ(o4*1z4LJ*mX~PQ#Ry<~Wjx4o09pZ0ReMw`(zC{Gj@RNW0V3p-h(tP0@<0(9?iWp~?0(lrgHZOc11|lMz18tB3U7eoupTs|GP9$ zfB+#$5_9ze{(^IW2K%=U2%K#MtD&e-{Vb9X3{R8>H-MTjw~$1V)DlJgaPH{1^rt87?2`WIJdtle*?CTS(*)y;UrnGG zx6F!yFIPYy8s4y3L(z0~{4iAXiB9<|FJ}Ump+i%D^?*gOEotvDiNI#AXvn5a*U9?< zb5*n&zEG$S_ttb4l9V7`F3wdEel+3)C?F`hKNS5oMDj@O#B479VxDn;{-2CTDLFP{ zjSKu~$m*6lgrTk%`u+73-*>Nq|7uBM%tOa}t82l&`hG$0{q@SP0YZ=T*CY|^>! zq!u;5jlcbw3U)lHe}UuXO`1S{^fc#Dps^j=?0|j-C%+-I%h*#G>?s(!u(UF zC|R!KX{yABx5ggZ+*QI8iBR%Q*k@SUZZE?P%Xsv#|Lp0ke{xON0(eH!=EL=PbL7uO zNNi*>Y5Y~F^^2ZoL>Pks3&txY+CeR$#X8Gf%@7NYPfiK zvUeJGc9jol>{h5`6>3B*@~wC*b_H_YiUTv4QNNpfSS`-m=roIq36nbQE0`cH<*zr(K?!4SsKU8 zSnKFi(|=r2SxS|&IO!LZF}7*1prm9J-mUAp*w4=yCI*SrWcqi{SA#ciJbCsOwwv-z z#v;)~N8<7+&pv+U4OO5v=`6H0o>Le_K;To*Qv>i5N;EA=2IG}*8vDCA=d#bJOjo}Q z7~iPC%s_l$eZ^I!eUtS0ZTuR~+V|&mZ@b{Zc(IC9e22vc{H0!ir3XQ9zle(|m=muy zdoVyn9SZc8Kta2rBHLVIilcZ$C#|j4@Z!Sj3;$OY$dVa>en)p4fX4I@8j-nze>pGd z(}(vxo7FVrz6fct*(CW>*5}IZ-sjvo7HDnYu+_Bu_SVdNJ5(0Zzq^j_ovk?v+eqv5 z<2}c@t;Kz&ttnl_T-rKSa33))68gL|nBYqc6kJG}a%Me&2Gia=A>TihhR)!`f+a67 z7<|}w>Uw1kP5h>};P%r;frafThhBly>Ys*1#-}n?4AUp+FP*jNg~$1R6emt%l~ zLye{Eq_3qvhT(CI%KOO?*7)#B-hceao(!$YRK(kBX{BkP`;t|Z997`x{gc#gMj>IT zb8s5va9y95=ND1`)BX7Pf&UIdh+<9Lu=aQJ3QJmwjs5*4KYvY!ru=ONMN)vuLiV>v zWW| z|CMU0yknN)@%zg&aXvY1j8yWVpujEG8O*_%3Zn|&(qt3+vw)}0^2TSZm}NKP{P z-;aNWvuF+GFg4euAZMqOYx)>5r}KdsH3BWHkJ(pJ#)8+iEzyJ@u+>y(Porqku<6WO zjSVeD7M7D+GP`euJFJmlPyS7*Un8RQ-~SXsOdL&!)1x#+WubR%Kh!%>3k8spqe06h z;}xk6O4?w-B*^?U8$5L0thK`Kl1TZ5#!^E)rSZWT2DweVgobnq+u`a;Z0PU!dWd9M z4fAt>!|zr_f+0~Q!kd~eqKk@~n&IZfhu2NrqWMf|gVs=xUaM)S6W$N**~i;xjK2xI ze)1r@Gj&%dnzC!*UJ_UHZN4v{VtVUaa^$BUq={2||`d9=7h>uQRb| zYIrVM1)5KwyMqC^FQ~lH>0?vMcjWW9B-m1ExdRq8YZl9`Z3)zDQGkjUL8LhC3P74A zFS@|Lc@UCgO_dZMjf|e(FZ6w&OZPaTY1d4ZhQuNqsteY996zRKuoP=*yD&A0O-+?j zQ==q|`54m~3{%zVFJIcdc^wyDurja}}CM$f;-oV6r)-w;)H?1~@Nd4em7ky<=#|G1wnoQ_;4630qz$VgL> zk$ud1Tp5$O@(5mXHRELj0_f5Dt9dU>8@H4^$ zN}dq64{et>@#?V!nCaNP`r2}$xtdwF_m3QUUQX|EI;fn6e0>(Kr&y2TgfaQwus^FK z8hovyCyl}kf4rfj(*)JVbdhhI4*k~EDbMV}2W{uLZmWAY0+3=5wyc?@%Iephht-9v%U;-h!lt zFpWEaH6K5oPag*yf9t&r*Ww+hX#$_3c;HaUcCaImVs92o&5GiV*-|`9C$=IWm3I>xkQCbPqcrJT39I zBeZ5}&T#sC5W==5Y0@@E!)ABjHa`AW>v+}k{vItWUQa-7mJsT|jo-X_MkN2;PMBZ= zaxMuv@4AMCgn2EqK8(?MJY7em2v{SNx#EEW*E$Zlyvc(svz&%Kn&R0uzh!pb!m6z~ zP*bfrVv*VL|IG2}%pSE=cbW@yUTZ%?BAs%V{$(f4n{en70r7p4)m=fX&QJ1>3x$ep zgMvCPqgU5mXBMosyqgwvu;4LT0o*ikuB>Cst7U(ecT^|K5ypgV$@22}6R)e^JT@ad zA2T_^wp`q@d9G5NpBM3$SO9kjMGj}SZccp%sr;Tdeh1zgru>eF-QE}HAGv+bK#{o4 ze8x+QVVpsr6yTiy{?$XZ2ECBS^IuW8=?AL0aL4aj@49)L>HXbGwkOiIDkm$86oJJw zVD;i4FiUH4d36PnpvPqU==0%~xh0_R^5E*DW~~W@zRx2oR=Oj`oUeq#;HQt4)yE0t z&!KIELE(4Fb)GJSK)L{p@F{b7JM_TscSYuixHRmcs4ucs zuvv%Eh7(9*He-he_Yq{&zuXAZJ8L{4bxrq-#m3Z`)pGaA!Q3pi{(xPzl49kCm{IWY z9bl(?W7bND0Q6&tJVz3n>~Ns8K5SIjGcCe|+)m5KBM5-97@0Zu7VbF1*pP#b?$%zhq9aUfzy+E31ufbh^ zWgEI%lnN$WU+&tw-NsETp>eJ^`2{6+o5>&P6~mu(R8OMgG-bcS7-g_RoUJ*=jazKA z**>rN3wwB00&zbNukvSDUW(IPHwd{(fx%^yJEu5k?p~kc&&=23nUeUv(SP%Y!_h>G z0GbFhUZt6WEa9_5jtZVz(T77{xv@yz-`byRzva1F(|ewoRr+=WfBcLqR%?fz)hU!E z2xi*J3Xv-uX$w9~UhP4ps>;=`O>=Kz!RK;9laTlMY0bp_$#}Y3X7!C3(C+Y_YN9nR zjOX~?UYtT#_D+%Vl+`)Y>r!xhmJ8+e4{B0F)=<=744H1s{o%=2B}=Y zl{Ia`0Fg`_m-F{WEZuIuRWh8U^G^(cgU2~`7t1>KH%QG%T@xYFq+`uil&2>T=`Ncr z&)WljP8v5No`JMA*My*Y<02)S2voJisHO|^Qsa3~{J)05&8D%z3a*ioVdOD0D*<<* zm0$0(U}pp20fL$_~R`!yP7SKHf)YWa81y z-Cy8Jz^GTE<4L{?(L`5e&E>|Ze*8M*QJ>cn?8$?V3gZ|5X5qG#+Z}VSsez24F&bqY z9gDmY5(DT>&OAeMkw8%?XaYyZrpWrqel$unCCi!8$}D6Tq~=R#r~B@w_>wXHFzzt1 z^z=xZ%W0qdo7I4;nDvm7yvs0g^y?H?7AGf9*7I%Cz^F__T-L}BKw)}JbFbmtzKp-h z*)w5&V}X!3-8+dM#g)@Xr@oU;F_rWPGt0BKFE`4|UjT0Ihdhrco{=eHhzOipP@*?| z?Yi8~b0uPVa9cUB(Q96gauZYJ?0Cr9(l5W4#Oby4<>u0St=`dLT!j#mJ3Z;r|Ku>*fUymB^{z=aj+^1@M80lG z*wr6|=+S#Kb~x^N&=)2tKb9JEe&#Tgx+D1)Qn%s|qm!AD%hr(b{?oF3p^Rb7*j`*C z-%>U6JxM4UzjIr5nrqLi#o4OEJsiVoF0*;uYHH-Y$33sqiKZ0&j>@=vewXF=&xXCpBn%&sx=y64+93_N zn3vGP70~iEy`oK2Lhd#|@6K*)Xw8jdh#l}`+tq%;A^ms72+RWXjeY*(^-1Jq!?n-$ zpZ3^AM7tx3T=efwP!c}15-E8C^-nR&r(`htHykJuRn-5xThK%*{3(e#!6Nqkao;pcBdIg8f4X}@vd-q}Qt0-FM=Q`xr_zUQD; z%!P`WKYq~*xwBxmie_m<<*4{c#m08UKDvK051#Q8B6=G}t(* zEu?JgwEUtx(PXDQAJ)XLzEoaP5_`7V2CmTNx@scF#D&<2IhB;giV>=72Z|A{VTim9 z1ZVm+Rt4yAadF+BPMbVlZsu_WJnJ76u&i9nA36|f9Eoh6{G+W>jUX_!e^ph*z`?=UOHrQd zR4r3W{m|OnobnNw`$u^>z0=ARB$x2Ll(aP4U_Kh}azv_aP!J72JulpJ=@KOzIc%AKT2{FcW?$Vx3^=d&dSLV6i$MC|u=GM$ftKjfmt?0-M%6BaV)& zC}q`mu3N$8h*GL~J@`y05ERt#&_zF<}0RQsYy z5f6y(kN(d>Z4!;%5s)wcqK65$Gnx=e7s<0Pb;MY$>8Sfz%f1D~zal~4^2K(!(Y7%g z8`RM;SEWAz{N6d-aknIWu0K4Hkt@5Q7)3ZJ_U!^lmCQd`_2_+$E3)VG+NY~ zq;I@Ed%qC?YTJF=MOI=#vg(KtdQC~BQ%^Gj zKx|rfOB#23r(?WlGJ>Ty(>2oCR>?l&d_=y&H%ao%yC>2fE)G1dWgkOyKVi3BxC^+q z>#fLXUv)OG+)uZ=uP}OBTDt4Fvgh$sc2AZ!cUa!rWVe)yk&^t35ivAUqgP2SDmT*`>~9 zIZ|?=9&I2ljpi5r(SGrurHxHCjSV{jKA9XjJ|&v8Q4L=WjdgUPq0>Um;t977GCP?t zd0Jm-<7Rd01?LESempT+G)mL}i*p2x+{w349(r;k)GZ6{lUp;l3RN=Hh_uRre7k*=af-M{xUdrON?OV&ff<;l+>$)YHE8gV`$?hkVD#She)d^uo9n4nXH|1E8FEar z7$|w=xr$Cx&6`sCoCgLNYcepCx*=J+F*Uk4qY$ti@OBBnf*}xipTwXkYikVE)`UcM zi!V=Q9(YrhtbjH3C%M8vDrlhE0UcW<0U&CeaLtZY*5w}mP*zqGIA2pRWnhpQvjiHw z|I_inF1F3h#>ecq0u>In)_et#(pzcEZ6fZ(f)MQR$exZ-M+teZMRRERG$+x z>S4V0w0E1_(S<0X1>J(f$mX8$HdUa90%a(XlluNQjq~U%?$;KNE3?}brwRS*wf7&P zQz{GHN&S^WAm##HV_56VjAm4-5>1EvqO#68s1e!{g!{#2oA+5vR`SHF6B6f@qIH9o z^!mf?cj`|491^t~7ZE8p8W{00E5O#6x6$4zrmZBtDg%w^2!`|Zu`n#b;ErrA-8xYf z&Vh@9ki~i{NbnrRh2^>vNG7dP4cV+p3M_WiUJ`$=M04CbBRQ5 z!x>lGw&2V2XmX944vC#ch=OZ-iZyUd6D{W}GagtVh_~%buQQfpj4xkOFmWif_Qo@$ z&(}I|Sd0Qwd5X5`5>Q6Q$03e?|9<2!+4h^~V~aK-kZFtQ%55Lm+xe3HmUf5|Pvd^) z;dy&+g8F1B9={Q#rrAN=XXMj-XU}gx0nqGIQvgzy<911rLftart@W|l>!9=nrX|1E z9XdV#h2wa}(MDtH;6-W^8+v#Ly>>%%6Q^GPDpiz!q05SQw@s!-X7+a&m}5ceJn6g4 za`y`(Mz4yb+e%1A+v)`A%Jzi!omPaMc9`>>*31qjUUQ60pQIUEV=cxL;yBMCdQ70j z@Rx?M;%fyA^ebtFk*7K<{E9;=u+e)VEqdD)&g63?{WQ#-xuTcuIZJV^JD1pT+wvns zpC`_6kemB1osM~6ZQNL0o+6~-+4wxQTpurc{v@x(MdjDgl2xbYrkq^c3Gx}AhaYc& z@J#05=Kk8yg15nxC}QWerfb)U%d0>G)vN4;)8wX`@_x*Zz169rO{NGmTG|&aO$&>f zk>WA#uJ!MQPi6GP;t>0|OjCiQJ}ryr=t6l_6;~ErStR(FqTZL}JN<&pyq{oix}Chk zx-QnAM+v$GYpc&1Pkv*q&km0h9%0MTc#&#%&>@7bOsN4>%)7@P{Ld$&)o(%?&o_hK zN=idvPxuq4qG0Zg4c4P=+^PipzTG?i{x$TXJdv5UGhh69J=W-;yR7m0Wg??lDPvec z2OO>r{LOH#^_|eO$uB<|kqm2QZAPR4H_^zf;q6(W(=Tt3iokK?sQMO#gh#|ML@q z;BLTtive0}86@z0uFrh&Z779Lwq*OS!H;m~;JC_G&8eQ=A_KaQouafB(@90SX;b zu8K!9NL33CwVFy_Af^x9pIL24TzH(6>vyFCKnBB9SNHN^08vqFpH(jJ&S$cv8{kNS z-4UKxSfV;wfB34ICCg5D8Y-0Gey@y~WW!Z1C2FGTv?t87Q%PAFTf|}NqKs643BP~g z@(}$AC~$btso$2#;W(Y7{b4~TGqnjViwhy9iYIR;2SI*kOFeI_^HuMxYyZRJPHQnz z$r3*9`z|6U`7MWBTKDN)V!|-PDcc3@W5@i0P3Z~JQR?kY>$hRk^Va6Wu>IzzBd3GC zKu16PWYN6J(y)P~bM!EZv5oDyGU9Y5&!g0AS9Y)!zW{VLRp zIoj3Qw%XwOhH{y7D;W;#`a`a;&N&8tw{>*y&avSX0c0|PN17*jo$%sFoxoFIP;)GI;)&Uy_u+tfC-dDUw{70fHq$qqS|UuKqP4^!AL^aaT7X zm{(jpB$GIskR3KtvlG!@UJ+xfD4 zo>U4S$J-|&{4>YmN-T#}J`K0T5^-ap0B^3A!@DIn-@~Yw#?V-bCah3vu6#vgExQD9 zV$Q;X-c(tWAb8fujt)P}w&U(}x`GXfuG2_Uwc^2VJGjAywoFNwpd{%>l2Y-89tMoE zo}QiH7ux=}NVak2tgH5bZrKegu0gf9IL;)#oZ1N-v!Rat}C_h^PVR_sP&l~ba zd(^CiQVPsmDe5sA;!))xRJJ|)S(kaIhX-?3JNxhOOZj!auSMk?O=$U!AjfZ|cn(Dm z)g@Lvr1_tO7vK~N7|Tms{gvFhKEfdHRJNV51~8}^)@B)j(m3cfYXi}vg$N^PznV8~ z!>e2jQSAS5ZRdMS;rw+}Ky9FHu{bI%WtAcc7$Ih>D65j04cn^%+?Os_pNClNBYenrVThd`HQe2&rl-kt*ov1+`wK!U=P8*-q>D^D6G#bJn*A$ zxl;SdXYrP36;*vziM@yYEUshhk|mb?3^zhZl=!_>w{;GL{Zq&VEE1Q)>bSCa%ab-5 z@Chk|l%-xQ<-4GFT9dTRSm%QX^3h!F)_YCw>&wiQ+o6DT`(=DHS@&=+#?F+qj=SHj z_u_LL?Ac|g1?FIvyVx21SNg-24xHjOJ`>VGIrq51vyO!HA!0qROIs^8^Q~&jz@P8a zFEF{R*dx1gl8&e&g|2OGJr21mc|D-Zg5B>;Jop$}4$#Im{P>G91S4K zAr}%8W_@^dJWc~HGUrtnbIRva7RT0wfmG;5sek2`7)DHWB=)4+_`MX&Lt_-&LaHJQ zd}(9kNTvH}!~9sb%&y=giwg5TWaOY~!(N%>uk@H4PiqUhIA3mQ|!}G9Ug8tY#;pO0jTgpCa5_re5*;bkyv`AG}zn z4@2Kgi<^skR{w$5DsAsTfYJf?EIC{r_T+Z>oP1DIPr4ABkdaka1#wfOlQW5TFqDBCL z<%MjubW{@6X8ojYdMw3F`8(cTpZ4wP@DA{E*DDWADN@Wp}RCY;IO0}9ZNR1=eMnriu&y7<+ZHE0@oAE4UMeR$m~Brj4H~;Cwo85Zw4_JG{wSlOrb~_#lr1=7Vqz*o}WUO z=Qq^SPM|RJqRYnh`le8}K0cPpCOaC5>-LR#0(eI$>P8^CpSu@omse1&%vR!Zww7^6 zD+L5P7~e4)&;A7&RM%xMVH5bQz-gD4xN9o8b&eoqLxmstUqQ?yY41~yq)Yg$DV%5W zb3Iw3aM%XYLuZbyrWdt3S0yJ^)_?Su#%Td#etuh)Bkwj-H+!NaP3!-{9A*+~(cE&~ z7AsTD5lg%D!*W8&zqJNCiXjS`ffFJ2M^>>_R<Lg*=M2#zt_UTq_``q^*GS+QRuIS07WD9C?blVv)szL4-nQkKl(0GvdPV+DXR74 z#Rx9x6vCgDn7XzFh>?zyeO@t*7NW>jrAKBUsK_fF&Rg7;av7G}u;&HUgiNhqtlHdL z*q(v%AKf)=U5ze^d6H({Ns=R`%i+~nj9p_a+o)Z&6cl_{A&q6%XS41tKD$&avmCBl zt|(MxC5!;p7$0?DcC;Y0l|~phXoXTCI*l#T^S1UIaW3ezI+tkfLU7WC<`fkDk*y1* z2GSf;#TzmhqklkL>k4XWW&`}xb@8Q-W$>vbuFyvu4X<~eRF)u8L!i1Ax}c0l4kb`5 zVu2Y?xlu+^NLG4+(#eRW(KiW=3?xD;b;$>0?aaDvZSZP3vTAp^Bj>x7&u-w(E0xY4 zh=qSuRl~)&FB3y%NW!B~@w`2;Y|T#iwb-ch!%?C{hMGcBWh{zDCc$0dl-+st3y00} zMXR_8@TGUl!O5czRxWLV0n^8tiK1?_aW=S8yU}%6Z9==vf^Ku>nQ+uKqoqQ_IpRU@ zCiSRc&h}{Uc<$VJO)aaUv)A|O)ZAD8X0@M|47NuuMA*s|R46`4jS$sJToztd8X|YR z`u+HmPDNfhO9d9h228On9YsZ0rd)PsYHI4R;SZB$ zd_6d@_SvQKm8S7D_(dX5Q1rA7&G^Wx_?)(j3}R3PDDiR>Ht^N78rxtnRTTf&Q*$80 zGT5A-O>!f1>GSl#}#ezuo+4 z{&oJz@1S8We7WLG8-kGOA6KSjM@L2WZ zISGPiOpVoM_zxX}=~7i-jiyNZ*L5ZWPxe3X4K6C%e|B{CR;b&*kldfYMh=7&DrNry zaiB;{QU1S8J!eJ6@xwn{x}@&^z&9gCw+&C|TJ3*{LcBJHq5mJi!}ZF0YW$ak@O@hj z@3XX7Tbk{o4x8XrhH<0U9)=m!l%&nvSRgoHe0X!hx>Jvc@QM$ zt$W|5R~OiYhwE8dinD6eZ`NScpjD&c`_MG$jDT78nkVGkD`{lm%HPTEjojdar&sm4 zsaJ&cVcEwi&8*vMR#qr0M=tPD5VJwZFMVCUNn_G)3Ww`!UHsnFrt1;8AL|W>IF{Mo zvpxS|MM#^b?EHI8v6H2>U{vssYKcr!opX=?r_?v)N2c8rfoPBFYenHFF_FJ7? zRiSZ>7KliJHTL(`^@jA7A=q#4>202|t-2~#(KtH~7f)U`arO`D4*+~IR5(f$ zict8xTxwc?3^uCxdls0V4MgdACiSPOAG=GQ07nGxss{{h`C*oHhNqXi7nurKLyT zdF`I-?&W2~5ZJY9Lc`)L9(I&3aQjXAi}&h07SS3B?|!QM-b)m!-H*h|lX_U~E9vrZ z@c8hpE22nNX-q?w()Kc)9&bf-pVju`vqOsg)F<2A|MP&C= zVFLVJSq(KcJRkxiJ|B`B@*;g+4a#AW%0*T*%7YA;&_BrRYb74jUM$UCkH)wOGqaqwBV(~8- zm(x=vJCfNtOO3Mu0#zN|IPgKV;$|j!aLVO@9QtzROOYP*I?ZX@nPR*;OHkJ2GAe4! zsbkm}ITX~oQIco?hpgdZODB5D#BIFJz4-5UN@dCtrK!e&My!-|IPp`(vc-U!EqFVl zlPI@3zLwAP^`l!;T~U;Ea^F3hjyFWd5_e{(XO!Lhw;% zJ;0=`+!EKMKXB1RjI^-AfP+NBJ$qS)oI2?F&s15v;FU7wYju)Hd{7+_^YXP^UbEH) zXB1);KHMVG;C|Civf~M?aK+P_l_JGQOiGfr%)kqRmVgy3I9J%x;?v|bV8xTZ!Uit| z6qAvZhe-`vDWwWrAZKb;IIg;^N;LuC#Eo`c=rZ#fkOFddS54%5lF^;PcunZ3rkx9Qa*m!iN|ZE#DAgk}(8skjL>AI28P`3xu4sAt0l?_YQrZ2TR)to6329iiG z?>`{tG<=@guYU@pWKg^1pK=AIM1@m+8Ti&vo~uK?m@S}evDa58=9{l{YG9Nbp(#Oeh-GH5A~3BT8*SD>z-^JQTSbr3(U z8rnVN)U;hN_89ZK!!WC)+1jFGB28uPP6^b!rX#_&e$j{Q5Y(4-6A^M%^vrJ@zzcI+ zMe-a@M*}XR%~XH4>f(H!7tf{vIVh=oc{-*WKe68Oyeo5K*3|p6rw6;1S{n1d>|$K> zV%0KC%~3NpKV1@#)_gB16iNtsk*v%f8X)3h(QG+VXL!Fq$PO$+4;}F-K#J6{ zZa;l`fHA(2mNgVk7?G5d%Iu;xB@%SlQ<$3i<%AJSE&dvK4IBRh;?lEXwFoGYP05pi zw^HdL9s4YY1u#^KV_3jPw#^o(GbRD+KcsXJUVIT6ye&5!o`A6*{L0B^&wY}%D215s znkR}(P+6y!S z9CAQoDaM535-4qqm=Y7jPsK`1r^T}v`OP~QOI<>wZw4w&UnitjTFCS;^Zya`&C!uI z+t-uH#1q@L?POxxwvCA~v29Om+jcru$F}YKa_@WJ?>qnXTF+Beea=}`-KX~1n_$6m zG2b@7$oXtO=|N^z<8zdT&4hI3^d#Had@jX743C;NR zO`V3!$`AdyF)2c{XaY)A96E9|$`6Eug`jcUMeygF1$Ua@f>0hVmdeDZb;=VUWbn?q z7stH`nhkH+z7S)>Tn0L0rS=7*(J_f;3B>Ww~wfT+u@D=t++)V{W($*-A-?mXHR1 zq!nnx4f?T+G#PL|($|Dx*M6nZg#cT6`P@ZDJhWMj+9i%cV(83XpB0;>S8d{OgfRL- z9T2k$zk}?~8rs0YLMY6pVb4WFQRp8D+@2kilun0h$4zK*tJ$_!Z-koFM~V0mK(@Dn z%VuMkBqONLm=p6=-QY8sU<+B4ZBR?6O@$3#WEa+05%EMkU-^Rf8wUW38WBSV|AhPZ z8qTfc2}B{G*{oLFi%K#*)*1pm>edit>|I*|!^Gz6{l9!0$W;y~y@wjq?=z@3Lizsr z3|_fEXW6*x*v3E^PiDM&4rc>Guo6+C7oxM*tlWe6zGOQ$Ar4-Tn$jQMUtw3m`c4?E+Da|KpB8hPK;)iYt)|; zfXpNde`LwZ^dv=Hds%)*61CQB)okEd71m=J*Tnv6f}8O{x0xUer%~mi3w0$ls0(c( z3?!`mTW7gjP?bCLT&^!)C`mRU+#k3voUZ2x>wCHY8?vwY(pVk!IN_se0}LTYAaI&8 zy(x1wdHQ==nqnMej>kWd1_OF= zth0rE4)BsI_#`OgC#rsP*EXE@+BDx4S%$}k$ld}f+$(_ISXKa+HJ-opfZ57Ge=1SV zfo)!FPPAA`AX7}K9qLT^=C2hM&T;ljpOINyjrr~d`T*P3U`rQ@yC1QVt3jzfL1dIx zhlYI138S29%(i%5)KSRBdEm@`6R=(ku6V0;Cr+;=+(+?oC8#j*hyhsJTj?g5H>+W& z=f>AfhML+wxULVjK>>z5f_Ttwlx&5uGX@0S+}>k;$?vTVGQ^5|q7CQJT~5QCwZ^oy zRv}DRO=Ozsf&%omF>=U;fqyW$+5_bHvkiM?mJ8_yA)0GWAq;?LVB-59We10BMYE-;?FgZ6PuSR%l;qUD{;lBom<|$_$BSEXWUg98G=haElF( zwHNKafwmjhJRX9&5fQr3W({Ysp3TEx)@TS>zj(l5dy8-@v8k;d014PiSSwW3OLccoSY#ULj5w=E#@7Hb~D$k zcXL0s9xES{%?`VlzNi9heKR_!28Ph5iw}3b9|POSYVGAK-Wh>9>P8wgS==dL*mC;S zGnrlN8@~=kRYJ4ZC$yZ<9gi}zK8P=Jm2hD~*l2cASECsn6IHO~cBIP%GjzR=XDZP8 zZmAA?G#Byc^E?uCdHC-wPZnwrgoxZMd71fi1(WgPv2})YT<-)YHwGb?Hw?5Ch;1?4 zsMVUv{WaBpVHotW8YJF4SzKe06h~xsQUjCnr(eprTaM$MWzRMSR*(s`lf6{wp3=D3 z*T&CN$ZL+ z{i+536<~5>Ub^i?m*Vu86lzT7#c(#FpACPw-U!ii$YT(-6eS1WT=Bze=KB@(i&k53 zyPN_?mpP;w&6Yr`YV@~I$V|Nh>P?Kb!FCK#xc~WV-TkLkzErFC)k47-n6<_YE{xh4 zk$JSCxW({a!T|G3)7e02nRbc>jzhNFlZl|c7n4~m*MmiDI${AR#GmDD`K_}1q8MUy zdj{8fQ6#w|j6}8HG@eOO+F+nyvIG|KvR|}(FT5=9a?3{FIE?0+dSWHcCLebufqhCb{6jYhgh)DQ zHnC8ml_R}0$sOEjhh}eqmH|COj~I*xoK0D9e~oF)cHWUSJjp^eJHi~6;I^(gtt6D| zpAQDZco^-fQ#YPX$ILg>Yru>eE%)9!;=IkK5Rl6o6#+stDC}v%L84%w;J$25c(?#1 z{7+#`8|2$fx6oRpt|IliczxEy^ur$gIs`t?Ocg0~Mfv!t$XNx3+O5!p#G(&Z&&^o%vdpDF z3ZoTO?OV@U9_jV_)_0%SnEeXgV0m79C`>P@NjgP|$N-4IfF(VDW0^bxGwN}d%!9Ku z>5XibxaQ=Xxe4T9pVZ0JFuT}&Nt3zaDJGL4=$eq{w>0i!b`PxfdVlq(B1b#%-TbH@!3I&n3wvKc`={>vPS^ zdggj-1ka~}kJ}}fZdN;Hg0aal3~{T=NWvLqJe2KoqC<@AVJtjNrqRY8guC~#Mqlfz z+wQXj4Q-@@^|ckx^BB(>T zF0X4u-OR@DKrEFJ-~)4rQ@Gz8kJG1m*NOuir7P)_w7cJX5Z{9rb5sUI%vOG-NI{FB zwayh6@o+alLSqr9BBlG9W(uIw`vK6qKB&KRDo`In;OTM7$2ZWxLU&royL113l8g<*(u@^K51)uvzq|iVn*O% z%jsQuFrFQzhUA(pO|#zXagAa2m=(i;D%@FpqI-;Sk9r3KiATmw%~SY}7-Kp#v3ZBM zJJdY@Wkto^oi;Rg=_|zIn5srDV+fpdYO#h6X+F>Ear%=c$3MotD%Ep%I5C;E_Y_lW zJp|LiW5g;87Op03G*EK5EFUW_c+ec#=|nWn9Ki9$e|w}Ol=?R4LPW~x^*)Bo!}>^( zY7BidwH;9~U19=WjNUPN#8@30kkDX^9pCGx>=>GY=bMQy_ahA4A7`T`TDlv*zSj)| zp9VK;ESQRh`tw6Jj2~UX=_9G|i3BAgh>=WfyQudIk)td}H_6*qL*KPG{Z!?33xI~x zx-eTrhL@kCyU`gb+Bv7;T>BIDrKM$H!3RB+wXH0GrU83+GXcL@?_(`>24`T=^~(&M z%{m{H*r&_K2}$pwd{7IU@1X5Oo_#vvH9K?Yw>Ms%D1fS=#0AC(uPdTJ9}d~}V${jW z<#xMg^|;Q4kysC3!u1&=gwGwZyH^0~YNvpl!u*ZovfCT}ca+9cyY?uvUDeilF5IjY zYw_zly^~%H#ptfB@l9qm)Vc$;RQDU6Z?|h2lK}=v`6R%EtkgXiT+ zx=PC)R89MVSOq+4KTeCw{wW_Ha@dmT?K*5N9&Znz<$1Nx(HMETnBGj@?cY4Jsc~~7 z{veIt`-dIR%yubcnvx~B#AJ#BVdxsOG@u9&XFH&TsIEW|v4 zq=(Ls>z=*WQm6Sr(vGsBZu5NXdXkt*@k$q#Yfjr2Q$ zD9MbEkN`WQ8NUbXRK~Q3lhn}GsrbuB1f&l>G|)X9laGq(QLFnOa&j2eP^ zHMBt*5k*e!a|u7qy*ZgvbOg-AkT3z*Opa>-&a#2tm6i^t>vPWrr^=#@n|<+}d@s?M zqx-dKUPrV<3$|uUo^n_Feq0l}{815s4+}W}SNh1E&Os*n^9+gZWu)N7&g|ms<1th_ zxFL)0&FYE5$`uk}ELPmH5aer7`A;aw;14E!^Ox?;YOt1MtofT)qmivVu#z`a_-*yOr;oLpI>;YnLFo+q#eby-n~-8-(1>QS0} z5~oZf3A4C4R$nA_QyFu>o4HC=NdvOK1j@XI8Eo+JdQz8)m_HWPS}aHUwHFV6lGoja zHa=%VnEFnI=X=+Xb26l#$9BfSCtsTMc;eqESDy^z8H9&JQ(RMjqPF)tJAWwcZLX#$ zeO+S*EGwPHDbyDxI|}*x8Iy)qk4(n4SCO|kGX(_yG`krtcMyxB2x{F!edbU@nmU@< zx3hoU^l;itu&dus%((Mt6ekenzmUE%3247>e zO6d>9dNjSSIDioY{58zR8V6@^bm!WT*XH6d=uB8&*z;x4Yo_SF}srpKSD*0nA&;nf$1XWe-Lg|BObdwebSdN zsld7Iw{-zjO?G@sumVS2cwV?L5k+)agQXXgCccchcsrRz$zU-DI^zz5L?L&AG9Zi% z?QTcXVsvYx@yT&*;it!ug{jR*P(fKinlNuD_z{_<{Y-_0j*Q!lr%C)d+D`)t4j+G- zfU&7d+5OQ`yBhQAjM&~j)TMR7v5lDH^=l6@z+1F5DtL@%s;ZwIhSxAH&s!h)8GLc9 zC7VSTC86(+vWB8houyj48Dp+>H}tu#l`wUtEUGb5Dl1x4M7fcLq0e>=T7o$X2Zur>cTI9wF(|P+J6VSc- zP#POvJ|6qH+3sJBbyLu}48nekYP(q+XmAL>N#@#=%o<|OOzA8&V0X81aj0wO{_1F@ zH%iV`0oEGgh@k+-?h>8=U&ve3yH=VkuT8KPk*0S4o+>>b2N**FL&#w<@}y z9;9ZH%4It9DIiM)O!wQ|E$3asPu91XiStsJv-O0VJZ`uF!+c|}R#OC|MO#dM0Ly?r zUYwi4*+wz)*+yk!d+*Dl7Wm8UEkyXqM6QMslf^*y9BaaLgT)mw{ZpI^yy*~ba=xkb z08WynN||th$Ox)H$-ky@;0+S{`-Dr5Q%@2TE9o+hlBmXnTcY%p@3_!nZ1v6U~^P?|0kB*aK1rgM`%20_!a_xu!|DJdb0Rtfz zXe1hmMm(e*7{6w1!+;JqNSG5aFz;+#B-n?Dm?8WsIL9$!_zSTe5fT|rgkm)Y<)^5; zl&fxFCm!_8!fYxXLW1Dlw{`Na!6N*P1EN!1vbE`~!$WJZa@=}CKF(o7M1K&}3{rvB zIQoe5{oZf6OoN$Eyx&EIydG76TVyV82vQPz*18BuNd-s(ggLf|noV$1|Jk7o&wIjZyshfZZ>Yv)XYz4qoW`B0{X8gcRhZ zW>HdqAMUWy1#!n9%E{4u3VPig(RxHuBqAK>ltqCbz6@oY`VkHS5g`ROxd`5BecRHx zZR5i0Rn5%%{qQXZV@=YjFH||*9KlyF@EB`{rpcy2jK^)W32z&cWa3*){x`Jb%;>n( zM3l`|6J>^>K4HP$8@9toF$Gk{>{J#R3tK;Rlalo6hKX3xFV%Fgda zP`7dz6@le!wfMm}#yO?1Wid`|aE$Mx`Q@7>W{hCJyH)EKu+@ zmjuB4Y$%i+8!V35YHt2(glxdT)3fLeab1p78)}Zs*RVq*Ijtn9t4k%t*OS99%Crsrq zy?edCxH_6Z2w<`_mBD!-QM@?~;bwWF)Bt5%?;?kmD;~PG=4J2vSEv$UoKLS0gcjB6 z$@&Atvf)x()Z#~;jGNr*FMuw?bQ zimZCIDl<3$vjuiLCaZH>IIKfPqXpKr)SW(@@|H>ta8Yt7I#B9O@6;Gqp{zgz^0}&= zF7E1Lr4vHBjCWk2>dYQyV$Yl9KwX~qQG2{wouQ3tHbjXQ+?3@9bwbAj`tKHDVQf3Z z;zYa`-pLA{A=g8oOEsOUsi>Z~JlA6sOvd9U)**4+l`c-`NtnK46pLm0lV-%pfRbXXDXUT_M?Oo2o%T@HJ?>iTzFnhBmfXF-%T zov(?gs1fRYdb2pi6eJk%iAmJQ@o+St%Nm43!@!DuQ!)g##RSH@e)1)6Kky8};f-0z z;q2wI2iqUErJrp$hYBRBN%P+iw2~WY9pC_|v zY*a(e>ftVYUnSzTT@wAj)LF|lwvXaD*IuUyp`+g>atFrU->+90k%|b=`nSY;NKtQg zD^i{;-(@Fpy&^cXP8d4uxUHdu=V2gp=LFxyM4sD^IBzcR^!UG2tJXzhxR5er-7PLz zEU+5Gd&fv9MQd78zpz)loN@Q?UOidt*#&mY$Xb(0`cpL)TF#WWsCA?c=c&cZ9_B1Y z9q$gVDwEKz=`+nceG8e^N9qxUR57rA=msJ5H?mpAIDR38iyGTPqJ(@7bIpn(0ZI z35}Td%aBYHWd}7j4PgjiwtPO%ls+RB0>Rfmhfg=hN>1D6>MYQ0^=i@`^1)}T+`$Q( z!*Z1_da0UTQrJ%*yC6x}Ed=Y^6b|r9rN+@5s+($(FA$!6@Ka#Z2VxfjQoWWKx+-i4 z$k!6pa(w;cE*N=!>#(yqTZ=yc33!KOcdF=AAkomxu^3bs6O5yoJ|omxK995=A1aBL z&*|_wa|t2L_K}cQmS(}eRgJrSR1UY^Usf~TJ>)QEYfH`E8)3{elD6g~BZQR+2XV3G z^7ZGq`By&j38wfA9~s~4Tg*mbd$vD0?_?N<#4}{B%ALklJ35^rTt=TyNsz*pzy4&k zOYJGCI-W>N3*lGxhi5j*_VvrT@CjCUuP;@pOPZ^+-OcLdmEdUs>n@T^l3Yyybt;AE3r@dQ5Aeph3C*|ImTrH4 z=3WV!Pl|DLdc!FVa|d^P4_$41C3|Y*myPi*P4Cu+a1RVra@^_*v0W0xd70e33AnCL zOPFXfS_|bl$sgp6Ckw;?0|L)Y%Ve8nA%}s%LT}pw8yRBv;%J9EVMdE6P5D(+vfC?= zx`5FJ8?}tNjO2RLRRtbK2;8c+WGU?8Z6|aq2d+S2qMe>)WBLp<9{^o*M3vfOv4#iX zDLUO&v3Kjd2SY~8=AE`b*v9vnZfbwHvf$eFrnWQJI+u7UD>8B6ygELBO($Q zWHCzPAB z(hRtQEB=r^U#623NVOo&?9SmZCU%ZiDIOQW;j={$R4`LuViZqnZ+L2${N8}>*@(tc zk`rnzldlV)QcuK~5$CDNqV5gjwjz({dX8hRRbJ7V3Ag}QnuE+JUuvk*>GaL$bK$Nk zlb+AY$wd~D=KBy2StEMAY&%*x7Zks=%8p8%a8eMD3K+>YcGMg8q;u`u0XeD7Ymps2C ziLCWn{Jf&|oD8fXSt_!s9+#lm0PGBAj6(g&m#WTvEQEEyUmc3iX^OjqN?5Ex_O3Dy zL$cpRPyZDFQjc`7JPCMfaObzxZfNa5U)Nj+)q;sAT;qaH>{m-`F=h9guV9j!=+DNt7E?3Kqk9Eza_*Ly4Y~VuQQ|`K= zha^B`@wq0#&JY?i*hm35WE9-u4cNeL2awYyoW7jpP@kp8f+`uZ(`CMBlk$0+WC4Gf znVm6Xe9hrEQZ0vaxODCLsBHAYn%~ckO}L|ij*Gd6QJo|9&&xI9!t;}2bw&203+%H* z3;ljMu5t9ma}^>+f&8~=-qcSH`)oIRSa&VkSej}we;J(kA($dcR|>$6n<#+8@Qy=9 z`Ol=Z;?U?dKF8mi@M5M3^64h$Ex$6#pZgX=*UAPUv>8j6m#u6!7Gz`W6b4o12tjdm?i8S%$dm_i@`9z1M7I1|C>nMy}1K1+d-}7$;201q$fwmlt z6ompjw)BjnC1CSRn92a4(qL#Dfo*e0C=&c+;fM)6l;X}qfMLH0Gr~>M7Sv$CtwzB& zTRV(^^{@qbRbdA`Ld4_7iD9vVIsG~dzx#RhA300Za49q2TaplOUa!FX)6s{U@=kQ~@8;B!rg<3t1l>IB}l6Y+j5Qj(*7nbK_iFD;KUPQwVe?R2Y2v%6JBU372_tB zU^7H@r@5t#2)g#{bn`DmbC!ci#DGFlj7r~>>d}!F2h$S#9&8>OPXwPTvh@qwWC0oG z`5IiM!UbD#BtmRYh0m8xj>piEM_o@OrAeLRi!X>QFWrIjJY7Q!=8P;exnFlpKm+E9 zEX6A2yIY6B1QCb+fLt8A|HA$N&b`9UJu-9HFF#SD4J5Bz3{izi*%OaOGHp#kFYRSZAK#*i zWU3uggox6J(f>!K!A?lsN~tTh?A{_{=5HDI8BOjKH>A2khWlS={S zAsYnotO8DbXg1UoFKLjohcziy55f~!zr+Vg{GF3gOG{4wM6Mgmd?`ZEAzgNx79%^+ z2unCXG3G<2TjX|Vg)#Q;5?iA9{fbJ5n!}HP;A}uBDi~10DyiOiLhU_;GGv13ro|^E z1ZxLK0vTOuLvxUtN9vJ7R0vV-w(f%)ZdaY1sgU>kCK8Bkxo?-T>&rZ;q8O0L`6Pz> zi=;lcymDvDrQ~9wLcHi<{K-G)Gvo(lBbgxd?$ylD-<8Jv>qZ>Ng%EG_GCPflLKa|D zk;_-ZCT%QWE=D`bPvsQpDyYAOjLsS6CM{0k zTk0tuqus0XL@5F}jZs&`23=FKcC=TDo;&}v$*{$ZQA`qGD!danL5UO4x zwKY`b;&LOFPm|LtlkJ}iN8yWId1|Gx-fn@Ns3!)Dv}(E}iUx7bPAqqy{O-2RFr0WY zTP>D~DUXWLJGpGAo_+j?V-)$S#^B1NVtO2E2ocD0o}RpY`=}0lf8FnOPz?GU2S2-! z{kV**+P6%F|QVI<8 z3H^^y43mTne4I6^y;t_SKUicajI&Lfzv!Za98%n%qzbtueQy6k_l^6?fA|VR(o*mG ziqudb+mB0?3W9$mJt(@o<0Bi6ZC;JDjq#7#1qEPz9x1DI{d)SHK{MqU{H#E zHD#w!n9@`e?mz4MON8(M-MvNLlcZ|fLtv-O81BB4@|mg*^fARLJ9P$ z-OamkJ)ENFRoBlr*W^v1!LE01Wt>fC0ntPHV8Sx)>d#98GTYjuxx*-K1_ z%C!Jpd_u#*{oMT9Vi!r0fk`^OV}X2+i246w?oc{~J}(KC2R?m=ZKsXYj^12zA0=?J zx`}Q+|1^CG-~HDPtw{t|LocBSKk)Q zr+aSaXQdGC|7Q9aexlA)GL>KWe3gbI9MWg_0`WWh{WHO#++XQX#E|N6r4{OOdE#8d zSox1BJ!_`4k$J3+#*xRQp3zmoiN;<1m5nw!S%!8qZgoW9+&r<|s z#ro@(xQh1s`WqDG^ncg#{E2OViMWDcK#J%u4cttM<2RvBKrpRPrKU@fVrM@7XT&f_ zfg+}iv}rHXkHChA@5o^2KfymQ^{W1H-ffCt^YwopJUUXgbT;_cCyK-Y7xj7nbFh2d z46gmZKBbMfHJ$y(7o`&=BXvIJP5-)HbZO%M4R!a_{;vbEG(KQ5lm8d4+fVv7hJPbh zI`jWy#aic22l)4OU1N!uZx#QWUPFQP-*t%fF5t!^QqqNqW=?WXDaO`BQAl&$3ta6}5 zSxu8q@LcmkH-1!4<zD>&+^bPQFGI(&Iiq4SnP)oUDn?x%Fxizl8sD;Oi2tHS)sG zz^@hs!Q}Z*1>96JX-pXoq%(@#Z?-WhCDu;?c)>G=SQ# z{R#`vh09+eY`bhFRW^%DaowbM7Y2#CvswD~uLUv{!7QQ5G>vecLcF3Ph4wvOKiPZF zAM_%|v-os3sg41ZpqfV%Efplha{X5hLec~UfI79=Zd0o zi+KH~@Tt(vNo30NEz?o&Q@*&AZ3^;&B_J6r(`}vxp$ckB_hH;@IGC{^~n)QY~2g)P-9ZC3)=ravk zNns=Ag~xBg@sA%=Y-*B07{@3X2b(iXQTxs!(B4n!WX8Fg+e&A zkWiFJ;>!#fxWmxScb`3nZ{J5*D!%#;M9i5d3a6xcZ5b>QEH|#b&v@N}?WGrQEFDP) zswJEan1xwn!kLd#EF97SEmQ>>aXUqs>MX&%X(istnOlAPH3sb22fJdIyMt+`;$QWn zmUwYlSt3HpumR{P8qZ(^=z&eR_N)>F8bc)2`l!5x9Hxg2vt^&j;JNMTA58h{3O>Gq zf+AuzGln$kk!*0ZURhSJdV@zXsz{0z9A{{xLs9R5+E(kX0u=AYkgcaPLFycn+lTk z3JKk)XktmsZo8}f)tN+rNWDfSThZ|#ZiykS;ndjWvZ{JcxrYk@uDwd73@~(ZbXVekM-7#;-j-+KT;~=@~E039Rtc~;};lWdF;4GB>uo- z5_S7<{A8N^9)+9;dJCC0;Ggw<63<6VpOx*R!K8Hy-G!0ds0g6@iqt(D@3AsJA}L0% zWwgD0|Mx{)iXz)pxQ59RDUUKlN|$8Vh$W|%Wr-NR6s3Lx!>QRRjVA7l(>xlHlaMs%uop_b2tqrHBYN(p7l}O#KPmoGO>!UHn%Ft6@0~_eN+kO`= z8?C3RX!|P`ny_$LbOybD58Y3@Y)L>u(0IpdM)i=(XEX2mWHM<=f`P`=f7Cye z6@(CA*MQuPU4sC6?x2Wl(5M1FA*~dDf9Mhi#T0Gyd$zxmh~A_& zIx|%By?^@+09hkM4KQuI*{&^|J}etwb~?alf5iDKM38_Byl*MpTo^cmwq)qZZH!np z?Fh%NVn-U^7@2$IAMls{5@iX1>#Qmg>2>j0*7&7~i_HmCNt=FWdhmYz{wS*x#5yXg z>xKv4$&#S8f}#F6%FJ`WZK=E?hpKIQxFKTzwaK&gT{vODYo$BD9v9U6| zQ4O)BaYcl0!xco!ids*TFOEcAEVFZJM4QTMh87cjHg>~~XQU($`X=Pbfmt~j+HA`7 zp1oL+%^QU)$(@~6ANz6eF74|;2Luyf>v(6$xhNS@+w>jG@2@tzPV9E-S&QcL=APXz zBb4^^`H{k*+(h>gmk|9B>Au6M>vaz`+eCNJf7xtalwYwvuI@S^a%f9Sc+$HI_otqb zm)kYZCP510dYYwZV<{nLqb24LE!chQlKyt(R?a~EoiC=N4J98CCb3$Dw=}V5jFzz2 zh2OlPp0W8{6IMd4Sl8S(-|eewk7oi zbKTAGpnc78PQ;Dpt8+h;Zsb3|sFfWD80bDVOvxC-II?6Xv$(}RKi<>$ygi;>1!FP! zyjq&PU;o2aJN_#wS?qJKKzQEOEEKrkb`|0K%07ky-bVE`G z6m&Qch(?DPS?i39;`Fg>>@>e7bHlqDsL#j5{t+fgvpGzCwJ);VXusEMG zK%dTi$JRTSV{|0Q++d`wC`j^4f$ig@Bz`O-!JkW0m=`XlE(dAAG_#zWPp7@eYR5MpwcEzajp2Q@ zt-6?R~APA@+)6b*IvyE<3IsZu})=*Fc3x*#d(kw_}ND9%ThBd&w*k`U0|fh9_tjo)*$PWvI_H<54W4rjLeEo!#s)bI>H=j`fX z#S%>lzI0aI4vCS2VU^{*CE31c$%$6@<|=K-Y#SAkCi%GrhM`CKA%ym`P5OpauH*dZ zPfYpn`l5K^0H1%c0LfjbA~XQg+UYh^0#1%}s>7d*EMu1Ax38uFQ!Mja-U{groh^6Kn{i!l-Os%##nWs%EZJSV!ey@ubDCO$Emkl|pyi<* z2>Gn(BsM1E!Ypz%r07}$zrexO zf=*x5%bv8%WuC`Z{qUP(lNP%5igley%59nHH(yF7sc{Jpd0*(}7Jk9s1i$+I^bX!4 zK2PwX&ZB$?Cxnj6WDQ|5#my=zjhU;&dH zsx?&ls}OUX_Hx6*BGbt7w#{c4Wni*nlgl zC^6j}IT~-0LBiC}OOqBAF-DRfF7q(?bA!L6SnD_Zfc&iqo#`*kRNw7PXZOgzDyhA) zW>6`r%x!sr&4=AEEIUeS*%@S600Ur|6xHT2r_0%|Ofg+E3!2fAa784TO+yPOM!m8I zN-U2b>>Hjxr0`xa#d7YXE_{y7u|k$^)-vpBsoYtJ`#Cqa^`DR3(FygTY}NfP5l^!cdb^|4_&dqnD9o(` zgm@)eTkk^4GcKCkiW^-V#~gsu^f0sAqy*)Lq@w%NFl>-$zI|i7*BSiQ6WH^cH}WNZPZY6+X2gi!@sj&W!Y#6Boh8}F5I+y=JaxBV5i$7WC`kK{9e351M`3^b#R8 z_g_?tl2Te=wX)_Iu0Q5F*PD*5E%FLkqZ6DYn%HW&y5K5z++@EX_#F3bdQLOAATPxk z4lEf>ZfNbxd7g?hsYX*bZ!01=m>NA%{JuD5cM8h1>LM2X zKGGIzDZ9ady^T5FURd_W?UEajHRh=UE47INRo^s~@}(L2!bvB5GCViPq?q?~E4q%H za=DG1-29V~6%86xpvDQaAf!SMOXNFQG{5f)x*3{lbNrd*Nk$FU)9Vnnom=lEnQZ3r zZFB;;+yl|~7<_)82+!*=>gq54CDHy7@M`M(1|ng{XCB?G=2Vf(4yn2i0v|7c2@VT^ zxc=3Kbcxi}!L5_~duP%UgzWY-V*u2X|4)m|iKp!(V9xRfjYA|pbF7aM8FQ0dck8y*V0&$FHr{8p9oUA z8RIwBtYSX**f=wPZ)b1m>)krXBkO$!FvTJXP~~=9c%QxbAXeE*Fj=CZcEuD8NkU0+ zCjO=q7APz+#0}Nnr}71~1w%z*u&06`KbT7YPB+8z4KK_hGb+OE12GC=vR}p!W&hci zb54ScInWR=G|Tg8qN~@E8D2_m|12`BbhxDcyutHvy|<~6U3Or_-;%14P|k3I1vE4M z14hp~Tpm%6!+JI@=u)pP^zeu?92!a#ze~3pX0+Tqnxu` zUwc28k%?%c1s`G7$9|15vtF zBN4myb#Gy;9kZm*%IJ{Fu%3xaU*m{KOciF@fQj6O_fghXO9JkbTc>E1C5ylv@FMVP zBUtEOEamIYPZvA8x9(63?6W7J#1>r+Sr3v!W#_i`#&Deatb?U70HkeC3S&MZ?zEh(U4eyu;%$)y) zsB2_pyGb*~fJ&IVJI>l}`XK*WB(MkdOiwdT5oTLCV1%o(rGi<r!HB|y}^%8_|XJrLQ^QU*hK3!D>VT=0;MMOkgUhL1= zio|pAz!H-hUADZHbp^1LE9{+;!b^r8ok!!Ykn^DJ(K%uhr}Cmws)wJ>tvTLkSm9GRE9(iSE*Arvk*lDvzG7?=z^iL|JvqB zMIs&8q`>p0(l|i<8bw_>thVA)1xZ&W4}v;bF4nD9zDZq8{Bx))eeJ52ngfetnId$k zvSxwLprwen#jOk&Wd%KkPpVoQ1Q#Rx8Suiv^;~0Q>A)73{3)D6she0shUD=0d8^c0 zwZCc~#%mq;A3R{lEKfTJw*JS!CZ9;+HGTc?-4FT9qQXZ9?wOEb0}F9<>Q`X`={u84 z`scsZDoqOI(>H6&SPfb(@d5xEdnK$3(b3U%i)@dd zUVxcspXRGFTJIiOf6uOO+k%Nv+|BT+r6GRz=_$Bk6^xCo`l>zP#D#vcG8o%rG|!tE zc))|6o-A8HBme6MA&Q93-BuDUQmJG=?_Sc9$gsod3?*Me_I!!0qHF+%@QcqT?4MPYvuWG&5~{QhT1wg+%qNd42Z zU}F>yM0I;V)+%Xyl8)AN#{CjmQJxaW_eT>;Q{jw4kZ6y zzTaI8afKo1_g|;nM|!53no?;!v;GN#3*F9H8;wfr(3-%iYHArs;(^q4JIJb=s67L| zi|rHWwjwD^l%JfRk)qE`I;DT?C@ig{qxh9PBmN1A>C}-0GH1_f9-{wOob$!Mu`Z}2 z5)D?Nqdo;@eGoKE?d)V_V=6H2Mh8y*bV5E2k@KQ*P*a34(WP%&mUkpE1{$cO`iw^W3>-?R7e zwYzLQTRwP#34CjZyjJc(Y4SO^?cwBX(r*j(X($wNUp1lz7A9;ftZeAzWeU1W*=a$X zTJ~B2rq$Q_cB1OB{bt+-vIPefQ&uS(v?Ed2CO05bCH7>~^WAB)>N)a7_`%=9CRBT3Ld~A>pC&Mim_3z4D3O*0XJKz>;=(b<5i{Y>D)$2&+;GX!Ba;O; zhA37J4#*MWNU3Kmffr3Yj6C;{Ix{nqRqOZHsw!@4?`4JELNM+Y=!2KUE@J(j&L7-h zOK#xu-Oz@6;gc|FIhiz>($KO(XDDNMnY*B%AgxhD;$a6x4k9I=sByzN&HAv9+I#9wuY3*6Ep{dfepXwB z-*g6L`_X-tDEP>_<8At^n<1Z>4UD$+At{fo)#bH(tyoD?(8oYDuku$QHCY|n`q(DN zpf2Nzcg2UqfNQ$GgcCyXea2~_e2QMus@Vv8`1AV-wb+*G6cidtm!#PF4yufJ$Wu8bYwabwYZ74nbe z*&xE+t&csav5H{qJWh~>O|+OYS3zvfZc*p7D=(CuI1*P;*Q)8b(h%A*%ihRZc|qh& z1?;F;7s?*J$tz8}hm^v9zQ>U!?Qi7eA38Ut7kce~95wMHy~|N|PW7jLTG> zr~`5>^V{gOedJV;l<7N?=hKAR^1m(ONumvHI~`PwesFT363%uI#rqKaRx z1UtEKchk77j{naZ4s5Avf|J2W4jMr?8T-Q$Z(KQ> zCy2~LH4U75Lx=n=$a}IAl0Cugx&E#6^8UHN@q7e9nr0g$uwHM#>*3BvLs?$_6Ansy zwiuNpBYwA9IcH3yMGC6K$M5$~Vm}j2%2#f7!E1V1U9+=|IK`F6Mm4hVe8?b9FB8>O zRt*RBMFElPKhnDJj*1v7$_f}4hmJU!e;VGw$^Yc$XvSioo|>1efr-F@4%aWG#Z#Ih z<6St1I1_89y9qw@(JdqQefHzp42Vw<{|zs;*7rx8;p(JA|1K>; zF0al#xINsGnwn(AMJPL!!i>g_)CG9Eq#4QH5&iW+A?l(QMZ4;(D@l~j6mT1Px(lh; zV&S~U&K3Kr#Q1etts0l7rc9^vx(+|2@dk?HDzDm@I+V$0DvwSrq8?)#D`R0j>p{@o zvI9v#;eZ8T@mLskbxD(V?uRf|w6tO@@D)>hNE?@6=9<9r&mN9IY*n`O=lOORMc4<% z$O?}TX?OyL22MDH({od^2_;%qQ>n%$oVu}DC-VJ#yn+v?ACI*`L1kM_Wn+m!8Q%h zk7G8reT)H$!L~OTY$E8R*U_4e%d;3mmzqjkp|6%4hzPIn%Jv{&XRyT|_ZZ`p!YHR{ zzW3W?(+NK~f^;*jqnly+exvfwuAD5aIg&NVlaWX+i9$Yyt%(X{=;wN?tRgBq-8IS& zjrQAaI7>!#4j@0oXd&@?kcG~^w?alM;X~>J(nmQU8u`Gx z;&(G#ZxyU{^{4Ch>>A)DN|N_ZuLp717T+mHvGz+)@f6lB()9+5eSOo#(&eV<8`+wn zqO|LC#rtEA-=nT0?`_eN5|aqh$~iG8aq{Df?hyhlNy0(PhQgr{c6f5hZbqo3?^klH z%RF}|{GAW*w5HG101vBg0!aQKzzt!4TVABPOfPREH(vytz7qL;ecDCp-57E=l?^xZk(XP$*mJeSg@&$z%K%O-r9=;ok*M@|2YPBr6cw(G zsjk|FFm=a==)n=U;?Jxb)0#`#_9b|Eflt6dfCUBNst@FW03)x&QBhn5SJ z>ug_^b|G8Jr1ttSx+7u8Q(>Udv8vuhhkO}@2iC*o`6v;N*64f;@Aa11ZPY@dMy?CY zIV8iMD-^oeUEz51?19gizGwI78>fORPQ9VO@PUv1K)OIiM|Qyb=t#vorhuFFy_8cW z8pQHnmR`2kPNSq~mM~v7h*p5nYADV~%O-ytH|=1_%&%^2^D}ReOQW~3-=sOq z(Blr6qQtOa@|Dg#?ZvT!>kP(ZN%cE> zd3$}Ie0egh+PF1wdMOQw{cv?ser9;jeguv_>G-kvw{JdtFdY+eTXg)a;{anu!RYCoivm1#Ou+MaRFj*! zCd-YDtD<)8wCfyAWKZGy3@}BTFyrIp!2>)iSrZowrrJP^H*T^S7>-M+6D?_ayZtFQ}0>cPovdP=S)zvhf z*vla)Ls#7XKxzKLkA=bSF47mi*nCAr`ir)B{TCbBo792T_-m6835)|xg$5qkg?Z=| zbdCQa{ajtDG>6r%m)lJ?#p^Wz9xKz@0d(`^+BuHi)e+d~&u3hi{RPLvfMWCTd4Rb=`+CDx8;{qObkXT&Zi$-K zz=YB6B5SiURtNqqxOi0*Rc@NI^PUJY5uP$S^pZsu?ipnhEq_P?&SI2&l}; zzCXbtc_$XrIQm@WkNY#pM>+~<1AlaT`yWaE*f5f0LBHO$VT%B&1-Wq-U2eORe1TBaq(zy)thQ_@IweYE_toK3M7jtu>@ zOF3dZ@FXzc{sfq%c(K}T?bmQyHU5n%|0|A-6T^{!tFNcjC z0ydaLGHTvPARhRO$d6G4ZZB_UA%}7cCFl6+IvaU%DeZMJdxs6_p;Cv#xi=$gR}e=_ zHFc&vA>5@Wv%+bmRY2Q>AUEE@-YChxrR(IkbnK~qv>bZp_@&Nh=7Crn3GrB411|!G z;CGu!^@kE=x%tHKmXZ2^%O}$Jn{*BUu72adH!DGu(d($AED=x6kA zdPn8}bd;l618#OE4P5N?BU}B(Y2s(l%!#wNDr07eUCmTpza+jV#$*x zye;zTw7PZtoZe}uEdS%q_yz+jeeTCF_XCOV*#s2FzdB-tjcgAY= zOB6YWrfgfs-zkew$aTsOzjn?9yGarqA(idk!)4e;^tq7T?&ay56o0!)S!;IWO(=`G z2`rjK?$S^)Ft`T^|5EEUVM)#x&Y~vJ@4D4ASZPcqRQ_;3nBlPmC7!Am#S4-0d??>a zspsw!nT%Qc35qA;aV85T4SZA0>N4&wh-F49Jz(F?$P`6HC-oh56M}(ld`v(cy3EB+ zZne3p>GP$(9XE+l-2ewhcnWOwampW?Q~^m~eK9TJej&$efo%+-B&F zi$!?qdax(Uejd~UFn0hBjf9UappN2KO&%G`O!v^bB77s>0>@rk!bhd3untWaHga7@ zw0a_fzsIBlh`a1!9!rl|ePaaCwTiS=o1VsX#jWA>FtTl?GP|`XCiP)XJQ+A1yCb>0 zucmhJcgC#9A~qI}u9T~`@Oj4QM{nL!aJw7R>~-H$^wJbZ-pola)5x0m?Wd1rT7Van zZoJi&*&pfWWGr<7+B~0?UJTAKv2f7i+2`?@D^1p;3D1e!4&|0r;j&GxM(^|m{8&1F zUNSH+WjxR-gQkJ%z)nAhFXZ3gTrg7)@=Sb&RRYzx6-ND`4T+=*p1pb#$ zQ(2#ac6>(ChdWdhzmRvk%h}ZzB@k!{U=p8FON_O#efRNel}Wsn>T4#bqP82|H@&Fy zJ-~6Yx~l3L&HO}!d9j$6po(^URUGGzRk}c%)br)Rf@;)(K`w6Pc_G#9>ye{QWpiXy zaIGq{m($bJXM51mW)C~t;KJhKuxbTS`)DTB4J3^EEPQ!$QNEf{JxYuH*SKV-EKQC- zla@kJS$`qfO`h#?h_e7EUCSq4;6?^s7hW$A|5_TIQ2NV0D<~*BskUQ=(=A;~_qF@` zuZM_l*EbX*d<(WO`vfITm9YS4RE5CQu)}#XHU`6^G2nL;%2|S*0`oHc>fXT+JSJwE z6|G;Y*1Xx-l4Y5$^POU~+cmhyq(nMNR?>jjFF(H!;f6<{O7xk0R{!0!YL?{HtK;y(ez)26$8S?8+BuyJCJvR!u7Z!AHc3u(RsLPA0wx0R0Q zwqa0uMagf;d}Sd3pcNdCS>x*wft9M30W7hkt8w*Tic5R7x5T4gclMi;~=wv<9VXmT)Ln-06W#av!o`{uVne*n9! zKe@Ktn4FJ1>6+Ry$&X;wmvM?4A)uM-;==1=7tmQ3is?C z0KpnNizf{FNVhQeFe!F)4XuHpCc_SVdlC-PulX%Sm8X0I>PcVVDS2Wu1eDT*h7wX~ z?Dy+&^2zWp1SY#(2z z%_GXZ)E+IV8BiXx>9%Z@2Bj+kd+_0D-F-&P)hWOAoW?B%BQm+3O}LtY+p$evJb#LE z)LY|yZo@Qi@JlB}&0K028EG8^(Xfspr!bQTnySm*s9C5TSgTzGy>vslC`WWEl$e$d zG&LZ#BEO6q93UNP9WGj&mmJhCVzZOUcy<{qQsfB*_eW z3df{fnskYIM8zhGh5g%x{{SaHEFtMXh{*{{>IXhjS4JamZkFoQeu;u!P)#5ufUm@l8OKDH(f|9;pvW%sWMPGOpG`hV=X!*wAR zrQ=@}z%+p;vz+j=e=yc)r|*f;e_B|g0sX%tW_gL^kpFtdnm8gh@*jpyJ(LxV{|94J zV$6mg*}5dkqhI*QYFXtcIWhI$fXw21dU`%5|0nxa(p^jmR(X$u;LWpr#=`nG9sU3^L07fi5a0}T zs1zcXq-m90RiHuydR{6pJ?J*3_o9pQFEPm#w{vsS_-{Kxs1p|krUbOP4(?r+?obGx|+AsmJ-#~ zXo?2p**08TqkE;hFdIn+#1rf5`o(v(yqVic)xXzfxvaR82QK*OOf~M!$JCF4yQJA0 z4^5Szfy|12T_0T?wf79#0hLO111;fLG5jb=!PM*HmjDu$srTd zJaakMV9%;`$u>U`X5dqs>&uV2ymT3#YpqjpV6Ve(w<#C8aQe_{I8n1?nUC;syy)Y< zmh)&7)Q7HFAPNv7jtzLeu7V8hm~QNRt+td+VC{Mza!UzqFT%qaSIUs))xJ!F7hrp2 zu|gksK0*kLsS0p`-E6r!`bk_l#4g-Cg`Jq_j4Ixz-St%|R8&n1cr`+gFZ^>YeRSFC z3=r>+0!R-Rt8!b1yUal^-8K~LNN zti)BIwU1x7p;h$FycFU@UPM!uDf7pEKYjM{L0#hA+%ARP;WOx9QjAw5q#DlVx8JsJ zMI(*4_uKHby0YCiUGj4w9fIPWv=`q*93S3#%-oBHk+lKyq8o^wAYU?{6ePjoM&JJr DY&x_! literal 0 HcmV?d00001 From 4f05ebb82fcd1341d7ed0076cf743277e25d24cc Mon Sep 17 00:00:00 2001 From: John Kaiser <35939694+CoveMiner@users.noreply.github.com> Date: Fri, 3 May 2019 11:02:44 -0700 Subject: [PATCH 313/724] Update surface-diagnostic-toolkit-business.md --- devices/surface/surface-diagnostic-toolkit-business.md | 10 +++++----- 1 file changed, 5 insertions(+), 5 deletions(-) diff --git a/devices/surface/surface-diagnostic-toolkit-business.md b/devices/surface/surface-diagnostic-toolkit-business.md index f67a2cb1db..1623b7fd0b 100644 --- a/devices/surface/surface-diagnostic-toolkit-business.md +++ b/devices/surface/surface-diagnostic-toolkit-business.md @@ -31,7 +31,7 @@ To run SDT for Business, download the components listed in the following table. Mode | Primary scenarios | Download | Learn more --- | --- | --- | --- Desktop mode | Assist users in running SDT on their Surface devices to troubleshoot issues.
Create a custom package to deploy on one or more Surface devices allowing users to select specific logs to collect and analyze. | SDT distributable MSI package:
Microsoft Surface Diagnostic Toolkit for Business Installer
[Surface Tools for IT](https://www.microsoft.com/download/details.aspx?id=46703) | [Use Surface Diagnostic Toolkit in desktop mode](surface-diagnostic-toolkit-desktop-mode.md) -Command line | Directly troubleshoot Surface devices remotely without user interaction, using standard tools such as Configuration Manager. It includes the following commands:
`-DataCollector` collects all log files
`-bpa` runs health diagnostics using Best Practice Analyzer.
`-windowsupdate` checks Windows update for missing firmware or driver updates.

**Note:** Support for the ability to confirm warranty information will be available via the command `-warranty` | SDT console app:
Microsoft Surface Diagnostics App Console
[Surface Tools for IT](https://www.microsoft.com/download/details.aspx?id=46703) | [Run Surface Diagnostic Toolkit using commands](surface-diagnostic-toolkit-command-line.md) +Command line | Directly troubleshoot Surface devices remotely without user interaction, using standard tools such as Configuration Manager. It includes the following commands:
`-DataCollector` collects all log files
`-bpa` runs health diagnostics using Best Practice Analyzer.
`-windowsupdate` checks Windows update for missing firmware or driver updates.
`-warranty` checks warranty information.

| SDT console app:
Microsoft Surface Diagnostics App Console
[Surface Tools for IT](https://www.microsoft.com/download/details.aspx?id=46703) | [Run Surface Diagnostic Toolkit using commands](surface-diagnostic-toolkit-command-line.md) ## Supported devices @@ -163,11 +163,11 @@ You can select to run a wide range of logs across applications, drivers, hardwar - [Use Surface Diagnostic Toolkit for Business using commands](surface-diagnostic-toolkit-command-line.md) -# Version history -## Version 2.36.139.0 -Release date: April 26, 2019
+## Changes and updates +### Version 2.36.139.0 +*Release date: April 26, 2019*
This version of Surface Diagnostic Toolkit for Business adds support for the following: -- Advanced Setup option to unlock admin capabilities through the installer UI , without requiring command line configuration. +- Advanced Setup option to unlock admin capabilities through the installer UI, without requiring command line configuration. - Accessibility improvements. - Surface brightness control settings included in logs. - External monitor compatibility support link in report generator. From 2a6248937c504561c5e34d29e9e2074e03dcd851 Mon Sep 17 00:00:00 2001 From: Rona Song <38082753+qrscharmed@users.noreply.github.com> Date: Fri, 3 May 2019 11:27:51 -0700 Subject: [PATCH 314/724] Update faq-wd-app-guard.md --- .../windows-defender-application-guard/faq-wd-app-guard.md | 6 ++++++ 1 file changed, 6 insertions(+) diff --git a/windows/security/threat-protection/windows-defender-application-guard/faq-wd-app-guard.md b/windows/security/threat-protection/windows-defender-application-guard/faq-wd-app-guard.md index 8be213c70e..2e9c8a2adc 100644 --- a/windows/security/threat-protection/windows-defender-application-guard/faq-wd-app-guard.md +++ b/windows/security/threat-protection/windows-defender-application-guard/faq-wd-app-guard.md @@ -70,3 +70,9 @@ Answering frequently asked questions about Windows Defender Application Guard (A |**Q:** |What is the WDAGUtilityAccount local account?| |**A:** |This account is part of Application Guard beginning with Windows 10 version 1709 (Fall Creators Update). This account remains disabled until Application Guard is enabled on your device. This item is integrated to the OS and is not considered as a threat/virus/malware.|
+ +| | | +|---|----------------------------| +|**Q:** |How do I trust a subdomain in my site list?| +|**A:** |To trust a subdomain, you must precede your domain with two dots, for example: ..contoso.com.| +
From f7c5c7967597e10417127b74e14ff10d7ebb8b4e Mon Sep 17 00:00:00 2001 From: John Kaiser <35939694+CoveMiner@users.noreply.github.com> Date: Fri, 3 May 2019 11:28:12 -0700 Subject: [PATCH 315/724] Update microsoft-surface-brightness-control.md --- devices/surface/microsoft-surface-brightness-control.md | 7 ++++++- 1 file changed, 6 insertions(+), 1 deletion(-) diff --git a/devices/surface/microsoft-surface-brightness-control.md b/devices/surface/microsoft-surface-brightness-control.md index b9910dfc97..e4e4b988cd 100644 --- a/devices/surface/microsoft-surface-brightness-control.md +++ b/devices/surface/microsoft-surface-brightness-control.md @@ -56,9 +56,14 @@ Full Brightness | Default: 100
Option: Range of 0-100 percent of screen b | Inactivity Timeout| Default: 30 seconds
Option: Any numeric value
Data Type: Integer
Type: REG_DWORD | This setting allows you to manage the period of inactivity before dimming the device. If you do not configure this setting, the inactivity timeout is 30 seconds.| | Telemetry Enabled | Default: 01
Option: 01, 00
Type: REG_BINARY | This setting allows you to manage the sharing of app usage information to improve software and provide better user experience. To disable telemetry, set the value to 00. If you do not configure this setting, telemetry information is shared with Microsoft in accordance with the [Microsoft Privacy Statement](https://privacy.microsoft.com/privacystatement). | +## Changes and updates + +### Version 1.12.239.0 +*Release Date: 26 April 2019*
+This version of Surface Brightness Control adds support for the following: +- Touch delay fixes. ## Related topics - [Battery limit setting](battery-limit.md) - From e7def4650de00557bda5799dc216714edddf2304 Mon Sep 17 00:00:00 2001 From: Robert Mazzoli Date: Fri, 3 May 2019 12:06:38 -0700 Subject: [PATCH 316/724] changing topic owner to robmazz --- devices/surface-hub/accessibility-surface-hub.md | 5 ++--- 1 file changed, 2 insertions(+), 3 deletions(-) diff --git a/devices/surface-hub/accessibility-surface-hub.md b/devices/surface-hub/accessibility-surface-hub.md index 634261a1e3..3c04327201 100644 --- a/devices/surface-hub/accessibility-surface-hub.md +++ b/devices/surface-hub/accessibility-surface-hub.md @@ -5,10 +5,9 @@ ms.assetid: 1D44723B-1162-4DF6-99A2-8A3F24443442 keywords: Accessibility settings, Settings app, Ease of Access ms.prod: surface-hub ms.sitesec: library -author: jdeckerms -ms.author: jdecker +author: robmazz +ms.author: robmazz ms.topic: article -ms.date: 08/16/2017 ms.localizationpriority: medium --- From 66895adc528149860e62e31d07e425e8fc5e624d Mon Sep 17 00:00:00 2001 From: martyav Date: Fri, 3 May 2019 15:50:26 -0400 Subject: [PATCH 317/724] created separate mdatp for mac logging page --- ...rosoft-defender-atp-mac-diagnostic-logging | 64 +++++++++++++++++++ ...oft-defender-atp-mac-diagnostic-logging.md | 0 2 files changed, 64 insertions(+) create mode 100644 windows/security/threat-protection/windows-defender-antivirus/microsoft-defender-atp-mac-diagnostic-logging create mode 100644 windows/security/threat-protection/windows-defender-antivirus/microsoft-defender-atp-mac-diagnostic-logging.md diff --git a/windows/security/threat-protection/windows-defender-antivirus/microsoft-defender-atp-mac-diagnostic-logging b/windows/security/threat-protection/windows-defender-antivirus/microsoft-defender-atp-mac-diagnostic-logging new file mode 100644 index 0000000000..d2ccd7fac2 --- /dev/null +++ b/windows/security/threat-protection/windows-defender-antivirus/microsoft-defender-atp-mac-diagnostic-logging @@ -0,0 +1,64 @@ +--- +title: Collecting diagnostic information from Microsoft Defender ATP for Mac +description: Describes how to collect diagnostic information from Microsoft Defender ATP for Mac. +keywords: microsoft, defender, atp, mac, installation, deploy, intune, jamf, macos, mojave, high sierra, sierra +search.product: eADQiWindows 10XVcnh +search.appverid: #met150 +ms.prod: #w10 +ms.mktglfcycl: #deploy +ms.sitesec: library +ms.pagetype: security +ms.author: v-maave +author: martyav +ms.localizationpriority: #medium +manager: dansimp +audience: ITPro +ms.collection: M365-security-compliance +ms.topic: conceptual +--- + +# Collecting diagnostic information + +**Applies to:** + +[Windows Defender Advanced Threat Protection (Windows Defender ATP) for Mac](https://go.microsoft.com/fwlink/p/?linkid=???To-Add???) + +>[!IMPORTANT] +>Some information relates to prereleased product which may be substantially modified before it's commercially released. Microsoft makes no warranties, express or implied, with respect to the information provided here. + +If you can reproduce a problem, please increase the logging level, run the system for some time, and restore the logging level to the default. + +1) Increase logging level: + +```bash + mavel-mojave:~ testuser$ mdatp log-level --verbose + Creating connection to daemon + Connection established + Operation succeeded +``` + +2) Reproduce the problem + +3) Run `mdatp --diagnostic` to backup Defender ATP's logs. The command will print out location with generated zip file. + + ```bash + mavel-mojave:~ testuser$ mdatp --diagnostic + Creating connection to daemon + Connection established + "/Library/Application Support/Microsoft/Defender/wdavdiag/d85e7032-adf8-434a-95aa-ad1d450b9a2f.zip" + ``` + +4) Restore logging level: + + ```bash + mavel-mojave:~ testuser$ mdatp log-level --info + Creating connection to daemon + Connection established + Operation succeeded + ``` + +## Installation issues + +If an error occurs during installation, the installer will only report a general failure. + +The detailed log will be saved to /Library/Logs/Microsoft/wdav.install.log. If you experience issues during installation, send us this file so we can help diagnose the cause. \ No newline at end of file diff --git a/windows/security/threat-protection/windows-defender-antivirus/microsoft-defender-atp-mac-diagnostic-logging.md b/windows/security/threat-protection/windows-defender-antivirus/microsoft-defender-atp-mac-diagnostic-logging.md new file mode 100644 index 0000000000..e69de29bb2 From e66b83c15d43c5529561cd9942e01ea69b3e4649 Mon Sep 17 00:00:00 2001 From: martyav Date: Fri, 3 May 2019 15:52:37 -0400 Subject: [PATCH 318/724] removed logging section from mdatp for mac --- .../microsoft-defender-atp-mac.md | 39 +------------------ 1 file changed, 1 insertion(+), 38 deletions(-) diff --git a/windows/security/threat-protection/windows-defender-antivirus/microsoft-defender-atp-mac.md b/windows/security/threat-protection/windows-defender-antivirus/microsoft-defender-atp-mac.md index e05ea856f0..08918bc9be 100644 --- a/windows/security/threat-protection/windows-defender-antivirus/microsoft-defender-atp-mac.md +++ b/windows/security/threat-protection/windows-defender-antivirus/microsoft-defender-atp-mac.md @@ -557,41 +557,4 @@ Or, from a command line: - Not fully optimized for performance or disk space yet. - Full Windows Defender ATP integration is not available yet. - Mac devices that switch networks may appear multiple times in the APT portal. -- Centrally managed uninstall via Intune is still in development. As an alternative, manually uninstall Microsoft Defender ATP for Mac from each client device. - -## Collecting diagnostic information - -If you can reproduce a problem, please increase the logging level, run the system for some time, and restore the logging level to the default. - -1) Increase logging level: - -```bash - mavel-mojave:~ testuser$ mdatp log-level --verbose - Creating connection to daemon - Connection established - Operation succeeded -``` - -2) Reproduce the problem - -3) Run `mdatp --diagnostic` to backup Defender ATP's logs. The command will print out location with generated zip file. - - ```bash - mavel-mojave:~ testuser$ mdatp --diagnostic - Creating connection to daemon - Connection established - "/Library/Application Support/Microsoft/Defender/wdavdiag/d85e7032-adf8-434a-95aa-ad1d450b9a2f.zip" - ``` - -4) Restore logging level: - - ```bash - mavel-mojave:~ testuser$ mdatp log-level --info - Creating connection to daemon - Connection established - Operation succeeded - ``` - -### Installation issues - -If an error occurs during installation, the installer will only report a general failure. The detailed log is saved to /Library/Logs/Microsoft/wdav.install.log. If you experience issues during installation, send us this file so we can help diagnose the cause. +- Centrally managed uninstall via Intune is still in development. As an alternative, manually uninstall Microsoft Defender ATP for Mac from each client device. \ No newline at end of file From f98baf2b4b9fd113299ad33c7a0aa3cb1e44ace0 Mon Sep 17 00:00:00 2001 From: martyav Date: Fri, 3 May 2019 16:00:01 -0400 Subject: [PATCH 319/724] added text to mdatp for mac diagnostic logging --- ...rosoft-defender-atp-mac-diagnostic-logging | 64 ------------------- ...oft-defender-atp-mac-diagnostic-logging.md | 64 +++++++++++++++++++ 2 files changed, 64 insertions(+), 64 deletions(-) delete mode 100644 windows/security/threat-protection/windows-defender-antivirus/microsoft-defender-atp-mac-diagnostic-logging diff --git a/windows/security/threat-protection/windows-defender-antivirus/microsoft-defender-atp-mac-diagnostic-logging b/windows/security/threat-protection/windows-defender-antivirus/microsoft-defender-atp-mac-diagnostic-logging deleted file mode 100644 index d2ccd7fac2..0000000000 --- a/windows/security/threat-protection/windows-defender-antivirus/microsoft-defender-atp-mac-diagnostic-logging +++ /dev/null @@ -1,64 +0,0 @@ ---- -title: Collecting diagnostic information from Microsoft Defender ATP for Mac -description: Describes how to collect diagnostic information from Microsoft Defender ATP for Mac. -keywords: microsoft, defender, atp, mac, installation, deploy, intune, jamf, macos, mojave, high sierra, sierra -search.product: eADQiWindows 10XVcnh -search.appverid: #met150 -ms.prod: #w10 -ms.mktglfcycl: #deploy -ms.sitesec: library -ms.pagetype: security -ms.author: v-maave -author: martyav -ms.localizationpriority: #medium -manager: dansimp -audience: ITPro -ms.collection: M365-security-compliance -ms.topic: conceptual ---- - -# Collecting diagnostic information - -**Applies to:** - -[Windows Defender Advanced Threat Protection (Windows Defender ATP) for Mac](https://go.microsoft.com/fwlink/p/?linkid=???To-Add???) - ->[!IMPORTANT] ->Some information relates to prereleased product which may be substantially modified before it's commercially released. Microsoft makes no warranties, express or implied, with respect to the information provided here. - -If you can reproduce a problem, please increase the logging level, run the system for some time, and restore the logging level to the default. - -1) Increase logging level: - -```bash - mavel-mojave:~ testuser$ mdatp log-level --verbose - Creating connection to daemon - Connection established - Operation succeeded -``` - -2) Reproduce the problem - -3) Run `mdatp --diagnostic` to backup Defender ATP's logs. The command will print out location with generated zip file. - - ```bash - mavel-mojave:~ testuser$ mdatp --diagnostic - Creating connection to daemon - Connection established - "/Library/Application Support/Microsoft/Defender/wdavdiag/d85e7032-adf8-434a-95aa-ad1d450b9a2f.zip" - ``` - -4) Restore logging level: - - ```bash - mavel-mojave:~ testuser$ mdatp log-level --info - Creating connection to daemon - Connection established - Operation succeeded - ``` - -## Installation issues - -If an error occurs during installation, the installer will only report a general failure. - -The detailed log will be saved to /Library/Logs/Microsoft/wdav.install.log. If you experience issues during installation, send us this file so we can help diagnose the cause. \ No newline at end of file diff --git a/windows/security/threat-protection/windows-defender-antivirus/microsoft-defender-atp-mac-diagnostic-logging.md b/windows/security/threat-protection/windows-defender-antivirus/microsoft-defender-atp-mac-diagnostic-logging.md index e69de29bb2..d2ccd7fac2 100644 --- a/windows/security/threat-protection/windows-defender-antivirus/microsoft-defender-atp-mac-diagnostic-logging.md +++ b/windows/security/threat-protection/windows-defender-antivirus/microsoft-defender-atp-mac-diagnostic-logging.md @@ -0,0 +1,64 @@ +--- +title: Collecting diagnostic information from Microsoft Defender ATP for Mac +description: Describes how to collect diagnostic information from Microsoft Defender ATP for Mac. +keywords: microsoft, defender, atp, mac, installation, deploy, intune, jamf, macos, mojave, high sierra, sierra +search.product: eADQiWindows 10XVcnh +search.appverid: #met150 +ms.prod: #w10 +ms.mktglfcycl: #deploy +ms.sitesec: library +ms.pagetype: security +ms.author: v-maave +author: martyav +ms.localizationpriority: #medium +manager: dansimp +audience: ITPro +ms.collection: M365-security-compliance +ms.topic: conceptual +--- + +# Collecting diagnostic information + +**Applies to:** + +[Windows Defender Advanced Threat Protection (Windows Defender ATP) for Mac](https://go.microsoft.com/fwlink/p/?linkid=???To-Add???) + +>[!IMPORTANT] +>Some information relates to prereleased product which may be substantially modified before it's commercially released. Microsoft makes no warranties, express or implied, with respect to the information provided here. + +If you can reproduce a problem, please increase the logging level, run the system for some time, and restore the logging level to the default. + +1) Increase logging level: + +```bash + mavel-mojave:~ testuser$ mdatp log-level --verbose + Creating connection to daemon + Connection established + Operation succeeded +``` + +2) Reproduce the problem + +3) Run `mdatp --diagnostic` to backup Defender ATP's logs. The command will print out location with generated zip file. + + ```bash + mavel-mojave:~ testuser$ mdatp --diagnostic + Creating connection to daemon + Connection established + "/Library/Application Support/Microsoft/Defender/wdavdiag/d85e7032-adf8-434a-95aa-ad1d450b9a2f.zip" + ``` + +4) Restore logging level: + + ```bash + mavel-mojave:~ testuser$ mdatp log-level --info + Creating connection to daemon + Connection established + Operation succeeded + ``` + +## Installation issues + +If an error occurs during installation, the installer will only report a general failure. + +The detailed log will be saved to /Library/Logs/Microsoft/wdav.install.log. If you experience issues during installation, send us this file so we can help diagnose the cause. \ No newline at end of file From 6a3fd9878885f1dc686aba622fa1c065ff870d05 Mon Sep 17 00:00:00 2001 From: martyav Date: Fri, 3 May 2019 16:26:32 -0400 Subject: [PATCH 320/724] created uninstallation for mdatp-mac page --- ...microsoft-defender-atp-mac-uninstalling.md | 66 +++++++++++++++++++ .../microsoft-defender-atp-mac.md | 43 ------------ 2 files changed, 66 insertions(+), 43 deletions(-) create mode 100644 windows/security/threat-protection/windows-defender-antivirus/microsoft-defender-atp-mac-uninstalling.md diff --git a/windows/security/threat-protection/windows-defender-antivirus/microsoft-defender-atp-mac-uninstalling.md b/windows/security/threat-protection/windows-defender-antivirus/microsoft-defender-atp-mac-uninstalling.md new file mode 100644 index 0000000000..5004b31c5b --- /dev/null +++ b/windows/security/threat-protection/windows-defender-antivirus/microsoft-defender-atp-mac-uninstalling.md @@ -0,0 +1,66 @@ +--- +title: Uninstalling Microsoft Defender ATP for Mac +description: Describes how to uninstall Microsoft Defender ATP for Mac. +keywords: microsoft, defender, atp, mac, installation, deploy, intune, jamf, macos, mojave, high sierra, sierra +search.product: eADQiWindows 10XVcnh +search.appverid: #met150 +ms.prod: #w10 +ms.mktglfcycl: #deploy +ms.sitesec: library +ms.pagetype: security +ms.author: v-maave +author: martyav +ms.localizationpriority: #medium +manager: dansimp +audience: ITPro +ms.collection: M365-security-compliance +ms.topic: conceptual +--- + +# Uninstalling + +**Applies to:** + +[Windows Defender Advanced Threat Protection (Windows Defender ATP) for Mac](https://go.microsoft.com/fwlink/p/?linkid=???To-Add???) + +>[!IMPORTANT] +>Some information relates to prereleased product which may be substantially modified before it's commercially released. Microsoft makes no warranties, express or implied, with respect to the information provided here. + +There are several ways to uninstall Microsoft Defender ATP for Mac. Please note that while centrally managed uninstall is available for JAMF, it is not yet available for Intune. See [Windows Defender Advanced Threat Protection (Windows Defender ATP) for Mac](https://go.microsoft.com/fwlink/p/?linkid=???To-Add???) for updates on development. + +## Within the GUI + +- Open **Finder > Applications**. Right click on **Microsoft Defender ATP > Move to Trash**. + +## From the command line: + +- ```sudo rm -rf '/Applications/Microsoft Defender ATP'``` + +## With a script + +Create a script in **Settings > Computer Management > Scripts**. + +![Microsoft Defender uninstall screenshot](images/MDATP_26_Uninstall.png) + +For example, this script removes Microsoft Defender ATP from the /Applications directory: + +```bash +echo "Is WDAV installed?" +ls -ld '/Applications/Microsoft Defender ATP.app' 2>/dev/null + +echo "Uninstalling WDAV..." +rm -rf '/Applications/Microsoft Defender ATP.app' + +echo "Is WDAV still installed?" +ls -ld '/Applications/Microsoft Defender ATP.app' 2>/dev/null + +echo "Done!" +``` + +## With a JAMF policy + +If you are running JAMF, your policy should contain a single script: + +![Microsoft Defender uninstall script screenshot](images/MDATP_27_UninstallScript.png) + +Configure the appropriate scope in the **Scope** tab to specify the machines that will receive this policy. \ No newline at end of file diff --git a/windows/security/threat-protection/windows-defender-antivirus/microsoft-defender-atp-mac.md b/windows/security/threat-protection/windows-defender-antivirus/microsoft-defender-atp-mac.md index 08918bc9be..42b5eb2508 100644 --- a/windows/security/threat-protection/windows-defender-antivirus/microsoft-defender-atp-mac.md +++ b/windows/security/threat-protection/windows-defender-antivirus/microsoft-defender-atp-mac.md @@ -375,37 +375,6 @@ orgid effective : 79109c9d-83bb-4f3e-9152-8d75ee59ae22 - **orgid effective**: This is the Microsoft Defender ATP org id currently in use. If it does not match the value in the Configuration Profile, then the configuration has not been refreshed. -### Uninstalling Microsoft Defender ATP for Mac - -#### Uninstalling with a script - -Create a script in **Settings > Computer Management > Scripts**. - -![Microsoft Defender uninstall screenshot](images/MDATP_26_Uninstall.png) - -For example, this script removes Microsoft Defender ATP from the /Applications directory: - -```bash -echo "Is WDAV installed?" -ls -ld '/Applications/Microsoft Defender ATP.app' 2>/dev/null - -echo "Uninstalling WDAV..." -rm -rf '/Applications/Microsoft Defender ATP.app' - -echo "Is WDAV still installed?" -ls -ld '/Applications/Microsoft Defender ATP.app' 2>/dev/null - -echo "Done!" -``` - -#### Uninstalling with a policy - -Your policy should contain a single script: - -![Microsoft Defender uninstall script screenshot](images/MDATP_27_UninstallScript.png) - -Configure the appropriate scope in the **Scope** tab to specify the machines that will receive this policy. - ### Check onboarding status You can check that machines are correctly onboarded by creating a script. For example, the following script checks that enrolled machines are onboarded: @@ -540,18 +509,6 @@ Controlling product settings, triggering on-demand scans, and several other impo - Processor architecture - Whether the device is a virtual machine -## Uninstallation - -### Removing Microsoft Defender ATP from Mac devices - -To remove Microsoft Defender ATP from your macOS devices: - -- Open **Finder > Applications**. Right click on **Microsoft Defender ATP > Move to Trash**. - -Or, from a command line: - -- ```sudo rm -rf '/Applications/Microsoft Defender ATP'``` - ## Known issues - Not fully optimized for performance or disk space yet. From 875aeade4e6f57d886733a9edb192206720ede3d Mon Sep 17 00:00:00 2001 From: martyav Date: Fri, 3 May 2019 16:40:02 -0400 Subject: [PATCH 321/724] rm'd 2 previous pages split from mdatp-mac & collated them into resources page alongside known issues --- ...oft-defender-atp-mac-diagnostic-logging.md | 64 ---------- .../microsoft-defender-atp-mac-resources.md | 112 ++++++++++++++++++ ...microsoft-defender-atp-mac-uninstalling.md | 66 ----------- .../microsoft-defender-atp-mac.md | 9 +- 4 files changed, 113 insertions(+), 138 deletions(-) delete mode 100644 windows/security/threat-protection/windows-defender-antivirus/microsoft-defender-atp-mac-diagnostic-logging.md create mode 100644 windows/security/threat-protection/windows-defender-antivirus/microsoft-defender-atp-mac-resources.md delete mode 100644 windows/security/threat-protection/windows-defender-antivirus/microsoft-defender-atp-mac-uninstalling.md diff --git a/windows/security/threat-protection/windows-defender-antivirus/microsoft-defender-atp-mac-diagnostic-logging.md b/windows/security/threat-protection/windows-defender-antivirus/microsoft-defender-atp-mac-diagnostic-logging.md deleted file mode 100644 index d2ccd7fac2..0000000000 --- a/windows/security/threat-protection/windows-defender-antivirus/microsoft-defender-atp-mac-diagnostic-logging.md +++ /dev/null @@ -1,64 +0,0 @@ ---- -title: Collecting diagnostic information from Microsoft Defender ATP for Mac -description: Describes how to collect diagnostic information from Microsoft Defender ATP for Mac. -keywords: microsoft, defender, atp, mac, installation, deploy, intune, jamf, macos, mojave, high sierra, sierra -search.product: eADQiWindows 10XVcnh -search.appverid: #met150 -ms.prod: #w10 -ms.mktglfcycl: #deploy -ms.sitesec: library -ms.pagetype: security -ms.author: v-maave -author: martyav -ms.localizationpriority: #medium -manager: dansimp -audience: ITPro -ms.collection: M365-security-compliance -ms.topic: conceptual ---- - -# Collecting diagnostic information - -**Applies to:** - -[Windows Defender Advanced Threat Protection (Windows Defender ATP) for Mac](https://go.microsoft.com/fwlink/p/?linkid=???To-Add???) - ->[!IMPORTANT] ->Some information relates to prereleased product which may be substantially modified before it's commercially released. Microsoft makes no warranties, express or implied, with respect to the information provided here. - -If you can reproduce a problem, please increase the logging level, run the system for some time, and restore the logging level to the default. - -1) Increase logging level: - -```bash - mavel-mojave:~ testuser$ mdatp log-level --verbose - Creating connection to daemon - Connection established - Operation succeeded -``` - -2) Reproduce the problem - -3) Run `mdatp --diagnostic` to backup Defender ATP's logs. The command will print out location with generated zip file. - - ```bash - mavel-mojave:~ testuser$ mdatp --diagnostic - Creating connection to daemon - Connection established - "/Library/Application Support/Microsoft/Defender/wdavdiag/d85e7032-adf8-434a-95aa-ad1d450b9a2f.zip" - ``` - -4) Restore logging level: - - ```bash - mavel-mojave:~ testuser$ mdatp log-level --info - Creating connection to daemon - Connection established - Operation succeeded - ``` - -## Installation issues - -If an error occurs during installation, the installer will only report a general failure. - -The detailed log will be saved to /Library/Logs/Microsoft/wdav.install.log. If you experience issues during installation, send us this file so we can help diagnose the cause. \ No newline at end of file diff --git a/windows/security/threat-protection/windows-defender-antivirus/microsoft-defender-atp-mac-resources.md b/windows/security/threat-protection/windows-defender-antivirus/microsoft-defender-atp-mac-resources.md new file mode 100644 index 0000000000..7f2b515f99 --- /dev/null +++ b/windows/security/threat-protection/windows-defender-antivirus/microsoft-defender-atp-mac-resources.md @@ -0,0 +1,112 @@ +--- +title: Microsoft Defender ATP for Mac Resources +description: Describes resources for Microsoft Defender ATP for Mac, including how to uninstall it, how to collect diagnostic logs, and known issues with the product. +keywords: microsoft, defender, atp, mac, installation, deploy, uninstallation, intune, jamf, macos, mojave, high sierra, sierra +search.product: eADQiWindows 10XVcnh +search.appverid: #met150 +ms.prod: w10 +ms.mktglfcycl: deploy +ms.sitesec: library +ms.pagetype: security +ms.author: v-maave +author: martyav +ms.localizationpriority: #medium +manager: dansimp +audience: ITPro +ms.collection: M365-security-compliance +ms.topic: #conceptual +--- + +## Collecting diagnostic information + +**Applies to:** + +[Windows Defender Advanced Threat Protection (Windows Defender ATP) for Mac](https://go.microsoft.com/fwlink/p/?linkid=???To-Add???) + +>[!IMPORTANT] +>Some information relates to prereleased product which may be substantially modified before it's commercially released. Microsoft makes no warranties, express or implied, with respect to the information provided here. + +If you can reproduce a problem, please increase the logging level, run the system for some time, and restore the logging level to the default. + +1) Increase logging level: + +```bash + mavel-mojave:~ testuser$ mdatp log-level --verbose + Creating connection to daemon + Connection established + Operation succeeded +``` + +2) Reproduce the problem + +3) Run `mdatp --diagnostic` to backup Defender ATP's logs. The command will print out location with generated zip file. + + ```bash + mavel-mojave:~ testuser$ mdatp --diagnostic + Creating connection to daemon + Connection established + "/Library/Application Support/Microsoft/Defender/wdavdiag/d85e7032-adf8-434a-95aa-ad1d450b9a2f.zip" + ``` + +4) Restore logging level: + + ```bash + mavel-mojave:~ testuser$ mdatp log-level --info + Creating connection to daemon + Connection established + Operation succeeded + ``` + +### Installation issues + +If an error occurs during installation, the installer will only report a general failure. + +The detailed log will be saved to /Library/Logs/Microsoft/wdav.install.log. If you experience issues during installation, send us this file so we can help diagnose the cause. + +## Uninstalling + +There are several ways to uninstall Microsoft Defender ATP for Mac. Please note that while centrally managed uninstall is available for JAMF, it is not yet available for Intune. + +### Within the GUI + +- Open **Finder > Applications**. Right click on **Microsoft Defender ATP > Move to Trash**. + +### From the command line: + +- ```sudo rm -rf '/Applications/Microsoft Defender ATP'``` + +### With a script + +Create a script in **Settings > Computer Management > Scripts**. + +![Microsoft Defender uninstall screenshot](images/MDATP_26_Uninstall.png) + +For example, this script removes Microsoft Defender ATP from the /Applications directory: + +```bash + echo "Is WDAV installed?" + ls -ld '/Applications/Microsoft Defender ATP.app' 2>/dev/null + + echo "Uninstalling WDAV..." + rm -rf '/Applications/Microsoft Defender ATP.app' + + echo "Is WDAV still installed?" + ls -ld '/Applications/Microsoft Defender ATP.app' 2>/dev/null + + echo "Done!" +``` + +### With a JAMF policy + +If you are running JAMF, your policy should contain a single script: + +![Microsoft Defender uninstall script screenshot](images/MDATP_27_UninstallScript.png) + +Configure the appropriate scope in the **Scope** tab to specify the machines that will receive this policy. + +## Known issues + +- Not fully optimized for performance or disk space yet. +- Full Windows Defender ATP integration is not available yet. +- Mac devices that switch networks may appear multiple times in the APT portal. +- Centrally managed uninstall via Intune is still in development. As an alternative, manually uninstall Microsoft Defender ATP for Mac from each client device. \ No newline at end of file diff --git a/windows/security/threat-protection/windows-defender-antivirus/microsoft-defender-atp-mac-uninstalling.md b/windows/security/threat-protection/windows-defender-antivirus/microsoft-defender-atp-mac-uninstalling.md deleted file mode 100644 index 5004b31c5b..0000000000 --- a/windows/security/threat-protection/windows-defender-antivirus/microsoft-defender-atp-mac-uninstalling.md +++ /dev/null @@ -1,66 +0,0 @@ ---- -title: Uninstalling Microsoft Defender ATP for Mac -description: Describes how to uninstall Microsoft Defender ATP for Mac. -keywords: microsoft, defender, atp, mac, installation, deploy, intune, jamf, macos, mojave, high sierra, sierra -search.product: eADQiWindows 10XVcnh -search.appverid: #met150 -ms.prod: #w10 -ms.mktglfcycl: #deploy -ms.sitesec: library -ms.pagetype: security -ms.author: v-maave -author: martyav -ms.localizationpriority: #medium -manager: dansimp -audience: ITPro -ms.collection: M365-security-compliance -ms.topic: conceptual ---- - -# Uninstalling - -**Applies to:** - -[Windows Defender Advanced Threat Protection (Windows Defender ATP) for Mac](https://go.microsoft.com/fwlink/p/?linkid=???To-Add???) - ->[!IMPORTANT] ->Some information relates to prereleased product which may be substantially modified before it's commercially released. Microsoft makes no warranties, express or implied, with respect to the information provided here. - -There are several ways to uninstall Microsoft Defender ATP for Mac. Please note that while centrally managed uninstall is available for JAMF, it is not yet available for Intune. See [Windows Defender Advanced Threat Protection (Windows Defender ATP) for Mac](https://go.microsoft.com/fwlink/p/?linkid=???To-Add???) for updates on development. - -## Within the GUI - -- Open **Finder > Applications**. Right click on **Microsoft Defender ATP > Move to Trash**. - -## From the command line: - -- ```sudo rm -rf '/Applications/Microsoft Defender ATP'``` - -## With a script - -Create a script in **Settings > Computer Management > Scripts**. - -![Microsoft Defender uninstall screenshot](images/MDATP_26_Uninstall.png) - -For example, this script removes Microsoft Defender ATP from the /Applications directory: - -```bash -echo "Is WDAV installed?" -ls -ld '/Applications/Microsoft Defender ATP.app' 2>/dev/null - -echo "Uninstalling WDAV..." -rm -rf '/Applications/Microsoft Defender ATP.app' - -echo "Is WDAV still installed?" -ls -ld '/Applications/Microsoft Defender ATP.app' 2>/dev/null - -echo "Done!" -``` - -## With a JAMF policy - -If you are running JAMF, your policy should contain a single script: - -![Microsoft Defender uninstall script screenshot](images/MDATP_27_UninstallScript.png) - -Configure the appropriate scope in the **Scope** tab to specify the machines that will receive this policy. \ No newline at end of file diff --git a/windows/security/threat-protection/windows-defender-antivirus/microsoft-defender-atp-mac.md b/windows/security/threat-protection/windows-defender-antivirus/microsoft-defender-atp-mac.md index 42b5eb2508..fe62a0b6a7 100644 --- a/windows/security/threat-protection/windows-defender-antivirus/microsoft-defender-atp-mac.md +++ b/windows/security/threat-protection/windows-defender-antivirus/microsoft-defender-atp-mac.md @@ -507,11 +507,4 @@ Controlling product settings, triggering on-demand scans, and several other impo - OS version - Computer model - Processor architecture - - Whether the device is a virtual machine - -## Known issues - -- Not fully optimized for performance or disk space yet. -- Full Windows Defender ATP integration is not available yet. -- Mac devices that switch networks may appear multiple times in the APT portal. -- Centrally managed uninstall via Intune is still in development. As an alternative, manually uninstall Microsoft Defender ATP for Mac from each client device. \ No newline at end of file + - Whether the device is a virtual machine \ No newline at end of file From 139958d30b4647f590ab94f33bafabf199634531 Mon Sep 17 00:00:00 2001 From: martyav Date: Fri, 3 May 2019 17:11:23 -0400 Subject: [PATCH 322/724] added seperate mdatp-mac installation pages --- ...osoft-defender-atp-mac-install-manually.md | 130 ++++++ ...ft-defender-atp-mac-install-with-intune.md | 158 +++++++ ...soft-defender-atp-mac-install-with-jamf.md | 195 ++++++++ .../microsoft-defender-atp-mac.md | 428 +----------------- 4 files changed, 495 insertions(+), 416 deletions(-) create mode 100644 windows/security/threat-protection/windows-defender-antivirus/microsoft-defender-atp-mac-install-manually.md create mode 100644 windows/security/threat-protection/windows-defender-antivirus/microsoft-defender-atp-mac-install-with-intune.md create mode 100644 windows/security/threat-protection/windows-defender-antivirus/microsoft-defender-atp-mac-install-with-jamf.md diff --git a/windows/security/threat-protection/windows-defender-antivirus/microsoft-defender-atp-mac-install-manually.md b/windows/security/threat-protection/windows-defender-antivirus/microsoft-defender-atp-mac-install-manually.md new file mode 100644 index 0000000000..4fbed04668 --- /dev/null +++ b/windows/security/threat-protection/windows-defender-antivirus/microsoft-defender-atp-mac-install-manually.md @@ -0,0 +1,130 @@ +--- +title: Installing Microsoft Defender ATP for Mac with JAMF +description: Describes how to install Microsoft Defender ATP for Mac, using JAMF. +keywords: microsoft, defender, atp, mac, installation, deploy, uninstallation, intune, jamf, macos, mojave, high sierra, sierra +search.product: eADQiWindows 10XVcnh +search.appverid: #met150 +ms.prod: w10 +ms.mktglfcycl: deploy +ms.sitesec: library +ms.pagetype: security +ms.author: v-maave +author: martyav +ms.localizationpriority: #medium +manager: dansimp +audience: ITPro +ms.collection: M365-security-compliance +ms.topic: #conceptual +--- + +# Manual deployment + +**Applies to:** + +[Windows Defender Advanced Threat Protection (Windows Defender ATP) for Mac](https://go.microsoft.com/fwlink/p/?linkid=???To-Add???) + +>[!IMPORTANT] +>Some information relates to prereleased product which may be substantially modified before it's commercially released. Microsoft makes no warranties, express or implied, with respect to the information provided here. + +## Download installation and onboarding packages + +Download the installation and onboarding packages from Windows Defender Security Center: + +1. In Windows Defender Security Center, go to **Settings > Machine Management > Onboarding**. +2. In Section 1 of the page, set operating system to **Linux, macOS, iOS or Android** and Deployment method to **Local script**. +3. In Section 2 of the page, select **Download installation package**. Save it as wdav.pkg to a local directory. +4. In Section 2 of the page, select **Download onboarding package**. Save it as WindowsDefenderATPOnboardingPackage.zip to the same directory. + + ![Windows Defender Security Center screenshot](images/MDATP_2_IntuneAppUtil.png) + +5. From a command prompt, verify that you have the two files. + Extract the contents of the .zip files: + + ```bash + mavel-macmini:Downloads test$ ls -l + total 721152 + -rw-r--r-- 1 test staff 6185 Mar 15 10:45 WindowsDefenderATPOnboardingPackage.zip + -rw-r--r-- 1 test staff 354531845 Mar 13 08:57 wdav.pkg + mavel-macmini:Downloads test$ unzip WindowsDefenderATPOnboardingPackage.zip + Archive: WindowsDefenderATPOnboardingPackage.zip + inflating: WindowsDefenderATPOnboarding.py + ``` + +## Application installation + +To complete this process, you must have admin privileges on the machine. + +1. Navigate to the downloaded wdav.pkg in Finder and open it. + + ![App install screenshot](images/MDATP_28_AppInstall.png) + +2. Select **Continue**, agree with the License terms, and enter the password when prompted. + + ![App install screenshot](images/MDATP_29_AppInstallLogin.png) + + > [!IMPORTANT] + > You will be prompted to allow a driver from Microsoft to be installed (either "System Exception Blocked" or "Installation is on hold" or both. The driver must be allowed to be installed. + + ![App install screenshot](images/MDATP_30_SystemExtension.png) + +3. Select **Open Security Preferences** or **Open System Preferences > Security & Privacy**. Select **Allow**: + + ![Security and privacy window screenshot](images/MDATP_31_SecurityPrivacySettings.png) + +The installation will proceed. + +> [!NOTE] +> If you don't select **Allow**, the installation will fail after 5 minutes. You can restart it again at any time. + +## Client configuration + +1. Copy wdav.pkg and WindowsDefenderATPOnboarding.py to the machine where you deploy Microsoft Defender ATP for Mac. + + The client machine is not associated with orgId. Note that the orgid is blank. + + ```bash + mavel-mojave:wdavconfig testuser$ sudo /Library/Extensions/wdavkext.kext/Contents/Resources/Tools/wdavconfig.py + uuid : 69EDB575-22E1-53E1-83B8-2E1AB1E410A6 + orgid : + ``` + +2. Install the configuration file on a client machine: + + ```bash + mavel-mojave:wdavconfig testuser$ python WindowsDefenderATPOnboarding.py + Generating /Library/Application Support/Microsoft/Defender/com.microsoft.wdav.atp.plist ... (You may be required to enter sudos password) + ``` + +3. Verify that the machine is now associated with orgId: + + ```bash + mavel-mojave:wdavconfig testuser$ sudo /Library/Extensions/wdavkext.kext/Contents/Resources/Tools/wdavconfig.py + uuid : 69EDB575-22E1-53E1-83B8-2E1AB1E410A6 + orgid : E6875323-A6C0-4C60-87AD-114BBE7439B8 + ``` + +After installation, you'll see the Microsoft Defender icon in the macOS status bar in the top-right corner. + + ![Microsoft Defender icon in status bar screenshot](images/MDATP_Icon_Bar.png) + +## Configuring from the command line + +Important tasks, such as controlling product settings and triggering on-demand scans, can be done from the command line: + +|Group |Scenario |Command | +|-------------|-------------------------------------------|-----------------------------------------------------------------------| +|Configuration|Turn on/off real-time protection |`mdatp config --rtp [true/false]` | +|Configuration|Turn on/off cloud protection |`mdatp config --cloud [true/false]` | +|Configuration|Turn on/off product diagnostics |`mdatp config --diagnostic [true/false]` | +|Configuration|Turn on/off automatic sample submission |`mdatp config --sample-submission [true/false]` | +|Configuration|Turn on PUA protection |`mdatp threat --type-handling --potentially_unwanted_application block`| +|Configuration|Turn off PUA protection |`mdatp threat --type-handling --potentially_unwanted_application off` | +|Configuration|Turn on audit mode for PUA protection |`mdatp threat --type-handling --potentially_unwanted_application audit`| +|Diagnostics |Change the log level |`mdatp log-level --[error/warning/info/verbose]` | +|Diagnostics |Generate diagnostic logs |`mdatp --diagnostic` | +|Health |Check the product's health |`mdatp --health` | +|Protection |Scan a path |`mdatp scan --path [path]` | +|Protection |Do a quick scan |`mdatp scan --quick` | +|Protection |Do a full scan |`mdatp scan --full` | +|Protection |Cancel an ongoing on-demand scan |`mdatp scan --cancel` | +|Protection |Request a definition update |`mdatp --signature-update` | \ No newline at end of file diff --git a/windows/security/threat-protection/windows-defender-antivirus/microsoft-defender-atp-mac-install-with-intune.md b/windows/security/threat-protection/windows-defender-antivirus/microsoft-defender-atp-mac-install-with-intune.md new file mode 100644 index 0000000000..5cd1e22a19 --- /dev/null +++ b/windows/security/threat-protection/windows-defender-antivirus/microsoft-defender-atp-mac-install-with-intune.md @@ -0,0 +1,158 @@ +--- +title: Installing Microsoft Defender ATP for Mac with Microsoft Intune +description: Describes how to install Microsoft Defender ATP for Mac, using Microsoft Intune. +keywords: microsoft, defender, atp, mac, installation, deploy, uninstallation, intune, jamf, macos, mojave, high sierra, sierra +search.product: eADQiWindows 10XVcnh +search.appverid: #met150 +ms.prod: w10 +ms.mktglfcycl: deploy +ms.sitesec: library +ms.pagetype: security +ms.author: v-maave +author: martyav +ms.localizationpriority: #medium +manager: dansimp +audience: ITPro +ms.collection: M365-security-compliance +ms.topic: #conceptual +--- + +# Microsoft Intune-based deployment + +**Applies to:** + +[Windows Defender Advanced Threat Protection (Windows Defender ATP) for Mac](https://go.microsoft.com/fwlink/p/?linkid=???To-Add???) + +>[!IMPORTANT] +>Some information relates to prereleased product which may be substantially modified before it's commercially released. Microsoft makes no warranties, express or implied, with respect to the information provided here. + +## Download installation and onboarding packages + +Download the installation and onboarding packages from Windows Defender Security Center: + +1. In Windows Defender Security Center, go to **Settings > Machine Management > Onboarding**. +2. In Section 1 of the page, set operating system to **Linux, macOS, iOS or Android** and Deployment method to **Mobile Device Management / Microsoft Intune**. +3. In Section 2 of the page, select **Download installation package**. Save it as wdav.pkg to a local directory. +4. In Section 2 of the page, select **Download onboarding package**. Save it as WindowsDefenderATPOnboardingPackage.zip to the same directory. +5. Download IntuneAppUtil from [https://docs.microsoft.com/en-us/intune/lob-apps-macos](https://docs.microsoft.com/en-us/intune/lob-apps-macos). + + ![Windows Defender Security Center screenshot](images/MDATP_2_IntuneAppUtil.png) + +6. From a command prompt, verify that you have the three files. + Extract the contents of the .zip files: + + ```bash + mavel-macmini:Downloads test$ ls -l + total 721688 + -rw-r--r-- 1 test staff 269280 Mar 15 11:25 IntuneAppUtil + -rw-r--r-- 1 test staff 11821 Mar 15 09:23 WindowsDefenderATPOnboardingPackage.zip + -rw-r--r-- 1 test staff 354531845 Mar 13 08:57 wdav.pkg + mavel-macmini:Downloads test$ unzip WindowsDefenderATPOnboardingPackage.zip + Archive: WindowsDefenderATPOnboardingPackage.zip + warning: WindowsDefenderATPOnboardingPackage.zip appears to use backslashes as path separators + inflating: intune/kext.xml + inflating: intune/WindowsDefenderATPOnboarding.xml + inflating: jamf/WindowsDefenderATPOnboarding.plist + mavel-macmini:Downloads test$ + ``` + +7. Make IntuneAppUtil an executable: + + ```mavel-macmini:Downloads test$ chmod +x IntuneAppUtil``` + +8. Create the wdav.pkg.intunemac package from wdav.pkg: + + ```bash + mavel-macmini:Downloads test$ ./IntuneAppUtil -c wdav.pkg -o . -i "com.microsoft.wdav" -n "1.0.0" + Microsoft Intune Application Utility for Mac OS X + Version: 1.0.0.0 + Copyright 2018 Microsoft Corporation + + Creating intunemac file for /Users/test/Downloads/wdav.pkg + Composing the intunemac file output + Output written to ./wdav.pkg.intunemac. + + IntuneAppUtil successfully processed "wdav.pkg", + to deploy refer to the product documentation. + ``` + +## Client Machine Setup + +You need no special provisioning for a Mac machine beyond a standard [Company Portal installation](https://docs.microsoft.com/en-us/intune-user-help/enroll-your-device-in-intune-macos-cp). + +1. You'll be asked to confirm device management. + +![Confirm device management screenshot](images/MDATP_3_ConfirmDeviceMgmt.png) + +Select Open System Preferences, locate Management Profile on the list and select the **Approve...** button. Your Management Profile would be displayed as **Verified**: + +![Management profile screenshot](images/MDATP_4_ManagementProfile.png) + +2. Select the **Continue** button and complete the enrollment. + +You can enroll additional machines. Optionally, you can do it later, after system configuration and application package are provisioned. + +3. In Intune, open the **Manage > Devices > All devices** blade. You'll see your machine: + +![Add Devices screenshot](images/MDATP_5_allDevices.png) + +## Create System Configuration profiles + +1. In Intune open the **Manage > Device configuration** blade. Select **Manage > Profiles > Create Profile**. +2. Choose a name for the profile. Change **Platform=macOS**, **Profile type=Custom**. Select **Configure**. +3. Open the configuration profile and upload intune/kext.xml. This file was created during the Generate settings step above. +4. Select **OK**. + + ![System configuration profiles screenshot](images/MDATP_6_SystemConfigurationProfiles.png) + +5. Select **Manage > Assignments**. In the **Include** tab, select **Assign to All Users & All devices**. +6. Repeat these steps with the second profile. +7. Create Profile one more time, give it a name, upload the intune/WindowsDefenderATPOnboarding.xml file. +8. Select **Manage > Assignments**. In the Include tab, select **Assign to All Users & All devices**. + +After Intune changes are propagated to the enrolled machines, you'll see it on the **Monitor > Device status** blade: + +![System configuration profiles screenshot](images/MDATP_7_DeviceStatusBlade.png) + +## Publish application + +1. In Intune, open the **Manage > Client apps** blade. Select **Apps > Add**. +2. Select **App type=Other/Line-of-business app**. +3. Select **file=wdav.pkg.intunemac**. Select **OK** to upload. +4. Select **Configure** and add the required information. +5. Use **macOS Sierra 10.12** as the minimum OS. Other settings can be any other value. + + ![Device status blade screenshot](images/MDATP_8_IntuneAppInfo.png) + +6. Select **OK** and **Add**. + + ![Device status blade screenshot](images/MDATP_9_IntunePkgInfo.png) + +7. It will take a while to upload the package. After it's done, select the name and then go to **Assignments** and **Add group**. + + ![Client apps screenshot](images/MDATP_10_ClientApps.png) + +8. Change **Assignment type=Required**. +9. Select **Included Groups**. Select **Make this app required for all devices=Yes**. Select **Select group to include** and add a group that contains the users you want to target. Select **OK** and **Save**. + + ![Intune assignments info screenshot](images/MDATP_11_Assignments.png) + +10. After some time the application will be published to all enrolled machines. You'll see it on the **Monitor > Device** install status blade: + + ![Intune device status screenshot](images/MDATP_12_DeviceInstall.png) + +## Verify client machine state + +1. After the configuration profiles are deployed to your machines, on your Mac device, open **System Preferences > Profiles**. + + ![System Preferences screenshot](images/MDATP_13_SystemPreferences.png) + ![System Preferences Profiles screenshot](images/MDATP_14_SystemPreferencesProfiles.png) + +2. Verify the three profiles listed there: + ![Profiles screenshot](images/MDATP_15_ManagementProfileConfig.png) + +3. The **Management Profile** should be the Intune system profile. +4. wdav-config and wdav-kext are system configuration profiles that we added in Intune. +5. You should also see the Microsoft Defender icon in the top-right corner: + + ![Microsoft Defender icon in status bar screenshot](images/MDATP_Icon_Bar.png) \ No newline at end of file diff --git a/windows/security/threat-protection/windows-defender-antivirus/microsoft-defender-atp-mac-install-with-jamf.md b/windows/security/threat-protection/windows-defender-antivirus/microsoft-defender-atp-mac-install-with-jamf.md new file mode 100644 index 0000000000..82aaf8ffe2 --- /dev/null +++ b/windows/security/threat-protection/windows-defender-antivirus/microsoft-defender-atp-mac-install-with-jamf.md @@ -0,0 +1,195 @@ +--- +title: Installing Microsoft Defender ATP for Mac with JAMF +description: Describes how to install Microsoft Defender ATP for Mac, using JAMF. +keywords: microsoft, defender, atp, mac, installation, deploy, uninstallation, intune, jamf, macos, mojave, high sierra, sierra +search.product: eADQiWindows 10XVcnh +search.appverid: #met150 +ms.prod: w10 +ms.mktglfcycl: deploy +ms.sitesec: library +ms.pagetype: security +ms.author: v-maave +author: martyav +ms.localizationpriority: #medium +manager: dansimp +audience: ITPro +ms.collection: M365-security-compliance +ms.topic: #conceptual +--- + +# JAMF-based deployment + +**Applies to:** + +[Windows Defender Advanced Threat Protection (Windows Defender ATP) for Mac](https://go.microsoft.com/fwlink/p/?linkid=???To-Add???) + +>[!IMPORTANT] +>Some information relates to prereleased product which may be substantially modified before it's commercially released. Microsoft makes no warranties, express or implied, with respect to the information provided here. + +## Prerequsites + +You need to be familiar with JAMF administration tasks, have a JAMF tenant, and know how to deploy packages. This includes a properly configured distribution point. JAMF has many alternative ways to complete the same task. These instructions provide you an example for most common processes. Your organization might use a different workflow. + +## Download installation and onboarding packages + +Download the installation and onboarding packages from Windows Defender Security Center: + +1. In Windows Defender Security Center, go to **Settings > Machine Management > Onboarding**. +2. In Section 1 of the page, set operating system to **Linux, macOS, iOS or Android** and Deployment method to **Mobile Device Management / Microsoft Intune**. +3. In Section 2 of the page, select **Download installation package**. Save it as wdav.pkg to a local directory. +4. In Section 2 of the page, select **Download onboarding package**. Save it as WindowsDefenderATPOnboardingPackage.zip to the same directory. + + ![Windows Defender Security Center screenshot](images/MDATP_2_IntuneAppUtil.png) + +5. From a command prompt, verify that you have the two files. + Extract the contents of the .zip files: + + ```bash + mavel-macmini:Downloads test$ ls -l + total 721160 + -rw-r--r-- 1 test staff 11821 Mar 15 09:23 WindowsDefenderATPOnboardingPackage.zip + -rw-r--r-- 1 test staff 354531845 Mar 13 08:57 wdav.pkg + mavel-macmini:Downloads test$ unzip WindowsDefenderATPOnboardingPackage.zip + Archive: WindowsDefenderATPOnboardingPackage.zip + warning: WindowsDefenderATPOnboardingPackage.zip appears to use backslashes as path separators + inflating: intune/kext.xml + inflating: intune/WindowsDefenderATPOnboarding.xml + inflating: jamf/WindowsDefenderATPOnboarding.plist + mavel-macmini:Downloads test$ + ``` + +## Create JAMF Policies + +You need to create a configuration profile and a policy to start deploying Microsoft Defender ATP for Mac to client machines. + +### Configuration Profile + +The configuration profile contains one custom settings payload that includes: + +- Microsoft Defender ATP for Mac onboarding information +- Approved Kernel Extensions payload to enable the Microsoft kernel driver to run + +1. Upload jamf/WindowsDefenderATPOnboarding.plist as the Property List File. + + >[!NOTE] + > You must use exactly "com.microsoft.wdav.atp" as the Preference Domain. + + ![Configuration profile screenshot](images/MDATP_16_PreferenceDomain.png) + +### Approved Kernel Extension + +To approve the kernel extension: + +1. In **Computers > Configuration Profiles** select **Options > Approved Kernel Extensions**. +2. Use **UBF8T346G9** for Team Id. + +![Approved kernel extensions screenshot](images/MDATP_17_approvedKernelExtensions.png) + +#### Configuration Profile's Scope + +Configure the appropriate scope to specify the machines that will receive this configuration profile. + +Open Computers -> Configuration Profiles, select **Scope > Targets**. Select the appropriate Target computers. + +![Configuration profile scope screenshot](images/MDATP_18_ConfigurationProfilesScope.png) + +Save the **Configuration Profile**. + +Use the **Logs** tab to monitor deployment status for each enrolled machine. + +### Package + +1. Create a package in **Settings > Computer Management > Packages**. + + ![Computer management packages screenshot](images/MDATP_19_MicrosoftDefenderWDAVPKG.png) + +2. Upload wdav.pkg to the Distribution Point. +3. In the **filename** field, enter the name of the package. For example, wdav.pkg. + +### Policy + +Your policy should contain a single package for Microsoft Defender. + +![Microsoft Defender packages screenshot](images/MDATP_20_MicrosoftDefenderPackages.png) + +Configure the appropriate scope to specify the computers that will receive this policy. + +After you save the Configuration Profile, you can use the Logs tab to monitor the deployment status for each enrolled machine. + +## Client machine setup + +You need no special provisioning for a macOS computer beyond the standard JAMF Enrollment. + +> [!NOTE] +> After a computer is enrolled, it will show up in the Computers inventory (All Computers). + +1. Open the machine details, from **General** tab, and make sure that **User Approved MDM** is set to **Yes**. If it's set to No, the user needs to open **System Preferences > Profiles** and select **Approve** on the MDM Profile. + +![MDM approve button screenshot](images/MDATP_21_MDMProfile1.png) +![MDM screenshot](images/MDATP_22_MDMProfileApproved.png) + +After some time, the machine's User Approved MDM status will change to Yes. + +![MDM status screenshot](images/MDATP_23_MDMStatus.png) + +You can enroll additional machines now. Optionally, can do it after system configuration and application packages are provisioned. + +## Deployment + +Enrolled client machines periodically poll the JAMF Server and install new configuration profiles and policies as soon as they are detected. + +### Status on server + +You can monitor the deployment status in the Logs tab: + +- **Pending** means that the deployment is scheduled but has not yet happened +- **Completed** means that the deployment succeeded and is no longer scheduled + +![Status on server screenshot](images/MDATP_24_StatusOnServer.png) + +### Status on client machine + +After the Configuration Profile is deployed, you'll see the profile on the machine in the **System Preferences > Profiles >** Name of Configuration Profile. + +![Status on client screenshot](images/MDATP_25_StatusOnClient.png) + +After the policy is applied, you'll see the Microsoft Defender icon in the macOS status bar in the top-right corner. + +![Microsoft Defender icon in status bar screenshot](images/MDATP_Icon_Bar.png) + +You can monitor policy installation on a machine by following the JAMF's log file: + +```bash +mavel-mojave:~ testuser$ tail -f /var/log/jamf.log +Thu Feb 21 11:11:41 mavel-mojave jamf[7960]: No patch policies were found. +Thu Feb 21 11:16:41 mavel-mojave jamf[8051]: Checking for policies triggered by "recurring check-in" for user "testuser"... +Thu Feb 21 11:16:43 mavel-mojave jamf[8051]: Executing Policy WDAV +Thu Feb 21 11:17:02 mavel-mojave jamf[8051]: Installing Microsoft Defender... +Thu Feb 21 11:17:23 mavel-mojave jamf[8051]: Successfully installed Microsoft Defender. +Thu Feb 21 11:17:23 mavel-mojave jamf[8051]: Checking for patches... +Thu Feb 21 11:17:23 mavel-mojave jamf[8051]: No patch policies were found. +``` + +You can also check the onboarding status: + +```bash +mavel-mojave:~ testuser$ sudo /Library/Extensions/wdavkext.kext/Contents/Resources/Tools/wdavconfig.py +uuid : 69EDB575-22E1-53E1-83B8-2E1AB1E410A6 +orgid : 79109c9d-83bb-4f3e-9152-8d75ee59ae22 +orgid managed : 79109c9d-83bb-4f3e-9152-8d75ee59ae22 +orgid effective : 79109c9d-83bb-4f3e-9152-8d75ee59ae22 +``` + +- **orgid/orgid managed**: This is the Microsoft Defender ATP org id specified in the configuration profile. If this value is blank, then the Configuration Profile was not properly set. + +- **orgid effective**: This is the Microsoft Defender ATP org id currently in use. If it does not match the value in the Configuration Profile, then the configuration has not been refreshed. + +## Check onboarding status + +You can check that machines are correctly onboarded by creating a script. For example, the following script checks that enrolled machines are onboarded: + +```bash +sudo /Library/Extensions/wdavkext.kext/Contents/Resources/Tools/wdavconfig.py | grep -E 'orgid effective : [-a-zA-Z0-9]+' +``` + +This script returns 0 if Microsoft Defender ATP is registered with the Windows Defender ATP service, and another exit code if it is not installed or registered. \ No newline at end of file diff --git a/windows/security/threat-protection/windows-defender-antivirus/microsoft-defender-atp-mac.md b/windows/security/threat-protection/windows-defender-antivirus/microsoft-defender-atp-mac.md index fe62a0b6a7..3eb0b476e4 100644 --- a/windows/security/threat-protection/windows-defender-antivirus/microsoft-defender-atp-mac.md +++ b/windows/security/threat-protection/windows-defender-antivirus/microsoft-defender-atp-mac.md @@ -37,7 +37,18 @@ We've been working hard through the private preview period, and we've heard your - Product health can be queried with JAMF or the command line. - Admins can set their cloud preference for any location, not just for those in the US. -## Prerequisites +## Installing and configuring + +There are various methods and deployment tools that you can use to install and configure Microsoft Defender ATP for Mac. +In general you'll need to take the following steps: + +- Ensure you have a Windows Defender ATP subscription and have access to the Windows Defender ATP Portal +- Deploy Microsoft Defender ATP for Mac using one of the following deployment methods: + - [Microsoft Intune-based deployment](separate-page-url) + - [JAMF-based deployment](seperate-page-url) + - [Manual deployment](seperate-page-url) + +### Prerequisites You should have beginner-level experience in macOS and BASH scripting. You must have administrative privileges on the machine. @@ -71,424 +82,9 @@ To test that a connection is not blocked, open `https://x.cp.wd.microsoft.com/ap We recommend to keep [System Integrity Protection](https://support.apple.com/en-us/HT204899) ([Wiki](https://en.wikipedia.org/wiki/System_Integrity_Protection)) enabled (default setting) on client machines. SIP is a built-in macOS security feature that prevents low-level tampering with the OS. -## Installation and configuration overview -There are various methods and deployment tools that you can use to install and configure Microsoft Defender ATP for Mac. -In general you'll need to take the following steps: -- Ensure you have a Windows Defender ATP subscription and have access to the Windows Defender ATP Portal -- Deploy Microsoft Defender ATP for Mac using one of the following deployment methods: - - [Microsoft Intune based deployment](#microsoft-intune-based-deployment) - - [JAMF based deployment](#jamf-based-deployment) - - [Manual deployment](#manual-deployment) -## Microsoft Intune based deployment - -### Download installation and onboarding packages - -Download the installation and onboarding packages from Windows Defender Security Center: - -1. In Windows Defender Security Center, go to **Settings > Machine Management > Onboarding**. -2. In Section 1 of the page, set operating system to **Linux, macOS, iOS or Android** and Deployment method to **Mobile Device Management / Microsoft Intune**. -3. In Section 2 of the page, select **Download installation package**. Save it as wdav.pkg to a local directory. -4. In Section 2 of the page, select **Download onboarding package**. Save it as WindowsDefenderATPOnboardingPackage.zip to the same directory. -5. Download IntuneAppUtil from [https://docs.microsoft.com/en-us/intune/lob-apps-macos](https://docs.microsoft.com/en-us/intune/lob-apps-macos). - - ![Windows Defender Security Center screenshot](images/MDATP_2_IntuneAppUtil.png) - -6. From a command prompt, verify that you have the three files. - Extract the contents of the .zip files: - - ```bash - mavel-macmini:Downloads test$ ls -l - total 721688 - -rw-r--r-- 1 test staff 269280 Mar 15 11:25 IntuneAppUtil - -rw-r--r-- 1 test staff 11821 Mar 15 09:23 WindowsDefenderATPOnboardingPackage.zip - -rw-r--r-- 1 test staff 354531845 Mar 13 08:57 wdav.pkg - mavel-macmini:Downloads test$ unzip WindowsDefenderATPOnboardingPackage.zip - Archive: WindowsDefenderATPOnboardingPackage.zip - warning: WindowsDefenderATPOnboardingPackage.zip appears to use backslashes as path separators - inflating: intune/kext.xml - inflating: intune/WindowsDefenderATPOnboarding.xml - inflating: jamf/WindowsDefenderATPOnboarding.plist - mavel-macmini:Downloads test$ - ``` - -7. Make IntuneAppUtil an executable: - - ```mavel-macmini:Downloads test$ chmod +x IntuneAppUtil``` - -8. Create the wdav.pkg.intunemac package from wdav.pkg: - - ```bash - mavel-macmini:Downloads test$ ./IntuneAppUtil -c wdav.pkg -o . -i "com.microsoft.wdav" -n "1.0.0" - Microsoft Intune Application Utility for Mac OS X - Version: 1.0.0.0 - Copyright 2018 Microsoft Corporation - - Creating intunemac file for /Users/test/Downloads/wdav.pkg - Composing the intunemac file output - Output written to ./wdav.pkg.intunemac. - - IntuneAppUtil successfully processed "wdav.pkg", - to deploy refer to the product documentation. - ``` - -### Client Machine Setup - -You need no special provisioning for a Mac machine beyond a standard [Company Portal installation](https://docs.microsoft.com/en-us/intune-user-help/enroll-your-device-in-intune-macos-cp). - -1. You'll be asked to confirm device management. - -![Confirm device management screenshot](images/MDATP_3_ConfirmDeviceMgmt.png) - -Select Open System Preferences, locate Management Profile on the list and select the **Approve...** button. Your Management Profile would be displayed as **Verified**: - -![Management profile screenshot](images/MDATP_4_ManagementProfile.png) - -2. Select the **Continue** button and complete the enrollment. - -You can enroll additional machines. Optionally, you can do it later, after system configuration and application package are provisioned. - -3. In Intune, open the **Manage > Devices > All devices** blade. You'll see your machine: - -![Add Devices screenshot](images/MDATP_5_allDevices.png) - -### Create System Configuration profiles - -1. In Intune open the **Manage > Device configuration** blade. Select **Manage > Profiles > Create Profile**. -2. Choose a name for the profile. Change **Platform=macOS**, **Profile type=Custom**. Select **Configure**. -3. Open the configuration profile and upload intune/kext.xml. This file was created during the Generate settings step above. -4. Select **OK**. - - ![System configuration profiles screenshot](images/MDATP_6_SystemConfigurationProfiles.png) - -5. Select **Manage > Assignments**. In the **Include** tab, select **Assign to All Users & All devices**. -6. Repeat these steps with the second profile. -7. Create Profile one more time, give it a name, upload the intune/WindowsDefenderATPOnboarding.xml file. -8. Select **Manage > Assignments**. In the Include tab, select **Assign to All Users & All devices**. - -After Intune changes are propagated to the enrolled machines, you'll see it on the **Monitor > Device status** blade: - -![System configuration profiles screenshot](images/MDATP_7_DeviceStatusBlade.png) - -### Publish application - -1. In Intune, open the **Manage > Client apps** blade. Select **Apps > Add**. -2. Select **App type=Other/Line-of-business app**. -3. Select **file=wdav.pkg.intunemac**. Select **OK** to upload. -4. Select **Configure** and add the required information. -5. Use **macOS Sierra 10.12** as the minimum OS. Other settings can be any other value. - - ![Device status blade screenshot](images/MDATP_8_IntuneAppInfo.png) - -6. Select **OK** and **Add**. - - ![Device status blade screenshot](images/MDATP_9_IntunePkgInfo.png) - -7. It will take a while to upload the package. After it's done, select the name and then go to **Assignments** and **Add group**. - - ![Client apps screenshot](images/MDATP_10_ClientApps.png) - -8. Change **Assignment type=Required**. -9. Select **Included Groups**. Select **Make this app required for all devices=Yes**. Select **Select group to include** and add a group that contains the users you want to target. Select **OK** and **Save**. - - ![Intune assignments info screenshot](images/MDATP_11_Assignments.png) - -10. After some time the application will be published to all enrolled machines. You'll see it on the **Monitor > Device** install status blade: - - ![Intune device status screenshot](images/MDATP_12_DeviceInstall.png) - -### Verify client machine state - -1. After the configuration profiles are deployed to your machines, on your Mac device, open **System Preferences > Profiles**. - - ![System Preferences screenshot](images/MDATP_13_SystemPreferences.png) - ![System Preferences Profiles screenshot](images/MDATP_14_SystemPreferencesProfiles.png) - -2. Verify the three profiles listed there: - ![Profiles screenshot](images/MDATP_15_ManagementProfileConfig.png) - -3. The **Management Profile** should be the Intune system profile. -4. wdav-config and wdav-kext are system configuration profiles that we added in Intune. -5. You should also see the Microsoft Defender icon in the top-right corner: - - ![Microsoft Defender icon in status bar screenshot](images/MDATP_Icon_Bar.png) - -## JAMF based deployment - -### Prerequsites - -You need to be familiar with JAMF administration tasks, have a JAMF tenant, and know how to deploy packages. This includes a properly configured distribution point. JAMF has many alternative ways to complete the same task. These instructions provide you an example for most common processes. Your organization might use a different workflow. - -### Download installation and onboarding packages - -Download the installation and onboarding packages from Windows Defender Security Center: - -1. In Windows Defender Security Center, go to **Settings > Machine Management > Onboarding**. -2. In Section 1 of the page, set operating system to **Linux, macOS, iOS or Android** and Deployment method to **Mobile Device Management / Microsoft Intune**. -3. In Section 2 of the page, select **Download installation package**. Save it as wdav.pkg to a local directory. -4. In Section 2 of the page, select **Download onboarding package**. Save it as WindowsDefenderATPOnboardingPackage.zip to the same directory. - - ![Windows Defender Security Center screenshot](images/MDATP_2_IntuneAppUtil.png) - -5. From a command prompt, verify that you have the two files. - Extract the contents of the .zip files: - - ```bash - mavel-macmini:Downloads test$ ls -l - total 721160 - -rw-r--r-- 1 test staff 11821 Mar 15 09:23 WindowsDefenderATPOnboardingPackage.zip - -rw-r--r-- 1 test staff 354531845 Mar 13 08:57 wdav.pkg - mavel-macmini:Downloads test$ unzip WindowsDefenderATPOnboardingPackage.zip - Archive: WindowsDefenderATPOnboardingPackage.zip - warning: WindowsDefenderATPOnboardingPackage.zip appears to use backslashes as path separators - inflating: intune/kext.xml - inflating: intune/WindowsDefenderATPOnboarding.xml - inflating: jamf/WindowsDefenderATPOnboarding.plist - mavel-macmini:Downloads test$ - ``` - -### Create JAMF Policies - -You need to create a configuration profile and a policy to start deploying Microsoft Defender ATP for Mac to client machines. - -#### Configuration Profile - -The configuration profile contains one custom settings payload that includes: - -- Microsoft Defender ATP for Mac onboarding information -- Approved Kernel Extensions payload to enable the Microsoft kernel driver to run - -1. Upload jamf/WindowsDefenderATPOnboarding.plist as the Property List File. - - >[!NOTE] - > You must use exactly "com.microsoft.wdav.atp" as the Preference Domain. - - ![Configuration profile screenshot](images/MDATP_16_PreferenceDomain.png) - -#### Approved Kernel Extension - -To approve the kernel extension: - -1. In **Computers > Configuration Profiles** select **Options > Approved Kernel Extensions**. -2. Use **UBF8T346G9** for Team Id. - -![Approved kernel extensions screenshot](images/MDATP_17_approvedKernelExtensions.png) - -#### Configuration Profile's Scope - -Configure the appropriate scope to specify the machines that will receive this configuration profile. - -Open Computers -> Configuration Profiles, select **Scope > Targets**. Select the appropriate Target computers. - -![Configuration profile scope screenshot](images/MDATP_18_ConfigurationProfilesScope.png) - -Save the **Configuration Profile**. - -Use the **Logs** tab to monitor deployment status for each enrolled machine. - -#### Package - -1. Create a package in **Settings > Computer Management > Packages**. - - ![Computer management packages screenshot](images/MDATP_19_MicrosoftDefenderWDAVPKG.png) - -2. Upload wdav.pkg to the Distribution Point. -3. In the **filename** field, enter the name of the package. For example, wdav.pkg. - -#### Policy - -Your policy should contain a single package for Microsoft Defender. - -![Microsoft Defender packages screenshot](images/MDATP_20_MicrosoftDefenderPackages.png) - -Configure the appropriate scope to specify the computers that will receive this policy. - -After you save the Configuration Profile, you can use the Logs tab to monitor the deployment status for each enrolled machine. - -### Client machine setup - -You need no special provisioning for a macOS computer beyond the standard JAMF Enrollment. - -> [!NOTE] -> After a computer is enrolled, it will show up in the Computers inventory (All Computers). - -1. Open the machine details, from **General** tab, and make sure that **User Approved MDM** is set to **Yes**. If it's set to No, the user needs to open **System Preferences > Profiles** and select **Approve** on the MDM Profile. - -![MDM approve button screenshot](images/MDATP_21_MDMProfile1.png) -![MDM screenshot](images/MDATP_22_MDMProfileApproved.png) - -After some time, the machine's User Approved MDM status will change to Yes. - -![MDM status screenshot](images/MDATP_23_MDMStatus.png) - -You can enroll additional machines now. Optionally, can do it after system configuration and application packages are provisioned. - -### Deployment - -Enrolled client machines periodically poll the JAMF Server and install new configuration profiles and policies as soon as they are detected. - -#### Status on server - -You can monitor the deployment status in the Logs tab: - -- **Pending** means that the deployment is scheduled but has not yet happened -- **Completed** means that the deployment succeeded and is no longer scheduled - -![Status on server screenshot](images/MDATP_24_StatusOnServer.png) - -#### Status on client machine - -After the Configuration Profile is deployed, you'll see the profile on the machine in the **System Preferences > Profiles >** Name of Configuration Profile. - -![Status on client screenshot](images/MDATP_25_StatusOnClient.png) - -After the policy is applied, you'll see the Microsoft Defender icon in the macOS status bar in the top-right corner. - -![Microsoft Defender icon in status bar screenshot](images/MDATP_Icon_Bar.png) - -You can monitor policy installation on a machine by following the JAMF's log file: - -```bash -mavel-mojave:~ testuser$ tail -f /var/log/jamf.log -Thu Feb 21 11:11:41 mavel-mojave jamf[7960]: No patch policies were found. -Thu Feb 21 11:16:41 mavel-mojave jamf[8051]: Checking for policies triggered by "recurring check-in" for user "testuser"... -Thu Feb 21 11:16:43 mavel-mojave jamf[8051]: Executing Policy WDAV -Thu Feb 21 11:17:02 mavel-mojave jamf[8051]: Installing Microsoft Defender... -Thu Feb 21 11:17:23 mavel-mojave jamf[8051]: Successfully installed Microsoft Defender. -Thu Feb 21 11:17:23 mavel-mojave jamf[8051]: Checking for patches... -Thu Feb 21 11:17:23 mavel-mojave jamf[8051]: No patch policies were found. -``` - -You can also check the onboarding status: - -```bash -mavel-mojave:~ testuser$ sudo /Library/Extensions/wdavkext.kext/Contents/Resources/Tools/wdavconfig.py -uuid : 69EDB575-22E1-53E1-83B8-2E1AB1E410A6 -orgid : 79109c9d-83bb-4f3e-9152-8d75ee59ae22 -orgid managed : 79109c9d-83bb-4f3e-9152-8d75ee59ae22 -orgid effective : 79109c9d-83bb-4f3e-9152-8d75ee59ae22 -``` - -- **orgid/orgid managed**: This is the Microsoft Defender ATP org id specified in the configuration profile. If this value is blank, then the Configuration Profile was not properly set. - -- **orgid effective**: This is the Microsoft Defender ATP org id currently in use. If it does not match the value in the Configuration Profile, then the configuration has not been refreshed. - -### Check onboarding status - -You can check that machines are correctly onboarded by creating a script. For example, the following script checks that enrolled machines are onboarded: - -```bash -sudo /Library/Extensions/wdavkext.kext/Contents/Resources/Tools/wdavconfig.py | grep -E 'orgid effective : [-a-zA-Z0-9]+' -``` - -This script returns 0 if Microsoft Defender ATP is registered with the Windows Defender ATP service, and another exit code if it is not installed or registered. - -## Manual deployment - -### Download installation and onboarding packages - -Download the installation and onboarding packages from Windows Defender Security Center: - -1. In Windows Defender Security Center, go to **Settings > Machine Management > Onboarding**. -2. In Section 1 of the page, set operating system to **Linux, macOS, iOS or Android** and Deployment method to **Local script**. -3. In Section 2 of the page, select **Download installation package**. Save it as wdav.pkg to a local directory. -4. In Section 2 of the page, select **Download onboarding package**. Save it as WindowsDefenderATPOnboardingPackage.zip to the same directory. - - ![Windows Defender Security Center screenshot](images/MDATP_2_IntuneAppUtil.png) - -5. From a command prompt, verify that you have the two files. - Extract the contents of the .zip files: - - ```bash - mavel-macmini:Downloads test$ ls -l - total 721152 - -rw-r--r-- 1 test staff 6185 Mar 15 10:45 WindowsDefenderATPOnboardingPackage.zip - -rw-r--r-- 1 test staff 354531845 Mar 13 08:57 wdav.pkg - mavel-macmini:Downloads test$ unzip WindowsDefenderATPOnboardingPackage.zip - Archive: WindowsDefenderATPOnboardingPackage.zip - inflating: WindowsDefenderATPOnboarding.py - ``` - -### Application installation - -To complete this process, you must have admin privileges on the machine. - -1. Navigate to the downloaded wdav.pkg in Finder and open it. - - ![App install screenshot](images/MDATP_28_AppInstall.png) - -2. Select **Continue**, agree with the License terms, and enter the password when prompted. - - ![App install screenshot](images/MDATP_29_AppInstallLogin.png) - - > [!IMPORTANT] - > You will be prompted to allow a driver from Microsoft to be installed (either "System Exception Blocked" or "Installation is on hold" or both. The driver must be allowed to be installed. - - ![App install screenshot](images/MDATP_30_SystemExtension.png) - -3. Select **Open Security Preferences** or **Open System Preferences > Security & Privacy**. Select **Allow**: - - ![Security and privacy window screenshot](images/MDATP_31_SecurityPrivacySettings.png) - -The installation will proceed. - -> [!NOTE] -> If you don't select **Allow**, the installation will fail after 5 minutes. You can restart it again at any time. - -### Client configuration - -1. Copy wdav.pkg and WindowsDefenderATPOnboarding.py to the machine where you deploy Microsoft Defender ATP for Mac. - - The client machine is not associated with orgId. Note that the orgid is blank. - - ```bash - mavel-mojave:wdavconfig testuser$ sudo /Library/Extensions/wdavkext.kext/Contents/Resources/Tools/wdavconfig.py - uuid : 69EDB575-22E1-53E1-83B8-2E1AB1E410A6 - orgid : - ``` - -2. Install the configuration file on a client machine: - - ```bash - mavel-mojave:wdavconfig testuser$ python WindowsDefenderATPOnboarding.py - Generating /Library/Application Support/Microsoft/Defender/com.microsoft.wdav.atp.plist ... (You may be required to enter sudos password) - ``` - -3. Verify that the machine is now associated with orgId: - - ```bash - mavel-mojave:wdavconfig testuser$ sudo /Library/Extensions/wdavkext.kext/Contents/Resources/Tools/wdavconfig.py - uuid : 69EDB575-22E1-53E1-83B8-2E1AB1E410A6 - orgid : E6875323-A6C0-4C60-87AD-114BBE7439B8 - ``` - -After installation, you'll see the Microsoft Defender icon in the macOS status bar in the top-right corner. - - ![Microsoft Defender icon in status bar screenshot](images/MDATP_Icon_Bar.png) - -## Configuring with the command line - -Controlling product settings, triggering on-demand scans, and several other important tasks can be done from the command line with the following commands: - -|Group |Scenario |Command | -|-------------|-------------------------------------------|-----------------------------------------------------------------------| -|Configuration|Turn on/off real-time protection |`mdatp config --rtp [true/false]` | -|Configuration|Turn on/off cloud protection |`mdatp config --cloud [true/false]` | -|Configuration|Turn on/off product diagnostics |`mdatp config --diagnostic [true/false]` | -|Configuration|Turn on/off automatic sample submission |`mdatp config --sample-submission [true/false]` | -|Configuration|Turn on PUA protection |`mdatp threat --type-handling --potentially_unwanted_application block`| -|Configuration|Turn off PUA protection |`mdatp threat --type-handling --potentially_unwanted_application off` | -|Configuration|Turn on audit mode for PUA protection |`mdatp threat --type-handling --potentially_unwanted_application audit`| -|Diagnostics |Change the log level |`mdatp log-level --[error/warning/info/verbose]` | -|Diagnostics |Generate diagnostic logs |`mdatp --diagnostic` | -|Health |Check the product's health |`mdatp --health` | -|Protection |Scan a path |`mdatp scan --path [path]` | -|Protection |Do a quick scan |`mdatp scan --quick` | -|Protection |Do a full scan |`mdatp scan --full` | -|Protection |Cancel an ongoing on-demand scan |`mdatp scan --cancel` | -|Protection |Request a definition update |`mdatp --signature-update` | ## What to expect in the ATP portal From 8b9f0da22d48315f1cddffdc025b92e2a8805288 Mon Sep 17 00:00:00 2001 From: martyav Date: Fri, 3 May 2019 17:17:28 -0400 Subject: [PATCH 323/724] moved what to expect from mdatp-mac to mdatp-mac resources --- .../microsoft-defender-atp-mac-resources.md | 19 +++++++++++++ .../microsoft-defender-atp-mac.md | 27 ++----------------- 2 files changed, 21 insertions(+), 25 deletions(-) diff --git a/windows/security/threat-protection/windows-defender-antivirus/microsoft-defender-atp-mac-resources.md b/windows/security/threat-protection/windows-defender-antivirus/microsoft-defender-atp-mac-resources.md index 7f2b515f99..4de5bdb96c 100644 --- a/windows/security/threat-protection/windows-defender-antivirus/microsoft-defender-atp-mac-resources.md +++ b/windows/security/threat-protection/windows-defender-antivirus/microsoft-defender-atp-mac-resources.md @@ -104,6 +104,25 @@ If you are running JAMF, your policy should contain a single script: Configure the appropriate scope in the **Scope** tab to specify the machines that will receive this policy. +## What to expect in the ATP portal + +- AV alerts: + - Severity + - Scan type + - Device information (hostname, machine identifier, tenant identifier, app version, and OS type) + - File information (name, path, size, and hash) + - Threat information (name, type, and state) +- Device information: + - Machine identifier + - Tenant identifier + - App version + - Hostname + - OS type + - OS version + - Computer model + - Processor architecture + - Whether the device is a virtual machine + ## Known issues - Not fully optimized for performance or disk space yet. diff --git a/windows/security/threat-protection/windows-defender-antivirus/microsoft-defender-atp-mac.md b/windows/security/threat-protection/windows-defender-antivirus/microsoft-defender-atp-mac.md index 3eb0b476e4..5132b03e9b 100644 --- a/windows/security/threat-protection/windows-defender-antivirus/microsoft-defender-atp-mac.md +++ b/windows/security/threat-protection/windows-defender-antivirus/microsoft-defender-atp-mac.md @@ -37,7 +37,7 @@ We've been working hard through the private preview period, and we've heard your - Product health can be queried with JAMF or the command line. - Admins can set their cloud preference for any location, not just for those in the US. -## Installing and configuring +## Installing and configuring There are various methods and deployment tools that you can use to install and configure Microsoft Defender ATP for Mac. In general you'll need to take the following steps: @@ -80,27 +80,4 @@ To test that a connection is not blocked, open `https://x.cp.wd.microsoft.com/ap ``` We recommend to keep [System Integrity Protection](https://support.apple.com/en-us/HT204899) ([Wiki](https://en.wikipedia.org/wiki/System_Integrity_Protection)) enabled (default setting) on client machines. -SIP is a built-in macOS security feature that prevents low-level tampering with the OS. - - - - - -## What to expect in the ATP portal - -- AV alerts: - - Severity - - Scan type - - Device information (hostname, machine identifier, tenant identifier, app version, and OS type) - - File information (name, path, size, and hash) - - Threat information (name, type, and state) -- Device information: - - Machine identifier - - Tenant identifier - - App version - - Hostname - - OS type - - OS version - - Computer model - - Processor architecture - - Whether the device is a virtual machine \ No newline at end of file +SIP is a built-in macOS security feature that prevents low-level tampering with the OS. \ No newline at end of file From 2289a34d73036ed323fc432e79db0e1fce7b3bc3 Mon Sep 17 00:00:00 2001 From: Joey Caparas Date: Fri, 3 May 2019 14:43:08 -0700 Subject: [PATCH 324/724] update image of pending action --- .../images/pending-actions.png | Bin 0 -> 9277 bytes ...indows-defender-advanced-threat-protection.md | 3 +-- 2 files changed, 1 insertion(+), 2 deletions(-) create mode 100644 windows/security/threat-protection/windows-defender-atp/images/pending-actions.png diff --git a/windows/security/threat-protection/windows-defender-atp/images/pending-actions.png b/windows/security/threat-protection/windows-defender-atp/images/pending-actions.png new file mode 100644 index 0000000000000000000000000000000000000000..8cb0f643a6c1bbaecd933bc39df8401c365aa1b7 GIT binary patch literal 9277 zcmc(FcT`i|({2!H(u{y~P!SN3j+D?ffFMPx^eVk$DAJ|(-d-Sd2uSbJdl96Dfb=Fp z=tT&fdw75AuJ5~R-GA=)&s__4vL<_5VIP!ai678B0D(Zna_^w3AP`m| z@Vx{d7Z^EGg{*)N0>^jSpFtp!p1XgnBz6*7K!^vEQ2Ipig%+kox=J?*W7ot>FI40QT4xgC(<-c3`t zg4vpZiuNX0L7*ofIjEGnd&cg9r<-KLr?p+H`Z3q`|>OJxI9qac&6dIEjO zB)HDovBT&dz40?jDpt7T@D#8bmnG1s5%pgxc<&7te>(MCL;rbPjn4b)d3o6<3>zd9O&4a7rR_hSCyTwT{RImB&9bm_d6>s| zQ)!qGZ!}q?^3KPW2Naze8ahC{vSRFhI%6>}-npWAc6J6@4h4+h@sON6@FOvG!)rD< z9zcb-_oUk!PhY&S>@bK?ySt$JhYt_`9{Vic;QF{3m*4m(5d96PXrS5LlGL?f`qus{ z;O&O)g0=shK{F;sFR}P(qCD9{Mx-YE@gr^9{g1fBdy7AR{JM+}9ggly6jpwMj)o6# zUDWrR3nd|_*0}dSda8I-kxb8)TH4qI)a}x2aVDGWSNt)~Ky)WihxlF|kaOzWNWDkC zuC1M1-dRMYuAnP--d)xbPj6M^C{}sP=ZgYncGr>^9j;@_o|f&v%$ayy9kO!!YDBO^ z;3%djcVAJGi3|7=E`^?tEiHV0ub?2$Z7+PPnf#Q?>=guMP;{|I7kNq_CG1=3pVCBT zs&@22vypO$qKfsTe_~W=dEtA_Kq~J&rh78RJ#gh!q==9I=!mVVlJlcWe*BP|ZJ$WY zNpI1z%E1YJ%;oL&Lw|A<0y@b5xsRwp_Whz0A2&ma6AUx$2$R*G{!g#Sh2yBwA!>b=t@WPkJUGeF(D`c#QzUhUa3zi|$ragayiA5=&~@AwNBX^M4;*t2wx0LO-gv|z z20ivp=k_h`MOaH;wwTE|{|TZnT#9hP<69ZO-b?@=aClQ{57!e$uUYsybp4iAc7OJg z;7itQ5Sz88Qr083Nins3Cr^DtF0PJQv`2vw`|^5FrV@m4A`BgeD3tQ<@%xc5y;@R5 z;Qpf%!o?if`_YEgw0Z@95}Db>giUSK!_vb2Hekew`pnacEqP%#Aa3cBPyYS;USHpv z#dl}(twaR{zOsGal`PF${1n01)cH{bYCJ4H3Ek2)^xx8>nIy)#OU5o-*Mx! z>iqViv<04}=ZC3?{O*WFg*;%>>|m60*zcMR=>xf3R(Y)O+6piFwU@W~5vGFntFuft zBym%Dusc~Bj1HA=?mxkC@Li3lvEo|gn2{fft6_b>%+(e;3}U!Eas4?2qBGZ4J{s)_ zp6M88l{mGfqvm_4*S6jlYR|(EksiI-%$u!WbzcKG*LdSic&?*CuljW897ekO*Gmo} zA6+I6bjzHq`b2Jw@GrLsyFGpSmyldY^pKOBK+S)A+;LzX#>ky0t8fQFUzyySY%u%u z#!BL}mzV0tuXYh$#y7hT#;5v$b`&mWpV}yu*30_k*Q6$8Z&<}?JFrQV`y)G(xO{^H z@JLserHH+BODflvJ85Hrd__K>^4|asX)3LfLIN0}S1GHKGZozDHO#5W@%yW((IJzW z{a@xb(ni->R_`&ZW?ozb8_ZXt{Nu0MC9gN{Dcp{$eQzkn`p6{+k}?H9A_py%mz-@? zWG&~@Hrj8p6lx&B&xX0oWL2hxhRh3OCh1%MX-)qKW%?xPzkM1)=5nTZ#TA!&#tM2| zdu~Oq zwGb847A!8}7In>{7TGtn-jqr{t_)%ex5k?+EF#+OB|Uyinc|UCw+$3pM~qr@AN*5l zM5$CyohBu2iEcLFjM;63_&ceg!oswN^j7DTOFXH+CZe@z1x@lGR0+?vs*asvq;1!% z@|Bx|v8&R_;}StI40?q%7M>8uq^GXknk}(1S?z$U$Z^>r+?T&ZX1uA~2)=Xb+j% zmeZA?7!_aK8}H*`W~j7GQ&l1E+8^=okixT-i(b>S?VN<7x`7nDd9o0^_AI}ChIX=$ zBhu`N-T|vk2GeRjlFnpJSdda*H&=UP2x~}g3CiC{*}zDt`Zbv&ZDSAZyux_*FLDaJNB3N2LwhRSe>Z zN3Ye-MV){&LctMO%ZGrpvKl83X@1q{OH(u_c3~oWnQ~ZSPH8CuN#2CB$_gAKD zCh$txF5wYKYYbKoI%nLMrRd_ugjC@>jxSbH^GMrX(Ag9+bjKe?j9stIFv^K2nG9{D zSK4f;x|_F8Mwa$yxc{EVO|<3cEwwW=MtzIY0$oSh{PWmoZT^W@-JVNCyy7!3idLlZ@ z@HX*DWv;J$YkgglTYwUc=-}Ys2SdaC3!wya2*Y<9^75=(!qY7D3Mjtd9?p5enTqxE zN9`CKap5iZYhzv$`3_yew~i)tv5BB;>hlQAHR!;bmZas*u{6Pzuc_0HE1e5P0%yy) z8X*l5ks%US;MS7{{tr=(G+^e~H zv6LEy$n<#d5AD#(?M}1Mm2$x;Tb#3AdC6O|g6*u##igw9u@M?Nr?o$&AkYxyi{iQ` z?(!{26(qNug6!eZ8tJN2^V*zm#~P`4bV`iJGnTN~hHTOZ$!aujOVcdR%HgO}!R`Zb zU$1+!%`J{IiIJh)VvAeoZ?#yM`>wag@2_T&#zN0dt+4;xV3t&v7JKS&eQ)<0EkD=- zN7c}cGHG@}K`;6UZ7Q2nwi5X}J~C6|dhLOZOjK}9-pB4wFDs}wB9w*nR6TRQ_m{-t z$#9%rtH%svc|f8U&!`CZ{vP1eaT50d=`7i_KW1%n{L#;U$o7rU^!SG-Z!Xu57GHay zArSSPgLdo==F8sh=KwVuFXO#-U}zIrYsNolXvOMe-Vto|CFJmlrq|8jqG!2dYp@a; z8k&P~SzoA{8q%+Y;a>tHX}>(zf7W z8L#7EK_LyDaJ2%&_}JKTt>PWk->R9a7a*rdS5dd!`>ZQ^{uL-Bg6`D$KgM2KP^o4K zV(rPZXI*%VUL9b7*s~ETQ!+wJHQ8kwp!`L}>Mx7bU#4tx^RQ*aMgr2Nrlv6zs`ocg zMMTHOPFmNUjZ(9)1l8!2ZSL$qJv~Kc=jO)8$DgvWvb=bv3NeP|YnH6+?h;4IU^6l@ zTJqB%euRa|bq3~7PE7dM*9&x5Co!`;%k6wqrrAAdFz{#3Xi5QRj{W+D&&9>%4%|@mPfyJexx7#z;3&uI3zyo422aTI zXSw1vTCXgvt=|AsfKAhtclYEQb*UTZ>e50W5K(#(uu7H-43=G1Mhu6;l}P3ORWT#u zy86j88UX4kqtZ{-+~8eRI_2+0wKaJuVmwnlh!Cf++9G z_Mg^O8i=B<&xZ65GBLa@3|gxz1EH2erY1Cnvr!Ra8aFsbRuow^2Am=5zM9#`5xWN- z?$j;03`a(RP<}lg9%8;^Qob>lPa>sd!%EX=$gyxKMgKU(F*m=}K8XB7Oi8nlTenFz2RC=lIJ}^ zZJy2TkDVUhhh@$#Ra6xq5K;)_iB0;o90HkB^qor5t<q>`aJGs+XJ*0R=8N z+7eimrAkmF;kRHxhmp?3R!=ed;I|X^AAr7m`7$sx)NEJ5x+7Wa+uPgMWh>Ba#QnWh z(frTLd<0^luShgN?aSNLxR|PR+~rH1uia(_q_4hCW52&sI)$mM?d7XiP%kf0 zB3x_*7P9d02rwn>Hq0BYglFn1KtwGlYfDW{{Z3Jlf)Rm0to;75mx_&zZN@|gR|<)Y zB>H4w5i$DDu=$M5=7|TtfWSSFs;cUzp-35~2ZV&ZaiJo+%&e?=-@ZKn#m2^ln)b`b zCMUB*%*<@h^*J=_m7tz6GfR7Uzm*C8ey6Ekqce57;D*rrl)%*Azx@nsSU6Sq^Wz5(NS-}?3f9)% zj!jQz-&R9gWMpJSo}Ibx%+%mTMMbS%CY{#ox^>mJZf?G)GK^110E3-KtE;ENhU~Hu zqKSg2;H`}4?RQJfHD(^I496RzAwNDnT8c2JploOAa^n;iH`w`%#=N;`bAiBzZWwHZ zk_6}PE0ZUv0{GK0q{4nba$M<^`gMx3FWb}&Q=7JLgY)71d@1=MU|AIn4dxqVa(eop zEBbRWdy9bqzZu)$8QaHhgI(mBfd1<0>fuA(-Q7EdLe9?4J?lDUn)RXp?tt=r^=M)u zGoiZVG_XBr9rP)zQ`6p_^Ur7&S2^RuhkieQYOFc~9{GpQB5a81*`AcO^|xR3JR);w z^*n=$6ub1;SWCB-((L6YfO~q{C|m>U0e?pdx>lRlXeTE|)3bvOyHnxB2|oho=k*Z# z+MA>`Gm)jGE-zkk%DB1;@Y;Kg)Q2&G0E8@R)yQ})b&+Vh8wv{xCRD{fjGUP<(W9V9 zGHEZ&&tLvk^~lM4#gpwhW2-?-U?9|K&fh;kX(@)^KJU4C-uR1%PRnDT)14XYnwg!y zH6`D^y|F^G&0yXL`J|?#ga8Ymva%;04?dt%Q-i51sD4Z?)Zv2s>T>@4Azz5v07=px zAJ~OG^_3OR&CBcQkBd{OrVr$!jvtTjH1g9d2|AZCdHF&pw6-=qY-I^Kp`xO~HfPWz zDlX3Ov0@5)bMdQ&hQ<#Ws)=^E(-gy)_mypLNkw=}P4(1MZtgKF-QwcnYWnxk9%4w@@N~_Rq-!0w)1ifA$E%U?`U$u#43;P~@o+Vkp<&ckO_5~~q=s5FEl!HU@s+?esVE27{O7sN> za1CbWe!8}pjt)tuzmF(s*-wp)jdNa^qj^E8625IiHv~jPiQbeSTQ0txLEcg$j)JL& zV`@AN(71J+IB?mE+b0)Qrp%VMwzVRDnd#}$0HM_iIf9Yq?f;V?V zCE-IiI5+~)UsB1+68$o`=Q*B2e|UDdwqugWQUNGvywuiumm?55IMHo+6O8Jro|wHL zB}BlFPw|SB0(vq5pWZS8J22YxuWvuwfXS0 zG@Y5X!SDy#ZxnPA0|gCy^{-kAmL$-Jd~Wzz`p(Y0K)wju&y$c9sy`&v$QWcoTwFFW zgMKwQRCF7{kN=>}@^EAYTFwj48XPkuf5ibH{E>_a9t-}PI#O1T1B*$_p#SV#SX@jH z7bkcr4XOL5_5}d|rE26>LDfCMczJz)mJx#d;HvlC&XG$tgJU~V=Sro-o zT&D>t#{i*leVX?~Tzs)yY$cFTO3(Jyy?gg6SB3@6Mrny~o5kIvXWO4X?Of&G`T0-H zr~YjqYk0bR3A7`sKg9OF9M4q;jyeU0^0!-%n-m}K-P~1^48R{NBQIaSruh2xtE-4! zF_7#wVG!VtoSZI^p8Ij3Qs6oSK4PX@4}>l*4h~+go!#i*c3De{sFRL70{N7ecW|9+ zp|+MkRe{Cn`rv@uNn6jh)SdThrQS;bmNPRmN?f4FB=dxG3?iBn2%G9v6H_ofJr0ny z-Jkdz|Dg*E2??t(9vG+;d0Wm3M9_jove~E5-M{O(<^i2X(~E#AJ2IaR4-cyo81C15 z+k3XACf540zkJ!dZ>l*3dH($Q;Dz*bgi5PsiS)n8pzGA#SVIF9+sys(u0_0^pe&9? z3k?MS%af!`O_{!xlz^$IK)cWl$_~hcyN`cy76%4n-j4MyC|Gl|bP;0YYm9L}M_Y+5YX;|{p_)r3H~AtqG2PsI^5F2TEo-mO z#keagEBM63K`}9;lUwPg`K01!e*LMz@C$1#=gbh6U43^h?oc`W*eojJA75^!?2Vx$ z08rnSpm^E9jbFp8sJ2Ao@oe5k4aLRir1+1liNF_y{q+(IuJHffNJ7RP`+E2Ti~E$Z zY^^y7nnt{$>$4Pst-I7E`KmAFhFsjQxycMvNITiLp2E$2uzb%BxGE3F+M zz?go36+K$;3=rq0hcqlJh2;TpPho8iyR zPW1w4qp-n8!ywHbV$miKXOoi69MvV{np$CvwT0m23kKge-V9dr_1hv5$Z^m5R@wl& z;TN(M4s#XJzcLxPu0?||u?Y!GC2q_aPE%?NPnXTV5GMS19?`80XUiK874tkDn2i-@ z^$Na+-cZWy2a~xNT8e<=bTgPd zNmkv;nq4B~`ORTcZTN-TWgS2`!C=gQNo}j3k*jOHmMj|+Q+K&$LP^tG|E{h#+QctD zx)kP1U*yjbnz07-P_K1b$2p`S0Kb+p|D@RE|8G%72O!3Og$yKpu zJ!v)kwK;BTCRhz~b+fj3{n@sWHUM@G#A^?&+XE3HG?(L3mN^=!y-D%-#Ri8((bm$I z;1VHyl%R8M8DL1a%h#L&n)R=M46@gkJCOzj+z|>G1SQ~%*o&=YoG<2MPON=+A+M9c z%Wea=oh(LKhe*ToI{nqY@Gs9d+O@;ddR=Mfc7s$B96zgBP_98r{`t(#13EoP4um^t zXe13mAYH@~1$rp)Y7S*%UGZ*>jFBx`g1Q7fIMu3s`@K^$l-=bwi7k?uDbKCq5%r1O z=T#225o-5Nk$&~eyaS(8QwP@agH8h5Jv|Y4Pk#Vt1&AubZPZnhuOHRa(4|8B{OjK{ zd0$5gM9qcFh>T^u+$h{fQCYbgRdV9m@21!2QD>m}r#o51CB)+!pbq1Y;bCd*8SRModfGxsve+Z_;$y*rOXR-8kZ)#_WLCO5Wm8sC;($>DQ|~uC3P>!Wc{hQ5 z<&9FyDBq%ORO1_5@M#6E?Rr&QSvh7;Z&k(uu%mQM?D-Or=j--xww(6#w6va$pqqz- z%J@jHd^$RwaX&I20zx$?zzYS+l2cOfS`E0;{hePA0&Jz)b|I3e|1~0C&2plq4WJ;s zO(I?7h7P8cW&-JEbqRqzHr!OeNzZQ6z$NJJLSbQTZS8h1_HW2v?~V2KA0`TNa#GUL z1>eh?ubWm;AA8eeyFBaYhks^C7)~Yg==#{OTP-}ziOPIAGkaQ<$Hzo`S1%;k){;}w zMgWYa%J3dG_GN1t*9q}951YF0q^at&71(|o`M11IX(9c2?eUHr9k)=r&jrj)UX<_-)Jw9V9+j! z(Lh6l98pw>k4NJ5k|i&<>)G$$wlX?8O(9G*ANBNh_~ZV{{25HLw6p63S`rs*)twRl zuBfla&FhZ@GxqoPKjjo32>=UE&(8Wgt@U9V;iV_rSfGkmhEp5$xFSF&Mm0k^g3@%l z96lgmFBxncWIHokXOoSxcKT(D3j*kFxQNRfx_t%$7aDY~e>L|V3!$8q+}g)CdL^>D zx^^&lWM*k)Rb})3$*ZO6b?+;?Tk%qZYsgf&en3Q0(ki5@hznQ)a=iF!rSO1o8wt|` zHvHY=L|6NA!rk_AJ!yR?HtoW}#5qOW$KDE3sF)s%L?}n>&mjRzzKdI&tEK*j{o`t5 z0oql~EM(Z+DdY;c<*zDlk-jL}82x6~LD%w84#ob>v2o56IkF{S^W0+Q5MXPujn2$B z>xK;EhSTHk{s=m>a?Jg(pcP!!IeyJk57^n=?40-T7ZQy`TzZx6n3xs(Vzikq2Pe1z z8%!1bQhnxgrv%W~`3?sq!H8lk*1>TmW@Uyk7y-M!a($7wgwLP*g>?~RKr7musNBmF z2hskrH@}j5hU>-(S(wvu)iPw}58Md<07FSOjw)F)0j%r}D4D677M+~@c;{E!f>}!n zC+dlSfTq{0$ja~s5k1p8C342bCXqU2j}?c9O)Opm%Zo)Z0WNC^ zB4m_uaysO&yPQ%x}38l{t@bZXB-NhpqzZ3qi1&5F>@&tP|_Jpn>7*0Zz6c!2SI} z^Dh1LYi0!etQN<9%y@I|xAne^d*Aae^NA$d!9v#>Y<_#Dc3n;{3RZy!)8woi9P|LZ zSTakWh{f(J02{Ejv8gm0x&)p{dV?02IE*hwW~zTCv5y1&wTRpH`tL zypFQ%L|!8HO4r>q13RQ)^;AVa`%p?)g&5l_g^b*YsHk4R@BlJp-n}bYRhIi`H&;J= z@jF4;142@5T&H7Pr3IYrp#TlMkBciQ;*^W%20D!i|2JBg;Kt~6fc0+9=iMXJF9|a znu}$)kz|9{CwO*o#*EK=-V#vw#6#Y3G#!<)_9==ncOSmIc-)|il+Hf%Uo&IsyO)D$ zLIGF`ZfFpk)tTeAo_qnkK_CPtHZf6sv4V}X7z^Lo>|y5gY;a@4mjM* z+5If)FDY7DT9!99LV!vb@IiPUOLQtO^$KO*Kpaz!W(kk;?{~FzbvY#^L&zNPmrQ1Y z7mo3%jx_k`Aop_;%Xe>;)-C*+={`N>B##4hX3s7zx<*GyX`=ej nPAn+k?U6HNI?yd%y9MRR*>+8Rn63lfk^#v{D?!WO82SG%ag!h* literal 0 HcmV?d00001 diff --git a/windows/security/threat-protection/windows-defender-atp/manage-auto-investigation-windows-defender-advanced-threat-protection.md b/windows/security/threat-protection/windows-defender-atp/manage-auto-investigation-windows-defender-advanced-threat-protection.md index 3b6362ab90..c99beec6db 100644 --- a/windows/security/threat-protection/windows-defender-atp/manage-auto-investigation-windows-defender-advanced-threat-protection.md +++ b/windows/security/threat-protection/windows-defender-atp/manage-auto-investigation-windows-defender-advanced-threat-protection.md @@ -15,7 +15,6 @@ manager: dansimp audience: ITPro ms.collection: M365-security-compliance ms.topic: conceptual -ms.date: 09/03/2018 --- # Learn about the automated investigations dashboard @@ -161,7 +160,7 @@ This tab is only displayed when an investigation is complete and shows all pendi ## Pending actions If there are pending actions on an Automated investigation, you'll see a pop up similar to the following image. -![Image of pending actions](images\atp-pending-actions-notification.png) +![Image of pending actions](images\pending-actions.png) When you click on the pending actions link, you'll be taken to the pending actions page. You can also navigate to the page from the navigation page by going to **Automated investigation** > **Pending actions**. From 13772a2919488865e31069af4f29b4e8e87b2014 Mon Sep 17 00:00:00 2001 From: "Nisha Mittal (Wipro Ltd.)" Date: Fri, 3 May 2019 14:54:45 -0700 Subject: [PATCH 325/724] Updated few issues for 1709 and 1809 product version --- .../resolved-issues-windows-10-1709.yml | 4 ++-- ...ved-issues-windows-10-1809-and-windows-server-2019.yml | 2 ++ windows/release-information/status-windows-10-1709.yml | 4 ++-- .../status-windows-10-1809-and-windows-server-2019.yml | 8 ++++---- 4 files changed, 10 insertions(+), 8 deletions(-) diff --git a/windows/release-information/resolved-issues-windows-10-1709.yml b/windows/release-information/resolved-issues-windows-10-1709.yml index e030af13f9..ad081459c3 100644 --- a/windows/release-information/resolved-issues-windows-10-1709.yml +++ b/windows/release-information/resolved-issues-windows-10-1709.yml @@ -32,7 +32,7 @@ sections: - type: markdown text: " - + @@ -62,7 +62,7 @@ sections: - type: markdown text: "
SummaryOriginating updateStatusDate resolved
Custom URI schemes may not start corresponding application
Custom URI schemes for application protocol handlers may not start the corresponding application for local intranet and trusted sites in Internet Explorer.

See details >
OS Build 16299.1029

March 12, 2019
KB4489886
Resolved
KB4493440
April 25, 2019
02:00 PM PT
Custom URI schemes may not start corresponding application
Custom URI schemes for application protocol handlers may not start the corresponding application for local intranet and trusted sites in Internet Explorer.

See details >
OS Build 16299.1029

March 12, 2019
KB4489886
Resolved
KB4493440
May 03, 2019
11:51 AM PT
End-user-defined characters (EUDC) may cause blue screen at startup
If you enable per font end-user-defined characters (EUDC), the system may stop working and a blue screen may appear at startup.

See details >
OS Build 16299.1059

March 19, 2019
KB4489890
Resolved
KB4493441
April 09, 2019
10:00 AM PT
MSXML6 causes applications to stop responding if an exception was thrown
MSXML6 causes applications to stop responding if an exception was thrown during node operations, such as appendChild(), insertBefore(), and moveNode().

See details >
OS Build 16299.904

January 08, 2019
KB4480978
Resolved
KB4493441
April 09, 2019
10:00 AM PT
Stop error when attempting to start SSH from WSL
A stop error occurs when attempting to start Secure Shell from Windows Subsystem for Linux with agent forwarding using a command line switch (ssh –A) or a configuration setting.

See details >
OS Build 16299.1029

March 12, 2019
KB4489886
Resolved
KB4493441
April 09, 2019
10:00 AM PT
- +
DetailsOriginating updateStatusHistory
Custom URI schemes may not start corresponding application
After installing KB4489886, custom URI schemes for application protocol handlers may not start the corresponding application for local intranet and trusted sites security zones on Internet Explorer.

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10, version 1607; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 10 Enterprise LTSB 2015; Windows 8.1; Windows 7 SP1 
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2; Windows Server 2008 R2 SP1
Resolution: This issue is resolved in KB4493440

Back to top
OS Build 16299.1029

March 12, 2019
KB4489886
Resolved
KB4493440
Resolved:
April 25, 2019
02:00 PM PT

Opened:
March 12, 2019
10:00 AM PT
Custom URI schemes may not start corresponding application
After installing KB4489886, custom URI schemes for application protocol handlers may not start the corresponding application for local intranet and trusted sites security zones on Internet Explorer.

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10, version 1607; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 10 Enterprise LTSB 2015; Windows 8.1; Windows 7 SP1 
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2; Windows Server 2008 R2 SP1
Resolution: This issue is resolved in KB4493440

Back to top
OS Build 16299.1029

March 12, 2019
KB4489886
Resolved
KB4493440
Resolved:
April 25, 2019
02:00 PM PT

Opened:
March 12, 2019
10:00 AM PT
End-user-defined characters (EUDC) may cause blue screen at startup
If you enable per font end-user-defined characters (EUDC), the system may stop working and a blue screen may appear at startup. This is not a common setting in non-Asian regions.

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10, version 1607; Windows 10 Enterprise LTSC 2016
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016
Resolution: This issue is resolved in KB4493441.

Back to top
OS Build 16299.1059

March 19, 2019
KB4489890
Resolved
KB4493441
Resolved:
April 09, 2019
10:00 AM PT

Opened:
March 19, 2019
10:00 AM PT
Stop error when attempting to start SSH from WSL
After applying KB4489886, a stop error occurs when attempting to start the Secure Shell (SSH) client program from Windows Subsystem for Linux (WSL) with agent forwarding enabled using a command line switch (ssh –A) or a configuration setting.

Affected platforms:
  • Client: Windows 10, version 1803; Windows 10, version 1709
  • Server: Windows Server, version 1803; Windows Server, version 1709
Resolution: This issue is resolved in KB4493441.

Back to top
OS Build 16299.1029

March 12, 2019
KB4489886
Resolved
KB4493441
Resolved:
April 09, 2019
10:00 AM PT

Opened:
March 12, 2019
10:00 AM PT
diff --git a/windows/release-information/resolved-issues-windows-10-1809-and-windows-server-2019.yml b/windows/release-information/resolved-issues-windows-10-1809-and-windows-server-2019.yml index 9e6e80d5cc..e3ea1030dd 100644 --- a/windows/release-information/resolved-issues-windows-10-1809-and-windows-server-2019.yml +++ b/windows/release-information/resolved-issues-windows-10-1809-and-windows-server-2019.yml @@ -32,6 +32,7 @@ sections: - type: markdown text: " + @@ -79,6 +80,7 @@ sections: - type: markdown text: "
SummaryOriginating updateStatusDate resolved
Custom URI schemes may not start corresponding application
Custom URI schemes for application protocol handlers may not start the corresponding application for local intranet and trusted sites in Internet Explorer.

See details >
OS Build 17763.379

March 12, 2019
KB4489899
Resolved
KB4495667
May 03, 2019
12:40 PM PT
End-user-defined characters (EUDC) may cause blue screen at startup
If you enable per font end-user-defined characters (EUDC), the system may stop working and a blue screen may appear at startup.

See details >
OS Build 17763.404

April 02, 2019
KB4490481
Resolved
KB4493509
April 09, 2019
10:00 AM PT
Internet Explorer 11 authentication issue with multiple concurrent logons
Internet Explorer 11 users may encounter issues if two or more people use the same user account for multiple, concurrent login sessions on the same Windows Server machine.

See details >
OS Build 17763.253

January 08, 2019
KB4480116
Resolved
KB4493509
April 09, 2019
10:00 AM PT
MSXML6 may cause applications to stop responding
MSXML6 may cause applications to stop responding if an exception was thrown during node operations, such as appendChild(), insertBefore(), and moveNode().

See details >
OS Build 17763.253

January 08, 2019
KB4480116
Resolved
KB4493509
April 09, 2019
10:00 AM PT
+
DetailsOriginating updateStatusHistory
Custom URI schemes may not start corresponding application
After installing KB4489899, custom URI schemes for application protocol handlers may not start the corresponding application for local intranet and trusted sites security zones on Internet Explorer.

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10, version 1607; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 10 Enterprise LTSB 2015; Windows 8.1; Windows 7 SP1 
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2; Windows Server 2008 R2 SP1
Workaround: Right-click the URL link to open it in a new window or tab, or enable Protected Mode in Internet Explorer for local intranet and trusted sites
  1. Go to Tools > Internet options > Security.
  2. Within Select a zone to view of change security settings, select Local intranet and then select Enable Protected Mode.
  3. Select Trusted Sites and then select Enable Protected Mode
  4. Select OK.
You must restart the browser after making these changes.

Resolution: This issue is resolved in KB4495667.

Back to top
OS Build 17763.379

March 12, 2019
KB4489899
Resolved
KB4495667
Resolved:
May 03, 2019
10:00 AM PT

Opened:
March 12, 2019
10:00 AM PT
Apps may stop working after selecting an audio output device other than the default
After installing KB4482887 on machines that have multiple audio devices, applications that provide advanced options for internal or external audio output devices may stop working unexpectedly. This issue occurs for users that select an audio output device different from the \"Default Audio Device\". Examples of applications that may stop working include: 
  • Windows Media Player 
  • Realtek HD Audio Manager 
  • Sound Blaster Control Panel 
Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019
  • Server: Windows Server, version 1809; Windows Server 2019
Resolution: This issue was resolved in KB4490481

Back to top
OS Build 17763.348

March 01, 2019
KB4482887
Resolved
KB4490481
Resolved:
April 02, 2019
10:00 AM PT

Opened:
March 01, 2019
10:00 AM PT
" diff --git a/windows/release-information/status-windows-10-1709.yml b/windows/release-information/status-windows-10-1709.yml index 45e3ada4b8..c84efb8043 100644 --- a/windows/release-information/status-windows-10-1709.yml +++ b/windows/release-information/status-windows-10-1709.yml @@ -62,7 +62,7 @@ sections: - + @@ -91,7 +91,7 @@ sections: - type: markdown text: "
SummaryOriginating updateStatusLast updated
Zone transfers over TCP may fail
Zone transfers between primary and secondary DNS servers over the Transmission Control Protocol (TCP) may fail.

See details >
OS Build 16299.1127

April 25, 2019
KB4493440
Investigating
April 25, 2019
02:00 PM PT
Certain operations performed on a Cluster Shared Volume may fail
Certain operations, such as rename, performed on files or folders on a Cluster Shared Volume (CSV) may fail with the error, \"STATUS_BAD_IMPERSONATION_LEVEL (0xC00000A5)\".

See details >
OS Build 16299.904

January 08, 2019
KB4480978
Mitigated
April 25, 2019
02:00 PM PT
Custom URI schemes may not start corresponding application
Custom URI schemes for application protocol handlers may not start the corresponding application for local intranet and trusted sites in Internet Explorer.

See details >
OS Build 16299.1029

March 12, 2019
KB4489886
Resolved
KB4493440
April 25, 2019
02:00 PM PT
Custom URI schemes may not start corresponding application
Custom URI schemes for application protocol handlers may not start the corresponding application for local intranet and trusted sites in Internet Explorer.

See details >
OS Build 16299.1029

March 12, 2019
KB4489886
Resolved
KB4493440
May 03, 2019
11:51 AM PT
End-user-defined characters (EUDC) may cause blue screen at startup
If you enable per font end-user-defined characters (EUDC), the system may stop working and a blue screen may appear at startup.

See details >
OS Build 16299.1059

March 19, 2019
KB4489890
Resolved
KB4493441
April 09, 2019
10:00 AM PT
MSXML6 causes applications to stop responding if an exception was thrown
MSXML6 causes applications to stop responding if an exception was thrown during node operations, such as appendChild(), insertBefore(), and moveNode().

See details >
OS Build 16299.904

January 08, 2019
KB4480978
Resolved
KB4493441
April 09, 2019
10:00 AM PT
Stop error when attempting to start SSH from WSL
A stop error occurs when attempting to start Secure Shell from Windows Subsystem for Linux with agent forwarding using a command line switch (ssh –A) or a configuration setting.

See details >
OS Build 16299.1029

March 12, 2019
KB4489886
Resolved
KB4493441
April 09, 2019
10:00 AM PT
- +
DetailsOriginating updateStatusHistory
Custom URI schemes may not start corresponding application
After installing KB4489886, custom URI schemes for application protocol handlers may not start the corresponding application for local intranet and trusted sites security zones on Internet Explorer.

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10, version 1607; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 10 Enterprise LTSB 2015; Windows 8.1; Windows 7 SP1 
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2; Windows Server 2008 R2 SP1
Resolution: This issue is resolved in KB4493440

Back to top
OS Build 16299.1029

March 12, 2019
KB4489886
Resolved
KB4493440
Resolved:
April 25, 2019
02:00 PM PT

Opened:
March 12, 2019
10:00 AM PT
Custom URI schemes may not start corresponding application
After installing KB4489886, custom URI schemes for application protocol handlers may not start the corresponding application for local intranet and trusted sites security zones on Internet Explorer.

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10, version 1607; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 10 Enterprise LTSB 2015; Windows 8.1; Windows 7 SP1 
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2; Windows Server 2008 R2 SP1
Resolution: This issue is resolved in KB4493440

Back to top
OS Build 16299.1029

March 12, 2019
KB4489886
Resolved
KB4493440
Resolved:
April 25, 2019
02:00 PM PT

Opened:
March 12, 2019
10:00 AM PT
End-user-defined characters (EUDC) may cause blue screen at startup
If you enable per font end-user-defined characters (EUDC), the system may stop working and a blue screen may appear at startup. This is not a common setting in non-Asian regions.

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10, version 1607; Windows 10 Enterprise LTSC 2016
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016
Resolution: This issue is resolved in KB4493441.

Back to top
OS Build 16299.1059

March 19, 2019
KB4489890
Resolved
KB4493441
Resolved:
April 09, 2019
10:00 AM PT

Opened:
March 19, 2019
10:00 AM PT
Stop error when attempting to start SSH from WSL
After applying KB4489886, a stop error occurs when attempting to start the Secure Shell (SSH) client program from Windows Subsystem for Linux (WSL) with agent forwarding enabled using a command line switch (ssh –A) or a configuration setting.

Affected platforms:
  • Client: Windows 10, version 1803; Windows 10, version 1709
  • Server: Windows Server, version 1803; Windows Server, version 1709
Resolution: This issue is resolved in KB4493441.

Back to top
OS Build 16299.1029

March 12, 2019
KB4489886
Resolved
KB4493441
Resolved:
April 09, 2019
10:00 AM PT

Opened:
March 12, 2019
10:00 AM PT
diff --git a/windows/release-information/status-windows-10-1809-and-windows-server-2019.yml b/windows/release-information/status-windows-10-1809-and-windows-server-2019.yml index 1a0496c699..5237a7fcb5 100644 --- a/windows/release-information/status-windows-10-1809-and-windows-server-2019.yml +++ b/windows/release-information/status-windows-10-1809-and-windows-server-2019.yml @@ -65,13 +65,13 @@ sections: - type: markdown text: "
This table offers a summary of current active issues and those issues that have been resolved in the last 30 days.

+ - - + @@ -91,8 +91,8 @@ sections: - type: markdown text: "
SummaryOriginating updateStatusLast updated
Devices with some Asian language packs installed may receive an error
After installing the KB4493509 devices with some Asian language packs installed may receive the error, \"0x800f0982 - PSFX_E_MATCHING_COMPONENT_NOT_F

See details >
OS Build 17763.437

April 09, 2019
KB4493509
Mitigated
May 03, 2019
10:59 AM PT
Printing from Microsoft Edge or other UWP apps, you may receive the error 0x80070007
Attempting to print from Microsoft Edge or other Universal Windows Platform (UWP) applications, you may receive an error.

See details >
OS Build 17763.379

March 12, 2019
KB4489899
Mitigated
May 02, 2019
04:47 PM PT
Devices with some Asian language packs installed may receive an error
After installing KB4493509, devices with some Asian language packs installed may receive the error, \"0x800f0982 - PSFX_E_MATCHING_COMPONENT_NOT_FOUND.\"

See details >
OS Build 17763.437

April 09, 2019
KB4493509
Mitigated
May 02, 2019
04:36 PM PT
System may be unresponsive after restart if ArcaBit antivirus software installed
Devices with ArcaBit antivirus software installed may become unresponsive upon restart.

See details >
OS Build 17763.437

April 09, 2019
KB4493509
Mitigated
April 25, 2019
02:00 PM PT
Custom URI schemes may not start corresponding application
Custom URI schemes for application protocol handlers may not start the corresponding application for local intranet and trusted sites in Internet Explorer.

See details >
OS Build 17763.379

March 12, 2019
KB4489899
Mitigated
April 09, 2019
10:00 AM PT
Issue using PXE to start a device from WDS
Using PXE to start a device from a WDS server configured to use Variable Window Extension may cause the connection to the WDS server to terminate prematurely.

See details >
OS Build 17763.379

March 12, 2019
KB4489899
Mitigated
April 09, 2019
10:00 AM PT
Certain operations performed on a Cluster Shared Volume may fail
Certain operations, such as rename, performed on files or folders on a Cluster Shared Volume (CSV) may fail with the error, \"STATUS_BAD_IMPERSONATION_LEVEL (0xC00000A5)\".

See details >
OS Build 17763.253

January 08, 2019
KB4480116
Mitigated
April 09, 2019
10:00 AM PT
Audio not working on monitors or TV connected to a PC via HDMI, USB, or DisplayPort
Upgrade block: Microsoft has identified issues with certain new Intel display drivers, which accidentally turn on unsupported features in Windows.

See details >
OS Build 17763.134

November 13, 2018
KB4467708
Mitigated
March 15, 2019
12:00 PM PT
Custom URI schemes may not start corresponding application
Custom URI schemes for application protocol handlers may not start the corresponding application for local intranet and trusted sites in Internet Explorer.

See details >
OS Build 17763.379

March 12, 2019
KB4489899
Resolved
KB4495667
May 03, 2019
12:40 PM PT
End-user-defined characters (EUDC) may cause blue screen at startup
If you enable per font end-user-defined characters (EUDC), the system may stop working and a blue screen may appear at startup.

See details >
OS Build 17763.404

April 02, 2019
KB4490481
Resolved
KB4493509
April 09, 2019
10:00 AM PT
Internet Explorer 11 authentication issue with multiple concurrent logons
Internet Explorer 11 users may encounter issues if two or more people use the same user account for multiple, concurrent login sessions on the same Windows Server machine.

See details >
OS Build 17763.253

January 08, 2019
KB4480116
Resolved
KB4493509
April 09, 2019
10:00 AM PT
MSXML6 may cause applications to stop responding
MSXML6 may cause applications to stop responding if an exception was thrown during node operations, such as appendChild(), insertBefore(), and moveNode().

See details >
OS Build 17763.253

January 08, 2019
KB4480116
Resolved
KB4493509
April 09, 2019
10:00 AM PT
+ -
DetailsOriginating updateStatusHistory
Devices with some Asian language packs installed may receive an error
After installing the April 2019 Cumulative Update (KB4493509), devices with some Asian language packs installed may receive the error, \"0x800f0982 - PSFX_E_MATCHING_COMPONENT_NOT_FOUND.\"

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019
  • Server: Windows Server, version 1809; Windows Server 2019
Workaround:
  1. Uninstall and reinstall any recently added language packs. For instructions, see \"Manage the input and display language settings in Windows 10\".
  2. Click Check for Updates and install the April 2019 Cumulative Update. For instructions, see \"Update Windows 10\".
Note: If reinstalling the language pack does not mitigate the issue, reset your PC as follows:
  1. Go to Settings app -> Recovery.
  2. Click on Get Started under \"Reset this PC\" recovery option.
  3. Select \"Keep my Files\".
Next steps: Microsoft is working on a resolution and will provide an update in an upcoming release.

Back to top
OS Build 17763.437

April 09, 2019
KB4493509
Mitigated
Last updated:
May 03, 2019
10:59 AM PT

Opened:
May 02, 2019
04:36 PM PT
Printing from Microsoft Edge or other UWP apps, you may receive the error 0x80070007
When attempting to print from Microsoft Edge or other Universal Windows Platform (UWP) applications you may receive the error, \"Your printer has experienced an unexpected configuration problem. 0x80070007e.\"
 
Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019
  • Server: Windows Server, version 1809; Windows Server 2019
Workaround: You can use another browser, such as Internet Explorer to print your documents.
 
Next steps: Microsoft is working on a resolution and will provide an update in an upcoming release.

Back to top
OS Build 17763.379

March 12, 2019
KB4489899
Mitigated
Last updated:
May 02, 2019
04:47 PM PT

Opened:
May 02, 2019
04:47 PM PT
Devices with some Asian language packs installed may receive an error
After installing KB4493509, devices with some Asian language packs installed may receive the error, \"0x800f0982 - PSFX_E_MATCHING_COMPONENT_NOT_FOUND.\"

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019
  • Server: Windows Server, version 1809; Windows Server 2019
Workaround:
  1. Uninstall and reinstall any recently added language packs. For instructions, see \"Manage the input and display language settings in Windows 10\".
  2. Click Check for Updates and install the April 2019 Cumulative Update. For instructions, see \"Update Windows 10\".
  3. Reset your PC:
  4. Go to Settings app -> Recovery.
  5. Click on Get Started under \"Reset this PC\" recovery option.
  6. Select \"Keep my Files\".

Next steps: Microsoft is working on a resolution and will provide an update in an upcoming release.

Back to top
OS Build 17763.437

April 09, 2019
KB4493509
Mitigated
Last updated:
May 02, 2019
04:36 PM PT

Opened:
May 02, 2019
04:36 PM PT
" @@ -111,9 +111,9 @@ sections: - type: markdown text: " - +
DetailsOriginating updateStatusHistory
Custom URI schemes may not start corresponding application
After installing KB4489899, custom URI schemes for application protocol handlers may not start the corresponding application for local intranet and trusted sites security zones on Internet Explorer.

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10, version 1607; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 10 Enterprise LTSB 2015; Windows 8.1; Windows 7 SP1 
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2; Windows Server 2008 R2 SP1
Workaround: Right-click the URL link to open it in a new window or tab, or enable Protected Mode in Internet Explorer for local intranet and trusted sites
  1. Go to Tools > Internet options > Security.
  2. Within Select a zone to view of change security settings, select Local intranet and then select Enable Protected Mode.
  3. Select Trusted Sites and then select Enable Protected Mode
  4. Select OK.
You must restart the browser after making these changes. 
 
Next steps: Microsoft is working on a resolution and will provide an update in an upcoming release. 

Back to top
OS Build 17763.379

March 12, 2019
KB4489899
Mitigated
Last updated:
April 09, 2019
10:00 AM PT

Opened:
March 12, 2019
10:00 AM PT
Issue using PXE to start a device from WDS
After installing KB4489899, there may be issues using the Preboot Execution Environment (PXE) to start a device from a Windows Deployment Services (WDS) server configured to use Variable Window Extension. This may cause the connection to the WDS server to terminate prematurely while downloading the image. This issue does not affect clients or devices that are not using Variable Window Extension. 

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1607; Windows 10 Enterprise LTSC 2016; Windows 8.1
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server 2016; Windows Server 2012 R2; Windows Server 2012
Workaround: To mitigate the issue, disable the Variable Window Extension on WDS server using one of the following options:

Option 1:
Open an Administrator Command prompt and type the following:
Wdsutil /Set-TransportServer /EnableTftpVariableWindowExtension:No 
 

Option 2:
Use the Windows Deployment Services UI to make the following adjustment: 
  1. Open Windows Deployment Services from Windows Administrative Tools. 
  2. Expand Servers and right-click a WDS server. 
  3. Open its properties and clear the Enable Variable Window Extension box on the TFTP tab.
Option 3:
Set the following registry value to 0:
HKLM\\System\\CurrentControlSet\\Services\\WDSServer\\Providers\\WDSTFTP\\EnableVariableWindowExtension  

Restart the WDSServer service after disabling the Variable Window Extension. 

Next steps: Microsoft is working on a resolution and will provide an update in an upcoming release. 

Back to top
OS Build 17763.379

March 12, 2019
KB4489899
Mitigated
Last updated:
April 09, 2019
10:00 AM PT

Opened:
March 12, 2019
10:00 AM PT
Custom URI schemes may not start corresponding application
After installing KB4489899, custom URI schemes for application protocol handlers may not start the corresponding application for local intranet and trusted sites security zones on Internet Explorer.

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10, version 1607; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 10 Enterprise LTSB 2015; Windows 8.1; Windows 7 SP1 
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2; Windows Server 2008 R2 SP1
Workaround: Right-click the URL link to open it in a new window or tab, or enable Protected Mode in Internet Explorer for local intranet and trusted sites
  1. Go to Tools > Internet options > Security.
  2. Within Select a zone to view of change security settings, select Local intranet and then select Enable Protected Mode.
  3. Select Trusted Sites and then select Enable Protected Mode
  4. Select OK.
You must restart the browser after making these changes.

Resolution: This issue is resolved in KB4495667.

Back to top
OS Build 17763.379

March 12, 2019
KB4489899
Resolved
KB4495667
Resolved:
May 03, 2019
10:00 AM PT

Opened:
March 12, 2019
10:00 AM PT
" From f50c265de94f0714288a98adc9bb103037fd0c6f Mon Sep 17 00:00:00 2001 From: "Nisha Mittal (Wipro Ltd.)" Date: Fri, 3 May 2019 15:24:40 -0700 Subject: [PATCH 326/724] LastUpdated dates are fixed and published. --- windows/release-information/resolved-issues-windows-10-1709.yml | 2 +- windows/release-information/status-windows-10-1709.yml | 2 +- 2 files changed, 2 insertions(+), 2 deletions(-) diff --git a/windows/release-information/resolved-issues-windows-10-1709.yml b/windows/release-information/resolved-issues-windows-10-1709.yml index ad081459c3..2893c090ed 100644 --- a/windows/release-information/resolved-issues-windows-10-1709.yml +++ b/windows/release-information/resolved-issues-windows-10-1709.yml @@ -32,7 +32,7 @@ sections: - type: markdown text: " - + diff --git a/windows/release-information/status-windows-10-1709.yml b/windows/release-information/status-windows-10-1709.yml index c84efb8043..abdaf311b0 100644 --- a/windows/release-information/status-windows-10-1709.yml +++ b/windows/release-information/status-windows-10-1709.yml @@ -62,7 +62,7 @@ sections:
SummaryOriginating updateStatusDate resolved
Custom URI schemes may not start corresponding application
Custom URI schemes for application protocol handlers may not start the corresponding application for local intranet and trusted sites in Internet Explorer.

See details >
OS Build 16299.1029

March 12, 2019
KB4489886
Resolved
KB4493440
May 03, 2019
11:51 AM PT
Custom URI schemes may not start corresponding application
Custom URI schemes for application protocol handlers may not start the corresponding application for local intranet and trusted sites in Internet Explorer.

See details >
OS Build 16299.1029

March 12, 2019
KB4489886
Resolved
KB4493440
April 25, 2019
02:00 PM PT
End-user-defined characters (EUDC) may cause blue screen at startup
If you enable per font end-user-defined characters (EUDC), the system may stop working and a blue screen may appear at startup.

See details >
OS Build 16299.1059

March 19, 2019
KB4489890
Resolved
KB4493441
April 09, 2019
10:00 AM PT
MSXML6 causes applications to stop responding if an exception was thrown
MSXML6 causes applications to stop responding if an exception was thrown during node operations, such as appendChild(), insertBefore(), and moveNode().

See details >
OS Build 16299.904

January 08, 2019
KB4480978
Resolved
KB4493441
April 09, 2019
10:00 AM PT
Stop error when attempting to start SSH from WSL
A stop error occurs when attempting to start Secure Shell from Windows Subsystem for Linux with agent forwarding using a command line switch (ssh –A) or a configuration setting.

See details >
OS Build 16299.1029

March 12, 2019
KB4489886
Resolved
KB4493441
April 09, 2019
10:00 AM PT
- + From ce90cc2b9dac2ae2bd030d208d30efe224e4a420 Mon Sep 17 00:00:00 2001 From: DocsPreview <49669258+DocsPreview@users.noreply.github.com> Date: Fri, 3 May 2019 16:07:54 -0700 Subject: [PATCH 327/724] Release info preview (#115) --- .../resolved-issues-windows-10-1709.yml | 4 ++-- ...ved-issues-windows-10-1809-and-windows-server-2019.yml | 2 ++ windows/release-information/status-windows-10-1709.yml | 4 ++-- .../status-windows-10-1809-and-windows-server-2019.yml | 8 ++++---- 4 files changed, 10 insertions(+), 8 deletions(-) diff --git a/windows/release-information/resolved-issues-windows-10-1709.yml b/windows/release-information/resolved-issues-windows-10-1709.yml index e030af13f9..2893c090ed 100644 --- a/windows/release-information/resolved-issues-windows-10-1709.yml +++ b/windows/release-information/resolved-issues-windows-10-1709.yml @@ -32,7 +32,7 @@ sections: - type: markdown text: "
SummaryOriginating updateStatusLast updated
Zone transfers over TCP may fail
Zone transfers between primary and secondary DNS servers over the Transmission Control Protocol (TCP) may fail.

See details >
OS Build 16299.1127

April 25, 2019
KB4493440
Investigating
April 25, 2019
02:00 PM PT
Certain operations performed on a Cluster Shared Volume may fail
Certain operations, such as rename, performed on files or folders on a Cluster Shared Volume (CSV) may fail with the error, \"STATUS_BAD_IMPERSONATION_LEVEL (0xC00000A5)\".

See details >
OS Build 16299.904

January 08, 2019
KB4480978
Mitigated
April 25, 2019
02:00 PM PT
Custom URI schemes may not start corresponding application
Custom URI schemes for application protocol handlers may not start the corresponding application for local intranet and trusted sites in Internet Explorer.

See details >
OS Build 16299.1029

March 12, 2019
KB4489886
Resolved
KB4493440
May 03, 2019
11:51 AM PT
Custom URI schemes may not start corresponding application
Custom URI schemes for application protocol handlers may not start the corresponding application for local intranet and trusted sites in Internet Explorer.

See details >
OS Build 16299.1029

March 12, 2019
KB4489886
Resolved
KB4493440
April 25, 2019
02:00 PM PT
End-user-defined characters (EUDC) may cause blue screen at startup
If you enable per font end-user-defined characters (EUDC), the system may stop working and a blue screen may appear at startup.

See details >
OS Build 16299.1059

March 19, 2019
KB4489890
Resolved
KB4493441
April 09, 2019
10:00 AM PT
MSXML6 causes applications to stop responding if an exception was thrown
MSXML6 causes applications to stop responding if an exception was thrown during node operations, such as appendChild(), insertBefore(), and moveNode().

See details >
OS Build 16299.904

January 08, 2019
KB4480978
Resolved
KB4493441
April 09, 2019
10:00 AM PT
Stop error when attempting to start SSH from WSL
A stop error occurs when attempting to start Secure Shell from Windows Subsystem for Linux with agent forwarding using a command line switch (ssh –A) or a configuration setting.

See details >
OS Build 16299.1029

March 12, 2019
KB4489886
Resolved
KB4493441
April 09, 2019
10:00 AM PT
- + @@ -62,7 +62,7 @@ sections: - type: markdown text: "
SummaryOriginating updateStatusDate resolved
Custom URI schemes may not start corresponding application
Custom URI schemes for application protocol handlers may not start the corresponding application for local intranet and trusted sites in Internet Explorer.

See details >
OS Build 16299.1029

March 12, 2019
KB4489886
Resolved
KB4493440
April 25, 2019
02:00 PM PT
Custom URI schemes may not start corresponding application
Custom URI schemes for application protocol handlers may not start the corresponding application for local intranet and trusted sites in Internet Explorer.

See details >
OS Build 16299.1029

March 12, 2019
KB4489886
Resolved
KB4493440
April 25, 2019
02:00 PM PT
End-user-defined characters (EUDC) may cause blue screen at startup
If you enable per font end-user-defined characters (EUDC), the system may stop working and a blue screen may appear at startup.

See details >
OS Build 16299.1059

March 19, 2019
KB4489890
Resolved
KB4493441
April 09, 2019
10:00 AM PT
MSXML6 causes applications to stop responding if an exception was thrown
MSXML6 causes applications to stop responding if an exception was thrown during node operations, such as appendChild(), insertBefore(), and moveNode().

See details >
OS Build 16299.904

January 08, 2019
KB4480978
Resolved
KB4493441
April 09, 2019
10:00 AM PT
Stop error when attempting to start SSH from WSL
A stop error occurs when attempting to start Secure Shell from Windows Subsystem for Linux with agent forwarding using a command line switch (ssh –A) or a configuration setting.

See details >
OS Build 16299.1029

March 12, 2019
KB4489886
Resolved
KB4493441
April 09, 2019
10:00 AM PT
- +
DetailsOriginating updateStatusHistory
Custom URI schemes may not start corresponding application
After installing KB4489886, custom URI schemes for application protocol handlers may not start the corresponding application for local intranet and trusted sites security zones on Internet Explorer.

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10, version 1607; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 10 Enterprise LTSB 2015; Windows 8.1; Windows 7 SP1 
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2; Windows Server 2008 R2 SP1
Resolution: This issue is resolved in KB4493440

Back to top
OS Build 16299.1029

March 12, 2019
KB4489886
Resolved
KB4493440
Resolved:
April 25, 2019
02:00 PM PT

Opened:
March 12, 2019
10:00 AM PT
Custom URI schemes may not start corresponding application
After installing KB4489886, custom URI schemes for application protocol handlers may not start the corresponding application for local intranet and trusted sites security zones on Internet Explorer.

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10, version 1607; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 10 Enterprise LTSB 2015; Windows 8.1; Windows 7 SP1 
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2; Windows Server 2008 R2 SP1
Resolution: This issue is resolved in KB4493440

Back to top
OS Build 16299.1029

March 12, 2019
KB4489886
Resolved
KB4493440
Resolved:
April 25, 2019
02:00 PM PT

Opened:
March 12, 2019
10:00 AM PT
End-user-defined characters (EUDC) may cause blue screen at startup
If you enable per font end-user-defined characters (EUDC), the system may stop working and a blue screen may appear at startup. This is not a common setting in non-Asian regions.

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10, version 1607; Windows 10 Enterprise LTSC 2016
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016
Resolution: This issue is resolved in KB4493441.

Back to top
OS Build 16299.1059

March 19, 2019
KB4489890
Resolved
KB4493441
Resolved:
April 09, 2019
10:00 AM PT

Opened:
March 19, 2019
10:00 AM PT
Stop error when attempting to start SSH from WSL
After applying KB4489886, a stop error occurs when attempting to start the Secure Shell (SSH) client program from Windows Subsystem for Linux (WSL) with agent forwarding enabled using a command line switch (ssh –A) or a configuration setting.

Affected platforms:
  • Client: Windows 10, version 1803; Windows 10, version 1709
  • Server: Windows Server, version 1803; Windows Server, version 1709
Resolution: This issue is resolved in KB4493441.

Back to top
OS Build 16299.1029

March 12, 2019
KB4489886
Resolved
KB4493441
Resolved:
April 09, 2019
10:00 AM PT

Opened:
March 12, 2019
10:00 AM PT
diff --git a/windows/release-information/resolved-issues-windows-10-1809-and-windows-server-2019.yml b/windows/release-information/resolved-issues-windows-10-1809-and-windows-server-2019.yml index 9e6e80d5cc..e3ea1030dd 100644 --- a/windows/release-information/resolved-issues-windows-10-1809-and-windows-server-2019.yml +++ b/windows/release-information/resolved-issues-windows-10-1809-and-windows-server-2019.yml @@ -32,6 +32,7 @@ sections: - type: markdown text: " + @@ -79,6 +80,7 @@ sections: - type: markdown text: "
SummaryOriginating updateStatusDate resolved
Custom URI schemes may not start corresponding application
Custom URI schemes for application protocol handlers may not start the corresponding application for local intranet and trusted sites in Internet Explorer.

See details >
OS Build 17763.379

March 12, 2019
KB4489899
Resolved
KB4495667
May 03, 2019
12:40 PM PT
End-user-defined characters (EUDC) may cause blue screen at startup
If you enable per font end-user-defined characters (EUDC), the system may stop working and a blue screen may appear at startup.

See details >
OS Build 17763.404

April 02, 2019
KB4490481
Resolved
KB4493509
April 09, 2019
10:00 AM PT
Internet Explorer 11 authentication issue with multiple concurrent logons
Internet Explorer 11 users may encounter issues if two or more people use the same user account for multiple, concurrent login sessions on the same Windows Server machine.

See details >
OS Build 17763.253

January 08, 2019
KB4480116
Resolved
KB4493509
April 09, 2019
10:00 AM PT
MSXML6 may cause applications to stop responding
MSXML6 may cause applications to stop responding if an exception was thrown during node operations, such as appendChild(), insertBefore(), and moveNode().

See details >
OS Build 17763.253

January 08, 2019
KB4480116
Resolved
KB4493509
April 09, 2019
10:00 AM PT
+
DetailsOriginating updateStatusHistory
Custom URI schemes may not start corresponding application
After installing KB4489899, custom URI schemes for application protocol handlers may not start the corresponding application for local intranet and trusted sites security zones on Internet Explorer.

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10, version 1607; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 10 Enterprise LTSB 2015; Windows 8.1; Windows 7 SP1 
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2; Windows Server 2008 R2 SP1
Workaround: Right-click the URL link to open it in a new window or tab, or enable Protected Mode in Internet Explorer for local intranet and trusted sites
  1. Go to Tools > Internet options > Security.
  2. Within Select a zone to view of change security settings, select Local intranet and then select Enable Protected Mode.
  3. Select Trusted Sites and then select Enable Protected Mode
  4. Select OK.
You must restart the browser after making these changes.

Resolution: This issue is resolved in KB4495667.

Back to top
OS Build 17763.379

March 12, 2019
KB4489899
Resolved
KB4495667
Resolved:
May 03, 2019
10:00 AM PT

Opened:
March 12, 2019
10:00 AM PT
Apps may stop working after selecting an audio output device other than the default
After installing KB4482887 on machines that have multiple audio devices, applications that provide advanced options for internal or external audio output devices may stop working unexpectedly. This issue occurs for users that select an audio output device different from the \"Default Audio Device\". Examples of applications that may stop working include: 
  • Windows Media Player 
  • Realtek HD Audio Manager 
  • Sound Blaster Control Panel 
Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019
  • Server: Windows Server, version 1809; Windows Server 2019
Resolution: This issue was resolved in KB4490481

Back to top
OS Build 17763.348

March 01, 2019
KB4482887
Resolved
KB4490481
Resolved:
April 02, 2019
10:00 AM PT

Opened:
March 01, 2019
10:00 AM PT
" diff --git a/windows/release-information/status-windows-10-1709.yml b/windows/release-information/status-windows-10-1709.yml index 45e3ada4b8..abdaf311b0 100644 --- a/windows/release-information/status-windows-10-1709.yml +++ b/windows/release-information/status-windows-10-1709.yml @@ -62,7 +62,7 @@ sections: - + @@ -91,7 +91,7 @@ sections: - type: markdown text: "
SummaryOriginating updateStatusLast updated
Zone transfers over TCP may fail
Zone transfers between primary and secondary DNS servers over the Transmission Control Protocol (TCP) may fail.

See details >
OS Build 16299.1127

April 25, 2019
KB4493440
Investigating
April 25, 2019
02:00 PM PT
Certain operations performed on a Cluster Shared Volume may fail
Certain operations, such as rename, performed on files or folders on a Cluster Shared Volume (CSV) may fail with the error, \"STATUS_BAD_IMPERSONATION_LEVEL (0xC00000A5)\".

See details >
OS Build 16299.904

January 08, 2019
KB4480978
Mitigated
April 25, 2019
02:00 PM PT
Custom URI schemes may not start corresponding application
Custom URI schemes for application protocol handlers may not start the corresponding application for local intranet and trusted sites in Internet Explorer.

See details >
OS Build 16299.1029

March 12, 2019
KB4489886
Resolved
KB4493440
April 25, 2019
02:00 PM PT
Custom URI schemes may not start corresponding application
Custom URI schemes for application protocol handlers may not start the corresponding application for local intranet and trusted sites in Internet Explorer.

See details >
OS Build 16299.1029

March 12, 2019
KB4489886
Resolved
KB4493440
April 25, 2019
02:00 PM PT
End-user-defined characters (EUDC) may cause blue screen at startup
If you enable per font end-user-defined characters (EUDC), the system may stop working and a blue screen may appear at startup.

See details >
OS Build 16299.1059

March 19, 2019
KB4489890
Resolved
KB4493441
April 09, 2019
10:00 AM PT
MSXML6 causes applications to stop responding if an exception was thrown
MSXML6 causes applications to stop responding if an exception was thrown during node operations, such as appendChild(), insertBefore(), and moveNode().

See details >
OS Build 16299.904

January 08, 2019
KB4480978
Resolved
KB4493441
April 09, 2019
10:00 AM PT
Stop error when attempting to start SSH from WSL
A stop error occurs when attempting to start Secure Shell from Windows Subsystem for Linux with agent forwarding using a command line switch (ssh –A) or a configuration setting.

See details >
OS Build 16299.1029

March 12, 2019
KB4489886
Resolved
KB4493441
April 09, 2019
10:00 AM PT
- +
DetailsOriginating updateStatusHistory
Custom URI schemes may not start corresponding application
After installing KB4489886, custom URI schemes for application protocol handlers may not start the corresponding application for local intranet and trusted sites security zones on Internet Explorer.

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10, version 1607; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 10 Enterprise LTSB 2015; Windows 8.1; Windows 7 SP1 
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2; Windows Server 2008 R2 SP1
Resolution: This issue is resolved in KB4493440

Back to top
OS Build 16299.1029

March 12, 2019
KB4489886
Resolved
KB4493440
Resolved:
April 25, 2019
02:00 PM PT

Opened:
March 12, 2019
10:00 AM PT
Custom URI schemes may not start corresponding application
After installing KB4489886, custom URI schemes for application protocol handlers may not start the corresponding application for local intranet and trusted sites security zones on Internet Explorer.

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10, version 1607; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 10 Enterprise LTSB 2015; Windows 8.1; Windows 7 SP1 
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2; Windows Server 2008 R2 SP1
Resolution: This issue is resolved in KB4493440

Back to top
OS Build 16299.1029

March 12, 2019
KB4489886
Resolved
KB4493440
Resolved:
April 25, 2019
02:00 PM PT

Opened:
March 12, 2019
10:00 AM PT
End-user-defined characters (EUDC) may cause blue screen at startup
If you enable per font end-user-defined characters (EUDC), the system may stop working and a blue screen may appear at startup. This is not a common setting in non-Asian regions.

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10, version 1607; Windows 10 Enterprise LTSC 2016
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016
Resolution: This issue is resolved in KB4493441.

Back to top
OS Build 16299.1059

March 19, 2019
KB4489890
Resolved
KB4493441
Resolved:
April 09, 2019
10:00 AM PT

Opened:
March 19, 2019
10:00 AM PT
Stop error when attempting to start SSH from WSL
After applying KB4489886, a stop error occurs when attempting to start the Secure Shell (SSH) client program from Windows Subsystem for Linux (WSL) with agent forwarding enabled using a command line switch (ssh –A) or a configuration setting.

Affected platforms:
  • Client: Windows 10, version 1803; Windows 10, version 1709
  • Server: Windows Server, version 1803; Windows Server, version 1709
Resolution: This issue is resolved in KB4493441.

Back to top
OS Build 16299.1029

March 12, 2019
KB4489886
Resolved
KB4493441
Resolved:
April 09, 2019
10:00 AM PT

Opened:
March 12, 2019
10:00 AM PT
diff --git a/windows/release-information/status-windows-10-1809-and-windows-server-2019.yml b/windows/release-information/status-windows-10-1809-and-windows-server-2019.yml index 1a0496c699..5237a7fcb5 100644 --- a/windows/release-information/status-windows-10-1809-and-windows-server-2019.yml +++ b/windows/release-information/status-windows-10-1809-and-windows-server-2019.yml @@ -65,13 +65,13 @@ sections: - type: markdown text: "
This table offers a summary of current active issues and those issues that have been resolved in the last 30 days.

+ - - + @@ -91,8 +91,8 @@ sections: - type: markdown text: "
SummaryOriginating updateStatusLast updated
Devices with some Asian language packs installed may receive an error
After installing the KB4493509 devices with some Asian language packs installed may receive the error, \"0x800f0982 - PSFX_E_MATCHING_COMPONENT_NOT_F

See details >
OS Build 17763.437

April 09, 2019
KB4493509
Mitigated
May 03, 2019
10:59 AM PT
Printing from Microsoft Edge or other UWP apps, you may receive the error 0x80070007
Attempting to print from Microsoft Edge or other Universal Windows Platform (UWP) applications, you may receive an error.

See details >
OS Build 17763.379

March 12, 2019
KB4489899
Mitigated
May 02, 2019
04:47 PM PT
Devices with some Asian language packs installed may receive an error
After installing KB4493509, devices with some Asian language packs installed may receive the error, \"0x800f0982 - PSFX_E_MATCHING_COMPONENT_NOT_FOUND.\"

See details >
OS Build 17763.437

April 09, 2019
KB4493509
Mitigated
May 02, 2019
04:36 PM PT
System may be unresponsive after restart if ArcaBit antivirus software installed
Devices with ArcaBit antivirus software installed may become unresponsive upon restart.

See details >
OS Build 17763.437

April 09, 2019
KB4493509
Mitigated
April 25, 2019
02:00 PM PT
Custom URI schemes may not start corresponding application
Custom URI schemes for application protocol handlers may not start the corresponding application for local intranet and trusted sites in Internet Explorer.

See details >
OS Build 17763.379

March 12, 2019
KB4489899
Mitigated
April 09, 2019
10:00 AM PT
Issue using PXE to start a device from WDS
Using PXE to start a device from a WDS server configured to use Variable Window Extension may cause the connection to the WDS server to terminate prematurely.

See details >
OS Build 17763.379

March 12, 2019
KB4489899
Mitigated
April 09, 2019
10:00 AM PT
Certain operations performed on a Cluster Shared Volume may fail
Certain operations, such as rename, performed on files or folders on a Cluster Shared Volume (CSV) may fail with the error, \"STATUS_BAD_IMPERSONATION_LEVEL (0xC00000A5)\".

See details >
OS Build 17763.253

January 08, 2019
KB4480116
Mitigated
April 09, 2019
10:00 AM PT
Audio not working on monitors or TV connected to a PC via HDMI, USB, or DisplayPort
Upgrade block: Microsoft has identified issues with certain new Intel display drivers, which accidentally turn on unsupported features in Windows.

See details >
OS Build 17763.134

November 13, 2018
KB4467708
Mitigated
March 15, 2019
12:00 PM PT
Custom URI schemes may not start corresponding application
Custom URI schemes for application protocol handlers may not start the corresponding application for local intranet and trusted sites in Internet Explorer.

See details >
OS Build 17763.379

March 12, 2019
KB4489899
Resolved
KB4495667
May 03, 2019
12:40 PM PT
End-user-defined characters (EUDC) may cause blue screen at startup
If you enable per font end-user-defined characters (EUDC), the system may stop working and a blue screen may appear at startup.

See details >
OS Build 17763.404

April 02, 2019
KB4490481
Resolved
KB4493509
April 09, 2019
10:00 AM PT
Internet Explorer 11 authentication issue with multiple concurrent logons
Internet Explorer 11 users may encounter issues if two or more people use the same user account for multiple, concurrent login sessions on the same Windows Server machine.

See details >
OS Build 17763.253

January 08, 2019
KB4480116
Resolved
KB4493509
April 09, 2019
10:00 AM PT
MSXML6 may cause applications to stop responding
MSXML6 may cause applications to stop responding if an exception was thrown during node operations, such as appendChild(), insertBefore(), and moveNode().

See details >
OS Build 17763.253

January 08, 2019
KB4480116
Resolved
KB4493509
April 09, 2019
10:00 AM PT
+ -
DetailsOriginating updateStatusHistory
Devices with some Asian language packs installed may receive an error
After installing the April 2019 Cumulative Update (KB4493509), devices with some Asian language packs installed may receive the error, \"0x800f0982 - PSFX_E_MATCHING_COMPONENT_NOT_FOUND.\"

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019
  • Server: Windows Server, version 1809; Windows Server 2019
Workaround:
  1. Uninstall and reinstall any recently added language packs. For instructions, see \"Manage the input and display language settings in Windows 10\".
  2. Click Check for Updates and install the April 2019 Cumulative Update. For instructions, see \"Update Windows 10\".
Note: If reinstalling the language pack does not mitigate the issue, reset your PC as follows:
  1. Go to Settings app -> Recovery.
  2. Click on Get Started under \"Reset this PC\" recovery option.
  3. Select \"Keep my Files\".
Next steps: Microsoft is working on a resolution and will provide an update in an upcoming release.

Back to top
OS Build 17763.437

April 09, 2019
KB4493509
Mitigated
Last updated:
May 03, 2019
10:59 AM PT

Opened:
May 02, 2019
04:36 PM PT
Printing from Microsoft Edge or other UWP apps, you may receive the error 0x80070007
When attempting to print from Microsoft Edge or other Universal Windows Platform (UWP) applications you may receive the error, \"Your printer has experienced an unexpected configuration problem. 0x80070007e.\"
 
Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019
  • Server: Windows Server, version 1809; Windows Server 2019
Workaround: You can use another browser, such as Internet Explorer to print your documents.
 
Next steps: Microsoft is working on a resolution and will provide an update in an upcoming release.

Back to top
OS Build 17763.379

March 12, 2019
KB4489899
Mitigated
Last updated:
May 02, 2019
04:47 PM PT

Opened:
May 02, 2019
04:47 PM PT
Devices with some Asian language packs installed may receive an error
After installing KB4493509, devices with some Asian language packs installed may receive the error, \"0x800f0982 - PSFX_E_MATCHING_COMPONENT_NOT_FOUND.\"

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019
  • Server: Windows Server, version 1809; Windows Server 2019
Workaround:
  1. Uninstall and reinstall any recently added language packs. For instructions, see \"Manage the input and display language settings in Windows 10\".
  2. Click Check for Updates and install the April 2019 Cumulative Update. For instructions, see \"Update Windows 10\".
  3. Reset your PC:
  4. Go to Settings app -> Recovery.
  5. Click on Get Started under \"Reset this PC\" recovery option.
  6. Select \"Keep my Files\".

Next steps: Microsoft is working on a resolution and will provide an update in an upcoming release.

Back to top
OS Build 17763.437

April 09, 2019
KB4493509
Mitigated
Last updated:
May 02, 2019
04:36 PM PT

Opened:
May 02, 2019
04:36 PM PT
" @@ -111,9 +111,9 @@ sections: - type: markdown text: " - +
DetailsOriginating updateStatusHistory
Custom URI schemes may not start corresponding application
After installing KB4489899, custom URI schemes for application protocol handlers may not start the corresponding application for local intranet and trusted sites security zones on Internet Explorer.

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10, version 1607; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 10 Enterprise LTSB 2015; Windows 8.1; Windows 7 SP1 
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2; Windows Server 2008 R2 SP1
Workaround: Right-click the URL link to open it in a new window or tab, or enable Protected Mode in Internet Explorer for local intranet and trusted sites
  1. Go to Tools > Internet options > Security.
  2. Within Select a zone to view of change security settings, select Local intranet and then select Enable Protected Mode.
  3. Select Trusted Sites and then select Enable Protected Mode
  4. Select OK.
You must restart the browser after making these changes. 
 
Next steps: Microsoft is working on a resolution and will provide an update in an upcoming release. 

Back to top
OS Build 17763.379

March 12, 2019
KB4489899
Mitigated
Last updated:
April 09, 2019
10:00 AM PT

Opened:
March 12, 2019
10:00 AM PT
Issue using PXE to start a device from WDS
After installing KB4489899, there may be issues using the Preboot Execution Environment (PXE) to start a device from a Windows Deployment Services (WDS) server configured to use Variable Window Extension. This may cause the connection to the WDS server to terminate prematurely while downloading the image. This issue does not affect clients or devices that are not using Variable Window Extension. 

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1607; Windows 10 Enterprise LTSC 2016; Windows 8.1
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server 2016; Windows Server 2012 R2; Windows Server 2012
Workaround: To mitigate the issue, disable the Variable Window Extension on WDS server using one of the following options:

Option 1:
Open an Administrator Command prompt and type the following:
Wdsutil /Set-TransportServer /EnableTftpVariableWindowExtension:No 
 

Option 2:
Use the Windows Deployment Services UI to make the following adjustment: 
  1. Open Windows Deployment Services from Windows Administrative Tools. 
  2. Expand Servers and right-click a WDS server. 
  3. Open its properties and clear the Enable Variable Window Extension box on the TFTP tab.
Option 3:
Set the following registry value to 0:
HKLM\\System\\CurrentControlSet\\Services\\WDSServer\\Providers\\WDSTFTP\\EnableVariableWindowExtension  

Restart the WDSServer service after disabling the Variable Window Extension. 

Next steps: Microsoft is working on a resolution and will provide an update in an upcoming release. 

Back to top
OS Build 17763.379

March 12, 2019
KB4489899
Mitigated
Last updated:
April 09, 2019
10:00 AM PT

Opened:
March 12, 2019
10:00 AM PT
Custom URI schemes may not start corresponding application
After installing KB4489899, custom URI schemes for application protocol handlers may not start the corresponding application for local intranet and trusted sites security zones on Internet Explorer.

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10, version 1607; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 10 Enterprise LTSB 2015; Windows 8.1; Windows 7 SP1 
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2; Windows Server 2008 R2 SP1
Workaround: Right-click the URL link to open it in a new window or tab, or enable Protected Mode in Internet Explorer for local intranet and trusted sites
  1. Go to Tools > Internet options > Security.
  2. Within Select a zone to view of change security settings, select Local intranet and then select Enable Protected Mode.
  3. Select Trusted Sites and then select Enable Protected Mode
  4. Select OK.
You must restart the browser after making these changes.

Resolution: This issue is resolved in KB4495667.

Back to top
OS Build 17763.379

March 12, 2019
KB4489899
Resolved
KB4495667
Resolved:
May 03, 2019
10:00 AM PT

Opened:
March 12, 2019
10:00 AM PT
" From 8f733d3812ff46ac11d2e07e9ef7a9d47d8125e1 Mon Sep 17 00:00:00 2001 From: Dani Halfin Date: Fri, 3 May 2019 16:08:53 -0700 Subject: [PATCH 328/724] Release info preview (#115) (#116) --- .../resolved-issues-windows-10-1709.yml | 4 ++-- ...ved-issues-windows-10-1809-and-windows-server-2019.yml | 2 ++ windows/release-information/status-windows-10-1709.yml | 4 ++-- .../status-windows-10-1809-and-windows-server-2019.yml | 8 ++++---- 4 files changed, 10 insertions(+), 8 deletions(-) diff --git a/windows/release-information/resolved-issues-windows-10-1709.yml b/windows/release-information/resolved-issues-windows-10-1709.yml index e030af13f9..2893c090ed 100644 --- a/windows/release-information/resolved-issues-windows-10-1709.yml +++ b/windows/release-information/resolved-issues-windows-10-1709.yml @@ -32,7 +32,7 @@ sections: - type: markdown text: " - + @@ -62,7 +62,7 @@ sections: - type: markdown text: "
SummaryOriginating updateStatusDate resolved
Custom URI schemes may not start corresponding application
Custom URI schemes for application protocol handlers may not start the corresponding application for local intranet and trusted sites in Internet Explorer.

See details >
OS Build 16299.1029

March 12, 2019
KB4489886
Resolved
KB4493440
April 25, 2019
02:00 PM PT
Custom URI schemes may not start corresponding application
Custom URI schemes for application protocol handlers may not start the corresponding application for local intranet and trusted sites in Internet Explorer.

See details >
OS Build 16299.1029

March 12, 2019
KB4489886
Resolved
KB4493440
April 25, 2019
02:00 PM PT
End-user-defined characters (EUDC) may cause blue screen at startup
If you enable per font end-user-defined characters (EUDC), the system may stop working and a blue screen may appear at startup.

See details >
OS Build 16299.1059

March 19, 2019
KB4489890
Resolved
KB4493441
April 09, 2019
10:00 AM PT
MSXML6 causes applications to stop responding if an exception was thrown
MSXML6 causes applications to stop responding if an exception was thrown during node operations, such as appendChild(), insertBefore(), and moveNode().

See details >
OS Build 16299.904

January 08, 2019
KB4480978
Resolved
KB4493441
April 09, 2019
10:00 AM PT
Stop error when attempting to start SSH from WSL
A stop error occurs when attempting to start Secure Shell from Windows Subsystem for Linux with agent forwarding using a command line switch (ssh –A) or a configuration setting.

See details >
OS Build 16299.1029

March 12, 2019
KB4489886
Resolved
KB4493441
April 09, 2019
10:00 AM PT
- +
DetailsOriginating updateStatusHistory
Custom URI schemes may not start corresponding application
After installing KB4489886, custom URI schemes for application protocol handlers may not start the corresponding application for local intranet and trusted sites security zones on Internet Explorer.

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10, version 1607; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 10 Enterprise LTSB 2015; Windows 8.1; Windows 7 SP1 
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2; Windows Server 2008 R2 SP1
Resolution: This issue is resolved in KB4493440

Back to top
OS Build 16299.1029

March 12, 2019
KB4489886
Resolved
KB4493440
Resolved:
April 25, 2019
02:00 PM PT

Opened:
March 12, 2019
10:00 AM PT
Custom URI schemes may not start corresponding application
After installing KB4489886, custom URI schemes for application protocol handlers may not start the corresponding application for local intranet and trusted sites security zones on Internet Explorer.

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10, version 1607; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 10 Enterprise LTSB 2015; Windows 8.1; Windows 7 SP1 
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2; Windows Server 2008 R2 SP1
Resolution: This issue is resolved in KB4493440

Back to top
OS Build 16299.1029

March 12, 2019
KB4489886
Resolved
KB4493440
Resolved:
April 25, 2019
02:00 PM PT

Opened:
March 12, 2019
10:00 AM PT
End-user-defined characters (EUDC) may cause blue screen at startup
If you enable per font end-user-defined characters (EUDC), the system may stop working and a blue screen may appear at startup. This is not a common setting in non-Asian regions.

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10, version 1607; Windows 10 Enterprise LTSC 2016
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016
Resolution: This issue is resolved in KB4493441.

Back to top
OS Build 16299.1059

March 19, 2019
KB4489890
Resolved
KB4493441
Resolved:
April 09, 2019
10:00 AM PT

Opened:
March 19, 2019
10:00 AM PT
Stop error when attempting to start SSH from WSL
After applying KB4489886, a stop error occurs when attempting to start the Secure Shell (SSH) client program from Windows Subsystem for Linux (WSL) with agent forwarding enabled using a command line switch (ssh –A) or a configuration setting.

Affected platforms:
  • Client: Windows 10, version 1803; Windows 10, version 1709
  • Server: Windows Server, version 1803; Windows Server, version 1709
Resolution: This issue is resolved in KB4493441.

Back to top
OS Build 16299.1029

March 12, 2019
KB4489886
Resolved
KB4493441
Resolved:
April 09, 2019
10:00 AM PT

Opened:
March 12, 2019
10:00 AM PT
diff --git a/windows/release-information/resolved-issues-windows-10-1809-and-windows-server-2019.yml b/windows/release-information/resolved-issues-windows-10-1809-and-windows-server-2019.yml index 9e6e80d5cc..e3ea1030dd 100644 --- a/windows/release-information/resolved-issues-windows-10-1809-and-windows-server-2019.yml +++ b/windows/release-information/resolved-issues-windows-10-1809-and-windows-server-2019.yml @@ -32,6 +32,7 @@ sections: - type: markdown text: " + @@ -79,6 +80,7 @@ sections: - type: markdown text: "
SummaryOriginating updateStatusDate resolved
Custom URI schemes may not start corresponding application
Custom URI schemes for application protocol handlers may not start the corresponding application for local intranet and trusted sites in Internet Explorer.

See details >
OS Build 17763.379

March 12, 2019
KB4489899
Resolved
KB4495667
May 03, 2019
12:40 PM PT
End-user-defined characters (EUDC) may cause blue screen at startup
If you enable per font end-user-defined characters (EUDC), the system may stop working and a blue screen may appear at startup.

See details >
OS Build 17763.404

April 02, 2019
KB4490481
Resolved
KB4493509
April 09, 2019
10:00 AM PT
Internet Explorer 11 authentication issue with multiple concurrent logons
Internet Explorer 11 users may encounter issues if two or more people use the same user account for multiple, concurrent login sessions on the same Windows Server machine.

See details >
OS Build 17763.253

January 08, 2019
KB4480116
Resolved
KB4493509
April 09, 2019
10:00 AM PT
MSXML6 may cause applications to stop responding
MSXML6 may cause applications to stop responding if an exception was thrown during node operations, such as appendChild(), insertBefore(), and moveNode().

See details >
OS Build 17763.253

January 08, 2019
KB4480116
Resolved
KB4493509
April 09, 2019
10:00 AM PT
+
DetailsOriginating updateStatusHistory
Custom URI schemes may not start corresponding application
After installing KB4489899, custom URI schemes for application protocol handlers may not start the corresponding application for local intranet and trusted sites security zones on Internet Explorer.

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10, version 1607; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 10 Enterprise LTSB 2015; Windows 8.1; Windows 7 SP1 
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2; Windows Server 2008 R2 SP1
Workaround: Right-click the URL link to open it in a new window or tab, or enable Protected Mode in Internet Explorer for local intranet and trusted sites
  1. Go to Tools > Internet options > Security.
  2. Within Select a zone to view of change security settings, select Local intranet and then select Enable Protected Mode.
  3. Select Trusted Sites and then select Enable Protected Mode
  4. Select OK.
You must restart the browser after making these changes.

Resolution: This issue is resolved in KB4495667.

Back to top
OS Build 17763.379

March 12, 2019
KB4489899
Resolved
KB4495667
Resolved:
May 03, 2019
10:00 AM PT

Opened:
March 12, 2019
10:00 AM PT
Apps may stop working after selecting an audio output device other than the default
After installing KB4482887 on machines that have multiple audio devices, applications that provide advanced options for internal or external audio output devices may stop working unexpectedly. This issue occurs for users that select an audio output device different from the \"Default Audio Device\". Examples of applications that may stop working include: 
  • Windows Media Player 
  • Realtek HD Audio Manager 
  • Sound Blaster Control Panel 
Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019
  • Server: Windows Server, version 1809; Windows Server 2019
Resolution: This issue was resolved in KB4490481

Back to top
OS Build 17763.348

March 01, 2019
KB4482887
Resolved
KB4490481
Resolved:
April 02, 2019
10:00 AM PT

Opened:
March 01, 2019
10:00 AM PT
" diff --git a/windows/release-information/status-windows-10-1709.yml b/windows/release-information/status-windows-10-1709.yml index 45e3ada4b8..abdaf311b0 100644 --- a/windows/release-information/status-windows-10-1709.yml +++ b/windows/release-information/status-windows-10-1709.yml @@ -62,7 +62,7 @@ sections: - + @@ -91,7 +91,7 @@ sections: - type: markdown text: "
SummaryOriginating updateStatusLast updated
Zone transfers over TCP may fail
Zone transfers between primary and secondary DNS servers over the Transmission Control Protocol (TCP) may fail.

See details >
OS Build 16299.1127

April 25, 2019
KB4493440
Investigating
April 25, 2019
02:00 PM PT
Certain operations performed on a Cluster Shared Volume may fail
Certain operations, such as rename, performed on files or folders on a Cluster Shared Volume (CSV) may fail with the error, \"STATUS_BAD_IMPERSONATION_LEVEL (0xC00000A5)\".

See details >
OS Build 16299.904

January 08, 2019
KB4480978
Mitigated
April 25, 2019
02:00 PM PT
Custom URI schemes may not start corresponding application
Custom URI schemes for application protocol handlers may not start the corresponding application for local intranet and trusted sites in Internet Explorer.

See details >
OS Build 16299.1029

March 12, 2019
KB4489886
Resolved
KB4493440
April 25, 2019
02:00 PM PT
Custom URI schemes may not start corresponding application
Custom URI schemes for application protocol handlers may not start the corresponding application for local intranet and trusted sites in Internet Explorer.

See details >
OS Build 16299.1029

March 12, 2019
KB4489886
Resolved
KB4493440
April 25, 2019
02:00 PM PT
End-user-defined characters (EUDC) may cause blue screen at startup
If you enable per font end-user-defined characters (EUDC), the system may stop working and a blue screen may appear at startup.

See details >
OS Build 16299.1059

March 19, 2019
KB4489890
Resolved
KB4493441
April 09, 2019
10:00 AM PT
MSXML6 causes applications to stop responding if an exception was thrown
MSXML6 causes applications to stop responding if an exception was thrown during node operations, such as appendChild(), insertBefore(), and moveNode().

See details >
OS Build 16299.904

January 08, 2019
KB4480978
Resolved
KB4493441
April 09, 2019
10:00 AM PT
Stop error when attempting to start SSH from WSL
A stop error occurs when attempting to start Secure Shell from Windows Subsystem for Linux with agent forwarding using a command line switch (ssh –A) or a configuration setting.

See details >
OS Build 16299.1029

March 12, 2019
KB4489886
Resolved
KB4493441
April 09, 2019
10:00 AM PT
- +
DetailsOriginating updateStatusHistory
Custom URI schemes may not start corresponding application
After installing KB4489886, custom URI schemes for application protocol handlers may not start the corresponding application for local intranet and trusted sites security zones on Internet Explorer.

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10, version 1607; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 10 Enterprise LTSB 2015; Windows 8.1; Windows 7 SP1 
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2; Windows Server 2008 R2 SP1
Resolution: This issue is resolved in KB4493440

Back to top
OS Build 16299.1029

March 12, 2019
KB4489886
Resolved
KB4493440
Resolved:
April 25, 2019
02:00 PM PT

Opened:
March 12, 2019
10:00 AM PT
Custom URI schemes may not start corresponding application
After installing KB4489886, custom URI schemes for application protocol handlers may not start the corresponding application for local intranet and trusted sites security zones on Internet Explorer.

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10, version 1607; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 10 Enterprise LTSB 2015; Windows 8.1; Windows 7 SP1 
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2; Windows Server 2008 R2 SP1
Resolution: This issue is resolved in KB4493440

Back to top
OS Build 16299.1029

March 12, 2019
KB4489886
Resolved
KB4493440
Resolved:
April 25, 2019
02:00 PM PT

Opened:
March 12, 2019
10:00 AM PT
End-user-defined characters (EUDC) may cause blue screen at startup
If you enable per font end-user-defined characters (EUDC), the system may stop working and a blue screen may appear at startup. This is not a common setting in non-Asian regions.

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10, version 1607; Windows 10 Enterprise LTSC 2016
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016
Resolution: This issue is resolved in KB4493441.

Back to top
OS Build 16299.1059

March 19, 2019
KB4489890
Resolved
KB4493441
Resolved:
April 09, 2019
10:00 AM PT

Opened:
March 19, 2019
10:00 AM PT
Stop error when attempting to start SSH from WSL
After applying KB4489886, a stop error occurs when attempting to start the Secure Shell (SSH) client program from Windows Subsystem for Linux (WSL) with agent forwarding enabled using a command line switch (ssh –A) or a configuration setting.

Affected platforms:
  • Client: Windows 10, version 1803; Windows 10, version 1709
  • Server: Windows Server, version 1803; Windows Server, version 1709
Resolution: This issue is resolved in KB4493441.

Back to top
OS Build 16299.1029

March 12, 2019
KB4489886
Resolved
KB4493441
Resolved:
April 09, 2019
10:00 AM PT

Opened:
March 12, 2019
10:00 AM PT
diff --git a/windows/release-information/status-windows-10-1809-and-windows-server-2019.yml b/windows/release-information/status-windows-10-1809-and-windows-server-2019.yml index 1a0496c699..5237a7fcb5 100644 --- a/windows/release-information/status-windows-10-1809-and-windows-server-2019.yml +++ b/windows/release-information/status-windows-10-1809-and-windows-server-2019.yml @@ -65,13 +65,13 @@ sections: - type: markdown text: "
This table offers a summary of current active issues and those issues that have been resolved in the last 30 days.

+ - - + @@ -91,8 +91,8 @@ sections: - type: markdown text: "
SummaryOriginating updateStatusLast updated
Devices with some Asian language packs installed may receive an error
After installing the KB4493509 devices with some Asian language packs installed may receive the error, \"0x800f0982 - PSFX_E_MATCHING_COMPONENT_NOT_F

See details >
OS Build 17763.437

April 09, 2019
KB4493509
Mitigated
May 03, 2019
10:59 AM PT
Printing from Microsoft Edge or other UWP apps, you may receive the error 0x80070007
Attempting to print from Microsoft Edge or other Universal Windows Platform (UWP) applications, you may receive an error.

See details >
OS Build 17763.379

March 12, 2019
KB4489899
Mitigated
May 02, 2019
04:47 PM PT
Devices with some Asian language packs installed may receive an error
After installing KB4493509, devices with some Asian language packs installed may receive the error, \"0x800f0982 - PSFX_E_MATCHING_COMPONENT_NOT_FOUND.\"

See details >
OS Build 17763.437

April 09, 2019
KB4493509
Mitigated
May 02, 2019
04:36 PM PT
System may be unresponsive after restart if ArcaBit antivirus software installed
Devices with ArcaBit antivirus software installed may become unresponsive upon restart.

See details >
OS Build 17763.437

April 09, 2019
KB4493509
Mitigated
April 25, 2019
02:00 PM PT
Custom URI schemes may not start corresponding application
Custom URI schemes for application protocol handlers may not start the corresponding application for local intranet and trusted sites in Internet Explorer.

See details >
OS Build 17763.379

March 12, 2019
KB4489899
Mitigated
April 09, 2019
10:00 AM PT
Issue using PXE to start a device from WDS
Using PXE to start a device from a WDS server configured to use Variable Window Extension may cause the connection to the WDS server to terminate prematurely.

See details >
OS Build 17763.379

March 12, 2019
KB4489899
Mitigated
April 09, 2019
10:00 AM PT
Certain operations performed on a Cluster Shared Volume may fail
Certain operations, such as rename, performed on files or folders on a Cluster Shared Volume (CSV) may fail with the error, \"STATUS_BAD_IMPERSONATION_LEVEL (0xC00000A5)\".

See details >
OS Build 17763.253

January 08, 2019
KB4480116
Mitigated
April 09, 2019
10:00 AM PT
Audio not working on monitors or TV connected to a PC via HDMI, USB, or DisplayPort
Upgrade block: Microsoft has identified issues with certain new Intel display drivers, which accidentally turn on unsupported features in Windows.

See details >
OS Build 17763.134

November 13, 2018
KB4467708
Mitigated
March 15, 2019
12:00 PM PT
Custom URI schemes may not start corresponding application
Custom URI schemes for application protocol handlers may not start the corresponding application for local intranet and trusted sites in Internet Explorer.

See details >
OS Build 17763.379

March 12, 2019
KB4489899
Resolved
KB4495667
May 03, 2019
12:40 PM PT
End-user-defined characters (EUDC) may cause blue screen at startup
If you enable per font end-user-defined characters (EUDC), the system may stop working and a blue screen may appear at startup.

See details >
OS Build 17763.404

April 02, 2019
KB4490481
Resolved
KB4493509
April 09, 2019
10:00 AM PT
Internet Explorer 11 authentication issue with multiple concurrent logons
Internet Explorer 11 users may encounter issues if two or more people use the same user account for multiple, concurrent login sessions on the same Windows Server machine.

See details >
OS Build 17763.253

January 08, 2019
KB4480116
Resolved
KB4493509
April 09, 2019
10:00 AM PT
MSXML6 may cause applications to stop responding
MSXML6 may cause applications to stop responding if an exception was thrown during node operations, such as appendChild(), insertBefore(), and moveNode().

See details >
OS Build 17763.253

January 08, 2019
KB4480116
Resolved
KB4493509
April 09, 2019
10:00 AM PT
+ -
DetailsOriginating updateStatusHistory
Devices with some Asian language packs installed may receive an error
After installing the April 2019 Cumulative Update (KB4493509), devices with some Asian language packs installed may receive the error, \"0x800f0982 - PSFX_E_MATCHING_COMPONENT_NOT_FOUND.\"

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019
  • Server: Windows Server, version 1809; Windows Server 2019
Workaround:
  1. Uninstall and reinstall any recently added language packs. For instructions, see \"Manage the input and display language settings in Windows 10\".
  2. Click Check for Updates and install the April 2019 Cumulative Update. For instructions, see \"Update Windows 10\".
Note: If reinstalling the language pack does not mitigate the issue, reset your PC as follows:
  1. Go to Settings app -> Recovery.
  2. Click on Get Started under \"Reset this PC\" recovery option.
  3. Select \"Keep my Files\".
Next steps: Microsoft is working on a resolution and will provide an update in an upcoming release.

Back to top
OS Build 17763.437

April 09, 2019
KB4493509
Mitigated
Last updated:
May 03, 2019
10:59 AM PT

Opened:
May 02, 2019
04:36 PM PT
Printing from Microsoft Edge or other UWP apps, you may receive the error 0x80070007
When attempting to print from Microsoft Edge or other Universal Windows Platform (UWP) applications you may receive the error, \"Your printer has experienced an unexpected configuration problem. 0x80070007e.\"
 
Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019
  • Server: Windows Server, version 1809; Windows Server 2019
Workaround: You can use another browser, such as Internet Explorer to print your documents.
 
Next steps: Microsoft is working on a resolution and will provide an update in an upcoming release.

Back to top
OS Build 17763.379

March 12, 2019
KB4489899
Mitigated
Last updated:
May 02, 2019
04:47 PM PT

Opened:
May 02, 2019
04:47 PM PT
Devices with some Asian language packs installed may receive an error
After installing KB4493509, devices with some Asian language packs installed may receive the error, \"0x800f0982 - PSFX_E_MATCHING_COMPONENT_NOT_FOUND.\"

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019
  • Server: Windows Server, version 1809; Windows Server 2019
Workaround:
  1. Uninstall and reinstall any recently added language packs. For instructions, see \"Manage the input and display language settings in Windows 10\".
  2. Click Check for Updates and install the April 2019 Cumulative Update. For instructions, see \"Update Windows 10\".
  3. Reset your PC:
  4. Go to Settings app -> Recovery.
  5. Click on Get Started under \"Reset this PC\" recovery option.
  6. Select \"Keep my Files\".

Next steps: Microsoft is working on a resolution and will provide an update in an upcoming release.

Back to top
OS Build 17763.437

April 09, 2019
KB4493509
Mitigated
Last updated:
May 02, 2019
04:36 PM PT

Opened:
May 02, 2019
04:36 PM PT
" @@ -111,9 +111,9 @@ sections: - type: markdown text: " - +
DetailsOriginating updateStatusHistory
Custom URI schemes may not start corresponding application
After installing KB4489899, custom URI schemes for application protocol handlers may not start the corresponding application for local intranet and trusted sites security zones on Internet Explorer.

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10, version 1607; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 10 Enterprise LTSB 2015; Windows 8.1; Windows 7 SP1 
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2; Windows Server 2008 R2 SP1
Workaround: Right-click the URL link to open it in a new window or tab, or enable Protected Mode in Internet Explorer for local intranet and trusted sites
  1. Go to Tools > Internet options > Security.
  2. Within Select a zone to view of change security settings, select Local intranet and then select Enable Protected Mode.
  3. Select Trusted Sites and then select Enable Protected Mode
  4. Select OK.
You must restart the browser after making these changes. 
 
Next steps: Microsoft is working on a resolution and will provide an update in an upcoming release. 

Back to top
OS Build 17763.379

March 12, 2019
KB4489899
Mitigated
Last updated:
April 09, 2019
10:00 AM PT

Opened:
March 12, 2019
10:00 AM PT
Issue using PXE to start a device from WDS
After installing KB4489899, there may be issues using the Preboot Execution Environment (PXE) to start a device from a Windows Deployment Services (WDS) server configured to use Variable Window Extension. This may cause the connection to the WDS server to terminate prematurely while downloading the image. This issue does not affect clients or devices that are not using Variable Window Extension. 

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1607; Windows 10 Enterprise LTSC 2016; Windows 8.1
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server 2016; Windows Server 2012 R2; Windows Server 2012
Workaround: To mitigate the issue, disable the Variable Window Extension on WDS server using one of the following options:

Option 1:
Open an Administrator Command prompt and type the following:
Wdsutil /Set-TransportServer /EnableTftpVariableWindowExtension:No 
 

Option 2:
Use the Windows Deployment Services UI to make the following adjustment: 
  1. Open Windows Deployment Services from Windows Administrative Tools. 
  2. Expand Servers and right-click a WDS server. 
  3. Open its properties and clear the Enable Variable Window Extension box on the TFTP tab.
Option 3:
Set the following registry value to 0:
HKLM\\System\\CurrentControlSet\\Services\\WDSServer\\Providers\\WDSTFTP\\EnableVariableWindowExtension  

Restart the WDSServer service after disabling the Variable Window Extension. 

Next steps: Microsoft is working on a resolution and will provide an update in an upcoming release. 

Back to top
OS Build 17763.379

March 12, 2019
KB4489899
Mitigated
Last updated:
April 09, 2019
10:00 AM PT

Opened:
March 12, 2019
10:00 AM PT
Custom URI schemes may not start corresponding application
After installing KB4489899, custom URI schemes for application protocol handlers may not start the corresponding application for local intranet and trusted sites security zones on Internet Explorer.

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10, version 1607; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 10 Enterprise LTSB 2015; Windows 8.1; Windows 7 SP1 
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2; Windows Server 2008 R2 SP1
Workaround: Right-click the URL link to open it in a new window or tab, or enable Protected Mode in Internet Explorer for local intranet and trusted sites
  1. Go to Tools > Internet options > Security.
  2. Within Select a zone to view of change security settings, select Local intranet and then select Enable Protected Mode.
  3. Select Trusted Sites and then select Enable Protected Mode
  4. Select OK.
You must restart the browser after making these changes.

Resolution: This issue is resolved in KB4495667.

Back to top
OS Build 17763.379

March 12, 2019
KB4489899
Resolved
KB4495667
Resolved:
May 03, 2019
10:00 AM PT

Opened:
March 12, 2019
10:00 AM PT
" From 79cc2eea39f66affaf700d8efa707b82b5d8eff7 Mon Sep 17 00:00:00 2001 From: MaratMussabekov <48041687+MaratMussabekov@users.noreply.github.com> Date: Sat, 4 May 2019 17:21:18 +0500 Subject: [PATCH 329/724] update start-layout-troubleshoot.md --- windows/configuration/start-layout-troubleshoot.md | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/windows/configuration/start-layout-troubleshoot.md b/windows/configuration/start-layout-troubleshoot.md index c29f399bba..bab10f57b6 100644 --- a/windows/configuration/start-layout-troubleshoot.md +++ b/windows/configuration/start-layout-troubleshoot.md @@ -280,7 +280,7 @@ Additionally, users may see blank tiles if logon was attempted without network c ### Symptom: Start Menu issues with Tile Data Layer corruption -**Cause**: Windows 10, version 1507 through the release of version 1607 uses a database for the Tile image information. This is called the Tile Data Layer database. +**Cause**: Windows 10, version 1507 through the release of version 1607 uses a database for the Tile image information. This is called the Tile Data Layer database (The feature was deprecated in [Windows 10 1703](https://support.microsoft.com/help/4014193/features-that-are-removed-or-deprecated-in-windows-10-creators-update)). **Resolution** There are steps you can take to fix the icons, first is to confirm that is the issue that needs to be addressed. From e2bf2b2f3636e46b5669e9cce4556d9f25a90db9 Mon Sep 17 00:00:00 2001 From: Jiying Ren Date: Sun, 5 May 2019 12:25:32 -0700 Subject: [PATCH 330/724] Latest cumulative update (KB 4495667) installs automatically --- .../status-windows-10-1809-and-windows-server-2019.yml | 2 ++ 1 file changed, 2 insertions(+) diff --git a/windows/release-information/status-windows-10-1809-and-windows-server-2019.yml b/windows/release-information/status-windows-10-1809-and-windows-server-2019.yml index 5237a7fcb5..bc2c08ed65 100644 --- a/windows/release-information/status-windows-10-1809-and-windows-server-2019.yml +++ b/windows/release-information/status-windows-10-1809-and-windows-server-2019.yml @@ -65,6 +65,7 @@ sections: - type: markdown text: "
This table offers a summary of current active issues and those issues that have been resolved in the last 30 days.

+ @@ -91,6 +92,7 @@ sections: - type: markdown text: "
SummaryOriginating updateStatusLast updated
Latest cumulative update (KB 4495667) installs automatically
Reports that the optional cumulative update (KB 4495667) installs automatically.

See details >
OS Build 17763.475

May 03, 2019
KB4495667
Mitigated
May 05, 2019
12:01 PM PT
Devices with some Asian language packs installed may receive an error
After installing the KB4493509 devices with some Asian language packs installed may receive the error, \"0x800f0982 - PSFX_E_MATCHING_COMPONENT_NOT_F

See details >
OS Build 17763.437

April 09, 2019
KB4493509
Mitigated
May 03, 2019
10:59 AM PT
Printing from Microsoft Edge or other UWP apps, you may receive the error 0x80070007
Attempting to print from Microsoft Edge or other Universal Windows Platform (UWP) applications, you may receive an error.

See details >
OS Build 17763.379

March 12, 2019
KB4489899
Mitigated
May 02, 2019
04:47 PM PT
System may be unresponsive after restart if ArcaBit antivirus software installed
Devices with ArcaBit antivirus software installed may become unresponsive upon restart.

See details >
OS Build 17763.437

April 09, 2019
KB4493509
Mitigated
April 25, 2019
02:00 PM PT
+
DetailsOriginating updateStatusHistory
Latest cumulative update (KB 4495667) installs automatically
Due to a servicing side issue some users were offered 4495667 (optional update) automatically. This issue has been mitigated.

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019
  • Server: Windows Server, version 1809; Windows Server 2019
Next steps: This issue has been mitigated on the servicing side to prevent auto installing of this update. Customers do not need to take any action.

Back to top
OS Build 17763.475

May 03, 2019
KB4495667
Mitigated
Last updated:
May 05, 2019
12:01 PM PT

Opened:
May 05, 2019
12:01 PM PT
Devices with some Asian language packs installed may receive an error
After installing the April 2019 Cumulative Update (KB4493509), devices with some Asian language packs installed may receive the error, \"0x800f0982 - PSFX_E_MATCHING_COMPONENT_NOT_FOUND.\"

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019
  • Server: Windows Server, version 1809; Windows Server 2019
Workaround:
  1. Uninstall and reinstall any recently added language packs. For instructions, see \"Manage the input and display language settings in Windows 10\".
  2. Click Check for Updates and install the April 2019 Cumulative Update. For instructions, see \"Update Windows 10\".
Note: If reinstalling the language pack does not mitigate the issue, reset your PC as follows:
  1. Go to Settings app -> Recovery.
  2. Click on Get Started under \"Reset this PC\" recovery option.
  3. Select \"Keep my Files\".
Next steps: Microsoft is working on a resolution and will provide an update in an upcoming release.

Back to top
OS Build 17763.437

April 09, 2019
KB4493509
Mitigated
Last updated:
May 03, 2019
10:59 AM PT

Opened:
May 02, 2019
04:36 PM PT
Printing from Microsoft Edge or other UWP apps, you may receive the error 0x80070007
When attempting to print from Microsoft Edge or other Universal Windows Platform (UWP) applications you may receive the error, \"Your printer has experienced an unexpected configuration problem. 0x80070007e.\"
 
Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019
  • Server: Windows Server, version 1809; Windows Server 2019
Workaround: You can use another browser, such as Internet Explorer to print your documents.
 
Next steps: Microsoft is working on a resolution and will provide an update in an upcoming release.

Back to top
OS Build 17763.379

March 12, 2019
KB4489899
Mitigated
Last updated:
May 02, 2019
04:47 PM PT

Opened:
May 02, 2019
04:47 PM PT
From d021bb36b9833a9a9fc59259cbf5a43ce385b958 Mon Sep 17 00:00:00 2001 From: illfated Date: Sun, 5 May 2019 22:13:12 +0200 Subject: [PATCH 331/724] Delivery Optimization settings: copy-paste error The description content of this line has inadvertently been copy-pasted from the next line and therefore contains a wrong keyword: background Correction: background -> foreground Updates issue ticket #3416 (**Cut and paste error in the article**) --- .../deployment/update/waas-delivery-optimization-reference.md | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/windows/deployment/update/waas-delivery-optimization-reference.md b/windows/deployment/update/waas-delivery-optimization-reference.md index 582639b74e..57bdd0311c 100644 --- a/windows/deployment/update/waas-delivery-optimization-reference.md +++ b/windows/deployment/update/waas-delivery-optimization-reference.md @@ -79,7 +79,7 @@ Additional options available that control the impact Delivery Optimization has o - [Max Upload Bandwidth](#max-upload-bandwidth) controls the Delivery Optimization upload bandwidth usage. - [Monthly Upload Data Cap](#monthly-upload-data-cap) controls the amount of data a client can upload to peers each month. - [Minimum Background QoS](#minimum-background-qos) lets administrators guarantee a minimum download speed for Windows updates. This is achieved by adjusting the amount of data downloaded directly from Windows Update or WSUS servers, rather than other peers in the network. -- [Maximum Foreground Download Bandwidth](#maximum-foreground-download-bandwidth) specifies the maximum background download bandwidth that Delivery Optimization uses across all concurrent download activities as a percentage of available download bandwidth. +- [Maximum Foreground Download Bandwidth](#maximum-foreground-download-bandwidth) specifies the maximum foreground download bandwidth that Delivery Optimization uses across all concurrent download activities as a percentage of available download bandwidth. - [Maximum Background Download Bandwidth](#maximum-background-download-bandwidth) specifies the maximum background download bandwidth that Delivery Optimization uses across all concurrent download activities as a percentage of available download bandwidth. - [Set Business Hours to Limit Background Download Bandwidth](#set-business-hours-to-limit-background-download-bandwidth) specifies the maximum background download bandwidth that Delivery Optimization uses during and outside business hours across all concurrent download activities as a percentage of available download bandwidth. - [Set Business Hours to Limit Foreground Download Bandwidth](#set-business-hours-to-limit-foreground-download-bandwidth) specifies the maximum foreground download bandwidth that Delivery Optimization uses during and outside business hours across all concurrent download activities as a percentage of available download bandwidth. From 021a00f05bc8004caa3637638f9f082abec460e5 Mon Sep 17 00:00:00 2001 From: illfated Date: Sun, 5 May 2019 23:23:24 +0200 Subject: [PATCH 332/724] Reboot CSP: sentence end closing HTML tag restored Excerpt from the docs.microsoft.com page before restoring the HTML tag: > The supported operations are Execute and Get. **Schedule** Ref. closed issue ticket #3471 (**How to set null**) --- windows/client-management/mdm/reboot-csp.md | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/windows/client-management/mdm/reboot-csp.md b/windows/client-management/mdm/reboot-csp.md index 77dea602cf..f5d0d53a0f 100644 --- a/windows/client-management/mdm/reboot-csp.md +++ b/windows/client-management/mdm/reboot-csp.md @@ -30,7 +30,7 @@ The following diagram shows the Reboot configuration service provider management > [!Note]   > If this node is set to execute during a sync session, the device will reboot at the end of the sync session. -

The supported operations are Execute and Get. +

The supported operations are Execute and Get.

**Schedule**

The supported operation is Get.

From a37a05a2f0c48d518a7e5708b3f4f798f823b1b0 Mon Sep 17 00:00:00 2001 From: VLG17 <41186174+VLG17@users.noreply.github.com> Date: Mon, 6 May 2019 12:21:36 +0300 Subject: [PATCH 333/724] updated info about NDES server name https://github.com/MicrosoftDocs/windows-itpro-docs/issues/2450 --- .../hello-for-business/hello-hybrid-aadj-sso-cert.md | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/windows/security/identity-protection/hello-for-business/hello-hybrid-aadj-sso-cert.md b/windows/security/identity-protection/hello-for-business/hello-hybrid-aadj-sso-cert.md index b571ee817f..a5d222346e 100644 --- a/windows/security/identity-protection/hello-for-business/hello-hybrid-aadj-sso-cert.md +++ b/windows/security/identity-protection/hello-for-business/hello-hybrid-aadj-sso-cert.md @@ -425,7 +425,7 @@ Sign-in a workstation with access equivalent to a _domain user_. 3. Under **MANAGE**, click **Application proxy**. 4. Click **Configure an app**. 5. Under **Basic Settings** next to **Name**, type **WHFB NDES 01**. Choose a name that correlates this Azure AD Application Proxy setting with the on-premises NDES server. Each NDES server must have its own Azure AD Application Proxy as two NDES servers cannot share the same internal URL. -6. Next to **Internal Url**, type the internal fully qualified DNS name of the NDES server associated with this Azure AD Application Proxy. For example, https://ndes.corp.mstepdemo.net). This must match the internal DNS name of the NDES server and ensure you prefix the Url with **https**. +6. Next to **Internal Url**, type the internal fully qualified DNS name of the NDES server associated with this Azure AD Application Proxy. For example, https://ndes.corp.mstepdemo.net). This must match the primary hostname (AD Computer Account name) of the NDES server and ensure you prefix the Url with **https**. 7. Under **Internal Url**, select **https://** from the first list. In the text box next to **https://**, type the hostname you want to use as your external hostname for the Azure AD Application Proxy. In the list next to the hostname you typed, select a DNS suffix you want to use externally for the Azure AD Application Proxy. It is recommended to use the default, -[tenantName].msapproxy.net where **[tenantName]** is your current Azure Active Directory tenant name (-mstephendemo.msappproxy.net). ![Azure NDES Application Proxy Configuration](images/aadjcert/azureconsole-appproxyconfig.png) 8. Select **Passthrough** from the **Pre Authentication** list. From 621e845fe599d4e1b7f4f94be41ac938c7328a46 Mon Sep 17 00:00:00 2001 From: Malin De Silva Date: Mon, 6 May 2019 15:02:11 +0530 Subject: [PATCH 334/724] added skipping auto enrollment info --- windows/deployment/windows-autopilot/enrollment-status.md | 2 ++ 1 file changed, 2 insertions(+) diff --git a/windows/deployment/windows-autopilot/enrollment-status.md b/windows/deployment/windows-autopilot/enrollment-status.md index d2e6471454..895cf49881 100644 --- a/windows/deployment/windows-autopilot/enrollment-status.md +++ b/windows/deployment/windows-autopilot/enrollment-status.md @@ -20,6 +20,8 @@ ms.topic: article The Windows Autopilot Enrollment Status page displaying the status of the complete device configuration process. Incorporating feedback from customers, this provides information to the user to show that the device is being set up and can be configured to prevent access to the desktop until the configuration is complete. ![Enrollment status page](images/enrollment-status-page.png) + +From Windows 10 version 1803 onwards, you can opt-out of the account setup phase. When it is skipped, the settings will be applied for the users when as they access their desktop for the first time. ## Available settings From 3d6346be58ff3183923271ae7c7646c34e539fda Mon Sep 17 00:00:00 2001 From: VLG17 <41186174+VLG17@users.noreply.github.com> Date: Mon, 6 May 2019 12:49:49 +0300 Subject: [PATCH 335/724] removed obsolete information https://github.com/MicrosoftDocs/windows-itpro-docs/issues/3085 --- ...policy-csp-localpoliciessecurityoptions.md | 131 ------------------ 1 file changed, 131 deletions(-) diff --git a/windows/client-management/mdm/policy-csp-localpoliciessecurityoptions.md b/windows/client-management/mdm/policy-csp-localpoliciessecurityoptions.md index b1594d5d38..dc9a2c4e0c 100644 --- a/windows/client-management/mdm/policy-csp-localpoliciessecurityoptions.md +++ b/windows/client-management/mdm/policy-csp-localpoliciessecurityoptions.md @@ -24,12 +24,6 @@ ms.date: 06/26/2018
LocalPoliciesSecurityOptions/Accounts_BlockMicrosoftAccounts
-
- LocalPoliciesSecurityOptions/Accounts_EnableAdministratorAccountStatus -
-
- LocalPoliciesSecurityOptions/Accounts_EnableGuestAccountStatus -
LocalPoliciesSecurityOptions/Accounts_LimitLocalAccountUseOfBlankPasswordsToConsoleLogonOnly
@@ -255,131 +249,6 @@ The following list shows the supported values:
- -**LocalPoliciesSecurityOptions/Accounts_EnableAdministratorAccountStatus** - - - - - - - - - - - - - - - - - - - - - -
HomeProBusinessEnterpriseEducationMobileMobile Enterprise
cross markcheck mark3check mark3check mark3check mark3cross markcross mark
- - - -[Scope](./policy-configuration-service-provider.md#policy-scope): - -> [!div class = "checklist"] -> * Device - -
- - - -This security setting determines whether the local Administrator account is enabled or disabled. - -If you try to reenable the Administrator account after it has been disabled, and if the current Administrator password does not meet the password requirements, you cannot reenable the account. In this case, an alternative member of the Administrators group must reset the password on the Administrator account. For information about how to reset a password, see To reset a password. -Disabling the Administrator account can become a maintenance issue under certain circumstances. - -Under Safe Mode boot, the disabled Administrator account will only be enabled if the machine is non-domain joined and there are no other local active administrator accounts. If the computer is domain joined the disabled administrator will not be enabled. - -Default: Disabled. - -Value type is integer. Supported operations are Add, Get, Replace, and Delete. - - - -GP Info: -- GP English name: *Accounts: Administrator account status* -- GP path: *Windows Settings/Security Settings/Local Policies/Security Options* - - - -Valid values: -- 0 - local Administrator account is disabled -- 1 - local Administrator account is enabled - - - - -
- - -**LocalPoliciesSecurityOptions/Accounts_EnableGuestAccountStatus** - - - - - - - - - - - - - - - - - - - - - -
HomeProBusinessEnterpriseEducationMobileMobile Enterprise
cross markcheck mark3check mark3check mark3check mark3cross markcross mark
- - - -[Scope](./policy-configuration-service-provider.md#policy-scope): - -> [!div class = "checklist"] -> * Device - -
- - - -This security setting determines if the Guest account is enabled or disabled. - -Default: Disabled. - -Note: If the Guest account is disabled and the security option Network Access: Sharing and Security Model for local accounts is set to Guest Only, network logons, such as those performed by the Microsoft Network Server (SMB Service), will fail. - -Value type is integer. Supported operations are Add, Get, Replace, and Delete. - - - -GP Info: -- GP English name: *Accounts: Guest account status* -- GP path: *Windows Settings/Security Settings/Local Policies/Security Options* - - - -Valid values: -- 0 - local Guest account is disabled -- 1 - local Guest account is enabled - - - - -
- **LocalPoliciesSecurityOptions/Accounts_LimitLocalAccountUseOfBlankPasswordsToConsoleLogonOnly** From 9873e82524118009a405dc1c5f523587aef8bcca Mon Sep 17 00:00:00 2001 From: MaratMussabekov <48041687+MaratMussabekov@users.noreply.github.com> Date: Mon, 6 May 2019 14:56:41 +0500 Subject: [PATCH 336/724] update hello-cert-trust-deploy-mfa.md --- .../hello-for-business/hello-cert-trust-deploy-mfa.md | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/windows/security/identity-protection/hello-for-business/hello-cert-trust-deploy-mfa.md b/windows/security/identity-protection/hello-for-business/hello-cert-trust-deploy-mfa.md index afee1b6159..3c90a6c465 100644 --- a/windows/security/identity-protection/hello-for-business/hello-cert-trust-deploy-mfa.md +++ b/windows/security/identity-protection/hello-for-business/hello-cert-trust-deploy-mfa.md @@ -23,7 +23,7 @@ ms.date: 08/19/2018 - Certificate trust -On-premises deployments must use on-premises MFA Server that provides an AD FS Multifactor authentication adapter. It could be Azure Multi-Factor Authentication Server or third-party MFA solution. +On-premises deployments must use an on-premises MFA Server that provides an AD FS Multifactor authentication adapter. It can be an Azure Multi-Factor Authentication Server or a third-party MFA solution. >[!TIP] >Please make sure you've read [Validate and Deploy Multifactor Authentication Services (MFA)](hello-cert-trust-validate-deploy-mfa.md) before proceeding any further. From 81c924a15f51467a0816b9b0e974c0af8087fceb Mon Sep 17 00:00:00 2001 From: MaratMussabekov <48041687+MaratMussabekov@users.noreply.github.com> Date: Mon, 6 May 2019 15:38:54 +0500 Subject: [PATCH 337/724] update waas-restart.md --- windows/deployment/update/waas-restart.md | 6 +++++- 1 file changed, 5 insertions(+), 1 deletion(-) diff --git a/windows/deployment/update/waas-restart.md b/windows/deployment/update/waas-restart.md index 13c1dce96d..fb98782087 100644 --- a/windows/deployment/update/waas-restart.md +++ b/windows/deployment/update/waas-restart.md @@ -42,6 +42,9 @@ When **Configure Automatic Updates** is enabled in Group Policy, you can enable - **Turn off auto-restart for updates during active hours** prevents automatic restart during active hours. - **No auto-restart with logged on users for scheduled automatic updates installations** prevents automatic restart when a user is signed in. If a user schedules the restart in the update notification, the device will restart at the time the user specifies even if a user is signed in at the time. This policy only applies when **Configure Automatic Updates** is set to option **4-Auto download and schedule the install**. +>[!NOTE] +>In case of using Remote Desktop connection, only active RDP sessions are considered as logged on users. Devices, that do not have locally logged on users or active RDP sessions, will be restarted. + You can also use Registry, to prevent automatic restarts when a user is signed in. Under **HKLM\Software\Policies\Microsoft\Windows\WindowsUpdate\AU**, set **AuOptions** to **4** and enable **NoAutoRebootWithLoggedOnUsers**. As with Group Policy, if a user schedules the restart in the update notification, it will override this setting. For a detailed description of these registry keys, see [Registry keys used to manage restart](#registry-keys-used-to-manage-restart). @@ -159,8 +162,9 @@ In the Group Policy editor, you will see a number of policy settings that pertai >[!NOTE] >You can only choose one path for restart behavior. -> >If you set conflicting restart policies, the actual restart behavior may not be what you expected. +>In case of using RDP, only active RDP sessions are considered as logged on users. + ## Registry keys used to manage restart The following tables list registry values that correspond to the Group Policy settings for controlling restarts after updates in Windows 10. From 4545c71e37eb683049c2c256523a5b425876fe22 Mon Sep 17 00:00:00 2001 From: MaratMussabekov <48041687+MaratMussabekov@users.noreply.github.com> Date: Mon, 6 May 2019 15:44:44 +0500 Subject: [PATCH 338/724] update waas-restart.md --- windows/deployment/update/waas-restart.md | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/windows/deployment/update/waas-restart.md b/windows/deployment/update/waas-restart.md index fb98782087..6d11b20ee9 100644 --- a/windows/deployment/update/waas-restart.md +++ b/windows/deployment/update/waas-restart.md @@ -43,7 +43,7 @@ When **Configure Automatic Updates** is enabled in Group Policy, you can enable - **No auto-restart with logged on users for scheduled automatic updates installations** prevents automatic restart when a user is signed in. If a user schedules the restart in the update notification, the device will restart at the time the user specifies even if a user is signed in at the time. This policy only applies when **Configure Automatic Updates** is set to option **4-Auto download and schedule the install**. >[!NOTE] ->In case of using Remote Desktop connection, only active RDP sessions are considered as logged on users. Devices, that do not have locally logged on users or active RDP sessions, will be restarted. +>In case of using Remote Desktop Protocol connections, only active RDP sessions are considered as logged on users. Devices, that do not have locally logged on users or active RDP sessions, will be restarted. You can also use Registry, to prevent automatic restarts when a user is signed in. Under **HKLM\Software\Policies\Microsoft\Windows\WindowsUpdate\AU**, set **AuOptions** to **4** and enable **NoAutoRebootWithLoggedOnUsers**. As with Group Policy, if a user schedules the restart in the update notification, it will override this setting. From 80b15d0cc524e910cb285465199a5b765e87f121 Mon Sep 17 00:00:00 2001 From: MaratMussabekov <48041687+MaratMussabekov@users.noreply.github.com> Date: Mon, 6 May 2019 17:34:28 +0500 Subject: [PATCH 339/724] update activate-using-active-directory-based-activation-client.md source: [KMS Activation for Windows Server 2016](https://blogs.technet.microsoft.com/askpfeplat/2016/10/24/kms-activation-for-windows-server-2016/) --- .../activate-using-active-directory-based-activation-client.md | 1 + 1 file changed, 1 insertion(+) diff --git a/windows/deployment/volume-activation/activate-using-active-directory-based-activation-client.md b/windows/deployment/volume-activation/activate-using-active-directory-based-activation-client.md index 03e0029f83..ddbabe01f8 100644 --- a/windows/deployment/volume-activation/activate-using-active-directory-based-activation-client.md +++ b/windows/deployment/volume-activation/activate-using-active-directory-based-activation-client.md @@ -20,6 +20,7 @@ ms.topic: article - Windows 8 - Windows Server 2012 R2 - Windows Server 2012 +- Windows Server 2016 **Looking for retail activation?** - [Get Help Activating Microsoft Windows](https://go.microsoft.com/fwlink/p/?LinkId=618644) From 0b8a2c84a141eee6516ae775782e75760e44de38 Mon Sep 17 00:00:00 2001 From: martyav Date: Mon, 6 May 2019 10:52:59 -0400 Subject: [PATCH 340/724] cross links within mdatp-mac pages --- ...osoft-defender-atp-mac-install-manually.md | 17 ++++++++++++++++- ...ft-defender-atp-mac-install-with-intune.md | 19 +++++++++++++++++-- ...soft-defender-atp-mac-install-with-jamf.md | 19 ++++++++++++++++--- .../microsoft-defender-atp-mac-resources.md | 13 +++++++++---- .../microsoft-defender-atp-mac.md | 12 ++++++++---- 5 files changed, 66 insertions(+), 14 deletions(-) diff --git a/windows/security/threat-protection/windows-defender-antivirus/microsoft-defender-atp-mac-install-manually.md b/windows/security/threat-protection/windows-defender-antivirus/microsoft-defender-atp-mac-install-manually.md index 4fbed04668..27b3a8f924 100644 --- a/windows/security/threat-protection/windows-defender-antivirus/microsoft-defender-atp-mac-install-manually.md +++ b/windows/security/threat-protection/windows-defender-antivirus/microsoft-defender-atp-mac-install-manually.md @@ -26,6 +26,13 @@ ms.topic: #conceptual >[!IMPORTANT] >Some information relates to prereleased product which may be substantially modified before it's commercially released. Microsoft makes no warranties, express or implied, with respect to the information provided here. +This topic describes how to install Microsoft Defender ATP for Mac. It supports the preview program and the information here is subject to change. +Microsoft Defender ATP for Mac is not yet widely available, and this topic only applies to enterprise customers who have been accepted into the preview program. + +## Prerequisites and system requirements + +Before you get started, please see [the main Microsoft Defender ATP for Mac page]((microsoft-defender-atp.md)) for a description of prerequisites and system requirements for the current software version. + ## Download installation and onboarding packages Download the installation and onboarding packages from Windows Defender Security Center: @@ -127,4 +134,12 @@ Important tasks, such as controlling product settings and triggering on-demand s |Protection |Do a quick scan |`mdatp scan --quick` | |Protection |Do a full scan |`mdatp scan --full` | |Protection |Cancel an ongoing on-demand scan |`mdatp scan --cancel` | -|Protection |Request a definition update |`mdatp --signature-update` | \ No newline at end of file +|Protection |Request a definition update |`mdatp --signature-update` | + +## Logging installation issues + +See [Logging installation issues](microsoft-defender-atp-mac-resources#Logging-installation-issues) for more information on how to find the automatically generated log that is created by the installer when an error occurs. + +## Uninstallation + +See [Uninstalling](microsoft-defender-atp-mac-resources#Uninstalling) for details on how to remove Windows Defender ATP for Mac from client devices. \ No newline at end of file diff --git a/windows/security/threat-protection/windows-defender-antivirus/microsoft-defender-atp-mac-install-with-intune.md b/windows/security/threat-protection/windows-defender-antivirus/microsoft-defender-atp-mac-install-with-intune.md index 5cd1e22a19..8af90fded1 100644 --- a/windows/security/threat-protection/windows-defender-antivirus/microsoft-defender-atp-mac-install-with-intune.md +++ b/windows/security/threat-protection/windows-defender-antivirus/microsoft-defender-atp-mac-install-with-intune.md @@ -22,10 +22,17 @@ ms.topic: #conceptual **Applies to:** [Windows Defender Advanced Threat Protection (Windows Defender ATP) for Mac](https://go.microsoft.com/fwlink/p/?linkid=???To-Add???) - + >[!IMPORTANT] >Some information relates to prereleased product which may be substantially modified before it's commercially released. Microsoft makes no warranties, express or implied, with respect to the information provided here. +This topic describes how to install Microsoft Defender ATP for Mac. It supports the preview program and the information here is subject to change. +Microsoft Defender ATP for Mac is not yet widely available, and this topic only applies to enterprise customers who have been accepted into the preview program. + +## Prerequisites and system requirements + +Before you get started, please see [the main Microsoft Defender ATP for Mac page]((microsoft-defender-atp.md)) for a description of prerequisites and system requirements for the current software version. + ## Download installation and onboarding packages Download the installation and onboarding packages from Windows Defender Security Center: @@ -155,4 +162,12 @@ After Intune changes are propagated to the enrolled machines, you'll see it on t 4. wdav-config and wdav-kext are system configuration profiles that we added in Intune. 5. You should also see the Microsoft Defender icon in the top-right corner: - ![Microsoft Defender icon in status bar screenshot](images/MDATP_Icon_Bar.png) \ No newline at end of file + ![Microsoft Defender icon in status bar screenshot](images/MDATP_Icon_Bar.png) + +## Logging installation issues + +See [Logging installation issues](microsoft-defender-atp-mac-resources#Logging-installation-issues) for more information on how to find the automatically generated log that is created by the installer when an error occurs. + +## Uninstallation + +See [Uninstalling](microsoft-defender-atp-mac-resources#Uninstalling) for details on how to remove Windows Defender ATP for Mac from client devices. \ No newline at end of file diff --git a/windows/security/threat-protection/windows-defender-antivirus/microsoft-defender-atp-mac-install-with-jamf.md b/windows/security/threat-protection/windows-defender-antivirus/microsoft-defender-atp-mac-install-with-jamf.md index 82aaf8ffe2..8837b3bcc5 100644 --- a/windows/security/threat-protection/windows-defender-antivirus/microsoft-defender-atp-mac-install-with-jamf.md +++ b/windows/security/threat-protection/windows-defender-antivirus/microsoft-defender-atp-mac-install-with-jamf.md @@ -26,9 +26,14 @@ ms.topic: #conceptual >[!IMPORTANT] >Some information relates to prereleased product which may be substantially modified before it's commercially released. Microsoft makes no warranties, express or implied, with respect to the information provided here. -## Prerequsites +This topic describes how to install Microsoft Defender ATP for Mac. It supports the preview program and the information here is subject to change. +Microsoft Defender ATP for Mac is not yet widely available, and this topic only applies to enterprise customers who have been accepted into the preview program. -You need to be familiar with JAMF administration tasks, have a JAMF tenant, and know how to deploy packages. This includes a properly configured distribution point. JAMF has many alternative ways to complete the same task. These instructions provide you an example for most common processes. Your organization might use a different workflow. +## Prerequisites and system requirements + +Before you get started, please see [the main Microsoft Defender ATP for Mac page]((microsoft-defender-atp.md)) for a description of prerequisites and system requirements for the current software version. + +In addition, for JAMF deployment, you need to be familiar with JAMF administration tasks, have a JAMF tenant, and know how to deploy packages. This includes having a properly configured distribution point. JAMF has many ways to complete the same task. These instructions provide an example for most common processes. Your organization might use a different workflow. ## Download installation and onboarding packages @@ -192,4 +197,12 @@ You can check that machines are correctly onboarded by creating a script. For ex sudo /Library/Extensions/wdavkext.kext/Contents/Resources/Tools/wdavconfig.py | grep -E 'orgid effective : [-a-zA-Z0-9]+' ``` -This script returns 0 if Microsoft Defender ATP is registered with the Windows Defender ATP service, and another exit code if it is not installed or registered. \ No newline at end of file +This script returns 0 if Microsoft Defender ATP is registered with the Windows Defender ATP service, and another exit code if it is not installed or registered. + +## Logging installation issues + +See [Logging installation issues](microsoft-defender-atp-mac-resources#Logging-installation-issues) for more information on how to find the automatically generated log that is created by the installer when an error occurs. + +## Uninstallation + +See [Uninstalling](microsoft-defender-atp-mac-resources#Uninstalling) for details on how to remove Windows Defender ATP for Mac from client devices. \ No newline at end of file diff --git a/windows/security/threat-protection/windows-defender-antivirus/microsoft-defender-atp-mac-resources.md b/windows/security/threat-protection/windows-defender-antivirus/microsoft-defender-atp-mac-resources.md index 4de5bdb96c..09a4dcceae 100644 --- a/windows/security/threat-protection/windows-defender-antivirus/microsoft-defender-atp-mac-resources.md +++ b/windows/security/threat-protection/windows-defender-antivirus/microsoft-defender-atp-mac-resources.md @@ -17,7 +17,7 @@ ms.collection: M365-security-compliance ms.topic: #conceptual --- -## Collecting diagnostic information +# Resources **Applies to:** @@ -26,6 +26,11 @@ ms.topic: #conceptual >[!IMPORTANT] >Some information relates to prereleased product which may be substantially modified before it's commercially released. Microsoft makes no warranties, express or implied, with respect to the information provided here. +This topic describes how to use, and details about, Microsoft Defender ATP for Mac. It supports the preview program and the information here is subject to change. +Microsoft Defender ATP for Mac is not yet widely available, and this topic only applies to enterprise customers who have been accepted into the preview program. + +## Collecting diagnostic information + If you can reproduce a problem, please increase the logging level, run the system for some time, and restore the logging level to the default. 1) Increase logging level: @@ -57,7 +62,7 @@ If you can reproduce a problem, please increase the logging level, run the syste Operation succeeded ``` -### Installation issues +## Logging installation issues If an error occurs during installation, the installer will only report a general failure. @@ -65,13 +70,13 @@ The detailed log will be saved to /Library/Logs/Microsoft/wdav.install.log. If y ## Uninstalling -There are several ways to uninstall Microsoft Defender ATP for Mac. Please note that while centrally managed uninstall is available for JAMF, it is not yet available for Intune. +There are several ways to uninstall Microsoft Defender ATP for Mac. Please note that while centrally managed uninstall is available on JAMF, it is not yet available for Microsoft Intune. ### Within the GUI - Open **Finder > Applications**. Right click on **Microsoft Defender ATP > Move to Trash**. -### From the command line: +### From the command line - ```sudo rm -rf '/Applications/Microsoft Defender ATP'``` diff --git a/windows/security/threat-protection/windows-defender-antivirus/microsoft-defender-atp-mac.md b/windows/security/threat-protection/windows-defender-antivirus/microsoft-defender-atp-mac.md index 5132b03e9b..af6205c2ca 100644 --- a/windows/security/threat-protection/windows-defender-antivirus/microsoft-defender-atp-mac.md +++ b/windows/security/threat-protection/windows-defender-antivirus/microsoft-defender-atp-mac.md @@ -44,9 +44,9 @@ In general you'll need to take the following steps: - Ensure you have a Windows Defender ATP subscription and have access to the Windows Defender ATP Portal - Deploy Microsoft Defender ATP for Mac using one of the following deployment methods: - - [Microsoft Intune-based deployment](separate-page-url) - - [JAMF-based deployment](seperate-page-url) - - [Manual deployment](seperate-page-url) + - [Microsoft Intune-based deployment](microsoft-defender-atp-mac-install-with-intune) + - [JAMF-based deployment](microsoft-defender-atp-mac-install-with-jamf) + - [Manual deployment](microsoft-defender-atp-mac-install-manually) ### Prerequisites @@ -80,4 +80,8 @@ To test that a connection is not blocked, open `https://x.cp.wd.microsoft.com/ap ``` We recommend to keep [System Integrity Protection](https://support.apple.com/en-us/HT204899) ([Wiki](https://en.wikipedia.org/wiki/System_Integrity_Protection)) enabled (default setting) on client machines. -SIP is a built-in macOS security feature that prevents low-level tampering with the OS. \ No newline at end of file +SIP is a built-in macOS security feature that prevents low-level tampering with the OS. + +## Resources + +For further information on logging, uninstalling, the ATP portal, or known issues, see our [Resources](microsoft-defender-atp-mac-resources) page. \ No newline at end of file From 5dda164f30955b84fc13ffcbb76b2d072d58f6d9 Mon Sep 17 00:00:00 2001 From: cbelcher00 <32375431+cbelcher00@users.noreply.github.com> Date: Mon, 6 May 2019 12:36:24 -0500 Subject: [PATCH 341/724] Added Note to Auto-login section --- windows/configuration/kiosk-prepare.md | 3 +++ 1 file changed, 3 insertions(+) diff --git a/windows/configuration/kiosk-prepare.md b/windows/configuration/kiosk-prepare.md index 436a96f0a8..79761a6c5d 100644 --- a/windows/configuration/kiosk-prepare.md +++ b/windows/configuration/kiosk-prepare.md @@ -57,6 +57,9 @@ Logs can help you [troubleshoot issues](multi-app-kiosk-troubleshoot.md) kiosk i In addition to the settings in the table, you may want to set up **automatic logon** for your kiosk device. When your kiosk device restarts, whether from an update or power outage, you can sign in the assigned access account manually or you can configure the device to sign in to the assigned access account automatically. Make sure that Group Policy settings applied to the device do not prevent automatic sign in. +>[!NOTE] +>If you are using a Windows 10 and later device restriction CSP to set "Preferred Azure AD tenant domain", this will break the "User logon type" auto-login feature of the Kiosk profile. + >[!TIP] >If you use the [kiosk wizard in Windows Configuration Designer](kiosk-single-app.md#wizard) or [XML in a provisioning package](lock-down-windows-10-to-specific-apps.md) to configure your kiosk, you can set an account to sign in automatically in the wizard or XML. From 42695d0f6c9c8160c0f7a2d5a0305d457a0d98a1 Mon Sep 17 00:00:00 2001 From: MaratMussabekov <48041687+MaratMussabekov@users.noreply.github.com> Date: Mon, 6 May 2019 23:34:21 +0500 Subject: [PATCH 342/724] update waas-restart.md --- windows/deployment/update/waas-restart.md | 6 +++--- 1 file changed, 3 insertions(+), 3 deletions(-) diff --git a/windows/deployment/update/waas-restart.md b/windows/deployment/update/waas-restart.md index 6d11b20ee9..e7e1866acc 100644 --- a/windows/deployment/update/waas-restart.md +++ b/windows/deployment/update/waas-restart.md @@ -42,8 +42,8 @@ When **Configure Automatic Updates** is enabled in Group Policy, you can enable - **Turn off auto-restart for updates during active hours** prevents automatic restart during active hours. - **No auto-restart with logged on users for scheduled automatic updates installations** prevents automatic restart when a user is signed in. If a user schedules the restart in the update notification, the device will restart at the time the user specifies even if a user is signed in at the time. This policy only applies when **Configure Automatic Updates** is set to option **4-Auto download and schedule the install**. ->[!NOTE] ->In case of using Remote Desktop Protocol connections, only active RDP sessions are considered as logged on users. Devices, that do not have locally logged on users or active RDP sessions, will be restarted. +> [!NOTE] +> When using Remote Desktop Protocol connections, only active RDP sessions are considered as logged on users. Devices, that do not have locally logged on users, or active RDP sessions, will be restarted. You can also use Registry, to prevent automatic restarts when a user is signed in. Under **HKLM\Software\Policies\Microsoft\Windows\WindowsUpdate\AU**, set **AuOptions** to **4** and enable **NoAutoRebootWithLoggedOnUsers**. As with Group Policy, if a user schedules the restart in the update notification, it will override this setting. @@ -163,7 +163,7 @@ In the Group Policy editor, you will see a number of policy settings that pertai >[!NOTE] >You can only choose one path for restart behavior. >If you set conflicting restart policies, the actual restart behavior may not be what you expected. ->In case of using RDP, only active RDP sessions are considered as logged on users. +>When using RDP, only active RDP sessions are considered as logged on users. ## Registry keys used to manage restart From 3f848033697c90f18b6efc4065e5c5fc76126284 Mon Sep 17 00:00:00 2001 From: MaratMussabekov <48041687+MaratMussabekov@users.noreply.github.com> Date: Mon, 6 May 2019 23:36:43 +0500 Subject: [PATCH 343/724] update waas-restart.md --- windows/deployment/update/waas-restart.md | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/windows/deployment/update/waas-restart.md b/windows/deployment/update/waas-restart.md index e7e1866acc..ee8f3c4fde 100644 --- a/windows/deployment/update/waas-restart.md +++ b/windows/deployment/update/waas-restart.md @@ -43,7 +43,7 @@ When **Configure Automatic Updates** is enabled in Group Policy, you can enable - **No auto-restart with logged on users for scheduled automatic updates installations** prevents automatic restart when a user is signed in. If a user schedules the restart in the update notification, the device will restart at the time the user specifies even if a user is signed in at the time. This policy only applies when **Configure Automatic Updates** is set to option **4-Auto download and schedule the install**. > [!NOTE] -> When using Remote Desktop Protocol connections, only active RDP sessions are considered as logged on users. Devices, that do not have locally logged on users, or active RDP sessions, will be restarted. +> When using Remote Desktop Protocol connections, only active RDP sessions are considered as logged on users. Devices that do not have locally logged on users, or active RDP sessions, will be restarted. You can also use Registry, to prevent automatic restarts when a user is signed in. Under **HKLM\Software\Policies\Microsoft\Windows\WindowsUpdate\AU**, set **AuOptions** to **4** and enable **NoAutoRebootWithLoggedOnUsers**. As with Group Policy, if a user schedules the restart in the update notification, it will override this setting. From c45366c82056f6caecedabec9a79feb00dbab7e2 Mon Sep 17 00:00:00 2001 From: ManikaDhiman Date: Mon, 6 May 2019 11:43:34 -0700 Subject: [PATCH 344/724] Added 19H1 Power policies --- .../policy-configuration-service-provider.md | 60 ++ .../client-management/mdm/policy-csp-power.md | 975 +++++++++++++++++- 2 files changed, 1029 insertions(+), 6 deletions(-) diff --git a/windows/client-management/mdm/policy-configuration-service-provider.md b/windows/client-management/mdm/policy-configuration-service-provider.md index a27926a537..a565731cbb 100644 --- a/windows/client-management/mdm/policy-configuration-service-provider.md +++ b/windows/client-management/mdm/policy-configuration-service-provider.md @@ -2413,6 +2413,14 @@ The following diagram shows the Policy configuration service provider in tree fo
Power/DisplayOffTimeoutPluggedIn
+
+ Power/EnergySaverBatteryThresholdOnBattery +
+
+ Power/EnergySaverBatteryThresholdPluggedIn +
Power/HibernateTimeoutOnBattery
@@ -2425,12 +2433,52 @@ The following diagram shows the Policy configuration service provider in tree fo
Power/RequirePasswordWhenComputerWakesPluggedIn
+
+ Power/SelectLidCloseActionOnBattery +
+
+ Power/SelectLidCloseActionPluggedIn +
+
+ Power/SelectPowerButtonActionOnBattery +
+
+ Power/SelectPowerButtonActionPluggedIn +
+
+ Power/SelectSleepButtonActionOnBattery +
+
+ Power/SelectSleepButtonActionPluggedIn +
Power/StandbyTimeoutOnBattery
Power/StandbyTimeoutPluggedIn
+
+ Power/TurnOffHybridSleepOnBattery +
+
+ Power/TurnOffHybridSleepPluggedIn +
+
+ Power/UnattendedSleepTimeoutOnBattery +
+
+ Power/UnattendedSleepTimeoutPluggedIn +
### Printers policies @@ -4069,12 +4117,24 @@ The following diagram shows the Policy configuration service provider in tree fo - [Power/AllowStandbyWhenSleepingPluggedIn](./policy-csp-power.md#power-allowstandbywhensleepingpluggedin) - [Power/DisplayOffTimeoutOnBattery](./policy-csp-power.md#power-displayofftimeoutonbattery) - [Power/DisplayOffTimeoutPluggedIn](./policy-csp-power.md#power-displayofftimeoutpluggedin) +- [Power/EnergySaverBatteryThresholdOnBattery](./policy-csp-power.md#power-energysaverbatterythresholdonbattery) +- [Power/EnergySaverBatteryThresholdPluggedIn](./policy-csp-power.md#power-energysaverbatterythresholdpluggedin) - [Power/HibernateTimeoutOnBattery](./policy-csp-power.md#power-hibernatetimeoutonbattery) - [Power/HibernateTimeoutPluggedIn](./policy-csp-power.md#power-hibernatetimeoutpluggedin) - [Power/RequirePasswordWhenComputerWakesOnBattery](./policy-csp-power.md#power-requirepasswordwhencomputerwakesonbattery) - [Power/RequirePasswordWhenComputerWakesPluggedIn](./policy-csp-power.md#power-requirepasswordwhencomputerwakespluggedin) +- [Power/SelectLidCloseActionOnBattery](./policy-csp-power.md#power-selectlidcloseactiononbattery) +- [Power/SelectLidCloseActionPluggedIn](./policy-csp-power.md#power-selectlidcloseactionpluggedin) +- [Power/SelectPowerButtonActionOnBattery](./policy-csp-power.md#power-selectpowerbuttonactiononbattery) +- [Power/SelectPowerButtonActionPluggedIn](./policy-csp-power.md#power-selectpowerbuttonactionpluggedin) +- [Power/SelectSleepButtonActionOnBattery](./policy-csp-power.md#power-selectsleepbuttonactiononbattery) +- [Power/SelectSleepButtonActionPluggedIn](./policy-csp-power.md#power-selectsleepbuttonactionpluggedin) - [Power/StandbyTimeoutOnBattery](./policy-csp-power.md#power-standbytimeoutonbattery) - [Power/StandbyTimeoutPluggedIn](./policy-csp-power.md#power-standbytimeoutpluggedin) +- [Power/TurnOffHybridSleepOnBattery](./policy-csp-power.md#power-turnoffhybridsleeponbattery) +- [Power/TurnOffHybridSleepPluggedIn](./policy-csp-power.md#power-turnoffhybridsleeppluggedin) +- [Power/UnattendedSleepTimeoutOnBattery](./policy-csp-power.md#power-unattendedsleeptimeoutonbattery) +- [Power/UnattendedSleepTimeoutPluggedIn](./policy-csp-power.md#power-unattendedsleeptimeoutpluggedin) - [Printers/PointAndPrintRestrictions](./policy-csp-printers.md#printers-pointandprintrestrictions) - [Printers/PointAndPrintRestrictions_User](./policy-csp-printers.md#printers-pointandprintrestrictions-user) - [Printers/PublishPrinters](./policy-csp-printers.md#printers-publishprinters) diff --git a/windows/client-management/mdm/policy-csp-power.md b/windows/client-management/mdm/policy-csp-power.md index 51f9efc4a5..376605a87a 100644 --- a/windows/client-management/mdm/policy-csp-power.md +++ b/windows/client-management/mdm/policy-csp-power.md @@ -6,12 +6,13 @@ ms.topic: article ms.prod: w10 ms.technology: windows author: MariciaAlforque -ms.date: 04/16/2018 +ms.date: 05/03/2019 --- # Policy CSP - Power - +> [!WARNING] +> Some information relates to prereleased products, which may be substantially modified before it's commercially released. Microsoft makes no warranties, expressed or implied, concerning the information provided here.
@@ -31,6 +32,12 @@ ms.date: 04/16/2018
Power/DisplayOffTimeoutPluggedIn
+
+ Power/EnergySaverBatteryThresholdOnBattery +
+
+ Power/EnergySaverBatteryThresholdPluggedIn +
Power/HibernateTimeoutOnBattery
@@ -43,12 +50,42 @@ ms.date: 04/16/2018
Power/RequirePasswordWhenComputerWakesPluggedIn
+
+ Power/SelectLidCloseActionOnBattery +
+
+ Power/SelectLidCloseActionPluggedIn +
+
+ Power/SelectPowerButtonActionOnBattery +
+
+ Power/SelectPowerButtonActionPluggedIn +
+
+ Power/SelectSleepButtonActionOnBattery +
+
+ Power/SelectSleepButtonActionPluggedIn +
Power/StandbyTimeoutOnBattery
Power/StandbyTimeoutPluggedIn
+
+ Power/TurnOffHybridSleepOnBattery +
+
+ Power/TurnOffHybridSleepPluggedIn +
+
+ Power/UnattendedSleepTimeoutOnBattery +
+
+ Power/UnattendedSleepTimeoutPluggedIn +
@@ -306,6 +343,153 @@ ADMX Info:
+ +**Power/EnergySaverBatteryThresholdOnBattery** + + + + + + + + + + + + + + + + + + + + + +
HomeProBusinessEnterpriseEducationMobileMobile Enterprise
cross markcheck mark6check mark6check mark6check mark6
+ + + +[Scope](./policy-configuration-service-provider.md#policy-scope): + +> [!div class = "checklist"] +> * Device + +
+ + + + +Added in Windows 10, version 1903. This policy setting allows you to specify battery charge level at which Energy Saver is turned on. + +If you enable this policy setting, you must specify a percentage value that indicates the battery charge level. Energy Saver is automatically turned on at (and below) the specified battery charge level. + +If you disable or do not configure this policy setting, users control this setting. + + + +> [!TIP] +> This is an ADMX-backed policy and requires a special SyncML format to enable or disable. For details, see [Understanding ADMX-backed policies](./understanding-admx-backed-policies.md). + +> You must specify the data type in the SyncML as <Format>chr</Format>. For an example SyncML, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). + +> The payload of the SyncML must be XML-encoded; for this XML encoding, there are a variety of online encoders that you can use. To avoid encoding the payload, you can use CDATA if your MDM supports it. For more information, see [CDATA Sections](http://www.w3.org/TR/REC-xml/#sec-cdata-sect). + + +ADMX Info: +- GP English name: *Energy Saver Battery Threshold (on battery)* +- GP name: *EsBattThresholdDC* +- GP element: *EnterEsBattThreshold* +- GP path: *System/Power Management/Energy Saver Settings* +- GP ADMX file name: *power.admx* + + + +Supported values: 0-100. The default is 70. + + + + + + + + + +
+ + +**Power/EnergySaverBatteryThresholdPluggedIn** + + + + + + + + + + + + + + + + + + + + + +
HomeProBusinessEnterpriseEducationMobileMobile Enterprise
cross markcheck mark6check mark6check mark6check mark6
+ + + +[Scope](./policy-configuration-service-provider.md#policy-scope): + +> [!div class = "checklist"] +> * Device + +
+ + + +Added in Windows 10, version 1903. This policy setting allows you to specify battery charge level at which Energy Saver is turned on. + +If you enable this policy setting, you must provide a percentage value that indicates the battery charge level. Energy Saver is automatically turned on at (and below) the specified battery charge level. + +If you disable or do not configure this policy setting, users control this setting. + + + +> [!TIP] +> This is an ADMX-backed policy and requires a special SyncML format to enable or disable. For details, see [Understanding ADMX-backed policies](./understanding-admx-backed-policies.md). + +> You must specify the data type in the SyncML as <Format>chr</Format>. For an example SyncML, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). + +> The payload of the SyncML must be XML-encoded; for this XML encoding, there are a variety of online encoders that you can use. To avoid encoding the payload, you can use CDATA if your MDM supports it. For more information, see [CDATA Sections](http://www.w3.org/TR/REC-xml/#sec-cdata-sect). + + +ADMX Info: +- GP English name: *Energy Saver Battery Threshold (plugged in)* +- GP name: *EsBattThresholdAC* +- GP element: *EnterEsBattThreshold* +- GP path: *System/Power Management/Energy Saver Settings* +- GP ADMX file name: *power.admx* + + + +Supported values: 0-100. The default is 70. + + + + + + + + + +
+ **Power/HibernateTimeoutOnBattery** @@ -558,6 +742,480 @@ ADMX Info:
+ +**Power/SelectLidCloseActionOnBattery** + + + + + + + + + + + + + + + + + + + + + +
HomeProBusinessEnterpriseEducationMobileMobile Enterprise
cross markcheck mark6check mark6check mark6check mark6
+ + + +[Scope](./policy-configuration-service-provider.md#policy-scope): + +> [!div class = "checklist"] +> * Device + +
+ + + +Added in Windows 10, version 1903. This policy setting specifies the action that Windows takes when a user closes the lid on a mobile PC. + +If you enable this policy setting, you must select the desired action. + +If you disable this policy setting or do not configure it, users can see and change this setting. + + + +> [!TIP] +> This is an ADMX-backed policy and requires a special SyncML format to enable or disable. For details, see [Understanding ADMX-backed policies](./understanding-admx-backed-policies.md). + +> You must specify the data type in the SyncML as <Format>chr</Format>. For an example SyncML, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). + +> The payload of the SyncML must be XML-encoded; for this XML encoding, there are a variety of online encoders that you can use. To avoid encoding the payload, you can use CDATA if your MDM supports it. For more information, see [CDATA Sections](http://www.w3.org/TR/REC-xml/#sec-cdata-sect). + + +ADMX Info: +- GP English name: *Select the lid switch action (on battery)* +- GP name: *DCSystemLidAction_2* +- GP element: *SelectDCSystemLidAction* +- GP path: *System/Power Management/Button Settings* +- GP ADMX file name: *power.admx* + + + + +The following are the supported lid close switch actions (on battery): +- 0 - Take no action +- 1 - Sleep +- 2 - System hibernate sleep state +- 3 - System shutdown + + + + + + + + + + +
+ + +**Power/SelectLidCloseActionPluggedIn** + + + + + + + + + + + + + + + + + + + + + +
HomeProBusinessEnterpriseEducationMobileMobile Enterprise
cross markcheck mark6check mark6check mark6check mark6
+ + + +[Scope](./policy-configuration-service-provider.md#policy-scope): + +> [!div class = "checklist"] +> * Device + +
+ + + +Added in Windows 10, version 1903. This policy setting specifies the action that Windows takes when a user closes the lid on a mobile PC. + +If you enable this policy setting, you must select the desired action. + +If you disable this policy setting or do not configure it, users can see and change this setting. + + + +> [!TIP] +> This is an ADMX-backed policy and requires a special SyncML format to enable or disable. For details, see [Understanding ADMX-backed policies](./understanding-admx-backed-policies.md). + +> You must specify the data type in the SyncML as <Format>chr</Format>. For an example SyncML, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). + +> The payload of the SyncML must be XML-encoded; for this XML encoding, there are a variety of online encoders that you can use. To avoid encoding the payload, you can use CDATA if your MDM supports it. For more information, see [CDATA Sections](http://www.w3.org/TR/REC-xml/#sec-cdata-sect). + + +ADMX Info: +- GP English name: *Select the lid switch action (plugged in)* +- GP name: *ACSystemLidAction_2* +- GP element: *SelectACSystemLidAction* +- GP path: *System/Power Management/Button Settings* +- GP ADMX file name: *power.admx* + + + + +The following are the supported lid close switch actions (plugged in): +- 0 - Take no action +- 1 - Sleep +- 2 - System hibernate sleep state +- 3 - System shutdown + + + + + + + + + + +
+ + +**Power/SelectPowerButtonActionOnBattery** + + + + + + + + + + + + + + + + + + + + + +
HomeProBusinessEnterpriseEducationMobileMobile Enterprise
cross markcheck mark6check mark6check mark6check mark6
+ + + +[Scope](./policy-configuration-service-provider.md#policy-scope): + +> [!div class = "checklist"] +> * Device + +
+ + + +Added in Windows 10, version 1903. This policy setting specifies the action that Windows takes when a user presses the Power button. + +If you enable this policy setting, you must select the desired action. + +If you disable this policy setting or do not configure it, users can see and change this setting. + + + +> [!TIP] +> This is an ADMX-backed policy and requires a special SyncML format to enable or disable. For details, see [Understanding ADMX-backed policies](./understanding-admx-backed-policies.md). + +> You must specify the data type in the SyncML as <Format>chr</Format>. For an example SyncML, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). + +> The payload of the SyncML must be XML-encoded; for this XML encoding, there are a variety of online encoders that you can use. To avoid encoding the payload, you can use CDATA if your MDM supports it. For more information, see [CDATA Sections](http://www.w3.org/TR/REC-xml/#sec-cdata-sect). + + +ADMX Info: +- GP English name: *Select the Power button action (on battery)* +- GP name: *DCPowerButtonAction_2* +- GP element: *SelectDCPowerButtonAction* +- GP path: *System/Power Management/Button Settings* +- GP ADMX file name: *power.admx* + + + + +The following are the supported Power button actions (on battery): +- 0 - Take no action +- 1 - Sleep +- 2 - System hibernate sleep state +- 3 - System shutdown + + + + + + + + + + +
+ + +**Power/SelectPowerButtonActionPluggedIn** + + + + + + + + + + + + + + + + + + + + + +
HomeProBusinessEnterpriseEducationMobileMobile Enterprise
cross markcheck mark6check mark6check mark6check mark6
+ + + +[Scope](./policy-configuration-service-provider.md#policy-scope): + +> [!div class = "checklist"] +> * Device + +
+ + + +Added in Windows 10, version 1903. This policy setting specifies the action that Windows takes when a user presses the Power button. + +If you enable this policy setting, you must select the desired action. + +If you disable this policy setting or do not configure it, users can see and change this setting. + + + +> [!TIP] +> This is an ADMX-backed policy and requires a special SyncML format to enable or disable. For details, see [Understanding ADMX-backed policies](./understanding-admx-backed-policies.md). + +> You must specify the data type in the SyncML as <Format>chr</Format>. For an example SyncML, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). + +> The payload of the SyncML must be XML-encoded; for this XML encoding, there are a variety of online encoders that you can use. To avoid encoding the payload, you can use CDATA if your MDM supports it. For more information, see [CDATA Sections](http://www.w3.org/TR/REC-xml/#sec-cdata-sect). + + +ADMX Info: +- GP English name: *Select the Power button action (plugged in)* +- GP name: *ACPowerButtonAction_2* +- GP element: *SelectACPowerButtonAction* +- GP path: *System/Power Management/Button Settings* +- GP ADMX file name: *power.admx* + + + + +The following are the supported Power button actions (plugged in): +- 0 - Take no action +- 1 - Sleep +- 2 - System hibernate sleep state +- 3 - System shutdown + + + + + + + + + + +
+ + +**Power/SelectSleepButtonActionOnBattery** + + + + + + + + + + + + + + + + + + + + + +
HomeProBusinessEnterpriseEducationMobileMobile Enterprise
cross markcheck mark6check mark6check mark6check mark6
+ + + +[Scope](./policy-configuration-service-provider.md#policy-scope): + +> [!div class = "checklist"] +> * Device + +
+ + + +Added in Windows 10, version 1903. This policy setting specifies the action that Windows takes when a user presses the Sleep button. + +If you enable this policy setting, you must select the desired action. + +If you disable this policy setting or do not configure it, users can see and change this setting. + + + +> [!TIP] +> This is an ADMX-backed policy and requires a special SyncML format to enable or disable. For details, see [Understanding ADMX-backed policies](./understanding-admx-backed-policies.md). + +> You must specify the data type in the SyncML as <Format>chr</Format>. For an example SyncML, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). + +> The payload of the SyncML must be XML-encoded; for this XML encoding, there are a variety of online encoders that you can use. To avoid encoding the payload, you can use CDATA if your MDM supports it. For more information, see [CDATA Sections](http://www.w3.org/TR/REC-xml/#sec-cdata-sect). + + +ADMX Info: +- GP English name: *Select the Sleep button action (on battery)* +- GP name: *DCSleepButtonAction_2* +- GP element: *SelectDCSleepButtonAction* +- GP path: *System/Power Management/Button Settings* +- GP ADMX file name: *power.admx* + + + + +The following are the supported Sleep button actions (on battery): +- 0 - Take no action +- 1 - Sleep +- 2 - System hibernate sleep state +- 3 - System shutdown + + + + + + + + + + +
+ + +**Power/SelectSleepButtonActionPluggedIn** + + + + + + + + + + + + + + + + + + + + + +
HomeProBusinessEnterpriseEducationMobileMobile Enterprise
cross markcheck mark6check mark6check mark6check mark6
+ + + +[Scope](./policy-configuration-service-provider.md#policy-scope): + +> [!div class = "checklist"] +> * Device + +
+ + + +Added in Windows 10, version 1903. This policy setting specifies the action that Windows takes when a user presses the Sleep button. + +If you enable this policy setting, you must select the desired action. + +If you disable this policy setting or do not configure it, users can see and change this setting. + + + +> [!TIP] +> This is an ADMX-backed policy and requires a special SyncML format to enable or disable. For details, see [Understanding ADMX-backed policies](./understanding-admx-backed-policies.md). + +> You must specify the data type in the SyncML as <Format>chr</Format>. For an example SyncML, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). + +> The payload of the SyncML must be XML-encoded; for this XML encoding, there are a variety of online encoders that you can use. To avoid encoding the payload, you can use CDATA if your MDM supports it. For more information, see [CDATA Sections](http://www.w3.org/TR/REC-xml/#sec-cdata-sect). + + +ADMX Info: +- GP English name: *Select the Sleep button action (plugged in)* +- GP name: *ACSleepButtonAction_2* +- GP element: *SelectACSleepButtonAction* +- GP path: *System/Power Management/Button Settings* +- GP ADMX file name: *power.admx* + + + + +The following are the supported Sleep button actions (plugged in): +- 0 - Take no action +- 1 - Sleep +- 2 - System hibernate sleep state +- 3 - System shutdown + + + + + + + + + + +
+ **Power/StandbyTimeoutOnBattery** @@ -683,14 +1341,319 @@ ADMX Info: +
-Footnote: + +**Power/TurnOffHybridSleepOnBattery** + + + + + + + + + + + + + + + + + + + + + +
HomeProBusinessEnterpriseEducationMobileMobile Enterprise
cross markcheck mark6check mark6check mark6check mark6
+ + + +[Scope](./policy-configuration-service-provider.md#policy-scope): + +> [!div class = "checklist"] +> * Device + +
+ + + +Added in Windows 10, version 1903. This policy setting allows you to turn off hybrid sleep. + +If you set this policy setting to 0, a hiberfile is not generated when the system transitions to sleep (Stand By). + +If you set this policy setting to 1 or do not configure this policy setting, users control this setting. + + + +> [!TIP] +> This is an ADMX-backed policy and requires a special SyncML format to enable or disable. For details, see [Understanding ADMX-backed policies](./understanding-admx-backed-policies.md). + +> You must specify the data type in the SyncML as <Format>chr</Format>. For an example SyncML, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). + +> The payload of the SyncML must be XML-encoded; for this XML encoding, there are a variety of online encoders that you can use. To avoid encoding the payload, you can use CDATA if your MDM supports it. For more information, see [CDATA Sections](http://www.w3.org/TR/REC-xml/#sec-cdata-sect). + + +ADMX Info: +- GP English name: *Turn off hybrid sleep (on battery)* +- GP name: *DCStandbyWithHiberfileEnable_2* +- GP path: *System/Power Management/Sleep Settings* +- GP ADMX file name: *power.admx* + + + + +The following are the supported values for Hybrid sleep (on battery): +- 0 - no hibernation file for sleep (default) +- 1 - hybrid sleep + + + + + + + + + + +
+ + +**Power/TurnOffHybridSleepPluggedIn** + + + + + + + + + + + + + + + + + + + + + +
HomeProBusinessEnterpriseEducationMobileMobile Enterprise
cross markcheck mark6check mark6check mark6check mark6
+ + + +[Scope](./policy-configuration-service-provider.md#policy-scope): + +> [!div class = "checklist"] +> * Device + +
+ + + +Added in Windows 10, version 1903. This policy setting allows you to turn off hybrid sleep. + +If you set this policy setting to 0, a hiberfile is not generated when the system transitions to sleep (Stand By). + +If you set this policy setting to 1 or do not configure this policy setting, users control this setting. + + + +> [!TIP] +> This is an ADMX-backed policy and requires a special SyncML format to enable or disable. For details, see [Understanding ADMX-backed policies](./understanding-admx-backed-policies.md). + +> You must specify the data type in the SyncML as <Format>chr</Format>. For an example SyncML, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). + +> The payload of the SyncML must be XML-encoded; for this XML encoding, there are a variety of online encoders that you can use. To avoid encoding the payload, you can use CDATA if your MDM supports it. For more information, see [CDATA Sections](http://www.w3.org/TR/REC-xml/#sec-cdata-sect). + + +ADMX Info: +- GP English name: *Turn off hybrid sleep (plugged in)* +- GP name: *ACStandbyWithHiberfileEnable_2* +- GP path: *System/Power Management/Sleep Settings* +- GP ADMX file name: *power.admx* + + + + +The following are the supported values for Hybrid sleep (plugged in): +- 0 - no hibernation file for sleep (default) +- 1 - hybrid sleep + + + + + + + + + + +
+ + +**Power/UnattendedSleepTimeoutOnBattery** + + + + + + + + + + + + + + + + + + + + + +
HomeProBusinessEnterpriseEducationMobileMobile Enterprise
cross markcheck mark6check mark6check mark6check mark6
+ + + +[Scope](./policy-configuration-service-provider.md#policy-scope): + +> [!div class = "checklist"] +> * Device + +
+ + + +Added in Windows 10, version 1903. This policy setting allows you to specify the period of inactivity before Windows transitions to sleep automatically when a user is not present at the computer. + +If you enable this policy setting, you must provide a value, in seconds, indicating how much idle time should elapse before Windows automatically transitions to sleep when left unattended. If you specify 0 seconds, Windows does not automatically transition to sleep. + +If you disable or do not configure this policy setting, users control this setting. + +If the user has configured a slide show to run on the lock screen when the machine is locked, this can prevent the sleep transition from occuring. The "Prevent enabling lock screen slide show" policy setting can be used to disable the slide show feature. + + + +> [!TIP] +> This is an ADMX-backed policy and requires a special SyncML format to enable or disable. For details, see [Understanding ADMX-backed policies](./understanding-admx-backed-policies.md). + +> You must specify the data type in the SyncML as <Format>chr</Format>. For an example SyncML, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). + +> The payload of the SyncML must be XML-encoded; for this XML encoding, there are a variety of online encoders that you can use. To avoid encoding the payload, you can use CDATA if your MDM supports it. For more information, see [CDATA Sections](http://www.w3.org/TR/REC-xml/#sec-cdata-sect). + + +ADMX Info: +- GP English name: *Specify the unattended sleep timeout (on battery)* +- GP name: *UnattendedSleepTimeOutDC* +- GP element: *EnterUnattendedSleepTimeOut* +- GP path: *System/Power Management/Sleep Settings* +- GP ADMX file name: *power.admx* + + + +Default value for unattended sleep timeout (on battery): +300 + + + + + + + + + +
+ + +**Power/UnattendedSleepTimeoutPluggedIn** + + + + + + + + + + + + + + + + + + + + + +
HomeProBusinessEnterpriseEducationMobileMobile Enterprise
cross markcheck mark6check mark6check mark6check mark6
+ + + +[Scope](./policy-configuration-service-provider.md#policy-scope): + +> [!div class = "checklist"] +> * Device + +
+ + + +Added in Windows 10, version 1903. This policy setting allows you to specify the period of inactivity before Windows transitions to sleep automatically when a user is not present at the computer. + +If you enable this policy setting, you must provide a value, in seconds, indicating how much idle time should elapse before Windows automatically transitions to sleep when left unattended. If you specify 0 seconds, Windows does not automatically transition to sleep. + +If you disable or do not configure this policy setting, users control this setting. + +If the user has configured a slide show to run on the lock screen when the machine is locked, this can prevent the sleep transition from occuring. The "Prevent enabling lock screen slide show" policy setting can be used to disable the slide show feature. + + + +> [!TIP] +> This is an ADMX-backed policy and requires a special SyncML format to enable or disable. For details, see [Understanding ADMX-backed policies](./understanding-admx-backed-policies.md). + +> You must specify the data type in the SyncML as <Format>chr</Format>. For an example SyncML, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). + +> The payload of the SyncML must be XML-encoded; for this XML encoding, there are a variety of online encoders that you can use. To avoid encoding the payload, you can use CDATA if your MDM supports it. For more information, see [CDATA Sections](http://www.w3.org/TR/REC-xml/#sec-cdata-sect). + + +ADMX Info: +- GP English name: *Specify the unattended sleep timeout (plugged in)* +- GP name: *UnattendedSleepTimeOutAC* +- GP element: *EnterUnattendedSleepTimeOut* +- GP path: *System/Power Management/Sleep Settings* +- GP ADMX file name: *power.admx* + + + +Default value for unattended sleep timeout (plugged in): +300 + + + + + + + + + + +
+ +Footnotes: - 1 - Added in Windows 10, version 1607. - 2 - Added in Windows 10, version 1703. - 3 - Added in Windows 10, version 1709. - 4 - Added in Windows 10, version 1803. - - - +- 5 - Added in Windows 10, version 1809. +- 6 - Added in Windows 10, version 1903. \ No newline at end of file From 9cf7f4be323258ad992a14d8e547f0882dc66382 Mon Sep 17 00:00:00 2001 From: Joey Caparas Date: Mon, 6 May 2019 12:03:55 -0700 Subject: [PATCH 345/724] update image --- ...ndows-defender-advanced-threat-protection.md | 3 +-- .../images/email-notification.png | Bin 0 -> 45025 bytes 2 files changed, 1 insertion(+), 2 deletions(-) create mode 100644 windows/security/threat-protection/windows-defender-atp/images/email-notification.png diff --git a/windows/security/threat-protection/windows-defender-atp/configure-email-notifications-windows-defender-advanced-threat-protection.md b/windows/security/threat-protection/windows-defender-atp/configure-email-notifications-windows-defender-advanced-threat-protection.md index 2d843ca2bd..7088b2f2e3 100644 --- a/windows/security/threat-protection/windows-defender-atp/configure-email-notifications-windows-defender-advanced-threat-protection.md +++ b/windows/security/threat-protection/windows-defender-atp/configure-email-notifications-windows-defender-advanced-threat-protection.md @@ -15,7 +15,6 @@ manager: dansimp audience: ITPro ms.collection: M365-security-compliance ms.topic: article -ms.date: 10/08/2018 --- # Configure alert notifications in Windows Defender ATP @@ -70,7 +69,7 @@ You can create rules that determine the machines and alert severities to send em Here's an example email notification: -![Image of example email notification](images/atp-example-email-notification.png) +![Image of example email notification](images/email-notification.png) ## Edit a notification rule 1. Select the notification rule you'd like to edit. diff --git a/windows/security/threat-protection/windows-defender-atp/images/email-notification.png b/windows/security/threat-protection/windows-defender-atp/images/email-notification.png new file mode 100644 index 0000000000000000000000000000000000000000..1b9875fcad10f9ed134370be7526c20a0a59b85f GIT binary patch literal 45025 zcmdqJcUV(j_b(Vx!3L;^SSTt@M5Lp15fSN1?}!MYNbeoRf(1}|N2IqPy%!5bN{|{l zC?)h32to+VI^XyG-MP;^@66n}Q~nqpG0D!!Is5Fr_WG2y!Gs~T z{?jC<>muXoVrlP$%Eq+cho%!Q&~(?_+04nx!Ntnn4n=qLGIHoKq+QnD!PChKZRvu_ zqiq+1R+@iWoy<*>Gkqx#q9U7gI#QJedL3;%VPti7$Rxt$A&*dA36 zZIsAinpQ4P%~4s)-JB@YC6vNl8BLFb#ZmtUeYo0{ecWE$n)llwI@vtQR}|~HnZc!v zLR=hAfBqb#d+s% z>9ce`J4m%l0o_C?l;7{Ja$PuWM1#CK+TYuow$Iu15_!Srd-4+U_~pn+?P>)Vs zLLUCdFLUKKa{T|$$4ui4v`q>g*PAr@)vLdIM`y(N;)8}(`nR6UCDKMad&I}?PP zo2NaoXm)mmFuUzteC9^Q?d#fZ?!))84;$Nmeisc zerMv*fGa*NeXiPnH`Rij-D>LFVe-0?$pza1F)B*U86o9IUAy+XD*xCB;WJ8frvzNBHH z@0(UG2YKLJBn(ixG$|G?RXIlG;})~Bs$1eE;drA1-9~0&(yw?d*J3^+zCCiBcQrQQ z&`(d#uzMHXXYe!g>S*+HB_Y3Y{}oC0^tAh77~<9fPE_<1PL1bA|9aF}1$B3YH?Q;! zIBVZ0YYBd)`Yp|C6ecuOWp?e!@9TSOp-Z%K>WZx~M!ngMjc&fqj0zXTJRaPqI%^wjB*xL;x|U6_Z$_w4=HzkonE#h9rVa9*07f*Z=|tY zOjTD>T5{#*=2FN`Pd|F&REB=u*RN>3v1bQiQcGucHjgef4^Gmx_;BK3?q2Wg2yyb* z-f4cz5Pn+BsD~?+XWT(8G_C9QqN4qZ<{6%4Wrs@&gref+_5latweDQ;N{hR+->7VD z%U=E=dandm*iEdv^9&+#&xbr^L}-(cAk8B_&*QGT%0S8L6KxDq5ZP zC+ip-n9Ii`%|BML;RwE#^i^v@)L2t9Z8(}2Vj!)n)x;ovDP4^%{GRB)djEu6#@@}K zgXyIxaKA@qV z^dP!)dq0dxe4|r(`wfHvmng5=_G_B#h2O6yjVbkcPuuJH*5*%~*xI-X?-YlHZA^0} z{mO1_Jrqr&!9L>d-k+gDiATbr)t@884jRp(vdZ<7{t<}j9%dtOW4=<#y? zPD$DqfBW`agKN0{g9n$aHVA%RgqctH18n{2SXCpBZFACoZ>bHP?geEX2pS`!rIlzQ zv9jlSlc(*Q4jqYBP52U8zcHJ78RsY^J$qkTugFZkWizqU|8Mp9VV+Q-X`{UqSq$UX z!^Q>3(zNY2tj9pMNUds#?!zsl)YW~m5@-%Dh=ny0IXdc=qli8q)rWgM($pUC1w!ge z^IMD7ucB5~rf47iiOu=F5E`Azy8SWls`^wjb;85f`UabR2Jz(m#No1+Mz|VxtiayH zx_SQMGR=A27(!IFO|^GRfXARVgu14Ni!50%g%V!q-M29;YZvA zGNQ?=Q$N47aX4Wq>eV`g&&^j~Ev*>9pf6D3&C%7y?iDM`Z;V$`>PQFc1*@Z5HNYms8;4 z3Qr2%$;2lWOF#du-UHDxyzs-y&8a9XJbZKM`)lDZ_Tw*lw7%8K&lp~>SdpsTGuc|x|vO0=!h$Mf=UMO@Hsj5p9pv`{eGrKG5JIkt)t(;0s_Ri z*QeYz;Rii2(TVw~^dBqKs+!lkZzJ==g z<=$|0o1gssyX$;P6wmQ$6T%K_u&dy3s9^=)a*-ORU?x>caZl2sr=H$r9KUqfKg*tl zv1H+OE@Rxe#$>EumeojNMsVJ#2YryHnOK-hcK3 zdBRUZB5!ZBy3fEUA09T>R=XW3)eqOt1s?8F7vYD_xCd z%`P>cZs#+H`b8#Tpo6YvPwoQA*xWoRlhY%;KgAgrow!t`O&K4z_|yQ9`LaRaOj>$n z-SrOFAp;}Z@z)OY)Mn3cHd||OXJei-=W!$}%+^b8?YmD^1dskpZ z)bIM^sZs+2i&;W*axN^CmSUD3liSa&{l&%~b3a25Kw>|F@B5iB9*RvUELi(~bIc*% z>{=CIywE^znn`+QZr^0r+H;EGgJKW??)9s8TFibpQP&EgL-Zw?b!c-3`*$0~Kj}{W z^*ew5!m;Wx4{WTE7j@iLCQJ!KC{yuD*Ef1@!`gk>{CwhOtY%a$nT)|P{T*dmSs1O+ z!HPXscov-QV-|a#eCd}YiHNL2U@5~ZZ{IbC3{DTmi!`!FZbh)3Yr|xn+al6!=L_H^ zx!BpKY#ddsS-Gb2;;@=qO7-NWiZX3oRdezWS7mWmS5mAtNZBmF?Cff z?N`CO!N4WOt9x2r9v4eWW;ru^%fP_Ss7g~*OA9l1Oa6x85mIV`hSs#*&+RE$x`EG@ zWx|tp+Z|OJM84Q3+pG?0Vo$nGuK1USCKmXr>c{PEb4q_an+{$L-=c2#2KF40@~qYX3I;b{z~B!B&>Q8?`UZ|FU&8J z&gs6YtE&2v&!Y;{@|>DTQJ_Wei(8Pa{(R+WZm8%zd)Lhul))Ki8D8(6u9Lcz6)I&l zO1oJp$g#8S%*?5-6t?};2Y9NDXT{m?3xR?2o{Rh)9j)q4#z`~gX!(SXT+Fy15Jz6j z-tDD6*#3MZySS<-ZwS(buGD0oY4dcAi;Ot4;pyBe?b2fW{n^%XMekrXARD~C53yzS z`z^i9ct39C0%&=1 zgM8-aUBBEtpN%Z?-qB5c3eMW?KRH@5^{&{YC0f7D+^jZ9rVa>@xt_Q6XC!|8d@t>Q zy*FhzzMY}a9i8m)O)6$~f8Y6C3e$9d}+*N^9!ZLbFfW+oD9 z_vgmynsv4ICMzxF$|K$*X0uzL>ngw_?of$ zGH3KJC$v`=X|m=bDLIt6G;}5CgWt&o;oo@`FLu^yAqq_V=9Dn~HE;YZ{y1VY74z_Y zbJqU;KYC9QDtBkwW4|O*q0PlsZ$7==Wh}cEp`m5I4-6&+sFnU$_v7)cXTGE>+Wo1L zXvh$~z=WL=Q~I@y_MX&)Djayg3o6t-XN}{P&06j3-{&-p%@f!CA02L<+u0_VM#sK$ zp8EDOi2erp1*tNiMg{F~MmJW#(}ksO?G^dJf>Ao zI!L@PSy-+Ft7cwnl+vm24IT5B{^Pa3tuW@A=2=jXAVyC-zOs_6sZY@+%E{9~%#+LU zkQ1ZAe&XwX^xY=pwm|opFKaPQ{U!H}msV)4ryc!%jx%TAIGK~{H6kO4w>U#prOpWpI*dZd0t&KdsOq<*qk% zqXsYw;tDo1$!U}FrOkckx5Naa<>iobmOc~rqmSls-?jOSt1iZ#%Emn@njwWEqrF-u z+XTskWWZ8DQZxkg6*K`fI~M<#;VN^zRtAlg*DLDq5Erv2Ka4X|E__%1bgSQeL76XA z{e4=OqH30%Mo%087ohmTNcvMLC*SFW6Cb7iV$TwF>o2uOrwayiFbXz1Of+C%_Qh9Q zM4K97pPN4q0@fju&&CmSL^xzJkx6`!%w2TTR$bpJ`$jD>Zf|46S;LL)4Bm4u^c};J z89wHPCHg{8FZn`}E+@GRXCpjI(D$JCg~wQo2_X=Hxyaw=wACcjKkbYhF-59v~9sKtKAk<`u`hwSWD+SFbj(#3eev&P4pvyo(x0hFQth<+%NU z!>=~Jbv^jw#}{etjj4Vo^Y?dGzkitA<@k&*Y~D~CCu1x)IbSOm9%qNq#J;(a5MCam zV2eqTT&TLK1EOCfz$L`$@1ytpOoCtE&&zxm8O^W=2r8Dl&S%up&M3gm^;6Y$`so{o zW&4a{(f8T(6NE`8{~Xu2Am^XI!iO=E;aY79<#Sv~OJmKn+pw^y zZ;jHl%ihH0bhe}ACbo86Dqkf~P>Ju0amv>lRSGO0`2EDM{>QbEO)2e_wI}hGgtF>3VA6}upl9Yu2>L5LRD&6H<-S6A+cz}`*_=REl&?-s;8sVGO{cYJfZ*w+n zKF>4_mEQPqnV z8C-n1Hd4&lKb`|PStj4O!FFrmv;|SVr)OeOvTo3>MtsuiWP3cPZ(PV)=&7pp#Gb^s zBYfRE8jVwn3URBwkGiJFa;+~{a&wPg$TjVE$Br_4jCFV%!V87}Hk@DVwFghYzHUcL zywpNnQE|lX%jvhy4*C-=W@~@Dg6@5;cPQ8(4mIzuzU2K;61u-LJpM;3;b?qIfNZ9R z-yVhcM1qWRmPBvwpU0&00tfd`)4K$7k{=^EC5aG=ja@$XZq9|8{Z2)p`K#h9=NDq4 zJjnNch;LfdaOg|l7s8{~@=k80I=sc%NB#`rgE(&b1-aMOs998HH=5bE*ERG-{AEG8 zxMv5RZ_LG`GkAq3kKY-k)(gYz&8dY+kq^+`G&a3v=t{};akU` zO~vv#CJRL!yz&X`@zL$edq!TJK5=u1Vkp6P+o79d4Sx zWgEl&a;Xkl2ho-0ClZ^X z_B-Bd>$dcYc4mqGfg+m`0nm-Cu1^T)&}W9`O%CnfP~yaHme#NaUz`b0v?A3HfyQ(2;OyQ4wxS$xZNd$1F*{rwMa`ox7K z;Fem|G6bk2^bHr|_N99V1bf6kM1-9tiY3i%F7FzhaIIBJ9j_gi^0{@@l_PFFm_2DT z@b1D5uEMXs8CXY{#Et8qLWS=g!PgY@1)$oG`El6~p^@c{jUNQRndN*YYuS zuoT^x=SkvXh#T2Oq%`!{p8irWsJDHSr{me&sg&;OZz^>0?h^ri4%i^f?O@+5 zG6gnQS*fxi3$0>i1e=|s4&Kwwp7#ouJMIRK>9K4F!OpJfN^nv&RaI5VlV%!Rw56(6 zB%I*a*0{IYHa|_7gqEIFryg)|YcsP#!)L}08GFzf!iBSc%R{&33`@1WO zSV*i2n0T63)$cM0q}g}eI#t(R&kTf1PHc?suSqXXmbfmI6jdXN{R^(flZ+L5hd`k( z7A=NO=k)I3m}U{1%J~J(-cs$M{zL6UbfGpagTKl=$X=wqg2m;eGOkCNH|^cXQPRCQ zbirl3FT>)Fsru=}+JoD+wwR@0u!&$bU;>)9Nl!z}>%0$YU_Wz>>;BP`zFz`4a>rTz zby{I2LkQ#)LBbD4!7p`>FC+tU`+7~P%0Ck6>8OxtZ36l;R(ATnS?8V;xQ#k(5uOCP zY*6K6jeK0}jWih|h+W;Mm3xKeheT4c{T4sC%rJgjwxd;_HplF3-g(@-gHJRKZY!u~ zE*X1mU-Mg0>x~f3K5hNJ*|-pA*i=nTkh>w-!$X(sO}x7}zu@)PbacEc1=RIbFoN8r zHY1o&ES6WwmHl1&uKAK?ABxX%b#K_vb*RuxL*Cf|qYH;a>L?$D3lCDS>?sg9IEObzPRQSj~lM{F5l~1Dwo%K zv%Az9IiHW|hoXSZ$#fxoy-JV87_d-cKbRz8w^+L;vXDr0RSki8?3YJlD~!Jfe>?^L zGmd0yJAZ@g=qMBO?+eEy{3-~}IYsJV3}Gh6&zStc#mL8Rl`RWNzHs|O2 zsyr5TA8;2CM%-Vvklzytr$d~r|0osIp51iAQBfJ?_hX~dJbd=vg8;^`#6z|XqR(?! zX@(1Dffd5k7A-GfSA%&odHAplZV%jq3s0@PKUOav^ORJb5~S;NW~O%Lkss#f?;^}! zw-+*Jv9|4lw~NLjRat0h7g7b$h#{k+Q$RE1_8Ip_I6Jy2VKKb~=GP zlWWokw$CMeepLmrP$=5R~fL zkttaTuB3c?et@Y1t$M+i$DZ6)Kd^PFTc{QBTN1c()c+PnMKjfkr7TkkhkMd6-kLCB z$as14bVemoSUk-;ba6*6H9OmChIk371O`d}AJinT+(r)hA1W69_odALlaC1+1All+ z_M<0}6?tx`x;UaxF2Jt zA=C_z4kt-TW;egl0>~;uUkdw2=i9*|PPN+6M_uZgl|k{@f?s@YV+2f!JK%fJJ%}4n zzE{-)){K;dXZM~zajAR(>Ro-i_CB%zkHU~8E34hC?A*%0z-pR~d1m3e?2Pfxj5macqn?`F)+t-yUfJK}EgTq)9nB}pP1Jc$o& z>$FVWkcz_6puFdjUoX8_g+kp8Jj06WxdVd^I!Gz(M&hj$a1cMTL9x}s;`5OzWls%Xv|&hAS^!(fV;mj9I0%-qwr=ckZ*Kr3y~6IcOM zgrsyTndcXJigtEBxh76>ftjTg2LDx;QAZP`K@UOUY>u>2i`Oq--I&u=lgj?Dy#QHF zN`Q!^fSXW#9(2VVY_l3u>UnqNr&e7<;iaySQ$MqFj)~QA`DZy#pQ+e~fWi1nf2MUwp6Z(v5$^x4CTBP=G2ux>c4 zMrE;@&*tmcm-A`bxx0IVyfua(MOl%3dmC08o_S>z@IL-@CLj2{?^dXPFH8l7AP7}d zq~bbaRPEv~FF&w^RKuRpaYiIWqrD^3x}0rW&*xe;1;yB~ul~*0?Mlk+9QVwGaY4?F zbh{D;mcO0`6{8GubJ`B74`tnZ_*D5Nf{x$5w?Zm?aiP8~YbBWM+Vi~3;u(;)z&GE> z-Ei4l8Ow+K9|vWb0_iQoALLzvn%`%zDv_M;p5%FNMS}4D2D3Pag7y9m4qS7{e?ypY zFz~fQoA)*)h`Q|srq}(QB1ZMHg_&pP)zuZ>Ld08s$yNaCS|_(T6|Ut~pRdww`N?7H zIPZWh;GXTE3T-3IG|tBBAMgFFM{N~)TnedMLS@nm52#o*%FZr=GDNE3Ng=?I&FzQS ztV(Xq{V6m9n9#O&EtSMUxp--FwL3u+?q$*D!_+ksxLitqe^zHIL4O;V0ur=;;Xe_} zM5vn2r(-s^xPehZN#0V=*LOhA4q<>`NBAX% z(`o2&^dP>?tuL=H?f<$w{M>iuC#O+h3@?;ifRivS);KgC<5~4GOA?)5W-$H*yA4JG zv;ZocB5ff0fR;hP*q7iwf4(xyOrw{4h$?Jj25K0sz9vSAuv@~lv(7ipcOjoYlJ_*e zRKV%?^AJ3~x|KJW_#@^KQtE;22J~(Z{z3`+1L>!zXLrWuMlYj-4NpE(9k_j`LqX}d zBCi0OD^}2y zyBNzH^q{BX9#ZiL3`eY0%}NnvG0h3o21Iu?*+EUMC2Ai$rGK!DrOYlk`~All8@aH( z4g3AGMY{mBu6Fx-ABGPdV|cOwX3c_^v3CF6cho3H`2f_Vl)5tKOepb>FqZ6g+xuU1 z8nui)hHoLQ$Q!OmOYc5VpYq(>AL%+()-BHT;u;C+0~w4)(*9D5Wmx8e&T7xrcDhqT zhnle@kwaB8N1h~1qR#rRcoPc+`>umn{i@)}vRLZ$`_7N-$BDJf$?y0mr(3f%Oxw1% z)F@sQE)SznZ*IRm74SmeVV@j!k5DVC)e8LYn(e3ZsTC)W)vG7m^zMYLDxMiwB zsT*;m{)T-1oQ3_0>`xg8NshB-fvpeIaa~*qym`8&B3>*elaZ?aF&nPMU@`tOrs z7QkMFiv3~?RrY?f$=>N6HxwT|pu`70*k5AsRp4OQL8JM_lDTt8ozqY4g@ct?Pof~% zI&UnjaCd3col`#{i##3vtod1!;Fnut8S9$|8(i+vQUtuHbRHHVd4OsEu+$DMvFD*2 z**qs!am%=F_Xizut>xE)7FP-?E47TV`T3)xU7lACrgK_LNM6N`T|ian0RUbyMYb`7 z*L9%NDYhEF-645QY~zOwKwsrCa_Fgq#ke0Sf)R~ua`*!G@4orvL}}U3C9Az6 zb2=&Qv{nLD{Z6EBO^YLX(o(c1_(}&2Y#rhG<9&XC^b}KwR8dyFzGLt;ds04=!7(9+ zQ9b7mz#Th`Eo~((4L2L^lVxAuu@jGi4LJkNZ3gV+hCr-R+m3AGIG z{C6iEnQ#uq+@4gluY3|A#YY%DylhqC-dgT%uiQ)#F!vsHpdlhYJj!B4TO7hmvvLMD z%#`G=pR?s&15GQwdJ8snyv$Ss#oMYC1(^*IF)W64i~47equ-IiFhdk02-pb!*)b{M|FHNh@IcLGLTt}{|F8To z!S(laG@Xbl1&V_%Fyer+C_Z3lYky@w*sHp2bd;!CZsPan%@=nGnvMA!tsP=lD%4c- zp=us{>o8(N!ir8o_6LBc+E>Mr3)0u{+3inIXY?XvXMUp@Luy|)Z$ABHB)wk=WMu(x zc=Vy>nId`ik(gj8pyou#Gj~B6^`?=X1H*M>@u~UKfk!6(70xF;%p?^4ySf;pX{4w{ zlyt8fYq*$BU0P=SQ?PR&TYkl5Bdxu&Be?2{zl8Mo7?-D;lhc6nJ`5#P&#veAQZy*b z!V=?hAHG@7WmO_DUlX{Zn~;6qf+eh4oh9eFzpulCdhE}KP?X%6Z9lKW{ufHti28-1 zplfu*i@YcCo2g7MhBsHg12A@E4BtSLsn`YN0Jw#9X-yX6M7PH#LUwkY z!c>D`I3pCf0QiWUlv+f1uCFgw*3SO<33U1%XaXo@pDkI22&=8~Dupvx7)%9!JkEfW z<3YOh(OV?kX$7zqz@Sfy#B-XO6_*DlM?T6$T3Y5(&f@!a&Tz! zfsISZNB&>gDf!=vpSW(+@AYi2Z4kcxTIRVK>#GfDV{Ppy3Fc7p!u-6V%SRYXAwl*7 z&$pHt;V7Jq{bpOSM=g1{)Hc7y9j|OT4j-F>eyg${wo^TL@Zh?K#88D}>aJfsnc!7> z;oP~P1^z#!(kRr2bLGm7GR9e>pOTD|nf+?8n>FaQo$Ol@tFbx{AEvCYJK2I~yIC{7 zqW0hoT-8N*PV&fDwR1#b-GdHW`xi!;ex#~T#sRXOI@v3c=%xK?ld*Y4we_*YRA{oo zm6e7~c^U7Npug@KNolPN?N4iL=8V^2BZ-<>qcHmEh)9;^E=J2&G3M`xup!-U$c_vMa>K#>&hoVab$4 zfkVvYWo07s0tZk5f8#e$m$$G&3hFE3f&43}IZq?kodk{M6cRZ}8>^G9Ib(hg!VEig zBJ;a3wl-R|E-1+1jBjkc+`MxQ4hoXFM^hv?|voO zdSSM-ExoIO-2pm%`?K%rSE{fyxp!w@8fE6@Dj65(B*JDdq|@A4cZ~J*bDEm&ZIk_k zZ{Ex;Dba+fxW>ixu@fK8w(TPY?bCR?(gkW7YisL8KO1Z7h}c-Gz!ybD0&x5=3<>Md zKlc;&u=t#uc$Q~RsCHH+F0-mBl~_3n>>v!^=^E^52|ZefVGc=H+3mftGPgN*{AY5s z&`=w{&vYEON)GwQaBEwK3)AqS>kZ09&Un?x=;&d^S~l?2w4{D7S@)Q_rqL>i+b^8Y?aM&@5`0JDfq)tOO--+lKiT`P{XRL{2QjnfB8=gDceTE zTEiWg#%$@7m?(d<&)KT7EIwJkxp9V8s%fW9Ia*p;9#~jp&@jIrsdnAl^~CL`DyY0| z8Z1T!CK0xM6jfAQ^C!1RTE@o9$F6eZ!nH2da4GN)J;a?YQn#n1k5}|26J0?Wzj>=Y z^J;W_HPYt7&V($^8QXg~d}mTwVQ3?jeqP$2f5!Mdga2j*41THkA&W4WU|}Jl3QCkx z(ZN@3t*yPkeob7^t$~52KYKQ$I(;nGsl=k=0?aqgv12kUEbNnQPfw3+z{yTzZf8|~ z3T3(m%lDD6pHyr9rg6(mJp>JY`RGCC~kMr)J$lt5eY` zpj}1x!E$?hdwtudwY|MJipOA)01?{?gLe<=qpw~~ZF(&gefxHY3B3GyC^|mLs;L=S zPAx9hfKSaYE=J%MT$ylbr>IYy7#Iwth>nbiP_95GZdZbehH`g zTlfYc+gtQszlS7F4u=18If<_9?Lhb6`NVAuBw_^ z^AO_WI~h$LeQ#}JV}$=Pxt5il&i;&@BH*X++<|Y9E!UHWS=I|6w`ysXy=|4|`$_M0tAqYrBqt0e5I~`0QiUZ9^5W00&Z$ zqUYIyX!M%bW^#QNtXHx>*4^)d(?tr(OLdS-wKOzX>&JQP#|xf4JK*Z-%3h`0^H%hx zRI(a1HFZvYz6t_5_k&(!p6e54j)c>|gNn<;fcP*4rpm1`?)I zei-BuZkR?uh#OOG7Dfd3+3lR{>mqze9KyTHBj=qwZEbBITzDWS_maEAVspL^bB2-i zU*OQ%+FI0>z_XGi2O=D6kS3r$xn_I7)jm zLD~K}o0h%wRfs)UqGw8swFa*(4VCp{CiQBJ<+#E8r)xkPq0yN`!^37d?@LNbW)}yG zMGkX*DTU{n!NI}nBr>c#WU+n=Vdta2SDgI*{re9KZmzCB7dCT>i+eEfaF=}^l&POT ze~Z*EMRz7;m0dh{?t!dqpa{5$T6+C?daTKvXzmmvBO_S%nr3FHqxd&;oSMeQ%x?bA z@Oibhqe+>P-bBksk8T^3Jq3s=9=_!rkgyPchO4+9V#3_QBB!!)(9V0RLTQibpQ}g3Fh?7%xX+>!$f9YUV9|P3JIo{lF&PPH8@GB?C$r=)zX%lPRdje1n1 zoQt}wpDs79u2#?)8Py9p(DZBAp{Qdqb?XFzt$9vL%H=1=UD&Y496rUxT`>pp)r9+Aifrxd#QpyMdPy`p zJG-!r?QkNMm5{D$)OS7N?ye7V*>5k8V{AhhMIW<7M@Q#E60Tz=tWdG|T(T0HZeCOi zJ9g~Y6k*$t}ooOC?1w^tLluc5BaW@RX2Byme)3=VBJ zlollPjMLI>G*(O8tNCaB2nyUjSLf6re6d@%_{sqXXYBwAZr7BUhHrR+obu(cCd`R@ z2486zsUDRHMiMN$gK1c#u0sxk`PX50sA;;^7AI`eJ2r-a08W(j);@p!{I#oBf5E(M z?kp4xZ(Okgqdhvhn&Nc*xc$L6hxXfc;Z=0DIl5k6RWLk(Aq*W8YY!+oUxr(;-&D@^ zso@^^m}gw8Pb>BJlW!sf^W>0UQQL);t%E3z?wQawop^D-G_m?KQOwbKNj*|7xI)OG`^4i5w2Y4N32Y zhK4?Ty{D%ad*Q+bL#qek?#r4G$UL$zs@y!R>bYK!N!t(HDKY;EOBpg@hkHFths#vU zDJE&Z5mzY)4PYUBDcYNPd3ixR+p3VD3n2U_1@iMn88Q}uh7xP+M=Bn|N_VWq9frF4KnMXfys{F#;ZVt){j%M`$x^0WNoDX6B1V7Blz; zkSVQGcJSQu(|PA0@M94?oO#NSUs+8ZdI);Dml7WXAEPC#G4hL zj@9TPOC7g45lDMa@|J`#tgAnYzXhH-lqf1H8WyA$7CMg9p8WWOKt=`p{3Gfx5#T>s zwWgET@l+O-@hXu zw!tBTpN1>9k%#|Tax;2*;nkiqX;SZ>ZwL0EB>%%#0J&%Qk0doNAjg385Q1t0<0OHMRs=454kXrAnv z@5}v;0X$|8ZBC7fimG730o?)72HzV)p~CGIDP91V%`OWu{x?$r36Yyqq^03Fn`J1a zRj{)J-;+G?NF6~UkcjXj)Ar~58MuDzQq)hW01(3p-G#WZ(#~lgd}g@sKoCfH&W*pf zuRJj~=K_vEMa!(|=T~Q=2j~Z|n8jmI_G2@~uU;DSuMTv3p9I3J5GF#llpAoJFE4OT zzZBc=L#PQ?&=Ghh53r3Z!}g~9TkH0b*R^%5dw`;eZTLiv>a6cp4sCp=cO$_7-}17+|KWH6|2#p<$rtxaN}h;O!~ImU*( zxbZUVo;Nkjk1S0yBd<|!a5w9>|zGi5hH`2V839Og1^H0ZUIzgLlb z@zFJq0Qa3T&oD`NJb+auvp{p=#8p8-4M>kbT;QLW(^OFIHxr->(Ig+K$fzjQiuaIt z9zucx7=qk^Fo}J8FE)yU@Ga$&(i*2P_5O=wF6}k)PfuI4f=$2__(1o|U0bHwvP?uC z?sS@Hf;?nXkgS!WKYP89RJDS6TAJ)(5T>cW!LzxsqlxqAy+Lc}|F^aDQ^TdWbsCe( z3{H^{n%NETCZ@KXH%G?4^VfJi@&f$r>d#MowgVIa@+~0y(5KCR!}idpJ7Gwq)Ov3z zh8g>lT_N^{rU6B)?d*~qwp-iUmZWe%trY&b#S>U#SfD3O!lfv`W<#pHRxXT~BBgWk z+|V1%a`Gf2eSSN&BKw6pCzY_?5#lR^@2-rBw$=)&07?%fy@Zb0cD~Tq-+o7TV*zZP zg}Uk@_DXM_fLObZIN_lp^LG$G8-QK8U%v2JDnDmSl=e4P&kQ5{fSgm)EAis2kOuZRlt?bU1~Q^Wy(1bUQSk zP;%k%_}q+)rW?H6+!|;!`p2Zm&6_rDQ9J;2K&2U-eL?1K{x|U(|HAj|GW$fWxICw^ zk9yxQZ50LGrBf8mL(tzJ1{xYYz3q>MG$achOJRmsZ$WDVn)1M%Ln9=3ib@tf8rx`@ zQQ@m+{`no!pv?9EphiWk&sneqlcteV^HKjtkb2AWo-9fdjY^91ng3iQFs=w0Ui>hq^T_u=u=@nzE41L?=slvd(Ndt1L3`q z+<6n@Y)0|U^7%7M7gyI)e6S;CJ}UcG%kk2SphQQdo9P?f& z?F2W)LouWl5oY~uEiE6$SCXf?@0Pi*7z>MtD2CB6OJwct?#66ssjGhmN|n_=TH{$P zVn4=6D1;3*v;Ohg9LBv=mPT*~$sh`Dv2(6`lE-IOz@)_Zy4Bb8 zm5xBltTGw1j^3(W&$H13XA85AfGB|1Pk3v`*i-v;Qb9MM*X1^9WgSRqVQGot?yn4u z4Gbhlt5%C^2h1!)9uMnqM%$Hy@C$gE9pNgYAi~!R75*7Q; z8!HlnnZOeeyB5H(q>~}Py)<$c=mH2Ht7u4Zz5aWjqof7&73RIC^>9+TJB01x0?F1EZ} z^TzO3Kbp+++aGII=Ks_lVV@hYSy5E~v3B%dYFQ2Z#UYIQfLLkiB_D9Nt+O*4?%LV8 z7|`-g*?svxgzaxL10XvG-r51Z0^Q{L=f|5*n_yHSOefz!dZ}@^7_HW#xQtB{NBq~E z+xDYX!jDDohywlBT!0Xyl0j^qdxpRns?=YATfDShe_~$+ z?r&-T`0=P&aQWSrQh`1!?0?t6aCz>H1U1`Aua!xv!U6$Q?x0UY^}q(o|E)aE_;n~_ z^N>K~tixFz{WE=zVBpHyZGo?Sx3o69L0sec9sc|^;{qIJ_}8ybM4}r`-=+CuNyT$A1#H5C;mXJ0zqzdm(A zTzA8op8gIkd+xutyZvD}_V(pCm(=gCY1_bz10)NfKk~$jDuGKAsP9#tt6wB0KYsj} z0-i5oa(E$mPFMGq#U=WzjEsBWKAHA}Lk^1mmsg%qGt&M^=7&XtPibvn{Quaq# zu-v>i1)pB%)+st`wZ$7U*zlWZ9_gkBTm$JVgZ0e;yzl56CeV)_ zU7GbUJ1hkhd#KvIAcRF411T+NAT3ncw>cWN4oUKHeM2|HE z+y{ zUW`9;_G}JJS6PgXre*~NB|hdLVIOKk;=1LPm7-4@D23VBmY%S`NWq zqTPQF3x<4WY{L_{SXsYQ>Q1VtQJ@~x{F~R5+bs$oyqPew#aH2zV+;)OJLTz_O5E5y zZ54~`bwu|)IuvuP$5CuFFYmhTNX19b-OT%t(I5w8EJ~e41#~85WMpK|$=rVdWUJ4A z`SCAjDBs-r?Hix{;3y4BIUNE3ie8*m=THIhBPtg!Y1&I?84dSWS=@z+Td-1kk~a$~ z#u{Nsd|GxxXILjJ1erA61AFR7N3{6JRcfFk4I8%u5L)v8TiuP^TU;0_g*2TH0()g= z!Fzfz`_@LqX6^c7T68`lJMk1TPXTR!5MkV^I?v;a|?ALOD_skYoPk5cQjDckUx- z0t=`|Vb~vJ2~wcis|Sq)a?`mxgz5*J6hiOiq5@x;-6#NJ=CfzdxUQcEJ43mgZGB>i zbF3eMY)SWR&00u~k!(n28IIOc3{z?RscLc+ss{6On}cs%q3@t8thOGm&UW^C7Ip5` z!=OY$xw_j@?H-go=EXt~g6V@CC*hCbzVCqHRzMawW-W_t4(@+PvHwb~H}N1yHQ1jX z0jn2i1Q)0@jKBpLC}dq5b;dF?5cDBqJ0GTxR_n{%jI^PRix*05%bYjLz7In+w1%45hvWjv zd*v7n6rHQo-4f`Z;)&qz2tzR!(f3Pj*ZRQuRx410#_!s*2ip)?Q(`l$4>G@K;YlWM zFGHBLJr2g?oCv-3Hmf-DNigi5{Q7&4j&TtLb#+0K@pwfu7aQ0s1y6XKYB3IY(>y{* zyu7z}waxBrC8f5Q;k3+5s`M+O;P7Mv(Exh5cKsR@fIe9XzIzBp2v{=<*5~c*yk#Mk zvxaE2v~~1`REd!GL5+o_0Xj{A0D`wlN&YOwZPDNJnQmDFWLcNHz)J|zC>a)}1}!fV5O>wb5Iew)f+H`s;%qdE5{QjTLE!d4Texg*7v!5Jw&D~-<`1p+3?fWVtu}65AhN!+phJT;*<*6FXws+X?{TrS82Sni``BSxw*OUr;3~yrF_m+R#wIc zqG^)+cINo6T|RZ{6m>a2^~tkO_V23t-R8svR zg)@J%HxPeSA|*IzpSko?s>SIeC5zkQyy?|V)vZvlIUbXUOJyrOCUuOYtrdAID=zs{ zK|w*wm(8Lcv(Z`X&jtG*Mtx5kf6y+u#q;b&9(ho(tSyPW`*xZfdaXZu#JfQXbuw%| zRr-}?cZi$U>;6juTfO)jUjGYw?->+j+pP;WqJT;eMM02^A_kIV$sj?Htbj-oL6U%E z8X6E3PzfRkl0iU{l7r-=1VJ)18Ijy12~FsxVOGE2w`+Dy?Oo@bnlm$hhI;EQY`UMm zpZi|nTGtBC*$GjHnUw{7J=+MAI_7#$TKIP!ZXdOKv-zccoF4PtY-C93wIoCU(J0w(4W+)NrzYX^W=&r2WH-Ls3yt zs1M>hG2i6J@H_liM35YV_tVnyP@aLk4GB>(_m}xcnKB;3^{)ET5!pwe?BQh?R5OVxt3*{%b8D~7pR_!hg_xX z!n1R5eClnW{ol8e|D~I0`wc8{$eTA!gL(SogppUL=^wX-GjnQPgWG1jnGVb#>sUx# z`Q7IF>%wD77X5+lnO0*VA6C=fxWyoQjx41F&Y}5Ml?X*)oW-arKh<>8!^_;)StD{pK?ft_`8*IH2yaZFtU;KIn}reypI;Y{hFPf zEu1UHt7j8DuBG(jI7c*Z5j-ifs;JAloLZGIYYQ?*Uc;z^?S4(>UB~IBS21Xqe5QL| zWo@{qxoBnHtpAZI<<-|AEh*Yea@HqZ*=>=@IC5FxH=J&nR!q{l2BP+sxiaO?^_XV( zX4iG_rY6{v2nNh7sEN|o8?Js{Yn2PXck#VwbZ}jrG{VVV=mI_c%m;lFfto8R{W6Z_ z#1az&qJn%wVsjt*g66jU`Xwwx2U*}k6yCjA;ulqKcJ|doY1F8@cVACzcY$Hal_$-n zjB~#AQ_n9>bo(8;=;`a{VXG$`)b`tGg;xUCnYtiUP*HUI_riiRO<&uUYD=jbo zR4R1fR_Ax*`vvysk6S%{tvW`+lXwE|)f*r?4`X(bwO6lR4e=y+$Sa-d#JXVya@dm` z;U=A1T&bIus`w)Ryt!55PUv&^;Oqkb$0ALQF6%scZm@07h#S2|C3Q4UcV#R4`-k{v zF$15MW8G(RghZ3?x-gj($dvcKf1DAUQ}FfdvdR8yJzO4KKdtH1C_PctS z6be6&5{bxdTbO0ljZyKyV(u$gn1~LO9+Z6p3%703#O%Zsy@=6+%{cvA}fnnaUm8ldd@}(;GZ!M2KU{5bzqWg-Xvo8FcQw~+pMAr0U1Y-O_MEKN7^JbnDZx1L$$fo;iF zZBm!GpLx=9BcEd_<>cR7rt9`QX^UY_^>BXyU6VS+hk8j-k zU!E>>C1J|a)N@%V3(#*tD7uPkRTkV4flO&UH*enOF^Yu3gjZv$w$1jY(8f;Nk91%`>+x1K4Xnai1ur1Ak;71SG z+#f5Bg?z{TTF*=A7A{Y{-1CZl(}M&-bWv4~<4Qlb4)?J`~CK&gJW7U#rdF-ixD6~P>@x2gZv~PFK_w1^Ht}7yZSL% z>wSObk&aCeX2N62Ezz{dqLo_h?ztYBYv#!bX%P(DSnNgVsDy;K1pIFB&9?(fEn(Bj zN6s!TROg~WdTw@feiR@Db<*af7nBfqm`<*!=<4BRc0-gmY_ufBwDE27;r21rwAU|> zQ(GpO$d6pXx12->86P6sELZBDk8O_DPaP<ps@6|Z@4y``CQtmn^X_I(WMfG}A5 z(IflYm4>X^h!tJ0@8Qh13(Xn>LX@SSd zSIYCATcQXaTUGM*_EzjTOWQll*pD!m+llBoyQq2Vy(_0zlQ!3Ej?A)XeS|UI&(h2E zSV(DW7S;Yqxgy;w1}6B!jNrdx5Actsigxg8Mquc|mK5!(@NF5Us6MBR8j}JG4V0c9 z9TebL7#4KQHNgRZN*$k1`^>J2>vGBzXqRwtad{3^kZKBh>xXOWf0s>rdR40N!G~Fyb50DB2cp!lmGIBO%hU(a}%vTsd0{-88n}=b@A{ z5WURYC$6NZm~Pjp6ADH|0hH@#yQTh^zwPhfjt`={;}yrN3U{7%5A%BOY+aApmB}>- zo=DKoomxGHV7HOLaha;#9$jJ{k5W_W;9l^3OQ)Y`9)5gc3W}X67MG=zSm9}j`OdgNxS2fH z>(%X3IIcO}ER7NArqY6f?jGwHiHonf@pN=_so%bd{pmefdkKk&&IqHjq7IZaZ(q|c z^6BKE?cEc!<)oM|rH|XodmEqp)Ke$o26yfB+&WhC%o0 zMBMz4b*3H1<#!ZTAuT&WUN38Elxb1mz4O*F$8sCpvOIO;ooq*1W3Se4{=6Pz@>uF?D^KA&r8VODah`CfFp`2c_K_0c#^s+s7eE*U zyarFih|JG~lqM^Pm#njMG5cz34m)3GM+Yu(o>}G44{Erl-IiAUz-4P28$a{(6Vu6g z^Y$&LFWs^kVLMBP*|nKvu^=6Mc5_jvP+5Bo%l?e}W3ImLkdVbLMP@OlRL8lWAEsl4 z{G86@$SS%nklm7b$`5cRlvtOe;XuU=nPmIsM8J$|EI{!|p&A;ZV||Ja=Ch+~w8S84uG{QsyFw&%Zs*lQ%L_rEk_)vA?!Zi5w9 zG&PzFaSRTcD*bf&s$`Gg&<~0n%p>|w`sk55`r0b$`wLY{m5M?pPhv#E@LL`kud1Xw z;g9Bd1*n&51Ae9#!&cAqE_$0~i2l|7A#npKLZ#imMOk2)GZM6}iKGB0IrtX|2sR{1 zkmQ!jKOyBubX)T%K_t$T)`li@mKG=BC|J*4cLjAxltN@aBKD;ED?Ukn3W+STpjLDwzvA z`oQ$I2rEtYlvGZUSozLI;ri>XuNC}$MkP2YU!Bsby4)@|bGJEtOs%Va=v?AM9p8&} z^A1>iT@7n4K1kQe(j>x*IpIPzCEma@^~Cw75`*jeTYric=AuKSnQV_%CTa9Vwgl&k zN1j^6t) z{bolHne{iaEOEA;^DNdcxP>2ll_@DbS?PUr?`HiVI()Ca*OoOV+O!4pv*1z$QFfZ` zyiGKU#vM=5ls2HprLupsjjP0ow+Y-L7q@bM5yPvON@@^je9ML3yMl3pE*-X5ZZ~Yq z(`wBEQ|4B1a9q}p6kitbDhO?nrQSeZ_cnalo86C|7>3_2CL$}x8Z61fW5z*P>auZe zX@{oq?Y6o{9)OJCP>R^_${wW?z0s8!(dpzuyq9vQwZpLmKfe8PK@)OFWeLrmX(8?@buy@8M)l)Do1%^#!sWSG zl7@{(*Cl%bT4ZT#r_{?(et8APVUoi+66nk>OBclP?G$ps&39{Wij0FpCC90ljnYE* zD2^dYk5~OQ*lc)(?;LLhh$9aN5reLF9H$<0aS**$h zfBx=D^vR&9UpzWUOjIacv_9%nOs`))pnHTrHesqYpHQ#U@pf9}DK7gl^Ze(mY_{pU zzeEno%SawyL zhp}EC@2`{edDnnU_P{ZyHIFW-&3g8`!Hw%RH%J~Ya1{MqbMdR^yBEImv8< z|CY9(iOKOWEuVHlMntbv52Q(7<6M6K?DmKD{2FBUFW^p+yJ@+ETTmH>K#IhP;vxmE!Q3AKXd6x{oV!Oortkroy-#Zqnr_|y~K>$ckXpJ=Os{c;D1yg zWKkLcfk*o?CigqOP94;pdKWbI>1n@H)mlg4Snom%zu33iuz}y>6OV7Nbvy{000&gq z7?pw41(mq7US|(pEqD?&qT=y`4UPf1Ystho*0;Da5gRrtsyl7B_8>|nHrn*TI(Dst zdd&NhZFIvp|22sf{kh(b4ADPxwJqf=_peByOjzqn%sxUOD`2Dr#a1ZcJA{nQLne8-f zzu2~6q?(E)%?<>QRxmfudtP9%mTQV8AFOIRL5|yBfE$81C02%yWvfD%iSZivTeoog zhb!_w;xsy^hQ3Hgt-aB<;cZ&O8Gtul%K!KdcqG=fM;LJFYNk^U(0LR4Uv8PkGK7Z2wK$y zHONkX$wR|9N%P?pCpwTts9l^hWsvkQ_fvJngd_pRoY#i9ioEMW5f**(R}M)*w15iTKr2bP7mR z#5p-#h%S=AZAa z_kvnnut$Pqin2!(a$-+q>L06|c#rHS&6svhYcJSow7D&~`CG^^v4tD8XM!A^ed|>y znNx&$`^({*siQ0gBl_8p(QID(n7IbY8Jzp~G#oEjCdv+^j>Y|St#Wp}qlQ<=cdgBO ztf0!s-053-aZluP4=>xB=)-QRIXGw6JW8#X``fMdId3YnZd>WKul?$*q{KzA|M#0` z`p^~H@1jz}JHR`|wC7m?HX7LQb#7@`Jk{g3wkTB%URFTpv3v5Vhv8-7=Q$?M2hQ9> zlWb>ssw8!YY|kLrp41h;lK=yIc{TH|?Ayyy-xD8m%)Liv9^ky@RKtWbCJ;O5)}pcq zrX9bb(vvaWODQxSyd;sD93H0@Z#(XMLjIa!2q+(~J^DO3^&7e;2kYW;=g%x|ho7iD z*ZgI%aLSpQGU&M2ythVc*!sZED)I%kL0Hesy$&0*y6B&%;JmhkudsEvw7KxZVr#?S zc03`Xm-uz%>+tQz_lWDS;cKigW_G}qrGtie#8f|9&c-~7o%3bK&uw4aT7XqB=HGL1 zI&V{W$HGESC)EFNJ3h4D&3xjzj6eo$9MdLF(TdwpvvcLh-smXyMW<+wt`ow5aVC;M zJzYN~!#=BaW{Rp_%`5XDkakT~oih_3R3=cqI3hHLURo0vZyp2>f1hR?R%M~OZ>f-b zFMINesY}Hwf3@*LqKya4p5vy*_XMPMu*8Zt7UxwgoZ_1CwJlTult?dWS>Abk_l9Yk zh9%};$k$IEyYp&H#)b1yQZy!n>2nHG=X->Lx>pGg~J3or1v z-~zS>f*w!mi>G9^4n{HN{Y+o@sb*m;L)~WvEgW z>dMqgJce}9-1<`*JV^1@YXksrBxpG3wt`k>7R9r_T;^LF2wUIXuhUy@mHYkKI>$X@ECEJgEg%04{eMJE1j<-$Y1(zHV^+FM>Pb1LPo@EmtP*S@WcYmc=% z$XG1Y+c@b0F4fe^sKr+i?|_ZeB;t@1*|Xg%|yNH1|otUsTgA zvJscR2}X>cjMLBTk1(yeu5=i zkFb^Ic?tAzz@6^T7mvLdulE!D!*+Fb!v^!zC6ztrp~VvGA>IKTZj18y<(8_eLZK@< z;VX=H`oxZtC9j#IuSWBEpw50tMlWxRFTJ83{HF48GZp6yhDK3{40&nm8GV+Ny_f0F zNZ1yIpP`a-kFTy^?lO|hqp0qGhER^Z9+llWr|R(|Tgf@2t71|f!YTy`m9F$CFzf=e z{8`nHdl(kwEK;Ag<*>^7rKX8~f1(la4%y%TiDm-NTdz zu5y|0+N77T?+iy@5}i25Eov}|RO{{C9y;_I=-~ZtK@z6xvyTKFTbCT)x2@w2m-iRI zDaD*j5R6de%kp)IkH`T_KpASgv=C-Y2(HqPTW6oQyj-Rsv)+kkYkXnMf5pXSdxp)% zNuzsXSJ;C|=@QnPyC=mq6CJsa%5m9Bf0CrszQR(Li^nBp-QZCd)VyPwGJ#d`Af|8L zwI;>0T41)Ty2g$2cQb;Ko4vsJ{}Ywhm+><~u>A^W!9-=FnRfU$UJSo~{*m=&x_!Tz ztw}SaA)PX<5^{r2-#e7c+WTUR4V`{{H?k8&q2C4YnKh=KAZwwCth!84M8=_Kxy&GD zj^UGDk^`=&wxazY)Hch6Yss>>?7&aDwW(iB%Oby`dFbPuNLMR*l&rWm1Ie-C03jdnavF~6CpE{Rh6_% zle+UlW`(4mNsajvD_Cn#@^<4;9`69wd@?3udH5ox@`;CZF!D)er2}|#jBgQONwLp5 zR<*Pb>ji!lhaP&I>(sp8w=B;hfZ6t9r_!$`lvlH0@uP{euX88oYWkH=aj`|Jw#j$h zGwfPgGD=JCyxf=7YLI*;D`gk=1T|7#M}4wk+fG^9!+v#U*y|cas?6Ws?wQ7eB0lj4 zX~|u5Z}yQwSyAyRlbJGJn#p&wVvWPICUo)sFRI>c^&WiZ%Q>CHSv~XQFwoka^Tu>? zxCqOge{*Y%yDBaL*LoKjJ4ywU_61@UE=OR5{5IOCa2kyIGryb$FHXoL=0_C$*>0tK zy*TOe_jhBjng9n!-z(f0`EFnO#>!zfowisYfmE0C=KE3^jw%mGyDsty4A35zmJSaI zv0jkEJ67fbp)=5H(=cY{22XuxXWwVqk?@r*KvB(g zYY<4m=XHTjrM*&S#GCMGK>R+0E?o=b z=;!wspJSQ&TfT95h!SuNT@pzTTuGMtEu28=JZkbI-LvaXFXh9`*JQDwI~N5V?~w!g zCtalRoOiTS0#FWeFVu3GQ;^83UPR8jrVqM!!%BUAO&BEZ6wXOG-V1*An|~509pJZK z74Zf&ne2KiXD`n<2o2CSzPXj;@uOCD*ftRVSq5} ze@rjp`Mwb7902tQ|NXIe5(IwJH)QaGDG36&jNFB_;nCJec)MZ$mEV9&2dieK(iU!j zan}pH0(20B2qi*y;bzLE0$UUEnRHG)Q88H@qr$TEu-dmtw@c?kYy{lYU$C@4OCg5# zKV*{~sKrCc%s22H|oC)Y(W7FI|kq)<804ta1CHvq4sKZX zck^xe0xovx==AwA_YtABP;x-Moz?3JV4V=xA^COj7+m8R;t%(oV0)qEg>ql@&UKQ) zf!FVF-6`}D=i{CSp?W*M@)e+)wJ>@zYdC2MX3Zj?Uv!dHy4VSaY}kwfZ?Jy`#`_;6 zTDL76^l3D9DQa)b+co$c#&?qvJmc2stzMBo94I4WSk@1J24OsqP7sLJJRDkMq!Sc; zqTi}$5yqpWxceH8+aM~+A7a(qBBGSQ;b`HluK6GG;ovm`VNvQ@d~xL38@a<8PY88I zd@9@NO<*4f>f%lTd}X|As^e=|i>~IoZSVLrTl<(xdg@}K=?7)LsL7DnU0`(e;xf#O z`PPGTJApV9$;L$~Wf_wa&lv9LG+^REK~MsAUmYRpL7EJmMXAQLpHF-XJWNHdb-Cu6 z=%vC;+I`lo=m>Y_ItE>0q72(PWVeyWJY}gbZ(n8Z?^(=1AxyBo(EwsSek{=42#-f zZZ4ScN|tnebWV4>lzM%g>)A_fn`cAgB36OK?SU8_pz=wtqv+@^Sk|;^*jzS6m>N{` zteu14{eFZ#fFTmZS7X0ReO23h!tLp`Aj;UfN&kUCNA(h+hR*ckO+1;hQ{nI0-{Ojq zq;e2C%5Z!AN!7g$#ITcAM?wdiWo(cOc@kxPtFB+K zhFYRZccO|(ROU|KvMR9k2NF%>l=Inv=i&g|0Y53^TfiYnOlo#9Fc_2Ix|0sPHf%?v z__Ek0&ZqlMd0n#>AA$$~$QU|^V~JJ~kvi`&l`9eZY_XNZpB?d>!!09%foKq~wS}b6 zJ@eG`&EKD>z?1m7rNYMuh%XNIOtI#-Wx%q}(5-z?PVpy}Q2__HNEeEG=rR)Yu z1hvcI}^qY&asMyYFAelbQLuGux05##c$ka#HotLGU-6=6|8Kc9#&+CK(c^! zR5Z&Is1uewFJ~d8u{WJ!gWmC%cBSB?|8_Zh3=68}26*{x2NfHBBSZzg&v2(41S<+e&EWh1e8NT}SQf}|XoV1M8kIQt3v&{oM2-qdwS!rtQrBh`ZW^8TmA}L%j zF}ldeIA2Pj*_wf5o7O_n!yc3#S4G-diox*}?R&EQnR~r<0wilOJkC2mQ{Ns~VTj0x zL8yJ;*?-4JC*I>SqM|dwWL}fvgwzZB(QtX_)aY)0uwCfn$&1F~ldi@evla{NrS+_tAr!Q-loD}>TI0J{JB-SrZVX6%e9s8UyVMs?TWd9wu*7xO9#I%l9~|`_5*~7Vt~CEwfR#u6z>cnb})ZR2A)+ zigo7F@alOdSTcx~o^7Qb9UO#c8Th^O6}xP~OrU7?R~0OIH9>!b-*aBx??ZMW{}r#i zD5x|Fy8y!fuaIRSoKXk1LT?>9bGhYIYL|F!0-bu3=PEdQI_90c&9CuHS^q>W-PH#& zUl#-7&#~b%&>(l`AQEZQkhzWf*G2?g=s z6|oaHoPTxHHZQHGBltV3NxnqLP5f3R`tgHJgM?|ft@6th&mT*3lQ%omZUztUwX)hs z&QLTN1G#nf-*pJW069t_&-55-7a@Rl{PI?wIwQ+Shdd+L>7K?hVj2jTyC9Zl5Js@? zg4*Y@XUNc!Idx6MY9EuDQ~KCX@^V7=vHuInr!JVljB7+D^LN-f<+@rWQ5u1d!$`#$ zFz}{KsrT7ug!U<1&7q#JInc5c%z6}}wZv!T-rAM;=`z_^0*{RnZllA?RS+1 z!2iuiDb7o)8g6sbEp>c63i?i_d6sBc>LCDO?>2H7&FE2PTM?U(dA&xa4O5C1jVhhz ze#N~Gv{2q*29*T4<`Ic{|N>(aOM`a!c@1`Cc;tG^oqIa3~&{=;_87{~s3qW}pRC@}gwhlNxP zqY0EkWF02$eLD$Yf4FvpabOk-ZlTNyYLhMw;pGo`vHOq$zOgI`acM_+v8m5#&CJRT z?H^UQ^ZcJVugZP_`#LSWBSF<$R)B^80ZepsMb&ppffBn^g@gC%XhVqdueI*3Q-VyWD zej^(Z|0#XfC{=EMHBpJDC9nEx&F<~3!adK2j@jISp?a0AKa-@TLe^w_oVyxW8LQ6$ z_*?g6PMet?V;&o#mW)aCr_=Xan|&RT@E3NdEL7a`8e|-tpctln z=`K>@btrPNbGc9V1*Cw3Ti>4}e(1x)%q-*fD&0rV;Sed~?pn4!npD}DIM@d!CWnv} z`Gb!c0xiZ+ZLc@l*w@{9&9n#>HH`)!3Z9wDpsi8G0dYdtbU)MhxI=x>z*CvO#)@!| zF{PgyiPd6I3aG5dQUp|GVm|&XL}P`%Tli}sBxH=+u!WhEN3qOD*44>SIGBF9C$ldJ zioM(Z)_EBd_qQxBSzyKS-vx9-P*kPMa|f;f3BD${L85^$P&zKZTCI^1)%4pR%0sLV zF8-TdXDWbmd#Do*#cF%AIUGZxy@ehD?VM1CEz-KjO0 zbFC&$w?V>k=}mX;1$;a)BGdHhO1&)|4EVd=tZ0ieh18GizBg$)+58-=lLE4~I?Kgl zQ;;F2qB@F^MW-q$l3gFDJAKjX_Y+Ilv`-s$11v71z~r|~RTZv%NMYy;>7*J{N$%r3 z_s(b(m%@JVuu&dCEaBn5krkn#Xe-8405#-HzDFpJy{GY6Qqok29@l-lR!d?o33B_t zHuadcb~sRuT*J>CdrNH6P5z03856bf3O0~|f(n3z$nc32~;QR+m;)~L}f{@?)`X+DTC8wis|KMoq8Rq zF7CWZbA;NJBJ3FucLYirPf+yz6_#lkSaM71JPk6Zcka>UDXD>|h$jP02Nf4unjlX` z%xYv4D=ovDWokDH$~*3IKHTx@$Uhe}kO(D&IrY%%!_=9vvbig*Jw`E@UJsQd3X?%e zkcHQd`q zu*xf#_*+2-(euIENkuy12qb04_ky$&ei_dN$Nk>2>!owQC+mga`(yoALjns#*QWJb zdc(VlkcMq$H5n}(eg&`!(EznGP)TCPQ{p8x?*^%M(c`LVJDlTBNtRjTZ?TdRP%a}7 zA_f&yjurYqf)pZg`wGVjY8R=Gq&<)d2OKxBPK;RZyL_dId53slT0gPV{I&IUbo0`s z56{HE>W4@9QV)NaT4Nv~T`}1b3A_RM~$rFM^;I5$d^~AvC zp*I5L#YM&pNICFQO~e(+&d)#3_WLTn1mWbjB}J5Hkfg5!n)k5K|J7L-X80ue-}oi35NjtPYhr!6pDQ<;-_oD#S=q5 zE`a@zlQ1FFHAcOJP(^Igb;2D*EI9Ehp}#JONApk}V1)f{-N0WRBPK4(d=Z|`EwYX% z0Az%kK{Ry(L)+JORauKvWz>#F9MfMr=d)^`eNeEr`g!Y60pRX^(%xzf9hw&G#4{ zFUiT$RN*923?O~){*{9%TXR}EgDm(`IXyGLdA)Y9ujh4XtS2Z*pO_<5nB3ElS4<)I z|5x0Qit_=Cr!d2W06sHy%gF8_Z4c`^A|HYL1*t@cR@@WU1%^>VvDyKjYK56?nJ4R` z8&v`8BmM~{BfYNnS*(_>4du%){$%HpQVL+@c1|R}6>+CaGsp4PN$13X&s517@2FOx z{zQ*(1YmNGK!i>dZ~Cvklx}*gtXWwMwJsc>y+HZ;1N8$z-Kv;vrfDn=Ygb3V$f-NO zuORq`ee5G}T_?m(VzzM0&h`8eu1jtL9|sgsP#YqXIo69Z1L&t$u+KCo`_{ymNC1_ay7sZXOMI?s@s5tsES27vkrsmI*H?d76Z3C% z6&bI9<6&QUN|FlkI4p-*uzq4ZwRb8iXc1~~6fi-$hu`W76tvy)PZQ&FYk#5nqrzErlHGA>^DUXjL8oZP04sj3CP8 zSs|!uk^_qZe8(%QGfgLCcW<41^oz&5H*a}BU<|6^Ah&sg$~nuMm|5p!dBxu?_Y?Fo zV~Lm!2Tj|K7%siIPW66gJ{og*0Sk64$i)ZlTH#?DWYQpM3)NIqpo@i7o7ahfMKzz% z3E}I4GyJgepU)d>;q81Q7JdJrBRN^E5qY+Zu!kJ)2Bl4fEi4YCiTxP>pken8!Xo(mnso8Lh-h^BCVW4@(Y zT+0Y51E6{!PcT6@B%}8Ogv@HhbZxNuAe0uJ0JUNdkpOl9a2d0V#o<2!9j}vJgEDiH z>h~xi)(aBwOtn=SNfv_FK1B?xocic{u(AfFF2nD(1Ut9scrP~gN8}~;!xHGMIlWjE_(6rj7gWlmkczZ2vGMN>So@;GRp8Ed*o{4`k#N$%TD8uXnVz2RLp7P z6nXrk;w~xleeH_byaXNVE3sC-@+w?0`Rl}!d&b}BIF|_huR0vjBUp;Nj<%nM&b-g+ z{^(secPquX*3$Z=NIBNv*wr{YGmRfWYC!mH?s>284OvM9(a;0I79)WNLrknKiPl6~ zBq8OSf4yZmWn&!&*-6$30kpP-QN-m}Cl?)$W0uVNI9G+z63CQJg1G3($y=nhp8a;W z=Nk|Po}cuBmtHFaSwSmPdGzSR5qSsiNAg5nf_x@JyHDyg!};QB{UGnY^S!lipcc8R zHEydTQ+w_SlpnCO{$hC3uV@@8Juxg6BYrZn&-?qUWWPGNYFv*Y>~N1KD2G|WgP^3W zfFQCmmP^CJkHK;U;RG~ax{v0!LCgsRF5{I}Oh?d|vKgCLp&F5$VI#hnOyQbccl5NH zHUJU;#1bJHzBmVi`h2Ki&{Ce?{iWI38%SDBmZFP^-Gg)=QAr8FG8SAJ#w_1rz0Jtx zrUSkmU#F{C%W}1&l2@)Y^vz8TZw6VvhJuK_k$Wve?Z@GB0T^NNSXfg`gCUW1PNdm% z1ooOp*8-)=%xz2a>Jhibx#8Dqd~3JRu5Pk_rN z7V{~HWAP23Jb+OiEXP*fOe4~YL4xfYV_VMfJS%E!g~-a##kC0XAWojw#r05~RG6Nu zxSN|zN>07~^--nsU)IEA(PKZ@Ik+LtwJ;_&C|0$?(6M*Gpc8+D{E1Y$m_{)t2c!6I zhlR`1A<@dRwDR%6TNx=oGZ2yP|E;FV|0-QY{OSxz{sEeuvisD~LrMIxzV!cD_UxbK z{LiVv+dAXL)-6KT!=4PCR)M+(iI(8|bkcp^{^el>`}LVF(%&&9CEVc*R7 zDJsUERi`ww^YL|;=WlLq{@&V0$PQwy-_5L)!h`vOX!G8BFV$RBoernPR*x-PXXKYe zKIEII^^s<+FQ`k+`K6wVld_Z4kWKt4U z{S;08RK)l1ier|iPn{~X?1<^TIuwHc^OjHR!Gjw*=^ow$P&U<`Bln*1!e+&X@k;iNAc-y{ z^J1&R{^p#uqoY37Tz?3@wiy@L$OdziwDk3Zp>xbA+!B^<>E&XWv1U01<6a8wM+EOL zSWSmVcIEJHyNx7~M<&W3D3^x{ZWE9_%JeT@xZGjgc$cDpeGqip^w;v?NVl)m@KYPg zmsJih@92h`U2Bag?z!-kGMR3-d+UP&ziI+WC_2Q8H8FoAG4YaHT?aBF)O}aZkQao< zDJcZj)KO_J?chFjLg&IQl+1SV!t5*?@o%Ov-Y-ljeW#nnj4 zD$y_-|DMUoaFDY+lc$8YioC}!J}=}Siz=ae)mchZn+^$5VRILdg zj8?vh75Cn;9~c;5*wMz&A#(Hb2JJxZW3bS^%*jCcsl5Ec^#@;M@7<$5R<5Dm}@JSY;-m|B%HHuwVcNX%!CAEvJ9p~ODi z4|g;)ya;Vnpo|xuJbjv8UOrS5t16@a;zeWyr*imjm^&4Oy6wGlgE$irx_;UP`bLtr ztaNr^9+4*ji>9(X>2^3fH#glD$qASKDB+fCo&=q4_ghV+^&dU@lK%>tboK7vC;t7T zjGuIFZZ7PVUG~#k)mwu;tUYJ~42;V`#Vjk!u&(AOpiTXZ2_~kd>tfeRZ3nNp`SnzM zMUR;+k1P#KOr$5?Fe+F7nx2~4un`X=A0zhFN2FGSjpb?96)2 zR`|n+))|3B{QL~hLS149T%I>p4MjdQIG6^XgnvS#>0e|md%-!w2Rkq$QSECUbf2C$ zaiSdm*ux=c>?xrpW?iH*WoT&VPm;$ZiJ712>sg#o3QaIIb8$5Hd+)M+?>kfFk3=%j7Y(7+gq(aDNmmO{IKSV2DS-@hNUB@V+VZ}PRa`b>;W7|EmbF)QIDy-5uH2zDMG zRb$urb20(~v}&=uR2Qi_o?@{u@s(up=o84W6ts=P;PfE4bVO?)JXa(~W!!-Yd3YHdXfMdFabaOaue9 z?%ra{4*T6-?Pd{?6XK3n+)_S%q=@aXJIZ|yNVo)d1FU|_8HwJf~GP5 z5~mfIA;r*j)c79PLn^&=LPT_+GebI{ku97>>J2ER^ellt+KfMYEmHQ#w`1ep-MhuL zj+j>DQeP%JdYVgA6umi0Z|Y;tP~$9;<*R*Ddg>2CfB%3(G&bbJcvtD z$N|AVfpN_8@?du{jfUHqpH3g{V;UB=*g-JC$mhmxfW`+tME~m~cYe^DGW@i;kh?Z} ztC;#0w4{T47-1n_3ua(VI@SAdf8qJYpF0C+v=O7)JmIdox}MaGMs2V>Ytb854)bqF zcZqV1-E6=P=Nn)u0xjYUJw3fMomC->Uc{W>g-+^fA9Hhd4S1~Q8lT2)voedFnsq%+yp_W;@XCZ{cv6=12KpnBOf6uLr(!CJ&Tr#x?a;aAO5NE-QAm z!*qEucg8sIJ1ZrXb@I<~yi^{j_~kwaJr_74@gwXUXXWmQs)`DKC?wdndrSXU5g>B-U6}=sgR=@-ZtA=QBmp0(%H9azQjiL36SDX z7^)bi7SLL~bpv186S{ku-0(=<#3UKhc_2#}`&f8(j-A(3&f2!!_Z(lVU-6krs^C`ay&tcFLokPtu|alSYd*qL z0E2Z7j(suZMxOZq&KH~rvtvD> z95=D%OR=5x2=27iWdX!7#)9@F!Ql2+g`a$G^l!Xa!6#@L8rm=zy5`E<9vK-4dIrZN8F2EaW3C)7_mg@y;tXSB?&d9ySJ%+tJkXc<_RM^&y%;oVu&xeFV-43v)tbMITYcLDZF&CRtPA1dkO zsqA0>2De4 z(vu0+!_V|F*L8m3PyNd4q=P{-G?|w>6tfxGXP_4Fs`|* zVb1|*P@SN(b&lcOVcoYB)9jGj?S@)F{%Qzo#zzXtJ_lT zFL~4av@{YBr2hzuU?8X&0fz;cQEj;mLYwJXNW(;>I~i+mQUmU@2E+S}FRucVIvtQ+F+J%^THQrB z$)rJ$Bb@8&FNly;nK5LIyDEkp0$7U`>F8Bme{F- ziyhQhGjyfQ#Tc*YS|eK{czR%sM~4<~b@AOw;#-1r{V1xXfMReK$#ppc<7Bn9wMh_S zUYlGneDz87c<%i?y@CyJ2?zv0NC-NV<>X#W69Am2!X!=M^D591p;kt zBcr!O3kU%NfB^-7_d9D7FwIyHZ0K0H$?-rrhz`F0_%RI*-*$qCcvp82sdaTGwdKA9 zWSI=k8IBMTE=Z4F0X-d^88{v>=UEDHT~6DJ+GP<)M-(702rl(FEB*ueGTt>dW(GU1 zM~Gi?JB@%5?N@Ky5E{@mH&3%Yo+9aW7AC6`pICj=b;BRmbpZN2a0-k9>?-Aq2h=uygW)nE4J^5xUq(}NK>rdh;00W69A zksoW*t#-e!N_3rL8@x&WtWul$V#OR}%kzg*o^Y%W*|^E7oL5|@yQ^Hb##ep#5Oc|$BzY>qfoWa z()k%EIp9fveGCr){^3UEoO5<9nP0ztZBXT!li6zQXR36aqYU-}A*-)XkHKK{3LIga zA#$pw76#j5UBGwxAGVbF?DV85?7?&GAOMXB2sqaIO#i`y$AJFJw**1DUINZZ1)YTe zN?{bevSQy#mKCigBMqh|W@gS+5(~AX04+IWWTyU(jE_Is^N~)J^wJqDi2|-6&%{^C z;1pS4P}SGGJOvnnomOEAf!;+Wr+nk;AnY<4Y@o$Rv1NJfR$90pP%;zYz7C@&8X(LF zGxwth*}iyQz~xkij17V2Tg6mEv4Yevp-Hxx!0Nl5YH4V*c$9Lz7DJ$)tUj^3!*ms2 zDkHVjJhlCJKO&tf#oNJ3=&<{PiO*hw$-ye8pQTYau1OX4Sz9h3&g-@nh(NGqF!DF3 zZE*eK9sTYU5=1xGZtPsW)c;Z3mB&N5_I>q84o)c@6*5kwOtd*6YnEsbvP^an*~Zvq znHe2Rj%?X-5GrKfce0_)5jl?nYhGmO- zudeb&$V%Gn6$EwF6gptu2ncw7k|cJ1jnFbe?onG-H3XA>hON!M*6IX0o=F$Rh(xh17eEtLW~= zd7C3gj+DiEq@D`VpARbja9___+Mt$O-N=w#|I}0)>vemMV9W!<+^eQsoF_SN2widd z`XnH7^=f-P7k{mr0fxhqQSbmINQ~5=#;qJ?TcWPZ6Jv9H3B-u#C~%zmDsA;eTXp_X za}(vyeK1!Zey=1izrz@9-tT$k&B$D=TNy2BEd7Js8H`atVt8!?-VHEU?Ue~htbd2bw_t>2X{#~ZP*w4@z(Ht^yC_D-M-m1p?s z*7nNsa@3yEjl~rN!>Z1T*x%pZxqtFklDDwkFC2#o9yvQ}t@-W_1m;MuHCP2^llwCg z_WQ_7tx62C!Gj1@nAyzYi)O%7qtMtF_?a%_Z6Pr>AZHg8aWxp@PzzfNYNe>3E{w4Q8$|h~h~VJhj0~kf23p$6!a~8_Q_&?+ z^H#F<>|M%2#_M93lbqj|dS!^TOIxBzBx>eamNff3KZqDsrv`o}f0vXUW?{jF%+Aea zRK9I*Z|@=sO^`z~d#9vM1upqFruQXq9~tYf-C(TrAQ)TC4`|#tCpKv}c*w)LSBO~~ zIU|>LHMoU@V}8EE%F29u@|gMB!u`Vu_te23ZV#$AncMEO|F9h5I&c8KJpNS(UjMy+ z>Qy_a!p-`$V`_23UpPifzhFqe%=m?xXW^J3awC`07MMPFCktOP<(H03><+`SL3tC$rZWNC>)AHo;4PM>b1_XvH%kH>zQFv-03P5e7#b|NS5jG4cC79V zi6WNN(?#10uUzn!Cw}bhjT~I~u4e`p`Z(uW+2bovjCuiUIOZ;JNSXV_7-hrD!{fD6 zRlX2=g0|>6RH%w_vbOs9^XFl`NWac}cyTd5Eh)>VL88OmP@H#Y!Aqn|c5{*|ROC9} zxK**78!^p$4PQKelW)S^#A?5YPG&Zj|P-Gq(VjxV1-Kb!Nbud5pv7>MPIdQx3o zUHSHHVPGjh4DF z{Dz#2;?4>)-r3xZQdcdeAlVNV6%{d&2X)cnzE5zeoU;8!mDh!0?ZcBg+4_Lrs(`kg zl9H0D+S*(Q3%Vd%GyAo+XePGCnPiCkrOH&|j;^jox^A2Tv}B~!z{on?DPoqXMwa*EvYR_*iEfwnM z>Mql!rXJjZ6=;h`c)W{?jDo@t?0A!t0|dC75+Bb4>k3@tQH<0Ko#9MV`nq3eTEuJ3 zJnxF_YpqCNR9wXf&P~-LbD(s9>UOm4rGKN~Nbm%mU_0K{-ThRcV}QxcCkUU?gVfHx z>g(%!rNC}YXInW+<3AB`Ym}$7rbfElKrrGRRI_|Tp*X*@xeCUvs5l_*v&82*Ibls? z$I>xiaMWO1TaZWHi)H0g8zw&wLrHL!w^5ftzrek7ciW7N^Y-5Ot8W_@67a)Jm1YOq zQ9W|<^3%5*ne8Pg-}Ke}Qvp7;kIWOCg2_Pl+3Zgy65@W)|ZgtM{|sZYja z%!|<81i~d0k~d;q-qnG%X~=1$?5^aYIKY>HACG&@=+OFlIfVaFnQ^73waGi1f&OfL zF-q^zezy=iH1ZcYUY|vSJi{ytW$p_}J&pkZX4^PRkU0$v4OPj5oSdBXwYAT@PIAG> zsV5hUEUd5Vk6?UqcduZ$6!%ptz@LnzrQy%dTy5XKfB#U{dW@Qy%D>%I;!!6Km&E#e zO5dA4nXegQ>_sId1?U1)J?9DQ^YkX0vRw7dU&m=x&CQoli(az%Bnn_Gmb&Z%RT$0U zvZz!~=in)sd_yEMQPT(G>1hx>l{?^&YkrBcwPg$#4pp&s*lhE*;JgK5yx?WJN3e?f zgpmSO7a=#Qw$kuGOldD(INYewkEbWHoQ@TK#U>_ zo15q~oeuRu0K70|Lv^xH?bHRJ%g?grq^RAd^77-!L+nJk=m(Q__VyZUzUJw3CJMpc zCpbc5m-+1d{BC&Q6*Hi-3;<5mAr-uJ=GbY;;^Jb(dPO+n#2sxBp~B)~Cr?kw!K=lF zNU%lW3m|^_lz>K~Fn`4gn)$ zF9M5ip2lD>^1eiH8nhj6k(un=SDhK6cozg3ngHQ;&v<|wX^O@}7sL@plH71Oagw)D z5xT0O!MWqG+*8iuZamT|$WYeN0&U;uu?xO+YVv`QE{r6g}geOM~0)e;~-xY~x z`XEnO;N9KaR;f^~aeQ$Wih7^N9(n&$&`oD&XC69Q6n=r*{a<-kwM^I)Tb0-CvelQ9 zlS9;t!QQRjW88`d`1$$Q@qrHU*I~=*r~g-`A;PT6_b>BCbWA~jVwy`C8P>sEA{Q|)9`iOqv|ecY+tY1;SE?X(?jI=%DetxeAEj$OR0K|&05QNKDbV1mL58My)cl$28#8P7_A?M@iDZGH4 zerqfa=oqP*BnAtw1!q#M=W2|_yQ%VWf_z5A3*l-iWGv~MSfb_+y&;A7&ry9`Dn>r- z?9`_=_tl zfWvd~DEI*T&ma(5^_&Nz)Z4p9zkDeVfJRKyn}F)%i2H~Ox%si;8iwy{wKcmn%1i4aKBCa6--Sir#-GC9$UWO6yFXLwRUPVOU^ z%VtUPMVBj~YYQ*12X#8^;ayFMAbL(!DWHZTWC=MZsZ>)-%jkq-iV-XH;b`RruP^;H zI=-&B0N6P-^tQ-xUX`7_CUPJShf%iGs}+EB#UyQttKUHYfdE5Oqz9pN_hH3pzvtjt zRK{Nd%~{>v5(?l370}O17+k2VCu65m{o7`4&}f|U?;$S*#qGNtqLr+E`kpRRwj{KQ zDfuu+G!&Ow;Kqk$oXc;55U(&PuA_uez0XZfReX+*YSkQoPyzkWS=suixU&IbATn@x ztgEZAR;@Z73yE85YN}6@A+pQ;MW^(+cT?^VFB@C#PTOnwLrxErbfI5yf=x0qGF#iQ zO5y5Fg?m>#(sS(vK(tm?hz14%ez9fTOC%~e`h|ss`EO>OBe0Fx27?C|%WB=^oo;w% z`Oi%O{#$1vj?K)1_fC$}kF+O-Me;v3^+`t!PEJmSVgGgFmi+^*AL_%mf`d*m1CP3; KqgJePKj@#X77K;| literal 0 HcmV?d00001 From 2956823beaf3cb062fc8c9f285fa13c825b67d7b Mon Sep 17 00:00:00 2001 From: ManikaDhiman Date: Mon, 6 May 2019 12:07:09 -0700 Subject: [PATCH 346/724] removed extra space --- windows/client-management/mdm/policy-csp-power.md | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/windows/client-management/mdm/policy-csp-power.md b/windows/client-management/mdm/policy-csp-power.md index 376605a87a..c1696a003a 100644 --- a/windows/client-management/mdm/policy-csp-power.md +++ b/windows/client-management/mdm/policy-csp-power.md @@ -67,7 +67,7 @@ ms.date: 05/03/2019
Power/SelectSleepButtonActionPluggedIn -
+
Power/StandbyTimeoutOnBattery
From 7d5154f5375c15ad8daa97fad59e6e2bd2f0f4cb Mon Sep 17 00:00:00 2001 From: Nicole Turner <39884432+nenonix@users.noreply.github.com> Date: Mon, 6 May 2019 22:10:39 +0200 Subject: [PATCH 347/724] Update increase-scheduling-priority.md Fixes https://github.com/MicrosoftDocs/windows-itpro-docs/issues/3156 --- .../increase-scheduling-priority.md | 18 ++---------------- 1 file changed, 2 insertions(+), 16 deletions(-) diff --git a/windows/security/threat-protection/security-policy-settings/increase-scheduling-priority.md b/windows/security/threat-protection/security-policy-settings/increase-scheduling-priority.md index 7cd6b91162..565e032adb 100644 --- a/windows/security/threat-protection/security-policy-settings/increase-scheduling-priority.md +++ b/windows/security/threat-protection/security-policy-settings/increase-scheduling-priority.md @@ -38,26 +38,11 @@ Constant: SeIncreaseBasePriorityPrivilege ### Best practices -- Allow the default value, Administrators and Window Manager/Window Manager Group, as the only accounts responsible for controlling process scheduling priorities. +- Retain the default value and allow Administrators, and Window Manager/Window Manager Group, as the only accounts responsible for controlling process scheduling priorities. ### Location Computer Configuration\\Windows Settings\\Security Settings\\Local Policies\\User Rights Assignment - -### Default values - -By default this setting is Administrators on domain controllers and on stand-alone servers. - -The following table lists the actual and effective default policy values. Default values are also listed on the policy’s property page. - -| Server type or GPO | Default value | -| - | - | -| Default Domain Policy| Not defined| -| Default Domain Controller Policy| Not defined| -| Stand-Alone Server Default Settings | Administrators and Window Manager/Window Manager Group| -| Domain Controller Effective Default Settings | Administrators and Window Manager/Window Manager Group| -| Member Server Effective Default Settings | Administrators and Window Manager/Window Manager Group| -| Client Computer Effective Default Settings | Administrators and Window Manager/Window Manager Group|   ## Policy management @@ -97,3 +82,4 @@ None. Restricting the **Increase scheduling priority** user right to members of ## Related topics - [User Rights Assignment](user-rights-assignment.md) +- [Increase scheduling priority for Windows Server 2012 and earlier](https://docs.microsoft.com/previous-versions/windows/it-pro/windows-server-2012-R2-and-2012/dn221960(v%3dws.11)) From e177eeff58aac8b8445d5c425016e9e74dac7f68 Mon Sep 17 00:00:00 2001 From: Nicole Turner <39884432+nenonix@users.noreply.github.com> Date: Mon, 6 May 2019 22:38:39 +0200 Subject: [PATCH 348/724] Update hello-adequate-domain-controllers.md Typo and grammar fixes https://github.com/MicrosoftDocs/windows-itpro-docs/issues/3203 --- .../hello-adequate-domain-controllers.md | 28 +++++++++---------- 1 file changed, 14 insertions(+), 14 deletions(-) diff --git a/windows/security/identity-protection/hello-for-business/hello-adequate-domain-controllers.md b/windows/security/identity-protection/hello-for-business/hello-adequate-domain-controllers.md index ebb6eed030..680fe15627 100644 --- a/windows/security/identity-protection/hello-for-business/hello-adequate-domain-controllers.md +++ b/windows/security/identity-protection/hello-for-business/hello-adequate-domain-controllers.md @@ -24,21 +24,21 @@ ms.date: 08/20/2018 ## How many is adequate -How can you find out how many domain controllers are needed? You can use performance monitoring on your domain controllers to determine existing authentication traffic. Windows Server 2016 includes the KDC AS Requests performance counter. You can use these counters to determine how much of a domain controllers load is due to initial Kerberos authentication. It's important to remember that authentication for a Windows Hello for Business key trust deployment does not affect Kerberos authentication--it remains unchanged. +How can you find out how many domain controllers are needed? You can use performance monitoring on your domain controllers to determine existing authentication traffic. Windows Server 2016 includes the KDC AS Requests performance counter. You can use these counters to determine how much of a domain controller's load is due to initial Kerberos authentication. It's important to remember that authentication for a Windows Hello for Business key trust deployment does not affect Kerberos authentication--it remains unchanged. Windows 10 accomplishes Windows Hello for Business key trust authentication by mapping an Active Directory user account to one or more public keys. This mapping occurs on the domain controller, which is why the deployment needs Windows Server 2016 domain controllers. Public key mapping is only supported by Windows Server 2016 domain controllers. Therefore, users in a key trust deployment must authenticate to a Windows Server 2016 domain controller. -Determining an adequate number of Windows Server 2016 domain controllers is important to ensure you have enough domain controllers to satisfy all authentication requests, including users mapped with public key trust. What many administrators do not realize is that adding the most current version of a domain controller (in this case Windows Server 2016) to a deployment of existing domain controllers (Windows Server 2008R2 or Windows Server 2012R2) instantly makes that single domain controller susceptible to carrying the most load, or what is commonly referred to as "piling on". To illustrate the "piling on" concept, consider the following scenario. +Determining an adequate number of Windows Server 2016 domain controllers is important to ensure you have enough domain controllers to satisfy all authentication requests, including users mapped with public key trust. What many administrators do not realize is that adding the most current version of a domain controller (in this case Windows Server 2016) to a deployment of existing domain controllers (Windows Server 2008R2 or Windows Server 2012R2) instantly makes that single domain controller susceptible to carrying the most load, or what is commonly referred to as "piling on". To illustrate the "piling on" concept, consider the following scenario: -Consider a controlled environment where there are 1000 client computers and the authentication load of these 1000 client computers is evenly distributed across 10 domain controllers in the environment. The Kerberos AS requests load would look something like the following. +Consider a controlled environment where there are 1000 client computers and the authentication load of these 1000 client computers is evenly distributed across 10 domain controllers in the environment. The Kerberos AS requests load would look something like the following: ![dc-chart1](images/plan/dc-chart1.png) -The environment changes. The first change includes DC1 upgraded to Windows Server 2016 to support Windows Hello for Business key-trust authentication. Next, 100 clients enroll for Windows Hello for Business using the public key trust deployment. Given all other factors stay constant, the authentication would now look like the following. +The environment changes. The first change includes DC1 upgraded to Windows Server 2016 to support Windows Hello for Business key-trust authentication. Next, 100 clients enroll for Windows Hello for Business using the public key trust deployment. Given all other factors stay constant, the authentication would now look like the following: ![dc-chart2](images/plan/dc-chart2.png) -The Windows Server 2016 domain controller is handling 100 percent of all public key trust authentication. However, it is also handling 10 percent of the password authentication. Why? This behavior occurs because domain controllers 2- 10 only support password and certificate trust authentication; only a Windows Server 2016 domain controller supports authentication public key trust authentication. The Windows Server 2016 domain controller understands how to authenticate password and certificate trust authentication and will continue to share the load of authenticating those clients. Because DC1 can handle all forms of authentication, it will be bear more of the authentication load, and easily become overloaded. What if another Windows Server 2016 domain controller is added, but without deploying Windows Hello for Business to anymore clients. +The Windows Server 2016 domain controller is handling 100 percent of all public key trust authentication. However, it is also handling 10 percent of the password authentication. Why? This behavior occurs because domain controllers 2- 10 only support password and certificate trust authentication; only a Windows Server 2016 domain controller supports authentication public key trust authentication. The Windows Server 2016 domain controller understands how to authenticate password and certificate trust authentication and will continue to share the load of authenticating those clients. Because DC1 can handle all forms of authentication, it will be bear more of the authentication load, and easily become overloaded. What if another Windows Server 2016 domain controller is added, but without deploying Windows Hello for Business to anymore clients? ![dc-chart3](images/plan/dc-chart3.png) @@ -63,7 +63,7 @@ The preceding was an example to show why it's unrealistic to have a "one-size-fi ## Determining total AS Request load -Each organization needs to have an baseline of the AS request load that occurs in their environment. Windows Server provides the KDC AS Requests performance counter that helps you determine this. +Each organization needs to have a baseline of the AS request load that occurs in their environment. Windows Server provides the KDC AS Requests performance counter that helps you determine this. Pick a site where you plan to upgrade the clients to Windows Hello for Business public key trust. Pick a time when authentication traffic is most significant--Monday morning is great time as everyone is returning to the office. Enable the performance counter on *all* the domain controllers in that site. Collect KDC AS Requests performance counters for two hours: * A half-hour before you expect initial authentication (sign-ins and unlocks) to be significant @@ -75,29 +75,29 @@ For example, if employees are scheduled to come into the office at 9:00am. Your > [!NOTE] > To capture all the authentication traffic. Ensure that all computers are powered down to get the most accurate authentication information (computers and services authenticate at first power up--you need to consider this authentication in your evaluation). -Aggregate the performance data of all domain controllers. Look for the maximum KDC AS Requests for each domain controller. Find the median time when the maximum number of requests occurred for the site, this should represent when the site is experience the highest amount of authentication. +Aggregate the performance data of all domain controllers. Look for the maximum KDC AS Requests for each domain controller. Find the median time when the maximum number of requests occurred for the site, this should represent when the site is experiencing the highest amount of authentication. -Add the number of authentications for each domain controller for the median time. You now have the total authentication for the site during a peak time. Using this metric, you can determine the distribution of authentication across the domain controllers in the site by dividing the domain controller's authentication number for the median time by the total authentication. Multiple the quotient by 10 to convert the distribution to a percentage. To validate your math, all the distributions should equal 100 percent. +Add the number of authentications for each domain controller for the median time. You now have the total authentication for the site during a peak time. Using this metric, you can determine the distribution of authentication across the domain controllers in the site by dividing the domain controller's authentication number for the median time by the total authentication. Multiply the quotient by 10 to convert the distribution to a percentage. To validate your math, all the distributions should equal 100 percent. -Review the distribution of authentication. Hopefully, none of these are above 70 percent. It's always good to reserve some capacity for the unexpected. Also, the primary purposes of a domain controller is to provide authentication and handle Active Directory operations. Identify domain controllers with lower distributions of authentication as potential candidates for the initial domain controller upgrades in conjunction with a reasonable distribution of clients provisioned for Windows Hello for Business. +Review the distribution of authentication. Hopefully, none of these are above 70 percent. It's always good to reserve some capacity for the unexpected. Also, the primary purposes of a domain controller are to provide authentication and handle Active Directory operations. Identify domain controllers with lower distributions of authentication as potential candidates for the initial domain controller upgrades in conjunction with a reasonable distribution of clients provisioned for Windows Hello for Business. ## Monitoring Authentication -Using the same methods previously described above, monitor the Kerberos authentication after upgrading a domain controller and your first phase of Windows Hello for Business deployments. Make note of the delta of authentication before and after upgrading the domain controller to Windows Server 2016. This delta is representative of authentication resulting from the first phase of your Windows Hello for Business clients. This gives you a baseline for your environment to where you can form a statement such as +Using the same methods previously described above, monitor the Kerberos authentication after upgrading a domain controller and your first phase of Windows Hello for Business deployments. Make note of the delta of authentication before and after upgrading the domain controller to Windows Server 2016. This delta is representative of authentication resulting from the first phase of your Windows Hello for Business clients. This gives you a baseline for your environment from which you can form a statement such as ```"Every n Windows Hello for Business clients results in x percentage of key-trust authentication."``` -Where _n_ equals the number of clients you switched to Windows Hello for Business and _x_ equals the increased percentage of authentication from the upgraded domain controller. Armed with information, you can apply the observations of upgrading domain controllers and increasing Windows Hello for Business client count to appropriately phase your deployment. +Where _n_ equals the number of clients you switched to Windows Hello for Business and _x_ equals the increased percentage of authentication from the upgraded domain controller. Armed with this information, you can apply the observations of upgrading domain controllers and increasing Windows Hello for Business client count to appropriately phase your deployment. Remember, increasing the number of clients changes the volume of authentication distributed across the Windows Server 2016 domain controllers. If there is only one Windows Server 2016 domain controller, there's no distribution and you are simply increasing the volume of authentication for which THAT domain controller is responsible. -Increasing the number of number of domain controllers distributes the volume of authentication, but doesn't change it. Therefore, as you add more domain controllers, the burden of authentication for which each domain controller is responsible decrease. Upgrading two domain controller changes the distribution to 50 percent. Upgrading three domain controllers changes the distribution to 33 percent, and so on. +Increasing the number of domain controllers distributes the volume of authentication, but doesn't change it. Therefore, as you add more domain controllers, the burden of authentication, for which each domain controller is responsible, decreases. Upgrading two domain controller changes the distribution to 50 percent. Upgrading three domain controllers changes the distribution to 33 percent, and so on. ## Strategy The simplest strategy you can employ is to upgrade one domain controller and monitor the single domain controller as you continue to phase in new Windows Hello for Business key-trust clients until it reaches a 70 or 80 percent threshold. -Then, upgrade a second domain controller. Monitor the authentication on both domain controllers to determine how the authentication distributes between the two domain controllers. Introduce more Windows Hello for Business clients while monitoring the authentication on the two upgraded domain controllers. Once those reach your environments designated capacity, then upgrade another domain controller. +Then, upgrade a second domain controller. Monitor the authentication on both domain controllers to determine how the authentication distributes between the two domain controllers. Introduce more Windows Hello for Business clients while monitoring the authentication on the two upgraded domain controllers. Once those reach your environment's designated capacity, you can upgrade another domain controller. Repeat until your deployment for that site is complete. Now, monitor authentication across all your domain controllers like you did the very first time. Determine the distribution of authentication for each domain controller. Identify the percentage of distribution for which it is responsible. If a single domain controller is responsible for 70 percent of more of the authentication, you may want to consider adding a domain controller to reduce the distribution of authentication volume. -However, before considering this, ensure the high load of authentication is not a result of applications and services where their configuration has a statically configured domain controller. Adding domain controllers will not resolve the additional authentication load problem in this scenario. Instead, manually distribute the authentication to different domain controllers among all the services or applications. Alternatively, try simply using the domain name rather than a specific domain controller. Each domain controller has an A record registered in DNS for the domain name, which DNS will round robin with each DNS query. It's not the best load balancer, however, it is a better alternative to static domain controller configurations, provided the configuration is compatible with your service or application. +However, before considering this, ensure the high load of authentication is not a result of applications and services where their configuration has a statically-configured domain controller. Adding domain controllers will not resolve the additional authentication load problem in this scenario. Instead, manually distribute the authentication to different domain controllers among all the services or applications. Alternatively, try simply using the domain name rather than a specific domain controller. Each domain controller has an A record registered in DNS for the domain name, which DNS will round robin with each DNS query. It's not the best load balancer, however, it is a better alternative to static domain controller configurations, provided the configuration is compatible with your service or application. From 7556ea14b48f3b3bc481507b95395b3a9c3560ad Mon Sep 17 00:00:00 2001 From: Nicole Turner <39884432+nenonix@users.noreply.github.com> Date: Mon, 6 May 2019 22:42:41 +0200 Subject: [PATCH 349/724] Update hello-hybrid-key-trust.md Typo https://github.com/MicrosoftDocs/windows-itpro-docs/issues/3203 --- .../hello-for-business/hello-hybrid-key-trust.md | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/windows/security/identity-protection/hello-for-business/hello-hybrid-key-trust.md b/windows/security/identity-protection/hello-for-business/hello-hybrid-key-trust.md index 303b6ce403..d74bd02a0e 100644 --- a/windows/security/identity-protection/hello-for-business/hello-hybrid-key-trust.md +++ b/windows/security/identity-protection/hello-for-business/hello-hybrid-key-trust.md @@ -34,7 +34,7 @@ The new deployment baseline helps organizations who are moving to Azure and Offi This baseline provides detailed procedures to move your environment from an on-premises only environment to a hybrid environment using Windows Hello for Business to authenticate to Azure Active Directory and to your on-premises Active Directory using a single Windows sign-in. -You’re next step is to familiarize yourself with the prerequisites needed for the deployment. Many of the prerequisites will be new for organizations and individuals pursuing the new deployment baseline. Organizations and individuals starting from the federated baseline will likely be familiar with most of the prerequisites, but should validate they are using the proper versions that include the latest updates. +Your next step is to familiarize yourself with the prerequisites needed for the deployment. Many of the prerequisites will be new for organizations and individuals pursuing the new deployment baseline. Organizations and individuals starting from the federated baseline will likely be familiar with most of the prerequisites, but should validate they are using the proper versions that include the latest updates. > [!div class="nextstepaction"] > [Prerequistes](hello-hybrid-key-trust-prereqs.md) From 52f92056d8658810a2cfa33861389b441956b207 Mon Sep 17 00:00:00 2001 From: Nicole Turner <39884432+nenonix@users.noreply.github.com> Date: Mon, 6 May 2019 22:48:13 +0200 Subject: [PATCH 350/724] Update hello-hybrid-key-new-install.md Typos https://github.com/MicrosoftDocs/windows-itpro-docs/issues/3203 --- .../hello-for-business/hello-hybrid-key-new-install.md | 4 ++-- 1 file changed, 2 insertions(+), 2 deletions(-) diff --git a/windows/security/identity-protection/hello-for-business/hello-hybrid-key-new-install.md b/windows/security/identity-protection/hello-for-business/hello-hybrid-key-new-install.md index d9874f88c3..831a9879cb 100644 --- a/windows/security/identity-protection/hello-for-business/hello-hybrid-key-new-install.md +++ b/windows/security/identity-protection/hello-for-business/hello-hybrid-key-new-install.md @@ -80,7 +80,7 @@ If you do not have an existing public key infrastructure, please review [Certifi > [!IMPORTANT] > For Azure AD joined device to authenticate to and use on-premises resources, ensure you: > * Install the root certificate authority certificate for your organization in the user's trusted root certificate store. -> * Publish your certificate revocation list to a location that is available to Azure AD joined devices, such as a web-based url. +> * Publish your certificate revocation list to a location that is available to Azure AD joined devices, such as a web-based URL. ### Section Review ### @@ -135,7 +135,7 @@ Alternatively, you can configure Windows Server 2016 Active Directory Federation > * Review the overview and uses of Azure Multifactor Authentication. > * Review your Azure Active Directory subscription for Azure Multifactor Authentication. > * Create an Azure Multifactor Authentication Provider, if necessary. -> * Configure Azure Multifactor Authentiation features and settings. +> * Configure Azure Multifactor Authentication features and settings. > * Understand the different User States and their effect on Azure Multifactor Authentication. > * Consider using Azure Multifactor Authentication or a third-party multifactor authentication provider with Windows Server Active Directory Federation Services, if necessary. From e486b2536bf6035772818f7579d5618c8b662771 Mon Sep 17 00:00:00 2001 From: Nicole Turner <39884432+nenonix@users.noreply.github.com> Date: Mon, 6 May 2019 22:53:20 +0200 Subject: [PATCH 351/724] Update hello-hybrid-key-trust-devreg.md Typos https://github.com/MicrosoftDocs/windows-itpro-docs/issues/3203 --- .../hello-for-business/hello-hybrid-key-trust-devreg.md | 4 ++-- 1 file changed, 2 insertions(+), 2 deletions(-) diff --git a/windows/security/identity-protection/hello-for-business/hello-hybrid-key-trust-devreg.md b/windows/security/identity-protection/hello-for-business/hello-hybrid-key-trust-devreg.md index 9a49d7ab15..f7ec72d697 100644 --- a/windows/security/identity-protection/hello-for-business/hello-hybrid-key-trust-devreg.md +++ b/windows/security/identity-protection/hello-for-business/hello-hybrid-key-trust-devreg.md @@ -38,7 +38,7 @@ Begin configuring device registration to support Hybrid Windows Hello for Busine To do this, follow the **Configure device settings** steps under [Setting up Azure AD Join in your organization](https://azure.microsoft.com/documentation/articles/active-directory-azureadjoin-setup/) -Next, follow the guidance on the [How to configure hybrid Azure Active Directory joined devices](https://docs.microsoft.com/azure/active-directory/device-management-hybrid-azuread-joined-devices-setup) page. In the **Configuration steps** section, identify you configuration at the top of the table (either **Windows current and password hash sync** or **Windows current and federation**) and perform only the steps identified with a check mark. +Next, follow the guidance on the [How to configure hybrid Azure Active Directory joined devices](https://docs.microsoft.com/azure/active-directory/device-management-hybrid-azuread-joined-devices-setup) page. In the **Configuration steps** section, identify your configuration at the top of the table (either **Windows current and password hash sync** or **Windows current and federation**) and perform only the steps identified with a check mark.

@@ -47,7 +47,7 @@ Next, follow the guidance on the [How to configure hybrid Azure Active Directory ## Follow the Windows Hello for Business hybrid key trust deployment guide 1. [Overview](hello-hybrid-cert-trust.md) -2. [Prerequistes](hello-hybrid-cert-trust-prereqs.md) +2. [Prerequisites](hello-hybrid-cert-trust-prereqs.md) 3. [New Installation Baseline](hello-hybrid-cert-new-install.md) 4. [Configure Directory Synchronization](hello-hybrid-key-trust-dirsync.md) 5. Configure Azure Device Registration (*You are here*) From 83a316f4dfa239f785f48abf9ea612ebb056841a Mon Sep 17 00:00:00 2001 From: yoosi Date: Mon, 6 May 2019 14:06:22 -0700 Subject: [PATCH 352/724] correct typo in bitlocker-basic-deployment.md --- .../bitlocker/bitlocker-basic-deployment.md | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/windows/security/information-protection/bitlocker/bitlocker-basic-deployment.md b/windows/security/information-protection/bitlocker/bitlocker-basic-deployment.md index c9ba5464a6..9ea0ddd3dc 100644 --- a/windows/security/information-protection/bitlocker/bitlocker-basic-deployment.md +++ b/windows/security/information-protection/bitlocker/bitlocker-basic-deployment.md @@ -529,7 +529,7 @@ Disable-BitLocker -MountPoint E:,F:,G: ``` ## See also -- [Prepare your organization for BitLocker: Planning and p\\olicies](prepare-your-organization-for-bitlocker-planning-and-policies.md) +- [Prepare your organization for BitLocker: Planning and policies](prepare-your-organization-for-bitlocker-planning-and-policies.md) - [BitLocker recovery guide](bitlocker-recovery-guide-plan.md) - [BitLocker: How to enable Network Unlock](bitlocker-how-to-enable-network-unlock.md) - [BitLocker overview](bitlocker-overview.md) From 68c1c54c477b45cfb1f12eeb9831de1c349c2650 Mon Sep 17 00:00:00 2001 From: Nicole Turner <39884432+nenonix@users.noreply.github.com> Date: Mon, 6 May 2019 23:13:19 +0200 Subject: [PATCH 353/724] Update hello-planning-guide.md Typos https://github.com/MicrosoftDocs/windows-itpro-docs/issues/3203 --- .../hello-for-business/hello-planning-guide.md | 8 ++++---- 1 file changed, 4 insertions(+), 4 deletions(-) diff --git a/windows/security/identity-protection/hello-for-business/hello-planning-guide.md b/windows/security/identity-protection/hello-for-business/hello-planning-guide.md index 1700566e52..462ce37ed5 100644 --- a/windows/security/identity-protection/hello-for-business/hello-planning-guide.md +++ b/windows/security/identity-protection/hello-for-business/hello-planning-guide.md @@ -136,7 +136,7 @@ The Windows Hello for Business deployment depends on an enterprise public key in ### Cloud -Some deployment combinations require an Azure account and some require Azure Active Directory for user identities. These cloud requirements may only need an Azure account while other features need an Azure Active Directory Premium subscription. The planning process identifies and differentiates the components that are needed from the those that are optional. +Some deployment combinations require an Azure account, and some require Azure Active Directory for user identities. These cloud requirements may only need an Azure account while other features need an Azure Active Directory Premium subscription. The planning process identifies and differentiates the components that are needed from the those that are optional. ## Planning a Deployment @@ -150,13 +150,13 @@ Choose the deployment model based on the resources your users access. Use the f If your organization does not have on-premises resources, write **Cloud Only** in box **1a** on your planning worksheet. -If your organization is federated with Azure or uses any online service, such as Office365 or OneDrive, or your users access cloud and on-premises resources, write **Hybrid** in box **1a** on your planning worksheet. +If your organization is federated with Azure or uses any online service, such as Office365 or OneDrive, or your users' access cloud and on-premises resources, write **Hybrid** in box **1a** on your planning worksheet. If your organization does not have cloud resources, write **On-Premises** in box **1a** on your planning worksheet. >[!NOTE] >If you’re unsure if your organization is federated, run the following Active Directory Windows PowerShell command from an elevated Windows PowerShell prompt and evaluate the results. >```Get-AdObject “CN=62a0ff2e-97b9-4513-943f-0d221bd30080,CN=Device Registration Configuration,CN=Services,CN=Configuration,DC=corp,DC=[forest_root_CN_name],DC=com" -Properties keywords``` ->* If the command returns an error stating it could not find the object, then you have yet to configured AAD Connect or on-premises Device Registration Services using AD FS. Ensure the name is accurate and validate the object does not exist with another Active Directory Management tool such as **ADSIEdit.msc**. If the object truly does not exist, then you environment does not bind you to a specific deployment or require changes to accommodate the desired deployment type. +>* If the command returns an error stating it could not find the object, then you have yet to configured AAD Connect or on-premises Device Registration Services using AD FS. Ensure the name is accurate and validate the object does not exist with another Active Directory Management tool such as **ADSIEdit.msc**. If the object truly does not exist, then your environment does not bind you to a specific deployment or require changes to accommodate the desired deployment type. >* If the command returns a value, compare that value with the values below. The value indicates the deployment model you should implement > * If the value begins with **azureADName:** – write **Hybrid** in box **1a**on your planning worksheet. > * If the value begins with **enterpriseDrsName:** – write **On-Premises** in box **1a** on your planning worksheet. @@ -197,7 +197,7 @@ If box **1a** on your planning worksheet reads **cloud only**, write **N/A** in If box **1a** on your planning worksheet reads **hybrid**, then write **Azure AD Connect** in box **1e** on your planning worksheet. -If box **1a** on your planning worksheet reads **on-premises**, then write **Azure MFA Server**. This deployment exclusively uses Active Directory for user information with the exception of the multi-factor authentication. The on-premises Azure MFA server synchronizes a subset of the user information, such as phone number, to provide multi-factor authentication while the user’s credential remain on the on-premises network. +If box **1a** on your planning worksheet reads **on-premises**, then write **Azure MFA Server**. This deployment exclusively uses Active Directory for user information with the exception of the multi-factor authentication. The on-premises Azure MFA server synchronizes a subset of the user information, such as phone number, to provide multi-factor authentication while the user’s credentials remain on the on-premises network. ### Multifactor Authentication From f3d02254eb14dddf1734357306dd5d6a73d869e5 Mon Sep 17 00:00:00 2001 From: Nicole Turner <39884432+nenonix@users.noreply.github.com> Date: Mon, 6 May 2019 23:23:32 +0200 Subject: [PATCH 354/724] Update hello-hybrid-key-trust.md Typo "prerequisites" --- .../hello-for-business/hello-hybrid-key-trust.md | 4 ++-- 1 file changed, 2 insertions(+), 2 deletions(-) diff --git a/windows/security/identity-protection/hello-for-business/hello-hybrid-key-trust.md b/windows/security/identity-protection/hello-for-business/hello-hybrid-key-trust.md index 303b6ce403..1c42c615c5 100644 --- a/windows/security/identity-protection/hello-for-business/hello-hybrid-key-trust.md +++ b/windows/security/identity-protection/hello-for-business/hello-hybrid-key-trust.md @@ -37,7 +37,7 @@ This baseline provides detailed procedures to move your environment from an on-p You’re next step is to familiarize yourself with the prerequisites needed for the deployment. Many of the prerequisites will be new for organizations and individuals pursuing the new deployment baseline. Organizations and individuals starting from the federated baseline will likely be familiar with most of the prerequisites, but should validate they are using the proper versions that include the latest updates. > [!div class="nextstepaction"] -> [Prerequistes](hello-hybrid-key-trust-prereqs.md) +> [Prerequisites](hello-hybrid-key-trust-prereqs.md)

@@ -45,7 +45,7 @@ You’re next step is to familiarize yourself with the prerequisites needed for ## Follow the Windows Hello for Business hybrid key trust deployment guide 1. Overview (*You are here*) -2. [Prerequistes](hello-hybrid-key-trust-prereqs.md) +2. [Prerequisites](hello-hybrid-key-trust-prereqs.md) 3. [New Installation Baseline](hello-hybrid-key-new-install.md) 4. [Configure Directory Synchronization](hello-hybrid-key-trust-dirsync.md) 5. [Configure Azure Device Registration](hello-hybrid-key-trust-devreg.md) From 7f775266225cff3f7e777db760e6783616e18215 Mon Sep 17 00:00:00 2001 From: Joey Caparas Date: Mon, 6 May 2019 14:51:07 -0700 Subject: [PATCH 355/724] deprecating content --- windows/security/threat-protection/TOC.md | 20 +++++++++---------- .../windows-defender-atp/TOC.md | 2 +- ...ows-defender-advanced-threat-protection.md | 4 +--- ...ows-defender-advanced-threat-protection.md | 6 +++--- ...ows-defender-advanced-threat-protection.md | 2 +- .../windows-defender-atp/manage-indicators.md | 1 - ...ows-defender-advanced-threat-protection.md | 2 +- ...ows-defender-advanced-threat-protection.md | 4 +--- ...ows-defender-advanced-threat-protection.md | 2 +- ...ows-defender-advanced-threat-protection.md | 5 +++-- 10 files changed, 22 insertions(+), 26 deletions(-) diff --git a/windows/security/threat-protection/TOC.md b/windows/security/threat-protection/TOC.md index e65fbfe36a..7c749be104 100644 --- a/windows/security/threat-protection/TOC.md +++ b/windows/security/threat-protection/TOC.md @@ -277,7 +277,7 @@ ######## [Stop and quarantine file](windows-defender-atp/stop-and-quarantine-file-windows-defender-advanced-threat-protection-new.md) ######## [Initiate investigation (preview)](windows-defender-atp/initiate-autoir-investigation-windows-defender-advanced-threat-protection-new.md) -####### [Indicators (preview)](windows-defender-atp/ti-indicator-windows-defender-advanced-threat-protection-new.md) +####### [Indicators](windows-defender-atp/ti-indicator-windows-defender-advanced-threat-protection-new.md) ######## [Submit Indicator](windows-defender-atp/post-ti-indicator-windows-defender-advanced-threat-protection-new.md) ######## [List Indicators](windows-defender-atp/get-ti-indicators-collection-windows-defender-advanced-threat-protection-new.md) ######## [Delete Indicator](windows-defender-atp/delete-ti-indicator-by-id-windows-defender-advanced-threat-protection-new.md) @@ -322,14 +322,14 @@ ###### [Get CVE-KB map](windows-defender-atp/get-cvekbmap-collection-windows-defender-advanced-threat-protection.md) -##### API for custom alerts -###### [Enable the custom threat intelligence application](windows-defender-atp/enable-custom-ti-windows-defender-advanced-threat-protection.md) -###### [Use the threat intelligence API to create custom alerts](windows-defender-atp/use-custom-ti-windows-defender-advanced-threat-protection.md) -###### [Create custom threat intelligence alerts](windows-defender-atp/custom-ti-api-windows-defender-advanced-threat-protection.md) -###### [PowerShell code examples](windows-defender-atp/powershell-example-code-windows-defender-advanced-threat-protection.md) -###### [Python code examples](windows-defender-atp/python-example-code-windows-defender-advanced-threat-protection.md) -###### [Experiment with custom threat intelligence alerts](windows-defender-atp/experiment-custom-ti-windows-defender-advanced-threat-protection.md) -###### [Troubleshoot custom threat intelligence issues](windows-defender-atp/troubleshoot-custom-ti-windows-defender-advanced-threat-protection.md) +##### API for custom alerts (Deprecated) +###### [Enable the custom threat intelligence application (Deprecated)](windows-defender-atp/enable-custom-ti-windows-defender-advanced-threat-protection.md) +###### [Use the threat intelligence API to create custom alerts (Deprecated)](windows-defender-atp/use-custom-ti-windows-defender-advanced-threat-protection.md) +###### [Create custom threat intelligence alerts (Deprecated)](windows-defender-atp/custom-ti-api-windows-defender-advanced-threat-protection.md) +###### [PowerShell code examples (Deprecated)](windows-defender-atp/powershell-example-code-windows-defender-advanced-threat-protection.md) +###### [Python code examples (Deprecated)](windows-defender-atp/python-example-code-windows-defender-advanced-threat-protection.md) +###### [Experiment with custom threat intelligence alerts (Deprecated)](windows-defender-atp/experiment-custom-ti-windows-defender-advanced-threat-protection.md) +###### [Troubleshoot custom threat intelligence issues (Deprecated)](windows-defender-atp/troubleshoot-custom-ti-windows-defender-advanced-threat-protection.md) ##### [Pull alerts to your SIEM tools](windows-defender-atp/configure-siem-windows-defender-advanced-threat-protection.md) @@ -388,7 +388,7 @@ ######## [Create and manage machine tags](windows-defender-atp/machine-tags-windows-defender-advanced-threat-protection.md) ##### APIs -###### [Enable Threat intel](windows-defender-atp/enable-custom-ti-windows-defender-advanced-threat-protection.md) +###### [Enable Threat intel (Deprecated)](windows-defender-atp/enable-custom-ti-windows-defender-advanced-threat-protection.md) ###### [Enable SIEM integration](windows-defender-atp/enable-siem-integration-windows-defender-advanced-threat-protection.md) #####Rules diff --git a/windows/security/threat-protection/windows-defender-atp/TOC.md b/windows/security/threat-protection/windows-defender-atp/TOC.md index d3ade96a48..e4b73d3c01 100644 --- a/windows/security/threat-protection/windows-defender-atp/TOC.md +++ b/windows/security/threat-protection/windows-defender-atp/TOC.md @@ -277,7 +277,7 @@ ####### [Stop and quarantine file](stop-and-quarantine-file-windows-defender-advanced-threat-protection-new.md) ####### [Initiate investigation (preview)](initiate-autoir-investigation-windows-defender-advanced-threat-protection-new.md) -###### [Indicators (preview)](ti-indicator-windows-defender-advanced-threat-protection-new.md) +###### [Indicators](ti-indicator-windows-defender-advanced-threat-protection-new.md) ####### [Submit Indicator](post-ti-indicator-windows-defender-advanced-threat-protection-new.md) ####### [List Indicators](get-ti-indicators-collection-windows-defender-advanced-threat-protection-new.md) ####### [Delete Indicator](delete-ti-indicator-by-id-windows-defender-advanced-threat-protection-new.md) diff --git a/windows/security/threat-protection/windows-defender-atp/custom-ti-api-windows-defender-advanced-threat-protection.md b/windows/security/threat-protection/windows-defender-atp/custom-ti-api-windows-defender-advanced-threat-protection.md index bc9982d2ae..ed9d8771ab 100644 --- a/windows/security/threat-protection/windows-defender-atp/custom-ti-api-windows-defender-advanced-threat-protection.md +++ b/windows/security/threat-protection/windows-defender-atp/custom-ti-api-windows-defender-advanced-threat-protection.md @@ -15,10 +15,9 @@ manager: dansimp audience: ITPro ms.collection: M365-security-compliance ms.topic: article -ms.date: 04/24/2018 --- -# Create custom alerts using the threat intelligence (TI) application program interface (API) +# Create custom alerts using the threat intelligence (TI) application program interface (API) (Deprecated) **Applies to:** @@ -26,7 +25,6 @@ ms.date: 04/24/2018 - [Windows Defender Advanced Threat Protection (Windows Defender ATP)](https://go.microsoft.com/fwlink/p/?linkid=2069559) - >Want to experience Windows Defender ATP? [Sign up for a free trial.](https://www.microsoft.com/en-us/WindowsForBusiness/windows-atp?ocid=docs-wdatp-customti-abovefoldlink) You can define custom alert definitions and indicators of compromise (IOC) using the threat intelligence API. Creating custom threat intelligence alerts allows you to generate specific alerts that are applicable to your organization. diff --git a/windows/security/threat-protection/windows-defender-atp/enable-custom-ti-windows-defender-advanced-threat-protection.md b/windows/security/threat-protection/windows-defender-atp/enable-custom-ti-windows-defender-advanced-threat-protection.md index 49545c0428..f4d43bad11 100644 --- a/windows/security/threat-protection/windows-defender-atp/enable-custom-ti-windows-defender-advanced-threat-protection.md +++ b/windows/security/threat-protection/windows-defender-atp/enable-custom-ti-windows-defender-advanced-threat-protection.md @@ -15,17 +15,17 @@ manager: dansimp audience: ITPro ms.collection: M365-security-compliance ms.topic: article -ms.date: 04/24/2018 --- -# Enable the custom threat intelligence API in Windows Defender ATP +# Enable the custom threat intelligence API in Windows Defender ATP (Deprecated) **Applies to:** - [Windows Defender Advanced Threat Protection (Windows Defender ATP)](https://go.microsoft.com/fwlink/p/?linkid=2069559) - +>[!TIP] +>This topic has been deprecated. See [Indicators](ti-indicator-windows-defender-advanced-threat-protection-new.md) for the updated content. >Want to experience Windows Defender ATP? [Sign up for a free trial.](https://www.microsoft.com/en-us/WindowsForBusiness/windows-atp?ocid=docs-wdatp-enablecustomti-abovefoldlink) diff --git a/windows/security/threat-protection/windows-defender-atp/experiment-custom-ti-windows-defender-advanced-threat-protection.md b/windows/security/threat-protection/windows-defender-atp/experiment-custom-ti-windows-defender-advanced-threat-protection.md index 3e8ba14f02..81f2798656 100644 --- a/windows/security/threat-protection/windows-defender-atp/experiment-custom-ti-windows-defender-advanced-threat-protection.md +++ b/windows/security/threat-protection/windows-defender-atp/experiment-custom-ti-windows-defender-advanced-threat-protection.md @@ -18,7 +18,7 @@ ms.topic: article ms.date: 11/09/2017 --- -# Experiment with custom threat intelligence (TI) alerts +# Experiment with custom threat intelligence (TI) alerts (Deprecated) **Applies to:** diff --git a/windows/security/threat-protection/windows-defender-atp/manage-indicators.md b/windows/security/threat-protection/windows-defender-atp/manage-indicators.md index db76c00fda..46f6939d8e 100644 --- a/windows/security/threat-protection/windows-defender-atp/manage-indicators.md +++ b/windows/security/threat-protection/windows-defender-atp/manage-indicators.md @@ -22,7 +22,6 @@ ms.topic: article **Applies to:** - [Windows Defender Advanced Threat Protection (Windows Defender ATP)](https://go.microsoft.com/fwlink/p/?linkid=2069559) -[!include[Prerelease information](prerelease.md)] >Want to experience Windows Defender ATP? [Sign up for a free trial.](https://www.microsoft.com/en-us/WindowsForBusiness/windows-atp?ocid=docs-wdatp-automationexclusionlist-abovefoldlink) diff --git a/windows/security/threat-protection/windows-defender-atp/powershell-example-code-windows-defender-advanced-threat-protection.md b/windows/security/threat-protection/windows-defender-atp/powershell-example-code-windows-defender-advanced-threat-protection.md index 66420af797..e3ad482c9c 100644 --- a/windows/security/threat-protection/windows-defender-atp/powershell-example-code-windows-defender-advanced-threat-protection.md +++ b/windows/security/threat-protection/windows-defender-atp/powershell-example-code-windows-defender-advanced-threat-protection.md @@ -17,7 +17,7 @@ ms.collection: M365-security-compliance ms.topic: article --- -# PowerShell code examples for the custom threat intelligence API +# PowerShell code examples for the custom threat intelligence API (Deprecated) **Applies to:** - [Windows Defender Advanced Threat Protection (Windows Defender ATP)](https://go.microsoft.com/fwlink/p/?linkid=2069559) diff --git a/windows/security/threat-protection/windows-defender-atp/python-example-code-windows-defender-advanced-threat-protection.md b/windows/security/threat-protection/windows-defender-atp/python-example-code-windows-defender-advanced-threat-protection.md index c64fd1617c..721ea4c889 100644 --- a/windows/security/threat-protection/windows-defender-atp/python-example-code-windows-defender-advanced-threat-protection.md +++ b/windows/security/threat-protection/windows-defender-atp/python-example-code-windows-defender-advanced-threat-protection.md @@ -17,11 +17,9 @@ ms.collection: M365-security-compliance ms.topic: article --- -# Python code examples for the custom threat intelligence API +# Python code examples for the custom threat intelligence API (Deprecated) **Applies to:** - - - [Windows Defender Advanced Threat Protection (Windows Defender ATP)](https://go.microsoft.com/fwlink/p/?linkid=2069559) diff --git a/windows/security/threat-protection/windows-defender-atp/troubleshoot-custom-ti-windows-defender-advanced-threat-protection.md b/windows/security/threat-protection/windows-defender-atp/troubleshoot-custom-ti-windows-defender-advanced-threat-protection.md index 96753d16e3..a1b40f334b 100644 --- a/windows/security/threat-protection/windows-defender-atp/troubleshoot-custom-ti-windows-defender-advanced-threat-protection.md +++ b/windows/security/threat-protection/windows-defender-atp/troubleshoot-custom-ti-windows-defender-advanced-threat-protection.md @@ -17,7 +17,7 @@ ms.collection: M365-security-compliance ms.topic: troubleshooting --- -# Troubleshoot custom threat intelligence issues +# Troubleshoot custom threat intelligence issues (Deprecated) **Applies to:** - [Windows Defender Advanced Threat Protection (Windows Defender ATP)](https://go.microsoft.com/fwlink/p/?linkid=2069559) diff --git a/windows/security/threat-protection/windows-defender-atp/use-custom-ti-windows-defender-advanced-threat-protection.md b/windows/security/threat-protection/windows-defender-atp/use-custom-ti-windows-defender-advanced-threat-protection.md index be38700ccf..410ee5f85b 100644 --- a/windows/security/threat-protection/windows-defender-atp/use-custom-ti-windows-defender-advanced-threat-protection.md +++ b/windows/security/threat-protection/windows-defender-atp/use-custom-ti-windows-defender-advanced-threat-protection.md @@ -17,12 +17,13 @@ ms.collection: M365-security-compliance ms.topic: article --- -# Use the threat intelligence API to create custom alerts +# Use the threat intelligence API to create custom alerts (Deprecated) **Applies to:** - [Windows Defender Advanced Threat Protection (Windows Defender ATP)](https://go.microsoft.com/fwlink/p/?linkid=2069559) - +>[!TIP] +>This topic has been deprecated. See [Indicators](ti-indicator-windows-defender-advanced-threat-protection-new.md) for the updated content. >Want to experience Windows Defender ATP? [Sign up for a free trial.](https://www.microsoft.com/en-us/WindowsForBusiness/windows-atp?ocid=docs-wdatp-customti-abovefoldlink) From f43de69e2ea3f001df14ee9a47109674c1b82a02 Mon Sep 17 00:00:00 2001 From: Joey Caparas Date: Mon, 6 May 2019 14:57:43 -0700 Subject: [PATCH 356/724] update what's new page --- .../windows-defender-atp/whats-new-in-windows-defender-atp.md | 2 ++ 1 file changed, 2 insertions(+) diff --git a/windows/security/threat-protection/windows-defender-atp/whats-new-in-windows-defender-atp.md b/windows/security/threat-protection/windows-defender-atp/whats-new-in-windows-defender-atp.md index 8ce696c455..5bbf01357c 100644 --- a/windows/security/threat-protection/windows-defender-atp/whats-new-in-windows-defender-atp.md +++ b/windows/security/threat-protection/windows-defender-atp/whats-new-in-windows-defender-atp.md @@ -31,6 +31,8 @@ The following capability is generally available (GA). - [Microsoft Threat Experts](https://docs.microsoft.com/windows/security/threat-protection/windows-defender-atp/microsoft-threat-experts)
Microsoft Threat Experts is the new managed threat hunting service in Windows Defender ATP that provides proactive hunting, prioritization, and additional context and insights that further empower security operations centers (SOCs) to identify and respond to threats quickly and accurately. It provides additional layer of expertise and optics that Microsoft customers can utilize to augment security operation capabilities as part of Microsoft 365. +- [Indicators](https://docs.microsoft.com/windows/security/threat-protection/windows-defender-atp/ti-indicator-windows-defender-advanced-threat-protection-new)
APIs for indicators are now generally available. + ## April 2019 The following capability is generally available (GA). From 3c65e9363bfae0eba476a72fd8f0b48d98b36fd3 Mon Sep 17 00:00:00 2001 From: Nicole Turner <39884432+nenonix@users.noreply.github.com> Date: Tue, 7 May 2019 00:17:21 +0200 Subject: [PATCH 357/724] Update upgrade-readiness-data-sharing.md Typo and format fixes https://github.com/MicrosoftDocs/windows-itpro-docs/issues/3523 --- .../deployment/upgrade/upgrade-readiness-data-sharing.md | 6 +++--- 1 file changed, 3 insertions(+), 3 deletions(-) diff --git a/windows/deployment/upgrade/upgrade-readiness-data-sharing.md b/windows/deployment/upgrade/upgrade-readiness-data-sharing.md index 3eff878d63..b7b51ae981 100644 --- a/windows/deployment/upgrade/upgrade-readiness-data-sharing.md +++ b/windows/deployment/upgrade/upgrade-readiness-data-sharing.md @@ -29,10 +29,10 @@ In order to use the direct connection scenario, set the parameter **ClientProxy= This is the first and most simple proxy scenario. The WinHTTP stack was designed for use in services and does not support proxy autodetection, PAC scripts or authentication. In order to set the WinHTTP proxy system-wide on your computers, you need to -•Use the command netsh winhttp set proxy \:\ -•Set ClientProxy=System in runconfig.bat +- Use the command netsh winhttp set proxy \:\ +- Set ClientProxy=System in runconfig.bat -The WinHTTP scenario is most appropriate for customers who use a single proxy or f. If you have more advanced proxy requirements, refer to Scenario 3. +The WinHTTP scenario is most appropriate for customers who use a single proxy. If you have more advanced proxy requirements, refer to Scenario 3. If you want to learn more about proxy considerations on Windows, see [Understanding Web Proxy Configuration](https://blogs.msdn.microsoft.com/ieinternals/2013/10/11/understanding-web-proxy-configuration/). From 113fbb13600b75d42459155e378d5d6c8ef52730 Mon Sep 17 00:00:00 2001 From: martyav Date: Mon, 6 May 2019 18:45:02 -0400 Subject: [PATCH 358/724] added links to see also section of trusted-platform-module-overview.md --- .../tpm/trusted-platform-module-overview.md | 11 +++++++++-- 1 file changed, 9 insertions(+), 2 deletions(-) diff --git a/windows/security/information-protection/tpm/trusted-platform-module-overview.md b/windows/security/information-protection/tpm/trusted-platform-module-overview.md index 3f858bbcb9..fc03050770 100644 --- a/windows/security/information-protection/tpm/trusted-platform-module-overview.md +++ b/windows/security/information-protection/tpm/trusted-platform-module-overview.md @@ -87,5 +87,12 @@ Some things that you can check on the device are: ## Related topics - [Trusted Platform Module](trusted-platform-module-top-node.md) (list of topics) -- [TPM Cmdlets in Windows PowerShell](https://docs.microsoft.com/powershell/module/trustedplatformmodule) -- [Prepare your organization for BitLocker: Planning and Policies - TPM configurations](https://docs.microsoft.com/windows/security/information-protection/bitlocker/prepare-your-organization-for-bitlocker-planning-and-policies#bkmk-tpmconfigurations) +- [Details on the TPM standard](https://www.microsoft.com/en-us/research/project/the-trusted-platform-module-tpm/) (has links to features using TPM) +- [TPM Base Services Portal](https://docs.microsoft.com/en-us/windows/desktop/TBS/tpm-base-services-portal) +- [TPM Base Services API](https://docs.microsoft.com/en-us/windows/desktop/api/_tbs/) +- [TPM Cmdlets in Windows PowerShell](https://docs.microsoft.com/powershell/module/trustedplatformmodule) +- [Prepare your organization for BitLocker: Planning and Policies - TPM configurations](https://docs.microsoft.com/windows/security/information-protection/bitlocker/prepare-your-organization-for-bitlocker-planning-and-policies#bkmk-tpmconfigurations) +- [Azure device provisioning: Identity attestation with TPM](https://azure.microsoft.com/en-us/blog/device-provisioning-identity-attestation-with-tpm/) +- [Azure device provisioning: A manufacturing timeline for TPM devices](https://azure.microsoft.com/en-us/blog/device-provisioning-a-manufacturing-timeline-for-tpm-devices/) +- [Windows 10: Enabling vTPM (Virtual TPM)](https://social.technet.microsoft.com/wiki/contents/articles/34431.windows-10-enabling-vtpm-virtual-tpm.aspx) +- [How to Multiboot with Bitlocker, TPM, and a Non-Windows OS](https://social.technet.microsoft.com/wiki/contents/articles/9528.how-to-multiboot-with-bitlocker-tpm-and-a-non-windows-os.aspx) \ No newline at end of file From 44f3ed827f23c238f17516e6ec695175f5560453 Mon Sep 17 00:00:00 2001 From: Greg Lindsay Date: Mon, 6 May 2019 16:01:58 -0700 Subject: [PATCH 359/724] commit --- .openpublishing.redirection.json | 8 +++++--- 1 file changed, 5 insertions(+), 3 deletions(-) diff --git a/.openpublishing.redirection.json b/.openpublishing.redirection.json index fdaff1c87b..442f0b1ee5 100644 --- a/.openpublishing.redirection.json +++ b/.openpublishing.redirection.json @@ -13953,14 +13953,16 @@ "source_path": "windows/deployment/planning/windows-10-creators-update-deprecation.md", "redirect_url": "/windows/deployment/planning/windows-10-1703-removed-features", "redirect_document_id": true +}, +{ "source_path": "windows/security/threat-protection/windows-defender-atp/manage-allowed-blocked-list-windows-defender-advanced-threat-protection.md", "redirect_url": "/windows/security/threat-protection/windows-defender-atp/manage-indicators", "redirect_document_id": true }, { - "source_path": "windows/hub/release-information.md", - "redirect_url": "/windows/release-information", - "redirect_document_id": true +"source_path": "windows/hub/release-information.md", +"redirect_url": "/windows/release-information", +"redirect_document_id": true } ] } From e656ed40b56379912671eb3fdcd7e9527da41c69 Mon Sep 17 00:00:00 2001 From: Justin Hall Date: Mon, 6 May 2019 16:03:07 -0700 Subject: [PATCH 360/724] Update attack-surface-reduction-exploit-guard.md --- .../attack-surface-reduction-exploit-guard.md | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/windows/security/threat-protection/windows-defender-exploit-guard/attack-surface-reduction-exploit-guard.md b/windows/security/threat-protection/windows-defender-exploit-guard/attack-surface-reduction-exploit-guard.md index 272c13081f..9e11ba030f 100644 --- a/windows/security/threat-protection/windows-defender-exploit-guard/attack-surface-reduction-exploit-guard.md +++ b/windows/security/threat-protection/windows-defender-exploit-guard/attack-surface-reduction-exploit-guard.md @@ -22,7 +22,7 @@ ms.date: 04/02/2019 Attack surface reduction rules help prevent behaviors malware often uses to infect computers with malicious code. You can set attack surface reduction rules for computers running Windows 10, version 1709 or later, Windows Server 2016 1803 or later, or Windows Server 2019. -To use attack surface reduction rules, you need a Windows 10 Enterprise license. If you have a Windows E5 license, it gives you the advanced management capabilities to power them. These include monitoring, analytics, and workflows available in [Windows Defender Advanced Threat Protection](../windows-defender-atp/windows-defender-advanced-threat-protection.md), as well as reporting and configuration capabilities in the M365 Security Center. These advanced capabilities aren't available with an E3 license or with Windows 10 Enterprise without subsciption, but you can use attack surface reduction rule events in Event Viewer to help facilitate deployment. +To use attack surface reduction rules, you need a Windows 10 Enterprise license. If you have a Windows E5 license, it gives you the advanced management capabilities to power them. These include monitoring, analytics, and workflows available in [Windows Defender Advanced Threat Protection](../windows-defender-atp/windows-defender-advanced-threat-protection.md), as well as reporting and configuration capabilities in the Microsoft 365 Security Center. These advanced capabilities aren't available with an E3 license or with Windows 10 Enterprise without subsciption, but you can use attack surface reduction rule events in Event Viewer to help facilitate deployment. Attack surface reduction rules target behaviors that malware and malicious apps typically use to infect computers, including: From 6ee5d7c96f8b0cb7104bd52e67fd3b3c9ec656a4 Mon Sep 17 00:00:00 2001 From: Nicole Turner <39884432+nenonix@users.noreply.github.com> Date: Tue, 7 May 2019 05:27:22 +0200 Subject: [PATCH 361/724] Update hello-hybrid-key-trust.md Prerequisites typo --- .../hello-for-business/hello-hybrid-key-trust.md | 4 ++-- 1 file changed, 2 insertions(+), 2 deletions(-) diff --git a/windows/security/identity-protection/hello-for-business/hello-hybrid-key-trust.md b/windows/security/identity-protection/hello-for-business/hello-hybrid-key-trust.md index d74bd02a0e..129be903cb 100644 --- a/windows/security/identity-protection/hello-for-business/hello-hybrid-key-trust.md +++ b/windows/security/identity-protection/hello-for-business/hello-hybrid-key-trust.md @@ -37,7 +37,7 @@ This baseline provides detailed procedures to move your environment from an on-p Your next step is to familiarize yourself with the prerequisites needed for the deployment. Many of the prerequisites will be new for organizations and individuals pursuing the new deployment baseline. Organizations and individuals starting from the federated baseline will likely be familiar with most of the prerequisites, but should validate they are using the proper versions that include the latest updates. > [!div class="nextstepaction"] -> [Prerequistes](hello-hybrid-key-trust-prereqs.md) +> [Prerequisites](hello-hybrid-key-trust-prereqs.md)

@@ -45,7 +45,7 @@ Your next step is to familiarize yourself with the prerequisites needed for the ## Follow the Windows Hello for Business hybrid key trust deployment guide 1. Overview (*You are here*) -2. [Prerequistes](hello-hybrid-key-trust-prereqs.md) +2. [Prerequisites](hello-hybrid-key-trust-prereqs.md) 3. [New Installation Baseline](hello-hybrid-key-new-install.md) 4. [Configure Directory Synchronization](hello-hybrid-key-trust-dirsync.md) 5. [Configure Azure Device Registration](hello-hybrid-key-trust-devreg.md) From 1e39927854b20f76169b9f32d18468f1617ea401 Mon Sep 17 00:00:00 2001 From: Nicole Turner <39884432+nenonix@users.noreply.github.com> Date: Tue, 7 May 2019 05:30:27 +0200 Subject: [PATCH 362/724] Update hello-hybrid-key-new-install.md Typo Prerequisites --- .../hello-for-business/hello-hybrid-key-new-install.md | 4 ++-- 1 file changed, 2 insertions(+), 2 deletions(-) diff --git a/windows/security/identity-protection/hello-for-business/hello-hybrid-key-new-install.md b/windows/security/identity-protection/hello-for-business/hello-hybrid-key-new-install.md index 831a9879cb..4a4a80eced 100644 --- a/windows/security/identity-protection/hello-for-business/hello-hybrid-key-new-install.md +++ b/windows/security/identity-protection/hello-for-business/hello-hybrid-key-new-install.md @@ -124,7 +124,7 @@ If your organization uses Azure MFA on a per-consumption model (no licenses), th Once you have created your Azure MFA authentication provider and associated it with an Azure tenant, you need to configure the multi-factor authentication settings. Review the [Configure Azure Multi-Factor Authentication settings](https://docs.microsoft.com/azure/multi-factor-authentication/multi-factor-authentication-whats-next) section to configure your settings. #### Azure MFA User States #### -After you have completed configuring your Azure MFA settings, you want to review configure [User States](https://docs.microsoft.com/azure/multi-factor-authentication/multi-factor-authentication-get-started-user-states) to understand user states. User states determine how you enable Azure MFA for your users. +After you have completed configuring your Azure MFA settings, you want to review configure [User States](https://docs.microsoft.com/azure/multi-factor-authentication/multi-factor-authentication-get-started-user-states) to understand user states. User states determine how you enable Azure MFA for your users. ### Azure MFA via ADFS ### Alternatively, you can configure Windows Server 2016 Active Directory Federation Services (AD FS) to provide additional multi-factor authentication. To configure, read the [Configure AD FS 2016 and Azure MFA](https://docs.microsoft.com/windows-server/identity/ad-fs/operations/configure-ad-fs-2016-and-azure-mfa) section. @@ -148,7 +148,7 @@ Alternatively, you can configure Windows Server 2016 Active Directory Federation ## Follow the Windows Hello for Business hybrid key trust deployment guide 1. [Overview](hello-hybrid-key-trust.md) -2. [Prerequistes](hello-hybrid-key-trust-prereqs.md) +2. [Prerequisites](hello-hybrid-key-trust-prereqs.md) 3. New Installation Baseline (*You are here*) 4. [Configure Directory Synchronization](hello-hybrid-key-trust-dirsync.md) 5. [Configure Azure Device Registration](hello-hybrid-key-trust-devreg.md) From 9cd14c4a4cab864228c727e44dff1e1184c5849c Mon Sep 17 00:00:00 2001 From: Nicole Turner <39884432+nenonix@users.noreply.github.com> Date: Tue, 7 May 2019 05:41:47 +0200 Subject: [PATCH 363/724] Update hello-hybrid-key-trust-dirsync.md Typos https://github.com/MicrosoftDocs/windows-itpro-docs/issues/3203 --- .../hello-for-business/hello-hybrid-key-trust-dirsync.md | 4 ++-- 1 file changed, 2 insertions(+), 2 deletions(-) diff --git a/windows/security/identity-protection/hello-for-business/hello-hybrid-key-trust-dirsync.md b/windows/security/identity-protection/hello-for-business/hello-hybrid-key-trust-dirsync.md index 2c4dc3093c..617e922f94 100644 --- a/windows/security/identity-protection/hello-for-business/hello-hybrid-key-trust-dirsync.md +++ b/windows/security/identity-protection/hello-for-business/hello-hybrid-key-trust-dirsync.md @@ -26,7 +26,7 @@ ms.date: 08/19/2018 You are ready to configure directory synchronization for your hybrid environment. Hybrid Windows Hello for Business deployment needs both a cloud and an on-premises identity to authenticate and access resources in the cloud or on-premises. ## Deploy Azure AD Connect -Next, you need to synchronizes the on-premises Active Directory with Azure Active Directory. To do this, first review the [Integrating on-prem directories with Azure Active Directory](https://docs.microsoft.com/azure/active-directory/connect/active-directory-aadconnect) and [hardware and prerequisites](https://docs.microsoft.com/azure/active-directory/connect/active-directory-aadconnect-prerequisites) needed and then [download the software](http://go.microsoft.com/fwlink/?LinkId=615771). +Next, you need to synchronize the on-premises Active Directory with Azure Active Directory. To do this, first review the [Integrating on-prem directories with Azure Active Directory](https://docs.microsoft.com/azure/active-directory/connect/active-directory-aadconnect) and [hardware and prerequisites](https://docs.microsoft.com/azure/active-directory/connect/active-directory-aadconnect-prerequisites) needed and then [download the software](http://go.microsoft.com/fwlink/?LinkId=615771). > [!NOTE] @@ -38,7 +38,7 @@ Next, you need to synchronizes the on-premises Active Directory with Azure Activ ## Follow the Windows Hello for Business hybrid key trust deployment guide 1. [Overview](hello-hybrid-key-trust.md) -2. [Prerequistes](hello-hybrid-key-trust-prereqs.md) +2. [Prerequisites](hello-hybrid-key-trust-prereqs.md) 3. [New Installation Baseline](hello-hybrid-key-new-install.md) 4. Configure Directory Synchronization (*You are here*) 5. [Configure Azure Device Registration](hello-hybrid-key-trust-devreg.md) From 322c28aa7290a18f3f4fcc861e91e1625646d7f4 Mon Sep 17 00:00:00 2001 From: Nicole Turner <39884432+nenonix@users.noreply.github.com> Date: Tue, 7 May 2019 05:48:08 +0200 Subject: [PATCH 364/724] Update hello-hybrid-cert-trust.md Typos --- .../hello-for-business/hello-hybrid-cert-trust.md | 6 +++--- 1 file changed, 3 insertions(+), 3 deletions(-) diff --git a/windows/security/identity-protection/hello-for-business/hello-hybrid-cert-trust.md b/windows/security/identity-protection/hello-for-business/hello-hybrid-cert-trust.md index f8613819f5..c622ab65bb 100644 --- a/windows/security/identity-protection/hello-for-business/hello-hybrid-cert-trust.md +++ b/windows/security/identity-protection/hello-for-business/hello-hybrid-cert-trust.md @@ -37,10 +37,10 @@ This baseline provides detailed procedures to move your environment from an on-p ## Federated Baseline ## The federated baseline helps organizations that have completed their federation with Azure Active Directory and Office 365 and enables them to introduce Windows Hello for Business into their hybrid environment. This baseline exclusively focuses on the procedures needed to add Azure Device Registration and Windows Hello for Business to an existing hybrid deployment. -Regardless of the baseline you choose, you’re next step is to familiarize yourself with the prerequisites needed for the deployment. Many of the prerequisites will be new for organizations and individuals pursuing the new deployment baseline. Organizations and individuals starting from the federated baseline will likely be familiar with most of the prerequisites, but should validate they are using the proper versions that include the latest updates. +Regardless of the baseline you choose, your next step is to familiarize yourself with the prerequisites needed for the deployment. Many of the prerequisites will be new for organizations and individuals pursuing the new deployment baseline. Organizations and individuals starting from the federated baseline will likely be familiar with most of the prerequisites, but should validate they are using the proper versions that include the latest updates. > [!div class="nextstepaction"] -> [Prerequistes](hello-hybrid-cert-trust-prereqs.md) +> [Prerequisites](hello-hybrid-cert-trust-prereqs.md)

@@ -48,7 +48,7 @@ Regardless of the baseline you choose, you’re next step is to familiarize your ## Follow the Windows Hello for Business hybrid certificate trust deployment guide 1. Overview (*You are here*) -2. [Prerequistes](hello-hybrid-cert-trust-prereqs.md) +2. [Prerequisites](hello-hybrid-cert-trust-prereqs.md) 3. [New Installation Baseline](hello-hybrid-cert-new-install.md) 4. [Device Registration](hello-hybrid-cert-trust-devreg.md) 5. [Configure Windows Hello for Business settings](hello-hybrid-cert-whfb-settings.md) From ec38b89126d53bf0b4fdbad6e044ce40bd6aab5c Mon Sep 17 00:00:00 2001 From: Nicole Turner <39884432+nenonix@users.noreply.github.com> Date: Tue, 7 May 2019 06:02:08 +0200 Subject: [PATCH 365/724] Update hello-hybrid-cert-trust-prereqs.md Typos --- .../hello-hybrid-cert-trust-prereqs.md | 10 +++++----- 1 file changed, 5 insertions(+), 5 deletions(-) diff --git a/windows/security/identity-protection/hello-for-business/hello-hybrid-cert-trust-prereqs.md b/windows/security/identity-protection/hello-for-business/hello-hybrid-cert-trust-prereqs.md index 6b4a465a9c..3dd1963a94 100644 --- a/windows/security/identity-protection/hello-for-business/hello-hybrid-cert-trust-prereqs.md +++ b/windows/security/identity-protection/hello-for-business/hello-hybrid-cert-trust-prereqs.md @@ -27,10 +27,10 @@ Hybrid environments are distributed systems that enable organizations to use on- The distributed systems on which these technologies were built involved several pieces of on-premises and cloud infrastructure. High-level pieces of the infrastructure include: * [Directories](#directories) -* [Public Key Infrastucture](#public-key-infrastructure) +* [Public Key Infrastructure](#public-key-infrastructure) * [Directory Synchronization](#directory-synchronization) * [Federation](#federation) -* [MultiFactor Authentication](#multifactor-authentication) +* [Multifactor Authentication](#multifactor-authentication) * [Device Registration](#device-registration) ## Directories ## @@ -57,7 +57,7 @@ Review these requirements and those from the Windows Hello for Business planning ## Public Key Infrastructure ## The Windows Hello for Business deployment depends on an enterprise public key infrastructure as trust anchor for authentication. Domain controllers for hybrid deployments need a certificate in order for Windows 10 devices to trust the domain controller. -Certificate trust deployments need an enterprise public key infrastructure and a certificate registration authority to issue authentication certificates to users. When using Group Policy, hybrid certificate trust deployment use the Windows Server 2016 Active Directory Federation Server (AS FS) as a certificate registration authority. +Certificate trust deployments need an enterprise public key infrastructure and a certificate registration authority to issue authentication certificates to users. When using Group Policy, hybrid certificate trust deployment uses the Windows Server 2016 Active Directory Federation Server (AS FS) as a certificate registration authority. The minimum required enterprise certificate authority that can be used with Windows Hello for Business is Windows Server 2012. @@ -96,7 +96,7 @@ The AD FS farm used with Windows Hello for Business must be Windows Server 2016 ## Multifactor Authentication ## Windows Hello for Business is a strong, two-factor credential the helps organizations reduce their dependency on passwords. The provisioning process lets a user enroll in Windows Hello for Business using their username and password as one factor. but needs a second factor of authentication. -Hybrid Windows Hello for Business deployments can use Azure’s Multifactor Authentication service or they can use multifactor authentication provides by Windows Server 2016 Active Directory Federation Services, which includes an adapter model that enables third parties to integrate their multifactor authentication into AD FS. +Hybrid Windows Hello for Business deployments can use Azure’s Multifactor Authentication service, or they can use multifactor authentication provides by Windows Server 2016 Active Directory Federation Services, which includes an adapter model that enables third parties to integrate their multifactor authentication into AD FS. ### Section Review > [!div class="checklist"] @@ -119,7 +119,7 @@ Hybrid certificate trust deployments need the device write back feature. Authen
### Next Steps ### -Follow the Windows Hello for Business hybrid certificate trust deployment guide. For proof-of-concepts, labs, and new installations, choose the **New Installation Basline**. +Follow the Windows Hello for Business hybrid certificate trust deployment guide. For proof-of-concepts, labs, and new installations, choose the **New Installation Baseline**. If your environment is already federated, but does not include Azure device registration, choose **Configure Azure Device Registration**. From 91e9e7b8089f61f08260c8c101090f457372bc4b Mon Sep 17 00:00:00 2001 From: Nicole Turner <39884432+nenonix@users.noreply.github.com> Date: Tue, 7 May 2019 06:14:48 +0200 Subject: [PATCH 366/724] Update hello-hybrid-cert-new-install.md Typos lines 83,131,144, --- .../hello-for-business/hello-hybrid-cert-new-install.md | 6 +++--- 1 file changed, 3 insertions(+), 3 deletions(-) diff --git a/windows/security/identity-protection/hello-for-business/hello-hybrid-cert-new-install.md b/windows/security/identity-protection/hello-for-business/hello-hybrid-cert-new-install.md index 2e3ac6b145..81a325489b 100644 --- a/windows/security/identity-protection/hello-for-business/hello-hybrid-cert-new-install.md +++ b/windows/security/identity-protection/hello-for-business/hello-hybrid-cert-new-install.md @@ -80,7 +80,7 @@ If you do have an existing public key infrastructure, please review [Certificati ### Section Review ### > [!div class="checklist"] -> * Miniumum Windows Server 2012 Certificate Authority. +> * Minimum Windows Server 2012 Certificate Authority. > * Enterprise Certificate Authority. > * Functioning public key infrastructure. @@ -128,7 +128,7 @@ Alternatively, you can configure Windows Server 2016 Active Directory Federation > * Review the overview and uses of Azure Multifactor Authentication. > * Review your Azure Active Directory subscription for Azure Multifactor Authentication. > * Create an Azure Multifactor Authentication Provider, if necessary. -> * Configure Azure Multufactor Authentiation features and settings. +> * Configure Azure Multifactor Authentication features and settings. > * Understand the different User States and their effect on Azure Multifactor Authentication. > * Consider using Azure Multifactor Authentication or a third-party multifactor authentication provider with Windows Server 2016 Active Directory Federation Services, if necessary. @@ -141,7 +141,7 @@ Alternatively, you can configure Windows Server 2016 Active Directory Federation ## Follow the Windows Hello for Business hybrid certificate trust deployment guide 1. [Overview](hello-hybrid-cert-trust.md) -2. [Prerequistes](hello-hybrid-cert-trust-prereqs.md) +2. [Prerequisites](hello-hybrid-cert-trust-prereqs.md) 3. New Installation Baseline (*You are here*) 4. [Configure Azure Device Registration](hello-hybrid-cert-trust-devreg.md) 5. [Configure Windows Hello for Business settings](hello-hybrid-cert-whfb-settings.md) From b6816dedf09d7422aa581f96e5a8880c252c90ec Mon Sep 17 00:00:00 2001 From: Nicole Turner <39884432+nenonix@users.noreply.github.com> Date: Tue, 7 May 2019 06:32:48 +0200 Subject: [PATCH 367/724] Update hello-hybrid-cert-trust-devreg.md Typos lines 37, 103, 517 --- .../hello-for-business/hello-hybrid-cert-trust-devreg.md | 8 ++++---- 1 file changed, 4 insertions(+), 4 deletions(-) diff --git a/windows/security/identity-protection/hello-for-business/hello-hybrid-cert-trust-devreg.md b/windows/security/identity-protection/hello-for-business/hello-hybrid-cert-trust-devreg.md index bab9bcf458..273991ec82 100644 --- a/windows/security/identity-protection/hello-for-business/hello-hybrid-cert-trust-devreg.md +++ b/windows/security/identity-protection/hello-for-business/hello-hybrid-cert-trust-devreg.md @@ -28,13 +28,13 @@ Your environment is federated and you are ready to configure device registration > [!IMPORTANT] > If your environment is not federated, review the [New Installation baseline](hello-hybrid-cert-new-install.md) section of this deployment document to learn how to federate your environment for your Windows Hello for Business deployment. -Use this three phased approach for configuring device registration. +Use this three-phased approach for configuring device registration. 1. [Configure devices to register in Azure](#configure-azure-for-device-registration) 2. [Synchronize devices to on-premises Active Directory](#configure-active-directory-to-support-azure-device-syncrhonization) 3. [Configure AD FS to use cloud devices](#configure-ad-fs-to-use-azure-registered-devices) > [!NOTE] -> Before proceeding, you should familiarize yourself with device regisration concepts such as: +> Before proceeding, you should familiarize yourself with device registration concepts such as: > * Azure AD registered devices > * Azure AD joined devices > * Hybrid Azure AD joined devices @@ -100,7 +100,7 @@ Federation server proxies are computers that run AD FS software that have been c Use the [Setting of a Federation Proxy](https://docs.microsoft.com/windows-server/identity/ad-fs/deployment/checklist--setting-up-a-federation-server-proxy) checklist to configure AD FS proxy servers in your environment. ### Deploy Azure AD Connect -Next, you need to synchronizes the on-premises Active Directory with Azure Active Directory. To do this, first review the [Integrating on-prem directories with Azure Active Directory](https://docs.microsoft.com/azure/active-directory/connect/active-directory-aadconnect) and [hardware and prerequisites](https://docs.microsoft.com/azure/active-directory/connect/active-directory-aadconnect-prerequisites) needed and then [download the software](http://go.microsoft.com/fwlink/?LinkId=615771). +Next, you need to synchronize the on-premises Active Directory with Azure Active Directory. To do this, first review the [Integrating on-prem directories with Azure Active Directory](https://docs.microsoft.com/azure/active-directory/connect/active-directory-aadconnect) and [hardware and prerequisites](https://docs.microsoft.com/azure/active-directory/connect/active-directory-aadconnect-prerequisites) needed and then [download the software](http://go.microsoft.com/fwlink/?LinkId=615771). When you are ready to install, follow the **Configuring federation with AD FS** section of [Custom installation of Azure AD Connect](https://docs.microsoft.com/azure/active-directory/connect/active-directory-aadconnect-get-started-custom). Select the **Federation with AD FS** option on the **User sign-in** page. At the **AD FS Farm** page, select the use an existing option and click **Next**. @@ -514,7 +514,7 @@ For your reference, below is a comprehensive list of the AD DS devices, containe ## Follow the Windows Hello for Business hybrid certificate trust deployment guide 1. [Overview](hello-hybrid-cert-trust.md) -2. [Prerequistes](hello-hybrid-cert-trust-prereqs.md) +2. [Prerequisites](hello-hybrid-cert-trust-prereqs.md) 3. [New Installation Baseline](hello-hybrid-cert-new-install.md) 4. Configure Azure Device Registration (*You are here*) 5. [Configure Windows Hello for Business settings](hello-hybrid-cert-whfb-settings.md) From 6c20152a49c6d5ed62a316d5908c9f7e58a62fd7 Mon Sep 17 00:00:00 2001 From: Nicole Turner <39884432+nenonix@users.noreply.github.com> Date: Tue, 7 May 2019 06:35:34 +0200 Subject: [PATCH 368/724] Update hello-hybrid-cert-whfb-settings.md Typos lines 26 and 47 --- .../hello-for-business/hello-hybrid-cert-whfb-settings.md | 4 ++-- 1 file changed, 2 insertions(+), 2 deletions(-) diff --git a/windows/security/identity-protection/hello-for-business/hello-hybrid-cert-whfb-settings.md b/windows/security/identity-protection/hello-for-business/hello-hybrid-cert-whfb-settings.md index 3d78b7a719..f127c06ae9 100644 --- a/windows/security/identity-protection/hello-for-business/hello-hybrid-cert-whfb-settings.md +++ b/windows/security/identity-protection/hello-for-business/hello-hybrid-cert-whfb-settings.md @@ -23,7 +23,7 @@ ms.date: 08/19/2018 - Certificate trust -You're environment is federated and you are ready to configure your hybrid environment for Windows Hello for business using the certificate trust model. +Your environment is federated and you are ready to configure your hybrid environment for Windows Hello for business using the certificate trust model. > [!IMPORTANT] > If your environment is not federated, review the [New Installation baseline](hello-hybrid-cert-new-install.md) section of this deployment document to learn how to federate your environment for your Windows Hello for Business deployment. @@ -44,7 +44,7 @@ For the most efficient deployment, configure these technologies in order beginni ## Follow the Windows Hello for Business hybrid certificate trust deployment guide 1. [Overview](hello-hybrid-cert-trust.md) -2. [Prerequistes](hello-hybrid-cert-trust-prereqs.md) +2. [Prerequisites](hello-hybrid-cert-trust-prereqs.md) 3. [New Installation Baseline](hello-hybrid-cert-new-install.md) 4. [Configure Azure Device Registration](hello-hybrid-cert-trust-devreg.md) 5. Configure Windows Hello for Business settings (*You are here*) From 7b1ac59f12a73df162c08bb0e3c6e1af1df07a8a Mon Sep 17 00:00:00 2001 From: Nicole Turner <39884432+nenonix@users.noreply.github.com> Date: Tue, 7 May 2019 06:42:18 +0200 Subject: [PATCH 369/724] Update hello-hybrid-cert-whfb-provision.md Typos lines 58, 62, 68, 76, 80 --- .../hello-hybrid-cert-whfb-provision.md | 12 ++++++------ 1 file changed, 6 insertions(+), 6 deletions(-) diff --git a/windows/security/identity-protection/hello-for-business/hello-hybrid-cert-whfb-provision.md b/windows/security/identity-protection/hello-for-business/hello-hybrid-cert-whfb-provision.md index e295b98d48..22b4bd30cd 100644 --- a/windows/security/identity-protection/hello-for-business/hello-hybrid-cert-whfb-provision.md +++ b/windows/security/identity-protection/hello-for-business/hello-hybrid-cert-whfb-provision.md @@ -18,7 +18,7 @@ ms.date: 08/19/2018 # Hybrid Windows Hello for Business Provisioning **Applies to** -- Windows10, version 1703 or later +- Windows 10, version 1703 or later - Hybrid deployment - Certificate trust @@ -55,17 +55,17 @@ The remainder of the provisioning includes Windows Hello for Business requesting > The following is the enrollment behavior prior to Windows Server 2016 update [KB4088889 (14393.2155)](https://support.microsoft.com/help/4088889). > The minimum time needed to synchronize the user's public key from Azure Active Directory to the on-premises Active Directory is 30 minutes. The Azure AD Connect scheduler controls the synchronization interval. -> **This synchronization latency delays the user's ability to authenticate and use on-premises resouces until the user's public key has synchronized to Active Directory.** Once synchronized, the user can authenticate and use on-premises resources. +> **This synchronization latency delays the user's ability to authenticate and use on-premises resources until the user's public key has synchronized to Active Directory.** Once synchronized, the user can authenticate and use on-premises resources. > Read [Azure AD Connect sync: Scheduler](https://docs.microsoft.com/azure/active-directory/connect/active-directory-aadconnectsync-feature-scheduler) to view and adjust the **synchronization cycle** for your organization. > [!NOTE] -> Windows Server 2016 update [KB4088889 (14393.2155)](https://support.microsoft.com/help/4088889) provides synchronous certificate enrollment during hybrid certificate trust provisioning. With this update, users no longer need to wait for Azure AD Connect to sync their public key on-premises. Users enroll their certificate during provisioning and can use the certificate for sign-in immediately after completeling the provisioning. The update needs to be installed on the federation servers. +> Windows Server 2016 update [KB4088889 (14393.2155)](https://support.microsoft.com/help/4088889) provides synchronous certificate enrollment during hybrid certificate trust provisioning. With this update, users no longer need to wait for Azure AD Connect to sync their public key on-premises. Users enroll their certificate during provisioning and can use the certificate for sign-in immediately after completing the provisioning. The update needs to be installed on the federation servers. After a successful key registration, Windows creates a certificate request using the same key pair to request a certificate. Windows send the certificate request to the AD FS server for certificate enrollment. The AD FS registration authority verifies the key used in the certificate request matches the key that was previously registered. On a successful match, the AD FS registration authority signs the certificate request using its enrollment agent certificate and sends it to the certificate authority. -The certificate authority validates the certificate was signed by the registration authority. On successful validation of the signature, it issues a certificate based on the request and returns the certificate to the AD FS registration authority. The registration authority returns the certificate to Windows where it then installs the certificate in the current users certificate store. Once this process completes, the Windows Hello for Business provisioning workflow informs the user they can use their PIN to sign-in through the Windows Action Center. +The certificate authority validates the certificate was signed by the registration authority. On successful validation of the signature, it issues a certificate based on the request and returns the certificate to the AD FS registration authority. The registration authority returns the certificate to Windows where it then installs the certificate in the current user’s certificate store. Once this process completes, the Windows Hello for Business provisioning workflow informs the user that they can use their PIN to sign-in through the Windows Action Center.

@@ -73,9 +73,9 @@ The certificate authority validates the certificate was signed by the registrati ## Follow the Windows Hello for Business hybrid certificate trust deployment guide 1. [Overview](hello-hybrid-cert-trust.md) -2. [Prerequistes](hello-hybrid-cert-trust-prereqs.md) +2. [Prerequisites](hello-hybrid-cert-trust-prereqs.md) 3. [New Installation Baseline](hello-hybrid-cert-new-install.md) 4. [Configure Azure Device Registration](hello-hybrid-cert-trust-devreg.md) 5. [Configure Windows Hello for Business policy settings](hello-hybrid-cert-whfb-settings-policy.md) -6. Sign-in and Provision(*You are here*) +6. Sign-in and Provision (*You are here*) From 34e23be6411b087eff0daafbf4471b214d7358c0 Mon Sep 17 00:00:00 2001 From: Nicole Turner <39884432+nenonix@users.noreply.github.com> Date: Tue, 7 May 2019 06:57:54 +0200 Subject: [PATCH 370/724] Update hello-hybrid-aadj-sso-base.md Typos lines 144, 283, 286 --- .../hello-for-business/hello-hybrid-aadj-sso-base.md | 6 +++--- 1 file changed, 3 insertions(+), 3 deletions(-) diff --git a/windows/security/identity-protection/hello-for-business/hello-hybrid-aadj-sso-base.md b/windows/security/identity-protection/hello-for-business/hello-hybrid-aadj-sso-base.md index bf17a84426..84d389751b 100644 --- a/windows/security/identity-protection/hello-for-business/hello-hybrid-aadj-sso-base.md +++ b/windows/security/identity-protection/hello-for-business/hello-hybrid-aadj-sso-base.md @@ -141,7 +141,7 @@ These procedures configure NTFS and share permissions on the web server to allow 1. On the web server, open **Windows Explorer** and navigate to the **cdp** folder you created in step 3 of [Configure the Web Server](#configure-the-web-server). 2. Right-click the **cdp** folder and click **Properties**. Click the **Sharing** tab. Click **Advanced Sharing**. -3. Select **Share this folder**. Type **cdp$** in **Share name:**. Click **Permissions**. +3. Select **Share this folder**. Type **cdp$** in **Share name**. Click **Permissions**. ![cdp sharing](images/aadj/cdp-sharing.png) 4. In the **Permissions for cdp$** dialog box, click **Add**. 5. In the **Select Users, Computers, Service Accounts, or Groups** dialog box, click **Object Types**. In the **Object Types** dialog box, select **Computers**, and then click **OK**. @@ -280,10 +280,10 @@ A **Trusted Certificate** device configuration profile is how you deploy trusted 1. Sign-in to the [Microsoft Azure Portal](https://portal.azure.com) and select **Microsoft Intune**. 2. Click **Device configuration**. In the **Device Configuration** blade, click **Create profile**. ![Intune Create Profile](images/aadj/intune-create-device-config-profile.png) -3. In the **Create profle** blade, type **Enterprise Root Certificate** in **Name**. Provide a description. Select **Windows 10 and later** from the **Platform** list. Select **Trusted certificate** from the **Profile type** list. Click **Configure**. +3. In the **Create profile** blade, type **Enterprise Root Certificate** in **Name**. Provide a description. Select **Windows 10 and later** from the **Platform** list. Select **Trusted certificate** from the **Profile type** list. Click **Configure**. 4. In the **Trusted Certificate** blade, use the folder icon to browse for the location of the enterprise root certificate file you created in step 8 of [Export Enterprise Root certificate](#export-enterprise-root-certificate). Click **OK**. Click **Create**. ![Intune Trusted Certificate Profile](images/aadj/intune-create-trusted-certificate-profile.png) -5. In the **Enterprise Root Certificate** blade, click **Assignmnets**. In the **Include** tab, select **All Devices** from the **Assign to** list. Click **Save**. +5. In the **Enterprise Root Certificate** blade, click **Assignments**. In the **Include** tab, select **All Devices** from the **Assign to** list. Click **Save**. ![Intune Profile assignment](images/aadj/intune-device-config-enterprise-root-assignment.png) 6. Sign out of the Microsoft Azure Portal. From 39a69c639722cab6c188230f9d80ab67f1c30cf9 Mon Sep 17 00:00:00 2001 From: Nicole Turner <39884432+nenonix@users.noreply.github.com> Date: Tue, 7 May 2019 10:19:06 +0300 Subject: [PATCH 371/724] Update windows/security/identity-protection/hello-for-business/hello-hybrid-aadj-sso-cert.md Co-Authored-By: VLG17 <41186174+VLG17@users.noreply.github.com> --- .../hello-for-business/hello-hybrid-aadj-sso-cert.md | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/windows/security/identity-protection/hello-for-business/hello-hybrid-aadj-sso-cert.md b/windows/security/identity-protection/hello-for-business/hello-hybrid-aadj-sso-cert.md index a5d222346e..f3c76726c8 100644 --- a/windows/security/identity-protection/hello-for-business/hello-hybrid-aadj-sso-cert.md +++ b/windows/security/identity-protection/hello-for-business/hello-hybrid-aadj-sso-cert.md @@ -425,7 +425,7 @@ Sign-in a workstation with access equivalent to a _domain user_. 3. Under **MANAGE**, click **Application proxy**. 4. Click **Configure an app**. 5. Under **Basic Settings** next to **Name**, type **WHFB NDES 01**. Choose a name that correlates this Azure AD Application Proxy setting with the on-premises NDES server. Each NDES server must have its own Azure AD Application Proxy as two NDES servers cannot share the same internal URL. -6. Next to **Internal Url**, type the internal fully qualified DNS name of the NDES server associated with this Azure AD Application Proxy. For example, https://ndes.corp.mstepdemo.net). This must match the primary hostname (AD Computer Account name) of the NDES server and ensure you prefix the Url with **https**. +6. Next to **Internal Url**, type the internal, fully qualified DNS name of the NDES server associated with this Azure AD Application Proxy. For example, https://ndes.corp.mstepdemo.net). You need to match the primary host name (AD Computer Account name) of the NDES server, and prefix the URL with **https**. 7. Under **Internal Url**, select **https://** from the first list. In the text box next to **https://**, type the hostname you want to use as your external hostname for the Azure AD Application Proxy. In the list next to the hostname you typed, select a DNS suffix you want to use externally for the Azure AD Application Proxy. It is recommended to use the default, -[tenantName].msapproxy.net where **[tenantName]** is your current Azure Active Directory tenant name (-mstephendemo.msappproxy.net). ![Azure NDES Application Proxy Configuration](images/aadjcert/azureconsole-appproxyconfig.png) 8. Select **Passthrough** from the **Pre Authentication** list. From b2ed14a6a2efb673f31324bdacbb7976afca8d99 Mon Sep 17 00:00:00 2001 From: larsstaalm <50363667+larsstaalm@users.noreply.github.com> Date: Tue, 7 May 2019 12:46:50 +0200 Subject: [PATCH 372/724] Update windows-analytics-FAQ-troubleshooting.md Step 6 currently wants to remove the solution like in step 1. We need to re-add it here instead, can be phrased differently :) --- .../deployment/update/windows-analytics-FAQ-troubleshooting.md | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/windows/deployment/update/windows-analytics-FAQ-troubleshooting.md b/windows/deployment/update/windows-analytics-FAQ-troubleshooting.md index ea9214c57b..9942044960 100644 --- a/windows/deployment/update/windows-analytics-FAQ-troubleshooting.md +++ b/windows/deployment/update/windows-analytics-FAQ-troubleshooting.md @@ -86,7 +86,7 @@ If you have devices that appear in other solutions, but not Device Health (the D 3. Verify that the Commercial ID is present in the device's registry. For details see [https://gpsearch.azurewebsites.net/#13551](https://gpsearch.azurewebsites.net/#13551). 4. Confirm that devices have opted in to provide diagnostic data by checking in the registry that **AllowTelemetry** is set to 2 (Enhanced) or 3 (Full) in **HKLM\Software\Microsoft\Windows\CurrentVersion\Policies\DataCollection** (or **HKLM\Software\Policies\Microsoft\Windows\DataCollection**, which takes precedence if set). 5. Verify that devices can reach the endpoints specified in [Enrolling devices in Windows Analytics](windows-analytics-get-started.md). Also check settings for SSL inspection and proxy authentication; see [Configuring endpoint access with SSL inspection](https://docs.microsoft.com/windows/deployment/update/windows-analytics-get-started#configuring-endpoint-access-with-ssl-inspection) for more information. -6. Remove the Device Health (appears as DeviceHealthProd on some pages) from your Log Analytics workspace +6. Add the Device Health solution back to your Log Analytics workspace. 7. Wait 48 hours for activity to appear in the reports. 8. If you need additional troubleshooting, contact Microsoft Support. From 05b003cb318d528d226c8e1f77700c4dbe93ca31 Mon Sep 17 00:00:00 2001 From: Russ Rimmerman Date: Tue, 7 May 2019 08:26:33 -0500 Subject: [PATCH 373/724] Update hello-faq.md Typo --- .../identity-protection/hello-for-business/hello-faq.md | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/windows/security/identity-protection/hello-for-business/hello-faq.md b/windows/security/identity-protection/hello-for-business/hello-faq.md index 1dabe3c95d..ecdde0e294 100644 --- a/windows/security/identity-protection/hello-for-business/hello-faq.md +++ b/windows/security/identity-protection/hello-for-business/hello-faq.md @@ -27,7 +27,7 @@ Windows Hello for Business is the modern, two-factor credential for Windows 10. Microsoft is committed to its vision of a world without passwords. We recognize the *convenience* provided by convenience PIN, but it stills uses a password for authentication. Microsoft recommends customers using Windows 10 and convenience PINs should move to Windows Hello for Business. New Windows 10 deployments should deploy Windows Hello for Business and not convenience PINs. Microsoft will be deprecating convenience PINs in the future and will publish the date early to ensure customers have adequate lead time to deploy Windows Hello for Business. ## Can I deploy Windows Hello for Business using System Center Configuration Manager? -Windows Hello for Business deployments using System Center Configuration Manager need to move to the hybrid deployment model that uses Active Directory Federation Services. Deployments using System Center Configuration Manager will no long be supported after November 2018. +Windows Hello for Business deployments using System Center Configuration Manager need to move to the hybrid deployment model that uses Active Directory Federation Services. Deployments using System Center Configuration Manager will no longer be supported after November 2018. ## How many users can enroll for Windows Hello for Business on a single Windows 10 computer? The maximum number of supported enrollments on a single Windows 10 computer is 10. That enables 10 users to each enroll their face and up to 10 fingerprints. While we support 10 enrollments, we will strongly encourage the use of Windows Hello security keys for the shared computer scenario when they become available. From be33f0358941dc5cc8c4c9edc3cbeb3ceaee8e3c Mon Sep 17 00:00:00 2001 From: Russ Rimmerman Date: Tue, 7 May 2019 08:28:11 -0500 Subject: [PATCH 374/724] Update hello-faq.md Typo --- .../identity-protection/hello-for-business/hello-faq.md | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/windows/security/identity-protection/hello-for-business/hello-faq.md b/windows/security/identity-protection/hello-for-business/hello-faq.md index 1dabe3c95d..d44e767bc5 100644 --- a/windows/security/identity-protection/hello-for-business/hello-faq.md +++ b/windows/security/identity-protection/hello-for-business/hello-faq.md @@ -15,7 +15,7 @@ ms.topic: article localizationpriority: medium ms.date: 08/19/2018 --- -# Windows Hello for Business Frequently Ask Questions +# Windows Hello for Business Frequently Asked Questions **Applies to** - Windows 10 From 7be9f5d81b552ea892561dca441899d395c745e2 Mon Sep 17 00:00:00 2001 From: martyav Date: Tue, 7 May 2019 12:32:12 -0400 Subject: [PATCH 375/724] added related topic links to tpm-overview.md --- .../tpm/trusted-platform-module-overview.md | 19 +++++++++++++------ 1 file changed, 13 insertions(+), 6 deletions(-) diff --git a/windows/security/information-protection/tpm/trusted-platform-module-overview.md b/windows/security/information-protection/tpm/trusted-platform-module-overview.md index 3f858bbcb9..263963d4db 100644 --- a/windows/security/information-protection/tpm/trusted-platform-module-overview.md +++ b/windows/security/information-protection/tpm/trusted-platform-module-overview.md @@ -19,7 +19,7 @@ ms.date: 11/29/2018 # Trusted Platform Module Technology Overview **Applies to** -- Windows 10 +- Windows 10 - Windows Server 2016 - Windows Server 2019 @@ -53,13 +53,13 @@ Certificates can be installed or created on computers that are using the TPM. Af Automated provisioning in the TPM reduces the cost of TPM deployment in an enterprise. New APIs for TPM management can determine if TPM provisioning actions require physical presence of a service technician to approve TPM state change requests during the boot process. -Antimalware software can use the boot measurements of the operating system start state to prove the integrity of a computer running Windows 10 or Windows Server 2016. These measurements include the launch of Hyper-V to test that datacenters using virtualization are not running untrusted hypervisors. With BitLocker Network Unlock, IT administrators can push an update without concerns that a computer is waiting for PIN entry. +Antimalware software can use the boot measurements of the operating system start state to prove the integrity of a computer running Windows 10 or Windows Server 2016. These measurements include the launch of Hyper-V to test that datacenters using virtualization are not running untrusted hypervisors. With BitLocker Network Unlock, IT administrators can push an update without concerns that a computer is waiting for PIN entry. The TPM has several Group Policy settings that might be useful in certain enterprise scenarios. For more info, see [TPM Group Policy Settings](trusted-platform-module-services-group-policy-settings.md). ## New and changed functionality -For more info on new and changed functionality for Trusted Platform Module in Windows 10, see [What's new in Trusted Platform Module?](https://technet.microsoft.com/itpro/windows/whats-new/whats-new-windows-10-version-1507-and-1511#trusted-platform-module). +For more info on new and changed functionality for Trusted Platform Module in Windows 10, see [What's new in Trusted Platform Module?](https://technet.microsoft.com/itpro/windows/whats-new/whats-new-windows-10-version-1507-and-1511#trusted-platform-module). ## Device health attestation @@ -78,7 +78,7 @@ Some things that you can check on the device are: ## Supported versions for device health attestation -| TPM version | Windows 10 | Windows Server 2016 | Windows Server 2019 | +| TPM version | Windows 10 | Windows Server 2016 | Windows Server 2019 | |-------------|-------------|---------------------|---------------------| | TPM 1.2 | >= ver 1607 | >= ver 1607 | Yes | | TPM 2.0 | Yes | Yes | Yes | @@ -87,5 +87,12 @@ Some things that you can check on the device are: ## Related topics - [Trusted Platform Module](trusted-platform-module-top-node.md) (list of topics) -- [TPM Cmdlets in Windows PowerShell](https://docs.microsoft.com/powershell/module/trustedplatformmodule) -- [Prepare your organization for BitLocker: Planning and Policies - TPM configurations](https://docs.microsoft.com/windows/security/information-protection/bitlocker/prepare-your-organization-for-bitlocker-planning-and-policies#bkmk-tpmconfigurations) +- [Details on the TPM standard](https://www.microsoft.com/en-us/research/project/the-trusted-platform-module-tpm/) (has links to features using TPM) +- [TPM Base Services Portal](https://docs.microsoft.com/en-us/windows/desktop/TBS/tpm-base-services-portal) +- [TPM Base Services API](https://docs.microsoft.com/en-us/windows/desktop/api/_tbs/) +- [TPM Cmdlets in Windows PowerShell](https://docs.microsoft.com/powershell/module/trustedplatformmodule) +- [Prepare your organization for BitLocker: Planning and Policies - TPM configurations](https://docs.microsoft.com/windows/security/information-protection/bitlocker/prepare-your-organization-for-bitlocker-planning-and-policies#bkmk-tpmconfigurations) +- [Azure device provisioning: Identity attestation with TPM](https://azure.microsoft.com/en-us/blog/device-provisioning-identity-attestation-with-tpm/) +- [Azure device provisioning: A manufacturing timeline for TPM devices](https://azure.microsoft.com/en-us/blog/device-provisioning-a-manufacturing-timeline-for-tpm-devices/) +- [Windows 10: Enabling vTPM (Virtual TPM)](https://social.technet.microsoft.com/wiki/contents/articles/34431.windows-10-enabling-vtpm-virtual-tpm.aspx) +- [How to Multiboot with Bitlocker, TPM, and a Non-Windows OS](https://social.technet.microsoft.com/wiki/contents/articles/9528.how-to-multiboot-with-bitlocker-tpm-and-a-non-windows-os.aspx) \ No newline at end of file From e350e7b5cc557ce0802338590f6edcd5f1999979 Mon Sep 17 00:00:00 2001 From: martyav Date: Tue, 7 May 2019 13:13:08 -0400 Subject: [PATCH 376/724] split & updated mdatp-mac.md into 4 new pages --- ...osoft-defender-atp-mac-install-manually.md | 145 ++++++ ...ft-defender-atp-mac-install-with-intune.md | 173 +++++++ ...soft-defender-atp-mac-install-with-jamf.md | 145 ++++++ .../microsoft-defender-atp-mac-resources.md | 136 +++++ .../microsoft-defender-atp-mac.md | 487 ++---------------- 5 files changed, 631 insertions(+), 455 deletions(-) create mode 100644 windows/security/threat-protection/windows-defender-antivirus/microsoft-defender-atp-mac-install-manually.md create mode 100644 windows/security/threat-protection/windows-defender-antivirus/microsoft-defender-atp-mac-install-with-intune.md create mode 100644 windows/security/threat-protection/windows-defender-antivirus/microsoft-defender-atp-mac-install-with-jamf.md create mode 100644 windows/security/threat-protection/windows-defender-antivirus/microsoft-defender-atp-mac-resources.md diff --git a/windows/security/threat-protection/windows-defender-antivirus/microsoft-defender-atp-mac-install-manually.md b/windows/security/threat-protection/windows-defender-antivirus/microsoft-defender-atp-mac-install-manually.md new file mode 100644 index 0000000000..27b3a8f924 --- /dev/null +++ b/windows/security/threat-protection/windows-defender-antivirus/microsoft-defender-atp-mac-install-manually.md @@ -0,0 +1,145 @@ +--- +title: Installing Microsoft Defender ATP for Mac with JAMF +description: Describes how to install Microsoft Defender ATP for Mac, using JAMF. +keywords: microsoft, defender, atp, mac, installation, deploy, uninstallation, intune, jamf, macos, mojave, high sierra, sierra +search.product: eADQiWindows 10XVcnh +search.appverid: #met150 +ms.prod: w10 +ms.mktglfcycl: deploy +ms.sitesec: library +ms.pagetype: security +ms.author: v-maave +author: martyav +ms.localizationpriority: #medium +manager: dansimp +audience: ITPro +ms.collection: M365-security-compliance +ms.topic: #conceptual +--- + +# Manual deployment + +**Applies to:** + +[Windows Defender Advanced Threat Protection (Windows Defender ATP) for Mac](https://go.microsoft.com/fwlink/p/?linkid=???To-Add???) + +>[!IMPORTANT] +>Some information relates to prereleased product which may be substantially modified before it's commercially released. Microsoft makes no warranties, express or implied, with respect to the information provided here. + +This topic describes how to install Microsoft Defender ATP for Mac. It supports the preview program and the information here is subject to change. +Microsoft Defender ATP for Mac is not yet widely available, and this topic only applies to enterprise customers who have been accepted into the preview program. + +## Prerequisites and system requirements + +Before you get started, please see [the main Microsoft Defender ATP for Mac page]((microsoft-defender-atp.md)) for a description of prerequisites and system requirements for the current software version. + +## Download installation and onboarding packages + +Download the installation and onboarding packages from Windows Defender Security Center: + +1. In Windows Defender Security Center, go to **Settings > Machine Management > Onboarding**. +2. In Section 1 of the page, set operating system to **Linux, macOS, iOS or Android** and Deployment method to **Local script**. +3. In Section 2 of the page, select **Download installation package**. Save it as wdav.pkg to a local directory. +4. In Section 2 of the page, select **Download onboarding package**. Save it as WindowsDefenderATPOnboardingPackage.zip to the same directory. + + ![Windows Defender Security Center screenshot](images/MDATP_2_IntuneAppUtil.png) + +5. From a command prompt, verify that you have the two files. + Extract the contents of the .zip files: + + ```bash + mavel-macmini:Downloads test$ ls -l + total 721152 + -rw-r--r-- 1 test staff 6185 Mar 15 10:45 WindowsDefenderATPOnboardingPackage.zip + -rw-r--r-- 1 test staff 354531845 Mar 13 08:57 wdav.pkg + mavel-macmini:Downloads test$ unzip WindowsDefenderATPOnboardingPackage.zip + Archive: WindowsDefenderATPOnboardingPackage.zip + inflating: WindowsDefenderATPOnboarding.py + ``` + +## Application installation + +To complete this process, you must have admin privileges on the machine. + +1. Navigate to the downloaded wdav.pkg in Finder and open it. + + ![App install screenshot](images/MDATP_28_AppInstall.png) + +2. Select **Continue**, agree with the License terms, and enter the password when prompted. + + ![App install screenshot](images/MDATP_29_AppInstallLogin.png) + + > [!IMPORTANT] + > You will be prompted to allow a driver from Microsoft to be installed (either "System Exception Blocked" or "Installation is on hold" or both. The driver must be allowed to be installed. + + ![App install screenshot](images/MDATP_30_SystemExtension.png) + +3. Select **Open Security Preferences** or **Open System Preferences > Security & Privacy**. Select **Allow**: + + ![Security and privacy window screenshot](images/MDATP_31_SecurityPrivacySettings.png) + +The installation will proceed. + +> [!NOTE] +> If you don't select **Allow**, the installation will fail after 5 minutes. You can restart it again at any time. + +## Client configuration + +1. Copy wdav.pkg and WindowsDefenderATPOnboarding.py to the machine where you deploy Microsoft Defender ATP for Mac. + + The client machine is not associated with orgId. Note that the orgid is blank. + + ```bash + mavel-mojave:wdavconfig testuser$ sudo /Library/Extensions/wdavkext.kext/Contents/Resources/Tools/wdavconfig.py + uuid : 69EDB575-22E1-53E1-83B8-2E1AB1E410A6 + orgid : + ``` + +2. Install the configuration file on a client machine: + + ```bash + mavel-mojave:wdavconfig testuser$ python WindowsDefenderATPOnboarding.py + Generating /Library/Application Support/Microsoft/Defender/com.microsoft.wdav.atp.plist ... (You may be required to enter sudos password) + ``` + +3. Verify that the machine is now associated with orgId: + + ```bash + mavel-mojave:wdavconfig testuser$ sudo /Library/Extensions/wdavkext.kext/Contents/Resources/Tools/wdavconfig.py + uuid : 69EDB575-22E1-53E1-83B8-2E1AB1E410A6 + orgid : E6875323-A6C0-4C60-87AD-114BBE7439B8 + ``` + +After installation, you'll see the Microsoft Defender icon in the macOS status bar in the top-right corner. + + ![Microsoft Defender icon in status bar screenshot](images/MDATP_Icon_Bar.png) + +## Configuring from the command line + +Important tasks, such as controlling product settings and triggering on-demand scans, can be done from the command line: + +|Group |Scenario |Command | +|-------------|-------------------------------------------|-----------------------------------------------------------------------| +|Configuration|Turn on/off real-time protection |`mdatp config --rtp [true/false]` | +|Configuration|Turn on/off cloud protection |`mdatp config --cloud [true/false]` | +|Configuration|Turn on/off product diagnostics |`mdatp config --diagnostic [true/false]` | +|Configuration|Turn on/off automatic sample submission |`mdatp config --sample-submission [true/false]` | +|Configuration|Turn on PUA protection |`mdatp threat --type-handling --potentially_unwanted_application block`| +|Configuration|Turn off PUA protection |`mdatp threat --type-handling --potentially_unwanted_application off` | +|Configuration|Turn on audit mode for PUA protection |`mdatp threat --type-handling --potentially_unwanted_application audit`| +|Diagnostics |Change the log level |`mdatp log-level --[error/warning/info/verbose]` | +|Diagnostics |Generate diagnostic logs |`mdatp --diagnostic` | +|Health |Check the product's health |`mdatp --health` | +|Protection |Scan a path |`mdatp scan --path [path]` | +|Protection |Do a quick scan |`mdatp scan --quick` | +|Protection |Do a full scan |`mdatp scan --full` | +|Protection |Cancel an ongoing on-demand scan |`mdatp scan --cancel` | +|Protection |Request a definition update |`mdatp --signature-update` | + +## Logging installation issues + +See [Logging installation issues](microsoft-defender-atp-mac-resources#Logging-installation-issues) for more information on how to find the automatically generated log that is created by the installer when an error occurs. + +## Uninstallation + +See [Uninstalling](microsoft-defender-atp-mac-resources#Uninstalling) for details on how to remove Windows Defender ATP for Mac from client devices. \ No newline at end of file diff --git a/windows/security/threat-protection/windows-defender-antivirus/microsoft-defender-atp-mac-install-with-intune.md b/windows/security/threat-protection/windows-defender-antivirus/microsoft-defender-atp-mac-install-with-intune.md new file mode 100644 index 0000000000..8af90fded1 --- /dev/null +++ b/windows/security/threat-protection/windows-defender-antivirus/microsoft-defender-atp-mac-install-with-intune.md @@ -0,0 +1,173 @@ +--- +title: Installing Microsoft Defender ATP for Mac with Microsoft Intune +description: Describes how to install Microsoft Defender ATP for Mac, using Microsoft Intune. +keywords: microsoft, defender, atp, mac, installation, deploy, uninstallation, intune, jamf, macos, mojave, high sierra, sierra +search.product: eADQiWindows 10XVcnh +search.appverid: #met150 +ms.prod: w10 +ms.mktglfcycl: deploy +ms.sitesec: library +ms.pagetype: security +ms.author: v-maave +author: martyav +ms.localizationpriority: #medium +manager: dansimp +audience: ITPro +ms.collection: M365-security-compliance +ms.topic: #conceptual +--- + +# Microsoft Intune-based deployment + +**Applies to:** + +[Windows Defender Advanced Threat Protection (Windows Defender ATP) for Mac](https://go.microsoft.com/fwlink/p/?linkid=???To-Add???) + +>[!IMPORTANT] +>Some information relates to prereleased product which may be substantially modified before it's commercially released. Microsoft makes no warranties, express or implied, with respect to the information provided here. + +This topic describes how to install Microsoft Defender ATP for Mac. It supports the preview program and the information here is subject to change. +Microsoft Defender ATP for Mac is not yet widely available, and this topic only applies to enterprise customers who have been accepted into the preview program. + +## Prerequisites and system requirements + +Before you get started, please see [the main Microsoft Defender ATP for Mac page]((microsoft-defender-atp.md)) for a description of prerequisites and system requirements for the current software version. + +## Download installation and onboarding packages + +Download the installation and onboarding packages from Windows Defender Security Center: + +1. In Windows Defender Security Center, go to **Settings > Machine Management > Onboarding**. +2. In Section 1 of the page, set operating system to **Linux, macOS, iOS or Android** and Deployment method to **Mobile Device Management / Microsoft Intune**. +3. In Section 2 of the page, select **Download installation package**. Save it as wdav.pkg to a local directory. +4. In Section 2 of the page, select **Download onboarding package**. Save it as WindowsDefenderATPOnboardingPackage.zip to the same directory. +5. Download IntuneAppUtil from [https://docs.microsoft.com/en-us/intune/lob-apps-macos](https://docs.microsoft.com/en-us/intune/lob-apps-macos). + + ![Windows Defender Security Center screenshot](images/MDATP_2_IntuneAppUtil.png) + +6. From a command prompt, verify that you have the three files. + Extract the contents of the .zip files: + + ```bash + mavel-macmini:Downloads test$ ls -l + total 721688 + -rw-r--r-- 1 test staff 269280 Mar 15 11:25 IntuneAppUtil + -rw-r--r-- 1 test staff 11821 Mar 15 09:23 WindowsDefenderATPOnboardingPackage.zip + -rw-r--r-- 1 test staff 354531845 Mar 13 08:57 wdav.pkg + mavel-macmini:Downloads test$ unzip WindowsDefenderATPOnboardingPackage.zip + Archive: WindowsDefenderATPOnboardingPackage.zip + warning: WindowsDefenderATPOnboardingPackage.zip appears to use backslashes as path separators + inflating: intune/kext.xml + inflating: intune/WindowsDefenderATPOnboarding.xml + inflating: jamf/WindowsDefenderATPOnboarding.plist + mavel-macmini:Downloads test$ + ``` + +7. Make IntuneAppUtil an executable: + + ```mavel-macmini:Downloads test$ chmod +x IntuneAppUtil``` + +8. Create the wdav.pkg.intunemac package from wdav.pkg: + + ```bash + mavel-macmini:Downloads test$ ./IntuneAppUtil -c wdav.pkg -o . -i "com.microsoft.wdav" -n "1.0.0" + Microsoft Intune Application Utility for Mac OS X + Version: 1.0.0.0 + Copyright 2018 Microsoft Corporation + + Creating intunemac file for /Users/test/Downloads/wdav.pkg + Composing the intunemac file output + Output written to ./wdav.pkg.intunemac. + + IntuneAppUtil successfully processed "wdav.pkg", + to deploy refer to the product documentation. + ``` + +## Client Machine Setup + +You need no special provisioning for a Mac machine beyond a standard [Company Portal installation](https://docs.microsoft.com/en-us/intune-user-help/enroll-your-device-in-intune-macos-cp). + +1. You'll be asked to confirm device management. + +![Confirm device management screenshot](images/MDATP_3_ConfirmDeviceMgmt.png) + +Select Open System Preferences, locate Management Profile on the list and select the **Approve...** button. Your Management Profile would be displayed as **Verified**: + +![Management profile screenshot](images/MDATP_4_ManagementProfile.png) + +2. Select the **Continue** button and complete the enrollment. + +You can enroll additional machines. Optionally, you can do it later, after system configuration and application package are provisioned. + +3. In Intune, open the **Manage > Devices > All devices** blade. You'll see your machine: + +![Add Devices screenshot](images/MDATP_5_allDevices.png) + +## Create System Configuration profiles + +1. In Intune open the **Manage > Device configuration** blade. Select **Manage > Profiles > Create Profile**. +2. Choose a name for the profile. Change **Platform=macOS**, **Profile type=Custom**. Select **Configure**. +3. Open the configuration profile and upload intune/kext.xml. This file was created during the Generate settings step above. +4. Select **OK**. + + ![System configuration profiles screenshot](images/MDATP_6_SystemConfigurationProfiles.png) + +5. Select **Manage > Assignments**. In the **Include** tab, select **Assign to All Users & All devices**. +6. Repeat these steps with the second profile. +7. Create Profile one more time, give it a name, upload the intune/WindowsDefenderATPOnboarding.xml file. +8. Select **Manage > Assignments**. In the Include tab, select **Assign to All Users & All devices**. + +After Intune changes are propagated to the enrolled machines, you'll see it on the **Monitor > Device status** blade: + +![System configuration profiles screenshot](images/MDATP_7_DeviceStatusBlade.png) + +## Publish application + +1. In Intune, open the **Manage > Client apps** blade. Select **Apps > Add**. +2. Select **App type=Other/Line-of-business app**. +3. Select **file=wdav.pkg.intunemac**. Select **OK** to upload. +4. Select **Configure** and add the required information. +5. Use **macOS Sierra 10.12** as the minimum OS. Other settings can be any other value. + + ![Device status blade screenshot](images/MDATP_8_IntuneAppInfo.png) + +6. Select **OK** and **Add**. + + ![Device status blade screenshot](images/MDATP_9_IntunePkgInfo.png) + +7. It will take a while to upload the package. After it's done, select the name and then go to **Assignments** and **Add group**. + + ![Client apps screenshot](images/MDATP_10_ClientApps.png) + +8. Change **Assignment type=Required**. +9. Select **Included Groups**. Select **Make this app required for all devices=Yes**. Select **Select group to include** and add a group that contains the users you want to target. Select **OK** and **Save**. + + ![Intune assignments info screenshot](images/MDATP_11_Assignments.png) + +10. After some time the application will be published to all enrolled machines. You'll see it on the **Monitor > Device** install status blade: + + ![Intune device status screenshot](images/MDATP_12_DeviceInstall.png) + +## Verify client machine state + +1. After the configuration profiles are deployed to your machines, on your Mac device, open **System Preferences > Profiles**. + + ![System Preferences screenshot](images/MDATP_13_SystemPreferences.png) + ![System Preferences Profiles screenshot](images/MDATP_14_SystemPreferencesProfiles.png) + +2. Verify the three profiles listed there: + ![Profiles screenshot](images/MDATP_15_ManagementProfileConfig.png) + +3. The **Management Profile** should be the Intune system profile. +4. wdav-config and wdav-kext are system configuration profiles that we added in Intune. +5. You should also see the Microsoft Defender icon in the top-right corner: + + ![Microsoft Defender icon in status bar screenshot](images/MDATP_Icon_Bar.png) + +## Logging installation issues + +See [Logging installation issues](microsoft-defender-atp-mac-resources#Logging-installation-issues) for more information on how to find the automatically generated log that is created by the installer when an error occurs. + +## Uninstallation + +See [Uninstalling](microsoft-defender-atp-mac-resources#Uninstalling) for details on how to remove Windows Defender ATP for Mac from client devices. \ No newline at end of file diff --git a/windows/security/threat-protection/windows-defender-antivirus/microsoft-defender-atp-mac-install-with-jamf.md b/windows/security/threat-protection/windows-defender-antivirus/microsoft-defender-atp-mac-install-with-jamf.md new file mode 100644 index 0000000000..27b3a8f924 --- /dev/null +++ b/windows/security/threat-protection/windows-defender-antivirus/microsoft-defender-atp-mac-install-with-jamf.md @@ -0,0 +1,145 @@ +--- +title: Installing Microsoft Defender ATP for Mac with JAMF +description: Describes how to install Microsoft Defender ATP for Mac, using JAMF. +keywords: microsoft, defender, atp, mac, installation, deploy, uninstallation, intune, jamf, macos, mojave, high sierra, sierra +search.product: eADQiWindows 10XVcnh +search.appverid: #met150 +ms.prod: w10 +ms.mktglfcycl: deploy +ms.sitesec: library +ms.pagetype: security +ms.author: v-maave +author: martyav +ms.localizationpriority: #medium +manager: dansimp +audience: ITPro +ms.collection: M365-security-compliance +ms.topic: #conceptual +--- + +# Manual deployment + +**Applies to:** + +[Windows Defender Advanced Threat Protection (Windows Defender ATP) for Mac](https://go.microsoft.com/fwlink/p/?linkid=???To-Add???) + +>[!IMPORTANT] +>Some information relates to prereleased product which may be substantially modified before it's commercially released. Microsoft makes no warranties, express or implied, with respect to the information provided here. + +This topic describes how to install Microsoft Defender ATP for Mac. It supports the preview program and the information here is subject to change. +Microsoft Defender ATP for Mac is not yet widely available, and this topic only applies to enterprise customers who have been accepted into the preview program. + +## Prerequisites and system requirements + +Before you get started, please see [the main Microsoft Defender ATP for Mac page]((microsoft-defender-atp.md)) for a description of prerequisites and system requirements for the current software version. + +## Download installation and onboarding packages + +Download the installation and onboarding packages from Windows Defender Security Center: + +1. In Windows Defender Security Center, go to **Settings > Machine Management > Onboarding**. +2. In Section 1 of the page, set operating system to **Linux, macOS, iOS or Android** and Deployment method to **Local script**. +3. In Section 2 of the page, select **Download installation package**. Save it as wdav.pkg to a local directory. +4. In Section 2 of the page, select **Download onboarding package**. Save it as WindowsDefenderATPOnboardingPackage.zip to the same directory. + + ![Windows Defender Security Center screenshot](images/MDATP_2_IntuneAppUtil.png) + +5. From a command prompt, verify that you have the two files. + Extract the contents of the .zip files: + + ```bash + mavel-macmini:Downloads test$ ls -l + total 721152 + -rw-r--r-- 1 test staff 6185 Mar 15 10:45 WindowsDefenderATPOnboardingPackage.zip + -rw-r--r-- 1 test staff 354531845 Mar 13 08:57 wdav.pkg + mavel-macmini:Downloads test$ unzip WindowsDefenderATPOnboardingPackage.zip + Archive: WindowsDefenderATPOnboardingPackage.zip + inflating: WindowsDefenderATPOnboarding.py + ``` + +## Application installation + +To complete this process, you must have admin privileges on the machine. + +1. Navigate to the downloaded wdav.pkg in Finder and open it. + + ![App install screenshot](images/MDATP_28_AppInstall.png) + +2. Select **Continue**, agree with the License terms, and enter the password when prompted. + + ![App install screenshot](images/MDATP_29_AppInstallLogin.png) + + > [!IMPORTANT] + > You will be prompted to allow a driver from Microsoft to be installed (either "System Exception Blocked" or "Installation is on hold" or both. The driver must be allowed to be installed. + + ![App install screenshot](images/MDATP_30_SystemExtension.png) + +3. Select **Open Security Preferences** or **Open System Preferences > Security & Privacy**. Select **Allow**: + + ![Security and privacy window screenshot](images/MDATP_31_SecurityPrivacySettings.png) + +The installation will proceed. + +> [!NOTE] +> If you don't select **Allow**, the installation will fail after 5 minutes. You can restart it again at any time. + +## Client configuration + +1. Copy wdav.pkg and WindowsDefenderATPOnboarding.py to the machine where you deploy Microsoft Defender ATP for Mac. + + The client machine is not associated with orgId. Note that the orgid is blank. + + ```bash + mavel-mojave:wdavconfig testuser$ sudo /Library/Extensions/wdavkext.kext/Contents/Resources/Tools/wdavconfig.py + uuid : 69EDB575-22E1-53E1-83B8-2E1AB1E410A6 + orgid : + ``` + +2. Install the configuration file on a client machine: + + ```bash + mavel-mojave:wdavconfig testuser$ python WindowsDefenderATPOnboarding.py + Generating /Library/Application Support/Microsoft/Defender/com.microsoft.wdav.atp.plist ... (You may be required to enter sudos password) + ``` + +3. Verify that the machine is now associated with orgId: + + ```bash + mavel-mojave:wdavconfig testuser$ sudo /Library/Extensions/wdavkext.kext/Contents/Resources/Tools/wdavconfig.py + uuid : 69EDB575-22E1-53E1-83B8-2E1AB1E410A6 + orgid : E6875323-A6C0-4C60-87AD-114BBE7439B8 + ``` + +After installation, you'll see the Microsoft Defender icon in the macOS status bar in the top-right corner. + + ![Microsoft Defender icon in status bar screenshot](images/MDATP_Icon_Bar.png) + +## Configuring from the command line + +Important tasks, such as controlling product settings and triggering on-demand scans, can be done from the command line: + +|Group |Scenario |Command | +|-------------|-------------------------------------------|-----------------------------------------------------------------------| +|Configuration|Turn on/off real-time protection |`mdatp config --rtp [true/false]` | +|Configuration|Turn on/off cloud protection |`mdatp config --cloud [true/false]` | +|Configuration|Turn on/off product diagnostics |`mdatp config --diagnostic [true/false]` | +|Configuration|Turn on/off automatic sample submission |`mdatp config --sample-submission [true/false]` | +|Configuration|Turn on PUA protection |`mdatp threat --type-handling --potentially_unwanted_application block`| +|Configuration|Turn off PUA protection |`mdatp threat --type-handling --potentially_unwanted_application off` | +|Configuration|Turn on audit mode for PUA protection |`mdatp threat --type-handling --potentially_unwanted_application audit`| +|Diagnostics |Change the log level |`mdatp log-level --[error/warning/info/verbose]` | +|Diagnostics |Generate diagnostic logs |`mdatp --diagnostic` | +|Health |Check the product's health |`mdatp --health` | +|Protection |Scan a path |`mdatp scan --path [path]` | +|Protection |Do a quick scan |`mdatp scan --quick` | +|Protection |Do a full scan |`mdatp scan --full` | +|Protection |Cancel an ongoing on-demand scan |`mdatp scan --cancel` | +|Protection |Request a definition update |`mdatp --signature-update` | + +## Logging installation issues + +See [Logging installation issues](microsoft-defender-atp-mac-resources#Logging-installation-issues) for more information on how to find the automatically generated log that is created by the installer when an error occurs. + +## Uninstallation + +See [Uninstalling](microsoft-defender-atp-mac-resources#Uninstalling) for details on how to remove Windows Defender ATP for Mac from client devices. \ No newline at end of file diff --git a/windows/security/threat-protection/windows-defender-antivirus/microsoft-defender-atp-mac-resources.md b/windows/security/threat-protection/windows-defender-antivirus/microsoft-defender-atp-mac-resources.md new file mode 100644 index 0000000000..09a4dcceae --- /dev/null +++ b/windows/security/threat-protection/windows-defender-antivirus/microsoft-defender-atp-mac-resources.md @@ -0,0 +1,136 @@ +--- +title: Microsoft Defender ATP for Mac Resources +description: Describes resources for Microsoft Defender ATP for Mac, including how to uninstall it, how to collect diagnostic logs, and known issues with the product. +keywords: microsoft, defender, atp, mac, installation, deploy, uninstallation, intune, jamf, macos, mojave, high sierra, sierra +search.product: eADQiWindows 10XVcnh +search.appverid: #met150 +ms.prod: w10 +ms.mktglfcycl: deploy +ms.sitesec: library +ms.pagetype: security +ms.author: v-maave +author: martyav +ms.localizationpriority: #medium +manager: dansimp +audience: ITPro +ms.collection: M365-security-compliance +ms.topic: #conceptual +--- + +# Resources + +**Applies to:** + +[Windows Defender Advanced Threat Protection (Windows Defender ATP) for Mac](https://go.microsoft.com/fwlink/p/?linkid=???To-Add???) + +>[!IMPORTANT] +>Some information relates to prereleased product which may be substantially modified before it's commercially released. Microsoft makes no warranties, express or implied, with respect to the information provided here. + +This topic describes how to use, and details about, Microsoft Defender ATP for Mac. It supports the preview program and the information here is subject to change. +Microsoft Defender ATP for Mac is not yet widely available, and this topic only applies to enterprise customers who have been accepted into the preview program. + +## Collecting diagnostic information + +If you can reproduce a problem, please increase the logging level, run the system for some time, and restore the logging level to the default. + +1) Increase logging level: + +```bash + mavel-mojave:~ testuser$ mdatp log-level --verbose + Creating connection to daemon + Connection established + Operation succeeded +``` + +2) Reproduce the problem + +3) Run `mdatp --diagnostic` to backup Defender ATP's logs. The command will print out location with generated zip file. + + ```bash + mavel-mojave:~ testuser$ mdatp --diagnostic + Creating connection to daemon + Connection established + "/Library/Application Support/Microsoft/Defender/wdavdiag/d85e7032-adf8-434a-95aa-ad1d450b9a2f.zip" + ``` + +4) Restore logging level: + + ```bash + mavel-mojave:~ testuser$ mdatp log-level --info + Creating connection to daemon + Connection established + Operation succeeded + ``` + +## Logging installation issues + +If an error occurs during installation, the installer will only report a general failure. + +The detailed log will be saved to /Library/Logs/Microsoft/wdav.install.log. If you experience issues during installation, send us this file so we can help diagnose the cause. + +## Uninstalling + +There are several ways to uninstall Microsoft Defender ATP for Mac. Please note that while centrally managed uninstall is available on JAMF, it is not yet available for Microsoft Intune. + +### Within the GUI + +- Open **Finder > Applications**. Right click on **Microsoft Defender ATP > Move to Trash**. + +### From the command line + +- ```sudo rm -rf '/Applications/Microsoft Defender ATP'``` + +### With a script + +Create a script in **Settings > Computer Management > Scripts**. + +![Microsoft Defender uninstall screenshot](images/MDATP_26_Uninstall.png) + +For example, this script removes Microsoft Defender ATP from the /Applications directory: + +```bash + echo "Is WDAV installed?" + ls -ld '/Applications/Microsoft Defender ATP.app' 2>/dev/null + + echo "Uninstalling WDAV..." + rm -rf '/Applications/Microsoft Defender ATP.app' + + echo "Is WDAV still installed?" + ls -ld '/Applications/Microsoft Defender ATP.app' 2>/dev/null + + echo "Done!" +``` + +### With a JAMF policy + +If you are running JAMF, your policy should contain a single script: + +![Microsoft Defender uninstall script screenshot](images/MDATP_27_UninstallScript.png) + +Configure the appropriate scope in the **Scope** tab to specify the machines that will receive this policy. + +## What to expect in the ATP portal + +- AV alerts: + - Severity + - Scan type + - Device information (hostname, machine identifier, tenant identifier, app version, and OS type) + - File information (name, path, size, and hash) + - Threat information (name, type, and state) +- Device information: + - Machine identifier + - Tenant identifier + - App version + - Hostname + - OS type + - OS version + - Computer model + - Processor architecture + - Whether the device is a virtual machine + +## Known issues + +- Not fully optimized for performance or disk space yet. +- Full Windows Defender ATP integration is not available yet. +- Mac devices that switch networks may appear multiple times in the APT portal. +- Centrally managed uninstall via Intune is still in development. As an alternative, manually uninstall Microsoft Defender ATP for Mac from each client device. \ No newline at end of file diff --git a/windows/security/threat-protection/windows-defender-antivirus/microsoft-defender-atp-mac.md b/windows/security/threat-protection/windows-defender-antivirus/microsoft-defender-atp-mac.md index cccde77573..af6205c2ca 100644 --- a/windows/security/threat-protection/windows-defender-antivirus/microsoft-defender-atp-mac.md +++ b/windows/security/threat-protection/windows-defender-antivirus/microsoft-defender-atp-mac.md @@ -22,15 +22,40 @@ ms.topic: conceptual >[!IMPORTANT] >Some information relates to prereleased product which may be substantially modified before it's commercially released. Microsoft makes no warranties, express or implied, with respect to the information provided here. -This topic describes how to install and use Microsoft Defender ATP for Mac. It supports the preview program and the information here is subject to change. -Microsoft Defender ATP for Mac is not yet widely available, and this topic only applies to enterprise customers who have been accepted into the preview program. +This topic describes how to install and use Microsoft Defender ATP for Mac. It supports the preview program and the information here is subject to change. +Microsoft Defender ATP for Mac is not yet widely available, and this topic only applies to enterprise customers who have been accepted into the preview program. + +## What’s new in the public preview + +We've been working hard through the private preview period, and we've heard your concerns. We've reduced the delay for when new Mac devices appear in the ATP console after they've been deployed. We've improved threat handling, and enhanced the user experience. We've also made numerous bug fixes. Other updates to Microsoft Defender ATP for Mac include: + +- Full accessibility +- Improved performance +- Localization for 37 languages +- Improved anti-tampering protections +- Feedback and samples can now be submitted via the GUI. +- Product health can be queried with JAMF or the command line. +- Admins can set their cloud preference for any location, not just for those in the US. + +## Installing and configuring + +There are various methods and deployment tools that you can use to install and configure Microsoft Defender ATP for Mac. +In general you'll need to take the following steps: + +- Ensure you have a Windows Defender ATP subscription and have access to the Windows Defender ATP Portal +- Deploy Microsoft Defender ATP for Mac using one of the following deployment methods: + - [Microsoft Intune-based deployment](microsoft-defender-atp-mac-install-with-intune) + - [JAMF-based deployment](microsoft-defender-atp-mac-install-with-jamf) + - [Manual deployment](microsoft-defender-atp-mac-install-manually) + +### Prerequisites -## Prerequisites You should have beginner-level experience in macOS and BASH scripting. You must have administrative privileges on the machine. You should also have access to Windows Defender Security Center. ### System Requirements + - macOS version: 10.14 (Mojave), 10.13 (High Sierra), 10.12 (Sierra) - Disk space during preview: 1GB @@ -49,462 +74,14 @@ The following table lists the services and their associated URLs that your netwo To test that a connection is not blocked, open `https://x.cp.wd.microsoft.com/api/report` and `https://wu-cdn.x.cp.wd.microsoft.com/` in a browser, or run the following command in Terminal: -``` +```bash mavel-mojave:~ testuser$ curl 'https://x.cp.wd.microsoft.com/api/report' OK ``` -We recommend to keep [System Integrity Protection](https://support.apple.com/en-us/HT204899) ([Wiki](https://en.wikipedia.org/wiki/System_Integrity_Protection)) enabled (default setting) on client machines. +We recommend to keep [System Integrity Protection](https://support.apple.com/en-us/HT204899) ([Wiki](https://en.wikipedia.org/wiki/System_Integrity_Protection)) enabled (default setting) on client machines. SIP is a built-in macOS security feature that prevents low-level tampering with the OS. -## Installation and configuration overview -There are various methods and deployment tools that you can use to install and configure Microsoft Defender ATP for Mac. -In general you'll need to take the following steps: - - Ensure you have a Windows Defender ATP subscription and have access to the Windows Defender ATP Portal - - Deploy Microsoft Defender ATP for Mac using one of the following deployment methods: - * [Microsoft Intune based deployment](#microsoft-intune-based-deployment) - * [JAMF based deployment](#jamf-based-deployment) - * [Manual deployment](#manual-deployment) +## Resources -## Microsoft Intune based deployment - -### Download installation and onboarding packages -Download the installation and onboarding packages from Windows Defender Security Center: -1. In Windows Defender Security Center, go to **Settings > Machine Management > Onboarding**. -2. In Section 1 of the page, set operating system to **Linux, macOS, iOS or Android** and Deployment method to **Mobile Device Management / Microsoft Intune**. -3. In Section 2 of the page, select **Download installation package**. Save it as wdav.pkg to a local directory. -4. In Section 2 of the page, select **Download onboarding package**. Save it as WindowsDefenderATPOnboardingPackage.zip to the same directory. -5. Download IntuneAppUtil from https://docs.microsoft.com/en-us/intune/lob-apps-macos. - - ![Windows Defender Security Center screenshot](images/MDATP_2_IntuneAppUtil.png) - -6. From a command prompt, verify that you have the three files. - Extract the contents of the .zip files: - - ``` - mavel-macmini:Downloads test$ ls -l - total 721688 - -rw-r--r-- 1 test staff 269280 Mar 15 11:25 IntuneAppUtil - -rw-r--r-- 1 test staff 11821 Mar 15 09:23 WindowsDefenderATPOnboardingPackage.zip - -rw-r--r-- 1 test staff 354531845 Mar 13 08:57 wdav.pkg - mavel-macmini:Downloads test$ unzip WindowsDefenderATPOnboardingPackage.zip - Archive: WindowsDefenderATPOnboardingPackage.zip - warning: WindowsDefenderATPOnboardingPackage.zip appears to use backslashes as path separators - inflating: intune/kext.xml - inflating: intune/WindowsDefenderATPOnboarding.xml - inflating: jamf/WindowsDefenderATPOnboarding.plist - mavel-macmini:Downloads test$ - ``` -7. Make IntuneAppUtil an executable: - - ```mavel-macmini:Downloads test$ chmod +x IntuneAppUtil``` - -8. Create the wdav.pkg.intunemac package from wdav.pkg: - - ``` - mavel-macmini:Downloads test$ ./IntuneAppUtil -c wdav.pkg -o . -i "com.microsoft.wdav" -n "1.0.0" - Microsoft Intune Application Utility for Mac OS X - Version: 1.0.0.0 - Copyright 2018 Microsoft Corporation - - Creating intunemac file for /Users/test/Downloads/wdav.pkg - Composing the intunemac file output - Output written to ./wdav.pkg.intunemac. - - IntuneAppUtil successfully processed "wdav.pkg", - to deploy refer to the product documentation. - ``` - -### Client Machine Setup -You need no special provisioning for a Mac machine beyond a standard [Company Portal installation](https://docs.microsoft.com/en-us/intune-user-help/enroll-your-device-in-intune-macos-cp). - -1. You'll be asked to confirm device management. - -![Confirm device management screenshot](images/MDATP_3_ConfirmDeviceMgmt.png) - -Select Open System Preferences, locate Management Profile on the list and select the **Approve...** button. Your Management Profile would be displayed as **Verified**: - -![Management profile screenshot](images/MDATP_4_ManagementProfile.png) - -2. Select the **Continue** button and complete the enrollment. - -You can enroll additional machines. Optionally, you can do it later, after system configuration and application package are provisioned. - -3. In Intune, open the **Manage > Devices > All devices** blade. You'll see your machine: - -![Add Devices screenshot](images/MDATP_5_allDevices.png) - -### Create System Configuration profiles -1. In Intune open the **Manage > Device configuration** blade. Select **Manage > Profiles > Create Profile**. -2. Choose a name for the profile. Change **Platform=macOS**, **Profile type=Custom**. Select **Configure**. -3. Open the configuration profile and upload intune/kext.xml. This file was created during the Generate settings step above. -4. Select **OK**. - - ![System configuration profiles screenshot](images/MDATP_6_SystemConfigurationProfiles.png) - -5. Select **Manage > Assignments**. In the **Include** tab, select **Assign to All Users & All devices**. -7. Repeat these steps with the second profile. -8. Create Profile one more time, give it a name, upload the intune/WindowsDefenderATPOnboarding.xml file. -9. Select **Manage > Assignments**. In the Include tab, select **Assign to All Users & All devices**. - -After Intune changes are propagated to the enrolled machines, you'll see it on the **Monitor > Device status** blade: - -![System configuration profiles screenshot](images/MDATP_7_DeviceStatusBlade.png) - -### Publish application - -1. In Intune, open the **Manage > Client apps** blade. Select **Apps > Add**. -2. Select **App type=Other/Line-of-business app**. -3. Select **file=wdav.pkg.intunemac**. Select **OK** to upload. -4. Select **Configure** and add the required information. -5. Use **macOS Sierra 10.12** as the minimum OS. Other settings can be any other value. - - ![Device status blade screenshot](images/MDATP_8_IntuneAppInfo.png) - -6. Select **OK** and **Add**. - - ![Device status blade screenshot](images/MDATP_9_IntunePkgInfo.png) - -7. It will take a while to upload the package. After it's done, select the name and then go to **Assignments** and **Add group**. - - ![Client apps screenshot](images/MDATP_10_ClientApps.png) - -8. Change **Assignment type=Required**. -9. Select **Included Groups**. Select **Make this app required for all devices=Yes**. Select **Select group to include** and add a group that contains the users you want to target. Select **OK** and **Save**. - - ![Intune assignments info screenshot](images/MDATP_11_Assignments.png) - -10. After some time the application will be published to all enrolled machines. You'll see it on the **Monitor > Device** install status blade: - - ![Intune device status screenshot](images/MDATP_12_DeviceInstall.png) - -### Verify client machine state -1. After the configuration profiles are deployed to your machines, on your Mac device, open **System Preferences > Profiles**. - - ![System Preferences screenshot](images/MDATP_13_SystemPreferences.png) - ![System Preferences Profiles screenshot](images/MDATP_14_SystemPreferencesProfiles.png) - -2. Verify the three profiles listed there: - ![Profiles screenshot](images/MDATP_15_ManagementProfileConfig.png) - -3. The **Management Profile** should be the Intune system profile. -4. wdav-config and wdav-kext are system configuration profiles that we added in Intune. -5. You should also see the Microsoft Defender icon in the top-right corner: - - ![Microsoft Defender icon in status bar screenshot](images/MDATP_Icon_Bar.png) - -## JAMF based deployment -### Prerequsites -You need to be familiar with JAMF administration tasks, have a JAMF tenant, and know how to deploy packages. This includes a properly configured distribution point. JAMF has many alternative ways to complete the same task. These instructions provide you an example for most common processes. Your organization might use a different workflow. - - -### Download installation and onboarding packages -Download the installation and onboarding packages from Windows Defender Security Center: -1. In Windows Defender Security Center, go to **Settings > Machine Management > Onboarding**. -2. In Section 1 of the page, set operating system to **Linux, macOS, iOS or Android** and Deployment method to **Mobile Device Management / Microsoft Intune**. -3. In Section 2 of the page, select **Download installation package**. Save it as wdav.pkg to a local directory. -4. In Section 2 of the page, select **Download onboarding package**. Save it as WindowsDefenderATPOnboardingPackage.zip to the same directory. - - ![Windows Defender Security Center screenshot](images/MDATP_2_IntuneAppUtil.png) - -5. From a command prompt, verify that you have the two files. - Extract the contents of the .zip files: - - ``` - mavel-macmini:Downloads test$ ls -l - total 721160 - -rw-r--r-- 1 test staff 11821 Mar 15 09:23 WindowsDefenderATPOnboardingPackage.zip - -rw-r--r-- 1 test staff 354531845 Mar 13 08:57 wdav.pkg - mavel-macmini:Downloads test$ unzip WindowsDefenderATPOnboardingPackage.zip - Archive: WindowsDefenderATPOnboardingPackage.zip - warning: WindowsDefenderATPOnboardingPackage.zip appears to use backslashes as path separators - inflating: intune/kext.xml - inflating: intune/WindowsDefenderATPOnboarding.xml - inflating: jamf/WindowsDefenderATPOnboarding.plist - mavel-macmini:Downloads test$ - ``` - -### Create JAMF Policies -You need to create a configuration profile and a policy to start deploying Microsoft Defender ATP for Mac to client machines. - -#### Configuration Profile -The configuration profile contains one custom settings payload that includes: - -- Microsoft Defender ATP for Mac onboarding information -- Approved Kernel Extensions payload to enable the Microsoft kernel driver to run - - -1. Upload jamf/WindowsDefenderATPOnboarding.plist as the Property List File. - - >[!NOTE] - > You must use exactly "com.microsoft.wdav.atp" as the Preference Domain. - - ![Configuration profile screenshot](images/MDATP_16_PreferenceDomain.png) - -#### Approved Kernel Extension - -To approve the kernel extension: -1. In **Computers > Configuration Profiles** select **Options > Approved Kernel Extensions**. -2. Use **UBF8T346G9** for Team Id. - -![Approved kernel extensions screenshot](images/MDATP_17_approvedKernelExtensions.png) - -#### Configuration Profile's Scope -Configure the appropriate scope to specify the machines that will receive this configuration profile. - -Open Computers -> Configuration Profiles, select **Scope > Targets**. Select the appropriate Target computers. - -![Configuration profile scope screenshot](images/MDATP_18_ConfigurationProfilesScope.png) - -Save the **Configuration Profile**. - -Use the **Logs** tab to monitor deployment status for each enrolled machine. - -#### Package -1. Create a package in **Settings > Computer Management > Packages**. - - ![Computer management packages screenshot](images/MDATP_19_MicrosoftDefenderWDAVPKG.png) - -2. Upload wdav.pkg to the Distribution Point. -3. In the **filename** field, enter the name of the package. For example, wdav.pkg. - -#### Policy -Your policy should contain a single package for Microsoft Defender. - -![Microsoft Defender packages screenshot](images/MDATP_20_MicrosoftDefenderPackages.png) - -Configure the appropriate scope to specify the computers that will receive this policy. - -After you save the Configuration Profile, you can use the Logs tab to monitor the deployment status for each enrolled machine. - -### Client machine setup -You need no special provisioning for a macOS computer beyond the standard JAMF Enrollment. - -> [!NOTE] -> After a computer is enrolled, it will show up in the Computers inventory (All Computers). - -1. Open the machine details, from **General** tab, and make sure that **User Approved MDM** is set to **Yes**. If it's set to No, the user needs to open **System Preferences > Profiles** and select **Approve** on the MDM Profile. - -![MDM approve button screenshot](images/MDATP_21_MDMProfile1.png) -![MDM screenshot](images/MDATP_22_MDMProfileApproved.png) - -After some time, the machine's User Approved MDM status will change to Yes. - -![MDM status screenshot](images/MDATP_23_MDMStatus.png) - -You can enroll additional machines now. Optionally, can do it after system configuration and application packages are provisioned. - -### Deployment -Enrolled client machines periodically poll the JAMF Server and install new configuration profiles and policies as soon as they are detected. - -#### Status on server -You can monitor the deployment status in the Logs tab: - - **Pending** means that the deployment is scheduled but has not yet happened - - **Completed** means that the deployment succeeded and is no longer scheduled - -![Status on server screenshot](images/MDATP_24_StatusOnServer.png) - - -#### Status on client machine -After the Configuration Profile is deployed, you'll see the profile on the machine in the **System Preferences > Profiles >** Name of Configuration Profile. - -![Status on client screenshot](images/MDATP_25_StatusOnClient.png) - -After the policy is applied, you'll see the Microsoft Defender icon in the macOS status bar in the top-right corner. - -![Microsoft Defender icon in status bar screenshot](images/MDATP_Icon_Bar.png) - -You can monitor policy installation on a machine by following the JAMF's log file: - -``` -mavel-mojave:~ testuser$ tail -f /var/log/jamf.log -Thu Feb 21 11:11:41 mavel-mojave jamf[7960]: No patch policies were found. -Thu Feb 21 11:16:41 mavel-mojave jamf[8051]: Checking for policies triggered by "recurring check-in" for user "testuser"... -Thu Feb 21 11:16:43 mavel-mojave jamf[8051]: Executing Policy WDAV -Thu Feb 21 11:17:02 mavel-mojave jamf[8051]: Installing Microsoft Defender... -Thu Feb 21 11:17:23 mavel-mojave jamf[8051]: Successfully installed Microsoft Defender. -Thu Feb 21 11:17:23 mavel-mojave jamf[8051]: Checking for patches... -Thu Feb 21 11:17:23 mavel-mojave jamf[8051]: No patch policies were found. -``` - -You can also check the onboarding status: -``` -mavel-mojave:~ testuser$ sudo /Library/Extensions/wdavkext.kext/Contents/Resources/Tools/wdavconfig.py -uuid : 69EDB575-22E1-53E1-83B8-2E1AB1E410A6 -orgid : 79109c9d-83bb-4f3e-9152-8d75ee59ae22 -orgid managed : 79109c9d-83bb-4f3e-9152-8d75ee59ae22 -orgid effective : 79109c9d-83bb-4f3e-9152-8d75ee59ae22 -``` - -- **orgid/orgid managed**: This is the Microsoft Defender ATP org id specified in the configuration profile. If this value is blank, then the Configuration Profile was not properly set. - -- **orgid effective**: This is the Microsoft Defender ATP org id currently in use. If it does not match the value in the Configuration Profile, then the configuration has not been refreshed. - -### Uninstalling Microsoft Defender ATP for Mac -#### Uninstalling with a script - -Create a script in **Settings > Computer Management > Scripts**. - -![Microsoft Defender uninstall screenshot](images/MDATP_26_Uninstall.png) - -For example, this script removes Microsoft Defender ATP from the /Applications directory: - -``` -echo "Is WDAV installed?" -ls -ld '/Applications/Microsoft Defender ATP.app' 2>/dev/null - -echo "Uninstalling WDAV..." -rm -rf '/Applications/Microsoft Defender ATP.app' - -echo "Is WDAV still installed?" -ls -ld '/Applications/Microsoft Defender ATP.app' 2>/dev/null - -echo "Done!" -``` - -#### Uninstalling with a policy -Your policy should contain a single script: - -![Microsoft Defender uninstall script screenshot](images/MDATP_27_UninstallScript.png) - -Configure the appropriate scope in the **Scope** tab to specify the machines that will receive this policy. - -### Check onboarding status - -You can check that machines are correctly onboarded by creating a script. For example, the following script checks that enrolled machines are onboarded: - -``` -sudo /Library/Extensions/wdavkext.kext/Contents/Resources/Tools/wdavconfig.py | grep -E 'orgid effective : [-a-zA-Z0-9]+' -``` - -This script returns 0 if Microsoft Defender ATP is registered with the Windows Defender ATP service, and another exit code if it is not installed or registered. - -## Manual deployment - -### Download installation and onboarding packages -Download the installation and onboarding packages from Windows Defender Security Center: -1. In Windows Defender Security Center, go to **Settings > Machine Management > Onboarding**. -2. In Section 1 of the page, set operating system to **Linux, macOS, iOS or Android** and Deployment method to **Local script**. -3. In Section 2 of the page, select **Download installation package**. Save it as wdav.pkg to a local directory. -4. In Section 2 of the page, select **Download onboarding package**. Save it as WindowsDefenderATPOnboardingPackage.zip to the same directory. - - ![Windows Defender Security Center screenshot](images/MDATP_2_IntuneAppUtil.png) - -5. From a command prompt, verify that you have the two files. - Extract the contents of the .zip files: - - ``` - mavel-macmini:Downloads test$ ls -l - total 721152 - -rw-r--r-- 1 test staff 6185 Mar 15 10:45 WindowsDefenderATPOnboardingPackage.zip - -rw-r--r-- 1 test staff 354531845 Mar 13 08:57 wdav.pkg - mavel-macmini:Downloads test$ unzip WindowsDefenderATPOnboardingPackage.zip - Archive: WindowsDefenderATPOnboardingPackage.zip - inflating: WindowsDefenderATPOnboarding.py - ``` - -### Application installation -To complete this process, you must have admin privileges on the machine. - -1. Navigate to the downloaded wdav.pkg in Finder and open it. - - ![App install screenshot](images/MDATP_28_AppInstall.png) - -2. Select **Continue**, agree with the License terms, and enter the password when prompted. - - ![App install screenshot](images/MDATP_29_AppInstallLogin.png) - - > [!IMPORTANT] - > You will be prompted to allow a driver from Microsoft to be installed (either "System Exception Blocked" or "Installation is on hold" or both. The driver must be allowed to be installed. - - ![App install screenshot](images/MDATP_30_SystemExtension.png) - -3. Select **Open Security Preferences** or **Open System Preferences > Security & Privacy**. Select **Allow**: - - ![Security and privacy window screenshot](images/MDATP_31_SecurityPrivacySettings.png) - - -The installation will proceed. - -> [!NOTE] -> If you don't select **Allow**, the installation will fail after 5 minutes. You can restart it again at any time. - -### Client configuration -1. Copy wdav.pkg and WindowsDefenderATPOnboarding.py to the machine where you deploy Microsoft Defender ATP for Mac. - - The client machine is not associated with orgId. Note that the orgid is blank. - - ``` - mavel-mojave:wdavconfig testuser$ sudo /Library/Extensions/wdavkext.kext/Contents/Resources/Tools/wdavconfig.py - uuid : 69EDB575-22E1-53E1-83B8-2E1AB1E410A6 - orgid : - ``` -2. Install the configuration file on a client machine: - - ``` - mavel-mojave:wdavconfig testuser$ python WindowsDefenderATPOnboarding.py - Generating /Library/Application Support/Microsoft/Defender/com.microsoft.wdav.atp.plist ... (You may be required to enter sudos password) - ``` - -3. Verify that the machine is now associated with orgId: - - ``` - mavel-mojave:wdavconfig testuser$ sudo /Library/Extensions/wdavkext.kext/Contents/Resources/Tools/wdavconfig.py - uuid : 69EDB575-22E1-53E1-83B8-2E1AB1E410A6 - orgid : E6875323-A6C0-4C60-87AD-114BBE7439B8 - ``` -After installation, you'll see the Microsoft Defender icon in the macOS status bar in the top-right corner. - - ![Microsoft Defender icon in status bar screenshot](images/MDATP_Icon_Bar.png) - -## Uninstallation -### Removing Microsoft Defender ATP from Mac devices -To remove Microsoft Defender ATP from your macOS devices: - -- Open **Finder > Applications**. Right click on **Microsoft Defender ATP > Move to Trash**. - -Or, from a command line: - -- ```sudo rm -rf '/Applications/Microsoft Defender ATP'``` - -## Known issues -- Microsoft Defender ATP is not yet optimized for performance or disk space. -- Centrally managed uninstall using Intune is still in development. To uninstall (as a workaround) a manual uninstall action has to be completed on each client device). -- Geo preference for telemetry traffic is not yet supported. Cloud traffic (definition updates) routed to US only. -- Full Windows Defender ATP integration is not yet available -- Not localized yet -- There might be accessibility issues - -## Collecting diagnostic information -If you can reproduce a problem, please increase the logging level, run the system for some time, and restore the logging level to the default. - -1) Increase logging level: -``` - mavel-mojave:~ testuser$ mdatp log-level --verbose - Creating connection to daemon - Connection established - Operation succeeded -``` - -2) Reproduce the problem - -3) Run `mdatp --diagnostic` to backup Defender ATP's logs. The command will print out location with generated zip file. - - ``` - mavel-mojave:~ testuser$ mdatp --diagnostic - Creating connection to daemon - Connection established - "/Library/Application Support/Microsoft/Defender/wdavdiag/d85e7032-adf8-434a-95aa-ad1d450b9a2f.zip" - ``` - -4) Restore logging level: -``` - mavel-mojave:~ testuser$ mdatp log-level --info - Creating connection to daemon - Connection established - Operation succeeded -``` - - -### Installation issues -If an error occurs during installation, the installer will only report a general failure. The detailed log is saved to /Library/Logs/Microsoft/wdav.install.log. If you experience issues during installation, send us this file so we can help diagnose the cause. +For further information on logging, uninstalling, the ATP portal, or known issues, see our [Resources](microsoft-defender-atp-mac-resources) page. \ No newline at end of file From a4025fa754257dd9793a122d3f19697b39a7ea35 Mon Sep 17 00:00:00 2001 From: Justin Hall Date: Tue, 7 May 2019 10:28:24 -0700 Subject: [PATCH 377/724] Update create-wip-policy-using-intune-azure.md --- .../create-wip-policy-using-intune-azure.md | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/windows/security/information-protection/windows-information-protection/create-wip-policy-using-intune-azure.md b/windows/security/information-protection/windows-information-protection/create-wip-policy-using-intune-azure.md index 2a82682a3c..4932416954 100644 --- a/windows/security/information-protection/windows-information-protection/create-wip-policy-using-intune-azure.md +++ b/windows/security/information-protection/windows-information-protection/create-wip-policy-using-intune-azure.md @@ -39,7 +39,7 @@ You can create an app protection policy in Intune either with device enrollment ## Prerequisites -Before you can create a WIP policy using Intune, you need to configure an MDM or MAM provider in Azure Active Directory (Azure AD). MAM requires an [Azure Active Direcory (Azure AD) Premium license](https://docs.microsoft.com/azure/active-directory/fundamentals/active-directory-whatis#what-are-the-azure-ad-licenses). An Azure AD Premium license is also required for WIP auto-recovery, where a device can re-enroll and re-gain access to protected data. WIP auto-recovery depends on Azure AD registration to back up the encryption keys, which requires device auto-enrollment with MDM. +Before you can create a WIP policy using Intune, you need to configure an MDM or MAM provider in Azure Active Directory (Azure AD). MAM requires an [Azure Active Direcory (Azure AD) Premium license](https://docs.microsoft.com/azure/active-directory/fundamentals/active-directory-whatis#what-are-the-azure-ad-licenses). An Azure AD Premium license is also required for WIP auto-recovery, where a device can re-enroll and re-gain access to protected data. WIP auto-recovery relies on Azure AD registration to back up the encryption keys, which requires device auto-enrollment with MDM. ## Configure the MDM or MAM provider From 2030a9ecb3b02798520ad9ab94dff4ee5f08527a Mon Sep 17 00:00:00 2001 From: Joey Caparas Date: Tue, 7 May 2019 10:35:07 -0700 Subject: [PATCH 378/724] check in preview content --- ...ows-defender-advanced-threat-protection.md | 33 +++++++++++-- .../whats-new-in-windows-defender-atp.md | 46 ++----------------- 2 files changed, 34 insertions(+), 45 deletions(-) diff --git a/windows/security/threat-protection/windows-defender-atp/preview-windows-defender-advanced-threat-protection.md b/windows/security/threat-protection/windows-defender-atp/preview-windows-defender-advanced-threat-protection.md index 934fbed168..c715722f19 100644 --- a/windows/security/threat-protection/windows-defender-atp/preview-windows-defender-advanced-threat-protection.md +++ b/windows/security/threat-protection/windows-defender-atp/preview-windows-defender-advanced-threat-protection.md @@ -23,7 +23,6 @@ ms.topic: conceptual - [Windows Defender Advanced Threat Protection (Windows Defender ATP)](https://go.microsoft.com/fwlink/p/?linkid=2069559) - The Windows Defender ATP service is constantly being updated to include new feature enhancements and capabilities. >Want to experience Windows Defender ATP? [Sign up for a free trial.](https://www.microsoft.com/WindowsForBusiness/windows-atp?ocid=docs-wdatp-preview-abovefoldlink) @@ -31,8 +30,9 @@ The Windows Defender ATP service is constantly being updated to include new feat Learn about new features in the Windows Defender ATP preview release and be among the first to try upcoming features by turning on the preview experience. -For more information on capabilities that are generally available or in preview, see [What's new in Windows Defender](https://docs.microsoft.com/windows/security/threat-protection/windows-defender-atp/whats-new-in-windows-defender-atp). -) +For more information on capabilities that are generally available, see [What's new in Windows Defender](https://docs.microsoft.com/windows/security/threat-protection/windows-defender-atp/whats-new-in-windows-defender-atp). + + ## Turn on preview features You'll have access to upcoming features which you can provide feedback on to help improve the overall experience before features are generally available. @@ -43,6 +43,33 @@ Turn on the preview experience setting to be among the first to try upcoming fea 2. Toggle the setting between **On** and **Off** and select **Save preferences**. +## Preview features +The following features are included in the preview release: + +- [Threat & Vulnerability Management](https://docs.microsoft.com/windows/security/threat-protection/windows-defender-atp/next-gen-threat-and-vuln-mgt)
A new built-in capability that uses a risk-based approach to the discovery, prioritization, and remediation of endpoint vulnerabilities and misconfigurations. + +- [Interoperability](https://docs.microsoft.com/windows/security/threat-protection/partner-applications)
Microsoft Defender ATP supports third-party applications to help enhance the detection, investigation, and threat intelligence capabilities of the platform. + +- [Machine health and compliance report](https://docs.microsoft.com/windows/security/threat-protection/windows-defender-atp/machine-reports-windows-defender-advanced-threat-protection) The machine health and compliance report provides high-level information about the devices in your organization. + +- [Information protection](https://docs.microsoft.com/en-us/windows/security/threat-protection/windows-defender-atp/information-protection-in-windows-overview)
+Information protection is an integral part of Microsoft 365 Enterprise suite, providing intelligent protection to keep sensitive data secure while enabling productivity in the workplace. +Windows Defender ATP is seamlessly integrated in Microsoft Threat Protection to provide a complete and comprehensive data loss prevention (DLP) solution for Windows devices. + + >[!NOTE] + >Partially available from Windows 10, version 1809. + +- [Integration with Microsoft Cloud App Security](https://docs.microsoft.com/windows/security/threat-protection/windows-defender-atp/microsoft-cloud-app-security-integration)
Microsoft Cloud App Security leverages Windows Defender ATP endpoint signals to allow direct visibility into cloud application usage including the use of unsupported cloud services (shadow IT) from all Windows Defender ATP monitored machines. + + >[!NOTE] + >Available from Windows 10, version 1809 or later. + +- [Onboard Windows Server 2019](https://docs.microsoft.com/windows/security/threat-protection/windows-defender-atp/configure-server-endpoints-windows-defender-advanced-threat-protection#windows-server-version-1803-and-windows-server-2019)
Windows Defender ATP now adds support for Windows Server 2019. You'll be able to onboard Windows Server 2019 in the same method available for Windows 10 client machines. + +- [Power BI reports using Windows Defender ATP data](powerbi-reports-windows-defender-advanced-threat-protection.md)
+Windows Defender ATP makes it easy to create a Power BI dashboard by providing an option straight from the portal. + + >Want to experience Windows Defender ATP? [Sign up for a free trial.](https://www.microsoft.com/en-us/WindowsForBusiness/windows-atp?ocid=docs-wdatp-preview-belowfoldlink) diff --git a/windows/security/threat-protection/windows-defender-atp/whats-new-in-windows-defender-atp.md b/windows/security/threat-protection/windows-defender-atp/whats-new-in-windows-defender-atp.md index 8ce696c455..c5d340e5c1 100644 --- a/windows/security/threat-protection/windows-defender-atp/whats-new-in-windows-defender-atp.md +++ b/windows/security/threat-protection/windows-defender-atp/whats-new-in-windows-defender-atp.md @@ -21,10 +21,12 @@ ms.topic: conceptual **Applies to:** - [Windows Defender Advanced Threat Protection (Windows Defender ATP)](https://go.microsoft.com/fwlink/p/?linkid=2069559) -Here are the new features in the latest release of Windows Defender ATP as well as security features in Windows 10 and Windows Server. +Here are the new features that are generally available (GA) in the latest release of Windows Defender ATP as well as security features in Windows 10 and Windows Server. + + +For more information preview features, see [Preview features](https://docs.microsoft.com/windows/security/threat-protection/windows-defender-atp/preview-windows-defender-advanced-threat-protection). ## May 2019 -The following capability is generally available (GA). - [Threat protection reports](https://docs.microsoft.com/windows/security/threat-protection/windows-defender-atp/threat-protection-reports-windows-defender-advanced-threat-protection)
The threat protection report provides high-level information about alerts generated in your organization. @@ -33,37 +35,19 @@ The following capability is generally available (GA). ## April 2019 -The following capability is generally available (GA). - - [Microsoft Threat Experts Targeted Attack Notification capability](https://docs.microsoft.com/en-us/windows/security/threat-protection/windows-defender-atp/microsoft-threat-experts#targeted-attack-notification)
Microsoft Threat Experts' Targeted Attack Notification alerts are tailored to organizations to provide as much information as can be quickly delivered thus bringing attention to critical threats in their network, including the timeline, scope of breach, and the methods of intrusion. - [Microsoft Defender ATP API](https://docs.microsoft.com/windows/security/threat-protection/windows-defender-atp/use-apis)
Microsoft Defender ATP exposes much of its data and actions through a set of programmatic APIs. Those APIs will enable you to automate workflows and innovate based on Windows Defender ATP capabilities. -### In preview -The following capabilities are included in the April 2019 preview release. - -- [Threat & Vulnerability Management](https://docs.microsoft.com/windows/security/threat-protection/windows-defender-atp/next-gen-threat-and-vuln-mgt)
A new built-in capability that uses a risk-based approach to the discovery, prioritization, and remediation of endpoint vulnerabilities and misconfigurations. - -- [Interoperability](https://docs.microsoft.com/windows/security/threat-protection/partner-applications)
Microsoft Defender ATP supports third-party applications to help enhance the detection, investigation, and threat intelligence capabilities of the platform. - -## March 2019 -### In preview -The following capability are included in the March 2019 preview release. - -- [Machine health and compliance report](https://docs.microsoft.com/windows/security/threat-protection/windows-defender-atp/machine-reports-windows-defender-advanced-threat-protection) The machine health and compliance report provides high-level information about the devices in your organization. - ## February 2019 -The following capabilities are generally available (GA). - [Incidents](https://docs.microsoft.com/windows/security/threat-protection/windows-defender-atp/incidents-queue)
Incident is a new entity in Windows Defender ATP that brings together all relevant alerts and related entities to narrate the broader attack story, giving analysts better perspective on the purview of complex threats. - [Onboard previous versions of Windows](https://docs.microsoft.com/windows/security/threat-protection/windows-defender-atp/onboard-downlevel-windows-defender-advanced-threat-protection)
Onboard supported versions of Windows machines so that they can send sensor data to the Windows Defender ATP sensor. ## October 2018 -The following capabilities are generally available (GA). - - [Attack surface reduction rules](https://docs.microsoft.com/windows/security/threat-protection/windows-defender-exploit-guard/attack-surface-reduction-exploit-guard)
All Attack surface reduction rules are now supported on Windows Server 2019. - [Controlled folder access](https://docs.microsoft.com/windows/security/threat-protection/windows-defender-exploit-guard/enable-controlled-folders-exploit-guard)
Controlled folder access is now supported on Windows Server 2019. @@ -91,28 +75,6 @@ Threat Analytics is a set of interactive reports published by the Windows Defend - [Configure CPU priority settings](https://docs.microsoft.com/windows/security/threat-protection/windows-defender-antivirus/configure-advanced-scan-types-windows-defender-antivirus) for Windows Defender Antivirus scans. -### In preview -The following capabilities are included in the October 2018 preview release. - -For more information on how to turn on preview features, see [Preview features](https://docs.microsoft.com/windows/security/threat-protection/windows-defender-atp/preview-windows-defender-advanced-threat-protection). - -- [Information protection](https://docs.microsoft.com/en-us/windows/security/threat-protection/windows-defender-atp/information-protection-in-windows-overview)
-Information protection is an integral part of Microsoft 365 Enterprise suite, providing intelligent protection to keep sensitive data secure while enabling productivity in the workplace. -Windows Defender ATP is seamlessly integrated in Microsoft Threat Protection to provide a complete and comprehensive data loss prevention (DLP) solution for Windows devices. - - >[!NOTE] - >Partially available from Windows 10, version 1809. - -- [Integration with Microsoft Cloud App Security](https://docs.microsoft.com/windows/security/threat-protection/windows-defender-atp/microsoft-cloud-app-security-integration)
Microsoft Cloud App Security leverages Windows Defender ATP endpoint signals to allow direct visibility into cloud application usage including the use of unsupported cloud services (shadow IT) from all Windows Defender ATP monitored machines. - - >[!NOTE] - >Available from Windows 10, version 1809 or later. - -- [Onboard Windows Server 2019](https://docs.microsoft.com/windows/security/threat-protection/windows-defender-atp/configure-server-endpoints-windows-defender-advanced-threat-protection#windows-server-version-1803-and-windows-server-2019)
Windows Defender ATP now adds support for Windows Server 2019. You'll be able to onboard Windows Server 2019 in the same method available for Windows 10 client machines. - -- [Power BI reports using Windows Defender ATP data](powerbi-reports-windows-defender-advanced-threat-protection.md)
-Windows Defender ATP makes it easy to create a Power BI dashboard by providing an option straight from the portal. - ## March 2018 - [Advanced Hunting](https://docs.microsoft.com/windows/security/threat-protection/windows-defender-atp/advanced-hunting-windows-defender-advanced-threat-protection)
From 6d03ea32eccd0c8b4de454637a0acbf7a121484f Mon Sep 17 00:00:00 2001 From: martyav Date: Tue, 7 May 2019 13:49:15 -0400 Subject: [PATCH 379/724] removed language codes from urls --- .../tpm/trusted-platform-module-overview.md | 8 ++++---- 1 file changed, 4 insertions(+), 4 deletions(-) diff --git a/windows/security/information-protection/tpm/trusted-platform-module-overview.md b/windows/security/information-protection/tpm/trusted-platform-module-overview.md index 263963d4db..2892caba58 100644 --- a/windows/security/information-protection/tpm/trusted-platform-module-overview.md +++ b/windows/security/information-protection/tpm/trusted-platform-module-overview.md @@ -88,11 +88,11 @@ Some things that you can check on the device are: - [Trusted Platform Module](trusted-platform-module-top-node.md) (list of topics) - [Details on the TPM standard](https://www.microsoft.com/en-us/research/project/the-trusted-platform-module-tpm/) (has links to features using TPM) -- [TPM Base Services Portal](https://docs.microsoft.com/en-us/windows/desktop/TBS/tpm-base-services-portal) -- [TPM Base Services API](https://docs.microsoft.com/en-us/windows/desktop/api/_tbs/) +- [TPM Base Services Portal](https://docs.microsoft.com/windows/desktop/TBS/tpm-base-services-portal) +- [TPM Base Services API](https://docs.microsoft.com/windows/desktop/api/_tbs/) - [TPM Cmdlets in Windows PowerShell](https://docs.microsoft.com/powershell/module/trustedplatformmodule) - [Prepare your organization for BitLocker: Planning and Policies - TPM configurations](https://docs.microsoft.com/windows/security/information-protection/bitlocker/prepare-your-organization-for-bitlocker-planning-and-policies#bkmk-tpmconfigurations) -- [Azure device provisioning: Identity attestation with TPM](https://azure.microsoft.com/en-us/blog/device-provisioning-identity-attestation-with-tpm/) -- [Azure device provisioning: A manufacturing timeline for TPM devices](https://azure.microsoft.com/en-us/blog/device-provisioning-a-manufacturing-timeline-for-tpm-devices/) +- [Azure device provisioning: Identity attestation with TPM](https://azure.microsoft.com/blog/device-provisioning-identity-attestation-with-tpm/) +- [Azure device provisioning: A manufacturing timeline for TPM devices](https://azure.microsoft.com/blog/device-provisioning-a-manufacturing-timeline-for-tpm-devices/) - [Windows 10: Enabling vTPM (Virtual TPM)](https://social.technet.microsoft.com/wiki/contents/articles/34431.windows-10-enabling-vtpm-virtual-tpm.aspx) - [How to Multiboot with Bitlocker, TPM, and a Non-Windows OS](https://social.technet.microsoft.com/wiki/contents/articles/9528.how-to-multiboot-with-bitlocker-tpm-and-a-non-windows-os.aspx) \ No newline at end of file From 73d487b39303c6ead5a2e35423f581d895d543f4 Mon Sep 17 00:00:00 2001 From: Justin Hall Date: Tue, 7 May 2019 11:22:51 -0700 Subject: [PATCH 380/724] Update create-wip-policy-using-intune-azure.md --- .../create-wip-policy-using-intune-azure.md | 23 +++++-------------- 1 file changed, 6 insertions(+), 17 deletions(-) diff --git a/windows/security/information-protection/windows-information-protection/create-wip-policy-using-intune-azure.md b/windows/security/information-protection/windows-information-protection/create-wip-policy-using-intune-azure.md index 2a82682a3c..6bd2b66834 100644 --- a/windows/security/information-protection/windows-information-protection/create-wip-policy-using-intune-azure.md +++ b/windows/security/information-protection/windows-information-protection/create-wip-policy-using-intune-azure.md @@ -11,7 +11,7 @@ manager: dansimp audience: ITPro ms.collection: M365-security-compliance ms.topic: conceptual -ms.date: 04/29/2019 +ms.date: 05/07/2019 --- # Create a Windows Information Protection (WIP) policy using the Azure portal for Microsoft Intune @@ -586,13 +586,13 @@ After you've decided where your protected apps can access enterprise data on you - **On.** Allows the Windows Information Protection icon overlay to appear on corporate files in the Save As and File Explorer views. Additionally, for unenlightened but protected apps, the icon overlay also appears on the app tile and with Managed text on the app name in the **Start** menu. - - **Off, or not configured (recommended).** Stops the Windows Information Protection icon overlay from appearing on corporate files or unenlightened, but protected apps. Not configured is the default option. + - **Off, or not configured (recommended).** Stops the Windows Information Protection icon overlay from appearing on corporate files or unenlightened, but protected apps. Not configured is the default option. - - **Use Azure RMS for WIP.** Determines whether to use Azure Rights Management encryption with Windows Information Protection. + - **Use Azure RMS for WIP.** Determines whether WIP encrypts [Microsoft Azure Rights Management](https://products.office.com/business/microsoft-azure-rights-management) Files that are copied from Windows 10 to USB or other removable drives so they can be securely shared amongst employees. You must already have Azure Rights Management set up. The RMS template is only applied to the files on removable media, and is only used for access control—it doesn’t actually apply Azure Information Protection to the files. - - **On.** Starts using Azure Rights Management encryption with WIP. By turning this option on, you can also add a TemplateID GUID to specify who can access the Azure Rights Management protected files, and for how long. For more info about setting up Azure Rights management and using a template ID with WIP, see the [Choose to set up Azure Rights Management with WIP](#choose-to-set-up-azure-rights-management-with-wip) section of this topic. + - **On.** Starts protecting Azure Rights Management files that are copied to a removable drive. You can also add a TemplateID GUID to specify who can access the Azure Rights Management protected files, and for how long. Curly braces -- {} -- are required around the RMS Template ID. The EFS file uses the key from the RMS template’s license to protect the EFS file encryption key. Only users with access to that template will be able to read it off of the USB. If you don’t specify a template, it’s a regular EFS file using a default RMS template that everyone in the tenant will have access to. - - **Off, or not configured.** Stops using Azure Rights Management encryption with WIP. + - **Off, or not configured.** Stops WIP from encrypting Azure Rights Management files that are copied to a removable drive. - **Allow Windows Search Indexer to search encrypted files.** Determines whether to allow the Windows Search Indexer to index items that are encrypted, such as WIP protected files. @@ -600,18 +600,7 @@ After you've decided where your protected apps can access enterprise data on you - **Off, or not configured.** Stops Windows Search Indexer from indexing encrypted files. -## Choose to set up Azure Rights Management with WIP -WIP can integrate with Microsoft Azure Rights Management to enable secure sharing of files by using removable drives such as USB drives. For more info about Azure Rights Management, see [Microsoft Azure Rights Management](https://products.office.com/business/microsoft-azure-rights-management). To integrate Azure Rights Management with WIP, you must already have Azure Rights Management set up. - -To configure WIP to use Azure Rights Management, you must set the **AllowAzureRMSForEDP** MDM setting to **1** in Microsoft Intune. This setting tells WIP to encrypt files copied to removable drives with Azure Rights Management, so they can be shared amongst your employees on computers running at least Windows 10, version 1703. - -Optionally, if you don’t want everyone in your organization to be able to share your enterprise data, you can set the **RMSTemplateIDForEDP** MDM setting to the **TemplateID** of the Azure Rights Management template used to encrypt the data. You must make sure to mark the template with the **EditRightsData** option. This template will be applied to the protected data that is copied to a removable drive. - ->[!IMPORTANT] ->Curly braces -- {} -- are required around the RMS Template ID. - ->[!NOTE] ->For more info about setting the **AllowAzureRMSForEDP** and the **RMSTemplateIDForEDP** MDM settings, see the [EnterpriseDataProtection CSP](https://msdn.microsoft.com/windows/hardware/commercialize/customize/mdm/enterprisedataprotection-csp) topic. For more info about setting up and using a custom template, see [Configuring custom templates for the Azure Rights Management service](https://docs.microsoft.com/information-protection/deploy-use/configure-custom-templates) topic. +For more info about setting up and using a custom template, see [Configuring custom templates for the Azure Rights Management service](https://docs.microsoft.com/information-protection/deploy-use/configure-custom-templates). WIP can also integrate with AZure RMS by using the **AllowAzureRMSForEDP** and the **RMSTemplateIDForEDP** MDM settings in the [EnterpriseDataProtection CSP](https://msdn.microsoft.com/windows/hardware/commercialize/customize/mdm/enterprisedataprotection-csp). ## Related topics From e1b9bbfcb64415bef191d7de0a0331f69d378f89 Mon Sep 17 00:00:00 2001 From: Joey Caparas Date: Tue, 7 May 2019 11:43:47 -0700 Subject: [PATCH 381/724] move partners to ga --- .../whats-new-in-windows-defender-atp.md | 8 +++++--- 1 file changed, 5 insertions(+), 3 deletions(-) diff --git a/windows/security/threat-protection/windows-defender-atp/whats-new-in-windows-defender-atp.md b/windows/security/threat-protection/windows-defender-atp/whats-new-in-windows-defender-atp.md index 8ce696c455..5b725db23e 100644 --- a/windows/security/threat-protection/windows-defender-atp/whats-new-in-windows-defender-atp.md +++ b/windows/security/threat-protection/windows-defender-atp/whats-new-in-windows-defender-atp.md @@ -31,6 +31,8 @@ The following capability is generally available (GA). - [Microsoft Threat Experts](https://docs.microsoft.com/windows/security/threat-protection/windows-defender-atp/microsoft-threat-experts)
Microsoft Threat Experts is the new managed threat hunting service in Windows Defender ATP that provides proactive hunting, prioritization, and additional context and insights that further empower security operations centers (SOCs) to identify and respond to threats quickly and accurately. It provides additional layer of expertise and optics that Microsoft customers can utilize to augment security operation capabilities as part of Microsoft 365. +- [Interoperability](https://docs.microsoft.com/windows/security/threat-protection/windows-defender-atp/partner-applications)
Microsoft Defender ATP supports third-party applications to help enhance the detection, investigation, and threat intelligence capabilities of the platform. + ## April 2019 The following capability is generally available (GA). @@ -41,15 +43,15 @@ The following capability is generally available (GA). ### In preview -The following capabilities are included in the April 2019 preview release. +The following capability is included in the April 2019 preview release. - [Threat & Vulnerability Management](https://docs.microsoft.com/windows/security/threat-protection/windows-defender-atp/next-gen-threat-and-vuln-mgt)
A new built-in capability that uses a risk-based approach to the discovery, prioritization, and remediation of endpoint vulnerabilities and misconfigurations. -- [Interoperability](https://docs.microsoft.com/windows/security/threat-protection/partner-applications)
Microsoft Defender ATP supports third-party applications to help enhance the detection, investigation, and threat intelligence capabilities of the platform. + ## March 2019 ### In preview -The following capability are included in the March 2019 preview release. +The following capability is included in the March 2019 preview release. - [Machine health and compliance report](https://docs.microsoft.com/windows/security/threat-protection/windows-defender-atp/machine-reports-windows-defender-advanced-threat-protection) The machine health and compliance report provides high-level information about the devices in your organization. From b9be7905f38301508a50fd86b724ef14308ac73d Mon Sep 17 00:00:00 2001 From: Justin Hall Date: Tue, 7 May 2019 12:02:56 -0700 Subject: [PATCH 382/724] --- .../create-wip-policy-using-intune-azure.md | 8 +++++++- .../images/wip-encrypted-file-extensions.png | Bin 0 -> 10846 bytes 2 files changed, 7 insertions(+), 1 deletion(-) create mode 100644 windows/security/information-protection/windows-information-protection/images/wip-encrypted-file-extensions.png diff --git a/windows/security/information-protection/windows-information-protection/create-wip-policy-using-intune-azure.md b/windows/security/information-protection/windows-information-protection/create-wip-policy-using-intune-azure.md index 6bd2b66834..9701e21082 100644 --- a/windows/security/information-protection/windows-information-protection/create-wip-policy-using-intune-azure.md +++ b/windows/security/information-protection/windows-information-protection/create-wip-policy-using-intune-azure.md @@ -403,7 +403,7 @@ Starting with Windows 10, version 1703, Intune automatically determines your cor ![Add protected domains](images/add-protected-domains.png) ## Choose where apps can access enterprise data -After you've added a protection mode to your apps, you'll need to decide where those apps can access enterprise data on your network. Every WIP policy should include policy that defines your enterprise network locations. +After you've added a protection mode to your apps, you'll need to decide where those apps can access enterprise data on your network. Every WIP policy should include your enterprise network locations. There are no default locations included with WIP, you must add each of your network locations. This area applies to any network endpoint device that gets an IP address in your enterprise’s range and is also bound to one of your enterprise domains, including SMB shares. Local file system locations should just maintain encryption (for example, on local NTFS, FAT, ExFAT). @@ -602,6 +602,12 @@ After you've decided where your protected apps can access enterprise data on you For more info about setting up and using a custom template, see [Configuring custom templates for the Azure Rights Management service](https://docs.microsoft.com/information-protection/deploy-use/configure-custom-templates). WIP can also integrate with AZure RMS by using the **AllowAzureRMSForEDP** and the **RMSTemplateIDForEDP** MDM settings in the [EnterpriseDataProtection CSP](https://msdn.microsoft.com/windows/hardware/commercialize/customize/mdm/enterprisedataprotection-csp). +## Encrypted file extensions + +You can restrict which files are protected by WIP when they are downloaded from an SMB share within your enterprise network locations. When this policy is not specified, the existing auto-encryption behavior is applied. When this policy is configured, only files with the extensions in the list will be encrypted. + +![WIP encrypted file extensions](images/wip-encrypted-file-extensions.png) + ## Related topics - [How to collect Windows Information Protection (WIP) audit event logs](collect-wip-audit-event-logs.md) diff --git a/windows/security/information-protection/windows-information-protection/images/wip-encrypted-file-extensions.png b/windows/security/information-protection/windows-information-protection/images/wip-encrypted-file-extensions.png new file mode 100644 index 0000000000000000000000000000000000000000..1a0ec5397d87e4b1f8af36ddd7fa49b20a528a64 GIT binary patch literal 10846 zcmc(FXH*ky+iegLMZtm;saB9K0@4Wz2uO*P(3>JgLhn5w76hbs2t_)f2STrp6p@|~ zsubw~A+*o~XLz3Towd$;&iVDO_d7qh$;_IW`?|}u_rCT_@Jmf)S{fD_5C}x8s-mb3 z0#RNEfhcZVJa=}6uD=TSN8zHa{0vmm$3_4S&cmK+JOzQuBQ77mq5_UDIjR`CfIv4~ z&;BT;-g0_^Ks?*3icfVt&DJJOW7zS2#LY%?c|lj7brY8;8~xtP5>41ip6LSKPF3V+ zxkz}-42>YK0x}@XHX3Us?^^{+O0iPKEyDWRkJH zN?J98X?PGDcYB5rEPh}y46GP`iWr@=DLx@mhe;&}nyvtWWq_B|z0ZR{@_f!*AW(qJ z|D$afTvSg@5V{E#Py1s=PV44%_4h>cpDs+K9*u--DcDR3HB5R5pPzO`ABEksY7tYe zSL6PGaHPA3;@vloaBtS9I_;HC^-BW+`+lO=PmUG_X`UcOTtQHeM@o9?THPd9~H2 z-?iDf=F0x==6dy%Q1|JE{n9Q@=^*K9$c(bTaV$}Cg6z!T`+ajA1Kj{OP1K5=Fa0>9 z{A{BUR_}kLd23^mUdqSnAU(p>UJe?Yep+@Bu`jOVHC?;TR5(LSA8_O8uG6l6wsHB6 zr~k#KQPmAYq?=4bhSmdC zk9J}l#rDz!c9#Q)MMUmupoc#er7r~7@|9J(w`l~Korfw6lrCYP(k;YSk zrhGC98N#h!Y=vAMgbXdQmx)Y3`WRqc6w}7j5ceQ8e~U7Nv(80?lOK5S%1i(!-7v(A zmql!1XPx^umUvZv`%@KSi@buhnd;t+A?mfV@K}QlFD0A|w;pzh+}YnHk>@9%W$WjB zzTaLv~|9dV;% zF%+1&pJYzhq_D9D-LPziUy^%CMZDbVae}_$nJKVe%ey~i&e-Y! zZG}`*fsLuA=>v%+f$7$lhZ#+#SOfh{s7f2gZXCa1Xy877I!}5m-``GQy)g&fU=IqJ zIYP}ajR(5PnKlWW2fw6h9%3xwTi6n~v;U2EA3P1egs9;q(zSLw#8U7Uwp+DJNSF%m z#sodVLR{x*rcBOugFMTx!t`Y$iQBZ{WW^D!)+B_sX@(J4tDX`&V@6i=ag}FbI|>fh zYqeZHTXK~TtK{suoe!j#%p&Euqdj`N-UW>vdfCg=J49|NZkpi(C;3xEW<~J~Es5S# z=j`mt9U47{zt1-1%?y(0!`P{p`6d7E@19mG%MoB$WwAcKY(ktaD>}b zuA8VU@`ARqu5j0NOIrZ99=B2yliL>hn;-K@;=;JyYODb4v}lM8ddSMd_x+Y#-w+x5 z$|@thad$b&<+Smr<)Dy5qVT!?9{JCA4P9{cwn5e5d|`7aeq`#XMh|LKSBv^tet2NY zZCq&Hu1abE;Kiu)ol=wysT8q@y2o0KI(<{fYg_4kGRuuw zaf>L&LJ?}IQqK*aTRd*VyKaup=+?ti zT0$+0_3#_NOrQ$}c$qOH{3BaE(lY$C%RTY`(yv(IPled9d?(MW-Xtj@^HI{c5_=^V z6O{C8M1GA4?=zNBt$?6;!tOU(uXsej(O zW_8cXN&@KocTS zN5Us^^aGuz`-k-a^81laT&x;<8&9kECu+>en@Q-j<%)O1BrkX&?BvLwy!d(>zVpo*+D|C*Wj0rczH_JBh0}Z~ z<2~Me*_9S2#>(Q}k$!2(EEpB*7-x+ow$r0<9XKaxZ1fjBK}Z$>N=R^y=r{Ax_4F(jrhW$xTJR<#uwP!PxtR4ujR0z|9>U6C}aylmG-B@iMFZK%q1cer!%?lRm~_Q|dJ z0x#*4!RJ_++<06z=WoJ6)!Uq6VYw%qsB^B7@LR{h5@^zWzNxT7t)~LTokh?g=KgPO zkJj4N{NCR;RZ1v@Y|)xn_n9Bhcj^0!OHae<7MHhJ+s$*ADkL+WS1U};`-!_IK?u%LbQt+}lS`5U~w z#ww4l4(8)l3}lG{SPnEf;`YcWXQZ5Vf9U37nFOH+)^-w;uoiZP)NGas&E2Hd5FHd zxQRNn7`iBbOk4~hikRwLS^6Dz55~&}x`FUf*qby6_foA>ah2A^SL1<+rwQG&9$Yhr zGWbgG70c@RCEy!nOxxj`vy7amy>+w;*Yu1M71Yn7X}X@jG2E^tk83KSo6vzn>qlJr z$N~+6jUKku6oJ@{eGe(+u9r@DM?+s4&AFG3%Dk2Ryr2~DBr#V{uoE?cMYyfazG^!M zN=ZU?rT3bWS`4RP=d|m}bE@TG%yrcDsCo;N`xw?YrAj<71`H=AZ;xmM{p1PK5-^L! z<+u9`t$~}C=4I<_g^S!H|A~aqge|KC;MWFBppTLhu9NqMqjCuoeK`RHgZhiS02 z)LpWr>mwtSf*Z6_)ZW}%_PWFH!dqy zxWSdtG5u64JaZz=-`8UYW-Qq0lNaB?`X*h8$D!Hl$kn&OKMy)-A4gI7mO*$5xpBZM z z_Q*}MQJB`xJ>9iuuXtDKijT_284BDn68y!7pVtIdJBgC`+1@>8I}=rfG2I1WGt(69 z00gj;wn>@XC$+b7Jy2gb9h9c`$6?cZ;}}5i*Nf_^ z4^EP?z1nMiBCgV|&^=pj`c1?bOzTCcujO#WdQ%gLR~wp;0%ec3Z-H;x)!(`%=Fs2N zYLhn=h$1kRkgGxvzec@nGbd@ch8lztF!oo}x-LGsw@8YZ-Q&pqC_YXHQV=++&P5)X6pI=MY-y2W}*ni883A;_wS7RaBeSM07xmZ zcW4@Ri2Y6JfS3o1W>j`1;bL{k!%X<6s7{OYfu0K#9_4-y?m7Pwe$`p@~CG(rMU*$P{Y(pxN>`NoEA^qqt5CeVQDNOL6pAS<6V;UW3Tp&i^1!=T zRG|iM7P8c`7Q^Lgzd~t$%Rw1Tpk6LeyE4qmEz5smh%qT#x$?CRmBo^aIvHz5g^w6P zIUS+0URhAmff1Cl%pa;?tpE*MHTrv?Vss8|lDKZBli9edZZ(HvfIuK;FPwT8@)P~% zGQB5ygMJ1mj|ZBU1akT|UTnh9ASwm++r_)L$bgjQ-7h!Coadu-^D@8Kw4Gqp5@Xle z4{hB$L0@btq(RgP?2qy8r(N^)U^rGcE~}c^n!0v8$LqP!8*jm$((UtX17apbxnsf> zc>!!jHSLstv8j{>@lC*B3AZruY=aWIp=Q@wr!6>rBajmnc)DF2KND2AwSKMP`1!32 zw2_J4*AF-bOR(3wdt^oBk~4{!%1OQa^&c?_GyYplDpSD@Ro&jh$%<=$TJ<5(uMGmi z@(;I^5tTzp`rpcP9S?CmVUN53s7{+a3sYt4E5ncwGzWBj8d52i02CwK?2mvdpu$n! z20W*J-Y%hqrd&|6Ovev)&A-Hmw{MSS(lfs4ucm1@4 z_5~A{%6ivK{!@~4>QNuV!ouw7n`O3#nonVS1?y1gMl;76qLk(&#Y1ZE^H~k*!g+JS zSkvv4F!|VGlf2$HXLXY%VNRTdVq71M6MgtOF|a>+f~gKoHW-ZYPA(v$Z1Jd^iq zWA2V8F=<_&E`efNuH+t1w^Y>xglPdL_b`x?Y^T+$;l8%7SaYIcN7fzGZZoB-9bg8U%l=G=@!6)A>%R!mO2 zqF~@LCPDJ|)uZ6F1j;S)ysJ|Oo1>jE*vqvHffhdxmQy^djY^0><(o6@Q#G1J*;LV# z{)UN~6t-)Sg=cnZiz+Sv2htmBw^~Weu z*11=#JwDFliBCZgMkIQY7xkYa5>T#>kYZfc$co$B>(_iOzWlxWz-&e74Z5Q6D#GMh zyqqO(ZNLWzH-Z?^E;s#SVJ+Ye6f5k+IOw<5UH(I>zrE=wW_;A;hR+!xKUm|2e4MF2 z1dISeI-UM@xg&vSHVru`uG=x^%t+_gYpt8eCC{IJR6C6U3TMY#i4>Z(hA>tyd{1H(|4#ZZcI~K*#4Us0iCvj=xP|{o1b; zG|$YrCN^R+x0_spQ!##LpY3joA*0&4Wn>#fx$GRO_9fwYyd!FJ)0qux{ zM~#*YKY5u^xlSo1OxVfs95Zt1>5{sA@bhGm9Lgt+5#BFD3t5Ox)+Y1D4&Ij|_IwzS zv=Y@Dv9o?TM{b%k%&Ov6jda>;B^}6n9C2RV)|N6=Mv@^1iiYN;wNF*k9kySl6n-3i zOo8z{o;A(u)SJldSND!LVRR5FSxv3u-@MYflxVM58EOV$i-~S>3~>$aO6uSarNoU4$u0*yvm|44E*Cf%L>40Rm)U>ZRej;$}PzD=m3`%=B; z+MMP%G^<3&EgE^+0d1pZtah;98G0j}o*$Q$2#F<;l36QjJizhAPhA+G?cANd7ua~< zsu8`A=BlwBz$BUcl;F+4(8jvA9nwGeDw^X;E{&v)@P%Uu9;dR}jLz}%^Vf3JanNqi62Hv=Kdse zq_7I4#qaQYML}|NmO9mNw1<+11+{}AV!~EGl0p!YV^d>NqdUtKi{Ikna}0`;YhMRk z9#0m}?_{RW`Oe&O8!j2sJbcY17lXkJ_~TG@LJv&764 z=cXRCz0{wOqn02?-ocHS`#FInU~*`St<770_38of`a36U>PexaOO5~Ez>$>1;$ z6KIJYqiu_I zZ!}Z80)xYSj?d!H`a~B*kHxNj;rb|${z!FDhulpHR-sO5)5;!XrZ#3%=_Ry;{z?ot zknKo($i4=8(rb-d&`8Xdw2+<0n?2Y4U@Eg~Q}{)%pqDp1I4Nixhmw%zizg}C>0noH z+hCzRN2H-QP9bXDQQ>8~ndR{co*$z6qp$Y+Y_`@z-CEwrL`}_$JpRu{HPDbKLh#QI$CphaKt76S$&(tiwh!)Q@U40215bmU9wBbq| zcrOQ6P{l&lWS2#erpw>~8Rxk~w>XN67PyeE{}mz=6JXe$&-RG!oB=A;0EwCL*9A9v~H!ItLO4vHb^aDlv!0Gion%b1@1q2`hYG7_T>rA{`+K82w=;)mZaLX+1(Wm@gJv*slczkw=hP%&a>v;1~&-HE8 zD0Z-H{2cEP_2TTVxp3drYPSq)=a-fh?4T#8#23fiBq!e8$trUgc$4+YY{3BWPB7Qg z-e?-fukm$K=44CpI0m9eF+8~fWxQiBOn>t7Hlkyxe-W8~Ns``i%&V*o(r*mD7Qva| zlW{=rWlbmQ|0GX2!bC2G^3j!EZk+@X)otk+Va^-e&}52KhJ!gt=p2*GWTqk3{AOHD z-A|*~K9v2Sr6FYBMcyuNRFU)vml$Fv3d0I7dtyx~^EWMmKaA)+WqZNl$`TB}{;7ba zGu8dq!a|1j1IQO|T}i+9%cX*J9m@py&%mY>x?}u2~nN%v+X)*`qP< z7oFMSIDQaDsUOM8?7Gzpt-fa!i|_WHNsz~MYz`o}<3%Xs!}5NZC57QK(B~{J^I)Sg zim0t{hmx(^^2JUvA&rL#tDr|u=ha){tc8!GZUbg%z|%7;$Y@?2lzS1-@dZl%23(#2 zAMl2~B|FZm%kg=NNF(q9{=W_Q&LDLvE?R`4Kc?YYq8NZrLq8^){Co_l1G;!bf;X4w z0Z_zg>g(%wALgj}?EWdx2)D7ZfhVP;@U1EgxMvrE60e_4gL0DUS8%$4fx&=gLPEmX z#mS7JS*qc0tgMvq?d|PoxsT)V6g}sGSMRv2p8Fl?kcY-t%{a;0mFigaifq<6fdW)d z7ygxJw-r^(*W0jjk7R$Uzdk-tTyv@3kB{a^h>!oZ?2&epfWj6X9C%@VgtJS(hChI7 zIo2J1QwU;fu$y?Y1e>)0;nXShL_S<7;z;2f+e@Mr)nB$s1n=#&jL2j-BVi^FC@IS% z+Z*P9gpA>q^UvubgwrGwhB)FAk|Mk52JYr4^7+& zU7*<)o2a3DczZkG1{Z`UnYuyuAbuRGm$k(mhhZ;{Mugn}UC8Tt^IB3zD#1ErNbNbp zPX2QZe*|Qz!pv8P7qHB8%#?J8b(hheuSxOkg`tI@T)ji>7szLluoduCPr1#nQQBpC zgU2%(Vw4~Y`D6vIc##7?=f;Oa$IMHQA4u`qxNl!s){jiPg}*V(SMZ?eP`x`7ZS?cS zfGx$NPjE}a*J`I;EtWF5Iy|M!_b4n}LcH1liV5>dnV7`t+pEJr z_a`0CVu0n-!<7Hoi~sdlrEk82rCBC43It4$%o$>hJ=+hZO#Tro8K?2vMGE3i*o)EC zu$1xX06DZ-ZBqO4;lVYbBDugY;>~!h^E;|Tj{|>Z)t}1DbY+jgTxP3F4s7XKa;@o- z-t^5wX79fR&pO;wJ$@ElBTQb;YZH=vrs*CD~IaBP;4|9C%_)z>?Fo2^QFt6NrQP>T; zf!1U*uk=facZ8wXM|-xBe?R6YBEnE~15;uy*N#syrhN23v{Fn4C;qZ6toP_B`vQ7b zx(j&;_)0`YIS|betI@?-&uFFA+p+m@cg4Jf5(N611b)8cclPB-(!cK({QpmPy}l$m z4w?KVOl76+FhvhP?HgJc?FyO>WGUW-EEwJMPVjhk|IG9Ta+O~H4e!aqp#;Mbouo!( zU7e9&J=>3@009L`!|zGROD*Ra3`6~E_t!m2LK`X zOpGqc2VVk@qG|sOnsFYuFJdYgd=RFQlxAe^<;_M-26 z4;$_1@Nc5~)wNHbsN&+D6rhwNoFY5~LRvQ$=s_lo$p&0Vk(^%~=J((~b>`A!eSYOL zVn)m)q&h^3-g!gu+gv~xE=EDk*^)8NJaKa)oO8%B%T79sjZ$$5nw4V4dGLw|AkuVR z=?dm!*@GRpYL!ZPOv5VU@9CI@A}=K>_5K#(AoL|2$5%WQb`Cv=iyJ2y_&8C4zVj`z zpE~;?L;UteOPf1yV~_<&ATKU_s1}u?k!h&zJ5#C_Q5!mcRTnNpQ&Up|1IN!d&0ieI z@?s)ID40LJe!caN#+*RNZmRYK4J}`t95P6uA%|2PoWuZ^h~&BLt0jxHtIAV}@hUju z(|f%%XDTE?38{6tqnHYlr?kiLMbp2TBO#I(rh2MyRIitj|^&wI!6IFH$t7 zVm6f$MP=S19PShJ~@~a;fSOvWu z3(qLp5%atcy5ayZOSUWQM#>dB(#wg3m>oQ(tmy)O1$uB5~D&l|P75DvSsZzThsONT=d4zYE zE5k8Mmw=#6q78?Esi|Gq`G6=a5=c}W5QVP>PhZgSgFIQE-Ta~ht-^;LL~yXqLrgu5 zMXt5PQCzfjwoL;c6ubIR04wuS@SWnh78PI+CCCDajL-Y)Q6F%OcK{f=LAzwcH7`76 z>re%1S-y#j1n>sYi?l`{%yi!HHs#Eh3J0@H-sLU)guFD$B8s$0ifrx}`rod`Agu+D z3GWl{=NykAImqo?fU2#!PrD>azXfy26kflTVFH-J77e0H>iT{2Z9lfNfZ+=A^XL1y zxj_rC$HxsnySuwXHa%L}C1c`wdAOl}D?hA#u#s604+W^Xu*6F~?#X z1{(J!&sjVd_#_@}V>uS)^dn_jyg)2GXjl6889AB!4spHzaP{d}<%wDk;%d&Y1V_6W zx!VmOCE@KQrG|dM%YL*Cyu$>6w*H+K5TK^OGZHJ$zAJm@lB*9S9#?UX+GmmRvoI`d r0DuR9e%$*%+N0C6${ggq;(EflePYHe+VkBXI0mUIX)2aHvk3ejDV@d2 literal 0 HcmV?d00001 From 9aad02aa689ca7a518a1177ab0132412abb4bebb Mon Sep 17 00:00:00 2001 From: Justin Hall Date: Tue, 7 May 2019 12:06:43 -0700 Subject: [PATCH 383/724] edits --- .../create-wip-policy-using-intune-azure.md | 4 ++-- 1 file changed, 2 insertions(+), 2 deletions(-) diff --git a/windows/security/information-protection/windows-information-protection/create-wip-policy-using-intune-azure.md b/windows/security/information-protection/windows-information-protection/create-wip-policy-using-intune-azure.md index 9701e21082..dfb3d3f4cf 100644 --- a/windows/security/information-protection/windows-information-protection/create-wip-policy-using-intune-azure.md +++ b/windows/security/information-protection/windows-information-protection/create-wip-policy-using-intune-azure.md @@ -590,7 +590,7 @@ After you've decided where your protected apps can access enterprise data on you - **Use Azure RMS for WIP.** Determines whether WIP encrypts [Microsoft Azure Rights Management](https://products.office.com/business/microsoft-azure-rights-management) Files that are copied from Windows 10 to USB or other removable drives so they can be securely shared amongst employees. You must already have Azure Rights Management set up. The RMS template is only applied to the files on removable media, and is only used for access control—it doesn’t actually apply Azure Information Protection to the files. - - **On.** Starts protecting Azure Rights Management files that are copied to a removable drive. You can also add a TemplateID GUID to specify who can access the Azure Rights Management protected files, and for how long. Curly braces -- {} -- are required around the RMS Template ID. The EFS file uses the key from the RMS template’s license to protect the EFS file encryption key. Only users with access to that template will be able to read it off of the USB. If you don’t specify a template, it’s a regular EFS file using a default RMS template that everyone in the tenant will have access to. + - **On.** Starts protecting Azure Rights Management files that are copied to a removable drive. You can also add a TemplateID GUID to specify who can access the Azure Rights Management protected files, and for how long. Curly braces -- {} -- are required around the RMS Template ID. The EFS file uses the key from the RMS template’s license to protect the EFS file encryption key. Only users with permission to that template will be able to read it from the USB. If you don’t specify a template, it’s a regular EFS file using a default RMS template that everyone in the tenant will have access to. - **Off, or not configured.** Stops WIP from encrypting Azure Rights Management files that are copied to a removable drive. @@ -600,7 +600,7 @@ After you've decided where your protected apps can access enterprise data on you - **Off, or not configured.** Stops Windows Search Indexer from indexing encrypted files. -For more info about setting up and using a custom template, see [Configuring custom templates for the Azure Rights Management service](https://docs.microsoft.com/information-protection/deploy-use/configure-custom-templates). WIP can also integrate with AZure RMS by using the **AllowAzureRMSForEDP** and the **RMSTemplateIDForEDP** MDM settings in the [EnterpriseDataProtection CSP](https://msdn.microsoft.com/windows/hardware/commercialize/customize/mdm/enterprisedataprotection-csp). +For more info about setting up and using a custom template, see [Configuring custom templates for the Azure Rights Management service](https://docs.microsoft.com/information-protection/deploy-use/configure-custom-templates). WIP can also integrate with Azure RMS by using the **AllowAzureRMSForEDP** and the **RMSTemplateIDForEDP** MDM settings in the [EnterpriseDataProtection CSP](https://msdn.microsoft.com/windows/hardware/commercialize/customize/mdm/enterprisedataprotection-csp). ## Encrypted file extensions From e75744fbb5ad7dc5f756a80d590931e9aa86e06f Mon Sep 17 00:00:00 2001 From: Justin Hall Date: Tue, 7 May 2019 12:45:06 -0700 Subject: [PATCH 384/724] edits --- .../create-wip-policy-using-intune-azure.md | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/windows/security/information-protection/windows-information-protection/create-wip-policy-using-intune-azure.md b/windows/security/information-protection/windows-information-protection/create-wip-policy-using-intune-azure.md index dfb3d3f4cf..0e53bed956 100644 --- a/windows/security/information-protection/windows-information-protection/create-wip-policy-using-intune-azure.md +++ b/windows/security/information-protection/windows-information-protection/create-wip-policy-using-intune-azure.md @@ -604,7 +604,7 @@ For more info about setting up and using a custom template, see [Configuring cus ## Encrypted file extensions -You can restrict which files are protected by WIP when they are downloaded from an SMB share within your enterprise network locations. When this policy is not specified, the existing auto-encryption behavior is applied. When this policy is configured, only files with the extensions in the list will be encrypted. +You can restrict which files are protected by WIP when they are downloaded from an SMB share within your enterprise network locations. If this settings is configured, only files with the extensions in the list will be encrypted. If this setting is not specified, the existing auto-encryption behavior is applied. ![WIP encrypted file extensions](images/wip-encrypted-file-extensions.png) From 1cbc48ce3444e7ed38e926108e20f3e8c81a602c Mon Sep 17 00:00:00 2001 From: Justin Hall Date: Tue, 7 May 2019 14:06:31 -0700 Subject: [PATCH 385/724] Update increase-scheduling-priority.md --- .../security-policy-settings/increase-scheduling-priority.md | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/windows/security/threat-protection/security-policy-settings/increase-scheduling-priority.md b/windows/security/threat-protection/security-policy-settings/increase-scheduling-priority.md index 565e032adb..95a0914890 100644 --- a/windows/security/threat-protection/security-policy-settings/increase-scheduling-priority.md +++ b/windows/security/threat-protection/security-policy-settings/increase-scheduling-priority.md @@ -38,7 +38,7 @@ Constant: SeIncreaseBasePriorityPrivilege ### Best practices -- Retain the default value and allow Administrators, and Window Manager/Window Manager Group, as the only accounts responsible for controlling process scheduling priorities. +- Retain the default value as the only accounts responsible for controlling process scheduling priorities. ### Location From 64b22e58edf0dcbf33f1f178e42c21bb9d7f0497 Mon Sep 17 00:00:00 2001 From: ManikaDhiman Date: Tue, 7 May 2019 15:33:04 -0700 Subject: [PATCH 386/724] Added 19H1 policies --- .../policy-configuration-service-provider.md | 15 ++ .../mdm/policy-csp-windowslogon.md | 255 +++++++++++++++++- 2 files changed, 264 insertions(+), 6 deletions(-) diff --git a/windows/client-management/mdm/policy-configuration-service-provider.md b/windows/client-management/mdm/policy-configuration-service-provider.md index a27926a537..70e8359000 100644 --- a/windows/client-management/mdm/policy-configuration-service-provider.md +++ b/windows/client-management/mdm/policy-configuration-service-provider.md @@ -3678,12 +3678,21 @@ The following diagram shows the Policy configuration service provider in tree fo ### WindowsLogon policies
+
+ WindowsLogon/AllowAutomaticRestartSignOn +
+
+ WindowsLogon/ConfigAutomaticRestartSignOn +
WindowsLogon/DisableLockScreenAppNotifications
WindowsLogon/DontDisplayNetworkSelectionUI
+
+ WindowsLogon/EnableFirstLogonAnimation +
WindowsLogon/EnumerateLocalUsersOnDomainJoinedComputers
@@ -4116,8 +4125,11 @@ The following diagram shows the Policy configuration service provider in tree fo - [System/BootStartDriverInitialization](./policy-csp-system.md#system-bootstartdriverinitialization) - [System/DisableSystemRestore](./policy-csp-system.md#system-disablesystemrestore) - [WindowsConnectionManager/ProhitConnectionToNonDomainNetworksWhenConnectedToDomainAuthenticatedNetwork](./policy-csp-windowsconnectionmanager.md#windowsconnectionmanager-prohitconnectiontonondomainnetworkswhenconnectedtodomainauthenticatednetwork) +- [WindowsLogon/AllowAutomaticRestartSignOn](./policy-csp-windowslogon.md#windowslogon-allowautomaticrestartsignon) +- [WindowsLogon/ConfigAutomaticRestartSignOn](./ - [WindowsLogon/DisableLockScreenAppNotifications](./policy-csp-windowslogon.md#windowslogon-disablelockscreenappnotifications) - [WindowsLogon/DontDisplayNetworkSelectionUI](./policy-csp-windowslogon.md#windowslogon-dontdisplaynetworkselectionui) +- [WindowsLogon/EnableFirstLogonAnimation](./policy-csp-windowslogon.md#windowslogon-enablefirstlogonanimation) - [WindowsLogon/EnumerateLocalUsersOnDomainJoinedComputers](./policy-csp-windowslogon.md#windowslogon-enumeratelocalusersondomainjoinedcomputers) - [WindowsLogon/SignInLastInteractiveUserAutomaticallyAfterASystemInitiatedRestart](./policy-csp-windowslogon.md#windowslogon-signinlastinteractiveuserautomaticallyafterasysteminitiatedrestart) - [WindowsPowerShell/TurnOnPowerShellScriptBlockLogging](./policy-csp-windowspowershell.md#windowspowershell-turnonpowershellscriptblocklogging) @@ -4975,8 +4987,11 @@ The following diagram shows the Policy configuration service provider in tree fo - [WindowsDefenderSecurityCenter/URL](./policy-csp-windowsdefendersecuritycenter.md#windowsdefendersecuritycenter-url) - [WindowsInkWorkspace/AllowSuggestedAppsInWindowsInkWorkspace](./policy-csp-windowsinkworkspace.md#windowsinkworkspace-allowsuggestedappsinwindowsinkworkspace) - [WindowsInkWorkspace/AllowWindowsInkWorkspace](./policy-csp-windowsinkworkspace.md#windowsinkworkspace-allowwindowsinkworkspace) +- [WindowsLogon/AllowAutomaticRestartSignOn](./policy-csp-windowslogon.md#windowslogon-allowautomaticrestartsignon) +- [WindowsLogon/ConfigAutomaticRestartSignOn](./policy-csp-windowslogon.md#windowslogon-configautomaticrestartsignon) - [WindowsLogon/DisableLockScreenAppNotifications](./policy-csp-windowslogon.md#windowslogon-disablelockscreenappnotifications) - [WindowsLogon/DontDisplayNetworkSelectionUI](./policy-csp-windowslogon.md#windowslogon-dontdisplaynetworkselectionui) +- [WindowsLogon/EnableFirstLogonAnimation](./policy-csp-windowslogon.md#windowslogon-enablefirstlogonanimation) - [WindowsLogon/EnumerateLocalUsersOnDomainJoinedComputers](./policy-csp-windowslogon.md#windowslogon-enumeratelocalusersondomainjoinedcomputers) - [WindowsLogon/HideFastUserSwitching](./policy-csp-windowslogon.md#windowslogon-hidefastuserswitching) - [WindowsLogon/SignInLastInteractiveUserAutomaticallyAfterASystemInitiatedRestart](./policy-csp-windowslogon.md#windowslogon-signinlastinteractiveuserautomaticallyafterasysteminitiatedrestart) diff --git a/windows/client-management/mdm/policy-csp-windowslogon.md b/windows/client-management/mdm/policy-csp-windowslogon.md index e75a0cf6de..4b9da72e50 100644 --- a/windows/client-management/mdm/policy-csp-windowslogon.md +++ b/windows/client-management/mdm/policy-csp-windowslogon.md @@ -6,12 +6,13 @@ ms.topic: article ms.prod: w10 ms.technology: windows author: MariciaAlforque -ms.date: 07/12/2018 +ms.date: 05/07/2019 --- # Policy CSP - WindowsLogon - +> [!WARNING] +> Some information relates to prereleased products, which may be substantially modified before it's commercially released. Microsoft makes no warranties, expressed or implied, concerning the information provided here.
@@ -19,12 +20,21 @@ ms.date: 07/12/2018 ## WindowsLogon policies
+
+ WindowsLogon/AllowAutomaticRestartSignOn +
+
+ WindowsLogon/ConfigAutomaticRestartSignOn +
WindowsLogon/DisableLockScreenAppNotifications
WindowsLogon/DontDisplayNetworkSelectionUI
+
+ WindowsLogon/EnableFirstLogonAnimation +
WindowsLogon/EnumerateLocalUsersOnDomainJoinedComputers
@@ -36,6 +46,159 @@ ms.date: 07/12/2018
+
+ + +**WindowsLogon/AllowAutomaticRestartSignOn** + + + + + + + + + + + + + + + + + + + + + +
HomeProBusinessEnterpriseEducationMobileMobile Enterprise
check mark6check mark6check mark6check mark6check mark6
+ + + +[Scope](./policy-configuration-service-provider.md#policy-scope): + +> [!div class = "checklist"] +> * Device + +
+ + + +This policy setting controls whether a device automatically signs in and locks the last interactive user after the system restarts or after a shutdown and cold boot. + +This occurs only if the last interactive user did not sign out before the restart or shutdown.​ + +If the device is joined to Active Directory or Azure Active Directory, this policy applies only to Windows Update restarts. Otherwise, this policy applies to both Windows Update restarts and user-initiated restarts and shutdowns.​ + +If you do not configure this policy setting, it is enabled by default. When the policy is enabled, the user is automatically signed in and the session is automatically locked with all lock screen apps configured for that user after the device boots.​ + +After enabling this policy, you can configure its settings through the [ConfigAutomaticRestartSignOn](#windowslogon-configautomaticrestartsignon) policy, which configures the mode of automatically signing in and locking the last interactive user after a restart or cold boot​. + +If you disable this policy setting, the device does not configure automatic sign in. The user’s lock screen apps are not restarted after the system restarts. + + +> [!TIP] +> This is an ADMX-backed policy and requires a special SyncML format to enable or disable. For details, see [Understanding ADMX-backed policies](./understanding-admx-backed-policies.md). + +> You must specify the data type in the SyncML as <Format>chr</Format>. For an example SyncML, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). + +> The payload of the SyncML must be XML-encoded; for this XML encoding, there are a variety of online encoders that you can use. To avoid encoding the payload, you can use CDATA if your MDM supports it. For more information, see [CDATA Sections](http://www.w3.org/TR/REC-xml/#sec-cdata-sect). + + +ADMX Info: +- GP English name: *Sign-in and lock last interactive user automatically after a restart* +- GP name: *AutomaticRestartSignOn* +- GP path: *Windows Components/Windows Logon Options* +- GP ADMX file name: *WinLogon.admx* + + + + + + + + + + + + + +
+ + +**WindowsLogon/ConfigAutomaticRestartSignOn** + + + + + + + + + + + + + + + + + + + + + +
HomeProBusinessEnterpriseEducationMobileMobile Enterprise
check mark6check mark6check mark6check mark6check mark6
+ + + +[Scope](./policy-configuration-service-provider.md#policy-scope): + +> [!div class = "checklist"] +> * Device + +
+ + + +This policy setting controls the configuration under which an automatic restart, sign on, and lock occurs after a restart or cold boot. If you chose “Disabled” in the [AllowAutomaticRestartSignOn](#windowslogon-allowautomaticrestartsignon) policy, then automatic sign on does not occur and this policy need not be configured. + +If you enable this policy setting, you can choose one of the following two options: + +- "Enabled if BitLocker is on and not suspended": Specifies that automatic sign on and lock occurs only if BitLocker is active and not suspended during the reboot or shutdown. Personal data can be accessed on the device’s hard drive at this time if BitLocker is not on or suspended during an update. BitLocker suspension temporarily removes protection for system components and data but may be needed in certain circumstances to successfully update boot-critical components. +BitLocker is suspended during updates if: + - The device does not have TPM 2.0 and PCR7 + - The device does not use a TPM-only protector +- "Always Enabled": Specifies that automatic sign on happens even if BitLocker is off or suspended during reboot or shutdown. When BitLocker is not enabled, personal data is accessible on the hard drive. Automatic restart and sign on should only be run under this condition if you are confident that the configured device is in a secure physical location. + +If you disable or do not configure this setting, automatic sign on defaults to the “Enabled if BitLocker is on and not suspended” behavior. + + +> [!TIP] +> This is an ADMX-backed policy and requires a special SyncML format to enable or disable. For details, see [Understanding ADMX-backed policies](./understanding-admx-backed-policies.md). + +> You must specify the data type in the SyncML as <Format>chr</Format>. For an example SyncML, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). + +> The payload of the SyncML must be XML-encoded; for this XML encoding, there are a variety of online encoders that you can use. To avoid encoding the payload, you can use CDATA if your MDM supports it. For more information, see [CDATA Sections](http://www.w3.org/TR/REC-xml/#sec-cdata-sect). + + +ADMX Info: +- GP English name: *Configure the mode of automatically signing in and locking last interactive user after a restart or cold boot* +- GP name: *ConfigAutomaticRestartSignOn* +- GP path: *Windows Components/Windows Logon Options* +- GP ADMX file name: *WinLogon.admx* + + + + + + + + + + + +
@@ -188,6 +351,84 @@ ADMX Info:
+ +**WindowsLogon/EnableFirstLogonAnimation** + + + + + + + + + + + + + + + + + + + + + +
HomeProBusinessEnterpriseEducationMobileMobile Enterprise
cross markcheck mark6check mark6check mark6check mark6
+ + + +[Scope](./policy-configuration-service-provider.md#policy-scope): + +> [!div class = "checklist"] +> * Device + +
+ + + +This policy setting allows you to control whether users see the first sign-in animation when signing in to the computer for the first time. This applies to both the first user of the computer who completes the initial setup and users who are added to the computer later. It also controls if Microsoft account users are offered the opt-in prompt for services during their first sign-in. + +If you enable this policy setting, Microsoft account users see the opt-in prompt for services, and users with other accounts see the sign-in animation. + +If you disable this policy setting, users do not see the animation and Microsoft account users do not see the opt-in prompt for services. + +If you do not configure this policy setting, the user who completes the initial Windows setup see the animation during their first sign-in. If the first user had already completed the initial setup and this policy setting is not configured, users new to this computer do not see the animation. + +> [!NOTE] +> The first sign-in animation is not displayed on Server, so this policy has no effect. + + +> [!TIP] +> This is an ADMX-backed policy and requires a special SyncML format to enable or disable. For details, see [Understanding ADMX-backed policies](./understanding-admx-backed-policies.md). + +> You must specify the data type in the SyncML as <Format>chr</Format>. For an example SyncML, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). + +> The payload of the SyncML must be XML-encoded; for this XML encoding, there are a variety of online encoders that you can use. To avoid encoding the payload, you can use CDATA if your MDM supports it. For more information, see [CDATA Sections](http://www.w3.org/TR/REC-xml/#sec-cdata-sect). + + +ADMX Info: +- GP English name: *Show first sign-in animation* +- GP name: *EnableFirstLogonAnimation* +- GP path: *System/Logon* +- GP ADMX file name: *Logon.admx* + + + +Supported values: +- false - disabled +- true - enabled + + + + + + + + + +
+ **WindowsLogon/EnumerateLocalUsersOnDomainJoinedComputers** @@ -374,14 +615,16 @@ ADMX Info: + + +
-Footnote: +Footnotes: - 1 - Added in Windows 10, version 1607. - 2 - Added in Windows 10, version 1703. - 3 - Added in Windows 10, version 1709. - 4 - Added in Windows 10, version 1803. - - - +- 5 - Added in Windows 10, version 1809. +- 6 - Added in Windows 10, version 1903. \ No newline at end of file From 51f935f25e24eeaa59e1d7705d4b00481ba45258 Mon Sep 17 00:00:00 2001 From: Justin Hall Date: Tue, 7 May 2019 15:35:12 -0700 Subject: [PATCH 387/724] added new rules for 19H1 --- .../attack-surface-reduction-exploit-guard.md | 12 +++++++++++- .../customize-attack-surface-reduction.md | 1 + .../customize-controlled-folders-exploit-guard.md | 3 ++- 3 files changed, 14 insertions(+), 2 deletions(-) diff --git a/windows/security/threat-protection/windows-defender-exploit-guard/attack-surface-reduction-exploit-guard.md b/windows/security/threat-protection/windows-defender-exploit-guard/attack-surface-reduction-exploit-guard.md index 5bfe2c6ba4..a735cde5c8 100644 --- a/windows/security/threat-protection/windows-defender-exploit-guard/attack-surface-reduction-exploit-guard.md +++ b/windows/security/threat-protection/windows-defender-exploit-guard/attack-surface-reduction-exploit-guard.md @@ -11,7 +11,7 @@ ms.pagetype: security ms.localizationpriority: medium author: andreabichsel ms.author: v-anbic -ms.date: 04/02/2019 +ms.date: 05/07/2019 --- # Reduce attack surfaces with attack surface reduction rules @@ -79,6 +79,7 @@ Block process creations originating from PSExec and WMI commands | d1e49aac-8f56 Block untrusted and unsigned processes that run from USB | b2b3f03d-6a65-4f7b-a9c7-1c7ef74a9ba4 | Supported Block Office communication application from creating child processes | 26190899-1602-49e8-8b27-eb1d0a1ce869 | Supported Block Adobe Reader from creating child processes | 7674ba52-37eb-4a4f-a9a1-f0f9a1619a2c | Supported +Block persistence through WMI event subscription | e6db77e5-3df2-4cf1-b95a-636979351e5b | Supported Each rule description indicates which apps or file types the rule applies to. In general, the rules for Office apps apply to only Word, Excel, PowerPoint, and OneNote, or they apply to Outlook. Except where specified, attack surface reduction rules don't apply to any other Office apps. @@ -264,6 +265,15 @@ SCCM name: Not applicable GUID: 7674ba52-37eb-4a4f-a9a1-f0f9a1619a2c +### Block persistence through WMI event subscription + +Windows Defender Advanced Threat Protection prevented an attempt to establish entity persistence in the WMI repo through a WMI event subscription. + +Intune name: Block persistence through WMI event subscription + +SCCM name: Not applicable + +GUID: e6db77e5-3df2-4cf1-b95a-636979351e5b ## Related topics diff --git a/windows/security/threat-protection/windows-defender-exploit-guard/customize-attack-surface-reduction.md b/windows/security/threat-protection/windows-defender-exploit-guard/customize-attack-surface-reduction.md index 204fad8ca0..08be26c51b 100644 --- a/windows/security/threat-protection/windows-defender-exploit-guard/customize-attack-surface-reduction.md +++ b/windows/security/threat-protection/windows-defender-exploit-guard/customize-attack-surface-reduction.md @@ -59,6 +59,7 @@ Block process creations originating from PSExec and WMI commands | d1e49aac-8f56 Block untrusted and unsigned processes that run from USB | b2b3f03d-6a65-4f7b-a9c7-1c7ef74a9ba4 Block Office communication applications from creating child processes | 26190899-1602-49e8-8b27-eb1d0a1ce869 Block Adobe Reader from creating child processes | 7674ba52-37eb-4a4f-a9a1-f0f9a1619a2c +Process creation from Adobe Reader | e6db77e5-3df2-4cf1-b95a-636979351e5b See the [attack surface reduction](attack-surface-reduction-exploit-guard.md) topic for details on each rule. diff --git a/windows/security/threat-protection/windows-defender-exploit-guard/customize-controlled-folders-exploit-guard.md b/windows/security/threat-protection/windows-defender-exploit-guard/customize-controlled-folders-exploit-guard.md index 05037553e3..d4617d6e3c 100644 --- a/windows/security/threat-protection/windows-defender-exploit-guard/customize-controlled-folders-exploit-guard.md +++ b/windows/security/threat-protection/windows-defender-exploit-guard/customize-controlled-folders-exploit-guard.md @@ -11,6 +11,7 @@ ms.pagetype: security ms.localizationpriority: medium author: andreabichsel ms.author: v-anbic +ms.date: 05/07/2019 --- # Customize controlled folder access @@ -24,7 +25,7 @@ Controlled folder access helps you protect valuable data from malicious apps and This topic describes how to customize the following settings of the controlled folder access feature with the Windows Security app, Group Policy, PowerShell, and mobile device management (MDM) configuration service providers (CSPs): - [Add additional folders to be protected](#protect-additional-folders) -- [Add apps that should be allowed to access protected folders](#allow-specifc-apps-to-make-changes-to-controlled-folders) +- [Add apps that should be allowed to access protected folders](#allow-specific-apps-to-make-changes-to-controlled-folders) >[!WARNING] >Controlled folder access monitors apps for activities that may be malicious. Sometimes it might block a legitimate app from making legitimate changes to your files. From b46da89d10a67f738560513d62701fc506117ac0 Mon Sep 17 00:00:00 2001 From: Justin Hall Date: Tue, 7 May 2019 15:41:26 -0700 Subject: [PATCH 388/724] added prerelease --- .../attack-surface-reduction-exploit-guard.md | 3 +++ .../customize-attack-surface-reduction.md | 5 ++++- .../customize-controlled-folders-exploit-guard.md | 3 +-- 3 files changed, 8 insertions(+), 3 deletions(-) diff --git a/windows/security/threat-protection/windows-defender-exploit-guard/attack-surface-reduction-exploit-guard.md b/windows/security/threat-protection/windows-defender-exploit-guard/attack-surface-reduction-exploit-guard.md index a735cde5c8..bc11df2dc3 100644 --- a/windows/security/threat-protection/windows-defender-exploit-guard/attack-surface-reduction-exploit-guard.md +++ b/windows/security/threat-protection/windows-defender-exploit-guard/attack-surface-reduction-exploit-guard.md @@ -20,6 +20,9 @@ ms.date: 05/07/2019 - [Windows Defender Advanced Threat Protection (Windows Defender ATP)](https://go.microsoft.com/fwlink/p/?linkid=2069559) +>[!IMPORTANT] +>Some information relates to prereleased product which may be substantially modified before it's commercially released. Microsoft makes no warranties, express or implied, with respect to the information provided here. + Attack surface reduction rules help prevent behaviors malware often uses to infect computers with malicious code. You can set attack surface reduction rules for computers running Windows 10, version 1709 or later, Windows Server 2016 1803 or later, or Windows Server 2019. To use attack surface reduction rules, you need a Windows 10 Enterprise E3 license or higher. A Windows E5 license gives you the advanced management capabilities to power them. These include monitoring, analytics, and workflows available in [Windows Defender Advanced Threat Protection](../windows-defender-atp/windows-defender-advanced-threat-protection.md), as well as reporting and configuration capabilities in the M365 Security Center. These advanced capabilities aren't available with an E3 license, but you can use attack surface reduction rule events in Event Viewer to help facilitate deployment. diff --git a/windows/security/threat-protection/windows-defender-exploit-guard/customize-attack-surface-reduction.md b/windows/security/threat-protection/windows-defender-exploit-guard/customize-attack-surface-reduction.md index 08be26c51b..647e7de5b0 100644 --- a/windows/security/threat-protection/windows-defender-exploit-guard/customize-attack-surface-reduction.md +++ b/windows/security/threat-protection/windows-defender-exploit-guard/customize-attack-surface-reduction.md @@ -11,7 +11,7 @@ ms.pagetype: security ms.localizationpriority: medium author: andreabichsel ms.author: v-anbic -ms.date: 04/26/2019 +ms.date: 05/07/2019 --- # Customize attack surface reduction rules @@ -20,6 +20,9 @@ ms.date: 04/26/2019 - [Windows Defender Advanced Threat Protection (Windows Defender ATP)](https://go.microsoft.com/fwlink/p/?linkid=2069559) +>[!IMPORTANT] +>Some information relates to prereleased product which may be substantially modified before it's commercially released. Microsoft makes no warranties, express or implied, with respect to the information provided here. + Attack surface reduction rules help prevent actions and apps that are typically used by exploit-seeking malware to infect machines. Attack surface reduction rules are supported on Windows Server 2019 as well as Windows 10 clients. This topic describes how to customize attack surface reduction rules by [excluding files and folders](#exclude-files-and-folders) or [adding custom text to the notification](#customize-the-notification) alert that appears on a user's computer. diff --git a/windows/security/threat-protection/windows-defender-exploit-guard/customize-controlled-folders-exploit-guard.md b/windows/security/threat-protection/windows-defender-exploit-guard/customize-controlled-folders-exploit-guard.md index d4617d6e3c..bf18867655 100644 --- a/windows/security/threat-protection/windows-defender-exploit-guard/customize-controlled-folders-exploit-guard.md +++ b/windows/security/threat-protection/windows-defender-exploit-guard/customize-controlled-folders-exploit-guard.md @@ -32,7 +32,7 @@ This topic describes how to customize the following settings of the controlled f > >This may impact your organization's productivity, so you may want to consider running the feature in [audit mode](audit-windows-defender-exploit-guard.md) to fully assess the feature's impact. - ## Protect additional folders +## Protect additional folders Controlled folder access applies to a number of system folders and default locations, including folders such as Documents, Pictures, Movies, and Desktop. @@ -42,7 +42,6 @@ Adding other folders to controlled folder access can be useful, for example, if You can also enter network shares and mapped drives. Environment variables and wildcards are supported. For information about using wildcards, see [Use wildcards in the file name and folder path or extension exclusion lists](https://docs.microsoft.com/en-us/windows/security/threat-protection/windows-defender-antivirus/configure-extension-file-exclusions-windows-defender-antivirus#use-wildcards-in-the-file-name-and-folder-path-or-extension-exclusion-lists). - You can use the Windows Security app or Group Policy to add and remove additional protected folders. ### Use the Windows Security app to protect additional folders From a4e67880ba9196aae3599b061c0988d4ba972c71 Mon Sep 17 00:00:00 2001 From: ManikaDhiman Date: Tue, 7 May 2019 15:49:05 -0700 Subject: [PATCH 389/724] Removed extra space --- windows/client-management/mdm/policy-csp-windowslogon.md | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/windows/client-management/mdm/policy-csp-windowslogon.md b/windows/client-management/mdm/policy-csp-windowslogon.md index 4b9da72e50..885ae70ec7 100644 --- a/windows/client-management/mdm/policy-csp-windowslogon.md +++ b/windows/client-management/mdm/policy-csp-windowslogon.md @@ -34,7 +34,7 @@ ms.date: 05/07/2019
WindowsLogon/EnableFirstLogonAnimation -
+
WindowsLogon/EnumerateLocalUsersOnDomainJoinedComputers
From d0915eb16254b972109005e180a45c907a8d045c Mon Sep 17 00:00:00 2001 From: Justin Hall Date: Tue, 7 May 2019 15:54:54 -0700 Subject: [PATCH 390/724] added description --- .../attack-surface-reduction-exploit-guard.md | 6 +++--- 1 file changed, 3 insertions(+), 3 deletions(-) diff --git a/windows/security/threat-protection/windows-defender-exploit-guard/attack-surface-reduction-exploit-guard.md b/windows/security/threat-protection/windows-defender-exploit-guard/attack-surface-reduction-exploit-guard.md index bc11df2dc3..8ea88cdbf2 100644 --- a/windows/security/threat-protection/windows-defender-exploit-guard/attack-surface-reduction-exploit-guard.md +++ b/windows/security/threat-protection/windows-defender-exploit-guard/attack-surface-reduction-exploit-guard.md @@ -82,7 +82,7 @@ Block process creations originating from PSExec and WMI commands | d1e49aac-8f56 Block untrusted and unsigned processes that run from USB | b2b3f03d-6a65-4f7b-a9c7-1c7ef74a9ba4 | Supported Block Office communication application from creating child processes | 26190899-1602-49e8-8b27-eb1d0a1ce869 | Supported Block Adobe Reader from creating child processes | 7674ba52-37eb-4a4f-a9a1-f0f9a1619a2c | Supported -Block persistence through WMI event subscription | e6db77e5-3df2-4cf1-b95a-636979351e5b | Supported +Block persistence through WMI event subscription | e6db77e5-3df2-4cf1-b95a-636979351e5b | Not supported Each rule description indicates which apps or file types the rule applies to. In general, the rules for Office apps apply to only Word, Excel, PowerPoint, and OneNote, or they apply to Outlook. Except where specified, attack surface reduction rules don't apply to any other Office apps. @@ -270,11 +270,11 @@ GUID: 7674ba52-37eb-4a4f-a9a1-f0f9a1619a2c ### Block persistence through WMI event subscription -Windows Defender Advanced Threat Protection prevented an attempt to establish entity persistence in the WMI repo through a WMI event subscription. +Fileless threats employ various tactics to stay hidden, to avoid being seen as a regular file in the file system. To gain periodic execution control, some threats could abuse the WMI repository and event model to stay hidden. With this rule, admins can prevent threats that abuse WMI to persist and stay hidden in WMI repository. Intune name: Block persistence through WMI event subscription -SCCM name: Not applicable +SCCM name: Not yet available GUID: e6db77e5-3df2-4cf1-b95a-636979351e5b From 76bf8214700ecefd1b6a39a98f16014ab2b920fb Mon Sep 17 00:00:00 2001 From: Justin Hall Date: Tue, 7 May 2019 15:55:04 -0700 Subject: [PATCH 391/724] edits --- .../attack-surface-reduction-exploit-guard.md | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/windows/security/threat-protection/windows-defender-exploit-guard/attack-surface-reduction-exploit-guard.md b/windows/security/threat-protection/windows-defender-exploit-guard/attack-surface-reduction-exploit-guard.md index 8ea88cdbf2..3392402f08 100644 --- a/windows/security/threat-protection/windows-defender-exploit-guard/attack-surface-reduction-exploit-guard.md +++ b/windows/security/threat-protection/windows-defender-exploit-guard/attack-surface-reduction-exploit-guard.md @@ -270,7 +270,7 @@ GUID: 7674ba52-37eb-4a4f-a9a1-f0f9a1619a2c ### Block persistence through WMI event subscription -Fileless threats employ various tactics to stay hidden, to avoid being seen as a regular file in the file system. To gain periodic execution control, some threats could abuse the WMI repository and event model to stay hidden. With this rule, admins can prevent threats that abuse WMI to persist and stay hidden in WMI repository. +Fileless threats employ various tactics to stay hidden, to avoid being seen in the file system, and to gain periodic execution control. Some threats can abuse the WMI repository and event model to stay hidden. With this rule, admins can prevent threats that abuse WMI to persist and stay hidden in WMI repository. Intune name: Block persistence through WMI event subscription From 50a4e9303061ab47668c79d23eb2125b86896da7 Mon Sep 17 00:00:00 2001 From: Joey Caparas Date: Tue, 7 May 2019 15:55:45 -0700 Subject: [PATCH 392/724] update version for airs --- ...estigations-windows-defender-advanced-threat-protection.md | 4 ++-- 1 file changed, 2 insertions(+), 2 deletions(-) diff --git a/windows/security/threat-protection/windows-defender-atp/automated-investigations-windows-defender-advanced-threat-protection.md b/windows/security/threat-protection/windows-defender-atp/automated-investigations-windows-defender-advanced-threat-protection.md index 8968b3b2cf..8ff29cf968 100644 --- a/windows/security/threat-protection/windows-defender-atp/automated-investigations-windows-defender-advanced-threat-protection.md +++ b/windows/security/threat-protection/windows-defender-atp/automated-investigations-windows-defender-advanced-threat-protection.md @@ -34,8 +34,8 @@ The Automated investigations list shows all the investigations that have been in Entities are the starting point for Automated investigations. When an alert contains a supported entity for Automated investigation (for example, a file) that resides on a machine that has a supported operating system for Automated investigation then an Automated investigation can start. >[!NOTE] ->Currently, Automated investigation only supports Windows 10, version 1803 or later. ->Some investigation playbooks, like memory investigations, require Windows 10, version 1809 or later. +>Currently, Automated investigation only supports Windows 10, version 1709 or later. +>Some investigation playbooks, like memory investigations, require Windows 10, version 1709 or later. The alerts start by analyzing the supported entities from the alert and also runs a generic machine playbook to see if there is anything else suspicious on that machine. The outcome and details from the investigation is seen in the Automated investigation view. From 7ec392d52df5200ca97d355d52f559a40c06cc94 Mon Sep 17 00:00:00 2001 From: Justin Hall Date: Tue, 7 May 2019 16:03:33 -0700 Subject: [PATCH 393/724] fixed link --- .../create-wip-policy-using-sccm.md | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/windows/security/information-protection/windows-information-protection/create-wip-policy-using-sccm.md b/windows/security/information-protection/windows-information-protection/create-wip-policy-using-sccm.md index 6edf443eb3..84ebcf1861 100644 --- a/windows/security/information-protection/windows-information-protection/create-wip-policy-using-sccm.md +++ b/windows/security/information-protection/windows-information-protection/create-wip-policy-using-sccm.md @@ -480,7 +480,7 @@ After you've decided where your protected apps can access enterprise data on you - **No.** Stop local encryption keys from being revoked from a device during unenrollment. For example, if you’re migrating between Mobile Device Management (MDM) solutions. - - **Allow Azure RMS.** Enables secure sharing of files by using removable media such as USB drives. For more information about how RMS works with WIP, see [Choose to set up Azure Rights Management with WIP](create-wip-policy-using-intune-azure.md#choose-to-set-up-azure-rights-management-with-wip). To confirm what templates your tenant has, run [Get-AadrmTemplate](https://docs.microsoft.com/powershell/module/aadrm/get-aadrmtemplate) from the [AADRM PowerShell module](https://docs.microsoft.com/azure/information-protection/administer-powershell). + - **Allow Azure RMS.** Enables secure sharing of files by using removable media such as USB drives. For more information about how RMS works with WIP, see [Create a WIP policy using Intune](create-wip-policy-using-intune-azure.md). To confirm what templates your tenant has, run [Get-AadrmTemplate](https://docs.microsoft.com/powershell/module/aadrm/get-aadrmtemplate) from the [AADRM PowerShell module](https://docs.microsoft.com/azure/information-protection/administer-powershell). If you don’t specify a template, WIP uses a key from a default RMS template that everyone in the tenant will have access to. 2. After you pick all of the settings you want to include, click **Summary**. From ed83d70393fdc9d3e570091713b9114eddcaf58b Mon Sep 17 00:00:00 2001 From: Max Velitchko Date: Tue, 7 May 2019 17:47:12 -0700 Subject: [PATCH 394/724] Fix mdatp parameters --- ...osoft-defender-atp-mac-install-manually.md | 34 +++++------------- ...ft-defender-atp-mac-install-with-intune.md | 12 +++++++ ...soft-defender-atp-mac-install-with-jamf.md | 12 +++++++ .../microsoft-defender-atp-mac-resources.md | 35 ++++++++++++++----- 4 files changed, 58 insertions(+), 35 deletions(-) diff --git a/windows/security/threat-protection/windows-defender-antivirus/microsoft-defender-atp-mac-install-manually.md b/windows/security/threat-protection/windows-defender-antivirus/microsoft-defender-atp-mac-install-manually.md index 27b3a8f924..82e53c1ff4 100644 --- a/windows/security/threat-protection/windows-defender-antivirus/microsoft-defender-atp-mac-install-manually.md +++ b/windows/security/threat-protection/windows-defender-antivirus/microsoft-defender-atp-mac-install-manually.md @@ -114,32 +114,14 @@ After installation, you'll see the Microsoft Defender icon in the macOS status b ![Microsoft Defender icon in status bar screenshot](images/MDATP_Icon_Bar.png) -## Configuring from the command line +## Test alert -Important tasks, such as controlling product settings and triggering on-demand scans, can be done from the command line: +Run in Terminal the following command. It will download [a harmless file](https://en.wikipedia.org/wiki/EICAR_test_file) which will trigger a test detection. + + ```bash + curl -o ~/Downloads/eicar.com.txt http://www.eicar.org/download/eicar.com.txt + ``` -|Group |Scenario |Command | -|-------------|-------------------------------------------|-----------------------------------------------------------------------| -|Configuration|Turn on/off real-time protection |`mdatp config --rtp [true/false]` | -|Configuration|Turn on/off cloud protection |`mdatp config --cloud [true/false]` | -|Configuration|Turn on/off product diagnostics |`mdatp config --diagnostic [true/false]` | -|Configuration|Turn on/off automatic sample submission |`mdatp config --sample-submission [true/false]` | -|Configuration|Turn on PUA protection |`mdatp threat --type-handling --potentially_unwanted_application block`| -|Configuration|Turn off PUA protection |`mdatp threat --type-handling --potentially_unwanted_application off` | -|Configuration|Turn on audit mode for PUA protection |`mdatp threat --type-handling --potentially_unwanted_application audit`| -|Diagnostics |Change the log level |`mdatp log-level --[error/warning/info/verbose]` | -|Diagnostics |Generate diagnostic logs |`mdatp --diagnostic` | -|Health |Check the product's health |`mdatp --health` | -|Protection |Scan a path |`mdatp scan --path [path]` | -|Protection |Do a quick scan |`mdatp scan --quick` | -|Protection |Do a full scan |`mdatp scan --full` | -|Protection |Cancel an ongoing on-demand scan |`mdatp scan --cancel` | -|Protection |Request a definition update |`mdatp --signature-update` | +You will get a "Threats found" notification, you can inspect threat's details in the Protection history. -## Logging installation issues - -See [Logging installation issues](microsoft-defender-atp-mac-resources#Logging-installation-issues) for more information on how to find the automatically generated log that is created by the installer when an error occurs. - -## Uninstallation - -See [Uninstalling](microsoft-defender-atp-mac-resources#Uninstalling) for details on how to remove Windows Defender ATP for Mac from client devices. \ No newline at end of file +Soon after that you'll get an alert in the ATP Portal. diff --git a/windows/security/threat-protection/windows-defender-antivirus/microsoft-defender-atp-mac-install-with-intune.md b/windows/security/threat-protection/windows-defender-antivirus/microsoft-defender-atp-mac-install-with-intune.md index 8af90fded1..6cfc85694d 100644 --- a/windows/security/threat-protection/windows-defender-antivirus/microsoft-defender-atp-mac-install-with-intune.md +++ b/windows/security/threat-protection/windows-defender-antivirus/microsoft-defender-atp-mac-install-with-intune.md @@ -164,6 +164,18 @@ After Intune changes are propagated to the enrolled machines, you'll see it on t ![Microsoft Defender icon in status bar screenshot](images/MDATP_Icon_Bar.png) +## Test alert + +Run in Terminal the following command. It will download [a harmless file](https://en.wikipedia.org/wiki/EICAR_test_file) which will trigger a test detection. + + ```bash + curl -o ~/Downloads/eicar.com.txt http://www.eicar.org/download/eicar.com.txt + ``` + +You will get a "Threats found" notification, you can inspect threat's details in the Protection history. + +Soon after that you'll get an alert in the ATP Portal. + ## Logging installation issues See [Logging installation issues](microsoft-defender-atp-mac-resources#Logging-installation-issues) for more information on how to find the automatically generated log that is created by the installer when an error occurs. diff --git a/windows/security/threat-protection/windows-defender-antivirus/microsoft-defender-atp-mac-install-with-jamf.md b/windows/security/threat-protection/windows-defender-antivirus/microsoft-defender-atp-mac-install-with-jamf.md index 8837b3bcc5..b2df2ab85f 100644 --- a/windows/security/threat-protection/windows-defender-antivirus/microsoft-defender-atp-mac-install-with-jamf.md +++ b/windows/security/threat-protection/windows-defender-antivirus/microsoft-defender-atp-mac-install-with-jamf.md @@ -199,6 +199,18 @@ sudo /Library/Extensions/wdavkext.kext/Contents/Resources/Tools/wdavconfig.py | This script returns 0 if Microsoft Defender ATP is registered with the Windows Defender ATP service, and another exit code if it is not installed or registered. +## Test alert + +Run in Terminal the following command. It will download [a harmless file](https://en.wikipedia.org/wiki/EICAR_test_file) which will trigger a test detection. + + ```bash + curl -o ~/Downloads/eicar.com.txt http://www.eicar.org/download/eicar.com.txt + ``` + +You will get a "Threats found" notification, you can inspect threat's details in the Protection history. + +Soon after that you'll get an alert in the ATP Portal. + ## Logging installation issues See [Logging installation issues](microsoft-defender-atp-mac-resources#Logging-installation-issues) for more information on how to find the automatically generated log that is created by the installer when an error occurs. diff --git a/windows/security/threat-protection/windows-defender-antivirus/microsoft-defender-atp-mac-resources.md b/windows/security/threat-protection/windows-defender-antivirus/microsoft-defender-atp-mac-resources.md index 09a4dcceae..03532ddfb4 100644 --- a/windows/security/threat-protection/windows-defender-antivirus/microsoft-defender-atp-mac-resources.md +++ b/windows/security/threat-protection/windows-defender-antivirus/microsoft-defender-atp-mac-resources.md @@ -36,9 +36,7 @@ If you can reproduce a problem, please increase the logging level, run the syste 1) Increase logging level: ```bash - mavel-mojave:~ testuser$ mdatp log-level --verbose - Creating connection to daemon - Connection established + mavel-mojave:~ testuser$ mdatp --log-level verbose Operation succeeded ``` @@ -47,21 +45,40 @@ If you can reproduce a problem, please increase the logging level, run the syste 3) Run `mdatp --diagnostic` to backup Defender ATP's logs. The command will print out location with generated zip file. ```bash - mavel-mojave:~ testuser$ mdatp --diagnostic - Creating connection to daemon - Connection established + mavel-mojave:~ testuser$ mdatp --diagnostic --create "/Library/Application Support/Microsoft/Defender/wdavdiag/d85e7032-adf8-434a-95aa-ad1d450b9a2f.zip" ``` 4) Restore logging level: ```bash - mavel-mojave:~ testuser$ mdatp log-level --info - Creating connection to daemon - Connection established + mavel-mojave:~ testuser$ mdatp --log-level info Operation succeeded ``` +## Managing from the command line + +Important tasks, such as controlling product settings and triggering on-demand scans, can be done from the command line: + +|Group |Scenario |Command | +|-------------|-------------------------------------------|-----------------------------------------------------------------------| +|Configuration|Turn on/off real-time protection |`mdatp --config rtp [true/false]` | +|Configuration|Turn on/off cloud protection |`mdatp --config cloud [true/false]` | +|Configuration|Turn on/off product diagnostics |`mdatp --config diagnostic [true/false]` | +|Configuration|Turn on/off automatic sample submission |`mdatp --config sample-submission [true/false]` | +|Configuration|Turn on PUA protection |`mdatp --threat --type-handling potentially_unwanted_application block`| +|Configuration|Turn off PUA protection |`mdatp --threat --type-handling potentially_unwanted_application off` | +|Configuration|Turn on audit mode for PUA protection |`mdatp --threat --type-handling potentially_unwanted_application audit`| +|Diagnostics |Change the log level |`mdatp --log-level [error/warning/info/verbose]` | +|Diagnostics |Generate diagnostic logs |`mdatp --diagnostic --create` | +|Health |Check the product's health |`mdatp --health` | +|Health |Prints a single health metric |`mdatp --health [metric]` | +|Protection |Scan a path |`mdatp --scan --path [path]` | +|Protection |Do a quick scan |`mdatp --scan --quick` | +|Protection |Do a full scan |`mdatp --scan --full` | +|Protection |Cancel an ongoing on-demand scan |`mdatp --scan --cancel` | +|Protection |Request a definition update |`mdatp --definition-update` | + ## Logging installation issues If an error occurs during installation, the installer will only report a general failure. From 3a12cbe4d4e5544a2853fb4c7a6f7e002cdb8422 Mon Sep 17 00:00:00 2001 From: MaratMussabekov <48041687+MaratMussabekov@users.noreply.github.com> Date: Wed, 8 May 2019 09:47:31 +0500 Subject: [PATCH 395/724] update net-framework-problems-with-ie11.md --- .../ie11-deploy-guide/net-framework-problems-with-ie11.md | 4 ++-- 1 file changed, 2 insertions(+), 2 deletions(-) diff --git a/browsers/internet-explorer/ie11-deploy-guide/net-framework-problems-with-ie11.md b/browsers/internet-explorer/ie11-deploy-guide/net-framework-problems-with-ie11.md index bed077a506..96c9783664 100644 --- a/browsers/internet-explorer/ie11-deploy-guide/net-framework-problems-with-ie11.md +++ b/browsers/internet-explorer/ie11-deploy-guide/net-framework-problems-with-ie11.md @@ -16,9 +16,9 @@ If you’re having problems launching your legacy apps while running Internet Ex **To turn managed browser hosting controls back on** -1. **For x86 systems or for 32-bit processes on x64 systems:** Go to the `HKLM\SOFTWARE\MICROSOFT\.NETFramework` registry key and change the **EnableIEHosting** value to **1**. +1. **For x86 systems or for 64-bit processes on x64 systems:** Go to the `HKLM\SOFTWARE\MICROSOFT\.NETFramework` registry key and change the **EnableIEHosting** value to **1**. -2. **For x64 systems or for 64-bit processes on x64 systems:** Go to the `HKLM\SOFTWARE\Wow6432Node\MICROSOFT\.NETFramework` registry key and change the **EnableIEHosting** value to **1**. +2. **For 32-bit processes on x64 systems:** Go to the `HKLM\SOFTWARE\Wow6432Node\MICROSOFT\.NETFramework` registry key and change the **EnableIEHosting** value to **1**. For more information, see the [Web Applications](https://go.microsoft.com/fwlink/p/?LinkId=308903) section of the Application Compatibility in the .NET Framework 4.5 page. From 42b878163fe6c35d274c36ee3107938ba214604b Mon Sep 17 00:00:00 2001 From: Nicole Turner <39884432+nenonix@users.noreply.github.com> Date: Wed, 8 May 2019 11:25:01 +0530 Subject: [PATCH 396/724] Update windows/deployment/windows-autopilot/enrollment-status.md Co-Authored-By: Malind19 --- windows/deployment/windows-autopilot/enrollment-status.md | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/windows/deployment/windows-autopilot/enrollment-status.md b/windows/deployment/windows-autopilot/enrollment-status.md index 895cf49881..fd2778c09b 100644 --- a/windows/deployment/windows-autopilot/enrollment-status.md +++ b/windows/deployment/windows-autopilot/enrollment-status.md @@ -21,7 +21,7 @@ The Windows Autopilot Enrollment Status page displaying the status of the comple ![Enrollment status page](images/enrollment-status-page.png) -From Windows 10 version 1803 onwards, you can opt-out of the account setup phase. When it is skipped, the settings will be applied for the users when as they access their desktop for the first time. +From Windows 10 version 1803 onwards, you can opt out of the account setup phase. If it is skipped, settings will be applied for users when they access their desktop for the first time. ## Available settings From 79f9363a41a5d93227958cb3245a6f48997f3fe0 Mon Sep 17 00:00:00 2001 From: ImranHabib <47118050+joinimran@users.noreply.github.com> Date: Wed, 8 May 2019 14:09:10 +0500 Subject: [PATCH 397/724] Wrong Command Their method mentioned was POST where in actual it was DELETE method. I have updated this accordingly. Problem: https://github.com/MicrosoftDocs/windows-itpro-docs/issues/1252 --- windows/client-management/mdm/reclaim-seat-from-user.md | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/windows/client-management/mdm/reclaim-seat-from-user.md b/windows/client-management/mdm/reclaim-seat-from-user.md index e3351b8c80..95f47c5df9 100644 --- a/windows/client-management/mdm/reclaim-seat-from-user.md +++ b/windows/client-management/mdm/reclaim-seat-from-user.md @@ -29,7 +29,7 @@ The **Reclaim seat from user** operation returns reclaimed seats for a user in t -

POST

+

DELETE

https://bspmts.mp.microsoft.com/V1/Inventory/{productId}/{skuId}/Seats/{username}

From f49d3c2d6da0638492675d0c846bf65407b2cbda Mon Sep 17 00:00:00 2001 From: MaratMussabekov <48041687+MaratMussabekov@users.noreply.github.com> Date: Wed, 8 May 2019 14:21:59 +0500 Subject: [PATCH 398/724] update win32-and-centennial-app-policy-configuration.md --- .../mdm/win32-and-centennial-app-policy-configuration.md | 3 +++ 1 file changed, 3 insertions(+) diff --git a/windows/client-management/mdm/win32-and-centennial-app-policy-configuration.md b/windows/client-management/mdm/win32-and-centennial-app-policy-configuration.md index 543252e8f2..d69549935e 100644 --- a/windows/client-management/mdm/win32-and-centennial-app-policy-configuration.md +++ b/windows/client-management/mdm/win32-and-centennial-app-policy-configuration.md @@ -50,6 +50,9 @@ When the ADMX policies are imported, the registry keys to which each policy is w > [!Warning] > Some operating system components have built in functionality to check devices for domain membership. MDM enforces the configured policy values only if the devices are domain joined, otherwise it does not. However, you can still import ADMX files and set ADMX-backed policies regardless of whether the device is domain joined or non-domain joined. +> [!NOTE] +> Settings, that cannot be configured using custom policy ingestion, have to be set by pushing the appropriate registry keys directly (for example, by using PowerShell script). + ## Ingesting an app ADMX file The following ADMX file example shows how to ingest a Win32 or Desktop Bridge app ADMX file and set policies from the file. The ADMX file defines eight policies. From 2f92dc55cc0bf116fca0988f97d95662a06d7a74 Mon Sep 17 00:00:00 2001 From: martyav Date: Wed, 8 May 2019 10:07:40 -0400 Subject: [PATCH 399/724] spacing, typo removal --- ...osoft-defender-atp-mac-install-manually.md | 4 +-- ...ft-defender-atp-mac-install-with-intune.md | 8 ++--- ...soft-defender-atp-mac-install-with-jamf.md | 36 +++++++++---------- .../microsoft-defender-atp-mac-resources.md | 22 ++++++------ .../microsoft-defender-atp-mac.md | 4 +-- 5 files changed, 37 insertions(+), 37 deletions(-) diff --git a/windows/security/threat-protection/windows-defender-antivirus/microsoft-defender-atp-mac-install-manually.md b/windows/security/threat-protection/windows-defender-antivirus/microsoft-defender-atp-mac-install-manually.md index 82e53c1ff4..9b90ab16b4 100644 --- a/windows/security/threat-protection/windows-defender-antivirus/microsoft-defender-atp-mac-install-manually.md +++ b/windows/security/threat-protection/windows-defender-antivirus/microsoft-defender-atp-mac-install-manually.md @@ -21,7 +21,7 @@ ms.topic: #conceptual **Applies to:** -[Windows Defender Advanced Threat Protection (Windows Defender ATP) for Mac](https://go.microsoft.com/fwlink/p/?linkid=???To-Add???) +[Windows Defender Advanced Threat Protection (Windows Defender ATP) for Mac](microsoft-defender-atp.md) >[!IMPORTANT] >Some information relates to prereleased product which may be substantially modified before it's commercially released. Microsoft makes no warranties, express or implied, with respect to the information provided here. @@ -31,7 +31,7 @@ Microsoft Defender ATP for Mac is not yet widely available, and this topic only ## Prerequisites and system requirements -Before you get started, please see [the main Microsoft Defender ATP for Mac page]((microsoft-defender-atp.md)) for a description of prerequisites and system requirements for the current software version. +Before you get started, please see [the main Microsoft Defender ATP for Mac page](microsoft-defender-atp.md) for a description of prerequisites and system requirements for the current software version. ## Download installation and onboarding packages diff --git a/windows/security/threat-protection/windows-defender-antivirus/microsoft-defender-atp-mac-install-with-intune.md b/windows/security/threat-protection/windows-defender-antivirus/microsoft-defender-atp-mac-install-with-intune.md index 6cfc85694d..b145ab592c 100644 --- a/windows/security/threat-protection/windows-defender-antivirus/microsoft-defender-atp-mac-install-with-intune.md +++ b/windows/security/threat-protection/windows-defender-antivirus/microsoft-defender-atp-mac-install-with-intune.md @@ -21,7 +21,7 @@ ms.topic: #conceptual **Applies to:** -[Windows Defender Advanced Threat Protection (Windows Defender ATP) for Mac](https://go.microsoft.com/fwlink/p/?linkid=???To-Add???) +[Windows Defender Advanced Threat Protection (Windows Defender ATP) for Mac](microsoft-defender-atp.md) >[!IMPORTANT] >Some information relates to prereleased product which may be substantially modified before it's commercially released. Microsoft makes no warranties, express or implied, with respect to the information provided here. @@ -31,7 +31,7 @@ Microsoft Defender ATP for Mac is not yet widely available, and this topic only ## Prerequisites and system requirements -Before you get started, please see [the main Microsoft Defender ATP for Mac page]((microsoft-defender-atp.md)) for a description of prerequisites and system requirements for the current software version. +Before you get started, please see [the main Microsoft Defender ATP for Mac page](microsoft-defender-atp.md) for a description of prerequisites and system requirements for the current software version. ## Download installation and onboarding packages @@ -47,7 +47,7 @@ Download the installation and onboarding packages from Windows Defender Security 6. From a command prompt, verify that you have the three files. Extract the contents of the .zip files: - + ```bash mavel-macmini:Downloads test$ ls -l total 721688 @@ -167,7 +167,7 @@ After Intune changes are propagated to the enrolled machines, you'll see it on t ## Test alert Run in Terminal the following command. It will download [a harmless file](https://en.wikipedia.org/wiki/EICAR_test_file) which will trigger a test detection. - + ```bash curl -o ~/Downloads/eicar.com.txt http://www.eicar.org/download/eicar.com.txt ``` diff --git a/windows/security/threat-protection/windows-defender-antivirus/microsoft-defender-atp-mac-install-with-jamf.md b/windows/security/threat-protection/windows-defender-antivirus/microsoft-defender-atp-mac-install-with-jamf.md index b2df2ab85f..a66f836f20 100644 --- a/windows/security/threat-protection/windows-defender-antivirus/microsoft-defender-atp-mac-install-with-jamf.md +++ b/windows/security/threat-protection/windows-defender-antivirus/microsoft-defender-atp-mac-install-with-jamf.md @@ -21,7 +21,7 @@ ms.topic: #conceptual **Applies to:** -[Windows Defender Advanced Threat Protection (Windows Defender ATP) for Mac](https://go.microsoft.com/fwlink/p/?linkid=???To-Add???) +[Windows Defender Advanced Threat Protection (Windows Defender ATP) for Mac](microsoft-defender-atp.md) >[!IMPORTANT] >Some information relates to prereleased product which may be substantially modified before it's commercially released. Microsoft makes no warranties, express or implied, with respect to the information provided here. @@ -31,7 +31,7 @@ Microsoft Defender ATP for Mac is not yet widely available, and this topic only ## Prerequisites and system requirements -Before you get started, please see [the main Microsoft Defender ATP for Mac page]((microsoft-defender-atp.md)) for a description of prerequisites and system requirements for the current software version. +Before you get started, please see [the main Microsoft Defender ATP for Mac page](microsoft-defender-atp.md) for a description of prerequisites and system requirements for the current software version. In addition, for JAMF deployment, you need to be familiar with JAMF administration tasks, have a JAMF tenant, and know how to deploy packages. This includes having a properly configured distribution point. JAMF has many ways to complete the same task. These instructions provide an example for most common processes. Your organization might use a different workflow. @@ -48,7 +48,7 @@ Download the installation and onboarding packages from Windows Defender Security 5. From a command prompt, verify that you have the two files. Extract the contents of the .zip files: - + ```bash mavel-macmini:Downloads test$ ls -l total 721160 @@ -165,24 +165,24 @@ After the policy is applied, you'll see the Microsoft Defender icon in the macOS You can monitor policy installation on a machine by following the JAMF's log file: ```bash -mavel-mojave:~ testuser$ tail -f /var/log/jamf.log -Thu Feb 21 11:11:41 mavel-mojave jamf[7960]: No patch policies were found. -Thu Feb 21 11:16:41 mavel-mojave jamf[8051]: Checking for policies triggered by "recurring check-in" for user "testuser"... -Thu Feb 21 11:16:43 mavel-mojave jamf[8051]: Executing Policy WDAV -Thu Feb 21 11:17:02 mavel-mojave jamf[8051]: Installing Microsoft Defender... -Thu Feb 21 11:17:23 mavel-mojave jamf[8051]: Successfully installed Microsoft Defender. -Thu Feb 21 11:17:23 mavel-mojave jamf[8051]: Checking for patches... -Thu Feb 21 11:17:23 mavel-mojave jamf[8051]: No patch policies were found. + mavel-mojave:~ testuser$ tail -f /var/log/jamf.log + Thu Feb 21 11:11:41 mavel-mojave jamf[7960]: No patch policies were found. + Thu Feb 21 11:16:41 mavel-mojave jamf[8051]: Checking for policies triggered by "recurring check-in" for user "testuser"... + Thu Feb 21 11:16:43 mavel-mojave jamf[8051]: Executing Policy WDAV + Thu Feb 21 11:17:02 mavel-mojave jamf[8051]: Installing Microsoft Defender... + Thu Feb 21 11:17:23 mavel-mojave jamf[8051]: Successfully installed Microsoft Defender. + Thu Feb 21 11:17:23 mavel-mojave jamf[8051]: Checking for patches... + Thu Feb 21 11:17:23 mavel-mojave jamf[8051]: No patch policies were found. ``` You can also check the onboarding status: ```bash -mavel-mojave:~ testuser$ sudo /Library/Extensions/wdavkext.kext/Contents/Resources/Tools/wdavconfig.py -uuid : 69EDB575-22E1-53E1-83B8-2E1AB1E410A6 -orgid : 79109c9d-83bb-4f3e-9152-8d75ee59ae22 -orgid managed : 79109c9d-83bb-4f3e-9152-8d75ee59ae22 -orgid effective : 79109c9d-83bb-4f3e-9152-8d75ee59ae22 + mavel-mojave:~ testuser$ sudo /Library/Extensions/wdavkext.kext/Contents/Resources/Tools/wdavconfig.py + uuid : 69EDB575-22E1-53E1-83B8-2E1AB1E410A6 + orgid : 79109c9d-83bb-4f3e-9152-8d75ee59ae22 + orgid managed : 79109c9d-83bb-4f3e-9152-8d75ee59ae22 + orgid effective : 79109c9d-83bb-4f3e-9152-8d75ee59ae22 ``` - **orgid/orgid managed**: This is the Microsoft Defender ATP org id specified in the configuration profile. If this value is blank, then the Configuration Profile was not properly set. @@ -194,7 +194,7 @@ orgid effective : 79109c9d-83bb-4f3e-9152-8d75ee59ae22 You can check that machines are correctly onboarded by creating a script. For example, the following script checks that enrolled machines are onboarded: ```bash -sudo /Library/Extensions/wdavkext.kext/Contents/Resources/Tools/wdavconfig.py | grep -E 'orgid effective : [-a-zA-Z0-9]+' + sudo /Library/Extensions/wdavkext.kext/Contents/Resources/Tools/wdavconfig.py | grep -E 'orgid effective : [-a-zA-Z0-9]+' ``` This script returns 0 if Microsoft Defender ATP is registered with the Windows Defender ATP service, and another exit code if it is not installed or registered. @@ -202,7 +202,7 @@ This script returns 0 if Microsoft Defender ATP is registered with the Windows D ## Test alert Run in Terminal the following command. It will download [a harmless file](https://en.wikipedia.org/wiki/EICAR_test_file) which will trigger a test detection. - + ```bash curl -o ~/Downloads/eicar.com.txt http://www.eicar.org/download/eicar.com.txt ``` diff --git a/windows/security/threat-protection/windows-defender-antivirus/microsoft-defender-atp-mac-resources.md b/windows/security/threat-protection/windows-defender-antivirus/microsoft-defender-atp-mac-resources.md index 03532ddfb4..8967cf9879 100644 --- a/windows/security/threat-protection/windows-defender-antivirus/microsoft-defender-atp-mac-resources.md +++ b/windows/security/threat-protection/windows-defender-antivirus/microsoft-defender-atp-mac-resources.md @@ -21,7 +21,7 @@ ms.topic: #conceptual **Applies to:** -[Windows Defender Advanced Threat Protection (Windows Defender ATP) for Mac](https://go.microsoft.com/fwlink/p/?linkid=???To-Add???) +[Windows Defender Advanced Threat Protection (Windows Defender ATP) for Mac](microsoft-defender-atp.md) >[!IMPORTANT] >Some information relates to prereleased product which may be substantially modified before it's commercially released. Microsoft makes no warranties, express or implied, with respect to the information provided here. @@ -36,25 +36,25 @@ If you can reproduce a problem, please increase the logging level, run the syste 1) Increase logging level: ```bash - mavel-mojave:~ testuser$ mdatp --log-level verbose - Operation succeeded + mavel-mojave:~ testuser$ mdatp --log-level verbose + Operation succeeded ``` 2) Reproduce the problem 3) Run `mdatp --diagnostic` to backup Defender ATP's logs. The command will print out location with generated zip file. - ```bash - mavel-mojave:~ testuser$ mdatp --diagnostic --create - "/Library/Application Support/Microsoft/Defender/wdavdiag/d85e7032-adf8-434a-95aa-ad1d450b9a2f.zip" - ``` + ```bash + mavel-mojave:~ testuser$ mdatp --diagnostic --create + "/Library/Application Support/Microsoft/Defender/wdavdiag/d85e7032-adf8-434a-95aa-ad1d450b9a2f.zip" + ``` 4) Restore logging level: - ```bash - mavel-mojave:~ testuser$ mdatp --log-level info - Operation succeeded - ``` + ```bash + mavel-mojave:~ testuser$ mdatp --log-level info + Operation succeeded + ``` ## Managing from the command line diff --git a/windows/security/threat-protection/windows-defender-antivirus/microsoft-defender-atp-mac.md b/windows/security/threat-protection/windows-defender-antivirus/microsoft-defender-atp-mac.md index af6205c2ca..b22d38d977 100644 --- a/windows/security/threat-protection/windows-defender-antivirus/microsoft-defender-atp-mac.md +++ b/windows/security/threat-protection/windows-defender-antivirus/microsoft-defender-atp-mac.md @@ -69,7 +69,7 @@ After you've enabled the service, you may need to configure your network or fire The following table lists the services and their associated URLs that your network must be able to connect to. You should ensure there are no firewall or network filtering rules that would deny access to these URLs, or you may need to create an **allow** rule specifically for them: | Service | Description | URL | -| -------------- |:------------------------------------:| --------------------------------------------------------------------:| +| -------------- |:------------------------------------:|:--------------------------------------------------------------------:| | ATP | Advanced threat protection service | `https://x.cp.wd.microsoft.com/`, `https://*.x.cp.wd.microsoft.com/` | To test that a connection is not blocked, open `https://x.cp.wd.microsoft.com/api/report` and `https://wu-cdn.x.cp.wd.microsoft.com/` in a browser, or run the following command in Terminal: @@ -79,7 +79,7 @@ To test that a connection is not blocked, open `https://x.cp.wd.microsoft.com/ap OK ``` -We recommend to keep [System Integrity Protection](https://support.apple.com/en-us/HT204899) ([Wiki](https://en.wikipedia.org/wiki/System_Integrity_Protection)) enabled (default setting) on client machines. +We recommend to keep [System Integrity Protection](https://support.apple.com/en-us/HT204899) ([Wiki](https://en.wikipedia.org/wiki/System_Integrity_Protection) enabled (default setting) on client machines. SIP is a built-in macOS security feature that prevents low-level tampering with the OS. ## Resources From 6d337b5763f4a609a589efd5238cd8dd04ba0d58 Mon Sep 17 00:00:00 2001 From: ManikaDhiman Date: Wed, 8 May 2019 08:53:59 -0700 Subject: [PATCH 400/724] Minor update --- windows/client-management/mdm/policy-csp-windowslogon.md | 4 ++-- 1 file changed, 2 insertions(+), 2 deletions(-) diff --git a/windows/client-management/mdm/policy-csp-windowslogon.md b/windows/client-management/mdm/policy-csp-windowslogon.md index 885ae70ec7..bdf911fd67 100644 --- a/windows/client-management/mdm/policy-csp-windowslogon.md +++ b/windows/client-management/mdm/policy-csp-windowslogon.md @@ -165,11 +165,11 @@ This policy setting controls the configuration under which an automatic restart, If you enable this policy setting, you can choose one of the following two options: -- "Enabled if BitLocker is on and not suspended": Specifies that automatic sign on and lock occurs only if BitLocker is active and not suspended during the reboot or shutdown. Personal data can be accessed on the device’s hard drive at this time if BitLocker is not on or suspended during an update. BitLocker suspension temporarily removes protection for system components and data but may be needed in certain circumstances to successfully update boot-critical components. +- Enabled if BitLocker is on and not suspended: Specifies that automatic sign on and lock occurs only if BitLocker is active and not suspended during the reboot or shutdown. Personal data can be accessed on the device’s hard drive at this time if BitLocker is not on or suspended during an update. BitLocker suspension temporarily removes protection for system components and data but may be needed in certain circumstances to successfully update boot-critical components. BitLocker is suspended during updates if: - The device does not have TPM 2.0 and PCR7 - The device does not use a TPM-only protector -- "Always Enabled": Specifies that automatic sign on happens even if BitLocker is off or suspended during reboot or shutdown. When BitLocker is not enabled, personal data is accessible on the hard drive. Automatic restart and sign on should only be run under this condition if you are confident that the configured device is in a secure physical location. +- Always Enabled: Specifies that automatic sign on happens even if BitLocker is off or suspended during reboot or shutdown. When BitLocker is not enabled, personal data is accessible on the hard drive. Automatic restart and sign on should only be run under this condition if you are confident that the configured device is in a secure physical location. If you disable or do not configure this setting, automatic sign on defaults to the “Enabled if BitLocker is on and not suspended” behavior. From 3bb30fe435131c2553ee9b848f5e4f27ad1226f4 Mon Sep 17 00:00:00 2001 From: Daniel Simpson Date: Wed, 8 May 2019 09:23:19 -0700 Subject: [PATCH 401/724] Revert "WIP - update microsoft-defender-atp-mac.md" --- ...osoft-defender-atp-mac-install-manually.md | 127 ----- ...ft-defender-atp-mac-install-with-intune.md | 185 ------- ...soft-defender-atp-mac-install-with-jamf.md | 220 -------- .../microsoft-defender-atp-mac-resources.md | 153 ------ .../microsoft-defender-atp-mac.md | 489 ++++++++++++++++-- 5 files changed, 456 insertions(+), 718 deletions(-) delete mode 100644 windows/security/threat-protection/windows-defender-antivirus/microsoft-defender-atp-mac-install-manually.md delete mode 100644 windows/security/threat-protection/windows-defender-antivirus/microsoft-defender-atp-mac-install-with-intune.md delete mode 100644 windows/security/threat-protection/windows-defender-antivirus/microsoft-defender-atp-mac-install-with-jamf.md delete mode 100644 windows/security/threat-protection/windows-defender-antivirus/microsoft-defender-atp-mac-resources.md diff --git a/windows/security/threat-protection/windows-defender-antivirus/microsoft-defender-atp-mac-install-manually.md b/windows/security/threat-protection/windows-defender-antivirus/microsoft-defender-atp-mac-install-manually.md deleted file mode 100644 index 9b90ab16b4..0000000000 --- a/windows/security/threat-protection/windows-defender-antivirus/microsoft-defender-atp-mac-install-manually.md +++ /dev/null @@ -1,127 +0,0 @@ ---- -title: Installing Microsoft Defender ATP for Mac with JAMF -description: Describes how to install Microsoft Defender ATP for Mac, using JAMF. -keywords: microsoft, defender, atp, mac, installation, deploy, uninstallation, intune, jamf, macos, mojave, high sierra, sierra -search.product: eADQiWindows 10XVcnh -search.appverid: #met150 -ms.prod: w10 -ms.mktglfcycl: deploy -ms.sitesec: library -ms.pagetype: security -ms.author: v-maave -author: martyav -ms.localizationpriority: #medium -manager: dansimp -audience: ITPro -ms.collection: M365-security-compliance -ms.topic: #conceptual ---- - -# Manual deployment - -**Applies to:** - -[Windows Defender Advanced Threat Protection (Windows Defender ATP) for Mac](microsoft-defender-atp.md) - ->[!IMPORTANT] ->Some information relates to prereleased product which may be substantially modified before it's commercially released. Microsoft makes no warranties, express or implied, with respect to the information provided here. - -This topic describes how to install Microsoft Defender ATP for Mac. It supports the preview program and the information here is subject to change. -Microsoft Defender ATP for Mac is not yet widely available, and this topic only applies to enterprise customers who have been accepted into the preview program. - -## Prerequisites and system requirements - -Before you get started, please see [the main Microsoft Defender ATP for Mac page](microsoft-defender-atp.md) for a description of prerequisites and system requirements for the current software version. - -## Download installation and onboarding packages - -Download the installation and onboarding packages from Windows Defender Security Center: - -1. In Windows Defender Security Center, go to **Settings > Machine Management > Onboarding**. -2. In Section 1 of the page, set operating system to **Linux, macOS, iOS or Android** and Deployment method to **Local script**. -3. In Section 2 of the page, select **Download installation package**. Save it as wdav.pkg to a local directory. -4. In Section 2 of the page, select **Download onboarding package**. Save it as WindowsDefenderATPOnboardingPackage.zip to the same directory. - - ![Windows Defender Security Center screenshot](images/MDATP_2_IntuneAppUtil.png) - -5. From a command prompt, verify that you have the two files. - Extract the contents of the .zip files: - - ```bash - mavel-macmini:Downloads test$ ls -l - total 721152 - -rw-r--r-- 1 test staff 6185 Mar 15 10:45 WindowsDefenderATPOnboardingPackage.zip - -rw-r--r-- 1 test staff 354531845 Mar 13 08:57 wdav.pkg - mavel-macmini:Downloads test$ unzip WindowsDefenderATPOnboardingPackage.zip - Archive: WindowsDefenderATPOnboardingPackage.zip - inflating: WindowsDefenderATPOnboarding.py - ``` - -## Application installation - -To complete this process, you must have admin privileges on the machine. - -1. Navigate to the downloaded wdav.pkg in Finder and open it. - - ![App install screenshot](images/MDATP_28_AppInstall.png) - -2. Select **Continue**, agree with the License terms, and enter the password when prompted. - - ![App install screenshot](images/MDATP_29_AppInstallLogin.png) - - > [!IMPORTANT] - > You will be prompted to allow a driver from Microsoft to be installed (either "System Exception Blocked" or "Installation is on hold" or both. The driver must be allowed to be installed. - - ![App install screenshot](images/MDATP_30_SystemExtension.png) - -3. Select **Open Security Preferences** or **Open System Preferences > Security & Privacy**. Select **Allow**: - - ![Security and privacy window screenshot](images/MDATP_31_SecurityPrivacySettings.png) - -The installation will proceed. - -> [!NOTE] -> If you don't select **Allow**, the installation will fail after 5 minutes. You can restart it again at any time. - -## Client configuration - -1. Copy wdav.pkg and WindowsDefenderATPOnboarding.py to the machine where you deploy Microsoft Defender ATP for Mac. - - The client machine is not associated with orgId. Note that the orgid is blank. - - ```bash - mavel-mojave:wdavconfig testuser$ sudo /Library/Extensions/wdavkext.kext/Contents/Resources/Tools/wdavconfig.py - uuid : 69EDB575-22E1-53E1-83B8-2E1AB1E410A6 - orgid : - ``` - -2. Install the configuration file on a client machine: - - ```bash - mavel-mojave:wdavconfig testuser$ python WindowsDefenderATPOnboarding.py - Generating /Library/Application Support/Microsoft/Defender/com.microsoft.wdav.atp.plist ... (You may be required to enter sudos password) - ``` - -3. Verify that the machine is now associated with orgId: - - ```bash - mavel-mojave:wdavconfig testuser$ sudo /Library/Extensions/wdavkext.kext/Contents/Resources/Tools/wdavconfig.py - uuid : 69EDB575-22E1-53E1-83B8-2E1AB1E410A6 - orgid : E6875323-A6C0-4C60-87AD-114BBE7439B8 - ``` - -After installation, you'll see the Microsoft Defender icon in the macOS status bar in the top-right corner. - - ![Microsoft Defender icon in status bar screenshot](images/MDATP_Icon_Bar.png) - -## Test alert - -Run in Terminal the following command. It will download [a harmless file](https://en.wikipedia.org/wiki/EICAR_test_file) which will trigger a test detection. - - ```bash - curl -o ~/Downloads/eicar.com.txt http://www.eicar.org/download/eicar.com.txt - ``` - -You will get a "Threats found" notification, you can inspect threat's details in the Protection history. - -Soon after that you'll get an alert in the ATP Portal. diff --git a/windows/security/threat-protection/windows-defender-antivirus/microsoft-defender-atp-mac-install-with-intune.md b/windows/security/threat-protection/windows-defender-antivirus/microsoft-defender-atp-mac-install-with-intune.md deleted file mode 100644 index b145ab592c..0000000000 --- a/windows/security/threat-protection/windows-defender-antivirus/microsoft-defender-atp-mac-install-with-intune.md +++ /dev/null @@ -1,185 +0,0 @@ ---- -title: Installing Microsoft Defender ATP for Mac with Microsoft Intune -description: Describes how to install Microsoft Defender ATP for Mac, using Microsoft Intune. -keywords: microsoft, defender, atp, mac, installation, deploy, uninstallation, intune, jamf, macos, mojave, high sierra, sierra -search.product: eADQiWindows 10XVcnh -search.appverid: #met150 -ms.prod: w10 -ms.mktglfcycl: deploy -ms.sitesec: library -ms.pagetype: security -ms.author: v-maave -author: martyav -ms.localizationpriority: #medium -manager: dansimp -audience: ITPro -ms.collection: M365-security-compliance -ms.topic: #conceptual ---- - -# Microsoft Intune-based deployment - -**Applies to:** - -[Windows Defender Advanced Threat Protection (Windows Defender ATP) for Mac](microsoft-defender-atp.md) - ->[!IMPORTANT] ->Some information relates to prereleased product which may be substantially modified before it's commercially released. Microsoft makes no warranties, express or implied, with respect to the information provided here. - -This topic describes how to install Microsoft Defender ATP for Mac. It supports the preview program and the information here is subject to change. -Microsoft Defender ATP for Mac is not yet widely available, and this topic only applies to enterprise customers who have been accepted into the preview program. - -## Prerequisites and system requirements - -Before you get started, please see [the main Microsoft Defender ATP for Mac page](microsoft-defender-atp.md) for a description of prerequisites and system requirements for the current software version. - -## Download installation and onboarding packages - -Download the installation and onboarding packages from Windows Defender Security Center: - -1. In Windows Defender Security Center, go to **Settings > Machine Management > Onboarding**. -2. In Section 1 of the page, set operating system to **Linux, macOS, iOS or Android** and Deployment method to **Mobile Device Management / Microsoft Intune**. -3. In Section 2 of the page, select **Download installation package**. Save it as wdav.pkg to a local directory. -4. In Section 2 of the page, select **Download onboarding package**. Save it as WindowsDefenderATPOnboardingPackage.zip to the same directory. -5. Download IntuneAppUtil from [https://docs.microsoft.com/en-us/intune/lob-apps-macos](https://docs.microsoft.com/en-us/intune/lob-apps-macos). - - ![Windows Defender Security Center screenshot](images/MDATP_2_IntuneAppUtil.png) - -6. From a command prompt, verify that you have the three files. - Extract the contents of the .zip files: - - ```bash - mavel-macmini:Downloads test$ ls -l - total 721688 - -rw-r--r-- 1 test staff 269280 Mar 15 11:25 IntuneAppUtil - -rw-r--r-- 1 test staff 11821 Mar 15 09:23 WindowsDefenderATPOnboardingPackage.zip - -rw-r--r-- 1 test staff 354531845 Mar 13 08:57 wdav.pkg - mavel-macmini:Downloads test$ unzip WindowsDefenderATPOnboardingPackage.zip - Archive: WindowsDefenderATPOnboardingPackage.zip - warning: WindowsDefenderATPOnboardingPackage.zip appears to use backslashes as path separators - inflating: intune/kext.xml - inflating: intune/WindowsDefenderATPOnboarding.xml - inflating: jamf/WindowsDefenderATPOnboarding.plist - mavel-macmini:Downloads test$ - ``` - -7. Make IntuneAppUtil an executable: - - ```mavel-macmini:Downloads test$ chmod +x IntuneAppUtil``` - -8. Create the wdav.pkg.intunemac package from wdav.pkg: - - ```bash - mavel-macmini:Downloads test$ ./IntuneAppUtil -c wdav.pkg -o . -i "com.microsoft.wdav" -n "1.0.0" - Microsoft Intune Application Utility for Mac OS X - Version: 1.0.0.0 - Copyright 2018 Microsoft Corporation - - Creating intunemac file for /Users/test/Downloads/wdav.pkg - Composing the intunemac file output - Output written to ./wdav.pkg.intunemac. - - IntuneAppUtil successfully processed "wdav.pkg", - to deploy refer to the product documentation. - ``` - -## Client Machine Setup - -You need no special provisioning for a Mac machine beyond a standard [Company Portal installation](https://docs.microsoft.com/en-us/intune-user-help/enroll-your-device-in-intune-macos-cp). - -1. You'll be asked to confirm device management. - -![Confirm device management screenshot](images/MDATP_3_ConfirmDeviceMgmt.png) - -Select Open System Preferences, locate Management Profile on the list and select the **Approve...** button. Your Management Profile would be displayed as **Verified**: - -![Management profile screenshot](images/MDATP_4_ManagementProfile.png) - -2. Select the **Continue** button and complete the enrollment. - -You can enroll additional machines. Optionally, you can do it later, after system configuration and application package are provisioned. - -3. In Intune, open the **Manage > Devices > All devices** blade. You'll see your machine: - -![Add Devices screenshot](images/MDATP_5_allDevices.png) - -## Create System Configuration profiles - -1. In Intune open the **Manage > Device configuration** blade. Select **Manage > Profiles > Create Profile**. -2. Choose a name for the profile. Change **Platform=macOS**, **Profile type=Custom**. Select **Configure**. -3. Open the configuration profile and upload intune/kext.xml. This file was created during the Generate settings step above. -4. Select **OK**. - - ![System configuration profiles screenshot](images/MDATP_6_SystemConfigurationProfiles.png) - -5. Select **Manage > Assignments**. In the **Include** tab, select **Assign to All Users & All devices**. -6. Repeat these steps with the second profile. -7. Create Profile one more time, give it a name, upload the intune/WindowsDefenderATPOnboarding.xml file. -8. Select **Manage > Assignments**. In the Include tab, select **Assign to All Users & All devices**. - -After Intune changes are propagated to the enrolled machines, you'll see it on the **Monitor > Device status** blade: - -![System configuration profiles screenshot](images/MDATP_7_DeviceStatusBlade.png) - -## Publish application - -1. In Intune, open the **Manage > Client apps** blade. Select **Apps > Add**. -2. Select **App type=Other/Line-of-business app**. -3. Select **file=wdav.pkg.intunemac**. Select **OK** to upload. -4. Select **Configure** and add the required information. -5. Use **macOS Sierra 10.12** as the minimum OS. Other settings can be any other value. - - ![Device status blade screenshot](images/MDATP_8_IntuneAppInfo.png) - -6. Select **OK** and **Add**. - - ![Device status blade screenshot](images/MDATP_9_IntunePkgInfo.png) - -7. It will take a while to upload the package. After it's done, select the name and then go to **Assignments** and **Add group**. - - ![Client apps screenshot](images/MDATP_10_ClientApps.png) - -8. Change **Assignment type=Required**. -9. Select **Included Groups**. Select **Make this app required for all devices=Yes**. Select **Select group to include** and add a group that contains the users you want to target. Select **OK** and **Save**. - - ![Intune assignments info screenshot](images/MDATP_11_Assignments.png) - -10. After some time the application will be published to all enrolled machines. You'll see it on the **Monitor > Device** install status blade: - - ![Intune device status screenshot](images/MDATP_12_DeviceInstall.png) - -## Verify client machine state - -1. After the configuration profiles are deployed to your machines, on your Mac device, open **System Preferences > Profiles**. - - ![System Preferences screenshot](images/MDATP_13_SystemPreferences.png) - ![System Preferences Profiles screenshot](images/MDATP_14_SystemPreferencesProfiles.png) - -2. Verify the three profiles listed there: - ![Profiles screenshot](images/MDATP_15_ManagementProfileConfig.png) - -3. The **Management Profile** should be the Intune system profile. -4. wdav-config and wdav-kext are system configuration profiles that we added in Intune. -5. You should also see the Microsoft Defender icon in the top-right corner: - - ![Microsoft Defender icon in status bar screenshot](images/MDATP_Icon_Bar.png) - -## Test alert - -Run in Terminal the following command. It will download [a harmless file](https://en.wikipedia.org/wiki/EICAR_test_file) which will trigger a test detection. - - ```bash - curl -o ~/Downloads/eicar.com.txt http://www.eicar.org/download/eicar.com.txt - ``` - -You will get a "Threats found" notification, you can inspect threat's details in the Protection history. - -Soon after that you'll get an alert in the ATP Portal. - -## Logging installation issues - -See [Logging installation issues](microsoft-defender-atp-mac-resources#Logging-installation-issues) for more information on how to find the automatically generated log that is created by the installer when an error occurs. - -## Uninstallation - -See [Uninstalling](microsoft-defender-atp-mac-resources#Uninstalling) for details on how to remove Windows Defender ATP for Mac from client devices. \ No newline at end of file diff --git a/windows/security/threat-protection/windows-defender-antivirus/microsoft-defender-atp-mac-install-with-jamf.md b/windows/security/threat-protection/windows-defender-antivirus/microsoft-defender-atp-mac-install-with-jamf.md deleted file mode 100644 index a66f836f20..0000000000 --- a/windows/security/threat-protection/windows-defender-antivirus/microsoft-defender-atp-mac-install-with-jamf.md +++ /dev/null @@ -1,220 +0,0 @@ ---- -title: Installing Microsoft Defender ATP for Mac with JAMF -description: Describes how to install Microsoft Defender ATP for Mac, using JAMF. -keywords: microsoft, defender, atp, mac, installation, deploy, uninstallation, intune, jamf, macos, mojave, high sierra, sierra -search.product: eADQiWindows 10XVcnh -search.appverid: #met150 -ms.prod: w10 -ms.mktglfcycl: deploy -ms.sitesec: library -ms.pagetype: security -ms.author: v-maave -author: martyav -ms.localizationpriority: #medium -manager: dansimp -audience: ITPro -ms.collection: M365-security-compliance -ms.topic: #conceptual ---- - -# JAMF-based deployment - -**Applies to:** - -[Windows Defender Advanced Threat Protection (Windows Defender ATP) for Mac](microsoft-defender-atp.md) - ->[!IMPORTANT] ->Some information relates to prereleased product which may be substantially modified before it's commercially released. Microsoft makes no warranties, express or implied, with respect to the information provided here. - -This topic describes how to install Microsoft Defender ATP for Mac. It supports the preview program and the information here is subject to change. -Microsoft Defender ATP for Mac is not yet widely available, and this topic only applies to enterprise customers who have been accepted into the preview program. - -## Prerequisites and system requirements - -Before you get started, please see [the main Microsoft Defender ATP for Mac page](microsoft-defender-atp.md) for a description of prerequisites and system requirements for the current software version. - -In addition, for JAMF deployment, you need to be familiar with JAMF administration tasks, have a JAMF tenant, and know how to deploy packages. This includes having a properly configured distribution point. JAMF has many ways to complete the same task. These instructions provide an example for most common processes. Your organization might use a different workflow. - -## Download installation and onboarding packages - -Download the installation and onboarding packages from Windows Defender Security Center: - -1. In Windows Defender Security Center, go to **Settings > Machine Management > Onboarding**. -2. In Section 1 of the page, set operating system to **Linux, macOS, iOS or Android** and Deployment method to **Mobile Device Management / Microsoft Intune**. -3. In Section 2 of the page, select **Download installation package**. Save it as wdav.pkg to a local directory. -4. In Section 2 of the page, select **Download onboarding package**. Save it as WindowsDefenderATPOnboardingPackage.zip to the same directory. - - ![Windows Defender Security Center screenshot](images/MDATP_2_IntuneAppUtil.png) - -5. From a command prompt, verify that you have the two files. - Extract the contents of the .zip files: - - ```bash - mavel-macmini:Downloads test$ ls -l - total 721160 - -rw-r--r-- 1 test staff 11821 Mar 15 09:23 WindowsDefenderATPOnboardingPackage.zip - -rw-r--r-- 1 test staff 354531845 Mar 13 08:57 wdav.pkg - mavel-macmini:Downloads test$ unzip WindowsDefenderATPOnboardingPackage.zip - Archive: WindowsDefenderATPOnboardingPackage.zip - warning: WindowsDefenderATPOnboardingPackage.zip appears to use backslashes as path separators - inflating: intune/kext.xml - inflating: intune/WindowsDefenderATPOnboarding.xml - inflating: jamf/WindowsDefenderATPOnboarding.plist - mavel-macmini:Downloads test$ - ``` - -## Create JAMF Policies - -You need to create a configuration profile and a policy to start deploying Microsoft Defender ATP for Mac to client machines. - -### Configuration Profile - -The configuration profile contains one custom settings payload that includes: - -- Microsoft Defender ATP for Mac onboarding information -- Approved Kernel Extensions payload to enable the Microsoft kernel driver to run - -1. Upload jamf/WindowsDefenderATPOnboarding.plist as the Property List File. - - >[!NOTE] - > You must use exactly "com.microsoft.wdav.atp" as the Preference Domain. - - ![Configuration profile screenshot](images/MDATP_16_PreferenceDomain.png) - -### Approved Kernel Extension - -To approve the kernel extension: - -1. In **Computers > Configuration Profiles** select **Options > Approved Kernel Extensions**. -2. Use **UBF8T346G9** for Team Id. - -![Approved kernel extensions screenshot](images/MDATP_17_approvedKernelExtensions.png) - -#### Configuration Profile's Scope - -Configure the appropriate scope to specify the machines that will receive this configuration profile. - -Open Computers -> Configuration Profiles, select **Scope > Targets**. Select the appropriate Target computers. - -![Configuration profile scope screenshot](images/MDATP_18_ConfigurationProfilesScope.png) - -Save the **Configuration Profile**. - -Use the **Logs** tab to monitor deployment status for each enrolled machine. - -### Package - -1. Create a package in **Settings > Computer Management > Packages**. - - ![Computer management packages screenshot](images/MDATP_19_MicrosoftDefenderWDAVPKG.png) - -2. Upload wdav.pkg to the Distribution Point. -3. In the **filename** field, enter the name of the package. For example, wdav.pkg. - -### Policy - -Your policy should contain a single package for Microsoft Defender. - -![Microsoft Defender packages screenshot](images/MDATP_20_MicrosoftDefenderPackages.png) - -Configure the appropriate scope to specify the computers that will receive this policy. - -After you save the Configuration Profile, you can use the Logs tab to monitor the deployment status for each enrolled machine. - -## Client machine setup - -You need no special provisioning for a macOS computer beyond the standard JAMF Enrollment. - -> [!NOTE] -> After a computer is enrolled, it will show up in the Computers inventory (All Computers). - -1. Open the machine details, from **General** tab, and make sure that **User Approved MDM** is set to **Yes**. If it's set to No, the user needs to open **System Preferences > Profiles** and select **Approve** on the MDM Profile. - -![MDM approve button screenshot](images/MDATP_21_MDMProfile1.png) -![MDM screenshot](images/MDATP_22_MDMProfileApproved.png) - -After some time, the machine's User Approved MDM status will change to Yes. - -![MDM status screenshot](images/MDATP_23_MDMStatus.png) - -You can enroll additional machines now. Optionally, can do it after system configuration and application packages are provisioned. - -## Deployment - -Enrolled client machines periodically poll the JAMF Server and install new configuration profiles and policies as soon as they are detected. - -### Status on server - -You can monitor the deployment status in the Logs tab: - -- **Pending** means that the deployment is scheduled but has not yet happened -- **Completed** means that the deployment succeeded and is no longer scheduled - -![Status on server screenshot](images/MDATP_24_StatusOnServer.png) - -### Status on client machine - -After the Configuration Profile is deployed, you'll see the profile on the machine in the **System Preferences > Profiles >** Name of Configuration Profile. - -![Status on client screenshot](images/MDATP_25_StatusOnClient.png) - -After the policy is applied, you'll see the Microsoft Defender icon in the macOS status bar in the top-right corner. - -![Microsoft Defender icon in status bar screenshot](images/MDATP_Icon_Bar.png) - -You can monitor policy installation on a machine by following the JAMF's log file: - -```bash - mavel-mojave:~ testuser$ tail -f /var/log/jamf.log - Thu Feb 21 11:11:41 mavel-mojave jamf[7960]: No patch policies were found. - Thu Feb 21 11:16:41 mavel-mojave jamf[8051]: Checking for policies triggered by "recurring check-in" for user "testuser"... - Thu Feb 21 11:16:43 mavel-mojave jamf[8051]: Executing Policy WDAV - Thu Feb 21 11:17:02 mavel-mojave jamf[8051]: Installing Microsoft Defender... - Thu Feb 21 11:17:23 mavel-mojave jamf[8051]: Successfully installed Microsoft Defender. - Thu Feb 21 11:17:23 mavel-mojave jamf[8051]: Checking for patches... - Thu Feb 21 11:17:23 mavel-mojave jamf[8051]: No patch policies were found. -``` - -You can also check the onboarding status: - -```bash - mavel-mojave:~ testuser$ sudo /Library/Extensions/wdavkext.kext/Contents/Resources/Tools/wdavconfig.py - uuid : 69EDB575-22E1-53E1-83B8-2E1AB1E410A6 - orgid : 79109c9d-83bb-4f3e-9152-8d75ee59ae22 - orgid managed : 79109c9d-83bb-4f3e-9152-8d75ee59ae22 - orgid effective : 79109c9d-83bb-4f3e-9152-8d75ee59ae22 -``` - -- **orgid/orgid managed**: This is the Microsoft Defender ATP org id specified in the configuration profile. If this value is blank, then the Configuration Profile was not properly set. - -- **orgid effective**: This is the Microsoft Defender ATP org id currently in use. If it does not match the value in the Configuration Profile, then the configuration has not been refreshed. - -## Check onboarding status - -You can check that machines are correctly onboarded by creating a script. For example, the following script checks that enrolled machines are onboarded: - -```bash - sudo /Library/Extensions/wdavkext.kext/Contents/Resources/Tools/wdavconfig.py | grep -E 'orgid effective : [-a-zA-Z0-9]+' -``` - -This script returns 0 if Microsoft Defender ATP is registered with the Windows Defender ATP service, and another exit code if it is not installed or registered. - -## Test alert - -Run in Terminal the following command. It will download [a harmless file](https://en.wikipedia.org/wiki/EICAR_test_file) which will trigger a test detection. - - ```bash - curl -o ~/Downloads/eicar.com.txt http://www.eicar.org/download/eicar.com.txt - ``` - -You will get a "Threats found" notification, you can inspect threat's details in the Protection history. - -Soon after that you'll get an alert in the ATP Portal. - -## Logging installation issues - -See [Logging installation issues](microsoft-defender-atp-mac-resources#Logging-installation-issues) for more information on how to find the automatically generated log that is created by the installer when an error occurs. - -## Uninstallation - -See [Uninstalling](microsoft-defender-atp-mac-resources#Uninstalling) for details on how to remove Windows Defender ATP for Mac from client devices. \ No newline at end of file diff --git a/windows/security/threat-protection/windows-defender-antivirus/microsoft-defender-atp-mac-resources.md b/windows/security/threat-protection/windows-defender-antivirus/microsoft-defender-atp-mac-resources.md deleted file mode 100644 index 8967cf9879..0000000000 --- a/windows/security/threat-protection/windows-defender-antivirus/microsoft-defender-atp-mac-resources.md +++ /dev/null @@ -1,153 +0,0 @@ ---- -title: Microsoft Defender ATP for Mac Resources -description: Describes resources for Microsoft Defender ATP for Mac, including how to uninstall it, how to collect diagnostic logs, and known issues with the product. -keywords: microsoft, defender, atp, mac, installation, deploy, uninstallation, intune, jamf, macos, mojave, high sierra, sierra -search.product: eADQiWindows 10XVcnh -search.appverid: #met150 -ms.prod: w10 -ms.mktglfcycl: deploy -ms.sitesec: library -ms.pagetype: security -ms.author: v-maave -author: martyav -ms.localizationpriority: #medium -manager: dansimp -audience: ITPro -ms.collection: M365-security-compliance -ms.topic: #conceptual ---- - -# Resources - -**Applies to:** - -[Windows Defender Advanced Threat Protection (Windows Defender ATP) for Mac](microsoft-defender-atp.md) - ->[!IMPORTANT] ->Some information relates to prereleased product which may be substantially modified before it's commercially released. Microsoft makes no warranties, express or implied, with respect to the information provided here. - -This topic describes how to use, and details about, Microsoft Defender ATP for Mac. It supports the preview program and the information here is subject to change. -Microsoft Defender ATP for Mac is not yet widely available, and this topic only applies to enterprise customers who have been accepted into the preview program. - -## Collecting diagnostic information - -If you can reproduce a problem, please increase the logging level, run the system for some time, and restore the logging level to the default. - -1) Increase logging level: - -```bash - mavel-mojave:~ testuser$ mdatp --log-level verbose - Operation succeeded -``` - -2) Reproduce the problem - -3) Run `mdatp --diagnostic` to backup Defender ATP's logs. The command will print out location with generated zip file. - - ```bash - mavel-mojave:~ testuser$ mdatp --diagnostic --create - "/Library/Application Support/Microsoft/Defender/wdavdiag/d85e7032-adf8-434a-95aa-ad1d450b9a2f.zip" - ``` - -4) Restore logging level: - - ```bash - mavel-mojave:~ testuser$ mdatp --log-level info - Operation succeeded - ``` - -## Managing from the command line - -Important tasks, such as controlling product settings and triggering on-demand scans, can be done from the command line: - -|Group |Scenario |Command | -|-------------|-------------------------------------------|-----------------------------------------------------------------------| -|Configuration|Turn on/off real-time protection |`mdatp --config rtp [true/false]` | -|Configuration|Turn on/off cloud protection |`mdatp --config cloud [true/false]` | -|Configuration|Turn on/off product diagnostics |`mdatp --config diagnostic [true/false]` | -|Configuration|Turn on/off automatic sample submission |`mdatp --config sample-submission [true/false]` | -|Configuration|Turn on PUA protection |`mdatp --threat --type-handling potentially_unwanted_application block`| -|Configuration|Turn off PUA protection |`mdatp --threat --type-handling potentially_unwanted_application off` | -|Configuration|Turn on audit mode for PUA protection |`mdatp --threat --type-handling potentially_unwanted_application audit`| -|Diagnostics |Change the log level |`mdatp --log-level [error/warning/info/verbose]` | -|Diagnostics |Generate diagnostic logs |`mdatp --diagnostic --create` | -|Health |Check the product's health |`mdatp --health` | -|Health |Prints a single health metric |`mdatp --health [metric]` | -|Protection |Scan a path |`mdatp --scan --path [path]` | -|Protection |Do a quick scan |`mdatp --scan --quick` | -|Protection |Do a full scan |`mdatp --scan --full` | -|Protection |Cancel an ongoing on-demand scan |`mdatp --scan --cancel` | -|Protection |Request a definition update |`mdatp --definition-update` | - -## Logging installation issues - -If an error occurs during installation, the installer will only report a general failure. - -The detailed log will be saved to /Library/Logs/Microsoft/wdav.install.log. If you experience issues during installation, send us this file so we can help diagnose the cause. - -## Uninstalling - -There are several ways to uninstall Microsoft Defender ATP for Mac. Please note that while centrally managed uninstall is available on JAMF, it is not yet available for Microsoft Intune. - -### Within the GUI - -- Open **Finder > Applications**. Right click on **Microsoft Defender ATP > Move to Trash**. - -### From the command line - -- ```sudo rm -rf '/Applications/Microsoft Defender ATP'``` - -### With a script - -Create a script in **Settings > Computer Management > Scripts**. - -![Microsoft Defender uninstall screenshot](images/MDATP_26_Uninstall.png) - -For example, this script removes Microsoft Defender ATP from the /Applications directory: - -```bash - echo "Is WDAV installed?" - ls -ld '/Applications/Microsoft Defender ATP.app' 2>/dev/null - - echo "Uninstalling WDAV..." - rm -rf '/Applications/Microsoft Defender ATP.app' - - echo "Is WDAV still installed?" - ls -ld '/Applications/Microsoft Defender ATP.app' 2>/dev/null - - echo "Done!" -``` - -### With a JAMF policy - -If you are running JAMF, your policy should contain a single script: - -![Microsoft Defender uninstall script screenshot](images/MDATP_27_UninstallScript.png) - -Configure the appropriate scope in the **Scope** tab to specify the machines that will receive this policy. - -## What to expect in the ATP portal - -- AV alerts: - - Severity - - Scan type - - Device information (hostname, machine identifier, tenant identifier, app version, and OS type) - - File information (name, path, size, and hash) - - Threat information (name, type, and state) -- Device information: - - Machine identifier - - Tenant identifier - - App version - - Hostname - - OS type - - OS version - - Computer model - - Processor architecture - - Whether the device is a virtual machine - -## Known issues - -- Not fully optimized for performance or disk space yet. -- Full Windows Defender ATP integration is not available yet. -- Mac devices that switch networks may appear multiple times in the APT portal. -- Centrally managed uninstall via Intune is still in development. As an alternative, manually uninstall Microsoft Defender ATP for Mac from each client device. \ No newline at end of file diff --git a/windows/security/threat-protection/windows-defender-antivirus/microsoft-defender-atp-mac.md b/windows/security/threat-protection/windows-defender-antivirus/microsoft-defender-atp-mac.md index b22d38d977..cccde77573 100644 --- a/windows/security/threat-protection/windows-defender-antivirus/microsoft-defender-atp-mac.md +++ b/windows/security/threat-protection/windows-defender-antivirus/microsoft-defender-atp-mac.md @@ -22,40 +22,15 @@ ms.topic: conceptual >[!IMPORTANT] >Some information relates to prereleased product which may be substantially modified before it's commercially released. Microsoft makes no warranties, express or implied, with respect to the information provided here. -This topic describes how to install and use Microsoft Defender ATP for Mac. It supports the preview program and the information here is subject to change. -Microsoft Defender ATP for Mac is not yet widely available, and this topic only applies to enterprise customers who have been accepted into the preview program. - -## What’s new in the public preview - -We've been working hard through the private preview period, and we've heard your concerns. We've reduced the delay for when new Mac devices appear in the ATP console after they've been deployed. We've improved threat handling, and enhanced the user experience. We've also made numerous bug fixes. Other updates to Microsoft Defender ATP for Mac include: - -- Full accessibility -- Improved performance -- Localization for 37 languages -- Improved anti-tampering protections -- Feedback and samples can now be submitted via the GUI. -- Product health can be queried with JAMF or the command line. -- Admins can set their cloud preference for any location, not just for those in the US. - -## Installing and configuring - -There are various methods and deployment tools that you can use to install and configure Microsoft Defender ATP for Mac. -In general you'll need to take the following steps: - -- Ensure you have a Windows Defender ATP subscription and have access to the Windows Defender ATP Portal -- Deploy Microsoft Defender ATP for Mac using one of the following deployment methods: - - [Microsoft Intune-based deployment](microsoft-defender-atp-mac-install-with-intune) - - [JAMF-based deployment](microsoft-defender-atp-mac-install-with-jamf) - - [Manual deployment](microsoft-defender-atp-mac-install-manually) - -### Prerequisites +This topic describes how to install and use Microsoft Defender ATP for Mac. It supports the preview program and the information here is subject to change. +Microsoft Defender ATP for Mac is not yet widely available, and this topic only applies to enterprise customers who have been accepted into the preview program. +## Prerequisites You should have beginner-level experience in macOS and BASH scripting. You must have administrative privileges on the machine. You should also have access to Windows Defender Security Center. ### System Requirements - - macOS version: 10.14 (Mojave), 10.13 (High Sierra), 10.12 (Sierra) - Disk space during preview: 1GB @@ -69,19 +44,467 @@ After you've enabled the service, you may need to configure your network or fire The following table lists the services and their associated URLs that your network must be able to connect to. You should ensure there are no firewall or network filtering rules that would deny access to these URLs, or you may need to create an **allow** rule specifically for them: | Service | Description | URL | -| -------------- |:------------------------------------:|:--------------------------------------------------------------------:| +| -------------- |:------------------------------------:| --------------------------------------------------------------------:| | ATP | Advanced threat protection service | `https://x.cp.wd.microsoft.com/`, `https://*.x.cp.wd.microsoft.com/` | To test that a connection is not blocked, open `https://x.cp.wd.microsoft.com/api/report` and `https://wu-cdn.x.cp.wd.microsoft.com/` in a browser, or run the following command in Terminal: -```bash +``` mavel-mojave:~ testuser$ curl 'https://x.cp.wd.microsoft.com/api/report' OK ``` -We recommend to keep [System Integrity Protection](https://support.apple.com/en-us/HT204899) ([Wiki](https://en.wikipedia.org/wiki/System_Integrity_Protection) enabled (default setting) on client machines. +We recommend to keep [System Integrity Protection](https://support.apple.com/en-us/HT204899) ([Wiki](https://en.wikipedia.org/wiki/System_Integrity_Protection)) enabled (default setting) on client machines. SIP is a built-in macOS security feature that prevents low-level tampering with the OS. -## Resources +## Installation and configuration overview +There are various methods and deployment tools that you can use to install and configure Microsoft Defender ATP for Mac. +In general you'll need to take the following steps: + - Ensure you have a Windows Defender ATP subscription and have access to the Windows Defender ATP Portal + - Deploy Microsoft Defender ATP for Mac using one of the following deployment methods: + * [Microsoft Intune based deployment](#microsoft-intune-based-deployment) + * [JAMF based deployment](#jamf-based-deployment) + * [Manual deployment](#manual-deployment) -For further information on logging, uninstalling, the ATP portal, or known issues, see our [Resources](microsoft-defender-atp-mac-resources) page. \ No newline at end of file +## Microsoft Intune based deployment + +### Download installation and onboarding packages +Download the installation and onboarding packages from Windows Defender Security Center: +1. In Windows Defender Security Center, go to **Settings > Machine Management > Onboarding**. +2. In Section 1 of the page, set operating system to **Linux, macOS, iOS or Android** and Deployment method to **Mobile Device Management / Microsoft Intune**. +3. In Section 2 of the page, select **Download installation package**. Save it as wdav.pkg to a local directory. +4. In Section 2 of the page, select **Download onboarding package**. Save it as WindowsDefenderATPOnboardingPackage.zip to the same directory. +5. Download IntuneAppUtil from https://docs.microsoft.com/en-us/intune/lob-apps-macos. + + ![Windows Defender Security Center screenshot](images/MDATP_2_IntuneAppUtil.png) + +6. From a command prompt, verify that you have the three files. + Extract the contents of the .zip files: + + ``` + mavel-macmini:Downloads test$ ls -l + total 721688 + -rw-r--r-- 1 test staff 269280 Mar 15 11:25 IntuneAppUtil + -rw-r--r-- 1 test staff 11821 Mar 15 09:23 WindowsDefenderATPOnboardingPackage.zip + -rw-r--r-- 1 test staff 354531845 Mar 13 08:57 wdav.pkg + mavel-macmini:Downloads test$ unzip WindowsDefenderATPOnboardingPackage.zip + Archive: WindowsDefenderATPOnboardingPackage.zip + warning: WindowsDefenderATPOnboardingPackage.zip appears to use backslashes as path separators + inflating: intune/kext.xml + inflating: intune/WindowsDefenderATPOnboarding.xml + inflating: jamf/WindowsDefenderATPOnboarding.plist + mavel-macmini:Downloads test$ + ``` +7. Make IntuneAppUtil an executable: + + ```mavel-macmini:Downloads test$ chmod +x IntuneAppUtil``` + +8. Create the wdav.pkg.intunemac package from wdav.pkg: + + ``` + mavel-macmini:Downloads test$ ./IntuneAppUtil -c wdav.pkg -o . -i "com.microsoft.wdav" -n "1.0.0" + Microsoft Intune Application Utility for Mac OS X + Version: 1.0.0.0 + Copyright 2018 Microsoft Corporation + + Creating intunemac file for /Users/test/Downloads/wdav.pkg + Composing the intunemac file output + Output written to ./wdav.pkg.intunemac. + + IntuneAppUtil successfully processed "wdav.pkg", + to deploy refer to the product documentation. + ``` + +### Client Machine Setup +You need no special provisioning for a Mac machine beyond a standard [Company Portal installation](https://docs.microsoft.com/en-us/intune-user-help/enroll-your-device-in-intune-macos-cp). + +1. You'll be asked to confirm device management. + +![Confirm device management screenshot](images/MDATP_3_ConfirmDeviceMgmt.png) + +Select Open System Preferences, locate Management Profile on the list and select the **Approve...** button. Your Management Profile would be displayed as **Verified**: + +![Management profile screenshot](images/MDATP_4_ManagementProfile.png) + +2. Select the **Continue** button and complete the enrollment. + +You can enroll additional machines. Optionally, you can do it later, after system configuration and application package are provisioned. + +3. In Intune, open the **Manage > Devices > All devices** blade. You'll see your machine: + +![Add Devices screenshot](images/MDATP_5_allDevices.png) + +### Create System Configuration profiles +1. In Intune open the **Manage > Device configuration** blade. Select **Manage > Profiles > Create Profile**. +2. Choose a name for the profile. Change **Platform=macOS**, **Profile type=Custom**. Select **Configure**. +3. Open the configuration profile and upload intune/kext.xml. This file was created during the Generate settings step above. +4. Select **OK**. + + ![System configuration profiles screenshot](images/MDATP_6_SystemConfigurationProfiles.png) + +5. Select **Manage > Assignments**. In the **Include** tab, select **Assign to All Users & All devices**. +7. Repeat these steps with the second profile. +8. Create Profile one more time, give it a name, upload the intune/WindowsDefenderATPOnboarding.xml file. +9. Select **Manage > Assignments**. In the Include tab, select **Assign to All Users & All devices**. + +After Intune changes are propagated to the enrolled machines, you'll see it on the **Monitor > Device status** blade: + +![System configuration profiles screenshot](images/MDATP_7_DeviceStatusBlade.png) + +### Publish application + +1. In Intune, open the **Manage > Client apps** blade. Select **Apps > Add**. +2. Select **App type=Other/Line-of-business app**. +3. Select **file=wdav.pkg.intunemac**. Select **OK** to upload. +4. Select **Configure** and add the required information. +5. Use **macOS Sierra 10.12** as the minimum OS. Other settings can be any other value. + + ![Device status blade screenshot](images/MDATP_8_IntuneAppInfo.png) + +6. Select **OK** and **Add**. + + ![Device status blade screenshot](images/MDATP_9_IntunePkgInfo.png) + +7. It will take a while to upload the package. After it's done, select the name and then go to **Assignments** and **Add group**. + + ![Client apps screenshot](images/MDATP_10_ClientApps.png) + +8. Change **Assignment type=Required**. +9. Select **Included Groups**. Select **Make this app required for all devices=Yes**. Select **Select group to include** and add a group that contains the users you want to target. Select **OK** and **Save**. + + ![Intune assignments info screenshot](images/MDATP_11_Assignments.png) + +10. After some time the application will be published to all enrolled machines. You'll see it on the **Monitor > Device** install status blade: + + ![Intune device status screenshot](images/MDATP_12_DeviceInstall.png) + +### Verify client machine state +1. After the configuration profiles are deployed to your machines, on your Mac device, open **System Preferences > Profiles**. + + ![System Preferences screenshot](images/MDATP_13_SystemPreferences.png) + ![System Preferences Profiles screenshot](images/MDATP_14_SystemPreferencesProfiles.png) + +2. Verify the three profiles listed there: + ![Profiles screenshot](images/MDATP_15_ManagementProfileConfig.png) + +3. The **Management Profile** should be the Intune system profile. +4. wdav-config and wdav-kext are system configuration profiles that we added in Intune. +5. You should also see the Microsoft Defender icon in the top-right corner: + + ![Microsoft Defender icon in status bar screenshot](images/MDATP_Icon_Bar.png) + +## JAMF based deployment +### Prerequsites +You need to be familiar with JAMF administration tasks, have a JAMF tenant, and know how to deploy packages. This includes a properly configured distribution point. JAMF has many alternative ways to complete the same task. These instructions provide you an example for most common processes. Your organization might use a different workflow. + + +### Download installation and onboarding packages +Download the installation and onboarding packages from Windows Defender Security Center: +1. In Windows Defender Security Center, go to **Settings > Machine Management > Onboarding**. +2. In Section 1 of the page, set operating system to **Linux, macOS, iOS or Android** and Deployment method to **Mobile Device Management / Microsoft Intune**. +3. In Section 2 of the page, select **Download installation package**. Save it as wdav.pkg to a local directory. +4. In Section 2 of the page, select **Download onboarding package**. Save it as WindowsDefenderATPOnboardingPackage.zip to the same directory. + + ![Windows Defender Security Center screenshot](images/MDATP_2_IntuneAppUtil.png) + +5. From a command prompt, verify that you have the two files. + Extract the contents of the .zip files: + + ``` + mavel-macmini:Downloads test$ ls -l + total 721160 + -rw-r--r-- 1 test staff 11821 Mar 15 09:23 WindowsDefenderATPOnboardingPackage.zip + -rw-r--r-- 1 test staff 354531845 Mar 13 08:57 wdav.pkg + mavel-macmini:Downloads test$ unzip WindowsDefenderATPOnboardingPackage.zip + Archive: WindowsDefenderATPOnboardingPackage.zip + warning: WindowsDefenderATPOnboardingPackage.zip appears to use backslashes as path separators + inflating: intune/kext.xml + inflating: intune/WindowsDefenderATPOnboarding.xml + inflating: jamf/WindowsDefenderATPOnboarding.plist + mavel-macmini:Downloads test$ + ``` + +### Create JAMF Policies +You need to create a configuration profile and a policy to start deploying Microsoft Defender ATP for Mac to client machines. + +#### Configuration Profile +The configuration profile contains one custom settings payload that includes: + +- Microsoft Defender ATP for Mac onboarding information +- Approved Kernel Extensions payload to enable the Microsoft kernel driver to run + + +1. Upload jamf/WindowsDefenderATPOnboarding.plist as the Property List File. + + >[!NOTE] + > You must use exactly "com.microsoft.wdav.atp" as the Preference Domain. + + ![Configuration profile screenshot](images/MDATP_16_PreferenceDomain.png) + +#### Approved Kernel Extension + +To approve the kernel extension: +1. In **Computers > Configuration Profiles** select **Options > Approved Kernel Extensions**. +2. Use **UBF8T346G9** for Team Id. + +![Approved kernel extensions screenshot](images/MDATP_17_approvedKernelExtensions.png) + +#### Configuration Profile's Scope +Configure the appropriate scope to specify the machines that will receive this configuration profile. + +Open Computers -> Configuration Profiles, select **Scope > Targets**. Select the appropriate Target computers. + +![Configuration profile scope screenshot](images/MDATP_18_ConfigurationProfilesScope.png) + +Save the **Configuration Profile**. + +Use the **Logs** tab to monitor deployment status for each enrolled machine. + +#### Package +1. Create a package in **Settings > Computer Management > Packages**. + + ![Computer management packages screenshot](images/MDATP_19_MicrosoftDefenderWDAVPKG.png) + +2. Upload wdav.pkg to the Distribution Point. +3. In the **filename** field, enter the name of the package. For example, wdav.pkg. + +#### Policy +Your policy should contain a single package for Microsoft Defender. + +![Microsoft Defender packages screenshot](images/MDATP_20_MicrosoftDefenderPackages.png) + +Configure the appropriate scope to specify the computers that will receive this policy. + +After you save the Configuration Profile, you can use the Logs tab to monitor the deployment status for each enrolled machine. + +### Client machine setup +You need no special provisioning for a macOS computer beyond the standard JAMF Enrollment. + +> [!NOTE] +> After a computer is enrolled, it will show up in the Computers inventory (All Computers). + +1. Open the machine details, from **General** tab, and make sure that **User Approved MDM** is set to **Yes**. If it's set to No, the user needs to open **System Preferences > Profiles** and select **Approve** on the MDM Profile. + +![MDM approve button screenshot](images/MDATP_21_MDMProfile1.png) +![MDM screenshot](images/MDATP_22_MDMProfileApproved.png) + +After some time, the machine's User Approved MDM status will change to Yes. + +![MDM status screenshot](images/MDATP_23_MDMStatus.png) + +You can enroll additional machines now. Optionally, can do it after system configuration and application packages are provisioned. + +### Deployment +Enrolled client machines periodically poll the JAMF Server and install new configuration profiles and policies as soon as they are detected. + +#### Status on server +You can monitor the deployment status in the Logs tab: + - **Pending** means that the deployment is scheduled but has not yet happened + - **Completed** means that the deployment succeeded and is no longer scheduled + +![Status on server screenshot](images/MDATP_24_StatusOnServer.png) + + +#### Status on client machine +After the Configuration Profile is deployed, you'll see the profile on the machine in the **System Preferences > Profiles >** Name of Configuration Profile. + +![Status on client screenshot](images/MDATP_25_StatusOnClient.png) + +After the policy is applied, you'll see the Microsoft Defender icon in the macOS status bar in the top-right corner. + +![Microsoft Defender icon in status bar screenshot](images/MDATP_Icon_Bar.png) + +You can monitor policy installation on a machine by following the JAMF's log file: + +``` +mavel-mojave:~ testuser$ tail -f /var/log/jamf.log +Thu Feb 21 11:11:41 mavel-mojave jamf[7960]: No patch policies were found. +Thu Feb 21 11:16:41 mavel-mojave jamf[8051]: Checking for policies triggered by "recurring check-in" for user "testuser"... +Thu Feb 21 11:16:43 mavel-mojave jamf[8051]: Executing Policy WDAV +Thu Feb 21 11:17:02 mavel-mojave jamf[8051]: Installing Microsoft Defender... +Thu Feb 21 11:17:23 mavel-mojave jamf[8051]: Successfully installed Microsoft Defender. +Thu Feb 21 11:17:23 mavel-mojave jamf[8051]: Checking for patches... +Thu Feb 21 11:17:23 mavel-mojave jamf[8051]: No patch policies were found. +``` + +You can also check the onboarding status: +``` +mavel-mojave:~ testuser$ sudo /Library/Extensions/wdavkext.kext/Contents/Resources/Tools/wdavconfig.py +uuid : 69EDB575-22E1-53E1-83B8-2E1AB1E410A6 +orgid : 79109c9d-83bb-4f3e-9152-8d75ee59ae22 +orgid managed : 79109c9d-83bb-4f3e-9152-8d75ee59ae22 +orgid effective : 79109c9d-83bb-4f3e-9152-8d75ee59ae22 +``` + +- **orgid/orgid managed**: This is the Microsoft Defender ATP org id specified in the configuration profile. If this value is blank, then the Configuration Profile was not properly set. + +- **orgid effective**: This is the Microsoft Defender ATP org id currently in use. If it does not match the value in the Configuration Profile, then the configuration has not been refreshed. + +### Uninstalling Microsoft Defender ATP for Mac +#### Uninstalling with a script + +Create a script in **Settings > Computer Management > Scripts**. + +![Microsoft Defender uninstall screenshot](images/MDATP_26_Uninstall.png) + +For example, this script removes Microsoft Defender ATP from the /Applications directory: + +``` +echo "Is WDAV installed?" +ls -ld '/Applications/Microsoft Defender ATP.app' 2>/dev/null + +echo "Uninstalling WDAV..." +rm -rf '/Applications/Microsoft Defender ATP.app' + +echo "Is WDAV still installed?" +ls -ld '/Applications/Microsoft Defender ATP.app' 2>/dev/null + +echo "Done!" +``` + +#### Uninstalling with a policy +Your policy should contain a single script: + +![Microsoft Defender uninstall script screenshot](images/MDATP_27_UninstallScript.png) + +Configure the appropriate scope in the **Scope** tab to specify the machines that will receive this policy. + +### Check onboarding status + +You can check that machines are correctly onboarded by creating a script. For example, the following script checks that enrolled machines are onboarded: + +``` +sudo /Library/Extensions/wdavkext.kext/Contents/Resources/Tools/wdavconfig.py | grep -E 'orgid effective : [-a-zA-Z0-9]+' +``` + +This script returns 0 if Microsoft Defender ATP is registered with the Windows Defender ATP service, and another exit code if it is not installed or registered. + +## Manual deployment + +### Download installation and onboarding packages +Download the installation and onboarding packages from Windows Defender Security Center: +1. In Windows Defender Security Center, go to **Settings > Machine Management > Onboarding**. +2. In Section 1 of the page, set operating system to **Linux, macOS, iOS or Android** and Deployment method to **Local script**. +3. In Section 2 of the page, select **Download installation package**. Save it as wdav.pkg to a local directory. +4. In Section 2 of the page, select **Download onboarding package**. Save it as WindowsDefenderATPOnboardingPackage.zip to the same directory. + + ![Windows Defender Security Center screenshot](images/MDATP_2_IntuneAppUtil.png) + +5. From a command prompt, verify that you have the two files. + Extract the contents of the .zip files: + + ``` + mavel-macmini:Downloads test$ ls -l + total 721152 + -rw-r--r-- 1 test staff 6185 Mar 15 10:45 WindowsDefenderATPOnboardingPackage.zip + -rw-r--r-- 1 test staff 354531845 Mar 13 08:57 wdav.pkg + mavel-macmini:Downloads test$ unzip WindowsDefenderATPOnboardingPackage.zip + Archive: WindowsDefenderATPOnboardingPackage.zip + inflating: WindowsDefenderATPOnboarding.py + ``` + +### Application installation +To complete this process, you must have admin privileges on the machine. + +1. Navigate to the downloaded wdav.pkg in Finder and open it. + + ![App install screenshot](images/MDATP_28_AppInstall.png) + +2. Select **Continue**, agree with the License terms, and enter the password when prompted. + + ![App install screenshot](images/MDATP_29_AppInstallLogin.png) + + > [!IMPORTANT] + > You will be prompted to allow a driver from Microsoft to be installed (either "System Exception Blocked" or "Installation is on hold" or both. The driver must be allowed to be installed. + + ![App install screenshot](images/MDATP_30_SystemExtension.png) + +3. Select **Open Security Preferences** or **Open System Preferences > Security & Privacy**. Select **Allow**: + + ![Security and privacy window screenshot](images/MDATP_31_SecurityPrivacySettings.png) + + +The installation will proceed. + +> [!NOTE] +> If you don't select **Allow**, the installation will fail after 5 minutes. You can restart it again at any time. + +### Client configuration +1. Copy wdav.pkg and WindowsDefenderATPOnboarding.py to the machine where you deploy Microsoft Defender ATP for Mac. + + The client machine is not associated with orgId. Note that the orgid is blank. + + ``` + mavel-mojave:wdavconfig testuser$ sudo /Library/Extensions/wdavkext.kext/Contents/Resources/Tools/wdavconfig.py + uuid : 69EDB575-22E1-53E1-83B8-2E1AB1E410A6 + orgid : + ``` +2. Install the configuration file on a client machine: + + ``` + mavel-mojave:wdavconfig testuser$ python WindowsDefenderATPOnboarding.py + Generating /Library/Application Support/Microsoft/Defender/com.microsoft.wdav.atp.plist ... (You may be required to enter sudos password) + ``` + +3. Verify that the machine is now associated with orgId: + + ``` + mavel-mojave:wdavconfig testuser$ sudo /Library/Extensions/wdavkext.kext/Contents/Resources/Tools/wdavconfig.py + uuid : 69EDB575-22E1-53E1-83B8-2E1AB1E410A6 + orgid : E6875323-A6C0-4C60-87AD-114BBE7439B8 + ``` +After installation, you'll see the Microsoft Defender icon in the macOS status bar in the top-right corner. + + ![Microsoft Defender icon in status bar screenshot](images/MDATP_Icon_Bar.png) + +## Uninstallation +### Removing Microsoft Defender ATP from Mac devices +To remove Microsoft Defender ATP from your macOS devices: + +- Open **Finder > Applications**. Right click on **Microsoft Defender ATP > Move to Trash**. + +Or, from a command line: + +- ```sudo rm -rf '/Applications/Microsoft Defender ATP'``` + +## Known issues +- Microsoft Defender ATP is not yet optimized for performance or disk space. +- Centrally managed uninstall using Intune is still in development. To uninstall (as a workaround) a manual uninstall action has to be completed on each client device). +- Geo preference for telemetry traffic is not yet supported. Cloud traffic (definition updates) routed to US only. +- Full Windows Defender ATP integration is not yet available +- Not localized yet +- There might be accessibility issues + +## Collecting diagnostic information +If you can reproduce a problem, please increase the logging level, run the system for some time, and restore the logging level to the default. + +1) Increase logging level: +``` + mavel-mojave:~ testuser$ mdatp log-level --verbose + Creating connection to daemon + Connection established + Operation succeeded +``` + +2) Reproduce the problem + +3) Run `mdatp --diagnostic` to backup Defender ATP's logs. The command will print out location with generated zip file. + + ``` + mavel-mojave:~ testuser$ mdatp --diagnostic + Creating connection to daemon + Connection established + "/Library/Application Support/Microsoft/Defender/wdavdiag/d85e7032-adf8-434a-95aa-ad1d450b9a2f.zip" + ``` + +4) Restore logging level: +``` + mavel-mojave:~ testuser$ mdatp log-level --info + Creating connection to daemon + Connection established + Operation succeeded +``` + + +### Installation issues +If an error occurs during installation, the installer will only report a general failure. The detailed log is saved to /Library/Logs/Microsoft/wdav.install.log. If you experience issues during installation, send us this file so we can help diagnose the cause. From 0734e038948e6d12cbba8e3943558cec05cd5829 Mon Sep 17 00:00:00 2001 From: Daniel Simpson Date: Wed, 8 May 2019 09:32:09 -0700 Subject: [PATCH 402/724] Update hello-hybrid-cert-trust-prereqs.md AS FS > AD FS typo --- .../hello-for-business/hello-hybrid-cert-trust-prereqs.md | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/windows/security/identity-protection/hello-for-business/hello-hybrid-cert-trust-prereqs.md b/windows/security/identity-protection/hello-for-business/hello-hybrid-cert-trust-prereqs.md index 3dd1963a94..8179a617a8 100644 --- a/windows/security/identity-protection/hello-for-business/hello-hybrid-cert-trust-prereqs.md +++ b/windows/security/identity-protection/hello-for-business/hello-hybrid-cert-trust-prereqs.md @@ -57,7 +57,7 @@ Review these requirements and those from the Windows Hello for Business planning ## Public Key Infrastructure ## The Windows Hello for Business deployment depends on an enterprise public key infrastructure as trust anchor for authentication. Domain controllers for hybrid deployments need a certificate in order for Windows 10 devices to trust the domain controller. -Certificate trust deployments need an enterprise public key infrastructure and a certificate registration authority to issue authentication certificates to users. When using Group Policy, hybrid certificate trust deployment uses the Windows Server 2016 Active Directory Federation Server (AS FS) as a certificate registration authority. +Certificate trust deployments need an enterprise public key infrastructure and a certificate registration authority to issue authentication certificates to users. When using Group Policy, hybrid certificate trust deployment uses the Windows Server 2016 Active Directory Federation Server (AD FS) as a certificate registration authority. The minimum required enterprise certificate authority that can be used with Windows Hello for Business is Windows Server 2012. From 0ea9a0e77a495217ef35d3a03a213927b39e08d6 Mon Sep 17 00:00:00 2001 From: Justin Hall Date: Wed, 8 May 2019 11:24:38 -0700 Subject: [PATCH 403/724] fixed setting name --- .../customize-attack-surface-reduction.md | 4 ++-- 1 file changed, 2 insertions(+), 2 deletions(-) diff --git a/windows/security/threat-protection/windows-defender-exploit-guard/customize-attack-surface-reduction.md b/windows/security/threat-protection/windows-defender-exploit-guard/customize-attack-surface-reduction.md index 647e7de5b0..6dbb17c57d 100644 --- a/windows/security/threat-protection/windows-defender-exploit-guard/customize-attack-surface-reduction.md +++ b/windows/security/threat-protection/windows-defender-exploit-guard/customize-attack-surface-reduction.md @@ -11,7 +11,7 @@ ms.pagetype: security ms.localizationpriority: medium author: andreabichsel ms.author: v-anbic -ms.date: 05/07/2019 +ms.date: 05/08/2019 --- # Customize attack surface reduction rules @@ -62,7 +62,7 @@ Block process creations originating from PSExec and WMI commands | d1e49aac-8f56 Block untrusted and unsigned processes that run from USB | b2b3f03d-6a65-4f7b-a9c7-1c7ef74a9ba4 Block Office communication applications from creating child processes | 26190899-1602-49e8-8b27-eb1d0a1ce869 Block Adobe Reader from creating child processes | 7674ba52-37eb-4a4f-a9a1-f0f9a1619a2c -Process creation from Adobe Reader | e6db77e5-3df2-4cf1-b95a-636979351e5b +Block persistence through WMI event subscription | e6db77e5-3df2-4cf1-b95a-636979351e5b See the [attack surface reduction](attack-surface-reduction-exploit-guard.md) topic for details on each rule. From 244670f6f4afec4900759ba76498a0b41048116f Mon Sep 17 00:00:00 2001 From: illfated Date: Wed, 8 May 2019 21:13:55 +0200 Subject: [PATCH 404/724] activate-using-key-management-service-vamt.md typo Typo correction, 2 characters were swapped. - slmrg.vbs -> slmgr.vbs Closes #3539 (Spelling Typo) --- .../activate-using-key-management-service-vamt.md | 4 +--- 1 file changed, 1 insertion(+), 3 deletions(-) diff --git a/windows/deployment/volume-activation/activate-using-key-management-service-vamt.md b/windows/deployment/volume-activation/activate-using-key-management-service-vamt.md index dd8545387c..2fea892b96 100644 --- a/windows/deployment/volume-activation/activate-using-key-management-service-vamt.md +++ b/windows/deployment/volume-activation/activate-using-key-management-service-vamt.md @@ -133,11 +133,9 @@ If you have already established a KMS infrastructure in your organization for an 1. Download and install the correct update for your current KMS host operating system. Restart the computer as directed. 2. Request a new KMS host key from the Volume Licensing Service Center. 3. Install the new KMS host key on your KMS host. -4. Activate the new KMS host key by running the slmrg.vbs script. +4. Activate the new KMS host key by running the slmgr.vbs script. For detailed instructions, see [Update that enables Windows 8.1 and Windows 8 KMS hosts to activate a later version of Windows](https://go.microsoft.com/fwlink/p/?LinkId=618265) and [Update that enables Windows 7 and Windows Server 2008 R2 KMS hosts to activate Windows 10](https://go.microsoft.com/fwlink/p/?LinkId=626590). ## See also - [Volume Activation for Windows 10](volume-activation-windows-10.md) -  - From 14bdb0323bca915ff22c511e8949652c340ad568 Mon Sep 17 00:00:00 2001 From: Justin Hall Date: Wed, 8 May 2019 12:43:56 -0700 Subject: [PATCH 405/724] edits from Michael H --- .../create-wip-policy-using-intune-azure.md | 6 +++--- 1 file changed, 3 insertions(+), 3 deletions(-) diff --git a/windows/security/information-protection/windows-information-protection/create-wip-policy-using-intune-azure.md b/windows/security/information-protection/windows-information-protection/create-wip-policy-using-intune-azure.md index 0e53bed956..c20462e84f 100644 --- a/windows/security/information-protection/windows-information-protection/create-wip-policy-using-intune-azure.md +++ b/windows/security/information-protection/windows-information-protection/create-wip-policy-using-intune-azure.md @@ -11,7 +11,7 @@ manager: dansimp audience: ITPro ms.collection: M365-security-compliance ms.topic: conceptual -ms.date: 05/07/2019 +ms.date: 05/08/2019 --- # Create a Windows Information Protection (WIP) policy using the Azure portal for Microsoft Intune @@ -590,7 +590,7 @@ After you've decided where your protected apps can access enterprise data on you - **Use Azure RMS for WIP.** Determines whether WIP encrypts [Microsoft Azure Rights Management](https://products.office.com/business/microsoft-azure-rights-management) Files that are copied from Windows 10 to USB or other removable drives so they can be securely shared amongst employees. You must already have Azure Rights Management set up. The RMS template is only applied to the files on removable media, and is only used for access control—it doesn’t actually apply Azure Information Protection to the files. - - **On.** Starts protecting Azure Rights Management files that are copied to a removable drive. You can also add a TemplateID GUID to specify who can access the Azure Rights Management protected files, and for how long. Curly braces -- {} -- are required around the RMS Template ID. The EFS file uses the key from the RMS template’s license to protect the EFS file encryption key. Only users with permission to that template will be able to read it from the USB. If you don’t specify a template, it’s a regular EFS file using a default RMS template that everyone in the tenant will have access to. + - **On.** Protects files that are copied to a removable drive. You can also add a TemplateID GUID to specify who can access the Azure Rights Management protected files, and for how long. Curly braces -- {} -- are required around the RMS Template ID, but they are omitted when you view the saved settings. The EFS file uses the key from the RMS template’s license to protect the EFS file encryption key. Only users with permission to that template will be able to read it from the USB. If you don’t specify a template, it’s a regular EFS file using a default RMS template that everyone in the tenant will have access to. - **Off, or not configured.** Stops WIP from encrypting Azure Rights Management files that are copied to a removable drive. @@ -604,7 +604,7 @@ For more info about setting up and using a custom template, see [Configuring cus ## Encrypted file extensions -You can restrict which files are protected by WIP when they are downloaded from an SMB share within your enterprise network locations. If this settings is configured, only files with the extensions in the list will be encrypted. If this setting is not specified, the existing auto-encryption behavior is applied. +You can restrict which files are protected by WIP when they are downloaded from an SMB share within your enterprise network locations. If this setting is configured, only files with the extensions in the list will be encrypted. If this setting is not specified, the existing auto-encryption behavior is applied. ![WIP encrypted file extensions](images/wip-encrypted-file-extensions.png) From 8c69ffb1b9b212067b87a180f2817d00973e3a1d Mon Sep 17 00:00:00 2001 From: Justin Hall Date: Wed, 8 May 2019 12:46:18 -0700 Subject: [PATCH 406/724] edits --- .../create-wip-policy-using-intune-azure.md | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/windows/security/information-protection/windows-information-protection/create-wip-policy-using-intune-azure.md b/windows/security/information-protection/windows-information-protection/create-wip-policy-using-intune-azure.md index c20462e84f..cbae7321c4 100644 --- a/windows/security/information-protection/windows-information-protection/create-wip-policy-using-intune-azure.md +++ b/windows/security/information-protection/windows-information-protection/create-wip-policy-using-intune-azure.md @@ -21,7 +21,7 @@ ms.date: 05/08/2019 - Windows 10, version 1607 and later - Windows 10 Mobile, version 1607 and later (except Microsoft Azure Rights Management, which is only available on the desktop) -Microsoft Intune has an easy way to create and deploy a Windows Information Protection (WIP) policy. You can choose which apps to protect, the level of protection, and how to find enterprise data on the network. The devices can be fully managed by Mobile Device Management (MDM), or managed by Mobile Application Management (MAM), where Intune only manages the apps on a user's personal device. +Microsoft Intune has an easy way to create and deploy a Windows Information Protection (WIP) policy. You can choose which apps to protect, the level of protection, and how to find enterprise data on the network. The devices can be fully managed by Mobile Device Management (MDM), or managed by Mobile Application Management (MAM), where Intune manages only the apps on a user's personal device. ## Differences between MDM and MAM for WIP From 6556ac94e86a1e0c4c2cf4fde79bc91d290febe9 Mon Sep 17 00:00:00 2001 From: Mike Edgar <49731348+medgarmedgar@users.noreply.github.com> Date: Wed, 8 May 2019 13:50:50 -0700 Subject: [PATCH 407/724] Update manage-connections-from-windows-operating-system-components-to-microsoft-services.md --- ...windows-operating-system-components-to-microsoft-services.md | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/windows/privacy/manage-connections-from-windows-operating-system-components-to-microsoft-services.md b/windows/privacy/manage-connections-from-windows-operating-system-components-to-microsoft-services.md index 096932fb04..7552b38864 100644 --- a/windows/privacy/manage-connections-from-windows-operating-system-components-to-microsoft-services.md +++ b/windows/privacy/manage-connections-from-windows-operating-system-components-to-microsoft-services.md @@ -209,7 +209,7 @@ See the following table for a summary of the management settings for Windows Ser See the following table for a summary of the management settings for Windows Server 2016 Nano Server. | Setting | Registry | Command line | -| - | :-: | :-: | :-: | :-: | :-: | +| - | :-: | :-: | | [1. Automatic Root Certificates Update](#automatic-root-certificates-update) | ![Check mark](images/checkmark.png) | | | [3. Date & Time](#bkmk-datetime) | ![Check mark](images/checkmark.png) | | | [22. Teredo](#bkmk-teredo) | | ![Check mark](images/checkmark.png) | From 4cc2cec7411b5ddcb46b1204855f58ecbf951b4b Mon Sep 17 00:00:00 2001 From: Mike Edgar <49731348+medgarmedgar@users.noreply.github.com> Date: Wed, 8 May 2019 13:52:08 -0700 Subject: [PATCH 408/724] Update manage-connections-from-windows-operating-system-components-to-microsoft-services.md --- ...windows-operating-system-components-to-microsoft-services.md | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/windows/privacy/manage-connections-from-windows-operating-system-components-to-microsoft-services.md b/windows/privacy/manage-connections-from-windows-operating-system-components-to-microsoft-services.md index 7552b38864..5ab28a758c 100644 --- a/windows/privacy/manage-connections-from-windows-operating-system-components-to-microsoft-services.md +++ b/windows/privacy/manage-connections-from-windows-operating-system-components-to-microsoft-services.md @@ -194,7 +194,7 @@ See the following table for a summary of the management settings for Windows Ser See the following table for a summary of the management settings for Windows Server 2016 Server Core. | Setting | Group Policy | Registry | Command line | -| - | :-: | :-: | :-: | :-: | :-: | +| - | :-: | :-: | :-: | | [1. Automatic Root Certificates Update](#automatic-root-certificates-update) | ![Check mark](images/checkmark.png) | ![Check mark](images/checkmark.png) | | | [3. Date & Time](#bkmk-datetime) | ![Check mark](images/checkmark.png) | ![Check mark](images/checkmark.png) | | | [6. Font streaming](#font-streaming) | ![Check mark](images/checkmark.png) | ![Check mark](images/checkmark.png) | | From 21b1e1063faa09bae66f71d2b69c1d112675e22b Mon Sep 17 00:00:00 2001 From: Mike Edgar <49731348+medgarmedgar@users.noreply.github.com> Date: Wed, 8 May 2019 13:53:10 -0700 Subject: [PATCH 409/724] Update manage-connections-from-windows-operating-system-components-to-microsoft-services.md --- ...windows-operating-system-components-to-microsoft-services.md | 2 ++ 1 file changed, 2 insertions(+) diff --git a/windows/privacy/manage-connections-from-windows-operating-system-components-to-microsoft-services.md b/windows/privacy/manage-connections-from-windows-operating-system-components-to-microsoft-services.md index 5ab28a758c..8fa437fbec 100644 --- a/windows/privacy/manage-connections-from-windows-operating-system-components-to-microsoft-services.md +++ b/windows/privacy/manage-connections-from-windows-operating-system-components-to-microsoft-services.md @@ -634,6 +634,8 @@ To disable the Microsoft Account Sign-In Assistant: - Apply the Accounts/AllowMicrosoftAccountSignInAssistant MDM policy from the [Policy CSP](https://msdn.microsoft.com/library/windows/hardware/dn904962.aspx) where 0 is turned off and 1 is turned on. + -or- + - Change the **Start** REG_DWORD registry setting in **HKEY_LOCAL_MACHINE\\System\\CurrentControlSet\\Services\\wlidsvc** to a value of **4**. From 3ead1b57077ad38bc245e538c0a19605a1a02e1a Mon Sep 17 00:00:00 2001 From: ManikaDhiman Date: Wed, 8 May 2019 14:04:00 -0700 Subject: [PATCH 410/724] Added 19H1 policies --- .../policy-configuration-service-provider.md | 42 ++ .../mdm/policy-csp-update.md | 409 +++++++++++++++++- 2 files changed, 449 insertions(+), 2 deletions(-) diff --git a/windows/client-management/mdm/policy-configuration-service-provider.md b/windows/client-management/mdm/policy-configuration-service-provider.md index a27926a537..8a7e1f0050 100644 --- a/windows/client-management/mdm/policy-configuration-service-provider.md +++ b/windows/client-management/mdm/policy-configuration-service-provider.md @@ -3336,9 +3336,24 @@ The following diagram shows the Policy configuration service provider in tree fo
Update/AutoRestartRequiredNotificationDismissal
+
+ Update/AutomaticMaintenanceWakeUp +
Update/BranchReadinessLevel
+
+ Update/ConfigureDeadlineForFeatureUpdates +
+
+ Update/ConfigureDeadlineForQualityUpdates +
+
+ Update/ConfigureDeadlineGracePeriod +
+
+ Update/ConfigureDeadlineNoAutoReboot +
Update/ConfigureFeatureUpdateUninstallPeriod
@@ -4881,7 +4896,12 @@ The following diagram shows the Policy configuration service provider in tree fo - [Update/AutoRestartDeadlinePeriodInDaysForFeatureUpdates](./policy-csp-update.md#update-autorestartdeadlineperiodindaysforfeatureupdates) - [Update/AutoRestartNotificationSchedule](./policy-csp-update.md#update-autorestartnotificationschedule) - [Update/AutoRestartRequiredNotificationDismissal](./policy-csp-update.md#update-autorestartrequirednotificationdismissal) +- [Update/AutomaticMaintenanceWakeUp](./policy-csp-update.md#update-automaticmaintenancewakeup) - [Update/BranchReadinessLevel](./policy-csp-update.md#update-branchreadinesslevel) +- [Update/ConfigureDeadlineForFeatureUpdates](./policy-csp-update.md#update-configuredeadlineforfeatureupdates) +- [Update/ConfigureDeadlineForQualityUpdates](./policy-csp-update.md#update-configuredeadlineforqualityupdates) +- [Update/ConfigureDeadlineGracePeriod](./policy-csp-update.md#update-configuredeadlinegraceperiod) +- [Update/ConfigureDeadlineNoAutoReboot](./policy-csp-update.md#update-configuredeadlinenoautoreboot) - [Update/DeferFeatureUpdatesPeriodInDays](./policy-csp-update.md#update-deferfeatureupdatesperiodindays) - [Update/DeferQualityUpdatesPeriodInDays](./policy-csp-update.md#update-deferqualityupdatesperiodindays) - [Update/DeferUpdatePeriod](./policy-csp-update.md#update-deferupdateperiod) @@ -5025,6 +5045,10 @@ The following diagram shows the Policy configuration service provider in tree fo - [System/AllowTelemetry](#system-allowtelemetry) - [Update/AllowAutoUpdate](#update-allowautoupdate) - [Update/AllowUpdateService](#update-allowupdateservice) +- [Update/ConfigureDeadlineForFeatureUpdates](#update-configuredeadlineforfeatureupdates) +- [Update/ConfigureDeadlineForQualityUpdates](#update-configuredeadlineforqualityupdates) +- [Update/ConfigureDeadlineGracePeriod](#update-configuredeadlinegraceperiod) +- [Update/ConfigureDeadlineNoAutoReboot](#update-configuredeadlinenoautoreboot) - [Update/RequireDeferUpgrade](#update-requiredeferupgrade) - [Update/RequireUpdateApproval](#update-requireupdateapproval) - [Update/ScheduledInstallDay](#update-scheduledinstallday) @@ -5072,6 +5096,10 @@ The following diagram shows the Policy configuration service provider in tree fo - [System/AllowLocation](#system-allowlocation) - [Update/AllowAutoUpdate](#update-allowautoupdate) - [Update/AllowUpdateService](#update-allowupdateservice) +- [Update/ConfigureDeadlineForFeatureUpdates](#update-configuredeadlineforfeatureupdates) +- [Update/ConfigureDeadlineForQualityUpdates](#update-configuredeadlineforqualityupdates) +- [Update/ConfigureDeadlineGracePeriod](#update-configuredeadlinegraceperiod) +- [Update/ConfigureDeadlineNoAutoReboot](#update-configuredeadlinenoautoreboot) - [Update/RequireUpdateApproval](#update-requireupdateapproval) - [Update/ScheduledInstallDay](#update-scheduledinstallday) - [Update/ScheduledInstallTime](#update-scheduledinstalltime) @@ -5152,12 +5180,26 @@ The following diagram shows the Policy configuration service provider in tree fo - [CredentialProviders/AllowPINLogon](#credentialproviders-allowpinlogon) - [CredentialProviders/BlockPicturePassword](#credentialproviders-blockpicturepassword) - [DataProtection/AllowDirectMemoryAccess](#dataprotection-allowdirectmemoryaccess) +- [Update/ConfigureDeadlineForFeatureUpdates](#update-configuredeadlineforfeatureupdates) +- [Update/ConfigureDeadlineForQualityUpdates](#update-configuredeadlineforqualityupdates) +- [Update/ConfigureDeadlineGracePeriod](#update-configuredeadlinegraceperiod) +- [Update/ConfigureDeadlineNoAutoReboot](#update-configuredeadlinenoautoreboot) - [Wifi/AllowAutoConnectToWiFiSenseHotspots](#wifi-allowautoconnecttowifisensehotspots) - [Wifi/AllowInternetSharing](#wifi-allowinternetsharing) - [Wifi/AllowWiFi](#wifi-allowwifi) - [Wifi/WLANScanMode](#wifi-wlanscanmode) + +## Policies supported by Windows 10 IoT Enterprise + +- [Update/ConfigureDeadlineForFeatureUpdates](#update-configuredeadlineforfeatureupdates) +- [Update/ConfigureDeadlineForQualityUpdates](#update-configuredeadlineforqualityupdates) +- [Update/ConfigureDeadlineGracePeriod](#update-configuredeadlinegraceperiod) +- [Update/ConfigureDeadlineNoAutoReboot](#update-configuredeadlinenoautoreboot) + + + ## Policies that can be set using Exchange Active Sync (EAS) diff --git a/windows/client-management/mdm/policy-csp-update.md b/windows/client-management/mdm/policy-csp-update.md index ab8f25ac1d..9d1af07791 100644 --- a/windows/client-management/mdm/policy-csp-update.md +++ b/windows/client-management/mdm/policy-csp-update.md @@ -6,7 +6,7 @@ ms.topic: article ms.prod: w10 ms.technology: windows author: MariciaAlforque -ms.date: 05/01/2019 +ms.date: 05/08/2019 --- # Policy CSP - Update @@ -57,9 +57,24 @@ ms.date: 05/01/2019
Update/AutoRestartRequiredNotificationDismissal
+
+ Update/AutomaticMaintenanceWakeUp +
Update/BranchReadinessLevel
+
+ Update/ConfigureDeadlineForFeatureUpdates +
+
+ Update/ConfigureDeadlineForQualityUpdates +
+
+ Update/ConfigureDeadlineGracePeriod +
+
+ Update/ConfigureDeadlineNoAutoReboot +
Update/ConfigureFeatureUpdateUninstallPeriod
@@ -189,6 +204,7 @@ ms.date: 05/01/2019

+ > [!NOTE] > If the MSA service is disabled, Windows Update will no longer offer feature updates to devices running Windows 10 1709 or higher. See [Feature updates are not being offered while other updates are](https://docs.microsoft.com/windows/deployment/update/windows-update-troubleshooting#feature-updates-are-not-being-offered-while-other-updates-are). @@ -933,6 +949,78 @@ The following list shows the supported values:
+ +**Update/AutomaticMaintenanceWakeUp** + + + + + + + + + + + + + + + + + + + + + +
HomeProBusinessEnterpriseEducationMobileMobile Enterprise
cross markcheck mark6check mark6check mark6check mark6
+ + + +[Scope](./policy-configuration-service-provider.md#policy-scope): + +> [!div class = "checklist"] +> * Device + +
+ + + +This policy setting allows you to configure Automatic Maintenance wake up policy. + +The maintenance wakeup policy specifies if Automatic Maintenance should make a wake request to the OS for the daily scheduled maintenance. + +> [!Note] +> If the OS power wake policy is explicitly disabled, then this setting has no effect. + +If you enable this policy setting, Automatic Maintenance attempts to set OS wake policy and make a wake request for the daily scheduled time, if required. + +If you disable or do not configure this policy setting, the wake setting as specified in Security and Maintenance/Automatic Maintenance Control Panel applies. + + + +ADMX Info: +- GP English name: *Automatic Maintenance WakeUp Policy* +- GP category English path: *Windows Components/Maintenance Scheduler* +- GP name: *WakeUpPolicy* +- GP path: *Windows Components/Maintenance Scheduler* +- GP ADMX file name: *msched.admx* + + + +Supported values: +- true: Enable +- false: Disable (Default) + + + + + + + + + +
+ **Update/BranchReadinessLevel** @@ -995,6 +1083,298 @@ The following list shows the supported values:
+ +**Update/ConfigureDeadlineForFeatureUpdates** + + + + + + + + + + + + + + + + + + + + + +
HomeProBusinessEnterpriseEducationMobileMobile Enterprise
cross markcheck mark6check mark6check mark6check mark6
+ + + +[Scope](./policy-configuration-service-provider.md#policy-scope): + +> [!div class = "checklist"] +> * Device + +
+ + + +Added in Windows 10, version 1903. Allows IT admins to specify the number of days a user has before feature updates are installed on their devices automatically. Updates and restarts will occur regardless of active hours and the user will not be able to reschedule. + + + +ADMX Info: +- GP English name: *Specify deadlines for automatic updates and restarts* +- GP category English path: *Administrative Templates\Windows Components\WindowsUpdate* +- GP name: *ConfigureDeadlineForFeatureUpdates* +- GP element: *ConfigureDeadlineForFeatureUpdates* +- GP ADMX file name: *WindowsUpdate.admx* + + + +Supports a numeric value from 2 - 30, which indicates the number of days a device will wait until performing an aggressive installation of a required feature update. + +Default value is 7. + + + + + + + + + +
+ + +**Update/ConfigureDeadlineForQualityUpdates** + + + + + + + + + + + + + + + + + + + + + +
HomeProBusinessEnterpriseEducationMobileMobile Enterprise
cross markcheck mark6check mark6check mark6check mark6
+ + + +[Scope](./policy-configuration-service-provider.md#policy-scope): + +> [!div class = "checklist"] +> * Device + +
+ + + +Added in Windows 10, version 1903. Allows IT admins to specify the number of days a user has before quality updates are installed on their devices automatically. Updates and restarts will occur regardless of active hours and the user will not be able to reschedule. + + +ADMX Info: +- GP English name: *Specify deadlines for automatic updates and restarts* +- GP category English path: *Administrative Templates\Windows Components\WindowsUpdate* +- GP name: *ConfigureDeadlineForQualityUpdates* +- GP element: *ConfigureDeadlineForQualityUpdates* +- GP ADMX file name: *WindowsUpdate.admx* + + + +Supports a numeric value from 2 - 30, which indicates the number of days a device will wait until performing an aggressive installation of a required quality update. + +Default value is 7. + + + + + + + + + +
+ + +**Update/ConfigureDeadlineGracePeriod** + + + + + + + + + + + + + + + + + + + + + +
HomeProBusinessEnterpriseEducationMobileMobile Enterprise
cross markcheck mark6check mark6check mark6check mark6
+ + + +[Scope](./policy-configuration-service-provider.md#policy-scope): + +> [!div class = "checklist"] +> * Device + +
+ + + +Added in Windows 10, version 1903. Allows the IT admin (when used with [Update/ConfigureDeadlineForFeatureUpdates](#update-configuredeadlineforfeatureupdates) or [Update/ConfigureDeadlineForQualityUpdates](#update-configuredeadlineforqualityupdates)) to specify a minimum number of days until restarts occur automatically. Setting the grace period may extend the effective deadline set by the deadline policies. + + +ADMX Info: +- GP English name: *Specify deadlines for automatic updates and restarts* +- GP category English path: *Administrative Templates\Windows Components\WindowsUpdate* +- GP name: *ConfigureDeadlineGracePeriod* +- GP element: *ConfigureDeadlineGracePeriod* +- GP ADMX file name: *WindowsUpdate.admx* + + + +Supports a numeric value from 0 - 5, which indicates the minimum number of days a device will wait until performing an aggressive installation of a required update once deadline has been reached. + +Default value is 2. + + + + + + + + + +
+ + +**Update/ConfigureDeadlineNoAutoReboot** + + + + + + + + + + + + + + + + + + + + + +
HomeProBusinessEnterpriseEducationMobileMobile Enterprise
cross markcheck mark6check mark6check mark6check mark6
+ + + +[Scope](./policy-configuration-service-provider.md#policy-scope): + +> [!div class = "checklist"] +> * Device + +
+ + + +Added in Windows 10, version 1903. If enabled (when used with [Update/ConfigureDeadlineForFeatureUpdates](#update-configuredeadlineforfeatureupdates) or [Update/ConfigureDeadlineForQualityUpdates](#update-configuredeadlineforqualityupdates)), devices will not automatically restart outside of active hours until the deadline is reached, even if applicable updates are already installed and pending a restart. + +When disabled, if the device has installed the required updates and is outside of active hours, it may attempt an automatic restart before the deadline. + + +ADMX Info: +- GP English name: *Specify deadlines for automatic updates and restarts* +- GP category English path: *Administrative Templates\Windows Components\WindowsUpdate* +- GP name: *ConfigureDeadlineNoAutoReboot* +- GP element: *ConfigureDeadlineNoAutoReboot* +- GP ADMX file name: *WindowsUpdate.admx* + + + + + + + + + + + + + +
+ + +**Update/ConfigureFeatureUpdateUninstallPeriod** + + + + + + + + + + + + + + + + + + + + + +
HomeProBusinessEnterpriseEducationMobileMobile Enterprise
cross markcheck mark4check mark4check mark4check mark4cross markcross mark
+ + + +[Scope](./policy-configuration-service-provider.md#policy-scope): + +> [!div class = "checklist"] +> * Device + +
+ + + +Added in Windows 10, version 1803. Enable IT admin to configure feature update uninstall period. Values range 2 - 60 days. Default is 10 days. + + + + +
+ **Update/ConfigureFeatureUpdateUninstallPeriod** @@ -3579,6 +3959,10 @@ ADMX Info: - [Update/AllowAutoUpdate](#update-allowautoupdate) - [Update/AllowUpdateService](#update-allowupdateservice) +- [Update/ConfigureDeadlineForFeatureUpdates](#update-configuredeadlineforfeatureupdates) +- [Update/ConfigureDeadlineForQualityUpdates](#update-configuredeadlineforqualityupdates) +- [Update/ConfigureDeadlineGracePeriod](#update-configuredeadlinegraceperiod) +- [Update/ConfigureDeadlineNoAutoReboot](#update-configuredeadlinenoautoreboot) - [Update/RequireUpdateApproval](#update-requireupdateapproval) - [Update/ScheduledInstallDay](#update-scheduledinstallday) - [Update/ScheduledInstallTime](#update-scheduledinstalltime) @@ -3591,6 +3975,10 @@ ADMX Info: - [Update/AllowAutoUpdate](#update-allowautoupdate) - [Update/AllowUpdateService](#update-allowupdateservice) +- [Update/ConfigureDeadlineForFeatureUpdates](#update-configuredeadlineforfeatureupdates) +- [Update/ConfigureDeadlineForQualityUpdates](#update-configuredeadlineforqualityupdates) +- [Update/ConfigureDeadlineGracePeriod](#update-configuredeadlinegraceperiod) +- [Update/ConfigureDeadlineNoAutoReboot](#update-configuredeadlinenoautoreboot) - [Update/RequireUpdateApproval](#update-requireupdateapproval) - [Update/ScheduledInstallDay](#update-scheduledinstallday) - [Update/ScheduledInstallTime](#update-scheduledinstalltime) @@ -3598,6 +3986,23 @@ ADMX Info: - [Update/RequireDeferUpgrade](#update-requiredeferupgrade) + +## Update policies supported by IoT Core + +- [Update/ConfigureDeadlineForFeatureUpdates](#update-configuredeadlineforfeatureupdates) +- [Update/ConfigureDeadlineForQualityUpdates](#update-configuredeadlineforqualityupdates) +- [Update/ConfigureDeadlineGracePeriod](#update-configuredeadlinegraceperiod) +- [Update/ConfigureDeadlineNoAutoReboot](#update-configuredeadlinenoautoreboot) + + + +## Update policies supported by IoT Enterprise + +- [Update/ConfigureDeadlineForFeatureUpdates](#update-configuredeadlineforfeatureupdates) +- [Update/ConfigureDeadlineForQualityUpdates](#update-configuredeadlineforqualityupdates) +- [Update/ConfigureDeadlineGracePeriod](#update-configuredeadlinegraceperiod) +- [Update/ConfigureDeadlineNoAutoReboot](#update-configuredeadlinenoautoreboot) +
Footnotes: @@ -3607,4 +4012,4 @@ Footnotes: - 3 - Added in Windows 10, version 1709. - 4 - Added in Windows 10, version 1803. - 5 - Added in Windows 10, version 1809. -- 6 - Added in the next major release of Windows 10. \ No newline at end of file +- 6 - Added in Windows 10, version 1903. \ No newline at end of file From 73219b51a0fdfb2e5279ae1f7509dae2c33dd91e Mon Sep 17 00:00:00 2001 From: Greg Lindsay Date: Wed, 8 May 2019 14:07:29 -0700 Subject: [PATCH 411/724] draft --- windows/deployment/images/after.png | Bin 0 -> 51574 bytes windows/deployment/images/before.png | Bin 0 -> 48588 bytes windows/deployment/images/ent.png | Bin 0 -> 77540 bytes ...s-10-enterprise-subscription-activation.md | 64 ++++++++++++++---- 4 files changed, 51 insertions(+), 13 deletions(-) create mode 100644 windows/deployment/images/after.png create mode 100644 windows/deployment/images/before.png create mode 100644 windows/deployment/images/ent.png diff --git a/windows/deployment/images/after.png b/windows/deployment/images/after.png new file mode 100644 index 0000000000000000000000000000000000000000..567b29463626db095b588608f06699d6d25291f3 GIT binary patch literal 51574 zcmeFZcT`i|_AX2S1*D5oq@w~#liouWRJte_x4XjfN=Ycv zNkVU-_Zr$4-uHLzxZgeJyyN@p`|Iv8VC-b?tn#e6=A7%9bFKIKx|-D2Ze1fHBBFl$ zNc|}h5h)iD5#W^kD&ZR<{>cQwe}MZ_O;w`eUbbbz2U0r~9Tg&?vX7LfFRu_jQ@A_= zxf2mx_qhB6Oxkk#5D|4zK2}$G=3}vb=HDPW48ldWGv~gq^@)x_q1G1;t_#1vbLSV= zd*t`q2?%8G9Yi-o!8&q?t=g05#g?FSN%w! zHioo+qYsUp+(0NH^3NRmGH_=js0y)>7ka}*vUbBJ?!EhGb0;7Nxagaqg8cS^?>OT= z=Kad%UGMW=_5ZnSv~O_z>((RVAhP)=l7as3E2eCWj_Z6d2(QQUKUY{T5%>Sx=KlYC zTX8`A3kN)`?K+t}Y|>FUnhvu^Pf&UJ&BtgCG=S~mvBDK)seM&vX6owmD24N*xmZ2u zilKc5Oi(13obDqKzce30#*sAczu8Dlt90t(9^$jp#W%QP-5N+MJO4>%Jn&?lP$E)t z)U4uVs(7D*`%af$pqNl~RFNANEakOZi^z`QZ2N`ql8%t z#}C%$;qn_vX@U4<(-(L7yreT7PL4OGCpH7U<#e@bIxGT@7h+e7>x*k~#oy_MaWAl) z8PD-U5iZ{6$2e&-&*A5>Sf~0QzK@DmSJcdwQ_w!#`-|uPjI#xPAdlwU_Bc`>;TnS%Pwjp>HN{aQa(ZaoTvv8{Ar)-+ z+uaYXG_z7zqKiVP9M{3?H|hk0Qez;T2Epp29KQ20sT+}YX|C-FatPMb$T_&YQ?3pu z`4*e!uegdnp#R`DsTpg{zPqkC!`b!aO!TNnOI`1(ifevi~Ui{DcCcR z`QGh=T<4lb!8^(>v$fj^>+P$+P?JDQHPR=r&EG9eZBc+$1H0hvKkw; zxC|X%mD)3}R;&lMNU$rBDB^Bt+) zyGBX1HKGvvg`2(j37vVkoZ+KYbLnK7ZY9qMY*+&}rg^XJFFy0ole{?6jO2nFi4&eMVPcdKwyT{Tdxhkxz z%|MlO{}W_1ocNc@qe7KG-%wW~)m2?e?w|1Q-IS|mQ_4V9K%V&MmQ)w!J6B{WSkq>P zxty(=hyeJK?F3F!>Y^pl2f>^V>sNQi=gKD1y(iH}258UB-Ot152yRTT_#^X#6WTt0 z>8Sws!E>n);{Mx(4DF?l_tez=FdcYCb?ZNgTmD$mB+s<#)sEeFmH&j4Gqk6*7t4N| zcP$&!jeiPw<;kBemW0dJl`?GRo>sLupM1=^IkHRWBNbi+Es`bNMj|znJ<8#7f2Dxg zs=@g%2fX_S_rmU_2~=ThXEDK!DZ}%{P?f;1#E5C(m=a;7K4uGVK&T|e6HR8#+VgbC zs0OcccSV9alP4>;z-W68c9bwRgN`FETq1j3X1tD_-l*T49MTNIofbJ#JAYk;gaP}e z_mkRN?%sMJP(NWa`-qi*!6(DS9>>Ver!Zg90N10?aQsGk?mceN^a)Q+88{f}EJrgl}_ zVr7|={1&J-oy&dJHSWYB!sX|x{Z*MoNRHjv_|@IwnX1>=Y6VE7Dxz8N+AG1- zy_@s&`>S|cP_?S9oiKohGDal^iQJI*pB~VCH^RhD$q0dOZN*19o|G8`kC}G}P3%F5 z1iLs|jk1+`+>6WwpK^+*uQ-7JFbbO`rgki@3M!W#C@&N3rdDr(Z*kqX!P@aF?-gz~ zoBJ&%Ky1t0br_#0LDSK6CjEKNIfnHNzm7oYu1 zI~o6^EhY|8`dx2{k56sSft2LFu7!gah~K{Rt0O!4fm;8f!xgz^XQF3h6#h~ekP{dj zp6(YZ7u`fmnk_}8-U?%k{_~U3EGxO18YaFQ{#(okM4#YC-e@jyhulBPx0tbPPFL2J zzbNgtqryn5_*go=tjDW+%8qkCHB#Sw_0L>(o_Y_)*m#(}1F_&*tg2+$0kkNm>5%@& zkUlZxquh=35?zJ9H1O}cgu;ZgBSUetQt{8o!XiuC>V0J{i6Q5i_kmm`jJ!!=`p#3~ z#OlrXl_iE3>cLz&-`DaVK-gh^3fJwQoreq4ht-~Y`WDxN(A?9YcXlI9eLpI%#C&a{ z-SeCUv6cu+ugiTHv~U*xs8sqIyIN2Wq|_Smyv;TQ_8Q>*DQ<3_NKZE>mPphRkb+mQ zYP`2Zd4juY_BmeQCD$-^i0RuJ;KvQFnm=IoVg0ol*a5U=77!lkINI=36^S29j*wH$ zDG*3a{1qV3nuVk!4=YAI6dY?4eNZ#ks*>IhFJ6C=7oXYz-#;$=7=Ms(tiMs=j1`wL z=09;X++e7YaT9#&uH!CIhY41Lho-EDNjMsfO5fP0ZccmC!lMA@aAEUghbDb35q4|J zPj|q-NS``PqO(G-%P{tu&+jUYN*DV>3dINQYUu6G!1?%Nr=_`7kAQtOd7FhdG9zxR zc*A*5cGFQPw>7_iTSEt?oo*kzJHhQ9w<5OIEG!=Fd6SF$P$b>*7pxPN_wtleF_Zl! z7k*f}k|^e(j_vM_*2>8pk?9pC9&;WIcACEZuMK=;3!c>FtH#DGm`@Kq2G4S%GxP9u7fqXE3Onm&y>C+xT<*iQ!nfz?g zO}%~^Qz53IyN1qcCZIgX&#h0t9#-}i&eY^V85oBvAsqHP#x>WG4pPnEso_Ehh`equ z1=EBat-m*fXe^yIE+qk)7dQ7IU}fQ!exiL?c@=rx#96?^$x$80 zRD-U^nN`qYvYpf4AZFXV_HPrrM)zp~C8qgJIG1P}{3gHl{DuuXy8*76VChSmOo&1s zl9Csc+*IfTF9hQj$^~2REPDoRUKd?q@-322j2A#Ddz~SXTjMD|z{YBUT?ng}eXV<(w{u;5CvfW8QVRuXiDL z#Bv2YC{coqI=`kDG(a?B^mHq3Xh}W+ag_V2U=zLPD0UQF?%*~|Ay zdL{!^RSrT60>aVusWu%z8;|$%E^s?WF0RN>a&r6Pcft01%cqj)FlggcQCLoA`^8(! z?W>Vwx^d!@H|%Dgq>38~R5_x8)sx%q@$5xO=M=n^;RPwieQSG7;`kU^`O*E?^oK1e zxX?-`Ja!#9CG(p8TSy}ofl5owUVHKVgPDhq3*{R!u{`IvI92^A1WEQYkiSdA@f}ua znO^z>hH1<;!_atMf5++K=MPG(9`GsWVfXPQ4ywQ)@!9=9kCw9vo9;j!`?gY-v zu&KM_d~n3#TZhP5O}EJEFZ)R6N4IzWmSz=Tzd|HN|9@YHjhYtS{DXRQ8XO&EYK*W{$xrP_dT$J=y9uUiGv7kHLW*!0qQN zIOz@F@y!Z3n-@zY?i6$$HHd0{08@?$-RoRuoJf}(q_KGoAZXR=B~=n7-GGk!fEQw7 zuM-};dEVAk{^*0_6(^1*jAO)l8Pmzf$~Boem1IhdW1~beEz-}3_3{vn%Wc{oRcS24FU z61M6F6RRxm*>#NInjYjea?6hZE2HB<1fR-Fr?cJ7+!n*!OMpG};ax3UHN@|sBK2Hz zGk(~<_Oo{IQkx*n5i_wmCnoRF9)y-M$o8P6H&R21$be$MDty}_aZXM@Va~)5eu1w` zK4w?YO8~pjt%|9DXnaPJjIP2~kQq09b-OJ1x2`q|r}lSzL}$WeA$`9j_q~p+K()S0 zt6^Y6W3hU&Bn8N{h7p8uXK1}LzdP|426G}wJiS-xIQxtrug)$YW6tvG%sL5j@t9CIS z?92b{Hm}PcF|zOBfd(VLCCec7qJIhW#Dnk?x&Cpj+6~)7bJEaqM{Jo+y-1Y3Gr@tU zg;;+rS;y;-w)vzRT|!#`iC?#i?_^Xe%C{ulm!Pu3YZyuC2g{J#OM0>>2P`pw1`_?A z+#-gU=LPZ>Z#GvwN`}JA7=iW0@?hCcwwXGrIQkEg=+O7(3tIRiQM9-#mNG5HRC0k1qq*atn zyr9`MDi@7YjomMC3zW2hbWSG4PtOw;D2**Txp4jI+3`j4xd-v!?80WMVdF4SQu4JI z2{UHyw~J6JXUg%7{mYcC)*vREnXeBtlq?T{O|0!Mi|T{MPcR&d!H?2Sl)K^7c@s?S zmC`mHmNwUc5(`nYa;|Q1HgO^ABTF1lWQFO{O)uyk6<*1yVf`3j7MnwPT zefiec&uhd0>^)^0T6LBNo$u8`oUJvmZ7ZWhm9q8S(yLW|($0^bd!h*|srKRV{7q6P)#!P=@D;n=3(T`@>cV zyAy|IyUNcJQE&U!w74KKJS<}=sW;$kw6;<2>Y5O&OU!@Sd?)5MN6QguN*HbObUeFh z=1FVPLHODW`%wv>tskpz3Pl8@soOow^$uif>bezhf#iTthi+==@dwNovzDik9!i5& z*OV21%o2QddlRXGd#t_fj^=x?Zar9mf`Y_Y?=I;OSU>*V`A4j47_OoSbn zoKgVg(IP8Yz0lIoomqVj`dCGq{6V4T8!u_OpkDJ=%aMifwZaxbsU@slHoP6_^vE+a z?O>}xOjws&r+Qg3V<$hcJDA%t zhJP2KZ0==CARzl{jgI)2|J2E(j;A0}?_y6c|0G!haWo^L$sF=30U`!?B`vHf8;$Uk z4$lgtFtE^iv)%kdiNV|`L7+sait|Cwwg^h~K-(lSSqj3uQYMQa5*6YRDyTNy%P<_s zU%xx6G_pH6!SRlV}^NSA52KUt!%62Ms{gs(d9>=p_@};!yvm%if%03Lv zT&SH2ufQbZ;MeYEZ^~5+`Y3s?<v%b#mZE*v#VU7+(RL({=N8c#6EvO0SJV!Mtr%ImU*Y@|uR4W#c7h>=Yb{r5 zbZ5-sz$Z^FBSW+Q@~bAq!qH7dB4N@}GQZduTGgPOKf2%$4D_X=znWJO_`HbfxuxPe z%5n!aAyr!gj=_R=PuVJp%$QI-%H1c6&3Pzaqu?WW->j01t20Aa)D~F zx4c6Di&uE>o}qXiQOpnaQNC8e`UF~89V-sbA`#CoGKallK_JJcl#ZVslA<0&2`eij z`~um_W%O{Iroo+uZe)Xp3zwPsZ{WRZ5xDT|7wg3CX+OsC`GM3* z?b&|L<6R8+HSVszdo{V|68aNV@)8(KZHCFy-sSuWumv_O=uGNre+a~0%UsG~%8P<- zb+W@7#cX?04(vqsv?_E+AsSyUS+nOfIbLJsQ8Ds@oeg6TkCB~XVw)H$NF}sZ1&~t@ z90@8wA)xPUEPR{_PlRYJ8#!+EHA5)lDgu?y0;2v9fo~mR9Zx=&D{K|X>LsU$ULkjU zp154GNEfQxI8kIdv6`cY#eEIrC~OWa7nJ&zYnQz)tIHUHTkgLC!_SiL|Gw)VHny;) zcEHkIS7AeIHP~85Jn58xb)^E;Qek>u@$I{k(8|SiwMJlCNAg5B)ja+e8b8b*Xu*um zG@_&}!RHNLoEYEbij^(FA*oyCB?KX{GLj!14d3xIY;NqH92%lk`{QYix^aqN9sTpS zUT3+~>tvu>P!eve9U)BxEs7lJ5Vh;qbuB6G8VS75^gLDL;AyyBR?%9yp$PBe8zgXd zOC)6G(q&r?yunqsifR&Ut+fjIQ*_!e6iK@?l0^PZEPDAN8lkd2y^E+n03i48V)#*Q z_sQw>McmN59tqQ*60sid6?Pva5XA_srRua;TurqR!PwRoqZ}P0iCS1MF!Uu;A8ej5 z((Z$kZwZ_1OF>Cti04nWmVWJ%P>|daz+TbS`f-pz`+XnC>|tJbj`-g(0rc8|!oP{p zzZn+~vR$%wG0K&lr4-=CJcp)@oA4@B4Nj zvK%iLtDBr2^h9s+y+`)R-T+9%@?onpri+#Vpd8e)y4C^V!2j~im)WwDst_P#QBOqD$*Y_GK*=d>3uC=01Zgm?Dp7s*vkuT|BP)*+82D zt;W*GkKo)fX=6>0K1TXAhNo#zV5LPA#G;;dxnYQ&_kjbmiDD3gei%yZZ=XQ%W4dbq za;LJ2rozd;!qi#5r?w#XepU&QsQO?2)J6wcq)b1g+uzX|!x|18@m}_xZ~ZU z)c2NgN&G@4a{LRmT2s%saCsG(E%ixX+TukD`O@Y3O0A}gG@U#Dm5ZgoiLmuoud#f^ zprO8#am&?Jd(Ms$L0WVLI8#iLpdgd=hV}>e{lzoQjhV8Yv34Pe*88X*h)%SqqgZ4n z5>+W)C{oGw%MJ`?CanHz^yywb9BQp(hzgCLm|m^s0l}o5%_<`4PQEaVE@Xcs0#s&7 zH-pi^WN-aM*)UI)xLoMh{T@-Q=$cz}!*&YD_-UmEIS$BQ-p49!hS^T7w^v&0Q%dfo zYTu*ABiLiU1itvfZcbU~%3WC90w_WCI2>lDF$t%5%AdR~9=0i@8|D7=zu;T7r;n<~ z*Y)R>jyk`V*+7u-z?%hGD=Fx#_jWxu=1K_&s>v@r*er{-cV@=FI2q~igt@-g|3vZq z=Zj5-=s$=Jnm#E=-$QlC$f*A7)RnUC>9y;#mU4CGk&h5DI_y@8VRdPjGyxs!3WV-% zc*=*C#_xf}0v(E@?}2d6h4S?fyG6&;6gSovHvz;aLxv!(`i-q|QD=3GU^kC47o#>- zX><&4(&1WpOrW6O;uI|ubQrvs2SGR33}ivREaA0RU@|IZ>N2j5eI(@4-W)D9{kG1} zLn4h278^MBezwW(?{GcjQ#Ek#cL^qNqtgYha~%{dF}Y4Rs@DMA^{-vi=3P&zI_22X zLlP+N?qeuGOY~N>@O0T{Lpt)Vi?a}c4o1)JlPt7%z34i#jliGJ?W5!ciPj=lGC^?J z`WoW(`Ro+;-=;#(hW#v9T*3s`*}E?hPsB$9J-)R=Dixm%F>P?;-#kDaXN>lKJ?hww zYp!4X<~A7V2KL1;f|ta{>V%mtA>ZHiT%T*H??_0yiq63izj+)qy+@XrR1QWsUgii^d?)@T zxc99@I5q|%J#Q>pPW~;cWY9>jmVfz#%FsDc(ei*`{t!d}102GXvwmF_l%sy9Tq8TLchB;w{9mX3f&$7y=W?m~@)S0o8dpl! z!(-deeiR#qTfYRnGFsA3+bfzZ+VwPuc&x?=$XT6DZV6M%%i88LPW&xJr8^|U@pC1B zO^m|~>Bmg<)p{s#XU1ugtfvVJUJ%p#P6;p5dOzR#8Djht0ZFjdVEHkn(5H$$N*dkR zXHFUQ?NYrsQD3mJF_e|z11JA4WYKb>Dx;>Fc>B~gWj|;evRyTmNYqHlaumo>bg~WB z^)PZ`TvU`|MiIQ#RY4aswGpxgsKAwWAQz*p=l<7K-`D7_v~gdxGjZ2!ucVt?J7O#W zx2oW}A=zvD=ZDQo>wQ}xv;kZbd5ejG%ZUT)-0r;ME9+u2IRs0Jha6SjO9G5GxXCa1 zEkgVJCo8_5N=)t-d+VI<>0L&{QYx?9t%9Hc zu2_$;+BOCb5r7-kRKM%I&725MhrUc3g=W)^Gpx?Nxas2Jfb+^A$X_P@1_3>Y&B3iV z_cadI==atK(Nz>at{t9y*u1<+sYs_K!#rDg9a{oeJ(Zl^zR)>qO> zfJ~=EW%&*tbkGRjkIB1IJ%C>-3oZT_+0<%kH5m~!o6SIZIdqyQW4{qm9ZFzPKR4n0 zE#%dVf-L>#9#!q%EM|Xu^;I>9l$^OfvqX#2*_!>Mi2n;D!C~W>%d>fO>EKuVbnP+Z zv`!$?=5X=lO_rR^riRN#c6M7`ocK4*m>Y@Vye5~K0IR?u&jk9L*XVqcg~d{7ByWZV zrtPm6IkJM-$C)b1S@scyyvn3UJdnOWKi!8EM%O_}U)L1|tB!R6ha`Df-pBgpR4*Bd zHya!`<_e#NL*aL~I*kan=84az#dW}pq(ZV!uNH3E#l7_=qh!3TF6ht+f%OI>7-BXVWx;4iC0cS zUSEML8{eHVu84kb`GHk{DNW#-uF`bPoSD#$i{=+9Tu5E8-|AAb??>5bw!w~?rLC<_ z;47f15zu;4YRk51+%_Xp0{W$h#8&n^%6BELs>D`XekwA}q5Y@u(lW(?suQ zKGKgfi4*lwvfKv(qdnz-2$9vWqH#gN0dKMJQUWU?N69u?v>(6F5$d(A{cHcz>J_P3 zzZSeq_e+ak2RtbCgCb=UBSdr&98{dUk3ehn0>N)qy!I7~*Fd)g5?iXmm^c(PT_=8K z&fa>eL>u+H2$J7uHn^4PIZ+a;8%wIb#?OaD?bwXS2B(b{SB@!OxNiC&bBEhzeYDed4>G%3P7Y+$d`XJ=qZTS z9!~m8Z!hJ3%mY9CySg|3DnQ-FOkB(wppJ8P>KGEl2eJyv{c@n{3WBk9-)X@{r}V;sOUGRvfZBXiEo z)9%C5k@=Ltjq!aevb7L%G5_~bzc+)Hm9&M=fAz#dn-6=t1~+Q;X@Z4HDG*(bylrK1 z#H7x9H#u!d{8=and2Qv%YZ>Tw2J~|-7fNT|vEGdVK`XFLuTsi`t~FjU3C^RosT75i z$xW?vm)g=YYAK{6Ut1}mjKOQ=5yZ<^>%j+XVU8Ds8M_*4K;PEF8u&ZHsq|wEotRX^ zgmFL;jg;8+R|*MFg9}Cjd{CMkdZ=};QZ0MFwS;)qFt_H*-$fbFN47|WbuTCMSmk#I z@~E}k2ndDl$9uYZldl zN}t=Rf!MCVZrc6pCFz&X)PuzAOx?sz-cvnXe61y)ObvFu!DW<|UjDq%lAbRRIyyOA6#v~D96_uC-&g{v3RXg`pkTD;^n9?sjq5%V?&3@jhIyAr&_Sdp{* z%0)8r;6lI4w!6{g@<_$XVm`;B^=$aX_)IZfj{K3iL}jyUaX(hhJ`e`qDC&cLaMHWW ze#OY52Xz0BhN@%GJqGm2xk9o8K?vt@FaMf;+3Ra`0=>HE?~^42`Ps9se)#Yon<2(p zfA>C*d*xleOF(RN5tXrMeMU{dtKaB*ro$&U3B5fA;R;~g{RwIRwIPc*Q>W9pE>qx6 zZC43!@7Mgc((%XTM(^kUh>?w#Mc}F(-^KK#h&J#%A}D3jc{Jo7>%o`x_S3NZV~;&5 zSaaCL#5DgkdN%(ydh}?dQ>0gC=RXbKJZf#^bwt!ZHO8jex>8M-ARW54N-^1;X^!@M z71@Gt;$I&s3=!WC1qjo_R1}k)`j2HuzpPXX`lrUmOa%ASRQ#iu6bWd^3u^phL!6k` zA5i@#*x-ok^z`=mO?tX*uOnvu<7idJ!(fl(_o3y~x$Nz?|C6Bf8xh2Ledw_3dM-O6 z;y?9Q)AT(IR%tlJ*YY}I{qBD+xlG!sAR42crbP~=!7y>2_Kr%rW^C0=Fe*Z zg8l{B{wG-3Aa@CEMQQ&hv~qu38o%WK3Ia?}{J%mN1Lpm&y(;hij}s8{giu{V@_&NM z4g}es;k@wivnEVGkVcI&_)r{_);;;}szR{vM|tXZf~pXUo#?Z16*K)0(pZE*I(`4E z*Ir7ozq=g&gSsfkAXC4=U`51}CGGi@Wgh>gk_h!A9NXf5G3aRn_rK}sWCZMVNmvrp z94#uK*@Wo{tCsY?>7a7Vhtwt0!$$9&JcdBQo{MoDP`dW)0LzzoI?p#4uydISytqlo z0L8+t65_Wt1lNo&g3ayGZB?6N6lq7$6!h?`@75nRTFJ1Z#Z>1FK_)Bbm2RKY?T$f+ z5e3|O>0B(j`RGpsZ*0CIWM`Dg?9*b~6vvWt97P@SYTR*ZVv~m!-m-CyU57o$w~g9# zC)6*9;M#g=FBzuA%5T)%?h$$K&^qBg)p##m?os`AJ8Np7Zl=ht7W3fRDsmB z-)Ex#m^E{teL&~mG(!<$mKSf{VKK6@wEI(QvVQ7pL&#T#dEVe^#N1j%Uk24OTS+KU z$ZePH-%QS9+yZS$cR5eeJV!u17lZAtV~W-s{t7#tx3$0>qIi^qD*w-A)Q;7>3c64PI;_~2x9OGho9;8^JnOm35=44~+pq>(xVQ;S7jLCHaqkd;VHfUR( zG_-iPpI54kdKm%*ESc`Yw8nUQbtp#DJ2?CWCv46Cx$j{j_~gY9DR)NU=F^?_Ec0^7$AxlzsjRTLer#Elkg9uLin^i}>DXfX%fR1g)qJ--m4LRT>&U|ex#Z$n~ zy{vs=kVgsT!P7^Zb*sgTL6~IOBV!BSh50o1Ui4?Uc?lu$TWC3i_*dy$HRMHwOz0pf z`AShPZEFFYZJxvx4;p(c&xxppI^E9WyiOa^qy+<+?3Dz%$e@J>q zM|#w(BhhJ9k7%NYX6uSP%tMHk!iZY-b99^c2DDP$MH7e`qLxmh_3W*edH+vi4>B_S z9lh6`JM~9lKEYXFZe7tG?m(7Md(tpL#h0RxbC;)Cdk(^HDD&zXF+I_K>t_Y^xuRG- zStP@?-aswBw7TNvbNu4^edjChRjstup+nH$H;o}R;Pv*(@z2LeP>yl;bDZ*}nZ?ax1a=YE)sTYrLf2{76NpmD= za4lA=v*t9AYMs8FerBZ!e}|Wi_^KuWIpH7eIEP}eSK*fA#9$9q^Wr?ARzTefw_@5P zLeAD+v;9Z)BqmL7?Omtmdex}YhdW$6ApvXA5Lu49go&Zrv`*&m59S3_vwoCE%gqP*|)g(=+! zvirbP_)}*X&&tQz(uB89rnc!s|o~^mu(f8D*>jA)$Unq_7h5 zG*~c9CrzA`r#L%p7iJN;lO}?g!8{2}?Id0Mc&4j`yQKr&Q|Y~V2qWY0vAP|!sDuTV7xyA|pKy4_>ndSqzU-EA^u7_yV%Z&OOOAxtzN=g?=u&RSWIX59$EW0+PBW~N7Huri@>0_+#B`Ec?BJn7}+_rP+NDqM=ihUVDB zGjPh;2|_y8>rr+O`irAX1f-Y0^8K|>6bwU>I%Y6Aaa`3MyvFhpz&W?fK>hAJs|P|) z0Z#y-u8$O9x4!D3C0vj@cTAn|XB?&hZMC_^1ns&Fyz6o_a!Gw|~3`6Vax=bMj7 zwcAsl0e4h`e~x(8-f{$G@Zs4J)FCmYcrhggF1iR8jrV@ad%3g;&K0-i@^4&+IsR0+ zn{s#HO+li2H)20u$)Po{YIllPCjOT!@-6v5h5b!PtGcP8q@%o!%j_xltf)os1pw<7 zSW1gffeChKkdtnA)4>CU_H5%+)lB6M$$Ld{RX47NiDI5lmXrs8(*BE=ao;&l=IS@2Urga7sqj~$c;0(VhR7#K-AqrCkmWxawlU!c`bmWIvf zyhBAJZ8~UYE}Hw5)-v17k;bnpzEy1s)QG|>u-ESCG-^66Nw!m2j+!tnNF4mGr|aaZ zJDMMPz^y#a-CEhf2Jotm5v5#9a%N48nw?uRyxn8%WP zo23p>nI?CTS(ye>Yw&{KN3?*?XYtPEWxk0M-0G+$Z`f^hv7rV0o+ldw?vOHe!{7?U zgF^n(Ly;lFH&2jt4tW$DbZ2)_l*|HS(ap+VjB9&U$7-n&*=)E%xW;P|(+)55WpZ6J zvLykS?pJ0xje6wC^8}GdL(Gf1e_OUE3>z)0 zcGQX_pcO<)bKb|p`bv@PAdCccp)NeM5L}H@AleO5=b-x$qQ=;J%h}d;~$}bQ1O6SejG$v-#d{gWQ_6PM~lWxcRaC$d2zT{ zoX|VYgOH>f&UGj{-(CYKw3GjKEJnThwVmSEFX3mN(JV{l=A*R~1V*$MWMnt`EV95Z zWx79~77-mEyvlZ99gsN3qfGwQY|8!Wnn^S{WKmK}CJesuA!)r-OTxDzLhrl0Av!YD)jaMG?Fxmw5ec= zgHPiN0XtT=nq8mLT}6rolc>vb7#;TjQNK~dZ2BAls4^80TM(SD6`__i9m334>y@E3 zrU#8OS8w!`%c0gaOKuPJ%|%yv0X*Y7GWtiGer~#{D8qjUtSKfTKKh+|%f!;#4^%-D zIEF4wQ;KkeMA|Qc2zs)x4Rpt(FM5PmB+C}5aCY46_#_%OXN=X zFoq`rb*;&v+;`T4p41dwx!o=_8o%a4e4rEbZItca@^w>lD4`L%-XuLu*tG(D^4oG>2EgafA|Oj zt5s9uR`iu~OsE2VwDm*q+#z0e$padbby@n&tZKLH`q=F;viYVNcuZSeta)*#`wBp`C(qehBd*_%Zt(=Z9}mi9yqFd)Mto54!q;kU?1P^|QBL+%6Nujg(;Kj5-Pe=A4CD)NX& z`)!NJePtqC;+{!VQMv}+fhF)`#giL1=S1=--@=qR-+NV1+b_gj&zp;L2zj8}iA!45 zQ%G<*C*)Bwydpj$HXVfr%_oN5#PKkYuec{097H$<#pqciTMSBtKY8V+Rn$+C7WQ<$ zs1L+6PKG@HNt|D#sCtp3_{DVtdER>dTJ7F->dE4jz`Jd`;#0e(scV9=f3tjRCym~D zaD?L(Q!s(013dxE9xCnH#S%Ezj&HF-vSXA4B66Gp$$GzePT(pULma%T8>k57_J6eD z2K;tAaL#Hg>&dMJG}(ijZz~5vTIpNqRnmTbTMR;u%wV?<5N7-gKK|N%%bnr7zr(~l zXC=0SGHZ7MSUY0UEoEI`NB9KLcp7A!bDjI0MBU5ZMBgrFF?_>^7*h#v{f=v28dqTF@#ssm{egbl>56rpRTcKIz->@c-lNnk)^(} z-fK}TC!M7%6SR(E)qGSjj?TK7kg9pR4aqcOZ9A}W3rEb za-JvfsFRIdWd$Q*U%q$)P&G>2X-`>*v{}<2gc`gU2|prpK1#NoPN5@fp&4uIBttv- z)c4&W8GU;sHb$JveEa}-jZW+uI@-wQ)|BTOIQBM;qFfIHJxl6ZATNPJY9qwuaz81K zz1N=GVLDrz&tWLh*(F3Wc1Yf5Mzj7ykz)^?!wu!pB5!r?*`b?WZa)n!Wkis~R zqD6Ew4mcPS|mA%${@&Y_333qFMKwCax3-Q zoM7A5hVi-I8}FEu#)}=~kbT08&!ls+WL4wdWot4o8u^}Tg4$>J0&!Z)zL()eP+ZUs zEyp8vJC<;4(4OUGm9={_mfGpIEO1Ir{PNJjz(+z;124pb66BC#G@KW0N;-XEmqD7G z(~StFWVv23s>6V-nV}6HNu`U`=D<6DS4v)E(>(Y9LBf=E1I#zCI=>o6*!@??=RNM)G2g|PIsVj0-3EO` z5GZcXG%z#AadoE7y71Fo5v7X@r?mO}i(P4mE8)S$d3V@f_}nMNNsDg7u8vv;o!Rtd zC`NC&^hl0s6OIEo)VX9|x+WX_Q!B|h#{+id=0BvUvb;)CST$=k0 zZgrcxM^)bSbPLR-KkaOtW29&#Ltfp zbpy9)gT$+9_b$U?Hp(2(z5XuO4tD9wz0m^!TzJ4sKnVB18vt=Zqz4Z_(t}V8eav(9 zzh16M;JJ0li`fVMl%rKw{k5qb>~ndb!2j!|7Yd*ES<4%)=iGX6nEMRF2mm`#W-|KU*pNv#d3b;q+`&eFHUk$=0)6R5&I!5 zAv{Asm#}-6hlj+i>u#b1rM9i_-GGePrSPL@qL8DXb#&T&T$>}N&J&fAABxeDZ^)-Zp4^lc|rcSkBw{{jg3Cpg6d?OoT(g$C| z{5S%(T7-NrtKlhpdpXYJrB_K~D7n?S9y~}7)pKZ16nWB#DsEGMyd@ch5@`<5A{-sT zIhy8`52MnS8p+$P^cTJnL*Lns6})U^6xFN0j-!y!Qy+=!_PrkSyR#i5A=dF&oso~# zxuSG{_*dogMO?@O9M-uRI-BE6s8>uNdG`)aWK49Gy$w7TCa5blY5S6p?nB^ibCajW zd2cCf{Up%=MizsQ52u1I@&Xp0GK{1N?I6h4!u0JIUF?nvi3HX%{WoguIo|#dsh$69 z8(8a(B8+r6w|j=Vjc9q9RCKp1p)Fm6Ryw8GhJjmG8Wq5i%&dNr_{^ zVHmG>PkQAy)6%>!_F?jUg@VdfsSYKLh~oy%j!*HIXHVQ7x2lg6X{rHz3nCDwVU)6j z_SeUB`+n|en2R&z!*K=;&tLKiDM}(t8C$nw4L|yT4TBPz@1OpObkZHv3OtI#4(xf} zWpx_CyQG_U6)H<$Z@mnWUCM$DTZY^(Oy0 zP9ShMv`ad$V>=ety#L!CsIa-?oEk9ap!*tWd)(K2RM{n+;Xd2G=`4F(&{fUh`oiJZ zH`@Y}vhag=Z0ziR4T_zkJqVLY#xYbIT+DyNokE?#DN!9iJ8XdW`x{{UrFLHRcu=`xJbl$<;`=K5q zP5grdfv}Mh!`Tn}4pJzMDDX9$*HnK!&ga}u;l22(nI5|s3pYIT);o(|JiN)*9JEt6 z7x;SaP`~Iqk;)zNSKY1=nd6n5%28No3xLc=>%3!9=6EER#u@)xJm_4~bjS5OnlWE?Amij9Q7T6r{6f9$< z#v}b&$*Y@`+_BHsXGSzauW6$vUrP0N^_slfPAda^>?V);<(x3R0!z{`kUx}ZZ%DRF zC*L_XT^y7e*lawUjFvdp6okbupr(fO(zQjWSx+Iah_Ta^hHwZ-K3gl;>WpHgajhJ6 z%c<#jQ7CgTcU^kIV=zwwCMoy^r!-*QuZ5w5)LojP>IpAwcMJtV@-j)fN5ZY9)b&dH zN1W%5btdm=HoP*#GZO%7sien5 ze+r8}ZWeY&KPI!}X*?L?9FODRQO~qzExgnle?jG55&&}VZC-4zsGf)J_p#p~p=W`; zeT@q0mA7oV>-^ftAlL`5*;G$YU)nF7R$p=%D}YHwuz4-b7drdxYhc8IdvzM8FYC+K zf9AM-g%$`J_^2&CqB=1oM5KCteQrfad z%yu%y_)6y*l81LXNxUb_c|CFe>R1HAApAG$w^S*ELro=oztH|jqH6tW%ae`YI7VshM5tGU1VA8F3@hTW)i=H|FtB?8H1uBh$_q z{fQPY`QCvtx@*ZLJrZ--2%gFRUZ6iz$SWthlRwxg?e_Xeq{SPTz2(C8YjU|vzLne? znNPOt<4@fs=1Z(v|0oe-=e=JD9A135vInE9ZYs6Uh)AsOdmaaI*r6j$-trJNwTus; z#bUKC6GmT#P``VtweX($bP`=aV$|#En?HT%gTeN^@CY1r?^!m{$saRyikE=i)}|vi zoU^5bs8^-s5crm?dhPpFwAfhr+n=%w=C?o3 zVviOr;EAR@>fWNsz8!088r`WUMgEE$RuWlK;6&l7xYvpWBPokHakGSy-@<-t%>vC+o86 zEmTXS?0&lT_LcYvkmCQI?U1^jE02)LEA|J8&+6>5`PLZ}Qzxd5CIA?T!9_X=gedyd z74qdUtxMTLdR_-wK`g3awq5NLE`x?@`@P;9L7{tUfh0X-+;z$l(M+cDo)-hfcP{L2 zz95I8eWRLbUI<9gg9>zTJXRNb2i6IJ2Cr+CX`Q#`#orTiOSd_ZJV(YYqPDN!47hn- zU2-~1Z6DQ)YPGoZ{Pyj^D~H~ueRkPansojolXWp&Pss{-A|w|JX&ZJ^_EH~sjKGQH zxTG~Dvr+tpeoyuK{9U+|(Oi@6^~B7M6)j3B0DSNgW-83uY5U1^0Droj>7YypQng9TMs# z;9x8?>09$sRIfRyH15ZoMeU$T3v3zxs6TO7cVEVB(83;#@TWUPLX<-mVcPL=C3ZTsg-P!_V@(^INB7gjt=T992>l%~lolcg_udW{D2#Ck8nK&Qq@lK* zo8sNhM$_LV)^{s6$3Ti@ph8+Vw8YYI_fG{xdcM%kRrD=>J^-=BgDXy{1EeHpQm-`Bx8yAd8<$QB_dt#!AVk^L z>y@Kc5v;RdS8{;M$(-D=L(KE zlE+9#AtfSsXnnHOAjr9z1r}X=FlQvk#bsD!r#L|1hg3#vL<6B*)o#`PA`_arKY8ec}cpYeD<%R z6QP@DVW|DsxAKv`Uf;I+m+!`!!(oN<#HK`AP#fHkS>#RkmH3?||D^4VSZSsOVuxT` zGtpbdU^TRf3O(O5j-{uyXjQ)ow)M1f6Z!Zd3&}b3pP3jwntx021_gsd;W99P>1s+4 zgP@hqM_B6AdFh;IL=iW&xwUjb1X|xccazPO6@5X{L77AmEz2Ji;EaA=WQgJI|GdG* zdNldm`vIFBEf{6;Jj&N{p2s44`?ZY+!hxm8M2s#&o+GDcXI5GkZYGs7q_$h~kR7OT zqX4?AKd==FezZt!aWOY#Ioyir545~=3TQm7vqwA~q-f!&?s!pF3a$Hc=I*!pkyv0B zY!%$dWr*|(9+0}+Ja_AE&&6VCMtxRfYLT@L3HqIU;RpO^bVd74@`!Vgk)_mb=Wxwf zUwoHXH=)axZf-A71}i}fdLjD@6H_i-o3 zovz!3@qyAYqL00%}Bd3KMh(}>#@D_SFBkDkluH`PX*x?msIO|BF zypeM>IZQfb`%WCeVQfo5gt?jRrMV#^MbmatyCb>toGH7O-(A1v+<(;^?6%&2iTp|; zfz}BnC`6vo4CkVkONz0Yo1sph>p#oNAZyOT93Au{QrDW$;mXJ#-f^)YdN`;BF+K~w zuBATrRt zGD(l?*_$GAl6Pdl+D(m?n2c2vL^GDwv4&+8e<1QH?v~?am0rJz(cLRNvyk=_xQcB@ z+u8UvYmD^$7HLph-0Yz<%+~h`#)-G((M0=mu7o{Q7{S=k?du1K zZK(<4#@O2LBv#Z5#qYAu0_dGggoj0 zy$ez#!9eyGNZ_Q=FGH0A9c_bN00hxa_Z^bn78|AmlWv}z9l}QMk1T&nizMe4-@A3zno3EA^W}v5?A2l z>di)UrqXfcId^Mf;R+E+glsaV zD$RezKM!_Yp0#c7cCf{WidCNR z%Jpy|LRQ*|ccYgUi@j~lzTvNL+6${c2&NT!c9M5aI7(m$77{rLvRTdhu9_GTf*UqU zQ6y^=*j9MHin+=8&`wWCnlt_V8>O$RJR(c$^UIeYkhvT|5q1)C+A{8-(6EK3l2B-k zP^Vqy>Rtg<>w=4@F{OL`VvCKkv2f9b&^a+yX##cH44I^v=Y6-lk2Nnwse6m74%Dhl zv%FKC@r!FE8ZfWBpL3p4S4YA#otVWx|4sqtmC+|6ww|Jb9*xW`&2p}ZT{ZA4xoIJm zOKCd=$@Pt>ZAx`x~fut$xX8Mh#UM|;uL#*)!>^cIQeCSB_ssV z&$x*0AXApnDdnRVvFT^QQkjC`6F^GF8s~6MsY&dk7Kdp9^6WK_DnxV8{I#XHbHZKt?|7!zbqTG-jWS|Kf`utKZ z-DEO;S6y9bhlWH1REV4@%j?Kzz#oA`$_6hCcw(&14CgS13L&8zgdx>kA?~CQX~Bmz zN)BW3nU^qMCX3@CWN!!vH?D*~@N12%c3?|+=s!>YB9~~V$FpKnT9Q>Et5_p~@qUIu z?u&<^j#tkf$|R?!$f2dBA(xKAOE8nUwKatir;DYkZ`3xsDCboUQ@O;D%?<*Jg^Y-( z$#4#$^SBwem5Ev(ZSTZjPV|KQ4=d_o7@{=?Fcfko~lhR*tiN zwy#y8?Ow2I84*Og0Ar!8s{73`>|fgmpbBg)O$igJF$JbSMrxK#bNUG{m;3d5%!R5 z_z9p6EQ}x|C7)Dt!Yz(VtWvGu;P%EIvF)u(XFA}*emDB}*63`P>lP`Azi1kt(WF~U zWPrg!BP$V!DY4y=vLeJ}LlI3lAp1Jvp06}PU3!lA9PBDg@gbWQ5owoJk~i zHr7LP{JHp1UeSso?TULs(8M=#7p=rUPA3NjG>+;qp*y<6ngiVS%VLEOP=;A8a@MGu z7N6W;&3e-mqN7^DN*K;Yx$Cx#T+anZ)IMS2konFJ;D+sx5GzfceP2o&<8on42v$@A zk~Hb8EyTGCL?oK!d`oFUP=ix|u z_EAK;s#1cyFX!TnxEV1?&{LLil6i~k9Hza-6?V)bf=`IoEGfpuTmxh-U6jR`X(%MHC) zFp`GZEXmEKXGhJXx-{G+o?}WdsL7+RitX~xM}M$MH;rf{PqZ$4k6W<);ks?n8gjKY znFFpD_N(Vu1rXpekCYU0F{mg8yWZW%x+u<%U2jdY@@{E#Lr{du)dtWQ-s^Odud(62~<3EC&f*XU(Xrig6F1H93%Z|Nq zI*-!IvZQnz$_5i^9L0*z@O7fK_$9FG7|9EBGOE#w^y+85l{FY)4H1Krf_8N8$~kRE zS>N0|#zBGnPMM%D%AHN5KO7AjFQ)FyBS4UM|8hRTG_p$y7eb)56UocTaO`(NwM}p+ zD~`##2&_q~q*WNt!6jV$aq?zlz^!VGfAX~^$@T&5NYneb4ye3*1(FA?>^chVY@Ik$ za2Pj8`>J(oezzApFTwGj+&WZVAKo&{ggG=5A?vQQf8-6~5rJ;sjJzIf%QoV>DJQW_ z^XYt7pCBPoq2B>aYT2>=>*|sUUjJkX&icRIMUDXaYmZ;CXprVK?ds3^x&oxSWKn_} z>@UiVkLJ@w5K>I9GE+y=!vvE#+6Nc=KjUVBzAmVDMpv6sG0^cSGD4$qRJ5Mtd+JZ7F^n%b}uA*dJl5*f>TzwU+NY<;Fr#8#6;a~{J#zF$x>_|8e zkyK097@L54&st5?>$T@HQ6b>o^jA(~n_+PD%3CQNelGrc8(z$ICB;I&PB&_4RtV1h zl^>h~`F0qM`MEkGdOp;|?!M*r0k>4Z*@wTi=4>g$oL2;n3lQn6kiL>NwLXJhCwSJV z6Zg4rmg3sEN%>E$ZyDRmN|Y=;PN4VMsA=7t6qul(9U0&kZ+WC`5qj(8hnrHSVU|Ez zaA$~hd6(t9z4u77DaFF|=Py{QX^_6lcJHpq;UL$ahPeX1tg*#@@e2_R)*|{}yDxcj z)L*92f@4n22`vQU(F`eTVbH-Y3$JB;gC^j`O4czzZJr1N$NwUZYu zBA6<`2U!iZRzQpPYb(kklFQUd2Z@s>xcR_wFZXkB0%c4nsTh~EJtJFM;fp!4V${J< zY~dd{PSyFO7y_244Z6V}*GIm^W4&L_b%Xom&{or5w+OV+Q@>ott(^TSvE{F;R;LMz zQ!5$LN2(Ivr7V3(UvZS|AhR3KddV^&J;b}rtjU{fpM1UjWfz=ZhjAe z`Q)O2ge`L^hDw`@RW#fBP-)E!SF`#)QODP$vUlTrG>a4G0sscv&{29+4=8vBv9tQq zUO>__BuCOSTj<#spM~kwz8`H9ks&d^-%x}Y4DTiU&@ILvAu`yP9rNXybb%q)fhHO7 z^JRZYQuO^%JO*q|ftXqO&zU(?!si}Eq-olly-R~GOH)sTnBcf}%=`4wZ}A7-rJR2| z#AD6$(ZOtBHwEJ3Gc}*|?wyf{@IHoJiYA>M>~fudsP1GmBTPwQH^iyJzW_f{nLOUe?B#_w+oRF6M7(-LavFuo`}6gtz) zWv+Vrffi7Ah`kNiyj6S6hfUUz2}UkU|Bj8ebw>Pl>gEN1q^W%DedGSmpR&bU6b$DI zORuZ>=GsywH&#gXFH{7IW|NbHMnuN0PcFZ0>U7FaV06d@cf6; zWa4H9xGkj1K)VA1VA=|}YdP;I#y-^a@4l69`-e3Ylk;(E;%Ix80_Ry2x^}#Z^T4t} zk2+^laqB+Wqe@~f99Qo7lC=meB%LUF?`NM&*wy!T&j4Dsnft;fwWw5-sQCJH!g^f1 z zJnUC9>`#OrCVs9#F`*C$V-(fU&4JIz6x*fT_%g3RU*FYS;t;rHwzu}gw`Qd^Yn&v| zU0d?AA)2`JKZKMBalCxGv>M>nms*wTGXA7ix1U}OLf-7EKb$oSC_|dE^lNdn2&s7zAaEnu;Eooee5KR` zZqZ&s)jsG#0;h;6&HTW@*6bFi(@+{+czfp%`>JKXtyz~LnYfGG#i2%oEP3K1Z~siR z(~Iz8FqA|7c_`Oy`Vut}%KEwu;x=oAal|+_*{GA{$Rmr2l-cvc$`-r6fFJgi+iomj zKC6A{c0L(PN9Whww?JeuRzD%Jt;0@-z;(^r#qn*%0LciLA+F5E8$FvG#_kL5R;kWoNt(Oyc}zM3?S2ujM3+dB+;|C24$m*49YW{G)Od7d^noD?xA*o{o_xO4Pg|>+FB-sOtrf94)?PfZxf)}46fvWX_X{ox zEfcl4wcZa=Pd(}G(%7`{{$Jm=O>bHLn8{^t!n%CX< zmV;3n5s^4!hJCbJfh$^dVkq2N**xVB^GlrD#y<6JASq1ikoj)0UK?l)l0K-tTi5vE zyr7Sfy2SL$@Z9LRwgY^Fo11x-ZuLJB zJ>w;uesOr>lay_O*6Z~-nZlLjt?<<1bQs)YGbK-0W$PZpS&F)Vn*fB({w@-Ymd1-u z-s~G5t#g&XS@b0!)H71nVJ!BI!e-_i-+Lv@*YCca_aw{xiX3C3=&4=^)CFi2&7yvn zs_KhTI@25Kn%hBj46|AfF+P|O9(X>9u94 zv}s?}rJgQ|d2B=bSlpredD1GSlymp&O^=C+siU+f-$#=iv*g}gso&9}voQ8pfvQJ{ ztTbguNQ5wnxG!og*t|Nc^)u3nDt7Kk%I-Y1PgQ8i>r^?Yh>c@AJpbW9X+mi#C)5sg z(%y!5R)abAbpN@xt9GJfOF>c_xL+%Bs2Rm@(Sz_gtOh2uJvSGc5y{cGMmv!pr9 zeX95IA_$L6ghgv+m)+BE8)_$UR+P*hX4(^YQAA!q>wu;AWU`ut(9V1s7GqJvzQ0*8`cY+N)P`2i4U_ zHhbHW)b|RT{iOCWH(ohoxt_Guq&-|}C?q=x>Gkv3@5#4Dcnn~qrT2Escpo-Bo1v6) z2kzkG>YpE(AN9gTOkXL@rr@2Khtj&QnU*q*(0)%+58hTUr*|HmX^&PA>D@oZd+=Fr zZ;1qt{T7f^;xjr}%X)USDXOLVEUK_i9AV8ky1hmh!wc%lCW_Wt+jNfRN!31C0dbUM z(J@dQ4b3i(dp^?c7Ou6iE2h6}DqAg;d_7S0>t2b@~%EX~$|&96=%EE|=x>%2GeT7cK6Q&lRuY zC3q68UEoP#U0BtbxEGH z#By~iE%-F~(=j>iHOKR0f75<;uIF(?HMh=B;$MZ}_Zu5DARH_hNCGh!bMvmg$EJ4) zGgQwRIc&Ly2N-9|<6qzoQWt3uyQrG<`b3A(>HenJ&h87g?(sVxzI0>=O}oj$7PU3F zq+zRd&d->i_H-t-$8Aacr}rq5Z4Y1(H@e)E7fnJ4Ho~CQkNb8|qgnCV7lAi1`%zSv zAVz=@!;0jqNroR@3kpYKQ}<8SzQ0fuYxNj#$sf5>_CEEtuUoV2f{+E=tljZSF#_L0 zzbY>WfpIG-S7`Ht4sqoGf|H~Km$S`yaRQIK=ZBaof%j^_jU41?i=oOE4Ag`jnyH0W zM6|L|rFR9)K&49aB5{DZcNV5vDsAwZN45ClRu+ShEwNYRec@9p7}56_-26*w^J6Zz zVuxyy9{`(=q>oacl~wJ8=sNjTB{aYqWClL4uNBCZqXp}9aNn(8t)_a+b<`M?WrBJ? z>`i?{W-TSYxnNw(1$}Tjtnp{1X|7-x@_<`b&-;Tms5@RpIidzG4`REX@;@h#aVCrq zJ?t=%id`Nt)?q4mc$t+1*R2iJzNyPW#NzKs8_%7S^53l-t_N;4^`JvcWa8fCK=^Sb zs_Py_fBeQb;pz&m4jiBO6h>{7Y__!YN(Q~@rO#isLD+0(nd;1IrU6&ZT9`n`e+p8(gycDCRz$LQzqQcI6nS4rf@!_; z+4cfXi>%%M>iO_h8e~GR%u{ZnVfn$6Rx`p@Zs_u~ z>t4(MZWt=0@7A8DB?iv@IFaWeULCtEhp$636;fBlFYm0yr9e4jpFc9PBkjMIejxVg zm;k3W-`6r1GmxzB*YIz0Dg_;}4P%u?*bgYbl``JnGWL-JHDBiFSEZ)RmC`5n@4hb} z!4_c&oEsQSNdBiOu~!rS8Cm!|ZvrsuAml*iT-gts9}58|0|ip>u~IJWpN-QN6Fz;Y?tvrwKc7O7$XzLWfzqlFh(SzjvC0p1EQY}9=vZ{A{kSORbXZK&n;$$w7X}lb z6Mm4^9X4?#oWNlyy;BfV6yEJUcr9tGhzI;Yb;51H1FE1dh^4 zVV#n^mbf+(gl-QgR)Px{8MYrzc*6+PI!?*13@p+m@VN&UkQqkVe6i1Uu*x0mx2B|- z7P;qJ1CXOBXykxMvgl9q{^(AYdiQnr6Pr4ImcZzAj6;)QF>vd=BM;0 z8&TkLM9mg5$&nksbpvw5amWQUZ!G+bns>{|ttnqGBwCZsWx%3xsSTSOIg@S(c3?(@ zbH$lg`XcZK0>25uM;lzkfNksC83zJF|60A874cu)+JH}~6K5`WL=rV&|L3C=2u;D3`&3dL$4rWu!>g*n+3JV|t&7o+6mg&Q zBYSo5OTiB`{1#?c!2RhOKEWNfX1AKJbM0Kj(H}a7r5m{Yg|yl?s>(WvlB0uoeSZuP zUAsDh6ox{hilVY-Tu4u24PL15T4BeJe?HOZlGy#8JqDsF?y}uQ8^%@w;cC(rUYwpO zi4Pa}T^I&P%&Q&hG^CEV1bvuX0Wtz)^JB;7EOP>)8LfcH^~nIJkVTi|;R<`NpL5e0 z5d7K8%INn1D7zV^@#`M=v=$Xo0S(W-98^N^6VMuSoJ#mbwTRF}O?DAeAmHKANsCsF zxP>W0_Dz^y9j??j>Sd$=kkRV*ogoQ4{8`C2mYN5nGj!I9Df7Xdgl~lbW}}zl7I8Ej zEsY+>OH8xFH^ijfkY_X0IZR15veogS6W}xaIL^q|#47;gK+M@s+h%CbJ2Pki5-JfK zX$TTTc)d&U-3&*`T&}-pncS20GDC(33FKu(lLyQBb_0>p-&>bVEBn;N-s|NMUMGn5 zeVXy}6)0I0eq)b$V+vpdhFj$Vxq{A&$lXDIQVTs@=fV4OpHtzJo(xnRO?XsbH&GLw zcLp`4sx^rN>UvAZVT*WMn->3YaS3Xe4Go3uG0rH3z4Q-O5Sdx2%ay5<`^kot=b?Sohig zgW^{kN3TA}1MJh4X}c*D=pHbLf$`C%?=TXp{8`$!fNeU_M~8v?-&Br;t0^k2R7KUe((z zP5KN3AoMDt0bX6JBy?QD)wE#8@))e>D&+R{jCC*^+Q z?7|6E?$-z+^8Qi&?LaQJ4GYTOO=MvKn&{V`;d;>jAD)O`i~iq21OGqxU30~~@629S zSU|Sgo6QzJ{>>izzLj0c;9(N~#fa4mOXh=JY}1$8*o=wsUQ3C|8FQNYKqh7aU3oFA zGA{>Wy}+j|#b;aU_^{2xXqzFAt!A{IcZj1nsg?c+%Y3{uyX?L2q8~o7YC^XXGpzRD z7h@4!c42(|nxu1pS6E=ws;}_TGw7HJGaE}V@IahC@2e)y8&pau5TY;CI6{vHT{YcgKJWwKt^nBwf}6l_|%wAN{plK3H=3v zQ~pJLOQZm>M`=8f&RKinno8I+UCDp_#wh<)Q;km;{aed#s00ySc}0k{>J?MckljPkNK8dOu)a^;|thK%lvCS9xQyTJsNHcuRVOz z#=+!t_RPONZ)>JC?Qm;0%aS?w{sX@fX3MFo3`4U zBk3>yY3>Xu0~#kS=;QY*pB4+-=AKAM?&qYrnPPMB#95C&J^v;N{$(=oGw$zS@i`4h zoqU<~!c9Mq2|3x*=sV2)8&CS*)962gZDBnL%)3cD*y=h*3`e+Y!t;Nt*6{nPC1#%o z*cf~PKF5jxNqOtv#?T5oEq{h#qrZm-)S&eX4`e*-I1_izhS1fhy=I6Em z1+g&Me=FhLwUCo9W-%S!GaGGE`{ke~Vx&6Oo(ufV!TiTr__zuikd|VA6EjXedaIbG zx)vlL{!e4@H69jOk+=4;Z*L&&WTtI*4Ri#Hg(Kl)Fz^lx)vGxG)N?TQ_r zIGLWs-7jg3_}ydX|HtUS+tI9~10y|b0|RrCK@n~sWyHP-K`wgcrQ!`(r{=YsY+U0*W_?UOp|7&ZTr~I!*m~|QbPeb7s2$bWW zX7{Q6Zx#Jtn+81)nl!$ppI6M2^l4G;Ne!o6y=Rd_WT%^t7gBpM8X(Z~39oX>V-d*dmf)|#{%~!i!IMpk4ijypa7#W1yU$=e zzcxDN=e_qMz4hT4q$~bj0+nqmcmva6^A`IcaSp6M+{EMgan$4MH#&VwDchY&^zYlA zU%5XUutHKbW%ETDx6=ch zz1dIWp?3ixb7D4>BUP!RlXyE7;3Z=!*Njd`lbL*uHrfK9k_q#qi0%@BdT`<&2H;91 zhBX?qEjqohAI5q{6mzH$z41n+wR9 zBT+9$DPq-);`qSYHB)Rx)Ks(U^E5{LI4*LfhOANY_ok#=dmZ_teq${e;n>O&enWF% z#yslD{#?9W+l-7GIJK*d<1v7-l>jkX9-BnRRF=01SOglI@j=IjyBg}?BA_|F3+qtO z1tO{EbqSIR)$R&m%(@c>n>%JdhV>X{Z!C}<>;ff!(ov_1@vC`a_fyEI&vwKU)svmN z!v00PzF&=TcFx)ym&OsJ>!CxAT)N=c(L5neT_wX-i&*bjGBM{^fqwbhkB%OM`M zGr7-3Gg#zTVcXR#=vAV11UgCyD$P{7l*)3e^&kS~aem3IZ$_^jjkrg2cz z{0OCGvP1K1GlSiC7ot@B>AbZI-!6DOID5;z1HUl=kDoN+t%mOHd^e$`iNs!`w&ge7 zQPeI>{-o~W$eHih`C{H;NC&U?0$N!OK`DZ@nmc7|UzFH$w6v#U$)RfFik>mm|7lXPvT-Li;M#|e8C?43U^>QL+szCIr`H8|{=iH|m_44+zjtrMAr5<>WNBfq-v$ zhT*$o2Tu&187iWa$Y0fUx+Px`2V2sk6U!5uQy98S(G@a}`{iF!#pK1mtd4HlhHGms z7`qNzsEI=BwzvG;R79R@^PdB)GMT$EzY~*oWNuADqE6hR8T@wUbqa|44~J>R@mxF@ zs$>;(J%`FdMH#A_s-eQ)WZo0#WC^de9gP`Wcz@_B?PJzX?UN`Q{W6_-W{;{z`yA}% z6e=EmVbI9KmQ7kU=~n&63?4lr=3AChClBTx!CqI8upOw=7E1fDMmi0bdFdM`Dhx$i z%O-jQ2CVR+SB}ej;?uMSV%-ts|AVD-d4vB6@C{F(Xy-;<#>Y3$#0WnQRG9#`aY<#L zW$NHlK1}`&_8qGog5&nsyD{Ziwk+dSV;%qsF&6s?T)5p!v1cXArQ-;~S|kYD8Ih~; zb`Z1Rn2&!b3co3=#U{Y0@L11mqop4JL@sdjsk5E~i==i%DcI=ekb%5ik~`r7EsReL zoND%JtL~ccCCipIDr^geJ2LN%Ju%jfD-n?BBJ)4%^`=B6Z8g(|`B1~!j$tYaE7fHh zAEPIr=9@4d<@%CvDOJb!btK@BbcT=Rf0}>w;7jaIUD;5A<9+=VodGRbpUm@cu_57W zjc#({ncoEo{hd@(R+1)4LcEoj^Ew9jA7e^du?N1@jq}ONHU8A2CEMY=*F$Ylk%kt* zw8(^Jc~Mr&tRAu-=QOj42SN54uRv=Si}nqj2Fc=O!Nu*Hq1I5d7Y-^uUs#iZAH@?j z?QBjx@$!rrv(WY4PpM5BF}yr8t?@mXw}i8CJvhYsYH6j7g(Ao}87|p(cIhSyu-&AG z-1@U}FyVR-Vv+8iz%$5Rr^garo?5lau_BCh3kc=(V{2GjVG-$dP)o?yWs+rUO)@5uT+ImD!W zJ*mR}LoQG@%O?@kJ6LuZ3}xF=J^`@qcX(yIvX7@@cI(|jTdgdANrQbu&+DwAW9rk1CJrM z7`99K`d82C2iy7yf6IEg6YiyHX%(rIGv2H9Iq$N>h=}bW>K8jz=vD|#1)>v4;_q1b z;&wl09^>uSrO*SFqJu~FlW-#YgC8x?01|LR>GJv7Oz8FC!*}H}dIu2KoDDh_jOf88nKE#rU=1zQt(z2*iK)xE6?Phmh2 z`>3_!Kz0nebWEn@qpUx1HLvBYJth6_5G6y)%>o)DvjZK2OcB0hsS|}nA^J!?kzPOC zqQ_Ru4?7u%3BPmYtrnh+_^EwB?e|l2jlcitSP^FdC`(}~%qO4w9pdhPTu)C^U**-G zO4KBjozJd?x&L)Inv3Bpxn70e%pQ7txHTkw<=SIqaI;v*1vlY=GWO<|g zjEgtB>nC~0p4A>o{%3nmrr3>arkYGe)LdM?G{V#et5C2 z(KRGM17BEpAv}Bt4V!AsdECqu;gtO3flCJXlr8nP27 z(Zi@gJ@2pVSEa|G+2lGh{mRB)umONrd2^*hB-nnX(AX=rkmL9=2~pXb)Rm6QHw~-> zWRM@^HjCyv)Sgoh1-=Tf1M*G#_@jT{}Z;hdIG9sEa4xP$2a zpGAOOq=&&OC}j~q{l&LhM(42UQNnQ>UomoZ0rs=sC@m82)_T3~xUI9V$q)s|&6`Q( z85TbtlTXW`(4L>zNW$HQKBw2aL&=ydF$bm|ffw54n`A#dG-n=qg0j1Ua?pF~X_)0) zacc>{f~}2nff%`UKR>J+?$%O!fI=UzDP)tbE+~0F)Ez@>DI&^|P+b! z8#zh1&D;%92QVJYhPUv)Ia)6^ z4vi0>rxs+R1u8ky3X%btv$Qj?Kug3Sz42}dvn++qQSO?vt5@dS3YtPAszv}8w4>J@ z*;xaDvqI+fI~mqj(&?32l;?c1^$HlBx*Q%4MK~`_-A}-|Ya7&7TZ*xY+53y^*e4&< zU5};o_Wk%Glzl~PL-Yz|SFZ+_m2VSLa?bE~G%^icu%sNt`tY2T$P5=nBKb|7PAq-ql5Cn8ysmne z*Sl_!okZFn-E)5K+PfoA9sJ|D)#3S&nsDCxWTpqITqY%@F~2A-;Z70unEDZmjwP7eSF0RB@F9+SWir&6p23A=A7aQ% z$IIACN`jm=X(LzNUq3#_^C6G%$T!5AseRd*Rj3{E;+3Sj9+0W7UL&PjNg1wsFd~V0 z#no3xr$yfLWId zVIi%6Dl7j!z})1YXBB-P4w#@H-az~;E}2Dp>zspu++$08gN_#~47ZQ*2_VYSv`8`4 z!ahPSu@;Eb-Iz4x?#6_EsB@tG4F8SVk4D#}5N@nzrzxI9NnGA_kp%K?L(yB}E7Mg` z>h8U=1bHdrx`wsRCMe1Vf04LehYa=P8PNkIZO(c7fx}=@V(8aIg8J({LL*F8C zA_PRlGmdLRs0x$s?!KncWhvNt;+!wZOj3a&F=G;eDt2Z$nBeR8(Iw zdWo|`b3&Zb3c_UAHD4m?E8I22K43{+aAihl05K&jl%(TJfbdRk9ofiFQ5dkThZF&C5|$yc7EATM41!2gzn$ATvVt5^_X5&5I$!>VC-&w`bx~ z8M|_Q;BbU)D0rsXXobNNuE=VmJ{n3p^--lBj4_nZ0otZp@)lXK9m8p)%P)MY3J3gt zx~oxJK4X&=rB!@@iZ_HcHh-B#idy*5o-ApZf^NoI@y|15(y(W(5S!=WAUB`v)-_VW z+!Tef8ALDT2}hb!klekq)XCSHiB_`>lC{xIoN|>Sv`ep5!yMWNSQW`#-*^9^j1e13 znJ7iU_TQL%-nV)ivs&5phYf?*pX0`}mR@;Tw&!0?PMYC9mYE1Qvy_Dk0H!CApRcW- zgF*`AoI$*tFJ=?%y%Omfr@a}BhkAm$^ypQ~JA~5y4BN3?WLvgo%!j*HcFOEb{jusMKF1Hvxe1^1DJwx)ovB8?^-z!tpxrni$Mnja|8!%=kX68eYCDE*(I z)|_U^n{}myVS>5c!-7AA`|I7OJ?$eF&3d{~8p(7YK0BlqZJ^96iw;2s9gGd%_j1Mm z3m@5-uqVy2>D$M@`hG>UcRs590G^@1bE~y$3U3|E7cTzc>#MROMqwtlH!fBiHR5CA z`8vjZC>&U&#UGmk_wF(WW@C(^=IZcew07O7AYfSzhdK*DD{m43;wRlDPL;I#tgL1)#=7wyB2WBsS41WT`rYC;&2taXJY@mRQz}*RJ8+h8 zvwbfwIvh?gUxne}efOACUAu!=1^9<`t>sR=Xy)j@B7D65ibgB_mB&wj^{==EN%JlM z@>38R82K%O0f@X)7T`VRzkY1{%cB;i1XM3~Pmy$s&+YNLSS-k!BIJJ9#;mky;nD^w z0De)14I4F%&*p2;@menhY`Eh$G5JU9%YB}DhJYv(46a97{l)iZW5C^1jfdlAr?AF{ znuDeJhNs;UyIB?>1B4VlBaJW~gvbtbEB5#9q6Y%LxZiUbcW#KhnWlY`PB)f3KeHa= z1K3m9`!kI(f|^ki*(ehnl|dF5z7_fkhlRzdIY1}R#rm>-dMmWjh1%#07rraf)C z*5_HqCKc#+P2C$eyOn8l;}eiV;;Z@xEpptU{e4Vv#Qu0&dI(|wA;&Ill8=`~i=3=$ zb6Bo=E(iJs~T>Gt)%yLN~U4%m7 za~K_)qM2(ElKEUd|4(~o9#2*G{(Z-IP@F@N`8di@hC&?k!9l|@S4g7Fna3i-F~pIO zh%!WGw|S1tWDFTHmN8^XnKFCU)_vdK@9%j%e?5Qy`lJ5IUfbGhuYIlS`dshN$W=-E z^L6%Srg`+xHN8GK+`YIn$U|qtJ}$^L<>$5iG~!LtJeOla(pHhAeLLHWo2OB%eshJ& zd?K=QKih|Ve}~3F*Ij;kvTosKt3&Y&B;3<|1JGIf|32oqKsXgHNVV4wY zO#)_qcr~fobM=GzDI7Zhk9t8uL^9keBc?*iTvgDrTFY@4#(xf2QC;en2jjc1Fn$vW232WjPL1hC`uuS`o=P z8>K)oqeF|6g>9aoePO8{w5{m4 zcsET6_tzb~qUBZNa`#$S(2(qQd>!$s-aTD842xy$cHfa%oVJr6`=zi@^vJw^`ej<{ zZFqF6l%=+6pAC%kSHJ={W+7VTjEP}KOe7h14DP-E(6YBpRJS|Or__0>gfXaUH+Y>(a-u;MvBbi1b zwXL4?0GvE+$~LwxRhY@ZOy&?E;Ar%#Uu@{p`mJH+1v{>I3Sm(`7v;VgYRE5|e0A`4 zDiJadktaGI-_5+yp`E&?P(Gpz>q@1~*;P(;*h-1dwqklJTNq)GdI^MbqvPc*syrI9 zZghh$ZF9?t21tRA8SsML95gg+il2Y-8IZ1y_UBGo030i%G7JkVt~Rk63u#k?M1_(m z4W&`yOjRdfWv9+`l#=X~sLRP& zB>w$5fd)6+;;0lj*(!;nPVm@OVNtA?DB}l<2)mPh5*OjQLcJ!L;d<)d!4*2ho|yIT zo}vO{zZE#TaaOft@Pl@+qLD?@R)1R5}eC|lJblITx+gk=8iy}G497<<=HRl{0mfGMaVG}{AI8Lb z_YrhL2~hDpzonK$&W%Min(ZuMB?fno`C0H2+zb~f{3b4`r!X-g(A(;1*n!BGp%Y!C zp(;{XD=Vf#uSH3127uHNr+(CZld7%{An=LQ(Y`IgcPp|5wWvI1cTa^q*TTD*$Si(y ziQQNEPPB{P;PUWTkN-|yK6cjmqauK^+~)9R;K$lpXu(MRU^9@@m-XT1knzN~^(~Rk zx~!M&tKGQSY(SKl>E?F@wo8-r_1i?8pe$UxjH0v;}W7Tq$LNMzw9OeSO|fUt45wB=#0;I-5USRH$CnOOdDZco%O; z2G$I!5t6G0oJpynt23=$-=&j!Mm{enm;431GH6%i0exGtIpH?Jq=TaS#I*8jP7Q=V z?zJ#_9T}=68iwwqfA!--nUGH`Db65h!@Bnrx;PHB!c-CJ2|VombVU8ER3;*CJ@vdV zyJ^CfCo4eO{lTkc!~gKrW>afeO6%^_UqZ7XIMGRM^oN#tPY^IGJ-IS+zo7CWIVJqS zC0ej+C|wScnE zb%dc4zKveued@Q-RtM@t607^-~;cAYRz6L`Zo+%;!_12z8n-R08 z;MHNL?j4)xY8uroej<>9{B*ggQ-||=!gp#MtUOGB)!Uj8WyLeCS<^ypVwn*>umCZb zk6&IK-nw2fV*){;J?DT!c>OHv@Vp7h$wC%!;~plK}&p-O!v=N61D!?d6!_rud{jFcA@q|2})+vv|s#X zc!%qt8!FM!oas&u7qB{Px7@oDdYR{yyVlX1pL_;dYvQw>agDhrtS;mf>Mwt1NWTn4 z38;vQml(3>d%hTo+4!rrDxNjFa?{w6aYFeEjXhwPV@113wioZF_)!8j-AF5v01Cn^ z@qPY~9(=?hh7Vm5@F^I$+At60BTgaDz8iGpm=a5vmAFH@xWv_bBimY68fUf%y?yA6 zn?F_Hhl5EOCjfNKX|&TzA5aS=`%e~M<|r;O`9#+-v_g(!=uit(CS>`y`9IPUt}-Z~ zLM9=*h!jHaQ$$1o<`SW|xFDF@s_1!ewfCP@3SGH*NN7=0H|SzREbn&cpGS&Y-z!w^ zKfbp33P!8eo)7gxt9GA(67?6V7{wVKYTx3C;AUu^e#w#xpdpTCY<2)nc45;s#v-zd zY{84J3=ddfMT0Gqq~!FIBg&F>rVl7JoLAuMSP+m5z(`?yCoJFZs~cffi0qi(18Sb$ zCqM~KZcwRS(PWo&1y#d@LQ4ni3WPqdFHf7Q4z350;J{vJaqa`-3|*1XZb0Cm%8hC` z%nook3dZ!tO2A09gB*W|3QfKn=IvyR+`-xsZ4k|kFYffb+Py)W3f|Bmjb@#EZMQeX zTnP}^YZR8l=ng}fV}R9#A&Th8&TQo=HK4)FQR2f;O5A-&X~*sM3lzk; zr888c*Wx9-@68YbG{q@ewF-t1dnRo1nFe#0jhiqBuY~@uLE)@jPVB=+ElRJbwpuTt zUVPjw3%dz+BD)j9SQ0u%%$I#$Pr^hlYtO3w*`jBt$%c3ph8an4w>a5oC5lZRtH62~ zjz_EfaGKKYXHS~VQ%=3Q?{@|pj~0Ckh#Oh31lKhLJuq-su{OpRWQDB#3h73n zWfnEvbeP?AB(;L-Muw!T0J51tq{YPy)B7T|L?bQ#Ii7y4-^uJj(V6XdZTj#3%^M_s z5DC#Sc}j7g#O|rcO~98$TqZk)K5nBTuVG?bq0aO{1%moQPL z4|eH+-qY9tm;?LF!;f9vOl~ubF;FKWoIJW`&^wuKtz(ms=#GVl?5=`zhs6=M*Rer@ zG#y2qX&3EyG`a5qo5K>#JkgId@&S zx3mErG>xM)cz5TTYWdwJ@sz{za^yk1G~05pceFNY2{h;)Z^V=uGXG;ZhjQNstSSfp zj3+z)msp(J8N?YP3Gu)}L!p-x&!xzIuY&>%mO^RuxMbo%*OOs2@8#un8~g2W-f2IH z%SpWIgEp^J2PU?pG*h_rEdve;BSdM;5<#YjEftR7=D$c4H-S4n=^A^Va98sY3^gVQfPhc>- zSM^HBiey74* ztj=FS7!^IRN4wYq0|4l@?SC?A(7Yb=V{A;tVbgIobos=O1LTK;+O&c{uSg?F;K!@FATy}8WFaY zqTyqAAFq^Izm@=pDRTP2$lISxR%n;MNXRLJ)M3j%UK&tP{wJ5mmP(B%`l0OQ@zy=s zzy`+05&U`|BHtom{%|s%ShVtUA*J?c>b{O10_CNzDNNei>e9OSEU`Yo$=-!dS91fe{9uo=l?OsaU>06-t0ExEwQ@H*Iu2+%7;5`nFj$P z=whlpn%S{71aR!GlhcnXkLVDRYw)SbU6@tdi06chN~e@}Sh@+>rv{pCJk?)Cqeuf> z7X|yR`BvWA6Rn2}v3^Ot98f75E9e9j-25(!m+5l!JL z)-+VYag+)jz9WJc{9dy(EzFJ@id#t({mRaFtP!mIc#LCCqT{APP7Zh<^wMt*(BKHg z_9<8>IVm*V0$B)PWkcL4aQYvsx}kS!Ey?_y)bVxyL9LU9nnji07k9X- zY(=TWLM;GW|12TsvvQ2$$qUm4Rb}5}K7s~6D7yUNBbb5&!|_^MQg%1`lMZI1K@=kl zsQ%U`f;4e=)W>d*)*A0M06viIGUSCEPFRa&S;B2|H@V;Qwk>tuP z9t=%D7&^O8X<9jbbadrA4Vio(>k)R~x_r{0 z77(St-eSb)&IUEQ@)`fm(1rf*g!7uV`i`K3_4Y6uNTp2?gT##~p=}n*Zhsv61=Zl9 z5&?h-bh4985mbth$OlB*w({(^%f)cSs_dp7--Ju!5b$d8 z<}aXle>#w?g$J#4GV*MPayVLFKK9lDR`^@$K zWFiHdt2sn?3_rRc^|PW1o)n(3j1kG{`gEXz8;s{()jI}IgdtFeKeFpy%>9PJrjLzC z>?Cn^jGFu=5M?fftJ^+@@IvH+xIwLUm!k@f6lRsVX^mf>U zlh>{aeXV$7rrOvpbJBwvpibn44(BdY?~V@l`kmJa0oM{oEDd9+0~zG$J2MSSyxxHW zIxp0pxbE@UCcn~RF;=~;^#{u)pQ&EtrQPc-#^a7nW^1LH>H9mndvgwnt?q6{m$ik* zPN`M-Egf_TJ&&Qnd?D^)7|2g0OxqY zI$Jf$a*>Ew7iVDHQ}AJ%Gt`4CItT^2fx&7N6^Ftj524{a@T5Qey{zEUU&Is~HN?I< z(JXl-kgPc-EL9`m_SL^yc(1{N&&t1)CI=Eg$J}S{bv2|OF@jhC!5$9!Tw5x!M9j=H zF-WawG0%5@X1GUYwYnWNDprOBbNOJtX3!?o0xfCgzvy3KJ}y4SOfjEevTL3O`GM7S za*jR_P0Tulf=&R9i>dgU;Iq4+epCh7TkR7LuSxOurz(g^Aepzr>a~2!U;Qew?0KV_ zJh|H_Rkt(OWqk47LPk9A{tc>!`_75-|%Q8E3d zU(a<@J#xV^>ySqTGU;&TD!`Z zbl?lw0xf6$}y-yuLcZ{}WuFS3yyv4o-Rz)c64_J)3gdZHv4R<&f$;}%3 zei@5%hN>iDWvRmN0qW$>QZ{FT`BSjJZv3fUAnmgTIWMeLch=>-UenTSNM^4SLr%V4 zJ?iFNWvS59J$sD0IXn>KGd}t%5?4LBValpFQ>j;L%ae5AwKDNoB}zkHM7I6t=|r_j z>WR%hiST*09;u?8gM^&!;p4kIIs7}Kdf()$h)q{@ey^jr-LlM^_Aca~`hVal1LXcCJ>LbX5 zUI#`x=6Is|Qn+}6L-~@kXpp=+dv`uO%q=~FB+`$Jl~kG1gIfz2!gkoXv+j~b(rz^6 zTd_BbCX2)@lsN`wVOdf*&|&hL2Ot;GlTmzmqZ1Esy<9MKfXioh&Igy?{tX$1G_Vs_ zOuz6*qm|B37rp%V6~HWPj0hG4UOo*$Y1-c?N7&*>6P$3MQqSa`_6Ag`q7*(2gkZG> zVUQ!0`Z(m=!4vj96tboQjz?T*wGrV(1z=ed)gR&6^=-Mv!5#-+>ujT4#9~n#_Xrcw zVP1g@ebbVkZgp^aw%t=VBAy4$_rMNGwsH+*J4@wOrnjy6%#FRi8FU>kdOif~fi_n%Av06*w$<{TMT@%BFh+ysv87 zAJ6sFS@5hZaP9n1{eA?U?DJNy`@BhzA9Yq zyXgeKGFyJl*67^P+AttaXRcHa>?I3YyGb9dw^WroO{@f1{|h3X`U1MOYs12jWs9b* z!oy;HJ9Rnq{l+Xq$oA(i74gaR3^nx=x%hgIRJ=f`%7%u4aDXV$!{9EnDIAd&JMaCT z0*=xNaZS-g=jBWc4PDx$8tN&=W4SuWGs~BFhoU`NX9NLwxSIZ&G6)9%w-kk-eSn}$ zVW;~Ij&&fj7WK&T(yPbQge%Fb&I=Ay3x{TVFXWlW;?4mfDQ;;+- zu1@5Y{#r7=_m>4?4aMRi>!r%t?Yx3V$>UhVMa?^@y04f%ZYb3a>modB&9T_wZzRJ^szc-7!gR5+smEriq{suVWszV3xHWWh0?5sqBA-wW zS0)HE&j;I>K8vX8PF7#$mdmHDe`MwzG0ZnGS?l_OEqY6;%%!(OSQix7QFgO@e_Gq z6Q-XnGpS%8#i>R&6wOKYGj!PbWmA3Yx`4%f^?I8kEE5)1HGY(6*zXBPTym3@5ypCf za*JM}TqJ|$k!5_Qq1R?lO@=@#pL*xU*K0t9pzjGIotJs^i;Sw@aj`--&?Je-Wp3#I zUjCrYEoLv@_rO=&y7$LzD}82|zha28o^&q;Q_Vf=JN_otVXdhFPzM4epO3y3>~{=z z!XZc><#Z_9>>xfi3DXzA$*ZlKLZBj(B&U6Luyb{~@|DSkSHZXY9_jPN5z3=lwq_*= z>!HaF^4HX8gI`H4fRb2?vgla924{4pkiQ-Soly+u9zXS1X^p{&;1@3SM~ViuK;(UH z>@yNE{KDn&)DvcjaPoPAyN>aKc#FKFs?<=z!$qPiV7V1t*n4XA+EF|MxCuwcTO89X z0cp}%T8zq_36_#3)R+?F(k>O|@=U0)k~WxLW-Y#`Ax;oSd2gvIAGLd7%VK$;SN)P3 zaUHRDejTaOMz+hZbXV@c-_DARlxznmyG;%}c{h!+c=2D*U13e{CoRcM&4Yb--^Ta|biGPJ`%Q6jro?E)i$V zsK!y74PC?J*M7ct2`|MCa-@C>FO%Kr#<6OD7Mv0UYe=*+jei|Ue}6VJJmg{8aA>6& zqt|zn&JPA7wfETQO!-g+06YN#bog&m%OA!bbD~(%rnYBXf3jH;C(4u!GNxQ{tc6w_ z3mDyfIyHt%Zv|UfsezktT{ab;_!djx`f0m!i^+HHM69$m_0m{gE>}#Ll%yY%#RJqb zSOJOM@=oxj4WM-Ht&Quu`bT)HMIh4#%<0qSX;+q0efC%uHqk-Lj73zLse*vJ$$oUK zzEz)NS6X?uCbKrmextr9_elT(CEDS9c|a@=j}K_WG3`o)%N(ish7jLaM<4hVDH@r} zBdHS@59!s4Khn>$e4oM3@VA~rlX?*8zD-q&(tT&!^sq?K4U%uXOk6=wWlH7DN?j0m zlDzw+R7IX-^YgqsIWaC@o91D^THhzetB>^>gEYwbkIB+n_Z_0ajOk zcus!KxV#o&7)mB--KBNE0R7nGv=d8MvmJoO@BjCQet}reYS4s#$se$;toQPl{;B|& z3JHMelDMToAVJgY!bz1Ocom#Jn)?M$-{4h3J#um?Hu&1O&h*bIex2~(>pp47nRpt9&HX*?KCwswW09<hJ&@T}l4A28r3j(eJv#8IjGaZVV_#&NDp``E<=_Hrb0n7yPsiqgHwv_C&IfTj%Fsh1cVrOPA(ZsR(vb-3EB3u_YlI6Fa)owkh@~)mDPl${op7qPh3D>Y5lbj@Pt^EG};P?gY zk|iZ?HeBxG4lAw72a%MuhU?0im}YS*Tll_lcf)GR4|?L`sh{giZ`KhSj+htP5&^}} z^0HF%d>u8eCb`$8(7#0AZvhuU34YcVG%&lK=3>9JVZE`y$c=TZ`JnOo%vJgM^Gm;x zJEy?+`A&`Z$%7EPl8xddCwXMVcPcpYSy8dKaz%~^q=@H=8g&{C1I`%w$&sREBqW!f zq=1yUh-qQH>1)bgZlMVHeeV#@J%+(I$@qf>4fexgVR(^$ojGuE3IqthhOC})Z{3(D zk~0;gI0Z;3vv#}C5E!C(eOB1b&%g_jkR*+sE%?tRy$t- z6(qbQntk|tR`cO-_FJ4jGm_os{mJMXxW!SbT3jhK4lkD~*6IT!7uYSm_l*YVjIe3& zNM<)_`hB97M)!4Mgp@M&fO^PPfWlXM216-ij5FAnD8mu#@jB zw2=UvZG=P+Phx_HPsrTYT#kF0m%T^k&*R2@>fU4W;x<|}QJ)IGDAs<7`yID%IC7j` zq(-#H>$^=(5$CXG_sQx?)+;zbN;;5aUI0xq`u(vFVad}%FF$EHMsxQ1C}Zr&6wGG!L-%bbSyA_0??sJbn-$ZL z28!ZjM7Ps$}MF7Ce`Ej5gkuPS4| ziacDB_F_ygDduMplk!TlWKyxLmI$dz+T~vAV2;r=z+x)(BL-aIDfVC6=Zb{)R4zUX z`+Ja4ggAP48Y>qWOAY^Zntt#xf4`}x>g#-x-UvvgqeDtQ4NHM7@kfU$s2U6g^LGZj zM8LH(G&^(N-cc2jFtff~HmP;gt$z;YFByUHsjiGzpi#tKnS>8&XwPYF0kQm@tbzp1 z6GbtKn46e$xRV2$ziz$U=(E0WNKT!wuVaOMMf4cly#MIjz=zr;i85^&SH-}DSUZcl zY6C%q5DVFDJ@DXhxpcj=RMF%_Zo!+ zMdU&b4f`0XsW!{|EC(_P^@TF-d7b712dCAd#9L@hvzLE+vtKQrk3-()a;RCD*?cvL z$-2OF{$sLmzM_%MiQl} zfWKpo9@_uskwXYho`j=keIvZP1d20P=T}1>-~9ro7d#PSdY2YK1Tju|1(KcrI!g-r zepj%L_%C?-EM#O>I3v27^HgTTSUb!PJYQu(#vC+tm_! z_tU?^Y5K`e{P#C^YTq)tTcVc=2~L~L2|jop*}{uw!##jhi(H(v;a;$Wxq$MGW|w^F z?QC-dXG>u8dPCRgpqjXc@=oG3=?p`LikLJ67Cb z{)P6Osw~e(8XsZ+fR5yLh9#Z3@w^zCk?07j>t$SySSO_`^qDl7@JvcIs@7*K);tbI z0)|1m&g`-m*XQz2u}+^fIoP73irqYs6(#X0=284uFm%?TWS3b~X;!RPM0{tEw4!R& zFjy3#4o)xd=5AaBeI>Nj3oU-|c-z1S#F(dHHE}$>tqZZyQzDJmJZ$X%ZCx}z zI9ZG4>OiDQITn}+uXG-sp1xVL8V62qci0xl(raEXHXcQ1_h>R}b0M$YQI-Nk^;bd^ z#I=M%g%%H%dlDcJ*O@3NkLt4?%|oFO*3Y$lIY_w)uJVQ<>k%{R()}D+nS!)9t-`q` zAa5=d@SPQ?8_3PXa+m{k&keFjD*UF&gkF+ot12gmxqu`~7#EP0^X5(O)(6^AuFbls z?F;=tPE=0+ejsW7%fH7ue*!j5ko4BK1-jYHi)3rZS-GU) zZ;US?o_Cig&49Kluv@&0@Tk8*zjbiB&Z9wg*0IMcQLP)(V4t7LB4YPW}4$KPq| z$;qY4XArg|?a~i{FxvHANBK&VFlgfWs`2L#nBuxUmaxGepZ<`V)SKgR2cD5BS+jE3 z66cs3PvXbe)5L4$^3ci5Lo08hjiFK9v(f?=GZ@p|B&;DtpNkQdZJV~$4qww2W@qZq zVv2`&~31f>)mIXvNfGe<(1wVO*qsTj|e zSg5y?xD`(;Q@C8Xa%rgR;r-yXJc}`TC2VrI;~76d*z7CwP8@GN^d1FKAx;%eiFxjJ zmt%pT^=VEkh$IpjZih)X7#IKEiP^u$wTo~U=5Spm$`#pE+OZk}noHQ(t*pNco6}Wx;}s&R+@4oW<9vtgjG*&gA^4jqXLk?BY~x{iOZxWtlFS9(jzuhjVjA zJ5)Y=dTDpR+OgZ_UUr!E%3MNB<7aoj`cHf`<}CH9%5RS3-JEY%!@RfZ7{N`MJ#2CX5(a(C zDy0qcGDZExIBA~F4;teI*D|jj|6))%2rYU7Qc&el5Q)OyZwJ2MCrTFtIRn#-Uz?$V z3Zp&fc(=Q@L#MfmqK>av5>F0C8qm3ec>3Rxnuib~@*WU%ve^h>v3TQT{0@soZJHuE zu3Y`(m}RJzQl-1{t?+{qk+p4w&=wQzE`H?!Ra>^!4-=m8=G;pJbU$%btyM`CjUKz| zuD}K&J5ZK|lI+Dc{(qV;^dG}WiJVy5owQF^#U3<0KlA2ve35poCV#FTRDs|a0V(+3w5IcxjD^~4@ z?Ls9sp;kT7>;66C{$BU}9M5t5{(Sy$M3PU=@p_N*eZJ23`3^VG)1<$8<0=^$89hMj z(Q`5~N-i=oa;__vNuRvZZc-z?TylS|`H&1Tz_mttLuva!_W>DMMGWof8!FO!8i*Fq zos5jd8ClaCz@rB*z0Eex0;cbSK|jtK`~neYFP(Uqu04Aed{sk|nf{wr zmK?pp3mNX7)Tl{ioEn%ih- zYB1jjY?x>YIz0VJ7bqUHSBI8%7+18-Sba@6J>3b+SWQ(}Nlvli8TW5??8OE_55K>idVY}kUCIA6Xv(oR9k;`fJ-xRuKx_30C`nY6K0$I zMt1i){CQ6%yAbX((239B+TsXt^iK<1I;4%Jf5vMrBgy0urg1%Wz;kwda}_4&geWdU zqZHQ5+o!f>tzuMa>Njd|!)|F&X^ci7=qo?g`7v%%>^8OUS0tUVDxrHlFkN{ zwj6nUf8wQxXsE#+Ku^*GkJs$6k1P8y=oCcruj7@vrD&xNDXLPOk4Zz83nSdj*WNch>1VXc z;k0`iMy#RaYydRgF%k>ifPsqXzQjD5u`kRRM{T#!rg=3HKpRvJpa~}EOrP4_iLedh zaaa78!h+@NGiqj#2P4WWk{?dh^!;A%HJk0{uJ9rnkwGU99(2kOC+y}*2E;nZ zmnGjth@o!X!+qR^a?8znTfLTz*X32AS$pOEb0MtkWK-qW&n3n$R+Y@{Tt0urQNwTF zeIXzr;^Q_95GgguYB>tqO7NLu&je$`mp*Z0WtXKs)a{m34y4{L;;qz8K3|5L&kBD= zq9$XKV|G>}X{cq%&8wCNq$$mR0t5Ce+H!c=K+qG2fi0M=UrPMMW-%XF%POy6v&{DW zw}5f&N2^&u-JY2tlxidQaCx$oB@W%2e>&x>iZOk0Pn9hpSo{LktC~_LLPZIZD!Oes z`{#knMl}z73~h~TLfX%vBf3uSvUG7DJ+tXoGnm+iXD9nYG&}!Mt60vbiWAcB-^?*0;NgeTtSp zg0a_{YW4kbG|_NhtZ^;wELYV$0clSjKC1Xds^@lLy3|zORZif6^nkoTMge2fITH2M zs+MLBfRzbIK38T@!dQF_Y0tNA4;RUtO!u1g+2DRD7O9}FaH(VIx-i#u+7!(i5v=BW zUY@v~-hLC0h^P&jziv7|OA2`AN|$sJ7=3TB4z1r-3tV6uM!|&^)S0ppv#vYI z++J((9UDp9;5wdaC@Z8Gu^FM0)NTvjYTuP_8T!lKJiDtpNLDx8I6D&&_*WXd&)uJO zV(2Wea@I@TppVE|@uDfR+R>M(xMCXWgAlN5;B>Cbi5f$0U9ZtLTxGHnRhm$M0?|u# z45*blmfrvwi)Sk6Uxw+gdssZLlbphj(AAa5S7=nD&jV_(URw{XQ) z%JWXwd1sr@p^*07TOTC)+?WfA_;qEGvE4nxnjO!XSrP)}ya^{%cq!BM;cI&^P4ZCG z1g-q6+zFLMB|8!^lKhgFEoJ)t^3+EMZnL(jiHs!LVRXJ3C@{&&JCT(E6f6?{QIu%~ zL;*Y!eb91>L~2BWc#mQ9kyaT3;Vo9Iq7;|Z2Iy?>KI9?<83ctmwI_OIs zn1|7uHl#lFuLaXU-yfqy!x;vSpuoO7T`l=^pOus*fEWvt>qwJKf1ZD_<<}4jj&#)b zf}^&XK8h(42og-3MrWt|gLSUy@OJrUF=J5Y*TP&i6TZdf0Xq>TrhM-PHrpVFB6pj$ z3P2M8o6?xWJTB5ukm?rm~>En2liE-=6;#hn4w^ zUaQTqxxqC6LS52B8J~y(u9>L zUBzaXtQ$%%lq=J9bUv;vN2(m@#6D-BXts>gRde}!N^?UI70*2%RMDM`h!Uo31&FQ` z`Km^t2t+-!9ysOSAj}ne=B6Rre^Z1@E7m$#nIOAQ75n39OJoYu&n(-lfNmKOp$SVv zZ4FuyY3d3lBq5cXUm65vdMLXVqC^=tU)q9eA5wl7d~RI(Q(@o-+Wc$b;Owfb}$aH+!Mj^D;y^WvtZ6(j8h;&Hzcv=@*0YEmSq)=nR zO1M&xvH-YMswF>kw^;eQ#F`2NQIhw8^A~aZ*2-h3&%g!{D+y8QfbI-ASS5YTe|iRz zma$ts^MTd_R`H7VAApw8QDS~G?k?RCd;}EWk5O<9Qnv+a1%j(^3C{x)QQuLUlyu)t zkJ|2mm!GbW5@m=q0u6k3SsBtjkgF}-Nv;n$eI>t9(auPpWYT^<8ISc`xf#8wIhv@l z*IudPp>T)MhT$FR-r}-c2?h0Qu8vU-%y&7E{d1DED`o?UC}iWZcfuYQYMrCz8W37= zdzD7-WeF{)P?+j^07jim??5Vzy4|i4g{~+MTt4m96!Ff{RbVL51a&cutQT`)XX9(` zpBSqI{!omA+%B{NO?paZo+~uF&JuhpB~R$g|HS@6zB)Pboa{2PKf}}7SuejWaZsQ? zc@ar4sYP#n>@(ho0!~z8*oojlm;mi-yi{Mam~=Qz*kEE|p}L`S94iC1fmyiJE2{*( z4o)pjhIIRy*$j@s@mrS8_%S))G3+|@&~xC;@?qeu!Hn*KxB#$mXo-&zjSlU4{ zIeeKCuXy6^*$tD{rhMveEruAz6jzwV2Z|>~f+yUwtI>!D)+&{@a8$Xoq|<~iQdj=c z_>$cgdM$SrKxA~%)I(Ig0NU1^3Ezf0{XoKhS}ygM6Foq74Zc}-h}C`p4^kGi#f!c2 z@X&k=BvRnY?XEXd&Y;SFAqw@p$?K+v36xDB{<$-XQOFh>`G|xLyH_6Wy_)MXf}YvX zrxGI8S@q->=IhW3s^JX7V&F)(lVZ6>>F69byA-nic zzJhd#M7Q~8pHS1HG?#b=iwc4HAr$yM=7~t40z}s=NeJ7seVmNfemyEj?IQ;=M2LP^ z=SoRjn3DIK14V(;3%szg#^D_RkWF`)-jG9SrgNVcIX&>ek>lsLKT)Rl8V2sT^oc%9 z8$F>ou`qNV(@liTljjqhS4w6yLf1c4J5m>md!WSXLMeNKX;F&C40JI{k2D|;`|u0c zTzhg(5}E-MzBWzIm_+&!zp>OGiC&j3u^mluY6kRzIZ^Auv|Y!G{zZ0WuWRV0Y0_87 z1J=b}0hvI9d1h!StrY9=0H^@YZ@6X!)1=DK5MBLz9G9mfVH4aZX#E{S`>B6=&?tb{ ze3_UgWVg~#ms!vV*_`qc4iFFVsgk>Xe<60JzxRC-Dv~CQc5C#RD^lk7&ToPHBd&K#y2Wq;N4A1+nxl({O19f)IDly zpyYc#l#gpyJRNtimLVe;?_3dFldqZ-X<8y0|a4fuhn* z57pZax?wM@Y!wJr@d3pH*_Gmn;Mh`gCxH|ElbXX=C*31A(=R=Ry&_e&0t>9i%t{^fUR@2yK8$pv?Q zjiGHpWv(kVh_#;*q~aY5LnxYV)M3ojWYv*5celS?sB~6a$%M~!Xhso6CylAwSI#;- zviucI7`KvVi4xCHB4trbM%`wapX$4mQK81hv;=l3 zhlk-E9-)ou3%c=>3 zR=AIWk5N++WhI4=4niHp=2278HHA&dL3EgLX;Q@MjcKSc)q*jtrHUzCS;a=@CdZg0Xx(NolM)p1U`TNLF1p(~-O zwgEr`ReMlq_w14ZoFkPfdqS(mNm$4Sc^o#Wb@R%;V$q;&`U|{Ux69EmHd7G;qFRe>R^29!+8{zt_&wT#hq53~Sh}rJs1KzjAI(cRCyS}A zNQ@%i##=aAJO+j1?d^UDaX+O*s#Z^1UquExlv)$v+PY5fp9ghCl zMEj27m%e-}`4_dXWV65$+HDI#O+Oy5(K0(=5+Jv_2H$Em0Xag)@KSu(A)8l{ zHWi|N#?A?tL+J#}fP%Uv!Uxw^nF-c!=juyE!$h}BG1=?O#uzimq!C(1(6ATL(BOP^ z3?D+j`lV!AG_=#l)C)Z4GOc{KxmHV+_$_;xe!kx>e*HweJkoIqy*0C8xe`J#seo+Y z7edAcxa`mNg;0RnM5q9iw9xA?=q*h7?6NoA(NWU#nh(1*>m`m^2wH8VFYqW<7f$82 z=h!6?qfSS3Ic70tQ20@KR_w2O11n|i)$x?Fnkb{u>?r)jj}MZ&e$}5Qwio#WXWltw z)UM3JP-O)Sb?S#d2Qd)8>3Yh6Z?QyyLER`fOP-UXuUkvF1@?jWHV28%Cq7>L5&lAi zt`gdwzxC0lMh*$(&LtT4;4!_rZS}c`FwZi~7+9FQJ>}RxwcnPbZ>s$gWlJL?e=(ad zSEvwIs0E6@Nuow-A-3tomtQy4<5n2J-?2hvCZ-f(x-Kov#;D zO9EvQ9coJ)owQ04K)A7rXKVu+%O0RsqG&<*9$xeOsp*8LN~h7CvUrkiA|3vs+i}|$ zo{pAHfLw7LDk(O&tz=x0LKC)5eye>Z*LP|+H-hylnEY9;Aa>yi}JO8D^;t8CM=$$W}DUA6~M#8yDVh$GXz$#`UFNr`lI6I`VnbE$SGXCMrPdDV#a>CTt5;huMVb;xukr z6BPc6c9I2g_jx38R&qZJiqk=T;zX_kIZzgf;Nx<7jD0F)46t>&ZgtbJsRi+VpC_ID~8LWVT zQ{2pz!dxiw#Md<+#s`VRn4HbUR{}?{erc0mIT%CCcqPHvz~1hpuYp_AlP`1~EEN!Q zFp6|CIT%Q;26ZwR#-2s;w*S0IcrH$jbZ<>2sc->(f&J=nz*T?#u^CQ6O|RI^7N0*Y zaz&M128dm?+FC6}$GE_)lGiZDQq%YN$!s#TWJc%msvT!Y5nNwGQ(UQoLf~twF(WnD z$MtCg5$;MeuK3aLXYcb%OtZk+@*$$zt2=-4FJI?hh%McFl0>`zu!tb|vkasA^vbq# zWJ%vpe!C%Q>no9PVtvFDcKqbhYO33mI>abRfab;$-peSl86STeb5n_z?)HnNOll4ua7HNOiaAiWBUf z)%XYJv8YVQ6>GstrT4@=MCJM?l0b%LK4;btKF3=39{WPywR~>$OW*LXRAtR7U5#~8 ztO}6LNwm5SIu5@*>?vy8o9RT9pxuiDO#`^>NNJJ!2d3 z+O+)5wGyV-9|H#a|7+#P(SiA94d}_N~~_nM69c)Rr~y4Il*u zlon#|y$D!%xoG|5dQ_i@5gVW0orFApPZ9g^4GDrTLx!{TlW6=xE-6wZ52q|*9fGtX6{dguuIL5V$z>IJt!VJ;FcKn zgcIo{t`pD1NAnz>u}|PL$$-pHm8;5L*~WVnxJJzohut#I%gR~-qS;)XUcRycUql%Z zwzjulq}jFw*L=m$`G_;qr2C@mgM7*cW5HRk0{V^46?<~405cS9pou?=-y%p<$)n(7 z^}$W11FFOBz$D}>1WPrMFZMFH0lw@}qG2f3j@(;}^=)eXNDoFL6hWX4;S^%7&kv8Z z@6lG&mff=|61rYR$I)zFHN88PH7Ap;y|Ho!dU?)y{}(>>Im&aRULutZg2azB$7pNh zy3Yi>d-Ct)c$wYi7^!N#Tp)=-^*1z09-y47RL2zv{eR4jRj<$JF4Oi3_c*sf=o1n_ z9yrN`cO}%VB~4t&8ouqpUcGpxZl00(@7Gv_fj*AVwo60|dHr1-@nSdj7(wtzsABf2 zvnRK0!dBRi=Sf{sf?Nj83CO!XuWyox7p`gJ`z*~!3o5u7YlVv#62|s7*rSyUTTNLR zroWd_Y#k#slO8YLM2o&yqI|9|Ex0g54E@eR@*|hp22v9@G-99IzQ)jw`0{X(1-SHW zND&_I4XyocVdSkgz)(%|TsVLi_JkN{GWRjHdZvrc5E(IXeE9POQUTh^^I%5c>`DUe z>x^6;sgcH*xp+l?Q*?cpa(u>6R5>K-04hjOk*xyKP?!AP=uj7k6EqB+Z&V_1$~aDv zu|2^rDSbsNg`%MYW?~Bceq4A93XJb}1&22Nh7+_74Yk=j;KWCJv!PExb-TS)nF!f* z5{YQ_2h@khwx`#UnT4S-7NsmJUxR-W|NdCToR9{SA-@1B37ZOyNtQD?qHl zTwN~Q*3j8-@2ULg>iK#T$T&o{$5+5MW*>nhvBK78VW$3+V*7;4E0{*n_?c(xN_N;3 zJgq7nKpyfS;Vi`Xwvt3>`XebKch+vlb1z({sLOd4vCZwb3K0*|_jL$E;6bxvx%>#o zfqNzqGh*X(DET1~MNLz%vHMDmlSZlnoKkTxCeeS8`8k8eqjy)-Va5qX7;sYA$hXMd zydRuH6DIk;wjt$l+4Yzbg6!Zy=OjVVAwbmRAo{kL@k!>!0LxwWT}PL3>3A^vp5CHO zs?b6#6&ABU+#O4`$CtfDc+7-6lARSca z7ptr2_Hd=%HyY$kNM$5pf*<^rVPv) z7V^NL**FyZMf{3<4iS_P;!Ay3Uvz)5i1E6ZwJ>PHSa2av^EO` zl#Eq=JZxX~hp!96ge+*{@qTZ~U=I69TcEUVJcRFOf3JXF&O)vTS1fUqjOGttC8o&{ z&iBX?HB5_gr63u*>VW_wR$HuLrSb|5HJY)~p=&i34`E$mZ>2WJ;4B6@}75qDp&<&3G=C;pu`Rc)~+^-qc#RxY!| z0?#lvwfUGrSnHBdA9P(E~ugr>qXW6lcAJg z3Y8Y&D)<%(rm!a3C_T(V;iN+axsLU$ImG@zu3u9!2PM@ksOJ!_vzZdT$tA>I_WDjr zV$|)5b}gO9X)!q?;ALdX7e>M)oa!&W!GgPq7}?iZV>3I@|6)Es`+ydeh{06muG!%CSPF>@ZX#BO?9sU2n+WfkVEopHgpx&5m zL^*;ATYaN|ymfo8g#QTRQ%D}W|8kBvgzRQv82Ry3)`EkD!Q!Yg>nQzlaG;S=f{m{H z5azuZ8?mYi0CaxF!r&5gf*Y~Ayye}cG;II2`Da9PvR(`z*uJO`!*Y!j$lx1h;(2g% z=|-5fAurI`id^$i>~4JHPLzwI=hke-crEjYsNXne_TY=GArNjsN=ovAxz z=AJs>-za`0k)#DGL8HcH75Ka^L9ZcsF^po^qI}umNB*CBB@{*ibLKJZm2}22Z)a@Xpa>EXGjuDQS&E(`dw`t)EgmUv_iG6nq&Qv1wupP59#U zgpnFzmbS9OCzolX!lozHkDS;T37d5o@h^+Q3Rn6cLNW%3V8c02iC1mG&LbW){N|w4HY;a@n7HI}R`SBak6z*EGE6BTrY`{_OHizw5vKB|%r~{upR%bG zYiB0~-E@-eq<9zdu>YV5(GXaLMS=R*g=5d4&pyw?zYjAxqg!aE<*js+Rx z1^hh~tT_#S@526J5DGsn zWgU(cg|d(VWb&N_gT=O#1_}@Gg5?MCK+iwWeKcC$NkVDPEHGBn@=DWngY_bR06duX z+fK8b=V_~E(PU-f^p|CHri3Fko}4(|WMu{XQLKen~`;yx8{U)tW!#oEL@a!~PJvfN-vSN*3wPS6*O zVrY7V)ZXkMJb*XLI&nOPv{{TzOzV7dkkQBfFDIaDVh#*6GZsUH%k#RSv!mqAw*xsd z8E3U{+BjWLmA3K{M|erJ{lFNp3L7;-3KEEJ^q{hJU*Ws(h0_k*KM-T`a?F*knP1Bk zR=`tWTOS1%mOR&hN0FUUm8T_|XDSjA6;mO;bt}tLa7~|ZsxL99pV5(riq<2}awKP2 zr2?@mVrAHr{+;Lq(2*~K|DDG)Ec(Ck{|OC7mC8-_@5DZ~oP~!sa|Ta=I~awkAW$%`>Gh_ zacTkGR3B8aHMAQVO5hCFaW8{$Si&2mXt|-7gPOf4(4f>A$obY&m@8@2u=jOTsK)R~)j2k{ZEpZhuS~}F5(NS6jZFMKJfZPl29P>)=fC$*d4eid9c$ceVw7$6 zUDfEHYNsCFngu6PjrWq&F-nN`>)1V#00u(ZVgG_2R&Y4&z-#yG>|R4EW01f3aX`b> z|Avu7@pKx0{C{ch*ePt5F6F<7!J}wn{J%G$YTIyN(`_C6FHygL`#(fIgH7Xy|K~vr zdxBj;1OE%sP9g_3>|(SfiI^$<8`{@j7MuLLvbD_8jbQ$>EbU)m)81J97oc9>C-tED z53=m7feC&wIa5&xZ{q0ur#T=?1p#=&AbrmYx%Sh40>SYv0EQZyix={fc8vZ9pc9;g z0MBcW{a6lcCQbhVgxk2Muzcs8Gdq{i(tncV?*Vvr+$VX%^A^NPe1ndZW8#142X-C! zALa;%5d8;y!6u~q<;O|?Ai9fQhj0E9e|1(%KuH(u2+{L#h(F46Fdkgh{8<$Pqz^2xY1t}1x{EVD`*+81@2$zbUHIxnG;)zq?QpO;lNJpZ zbmEOT4XD1;D{I*N@2-l}r@wvR+%p$@G+|9GH9Ba!l{$@pXh77TY&MMSL^hC;rl*<< z)7_q?33m7PFD98d+w+i;uxkKej;A-@oVhd+$33_<8}|l6tqxNi5Nr3?>|F4DC8edG zM?_i2t=7-Lu;!q{hO`yQ82evq*UGfImV(rf&Ci7Q6X_F#~E3f+tRX%GL~12kKHb0_2Ug$$t}=-8``zyVeBXmM8^>9V_sy4*7p z-X$)9ie`8L_7E#pC4y7om&%k7w0$b8#*pY)*e zBmA-RqYt1e4>U-3l{2r&`|#ax*HemwTqcv=mRb+i`zXyl-LBq2s{*i$ruT(##0uyzu4YjvB(#8 zn6^&)HX`8Cx=E#Ayj|L)tk8hc;f$BLV*gjE$+Tu<)R_3cFF(08*UVGZewJjt6}PCI zpC`@4=>s+Svac!S@ZqfA7XMOb`45_~7y2sIAT%jaIPWZtl+g9Ur1qZII}T4$zJBRl zlRrb+jR~{W{x|^T2g(4A52sfiVp^(3uRW5=N=7)4sO@hy5h3jrT|BtUCqRyEZ&q-$ zBEASpLtU_{=kG5Z_h>OV|G|;gD81bD&_LlYp1g@iM=2=r#_cv}dqJzGRYQkocdxaL zE|Vnv2{}zTno`qz2Bak)>li*L$gy~;KAa=kfTufHDRZ)8-vX=Lf!Mw40y&pnB2wIAgt2wVs2dW4CI$D(z$@1UjZ?~TyCG4-q zF0_WU*WDyrKDQ@t2GCIBOZ*;Z(9(d1%2Rqy>PG9D>n+HwM~L8ib!h3`PL-S!<^Wq^)rC@gD99zh z;ys#k_jZeFr+f`J)D}!mLtSI*A5FO!d&pR>SCOT6mxU~@J4JYC>nTIdbl6kk!M)mm zFAm25JP$+g!R7k+TWjd4t(x$@#eD_vasUa;+bo<*&W zCu6|nazS9uV)K8Gut;A2=c4iw2fT`{Y?+q6ULyZQ=A5-8;gTgK<7pI<`0-}@6|*Zm z_42}#;j=8ufjaM=Dy+2TQJW6Az3E-ueV;lH^C{Qa@?TZLJ-QP7$KVHP#@^VM7O7G{ zgdil=J^GDBCgtj>KKZ*rk0Toe8b_KRy}JQL&1m)2Tt!X>vGNnKl9U3|!@k%9@XYNl ziSf8|j_Xc6`#PMh{7xp9DJnqrjO4m3oI0F)!m)hYg?jkx;sBuL-2U>h{@e2$OxhO; zgMF$beirg&kIx7)BpQ>^&-*OM-cJ3g#gn!e&%fleRqQyYZowE_BZpV2#JiqO&}s`T zw8&J6L*YHN2{aTi`T!d0UZgTtp=6{l#}l{kv$V6|H$d|DR;g!yx`|4UjDk_4H1F(I z0pZ+Js@ilpWzoLoxtXG^t>tbej6mVhuBUw1rw`-vd3%IvIB56>avb-5WL#gyn(4IH zC+>g%LK12#O7`-rc6cjZYm*&r*OQG}UM{r*H;(mwb8IL6e+1RfaCgx1=0SaBHEc)A z-vqr%mlWQLQPK!oakbL2!CXaD8gALJUwTSO432o&VJjw);>A4=xzxMQ?BOmF74ho* zAd>6So#iWr9GW0-?4SqbvT3>|Hw zVC-NH7?+^fPc?0M2p3W}CCQx%nz)1wU58V`vqe}=5S6yBx5LTnIjkQ_ zijfkapdiE(lO$aDS#(WQ$jzC*Fgw7uU~8sUk)|73yA_N{Ud4Hbx+(J6tK^q%H@&hn zj`GEJ>X@AWVS8_?jNzbxMd$P66X0U-0@jKJ6#fa}`&LKkc5BChfPL2v`7dgc$I1z? z<7A0hu3)AKuCw{ng4SEN>Fszp0YM8)b~;W-F|)5!m@Xf_k~QNrs;M~s_Z`*i(V9EW z$~2UVZ7~hHrlU`cY>X}Rrmd-slcwPDDlLK7bZD5S3)so}qF4GWM9i#@OONxFi} zO%o$Lc-MPQ*&!(KGi%3HGxo2i9CXY-p2S@39J{nDsAD9;Wtl=)U?;@=3E1H5UH)YK z94-}`FIMAsHc8%|2XYYf&y7Z}VTfA}=k`gp*Du+@0Zk0*^@`qoF!oQ`)!Nsq#&1oq zm9S)M4(8oB@v3s*QiDFf)gJf+Yv%{m=C)qW=*S;Ty#QrR@1 z5P_`K2&c6hk6R1#T)4bk*+I^>2$cGWSfd;#ZcE54NPG#%fF>$OiU(uGG5 zy2#-DiHG4k5$$s9=so^xMAW5pYv3T(f)VP*PqO0_bu2=#GqwSny@@8B&Q;sZ-EjJ& z)g-077&CTD11t5tU0I9gTgEyPql7C`RkQBR)C2))j0cXH<8JH`lx&73JOgmT)+&ON zHo%O47`;a-@hn^#2dxMzAxLK4nLHY^bTjs6{`8R34AQP&X`-5SBPkJgl?WFBrPc50O8}`4 z_r>_$3BOxiL~_AFe;iV!nSScDeb2&j3CzK?Z4e#tLRETj7i<;$E}nK~cQRWvSe3v! zQ!c>VN+t2Ym0J{^tltzJkUQ%u54iEZ#*KY%IT}3IKwVT!TFizHsIo9@KP#LAW+vP7 zeMSdeG`HDR0LKM`p<$@AFfo@>ak8jv$n!E%_U$FR>veipr3C8w$VVjv4TPBfO6DIb z?uv8#)PZ}#%CH}4!QQ2`cQ*#k|G-l4;HGQUQe}9r;)4!XjE@lMdSWBi9PbsHaLhvX zX_gUNXK-lqX(Mh-;dXF`2MNu1d`rHS5DzHZR901obuxbRs~`8Hm{P=1ta3ruE5UY> z*%A*EJOABiFL)?h!{DmW91`I*eF0iesP{8YaYIqe6N86RxtnpZpg+7ox1`g37p225 zslwGhXu;kcNhp&S{Ma!NepuHnBrnAGXP26Ki#AK%=D^@CQ)802`Ckmq3NDZemHnIS zqDD!O>{(x~2QQ3T*l#YV4|N^GEmgv5#Jx>(8t?LKb=}%}%{nUCNO$FAEheyavcD37D zLatBv^ey=hsHScPRtTZ0U1S!>YQ)%r0#-vxI`jJXSG?Tq7`SoPOl>Vx^zP21fo8cMC%w-+(U+_H{Fw7{uSFV-YJdX zG9xI4KHaH%+Gs`X_(AFm(4|tsd1>(ZJA@YS93-; z=JW$rPbR7>-TvnGqK}6NBQ3APa!W7RFA{IL4L{s+x!_knKd5%AV%tcnUNyYctbWAR zEEU_tNk&PCEaTPe7W?z$y)ORKAmtyX$x@NKeH6-5t>sb{H@Eq>`8Xah^`9q{HduAd zV0XVI&2LJyV_NRNzb6*?C7v(*JWTn7Cs|cn{v9o(v(j1c#t@r4KMO-j^5D?Hy)aVb zMe)Abju!ukXyY$PYl%YmNTlyELm#@XN5o~#WXYgA(buZ=oB<59+ zxxN3^(GFvogYB|i;RS<`e)Qd8c>e!}`8%&^G%mkgy^3`sv3kkyHVJN>?ZJ=M6J=CP z5)x>%l77qc*>8A~?2R~LR2``i_Ywp)OJQ5jDc$I7Z%j3%7dY^MnI3TqLcAMu z&1%tL(J)4*a{xxkg)%(;{Z#)$@k=nJDypEo3H2X}fl>)Mj!kEFbL*xChY!h4gh&vk zFR!JF@6F54KZ{sbxnm(uG!Vv>$!eT=e=}TD43$dPP`Hj2!P_HA0G)-`6r$yA4MZ@k zV68u%2_Lkwn{hhSRFzm7S`$+#e9cHw@i-~F-o=F%=t9&=57 zs_7;1%O-Up6m?dER^&t_?)_U+9}j@}ne;iQEd8C@q%-kppMlQOua9Zes}-)_uFuyz z3aD0aJ|Q+stqlcx<^&);<2w(cW18pkH5jKtWqYUeI4fgmsPC2SM#ylAgKMnX9t@A~ zp1j?IP-k^r_AhMDv!kAB&!nGnoNii;yEM19tx!efWH}gmB)O3N3~XL9EGX`SSLkQu zJ^affU9jKeAV3%ZlO&%cy|h|$pcbrNyHZER((1RbrfF3WjAUR zmcQJ3X!!R}oJUw0)V9+a(z+T`;1AwPryrSRF(zCT4sb&2>dPxHr&15M81L=8a%obV zxhNmN`3=KZnJI9ii*yF^!M;KJzL|e=(;v^4e2y~IQfiuxoqXFC*5@V@FL$QKj08EI zxvXi!1f!Nk%zr7_XP3B|9-q!>;Xq%xcfwW+A0RvTUh)1!S8a^BT#Vx+C+v4;tj*0L ze|JXAIzQX^{kubfpyZl{mr5syEd3AGQLFn(b4mZ|PJC-F>!Q00)*8i48oMn1!&bc# zeZu|dw4gOa)y(Iq!Pz~WeQe3jX@_~UoRc3BM`8*FrWUNOrM0p>d1|sWZsOu3R{s}l zB~p68PEUEKV}(>9z+Qerb$>`BEJ0=4piNtzV6ECkPF4aMV)3;auFsAOWPJ42H~r_ZNHj--QhxwSQwXpT4NE z&|klriQ{tZVBRQK+B7}~6DPY=YZTV<<5Twr)tc{ljXu+?Zr4*ivW{nfCAF1-@DT#5 z!EA0e8~30-ZPe!RmwTt==jJ3xrxP$4*hS$4-RrT|Me$T#a{*rNZ8Rb>T|9n{l{E+T z@cJi5Kl?o3AWxvuDT;tlk~bys&x1;;zkaPm1Z_piSd6cu=MT{hM@KQ|dQ&T@eWU^s zQS&6;$SGQRw|j-e6l!;Un57qF(Yn=9uDC#kx0F{A>|G$~#ITeksr-b%yy;Wee5T(f zpo@BTL|s4ZXSxvAX2TZRqmCq#DjibMis38XSb;6`?#{#?)h$Xqi|!f5^WR|mu=xze zivkf03~Wzj)$Me0;xZX8$b__|7&Y|SwTR(plF#*2=U%KfR`$Km5HZEJymANgPHsNSt@rkt{3DYr65qM8x1h=?1{jt{S^$PS ztx019W((RcA(xy!)r)Y6HJ|Rv#%>+!9?^<7mUHWqrAMvS+jh>8j^#I2FD~~h986ki zGA6+l7SwU3B!X#UaHE0&m_oY9Ruz6@YLmq1I?m+>buep2X4b_C+AER9U+UHReL}WS zWut9{*me3=G0?D3?To%(Qr|z&BuF+8*oX&CxDe}TZ4Ep%n`*hh}sf_x!fUsZv7P``U;vC45eIqCia zghV>lhF@m6B9abym>#6nHn)PHKOxzpyFG%YWxI=QUBEa&hbu*8Sl>Qf4 z+kGqd2Y=OjC9;dktKavT! zn!sr*-mK{JIIEyig|$yx_Ba^Pe|Raz&TKnj1h)V@dIkF}ykX=CTl3zZE9TAH_Wedd zb8`7hJFiv)U+k5cpYGQ<%Kj=IRIWLi5K&v2UoG=Hh))eV?CA1J%DP5GmSF3^>VE!2 z?A)Y(zZZ8#O!HdR%3X7JQ{4FZL0XJmZ4aC2A+l=yYY#~~WS6-aPXFL)g{Yiflw#3O zFU$(`J(2U399?SgRg1I-vN8z1{V}7Ci}SbO#!Fq4a+yN!`&!6vA#R0f!}8axTS-Gj z6rS7pWo$cXqJ_DGrsK_~qk{(G_4K-=)A^2}U8he^jv8&7n|!cwWr{z2L@}w5>_X}u zxIotSy5~_`;>n6gQwQm(q^aMvNq|CC- zBlXLxIq%3z-}hmIx&QY;^v~EG%I`Ybv0Uxw-ReR6cqVYYq^MKdLY!>A?PZL@ zROZGuQQzm`-u*duowVeis5}N2^shDj>FfUod+!<5g!1(ZD+B>S>QO)-v`|!}sq`u! zM3ACK0qH_0M|vkTDN>|_UZez30Tt=eI|xEVs`QSbL+C9)?!vqzr62V9A+=auSiSIC*?%eq(FiiM!uZiq3j}By)?n`d&_>R`Hr%KfGq*}`XoWi9PG7U^j+qu9E z38;TR*L>BDfRT9`$E?FD{>p&W+I3&6i9T)LshZiH;sQ!?D5-fhe4@Ag#56@}F%30! z8@c=_z-e+*U7FgP+9Hi;MGUgbFE(tSI671wr5L$`5gQJzp%2dD{>%og{f9+fr>?Xt z5)}wdN#7}-#`*_Wd+!le65ozBf^-b5+k%5owGdh4-`8wzy19|^r4yQa15=pukEH56 z123u38Ph224L&lYKa5Wm=-8n+hhquvIH$vZVeS?#eCA*+EfmTK6Z0~9p(vlLTK6cZ z6h=$Y=4}@|T_e1Dshk#bkHw@yeNvFoecEl{LD-;S<4L?Nvq_Q6&b%|j8S3Cho0zDq zVKTf1AV3vxUHM_b9oI)Lj7kD(CCw{>pGkt|_+>YW#hZ0#2n}zi`b}IjHh-m52K4wZ zB(1i4l656eub=8PV9Wr*5X(_(ts0H^IR2prgZ4OU_K5T-z=&k*7ft&pufE!UfJf8G6PK`p55Ltv@}IMJC7oQVk%M>Wym|aCEk_`V_Wi5RD2*}Ov_{5v^bz8 z^ZC+>g)IC6i4Vy>b7)}*>A*I{y~KIZ^Pwq$`$We@!y_V`z}(lGQ^2%!Mj20v?Lj;Y zRm@aV&B-HcJf~#fugcTaryS@W9&(SGe4sxekl;NLqQ=vOn0uc(aHe9N>|}Ptd}ZC} z?IhgIavu0j5n!$^dO?C#!@X#gvwai-ogfX6Q>+)mC2IaHx>jPax$Z;pO#ditTid5a zbp7^jYW^yz(m|yx_Og8sWtZqpB_Gf$ZgNGIhGB266BRJVg$i%0y}pv2)xq9{z4ZN7 z*Dcxw4vY#a_AL!Q_k*d~Xp)necjN3PBP|Qf6jt%B0Bhy-QVaWdL7k_UA$6uc-xFwA z&b~}<{#r2g8^6VI$(LgkC6B8dQt(h>2(rbPn>x>K+2_o~_Mjj`rf2PoU-q_QNTBTB zNNl0P*|I2R9fb%wl; z=;b4HjV=GsEXM!jC`|JfrM*5sTf-7Ne`Tv}x{GAP?oDBvj;%^)<$a<Hk!V?RiV)yWk9wXRO+h3OWVR$i5jnIJ=gpTXf%2Pz;+27&>?m1L|_(9(S_Tjo;-f zEM`B_^hJ2j?u%^C^TOZXWidlLBMz}N?V?4@3ZFo$8!c_Y*eO`7gntZ?x_Rn z)AZAZppsf%YG!+Rvqim-$II4SDuYuV`elY4(&In3wc5@|!AO_V>JZ~FZz**-VBs$oj1NPjgOM394KRp(-B~#Nkpk#@j7{d^yVkSC7CftL<+Ft zJ_;<7llX-WchasztEt*BB}c$6)XS@9h@73g4RD^kod9IY++Ky0w4t?}f1>J9@F1Rj z@l((Y+HY=WddHqTtnWSA9I^~zGXi2pL$OCBH`<(2fM2S3V@Eekg0KyknfT}_epRpb zl)D#EE@&(E7@r0ly|Pv~W>5_}arAN-9|$50CpFFvdaz+Bf5D-}va+w5#1dC`9J2y` z)nG|FFXbW(x*)2x4k+qHXGZx-T(#Fbt*Ot7V!_zL6hwGMJs=Ojd763c$3z8phQoAA z|K2nW$;~NJag`Hl9+b9Iib8t_6*rHw4*!+AdM#WGOz)*re;_qOykI#Q91$-Hw|7ml zeRm(8Bcz~S^wtI~^LRhx(-UCA*@UZ{?|fw^7uv-@Q$X8lljq`<9qrYjEbee+^v5+K zvZ0|TH;GK+Q&8;@WN$02DeF1a#_rBhTb{2ctD73_`LllfthcuO-pp;FC9>G99veo8 zZp_qqP16RMAaC7$8MOaav-ylDWv;bRnv>+-x8aJ`Qq#8Z0}hoQvg8!3wO8UBlh8Qz zYYEq6#hOdMzU3~*FxOL;hLFOkLgUP?g^@2{DmvRgzalzCnRdOeDMm*v9%unl!;Pw2 zQQ4VI83&SyoiBqur>Bu~&E^34oygOvlg#5}?R7Lo5>Nd-Owq@9v`4;1m;5M^UsQ*D zRhI9r92QSIXM7p<@YzU;$$pSH%UyPa81GmxaxN~RhWzevd^cr&o|fe1S)_*vVT*S) zG`PZ=Eg}&)as7AfaC5e)_RR7b(8=`Fc)9{S*-WuskRl2bk-BhbXU@;Db` zoLK&9+MiHCVO&&r&(^nlb-&`bWXF_9f_|y)ikVe+sa%*p;-%>lk(;-M%UV*Bi$tZ^ z47Dn;?wGu?n-DC`d_=^Y_@N)%ph|v1MoCu4%bm?1zIdxqy4f1Zx+#UE*gPadul`ch zYk9LFcOFUC>&h*!uv5HPpn*)J`1T=BQ_^V>y^K-0$N5Id+dubKXkYpp>L~*cq|Igu z2+b)%J8HgSt{U($K(Te!alCBYB?)pSB#boGYs{vX!GR)m^IwUdA|+SQiwFtEG37(c zz#jYdjW@a*OHJXMHoayoA;Y`e0+=uI_~$H$7Oq^}FcCvp6qlECpS}aA;?zz{;6veS+P{&tf4qOI@uLnOX^xum zE?qc8@e~?d7@~aYPchhh8>c?A$b}K(@(Clw1uk7jA$@nl!(kT{q~NsCOUq3>EY$pP zT_Gm;m6d0w@T(^?W&SHORkmRBOzw6TZ*QR(;AzLY$&ZOwk;IPu>vQj4LiQjBTdpbV zwM_CdS)QWB(`{7T@avoTN>Q{R@aW*`63Y)>4o2DkDaS|Ro=h3G^s;HX)F}Ia1Sm%| z^F4-HvxnF+I5kqdm>MgVU=sm>*f-1Y=YR4$Z}}7d?CPMiI&D}_#dA~IFt3!hk6pyz z_RegRv4{AD^HKq;=vPsuWiy%NC()j4#0H2LA>`=!xG;u@*c#}@*?+P z(c~Oln`VKd6f3|*(|TM$i&ak` zeCLrT+C^cd)N&ARN+lc#5|%g*j!k&ad+Axl>OxNzAWL~qvK1fzoNIUw>}qQ06l+OL zpG9z!{K~V*6?f}~DE?(SOxj+-QUWiVVkYQC0@e0m^UK5#5L;6JYL5Qm#**5m>4jC( z%|bPctI%4>RKdeF8JhbBEpJZPRzgUH&7+Qn5xV?rd`T$unjl9~_TpXGV`lA#FQ?eI z3L){=K)tLd~8Ja&c@kevH^sozP!oD~PBR^Y|u#@#Lo1 zSr|_jlR;2Z=og@2Hjr2b!|Q<*C!uE3`%~+v57MjNp&pFYt(;1#(+}-|=g+7~v#iv4FK>u{4Gn zuW84$ay^e0>#;g^Hpqw&+Y|l4gUsMxdSLyGPoiD*&uc&pDC@6Mw7jiUp1cv5!Y7t- zz`ZGfuWkn|9*18*CBq`x42|ppQKCl@{~N`l<4FoxsM5I}3Rmc~Q;wp4f>^EX63T9{b-pCFu;b=$H~tVh{z<@uq4O;%eX6Txqu{_k-C>1w z1)RLg$`fz>K+;k;SJ3Zt09^$D&R_K!^DBKJ+lZdP)XIU^grAwM4B-tU6QmcS;? z3I$9WFB?VG+$0yovi$OZNCD3JPabBjzE;9}+W`N|Y~--vQfEVRC|-k)fd-VJ$lr)Q zNE6Jb4{vv)ciK-PN2ohk&Wp3+ukgubeXS0&bV+ln0vxJi%OmKc$L#y?A7KKdh%VzK6^4QygP{-Hm>yBbQ|hh!%4vv@{hy_`(WGo&9VoB^_V5 z%CC19+xlSanJkP{l0dYVv?)o3XFPwWSyIVIO5PuOi)5n=?TxM38UgnfH8!tuE~qyJ zrM}V^t<0&vAf$l0Vu^yA4TUKC7LvNe-ZlgA$V{G? zcNhd?n0yI#Pk%`4TCe=|?RWg;js8k4*(bIdL%`Sy=Lj;=rxk^FaQZL5Up^EvURA^Q zKF@*v5cct1ch;7&Jp4PMaA)>h(DitTaiEaW_4(DvZ%t0^9bYX@tN&m!#)=4;ElV}Y zT&C!~rrh*XkG3&eX)e$-ZiY8rbDHVh)}yRZ_7i;xp^uo^@98keo@P21Vh!EFr7aC~ld&Yyz$FvqxJ$RvqfY}>&ULsC zd%rxD-roY`Ddq}!KT14qNw&cWI72ao+}4%QtKEqS2D=tFz_g zty0>9^A)wCLOJ)rb?g2d6QjC#Vk1;{PD^&4va3w(B4F&1JTOq0On%Qqf?f7g#P!+Rh-f04pQSk9MzB?xbec06q73VN-;hJnaVe%N55nq2yo!p(B!Z-a(k8jAn6q* zE3N({P>)QNfRhge*BFrJe!vvH{%4mj**~wyzzj6wsj!kk#x&n3_*S5F z6MeAR76Rm|jK`Y3L<8GBhH$@>HZ8sFR}j+qYaQjlgXZ$XRZ2s%Gi5%A#;7T(4<=%p zzxv6ULXEF+ptzcz8GlHbI+qZ1>e3)+eWiEco`HxeF0If+i5avH_BRw*462^{Mxc(| z0+Hj@#8zb~TBNm3%(+rFt=bZ~!z2BQ(ei;XPN7aCRj505G`g5hyIuybxycsEx+by269fZ zCCSh8|IvrPyaLYS9}Ulw^nJ>v>1w^lK*Q+_t~9oay$?u;(Ur;08v42EM`o;&FeUW; zH{`Wg7}uyG3klxE2nNw#aFN955A}$3Z>K8jwVW?dljE3L6EviInIO{ z!NA>SadD4ISOF&im3yL7=mR+$9OskIIy|g6Gcft3E(gLg>^li%8FZdPiLvLIc0h>* z8KPsHj*sp3#}O_b3xf;ZkT}RCBiOdDC`zwQGU#cSnuMRweab=$U#Td+WSPue3NC?J z`jG9pWD`Ni9ROFn(R_)}p`n36JY!*2i*1n+%10kpd0ESze?G|?teApaX+lfSS^r7d zE6^&EoFJ`#R_e=<8;!^hvzB8?6-JT&Y*mKv_)&r#*6`5{t?}xC5IQ`fOp#KvW%c@p zjT_H6cFep-$n%2{uVx{CY#lxvq_>y0JQk1uMPNZk`yt>>RcJ$>vJ+3fN*Wv&`i<`U zfWwy8W%#+F`n9+}I;CO^Dijc_`!{rx?eDVNH6CZ4-yM0z>f}ocmn=3ykVG%1lJ5ms z6tBj};gzOKJ<@n*dk+qklmECH@09&L)>C)?uS&uZa9u ztOd34VszmYY|n`S`8{k_Hs-7MOKkL(h48S>KR)3n=z|{glzZ4T>D9g?!Kz&p;&OcK z8ZkvNI!~gh97G~&{JrwVxkXWG5TnwD79yyOccQ)BZr*5o)?CZJqViRzuVS=n^P{!# zKw-x_cYR)BUd!9As6dUxlw_?T<&W(f42d5CXl`w0g>0wrt@H$1p5Gfp@rq<@!?^Wh zK)@}savgI4TAj^*ZlL!Tk3XEJ)unRhf&b+oZ?@76R5>L^J%@V*g&xbevhz6rx|^-G zpxhFMrsSRKOm=+yzg1)Yr8q=TH0FhT5Cznh>szEVpfGXkSjZ`*=CojD`Uv5n?{zvz zqUzbUR+w+8tz+$C_X!dV?NI#-B8sT4+T@j-qmdfW4b7s_4UIHQj^-2$EtyD+oT7`m z5v&(4h@cIH=YOi>Bp(>Yu+DMUL7_PhC`zxfc6n3Vn+{@__EK7N{4g?~N-}mWBfQ(3 z79J=*l-E)*OmW|RV7eikFcz@1J!A!!q?7d^i#3=tdmW-|t6r?h8mpLZn!&pI!&F`k zL=#1y$aSxci9yrDktCj<0ib5&$E zF)C4*WkU=$ONVoKhHv+(u&onqLMx}uGp{RjYU6{g%Huy;pvPjtY0#=Gmw?XWK=ay|0bMuj`<9B-?GqmmW0jzsWj|tE3*ceb^HC zi)1futpM|~B;|SjHvT%R!sq`gt9jdLT-EldyJX&?^!B>v{UA4?T}m467ZEbi6O(hd zm^$f~oa5N`2G3hk^XTXJ%4O6XqMeQ2SsBk$zPqM2qa=04@2rzTS}#0Dl1hbLif%49 zYI3FTE|&DKV&?08wamk%#PG5y&tw6fW8Y=&C&!jEtSTp~BGS*~cFA^HM~LG*FB&dF zZnM3w?N}gZLQRg*FaQ!Cd?DP%7^c4uQ--7&G^Jibg|x=jj=kp^ zC_#CA=D_Q~lIOf``Uvd3v0I~+^>1DDq7Iv7yVd9V(t@|bI@IsQJK7HCL8ZAD(yONu z$a{P1!)rGR^p0$_tj3@;+4Z`#s5TY3jAQ;ir*G70LNU%Uq{TQ_XjDbSFJsvFeLJ)| z-DXNfPt4b=1MO~pt#CI{+~Lc((luG&=>CtA?4sDDyjnE_Yr279PCa8bxbhk9 zwBwbO>^*aT`lg?)Wt_1u3hF)?MVeVYY%za`4|O@pxoOMPHPp2?<2o!`I&0=tesp`l z^KYT?f(HGX!fZES{!?3w$UoUUU+`gZTEKP%IiC`bol$zGBR__J?&gb^}Z{k{u~kK zDzt}7^etqp>dlx<_}H3`B&MiZ&*(cBy#~S+zd%@_y58T(TzQPzMtUa#+Z8--)I&3u2Qm zGZN%r+J$_G)93tVZnDJyCmAixQuKq=VR?8GbWE=tx-f~ysCS6U3sK1qrTHtEN@pcU+L={c7naMG5!6^o{m=o=Xr<@|wcW=70>+O~9)->+jrlq;r(FrDID z%N>yrj7x?@*Ne)jjTuQRLv5t2B{ASgfP(Has6i#hih2Zsf7zjB@Y8gNNY&DoDz;f_jl5 zohCdm)cg=#@Sy3X-0I!fuVVdF!C15#o0>?=wyU%0E0tb=5oIEji_Y7yl8`b;n=!9G zxEr=^$R~BYpp+h0#YM-}*CdSt6x;%F5ZZ1lC0nX%?WYm zU{dsmR3`V5&)0ftboHtojQM!kR>aB2i>EkN?2U6`;1R({-!)f1JSm`N@tWlue{Jzn zJcoT*PK8yKWlTb*T`c4I=mj>%U45SB?^0jZW_37FC4?kYc67aw^3Q2KR*=+>7v}>g zf@>&y_&hPMUE$X<+of=tw}5RNF4&pmI1EUam^ka{?nWQtmT#{-!6oiqn7LbWW5kMJ z;p@#$C0l8DCZ;l6%nW6!3_N16VHj}=)ZlC}HtI_9oTs>}e<3KP)XspZYNx$?kBXIY zh{fc>hs5_<@l1p8nZ){~5?c3UT)9Bs6Qept{gMggm0Y2f?`^)hwx%SPNT`Q|Nyx|U zOg(RQ%KhN;#jTr%;X*mPI~^xO-Js_jK3Oyr0PwglhLJPEjOWe83k$={jg_wL4Gx4= zC1l-H)ALIk$t{qG2$MFT>*#u?c9{gRdYTjh#oJ0zuL*BOUN(a|Q#0h3P8u}0yl&bz z_Xee?hCLr$Npbxv@lRk2`3dgniFW4#{U>ulei#;W-#v)CE3x%{V$mu^-#D*fOih+1 z+x%!1!{WV|B$r0v9&bDJ8uMz4xLLXm(|Edl(|+{MT|e2<2c`3NYuKwfXANWd|AWh& zEu#$MAS4iep3$E1FE?#YS1oe%FDJ5EF|Iol#fg4O(;+P^QtUrtXV)3u(<6G9&iIFF_NHnFYNj5O}g0s#t&-NbL4 zU?O33+CFma%PEn1*|YdVb~`8Po0Ls8Y{q1)@n&C>GwTd3!toT;VJ@!SK{fI}$5 zVnRqkzPt)qRTEwE=r8=J7Jw;5ny=wL3F?n&nc&wv%asmv!~7n(wj`MPhugj8A{J%4 zJGD>G+$M6WW|p3hTapHpZM`=B`@T2+Q?FrPYJKaFST*ya44XcUSwA8}4 z_Gnu|wo(q-xS3+|ItKl9v2k&HO!|WiYthe?|4g3YzDjVM+xNZYs($^|;`>B@y2d>1pebns{X0m8w{Rh^i)2huyBi=S+C+SP zdkEf}ezYg(XdZf98q>!`CrfvhX|98^-ki@3ynOnTD}wg?%8WF!+|4rVKfD(nuSZ@% zJC8_|56I0rhusmDpTpB!z~@1a#wyra>2X13$N7<^!hS2X;@aLPx5lJtd?seQU9;S_ zYt&e~j`7@A<1?zbdaB1tVfMPR*pc zL}H`~-BejaF$%v*UIHzsXb5oc(zR#bH9F1l%&05;-h3nna_?Uo<&Rj_eTSocei4NI zRwLGT2X~4Z*3-I)$Pmpvwq5n={rW2)Ke$6I%2#N0eZH|X>Oze(3|kkJnF z9tbGEG=e^D1JuS*c@qX|rz(a_fwG4jh^Dg%{>Fk!zq~t0DT5uoyKapAYKznM+HY=C z{fw=#dY%itVr@S}wlijrl;^j5eI2kB|)gmAzA{b7+`;PxqNx^kM022&!kFApb7~g zr3(gWmcmkuRM&E}HqPy#!o#A&CzLwf=+nk(~qls$Rpj_q13P$3_6nX4CEdJaOw>3cnD701=*(-saK*Hl+CMK0#yK4Zc{bWj?m~vC zg*hI8($MA-S*v%!8#WpwrHGLKDEERMpV-|fd=3Chan0+~wEHb1g!T0*K4po`Zj#}o z-`~{OelMu^+Uh@B)CySrOgKB8I6lO}Y<)mEblq}H?Rvuji=(_Hn*zGC%0(a4Q9OAP zaUKF&;dfydp83}?<`nX@_YGu2!}8>2Q!C`pI38+)w0R$8Jf$EN>Osco_Z!0xg8%zY zn1AEBy!*$uc2U2h5fv~Z$u33>^@8hsN)_@1%XFQq4cqhm= zh)L280KAc$qS=oVvF~9nemkqIBf@n*A>U9 zG&^e}w`xkka!F8{n_duvSA-=sM-9!m0TFaUc7MFvijU1pC3tqLzg^yM$AV4R?t44^ z+AY*}+^Ys;P5V|p1xC9x=vONd?J48?uLbb3HEkYBb*sy7igm4#B?8_FcYsgy5Gw+} zk-IZ}!7j|)FNy;8-iX6=dk;)5oF${J0ptgA0kMRoYYiiu!X`jueaYK;iDLhas~U3v^K5Fx znnbz)kv0j7Z)%Z3bp-;xaG4a0$ZzY^1qU+Sv;u_5Xbk|21n~*SbAc4_g2l8L#>P3i^5@pk7DLUV@u_eBcYe# znkfEltRq5{Qv@XJTew!R&LP`~gp)SQajMxkXX-_4q-;ggqE{bJDD0wFK_G+_XE38D zo*#^E6bxv00W6!s5mAV<${xSJYJGi$0s{YKo4^~3_Buq(gY?7LYuYdjN0`OPnCi1w z>8jcu0B<_e9; z+xeIwUSTo6f0@|LyDC$UdwILI96}0BO|y;my-4LQP&Cc^UF7wDFn7a*Fd;6g)Du!l zt|Zf7?T^TL;T`LhEwoaA+5edk{Z@V`412sSA&-kipTGIw>3_T|cn7jv$)Nb%*Lz|w zLWuF+81ipWqV3jJLelQtZ|%0CmcLW)0O~F-K$ToR0+@#yh+rV9#PY-6pMPf)fTOtp zu8mjHDZ{=JBUOL{zk>e#`8TElkw*Age zssFw0|4&Hy75P~wT>XJKt=z7Tv_n2Qhi`E;5n@gtVo?@WJ{8Ho)BI5MJ$AX42&eBJ z8yjox8Qd#D`Ps1#Nwn`ARg60rN?ZbLDdQ9V_;q_ftkZ7>w<}-o^0QHtqlkSAuWl5o zchIWN_|Lv%f}Rk{0eJGCF`t8n9JO6Lc~fqOark@5_)+saD;dv*FlyQSkX|kDn0TLJ zGL``V?CUOQB4Xc#dnIRr*aJeN0RE76h@UuBe~$iANGn*|@P&yEc26T||0{-Z0F*WO zDE)b1b*?c=Y*vS-*$Mor9HAw>{H}tZv=uHSB1gC-7@80(H5bl9!^Z0&D8QX~wwqBZn&uj_|Q4X$KO! z6xg5eQLcn2>3Jh*jQo$V>v#@zD@%9LNg^pogLU8x`rWxbmB}xlMbUA>S2!C{iwQAn~8~ODo1&03NBvV${oRCjV`W^x@JuC2ui(Q>rJI?!cM)I;A3y!5K9U|N+Xi%x3X9nd?Wggd{Vohjcp-? zPI8jx3>QSBn&dW?1|H28x6(Wh-VlT9oK5Rx5qR|T$j?*KF>qmbA;()I9dw}J2^}^& z+d2YNK2nmj#Tkgw_ia8LE1qhx#hY;#e^2n_>9>&9H0!LNHbod>a)T-D+ z2~9IQ8|<;*rRGm-l0+)@)&?^@DP_Z!!vv3~c>n%NbvG>m$bgBvNob2gWt8#7FH&K5 zL5xUN$5m#nO>G=R<($cx!UtLSrFPM20aI=5;vOFMZ^_kvfYM5;V=`Md8zueVz@`8t z>P4Hd_3u}0%WbagzmNN^m$u&j_aC_Zzd|7hR`-AJ$=&~dMSpMh|LIxc|1UDCd8s9N zf<48j-|>ZLVz(oJi!O(^5Hpuc{zA^vWSv@HWl|Hj|C^~Q8InKb(uEYWILTm7O5SQvXF@5sgzBU~+ys3A9u9qW`+2UVB z_Oj!zp1%_O7aA6RHhw8PimrufVZiLpfR)gNNMUxmg1cXLs0X!~+HaQYHb(C=Wx?RD znE)r@48Y_n=`eWkdB>u~ypzb2w)d&=M(xO|(tjVL3%<4oNFgPGm#_Y8_X#-# zm>sVYSt)N5=?xujjDO6kguy>`nb5|=9`pcm!0|4?%XkyeSDF=p$SqV9thS=`^NP0y zV5|H+xdU(QETS)o+&C3?YB;F6K>iYN}-RwRUKHDxoZ2^r1YOJ-#*GKci*R**)bZ*wh;=n0^LopShQqg&%JBIe3Y5Uq8 zTPhzW_dMUP+v(^>R;Gtdxf|>>!A;{U2OzamCzIW0jYl?5i(ogo|D`6@(?(n5wdpbnUxZJg##hMi-4_q3$ZI{ruFjU|p8Q4LI2HG$v)m&M zY!d8Wn`G~)U3J{BKpv1VMNKQ=lTt3BY)k0CIe3`Lo0M{`d3T`1$@hglxvj3AJSA@& zi~I7mz@vUyCjFEHKj7vcUoPa~}ovK9Q zct_-R^MobL4t^>m{_uIc=6#T~j6~V4y9;Z9GaT9U@AJGF1g?xbpwqgx+TtbhmgWB0 zRDc6i7C&kmE0ZhdNQhgw<-?(sVs5}L>6ATs`h!Db*i)0%9~al%io++lvA}HU!3&x$ zhNDmR>UiN#AEWRe@ULC{T|Xc71nfKQY@VI?IA30`$A(%hj;iG~Z=`w}toaET zhaz0f2xt3WQ%8|8%gwjYR;5b)E&tN$^1reO8nm}l2xl7$D4g-B=OwpMe4weLN0zJR z)!i7|gC65S--TJZWidf2laNj-(Xu_(f#4!v-^>2e)bXJ)0Yr1~@ zQTG9EWVCKko8zzjf|*(tt1S_D7>A_zCI60cytV1H@4}l&Fr2i>i_S=qvc0PVKX5+x zz;FR~j4!~S-UfotAaZFo9@my)C>w#`l4;i*&TLo@td`0SNOATaXEPG-ls3VaTw8rj z>f`YqQ=Ct;=2tbkL&cQ0dMh{6n*FEjNi9x`xVryx2VivoFZ=l5j`jM;s1YHL_D=1= zSh{(9ePiR>QSS|j+~&>H{c?EN7dMtGG@YT91oaxI1#+{%TAY?Jyt;#keMg4)m$~1n zBl5SB*0ac)JBHe>p9W9ccx2%p*y_mU$_*Qhu#ME;G7eRBo|%dGm?>)3(u1LCJCBBys@sy#ferN0>_Sr^`2b?% zFLLPEWP>ZW;fAQ(;c3rbK#7XpV>scFL|)l4B7Ldne`61gvc-LtaCq218??|gM!GC! zmnK&`=J~)9BLgI)P&S21S+#UGkrk3>D z)M$etw_$_my6j@A6^`6rjyNCpf6X`6Fz)b|N5jJ5Z7(sb^t%1+_PQMvavvz9#^+FRV`hJSJ+w+4;l&d91G&gh6 z-=gf`!1EW7sz%p8Qtjs+#lM-h9WwE`d-YG0?eOCw2O3$C#pmcuv;)Wdw*`gVFRqOr zM)Bm0al*l{o1(y~5~Booq}6oT^l-sx@6Nysm=7*JL5Of;5npS@zn)ZZH<6we-5SX8 zaXjtz1;@LS7Omy&zS$F0TymG!Yfn$R$Bw4sFN}h(n^5%Ee!%gR z8;g}{4<%B^a)))`ZD%O!0N9VmW?(;Vx)>suTtHQ(W=-Zn*{CNTC;ptNj`LClIC}g& z_WRQZTW&15swhgNmgNr1zz;ozywQW^>HFZQJb6jLSVbWsE4@)bKS8&&^p;l%;+^x4qMHHNgu7h2dz@Ke4z5_!0)CPoR_^V=j?m>LH z;K`5IMScOku4Nw0CkZsQg@=JwguF9x<4`!w#KBfYp2`zkDslI%rtKw&iu|el@4tS! z8(C@SQ2qW0urnmbB*5&2BhNCwT--nH#NBzWaME&{f@1FhbcV#`i54L)N~1_M8f zr!u(e?grXZj~eRu@>fJJpz3f#XzVvm(`0+l^>yt=&5fI`>tBY&B_?7`Cqz#`#=`;h z{l_dUy+t`V)HzS2T$kG~LD?5p&AoD);I2MeNKe-guD{JrK9=kuO*q+Mjal@;WuD9l z4#_ART4Pf>>-JONp!ER%XeYJf-TWr8Q6WYcyo*gFX|=5;GP;h>5_Vtdv55(Z6lUlh z){Z-9V0s3K8H^26$$reN0C;dwRUJY93e^mQJoZ zzscgr7rw!&UX^U$oHZYCacIEA|-D6BQ2@-)%L#>ZTlE$3MAl=Nmmm}FVd3gb0g4f_6Q3AkQ=I*Y+W>ZLUN_$EatmjEP&vm_7^J{B>vupM={O~#(f|FNBb)3UWK~qCr)eS;_ zb0vbs+4m|@!OnIJ)& zQi^7&Nu6{skIAE~KVIC6e|w|3FR5VU;u;5FJS_L?6p4p)a0K|)27tz_n#D_U%mR=2 zYVuQlvC6U5AQff+6|rsbs@((~{e(8_udBb_K53Z#20?VQ{{$vS=4%dv`a& zvtUHx-rCO<<2=@UY~sTWGV;AZ9;&uZ^0~$-=$~r@l?Gvs!#2}Oc!XVz=x1Q|()~F6 zO^JtbLIxG`Fh^y%*A~D*zy}%b8w>dO1k$#)|1+NNerXUSTi_ z;zqXXcG;S}>a8hF9!9Ep5->NHJ9ycCcbAymtcEm|2XY{4<4F=odK<*_%K=#&WFsR% z6VtUR0HIWmN35a!nuP*I5nUlLlwpQjKYX zWDrk{g_>WTM&J=K3rn7NKJbr-1Q+H`k}d}3tu*VmX#s)<3O8}zbf zSpCCqBHC!N2}&|TuyZ+YPY;LBTFH7Hc>QnYeFph>7>p9HELArF9n{@WR?bD00=(_F zZ4a(Ql>y{<22vsrbDw3mGTfU*Z<3ubHx?$LJVb`M@%y_C<+6Lv7ACl1rd@q=Xz8uy=%a6EqS z{5Kd~(Dt}VLmsNeeb|8CkVzGJ7LdNIlIM`0V^J+|6-=h9HeARoK@*^<cs{~uk^wu?v8{cES2fKS&N zKBjd=eD>VN$WE%_sTR51D?k@@<+HW2fbbNBSXUtdvTmfpP{+{gQlfu>%Sh2BFN;tX zImg^icAe>?TeX$xLQZ)D2HyX|EKxD^Xj`6A=x$mAbqyRTVv5wGD_}I!Rbcuc$j|gy z&|2ye(}J^-QG-qN%yprxG~s4xPm2#J*#blM;ebE@9%JXFN2mL7xL*97-*QPy4L$5$ zHbr}hUAYwCjFl-6-b)g8iSq7!vc{^3DR!BHl=$+gbDEiXK^hWr7lpCRMEtIxW6H6R zM6=DV;*xS&VeP!JyCwWpA%q-zUpbj_jj5bzJahi#ezu=2NQ<{xS5V?P?Z@`E^>jkl zRdQa`thSx&&|>qk6JGhjK*JWiMg>WR2|SY=PqJlJn-mm=^R9g2C^D0hJTuU4FZ0J9 z${PfQ^&~LJ#L<0YP+l4f-Sh8FGJAEbVc_@WSpP#e~jQ$38gzj-dS z`iwP>9*UO87wAbH4~s5&GFH`@`qT8K zW_FQK*TARA^ICcaF;stsma+N9bTD>#zc71QTe&qSb#{;YJj4v50GUHHeXVg0{7x`t z8c}u!J!dDBhbyy2c4b0FcA(W`{+6h}4L-+2zJdp_VwUOg_VXM7r9SgA5El^))qb7T z=$kcorko;?zFJBogm_9_YrVTS20Jc}$IriTy@QuuRA4AyW5n_} zm&-+rc2tJc~dmaF7{myAUCVN z2K4^0dNZ7e zsMG&gqYq*DV<;lbmb6#EbT}dHkAir`x1U!IK6A#*juagQJiNzDb`of_jKfd^va&n~jd%wSS_h0Svm%#7l%8Dzt@KprZl{J_MncK7kx?UfD zd0IG;YrclPdz6_JJ$$l`AD|U~?&xKEwM{rOlPP0l?Q~wP$1xtpNb~yb_FS|gN-@)t z#FL?#LJ%k5>I^^EO#pr8r20bK*LtQK%)@2gh-TEL8!ORcK~1>&SdJmkp(+s@U}D!n zn9#*?r&2wGN^t7%*u2`tzPyE1_l;F~BYS=$wzlOB%@Y45RK+zPuE8$%p5J{G&HHaP zQv{fH!m|YTHjz^^zF#FPT6>rIe^dU_9nufFcjjJ0G|#^~SB?RMviTC9WQw(&GOXrT zJg@|H2CbGe-Ko!fI#F5Vkl^nL_FapDvpVy>El1q@GCz1V87aG)D)KhGn3R}?g8g_{ znMymZ+)qHV(;Yr4)Y7+XZQ2)HEqZWY#J#)dkMTrH+VvkLf1)KM9Rw00cECB~s#gKk z^tn@NI|ZbX(^^VISV;;M*7J$DNxH=}`qaE^M@88%U)6#g@eGq^ZZAmde*0kBQ5x5{OO7cWFNxZ-2BYyBQnqiiGk_QU7_|6~U!FX|a4I~@j2PfW@#bk|WoOrQOJuyMb# zRrV*7BSa9!2ps-7X{216_FR(ZXldkJAr)4dlaF)G_0(#cqJY~BbWN1^sn)8rB7~7ql>}$9+5iNI%?0ateI@Ylyl4TgOW-C#5l8}9kOwABc7!zX& zVa5`MFy?#SKA-RB^Z)Pn@3()tuC8V-&Uv5nKIip(z8+7_y=6mPm8=jWbnZWWcJ4S3 z*>?;fLLCXTaRjT)QI&ckCwZ>kQm%L3V%c8lZS{A%ywhy}=o#J4@g%*Lov2L|xhgvH zWv&a=v+He}_ZPF2@VU|=Ek6&$bEV6UqRB7!+Dx5g%r%*KEHb@&!G^e}V{YR`GBfy6 zWp_}k*5sh(1?zZDKw_DPw=>EqzIYxEGuur=0X{GNj^$T7l|-lF<&?&-Mg}97P;BOO zT)_7In9!@=LdtBJdv#MjnaXxw3noa_eCN=Z2gB#90c-u{ljh0{s|`M1Vaw0;e)2C2 z$A*x$ICnQFy~Ae5xOYot0%pD;%WT1!hs*U%zb?K%;-}V>^3_Ij0B`*8#5UQdH|$W6 zs0`X{8YF%CRcb8ZXci04%_f)r2;SZt%GdK~K1<4(^J&DBDofn9&&#|VO1}p#ce{7j+u@H8VdH0EFBIDwo=o1gN#EC0wB#Mf z{>n-a2O+B`7p>Djs?2n$rz4Y<45($b(!>9r6hD%ksPCx4VT0NShtpoKBLnKjT<^g{ zCTbIU2%T@vok~3~T1lU%nGUreycdLJ+aAl& z*OvZy>>_{s&~E2n%-PWlKQdg6nk}y0dZDOwP5iElLFp-$Y0sELjF=2w83h6?;(NVq zKx=0N+Z*=z2B#Knqpml6dgZgblKe14eOHT#9hoz#cq^TG;~9 zuF3hd(_&DOb=1D=BaSgIU$r0F6t;{0q6IfgBGAzA4x)aPsVR*{9rUiPA;4zg2J`#& z=Aq$}K4FhO?)B^*Rtr86_Svh zQ{0w?C+f}y51gw>W$I&cH(qhqQk@q@>2vxx40VKvCl6MsQi^@D0K1mO`OfHT`^M^} zx*20)r(gKut8>RD{~)u~Ti>!7>LYX%JJHjkUy9g^x&(;GB&muvu<6N<5AHRb4f)x` zjV}`Jv@lm>iN8vHS+=62j$sVpajtX2UV`C%0JM8<1v*?1iqBN@757HlAu%d5d+6U2c{5izlV|nu z-);bKNe7{3t&aV~ffy%vTiA%)zu>c*I$j%;{S*V=P};bsCy!%YRr}1dfer(jV@njK z+}OwSozY8h=FLjfhT6}iggWT?ewTp=*XBm@gnsy+Rt0vsZQ_?t_7gveYCR+Dc*Nu> zgbhgP^oJms4CwlSs8z)Pc@$c~@K2+mDF{rtd%? z6=(|9fU1roY+67({hee-Ko*?AceEM|SNU8UcB0JYf-~k`S+Ew6MUR{$o-fGsmpX-Z ze%gAMxl(<`1Up|5VsevZ5C!*vMIKZh(`YfVRupq zO3BU=WbA?e;hDY)psEW8n}dFU*7|+nfkgU$L9)KBlp){dT>A*mAb>Fy4qkpysSef7 z045MAa_uIjA%zAPRIpBUH6C{xHo}~QaH>Ippf1>eNQ44fE=$=0Fz3M6TMm-|Hvtlc zAXn4vTgAP-nPwsc4uHj~llAt37ns9YokHo;%D zM8|BH4OByq=Q!8~p~rI{dOQ^o5K{Fiu@&jJ&+>i)D@r;ndDM-NF8U(HClc|aj2e{V z-v!vLk2rG6Z@i@s`uUAch5aq?U9sTpSd3TQjznikbrReM2@Rktgsde-#+k{~Zp=Wg zCL4vR&qDxHfb5Y4IaVM15qC`YSNHtuLN^+pb<>{QiJVL+Y)3|k*@+@1K3Qn~)g*|3 zEmX19!%uB=?6kkW42P-_OS@cXyIz;yL*B)0e!c;ylOLYKF!ldXN!v5-V}iNo2wb50 zs0xx2SG@1Mi_>@;)QAQTs6rKgNqe&}NbrsU2~UkBkR7c7|8pF;MV&qreKf`5mwnsM z$7FI(HhL~XMz8Qi9nzBE`m@Y{!)e`jzuTyaAY4Xp65~3qA!|2;#8pvTCXA6)0I7|{6?Mi$3(l_$D@#NMIjbSTPeRJ;`hg8P~kYAquqr<~$?9WY9Hn*0}NjPw4CPKlfP42+~bWmZP# zz7oidmh@gnI4nVIzrR&HkF#gBS$a^3mt{ybR(;yJ*tG{Vb z-oogZgCF}?0KT07)ROM=$nllcZl*rlu#wF;Hm?@0+_|~%yQm8aiKfnCtE0Ikihy>l z9?*SXr-!9{1$#nfu*kG;vwsWPPjXTeK84g+8pa$IKxObMeRMZ;YM4~3_vV;Z!_aH3# zka9^g1703ArsEIyB#>J-N8QKV!M11c^0I;}-hVnPW|DlEyk=D?IAV$6h}m*DQji*7 zurl`+Z8ZsU#{0L3Y#Ou+u|(l@4nZbYfKCPUW;Wr%sUfR;T?_) z0O|tsy#wvrivgT{pWC$(Kc@iGe4OD{)v=F^7~TzjxRH!m;8PH>@uuy~>IS3M>cgKe zh2~W_05_|YQs;QGUSh-*-FmS=c=6Fjzk zHTpYe!P^u|%X^#3ncm~1Om7xu{a+dbtBu7)mOzMOvmYY2(~w8MOT!Xik&TKPsl}-? zXdq7L2T7whzVWAeT58TD+>H7YI2dDFRy+FbjQZZ+*G@j6&pVwvZy2dm%{~gsG1fL$ zrQ2n3_JYuhL-2Ms-splPkMw-uiuLO-Bx5p9-v}?fZ}16l-gg-fmkFJ57S2}}R0J=s ztN$%U;;{8A(jA>z>&cy#xn-f#*JFre)QXm;p36k|VWV24!NDP|JbGXZ*;g0Wq(3Tr48W-{lSi@6{Vh>)i1|jCW}zySQY4{+`QI{)~_u!|@apd=ARflveAjWJ21zTLtogb6ryLEDf zFgW%I&|GQHFH{NYo!%8xbb;p^{)~71tz8O-yzwRMaYDHjE^#4t-1l|n#_m{)J(mV&s@0I`FD9Oq^n@4MX3gZ9tWR2^9o$=2N;Xk+O3G`H>|kOZT3=M0HqE4*aFhT{4sKH2^lNe=RaNa zt}&p>?uCzd#c!u$O>bAWRDrRPn{e$pAzfia&HIsTh)(e4SO1$%E4dr$u)Q4I@xQ7t ztMTxoYZ{1CMFuvQ!RVwc;Z`kH@qc2%{ z`bM0`B22leMmA&VtkWxjarT^FZqTPtRW?Ojr3#7H4bYg3p%0@TJfn49!d(%yw!xjtx{lX%!W{+GQjqMfDZQ!E=fsT|zcgQTIKmw}& za+CYotC3FN$~*%S2nNz%egN=4gBQO>1VOM}sz^_dcFC06(whz>KuL7*D)HdfW`|uiDy;V`g zCPzEH{20`ypn{l)_va?)^c@$`$cw@cHcCHL^^-dHCzi|CnG;- zqI{AZPC7@9&RqiiTn7SI>^SFeG@an0pbNJm#c?%hD*Kx_XbGzqr#(K9hoh|O^`h4fa`;TACZ{|()cf`tsMaaIXD-q*3?1|&q$E!zN7 zZQrYal`c=Qswobg@LUSxVS*s?tqPjtnw|p4_aJZc@aNmT$~#E{Jhr|$;S|NUEFusr zFJOK*ufpQY7jdq%=||JGuXXvXFyexZgz;ORF&KTqZkK-0_e`?}z;kfX#D4#5CK~Nu zq6-pQ3xS0B_hh};bN#ip%?W^EfIC|!mK;kDkVL6B$=ymxFjiOiLJ=O>k_^XDP7|A7 z>&lEYqTTKeMihBUqfY(;q;OFwBv{M=ji(W_D3&7FINU11y3V4$?OvKr7s<*~0 zB#q3AjC>M3=v$Z}tsU}*9vQCGGy-O*A!fo;kAc#hl)9K6Wy?N>6l#8nSQj#4L+ao+ zTpT-63jD>cXoGeVqPm#O$|X(c`0tZp%4Kv630)6Y-jk}LO4*HItZ6*R$8|rW6#yY# zeJL}I_y-8E{rlf^x*}bGJd=qu@qP=ERxQZpCYcGY^a^j#b*Lj7@7y4U=rh9yEI({c3`=O$6Jx=k=4ygcEFc&(Cv2@>=7CD382B+ zclI5{t79<_x+!bIcbmW+mMFq*%SZC>IknO^88(;ZnV~Foq`BXR*^i(6E0|Y07SutR zT&j#|O(#AUWm#%_PS#B1L2F z8aRE>CA^PFmc$4!jT4&m0n)AJGG1FlV&=-u?T1XMqSo6}HaMr0#eg~>?wVaAC`-JO{2ueTcUPzO?#c|vd0 zvi-5_7m8%o1i;ufDYaiH`C2GDR(7tmQh(yPy+gX^=&QA6iua_s@q`9$sE6^uVH8oD zP|mXwHE@1RDDYM@B$-FYeFw>vp{W!jVK*XYzCMn_6QnBH6rKkSgm;iw&X6k)LE#_A z1^1YfauStPs;vBNJZ4#Enmt8C$s1j5R?fA*0wvPub7VhCPGBI$MZfuWlb;$?kvzC{ z=oBM|cOByq;ou3(MH28ujJIk6R)6fAD z9JC$kkN_LBX^7)swfl}cTo^SyzA(di5CM5N9^?S;#zO;|AKI4d03Fh?l|%m=)kBFP zwQWw(C5qhbm*-{LxBU(Wrvl|RGaG5qL8E4Ln;>j8eXu10zjT}AEtJRXh6|T}*yKO= zK9dQ?6s4Trb)U_d(L_OJNx;t1yp#v+LysXdccX%yqc~; z9;rV|!K%xy$i7E)ZFwij<+{fB8 z;#lOGlW?5%eznQ99L+qbnJWeLim}_z(g5IhQHC1C^LJE*&#(SB1M2gdPBv!Fis_O( z#_S%%wed{k(n8b)0-}d-vp=gvQzTylI5!6J@aIqQa?q%UGclf_9eaf%Vqq4MsD&gV zQoR+7KEcpI;L5M977_n@KP@+^5E@8!#NWGn4w)9B79z22DcG z1Py4--_35WN{asKoN!8YA=J&g3%RY#IDr5zvAc`2%6;7RLEH$j!TaJcaIp%7OR&Iy z*)nI$E5*N484^>Pzi@ul^7^eJ^7NBJ!-OS?9}A4_3e53R%M#(#NR?T~eKu8ez( zHx__VqW9!o&ItZDuXBibKIXIc13tTx=jxqube})kKfW)s#xIM-9)2VNlLp1|9oom7 zr~DhqIijOgb9LP8S3i9_<-&`kfVgePmOzIOChy8_GVjkfb@cL%d_CftQS5Tgz1JUW z6g_LMIg}W15Llg-aD`xVpB5WhzQa&5ciUOVQrqLyWuUpNz)s|bpxbRnWIF3=H;9D) zdT)UrCahhfHp`3S9|CXN#wPAf za(l1~7)Lt4KXGB<$arz#Qvf=P|NldbOdoaP_q@`yeVmmRcc?hY&+5 zmQbEDz}@&2h;VSbx-+<($#w?d@BZ?o<zXQcngheO8zA z(o@J@Dds;)`0a`faVs(pkk$q!3S4W={5sh;g6SQ+TI#YWUh@d==L5EvmWq{syg)f| zWNT7>ao2^0n>uwig1bg>GoM;ov>ccp5i`w~Jf*+E_~CiuxtS}ox97s1RQ^`t*RoU* zTJZBA?&6lI;pF}82jw?%tw}Q(m$B*t5Jv4-g^N8w6HqHQWr*>v?A_sy8x0kYPn1oq zA=Zb|v%y7I*(L0_mr;uB=w@4|t|5R15gjeN0^L8h&Z82&DhPGlg0onBJ|K$ik# z9uCKj>~l$9@nBRFj+e0NUOd+O-Z{Js(PcRVvm;0}844SQo-($*i}h~_%0&klwKzo!-qjlan01x zmMOS?a45QAO7w@o;6{(IkBCiKbyMW!eU%c>x66_vf#7P-s-@j)k!b$x_CXh7dw)C; z@d}{X1}s9IEm4&IC6{iDwn+K{(ROGL8-j z8MN5L>b-A9DfXqMR| zC7;E}j_Ik^M_*MG-IRVHLwcF9RA9!AHv8++XW>@4vGf1&2?$bVuAD4@pKM|L0HUn2 zD(3i}3geJyru3_QriP7~3CFRgv1jx+cWqFMT!uNDOFURU&q`QLX z>zV=0lE4GgSuf~er4>CJRNFV8Rt`)QT3X%vrcD0TJl5E`ngNDYXuPoz^qcrujK#3G z0+pqXK4>r&2^6#e99-y0C1X#_*6YL7>2+`iuzlb(ee3MSKQbOXk2x#em-#>@$>X`s zb!k|w(_6XluEiS&&0f3f@iVo|#$p-YpQU~tIh*Lg;Hu6ZP$t~-)Ha+sE#=#uwQq!s z|7V*{HI5R0L6_xxeNdEK^#;PRbi{nj(vHdE!iaM^e@Y9ah z8h-{(su~kv8`t^(Y0f-DFc8=qEM9J}^7F1a8cw9<)T3L=0Cg~LK-23btQF* z>zWqqbGKaxcsMs!W>cmSS!D7Awfs+{*jE65t5ru&oti&1%qO=C@nJL__X7Wgf1A~$ zm}>^>6}(f%{>q@w-Cow=xbXNKo|ZtBX6;?)yD5qenGOE;Y?x&Rk8fA3S=^gUn;sM5 z(5=@gTEr1LUlTUdMK2SbBt|XNFWzA^FYo-6?varks=p#VRRRI*; zXvXcpE55COSl~Z9s~V|aqGOl(lJvI>p{@P0ahR<|(JzvwjzVgY`E)6NpuA)_BpkER&PFa|Cd$ez6-em5_;65}>MTjVBiO#`2wocrtY zNJl?<>Ks#*n;+Y(3UAG}QQE0-8WnR=zpXY;NujP}MjETe7WtN=}K?=nK zm5qFr{#>7IACfWv-;#CAOH^+TI}HwYmeGDs@)kL_))nWzqiBz5z^jd-wupr^DM7e= z@}tNkW1oB;4&AA%27TSZ@S8ZNXFp!Nkz-}{#QZ4GQ|q#G-&UpH5%wPY@uGBo8ae8^ zPhWUCP^}Sz6ky`)eyzT~a>{y=h#-#4*yte&5B*mv zAh7lt(PaM2Ns#fO4#rycq-YE{>qrX0OfV~JO)7_6{intxxY_63SmT=42x`9bwlx5q5V z?^}*U_zcg~t|9Kt@ffgvv@&)N`JoD$i%DN}{byknJ}_WYe&|keI7Dc-gC;AVBL8C{ zy@Q_d<%YM`OOioXqlZIt-dOpzqxJKYpY!!w5x2j%9F$X#YG^7=Zp$ZJoGf=wGYWw+gto*2_>yM6B z(3Le0H1tat4$k&XY{8(=c!}jxW6G~*8X7yD>nUSzXR1Z%>Fy<9NX$V(F{nhlhdS)1;g4qR>o9o{0|#uHhg1GsM)FVK+c_H1w13SQ93fEje}fG@ lV*khe_=r7!Q%4Ht0xntlD!qn2F`hsKp{{Zbyg?s=2 literal 0 HcmV?d00001 diff --git a/windows/deployment/images/ent.png b/windows/deployment/images/ent.png new file mode 100644 index 0000000000000000000000000000000000000000..befa6abcc460d2cef2c421d9fa0da3d86bbe2d2c GIT binary patch literal 77540 zcmeFYcT|&G_brSCks?@tP(o4kh=4TdEffJ2Y0_&bQlu*c1PqZ9KoJm?-a%^URe}&H zg3^(MUPPsZra}k=621r2bKdj*?j7U1|K4#K!{LBDWv{*0UVE-NXP)TkXr7|uprfLq zI(75L^*dBl)HGC7N8u+=0Dp<(Yv%#}JK}vuQ;a-Mp@1_|STVY~jtUnNxP8eCEfLcKcp1Z71c(%=MB~ z+VWJcN|E8~Zt}h*D3QMs_K1q=>uiI21ilaEb1lq$Pu?1J9;vtDR(K`n0;r;*BJzl zRXG|Xh9LRG%8JS5(FuvgW5+s7dUz0=77)S=x1=j$OmdM#8nZoIu!kp<;KmR7dMkCu zyJBr>vkV!!|I?{@cJmec1i`JP`RVU5jXux-^+7?5Dd!yDV>GOpv^7um(b8C$a{6*v zoS}WqE$Na=(nt+ryrqkBD7M5qGrfx_vd->wBzYo4$Jp0dL(U;H{LaiuH(>f}XKgaa zDt@Gi8BEQ`zg;TDSUI9S*}d&XxHIuF=O&7E_L9 z)~T-}F@XSi#G;Evl{}5I?Bgx87(?WL)hZ)l2oCo7p3pY)H??mU|Q` z0{7X2urGfQ&Y^;!UVEBu?`WNDRCRcd(diRNlzsj5Jwnl$81n!V^ zH+E+z9eWhS(!!@m%sFV@#P$q=pV~^26jA=7^!AEaEU6n|LFd{CB_zxhlQP8vGoCgX z>(wq}WrxVojhDY<_EdA~j&3anmWxYdSVVk8&uk`FTI5~94|-LU_op>}axxzE^_kEi zVf|uL=HMT#yH>Xf&1@%#X=C3Jj>KdTW5#I0=F2DN?(Og7?hJWz_RzX3R6`;t=a=?B zD!u$k-09q3;;vpmjd_*&Od8BvHb5Gy{#sBQ_q@d_GO|w5o_Ip2{urZCzLD zV{Np#FR*a-cj>MR8$@o5Fp*Z;G?+zq&TD@B1po0VB7yl7&1!({<1^-T63ksaQ=V6z zKb!Ghm(GiWQw$f0ZeV-kZ`y6-kvofynkK#eWG2V=mEYb!RldS{L)Jdn`96Z^N$0PV zbVcO3kn6Gz@%&z>|0Of09v<2TKjh9(n!Ql`driJ^sUCK#gs+|mryyyk#(T~RHI7@s zSN2m@1h43pFj_rlp{Kz~xe93fBzGuGWGmOzke^EF6jYc@tBJ{jCF)=JGHK8zklZTY zVHM*7bmX@kx&6jHV@khs3mCXIRFTZ??M!;}uI{sBKQQkf^rrp2)h*f=TX!tZY?77E zKKQWDuYG^@VIA{RW;&W7y?cFiszb_$b#Z$fHLffZ&~xprN#-etlJ_Cxe%{vo=+3IpE$)Q%OgI`xx8 z-+rXdk5Wp-v+pwEs;P@;^}X~RHQDw+tkA@$ds}l+_Nn>)pvAjwEn)V8^D!wkd_;<){NI5%90cO68tui5Tkp=k z;eXr)h{D+`f$K9C%-FU6qhOQUix!QTEZcjZ%_c;|b1rkZUmJqV0#G?5dS$TsI|g zxJ0$`?<4T49dIs0ALqkB^JK1YxwAGh*`AvH{6rTuwJRh)kYpmWxW}`vkIsbN2`_3Y zf2A2Hc~>UMdA-RGsARboTbVn-Mue|ktXJ)qC^2$F^quvU7T%6>M_{?DgyUd@?^O0Qap2ckic#&<_ycY7I@J_Tw9 z%-RGwTX6V~8_wF8kFfAb^NoMqIyPy!e2$T#G1Tn|OEr1xFvhBA{TtP}*#T#@r-sZ1 z4`)BS_gt84_U?&rVx1r}Bl=9_#{hrb$G!9tpPq{o@4cTMGDmDoddi| z@HVt+wJ5Y(Fe7Q@Xh~%#1>N17k!`B{%A^^RB3bbARCHak)2bB3P_|XP!m#<2b%(bCepDdm8c3 zTU&F_YU!GwK*qDQnyJdW@+^GR2z%=>SJwg85zXG8R+oDW?;zmpx`Hvowg6C}w7G4) zB{~-|t{$_0@pWu*dY$|G7arou%k2KE6_#~6FG&{JQhWW7R7f75qZS#~l{Qg3sgSZZ zRJT6uUFX^FksJP1{daOYN&?9_A9jsHn3?=b>sB)QL7xv|vCcwq zV7nKCv6I@2PQIcjq&Ar%ZV%_|5!|Un&|H{`TvQ3fPa{+_<>7qW!I> z_q3)BG?rHUr9sv6+jVQ|VY3Iz$gLQKzsdzrjC(xq5Aij{kkBw__Wk zuX!sXaem94Gt4CIm?XEz?=w{@cM$m-;6z4_k~Bbn+N2A1%bZq!e-a6R{_}r-RM-6f zZaSQdIy8ntLa6|$)!v|^tGf`eF|U11QqpMl+qb(&X^%<%Kr#t-O-#(T$#*pc_UO@M z00D2bJUVJR)}1I~A!3ETD{TGNxyfrbgq@vT46?s>?clLrLN0+1vb9H)^&~00#b(fJ zfI8Gx=HXmdytAl`oSgX?2DH~{*4T^;?u`))1-D5c=xc26j8CKW$=hSTF(nQRz(`=f)?(aURKvKcN9e?OXuTX%AF zTv;Da#0QEE$dW0$>mViJ`(N5=tKG)LHwHC%#)u++6)#-1s7pGcLaTDtD?7`$66_aH3J6gV?5@PC10Mn7id|GDF~g z^j)RVZ3+!rGLK@Kk*EcXP8I`oBC#eF@~AN3e=Z;5GT&V>&r z^e+n9PSJe!OR-eEuRmzX)rj809tPs52;77(0so!9pWo*+>gCT9>S-YJ6 z*tzb+iT*4{q}S=sYv<^xHW+>!d!tduJ)70qyt|IUeA%#qxSFwTE%|}y=*XxU&MVA5 zrx_0x!I6#rc=|^A9ZMgqjkV}Q%AS8~i@JvGdm5fcHcFK3uai`Z?}Crbr+PMvK_C54 zSAWM${|UQ=GAuOq_QqqcY~WGlDFvB9<6xynqs{rvX!x%0Mk~F@ ztC@n&+VJ<96DIxy^mO^4JKibAWkS|_{+a($Ug8S>jiM1)-0Qe|q@6fTZZTb@o!4al z-W16#MKSCGOF}Uebe@$F2_sB;_a}Q|$io?ljOi~k;akay7}c64(a)R9n)uNZCr-G~ z(ZJmBAW}UF)m@jYv5s`!`To5^_QAJEe==dDx4K`+HRItI+KrusOq1jO0*x^$nV@1P z>Q656@#RfTO?K@L&xQ(gQ;E}o{ln^#Kw>%VhRFxvkTGqVojG#)Q_fuRbG0MZg7pr@ z$}6ODJ`|+!tC9ci?(V7*c7z+TcYn89!=Cc9Tcj?-j!^7gxc=Vy*kd=lBQ_c5*BWo- zHV$~{&}d+Zd!c~rr|E!*2y}pmzl^2ue$>7;c$49^lM2po>7N1lR`k|SJ~3m z3soR&7r|}}%)(dN2WsrdoScepymsiPPi8YqYQ!#pltS4MADC7${omp6L`#~pa1VY|4sD>>Y?*_7(>vrbFrT9CiG`1Q;k_=@E z^vi<~L%tH`!|}R{8w1EHGq`g1W(qK!yR%t*ZismO-1CH;#ayMylev;dQsPXhlALa^ zwMrJ#pQ2&eoQoz6EekVXF_ap6vhFGAbkp!$CJ<-qVQq@EWn(LjGJ%5VdpmEpYclj zPB+t>f$Mx9mvN2&LG>Hl^e8e9!&mRGsksEHv@MHUI(-*zjA2!!2cZR(>BGV@YQWB5K2mS(g7lz?pSzNr~8 zsQ?hw)4z`w-}AFsdIKh_8KIQru+RexrR{bYf;<$$#?aPsAs2|k)Ex^%10*01k|ju{ z(ASSIk@?Z~P#8`V*n$WFH`Yo~^<|S(#**Fh#TewG==32$ z3+aAtUe?DU;7_s!?&g)K%ecmn)=_8i=aj076$qVseFLc0y& zOhl`3)8+84c@18?x9X55f&FX_C2#5Dcu?u$Lmx{yCF-DYostzL^);4cNwi*PvAu6Q zsk-nI*bu6>TP(6TE9`GTrsB=~SM|aFsIfc1K)+Y&Ak0^2(|BAybH5)pYfWDhC^KQR zSp&z;N^l51dV?h008&pWx2V8{C{)$T9G%g{Ar?=(=rF5$v(!NzsAsjY>zMuNm;e;( z4O$>Pl0Z}!bIvNBZI9+Le+iwMjJuj`mi&qI4Kt?rLGfrxx4iJGNhddbMc7us>28sT z7?pL}Wed29gZGdFK{i`IqcS3I@rYE=Nh^A~@0-@~+L;D)Pp6cs2dF)3PmB3NRY#^N zJ1=mVuCz2(fvyNT?gaxTD!mK8%1R?pR!-3%Tbo6Bu?x8wO5hlQi-+*c&CWhJtDK%X zz0ziYiDp^WMX!YyNXT;l71Xi6-3eLwAVuJdIEa-W-Pm}5TO4*n)rizSARaT@ry(3y zP58e?NZ|!J?&k+xs!7xwWuGj+lW5iqc@L zKkDb3xOg#U(_*)>wg;>YGh}E9e}yr#ySvpXxGm!!SYc;jbgML zR@M~QU>eVY0Kl~5dEcj5P{P|F4VQp^Zm73}-$jC~lQu5ef)a|rlplE74)y$VsHs{J zt|0?mMTd+>KW|QGltE<;bv0waS9ma6+073Z2eP03EYxPk7L}9<(NSu6BA~GWR53C7 zop|Dmd8-P%toYPq^IpV~Gls5VBgBlV@IR&$8CrVs*EHG)G5e6Rvo=FpfP0Xfm0lGe z3RPNF9?xsEm|A~cj6^z!Mrjng)LfzxdiM8@4GSIng{J~Kj;hS$%-T$oPq-%E0Z+T? zwPdMMH)D@Vh=hgGYv!`S%3DSam8c4%f8C3gj1r|kd~uEwP|telX~_Da>TA-b-LLEr zSl(G)Wp4mbc==?ui(vMuz63p`5``SXJln-#p;n<^r7!~k`t{B-Nz!>TB48nLm*-xm zvl`BW(;#T3oVD~Knh%TDSg2SJqrJ#5m7<;mKzHC6AH2qTQf~Q&=!?-;UrKgQb#PzL zQMP^fFiE5qP#g6?|Kl}9z-y!#PAs!9h7&mrMfuzG0UiOkluFO@B+UVXVgPJj&p|KI zW!sAs;H(7u7(7KGLxllMc^tUvae#`u!EOEH?V_@L) zEH7{w6_)xJ!or&JE~c_DgwNWzVLv}=YXL@i?y}Bl#-qSB%2vFG_2PCk0AC4=G_DOZ zS&+OWuhRz)z*GNPNf%&3t(;{{H*GI+NG7o`y4?El<7+1^%@N?5Ea6}4m4C2a$gogg z--P|TdyVDSq#i`;zcJt2$ie718kBTI^g^{ zc)@26dve-eD9+|3ty; z(qb zt^|b&15ddjbMoN+=;Qx9oz(LAQLBoy3s7-c7##m&!5V4*xk%VpW-$cV2M0I5;rugs zswxY15dfET1He)mzn%;WK1?n#Nme?!bw`;(o8R%U9{aPb{EKfbX0tdYe-9<<$Ukp6 z`)lZes{hR0ulX8y`X8@UZEZoBln+aS!E9{22f6ha{T*myNA5;8zm&-Ry`St{fQ>wj z^7_6qR(<#kul`8t$Nu4A*%s9&t4}k2d0`0hM=z3=3Nm}vrW$)^+ah`apq;x6kOiN_ z7>>h%JQrX~)0KG$^y`Ol7s^*siS|Di^>JmjWo>NG^i5vu#(6NJX;ia_F;}>u{`p7#eCLbC3rv2106(~>$&-$%RiUDVsM86_2 z?Vzi6Lm=@zJv~Y5&AWXH8$H+Nqot=SGMRuRQ~m=!japmWPSVidk{NxA4-sZKk&fnd z_4KS~`fCuGvd>|cf!9JS$2NsW_PVm2B%Ngp(bd(B^*?A3F-75|;8xz+ya8gH-?V=x zu$Y~cX*aN90QM2EbW$rn^}pvSSscerBwV#{)7#n{(oMab`RLQzt#Q|_G_OSk(?(x+ zlEp^umNh1*>6FPjOR*E&n7`df5!K8C^wAqYyEUFHVQW@H87{Txr5AZ?GXlpK74(3h zk8B|mcFyG0iTcEm5hW}WIDp(loUWc2T<(iiB7Ml9@m~b*c0(z5ekie@K%xD%&*>_N zIVoNhX>IUc=mAKKd)>mdrNB$X;JDF#&!#d2d~>Wk09*PbtZ$t-gP5VfBeUlMrr?ZJ z5@!!G>onxC>s_+V^L73B(~PW!2nIYmBc5pmXcJe|#C%uB9oB;jR+qam6tDK_ToJqR zvbrJ>tw7>h?YdD#9&u;)lX`fd74&)xSk{iX&sZs4G2_AU4rO^TA}(0fZ`QGP4M zKB5dPZUlhh_1W-3MaiT3JPMTrP)--xbSML6ixN>HU0@A_Un!%7f!a}t; zsX++xGE^H1g`zKV!XXb=Dm%NfA0K6>zJ|Ztd&9yab?mLbH)%o$3MUw4e^$%R8OHfx zC+a;5w6tcQ@UY#pFfTVUZFrEkDovz=&%dRRmg^WLqhKX*Ad5@GROMgnd@6EHQ@#VDk-MN(<9_gz@_AUdPtML zg)0E15QMgSPsjNh{n&^c?{zvQ{@{d-MfS8aLkxJCHDl4jm*&AJyky$b5_A-9 zL)A!r@z~X^@hRiZZzPQsLS7+>d6w61xv0NEh%mOUCG)06pZAcYJ8|6B`AaV4$7}>o zO8s;I%0cxAwHVNk;}Tg&-*Bk|b>>&VSg{$DmmXOscYG64TCE{~-<|5@LAbRoD{MC8 z4X# zNpO}|Lh$c=Tt34nu+q3s*qJ|=w9bz(N~wXof0o+?Oc z)-}2$X4!)}biA(ldi(gSM=^N`m>rJkKwLR+L|W*Aj(1=|a!?S%t=5*jh>$2IrR{g& zf)r}i$dD+Y#q0>D4dOoy@PrWKQgb6Q$vZP`VZ*pU>}6{p5#`DHGdp3VGDxj~0NWkR z&%rGt>!vcIh(%pbkTlG2B8HTgU*N+08oP|X@n9&F$N$?Ic|}u5xmk5b^X2g7moDZH zj0<0HXiVVhYP8+^rzZ3kUL5617o@X)Pl2zSI=WF}2)go55 zYGVNQYf-^>dsmMWvb$1UCxq_L=_(=VO)ZhdCp9CRU0oHm<8ZI6$t$`jT#YfVdLpB% z-2P{M@(4w2lgl*Q(z+o`$^eO82tbBc$48-PcAaH^L|3y9$=8AlahIieCicsmt7 za#e@|`Nv4&Ijhfa97w8#B24JWA0sdqE9w|hE_-0p8KdNNpv)LK6`#X!R~uRsPx(}` zHRm&3#)vG2s=60GKs}<1GzyA0=*HHOsD}E-G0PStlg`)8*(0x;h44|e6Lr`+!ufoW zi|B!Y{Y%5XHBfgoP@2aK{&G+gwa$XcbnX)k&*k$ zM+f7Lpmwmh`SP!IMc$^FM?9>g(=FjDe2=Dnnpzd>>=BC_X#_3d429sAP1xA zg*WR}_d8VC2v@W_4I7c!%502y&$Oc#YMazl!crNFVJsbwfUbr`C1DHYjx><3<(g{K zh2JRb$CCx3)W~h_X)=~ZD50o zU1`^UxD;|D-2{C(L*C=+NF{%d&$2TQ`ts|o*;WzUlU6BrsBO+feS+XNZf4u1Ff;6Y z0$%xi0ngiesc7k00Ct$InV7BesIBX>qoO0vnVSUPpC<2Y%H{>F;BPy_aS^C$A;Uxt zE7ZC{?HviQ;Vz!TRjF_lg)Edifea-vjF4Q`M@cSxtt!sOhYf-7BUc}?jhE6)F7v+# zQuy$jrFL;J{LSd$*~QG9vKaLkapZX(Wgr5mr(KI72-+%QE(UqIC9Pug5J` z*F@CX-C%2uMH?SR;5u6ALpngt1k(#+JtgRbd|S%E7-Yy&9y%0f^orP7RIA|W}Y*Fc@H`HKMuQWc5 z$DtO&q~t&>#Y=nLs^#~_ONLp-I{{``W+6v=AzNdsNa@jLplKf)a5nZcQn%Ws(s4zo zN}7b1Y{h1O)q9id*Q1mw<^EKs+lYPBEEhfK6c;-@VsjEs4BVMZ?9Sz8=_rQCZ<60P zl|{U8ZqIF1K%@&j4G*0O+I9Ee4@im(QGmGhs?F(*f~NfjG|4IxhTA3Yq);pWkuD^q zAqL@#V63d=-wbjEHI4^a^6pAL<#D)5nq2NtPS{DrRFb&~R|oagJG0LyN!!ai9a~E% zcT)K>lw2kfHH&VptdhtIj1x3I`^|XGbzZ`AVK9rw>5zkgVdBTQUA??KBJp5qvP8x zNctmW8*TE<;LLGd@+A?lp@pke(`EWn6z|Q62hNC;aB#R0BS90%jSnR4W)V@bNPrmE zkM+`9G~MJzT9Y_gPrL-u1dK%{2u7*#ag#sy7MM2}GS=qRUEM6l-&&~D9e$AB%>iGi z*M24nuvF=O{kM8==y_eXTg^mvEzR(ibJzyr8=r(oQTvljsta11iwH0Ufy}^O?S@_s zv&)&A!WuS0hbgokv{w47dVfNtvW<(k;`@;!YE5|Mwn4JpP^*em>n^{7t6=f+Hxt2!Vlns9{Tl1wPjlcBK981AyKBI zU!JWFNlyYo>pEa46KboHNI^Rffl3eyg)vcKp#qrZSKs1wm+^`eaVs!h zbqG3-rHSRa>oPUEW#4VYebo!w+hk@MEPfVQE27 zwf0A_42PnAqr-yF!&nS)_DO*hYi0I()TCSY)6>*m)rR$|Er+Wl*P-;p7`njY^kZ1i2D0_7QyfbIuaScFSCU}DMbk!(JV>{-pa?ORhq68^Xwe~N zk!Y8pCR!GTdlMI2d1{532ITJQqkgp*uSflAZe220hp zx?5XcKOu4keR>0mG7;s64f;v9sua=RjE6!M_I&+ZtT3fD?$jD)4ui-N9tEUIQuT)i zt9*iBtYIMh$Od$%pM$n2V8s7i@!CT-{PEzI)s;Zf-n$O^Y4nS)_da5#&N2j_H^h!R*@sI;IV!hY#bG?sFi&wMu}3 z3NeQCG#jcHvSA<&MmmD`6rZUbq{-;A4_ zRt>t_Xd0;`=nfGzJoDZO&{;-0YB+99b`hf^Ga7=A4Q?)3oEcrtuFTQ_(bP_Q>)A#M zYfM%JM1$?RIEh(fsCtowJO> z?ya9y$;u##i%D&A2rc1CHsu8fz%vQ?gzzC3c#Q`e<2|y=P_X1vEx73Q@+(yOm|~bb zz-Tesrgy}cE!+``G#Gt-#>2lbT0+s>{afzWp&L@}7I#;3hv&|lcQUp6Sev98PYw?| zB4Tjr+;kg0OdW5PE^YefE_D^BDj0fDw=+(;>KR1ZJCA$S(u7GokSQc?FQCRpGV@FO zXTRT^QC*1O7JkW6wG7*zPN0guen2W*pK(fQ0TeAd!b9^PXH5_ctU$GPB4WN8ix5LM2S$e&Cmx)c*Ed&F%2%0k~MOT%?BT%9jvobtA|6WiozuAkl8dOqF2t29LDNY+4}fJkW!Hji1xIsZ$uxwi_QORf zX1bDg2k}95xuf+w9CB*iZ*gFMz>vMV^)e)@$U)vu5Nt@^8A922mU!QE&`&2V20m>y zOYbyWY$|q2FHj;W<P* z44d%TB0#ygQb%2*vxMJGVozJWU24_JrEzEqRVk7) zP;^AvWs_Rj6V&Dmy%J5aCc)0EtXnLE3!^Oy=TQV^QiJ#H)jSxX9FsBQIavi1qas30(268N zULd0DoV*Cowe+Shn@tE+S#}m=L5wd)np(p19g4hhCJX5XnJ*7eo{G>Ly+GHlY>k2< zh%6Qgh>qD6D!DOOO)zOU3^*r@i^RhFJK_?59UVrY4_W0yWfJj@3W;f$!E>|x4 zUN@F06zyPAuO9F_PO#s<@_sy)dpk>MeIS5x@^-fO71s8mo|F)j*Dw^ikem^-Oks3A z{+cIgDQ!pzt2AEsyNKzqwHIkigcxKVV~jV@B^xzZ1>%6hh?_YOdo;I~wz-P^aG14? z!hwD!RE=dzj@mMQSDo!RUQr-(d=gg=oXJ5AI0PBK>_mN+B4@@-OH->0&p^8`LE*;5 zI&E?A^8w|}L%W?Q2fSKYe%Zo+sBawjhxC5u2yi6(4D^?zdscH z4#0tpA}}M%A9mLo%S%F3h!F2bCuuD7$YQ{`!%vvgY>99Fy!=H41UA=2C=ighpr$nn zk7lM$(&WiYkq19fKWjYsseimchaJ5ro^DFZGlqln_3u&Aa z_W6{^ReyW=J;^g}4hUuyC33G}pBu{cvMWm@pYot-BpQ#(C#8=|O8wL+FR~`1jd!qr z&HCqf_d@flu8bP)?ESOJ>FaahCrLPoB`i5v*_1VB)r;L->0n0629o|SaRM{O#2GJk!bGJ z)@#&v{pW^>4yzWsIJp3-XCBqx%3mV8&IX!S`Yn=QBX+O$^>&mWAP#(^giUe38oAzfSKmx4m7rE#|D@~w#?n+1roa!x{4nF zc_U{wQR2{Wl*Z~6+8zgTwF=u==C!M<)Eg-3mpGuo4w$e58OHgq|7gg6k;WJ7+KSJd zM4yfUsPu=@&yXQHzphmOx0W~h9It8#!p!pDzTVz=?~ri^L^Wl>LtIF!R_}Pm@jUo? zd$=K}+n-56<@#GrfCv_ubS3X}W5eC~iYyzXRiJz)13eZB^0h*Ae$QvcQ3krmn50sjg> zuGy>~AJ{VLuh}3H{)Yhsto1X_Cf9!bv&=f=C6)iMt zBlS;qFVO&oU9Wq&?-t7uWYp5~vR2~Vp|P=h+<_~V52*5NTn@a*FaOJnEFgW?o8J(N zro(&8G^Yz+rH0YzaE&Jnr!vW{Q+E0h-9Rw2kykwt*947AlCFjH zX_CLTF+pmEETWD(^*#=10gxWPo38gKUR&sZ2qFR|9N>GTwSbgJ_4w95ujd0Bj{5DB zi4zzHMgYp$juy;V@$+w%2YJ5M8~EEfK%GufT{x6TY&L;GCB;H0Z@wHo|LtGCVJep2 zdVoX0xEyhH!U^iFl1yqpz&{0FxPKXj8~-*86AvW7pt;;t)Y|~7b!eSia)Zy(9g+)S zwGfKu4&|V}LO=_@nB4rV$?e~+!!+E##*GjQ2n<|(1(mLqzP=D$hjPD{I-Y^>R7=+_ zHkjJb>-@2|(LdoXSF>J_5zuA*4i9ZY5b(II8O+|C$o!8^o_ffE{%;=sey#mTx4Ytf370z?LfygmNfW z{|P0e`K>-8Us1?RfGHfQbB{!#tWS;R|V%kekwZjd#O=m}Zg;eD;| z_M0}X;6J2I2N!5;asdCehoBUlF4NZm#VzK&BFI%}^JKy$jRS)H07;nfQMT5mQe{JQ zfIdGe>*vaJlRUZfeya*s?wTxnPCu36z+Y0N<5a)(^ur+nRzr%lAt#|=Wba=4vtPb6 zRr~BL1L)!-TADaxq-?7F!Dio_||M;FS~ z$oj!qqzu3mNXFZruXWP|XfS3u)+WvD0?65cY^O0izeSL?(|eA@{R z9rqQYDluN5q9VTd+g^0w!8M}{s4>mOZ1MdX(2@TfkW3*Z>q;Y~Pzmvyohm)h;wfqB zLeD?>vIumvUd{#(sRsnFhF+fn)CGYII?H8WJPV`Tf%UwAeOW2Q!zTxzNc1Z5y&cIU zLY*~iy#+9U*-g)Wo&w7j67TVd9eA(xS*d>G`Lp3((RkH16>WOQZ-@0eiW4}Bes50N zV|?1(My7e6yO8%he1b_@wO)EE`rMVuwHu&&9H@jq z6Q<3^R>bpYdp4rZ3g<|Xuq7nE1 z-gt)b>4o!Yt!;osQi<%&IyJIx4R8xuWc?V`)l!;)H}3alQo2g}Lr<5YL=AKQIzq*o z`p@D3UhzL}O;%~Z^K*1ugv3=d@_G7F&Jzx*wq_48 zYMRq8Um+o-wF#?}rGWo=LAN}Ht9px5>9gA09nrw@R+aRjb-;CyHlVvo{1PRSP@e~P z4a=VafdjUm@$ep_68h_qR{}Ll{^O|hlTd`qfQ@bde!udbxw31kdteI z`#PdI7sz=49V`SkWZR2H?6oPqRh!}A!U1bRAr4!3j!}(e?;b@*#hU8<#r*7E11XB< zsDRCIVXao8@YqbP74;qAJ%i_~hmCI7a_o7ula0_x`ax$|I0+bztv_FN~$2 z6V95k+_iK1SptT}>3l9xfh>&0j4ZG5k9<0_NPEB}xQ*?3>0t!lV1LL0(p7CT(Z_}A zap28EyusQonX}fI?A^Q=I149EnHaZZLF|Cz1K`={IjI2rDurI`zjHop9dLGbk!IML z7jM9iyz;o4ox!>s%WvrQS>v35(7+AVrPzyxGG8>#hUcCH{KSc-GW^UWZW%9La_RLr zFFk(IA@#7pTWg2*N!n6QdKx4t{iwKNQd<)d_#Q;rNeW_jb!wB?y5$>3(#AwS6=D6u&@j=j2wHi3V3hhEK`X8xz3e zD_i#Xdr?7#H~?ZwPWc)IVXSIBn{>O4V#{<0$G?6z1=8{5VLA#$x?TrtOLYK7roMDw zjBh&kw7qyjSrf~{~99D z0;$TF4&$Xo?)S018Q`1D6ZkCta{TLC-PPij-lE${^?}`5v zdCk1n_l}A&F8c8ob4|d&u8hIUn2%03oh~tJm>{UioYYGHuhG{cLzg03@*Cg%1r7@Y z+*_r9H*(VIzow&45UgOh_p`~TCG%}3dtiCG&SL4yQO*+M<_cX+;XbPZ=8o-&q*IP> zv;LYiiL<{+WKXzqO^DECDlTp$A=H^RU{}{u4O^tXtiGim*v5z7MHoAGF8$tRQTHzP_WTlI@K$&|1XS};o&Rm%18gjGhyW=5<@Sp0t`ncl) zP*V@rk1C7hJXpxNbm*xTXy(0eg4Qw#^yA)1z5Bss4)GvT9{pAq{FU&E-(}EhoF4Bf z!97ux2`=G%>+$uqZ)BF;m}Zd>kdNVu@au8z#^LHsES=)SZOc)K`ZBlVwt@V2N>Af( z+yYv57r}=9^Vmds1A#7f`TV=fagRIB%I1$r#cm=O#Szet6ejhpms+nCjd)l(~6TTz>(rYHHU+FB}RI>&pPAS<9ehe1k0VA_2<7>^?5E#-xZantB(C&^fS2gPGh zB-}J&KNqvvwv%o_6|MPSc{I**~^P!*$+s^hXCvwy2${|0}nKxfv7qtv(3)L_%*nLGOZSAAI_LnIYb;Mdg&OJ=^if zo>kJ_6HMNrm9pn=D*IBM<@WYXMy=+u`LBxBQ>?gp%rLk3&uxYF1jVs4c1+|~aWB-h z?R_ZQI4cX2D&TP}PsP#Lb#LsF-QW&HRM@jB2Og)ip1O0kkPmnf*>BuxAJT$M$Vpvu zx-)^qgG9Ob??hPyOvB>$Zs_}~q=!rT`cKMctN6=jOur8_7L5b(_TCB9Gf;7)Vx`af z^t@G0`YwOGbmvbor^JSFCAv7y>AMl3-gq0G?}j%`G08^^PWwLTft{NVlL^}Y_)z!E ztqJY=bK#o8hF#e5i1A%ZH-AU2DT`aX3y1Eg6~mslCVi^=rj8#B`4W%lt_>`l6=(_X$qJ zDtZZ%LGeQxgI}LjJ)E^^(2m;d3@fo0xH{wRyDU>ojab@R^>tCKr{Z|^U&Vz$OS51- zx)9F7{e$o{BGfEc_0qwgnjx3LKCiPA13fE$K0OM2iEdO=>}MS`pj3~|;L>rriBjf) z>oE{Pa8Dtsgz}lc$uFA^^J(j9Vs^OHM>A;@Q+t9Fx0BwwKe>3*+}bLvll^jiUt5q~ z9<)7@M@>V~c#1Mbe5JdlV?%YQQENxGm(}SX#O_iX z<;}%Uh)_SOgtN*_tCGv*Z2h$y1WpUgy%NJP3e;Pb&LqZ)Y&^6&oxt%;!0^MhU^s>4@<7=f7=g#JkR&<bVqz;R zg3E8v+FvDu{l&%Wp&^`Y`Sq3=pQILe82e6fIL4M&S>{HBe658UG?e)C*j8k(?#z7< z_Qt`lZ?Rwc|JZxauqKl?jMvpg6c8*ZAWg-BpcLsKARtZYy(1!>08*s{RHQ5jh)VCh z_Z~V(5$S{$N$CLnJY5<9J>U!fJyr4M{d!j z>i=sKHXu|!rtAN1X?i!N?bQQL?)`R*jUgG=noL7Wi%5M+K#>2HyV0{lm5Jx)q!&f? z-R6%fBYQR%1N@^lD0j?il5}+?xGvo+fW;afjJ7B9fB4o%kapYmdU(^4&&H}Jo7JobqyuPq**4hPirKvb`=ZFcj7U|CyWO-ZG21P5iBlSfAo)*)^IYdD zsjcMv?Mp}YPlxzFE2BRPHd4uam|yv4@s&%5R{e*|n?OU<3OYczpTRbhl#Nk)cJ3StJmfBKASWk`Aihe$JIj_&o+cio&z3TNYDU&#vfiV_ z6Bv{*yeoRM-W%dmLgp*AHI7IJlV@`Qn|Kh8H^$qd+!_x+$y{C{1`_gY-oEfQ;O~dj zb#`@)T|VxhgC{SmT=-pnKVq@y2zs+(Ph8E?LwICnqknx4zq?0yvz6_+;4d>5(i$9 zKIIpehZZAN`lhBSL}Og8Gqad`?>;ri)cgu7n0+>Xih$3Ekg$~$!p_Y7v!VFc%o`$8 zj)uj4C3SvsjRl5P*(~6ak8@dlfc~@HhLEQl0McBwcDGB-(V*Q_-{Ldjb7Yl0>*Qp- zu1qO@`*oNtN~z@!JyD#P6(M55o%6C5mzWYm5so)sfxui2jHkp6Zo>i|64&+odSD|? zO{WeW+j-0sx^JblR-u@dwlD85<7enbg|9yaK7Fc$FR2~5@%VqWBmbJtUBKr>e56LQ zQNUm@`|sMf3pEIJp%zsc*-o|;$#B=ZVO(0ZTMO@0;}3QY_Dwx)%iBuzf-@wtP|$d; z92`GHS1L({t}~uxEt_CV${Xt3wz|L->+<2{OL`oIn)}*>nVVT5nlG@QjjT-6GEa0I zE=`w+n%)DyGJV5??Xuhc$tdHIx|#PMKw^G2JRPh4IqhaN27{?Ct{6Lqv#qf0(t8gC zMG13SujcPxLKpX+ef=y&5Lt1Wa@y(Fl5~e&xs@XaMf3IDC<({y=AoAJZzvn%2L1ps zQjXC^Q%SBu=basR_4$h@acBJU8?;hfEVwnepq8u8W(e9eb9L$4Iz+tY_nF&d@NE38 zXA6%o&4^@xL^A#0-|ae`&i=b`%n~#Ww4@2@td28sB1X;UnqkM zT8AP+bv3>`I*Y5V9NzIxGvmWAjSe1C$7y}GaZ18f8hxcN;1Z1HZFbTFvfmA>?aSyq zG+wl2D<|}lnjARLgS=pp%#n-`vZcf-59=V zDkQ2ZS#ZGqS7&(IJTkvMKN_{04pS4a zAM8(JyG$`o@=!9`iqLi!NStS{O_g3Y(%X=xbKcLrKN{obcL!p+!@cD%8$glInDnW* z*sUx#FVuHXy+n}H>$U6&LX_%SZ6#}f?!H9jsjxPRjj3#BG!Z|Z)}jRLjOX*_4UR4~ zls;%J>AB=eMNuPw(SppYC9O{27z*qpgI?BwR!dR3az#%TkKJg#c6Aezs40Bk!Bo_w zsvsPRj4<&as#;)WZk<^lf!t`=Nqeb}lWK;J>VV{fdo2{*pe6nUcPwbT0)SUUhy~I3 z?FiWtPFnX8%F%?Q+C)`8`Jt_X3tCHuy|kkH_LCZi?!dE@UoNWe%=GGWQs6h`fN`7d zINH?rF^ zcDJX6lo~VsDs)n?TIUS12v$i4`2g$6(;zLJwhaX_?sPWt$1CYZt?y;%R?QT$-1{lX z-6D&FXxU%)OGEF|ZE`(v%59)H8WOEbH;?v*b<@bBYt_V<0%!x7Vc$JU>@uU|_St*C zj_1kIBWx19y8oawc!jnAtdPYaQwh;#etaJpqv-NpYG;`*5x+u!!Y}wTa?qrdlhk1GR%4S{R5nAP!BC*KqgY)vBF}n^y-TA-Ho=MG*O*P z0Hu;oBl&7*pTFwPg`Qll_RmUY8FCb&ZODM?EEkPWINuq%jX!QA=UVecU3M=tSZbpr z8bt^e;OGnHb_(8H>ALoKYEYCS%Dn6HsN^*N))lwJ^GY3R`mU_^YDz%CFdg`OAFF+a zC1`N_{M)*(+#dj3!{qVe@cs<+zB$Lr7#`N~JmGqZY~kxUV3wdf0OrT8DpehCx;)dU zYhybXG>~|E_2;?jRd^=tse<*rJ81FZCg|g-Pcm+q>a+T8S?0RTw8UGE7C)6gE`BC> z+fB+5`-#bhz_my0Yscxo+oAe5cES>FvmzPIE85Ky68OKiu|3tB=~V zZ0}bhk1agDzqo(l;x{b_bDB*uMd;phSzE92>;Tv$V6Rs*4s4C%7Z zLkk6Gst~?RWp@Gz@KsOZk_jNa<~cIg?=QbZKk(bZ?y|T2`90J@;s21KYx6yE1>O&m0{GCQ ziU+ti4S9iEvWptAOL9IoJ$cz}or9HgwyNiDpQT0{!PzSc&jjXs1O#0vF{!+DA+gSz z3f)Knt&|L^X7s-I0zK+jab*syN%j(5vGVjEzSEwv029F~F&l|?;fY9hGrHQ~oO^5Q zWWlTcIopvCB4NFwCu_i(Ox-i%J}zEzMkrK|p&hz}W5mdJ&CBgsR(V9?wG%qCSq5sF z+`!K=??(ir6L|u|O;=YWVn!uWMzcq=_qosi`k1wHyGBAtL2<)raNPP+uL(6ZR{(4_Ucwcrw`W91icAb{8Ya;t(2FHkESqt8LLukf1*!s%JxO6fnk_i%6b?xoRzhR zh(0P)LjzD;RnyD``1)o^V&T^g(;Jjgl2jNU*Zw>suHYf)uB$0;k|}kRzSJm?A$CMA z`_Gn~aXrUPk&;-J&J|FSuwq47#{t zo!PcGV;%Jt)fg%p03&UGZSd)<<$F4HSV@XmuhpUuK@9?Cx~_sLxW1|0YJi0xa@kd4 zW!eQ(;wE4)ut8(?X1QM`Nps&b8(QEzKQLX|YGPPO{a14yn=E>c#x%|UXp==F$tZ2%l60Xfe(&Az~ z?J!l{cNe7dwpl#AF17ms?(Y<(R+SZ%F~GwFtBL87M4gZ}G7lPw8NUJ6#$4aR!Inm@ zt)4Gxv8j=&>*63y*^m^!Le5NW{M-?E9~+8$N_9-dO+bJc-#bS>tHh zAAy`d&3Vc8+k3ut)*`PC(H zHTey&8?hUS)jBKUA}2&nbH;=}?3zO;fC5d}bwy3KdEBbA2I*^9#wuw)?oO*=%Shpi z+qraM!6rd;1D-PN4r0`T%hNvweo&zSNd1}3QKZ558L4jD479j~ppkLCg|Hlx@ukfc z)rz)d^Nu-8FTdddo|?bX%ZG&=X$#~M1(Nx1M^ZSq3=rXzvuv^wCb_hd4v0nR0(m% z$f+l$q$(dw=+pdId49oU{Ovybr&L9%b^c>c`U?~A*EhK_cL~Tw|G)k0{|cbt#@r<^ zRR7P8RZ%xE85zC1j8_?c{TB!2|Aq(rZ+{~oF#TygBWZ?*Ej5yp`O-g}T0eYWA!xHNz`nff6~%%hj2u)7S1TbX#Fu1%SOm%{UBALtOj@XK59PXIzI$;URO z0q_zd4O{(UmIKM++dG!?D?=GeK*ty0|MSqssMe@SAr5k{wS%dtNK0AV1+-SAa<7YZyj#TZ=)L{m?}IBwtKQ*<0~ zHe{9PAVG?Joi`UqZzZc&Y=CEC+e(>cjNgpd0L+MlWZMsIQq74Pi&PP^7Na6x0kd(+ zE!hiwQ>FKJVYb2eEdzT?677dP3^VAQ z3IcCpjijA%K%}W3u?pitjnSRL1DhIVp9#@#SJG%nc%zmwO3=O#gwKi&O`kgB;j)m5 zmU3GPa$4?Bs&JdidrUd#`oNI-M7BF3>qu;r}ITGi_jgbk zJ2&;TpcF+Vk$%O~(p@<)>X=olFoc%)AGSEMBZCiqPCe2oubF%lbS?z^F7mSd$9EJ4 z>V-e!otNMLE8aQef{2zOXr^X;ubc&TuDqo zKVQ`!-pxI=-a8J23J~U0eyCF)(ttmD#9H9*N*dTGk-7iG6w?1~zWUZKg(Fv%!pY-) z5(#g{_OM+Dx2dNXF|wvh|I-TQ72E@?V7+|_LYO=1tM2O{e3Ig3de5VzRV{1~`>E)N z>drYWv6b4&e#wJfRc~;XcQs2<9a_{Ujms~mUqBm9>7fIPMiD# zB1pM2l5>aWN5Qne&yNW_Oj?qI{#@{4TfP7Y zT2q>oxP`OJD6jTWCX-@qwuiAcgbFFv)=1o*sy?)Wou@`K4Ph-X+%%(4?Zt18H~y}T zOb0b(dkN`fJnWbJ<$VkAx?4mKR{63HQlkWrKuPXEGhud7F)_@F)Qq1R8-nT3vxt9_ zeXT(9$y|`N#KkiD*^R+SK;}yu3gMzEIE-zPH3kcLQ1U$52M zQ}Rr(fu#EHUuF1N$(|U@j*aP@iO!=zy|@^|WnA8DSMPPPobmv!OC(&qFcaQQLEa43 z%Mi876LU}VUY9g($Iq0=EUJH9mJ>vq_*48gGm_+{5(W)nX<`-t)4{7@!A>-vpW#MzF?S-*gE;35368v+>|MNP z67b}IMqkK+Ng4zciKwz0$=dx8zB*m!veYMpR?dt8x~4s$zGrz*BpqtQ9HqNB zCXywn4h;p{OwaGl~yEI)IWdM5nz7$)hQ2th~#nl`Ca}t(EMU~|Nnp0 zVXENIu_{fKA5gs{nAycW%R|@Yn4QCaB_(Ud7jf) zV0#Rbeo4}me9xp?0MR%MQcq8+jRDKOQqu2R2c7$j*ANxxDy(z+?S^_D7Rw;b<_Qe> zeWW_ubfiweG@M1;R)UBfA%mDV-I4?Nj6gb*XRZ5&oUi;leW?qObxq$%k{(C|WbV~Z zSJ}lF*9-x|WcZ4sv;fva&aAGV&*L>Io3Kj~hnHm=ZyFTurf%aw^~c#$)Livvs6-X^ z`_jXozSSQhJpYBBOM)*+QwY}%GVebMS!1{g&~>93SXotLdebfZ2vf+O-%=y+ZD5Dg zrKTP&wk3ECf%pi0I%-ctoc$IQ;Ab$NysQWW;==8(2Cto*+5=BjOZF|t7LZvL-7D(K z-C6=#{sX^)`%^YR`d+-{oV>bm2rWBsTiJk<;s7K?o)D*{8WL?Mu|n?}z6&%&vB1E< zHKdLn{m+N+pV-K0FXIC?C8Dn1{6CTOkEG1gs2;PCpnqzTKU}Fywg=!3O<;F+avoX^ z-61m~G3HlyL8E5T;qw0BWvyH#*u)PB^+?}+QEWwYfLV&K zM_TG&GrloW8bDP4@d4ZJ4UUsMsI6Ij01k+ug`HMDHw{a~c*O0yFQTo{9+Q$va~`x55~;2=E%J zew=A;t}luu0MH&%;jv*-FJ1!)oBfnw5S)Dny7}=&c0mEBv4(V4sr_X6rmyRo!$NjH z&5Ze1a44%lyNw3*^F{8M%t>EP3IbOi)U4hG6V*M$nI0C=cFCAKz7ocX9upa~0m8?D_jBfBgwy<_|6apZaa-y=uko)6} z@#^!=tRxM;7=m)?!YM0jgAB3c*($8rXcoG?C`Xh=zCznhOdUfX`UNjVnvwL@f5#!2TW@$0%ZvUr&)(J_9j+v8X(jHzS+u^dzt0pTA0Q#t@TtO`XSvA^E90_D#b?|AOjC!SBo?O>J&DsaC+dDn`XNZT0~--$W)O_R}>aLrYe53Q&#nL%;* zG`RLj)YqfeAp7$II42egb2ZAZqVy`m)eQ5K>j5Bg1Hih&wcYe-A*vfLbg5kIu7sz# zR0fU!H@CRf--vhlnZI zxB}6|(uaO-OQ$cJA8zJILAoOX!*Q!6&BZGTvILn((F+_oe#usmAg!c_mAv)JM7K_x z1qzOyVgWn&5zq92^Ucb#g+_?vqkew%Tn$?>c`W=F$B+Y9Y-Q1nxuZ%4ZfDjjx~-B2 zy+aar9tIq?4oH4ho2m$zxp)UGH~(fIt6NUBPVO8zGsSOvp?1XLK~-Y6{M0B};cBQp zTchh-#+x2v_JR%6mvQb48R&%a!}Aw0E95uP1r!vt*7z4G;UA;)OM>R^2~_%mu*#yx zNQoO2M?1LcVnp|0E{p4n3u7sMRI>OMjJ?gm^$>@pVdZAt2DJxquTQ-yF1|o8pwwRjxL(>!y)O z6WY`y!RVC-PNvnyLqIML2Zxl`%rO!Xqk-$fK;74%BxnrnpJppG2Y`H@y}jX8n6B;j zy7U3^B083u!R0U$7oys$MUBSXBy$Up=wPpj=$YF=(E~VAWAlnt@~q}UgDJ;h5&9S6 zzUgn7x0Ea_;7)KD;0zzRM;s)xjE0p0_s#EN_n)#kzVh{;8@GL^oZ&)u;^LVFxoHts zGp0bp{cR@n4T=YqMS9&UgRA?MUwCRysDIBGl97fgujbQG28djQW})JWUn81WFQ8AR z#c!_2*`Jr1%D)C!g)3i7mmdXJF9u2CCl4A|ysMfE2UXdEji9!~34hC1enxWyA6F%V zfdBz~U9`Ht^b2EpMBc`(g^R^kd4K#Xx2!Wh`&tg80qCn2%D=yQ5mv2VL_myXFTVlu01bKm*4YUsweDkM?nb$VaIZnt;j-*fdWfB{Kj2W1wYiyWW( ze3s|$?OKM8Odoa_aHhECI#;lt>OLl$SI-)cf5~-shAf+vNt9NYeZ}cjv)EqfV~8qU zG5XzQuNfM^67smrB(tciz=kymh~xTB00xt_RkY*!YzR7H-C%t$2 zHs!%l)75&yiB5PfuRQ(n^UxABCnxQuKRI!Y{IbOU(>$&NQqI#mvtzq}z?R?is+o8t zw|{gQenA2eD3^+IOS@y;$g}no4CVlXvZo7#aesYqIab-A{&D!FXP6wQL%tcCHm-?NHS6TLLmlxH8$tNFr^1`~hCwTT zQ*N_5tjpNbhd6y=BYaswr+c-VGh-^JM+3{pJ*E?$j+^??QF$z7#0CS`28_I95UKs} z%Ow2T-lArFl>iv928xh02D+(FO5=IX466+OJ4gLLuBV7=y%T-FZ_)1 zn;Qmua>hPERMZ&BHY zVCSyjG&3=_z#zDQ^FI{Q*_|8Gt(im9iE*3g`))Mn9%voux)znz+0|+UVgKph~n^Tf!;lZe%$;?Lh;p1 zVu5dXs5tN@qq>oA?m>#w)y%%8BF`TsbY;KsDF>2E!kcLW=p&A;v)9?o?LUP2xF)@a8@n~at{Xu991EU)5mF6k|xXD zO}rEk?GSR2`)ZXx-k#f_fw$~0aRcjlCcS!SIaI<5tUc4qQ7re~1#N5Irt0U&XdW<- z*eXXnp#Ar7Nt>C{pUyW$q1xwi0SEiSFUJKLItP7pdIxFX5NbPLhh^>7+H`*F2A2_u zEwenm0*3DR>5FqYIV1TS!tfy1GyC8!gT^oE?jT1Vcnhsdjnfo=-bOR`%6Clmo8%d0DB~$@r{xSvU)}4Cx@_d_YB#T5pyr^}IvC?cnFN`MgM8uC;3r9wB=h)}sPO_c zHRk_62@%o;LQHh98xyx%j|2c%`Sk3&`1C$wh7;MXsnS?NIsM?G9UL_+H^ zqwOffXRIHL?_fPq2-94nVkJBwPkm&rh_cNkcZD=XgQkoq4mV8FB4q&Rd+gJI98Bop zpr?`)BAa{k>lr*PH1L+&w=WNcPe?GCI>R z4Ysqv9rtWHsBvro)a$dZKv;NrYSTzzE`!pY?2IT^(00L_>prl;Hb%0Pb(Uvl&ri#A z?Zhy%op6u@QILZmTp1_f;m^d^@Pgic5RdI|9Xlz(pOZ zBURtbinAa#x`KW$w|gDBGl{ayCAS+4zu|dtZo|Wlrvj-q{7X^(b)vVE;EHpkK?iM? zq92g)zg_IVyb(V$8UIGD|9|~6eWopOE&X8_Y$YuRkg6Nm? z_0RqhsV&(0vQwJjgB*#&pX&QF&iNxl`OD55Ogir#^8F7pm;Y(lka}8&8O{GSc>mvg zq0+jzxOkrV@#}rPNv^*gxyA9{5t;R_VP+9HW>pe5zkK6tiO_rUa8q6gIrsffP$9^B zC#R*(R}8EvJR<^uMkC{059jpo^%j;0CFBD?2lebO)wtQDg1&t10>BDICaahx&?zP< z8!_;))A#*`Xp}@-KfbngHm7Y$AqxO!QE9$ z-Hi_Gx{d6xGt}918wI{R;>$NiEXZn~j=4G-S?FLc^2~ElC0^teH+*Y>^oZ9SH{jo_ z6?yD6MN3gEloWKl_mOE0N>p^f$;q-UQGD1&(9eW|!OGZ5H2ih!$3l(>!AXzneUrphe>Y2FnpLLSrMoVW30L29$j&9`G0O$~jN>Zm6VXz>yqSB4 zs(-sC`?^j0JhP>nvl0ZVcwjR*l=JG(i$R=(ew^Q0y&VZd4=wF|5YtUF&vaX@ zw`UAFBb6CBnT#yP_V3zXr!a1gd3lQQH0U!?Qf;W8E~QtBz{aw^ou7UB#NPcw3}%?m z^2^?HlE%Bk&m>e0FU(d_x}&z@*azGe`cwHeD_ zZ=NxOMNlVHWMo(_ETp0&2W`CipUr*leI+tlH&$rS*p6jl=J)S{f(IIUE)p}4#Y9~^ zYwzyi8sDE{5j1J`DXz9@go;jl$@7l*u$`ct=@hB0^`7Q zoC2f9QQ?csizJMtAfi|l8W3gVPPV|u5#RR#G6-X3QhmAS1EQbJkz0hcEF5Zbc8SO)r^2)>D1()OeXqx{$V>Y(i zGb~r8aSQ3Modzd^=N^rQen;{0mGT)2QIWgRG&XUKjPl(TVu$gWUzZD1-q=^Em=9Wj z+98zWbt4#rMGRmyv+!Vs38aNrctrdkoK}7JRC7=hBW5t_r1+WW>Zea9u=S8a14sA0 zX$U^(9puByJi~XE*k>gu^n}@1k;)imNBkzDnyO2h@heUA4j+)& zEPP+Wn6wne%e(+1O#gO^a-E2+*W1lvuDix}RUCw4o2n67&>L_zbe zcd%K>M{?Q2veFQ5-xlmux9M#RI+I#V*#lY1;D)mz$d}tca)0#&yC^kML`+QJITxck zX){`FT4=`y-hC@1qqAMx>s-@HM?us4M#MW`-uKvg1=e^Ke0p`g_m*viAc`)D9N(As zDT-$9X1U61=UsoVc;vQa?{_DS612#QY^Q%7`}_?i_2(^ZNwP%332Mimk4br zpq*P1VejD<;PUMc6Cxu>;=9Q@&m{dSFMpe<-FLf-D>wPP>h3TxiFm@9zS{&%Vlh@r z#2rbYRo`g`-*pC_cB=<-pIf-=`yy7Gg;tyP1{-i=hJUIwbU#Fuue0^Uud*&*)?U@g z3hPx5u_z438BLU^a#ahl_WG)IEYvx84>a}}i)YUh7QRf=kUNGYyfFS)&dMQkn@`*! zaL2KlZgXs7syAF2HL&_HW8S_yGp~|ys+VT}n5fY`ce}Pk^fzgxnSy@o+K12B ztur@&QkRId&WkIPsvs0-yR82v@>FBzqLH0w(8C>y#5xgmFK4HPn;p@471`cIjtU3l zB-zXeml%^0+M?F=pnc|8#m=L|COw$s=k@tW?~Ai>f^6cFvD!%Yc(a|sc(Heu_kVj^ zR8f@;8Mm)r7dAjR6jGr>(Io}G-_5F7_e$$3l^oE?=lc7n>3JJ3D#sOX$rx%xW0$L# z{b#YO3ll0ac$kS{Gqh&10fya*VJuKZC*JFKP3#0~iYhjqx@S)5nj(|n zW;VNCBh~u9nW1)OTuKN;%p<|vJj?0pQb&g6Kn-VKPt>($WLekR_g3P5 zBZ`ShK*+a?2CtFyfPAMF99NgTSM{2OWob}!oqh3Ed-189HO~n zOk=C;Bm@9|CE0CeUB+?+%ivP!(zyE-+)MN4JxZQ?pG@&Z>sI@H`*d$%Uz>YLpuXc9 zfZyN(DRe6B!=|wE5-*;w?Wc6`nXViw5$*lltv`~XZUC?;+~0T8Tn1lzW^`COgeO$A z=k)587gPGJ$?iw5Z;ph!rPQGe6&WJdN=u5SMof2IjlzzK4V$&6RVA5N^G)k}on15A z$ZP%x%V(xKgO+$X8t9Nh! z84pZ#{d@dQL$7m2LQ0Gj`kRyemp%k&2n%~Hl}>Ks$Srr56M6^aRpPf$m0v1uc=h$W zZNzyXjUm-LRJ=v>pw3&Tz^e?s4!jGbD}j^X5-QTE=5u3=lT-02I%<<-E~KiO>U>gT zFZUcv;J5Y{6_%Tw3TaMGc<1I*zGF9QKgEW#Tei3MWsg&`yn-rc5UTs2_kv_;Iwwj_ zw~;Y%DNH3o9h=0~YpvwJ1Spwu1?W_;eMhrWBO2q@oX-NSSRss~G+?Me@oT z`N&hJ7Ah82o>qY&^u z-Zz>c0=5XUks6HV*2fyjxU^3UJ4{UV*2n$!`+*5DCL8lvk?-uZ%h!e0q@`64qyT5N zYr>0nhg*T#YXiBC0B}1PJ;{0TWZ^ToUGGQfc8w{~t{sr5YR6Zug~d)yh%cMb=WO46 zK4m6z-=*T7aPFm*RJkV|ZIustetS>1^qxKJx zVTp`c=RL1DF^Kit)VDH@5pkR0%Jma|Ml3`j$Ms=W23_mJ3U_y*@*Ry|?1>)PBbnp6 z;kPP4oSq_{<7HZ$4IfH!W@jvuft5i}T&%frYDnhg-q2h9_fv8s6=GK`h(19m5xyxw zfe0q0W5c7~$M2-%gTO#E;%-a0voiXVI9ztl_TnY^WAh6*P2<(xd;#VxXXTvb7joZZ zH=r?UPm-9HUNadDZclqMovb%DJxKF*2DH(3@#(lpTO&rP`7B>4Iaf^kIKT;)o=4Ss`c}> ztR~KxU9RgIwYqi1l;pG#8U}7rl^yl1LpDNag#T#&)WOR}Mp^8%wba5~=2#WEbtGy!$4x z>K%eg@ZcPxXU6-tu)Gu3H>8BE<4#$B(u8~(38_H0R+;x}*#?a#YmX~;Q<2}!D$n;d zzNh6P%x-zTZ{?8}jZ7Y4CMgB#hnag+$~sPmYk4P*TIq^S61S{1YR>vv!3O0hMiT5cKdXr0Z<2QDaK2npvYZ4p=3zc43 z2NO&Uwvl>})Jj9X_li?B|a~*n9QIWb1I> zWx6F1;zrH)&T{REqe$u0nY)wY8c&j*Pj8MlG$!urW|nxb7@-yVv$P>IOImN>bz6l@ z)H?O1Pll=8u@Jpta12b1Y>Y?ym|s7|pqtR2R(K}(^0)a$zNf=$ME9&+e9mPTjEYk4u6G-TCig<4qinuIM(Od=Ku;*>Jo-8~fwIgLnUW3<6i2;Bf1}eSPjZRa!HM05a zWJ=4CR?2Owy36`a5>Ks=xgrA2?Y+~*&K(UWPE&KZZnjHlQm^VjR(X$!dqEpf67w_1 zHXNp1crH@Ih7=2yBwAX`zqr~YtpyqUK9V(~P~MPNHG&dd^sbtzcXINoq%Gau8Q~ml zH(;FTpY&(euWg#B{Nh|s%V}5TG$_u12xCgDTaycrJ$jpt-tQe~6j?usgT7IQ4Uh%- zFPf`t#EGzCPqWO_J8CXsrzk*0{?^b}eh#yUl^h?(eU9d^ID78K$c^Lj>)%jq_dJqe zH%Kav%Wm3Xs&4n`pxJAJT2$164#fQsunv1WXbw)+TDkCFuKTS^(C zvgYupDyWP?%C*|1z{RvbhPB{mOA4MluKz=FD`&RHNY+YC`yCz>%kWom)SrCj?ekuHznxda_q}Xy{hiG4;#{q- z>7GpspQgFxldCghMT&e3V`0#HVaeGE5~y4)cX|OVM?sERbifZ z0uD%qBTwz&Ms?0ZRG67Z65l`bRoEQ-A)?9&T;l}6{b5NhYVrsS(q6)QRlKcLHWS$Q z!1C9&9eVmU0VFQ$r#eVmh!VIImADINE~Tqup_UZn+{Umc8&!EIoCKNxJkNXsceh?2 zhA+U?R+wF_Q&k^L_c!SX5=f!hXYI4|6*?pw1~s$j`~5LtCcyDMWZI|PIC8|3$GH^t z%WFBmJsXfX*QmhPpGr6`<~Z9Ju9qla??7y!D%ool`y;}ap!SoNm#-VUrz5z zSdVCuEUu}2ue4x_D*0iAmDliVQwh7{+c)Wz&;>5Fo2^U~_K@y(aLwiC3=FEPkDd&= zqHHP@8T+F-^>?geP@;)U;})ZJM@KT1ZV;5a!8z@ zREE07#U)}*~ z)qDwVMmHTTr!od81_w<0b#PsKVqW9BCgGIOi^@521sfjrtNg?p@_irr zGF7iGvNEriNsY&FmEI~g=KHG;xMvPuGeXRxt?-J^E*-H@rZDZ zq&OuB#%aNK11U#$nz4T*IntFN%T;exXOM%*Z&)AHyZdR}{)BMSdqvGLKc(oB>DqzB z27`EwLr1LOmE$}px$Cf$vdpj#!uL!di!Fdy0>dJ18YV_ z&ClgRz;8s{S`8L4_SaZg**w|_bRUKJ$;(-<6vf1(oPFIuL z*u|Iyjr<-4p{BPj7K5AkuTqX1kMpXrcmtmvmP zUX)OOl5}?oT&j*R@fBt#wL4-?omhs|apu|4Jy|tk1Z>+-&T%_F;~?)|>WyT72jaK1 zVvT$BwO*jFp`IJ7UhF(YNMV!xBhj&|(_u1n-SFJ9GIHI~{+@6b>rUK!%=J&Lk1U0S zpSCg~w)3E;|InnlI`sZa%3BG)U9>hMb$D1h8byX_79xDeBm$8J}pAapLz&ZG{tOO1x%Yuaw(h(bu83MOiF zgJFeb7%8DfoJn(ez(%E-C>+W4M}-#2>YYwn-nJM-a?hXuZ_BR(c?}TK0ipL{3_t6S zLu##)2Qy1mngM5NWqT_FpNLlv6;09|^T^etxYdlMwGM^vKunNRrB0aRGwIG$n^P)Z zd$NYg|LEJ~~u{^+t+}lS6)y zH+#uW4%8&<%P2S?`Nz4Ed1d4Yz+FpRdSp6GJ`gskUP%GX5A@g6v_#`$MLfO)qr^)G zT-|Z8GSIHK^RUM`A{?|J_a>(l7M{p2?@bfiKQpB?Rh-f{yHK(4x#gn>=y9l^H$JqO zfmvs{vp(Y<;uM^H(hi;~*OCW?f~x~n!g-!MH}7n3Bh=j-Y}Y`xYWX#-Cdsg@n!-#^ z9~|g^@sFI%S~t^Yb7W$Wv49wkoR`*N54P0xn}9_hTXWVx{&He=4=`d+tXwr$N>CF3)2}-uQOrE*V4!MNCigzyxCxKuBuu7W(kce)gx45MJJ>SG)He@bR^XDf(d) zhgM%Du*Tr(f;{=(a%dJd^h3Kkdsjvq3I>wAldwI8W8Pzuv!I|2+5Sb3gYr*LhyYd7Q`cJ-%OaFeISixH??qq;QvB^JVGtKK8L_A58ep zY+>fXCcyrW)%{Ro(zvw?+_tulH|?j)8#OjL1wCbWHHbQZeQBB3)SVzm)FCAt zKwnzhGj+-$TS?`#@$r@uvpgh4Y55wSrA|)6Qx7<794F%u_LhFuy}L*;5Ah&SZzA@(XaD&Cz?v z!kxYc3QQStL|MOLn|$`{`*vt*9hP z^TEeErPno%bG2uk=j9`POH2ld$3D3$IHTX!kKwg$$S5=YgVjxkL_i~K!`FH5H|XTc@N}&3IRhJfZ>Rf5PBO-?MZ(B{7sOGb zuDn91Gs?`)Ps0I7wt;|iehh5-K7`=11Z%NktM|KbUpng@hYLzHFBD>?>E70 z5vS_qF3XmhS%AKtHtDsVD}6m#=yCmP8<)Vz%LMms4%mIBG8ondKrXfmIGxg5Igf0H0l{4D!ZK)cs`{%(xO?@fgIn2D4@4U5ZgD;NzOr?J&^Mkh4{1?} z$?dOm&ZB)!LpPFDm*cVXJkGh75aKhP(w1=99g*anGj>;Vt(t+9lZbTemR#?XZu#UZ z2*oP&$1G>MBEcT))+iH!9v!I7p+Rk-rfgNLxl1D^o z9=*O#Lq-+RJ{s6PmNoi;lQ;aCEVDy7?!P@_aD+`gY%Q}v6i=?NMQ7C&n)H`#7mm3E z4EAX_YIWt|_P}boeDjvS0}B)&8yEvazs{btMS1s1X?2lVRectZpejB~#ZoPWFxg4L zO*tlvwOT&z1OdIG0DazNU-xrp2ewhZqT9Lk$J76l9EWV-=&kzFCg-llYQp0zD@170U<1yrt7lHNH}V zDWZOaZ5)8PFm3?Mcz!8ff?mnsP|<xTY$A}~7<$3%VlD=WPZjirn@^KkIsx!&5d$w13(EQ(q7m)QDn z-K-kZBa2-;G?bq7ZE7kr-NkGpk$zR6E&oJbEXP)CyZBA!k-{mpIA?WPZck5UVPT;G zfQP0H?!V#!9iK~_xjXrpJm7N7OSr9Ri#ksz0CjH(VF0A5PCP5G+0PMAoVusUlbC!! z)KT+9)jG8|-D_+)0m$#BrdbH<baPFh8hPzk^mbZ7MXi6_rNd8mHxqaDCu zu5qnMh7AKrhmT*SW95o2H`IT$k@W0M5EgoB)7imGUz6ymUM2c7S42$oxk||R=cFpT zMgy97KB0{8pxUvmv4UfZc9Kf`#Dtepy9mVNI7bHtB6+g!_o)eNDnnVG)lH|+(9ql} ztl4~vuSXy)O2ClM_zoRRuSf=Gfyen0s@H5ZkO*p#!93xzGvwM(-s<@D#G>%lT>Qy#AyNaYGszCsN#=%sp{l zyyNg$>$nH<{8IEI;jCV7!jRzDWw&vUjiK1Fh0WcPWpNQ3(GUZ^YIk0}%S%WGnmai2 zf>;u5+fgh-7a=~oSip1g9*LHmex*m`El%)C?rFB4_brlN_kP8PhWg-Em!0j`k&pj;F(9~2FYvY{bGf$k~EL_c#D72QK#rW(KK+*O8Yg-OWWK`1b8XavAfF3 z-2m_xiFnGqIT~!#S+qsj%g5Wa=i{9d&thI6TfUfk(Qzt}Yq{DI(42sGBR(aCm(T)# zzu}rk&&ssviqT*ZQd;lPDuzAjaAK%@F#&Vxpci-Uq!)vBZl5>2E#|>1*IsiGNIG&h z-IZ_FIwa%0f-)$gdI%V_G3PnL!ZTWAzRBrJMUPq99<^= zg-(r?`w8@RSWGm`4u8a4IB8;9Ifl@Ii8_oZ4bhOkZ6C_$43VLBT!#%$!derm>{y`k z*8gTEz?Gj&o5_)3=)~)H=y3FLOy&a7pLNp28cTVSuWk0c{dF)AL9=yN9TJ7!&gP%- z8ToCE>X%59=qtmp>BhCs*2`ZyejSgA1G%P`fcAASfEX=^MfxKogRA23R|V=1l=u(Q z_4%cBP~g=ECN^w2 z9q!O;+3~Z~Ia7{y`s=bD-StI*&+ka=<;KQTnHI2xTwiw$VZ%yD3Yz-K+r-p6Qo7)h zX0em zCFqZ6)qrHw)=q49+{tI5$3vWf>XUrh%=kCqgU-W$;cM_e1pITgpfxF}QEA$;v1z>r zUY)W(SZt_6&D>w4f6QdG8k{C4d+v**M=~`8_Z+2uTSmLx#tu?!;rp(#<8FV&h~swn zb1|o0iAo)o)pY5`{6I0%P(A9cX*NZWNf2aFm-8}!!Y_apWIJYL;;!G}PpVTp^&76( zV{nY&I653oOUz7*a@Um)TkVV2hhxB#zbw;KykP3+6>}P(mlS(?wp%F%=WXJ0&Mt3U zhY3tHrbvtnMu)h>gw*G@cK4a3104sak2~E|4fp|n@MppEI{*bAJ8$%5LDY6gp&k%x!>@?HLC1qX3;s}%xIsbNO)@*W%)P0+Y)bU+m>HhV6BHTuhdt=hu z+Mg#TImAGaP{rVOZRS^`jCvKga2aZ;qxVZp!B^7}j#yA~6%O8ws(e{7QGyPMS#}Cc z6^D{Bg6Vz;6Wk{;dez?D^s?nXRc2Wzb{zHvU` zE-q-KwtC1Qrrs7dtjP-6G?J?n>J@)tRgHH-B z@+fzS(Hk6s<3A!~iBSy(_~!^b{#t3g!t^U}Z`5BiI(}|ZW>^JI4dDj^s5(lSw>0KX zu$J@C3nG!&&e*ptRI0Ie2xn4LV?-UV5+N)hl0kY6^^b-}>Rfx?`St}c+==e!edYnl zi4gNYqO@9Lc$;8?Xgnl4RW#lH_f+3&3bd}r|V5Xby^pl^c;w*0Z5>O@|lJo1B#x2XJxp&9jaHR(=eT&^k z%Sk@j(Yz2I4^xMXYxMo66hNsudx$q#u!VF@pxR~i)|jhv{B$na0~D6}Q*z>=f5!?}#L#vN|YewO+1v_%N8#jLGHV=Uzyrcb3$FLpBZhL^c;QyWE(O zR@+El>m&wk5xCPoVlx_Qz-JTKJ(pc@H7nN{ck|)&la`;k%j?CLh-or;=mjMAre_MN zJE!N+OC>WRkI4wzr>+zv3iywf$0M%z!C)btmWLn(W}#7msl2JX3!nBcM=@07R?HKDQ?#F5fpYoAkH>+fPskjRBhX0%%@qsQE9Rsmmc_}S?vGkc9= zojW^e3-~Jn{PCao{k>THy*VS=1gCx!JP@wvf$~>_y}V`1-W`Jr>vd%QWVinQihVh< z?}LG_y9a5E$s*4vxgT{m!yQ6VkB%Sr=8mkWzJHIgFSXYjem<5w*s|tj7rj`|(-6jG zvNHRD^De7G{;DDAELVBs?#Ne#qt}EoZPIgzvDyGi2K6Z%C1ui;C)jRUIGP0E57?v3UTVc zy7EW9aHFlMWUulteB@U5b>bC6U-y(i#uwqu(&*mRV+NR!dv*n0z)?wM9wthuaxOe? z29N8x`EM*p_yM}3nhLK`yr38vB*E1#6R7+p#ePQfbQq^%EnJSK{r}8F{ik%?Q3kwj zDlF{m_|>5LAomIg1$f>mM>5bQ3sMT%jNGV;&}fzILw>*eBWPBrGb7z|g=L=SV+itF ztG%NMCwBPvZvQn7_3y-w_>rktId$}CpE#N)WP*Pd#8lb^%JIFqLY>WALY<#}#xFP+ zFQc=+u$Zu2-hAF>PWdTw@0_2^hL=sHsfS+ z_1)*B$&8^7#Rh|NR8eV zj42)OEtu6fj*5L&3whrK5vEjPtW=)^;7`B74W4VuYYwjl1=zsQY}zQT`k}eyee@ zF#h0KyuXTp0OVA3XGkNp^*`mM=#L`~OKFXmfmG*TERn_HuvKXIc3m7zvNXFY2#pwqHb= z|2EOb|CW|KlhA=9K|?LG*ITwi1Ui;bXV-`?_jDP?m9U(a;Xn6tDcfqHCy=XmXe*}T zXYPd`q7h$i@Y6pi>$~%^x#T)lWA{3I$O0aq@6HobE6+P-;-K+it0FNk?V?5tQyltM zMA*;xUQuiIzm2b{cdzK*nx7`=47kM&GP)nbj6k)=48TMe6lvJ_}aTyb4(J&at4Lgau~nFCgX$2OXm`J6cJE zfcP><3iJiV=0zq91^C<4P0tV5n}O(+=`oHkq+-rzko8zXhXfT0NLJc%lH({T}c8lO9#_FKeZh&{G6AU6-;UzD(dgYlWA|*&%kI6&v zu&QH4%A<2ly?Kwq*H)6D@|mA}fqXJi-tyNtzP#rRr6KhF{j+J;TaW=#zD~Ejly?fD zyOxr)#4mZT(&v#C{Wx7T;5*m^MngeunWS`V%oc8~6)(sFrh&&sM;CCD&2oz$q#;a+ zaG+&_zPsAL*bKOMY}@B5pxCk_O(8tZ%;J4<^?20wb~=23X&@JNQ##ocB@uFMX=?{C z%9R|7ZoA>Y2E+k+=^-x_UO|i)UbE;>h5uwx_i3E+qkF>>6Nx;x1r63$S8pcsiiR}$ zlZ~b5!&Xv6{>4LN2+k=E+liMaO^s@PIU6jrx^iw9B~rLfj8~Kl)rlJ?0{b z%0+#Mg)*qx_LH4uo4zUx#A#MbMgg1iFfbRLi)tTyYg~&0eZ7NZZ_;1F?DrB0`F=*- zw{|IPtZ%+XMS2bz1p~yX8Rg|dkdq;KTY4#CAPD${R1aL{kHb;OAmc*Z{1 zLL9VQprA1g$MG!mbn8+1K`|4)Z=??qXt{G|7=GQ?GoFo7!L59%P?eyXlET-YDRIjlknC&$^3$O`X)rXCI8?6 zFK`RBU`WN~s=#)q39*2r2cd@@5-Bt5jB}{u5AGd!Ei-0NWGw5JsBP%>>2BvhX<*sj zHA0BCc(`i<*hhj+Q9k`OAErQb8vgh>;t;hHNfys4U}TcYQg&hzKoOV1NzUb_qEHgb zEtI9FPhfQM3fA$+crZhcG&&SDP@CfoB0qaVl&7{EK9#uh=@tTbypnlWpY_Y<>@O8q z9Fh)nV^AwxlZCTdDOC>hZ6c}#al2VcUcy;OuA6;36MU)ey|*zZ0uWN`69AJdZkXDAib1|K<^EXLIYKZYU)?l1eT)_+a~8_!$nrg|W=z zo{OCuDuKf5O2tvOwHeMn5;D#;Jlmbp)^V3Dvh!WmC#_*!h)~XWgdTd(5&IbOyyP>+ zkE=RFb$w{DSU-bc53pdDV1G`*_IK^8ZC<`B=qjm+va_pOd`LA~2PgAK7@*}k;t%q0 z7EB;BSB$=wb|l4)Keky+M|8sfH)`z1rL-;~`Wgx6b`>lV6y(mn(zOsRDw`6&WmZ7t zN%2M4_4)U@P`iz_hr$6B!qQeVJW0j~={69`-WQJ4VfKC#W65FB>swuYuaJ$Xr#o&i z^I)OJrKDEpbAN9ydF?keu{VLWJWE1DiUw4dg&3z!Iqfm9czLx+`cb4t+TQq?un@E@ z3>#l7uN#11$x|GNkY?l_a$8ob%n1(oj;RuMJn^>2{xJ!m*5fn0UQjWoqU<534rx@% zXD$P6=D;_P;T_DQMnJPV@rK3El?Pa2>^*K2Pss(zEJ{TCxoYX{%5;p@l~UEg$eQ$CQZJ;sM!x&v8v zUGxr7WpTx!Gy#=Jg@I(QYJvn*6vB6C_jz*hZO;x4Dtt+k%dTUk9YM#bv6}E2sFePq z;YLUUd2fw>F$&|^VEQ<^Jm!9Ezr(|aS0zQG=twQAX$3%8-)+Sgl;J_X=&IWw)znO` zM+sSdmQ5l8YQR0srEg9gUemYE+EB7i^5s!G00cmf-zhyZxxD6 zjZf%2pgFxHPW$PT1TxK0N-B~GJr7ONlA!qQ9U={f&k(%{KW@4NCZDtA83 zdsP}|C3sz>%B71`u%1RdGIeITD^p^`kQ<_Ffwj35r)r25-qxcbMHJsZQNqMZg1o+Z zs%Ku9- z5oiuj1N{@n=_C1_;;Miiom@EhZu^y}s9_VPtLI@LaX_ojWodaM0 z_-EPb@9n&5mQBKm-_E6L%JtjoM!icV!xkKXbmxZO(;hX&iz&&C=v>>S1GBX{>(m4B zd1D``S7p(cD|}K_cMT)C&lh-J!f>ooh#E=;Y!RbpIjRhv`pMl|ex7sAM1bNEdSq*b z$0gxu>^5FBXZM6^p7s4nd(rK<4Do90cDA^dnX;@F{AVCCGs>NMTCfB*pz&DJ0sXAs z!>MB+pfm!mTAOj}(W26MD5GUb;uL9-OK9oS0EChAa)`2Xp2tbcxB2l4Twg{Nm_J%Y z$MC#rw>JG2Dq%Bwz+yMY%6s_48IfKW%9YeMF6-Q+-K6`Gx&_c9`wNuNL42jZe!2##P?C##sKKGqx4iG#o^z;F^?Aw4)ht zGHYHgJ7RC&jatqzV}Ebaa(;IOKzNYusNv&GE!Oo}$sK3t>#d8XKmV_7K|LRUFb?d@ z9&d>YZ(}_G!oSaR$r&W1*F_pRRl?qJ%Jg>oPglEjpT5(1@FNwQ*PL zXQdu_7i2UK!T)g!^GfwGmKw6gl-8!UeTO;M#uBoYhQwmONyFeyg^Eyi>8&G%Vf5C$oMTNQckN0Y?=kUIMpb?Km^;vrJ#{q6{4zmnd&$z0M>6r-vJ75^+7qW1H!t zeDAC(12%)}*Jd!C^*iD}t0?K+uB;(3_f*lHVDbojM~o`G(2JUEX34E^Pna!MryqFuYTD^(n&?}5=dOVSG3+h0EEZNQw=3GXeHx6Sxy0FB38$Kv>zCGNA+=@yR=;+U^16?vxSF!(6&g8eDX;h5 zum+y~7@Ync>4ph;<_imBJaAKe&WWp7VWwE?YN|s&^ zf;G2RR9bX)?Selmaptz=3HH06XQ>e9W;MIh$VR3xmn%?mqASh z(rb$JC-Yw$SmzQo&o#_9dRD5~J3lQ!C4L>ax@zF+ykK;o3n7g5igdF4e4{vnaw;uM9%gyF0@st)~c9UlU{Mj`p1ibw%MK)My2t;zZPi zYd`?IYof;W~+f-C3I_Pg0l@?;ma(Z@ql5YS5$J6-8gj1kuGh2!7Aw6wtm6$5@dImm8R$*5 z5n$!g^Xip(32$v?2P;RvSw{adbPfll-DlkBUJTBg+gq~Cs17KN}GZb!2%mA z`%D{+(fLi+e!chJXDB21Ocl!Ke#l)V&k`XKaNp=&mUS&SSZ~_fn-g51gm+i{EOuH__T)BE{Jtt2FCn~`*fi+U{QS`K0yC7CLJuxC(-(iRPq z{`DP=AN9OB>OXQ)9G%in`h}|+c0GGQGRuvO zFhsSwarRDY{#T(>b5C3Y0x6|)7_-=K->{Ivi{{+B97z06jgQaweC?CUzgHhS|3vJj zQEsJ)x!FX0QIO4M;lTAeYySVYZ<6z^KGJF^LO+y^@GwT2lE%JL*T6Bn2~>#vlK#+PV~#1;VdJL5XS?^_iF0qq&_e=3`jSqFiNaRYip_Le_!v2k zlsWgcB}K#=s=2G6fJ>lBKKG=)DP2kT(WkMurA#s=)Dx9pYPa_);ZVGrE1#`pJI43$ z$!sx+jZ?t_RRP2mmV_GWMRruz$6DDGcyV;Av`oUURO(_!vH$zAE+RVcq=#)8VXt+U z?zkKOTr+`HvcMq@eZ`8)Vss=&pIc$1*d$}`{;F>!Te)lhWc7?!tbt3hw)S0-in+&H zJ#r+)vgpOqXEN~|gtmiqJ6bZ*_gp%L{#m(&oF!?s1Zc4+;T zL0Di`j@@j+c5xw`Fl66(IVV0*U*-Of*sZO#o@~Ve+h=V!!$UXw8v?AqOip3MvEyv! zAn!&z#VxLHQVu5n#~-QsvP$|6;zZ~bZ|~n_;Lr#@agn=j=+GfUd__XX?W|;fm97eC z8ui35Q}l!ZR1z`tMCiMP}l)m;YtG zz% zzDDJ#@UnJ6CFw;$F7p%u=gEUp=lY;FCZr!^YyP|$sR)Oe40gq5&6*2N9MHZ->({;u z=7YF8Y8MKb&a?>##jLsJLLqSaylBPDOed&BF|5;LWjX(zK%jyYiNi&_G2{?Ae0~B( z1#aHRr8h9lt}KReSBSS9K1`RrB6akl%f6nDHf#*F(T@(@Y;0~^Bi^zpg*a%`6V;$$ z`ZnL-m9ZK7o3fLox$Tp8{i6hJxg`27B~W*Jq+ODyo+y&Ep8N4ethxph`)Q929Ryv_ zanvU%KHz9vg+j{d^NLG;46H0^p)(T;qO`{+zq-3~*=bodLA2^UiWKPWYQYtL4 zuN3lfk6%p?V`D$V{p|=2kag|%8P0Q1+qz)M|KrE7YKS z=U1bz=ORYiE_9F7uyDv+rwkKPu!eAU-BH>w3_UFvvm#K=kBX0$2Z-^lMf}n~hC9x-U-7&A|s= zpY~#xPqs`7zziENy!Y0QwoTCAhzaa`nYbhUWL75@H_^ERqa%OK{T((89ya7Lfcama zeCw2g*+SHNZ#sJLMq8bl#f4o!&8gUTB!oneudvJcLPIWFxE(X3^J`oEfag|AIJOTq zET1^CyzOEZ;XPDXUFlw_Sw`nz+KRNvvt^lk@(gzP*Ea1xbvQYcvM8*P@%Idps zb(H<0H#q35T(D?Bwbff~Y1`IZ7V3y)b44^X#C1dMZ-21SPQ2jPFQYbi zS9pH-jhM@)g|33ISGrh4t3;q&e8kUTV;LW_wt7*=XsQXJ zK6XA&2I~f=u(f+m&%$c1Z#k6KA)hJu(f4}|!-J87*+YG;Q*p`brT5TTkh|nz9uwbG zTq~J7g2?~JUAQy$)=lr{SNwkNJJ^gUa}V(DXuu-X4s{*RCS8!5y4>1!VO?C*?}2zR;r|fTVvtXOH6Hw?USCbq*Qn+v*$~(cKHW0GtJFkImFwAU^lCS zrp;GOaa)CSlJS*=sC|cn(KvJzRrExi3HJhhjY}s(&Ja4U+(=PzXuL>3)n~2tUUY@T z;=<0?Cd242=n|5QxsLzkJUSfgcG|ws9U#N2zf{avmI@Yh*--onIp#V=bbRl*W8b}R zMweOshyUtuP%{T_EGdMZXaTeCWCK-L<$Vw=s-+T9jFPo5umEW$sn`l#f=6B%r_tg~zyoROCX2To0 z_zHuzO=iMs8Ks1aZ|Hp<-&9@=dRr6x?Gy2#`j3(S5jS{>Z)dJZ-bRKb)~{f3_Pnd8YsZ~FWAn2+F}h2t=kIsLp8Da99&*IiPi z*YL3_!IQ1y`}E=?zpI4ABMJ8wuM*;s6a=65#+`>C)@=7-5!=Qo#77sE-+R8(A`iYT zoUS4uV?Bx{|H(K`AO8wWiEhZe_x5?Al0tGb*|C^BYzTM0a&O)#p8L3n56ToHi-h1TOWByr|M?X(eKu~Q+aUY~k$Fo1>KbM8iE#{sG z9$k@Fq}zZYGRIRMxtePZg%O@BJjypK1kYYzKYmT!ESM*lMN`;zEKKv-Zy@2VF!I`C zgM5*|Pi3V~VLSo;VGVRF6^*QKiXJ2ZJqR?IF{=WKFRZPgbGOLowL6`DzOPS6;;ZMg zXHEDKwbq~R#Q_6-W@%e}X`vDbM)#%E^hr&Bd}9m?Kg7b*4clLJ74z2ZejKayaIJdg zh$mNxI534GCq34k0Xp0{EiKKei$t`}>tN3u-3>eF!{OFps+d`zOB1%wLoj^P_~b2K z=G)}jU#}7t|A+mQXIJ`Cim`;-CW_eiLV!ykWj|>G4iuH8P%FQz_2^0#Od&@>$LZP| zR>c8xXn*v;lt=ylBiewA}#QEFqtVXq9S~U$i4`sIRYg3Umar8I@zzuC|*V_bnt@KRI_S zyPo>T>>@se3Jk2^%g}e&_~-R08<2rpeKftD1l<{#gW~*Od+{!>`vBG|7Tq17aFL!o z>UkVQ_8T`?3Y5jI@f5gct|wOrK$(*=NvA683w|QW0j7XSkQ5f zNcKpyt=s#`0GI)4(UTquM*6(*+_hikQc{7?eK(#rfMU6%A*BG%9YDIj$BZUWB< z7IwnsK+5amplg({Z+J1M@ggonT{6Y+X>kBPUu(K=aHa2p2*-%)n00yn9xf}n^yUYs zyY(X=I$6sTaf$ywUe!LY<6zAU3l9!}Q!PubE|^7+)kO|pzx2k-^EQamq_R4vfDm#z zXkt=a*IP*28Ep2Mu(2r87Z@l*Z~qdtCn_OA$bHXlaWucpGEjw4jab(i zDOKU_3&_66U_=pNVq(&|qL;sL_Uzel(8f;6Q^f9r|7A}G>g;jX34KRj0MU@(Fgr}% z&dBE>%e2g7FVV^~{cU+J2SAe`d^5{{GkHfcuMpKAK?Ki4E|nQZDEYNz;(Cy+n1oT) zWOWhA-5=f-*ky5Ru3YQlxs(mIm`QE;z}`bt7N%&dH>e~YML0p57nV>JtUESPsh-@o zh!W4&Zc!VKE?pn2L(bhv=lt|gkg6dBqXQv$arTdo z5RLSvWyn&86;+>hQmF(Aei5(>3ilGL&nITG5*Eu{u{q9pfirl|2O{WK1&*}~Q5jy2 z#U8FrvQJo!W7y69H@VKnXEdBr6D~utK^sqe>7a&-`Kl{gQ~a#n`;{0^dz0OhbHha@>TaKA zf1rkpR6`hQGjaX&)_QQYiR^b2j?=DC&CL9{6p1ZR*sKZ+44f;K$aSD|&lklDOVOTG z&pIDhu7))>?Xl<0UY?S!nson;c8bURoNb|78A7x6mPka7^`NyvtF%Vt7a5T8h(38! zTLDgfRSPH+Eqa zsZ-+%JUBSWDk16>m403Vy6JQ_k%KN%URdO_y7Ifm-xcR?iDa3`P;h+ErpOS)D4D8X z$xAxVpcpPz)Jx}wD2W8rqg_V8RIsU= zzU`=Dxkqu|F0Vv-V+>v`%FB z`95BB(y~8!a?6&*Z0-rZGGz|}|0LKgP0fK9`51gx z0(yL$g4@M%T6 zPSAK*qxu3TkrQO|t==v@sf&SG>^dQF5VjJE$Sqdd{pz1^qO^!G3}`neWm01o5)J%epZt zb1CnatOOQQ4ka8ugG%F{)%2WkeEi<~M_O5LbM2_mePkZt#TYw2{=%61nyX?6E((ch zS0A~pz3}rrLi|s7s~;5Ei_K7@BzeylQ5`EKTk3MUwr5NV|)1KhbC32 z6j#xCyW*pwbBrgK2iODYFT9t0Fx5(bb(xM5fRhAHWRUyjveeGUy&{d^{UZIRCRxF( ze*M?`VXWp}AX46*5Du532oN+@DyKt;h4a=q5uFKS{<#algsiw`HKPHdg1c8zy)p@} z&4~wV@jZNVAA4=PWZrtLEI(FN88->n`R@5{dOWD;OYXaHQGiU^k0YmUnCzo`rWNhi zmZ$%|wDTqi)kfDr(BW_hv`K7fYCnOlX7EPoQ|Lc%ZcXR3s;MFq`AxmN@+2n}wfHQF zyslCPYt?!6S{m7=$iX!ICTMnyd?wy-O;Pjzy(jpF&{OD%7lMBR2z=vbZW7=kX~SsF z!(hb!>3KKumW+qU95x1JKjsf)ag^51g^fPsoBfYwj>J(jXB@UeKm?tNCQZHiQ$6|T zBB|%^PEKnhAdY2)UY3Vyt!Oa`;9D&prgr9mB#27X6~qt-{FNvB0`7%rxwPKSS8P!X zXyZwJHm2@`EeZ*{+kciKDk_T46^Q|zL;NaPm5*0$Utk1Zb6Fc-W`u65qnjvIS#i_^1n&OF#h~dn zT7049?`23+g`41UwiLMWAkRY_T4AsepHu@7HnIRx9mTWE;FJeF*jrrA)hbzSy`HQT z(h?uo#RaZ`8V>+8o?r>RI|B+P%&vfKy$V!JBt=}E;z32GnL)&X6*>ULS7qkt7q&ne zTGcIqy$N;R>Jib|)N{_M(qfo`9pcsw57rOE-FZ)G7aBVMRb%Ph`vK|}iU>t@qwy+d zt4-{6mn1BZv>dl8tc~gy*k(NTO%0I(-|9ii@@MmBf}}v_&~J3pm)h{bN0&8O5Uh&1 ztm>d$h3FWJ!mA|0`9-^I%2xZ`<|DNY722NlTM7u>y7eOoC<@=NbD}IA0pd*GwI}3J zi1nbJ%KR~``sqaPWRJB5noX@5-)6H9KOStUMY0WXR1Bc75Ewg`xEe zSo}3yKPWu1;uoVp39Q}dJm)v5Tj0Kk9)FAl>F9My^tIdMY9CbUsz;jUewd|hJ>($t zO%Ic+P-t)guihEu4I(?zbHq=AUFaAYRia;oIU87|Z{TYr59&=?LMpY5paNlW7zXNG zlcfv)dN*c5HmprGvTSahPe#&8mjk;!nhq3p-68BZEdDaU<9f0*ZXv&X^5LkmHEVB* zsRV+sD(3Up)=d|yv{79sBGGj+&`?M5$1e3UyYq`A$>2G4NlJtXDDaq>&{ZjG;c_ph z65V>9p>9~UJ5+@)$Ib0LMY*MV<%pbhUP+zs%EAHYQ83^4teafz_+rO+8zS^u-+?83 z04=cjV64a7r>syE2goVI*K_JLheqp~nn36=$}t40ZM|8iWLEHV5Om3VL-2!viq3)2 z`ztj-hd#V}*fa1kdud=QxhEFAt|})tah)*N$?3x8!;{ zze7BfhJ5I!=XM@NsE}1xSC_72+1JA8k@tRBBi<~K3%XDJ?5e96!N zoWQSXQJE&9_gj7-%cqj|tsb02=mO4Q@E>~Y}fIvVw?U!Do- zN^TXcU3+`3vBqEQP)<|fuN`x;g1g7 zwUXn;x~A&dSamHoA6ZD2GB8E9MtkeQpT!Q^w)-Gtu}ked1KxF@{4vFj%-2Ty2ZwTFx!~ z*iKZQjaqWqpKS>hD$7JYD0q(Zf?7clQ|_wCpn3@5NBk}H|> zB4-6({w%T{h?FDAwFPxI7^bePyG&_u6%=E{M?wyviQT9XJEnX9(Pj{-m^5J{!Dq;+ zqC?{W81cmjPzCe)bCNu7S0usHSTUP&xMgU>Ys?TFxeF-HEXGyxeA38-=sZn$D`=?%FBFqpL#_keKQbXczVMnIb*PVXwtM)i9)}2C>3K_m zYY&r$nq!GCrQ%+&0km}>H5^om8{Jj0H#Nz^A=Bn9U%yiHBBDj^j|H_#4a7bRF_Iru z873Ufc1?BO{iu?~tLWmpboUb;ZLJ)9H8P+hEs|a{Req z>-7ms^P675!tz}r?`jx*lSUpSAMTrXeq%*tf4p{2(x2}>PVuDl3UMIu=l5!-m&5>s zdbUAc`rgO3Xpp}S7_ohn4l~~6lgH+gTsIP=rLCP0y30~#F!tR6Zg5*u#VDW|A!qtX zUk8$tC)jZ3{@6gBWwP&}ZCa1#=4eZgM=E`PmN>D65i5x`08k@;0jT|^B%N)(*Wm%w zV6PJA7`Rf^IuT@}>yL5z^Q6s@aw0i(`(ZF$oH`lL&y}{8sqVa;ZoPu*qSzJG(EN~F zKwX+MEuC}T|5e_bM??L-|Kr+7ilmY~dl6EW#+sdEE7_T{M3}L!St>grgzS5EB4Z6N z$(nu7Sdx7h3PXl5-+O3#^?83k=kxoW^ZlLkJKuBqZ#45v26EkLx?KCs1Mh zeWCkFh3#M+2AS1;ME=_`gSh@6`T@5o;QM2+4!F}lPV^IOpdW+v=>n@tpjxrwK34IX zg`=Lez)N+>ejfic3-uIB1#;IJ2qD4`|Ib=%yn4ndpiaMaqY@%i()8pBxEHv4-XSEE18 zE#7^c*HL}$9cKsk9$^@{CRLEZHx)1$3MDGG!XmW7SS*4?GzUuA^ z2;NGQikV!sbLS4F0dg;=TYA73Cu5Wwj3mRUa-jr z02qbnv;_#D@QwlsFJ=d6A=fM7Z-2l{Bk)H7sq&0x;T-+Oq{3gz`yz=AY~vr2&h6Km z6dF5L@4XNu;qoPmLhU1fcgZIGe)afx*a9>&Kw2ut8&RDE30FUwGpTg(!|^8R?}nIR zt%?dD4rbkkC^rYH`UcGDhK!$}pJ=8*cE7oO=7C$qxt;aqrcwDBbavVn$d3r?c9>Zy z+cQG8LuPfSV&@@&fSXW=EhwL^P|>Ps8NDh?U~hIT9g*1QYS)JYuC{};)_B=LN!lBn z?sRf?zkB%Obh?z=(jUB^xN;>EVjYEuB-pHk%#eNSz3!Rz6qDQQ2}&2{#6L)7R2#4R zEDD)=>ti8jPoe6ooxU&hW-LZ-9+!K9HH@((CEODORipvxBQsaFZ-AkgS=)u)ps(tN z{*i!S46yy;+?o+Df3rKf_Z~)z%kJcO3Qo~k(M43G_)jd!l9%6IWho~YC%qw5I;eo` zHAoQgp54E{9|YsgeS)zrn$Ze)?Rj(BfBg_d)n<3$$Gy5$hRb!6>N@qW*b{(JdG6pL z{+CgNd^(Wtb9COP_9G^1eM8%BsZjG{=igfI7a8Rd+m|HP4R^u)nHC*(T?pkmg!Pz87!-2bd9+Xqu)a%rtI}(Fk;oQoIjVc^OaFhv<7Ko?TSK{) zls>8%tsCthRWn7@#4Of|Y2ra-j+VhGvEISerLR|_2C;HlHD?VOS4{r9H9=>uuDAmG zRGLK@B!!oRp8RnVQgHkXS_f#&B^C^&(s@Jz?;gQ2Y+={8+Cp8DGLqH(=6jQH@fb0p ze;8k-uI^ATrm268SnfMkT~~~e+@6V2g0^wz|G8ph%zBRqSwjiM4ao1+7Y?0H2hS^x zmH8o33!<6)W<_&8(kQPO=xMnio5p5$;_f-4WhzxuY;p1vUbODT1pH;7rl(37*>ApK zYDs0l)j|MnaQ7(IUM!Ghg?GuJ>dP5I+Xt@6e6azZzHN`)FFg;8)}NOPwJgI}JU#<| zkkV=C!qflQEoT`#u{6+y(^8eIuv>Zu`^|ek3*qo6joD|I>uHpQr6ukIG}5HnL*I>G z)MpHVmi@14!0-y_a_uux_dA@vXNn5;QJmj@vCsMZck6$DJw_59GU%ic5&h`Y|G;$q zRXY+$U)?>{Zyo8|-%Vx=cdW|5nS=n~ogrpO1xpDP5UgFvij!&Xs8R1yX~j{z_uas~{* zxxI&*jfIW@gT_9!s!SV+{qO*bb)NYg3-yZIz^nEOg_MVc)fVbkaI|n+pA_NT2QeXM ziP~j;rW2DbIDkQGKrERZ#(m$8zt zZwzdS${`6nl&EPg3N!#Yb|z&5SxAJ*2hpOd?|kTwUZVMRU*nNJB;@qA`sLQTR6HTy zmfv=BtOCV$ZCjPv{{$D9Cty7U4eQLj5gP}IA9j%-$B-DmoWM?!;*Pq!1uC@JFvc>R z$6{72piUmQKb`tJ#5l^3-`X5^M#9=A&HTNFO4TIt9vz^1VVEi8b39&FV4wwv*kIXTbm7-p~id0{3N>UOcZ3Fe9K-D=d z-0ht3+U>c7P?#8gcU=i@={K}!)2Qy23@{b>Dr5U>t^BH|PY-QR2UIA7E zvH>ZSG5cngk0{*Ktw_>$8&JSNUiyYLySDwk!j=AG}#3J93&88Z8gK9gp8#M_a zyGaH>A##KHvXb0`#^-m%-l;}c4F<|1`IHn$%P)w?Bf>={JSe#~lJ=|WT=xOcW*UlUNAFpD*lAM;ER=!r%Vz$TKn=B{N!%jg9%_ ztl901tlYb&yL??b9RP+C4#3i(&5F`W-%}Mi=o0z{PjnOV>ug)pB)|11Md2F>lSfZw zk`Ac?6Z}sQv$v_>fPwIZP}5iWAtU|VZaC- zFT2D^f#mbV6EMTD+S8#1nq@2MX9x;f+Q)w{ihsJoFI{QT#le9|26;QM&;^Z?=E#mqfM zy=;7$vD~Ca3WjvHD~v&uHiJn<6CR~2jqI71F@Apu+?xc#o3?3~eDw8TlG05kh73y? zhA1utO2~!s0Que~c=(_lGH;^MnNKeTUFM>-ZTyj)0b#K8qNo3obUnlKH)DAe&{wn% zASSR=LE$Or+<=MKZUHb5d$S z_zGG8y|*>95VhL}1*!+UZfrdRK!lyw$qM_+nWZwf*V$g}_Ij|q6vaNrnxBL|4AQBR zyM4jWUVXu}*T4@zIBxdJc9grgK09DEQ`Zq4_!b#@FHD_0Pu$7F(l@Ct-))Q0_4Cta z5xIf_>5m>toCCzwmo%Ar$2{~>=Dxm#fi>$qDw^+67?Ur~R`Rxdoq(Rtb7_>p{<^#U zI&(fq{Kx5Vj3BnbNzIc$T&-9iy{6RQw@W9HSP;_1JFBD(M_$^ackl;mF^KQ=NhNBi ze3R^RY>>R0-x5zS2!k>^*+~7yDk7PxDE3#rd~an7##lI>mk#AaaQ^=OXG&fp4Q1SD z&aA}BriOO(mvC$3n`q?F*U=B`a1C>&ctq02YSq0FFKy2=bMNkHRNVOIwBcDxy3yD- z;~_)Y5_ijL-wu7UtZIKPQRJY_9b69kPD|7-_49~R0q;q10}=1gg8R+CM zxokWMRli7E*KtPfSY&IIskB+-6U_YM=aeh4C~awVSgO6%*>qB&=th78R?KaaMHp-h z$KBHc$+9%^?v5`yfAbClQYd7|TogTi>#+Zb{b0x(*~WZgN4f>Fd6bq&DCK8IBOX*> znT%@O9E7wo*YyWHv|v1GY^)CCe6$uTBGA)*ifi8;-Yg2~kjjw0zq0WpXoTK2Qg^T1 zm_;6^T@lGB?k-^1$EassDXEtY&%zATv@?uL6b?@vm#7^YbK>~MPCizN1M1;u1Ny1%Vjc(wf1qW|J%_1rCNm@sgYyaIqSc2Tr+oVl6`yrX#*}Uu# z#o^O~B;XKs`IQ5KFn6M@4ge800^*)G=Z#uU)UXcn`TzN7Rke{g}1a0*bi z=c%t);MqQU0ZZh}chdM<$$4QLx*0h)&%}T1O{vguDhh}g5h^q6L=N8yYuZ#szjoV` zUd*!peozZbSRkdHQuX5+H!rb}+%swu6VDp$`BsEp^4L%GPqa z%2e=E*W{2|^YZ8v$yHV&Yl&Y+-@jy>ti-2&Y@nYNU^s6)55Ne>f~ZN!F>zN06xi+! zz#}<8Aa-%|k~S2`Nja`Wn2%Ef0QC-Wa3Hn?UaKA2@+921FWe>ObKe%itFtqkAi_*@ z!XmE@)K|ceLzN4pX5l?Pd~BoE_%aoxtI-22vnJE*U&Yvy9e0=L1>9iFV%C?WU?fy??9Io&OI-~d`M0|NhJJh?b3qC0SMi{ z>o>zOLWMVzf%L-ln)T2Oa1vRc{q^|%-RAkrJ1#28W{x&x`^50?1v zFP*vgPw0Y94{S(?Gpz?!;@)1&_~r{=z>syL>>8dOB6@4(+T)qV6~l@oLiRlX?8Dm8)$X$2Afbys&mukeg+&i7JVd;3ym zG8v7)1A|cb6Z$J)qHhjk$-1XeD)v`L_Mq_(YGCo(UoMq6cwfko_}S+@5F(reS5J|^ zM-DkI|F16du_Hu8gGV68ng7F|&s_BV4?pn2=k#9!O;A5$ZjwtY{$KLN_hyP}RxG)h zu?d;fM+lnQzaQaW<>mjW&kZVV(>R~ecMt=KDdElk`C@*cCJ<38Vb^drU|lu@%`?xI)??_g42Fp_nY*;zktAs@RjZX2)zf}VI$WmKk0d5 z#1@b%B$TD7<6VK<+W5+NP1JC0^N%ik5_`*DIgwavPzFUPq0gMSgvlo`fFa!%(3?D-Tif#~E(B|`$1@QML#D$;hKt!EoLWN( zekcNcTs1vKlzpgMSee{8gQBbvOfCBoMh}Us)01l{#@2haNUiQe)dU5=KGWdMeXv{I zFOo2S036R&sjm^ozauC2=E4}o<9XX2u1?ghfRf9qRSJ`RH(Qk*mqz^w(7rU`N_8U= z=jB@Z0+_sB9nUjjaLY2$&A229XzrP?^`53h84B@%bC4W#-Fla()d%$&PvuEZ(3>BH zS2zbnV?d8PPqr@I0iOKK&dhW=``lgd$E?C-fzf}~$ea$H@ zGxh0@DAg);oRB&HV3qQ|fCBx)7U+E!Roy%eas8SK+|#-vd+qAf14)T7euPu3voML! z-=63<$1q@g2%Yi$vl8tgja!*d@pcBOgX{ETzS@mDec>KuUeVgCOFOiM*>&b+dg0i# zxeEiA6y;WzSQf$SQuL|=opaiXY|FETl#U7M>C>{v;PLo;CtbHITzLGBH@+JOs`fVX z(hr$~3B7rY2tL|lIj|f?O}xn7dQZvjm_s*vMZ&F{X8hvfNgFglTu}1!JT*ZyNze&k zpJ#gX3!zM2_G#yC;3^%WmYL51EZ=z+CENThZ`=}83Fr3#yGo!Gj+LHBnjhHQWEiZ$ z`tk*dl5=9IO(0do?PYmbA9OL=5rm z=j}TAgOS}AU_ka}U+mwO$=yV&eb<1#M1WoocGVKH*Is9P-b6);XQkeao7_ zK~ze)Rt5~S0kWm~7%E5HUZruvTnfr}9{k4ZNN**OQ63%8)&LX>nWtdh($@I*SZ+OMs>}YQ z*R5nSlAL>7)@M>Dv}+d(OcnK%t}KZ?EJM}nnhjR7?d)Rm@t$CDw;8w()nV&KRnSvp zXf2C+wmAf&D5J^YY74r+5%WQz(RzS~mD}wuK-+HMNS6&_AL&3DtU`=};>)KA zA%S{Cvky)jl+ z7ddpT)_i6#L*Bt}!BunT;b1~f$rVVBx5}R1!UOIzj9B4<`gF5l7kD}Sb6_|XVnCOr zm5Fa|&vVuiZ8lB9`pTDl@_SoXjQkFJX|C~JKgb)*6OV)2y4r5}p#d+35GOyHNvE%xad1$5ip+hCOIu}%a?k~ zJ3w5d+hTRzy?X}m?mRcPs+H2->;=adPJTKLx$s!8g!dti(uCPdH+W-GM_0z~{Fjic zo=~$=2_0V@{RR5`x&jIG-Lg}%%Wv~2#B(@50G$*zF6;=johI*ky_g*KX2fP2%d*3i z)zomWdl&nea%Oj^8Tl5OP}pxyI5>_z{)8gFo>$b>sS=waUsd({ydn;_bsY#zqIbw> z^nt6HY(EgTb7RK=*JsnG^uDJJM@;wGPOetdAEgj)*?c7r-=c02l9pculNAe<*9T{( zpik)Zig{Dt`UaI3UK?>90LUN;#M@igoZc1ppU;StPCQ4h#Wx%!z0}K3E#tj}tw^BN zMUpS^c<_|r32KnYZKQ|P!(OqFJ@hMPkr);76N91NkITY5F%%4wEC&nBga5AV$=oDC z7M?LqDz%b2nslU^AZmHNTT%_B@?9uikbULl|~K-D=SXxVrZ7Y zoNjg8_iI<5^IGl_8rhCg`61de6@81&a!cIRMCHB5P$Y#j_mkNu_l{MjVagqtc?T2( z!{Zp?_bH?-T*MDHq@^Ef=_v_grPPZBspHjXVXgB)A-3cKtX9YewSL8N`8XTDFf%AQ z>PF1T0e-%+;ys^RgpjtWo_Us1rZ5nr!Za8J-_gVmxV3pvW6du2d7GHQFoYH;wqR6% zN0+dcVy?8LuXK$yq;l#s!-B*q>o;3zw6o=K~uGYh`k((*VLE#yW^=#`!UQ9?$ z6F1P!KA6rjRiQQ+lQ>1haK{o-DK_18lA`*l=MlQdhN=8NbbRKmuv*PY*le#XefLF3k2?PNb2(~30{362I(4uq zKh1ea@dhGoREfIPc|x7Aog*(6&JFjOdtSb{v8`3{_0fQiYe;_2_d06g<HqntABoRLYGH_l54fs?y!)4)!`wmFem*?2w0L3Ljz2m`p=-F_(;>%D zVwza6^xHp=%!gg*8rrk^;q~R$9h*C0?*fiKIgt@UoaJF}JE20KlQJ)mVlBJu#M+jK zAmKpiqn?lMW{O&`PZEE+?$NBmS1{-%oY+X#))1eNa3it60sp+w;v-p>Kvyc{k#vYupT1ND60>O%g}Bb@ zudzBWED-BO?V0X_LMF3Rk&07eX4qvy&M1g}c`uw+B@Tfv>?xsdmqKK1@@o}8z@6i% zshbXY$zq&yuB2{}D(ay~tT;%NLrc#t)|Zr`9*>sush&dM2$Isu)~?avE2WGlO%&a? zos7WdF7RqB=YMZcjW*YXUD%vt@k~|RIs3?*lEC@^he+@MowXQY6`#fw8z}-5Q*qPp znfg4}57epPzEJdb(2TStK5mnDYOZ@(jklabq;`$_LvVt)_$#B+mfSiYJ68k~H{;Y(J(;zKULJYoHN+y*@UAh1+qz?|9WUY=Yr&l9wUh z6ZuR`!Q>neb+QVF@5e4JGC4;%s7SdsLf*Zgx84i;*B%}3Q7d@v9tnE4Pkz#X znCPB@cP2NM^@j5bg~R%SIAlcFql*VSj~Y!EmE>B~#wT4BLWgdWbxq0Ha2FL;HgT`R zbKR0km={=hxT{;g?X#+m!2tJ|H<^M_>=h^(aj8J0$*Gono0r8JE)Y7}dkwss9Y9LT zTsU-i(=fDp4X}9uoJ8SYTJUKjgH`YS2=6Q`-p7*GR7b-ym6f(U7(I+_+UU_bd93qN6SVX!h2d9&9)F- z+KR)5NU+-FO*)laLpbnW*0Xt2@=IH@7(-t`u>ARS`=RP);rd}X=1b}7OtYZ@tmoXJ5SKjUzpEooM<=>{L%8qH00go48y@IGB70$$6h_`jny;B?tA+aF_ z&=U9;)Ygzs-7?-V^>$^AW#16#50AV9km7Az0sb(2nva)CKxD?k+x~&D#P!wJYABZC z?$AVNN79WtXQ!bgQE`-i0I>nIHW5ccUK0^Tweo%gA}nD)!oWCo7phjf>v;rzsY(Sl z!jSUHNtvvFWuy0ju>Hek9-hwXpy@{V_YbCXyFQ322e_loBxWvGFV5vIl?et`3^(ci z{DyAFWVDl-CgRTIWbUN=*w=4C3uD0uzje$SMNMxT1dL>Mtg71`c_3V=O%X%m*x1rM zUZpI>Fvu4<&zoqMp+Ia{zv+3uHT1b!b(|djE~fkT&=SmaEU8{>^hc+de6YbXg7V=dE$1rUt`9~*sPpzLb7O-e$3K* z*R=U-gWZ?f4$5!m#}}y@;kMzZ%01DCrX4D`yN9~7Ggex^Ds7qLVjJ9NKd<#Y6Ls0p z-dc)y3wJ)W?_f5|c|h7eKugbeJS=t9syIhc)t0~bEZrdKw!HPpr16od5yZ9wT!%W2 zM2j;PS|yO&5i#Oo+SjRozTe5C8eY=?U7GBbGZ25gS$sko_s+&~fI-olJVV1bWY5n6 z)~3P``x!ai{F=2wO_*0?XZ&04;FcBHUAVQkL(*g7JEXd5lOW3|zvlo=aES_7O2I>M z>4K$7kFS3GN2w;XXl@QKR_ETJr-t9dHszxqBs?S#~@ zE#5g)qo9^m-aT+#fPd98GS(#C=FUg#*gsDnj;~0H*U0OXpL%whi`d?lb@o1POc;`w z=uKSf(0wX}?-B_$AH7;vP@9`78SVUgtecbCy1_`jHeMHjb(owALg4K*@mfCW;;A}Pih~>eRA#JHYyMA#xbbznv&x`O^iKN z_C~dZ;ou(V-7>@1Uf*1tF{F_`=5tznBQfUVkHpQ^hna<^RHSVR43cdFqC)y`@a0_( z2LbR%V0*?mX$wot`)=NgjmY3evX9Ym-%R06Id7^((DGYD6@pjGxz@Di#y&hSl-;bE znlv{s8GVnnr*iNy*E?S3Jo~w?jE*kH+iUAh!n?6bF;)4ZM96i7NW46COSTp#lIe!f z;zL+%^$VN{Mp`JM@J!Iev67j|p4`PjTxI#p95sqM_w6QIPd~g_zk7GUR}^PHDxZ{! zW<8$9^3sTW^9!sgp6=_~b5U>08w^dtsMqg$yXlxooOtQ!i&NCllKQCnfG)OqEFxn> z@R+|Bbb0jpG6%1q+UGWl=EnRxCEWIJCQ{grb1I;aA|AlQNnxK(=5_!{{WLgyTh&oR z+E!kR38`eMs13HlkSQyb9HGM4*j&VrRR*PDorePdiBAxH%T-PLz9)yL+JUv2h|bo; znarA4ZuY*6{APINx)r=0W^}tK>{Y&?(JD=0u>)Em3i(t4yR`I4yLkQ`hs|Ab4p#1^ zS&U6SS*~I3>fLMDYimd6u$x+bbE%@NRSSlvtu$}Da&Pnvpd=>Lx5kf39Y1#nG9nJC z@wX@<;6OaI&>~fbJ&}HQSufxJZt{)j%Sv`BWu;brra6HsA>+9C0&D8`saKD z_H3_f@B5sos~!M`2Mo9S4c0>3*B6gS4vBr^_t6|R4dmP=Pi=&qH5C9TXyD+ilMqFb>F{L8jZ0`5&>Fx zs;qB23dqo;FU3~z!Fwz1QsOUUpV_*`A|V1(yj{%uc15Wkz>VkOdM;FKknfp*%iU`M zceEm6(B+@%OvAEAFlxg+$Hr~)9gt{Aw~5YPDh&`q&U-K;eqJLuh)+0W$& zC4ZRsHa5GTawC6zO2`{;`aDl{c-RS&LlW5mbv6%Qb`%Zpa_PrRM(lGLi7rurL-sNW zHyr-O7Hb>ZT%U4zT+(Z{{+nSDna=~d zCvJS<$z*_xT)@PRx#tTaE#7;%>`G&A#zb#ynhcJsi&V46ux3n*J)sO2JWV0@9eqIx*~1M{mbTjts&yiCyd+ep`7e`#Yi_Z0yPo&j$HgEwrkgP-nz{7W z+dG_wlm4v@?o0{w*OvBfyz9r=e|^4Vb^gE*bM_GER+y!grz-U)sFj6gdE0`cv2@Dv zDvclW_JHsWl&ae8%Al*+;Wao~{`8QV4W*Br+h40i?bQW_3b&8J7^NSd4tlfwIK*Q6COiv4Pml!=ao5d(kdhdD5y|U zG(_0V5mWwUP{SuWVSd}L=i@OQ z>+gw*b2gE!)?pLKR}hlB)@;*t{4RTAd6i?{maietO8KR2(1l&Feq*?F4N+)&!%IDp zZ@41y{0s`1?8hG2rvZUw%p{>%j>dbLUBRAN7dVJRI{Zl0rMdV>iiaa7DP!VY5+@2G zeAc5D6Y~CB3jho8?~`y(?+p2cy6u0Ve-SMNX|ZT5)u6p17r7 zUt_(pZs8$^yp}=;T4I?)__JM88jqr+Z#>wQoE!#42N0sRogy?XwnrH97k>HBUMxA z$eE6(YxuRHJCo@Ra-sCRBvxg;0W|^RReo3reNXb|)ww!HmWKYxjoT2K@c?#_)eAB2 zJ>Ldx2XKrTnAQ&;Gd|6Ab9VMVxv(5LN)ondCAu@dsQDQN-jmoTqxr7Z`B>hts;5}2 z@bXhOg|2F4u@{61Pi*S+EQxHeB!wfQ;f#=gm3Dw;T- z!2A3`#x|DivbNk%d)8ntU3Ds5+$;OH>&kF5x8BaqM3-y@;_Nmt9ugC+fFXoi>b9Ng2>r1ABTwwymu(f2|1LN+Wy^y4trEnNSaKk`x*x-jnO{ zyEL0G=L~TH~KXI?Gw4Xa5Illz3 zS%dY7VQTI9)+N~$p4-*ThKYlGVRJQ?>>};awAMzgW@#aHjsnp2m`~VaqXVwf>2@&e z*jEUhM&*}>-36+qHoZK}A#NF(MV&RIp{>ZlRr#(Kd5)n9FQ?HYi88L^Hm!Tp@Gp0o zVSN&##qOW9Y}PmX=ZPsO3abh$o!M(`$t8E{9|%tkPa@=mqi?;V>l0pR?&>TIu53PL z=P{FNcr##WLDX@y^Xv#B#$qQ>D(CoYw9i}kt~bWS1^ zD#C*x4l!qM#*Tf2r@M|4Y%c*{z{PHt_5S30ZL z%{j+`ZERwJp&`%uV#zdoqXJu(vyxu1H8kv2Ro6AyGX5;dd#tAC*~<{Go_C@b2~Q)d!zi=&DV}g(pciLK=IC6 zsy>Icc#=CR$u9k|bMVAFQe(E{!)`XCN%dF96FG$;3Mnr0+2(YtGl!O|pf@@zZwsU+JJHR{9_C_{)mnenZ zvSc8Yu1!gzSSuFd`SX1wkv|yrnIKh|d+i|3Ab3q+QKa5c-+o>oUX@k$w8$Hy(?04_ zz>%Bk8A-6?b-}P{L?-JgmlXyl>R9+$A3u=yO0y7qi@Wnu`h;emV?9Vc4!-aD^*L;$ zhEGKA>7`U5Co$bgFxu|exojcHDftr}EysJ5L1HVdooo0Jo22L9U>*>a%d+S4h0g_1 z?geqh^j#KqTu!VhT@Ww4aB%*y6T0=n37;mh<3)xo6#aPjHUn?1z}TFgcs^wb)$N3T~BRk8^m#c(4vP z4uf=}s_IHr8;Bb(k5Cy_W{v1LM!5&JrnO;54-wr2U^ctf*z&3slRbh1Pv>m@FlG!9 z_`|dNz_WF3E;9ICQHQXF^#_qdMDBFJ3rGQGC**dqJ?`5y-1U1UoigL7z_6>uU)H-n zds_d0Ad#rctyC`+m7htkS90gycbEL%kSBh*PyV0zyw#74+8y951jn+!pWhD#389_n z^B)Kv|8R*g{@W&j3fLsX{%RZj`%BYKZvggficA1`6}6FTT2GY}8b@I2qd5m8jXb`| zRXpBWnQhg z?mOMiD+NI0oCJ1UE`%D#@IZz~WoLF9c=SI#LNW$?a)x9-8ZStaVDZ_>+U z%ubd4QNGEzP_@0y!=b=>u%iB*#GWIbkE<%D`T6{a!VoMCdcy z4Us9HBv_&5{kn};@K&j|IwZV?XIsC6Fh{OkqE_hgrHx{vSfvxRU{6sxQz{*2&fJ<# z8Ae9??71r?Y`^^U>61L$?rrSl{{H@;-Rp-eyi>7fdXC<|eK;&Uye5iM zt-80jcg9(D7P#`YHmJzke+A+L2SCi9izoAa;X^_}u$AcW1ZoSb54yKAbL-#X_jXny z6c`_w;`eZEkFf=H8GGM=NU#PF8b(5&KWAHA+}!|;vl^hnd-tt2*2w+xB2+@JzCC{n zg98K!iN#p?d`ynFWtddxGfm)`76~j00%qoc@SsH;xFoi9r+`_AYe^UQAvvD?7VSXg zZ@R-Z`9oU}wdIuT1ttTI0anWlfe$m|2~%i!HmLIaO|m|$rKOlp4s&kkGN6?0^W485 zF6saTP)o;DpmSb*cN)iI3yAr}+X*+%sMm9zit^FTI4Mjx9to6{tIQvO8-y_{G0$_r zT4|FCz26UO!U_wytK+5!h73nn38tVvnQPE|3dIk(g`s+dF&lJg-M8eu{wtk;;CGQZ zc^o4L8m{~UBnX4EhT$WDKu=JFy0w1QvfeL@BD8X&qHq=H0uU;mlJYvQ(~%mF7aZ!u z2EXM9t;HT9(tP@BzkpUvP~AHXZ}&;l)IE%i=pOJ~rLCaio?2+^B*g1K0sz6p1sJ5Y zNg=A_%bGG@$!|V7nuL`~rXLX5ctR0s@liTuP*E5|k^*c3*_ZAxouZ+ma{yExqdq7n z2gg``ab2~1-ZtTCk3({*pTnT*fe@8^u3jkdewuA7-ZZNdj1Y}h-icB z&%Pmc+!pN8xv)(c@`=MguV8-+Mng-i512w!x)hFDS3oY}#2`6Np4+prZQZ&bGG7jH z2buNp$|ALBtVL16?t$%qfckPnBV!z6?MvT*g;!1{wKuRJd%NS2J#(}tGa}NxaNxH^ ze*bo~Pc_f02%ieqAAA&oRGgp*1l$QI`HAtE9Uv4E#0Hzjhw`dRTCkJg^vzAaueJBM zBO~0UJvG81ZYy2%u|D^k+2{ANm{cUr2AlZX^*+gq1W9N)eJfrV;g7Dr)#%>voD)x?l|V9 z2Kg-`RON;SZYhmr&ppIip(P8RG30fGXzavqz#T|MP~XbF=!^YWXvQp8!2pc!zCaz2 zcAi!|XPZQjA`N&c=7lemn;KS{PJQHN3e`C|FDkH>oOwk+Ph*F9R9EfOOlsyV!7GIx zDv<|leAiQ~hV)HEMZ(x+5R*hi6^Hk`XZzj+?NZF2r~wjd_&S>+Amc=Y&$*xUK0@RB zfUc!-n>^1DG_SllGrD#iBX_0)Mu2mK&%EoafTpzH99YxD^meZ2`~FV!DP9h-rIsB(lvY#J=7%83#_t zi#7RYbqN=aY9Uyp)e%^T*~&JVV1WQlLnJIGadYMYgTonL_ZO{`fZZiqhPrWL7}@3Q zxSN{@gj=?ywLsc%4YH!C2F8D|?4#%4Gy@NHThtP)*q>YX;JgGB;{P%~W}n}Cz??f6 z9PyWd_W$Rf9}KSeW9uE@SNn4z{&o8QBt-u@j(^%o?aO2jh|7Q8*#EOHcE7QOKh$*_ VhbzXnV+kd`lANk+k@Wp%{|iiQX0HGM literal 0 HcmV?d00001 diff --git a/windows/deployment/windows-10-enterprise-subscription-activation.md b/windows/deployment/windows-10-enterprise-subscription-activation.md index e57c8a14cc..4d7e530d66 100644 --- a/windows/deployment/windows-10-enterprise-subscription-activation.md +++ b/windows/deployment/windows-10-enterprise-subscription-activation.md @@ -1,6 +1,6 @@ --- title: Windows 10 Subscription Activation -description: How to enable Windows 10 Enterprise E3 and E5 subscriptions +description: How to dynamically enable Windows 10 Enterprise or Educations subscriptions keywords: upgrade, update, task sequence, deploy ms.prod: w10 ms.mktglfcycl: deploy @@ -16,7 +16,15 @@ ms.topic: article # Windows 10 Subscription Activation -With Windows 10 version 1703 (also known as the Creator’s Update), both Windows 10 Enterprise E3 and Windows 10 Enterprise E5 are available as online services via subscription. Deploying [Windows 10 Enterprise](planning/windows-10-enterprise-faq-itpro.md) in your organization can now be accomplished with no keys and no reboots. +Starting with Windows 10, version 1703, Windows 10 Pro supports the Subscription Activation feature, enabling users to “step-up” from Windows 10 Pro to **Windows 10 Enterprise** automatically if they are subscribed to Windows 10 Enterprise E3 or E5 via the CSP program. + +With Windows 10, version 1903, the Subscription Activation feature also supports the ability to step-up from Windows 10 Pro for Education to the Enterprise grade edition for educational institutions – **Windows 10 Education**. + +The Subscription Activation feature eliminates the need to manually deploy Windows 10 Enterprise or Education images on each target device, then later standing up on-prem key management services such as KMS or MAK based activation, entering GVLKs, and subsequently rebooting client devices. + +## Subscription Activation for Windows 10 Enterprise + +With Windows 10 version 1703, both Windows 10 Enterprise E3 and Windows 10 Enterprise E5 are available as online services via subscription. Deploying [Windows 10 Enterprise](planning/windows-10-enterprise-faq-itpro.md) in your organization can now be accomplished with no keys and no reboots. If you are running Windows 10 version 1703 or later: @@ -25,11 +33,16 @@ With Windows 10 version 1703 (also known as the Creator’s Update), both Window Organizations that have an Enterprise agreement can also benefit from the new service, using traditional Active Directory-joined devices. In this scenario, the Active Directory user that signs in on their device must be synchronized with Azure AD using [Azure AD Connect Sync](https://docs.microsoft.com/azure/active-directory/connect/active-directory-aadconnectsync-whatis). -See the following topics in this article: +## Subscription Activation for Windows 10 Education + +Subscription Activation for Education works the same as the Enterprise version, but in order to use Subscription Activation for Education, you must have a device running Windows 10 Pro for Education, version 1903 or later. For more information, see the [requirements](#windows-10-education-requirements) section. + +## In this article + - [Inherited Activation](#inherited-activation): Description of a new feature available in Windows 10, version 1803 and later. - [The evolution of Windows 10 deployment](#the-evolution-of-deployment): A short history of Windows deployment. -- [Requirements](#requirements): Prerequisites to use the Windows 10 Enterprise subscription model. -- [Benefits](#benefits): Advantages of Windows 10 Enterprise + subscription-based licensing. +- [Requirements](#requirements): Prerequisites to use the Windows 10 Subscription Activation model. +- [Benefits](#benefits): Advantages of Windows 10 subscription-based licensing. - [How it works](#how-it-works): A summary of the subscription-based licensing option. - [Virtual Desktop Access (VDA)](#virtual-desktop-access-vda): Enable Windows 10 Subscription Activation for VMs in the cloud. @@ -56,11 +69,14 @@ The following figure illustrates how deploying Windows 10 has evolved with each - **Windows 10 1507** added the ability to install a new product key using a provisioning package or using MDM to change the SKU.  This required a reboot, which would install the new OS components, and took several minutes to complete. However, it was a lot quicker than in-place upgrade.
- **Windows 10 1607** made a big leap forward. Now you can just change the product key and the SKU instantly changes from Windows 10 Pro to Windows 10 Enterprise.  In addition to provisioning packages and MDM, you can just inject a key using SLMGR.VBS (which injects the key into WMI), so it became trivial to do this using a command line.
- **Windows 10 1703** made this “step-up” from Windows 10 Pro to Windows 10 Enterprise automatic for those that subscribed to Windows 10 Enterprise E3 or E5 via the CSP program.
-- **Windows 10 1709** adds support for Windows 10 Subscription Activation, very similar to the CSP support but for large enterprises, enabling the use of Azure AD for assigning licenses to users. When those users sign in on an AD or Azure AD-joined machine, it automatically steps up from Windows 10 Pro to Windows 10 Enterprise. -- **Windows 10 1803** updates Windows 10 Subscription Activation to enable pulling activation keys directly from firmware for devices that support firmware-embedded keys. It is no longer necessary to run a script to perform the activation step on Windows 10 Pro prior to activating Enterprise. For virtual machines and hosts running Windows 10, version 1803 [Inherited Activation](#inherited-activation) is also enabled. +- **Windows 10 1709** adds support for Windows 10 Subscription Activation, very similar to the CSP support but for large enterprises, enabling the use of Azure AD for assigning licenses to users. When those users sign in on an AD or Azure AD-joined machine, it automatically steps up from Windows 10 Pro to Windows 10 Enterprise.
+- **Windows 10 1803** updates Windows 10 Subscription Activation to enable pulling activation keys directly from firmware for devices that support firmware-embedded keys. It is no longer necessary to run a script to perform the activation step on Windows 10 Pro prior to activating Enterprise. For virtual machines and hosts running Windows 10, version 1803 [Inherited Activation](#inherited-activation) is also enabled.
+- **Windows 10 1903** updates Windows 10 Subscription Activation to enable step up from Windows 10 Pro to Windows 10 Education. ## Requirements +### Windows 10 Enterprise requirements + For Microsoft customers with Enterprise Agreements (EA) or Microsoft Products & Services Agreements (MPSA), you must have the following: - Windows 10 (Pro or Enterprise) version 1703 or later installed on the devices to be upgraded. @@ -74,25 +90,47 @@ For Microsoft customers that do not have EA or MPSA, you can obtain Windows 10 E If devices are running Windows 7 or Windows 8.1, see [New Windows 10 upgrade benefits for Windows Cloud Subscriptions in CSP](https://blogs.windows.com/business/2017/01/19/new-windows-10-upgrade-benefits-windows-cloud-subscriptions-csp/) +### Windows 10 Education requirements + +1. A device with Windows 10 Pro for Education edition, version 1903 or later with a Pro for Education product key in firmware. Note: If the device comes pre-installed with Pro for Education from an OEM, it will have the correct key in firmware. +2. The Education tenant must have an active subscription to Microsoft 365 or a traditional Windows 10 Enterprise subscription. +3. Devices must be Azure AD-joined or Hybrid Azure AD joined. Workgroup-joined or Azure AD registered devices are not supported. + +>If Windows Pro is converted to Windows 10 Pro for Education [using benefits available in Store for Education](https://docs.microsoft.com/education/windows/change-to-pro-education#change-using-microsoft-store-for-education), then the feature will not work. You will need to re-image the device using a Windows 10 Pro for Education edition. + + ## Benefits -With Windows 10 Enterprise, businesses can benefit from enterprise-level security and control. Previously, only organizations with a Microsoft Volume Licensing Agreement could deploy Windows 10 Enterprise E3 or E5 to their users. Now, with Windows 10 Enterprise E3 and E5 being available as a true online service, it is available in every channel thus allowing all organizations to take advantage of enterprise grade Windows 10 features. To compare Windows 10 editions and review pricing, see the following: +With Windows 10 Enterprise or Windows 10 Education, businesses can benefit from enterprise-level security and control. Previously, only organizations with a Microsoft Volume Licensing Agreement could deploy Windows 10 Education or Windows 10 Enterprise E3 or E5 to their users. Now, with Windows 10 Enterprise E3 and E5 being available as a true online service, it is available in every channel thus allowing all organizations to take advantage of enterprise grade Windows 10 features. To compare Windows 10 editions and review pricing, see the following: - [Compare Windows 10 editions](https://www.microsoft.com/en-us/windowsforbusiness/compare) - [Enterprise Mobility + Security Pricing Options](https://www.microsoft.com/en-us/cloud-platform/enterprise-mobility-security-pricing) You can benefit by moving to Windows as an online service in the following ways: -1. Licenses for Windows 10 Enterprise are checked based on Azure Active Directory (Azure AD) credentials, so now businesses have a systematic way to assign licenses to end users and groups in their organization. +1. Licenses for Windows 10 Enterprise and Education are checked based on Azure Active Directory (Azure AD) credentials, so now businesses have a systematic way to assign licenses to end users and groups in their organization. 2. User logon triggers a silent edition upgrade, with no reboot required 3. Support for mobile worker/BYOD activation; transition away from on-prem KMS and MAK keys. -4. Compliance support via seat assignment. +4. Compliance support via seat assignment. +5. Licenses can be updated to different users dynamically, enabling you to optimize your licensing investment against changing needs. ## How it works -When a licensed user signs in to a device that meets requirements using the Azure AD credentials associated with a Windows 10 Enterprise E3 or E5 license, the operating system turns from Windows 10 Pro to Windows 10 Enterprise and all the appropriate Windows 10 Enterprise features are unlocked. When a user’s subscription expires or is transferred to another user, the Windows 10 Enterprise device reverts seamlessly to Windows 10 Pro edition, after a grace period of up to 90 days. +The device is AAD joined from Settings > Accounts > Access work or school. -Devices currently running Windows 10 Pro, version 1703 or later can get Windows 10 Enterprise Semi-Annual Channel on up to five devices for each user covered by the license. This benefit does not include Long Term Servicing Channel. +The IT administrator assigns Windows 10 Enterprise to a user. See the following figure. + +![Windows 10 Enterprise](images/ent.png) + +When a licensed user signs in to a device that meets requirements using their Azure AD credentials, the operating system turns from Windows 10 Pro to Windows 10 Enterprise and all the appropriate Windows 10 Enterprise/Education features are unlocked. When a user’s subscription expires or is transferred to another user, the device reverts seamlessly to Windows 10 Pro edition, after a grace period of up to 90 days. + +Devices running Windows 10 Pro, version 1703 (Enterprise) or version 1903 (Education) or later can get Windows 10 Enterprise/Education Semi-Annual Channel on up to five devices for each user covered by the license. This benefit does not include Long Term Servicing Channel. + +The following figures summarize how the Subscription Activation model works: + +![1703](images/before.png) + +![1903](images/after.png) ### Scenarios @@ -126,7 +164,7 @@ The following policies apply to acquisition and renewal of licenses on devices: - If five devices are already on the list and a subscribed user signs in on a sixth device, then this new device is added to the end of the list and the first device is removed. - Devices that are removed from the list will cease trying to acquire a license and revert to Windows 10 Pro when the grace period expires. -Licenses can also be reallocated from one user to another user, allowing you to optimize your licensing investment against changing needs. +Licenses can be reallocated from one user to another user, allowing you to optimize your licensing investment against changing needs. When you have the required Azure AD subscription, group-based licensing is the preferred method to assign Enterprise E3 and E5 licenses to users. For more information, see [Group-based licensing basics in Azure AD](https://docs.microsoft.com/azure/active-directory/active-directory-licensing-whatis-azure-portal). From 5707a133aefb9336a584e9582c92e0e1458735a6 Mon Sep 17 00:00:00 2001 From: Greg Lindsay Date: Wed, 8 May 2019 14:15:06 -0700 Subject: [PATCH 412/724] draft2 --- .openpublishing.redirection.json | 11 ++++++++--- ...ation.md => windows-10-subscription-activation.md} | 0 2 files changed, 8 insertions(+), 3 deletions(-) rename windows/deployment/{windows-10-enterprise-subscription-activation.md => windows-10-subscription-activation.md} (100%) diff --git a/.openpublishing.redirection.json b/.openpublishing.redirection.json index 7a179df68a..d414deb585 100644 --- a/.openpublishing.redirection.json +++ b/.openpublishing.redirection.json @@ -13950,9 +13950,14 @@ "redirect_document_id": true }, { - "source_path": "windows/hub/release-information.md", - "redirect_url": "/windows/release-information", - "redirect_document_id": true +"source_path": "windows/windows/deployment/windows-10-enterprise-subscription-activation.md", +"redirect_url": "/windows/windows/deployment/windows-10-subscription-activation", +"redirect_document_id": true +}, +{ +"source_path": "windows/hub/release-information.md", +"redirect_url": "/windows/release-information", +"redirect_document_id": true } ] } diff --git a/windows/deployment/windows-10-enterprise-subscription-activation.md b/windows/deployment/windows-10-subscription-activation.md similarity index 100% rename from windows/deployment/windows-10-enterprise-subscription-activation.md rename to windows/deployment/windows-10-subscription-activation.md From d180e8329794c9bbbb17d655cc8ac977823a1e49 Mon Sep 17 00:00:00 2001 From: ManikaDhiman Date: Wed, 8 May 2019 14:57:42 -0700 Subject: [PATCH 413/724] Moved supportedvalues after description --- .../mdm/policy-csp-update.md | 56 ++++++++++++------- 1 file changed, 36 insertions(+), 20 deletions(-) diff --git a/windows/client-management/mdm/policy-csp-update.md b/windows/client-management/mdm/policy-csp-update.md index 9d1af07791..812ce661cb 100644 --- a/windows/client-management/mdm/policy-csp-update.md +++ b/windows/client-management/mdm/policy-csp-update.md @@ -995,8 +995,14 @@ The maintenance wakeup policy specifies if Automatic Maintenance should make a w If you enable this policy setting, Automatic Maintenance attempts to set OS wake policy and make a wake request for the daily scheduled time, if required. If you disable or do not configure this policy setting, the wake setting as specified in Security and Maintenance/Automatic Maintenance Control Panel applies. - + + +Supported values: +- true: Enable +- false: Disable (Default) + + ADMX Info: - GP English name: *Automatic Maintenance WakeUp Policy* @@ -1006,11 +1012,7 @@ ADMX Info: - GP ADMX file name: *msched.admx* - -Supported values: -- true: Enable -- false: Disable (Default) - + @@ -1122,6 +1124,13 @@ The following list shows the supported values: Added in Windows 10, version 1903. Allows IT admins to specify the number of days a user has before feature updates are installed on their devices automatically. Updates and restarts will occur regardless of active hours and the user will not be able to reschedule. + + +Supports a numeric value from 2 - 30, which indicates the number of days a device will wait until performing an aggressive installation of a required feature update. + +Default value is 7. + + ADMX Info: - GP English name: *Specify deadlines for automatic updates and restarts* @@ -1131,11 +1140,7 @@ ADMX Info: - GP ADMX file name: *WindowsUpdate.admx* - -Supports a numeric value from 2 - 30, which indicates the number of days a device will wait until performing an aggressive installation of a required feature update. -Default value is 7. - @@ -1184,6 +1189,13 @@ Default value is 7. Added in Windows 10, version 1903. Allows IT admins to specify the number of days a user has before quality updates are installed on their devices automatically. Updates and restarts will occur regardless of active hours and the user will not be able to reschedule. + + +Supports a numeric value from 2 - 30, which indicates the number of days a device will wait until performing an aggressive installation of a required quality update. + +Default value is 7. + + ADMX Info: - GP English name: *Specify deadlines for automatic updates and restarts* @@ -1193,11 +1205,7 @@ ADMX Info: - GP ADMX file name: *WindowsUpdate.admx* - -Supports a numeric value from 2 - 30, which indicates the number of days a device will wait until performing an aggressive installation of a required quality update. -Default value is 7. - @@ -1246,6 +1254,13 @@ Default value is 7. Added in Windows 10, version 1903. Allows the IT admin (when used with [Update/ConfigureDeadlineForFeatureUpdates](#update-configuredeadlineforfeatureupdates) or [Update/ConfigureDeadlineForQualityUpdates](#update-configuredeadlineforqualityupdates)) to specify a minimum number of days until restarts occur automatically. Setting the grace period may extend the effective deadline set by the deadline policies. + + +Supports a numeric value from 0 - 5, which indicates the minimum number of days a device will wait until performing an aggressive installation of a required update once deadline has been reached. + +Default value is 2. + + ADMX Info: - GP English name: *Specify deadlines for automatic updates and restarts* @@ -1255,11 +1270,7 @@ ADMX Info: - GP ADMX file name: *WindowsUpdate.admx* - -Supports a numeric value from 0 - 5, which indicates the minimum number of days a device will wait until performing an aggressive installation of a required update once deadline has been reached. -Default value is 2. - @@ -1310,6 +1321,13 @@ Added in Windows 10, version 1903. If enabled (when used with [Update/ConfigureD When disabled, if the device has installed the required updates and is outside of active hours, it may attempt an automatic restart before the deadline. + + +Supported values: +- 1 - Enabled. Device does not attempt to automatically reboot outside of active hours until the compliance deadline is reached. +- 0 - Disabled. Device may reboot outside of active hours before the deadline. + + ADMX Info: - GP English name: *Specify deadlines for automatic updates and restarts* @@ -1319,9 +1337,7 @@ ADMX Info: - GP ADMX file name: *WindowsUpdate.admx* - - From 6e185405095303a8cb6cababbf7906885df17688 Mon Sep 17 00:00:00 2001 From: ManikaDhiman Date: Wed, 8 May 2019 15:21:26 -0700 Subject: [PATCH 414/724] Minor updates --- windows/client-management/mdm/policy-csp-update.md | 8 +++----- 1 file changed, 3 insertions(+), 5 deletions(-) diff --git a/windows/client-management/mdm/policy-csp-update.md b/windows/client-management/mdm/policy-csp-update.md index 812ce661cb..587b602fde 100644 --- a/windows/client-management/mdm/policy-csp-update.md +++ b/windows/client-management/mdm/policy-csp-update.md @@ -985,9 +985,7 @@ The following list shows the supported values: -This policy setting allows you to configure Automatic Maintenance wake up policy. - -The maintenance wakeup policy specifies if Automatic Maintenance should make a wake request to the OS for the daily scheduled maintenance. +This policy setting allows you to configure if Automatic Maintenance should make a wake request to the OS for the daily scheduled maintenance. > [!Note] > If the OS power wake policy is explicitly disabled, then this setting has no effect. @@ -1324,8 +1322,8 @@ When disabled, if the device has installed the required updates and is outside o Supported values: -- 1 - Enabled. Device does not attempt to automatically reboot outside of active hours until the compliance deadline is reached. -- 0 - Disabled. Device may reboot outside of active hours before the deadline. +- 1 - Enabled +- 0 - Disabled From bda1814101cfe758869339716b320e46c789ead4 Mon Sep 17 00:00:00 2001 From: Joey Caparas Date: Wed, 8 May 2019 15:22:33 -0700 Subject: [PATCH 415/724] update preview and ga --- ...windows-defender-advanced-threat-protection.md | 1 - .../whats-new-in-windows-defender-atp.md | 15 +-------------- 2 files changed, 1 insertion(+), 15 deletions(-) diff --git a/windows/security/threat-protection/windows-defender-atp/preview-windows-defender-advanced-threat-protection.md b/windows/security/threat-protection/windows-defender-atp/preview-windows-defender-advanced-threat-protection.md index c715722f19..1556c307d3 100644 --- a/windows/security/threat-protection/windows-defender-atp/preview-windows-defender-advanced-threat-protection.md +++ b/windows/security/threat-protection/windows-defender-atp/preview-windows-defender-advanced-threat-protection.md @@ -48,7 +48,6 @@ The following features are included in the preview release: - [Threat & Vulnerability Management](https://docs.microsoft.com/windows/security/threat-protection/windows-defender-atp/next-gen-threat-and-vuln-mgt)
A new built-in capability that uses a risk-based approach to the discovery, prioritization, and remediation of endpoint vulnerabilities and misconfigurations. -- [Interoperability](https://docs.microsoft.com/windows/security/threat-protection/partner-applications)
Microsoft Defender ATP supports third-party applications to help enhance the detection, investigation, and threat intelligence capabilities of the platform. - [Machine health and compliance report](https://docs.microsoft.com/windows/security/threat-protection/windows-defender-atp/machine-reports-windows-defender-advanced-threat-protection) The machine health and compliance report provides high-level information about the devices in your organization. diff --git a/windows/security/threat-protection/windows-defender-atp/whats-new-in-windows-defender-atp.md b/windows/security/threat-protection/windows-defender-atp/whats-new-in-windows-defender-atp.md index fdc7f36695..00babf863c 100644 --- a/windows/security/threat-protection/windows-defender-atp/whats-new-in-windows-defender-atp.md +++ b/windows/security/threat-protection/windows-defender-atp/whats-new-in-windows-defender-atp.md @@ -21,7 +21,7 @@ ms.topic: conceptual **Applies to:** - [Windows Defender Advanced Threat Protection (Windows Defender ATP)](https://go.microsoft.com/fwlink/p/?linkid=2069559) -Here are the new features that are generally available (GA) in the latest release of Windows Defender ATP as well as security features in Windows 10 and Windows Server. +The following features are generally available (GA) in the latest release of Windows Defender ATP as well as security features in Windows 10 and Windows Server. For more information preview features, see [Preview features](https://docs.microsoft.com/windows/security/threat-protection/windows-defender-atp/preview-windows-defender-advanced-threat-protection). @@ -45,19 +45,6 @@ For more information preview features, see [Preview features](https://docs.micro - [Microsoft Defender ATP API](https://docs.microsoft.com/windows/security/threat-protection/windows-defender-atp/use-apis)
Microsoft Defender ATP exposes much of its data and actions through a set of programmatic APIs. Those APIs will enable you to automate workflows and innovate based on Windows Defender ATP capabilities. -### In preview -The following capability is included in the April 2019 preview release. - -- [Threat & Vulnerability Management](https://docs.microsoft.com/windows/security/threat-protection/windows-defender-atp/next-gen-threat-and-vuln-mgt)
A new built-in capability that uses a risk-based approach to the discovery, prioritization, and remediation of endpoint vulnerabilities and misconfigurations. - - - -## March 2019 -### In preview -The following capability is included in the March 2019 preview release. - -- [Machine health and compliance report](https://docs.microsoft.com/windows/security/threat-protection/windows-defender-atp/machine-reports-windows-defender-advanced-threat-protection) The machine health and compliance report provides high-level information about the devices in your organization. - ## February 2019 - [Incidents](https://docs.microsoft.com/windows/security/threat-protection/windows-defender-atp/incidents-queue)
Incident is a new entity in Windows Defender ATP that brings together all relevant alerts and related entities to narrate the broader attack story, giving analysts better perspective on the purview of complex threats. From cbc377b5477ab593779069bee6599d7b170bbc1f Mon Sep 17 00:00:00 2001 From: Max Velitchko Date: Wed, 8 May 2019 15:22:55 -0700 Subject: [PATCH 416/724] wdavconfig.py => mdatp --health --- ...osoft-defender-atp-mac-install-manually.md | 9 +++----- ...soft-defender-atp-mac-install-with-jamf.md | 21 +++++++++++-------- 2 files changed, 15 insertions(+), 15 deletions(-) diff --git a/windows/security/threat-protection/windows-defender-antivirus/microsoft-defender-atp-mac-install-manually.md b/windows/security/threat-protection/windows-defender-antivirus/microsoft-defender-atp-mac-install-manually.md index 82e53c1ff4..1d6f73f280 100644 --- a/windows/security/threat-protection/windows-defender-antivirus/microsoft-defender-atp-mac-install-manually.md +++ b/windows/security/threat-protection/windows-defender-antivirus/microsoft-defender-atp-mac-install-manually.md @@ -90,9 +90,7 @@ The installation will proceed. The client machine is not associated with orgId. Note that the orgid is blank. ```bash - mavel-mojave:wdavconfig testuser$ sudo /Library/Extensions/wdavkext.kext/Contents/Resources/Tools/wdavconfig.py - uuid : 69EDB575-22E1-53E1-83B8-2E1AB1E410A6 - orgid : + mavel-mojave:wdavconfig testuser$ mdatp --health orgId ``` 2. Install the configuration file on a client machine: @@ -105,9 +103,8 @@ The installation will proceed. 3. Verify that the machine is now associated with orgId: ```bash - mavel-mojave:wdavconfig testuser$ sudo /Library/Extensions/wdavkext.kext/Contents/Resources/Tools/wdavconfig.py - uuid : 69EDB575-22E1-53E1-83B8-2E1AB1E410A6 - orgid : E6875323-A6C0-4C60-87AD-114BBE7439B8 + mavel-mojave:wdavconfig testuser$ mdatp --health orgId + E6875323-A6C0-4C60-87AD-114BBE7439B8 ``` After installation, you'll see the Microsoft Defender icon in the macOS status bar in the top-right corner. diff --git a/windows/security/threat-protection/windows-defender-antivirus/microsoft-defender-atp-mac-install-with-jamf.md b/windows/security/threat-protection/windows-defender-antivirus/microsoft-defender-atp-mac-install-with-jamf.md index b2df2ab85f..516c62e45a 100644 --- a/windows/security/threat-protection/windows-defender-antivirus/microsoft-defender-atp-mac-install-with-jamf.md +++ b/windows/security/threat-protection/windows-defender-antivirus/microsoft-defender-atp-mac-install-with-jamf.md @@ -178,26 +178,29 @@ Thu Feb 21 11:17:23 mavel-mojave jamf[8051]: No patch policies were found. You can also check the onboarding status: ```bash -mavel-mojave:~ testuser$ sudo /Library/Extensions/wdavkext.kext/Contents/Resources/Tools/wdavconfig.py -uuid : 69EDB575-22E1-53E1-83B8-2E1AB1E410A6 -orgid : 79109c9d-83bb-4f3e-9152-8d75ee59ae22 -orgid managed : 79109c9d-83bb-4f3e-9152-8d75ee59ae22 -orgid effective : 79109c9d-83bb-4f3e-9152-8d75ee59ae22 +mavel-mojave:~ testuser$ mdatp --health +... +licensed : true +orgId : "4751b7d4-ea75-4e8f-a1f5-6d640c65bc45" +... ``` -- **orgid/orgid managed**: This is the Microsoft Defender ATP org id specified in the configuration profile. If this value is blank, then the Configuration Profile was not properly set. +- **licensed**: This is a confirmation that the machine is licensed for ATP. -- **orgid effective**: This is the Microsoft Defender ATP org id currently in use. If it does not match the value in the Configuration Profile, then the configuration has not been refreshed. +- **orgid**: Your ATP org id, it will be the same for your organization. ## Check onboarding status You can check that machines are correctly onboarded by creating a script. For example, the following script checks that enrolled machines are onboarded: ```bash -sudo /Library/Extensions/wdavkext.kext/Contents/Resources/Tools/wdavconfig.py | grep -E 'orgid effective : [-a-zA-Z0-9]+' +mdatp --health healthy ``` -This script returns 0 if Microsoft Defender ATP is registered with the Windows Defender ATP service, and another exit code if it is not installed or registered. +This script returns: +- 0 if Microsoft Defender ATP is registered with the Windows Defender ATP service +- 1 if the machine is not onboarded +- 3 if the connection to the daemon cannot be established (daemon is not running) ## Test alert From 67d2ac3c477a7bb1b5ae34fa84d676fe6bf2ac11 Mon Sep 17 00:00:00 2001 From: Joey Caparas Date: Wed, 8 May 2019 15:44:49 -0700 Subject: [PATCH 417/724] update supported versions --- ...igations-windows-defender-advanced-threat-protection.md | 7 ++++--- 1 file changed, 4 insertions(+), 3 deletions(-) diff --git a/windows/security/threat-protection/windows-defender-atp/automated-investigations-windows-defender-advanced-threat-protection.md b/windows/security/threat-protection/windows-defender-atp/automated-investigations-windows-defender-advanced-threat-protection.md index 8ff29cf968..76b8e8448b 100644 --- a/windows/security/threat-protection/windows-defender-atp/automated-investigations-windows-defender-advanced-threat-protection.md +++ b/windows/security/threat-protection/windows-defender-atp/automated-investigations-windows-defender-advanced-threat-protection.md @@ -15,7 +15,6 @@ manager: dansimp audience: ITPro ms.collection: M365-security-compliance ms.topic: conceptual -ms.date: 12/04/2018 --- # Overview of Automated investigations @@ -34,8 +33,10 @@ The Automated investigations list shows all the investigations that have been in Entities are the starting point for Automated investigations. When an alert contains a supported entity for Automated investigation (for example, a file) that resides on a machine that has a supported operating system for Automated investigation then an Automated investigation can start. >[!NOTE] ->Currently, Automated investigation only supports Windows 10, version 1709 or later. ->Some investigation playbooks, like memory investigations, require Windows 10, version 1709 or later. +>Currently, Automated investigation only supports the following OS versions: +>- Windows 10, version 1709 (OS Build 16299.1085 with [KB4493441](https://support.microsoft.com/en-us/help/4493441/windows-10-update-kb4493441)) or later +>- Windows 10, version 1803 (OS Build 17134.704 with [KB4493464](https://support.microsoft.com/en-us/help/4493464/windows-10-update-kb4493464)) or later +>- Later versions of Windows 10 The alerts start by analyzing the supported entities from the alert and also runs a generic machine playbook to see if there is anything else suspicious on that machine. The outcome and details from the investigation is seen in the Automated investigation view. From b5b1054f90012af983fd4bdc2c2f2ac56a70351b Mon Sep 17 00:00:00 2001 From: Greg Lindsay Date: Wed, 8 May 2019 15:59:45 -0700 Subject: [PATCH 418/724] draft --- windows/deployment/planning/windows-10-1903-removed-features.md | 1 + 1 file changed, 1 insertion(+) diff --git a/windows/deployment/planning/windows-10-1903-removed-features.md b/windows/deployment/planning/windows-10-1903-removed-features.md index 262f6dcd60..c7352cabdb 100644 --- a/windows/deployment/planning/windows-10-1903-removed-features.md +++ b/windows/deployment/planning/windows-10-1903-removed-features.md @@ -24,6 +24,7 @@ The following features and functionalities are removed from the installed produc |Feature |Status|Details| |-----------|--------------------|--------- |Cortana will be removed from Windows 10 in all non-English/US markets. Cortana will still be available for en-us markets. |Pending removal|A new Cortana UWP app is being developed. Precise dates for release not yet available.| +|Cortana on Android is removing all Cortana cross-device functionality from it's application in November. |Removed |This will remove all of the mirrored notifications and Cortana natural language skills for texting or calling a mobile device and finding their phone. The **Your Phone** applicaiton on PC is offering a partial replacement for text notifications from Android phones but not the full spectrum of features. | |XDDM-based Remote Desktop driver|Removed|The default driver for remote desktop was switched to the IDD for a single-user scenarios. We plan to use IDD as default for all use cases and anounce deprecation of XP Display Driver Model (XDDM) based RD fdriver| |Desktop messaging app doesn't offer messages sync |Removed|The messaging app on Desktop has a sync feature that can be used to sync SMS text messages received from Windows Mobile and keep a copy of them on the Desktop. We will be removing the messaging app from Desktop devices in a future release. When sync is removed, you will only be able to access messages from the device that received the message.| |Print 3D app|Removed|The Print 3D app will no longer be installed automatically in a future release of Windows. It will remain available for download from the Store. To 3D print objects on a new Windows devices, you must first install the app (1P or 3P app) from the Store.| From a839ec7f1aefb1e51eb9478448793585ee70bc5f Mon Sep 17 00:00:00 2001 From: "Nisha Mittal (Wipro Ltd.)" Date: Wed, 8 May 2019 16:01:00 -0700 Subject: [PATCH 419/724] Latest changes done for few more issues --- ...ssues-windows-10-1809-and-windows-server-2019.yml | 12 ++++++++++++ ...tatus-windows-10-1809-and-windows-server-2019.yml | 6 ++++-- ...atus-windows-7-and-windows-server-2008-r2-sp1.yml | 4 ++-- ...status-windows-8.1-and-windows-server-2012-r2.yml | 4 ++-- 4 files changed, 20 insertions(+), 6 deletions(-) diff --git a/windows/release-information/resolved-issues-windows-10-1809-and-windows-server-2019.yml b/windows/release-information/resolved-issues-windows-10-1809-and-windows-server-2019.yml index e3ea1030dd..b0d3c9f294 100644 --- a/windows/release-information/resolved-issues-windows-10-1809-and-windows-server-2019.yml +++ b/windows/release-information/resolved-issues-windows-10-1809-and-windows-server-2019.yml @@ -32,6 +32,8 @@ sections: - type: markdown text: " + + @@ -66,11 +68,21 @@ sections:
" +- title: May 2019 +- items: + - type: markdown + text: " +
SummaryOriginating updateStatusDate resolved
Latest cumulative update (KB 4495667) installs automatically
Reports that the optional cumulative update (KB 4495667) installs automatically.

See details >
OS Build 17763.475

May 03, 2019
KB4495667
Resolved
May 08, 2019
03:37 PM PT
System may be unresponsive after restart if ArcaBit antivirus software installed
After further investigation ArcaBit has confirmed this issue is not applicable to Windows 10, version 1809

See details >
OS Build 17763.437

April 09, 2019
KB4493509
Resolved
May 08, 2019
03:30 PM PT
Custom URI schemes may not start corresponding application
Custom URI schemes for application protocol handlers may not start the corresponding application for local intranet and trusted sites in Internet Explorer.

See details >
OS Build 17763.379

March 12, 2019
KB4489899
Resolved
KB4495667
May 03, 2019
12:40 PM PT
End-user-defined characters (EUDC) may cause blue screen at startup
If you enable per font end-user-defined characters (EUDC), the system may stop working and a blue screen may appear at startup.

See details >
OS Build 17763.404

April 02, 2019
KB4490481
Resolved
KB4493509
April 09, 2019
10:00 AM PT
Internet Explorer 11 authentication issue with multiple concurrent logons
Internet Explorer 11 users may encounter issues if two or more people use the same user account for multiple, concurrent login sessions on the same Windows Server machine.

See details >
OS Build 17763.253

January 08, 2019
KB4480116
Resolved
KB4493509
April 09, 2019
10:00 AM PT
+ +
DetailsOriginating updateStatusHistory
Latest cumulative update (KB 4495667) installs automatically
Due to a servicing side issue some users were offered KB4495667 (optional update) automatically and rebooted devices. This issue has been mitigated.

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019
  • Server: Windows Server, version 1809; Windows Server 2019
Resolution:: This issue has been mitigated on the servicing side to prevent auto installing of this update. Customers do not need to take any action.

Back to top
OS Build 17763.475

May 03, 2019
KB4495667
Resolved
Resolved:
May 08, 2019
03:37 PM PT

Opened:
May 05, 2019
12:01 PM PT
+ " + - title: April 2019 - items: - type: markdown text: " +
DetailsOriginating updateStatusHistory
System may be unresponsive after restart if ArcaBit antivirus software installed
ArcaBit has confirmed this issue is not applicable to Windows 10, version 1809 (client or server).

Microsoft and ArcaBit have identified an issue on devices with ArcaBit antivirus software installed that may cause the system to become unresponsive upon restart.

Affected platforms:
  • Client: Windows 8.1; Windows 7 SP1
  • Server: Windows Server 2012 R2; Windows Server 2008 R2 SP1
Workaround: ArcaBit has released an update to address this issue for affected platforms. For more information, see the ArcaBit support article.

Resolution: This issue has been resolved. ArcaBit has confirmed this issue is not applicable to Windows 10, version 1809 (client or server).

Back to top
OS Build 17763.437

April 09, 2019
KB4493509
Resolved
Resolved:
May 08, 2019
03:30 PM PT

Opened:
April 09, 2019
10:00 AM PT
End-user-defined characters (EUDC) may cause blue screen at startup
If you enable per font end-user-defined characters (EUDC), the system will stop working and a blue screen may appear at startup. This is not a common setting in non-Asian regions.

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10, version 1607; Windows 10 Enterprise LTSC 2016
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016
Resolution: This issue was resolved in KB4493509.

Back to top
OS Build 17763.404

April 02, 2019
KB4490481
Resolved
KB4493509
Resolved:
April 09, 2019
10:00 AM PT

Opened:
April 02, 2019
10:00 AM PT
" diff --git a/windows/release-information/status-windows-10-1809-and-windows-server-2019.yml b/windows/release-information/status-windows-10-1809-and-windows-server-2019.yml index 5237a7fcb5..2b50998415 100644 --- a/windows/release-information/status-windows-10-1809-and-windows-server-2019.yml +++ b/windows/release-information/status-windows-10-1809-and-windows-server-2019.yml @@ -67,10 +67,11 @@ sections: - + + @@ -93,6 +94,7 @@ sections:
SummaryOriginating updateStatusLast updated
Devices with some Asian language packs installed may receive an error
After installing the KB4493509 devices with some Asian language packs installed may receive the error, \"0x800f0982 - PSFX_E_MATCHING_COMPONENT_NOT_F

See details >
OS Build 17763.437

April 09, 2019
KB4493509
Mitigated
May 03, 2019
10:59 AM PT
Printing from Microsoft Edge or other UWP apps, you may receive the error 0x80070007
Attempting to print from Microsoft Edge or other Universal Windows Platform (UWP) applications, you may receive an error.

See details >
OS Build 17763.379

March 12, 2019
KB4489899
Mitigated
May 02, 2019
04:47 PM PT
System may be unresponsive after restart if ArcaBit antivirus software installed
Devices with ArcaBit antivirus software installed may become unresponsive upon restart.

See details >
OS Build 17763.437

April 09, 2019
KB4493509
Mitigated
April 25, 2019
02:00 PM PT
Issue using PXE to start a device from WDS
Using PXE to start a device from a WDS server configured to use Variable Window Extension may cause the connection to the WDS server to terminate prematurely.

See details >
OS Build 17763.379

March 12, 2019
KB4489899
Mitigated
April 09, 2019
10:00 AM PT
Certain operations performed on a Cluster Shared Volume may fail
Certain operations, such as rename, performed on files or folders on a Cluster Shared Volume (CSV) may fail with the error, \"STATUS_BAD_IMPERSONATION_LEVEL (0xC00000A5)\".

See details >
OS Build 17763.253

January 08, 2019
KB4480116
Mitigated
April 09, 2019
10:00 AM PT
Audio not working on monitors or TV connected to a PC via HDMI, USB, or DisplayPort
Upgrade block: Microsoft has identified issues with certain new Intel display drivers, which accidentally turn on unsupported features in Windows.

See details >
OS Build 17763.134

November 13, 2018
KB4467708
Mitigated
March 15, 2019
12:00 PM PT
Latest cumulative update (KB 4495667) installs automatically
Reports that the optional cumulative update (KB 4495667) installs automatically.

See details >
OS Build 17763.475

May 03, 2019
KB4495667
Resolved
May 08, 2019
03:37 PM PT
System may be unresponsive after restart if ArcaBit antivirus software installed
After further investigation ArcaBit has confirmed this issue is not applicable to Windows 10, version 1809

See details >
OS Build 17763.437

April 09, 2019
KB4493509
Resolved
May 08, 2019
03:30 PM PT
Custom URI schemes may not start corresponding application
Custom URI schemes for application protocol handlers may not start the corresponding application for local intranet and trusted sites in Internet Explorer.

See details >
OS Build 17763.379

March 12, 2019
KB4489899
Resolved
KB4495667
May 03, 2019
12:40 PM PT
End-user-defined characters (EUDC) may cause blue screen at startup
If you enable per font end-user-defined characters (EUDC), the system may stop working and a blue screen may appear at startup.

See details >
OS Build 17763.404

April 02, 2019
KB4490481
Resolved
KB4493509
April 09, 2019
10:00 AM PT
Internet Explorer 11 authentication issue with multiple concurrent logons
Internet Explorer 11 users may encounter issues if two or more people use the same user account for multiple, concurrent login sessions on the same Windows Server machine.

See details >
OS Build 17763.253

January 08, 2019
KB4480116
Resolved
KB4493509
April 09, 2019
10:00 AM PT
+
DetailsOriginating updateStatusHistory
Devices with some Asian language packs installed may receive an error
After installing the April 2019 Cumulative Update (KB4493509), devices with some Asian language packs installed may receive the error, \"0x800f0982 - PSFX_E_MATCHING_COMPONENT_NOT_FOUND.\"

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019
  • Server: Windows Server, version 1809; Windows Server 2019
Workaround:
  1. Uninstall and reinstall any recently added language packs. For instructions, see \"Manage the input and display language settings in Windows 10\".
  2. Click Check for Updates and install the April 2019 Cumulative Update. For instructions, see \"Update Windows 10\".
Note: If reinstalling the language pack does not mitigate the issue, reset your PC as follows:
  1. Go to Settings app -> Recovery.
  2. Click on Get Started under \"Reset this PC\" recovery option.
  3. Select \"Keep my Files\".
Next steps: Microsoft is working on a resolution and will provide an update in an upcoming release.

Back to top
OS Build 17763.437

April 09, 2019
KB4493509
Mitigated
Last updated:
May 03, 2019
10:59 AM PT

Opened:
May 02, 2019
04:36 PM PT
Printing from Microsoft Edge or other UWP apps, you may receive the error 0x80070007
When attempting to print from Microsoft Edge or other Universal Windows Platform (UWP) applications you may receive the error, \"Your printer has experienced an unexpected configuration problem. 0x80070007e.\"
 
Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019
  • Server: Windows Server, version 1809; Windows Server 2019
Workaround: You can use another browser, such as Internet Explorer to print your documents.
 
Next steps: Microsoft is working on a resolution and will provide an update in an upcoming release.

Back to top
OS Build 17763.379

March 12, 2019
KB4489899
Mitigated
Last updated:
May 02, 2019
04:47 PM PT

Opened:
May 02, 2019
04:47 PM PT
Latest cumulative update (KB 4495667) installs automatically
Due to a servicing side issue some users were offered KB4495667 (optional update) automatically and rebooted devices. This issue has been mitigated.

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019
  • Server: Windows Server, version 1809; Windows Server 2019
Resolution:: This issue has been mitigated on the servicing side to prevent auto installing of this update. Customers do not need to take any action.

Back to top
OS Build 17763.475

May 03, 2019
KB4495667
Resolved
Resolved:
May 08, 2019
03:37 PM PT

Opened:
May 05, 2019
12:01 PM PT
" @@ -101,7 +103,7 @@ sections: - type: markdown text: " - +
DetailsOriginating updateStatusHistory
System may be unresponsive after restart if ArcaBit antivirus software installed
Microsoft and ArcaBit have identified an issue on devices with ArcaBit antivirus software installed that may cause the system to become unresponsive upon restart after installing KB4493509
 
Microsoft has temporarily blocked devices from receiving this update if ArcaBit antivirus software is installed. 

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 8.1; Windows 7 SP1
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server 2012 R2; Windows Server 2008 R2 SP1
Workaround: ArcaBit has released an update to address this issue. For more information, see the Arcabit support article.

Back to top
OS Build 17763.437

April 09, 2019
KB4493509
Mitigated
Last updated:
April 25, 2019
02:00 PM PT

Opened:
April 09, 2019
10:00 AM PT
System may be unresponsive after restart if ArcaBit antivirus software installed
ArcaBit has confirmed this issue is not applicable to Windows 10, version 1809 (client or server).

Microsoft and ArcaBit have identified an issue on devices with ArcaBit antivirus software installed that may cause the system to become unresponsive upon restart.

Affected platforms:
  • Client: Windows 8.1; Windows 7 SP1
  • Server: Windows Server 2012 R2; Windows Server 2008 R2 SP1
Workaround: ArcaBit has released an update to address this issue for affected platforms. For more information, see the ArcaBit support article.

Resolution: This issue has been resolved. ArcaBit has confirmed this issue is not applicable to Windows 10, version 1809 (client or server).

Back to top
OS Build 17763.437

April 09, 2019
KB4493509
Resolved
Resolved:
May 08, 2019
03:30 PM PT

Opened:
April 09, 2019
10:00 AM PT
End-user-defined characters (EUDC) may cause blue screen at startup
If you enable per font end-user-defined characters (EUDC), the system will stop working and a blue screen may appear at startup. This is not a common setting in non-Asian regions.

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10, version 1607; Windows 10 Enterprise LTSC 2016
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016
Resolution: This issue was resolved in KB4493509.

Back to top
OS Build 17763.404

April 02, 2019
KB4490481
Resolved
KB4493509
Resolved:
April 09, 2019
10:00 AM PT

Opened:
April 02, 2019
10:00 AM PT
" diff --git a/windows/release-information/status-windows-7-and-windows-server-2008-r2-sp1.yml b/windows/release-information/status-windows-7-and-windows-server-2008-r2-sp1.yml index a15923a007..ef1b22e4bf 100644 --- a/windows/release-information/status-windows-7-and-windows-server-2008-r2-sp1.yml +++ b/windows/release-information/status-windows-7-and-windows-server-2008-r2-sp1.yml @@ -60,10 +60,10 @@ sections: - type: markdown text: "
This table offers a summary of current active issues and those issues that have been resolved in the last 30 days.

+ - @@ -85,9 +85,9 @@ sections: - type: markdown text: "
SummaryOriginating updateStatusLast updated
System may be unresponsive after restart if ArcaBit antivirus software installed
Devices with ArcaBit antivirus software installed may become unresponsive upon restart.

See details >
April 09, 2019
KB4493472
Mitigated
May 08, 2019
03:29 PM PT
System may be unresponsive after restart if Avira antivirus software installed
Devices with Avira antivirus software installed may become unresponsive upon restart.

See details >
April 09, 2019
KB4493472
Mitigated
May 03, 2019
08:50 AM PT
Authentication may fail for services after the Kerberos ticket expires
Authentication may fail for services that require unconstrained delegation after the Kerberos ticket expires.

See details >
March 12, 2019
KB4489878
Mitigated
April 25, 2019
02:00 PM PT
System unresponsive after restart if Sophos Endpoint Protection installed
Devices with Sophos Endpoint Protection installed and managed by Sophos Central or Sophos Enterprise Console (SEC) may become unresponsive upon restart.

See details >
April 09, 2019
KB4493472
Mitigated
April 25, 2019
02:00 PM PT
System may be unresponsive after restart if ArcaBit antivirus software installed
Devices with ArcaBit antivirus software installed may become unresponsive upon restart.

See details >
April 09, 2019
KB4493472
Mitigated
April 25, 2019
02:00 PM PT
System may be unresponsive after restart with certain McAfee antivirus products
Devices with McAfee Endpoint Security Threat Prevention 10.x, Host Intrusion Prevention 8.0, or VirusScan Enterprise 8.8 may be slow or unresponsive at startup.

See details >
April 09, 2019
KB4493472
Mitigated
April 25, 2019
02:00 PM PT
Devices may not respond at login or Welcome screen if running certain Avast software
Devices running Avast for Business, Avast CloudCare, and AVG Business Edition antivirus software may become unresponsive after restart.

See details >
April 09, 2019
KB4493472
Resolved
April 25, 2019
02:00 PM PT
Internet Explorer 11 authentication issue with multiple concurrent logons
Internet Explorer 11 users may encounter issues if two or more people use the same user account for multiple, concurrent login sessions on the same Windows Server machine.

See details >
January 08, 2019
KB4480970
Resolved
KB4493472
April 09, 2019
10:00 AM PT
+ -
DetailsOriginating updateStatusHistory
System may be unresponsive after restart if ArcaBit antivirus software installed
Microsoft and ArcaBit have identified an issue on devices with ArcaBit antivirus software installed that may cause the system to become unresponsive upon restart after installing KB4493472.

Microsoft has temporarily blocked devices from receiving this update if ArcaBit antivirus software is installed.

Affected platforms:
  • Client: Windows 8.1; Windows 7 SP1
  • Server: Windows Server 2012 R2; Windows Server 2008 R2 SP1
Workaround: ArcaBit has released an update to address this issue. For more information, see the Arcabit support article.

Back to top
April 09, 2019
KB4493472
Mitigated
Last updated:
May 08, 2019
03:29 PM PT

Opened:
April 09, 2019
10:00 AM PT
System may be unresponsive after restart if Avira antivirus software installed
Microsoft and Avira have identified an issue on devices with Avira antivirus software installed that may cause the system to become unresponsive upon restart after installing KB4493472.

Microsoft has temporarily blocked devices from receiving this update if Avira antivirus software is installed.

Affected platforms: 
  • Client: Windows 8.1; Windows 7 SP1 
  • Server: Windows Server 2012 R2; Windows Server 2012; Windows Server 2008 R2 SP1; Windows Server 2008 SP2
Next steps: Avira has released an automatic update to address this issue. Guidance for Avira customers can be found in the Avira support article.

Back to top
April 09, 2019
KB4493472
Mitigated
Last updated:
May 03, 2019
08:50 AM PT

Opened:
April 09, 2019
10:00 AM PT
System unresponsive after restart if Sophos Endpoint Protection installed
Microsoft and Sophos have identified an issue on devices with Sophos Endpoint Protection installed and managed by either Sophos Central or Sophos Enterprise Console (SEC) that may cause the system to become unresponsive upon restart after installing KB4493472.

Microsoft has temporarily blocked devices from receiving this update if the Sophos Endpoint is installed until a solution is available.

Affected platforms: 
  • Client: Windows 8.1; Windows 7 SP1
  • Server: Windows Server 2012 R2; Windows Server 2012; Windows Server 2008 R2 SP1; Windows Server 2008 SP2
Guidance for Sophos Endpoint and Sophos Enterprise Console customers can be found in the Sophos support article.

Back to top
April 09, 2019
KB4493472
Mitigated
Last updated:
April 25, 2019
02:00 PM PT

Opened:
April 09, 2019
10:00 AM PT
System may be unresponsive after restart if ArcaBit antivirus software installed
Microsoft and ArcaBit have identified an issue on devices with ArcaBit antivirus software installed that may cause the system to become unresponsive upon restart after installing KB4493472.

Microsoft has temporarily blocked devices from receiving this update if ArcaBit antivirus software is installed.

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 8.1; Windows 7 SP1
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server 2012 R2; Windows Server 2008 R2 SP1
Workaround: ArcaBit has released an update to address this issue. For more information, see the Arcabit support article.

Back to top
April 09, 2019
KB4493472
Mitigated
Last updated:
April 25, 2019
02:00 PM PT

Opened:
April 09, 2019
10:00 AM PT
System may be unresponsive after restart with certain McAfee antivirus products
Microsoft and McAfee have identified an issue on devices with McAfee Endpoint Security (ENS) Threat Prevention 10.x or McAfee Host Intrusion Prevention (Host IPS) 8.0 or McAfee VirusScan Enterprise (VSE) 8.8 installed. It may cause the system to have slow startup or become unresponsive at restart after installing this update. 

Affected platforms:
  • Client:  Windows 8.1; Windows 7 SP1
  • Server:  Windows Server 2012 R2; Windows Server 2008 R2 SP1
Workaround: Guidance for McAfee customers can be found in the following McAfee support articles: 
Next steps: We are presently investigating this issue with McAfee. We will provide an update once we have more information.

Back to top
April 09, 2019
KB4493472
Mitigated
Last updated:
April 25, 2019
02:00 PM PT

Opened:
April 09, 2019
10:00 AM PT
Devices may not respond at login or Welcome screen if running certain Avast software
Microsoft and Avast have identified an issue on devices running Avast for Business, Avast CloudCare, and AVG Business Edition antivirus software after you install KB4493472 and restart. Devices may become unresponsive at the login or Welcome screen. Additionally, you may be unable to log in or log in after an extended period of time.

Affected platforms: 
  • Client: Windows 8.1; Windows 7 SP1 
  • Server: Windows Server 2012 R2; Windows Server 2008 R2 SP1 
Resolution: Avast has released emergency updates to address this issue. For more information and AV update schedule, see the Avast support KB article.

Back to top
April 09, 2019
KB4493472
Resolved
Resolved:
April 25, 2019
02:00 PM PT

Opened:
April 09, 2019
10:00 AM PT
diff --git a/windows/release-information/status-windows-8.1-and-windows-server-2012-r2.yml b/windows/release-information/status-windows-8.1-and-windows-server-2012-r2.yml index 75805707fb..e159932ae6 100644 --- a/windows/release-information/status-windows-8.1-and-windows-server-2012-r2.yml +++ b/windows/release-information/status-windows-8.1-and-windows-server-2012-r2.yml @@ -60,10 +60,10 @@ sections: - type: markdown text: "
This table offers a summary of current active issues and those issues that have been resolved in the last 30 days.

+ - @@ -86,9 +86,9 @@ sections: - type: markdown text: "
SummaryOriginating updateStatusLast updated
System may be unresponsive after restart if ArcaBit antivirus software installed
Devices with ArcaBit antivirus software installed may become unresponsive upon restart.

See details >
April 09, 2019
KB4493446
Mitigated
May 08, 2019
03:29 PM PT
System may be unresponsive after restart if Avira antivirus software installed
Devices with Avira antivirus software installed may become unresponsive upon restart.

See details >
April 09, 2019
KB4493446
Mitigated
May 03, 2019
08:50 AM PT
Issue using PXE to start a device from WDS
There may be issues using the Preboot Execution Environment (PXE) to start a device from a Windows Deployment Services (WDS) server configured to use Variable Window Extension.

See details >
March 12, 2019
KB4489881
Mitigated
April 25, 2019
02:00 PM PT
System unresponsive after restart if Sophos Endpoint Protection installed
Devices with Sophos Endpoint Protection installed and managed by Sophos Central or Sophos Enterprise Console (SEC) may become unresponsive upon restart.

See details >
April 09, 2019
KB4493446
Mitigated
April 25, 2019
02:00 PM PT
System may be unresponsive after restart if ArcaBit antivirus software installed
Devices with ArcaBit antivirus software installed may become unresponsive upon restart.

See details >
April 09, 2019
KB4493446
Mitigated
April 25, 2019
02:00 PM PT
Certain operations performed on a Cluster Shared Volume may fail
Certain operations, such as rename, performed on files or folders on a Cluster Shared Volume (CSV) may fail with the error, “STATUS_BAD_IMPERSONATION_LEVEL (0xC00000A5)”.

See details >
January 08, 2019
KB4480963
Mitigated
April 25, 2019
02:00 PM PT
System may be unresponsive after restart with certain McAfee antivirus products
Devices with McAfee Endpoint Security Threat Prevention 10.x, Host Intrusion Prevention 8.0, or VirusScan Enterprise 8.8 may be slow or unresponsive at startup.

See details >
April 09, 2019
KB4493446
Mitigated
April 18, 2019
05:00 PM PT
Devices may not respond at login or Welcome screen if running certain Avast software
Devices running Avast for Business, Avast CloudCare, and AVG Business Edition antivirus software may become unresponsive after restart.

See details >
April 09, 2019
KB4493446
Resolved
April 25, 2019
02:00 PM PT
+ -
DetailsOriginating updateStatusHistory
System may be unresponsive after restart if ArcaBit antivirus software installed
Microsoft and ArcaBit have identified an issue on devices with ArcaBit antivirus software installed that may cause the system to become unresponsive upon restart after installing KB4493446.

Microsoft has temporarily blocked devices from receiving this update if ArcaBit antivirus software is installed.

Affected platforms:
  • Client: Windows 8.1; Windows 7 SP1
  • Server: Windows Server 2012 R2; Windows Server 2008 R2 SP1
Workaround: ArcaBit has released an update to address this issue. For more information, see the Arcabit support article.

Back to top
April 09, 2019
KB4493446
Mitigated
Last updated:
May 08, 2019
03:29 PM PT

Opened:
April 09, 2019
10:00 AM PT
System may be unresponsive after restart if Avira antivirus software installed
Microsoft and Avira have identified an issue on devices with Avira antivirus software installed that may cause the system to become unresponsive upon restart after installing KB4493446.

Microsoft has temporarily blocked devices from receiving this update if Avira antivirus software is installed.

Affected platforms: 
  • Client: Windows 8.1; Windows 7 SP1 
  • Server: Windows Server 2012 R2; Windows Server 2012; Windows Server 2008 R2 SP1; Windows Server 2008 SP2 
Next steps: Avira has released an automatic update to address this issue. Guidance for Avira customers can be found in the Avira support article.

Back to top
April 09, 2019
KB4493446
Mitigated
Last updated:
May 03, 2019
08:50 AM PT

Opened:
April 09, 2019
10:00 AM PT
System unresponsive after restart if Sophos Endpoint Protection installed
Microsoft and Sophos have identified an issue on devices with Sophos Endpoint Protection installed and managed by either Sophos Central or Sophos Enterprise Console (SEC) that may cause the system to become unresponsive upon restart after installing KB4493446.

Microsoft has temporarily blocked devices from receiving this update if the Sophos Endpoint is installed until a solution is available.

Affected platforms: 
  • Client: Windows 8.1; Windows 7 SP1
  • Server: Windows Server 2012 R2; Windows Server 2012; Windows Server 2008 R2 SP1; Windows Server 2008 SP2
Guidance for Sophos Endpoint and Sophos Enterprise Console customers can be found in the Sophos support article.

Back to top
April 09, 2019
KB4493446
Mitigated
Last updated:
April 25, 2019
02:00 PM PT

Opened:
April 09, 2019
10:00 AM PT
System may be unresponsive after restart if ArcaBit antivirus software installed
Microsoft and ArcaBit have identified an issue on devices with ArcaBit antivirus software installed that may cause the system to become unresponsive upon restart after installing KB4493446.

Microsoft has temporarily blocked devices from receiving this update if ArcaBit antivirus software is installed.

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 8.1; Windows 7 SP1
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server 2012 R2; Windows Server 2008 R2 SP1
Workaround: ArcaBit has released an update to address this issue. For more information, see the Arcabit support article.

Back to top
April 09, 2019
KB4493446
Mitigated
Last updated:
April 25, 2019
02:00 PM PT

Opened:
April 09, 2019
10:00 AM PT
System may be unresponsive after restart with certain McAfee antivirus products
Microsoft and McAfee have identified an issue on devices with McAfee Endpoint Security (ENS) Threat Prevention 10.x or McAfee Host Intrusion Prevention (Host IPS) 8.0 or McAfee VirusScan Enterprise (VSE) 8.8 installed. It may cause the system to have slow startup or become unresponsive at restart after installing this update. 

Affected platforms:
  • Client:  Windows 8.1; Windows 7 SP1
  • Server:  Windows Server 2012 R2; Windows Server 2008 R2 SP1
Workaround: Guidance for McAfee customers can be found in the following McAfee support articles:  
Next steps: We are presently investigating this issue with McAfee. We will provide an update once we have more information. 

Back to top
April 09, 2019
KB4493446
Mitigated
Last updated:
April 18, 2019
05:00 PM PT

Opened:
April 09, 2019
10:00 AM PT
Devices may not respond at login or Welcome screen if running certain Avast software
Microsoft and Avast have identified an issue on devices running Avast for Business, Avast CloudCare, and AVG Business Edition antivirus software after you install KB4493446 and restart. Devices may become unresponsive at the login or Welcome screen. Additionally, you may be unable to log in or log in after an extended period of time.

Affected platforms: 
  • Client: Windows 8.1; Windows 7 SP1 
  • Server: Windows Server 2012 R2; Windows Server 2008 R2 SP1 
Resolution: Avast has released emergency updates to address this issue. For more information and AV update schedule, see the Avast support KB article.

Back to top
April 09, 2019
KB4493446
Resolved
Resolved:
April 25, 2019
02:00 PM PT

Opened:
April 09, 2019
10:00 AM PT
From c88375348dda4e2dd36ecfb28f5151e3710d6171 Mon Sep 17 00:00:00 2001 From: ManikaDhiman Date: Wed, 8 May 2019 16:02:39 -0700 Subject: [PATCH 420/724] Minor update --- windows/client-management/mdm/policy-csp-update.md | 4 ++-- 1 file changed, 2 insertions(+), 2 deletions(-) diff --git a/windows/client-management/mdm/policy-csp-update.md b/windows/client-management/mdm/policy-csp-update.md index 587b602fde..9d7ac6f259 100644 --- a/windows/client-management/mdm/policy-csp-update.md +++ b/windows/client-management/mdm/policy-csp-update.md @@ -997,8 +997,8 @@ If you disable or do not configure this policy setting, the wake setting as spec Supported values: -- true: Enable -- false: Disable (Default) +- true - Enable +- false - Disable (Default) From 095681f3baa4843ac3a29632891990c0fa263195 Mon Sep 17 00:00:00 2001 From: "Nisha Mittal (Wipro Ltd.)" Date: Wed, 8 May 2019 16:39:45 -0700 Subject: [PATCH 421/724] Status changed for 1809 product issues --- .../status-windows-10-1809-and-windows-server-2019.yml | 2 -- 1 file changed, 2 deletions(-) diff --git a/windows/release-information/status-windows-10-1809-and-windows-server-2019.yml b/windows/release-information/status-windows-10-1809-and-windows-server-2019.yml index aa37741e35..2b50998415 100644 --- a/windows/release-information/status-windows-10-1809-and-windows-server-2019.yml +++ b/windows/release-information/status-windows-10-1809-and-windows-server-2019.yml @@ -65,7 +65,6 @@ sections: - type: markdown text: "
This table offers a summary of current active issues and those issues that have been resolved in the last 30 days.

- @@ -93,7 +92,6 @@ sections: - type: markdown text: "
SummaryOriginating updateStatusLast updated
Latest cumulative update (KB 4495667) installs automatically
Reports that the optional cumulative update (KB 4495667) installs automatically.

See details >
OS Build 17763.475

May 03, 2019
KB4495667
Mitigated
May 05, 2019
12:01 PM PT
Devices with some Asian language packs installed may receive an error
After installing the KB4493509 devices with some Asian language packs installed may receive the error, \"0x800f0982 - PSFX_E_MATCHING_COMPONENT_NOT_F

See details >
OS Build 17763.437

April 09, 2019
KB4493509
Mitigated
May 03, 2019
10:59 AM PT
Printing from Microsoft Edge or other UWP apps, you may receive the error 0x80070007
Attempting to print from Microsoft Edge or other Universal Windows Platform (UWP) applications, you may receive an error.

See details >
OS Build 17763.379

March 12, 2019
KB4489899
Mitigated
May 02, 2019
04:47 PM PT
Issue using PXE to start a device from WDS
Using PXE to start a device from a WDS server configured to use Variable Window Extension may cause the connection to the WDS server to terminate prematurely.

See details >
OS Build 17763.379

March 12, 2019
KB4489899
Mitigated
April 09, 2019
10:00 AM PT
- From 02cf000a1873bffabe092ddabdbc4e3d240fb579 Mon Sep 17 00:00:00 2001 From: Max Velitchko Date: Wed, 8 May 2019 16:59:26 -0700 Subject: [PATCH 422/724] Adding page for other MDM solutions --- ...defender-atp-mac-install-with-other-mdm.md | 82 +++++++++++++++++++ .../microsoft-defender-atp-mac.md | 1 + 2 files changed, 83 insertions(+) create mode 100644 windows/security/threat-protection/windows-defender-antivirus/microsoft-defender-atp-mac-install-with-other-mdm.md diff --git a/windows/security/threat-protection/windows-defender-antivirus/microsoft-defender-atp-mac-install-with-other-mdm.md b/windows/security/threat-protection/windows-defender-antivirus/microsoft-defender-atp-mac-install-with-other-mdm.md new file mode 100644 index 0000000000..ec7b8d74f1 --- /dev/null +++ b/windows/security/threat-protection/windows-defender-antivirus/microsoft-defender-atp-mac-install-with-other-mdm.md @@ -0,0 +1,82 @@ +--- +title: Installing Microsoft Defender ATP for Mac with different MDM product +description: Describes how to install Microsoft Defender ATP for Mac, using an unsupported MDM solution. +keywords: microsoft, defender, atp, mac, installation, deploy, macos, mojave, high sierra, sierra +search.product: eADQiWindows 10XVcnh +search.appverid: #met150 +ms.prod: w10 +ms.mktglfcycl: deploy +ms.sitesec: library +ms.pagetype: security +ms.author: mavel +author: maximvelichko +ms.localizationpriority: #medium +manager: dansimp +audience: ITPro +ms.collection: M365-security-compliance +ms.topic: #conceptual +--- + +# Deployment with a different MDM system + +**Applies to:** + +[Windows Defender Advanced Threat Protection (Windows Defender ATP) for Mac](https://go.microsoft.com/fwlink/p/?linkid=???To-Add???) + +>[!IMPORTANT] +>Some information relates to prereleased product which may be substantially modified before it's commercially released. Microsoft makes no warranties, express or implied, with respect to the information provided here. + +This topic describes how to install Microsoft Defender ATP for Mac. It supports the preview program and the information here is subject to change. +Microsoft Defender ATP for Mac is not yet widely available, and this topic only applies to enterprise customers who have been accepted into the preview program. + +## Prerequisites and system requirements + +Before you get started, please see [the main Microsoft Defender ATP for Mac page]((microsoft-defender-atp.md)) for a description of prerequisites and system requirements for the current software version. + +## Approach + +Your organization may use one of existing MDM solutions that we do not officially support. +It does not mean that Defender will not work with it. +It means that provide support for deployment/management with this MDM solution. + +However, Defender does not depend on any vendor-specific features, and can be used with any MDM solution that supports the following features (practically any modern MDM solution would support them): + +- Deployment a macOS .pkg to managed machines. +- Deployment macOS system configuration profiles to managed machines. +- Running an arbitrary admin-configured tool/script on managed machines. + +You can deploy Defender without the last requirement, however: + +- You won't be able to collect status in a centralized way +- If you decide to uninstall Defender, you'll need to logon to the client machine locally as an administrator + +## Deployment + +Most of MDM solution use the same model for managing macOS machines, with similar terminology. +Use [JAMF-based deployment](microsoft-defender-atp-mac-install-with-jamf.md) as a template. + +### Package + +Configure deployment of a [required application package](microsoft-defender-atp-mac-install-with-jamf.md#package), +using Installation package (wdav.pkg) downloaded from [ATP](microsoft-defender-atp-mac-install-with-jamf.md#download-installation-and-onboarding-packages). + +Your MDM solution can allow you uploading an arbitrary application package, or require you to wrap it into a custom package first. + +### License settings + +Setup [a system configuration profile](microsoft-defender-atp-mac-install-with-jamf.md#configuration-profile). +Your MDM product may call it something like "Custom Settings Profile" (as Defender is not a part of macOS). + +Use jamf/WindowsDefenderATPOnboarding.plist extracted from an onboarding package downloaded from [ATP](microsoft-defender-atp-mac-install-with-jamf.md#download-installation-and-onboarding-packages). +Your system may support an arbitrary Plist in XML format (you can just upload the jamf/WindowsDefenderATPOnboarding.plist file as-is in this case), or require you to convert to a different format first. + +Note that your custom profile would have an id, name or domain attribute. You must use exactly "com.microsoft.wdav.atp". +MDM will use it to deploy the settings file as **/Library/Managed Preferences/com.microsoft.wdav.atp.plist** on a client machine, and Defender will use this file for loading onboarding info. + +### KEXT + +Setup a KEXT or kernel extension policy. Use team identifier **UBF8T346G9** to whitelist kernel extensions provided by Microsoft. + +## Was it successful? + +Run [mdatp](microsoft-defender-atp-mac-install-with-jamf.md#check-onboarding-status) on a client machine. diff --git a/windows/security/threat-protection/windows-defender-antivirus/microsoft-defender-atp-mac.md b/windows/security/threat-protection/windows-defender-antivirus/microsoft-defender-atp-mac.md index af6205c2ca..130835c66e 100644 --- a/windows/security/threat-protection/windows-defender-antivirus/microsoft-defender-atp-mac.md +++ b/windows/security/threat-protection/windows-defender-antivirus/microsoft-defender-atp-mac.md @@ -46,6 +46,7 @@ In general you'll need to take the following steps: - Deploy Microsoft Defender ATP for Mac using one of the following deployment methods: - [Microsoft Intune-based deployment](microsoft-defender-atp-mac-install-with-intune) - [JAMF-based deployment](microsoft-defender-atp-mac-install-with-jamf) + - [Other MDM products](microsoft-defender-atp-mac-install-with-other-mdm.md) - [Manual deployment](microsoft-defender-atp-mac-install-manually) ### Prerequisites From 46d01547942cb2745ad5e2b75c9b5bb7e1def141 Mon Sep 17 00:00:00 2001 From: Mike Edgar <49731348+medgarmedgar@users.noreply.github.com> Date: Wed, 8 May 2019 18:52:53 -0700 Subject: [PATCH 423/724] Create windows-endpoints-non-enterprise-editions-1903.md --- ...-endpoints-non-enterprise-editions-1903.md | 163 ++++++++++++++++++ 1 file changed, 163 insertions(+) create mode 100644 windows/privacy/windows-endpoints-non-enterprise-editions-1903.md diff --git a/windows/privacy/windows-endpoints-non-enterprise-editions-1903.md b/windows/privacy/windows-endpoints-non-enterprise-editions-1903.md new file mode 100644 index 0000000000..b6be3b5acd --- /dev/null +++ b/windows/privacy/windows-endpoints-non-enterprise-editions-1903.md @@ -0,0 +1,163 @@ +--- +title: Windows 10, version 1809, connection endpoints for non-Enterprise editions +description: Explains what Windows 10 endpoints are used in non-Enterprise editions. +keywords: privacy, manage connections to Microsoft, Windows 10, Windows Server 2016 +ms.prod: w10 +ms.mktglfcycl: manage +ms.sitesec: library +ms.localizationpriority: high +audience: ITPro +author: danihalfin +ms.author: daniha +manager: dansimp +ms.collection: M365-security-compliance +ms.topic: article +ms.date: 6/26/2018 +--- +# Windows 10, version 1809, connection endpoints for non-Enterprise editions + + **Applies to** + +- Windows 10 Home, version 1809 +- Windows 10 Professional, version 1809 +- Windows 10 Education, version 1809 + +In addition to the endpoints listed for [Windows 10 Enterprise](manage-windows-1809-endpoints.md), the following endpoints are available on other editions of Windows 10, version 1809. + +We used the following methodology to derive these network endpoints: + +1. Set up the latest version of Windows 10 on a test virtual machine using the default settings. +2. Leave the devices running idle for a week (that is, a user is not interacting with the system/device). +3. Use globally accepted network protocol analyzer/capturing tools and log all background egress traffic. +4. Compile reports on traffic going to public IP addresses. +5. The test virtual machine was logged in using a local account and was not joined to a domain or Azure Active Directory. +6. All traffic was captured in our lab using a IPV4 network. Therefore no IPV6 traffic is reported here. + +> [!NOTE] +> Microsoft uses global load balancers that can appear in network trace-routes. For example, an endpoint for *.akadns.net might be used to load balance requests to an Azure datacenter, which can change over time. + +## Windows 10 Family + +| **Destination** | **Protocol** | **Description** | +| --- | --- | --- | +|\*.aria.microsoft.com\* | HTTPS | Office Telemetry +|\*.dl.delivery.mp.microsoft.com\* | HTTP | Enables connections to Windows Update. +|\*.download.windowsupdate.com\* | HTTP | Used to download operating system patches and updates. +|\*.g.akamai.net | HTTPS | Used to check for updates to maps that have been downloaded for offline use. +|\*.msn.com\* |TLSv1.2/HTTPS | Windows Spotlight related traffic +|\*.Skype.com | HTTP/HTTPS | Skype related traffic +|\*.smartscreen.microsoft.com\* | HTTPS | Windows Defender Smartscreen related traffic +|\*.telecommand.telemetry.microsoft.com\* | HTTPS | Used by Windows Error Reporting. +|\*cdn.onenote.net* | HTTP | OneNote related traffic +|\*displaycatalog.mp.microsoft.com\* | HTTPS | Used to communicate with Microsoft Store. +|\*emdl.ws.microsoft.com\* | HTTP | Windows Update related traffic +|\*geo-prod.do.dsp.mp.microsoft.com\* |TLSv1.2/HTTPS | Enables connections to Windows Update. +|\*hwcdn.net* | HTTP | Used by the Highwinds Content Delivery Network to perform Windows updates. +|\*img-prod-cms-rt-microsoft-com.akamaized.net* | HTTPS | Used to download image files that are called when applications run (Microsoft Store or Inbox MSN Apps). +|\*maps.windows.com\* | HTTPS | Related to Maps application. +|\*msedge.net* | HTTPS | Used by OfficeHub to get the metadata of Office apps. +|\*nexusrules.officeapps.live.com\* | HTTPS | Office Telemetry +|\*photos.microsoft.com\* | HTTPS | Photos App related traffic +|\*prod.do.dsp.mp.microsoft.com\* |TLSv1.2/HTTPS | Used for Windows Update downloads of apps and OS updates. +|\*wac.phicdn.net* | HTTP | Windows Update related traffic +|\*windowsupdate.com\* | HTTP | Windows Update related traffic +|\*wns.windows.com\* | HTTPS, TLSv1.2 | Used for the Windows Push Notification Services (WNS). +|\*wpc.v0cdn.net* | | Windows Telemetry related traffic +|auth.gfx.ms/16.000.27934.1/OldConvergedLogin_PCore.js | | MSA related +|evoke-windowsservices-tas.msedge* | HTTPS | The following endpoint is used by the Photos app to download configuration files, and to connect to the Office 365 portal's shared infrastructure, including Office Online. To turn off traffic for this endpoint, either uninstall the Photos app or disable the Microsoft Store. If you disable the Microsoft store, other Store apps cannot be installed or updated. Additionally, the Microsoft Store won't be able to revoke malicious Store apps and users will still be able to open them. +|fe2.update.microsoft.com\* |TLSv1.2/HTTPS | Enables connections to Windows Update, Microsoft Update, and the online services of Microsoft Store. +|fe3.\*.mp.microsoft.com.\* |TLSv1.2/HTTPS | Enables connections to Windows Update, Microsoft Update, and the online services of Microsoft Store. +|fs.microsoft.com | | Font Streaming (in ENT traffic) +|g.live.com\* | HTTPS | Used by OneDrive +|iriscoremetadataprod.blob.core.windows.net | HTTPS | Windows Telemetry +|mscrl.microsoft.com | | Certificate Revocation List related traffic. +|ocsp.digicert.com\* | HTTP | CRL and OCSP checks to the issuing certificate authorities. +|officeclient.microsoft.com | HTTPS | Office related traffic. +|oneclient.sfx.ms* | HTTPS | Used by OneDrive for Business to download and verify app updates. +|purchase.mp.microsoft.com\* | HTTPS | Used to communicate with Microsoft Store. +|query.prod.cms.rt.microsoft.com\* | HTTPS | Used to retrieve Windows Spotlight metadata. +|ris.api.iris.microsoft.com\* |TLSv1.2/HTTPS | Used to retrieve Windows Spotlight metadata. +|ris-prod-atm.trafficmanager.net | HTTPS | Azure traffic manager +|settings.data.microsoft.com\* | HTTPS | Used for Windows apps to dynamically update their configuration. +|settings-win.data.microsoft.com\* | HTTPS | Used for Windows apps to dynamically update their configuration. +|sls.update.microsoft.com\* |TLSv1.2/HTTPS | Enables connections to Windows Update. +|store*.dsx.mp.microsoft.com\* | HTTPS | Used to communicate with Microsoft Store. +|storecatalogrevocation.storequality.microsoft.com\* | HTTPS | Used to revoke licenses for malicious apps on the Microsoft Store. +|store-images.s-microsoft.com\* | HTTP | Used to get images that are used for Microsoft Store suggestions. +|tile-service.weather.microsoft.com\* | HTTP | Used to download updates to the Weather app Live Tile. +|tsfe.trafficshaping.dsp.mp.microsoft.com\* |TLSv1.2 | Used for content regulation. +|v10.events.data.microsoft.com | HTTPS | Diagnostic Data +|wdcp.microsoft.* |TLSv1.2 | Used for Windows Defender when Cloud-based Protection is enabled. +|wd-prod-cp-us-west-1-fe.westus.cloudapp.azure.com | HTTPS | Windows Defender related traffic. +|www.bing.com* | HTTP | Used for updates for Cortana, apps, and Live Tiles. + +## Windows 10 Pro + +| **Destination** | **Protocol** | **Description** | +| --- | --- | --- | +| *.e-msedge.net | HTTPS | Used by OfficeHub to get the metadata of Office apps. | +| *.g.akamaiedge.net | HTTPS | Used to check for updates to maps that have been downloaded for offline use. | +| *.s-msedge.net | HTTPS | Used by OfficeHub to get the metadata of Office apps. | +| *.tlu.dl.delivery.mp.microsoft.com/* | HTTP | Enables connections to Windows Update. | +| *geo-prod.dodsp.mp.microsoft.com.nsatc.net | HTTPS | Enables connections to Windows Update. | +| arc.msn.com.nsatc.net | HTTPS | Used to retrieve Windows Spotlight metadata. | +| au.download.windowsupdate.com/* | HTTP | Enables connections to Windows Update. | +| ctldl.windowsupdate.com/msdownload/update/* | HTTP | Used to download certificates that are publicly known to be fraudulent. | +| cy2.licensing.md.mp.microsoft.com.akadns.net | HTTPS | Used to communicate with Microsoft Store. | +| cy2.settings.data.microsoft.com.akadns.net | HTTPS | Used to communicate with Microsoft Store. | +| dm3p.wns.notify.windows.com.akadns.net | HTTPS | Used for the Windows Push Notification Services (WNS) | +| fe3.delivery.dsp.mp.microsoft.com.nsatc.net | HTTPS | Enables connections to Windows Update, Microsoft Update, and the online services of Microsoft Store. | +| g.msn.com.nsatc.net | HTTPS | Used to retrieve Windows Spotlight metadata. | +| ipv4.login.msa.akadns6.net | HTTPS | Used for Microsoft accounts to sign in. | +| location-inference-westus.cloudapp.net | HTTPS | Used for location data. | +| modern.watson.data.microsoft.com.akadns.net | HTTPS | Used by Windows Error Reporting. | +| ocsp.digicert.com\* | HTTP | CRL and OCSP checks to the issuing certificate authorities. | +| ris.api.iris.microsoft.com.akadns.net | HTTPS | Used to retrieve Windows Spotlight metadata. | +| tile-service.weather.microsoft.com/* | HTTP | Used to download updates to the Weather app Live Tile. | +| tsfe.trafficshaping.dsp.mp.microsoft.com | HTTPS | Used for content regulation. | +| vip5.afdorigin-prod-am02.afdogw.com | HTTPS | Used to serve office 365 experimentation traffic | + + +## Windows 10 Education + +| **Destination** | **Protocol** | **Description** | +| --- | --- | --- | +| *.b.akamaiedge.net | HTTPS | Used to check for updates to maps that have been downloaded for offline use. | +| *.e-msedge.net | HTTPS | Used by OfficeHub to get the metadata of Office apps. | +| *.g.akamaiedge.net | HTTPS | Used to check for updates to maps that have been downloaded for offline use. | +| *.s-msedge.net | HTTPS | Used by OfficeHub to get the metadata of Office apps. | +| *.telecommand.telemetry.microsoft.com.akadns.net | HTTPS | Used by Windows Error Reporting. | +| *.tlu.dl.delivery.mp.microsoft.com\* | HTTP | Enables connections to Windows Update. | +| *.windowsupdate.com\* | HTTP | Enables connections to Windows Update. | +| *geo-prod.do.dsp.mp.microsoft.com | HTTPS | Enables connections to Windows Update. | +| au.download.windowsupdate.com\* | HTTP | Enables connections to Windows Update. | +| cdn.onenote.net/livetile/* | HTTPS | Used for OneNote Live Tile. | +| client-office365-tas.msedge.net/* | HTTPS | Used to connect to the Office 365 portal’s shared infrastructure, including Office Online. | +| config.edge.skype.com/* | HTTPS | Used to retrieve Skype configuration values.  | +| ctldl.windowsupdate.com/* | HTTP | Used to download certificates that are publicly known to be fraudulent. | +| cy2.displaycatalog.md.mp.microsoft.com.akadns.net | HTTPS | Used to communicate with Microsoft Store. | +| cy2.licensing.md.mp.microsoft.com.akadns.net | HTTPS | Used to communicate with Microsoft Store. | +| cy2.settings.data.microsoft.com.akadns.net | HTTPS | Used to communicate with Microsoft Store. | +| displaycatalog.mp.microsoft.com/* | HTTPS | Used to communicate with Microsoft Store. | +| download.windowsupdate.com/* | HTTPS | Enables connections to Windows Update. | +| emdl.ws.microsoft.com/* | HTTP | Used to download apps from the Microsoft Store. | +| fe2.update.microsoft.com/* | HTTPS | Enables connections to Windows Update, Microsoft Update, and the online services of Microsoft Store. | +| fe3.delivery.dsp.mp.microsoft.com.nsatc.net | HTTPS | Enables connections to Windows Update, Microsoft Update, and the online services of Microsoft Store. | +| fe3.delivery.mp.microsoft.com/* | HTTPS | Enables connections to Windows Update, Microsoft Update, and the online services of Microsoft Store. | +| g.live.com/odclientsettings/* | HTTPS | Used by OneDrive for Business to download and verify app updates. | +| g.msn.com.nsatc.net | HTTPS | Used to retrieve Windows Spotlight metadata. | +| ipv4.login.msa.akadns6.net | HTTPS | Used for Microsoft accounts to sign in. | +| licensing.mp.microsoft.com/* | HTTPS | Used for online activation and some app licensing. | +| maps.windows.com/windows-app-web-link | HTTPS | Link to Maps application | +| modern.watson.data.microsoft.com.akadns.net | HTTPS | Used by Windows Error Reporting. | +| ocos-office365-s2s.msedge.net/* | HTTPS | Used to connect to the Office 365 portal's shared infrastructure. | +| ocsp.digicert.com\* | HTTP | CRL and OCSP checks to the issuing certificate authorities. | +| oneclient.sfx.ms/* | HTTPS | Used by OneDrive for Business to download and verify app updates. | +| settings-win.data.microsoft.com/settings/* | HTTPS | Used as a way for apps to dynamically update their configuration. | +| sls.update.microsoft.com/* | HTTPS | Enables connections to Windows Update. | +| storecatalogrevocation.storequality.microsoft.com/* | HTTPS | Used to revoke licenses for malicious apps on the Microsoft Store. | +| tile-service.weather.microsoft.com/* | HTTP | Used to download updates to the Weather app Live Tile. | +| tsfe.trafficshaping.dsp.mp.microsoft.com | HTTPS | Used for content regulation. | +| vip5.afdorigin-prod-ch02.afdogw.com | HTTPS | Used to serve office 365 experimentation traffic. | +| watson.telemetry.microsoft.com/Telemetry.Request | HTTPS | Used by Windows Error Reporting. | +| bing.com/* | HTTPS | Used for updates for Cortana, apps, and Live Tiles. | From 7b1747d7eacafeaa4dbed1af7597007d098674c2 Mon Sep 17 00:00:00 2001 From: Mike Edgar <49731348+medgarmedgar@users.noreply.github.com> Date: Wed, 8 May 2019 18:53:54 -0700 Subject: [PATCH 424/724] Rename windows-endpoints-non-enterprise-editions-1903.md to windows-endpoints-1903-non-enterprise-editions.md --- ...-1903.md => windows-endpoints-1903-non-enterprise-editions.md} | 0 1 file changed, 0 insertions(+), 0 deletions(-) rename windows/privacy/{windows-endpoints-non-enterprise-editions-1903.md => windows-endpoints-1903-non-enterprise-editions.md} (100%) diff --git a/windows/privacy/windows-endpoints-non-enterprise-editions-1903.md b/windows/privacy/windows-endpoints-1903-non-enterprise-editions.md similarity index 100% rename from windows/privacy/windows-endpoints-non-enterprise-editions-1903.md rename to windows/privacy/windows-endpoints-1903-non-enterprise-editions.md From 15912e19d6a7578482a8b56030f73e84a1f8163e Mon Sep 17 00:00:00 2001 From: Mike Edgar <49731348+medgarmedgar@users.noreply.github.com> Date: Wed, 8 May 2019 19:03:08 -0700 Subject: [PATCH 425/724] Update windows-endpoints-1903-non-enterprise-editions.md --- ...-endpoints-1903-non-enterprise-editions.md | 128 +++++++++++------- 1 file changed, 78 insertions(+), 50 deletions(-) diff --git a/windows/privacy/windows-endpoints-1903-non-enterprise-editions.md b/windows/privacy/windows-endpoints-1903-non-enterprise-editions.md index b6be3b5acd..d17a7a9d77 100644 --- a/windows/privacy/windows-endpoints-1903-non-enterprise-editions.md +++ b/windows/privacy/windows-endpoints-1903-non-enterprise-editions.md @@ -40,56 +40,84 @@ We used the following methodology to derive these network endpoints: | **Destination** | **Protocol** | **Description** | | --- | --- | --- | -|\*.aria.microsoft.com\* | HTTPS | Office Telemetry -|\*.dl.delivery.mp.microsoft.com\* | HTTP | Enables connections to Windows Update. -|\*.download.windowsupdate.com\* | HTTP | Used to download operating system patches and updates. -|\*.g.akamai.net | HTTPS | Used to check for updates to maps that have been downloaded for offline use. -|\*.msn.com\* |TLSv1.2/HTTPS | Windows Spotlight related traffic -|\*.Skype.com | HTTP/HTTPS | Skype related traffic -|\*.smartscreen.microsoft.com\* | HTTPS | Windows Defender Smartscreen related traffic -|\*.telecommand.telemetry.microsoft.com\* | HTTPS | Used by Windows Error Reporting. -|\*cdn.onenote.net* | HTTP | OneNote related traffic -|\*displaycatalog.mp.microsoft.com\* | HTTPS | Used to communicate with Microsoft Store. -|\*emdl.ws.microsoft.com\* | HTTP | Windows Update related traffic -|\*geo-prod.do.dsp.mp.microsoft.com\* |TLSv1.2/HTTPS | Enables connections to Windows Update. -|\*hwcdn.net* | HTTP | Used by the Highwinds Content Delivery Network to perform Windows updates. -|\*img-prod-cms-rt-microsoft-com.akamaized.net* | HTTPS | Used to download image files that are called when applications run (Microsoft Store or Inbox MSN Apps). -|\*maps.windows.com\* | HTTPS | Related to Maps application. -|\*msedge.net* | HTTPS | Used by OfficeHub to get the metadata of Office apps. -|\*nexusrules.officeapps.live.com\* | HTTPS | Office Telemetry -|\*photos.microsoft.com\* | HTTPS | Photos App related traffic -|\*prod.do.dsp.mp.microsoft.com\* |TLSv1.2/HTTPS | Used for Windows Update downloads of apps and OS updates. -|\*wac.phicdn.net* | HTTP | Windows Update related traffic -|\*windowsupdate.com\* | HTTP | Windows Update related traffic -|\*wns.windows.com\* | HTTPS, TLSv1.2 | Used for the Windows Push Notification Services (WNS). -|\*wpc.v0cdn.net* | | Windows Telemetry related traffic -|auth.gfx.ms/16.000.27934.1/OldConvergedLogin_PCore.js | | MSA related -|evoke-windowsservices-tas.msedge* | HTTPS | The following endpoint is used by the Photos app to download configuration files, and to connect to the Office 365 portal's shared infrastructure, including Office Online. To turn off traffic for this endpoint, either uninstall the Photos app or disable the Microsoft Store. If you disable the Microsoft store, other Store apps cannot be installed or updated. Additionally, the Microsoft Store won't be able to revoke malicious Store apps and users will still be able to open them. -|fe2.update.microsoft.com\* |TLSv1.2/HTTPS | Enables connections to Windows Update, Microsoft Update, and the online services of Microsoft Store. -|fe3.\*.mp.microsoft.com.\* |TLSv1.2/HTTPS | Enables connections to Windows Update, Microsoft Update, and the online services of Microsoft Store. -|fs.microsoft.com | | Font Streaming (in ENT traffic) -|g.live.com\* | HTTPS | Used by OneDrive -|iriscoremetadataprod.blob.core.windows.net | HTTPS | Windows Telemetry -|mscrl.microsoft.com | | Certificate Revocation List related traffic. -|ocsp.digicert.com\* | HTTP | CRL and OCSP checks to the issuing certificate authorities. -|officeclient.microsoft.com | HTTPS | Office related traffic. -|oneclient.sfx.ms* | HTTPS | Used by OneDrive for Business to download and verify app updates. -|purchase.mp.microsoft.com\* | HTTPS | Used to communicate with Microsoft Store. -|query.prod.cms.rt.microsoft.com\* | HTTPS | Used to retrieve Windows Spotlight metadata. -|ris.api.iris.microsoft.com\* |TLSv1.2/HTTPS | Used to retrieve Windows Spotlight metadata. -|ris-prod-atm.trafficmanager.net | HTTPS | Azure traffic manager -|settings.data.microsoft.com\* | HTTPS | Used for Windows apps to dynamically update their configuration. -|settings-win.data.microsoft.com\* | HTTPS | Used for Windows apps to dynamically update their configuration. -|sls.update.microsoft.com\* |TLSv1.2/HTTPS | Enables connections to Windows Update. -|store*.dsx.mp.microsoft.com\* | HTTPS | Used to communicate with Microsoft Store. -|storecatalogrevocation.storequality.microsoft.com\* | HTTPS | Used to revoke licenses for malicious apps on the Microsoft Store. -|store-images.s-microsoft.com\* | HTTP | Used to get images that are used for Microsoft Store suggestions. -|tile-service.weather.microsoft.com\* | HTTP | Used to download updates to the Weather app Live Tile. -|tsfe.trafficshaping.dsp.mp.microsoft.com\* |TLSv1.2 | Used for content regulation. -|v10.events.data.microsoft.com | HTTPS | Diagnostic Data -|wdcp.microsoft.* |TLSv1.2 | Used for Windows Defender when Cloud-based Protection is enabled. -|wd-prod-cp-us-west-1-fe.westus.cloudapp.azure.com | HTTPS | Windows Defender related traffic. -|www.bing.com* | HTTP | Used for updates for Cortana, apps, and Live Tiles. +|\*.aria.microsoft.com*|HTTPS|Microsoft Office Telemetry +|\*.b.akamai*.net|HTTPS|Used to check for updates to Maps that have been downloaded for offline use +|\*.c-msedge.net|HTTP|Microsoft Office +|\*.dl.delivery.mp.microsoft.com*|HTTP|Enables connections to Windows Update +|\*.download.windowsupdate.com*|HTTP|Used to download operating system patches and updates +|\*.g.akamai*.net|HTTPS|Used to check for updates to Maps that have been downloaded for offline use +|\*.login.msa.*.net|HTTPS|Microsoft Account related +|\*.msn.com*|TLSv1.2/HTTPS|Windows Spotlight +|\*.skype.com|HTTP/HTTPS|Skype +|\*.smartscreen.microsoft.com*|HTTPS|Windows Defender Smartscreen +|\*.telecommand.telemetry.microsoft.com*|HTTPS|Used by Windows Error Reporting +|*cdn.onenote.net*|HTTP|OneNote +|*displaycatalog.*mp.microsoft.com*|HTTPS|Used to communicate with Microsoft Store +|*emdl.ws.microsoft.com*|HTTP|Windows Update +|*geo-prod.do.dsp.mp.microsoft.com*|TLSv1.2/HTTPS|Enables connections to Windows Update +|*hwcdn.net*|HTTP|Highwinds Content Delivery Network / Windows updates +|*img-prod-cms-rt-microsoft-com.*|HTTPS|Microsoft Store or Inbox MSN Apps image download +|*licensing.*mp.microsoft.com*|HTTPS|Licensing +|*maps.windows.com*|HTTPS|Related to Maps application +|*msedge.net*|HTTPS|Used by Microsoft OfficeHub to get the metadata of Microsoft Office apps +|*nexusrules.officeapps.live.com*|HTTPS|Microsoft Office Telemetry +|*photos.microsoft.com*|HTTPS|Photos App +|*prod.do.dsp.mp.microsoft.com*|TLSv1.2/HTTPS|Used for Windows Update downloads of apps and OS updates +|*purchase.md.mp.microsoft.com.akadns.net|HTTPS|Used to communicate with Microsoft Store +|*settings.data.microsoft.com.akadns.net|HTTPS|Used for Windows apps to dynamically update their configuration +|*wac.phicdn.net*|HTTP|Windows Update +|*windowsupdate.com*|HTTP|Windows Update +|*wns.*windows.com*|TLSv1.2/HTTPS|Used for the Windows Push Notification Services (WNS) +|*wpc.v0cdn.net*|HTTP|Windows Telemetry +|arc.msn.com|HTTPS|Spotlight +|auth.gfx.ms*|HTTPS|MSA related +|cdn.onenote.net|HTTPS|OneNote Live Tile +|dmd.metaservices.microsoft.com*|HTTP|Device Authentication +|e-0009.e-msedge.net|HTTPS|Microsoft Office +|e10198.b.akamaiedge.net|HTTPS|Maps application +|evoke-windowsservices-tas.msedge*|HTTPS|Photos app +|fe2.update.microsoft.com*|TLSv1.2/HTTPS|Enables connections to Windows Update, Microsoft Update, and the online services of Microsoft Store +|fe3.*.mp.microsoft.com.*|TLSv1.2/HTTPS|Windows Update, Microsoft Update, and Microsoft Store services +|g.live.com*|HTTPS|OneDrive +|go.microsoft.com|HTTP|Windows Defender +|iriscoremetadataprod.blob.core.windows.net|HTTPS|Windows Telemetry +|login.live.com|HTTPS|Device Authentication +|msagfx.live.com|HTTP|OneDrive +|ocsp.digicert.com*|HTTP|CRL and OCSP checks to the issuing certificate authorities +|officeclient.microsoft.com|HTTPS|Microsoft Office +|oneclient.sfx.ms*|HTTPS|Used by OneDrive for Business to download and verify app updates +|onecollector.cloudapp.aria.akadns.net|HTTPS|Microsoft Office +|ow1.res.office365.com|HTTP|Microsoft Office +|pti.store.microsoft.com|HTTPS|Microsoft Store +|purchase.mp.microsoft.com*|HTTPS|Used to communicate with Microsoft Store +|query.prod.cms.rt.microsoft.com*|HTTPS|Used to retrieve Windows Spotlight metadata +|ris.api.iris.microsoft.com*|TLSv1.2/HTTPS|Used to retrieve Windows Spotlight metadata +|ris-prod-atm.trafficmanager.net|HTTPS|Azure traffic manager +|s-0001.s-msedge.net|HTTPS|Microsoft Office +|self.events.data.microsoft.com|HTTPS|Microsoft Office +|settings.data.microsoft.com*|HTTPS|Used for Windows apps to dynamically update their configuration +|settings-win.data.microsoft.com*|HTTPS|Used for Windows apps to dynamically update their configuration +|share.microsoft.com|HTTPS|Microsoft Store +|skypeecs-prod-usw-0.cloudapp.net|HTTPS|Microsoft Store +|sls.update.microsoft.com*|TLSv1.2/HTTPS|Enables connections to Windows Update +|slscr.update.microsoft.com*|HTTPS|Enables connections to Windows Update +|store*.dsx.mp.microsoft.com*|HTTPS|Used to communicate with Microsoft Store +|storecatalogrevocation.storequality.microsoft.com|HTTPS|Microsoft Store +|storecatalogrevocation.storequality.microsoft.com*|HTTPS|Used to revoke licenses for malicious apps on the Microsoft Store +|store-images.*microsoft.com*|HTTP|Used to get images that are used for Microsoft Store suggestions +|storesdk.dsx.mp.microsoft.com|HTTP|Microsoft Store +|tile-service.weather.microsoft.com*|HTTP|Used to download updates to the Weather app Live Tile +|time.windows.com|HTTP|Microsoft Windows Time related +|tsfe.trafficshaping.dsp.mp.microsoft.com*|TLSv1.2/HTTPS|Used for content regulation +|v10.events.data.microsoft.com|HTTPS|Diagnostic Data +|watson.telemetry.microsoft.com|HTTPS|Diagnostic Data +|wdcp.microsoft.*|TLSv1.2, HTTPS|Used for Windows Defender when Cloud-based Protection is enabled +|wd-prod-cp-us-west-1-fe.westus.cloudapp.azure.com|HTTPS|Windows Defender +|wusofficehome.msocdn.com|HTTPS|Microsoft Office +|www.bing.com*|HTTP|Used for updates for Cortana, apps, and Live Tiles +|www.msftconnecttest.com|HTTP|Network Connection (NCSI) +|www.office.com|HTTPS|Microsoft Office + ## Windows 10 Pro From ec9c3676fce744d81cd501ddacd0bb7d334b2fe4 Mon Sep 17 00:00:00 2001 From: Mike Edgar <49731348+medgarmedgar@users.noreply.github.com> Date: Wed, 8 May 2019 19:04:42 -0700 Subject: [PATCH 426/724] Update windows-endpoints-1903-non-enterprise-editions.md --- .../privacy/windows-endpoints-1903-non-enterprise-editions.md | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/windows/privacy/windows-endpoints-1903-non-enterprise-editions.md b/windows/privacy/windows-endpoints-1903-non-enterprise-editions.md index d17a7a9d77..2d162078d9 100644 --- a/windows/privacy/windows-endpoints-1903-non-enterprise-editions.md +++ b/windows/privacy/windows-endpoints-1903-non-enterprise-editions.md @@ -56,7 +56,7 @@ We used the following methodology to derive these network endpoints: |*emdl.ws.microsoft.com*|HTTP|Windows Update |*geo-prod.do.dsp.mp.microsoft.com*|TLSv1.2/HTTPS|Enables connections to Windows Update |*hwcdn.net*|HTTP|Highwinds Content Delivery Network / Windows updates -|*img-prod-cms-rt-microsoft-com.*|HTTPS|Microsoft Store or Inbox MSN Apps image download +|*img-prod-cms-rt-microsoft-com*|HTTPS|Microsoft Store or Inbox MSN Apps image download |*licensing.*mp.microsoft.com*|HTTPS|Licensing |*maps.windows.com*|HTTPS|Related to Maps application |*msedge.net*|HTTPS|Used by Microsoft OfficeHub to get the metadata of Microsoft Office apps From 294d08f16e964c2721de6689a6f59fee058d40cf Mon Sep 17 00:00:00 2001 From: Mike Edgar <49731348+medgarmedgar@users.noreply.github.com> Date: Wed, 8 May 2019 19:19:17 -0700 Subject: [PATCH 427/724] Update windows-endpoints-1903-non-enterprise-editions.md --- ...-endpoints-1903-non-enterprise-editions.md | 91 ++++++++++++++----- 1 file changed, 70 insertions(+), 21 deletions(-) diff --git a/windows/privacy/windows-endpoints-1903-non-enterprise-editions.md b/windows/privacy/windows-endpoints-1903-non-enterprise-editions.md index 2d162078d9..25dd51cf33 100644 --- a/windows/privacy/windows-endpoints-1903-non-enterprise-editions.md +++ b/windows/privacy/windows-endpoints-1903-non-enterprise-editions.md @@ -123,27 +123,76 @@ We used the following methodology to derive these network endpoints: | **Destination** | **Protocol** | **Description** | | --- | --- | --- | -| *.e-msedge.net | HTTPS | Used by OfficeHub to get the metadata of Office apps. | -| *.g.akamaiedge.net | HTTPS | Used to check for updates to maps that have been downloaded for offline use. | -| *.s-msedge.net | HTTPS | Used by OfficeHub to get the metadata of Office apps. | -| *.tlu.dl.delivery.mp.microsoft.com/* | HTTP | Enables connections to Windows Update. | -| *geo-prod.dodsp.mp.microsoft.com.nsatc.net | HTTPS | Enables connections to Windows Update. | -| arc.msn.com.nsatc.net | HTTPS | Used to retrieve Windows Spotlight metadata. | -| au.download.windowsupdate.com/* | HTTP | Enables connections to Windows Update. | -| ctldl.windowsupdate.com/msdownload/update/* | HTTP | Used to download certificates that are publicly known to be fraudulent. | -| cy2.licensing.md.mp.microsoft.com.akadns.net | HTTPS | Used to communicate with Microsoft Store. | -| cy2.settings.data.microsoft.com.akadns.net | HTTPS | Used to communicate with Microsoft Store. | -| dm3p.wns.notify.windows.com.akadns.net | HTTPS | Used for the Windows Push Notification Services (WNS) | -| fe3.delivery.dsp.mp.microsoft.com.nsatc.net | HTTPS | Enables connections to Windows Update, Microsoft Update, and the online services of Microsoft Store. | -| g.msn.com.nsatc.net | HTTPS | Used to retrieve Windows Spotlight metadata. | -| ipv4.login.msa.akadns6.net | HTTPS | Used for Microsoft accounts to sign in. | -| location-inference-westus.cloudapp.net | HTTPS | Used for location data. | -| modern.watson.data.microsoft.com.akadns.net | HTTPS | Used by Windows Error Reporting. | -| ocsp.digicert.com\* | HTTP | CRL and OCSP checks to the issuing certificate authorities. | -| ris.api.iris.microsoft.com.akadns.net | HTTPS | Used to retrieve Windows Spotlight metadata. | -| tile-service.weather.microsoft.com/* | HTTP | Used to download updates to the Weather app Live Tile. | -| tsfe.trafficshaping.dsp.mp.microsoft.com | HTTPS | Used for content regulation. | -| vip5.afdorigin-prod-am02.afdogw.com | HTTPS | Used to serve office 365 experimentation traffic | +|\*.cloudapp.azure.com|HTTPS|Azure +|\*.delivery.dsp.mp.microsoft.com.nsatc.net|HTTPS|Windows Update, Microsoft Update, and Microsoft Store services +|\*.displaycatalog.md.mp.microsoft.com.akadns.net|HTTPS|Microsoft Store +|\*.dl.delivery.mp.microsoft.com*|HTTP|Enables connections to Windows Update +|\*.e-msedge.net|HTTPS|Used by OfficeHub to get the metadata of Office apps +|\*.g.akamaiedge.net|HTTPS|Used to check for updates to maps that have been downloaded for offline use +|\*.s-msedge.net|HTTPS|Used by OfficeHub to get the metadata of Office apps +|\*.windowsupdate.com*|HTTP|Enables connections to Windows Update +|\*.wns.notify.windows.com.akadns.net|HTTPS|Used for the Windows Push Notification Services (WNS) +|\*dsp.mp.microsoft.com.nsatc.net|HTTPS|Enables connections to Windows Update +|\*c-msedge.net|HTTP|Office +|a1158.g.akamai.net|HTTP|Maps application +|arc.msn.com*|HTTP / HTTPS|Used to retrieve Windows Spotlight metadata +|blob.mwh01prdstr06a.store.core.windows.net|HTTPS|Microsoft Store +|browser.pipe.aria.microsoft.com|HTTPS|Microsoft Office +|bubblewitch3mobile.king.com|HTTPS|Bubble Witch application +|candycrush.king.com|HTTPS|Candy Crush application +|cdn.onenote.net|HTTP|Microsoft OneNote +|cds.p9u4n2q3.hwcdn.net|HTTP|Highwinds Content Delivery Network traffic for Windows updates +|client.wns.windows.com|HTTPS|Winddows Notification System +|co4.telecommand.telemetry.microsoft.com.akadns.net|HTTPS|Windows Error Reporting +|config.edge.skype.com|HTTPS|Microsoft Skype +|cs11.wpc.v0cdn.net|HTTP|Windows Telemetry +|cs9.wac.phicdn.net|HTTP|Windows Update +|cy2.licensing.md.mp.microsoft.com.akadns.net|HTTPS|Used to communicate with Microsoft Store +|cy2.purchase.md.mp.microsoft.com.akadns.net|HTTPS|Used to communicate with Microsoft Store +|cy2.settings.data.microsoft.com.akadns.net|HTTPS|Used to communicate with Microsoft Store +|dmd.metaservices.microsoft.com.akadns.net|HTTP|Device Authentication +|e-0009.e-msedge.net|HTTPS|Microsoft Office +|e10198.b.akamaiedge.net|HTTPS|Maps application +|fe3.update.microsoft.com|HTTPS|Windows Update +|g.live.com|HTTPS|Microsoft OneDrive +|g.msn.com.nsatc.net|HTTPS|Used to retrieve Windows Spotlight metadata +|geo-prod.do.dsp.mp.microsoft.com|HTTPS|Windows Update +|go.microsoft.com|HTTP|Windows Defender +|iecvlist.microsoft.com|HTTPS|Microsoft Edge +|img-prod-cms-rt-microsoft-com.akamaized.net|HTTP / HTTPS|Microsoft Store +|ipv4.login.msa.akadns6.net|HTTPS|Used for Microsoft accounts to sign in +|licensing.mp.microsoft.com|HTTP|Licensing +|location-inference-westus.cloudapp.net|HTTPS|Used for location data +|login.live.com|HTTP|Device Authentication +|maps.windows.com|HTTP|Maps application +|modern.watson.data.microsoft.com.akadns.net|HTTPS|Used by Windows Error Reporting +|msagfx.live.com|HTTP|OneDrive +|nav.smartscreen.microsoft.com|HTTPS|Windows Defender +|ocsp.digicert.com*|HTTP|CRL and OCSP checks to the issuing certificate authorities +|oneclient.sfx.ms|HTTP|OneDrive +|pti.store.microsoft.com|HTTPS|Microsoft Store +|ris.api.iris.microsoft.com.akadns.net|HTTPS|Used to retrieve Windows Spotlight metadata +|ris-prod-atm.trafficmanager.net|HTTPS|Azure +|s2s.config.skype.com|HTTP|Microsoft Skype +|settings-win.data.microsoft.com|HTTPS|Application settings +|share.microsoft.com|HTTPS|Microsoft Store +|skypeecs-prod-usw-0.cloudapp.net|HTTPS|Microsoft Skype +|slscr.update.microsoft.com|HTTPS|Windows Update +|storecatalogrevocation.storequality.microsoft.com|HTTPS|Microsoft Store +|store-images.microsoft.com|HTTPS|Microsoft Store +|tile-service.weather.microsoft.com/*|HTTP|Used to download updates to the Weather app Live Tile +|time.windows.com|HTTP|Windows time +|tsfe.trafficshaping.dsp.mp.microsoft.com|HTTPS|Used for content regulation +|v10.events.data.microsoft.com*|HTTPS|Microsoft Office +|vip5.afdorigin-prod-am02.afdogw.com|HTTPS|Used to serve office 365 experimentation traffic +|watson.telemetry.microsoft.com|HTTPS|Telemetry +|wdcp.microsoft.com|HTTPS|Windows Defender +|wusofficehome.msocdn.com|HTTPS|Microsoft Office +|www.bing.com|HTTPS|Cortana and Search +|www.microsoft.com|HTTP|Diagnostic +|www.msftconnecttest.com|HTTP|Network connection +|www.office.com|HTTPS|Microsoft Office + ## Windows 10 Education From 2d64996a22c8185a3d1b3325628fb04622f37aec Mon Sep 17 00:00:00 2001 From: Mike Edgar <49731348+medgarmedgar@users.noreply.github.com> Date: Wed, 8 May 2019 19:31:51 -0700 Subject: [PATCH 428/724] Update windows-endpoints-1903-non-enterprise-editions.md --- ...-endpoints-1903-non-enterprise-editions.md | 109 +++++++++++------- 1 file changed, 70 insertions(+), 39 deletions(-) diff --git a/windows/privacy/windows-endpoints-1903-non-enterprise-editions.md b/windows/privacy/windows-endpoints-1903-non-enterprise-editions.md index 25dd51cf33..44fadd939e 100644 --- a/windows/privacy/windows-endpoints-1903-non-enterprise-editions.md +++ b/windows/privacy/windows-endpoints-1903-non-enterprise-editions.md @@ -199,42 +199,73 @@ We used the following methodology to derive these network endpoints: | **Destination** | **Protocol** | **Description** | | --- | --- | --- | -| *.b.akamaiedge.net | HTTPS | Used to check for updates to maps that have been downloaded for offline use. | -| *.e-msedge.net | HTTPS | Used by OfficeHub to get the metadata of Office apps. | -| *.g.akamaiedge.net | HTTPS | Used to check for updates to maps that have been downloaded for offline use. | -| *.s-msedge.net | HTTPS | Used by OfficeHub to get the metadata of Office apps. | -| *.telecommand.telemetry.microsoft.com.akadns.net | HTTPS | Used by Windows Error Reporting. | -| *.tlu.dl.delivery.mp.microsoft.com\* | HTTP | Enables connections to Windows Update. | -| *.windowsupdate.com\* | HTTP | Enables connections to Windows Update. | -| *geo-prod.do.dsp.mp.microsoft.com | HTTPS | Enables connections to Windows Update. | -| au.download.windowsupdate.com\* | HTTP | Enables connections to Windows Update. | -| cdn.onenote.net/livetile/* | HTTPS | Used for OneNote Live Tile. | -| client-office365-tas.msedge.net/* | HTTPS | Used to connect to the Office 365 portal’s shared infrastructure, including Office Online. | -| config.edge.skype.com/* | HTTPS | Used to retrieve Skype configuration values.  | -| ctldl.windowsupdate.com/* | HTTP | Used to download certificates that are publicly known to be fraudulent. | -| cy2.displaycatalog.md.mp.microsoft.com.akadns.net | HTTPS | Used to communicate with Microsoft Store. | -| cy2.licensing.md.mp.microsoft.com.akadns.net | HTTPS | Used to communicate with Microsoft Store. | -| cy2.settings.data.microsoft.com.akadns.net | HTTPS | Used to communicate with Microsoft Store. | -| displaycatalog.mp.microsoft.com/* | HTTPS | Used to communicate with Microsoft Store. | -| download.windowsupdate.com/* | HTTPS | Enables connections to Windows Update. | -| emdl.ws.microsoft.com/* | HTTP | Used to download apps from the Microsoft Store. | -| fe2.update.microsoft.com/* | HTTPS | Enables connections to Windows Update, Microsoft Update, and the online services of Microsoft Store. | -| fe3.delivery.dsp.mp.microsoft.com.nsatc.net | HTTPS | Enables connections to Windows Update, Microsoft Update, and the online services of Microsoft Store. | -| fe3.delivery.mp.microsoft.com/* | HTTPS | Enables connections to Windows Update, Microsoft Update, and the online services of Microsoft Store. | -| g.live.com/odclientsettings/* | HTTPS | Used by OneDrive for Business to download and verify app updates. | -| g.msn.com.nsatc.net | HTTPS | Used to retrieve Windows Spotlight metadata. | -| ipv4.login.msa.akadns6.net | HTTPS | Used for Microsoft accounts to sign in. | -| licensing.mp.microsoft.com/* | HTTPS | Used for online activation and some app licensing. | -| maps.windows.com/windows-app-web-link | HTTPS | Link to Maps application | -| modern.watson.data.microsoft.com.akadns.net | HTTPS | Used by Windows Error Reporting. | -| ocos-office365-s2s.msedge.net/* | HTTPS | Used to connect to the Office 365 portal's shared infrastructure. | -| ocsp.digicert.com\* | HTTP | CRL and OCSP checks to the issuing certificate authorities. | -| oneclient.sfx.ms/* | HTTPS | Used by OneDrive for Business to download and verify app updates. | -| settings-win.data.microsoft.com/settings/* | HTTPS | Used as a way for apps to dynamically update their configuration. | -| sls.update.microsoft.com/* | HTTPS | Enables connections to Windows Update. | -| storecatalogrevocation.storequality.microsoft.com/* | HTTPS | Used to revoke licenses for malicious apps on the Microsoft Store. | -| tile-service.weather.microsoft.com/* | HTTP | Used to download updates to the Weather app Live Tile. | -| tsfe.trafficshaping.dsp.mp.microsoft.com | HTTPS | Used for content regulation. | -| vip5.afdorigin-prod-ch02.afdogw.com | HTTPS | Used to serve office 365 experimentation traffic. | -| watson.telemetry.microsoft.com/Telemetry.Request | HTTPS | Used by Windows Error Reporting. | -| bing.com/* | HTTPS | Used for updates for Cortana, apps, and Live Tiles. | +|\*.b.akamaiedge.net|HTTPS|Used to check for updates to maps that have been downloaded for offline use +|\*.c-msedge.net|HTTP|Used by OfficeHub to get the metadata of Office apps +|\*.dl.delivery.mp.microsoft.com*|HTTP|Windows Update +|\*.e-msedge.net|HTTPS|Used by OfficeHub to get the metadata of Office apps +|\*.g.akamaiedge.net|HTTPS|Used to check for updates to Maps that have been downloaded for offline use +|\*.licensing.md.mp.microsoft.com.akadns.net|HTTPS|Microsoft Store +|\*.settings.data.microsoft.com.akadns.net|HTTPS|Microsoft Store +|\*.skype.com*|HTTPS|Used to retrieve Skype configuration values +|\*.smartscreen*.microsoft.com|HTTPS|Windows Defender +|\*.s-msedge.net|HTTPS|Used by OfficeHub to get the metadata of Office apps +|\*.telecommand.telemetry.microsoft.com*|HTTPS|Used by Windows Error Reporting +|\*.wac.phicdn.net|HTTP|Windows Update +|\*.windowsupdate.com*|HTTP|Windows Update +|\*.wns.windows.com|HTTPS|Windows Notifications Service +|\*.wpc.*.net|HTTP|Diagnostic Data +|\*displaycatalog.md.mp.microsoft.com.akadns.net|HTTPS|Microsoft Store +|\*dsp.mp.microsoft.com|HTTPS|Windows Update +|a1158.g.akamai.net|HTTP|Maps +|a122.dscg3.akamai.net|HTTP|Maps +|a767.dscg3.akamai.net|HTTP|Maps +|au.download.windowsupdate.com*|HTTP|Windows Update +|bing.com/*|HTTPS|Used for updates for Cortana, apps, and Live Tiles +|blob.dz5prdstr01a.store.core.windows.net|HTTPS|Microsoft Store +|browser.pipe.aria.microsoft.com|HTTP|Used by OfficeHub to get the metadata of Office apps +|cdn.onenote.net/livetile/*|HTTPS|Used for OneNote Live Tile +|cds.p9u4n2q3.hwcdn.net|HTTP|Used by the Highwinds Content Delivery Network to perform Windows updates +|client-office365-tas.msedge.net/*|HTTPS|Office 365 porta and Office Online +|ctldl.windowsupdate.com*|HTTP|Used to download certificates that are publicly known to be fraudulent +|displaycatalog.mp.microsoft.com/*|HTTPS|Microsoft Store +|dmd.metaservices.microsoft.com*|HTTP|Device Authentication +|download.windowsupdate.com*|HTTPS|Windows Update +|emdl.ws.microsoft.com/*|HTTP|Used to download apps from the Microsoft Store +|evoke-windowsservices-tas.msedge.net|HTTPS|Photo app +|fe2.update.microsoft.com*|HTTPS|Windows Update, Microsoft Update, Microsoft Store services +|fe3.delivery.dsp.mp.microsoft.com.nsatc.net|HTTPS|Windows Update, Microsoft Update, Microsoft Store services +|fe3.delivery.mp.microsoft.com*|HTTPS|Windows Update, Microsoft Update, Microsoft Store services +|g.live.com*|HTTPS|Used by OneDrive for Business to download and verify app updates +|g.msn.com.nsatc.net|HTTPS|Used to retrieve Windows Spotlight metadata +|go.microsoft.com|HTTP|Windows Defender +|iecvlist.microsoft.com|HTTPS|Microsoft Edge browser +|ipv4.login.msa.akadns6.net|HTTPS|Used for Microsoft accounts to sign in +|licensing.mp.microsoft.com*|HTTPS|Used for online activation and some app licensing +|login.live.com|HTTPS|Device Authentication +|maps.windows.com/windows-app-web-link|HTTPS|Maps application +|modern.watson.data.microsoft.com.akadns.net|HTTPS|Used by Windows Error Reporting +|msagfx.live.com|HTTPS|OneDrive +|ocos-office365-s2s.msedge.net/*|HTTPS|Used to connect to the Office 365 portal's shared infrastructure +|ocsp.digicert.com*|HTTP|CRL and OCSP checks to the issuing certificate authorities +|oneclient.sfx.ms/*|HTTPS|Used by OneDrive for Business to download and verify app updates +|onecollector.cloudapp.aria.akadns.net|HTTPS|Microsoft Office +|pti.store.microsoft.com|HTTPS|Microsoft Store +|settings-win.data.microsoft.com/settings/*|HTTPS|Used as a way for apps to dynamically update their configuration +|share.microsoft.com|HTTPS|Microsoft Store +|skypeecs-prod-usw-0.cloudapp.net|HTTPS|Skype +|sls.update.microsoft.com*|HTTPS|Windows Update +|storecatalogrevocation.storequality.microsoft.com*|HTTPS|Used to revoke licenses for malicious apps on the Microsoft Store +|tile-service.weather.microsoft.com*|HTTP|Used to download updates to the Weather app Live Tile +|tsfe.trafficshaping.dsp.mp.microsoft.com|HTTPS|Windows Update +|v10.events.data.microsoft.com*|HTTPS|Diagnostic Data +|vip5.afdorigin-prod-ch02.afdogw.com|HTTPS|Used to serve Office 365 experimentation traffic +|watson.telemetry.microsoft.com*|HTTPS|Used by Windows Error Reporting +|wdcp.microsoft.com|HTTPS|Windows Defender +|wd-prod-cp-us-east-1-fe.eastus.cloudapp.azure.com|HTTPS|Azure +|wusofficehome.msocdn.com|HTTPS|Microsoft Office +|www.bing.com|HTTPS|Cortana and Search +|www.microsoft.com|HTTP|Diagnostic Data +|www.microsoft.com/pkiops/certs/*|HTTP|CRL and OCSP checks to the issuing certificate authorities +|www.msftconnecttest.com|HTTP|Network Connection +|www.office.com|HTTPS|Microsoft Office + From 16577f4056c0a629a2a3a503476030de93bed559 Mon Sep 17 00:00:00 2001 From: Malin De Silva Date: Thu, 9 May 2019 08:26:19 +0530 Subject: [PATCH 429/724] added not supportive line for pro editions --- .../windows-defender-application-guard/reqs-wd-app-guard.md | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/windows/security/threat-protection/windows-defender-application-guard/reqs-wd-app-guard.md b/windows/security/threat-protection/windows-defender-application-guard/reqs-wd-app-guard.md index 1cb8fce44c..741592efe2 100644 --- a/windows/security/threat-protection/windows-defender-application-guard/reqs-wd-app-guard.md +++ b/windows/security/threat-protection/windows-defender-application-guard/reqs-wd-app-guard.md @@ -36,6 +36,6 @@ Your environment needs the following software to run Windows Defender Applicatio |Software|Description| |--------|-----------| -|Operating system|Windows 10 Enterprise edition, version 1709 or higher
Windows 10 Professional edition, version 1803 or higher
Windows 10 Professional for Workstations edition, version 1803 or higher
Windows 10 Professional Education edition version 1803 or higher
Windows 10 Education edition, version 1903 or higher| +|Operating system|Windows 10 Enterprise edition, version 1709 or higher
Windows 10 Professional edition, version 1803 or higher
Windows 10 Professional for Workstations edition, version 1803 or higher
Windows 10 Professional Education edition version 1803 or higher
Windows 10 Education edition, version 1903 or higher
Professional editions are only supportive for the non-managed devices; Intune or any other 3rd party mobile device management(MDM) solutions are not supportive with WDAG for Professional editions. | |Browser|Microsoft Edge and Internet Explorer| |Management system
(only for managed devices)|[Microsoft Intune](https://docs.microsoft.com/intune/)

**-OR-**

[System Center Configuration Manager](https://docs.microsoft.com/sccm/)

**-OR-**

[Group Policy](https://technet.microsoft.com/library/cc753298(v=ws.11).aspx)

**-OR-**

Your current company-wide 3rd party mobile device management (MDM) solution. For info about 3rd party MDM solutions, see the documentation that came with your product.| From 816a1c8e5f6eec2f02e5ba213a5e039f24508c76 Mon Sep 17 00:00:00 2001 From: KC Cross Date: Wed, 8 May 2019 20:58:21 -0700 Subject: [PATCH 430/724] Trailing slash required for docset --- acrolinx-config.edn | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/acrolinx-config.edn b/acrolinx-config.edn index 7f639efb92..b235e443b5 100644 --- a/acrolinx-config.edn +++ b/acrolinx-config.edn @@ -1,3 +1,3 @@ {:allowed-branchname-matches ["master"] - :allowed-filename-matches ["windows"] + :allowed-filename-matches ["windows/"] } From 3e80f2b5777a6ba91c4f8701338bdb1045212e83 Mon Sep 17 00:00:00 2001 From: botmoto <42125490+botmoto@users.noreply.github.com> Date: Thu, 9 May 2019 04:57:14 -0700 Subject: [PATCH 431/724] Update credential-guard-manage.md Cosmetic formatting --- .../credential-guard/credential-guard-manage.md | 3 +-- 1 file changed, 1 insertion(+), 2 deletions(-) diff --git a/windows/security/identity-protection/credential-guard/credential-guard-manage.md b/windows/security/identity-protection/credential-guard/credential-guard-manage.md index e02b561b04..59b6865e4e 100644 --- a/windows/security/identity-protection/credential-guard/credential-guard-manage.md +++ b/windows/security/identity-protection/credential-guard/credential-guard-manage.md @@ -128,8 +128,7 @@ DG_Readiness_Tool_v3.5.ps1 -Ready ``` > [!NOTE] - -For client machines that are running Windows 10 1703, LsaIso.exe is running whenever virtualization-based security is enabled for other features. +> For client machines that are running Windows 10 1703, LsaIso.exe is running whenever virtualization-based security is enabled for other features. - We recommend enabling Windows Defender Credential Guard before a device is joined to a domain. If Windows Defender Credential Guard is enabled after domain join, the user and device secrets may already be compromised. In other words, enabling Credential Guard will not help to secure a device or identity that has already been compromised, which is why we recommend turning on Credential Guard as early as possible. From 8debfd65035ef44784a7beaeaf47914fa82b7a5e Mon Sep 17 00:00:00 2001 From: ImranHabib <47118050+joinimran@users.noreply.github.com> Date: Thu, 9 May 2019 17:06:58 +0500 Subject: [PATCH 432/724] Sentence was confusing The sentence was confusing so I made a correction where now it makes more sense that when MDM policy is configured, it will win over GP. Problem: https://github.com/MicrosoftDocs/windows-itpro-docs/issues/3379 --- .../client-management/mdm/policy-csp-controlpolicyconflict.md | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/windows/client-management/mdm/policy-csp-controlpolicyconflict.md b/windows/client-management/mdm/policy-csp-controlpolicyconflict.md index f6626284ef..c51f4ad30a 100644 --- a/windows/client-management/mdm/policy-csp-controlpolicyconflict.md +++ b/windows/client-management/mdm/policy-csp-controlpolicyconflict.md @@ -67,7 +67,7 @@ Added in Windows 10, version 1803. This policy allows the IT admin to control wh > [!Note] > MDMWinsOverGP only applies to policies in Policy CSP. It does not apply to other MDM settings with equivalent GP settings that are defined on other configuration service providers. -This policy is used to ensure that MDM policy wins over GP when same setting is set by both GP and MDM channel. The default value is 0. The MDM policies in Policy CSP will behave as described if this policy value is set 1. +This policy is used to ensure that MDM policy wins over GP when policy is configured on MDM channel. The default value is 0. The MDM policies in Policy CSP will behave as described if this policy value is set 1. Note: This policy doesn’t support the Delete command and doesn’t support setting the value to 0 again after it was previously set to 1. Windows 10 version 1809 will support using the Delete command to set the value to 0 again, if it was previously set to 1. The following list shows the supported values: From 1da22a72a5fc239e82570c666f4dbcfbd48ceaa2 Mon Sep 17 00:00:00 2001 From: Justin Hall Date: Thu, 9 May 2019 05:23:38 -0700 Subject: [PATCH 433/724] Update reqs-wd-app-guard.md --- .../windows-defender-application-guard/reqs-wd-app-guard.md | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/windows/security/threat-protection/windows-defender-application-guard/reqs-wd-app-guard.md b/windows/security/threat-protection/windows-defender-application-guard/reqs-wd-app-guard.md index 741592efe2..25b4ede41d 100644 --- a/windows/security/threat-protection/windows-defender-application-guard/reqs-wd-app-guard.md +++ b/windows/security/threat-protection/windows-defender-application-guard/reqs-wd-app-guard.md @@ -36,6 +36,6 @@ Your environment needs the following software to run Windows Defender Applicatio |Software|Description| |--------|-----------| -|Operating system|Windows 10 Enterprise edition, version 1709 or higher
Windows 10 Professional edition, version 1803 or higher
Windows 10 Professional for Workstations edition, version 1803 or higher
Windows 10 Professional Education edition version 1803 or higher
Windows 10 Education edition, version 1903 or higher
Professional editions are only supportive for the non-managed devices; Intune or any other 3rd party mobile device management(MDM) solutions are not supportive with WDAG for Professional editions. | +|Operating system|Windows 10 Enterprise edition, version 1709 or higher
Windows 10 Professional edition, version 1803 or higher
Windows 10 Professional for Workstations edition, version 1803 or higher
Windows 10 Professional Education edition version 1803 or higher
Windows 10 Education edition, version 1903 or higher
Professional editions are only supported for non-managed devices; Intune or any other 3rd party mobile device management (MDM) solutions are not supported with WDAG for Professional editions. | |Browser|Microsoft Edge and Internet Explorer| |Management system
(only for managed devices)|[Microsoft Intune](https://docs.microsoft.com/intune/)

**-OR-**

[System Center Configuration Manager](https://docs.microsoft.com/sccm/)

**-OR-**

[Group Policy](https://technet.microsoft.com/library/cc753298(v=ws.11).aspx)

**-OR-**

Your current company-wide 3rd party mobile device management (MDM) solution. For info about 3rd party MDM solutions, see the documentation that came with your product.| From c1f385942dab5d5cdad178621bc6a91da1920d02 Mon Sep 17 00:00:00 2001 From: ImranHabib <47118050+joinimran@users.noreply.github.com> Date: Thu, 9 May 2019 17:28:50 +0500 Subject: [PATCH 434/724] Removed random alpha-neumaric value As the user suggested, removed the random value and inserted the guideline to let the user know what to insert here. Problem: https://github.com/MicrosoftDocs/windows-itpro-docs/issues/1239 --- .../mdm/federated-authentication-device-enrollment.md | 4 ++-- 1 file changed, 2 insertions(+), 2 deletions(-) diff --git a/windows/client-management/mdm/federated-authentication-device-enrollment.md b/windows/client-management/mdm/federated-authentication-device-enrollment.md index 22ee108fb4..6a8c928ee7 100644 --- a/windows/client-management/mdm/federated-authentication-device-enrollment.md +++ b/windows/client-management/mdm/federated-authentication-device-enrollment.md @@ -553,7 +553,7 @@ The following code shows sample provisioning XML (presented in the preceding pac - + @@ -562,7 +562,7 @@ The following code shows sample provisioning XML (presented in the preceding pac - + From 99f5ae268f16739cf7a0a224eab6860068a1b893 Mon Sep 17 00:00:00 2001 From: martyav Date: Thu, 9 May 2019 09:25:20 -0400 Subject: [PATCH 435/724] refining text, linting, CL commands in resources --- ...osoft-defender-atp-mac-install-manually.md | 40 +--- ...ft-defender-atp-mac-install-with-intune.md | 16 +- ...soft-defender-atp-mac-install-with-jamf.md | 197 ++++++++++++------ .../microsoft-defender-atp-mac-resources.md | 32 ++- .../microsoft-defender-atp-mac.md | 6 +- 5 files changed, 177 insertions(+), 114 deletions(-) diff --git a/windows/security/threat-protection/windows-defender-antivirus/microsoft-defender-atp-mac-install-manually.md b/windows/security/threat-protection/windows-defender-antivirus/microsoft-defender-atp-mac-install-manually.md index 27b3a8f924..eecb31f9e4 100644 --- a/windows/security/threat-protection/windows-defender-antivirus/microsoft-defender-atp-mac-install-manually.md +++ b/windows/security/threat-protection/windows-defender-antivirus/microsoft-defender-atp-mac-install-manually.md @@ -1,27 +1,27 @@ --- -title: Installing Microsoft Defender ATP for Mac with JAMF -description: Describes how to install Microsoft Defender ATP for Mac, using JAMF. +title: Installing Microsoft Defender ATP for Mac manually +description: Describes how to install Microsoft Defender ATP for Mac manually, from the command line. keywords: microsoft, defender, atp, mac, installation, deploy, uninstallation, intune, jamf, macos, mojave, high sierra, sierra search.product: eADQiWindows 10XVcnh -search.appverid: #met150 +search.appverid: met150 ms.prod: w10 ms.mktglfcycl: deploy ms.sitesec: library ms.pagetype: security ms.author: v-maave author: martyav -ms.localizationpriority: #medium +ms.localizationpriority: medium manager: dansimp audience: ITPro ms.collection: M365-security-compliance -ms.topic: #conceptual +ms.topic: conceptual --- # Manual deployment **Applies to:** -[Windows Defender Advanced Threat Protection (Windows Defender ATP) for Mac](https://go.microsoft.com/fwlink/p/?linkid=???To-Add???) +[Windows Defender Advanced Threat Protection (Windows Defender ATP) for Mac](microsoft-defender-atp.md) >[!IMPORTANT] >Some information relates to prereleased product which may be substantially modified before it's commercially released. Microsoft makes no warranties, express or implied, with respect to the information provided here. @@ -31,7 +31,7 @@ Microsoft Defender ATP for Mac is not yet widely available, and this topic only ## Prerequisites and system requirements -Before you get started, please see [the main Microsoft Defender ATP for Mac page]((microsoft-defender-atp.md)) for a description of prerequisites and system requirements for the current software version. +Before you get started, please see [the main Microsoft Defender ATP for Mac page](microsoft-defender-atp.md) for a description of prerequisites and system requirements for the current software version. ## Download installation and onboarding packages @@ -114,32 +114,10 @@ After installation, you'll see the Microsoft Defender icon in the macOS status b ![Microsoft Defender icon in status bar screenshot](images/MDATP_Icon_Bar.png) -## Configuring from the command line - -Important tasks, such as controlling product settings and triggering on-demand scans, can be done from the command line: - -|Group |Scenario |Command | -|-------------|-------------------------------------------|-----------------------------------------------------------------------| -|Configuration|Turn on/off real-time protection |`mdatp config --rtp [true/false]` | -|Configuration|Turn on/off cloud protection |`mdatp config --cloud [true/false]` | -|Configuration|Turn on/off product diagnostics |`mdatp config --diagnostic [true/false]` | -|Configuration|Turn on/off automatic sample submission |`mdatp config --sample-submission [true/false]` | -|Configuration|Turn on PUA protection |`mdatp threat --type-handling --potentially_unwanted_application block`| -|Configuration|Turn off PUA protection |`mdatp threat --type-handling --potentially_unwanted_application off` | -|Configuration|Turn on audit mode for PUA protection |`mdatp threat --type-handling --potentially_unwanted_application audit`| -|Diagnostics |Change the log level |`mdatp log-level --[error/warning/info/verbose]` | -|Diagnostics |Generate diagnostic logs |`mdatp --diagnostic` | -|Health |Check the product's health |`mdatp --health` | -|Protection |Scan a path |`mdatp scan --path [path]` | -|Protection |Do a quick scan |`mdatp scan --quick` | -|Protection |Do a full scan |`mdatp scan --full` | -|Protection |Cancel an ongoing on-demand scan |`mdatp scan --cancel` | -|Protection |Request a definition update |`mdatp --signature-update` | - ## Logging installation issues -See [Logging installation issues](microsoft-defender-atp-mac-resources#Logging-installation-issues) for more information on how to find the automatically generated log that is created by the installer when an error occurs. +See [Logging installation issues](microsoft-defender-atp-mac-resources.md#Logging-installation-issues) for more information on how to find the automatically generated log that is created by the installer when an error occurs. ## Uninstallation -See [Uninstalling](microsoft-defender-atp-mac-resources#Uninstalling) for details on how to remove Windows Defender ATP for Mac from client devices. \ No newline at end of file +See [Uninstalling](microsoft-defender-atp-mac-resources.md#Uninstalling) for details on how to remove Windows Defender ATP for Mac from client devices. \ No newline at end of file diff --git a/windows/security/threat-protection/windows-defender-antivirus/microsoft-defender-atp-mac-install-with-intune.md b/windows/security/threat-protection/windows-defender-antivirus/microsoft-defender-atp-mac-install-with-intune.md index 8af90fded1..bf6854e899 100644 --- a/windows/security/threat-protection/windows-defender-antivirus/microsoft-defender-atp-mac-install-with-intune.md +++ b/windows/security/threat-protection/windows-defender-antivirus/microsoft-defender-atp-mac-install-with-intune.md @@ -3,25 +3,25 @@ title: Installing Microsoft Defender ATP for Mac with Microsoft Intune description: Describes how to install Microsoft Defender ATP for Mac, using Microsoft Intune. keywords: microsoft, defender, atp, mac, installation, deploy, uninstallation, intune, jamf, macos, mojave, high sierra, sierra search.product: eADQiWindows 10XVcnh -search.appverid: #met150 +search.appverid: met150 ms.prod: w10 ms.mktglfcycl: deploy ms.sitesec: library ms.pagetype: security ms.author: v-maave author: martyav -ms.localizationpriority: #medium +ms.localizationpriority: medium manager: dansimp audience: ITPro ms.collection: M365-security-compliance -ms.topic: #conceptual +ms.topic: conceptual --- # Microsoft Intune-based deployment **Applies to:** -[Windows Defender Advanced Threat Protection (Windows Defender ATP) for Mac](https://go.microsoft.com/fwlink/p/?linkid=???To-Add???) +[Windows Defender Advanced Threat Protection (Windows Defender ATP) for Mac](microsoft-defender-atp.md) >[!IMPORTANT] >Some information relates to prereleased product which may be substantially modified before it's commercially released. Microsoft makes no warranties, express or implied, with respect to the information provided here. @@ -31,7 +31,7 @@ Microsoft Defender ATP for Mac is not yet widely available, and this topic only ## Prerequisites and system requirements -Before you get started, please see [the main Microsoft Defender ATP for Mac page]((microsoft-defender-atp.md)) for a description of prerequisites and system requirements for the current software version. +Before you get started, please see [the main Microsoft Defender ATP for Mac page](microsoft-defender-atp.md) for a description of prerequisites and system requirements for the current software version. ## Download installation and onboarding packages @@ -47,7 +47,7 @@ Download the installation and onboarding packages from Windows Defender Security 6. From a command prompt, verify that you have the three files. Extract the contents of the .zip files: - + ```bash mavel-macmini:Downloads test$ ls -l total 721688 @@ -166,8 +166,8 @@ After Intune changes are propagated to the enrolled machines, you'll see it on t ## Logging installation issues -See [Logging installation issues](microsoft-defender-atp-mac-resources#Logging-installation-issues) for more information on how to find the automatically generated log that is created by the installer when an error occurs. +See [Logging installation issues](microsoft-defender-atp-mac-resources.md#Logging-installation-issues) for more information on how to find the automatically generated log that is created by the installer when an error occurs. ## Uninstallation -See [Uninstalling](microsoft-defender-atp-mac-resources#Uninstalling) for details on how to remove Windows Defender ATP for Mac from client devices. \ No newline at end of file +See [Uninstalling](microsoft-defender-atp-mac-resources.md#Uninstalling) for details on how to remove Windows Defender ATP for Mac from client devices. \ No newline at end of file diff --git a/windows/security/threat-protection/windows-defender-antivirus/microsoft-defender-atp-mac-install-with-jamf.md b/windows/security/threat-protection/windows-defender-antivirus/microsoft-defender-atp-mac-install-with-jamf.md index 27b3a8f924..eead3818a7 100644 --- a/windows/security/threat-protection/windows-defender-antivirus/microsoft-defender-atp-mac-install-with-jamf.md +++ b/windows/security/threat-protection/windows-defender-antivirus/microsoft-defender-atp-mac-install-with-jamf.md @@ -3,25 +3,25 @@ title: Installing Microsoft Defender ATP for Mac with JAMF description: Describes how to install Microsoft Defender ATP for Mac, using JAMF. keywords: microsoft, defender, atp, mac, installation, deploy, uninstallation, intune, jamf, macos, mojave, high sierra, sierra search.product: eADQiWindows 10XVcnh -search.appverid: #met150 +search.appverid: met150 ms.prod: w10 ms.mktglfcycl: deploy ms.sitesec: library ms.pagetype: security ms.author: v-maave author: martyav -ms.localizationpriority: #medium +ms.localizationpriority: medium manager: dansimp audience: ITPro ms.collection: M365-security-compliance -ms.topic: #conceptual +ms.topic: conceptual --- -# Manual deployment +# JAMF-based deployment **Applies to:** -[Windows Defender Advanced Threat Protection (Windows Defender ATP) for Mac](https://go.microsoft.com/fwlink/p/?linkid=???To-Add???) +[Windows Defender Advanced Threat Protection (Windows Defender ATP) for Mac](microsoft-defender-atp.md) >[!IMPORTANT] >Some information relates to prereleased product which may be substantially modified before it's commercially released. Microsoft makes no warranties, express or implied, with respect to the information provided here. @@ -31,14 +31,16 @@ Microsoft Defender ATP for Mac is not yet widely available, and this topic only ## Prerequisites and system requirements -Before you get started, please see [the main Microsoft Defender ATP for Mac page]((microsoft-defender-atp.md)) for a description of prerequisites and system requirements for the current software version. +Before you get started, please see [the main Microsoft Defender ATP for Mac page](microsoft-defender-atp.md) for a description of prerequisites and system requirements for the current software version. + +In addition, for JAMF deployment, you need to be familiar with JAMF administration tasks, have a JAMF tenant, and know how to deploy packages. This includes having a properly configured distribution point. JAMF has many ways to complete the same task. These instructions provide an example for most common processes. Your organization might use a different workflow. ## Download installation and onboarding packages Download the installation and onboarding packages from Windows Defender Security Center: 1. In Windows Defender Security Center, go to **Settings > Machine Management > Onboarding**. -2. In Section 1 of the page, set operating system to **Linux, macOS, iOS or Android** and Deployment method to **Local script**. +2. In Section 1 of the page, set operating system to **Linux, macOS, iOS or Android** and Deployment method to **Mobile Device Management / Microsoft Intune**. 3. In Section 2 of the page, select **Download installation package**. Save it as wdav.pkg to a local directory. 4. In Section 2 of the page, select **Download onboarding package**. Save it as WindowsDefenderATPOnboardingPackage.zip to the same directory. @@ -46,100 +48,161 @@ Download the installation and onboarding packages from Windows Defender Security 5. From a command prompt, verify that you have the two files. Extract the contents of the .zip files: - + ```bash - mavel-macmini:Downloads test$ ls -l - total 721152 - -rw-r--r-- 1 test staff 6185 Mar 15 10:45 WindowsDefenderATPOnboardingPackage.zip + mavel-macmini:Downloads test$ ls -l + total 721160 + -rw-r--r-- 1 test staff 11821 Mar 15 09:23 WindowsDefenderATPOnboardingPackage.zip -rw-r--r-- 1 test staff 354531845 Mar 13 08:57 wdav.pkg mavel-macmini:Downloads test$ unzip WindowsDefenderATPOnboardingPackage.zip Archive: WindowsDefenderATPOnboardingPackage.zip - inflating: WindowsDefenderATPOnboarding.py + warning: WindowsDefenderATPOnboardingPackage.zip appears to use backslashes as path separators + inflating: intune/kext.xml + inflating: intune/WindowsDefenderATPOnboarding.xml + inflating: jamf/WindowsDefenderATPOnboarding.plist + mavel-macmini:Downloads test$ ``` -## Application installation +## Create JAMF Policies -To complete this process, you must have admin privileges on the machine. +You need to create a configuration profile and a policy to start deploying Microsoft Defender ATP for Mac to client machines. -1. Navigate to the downloaded wdav.pkg in Finder and open it. +### Configuration Profile - ![App install screenshot](images/MDATP_28_AppInstall.png) +The configuration profile contains one custom settings payload that includes: -2. Select **Continue**, agree with the License terms, and enter the password when prompted. +- Microsoft Defender ATP for Mac onboarding information +- Approved Kernel Extensions payload to enable the Microsoft kernel driver to run - ![App install screenshot](images/MDATP_29_AppInstallLogin.png) +1. Upload jamf/WindowsDefenderATPOnboarding.plist as the Property List File. - > [!IMPORTANT] - > You will be prompted to allow a driver from Microsoft to be installed (either "System Exception Blocked" or "Installation is on hold" or both. The driver must be allowed to be installed. + >[!NOTE] + > You must use exactly "com.microsoft.wdav.atp" as the Preference Domain. - ![App install screenshot](images/MDATP_30_SystemExtension.png) + ![Configuration profile screenshot](images/MDATP_16_PreferenceDomain.png) -3. Select **Open Security Preferences** or **Open System Preferences > Security & Privacy**. Select **Allow**: +### Approved Kernel Extension - ![Security and privacy window screenshot](images/MDATP_31_SecurityPrivacySettings.png) +To approve the kernel extension: -The installation will proceed. +1. In **Computers > Configuration Profiles** select **Options > Approved Kernel Extensions**. +2. Use **UBF8T346G9** for Team Id. + +![Approved kernel extensions screenshot](images/MDATP_17_approvedKernelExtensions.png) + +#### Configuration Profile's Scope + +Configure the appropriate scope to specify the machines that will receive this configuration profile. + +Open Computers -> Configuration Profiles, select **Scope > Targets**. Select the appropriate Target computers. + +![Configuration profile scope screenshot](images/MDATP_18_ConfigurationProfilesScope.png) + +Save the **Configuration Profile**. + +Use the **Logs** tab to monitor deployment status for each enrolled machine. + +### Package + +1. Create a package in **Settings > Computer Management > Packages**. + + ![Computer management packages screenshot](images/MDATP_19_MicrosoftDefenderWDAVPKG.png) + +2. Upload wdav.pkg to the Distribution Point. +3. In the **filename** field, enter the name of the package. For example, wdav.pkg. + +### Policy + +Your policy should contain a single package for Microsoft Defender. + +![Microsoft Defender packages screenshot](images/MDATP_20_MicrosoftDefenderPackages.png) + +Configure the appropriate scope to specify the computers that will receive this policy. + +After you save the Configuration Profile, you can use the Logs tab to monitor the deployment status for each enrolled machine. + +## Client machine setup + +You need no special provisioning for a macOS computer beyond the standard JAMF Enrollment. > [!NOTE] -> If you don't select **Allow**, the installation will fail after 5 minutes. You can restart it again at any time. +> After a computer is enrolled, it will show up in the Computers inventory (All Computers). -## Client configuration +1. Open the machine details, from **General** tab, and make sure that **User Approved MDM** is set to **Yes**. If it's set to No, the user needs to open **System Preferences > Profiles** and select **Approve** on the MDM Profile. -1. Copy wdav.pkg and WindowsDefenderATPOnboarding.py to the machine where you deploy Microsoft Defender ATP for Mac. +![MDM approve button screenshot](images/MDATP_21_MDMProfile1.png) +![MDM screenshot](images/MDATP_22_MDMProfileApproved.png) - The client machine is not associated with orgId. Note that the orgid is blank. +After some time, the machine's User Approved MDM status will change to Yes. - ```bash - mavel-mojave:wdavconfig testuser$ sudo /Library/Extensions/wdavkext.kext/Contents/Resources/Tools/wdavconfig.py - uuid : 69EDB575-22E1-53E1-83B8-2E1AB1E410A6 - orgid : - ``` +![MDM status screenshot](images/MDATP_23_MDMStatus.png) -2. Install the configuration file on a client machine: +You can enroll additional machines now. Optionally, can do it after system configuration and application packages are provisioned. - ```bash - mavel-mojave:wdavconfig testuser$ python WindowsDefenderATPOnboarding.py - Generating /Library/Application Support/Microsoft/Defender/com.microsoft.wdav.atp.plist ... (You may be required to enter sudos password) - ``` +## Deployment -3. Verify that the machine is now associated with orgId: +Enrolled client machines periodically poll the JAMF Server and install new configuration profiles and policies as soon as they are detected. - ```bash - mavel-mojave:wdavconfig testuser$ sudo /Library/Extensions/wdavkext.kext/Contents/Resources/Tools/wdavconfig.py - uuid : 69EDB575-22E1-53E1-83B8-2E1AB1E410A6 - orgid : E6875323-A6C0-4C60-87AD-114BBE7439B8 - ``` +### Status on server -After installation, you'll see the Microsoft Defender icon in the macOS status bar in the top-right corner. +You can monitor the deployment status in the Logs tab: - ![Microsoft Defender icon in status bar screenshot](images/MDATP_Icon_Bar.png) +- **Pending** means that the deployment is scheduled but has not yet happened +- **Completed** means that the deployment succeeded and is no longer scheduled -## Configuring from the command line +![Status on server screenshot](images/MDATP_24_StatusOnServer.png) -Important tasks, such as controlling product settings and triggering on-demand scans, can be done from the command line: +### Status on client machine -|Group |Scenario |Command | -|-------------|-------------------------------------------|-----------------------------------------------------------------------| -|Configuration|Turn on/off real-time protection |`mdatp config --rtp [true/false]` | -|Configuration|Turn on/off cloud protection |`mdatp config --cloud [true/false]` | -|Configuration|Turn on/off product diagnostics |`mdatp config --diagnostic [true/false]` | -|Configuration|Turn on/off automatic sample submission |`mdatp config --sample-submission [true/false]` | -|Configuration|Turn on PUA protection |`mdatp threat --type-handling --potentially_unwanted_application block`| -|Configuration|Turn off PUA protection |`mdatp threat --type-handling --potentially_unwanted_application off` | -|Configuration|Turn on audit mode for PUA protection |`mdatp threat --type-handling --potentially_unwanted_application audit`| -|Diagnostics |Change the log level |`mdatp log-level --[error/warning/info/verbose]` | -|Diagnostics |Generate diagnostic logs |`mdatp --diagnostic` | -|Health |Check the product's health |`mdatp --health` | -|Protection |Scan a path |`mdatp scan --path [path]` | -|Protection |Do a quick scan |`mdatp scan --quick` | -|Protection |Do a full scan |`mdatp scan --full` | -|Protection |Cancel an ongoing on-demand scan |`mdatp scan --cancel` | -|Protection |Request a definition update |`mdatp --signature-update` | +After the Configuration Profile is deployed, you'll see the profile on the machine in the **System Preferences > Profiles >** Name of Configuration Profile. + +![Status on client screenshot](images/MDATP_25_StatusOnClient.png) + +After the policy is applied, you'll see the Microsoft Defender icon in the macOS status bar in the top-right corner. + +![Microsoft Defender icon in status bar screenshot](images/MDATP_Icon_Bar.png) + +You can monitor policy installation on a machine by following the JAMF's log file: + +```bash + mavel-mojave:~ testuser$ tail -f /var/log/jamf.log + Thu Feb 21 11:11:41 mavel-mojave jamf[7960]: No patch policies were found. + Thu Feb 21 11:16:41 mavel-mojave jamf[8051]: Checking for policies triggered by "recurring check-in" for user "testuser"... + Thu Feb 21 11:16:43 mavel-mojave jamf[8051]: Executing Policy WDAV + Thu Feb 21 11:17:02 mavel-mojave jamf[8051]: Installing Microsoft Defender... + Thu Feb 21 11:17:23 mavel-mojave jamf[8051]: Successfully installed Microsoft Defender. + Thu Feb 21 11:17:23 mavel-mojave jamf[8051]: Checking for patches... + Thu Feb 21 11:17:23 mavel-mojave jamf[8051]: No patch policies were found. +``` + +You can also check the onboarding status: + +```bash + mavel-mojave:~ testuser$ sudo /Library/Extensions/wdavkext.kext/Contents/Resources/Tools/wdavconfig.py + uuid : 69EDB575-22E1-53E1-83B8-2E1AB1E410A6 + orgid : 79109c9d-83bb-4f3e-9152-8d75ee59ae22 + orgid managed : 79109c9d-83bb-4f3e-9152-8d75ee59ae22 + orgid effective : 79109c9d-83bb-4f3e-9152-8d75ee59ae22 +``` + +- **orgid/orgid managed**: This is the Microsoft Defender ATP org id specified in the configuration profile. If this value is blank, then the Configuration Profile was not properly set. + +- **orgid effective**: This is the Microsoft Defender ATP org id currently in use. If it does not match the value in the Configuration Profile, then the configuration has not been refreshed. + +## Check onboarding status + +You can check that machines are correctly onboarded by creating a script. For example, the following script checks that enrolled machines are onboarded: + +```bash + sudo /Library/Extensions/wdavkext.kext/Contents/Resources/Tools/wdavconfig.py | grep -E 'orgid effective : [-a-zA-Z0-9]+' +``` + +This script returns 0 if Microsoft Defender ATP is registered with the Windows Defender ATP service, and another exit code if it is not installed or registered. ## Logging installation issues -See [Logging installation issues](microsoft-defender-atp-mac-resources#Logging-installation-issues) for more information on how to find the automatically generated log that is created by the installer when an error occurs. +See [Logging installation issues](microsoft-defender-atp-mac-resources.md#Logging-installation-issues) for more information on how to find the automatically generated log that is created by the installer when an error occurs. ## Uninstallation -See [Uninstalling](microsoft-defender-atp-mac-resources#Uninstalling) for details on how to remove Windows Defender ATP for Mac from client devices. \ No newline at end of file +See [Uninstalling](microsoft-defender-atp-mac-resources.md#Uninstalling) for details on how to remove Windows Defender ATP for Mac from client devices. \ No newline at end of file diff --git a/windows/security/threat-protection/windows-defender-antivirus/microsoft-defender-atp-mac-resources.md b/windows/security/threat-protection/windows-defender-antivirus/microsoft-defender-atp-mac-resources.md index 09a4dcceae..c7d8d338eb 100644 --- a/windows/security/threat-protection/windows-defender-antivirus/microsoft-defender-atp-mac-resources.md +++ b/windows/security/threat-protection/windows-defender-antivirus/microsoft-defender-atp-mac-resources.md @@ -1,27 +1,27 @@ --- title: Microsoft Defender ATP for Mac Resources -description: Describes resources for Microsoft Defender ATP for Mac, including how to uninstall it, how to collect diagnostic logs, and known issues with the product. +description: Describes resources for Microsoft Defender ATP for Mac, including how to uninstall it, how to collect diagnostic logs, CLI commands, and known issues with the product. keywords: microsoft, defender, atp, mac, installation, deploy, uninstallation, intune, jamf, macos, mojave, high sierra, sierra search.product: eADQiWindows 10XVcnh -search.appverid: #met150 +search.appverid: met150 ms.prod: w10 ms.mktglfcycl: deploy ms.sitesec: library ms.pagetype: security ms.author: v-maave author: martyav -ms.localizationpriority: #medium +ms.localizationpriority: medium manager: dansimp audience: ITPro ms.collection: M365-security-compliance -ms.topic: #conceptual +ms.topic: conceptual --- # Resources **Applies to:** -[Windows Defender Advanced Threat Protection (Windows Defender ATP) for Mac](https://go.microsoft.com/fwlink/p/?linkid=???To-Add???) +[Windows Defender Advanced Threat Protection (Windows Defender ATP) for Mac](microsoft-defender-atp.md) >[!IMPORTANT] >Some information relates to prereleased product which may be substantially modified before it's commercially released. Microsoft makes no warranties, express or implied, with respect to the information provided here. @@ -109,6 +109,28 @@ If you are running JAMF, your policy should contain a single script: Configure the appropriate scope in the **Scope** tab to specify the machines that will receive this policy. +## Configuring from the command line + +Important tasks, such as controlling product settings and triggering on-demand scans, can be done from the command line: + +|Group |Scenario |Command | +|-------------|-------------------------------------------|-----------------------------------------------------------------------| +|Configuration|Turn on/off real-time protection |`mdatp config --rtp [true/false]` | +|Configuration|Turn on/off cloud protection |`mdatp config --cloud [true/false]` | +|Configuration|Turn on/off product diagnostics |`mdatp config --diagnostic [true/false]` | +|Configuration|Turn on/off automatic sample submission |`mdatp config --sample-submission [true/false]` | +|Configuration|Turn on PUA protection |`mdatp threat --type-handling --potentially_unwanted_application block`| +|Configuration|Turn off PUA protection |`mdatp threat --type-handling --potentially_unwanted_application off` | +|Configuration|Turn on audit mode for PUA protection |`mdatp threat --type-handling --potentially_unwanted_application audit`| +|Diagnostics |Change the log level |`mdatp log-level --[error/warning/info/verbose]` | +|Diagnostics |Generate diagnostic logs |`mdatp --diagnostic` | +|Health |Check the product's health |`mdatp --health` | +|Protection |Scan a path |`mdatp scan --path [path]` | +|Protection |Do a quick scan |`mdatp scan --quick` | +|Protection |Do a full scan |`mdatp scan --full` | +|Protection |Cancel an ongoing on-demand scan |`mdatp scan --cancel` | +|Protection |Request a definition update |`mdatp --signature-update` | + ## What to expect in the ATP portal - AV alerts: diff --git a/windows/security/threat-protection/windows-defender-antivirus/microsoft-defender-atp-mac.md b/windows/security/threat-protection/windows-defender-antivirus/microsoft-defender-atp-mac.md index af6205c2ca..416840ac2d 100644 --- a/windows/security/threat-protection/windows-defender-antivirus/microsoft-defender-atp-mac.md +++ b/windows/security/threat-protection/windows-defender-antivirus/microsoft-defender-atp-mac.md @@ -44,9 +44,9 @@ In general you'll need to take the following steps: - Ensure you have a Windows Defender ATP subscription and have access to the Windows Defender ATP Portal - Deploy Microsoft Defender ATP for Mac using one of the following deployment methods: - - [Microsoft Intune-based deployment](microsoft-defender-atp-mac-install-with-intune) - - [JAMF-based deployment](microsoft-defender-atp-mac-install-with-jamf) - - [Manual deployment](microsoft-defender-atp-mac-install-manually) + - [Microsoft Intune-based deployment](microsoft-defender-atp-mac-install-with-intune.md) + - [JAMF-based deployment](microsoft-defender-atp-mac-install-with-jamf.md) + - [Manual deployment](microsoft-defender-atp-mac-install-manually.md) ### Prerequisites From a72734f71581f2d89be4ddbb7402cab473bd085b Mon Sep 17 00:00:00 2001 From: MaratMussabekov <48041687+MaratMussabekov@users.noreply.github.com> Date: Thu, 9 May 2019 18:59:26 +0500 Subject: [PATCH 436/724] update win32-and-centennial-app-policy-configuration.md --- .../mdm/win32-and-centennial-app-policy-configuration.md | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/windows/client-management/mdm/win32-and-centennial-app-policy-configuration.md b/windows/client-management/mdm/win32-and-centennial-app-policy-configuration.md index d69549935e..9ead93e55b 100644 --- a/windows/client-management/mdm/win32-and-centennial-app-policy-configuration.md +++ b/windows/client-management/mdm/win32-and-centennial-app-policy-configuration.md @@ -51,7 +51,7 @@ When the ADMX policies are imported, the registry keys to which each policy is w > Some operating system components have built in functionality to check devices for domain membership. MDM enforces the configured policy values only if the devices are domain joined, otherwise it does not. However, you can still import ADMX files and set ADMX-backed policies regardless of whether the device is domain joined or non-domain joined. > [!NOTE] -> Settings, that cannot be configured using custom policy ingestion, have to be set by pushing the appropriate registry keys directly (for example, by using PowerShell script). +> Settings that cannot be configured using custom policy ingestion have to be set by pushing the appropriate registry keys directly (for example, by using PowerShell script). ## Ingesting an app ADMX file From b5c59e32bc4ac40a650f4c440abdb63dc26301fd Mon Sep 17 00:00:00 2001 From: martyav Date: Thu, 9 May 2019 09:59:38 -0400 Subject: [PATCH 437/724] typos in links --- .../microsoft-defender-atp-mac-install-manually.md | 8 ++++---- .../microsoft-defender-atp-mac-install-with-intune.md | 8 ++++---- .../microsoft-defender-atp-mac-install-with-jamf.md | 8 ++++---- 3 files changed, 12 insertions(+), 12 deletions(-) diff --git a/windows/security/threat-protection/windows-defender-antivirus/microsoft-defender-atp-mac-install-manually.md b/windows/security/threat-protection/windows-defender-antivirus/microsoft-defender-atp-mac-install-manually.md index eecb31f9e4..1df8b31e64 100644 --- a/windows/security/threat-protection/windows-defender-antivirus/microsoft-defender-atp-mac-install-manually.md +++ b/windows/security/threat-protection/windows-defender-antivirus/microsoft-defender-atp-mac-install-manually.md @@ -21,7 +21,7 @@ ms.topic: conceptual **Applies to:** -[Windows Defender Advanced Threat Protection (Windows Defender ATP) for Mac](microsoft-defender-atp.md) +[Windows Defender Advanced Threat Protection (Windows Defender ATP) for Mac](microsoft-defender-atp-mac.md) >[!IMPORTANT] >Some information relates to prereleased product which may be substantially modified before it's commercially released. Microsoft makes no warranties, express or implied, with respect to the information provided here. @@ -31,7 +31,7 @@ Microsoft Defender ATP for Mac is not yet widely available, and this topic only ## Prerequisites and system requirements -Before you get started, please see [the main Microsoft Defender ATP for Mac page](microsoft-defender-atp.md) for a description of prerequisites and system requirements for the current software version. +Before you get started, please see [the main Microsoft Defender ATP for Mac page](microsoft-defender-atp-mac.md) for a description of prerequisites and system requirements for the current software version. ## Download installation and onboarding packages @@ -116,8 +116,8 @@ After installation, you'll see the Microsoft Defender icon in the macOS status b ## Logging installation issues -See [Logging installation issues](microsoft-defender-atp-mac-resources.md#Logging-installation-issues) for more information on how to find the automatically generated log that is created by the installer when an error occurs. +See [Logging installation issues](microsoft-defender-atp-mac-resources.md#logging-installation-issues) for more information on how to find the automatically generated log that is created by the installer when an error occurs. ## Uninstallation -See [Uninstalling](microsoft-defender-atp-mac-resources.md#Uninstalling) for details on how to remove Windows Defender ATP for Mac from client devices. \ No newline at end of file +See [Uninstalling](microsoft-defender-atp-mac-resources.md#uninstalling) for details on how to remove Windows Defender ATP for Mac from client devices. \ No newline at end of file diff --git a/windows/security/threat-protection/windows-defender-antivirus/microsoft-defender-atp-mac-install-with-intune.md b/windows/security/threat-protection/windows-defender-antivirus/microsoft-defender-atp-mac-install-with-intune.md index bf6854e899..54e0829561 100644 --- a/windows/security/threat-protection/windows-defender-antivirus/microsoft-defender-atp-mac-install-with-intune.md +++ b/windows/security/threat-protection/windows-defender-antivirus/microsoft-defender-atp-mac-install-with-intune.md @@ -21,7 +21,7 @@ ms.topic: conceptual **Applies to:** -[Windows Defender Advanced Threat Protection (Windows Defender ATP) for Mac](microsoft-defender-atp.md) +[Windows Defender Advanced Threat Protection (Windows Defender ATP) for Mac](microsoft-defender-atp-mac.md) >[!IMPORTANT] >Some information relates to prereleased product which may be substantially modified before it's commercially released. Microsoft makes no warranties, express or implied, with respect to the information provided here. @@ -31,7 +31,7 @@ Microsoft Defender ATP for Mac is not yet widely available, and this topic only ## Prerequisites and system requirements -Before you get started, please see [the main Microsoft Defender ATP for Mac page](microsoft-defender-atp.md) for a description of prerequisites and system requirements for the current software version. +Before you get started, please see [the main Microsoft Defender ATP for Mac page](microsoft-defender-atp-mac.md) for a description of prerequisites and system requirements for the current software version. ## Download installation and onboarding packages @@ -166,8 +166,8 @@ After Intune changes are propagated to the enrolled machines, you'll see it on t ## Logging installation issues -See [Logging installation issues](microsoft-defender-atp-mac-resources.md#Logging-installation-issues) for more information on how to find the automatically generated log that is created by the installer when an error occurs. +See [Logging installation issues](microsoft-defender-atp-mac-resources.md#logging-installation-issues) for more information on how to find the automatically generated log that is created by the installer when an error occurs. ## Uninstallation -See [Uninstalling](microsoft-defender-atp-mac-resources.md#Uninstalling) for details on how to remove Windows Defender ATP for Mac from client devices. \ No newline at end of file +See [Uninstalling](microsoft-defender-atp-mac-resources.md#uninstalling) for details on how to remove Windows Defender ATP for Mac from client devices. \ No newline at end of file diff --git a/windows/security/threat-protection/windows-defender-antivirus/microsoft-defender-atp-mac-install-with-jamf.md b/windows/security/threat-protection/windows-defender-antivirus/microsoft-defender-atp-mac-install-with-jamf.md index eead3818a7..3e4122d3a0 100644 --- a/windows/security/threat-protection/windows-defender-antivirus/microsoft-defender-atp-mac-install-with-jamf.md +++ b/windows/security/threat-protection/windows-defender-antivirus/microsoft-defender-atp-mac-install-with-jamf.md @@ -21,7 +21,7 @@ ms.topic: conceptual **Applies to:** -[Windows Defender Advanced Threat Protection (Windows Defender ATP) for Mac](microsoft-defender-atp.md) +[Windows Defender Advanced Threat Protection (Windows Defender ATP) for Mac](microsoft-defender-atp-mac.md) >[!IMPORTANT] >Some information relates to prereleased product which may be substantially modified before it's commercially released. Microsoft makes no warranties, express or implied, with respect to the information provided here. @@ -31,7 +31,7 @@ Microsoft Defender ATP for Mac is not yet widely available, and this topic only ## Prerequisites and system requirements -Before you get started, please see [the main Microsoft Defender ATP for Mac page](microsoft-defender-atp.md) for a description of prerequisites and system requirements for the current software version. +Before you get started, please see [the main Microsoft Defender ATP for Mac page](microsoft-defender-atp-mac.md) for a description of prerequisites and system requirements for the current software version. In addition, for JAMF deployment, you need to be familiar with JAMF administration tasks, have a JAMF tenant, and know how to deploy packages. This includes having a properly configured distribution point. JAMF has many ways to complete the same task. These instructions provide an example for most common processes. Your organization might use a different workflow. @@ -201,8 +201,8 @@ This script returns 0 if Microsoft Defender ATP is registered with the Windows D ## Logging installation issues -See [Logging installation issues](microsoft-defender-atp-mac-resources.md#Logging-installation-issues) for more information on how to find the automatically generated log that is created by the installer when an error occurs. +See [Logging installation issues](microsoft-defender-atp-mac-resources.md#logging-installation-issues) for more information on how to find the automatically generated log that is created by the installer when an error occurs. ## Uninstallation -See [Uninstalling](microsoft-defender-atp-mac-resources.md#Uninstalling) for details on how to remove Windows Defender ATP for Mac from client devices. \ No newline at end of file +See [Uninstalling](microsoft-defender-atp-mac-resources.md#uninstalling) for details on how to remove Windows Defender ATP for Mac from client devices. \ No newline at end of file From 34e77a00035ef4617f6ffee4798cf68c5f311d24 Mon Sep 17 00:00:00 2001 From: martyav Date: Thu, 9 May 2019 11:59:32 -0400 Subject: [PATCH 438/724] corrected list of settings, updated note on E5 --- ...ecurity-settings-with-tamper-protection.md | 32 +++++++++---------- 1 file changed, 15 insertions(+), 17 deletions(-) diff --git a/windows/security/threat-protection/windows-defender-antivirus/prevent-changes-to-security-settings-with-tamper-protection.md b/windows/security/threat-protection/windows-defender-antivirus/prevent-changes-to-security-settings-with-tamper-protection.md index 930eb2406a..16fceaea85 100644 --- a/windows/security/threat-protection/windows-defender-antivirus/prevent-changes-to-security-settings-with-tamper-protection.md +++ b/windows/security/threat-protection/windows-defender-antivirus/prevent-changes-to-security-settings-with-tamper-protection.md @@ -20,35 +20,33 @@ ms.author: v-anbic - Windows 10 Tamper protection helps prevent malicious apps from changing important security settings. These settings include: - + - Real-time protection - Cloud-delivered protection - IOfficeAntivirus (IOAV) - Behavior monitoring -- Scheduled scans -- Policy override settings - +- Removing security intelligence updates + With tamper protection set to **On**, you can still change these settings in the Windows Security app. The following apps and methods can't change these settings: - + - Mobile device management (MDM) apps like Intune - Enterprise configuration management apps like System Center Configuration Manager (SCCM) - Command line instruction MpCmdRun.exe -removedefinitions -dynamicsignatures - Windows System Image Manager (Windows SIM) settings DisableAntiSpyware and DisableAntiMalware (used in Windows unattended setup) - Group Policy - Other Windows Management Instrumentation (WMI) apps - + The tamper protection setting doesn't affect how third party antivirus apps register with the Windows Security app. - + On computers running Windows 10 Enterprise E5, users can't change the tamper protection setting. - + Tamper protection is On by default. If you set tamper protection to **Off**, you will see a yellow warning in the Windows Security app under **Virus & threat protection**. - -##Configure tamper protection - -1. Open the Windows Security app by clicking the shield icon in the task bar or searching the start menu for **Defender**. -2. Select **Virus & threat protection**, then select **Virus & threat protection settings**. -3. Set **Tamper Protection** to **On** or **Off**. - + +## Configure tamper protection + +1. Open the Windows Security app by clicking the shield icon in the task bar or searching the start menu for **Defender**. +2. Select **Virus & threat protection**, then select **Virus & threat protection settings**. +3. Set **Tamper Protection** to **On** or **Off**. + >[!NOTE] ->If your computer is running Windows 10 Enterprise E5, you can't change the tamper protection setting. - +>If your computer is running Windows 10 Enterprise E5, you can't change the tamper protection settings from within Windows Security App. \ No newline at end of file From 26f085eeddcb189d96fcbca07c5ae82b33c15645 Mon Sep 17 00:00:00 2001 From: ManikaDhiman Date: Thu, 9 May 2019 09:40:06 -0700 Subject: [PATCH 439/724] Added 19H1 policies --- .../policy-configuration-service-provider.md | 6 + .../mdm/policy-csp-system.md | 152 +++++++++++++++++- 2 files changed, 155 insertions(+), 3 deletions(-) diff --git a/windows/client-management/mdm/policy-configuration-service-provider.md b/windows/client-management/mdm/policy-configuration-service-provider.md index a27926a537..f566cfd699 100644 --- a/windows/client-management/mdm/policy-configuration-service-provider.md +++ b/windows/client-management/mdm/policy-configuration-service-provider.md @@ -3111,6 +3111,9 @@ The following diagram shows the Policy configuration service provider in tree fo
System/AllowBuildPreview
+
+ System/AllowCommercialDataPipeline +
System/AllowDeviceNameInDiagnosticData
@@ -3171,6 +3174,9 @@ The following diagram shows the Policy configuration service provider in tree fo
System/TelemetryProxy
+
+ System/TurnOffFileHistory +
### SystemServices policies diff --git a/windows/client-management/mdm/policy-csp-system.md b/windows/client-management/mdm/policy-csp-system.md index 77c58a2714..92fd30f9bb 100644 --- a/windows/client-management/mdm/policy-csp-system.md +++ b/windows/client-management/mdm/policy-csp-system.md @@ -6,7 +6,7 @@ ms.topic: article ms.prod: w10 ms.technology: windows author: MariciaAlforque -ms.date: 05/01/2019 +ms.date: 05/09/2019 --- # Policy CSP - System @@ -24,6 +24,9 @@ ms.date: 05/01/2019
System/AllowBuildPreview
+
+ System/AllowCommercialDataPipeline +
System/AllowDeviceNameInDiagnosticData
@@ -84,6 +87,9 @@ ms.date: 05/01/2019
System/TelemetryProxy
+
+ System/TurnOffFileHistory +
@@ -128,7 +134,6 @@ ms.date: 05/01/2019 > [!NOTE] > This policy setting applies only to devices running Windows 10 Pro, Windows 10 Enterprise, and Windows 10 Education, Windows 10 Mobile, and Windows 10 Mobile Enterprise. - This policy setting determines whether users can access the Insider build controls in the Advanced Options for Windows Update. These controls are located under "Get Insider builds," and enable users to make their devices available for downloading and installing Windows preview software. If you enable or do not configure this policy setting, users can download and install Windows preview software on their devices. If you disable this policy setting, the item "Get Insider builds" will be unavailable. @@ -154,6 +159,80 @@ The following list shows the supported values:
+ +**System/AllowCommercialDataPipeline** + + +
DetailsOriginating updateStatusHistory
Latest cumulative update (KB 4495667) installs automatically
Due to a servicing side issue some users were offered 4495667 (optional update) automatically. This issue has been mitigated.

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019
  • Server: Windows Server, version 1809; Windows Server 2019
Next steps: This issue has been mitigated on the servicing side to prevent auto installing of this update. Customers do not need to take any action.

Back to top
OS Build 17763.475

May 03, 2019
KB4495667
Mitigated
Last updated:
May 05, 2019
12:01 PM PT

Opened:
May 05, 2019
12:01 PM PT
Devices with some Asian language packs installed may receive an error
After installing the April 2019 Cumulative Update (KB4493509), devices with some Asian language packs installed may receive the error, \"0x800f0982 - PSFX_E_MATCHING_COMPONENT_NOT_FOUND.\"

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019
  • Server: Windows Server, version 1809; Windows Server 2019
Workaround:
  1. Uninstall and reinstall any recently added language packs. For instructions, see \"Manage the input and display language settings in Windows 10\".
  2. Click Check for Updates and install the April 2019 Cumulative Update. For instructions, see \"Update Windows 10\".
Note: If reinstalling the language pack does not mitigate the issue, reset your PC as follows:
  1. Go to Settings app -> Recovery.
  2. Click on Get Started under \"Reset this PC\" recovery option.
  3. Select \"Keep my Files\".
Next steps: Microsoft is working on a resolution and will provide an update in an upcoming release.

Back to top
OS Build 17763.437

April 09, 2019
KB4493509
Mitigated
Last updated:
May 03, 2019
10:59 AM PT

Opened:
May 02, 2019
04:36 PM PT
Printing from Microsoft Edge or other UWP apps, you may receive the error 0x80070007
When attempting to print from Microsoft Edge or other Universal Windows Platform (UWP) applications you may receive the error, \"Your printer has experienced an unexpected configuration problem. 0x80070007e.\"
 
Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019
  • Server: Windows Server, version 1809; Windows Server 2019
Workaround: You can use another browser, such as Internet Explorer to print your documents.
 
Next steps: Microsoft is working on a resolution and will provide an update in an upcoming release.

Back to top
OS Build 17763.379

March 12, 2019
KB4489899
Mitigated
Last updated:
May 02, 2019
04:47 PM PT

Opened:
May 02, 2019
04:47 PM PT
Latest cumulative update (KB 4495667) installs automatically
Due to a servicing side issue some users were offered KB4495667 (optional update) automatically and rebooted devices. This issue has been mitigated.

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019
  • Server: Windows Server, version 1809; Windows Server 2019
Resolution:: This issue has been mitigated on the servicing side to prevent auto installing of this update. Customers do not need to take any action.

Back to top
OS Build 17763.475

May 03, 2019
KB4495667
Resolved
Resolved:
May 08, 2019
03:37 PM PT

Opened:
May 05, 2019
12:01 PM PT
+ + + + + + + + + + + + + + + + + + +
HomeProBusinessEnterpriseEducationMobileMobile Enterprise
cross markcheck mark6check mark6check mark6check mark6
+ + + +[Scope](./policy-configuration-service-provider.md#policy-scope): + +> [!div class = "checklist"] +> * Device + +
+ + + +> [!NOTE] +> This policy setting applies only to the Windows operating system and apps included with Windows, it does not apply to third-party apps or services running on Windows 10. + +This policy setting opts the device into the Windows enterprise data pipeline. + +If you enable this setting, data collected from the device is opted into the Windows enterprise data pipeline. + +If you disable or do not configure this setting, all data from the device is collected and processed in accordance with the policies for the Windows standard data pipeline. + +Configuring this setting does not change the telemetry collection level or the ability of the user to change the level. + + + +ADMX Info: +- GP English name: *Allow commercial data pipeline* +- GP name: *AllowCommercialDataPipeline* +- GP element: *AllowCommercialDataPipeline* +- GP path: *Data Collection and Preview Builds* +- GP ADMX file name: *DataCollection.admx* + + + +The following list shows the supported values: + +- 0 (default) - Do not use the Windows Commercial Data Pipeline +- 1 - Use the Windows Commercial Data Pipeline + + + + + + + + + + +
+ **System/AllowDeviceNameInDiagnosticData** @@ -1434,6 +1513,73 @@ ADMX Info: +
+ + +**System/TurnOffFileHistory** + + + + + + + + + + + + + + + + + + + + + +
HomeProBusinessEnterpriseEducationMobileMobile Enterprise
cross markcheck mark6check mark6check mark6check mark6
+ + + +[Scope](./policy-configuration-service-provider.md#policy-scope): + +> [!div class = "checklist"] +> * Device + +
+ + + +This policy setting allows you to turn off File History. + +If you enable this policy setting, File History cannot be activated to create regular, automatic backups. + +If you disable or do not configure this policy setting, File History can be activated to create regular, automatic backups. + + + +ADMX Info: +- GP English name: *Turn off File History* +- GP name: *DisableFileHistory* +- GP path: *Windows Components/File History* +- GP ADMX file name: *FileHistory.admx* + + + +The following list shows the supported values: + +- false (default) - allow File History +- true - turn off File History + + + + + + + + + @@ -1459,4 +1605,4 @@ Footnotes: - 3 - Added in Windows 10, version 1709. - 4 - Added in Windows 10, version 1803. - 5 - Added in Windows 10, version 1809. -- 6 - Added in the next major release of Windows 10. \ No newline at end of file +- 6 - Added in Windows 10, version 1903. \ No newline at end of file From 7c9ffa815bda413ae78dbe8839a96c00e0cea23f Mon Sep 17 00:00:00 2001 From: Mike Edgar <49731348+medgarmedgar@users.noreply.github.com> Date: Thu, 9 May 2019 10:09:13 -0700 Subject: [PATCH 440/724] Update manage-connections-from-windows-operating-system-components-to-microsoft-services.md --- ...perating-system-components-to-microsoft-services.md | 10 ++++------ 1 file changed, 4 insertions(+), 6 deletions(-) diff --git a/windows/privacy/manage-connections-from-windows-operating-system-components-to-microsoft-services.md b/windows/privacy/manage-connections-from-windows-operating-system-components-to-microsoft-services.md index 923bfedcb3..9b76bb4c29 100644 --- a/windows/privacy/manage-connections-from-windows-operating-system-components-to-microsoft-services.md +++ b/windows/privacy/manage-connections-from-windows-operating-system-components-to-microsoft-services.md @@ -194,7 +194,7 @@ See the following table for a summary of the management settings for Windows Ser See the following table for a summary of the management settings for Windows Server 2016 Server Core. | Setting | Group Policy | Registry | Command line | -| - | :-: | :-: | :-: | :-: | :-: | +| - | :-: | :-: | :-: | | [1. Automatic Root Certificates Update](#automatic-root-certificates-update) | ![Check mark](images/checkmark.png) | ![Check mark](images/checkmark.png) | | | [3. Date & Time](#bkmk-datetime) | ![Check mark](images/checkmark.png) | ![Check mark](images/checkmark.png) | | | [6. Font streaming](#font-streaming) | ![Check mark](images/checkmark.png) | ![Check mark](images/checkmark.png) | | @@ -209,7 +209,7 @@ See the following table for a summary of the management settings for Windows Ser See the following table for a summary of the management settings for Windows Server 2016 Nano Server. | Setting | Registry | Command line | -| - | :-: | :-: | :-: | :-: | :-: | +| - | :-: | :-: | | [1. Automatic Root Certificates Update](#automatic-root-certificates-update) | ![Check mark](images/checkmark.png) | | | [3. Date & Time](#bkmk-datetime) | ![Check mark](images/checkmark.png) | | | [22. Teredo](#bkmk-teredo) | | ![Check mark](images/checkmark.png) | @@ -634,6 +634,8 @@ To disable the Microsoft Account Sign-In Assistant: - Apply the Accounts/AllowMicrosoftAccountSignInAssistant MDM policy from the [Policy CSP](https://msdn.microsoft.com/library/windows/hardware/dn904962.aspx) where 0 is turned off and 1 is turned on. + -or- + - Change the **Start** REG_DWORD registry setting in **HKEY_LOCAL_MACHINE\\System\\CurrentControlSet\\Services\\wlidsvc** to a value of **4**. @@ -1857,10 +1859,6 @@ You can disconnect from the Microsoft Antimalware Protection Service. - Use the registry to set the REG_DWORD value **HKEY_LOCAL_MACHINE\\Software\\Policies\\Microsoft\\Windows Defender\\Spynet\\SpyNetReporting** to **0 (zero)**. - -and- - -- Delete the registry setting **named** in **HKEY_LOCAL_MACHINE\\SOFTWARE\\Policies\\Microsoft\\Windows Defender\\Updates**. - -OR- - For Windows 10 only, apply the Defender/AllowClouldProtection MDM policy from the [Defender CSP](https://msdn.microsoft.com/library/windows/hardware/dn904962.aspx). From 089238bd71ac1a5e82f177e147c1ea10b5605297 Mon Sep 17 00:00:00 2001 From: John Kaiser <35939694+CoveMiner@users.noreply.github.com> Date: Thu, 9 May 2019 10:24:07 -0700 Subject: [PATCH 441/724] Update assettag.md --- devices/surface/assettag.md | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/devices/surface/assettag.md b/devices/surface/assettag.md index 9771aacb0d..03a43060a5 100644 --- a/devices/surface/assettag.md +++ b/devices/surface/assettag.md @@ -27,7 +27,7 @@ for Surface devices. It works on Surface Pro 3 and all newer Surface devices. To run Surface Asset Tag: 1. On the Surface device, download **Surface Pro 3 AssetTag.zip** from the [Microsoft Download - Center](http://www.microsoft.com/download/details.aspx?id=44076), + Center](https://www.microsoft.com/en-us/download/details.aspx?id=46703), extract the zip file, and save AssetTag.exe in desired folder (in this example, C:\\assets). From b1c2f37f09e2717000d94b5995359a47b1745293 Mon Sep 17 00:00:00 2001 From: Mike Edgar <49731348+medgarmedgar@users.noreply.github.com> Date: Thu, 9 May 2019 10:25:14 -0700 Subject: [PATCH 442/724] Update manage-connections-from-windows-operating-system-components-to-microsoft-services.md --- ...-system-components-to-microsoft-services.md | 18 +++++++++--------- 1 file changed, 9 insertions(+), 9 deletions(-) diff --git a/windows/privacy/manage-connections-from-windows-operating-system-components-to-microsoft-services.md b/windows/privacy/manage-connections-from-windows-operating-system-components-to-microsoft-services.md index 9b76bb4c29..58d06760a9 100644 --- a/windows/privacy/manage-connections-from-windows-operating-system-components-to-microsoft-services.md +++ b/windows/privacy/manage-connections-from-windows-operating-system-components-to-microsoft-services.md @@ -508,11 +508,11 @@ To turn off Insider Preview builds for Windows 10: | Registry Key | Registry path | |------------------------------------------------------|-----------------------------------------------------------------------------------------------------| -| Turn on Suggested Sites| HKEY_LOCAL_MACHINE\\SOFTWARE\\Policies\\Microsoft\\Internet Explorer\\Suggested Sites
REG_DWORD: Enabled
**Set Value to: 0**| -| Allow Microsoft services to provide enhanced suggestions as the user types in the Address Bar | HKEY_LOCAL_MACHINE\\SOFTWARE\\Policies\\Microsoft\\Internet Explorer
REG_DWORD: AllowServicePoweredQSA
**Set Value to: 0**| -| Turn off the auto-complete feature for web addresses | HKEY_LOCAL_MACHINE\\SOFTWARE\\Policies\\Microsoft\\Windows\CurrentVersion\\Explorer\\AutoComplete
REG_SZ: AutoSuggest
Set Value to: **no** | -| Turn off browser geolocation | HKEY_LOCAL_MACHINE\\SOFTWARE\\Policies\\Microsoft\\Internet Explorer\\Geolocation
REG_DWORD: PolicyDisableGeolocation
**Set Value to: 1** | -| Prevent managing SmartScreen filter | HKEY_LOCAL_MACHINE\\SOFTWARE\\Policies\\Microsoft\\Internet Explorer\\PhishingFilter
REG_DWORD: EnabledV9
**Set Value to: 0** | +| Turn on Suggested Sites| HKLM\\SOFTWARE\\Policies\\Microsoft\\Internet Explorer\\Suggested Sites
REG_DWORD: Enabled
**Set Value to: 0**| +| Allow Microsoft services to provide enhanced suggestions as the user types in the Address Bar | HKLM\\SOFTWARE\\Policies\\Microsoft\\Internet Explorer
REG_DWORD: AllowServicePoweredQSA
**Set Value to: 0**| +| Turn off the auto-complete feature for web addresses |HKLM\\SOFTWARE\\Policies\\Microsoft\\Windows\CurrentVersion\\Explorer\\AutoComplete
REG_SZ: AutoSuggest
Set Value to: **no** | +| Turn off browser geolocation | HKLM\\SOFTWARE\\Policies\\Microsoft\\Internet Explorer\\Geolocation
REG_DWORD: PolicyDisableGeolocation
**Set Value to: 1** | +| Prevent managing SmartScreen filter | HKLM\\SOFTWARE\\Policies\\Microsoft\\Internet Explorer\\PhishingFilter
REG_DWORD: EnabledV9
**Set Value to: 0** | There are more Group Policy objects that are used by Internet Explorer: @@ -527,10 +527,10 @@ You can also use Registry keys to set these policies. | Registry Key | Registry path | |------------------------------------------------------|-----------------------------------------------------------------------------------------------------| -| Choose whether employees can configure Compatibility View. | HKEY_LOCAL_MACHINE\\SOFTWARE\\Policies\\Microsoft\\Internet Explorer\\BrowserEmulation
REG_DWORD: DisableSiteListEditing
**Set Value to 1**| -| Turn off the flip ahead with page prediction feature | HKEY_LOCAL_MACHINE\\SOFTWARE\\Policies\\Microsoft\\Internet Explorer\\FlipAhead
REG_DWORD: Enabled
**Set Value to 0**| -| Turn off background synchronization for feeds and Web Slices | HKEY_LOCAL_MACHINE\\SOFTWARE\\Policies\\Microsoft\\Internet Explorer\\Feeds
REG_DWORD: BackgroundSyncStatus
**Set Value to 0**| -| Allow Online Tips | HKEY_LOCAL_MACHINE\\Software\\Microsoft\\Windows\\CurrentVersion\\Policies\\Explorer
REG_DWORD: AllowOnlineTips
**Set Value to 0 (zero)**| +| Choose whether employees can configure Compatibility View. | HKLM\\SOFTWARE\\Policies\\Microsoft\\Internet Explorer\\BrowserEmulation
REG_DWORD: DisableSiteListEditing
**Set Value to 1**| +| Turn off the flip ahead with page prediction feature | HKLM\\SOFTWARE\\Policies\\Microsoft\\Internet Explorer\\FlipAhead
REG_DWORD: Enabled
**Set Value to 0**| +| Turn off background synchronization for feeds and Web Slices | HKLM\\SOFTWARE\\Policies\\Microsoft\\Internet Explorer\\Feeds
REG_DWORD: BackgroundSyncStatus
**Set Value to 0**| +| Allow Online Tips | HKLM\\Software\\Microsoft\\Windows\\CurrentVersion\\Policies\\Explorer
REG_DWORD: AllowOnlineTips
**Set Value to 0**| To turn off the home page, **Enable** the Group Policy: **User Configuration** > **Administrative Templates** > **Windows Components** > **Internet Explorer** > **Disable changing home page settings**, and set it to **about:blank**. From 4117641823258d8fc785aa0bbe3c6041ee69b51b Mon Sep 17 00:00:00 2001 From: Greg Lindsay Date: Thu, 9 May 2019 11:21:14 -0700 Subject: [PATCH 443/724] draft --- .../whats-new-windows-10-version-1903.md | 37 +++++++++++++++++++ 1 file changed, 37 insertions(+) create mode 100644 windows/whats-new/whats-new-windows-10-version-1903.md diff --git a/windows/whats-new/whats-new-windows-10-version-1903.md b/windows/whats-new/whats-new-windows-10-version-1903.md new file mode 100644 index 0000000000..55b1f54d90 --- /dev/null +++ b/windows/whats-new/whats-new-windows-10-version-1903.md @@ -0,0 +1,37 @@ +--- +title: What's new in Windows 10, version 1903 +description: New and updated IT Pro content about new features in Windows 10, version 1903 (also known as the Windows 10 May 2019 Update). +keywords: ["What's new in Windows 10", "Windows 10", "May 2019 Update"] +ms.prod: w10 +ms.mktglfcycl: deploy +ms.sitesec: library +author: greg-lindsay +ms.localizationpriority: high +ms.topic: article +--- + +# What's new in Windows 10, version 1903 IT Pro content + +**Applies to** +- Windows 10, version 1903 + +This article lists new and updated features and content that are of interest to IT Pros for Windows 10 version 1903, also known as the Windows 10 May 2019 Update. This update also contains all features and fixes included in previous cumulative updates to Windows 10, version 1809. + +>If you are not an IT Pro, see the following topics for information about what's new in Windows 10 in [hardware](https://docs.microsoft.com/windows-hardware/get-started/what-s-new-in-windows), for [developers](https://blogs.windows.com/buildingapps/2019/04/18/start-developing-on-windows-10-may-2019-update-today/#2Lp8FUFQ3Jm8KVcq.97), and for [consumers](https://blogs.windows.com/windowsexperience/2018/04/30/whats-new-in-the-windows-10-april-2018-update). + + +## Deployment + +## Configuration + +## Security + +## Microsoft Edge + +https://blogs.windows.com/msedgedev/2019/05/06/edge-chromium-build-2019-pwa-ie-mode-devtools/#2QJF4u970WjQ2Sv7.97 + +## See Also + +[Windows 10 Features](https://www.microsoft.com/windows/features): Review general information about Windows 10 features.
+[What's New in Windows 10](https://docs.microsoft.com/windows/whats-new/): See what’s new in other versions of Windows 10.
+[What's new in Windows 10, version 1809](https://docs.microsoft.com/windows-hardware/get-started/what-s-new-in-windows): See what’s new in Windows 10 hardware.
From 99097ab1dc0ff506314811efce4107d2e9d7d74e Mon Sep 17 00:00:00 2001 From: Mike Edgar <49731348+medgarmedgar@users.noreply.github.com> Date: Thu, 9 May 2019 11:38:39 -0700 Subject: [PATCH 444/724] Delete manage-windows-1903-endpoints.md --- .../privacy/manage-windows-1903-endpoints.md | 170 ------------------ 1 file changed, 170 deletions(-) delete mode 100644 windows/privacy/manage-windows-1903-endpoints.md diff --git a/windows/privacy/manage-windows-1903-endpoints.md b/windows/privacy/manage-windows-1903-endpoints.md deleted file mode 100644 index f73b24241a..0000000000 --- a/windows/privacy/manage-windows-1903-endpoints.md +++ /dev/null @@ -1,170 +0,0 @@ ---- -title: Connection endpoints for Windows 10, version 1903 -description: Explains what Windows 10 endpoints are used for, how to turn off traffic to them, and the impact. -keywords: privacy, manage connections to Microsoft, Windows 10, Windows Server 2016 -ms.prod: w10 -ms.mktglfcycl: manage -ms.sitesec: library -ms.localizationpriority: high -audience: ITPro -author: danihalfin -ms.author: v-medgar -manager: sanashar -ms.collection: M365-security-compliance -ms.topic: article -ms.date: 5/3/2019 ---- -# Manage connection endpoints for Windows 10, version 1903 - -**Applies to** - -- Windows 10, version 1903 - -Some Windows components, app, and related services transfer data to Microsoft network endpoints. Some examples include: - -- Connecting to Microsoft Office and Windows sites to download the latest app and security updates. -- Connecting to email servers to send and receive email. -- Connecting to the web for every day web browsing. -- Connecting to the cloud to store and access backups. -- Using your location to show a weather forecast. - -This article lists different endpoints that are available on a clean installation of Windows 10, version 1709 and later. -Details about the different ways to control traffic to these endpoints are covered in [Manage connections from Windows operating system components to Microsoft services](manage-connections-from-windows-operating-system-components-to-microsoft-services.md). -Where applicable, each endpoint covered in this topic includes a link to specific details about how to control traffic to it. - -We used the following methodology to derive these network endpoints: - -1. Set up the latest version of Windows 10 on a test virtual machine using the default settings. -2. Leave the devices running idle for a week (that is, a user is not interacting with the system/device). -3. Use globally accepted network protocol analyzer/capturing tools and log all background egress traffic. -4. Compile reports on traffic going to public IP addresses. -5. The test virtual machine was logged in using a local account and was not joined to a domain or Azure Active Directory. -6. All traffic was captured in our lab using a IPV4 network. Therefore no IPV6 traffic is reported here. - -> [!NOTE] -> Microsoft uses global load balancers that can appear in network trace-routes. For example, an endpoint for *.akadns.net might be used to load balance requests to an Azure datacenter, which can change over time. - -## Windows 10 1903 Enterprise connection endpoints - -|Area|Description|Protocol|Destination| -|----------------|----------|----------|------------| -|Apps|The following endpoints are used to download updates to the Weather app Live Tile. If you turn off traffic to this endpoint, no Live Tiles will be updated.|HTTP|blob.weather.microsoft.com| -|||HTTP|tile-service.weather.microsoft.com -||The following endpoint is used for OneNote Live Tile. To turn off traffic for this endpoint, either uninstall OneNote or disable the Microsoft Store. If you disable the Microsoft store, other Store apps cannot be installed or updated. Additionally, the Microsoft Store won't be able to revoke malicious Store apps and users will still be able to open them.|HTTPS|cdn.onenote.net/livetile/?Language=en-US -||The following endpoint is used for Twitter updates. To turn off traffic for these endpoints, either uninstall Twitter or disable the Microsoft Store. If you disable the Microsoft store, other Store apps cannot be installed or updated. Additionally, the Microsoft Store won't be able to revoke malicious Store apps and users will still be able to open them.|HTTPS|*.twimg.com*| -||The following endpoint is used for Candy Crush Saga updates. To turn off traffic for this endpoint, either uninstall Candy Crush Saga or disable the Microsoft Store. If you disable the Microsoft store, other Store apps cannot be installed or updated. Additionally, the Microsoft Store won't be able to revoke malicious Store apps and users will still be able to open them.|TLS v1.2|candycrushsoda.king.com| -||The following endpoint is used by the Photos app to download configuration files, and to connect to the Office 365 portal's shared infrastructure, including Office Online. To turn off traffic for this endpoint, either uninstall the Photos app or disable the Microsoft Store. If you disable the Microsoft store, other Store apps cannot be installed or updated. Additionally, the Microsoft Store won't be able to revoke malicious Store apps and users will still be able to open them.|HTTPS|evoke-windowsservices-tas.msedge.net| -||The following endpoint is used for by the Microsoft Wallet app. To turn off traffic for this endpoint, either uninstall the Wallet app or disable the Microsoft Store. If you disable the Microsoft store, other Store apps cannot be installed or updated. Additionally, the Microsoft Store won't be able to revoke malicious Store apps and users will still be able to open them.|HTTPS|wallet.microsoft.com| -||The following endpoint is used by the Groove Music app for update HTTP handler status. If you turn off traffic for this endpoint, apps for websites won't work and customers who visit websites (such as mediaredirect.microsoft.com) that are registered with their associated app (such as Groove Music) will stay at the website and won't be able to directly launch the app.|HTTPS|mediaredirect.microsoft.com| -||The following endpoints are used when using the Whiteboard app. To turn off traffic for this endpoint disable the Microsoft Store.|HTTPS|int.whiteboard.microsoft.com| -|||HTTPS|wbd.ms| -|||HTTPS|whiteboard.microsoft.com| -|||HTTP / HTTPS|whiteboard.ms| -|Azure |The following endpoints are related to Azure. |HTTPS|wd-prod-*fe*.cloudapp.azure.com| -|||HTTPS|ris-prod-atm.trafficmanager.net| -|||HTTPS|validation-v2.sls.trafficmanager.net| -|Certificates|The following endpoint is used by the Automatic Root Certificates Update component to automatically check the list of trusted authorities on Windows Update to see if an update is available. It is possible turn off traffic to this endpoint, but that is not recommended because when root certificates are updated over time, applications and websites may stop working because they did not receive an updated root certificate the application uses. Additionally, it is used to download certificates that are publicly known to be fraudulent. These settings are critical for both Windows security and the overall security of the Internet. We do not recommend blocking this endpoint. If traffic to this endpoint is turned off, Windows no longer automatically downloads certificates known to be fraudulent, which increases the attack vector on the device.|HTTP|ctldl.windowsupdate.com| -|Cortana and Search|The following endpoint is used to get images that are used for Microsoft Store suggestions. If you turn off traffic for this endpoint, you will block images that are used for Microsoft Store suggestions. |HTTPS|store-images.*microsoft.com| -||The following endpoints are related to Cortana and Live Tiles. If you turn off traffic for this endpoint, you will block updates to Cortana greetings, tips, and Live Tiles.|HTTPS|www.bing.com/client| -|||HTTPS|www.bing.com| -|||HTTPS|www.bing.com/proactive| -|||HTTPS|www.bing.com/threshold/xls.aspx| -|||HTTP|exo-ring.msedge.net| -|||HTTP|fp.msedge.net| -|||HTTP|fp-vp.azureedge.net| -|||HTTP|odinvzc.azureedge.net| -|||HTTP|spo-ring.msedge.net| -|Device authentication| -||The following endpoint is used to authenticate a device. If you turn off traffic for this endpoint, the device will not be authenticated.|HTTPS|login.live.com*| -||The following endpoint is used to retrieve device metadata. If you turn off traffic for this endpoint, metadata will not be updated for the device.|HTTP|dmd.metaservices.microsoft.com| -|Diagnostic Data|The following endpoints are used by the Connected User Experiences and Telemetry component and connects to the Microsoft Data Management service. If you turn off traffic for this endpoint, diagnostic and usage information, which helps Microsoft find and fix problems and improve our products and services, will not be sent back to Microsoft.|HTTP|v10.events.data.microsoft.com| -|||HTTPS|v10.vortex-win.data.microsoft.com/collect/v1| -|||HTTP|www.microsoft.com| -||The following endpoints are used by Windows Error Reporting. To turn off traffic for these endpoints, enable the following Group Policy: Administrative Templates > Windows Components > Windows Error Reporting > Disable Windows Error Reporting. This means error reporting information will not be sent back to Microsoft.|HTTPS|co4.telecommand.telemetry.microsoft.com| -|||HTTP|cs11.wpc.v0cdn.net| -|||HTTPS|cs1137.wpc.gammacdn.net| -|||TLS v1.2|modern.watson.data.microsoft.com*| -|||HTTPS|watson.telemetry.microsoft.com| -|Licensing|The following endpoint is used for online activation and some app licensing. To turn off traffic for this endpoint, disable the Windows License Manager Service. This will also block online activation and app licensing may not work.|HTTPS|*licensing.mp.microsoft.com*| -|Location|The following endpoints are used for location data. If you turn off traffic for this endpoint, apps cannot use location data.|HTTPS|inference.location.live.net| -|||HTTP|location-inference-westus.cloudapp.net| -|Maps|The following endpoints are used to check for updates to maps that have been downloaded for offline use. If you turn off traffic for this endpoint, offline maps will not be updated.|HTTPS|*g.akamaiedge.net| -|||HTTP|*maps.windows.com*| -|Microsoft Account|The following endpoints are used for Microsoft accounts to sign in. If you turn off traffic for these endpoints, users cannot sign in with Microsoft accounts. |HTTP|login.msa.akadns6.net| -|||HTTP|us.configsvc1.live.com.akadns.net| -|Microsoft Edge|This traffic is related to the Microsoft Edge browser.|HTTPS|iecvlist.microsoft.com| -|Microsoft forward link redirection service (FWLink)|The following endpoint is used by the Microsoft forward link redirection service (FWLink) to redirect permanent web links to their actual, sometimes transitory, URL. FWlinks are similar to URL shorteners, just longer. If you disable this endpoint, Windows Defender won't be able to update its malware definitions; links from Windows and other Microsoft products to the Web won't work; and PowerShell updateable Help won't update. To disable the traffic, instead disable the traffic that's getting forwarded.|HTTPS|go.microsoft.com| -|Microsoft Store|The following endpoint is used for the Windows Push Notification Services (WNS). WNS enables third-party developers to send toast, tile, badge, and raw updates from their own cloud service. This provides a mechanism to deliver new updates to your users in a power-efficient and dependable way. If you turn off traffic for this endpoint, push notifications will no longer work, including MDM device management, mail synchronization, settings synchronization.|HTTPS|*.wns.windows.com| -||The following endpoint is used to revoke licenses for malicious apps in the Microsoft Store. To turn off traffic for this endpoint, either uninstall the app or disable the Microsoft Store. If you disable the Microsoft Store, other Microsoft Store apps cannot be installed or updated. Additionally, the Microsoft Store won't be able to revoke malicious apps and users will still be able to open them.|HTTP|storecatalogrevocation.storequality.microsoft.com| -||The following endpoint is used to download image files that are called when applications run (Microsoft Store or Inbox MSN Apps). If you turn off traffic for these endpoints, the image files won't be downloaded, and apps cannot be installed or updated from the Microsoft Store. Additionally, the Microsoft Store won't be able to revoke malicious apps and users will still be able to open them.|HTTPS|img-prod-cms-rt-microsoft-com*|HTTPS|store-images.microsoft.com| -||The following endpoints are used to communicate with Microsoft Store. If you turn off traffic for these endpoints, apps cannot be installed or updated from the Microsoft Store. Additionally, the Microsoft Store won't be able to revoke malicious apps and users will still be able to open them.|TLS v1.2|*.md.mp.microsoft.com*| -|||HTTPS|*displaycatalog.mp.microsoft.com| -|||HTTP \ HTTPS|pti.store.microsoft.com| -|||HTTP|storeedgefd.dsx.mp.microsoft.com| -|||HTTP|markets.books.microsoft.com| -|||HTTP |share.microsoft.com| -|Network Connection Status Indicator (NCSI)| -||Network Connection Status Indicator (NCSI) detects Internet connectivity and corporate network connectivity status. NCSI sends a DNS request and HTTP query to this endpoint to determine if the device can communicate with the Internet. If you turn off traffic for this endpoint, NCSI won't be able to determine if the device is connected to the Internet and the network status tray icon will show a warning.|HTTP|www.msftconnecttest.com*| -Office|The following endpoints are used to connect to the Office 365 portal's shared infrastructure, including Office Online. For more info, see Office 365 URLs and IP address ranges. You can turn this off by removing all Microsoft Office apps and the Mail and Calendar apps. If you turn off traffic for these endpoints, users won't be able to save documents to the cloud or see their recently used documents.|HTTP|*.c-msedge.net| -|||HTTPS|*.e-msedge.net| -|||HTTPS|*.s-msedge.net| -|||HTTPS|nexusrules.officeapps.live.com| -|||HTTPS|ocos-office365-s2s.msedge.net| -|||HTTPS|officeclient.microsoft.com| -|||HTTPS|outlook.office365.com| -|||HTTPS|client-office365-tas.msedge.net| -|||HTTPS|www.office.com| -|||HTTPS|onecollector.cloudapp.aria| -|||HTTP|v10.events.data.microsoft.com/onecollector/1.0/| -|||HTTPS|self.events.data.microsoft.com| -||The following endpoint is used to connect the Office To-Do app to its cloud service. To turn off traffic for this endpoint, either uninstall the app or disable the Microsoft Store.|HTTPS|to-do.microsoft.com -|OneDrive|The following endpoints are related to OneDrive. If you turn off traffic for these endpoints, anything that relies on g.live.com to get updated URL information will no longer work.|HTTP \ HTTPS|g.live.com/1rewlive5skydrive/*| -|||HTTP|msagfx.live.com| -|||HTTPS|oneclient.sfx.ms| -|Settings|The following endpoint is used as a way for apps to dynamically update their configuration. Apps such as System Initiated User Feedback and the Xbox app use it. If you turn off traffic for this endpoint, an app that uses this endpoint may stop working.|HTTPS|cy2.settings.data.microsoft.com.akadns.net| -|||HTTPS|settings.data.microsoft.com| -|||HTTPS|settings-win.data.microsoft.com| -|Skype|The following endpoint is used to retrieve Skype configuration values. To turn off traffic for this endpoint, either uninstall the app or disable the Microsoft Store. If you disable the Microsoft store, other Microsoft Store apps cannot be installed or updated. Additionally, the Microsoft Store won't be able to revoke malicious apps and users will still be able to open them.|HTTPS|browser.pipe.aria.microsoft.com| -|||HTTP|config.edge.skype.com| -|||HTTP|s2s.config.skype.com| -|||HTTPS|skypeecs-prod-usw-0-b.cloudapp.net| -|Windows Defender|The following endpoint is used for Windows Defender when Cloud-based Protection is enabled. If you turn off traffic for this endpoint, the device will not use Cloud-based Protection.|HTTPS|wdcp.microsoft.com| -|||HTTPS|definitionupdates.microsoft.com| -|||HTTPS|go.microsoft.com| -||The following endpoints are used for Windows Defender Smartscreen reporting and notifications. If you turn off traffic for these endpoints, Smartscreen notifications will not appear.|HTTPS|*smartscreen.microsoft.com| -|||HTTPS|smartscreen-sn3p.smartscreen.microsoft.com| -|||HTTPS|unitedstates.smartscreen-prod.microsoft.com| -|Windows Spotlight|The following endpoints are used to retrieve Windows Spotlight metadata that describes content, such as references to image locations, as well as suggested apps, Microsoft account notifications, and Windows tips. If you turn off traffic for these endpoints, Windows Spotlight will still try to deliver new lock screen images and updated content but it will fail; suggested apps, Microsoft account notifications, and Windows tips will not be downloaded. For more information, see Windows Spotlight.|TLS v1.2|*.search.msn.com| -|||HTTPS|arc.msn.com| -|||HTTPS|g.msn.com*| -|||HTTPS|query.prod.cms.rt.microsoft.com| -|||HTTPS|ris.api.iris.microsoft.com| -|Windows Update|The following endpoint is used for Windows Update downloads of apps and OS updates, including HTTP downloads or HTTP downloads blended with peers. If you turn off traffic for this endpoint, Windows Update downloads will not be managed, as critical metadata that is used to make downloads more resilient is blocked. Downloads may be impacted by corruption (resulting in re-downloads of full files). Additionally, downloads of the same update by multiple devices on the same local network will not use peer devices for bandwidth reduction.|HTTPS|*.prod.do.dsp.mp.microsoft.com| -|||HTTP|cs9.wac.phicdn.net| -|||HTTP|emdl.ws.microsoft.com| -||The following endpoints are used to download operating system patches, updates, and apps from Microsoft Store. If you turn off traffic for these endpoints, the device will not be able to download updates for the operating system.|HTTP|*.dl.delivery.mp.microsoft.com| -|||HTTP|*.windowsupdate.com*| -||The following endpoints enable connections to Windows Update, Microsoft Update, and the online services of the Store. If you turn off traffic for these endpoints, the device will not be able to connect to Windows Update and Microsoft Update to help keep the device secure. Also, the device will not be able to acquire and update apps from the Store.|HTTPS|*.delivery.mp.microsoft.com| -|||HTTPS|*.update.microsoft.com| -||The following endpoint is used for content regulation. If you turn off traffic for this endpoint, the Windows Update Agent will be unable to contact the endpoint and fallback behavior will be used. This may result in content being either incorrectly.|HTTPS|tsfe.trafficshaping.dsp.mp.microsoft.com| - - -## Other Windows 10 editions - -To view endpoints for other versions of Windows 10 Enterprise, see: -- [Manage connection endpoints for Windows 10, version 1809](manage-windows-1809-endpoints.md) -- [Manage connection endpoints for Windows 10, version 1803](manage-windows-1803-endpoints.md) -- [Manage connection endpoints for Windows 10, version 1709](manage-windows-1709-endpoints.md) - -To view endpoints for non-Enterprise Windows 10 editions, see: -- [Windows 10, version 1809, connection endpoints for non-Enterprise editions](windows-endpoints-1809-non-enterprise-editions.md) -- [Windows 10, version 1803, connection endpoints for non-Enterprise editions](windows-endpoints-1803-non-enterprise-editions.md) -- [Windows 10, version 1709, connection endpoints for non-Enterprise editions](windows-endpoints-1709-non-enterprise-editions.md) - - -## Related links - -- [Office 365 URLs and IP address ranges](https://support.office.com/en-us/article/Office-365-URLs-and-IP-address-ranges-8548a211-3fe7-47cb-abb1-355ea5aa88a2?ui=en-US&rs=en-US&ad=US) -- [Network infrastructure requirements for Microsoft Intune](https://docs.microsoft.com/intune/get-started/network-infrastructure-requirements-for-microsoft-intune) - - From 89813ad60b70028b7888dde35b9011e4bdda5b49 Mon Sep 17 00:00:00 2001 From: Mike Edgar <49731348+medgarmedgar@users.noreply.github.com> Date: Thu, 9 May 2019 11:56:31 -0700 Subject: [PATCH 445/724] Delete windows-endpoints-1903-non-enterprise-editions.md --- ...-endpoints-1903-non-enterprise-editions.md | 271 ------------------ 1 file changed, 271 deletions(-) delete mode 100644 windows/privacy/windows-endpoints-1903-non-enterprise-editions.md diff --git a/windows/privacy/windows-endpoints-1903-non-enterprise-editions.md b/windows/privacy/windows-endpoints-1903-non-enterprise-editions.md deleted file mode 100644 index 44fadd939e..0000000000 --- a/windows/privacy/windows-endpoints-1903-non-enterprise-editions.md +++ /dev/null @@ -1,271 +0,0 @@ ---- -title: Windows 10, version 1809, connection endpoints for non-Enterprise editions -description: Explains what Windows 10 endpoints are used in non-Enterprise editions. -keywords: privacy, manage connections to Microsoft, Windows 10, Windows Server 2016 -ms.prod: w10 -ms.mktglfcycl: manage -ms.sitesec: library -ms.localizationpriority: high -audience: ITPro -author: danihalfin -ms.author: daniha -manager: dansimp -ms.collection: M365-security-compliance -ms.topic: article -ms.date: 6/26/2018 ---- -# Windows 10, version 1809, connection endpoints for non-Enterprise editions - - **Applies to** - -- Windows 10 Home, version 1809 -- Windows 10 Professional, version 1809 -- Windows 10 Education, version 1809 - -In addition to the endpoints listed for [Windows 10 Enterprise](manage-windows-1809-endpoints.md), the following endpoints are available on other editions of Windows 10, version 1809. - -We used the following methodology to derive these network endpoints: - -1. Set up the latest version of Windows 10 on a test virtual machine using the default settings. -2. Leave the devices running idle for a week (that is, a user is not interacting with the system/device). -3. Use globally accepted network protocol analyzer/capturing tools and log all background egress traffic. -4. Compile reports on traffic going to public IP addresses. -5. The test virtual machine was logged in using a local account and was not joined to a domain or Azure Active Directory. -6. All traffic was captured in our lab using a IPV4 network. Therefore no IPV6 traffic is reported here. - -> [!NOTE] -> Microsoft uses global load balancers that can appear in network trace-routes. For example, an endpoint for *.akadns.net might be used to load balance requests to an Azure datacenter, which can change over time. - -## Windows 10 Family - -| **Destination** | **Protocol** | **Description** | -| --- | --- | --- | -|\*.aria.microsoft.com*|HTTPS|Microsoft Office Telemetry -|\*.b.akamai*.net|HTTPS|Used to check for updates to Maps that have been downloaded for offline use -|\*.c-msedge.net|HTTP|Microsoft Office -|\*.dl.delivery.mp.microsoft.com*|HTTP|Enables connections to Windows Update -|\*.download.windowsupdate.com*|HTTP|Used to download operating system patches and updates -|\*.g.akamai*.net|HTTPS|Used to check for updates to Maps that have been downloaded for offline use -|\*.login.msa.*.net|HTTPS|Microsoft Account related -|\*.msn.com*|TLSv1.2/HTTPS|Windows Spotlight -|\*.skype.com|HTTP/HTTPS|Skype -|\*.smartscreen.microsoft.com*|HTTPS|Windows Defender Smartscreen -|\*.telecommand.telemetry.microsoft.com*|HTTPS|Used by Windows Error Reporting -|*cdn.onenote.net*|HTTP|OneNote -|*displaycatalog.*mp.microsoft.com*|HTTPS|Used to communicate with Microsoft Store -|*emdl.ws.microsoft.com*|HTTP|Windows Update -|*geo-prod.do.dsp.mp.microsoft.com*|TLSv1.2/HTTPS|Enables connections to Windows Update -|*hwcdn.net*|HTTP|Highwinds Content Delivery Network / Windows updates -|*img-prod-cms-rt-microsoft-com*|HTTPS|Microsoft Store or Inbox MSN Apps image download -|*licensing.*mp.microsoft.com*|HTTPS|Licensing -|*maps.windows.com*|HTTPS|Related to Maps application -|*msedge.net*|HTTPS|Used by Microsoft OfficeHub to get the metadata of Microsoft Office apps -|*nexusrules.officeapps.live.com*|HTTPS|Microsoft Office Telemetry -|*photos.microsoft.com*|HTTPS|Photos App -|*prod.do.dsp.mp.microsoft.com*|TLSv1.2/HTTPS|Used for Windows Update downloads of apps and OS updates -|*purchase.md.mp.microsoft.com.akadns.net|HTTPS|Used to communicate with Microsoft Store -|*settings.data.microsoft.com.akadns.net|HTTPS|Used for Windows apps to dynamically update their configuration -|*wac.phicdn.net*|HTTP|Windows Update -|*windowsupdate.com*|HTTP|Windows Update -|*wns.*windows.com*|TLSv1.2/HTTPS|Used for the Windows Push Notification Services (WNS) -|*wpc.v0cdn.net*|HTTP|Windows Telemetry -|arc.msn.com|HTTPS|Spotlight -|auth.gfx.ms*|HTTPS|MSA related -|cdn.onenote.net|HTTPS|OneNote Live Tile -|dmd.metaservices.microsoft.com*|HTTP|Device Authentication -|e-0009.e-msedge.net|HTTPS|Microsoft Office -|e10198.b.akamaiedge.net|HTTPS|Maps application -|evoke-windowsservices-tas.msedge*|HTTPS|Photos app -|fe2.update.microsoft.com*|TLSv1.2/HTTPS|Enables connections to Windows Update, Microsoft Update, and the online services of Microsoft Store -|fe3.*.mp.microsoft.com.*|TLSv1.2/HTTPS|Windows Update, Microsoft Update, and Microsoft Store services -|g.live.com*|HTTPS|OneDrive -|go.microsoft.com|HTTP|Windows Defender -|iriscoremetadataprod.blob.core.windows.net|HTTPS|Windows Telemetry -|login.live.com|HTTPS|Device Authentication -|msagfx.live.com|HTTP|OneDrive -|ocsp.digicert.com*|HTTP|CRL and OCSP checks to the issuing certificate authorities -|officeclient.microsoft.com|HTTPS|Microsoft Office -|oneclient.sfx.ms*|HTTPS|Used by OneDrive for Business to download and verify app updates -|onecollector.cloudapp.aria.akadns.net|HTTPS|Microsoft Office -|ow1.res.office365.com|HTTP|Microsoft Office -|pti.store.microsoft.com|HTTPS|Microsoft Store -|purchase.mp.microsoft.com*|HTTPS|Used to communicate with Microsoft Store -|query.prod.cms.rt.microsoft.com*|HTTPS|Used to retrieve Windows Spotlight metadata -|ris.api.iris.microsoft.com*|TLSv1.2/HTTPS|Used to retrieve Windows Spotlight metadata -|ris-prod-atm.trafficmanager.net|HTTPS|Azure traffic manager -|s-0001.s-msedge.net|HTTPS|Microsoft Office -|self.events.data.microsoft.com|HTTPS|Microsoft Office -|settings.data.microsoft.com*|HTTPS|Used for Windows apps to dynamically update their configuration -|settings-win.data.microsoft.com*|HTTPS|Used for Windows apps to dynamically update their configuration -|share.microsoft.com|HTTPS|Microsoft Store -|skypeecs-prod-usw-0.cloudapp.net|HTTPS|Microsoft Store -|sls.update.microsoft.com*|TLSv1.2/HTTPS|Enables connections to Windows Update -|slscr.update.microsoft.com*|HTTPS|Enables connections to Windows Update -|store*.dsx.mp.microsoft.com*|HTTPS|Used to communicate with Microsoft Store -|storecatalogrevocation.storequality.microsoft.com|HTTPS|Microsoft Store -|storecatalogrevocation.storequality.microsoft.com*|HTTPS|Used to revoke licenses for malicious apps on the Microsoft Store -|store-images.*microsoft.com*|HTTP|Used to get images that are used for Microsoft Store suggestions -|storesdk.dsx.mp.microsoft.com|HTTP|Microsoft Store -|tile-service.weather.microsoft.com*|HTTP|Used to download updates to the Weather app Live Tile -|time.windows.com|HTTP|Microsoft Windows Time related -|tsfe.trafficshaping.dsp.mp.microsoft.com*|TLSv1.2/HTTPS|Used for content regulation -|v10.events.data.microsoft.com|HTTPS|Diagnostic Data -|watson.telemetry.microsoft.com|HTTPS|Diagnostic Data -|wdcp.microsoft.*|TLSv1.2, HTTPS|Used for Windows Defender when Cloud-based Protection is enabled -|wd-prod-cp-us-west-1-fe.westus.cloudapp.azure.com|HTTPS|Windows Defender -|wusofficehome.msocdn.com|HTTPS|Microsoft Office -|www.bing.com*|HTTP|Used for updates for Cortana, apps, and Live Tiles -|www.msftconnecttest.com|HTTP|Network Connection (NCSI) -|www.office.com|HTTPS|Microsoft Office - - -## Windows 10 Pro - -| **Destination** | **Protocol** | **Description** | -| --- | --- | --- | -|\*.cloudapp.azure.com|HTTPS|Azure -|\*.delivery.dsp.mp.microsoft.com.nsatc.net|HTTPS|Windows Update, Microsoft Update, and Microsoft Store services -|\*.displaycatalog.md.mp.microsoft.com.akadns.net|HTTPS|Microsoft Store -|\*.dl.delivery.mp.microsoft.com*|HTTP|Enables connections to Windows Update -|\*.e-msedge.net|HTTPS|Used by OfficeHub to get the metadata of Office apps -|\*.g.akamaiedge.net|HTTPS|Used to check for updates to maps that have been downloaded for offline use -|\*.s-msedge.net|HTTPS|Used by OfficeHub to get the metadata of Office apps -|\*.windowsupdate.com*|HTTP|Enables connections to Windows Update -|\*.wns.notify.windows.com.akadns.net|HTTPS|Used for the Windows Push Notification Services (WNS) -|\*dsp.mp.microsoft.com.nsatc.net|HTTPS|Enables connections to Windows Update -|\*c-msedge.net|HTTP|Office -|a1158.g.akamai.net|HTTP|Maps application -|arc.msn.com*|HTTP / HTTPS|Used to retrieve Windows Spotlight metadata -|blob.mwh01prdstr06a.store.core.windows.net|HTTPS|Microsoft Store -|browser.pipe.aria.microsoft.com|HTTPS|Microsoft Office -|bubblewitch3mobile.king.com|HTTPS|Bubble Witch application -|candycrush.king.com|HTTPS|Candy Crush application -|cdn.onenote.net|HTTP|Microsoft OneNote -|cds.p9u4n2q3.hwcdn.net|HTTP|Highwinds Content Delivery Network traffic for Windows updates -|client.wns.windows.com|HTTPS|Winddows Notification System -|co4.telecommand.telemetry.microsoft.com.akadns.net|HTTPS|Windows Error Reporting -|config.edge.skype.com|HTTPS|Microsoft Skype -|cs11.wpc.v0cdn.net|HTTP|Windows Telemetry -|cs9.wac.phicdn.net|HTTP|Windows Update -|cy2.licensing.md.mp.microsoft.com.akadns.net|HTTPS|Used to communicate with Microsoft Store -|cy2.purchase.md.mp.microsoft.com.akadns.net|HTTPS|Used to communicate with Microsoft Store -|cy2.settings.data.microsoft.com.akadns.net|HTTPS|Used to communicate with Microsoft Store -|dmd.metaservices.microsoft.com.akadns.net|HTTP|Device Authentication -|e-0009.e-msedge.net|HTTPS|Microsoft Office -|e10198.b.akamaiedge.net|HTTPS|Maps application -|fe3.update.microsoft.com|HTTPS|Windows Update -|g.live.com|HTTPS|Microsoft OneDrive -|g.msn.com.nsatc.net|HTTPS|Used to retrieve Windows Spotlight metadata -|geo-prod.do.dsp.mp.microsoft.com|HTTPS|Windows Update -|go.microsoft.com|HTTP|Windows Defender -|iecvlist.microsoft.com|HTTPS|Microsoft Edge -|img-prod-cms-rt-microsoft-com.akamaized.net|HTTP / HTTPS|Microsoft Store -|ipv4.login.msa.akadns6.net|HTTPS|Used for Microsoft accounts to sign in -|licensing.mp.microsoft.com|HTTP|Licensing -|location-inference-westus.cloudapp.net|HTTPS|Used for location data -|login.live.com|HTTP|Device Authentication -|maps.windows.com|HTTP|Maps application -|modern.watson.data.microsoft.com.akadns.net|HTTPS|Used by Windows Error Reporting -|msagfx.live.com|HTTP|OneDrive -|nav.smartscreen.microsoft.com|HTTPS|Windows Defender -|ocsp.digicert.com*|HTTP|CRL and OCSP checks to the issuing certificate authorities -|oneclient.sfx.ms|HTTP|OneDrive -|pti.store.microsoft.com|HTTPS|Microsoft Store -|ris.api.iris.microsoft.com.akadns.net|HTTPS|Used to retrieve Windows Spotlight metadata -|ris-prod-atm.trafficmanager.net|HTTPS|Azure -|s2s.config.skype.com|HTTP|Microsoft Skype -|settings-win.data.microsoft.com|HTTPS|Application settings -|share.microsoft.com|HTTPS|Microsoft Store -|skypeecs-prod-usw-0.cloudapp.net|HTTPS|Microsoft Skype -|slscr.update.microsoft.com|HTTPS|Windows Update -|storecatalogrevocation.storequality.microsoft.com|HTTPS|Microsoft Store -|store-images.microsoft.com|HTTPS|Microsoft Store -|tile-service.weather.microsoft.com/*|HTTP|Used to download updates to the Weather app Live Tile -|time.windows.com|HTTP|Windows time -|tsfe.trafficshaping.dsp.mp.microsoft.com|HTTPS|Used for content regulation -|v10.events.data.microsoft.com*|HTTPS|Microsoft Office -|vip5.afdorigin-prod-am02.afdogw.com|HTTPS|Used to serve office 365 experimentation traffic -|watson.telemetry.microsoft.com|HTTPS|Telemetry -|wdcp.microsoft.com|HTTPS|Windows Defender -|wusofficehome.msocdn.com|HTTPS|Microsoft Office -|www.bing.com|HTTPS|Cortana and Search -|www.microsoft.com|HTTP|Diagnostic -|www.msftconnecttest.com|HTTP|Network connection -|www.office.com|HTTPS|Microsoft Office - - - -## Windows 10 Education - -| **Destination** | **Protocol** | **Description** | -| --- | --- | --- | -|\*.b.akamaiedge.net|HTTPS|Used to check for updates to maps that have been downloaded for offline use -|\*.c-msedge.net|HTTP|Used by OfficeHub to get the metadata of Office apps -|\*.dl.delivery.mp.microsoft.com*|HTTP|Windows Update -|\*.e-msedge.net|HTTPS|Used by OfficeHub to get the metadata of Office apps -|\*.g.akamaiedge.net|HTTPS|Used to check for updates to Maps that have been downloaded for offline use -|\*.licensing.md.mp.microsoft.com.akadns.net|HTTPS|Microsoft Store -|\*.settings.data.microsoft.com.akadns.net|HTTPS|Microsoft Store -|\*.skype.com*|HTTPS|Used to retrieve Skype configuration values -|\*.smartscreen*.microsoft.com|HTTPS|Windows Defender -|\*.s-msedge.net|HTTPS|Used by OfficeHub to get the metadata of Office apps -|\*.telecommand.telemetry.microsoft.com*|HTTPS|Used by Windows Error Reporting -|\*.wac.phicdn.net|HTTP|Windows Update -|\*.windowsupdate.com*|HTTP|Windows Update -|\*.wns.windows.com|HTTPS|Windows Notifications Service -|\*.wpc.*.net|HTTP|Diagnostic Data -|\*displaycatalog.md.mp.microsoft.com.akadns.net|HTTPS|Microsoft Store -|\*dsp.mp.microsoft.com|HTTPS|Windows Update -|a1158.g.akamai.net|HTTP|Maps -|a122.dscg3.akamai.net|HTTP|Maps -|a767.dscg3.akamai.net|HTTP|Maps -|au.download.windowsupdate.com*|HTTP|Windows Update -|bing.com/*|HTTPS|Used for updates for Cortana, apps, and Live Tiles -|blob.dz5prdstr01a.store.core.windows.net|HTTPS|Microsoft Store -|browser.pipe.aria.microsoft.com|HTTP|Used by OfficeHub to get the metadata of Office apps -|cdn.onenote.net/livetile/*|HTTPS|Used for OneNote Live Tile -|cds.p9u4n2q3.hwcdn.net|HTTP|Used by the Highwinds Content Delivery Network to perform Windows updates -|client-office365-tas.msedge.net/*|HTTPS|Office 365 porta and Office Online -|ctldl.windowsupdate.com*|HTTP|Used to download certificates that are publicly known to be fraudulent -|displaycatalog.mp.microsoft.com/*|HTTPS|Microsoft Store -|dmd.metaservices.microsoft.com*|HTTP|Device Authentication -|download.windowsupdate.com*|HTTPS|Windows Update -|emdl.ws.microsoft.com/*|HTTP|Used to download apps from the Microsoft Store -|evoke-windowsservices-tas.msedge.net|HTTPS|Photo app -|fe2.update.microsoft.com*|HTTPS|Windows Update, Microsoft Update, Microsoft Store services -|fe3.delivery.dsp.mp.microsoft.com.nsatc.net|HTTPS|Windows Update, Microsoft Update, Microsoft Store services -|fe3.delivery.mp.microsoft.com*|HTTPS|Windows Update, Microsoft Update, Microsoft Store services -|g.live.com*|HTTPS|Used by OneDrive for Business to download and verify app updates -|g.msn.com.nsatc.net|HTTPS|Used to retrieve Windows Spotlight metadata -|go.microsoft.com|HTTP|Windows Defender -|iecvlist.microsoft.com|HTTPS|Microsoft Edge browser -|ipv4.login.msa.akadns6.net|HTTPS|Used for Microsoft accounts to sign in -|licensing.mp.microsoft.com*|HTTPS|Used for online activation and some app licensing -|login.live.com|HTTPS|Device Authentication -|maps.windows.com/windows-app-web-link|HTTPS|Maps application -|modern.watson.data.microsoft.com.akadns.net|HTTPS|Used by Windows Error Reporting -|msagfx.live.com|HTTPS|OneDrive -|ocos-office365-s2s.msedge.net/*|HTTPS|Used to connect to the Office 365 portal's shared infrastructure -|ocsp.digicert.com*|HTTP|CRL and OCSP checks to the issuing certificate authorities -|oneclient.sfx.ms/*|HTTPS|Used by OneDrive for Business to download and verify app updates -|onecollector.cloudapp.aria.akadns.net|HTTPS|Microsoft Office -|pti.store.microsoft.com|HTTPS|Microsoft Store -|settings-win.data.microsoft.com/settings/*|HTTPS|Used as a way for apps to dynamically update their configuration -|share.microsoft.com|HTTPS|Microsoft Store -|skypeecs-prod-usw-0.cloudapp.net|HTTPS|Skype -|sls.update.microsoft.com*|HTTPS|Windows Update -|storecatalogrevocation.storequality.microsoft.com*|HTTPS|Used to revoke licenses for malicious apps on the Microsoft Store -|tile-service.weather.microsoft.com*|HTTP|Used to download updates to the Weather app Live Tile -|tsfe.trafficshaping.dsp.mp.microsoft.com|HTTPS|Windows Update -|v10.events.data.microsoft.com*|HTTPS|Diagnostic Data -|vip5.afdorigin-prod-ch02.afdogw.com|HTTPS|Used to serve Office 365 experimentation traffic -|watson.telemetry.microsoft.com*|HTTPS|Used by Windows Error Reporting -|wdcp.microsoft.com|HTTPS|Windows Defender -|wd-prod-cp-us-east-1-fe.eastus.cloudapp.azure.com|HTTPS|Azure -|wusofficehome.msocdn.com|HTTPS|Microsoft Office -|www.bing.com|HTTPS|Cortana and Search -|www.microsoft.com|HTTP|Diagnostic Data -|www.microsoft.com/pkiops/certs/*|HTTP|CRL and OCSP checks to the issuing certificate authorities -|www.msftconnecttest.com|HTTP|Network Connection -|www.office.com|HTTPS|Microsoft Office - From 22f42b2e9b3504d4b4e914bddd077a9aa2f2936d Mon Sep 17 00:00:00 2001 From: Greg Lindsay Date: Thu, 9 May 2019 12:12:43 -0700 Subject: [PATCH 446/724] draft --- windows/deployment/upgrade/setupdiag.md | 24 ++++++++++++++++++++---- 1 file changed, 20 insertions(+), 4 deletions(-) diff --git a/windows/deployment/upgrade/setupdiag.md b/windows/deployment/upgrade/setupdiag.md index 9b97b16be8..a8dc80f2ef 100644 --- a/windows/deployment/upgrade/setupdiag.md +++ b/windows/deployment/upgrade/setupdiag.md @@ -7,7 +7,6 @@ ms.mktglfcycl: deploy ms.sitesec: library ms.pagetype: deploy author: greg-lindsay -ms.date: 12/18/2018 ms.localizationpriority: medium ms.topic: article --- @@ -25,7 +24,7 @@ ms.topic: article ## About SetupDiag -Current version of SetupDiag: 1.4.0.0 +Current version of SetupDiag: 1.4.1.0 SetupDiag is a standalone diagnostic tool that can be used to obtain details about why a Windows 10 upgrade was unsuccessful. @@ -64,8 +63,9 @@ The [Release notes](#release-notes) section at the bottom of this topic has info | /Output:\ |
  • This optional parameter enables you to specify the output file for results. This is where you will find what SetupDiag was able to determine. Only text format output is supported. UNC paths will work, provided the context under which SetupDiag runs has access to the UNC path. If the path has a space in it, you must enclose the entire path in double quotes (see the example section below).
  • Default: If not specified, SetupDiag will create the file **SetupDiagResults.log** in the same directory where SetupDiag.exe is run.
| | /LogsPath:\ |
  • This optional parameter tells SetupDiag.exe where to find the log files for an offline analysis. These log files can be in a flat folder format, or containing multiple subdirectories. SetupDiag will recursively search all child directories.
| | /ZipLogs:\ |
  • This optional parameter tells SetupDiag.exe to create a zip file containing the results and all the log files it parsed. The zip file is created in the same directory where SetupDiag.exe is run.
  • Default: If not specified, a value of 'true' is used.
| -| /Verbose |
  • This optional parameter will output much more data to a log file. By default, SetupDiag will only produce a log file entry for serious errors. Using **/Verbose** will cause SetupDiag to always produce an additional log file with debugging details. These details can be useful when reporting a problem with SetupDiag.
| | /Format:\ |
  • This optional parameter can be used to output log files in xml or JSON format. If this parameter is not specified, text format is used by default.
| +| /Scenario:\[Recovery\] | This optional parameter instructs SetupDiag.exe to look for and process reset and recovery logs and ignore setup/upgrade logs.| +| /Verbose |
  • This optional parameter will output much more data to a log file. By default, SetupDiag will only produce a log file entry for serious errors. Using **/Verbose** will cause SetupDiag to always produce an additional log file with debugging details. These details can be useful when reporting a problem with SetupDiag.
| | /NoTel |
  • This optional parameter tells SetupDiag.exe not to send diagnostic telemetry to Microsoft.
| Note: The **/Mode** parameter is deprecated in version 1.4.0.0 of SetupDiag. @@ -97,6 +97,19 @@ The following example specifies that SetupDiag is to run in offline mode, and to SetupDiag.exe /Output:C:\SetupDiag\Results.log /LogsPath:D:\Temp\Logs\LogSet1 ``` +The following example sets recovery scenario in offline mode. In the example, SetupDiag will search for reset/recovery logs in the specified LogsPath location and output the resuts to the directory specified by the /Output parameter. + +``` +SetupDiag.exe /Output:C:\SetupDiag\RecoveryResults.log /LogsPath:D:\Temp\Cabs\PBR_Log /Scenario:Recovery +``` + +The following example sets recovery scenario in online mode. In the example, SetupDiag will search for reset/recovery logs on the current system and output results in XML format. + +``` +SetupDiag.exe /Scenario:Recovery /Format:xml +``` + + ## Log files [Windows Setup Log Files and Event Logs](https://docs.microsoft.com/windows-hardware/manufacture/desktop/windows-setup-log-files-and-event-logs) has information about where logs are created during Windows Setup. For offline processing, you should run SetupDiag against the contents of the entire folder. For example, depending on when the upgrade failed, copy one of the following folders to your offline location: @@ -141,7 +154,7 @@ The output also provides an error code 0xC1900208 - 0x4000C which corresponds to ``` C:\SetupDiag>SetupDiag.exe /Output:C:\SetupDiag\Results.log /LogsPath:C:\Temp\BobMacNeill -SetupDiag v1.4.0.0 +SetupDiag v1.4.1.0 Copyright (c) Microsoft Corporation. All rights reserved. Searching for setup logs, this can take a minute or more depending on the number and size of the logs...please wait. @@ -397,6 +410,9 @@ Each rule name and its associated unique rule identifier are listed with a descr ## Release notes +05/10/2019 - SetupDiag v1.4.1.0 is released with 53 rules, as a standalone tool available from the Download Center. + - This release dds the ability to find and diagnose reset and recovery failures (Push Button Reset). + 12/18/2018 - SetupDiag v1.4.0.0 is released with 53 rules, as a standalone tool available from the Download Center. - This release includes major improvements in rule processing performance: ~3x faster rule processing performance! - The FindDownlevelFailure rule is up to 10x faster. From aeb325db764df3de68061c8ecad1b01c22b08de7 Mon Sep 17 00:00:00 2001 From: Daniel Simpson Date: Thu, 9 May 2019 12:56:34 -0700 Subject: [PATCH 447/724] Update microsoft-defender-atp-mac.md Edits --- .../windows-defender-antivirus/microsoft-defender-atp-mac.md | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/windows/security/threat-protection/windows-defender-antivirus/microsoft-defender-atp-mac.md b/windows/security/threat-protection/windows-defender-antivirus/microsoft-defender-atp-mac.md index 416840ac2d..8a8a11ac75 100644 --- a/windows/security/threat-protection/windows-defender-antivirus/microsoft-defender-atp-mac.md +++ b/windows/security/threat-protection/windows-defender-antivirus/microsoft-defender-atp-mac.md @@ -84,4 +84,4 @@ SIP is a built-in macOS security feature that prevents low-level tampering with ## Resources -For further information on logging, uninstalling, the ATP portal, or known issues, see our [Resources](microsoft-defender-atp-mac-resources) page. \ No newline at end of file +For additional information about logging, uninstalling, or known issues, see our [Resources](microsoft-defender-atp-mac-resources) page. From 0c7afd2190b914bf0d2899a961a48ec2411c097c Mon Sep 17 00:00:00 2001 From: Daniel Simpson Date: Thu, 9 May 2019 13:00:14 -0700 Subject: [PATCH 448/724] Update microsoft-defender-atp-mac-resources.md Edits --- .../microsoft-defender-atp-mac-resources.md | 18 +++++++++--------- 1 file changed, 9 insertions(+), 9 deletions(-) diff --git a/windows/security/threat-protection/windows-defender-antivirus/microsoft-defender-atp-mac-resources.md b/windows/security/threat-protection/windows-defender-antivirus/microsoft-defender-atp-mac-resources.md index c7d8d338eb..8af686d049 100644 --- a/windows/security/threat-protection/windows-defender-antivirus/microsoft-defender-atp-mac-resources.md +++ b/windows/security/threat-protection/windows-defender-antivirus/microsoft-defender-atp-mac-resources.md @@ -33,7 +33,7 @@ Microsoft Defender ATP for Mac is not yet widely available, and this topic only If you can reproduce a problem, please increase the logging level, run the system for some time, and restore the logging level to the default. -1) Increase logging level: +1. Increase logging level: ```bash mavel-mojave:~ testuser$ mdatp log-level --verbose @@ -42,9 +42,9 @@ If you can reproduce a problem, please increase the logging level, run the syste Operation succeeded ``` -2) Reproduce the problem +2. Reproduce the problem -3) Run `mdatp --diagnostic` to backup Defender ATP's logs. The command will print out location with generated zip file. +3. Run `mdatp --diagnostic` to backup Defender ATP's logs. The command will print out location with generated zip file. ```bash mavel-mojave:~ testuser$ mdatp --diagnostic @@ -53,7 +53,7 @@ If you can reproduce a problem, please increase the logging level, run the syste "/Library/Application Support/Microsoft/Defender/wdavdiag/d85e7032-adf8-434a-95aa-ad1d450b9a2f.zip" ``` -4) Restore logging level: +4. Restore logging level: ```bash mavel-mojave:~ testuser$ mdatp log-level --info @@ -131,15 +131,15 @@ Important tasks, such as controlling product settings and triggering on-demand s |Protection |Cancel an ongoing on-demand scan |`mdatp scan --cancel` | |Protection |Request a definition update |`mdatp --signature-update` | -## What to expect in the ATP portal - -- AV alerts: +## Microsoft Defender ATP portal information +In the Microsoft Defender ATP portal, you'll see two categories of information: +- AV alerts, including: - Severity - Scan type - Device information (hostname, machine identifier, tenant identifier, app version, and OS type) - File information (name, path, size, and hash) - Threat information (name, type, and state) -- Device information: +- Device information, including: - Machine identifier - Tenant identifier - App version @@ -155,4 +155,4 @@ Important tasks, such as controlling product settings and triggering on-demand s - Not fully optimized for performance or disk space yet. - Full Windows Defender ATP integration is not available yet. - Mac devices that switch networks may appear multiple times in the APT portal. -- Centrally managed uninstall via Intune is still in development. As an alternative, manually uninstall Microsoft Defender ATP for Mac from each client device. \ No newline at end of file +- Centrally managed uninstall via Intune is still in development. As an alternative, manually uninstall Microsoft Defender ATP for Mac from each client device. From 8b6c29d5325aa3f5b15a61db64f46e515c7b9711 Mon Sep 17 00:00:00 2001 From: Jina Yoon <45857656+msft-jinayoon@users.noreply.github.com> Date: Thu, 9 May 2019 16:28:26 -0400 Subject: [PATCH 449/724] Updating Domain/ComputerName node info MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit Incorporating the following info: • This node edits the DNS hostname of the computer. • If using the %RAND:x% or %SERIAL% macros, the new name is limited to 15 characters • If the serial number generated from the %SERIAL% macro is too long, the serial number will be truncated from the beginning of the serial number sequence, not the end. (e.g. 123ABCDEF456 --> CDEF456) • If the new name is a constant string (i.e. not using any of the macros) the new name can be up to 63 characters long • Validation for accepted characters are based on the SetComputerNameEx function: https://docs.microsoft.com/en-us/windows/desktop/api/sysinfoapi/nf-sysinfoapi-setcomputernameexa • This node does not work properly for hybrid-joined AAD/AD devices (it only works for fully AAD joined devices) I would love feedback and additional edits on how to make the proposed changes more customer-doc-friendly. Thanks! --- windows/client-management/mdm/accounts-csp.md | 10 +++++++--- 1 file changed, 7 insertions(+), 3 deletions(-) diff --git a/windows/client-management/mdm/accounts-csp.md b/windows/client-management/mdm/accounts-csp.md index 19820b0309..18e6657277 100644 --- a/windows/client-management/mdm/accounts-csp.md +++ b/windows/client-management/mdm/accounts-csp.md @@ -26,9 +26,13 @@ Root node. Interior node for the account domain information. **Domain/ComputerName** -This node specifies the name for a device. This setting can be managed remotely. A couple of macros can be embedded within the value for dynamic substitution: %RAND:<# of digits>% and %SERIAL%. +This node specifies the DNS hostname for a device. This setting can be managed remotely, but note that this not supported for devices hybrid joined to Azure Active Directory and an on-premises Active directory. The server must explicitly reboot the device for this value to take effect. A couple of macros can be embedded within the value for dynamic substitution. Using any of these macros will limit the new name to 15 characters. -Examples: (a) "Test%RAND:6%" will generate a name "Test" followed by 6 random digits (e.g., "Test123456"). (b) "Foo%SERIAL%", will generate a name "Foo" followed by the serial number derived from device's ID. The server must explicitly reboot the device for this value to take effect. +Available naming macros: +|Macro|Description|Example|Generated Name| +|:---|:---|:---|:---| +|%RAND:<# of digits>|Generates the specified number of random digits.|Test%RAND:6%|Test123456| +|%SERIAL%|Generates the serial number derived from the device. If the serial number causes the new name to exceed the 15 character limit, the serial number will be truncated from the beginning of the sequence.|Test-Device-%SERIAL%|Test-Device-456| Supported operation is Add. @@ -46,4 +50,4 @@ Supported operation is Add. **Users/_UserName_/LocalUserGroup** This optional node specifies the local user group that a local user account should be joined to. If the node is not set, the new local user account is joined just to the Standard Users group. Set the value to 2 for Administrators group. This setting can be managed remotely. -Supported operation is Add. \ No newline at end of file +Supported operation is Add. From 15fa5a43139094203763b0bcb8f43ac3902b65e6 Mon Sep 17 00:00:00 2001 From: martyav Date: Thu, 9 May 2019 16:29:44 -0400 Subject: [PATCH 450/724] reworded [!IMPORTANT] for redundancy --- .../microsoft-defender-atp-mac-install-manually.md | 6 +----- .../microsoft-defender-atp-mac-install-with-intune.md | 6 +----- .../microsoft-defender-atp-mac-install-with-jamf.md | 6 +----- .../microsoft-defender-atp-mac-resources.md | 7 ++----- .../microsoft-defender-atp-mac.md | 6 ++---- 5 files changed, 7 insertions(+), 24 deletions(-) diff --git a/windows/security/threat-protection/windows-defender-antivirus/microsoft-defender-atp-mac-install-manually.md b/windows/security/threat-protection/windows-defender-antivirus/microsoft-defender-atp-mac-install-manually.md index 1df8b31e64..13edfebf77 100644 --- a/windows/security/threat-protection/windows-defender-antivirus/microsoft-defender-atp-mac-install-manually.md +++ b/windows/security/threat-protection/windows-defender-antivirus/microsoft-defender-atp-mac-install-manually.md @@ -22,12 +22,8 @@ ms.topic: conceptual **Applies to:** [Windows Defender Advanced Threat Protection (Windows Defender ATP) for Mac](microsoft-defender-atp-mac.md) - ->[!IMPORTANT] ->Some information relates to prereleased product which may be substantially modified before it's commercially released. Microsoft makes no warranties, express or implied, with respect to the information provided here. -This topic describes how to install Microsoft Defender ATP for Mac. It supports the preview program and the information here is subject to change. -Microsoft Defender ATP for Mac is not yet widely available, and this topic only applies to enterprise customers who have been accepted into the preview program. +>[!IMPORTANT]This topic relates to the pre-release version of Microsoft Defender ATP for Mac. Microsoft Defender ATP for Mac is not yet widely available, and this topic only applies to enterprise customers who have been accepted into the preview program. Microsoft makes no warranties, express or implied, with respect to the information provided here. ## Prerequisites and system requirements diff --git a/windows/security/threat-protection/windows-defender-antivirus/microsoft-defender-atp-mac-install-with-intune.md b/windows/security/threat-protection/windows-defender-antivirus/microsoft-defender-atp-mac-install-with-intune.md index 54e0829561..c1568dc518 100644 --- a/windows/security/threat-protection/windows-defender-antivirus/microsoft-defender-atp-mac-install-with-intune.md +++ b/windows/security/threat-protection/windows-defender-antivirus/microsoft-defender-atp-mac-install-with-intune.md @@ -23,11 +23,7 @@ ms.topic: conceptual [Windows Defender Advanced Threat Protection (Windows Defender ATP) for Mac](microsoft-defender-atp-mac.md) ->[!IMPORTANT] ->Some information relates to prereleased product which may be substantially modified before it's commercially released. Microsoft makes no warranties, express or implied, with respect to the information provided here. - -This topic describes how to install Microsoft Defender ATP for Mac. It supports the preview program and the information here is subject to change. -Microsoft Defender ATP for Mac is not yet widely available, and this topic only applies to enterprise customers who have been accepted into the preview program. +>[!IMPORTANT]This topic relates to the pre-release version of Microsoft Defender ATP for Mac. Microsoft Defender ATP for Mac is not yet widely available, and this topic only applies to enterprise customers who have been accepted into the preview program. Microsoft makes no warranties, express or implied, with respect to the information provided here. ## Prerequisites and system requirements diff --git a/windows/security/threat-protection/windows-defender-antivirus/microsoft-defender-atp-mac-install-with-jamf.md b/windows/security/threat-protection/windows-defender-antivirus/microsoft-defender-atp-mac-install-with-jamf.md index 3e4122d3a0..e3ff4b865a 100644 --- a/windows/security/threat-protection/windows-defender-antivirus/microsoft-defender-atp-mac-install-with-jamf.md +++ b/windows/security/threat-protection/windows-defender-antivirus/microsoft-defender-atp-mac-install-with-jamf.md @@ -22,12 +22,8 @@ ms.topic: conceptual **Applies to:** [Windows Defender Advanced Threat Protection (Windows Defender ATP) for Mac](microsoft-defender-atp-mac.md) - ->[!IMPORTANT] ->Some information relates to prereleased product which may be substantially modified before it's commercially released. Microsoft makes no warranties, express or implied, with respect to the information provided here. -This topic describes how to install Microsoft Defender ATP for Mac. It supports the preview program and the information here is subject to change. -Microsoft Defender ATP for Mac is not yet widely available, and this topic only applies to enterprise customers who have been accepted into the preview program. +>[!IMPORTANT]This topic relates to the pre-release version of Microsoft Defender ATP for Mac. Microsoft Defender ATP for Mac is not yet widely available, and this topic only applies to enterprise customers who have been accepted into the preview program. Microsoft makes no warranties, express or implied, with respect to the information provided here. ## Prerequisites and system requirements diff --git a/windows/security/threat-protection/windows-defender-antivirus/microsoft-defender-atp-mac-resources.md b/windows/security/threat-protection/windows-defender-antivirus/microsoft-defender-atp-mac-resources.md index 8af686d049..d2f6dcffa8 100644 --- a/windows/security/threat-protection/windows-defender-antivirus/microsoft-defender-atp-mac-resources.md +++ b/windows/security/threat-protection/windows-defender-antivirus/microsoft-defender-atp-mac-resources.md @@ -22,12 +22,8 @@ ms.topic: conceptual **Applies to:** [Windows Defender Advanced Threat Protection (Windows Defender ATP) for Mac](microsoft-defender-atp.md) - ->[!IMPORTANT] ->Some information relates to prereleased product which may be substantially modified before it's commercially released. Microsoft makes no warranties, express or implied, with respect to the information provided here. -This topic describes how to use, and details about, Microsoft Defender ATP for Mac. It supports the preview program and the information here is subject to change. -Microsoft Defender ATP for Mac is not yet widely available, and this topic only applies to enterprise customers who have been accepted into the preview program. +>[!IMPORTANT]This topic relates to the pre-release version of Microsoft Defender ATP for Mac. Microsoft Defender ATP for Mac is not yet widely available, and this topic only applies to enterprise customers who have been accepted into the preview program. Microsoft makes no warranties, express or implied, with respect to the information provided here. ## Collecting diagnostic information @@ -133,6 +129,7 @@ Important tasks, such as controlling product settings and triggering on-demand s ## Microsoft Defender ATP portal information In the Microsoft Defender ATP portal, you'll see two categories of information: + - AV alerts, including: - Severity - Scan type diff --git a/windows/security/threat-protection/windows-defender-antivirus/microsoft-defender-atp-mac.md b/windows/security/threat-protection/windows-defender-antivirus/microsoft-defender-atp-mac.md index 8a8a11ac75..70ba7ddb6b 100644 --- a/windows/security/threat-protection/windows-defender-antivirus/microsoft-defender-atp-mac.md +++ b/windows/security/threat-protection/windows-defender-antivirus/microsoft-defender-atp-mac.md @@ -19,11 +19,9 @@ ms.topic: conceptual # Microsoft Defender ATP for Mac ->[!IMPORTANT] ->Some information relates to prereleased product which may be substantially modified before it's commercially released. Microsoft makes no warranties, express or implied, with respect to the information provided here. +>[!IMPORTANT]This topic relates to the pre-release version of Microsoft Defender ATP for Mac. Microsoft Defender ATP for Mac is not yet widely available, and this topic only applies to enterprise customers who have been accepted into the preview program. Microsoft makes no warranties, express or implied, with respect to the information provided here. -This topic describes how to install and use Microsoft Defender ATP for Mac. It supports the preview program and the information here is subject to change. -Microsoft Defender ATP for Mac is not yet widely available, and this topic only applies to enterprise customers who have been accepted into the preview program. +This topic describes how to install and use Microsoft Defender ATP for Mac. ## What’s new in the public preview From c63815f124bc8b66304f82edc668bd8b22ddb836 Mon Sep 17 00:00:00 2001 From: KC Cross Date: Thu, 9 May 2019 13:36:06 -0700 Subject: [PATCH 451/724] Removed extra line in acro config --- acrolinx-config.edn | 3 +-- 1 file changed, 1 insertion(+), 2 deletions(-) diff --git a/acrolinx-config.edn b/acrolinx-config.edn index b235e443b5..92f0d843c1 100644 --- a/acrolinx-config.edn +++ b/acrolinx-config.edn @@ -1,3 +1,2 @@ {:allowed-branchname-matches ["master"] - :allowed-filename-matches ["windows/"] - } + :allowed-filename-matches ["windows/"]} From f654a356f4b7a1069f9abfbe6e34c433215a54b9 Mon Sep 17 00:00:00 2001 From: martyav Date: Thu, 9 May 2019 16:48:01 -0400 Subject: [PATCH 452/724] fixed spacing on [!IMPORTANT] to make build happy --- .../microsoft-defender-atp-mac-install-manually.md | 3 ++- .../microsoft-defender-atp-mac-install-with-intune.md | 3 ++- .../microsoft-defender-atp-mac-install-with-jamf.md | 3 ++- .../microsoft-defender-atp-mac-resources.md | 4 +++- .../windows-defender-antivirus/microsoft-defender-atp-mac.md | 3 ++- 5 files changed, 11 insertions(+), 5 deletions(-) diff --git a/windows/security/threat-protection/windows-defender-antivirus/microsoft-defender-atp-mac-install-manually.md b/windows/security/threat-protection/windows-defender-antivirus/microsoft-defender-atp-mac-install-manually.md index 13edfebf77..5652662325 100644 --- a/windows/security/threat-protection/windows-defender-antivirus/microsoft-defender-atp-mac-install-manually.md +++ b/windows/security/threat-protection/windows-defender-antivirus/microsoft-defender-atp-mac-install-manually.md @@ -23,7 +23,8 @@ ms.topic: conceptual [Windows Defender Advanced Threat Protection (Windows Defender ATP) for Mac](microsoft-defender-atp-mac.md) ->[!IMPORTANT]This topic relates to the pre-release version of Microsoft Defender ATP for Mac. Microsoft Defender ATP for Mac is not yet widely available, and this topic only applies to enterprise customers who have been accepted into the preview program. Microsoft makes no warranties, express or implied, with respect to the information provided here. +>[!IMPORTANT] +>This topic relates to the pre-release version of Microsoft Defender ATP for Mac. Microsoft Defender ATP for Mac is not yet widely available, and this topic only applies to enterprise customers who have been accepted into the preview program. Microsoft makes no warranties, express or implied, with respect to the information provided here. ## Prerequisites and system requirements diff --git a/windows/security/threat-protection/windows-defender-antivirus/microsoft-defender-atp-mac-install-with-intune.md b/windows/security/threat-protection/windows-defender-antivirus/microsoft-defender-atp-mac-install-with-intune.md index c1568dc518..15bfabbd53 100644 --- a/windows/security/threat-protection/windows-defender-antivirus/microsoft-defender-atp-mac-install-with-intune.md +++ b/windows/security/threat-protection/windows-defender-antivirus/microsoft-defender-atp-mac-install-with-intune.md @@ -23,7 +23,8 @@ ms.topic: conceptual [Windows Defender Advanced Threat Protection (Windows Defender ATP) for Mac](microsoft-defender-atp-mac.md) ->[!IMPORTANT]This topic relates to the pre-release version of Microsoft Defender ATP for Mac. Microsoft Defender ATP for Mac is not yet widely available, and this topic only applies to enterprise customers who have been accepted into the preview program. Microsoft makes no warranties, express or implied, with respect to the information provided here. +>[!IMPORTANT] +>This topic relates to the pre-release version of Microsoft Defender ATP for Mac. Microsoft Defender ATP for Mac is not yet widely available, and this topic only applies to enterprise customers who have been accepted into the preview program. Microsoft makes no warranties, express or implied, with respect to the information provided here. ## Prerequisites and system requirements diff --git a/windows/security/threat-protection/windows-defender-antivirus/microsoft-defender-atp-mac-install-with-jamf.md b/windows/security/threat-protection/windows-defender-antivirus/microsoft-defender-atp-mac-install-with-jamf.md index e3ff4b865a..d0ad4df2aa 100644 --- a/windows/security/threat-protection/windows-defender-antivirus/microsoft-defender-atp-mac-install-with-jamf.md +++ b/windows/security/threat-protection/windows-defender-antivirus/microsoft-defender-atp-mac-install-with-jamf.md @@ -23,7 +23,8 @@ ms.topic: conceptual [Windows Defender Advanced Threat Protection (Windows Defender ATP) for Mac](microsoft-defender-atp-mac.md) ->[!IMPORTANT]This topic relates to the pre-release version of Microsoft Defender ATP for Mac. Microsoft Defender ATP for Mac is not yet widely available, and this topic only applies to enterprise customers who have been accepted into the preview program. Microsoft makes no warranties, express or implied, with respect to the information provided here. +>[!IMPORTANT] +>This topic relates to the pre-release version of Microsoft Defender ATP for Mac. Microsoft Defender ATP for Mac is not yet widely available, and this topic only applies to enterprise customers who have been accepted into the preview program. Microsoft makes no warranties, express or implied, with respect to the information provided here. ## Prerequisites and system requirements diff --git a/windows/security/threat-protection/windows-defender-antivirus/microsoft-defender-atp-mac-resources.md b/windows/security/threat-protection/windows-defender-antivirus/microsoft-defender-atp-mac-resources.md index d2f6dcffa8..14853fbcd4 100644 --- a/windows/security/threat-protection/windows-defender-antivirus/microsoft-defender-atp-mac-resources.md +++ b/windows/security/threat-protection/windows-defender-antivirus/microsoft-defender-atp-mac-resources.md @@ -23,7 +23,8 @@ ms.topic: conceptual [Windows Defender Advanced Threat Protection (Windows Defender ATP) for Mac](microsoft-defender-atp.md) ->[!IMPORTANT]This topic relates to the pre-release version of Microsoft Defender ATP for Mac. Microsoft Defender ATP for Mac is not yet widely available, and this topic only applies to enterprise customers who have been accepted into the preview program. Microsoft makes no warranties, express or implied, with respect to the information provided here. +>[!IMPORTANT] +>This topic relates to the pre-release version of Microsoft Defender ATP for Mac. Microsoft Defender ATP for Mac is not yet widely available, and this topic only applies to enterprise customers who have been accepted into the preview program. Microsoft makes no warranties, express or implied, with respect to the information provided here. ## Collecting diagnostic information @@ -128,6 +129,7 @@ Important tasks, such as controlling product settings and triggering on-demand s |Protection |Request a definition update |`mdatp --signature-update` | ## Microsoft Defender ATP portal information + In the Microsoft Defender ATP portal, you'll see two categories of information: - AV alerts, including: diff --git a/windows/security/threat-protection/windows-defender-antivirus/microsoft-defender-atp-mac.md b/windows/security/threat-protection/windows-defender-antivirus/microsoft-defender-atp-mac.md index 70ba7ddb6b..ad6e81eb5a 100644 --- a/windows/security/threat-protection/windows-defender-antivirus/microsoft-defender-atp-mac.md +++ b/windows/security/threat-protection/windows-defender-antivirus/microsoft-defender-atp-mac.md @@ -19,7 +19,8 @@ ms.topic: conceptual # Microsoft Defender ATP for Mac ->[!IMPORTANT]This topic relates to the pre-release version of Microsoft Defender ATP for Mac. Microsoft Defender ATP for Mac is not yet widely available, and this topic only applies to enterprise customers who have been accepted into the preview program. Microsoft makes no warranties, express or implied, with respect to the information provided here. +>[!IMPORTANT] +>This topic relates to the pre-release version of Microsoft Defender ATP for Mac. Microsoft Defender ATP for Mac is not yet widely available, and this topic only applies to enterprise customers who have been accepted into the preview program. Microsoft makes no warranties, express or implied, with respect to the information provided here. This topic describes how to install and use Microsoft Defender ATP for Mac. From 6a1c728b1bb8f153042b2e51725d740a569a51db Mon Sep 17 00:00:00 2001 From: martyav Date: Thu, 9 May 2019 16:51:34 -0400 Subject: [PATCH 453/724] fixed links --- .../microsoft-defender-atp-mac-resources.md | 2 +- .../windows-defender-antivirus/microsoft-defender-atp-mac.md | 2 +- 2 files changed, 2 insertions(+), 2 deletions(-) diff --git a/windows/security/threat-protection/windows-defender-antivirus/microsoft-defender-atp-mac-resources.md b/windows/security/threat-protection/windows-defender-antivirus/microsoft-defender-atp-mac-resources.md index 14853fbcd4..7f138a6ca7 100644 --- a/windows/security/threat-protection/windows-defender-antivirus/microsoft-defender-atp-mac-resources.md +++ b/windows/security/threat-protection/windows-defender-antivirus/microsoft-defender-atp-mac-resources.md @@ -21,7 +21,7 @@ ms.topic: conceptual **Applies to:** -[Windows Defender Advanced Threat Protection (Windows Defender ATP) for Mac](microsoft-defender-atp.md) +[Windows Defender Advanced Threat Protection (Windows Defender ATP) for Mac](microsoft-defender-atp-mac.md) >[!IMPORTANT] >This topic relates to the pre-release version of Microsoft Defender ATP for Mac. Microsoft Defender ATP for Mac is not yet widely available, and this topic only applies to enterprise customers who have been accepted into the preview program. Microsoft makes no warranties, express or implied, with respect to the information provided here. diff --git a/windows/security/threat-protection/windows-defender-antivirus/microsoft-defender-atp-mac.md b/windows/security/threat-protection/windows-defender-antivirus/microsoft-defender-atp-mac.md index ad6e81eb5a..10fffbc787 100644 --- a/windows/security/threat-protection/windows-defender-antivirus/microsoft-defender-atp-mac.md +++ b/windows/security/threat-protection/windows-defender-antivirus/microsoft-defender-atp-mac.md @@ -83,4 +83,4 @@ SIP is a built-in macOS security feature that prevents low-level tampering with ## Resources -For additional information about logging, uninstalling, or known issues, see our [Resources](microsoft-defender-atp-mac-resources) page. +For additional information about logging, uninstalling, or known issues, see our [Resources](microsoft-defender-atp-mac-resources.md) page. From de10cb9abc00e333906b1f07e0cd121b5c0ad9b9 Mon Sep 17 00:00:00 2001 From: Liza Poggemeyer Date: Thu, 9 May 2019 14:03:32 -0700 Subject: [PATCH 454/724] renamed acrolinx file --- acrolinx-config.edn => .acrolinx-config.edn | 0 1 file changed, 0 insertions(+), 0 deletions(-) rename acrolinx-config.edn => .acrolinx-config.edn (100%) diff --git a/acrolinx-config.edn b/.acrolinx-config.edn similarity index 100% rename from acrolinx-config.edn rename to .acrolinx-config.edn From a40b57465652b271bf35ac02133670ba5935245a Mon Sep 17 00:00:00 2001 From: Justin Hall Date: Thu, 9 May 2019 14:37:56 -0700 Subject: [PATCH 455/724] added new image --- .../wip-azure-advanced-settings-optional.png | Bin 14186 -> 23584 bytes 1 file changed, 0 insertions(+), 0 deletions(-) diff --git a/windows/security/information-protection/windows-information-protection/images/wip-azure-advanced-settings-optional.png b/windows/security/information-protection/windows-information-protection/images/wip-azure-advanced-settings-optional.png index cd8e0d0388c3d30f4e4288d6884302ee048c3bb1..02138b02a709d31ff3a1c22f09c939f907a810f9 100644 GIT binary patch literal 23584 zcmdRWWl)^awk7WFbV#t^+RzZ(-L3IJppiy`6G9+(a1HKmjavcebZzm`N3tYWd`xv(MgZt-ZdE($P{T!~@}>pr8<{swn88prEy*prC%j zK?B|?rCvM${zLWDQM))i7a&(iN=?ekoN-jto&9H;}bhc#500!#OI9J1d~7|6Gs2 zrhKyjy3e=%rLEl~Ke9sK#GQ%xSVH?Y}Wg1>)Ko5vEV@(*w>>e8dxmY zj+KfKcopmLMltmMZBr}cGvMjvLokbG&t=4CV zZDrc$iS`&z#&e{03j9hsxIUiD|1@CLsF4`~uk;z?s%!6cD-~dC71H5Mh$@p#-ImAZ%&XZ6uGoHwqa*acJsjceV=or!bN^?t3bLd zU4M+HOfdaDMK<=~h(cebggiG$YpgkYpl_^b6~h>!u|W`pK$uww=_V>_EDAu17~~q_iA$^{M>Tic ztA{ms9?^ndoo0MGEHoa{VQIvgPGQFBFDR8_6&SO!r^_*wEaU~@?68RQKcw|Un}TeW z;&`w>)2!#`i+dz$|DHc&(OSv0d$`?nl0dV6%&N-FygE)?J>7h6sd|w?+3*!Pz1%AT zjDc4e@+sk;C0Ejo{n^XbGdKJmPKe5BVDA`L4+)Ok&N4H~`!j8j?pCml`ZA1*nT9%4 z$y%l{z2Aa2x!UF#yu*(bjWeHBDB^$amC@>A8rSYsx+-!(r9W82>)YyBSQK+z&PdNd zt_zA^(ZO_GHoVx7b6fZoX)V@iB|L93Md3Me#uZCz=xRDK9<^;&V6yQW#Dx$w5b|o! zGHs^aQPMAf5mjWXNF`ZJ){?oyB3Bk}4)gL_;iu8OwS!a=0$6OhOjpAiS<0#}RvV zW0opMfM_n>JqXT!bctui8K>;a@E)gVj5$+<%mV{&cKxNPA#JQ^t6i37S!}7nVDS+9 zsNhi#5%Nho7rY3zm?fc*O5Eewy;Fn(KBLpr*P&(a>u+19MF*?3)Ps48D?TzQv&V_> ztd8>9BgSzO%awu=qo%6|Y%k+8k)T0}&$@XSWBSD$YxZt2!@ffG_`oWy!wkcQK55gq=J+9Wi{E;k?>eDbm$b<6OMrX!c<2aEm79I--=;oUICXAH1{7PKkSaYB%7PD3D#i#YukIEKYawkWtI(yVIs^HWl2 zY708vOG9FuHc}ocipB?0zER8+1{~0-6j=0iB!w^cG)k&0?G^(_S9GT8!`TU;dg=?z z*UZj&q*D|L(hMqE92H7Nh&EW_`u2$Mh>0!Yd#pOtHbcbA7)Ql~3u`aCirgOiadJB5 zPQ^+6cAFrHCg-+oCDTR&Q;JU5up`Kqf$520ek%n(&ng{%#>)hL!@dC--%)-ZY=$^a z0dR}L9wk?hy(MicE3kd|&bkqr$wfY)i9N8jf5)1X@?iUK<&#>p(3~?*@2m1?)HR)eS6QRuqqRgcZnkO}RJfdc%$Hi`g z@@ks1be=BFh7R_35=yIpZGe33{LUepd=|X zLlju2LOT*A0(|t!Snwl$N`<^uP{TV}i|DNr+_yX_xRglFjWIV+)?$Uyy8?|PrvAv8 zIYLC4U1E^Vm*m1KgUUVORpIBm0<9b!K^A)=%!J*_4>Jpt!g7c)nJVa}N8*R8RmrV0_Phz-H88F}cLIroJF z44FvK@axIxglD{DL;J~1Cw1Yj;k$;8kCRG2bfGk%g3G!^;v>oM(nfE|L$l<9TQAe1 z4R_~JQ-zq}L|ZE9aRGG5K|@31xCU)Y62=43g*p~0Y)HTgcNACjL~m6p z7$P`T0{TPV4v92e#m+LQxP%-YrEmzsQwI78+&_(A5R_nkh7^M))VTTl!q&E%y_wP6 z)ok?=gBZRDYMbjoU7%wQkR|J=6Oydf+n|Tq{zoMqQen?)tpryc`V|CbSl{T1$_v^H z7*sf(qIu8zGjG$*@8K)r(BmPaC09QC8yzh<7SXLOZv;Uqt8qxXUWHXss@=R?;j~{f$`k!{ zeQs!tR2#aUGRRSR@ScuMC(*5#KrOrsN5%3d7(!%FJRe&vU>YGYlfz%(S{a)T{+&do zLt9~(TqB3Ma9n^vpgqo{$I_93Db??s#+abkJgn9fYMds6u1MseZ=y+>Z}VAF8B0_{ zokpF8SrQM-mnQqGHQr9i>5yGD}fGif#*DhNox=&7_z; zc>Jt(%Z#=O#ot;;z($4q=@FeLG-@+y3N%x~K^EHX;(KD3C^N&6szh1A=~)Vrmw&`G zWxT4yYQU@tg<>sQ?*>(p3KAzB>za(nv{t5%@`Je|J2yzwgFQFWMqXeQxq9_XL~=T5 z_9nN%#gMt2M6-?+1mK$}7t*xVB04zSd$NDZ1LaGwM?aDTY@G*-U*uM%p3<8E4f=Pb zg_V*J7En@~wldTO6fnp(lnpg7ILA{J8z955$S#zqW-_i5qp_1Cl|v;Mv4e9wB~&re za^A_|{uJ3Z`~tHO{l)3bTE`C!7&He!k(AtvXB0xZdAU%M9|fGdLQU2<1Hlq>s0}Hj ztyx!E1T6J4pf6k5L>FZ;i?2@|(+WXcOt8-w%qrm)9_WOop!hnA_?&d6IZx}}RNXvN za8e%t&PIGV6I4?3-J1kj!9OI5r`^JiMq&)X&xM-bi5|CSKvww=4Z}(8Vq?r^x$0sC z9O8{R_2)FJ3I!mcHaIF(ShEmYYEkC^gYNzZs35JWben?ahh2rDs#83}z5p^BZmTO} zDB}^*%!*VZg`%PU$vOVXTWS@{-S)AJ zLyMw9g9#xjLeIXULbfrf<4g1(Q`g=#gj9rE+}212ZqQb^VxRAu4u*jIxlaVIpzpSG z&XF$2XA?|RguO*pF2;}?Bayz=reIg_w%89h>rI<~e%5nOC2H#7`~bnw;Nk||6Ob9a z7%br3!RFqg|M}xIEr^8QbzK}U@#7aEuAg_z#147xZuzgAynVs>8=w4ub5N-UDx%v% zPrVP$AFKoLH@?|_qGh{Tp>O-D?(gkHApIg zu2iWd6kbcjpIe~qvB75nv9ZrU#;6Es(FEX?5>h_<%N+qX zm#JJvwNF1Pt@easmjd@Y*1lT@AC9Of7!^%dE~o1v$&Vd~!OHE)dJ2xSa=b`Qb@-v7 zEDlZ=+?;jDVUO>kMobjg<}I(|0uhOVxz z#zv-88CgEz3cNXh|IJ`Njlz29>Q1v$A2p9Y$R<}g=ulEdLTG%{RvJ|5k%Pk$nJBI| zf$hdRh=#{$6s5S~KcPDzsvpmaX8^_W9b7eHkx#~&{n;BQP*DvjBDvTQY>lF7H(;%? z*d*z1JQf^83um6?oQN%*6H}-X8;rI}xNeeMNphf#cABrH3_kd*Ka9zJw!gx63O3ku z0BETNK<$ox^Hqeu>0`+EZR7Ci=b5Pash_muB{Hy!FXq(5GCV{!lo8KMrsHBzMGp2T z%SrBe6v2YJjuV!neN16cHJXH?R1}OLl@OPH>sW2KVkdz1(QdreH=ZU_F~0byxwOoW zG9R9WvoX-m!&+MyYMdO6P5g+$!L1(-`QWvyR~g&(>eTU2c#uYr?E@KM4n_`YsX(|q zQ+${Rn}U=Ud%uYy@J=#f}Y%>qf$Xe47SFQ>o!PSX3 z40y`}hO%Tz@ZL5~hU0*lhsh~Y<%1+wSZ(8Vodnzq1)A4180Q`jCvo(bcucTug)vW^ui1>?0DgS$5psf&uXw zj7RxMThJ4iMfT}u1ktGLOCNpIZ*W8(z+yA0fw+iI7NJy-5?Ie6Sy(?WBys8H=#_oL za%DuKsSMiC*Mv-diq(=D{vyE6Z0LR@n*K?~q&#;p+9s$OcH-|C&1p7zo~Ti4_%y6H zZS-*#QGbsyXR=G;F!Nhs+qbbP9=%QJS>K^t>Uf;w!b(G$QIZ~dvZrc&3P`uzX_kN8 zLoU0!+OEWuJ6apAi29mw5s5OsTeD8?>$DAWoJf+PM>-RzTq$e{ErbEGXJ_uWiZS7#p`p3Cxp8rEEiElQ&)hDKHla-^ZazBB*O#3g9Zy~IfMgcX zB!Ubwm*FZP3o3>?5uo*QGy42ql;v`EajC7VQ6TYBE4NK6H>uK6GxHHEr?{+ocBco7XP;LbfgwBs^6|prV!Qu^hpQz_27HkH z%KI{J7yq=cBm>0h#!pjSSLaj)l%H2}Mn$MKLDoCJ-k*w?PxjywjQ{A{zYO#0o0yo` z+e36|Tg8Gqinx&V4GqX`qx#7&P6QWn1P<}VU`}9D?V{&K-p{F2;M2A2{5wPMsk|oj zeAk6<-;QJMb1|0~DdDBdGMd!g`Ml*#wtvRb%Z6L~jKGs0^g{ug9r=ZH6PoWYj#hnM z%b|O_ceEWF(r&HxS>8H#IX)db?eUQ+$G{2=zOyI+51vG5DfC%ev4`)dW(;Sifl0t+V{Wlb8nrvVY(%DSxMOQacz&^Oy0jTH>P^AI}jch zN7y9~jOeD29LY~d^yJAC_0k6?jk1OWXv~_N%nXg;!8*Xj>P2{WP|EH((!?xwiL=4BawZz` z#L{5+#p5@%?o2}#$r)Dz5L&r?c?S_74!84waqR6m&gX~Z{INh+$}*@8!&F{EvvAl^ zfj9?PIelfLsh?4k^^moVisB30n03qEKdr>)BeS$@m&kc{zqnIT@bB*@YierrcCk`= z6foWPidOOIUy0J!9)Czgn^_JYE@HgWx&0kCUo5twUex2N4PceJ9R)~rO%0C>gnOHd zkWbR*{BW$zlE>0v*j3eF_QFCVdBh{VZ9c0NxPqrPTagtER{Wz2><_HcNC?BQ+^T_s zyz)xk`H`{(%ggLZh=P83QLuwRZI|TV2q8z-2TcySUwe8%SMmy?!6`kJkytxB`w)%m zKNx8*)r<6Sq2BTH*ee$~w;9cMT7W`(5)I5mPfrh;6n+%LcNF|3hJk}=WnxQV>T(uP z=gpCmnEAHfuHqXts%Im!2qB~Gm%CSKw`b%)Ts;Bes=l+cGsx$oYx_$s_oe=7Da>r)FmBw~qhVC=o@d;eA$Tzye;64yKhrsIP)j0jyx#eb1mJib&_P{Nr;xAto*^K8*RefbxEdk|z{H7Zw(bpFUNT z{F_I_-R6~wNkP5b@5bo=}F@5@WEX<7S8ATi~N`-sGidGs!Q`TBKD3kVX` zgNu)3z?^wfv4POynL79;bZye8njd-uix1o!U6BG=;5&uFU&Z_${sJ%m?Ta>n(J-(|Udq^8Yh|IwzAg|BVr`w<#gT4Jq2 z=${#av}s`@ZqOs@m~h|wCc*B5rRZ=y(XV4(( zm5Px-O>$l7?C9#U1VH~5cRd3VWm4*jdk9)NMjR79G*Dz^A&~}`p)a5WDqNlz5$L`| zjZFi^q+51i(3EqXlZXVH27zWk1$i^^oi0^+Lr{o57z9Bu1XeH^QIxN{fFuWNnBd%n ztR}r$LpiwLS+xVE5iq4Gb*WM*rHPja29G+r{9=53cYcIWTCMe9G)H8lVp)#-i1K@~ ztA(>fe^0>~vbibWeh1Qw04p$S8#A|Nl08u^In%3=+AwBq#knY^BK%^V_~4y9$p&R|or&ZciAqHE zY7ulqA)Gcu!yN1#_5HjeDnAK@-^Y7$=y8X2p@1M6fK{N)2V?xN9^)njjh;j!!u4sb z@njemQXecnJaM78$JhW+=so)06RJn=d3XET7X%vKr?Gws)es3>R=RCc;N3xxZAVgIG-jRsWj~# zFPhiF5f!XtQI$EKp^>WksTPoi5>nKZs8Iq6TiKRTL{^BB5$pONT!VeJSfyfs8KjP8 zR2kJ#8Np&rtby{+Y4iYWCOV7vYwLn83r+x^9n|E?7J=e9k_i}Y%qWhz6>|)ImZ3P( zO>+1;qVqI}qyLM%=qEIh6kO#rbF9&<0E=k`IWTXHDHutos9^@?*8Hr%F6u-<3k}aO z8u%HO{RztRlB77M9g$MS$V9JHXiloxPxq1jtsru3nCMse)YxPFk{%k2et-=En9E=f z#{Z9d0}u_vpDze=QhPlqnuVcbDn7RvR2eQ?x+4qX8Lfh7S{Ep}Eg|@jA=p0*qp`nT z!4tD0oFzTDu}u03WrpN@m}p$LznQYHg5`P0Q_-pS(UsK<#5{Iv)rQk)56hPDKiK#M zIP27g7a&afKL}N3d9b>tD_(Ix1V<I+>#-` z;*V&0YPzn zqV26#q^{Fjv)$Bnj2XjN$2`|JW#NIIYl+EYV=Ap}<}+j!tZ!X03UP`W3lQgDYKlgM z?Wcdvdf<&~2q;qDgXL?rQ1F(<{bv99`D?s)`{p|1{&(k2gQ`yBBSS4wt)%u(GhA{U zsLy|Q7hHVDwQD66X3NCxjj#~ok#V`e!R4Qhsb;5`c`4?rqo_}NBqQUb5nU#Mp}88B zROXnHq0Tx~u8uL^KuyXHw+PYk6)6B^j?p-o_V!O|%IH4=>sTLshA>BF8BiI(tT?u- zt;=YN2}G0IMT#~lvNCO=AvA)zkYRW%SbbtmA@rT!^EFOvkx$CcM*KRSrKbyS6tnCf zks4mLdf?bN3yjx@^&!?3?4uIRq~runMjy&5b65Dy;x+zw*2k0Y=DX-Tzj&EnBsB|S=| zV%cQ#-&%t-+sBruEJ6jE)`g9EZn>O=r z(v3B;$jZmZ$J5hOgs!%x=4q$D?<_ahVs6hfeo$PiA#kNo+H``+FuV2q8J~^{pnZn9tA8--!P(2@@ag zNcJi)ufE6KO4~)jD<;^Xs6~a79#-2u(p?8F9mM{J<@>bP=S%c{>l)@Im$#F*Va=)* zO*n@`lBolKF^nOEfkFf(EG$e!L=;_V@7#GSjC~OJ@^b%nDX_!m1s_KLAL2Vz!8MoK z+FH{mz#+uDI*@~yN(%YPvxNKe+dt*qh}nf({P^)>(c~|@e_bq(ET~gC`6Cp57Wjv4 zw$P8L)+g{M;dp$uI1PaTpc>4O1F8YQfmYLz%K`DL(?-jP_-~$`yQf&q-~UIF(Cu2( z@fv1*eENQJ<|ElSzyzkUDY6>>!mB9w!qU>_{1j&U_RYoJ>9K#t>kYoU1_<3D{oOa> z`n#|B*O49~PnNbm`C&=V$vibbd-2JK_Ir)xwfgLbj33g0=Wddx)}hj0fS&$6e6I%> z+`D&%oVkbM^UE73A1`j+tKY23BkndY0@+g=LN`KWWW0E&gI0Ri-EyxKuWPy_Blk|{ z1EMycNL?!3(*eJX(4J?Wp2u!q?-xV{fV>cp_sw#ch465+?6VS8TMUIclD0~5i}SB} z@w07~XD{wVxv-w@VEs&WN2Q*zX}t7H`WIXdwv_pJ8)?ph6H@;p4)^Ko73R^;$oNjk z;RAZf>#uUhif^2i^>#pP9zTVm+AO&_0-bn&aZf zf52>?o4 z|3vgNT8(%`T6Uv>V784 zyCj2Imfuzw$U$@WTP`kFN6#*_U(((Os{(-0CvO>WL^|Z2sDQ60TAo1fFMIGi!TTtJ z{G>>Z1;2j7aW<>Uv;8C(YsvQRqdKtLh;t*cXb7-?m@b{BrN8(TI2K`2imRm#@wzx(+WR%aua+{swtmFg^Tj%}7`zdPn@gF9A}d$d1WP6A1J;3Q zj|mIcXJUE;W@cuKUzTrIJb|n50Mvbo{%-g94)XPORoeTcZCKGlV>Pww_KjUh-JsXa z(8qgu;+_X2y3i0syuPI$Rf(YPe0O%g|7Xq!p5EsKVAC=Aj<0?H{_OSZrD#C6eWku# zg!;nAXMS!jk?8vEo=?vt)1pvEchLFqU%YPyRPwOfjd}}jKnW=M087gNhU%7ZGFg{| zzxWYgf=*Jv%?ZYk6Nb!0dg3fGpjxF-;bKytpE&_1^|)7ti~eDxnPC6_j~4vX^Ha_M z$^*E;s+%zC-DXmx8m z+xa7^eZo&F!iQE!e#@6rrhtV=qYT)os(pEW`^%D0Qj&%{UJVHUXw#&W8D}{g$T+N> z!ahE&D0uzAOS_*<<9qc=S=1sRW=)r>b8&HL#{m-T-mh=()w98a5>h~Q)cWBt+Fi8j zY=v~A`m(a3%%s9)06@hxn^*dhuw zWQ3vt3M9x>wIV7cm`9zA(q>ScyQ#34+R#DLHy40r?A#y&hzx4(~=hMf(?tNIZv zku9%yx0b_97X+H3;KG6u320?A=nU{oNBT*UrpO|3V5vF|k!J5*D5YVszH~sHaEGV9 z3PDHl`}sBnb~Q8cK)mIhM=sOP)KykL=f#C%)<@4`kI_GKaer-uVvQz|X|}=avL3w2 zA@huNZlQ3e3ei$a<>-&9NGZZ?HnbWMb*k~mOM&TRF-=# z8uk5(!J%9=9RsHX`XM}f&ouNQ)z#G!FAoY{K7eUB0V4>>)fInQnP62nmMtz0b8dtT zTrk4lzPSMlo6r`kT`$-RiVEnAXTrbD#%t(naXhiLYX$2(;<7hWEavb-s~OGzj#Sqf zXGWV4<2*NEQ8gAdV#cFYwEd^@xYv?R=vR<+ zi%N64%`|dV$7XV>LMaQsC{~pSgl?UVXi_d5f3_JL%VT)z;Uu&&cHegq6Je5?Bl)i1 z9tSQH0&+*s;7|ay_{$bSy}3NIUtdF>>-xQJ4!MTr0!+;0wIadeod+fyebFi+00Yur z?m4b32tKdmbXgA=nld2++!8rV#VVy(%Hihx zXDzWIq_B9=U{2LSlMUWX&Q8RKHqpikQ%{*#Q7x>GX;phn2n>ZkvA?aYNpxRlp}uxI z`@IBon^G<_e$3ZVy8_C>IFkbUMsbB0ThVS(Hmi$sR!|b>i%~D57Frb<(;ZrL=6FnF1=kH3xcrFMxaqySd^pzz4tOWB}I6&*LL z$fyO4*56di&6-3h*4Y!yV{W`=*d>!QAb#qnUdtAx69)(pq{G7Caj?Vdp|4mdK2ohYZpE2be zB5vQ~ub3W&tgmPG$!+9BkU)u;ChBP;Ov-4}GG<&z@^lAylS-Tk_L6oxe>O*hloY4d-Gaa`26rFg7CL3qnu0^Y&^dPWGz zBuD3+6c~M&e`F)upcWxyV2)tnkO2S6qgGhASuc|VWH4c(xfpNXsyobPC1o+o*#b={nm6e+q zwz&36V??5;I!**?mO8Y48YB_U35{hWFjCPED4GquvrmiFA3aH4*LT_Ko|J$K^(;O_ zxC_o=GiDd{(1$?=b7F}U(f!Ox#JQ(Zs#1R#*HeC#HRpwh{G=ZZ(iq$Q-|%~=5o z>#)vx;IPpTi2=lxo2D)VlUB$USf=-6fPHe&ln^yZKJ_tFR3~RJ#VM+ZchXp zK}+5*09%Z{ZU`@fANY|EW+Wq1;ryP#u+Zdcpag6Ogp?25-rf$xP_vM-o40weAW|H7 z0tRW0MT{ZbK;w8zwKd@8Ls*EhiOJy;o;a{}h+>}}?A}jm=UWdqcKpj8xQYKab&=Z? zLPtmU^XE@zXJX82RVVi#FeT@G!onfbIe4?`kOVMKxd? zoTjkFHc#xD`nI;V&Q4y!o(=$xah**AwTI6n435**?OIExVxS%>%3Q$M>hqRp04Nq^ zfnL0zM4VzI&OmpMzQ&ew@52o#fWnyk0RWZst|7$jgWI4?zU7yIt8MI+mCK$gK7SY> zM!w$bjj`WkGUJ_Qy%0z)ejr9eQ2hWnU4$1q=mdmrui;8ev(fwBGT@hX;MHWnnbGaJ zh9!N#JX?lJ=4@ZYqW+yCD*zyX#zgq|_&6}Yvp+&u6zE-*M&+4#2$1 z=@?Ap>rdPg0Tus~L5PTm>>SUtbY5JzLa~2|emuDd@92>1S^$=%qlg??u)oFg{Wu}; zX0~f2;!7O0Yg#z-?asV({LQGJw7h6ew#)J6eRBhAZ|#-mc8$PTUqsjSmw90TI2x8p{L3LWIu6#U)Mc$&PJkH4O%!`76oT z5GG}RDE@fHy1eMi^)Fg64=hgTh>NQ$F&4V!;$M1judEx@aLJN{J$2RC0o|^u>u$ZZ zSN1v~9oFvL_r!4RtVsN&g7r3ZD&-ks?Rp(}a(gBcb`pgjT{69hM&FalY; z`hBpT>Dgu4Ii0xjwgPe7k-?h0$?I7sn z(=m9d+}&@hpiZ?Dhtp>~H~VZr*t!B_27uhJQTJc0ygam%8spS-Gc7{>aODcU4<6d} z)xN#rq!?1d!!F*4zQUF4zY~xOHy(>2RR1J;%a`ujaVW@IkxmO>bsXl!A=FTg4)*)-?%m+ctOn4SJqZJnDM3VEULeap&{UfPdM4&T_pU95gP*j6 zE7+PQPHAy&c~thES^#zbMr{v$OWg8q83>(qVD%)-=D*HZzS?c83jhZ8m|7;-)rNP zm{aJ_ko#&t266?|xS*w_rPEXIlF*5~U%!6c^9fMqX4uE3mX?8BQ!}&V@5g_;65D`r z8G}yom1R!xFgFied;`rV`fBrx8K61c9Ff4qz=Ju8|0clvyLaaQ$&W?+%xR7RqksB` zd!9=IB&)vF1K>FTj#Op~-_6vrL)B*#@srt4T+=RlS2yNJc@bZ92VMfU8$InrLCp=z zJ>|5Z7EZz;-#=gM^UZllFw|@bRE4qQ8W0c42}1SF1A(cD*>H}*DjMi{!O8FSDA(o) zgTu4T&X(kRX0|acf{{-oob3;qwbl&zugY-r@V>X(Z*3L4*Xtv666btv)PN>Gpulwk zdRU9oyvt(iAs~@Y1L<+=r(3up`Vb}3>mB7xZ>2)$+o-;b6HZ#j4JCc{Q1d*^Z1T$_ z8(D@Fd#%(t>QqTY)vrUON5#^7MxytHkN&f7q1_IoBQC z1ppm`N<;{$ldDQbDE3}XW@kaaO_lB``4E{e1)iv>7M3{jh%pPMHnaf~C{X_mWzk60 zEfCWe8p_dDVS(BQ5u-v4>u`!@V+@tb#lX*p$xC8JMN1{p-AJGdj-&zrAsDX%?>voi zZgXD`2PEi0Zs~GX5Q5qKS*##2qKPv(yX@iK`LlB9tYbeNs(2n}%pz%7ZVb&Kfd@51 zXIXM~J-dM?W<9%BrFMwn0LI#sqOELqJ^y8Yj-mx*af5bgHp_G336oezT5Z-#H=yBC zL^P=LFixpd01H*u{Qi29!1dTY7Yw%JxG772iOfc+xA@9TKbbJ9_^@Gva26#M@?s@g z*PweZ6UK?ntrm3tMU%}XRXZqmH4CINMUfnRjtZqSDD$?yW}vec(ae#vpsPTf+eCYl zQS(`F?>!q!1($j#xC;T{dvcF4VM>rVI@62qg+U3Uf*CI>v_Xfy!?FQU%KlWcB*PqcP$267q*B~d<*-U2C;@0gat{4=X665J)@bthbWT5CWmE;zs_dkNz z>v;8$3K*)%DFM;^N!zH%YOPIN$|~XE22=cd*4rEE6NUvU=@Rz;Bi4BK%Z0UD-7_q60z0K!xXY4+x1Jz}gn=>Bn z1((xdvG)+nQ)yQXf}%`Xu3kxZLq;dSL~pR*O)|100iCJ49gyauCs; zk+K`v@Ofz1m~-8N+^AUf)b3wb)`6g~t(+ThQv9G%#Y>tLo+!6|s9%kn)9~ZxWPehn zARjrl+eWCi6i!qov0_s4BpF*Mampx7X}KV@c$f&I5&=Hs+-_%}Y~Es+CX}_HvYv=! zh72vLqgGvPwV=_NMu&g&*{5>gR~qC7UC-b59tn^&aDLXnU^GHhMiBeY{e5bHdxO;z z6hn7&uFrBq0LFEmp!xtd_610)+#y$I`^*mqS6bTzKyiRp4!!p*<~;nb<=1GyGXvy& z0N|~Kj1GR(%FGuNm5$IQc{rbUkn@FiC z$Ia*6`}ev8?(-FCet;LQES*~pPyv4tM#u+vKDD$w+po4K{mpQuH685Ha4(zF0!1jm z{viQYWVqC)H$apA%MRMYbzL z4V?1o?j=ww^Ss*<`O1oYYwGGe?Qf*s0N;osQVi{6LVla4={zV*uaZBbGY8x`MRr5u z!2SJozu^8uKRoyZcaLCDTe0z;d z(l@`PVO|{z-?fE-5*-M5Je;3D2b%t=YWD3X$U2Xpn}d(8DVKc_2GVC&fx4V9>=Df1 zpdC|Ql&&{Jt72y{=hCgOr4cI~hhk~>Xwu4Lp>*Gh2rCp=@ji!phYu=%oRIL(r+(zG zzA$iM1t+nll9HInZ$IRgsM=ts&tADYsrM#=3RB^WU*${n*j*OZpJtT>sra^zl~b zCiN_U^`GMSO29>nf9u4L%m2|NvwH6yYK^(b0=8WS%YEkpuu`3xEz#Z4J)M2eR$)zG z>&98M`YWG)$2j*&=C4+QQ#T>z>c%fFE&aeMW~CDHoj zZt-S5=e^D59M~7$jsFf{u|ZzxH~YMRIwXA$VgGu*($(x2{{zGp&UEdce9Hfo{(nOp zpU=CU{w6JbZMj{HjJ%5RnzFfvvcW`(eap*_x?*|1YetuD=5#D~dzH`t6W!X>anrR8 zqz*GN3c>>E+nMbMeKFD?+uQa3FCUazjD zQ<8{QuCL$U?@Q6wlT$5!PSP!2uReHOX9DnUz}sd9z6Y$k<`5JQE1=`y?VW0=cf)&b z685o-n&uVnEs%+}flP#RGh$T|dTa4`_F+>$z`P^;N&*Ao%)c)K$Cw-g^f})o2Tqcs zlq0``g^SbFtioPE(`pG=hSKnX%}d2|pGkq@)9_z&ga6ku?*Gn9{{O_$;TN9ATjPMo z=Ah{_y_7%j2yDH?)z7BV+YEvTd8U+6+TanXyX)gp>qi6RQgVP;0zT1#>?jc5gX3v_ zX-;JKmy587U`2V%D$*zM1IQYJi5z3!BV`p#RFeq5v)`$gy;fo$sEe|4V@o~gT(~qZ zOiY$m^m9_cSeGoIW|o1@zP5?95)YqxnAC6f^X=DZd&x23{!_dtN3NbPJ;jgI1$ZhI z&bju{-Qn1Ho_W#zrpk|j$Tv}E6mfOQ3*;*AK`0^DXvst`U`j)aN)l` z>1jX?s5!F<$EgZM8Sjh>PNT>;SBkrQrwvg z_`Qg{HAod3XvD2peN$ydrjouehtcIXOj6>{*;x|4wvdd>Vpm|72rVoxb~!5CfsNLT z@*7>fcGRBHto8Huxlt@5P`m|A`kRnHqu*!pZz0mhtn8DH3<9(t>E&qgO>~Emh+N2r z;jSXJP7U~9XRcvp zTE>UP8hlv2Y!8Myh%;Y=ey%bYJQI@^*sX{%Qm?VN*jh_2=g+RDVPENd{m~%rl_Nk7 zfJX@cv+gm*i8=&c9HFNT&yLU45-%Q|#qFP?dQkCaW;{h6^RoUZ9a{eb z?$l!4Ub%F-d=KYp$Yy+IJ2g5OMn6gZ+2xU@LNOhfL%}4EWTu>MriW*gqL=MkFfZ^B zNzJT)-H|z>1rKq7MFV?L&^DxrEMa|7jiskN&c(+{3SkzlAeikJJc+{yvRE}KRZeu+ zjmn{vWvwOHu<>{sB$>s&fn@Y~OlS(N?XJnvoiJfuBPo>0)E|DLC9jdK$f}MprH&7n zi#Siq^FDZNMgt^3TdqqX^ck@=+cXhnJ#>?Yz-?;ljpTmNPoF)rTs+y9%q`~NGLfgx ztbMwrT~iD^yZ!k!7JX+8lFqCv7IBJ1vYy(Mwrx0WSo+H4y_9+?AZQpQ=MuuX&G4^H@^Ej&x=_8cBtnz?2v-|VRB{+Mxx0TcB&S5lS&HUhBy+P^wx+fIcGW3d}Q=L@b zSjY@e7#2v?RRGvk-$9#0f}(z#sD7K+$5o2O zs^r0rS%UYst!Ch0kNA(9rre`ZVwzFZY#PZU&^;afA#wFW87))71a9|6dl8KxfIyZ} zJ2M{I?66@1p=Sd#NmC|{!F0H1AL80+bnS#N16v(z$R|8JLv#H2#1vBhWPnwr@N0s# zQ}#QkPy%6L$43LuH!tUuFXd==wAn3#P?yClI)zkiyg-G zNksas<%r}M*=BCBkX&{c2A(-NWG_Z-D7jQcx04z3hii(au>r2+rO>4y-vZN%lZ^Ce zNq^H6AF(jJuvA3t;`?A$$>di}|HuP&_#)19NwmzF3f7Tofk%sM`m}rfHYtaZJbMA_ z1MyY_r@WSiW|DELDnU6f9(%q-x}$r=)^+(f=KI!%UXv~$Yg6S4R^!qd!vI89l6|Z? z5h)unwV+8fJ|XRO4(oQwdiu*XG7nr5eJq6M ztR=r9n~xEc6m15BIs=7mUG^!Q(j4n`AydC;m!O1YZ{j!<1VoQB>K3g-5C{TaN5|;; z#3x>8TTRMDV`%vj)RChS~H>I;-sw270)L0XF3%U%d z%v}RPo`-`ZCB_MLj&D5JQ^P!Jx7e+xj6FkezHk_5W57K_cc4O~c!4!2ZzMR-453Sl zb`xJ}&{B0i_hbMq2}@rAJ6<4Ljuo`I`(XPq^`(wxDzdFLhfZZ+CU<#9DFmgaQbK`Z z#7S!v>nq0%!i%9GynaO0#h(9^8#LDFes_Db_kesS9PmRLgJ}f$fN$WF6N)*hZ*l`| zinQc!?_HTG?p>W{zn|WrI>5GK6y>c@ix`)SCF!wi?)&;Dg!ef4fAQ4XtH+?_!@Gb1 zz>nPNf3dd;CF*4>vn;YYkiLC!>__YmaKKOLb$RCLw_Wo*AT6}2!K2h@00_;Xi<|>L z7!d-Tyj)RRm==~s5))2tjeIudfK1i|uy23SY8cR$_cT4RNe0{DHo!#~fr!kZlKf&5 zYXXc>EAl@*6mZv`*Q{LD7^flOCD4$ryQ{8rcaR9hyia>5!@#TlA?e%0=`^_|;D}eniGZJg$m_bS>N4e29=^ylCF3fG?FlFt(JHZOA3>u zly_x#s*5Nr^ACJNoeXwj&b7wnDuIs=~bmn7i5laAGpzM95aM}5|w$uOjI-OS*3Q0 zv7w9MKu%>nCx$CRX-X8q=1V4=;|UptGLc(uYDfiasY`7bq`ej%A8=Lml!STdLI;{x z>&X!Yru@%ok3-{vk9dZmmjc!=T&B&nQ`zF3Vl(-$?|fX{j-_h?ZXTLE0iLT&Opd~$ zV%smgIGCa0ULzRZkOUrpujknAJl|O;gZ*)RL~MK{t9L|`Og=$U_)?>7ef;sE%}hDW zGXxqwGgX<)Y&7(?EQgw0?Hj2hPpT@3{=?&}jSNxfL%R^)LqU3vqs%xe=^-PG!VIQK ziu#RH=XeqK%7$lrsR}J`qgi{U*(&>OCU>YRV&(JHj~QiK)L0X$7%605q;kZ*jsrgh zyPT}SheD=wbU~-z}B0#fb@gY zd?b6~E6Wzn6unThnt`9B@Dzml;Q1yDRy=GIlQGXWqJuX6{aoR#W(x3pp;cM5 zHlsG9p~Kf#dPE-$S)b^>iSjHLk|@kd?`BJTh-g-Y9;&}4kX@@CkyZ|pAgvgznG;Ma z1r5-6S`*#wFCWwecwW(mmr8{rDCAFrvFd@`z@sR?jN$!Znp zc$p|4D7GbtMekjCefZy+IrDI+`*)9L%^JdBC|g-3WX+7oPBHeGP{K2|8HFsBUC5T5 zWX&4JSjtu?*}_;ONs26CBng8^_O-fiYE z2W+L(&K;qKnlM>cZ8k?1MQcQ##Z4hEW4*bV+e`2zVYsEC{<-nY8dYu`Ln^Cv*W0RO zX*_*OGH_Zg)yJ(F?R&h-*85*dV`ap)aItnjkG^wxd$W%L9ua{%z)-h=*Zp6lm) z`HMJO-cJyX{&Z@rZD@*A8stlv(@U!*P@m9Pn>H6d{=PLhf3WkdI_?Ge_=$+PP~8qj zMB6FW*4a5X<*lKZ0H4&ws!9vJ=m$@6V?%Wd1JJyscdc4e=6n`6%7m^>EaIZ{-!bYI z6dL3YT<1o&Q@^sJ3S1|E8fsBzHHKI%rP3^-9f&GP;(6{zq)T&go}KOU!zf;=wzQWT zU~D%=(jPpR@7GOCy`3=DZ~J01Ei;?%C9)#aVqPL~kE`;8(Y40F{J=Rm@YSng#7^Ip>7 zAn}hIxF`e1G+ZNfVP;5@e%yT6TD!nmo>I+6@M2!wKCN~?Dmhpvtl~aq)-ThtqOkFH zGNL)_Dq7A{EtCO4LfZ0S^)h_V!bIm`Ze|ZQs36kLkwS_#sXu!-tz2+uUBVTnCys=8ynKY`GdbsTj+3qRn?;&9Eagf7kF3#s2vr(=(~)EU+KbLN zzI)am%A<`SUO5RvtBc@aI|aa{!_W*$FiGR`O>iu__cw=g3Y(7<&6WDYs7{IOM? zyl1;p79yH~Xd}^GlT@(G@}PEraV}i?!&*97N0EtY-exlTafhg`c5v(5v!BGn=4B_= zr4xDzuEBq{<%GoxH1aKPV=E$GwFzDnZXPlRN$$UKc44?NU%3|q0%G#BIc>T|N9W>qe zA*|vrDWElSin4<#y?KWpK(z;VJrL$cl))X(P=01xFr;t&R~2#EPOb4*(Li0k00;t5 zZ)~o@4$p9oi2jc55^wvTsqO!VL&LikoUA-DHogEal$dySD{*}wTiHon`d*~Dzf@$$ z%r9J!#PRk{nq->0FA$9~KCLb;eVBdBj|?DIbG=d}Bg;T*$r#|_3O5SHqB)yHhx3aP zroqX$_f%#2la8u(VQ5e)Djf4QZmV$SrJ<(;pA@vDHD$}q6SRn|FRAdbs&ULpN9LQh60xi|$KDez81fY^03P zh1kfL9QeM?yQ!&`n_u5sbc6Ak9`4LS&g)97eXYaQl2-4_5kkgaO0f3nFGUJ@3f3WZ z=$I+h-SQFRo;hi&fYiZhn~VA<#k~B5)~IyK2XiNwx!5I0EZ#~U$#XZ~xgnJ#Bz#AX z>tOs8D$QYU*UHLnbnsf3qOk>8<;mhHJ%+=}=;A9CpUiY{@Js9*Y=?UN9`vX-AvY51 zQyvhOMIcO=Nmqu z+|T>E_GUB{vE|vDUn7FgDHAF0&riNE2(kdx~zG(h<5R)dyPK( zY`M*RQ3AJt*bnFRAwPJN4!+kmBIP6`6Q(X+rMK;fB`m<*SS3%vQRM}MUJdKi-dnYZ zq+W1XmfRJfjTQ*f{6qXBwHSAgWvwZn7hcui31=yk+7Rww$qAXj>!;7==^WeqC8Np<#kQ>7lnl~%`Y*UF;>&Iv@T@73{B>3DMe|kWDVqR%cPBpfK zK(NszS`31rluO$6-7UAc@!2u{eng4(a8lmu(OM4ttcI}iXGT@`)Anr4!*A$B&r;)i zy|dTf71KXElMr1rQ>Q-!-3=3Pw1mQ#2_y0+g5!>N(4m}qINRDA%;Nnb$k!CqO{fND3Y+tqdC=X^=TgYyY2h{KxoHPJC6 zd7yUberTBRXgtjz436MZ$XbkShRUrw-kYEU(}fY#=27rsp3l+fmrj-<*wQ|%M?p<` zp8JE`v~J-K=PR57@g?ES1lNrTCwgocnBCem`)>k|h0?Fslw*jUb?e_L)E;gfIjbH; zu07`KwVqR&^pr)Qh7EabUOb4g%2mmf{@If>&#|L?v5^VH{5`D?cHXZF2{N>0XRIR` z439{NP(@#)>o!JnzG>*CB7khUZU*BcOW85-hh|8JcHYSX#8o*5CD^)o|03v2Fw4C_ zL_v%QBH|bLKsu93hnfxDk_R%E1TlJb&hkuE@|7bHVWIeOP1w3?T^!&Sj}bPc(>^7-&}I6HQlqqz z=|?p6xI7#NDM1QqU$gHmZ0HPRpM5pD^f~LYL*lgf%{anreq}+->wF~-PL{T}+G%3e zLaLIMMjGhJY`z-4&f|Bp%~`SNl-vAhfjJWa!kzdPt)h;)3r-AGlSx8o3{?S!!3eOD z{Ic#<^a>Y?!fwkA#o2C4knEr1qk0saCJ0LXL&}NgIu4Qxyq*mCRJ|?L%9Lo2tFAke ze7&D*_G8RK4a4#Vxo> zIv4Ag%nSCYO}?h&XE^dcV$fOhDCFlT=bDodq5Qt&jyT%^)CEzov(j*hnZQ!}td^2+?=ofLxK@Ru zhC%YE&N}A$Tpz;zf7cI7Alh=nsRO10QQ zn=#7Oo3tZvPQxPj$;iFD1KNrw;bPnDC%S2+M!S-4RV@T-D!K3nq~3hWP$k51(G#PL zvg=|sL=Rjr&f!@jKf%w``7qg5a;w*}nbN0uI&-DbT`A<|a_e$MO$%CN3>!-75}Gte zQ@XN-bek15jc7@{`1k{z>m4Ag^2Rr6sboSE(d7~p-Ys&<+2@ga_0hq$P-+EMQHk?q z0^+x#tVH6>B6FVfCeyb$9xFfX%n2`14N#KzlXU*x%h^WE_j`f(!wFyJlxO4iBfROQ2vR4p zZqZ!&QJj$hIYS@>1I;(HSMAeoH|9yB@nf>Kdc8*|C_$jpA#$!Qt)qLI6!@bReb;Pql_|0{y?^X;hTm`KDQ}jt67~AJ< zZj&f#P3Y%iF5!l8XOlY_~Y-ACUCS0Zk|11^u;vB{w}d;3X1SgAb(7Tp*x+`&JfHE=psUG0mP zupLsLJe#|4zy}0Pz`sgB!J~sBcLE>u55mn1m9%|&>dh{`R_7qEqw9FE4_6xEB)M*EVM}SAE6wbfmde92VY1#vb#jP zeFq$TR(=1ep#4F;`VPnZb@!%$^zSUe6`@THD_`$_lW)D;vYk%2AvYGXzdGZ;^7ZRZ z=U-#=AmvA2Ua9W`7Yotq9(?fCJY+j*Da3DI(7nL>%sTkqU-aw2eoJByvybhV z;Ln|zJd`UrGZMRmQndNedpWM}%7U$+@dvO$*eJNiwQD|m%8`hDL=(Zo#I%#QcN(SB z0W7tp{{|CeKN75Z{&!qQ#;b1O|D|TPI)(ca>jeb1RjZ5ejA+PC;*M;&VjC_d()i%T z2xak5c_4B5hT zy!MhgP}&00=f@8Rmd>TWIazDanf{BDW!?syY(FBPIrQ^+x$7ptcWY?LDgiJ>?oa{t z_RRHnJD%1ZlouxtVc)WBwL zTjJ@UdFhnXBXDz;@V3^x5U@s%gLjrg2|yV0-C1`EQT|o|IFWE04eCo2q(B`Y1<@cS zWONk$hUTz|TxKoJEjMts{A@@JwxqzxePKE@%PT7&CrI>|&(<{$k10SEj1Vb)Ffi^` z-hiWpHm~Irh)hv)@hlXcmUz88E1>I))BGUJ(_k@ixO%|8s)1 j+3!@3eo^1FBLV`_ zf^@^Vd7gKl^L}{uTDv}+4|^?UF>%K~uU}l(9igfI|vC4-T)`1VVY#ysU#=@$KBfc=l13nWuD;c_BVUcv*ys-P6 z3azlPM6Z?QAM1LW{QjgBZvE|b{?e+~u!>11bVYC>#Y=fllbJPMkcyCqlf;o+_`o1m z1{@I@`&j%|ZfYw|xGSUvPS&HBOJ0L-hWT zg`ve0kR*MShMSe?{3@B4?l$kbJ=>G^_tK7@;)tF;Cu1}w$^SRc9-`n5(Ki&Wy4KLT z!LRlgmqY6{f+75=cI84^BZjsRqo=gGdYP(ery-iZ(FNa$3MSzO$3$g=hO4I3k=eOu zgH(!VRVPA*>zm8GwN^Yh0)ENTB1kX3vx+n0Dl{TPmPA9^@#7=TD=x$!SER(f5{8c@ znG$~NsfIox-!AuVx`LC3y5z9bxFGgb5FLkaW%$LH{S>U^kLS2L6Sf?U9_y3oTpZHr zPJ;K`o%%5H^iGJc@P0;ra2SV2Pi|m$H|}978#z7L%OZrgMkLn%MD#&UK_UfiQSoBU z=f_u%-4gQ0nxi6cJUqDUK}5q#;Y>N)=DIkyEqcK?l}kfH4L0R8$Vi1PmY1@2_H%e5 zlDhhBNxQnk-O(kTOd8y@!seQgQA%*fa$Jp)72X1iTny@|Wms|L(@scvlGd*f@j=Lg z9B|=7&{4t2L|i1nUc_hDeoRTIz_eF&LXz%oZI<=tG0m>kZ6Qv%eDRJM zdQHI(q-==Y8Z+HS?vFo71AeI{%&tck@YDR^1Z#p2=(X1Ok#y)1hjw7{Wv78xbu?hu;U_<-?IE~Yjo`0o%@cxS}3;bTzSE|7QzGb23pkn9=sJ>QVAXZd^%~th#4m zcW8nSsSfhDr1e0Jc6SjW=DK=BmfD?*?8>)!&SD;I&)hjGGjp&Wo}SjDR0}<3bmef| z2%)3=SjTPUFpo#8AS3FiddJ3rBNDRPLZS45QcDiqFNKHeMLv6+ER|pVcq2NAWq>06 z++`TVpJU3=A?z~}n77%Jv^;%F0E({?_?)XFSV6F|T1ypQ7N*j1cedn-Hx+xin;;!zkSo({>U4wM-pGb5qEq+ix}&N?Gr7E%`64cvj&|_yhKo zvqtX665CNueuJ&b-LyGOLerUd=SL7f!lex84qA|wTv^OUj_R~6YO2uDZ_h}Rb!FTb zC;}cky_G}DI$kD|r12euZ^`^tZDYYRM{PWfOe&-4OR`Ehk9WX~b0xpxG8V+2WF(it z7H0Wy;AN3irWSAuq43iY;v=bxEfYF4^__2w49T#z6a=-}6k{3H%j3w8evIEfAIjHX z$eI&a-XSZiCNBe(f#M2!b9RG~4_q0Cz2zBA5zoU5M7H5o$S%L~BDt@UGluwA&-!rE z+|4I>rB2ePtP6#_o04Tf34$bSkGSi#-*vnSVK4opQ3EdmT~1e*;G2mn3)nd*0c(jF zpD-(xmZ)$@#oSFuMUCuiW_1vQff~47n^g~1MTxU~zb9#|a6R;u5!yc*plu${7ngjy zsHQ(b%J zZ%ivPZBpoc*7>zu;jyU^b3Swc8cRDQPC{53)z6*f6l)LXLr(k4Mfwv?STkAZ)-ZRS z%p9i2B|I&rwo|c$EY*X?;k{OY%Uk>19CB?_K|umvzxLdWJ1 zaeD&hj>~A4D>Tj6v5*Kdfdv)s*S3)|w+}7-EV3O6wc@c| zw2Gt&(gne03>C|)u_zM*M&A_}{_sBk_1;*885c22&9YM+F6B=0^xl>tGw$&1!Rg`x zApudnLyt_TmjHfx#z)@Bp%83*wTuWB1Z^J@uaR8Y03~jK@tw&RwPCWPo+-kV<_TUx zczo75#Wku#wugJ=s|ZH$n?gzBm#wj|s|4*{e@Ld?A6T1MjBr!^s)Tsoch4^6kCpK( z&wytmV#AsRNfrH7xp?|ge!1w*RtnWxnNoBvUrr(Gx!oX#quS$y;3_?=W8R=WJ3e!P zCGo7aW2Rz>@>DM!#!=!b;(R6Z%dSOrE0}`8+18)QyGSBWZgNY_DNo~W8F*h|(Lhp2 zi*e1}C5Te$@;R7c%a)lW0j60w&!IsZ64TO!*j#D$2oYOFpt6iED17}2Y#QI_zL zH=v5ial^1i%@JSp-R14e;2oIr5)DpuS&JGq_EN!HPRo5Paw_fb3x*aDADoR;G77Nn zr^^jHLj3O3A_`M$8Sg0W2;`(IH^N~+Q^af`y5-~Va(?x8rrCgXK!ge~Q)>Dwp$^qC9?&BxP9>XK+_v_E|7wCBmHpkmX}Ez;bilhLQbp=@*i z>1HM6h+y+2+&CSW>7X|Fgn+!O*r0@Q%g2sHotqI@DV$^+Y>+2EdV|B%vvi=k@)pBu z6d0U!&FB$(Fu&KvX}6DnSUVzy>j}oO?Cm+C`yfqBSj73+6Ou_#8+0bz~Wx2GC z=Kk#UU#yY;-(`&!aE$Ny(Qp2M(?NYI-(NhY*)xyi<>j}jZ%E_dm4+HMRc&v0-u29b z;R{Y46`!~z`uUSy3Js{s=;M8q*u29JfO{U}+1u|gz;JtdYsy8bOYHZJoLUaoa^e&d z_vaYsIgR<00GfJLT83&CJHGC;yDFRX$wH05u6?^{ydCiypT`3%_rlO9U2EcMzICAO zvCdhf?h=t#i@MVlk}fNv<_i0hze7)SfCEV!?8-A~u_vzjoWp~d9H7WBdwWQAWSXKy z1>@zsO-_Zd$`_Z<)z-`NLcFU6=>xblfuc)s#?XUNIkiYI$*UiYhZy?`WN!!dKN^*x zn69EppeBsGJ`Q2~IYqz7U=KO&(qCbFS`bx$@Ge%~RZ3sCdkl1Pe^nU6fJ+-&n%o+T zY|!5(<%~ws`jAy;q?mXY{qte(F+)ClPIX!nDq7D{M|?R%)&J3Zi9FH1Sgo_$V_T#e-bAsGu09NiCL$;;Z`J8)#mRrO&Yvfd z!FKTHtqk_ zcQdJ?^CuXv(VXNP=|j$IU4I9tSleX<<^D{?MV7Z%1C@?r77 z6POzDrZIRf^^Y=+0To2sG5UAr*|L~my=7m+2cDAY3>%YE|IFXG)bmh#uQ`idK-&0u zWTE<e$Ah6GdpwvhcajzUpLhmSz=>`(%tPdu#I?4068>5QkyEaauqh+ zu-7;XZ**HNnfE;o7>HH^ztwnybWab$kDE_q3iv7cf(CX}Rk2!@#)BxUEL&8Nx1!oo zOz(3Yx*m8H3KLA%cbcKZW6 zsKcf0xw&{pN`6+>8Z!cnFVl6aA)vYvP%}ZIZrR;^m!CY;gbf{6C>uu5*Pp)JY`ydv zddC&nH%4@2ul$ zz0mqT_^hne1f|(G^3N6g-&KkKZix8zh2g)rL{zKzN_rr}Tqq-AP9VayI{)kh6swUX?&ONNkEebtJM8jc!l`+;mn{yOxPr9*_BE5#PH(bH`6%suAA_*)Efi#{}cSuqL!H~p=I?wCffZ&wMmQj>s`6+ zzQxDW8)5B0)Mm$L^~pogh`YstwePg2&Mk9-2l!2zX>5wjyaa45;xo=6BTx$Py!cbytx~^|#=TV3w88cMQxFi$PJjV89+d+lk2)R$@odHijb6#< z$$LQ7Kb>*K(APo`%pt&z2&Z_{AEcgy1=Id{T9A#^ z5#~y0S=kF3u0w%sTc4EBgzT?f>av9xfh;la4Fb%caTWfbr+>m=vlt-I^pgSlon-S7 zQX-%#ieZ!}_|dO(%QW0i!O|_7-1WkGW6e(lZgb~5kS9tE%Q)9O8oSSnXsz2Q6;SFl zSjfV$ov_%80_ub^@j?ZzoI_%ZHjcrdVmj>k& zzw7X(?P*~hTr+o=_{rwD^1A^!1t&{jQ!hd>RFB2wJ#o&6cY}H~2JYXBiC~PcY{WOm zbv-za&lN7+3Nn*{#a9lQL{1$G`P|;tbLI`wOt^GkD%x$Y?`I5M7;0&V)ososJ1Y(x znmzyf?meRO$kic)gVZ|Rv{ip+5X+@^QZ{h=hS!_uV6ZgJea2?7OvyJ71%b`>)G;j`!FIbuXu&_B(P$2$iSykY#Z$Q|O(HiiP6wtpvz)M3s#t`|?JQ%0A zr0)DtRTAl1jB$cB$jr0*gd+2#8(92|{wL;J1dN^wz?yd=V`cRjSx2VIQRQ_k5cU$j zc1|G=xfN!$h9t0g4}V$w`8C7kuQ6>${OFK8tmqS5oyq3-N`;dqNIoWHDlwJST=VRC z3$EmQ&im#E%60)l#tw@U#3CwMdHJGd4w(g8pXXx^80}V++|RvglBTAyXo)0m;gzV%$aJe1_HBG@Iv$0Im6y$Sl;%aZaEvmo0EsHyj{_`V0 z4lq+wh@kNBE$q#gZZ&YF3OBcAj1X`b5d2nMkk$Z=V9XL7S+W}>B}#8cw@A7QE zC8pz^dW;rqqeWafoV=AYhg{+{4vi4veqegJAjgI1CCYu5E}uU+D6DB<@I@&*)t z_2ndI+l_=n`BdXOf~4>A&)Ao)RYCi03F{{r!(@aG%pa z=H*v#y+A7ft<8FJ(C>|jIyYziu-!L!<)si?15aJ?fna=>>|qSzV@u*=D-Xo@(MB2X zdH!yR7{+(j2cn1)GIW$aZE5hI{qa5B)RFcEQnqB$cb4YGN&sM~mXI8U%S6PTOa4x? zuEq@UxMo&fOFG^dkD@kW7|_})A`Slu2D@Yc+4L_vs1N=b**==Au6X_@rv;!k-^$C6 zKsU2$Aa~<@E(3G=pKv?>OE~r~JXKeiGeC^##a_K=^*udZ&Ah%?gq=05Um)Wv{**ckw;ZLLc6>S;=cy*e ztdib}t@JSkKoc*3h`f8maNa?{bkQr;I`&px9uDxnXzkc}vZ<9jTIpiTzfw$NX}a=M zQp$~+&~yX@8n8=u09jHg?QJ2>k4#&A8$_t&VSjM#=r}q3q4A#EBBaXUYpxY6GR30s zY;1Qucq4gNyeBgP@iqRWUtqs?U^?$zp5cewD4)g37L53N8^3GCEvSX zqClP@)dBg~qM==LfJ;HjX32&05a+!|e?~hK!khF{gdf`wKGNW}ns%3oq4@}7U-#;V zT?`(eajc#J5+|Ev-UMdh=AG=0jd-*vks{$t)SnF%Ps<)b4;nc%eypPbapu3~HT!Jh z3K(e;$5E3J2`0>mC)3FI)=KV={r*$R2D(sPgr?3xiHh%i0*mLS$7ON`X_art=fUgt zj2d@#-AqH;h>Zn{>ncdAA(}>G-+$Iu1=HG_F^STUBm9nL^1Fx~{Wr_%ZbmeR>C*PE z=`WaEp@<#saEa#ZY`-VD%8$LILx1KFvF_MN7;dA=#B{dQx;58uP|A;o!x|B1OuWvy z0a>te;ND6C6+&5b7D|5WB!S!?&VaI4@z`g^+|S0~jY=l= z>%X06r#qrSs>*)TW=fuiQ~K$5^eBAcV3{=Rk#h>;Cy7nD zfRE20*b-|#pIHNqzm9zeX<&iaZxh=4MJ;O<1UPZ>b`?qN#&Zc!X@v>o;@CB|R`RAU zM+9xy{T>^c3({S;5N`qX(SlK5N2JuZp3}+U6Bh*fQ?@`v56+XE(vLQC)cd zEWopmW5|cOf?pg80cykTiK8^pO>EwlvfEd_!A{p5t$)rQp+{GaFK5*%jE#TO-k@dW z6U=O~pd8$|IXt{H3IoOcuf7``t~~{SZhCL7VZR7=TCiui)NuMcpzPy_|1W~6rUB$f zJIUsgcLC+KJJ-kn+c}73Q%_WQfA>s`C|k?gD-mUry^EH*SJwaxM%(~s*$cy-73lug z<8uc9n^z16_o;4l?0OBZqhjd(^B4O3T_R)r*K=0)Qe1o7yOQ7lh zt0@J`6zldIA3}OVbe}5q+qU zxzSC_c&B4T<9;RUFN@oMe%UIP^A|<1X9!~Kix7R%;8it;j;`#{{Y$pyp!!X(>MEmw6w5%=LYl~yo03nRQk%V=5Hm43n;OVbAgN!ftODq0AK+^psbeWNUg-MJ1`Z%!HOad+s zS18F6&fgu@o>uiS+N0kB(D|axzeNNcqD!c1??7M78bG#+N*Al@OImF9J#}?>R!g&6 zUa)#`y6;}rYQ;)BPWNV8;Prenkh-kV)RTa`Zf9D>IyeDv5xVBN-LN|6fBqW{u*-db zqYORhm9=+DUyh5p>WLLS-XL7NKm0(@!tkpU8s11~8}q@uQQI)|_;dQhHKatZOiz@) zsh^1VML$~{AT{Z4@H4I7Eec?7r+}7M%-d5pltmhQJHjK!;c$jYRme_7l}2IM$11Zn z&XzfdkBCa*V4%NG%Bx`l*hxpYU~de)7{YTgLb!wJRaE$_n8TBFGQLKv-^$eEH%5h5DBb{$JRTOA@ zJGGRCV#8h{%xr0Fepl2neC`8mFCnh>sG|cI-y1t^D1*<|t>Pie)wE@dA-778c6Ov1 zRI#>_Y4FAUI`bkAG-<}JKxDt1we%Sk3$DsHA8uZ2=Qt+GsGdTof?C?oDXWcL*7$eT1hd@DWygp}|-lYG=6 zA7E$=eLAddxO@LVErdWT!q&W7BJ||lS+mMI!|iXxAY;@c#dMz_22H>iQ#R_de4n2@ zrlb8_ciJF5sg1v$6Su^*_Xy>$)o1-+_>&~{eMZ}TK(={qqRYC0NH=S!kv{ez@&2u% z1OE3z3s3wP83Nmcu;f^k2+em0v=#29+Loed`=wCWEuxk-y0DBn@=m#5FLb|C3#glz z2Nw;Nhu~_gvikkTAUQLAg)m$EK&aj3L{GrOi{E*E z)?=}|4VcZlyr@VbcHf`xsGlFa1x18n3-#X9;J4JoCY|C1+)szZgD#>6uX)FQQ;k%5%NPe?8s^SV%Xv z>W%-C|F=^57iP_kF}QR6J0N4{kS+7N?FG&C%5mGf-F?_8J?yMgEjlbiB_*Ls~MTs73i}n4j!UFxq;Pb#~Ru2nNka~cy zC$w1DU@n@jf3~F@U91Oq9S59+#H==iT|+!9%6<316Mu`a>)j!yT0n&PuEy-#`IjQh z|7>3ByzTldoo2RbX*PqeRjlo7{0{lE{mp>Wn3`mpo4X!G0>VltSGBaGKgJOk`4W@70F;!U1@o`{Gn5Fn zOrm!GmdIwNwO&m-sN<8p7DIWf3e9vI=c2z_)oSa;|N7s=^)$8P5%9bGN~bplI#28s z1-(w6zozOPxn6d-c^Xsyn4s8bA7TZP;Y6uP(U55 zv?xfUf)A?xk-q#7<`H@$>iPkd{y$jh@;{~hSS44=>gLXF6yL@E2q2nHfhb<*H2>-z zYjwqtTzZ9R+toA~>h<&COxOq!jUD3;f4ZTNqyD2o9 zPgl|bQ}ig2))vBP7C`rE^Ws-2bi00Q9qDZB2xsmxvQ){)Lh+On#z)dzM$$wDG`HVw zCCKnDcQ{19XhLF@ z)lY8#%-CXrjKX7oFuePo2NToC`qp`FlpgeRsjSroqk13rlhM7ea3i#zOv!}3n;)~z zpM{9gTrn`t`LZ{{|7<;6@S=n1qGNvqHVc_&KJM%?h88|%VEZU z+#YPmOnU$G*RqMtW_JB+3bGgG!VUUgZqqOG_tV01KYmTFy0y&Emn7G`^UnVf&SJL` z@&n(#5Vu-5W36IcBaRKI_h>O8@ww$=A(=^As0w%({zIyVwfRGbl$w%E;V-!_CHT*j z$DmN80-pNzNl8g4E^U8i%-iZ3lR`MX^BYGQdX-W=_`41s__{T2A2=AAns|cU% z0nSW^m|)yJz%8DEtz@IxwR!|o_V2O2v|e>)&&P4axV}P1FmQ*mNSJT3zk4hIa$V_; zjyGH8HF0Mg*7K5`H=4j!7aCPb6d%Ya;&ICmVUSGlEJirb$|~u3M1Riw+=+D_Vg@go zyUWzHCRKHwm^Gpi3Ppb2u}&3j3ID$Io*^ak#MZ$CJDimx{|1kAei@upORsCUiv zmNTFaXHFlxk&S0bDA7otjm3#_nb_`UUY};x^>%dBj7X=`kj==!^HHxq9`y;^SY$91 z?cQCQXdd2fC8oF8-n~l+W~cy4HI{Vh3yR!B z>NuIjt$klk1MgS?=L6{3TF!+BKWqP_`Ip{CjLP z;i&$}wKh0s&t(=$qR-9U^<+hUWp-#x8N#_YE)dP|iJ_j-6yo|&|AO0`MvM9_1(fkj^=(M~=`{c+S7XN00&`Dms-`wW7$-~kQ$=SMg^`Yh>Dm@kC zp)QS!DWT@MN^f~uO;tc-sdPz~d(BL>skp+NY|cU!Zh`0l!m2)Vpv;bBX8P9Z34W~Q z7G+m|>Jq(evhl);JfM3P)G9VMo2-m7_zoBHy>jFZ8J8r-I@IC=wCSMfXk%-QF;5gw8IRC(AfPM>Xyy zKlJF4q7CbLc+*$c9w|e?t(#%(>XJfC#&azOy&t1v6}sQcIVbTvFj2MYeM+yh^=zu*=ruW3nM-%1UKtIVju`*;`xzY@H@+`|14cfnnh6D9LggvC z&8>m)%IO}@qdbLPrV%2aYK!TjD5fwzzwHQza-x9UsD7(9=njD+V`lK>&sK3ha6qD$ zE6wUli~2r_qIQG((dP!Z;pVJL-?)k&u|z+mY5-qP+OBWi0)=o7duDxIVFXj$XHE?& zzZ;L0##O<;S1;8;6ZTlBU}1MlC2DJ5Kx<`j?gfR2Z@RfK(5sti--9cDy zE-;ASc0VO0NP4Jyfz%bnAM*CSSp=31S6thQv0$l&5vS+K%^-@JL4CS$gW)g+T!HEb z7S#{74JWZe z?((EhwXlN>&e=?#!mBr%qFnwAUlxHKb}My@dL7tcfDS6S+2A*25gB-P`|CH}*D|kW zx<=ehAh8Mh*RkSA9Y`|p+CGH{!vDI4&wstt`oB*=m!*Hkh|Qf0*+{#skKf;(M)9yh zmW46CR~M&)Dg1T4pCrEl?9=%tPA`ykxJgy7axsHbjVu$&oDx%&U8IkuEm5yo>8Wb& zk_$;X2tw?ez4qbu(Pox2$v~O)6x%9J`jDJMOltd++UxPaDOgqdpJBg-0IGOm4fQGJrG zKmYwoPAIToHekvj1t^E%O1wB(ireoUl2W_ilLb-~7|hUESHw)_Go#6sEAbWPk`=CD zBr1wl=1UDJ40$Sk2JU*5S}%IN1iP|q5e!&nV`^|&!ao+?tz-VH9d5O``mK4G=rGHB zu8fBS6k+=B?z}G&Vz&_?xZ0cK^_2BGGsN%FC1=hj(ZQ*oP<6fo9twBM%E^5y(A`yt z-i8jOMsPEqa&e_*b8{6YaS0HXS8^jPzUm~9axN&Ve&q=0jUDXGWKF%#sDza}$&F=K z{u!-TqC`OsWsD8e+L9?Q4ut0Cscf_GwuFqabDHZZN)_#yjdu4x&GcGH^$c84jcnsk zz+0MoO3zh$@BAt zEWC*RQozP_8|_~C7_Oxr8^>TXYl&r}>D{o(yEGaR2Dc{mbj4vrIH&OICplc6MkVA# z!hu{dHcfl`bW2htNCQK&8y{Jj=E8L#^b+r&gO*W}_t|K1ab=hGHc1IiB6Rp|`E$!d zA@*Sm_O|teN^w_xj`bp^hF(*x0}k^rB28GQTfInx*eVijAn-7!Z~@vKVh-+1e%Qb) z=OrXSx#HG2Y-2oYdAEDH;ov-w6L-DLb4zt>MDM;Jv}6GhqB%f}&rzBg+hCWxJ2_ib z!-xEn_GW01zik$#6||q zLAJ~M)_}5gzfTccHeluc`0A8oV~RV>%)LLmHgyXsI7uTQM=sU^`e{WOAQ7vK%46P7 zg)8ucl^ht@+pwQ1es5YB0xJ1Fb7x1Vz58Y5+0S8?`)2)1d~PWC zWIUyH(%rz3s=@STp5EV;aNjs6f>=8dal@h@ozZFSQ^jZKvM_si0j@_HndNN#*D9qa#n1^PmuG7CpuJL0O@fj_NRlu?qJp zWuBM&W)hk@6MBaS30BPT7wzAHx|%;-;3pA4su?E8D#Q;YG={@F8rqdRytIIU=K@yO z6TO)XwGY@iu*uuiKPy<4t&;6xS2r9RH>^t8XD!>uEevoJw?4y^iAP$@?z=)X6>Sz+Ad0o2Y3x1IFxfB7ps*+QNSEqq*9SYR)n zD1hnwaSoTcrz+zlB8XpL&{3H7;E9z;%J9_pCDK1t4)r!S<3iynu;N@5rnrh^0Gs(tk2* z*xzkjYORkgZXIH_Cnq2C{ zN>i>GGr>Z^a&~MHV$xs&OS0GBzL@1k%XfM*buwL!F-ZYxKf&tcqz`u07jV&6rXj!5 zONZfgy$;eovI{#AQIWTLQ;4em2I>YDVFFi{=pdq#e*ff2H-K}h*#Gi}-ID~S)9W9cm|1sLl1bqCI4orab@_5xv$y{TgA`ok From bc29a14319ea4f06773eeed0e587b5c2b59e9d10 Mon Sep 17 00:00:00 2001 From: Justin Hall Date: Thu, 9 May 2019 14:38:10 -0700 Subject: [PATCH 456/724] added new imag' --- .../create-wip-policy-using-intune-azure.md | 6 ++++-- 1 file changed, 4 insertions(+), 2 deletions(-) diff --git a/windows/security/information-protection/windows-information-protection/create-wip-policy-using-intune-azure.md b/windows/security/information-protection/windows-information-protection/create-wip-policy-using-intune-azure.md index cbae7321c4..be51cbc165 100644 --- a/windows/security/information-protection/windows-information-protection/create-wip-policy-using-intune-azure.md +++ b/windows/security/information-protection/windows-information-protection/create-wip-policy-using-intune-azure.md @@ -588,9 +588,11 @@ After you've decided where your protected apps can access enterprise data on you - **Off, or not configured (recommended).** Stops the Windows Information Protection icon overlay from appearing on corporate files or unenlightened, but protected apps. Not configured is the default option. - - **Use Azure RMS for WIP.** Determines whether WIP encrypts [Microsoft Azure Rights Management](https://products.office.com/business/microsoft-azure-rights-management) Files that are copied from Windows 10 to USB or other removable drives so they can be securely shared amongst employees. You must already have Azure Rights Management set up. The RMS template is only applied to the files on removable media, and is only used for access control—it doesn’t actually apply Azure Information Protection to the files. + - **Use Azure RMS for WIP.** Determines whether WIP uses [Microsoft Azure Rights Management](https://products.office.com/business/microsoft-azure-rights-management) to apply EFS encryption to files that are copied from Windows 10 to USB or other removable drives so they can be securely shared amongst employees. You must already have Azure Rights Management set up. The RMS template is only applied to the files on removable media, and is only used for access control—it doesn’t actually apply Azure Information Protection to the files. In other words, WIP uses AIP "machinery" to apply EFS encryption to files when they are copied to removable media. - - **On.** Protects files that are copied to a removable drive. You can also add a TemplateID GUID to specify who can access the Azure Rights Management protected files, and for how long. Curly braces -- {} -- are required around the RMS Template ID, but they are omitted when you view the saved settings. The EFS file uses the key from the RMS template’s license to protect the EFS file encryption key. Only users with permission to that template will be able to read it from the USB. If you don’t specify a template, it’s a regular EFS file using a default RMS template that everyone in the tenant will have access to. + - **On.** Protects files that are copied to a removable drive. You can enter a TemplateID GUID to specify who can access the Azure Rights Management protected files, and for how long. Curly braces {} are required around the RMS Template ID, but they are removed after you save the policy. + + The EFS file uses the key from the RMS template’s license to protect the EFS file encryption key. Only users with permission to that template will be able to read it from the USB. If you don’t specify a template, it’s a regular EFS file using a default RMS template that everyone in the tenant will have access to. - **Off, or not configured.** Stops WIP from encrypting Azure Rights Management files that are copied to a removable drive. From 402fb6538d0f7cef2e079c551cfaf440cc26e99b Mon Sep 17 00:00:00 2001 From: Justin Hall Date: Thu, 9 May 2019 14:53:58 -0700 Subject: [PATCH 457/724] added Note --- .../create-wip-policy-using-intune-azure.md | 3 +++ 1 file changed, 3 insertions(+) diff --git a/windows/security/information-protection/windows-information-protection/create-wip-policy-using-intune-azure.md b/windows/security/information-protection/windows-information-protection/create-wip-policy-using-intune-azure.md index be51cbc165..06d1375468 100644 --- a/windows/security/information-protection/windows-information-protection/create-wip-policy-using-intune-azure.md +++ b/windows/security/information-protection/windows-information-protection/create-wip-policy-using-intune-azure.md @@ -596,6 +596,9 @@ After you've decided where your protected apps can access enterprise data on you - **Off, or not configured.** Stops WIP from encrypting Azure Rights Management files that are copied to a removable drive. + >[!NOTE] + >Regardless of this setting, all files in OneDrive for Business will be encrypted, including moved Known Folders. + - **Allow Windows Search Indexer to search encrypted files.** Determines whether to allow the Windows Search Indexer to index items that are encrypted, such as WIP protected files. - **On.** Starts Windows Search Indexer to index encrypted files. From 7e9bcb3724a8cfc1835b4efe3ebf24d671481c40 Mon Sep 17 00:00:00 2001 From: Justin Hall Date: Thu, 9 May 2019 15:06:20 -0700 Subject: [PATCH 458/724] new image --- .../wip-azure-advanced-settings-optional.png | Bin 23584 -> 23683 bytes 1 file changed, 0 insertions(+), 0 deletions(-) diff --git a/windows/security/information-protection/windows-information-protection/images/wip-azure-advanced-settings-optional.png b/windows/security/information-protection/windows-information-protection/images/wip-azure-advanced-settings-optional.png index 02138b02a709d31ff3a1c22f09c939f907a810f9..2ac8f45b5c4f2bf46b77dcbf28f258bb34db65e3 100644 GIT binary patch literal 23683 zcmdSBcT`i|x-T4iMFhk`Rp}t0(jkD-drjzw0unmX2~}T3nt*hH5G3@3BArkz6ln zHB^j1pi>t>pcCEaPXhna$?|>?`0IqXk-8G749B(vyg3bftos-Qs))a||LhF#{=y3l zb8irc(dYQjiD?JU01(LPrl!hcNWhcTDSXVNY3TaVykh-W;8u8v=;Y^;ZzGsrf7QOd zclqs`n=t|Tx?rD(ry1u}ZmCUnT+$8yAX?)!Zc%gViyJTF<}9wLH5h9a4fdRPn7jQB zA?^*Emu$JU8L~u`4IHr~Q;WScm-T%|3X$~D3ka%At75*ahbgq~2pAU#A8;82df6Et z6$`v6i2Q%`Iy@2p4kc&#YZaU`Ewh4`8dBu<7IWjDJT1wT@<6AArtVv0Z0XeduTL9D zsjm>JRrb3(3z;6yN!knIe})%fU5b3dt<*S0(W6|;7c7T$+h4syyA~*kncIn*!7=h9 zNsq-m18Gh4E{CX{=H1xXO-R4|`NF;BmuW*TuA8XqGrd@V_Qi%nR z6ksU=3Yw9zCfe&2hM}s`Q-$L(#Rb*T$Q7GEY*l(~(NBiAE}A{OWci6|T)pq;df#EH z(D*FY1>?}3X6(_Bg3N5uGVTc)-2)mZ{7!u!x#+m8&4HSDhq2?#2_YP zKrpZ@?5B6HEQ65fbyne{@Ry^D;eCO;O`lyB(fxr@v8k>#wp>#WV~faLmzs8c?@C$- zYsbd!&-;ywUPpgS44@Pnm`6=~yf|Bp%^3`=#kRDGJu!uL+NF!qE-*MWKMd5mj_1g3 zyzb2u&uCZNb_Aj<5*14)!=~BvCr-h;ut_%|L@h%uhYyXuntWSxvgqEPO=L>) zKmknX1~Q*wRK6us8S!ZnY{ExNw~9t)X|{|Q%Iy4LG{hJUWoQn0C^G$3ry0UJL+qru3Q{d)%Qnlvviz&n7ug+QKdxF4k>|AQF_nT4 zCTLu{32RDbeP|)r5`TZKrL6?zU22Gs)aT;6x5GwyQeLw&29YVxA3|<)--qFhguyc> z%Tdm2+6l2`=p5?6IMWAJi7EY>M+6f`1$f{C@AVHN#ea#CYTZZmdP?{nfuE^Nr4GPI zXKMF0lkWva!etZGHyh9uwlXGKgR80LgO=97O8C&vVo@qJIo%z)(S>myDVKO)(8ol? zHubZUqUo$TN|tuPLbn)|K`^k3VqCj_s7j+PSCfqoPJPb}vRza6IznkzoQ`KSHnfpwjF0GHZvc0AnYhg*&QAwB4UgO1#@|_Mv235ut(#0)_;Im{7txbj zsfCJIloZuXHi;Uvup9Cx6JQH8?R$^uavel&SVtdL6|GOBGzT|)w9wb(*3)CE+!uYJ zS#7q;(8nQy7$q22=}(k?*Gfi>$C~-%>$e87>yJ#VDdM&jTI4ldndMXjIHM~+dfWB3lvG*r0Be17V z3uO_?sIjI+Nfs0=->u%Zj<0CqSM1Um#K;mNkyRPirrG&%JrH)f2eJv+lsbwWa*)HO$@Bv z>4+}-EAV?&2G3av+qjsAM|f}g3+_r>P~KNC!UF!W$$ka#I)DWW^DScZNU+cp@ehmx z!-@DyU3-Hq4Cti;8~cwpRppCPc$Z2VVl#_mXRGJ6tF}v1)UhWo@U zWLW+}_L_$h@g?oG#TF&1cBI3UG6xQ3@MZ}El&>IbkeKYF>1BJJ{sy(0pCFD#&KbEc z-jW>2?jIPJ6BX>m47X8)uTF)d?TK3)tWGn^EivPcM|0Ka0&M8?rq!Zsy4(;x_y&gW zeM9%0L&H$0h>1RXOh$`^e3f18b?OLD-9@-Nv08Tv`ehbv+5Qo$=cw2UbsKK$JxW#D zEce7r%K{Vq*0^s{vr#{Ot-5R>2m&o@xQIO$6GYZ#?z=A{L6i$L7`Af~F5^rt)vDw> z1t!&0%hfqoY&SEd?w1(Ti`=6X>L*5fr0%94>6~BVK3p|RZrhIDbuGUOzO`3eR8YMm z*%s@*4&~4$CL^n86>K~z%`zBX0=gmR!7L)gWnGP^X+kVns~lJxTtQc_hhs=`YhCp! zTbX|N--|5#fiX%^v^E{VwLGIT9xS$2$yYY0s_9~1H`95~nr1U^>~8rsY?v}}z;B)6 zGmvzr92F?(oK8G#n>5wh;fqz(bie7OUuk5Gmc2{_>+(#GI*+4DE~XSM6!VIhYBnlk zI-+@Vq*!aI{b#I#YaWSW)oYx=d!;b%%KoIyjCfSsVgL-59qsX2ffOqt_ui zTrPO4W?zMHS-CDAmL4bO4kq5r8dem=`DX?5DhU&TRxyv7t}H6~nY=BS96PpaH2vnL zC$6PN6q;oZ)uqcSL|1zxEf+bEho6_3Jfzd_pd;&iBPREslt;A(ZyNVme<+6f`pdQ} z{S|0Dfm5K`LhpD)wh^~&`$%guSs%1y(-gx77y6?irHqX^6=-5RM?+ZbidRhHovfp5ts1gbTr!x*cN=Q@I2=CC7*gwD`~u@QZd>9kgEEI| z--lv&*IjG6a>k+>vSpZX=-A2+-rR!DsJA?W{Rj*(os5v{!kZbIW;9)t%Z%xk^H(0y zZ%N+il)5WwBQc>|Z_x$TKDFe0Z*a`YyqV;NH%&1ZUg{Mavej-m-n_k+Zsg0?`DJH~ z6T#0s5*F^e9I2*3%zY^+TZLuggZldzUa{{0%B9O2S+h^e zl+;Gre^=(W7B)|7GUa%%UKQlsu-vw^%`I14nUUOU>~5(m5lFQ?o>zC`N1R}eFSI#4 z*k2{7cww+52ea1Hrq&{l<@Ts{e^*J&GNH%ni8DbwY-_L}>m zi2LTxosCMx^+(<8R;Sh0Ym4yp+}$QIePchc?H|{~oY7!?=pa>avO8SHjqo}s#=IC? zSs|Q$Hd-biDL19t`$(ibaQFrCgP^~jwCoLu%}rE4>q^$g2s(|@F&@Zo>Oe62BCD2-m8DnV zxN)iVQecy_h?odMCGl4BZT%>1c;v?ll*Qx?{eiK`FxMsEp-i9&XE*47`%*rfMrYlrIzLk^_y$^9Ca$CS(>19?h% z68_R4GLK|pfUS8AL6FcVlwLR#C8WJspmJFFM4sL@+0SDEV-k%#JoRb+G#dF}7G_pv zBLYq#vz4DQ(zV=gx{-o$Xkj_%Y(M~WluMH6E8n4W-=6=*z?$YJ zqVDcGjQqy?*=C7J{^D4lVYtz*E8ZJlq)_lFrX84u25`Npf{P*ey zJE$~L=$3e7tlk(ROy*{yjQXAhL7{0h>>+OKku4X(^7Xse>LQ$f&+x4Zf&iB!3wQJM z5-wGTT3{HQ{0X-ixce3FXUkQB`q{3A+>SZ8fqTion)T2&H)o(n{l|5=V0b#nurDh1 zlh@hntWIBrq{yV(k^n{haQFZ5RaU)%AQzixK01Er_LkO4Mo3ZnZXJnofI$7jcCL9z zjk1X$2vg5@TKh0Pif2oGRdlSo-$8<}Xurcj`*|ru&45tf5gROlbd~i4s6T?kj*Fd2 z%ziuQR5~}A@ZMKV8~>bEVR+>wz)#BCmvFzoR~QcUHl^aU-8fM83xVmQi-cVDk#d`v z$;qaGjoEzdw6Z77fh)tMUUZ!+ldyG1W>vV?C%Xkn;O6`q2Numo*I{tYho!{Akby)_=*JScP}g+yt=Zqtb*_K zlUt?#kQbfp(?yy!;5x^2Mf9F*$zPuYSE2+MJeD0nLD8<<;3TUj^a_OGAcB5sI2@wuPZcCfd@mlRdywY5w%q6fWvwj?Dv zV9s%_mQim-!^HmMo4E^x`La0Qu8nAZ_B1vjY2mV4u%=3xm;F5S%VykY0b#u$mV`*! zd;qF6I(EE54|+#Mw@>UkzZRy=I}+|p!7@SnPiFZYc@pWUXZ;GO?CBE9jlndpsMpg0 za|8L>g4m!P_bw^-nU>WI;FdL8D-0Dve3j&`^>6&jwHT9L0ersF&oiaMO@-1Iw81%d%q#ujN_uJhFwt-qk!4jK!b?o?zG9b`-2 z8h)|WAJ;m)nfx_3fVC@N6-V1&XB0k9Q`LBq0CBU#XrGP2b(9UUPG@hiKPV8t{!5LR1{)Z zA6leRqZRd%B{MU#&V8yoyEsZI--sFX@&qugjGVoU>j{6(`(OQdYC3!Xj>sGkG`!1s zl=?b~uLA#TlwXPN00Mu*MF1D6P)?7d`?>YM+2T@~P7^oYYz_uIG32wBZFKDdE zph=r00=|L_2H!jwpxMO?zy>~Byfdmnu0Wyor{68UF%dUlU(M>ow&$$%f2oL*QTf2E zGymdovPo9t0HQR*Opa1iEmXwGoZ4IEq5gbTz=`r8f{m5rV-S_LeqkQNB9dBgWg?T- z9Mi3JdT8-otfZ8bH50I_m*geA_zkjVFTV46+WFWWxPm|_VdiRoggn%^>d~9Iq z>a#Jcdf3JQdip+kKKmRU z9(dgXz5H_Le`!dvnWKyI^Yg!dzwr0>4+;trXK@3*epn4m-HPu_>YD%YFyb|723*7CTFO% zD)Vc2TcdhJL;3`@=&1&vhWYvXk5KK>n)O?54X8VIy;o(~L(NtRK{@@J%O82UB;mX&=SLaseHl&Wk4+i4*7x_A& z;XL5Od5_lLi=CaFO}?i=Hxq&0epKl{WAkNL=74M(YW^^u^N3huQ#`-W8fr|@J)^FQ zk}h5^(zv2rv7&7 zp%49|dgYzY&xGzQllOVXV5R)vV#W24$q`nW&`$nyYN162Y3Q#loE8pMlYH3-N(FGs z$Di$(+nAny(zW?9I!GzGv(PE9i82hMYI>(YpO%6DX7{k@Iqsaj;0Tll{l`gWopo#Hd2V^wUUt@uh*6G+ zz|Ya|PV(38Ps#1#mW;#NM5%kDwz&J+EEE~syg9&L8b#Gp~xz(QK% zOia0gqT~NmCj8z3gyQ3m`FME^?2J^brqn6Kh&5ge!3jz(Z{ZaW7y0n}49okgzw+DF zHVPPyv?V~FKX2Y-?ZV-337*Ah~hUL~w8ZEx4EmH%BO>lF#_ zI_G>3+1Fp=TUXaHW7Tnl>bMOq>`zmGPozCg+E?u0J)swS5FXQtamUuF$-69QMY1&LA)|^4_&&Z7(x^_H zZ0&$5B5PAF2{&A$YmWXNNLkR`P7WqQ_}uedv|6w!=1kju?TN6hAFG1tZ=KZ?wJ;GM z{C?$OON%ou*=gI^dTJ&^$t~9=riTP6&A%BD+d2q$|ajy7~s;z>Sx~_+YmDlirc4NVah#=lnA~nLrSVDh5 z*NPv_+1DIgm=bv*a(Hc_g31`Bg*1|QMweE#EbQzsU6$z7b{a8E{JwC7%E*m|v&`!H z9l;~!5+UAxq?;n^X4A3JO4<8y3A5bHPa6G7=VtSuRnAF{EYGU!8I)M##k0~oz>$l49@N=yw1DsL52B(e*Jh^uz-swH}8T^ zudcZ5X0bLr(6h^uMLx3Im*`|2U0p;4Yj!E~GvvC|Pu}nGU>PG~OfmS8wdrO{=Tjh@ z9xzrid@i?)F(P(A0Z+MbE&Q?R92-;#!q@pgmWJHiD+!JqM>x04I~SDD4+YV52#(%CTn z_gJ^zT5?R;nr7jY`B!NHGlI0l1~&_E0t}^1z|L3P!;49kI3x-%0^oEGKvY02-~kvs zqjM63C?&P4(NubuYNZ3I>5wdYM)i;UITaATY#kaX(@w8uo9DTFepB_m?BoJxktkoy zpmV_%jogJ?E2O&4K5M7*&==U=F&Hp5+Xz+p&eYnaL~{SypfxGy+x~?W=jk%@ov*rD z1qs=#TI4&n%}W@|JZd7g#z!R4KeBe=rv2e0BZ6MY=p6_4Pvvyh1C$P-OGt z?ovt7gjso}%5#`CR^HvcD2Gav(FPV+3;DK6ug=MFtGqkw5a=@>7OpL4BdhqgdSN;&7>D*=3NlGSD)DZ_|bdo~Y^` zRU+kazF2|t%HRXNdpyap-yY())6^w=89VbF`-5BFniD58FA2-;Sj-v>ZGw-2jn3X! z27F0tz01qflt8=N8_*q5xRp(GMpkZsaEfF8V{h^_ypX5Rt_yDaAcbk$bj(u{}$f z1DrR-C^rEEogl>uro-S&Iz;iV4`Iv+{H2MBnsNe$)6)ZBCTq02I)^nS_3weI$8(T8 zZq(T2x{Q=zc|kv1w^&)fu;nJ}*y#;F1hPq;V(VuRDaO#u)>|8}CJ2mfXdt?d@$p zKR-6XrD=9f&a|KlpwCx@MJ1z)9Kjqblh9hL&(Q_|(;%NOzIFn1Um8FF*DmPtGM!PA zwb5oUNm~23Hn+VkNf7=AC0e>lG!$If_w4=oZGC$0&!1KL(2!@FKZyRVR#6cJySsZf zPU9KD=4#)he8gE8I8K1x7VeCGU%$D;Z$07dv!3K}4Yp6PIh>_Gnw?%&xW>mGeCTFw zq`XtT%b5cL-3I|210YPm4Z7^b5hghI1Btn){eG|RuNg)D;w-DbekB9M>2<${Yu3kY;;khW_Zy-G&r-jy zbLg`0oC1AbUik-!n6S~A*qhJ16Oud}+U6f07atEl)&RHxBz*XMohSIr-Z{nnySQJb z)4L_f3S0h1`|B-#<5+W3cT+j*8*21mN6z?GTH(@!BqcYS&6GLy_n)NJ1JvcCKO2tX zv*iw_KxcCSv@DZdyNEcX3bo!#?~FfM9xsP@QEgfUXa#@e-ZexF`9rwRWrwYRQ1P8x z*++WH`%5!nw|KhO!U7q`^5ti5>;bThW(MHOo50BCHUd06%I$YIUUP;foZ>PL$nz>> z=3crMZy;c^j1S`6*;0#}dC>hTfm3iOAN^@PB6aNE&c>H7UmV4~00IRav2z{TQ5S|z zGNHf}q} zOPX;4flL5DlQ29ye0UhzwfX43;2Dv}%;9es4=@LRS09D{iemg5TX+Jn1;xW94<9A< zNhU9_4{rrQ@vtW;YHOq3e{<^YjFg3*Yc=iXNS_x?9>DM)0SqtvQ>fwpoM5a2;Pq`@ z=P||4TQ9eh`!6`gK*@jL7|SuE`_`_Y&rko!85molC;)A3Pqz+NfHAXf?UFgeHj`i{ z6aGap2m#=QQ@{Y6`#J+Ak#KlS$mU+gdLSY-W^N!+*u z`h0(r1JJg>PbOwII7S=QE%Z*SC3UIP`O4=$0eyZc%q2--z3dVc#{m>$m`&f4ab@j4 zi?G(MXf}XTa<%+L2fB%T-lm2c^Z|2t0Nj36G)PD(aD8rWWadcgamPh@k#`)fp?_+4 zZBhxrof?J-cddag`1!W5fMg}mvtncE&S?JKO(NFD?H?Mx#O!@ncLKf4v2b?fR##V- zlaq^nAKb>l#x{xdR*w+D@l9nN9E40214=??&AtghJVsO5SC;_70;glk@eRB(R#fp_uFTmmWKDEMSN{)g)yV&LBj?B z<+w5=WLlQ2!^9_3(L1VfYN`odWseh)98j1qHIs>HQ;X}x{r(X~yHK+0b`sRo1gILS z+*K!U+vcVyyH=wBJQ%bzkS~?klP0Pd{O6O^Sx_~wC44y`8(n{eTKKLl=+E9wCgd=$ zgEdp!IHx&y{-Eu+YJ77l%UrRVM9X1w;o%jpC~cmZNSVf#c9toyh`>sPPZv)jy@zP$ zM1BSl+4)d4&5A#tU$;P5UtgZQ+LvZ~N+Q;1==TfkeSNv0vNH|+<}sx!h?n!-A{D`f zP0@)?0Wk5TCRHT5{VUH}#>Ef`2dE*uF^5FKor%sQAH)YuEp^1Q9*fZ$dFKTNy!N(N zjV^$GmjL&+F*d2d7u?bI?Bhim^a+XfXn=<^Re=$eF)&+=zgZ|G7;k4Zgw>i&hRW*A z2D@XwP2TTCU*}5|g~vXyjAc9(Ri3INMyKD!zMx%pi>K_WEN z{UhBA`%tN%9o!YZz=0Un{86P6E_9?7|F*!D2EO zFm6+kbhRf+5+|T#NaluRH`6*er;>zbK6Nm6{Dki;V|->g8VWli4vhOQh#G8BiO$U_ zeSLk5=Oo;vvIv| z4YMIHD+awHOfKA0(K;%IFo}?{9sxGc-uQpR2>6!L8;lK3denKn8ESnA*E6?1< z-ydf5R|ytS+v#`bfuDP5DwN)VI8!UP@e%1Jaf0ZoUS|aDK_BKufb)M-Dhz|J=)cWw z{_NRH8jLITjop_Jc0za@rsOPm0W8QJAZ+e~!kRC)@u?rQtq!#W_~I1}B6(C-lu z&I?twvKR+;v1fV`c(H6hc*$}vwOX6kX{X#7TDL5gY9m}Ie=a6Ba5&w%xM8aV{L{J4 z?o>O`cGIDKu)=}v!0J+o+6~dMCFhfHcjlBJnG|Q7R;SL8x9?0Y6R^HG3sWXT&vI$JJ~nHAtAJt1L?g>k}#*6!UMGC8J4((hH$yc8SqE*hek_+b-h4AjIa zMY^<%QsPrg9ZHAx!OYlt6Fa+4MO9)ehu27T`f@24ZppUX`btPom-qLen?&>iT4v=u ze$asGNTLOt$4izA`L9{dRa^STk+d&~7(gD9ml7tlBpk&{uHTgBPe{wHg))g+QI?zN z37JJuvaR<~)xv$)D=fCUvrp^KAYe6Eod*>Gr{Pk#9FXLD0!R^+G>yR%{nY_?(_$t% z7)ZZL<{n!;o{SHSOHxCBQzNGfX)9z4W)a2DJ-4$piiHwKc+xa_b3(@3Pi98z&tr&J z;aA{^Gz89C6Zs;wuuzueJ1ak->XIFWu@tOn?Pa3dOROYYd{nJttg3WAIa@;N<`|*0 zS;mXJpvS%t z3=U51y-FAQ3Pu8)!40|n)lm%|^p6bCOW^04xFo+`Y79FH-BPd6eU&hqciiUg+2&H? zM$d~nJxu4nX{2%NOYpc))_;*x1KmGYL4d0Rhu-Ih|J7*+oIrq(=@k%A-`LpL+$_%$ zTU%Qz`9frA4G#ufXLImbYA2ghI}a1!+NMd~$H0mcj+UcmZkNkvI` z|M}f`EJNAFwqgYC4-!+;Vtmno)ZU5mYo9;sJ+4r4Ar17HY0}$`JM95_0E* zpzPpW>ACnr%8jr;H+D>Ra-^4jP(7OO&h!%;RRRF99yx8t)oPcQ>m!dR)G7YiLaVFN za!ASH@}VU`vhD|*lw%3|e=>*_S{&hjB?nKk{+c2bsiGT|ZpqH)v(dPhfdAn(7vBxkYpCOI_j1Ca6sCs&Osni%J z#Xmo9csjHKI(`0TaqAvAY$u=dXj7`Y!K-n6so{R$kH>of`+bVKt(#nmyIr2pXBXlX zX%nL0-HnY09_;^slHXf@P3@R|^3^+{rP!qQ&UJ?Qu9^yBY2`D?!Ny+<6ZrL(T{RUtw?w zaLdP^-3Vx^t22ElUo?xnO4@MB;3#j}GCy3@eQZ=b_4+VW-tA~G30D`1vU--p`(Dw< z<(yIB7JxZ_+_`e)idt^MzjXT+Mdx(tiS%w?Xp~^61#VC6AY^QDW#$k@u8V;bX=_PK zdRfq)(b@!lQc-00aq{5|w9a?sJCR&LW~vMDCif9r+o5N*tynN^j&_0{}lvEp4x ziU&oG4)hrf5V&#RYi33?odYqk6FYtQvAq27-k%o3;5d`#`a2r{8I|ZEiTxAgyLou* zu&^HdDQqQNVE5GjzR{oFrgrp4RG)Xab8ed89}_&|C{sZI_JUMTNJ(Q!(CWW@4uAi; z^`o3OC$qNKi;KBWeiVy}jpIB}=)79^=QqqAS~3Uvo}CN*VsLDGO!GZA{hL?3|0l1w z65&H%-lw=~X$9eW`h`7>M%|Ur2 zm8W?@4b9D^dn51 zAE1nL&v&W+0yr(uuzVJ0g9oO@W@bjR#;2$Kta?21fx-gpRm1+MmGzRvwsvg(RTIO6 zwdA!MoTw9^;VCtz&`ejWfkBBj?D z;1CXtzn?oM`vc;feX1TolPO<^L=-4ZJf;QvRpM^e!s&0dby%TV*}l{TUF(ppqVHLN z`yeHbckTz9w0JTg#%`@Cf#I z$0<_meKeg?_!(Zy3Tf5n4aCJ>6ITKMymBzevtR-rM_R5G8uzN-mF=2HQNF&jj+~&D zt3mkmZ5w!Py`%Wj>y+4Kt=rWST};+yTEl>o^_+6_dmv{L0?2o;aKP(+QHFT#3Sn<% z(4U{f%C-v8-mI}{Q~1~VNU8WB>qKyBrKbd5(EEs>wUy#)k?d=L%9inYaoea*ou|7) zp%-;=ZEzB8k30zINm@eG0@=rY%Y;HmX*)9lCnrkewFl;Ld~))hXFsclRdXOT{5X9; zJIh&i0)&gNdKWvM5d9|^SWny!^PfrzrLcApbgs5un1^ffIU`w??vl9~(j6%V-?BT& zMS;dSEVbl0#`GF{0?&>Bhjl5UhM%ygRYzvC9h{7JQS-JgU0@5!mzke3NwN}a1R^z2 zFOdyE%%&;U9#G&#YfgZqU0}CZWvtmT3OJ!GvOBYxv}OAVnRoBeQS)7kM#xfJXbOZ) z++GI#d!EV$VPyJFWHYNK+lj1S-r^P&+~I`G_IFb~pA{Cpw`1p-1bf8Imk1U;dvTyA zM}+)MBwq-N1Il0;jiMfT1em9lee1gh_!bTZta?A0I>R;DTKI%UlsVGQ!Yg zG3}bWuv|_aTdjuq4_pmf!3g)B3XRk>^H_Jm4O|foaoA^QD9*4m_9PUEpRFLQPSk1t z9eN3v0X9h}a3i!|_!H5%k;qh^{)H+@To8Lh!gXRfF0^awHN9{4M%CR+@ChD>;==pE z*=fqWoSaV$SXsg_YH<0JMT~5ep_eNVwNI^t*5z0l*#S_SsTxD%}KgXe{=tNG12R( zhKxs(sM9=pmJ+l87>_r*KL-Tm#Q*b-75{QhH@aYORi?2CNM*JCOdz>=X7h->Cfm3b z$dwH5*;XXX|E-7vj-5cLmo5l|vs$lU_}I^P_}gyF`d7>i(dm|uM!>}T!FF5n>qCBU zgWqb#T+Syf77l3OMyEh8sjo)Q_vC6EyA?pz1pvWXRKPp_!S-K8_Wr+2%b4jly#C*S zQEKOd2>R9_K;b%unc;-jrZWd#JRBLz0G`Zu`rAiy4<0f6vb_9}Y*1!8Ga zxth85Adp!I01f!~_+0j4oB(7kmKQ%T9{*>J@E>7k^PBRgNB@T*nve;#(9NVd^jAiX zFiM?G@=s1hz>L@@{!`TyCJ$cE8Vn01rSVYzY}i=urD(Yyu1N9BKwdz&qmy>yqUQk& z!TxA-qyCUO;}ofQuqT?UG6p1C?lxAd@7o@&t%-1AfVkSRS`Ow|UtLYnQ4Ib4P1NhD z{l$35TJ>MtS+fj+B<%zE`drKO_YFBUnfnyw@CFF;_Cf!{Op=1ae-6Rq|KG-Fen%Ak zD?=kGDH(WhcN;$L<@GGceDhu}lfR)c6DGXZ=H~aldcW-Q*SUED7?NmI7)mw}VQi_WJ5;41-Vep3) z3LF5Mww&Kn>xqgz_B+f)S_=Whl>9d#P&Iv}x3@C{VLWk+dpqMpv+W{{ga3$C3J!aM z=J5pd)1q$Vn%#O*CFVZ^(Fg?@u#p81kGEPyLes9h=+8)wy=(=VWd?N9`+(fqGq&t( zufJg!!jRb-^A7^TH8wV8{#DBG34EnWx(d@zF0svha+pQf z!;JNt0)j?)+D`#On#a?wRtwZ$MMchSO|px?*X4feOn?W!@a3fO1LX+;oZ9)tMMoG+ zogp!P^!4l4K)!FWznzxXSk>BEE?3jsyjq_+qXl5~iAuZNk4z&o=7gviZ|yrJsJl}F zQ=$qgr$8mI#bS=1V#VD7)EdxBf&ZVq=C)X2y-0mhGsnJ{;_hPZ2#b`*^gUI)rW;YS ztK?)U#Jk0R{YjTySz6dz5J;~*qeBgd+{EGUbTRY_bXO$Io}$}KgdqcOOI{q04xU3! zeutHs==cfZ-}kaFYnoBC$&J}0Vr-{f%JBoY+WwL=R-W{JZ(~k=;vIeCh7T_pCj}$;_Yx}zF}ic%@cQ*wL!U=2pM@Pe)!^m(9K8r-h#MaI5x!j4(b&*C zVO?x8FUPn8#Jib6=`I~S=ioGlko79k;lW;-s7(tH?PiSykj-?xXRg($muE_>U451# z`tR<0+5CN_X;Z$oOJKzacl!WBf4f+I$N$L2AJG&K&c2gueudr;J4`*#CivD^7F`v zq~uYvC{>bhpU~F69drJsdBZXNc7*vM7BY z0fjfUVfsmeQFhrsuQMFdwDRSvDuDInA$!r|%lGsP8qT{HES;R& z=Vdx0u|kAu-{J;OEsOd_93XZA`VD9gj-U28t{et zT3I&z7;Vpei0JNP(Sx$v#IC|!+SR^JqXJ$UxX6K(>Akr(raB&Dr7N$Zm|=uW;k9~h zcL>!bK=Fg$NKt1bqG}*=AANj8wEW#Ypk=SdVdRq9#IzsbrhRg9$!Kt`?D~@z&$`4Z zU&VBJMqJCE7#|1q_g;{e$Y|C$~DV34ZVBPAjXOlA?Uch z^s3)`JL_rZ9VMq_PkxG&h>h(Po$(Z0WHvW1>|?%b=&5}03moJHCwePH`<(3!#F{1r zYmNo;7JK^x+bqQ_t~gEz#_>S^Npj!04-0H#=mP!~M*6gGXXu|1l&9$g(z2mtJj9J+ zS$MgQyg$bTiZa@Z7V2^7MZdDGm_6uq*$63DIp~$hDsxY2SE%!^F%st6VH<)XVZN8f zD-54hR=SZa5>0asF|rR(d+|!;71X%MJpw*4Y&e!x3do<=`>l>oHTqLw&R!d{?MAF1 z2g?;e{ddNU*z$}QYBaUrW!`Tx&d_YxBhn%Ao$!zDa(Iw&7Lefq3&+*Tcw^eU?%_WH z&o>T#n0xET*WJLa-&<&LkI%p8O{Jc8O|LnG&%=5R3>m}?Nvah$R5o>#u<&1J9WwB> zDnh3C(SorKzM1#7W!9bf^glAjq->X7LPydvREk9OUQ z8%2;zpY;P4=(EGKiGN;8f`m~^dRSo}`PI0VfOD}L zWSA=Md)VxafpkJQ`&0QuyBFZjop&+Xv(@dP3wEx0^jh;AlzbWSH_oX#rmpky>tGcg zUV-V)Xop5+V|dG@4EQvEOgNeS1HMW)y^J8|UsFnTZXp2LKKufT4xgDW=Xn55KjZOU zP9VK-Y>{uqhgq;xpj}Tei<|^kAf7C}_*&MEOTqZmr^uR^*v-mJo3WJGG>by2c5S7g zkBR7Hx2*7To9Jd}MO>OMa|1X#V{OdII7)C4v>2RHw|uobDIxerUxsD7ajZ6O;STB> z7;Y$O+QT%M53T?+(dAX&C~}_ls_C0E$((c5F^U5F7}Nv@FYwMf%_m0lCfzV|dx~^Z zm9VqYCmzhh7nqB)fd}T+n&ybS0Wl~C4#+8zHZ#!`50)Z8^`!@Sp#5wJqM6}L8bvP< zZJ2li3GYvInuiu?A`1r?L!2XvicR2~lbXjeJkLpIpAI#k-}*lXeXwJ<<7&2tk(2@n z{@D2&&j~AD*#2E5eF3+673SHiUU!z)+K^E5u1i~@xjA4aW$k>XSU39h zCG-RK7;t8>wGzvJ0VSi&1Nsm%>gb$akpNUz>uNh1uTUI1R{VPoMsKU};!HvSHumh?4^x@cYM? z*PXjyt<#@A`M!${-TpGQcSIHX*Ec?K)*bF0sk?3-RI87dBm(yRw|u7T(Z#)ETjLXN zWbAdNW0xc2wxq@RV~Nh?uTjT4$8q733%0r8$IoW{{X>-ju0DX~wc4w=|4mVPuQP1F za~jinxYFv^#fF~iMuloE8I!(NSs#pLAEaMO;a81a)MDaSjVkN7tZP1UR2Q~aXH@;t zEGroWbNaY_TD%P~(UE3d;tp=bbzi@=Q}UaW3RQF4*m#pPZTM`S8U#*LoP4aG(F`6-O)@2o3<%oKnT-{W9iA}Vs; z2`#oZu6=zF7hTd7$V0#aLxYjB=-;%c62}h`3 zexeF3a}_&O(&x~>XKF(I0M~Qjeem8w6-&NP28Z6#*P~RE6Oj7UUeDfH^ugvrfRl_c zk>X1n)A9bU|870Mo8UI>x3yl)&#v9$L|70xP^bN9@XdfPMMtJ@r{j|N3h{47U5Wg7fZk>T7J%~>UcMuU zdA24DgX(6esyu8V5 zZ4^GL41C+yu*r4#NBNB6VMh~8vXJtDkbLia#(u1SpVna7S|i6|v& z!Sup$x#DSXnaTlJGhgmT5vJjc*72{5*fv&z80qqMK##Q4>1F6Z2QoCp&WXJvw>iGB zkH3qqG5kI9-0he~5!$tl2S1c}(8gLmy(&5J4^qS}58w27vr`3%c8Rx&ooPci{DEK8 za$4xYd-|s3fFyHvL4v}kR)6V@N4raJE@ARj+4CnF86bu7Kd+X8g?0*j?(xms&bK?6 z@ou>@1j7DY*h4il&>-uBQCYcmf=L7c{_6wdgA>-V7YAC_AG%mV#1wgk^s9+iQEyn( zEVl-+W#9I8B9m?(k&M z(JuGs1|u}wM-{{-n?imSTgg}BHK0A`a*DXKy|X$;?_s4l(~Y*u8984OZQT-n4t0kF zhFS4zb@oayJ#Y41ow~neJQXg}^ooZHxp!wqU@&qOXD#gEq1sHsc(x{g*Z$s^_lEC! zlBaC9>e6zePno>`-BsVHApUeUWNpE?&r$EgDSa>##KyevwU+JIRZnVYM=j`cu{1E} zJSo4z9vD5%i(t$zdhA;LUez{tx#meZh1fNZ@hr2ay}3HFAz;ML_&`gJ#Xv&BiBk|= z@HNp17`Zd;w$IU*a1?L8W5?b(L4R5QGUNoG6^9-|!W3sorb)Y%3Aitox~#ul{2$Gn zX*iqd{>OEhV=$_U>Y=S^)lzF)#Lkq8iZvvm_N}#)s=Z+_ZFNCIi%>Mw8ci%ygodJv zB9_=1R4p^M1hrIbLFC-&^t?FdI_F&fm;X0;@g%vPC%NwDzVGMv`+UCsYtoCiE#_>q zlQ*2NINO%X^r$5{^^&vd(}N!H+8UYPBw5UaZm3yT>Ff9X(u7zQ?AD&RNb?JFX*g#s zeT&-kL+X&^LWlEGSoAwuY%65{n@&ki4<|aB(~Py4S~1+H-D``3yVpc-F50e%zU(t{ z{Ub*Dgd{8MtBj0JN>}jy3|s(aXv+_MqNlVd`cIb za|WIK^@_7!9(d_8dusJL&RIDM6=by#k0J|r)xr>xuDF?e7quj~lEQVq#c{o;oDOpg z{-Y1wn}8G67#hTOJ(BZo=-sUIPQ4~nubDpszFeamyFS$O+9Y@wF;m_0WY*#By~(mz=(`zK5u8l_xnee~luBmV z5t7X?{b(pE#xWP^aFe$zbg$%3&r33%sWfU=K8odRuc(aT>(++Y$mIUg;Dqe#HYRyt z{Xve8KW&@{qsM0JB!B_yQ#58wU-T7M$ibh;zE$ESf?#xaeKfNO*^7lVMuZ9QsLq1F z^R%ArIdxW?s(ks%WzesDa#&J%8cZV;ygM>CMKN!m&gDs^uP=qy!33*m3e{Fa9P?ZM zdpGjfI@VXp59zVyLMi zKFS>wN{}N#>4*o#LYG5hq`Xc=p4KsPKIxNSVrWoj^l@3wJxpV0lh6KwOMxaSvDWd4 zK(~hCJUIp$yL>aNuGqUjig-i+Jf7q|#J8v&&#>u)kJM4rYW!>AZqksp$WP<);u^so zaw)ci+T3HsHGRq2tFg0k78b@$n+fSbF%O-TfZy&Dq~4VyjZQ80-H^K5TkLO8y`hHR z_eV`jX65?u&WCGf15ZI5+b01@vY^{@k|!xg?ESts<|BWIJ<(;yWE?IMS zjb0>ygfW1O_&J3&gY>b@rLlpNfZLbuv%4;+X{!1o&RTo9^>+?=pOzCKw$~g755;60 zmV6Pn?tB456(7{vvX_B`oDq(~I0k$jzRX15F8>*l{odNqQ+i=n?k66+FYxh!-&B-I z-bmUx;wdedA8cNde;bkN7HU0H9Fe6uNQ);Ck-I|=F1A8_E-(aEP8f2SUy6K^UH8Fe z(Oroc1=UfGA32V*SMF3Nn?_k*7+MC_32a|k6{xmFVFr>ismt?Nt4~c{g$j=jW8~3g zdKmEy&wX!``drN@N=da3hZ$vuCA+`AV>iDBApY4i_1t<&LKQz2Cdfks&T@NO%8@8` z$my;G%&*4|iq{jhB8g?&%RdFL=AX1&Q?ru5NajOz%WDZrNV;n>`Tf&`(tK63u%|;Bc;gWg2G@$g0&oZrV*45`>3EpQLAM5FUi#rO3KYuGUrPk zD(s}bYFRG~tyG_AD_Igz5njehD!9NT(P0TUm{6o;)u`TbC|$isRKt_%dS~dQ(|j4a z%`?XjU90q93RP>bKJ8Ab~;MB4- zsD6#Tj1TR8eZ{xT`jY|>N%rS`*f6@iJS}0WV+I%}9n!d&T;yA@g;b+dcd!+4JN9X> zrvKiWRC2vF9^0)-f<@ajubFCK=~k!9FLmKVO$v12hIZ^@^%B(3$As5&b6FMXpu8i~ z0||2c_<~_eY8_QT6@7aQmh70#ep&jfCh_()TF+h7Yccd<^^(g6YaTpJ@2J*w3BuuU z0*G${a(r25<5{9num@6(S)A%u+ddUlJo%yiy&lXt1Z7AhlM@Ce4~<;{Gf;U;^imCj zKzC;ys<)1uJXBbM7mc|_lMw&X?3nDBpkNB=C-ag*n6+G&M2msZ6g~4|8e|j5OxO%+ z>??Z)%Ds(@7DfBmKH2pz8>6ew(Y%BPC3M+nhnIHXdBJs?#axMP z+Ycg&S@(7#i4Mv9#DGU9EoX@aFuT$)fL*5g$vYADJ7}<5p|O^#S%aSn#eZ(B&^}T5 zC^kGvXRt}(#zKIGjY;NON2z~bb=8erHxZM$Ti71I1bgpIJDd#MHrzM&wQr*%$HV z&#>C-;eJ%B*^4Fv*X@%lE@+miC~E~WpR0uZ;1`rc>eLOg>r!Ce-?1GP?}KT0$Pl#S zBhceg;kpYdNd)kmMIAZFRG*DZMT$86&LLo{{2eaz7~~bEZD86#4F@#ISgSJtHBAjF z{T=bc@BX0owKhL%pQYrwyt)8?<`FAg>582sY!%z=rs6}2Y1nEU!qgtAd_SqsNQSjO zr19Ag9;yK^2)(~#$+v#gPOzRZ3)^~ZXB3_uVc+2|5#0Y27UoASFtX^v*^8)k!$1}d z<|GkCre7N$PcQj7a-RqaLx%yeKoz#+fpUm0Ap`8SBf-c;MJuSOPDP_v{ z(T3kdL)NQDVFhm?G2&5ad0%s4&6^OnOqGiuOyM}5%zblbG zz;dRjMr63jU~gXC1jRM8*`bTbG~2bcfZm^&Po~~QIIdnN9zkn$pFz#nbaw9?F1!`~ z@}>__cD7=5P3OZyoa7Bh^ML2Rz3l`u*UmKkdH(hg5x7o<4JGs`ji8SVx+AWO5B(a? z9LutE3rAFYJL+ME{~V^+AQ_^@UD;5&Jhe8cv1(EGX^sQw_LD2Sdcy^M<1^br9**8Ob%h>Dll!*|&B<>}p;<_Bg1Y&_`4i{cHr`Wnz) zEBM@J0O1tgG&()Ra6Xmi5i6E7ghF3#sKU40))&Rx;YkK1LoG8AqJ3C2v*CbF`IWi&y9^0!-M^ei3=Jv`z0gx|AI%~>8!8T4f|Q;s zA;`k(v*K2Rm=Ly~t20?_s6CBg0YY>&?^=sZC zf>+n8b#DD?Mi`1rk;LLKLvDEnkVVZEBoXmnv`9(T$QaMizH|RVn3~?0E=K}_Cqa< z6Kp^JRFs!n+vy@VP1V0W+Cso|hcJf&Nl3_`e0D_a>@*&OAJf)^dyu@XWjD&}=PBkE zTK=$HW0E;xko)5WHrz7BDAGFA~=DTyP1qvj%2umJCeB1DkZ&u{*+qlCo z2)03Gsv!Vz5RL0)tj=@-SiUiQA*1?2mIX|oNAV%}WWf!C9pwP0p5e;?*l}au$aV&? zIzSFcde~QLrDNR6U1Bet$G$tO#yE1HHk#3u70n3n0PtT2H>)({l%gnN#}}f zK-jHYS`rvh$?`x%*#E|5pLjZt4RC`#ep8Z$*y;iLH8OG&s7IpZY5xs3NRe8&0UWr) z-}O7j*4FTCIHfY{Uzyq00HM?Ed;mPT+aSATRkiTnGdnV7G&F&9hXr}MT;nc`PQ`)V z==yFl7n1xA%sw$12Q0$aRUgoU<;F&V-<+FQvKX`4{n!9@-EgwObkDmRaGig94umPt z3H9>w;+rsKy%lPHsI~*NGsR+S_Lw23L6r+;!UwURX;wq``VI(o&g$8c2l!LN5=~3fRoCf_DLYZpZOg}I-n0ve&D$b}H;p?3GIoaJ!1D85 zYV%c}U+1X8Kj@$8m>N*m=XSq$`*Q9S**5U9*-;~VcsX2zFS#Ls{bsEJHW)81lSL~O(5d-X-}Uefq=kUF!> z(8XJ`g`2yqL4ovJhzTw;rVU!XAGfa!ip#?xK_Jyv$;(!G+tQwefAJ#!%=ZA~_0GU`BlK7BfyHO@^<3BG2Z-*e>yv~iEsCdHo4x~cY0au(d@ zZJFQVKK>fiB(@Z6?HhV9%^CVKIEbo@`@qlho6G`$V*v-x4TZQ~(rmaNeLqE@kQbm6 z%RgAjrjZ)SKw+ELhv*m>jE{^szLUF7A9ypa-yd@N9DtICaQc5SwjK<9$PrH98xnis z$-fD9%H~nq<_{b90BzaDTLvR5O6)`7fXtV4S!!-&bm| zsvgbiLV+-M5X$xEYy-|DCIWs$69NH2BH>LLwq=LLG@4y%sOMF9+*dNhC9^o3BZ-g0 znwAz9&qhBC{Q`{OdeeHl#OuJI8(&;r78%*k^S1zyLp0Y*3ns3#gA5|&He&$tHzy}2 zKLi}=-AKr{=VsO=Fw%I=nf#w$kz7uJNAD|d+zRKwrGt4+Msr8gz!4rZ6RS%VM(%h1 E0m%d!iU0rr literal 23584 zcmdRWWl)^awk7WFbV#t^+RzZ(-L3IJppiy`6G9+(a1HKmjavcebZzm`N3tYWd`xv(MgZt-ZdE($P{T!~@}>pr8<{swn88prEy*prC%j zK?B|?rCvM${zLWDQM))i7a&(iN=?ekoN-jto&9H;}bhc#500!#OI9J1d~7|6Gs2 zrhKyjy3e=%rLEl~Ke9sK#GQ%xSVH?Y}Wg1>)Ko5vEV@(*w>>e8dxmY zj+KfKcopmLMltmMZBr}cGvMjvLokbG&t=4CV zZDrc$iS`&z#&e{03j9hsxIUiD|1@CLsF4`~uk;z?s%!6cD-~dC71H5Mh$@p#-ImAZ%&XZ6uGoHwqa*acJsjceV=or!bN^?t3bLd zU4M+HOfdaDMK<=~h(cebggiG$YpgkYpl_^b6~h>!u|W`pK$uww=_V>_EDAu17~~q_iA$^{M>Tic ztA{ms9?^ndoo0MGEHoa{VQIvgPGQFBFDR8_6&SO!r^_*wEaU~@?68RQKcw|Un}TeW z;&`w>)2!#`i+dz$|DHc&(OSv0d$`?nl0dV6%&N-FygE)?J>7h6sd|w?+3*!Pz1%AT zjDc4e@+sk;C0Ejo{n^XbGdKJmPKe5BVDA`L4+)Ok&N4H~`!j8j?pCml`ZA1*nT9%4 z$y%l{z2Aa2x!UF#yu*(bjWeHBDB^$amC@>A8rSYsx+-!(r9W82>)YyBSQK+z&PdNd zt_zA^(ZO_GHoVx7b6fZoX)V@iB|L93Md3Me#uZCz=xRDK9<^;&V6yQW#Dx$w5b|o! zGHs^aQPMAf5mjWXNF`ZJ){?oyB3Bk}4)gL_;iu8OwS!a=0$6OhOjpAiS<0#}RvV zW0opMfM_n>JqXT!bctui8K>;a@E)gVj5$+<%mV{&cKxNPA#JQ^t6i37S!}7nVDS+9 zsNhi#5%Nho7rY3zm?fc*O5Eewy;Fn(KBLpr*P&(a>u+19MF*?3)Ps48D?TzQv&V_> ztd8>9BgSzO%awu=qo%6|Y%k+8k)T0}&$@XSWBSD$YxZt2!@ffG_`oWy!wkcQK55gq=J+9Wi{E;k?>eDbm$b<6OMrX!c<2aEm79I--=;oUICXAH1{7PKkSaYB%7PD3D#i#YukIEKYawkWtI(yVIs^HWl2 zY708vOG9FuHc}ocipB?0zER8+1{~0-6j=0iB!w^cG)k&0?G^(_S9GT8!`TU;dg=?z z*UZj&q*D|L(hMqE92H7Nh&EW_`u2$Mh>0!Yd#pOtHbcbA7)Ql~3u`aCirgOiadJB5 zPQ^+6cAFrHCg-+oCDTR&Q;JU5up`Kqf$520ek%n(&ng{%#>)hL!@dC--%)-ZY=$^a z0dR}L9wk?hy(MicE3kd|&bkqr$wfY)i9N8jf5)1X@?iUK<&#>p(3~?*@2m1?)HR)eS6QRuqqRgcZnkO}RJfdc%$Hi`g z@@ks1be=BFh7R_35=yIpZGe33{LUepd=|X zLlju2LOT*A0(|t!Snwl$N`<^uP{TV}i|DNr+_yX_xRglFjWIV+)?$Uyy8?|PrvAv8 zIYLC4U1E^Vm*m1KgUUVORpIBm0<9b!K^A)=%!J*_4>Jpt!g7c)nJVa}N8*R8RmrV0_Phz-H88F}cLIroJF z44FvK@axIxglD{DL;J~1Cw1Yj;k$;8kCRG2bfGk%g3G!^;v>oM(nfE|L$l<9TQAe1 z4R_~JQ-zq}L|ZE9aRGG5K|@31xCU)Y62=43g*p~0Y)HTgcNACjL~m6p z7$P`T0{TPV4v92e#m+LQxP%-YrEmzsQwI78+&_(A5R_nkh7^M))VTTl!q&E%y_wP6 z)ok?=gBZRDYMbjoU7%wQkR|J=6Oydf+n|Tq{zoMqQen?)tpryc`V|CbSl{T1$_v^H z7*sf(qIu8zGjG$*@8K)r(BmPaC09QC8yzh<7SXLOZv;Uqt8qxXUWHXss@=R?;j~{f$`k!{ zeQs!tR2#aUGRRSR@ScuMC(*5#KrOrsN5%3d7(!%FJRe&vU>YGYlfz%(S{a)T{+&do zLt9~(TqB3Ma9n^vpgqo{$I_93Db??s#+abkJgn9fYMds6u1MseZ=y+>Z}VAF8B0_{ zokpF8SrQM-mnQqGHQr9i>5yGD}fGif#*DhNox=&7_z; zc>Jt(%Z#=O#ot;;z($4q=@FeLG-@+y3N%x~K^EHX;(KD3C^N&6szh1A=~)Vrmw&`G zWxT4yYQU@tg<>sQ?*>(p3KAzB>za(nv{t5%@`Je|J2yzwgFQFWMqXeQxq9_XL~=T5 z_9nN%#gMt2M6-?+1mK$}7t*xVB04zSd$NDZ1LaGwM?aDTY@G*-U*uM%p3<8E4f=Pb zg_V*J7En@~wldTO6fnp(lnpg7ILA{J8z955$S#zqW-_i5qp_1Cl|v;Mv4e9wB~&re za^A_|{uJ3Z`~tHO{l)3bTE`C!7&He!k(AtvXB0xZdAU%M9|fGdLQU2<1Hlq>s0}Hj ztyx!E1T6J4pf6k5L>FZ;i?2@|(+WXcOt8-w%qrm)9_WOop!hnA_?&d6IZx}}RNXvN za8e%t&PIGV6I4?3-J1kj!9OI5r`^JiMq&)X&xM-bi5|CSKvww=4Z}(8Vq?r^x$0sC z9O8{R_2)FJ3I!mcHaIF(ShEmYYEkC^gYNzZs35JWben?ahh2rDs#83}z5p^BZmTO} zDB}^*%!*VZg`%PU$vOVXTWS@{-S)AJ zLyMw9g9#xjLeIXULbfrf<4g1(Q`g=#gj9rE+}212ZqQb^VxRAu4u*jIxlaVIpzpSG z&XF$2XA?|RguO*pF2;}?Bayz=reIg_w%89h>rI<~e%5nOC2H#7`~bnw;Nk||6Ob9a z7%br3!RFqg|M}xIEr^8QbzK}U@#7aEuAg_z#147xZuzgAynVs>8=w4ub5N-UDx%v% zPrVP$AFKoLH@?|_qGh{Tp>O-D?(gkHApIg zu2iWd6kbcjpIe~qvB75nv9ZrU#;6Es(FEX?5>h_<%N+qX zm#JJvwNF1Pt@easmjd@Y*1lT@AC9Of7!^%dE~o1v$&Vd~!OHE)dJ2xSa=b`Qb@-v7 zEDlZ=+?;jDVUO>kMobjg<}I(|0uhOVxz z#zv-88CgEz3cNXh|IJ`Njlz29>Q1v$A2p9Y$R<}g=ulEdLTG%{RvJ|5k%Pk$nJBI| zf$hdRh=#{$6s5S~KcPDzsvpmaX8^_W9b7eHkx#~&{n;BQP*DvjBDvTQY>lF7H(;%? z*d*z1JQf^83um6?oQN%*6H}-X8;rI}xNeeMNphf#cABrH3_kd*Ka9zJw!gx63O3ku z0BETNK<$ox^Hqeu>0`+EZR7Ci=b5Pash_muB{Hy!FXq(5GCV{!lo8KMrsHBzMGp2T z%SrBe6v2YJjuV!neN16cHJXH?R1}OLl@OPH>sW2KVkdz1(QdreH=ZU_F~0byxwOoW zG9R9WvoX-m!&+MyYMdO6P5g+$!L1(-`QWvyR~g&(>eTU2c#uYr?E@KM4n_`YsX(|q zQ+${Rn}U=Ud%uYy@J=#f}Y%>qf$Xe47SFQ>o!PSX3 z40y`}hO%Tz@ZL5~hU0*lhsh~Y<%1+wSZ(8Vodnzq1)A4180Q`jCvo(bcucTug)vW^ui1>?0DgS$5psf&uXw zj7RxMThJ4iMfT}u1ktGLOCNpIZ*W8(z+yA0fw+iI7NJy-5?Ie6Sy(?WBys8H=#_oL za%DuKsSMiC*Mv-diq(=D{vyE6Z0LR@n*K?~q&#;p+9s$OcH-|C&1p7zo~Ti4_%y6H zZS-*#QGbsyXR=G;F!Nhs+qbbP9=%QJS>K^t>Uf;w!b(G$QIZ~dvZrc&3P`uzX_kN8 zLoU0!+OEWuJ6apAi29mw5s5OsTeD8?>$DAWoJf+PM>-RzTq$e{ErbEGXJ_uWiZS7#p`p3Cxp8rEEiElQ&)hDKHla-^ZazBB*O#3g9Zy~IfMgcX zB!Ubwm*FZP3o3>?5uo*QGy42ql;v`EajC7VQ6TYBE4NK6H>uK6GxHHEr?{+ocBco7XP;LbfgwBs^6|prV!Qu^hpQz_27HkH z%KI{J7yq=cBm>0h#!pjSSLaj)l%H2}Mn$MKLDoCJ-k*w?PxjywjQ{A{zYO#0o0yo` z+e36|Tg8Gqinx&V4GqX`qx#7&P6QWn1P<}VU`}9D?V{&K-p{F2;M2A2{5wPMsk|oj zeAk6<-;QJMb1|0~DdDBdGMd!g`Ml*#wtvRb%Z6L~jKGs0^g{ug9r=ZH6PoWYj#hnM z%b|O_ceEWF(r&HxS>8H#IX)db?eUQ+$G{2=zOyI+51vG5DfC%ev4`)dW(;Sifl0t+V{Wlb8nrvVY(%DSxMOQacz&^Oy0jTH>P^AI}jch zN7y9~jOeD29LY~d^yJAC_0k6?jk1OWXv~_N%nXg;!8*Xj>P2{WP|EH((!?xwiL=4BawZz` z#L{5+#p5@%?o2}#$r)Dz5L&r?c?S_74!84waqR6m&gX~Z{INh+$}*@8!&F{EvvAl^ zfj9?PIelfLsh?4k^^moVisB30n03qEKdr>)BeS$@m&kc{zqnIT@bB*@YierrcCk`= z6foWPidOOIUy0J!9)Czgn^_JYE@HgWx&0kCUo5twUex2N4PceJ9R)~rO%0C>gnOHd zkWbR*{BW$zlE>0v*j3eF_QFCVdBh{VZ9c0NxPqrPTagtER{Wz2><_HcNC?BQ+^T_s zyz)xk`H`{(%ggLZh=P83QLuwRZI|TV2q8z-2TcySUwe8%SMmy?!6`kJkytxB`w)%m zKNx8*)r<6Sq2BTH*ee$~w;9cMT7W`(5)I5mPfrh;6n+%LcNF|3hJk}=WnxQV>T(uP z=gpCmnEAHfuHqXts%Im!2qB~Gm%CSKw`b%)Ts;Bes=l+cGsx$oYx_$s_oe=7Da>r)FmBw~qhVC=o@d;eA$Tzye;64yKhrsIP)j0jyx#eb1mJib&_P{Nr;xAto*^K8*RefbxEdk|z{H7Zw(bpFUNT z{F_I_-R6~wNkP5b@5bo=}F@5@WEX<7S8ATi~N`-sGidGs!Q`TBKD3kVX` zgNu)3z?^wfv4POynL79;bZye8njd-uix1o!U6BG=;5&uFU&Z_${sJ%m?Ta>n(J-(|Udq^8Yh|IwzAg|BVr`w<#gT4Jq2 z=${#av}s`@ZqOs@m~h|wCc*B5rRZ=y(XV4(( zm5Px-O>$l7?C9#U1VH~5cRd3VWm4*jdk9)NMjR79G*Dz^A&~}`p)a5WDqNlz5$L`| zjZFi^q+51i(3EqXlZXVH27zWk1$i^^oi0^+Lr{o57z9Bu1XeH^QIxN{fFuWNnBd%n ztR}r$LpiwLS+xVE5iq4Gb*WM*rHPja29G+r{9=53cYcIWTCMe9G)H8lVp)#-i1K@~ ztA(>fe^0>~vbibWeh1Qw04p$S8#A|Nl08u^In%3=+AwBq#knY^BK%^V_~4y9$p&R|or&ZciAqHE zY7ulqA)Gcu!yN1#_5HjeDnAK@-^Y7$=y8X2p@1M6fK{N)2V?xN9^)njjh;j!!u4sb z@njemQXecnJaM78$JhW+=so)06RJn=d3XET7X%vKr?Gws)es3>R=RCc;N3xxZAVgIG-jRsWj~# zFPhiF5f!XtQI$EKp^>WksTPoi5>nKZs8Iq6TiKRTL{^BB5$pONT!VeJSfyfs8KjP8 zR2kJ#8Np&rtby{+Y4iYWCOV7vYwLn83r+x^9n|E?7J=e9k_i}Y%qWhz6>|)ImZ3P( zO>+1;qVqI}qyLM%=qEIh6kO#rbF9&<0E=k`IWTXHDHutos9^@?*8Hr%F6u-<3k}aO z8u%HO{RztRlB77M9g$MS$V9JHXiloxPxq1jtsru3nCMse)YxPFk{%k2et-=En9E=f z#{Z9d0}u_vpDze=QhPlqnuVcbDn7RvR2eQ?x+4qX8Lfh7S{Ep}Eg|@jA=p0*qp`nT z!4tD0oFzTDu}u03WrpN@m}p$LznQYHg5`P0Q_-pS(UsK<#5{Iv)rQk)56hPDKiK#M zIP27g7a&afKL}N3d9b>tD_(Ix1V<I+>#-` z;*V&0YPzn zqV26#q^{Fjv)$Bnj2XjN$2`|JW#NIIYl+EYV=Ap}<}+j!tZ!X03UP`W3lQgDYKlgM z?Wcdvdf<&~2q;qDgXL?rQ1F(<{bv99`D?s)`{p|1{&(k2gQ`yBBSS4wt)%u(GhA{U zsLy|Q7hHVDwQD66X3NCxjj#~ok#V`e!R4Qhsb;5`c`4?rqo_}NBqQUb5nU#Mp}88B zROXnHq0Tx~u8uL^KuyXHw+PYk6)6B^j?p-o_V!O|%IH4=>sTLshA>BF8BiI(tT?u- zt;=YN2}G0IMT#~lvNCO=AvA)zkYRW%SbbtmA@rT!^EFOvkx$CcM*KRSrKbyS6tnCf zks4mLdf?bN3yjx@^&!?3?4uIRq~runMjy&5b65Dy;x+zw*2k0Y=DX-Tzj&EnBsB|S=| zV%cQ#-&%t-+sBruEJ6jE)`g9EZn>O=r z(v3B;$jZmZ$J5hOgs!%x=4q$D?<_ahVs6hfeo$PiA#kNo+H``+FuV2q8J~^{pnZn9tA8--!P(2@@ag zNcJi)ufE6KO4~)jD<;^Xs6~a79#-2u(p?8F9mM{J<@>bP=S%c{>l)@Im$#F*Va=)* zO*n@`lBolKF^nOEfkFf(EG$e!L=;_V@7#GSjC~OJ@^b%nDX_!m1s_KLAL2Vz!8MoK z+FH{mz#+uDI*@~yN(%YPvxNKe+dt*qh}nf({P^)>(c~|@e_bq(ET~gC`6Cp57Wjv4 zw$P8L)+g{M;dp$uI1PaTpc>4O1F8YQfmYLz%K`DL(?-jP_-~$`yQf&q-~UIF(Cu2( z@fv1*eENQJ<|ElSzyzkUDY6>>!mB9w!qU>_{1j&U_RYoJ>9K#t>kYoU1_<3D{oOa> z`n#|B*O49~PnNbm`C&=V$vibbd-2JK_Ir)xwfgLbj33g0=Wddx)}hj0fS&$6e6I%> z+`D&%oVkbM^UE73A1`j+tKY23BkndY0@+g=LN`KWWW0E&gI0Ri-EyxKuWPy_Blk|{ z1EMycNL?!3(*eJX(4J?Wp2u!q?-xV{fV>cp_sw#ch465+?6VS8TMUIclD0~5i}SB} z@w07~XD{wVxv-w@VEs&WN2Q*zX}t7H`WIXdwv_pJ8)?ph6H@;p4)^Ko73R^;$oNjk z;RAZf>#uUhif^2i^>#pP9zTVm+AO&_0-bn&aZf zf52>?o4 z|3vgNT8(%`T6Uv>V784 zyCj2Imfuzw$U$@WTP`kFN6#*_U(((Os{(-0CvO>WL^|Z2sDQ60TAo1fFMIGi!TTtJ z{G>>Z1;2j7aW<>Uv;8C(YsvQRqdKtLh;t*cXb7-?m@b{BrN8(TI2K`2imRm#@wzx(+WR%aua+{swtmFg^Tj%}7`zdPn@gF9A}d$d1WP6A1J;3Q zj|mIcXJUE;W@cuKUzTrIJb|n50Mvbo{%-g94)XPORoeTcZCKGlV>Pww_KjUh-JsXa z(8qgu;+_X2y3i0syuPI$Rf(YPe0O%g|7Xq!p5EsKVAC=Aj<0?H{_OSZrD#C6eWku# zg!;nAXMS!jk?8vEo=?vt)1pvEchLFqU%YPyRPwOfjd}}jKnW=M087gNhU%7ZGFg{| zzxWYgf=*Jv%?ZYk6Nb!0dg3fGpjxF-;bKytpE&_1^|)7ti~eDxnPC6_j~4vX^Ha_M z$^*E;s+%zC-DXmx8m z+xa7^eZo&F!iQE!e#@6rrhtV=qYT)os(pEW`^%D0Qj&%{UJVHUXw#&W8D}{g$T+N> z!ahE&D0uzAOS_*<<9qc=S=1sRW=)r>b8&HL#{m-T-mh=()w98a5>h~Q)cWBt+Fi8j zY=v~A`m(a3%%s9)06@hxn^*dhuw zWQ3vt3M9x>wIV7cm`9zA(q>ScyQ#34+R#DLHy40r?A#y&hzx4(~=hMf(?tNIZv zku9%yx0b_97X+H3;KG6u320?A=nU{oNBT*UrpO|3V5vF|k!J5*D5YVszH~sHaEGV9 z3PDHl`}sBnb~Q8cK)mIhM=sOP)KykL=f#C%)<@4`kI_GKaer-uVvQz|X|}=avL3w2 zA@huNZlQ3e3ei$a<>-&9NGZZ?HnbWMb*k~mOM&TRF-=# z8uk5(!J%9=9RsHX`XM}f&ouNQ)z#G!FAoY{K7eUB0V4>>)fInQnP62nmMtz0b8dtT zTrk4lzPSMlo6r`kT`$-RiVEnAXTrbD#%t(naXhiLYX$2(;<7hWEavb-s~OGzj#Sqf zXGWV4<2*NEQ8gAdV#cFYwEd^@xYv?R=vR<+ zi%N64%`|dV$7XV>LMaQsC{~pSgl?UVXi_d5f3_JL%VT)z;Uu&&cHegq6Je5?Bl)i1 z9tSQH0&+*s;7|ay_{$bSy}3NIUtdF>>-xQJ4!MTr0!+;0wIadeod+fyebFi+00Yur z?m4b32tKdmbXgA=nld2++!8rV#VVy(%Hihx zXDzWIq_B9=U{2LSlMUWX&Q8RKHqpikQ%{*#Q7x>GX;phn2n>ZkvA?aYNpxRlp}uxI z`@IBon^G<_e$3ZVy8_C>IFkbUMsbB0ThVS(Hmi$sR!|b>i%~D57Frb<(;ZrL=6FnF1=kH3xcrFMxaqySd^pzz4tOWB}I6&*LL z$fyO4*56di&6-3h*4Y!yV{W`=*d>!QAb#qnUdtAx69)(pq{G7Caj?Vdp|4mdK2ohYZpE2be zB5vQ~ub3W&tgmPG$!+9BkU)u;ChBP;Ov-4}GG<&z@^lAylS-Tk_L6oxe>O*hloY4d-Gaa`26rFg7CL3qnu0^Y&^dPWGz zBuD3+6c~M&e`F)upcWxyV2)tnkO2S6qgGhASuc|VWH4c(xfpNXsyobPC1o+o*#b={nm6e+q zwz&36V??5;I!**?mO8Y48YB_U35{hWFjCPED4GquvrmiFA3aH4*LT_Ko|J$K^(;O_ zxC_o=GiDd{(1$?=b7F}U(f!Ox#JQ(Zs#1R#*HeC#HRpwh{G=ZZ(iq$Q-|%~=5o z>#)vx;IPpTi2=lxo2D)VlUB$USf=-6fPHe&ln^yZKJ_tFR3~RJ#VM+ZchXp zK}+5*09%Z{ZU`@fANY|EW+Wq1;ryP#u+Zdcpag6Ogp?25-rf$xP_vM-o40weAW|H7 z0tRW0MT{ZbK;w8zwKd@8Ls*EhiOJy;o;a{}h+>}}?A}jm=UWdqcKpj8xQYKab&=Z? zLPtmU^XE@zXJX82RVVi#FeT@G!onfbIe4?`kOVMKxd? zoTjkFHc#xD`nI;V&Q4y!o(=$xah**AwTI6n435**?OIExVxS%>%3Q$M>hqRp04Nq^ zfnL0zM4VzI&OmpMzQ&ew@52o#fWnyk0RWZst|7$jgWI4?zU7yIt8MI+mCK$gK7SY> zM!w$bjj`WkGUJ_Qy%0z)ejr9eQ2hWnU4$1q=mdmrui;8ev(fwBGT@hX;MHWnnbGaJ zh9!N#JX?lJ=4@ZYqW+yCD*zyX#zgq|_&6}Yvp+&u6zE-*M&+4#2$1 z=@?Ap>rdPg0Tus~L5PTm>>SUtbY5JzLa~2|emuDd@92>1S^$=%qlg??u)oFg{Wu}; zX0~f2;!7O0Yg#z-?asV({LQGJw7h6ew#)J6eRBhAZ|#-mc8$PTUqsjSmw90TI2x8p{L3LWIu6#U)Mc$&PJkH4O%!`76oT z5GG}RDE@fHy1eMi^)Fg64=hgTh>NQ$F&4V!;$M1judEx@aLJN{J$2RC0o|^u>u$ZZ zSN1v~9oFvL_r!4RtVsN&g7r3ZD&-ks?Rp(}a(gBcb`pgjT{69hM&FalY; z`hBpT>Dgu4Ii0xjwgPe7k-?h0$?I7sn z(=m9d+}&@hpiZ?Dhtp>~H~VZr*t!B_27uhJQTJc0ygam%8spS-Gc7{>aODcU4<6d} z)xN#rq!?1d!!F*4zQUF4zY~xOHy(>2RR1J;%a`ujaVW@IkxmO>bsXl!A=FTg4)*)-?%m+ctOn4SJqZJnDM3VEULeap&{UfPdM4&T_pU95gP*j6 zE7+PQPHAy&c~thES^#zbMr{v$OWg8q83>(qVD%)-=D*HZzS?c83jhZ8m|7;-)rNP zm{aJ_ko#&t266?|xS*w_rPEXIlF*5~U%!6c^9fMqX4uE3mX?8BQ!}&V@5g_;65D`r z8G}yom1R!xFgFied;`rV`fBrx8K61c9Ff4qz=Ju8|0clvyLaaQ$&W?+%xR7RqksB` zd!9=IB&)vF1K>FTj#Op~-_6vrL)B*#@srt4T+=RlS2yNJc@bZ92VMfU8$InrLCp=z zJ>|5Z7EZz;-#=gM^UZllFw|@bRE4qQ8W0c42}1SF1A(cD*>H}*DjMi{!O8FSDA(o) zgTu4T&X(kRX0|acf{{-oob3;qwbl&zugY-r@V>X(Z*3L4*Xtv666btv)PN>Gpulwk zdRU9oyvt(iAs~@Y1L<+=r(3up`Vb}3>mB7xZ>2)$+o-;b6HZ#j4JCc{Q1d*^Z1T$_ z8(D@Fd#%(t>QqTY)vrUON5#^7MxytHkN&f7q1_IoBQC z1ppm`N<;{$ldDQbDE3}XW@kaaO_lB``4E{e1)iv>7M3{jh%pPMHnaf~C{X_mWzk60 zEfCWe8p_dDVS(BQ5u-v4>u`!@V+@tb#lX*p$xC8JMN1{p-AJGdj-&zrAsDX%?>voi zZgXD`2PEi0Zs~GX5Q5qKS*##2qKPv(yX@iK`LlB9tYbeNs(2n}%pz%7ZVb&Kfd@51 zXIXM~J-dM?W<9%BrFMwn0LI#sqOELqJ^y8Yj-mx*af5bgHp_G336oezT5Z-#H=yBC zL^P=LFixpd01H*u{Qi29!1dTY7Yw%JxG772iOfc+xA@9TKbbJ9_^@Gva26#M@?s@g z*PweZ6UK?ntrm3tMU%}XRXZqmH4CINMUfnRjtZqSDD$?yW}vec(ae#vpsPTf+eCYl zQS(`F?>!q!1($j#xC;T{dvcF4VM>rVI@62qg+U3Uf*CI>v_Xfy!?FQU%KlWcB*PqcP$267q*B~d<*-U2C;@0gat{4=X665J)@bthbWT5CWmE;zs_dkNz z>v;8$3K*)%DFM;^N!zH%YOPIN$|~XE22=cd*4rEE6NUvU=@Rz;Bi4BK%Z0UD-7_q60z0K!xXY4+x1Jz}gn=>Bn z1((xdvG)+nQ)yQXf}%`Xu3kxZLq;dSL~pR*O)|100iCJ49gyauCs; zk+K`v@Ofz1m~-8N+^AUf)b3wb)`6g~t(+ThQv9G%#Y>tLo+!6|s9%kn)9~ZxWPehn zARjrl+eWCi6i!qov0_s4BpF*Mampx7X}KV@c$f&I5&=Hs+-_%}Y~Es+CX}_HvYv=! zh72vLqgGvPwV=_NMu&g&*{5>gR~qC7UC-b59tn^&aDLXnU^GHhMiBeY{e5bHdxO;z z6hn7&uFrBq0LFEmp!xtd_610)+#y$I`^*mqS6bTzKyiRp4!!p*<~;nb<=1GyGXvy& z0N|~Kj1GR(%FGuNm5$IQc{rbUkn@FiC z$Ia*6`}ev8?(-FCet;LQES*~pPyv4tM#u+vKDD$w+po4K{mpQuH685Ha4(zF0!1jm z{viQYWVqC)H$apA%MRMYbzL z4V?1o?j=ww^Ss*<`O1oYYwGGe?Qf*s0N;osQVi{6LVla4={zV*uaZBbGY8x`MRr5u z!2SJozu^8uKRoyZcaLCDTe0z;d z(l@`PVO|{z-?fE-5*-M5Je;3D2b%t=YWD3X$U2Xpn}d(8DVKc_2GVC&fx4V9>=Df1 zpdC|Ql&&{Jt72y{=hCgOr4cI~hhk~>Xwu4Lp>*Gh2rCp=@ji!phYu=%oRIL(r+(zG zzA$iM1t+nll9HInZ$IRgsM=ts&tADYsrM#=3RB^WU*${n*j*OZpJtT>sra^zl~b zCiN_U^`GMSO29>nf9u4L%m2|NvwH6yYK^(b0=8WS%YEkpuu`3xEz#Z4J)M2eR$)zG z>&98M`YWG)$2j*&=C4+QQ#T>z>c%fFE&aeMW~CDHoj zZt-S5=e^D59M~7$jsFf{u|ZzxH~YMRIwXA$VgGu*($(x2{{zGp&UEdce9Hfo{(nOp zpU=CU{w6JbZMj{HjJ%5RnzFfvvcW`(eap*_x?*|1YetuD=5#D~dzH`t6W!X>anrR8 zqz*GN3c>>E+nMbMeKFD?+uQa3FCUazjD zQ<8{QuCL$U?@Q6wlT$5!PSP!2uReHOX9DnUz}sd9z6Y$k<`5JQE1=`y?VW0=cf)&b z685o-n&uVnEs%+}flP#RGh$T|dTa4`_F+>$z`P^;N&*Ao%)c)K$Cw-g^f})o2Tqcs zlq0``g^SbFtioPE(`pG=hSKnX%}d2|pGkq@)9_z&ga6ku?*Gn9{{O_$;TN9ATjPMo z=Ah{_y_7%j2yDH?)z7BV+YEvTd8U+6+TanXyX)gp>qi6RQgVP;0zT1#>?jc5gX3v_ zX-;JKmy587U`2V%D$*zM1IQYJi5z3!BV`p#RFeq5v)`$gy;fo$sEe|4V@o~gT(~qZ zOiY$m^m9_cSeGoIW|o1@zP5?95)YqxnAC6f^X=DZd&x23{!_dtN3NbPJ;jgI1$ZhI z&bju{-Qn1Ho_W#zrpk|j$Tv}E6mfOQ3*;*AK`0^DXvst`U`j)aN)l` z>1jX?s5!F<$EgZM8Sjh>PNT>;SBkrQrwvg z_`Qg{HAod3XvD2peN$ydrjouehtcIXOj6>{*;x|4wvdd>Vpm|72rVoxb~!5CfsNLT z@*7>fcGRBHto8Huxlt@5P`m|A`kRnHqu*!pZz0mhtn8DH3<9(t>E&qgO>~Emh+N2r z;jSXJP7U~9XRcvp zTE>UP8hlv2Y!8Myh%;Y=ey%bYJQI@^*sX{%Qm?VN*jh_2=g+RDVPENd{m~%rl_Nk7 zfJX@cv+gm*i8=&c9HFNT&yLU45-%Q|#qFP?dQkCaW;{h6^RoUZ9a{eb z?$l!4Ub%F-d=KYp$Yy+IJ2g5OMn6gZ+2xU@LNOhfL%}4EWTu>MriW*gqL=MkFfZ^B zNzJT)-H|z>1rKq7MFV?L&^DxrEMa|7jiskN&c(+{3SkzlAeikJJc+{yvRE}KRZeu+ zjmn{vWvwOHu<>{sB$>s&fn@Y~OlS(N?XJnvoiJfuBPo>0)E|DLC9jdK$f}MprH&7n zi#Siq^FDZNMgt^3TdqqX^ck@=+cXhnJ#>?Yz-?;ljpTmNPoF)rTs+y9%q`~NGLfgx ztbMwrT~iD^yZ!k!7JX+8lFqCv7IBJ1vYy(Mwrx0WSo+H4y_9+?AZQpQ=MuuX&G4^H@^Ej&x=_8cBtnz?2v-|VRB{+Mxx0TcB&S5lS&HUhBy+P^wx+fIcGW3d}Q=L@b zSjY@e7#2v?RRGvk-$9#0f}(z#sD7K+$5o2O zs^r0rS%UYst!Ch0kNA(9rre`ZVwzFZY#PZU&^;afA#wFW87))71a9|6dl8KxfIyZ} zJ2M{I?66@1p=Sd#NmC|{!F0H1AL80+bnS#N16v(z$R|8JLv#H2#1vBhWPnwr@N0s# zQ}#QkPy%6L$43LuH!tUuFXd==wAn3#P?yClI)zkiyg-G zNksas<%r}M*=BCBkX&{c2A(-NWG_Z-D7jQcx04z3hii(au>r2+rO>4y-vZN%lZ^Ce zNq^H6AF(jJuvA3t;`?A$$>di}|HuP&_#)19NwmzF3f7Tofk%sM`m}rfHYtaZJbMA_ z1MyY_r@WSiW|DELDnU6f9(%q-x}$r=)^+(f=KI!%UXv~$Yg6S4R^!qd!vI89l6|Z? z5h)unwV+8fJ|XRO4(oQwdiu*XG7nr5eJq6M ztR=r9n~xEc6m15BIs=7mUG^!Q(j4n`AydC;m!O1YZ{j!<1VoQB>K3g-5C{TaN5|;; z#3x>8TTRMDV`%vj)RChS~H>I;-sw270)L0XF3%U%d z%v}RPo`-`ZCB_MLj&D5JQ^P!Jx7e+xj6FkezHk_5W57K_cc4O~c!4!2ZzMR-453Sl zb`xJ}&{B0i_hbMq2}@rAJ6<4Ljuo`I`(XPq^`(wxDzdFLhfZZ+CU<#9DFmgaQbK`Z z#7S!v>nq0%!i%9GynaO0#h(9^8#LDFes_Db_kesS9PmRLgJ}f$fN$WF6N)*hZ*l`| zinQc!?_HTG?p>W{zn|WrI>5GK6y>c@ix`)SCF!wi?)&;Dg!ef4fAQ4XtH+?_!@Gb1 zz>nPNf3dd;CF*4>vn;YYkiLC!>__YmaKKOLb$RCLw_Wo*AT6}2!K2h@00_;Xi<|>L z7!d-Tyj)RRm==~s5))2tjeIudfK1i|uy23SY8cR$_cT4RNe0{DHo!#~fr!kZlKf&5 zYXXc>EAl@*6mZv`*Q{LD7^flOCD4$ryQ{8rcaR9hyia>5!@#TlA?e%0=`^_|;D}eniGZJg$m_bS>N4e29=^ylCF3fG?FlFt(JHZOA3>u zly_x#s*5Nr^ACJNoeXwj&b7wnDuIs=~bmn7i5laAGpzM95aM}5|w$uOjI-OS*3Q0 zv7w9MKu%>nCx$CRX-X8q=1V4=;|UptGLc(uYDfiasY`7bq`ej%A8=Lml!STdLI;{x z>&X!Yru@%ok3-{vk9dZmmjc!=T&B&nQ`zF3Vl(-$?|fX{j-_h?ZXTLE0iLT&Opd~$ zV%smgIGCa0ULzRZkOUrpujknAJl|O;gZ*)RL~MK{t9L|`Og=$U_)?>7ef;sE%}hDW zGXxqwGgX<)Y&7(?EQgw0?Hj2hPpT@3{=?&}jSNxfL%R^)LqU3vqs%xe=^-PG!VIQK ziu#RH=XeqK%7$lrsR}J`qgi{U*(&>OCU>YRV&(JHj~QiK)L0X$7%605q;kZ*jsrgh zyPT}SheD=wbU~-z}B0#fb@gY zd?b6~E6Wzn6unThnt`9B@Dzml;Q1yDRy=GIlQGXWqJuX6{aoR#W(x3pp;cM5 zHlsG9p~Kf#dPE-$S)b^>iSjHLk|@kd?`BJTh-g-Y9;&}4kX@@CkyZ|pAgvgznG;Ma z1r5-6S`*#wFCWwecwW(mmr8{rDCAFrvFd@`z@sR?jN$!Znp zc$p|4D7GbtMekjCefZy+IrDI+`*)9L%^JdBC|g-3WX+7oPBHeGP{K2|8HFsBUC5T5 zWX&4JSjtu?*}_;ONs26CBng8^_O-fiYE z2W+L(&K;qKnlM>cZ8k?1MQcQ##Z4hEW4*bV+e`2zVYsEC{<-nY8dYu`Ln^Cv*W0RO zX*_*OGH_Zg)yJ(F?R&h-*85*dV`ap)aItnjkG^wxd$W%L9ua{%z)-h=*Zp6lm) z`HMJO-cJyX{&Z@rZD@*A8stlv(@U!*P@m9Pn>H6d{=PLhf3WkdI_?Ge_=$+PP~8qj zMB6FW*4a5X<*lKZ0H4&ws!9vJ=m$@6V?%Wd1JJyscdc4e=6n`6%7m^>EaIZ{-!bYI z6dL3YT<1o&Q@^sJ3S1|E8fsBzHHKI%rP3^-9f&GP;(6{zq)T&go}KOU!zf;=wzQWT zU~D%=(jPpR@7GOCy`3=DZ~J01Ei;?%C9)#aVqPL~kE`;8(Y40F{J=Rm@YSng#7^Ip>7 zAn}hIxF`e1G+ZNfVP;5@e%yT6TD!nmo>I+6@M2!wKCN~?Dmhpvtl~aq)-ThtqOkFH zGNL)_Dq7A{EtCO4LfZ0S^)h_V!bIm`Ze|ZQs36kLkwS_#sXu!-tz2+uUBVTnCys=8ynKY`GdbsTj+3qRn?;&9Eagf7kF3#s2vr(=(~)EU+KbLN zzI)am%A<`SUO5RvtBc@aI|aa{!_W*$FiGR`O>iu__cw=g3Y(7<&6WDYs7{IOM? zyl1;p79yH~Xd}^GlT@(G@}PEraV}i?!&*97N0EtY-exlTafhg`c5v(5v!BGn=4B_= zr4xDzuEBq{<%GoxH1aKPV=E$GwFzDnZXPlRN$$UKc44?NU%3|q0%G#BIc>T|N9W>qe zA*|vrDWElSin4<#y?KWpK(z;VJrL$cl))X(P=01xFr;t&R~2#EPOb4*(Li0k00;t5 zZ)~o@4$p9oi2jc55^wvTsqO!VL&LikoUA-DHogEal$dySD{*}wTiHon`d*~Dzf@$$ z%r9J!#PRk{nq->0FA$9~KCLb;eVBdBj|?DIbG=d}Bg;T*$r#|_3O5SHqB)yHhx3aP zroqX$_f%#2la8u(VQ5e)Djf4QZmV$SrJ<(;pA@vDHD$}q6SRn|FRAdbs&ULpN9LQh60xi|$KDez81fY^03P zh1kfL9QeM?yQ!&`n_u5sbc6Ak9`4LS&g)97eXYaQl2-4_5kkgaO0f3nFGUJ@3f3WZ z=$I+h-SQFRo;hi&fYiZhn~VA<#k~B5)~IyK2XiNwx!5I0EZ#~U$#XZ~xgnJ#Bz#AX z>tOs8D$QYU*UHLnbnsf3qOk>8<;mhHJ%+=}=;A9CpUiY{@Js9*Y=?UN9`vX-AvY51 zQyvhOMIcO=Nmqu z+|T>E_GUB{vE|vDUn7FgDHAF0&riNE2(kdx~zG(h<5R)dyPK( zY`M*RQ3AJt*bnFRAwPJN4!+kmBIP6`6Q(X+rMK;fB`m<*SS3%vQRM}MUJdKi-dnYZ zq+W1XmfRJfjTQ*f{6qXBwHSAgWvwZn7hcui31=yk+7Rww$qAXj>!;7==^WeqC8Np<#kQ>7lnl~%`Y*UF;>&Iv@T@73{B>3DMe|kWDVqR%cPBpfK zK(NszS`31rluO$6-7UAc@!2u{eng4(a8lmu(OM4ttcI}iXGT@`)Anr4!*A$B&r;)i zy|dTf71KXElMr1rQ>Q-!-3=3Pw1mQ#2_y0+g5!>N(4m}qINRDA%;Nnb$k!CqO{fND3Y+tqdC=X^=TgYyY2h{KxoHPJC6 zd7yUberTBRXgtjz436MZ$XbkShRUrw-kYEU(}fY#=27rsp3l+fmrj-<*wQ|%M?p<` zp8JE`v~J-K=PR57@g?ES1lNrTCwgocnBCem`)>k|h0?Fslw*jUb?e_L)E;gfIjbH; zu07`KwVqR&^pr)Qh7EabUOb4g%2mmf{@If>&#|L?v5^VH{5`D?cHXZF2{N>0XRIR` z439{NP(@#)>o!JnzG>*CB7khUZU*BcOW85-hh|8JcHYSX#8o*5CD^)o|03v2Fw4C_ zL_v%QBH|bLKsu93hnfxDk_R%E1TlJb&hkuE@|7bHVWIeOP1w3?T^!&Sj}bPc(>^7-&}I6HQlqqz z=|?p6xI7#NDM1QqU$gHmZ0HPRpM5pD^f~LYL*lgf%{anreq}+->wF~-PL{T}+G%3e zLaLIMMjGhJY`z-4&f|Bp%~`SNl-vAhfjJWa!kzdPt)h;)3r-AGlSx8o3{?S!!3eOD z{Ic#<^a>Y?!fwkA#o2C4knEr1qk0saCJ0LXL&}NgIu4Qxyq*mCRJ|?L%9Lo2tFAke ze7&D*_G8RK4a4#Vxo> zIv4Ag%nSCYO}?h&XE^dcV$fOhDCFlT=bDodq5Qt&jyT%^)CEzov(j*hnZQ!}td^2+?=ofLxK@Ru zhC%YE&N}A$Tpz;zf7cI7Alh=nsRO10QQ zn=#7Oo3tZvPQxPj$;iFD1KNrw;bPnDC%S2+M!S-4RV@T-D!K3nq~3hWP$k51(G#PL zvg=|sL=Rjr&f!@jKf%w``7qg5a;w*}nbN0uI&-DbT`A<|a_e$MO$%CN3>!-75}Gte zQ@XN-bek15jc7@{`1k{z>m4Ag^2Rr6sboSE(d7~p-Ys&<+2@ga_0hq$P-+EMQHk?q z0^+x#tVH6>B6FVfCeyb$9xFfX%n2`14N#KzlXU*x%h^WE_j`f(!wFyJlxO4iBfROQ2vR4p zZqZ!&QJj$hIYS@>1I;(HSMAeoH|9yB@nf>Kdc8*|C_$jpA#$!Qt)qLI6!@bReb;Pql_|0{y?^X;hTm`KDQ}jt67~AJ< zZj&f#P3Y%iF5!l8XOlY_~Y-ACUCS0Zk|11^u;vB{w}d;3X1SgAb(7Tp*x+`&JfHE=psUG0mP zupLsLJe#|4zy}0Pz`sgB!J~sBcLE>u55mn1m9%|&>dh{`R_7qEqw9FE4_6xEB)M*EVM}SAE6wbfmde92VY1#vb#jP zeFq$TR(=1ep#4F;`VPnZb@!%$^zSUe6`@THD_`$_lW)D;vYk%2AvYGXzdGZ;^7ZRZ z=U-#=AmvA2Ua9W`7Yotq9(?fCJY+j*Da3DI(7nL>%sTkqU-aw2eoJByvybhV z;Ln|zJd`UrGZMRmQndNedpWM}%7U$+@dvO$*eJNiwQD|m%8`hDL=(Zo#I%#QcN(SB z0W7tp{{|CeKN75Z{&!qQ#;b1O|D|TPI)(ca>jeb1RjZ5ejA+PC;*M;&VjC_d()i%T z2xak5c_4B5hT zy!MhgP}&00=f@8Rmd>TWIazDanf{BDW!?syY(FBPIrQ^+x$7ptcWY?LDgiJ>?oa{t z_RRHnJD%1ZlouxtVc)WBwL zTjJ@UdFhnXBXDz;@V3^x5U@s%gLjrg2|yV0-C1`EQT|o|IFWE04eCo2q(B`Y1<@cS zWONk$hUTz|TxKoJEjMts{A@@JwxqzxePKE@%PT7&CrI>|&(<{$k10SEj1Vb)Ffi^` z-hiWpHm~Irh)hv)@hlXcmUz88E1>I))BGUJ(_k@ixO%|8s)1 j+3!@3eo^1 Date: Thu, 9 May 2019 15:23:44 -0700 Subject: [PATCH 459/724] Updated with dev comments --- .../policy-configuration-service-provider.md | 8 +- .../mdm/policy-csp-windowslogon.md | 75 +------------------ 2 files changed, 3 insertions(+), 80 deletions(-) diff --git a/windows/client-management/mdm/policy-configuration-service-provider.md b/windows/client-management/mdm/policy-configuration-service-provider.md index 70e8359000..785873969f 100644 --- a/windows/client-management/mdm/policy-configuration-service-provider.md +++ b/windows/client-management/mdm/policy-configuration-service-provider.md @@ -3699,10 +3699,7 @@ The following diagram shows the Policy configuration service provider in tree fo -
- WindowsLogon/SignInLastInteractiveUserAutomaticallyAfterASystemInitiatedRestart -
- + ### WindowsPowerShell policies @@ -4129,9 +4126,7 @@ The following diagram shows the Policy configuration service provider in tree fo - [WindowsLogon/ConfigAutomaticRestartSignOn](./ - [WindowsLogon/DisableLockScreenAppNotifications](./policy-csp-windowslogon.md#windowslogon-disablelockscreenappnotifications) - [WindowsLogon/DontDisplayNetworkSelectionUI](./policy-csp-windowslogon.md#windowslogon-dontdisplaynetworkselectionui) -- [WindowsLogon/EnableFirstLogonAnimation](./policy-csp-windowslogon.md#windowslogon-enablefirstlogonanimation) - [WindowsLogon/EnumerateLocalUsersOnDomainJoinedComputers](./policy-csp-windowslogon.md#windowslogon-enumeratelocalusersondomainjoinedcomputers) -- [WindowsLogon/SignInLastInteractiveUserAutomaticallyAfterASystemInitiatedRestart](./policy-csp-windowslogon.md#windowslogon-signinlastinteractiveuserautomaticallyafterasysteminitiatedrestart) - [WindowsPowerShell/TurnOnPowerShellScriptBlockLogging](./policy-csp-windowspowershell.md#windowspowershell-turnonpowershellscriptblocklogging) @@ -4994,7 +4989,6 @@ The following diagram shows the Policy configuration service provider in tree fo - [WindowsLogon/EnableFirstLogonAnimation](./policy-csp-windowslogon.md#windowslogon-enablefirstlogonanimation) - [WindowsLogon/EnumerateLocalUsersOnDomainJoinedComputers](./policy-csp-windowslogon.md#windowslogon-enumeratelocalusersondomainjoinedcomputers) - [WindowsLogon/HideFastUserSwitching](./policy-csp-windowslogon.md#windowslogon-hidefastuserswitching) -- [WindowsLogon/SignInLastInteractiveUserAutomaticallyAfterASystemInitiatedRestart](./policy-csp-windowslogon.md#windowslogon-signinlastinteractiveuserautomaticallyafterasysteminitiatedrestart) - [WindowsPowerShell/TurnOnPowerShellScriptBlockLogging](./policy-csp-windowspowershell.md#windowspowershell-turnonpowershellscriptblocklogging) - [WirelessDisplay/AllowProjectionToPC](./policy-csp-wirelessdisplay.md#wirelessdisplay-allowprojectiontopc) - [WirelessDisplay/RequirePinForPairing](./policy-csp-wirelessdisplay.md#wirelessdisplay-requirepinforpairing) diff --git a/windows/client-management/mdm/policy-csp-windowslogon.md b/windows/client-management/mdm/policy-csp-windowslogon.md index bdf911fd67..e307f8f433 100644 --- a/windows/client-management/mdm/policy-csp-windowslogon.md +++ b/windows/client-management/mdm/policy-csp-windowslogon.md @@ -41,9 +41,6 @@ ms.date: 05/07/2019
WindowsLogon/HideFastUserSwitching
-
- WindowsLogon/SignInLastInteractiveUserAutomaticallyAfterASystemInitiatedRestart -

@@ -399,21 +396,15 @@ If you do not configure this policy setting, the user who completes the initial > The first sign-in animation is not displayed on Server, so this policy has no effect. -> [!TIP] -> This is an ADMX-backed policy and requires a special SyncML format to enable or disable. For details, see [Understanding ADMX-backed policies](./understanding-admx-backed-policies.md). -> You must specify the data type in the SyncML as <Format>chr</Format>. For an example SyncML, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). - -> The payload of the SyncML must be XML-encoded; for this XML encoding, there are a variety of online encoders that you can use. To avoid encoding the payload, you can use CDATA if your MDM supports it. For more information, see [CDATA Sections](http://www.w3.org/TR/REC-xml/#sec-cdata-sect). - - + ADMX Info: - GP English name: *Show first sign-in animation* - GP name: *EnableFirstLogonAnimation* - GP path: *System/Logon* - GP ADMX file name: *Logon.admx* - + Supported values: - false - disabled @@ -554,68 +545,6 @@ To validate on Desktop, do the following: -
- - -**WindowsLogon/SignInLastInteractiveUserAutomaticallyAfterASystemInitiatedRestart** - - - - - - - - - - - - - - - - - - - - - -
HomeProBusinessEnterpriseEducationMobileMobile Enterprise
cross markcheck markcheck markcheck markcheck markcross markcross mark
- - - -[Scope](./policy-configuration-service-provider.md#policy-scope): - -> [!div class = "checklist"] -> * Device - -
- - - -This policy setting controls whether a device will automatically sign-in the last interactive user after Windows Update restarts the system. - -If you enable or do not configure this policy setting, the device securely saves the user's credentials (including the user name, domain and encrypted password) to configure automatic sign-in after a Windows Update restart. After the Windows Update restart, the user is automatically signed-in and the session is automatically locked with all the lock screen apps configured for that user. - -If you disable this policy setting, the device does not store the user's credentials for automatic sign-in after a Windows Update restart. The users' lock screen apps are not restarted after the system restarts. - - -> [!TIP] -> This is an ADMX-backed policy and requires a special SyncML format to enable or disable. For details, see [Understanding ADMX-backed policies](./understanding-admx-backed-policies.md). - -> You must specify the data type in the SyncML as <Format>chr</Format>. For an example SyncML, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). - -> The payload of the SyncML must be XML-encoded; for this XML encoding, there are a variety of online encoders that you can use. To avoid encoding the payload, you can use CDATA if your MDM supports it. For more information, see [CDATA Sections](http://www.w3.org/TR/REC-xml/#sec-cdata-sect). - - -ADMX Info: -- GP English name: *Sign-in last interactive user automatically after a system-initiated restart* -- GP name: *AutomaticRestartSignOn* -- GP path: *Windows Components/Windows Logon Options* -- GP ADMX file name: *WinLogon.admx* - - - -
From 66d6f8f1831a3489e9d4499b3c9cf975dc9acb75 Mon Sep 17 00:00:00 2001 From: Justin Hall Date: Thu, 9 May 2019 15:25:34 -0700 Subject: [PATCH 460/724] fixed images --- .../enable-controlled-folders-exploit-guard.md | 7 +++++-- 1 file changed, 5 insertions(+), 2 deletions(-) diff --git a/windows/security/threat-protection/windows-defender-exploit-guard/enable-controlled-folders-exploit-guard.md b/windows/security/threat-protection/windows-defender-exploit-guard/enable-controlled-folders-exploit-guard.md index d761ebfc85..fe87bdd2c0 100644 --- a/windows/security/threat-protection/windows-defender-exploit-guard/enable-controlled-folders-exploit-guard.md +++ b/windows/security/threat-protection/windows-defender-exploit-guard/enable-controlled-folders-exploit-guard.md @@ -11,7 +11,7 @@ ms.pagetype: security ms.localizationpriority: medium author: andreabichsel ms.author: v-anbic -ms.date: 04/29/2019 +ms.date: 05/09/2019 --- # Enable controlled folder access @@ -59,9 +59,12 @@ For more information about disabling local list merging, see [Prevent or allow u ![Create endpoint protection profile](images/create-endpoint-protection-profile.png) 1. Click **Configure** > **Windows Defender Exploit Guard** > **Network filtering** > **Enable**. 1. Type the path to each application that has access to protected folders and the path to any additional folder that needs protection and click **Add**. + ![Enable controlled folder access in Intune](images/enable-cfa-intune.png) + >[!NOTE] >Wilcard is supported for applications, but not for folders. Subfolders are not protected. + 1. Click **OK** to save each open blade and click **Create**. 1. Click the profile **Assignments**, assign to **All Users & All Devices**, and click **Save**. @@ -93,7 +96,7 @@ Use the [./Vendor/MSFT/Policy/Config/ControlledFolderAccessProtectedFolders](htt - **Disable (Default)** - The Controlled folder access feature will not work. All apps can make changes to files in protected folders. - **Audit Mode** - If a malicious or suspicious app attempts to make a change to a file in a protected folder, the change will be allowed but will be recorded in the Windows event log. This allows you to assess the impact of this feature on your organization. - ![Screenshot of group policy option with Enabled and then Enable selected in the drop down](images/cfa-gp-enable.png) + ![Screenshot of group policy option with Enabled and then Enable selected in the drop down](images/cfa-gp-enable.png) >[!IMPORTANT] >To fully enable controlled folder access, you must set the Group Policy option to **Enabled** and also select **Enable** in the options drop-down menu. From 7b826ecc7aadf0609b764f4681ab6772001e6705 Mon Sep 17 00:00:00 2001 From: Justin Hall Date: Thu, 9 May 2019 15:34:37 -0700 Subject: [PATCH 461/724] edits --- .../enable-attack-surface-reduction.md | 4 ++-- .../enable-controlled-folders-exploit-guard.md | 2 +- .../enable-exploit-protection.md | 4 ++-- .../enable-network-protection.md | 4 ++-- 4 files changed, 7 insertions(+), 7 deletions(-) diff --git a/windows/security/threat-protection/windows-defender-exploit-guard/enable-attack-surface-reduction.md b/windows/security/threat-protection/windows-defender-exploit-guard/enable-attack-surface-reduction.md index 1a68651c4f..cc1cc8023d 100644 --- a/windows/security/threat-protection/windows-defender-exploit-guard/enable-attack-surface-reduction.md +++ b/windows/security/threat-protection/windows-defender-exploit-guard/enable-attack-surface-reduction.md @@ -11,7 +11,7 @@ ms.pagetype: security ms.localizationpriority: medium author: andreabichsel ms.author: v-anbic -ms.date: 04/29/2019 +ms.date: 05/09/2019 --- # Enable attack surface reduction rules @@ -26,7 +26,7 @@ Each ASR rule contains three settings: To use ASR rules, you need either a Windows 10 Enterprise E3 or E5 license. We recommend an E5 license so you can take advantage of the advanced monitoring and reporting capabilities available in Windows Defender Advanced Threat Protection (Windows Defender ATP). These advanced capabilities aren't available with an E3 license, but you can develop your own monitoring and reporting tools to use in conjunction with ASR rules. -You can enable attack surface reduction rules by using any of the these methods: +You can enable attack surface reduction rules by using any of these methods: - [Microsoft Intune](#intune) - [Mobile Device Management (MDM)](#mdm) diff --git a/windows/security/threat-protection/windows-defender-exploit-guard/enable-controlled-folders-exploit-guard.md b/windows/security/threat-protection/windows-defender-exploit-guard/enable-controlled-folders-exploit-guard.md index fe87bdd2c0..c17a0c7285 100644 --- a/windows/security/threat-protection/windows-defender-exploit-guard/enable-controlled-folders-exploit-guard.md +++ b/windows/security/threat-protection/windows-defender-exploit-guard/enable-controlled-folders-exploit-guard.md @@ -22,7 +22,7 @@ ms.date: 05/09/2019 [Controlled folder access](controlled-folders-exploit-guard.md) helps you protect valuable data from malicious apps and threats, such as ransomware. It is part of [Windows Defender Exploit Guard](windows-defender-exploit-guard.md). Controlled folder access is included with Windows 10 and Windows Server 2019. -You can enable controlled folder access by using any of the these methods: +You can enable controlled folder access by using any of these methods: - [Windows Security app](#windows-security-app) - [Microsoft Intune](#intune) diff --git a/windows/security/threat-protection/windows-defender-exploit-guard/enable-exploit-protection.md b/windows/security/threat-protection/windows-defender-exploit-guard/enable-exploit-protection.md index 58cb4ad00c..c2ce902a34 100644 --- a/windows/security/threat-protection/windows-defender-exploit-guard/enable-exploit-protection.md +++ b/windows/security/threat-protection/windows-defender-exploit-guard/enable-exploit-protection.md @@ -11,7 +11,7 @@ ms.pagetype: security ms.localizationpriority: medium author: andreabichsel ms.author: v-anbic -ms.date: 04/22/2019 +ms.date: 05/09/2019 --- # Enable exploit protection @@ -26,7 +26,7 @@ Many features from the Enhanced Mitigation Experience Toolkit (EMET) are include You can also set mitigations to [audit mode](evaluate-exploit-protection.md). Audit mode allows you to test how the mitigations would work (and review events) without impacting the normal use of the machine. -You can enable each mitigation separately by using any of the these methods: +You can enable each mitigation separately by using any of these methods: - [Windows Security app](#windows-security-app) - [Microsoft Intune](#intune) diff --git a/windows/security/threat-protection/windows-defender-exploit-guard/enable-network-protection.md b/windows/security/threat-protection/windows-defender-exploit-guard/enable-network-protection.md index 8df4d37da6..25cb0873bd 100644 --- a/windows/security/threat-protection/windows-defender-exploit-guard/enable-network-protection.md +++ b/windows/security/threat-protection/windows-defender-exploit-guard/enable-network-protection.md @@ -11,7 +11,7 @@ ms.pagetype: security ms.localizationpriority: medium author: andreabichsel ms.author: v-anbic -ms.date: 04/22/2019 +ms.date: 05/09/2019 --- # Enable network protection @@ -22,7 +22,7 @@ ms.date: 04/22/2019 [Network protection](network-protection-exploit-guard.md) helps to prevent employees from using any application to access dangerous domains that may host phishing scams, exploits, and other malicious content on the Internet. You can [audit network protection](evaluate-network-protection.md) in a test environment to see which apps would be blocked before you enable it. -You can enable network protection by using any of the these methods: +You can enable network protection by using any of these methods: - [Microsoft Intune](#intune) - [Mobile Device Management (MDM)](#mdm) From cd60824364d7ea4119b37af656ce8fac1e09c39a Mon Sep 17 00:00:00 2001 From: Justin Hall Date: Thu, 9 May 2019 15:34:48 -0700 Subject: [PATCH 462/724] edits --- .../enable-attack-surface-reduction.md | 2 +- .../enable-controlled-folders-exploit-guard.md | 4 ++-- .../evaluate-network-protection.md | 2 +- 3 files changed, 4 insertions(+), 4 deletions(-) diff --git a/windows/security/threat-protection/windows-defender-exploit-guard/enable-attack-surface-reduction.md b/windows/security/threat-protection/windows-defender-exploit-guard/enable-attack-surface-reduction.md index cc1cc8023d..6a2dd583d4 100644 --- a/windows/security/threat-protection/windows-defender-exploit-guard/enable-attack-surface-reduction.md +++ b/windows/security/threat-protection/windows-defender-exploit-guard/enable-attack-surface-reduction.md @@ -131,7 +131,7 @@ Value: c:\path|e:\path|c:\Whitelisted.exe >[!WARNING] >If you manage your computers and devices with Intune, SCCM, or other enterprise-level management platform, the management software will overwrite any conflicting PowerShell settings on startup. -1. Type **powershell** in the Start menu, right click **Windows PowerShell** and click **Run as administrator**. +1. Type **powershell** in the Start menu, right-click **Windows PowerShell** and click **Run as administrator**. 2. Enter the following cmdlet: diff --git a/windows/security/threat-protection/windows-defender-exploit-guard/enable-controlled-folders-exploit-guard.md b/windows/security/threat-protection/windows-defender-exploit-guard/enable-controlled-folders-exploit-guard.md index c17a0c7285..d2b9eac2b9 100644 --- a/windows/security/threat-protection/windows-defender-exploit-guard/enable-controlled-folders-exploit-guard.md +++ b/windows/security/threat-protection/windows-defender-exploit-guard/enable-controlled-folders-exploit-guard.md @@ -96,14 +96,14 @@ Use the [./Vendor/MSFT/Policy/Config/ControlledFolderAccessProtectedFolders](htt - **Disable (Default)** - The Controlled folder access feature will not work. All apps can make changes to files in protected folders. - **Audit Mode** - If a malicious or suspicious app attempts to make a change to a file in a protected folder, the change will be allowed but will be recorded in the Windows event log. This allows you to assess the impact of this feature on your organization. - ![Screenshot of group policy option with Enabled and then Enable selected in the drop down](images/cfa-gp-enable.png) + ![Screenshot of group policy option with Enabled and then Enable selected in the drop-down](images/cfa-gp-enable.png) >[!IMPORTANT] >To fully enable controlled folder access, you must set the Group Policy option to **Enabled** and also select **Enable** in the options drop-down menu. ## PowerShell -1. Type **powershell** in the Start menu, right click **Windows PowerShell** and click **Run as administrator**. +1. Type **powershell** in the Start menu, right-click **Windows PowerShell** and click **Run as administrator**. 2. Enter the following cmdlet: diff --git a/windows/security/threat-protection/windows-defender-exploit-guard/evaluate-network-protection.md b/windows/security/threat-protection/windows-defender-exploit-guard/evaluate-network-protection.md index 74605b559a..c0ed880905 100644 --- a/windows/security/threat-protection/windows-defender-exploit-guard/evaluate-network-protection.md +++ b/windows/security/threat-protection/windows-defender-exploit-guard/evaluate-network-protection.md @@ -34,7 +34,7 @@ You can enable network protection in audit mode to see which IP addresses and do You might want to do this to make sure it doesn't affect line-of-business apps or to get an idea of how often blocks occur. -1. Type **powershell** in the Start menu, right click **Windows PowerShell** and click **Run as administrator** +1. Type **powershell** in the Start menu, right-click **Windows PowerShell** and click **Run as administrator** 2. Enter the following cmdlet: ```PowerShell From 12a7d68480c7926b83d1fae527be0529c589c201 Mon Sep 17 00:00:00 2001 From: Justin Hall Date: Thu, 9 May 2019 15:38:53 -0700 Subject: [PATCH 463/724] resixed image --- .../wip-azure-advanced-settings-optional.png | Bin 14186 -> 43333 bytes 1 file changed, 0 insertions(+), 0 deletions(-) diff --git a/windows/security/information-protection/windows-information-protection/images/wip-azure-advanced-settings-optional.png b/windows/security/information-protection/windows-information-protection/images/wip-azure-advanced-settings-optional.png index cd8e0d0388c3d30f4e4288d6884302ee048c3bb1..785925efdf7d8f2daf549c90c5ff84fb6f2750c9 100644 GIT binary patch literal 43333 zcmc$`RaDhq_$RD@bST}O(jnd5ErN7|bVzsS0S?_=(xTGc-2#%*2uMoDyZQZR)_Uh| z?&iXE1jKW8JMvfv*uQx3(g6_$e8V!TsC@bJUmE}KU-wA{ z(m5?HM$?Rm8^;_v9xng399Qc$jPqW;mXnhcdAOJvN~DY3?ATtYGfkvZfkZ~KL+W`W zBO}juCq#U2zd0RJ^Yh3n zbb`_7_`Ca?^^E=aSu`GN33JPeJ+WcjT*ZeP?YfQQkwz#K+I_argLN@1M4Zll!|mNaExe9-F1>46$;qkzG#f43@^%4(U?9iz;r3rRItd55Ju>bQ+Wur;G@e>SSsDH2 zHCZtK#-5XwKWk!(+tIH&({M0ASp@}&G6<>AC*mhgXksEB^T%Gp&1lqYD|v7 zXEzy6V(9N8ffrkV#SnDFT2eGLH1zlP-(2@{-Jjkj^P4yI@bF0IFhAR!$mO(DrW%pZ zuF~S)KRU7_eqtWWc&GcrRwsc{DrS=jl8eP!^VHsIMS%YoVuopHuvQ{6*7}rL5S0RoH3gJ{po;280rvPGC||iqbjp><5aRJ*685c zmD&DuaaUK@{X2*Q@p;bCT8BvcM-B&)r%BhrBhxq`3t}^!Rta%&cywYb;-)Srjlx^a zGSzQZYST=J+~%=_?@T^)3)@WO2ptBUZ;!}4)^t32Z4D;Ol&aKUP*G92AFpQ9sgUZp zT|aCN#NpAa28`h?HNzsHzrK(S-5t*^6pw^g&f@L*UirbT#x`)s%&E3JC@6^d;X2rE z>4zHM2Q^O!G2h@~yRQJ>0EDElRTgDVeJPpogH^T9&DllD!~SZU_tnwT04ZxQ%yLmPMf`cqz%!YlFSy&dFmI zcSj9t=w!l*>FUMuYA=>Bzp+!rM1N)+2@tN-Z%L_Gpk`+^A4xGE+(J=&9sEVNfu%6- zaduWStP{rK&cVy`&#vFt%|A99^B4vPt`BjQ1)EhfcvsWa&-qJ}lzpT_SW^>-8rTC?AziG=~-NiGjyB?=I5Jh#*7G3X9L*ziii|nzB6Ts zQ4!HmR^(^IwJ}0=`N{Sw5%Sa(vmE2BQU5LN-EAjZx~sGHsHQA|a{A+9$goZUllWha z(}{1<9orw_N4}U+Zv8C$%&$>rA{Ar0`ePyL2R)Mwj*V=k;>%GQ5;lFTXg%6fbW3oS zNTcQTyS#^kt{?A?Mea`|cA!hBJ#`3M_Qp;1(Y=hn7dx&uP`Co1%ie1~=drDi7ysrB zT{u;3$FulQ@K~tB89aBh-L(-EQRj#KkXtyfW=GFx#2`otDe|(ljXGG=e%HSdJ{3}n z_tl6s3lPgbtdJ?q33AM@EA?b@~Sa0XL>lofhoG-4J3HgI4@q z@di4T97WwqYmV{|T|~0*DZkr&I?rid<8HXDjCu}OdwqUs0v5|Rrh!+h-f`oJLkzb= z4?Shp8G(a^zh0r>s)k98CQXsuD*DTsvj0^q{~5wi@*yVUmO%JlqFhayj3lB9yN0GL zt$}t)uMqgN}1eBC7HK!n~HTv zYOH)QR?Ce})c8q)Nj0H*BLe%W;fAtQq^d*vYC)$40X;i0=mGAka z>|Dc2>NpjYz4|yzO~r)1rfxHhq!Ei|4G;DvI@%;!1Sr1TZrZ$Ne5GgHb%K{@ z!gAQtb~zwnb=T4(ep&Y($;an?yGCBrs{OWf&nZ?V59onRAbY3w< zChL+a(*X#zqYo1k<}w@HfHoFm9O1iRoneU0-b^V*bin7ITMA;>Z(f0xq=S(T|7g_=XWUHB&_8d0hSuW4nM9~Gibb` z5kXym>?9Y93P)g$0t`X?<7NT@l~SSw0U9CKpy#R>fF(t0fi{MIH|By7#9!;Z|2FN) z)(-Znygb10r`rdx$OKMqMnZ1=ROvjU*4yLZ-#pD&NnmVHk@d!+Wo|N;BgXoG+@y<( zD)nA+Q92=RL(wZAN~&%|=ZM+Q2R~!y;_TT=p>lNPA#z(KI7DB?e>FHvjM2X0cijs} z?6YxU=7}-eAYApkvy;m-Qj}Z&WQ~W@71=n>@T&1N$N$ljyAK*nwT^x~SCL8#qt#cj zA>?!brK<1Ys`IC$Si)Wo=fxv`Do!;hc&o>3Ffm$0;TdM!ElTRON8z;AX(s1MD}{?g zQW9{!m78|1FvCTi?J!mF3XA$ik?{sUg$UUtz0i9*`9oRC%T@O^UnrFTogB)9;5jNw zGF<;akt~PX!EzHPUlEw4;r>vrbN~b_aQ9%(%`-BRd$yUBo5#i&(<_BeH>(>zZdNs{ za-fBVxOBv)@j6jbGN&_YRT?qKf9ynDu2qaB{;JSfnz-)lgx>iOK_ZKa&n6lZ1GnKK z`&z;!YJ7&hBn@Yyv9tVdrL;>myM7$05H)ii!9@sB7T0fbH*yMvZk(U>%U-s+V=da% zI4d;j_uHw4)VX&FguGI8i_wE8fp>Uw30%M7aH#^>>VMHBlFU)X37U9S+59%Z9SF)# zQ*|OAB@BkTOTF}_YVv;uooLEsGKA;OPtF+79Y~6>DXv=zbs7_{AW~=Q*Rv*L_OEFP zQm>qGwZkisFB$vmR+Mw=h*mlizJ5txWI{CWx-L<}22a zv2OS(6?~D)_ApHxwp9=`%Nf_{-U>Z@cA}EU=BFY@pgjI7q|2PMUPaN4Q#}tjN}@%_ z$c6LNZ-UNAV#bsoi(tnOh}U21)a+=iiH9N&&2VRkzI8Ovj22h;o|d$fb~gSMVi~r~ ziM=k&L*|`fL_DnU>oW_R^TE$58Z`6ar2KGddQ;(*g2aD+<`TK;J69;JvEFuoZbG9E zp!A~&%O5dU^P*+7r2L8<1ESz~mJiig#2l1cDHM|_d>z`tJ+L&@XIEDPJ;Jwpg|_aF z@AV=ohErK{`AW4>LoK+sBe7J&(oJT@vgIt<-soCfIx_K5ZRX5DExsKhQO+;H;S_a@$f zZ@y@ji)TC#4|13m)Fm%up={Hd#K=}w@@O$M;G1G^rZVYFs}-IXt0ML3IqAn={L~wQ z+s4m=E3xoZr+bIxVuZ^;zJ3LOf^7z*Gg@Ajtq<`9Rv`Q7;B1(|54$BTQd08je+Tn) z6w;<+wO=ZIp zcM12li(ie={^D(DezZiOx(R8ujWc69w9*ktBh2mOmO^IxgF3Q`Gdd{RNH)c%MRndc z9^lgt(HWhij7u6S!ceRhl(p31wwerJi07a^i-=|>|45_JQyr9zH4@{+n}i^>;Rg3D zJ%`-8zphUmAbakYntd?w^F=SH(#D1kUklbYn_){uVVA2FhGpS2{%p-$uxq(pio#)( zhx6Y(Pfc_$G&<#3^(gfE_ox4qEUlWj_MNy5F|YAgouoZv+@$S6iV?zj+E;LH10_}I zM8kvUSkq9)(9cXP(;-C3H{9r1AK0%p+{=DerdKzY+$e0*^L%7U@03rT*D3F1ib?Gi zdtKl}RDWmDmB3&*_P36I+j#uDYS_|hYl61+hWvtg{qSPGOT)UxLahADPMCXhef5A? zqC3nVD7^A~cOTM7EUHG7#n;D^Qq?<|B*dF3^lU6|J7ejr6L=VAN|cCZ70zDGdu{#X z_>Boaelm93)HWuJc>T947(s&>5?OzEA%&zEjns%*V!%YD8qoGez-03pV?m3`;kfOJ z^jDY-740Ug7^(W$MV&_mx1D^iX_8y_o??DM#o>iM5hi{HpSmD+eSf2)OOwm4bk1oe zhTus+7LH@IBp;Laqci=)3)#k>RN~{4vMsCfWeJB3h=bP(3u5cnpq*xj!+CTIwxzm-h7tp(w{2=J|X%R}*ffUs()^sOi*90f%}@+OjdJ_~X2fHrlWu`*5H3 zSgw+6YdGV(aM)zD6;~B^zwmT2n8g`IPwHG2qP}i2AtQeku$U@5LQ%M*Iz8WgD;AFU zF9i@ZUG124%)s8mg`chQzw5Vpy+(uh-soli9z*DSkG(U#{e#230mh)&_wF*0R*AC9 z&ct5Dd}zwWCEbatcDxw&LK63_*}`1iT@kEy-1}c&-ZN5NVKgph`6~YTWR^woj|jn? zo8UMq6W+ya!PX+c+Xyi8uN`50E<3V8zE=Qbr_Ta?#9214=Wkq7YJHjk=6qM=T04)p^vH6rhLp*c!P&7ob zl~v3N)X*;x2#S)Hk_FDITmDjxK?0Rt_|j5RY(eq51FP_VQ1&O!M`=gdE~PWjLVVMb zbbisN&2CeB2}LZ=io%*l(AMVMVm z8YL z9^QA-H6S$D(PaqmI=ezBGR`O+ zfhfCX;&>)&mD8pM{M{fH`OY|T2BYSnWbJ*L?7U@cOa7`t?;Te{It>_By;qm21ItNSbEuw^q$Vw77e7?;iU#<>*?j^W_P-Lfhg zQ5F;jXKa!DUs00Tho}`w4^i~ts{#FCyZxGIVbj^$#DC{Q4ozdXYi6diS&#rEAcw1p zlM+r`dF8hU(_3>p^94+p^wDocr#2WO_l~J7`i(Es0!nkdx%8s5BKE7$%l8 z^Ip#2v!CYsP^CLck7x@GXLs}!}6dIUrt#@-B5SxTBeQ@ zdE`~1n$uMHP=^`))nTo@lI`*k79O?nhdvfTUXfgyOW=9;qixTk#-z-v(pD(b(VEn~$ckd%UNGp_(mIEA)SQ=qpNNvqK07k5pzhy2`ZV zH|U=Ua*#4^fS&Sqt^tza4ddH1!b>~tJdIN2i;yo{$fn`Z*ihDTCd`=O!KATH*~dD+;A$w5X8Y8Jpcx*vB6UxKkd(qEui1jZc`Ay>RS?~{%Xrr^F(A`_vp<%AyIUtaTfiMN&fu!2*FQ9*lz?2G zO+D%i!GHU^HuJo`R6}%?Zi7~tYS)uPhYzhnq57xJVbcLu8RqsU#P;@f;1rOuoAd(D z00DzkuTUE8yoy~X`{d-rX|sPUlV{?eQrr{k)YOzMLrk!Uk$H1FiG&)tkPu1D=c7+@ z%E~F>75%42J1g#M`t=rQSKnKsu4;Pa&EAqR-Ng0m{Jp<9&)3-+dG}~8DJeNPVmkN< zY4?MUoS#;Bz};v%=VHC3yKnI5(?}#19WpLcn(-6FGA1VGe%|M%VB^i}sp#<zmOl))1}*;{|$R16Ld+N_}?pvr{B zzvOt@Ip=iSZSXd{6QElt1-tIdlvcmlRp(DX#_PA>tr|!sWcMq^b3-}MvkXlyhZ$?q zKK|Q`6KMwogc>la3k(tc-R*np4c&|JeK67E*#h(b?${C&6T{JnxP7iq0De2?dGzlH zhz)E#9~U@UYM40bY6r_He1Fmtjmyjdsp_9oIatw^5Wj8^p;;N6|IXZl?w*2 z@3Tyx+vVRC-S+*HurN8F30k9zy(vVI7A$^2^I_~D>&@?J z_dMT8uAx@`{J83Xv^((vjetY4-PapvZa_1>IqAUwt@`cDidrE5m*)CqjDmmO1n*LB zIq`P~?sPp~^$<+tYJ)>=k;v1%OHl%sGp|W+ghDC{MfjlG)!&shuLI_JR^L}i4xovE z2GDrZBy?d7q<=uXP74ku1`%iPCnYeNgul>;7i&K^afEKTXduLK#9r>t>;eG|iezkT z49p5k)nIru=o)*;M9l54T%im>PmVtPk{h%`f;`x?4X}fmb$=YrmSgqkwRycuJ_x@8 zUYp_E z*BAnWr~0UnCRMUxkAZ=aiqMKhr>qCS(l!M!286sXFV4@Yi1q4BURh#cVZFh>xd{UA zowp1aI>inVn^9+xTq0sBryxx6IHgq7Ym^KX8&;sRl91>Z%j58k=88OhC;L_m1@@2# za3Xe85+-+>KOd+k`xGNe900?|w{R*D7NOv0K?yz2pVa~>6!_0qEAAL%!dc`{w$!to z`5*-&`ARuPY}4>AX|eXtzmmV(%vb9*K}q0yShXs(>n+Bpf%sy7Bc=FkXZ~1cXQ(pl zXcwH95;$(!C56!_f@#{Q)vEeP>^wX$fPh00crSR;3A;U#N~a{Qx!bVj$LSyNnmwiF z4>`KhV%SMuSak0Eeqw3O7%GzNk`*KD6Dx#=m>_so5K1Ytbq_1)Ft^bU~K z?TWJGX-zJ9RD~%h0v`fzyrofp=(o7Vs8tuA#}e_dXq2E@i#s-d^Efq`4ygynG$Hq$ z{dAGs58Fi+!*<0hRWbHgMz~>e@%o_1U6M&Q9Kw&16?0JhN->nomy&(}qNXvzblK-H zx(RT!ccMwGn1q6j{oQs^z1j4 zL*!ci)93O4dGpg`-b?mv;B-c!N1`Al&``gE`wAE}6h2AauRbw>G8f9wb@Bc9wKR#E z?-zc*dtQDouP1AVEN}E61qD=v_KQY~o86yMsUS|tXo;x&jiPOm z?sqmn4_Djn0QTdw`N`BP2R=J+!;(e({myqIrZx{A1;4uDCoI((!?IfeEJ1B(bhyLn z4O=LED3|B<;pzIlS#O#=zC~D_O9X#^Z?Eg0*>a${-qT!HYnDTuZZYU-@zm+w+Dk7T z(kXt|0yUk340y#()Z^LowE#*%fpgLar2F(5F_@2(#>5F_1X&4GUlva>UY}y%xZfJ<}ZnB=r_Z;bnmr)%q>%_h$;j zg$ZI}Vtb6~1fqU>F-}Hxf)|q#XU3#IU?j6x+b*D6D2VuN(43jq{|e3E1~g63ivT$S zy2yqze-kj)z!&)uTU6c)TcDQMBGM{lNLntuRK=-s;d>>U*FqzoBwBR$??A?G_5}Dj z3NF=ymKKsq`uSm>=DrXhJa4g*O(j7d$92)oL9|KK4Yp;kOm4gTED?>)wTK8r>;mAx ztB2(!2C%B+2;#Bm(HpdSfSDMiCZyVvd;@BzPOVWFaA64<3NW{j38YaNHOm72_&hya zMG#Xs06bF6?WO!ck4r(K2Yyj18dp#178GcvpFr%!Q3u4I2hh6 z(6@a7$K)Yh#9vr9_VM8kD_Na_C=~P)4GM1Ki7rT>30yBI%etVd+38n6v=0H22ljU< zJpZVl3Glq}1wjV_wQn>>s6|Z~Bq@d@r6I)S9jJ-Ph!_}8rvqd>whNurQf?T7Cm=WA zwL&-jJbAQvB41Pf$;!(^ZzyShe5`76-llw;tnvJ#okRlljFgm=oE*qnYAQSq&*^6q z;^)vsL#8f$@!&2P=0p~s%k9Pf-ky~!w$l4|pAk${ZSjeT508(JcXvOu``mDt4-ejj zfJ&dV)K>+a2AaUpYMa2^O`k-ueDW~JVTg(bwBj+?{5GdS{zhrie`*(IUsOy-BV!ON zkxBNyzF7k&-tO18a@Bko-W)7B(l zv!!{sb_TrEVTb=r!y)Xuw>&shL1HMe6#;)tKh1n|b_ekiJl=HYYfm=@s{rIbAE2~f zoU?)HNRJCIb_GNcG~z$MzT2#?J^o$Do`59EVZ`y{`LXnE9GExJh@}7F-p5sN{kR#n zXxXk!&eZD-#8+?({wy^(gsJrYhl2=pt}0 z>ILKTz=8*gTmd)+Fs#OD9qAW@-{#0?@Yi2?X^MoOI%;lQXA%S{`{VR(P^v1 zbvT&3Nf1z`xw*Z0XS?9|oS)%)UY2?Qg8r_w@GvorYB*3T)h`mE2`P08w`D!Fd_@pp zcDnMm^jpAZw!HImx1P7`Yv?evb@v$V&PKXS-|lxGVJuyyX6Sp|EaCMo7<+TNQVGR` zd^}9K${pnV4mM_6oUZOs1NTbHzSUXsDNTZqcSiQ@5d*ikPxGeXmoc?fv`S$uUDscK zU?Ek~`9ZHXH#bd9O}CQ(JcIIiNXugo^Qz{HzuN4y>t|_;${0U7zUKF!|Iq1hniu3- zst1WuArm}zHfgn6xGyt4rxMY}Oom!`JALYvPEDI588=W8@MP%Q@bH}-Y$BLu!im29 zXO;DkueM7`sm^RH{8Rk#L4^Nc)9%PS*RkK<~(bikOWK4KM9f z`?j`o^stzL-%oEwxK%^uGU>Vi+m{A$vqM^3qnw6Cc$sN_G~-8c?F&az&bQR1OIO)S zb=Qw?R>M44m$25#d;dHFP&QU!I@j~IxN^k*xWj5VPFv< zeGYD!!2s?6s<6t#t!wkxU%T(P<44!XFduw;E8Q|*z4>=u$6bN1UGE|Kui$YJrZSch z4re&M?qn>mpoxHtzgE|$t;({xXn>}AX!*Bolyz_9@+(_-s{ zbg^Nil7l)!e7*V~+PX!BozFfLVZDVq4 zw9;Cf=84~&-+To7&ic}Djlr3p<6)#&P3+NNRSV|B=1@)QeC~c`&zm#^ZxJol5La8< ztTBt38VpTPhs^+00v%k)_tw?StjOt*)R+I_pD?iB($CzjAD=JT2~9` z_8}o51Ek)gyyIUhMY1McuNRXfGv`jF(0C#xwxHKnGP5yT2%ezyK*%{*RuV4%aZCpq z@XW_+$Q-?wM;JXYtThu}D=I1iX$9B6%S~2O1=2{*K=9}0(DAw*=tCYJ*Z(C1nMPL3 zgZ+Fc{C~W582CU>{(&cSQ-aOPOqp!cklSH^2P@&&?t9p6UZH=9gR%_L#HMYs{Ehz% z6&b($IB-;=@K~$)zkqsjDZ$9!9MBr}Dcb`y%W2UN=2Q#{)eywD#1ZDJ>2(&Bl z+(2$*EKR1F+(xjjLRm;O8|@he3ReJdKU!&N01$cF|9^Vf$#F7(={}&h)U;h@`1G?^ zxcpK7qoTXPO(NHdnfmuO`Aq{#=2#BZ;9dJCF_Htz2^?E(kEI`W0152_9YI?=ZR@$m zr-$wO-x6`#FE;}GyfcNPR+N(iIm*bWD1MIKF>sAP zSG3ANrv}s@=SMa)3hYHs=X8-*xZZuvUOpMeGUU1SMi4V_zbwWx0?_2-R zUZVv*%FD!&w)sE#ZIVZ`0sUg7#hnO&XMCzqrUQhDp2MWq9m9a`b$~!9fEw`@1jGVv zif3S#{}mOaEe5Ds9b^H?Ku8gtg#THVkgoOy%k(Ps6S3JFusF;xjxLf?Qb)hOGroH_ z$NN|VO-pNZ*&V;W_Lyc02I*7zc2FcqA_j`MXlTqQ^Ta?*s;5$?9&rSbAqLBS{ovqW z`*W#C5F|F%Zte?CwIMo?vwwXxSCCtSTU}j^`Ss~L;lR`T+5o;g|9VuAn>v41YwpiR zR6u<87FimgNHG2X(vV;!Gp|la<5TXfpJFz)6)41q32bE#sM1DFJ2=_U8leHz}AyfttXhEVtI( z-Tkv#UqQ9eeuZEBH%MxMX`h&wh%*U^q*KmXf2$lC76!I*d_d$l-doK*FoGD!4-j-! zn*q>wT7@Nv7JuqzmF~7DYx;dLr=9|x|IKzPfVs&`I_ep0eEyGu+nHR}8^^~g=|H)f zMqV*hCE~H~6~<2=c@8^36pdu0QC^UJ*S8TIanyIswj-ydLx};8URG0 zdQHy0xBI1U-n?m?0!ow|YB;A9wjDQ7Uw;fia3Zrt$tZY>(>ROx@Xh{zAojM@OLOfc z84cZoQ+{eWZkO09N*nrM=o|X8fH53{EM*Y?9nk--GLT|SNH2nqZpx+zLqu`f+@O}39A70UR{hWmw(-2|>Z6AC_q`5~yPGD~}xz&hN{ zzX00*b6zBZ{t0AGHnxX~o^t&kZ@^-{)vA=u_Wwtnr36bNnxe|U#Af%4i>n;OX0?yO z+{=h1u+M5DyF`&7JrsE(3NllQI}gKEb$9kA|2q5!3_9Ix)jSf_6!Z{PN(Fn1@ zR@Z$@nsfo_0f;fMK4%pN*vJbl)alQk`nS_En({=LGC@7QI$q0FtA&|51fPD9z6i7t z2GB;3l0n9B6;x=j6E^%a-`PmhuHN+F8GHnL5(}{?C8bJ*R4^WFV>mRx#w8!5G3o9O(g}W)Py_mfQw;4N7g#^*{tf;n%V< zOa1|!>$57^w>oxk_@er5y%K>8w;h8BNFTmqP#Zx3&Alox(a} zdE<@(JugnjA z3roY%4pgRGj}4^T{=COOk=01=*;y~(tfI$W3cyx(U+*Hl_dx47Q4{X}$5P6`; z*a5}#^cOKSvV|HIiX3Tik~toYis*WIy!Os=xoD$)MNhC@+t^Jyx21K`cj`sH{$hG=vaEBH$KN zQ5(7Ch~ppFvp>h;XJEH`W zbsuUBTrmsTr_9uuy9(;_Ol#FKU7WNe3DfCvn;dcLUZ-)4xT>H(!Ee~I6e(P!$4Y^+ z#71(18uebrvMB8t4+9ysPh|Lx`OPfYU}XHRh^b2GU!Lu5Uy$>YECWZNSQG^Cm2(6= zZ_doA!^@(xfcQVq+spgOsagEK(2DvMB0?m&+B@{q z1zq2!khDN3vh`K-Sj1qF-~4z0VgS=%w3^higHDRx^_lV<8lJ{%s9lRVW2x-KFKCwufMJ5o`%W^ zjUIynw@V?nY3OXDWbhkr<4cr*g)I1;Q$nH3(Sd1?&Ly6%{jwB<8%XA65wNG}>-s zyP%V>)WZmbSvUfvOtRj*2%Jo+w53+hdhAYBC^@!ns|UL-?mm1=A~@TWJ-wlWf>Sxz zu$Nd{K=RW;uVeEa&*Wj1xVszItTA{19Bo#SP{XLfMhc=J*|66SIsy%+pkUTf61H2_ zjH19t=aPN+yBFs;ivSCZjPzK%WW%a{eK<`fSJ=Ct7d1t&wdmuK2P!TSsJN%*7PeEM z+JdgVaRIEq7?oq-0hTIfM^u1@LjNkFY?Asy8XeTh^!WIAVDA=za{`oBsuCm=6e_aF zf?wd`L_tZ}$a0el2<1n<6$A-c%?Mcqb}V8mz;D*PkA=q7--9N88{YFyLXI4bejCV- zD!uo;SSr9D?pj;Rg>Ge1U=P~VxxPm~o$VEJ-3J=Hc>p~D-Y^6FbfFB!MGmgDvfh0N z5*Gg1vl~>cF95e0if2HccuSCQPAQXtD;2IdXqFp@|60AC&ZzZ6wVv1y(5-xLMytyc zo)y@T=Q}5Up%Mk7^M?Lyz&&!U0XJ24Oy9q(SH&m|U`C`F!hQusKS}*|a1z*tk|;jW z6y=sqm2T2(H~w8y97ch%?XY0avcvCT;Ua#Bp$=YFZj@d+-ffWwO#bfPRN*LtT{cj{ zLE*A6-j7Rn3?+frf(}Pc(KHu3BiBE0kmUnG$_(Zw%q!$90rzoUbv+}VlbuY5jIQP1 zJ>lV~1VPiA-)VM#0Qc`W@8Yjd%sU0JBBXBmU^{{8H=aN>0Oab0(D;|zbUsh$9u@j98XdKOxl_{J)2rzg? zxp4e|ge27v20YwdbzDpACWWESU2ylOWCPhmj z|LcBRA9JcY<+FDxB_&l{Qc`k%H1L${5A)kO9xKT7ruySEL%noHDdrLu_5-d$sY)*H zJWyeeH#dVZ@k^64gGeIBEEMGBo1M3#8XB%ZBLwZ|{btsGeq-Z%b$NPso#Mr>x9w5EF|>q-O4)Dbxpnq^_>c}NRQj~j(j@(_hV;p=jd)=+zbE%6kMjp&pK7vK=%9fM`k|*Eko9dxVb;R2=|3VuC$XV`fJ{T`w1!&u{s;q zb$V^Gy)q;`Iqe>Fa;bTJsnfdcJ`i(H)R$x5K=&)g ze~7?ecTB0$K&zqy@AtmKnqfx$J4hD5!DbUV`hGLI|MP!Q6*Dj}0OP6Lpsm^I5J`(f z*28@~Isd%c=h}r@+-&P3Q)x{RdN$F`zhNtmc@lYij)UQXY{;72Kg5>qL>ZR$Pe{%x zQd3jZy5p~p=gCGMEJ|zLNin=@4Y(D8!soCn+qHC|N1KKP1sfzHS?VCu2Hd87ItW-f z4g%oU0}Kjg>~B}D;*GJd;x6kr-tfK#dHBR-;?U>tEQm6fpGC!8NQC}xxloszL!rd8 z>&ECLB=i$)TcOW(qkSXg;~qf#M4Fr$E{6Hhs#~OOpBp`8O~+E~H$%0S8Mj;4%j-vW z@iAt^9^L<-WaTsy!tb{S{HbMYYil(%HD~GPX&@G)5(f~DQNQ_{(>ix%98LS<%(mwP z@}(8#uR^E27(5hB#y?N9sd&8R^$YW)^29fi3lDR_6H+Bh%$EjZ;>XNSyFA;?J;e(b zV={?MZZeXe%vN|WUA-ZC!il*f4L%MgH8m{C+Qje7_vh|?l~Ir4TeRkk6uz!tT2hIB z?_FZ5<5qxf@(8S`X~=x2O38JnjYmft8#h)|jLA}eo+<<|Rp16C3P>UmH%321Z%<+T z9M!5B&4szqnHNO)(f`!UlYctNIaIfwY=BmCV{u)d$dbjEn{nP$xKYak~7o(4K80ROzX5oY9>dX(Qu{n<<0iM zzqdy0e)vmhK5e)HWKMTCw`cSB<#x|9kqgk)X{o6fY#}d3e4*-0y9LvKQjysp*>HEB zuMj+Ex-%%Gg2dY}{Pb+^Y6}v*wpeu*SpOVMt1Oe4B)P^mG(Z`fEOGAKVl`^8@0yD z-g5-sx31>mSu^Z4T)84U>*hz~_Ico3ThuMNz~7y8+#3bdaB@EfS~$=qWUT>21d(zx z;>K`{0;BKt!YO9N0+CAcadC1L2Ft8tN^>{5&Y>P)<3a=UYvyPBC zaDJs;{DOTc;y!m8DraB-VWs-!p@XGyBv*cU&*xL!;dH%Qq#G5=SIqS;`G?^34(oFT z&IN<2(r>v0k-Zq$tCP#G5D%uSN{{+00#x#~UT`b^&k*n5)va-W8d)N_<1J&|1(EZ*i% z^&)yBr`a;V$@=!O3dAp*<^R`dC@?$yX#A5j?lJ**SYJ_{+2R>+XBcIUFIHq}2qS{RMJHxXL$r?e403CV{*5JSL zEXqH%*J6vYjQ%?B*F6+vcm*>^E1$5>pYHctp~su%%!Ug!_T`IDCL|#`lck_MymYqJyV!vB{F61 zTD9iBdvsv{r+=VyVdfBWfjd3q#<VEaa`nL8hk1`qe5oz@hhWOW^ z2WjTUq)5<*`EP26WSc(KHg&zFS3bN~*Y*(Ket@s!Q(0Du*1lPv z1JE0V%`gq(FTRnQ&oLH9g(7T#5I|7mtKWlH<`}s6&6$CSj(!P^3ov77t%UIKPn`;g z$#i}CZnEUE%bLUM=`}E(efZ(|`cx8O>3<^ru9jT+5Rlh-?0&fdi5ZMJ)9(plV$!e_ z929i6GZyXh6C}m~Qttmxl;?IDDF$yYrS`buaYpiAe(h{c@_)XyEdKxawL4LrkbuB* zO3v1nDIA2%p3Um4W+_x+UdOYop?)zfa3{STK)PrA2ysYx)^mZ-#Do5o>G=j52xr9x z6VcJqmH?;?lJp!9FhTZMq>0l&+589C80qmAkg#Y61_tPOd9}yA;sInQ8B1|BGRo`d z=qPe{1#XRk98fK=Zhd@xff%IK>}tJvZE<>jewP_o$ga&GBm^$#zgw{V0TOeDZC*er zwj>6;xkA1fNcYdKZ;=B`%p~w7Kv0EX;8|-&0##L06Z=g+$lj`IJlp8hYoET$cLz^S z0`Zbs>A}FD;e_BHh(+MC=vfhaz_dOAo~T=@Oak86IP;9>M;lPLw9YOsxgic{+Kbn1Rj6TnWO!FdT$S08)n|mBqt|d2Z@Ca0F`1*wThLRXG7BcYZz-m`_ z{qNc`HRcRT47hOPzCSI6j)L>HcMS-uAU~7Q`114`%#Y&(U~#E1&(C!Ltd$J_IZ&il zfa(Mu_5h@=QNRv>AOIBI=Uc(uivY9HP*eL{Ov%tFq<}1iz=!g@+Jf5R=aHBlZQ7J7<~lr%!(d$oxlXz@51=aH|~L{r)`t z@*_o#0l0Ake0czac>(GLZVM2ka{@9Uz${54KLlDs21tKM0F@5ccoAgO_U_{;B)}sb zWW)FE0B|Jry_f>(+0dkw{o+@1*R)T8UJ<_t-mH`)0!+>F=mj>+`wA_Z?h;2pKm8tW zEQhgL`33Iifa7AT)eejWz(Hhtbvpcf1s_4J623d+^pbiR7OZMq+}OyQv1$99MtZtG z2b$D)Iwu|2n}7+ZXF7so2sjqd^!08P5m|;q*vl<}{xphRp8}q}KpQH*GoBqSw}@Qp zc?;5rk*wh4eglucxXlHkp*3Qmu?sxCk`K^?L6E>y6%Y#pKq0=ouYiz=w1aI0$Wr}V zd=%f31yE0b8zjk2=nHc2L;2^Z)b#XLK!9`&jvTCgMR8riN7(&^m}3>N-(1oR8lcY0 zqHWb)J*Q^)z<|3SU6Z%PbYm(!PB$RUkEy_Q?r*UeBcx5R=J&eT1MH8DLB9>BMFLp0 zT!Z1oz#w;1VFORt_%Gt%Avz>xh(rjFL8|BlECTQzBBZfgFEzkM%91+d6%g0PjCdI@ zTC9q=Ol)2Bx9w`xCCMcp987>nlem;G>jp@B789hmR5>sso);o}_bAur3<=6${gOnA zb)U|f<#4KS0PMAs1EEqWX=&&q5I&1O1mtDRwcq}!0O~e*AoZHdgb-AY zMum?ecDVhd8>P{7+6uopLNmT!#uQ5)1ei|2U16D_K}r2dI%Rg;FctKKNnM9Fsc!IO z62jti{?Bi%hbQgAqzQGzC9|atfma{~BbOKP4YCZi;8#QewkCmR{I||+RAiE53ERO4 zS@Mbt0tI2a8R=fqKj!e)<9p^~c7;+1obcn0~%N^`iE6|5*1!N0< zmQlq*Q%vZEyd`D$TC&soc&TegK~!ppO|JgVm}McCFZvz{c}$zP&r7;{D4(?Y&q5v5 zFIIDK>J{VF;)F<~IKU-|u+-k|Y+>Jz97w^F;+QyZHOap`XV)?UwSIpo5(SSh0ndPl zI^nYWh5fnf4y)(8^$dIh71jrXa&;O8YjI&`dTZAp*>9jz6(J#)ts!Qc`5XAc|a)-L#Y|#NAXvmLe z)bXk^ClDZ+;AOEIjWvHyR}y>(EQee^ddr65RmcS(0hcSs9@NQWTOoq}{p zNp}bqDUu@HC7>YEje;U2An~5-`RzNivw!W*?Ck7c&y2$Z_kG3rp7W{Gd?zO&DGA@d zp9M-OFTpO1*3r9|&vYbZWIo}{+mVIkB1*YZtl#jODJ`mIuV5rDhW4##7ayP~q!~<7i*fMDd53_JJ3=-}aH}06^DsfFk_NeMa z8rtx%cdhBk-1>}u%zUkkJb4ZZum*}IryE0t>R71N{b$|#>qE)6V}^{e6epr@D;K(p z+`7EHL_t9T7j=^N-K{$r8n=L&p~A+)PI6vsllpl>N8er!dt$UQ0-bwe7f}m(Liox} z5>Dn-uZU}D%j4{ip{CMQaFi61oXK_%r-%#!`FbA8X8x!fi_n9fyPxw9%EFC?^)nMz z=jeVk7QRGoQffmT9sF83R=v;({Er~;B;1S`>v;w!@I1S}6uV2?zw0;dt}|mk#pJ@A z$9z7+h5thh#S-Lro>;R5Vtt@=;^3pvC1zw>M_ILC_ox=) z+$FTD;gu61$6l`r3i5GP5520PS{Z8+3qvTS$gzq#?A<$P2tnhj?UH4 z@Ym*!1!wtt3@Nb?%hGQP+NJRimJYRyJha5_j3}O*a*%$tVe$ccLt0jsxTm}8_qPrd zg61Lx^pI))C-lzkepzR+S3N(!ynB!#h8KOlw**{*d=lp4y{B+&rKPYo8W=x<5mA{K+U-^f#dxZJ50N z2uenL2CXJDB}-zHiN=SmO{EWqo`UI{T);*Z?g8iywOf^{AhtfqVSsG&G4fBz0=m`~ZIz*>*_c`rULz{8M$Fj89q4M`UU&so9UodtiX)j#&|D$zd{e5xgAvgUNj|p+@GtU)YEbe5KxOO8 zFTSo0+~(IRbKX#lA6Cj(%%$R?o}W#OBz)BVU&<-jLcXw znbe3?O_Ig&-kD+eB7M4++CBG(mJA5Xe;MY%9oQ}2*P`2zLzrg~ph`H9b$A6hEMC)p zaZks^|8fCm>HTX(#Sh(e3W3h33oQ&@DMwssEC^ZqIUY<=v2su5n~xw>iPQ(LpHpF` z)^-SFCCo$`#arEfOJjQRy($sVzMsEJplEEEMha+?CTI|B)C+p(p<-I#eSTxadn}b1 z1h^+V%PA&~9MzYUfe(dHjv#QT6ek4yP>bix$S zp|KKZ6+HEIrF;jMt|JTsD7rXKrA%IvEwXlk=`aE&#(t17GVN?hZ!w?VN% z);VBG6sE86(f{Z^;bCa5ah=^~I&Zt3@J94qn@1pQxAD{q0kCE5)+XzF_q`=K$Mki@ zzL~{p`7Q1iSxvWHZ$;g-D}j^1+Y3n*J^ea!OTdu;<2?)BrG(YD?J)1b_w`z_esRMH z+9F}+Ik96|C(QAEP?sgM?%REja-xcW1|YY3{_o!7vMbwY_u=wnV~lN&$Q$K133j2e z*8#CH$Y`{)1Tb!U!6ks!>~%?Ou_@ULz30p8>t4I7Tawgg)RdHt)a*QK!&wIqaFHz? zbOvk?qPc7n=mFY^z^9T*zG z9JF@eH+c6M3N-W-l$6;pbG7_xj{7tn-1QU@i)ImX-QP?94+DhQEg!fxE-t@0@4a3d zE0BShGKw}?9u13nlk?Vh3udIew{IwK>~=cVyexg$+ta6F8hgioXYCU02A>lIGr%;l zb#@^KpGn=$U858c+5nfNBnN#i16oYxF;c zhcNWDIPbRj{5EcIeh3Xco!?sW+eUquoKMM?{5a;}3l%HHK_1JW$Dbrchxng79GsB* zx?;&O|0(1Ovd`cFPWkfeGq3`0@W$RQ{yxbz@2i`aT-yFsP*`!UFhlfY?8C^#ksz)< z%pGGuT7crWff$+R1#W2vle6;hIQPVoApW@@64}{yRf5cc7o+HLc>IMgRL2Kpsw6k) z@{$uHe6>%+_m_1ycf5xb@T7=|iG?6==>H^#uCZ3RfB!y+DH2w>G=94<;nHf?q6dh3 z4uvL%l+5TqIo=XlH4kjQcy7-02Qx94fagZQ$Reev_x3$^i97rK;HqO}WGwyfemVf> zH~sE`{iSKP3Ie##eN0>rS@x|7W?MFuA!mfXO&OW0FilaK{L&yI`pSF|#PK(}jk;*?D&F#;`DwFv^%vwIzZC4lgQGoTABc)-}sYTkB z;J1Z~%iJ5%oX0aW*rx%sLr2}oCM>8v&u=@#G!(r&CeD!>an}AIekmTTHY*i$RFg0B z;{ApN>VQC*2B-~VkSK;4gyh=Y?mU%1{+e*A_Vd3xVT>*%8~^~0mT zXAT~Bwn2*IPEJ9=Q4UuvZMXvj!BkWa#!vqZ|4MbP(y527?*g>h{)EWNUen7?TT}f{ zS04!)ZFr)9z4;%FcB6(BVYcuQEShUr0_*!DKWfMC`cfA!&O7TCO`YzK zo_@UP+!pRwUs@{pdhhtphD-Xt5d*j&ZxiiHr^d#3IXMT#T=7<3cN;wL3{>`$+r%VG zop7p94yJeq|iE#N3?CQpi^~C=4Sz=0~2+}a8$o$PU&J$Iu(QRll`F$)@*w;q4f8;WiAJaBi@W*y z(p{C5w+o59fqT6_&VSpTJWjEzy5G-G#_{Su-)aL2ydZF(LXoqEfY0`?;<$O*eyeP& zOg!a0<!wb4qyp@{s^R;mf9FE zdk#)2gWmMN_o`7klaMwrIZDu{^BHAwlyk~<7v}zUswl+JLrbu_JdM#JJeV(8{#;Vq z^qrYuKz7+?Y4k`RA@6fuFDvz|HOkdd-r_BHogJSd@) z&Y2&q4$6&iiko>zx$T!06qo}lwe}YIJmS7PlD?pfN&(ac+9|5Oe0t$|t+kEylLSF+ zDV&R|tX9_MfA(ZtZKJ<8Ta0(2YvzCL+I!yN{_@Kgs~BUg_nTYj{4p;@VCW{Y81DS}v(@ zZ=jVm2<>W1Q(l5hq=HiHsw`|bZ|oz)i`K*V3~hzl)qkvYcdAUSUEMcC-U8?{Sk=D* z?`#^QVcsNa*^zic!+#p4*fRYe}ul~TDmI7TgX-f z7m=z1NDW|&CdS8K0)I*FkX}D__UN==US9*1e=<0)GSkvBGd*F@0P8s@1usHx&|+dA z43nK9RYY{~U5Z|GV&cMPHwaek>XKL2*K4M2N%sE!V@+CeSz}Z~gQ#w>g@wgvZsKAnzdLeazITJf0R9K1Q=k9;Xr-}VOg!j^$Wl;O zLX0je%NkB3ld>5pI^CdYu6#0X8{`RhoH<7pM$;wR7Q}Tu(Y|!CN4S%qgEF5 zypDVTH~*ZjLPVcVA`kri{Q-vs90^f2rnx|^KulpjUX|C{k2w>2?f;Kkt{Q}}r6tA1 zy@@nbR8$(xFhf9kM^at1oT6g)C2jeh6+$e_wVr_Ep!-TZ7(!he3mNGN_{OWps;T2qXZr8rYz(t(V1P-Q4{B`*|Cf zJk2AZlwN5Idd_Y?_;n`Dp0CylC(-SJ-(lc_n~2XT&+Z3BRUBKj>Jg4tiWv9??3K9L zwI6_*#DnylZj0>)2_d2U;Wq%S;bi%SpQI)v4t^94R(ct)A5+OfHC&Pe5;0~evUgd` z;bpOF-C+im2g64z7dhN{iwt^OXyTJ)h1}uy<-X9Y031SLiOb=-QV4KcFi?|&PM}nJ1Q6s)i0R1JME3&Nl$tR$SHf?uUp=3?p60l;$;IM72Wn8&(nyD1O-BIO z4OIdMp?Vn5JYNJo%~gs4%oYwNO{YFfa8ZJg-Sy#TRAzhvmi97@eokdyNIKm@o44zS z*`g4~@+UmhA`TO!Afs!Rwyye*y4Zpbt(9Haq!>d8F7^emn@3Fz@RR~xIvRF`MuiR0 zc@(tjXv+C~mZ9rHR40DUC5$(H9AGVIZ)i%Yyp( zc&?G({RHA3=&8be^k!fx6Er2q$Ct&7{+scLP>Er`B&E8VkNG%Rg;ox09IXj`?K68! zd%NtV-U%QRWv_uuK&m(-+nhjb0Osw7t1_}GpEn?%4DD4(Csg+Im%HAQXL-El(n9eX zrOYu%zMML30imRxFFe!;EKU!vz^dayt9Y^%C|m$Oi5xb1XL2OY#st`gs55n}s+fim zpa%aySF5woIPoe1z!;TjHKMQ*gw9Jo$w^Av7mzi=)Lc()2lMCWV4jRXqT;|07&z(t z6A!v`G>0RE8x;o;OO0q$U#S6lZ?|K8%Cl8vVZhceCp36_y1QXS#8=Tqk4(P<(1!M% zKj;!ZyKmwZi=!X8y7Esj7 zNy!)Rd;xI6)%87*ydMD0bxX;8wR=uvYsBusz}S4MMZ($lwf8d9R(`Dyls{F)e^|tV zo*Zos$p=Z)#KgSM?XM0ewL>8H44$rFD8GtMy~0}2sentg0s{w_RvQfPaGJ{DuCFVv zaF#v>l20#X@S*Tig@bu1J84Hn9Wk#T2H8Lm{;nXkP0>eXNhU&%+`uPqcFa8~NdfsD zaPFD&vT*N4G>J?UkH{bpCejw)fe6bZ0ga9PCJl?ALYo>SeX#SvOLe(1_#!SBMqsT1 z>Aaak_^s&ztT@z9Hg@7E1i`yt-4-(&e(NrrpRpPqGgknUIs@HtN}WPMLc-F6Oc*&` z)_PFC91ghUWt-s*u9yPlZnO%W?@}m8i9Mjig)63=1HV#Ao@@vMTxkSgame}q`2sT7 zPvf>22ljmt*Dg%@Z=h*N8%|}zlPkSb5TBUHdX^TITZumfg?zzjWtOeR;>S1OsI+m^ z@4aMJ01p_n9v=H^YJOeG#+eqs0MkgZi{I~M5g)!bYgnq94Eb6846$)14C$4U&v6P1 z(Z9m`&JM)@u+RYz&Z7|c0f-6YDYGpgt9-bXp_E%_Vd~kJY%DBUHNrvcI)zVv`Xa{@ z738*`0qnN?7D}|Z@7@xqt4TgO%{L350-E9Xr-uyW>AM6>%B>(HSi`>}FmGE1X|uFj zkj+g1RbT5Ag}E&SqQ+F<>l5k__5e_W05OzM(*_mU)n?A%;ANUHjo?(hhlPc;p`rpP z-!vR%8D{_^a#z${BHGu4)*ujCwu3S?y582Ck(g`|NKH#io0++U)Y z^%PwXi0*d3dbGj*2vhkuWK%;kfO>Ml+>BVuux_Ra#z>q#;D)m>*l14Nic&cJO@3t0o06T9os>yVMC5U@ zw+ue9sK`iZpw&W-cJYyK`ECQiH#o?XCcuSK3x}9;y8B~QEiJQJ8?2Ue`+UER=EX4N z^UXPeaI{+!p!hcEc;a~59@*I1R`!%JUz7g%>)qzCGhU$1C#U=CpfGTxwl_}SP5dp% z!N}d?EGPZZ`I4s3J7+%MQSh?to76u!dI@C<|7E=&9;rOPB-T%6F95CwAz{Dv7V;Ei z#Xw#FG*U2n2;ko7_*U`$D2hmwT5T?H_|HE!R;&RL0UwE@)y^;P>!S#tD~Sb54>RR9 zrp;Pgg|8Y{iZc2iJoil2c5!)pu^;Ml57Y5JM}=ardEBbxvDE9Ao?~PFznliCWFBg1 zd7bZXLDT;a<}j-NWJAN9f_kxuq+rmyx^PPg8T~+{b~mcv(o=0Jv&^U^*sJF6TJ)6X zYG41EX4BzX2AQ36q7-HF?0#1r6PeOQv#6X_)7X12{&E7ls6=M`)j;amql*Lb76&?rWT7vm1KmP#eL|0C$m#63)rHgqob$i``rJOhlu18 z+EFN7_5eWCL=ywy`nAdKm^+$&m(tAhcUGF*B=68SI?=vLO4E~zzRpoowHD$WX&2d! z{JRNso*t=hus+=TN5sAD-M2cK)8kxs1Kls-cfP1fwb6WomW;@`X1S&P>~nD$7;$@I zPfBW!Glc@=o258M{_qaWyF7LG6rR8Q*`_!l?jFuq`QO``6%UY;fPes~yn92x2i7yb z43zt1e}%6qL-#YB)=&BY<;PV6_xXlSqNK$I%`)4HCxyoefD&IX6Eu_&#pSrv07D?vpx)?!n$*0Crr^caBx^>H zCB~)KljJTix2MIq?T#!zez+BQko@W3mO03mM@?bgWJv`zs#%kJkG>3DUYgZnAXm+k zcUPxj-`p|I(E>m6nB866H~YMlE8V9;^8K%6&2Rq=UgK_FH}|aaUw?*uE|_0_vm$!( zD|oBNZh&fqh9DILYZqf=rf467C6jdOE9m5N*t-9HiE=mj`OEogyJ=u--DCJ^4sVga zF>lXH@k^ge)y9#H<-UHTTr7gA9#p9bF@H24Men1Z`3+>?o#PoQcBbUoY20l9n1GE* z;&XcL#(?PliN7%bV83qW=u@nw?rw{;yx|NGKl@!VyEr}T^Mggh@)N)#`V%`CU4c60 z4b>0iQK{*kC;LtIygVWWI zDh=VL9Say9j84BCUVTYPcjnC-6MayaVX*ESoa4w#yWzt!O0e%AV9aDijq+GCjGJe` zu&A)0g?qMQF5^mHPtRd!dOG=k#Owfzfxrj6;&z~it!g-GVl9GT0=GMlFP@3on{hmt zsS1>n=@eu7Nvgx1pNudKHb21Jusk>{W{&Nl@)w5)Y2N z$W5)Bd3jZ)vN!S*C7QFH-kA6P@swg^ja0bkWP%E=*(<1LQmhyQ2W)}3N3WRo^TZiTf&=G2Ww@=n!zvW$$Tkg{=TlN_QfJbZcp1KR4bFZrtagcRK%g<{uX}$OcA)&zkgay4d{0W5=2tG&H2ZQ#d&i3Fh?I!{Mo;Gwk zm!BUjmDVpL+3h`3-r0UB9GCr_CZzGSpx)0`oAXBKZxFfPc+O@Vcw zD{nZW_x1H44Inh4R`Lmx$TRrvzan-M06}ZDZ~#I?H-Bv{tI_J@&sLJ)Lz`Nb zae`Wqrp|(b^miUvAkCsCI_@8hTI2IpOtXiR$~7VJe=sFFj$KQ3CjCk1XJF|;I&4(} zn}6OW(#C0arkdN+5fe|r;|DZ6Gn-`F1TRF<&jfURR~k&msa7nPG!wns0LcS?d#}W$ z3nQh7jKgs?|v7B`UUOrbd|XbKwQes>9z+oY0ozGtWunu+obxL zW_Hsd%A{W7x*^Zn3H>%C6hZ%!nUXRANDWwg)hUpABiO{EcXN4p8JK@*@Mm9s)XI}k ztN{JX{=+-Q*lUwxeLqfi21nYgeptRuPb*!E)=0J=GoP#TF%Jw31Zy;i*It?rfyCFn z1&lK{z56manL$ak4*6B!dj?sd=*1;X4~aqQEp_Osq0_!!Yct^V?Q)Zf^uKGrLHa+Q zo^!IjHA$qaCSLy(^MBZU{_n4``hU9i>i_MZcTgrIA}T2cuCoMgw_e?^Hqg#PpWkl=3QWjl zwOm`^0+rwcpqXLnQbiU+dBWTz>AjQ5q=L(__qV&J2S6PM5ORPijjz`EHaO8PU{*tv zbBMd@r=2)pMlXmt^uiATOo{CH#=j>DU>V@BX#x#-@87?Nq)5=qHaLFy0a$9a$-CZ| zkYR-0V`4H^1?j45Nz4T3)bbWmdLyBWfk=C{krCA!z}Kc(euTb`>@lDN_i(ceU0ht; zL5&O_)oZ{2w9h&aBF07cA{YcDATz(Mmz|r7>@=Wkavq0(H8L~bQ1nYr814WYaR3m2)nDhvc$PN0N{(d zKeV_&lG^nj=GK4)cv>?wSD*=+clZ-J!mDEXVy;W=&?F-wPQ;X{bp4Wl7k3K0)5 zwopQ1!0`ZELFvnvRt<1Xz$^(E~wSMNwdpbX z>wClVKoLtQm~yA4^?@+WyjAe4tOlgrZ6GqB%e-yC+H$%DF6862_uaO2n&O-yEC`uzr|G{8|JckY-DfF0{ zC`fmZ9fe+hi{ypR&Wvt;f&H~7eCChI0YuJWCIneQ8%U5Pe0~k9)-Z^J*2h+YTovw$ zz@sj}^!UY&5xrt#5;a%kt?e$@|3Cg;>H?du#b-Tx!%uShyccqYXnGMsO@YByPm`fQZOiqKk$fK(GFO)sm!Q zcG^-<1ka@#lO50dN_a*DeOyDN@S71%{S1zO{(})zz||={(5=gu#SD_?e}LUBe^ULu z_=%3ceZHULoFIFR{YgVzM~2ajKUM~+Y4oS8Vm|Ma(1jt}Y#2Rb zN-E|PuP=48a6?Jc)tm6uTuZ75^HfwsFHw+p-D1Z_m1RXk(ykM84##A!?mQZ&=V60K zRU3~&0R5Eh0!;18eV?ZRi$vb_DOuK>>zAm#9nQ?4s!rroW%Uk#?K!2)&8l>zoJ8K_ z6DYFZA>xkRp)deyt2|!3H5>39g?KnoLLZdEbqpsA;Dk1xq-4cO(qK+#g5*)9u=bzu zW-$Xa*CoWT=OkIGWfv;MxZJpeXIN>fHpX%RVT_X~YJx#;ZxUj1tH+$E1z*n(_$6MN zjc&(gmZ2H?%|^5fpPcpa)A{(dx{z#0gT>NJ_#vn_kx6hDCeC+t(RqI+Le#L?rB>$~ z-B!UdfJyP~fvPmAGRCXiPqkdeoPZZG64Hpd7N#)_+St}IbnT?1qId^zv87X#SQG=E z*FK{*xdPc53G%VUzL+*bL!S&|wL5kht&xH^nnC?xS4{GtgRF>QA)y;cq0>0MU;wDr zmWKFH^2x3kwZ$On5ojWnmvN($h+F>u)` zghD9F5BXuhJ`!Rzgy>+bE+w4X&w-m^UWd0Ef zm4Kw4JoF9b$&9!q^~;=gY^4khbY<>&yGPLbDX6m)RN(%@{{e+qKoeDez$d~`>;X*w z6ZiExt%$fl?JgB5dr@g9JZUi0Y0;~uqNGH?Pn110x-%P$N|gsOk3zIPO7jV(<@_=6 z-()Rhag7^>y+TBLMz)2tWezqnm^2dgGlHt;6d|ivA9H{^S{t@>|1h zM+|h-r7BRyq-d(uar5O#JD}!)IFrEqITO4Mjm8t`7l_dzfzX7Zx%))i%7YvpK z*95{@Vbb7y*Wv;oW!T#y8;fF4dYq zZ-KX=`yDK>Y&S6f!N4umSC`7MyPqK~$$5rNj{7l1sEu|A-_z`0o9&Mb&3Nedz4axr zn$*+SlZ)=u#rUz@$%=;>An%ojTkSv52Hz>WS=%}VU>1>Z%MeSUIEJdJ)1YVY32D^W`acoP%8M6hhL zHT&+iDZadhuS8i!BAzy2+o!O(-3xCk6SnLqW90^Z_3Klej&NPT60;99T(W{*rKWJP z*&`3J+Sl|6uyM433j)AY^9E;{Wes>KW19EK8uMYXB#^$k(jrfdiunRO)ZH85Oov3E zFm4&zq-vMT^HU%|Oxgm)<*=H=Tv9g6rWDrJociRzmB`-p3fd?t;}BVoZ~_DO!!2E0 ztlK>;%b)g|Ov9{MMyUktaQu~xu%bs?Rp?6sxY-pBAi+++lr2xt-odgxn?hBZJ+)oJ_&B_s2~Ccp>uDMJAn{Tb_hJSZp&b@tE0 z>oyu;8$kP+<;mMyufd(`4bRGesAXSoehm6`6-8q-&D&vv3_+=2$t?CIbvZ{h`z|)< zSp8?y#nV$LKf@E&m$_2-`kl`M-`e!#yGS=728(PFIRhnUgq=>NYv_IGO=0bY>MAf{ zZdJ^#_0fzq*hN(Kr?;n3J7uF?fl(u{S53rvSE%Os>@mQs>I&VOVzv@p_t06+ds;pt zDo$VlVebXnw3F#hc#4qvOn6;a4G4G0$~B{vw-jWyx%1?l#Ut#~gn~)Quza6XvZRj4 zLFw4b2a+F_3|)JtBRFrNa~QjC8W#=%)dJZlUDqNUXgG8AnfL1A!@S*Ez_(!$>EZ>3 zOx85wzLAKuj+DbDn6txoaO7Y~L*$2w1oWUn_m|hV2va)?UcOuinB_7-_4p35#5Z80;OQ69K)7Q)l*G<5f=jeOAbcOF_Bo-oM8$EetCI=iM%@ zI#aB*zIC{g zrbJ2n@ORLW!-JuO7tggWgOl@2EtM4kW!QzHcCcn10(Bo5POL-RqhI}aY!=VA3Oh9K z4&wpwzN{Az+)!MFYJc5H(wjC)d~qcfo{t>+&^vw8?}SwvDtBH($YVovNKsm3czFLb ziQml?-Ic%9)zy#97g{`E1nn-NFcbMt+8G+Mj5wzeA?0Nr-hapdi{QYl?zYjpO>+s) zFMW$Y{pso;c@ucJ-aiiLZ&-fmO_Z1mzdBa!eePt6t?K~Ai8p)L;YjOa*cbQma=Y`) zLSSr)=gp_icRgziAskj*Ih!Z#$IxFMQ5RBaxr;ja7Okx>1$V zV#l`n2IDd^r0a3nv1iZ+1g-QXZ`r-xt+e<*gpYHP9z<6bvpfIc&CqL^zx?s0YS2ZZ z(ztE|Qo?>f%sG&sYdiHji=U9SmcOT7O+scIge84~_!I~f>s<%Y@{3$(ZF6&{%>uXw zPO+WA7=y^^rGW#dXsg?UU>Kl3_;9(>K~cliW*a6h(p`> zRGc$dEHc2b6b((&1gt^(dG&WF8TE(Vk4A!H9tRhc7;J`nN0B5-rt^DTd`-ke?W^7He9 zpP8)8xY5-TW>J23aM4u#dt5?(H<;$QASpfl7_=ICP1LYTCG>O`Op!mUKDGHDIl5;e zy(@zWRIg25ap)|Huhl_89fS56vZS_}KlyDALio_gXe2skv`ua7_!5lXsa^XP2Y-eI z#|+-yCm_i%Cn`456r%aw;#0MHc4Z5i9L;o)MM9ecZC~h1O0W(O6ce-STvN$XqWJ#k z>*>dggl9kH<^&z5*a^2fB!9OuWi@_=NJ)(|KpEk|V75z9NQF4Pl^Y1v;q8rnR`46?&i3{>I~LIoRdbj zT2b&#`luA9p=ao1gtZzk+k+p$<_G2(A};ebQ-Oe^A3e&U-C!q_1lw%nIlvM99EHJa zxx!r$niS#){|^9Ak`1IE3_h{>m!(G3Afl-%5;)sA{naHWSal)G6!?p^kwHTpkuJCZ;<0~ z_-L6y2P-Q@Sqo6A*ngwH&dZ$LlkTB1nItEhWq?o%{60DDCbTMo=kTEhI20+b5IGA} z@rHgmju`9eB9XY#T@6Zz98ki(GIPn8*iUKj703~aU*vVc2xP}B8R*XJHL7PeI zuS$a&6-!Te`GbR}?idssCHzypm$G3ZH?5aJc?d}caqK$kwa=EF;0UxeO|#@&Hvq2t z;SE$LY<0-vJzI4Kpn|DxxH3#=5WenXlefAh*Ev;3;je%5v%p`YxPWbH7EeaqN$w)r z1A&W+i*>Tr7%S-dxmp;-mDH3KpO7awYe>h1I|@#{1rC`g&(nY7*RN&WpQC-dLbcA} zA*WLDd-Q0H+~;}cjT~zrY-`Zk0Qx)n=C7HWXTBJ8eH`cWVAG#1(;#~fJJoKCMei-O zVBNwJhT;){=XLSb_n4_$%_jS3=(%EcRZ;fMC?b{T$?b5Q9_@V77r2Yh9VT)%S^wC` z?};$jlM52**scJGNwLBt9}JhyI>HVqDN!^5V061s?iqD~r1xuH$8OTlq&T6^R4?g! z^T27UY*DgwW__(+Bs&eXT(I4#!Vxrdo;V8Nh*wcXRhAVaaB>>@@H7`X^Wtde%k5ji z3nb&d7X9eDE(dq9$JSRbx;3kts6HYRo{>QVL%g3f?Ev1?F@KF3sc_rrE_BmhT6|nQ z>cVbjYgd1J%a_BYg^%^pPh;+ z{7;}{yGB3z^||Cmu`nzmHDQYy1-l&TMenx* zT}gDWln3w)z+;`~t&zqqXUP?hSv0cd;fIV$=If$M_)5*;{E}Wjm{lY5nt3=!Jg&{O^*8k{{hBt5R+-2Mc$2GLbmV>7!k7&MQb#jbR|YHuKcCyBOQt@ zaiNW#@z?%ib`*CkT5a_Fn*BA@9}&3}W2`s~PL^opPL|B7V|bONnp*AfGzc6JWFVvtf)>hbiY3zNy`z5;G6!b<| z2Du5a1^tQV(}fg;Mf?qjpcY|&^xDb1KjS7t*CiS)Kn&Yg0F-ZGd3Wu&$1bR&>Il5H z)rs%Pbnx^(}sZ$m@dm8_iI`cVZiJQQ4_iqO?3-wB}K5j1`P2s|#gf zXBnzt57SRLQ;XduxMgSW3V@mQ7zlA-uOA}7tM#Jq&e+@=E;)$33hmhdUA%M9@Ca!a zvi%8O9gZj<&QaA~LD)L)xt;#}40F_^SwP@PY)JtbF885@lFEsv$9YZ}akSSO0i$E6 zkUDGP^F1&uaDoz$$rS&Sa-qVEWpET@e%`0XX*kds(pQw>q}MD|ej3Kv-=YAr%)~YN zVZ^fU7H|9(o}Nl8*N2ZX{1q(#YYLzFbUgdG6j<~~{1n*@n)Tc~1{>zEW#YR_8AZS& z_LJPz$if+Kj(-Cfi)k32D;BC63rKZ5NMgWZH>i;_;dl0oIQbOLPJ9fBIC9mz2}`Ga z*bbpGr}iva5WS7Wu(J% zWdJbiC$Y9)VJ5<`qMwS#ASWY?yC7hWX(}T`HJ{SDDOu?z&1Wx4uPZP+@S#1>FUNxH z=*8yyrx#c&cOy!eiAKo3o%KI67V|%3M@xI(j@m^$eT)B_(dP!bOW!!C-gQ|zgwQ79 zVPjikGoB(B-m+so|Fy6*tN7*Q5euH;@WpO-KoeS>jM3kag(CNo6Y{GojgGO{e<1Su z3lPCP@UBZs7GdP_u-*xOB?U%Wpx;*S0q_cgF8yl+4&M+mPh$xdmtKj-ePG~Q z!{7Gap1`1JFHomfim2c^f~Gf*^r87prFTk{p_lj;Mfdt6*Dx_@XAeMJxUvN#1(F^q z06k51TAHFgzJp0}R6-}52GP%1(o?7vmCXK~QzfBK8B9PXv0c2FXKU+usknRGOrb*e zTzuS~53poTyjz@7mYeyzkm+9I7w`hMft}Gy`%*AN9V|m7LyVaH_=HGyk4p^Qve};`O26Sqy=7;$V)eK205Y}Tu zS&#iU{;qVx&R)Rc<%0Cg*yi$Jsyu2XUHZ8~?fLXKAM$CjkTRJ?^t4bAu`j=qh6QmG zjiX3XrIfFb;2A@T><`yJNE8Yo%olRGG^f#7C#LOD!1Sa1H3F$C`aOYx4lhO*pdm7H zf%ffWowEXdf%%YNZ=XFum7tCGVe8MzmbJ9o!<|4qLcXS4xFY|#aAM9iTwXeSeEQ$9 z0!8ich#=fAE;>zF>nYFr&rVfn0*w$<8r(BQM&wbqLLU+CE8Oayy#H*Fg2s&YQ88Rf z_U1ZVG^bkcT@#)rsN0C5(72kmSUwM~p5pL{M*U2nFZL1cma&gzt769paS6EbeJE=fy-odc ziIBBtF76r?Ch4^od}cAk5b{ozZQV9wQPko@S$g0UITJ9D8bX|nJ4vcw_cd3T!s3a| zOyDGGY+{75Nj&c3H0}rK1W2<2@<6X3twLzT_)FcRzY{xLNJ$jUvRlfS7A3AA zJ;wVqdI=+8qdWCi7)TV_ZEQFO^H2h~iWguofhT>wUk?)ej00A>0@Pa_sn2;unai&B zr`2P$VDKxIcs&=2pHFD>CXsXS$y$}?q4H^l#(&)ZoTGs{A~xvZu5C-BbZG&cL6>;U zjcFyNe$o3-DOG$|`eV68{he)xkl>Gq*R^;~C=pM2hCA-M3zvbQc0%G+sLx*F69|yV z2>H+&>YcM1a1Hq#Jx{1nwg(b6AK<+DS8&2N91&zhSe)`r8o>u*`&^~xM~oPZTz~xx zJeEQ;Hv8{0tRL_HzB2v4e60Wd@&3R5FE|sBZBme6!VGY2JvqhBKt41;S^nE)8K5w+T=PdgX2E>s<|+km z8lo3kTeDd`acP1N2}nxa`{DCXFpD_C_XOQtuNx^dZe%*cfv`G7M1j%qJQq0xsE0OG{vTr-Vd%7*g@&<%Pr*Kg6i)dIvyL z*!J(2P!j!HS*;TQFr6{`S_AP_5R800HYGVJR&E#;`Yo}`@4Tu5by!!4lp(G z7}qjyBO%?-#yBr;ioCsnOPvY()FiE^B_HZu4*5ofheOcXxS0F%MabRf;CKZ?biXoO zNEQ!hLL0ZitN}^QXd$x|x=aFpXrg&K@GWftp&wwNAtF++SM>-{R#H+sgF|o&MJq`t zJTkI44*+jiA14;IWefMe;#O4WGAz6>faC%An0nk&az3wa=&EUI-f>^U{1O=v5o4jl zrss2Z=rD1Dk!t{VUDbo6Gw|1(cx5p+2uLK_*AbA(30Pl+Bu`&ovFwp?1m4Ql$$bB& zbp*1G^9YxtZ5iuvLmk?Iwuo_W7M-;?Ot;=>3@ zR<10@`9ce@{xUKtgCL8UPyRYyoD|1oqnmZ4GG0^eUW8js5r4wKxLD8i=tyu}04DWV zmy)tfaH@T3TrJz86xR8j+m;@ZcIn}?=rRCvfU7p%0Q&YpB!KpHrzg%ate~`RYs?KD zA48T}Q2fX!(j6w@DcS_^hK*r;Aniki3_$dHni2!?7T$%NcB!n@%t8IYwK@E-jQ7O( zXDwl90e8W+A4kR8x00SP{NL07xvk?CGijk94ks+8)b!{IHST9tCJu1#-U7=Y~jiTinN+J21j5qh+Ll6}3BCM0#Rg?EL-Oy@4wKn`J$`*H3YE!cbU(GmuI2M zj%5pDKd!TjPT6*a&hgPSdlCDU6l~Mm=I2)i=VFCL+2r1fSYVFIT0PRRM+>?8RGm7!5mv>1LX*Ga7 zK->(570C7ukT#Knk|o;WJnV}D){_X;nW z&X6wI0$TMK#5t>CCLf$)9#~FmFGFYhnF#gn6dCU^=#YvNPsEs0UzQa-T^Lsf77t9P zHt=%$R)8}kI`T6LHIKc68${i_Pqb!vT?t_Q*&mn}mp(sT*2fZA=DI*^ljLN=)#e>W z6Zd)}_Ke;bjy&qZqUrh>lLir#cXOo^R{k|o3%VZzIz;q0R@EA4Q4<~VxR|19P9^}i z=8)WQNMln@&<_SSJrny(5EkB^b%oakF)$Bi@X|$g`cFNpuPHwGDiKx5&vgtH>)i*TV0M#smEV4W|6VAG-cECx^M)qSiSYa3-n1)KxW zo!BdS#-LbL}1t zD52K$=GHoc)~E-vR>vPi_O8$QC^IOX{tjI;ZlrTX|MjfAD`&}A70Nh~3(KjPSa&44 zvlReY%zIO?Wyd?;v;E%OkGUjx0atkwEnsg(shdP&CWzEf$}Nb!I`bC6UO=e&8Nvru zt4Z4B3iTi!vM(>WtC!-2Vwf{xQfs_6Ax5bffliBlgG~;HCv(W{YpHG<++!LQO_NA) zy3^q^2)z0Mh!-3A3aFY|Ql8n%<*JVJ(9kd6{2qZU1gTkSWU&X`mFla~Z&JwCX68p> z$?B}>MFGs@*ui%Nl5b0}Dx}sd^&yhEVWsS)r_24usqjfY0rl#uH*xX}gsZBT8oVFF z>(%Z6KHfc&atd)r6FlkmriX?Cq1fN*lMuZBUE!+$Beu~!M`airfFElQ0wc9^%gzrTd; zx`=MHHZi!C*8#Fx#Ccv`|HIVL8!d!I%6(hTEa<6`nV(Yp^JAu(lmV_BK`lQ+N-Sqx zZ{3t85aof8t6u??$iO(A(RJ0esFWk7hO6PQ%|!MjQ~xw zXjbO0*;h7k?Zh5`-RNpQtZ(>3M(6!Eb}g~{bm$aEGmp!B3jh!$yp?1ZH@HCB$5yVn z=0`vqm3hzoscY=_lyPRjaVs#*V%Vc*2&!TgO11nQh`lDNEft&tuUn6*hNM21Dht3ZenFQTiy9l=kOcaB{iD*-W5Y;$KE< zo@dM?w5KJCJJ#ICB#7p;c_ctOi2qadj*3yTrfF-*)=}ZL<-$^aRN4ceh-Z={SW<%- zMZ!zBZdu-(i0)hCO;L#Akj>^MxXcK|&EgeOi(RfAU|6t{vix6-on=(iYrDn)K}v}s z1nCB)K|ys1^m$DIUY+@;lF9a&G-AIJ^u*^J08ZiIa$|YHTU55#BzU~stC3U zz5CHO#7JEbZi(7PD!A>b@VEh5@9Gtr`{vpN{48>Py^-8gMpU6h?Q>O{6ziebm93Pa zo1_YPGS|Z5^v8rld$fH<8e zr1HlxkpFp{tfu;Hx{H@yQ9-q%dRpvPo;+GN7dw6L2`<|H_zN(4$J&GqA(FT zZlQnxCVQnIu`&p_ZIs*x?(%qzzfbb3@T8h9lT^?AkF( ziy%_PNkCKzF3k*Y(BEush=%kbK6GQa&)0=X;`NBjX=VBz>SHl75}?U~sUcYHLV+x) zZruloR#Xa$2HmO`6oucBL3>nRhWt*;^e{}irCyjm$9Ua{omP0(&$RE%u<%$D z6(uD^fE}+|%z9-YcZ|}<+~G+z=JB!|hFbPGtjO5O(ZToSd6!qp6X+V_u^L7t@Q7N} zGfC1`7_3%1*OR?akfru8ZF-|7VOdUbv^ z;Wp?Cdbi$@bO@(kO-jN`e1Mk{{iOmymG|zthe3RdrZTmC;umk~Y!TP%dB5!!nytH8 zKIBp7Bb8k%lmjR+s*kOt;1`CXZVAdo5q2ZS?)Xh1PewD`(okWEGjQ2wqnas|xONH5?HhbMC~`SV zWgf|y#ty($*=1Au*_Rj7fA~sx?XlVzFj0~^8AH=K`GkJ+t}*ev#Z6{4f082@Fi65k z^4e(%mH4rnGqJYo_K9v~nyojn2`b#m*rSZ?htOBO^` z8h?g6%|2&4OoOAVB)0`Tft$)iL^rAm4MGyEqxzMl%y9j~ogk4b47m&5RB!@{k5Qi_ zY;!Lir6jOg`Uy2P*^o-B*TQk!O|*Hi=W~Wj`&aYVsMHc#$w-m&BU)}ZnIo77En$om8-y*P zR@4?6-fAfY4KqiBXhmrYY$uXnE2YA%iv761=+=;+%}i_{EKAZYX7)7%;10}zMt3|m z^rk*gkx?brrEr8|rIIraF=kcLBBfH91JPm{ZopI5hI zQ2TvE3SF)Muh|G5Sw9$W)r_L=p>ph!1vSCB0;i`ycTuKyMBIQdGWep!H^GVAB}hPD zWGrC>KC-GldK@P|OSwqutUM7jGs{%GQmgcvcUOZs73oqfvp+uV#&n&~Moo48}!tB%0?A2z6 z6m@$0@4T(7Bl#j}3W{t~Z2@mAU<(NB-VPZ1LqkK+{Vwk?qdLwJl@^v*Zr&}ZqH?{~ z@gU65D3yUJeR73hecdTWw516ya5iaJP{$@Nii5v#PdTbjPwpn0nt-EDskvW=8KIq& zp2!?I%?)fCJAU3zEtXy;zt-Y%Pd&@${}_KrqbN%F3n9pEEIWJkn_XDzpY8g)o)yZt zv;>cLA!k2HAd!v$IoVv4xYU%omnU>VsD6SPM(!I&p>N$4Z(;H29+*EUxdZ z(fCtK74dUTi{M&&L`i8z5iM-z%k$a{cXLr@LX7?V9)Qkf92s8gRp_E55 zD`N6QhdGEfp*w@OqXJ&5MPgEZ6EpvC?O`s(yA=Z}P8Mwz5vD+2>j$mtwkQ&=+CwlNUicP-{N{W`yRCIyqB?)f9W|HH_f_X1Y8PBuCK`06w zic(k0MeJn-y{veW4^(;GFf3RUsbzD8Dsc%2lYV;RGV+|~E08(?50Ug z?BqvF9Tsq{$u0zMlk5@;_7?3QfXhA0khfwNh_KMI!-vI6L!fh5PY&3@YOXvYQ zFF|t!L+2cUey<6laLwl^?kD^lPC8vXO8Q!_{4xKXvR-rlp^q*U;OvxM8Br*J{I8VH zp*<3b4B98dQ7Cn(G?g_mnSl-+5Yq*nmp?0`Q$~|5JkOeZzykv=suqyk4}yb(&oZ*) zg?b-zZIv4v(wPV)r%{5`K|!Gd3kG=o=?o#7Am<5YL657Px{2>k9aYutN1oF5=lTn2_9)Bqnq5JC?)kT6Hhw0Bk*sg-X^ zr%QUNZNw4&S9#tXx(B!?>1Lczat0C8 z^LACWyUcvHPc*8iFKA8d{_YUv9~8hEBuqwSrMo$=6fXt@1V94B0~|BfZ?$C59xrZa z0)%iFBYn@#=Hk|$B7zRnInC(6G{YUgE@dU9Y6r25n*CR@LcJzxhOYd(WAY16G^SRX z3x?>)SZMoP>ZcPJUu=)lK#oFW08d=5qe|VlYMD;EqQ4pCf!2!Ixv?c3w*FYf(5*5f#67qYTB zh=#_a83K*Ew1>8{#mKVEzYkiD2}z3sr=wLL*_|GINY98tN;r>`#@}ocRjjSI)w+1G zgoUf#_@CgkW4Huq+(d~NQDoU@Zy)l|CcUen9P6UCy4_6K{TX7k=5TqZig${%@8Ysg z`FwZxKiD~KZS6+cQmEKgR7PTgPHP(5qMg$!ojp(YL|)I=~D0%Z$mm zOe$s2z|-?YqYp}8vd~RF_`_Y^;v>77qr3E6;MG#82Av;}a|+1a*-YlU+AS*YWf$5F5_Q)h;+^Qx5$K zOVOh0MfrDsbZmSP)k1$VFR&pn9f*Yk0a9pg`cGgw+}W#fJze?{mu@rhFjJIJg(K#3 zm*WS#8&1yqLfOV6S5{E-@f*K%uX{YhU~jQfuE1H@|NK#AcB99+p@Aq^rF(N}Da?TG zO9_qGWnP*+z)e*ZPV)%A&-HMUqFdb^M&7|GvjSwQmlnTP^`!H4s_b!$C98j_?)@0- zI4hKoIuieTRp0k@k5rTn%PXpjDK=>4H+#u+OJeSvsv={;Z?w60O_up? zb+TRADoZ~5dZR`9obCUJO!HFi*juz2{sr!U@Muu5J1zsWt~*5d_|y=@0oWR>gJYti z4u(#iGQ6SB;AuK3N$iJsGot8R>Rni!KkibLdd0Nv9ZslfL)Nl=2lf{#)@Yuz^TxrX zpWyNAE^B1W0*|D^)^+oLQq$*>u<(AUGSm0euJ_$rG?V z{#@;6f%vDw!;wW>8SmFjbBY@5hFEk=Cu)Rm{}^6A`r-9ubhk%tmZXt2y`?X5cKD71 z`AHj9Og5Q4u_(doiQ6Vh0i(d09_w-2oEY{pMjzX(lE-v)U{8E&T>l$3D-P9$$0ON> z8qti~FSp6LbOoCbueY8~3r}wyiA>X6tQxO33NH; zD&NC*DGer2nRwZ3_)pCb;s3wp=c|hU4-|UK>3Gv}Xm|Ju%x-G#=eB5ICw#qW-Gn72 bPcJY6zKdT+GBb=}z>l)Lx?HJ@Y0$p_z-}$b literal 14186 zcmeHuWmJ@XyDuRnBST0dEl5cWDFcI)AYB3?4FeLAA{~Nsqafh`(w!sSEey>FBLV`_ zf^@^Vd7gKl^L}{uTDv}+4|^?UF>%K~uU}l(9igfI|vC4-T)`1VVY#ysU#=@$KBfc=l13nWuD;c_BVUcv*ys-P6 z3azlPM6Z?QAM1LW{QjgBZvE|b{?e+~u!>11bVYC>#Y=fllbJPMkcyCqlf;o+_`o1m z1{@I@`&j%|ZfYw|xGSUvPS&HBOJ0L-hWT zg`ve0kR*MShMSe?{3@B4?l$kbJ=>G^_tK7@;)tF;Cu1}w$^SRc9-`n5(Ki&Wy4KLT z!LRlgmqY6{f+75=cI84^BZjsRqo=gGdYP(ery-iZ(FNa$3MSzO$3$g=hO4I3k=eOu zgH(!VRVPA*>zm8GwN^Yh0)ENTB1kX3vx+n0Dl{TPmPA9^@#7=TD=x$!SER(f5{8c@ znG$~NsfIox-!AuVx`LC3y5z9bxFGgb5FLkaW%$LH{S>U^kLS2L6Sf?U9_y3oTpZHr zPJ;K`o%%5H^iGJc@P0;ra2SV2Pi|m$H|}978#z7L%OZrgMkLn%MD#&UK_UfiQSoBU z=f_u%-4gQ0nxi6cJUqDUK}5q#;Y>N)=DIkyEqcK?l}kfH4L0R8$Vi1PmY1@2_H%e5 zlDhhBNxQnk-O(kTOd8y@!seQgQA%*fa$Jp)72X1iTny@|Wms|L(@scvlGd*f@j=Lg z9B|=7&{4t2L|i1nUc_hDeoRTIz_eF&LXz%oZI<=tG0m>kZ6Qv%eDRJM zdQHI(q-==Y8Z+HS?vFo71AeI{%&tck@YDR^1Z#p2=(X1Ok#y)1hjw7{Wv78xbu?hu;U_<-?IE~Yjo`0o%@cxS}3;bTzSE|7QzGb23pkn9=sJ>QVAXZd^%~th#4m zcW8nSsSfhDr1e0Jc6SjW=DK=BmfD?*?8>)!&SD;I&)hjGGjp&Wo}SjDR0}<3bmef| z2%)3=SjTPUFpo#8AS3FiddJ3rBNDRPLZS45QcDiqFNKHeMLv6+ER|pVcq2NAWq>06 z++`TVpJU3=A?z~}n77%Jv^;%F0E({?_?)XFSV6F|T1ypQ7N*j1cedn-Hx+xin;;!zkSo({>U4wM-pGb5qEq+ix}&N?Gr7E%`64cvj&|_yhKo zvqtX665CNueuJ&b-LyGOLerUd=SL7f!lex84qA|wTv^OUj_R~6YO2uDZ_h}Rb!FTb zC;}cky_G}DI$kD|r12euZ^`^tZDYYRM{PWfOe&-4OR`Ehk9WX~b0xpxG8V+2WF(it z7H0Wy;AN3irWSAuq43iY;v=bxEfYF4^__2w49T#z6a=-}6k{3H%j3w8evIEfAIjHX z$eI&a-XSZiCNBe(f#M2!b9RG~4_q0Cz2zBA5zoU5M7H5o$S%L~BDt@UGluwA&-!rE z+|4I>rB2ePtP6#_o04Tf34$bSkGSi#-*vnSVK4opQ3EdmT~1e*;G2mn3)nd*0c(jF zpD-(xmZ)$@#oSFuMUCuiW_1vQff~47n^g~1MTxU~zb9#|a6R;u5!yc*plu${7ngjy zsHQ(b%J zZ%ivPZBpoc*7>zu;jyU^b3Swc8cRDQPC{53)z6*f6l)LXLr(k4Mfwv?STkAZ)-ZRS z%p9i2B|I&rwo|c$EY*X?;k{OY%Uk>19CB?_K|umvzxLdWJ1 zaeD&hj>~A4D>Tj6v5*Kdfdv)s*S3)|w+}7-EV3O6wc@c| zw2Gt&(gne03>C|)u_zM*M&A_}{_sBk_1;*885c22&9YM+F6B=0^xl>tGw$&1!Rg`x zApudnLyt_TmjHfx#z)@Bp%83*wTuWB1Z^J@uaR8Y03~jK@tw&RwPCWPo+-kV<_TUx zczo75#Wku#wugJ=s|ZH$n?gzBm#wj|s|4*{e@Ld?A6T1MjBr!^s)Tsoch4^6kCpK( z&wytmV#AsRNfrH7xp?|ge!1w*RtnWxnNoBvUrr(Gx!oX#quS$y;3_?=W8R=WJ3e!P zCGo7aW2Rz>@>DM!#!=!b;(R6Z%dSOrE0}`8+18)QyGSBWZgNY_DNo~W8F*h|(Lhp2 zi*e1}C5Te$@;R7c%a)lW0j60w&!IsZ64TO!*j#D$2oYOFpt6iED17}2Y#QI_zL zH=v5ial^1i%@JSp-R14e;2oIr5)DpuS&JGq_EN!HPRo5Paw_fb3x*aDADoR;G77Nn zr^^jHLj3O3A_`M$8Sg0W2;`(IH^N~+Q^af`y5-~Va(?x8rrCgXK!ge~Q)>Dwp$^qC9?&BxP9>XK+_v_E|7wCBmHpkmX}Ez;bilhLQbp=@*i z>1HM6h+y+2+&CSW>7X|Fgn+!O*r0@Q%g2sHotqI@DV$^+Y>+2EdV|B%vvi=k@)pBu z6d0U!&FB$(Fu&KvX}6DnSUVzy>j}oO?Cm+C`yfqBSj73+6Ou_#8+0bz~Wx2GC z=Kk#UU#yY;-(`&!aE$Ny(Qp2M(?NYI-(NhY*)xyi<>j}jZ%E_dm4+HMRc&v0-u29b z;R{Y46`!~z`uUSy3Js{s=;M8q*u29JfO{U}+1u|gz;JtdYsy8bOYHZJoLUaoa^e&d z_vaYsIgR<00GfJLT83&CJHGC;yDFRX$wH05u6?^{ydCiypT`3%_rlO9U2EcMzICAO zvCdhf?h=t#i@MVlk}fNv<_i0hze7)SfCEV!?8-A~u_vzjoWp~d9H7WBdwWQAWSXKy z1>@zsO-_Zd$`_Z<)z-`NLcFU6=>xblfuc)s#?XUNIkiYI$*UiYhZy?`WN!!dKN^*x zn69EppeBsGJ`Q2~IYqz7U=KO&(qCbFS`bx$@Ge%~RZ3sCdkl1Pe^nU6fJ+-&n%o+T zY|!5(<%~ws`jAy;q?mXY{qte(F+)ClPIX!nDq7D{M|?R%)&J3Zi9FH1Sgo_$V_T#e-bAsGu09NiCL$;;Z`J8)#mRrO&Yvfd z!FKTHtqk_ zcQdJ?^CuXv(VXNP=|j$IU4I9tSleX<<^D{?MV7Z%1C@?r77 z6POzDrZIRf^^Y=+0To2sG5UAr*|L~my=7m+2cDAY3>%YE|IFXG)bmh#uQ`idK-&0u zWTE<e$Ah6GdpwvhcajzUpLhmSz=>`(%tPdu#I?4068>5QkyEaauqh+ zu-7;XZ**HNnfE;o7>HH^ztwnybWab$kDE_q3iv7cf(CX}Rk2!@#)BxUEL&8Nx1!oo zOz(3Yx*m8H3KLA%cbcKZW6 zsKcf0xw&{pN`6+>8Z!cnFVl6aA)vYvP%}ZIZrR;^m!CY;gbf{6C>uu5*Pp)JY`ydv zddC&nH%4@2ul$ zz0mqT_^hne1f|(G^3N6g-&KkKZix8zh2g)rL{zKzN_rr}Tqq-AP9VayI{)kh6swUX?&ONNkEebtJM8jc!l`+;mn{yOxPr9*_BE5#PH(bH`6%suAA_*)Efi#{}cSuqL!H~p=I?wCffZ&wMmQj>s`6+ zzQxDW8)5B0)Mm$L^~pogh`YstwePg2&Mk9-2l!2zX>5wjyaa45;xo=6BTx$Py!cbytx~^|#=TV3w88cMQxFi$PJjV89+d+lk2)R$@odHijb6#< z$$LQ7Kb>*K(APo`%pt&z2&Z_{AEcgy1=Id{T9A#^ z5#~y0S=kF3u0w%sTc4EBgzT?f>av9xfh;la4Fb%caTWfbr+>m=vlt-I^pgSlon-S7 zQX-%#ieZ!}_|dO(%QW0i!O|_7-1WkGW6e(lZgb~5kS9tE%Q)9O8oSSnXsz2Q6;SFl zSjfV$ov_%80_ub^@j?ZzoI_%ZHjcrdVmj>k& zzw7X(?P*~hTr+o=_{rwD^1A^!1t&{jQ!hd>RFB2wJ#o&6cY}H~2JYXBiC~PcY{WOm zbv-za&lN7+3Nn*{#a9lQL{1$G`P|;tbLI`wOt^GkD%x$Y?`I5M7;0&V)ososJ1Y(x znmzyf?meRO$kic)gVZ|Rv{ip+5X+@^QZ{h=hS!_uV6ZgJea2?7OvyJ71%b`>)G;j`!FIbuXu&_B(P$2$iSykY#Z$Q|O(HiiP6wtpvz)M3s#t`|?JQ%0A zr0)DtRTAl1jB$cB$jr0*gd+2#8(92|{wL;J1dN^wz?yd=V`cRjSx2VIQRQ_k5cU$j zc1|G=xfN!$h9t0g4}V$w`8C7kuQ6>${OFK8tmqS5oyq3-N`;dqNIoWHDlwJST=VRC z3$EmQ&im#E%60)l#tw@U#3CwMdHJGd4w(g8pXXx^80}V++|RvglBTAyXo)0m;gzV%$aJe1_HBG@Iv$0Im6y$Sl;%aZaEvmo0EsHyj{_`V0 z4lq+wh@kNBE$q#gZZ&YF3OBcAj1X`b5d2nMkk$Z=V9XL7S+W}>B}#8cw@A7QE zC8pz^dW;rqqeWafoV=AYhg{+{4vi4veqegJAjgI1CCYu5E}uU+D6DB<@I@&*)t z_2ndI+l_=n`BdXOf~4>A&)Ao)RYCi03F{{r!(@aG%pa z=H*v#y+A7ft<8FJ(C>|jIyYziu-!L!<)si?15aJ?fna=>>|qSzV@u*=D-Xo@(MB2X zdH!yR7{+(j2cn1)GIW$aZE5hI{qa5B)RFcEQnqB$cb4YGN&sM~mXI8U%S6PTOa4x? zuEq@UxMo&fOFG^dkD@kW7|_})A`Slu2D@Yc+4L_vs1N=b**==Au6X_@rv;!k-^$C6 zKsU2$Aa~<@E(3G=pKv?>OE~r~JXKeiGeC^##a_K=^*udZ&Ah%?gq=05Um)Wv{**ckw;ZLLc6>S;=cy*e ztdib}t@JSkKoc*3h`f8maNa?{bkQr;I`&px9uDxnXzkc}vZ<9jTIpiTzfw$NX}a=M zQp$~+&~yX@8n8=u09jHg?QJ2>k4#&A8$_t&VSjM#=r}q3q4A#EBBaXUYpxY6GR30s zY;1Qucq4gNyeBgP@iqRWUtqs?U^?$zp5cewD4)g37L53N8^3GCEvSX zqClP@)dBg~qM==LfJ;HjX32&05a+!|e?~hK!khF{gdf`wKGNW}ns%3oq4@}7U-#;V zT?`(eajc#J5+|Ev-UMdh=AG=0jd-*vks{$t)SnF%Ps<)b4;nc%eypPbapu3~HT!Jh z3K(e;$5E3J2`0>mC)3FI)=KV={r*$R2D(sPgr?3xiHh%i0*mLS$7ON`X_art=fUgt zj2d@#-AqH;h>Zn{>ncdAA(}>G-+$Iu1=HG_F^STUBm9nL^1Fx~{Wr_%ZbmeR>C*PE z=`WaEp@<#saEa#ZY`-VD%8$LILx1KFvF_MN7;dA=#B{dQx;58uP|A;o!x|B1OuWvy z0a>te;ND6C6+&5b7D|5WB!S!?&VaI4@z`g^+|S0~jY=l= z>%X06r#qrSs>*)TW=fuiQ~K$5^eBAcV3{=Rk#h>;Cy7nD zfRE20*b-|#pIHNqzm9zeX<&iaZxh=4MJ;O<1UPZ>b`?qN#&Zc!X@v>o;@CB|R`RAU zM+9xy{T>^c3({S;5N`qX(SlK5N2JuZp3}+U6Bh*fQ?@`v56+XE(vLQC)cd zEWopmW5|cOf?pg80cykTiK8^pO>EwlvfEd_!A{p5t$)rQp+{GaFK5*%jE#TO-k@dW z6U=O~pd8$|IXt{H3IoOcuf7``t~~{SZhCL7VZR7=TCiui)NuMcpzPy_|1W~6rUB$f zJIUsgcLC+KJJ-kn+c}73Q%_WQfA>s`C|k?gD-mUry^EH*SJwaxM%(~s*$cy-73lug z<8uc9n^z16_o;4l?0OBZqhjd(^B4O3T_R)r*K=0)Qe1o7yOQ7lh zt0@J`6zldIA3}OVbe}5q+qU zxzSC_c&B4T<9;RUFN@oMe%UIP^A|<1X9!~Kix7R%;8it;j;`#{{Y$pyp!!X(>MEmw6w5%=LYl~yo03nRQk%V=5Hm43n;OVbAgN!ftODq0AK+^psbeWNUg-MJ1`Z%!HOad+s zS18F6&fgu@o>uiS+N0kB(D|axzeNNcqD!c1??7M78bG#+N*Al@OImF9J#}?>R!g&6 zUa)#`y6;}rYQ;)BPWNV8;Prenkh-kV)RTa`Zf9D>IyeDv5xVBN-LN|6fBqW{u*-db zqYORhm9=+DUyh5p>WLLS-XL7NKm0(@!tkpU8s11~8}q@uQQI)|_;dQhHKatZOiz@) zsh^1VML$~{AT{Z4@H4I7Eec?7r+}7M%-d5pltmhQJHjK!;c$jYRme_7l}2IM$11Zn z&XzfdkBCa*V4%NG%Bx`l*hxpYU~de)7{YTgLb!wJRaE$_n8TBFGQLKv-^$eEH%5h5DBb{$JRTOA@ zJGGRCV#8h{%xr0Fepl2neC`8mFCnh>sG|cI-y1t^D1*<|t>Pie)wE@dA-778c6Ov1 zRI#>_Y4FAUI`bkAG-<}JKxDt1we%Sk3$DsHA8uZ2=Qt+GsGdTof?C?oDXWcL*7$eT1hd@DWygp}|-lYG=6 zA7E$=eLAddxO@LVErdWT!q&W7BJ||lS+mMI!|iXxAY;@c#dMz_22H>iQ#R_de4n2@ zrlb8_ciJF5sg1v$6Su^*_Xy>$)o1-+_>&~{eMZ}TK(={qqRYC0NH=S!kv{ez@&2u% z1OE3z3s3wP83Nmcu;f^k2+em0v=#29+Loed`=wCWEuxk-y0DBn@=m#5FLb|C3#glz z2Nw;Nhu~_gvikkTAUQLAg)m$EK&aj3L{GrOi{E*E z)?=}|4VcZlyr@VbcHf`xsGlFa1x18n3-#X9;J4JoCY|C1+)szZgD#>6uX)FQQ;k%5%NPe?8s^SV%Xv z>W%-C|F=^57iP_kF}QR6J0N4{kS+7N?FG&C%5mGf-F?_8J?yMgEjlbiB_*Ls~MTs73i}n4j!UFxq;Pb#~Ru2nNka~cy zC$w1DU@n@jf3~F@U91Oq9S59+#H==iT|+!9%6<316Mu`a>)j!yT0n&PuEy-#`IjQh z|7>3ByzTldoo2RbX*PqeRjlo7{0{lE{mp>Wn3`mpo4X!G0>VltSGBaGKgJOk`4W@70F;!U1@o`{Gn5Fn zOrm!GmdIwNwO&m-sN<8p7DIWf3e9vI=c2z_)oSa;|N7s=^)$8P5%9bGN~bplI#28s z1-(w6zozOPxn6d-c^Xsyn4s8bA7TZP;Y6uP(U55 zv?xfUf)A?xk-q#7<`H@$>iPkd{y$jh@;{~hSS44=>gLXF6yL@E2q2nHfhb<*H2>-z zYjwqtTzZ9R+toA~>h<&COxOq!jUD3;f4ZTNqyD2o9 zPgl|bQ}ig2))vBP7C`rE^Ws-2bi00Q9qDZB2xsmxvQ){)Lh+On#z)dzM$$wDG`HVw zCCKnDcQ{19XhLF@ z)lY8#%-CXrjKX7oFuePo2NToC`qp`FlpgeRsjSroqk13rlhM7ea3i#zOv!}3n;)~z zpM{9gTrn`t`LZ{{|7<;6@S=n1qGNvqHVc_&KJM%?h88|%VEZU z+#YPmOnU$G*RqMtW_JB+3bGgG!VUUgZqqOG_tV01KYmTFy0y&Emn7G`^UnVf&SJL` z@&n(#5Vu-5W36IcBaRKI_h>O8@ww$=A(=^As0w%({zIyVwfRGbl$w%E;V-!_CHT*j z$DmN80-pNzNl8g4E^U8i%-iZ3lR`MX^BYGQdX-W=_`41s__{T2A2=AAns|cU% z0nSW^m|)yJz%8DEtz@IxwR!|o_V2O2v|e>)&&P4axV}P1FmQ*mNSJT3zk4hIa$V_; zjyGH8HF0Mg*7K5`H=4j!7aCPb6d%Ya;&ICmVUSGlEJirb$|~u3M1Riw+=+D_Vg@go zyUWzHCRKHwm^Gpi3Ppb2u}&3j3ID$Io*^ak#MZ$CJDimx{|1kAei@upORsCUiv zmNTFaXHFlxk&S0bDA7otjm3#_nb_`UUY};x^>%dBj7X=`kj==!^HHxq9`y;^SY$91 z?cQCQXdd2fC8oF8-n~l+W~cy4HI{Vh3yR!B z>NuIjt$klk1MgS?=L6{3TF!+BKWqP_`Ip{CjLP z;i&$}wKh0s&t(=$qR-9U^<+hUWp-#x8N#_YE)dP|iJ_j-6yo|&|AO0`MvM9_1(fkj^=(M~=`{c+S7XN00&`Dms-`wW7$-~kQ$=SMg^`Yh>Dm@kC zp)QS!DWT@MN^f~uO;tc-sdPz~d(BL>skp+NY|cU!Zh`0l!m2)Vpv;bBX8P9Z34W~Q z7G+m|>Jq(evhl);JfM3P)G9VMo2-m7_zoBHy>jFZ8J8r-I@IC=wCSMfXk%-QF;5gw8IRC(AfPM>Xyy zKlJF4q7CbLc+*$c9w|e?t(#%(>XJfC#&azOy&t1v6}sQcIVbTvFj2MYeM+yh^=zu*=ruW3nM-%1UKtIVju`*;`xzY@H@+`|14cfnnh6D9LggvC z&8>m)%IO}@qdbLPrV%2aYK!TjD5fwzzwHQza-x9UsD7(9=njD+V`lK>&sK3ha6qD$ zE6wUli~2r_qIQG((dP!Z;pVJL-?)k&u|z+mY5-qP+OBWi0)=o7duDxIVFXj$XHE?& zzZ;L0##O<;S1;8;6ZTlBU}1MlC2DJ5Kx<`j?gfR2Z@RfK(5sti--9cDy zE-;ASc0VO0NP4Jyfz%bnAM*CSSp=31S6thQv0$l&5vS+K%^-@JL4CS$gW)g+T!HEb z7S#{74JWZe z?((EhwXlN>&e=?#!mBr%qFnwAUlxHKb}My@dL7tcfDS6S+2A*25gB-P`|CH}*D|kW zx<=ehAh8Mh*RkSA9Y`|p+CGH{!vDI4&wstt`oB*=m!*Hkh|Qf0*+{#skKf;(M)9yh zmW46CR~M&)Dg1T4pCrEl?9=%tPA`ykxJgy7axsHbjVu$&oDx%&U8IkuEm5yo>8Wb& zk_$;X2tw?ez4qbu(Pox2$v~O)6x%9J`jDJMOltd++UxPaDOgqdpJBg-0IGOm4fQGJrG zKmYwoPAIToHekvj1t^E%O1wB(ireoUl2W_ilLb-~7|hUESHw)_Go#6sEAbWPk`=CD zBr1wl=1UDJ40$Sk2JU*5S}%IN1iP|q5e!&nV`^|&!ao+?tz-VH9d5O``mK4G=rGHB zu8fBS6k+=B?z}G&Vz&_?xZ0cK^_2BGGsN%FC1=hj(ZQ*oP<6fo9twBM%E^5y(A`yt z-i8jOMsPEqa&e_*b8{6YaS0HXS8^jPzUm~9axN&Ve&q=0jUDXGWKF%#sDza}$&F=K z{u!-TqC`OsWsD8e+L9?Q4ut0Cscf_GwuFqabDHZZN)_#yjdu4x&GcGH^$c84jcnsk zz+0MoO3zh$@BAt zEWC*RQozP_8|_~C7_Oxr8^>TXYl&r}>D{o(yEGaR2Dc{mbj4vrIH&OICplc6MkVA# z!hu{dHcfl`bW2htNCQK&8y{Jj=E8L#^b+r&gO*W}_t|K1ab=hGHc1IiB6Rp|`E$!d zA@*Sm_O|teN^w_xj`bp^hF(*x0}k^rB28GQTfInx*eVijAn-7!Z~@vKVh-+1e%Qb) z=OrXSx#HG2Y-2oYdAEDH;ov-w6L-DLb4zt>MDM;Jv}6GhqB%f}&rzBg+hCWxJ2_ib z!-xEn_GW01zik$#6||q zLAJ~M)_}5gzfTccHeluc`0A8oV~RV>%)LLmHgyXsI7uTQM=sU^`e{WOAQ7vK%46P7 zg)8ucl^ht@+pwQ1es5YB0xJ1Fb7x1Vz58Y5+0S8?`)2)1d~PWC zWIUyH(%rz3s=@STp5EV;aNjs6f>=8dal@h@ozZFSQ^jZKvM_si0j@_HndNN#*D9qa#n1^PmuG7CpuJL0O@fj_NRlu?qJp zWuBM&W)hk@6MBaS30BPT7wzAHx|%;-;3pA4su?E8D#Q;YG={@F8rqdRytIIU=K@yO z6TO)XwGY@iu*uuiKPy<4t&;6xS2r9RH>^t8XD!>uEevoJw?4y^iAP$@?z=)X6>Sz+Ad0o2Y3x1IFxfB7ps*+QNSEqq*9SYR)n zD1hnwaSoTcrz+zlB8XpL&{3H7;E9z;%J9_pCDK1t4)r!S<3iynu;N@5rnrh^0Gs(tk2* z*xzkjYORkgZXIH_Cnq2C{ zN>i>GGr>Z^a&~MHV$xs&OS0GBzL@1k%XfM*buwL!F-ZYxKf&tcqz`u07jV&6rXj!5 zONZfgy$;eovI{#AQIWTLQ;4em2I>YDVFFi{=pdq#e*ff2H-K}h*#Gi}-ID~S)9W9cm|1sLl1bqCI4orab@_5xv$y{TgA`ok From fa02b615b06626780481a69292efeb2a4c65456b Mon Sep 17 00:00:00 2001 From: ManikaDhiman Date: Thu, 9 May 2019 15:43:52 -0700 Subject: [PATCH 464/724] Corrected bookmark --- .../mdm/policy-configuration-service-provider.md | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/windows/client-management/mdm/policy-configuration-service-provider.md b/windows/client-management/mdm/policy-configuration-service-provider.md index 785873969f..4913c03360 100644 --- a/windows/client-management/mdm/policy-configuration-service-provider.md +++ b/windows/client-management/mdm/policy-configuration-service-provider.md @@ -4123,7 +4123,7 @@ The following diagram shows the Policy configuration service provider in tree fo - [System/DisableSystemRestore](./policy-csp-system.md#system-disablesystemrestore) - [WindowsConnectionManager/ProhitConnectionToNonDomainNetworksWhenConnectedToDomainAuthenticatedNetwork](./policy-csp-windowsconnectionmanager.md#windowsconnectionmanager-prohitconnectiontonondomainnetworkswhenconnectedtodomainauthenticatednetwork) - [WindowsLogon/AllowAutomaticRestartSignOn](./policy-csp-windowslogon.md#windowslogon-allowautomaticrestartsignon) -- [WindowsLogon/ConfigAutomaticRestartSignOn](./ +- [WindowsLogon/ConfigAutomaticRestartSignOn](./policy-csp-windowslogon.md#windowslogon-configautomaticrestartsignon) - [WindowsLogon/DisableLockScreenAppNotifications](./policy-csp-windowslogon.md#windowslogon-disablelockscreenappnotifications) - [WindowsLogon/DontDisplayNetworkSelectionUI](./policy-csp-windowslogon.md#windowslogon-dontdisplaynetworkselectionui) - [WindowsLogon/EnumerateLocalUsersOnDomainJoinedComputers](./policy-csp-windowslogon.md#windowslogon-enumeratelocalusersondomainjoinedcomputers) From c67e518bec98b2c39d77e35e6e2a8ad20f26b026 Mon Sep 17 00:00:00 2001 From: Justin Hall Date: Thu, 9 May 2019 15:45:46 -0700 Subject: [PATCH 465/724] resized images --- .../wip-azure-advanced-settings-optional.png | Bin 23683 -> 43333 bytes .../images/wip-encrypted-file-extensions.png | Bin 10846 -> 23272 bytes 2 files changed, 0 insertions(+), 0 deletions(-) diff --git a/windows/security/information-protection/windows-information-protection/images/wip-azure-advanced-settings-optional.png b/windows/security/information-protection/windows-information-protection/images/wip-azure-advanced-settings-optional.png index 2ac8f45b5c4f2bf46b77dcbf28f258bb34db65e3..785925efdf7d8f2daf549c90c5ff84fb6f2750c9 100644 GIT binary patch literal 43333 zcmc$`RaDhq_$RD@bST}O(jnd5ErN7|bVzsS0S?_=(xTGc-2#%*2uMoDyZQZR)_Uh| z?&iXE1jKW8JMvfv*uQx3(g6_$e8V!TsC@bJUmE}KU-wA{ z(m5?HM$?Rm8^;_v9xng399Qc$jPqW;mXnhcdAOJvN~DY3?ATtYGfkvZfkZ~KL+W`W zBO}juCq#U2zd0RJ^Yh3n zbb`_7_`Ca?^^E=aSu`GN33JPeJ+WcjT*ZeP?YfQQkwz#K+I_argLN@1M4Zll!|mNaExe9-F1>46$;qkzG#f43@^%4(U?9iz;r3rRItd55Ju>bQ+Wur;G@e>SSsDH2 zHCZtK#-5XwKWk!(+tIH&({M0ASp@}&G6<>AC*mhgXksEB^T%Gp&1lqYD|v7 zXEzy6V(9N8ffrkV#SnDFT2eGLH1zlP-(2@{-Jjkj^P4yI@bF0IFhAR!$mO(DrW%pZ zuF~S)KRU7_eqtWWc&GcrRwsc{DrS=jl8eP!^VHsIMS%YoVuopHuvQ{6*7}rL5S0RoH3gJ{po;280rvPGC||iqbjp><5aRJ*685c zmD&DuaaUK@{X2*Q@p;bCT8BvcM-B&)r%BhrBhxq`3t}^!Rta%&cywYb;-)Srjlx^a zGSzQZYST=J+~%=_?@T^)3)@WO2ptBUZ;!}4)^t32Z4D;Ol&aKUP*G92AFpQ9sgUZp zT|aCN#NpAa28`h?HNzsHzrK(S-5t*^6pw^g&f@L*UirbT#x`)s%&E3JC@6^d;X2rE z>4zHM2Q^O!G2h@~yRQJ>0EDElRTgDVeJPpogH^T9&DllD!~SZU_tnwT04ZxQ%yLmPMf`cqz%!YlFSy&dFmI zcSj9t=w!l*>FUMuYA=>Bzp+!rM1N)+2@tN-Z%L_Gpk`+^A4xGE+(J=&9sEVNfu%6- zaduWStP{rK&cVy`&#vFt%|A99^B4vPt`BjQ1)EhfcvsWa&-qJ}lzpT_SW^>-8rTC?AziG=~-NiGjyB?=I5Jh#*7G3X9L*ziii|nzB6Ts zQ4!HmR^(^IwJ}0=`N{Sw5%Sa(vmE2BQU5LN-EAjZx~sGHsHQA|a{A+9$goZUllWha z(}{1<9orw_N4}U+Zv8C$%&$>rA{Ar0`ePyL2R)Mwj*V=k;>%GQ5;lFTXg%6fbW3oS zNTcQTyS#^kt{?A?Mea`|cA!hBJ#`3M_Qp;1(Y=hn7dx&uP`Co1%ie1~=drDi7ysrB zT{u;3$FulQ@K~tB89aBh-L(-EQRj#KkXtyfW=GFx#2`otDe|(ljXGG=e%HSdJ{3}n z_tl6s3lPgbtdJ?q33AM@EA?b@~Sa0XL>lofhoG-4J3HgI4@q z@di4T97WwqYmV{|T|~0*DZkr&I?rid<8HXDjCu}OdwqUs0v5|Rrh!+h-f`oJLkzb= z4?Shp8G(a^zh0r>s)k98CQXsuD*DTsvj0^q{~5wi@*yVUmO%JlqFhayj3lB9yN0GL zt$}t)uMqgN}1eBC7HK!n~HTv zYOH)QR?Ce})c8q)Nj0H*BLe%W;fAtQq^d*vYC)$40X;i0=mGAka z>|Dc2>NpjYz4|yzO~r)1rfxHhq!Ei|4G;DvI@%;!1Sr1TZrZ$Ne5GgHb%K{@ z!gAQtb~zwnb=T4(ep&Y($;an?yGCBrs{OWf&nZ?V59onRAbY3w< zChL+a(*X#zqYo1k<}w@HfHoFm9O1iRoneU0-b^V*bin7ITMA;>Z(f0xq=S(T|7g_=XWUHB&_8d0hSuW4nM9~Gibb` z5kXym>?9Y93P)g$0t`X?<7NT@l~SSw0U9CKpy#R>fF(t0fi{MIH|By7#9!;Z|2FN) z)(-Znygb10r`rdx$OKMqMnZ1=ROvjU*4yLZ-#pD&NnmVHk@d!+Wo|N;BgXoG+@y<( zD)nA+Q92=RL(wZAN~&%|=ZM+Q2R~!y;_TT=p>lNPA#z(KI7DB?e>FHvjM2X0cijs} z?6YxU=7}-eAYApkvy;m-Qj}Z&WQ~W@71=n>@T&1N$N$ljyAK*nwT^x~SCL8#qt#cj zA>?!brK<1Ys`IC$Si)Wo=fxv`Do!;hc&o>3Ffm$0;TdM!ElTRON8z;AX(s1MD}{?g zQW9{!m78|1FvCTi?J!mF3XA$ik?{sUg$UUtz0i9*`9oRC%T@O^UnrFTogB)9;5jNw zGF<;akt~PX!EzHPUlEw4;r>vrbN~b_aQ9%(%`-BRd$yUBo5#i&(<_BeH>(>zZdNs{ za-fBVxOBv)@j6jbGN&_YRT?qKf9ynDu2qaB{;JSfnz-)lgx>iOK_ZKa&n6lZ1GnKK z`&z;!YJ7&hBn@Yyv9tVdrL;>myM7$05H)ii!9@sB7T0fbH*yMvZk(U>%U-s+V=da% zI4d;j_uHw4)VX&FguGI8i_wE8fp>Uw30%M7aH#^>>VMHBlFU)X37U9S+59%Z9SF)# zQ*|OAB@BkTOTF}_YVv;uooLEsGKA;OPtF+79Y~6>DXv=zbs7_{AW~=Q*Rv*L_OEFP zQm>qGwZkisFB$vmR+Mw=h*mlizJ5txWI{CWx-L<}22a zv2OS(6?~D)_ApHxwp9=`%Nf_{-U>Z@cA}EU=BFY@pgjI7q|2PMUPaN4Q#}tjN}@%_ z$c6LNZ-UNAV#bsoi(tnOh}U21)a+=iiH9N&&2VRkzI8Ovj22h;o|d$fb~gSMVi~r~ ziM=k&L*|`fL_DnU>oW_R^TE$58Z`6ar2KGddQ;(*g2aD+<`TK;J69;JvEFuoZbG9E zp!A~&%O5dU^P*+7r2L8<1ESz~mJiig#2l1cDHM|_d>z`tJ+L&@XIEDPJ;Jwpg|_aF z@AV=ohErK{`AW4>LoK+sBe7J&(oJT@vgIt<-soCfIx_K5ZRX5DExsKhQO+;H;S_a@$f zZ@y@ji)TC#4|13m)Fm%up={Hd#K=}w@@O$M;G1G^rZVYFs}-IXt0ML3IqAn={L~wQ z+s4m=E3xoZr+bIxVuZ^;zJ3LOf^7z*Gg@Ajtq<`9Rv`Q7;B1(|54$BTQd08je+Tn) z6w;<+wO=ZIp zcM12li(ie={^D(DezZiOx(R8ujWc69w9*ktBh2mOmO^IxgF3Q`Gdd{RNH)c%MRndc z9^lgt(HWhij7u6S!ceRhl(p31wwerJi07a^i-=|>|45_JQyr9zH4@{+n}i^>;Rg3D zJ%`-8zphUmAbakYntd?w^F=SH(#D1kUklbYn_){uVVA2FhGpS2{%p-$uxq(pio#)( zhx6Y(Pfc_$G&<#3^(gfE_ox4qEUlWj_MNy5F|YAgouoZv+@$S6iV?zj+E;LH10_}I zM8kvUSkq9)(9cXP(;-C3H{9r1AK0%p+{=DerdKzY+$e0*^L%7U@03rT*D3F1ib?Gi zdtKl}RDWmDmB3&*_P36I+j#uDYS_|hYl61+hWvtg{qSPGOT)UxLahADPMCXhef5A? zqC3nVD7^A~cOTM7EUHG7#n;D^Qq?<|B*dF3^lU6|J7ejr6L=VAN|cCZ70zDGdu{#X z_>Boaelm93)HWuJc>T947(s&>5?OzEA%&zEjns%*V!%YD8qoGez-03pV?m3`;kfOJ z^jDY-740Ug7^(W$MV&_mx1D^iX_8y_o??DM#o>iM5hi{HpSmD+eSf2)OOwm4bk1oe zhTus+7LH@IBp;Laqci=)3)#k>RN~{4vMsCfWeJB3h=bP(3u5cnpq*xj!+CTIwxzm-h7tp(w{2=J|X%R}*ffUs()^sOi*90f%}@+OjdJ_~X2fHrlWu`*5H3 zSgw+6YdGV(aM)zD6;~B^zwmT2n8g`IPwHG2qP}i2AtQeku$U@5LQ%M*Iz8WgD;AFU zF9i@ZUG124%)s8mg`chQzw5Vpy+(uh-soli9z*DSkG(U#{e#230mh)&_wF*0R*AC9 z&ct5Dd}zwWCEbatcDxw&LK63_*}`1iT@kEy-1}c&-ZN5NVKgph`6~YTWR^woj|jn? zo8UMq6W+ya!PX+c+Xyi8uN`50E<3V8zE=Qbr_Ta?#9214=Wkq7YJHjk=6qM=T04)p^vH6rhLp*c!P&7ob zl~v3N)X*;x2#S)Hk_FDITmDjxK?0Rt_|j5RY(eq51FP_VQ1&O!M`=gdE~PWjLVVMb zbbisN&2CeB2}LZ=io%*l(AMVMVm z8YL z9^QA-H6S$D(PaqmI=ezBGR`O+ zfhfCX;&>)&mD8pM{M{fH`OY|T2BYSnWbJ*L?7U@cOa7`t?;Te{It>_By;qm21ItNSbEuw^q$Vw77e7?;iU#<>*?j^W_P-Lfhg zQ5F;jXKa!DUs00Tho}`w4^i~ts{#FCyZxGIVbj^$#DC{Q4ozdXYi6diS&#rEAcw1p zlM+r`dF8hU(_3>p^94+p^wDocr#2WO_l~J7`i(Es0!nkdx%8s5BKE7$%l8 z^Ip#2v!CYsP^CLck7x@GXLs}!}6dIUrt#@-B5SxTBeQ@ zdE`~1n$uMHP=^`))nTo@lI`*k79O?nhdvfTUXfgyOW=9;qixTk#-z-v(pD(b(VEn~$ckd%UNGp_(mIEA)SQ=qpNNvqK07k5pzhy2`ZV zH|U=Ua*#4^fS&Sqt^tza4ddH1!b>~tJdIN2i;yo{$fn`Z*ihDTCd`=O!KATH*~dD+;A$w5X8Y8Jpcx*vB6UxKkd(qEui1jZc`Ay>RS?~{%Xrr^F(A`_vp<%AyIUtaTfiMN&fu!2*FQ9*lz?2G zO+D%i!GHU^HuJo`R6}%?Zi7~tYS)uPhYzhnq57xJVbcLu8RqsU#P;@f;1rOuoAd(D z00DzkuTUE8yoy~X`{d-rX|sPUlV{?eQrr{k)YOzMLrk!Uk$H1FiG&)tkPu1D=c7+@ z%E~F>75%42J1g#M`t=rQSKnKsu4;Pa&EAqR-Ng0m{Jp<9&)3-+dG}~8DJeNPVmkN< zY4?MUoS#;Bz};v%=VHC3yKnI5(?}#19WpLcn(-6FGA1VGe%|M%VB^i}sp#<zmOl))1}*;{|$R16Ld+N_}?pvr{B zzvOt@Ip=iSZSXd{6QElt1-tIdlvcmlRp(DX#_PA>tr|!sWcMq^b3-}MvkXlyhZ$?q zKK|Q`6KMwogc>la3k(tc-R*np4c&|JeK67E*#h(b?${C&6T{JnxP7iq0De2?dGzlH zhz)E#9~U@UYM40bY6r_He1Fmtjmyjdsp_9oIatw^5Wj8^p;;N6|IXZl?w*2 z@3Tyx+vVRC-S+*HurN8F30k9zy(vVI7A$^2^I_~D>&@?J z_dMT8uAx@`{J83Xv^((vjetY4-PapvZa_1>IqAUwt@`cDidrE5m*)CqjDmmO1n*LB zIq`P~?sPp~^$<+tYJ)>=k;v1%OHl%sGp|W+ghDC{MfjlG)!&shuLI_JR^L}i4xovE z2GDrZBy?d7q<=uXP74ku1`%iPCnYeNgul>;7i&K^afEKTXduLK#9r>t>;eG|iezkT z49p5k)nIru=o)*;M9l54T%im>PmVtPk{h%`f;`x?4X}fmb$=YrmSgqkwRycuJ_x@8 zUYp_E z*BAnWr~0UnCRMUxkAZ=aiqMKhr>qCS(l!M!286sXFV4@Yi1q4BURh#cVZFh>xd{UA zowp1aI>inVn^9+xTq0sBryxx6IHgq7Ym^KX8&;sRl91>Z%j58k=88OhC;L_m1@@2# za3Xe85+-+>KOd+k`xGNe900?|w{R*D7NOv0K?yz2pVa~>6!_0qEAAL%!dc`{w$!to z`5*-&`ARuPY}4>AX|eXtzmmV(%vb9*K}q0yShXs(>n+Bpf%sy7Bc=FkXZ~1cXQ(pl zXcwH95;$(!C56!_f@#{Q)vEeP>^wX$fPh00crSR;3A;U#N~a{Qx!bVj$LSyNnmwiF z4>`KhV%SMuSak0Eeqw3O7%GzNk`*KD6Dx#=m>_so5K1Ytbq_1)Ft^bU~K z?TWJGX-zJ9RD~%h0v`fzyrofp=(o7Vs8tuA#}e_dXq2E@i#s-d^Efq`4ygynG$Hq$ z{dAGs58Fi+!*<0hRWbHgMz~>e@%o_1U6M&Q9Kw&16?0JhN->nomy&(}qNXvzblK-H zx(RT!ccMwGn1q6j{oQs^z1j4 zL*!ci)93O4dGpg`-b?mv;B-c!N1`Al&``gE`wAE}6h2AauRbw>G8f9wb@Bc9wKR#E z?-zc*dtQDouP1AVEN}E61qD=v_KQY~o86yMsUS|tXo;x&jiPOm z?sqmn4_Djn0QTdw`N`BP2R=J+!;(e({myqIrZx{A1;4uDCoI((!?IfeEJ1B(bhyLn z4O=LED3|B<;pzIlS#O#=zC~D_O9X#^Z?Eg0*>a${-qT!HYnDTuZZYU-@zm+w+Dk7T z(kXt|0yUk340y#()Z^LowE#*%fpgLar2F(5F_@2(#>5F_1X&4GUlva>UY}y%xZfJ<}ZnB=r_Z;bnmr)%q>%_h$;j zg$ZI}Vtb6~1fqU>F-}Hxf)|q#XU3#IU?j6x+b*D6D2VuN(43jq{|e3E1~g63ivT$S zy2yqze-kj)z!&)uTU6c)TcDQMBGM{lNLntuRK=-s;d>>U*FqzoBwBR$??A?G_5}Dj z3NF=ymKKsq`uSm>=DrXhJa4g*O(j7d$92)oL9|KK4Yp;kOm4gTED?>)wTK8r>;mAx ztB2(!2C%B+2;#Bm(HpdSfSDMiCZyVvd;@BzPOVWFaA64<3NW{j38YaNHOm72_&hya zMG#Xs06bF6?WO!ck4r(K2Yyj18dp#178GcvpFr%!Q3u4I2hh6 z(6@a7$K)Yh#9vr9_VM8kD_Na_C=~P)4GM1Ki7rT>30yBI%etVd+38n6v=0H22ljU< zJpZVl3Glq}1wjV_wQn>>s6|Z~Bq@d@r6I)S9jJ-Ph!_}8rvqd>whNurQf?T7Cm=WA zwL&-jJbAQvB41Pf$;!(^ZzyShe5`76-llw;tnvJ#okRlljFgm=oE*qnYAQSq&*^6q z;^)vsL#8f$@!&2P=0p~s%k9Pf-ky~!w$l4|pAk${ZSjeT508(JcXvOu``mDt4-ejj zfJ&dV)K>+a2AaUpYMa2^O`k-ueDW~JVTg(bwBj+?{5GdS{zhrie`*(IUsOy-BV!ON zkxBNyzF7k&-tO18a@Bko-W)7B(l zv!!{sb_TrEVTb=r!y)Xuw>&shL1HMe6#;)tKh1n|b_ekiJl=HYYfm=@s{rIbAE2~f zoU?)HNRJCIb_GNcG~z$MzT2#?J^o$Do`59EVZ`y{`LXnE9GExJh@}7F-p5sN{kR#n zXxXk!&eZD-#8+?({wy^(gsJrYhl2=pt}0 z>ILKTz=8*gTmd)+Fs#OD9qAW@-{#0?@Yi2?X^MoOI%;lQXA%S{`{VR(P^v1 zbvT&3Nf1z`xw*Z0XS?9|oS)%)UY2?Qg8r_w@GvorYB*3T)h`mE2`P08w`D!Fd_@pp zcDnMm^jpAZw!HImx1P7`Yv?evb@v$V&PKXS-|lxGVJuyyX6Sp|EaCMo7<+TNQVGR` zd^}9K${pnV4mM_6oUZOs1NTbHzSUXsDNTZqcSiQ@5d*ikPxGeXmoc?fv`S$uUDscK zU?Ek~`9ZHXH#bd9O}CQ(JcIIiNXugo^Qz{HzuN4y>t|_;${0U7zUKF!|Iq1hniu3- zst1WuArm}zHfgn6xGyt4rxMY}Oom!`JALYvPEDI588=W8@MP%Q@bH}-Y$BLu!im29 zXO;DkueM7`sm^RH{8Rk#L4^Nc)9%PS*RkK<~(bikOWK4KM9f z`?j`o^stzL-%oEwxK%^uGU>Vi+m{A$vqM^3qnw6Cc$sN_G~-8c?F&az&bQR1OIO)S zb=Qw?R>M44m$25#d;dHFP&QU!I@j~IxN^k*xWj5VPFv< zeGYD!!2s?6s<6t#t!wkxU%T(P<44!XFduw;E8Q|*z4>=u$6bN1UGE|Kui$YJrZSch z4re&M?qn>mpoxHtzgE|$t;({xXn>}AX!*Bolyz_9@+(_-s{ zbg^Nil7l)!e7*V~+PX!BozFfLVZDVq4 zw9;Cf=84~&-+To7&ic}Djlr3p<6)#&P3+NNRSV|B=1@)QeC~c`&zm#^ZxJol5La8< ztTBt38VpTPhs^+00v%k)_tw?StjOt*)R+I_pD?iB($CzjAD=JT2~9` z_8}o51Ek)gyyIUhMY1McuNRXfGv`jF(0C#xwxHKnGP5yT2%ezyK*%{*RuV4%aZCpq z@XW_+$Q-?wM;JXYtThu}D=I1iX$9B6%S~2O1=2{*K=9}0(DAw*=tCYJ*Z(C1nMPL3 zgZ+Fc{C~W582CU>{(&cSQ-aOPOqp!cklSH^2P@&&?t9p6UZH=9gR%_L#HMYs{Ehz% z6&b($IB-;=@K~$)zkqsjDZ$9!9MBr}Dcb`y%W2UN=2Q#{)eywD#1ZDJ>2(&Bl z+(2$*EKR1F+(xjjLRm;O8|@he3ReJdKU!&N01$cF|9^Vf$#F7(={}&h)U;h@`1G?^ zxcpK7qoTXPO(NHdnfmuO`Aq{#=2#BZ;9dJCF_Htz2^?E(kEI`W0152_9YI?=ZR@$m zr-$wO-x6`#FE;}GyfcNPR+N(iIm*bWD1MIKF>sAP zSG3ANrv}s@=SMa)3hYHs=X8-*xZZuvUOpMeGUU1SMi4V_zbwWx0?_2-R zUZVv*%FD!&w)sE#ZIVZ`0sUg7#hnO&XMCzqrUQhDp2MWq9m9a`b$~!9fEw`@1jGVv zif3S#{}mOaEe5Ds9b^H?Ku8gtg#THVkgoOy%k(Ps6S3JFusF;xjxLf?Qb)hOGroH_ z$NN|VO-pNZ*&V;W_Lyc02I*7zc2FcqA_j`MXlTqQ^Ta?*s;5$?9&rSbAqLBS{ovqW z`*W#C5F|F%Zte?CwIMo?vwwXxSCCtSTU}j^`Ss~L;lR`T+5o;g|9VuAn>v41YwpiR zR6u<87FimgNHG2X(vV;!Gp|la<5TXfpJFz)6)41q32bE#sM1DFJ2=_U8leHz}AyfttXhEVtI( z-Tkv#UqQ9eeuZEBH%MxMX`h&wh%*U^q*KmXf2$lC76!I*d_d$l-doK*FoGD!4-j-! zn*q>wT7@Nv7JuqzmF~7DYx;dLr=9|x|IKzPfVs&`I_ep0eEyGu+nHR}8^^~g=|H)f zMqV*hCE~H~6~<2=c@8^36pdu0QC^UJ*S8TIanyIswj-ydLx};8URG0 zdQHy0xBI1U-n?m?0!ow|YB;A9wjDQ7Uw;fia3Zrt$tZY>(>ROx@Xh{zAojM@OLOfc z84cZoQ+{eWZkO09N*nrM=o|X8fH53{EM*Y?9nk--GLT|SNH2nqZpx+zLqu`f+@O}39A70UR{hWmw(-2|>Z6AC_q`5~yPGD~}xz&hN{ zzX00*b6zBZ{t0AGHnxX~o^t&kZ@^-{)vA=u_Wwtnr36bNnxe|U#Af%4i>n;OX0?yO z+{=h1u+M5DyF`&7JrsE(3NllQI}gKEb$9kA|2q5!3_9Ix)jSf_6!Z{PN(Fn1@ zR@Z$@nsfo_0f;fMK4%pN*vJbl)alQk`nS_En({=LGC@7QI$q0FtA&|51fPD9z6i7t z2GB;3l0n9B6;x=j6E^%a-`PmhuHN+F8GHnL5(}{?C8bJ*R4^WFV>mRx#w8!5G3o9O(g}W)Py_mfQw;4N7g#^*{tf;n%V< zOa1|!>$57^w>oxk_@er5y%K>8w;h8BNFTmqP#Zx3&Alox(a} zdE<@(JugnjA z3roY%4pgRGj}4^T{=COOk=01=*;y~(tfI$W3cyx(U+*Hl_dx47Q4{X}$5P6`; z*a5}#^cOKSvV|HIiX3Tik~toYis*WIy!Os=xoD$)MNhC@+t^Jyx21K`cj`sH{$hG=vaEBH$KN zQ5(7Ch~ppFvp>h;XJEH`W zbsuUBTrmsTr_9uuy9(;_Ol#FKU7WNe3DfCvn;dcLUZ-)4xT>H(!Ee~I6e(P!$4Y^+ z#71(18uebrvMB8t4+9ysPh|Lx`OPfYU}XHRh^b2GU!Lu5Uy$>YECWZNSQG^Cm2(6= zZ_doA!^@(xfcQVq+spgOsagEK(2DvMB0?m&+B@{q z1zq2!khDN3vh`K-Sj1qF-~4z0VgS=%w3^higHDRx^_lV<8lJ{%s9lRVW2x-KFKCwufMJ5o`%W^ zjUIynw@V?nY3OXDWbhkr<4cr*g)I1;Q$nH3(Sd1?&Ly6%{jwB<8%XA65wNG}>-s zyP%V>)WZmbSvUfvOtRj*2%Jo+w53+hdhAYBC^@!ns|UL-?mm1=A~@TWJ-wlWf>Sxz zu$Nd{K=RW;uVeEa&*Wj1xVszItTA{19Bo#SP{XLfMhc=J*|66SIsy%+pkUTf61H2_ zjH19t=aPN+yBFs;ivSCZjPzK%WW%a{eK<`fSJ=Ct7d1t&wdmuK2P!TSsJN%*7PeEM z+JdgVaRIEq7?oq-0hTIfM^u1@LjNkFY?Asy8XeTh^!WIAVDA=za{`oBsuCm=6e_aF zf?wd`L_tZ}$a0el2<1n<6$A-c%?Mcqb}V8mz;D*PkA=q7--9N88{YFyLXI4bejCV- zD!uo;SSr9D?pj;Rg>Ge1U=P~VxxPm~o$VEJ-3J=Hc>p~D-Y^6FbfFB!MGmgDvfh0N z5*Gg1vl~>cF95e0if2HccuSCQPAQXtD;2IdXqFp@|60AC&ZzZ6wVv1y(5-xLMytyc zo)y@T=Q}5Up%Mk7^M?Lyz&&!U0XJ24Oy9q(SH&m|U`C`F!hQusKS}*|a1z*tk|;jW z6y=sqm2T2(H~w8y97ch%?XY0avcvCT;Ua#Bp$=YFZj@d+-ffWwO#bfPRN*LtT{cj{ zLE*A6-j7Rn3?+frf(}Pc(KHu3BiBE0kmUnG$_(Zw%q!$90rzoUbv+}VlbuY5jIQP1 zJ>lV~1VPiA-)VM#0Qc`W@8Yjd%sU0JBBXBmU^{{8H=aN>0Oab0(D;|zbUsh$9u@j98XdKOxl_{J)2rzg? zxp4e|ge27v20YwdbzDpACWWESU2ylOWCPhmj z|LcBRA9JcY<+FDxB_&l{Qc`k%H1L${5A)kO9xKT7ruySEL%noHDdrLu_5-d$sY)*H zJWyeeH#dVZ@k^64gGeIBEEMGBo1M3#8XB%ZBLwZ|{btsGeq-Z%b$NPso#Mr>x9w5EF|>q-O4)Dbxpnq^_>c}NRQj~j(j@(_hV;p=jd)=+zbE%6kMjp&pK7vK=%9fM`k|*Eko9dxVb;R2=|3VuC$XV`fJ{T`w1!&u{s;q zb$V^Gy)q;`Iqe>Fa;bTJsnfdcJ`i(H)R$x5K=&)g ze~7?ecTB0$K&zqy@AtmKnqfx$J4hD5!DbUV`hGLI|MP!Q6*Dj}0OP6Lpsm^I5J`(f z*28@~Isd%c=h}r@+-&P3Q)x{RdN$F`zhNtmc@lYij)UQXY{;72Kg5>qL>ZR$Pe{%x zQd3jZy5p~p=gCGMEJ|zLNin=@4Y(D8!soCn+qHC|N1KKP1sfzHS?VCu2Hd87ItW-f z4g%oU0}Kjg>~B}D;*GJd;x6kr-tfK#dHBR-;?U>tEQm6fpGC!8NQC}xxloszL!rd8 z>&ECLB=i$)TcOW(qkSXg;~qf#M4Fr$E{6Hhs#~OOpBp`8O~+E~H$%0S8Mj;4%j-vW z@iAt^9^L<-WaTsy!tb{S{HbMYYil(%HD~GPX&@G)5(f~DQNQ_{(>ix%98LS<%(mwP z@}(8#uR^E27(5hB#y?N9sd&8R^$YW)^29fi3lDR_6H+Bh%$EjZ;>XNSyFA;?J;e(b zV={?MZZeXe%vN|WUA-ZC!il*f4L%MgH8m{C+Qje7_vh|?l~Ir4TeRkk6uz!tT2hIB z?_FZ5<5qxf@(8S`X~=x2O38JnjYmft8#h)|jLA}eo+<<|Rp16C3P>UmH%321Z%<+T z9M!5B&4szqnHNO)(f`!UlYctNIaIfwY=BmCV{u)d$dbjEn{nP$xKYak~7o(4K80ROzX5oY9>dX(Qu{n<<0iM zzqdy0e)vmhK5e)HWKMTCw`cSB<#x|9kqgk)X{o6fY#}d3e4*-0y9LvKQjysp*>HEB zuMj+Ex-%%Gg2dY}{Pb+^Y6}v*wpeu*SpOVMt1Oe4B)P^mG(Z`fEOGAKVl`^8@0yD z-g5-sx31>mSu^Z4T)84U>*hz~_Ico3ThuMNz~7y8+#3bdaB@EfS~$=qWUT>21d(zx z;>K`{0;BKt!YO9N0+CAcadC1L2Ft8tN^>{5&Y>P)<3a=UYvyPBC zaDJs;{DOTc;y!m8DraB-VWs-!p@XGyBv*cU&*xL!;dH%Qq#G5=SIqS;`G?^34(oFT z&IN<2(r>v0k-Zq$tCP#G5D%uSN{{+00#x#~UT`b^&k*n5)va-W8d)N_<1J&|1(EZ*i% z^&)yBr`a;V$@=!O3dAp*<^R`dC@?$yX#A5j?lJ**SYJ_{+2R>+XBcIUFIHq}2qS{RMJHxXL$r?e403CV{*5JSL zEXqH%*J6vYjQ%?B*F6+vcm*>^E1$5>pYHctp~su%%!Ug!_T`IDCL|#`lck_MymYqJyV!vB{F61 zTD9iBdvsv{r+=VyVdfBWfjd3q#<VEaa`nL8hk1`qe5oz@hhWOW^ z2WjTUq)5<*`EP26WSc(KHg&zFS3bN~*Y*(Ket@s!Q(0Du*1lPv z1JE0V%`gq(FTRnQ&oLH9g(7T#5I|7mtKWlH<`}s6&6$CSj(!P^3ov77t%UIKPn`;g z$#i}CZnEUE%bLUM=`}E(efZ(|`cx8O>3<^ru9jT+5Rlh-?0&fdi5ZMJ)9(plV$!e_ z929i6GZyXh6C}m~Qttmxl;?IDDF$yYrS`buaYpiAe(h{c@_)XyEdKxawL4LrkbuB* zO3v1nDIA2%p3Um4W+_x+UdOYop?)zfa3{STK)PrA2ysYx)^mZ-#Do5o>G=j52xr9x z6VcJqmH?;?lJp!9FhTZMq>0l&+589C80qmAkg#Y61_tPOd9}yA;sInQ8B1|BGRo`d z=qPe{1#XRk98fK=Zhd@xff%IK>}tJvZE<>jewP_o$ga&GBm^$#zgw{V0TOeDZC*er zwj>6;xkA1fNcYdKZ;=B`%p~w7Kv0EX;8|-&0##L06Z=g+$lj`IJlp8hYoET$cLz^S z0`Zbs>A}FD;e_BHh(+MC=vfhaz_dOAo~T=@Oak86IP;9>M;lPLw9YOsxgic{+Kbn1Rj6TnWO!FdT$S08)n|mBqt|d2Z@Ca0F`1*wThLRXG7BcYZz-m`_ z{qNc`HRcRT47hOPzCSI6j)L>HcMS-uAU~7Q`114`%#Y&(U~#E1&(C!Ltd$J_IZ&il zfa(Mu_5h@=QNRv>AOIBI=Uc(uivY9HP*eL{Ov%tFq<}1iz=!g@+Jf5R=aHBlZQ7J7<~lr%!(d$oxlXz@51=aH|~L{r)`t z@*_o#0l0Ake0czac>(GLZVM2ka{@9Uz${54KLlDs21tKM0F@5ccoAgO_U_{;B)}sb zWW)FE0B|Jry_f>(+0dkw{o+@1*R)T8UJ<_t-mH`)0!+>F=mj>+`wA_Z?h;2pKm8tW zEQhgL`33Iifa7AT)eejWz(Hhtbvpcf1s_4J623d+^pbiR7OZMq+}OyQv1$99MtZtG z2b$D)Iwu|2n}7+ZXF7so2sjqd^!08P5m|;q*vl<}{xphRp8}q}KpQH*GoBqSw}@Qp zc?;5rk*wh4eglucxXlHkp*3Qmu?sxCk`K^?L6E>y6%Y#pKq0=ouYiz=w1aI0$Wr}V zd=%f31yE0b8zjk2=nHc2L;2^Z)b#XLK!9`&jvTCgMR8riN7(&^m}3>N-(1oR8lcY0 zqHWb)J*Q^)z<|3SU6Z%PbYm(!PB$RUkEy_Q?r*UeBcx5R=J&eT1MH8DLB9>BMFLp0 zT!Z1oz#w;1VFORt_%Gt%Avz>xh(rjFL8|BlECTQzBBZfgFEzkM%91+d6%g0PjCdI@ zTC9q=Ol)2Bx9w`xCCMcp987>nlem;G>jp@B789hmR5>sso);o}_bAur3<=6${gOnA zb)U|f<#4KS0PMAs1EEqWX=&&q5I&1O1mtDRwcq}!0O~e*AoZHdgb-AY zMum?ecDVhd8>P{7+6uopLNmT!#uQ5)1ei|2U16D_K}r2dI%Rg;FctKKNnM9Fsc!IO z62jti{?Bi%hbQgAqzQGzC9|atfma{~BbOKP4YCZi;8#QewkCmR{I||+RAiE53ERO4 zS@Mbt0tI2a8R=fqKj!e)<9p^~c7;+1obcn0~%N^`iE6|5*1!N0< zmQlq*Q%vZEyd`D$TC&soc&TegK~!ppO|JgVm}McCFZvz{c}$zP&r7;{D4(?Y&q5v5 zFIIDK>J{VF;)F<~IKU-|u+-k|Y+>Jz97w^F;+QyZHOap`XV)?UwSIpo5(SSh0ndPl zI^nYWh5fnf4y)(8^$dIh71jrXa&;O8YjI&`dTZAp*>9jz6(J#)ts!Qc`5XAc|a)-L#Y|#NAXvmLe z)bXk^ClDZ+;AOEIjWvHyR}y>(EQee^ddr65RmcS(0hcSs9@NQWTOoq}{p zNp}bqDUu@HC7>YEje;U2An~5-`RzNivw!W*?Ck7c&y2$Z_kG3rp7W{Gd?zO&DGA@d zp9M-OFTpO1*3r9|&vYbZWIo}{+mVIkB1*YZtl#jODJ`mIuV5rDhW4##7ayP~q!~<7i*fMDd53_JJ3=-}aH}06^DsfFk_NeMa z8rtx%cdhBk-1>}u%zUkkJb4ZZum*}IryE0t>R71N{b$|#>qE)6V}^{e6epr@D;K(p z+`7EHL_t9T7j=^N-K{$r8n=L&p~A+)PI6vsllpl>N8er!dt$UQ0-bwe7f}m(Liox} z5>Dn-uZU}D%j4{ip{CMQaFi61oXK_%r-%#!`FbA8X8x!fi_n9fyPxw9%EFC?^)nMz z=jeVk7QRGoQffmT9sF83R=v;({Er~;B;1S`>v;w!@I1S}6uV2?zw0;dt}|mk#pJ@A z$9z7+h5thh#S-Lro>;R5Vtt@=;^3pvC1zw>M_ILC_ox=) z+$FTD;gu61$6l`r3i5GP5520PS{Z8+3qvTS$gzq#?A<$P2tnhj?UH4 z@Ym*!1!wtt3@Nb?%hGQP+NJRimJYRyJha5_j3}O*a*%$tVe$ccLt0jsxTm}8_qPrd zg61Lx^pI))C-lzkepzR+S3N(!ynB!#h8KOlw**{*d=lp4y{B+&rKPYo8W=x<5mA{K+U-^f#dxZJ50N z2uenL2CXJDB}-zHiN=SmO{EWqo`UI{T);*Z?g8iywOf^{AhtfqVSsG&G4fBz0=m`~ZIz*>*_c`rULz{8M$Fj89q4M`UU&so9UodtiX)j#&|D$zd{e5xgAvgUNj|p+@GtU)YEbe5KxOO8 zFTSo0+~(IRbKX#lA6Cj(%%$R?o}W#OBz)BVU&<-jLcXw znbe3?O_Ig&-kD+eB7M4++CBG(mJA5Xe;MY%9oQ}2*P`2zLzrg~ph`H9b$A6hEMC)p zaZks^|8fCm>HTX(#Sh(e3W3h33oQ&@DMwssEC^ZqIUY<=v2su5n~xw>iPQ(LpHpF` z)^-SFCCo$`#arEfOJjQRy($sVzMsEJplEEEMha+?CTI|B)C+p(p<-I#eSTxadn}b1 z1h^+V%PA&~9MzYUfe(dHjv#QT6ek4yP>bix$S zp|KKZ6+HEIrF;jMt|JTsD7rXKrA%IvEwXlk=`aE&#(t17GVN?hZ!w?VN% z);VBG6sE86(f{Z^;bCa5ah=^~I&Zt3@J94qn@1pQxAD{q0kCE5)+XzF_q`=K$Mki@ zzL~{p`7Q1iSxvWHZ$;g-D}j^1+Y3n*J^ea!OTdu;<2?)BrG(YD?J)1b_w`z_esRMH z+9F}+Ik96|C(QAEP?sgM?%REja-xcW1|YY3{_o!7vMbwY_u=wnV~lN&$Q$K133j2e z*8#CH$Y`{)1Tb!U!6ks!>~%?Ou_@ULz30p8>t4I7Tawgg)RdHt)a*QK!&wIqaFHz? zbOvk?qPc7n=mFY^z^9T*zG z9JF@eH+c6M3N-W-l$6;pbG7_xj{7tn-1QU@i)ImX-QP?94+DhQEg!fxE-t@0@4a3d zE0BShGKw}?9u13nlk?Vh3udIew{IwK>~=cVyexg$+ta6F8hgioXYCU02A>lIGr%;l zb#@^KpGn=$U858c+5nfNBnN#i16oYxF;c zhcNWDIPbRj{5EcIeh3Xco!?sW+eUquoKMM?{5a;}3l%HHK_1JW$Dbrchxng79GsB* zx?;&O|0(1Ovd`cFPWkfeGq3`0@W$RQ{yxbz@2i`aT-yFsP*`!UFhlfY?8C^#ksz)< z%pGGuT7crWff$+R1#W2vle6;hIQPVoApW@@64}{yRf5cc7o+HLc>IMgRL2Kpsw6k) z@{$uHe6>%+_m_1ycf5xb@T7=|iG?6==>H^#uCZ3RfB!y+DH2w>G=94<;nHf?q6dh3 z4uvL%l+5TqIo=XlH4kjQcy7-02Qx94fagZQ$Reev_x3$^i97rK;HqO}WGwyfemVf> zH~sE`{iSKP3Ie##eN0>rS@x|7W?MFuA!mfXO&OW0FilaK{L&yI`pSF|#PK(}jk;*?D&F#;`DwFv^%vwIzZC4lgQGoTABc)-}sYTkB z;J1Z~%iJ5%oX0aW*rx%sLr2}oCM>8v&u=@#G!(r&CeD!>an}AIekmTTHY*i$RFg0B z;{ApN>VQC*2B-~VkSK;4gyh=Y?mU%1{+e*A_Vd3xVT>*%8~^~0mT zXAT~Bwn2*IPEJ9=Q4UuvZMXvj!BkWa#!vqZ|4MbP(y527?*g>h{)EWNUen7?TT}f{ zS04!)ZFr)9z4;%FcB6(BVYcuQEShUr0_*!DKWfMC`cfA!&O7TCO`YzK zo_@UP+!pRwUs@{pdhhtphD-Xt5d*j&ZxiiHr^d#3IXMT#T=7<3cN;wL3{>`$+r%VG zop7p94yJeq|iE#N3?CQpi^~C=4Sz=0~2+}a8$o$PU&J$Iu(QRll`F$)@*w;q4f8;WiAJaBi@W*y z(p{C5w+o59fqT6_&VSpTJWjEzy5G-G#_{Su-)aL2ydZF(LXoqEfY0`?;<$O*eyeP& zOg!a0<!wb4qyp@{s^R;mf9FE zdk#)2gWmMN_o`7klaMwrIZDu{^BHAwlyk~<7v}zUswl+JLrbu_JdM#JJeV(8{#;Vq z^qrYuKz7+?Y4k`RA@6fuFDvz|HOkdd-r_BHogJSd@) z&Y2&q4$6&iiko>zx$T!06qo}lwe}YIJmS7PlD?pfN&(ac+9|5Oe0t$|t+kEylLSF+ zDV&R|tX9_MfA(ZtZKJ<8Ta0(2YvzCL+I!yN{_@Kgs~BUg_nTYj{4p;@VCW{Y81DS}v(@ zZ=jVm2<>W1Q(l5hq=HiHsw`|bZ|oz)i`K*V3~hzl)qkvYcdAUSUEMcC-U8?{Sk=D* z?`#^QVcsNa*^zic!+#p4*fRYe}ul~TDmI7TgX-f z7m=z1NDW|&CdS8K0)I*FkX}D__UN==US9*1e=<0)GSkvBGd*F@0P8s@1usHx&|+dA z43nK9RYY{~U5Z|GV&cMPHwaek>XKL2*K4M2N%sE!V@+CeSz}Z~gQ#w>g@wgvZsKAnzdLeazITJf0R9K1Q=k9;Xr-}VOg!j^$Wl;O zLX0je%NkB3ld>5pI^CdYu6#0X8{`RhoH<7pM$;wR7Q}Tu(Y|!CN4S%qgEF5 zypDVTH~*ZjLPVcVA`kri{Q-vs90^f2rnx|^KulpjUX|C{k2w>2?f;Kkt{Q}}r6tA1 zy@@nbR8$(xFhf9kM^at1oT6g)C2jeh6+$e_wVr_Ep!-TZ7(!he3mNGN_{OWps;T2qXZr8rYz(t(V1P-Q4{B`*|Cf zJk2AZlwN5Idd_Y?_;n`Dp0CylC(-SJ-(lc_n~2XT&+Z3BRUBKj>Jg4tiWv9??3K9L zwI6_*#DnylZj0>)2_d2U;Wq%S;bi%SpQI)v4t^94R(ct)A5+OfHC&Pe5;0~evUgd` z;bpOF-C+im2g64z7dhN{iwt^OXyTJ)h1}uy<-X9Y031SLiOb=-QV4KcFi?|&PM}nJ1Q6s)i0R1JME3&Nl$tR$SHf?uUp=3?p60l;$;IM72Wn8&(nyD1O-BIO z4OIdMp?Vn5JYNJo%~gs4%oYwNO{YFfa8ZJg-Sy#TRAzhvmi97@eokdyNIKm@o44zS z*`g4~@+UmhA`TO!Afs!Rwyye*y4Zpbt(9Haq!>d8F7^emn@3Fz@RR~xIvRF`MuiR0 zc@(tjXv+C~mZ9rHR40DUC5$(H9AGVIZ)i%Yyp( zc&?G({RHA3=&8be^k!fx6Er2q$Ct&7{+scLP>Er`B&E8VkNG%Rg;ox09IXj`?K68! zd%NtV-U%QRWv_uuK&m(-+nhjb0Osw7t1_}GpEn?%4DD4(Csg+Im%HAQXL-El(n9eX zrOYu%zMML30imRxFFe!;EKU!vz^dayt9Y^%C|m$Oi5xb1XL2OY#st`gs55n}s+fim zpa%aySF5woIPoe1z!;TjHKMQ*gw9Jo$w^Av7mzi=)Lc()2lMCWV4jRXqT;|07&z(t z6A!v`G>0RE8x;o;OO0q$U#S6lZ?|K8%Cl8vVZhceCp36_y1QXS#8=Tqk4(P<(1!M% zKj;!ZyKmwZi=!X8y7Esj7 zNy!)Rd;xI6)%87*ydMD0bxX;8wR=uvYsBusz}S4MMZ($lwf8d9R(`Dyls{F)e^|tV zo*Zos$p=Z)#KgSM?XM0ewL>8H44$rFD8GtMy~0}2sentg0s{w_RvQfPaGJ{DuCFVv zaF#v>l20#X@S*Tig@bu1J84Hn9Wk#T2H8Lm{;nXkP0>eXNhU&%+`uPqcFa8~NdfsD zaPFD&vT*N4G>J?UkH{bpCejw)fe6bZ0ga9PCJl?ALYo>SeX#SvOLe(1_#!SBMqsT1 z>Aaak_^s&ztT@z9Hg@7E1i`yt-4-(&e(NrrpRpPqGgknUIs@HtN}WPMLc-F6Oc*&` z)_PFC91ghUWt-s*u9yPlZnO%W?@}m8i9Mjig)63=1HV#Ao@@vMTxkSgame}q`2sT7 zPvf>22ljmt*Dg%@Z=h*N8%|}zlPkSb5TBUHdX^TITZumfg?zzjWtOeR;>S1OsI+m^ z@4aMJ01p_n9v=H^YJOeG#+eqs0MkgZi{I~M5g)!bYgnq94Eb6846$)14C$4U&v6P1 z(Z9m`&JM)@u+RYz&Z7|c0f-6YDYGpgt9-bXp_E%_Vd~kJY%DBUHNrvcI)zVv`Xa{@ z738*`0qnN?7D}|Z@7@xqt4TgO%{L350-E9Xr-uyW>AM6>%B>(HSi`>}FmGE1X|uFj zkj+g1RbT5Ag}E&SqQ+F<>l5k__5e_W05OzM(*_mU)n?A%;ANUHjo?(hhlPc;p`rpP z-!vR%8D{_^a#z${BHGu4)*ujCwu3S?y582Ck(g`|NKH#io0++U)Y z^%PwXi0*d3dbGj*2vhkuWK%;kfO>Ml+>BVuux_Ra#z>q#;D)m>*l14Nic&cJO@3t0o06T9os>yVMC5U@ zw+ue9sK`iZpw&W-cJYyK`ECQiH#o?XCcuSK3x}9;y8B~QEiJQJ8?2Ue`+UER=EX4N z^UXPeaI{+!p!hcEc;a~59@*I1R`!%JUz7g%>)qzCGhU$1C#U=CpfGTxwl_}SP5dp% z!N}d?EGPZZ`I4s3J7+%MQSh?to76u!dI@C<|7E=&9;rOPB-T%6F95CwAz{Dv7V;Ei z#Xw#FG*U2n2;ko7_*U`$D2hmwT5T?H_|HE!R;&RL0UwE@)y^;P>!S#tD~Sb54>RR9 zrp;Pgg|8Y{iZc2iJoil2c5!)pu^;Ml57Y5JM}=ardEBbxvDE9Ao?~PFznliCWFBg1 zd7bZXLDT;a<}j-NWJAN9f_kxuq+rmyx^PPg8T~+{b~mcv(o=0Jv&^U^*sJF6TJ)6X zYG41EX4BzX2AQ36q7-HF?0#1r6PeOQv#6X_)7X12{&E7ls6=M`)j;amql*Lb76&?rWT7vm1KmP#eL|0C$m#63)rHgqob$i``rJOhlu18 z+EFN7_5eWCL=ywy`nAdKm^+$&m(tAhcUGF*B=68SI?=vLO4E~zzRpoowHD$WX&2d! z{JRNso*t=hus+=TN5sAD-M2cK)8kxs1Kls-cfP1fwb6WomW;@`X1S&P>~nD$7;$@I zPfBW!Glc@=o258M{_qaWyF7LG6rR8Q*`_!l?jFuq`QO``6%UY;fPes~yn92x2i7yb z43zt1e}%6qL-#YB)=&BY<;PV6_xXlSqNK$I%`)4HCxyoefD&IX6Eu_&#pSrv07D?vpx)?!n$*0Crr^caBx^>H zCB~)KljJTix2MIq?T#!zez+BQko@W3mO03mM@?bgWJv`zs#%kJkG>3DUYgZnAXm+k zcUPxj-`p|I(E>m6nB866H~YMlE8V9;^8K%6&2Rq=UgK_FH}|aaUw?*uE|_0_vm$!( zD|oBNZh&fqh9DILYZqf=rf467C6jdOE9m5N*t-9HiE=mj`OEogyJ=u--DCJ^4sVga zF>lXH@k^ge)y9#H<-UHTTr7gA9#p9bF@H24Men1Z`3+>?o#PoQcBbUoY20l9n1GE* z;&XcL#(?PliN7%bV83qW=u@nw?rw{;yx|NGKl@!VyEr}T^Mggh@)N)#`V%`CU4c60 z4b>0iQK{*kC;LtIygVWWI zDh=VL9Say9j84BCUVTYPcjnC-6MayaVX*ESoa4w#yWzt!O0e%AV9aDijq+GCjGJe` zu&A)0g?qMQF5^mHPtRd!dOG=k#Owfzfxrj6;&z~it!g-GVl9GT0=GMlFP@3on{hmt zsS1>n=@eu7Nvgx1pNudKHb21Jusk>{W{&Nl@)w5)Y2N z$W5)Bd3jZ)vN!S*C7QFH-kA6P@swg^ja0bkWP%E=*(<1LQmhyQ2W)}3N3WRo^TZiTf&=G2Ww@=n!zvW$$Tkg{=TlN_QfJbZcp1KR4bFZrtagcRK%g<{uX}$OcA)&zkgay4d{0W5=2tG&H2ZQ#d&i3Fh?I!{Mo;Gwk zm!BUjmDVpL+3h`3-r0UB9GCr_CZzGSpx)0`oAXBKZxFfPc+O@Vcw zD{nZW_x1H44Inh4R`Lmx$TRrvzan-M06}ZDZ~#I?H-Bv{tI_J@&sLJ)Lz`Nb zae`Wqrp|(b^miUvAkCsCI_@8hTI2IpOtXiR$~7VJe=sFFj$KQ3CjCk1XJF|;I&4(} zn}6OW(#C0arkdN+5fe|r;|DZ6Gn-`F1TRF<&jfURR~k&msa7nPG!wns0LcS?d#}W$ z3nQh7jKgs?|v7B`UUOrbd|XbKwQes>9z+oY0ozGtWunu+obxL zW_Hsd%A{W7x*^Zn3H>%C6hZ%!nUXRANDWwg)hUpABiO{EcXN4p8JK@*@Mm9s)XI}k ztN{JX{=+-Q*lUwxeLqfi21nYgeptRuPb*!E)=0J=GoP#TF%Jw31Zy;i*It?rfyCFn z1&lK{z56manL$ak4*6B!dj?sd=*1;X4~aqQEp_Osq0_!!Yct^V?Q)Zf^uKGrLHa+Q zo^!IjHA$qaCSLy(^MBZU{_n4``hU9i>i_MZcTgrIA}T2cuCoMgw_e?^Hqg#PpWkl=3QWjl zwOm`^0+rwcpqXLnQbiU+dBWTz>AjQ5q=L(__qV&J2S6PM5ORPijjz`EHaO8PU{*tv zbBMd@r=2)pMlXmt^uiATOo{CH#=j>DU>V@BX#x#-@87?Nq)5=qHaLFy0a$9a$-CZ| zkYR-0V`4H^1?j45Nz4T3)bbWmdLyBWfk=C{krCA!z}Kc(euTb`>@lDN_i(ceU0ht; zL5&O_)oZ{2w9h&aBF07cA{YcDATz(Mmz|r7>@=Wkavq0(H8L~bQ1nYr814WYaR3m2)nDhvc$PN0N{(d zKeV_&lG^nj=GK4)cv>?wSD*=+clZ-J!mDEXVy;W=&?F-wPQ;X{bp4Wl7k3K0)5 zwopQ1!0`ZELFvnvRt<1Xz$^(E~wSMNwdpbX z>wClVKoLtQm~yA4^?@+WyjAe4tOlgrZ6GqB%e-yC+H$%DF6862_uaO2n&O-yEC`uzr|G{8|JckY-DfF0{ zC`fmZ9fe+hi{ypR&Wvt;f&H~7eCChI0YuJWCIneQ8%U5Pe0~k9)-Z^J*2h+YTovw$ zz@sj}^!UY&5xrt#5;a%kt?e$@|3Cg;>H?du#b-Tx!%uShyccqYXnGMsO@YByPm`fQZOiqKk$fK(GFO)sm!Q zcG^-<1ka@#lO50dN_a*DeOyDN@S71%{S1zO{(})zz||={(5=gu#SD_?e}LUBe^ULu z_=%3ceZHULoFIFR{YgVzM~2ajKUM~+Y4oS8Vm|Ma(1jt}Y#2Rb zN-E|PuP=48a6?Jc)tm6uTuZ75^HfwsFHw+p-D1Z_m1RXk(ykM84##A!?mQZ&=V60K zRU3~&0R5Eh0!;18eV?ZRi$vb_DOuK>>zAm#9nQ?4s!rroW%Uk#?K!2)&8l>zoJ8K_ z6DYFZA>xkRp)deyt2|!3H5>39g?KnoLLZdEbqpsA;Dk1xq-4cO(qK+#g5*)9u=bzu zW-$Xa*CoWT=OkIGWfv;MxZJpeXIN>fHpX%RVT_X~YJx#;ZxUj1tH+$E1z*n(_$6MN zjc&(gmZ2H?%|^5fpPcpa)A{(dx{z#0gT>NJ_#vn_kx6hDCeC+t(RqI+Le#L?rB>$~ z-B!UdfJyP~fvPmAGRCXiPqkdeoPZZG64Hpd7N#)_+St}IbnT?1qId^zv87X#SQG=E z*FK{*xdPc53G%VUzL+*bL!S&|wL5kht&xH^nnC?xS4{GtgRF>QA)y;cq0>0MU;wDr zmWKFH^2x3kwZ$On5ojWnmvN($h+F>u)` zghD9F5BXuhJ`!Rzgy>+bE+w4X&w-m^UWd0Ef zm4Kw4JoF9b$&9!q^~;=gY^4khbY<>&yGPLbDX6m)RN(%@{{e+qKoeDez$d~`>;X*w z6ZiExt%$fl?JgB5dr@g9JZUi0Y0;~uqNGH?Pn110x-%P$N|gsOk3zIPO7jV(<@_=6 z-()Rhag7^>y+TBLMz)2tWezqnm^2dgGlHt;6d|ivA9H{^S{t@>|1h zM+|h-r7BRyq-d(uar5O#JD}!)IFrEqITO4Mjm8t`7l_dzfzX7Zx%))i%7YvpK z*95{@Vbb7y*Wv;oW!T#y8;fF4dYq zZ-KX=`yDK>Y&S6f!N4umSC`7MyPqK~$$5rNj{7l1sEu|A-_z`0o9&Mb&3Nedz4axr zn$*+SlZ)=u#rUz@$%=;>An%ojTkSv52Hz>WS=%}VU>1>Z%MeSUIEJdJ)1YVY32D^W`acoP%8M6hhL zHT&+iDZadhuS8i!BAzy2+o!O(-3xCk6SnLqW90^Z_3Klej&NPT60;99T(W{*rKWJP z*&`3J+Sl|6uyM433j)AY^9E;{Wes>KW19EK8uMYXB#^$k(jrfdiunRO)ZH85Oov3E zFm4&zq-vMT^HU%|Oxgm)<*=H=Tv9g6rWDrJociRzmB`-p3fd?t;}BVoZ~_DO!!2E0 ztlK>;%b)g|Ov9{MMyUktaQu~xu%bs?Rp?6sxY-pBAi+++lr2xt-odgxn?hBZJ+)oJ_&B_s2~Ccp>uDMJAn{Tb_hJSZp&b@tE0 z>oyu;8$kP+<;mMyufd(`4bRGesAXSoehm6`6-8q-&D&vv3_+=2$t?CIbvZ{h`z|)< zSp8?y#nV$LKf@E&m$_2-`kl`M-`e!#yGS=728(PFIRhnUgq=>NYv_IGO=0bY>MAf{ zZdJ^#_0fzq*hN(Kr?;n3J7uF?fl(u{S53rvSE%Os>@mQs>I&VOVzv@p_t06+ds;pt zDo$VlVebXnw3F#hc#4qvOn6;a4G4G0$~B{vw-jWyx%1?l#Ut#~gn~)Quza6XvZRj4 zLFw4b2a+F_3|)JtBRFrNa~QjC8W#=%)dJZlUDqNUXgG8AnfL1A!@S*Ez_(!$>EZ>3 zOx85wzLAKuj+DbDn6txoaO7Y~L*$2w1oWUn_m|hV2va)?UcOuinB_7-_4p35#5Z80;OQ69K)7Q)l*G<5f=jeOAbcOF_Bo-oM8$EetCI=iM%@ zI#aB*zIC{g zrbJ2n@ORLW!-JuO7tggWgOl@2EtM4kW!QzHcCcn10(Bo5POL-RqhI}aY!=VA3Oh9K z4&wpwzN{Az+)!MFYJc5H(wjC)d~qcfo{t>+&^vw8?}SwvDtBH($YVovNKsm3czFLb ziQml?-Ic%9)zy#97g{`E1nn-NFcbMt+8G+Mj5wzeA?0Nr-hapdi{QYl?zYjpO>+s) zFMW$Y{pso;c@ucJ-aiiLZ&-fmO_Z1mzdBa!eePt6t?K~Ai8p)L;YjOa*cbQma=Y`) zLSSr)=gp_icRgziAskj*Ih!Z#$IxFMQ5RBaxr;ja7Okx>1$V zV#l`n2IDd^r0a3nv1iZ+1g-QXZ`r-xt+e<*gpYHP9z<6bvpfIc&CqL^zx?s0YS2ZZ z(ztE|Qo?>f%sG&sYdiHji=U9SmcOT7O+scIge84~_!I~f>s<%Y@{3$(ZF6&{%>uXw zPO+WA7=y^^rGW#dXsg?UU>Kl3_;9(>K~cliW*a6h(p`> zRGc$dEHc2b6b((&1gt^(dG&WF8TE(Vk4A!H9tRhc7;J`nN0B5-rt^DTd`-ke?W^7He9 zpP8)8xY5-TW>J23aM4u#dt5?(H<;$QASpfl7_=ICP1LYTCG>O`Op!mUKDGHDIl5;e zy(@zWRIg25ap)|Huhl_89fS56vZS_}KlyDALio_gXe2skv`ua7_!5lXsa^XP2Y-eI z#|+-yCm_i%Cn`456r%aw;#0MHc4Z5i9L;o)MM9ecZC~h1O0W(O6ce-STvN$XqWJ#k z>*>dggl9kH<^&z5*a^2fB!9OuWi@_=NJ)(|KpEk|V75z9NQF4Pl^Y1v;q8rnR`46?&i3{>I~LIoRdbj zT2b&#`luA9p=ao1gtZzk+k+p$<_G2(A};ebQ-Oe^A3e&U-C!q_1lw%nIlvM99EHJa zxx!r$niS#){|^9Ak`1IE3_h{>m!(G3Afl-%5;)sA{naHWSal)G6!?p^kwHTpkuJCZ;<0~ z_-L6y2P-Q@Sqo6A*ngwH&dZ$LlkTB1nItEhWq?o%{60DDCbTMo=kTEhI20+b5IGA} z@rHgmju`9eB9XY#T@6Zz98ki(GIPn8*iUKj703~aU*vVc2xP}B8R*XJHL7PeI zuS$a&6-!Te`GbR}?idssCHzypm$G3ZH?5aJc?d}caqK$kwa=EF;0UxeO|#@&Hvq2t z;SE$LY<0-vJzI4Kpn|DxxH3#=5WenXlefAh*Ev;3;je%5v%p`YxPWbH7EeaqN$w)r z1A&W+i*>Tr7%S-dxmp;-mDH3KpO7awYe>h1I|@#{1rC`g&(nY7*RN&WpQC-dLbcA} zA*WLDd-Q0H+~;}cjT~zrY-`Zk0Qx)n=C7HWXTBJ8eH`cWVAG#1(;#~fJJoKCMei-O zVBNwJhT;){=XLSb_n4_$%_jS3=(%EcRZ;fMC?b{T$?b5Q9_@V77r2Yh9VT)%S^wC` z?};$jlM52**scJGNwLBt9}JhyI>HVqDN!^5V061s?iqD~r1xuH$8OTlq&T6^R4?g! z^T27UY*DgwW__(+Bs&eXT(I4#!Vxrdo;V8Nh*wcXRhAVaaB>>@@H7`X^Wtde%k5ji z3nb&d7X9eDE(dq9$JSRbx;3kts6HYRo{>QVL%g3f?Ev1?F@KF3sc_rrE_BmhT6|nQ z>cVbjYgd1J%a_BYg^%^pPh;+ z{7;}{yGB3z^||Cmu`nzmHDQYy1-l&TMenx* zT}gDWln3w)z+;`~t&zqqXUP?hSv0cd;fIV$=If$M_)5*;{E}Wjm{lY5nt3=!Jg&{O^*8k{{hBt5R+-2Mc$2GLbmV>7!k7&MQb#jbR|YHuKcCyBOQt@ zaiNW#@z?%ib`*CkT5a_Fn*BA@9}&3}W2`s~PL^opPL|B7V|bONnp*AfGzc6JWFVvtf)>hbiY3zNy`z5;G6!b<| z2Du5a1^tQV(}fg;Mf?qjpcY|&^xDb1KjS7t*CiS)Kn&Yg0F-ZGd3Wu&$1bR&>Il5H z)rs%Pbnx^(}sZ$m@dm8_iI`cVZiJQQ4_iqO?3-wB}K5j1`P2s|#gf zXBnzt57SRLQ;XduxMgSW3V@mQ7zlA-uOA}7tM#Jq&e+@=E;)$33hmhdUA%M9@Ca!a zvi%8O9gZj<&QaA~LD)L)xt;#}40F_^SwP@PY)JtbF885@lFEsv$9YZ}akSSO0i$E6 zkUDGP^F1&uaDoz$$rS&Sa-qVEWpET@e%`0XX*kds(pQw>q}MD|ej3Kv-=YAr%)~YN zVZ^fU7H|9(o}Nl8*N2ZX{1q(#YYLzFbUgdG6j<~~{1n*@n)Tc~1{>zEW#YR_8AZS& z_LJPz$if+Kj(-Cfi)k32D;BC63rKZ5NMgWZH>i;_;dl0oIQbOLPJ9fBIC9mz2}`Ga z*bbpGr}iva5WS7Wu(J% zWdJbiC$Y9)VJ5<`qMwS#ASWY?yC7hWX(}T`HJ{SDDOu?z&1Wx4uPZP+@S#1>FUNxH z=*8yyrx#c&cOy!eiAKo3o%KI67V|%3M@xI(j@m^$eT)B_(dP!bOW!!C-gQ|zgwQ79 zVPjikGoB(B-m+so|Fy6*tN7*Q5euH;@WpO-KoeS>jM3kag(CNo6Y{GojgGO{e<1Su z3lPCP@UBZs7GdP_u-*xOB?U%Wpx;*S0q_cgF8yl+4&M+mPh$xdmtKj-ePG~Q z!{7Gap1`1JFHomfim2c^f~Gf*^r87prFTk{p_lj;Mfdt6*Dx_@XAeMJxUvN#1(F^q z06k51TAHFgzJp0}R6-}52GP%1(o?7vmCXK~QzfBK8B9PXv0c2FXKU+usknRGOrb*e zTzuS~53poTyjz@7mYeyzkm+9I7w`hMft}Gy`%*AN9V|m7LyVaH_=HGyk4p^Qve};`O26Sqy=7;$V)eK205Y}Tu zS&#iU{;qVx&R)Rc<%0Cg*yi$Jsyu2XUHZ8~?fLXKAM$CjkTRJ?^t4bAu`j=qh6QmG zjiX3XrIfFb;2A@T><`yJNE8Yo%olRGG^f#7C#LOD!1Sa1H3F$C`aOYx4lhO*pdm7H zf%ffWowEXdf%%YNZ=XFum7tCGVe8MzmbJ9o!<|4qLcXS4xFY|#aAM9iTwXeSeEQ$9 z0!8ich#=fAE;>zF>nYFr&rVfn0*w$<8r(BQM&wbqLLU+CE8Oayy#H*Fg2s&YQ88Rf z_U1ZVG^bkcT@#)rsN0C5(72kmSUwM~p5pL{M*U2nFZL1cma&gzt769paS6EbeJE=fy-odc ziIBBtF76r?Ch4^od}cAk5b{ozZQV9wQPko@S$g0UITJ9D8bX|nJ4vcw_cd3T!s3a| zOyDGGY+{75Nj&c3H0}rK1W2<2@<6X3twLzT_)FcRzY{xLNJ$jUvRlfS7A3AA zJ;wVqdI=+8qdWCi7)TV_ZEQFO^H2h~iWguofhT>wUk?)ej00A>0@Pa_sn2;unai&B zr`2P$VDKxIcs&=2pHFD>CXsXS$y$}?q4H^l#(&)ZoTGs{A~xvZu5C-BbZG&cL6>;U zjcFyNe$o3-DOG$|`eV68{he)xkl>Gq*R^;~C=pM2hCA-M3zvbQc0%G+sLx*F69|yV z2>H+&>YcM1a1Hq#Jx{1nwg(b6AK<+DS8&2N91&zhSe)`r8o>u*`&^~xM~oPZTz~xx zJeEQ;Hv8{0tRL_HzB2v4e60Wd@&3R5FE|sBZBme6!VGY2JvqhBKt41;S^nE)8K5w+T=PdgX2E>s<|+km z8lo3kTeDd`acP1N2}nxa`{DCXFpD_C_XOQtuNx^dZe%*cfv`G7M1j%qJQq0xsE0OG{vTr-Vd%7*g@&<%Pr*Kg6i)dIvyL z*!J(2P!j!HS*;TQFr6{`S_AP_5R800HYGVJR&E#;`Yo}`@4Tu5by!!4lp(G z7}qjyBO%?-#yBr;ioCsnOPvY()FiE^B_HZu4*5ofheOcXxS0F%MabRf;CKZ?biXoO zNEQ!hLL0ZitN}^QXd$x|x=aFpXrg&K@GWftp&wwNAtF++SM>-{R#H+sgF|o&MJq`t zJTkI44*+jiA14;IWefMe;#O4WGAz6>faC%An0nk&az3wa=&EUI-f>^U{1O=v5o4jl zrss2Z=rD1Dk!t{VUDbo6Gw|1(cx5p+2uLK_*AbA(30Pl+Bu`&ovFwp?1m4Ql$$bB& zbp*1G^9YxtZ5iuvLmk?Iwuo_W7M-;?Ot;=>3@ zR<10@`9ce@{xUKtgCL8UPyRYyoD|1oqnmZ4GG0^eUW8js5r4wKxLD8i=tyu}04DWV zmy)tfaH@T3TrJz86xR8j+m;@ZcIn}?=rRCvfU7p%0Q&YpB!KpHrzg%ate~`RYs?KD zA48T}Q2fX!(j6w@DcS_^hK*r;Aniki3_$dHni2!?7T$%NcB!n@%t8IYwK@E-jQ7O( zXDwl90e8W+A4kR8x00SP{NL07xvk?CGijk94ks+8)b!{IHST9tCJu1#-U7=Y~jiTinN+J21j5qh+Ll6}3BCM0#Rg?EL-Oy@4wKn`J$`*H3YE!cbU(GmuI2M zj%5pDKd!TjPT6*a&hgPSdlCDU6l~Mm=I2)i=VFCL+2r1fSYVFIT0PRRM+>?8RGm7!5mv>1LX*Ga7 zK->(570C7ukT#Knk|o;WJnV}D){_X;nW z&X6wI0$TMK#5t>CCLf$)9#~FmFGFYhnF#gn6dCU^=#YvNPsEs0UzQa-T^Lsf77t9P zHt=%$R)8}kI`T6LHIKc68${i_Pqb!vT?t_Q*&mn}mp(sT*2fZA=DI*^ljLN=)#e>W z6Zd)}_Ke;bjy&qZqUrh>lLir#cXOo^R{k|o3%VZzIz;q0R@EA4Q4<~VxR|19P9^}i z=8)WQNMln@&<_SSJrny(5EkB^b%oakF)$Bi@X|$g`cFNpuPHwGDiKx5&vgtH>)i*TV0M#smEV4W|6VAG-cECx^M)qSiSYa3-n1)KxW zo!BdS#-LbL}1t zD52K$=GHoc)~E-vR>vPi_O8$QC^IOX{tjI;ZlrTX|MjfAD`&}A70Nh~3(KjPSa&44 zvlReY%zIO?Wyd?;v;E%OkGUjx0atkwEnsg(shdP&CWzEf$}Nb!I`bC6UO=e&8Nvru zt4Z4B3iTi!vM(>WtC!-2Vwf{xQfs_6Ax5bffliBlgG~;HCv(W{YpHG<++!LQO_NA) zy3^q^2)z0Mh!-3A3aFY|Ql8n%<*JVJ(9kd6{2qZU1gTkSWU&X`mFla~Z&JwCX68p> z$?B}>MFGs@*ui%Nl5b0}Dx}sd^&yhEVWsS)r_24usqjfY0rl#uH*xX}gsZBT8oVFF z>(%Z6KHfc&atd)r6FlkmriX?Cq1fN*lMuZBUE!+$Beu~!M`airfFElQ0wc9^%gzrTd; zx`=MHHZi!C*8#Fx#Ccv`|HIVL8!d!I%6(hTEa<6`nV(Yp^JAu(lmV_BK`lQ+N-Sqx zZ{3t85aof8t6u??$iO(A(RJ0esFWk7hO6PQ%|!MjQ~xw zXjbO0*;h7k?Zh5`-RNpQtZ(>3M(6!Eb}g~{bm$aEGmp!B3jh!$yp?1ZH@HCB$5yVn z=0`vqm3hzoscY=_lyPRjaVs#*V%Vc*2&!TgO11nQh`lDNEft&tuUn6*hNM21Dht3ZenFQTiy9l=kOcaB{iD*-W5Y;$KE< zo@dM?w5KJCJJ#ICB#7p;c_ctOi2qadj*3yTrfF-*)=}ZL<-$^aRN4ceh-Z={SW<%- zMZ!zBZdu-(i0)hCO;L#Akj>^MxXcK|&EgeOi(RfAU|6t{vix6-on=(iYrDn)K}v}s z1nCB)K|ys1^m$DIUY+@;lF9a&G-AIJ^u*^J08ZiIa$|YHTU55#BzU~stC3U zz5CHO#7JEbZi(7PD!A>b@VEh5@9Gtr`{vpN{48>Py^-8gMpU6h?Q>O{6ziebm93Pa zo1_YPGS|Z5^v8rld$fH<8e zr1HlxkpFp{tfu;Hx{H@yQ9-q%dRpvPo;+GN7dw6L2`<|H_zN(4$J&GqA(FT zZlQnxCVQnIu`&p_ZIs*x?(%qzzfbb3@T8h9lT^?AkF( ziy%_PNkCKzF3k*Y(BEush=%kbK6GQa&)0=X;`NBjX=VBz>SHl75}?U~sUcYHLV+x) zZruloR#Xa$2HmO`6oucBL3>nRhWt*;^e{}irCyjm$9Ua{omP0(&$RE%u<%$D z6(uD^fE}+|%z9-YcZ|}<+~G+z=JB!|hFbPGtjO5O(ZToSd6!qp6X+V_u^L7t@Q7N} zGfC1`7_3%1*OR?akfru8ZF-|7VOdUbv^ z;Wp?Cdbi$@bO@(kO-jN`e1Mk{{iOmymG|zthe3RdrZTmC;umk~Y!TP%dB5!!nytH8 zKIBp7Bb8k%lmjR+s*kOt;1`CXZVAdo5q2ZS?)Xh1PewD`(okWEGjQ2wqnas|xONH5?HhbMC~`SV zWgf|y#ty($*=1Au*_Rj7fA~sx?XlVzFj0~^8AH=K`GkJ+t}*ev#Z6{4f082@Fi65k z^4e(%mH4rnGqJYo_K9v~nyojn2`b#m*rSZ?htOBO^` z8h?g6%|2&4OoOAVB)0`Tft$)iL^rAm4MGyEqxzMl%y9j~ogk4b47m&5RB!@{k5Qi_ zY;!Lir6jOg`Uy2P*^o-B*TQk!O|*Hi=W~Wj`&aYVsMHc#$w-m&BU)}ZnIo77En$om8-y*P zR@4?6-fAfY4KqiBXhmrYY$uXnE2YA%iv761=+=;+%}i_{EKAZYX7)7%;10}zMt3|m z^rk*gkx?brrEr8|rIIraF=kcLBBfH91JPm{ZopI5hI zQ2TvE3SF)Muh|G5Sw9$W)r_L=p>ph!1vSCB0;i`ycTuKyMBIQdGWep!H^GVAB}hPD zWGrC>KC-GldK@P|OSwqutUM7jGs{%GQmgcvcUOZs73oqfvp+uV#&n&~Moo48}!tB%0?A2z6 z6m@$0@4T(7Bl#j}3W{t~Z2@mAU<(NB-VPZ1LqkK+{Vwk?qdLwJl@^v*Zr&}ZqH?{~ z@gU65D3yUJeR73hecdTWw516ya5iaJP{$@Nii5v#PdTbjPwpn0nt-EDskvW=8KIq& zp2!?I%?)fCJAU3zEtXy;zt-Y%Pd&@${}_KrqbN%F3n9pEEIWJkn_XDzpY8g)o)yZt zv;>cLA!k2HAd!v$IoVv4xYU%omnU>VsD6SPM(!I&p>N$4Z(;H29+*EUxdZ z(fCtK74dUTi{M&&L`i8z5iM-z%k$a{cXLr@LX7?V9)Qkf92s8gRp_E55 zD`N6QhdGEfp*w@OqXJ&5MPgEZ6EpvC?O`s(yA=Z}P8Mwz5vD+2>j$mtwkQ&=+CwlNUicP-{N{W`yRCIyqB?)f9W|HH_f_X1Y8PBuCK`06w zic(k0MeJn-y{veW4^(;GFf3RUsbzD8Dsc%2lYV;RGV+|~E08(?50Ug z?BqvF9Tsq{$u0zMlk5@;_7?3QfXhA0khfwNh_KMI!-vI6L!fh5PY&3@YOXvYQ zFF|t!L+2cUey<6laLwl^?kD^lPC8vXO8Q!_{4xKXvR-rlp^q*U;OvxM8Br*J{I8VH zp*<3b4B98dQ7Cn(G?g_mnSl-+5Yq*nmp?0`Q$~|5JkOeZzykv=suqyk4}yb(&oZ*) zg?b-zZIv4v(wPV)r%{5`K|!Gd3kG=o=?o#7Am<5YL657Px{2>k9aYutN1oF5=lTn2_9)Bqnq5JC?)kT6Hhw0Bk*sg-X^ zr%QUNZNw4&S9#tXx(B!?>1Lczat0C8 z^LACWyUcvHPc*8iFKA8d{_YUv9~8hEBuqwSrMo$=6fXt@1V94B0~|BfZ?$C59xrZa z0)%iFBYn@#=Hk|$B7zRnInC(6G{YUgE@dU9Y6r25n*CR@LcJzxhOYd(WAY16G^SRX z3x?>)SZMoP>ZcPJUu=)lK#oFW08d=5qe|VlYMD;EqQ4pCf!2!Ixv?c3w*FYf(5*5f#67qYTB zh=#_a83K*Ew1>8{#mKVEzYkiD2}z3sr=wLL*_|GINY98tN;r>`#@}ocRjjSI)w+1G zgoUf#_@CgkW4Huq+(d~NQDoU@Zy)l|CcUen9P6UCy4_6K{TX7k=5TqZig${%@8Ysg z`FwZxKiD~KZS6+cQmEKgR7PTgPHP(5qMg$!ojp(YL|)I=~D0%Z$mm zOe$s2z|-?YqYp}8vd~RF_`_Y^;v>77qr3E6;MG#82Av;}a|+1a*-YlU+AS*YWf$5F5_Q)h;+^Qx5$K zOVOh0MfrDsbZmSP)k1$VFR&pn9f*Yk0a9pg`cGgw+}W#fJze?{mu@rhFjJIJg(K#3 zm*WS#8&1yqLfOV6S5{E-@f*K%uX{YhU~jQfuE1H@|NK#AcB99+p@Aq^rF(N}Da?TG zO9_qGWnP*+z)e*ZPV)%A&-HMUqFdb^M&7|GvjSwQmlnTP^`!H4s_b!$C98j_?)@0- zI4hKoIuieTRp0k@k5rTn%PXpjDK=>4H+#u+OJeSvsv={;Z?w60O_up? zb+TRADoZ~5dZR`9obCUJO!HFi*juz2{sr!U@Muu5J1zsWt~*5d_|y=@0oWR>gJYti z4u(#iGQ6SB;AuK3N$iJsGot8R>Rni!KkibLdd0Nv9ZslfL)Nl=2lf{#)@Yuz^TxrX zpWyNAE^B1W0*|D^)^+oLQq$*>u<(AUGSm0euJ_$rG?V z{#@;6f%vDw!;wW>8SmFjbBY@5hFEk=Cu)Rm{}^6A`r-9ubhk%tmZXt2y`?X5cKD71 z`AHj9Og5Q4u_(doiQ6Vh0i(d09_w-2oEY{pMjzX(lE-v)U{8E&T>l$3D-P9$$0ON> z8qti~FSp6LbOoCbueY8~3r}wyiA>X6tQxO33NH; zD&NC*DGer2nRwZ3_)pCb;s3wp=c|hU4-|UK>3Gv}Xm|Ju%x-G#=eB5ICw#qW-Gn72 bPcJY6zKdT+GBb=}z>l)Lx?HJ@Y0$p_z-}$b literal 23683 zcmdSBcT`i|x-T4iMFhk`Rp}t0(jkD-drjzw0unmX2~}T3nt*hH5G3@3BArkz6ln zHB^j1pi>t>pcCEaPXhna$?|>?`0IqXk-8G749B(vyg3bftos-Qs))a||LhF#{=y3l zb8irc(dYQjiD?JU01(LPrl!hcNWhcTDSXVNY3TaVykh-W;8u8v=;Y^;ZzGsrf7QOd zclqs`n=t|Tx?rD(ry1u}ZmCUnT+$8yAX?)!Zc%gViyJTF<}9wLH5h9a4fdRPn7jQB zA?^*Emu$JU8L~u`4IHr~Q;WScm-T%|3X$~D3ka%At75*ahbgq~2pAU#A8;82df6Et z6$`v6i2Q%`Iy@2p4kc&#YZaU`Ewh4`8dBu<7IWjDJT1wT@<6AArtVv0Z0XeduTL9D zsjm>JRrb3(3z;6yN!knIe})%fU5b3dt<*S0(W6|;7c7T$+h4syyA~*kncIn*!7=h9 zNsq-m18Gh4E{CX{=H1xXO-R4|`NF;BmuW*TuA8XqGrd@V_Qi%nR z6ksU=3Yw9zCfe&2hM}s`Q-$L(#Rb*T$Q7GEY*l(~(NBiAE}A{OWci6|T)pq;df#EH z(D*FY1>?}3X6(_Bg3N5uGVTc)-2)mZ{7!u!x#+m8&4HSDhq2?#2_YP zKrpZ@?5B6HEQ65fbyne{@Ry^D;eCO;O`lyB(fxr@v8k>#wp>#WV~faLmzs8c?@C$- zYsbd!&-;ywUPpgS44@Pnm`6=~yf|Bp%^3`=#kRDGJu!uL+NF!qE-*MWKMd5mj_1g3 zyzb2u&uCZNb_Aj<5*14)!=~BvCr-h;ut_%|L@h%uhYyXuntWSxvgqEPO=L>) zKmknX1~Q*wRK6us8S!ZnY{ExNw~9t)X|{|Q%Iy4LG{hJUWoQn0C^G$3ry0UJL+qru3Q{d)%Qnlvviz&n7ug+QKdxF4k>|AQF_nT4 zCTLu{32RDbeP|)r5`TZKrL6?zU22Gs)aT;6x5GwyQeLw&29YVxA3|<)--qFhguyc> z%Tdm2+6l2`=p5?6IMWAJi7EY>M+6f`1$f{C@AVHN#ea#CYTZZmdP?{nfuE^Nr4GPI zXKMF0lkWva!etZGHyh9uwlXGKgR80LgO=97O8C&vVo@qJIo%z)(S>myDVKO)(8ol? zHubZUqUo$TN|tuPLbn)|K`^k3VqCj_s7j+PSCfqoPJPb}vRza6IznkzoQ`KSHnfpwjF0GHZvc0AnYhg*&QAwB4UgO1#@|_Mv235ut(#0)_;Im{7txbj zsfCJIloZuXHi;Uvup9Cx6JQH8?R$^uavel&SVtdL6|GOBGzT|)w9wb(*3)CE+!uYJ zS#7q;(8nQy7$q22=}(k?*Gfi>$C~-%>$e87>yJ#VDdM&jTI4ldndMXjIHM~+dfWB3lvG*r0Be17V z3uO_?sIjI+Nfs0=->u%Zj<0CqSM1Um#K;mNkyRPirrG&%JrH)f2eJv+lsbwWa*)HO$@Bv z>4+}-EAV?&2G3av+qjsAM|f}g3+_r>P~KNC!UF!W$$ka#I)DWW^DScZNU+cp@ehmx z!-@DyU3-Hq4Cti;8~cwpRppCPc$Z2VVl#_mXRGJ6tF}v1)UhWo@U zWLW+}_L_$h@g?oG#TF&1cBI3UG6xQ3@MZ}El&>IbkeKYF>1BJJ{sy(0pCFD#&KbEc z-jW>2?jIPJ6BX>m47X8)uTF)d?TK3)tWGn^EivPcM|0Ka0&M8?rq!Zsy4(;x_y&gW zeM9%0L&H$0h>1RXOh$`^e3f18b?OLD-9@-Nv08Tv`ehbv+5Qo$=cw2UbsKK$JxW#D zEce7r%K{Vq*0^s{vr#{Ot-5R>2m&o@xQIO$6GYZ#?z=A{L6i$L7`Af~F5^rt)vDw> z1t!&0%hfqoY&SEd?w1(Ti`=6X>L*5fr0%94>6~BVK3p|RZrhIDbuGUOzO`3eR8YMm z*%s@*4&~4$CL^n86>K~z%`zBX0=gmR!7L)gWnGP^X+kVns~lJxTtQc_hhs=`YhCp! zTbX|N--|5#fiX%^v^E{VwLGIT9xS$2$yYY0s_9~1H`95~nr1U^>~8rsY?v}}z;B)6 zGmvzr92F?(oK8G#n>5wh;fqz(bie7OUuk5Gmc2{_>+(#GI*+4DE~XSM6!VIhYBnlk zI-+@Vq*!aI{b#I#YaWSW)oYx=d!;b%%KoIyjCfSsVgL-59qsX2ffOqt_ui zTrPO4W?zMHS-CDAmL4bO4kq5r8dem=`DX?5DhU&TRxyv7t}H6~nY=BS96PpaH2vnL zC$6PN6q;oZ)uqcSL|1zxEf+bEho6_3Jfzd_pd;&iBPREslt;A(ZyNVme<+6f`pdQ} z{S|0Dfm5K`LhpD)wh^~&`$%guSs%1y(-gx77y6?irHqX^6=-5RM?+ZbidRhHovfp5ts1gbTr!x*cN=Q@I2=CC7*gwD`~u@QZd>9kgEEI| z--lv&*IjG6a>k+>vSpZX=-A2+-rR!DsJA?W{Rj*(os5v{!kZbIW;9)t%Z%xk^H(0y zZ%N+il)5WwBQc>|Z_x$TKDFe0Z*a`YyqV;NH%&1ZUg{Mavej-m-n_k+Zsg0?`DJH~ z6T#0s5*F^e9I2*3%zY^+TZLuggZldzUa{{0%B9O2S+h^e zl+;Gre^=(W7B)|7GUa%%UKQlsu-vw^%`I14nUUOU>~5(m5lFQ?o>zC`N1R}eFSI#4 z*k2{7cww+52ea1Hrq&{l<@Ts{e^*J&GNH%ni8DbwY-_L}>m zi2LTxosCMx^+(<8R;Sh0Ym4yp+}$QIePchc?H|{~oY7!?=pa>avO8SHjqo}s#=IC? zSs|Q$Hd-biDL19t`$(ibaQFrCgP^~jwCoLu%}rE4>q^$g2s(|@F&@Zo>Oe62BCD2-m8DnV zxN)iVQecy_h?odMCGl4BZT%>1c;v?ll*Qx?{eiK`FxMsEp-i9&XE*47`%*rfMrYlrIzLk^_y$^9Ca$CS(>19?h% z68_R4GLK|pfUS8AL6FcVlwLR#C8WJspmJFFM4sL@+0SDEV-k%#JoRb+G#dF}7G_pv zBLYq#vz4DQ(zV=gx{-o$Xkj_%Y(M~WluMH6E8n4W-=6=*z?$YJ zqVDcGjQqy?*=C7J{^D4lVYtz*E8ZJlq)_lFrX84u25`Npf{P*ey zJE$~L=$3e7tlk(ROy*{yjQXAhL7{0h>>+OKku4X(^7Xse>LQ$f&+x4Zf&iB!3wQJM z5-wGTT3{HQ{0X-ixce3FXUkQB`q{3A+>SZ8fqTion)T2&H)o(n{l|5=V0b#nurDh1 zlh@hntWIBrq{yV(k^n{haQFZ5RaU)%AQzixK01Er_LkO4Mo3ZnZXJnofI$7jcCL9z zjk1X$2vg5@TKh0Pif2oGRdlSo-$8<}Xurcj`*|ru&45tf5gROlbd~i4s6T?kj*Fd2 z%ziuQR5~}A@ZMKV8~>bEVR+>wz)#BCmvFzoR~QcUHl^aU-8fM83xVmQi-cVDk#d`v z$;qaGjoEzdw6Z77fh)tMUUZ!+ldyG1W>vV?C%Xkn;O6`q2Numo*I{tYho!{Akby)_=*JScP}g+yt=Zqtb*_K zlUt?#kQbfp(?yy!;5x^2Mf9F*$zPuYSE2+MJeD0nLD8<<;3TUj^a_OGAcB5sI2@wuPZcCfd@mlRdywY5w%q6fWvwj?Dv zV9s%_mQim-!^HmMo4E^x`La0Qu8nAZ_B1vjY2mV4u%=3xm;F5S%VykY0b#u$mV`*! zd;qF6I(EE54|+#Mw@>UkzZRy=I}+|p!7@SnPiFZYc@pWUXZ;GO?CBE9jlndpsMpg0 za|8L>g4m!P_bw^-nU>WI;FdL8D-0Dve3j&`^>6&jwHT9L0ersF&oiaMO@-1Iw81%d%q#ujN_uJhFwt-qk!4jK!b?o?zG9b`-2 z8h)|WAJ;m)nfx_3fVC@N6-V1&XB0k9Q`LBq0CBU#XrGP2b(9UUPG@hiKPV8t{!5LR1{)Z zA6leRqZRd%B{MU#&V8yoyEsZI--sFX@&qugjGVoU>j{6(`(OQdYC3!Xj>sGkG`!1s zl=?b~uLA#TlwXPN00Mu*MF1D6P)?7d`?>YM+2T@~P7^oYYz_uIG32wBZFKDdE zph=r00=|L_2H!jwpxMO?zy>~Byfdmnu0Wyor{68UF%dUlU(M>ow&$$%f2oL*QTf2E zGymdovPo9t0HQR*Opa1iEmXwGoZ4IEq5gbTz=`r8f{m5rV-S_LeqkQNB9dBgWg?T- z9Mi3JdT8-otfZ8bH50I_m*geA_zkjVFTV46+WFWWxPm|_VdiRoggn%^>d~9Iq z>a#Jcdf3JQdip+kKKmRU z9(dgXz5H_Le`!dvnWKyI^Yg!dzwr0>4+;trXK@3*epn4m-HPu_>YD%YFyb|723*7CTFO% zD)Vc2TcdhJL;3`@=&1&vhWYvXk5KK>n)O?54X8VIy;o(~L(NtRK{@@J%O82UB;mX&=SLaseHl&Wk4+i4*7x_A& z;XL5Od5_lLi=CaFO}?i=Hxq&0epKl{WAkNL=74M(YW^^u^N3huQ#`-W8fr|@J)^FQ zk}h5^(zv2rv7&7 zp%49|dgYzY&xGzQllOVXV5R)vV#W24$q`nW&`$nyYN162Y3Q#loE8pMlYH3-N(FGs z$Di$(+nAny(zW?9I!GzGv(PE9i82hMYI>(YpO%6DX7{k@Iqsaj;0Tll{l`gWopo#Hd2V^wUUt@uh*6G+ zz|Ya|PV(38Ps#1#mW;#NM5%kDwz&J+EEE~syg9&L8b#Gp~xz(QK% zOia0gqT~NmCj8z3gyQ3m`FME^?2J^brqn6Kh&5ge!3jz(Z{ZaW7y0n}49okgzw+DF zHVPPyv?V~FKX2Y-?ZV-337*Ah~hUL~w8ZEx4EmH%BO>lF#_ zI_G>3+1Fp=TUXaHW7Tnl>bMOq>`zmGPozCg+E?u0J)swS5FXQtamUuF$-69QMY1&LA)|^4_&&Z7(x^_H zZ0&$5B5PAF2{&A$YmWXNNLkR`P7WqQ_}uedv|6w!=1kju?TN6hAFG1tZ=KZ?wJ;GM z{C?$OON%ou*=gI^dTJ&^$t~9=riTP6&A%BD+d2q$|ajy7~s;z>Sx~_+YmDlirc4NVah#=lnA~nLrSVDh5 z*NPv_+1DIgm=bv*a(Hc_g31`Bg*1|QMweE#EbQzsU6$z7b{a8E{JwC7%E*m|v&`!H z9l;~!5+UAxq?;n^X4A3JO4<8y3A5bHPa6G7=VtSuRnAF{EYGU!8I)M##k0~oz>$l49@N=yw1DsL52B(e*Jh^uz-swH}8T^ zudcZ5X0bLr(6h^uMLx3Im*`|2U0p;4Yj!E~GvvC|Pu}nGU>PG~OfmS8wdrO{=Tjh@ z9xzrid@i?)F(P(A0Z+MbE&Q?R92-;#!q@pgmWJHiD+!JqM>x04I~SDD4+YV52#(%CTn z_gJ^zT5?R;nr7jY`B!NHGlI0l1~&_E0t}^1z|L3P!;49kI3x-%0^oEGKvY02-~kvs zqjM63C?&P4(NubuYNZ3I>5wdYM)i;UITaATY#kaX(@w8uo9DTFepB_m?BoJxktkoy zpmV_%jogJ?E2O&4K5M7*&==U=F&Hp5+Xz+p&eYnaL~{SypfxGy+x~?W=jk%@ov*rD z1qs=#TI4&n%}W@|JZd7g#z!R4KeBe=rv2e0BZ6MY=p6_4Pvvyh1C$P-OGt z?ovt7gjso}%5#`CR^HvcD2Gav(FPV+3;DK6ug=MFtGqkw5a=@>7OpL4BdhqgdSN;&7>D*=3NlGSD)DZ_|bdo~Y^` zRU+kazF2|t%HRXNdpyap-yY())6^w=89VbF`-5BFniD58FA2-;Sj-v>ZGw-2jn3X! z27F0tz01qflt8=N8_*q5xRp(GMpkZsaEfF8V{h^_ypX5Rt_yDaAcbk$bj(u{}$f z1DrR-C^rEEogl>uro-S&Iz;iV4`Iv+{H2MBnsNe$)6)ZBCTq02I)^nS_3weI$8(T8 zZq(T2x{Q=zc|kv1w^&)fu;nJ}*y#;F1hPq;V(VuRDaO#u)>|8}CJ2mfXdt?d@$p zKR-6XrD=9f&a|KlpwCx@MJ1z)9Kjqblh9hL&(Q_|(;%NOzIFn1Um8FF*DmPtGM!PA zwb5oUNm~23Hn+VkNf7=AC0e>lG!$If_w4=oZGC$0&!1KL(2!@FKZyRVR#6cJySsZf zPU9KD=4#)he8gE8I8K1x7VeCGU%$D;Z$07dv!3K}4Yp6PIh>_Gnw?%&xW>mGeCTFw zq`XtT%b5cL-3I|210YPm4Z7^b5hghI1Btn){eG|RuNg)D;w-DbekB9M>2<${Yu3kY;;khW_Zy-G&r-jy zbLg`0oC1AbUik-!n6S~A*qhJ16Oud}+U6f07atEl)&RHxBz*XMohSIr-Z{nnySQJb z)4L_f3S0h1`|B-#<5+W3cT+j*8*21mN6z?GTH(@!BqcYS&6GLy_n)NJ1JvcCKO2tX zv*iw_KxcCSv@DZdyNEcX3bo!#?~FfM9xsP@QEgfUXa#@e-ZexF`9rwRWrwYRQ1P8x z*++WH`%5!nw|KhO!U7q`^5ti5>;bThW(MHOo50BCHUd06%I$YIUUP;foZ>PL$nz>> z=3crMZy;c^j1S`6*;0#}dC>hTfm3iOAN^@PB6aNE&c>H7UmV4~00IRav2z{TQ5S|z zGNHf}q} zOPX;4flL5DlQ29ye0UhzwfX43;2Dv}%;9es4=@LRS09D{iemg5TX+Jn1;xW94<9A< zNhU9_4{rrQ@vtW;YHOq3e{<^YjFg3*Yc=iXNS_x?9>DM)0SqtvQ>fwpoM5a2;Pq`@ z=P||4TQ9eh`!6`gK*@jL7|SuE`_`_Y&rko!85molC;)A3Pqz+NfHAXf?UFgeHj`i{ z6aGap2m#=QQ@{Y6`#J+Ak#KlS$mU+gdLSY-W^N!+*u z`h0(r1JJg>PbOwII7S=QE%Z*SC3UIP`O4=$0eyZc%q2--z3dVc#{m>$m`&f4ab@j4 zi?G(MXf}XTa<%+L2fB%T-lm2c^Z|2t0Nj36G)PD(aD8rWWadcgamPh@k#`)fp?_+4 zZBhxrof?J-cddag`1!W5fMg}mvtncE&S?JKO(NFD?H?Mx#O!@ncLKf4v2b?fR##V- zlaq^nAKb>l#x{xdR*w+D@l9nN9E40214=??&AtghJVsO5SC;_70;glk@eRB(R#fp_uFTmmWKDEMSN{)g)yV&LBj?B z<+w5=WLlQ2!^9_3(L1VfYN`odWseh)98j1qHIs>HQ;X}x{r(X~yHK+0b`sRo1gILS z+*K!U+vcVyyH=wBJQ%bzkS~?klP0Pd{O6O^Sx_~wC44y`8(n{eTKKLl=+E9wCgd=$ zgEdp!IHx&y{-Eu+YJ77l%UrRVM9X1w;o%jpC~cmZNSVf#c9toyh`>sPPZv)jy@zP$ zM1BSl+4)d4&5A#tU$;P5UtgZQ+LvZ~N+Q;1==TfkeSNv0vNH|+<}sx!h?n!-A{D`f zP0@)?0Wk5TCRHT5{VUH}#>Ef`2dE*uF^5FKor%sQAH)YuEp^1Q9*fZ$dFKTNy!N(N zjV^$GmjL&+F*d2d7u?bI?Bhim^a+XfXn=<^Re=$eF)&+=zgZ|G7;k4Zgw>i&hRW*A z2D@XwP2TTCU*}5|g~vXyjAc9(Ri3INMyKD!zMx%pi>K_WEN z{UhBA`%tN%9o!YZz=0Un{86P6E_9?7|F*!D2EO zFm6+kbhRf+5+|T#NaluRH`6*er;>zbK6Nm6{Dki;V|->g8VWli4vhOQh#G8BiO$U_ zeSLk5=Oo;vvIv| z4YMIHD+awHOfKA0(K;%IFo}?{9sxGc-uQpR2>6!L8;lK3denKn8ESnA*E6?1< z-ydf5R|ytS+v#`bfuDP5DwN)VI8!UP@e%1Jaf0ZoUS|aDK_BKufb)M-Dhz|J=)cWw z{_NRH8jLITjop_Jc0za@rsOPm0W8QJAZ+e~!kRC)@u?rQtq!#W_~I1}B6(C-lu z&I?twvKR+;v1fV`c(H6hc*$}vwOX6kX{X#7TDL5gY9m}Ie=a6Ba5&w%xM8aV{L{J4 z?o>O`cGIDKu)=}v!0J+o+6~dMCFhfHcjlBJnG|Q7R;SL8x9?0Y6R^HG3sWXT&vI$JJ~nHAtAJt1L?g>k}#*6!UMGC8J4((hH$yc8SqE*hek_+b-h4AjIa zMY^<%QsPrg9ZHAx!OYlt6Fa+4MO9)ehu27T`f@24ZppUX`btPom-qLen?&>iT4v=u ze$asGNTLOt$4izA`L9{dRa^STk+d&~7(gD9ml7tlBpk&{uHTgBPe{wHg))g+QI?zN z37JJuvaR<~)xv$)D=fCUvrp^KAYe6Eod*>Gr{Pk#9FXLD0!R^+G>yR%{nY_?(_$t% z7)ZZL<{n!;o{SHSOHxCBQzNGfX)9z4W)a2DJ-4$piiHwKc+xa_b3(@3Pi98z&tr&J z;aA{^Gz89C6Zs;wuuzueJ1ak->XIFWu@tOn?Pa3dOROYYd{nJttg3WAIa@;N<`|*0 zS;mXJpvS%t z3=U51y-FAQ3Pu8)!40|n)lm%|^p6bCOW^04xFo+`Y79FH-BPd6eU&hqciiUg+2&H? zM$d~nJxu4nX{2%NOYpc))_;*x1KmGYL4d0Rhu-Ih|J7*+oIrq(=@k%A-`LpL+$_%$ zTU%Qz`9frA4G#ufXLImbYA2ghI}a1!+NMd~$H0mcj+UcmZkNkvI` z|M}f`EJNAFwqgYC4-!+;Vtmno)ZU5mYo9;sJ+4r4Ar17HY0}$`JM95_0E* zpzPpW>ACnr%8jr;H+D>Ra-^4jP(7OO&h!%;RRRF99yx8t)oPcQ>m!dR)G7YiLaVFN za!ASH@}VU`vhD|*lw%3|e=>*_S{&hjB?nKk{+c2bsiGT|ZpqH)v(dPhfdAn(7vBxkYpCOI_j1Ca6sCs&Osni%J z#Xmo9csjHKI(`0TaqAvAY$u=dXj7`Y!K-n6so{R$kH>of`+bVKt(#nmyIr2pXBXlX zX%nL0-HnY09_;^slHXf@P3@R|^3^+{rP!qQ&UJ?Qu9^yBY2`D?!Ny+<6ZrL(T{RUtw?w zaLdP^-3Vx^t22ElUo?xnO4@MB;3#j}GCy3@eQZ=b_4+VW-tA~G30D`1vU--p`(Dw< z<(yIB7JxZ_+_`e)idt^MzjXT+Mdx(tiS%w?Xp~^61#VC6AY^QDW#$k@u8V;bX=_PK zdRfq)(b@!lQc-00aq{5|w9a?sJCR&LW~vMDCif9r+o5N*tynN^j&_0{}lvEp4x ziU&oG4)hrf5V&#RYi33?odYqk6FYtQvAq27-k%o3;5d`#`a2r{8I|ZEiTxAgyLou* zu&^HdDQqQNVE5GjzR{oFrgrp4RG)Xab8ed89}_&|C{sZI_JUMTNJ(Q!(CWW@4uAi; z^`o3OC$qNKi;KBWeiVy}jpIB}=)79^=QqqAS~3Uvo}CN*VsLDGO!GZA{hL?3|0l1w z65&H%-lw=~X$9eW`h`7>M%|Ur2 zm8W?@4b9D^dn51 zAE1nL&v&W+0yr(uuzVJ0g9oO@W@bjR#;2$Kta?21fx-gpRm1+MmGzRvwsvg(RTIO6 zwdA!MoTw9^;VCtz&`ejWfkBBj?D z;1CXtzn?oM`vc;feX1TolPO<^L=-4ZJf;QvRpM^e!s&0dby%TV*}l{TUF(ppqVHLN z`yeHbckTz9w0JTg#%`@Cf#I z$0<_meKeg?_!(Zy3Tf5n4aCJ>6ITKMymBzevtR-rM_R5G8uzN-mF=2HQNF&jj+~&D zt3mkmZ5w!Py`%Wj>y+4Kt=rWST};+yTEl>o^_+6_dmv{L0?2o;aKP(+QHFT#3Sn<% z(4U{f%C-v8-mI}{Q~1~VNU8WB>qKyBrKbd5(EEs>wUy#)k?d=L%9inYaoea*ou|7) zp%-;=ZEzB8k30zINm@eG0@=rY%Y;HmX*)9lCnrkewFl;Ld~))hXFsclRdXOT{5X9; zJIh&i0)&gNdKWvM5d9|^SWny!^PfrzrLcApbgs5un1^ffIU`w??vl9~(j6%V-?BT& zMS;dSEVbl0#`GF{0?&>Bhjl5UhM%ygRYzvC9h{7JQS-JgU0@5!mzke3NwN}a1R^z2 zFOdyE%%&;U9#G&#YfgZqU0}CZWvtmT3OJ!GvOBYxv}OAVnRoBeQS)7kM#xfJXbOZ) z++GI#d!EV$VPyJFWHYNK+lj1S-r^P&+~I`G_IFb~pA{Cpw`1p-1bf8Imk1U;dvTyA zM}+)MBwq-N1Il0;jiMfT1em9lee1gh_!bTZta?A0I>R;DTKI%UlsVGQ!Yg zG3}bWuv|_aTdjuq4_pmf!3g)B3XRk>^H_Jm4O|foaoA^QD9*4m_9PUEpRFLQPSk1t z9eN3v0X9h}a3i!|_!H5%k;qh^{)H+@To8Lh!gXRfF0^awHN9{4M%CR+@ChD>;==pE z*=fqWoSaV$SXsg_YH<0JMT~5ep_eNVwNI^t*5z0l*#S_SsTxD%}KgXe{=tNG12R( zhKxs(sM9=pmJ+l87>_r*KL-Tm#Q*b-75{QhH@aYORi?2CNM*JCOdz>=X7h->Cfm3b z$dwH5*;XXX|E-7vj-5cLmo5l|vs$lU_}I^P_}gyF`d7>i(dm|uM!>}T!FF5n>qCBU zgWqb#T+Syf77l3OMyEh8sjo)Q_vC6EyA?pz1pvWXRKPp_!S-K8_Wr+2%b4jly#C*S zQEKOd2>R9_K;b%unc;-jrZWd#JRBLz0G`Zu`rAiy4<0f6vb_9}Y*1!8Ga zxth85Adp!I01f!~_+0j4oB(7kmKQ%T9{*>J@E>7k^PBRgNB@T*nve;#(9NVd^jAiX zFiM?G@=s1hz>L@@{!`TyCJ$cE8Vn01rSVYzY}i=urD(Yyu1N9BKwdz&qmy>yqUQk& z!TxA-qyCUO;}ofQuqT?UG6p1C?lxAd@7o@&t%-1AfVkSRS`Ow|UtLYnQ4Ib4P1NhD z{l$35TJ>MtS+fj+B<%zE`drKO_YFBUnfnyw@CFF;_Cf!{Op=1ae-6Rq|KG-Fen%Ak zD?=kGDH(WhcN;$L<@GGceDhu}lfR)c6DGXZ=H~aldcW-Q*SUED7?NmI7)mw}VQi_WJ5;41-Vep3) z3LF5Mww&Kn>xqgz_B+f)S_=Whl>9d#P&Iv}x3@C{VLWk+dpqMpv+W{{ga3$C3J!aM z=J5pd)1q$Vn%#O*CFVZ^(Fg?@u#p81kGEPyLes9h=+8)wy=(=VWd?N9`+(fqGq&t( zufJg!!jRb-^A7^TH8wV8{#DBG34EnWx(d@zF0svha+pQf z!;JNt0)j?)+D`#On#a?wRtwZ$MMchSO|px?*X4feOn?W!@a3fO1LX+;oZ9)tMMoG+ zogp!P^!4l4K)!FWznzxXSk>BEE?3jsyjq_+qXl5~iAuZNk4z&o=7gviZ|yrJsJl}F zQ=$qgr$8mI#bS=1V#VD7)EdxBf&ZVq=C)X2y-0mhGsnJ{;_hPZ2#b`*^gUI)rW;YS ztK?)U#Jk0R{YjTySz6dz5J;~*qeBgd+{EGUbTRY_bXO$Io}$}KgdqcOOI{q04xU3! zeutHs==cfZ-}kaFYnoBC$&J}0Vr-{f%JBoY+WwL=R-W{JZ(~k=;vIeCh7T_pCj}$;_Yx}zF}ic%@cQ*wL!U=2pM@Pe)!^m(9K8r-h#MaI5x!j4(b&*C zVO?x8FUPn8#Jib6=`I~S=ioGlko79k;lW;-s7(tH?PiSykj-?xXRg($muE_>U451# z`tR<0+5CN_X;Z$oOJKzacl!WBf4f+I$N$L2AJG&K&c2gueudr;J4`*#CivD^7F`v zq~uYvC{>bhpU~F69drJsdBZXNc7*vM7BY z0fjfUVfsmeQFhrsuQMFdwDRSvDuDInA$!r|%lGsP8qT{HES;R& z=Vdx0u|kAu-{J;OEsOd_93XZA`VD9gj-U28t{et zT3I&z7;Vpei0JNP(Sx$v#IC|!+SR^JqXJ$UxX6K(>Akr(raB&Dr7N$Zm|=uW;k9~h zcL>!bK=Fg$NKt1bqG}*=AANj8wEW#Ypk=SdVdRq9#IzsbrhRg9$!Kt`?D~@z&$`4Z zU&VBJMqJCE7#|1q_g;{e$Y|C$~DV34ZVBPAjXOlA?Uch z^s3)`JL_rZ9VMq_PkxG&h>h(Po$(Z0WHvW1>|?%b=&5}03moJHCwePH`<(3!#F{1r zYmNo;7JK^x+bqQ_t~gEz#_>S^Npj!04-0H#=mP!~M*6gGXXu|1l&9$g(z2mtJj9J+ zS$MgQyg$bTiZa@Z7V2^7MZdDGm_6uq*$63DIp~$hDsxY2SE%!^F%st6VH<)XVZN8f zD-54hR=SZa5>0asF|rR(d+|!;71X%MJpw*4Y&e!x3do<=`>l>oHTqLw&R!d{?MAF1 z2g?;e{ddNU*z$}QYBaUrW!`Tx&d_YxBhn%Ao$!zDa(Iw&7Lefq3&+*Tcw^eU?%_WH z&o>T#n0xET*WJLa-&<&LkI%p8O{Jc8O|LnG&%=5R3>m}?Nvah$R5o>#u<&1J9WwB> zDnh3C(SorKzM1#7W!9bf^glAjq->X7LPydvREk9OUQ z8%2;zpY;P4=(EGKiGN;8f`m~^dRSo}`PI0VfOD}L zWSA=Md)VxafpkJQ`&0QuyBFZjop&+Xv(@dP3wEx0^jh;AlzbWSH_oX#rmpky>tGcg zUV-V)Xop5+V|dG@4EQvEOgNeS1HMW)y^J8|UsFnTZXp2LKKufT4xgDW=Xn55KjZOU zP9VK-Y>{uqhgq;xpj}Tei<|^kAf7C}_*&MEOTqZmr^uR^*v-mJo3WJGG>by2c5S7g zkBR7Hx2*7To9Jd}MO>OMa|1X#V{OdII7)C4v>2RHw|uobDIxerUxsD7ajZ6O;STB> z7;Y$O+QT%M53T?+(dAX&C~}_ls_C0E$((c5F^U5F7}Nv@FYwMf%_m0lCfzV|dx~^Z zm9VqYCmzhh7nqB)fd}T+n&ybS0Wl~C4#+8zHZ#!`50)Z8^`!@Sp#5wJqM6}L8bvP< zZJ2li3GYvInuiu?A`1r?L!2XvicR2~lbXjeJkLpIpAI#k-}*lXeXwJ<<7&2tk(2@n z{@D2&&j~AD*#2E5eF3+673SHiUU!z)+K^E5u1i~@xjA4aW$k>XSU39h zCG-RK7;t8>wGzvJ0VSi&1Nsm%>gb$akpNUz>uNh1uTUI1R{VPoMsKU};!HvSHumh?4^x@cYM? z*PXjyt<#@A`M!${-TpGQcSIHX*Ec?K)*bF0sk?3-RI87dBm(yRw|u7T(Z#)ETjLXN zWbAdNW0xc2wxq@RV~Nh?uTjT4$8q733%0r8$IoW{{X>-ju0DX~wc4w=|4mVPuQP1F za~jinxYFv^#fF~iMuloE8I!(NSs#pLAEaMO;a81a)MDaSjVkN7tZP1UR2Q~aXH@;t zEGroWbNaY_TD%P~(UE3d;tp=bbzi@=Q}UaW3RQF4*m#pPZTM`S8U#*LoP4aG(F`6-O)@2o3<%oKnT-{W9iA}Vs; z2`#oZu6=zF7hTd7$V0#aLxYjB=-;%c62}h`3 zexeF3a}_&O(&x~>XKF(I0M~Qjeem8w6-&NP28Z6#*P~RE6Oj7UUeDfH^ugvrfRl_c zk>X1n)A9bU|870Mo8UI>x3yl)&#v9$L|70xP^bN9@XdfPMMtJ@r{j|N3h{47U5Wg7fZk>T7J%~>UcMuU zdA24DgX(6esyu8V5 zZ4^GL41C+yu*r4#NBNB6VMh~8vXJtDkbLia#(u1SpVna7S|i6|v& z!Sup$x#DSXnaTlJGhgmT5vJjc*72{5*fv&z80qqMK##Q4>1F6Z2QoCp&WXJvw>iGB zkH3qqG5kI9-0he~5!$tl2S1c}(8gLmy(&5J4^qS}58w27vr`3%c8Rx&ooPci{DEK8 za$4xYd-|s3fFyHvL4v}kR)6V@N4raJE@ARj+4CnF86bu7Kd+X8g?0*j?(xms&bK?6 z@ou>@1j7DY*h4il&>-uBQCYcmf=L7c{_6wdgA>-V7YAC_AG%mV#1wgk^s9+iQEyn( zEVl-+W#9I8B9m?(k&M z(JuGs1|u}wM-{{-n?imSTgg}BHK0A`a*DXKy|X$;?_s4l(~Y*u8984OZQT-n4t0kF zhFS4zb@oayJ#Y41ow~neJQXg}^ooZHxp!wqU@&qOXD#gEq1sHsc(x{g*Z$s^_lEC! zlBaC9>e6zePno>`-BsVHApUeUWNpE?&r$EgDSa>##KyevwU+JIRZnVYM=j`cu{1E} zJSo4z9vD5%i(t$zdhA;LUez{tx#meZh1fNZ@hr2ay}3HFAz;ML_&`gJ#Xv&BiBk|= z@HNp17`Zd;w$IU*a1?L8W5?b(L4R5QGUNoG6^9-|!W3sorb)Y%3Aitox~#ul{2$Gn zX*iqd{>OEhV=$_U>Y=S^)lzF)#Lkq8iZvvm_N}#)s=Z+_ZFNCIi%>Mw8ci%ygodJv zB9_=1R4p^M1hrIbLFC-&^t?FdI_F&fm;X0;@g%vPC%NwDzVGMv`+UCsYtoCiE#_>q zlQ*2NINO%X^r$5{^^&vd(}N!H+8UYPBw5UaZm3yT>Ff9X(u7zQ?AD&RNb?JFX*g#s zeT&-kL+X&^LWlEGSoAwuY%65{n@&ki4<|aB(~Py4S~1+H-D``3yVpc-F50e%zU(t{ z{Ub*Dgd{8MtBj0JN>}jy3|s(aXv+_MqNlVd`cIb za|WIK^@_7!9(d_8dusJL&RIDM6=by#k0J|r)xr>xuDF?e7quj~lEQVq#c{o;oDOpg z{-Y1wn}8G67#hTOJ(BZo=-sUIPQ4~nubDpszFeamyFS$O+9Y@wF;m_0WY*#By~(mz=(`zK5u8l_xnee~luBmV z5t7X?{b(pE#xWP^aFe$zbg$%3&r33%sWfU=K8odRuc(aT>(++Y$mIUg;Dqe#HYRyt z{Xve8KW&@{qsM0JB!B_yQ#58wU-T7M$ibh;zE$ESf?#xaeKfNO*^7lVMuZ9QsLq1F z^R%ArIdxW?s(ks%WzesDa#&J%8cZV;ygM>CMKN!m&gDs^uP=qy!33*m3e{Fa9P?ZM zdpGjfI@VXp59zVyLMi zKFS>wN{}N#>4*o#LYG5hq`Xc=p4KsPKIxNSVrWoj^l@3wJxpV0lh6KwOMxaSvDWd4 zK(~hCJUIp$yL>aNuGqUjig-i+Jf7q|#J8v&&#>u)kJM4rYW!>AZqksp$WP<);u^so zaw)ci+T3HsHGRq2tFg0k78b@$n+fSbF%O-TfZy&Dq~4VyjZQ80-H^K5TkLO8y`hHR z_eV`jX65?u&WCGf15ZI5+b01@vY^{@k|!xg?ESts<|BWIJ<(;yWE?IMS zjb0>ygfW1O_&J3&gY>b@rLlpNfZLbuv%4;+X{!1o&RTo9^>+?=pOzCKw$~g755;60 zmV6Pn?tB456(7{vvX_B`oDq(~I0k$jzRX15F8>*l{odNqQ+i=n?k66+FYxh!-&B-I z-bmUx;wdedA8cNde;bkN7HU0H9Fe6uNQ);Ck-I|=F1A8_E-(aEP8f2SUy6K^UH8Fe z(Oroc1=UfGA32V*SMF3Nn?_k*7+MC_32a|k6{xmFVFr>ismt?Nt4~c{g$j=jW8~3g zdKmEy&wX!``drN@N=da3hZ$vuCA+`AV>iDBApY4i_1t<&LKQz2Cdfks&T@NO%8@8` z$my;G%&*4|iq{jhB8g?&%RdFL=AX1&Q?ru5NajOz%WDZrNV;n>`Tf&`(tK63u%|;Bc;gWg2G@$g0&oZrV*45`>3EpQLAM5FUi#rO3KYuGUrPk zD(s}bYFRG~tyG_AD_Igz5njehD!9NT(P0TUm{6o;)u`TbC|$isRKt_%dS~dQ(|j4a z%`?XjU90q93RP>bKJ8Ab~;MB4- zsD6#Tj1TR8eZ{xT`jY|>N%rS`*f6@iJS}0WV+I%}9n!d&T;yA@g;b+dcd!+4JN9X> zrvKiWRC2vF9^0)-f<@ajubFCK=~k!9FLmKVO$v12hIZ^@^%B(3$As5&b6FMXpu8i~ z0||2c_<~_eY8_QT6@7aQmh70#ep&jfCh_()TF+h7Yccd<^^(g6YaTpJ@2J*w3BuuU z0*G${a(r25<5{9num@6(S)A%u+ddUlJo%yiy&lXt1Z7AhlM@Ce4~<;{Gf;U;^imCj zKzC;ys<)1uJXBbM7mc|_lMw&X?3nDBpkNB=C-ag*n6+G&M2msZ6g~4|8e|j5OxO%+ z>??Z)%Ds(@7DfBmKH2pz8>6ew(Y%BPC3M+nhnIHXdBJs?#axMP z+Ycg&S@(7#i4Mv9#DGU9EoX@aFuT$)fL*5g$vYADJ7}<5p|O^#S%aSn#eZ(B&^}T5 zC^kGvXRt}(#zKIGjY;NON2z~bb=8erHxZM$Ti71I1bgpIJDd#MHrzM&wQr*%$HV z&#>C-;eJ%B*^4Fv*X@%lE@+miC~E~WpR0uZ;1`rc>eLOg>r!Ce-?1GP?}KT0$Pl#S zBhceg;kpYdNd)kmMIAZFRG*DZMT$86&LLo{{2eaz7~~bEZD86#4F@#ISgSJtHBAjF z{T=bc@BX0owKhL%pQYrwyt)8?<`FAg>582sY!%z=rs6}2Y1nEU!qgtAd_SqsNQSjO zr19Ag9;yK^2)(~#$+v#gPOzRZ3)^~ZXB3_uVc+2|5#0Y27UoASFtX^v*^8)k!$1}d z<|GkCre7N$PcQj7a-RqaLx%yeKoz#+fpUm0Ap`8SBf-c;MJuSOPDP_v{ z(T3kdL)NQDVFhm?G2&5ad0%s4&6^OnOqGiuOyM}5%zblbG zz;dRjMr63jU~gXC1jRM8*`bTbG~2bcfZm^&Po~~QIIdnN9zkn$pFz#nbaw9?F1!`~ z@}>__cD7=5P3OZyoa7Bh^ML2Rz3l`u*UmKkdH(hg5x7o<4JGs`ji8SVx+AWO5B(a? z9LutE3rAFYJL+ME{~V^+AQ_^@UD;5&Jhe8cv1(EGX^sQw_LD2Sdcy^M<1^br9**8Ob%h>Dll!*|&B<>}p;<_Bg1Y&_`4i{cHr`Wnz) zEBM@J0O1tgG&()Ra6Xmi5i6E7ghF3#sKU40))&Rx;YkK1LoG8AqJ3C2v*CbF`IWi&y9^0!-M^ei3=Jv`z0gx|AI%~>8!8T4f|Q;s zA;`k(v*K2Rm=Ly~t20?_s6CBg0YY>&?^=sZC zf>+n8b#DD?Mi`1rk;LLKLvDEnkVVZEBoXmnv`9(T$QaMizH|RVn3~?0E=K}_Cqa< z6Kp^JRFs!n+vy@VP1V0W+Cso|hcJf&Nl3_`e0D_a>@*&OAJf)^dyu@XWjD&}=PBkE zTK=$HW0E;xko)5WHrz7BDAGFA~=DTyP1qvj%2umJCeB1DkZ&u{*+qlCo z2)03Gsv!Vz5RL0)tj=@-SiUiQA*1?2mIX|oNAV%}WWf!C9pwP0p5e;?*l}au$aV&? zIzSFcde~QLrDNR6U1Bet$G$tO#yE1HHk#3u70n3n0PtT2H>)({l%gnN#}}f zK-jHYS`rvh$?`x%*#E|5pLjZt4RC`#ep8Z$*y;iLH8OG&s7IpZY5xs3NRe8&0UWr) z-}O7j*4FTCIHfY{Uzyq00HM?Ed;mPT+aSATRkiTnGdnV7G&F&9hXr}MT;nc`PQ`)V z==yFl7n1xA%sw$12Q0$aRUgoU<;F&V-<+FQvKX`4{n!9@-EgwObkDmRaGig94umPt z3H9>w;+rsKy%lPHsI~*NGsR+S_Lw23L6r+;!UwURX;wq``VI(o&g$8c2l!LN5=~3fRoCf_DLYZpZOg}I-n0ve&D$b}H;p?3GIoaJ!1D85 zYV%c}U+1X8Kj@$8m>N*m=XSq$`*Q9S**5U9*-;~VcsX2zFS#Ls{bsEJHW)81lSL~O(5d-X-}Uefq=kUF!> z(8XJ`g`2yqL4ovJhzTw;rVU!XAGfa!ip#?xK_Jyv$;(!G+tQwefAJ#!%=ZA~_0GU`BlK7BfyHO@^<3BG2Z-*e>yv~iEsCdHo4x~cY0au(d@ zZJFQVKK>fiB(@Z6?HhV9%^CVKIEbo@`@qlho6G`$V*v-x4TZQ~(rmaNeLqE@kQbm6 z%RgAjrjZ)SKw+ELhv*m>jE{^szLUF7A9ypa-yd@N9DtICaQc5SwjK<9$PrH98xnis z$-fD9%H~nq<_{b90BzaDTLvR5O6)`7fXtV4S!!-&bm| zsvgbiLV+-M5X$xEYy-|DCIWs$69NH2BH>LLwq=LLG@4y%sOMF9+*dNhC9^o3BZ-g0 znwAz9&qhBC{Q`{OdeeHl#OuJI8(&;r78%*k^S1zyLp0Y*3ns3#gA5|&He&$tHzy}2 zKLi}=-AKr{=VsO=Fw%I=nf#w$kz7uJNAD|d+zRKwrGt4+Msr8gz!4rZ6RS%VM(%h1 E0m%d!iU0rr diff --git a/windows/security/information-protection/windows-information-protection/images/wip-encrypted-file-extensions.png b/windows/security/information-protection/windows-information-protection/images/wip-encrypted-file-extensions.png index 1a0ec5397d87e4b1f8af36ddd7fa49b20a528a64..8ec000d2a74d4d1478511f67b84df3bbc6e82833 100644 GIT binary patch literal 23272 zcmb@uXIRqh8$Vo`xl&WhJu)jTx256$Q#0!>HM87GW;t@<^KQcBrQQj}U%)B`5s&Ary;zSja>(GgndCdX2YvX_7 z1V8gD{(zG+E>a;UPS`^4-PV5`;z-VBO}}6~8HdsFJ_`bzmeqfMF3K}jt}03PzWsz8 z-=)Z@d)3J%spm8#|E~XJ_YLllI3sM;MW#iXn(VHrY^kvL&$SHP@NfQRYGw5#IFj)s zFfdpS2%KJ>Zmy@UO$@#C@GxPQjy-2^`%G0;70Pe%AFjS!Jwo%s`}=E!X^z_|%t!3f zx4+PaaQ3<1I1nY!8EFW9^ouKghc#k=eBdXMs!6!-#8*~<23X-#Xo;z=&s&r zx;Dw`Qsn4v8l_c0;e&A83lf{5)K@e=IcD!`*wTbRpxK>i;?oST9*qYT6+W-YKj=ZR zXhlk~b8$1lvNzXjmGXlL|XSme1LB~jfr&TUgt4Uk@2dt3!xHo^7E z>3X}@c4bz@NNM`Hr+^5bF;w;;H0qFh@$FyL-b3G(*oSAVls$6~e%M(@g$>u&3>9RV z>$;>zIz!bc0KEy6x85ai5nSWVK~+`G;_Yw%aPm!PwM4sIQNE-3lpwWOb9DnDza}MV z=qdj)9XV7`Zf>8p2#@!gL)fiFuEsAG%CW5QuZUZLB^5MB;3ZhqPXAYdsvr6mWBkIb z5r0vZ9jKpi3bAVN(3!cAv#OCFlCV7U*^*eJ^Sk%&sIM9S`dkcVg?`A@Lv=de_}TQ- zfp=Adc$+ISR*lj&PF_ZcND zBDc2zum7rleBm-ZXz9u3Viwmg=( zs@^s=9)8awYTW|Tcq zc5RJv5GnfEPPv&;>r5loVkq><(bKMtlk$`2w;@Y1kK0fFtlk$5xU)x9!mVd9Ns`Q!OEy945+Lw88JO z*kDbCgFJ4%AL;x=jfZgr-Le1ZN_HBykz5+GCiqyEyqM1`iPK+aVf=BrC&d05u`(?aon_OtZfYjua91k3DKhjSN8 z7uwk7M>*Ku3>jCHZE!Z%fFzv*Iz#}f3`mbtxpbl77cDL(B?{H)^uodN zv5g=V5M;maTcwQctR=Rn$+t&2A`%_+N;4Bso$fCkeA|A1iRv(FBP-jF_uxBig8}JR zeifbN;n*2y<9Ha8c;8CA!3H-r_jmkczdMK0$|B@-)1_lIz_mh1FO`MKa8nB*xCUgiLU}Fc8d3f3Y8z_h4a&fl z7XaujIB#kyI+=?(8?3J-53#Rk+nR))oV>0$Gn(f;Jtv&%lv}QEDE@A&X)&z5pikhYt7Gz9r@s%DPYD4Z9&vgWoqIv%gkD?eqX#%eT%tgf z{s=y?&jVD zMv$qd*_PrTTTh~$zjwUw&9ezAC6J9Ww9V$wB0{J>RJO0v)?OfosSBj+g zL!bgN4>3JgnKs`b|5Tz%`TCsr1w+C~Q9}pLhiT>ZH0re4^)h}UH`N_y757jhpjtcc zY<$!CJS9&y?T=az$!3?&>kveUt}hsueLYW-s36gCYB-MQ!;Za1bx`|WDj0Ny7Yh{? zXWP4yO5h3`jzc(}?7nkwE-BF8`V0y9L7Hv9sLi)H&i?}v@c{l2a_gybqvB+)aIGO~ z=&7BYArGSLR<1E{?aYIO3s3DNeBXBFNrdzV#MhkThAW8?Lq$_ppC0>_7(2M(IV-35 z@CGRWXpv`WqM8m+f^B?$4TKvy`Ll`Dz6ItAyPJ^85{Hd8J zgsf5ntF<>9w1sHHQ+`t7Vf^Wv|6J`ays2#hajb^uuiwJfoC;H@H=5voh+1=`(k}x% zL;zOJv+dpx1GSQYa&Y}Q4Y>>SkXl2Yl|PaQJ286!%MPBe7ye#yhz>N5rv)g?rk|&n zRcaL9zqIn68>$1&JqeYyKXjgbTYBe+Ja_KrkA!ZCSBK_lw}-EY(TXKj(oYek1?Y%Q zbwM`bGxb$=T>UUrCsC2J!oUgCyNUJ^rA@ z7y6=R{Z|3^=py>AzMWtAcc(Nw#9{4VWY{p}HTgxsdaoX&5r0D+XdfC&MJoM8=EmUC603 zGIsBLNHQR>fkBm=J)QE;c=qA2AeEY21_Nlh`6ql_X9QC{b>Q86T-a{x&%g zDn3hQ$MRJ6+>bA8fF{3gBA&e$wD=N!h>0pwi1tz>aPWX{RKmoYbkw|#e6zh&jEz1$ z_R)_n`EDruF6CnM6{FlEwsmue~cjf81@>`I?#9gwf+$M(;qq-F1O`#Q*v@8Nul{mM!FYq2P1*|z6ac4 z82ghRi%1n@_)1JraSW&_8GVX=8$9sr43&%GL@I#YM}n_vl9F)^XiRG414<8{9L$ z8bbj0>5YRUA4)9{C}EU?#S%T!Xs(A4@iT|tX25$6z`rYt)J30fy!}O^pLy4eJC2OR zEnm4Uu8KsPhz>~x^wJ(bW;DwN4c!pkRXrxv*ix!ZqkRZM~>zdrh~nQFxTtY zW|UDyAUkKxmJdD^P^*^~u7VSIy;OXl@+f@6V2`@dHC3sCC)n+}E7Bjlo2hFbm+2Y-^T}UZIr^Lze6MTIv`l*@LnvaulFn$aVbMk@^$s zC-%qHiQzBRSLcJv%+)Qxp&cw=$j)RYksnV)K154dJ;vW-kBo^(2Z^;#3T*t2Uawd# z(V-yD78Sq*yL%w-Kx}lwb1uN+(xZO8V%I$+NyIT}hS*kru&5t$E$ro4ivdPGKXB6U zoVPb{S7vAk$_R!XxO}#%TmABpCPNeJ!HBnZPoHzqA#DB=RrYi*{>ixG$LZIb*D0IA zM;vr9N2SULifJPV@5JA3L|SY*%yZS2_*|xB=Tu`k3g^mm4VhU9gQ`-_vhAB=uCyl( zI=7Ii^g|KHR0rq!OTC9B;MbCW`-XP1Yt#?lFPcVjwcq@D*5X(>cDYw|${N#oTvoX; z=va?V-B3D{DbvEfY6koML(4xC9D9h9K@+Dh6}g5ONlx+-;X~lsb~T*$*k9c*s?M+; zoaxyi8z^qzN71=&?y_ zZVq{MSzM*%uh~kZ@^PLn=F3KCzna}XoGL9Aw8dHLnx|RIOEa@fa@adfji=dr`$HmB zve=2Qmd}D?Rj4}l+1^~0m{Y)xnq=6Lp;p7|GjrERmcaZI)&x3^f_g1(!1%zONU))=bZ-xCHjzAobU&L+2?HhuuUi`@!c zwg@%FV3WR2ZADBB{dX$w#nBJ<$RTdIp>*04YrZ)VcjnHG6jl5@dK$*fIs6#2`sE3Y zrQg-jDxIKTDWyxOFiH=L&wvf4g!cP#v>(GESH!pHohpc>1_uv%s{V9WX206xtpvMX ze83hpw~_A}7WxFb$Lx9q;m<(aQEYg%li3Oc`YVWra01BR#u#~h&muXeJ4@ zlfIpv%lezjO)N9tt8Z^)Px&-SXH49D0Nl3`o(5N!&qcqt-90GkfQ61)HPD0GPwF@D zPeZniJD#ASathN8?fNH3A_m)PEAHS?+w@tNJh7kSSSj zqFno-zba_!{Xg=cuPIW^-le&A<+TYqPijw9VA zZD;az@-tgC>Zd?i_}<+&asQ??F1gj#QifHXAL}?LV~u28iOcCJ>;e|&cg=q5_ALd>t5&EL3RZmk5 zy=ec?(p3{}JDYRq;Ko9`lg`$Rg3fN0z1~vfVSB0=2(3SMk zSp>;bYaS7<=e|tih+CU8`^S@0yy?r{(scjQ^k2`B?}lq1rXMkcrGLi9Z%m2J+~^<0 zc_ZD4|Mt=6x5ekO>QVmRy>H~(Q5%Zi6$8dk zB?6t275mC-#?#-0Z(Y$^JQC-UsQO`mRj75By3lN9&ft%z|3kAXl*!#6-G6(9Mv|qb z1P8YS6>i8y`9Ir>p+&Yd>!5bJWSL5_|rgXOM5)yi*4m#-Bn5nRw z)?W9&X7+0{^S2$3P{YgnGetjB1a-)JY{|!SJ7x3B_t%EvF3`F)3(Iv6Z;u|OSWY%H zt4%jW9ZSPe$67l=necQz1R-$b~muEYRmd0lE zV$eY*>!{S?LfOh!Q;4ar;tG1o0Nz`VI<~hbz%V~rHw4GhmS^`-M3e7RWp-#;mD(}S z@Oe1B@n<-pWil+Qb-1-?Wl$szb?!hl;D>H_q<7rn$I(gY<2I0Z{g1j0>XF=Sfoj39p&I!w@nxtHHp?oFQ^AnD~g}(HeMKws@u_Z+`1X4{OkGeKNUIK74|&U{V-^&3J$A1-RWj zBg{b7PQ9=~0_E`LNyl%SR4X5W8G2POO8EUkclvpuYM(SKo3UZ*Oy5AC@9`Uu>nk^F zt+Ie&wpKGScPc_?)LDepM)_eh`0k;>EyH zBYB2)C%ILxsQr(W_|p`#yZ+$IkWQ=~x;4lDRDFxW^!qC1oMX&-&`?!2Ie%<>nri@m zWd!MnX1pkoXfdeCTjvrhDMaek|`Z4;O+qCA~-+>OkCeJLx zY`~>sTgE=#zP80s^HS&EX9cC<_$BJ?xbgG%1}f@uQy&B1(VGSb{aI?e?@rGx9H#`E z)%ovw`-F4fM-9>L2BysK-^`uteCI)$7-@R%K+Q0~S5719-S8E%lgj7hK3 ztsnhn`NZa4A#nypVCx@w0uQK^U~4Oht@)`8+(d1}ND1OW&0i)>=CvoJ@n6Rm*#aRx zW)&q=&tA*l8bKipO)j`I1HIRLkWJ@Pf=S1l%FGcXY2%lEUu_!{(b4^#1E~3a@Lpdr z;&q=kRupqQqNg}IdBqrSIPQ2;{DaxtnlA0PD8Nzr00L`#aelPXyh^r8DZ4R|=HX)) zhPCNaeqb&Z69D6Xs**J(Np{X+N${Ly+n*7CiXSxZxvg_Pb)>Q4`Q~@&!+zoefNN6Y zeA%UXknx2LSp7J(Z_fWiMZ;$v9(SPwQ65PNR6)?)I;inwyi4}8>=YxSuO^`GaPou% z$kqkMSjv2H!Np@`%IZP7GDav|eG;~te=kUGvY~d$zy7n%m#1-%ahInKC_ExYU|Kfy z6ny=LXIeqyK%0$@XR}7o@2K%e{Fer3m-1ssGvlBOuLbbt!Gk8^ci+}`PN+l97L$%yhqaqTwCTD(xCx4UJaAsV)Ue;`7UTl7+O$IE02@O~}}& zxQi!O5n>ac7cjneenSEqfU2R9pB}g9;e(oBh5p^k5BO6FWr;0pfd_=D!B&S_JSO0L z<22}K7d26?dxm`sdX!ae>fbIQf;#s4US|8%{xycjwCvRQyHhjV!jrmEOT2EO@bzVJ zu~wVUNhF59p>ph=|E5@H>+H>~QDND2DOPyC15x;(LT}Ot1g2n$ZV`@3rjl^Dj5)U+ zp+xyC0ezRl$4lOt8gc!11Kr1uG~{O1fsKib-Jds`BO`>;x}GfCs|O<5A=OQ_NmZ_B zxti;da&Pe*-d1X@TiS3RLRU4{OLDdAjyW;}A665FmE%Eor`^9U=7{xU^z5gmiaL7< z6u7e`n=@$l!T}m_FPt>_e{GuprTea~<7bi-EEmQmieNel-QRo*tT8v?>&RP#uU=}F zcc2;@l0LiHj|f+Tb3eE+nhyu`FGP6SDT^$f9;ash3- z2}72tyNh3}cBbnuXUsf2YIxY;Ye3xUVEu@a$m;!y@Vfs0kxWaVBVSN>5wqWXqH0dBKEr%WH(+=Y=eM-jLoZ^pyqG zU%@`GbysflJ`{K{CpU*;;I7581T1xEc`HpGGg@2iTxVJ3J*PfAz;AC~2-@+8LmdeI zrtM}=jz^_fHnQEm3d(WqG^#6KGx0S&D=ww^hz&4lWSl7TxaCRjAdWvaSTf5Eo|iSh z(dWl2B_0wUfA9`w;eBXq{JnVl;qJ%s2Z!0rbip)dP5>C?-$Yta{9THwk(xK;kQP(F z*d|y}Ty5@Fu`%?0?Nf*L#IPopSM&EjCk;q3)n^J^y<>UE-6+Dw=m@HZ zDo+N$PD>o5%j9_WbS>(I=F);jStc~jG|i=bX~ts%OcV2npat~hsrs`+sxC7T?-qYG zt9kKft-@INy?SPv7O($oQVDcPR_raQBAx6zU@aqY2wb(_S<3X8^uJV5 zXCG98_NMtowT-i|UCCv&2vu*81MyD%?PYs%Q|NncvcN``3c|p*U&u$(4?W^$KU}|> zHhbsj{a-^AOS>KQ-YX>@caBkkP(Q@4e0*J%6L4OU^;0(d@`NDp?`ZW&uwqGVuB9bj z0vqIA%qvwoJB6vCy(EgK@6ddFWRdp*&9b&p%TECU4*1Rn@|rH-cc0MwRDFYRO*Y$= zNxp(drH231hP!*TDrhmK|oYl~*U^gAns?ppj(LeM74Ybxe+cGY^^ zK`DAZZpr2`gorNXv8$1#MJBTbAKytoJP5;YTNk)B-HmbRRFt>t@d{@ z$6kuZzDM^h$6F8T>T7?>>4fM&v%s%SL=dl-5IiAsA(DK5zuzX5wss6Xim$NM@(U0P zUwc~)dwb5n(|(HbGK#v)=Tn4nbn_@*S;m%&trF)CN%yuBzQ@#i&HRouc>ODeCBUce zdc8+(cO3)uz_BMoCc=wj<2=G7rh>3eX z3PMa2{PQb^)JoIx;;F`OzE-!y$yOV%H!zt+mGJf!Yc8Mrx+s9* zB^En2M26$b!%Ih?^d4~L{&!{!X!Y1xPoboCnUFg1ChKMM4%OhmDYOu{&jW|8d!$H7!y7yQ~{@xXx*s#keH{6l2-TLZgP8!uNi ziMi&P>$TCJZPWCIiY{eY*t-@T%<1s;E0+i2?SxvtD|ZJU>lm$D7!*zCdL^DiZ%kk6 zG2RP^%{aQ)9+k6vmbgdn6d9rAYH}&oSAvd>*a-;`M}25$I!qS91quxQR)Jxe>;9&# zLq>brA%YqX$Ohl<(336HrhR>R+ZRUygBG$yQ2cYv=gOmx{b^aKzTakr1s$zm=0d41Qn`+p0eQspHjlc(vws; zB#$8F^mS~tk7krk#yuXONk=}>+czWG9D#>6LOZV8WjJ`H3`#y%j!oOqrFDc~%tCBB ztlk?Kuqe9?z-`1poEg@!VyoDh+DSi7NJMYx@uyA@yQ>E04PbL+*Lu3+acEhqw*ey= zhWDV(weqwBee&>q2nFx z9wI{;NXBt1JB4pboMK=ORj5WDFUj4mJH0VAzDq1xsOuG7Ea^M!9#{yqBiUDX;cgM=?dI)RE18JFc`Zx3)d^PiiragqVms7xhKghkBOe%t z{B_2Zxxyl!fZ>#_T^GAE-S=C$oR7DEZ*%!d?3@E}%)I~{RYYhH6yE6FS@ny}IKIZd zqa7jAK6i&M9|1(B>3ypxN#Bsmak_yAUDY(Dawf5l~+4KuGQ8P9E zUl+$)K0XQBzd@yQun*{`FS;JNO1GS+gb73T7Anlz`u=^jJ7bqQo5g>kH9n@ny}6gbDfU4x#CU%l|1O zXKaO02w(Zw7$_H90hgGiu8YRXCrdFdpcfe0Uu7OJp2aGMs*R0)7->8V1-7u#zBUy1 z8vw>WrKDmO=`WKV#zEcjvPO26#Ye1Zt)W?_aoKEuHPqFB+rQKTYz~OF21+|*GGI8s`dB!5)!JbZAtkD zXXxh-gQ7t5LKMbUCi3vUlL9JwJ)E?E3I`tAHDqwTI~FAw8|<=BBAUwNwNo>SeMG42 zu7=<^8i|EjDPYC zK;t#|WWgh5L*Um`wQeB(5?`3G4C=lypwJ1UYd0TUSh2y%q@Bn^p;sxM!9}|}1b)nS zzVhgt#cMGj33@&nU77#`z;5uBZ}wQQG9HoOvLo0ujX$mi7*?47Ii(${x-VLC-}Q8u zr|ets3jE)C^JEz>Pog$SNFP&Jq3r%yDwc36_I^H-VR4?aQ(|^Yd(xR3(bGkb+EX+L zNvc35Xl7b1O<3Y;7{wd06m2kp7juPO$QeWF+Ishj0c<`?e!Kl#8jaJFOxGLRfYX%q zwMsS;c4YYWA7P$c>Nj2+yF^OIzzH95ySr46ybZ)Wkc0W?3Pl&eSpx5WsI+omFks5L zL)_1d4$6*6Y~TFy?!sR{_bzpC&jCTcIU;*Nclw1nz1Z&zg)-EZkThP3JFY$orbMy3 z99t^B*weM29zUN!FGT0ayfMNBm#g15I#4;5#tp4&12I`qghIE0Tj24#|E>paX#dyk z@JCWHlum`nf1>P>q%*^SKP{d zvxoSVMnA$~f533-H4=ZTvKxQp9>_EMffk^6=Av=3w=n!+s2f!O2q-J1)W@&R#&rp) zLbl@%SgsUucvyaV4LpAy>44S{@Fm9l>8FsQgJK4w2fjvz8Ac-o+iw~AO zjD4KSwly5wt~{pvDu>v%^b5YY{FX6#lCFiT_uUtxNYc!HP38j$#>NYs>2C59g`tvy zi;81{!K5=V8<*dOftCl*gb7+nd{f45r)W*tq;;`JY24rtJDJdybRmAQClT~DF*LNH zdpm|OTu{}joKH{_p#!+|PBLIPXIc25$6KwdeeI!cWgB_f}gUH??+*u#C7kRpOOJqM@9#xNx-d^4;a*)l4C-$KTW z9!!nRKefJptlM29v&~CkGepMxI%pB5qqym~cb97%aRp~lEGuyZMe7;jiJ-iKaK)%y z4(hMmE+Hy6cRX5?qO6aRpt#8wVbPnFDJ{sv2;kdOJ5ul5D&>~)`&!FV6u-Gfj{vhh z1`kl0NUy!*3anAmzTNR{E~<%&p&95cRA@wu?&_!bvVsQi$d8l?L&=Im(<1fUN^*IC zGzW@Hg5|+u9t!#Ch0poQp13gsDHFx9Q0_&MH_&NizQriXgZ4*x$0vY?UX#`VFW-)Q z_A1cq7?FBWt;yLd7F*5zpjvyaxj5Uxck#9AM(d@ThWDhD-4RNfSXdu$E?pqGs>&Ln&G;aqmRUv|x z$^PVxfoW6ZVz5?ER3!08eJ%T=2r?^%`v6uI>aHp%n)A%5*6Tb{9*sV|$Xn3oT)DPg z6!`fl=9#^S(@As0W+rYo2KK7LSj)K*F%%px85*~z9}X*fcArGJUMUB&d3Ni)yqU0< za14V)k#Lfze|6+c+MoDQmKQ0;GzQyF&<;8Ov$XqUp(}zTl2&4pY=`g9=*6g4CxyDn zPYQQ6Z-42uJ=<*`b68-023-}xF7izd^A}bf}XgNcaMqmyvrL%UWYxALOKqV#Vteu%6 z+)iIF-T)a^Rd6oGzm8@{auPBeFNcET9sRP6+P=o>bp#F8#y1J4F0*4j4WSv~B@nmE z-5gLkT)}$8R#j58q?a`u5!j2uS+Kyb#O`1Z_7y z6C^$?wZJ@01-1NQFRZp6?qy7l+J2tT4RPR=_#=|@urbcOp9Ix00DDXB7=+ux%Hqs5 zM>Vs!8TB}+$q578uwt}iAct~1?8z0%_(mLV9smhb5G&_4hZ`ap)^I-nlOa9C*#5E1 z$s{(qgjVu$6Q2z8$?kIFv*?M}Ga!cxtcaDsXP9pV=+<@V0} zTDN4cs!qYwtgN-amSwgt;^N}G8@=$TeoI_eY=;w9oPni``P*#%y45L&w`V*U|Hlruj)4qMXE;Qix5ZiR7vcFeH zTYK_ji8B`AEtZjy!A-s}Zi8}#!O%lzP6wqfEH0`q3^n?@dJxd9@&aj%dUtJXG7<|~ zy~oP4%N$#qq|H)Ou)MqS_+0W2KLM2aix-7M>fX6N=>0A-1`R#1eemEdUSl`%<;!pQ zt4I@XB)Rhi%H-Lz&vsU|jv+IOjxFQanulD77!wg<5AHwKNBRyjPHqc@G?iEsH8p4wB8K8}VRU!iew&UkymxciZnu2J&Da>s);u=cr)4YN4!!d2 z`&5$;hJoTT%hc#&zC#}U!z-rId$8HTJNAa_=&EVfUgo0LVQ{Z1Hl(q!(L4Mk5=a{# z2=EL(k_;MmGVOQ)(Dv3k(LZXtY7c2+h5Z98Fh)AcGd3cRn|GN9ydpSkxzN;qr%$ta zGdp;uF;!y^?@`g(V#uTQysUwR2auOvHp?E?0BCM;jAR4~?fzilZP0EnvGV{{Q%CK> zA*ZIdZY#BHw%6TE!ppv%2VJqTu~F(Jcj!}SgvjGF+{d83S(YM!GNFL8Q&No6lRN=v zUBJ8&cQ!w-giL))NfaV;?B$d#Z8GKk`zf`vu}os1&D#DM-JRYWPgBFsFn-+~FLw~Mgj$ww_fuw&1Q&q@yV~#cC zdcw?N^9K4rR2&pDzqp-8{wonLV5U2mq~d#k1ksC`a}=r(PV+Q`50ypssgD7GJK;zB zL~hdr{8jSf`E9@32|os_>u17xW?wh>F?DN%yTJFdv~(LI2TGfu{Y_ME@;V)?o~}Fx zbJL~YaTA!EY6?>W14@`nBQCvAe2KhbVFrAWa@C}oDKcZTrIRL_(+k}{v^!M&@Gg>X zT{Axqc`3J2-kap;PSmkFweDdf(lwdYqIsm=dMb-u{~!n@Vr({7Dk=_)ksOLA;2X)|D^|M%Hl)ugr|=!YfVF1d>;dZ zuPylw%-;YAxjAbrL&t6JkU(^j3~&654zn!>v*jT(y}*K(_B>(HdPjQ&T;Sm8K*^vl zt9<;z+(MB*`HVxxCzO5=JB&HF6b%p%!wyffqJk{iu zU;=auSpxT!&5fwG>oUTv&a^h$@w|#5lN;s{FcNXo^w&FSL(x08PDMBUL2nE3e98SA zy0g^hFXQ2w2n_xhNObH1s}IR8g>x zSNrbKpX1rBHoj()WJ`4eXc}QPp}4IT=2$JR1-*HMU9 zc5vbu;(_0XWSM}IrD9%MtCHu|@K1Hpz_3QKt;=i@0q?|?7nt*F$KKQ5GI6yxv%t@U zD9Ml5^rN2ntCWbOdq8{^K%K=%NHkRIgbsM~DuW?DaYw*2JH$)eQ?%uFGJ zAM<49gk!_FrRTuce(t*F^``Is3T8m+upVWT1D{oY5vj8d&{-)iC`EPoZntRDR9lUxiZSI#_5Suj3U2ci{j+(chpL_7}qORWl zMS*<1TgJJ(>z*%bwc!Yz=riwjRHH-Bt*H-Y%qR4u>C(PqMZz)nh1YA=W7 zcJI6SkRqm_yVKs~W5!ZYN@n0;+4dh1>41>0X1U(ZU2lC6))xJG#}QV!HT~MFLK00~ zrs_`F)E%*47$?Y=ofjqe`G!jpq&$CXx!Y& z6#a%|)BY%#+T~JNVv{dIT8Fs6G{TPGdBnH=^)h5;2o>z)INX>d5j-^*$06aMy)wnC zj5(|x!ilhphdR1OJHNv7C+lxM4>)0Lm!@Fz7a=<{Jr5!byQ%Xy;B>gdzGPi~Ktxog z-FI%k3ChX&_;FFvn3y2(;Of;iuPWDn0Q;Zn_1w<67qiT_C7%@KDEFrf8aD%&g2_L% z!Z};a3%=6kpDN^o_;b_LhbN?86GSl6A=jR<<9kcOC3EDZ2tCNj1^9jrFMeezm;H8D zP<3Zs5wt|5j)9wXI4(n4M1wE72a|sI(%F6XtHe)6wR%LX?x%H&*?$0>`epUzt%S~K z-0{Zokxv;uMjuvccs0<^LfW&qL#q&~Y@}vlY_beNM~{4#Iq<4%Pa% zJI4`u7-u90l62l>a+Y=F&vW!@iA03OK{9|(;wNH=IGrRBGiy;>9)^Exl28D00VCe;<98%g&kW?vE95#`l)7SpmUcfS1hzs04(hL;{U7RtITT! znVlD*HcB&HP3ujoSxO=Q?8S?DLlzfFSMm|{DlxmU{7N^ZR-#cZIi+?g^k3S4@|Wlj z=BG5g5H7E3I#rb6R0ofoGfNlM?KQA2>6#heBN4jgI+NS>(f&Cqj{=W*i{*Q257VdC= zr`5k-3+vLGKF6%~kBp26a>gCL`)^L?=!6Y<;hIf&#{0|&{nGenB z#A5MGCx4h8=-dhjsH>|J{U1DZGYAN%#ngJ23jJ?92DRb=B+A48MtuAKGOGOl4btO| z66VlPOw&7yIf{MN|AF3tGr=T-e4K6M7&x*ux7sOP#i`wPae^6{d+u*9!d85CMy$XS zYZEn!OmKzd`}ZTaP}@%S>GJ0FmrRqG&sYT?SAQ>W>NW*ZAM3qfSlHOO|Ni|uXaKl7 z&h#@_$MnWM%Ig*Sg&;uhhSz z8_u*!Ud(VqNt_2xPLR#1giFE3l7t5^e$)9RWUG7}rrB`P)j`uZT_nURr^QceqP z(j$l&2Q@E#l((8>hVve*tgJ!Dj9vUkE5~J&A&kB(+q~J%RaRR&?A26$DK;kr%5q(UIYEg&d8q?wG$ z)O2b;Ei@3pA%0CLerE~D426}v5BIhlD;!%}m^pz)mB^CNr3}}Wm6ewjOq}h=%ptV0 z@ap0|dQnJ&j(6_F4^=;4DuuU*X^9m50~6_>HD%@3N?;VOelz!52-3MwiB<0vvh2tq_aS|9Ca-{f8`9NKVfA_TIn!os+|p z5Eo}pn_BJHC*>}W#*^L1t(nl8Y zG`iOGWZT`esC)R_spKd4Buhm*jn7mxJ;C5{(Z#{ZA}2A5C3hl?x&rrzWDUXfE|ZYBW4BmW z!GOOr3=qo6WMcX!VZF6Me*spu=wB}z8tQmWTy6OD=>xdit|jhBLX~y)&EKXVRG7xc z#W})sD2U%(UEf43cMQ?&enCHwP+VF61BTO;^}1}X&6s|fqIa)+3XTdY%v6R|aq1Dz zeMzK-dfD8Z=^x;_Lr7YA|JQhxS@2CGnEmna&oCYMksR6fGxM2)0vll&H55PI_aysc6-hXVJx)IK@r=Ba8lq48=F z{Cklq+FZ3~ZFlm6)U45!wJk)~xRs_fUrxubuJM}t48@3FOtraZV(H{@~!UkG~cf#8a zwRo!};H`C|H-RAZoNU%^pGkfW`%HMtYH75FtG}bGMspZ%;O)@Bz{Y~QxOioK!xPr_ z@A&pa96VY3MpOd7*mC+QKdZTHZMFfmHH=XT3UxsO3Kt2pbATDw4ht7R!g4yK!5yC_K%H6WLfz;@wzD4`*zy0zYlM}f}uAy6359ck9lLB z1cLRiyRx`5y@ci>&0NZJS^dob;a|C@8){kW4|nYDU0c4PyZ-1tVa$LyhQL?#$A<$& zq;`{|Te)?z?kY6ruv~r$vF!rqkHadB$bQ$C>UZLl^0Qi1cjs<)XWMsBZS)Enmsd&y z&M);_(y8vi6x(Nf`~v6>>_XkbLbeod)Le)aKQ zZdo>Bkz}1Y&y&P4_y@)e5jy7nIe^eohsi1G73k{N2mHbYs*iTQ5Y}rQ-)9hV{+v9~ zAS6soS0wuRb6zN2dPv-IX|4obdk=!4U7|h$0ah5hCs^(iPW^E&{8zsJ2xVKY)zHYs zq?t&UE&OdFQ{F-;zieReP&UVHriP}(X#w(NAtoio4&HJwYOZ4~T&Z@Lfb+PHu=(LX zNq9(%VbaE4#5{EEdisBX%m0V5+2Z&AMBU>lhOtRW?!hwNaemwyarnOMt|TWXSBC3t z+(CdQ+=~?0b*C#?s1MP42x?rzc_hc>|8dQ#8@vLmE=~uOqN9xD)6m#Bhuc7d>LWz0 z2T;VlTu$&v{uGm_e}$+necaZc2+ue ztO2fzsRrc=qKCb`J!fGIu252 zgo{8PkX=;56%9v%V*%VT7O*Y&6PS$jf)ssG#IVqn%#w8bkom(Y91)@dWX3uq+}1z|J;?yRuIFg2i$G{#Qb8!Ods5X$dD7_;Ac#{8aPi^#}{8K)NM+ z_7Ek?PSQ21--yBwg@qcawz>$nDR6B4A-3*-1!hQfEXsF^QLxxjPekmJ2$9{<#26In z0}{p#lh$lglEqi@(Tn0wImeuQIVMU1##ekY&N$|{hh*(^#pVVUi%qn+a%IE>Mz!&! zOLK@8Kbn&d*PtmqM`j{oQx_qC^qmrH~iopq1dLl6V=G5H+1i6IhGHQxUNs=pf0&^p556Tqinnj~ zoDSwpY~MZ{c!u&S3H9D>a)=SAxVZpg!2mn!inIV{jf@z28(d)@V{v*i6(+|M{KeXL zsfiOVMr3knO3v7@6aV}7?-6662C5q%mm3)Pt=3p_00!-zR=(Iz+9~CP9QOE$)1>w{ z#^SO5<8NXm(N+01Vpd%+-R$`f-AUg14D}E)&P5!WIz*0xQ4PwZ>LhN_gr#xW8U97P5(;3!eJOER$2jN?ZVBS#rqz8>2s#zCBKAAeRZ) zniazdni<^abHU?ggbqH_h<_$_X?0+ebL0%td+6v_9Xe&JYzToh?AYRs`aG=kt6&lvHYV->+rv%a7dmk{9!qU!c?hs_aPa312a z+T-+biCn=+m0#*oua76sPcb^z%OIaFEVGgr3k>&ZbR6-!yLI;ys*zj;X#cmweFCq2m zD^c>>$3EMDh`8w0rh}>Gq%lh40_D|i)6$q}50gG83EWG&t zr)+_S78Vu`&3c=qWviT$EoHNZR#(lnM>SsEJyBL39`=Sr`h_l>u-4b7hAsnsi+NeN zx*m`vSEMn#&HLHh+#X_PULTm{trs{9LIZsAI0*tQB8?$rI6dL=o<_9L0qTTYY?<%% z&P?kjp0-}z-H^wRv!kN+Lr|H;1&YKUJ#pd$DB5iKw{NgSL^sXCC} zkf3Y@*Qd*P+Z#0>4#vhd-*9q9pIUES% z-XXYUtvS&(?OMhxu2BqyafJSbp5nYGuOU|1N5=TJ##woJ`D(~~{5F@}-Q!S!A{o)w zhFXFQ%~_Ksu9P2E}+E6J0o>8GRuPo;G&f}bvtTHstYRCn~s>g{5q@$r=g(+~~dBCXJg1W1uwC{WV@l+)giq2FF>{1>4u@{gA4)}xH+$IZ?tKsbLmdg4d* z;Z10Le}yEIqlgTg1kcZk3lP1EwfJ5V6apQaa=!}>CtOE+P27~x@+KBo39w39@6W1D znp;@gKUXmGc2aF4_9HbYyOWwEc<`r>>we43Shv4SKQl&o@R&RINDR)V6qjvmW&VhTt{gs+DSb$5_LF=crhj97wS=g9z^sH8>E9E7BiC$~ zoTWVE_L24sIP(giU&eViC>1Pa&6~=+d-u+xB9Lcghr``dn>Z)mq}m_OT+=FlcAsb8 zrR82)E@Ia%r>WV!-gbAy2KP`!rU1e{x}=Jcg_NnG4s|EugbWz)h=Gh3aEfqG?=(eY zAvvCWubN1<*w1RRhSHj&HgV8_GBkWAExJNF&#LrJR{RL9VyHS;i+={`(Ae!FypCfs z6{G&QVR2#wDh&$Fqtn`_`-5$DZ`7W>8ctQx=5*(&o`w1&bWl#cnw zsHJT>E|4oSVwQO<5-4;~bB?XPXs->6o>2DX%T+44tA4;C(=yQGqY^7ydGKM&$`*PW zf@FQizW5;+a3sdYci4(LSm_Vie~e~wb@2eD)UJsa(dXiRBcDl=XbakvnAJtpp@(h(&<`v%ILCX=b8+r74j;!+DI2OejI!e>} zhH|nKe0o6p=xA4~Tg$B(AwE}Obd=lgNy0W<({EU;y*=`^Rj0uQeynYRlJnNFYw38i z1_D|lMNnXrMYvsy+{YEOETXXfqbc{inVI_sP4>Q?JVDN%ij#X}spx0ZMc?7y6kMof z3!WZp6Z=!|ab==q$ukc~t2J%l(ACBG$>sdMXkJTW<;7oJv{YYTiCAWe8_m_bF zRjNS(*r`*e1ZAtmw(`>#u6FbCxizvA;RCjOKg1iGUtu@sA0m}v82j|;jp|2&JY0vM z--_{{8%nLI6@P}aZU4b$(!Y9B|HjKGsNUNkPg4l=tb-?SEnQ|u#Jd&OLl9Te)$Lz5 zzjm#-BE>Mc2SU9gh;I2W$Qw0S+uK*-Gw?y47%HZe4NE>~huI!yY93OT05itHcb*5d z&St*uU1nxJuUT)Pd~<`OcWzgfA^{ErV%J82D}%0e0;(N`K>9;AlJX3Nb#A(s&Bv^> z^fo=9P<2-xz41;lX%~%z5lsp1rv;NoAR0ectwlGam#{;`^5mMnYL<@q( zexaJDy=a6goBL&Twn4cs87WlbOAmru|PkGnOaY|49s zipa3P!vGs|JAhx<+vCe5_^4~(+-L?NCZUT1_XdEC_08@O$J_wemQ@ofUg9KeB;yqo zx(PN-37F*;vj@dGASTuW`yoReBaq1=nTo4DxBQ({m=7u{Pf90oeKAC`&Mb6j-|CG^we=QC)xndn1wu8FoUt2ywY4-N^y)MA^tQY2?rIpfdT5 zjh9HX^$MYh74jQ>{RQ2>p&9>#te4GJU^J z`t6oe(}C*snM#U$ogOWG7zrq(sk~Swi^YJyG(B8G93MV6UF^lawZ6LO!{w zXD(RK_@y(8CyoNUX7pmT`Y#@aQ$Hs=`=^3ZaJwZov{v-qCrbiyXKa=!1%0#8>*&o9;_*=qfPF-X&nH*3wc&EtM zF;Wqij{=(=mXq|IFC%%a-v7s!f;)4}Emb1}NjqfzBOdl& zlTT^G&erdH8)R+`v(6Y9ts1jyeV2dvR_`~_e}ZA!&4hulQJ>%A0|14YU%fiEeR(Ty zgeAM5NzH^?4KRN`&q&&@!5n!hJNZgY;)M$rP~UI8$scy>riomHl|SD_jw`bA35u(C mVQW_AdXF_CjlqU2-&o0b?ByJgLhn5w76hbs2t_)f2STrp6p@|~ zsubw~A+*o~XLz3Towd$;&iVDO_d7qh$;_IW`?|}u_rCT_@Jmf)S{fD_5C}x8s-mb3 z0#RNEfhcZVJa=}6uD=TSN8zHa{0vmm$3_4S&cmK+JOzQuBQ77mq5_UDIjR`CfIv4~ z&;BT;-g0_^Ks?*3icfVt&DJJOW7zS2#LY%?c|lj7brY8;8~xtP5>41ip6LSKPF3V+ zxkz}-42>YK0x}@XHX3Us?^^{+O0iPKEyDWRkJH zN?J98X?PGDcYB5rEPh}y46GP`iWr@=DLx@mhe;&}nyvtWWq_B|z0ZR{@_f!*AW(qJ z|D$afTvSg@5V{E#Py1s=PV44%_4h>cpDs+K9*u--DcDR3HB5R5pPzO`ABEksY7tYe zSL6PGaHPA3;@vloaBtS9I_;HC^-BW+`+lO=PmUG_X`UcOTtQHeM@o9?THPd9~H2 z-?iDf=F0x==6dy%Q1|JE{n9Q@=^*K9$c(bTaV$}Cg6z!T`+ajA1Kj{OP1K5=Fa0>9 z{A{BUR_}kLd23^mUdqSnAU(p>UJe?Yep+@Bu`jOVHC?;TR5(LSA8_O8uG6l6wsHB6 zr~k#KQPmAYq?=4bhSmdC zk9J}l#rDz!c9#Q)MMUmupoc#er7r~7@|9J(w`l~Korfw6lrCYP(k;YSk zrhGC98N#h!Y=vAMgbXdQmx)Y3`WRqc6w}7j5ceQ8e~U7Nv(80?lOK5S%1i(!-7v(A zmql!1XPx^umUvZv`%@KSi@buhnd;t+A?mfV@K}QlFD0A|w;pzh+}YnHk>@9%W$WjB zzTaLv~|9dV;% zF%+1&pJYzhq_D9D-LPziUy^%CMZDbVae}_$nJKVe%ey~i&e-Y! zZG}`*fsLuA=>v%+f$7$lhZ#+#SOfh{s7f2gZXCa1Xy877I!}5m-``GQy)g&fU=IqJ zIYP}ajR(5PnKlWW2fw6h9%3xwTi6n~v;U2EA3P1egs9;q(zSLw#8U7Uwp+DJNSF%m z#sodVLR{x*rcBOugFMTx!t`Y$iQBZ{WW^D!)+B_sX@(J4tDX`&V@6i=ag}FbI|>fh zYqeZHTXK~TtK{suoe!j#%p&Euqdj`N-UW>vdfCg=J49|NZkpi(C;3xEW<~J~Es5S# z=j`mt9U47{zt1-1%?y(0!`P{p`6d7E@19mG%MoB$WwAcKY(ktaD>}b zuA8VU@`ARqu5j0NOIrZ99=B2yliL>hn;-K@;=;JyYODb4v}lM8ddSMd_x+Y#-w+x5 z$|@thad$b&<+Smr<)Dy5qVT!?9{JCA4P9{cwn5e5d|`7aeq`#XMh|LKSBv^tet2NY zZCq&Hu1abE;Kiu)ol=wysT8q@y2o0KI(<{fYg_4kGRuuw zaf>L&LJ?}IQqK*aTRd*VyKaup=+?ti zT0$+0_3#_NOrQ$}c$qOH{3BaE(lY$C%RTY`(yv(IPled9d?(MW-Xtj@^HI{c5_=^V z6O{C8M1GA4?=zNBt$?6;!tOU(uXsej(O zW_8cXN&@KocTS zN5Us^^aGuz`-k-a^81laT&x;<8&9kECu+>en@Q-j<%)O1BrkX&?BvLwy!d(>zVpo*+D|C*Wj0rczH_JBh0}Z~ z<2~Me*_9S2#>(Q}k$!2(EEpB*7-x+ow$r0<9XKaxZ1fjBK}Z$>N=R^y=r{Ax_4F(jrhW$xTJR<#uwP!PxtR4ujR0z|9>U6C}aylmG-B@iMFZK%q1cer!%?lRm~_Q|dJ z0x#*4!RJ_++<06z=WoJ6)!Uq6VYw%qsB^B7@LR{h5@^zWzNxT7t)~LTokh?g=KgPO zkJj4N{NCR;RZ1v@Y|)xn_n9Bhcj^0!OHae<7MHhJ+s$*ADkL+WS1U};`-!_IK?u%LbQt+}lS`5U~w z#ww4l4(8)l3}lG{SPnEf;`YcWXQZ5Vf9U37nFOH+)^-w;uoiZP)NGas&E2Hd5FHd zxQRNn7`iBbOk4~hikRwLS^6Dz55~&}x`FUf*qby6_foA>ah2A^SL1<+rwQG&9$Yhr zGWbgG70c@RCEy!nOxxj`vy7amy>+w;*Yu1M71Yn7X}X@jG2E^tk83KSo6vzn>qlJr z$N~+6jUKku6oJ@{eGe(+u9r@DM?+s4&AFG3%Dk2Ryr2~DBr#V{uoE?cMYyfazG^!M zN=ZU?rT3bWS`4RP=d|m}bE@TG%yrcDsCo;N`xw?YrAj<71`H=AZ;xmM{p1PK5-^L! z<+u9`t$~}C=4I<_g^S!H|A~aqge|KC;MWFBppTLhu9NqMqjCuoeK`RHgZhiS02 z)LpWr>mwtSf*Z6_)ZW}%_PWFH!dqy zxWSdtG5u64JaZz=-`8UYW-Qq0lNaB?`X*h8$D!Hl$kn&OKMy)-A4gI7mO*$5xpBZM z z_Q*}MQJB`xJ>9iuuXtDKijT_284BDn68y!7pVtIdJBgC`+1@>8I}=rfG2I1WGt(69 z00gj;wn>@XC$+b7Jy2gb9h9c`$6?cZ;}}5i*Nf_^ z4^EP?z1nMiBCgV|&^=pj`c1?bOzTCcujO#WdQ%gLR~wp;0%ec3Z-H;x)!(`%=Fs2N zYLhn=h$1kRkgGxvzec@nGbd@ch8lztF!oo}x-LGsw@8YZ-Q&pqC_YXHQV=++&P5)X6pI=MY-y2W}*ni883A;_wS7RaBeSM07xmZ zcW4@Ri2Y6JfS3o1W>j`1;bL{k!%X<6s7{OYfu0K#9_4-y?m7Pwe$`p@~CG(rMU*$P{Y(pxN>`NoEA^qqt5CeVQDNOL6pAS<6V;UW3Tp&i^1!=T zRG|iM7P8c`7Q^Lgzd~t$%Rw1Tpk6LeyE4qmEz5smh%qT#x$?CRmBo^aIvHz5g^w6P zIUS+0URhAmff1Cl%pa;?tpE*MHTrv?Vss8|lDKZBli9edZZ(HvfIuK;FPwT8@)P~% zGQB5ygMJ1mj|ZBU1akT|UTnh9ASwm++r_)L$bgjQ-7h!Coadu-^D@8Kw4Gqp5@Xle z4{hB$L0@btq(RgP?2qy8r(N^)U^rGcE~}c^n!0v8$LqP!8*jm$((UtX17apbxnsf> zc>!!jHSLstv8j{>@lC*B3AZruY=aWIp=Q@wr!6>rBajmnc)DF2KND2AwSKMP`1!32 zw2_J4*AF-bOR(3wdt^oBk~4{!%1OQa^&c?_GyYplDpSD@Ro&jh$%<=$TJ<5(uMGmi z@(;I^5tTzp`rpcP9S?CmVUN53s7{+a3sYt4E5ncwGzWBj8d52i02CwK?2mvdpu$n! z20W*J-Y%hqrd&|6Ovev)&A-Hmw{MSS(lfs4ucm1@4 z_5~A{%6ivK{!@~4>QNuV!ouw7n`O3#nonVS1?y1gMl;76qLk(&#Y1ZE^H~k*!g+JS zSkvv4F!|VGlf2$HXLXY%VNRTdVq71M6MgtOF|a>+f~gKoHW-ZYPA(v$Z1Jd^iq zWA2V8F=<_&E`efNuH+t1w^Y>xglPdL_b`x?Y^T+$;l8%7SaYIcN7fzGZZoB-9bg8U%l=G=@!6)A>%R!mO2 zqF~@LCPDJ|)uZ6F1j;S)ysJ|Oo1>jE*vqvHffhdxmQy^djY^0><(o6@Q#G1J*;LV# z{)UN~6t-)Sg=cnZiz+Sv2htmBw^~Weu z*11=#JwDFliBCZgMkIQY7xkYa5>T#>kYZfc$co$B>(_iOzWlxWz-&e74Z5Q6D#GMh zyqqO(ZNLWzH-Z?^E;s#SVJ+Ye6f5k+IOw<5UH(I>zrE=wW_;A;hR+!xKUm|2e4MF2 z1dISeI-UM@xg&vSHVru`uG=x^%t+_gYpt8eCC{IJR6C6U3TMY#i4>Z(hA>tyd{1H(|4#ZZcI~K*#4Us0iCvj=xP|{o1b; zG|$YrCN^R+x0_spQ!##LpY3joA*0&4Wn>#fx$GRO_9fwYyd!FJ)0qux{ zM~#*YKY5u^xlSo1OxVfs95Zt1>5{sA@bhGm9Lgt+5#BFD3t5Ox)+Y1D4&Ij|_IwzS zv=Y@Dv9o?TM{b%k%&Ov6jda>;B^}6n9C2RV)|N6=Mv@^1iiYN;wNF*k9kySl6n-3i zOo8z{o;A(u)SJldSND!LVRR5FSxv3u-@MYflxVM58EOV$i-~S>3~>$aO6uSarNoU4$u0*yvm|44E*Cf%L>40Rm)U>ZRej;$}PzD=m3`%=B; z+MMP%G^<3&EgE^+0d1pZtah;98G0j}o*$Q$2#F<;l36QjJizhAPhA+G?cANd7ua~< zsu8`A=BlwBz$BUcl;F+4(8jvA9nwGeDw^X;E{&v)@P%Uu9;dR}jLz}%^Vf3JanNqi62Hv=Kdse zq_7I4#qaQYML}|NmO9mNw1<+11+{}AV!~EGl0p!YV^d>NqdUtKi{Ikna}0`;YhMRk z9#0m}?_{RW`Oe&O8!j2sJbcY17lXkJ_~TG@LJv&764 z=cXRCz0{wOqn02?-ocHS`#FInU~*`St<770_38of`a36U>PexaOO5~Ez>$>1;$ z6KIJYqiu_I zZ!}Z80)xYSj?d!H`a~B*kHxNj;rb|${z!FDhulpHR-sO5)5;!XrZ#3%=_Ry;{z?ot zknKo($i4=8(rb-d&`8Xdw2+<0n?2Y4U@Eg~Q}{)%pqDp1I4Nixhmw%zizg}C>0noH z+hCzRN2H-QP9bXDQQ>8~ndR{co*$z6qp$Y+Y_`@z-CEwrL`}_$JpRu{HPDbKLh#QI$CphaKt76S$&(tiwh!)Q@U40215bmU9wBbq| zcrOQ6P{l&lWS2#erpw>~8Rxk~w>XN67PyeE{}mz=6JXe$&-RG!oB=A;0EwCL*9A9v~H!ItLO4vHb^aDlv!0Gion%b1@1q2`hYG7_T>rA{`+K82w=;)mZaLX+1(Wm@gJv*slczkw=hP%&a>v;1~&-HE8 zD0Z-H{2cEP_2TTVxp3drYPSq)=a-fh?4T#8#23fiBq!e8$trUgc$4+YY{3BWPB7Qg z-e?-fukm$K=44CpI0m9eF+8~fWxQiBOn>t7Hlkyxe-W8~Ns``i%&V*o(r*mD7Qva| zlW{=rWlbmQ|0GX2!bC2G^3j!EZk+@X)otk+Va^-e&}52KhJ!gt=p2*GWTqk3{AOHD z-A|*~K9v2Sr6FYBMcyuNRFU)vml$Fv3d0I7dtyx~^EWMmKaA)+WqZNl$`TB}{;7ba zGu8dq!a|1j1IQO|T}i+9%cX*J9m@py&%mY>x?}u2~nN%v+X)*`qP< z7oFMSIDQaDsUOM8?7Gzpt-fa!i|_WHNsz~MYz`o}<3%Xs!}5NZC57QK(B~{J^I)Sg zim0t{hmx(^^2JUvA&rL#tDr|u=ha){tc8!GZUbg%z|%7;$Y@?2lzS1-@dZl%23(#2 zAMl2~B|FZm%kg=NNF(q9{=W_Q&LDLvE?R`4Kc?YYq8NZrLq8^){Co_l1G;!bf;X4w z0Z_zg>g(%wALgj}?EWdx2)D7ZfhVP;@U1EgxMvrE60e_4gL0DUS8%$4fx&=gLPEmX z#mS7JS*qc0tgMvq?d|PoxsT)V6g}sGSMRv2p8Fl?kcY-t%{a;0mFigaifq<6fdW)d z7ygxJw-r^(*W0jjk7R$Uzdk-tTyv@3kB{a^h>!oZ?2&epfWj6X9C%@VgtJS(hChI7 zIo2J1QwU;fu$y?Y1e>)0;nXShL_S<7;z;2f+e@Mr)nB$s1n=#&jL2j-BVi^FC@IS% z+Z*P9gpA>q^UvubgwrGwhB)FAk|Mk52JYr4^7+& zU7*<)o2a3DczZkG1{Z`UnYuyuAbuRGm$k(mhhZ;{Mugn}UC8Tt^IB3zD#1ErNbNbp zPX2QZe*|Qz!pv8P7qHB8%#?J8b(hheuSxOkg`tI@T)ji>7szLluoduCPr1#nQQBpC zgU2%(Vw4~Y`D6vIc##7?=f;Oa$IMHQA4u`qxNl!s){jiPg}*V(SMZ?eP`x`7ZS?cS zfGx$NPjE}a*J`I;EtWF5Iy|M!_b4n}LcH1liV5>dnV7`t+pEJr z_a`0CVu0n-!<7Hoi~sdlrEk82rCBC43It4$%o$>hJ=+hZO#Tro8K?2vMGE3i*o)EC zu$1xX06DZ-ZBqO4;lVYbBDugY;>~!h^E;|Tj{|>Z)t}1DbY+jgTxP3F4s7XKa;@o- z-t^5wX79fR&pO;wJ$@ElBTQb;YZH=vrs*CD~IaBP;4|9C%_)z>?Fo2^QFt6NrQP>T; zf!1U*uk=facZ8wXM|-xBe?R6YBEnE~15;uy*N#syrhN23v{Fn4C;qZ6toP_B`vQ7b zx(j&;_)0`YIS|betI@?-&uFFA+p+m@cg4Jf5(N611b)8cclPB-(!cK({QpmPy}l$m z4w?KVOl76+FhvhP?HgJc?FyO>WGUW-EEwJMPVjhk|IG9Ta+O~H4e!aqp#;Mbouo!( zU7e9&J=>3@009L`!|zGROD*Ra3`6~E_t!m2LK`X zOpGqc2VVk@qG|sOnsFYuFJdYgd=RFQlxAe^<;_M-26 z4;$_1@Nc5~)wNHbsN&+D6rhwNoFY5~LRvQ$=s_lo$p&0Vk(^%~=J((~b>`A!eSYOL zVn)m)q&h^3-g!gu+gv~xE=EDk*^)8NJaKa)oO8%B%T79sjZ$$5nw4V4dGLw|AkuVR z=?dm!*@GRpYL!ZPOv5VU@9CI@A}=K>_5K#(AoL|2$5%WQb`Cv=iyJ2y_&8C4zVj`z zpE~;?L;UteOPf1yV~_<&ATKU_s1}u?k!h&zJ5#C_Q5!mcRTnNpQ&Up|1IN!d&0ieI z@?s)ID40LJe!caN#+*RNZmRYK4J}`t95P6uA%|2PoWuZ^h~&BLt0jxHtIAV}@hUju z(|f%%XDTE?38{6tqnHYlr?kiLMbp2TBO#I(rh2MyRIitj|^&wI!6IFH$t7 zVm6f$MP=S19PShJ~@~a;fSOvWu z3(qLp5%atcy5ayZOSUWQM#>dB(#wg3m>oQ(tmy)O1$uB5~D&l|P75DvSsZzThsONT=d4zYE zE5k8Mmw=#6q78?Esi|Gq`G6=a5=c}W5QVP>PhZgSgFIQE-Ta~ht-^;LL~yXqLrgu5 zMXt5PQCzfjwoL;c6ubIR04wuS@SWnh78PI+CCCDajL-Y)Q6F%OcK{f=LAzwcH7`76 z>re%1S-y#j1n>sYi?l`{%yi!HHs#Eh3J0@H-sLU)guFD$B8s$0ifrx}`rod`Agu+D z3GWl{=NykAImqo?fU2#!PrD>azXfy26kflTVFH-J77e0H>iT{2Z9lfNfZ+=A^XL1y zxj_rC$HxsnySuwXHa%L}C1c`wdAOl}D?hA#u#s604+W^Xu*6F~?#X z1{(J!&sjVd_#_@}V>uS)^dn_jyg)2GXjl6889AB!4spHzaP{d}<%wDk;%d&Y1V_6W zx!VmOCE@KQrG|dM%YL*Cyu$>6w*H+K5TK^OGZHJ$zAJm@lB*9S9#?UX+GmmRvoI`d r0DuR9e%$*%+N0C6${ggq;(EflePYHe+VkBXI0mUIX)2aHvk3ejDV@d2 From 170fce992d89ff18362e18f604274665307b5ac1 Mon Sep 17 00:00:00 2001 From: Daniel Simpson Date: Thu, 9 May 2019 16:00:36 -0700 Subject: [PATCH 466/724] Update safety-scanner-download.md adding version info link --- .../threat-protection/intelligence/safety-scanner-download.md | 4 +++- 1 file changed, 3 insertions(+), 1 deletion(-) diff --git a/windows/security/threat-protection/intelligence/safety-scanner-download.md b/windows/security/threat-protection/intelligence/safety-scanner-download.md index 890f7e0401..5a4ea7bd10 100644 --- a/windows/security/threat-protection/intelligence/safety-scanner-download.md +++ b/windows/security/threat-protection/intelligence/safety-scanner-download.md @@ -22,6 +22,8 @@ Microsoft Safety Scanner is a scan tool designed to find and remove malware from - [Download Microsoft Safety Scanner (64-bit)](https://go.microsoft.com/fwlink/?LinkId=212732) +[!NOTE] The security intelligence update version of the Microsoft Safety Scaner matches the version described [in this web page](https://www.microsoft.com/en-us/wdsi/definitions). + Safety Scanner only scans when manually triggered and is available for use 10 days after being downloaded. We recommend that you always download the latest version of this tool before each scan. > **NOTE:** This tool does not replace your antimalware product. For real-time protection with automatic updates, use [Windows Defender Antivirus on Windows 10 and Windows 8](https://www.microsoft.com/en-us/windows/windows-defender) or [Microsoft Security Essentials on Windows 7](https://support.microsoft.com/help/14210/security-essentials-download). These antimalware products also provide powerful malware removal capabilities. If you are having difficulties removing malware with these products, you can refer to our help on [removing difficult threats](https://www.microsoft.com/en-us/wdsi/help/troubleshooting-infection). @@ -49,4 +51,4 @@ For more information about the Safety Scanner, see the support article on [how t - [Microsoft Security Essentials](https://support.microsoft.com/help/14210/security-essentials-download) - [Removing difficult threats](https://support.microsoft.com/help/4466982/windows-10-troubleshoot-problems-with-detecting-and-removing-malware) - [Submit file for malware analysis](https://www.microsoft.com/wdsi/filesubmission) -- [Microsoft antimalware and threat protection solutions](https://docs.microsoft.com/windows/security/threat-protection/windows-defender-atp/windows-defender-advanced-threat-protection) \ No newline at end of file +- [Microsoft antimalware and threat protection solutions](https://docs.microsoft.com/windows/security/threat-protection/windows-defender-atp/windows-defender-advanced-threat-protection) From 6ab9f954d99e1fd29d766b3b61cee2c762c56e42 Mon Sep 17 00:00:00 2001 From: ManikaDhiman Date: Thu, 9 May 2019 16:29:52 -0700 Subject: [PATCH 467/724] Removed ADMXBacked info for 19H1 policies --- .../policy-configuration-service-provider.md | 24 ++-- .../client-management/mdm/policy-csp-power.md | 132 ++++-------------- 2 files changed, 36 insertions(+), 120 deletions(-) diff --git a/windows/client-management/mdm/policy-configuration-service-provider.md b/windows/client-management/mdm/policy-configuration-service-provider.md index a565731cbb..f1fdf56518 100644 --- a/windows/client-management/mdm/policy-configuration-service-provider.md +++ b/windows/client-management/mdm/policy-configuration-service-provider.md @@ -4117,24 +4117,12 @@ The following diagram shows the Policy configuration service provider in tree fo - [Power/AllowStandbyWhenSleepingPluggedIn](./policy-csp-power.md#power-allowstandbywhensleepingpluggedin) - [Power/DisplayOffTimeoutOnBattery](./policy-csp-power.md#power-displayofftimeoutonbattery) - [Power/DisplayOffTimeoutPluggedIn](./policy-csp-power.md#power-displayofftimeoutpluggedin) -- [Power/EnergySaverBatteryThresholdOnBattery](./policy-csp-power.md#power-energysaverbatterythresholdonbattery) -- [Power/EnergySaverBatteryThresholdPluggedIn](./policy-csp-power.md#power-energysaverbatterythresholdpluggedin) - [Power/HibernateTimeoutOnBattery](./policy-csp-power.md#power-hibernatetimeoutonbattery) - [Power/HibernateTimeoutPluggedIn](./policy-csp-power.md#power-hibernatetimeoutpluggedin) - [Power/RequirePasswordWhenComputerWakesOnBattery](./policy-csp-power.md#power-requirepasswordwhencomputerwakesonbattery) - [Power/RequirePasswordWhenComputerWakesPluggedIn](./policy-csp-power.md#power-requirepasswordwhencomputerwakespluggedin) -- [Power/SelectLidCloseActionOnBattery](./policy-csp-power.md#power-selectlidcloseactiononbattery) -- [Power/SelectLidCloseActionPluggedIn](./policy-csp-power.md#power-selectlidcloseactionpluggedin) -- [Power/SelectPowerButtonActionOnBattery](./policy-csp-power.md#power-selectpowerbuttonactiononbattery) -- [Power/SelectPowerButtonActionPluggedIn](./policy-csp-power.md#power-selectpowerbuttonactionpluggedin) -- [Power/SelectSleepButtonActionOnBattery](./policy-csp-power.md#power-selectsleepbuttonactiononbattery) -- [Power/SelectSleepButtonActionPluggedIn](./policy-csp-power.md#power-selectsleepbuttonactionpluggedin) - [Power/StandbyTimeoutOnBattery](./policy-csp-power.md#power-standbytimeoutonbattery) - [Power/StandbyTimeoutPluggedIn](./policy-csp-power.md#power-standbytimeoutpluggedin) -- [Power/TurnOffHybridSleepOnBattery](./policy-csp-power.md#power-turnoffhybridsleeponbattery) -- [Power/TurnOffHybridSleepPluggedIn](./policy-csp-power.md#power-turnoffhybridsleeppluggedin) -- [Power/UnattendedSleepTimeoutOnBattery](./policy-csp-power.md#power-unattendedsleeptimeoutonbattery) -- [Power/UnattendedSleepTimeoutPluggedIn](./policy-csp-power.md#power-unattendedsleeptimeoutpluggedin) - [Printers/PointAndPrintRestrictions](./policy-csp-printers.md#printers-pointandprintrestrictions) - [Printers/PointAndPrintRestrictions_User](./policy-csp-printers.md#printers-pointandprintrestrictions-user) - [Printers/PublishPrinters](./policy-csp-printers.md#printers-publishprinters) @@ -4759,12 +4747,24 @@ The following diagram shows the Policy configuration service provider in tree fo - [Power/AllowStandbyWhenSleepingPluggedIn](./policy-csp-power.md#power-allowstandbywhensleepingpluggedin) - [Power/DisplayOffTimeoutOnBattery](./policy-csp-power.md#power-displayofftimeoutonbattery) - [Power/DisplayOffTimeoutPluggedIn](./policy-csp-power.md#power-displayofftimeoutpluggedin) +- [Power/EnergySaverBatteryThresholdOnBattery](./policy-csp-power.md#power-energysaverbatterythresholdonbattery) +- [Power/EnergySaverBatteryThresholdPluggedIn](./policy-csp-power.md#power-energysaverbatterythresholdpluggedin) - [Power/HibernateTimeoutOnBattery](./policy-csp-power.md#power-hibernatetimeoutonbattery) - [Power/HibernateTimeoutPluggedIn](./policy-csp-power.md#power-hibernatetimeoutpluggedin) - [Power/RequirePasswordWhenComputerWakesOnBattery](./policy-csp-power.md#power-requirepasswordwhencomputerwakesonbattery) - [Power/RequirePasswordWhenComputerWakesPluggedIn](./policy-csp-power.md#power-requirepasswordwhencomputerwakespluggedin) +- [Power/SelectLidCloseActionOnBattery](./policy-csp-power.md#power-selectlidcloseactiononbattery) +- [Power/SelectLidCloseActionPluggedIn](./policy-csp-power.md#power-selectlidcloseactionpluggedin) +- [Power/SelectPowerButtonActionOnBattery](./policy-csp-power.md#power-selectpowerbuttonactiononbattery) +- [Power/SelectPowerButtonActionPluggedIn](./policy-csp-power.md#power-selectpowerbuttonactionpluggedin) +- [Power/SelectSleepButtonActionOnBattery](./policy-csp-power.md#power-selectsleepbuttonactiononbattery) +- [Power/SelectSleepButtonActionPluggedIn](./policy-csp-power.md#power-selectsleepbuttonactionpluggedin) - [Power/StandbyTimeoutOnBattery](./policy-csp-power.md#power-standbytimeoutonbattery) - [Power/StandbyTimeoutPluggedIn](./policy-csp-power.md#power-standbytimeoutpluggedin) +- [Power/TurnOffHybridSleepOnBattery](./policy-csp-power.md#power-turnoffhybridsleeponbattery) +- [Power/TurnOffHybridSleepPluggedIn](./policy-csp-power.md#power-turnoffhybridsleeppluggedin) +- [Power/UnattendedSleepTimeoutOnBattery](./policy-csp-power.md#power-unattendedsleeptimeoutonbattery) +- [Power/UnattendedSleepTimeoutPluggedIn](./policy-csp-power.md#power-unattendedsleeptimeoutpluggedin) - [Printers/PointAndPrintRestrictions](./policy-csp-printers.md#printers-pointandprintrestrictions) - [Printers/PointAndPrintRestrictions_User](./policy-csp-printers.md#printers-pointandprintrestrictions-user) - [Printers/PublishPrinters](./policy-csp-printers.md#printers-publishprinters) diff --git a/windows/client-management/mdm/policy-csp-power.md b/windows/client-management/mdm/policy-csp-power.md index c1696a003a..3b9db5c095 100644 --- a/windows/client-management/mdm/policy-csp-power.md +++ b/windows/client-management/mdm/policy-csp-power.md @@ -388,14 +388,7 @@ If you disable or do not configure this policy setting, users control this setti -> [!TIP] -> This is an ADMX-backed policy and requires a special SyncML format to enable or disable. For details, see [Understanding ADMX-backed policies](./understanding-admx-backed-policies.md). - -> You must specify the data type in the SyncML as <Format>chr</Format>. For an example SyncML, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). - -> The payload of the SyncML must be XML-encoded; for this XML encoding, there are a variety of online encoders that you can use. To avoid encoding the payload, you can use CDATA if your MDM supports it. For more information, see [CDATA Sections](http://www.w3.org/TR/REC-xml/#sec-cdata-sect). - - + ADMX Info: - GP English name: *Energy Saver Battery Threshold (on battery)* - GP name: *EsBattThresholdDC* @@ -403,7 +396,7 @@ ADMX Info: - GP path: *System/Power Management/Energy Saver Settings* - GP ADMX file name: *power.admx* - + Supported values: 0-100. The default is 70. @@ -461,14 +454,7 @@ If you disable or do not configure this policy setting, users control this setti -> [!TIP] -> This is an ADMX-backed policy and requires a special SyncML format to enable or disable. For details, see [Understanding ADMX-backed policies](./understanding-admx-backed-policies.md). - -> You must specify the data type in the SyncML as <Format>chr</Format>. For an example SyncML, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). - -> The payload of the SyncML must be XML-encoded; for this XML encoding, there are a variety of online encoders that you can use. To avoid encoding the payload, you can use CDATA if your MDM supports it. For more information, see [CDATA Sections](http://www.w3.org/TR/REC-xml/#sec-cdata-sect). - - + ADMX Info: - GP English name: *Energy Saver Battery Threshold (plugged in)* - GP name: *EsBattThresholdAC* @@ -476,7 +462,7 @@ ADMX Info: - GP path: *System/Power Management/Energy Saver Settings* - GP ADMX file name: *power.admx* - + Supported values: 0-100. The default is 70. @@ -786,14 +772,7 @@ If you disable this policy setting or do not configure it, users can see and cha -> [!TIP] -> This is an ADMX-backed policy and requires a special SyncML format to enable or disable. For details, see [Understanding ADMX-backed policies](./understanding-admx-backed-policies.md). - -> You must specify the data type in the SyncML as <Format>chr</Format>. For an example SyncML, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). - -> The payload of the SyncML must be XML-encoded; for this XML encoding, there are a variety of online encoders that you can use. To avoid encoding the payload, you can use CDATA if your MDM supports it. For more information, see [CDATA Sections](http://www.w3.org/TR/REC-xml/#sec-cdata-sect). - - + ADMX Info: - GP English name: *Select the lid switch action (on battery)* - GP name: *DCSystemLidAction_2* @@ -801,7 +780,7 @@ ADMX Info: - GP path: *System/Power Management/Button Settings* - GP ADMX file name: *power.admx* - + The following are the supported lid close switch actions (on battery): @@ -865,14 +844,7 @@ If you disable this policy setting or do not configure it, users can see and cha -> [!TIP] -> This is an ADMX-backed policy and requires a special SyncML format to enable or disable. For details, see [Understanding ADMX-backed policies](./understanding-admx-backed-policies.md). - -> You must specify the data type in the SyncML as <Format>chr</Format>. For an example SyncML, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). - -> The payload of the SyncML must be XML-encoded; for this XML encoding, there are a variety of online encoders that you can use. To avoid encoding the payload, you can use CDATA if your MDM supports it. For more information, see [CDATA Sections](http://www.w3.org/TR/REC-xml/#sec-cdata-sect). - - + ADMX Info: - GP English name: *Select the lid switch action (plugged in)* - GP name: *ACSystemLidAction_2* @@ -880,7 +852,7 @@ ADMX Info: - GP path: *System/Power Management/Button Settings* - GP ADMX file name: *power.admx* - + The following are the supported lid close switch actions (plugged in): @@ -944,14 +916,7 @@ If you disable this policy setting or do not configure it, users can see and cha -> [!TIP] -> This is an ADMX-backed policy and requires a special SyncML format to enable or disable. For details, see [Understanding ADMX-backed policies](./understanding-admx-backed-policies.md). - -> You must specify the data type in the SyncML as <Format>chr</Format>. For an example SyncML, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). - -> The payload of the SyncML must be XML-encoded; for this XML encoding, there are a variety of online encoders that you can use. To avoid encoding the payload, you can use CDATA if your MDM supports it. For more information, see [CDATA Sections](http://www.w3.org/TR/REC-xml/#sec-cdata-sect). - - + ADMX Info: - GP English name: *Select the Power button action (on battery)* - GP name: *DCPowerButtonAction_2* @@ -959,7 +924,7 @@ ADMX Info: - GP path: *System/Power Management/Button Settings* - GP ADMX file name: *power.admx* - + The following are the supported Power button actions (on battery): @@ -1023,14 +988,7 @@ If you disable this policy setting or do not configure it, users can see and cha -> [!TIP] -> This is an ADMX-backed policy and requires a special SyncML format to enable or disable. For details, see [Understanding ADMX-backed policies](./understanding-admx-backed-policies.md). - -> You must specify the data type in the SyncML as <Format>chr</Format>. For an example SyncML, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). - -> The payload of the SyncML must be XML-encoded; for this XML encoding, there are a variety of online encoders that you can use. To avoid encoding the payload, you can use CDATA if your MDM supports it. For more information, see [CDATA Sections](http://www.w3.org/TR/REC-xml/#sec-cdata-sect). - - + ADMX Info: - GP English name: *Select the Power button action (plugged in)* - GP name: *ACPowerButtonAction_2* @@ -1038,7 +996,7 @@ ADMX Info: - GP path: *System/Power Management/Button Settings* - GP ADMX file name: *power.admx* - + The following are the supported Power button actions (plugged in): @@ -1102,14 +1060,7 @@ If you disable this policy setting or do not configure it, users can see and cha -> [!TIP] -> This is an ADMX-backed policy and requires a special SyncML format to enable or disable. For details, see [Understanding ADMX-backed policies](./understanding-admx-backed-policies.md). - -> You must specify the data type in the SyncML as <Format>chr</Format>. For an example SyncML, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). - -> The payload of the SyncML must be XML-encoded; for this XML encoding, there are a variety of online encoders that you can use. To avoid encoding the payload, you can use CDATA if your MDM supports it. For more information, see [CDATA Sections](http://www.w3.org/TR/REC-xml/#sec-cdata-sect). - - + ADMX Info: - GP English name: *Select the Sleep button action (on battery)* - GP name: *DCSleepButtonAction_2* @@ -1117,7 +1068,7 @@ ADMX Info: - GP path: *System/Power Management/Button Settings* - GP ADMX file name: *power.admx* - + The following are the supported Sleep button actions (on battery): @@ -1181,14 +1132,7 @@ If you disable this policy setting or do not configure it, users can see and cha -> [!TIP] -> This is an ADMX-backed policy and requires a special SyncML format to enable or disable. For details, see [Understanding ADMX-backed policies](./understanding-admx-backed-policies.md). - -> You must specify the data type in the SyncML as <Format>chr</Format>. For an example SyncML, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). - -> The payload of the SyncML must be XML-encoded; for this XML encoding, there are a variety of online encoders that you can use. To avoid encoding the payload, you can use CDATA if your MDM supports it. For more information, see [CDATA Sections](http://www.w3.org/TR/REC-xml/#sec-cdata-sect). - - + ADMX Info: - GP English name: *Select the Sleep button action (plugged in)* - GP name: *ACSleepButtonAction_2* @@ -1196,7 +1140,7 @@ ADMX Info: - GP path: *System/Power Management/Button Settings* - GP ADMX file name: *power.admx* - + The following are the supported Sleep button actions (plugged in): @@ -1388,21 +1332,14 @@ If you set this policy setting to 1 or do not configure this policy setting, use -> [!TIP] -> This is an ADMX-backed policy and requires a special SyncML format to enable or disable. For details, see [Understanding ADMX-backed policies](./understanding-admx-backed-policies.md). - -> You must specify the data type in the SyncML as <Format>chr</Format>. For an example SyncML, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). - -> The payload of the SyncML must be XML-encoded; for this XML encoding, there are a variety of online encoders that you can use. To avoid encoding the payload, you can use CDATA if your MDM supports it. For more information, see [CDATA Sections](http://www.w3.org/TR/REC-xml/#sec-cdata-sect). - - + ADMX Info: - GP English name: *Turn off hybrid sleep (on battery)* - GP name: *DCStandbyWithHiberfileEnable_2* - GP path: *System/Power Management/Sleep Settings* - GP ADMX file name: *power.admx* - + The following are the supported values for Hybrid sleep (on battery): @@ -1464,21 +1401,14 @@ If you set this policy setting to 1 or do not configure this policy setting, use -> [!TIP] -> This is an ADMX-backed policy and requires a special SyncML format to enable or disable. For details, see [Understanding ADMX-backed policies](./understanding-admx-backed-policies.md). - -> You must specify the data type in the SyncML as <Format>chr</Format>. For an example SyncML, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). - -> The payload of the SyncML must be XML-encoded; for this XML encoding, there are a variety of online encoders that you can use. To avoid encoding the payload, you can use CDATA if your MDM supports it. For more information, see [CDATA Sections](http://www.w3.org/TR/REC-xml/#sec-cdata-sect). - - + ADMX Info: - GP English name: *Turn off hybrid sleep (plugged in)* - GP name: *ACStandbyWithHiberfileEnable_2* - GP path: *System/Power Management/Sleep Settings* - GP ADMX file name: *power.admx* - + The following are the supported values for Hybrid sleep (plugged in): @@ -1542,14 +1472,7 @@ If the user has configured a slide show to run on the lock screen when the machi -> [!TIP] -> This is an ADMX-backed policy and requires a special SyncML format to enable or disable. For details, see [Understanding ADMX-backed policies](./understanding-admx-backed-policies.md). - -> You must specify the data type in the SyncML as <Format>chr</Format>. For an example SyncML, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). - -> The payload of the SyncML must be XML-encoded; for this XML encoding, there are a variety of online encoders that you can use. To avoid encoding the payload, you can use CDATA if your MDM supports it. For more information, see [CDATA Sections](http://www.w3.org/TR/REC-xml/#sec-cdata-sect). - - + ADMX Info: - GP English name: *Specify the unattended sleep timeout (on battery)* - GP name: *UnattendedSleepTimeOutDC* @@ -1557,7 +1480,7 @@ ADMX Info: - GP path: *System/Power Management/Sleep Settings* - GP ADMX file name: *power.admx* - + Default value for unattended sleep timeout (on battery): 300 @@ -1618,14 +1541,7 @@ If the user has configured a slide show to run on the lock screen when the machi -> [!TIP] -> This is an ADMX-backed policy and requires a special SyncML format to enable or disable. For details, see [Understanding ADMX-backed policies](./understanding-admx-backed-policies.md). - -> You must specify the data type in the SyncML as <Format>chr</Format>. For an example SyncML, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). - -> The payload of the SyncML must be XML-encoded; for this XML encoding, there are a variety of online encoders that you can use. To avoid encoding the payload, you can use CDATA if your MDM supports it. For more information, see [CDATA Sections](http://www.w3.org/TR/REC-xml/#sec-cdata-sect). - - + ADMX Info: - GP English name: *Specify the unattended sleep timeout (plugged in)* - GP name: *UnattendedSleepTimeOutAC* @@ -1633,7 +1549,7 @@ ADMX Info: - GP path: *System/Power Management/Sleep Settings* - GP ADMX file name: *power.admx* - + Default value for unattended sleep timeout (plugged in): 300 From a7086db799558a3b86cff93e138e713d42f0c09c Mon Sep 17 00:00:00 2001 From: ManikaDhiman Date: Thu, 9 May 2019 17:00:55 -0700 Subject: [PATCH 468/724] Removed extra space --- .../mdm/policy-configuration-service-provider.md | 4 ++-- 1 file changed, 2 insertions(+), 2 deletions(-) diff --git a/windows/client-management/mdm/policy-configuration-service-provider.md b/windows/client-management/mdm/policy-configuration-service-provider.md index f1fdf56518..3be2804a24 100644 --- a/windows/client-management/mdm/policy-configuration-service-provider.md +++ b/windows/client-management/mdm/policy-configuration-service-provider.md @@ -2420,7 +2420,7 @@ The following diagram shows the Policy configuration service provider in tree fo
Power/EnergySaverBatteryThresholdPluggedIn -
+
Power/HibernateTimeoutOnBattery
@@ -2456,7 +2456,7 @@ The following diagram shows the Policy configuration service provider in tree fo
Power/SelectSleepButtonActionPluggedIn -
+
Power/StandbyTimeoutOnBattery
From 6c67c066f897fc0875bf60fbaf1e7a3e68e0dfca Mon Sep 17 00:00:00 2001 From: ImranHabib <47118050+joinimran@users.noreply.github.com> Date: Fri, 10 May 2019 10:15:30 +0500 Subject: [PATCH 469/724] Changed applied Changed applied as suggested by @mapalko. --- .../hello-for-business/hello-how-it-works-technology.md | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/windows/security/identity-protection/hello-for-business/hello-how-it-works-technology.md b/windows/security/identity-protection/hello-for-business/hello-how-it-works-technology.md index 015c33f72a..99026497a4 100644 --- a/windows/security/identity-protection/hello-for-business/hello-how-it-works-technology.md +++ b/windows/security/identity-protection/hello-for-business/hello-how-it-works-technology.md @@ -101,7 +101,7 @@ The Windows Hello for Business Cloud deployment is exclusively for organizations [Return to Top](hello-how-it-works-technology.md) ## Cloud Experience Host -In Windows 10 Enterprise edition, Cloud Experience Host is an application that helps you join the workplace environment or Azure AD using your company-provided credentials. Once you enroll your device to your workplace environment or Azure AD, your organization will be able to manage your PC and collect information about you (including your location). It might add or remove apps or content, change settings, disable features, prevent you from removing your company account, or reset your PC. +In Windows 10, Cloud Experience Host is an application used while joining the workplace environment or Azure AD for rendering the experience when collecting your company-provided credentials. Once you enroll your device to your workplace environment or Azure AD, your organization will be able to manage your PC and collect information about you (including your location). It might add or remove apps or content, change settings, disable features, prevent you from removing your company account, or reset your PC. ### Related topics [Windows Hello for Business](https://docs.microsoft.com/windows/security/identity-protection/hello-for-business/hello-identity-verification), [Managed Windows Hello in Organization](https://docs.microsoft.com/windows/security/identity-protection/hello-for-business/hello-manage-in-organization) From 6653d97f9ae5f5ca2e94c156457315c02e68d0d9 Mon Sep 17 00:00:00 2001 From: Justin Hall Date: Fri, 10 May 2019 07:29:41 -0700 Subject: [PATCH 470/724] new image --- .../wip-azure-advanced-settings-optional.png | Bin 43333 -> 44501 bytes 1 file changed, 0 insertions(+), 0 deletions(-) diff --git a/windows/security/information-protection/windows-information-protection/images/wip-azure-advanced-settings-optional.png b/windows/security/information-protection/windows-information-protection/images/wip-azure-advanced-settings-optional.png index 785925efdf7d8f2daf549c90c5ff84fb6f2750c9..e0072bbc2fada185f186710d991255065da8f02d 100644 GIT binary patch literal 44501 zcmd43Rali>*gq)U-QC?G9n#(14HDAbNJ+PJN{G@S-QA^>bR!7T4YPQ^`Tlb<$8*hr zmz&MziS?{?-@jTrN>y0~1(6W(&6_tUaA1_92LD00smqAJ zshT7{1V2FAh$)G^c~hH!^k@bHenxPX)pL9E2GjlZAHJ^dj8M$J~=An5d>$NQvZKkqEhZT-~8X|~_4Ru>VEH76%WQCtmMN)5Yudw<{S z@z#aO)$e$bgG%M~%~baS*(6GyI7b}t0h$i64GUn!6%Z>IL>guuE4K9bXB`t3Ij*B%E3=AW~=a_J4q$_P+ z)pLj3@lGSjGzte%E{RuBv9UsdkIgR5B-VddTHFT3_9EW?u$?RYu2W4ow6?u7lJe7m zcm>zR#U-29Nm*8wJ^lspBsGqRcP(#sDqpnAakcgK)_eQbdK%06dfrN1tkK|yL+$Us zgJ&1FP*zbC! z(LNpAL?(Fo=hyeR&?9zxLC<4$R8HQC+S9HV(ieMTzl5u!g`k^Nufd)VE}OkD_t!UG zP_?zSeGw>q^+ZE2(C!#PQZa*P6V0x>qc-^g*9q4#f?g+&XG3I5^Y}wS3Hd?KcWk^& zEAA<@N}QUzS3A{>gw!%1&6uU``IJYHD9CIz;&0fI%gV50{yMCUU#MV>!66z{|&nZ$UW3+x?`1Zc4m@$@A=YeSEmu z=Jj{E@#*O)&X5gbV{m9_h_92z8}Z(h*fIeBHtrf30pYAQX%0af&whMrYKl*pXytf& zC?TEO0~Q8G?*96A>?%LnVX1BtnvlogJ@E_HpM~nF=K|B7kKhi`4W1@ESU+JrKchpl zwp_*5AZ?0dfqNZ@!HcU1fE(3q6QKrnIS694KhK2w4RME=S^}IU-3IREG`-R(B z!*E`Ht=$I+n?8|FB~K*a9z2Qt^WCxI^D3h@TpXP6qjb|x<6MriSRu9U<3q`dt1Gf~ zECK=dmv;km+H^^)6Rzy$ZWC)BZOI5Cj(Yru*k?%P~IIS_ZjPE z@wf#`DT@5U)R@(3?boX^|9wQzAs5sj{9Z7eX;_uvhY+~jPSkV#Ry zCS_!~DPK;nDhCJ0-d`nJ{+;a4J?5NtOZ?_!I^S(3O_>->#hH?llC;0$Y_m)IPBP^d zigOfAst0$D)ZS`->}UDr8>5P$mq)M_mb5KI*v&NjvN42_%BRZ=8FN=FU^Z5gYt^`1zcQ zwXrlf8Cg281L2$|hGR6=xeeKNMjWj5wr;j&>a%+Ssfx94a5!gnvbSMIom+fN;JNMY zt*YKGph=sOY(XDZ{v2t{Q^8|+_hc#}Ga#>6If{VeWqU&&0LVZ@u-`!UB@rbrm6y zwUt+~8KlGa{1IGP@P`)6+TGQUO?fEFparBq@cuPmoUb&{>GZ#QIPD60e!P?Z{QJ8z ziyQTiw7}Z!>85?TOpSG`Ivg_4Yo{m>RnZO-NOb z+a0nW^H@?`F+o!RTnA`sMlIG%18Zqm+FK%-GYVdYhA#meb~K)T%5Fi@^lZ=i6xs zG>jIoBwfJj?0R_?)R4+`2+H%>BUnKxTg)QicilN@J6)?WgJMdM@;{g^{PYRFe{B^5 zPw}zsv~x^La*bKTvksKW$H$8)IVVtZz+87gJ>Q?2qV&F;k;y#$^<4*#QS;M$I*Wny zu6yA1@e;RDxjN0sJ`56WEQ#P}(lvEolmPf(u>N~sNQ-4jCy&PNQ2$4=m`;` zbh#ATziS;t+Z($Isq`FnKj~S^^hZ@kz`9%7(BLl}gfy2kdwG7ED^uC0-Er{t=A-Gl z+sp2YM6*Ctl&8snH<610$29kJ7LN7(x6z|H$!^O5icQz!Ig)hBUv@u+FLu1T$zz8^ z5WH%rI$D+bY5o;MkB&=q;Yckp-!#j6pOy+G;Dlft&qnC-Ej{T&AvmN!G5j~PVhf6_ z$lewvF6QUr_6AC4yUT-_hGE4s{d#L9M+@YK-EnzPl6JkT3$>ss#$GJB7s68fL(9ON?QebqOR@jzfHyY*%F1r zc4nx(k0UfG-|?A|BHr~JgK_We2@}7B;7V=Y$;@iM+!FQ9%>xN zPIJ@!rpZt)*1b^?#9D|m>TI#*HYFVEc(ygL;_Hn@40*$M<8X7b%F%{=v7aAgZRP6K zbw0|JL#b)S*mb*wWc}F}-($7a;}9Wb?7k<{nN73GP){HGt66UtLhL7mzrUN<28+cV zaSc<{dRaCViRb%7mT#$ zHL%l+jAB#GGx(@aJIpL~5iPkKNYWe1mbF))JzEUL^J$$qW#nS0(VfH`TJyD=OVDCx z^7?M9?V3{JA~+)AiGASXjp!2|_&fe{j(9Eju$#oC%mTvj9?TILA4dZ_@|3it0x_uL zaf&u!Tx#o0X$u0K3f&|~e3a~(HTZ+_NRM4dp)oFpMRugp9=H;c&u_UX4%a&T>RIL3 zlfWF~R`|@#HMH7`>4N97C6Y+6x3`@jx|c}v@y&+U;x>7oH!kNAw+ovKFJxe}UxZ?5 z&f7Rq%8AvOGTKdqUv-hDBx4j@O1V$>R}zpkkq?n=Nc-Xy7KkE<|pN zjVd+7>5Ay%eKEl+R}*T6)T=j3AF_lJ7T37N_y+>D!EJw19pQ$@i*Lf^<AUv7w31%A(Y&S9U?qCRO+R}oWVx?y7K~#MCilLlYxsiU=3f#}=m^A#&qQ-~F ztnXZngPuHckUk&(EKk`{WvO0SyG6xh))Zp%5{W^4B8LkKvnXQphhQS;+G`y@w8VCe zqO+{yIe@h#{5xBMgpfnt;hOJ-g0)U(8?vWsnq2DlDTg}4Jd>e6!tRhRzyis>%5Hq% zpIpt)79?5cAT$3PIVgV)18B_QHv>D@mNoBr8f)P(-gt?n(`5Q$9fBJL)d?wzz!?Sj;jdlb#@+!OdLE5iV+LwwH7M6N)CnZi7Naj*yItPyS$y ziJV9j2Aw`#^-v5!Bv_gkz+cv!JuaBV0{K9P`4y5jSy0LmE(a<_c^#l{y1Zz=e6c8) zcRVUzF}xBDWp`DC&ceofmCVHI&Ub4eti?Fx*cn1$QOp&nzlYCkHtK%o?q|**O|a@y zPKCCxgh=cT*^rXka24?TQQssHJXKGIJ#!zVS?lphare@6Ml%D1KOn_Q{*axgyn$W{U4+aYt)=Hl}U&_Po-aWH6 zQcyTB?9@1K_8uQLr_0ta44&2Q!3&qiktUBMPRMW{r|KOwj7=n1)fDa^xkAZijUBR- zQcZYfAl1g^m}AMOH{%MfR!|90c;f zkJyr4Rx#JFIT&U(?%|WpESr3+!SB$sHz@VQH5KH1<4w^|rdg><0$bx6Hc&#!%~Y8c zKI*%bqYJM$|ASW<6j^s6R3eH9RylGS^QTsf+PibY9UbsP3^uh#w@3be(qC zabtsZESVQWo}gjPGC8_jDgL@*jX*XtR9G^mZ{$U#1W>1Zq>0kAYGk*Bl=0*$)+6ma{y+gPG{eGaP%KV+l!V zJ_?ChzKcJJTRaDG6BCgHKeri%8`7p1I?FuD4GzD5!BSgcqP^c!9yGv>Yn5x9^BeCZ@c%9H$x=m z#BFRlrBb4cJ_V)66LMb;_VnbsL75r8PK=|5f&b{#5D~RRkcdlzvg4*Ll)i5&Oh!7o zq&Xa}&Qk47Bdrf$!Zlpp6*-Ue=qd{PoVuH?Zia(9wFV~b$~b5~Vhw|_1bq~39;`_e zJCnHvqi^_+^AAE@jyn@MD@rs)uw9IPI1p5|Ygg)z6XMc-vtFMFL~0s)_b;H?c19Uu z;jrcF`!U%k1kH~ymdv+o#UCqSG3if!h5ZhRgG`Ppw>^`_fm30#C5-Hxfu5Hp34vh; zobG1LFF`38`wfr!FdYR|8@&*o?Wk&Sne*i-Ktd%`&8Lt=AY?Xk8e>>o3+$NwBkCag zE{=W4X4W&6C!Af`0?(qvrQx6@ydav0wr7};7#i+04ks{(3x{Sw+*WSTbn+1f3EkA8 z7o|6V;*MKMMaYTc5B5|y!w5u+Fc1{VbVHauFpr5WP0T4_4qA$Z;}oBERxUe-i;CCI zi(zo9l3EEIelL9+enztFg4)8C@7 z#~b4~ayS3pQlnFFE}1JlKR-Pv@j`q;@j~@VC7yNLNwFt@;Vt%ucLS=1A*E-5t=_If zEdflCLe{7L3+3jw$BMg~A;hyb*UQMGZdMk5iBL`ugsIIFSTG&_)g$m> zxa2dldv&LwDkR-$_#HAWghkX~4iF9Y;zsoOd3@ti0bm}@t;N%{ft}yO-zJxMKs`p&*~nP3deB+Sal@j03YA^G z2e#MWe~8Y6DpP}{F|u1}=IH2^w034=_Y~-(#aSw_7^kI8(_rS8LtjEi;}9I@yTW2s z5E0|g)D8a5_qY|q_U}FBqfhT@*inUQA*AgJaZ_;nmq!~egMxPuZfSJ`EgU)FL^dgo zU*ZRQP|~;*6-Q;oTo3B^<)J9K8YE{^=u`&XWATzoi}mXHJw2PSXcY_e5n@XC9Su@5 zmbmfWtVL|9rtwpj&R%qKnK2?%%GUfQ&-mPxF9&nA4zTF?xU}m({fzW94S@I^jSpdy zpsL+TBQJX3$P}}Als><2wEIO3?PcV%`mo8p6Tm$ii`_(y6s)a2fS)sP?2bH`Kql(A z!Y34ZnK|jS+Nwnii8rgV)HeOO0%c>5lCk7FzLKjVA`WB!DEBEJE-BO|F4YrYt|E{B z`to9;MF3gJ&5Uk+h7foxyi?trLLaLUsTI9Rzhj>YTZMv37co^Aitw4LGU*bbr0n%i zy(R0m=V0Z9{mhA4B@xe`4*x4fMFh}imEv@%!CdkLyR&DqfJ=-RmFqMbh0maxGNl)n>z~b9-{AaZ{M~aKm_j5*|;3EwPv^fH;D{G)|pxXi>4yQ{mNqld69)Vc0bEf>UvBq4lbT=2<7;zR10 zBhko|MNS^B7EH?6zfj!{)?j6YZgz|WbtvaLle zM;ENg%Pa?Ki;IQ2x&Ulyy9*6DzqbwZV6KA7IHc=uSC%o-jvb!;6KmXqC?Wf|W~I}Z z)L}`S{)~kbh}*dYBE}ithSU9W+Kg#GKEz8PW?O8orB2tn)(>DCqLr&i;6 z%~oZrSq+_|Fqp!6y@syi~Jk^Cr~ zN#f{qVKIxGXpp{^Y@LChe`02HJc4LuT`p7nDUS;=(<_s$RZQ*?Pb~I()lrT0a2bVl zrgRH&x}->HDG_o=L^0{T1S&#N&`3}4Wxny|1OXvbAq%YXTm`+|mp6lj)RkN=)WLiB zkUDDh&?pTb2M!PdOi|dsYAVD(eDc?Z^enZVVjvarX1|uZf^aAZ)ceC7hf<4{+do91 z#>e@MbAdv_`+CV{Nu?(70O~1qsBFC2;akl`TuihXrvPGol`NO@Y=ijzh>c-gOHV8_ z5l4DPYP^}*u>|UNk>5K)2@a$@uLg2^q6=3FCYf>B7()e`j4WIR2~?O@^TtjCh7)~q zYxI!FVw3TFNzavKu#B|jDi|iBu>ZMyuowR@c>mkya_UH$B)d5aR)+}Y9wzNwH z`BG)hTB1l!lb?fOqm$V7$3IJT~hGEGn^Vg*p(Zv|}oq`5(^5*y&N~%SlIF?R461}FvZL`8q>FliE4$w;a{pQEh+L{N|D!gminY1@aewA z?vBbGABVh$xxROI6Dx9D=NrS=Y_m07o2ed*ZW|VzGB;`}a#&nVl50@a?Bl zu#o+?zybP53Td*vA#gj&^I^GWjx!!-U;?y*QsWoHT7-|wB?@@v_S<||-FthW0X&hJ zbbqbnT_2kGQ}bY=#8N}U@tEO<;jJelyp+M;Hi0VN%z$=qMb{!f3igK{eknkIAjQ{Z*Q|GikXU!&l^ zK(I?iVbVM+pmEe8-ktBZId4MN7F1WC0+ELmjq3%9JQ2vAJu?mV3zNh5M3!TpD-|<2 z&x0rXhlc2YG6`T?+nGvt$DahqLm(i<4{pu zo4+wdULG%i>XU>IoGW0r(P)4J-Jxxh43KbI4jVXiSP?f{l>$&Tw7MRL3QV{Y(3uPk zf%CPnQ+@S<3VfK@*3BWlj*qKPDQ~8PZ&rW?8pj-CHIeleXn7xi3D*_)YU<(x>L%FQ{+qKhK?HW_q8lMPUzMh}%fWGnCJy_>th%U0E zX#dju{#Tx`-(*Xd2d*k7wNmFj+^aFr?tRwX-AyX&d->;=0_O{+sHkZ6kXN%GQrW}4 zTARmF#N-GsSr5405lQVJpwAW*6ad9S@?6P3AmCzu>J-)rX>lB@k zfVPl@lG*-n(sqs_iT!5eQP9+;^#)A(Ca3l1INr4kZrfyAn^&8ZYnw#wyKXIIuLYRR zuOem|6WzLyGO=`x0g#_}+<DkFtrN6Qw8JM)3)Oy3a( z?rdp-kG6>L2nc!|zHc*40`E#PMZx)ohh^omojrjk5&QFz=UUU0_m5c(@GHE5EDK*? zGm$kwa}MJHrklL=puLzSnB}M>0+Nsv$Vf=`zkjeqo_mx6G?I1-FI6N-=ykdl_lQpZ z!+rr(`1!Cbe>gTi{$#yNv~Ho*!yZy~N2VY7>1eKON&-#zCvYRe!ot8KN{MQYClfX9 zEWH{c3zFmHcAh_Yk?UMI|=?8%4-sY-m@5?XfKSA$KiOTt3;2VdOPQOi{FCntkZ73h|5r&Cys zT2q zmf5D*O5!Dp(8J+P!BtrUi!`cS-)JLgu?zg@TOTJ+_9n8AewIrFGbMC_>1*&^o8?0A z*QfK{3sp@i{fGpC&uk{o$5$o@Z#S7Opa(fkyMw*fd?NoX%wa<&v*q?{1FL-iD#_vtRX1>-!JOk!0XcU^U1QsEpsJLd=NsG*5HY zfvHL>%FUhnb@F1a9XPpP-!e-5RIqIEIGV?0(MO+5h7~s$B@YBK0T-~oWa0>=$aZ=S z-W}MANYlm_2VOMoD^h>%0M&!x4qQj0(|VqSG{s%mk35slBky*IBncp0-=lu!KS!*mlyY;EGNvl4OV><+nlsrya{T5h^#VWZ1Qju0K6iLDe ztTxB7MbdGEp>Sxla6FDH^hphL&`qgM%e5 z`7JtofLy?&*_on87=et8tT?^Ekc@!|9KiK|BRH}q1934if&f#1HKUTlmz0q~zaCLI zqpRN?yt%n~F59AzS=*6HP)|L-`FH#lAZCxAZp0hrz(8x&W;JXY*6BU<%o&6AmfXC`ywz92d2e-SE>~K6 zo_guTe%yY2yqr6W+PWf6usSe1}urN%rweFwJ@cGa5u6vzE`R}Ib#6rHdIa;WJ ztL1&it*tFwR>Q>_v%U(}CI(NNO0Rgf-`*2j7LB)hK8@#7pEI9l$OQJB8ljhsNj*xZ z!eZhGMKb_M8cCreviNWPl7V~?FoSo7lOzIV$rUa}7cUHMXmrJm$kJUccGh7h-?wow z4qUMfo={U?F;-R8(!tjR2)vx13SyDkukS6^TJSzAegsn|S?*uf7AVZ$K;~&Mgg2w( zPCpM170>t1`Q#)r@b~8Zpaq4z=v&u+Y%e%E^ zgd=mqO^f9`D!~+zNvtRX5jJ06hjK0p1(uiQPc-u<4Sp|`rjiSp2gh$uat8hcspPgT zROngc{C6t^YicV1moGZ}cuf@y+3tPOOV>vgbbJ23Mb|~&xicZ25a_uVdYHcZ6U!w3 zgE7D5ZyBlRz4H&kkC&$bNRz&era#EpkoylC{JWU%{|sPPB$rO}jHs3CnvOr78^qJ% z9(d9RHAzIWQPZig*hjgc9}1+bzF?A61;M*5ize+lt+oj|?w6+`?#i2hpayWeq&r_n zCi7qX76_VcP70oKqt1>mL!IS6;d)%#FYrG1<$6IA-!>eyrLdOr<@l-4eGtm==AZ1e zGkNTP%i-b@pOUWOnX8zZY`gRGSE^ANCQDU*Q&&KThp_N&*}D%Y7i36r=e$;rDf z(osNOE_FQA3!9ggb})u4L*I?PP#@#v-^R%PNuApsjLV+P>Z?7rH=&D+K>4_Hp?EDU^_wIE!d@qal9FLAiPq>p zvuGfpo}LT*?|K7N`y&}6HQW2Tj4EpuvaEt?U7+Q;j?Y#mzWeTvksYJjB=fG>q5Nwc zq}EMV&v|h&A{)!okZbAnXD$?(Ig3|VAf7@Ko!fcBfHoO}aV@q=Pn2>A|r`M&xj(?C5>EbIJqs8;8;o>?sI1#2+9$GugPI(#&g*K_E8|L{PR`5#8@ z6^zaXCA?qqv^^8?CLP5Xhal+fH5zDYZKAcmj1C{9BJQXjM{zIf7vuVV_gnLO{0ih4 zG;Xsb&$4TmA+iYSkh;E##AM!2_7AA2G9e=;Zq%#9Z9*=~wX|uZgy?TVjg$yHFn&cx z4&E{@AVgE+cjLHCKCxm#@zqk~#c@49r7z5KX!SJry@!r$N$)3l0dWVTdT(-CxiOi{ z3XyrYvJ}{f&c|PKE!jU&>kVaH@>Cqx=-cH=HkwKe>%80f|5AQ%B0#E|vV&P#UO-KV zi&9Wlp8U*`?ed!998m;k1@d=S(93giG4(dz2WYrO>&wv~R>qQHCK>r_5zNcW9vS;E zW&e>|%lQ)f>kMce(*xfxm*3LY>yLHmn1dXH#HF`yui@*I42kB}w@UzVtJO=QUG!f^gWLPUFU_FQuF-8@`Sh9NeL+4-M<4}J>K6o zMiw-QWEqlvk7D0T;ABkLX zTx%bhno`--2J2=Hpp}WwECzt0?@wgg5ZhQ8`>;RU;$8frC$o(564?G*989FrC5yHivhA2eDgp3k2k1t z%CSi$laq#r=Z8U)qqMg6-t60lEh87VrU6HREa%;>A< zuhTQx?JrtTm0s8ni<)c92M|*WbZgDi7`2L?ySv|+m@G8m5S7(qy9;P|tT;B&QPYAT zC>g)2`}Sbm^Yb%{e#3A!Z}tBSeQI&~RxgO90nXQ9GnE${{3fzbES@Dr=<}1xhP%Mi z<0GI@TEM2DQh0q*{l#Cl5as0L@YsxFV`8W{x$06IHn+F?XleQQ_yCY;je7kQV{zLS zBUs4Mkn~lsa<4CvF~0uyj=Xe1^mlNJ^aLS{Rp9+1OXzR^sUZKKe8AFfz^Kl01VEm+ zQ0Crf9Ht*m>yE^aZbe_dfEyyl!LcHKsZLH#uJgY;2YoVeuo%QWldHkydz@u$0m%FX ztXHS@vqA7^M1TT7#rpvWKr}3WuBzEVV0S&}WtH!C->}s^O6|h#^-!s)+<^Wc5x zC|5T(bR4GLZ?I({-+oL35Qq zFzY%`&C2QstWPi?)Dw-G@E~KGUSH1Vb53o;ke`^?UAXEf>VNwW$VbCV9ez#wP`^PP zQ_wQ(rN{;31@bpc&MnYV-fKqF(9$Mvy99+ z#;ig?&q6c=*k#m_=k5`#7;SR|tf`OL;#$WRme|%>_=ys+ayqLe%p)Ts?hHIUpSf2H zkf}-#`0d3Z&iNIl4(a$)%{BnZYY^{Llw|yxcu%8bW}92epm=kDSx;*dP9o?ji{&c2 zo0>W~7p+P2H(5?DQ-hhdUd4^~`fmv1hqu=7<$*+6>(iOG~_P`T=Dra%f*Lg+BvBru9gD&SR{0$q^`2T;oIVEL=6 zqHo=RtRukYuXMhCO2nWmP#87f*Eg-^J>bicuiZ|oJBmEtZUb7HRG<$@2#uWH;eBR4 zims~w7Y3N#R5mXfn+lDlE>NPl&w&Qh>3hYfq%l%wHTG)c{ebz|J^7}30@W0p(LIV! zZcQTmYxBCE&7N0jb;Z3bpcq-hZIpYcK~Z z7OA*L*(FIZcQ5kCsBQK;ZR8y(L&anE3+2w=rf*A3l+Q-V{E` z0@SxZKg$&bG~Q(x7fD9FwVy{OCiB00Xvf{& zx<9KwZNHcV25n@6`_X)yVi*NbteiUU_P`VTU1z0mHp!xpjX$RAB4)38eC}AIRVV`ZC*~)iQmxuSbO-8;YMCPTaKcz&|~~pos-int}M?t zy0h@oL8+LhfD2@Gi}dZjB!k)R1Jp7_2rU;}t-fOrV+2c|Oc1lBKWu(NX5})61r_1= zU8_PmYeTr!>+TCqHAhdb#juva+pnCN>ZBI4(7TzamU(%q`#@V!ss*l@+g5*+gEqX% zp#dm441I&*d35WLpL;;2g8i))#s*~vJP+5fXJqbBzVHj6Fn4&M4sXq$f@s<+h3DQx z3PD1UL~2?r*C+$BBk?BnF;&WKsB9{<81f8qXPP9K(8CahKDFipo+m4EgmCiCQGm*< zldZ>fOG-;`EdkA3HXP(%C=%1YL;DEGKlba9-}d3v<80`29Z(p45tq!>=~w4mg8mnM zDxE=7_NwEXTB(#_WeplggtZ zJ5;)2Fw7$Nv|Km`>2eUi%pw-&ZS64*!7!6k9Bp2lGo>G=|1}yB{1>uSN+@oHQtIU1 zP}ctiWSz&%Kt8=C2c2Mys`XOo{193E%8PV_6GQTaaxo)*BO4m3&;mpQp`RqXmc%Kd zckq~XRr4fN^J?pviV(tb^k}(2$<#8N6cM(8>yGG7y%P=nfiEb%mj<65hy9xq72=79 z%>Gr7AO-5$JMSSTyAVwDlf=P&OtEJWUtDDiRK~x=O#2)vlqPC1#Jm#vNx81i`07qq9GA+;@)Li zT|F<=SKQ5-!yVE}JnhgQNU%w~ocv7bq3uhtAJ64Qa9Zn8@G)S7xELhNjC+P%ZDzl^ zY(x+*Qzl#EQSvvygOENIRS_3R)lpYa=f5Gml2V#s*No25F$wTkX?Bs^xmgeDvSFG< znVKZe#0;2ig&y7blR2aXsg#{rtZ{`qt~hAW=J`Q@e9#7^;9hfbcQ&l;{-rt}$tTTT z<4UQ**FJ-=-sp!6SeCn5lIdByPu2iuDGrdiQ^sXHHvr}3D@hbk@9Z~w!;|F>q`9Sw z-i1H{p*=&u!w&3okYt3P*_+B|Bm17DLh+h}=SIEkd^n-{NhIJ-zlk^50QM(9+vGs@ zQXzyZ0c0gb18QcPL=h{rTzgAdb(wyzm^`a-yRNIM`xIpG99>Syw~1_CEJu0TDq`Uj z?r$pZwVIvHW{=UR^RT9oA)A4H0t7!f)Bx!XKw{p_5trJHVJXibE=NVdBICcKLqNBE zzuaJ}9?bU)_RLT(!X2-7kPTYiyvKiL`iSK(XU zrwE^q?Dg9eE_dfvrQI5Y!e+yYyC6X~o{+tI8>}z;3%acVw4$t-utE+zWF^UaT+Q#= zO1Q|Mw3Li&1QzR>r(U5QC74$S`Q-vAL_GaOs6;#!0T0&)Lr84x|3D9;?4ysw_Wsuc zhY;bM<+|AHVnMyRWRqWl5Bh;DcDii19e+Q}&GC{OSOjRIkL)xE=W9Ouxd5^ZUnpW( z)&a2z)FodKxWB*t8}lbDJbW{rfmWFSJy0ziOoErP{J^3-VC(?23s19=y5DEE6}ktKoA81otc=shh3wS%0xC8eu- zg!##lVeVO~UE&%gX?4dnuqe~>z`icP1T>=BWt6o{0C01RtF=d4_&@LWhAo3PRcz1 zAj6XEy2^5JvKlNnqg?)_vBXon!Qo(IVNue~oR;svw2*>pwEQ>*M^wA(=kh}KICCb1 z9;^4oR&G={t!%DZA0b+zM<>dj@a6CK_^tAY`CY>TkYO?~E(1Xo1HfLB(|P0F4=ZUP ztfY>M0doON*B4fgLYn=a$bwSkQsM@&h51wZ(CBfYoHeYOQ2TaPv5=wS&qDBD5gcR4QFHFbi_|Ac_x;wmf*&1#L#$ z76NwspwC>NuCEV2nS|fo0@D@HFDsh;$=u(=U}xrt<=3q>V(JgzQVR8tkLP61X- zW6;M-aD5eL6l4FFPZ1P0&&tLS0lTiM^&9_0(dE&D;Q0PfJa%gqUwJ~hl0C0hAu%}?O&wq$1qd#tN7sJqupOaz9~pR9s- zrCnY&^RbF8oX`DW8t4l@Tik5!KD_x)i{G*uFlu!_-0X`K^!T%LMs0~t)c!YQL4AdH&srzw5`okE6@8 zm&y%XONWY{&Cex#J;PU++MZApKR!HQ<&n6Z_&0n36%G#w++bhs|L}QBVD>dREX@L_ zzTHh^sNh^7h~M?B3Rztn6?9uqStRgGLoGOL62xwHGa}j6C+O?>sP5WyI%S|vjJwVq zRXMlmZd|X!NUHkX0sVy$8?}bIH1uG$@6FNYzb<5x?fsj;$f*l_@~v)qW$)fFr}QVl z&H)=b$wd>kapH{?9Un)^Rjf@2g!a#oMDv1n>bW8(2}DnL%s#jSQL4*;(Bs&AbZ$N8 zi06Lg_AN)$$XZgSoP9NkK(@n~lEM2U=Lp#4Wo~$rixZM+o{8r_5=%Pm0Yfnp^#(;9 zFC^qu@ey~i89sOF6(y=6{==1zz6r1L!V(aWfeljw@EOo1ThMc7H^=HxM&YIov`qgn z!Tj*oEjAQ;`J7Kkc1qa6>^p7IBJD9^K;Jf1O=RvFXt?vmv*jaHJ9{F~aJPi366Ezh z*gm9cwtoruTSJyVVQ>?Q^%pkB;ihLq|CEGmjpIh*CR`AUWKy^7X#E%Vej2t-EQt?K zRjZL;OKpZ4q0@Kp*+Fww(bH}AB#YS?HrAh1zsfmocV^BDw=K{GmqE- zAn|{*w|tdlG7-R21B(#~3Mwv?o6E-Uc(nwoH}qwi*L9vmmfYDvRoGH;zdbS%&*0vg z!oGlIw@f`>XfJpDy@IT#c@M<2$s3fJ_chA0FVAxF`NV^)m z#`XOI%4Euhb#y0Jd;H9Dw)3)OG(z|>CFD&nAzhQ|fHSCUkqo@DNO$)Jpqb0>oEZ=h zB)lgWa*Q{Y9l^`fkLXa4tf@5hBvZ)JS~+RhL%9*_GBVMkDCV>O3@;QwGvNAmU||R| zWuxX+KPoutTRqIu^jHIstw;9v?FJ9WXV*7&od1_h%HKvDsCMfh;Gdu!@qe#&$v z|86Z$dvjfeROmz&*aNz%MV*?R(kMed?=(CSBve~Hgxu!q$eQ7;7hK=_*bp-}lLyh+3=NdmHovjj{jZ79}rznvFOnkNcIE^i>Aj4FK2~)n5CF^40FY`#A7qcK8wm{fOog@QrEB3_v#}vB7j* zek?<>$RDjQ!HZl^DlUH!z6vcZeUX}E%Nu@swZH)V1b8@?@_+3R!Ra|!%-Pu)NUA_I z%KP;~%I)`Q>YEo*IxEKe7CWy1?2!{mL8tBf?^Wd43P0}f4(`2ElTJ^g9i0?k>Vv|5 z$SIHEJY;`xqiXv7!y$Ubs{lCPCm8=-JOhvrMJc!ns5WzVt^Z;1cbHFnV?Ti@7Amk)son3j8@+44P#FYr*WwZqahPBz#HT9(YrNELFILSze0L-j(}U>!{n+?m0_jUcWrR~(2ubRY5#)>F4Ya4`G~=nDS(_= zH25M3AdP@;p!g63Eyv*^kP86;acuGFJ@~!^1F(s>riOhx=e5*F$;k`=n4pF|(4U>J zrTzM97x(`U>hk|yLt=b15gFMF$SQ-N!VsS_-2WZd-zJX%tX|X~Y)c>P`RfYyB?GOI znwlDaNG}CQ#O+{XE`Wd_9?1{rEwPBdw{}x#5&a7l=;*Jps6XGU0XFTFh(v8S?(qF( zT@Mf@^6Fc8@2JH^-Fjt0;h^XC;{=>9@NT`dc_q9r3vLKqgSRY>uxJ;@GL_ zcU-9ZHqRi?rLjp!SPsE|v$ltHo&``%HQ-e8dp-8i4?s|R>#*p24)ioS<>R%EwlI>; z&Q2gdt9Kiqlg~yMm*>z@=aM?CwqCuWGt~C}7`D#g`F_4;BLEx;nt$27jd$93-8|T4 zL0n7(Sj=mNEHbwqavbUlo-SG5Aw3F_L@spCppRW;G&SPPX@s2SiH6i0BM zlh56+CC=607BIUKqc^4?p8$xX`1|+thhRY`lV@d$1_j0uzO|mriOQ!TWzi^&#TEg= z^s4{>&=pYKfJ_OqTM*l~ISle6XQMzByKM|)I3muL$8>=hxBEsnMC-&R$S7Wez!KO!z6|!W ztOEyLLR=gl>1pSuk=LqJCK#tG-P(`72bO?|0KM67cNE7m!Zctsl>ylku!0>f3~cF; z&&+ytzE^+zPFf=SGy$oIQ26%@{rYRbQAk_=FXFy3EX(!VQxKKzF6okx?nb&pK#&GO zkrwGzx)G$ilt#K61O!2)M5IGNT1uGp`kym1pU-?aU-rJPy_I;M=U(?(zgjIoVp`!? z;vYXO(F}YoBoA$x=N2+p? zGv7l(LwQMzBipsnmJ9JmK9QzynfgHp4CI6GN(02vX<^wPm5Z5Z00@Mg#o^j00vB8d zjaQ4$8IMYk3JA;+;Dcp~IV;yKO-KT6f@MlOVb%a`#q3^`M&JQ)&9Mvj(_;J z3`S=aBli1VgL30~^3m1^IbzH@k0t$}Vrhmi#hKhRqjFNC^Kt^@-f%~qfFMjKO2m-u zs9v{Jd;3L{3{hYLP5YV_6_XTeQ@`XASu0s#@jY!fOC20neen zXj-Gu?Pmd~RnjE7UPQ1JwF40q|teK~{JGtm@ zF=~NgBE++nm#f#RgO4ejllC!T+$>56!2@%VgSAl=q%F$(W;f0h`6s*BLAhMvwmAWx zh&NQBP14%eCfd}ivgtFAq~Uo+65W&k1AxRZXw@dg8IrN?96QnWmzj3>f!nz1W^z}+ zOpSFuHD|9E{Na4k+dhEVZ(@#e--7CuG|WwCS5LyHW}a$FkURjl7b&6LwtQvDb@c#s zWJH9;!0V3*vabwCbKh9^d&z#;WatCE)n6deTsA7UajG`Wy?d9;k*fT*zLgKtS%r4F zcd@|vKNthR7pCM6sEnsV#*)~&Jm9qyaqApfdZl&i^P6x2=B4k>jlJ;@d^4cGbnLWX z{3^ERao(g=f;<~4B`Z_i;>?z@8$VIwgzCs|zO7U*ITL&mMvHmw<;(KrY%tPj}q6 z4(TzSvOG;V53775y@VhO3+iuG!GP%`)uX6~D{tiEr-64B0Gx5N2e>+vOhk*_=^C)&`mvTswBvhSF4#nMgt|lMDwZ4vU8s#=>qf zhBPcm=;FEch!~7+dsb8>kZ~z9gxaWNm*N&aDY{Q0dYfmH*_l^>wxaOywyegqo|7R5zGuj^G(_M|>^S2~F+Z)_yYt zu+t1te2xt;XF5SQ%}|0OP6~SV z9O+=tC#ZO^-9q7{J(oU4gss5svNZVsb^od)B}rORQ&~yVgvYtJ`f0 z+J&W*C%6d}vB~hRGCO0^v_x6iHKW|a+ln-@W5mL0v?Z106$S05t3XqC=Zugae`$Fc z??x@h(=~Q}9gaZq$K+7WjIa)=)I{hns6D05fd#b09YbbvyS3N<_FZ82sddW% zEDq5r2oD#hst%Ys^x@^w``hY5yo1QMl05x+vs<)R{u8>fdgl>z8|_e6Gi2sKmT8@p zfTF0E^*la@VYM__KhM*7p;QD875N)vRcD>(K)BfH&LGnZk?IltVO(ZgDzx-2z_Lco zZg%-4EiVp z+bpB`2^m&V)Ou2NZTufYwTt^xnDr35VDRP>FZz=1ERP^JQx+4y^uuuH=$n5wRz_bm zI{P`IuWkl7n^jkh+>cpbpi;^%6sT1fakb2h%EXS-2;v{gK?wZQV~yOTpkw4x+PQGR z`MwHHk|&gnk{Y^IX402w#nVnKS|rWZ?MmU)xH#gcKZ6SpusSYNAXVTdu)pDLE1T8K zAumJZ5{lI0_^_0k;fX>`Wt3o2D-kj8M)~6jUUuhj=T#>tl?P=!dispfW^es{b-_ac z$7DFY9aFCVnE=~(0}v|8=RotNeA1b&b(s*_g)YuhXD>IDI*%xbElMg|zx)wnU!yTT zviV&vdvZ_c15ix9$o>fm4#p$pfe&NUq2FFHPcSKgR_8Tee)9Mz!MUnEo842ID0#fi z0y~s6n~&2-ie&8aqxceOuF@z&KS}`9-la>1Zl}i8;+%9AxJm|BAoRlMj(L|8EFa;_ z)!+k|qmX8M1<%9w>pLR5Ps&J&)=#_GJ5OGHQo(J74u=QC-91b_k3ZI!_uT&S2Q|0 zper}wLWRp{uE8;ua*2g;gZ6$Og}}3KQEuSAagNE#78h8Yg)#)N=?lQ)8y$HgWb9Ya z7(S(tV*J*4LJcBr-Vh?&$Xf6&JfEtd^6mVbKfaQG&j#AMiLXE})&j)>^EjmL%tDj( z6_{0h6VF#7WHNA}u>`yw8mPVXT6KULZs4aj><2@vW5rzoB1@BK=z`B@F<-h8AfAPoOk5C?xBut(Bzo)3G(&m;Yb*-u1vo1mSArQ)q75H{ZZQVK=;&q;f zHeRnbCd5CEfHmpokAZ>Ea-u`^Q7dXmzYHz2e$d2Dh#wJ6hFeeHtkyYONz@>{)e1MZ zg^Aa*v=q)lFR4*Q?l60%EWdNRhw3Suk8N#1j!T-_1@aWFWHKWxG7_($Ml1b0bQK8# zUB++=ri3D42I?DT4?YKywDG&1A{>rv%TbUSlex0kAvNvHw+JTCKaFRU(w|O4ge@uN z#1}S7s!KloQUb(!?V;s@0BDq<(W2Yge&lejZv?HGKU$0D@7~4;rH4LSEaue~+PN~f zmbRgiz}3C+M&Cr(W6ulgMm*Oaq* zT)H$*JUnbSUdefvRPs*`cySLcKB-&VYsk`YqkDgL)4mvgTjJrf_8W6UC@qy=(-OD0KcWBB^Qh}KRW|q zX4C^83FLsS{Zamh04BR>86TM)grGUM2e$K5@RgWseHrSFi4UK@i63z~+j7_W!EMvh3)%7mND`thVIUw=-wNqkZD;^R+Q{ zRu}vIR`=V>=TV1;Iwy|G=UGZ0I$n04IhY$cq^}k(e~M{h=cqMorgnXZ;ey@TQ+(!k zLFM<&u+Ud|r$!&ON|j?%$FHHSs$=zi_qSNiQ_AE0Y-90lm#|9Hh(fI`F3CaVoOXym znFT8nbWG&@Pu-SNl>Wg9cYfd7{hY5rGLofrR?(vUZhp>k|LmiYd&)e%=kz9t+in8K z&@LuM4HLr*e!|X7kUgvWTpfycy;*vXd3g9s`4C*k*}Ua#yj*xch|_bbcUYk+Xj!b0<8MO&#X$U?WhH#Yabq!RS2q=?}og;Tu^N6u)BI4 z(s%rj^MzKJ#mbd+rVUwf-{Oa2p-b7D6{~~aYJLYVd@bS0&EXBL{Hn+IY{^Z;A5x`q za%ldhKSH3dk%B~mjEvUXIF`!Eob&V=f43~x&U~+1IQRxPEnR&D9hs7Nk$+jW^w`Z@ zTMUzHOpzJiANIHLh734>a^NzrcK+u}VA3?MWF6goENYqY?cnbJV^jea7y-IX2Hdb9xsa_>DWLj=O@-Ir#s13-8Pp8@b?ir@B%aB{-E59=k2DUBWPktCz4#s6iONqRP}y4Kkv=Y5B{v89=fwjoV5u%YdO2sNu~OzHD6y><`)wH_orfO zYYXb8XiEgGH2JfRR8VAV>+IfVlE{=90c+o-8J2X%w0F^M_%Ag=$=jIRjfBm6wpi2E zcSI+>CwQ@1z9%|yaC3^}?ud>?Jmmafzug?t*jxO%PMpZo{US)5Rq5nc2m7C~J+y<4 zRu|Kiz{uK)%N~}qWL$UunX_UQX0C;)>W6L2Pk)g-|&{iUH0O>mvD(z|kStSl~?*VAcZ>R{UVa_r#dq~w|J z(QslG*@TE*Ogi}{kY-wqH zIhe{@+|h9jcWKnWkB=9G>}|wUM31WWerD=d%J&)hI&`QPW2odFoM~(eyY8PB2E^UC zrs?>(N24!CkvP6PZ!>CYXHcd3Bdwh6PwIi{@Q(@&wByXre*@QltGEnL?=1dWuXPFuIt{d|yC8D}wqLcQwA1Ex1?F|n^!j%b+-9AH zC=HZ4e3aqkb_L30H1*!gIPuLw7xSjt{3g2y;Ec7g9mF1%+x6Ku$?Q0s)idXZe{1b? zp_+03&e-##Ki&d|i*(<`uktHp2FKp)YU6ORF<$vlOy5Pscf&B0V4ek+ll|kf0spC^ zb=-Nn=Bq2izuq4ZS3mTLHoL90OEL4_CMqWs*$rj^vG*AG)h}h^=b9e&rR{QP2z_m{>KF+C^4V_$L!{r{{drIvXC~vt z?886dsLn-;pKB_!$5L;SwELZ`-)Wihb{^3gi`m{gapYp|WAvX{Ee>m)VZkLNCdJ*J zc>H1Jg*3SY2^QdQU%;@D=R5Bsd?Vy#5vyKi^;PTWnZL z-Y4`1>H+ts(+vH~I=K_#1a(oM5^O3H@9A?c8z6MlsvbKO_uEe|583#i{?K3FZ3^~F z7ci?Zt++o$qCU?#s2w=ri4HWBn^5VKsR`d9v?0GhKe#L&+#`vIRT6u7Dx+DSL-&&S zd&h3oFNF&Sm6udXtTV{I*_T`UGB~=5v8Jt&#;z=k+^=X?SO~SMR3(PQTz~pVh55%I z*`hWK+tz8G##7$BAThA=3B z1{O?hZ6C{_z83YRcYGruArSvT{KHG!wr=f+vGIU;+&%Ic$)?v2Px%^~WEs_C` zC|YC5R9UV{!zDsPRYut(Y;?2AINEg$^@T`=gubPY%WFeQ^|?9^1=}2gzhU7o|E@^o zWG9Bi#_~@ukR?hr{=!82(8rY1dt%=uu^(QKvW2;?q*~q2I9^x30SsMW@h6zPEi6vK(5}|dq+h5bM z4m5iPqquoj7mmb)O|+w;mgMkO&y>k`{0n6yg-xls$UEAP){i~KLJQ}mFEXXSY4!P# z|E>$2rKDgxBUwmD8e3?t$XlRFPdr31U`{&nJS(x(Xti{)TNonAocuJ+tao6Fw|cr| z@NsJOQk_vmLd@c~>38PX*yB~%69Lb%=QT!mMXf6F?8!_D5@-Duz{NXJa8o1dimA!qh5*D1{dF$R3ORTuh~6BhC3$B~8_K zmLM1u9JGrKzh-~gZ0Az}%K$zF1qBtAFUWNO5vT(J#(xM}3((rUg24q5+|ceL%sTYU z|HZjv3_yhj1_l6_?=~*S1O)K;wgFrgkzoFReG?AJ*P^=6XFM3f|1VzYf6_TovQ$Km zhK2^SI+&fMTwH465mKVdN(&eiuQw-)5i!gV5{~b%vIj5;m<N|TL^%|EZjYFZ2q7q){0gh8~2M7#Nwe zvoobn@I_1Fcz_~lSPf1+VS6HUCSkRO*^0zo9Jg}NEGqUglon-fKN5~3c#iC;kXIE>7$00AzA#6mpy%M_PDO>u}w z13_E?Yj_Tjhbc*~qL?y^7s9egkg4d?&b1a46F3==k-?^6xa&{R-glh$Iv$LwA z;#APnb9^9|qyktmfN#J9j{`iKjg!;;C6tm|XI!l`$|`48~0W z*o#(xD!M*hj-5OQei%>jaKB875g|al(^+o@Bt0q{H{DrpW`+!v|HY0VYxqeDRi+=?IM^Zn?RNb>y-MCD5Y!Aoe?T6Dw3$$A$WD+a^Gj_iZfxbH_g`|mlyW=Br zQSyGBh1^h^Z}$~NL$;29KZ+yGsCGH}DYz|+@KElDV>^7Pz#2KQOCcg>FwoI0TfeM;fPZHX)R(ESq6dg!*!WLQb;SG^9dD2&`Vgv{0ESDVSvkehmbZ3@~8|yI~MM zDTy(R*Szpn;;+h90H69ySw=>t`x%ILr!8aghLk=Z z`34_Y`cyY)yQ30lGZ2arS-l|3piQ_UCXKMsGH1AZdwb(-j9Y6Sn;8TDEb|47Hu_Wi z)S9$NjQEP=98d1h#Jd5oSAFyOXWVa~zAkM!y<76Ioc!VjWDJFJ#=8zsy^QNw3$FNa zT5;dy0x*8mB;6-~kn^}v(oB8!Z&6FKvAqL)2XRVgg@Fc#m;=(OM(ILS%Bf1zh0mk#mW49p zh`S`;$K&_?8F*(Uj!CY+Q&;&u?`QmTDXFL>aDaIO#th#sSqFLaft(zOqQy1Dk9DCK z#OW>fzA${yM$B#y@MU#0ouryC`!D)7rl!KuGF+;KUX%J}BtiAL?Z(fnn(j&uKly0e zT|39LEwC{HGh?L|=P=hXcY+=q7p% zO5&ZP)8Xvn>Cp8o&#R{Kl_IPfHamd%hZ}w-VnrJ~1Nxa!ZL~DVo<%d~Mi2=VRVIg# zKpMUIRdh6(7rnFzpruf8J6`@a86p9g5>kD%L>2&M!q#FniC3aCbG<7Srj+BOGf$UD zthEYV1eqZ*#(8wVir#@2eaNScdswtvloChdvQe4sc=uG0fQB=B+KeRs?Jl(Di&A2vcppzVfCM8w;y~gbw(9LG^KoaG~|$zs~DLkX`S>zY0BA{h%m&P{0R! zTXdc2`T+AT)X0{APWH_j!$Qd0H#f9;6UuKqNBjf@r5{I_r8-}n%E29c#Y$Icrl zX7E}peM3_PZH6pU==+D|bfG!uM0l$-ag4_Fi9JA)dHdPg!hL0XbLk1C5j!~kLSDiR z%;+G`p-KJ@9UWbU4GuTUU05JOh%_5~kUI*R*q>$2Z7u3~MimxS2MX_*RJ=y=G1NjIq0Ng_ec8r? zu)5JoI}S+?UT=$U0@-B|3SfLff0VtB;#-Y3o3xovglq+lb;}GsPeuvCUGNqWN6F5< z4NRfJfkG51t-IxdCV~+ASKuWGSu{J-Bi>uN5ObM`f%BlA^*}eH^A8xq;{JpqkO;R2 zM1TD8keA@z!2PCj^bcvf@n2?Hgkc)~5aENSTmSW+3YK-O-@O7HK1e%@2OO>Mr>CdTz9L>Md3lR5=xyP0z&QL*?uRNOKLj)_P-t}!jPx5ecqpTTdJ}ekK1TW-&XyJyuxlZ-Kbj)tp8h9L+Of}3OgZ$4+I=sf@$-gaR5|$&ms`^faVv!$nO{?H_8n}N@jJqF!nJv z*x?!#_aGGDS&GaekFOOOivKCH=e~dCUVf;+{RWy~2rP?s{ulOS1(X|fRV4WMbRAFD ziL|#rF}I5ld|x#?mm6Ewz+L=~~~1pU`Z@&cPt^=pmM{c%Dc4n1;fK z2uy#Wn$_ZBK`a*SW)GUcO5PuTA$jGT+66**5>I~!!Olc z3d|iQ+nFW1_DO$#o-quU`&pe-I?ra#)Lfj{QSZ+dVCbYM7#*A%9-fbxc)ZxHpEi$O zuQ68NoDz7leus|O$H3$3Pddk!gVxT?e!|m@r}bzbq8}4kR^NgXg%JJypP&nGC`NmG zP7pr9K22m)SK==>c=!C_d%4cC(Q4oH^%7&D98jSQ=!Dg0kX4$Ak5Chn*=AU9Vx-(Fp}tlJy2 zNNwYH|NHvca*?SC8QD6z4?*kRRYeCE{~Q&zf|OLizX|f6g83FYAtWpbVo#_BIxW1p zSi;x2+ABNu`5-Pf{naS6$L{65B-APrG@KJw+{NW{zwi&zw>*2EUxmFdEx=Y8YW35% z*hw~MsT_6TX6nPYtwou!z^4+fJ!@?LLKi*FVSRXEiC;Xq3AXzGqkeaQI|&S-b|6&t zR=MLKnMFzP=Q@6&eR3#Xfgsy)qwda>V4;-zg6Qu(h59J?duO z(6qNNbIuUhdV}G&QZfF0>~2EOd@=s;i7?Lx*DNVXeMg;b;ucZN7rsAOqPHNwN*Tov z*?zFV`Esm!w(P`XpoCFtek&AbD{a7qwa9}t168&+;AjButQ&%ojvNtGw@y8g=6#H zTt&YwXL%OOgN7{FGMrm=T-*fcMt! zxPVaXLT7!Gmq56X=k}n+a(@G;6F_$-kAz^35*Jq&28fayK}4Vi;(g!83%}#);IKG+ zy*eG9+Wv8>@|f$V*(}{ka;m4N^Lx94+^S+`I3Ac7RZmM4uUG_!ERg>4NM zS~#{a#&8+dFrZ0FPEB!<71v_73%nma9>q_6x6V4`Tus8IuoELjO4by+*#Zbf?Gr(X zhlr8FN*w?&T29VgKor0V9TpwU_`G56xj<#xlS|3S$xV27_W%6B!NeSaOb1|)kCbYl z#wXKI5$Q|OYJLYgKJ;b#hP1P<-RsKA%CL(6oN2F#$N!cLK0qSW&ptx%&HuBpAOC#- z?fO<50wbws!gB#T5X zt3r;YSQU(x%QRRFOiUI}l}y{bj$s~}{%&ORhYm6)Z9&rv^J;#6KCI6R>RD{`IjeDw z%Nmcc>w!?9At=pd;;I~wtVomnl`(WJt;1tKZw0`Cvuc=Au8%e+`?ZLzfVo1%E7;nW zjM{*XW&s?O+9jH_%io_nLmDWcaFFQg+SSzsZhg?-tif(Hi;N4`dixn|2vdN2X985! z-2@t9&Vcd{mv#(+_S1FsW1k!8z>j=z9D-1W?Q!!5=WQfE9|(j5?a;}eKY}$^kl?Y# z{eV2y{-uyFf)J%g%LOzYVouH*@=hmzfMi*Pxxm;S61tNAG;O(FVgbQ z*qjtVZ~5qpje^;#YUAHcQ;NZ$I!!t359Z}wqXnNsto_s^LY6Z?p`Q4lY%ecE_e;I} z^Dao2N4^zEzB_$<+ z^0x%Wx|+2a%A6K?VVt*-P$povWd=nE8fXwV00is1Jt$NTU8i)izOh@(XiEXwvptJJ z22L9=q(X1&3+iQ4uT4f_3`G?HRR_WG?Qd+HVU-2YH>CW?6}B$T3fNBvC`87_7LUNM zib!g3jts%jM!dvHz57Gvy1HK=S;7_K^U3?rCQv>i6znp@-4bq!5nV8-qhSppVjH8_ z1;J?A_<-{a62<|W`wC?-G5p5M?df=v@L$D5UOe6>_Q#%9q+V*6ypS zGT6}-!`qYQFs?L&H{0NdNRzRbc_JjIi+dwV<8Q~+`TL}Olv*%ms!afxOPiH=1VF6n z-?!M0*WpW8jM)n*r z*`ij$6BLTH#~5BB5fJ@|xFpQUjstyd1aeS-cJo^Qw7TEg%Lc7qVCo(;h-BY~Lz73Hk zi679&Rd3MRQF3;N$0QWF%+duC!*x07`$GxYk;RUnH@1lJFIXLx7?m{9eES{gY!G`F zx&%|VZ-VY7L?T{ZizVQ8octV|I@?;du3a@;bY^nTOkf_cHc=` z=>Rz?DiPXBvQI|K3I>$FoJ6_6f|-FbqXzW@q+D1ux&YvJl%=35N(-?&enC93TZ;2g z>6D3gbezfrliS;!R|TxBw`}9F(9xKJ24j`Xmp~n@gv}dMS{?8!=$9F{eN08%4^S`z zoKScZ1bDtM)%9U33dzepdrWc}58DtP1^Jz5EcpJ(v`QPlCp`QO2}5NKYR&Xxb6LU$ zfX_aV zjE1LQpF)U^IU^;B?m}CNb>hS)#=Y}1 z1@Ez^MiNR;h-nWN9u@%+o~IMbT_%|`YOjr4kp9LM`9OQRr-08#!y%{AngHN#LWoYI zm~In1+XA)wjQWdCt8t{S)T9gyNH@U>qCh9vJqa4zJOH+&0wI~HdH7253yl_bTOrz` zUTXr$)sa+!1?9|)Zo30=e0*)#1$3L!?rEY^;txb(Gyr7MoImUS;AaLvMhG2LFNEkQE!yI0#WOTkiXj zTQzAP<=ld)@umEs;z1dXK6{Ni#WMkS+LsjBdQG{`m*1U3*>OAo?Tqs|!QDp1a~V2X z0mW&Vlb7Pa+g^a!#`(mp2ET;+M!7&Q#BONfj3gL3C!-#Q5&m%h^C@9GOI!oB^KOV7 zN+bYEG$VzWTdyMJ^!Kc_4~V~mME#WO1MbV%C#uJ1Ok3RA4lGKM3Gy~_F193fOeWH| zJ_n@xk*jQV>ARq5kw0Ht`US@i@^4+7QkL$OiUGF2wBHoM)Ju{`pBjKUt})r?I=BZd zoFM%q7 zH#V{tojP{B$@!3&1tsPyk)rdEq-jl)>fCk1WEB1QpWAAy$t9VrHUt6|y;5pfySLM@P{iRPB)3)=1xasX{?g93 zf=IhXTVq3%h1`Y)9G9MxA$7V6A91ft>eazG?15)aQVP(<2Hz?plTcB z9vz$>*fLOE|MaW!Bj)EBjo2pI63!7C#fP!tC#2@YubK+L-9$IHB=1R7oPo}pgYq$s z2{~Ez>5nE?=Jt!smp{60LHy|?;cZ-^+-rt{$2s#5q~287E}WGXEif*})>nu_lYS!! zCosu?(w30oqlX%5-RPB$w%1@1Ua=os2ffb$!Lp9nWN1OkNklmhIdvI|9=}`9-XGW( zq&HKlm=>edod^V|N*zi(K&Mao;oH#{qsl&m-VU-rgsr>-bClDN(i{i8x}$21c%HPv zTVMJR)z_>?Vd<;BDI^ovz3ced3|;w*NtI5QgWP)Q4@Y7HQqq%tobT26Rsqv9_FwqP z{Ogp79w_P8)Gy(CLiWVX-%%IP?cJ4l50G3VMaBVGrJS@Iy8-6^1F2sH_p#levy@|N z6b|u(pTug(B>WQ9dhZ!jMFa&SWATv!jhCsji3>_MJikWCA@0QlPzExn5%wLjbqk?M z!8jlUuw({(`SJ{$x_h@&!@eL?(OBTi0#aiW8U)#OJT#xSL7cBkQmje?B@ZWB)9g^} zp~s5~dM^PzX^{7sYU)vFiTaP}epEo8iA?WOQ)fZf23*p(8~}+xVn#C5-s&Ppba}Z9 z)~Y4FQOc!>wY?udJg5R(`5mOagt?^C2)m`P*<$S51RO=M%HD!Y{+Zk$Cg`|dY>lMx z|AJr}uz^^)(nnl@chOl`N9mV6&BpVq%d=Eb0qx#=z+uaai;!;?RFM{dRv%1khBa1b z`3S!WvV8uEw|d+VT$XR8M@$M7@!bB#i0+!%RVzpzGC_N(*y6S+lMmtV#rFw5xbHmr zMiGjLdf8^P>QbCENaq<58cukI@X0MNo7QF{b{XMqTd1bm4#{1m{slxav8ZQdQWL_A zAt{X868b90dA$D{T5|eTwJL%7H{20q))z8Z_T&W(P=UlGP(1Ccqw~vd`=M|t`2;+X zt2l>Es>X|hK)6l9VF6FtZH-V#ucdHimZ)ajqMskp20_^!DB2$k%qtR{(C@0@zCM6u6$vHS zxeqeN*_xS2AnASa2=)<#4KNEdL#Q8}v_6`}2JMf;T|ARX^9dp6gTD7mp5ZSPVG%?P zVCo+}IhB+{ON}pwPn8Etj#}-xfF@S{>lQnYw)-}#cG2v;^v^lq?(q?&-Tl2u+c_Lf zR$l^53AzHv!*e3qdX;>iSUFE)gAUm-sU=3P4G?FW>@IdQ?X;o;Q1IvY2yUTd%1J<6 z;vb;F5gm9Kacy|H-`OgOR~X(jwN@0>7_0(e?T?xq()H($lzz)^6WAp$CpT`So8dRX z=Z(sZ>hd64r;R@#!Q6ca$h!Z)QhXejD9>ty z{NbBS6jy0i%tqjfy#&t_<a7+XQ2Zi47bhmWqNP|3b{3Kkq((vObaxY&&~oRpOPn5)KrAG0E_Y06Y3V@@Z;5*LQUS#D zPI~>yv9pmC1?50-G!pl6v7V>=J9552_Bq@2GHz1CvndDYpCR4M{GI^BqCh9524SdI zkFU}r(gA<=^xGh+fK46{x{OIFq$$CfZU+(%Zpqwo7EKUy0MtMT;YqNcV)2|PHsZkX z@UG801Pj5E8hyR3WBpH@VsEuW`tlRS``AiBKS}V_JkV+l`K7V-PU7La6W)H)#bPRp z?`7qUrh-`}?_FOZ>$%J(Mt3|zWcnw4Fsn20L4N+LW8vA0M~^VurUun`Vcvc&-s;dE z(NBVgAbcbAr+Lg5hDO(ou-`wUEKa@dzGx($M<5C&%;LQdB!v+wl>aA7)bPUljbL;n z`(&e2{bfJb%J(GDn@|h86hPFWmX;O_R`ZR{`LNL?+qcdh=wM)QKuX|xu%g7t-EsIA zhI4rDetfXgfr06=c>(54Kk!K+I8in|<#w*A&8yNq7=Zyz9@aobb#L*7kqd6qH;##+ zkiP&n#cVHa-_H(g|9DS05FC;z&sLgq)%)Lo&}6K#m8KXz&W6*h^MZl`P((n+rg8gx zmN^72Za{$`V$+R72679mv6284!jcZ)hFammf>%sOVnP4U2hKIho+#`*gGea$l<6+o7uIwq{Dq}0U&O!fj? z9j+0hRM-Q+JO=2clGyA40(2BXASb`Ov_jDb?=0Os z7;gZHSR@{jRxFTW`&MbnRpALuGo&rXTz%{oT)92 z|MmKug8wNY85wIRNJ(}HtbE7wTCb*39zKF?ty84 zf-W765Cg3Xds~Y%=W<;0k<|7bOw!Jn5WY&lZ)75HAE&12`oPX)#6{q|C%6IeS1@t( zbps4TK+x3)BU~Fmb@7zs7TJO2Zw>nswy&PMr^!21Q#h5|OFJO_jfb^~a%sPW#=x445^L)PA&JJ;` zM+K*I!yb2Iig57z<@k6QO_Y#iefE{$N0CpUDY6^SLF(eREBJ$$@qGTJs^KdUwBo$3|`_+ru)&upx6$JK#|WKhR5n2%`^|Zuss}^hz{i zz)Q)he_x;M1$2oUR`uXRB_e}BW2+xYh}{f3g4kE+_MhBPP*CEE4pl>sDAl0Qv!m5x zB=l_42STUG@LWb}WVOF5TQ((54xI?1D3{1)MxyBVm}cV zv4#TNimyr52x(;G#HwKRo_cC5%Kj%99uyQ6QPndB8=(UX!yTM~Ow(4_W|6>D)4NF! zp3vV1TU%|^*i}NHhtl%-1y1bZ#;1fk`3i2WIF|8&SYZqv+2MrjK zdQT1TtIul3$y}=?&E7NAku?zygZ_+B7%V|=CKNdTM<*MFU;uNjzP}fSPU9 znL(D5CoF)_z4#f7GePFAZ_HU7@I1T4>({-?RyxN!njDeiwJ;G}6G!5lm{wiSsWD@P z#!+7m5a|a!!Y_$Gb0;T{(iphN=Ps%AK3wGUe`pQ(T!;lo!mI&9!=;cz<%g_SNpiz7 zgKEgPCBkC*Na%<$xCM23T)$g$2=9s4&Md!hK~;$;=LM8MNE}JNEGx_4PZe~`3i-mv z4QISnAQi-3+4s$5fU<^+M4FaBNM4B#9syZTW95YrZk{;E)ocZB$5RRrgsden^&^hF zJLVuhQrk)oh^AsT-y!ngOz%9fTA(SqfTT>&C#y1{GYdoTDPwQ1=C&?mH**L_J@%`i z9yNlJOhL2sIbA{%5}BVw4YHA71De;EF@n&2$u|hTRl}Vo=Ma8 zBc-ID4@l?i@y2nmSrLII%3{&ACzo;RY}1@#e~%_noDf+$qAxk=7~)yb`Vl$+pX_!guzBI#EqD z;Q`K21&*aM95nhowK}jHv zE`H#}B0SO}Cex|B@e2f@GlEqNgVHZcYvHbeG~Y`QbiO4_ZPBe#p^;CaxP@HH_g~%!oPS_*0i)e zz;WaWGbB^KhT&qNHm*wGuuu2LQU1KH?QUGy@hDGOH6+#)l2?KN@#ASZ*JbnaeosnD zT#QDOh~saS;=Hjs_G`nKp9$JDfC$~=MB-RRPBiGOZm^fl_~kKGr|GzgBhMSa1gDUO8C@wDVO4UgOSJ{ zHI2`10+d(YzhC$|GW$__=C1(?G=cTKt=c%UuauZ`qYg}i`w)!2qItp@Fqqr5HqZo= zmHOZ_Wh#1W&4k;Y+8nXOW)SyX^NI&{>`eG92dv8FzYQWKxlpuWnNVO)|0SzEQaZufqZck^$tmU^YstUB}-YWJdhaC&ZC=AXLB z;l(OZDt&*wOrONy3Xm3*V8P}C5Z8X}S%)ox*rfMw;Q1n!PA`N6TjA^DHQ?#v_2PcZ z5lkY3>~32`C1xdfQ$%#sp`MRSC(i5w`PW)~t;-bcp~VM;0|@ z4B~jkZ6s69%51_iLncPXlRWBLbtF6P2j^q=7iJ-PA9fgCNAZW%lJN^0Kl|2XKf}Xk z2BSVASO=54`j-U`DZA)fm@FoZKGl%Wt~{u&LX-bVXgQKCDLJ8z8BLm~#2x=003|J6 zBjSR(`22!1*HZ56%UDGr zH0y5R7-+j>LO0DPW(+)b1Mf#RwV9pA?Esl%$*0PuVZ0$m@O&2y%nPK-EB2QLU#p3W zt*0aCerc$_d$f1u)wdwY!T|hDjRYigY464u|%E@S2xQtWKJe;$BoPv{%Yv4HhA)E>)NRHdHIUoTxg7d8ubhjQ&8) zrSoA(6l#S0*p0hHJgVn*PdS{>)Zz?2*y4TWAie;3Hlx&lTu2sQ=qVPp*jwzlaQB)9 z5S!m7*lGUp7;`v3?BFusilBzTVDgT;?l#3+x#Ur}tYAp|h;ClY$juio(q=)$Z6?{(vwZBk372auC-|jO2Ib_f`x*pZPrV@A%rv|LddrIoJ{&SncXWi)al|1}L zQqmy&omi&0Uvuerr;gG`qwAgEH8Lxb>XvtFjIKSJ7KwEot~nf!NQZ#S>Ik*?4`uN%jwKXtna}t2--M`3C{?M>KjEnbe#- zdDHQfue>v}$(0z#wcv7*O9vs1T&=G@n~5nCqtase(vq$BX*Qz8ceZOdH0rkl0)HUn z(k^)TW9d)fmFWB&)9}6jY$HLtV!oo*|Mz`w{+F=wzb_y7|Njb`6^$Tr6!AJ@35Q6s zzZZX0Y`k2dg#w-z{42|+$&e?$3b|$d(!_yC)Dk|^n{MQ=*9*V|P;T^h`6mG?02T?d zJB9?rFcj%W2mhi3R1O$N92j9=n4+Jmp1LDs8g%c9;(#7NQ)Y)eoi0M__ zKJd}306_}j6!4`@VMVXnfn#(>hrg3kmGe(MSh-;-q66XwXlv9{dHM#AZ<7+dpSAZF z@kQD7FgJ-_?g%Q~KR)KiZpE65p?E>JjD~^H?s%U-+%omW8FkP zFa_i6PgxvsxuCXXu8vE()J4mwOMEG5uyW#PL_-l2%5{=UEKy06=xF4wuPbG*;%^?W|2a#HvZ5F`wdp+M7VC=hx{ zfUM|mhXVluPt1xnC?jg%E$`tcTtMQjQ3)sk=+*iFi-Ul57nCr}ymOP_$$<~Ju8ou# zt_V$6nD{QUT?~R31Qo$HI4Iyt!X`n-$@#aq;AY8@X&t~w1Xr2sc*J`*n48K#C$;h# zgdB9?%MpCMyu_zZ8+|79{=RY=KoCon=GX*7uAA-MB~sa)?%`cr+B@B^1OfLrV)E^K za6{nex5E#TT_!>T9SjU6}a`5eF9R};KpD< z&%JDmM}*2sNu}jMpvspGh&+>Ix@gbz(A-0(4X}vE>@srqc0a>aA!TdMwk`~PFHB0% z@FS^srt{IXv~FQEAQN_;5emnDU{W`Ee(k*IfL$v31A%wo3_Y-qCq(X%SYokQ>Tlq* zDn%Tr>$didDMNzPP{O&IZ_R#q#E;i(cUM!j*~-N*`#XzK=ab8zMxjmg zocTL=vMTaSroRAB^T?5!!Q^&5__7k-KsAS&x+%1@yn$Uhg$=$leKuV$PU#c*4hv%D zU!3i68iXPjcC9EO&Y+E2u-*LvhmzBt)D#O*ZoP9eO*VZDf!g1E2_b8C5Y44AEsF4f zu#w6{IS|t;D(3WLKjpELPfVI|ny;(KY;yd}*t_bVA{Adehn#C8Rq4N2=)V;r-wC-~ z=~~htav~on1eH3#A-cDJB!uyxdOVj7=72LM&XbZ;XpNZSCyz}ySzhnEV=T~FoPnfc z!3Yfhqa4g~VsQ40__t*~g1CYBo3^O#BS8=aeI`twIXKb+im+I@&V}J@=~#W$dw56< z3kDYlkmcyZ=6)FJQ&r=~?jpeDl;d$$hmWkk7uYekeDz}`gX}1QgEBC3)Zrenr>U=* zs@cDdV^YFG2Iw4@Y%1}A*DjXCrdaHl4-bAvLR^rtaP$^j0@U}NMB#Zx$Et5&bNM~h z7S6T#VHGQAsM34)R^oK^AD$yJ3ShjWNN@Tq3X@u<=cm6zufxWBUr9?_C?;*(-lrgB z-zsCsW)ORZcZ;OXG-3@s!Qij<)=ZVX+d)+wvpnNlMuyAM(&f94nno4Sn_Km_&hUX??Z zdQPB|XAPDI=ZRNwsTB^otbd8Wp0M3paTYW{39#oG%3{N3JlTG#IpKw&N7#RaDfg2^ z*%8#~*5Tr*&gZ4@9wfRGtdeZ=DSL~QO{f443-6%1ofZb&nuTJE^)Uz;kiKeNebH>4 zliv<4%8g@N${&|i$UL)b;NJ(Ect#hHg(WT<-B=Wz^k$g<*NsQID>YkEJKaMlKnyqD zdrRI`73Yb?ozCetQ?=ypAtBSn2-Xra*Cq5tFUc?<5Uy&2W2}L<620C%vocZhZ3aSl zfX4_J&6cPS6eg|-wo844n(OIH&57=OjoepLsICx1JQ_ySVSOW!92uGYiC4(jw1UHP z)hWQ=r<)O8&*$HL$SaUhDyC)_xIiy(_fviVlZbhu%#tR+a^BnB{)8HCLO5k{Fs`^b&J6vTNY7 zl3|*>@;Qi$1WMGIAqh=W5ww=BobwL$z% zg?hhBUyr)C!2;~)D8CjbZ4EJN9CiAi6g#)nUWd9UioKz=&b&c0evLxvsQFX%9RhXsG9~p;S3ng) zBPEG1&eLkCv?7I3F!{F?=aAG_+#a`FmcS5cwRt7uY~2bETN&qBA$Xf(}T83@2xNtT=X*T%ytlVwDD0F<;R~#^@2V9qsl)=!9 z5_#5Jkd_lJ$xm?TT_!TrXgDR-r?lvITeA7wwbbBJ;=W7EaKE^=I1y*>kV`kawI9RP zV+%e}f>x-xKl83QM&NY0bFuyz06tIq6;Pb&$(M0M2y0FN$KO%j1=AZv1fHyO1~jE= zf{{%2#z5ozH<^>SYOFsipfj4Fy@3=wZc`5~NlxeQx_ zmoDOT!81B)-0yzvY6hO;8w;wE$ecrm61&EM3BY69LoJPhU2cQppRHPG6Fz5x3Rkut0%jK(o8m@!7yQ)uKcnkz9?gI(B*B6= z7{c@3!f51exl!Hnf--|r_3=Xi;8(eac*inQ*!qwNgqknVGvUZ)QhAD1reRfiG2{RtTbd|;Ii0=wNV;1AaT!sjb2gJf z$(ZK>Ds2`-ja?+I0@1NF?7e3rQ+`9b^CI2+4cGo6WV%uLmt=um+*0}@BaIt?3#A$I z@AWt8stR|P4)I@ve}f*ZBM<)>TApEIe*^=0!f~$DBIPBqy&5+@oN!!TxQl=ZmL!Pp zslyr9=!(PoH z{_+A&is>3T-WLq@0F8fc?fu>9Toyx9%<+-pdB0~g{^4c+4jrYgrOd-jse=6WaWVF1uxO<* zy;|SaEi(7EFl2uQ;FlSR^kj;)k$m>wd>I;fw^=^}LO1{E>1Oica}=f{cWcm0P<)SW zqjj_m)6$?>QhYP~IyXaBRK#0yVj%|@c6(tf(U_wd7uX~-;z?lxtN+ddxC(Z#pPC;$ zb){etT0uziSN#KUbXS&qa`WJ18oSJC^dFF3%4>G-Lufcd<+yl3{<&qKE@4DC08xjK zt{EKX&^q-6euon&=aG_Ra|^gq^$@GfV0@Kqn-D!2AgC=@~d zPU!wG7`vm#l2{}oI3XLEMn!y-6DH2bFfC8e%|p_Lo&_8(>Vb`sHj*t(-Uc;D?xqAQt_h*_8>ZebtT&Iajr4KluwQYG8hA!=9{34xOSlxBEZb}R5@UuNhM?lHvrk|`aRQKiCKvFA(4-lLex#E3CD{C(+gTuS-Z)_e+$cE9*N1oDcgzXzKK zg1+j2Ul!k6JNuiyb!qQ*ole%q!nmvn();J!7geNt=wNEWRsD~;Xu>8~A1u6zQ{+=UxC|3c)j&)7mj&-+L$q3=iKU{z0t9d0mCo4d|#${#FXJf zP4c+%3UY}d%Vv(+&H`kabVgCoJHrIO(=;92Pok%_KVqC@TY|y0Qmpk(OQn{U1|(c> zCXcy_-~%$ZClLpw%j^BPU@}22H(C2|7Mx|e9!n}ogk57#l@2n8F5Suw14e{*`nq47 z-XT-amuRHu_@j-^jl*8UeW@g`r=9wNO@8J6SGzNVV`rpaFWV~?7Z*QaQYb zr6+KtKQ)vWiQjn@`QHvG!Kwh|%D-Bj!RNXQEOIG2aERdeK%+#$P0w7lVNP<8O8UahX1Y z)?jhV8gAGyKY*O1Q0|s3ifFYORZq7&6?@|G_S?`zU|UbB-=5FzI77LdhhIqG9Y9D| zX`}zTjuU<|%1KIYgKx%Po&$L8kxY@S)Z9$gCSm8Pic&}B^mLQFlcR#prG_Z-L#Dx{ z+2yLS98H^r##;BjeY~^__;1FJV`u=xLo-0T6D}cvT_yCwB~OrH;GT)R06mf7UA z3x7a-uQ|v`_2TcqGkpXr@cr;n#Wnmj2~h zUZ}5+0Hg!uei`tE;15IZ_$~7l=6er#hEIM;=Wn_5hn{ar&l20-72^CX34h^>sp{R4 z@`4R{h(Ye#TZsJI#LaGNG6y>W;VdjrDM)9;Uh!++>N*s$Fvj@glGQ?j)QD3oy3=0Q zuk}x=jsf}j<5;4`mP$u03GB;~+qE?{HL%&U{WZer$3UDNJSU(I%)DN?cSgwHrM!A1 z%1?o1dxOXQSIB6xLRN}X|Kyj`-tX6g-n{Vl`#Rojt8%@jarS42fI!L03x-*oHDkS> zVSA6nbDys(j>EYVqlfM@l`5I5T-YyGw&qd^#dKi^ zE;VcbG63u!YZpVGO5ji^g%6?L>kf&0{`v!z3lDA^h=&{m4|a9o5s?*+R43=WD# zidl4guV1K=FVCwT+MTyo>zlnK6gm7_y^oO$Z8yX3}h z8Bz2bBrR&|PH)>u&$P|S@`f92@N;Ezy}W#!+QW0*zLdXZgou{crfG>fE)ooSv-wSQ|r#`LhA1C?L1C!Q=s* zRnt#3fAgvR8Ed+RCU(A+^lkQn_S$QrZ|<=nQ)0KO`RSR$zK)K53fl0Rx|LX--;C{wyxy z!u`Gu**8VL*kjt=3WB+By;~_hH!W>hQ#(v-+^Y7f>QjL>qR{uqSP>@b{igLZKPYJ$ z7~{77l^2WlIdZ1m9s!LARj%BhO{P>_d;kQoot$WznNK}B4#q4v^o(yjuVt6T{0i({ zV@&m~>X7TCD)Tkl?EP9eN(lI9kAMOw0Qf+g2en;7benBH*D(%*Tp26i{^bStuhZ0~ zxgfor1cGzJH$oxSPS=CD$9;wkSUj}|t}&%#vNVo6m&p~<5!@(L zcRzt&kYa$|FX-w8`_%%JTS4c$iZP$e&mXa?x2FcW>q3&Kzvc;yjZV%wDM?o8A#Dr| zC!Qq9U9HqeL3hOHv-O>Dz?UjHAn_W<2Twb4V1nHvV^(yJ7vr^!`8aR)^QjYuokGtM8h`CAvT#6l-fn4!GE&q{kzgF)r zij#le2-U~(gopT_!pV-Kt#HYOObgQH)+ z*#Dn9cj~3ZA((za=m=MMka^hCmY=2&osfSaNSSm=rp}A1e17jmUvE%@t7qJmKSNWj zpN=Z*+-uw?7PDW{U}hsUTylTaUD-%ISxt?ca2X24Kh8Qn#=H`OfIEVd9c;z0!3tW{ ztwR1&;)9<<7R;UEn17!%c7i{f0%F9TjHv%8cAA|rSCW%aiuRe zXv`?R8{NM%bvzO^jb$ir0H-9VW+Cu(d3fP$d~)&$*r(%>LOU>)L#Nb(A4dDM&bDj{ zU*o?%cew7(e{|`d>eKYR&X(U~jl+}mx*G2?6Ba^G)Cq|BRP`++v=|#nv3@+!yr)(T zYK6X@9^grUR|wYfGI!p8-#kgaEYUOlVmqtVw!^J9WI&&_`pd{=u2-Ax&Zs*L|(*$DFx;muHB!dx6s1l~?lm+PwaRFe>+I7VJU m!Kx1a9I3f2-cMkcPiV6i`89rM*9)G4A6-oYjVd*}i2nhHRjYac literal 43333 zcmc$`RaDhq_$RD@bST}O(jnd5ErN7|bVzsS0S?_=(xTGc-2#%*2uMoDyZQZR)_Uh| z?&iXE1jKW8JMvfv*uQx3(g6_$e8V!TsC@bJUmE}KU-wA{ z(m5?HM$?Rm8^;_v9xng399Qc$jPqW;mXnhcdAOJvN~DY3?ATtYGfkvZfkZ~KL+W`W zBO}juCq#U2zd0RJ^Yh3n zbb`_7_`Ca?^^E=aSu`GN33JPeJ+WcjT*ZeP?YfQQkwz#K+I_argLN@1M4Zll!|mNaExe9-F1>46$;qkzG#f43@^%4(U?9iz;r3rRItd55Ju>bQ+Wur;G@e>SSsDH2 zHCZtK#-5XwKWk!(+tIH&({M0ASp@}&G6<>AC*mhgXksEB^T%Gp&1lqYD|v7 zXEzy6V(9N8ffrkV#SnDFT2eGLH1zlP-(2@{-Jjkj^P4yI@bF0IFhAR!$mO(DrW%pZ zuF~S)KRU7_eqtWWc&GcrRwsc{DrS=jl8eP!^VHsIMS%YoVuopHuvQ{6*7}rL5S0RoH3gJ{po;280rvPGC||iqbjp><5aRJ*685c zmD&DuaaUK@{X2*Q@p;bCT8BvcM-B&)r%BhrBhxq`3t}^!Rta%&cywYb;-)Srjlx^a zGSzQZYST=J+~%=_?@T^)3)@WO2ptBUZ;!}4)^t32Z4D;Ol&aKUP*G92AFpQ9sgUZp zT|aCN#NpAa28`h?HNzsHzrK(S-5t*^6pw^g&f@L*UirbT#x`)s%&E3JC@6^d;X2rE z>4zHM2Q^O!G2h@~yRQJ>0EDElRTgDVeJPpogH^T9&DllD!~SZU_tnwT04ZxQ%yLmPMf`cqz%!YlFSy&dFmI zcSj9t=w!l*>FUMuYA=>Bzp+!rM1N)+2@tN-Z%L_Gpk`+^A4xGE+(J=&9sEVNfu%6- zaduWStP{rK&cVy`&#vFt%|A99^B4vPt`BjQ1)EhfcvsWa&-qJ}lzpT_SW^>-8rTC?AziG=~-NiGjyB?=I5Jh#*7G3X9L*ziii|nzB6Ts zQ4!HmR^(^IwJ}0=`N{Sw5%Sa(vmE2BQU5LN-EAjZx~sGHsHQA|a{A+9$goZUllWha z(}{1<9orw_N4}U+Zv8C$%&$>rA{Ar0`ePyL2R)Mwj*V=k;>%GQ5;lFTXg%6fbW3oS zNTcQTyS#^kt{?A?Mea`|cA!hBJ#`3M_Qp;1(Y=hn7dx&uP`Co1%ie1~=drDi7ysrB zT{u;3$FulQ@K~tB89aBh-L(-EQRj#KkXtyfW=GFx#2`otDe|(ljXGG=e%HSdJ{3}n z_tl6s3lPgbtdJ?q33AM@EA?b@~Sa0XL>lofhoG-4J3HgI4@q z@di4T97WwqYmV{|T|~0*DZkr&I?rid<8HXDjCu}OdwqUs0v5|Rrh!+h-f`oJLkzb= z4?Shp8G(a^zh0r>s)k98CQXsuD*DTsvj0^q{~5wi@*yVUmO%JlqFhayj3lB9yN0GL zt$}t)uMqgN}1eBC7HK!n~HTv zYOH)QR?Ce})c8q)Nj0H*BLe%W;fAtQq^d*vYC)$40X;i0=mGAka z>|Dc2>NpjYz4|yzO~r)1rfxHhq!Ei|4G;DvI@%;!1Sr1TZrZ$Ne5GgHb%K{@ z!gAQtb~zwnb=T4(ep&Y($;an?yGCBrs{OWf&nZ?V59onRAbY3w< zChL+a(*X#zqYo1k<}w@HfHoFm9O1iRoneU0-b^V*bin7ITMA;>Z(f0xq=S(T|7g_=XWUHB&_8d0hSuW4nM9~Gibb` z5kXym>?9Y93P)g$0t`X?<7NT@l~SSw0U9CKpy#R>fF(t0fi{MIH|By7#9!;Z|2FN) z)(-Znygb10r`rdx$OKMqMnZ1=ROvjU*4yLZ-#pD&NnmVHk@d!+Wo|N;BgXoG+@y<( zD)nA+Q92=RL(wZAN~&%|=ZM+Q2R~!y;_TT=p>lNPA#z(KI7DB?e>FHvjM2X0cijs} z?6YxU=7}-eAYApkvy;m-Qj}Z&WQ~W@71=n>@T&1N$N$ljyAK*nwT^x~SCL8#qt#cj zA>?!brK<1Ys`IC$Si)Wo=fxv`Do!;hc&o>3Ffm$0;TdM!ElTRON8z;AX(s1MD}{?g zQW9{!m78|1FvCTi?J!mF3XA$ik?{sUg$UUtz0i9*`9oRC%T@O^UnrFTogB)9;5jNw zGF<;akt~PX!EzHPUlEw4;r>vrbN~b_aQ9%(%`-BRd$yUBo5#i&(<_BeH>(>zZdNs{ za-fBVxOBv)@j6jbGN&_YRT?qKf9ynDu2qaB{;JSfnz-)lgx>iOK_ZKa&n6lZ1GnKK z`&z;!YJ7&hBn@Yyv9tVdrL;>myM7$05H)ii!9@sB7T0fbH*yMvZk(U>%U-s+V=da% zI4d;j_uHw4)VX&FguGI8i_wE8fp>Uw30%M7aH#^>>VMHBlFU)X37U9S+59%Z9SF)# zQ*|OAB@BkTOTF}_YVv;uooLEsGKA;OPtF+79Y~6>DXv=zbs7_{AW~=Q*Rv*L_OEFP zQm>qGwZkisFB$vmR+Mw=h*mlizJ5txWI{CWx-L<}22a zv2OS(6?~D)_ApHxwp9=`%Nf_{-U>Z@cA}EU=BFY@pgjI7q|2PMUPaN4Q#}tjN}@%_ z$c6LNZ-UNAV#bsoi(tnOh}U21)a+=iiH9N&&2VRkzI8Ovj22h;o|d$fb~gSMVi~r~ ziM=k&L*|`fL_DnU>oW_R^TE$58Z`6ar2KGddQ;(*g2aD+<`TK;J69;JvEFuoZbG9E zp!A~&%O5dU^P*+7r2L8<1ESz~mJiig#2l1cDHM|_d>z`tJ+L&@XIEDPJ;Jwpg|_aF z@AV=ohErK{`AW4>LoK+sBe7J&(oJT@vgIt<-soCfIx_K5ZRX5DExsKhQO+;H;S_a@$f zZ@y@ji)TC#4|13m)Fm%up={Hd#K=}w@@O$M;G1G^rZVYFs}-IXt0ML3IqAn={L~wQ z+s4m=E3xoZr+bIxVuZ^;zJ3LOf^7z*Gg@Ajtq<`9Rv`Q7;B1(|54$BTQd08je+Tn) z6w;<+wO=ZIp zcM12li(ie={^D(DezZiOx(R8ujWc69w9*ktBh2mOmO^IxgF3Q`Gdd{RNH)c%MRndc z9^lgt(HWhij7u6S!ceRhl(p31wwerJi07a^i-=|>|45_JQyr9zH4@{+n}i^>;Rg3D zJ%`-8zphUmAbakYntd?w^F=SH(#D1kUklbYn_){uVVA2FhGpS2{%p-$uxq(pio#)( zhx6Y(Pfc_$G&<#3^(gfE_ox4qEUlWj_MNy5F|YAgouoZv+@$S6iV?zj+E;LH10_}I zM8kvUSkq9)(9cXP(;-C3H{9r1AK0%p+{=DerdKzY+$e0*^L%7U@03rT*D3F1ib?Gi zdtKl}RDWmDmB3&*_P36I+j#uDYS_|hYl61+hWvtg{qSPGOT)UxLahADPMCXhef5A? zqC3nVD7^A~cOTM7EUHG7#n;D^Qq?<|B*dF3^lU6|J7ejr6L=VAN|cCZ70zDGdu{#X z_>Boaelm93)HWuJc>T947(s&>5?OzEA%&zEjns%*V!%YD8qoGez-03pV?m3`;kfOJ z^jDY-740Ug7^(W$MV&_mx1D^iX_8y_o??DM#o>iM5hi{HpSmD+eSf2)OOwm4bk1oe zhTus+7LH@IBp;Laqci=)3)#k>RN~{4vMsCfWeJB3h=bP(3u5cnpq*xj!+CTIwxzm-h7tp(w{2=J|X%R}*ffUs()^sOi*90f%}@+OjdJ_~X2fHrlWu`*5H3 zSgw+6YdGV(aM)zD6;~B^zwmT2n8g`IPwHG2qP}i2AtQeku$U@5LQ%M*Iz8WgD;AFU zF9i@ZUG124%)s8mg`chQzw5Vpy+(uh-soli9z*DSkG(U#{e#230mh)&_wF*0R*AC9 z&ct5Dd}zwWCEbatcDxw&LK63_*}`1iT@kEy-1}c&-ZN5NVKgph`6~YTWR^woj|jn? zo8UMq6W+ya!PX+c+Xyi8uN`50E<3V8zE=Qbr_Ta?#9214=Wkq7YJHjk=6qM=T04)p^vH6rhLp*c!P&7ob zl~v3N)X*;x2#S)Hk_FDITmDjxK?0Rt_|j5RY(eq51FP_VQ1&O!M`=gdE~PWjLVVMb zbbisN&2CeB2}LZ=io%*l(AMVMVm z8YL z9^QA-H6S$D(PaqmI=ezBGR`O+ zfhfCX;&>)&mD8pM{M{fH`OY|T2BYSnWbJ*L?7U@cOa7`t?;Te{It>_By;qm21ItNSbEuw^q$Vw77e7?;iU#<>*?j^W_P-Lfhg zQ5F;jXKa!DUs00Tho}`w4^i~ts{#FCyZxGIVbj^$#DC{Q4ozdXYi6diS&#rEAcw1p zlM+r`dF8hU(_3>p^94+p^wDocr#2WO_l~J7`i(Es0!nkdx%8s5BKE7$%l8 z^Ip#2v!CYsP^CLck7x@GXLs}!}6dIUrt#@-B5SxTBeQ@ zdE`~1n$uMHP=^`))nTo@lI`*k79O?nhdvfTUXfgyOW=9;qixTk#-z-v(pD(b(VEn~$ckd%UNGp_(mIEA)SQ=qpNNvqK07k5pzhy2`ZV zH|U=Ua*#4^fS&Sqt^tza4ddH1!b>~tJdIN2i;yo{$fn`Z*ihDTCd`=O!KATH*~dD+;A$w5X8Y8Jpcx*vB6UxKkd(qEui1jZc`Ay>RS?~{%Xrr^F(A`_vp<%AyIUtaTfiMN&fu!2*FQ9*lz?2G zO+D%i!GHU^HuJo`R6}%?Zi7~tYS)uPhYzhnq57xJVbcLu8RqsU#P;@f;1rOuoAd(D z00DzkuTUE8yoy~X`{d-rX|sPUlV{?eQrr{k)YOzMLrk!Uk$H1FiG&)tkPu1D=c7+@ z%E~F>75%42J1g#M`t=rQSKnKsu4;Pa&EAqR-Ng0m{Jp<9&)3-+dG}~8DJeNPVmkN< zY4?MUoS#;Bz};v%=VHC3yKnI5(?}#19WpLcn(-6FGA1VGe%|M%VB^i}sp#<zmOl))1}*;{|$R16Ld+N_}?pvr{B zzvOt@Ip=iSZSXd{6QElt1-tIdlvcmlRp(DX#_PA>tr|!sWcMq^b3-}MvkXlyhZ$?q zKK|Q`6KMwogc>la3k(tc-R*np4c&|JeK67E*#h(b?${C&6T{JnxP7iq0De2?dGzlH zhz)E#9~U@UYM40bY6r_He1Fmtjmyjdsp_9oIatw^5Wj8^p;;N6|IXZl?w*2 z@3Tyx+vVRC-S+*HurN8F30k9zy(vVI7A$^2^I_~D>&@?J z_dMT8uAx@`{J83Xv^((vjetY4-PapvZa_1>IqAUwt@`cDidrE5m*)CqjDmmO1n*LB zIq`P~?sPp~^$<+tYJ)>=k;v1%OHl%sGp|W+ghDC{MfjlG)!&shuLI_JR^L}i4xovE z2GDrZBy?d7q<=uXP74ku1`%iPCnYeNgul>;7i&K^afEKTXduLK#9r>t>;eG|iezkT z49p5k)nIru=o)*;M9l54T%im>PmVtPk{h%`f;`x?4X}fmb$=YrmSgqkwRycuJ_x@8 zUYp_E z*BAnWr~0UnCRMUxkAZ=aiqMKhr>qCS(l!M!286sXFV4@Yi1q4BURh#cVZFh>xd{UA zowp1aI>inVn^9+xTq0sBryxx6IHgq7Ym^KX8&;sRl91>Z%j58k=88OhC;L_m1@@2# za3Xe85+-+>KOd+k`xGNe900?|w{R*D7NOv0K?yz2pVa~>6!_0qEAAL%!dc`{w$!to z`5*-&`ARuPY}4>AX|eXtzmmV(%vb9*K}q0yShXs(>n+Bpf%sy7Bc=FkXZ~1cXQ(pl zXcwH95;$(!C56!_f@#{Q)vEeP>^wX$fPh00crSR;3A;U#N~a{Qx!bVj$LSyNnmwiF z4>`KhV%SMuSak0Eeqw3O7%GzNk`*KD6Dx#=m>_so5K1Ytbq_1)Ft^bU~K z?TWJGX-zJ9RD~%h0v`fzyrofp=(o7Vs8tuA#}e_dXq2E@i#s-d^Efq`4ygynG$Hq$ z{dAGs58Fi+!*<0hRWbHgMz~>e@%o_1U6M&Q9Kw&16?0JhN->nomy&(}qNXvzblK-H zx(RT!ccMwGn1q6j{oQs^z1j4 zL*!ci)93O4dGpg`-b?mv;B-c!N1`Al&``gE`wAE}6h2AauRbw>G8f9wb@Bc9wKR#E z?-zc*dtQDouP1AVEN}E61qD=v_KQY~o86yMsUS|tXo;x&jiPOm z?sqmn4_Djn0QTdw`N`BP2R=J+!;(e({myqIrZx{A1;4uDCoI((!?IfeEJ1B(bhyLn z4O=LED3|B<;pzIlS#O#=zC~D_O9X#^Z?Eg0*>a${-qT!HYnDTuZZYU-@zm+w+Dk7T z(kXt|0yUk340y#()Z^LowE#*%fpgLar2F(5F_@2(#>5F_1X&4GUlva>UY}y%xZfJ<}ZnB=r_Z;bnmr)%q>%_h$;j zg$ZI}Vtb6~1fqU>F-}Hxf)|q#XU3#IU?j6x+b*D6D2VuN(43jq{|e3E1~g63ivT$S zy2yqze-kj)z!&)uTU6c)TcDQMBGM{lNLntuRK=-s;d>>U*FqzoBwBR$??A?G_5}Dj z3NF=ymKKsq`uSm>=DrXhJa4g*O(j7d$92)oL9|KK4Yp;kOm4gTED?>)wTK8r>;mAx ztB2(!2C%B+2;#Bm(HpdSfSDMiCZyVvd;@BzPOVWFaA64<3NW{j38YaNHOm72_&hya zMG#Xs06bF6?WO!ck4r(K2Yyj18dp#178GcvpFr%!Q3u4I2hh6 z(6@a7$K)Yh#9vr9_VM8kD_Na_C=~P)4GM1Ki7rT>30yBI%etVd+38n6v=0H22ljU< zJpZVl3Glq}1wjV_wQn>>s6|Z~Bq@d@r6I)S9jJ-Ph!_}8rvqd>whNurQf?T7Cm=WA zwL&-jJbAQvB41Pf$;!(^ZzyShe5`76-llw;tnvJ#okRlljFgm=oE*qnYAQSq&*^6q z;^)vsL#8f$@!&2P=0p~s%k9Pf-ky~!w$l4|pAk${ZSjeT508(JcXvOu``mDt4-ejj zfJ&dV)K>+a2AaUpYMa2^O`k-ueDW~JVTg(bwBj+?{5GdS{zhrie`*(IUsOy-BV!ON zkxBNyzF7k&-tO18a@Bko-W)7B(l zv!!{sb_TrEVTb=r!y)Xuw>&shL1HMe6#;)tKh1n|b_ekiJl=HYYfm=@s{rIbAE2~f zoU?)HNRJCIb_GNcG~z$MzT2#?J^o$Do`59EVZ`y{`LXnE9GExJh@}7F-p5sN{kR#n zXxXk!&eZD-#8+?({wy^(gsJrYhl2=pt}0 z>ILKTz=8*gTmd)+Fs#OD9qAW@-{#0?@Yi2?X^MoOI%;lQXA%S{`{VR(P^v1 zbvT&3Nf1z`xw*Z0XS?9|oS)%)UY2?Qg8r_w@GvorYB*3T)h`mE2`P08w`D!Fd_@pp zcDnMm^jpAZw!HImx1P7`Yv?evb@v$V&PKXS-|lxGVJuyyX6Sp|EaCMo7<+TNQVGR` zd^}9K${pnV4mM_6oUZOs1NTbHzSUXsDNTZqcSiQ@5d*ikPxGeXmoc?fv`S$uUDscK zU?Ek~`9ZHXH#bd9O}CQ(JcIIiNXugo^Qz{HzuN4y>t|_;${0U7zUKF!|Iq1hniu3- zst1WuArm}zHfgn6xGyt4rxMY}Oom!`JALYvPEDI588=W8@MP%Q@bH}-Y$BLu!im29 zXO;DkueM7`sm^RH{8Rk#L4^Nc)9%PS*RkK<~(bikOWK4KM9f z`?j`o^stzL-%oEwxK%^uGU>Vi+m{A$vqM^3qnw6Cc$sN_G~-8c?F&az&bQR1OIO)S zb=Qw?R>M44m$25#d;dHFP&QU!I@j~IxN^k*xWj5VPFv< zeGYD!!2s?6s<6t#t!wkxU%T(P<44!XFduw;E8Q|*z4>=u$6bN1UGE|Kui$YJrZSch z4re&M?qn>mpoxHtzgE|$t;({xXn>}AX!*Bolyz_9@+(_-s{ zbg^Nil7l)!e7*V~+PX!BozFfLVZDVq4 zw9;Cf=84~&-+To7&ic}Djlr3p<6)#&P3+NNRSV|B=1@)QeC~c`&zm#^ZxJol5La8< ztTBt38VpTPhs^+00v%k)_tw?StjOt*)R+I_pD?iB($CzjAD=JT2~9` z_8}o51Ek)gyyIUhMY1McuNRXfGv`jF(0C#xwxHKnGP5yT2%ezyK*%{*RuV4%aZCpq z@XW_+$Q-?wM;JXYtThu}D=I1iX$9B6%S~2O1=2{*K=9}0(DAw*=tCYJ*Z(C1nMPL3 zgZ+Fc{C~W582CU>{(&cSQ-aOPOqp!cklSH^2P@&&?t9p6UZH=9gR%_L#HMYs{Ehz% z6&b($IB-;=@K~$)zkqsjDZ$9!9MBr}Dcb`y%W2UN=2Q#{)eywD#1ZDJ>2(&Bl z+(2$*EKR1F+(xjjLRm;O8|@he3ReJdKU!&N01$cF|9^Vf$#F7(={}&h)U;h@`1G?^ zxcpK7qoTXPO(NHdnfmuO`Aq{#=2#BZ;9dJCF_Htz2^?E(kEI`W0152_9YI?=ZR@$m zr-$wO-x6`#FE;}GyfcNPR+N(iIm*bWD1MIKF>sAP zSG3ANrv}s@=SMa)3hYHs=X8-*xZZuvUOpMeGUU1SMi4V_zbwWx0?_2-R zUZVv*%FD!&w)sE#ZIVZ`0sUg7#hnO&XMCzqrUQhDp2MWq9m9a`b$~!9fEw`@1jGVv zif3S#{}mOaEe5Ds9b^H?Ku8gtg#THVkgoOy%k(Ps6S3JFusF;xjxLf?Qb)hOGroH_ z$NN|VO-pNZ*&V;W_Lyc02I*7zc2FcqA_j`MXlTqQ^Ta?*s;5$?9&rSbAqLBS{ovqW z`*W#C5F|F%Zte?CwIMo?vwwXxSCCtSTU}j^`Ss~L;lR`T+5o;g|9VuAn>v41YwpiR zR6u<87FimgNHG2X(vV;!Gp|la<5TXfpJFz)6)41q32bE#sM1DFJ2=_U8leHz}AyfttXhEVtI( z-Tkv#UqQ9eeuZEBH%MxMX`h&wh%*U^q*KmXf2$lC76!I*d_d$l-doK*FoGD!4-j-! zn*q>wT7@Nv7JuqzmF~7DYx;dLr=9|x|IKzPfVs&`I_ep0eEyGu+nHR}8^^~g=|H)f zMqV*hCE~H~6~<2=c@8^36pdu0QC^UJ*S8TIanyIswj-ydLx};8URG0 zdQHy0xBI1U-n?m?0!ow|YB;A9wjDQ7Uw;fia3Zrt$tZY>(>ROx@Xh{zAojM@OLOfc z84cZoQ+{eWZkO09N*nrM=o|X8fH53{EM*Y?9nk--GLT|SNH2nqZpx+zLqu`f+@O}39A70UR{hWmw(-2|>Z6AC_q`5~yPGD~}xz&hN{ zzX00*b6zBZ{t0AGHnxX~o^t&kZ@^-{)vA=u_Wwtnr36bNnxe|U#Af%4i>n;OX0?yO z+{=h1u+M5DyF`&7JrsE(3NllQI}gKEb$9kA|2q5!3_9Ix)jSf_6!Z{PN(Fn1@ zR@Z$@nsfo_0f;fMK4%pN*vJbl)alQk`nS_En({=LGC@7QI$q0FtA&|51fPD9z6i7t z2GB;3l0n9B6;x=j6E^%a-`PmhuHN+F8GHnL5(}{?C8bJ*R4^WFV>mRx#w8!5G3o9O(g}W)Py_mfQw;4N7g#^*{tf;n%V< zOa1|!>$57^w>oxk_@er5y%K>8w;h8BNFTmqP#Zx3&Alox(a} zdE<@(JugnjA z3roY%4pgRGj}4^T{=COOk=01=*;y~(tfI$W3cyx(U+*Hl_dx47Q4{X}$5P6`; z*a5}#^cOKSvV|HIiX3Tik~toYis*WIy!Os=xoD$)MNhC@+t^Jyx21K`cj`sH{$hG=vaEBH$KN zQ5(7Ch~ppFvp>h;XJEH`W zbsuUBTrmsTr_9uuy9(;_Ol#FKU7WNe3DfCvn;dcLUZ-)4xT>H(!Ee~I6e(P!$4Y^+ z#71(18uebrvMB8t4+9ysPh|Lx`OPfYU}XHRh^b2GU!Lu5Uy$>YECWZNSQG^Cm2(6= zZ_doA!^@(xfcQVq+spgOsagEK(2DvMB0?m&+B@{q z1zq2!khDN3vh`K-Sj1qF-~4z0VgS=%w3^higHDRx^_lV<8lJ{%s9lRVW2x-KFKCwufMJ5o`%W^ zjUIynw@V?nY3OXDWbhkr<4cr*g)I1;Q$nH3(Sd1?&Ly6%{jwB<8%XA65wNG}>-s zyP%V>)WZmbSvUfvOtRj*2%Jo+w53+hdhAYBC^@!ns|UL-?mm1=A~@TWJ-wlWf>Sxz zu$Nd{K=RW;uVeEa&*Wj1xVszItTA{19Bo#SP{XLfMhc=J*|66SIsy%+pkUTf61H2_ zjH19t=aPN+yBFs;ivSCZjPzK%WW%a{eK<`fSJ=Ct7d1t&wdmuK2P!TSsJN%*7PeEM z+JdgVaRIEq7?oq-0hTIfM^u1@LjNkFY?Asy8XeTh^!WIAVDA=za{`oBsuCm=6e_aF zf?wd`L_tZ}$a0el2<1n<6$A-c%?Mcqb}V8mz;D*PkA=q7--9N88{YFyLXI4bejCV- zD!uo;SSr9D?pj;Rg>Ge1U=P~VxxPm~o$VEJ-3J=Hc>p~D-Y^6FbfFB!MGmgDvfh0N z5*Gg1vl~>cF95e0if2HccuSCQPAQXtD;2IdXqFp@|60AC&ZzZ6wVv1y(5-xLMytyc zo)y@T=Q}5Up%Mk7^M?Lyz&&!U0XJ24Oy9q(SH&m|U`C`F!hQusKS}*|a1z*tk|;jW z6y=sqm2T2(H~w8y97ch%?XY0avcvCT;Ua#Bp$=YFZj@d+-ffWwO#bfPRN*LtT{cj{ zLE*A6-j7Rn3?+frf(}Pc(KHu3BiBE0kmUnG$_(Zw%q!$90rzoUbv+}VlbuY5jIQP1 zJ>lV~1VPiA-)VM#0Qc`W@8Yjd%sU0JBBXBmU^{{8H=aN>0Oab0(D;|zbUsh$9u@j98XdKOxl_{J)2rzg? zxp4e|ge27v20YwdbzDpACWWESU2ylOWCPhmj z|LcBRA9JcY<+FDxB_&l{Qc`k%H1L${5A)kO9xKT7ruySEL%noHDdrLu_5-d$sY)*H zJWyeeH#dVZ@k^64gGeIBEEMGBo1M3#8XB%ZBLwZ|{btsGeq-Z%b$NPso#Mr>x9w5EF|>q-O4)Dbxpnq^_>c}NRQj~j(j@(_hV;p=jd)=+zbE%6kMjp&pK7vK=%9fM`k|*Eko9dxVb;R2=|3VuC$XV`fJ{T`w1!&u{s;q zb$V^Gy)q;`Iqe>Fa;bTJsnfdcJ`i(H)R$x5K=&)g ze~7?ecTB0$K&zqy@AtmKnqfx$J4hD5!DbUV`hGLI|MP!Q6*Dj}0OP6Lpsm^I5J`(f z*28@~Isd%c=h}r@+-&P3Q)x{RdN$F`zhNtmc@lYij)UQXY{;72Kg5>qL>ZR$Pe{%x zQd3jZy5p~p=gCGMEJ|zLNin=@4Y(D8!soCn+qHC|N1KKP1sfzHS?VCu2Hd87ItW-f z4g%oU0}Kjg>~B}D;*GJd;x6kr-tfK#dHBR-;?U>tEQm6fpGC!8NQC}xxloszL!rd8 z>&ECLB=i$)TcOW(qkSXg;~qf#M4Fr$E{6Hhs#~OOpBp`8O~+E~H$%0S8Mj;4%j-vW z@iAt^9^L<-WaTsy!tb{S{HbMYYil(%HD~GPX&@G)5(f~DQNQ_{(>ix%98LS<%(mwP z@}(8#uR^E27(5hB#y?N9sd&8R^$YW)^29fi3lDR_6H+Bh%$EjZ;>XNSyFA;?J;e(b zV={?MZZeXe%vN|WUA-ZC!il*f4L%MgH8m{C+Qje7_vh|?l~Ir4TeRkk6uz!tT2hIB z?_FZ5<5qxf@(8S`X~=x2O38JnjYmft8#h)|jLA}eo+<<|Rp16C3P>UmH%321Z%<+T z9M!5B&4szqnHNO)(f`!UlYctNIaIfwY=BmCV{u)d$dbjEn{nP$xKYak~7o(4K80ROzX5oY9>dX(Qu{n<<0iM zzqdy0e)vmhK5e)HWKMTCw`cSB<#x|9kqgk)X{o6fY#}d3e4*-0y9LvKQjysp*>HEB zuMj+Ex-%%Gg2dY}{Pb+^Y6}v*wpeu*SpOVMt1Oe4B)P^mG(Z`fEOGAKVl`^8@0yD z-g5-sx31>mSu^Z4T)84U>*hz~_Ico3ThuMNz~7y8+#3bdaB@EfS~$=qWUT>21d(zx z;>K`{0;BKt!YO9N0+CAcadC1L2Ft8tN^>{5&Y>P)<3a=UYvyPBC zaDJs;{DOTc;y!m8DraB-VWs-!p@XGyBv*cU&*xL!;dH%Qq#G5=SIqS;`G?^34(oFT z&IN<2(r>v0k-Zq$tCP#G5D%uSN{{+00#x#~UT`b^&k*n5)va-W8d)N_<1J&|1(EZ*i% z^&)yBr`a;V$@=!O3dAp*<^R`dC@?$yX#A5j?lJ**SYJ_{+2R>+XBcIUFIHq}2qS{RMJHxXL$r?e403CV{*5JSL zEXqH%*J6vYjQ%?B*F6+vcm*>^E1$5>pYHctp~su%%!Ug!_T`IDCL|#`lck_MymYqJyV!vB{F61 zTD9iBdvsv{r+=VyVdfBWfjd3q#<VEaa`nL8hk1`qe5oz@hhWOW^ z2WjTUq)5<*`EP26WSc(KHg&zFS3bN~*Y*(Ket@s!Q(0Du*1lPv z1JE0V%`gq(FTRnQ&oLH9g(7T#5I|7mtKWlH<`}s6&6$CSj(!P^3ov77t%UIKPn`;g z$#i}CZnEUE%bLUM=`}E(efZ(|`cx8O>3<^ru9jT+5Rlh-?0&fdi5ZMJ)9(plV$!e_ z929i6GZyXh6C}m~Qttmxl;?IDDF$yYrS`buaYpiAe(h{c@_)XyEdKxawL4LrkbuB* zO3v1nDIA2%p3Um4W+_x+UdOYop?)zfa3{STK)PrA2ysYx)^mZ-#Do5o>G=j52xr9x z6VcJqmH?;?lJp!9FhTZMq>0l&+589C80qmAkg#Y61_tPOd9}yA;sInQ8B1|BGRo`d z=qPe{1#XRk98fK=Zhd@xff%IK>}tJvZE<>jewP_o$ga&GBm^$#zgw{V0TOeDZC*er zwj>6;xkA1fNcYdKZ;=B`%p~w7Kv0EX;8|-&0##L06Z=g+$lj`IJlp8hYoET$cLz^S z0`Zbs>A}FD;e_BHh(+MC=vfhaz_dOAo~T=@Oak86IP;9>M;lPLw9YOsxgic{+Kbn1Rj6TnWO!FdT$S08)n|mBqt|d2Z@Ca0F`1*wThLRXG7BcYZz-m`_ z{qNc`HRcRT47hOPzCSI6j)L>HcMS-uAU~7Q`114`%#Y&(U~#E1&(C!Ltd$J_IZ&il zfa(Mu_5h@=QNRv>AOIBI=Uc(uivY9HP*eL{Ov%tFq<}1iz=!g@+Jf5R=aHBlZQ7J7<~lr%!(d$oxlXz@51=aH|~L{r)`t z@*_o#0l0Ake0czac>(GLZVM2ka{@9Uz${54KLlDs21tKM0F@5ccoAgO_U_{;B)}sb zWW)FE0B|Jry_f>(+0dkw{o+@1*R)T8UJ<_t-mH`)0!+>F=mj>+`wA_Z?h;2pKm8tW zEQhgL`33Iifa7AT)eejWz(Hhtbvpcf1s_4J623d+^pbiR7OZMq+}OyQv1$99MtZtG z2b$D)Iwu|2n}7+ZXF7so2sjqd^!08P5m|;q*vl<}{xphRp8}q}KpQH*GoBqSw}@Qp zc?;5rk*wh4eglucxXlHkp*3Qmu?sxCk`K^?L6E>y6%Y#pKq0=ouYiz=w1aI0$Wr}V zd=%f31yE0b8zjk2=nHc2L;2^Z)b#XLK!9`&jvTCgMR8riN7(&^m}3>N-(1oR8lcY0 zqHWb)J*Q^)z<|3SU6Z%PbYm(!PB$RUkEy_Q?r*UeBcx5R=J&eT1MH8DLB9>BMFLp0 zT!Z1oz#w;1VFORt_%Gt%Avz>xh(rjFL8|BlECTQzBBZfgFEzkM%91+d6%g0PjCdI@ zTC9q=Ol)2Bx9w`xCCMcp987>nlem;G>jp@B789hmR5>sso);o}_bAur3<=6${gOnA zb)U|f<#4KS0PMAs1EEqWX=&&q5I&1O1mtDRwcq}!0O~e*AoZHdgb-AY zMum?ecDVhd8>P{7+6uopLNmT!#uQ5)1ei|2U16D_K}r2dI%Rg;FctKKNnM9Fsc!IO z62jti{?Bi%hbQgAqzQGzC9|atfma{~BbOKP4YCZi;8#QewkCmR{I||+RAiE53ERO4 zS@Mbt0tI2a8R=fqKj!e)<9p^~c7;+1obcn0~%N^`iE6|5*1!N0< zmQlq*Q%vZEyd`D$TC&soc&TegK~!ppO|JgVm}McCFZvz{c}$zP&r7;{D4(?Y&q5v5 zFIIDK>J{VF;)F<~IKU-|u+-k|Y+>Jz97w^F;+QyZHOap`XV)?UwSIpo5(SSh0ndPl zI^nYWh5fnf4y)(8^$dIh71jrXa&;O8YjI&`dTZAp*>9jz6(J#)ts!Qc`5XAc|a)-L#Y|#NAXvmLe z)bXk^ClDZ+;AOEIjWvHyR}y>(EQee^ddr65RmcS(0hcSs9@NQWTOoq}{p zNp}bqDUu@HC7>YEje;U2An~5-`RzNivw!W*?Ck7c&y2$Z_kG3rp7W{Gd?zO&DGA@d zp9M-OFTpO1*3r9|&vYbZWIo}{+mVIkB1*YZtl#jODJ`mIuV5rDhW4##7ayP~q!~<7i*fMDd53_JJ3=-}aH}06^DsfFk_NeMa z8rtx%cdhBk-1>}u%zUkkJb4ZZum*}IryE0t>R71N{b$|#>qE)6V}^{e6epr@D;K(p z+`7EHL_t9T7j=^N-K{$r8n=L&p~A+)PI6vsllpl>N8er!dt$UQ0-bwe7f}m(Liox} z5>Dn-uZU}D%j4{ip{CMQaFi61oXK_%r-%#!`FbA8X8x!fi_n9fyPxw9%EFC?^)nMz z=jeVk7QRGoQffmT9sF83R=v;({Er~;B;1S`>v;w!@I1S}6uV2?zw0;dt}|mk#pJ@A z$9z7+h5thh#S-Lro>;R5Vtt@=;^3pvC1zw>M_ILC_ox=) z+$FTD;gu61$6l`r3i5GP5520PS{Z8+3qvTS$gzq#?A<$P2tnhj?UH4 z@Ym*!1!wtt3@Nb?%hGQP+NJRimJYRyJha5_j3}O*a*%$tVe$ccLt0jsxTm}8_qPrd zg61Lx^pI))C-lzkepzR+S3N(!ynB!#h8KOlw**{*d=lp4y{B+&rKPYo8W=x<5mA{K+U-^f#dxZJ50N z2uenL2CXJDB}-zHiN=SmO{EWqo`UI{T);*Z?g8iywOf^{AhtfqVSsG&G4fBz0=m`~ZIz*>*_c`rULz{8M$Fj89q4M`UU&so9UodtiX)j#&|D$zd{e5xgAvgUNj|p+@GtU)YEbe5KxOO8 zFTSo0+~(IRbKX#lA6Cj(%%$R?o}W#OBz)BVU&<-jLcXw znbe3?O_Ig&-kD+eB7M4++CBG(mJA5Xe;MY%9oQ}2*P`2zLzrg~ph`H9b$A6hEMC)p zaZks^|8fCm>HTX(#Sh(e3W3h33oQ&@DMwssEC^ZqIUY<=v2su5n~xw>iPQ(LpHpF` z)^-SFCCo$`#arEfOJjQRy($sVzMsEJplEEEMha+?CTI|B)C+p(p<-I#eSTxadn}b1 z1h^+V%PA&~9MzYUfe(dHjv#QT6ek4yP>bix$S zp|KKZ6+HEIrF;jMt|JTsD7rXKrA%IvEwXlk=`aE&#(t17GVN?hZ!w?VN% z);VBG6sE86(f{Z^;bCa5ah=^~I&Zt3@J94qn@1pQxAD{q0kCE5)+XzF_q`=K$Mki@ zzL~{p`7Q1iSxvWHZ$;g-D}j^1+Y3n*J^ea!OTdu;<2?)BrG(YD?J)1b_w`z_esRMH z+9F}+Ik96|C(QAEP?sgM?%REja-xcW1|YY3{_o!7vMbwY_u=wnV~lN&$Q$K133j2e z*8#CH$Y`{)1Tb!U!6ks!>~%?Ou_@ULz30p8>t4I7Tawgg)RdHt)a*QK!&wIqaFHz? zbOvk?qPc7n=mFY^z^9T*zG z9JF@eH+c6M3N-W-l$6;pbG7_xj{7tn-1QU@i)ImX-QP?94+DhQEg!fxE-t@0@4a3d zE0BShGKw}?9u13nlk?Vh3udIew{IwK>~=cVyexg$+ta6F8hgioXYCU02A>lIGr%;l zb#@^KpGn=$U858c+5nfNBnN#i16oYxF;c zhcNWDIPbRj{5EcIeh3Xco!?sW+eUquoKMM?{5a;}3l%HHK_1JW$Dbrchxng79GsB* zx?;&O|0(1Ovd`cFPWkfeGq3`0@W$RQ{yxbz@2i`aT-yFsP*`!UFhlfY?8C^#ksz)< z%pGGuT7crWff$+R1#W2vle6;hIQPVoApW@@64}{yRf5cc7o+HLc>IMgRL2Kpsw6k) z@{$uHe6>%+_m_1ycf5xb@T7=|iG?6==>H^#uCZ3RfB!y+DH2w>G=94<;nHf?q6dh3 z4uvL%l+5TqIo=XlH4kjQcy7-02Qx94fagZQ$Reev_x3$^i97rK;HqO}WGwyfemVf> zH~sE`{iSKP3Ie##eN0>rS@x|7W?MFuA!mfXO&OW0FilaK{L&yI`pSF|#PK(}jk;*?D&F#;`DwFv^%vwIzZC4lgQGoTABc)-}sYTkB z;J1Z~%iJ5%oX0aW*rx%sLr2}oCM>8v&u=@#G!(r&CeD!>an}AIekmTTHY*i$RFg0B z;{ApN>VQC*2B-~VkSK;4gyh=Y?mU%1{+e*A_Vd3xVT>*%8~^~0mT zXAT~Bwn2*IPEJ9=Q4UuvZMXvj!BkWa#!vqZ|4MbP(y527?*g>h{)EWNUen7?TT}f{ zS04!)ZFr)9z4;%FcB6(BVYcuQEShUr0_*!DKWfMC`cfA!&O7TCO`YzK zo_@UP+!pRwUs@{pdhhtphD-Xt5d*j&ZxiiHr^d#3IXMT#T=7<3cN;wL3{>`$+r%VG zop7p94yJeq|iE#N3?CQpi^~C=4Sz=0~2+}a8$o$PU&J$Iu(QRll`F$)@*w;q4f8;WiAJaBi@W*y z(p{C5w+o59fqT6_&VSpTJWjEzy5G-G#_{Su-)aL2ydZF(LXoqEfY0`?;<$O*eyeP& zOg!a0<!wb4qyp@{s^R;mf9FE zdk#)2gWmMN_o`7klaMwrIZDu{^BHAwlyk~<7v}zUswl+JLrbu_JdM#JJeV(8{#;Vq z^qrYuKz7+?Y4k`RA@6fuFDvz|HOkdd-r_BHogJSd@) z&Y2&q4$6&iiko>zx$T!06qo}lwe}YIJmS7PlD?pfN&(ac+9|5Oe0t$|t+kEylLSF+ zDV&R|tX9_MfA(ZtZKJ<8Ta0(2YvzCL+I!yN{_@Kgs~BUg_nTYj{4p;@VCW{Y81DS}v(@ zZ=jVm2<>W1Q(l5hq=HiHsw`|bZ|oz)i`K*V3~hzl)qkvYcdAUSUEMcC-U8?{Sk=D* z?`#^QVcsNa*^zic!+#p4*fRYe}ul~TDmI7TgX-f z7m=z1NDW|&CdS8K0)I*FkX}D__UN==US9*1e=<0)GSkvBGd*F@0P8s@1usHx&|+dA z43nK9RYY{~U5Z|GV&cMPHwaek>XKL2*K4M2N%sE!V@+CeSz}Z~gQ#w>g@wgvZsKAnzdLeazITJf0R9K1Q=k9;Xr-}VOg!j^$Wl;O zLX0je%NkB3ld>5pI^CdYu6#0X8{`RhoH<7pM$;wR7Q}Tu(Y|!CN4S%qgEF5 zypDVTH~*ZjLPVcVA`kri{Q-vs90^f2rnx|^KulpjUX|C{k2w>2?f;Kkt{Q}}r6tA1 zy@@nbR8$(xFhf9kM^at1oT6g)C2jeh6+$e_wVr_Ep!-TZ7(!he3mNGN_{OWps;T2qXZr8rYz(t(V1P-Q4{B`*|Cf zJk2AZlwN5Idd_Y?_;n`Dp0CylC(-SJ-(lc_n~2XT&+Z3BRUBKj>Jg4tiWv9??3K9L zwI6_*#DnylZj0>)2_d2U;Wq%S;bi%SpQI)v4t^94R(ct)A5+OfHC&Pe5;0~evUgd` z;bpOF-C+im2g64z7dhN{iwt^OXyTJ)h1}uy<-X9Y031SLiOb=-QV4KcFi?|&PM}nJ1Q6s)i0R1JME3&Nl$tR$SHf?uUp=3?p60l;$;IM72Wn8&(nyD1O-BIO z4OIdMp?Vn5JYNJo%~gs4%oYwNO{YFfa8ZJg-Sy#TRAzhvmi97@eokdyNIKm@o44zS z*`g4~@+UmhA`TO!Afs!Rwyye*y4Zpbt(9Haq!>d8F7^emn@3Fz@RR~xIvRF`MuiR0 zc@(tjXv+C~mZ9rHR40DUC5$(H9AGVIZ)i%Yyp( zc&?G({RHA3=&8be^k!fx6Er2q$Ct&7{+scLP>Er`B&E8VkNG%Rg;ox09IXj`?K68! zd%NtV-U%QRWv_uuK&m(-+nhjb0Osw7t1_}GpEn?%4DD4(Csg+Im%HAQXL-El(n9eX zrOYu%zMML30imRxFFe!;EKU!vz^dayt9Y^%C|m$Oi5xb1XL2OY#st`gs55n}s+fim zpa%aySF5woIPoe1z!;TjHKMQ*gw9Jo$w^Av7mzi=)Lc()2lMCWV4jRXqT;|07&z(t z6A!v`G>0RE8x;o;OO0q$U#S6lZ?|K8%Cl8vVZhceCp36_y1QXS#8=Tqk4(P<(1!M% zKj;!ZyKmwZi=!X8y7Esj7 zNy!)Rd;xI6)%87*ydMD0bxX;8wR=uvYsBusz}S4MMZ($lwf8d9R(`Dyls{F)e^|tV zo*Zos$p=Z)#KgSM?XM0ewL>8H44$rFD8GtMy~0}2sentg0s{w_RvQfPaGJ{DuCFVv zaF#v>l20#X@S*Tig@bu1J84Hn9Wk#T2H8Lm{;nXkP0>eXNhU&%+`uPqcFa8~NdfsD zaPFD&vT*N4G>J?UkH{bpCejw)fe6bZ0ga9PCJl?ALYo>SeX#SvOLe(1_#!SBMqsT1 z>Aaak_^s&ztT@z9Hg@7E1i`yt-4-(&e(NrrpRpPqGgknUIs@HtN}WPMLc-F6Oc*&` z)_PFC91ghUWt-s*u9yPlZnO%W?@}m8i9Mjig)63=1HV#Ao@@vMTxkSgame}q`2sT7 zPvf>22ljmt*Dg%@Z=h*N8%|}zlPkSb5TBUHdX^TITZumfg?zzjWtOeR;>S1OsI+m^ z@4aMJ01p_n9v=H^YJOeG#+eqs0MkgZi{I~M5g)!bYgnq94Eb6846$)14C$4U&v6P1 z(Z9m`&JM)@u+RYz&Z7|c0f-6YDYGpgt9-bXp_E%_Vd~kJY%DBUHNrvcI)zVv`Xa{@ z738*`0qnN?7D}|Z@7@xqt4TgO%{L350-E9Xr-uyW>AM6>%B>(HSi`>}FmGE1X|uFj zkj+g1RbT5Ag}E&SqQ+F<>l5k__5e_W05OzM(*_mU)n?A%;ANUHjo?(hhlPc;p`rpP z-!vR%8D{_^a#z${BHGu4)*ujCwu3S?y582Ck(g`|NKH#io0++U)Y z^%PwXi0*d3dbGj*2vhkuWK%;kfO>Ml+>BVuux_Ra#z>q#;D)m>*l14Nic&cJO@3t0o06T9os>yVMC5U@ zw+ue9sK`iZpw&W-cJYyK`ECQiH#o?XCcuSK3x}9;y8B~QEiJQJ8?2Ue`+UER=EX4N z^UXPeaI{+!p!hcEc;a~59@*I1R`!%JUz7g%>)qzCGhU$1C#U=CpfGTxwl_}SP5dp% z!N}d?EGPZZ`I4s3J7+%MQSh?to76u!dI@C<|7E=&9;rOPB-T%6F95CwAz{Dv7V;Ei z#Xw#FG*U2n2;ko7_*U`$D2hmwT5T?H_|HE!R;&RL0UwE@)y^;P>!S#tD~Sb54>RR9 zrp;Pgg|8Y{iZc2iJoil2c5!)pu^;Ml57Y5JM}=ardEBbxvDE9Ao?~PFznliCWFBg1 zd7bZXLDT;a<}j-NWJAN9f_kxuq+rmyx^PPg8T~+{b~mcv(o=0Jv&^U^*sJF6TJ)6X zYG41EX4BzX2AQ36q7-HF?0#1r6PeOQv#6X_)7X12{&E7ls6=M`)j;amql*Lb76&?rWT7vm1KmP#eL|0C$m#63)rHgqob$i``rJOhlu18 z+EFN7_5eWCL=ywy`nAdKm^+$&m(tAhcUGF*B=68SI?=vLO4E~zzRpoowHD$WX&2d! z{JRNso*t=hus+=TN5sAD-M2cK)8kxs1Kls-cfP1fwb6WomW;@`X1S&P>~nD$7;$@I zPfBW!Glc@=o258M{_qaWyF7LG6rR8Q*`_!l?jFuq`QO``6%UY;fPes~yn92x2i7yb z43zt1e}%6qL-#YB)=&BY<;PV6_xXlSqNK$I%`)4HCxyoefD&IX6Eu_&#pSrv07D?vpx)?!n$*0Crr^caBx^>H zCB~)KljJTix2MIq?T#!zez+BQko@W3mO03mM@?bgWJv`zs#%kJkG>3DUYgZnAXm+k zcUPxj-`p|I(E>m6nB866H~YMlE8V9;^8K%6&2Rq=UgK_FH}|aaUw?*uE|_0_vm$!( zD|oBNZh&fqh9DILYZqf=rf467C6jdOE9m5N*t-9HiE=mj`OEogyJ=u--DCJ^4sVga zF>lXH@k^ge)y9#H<-UHTTr7gA9#p9bF@H24Men1Z`3+>?o#PoQcBbUoY20l9n1GE* z;&XcL#(?PliN7%bV83qW=u@nw?rw{;yx|NGKl@!VyEr}T^Mggh@)N)#`V%`CU4c60 z4b>0iQK{*kC;LtIygVWWI zDh=VL9Say9j84BCUVTYPcjnC-6MayaVX*ESoa4w#yWzt!O0e%AV9aDijq+GCjGJe` zu&A)0g?qMQF5^mHPtRd!dOG=k#Owfzfxrj6;&z~it!g-GVl9GT0=GMlFP@3on{hmt zsS1>n=@eu7Nvgx1pNudKHb21Jusk>{W{&Nl@)w5)Y2N z$W5)Bd3jZ)vN!S*C7QFH-kA6P@swg^ja0bkWP%E=*(<1LQmhyQ2W)}3N3WRo^TZiTf&=G2Ww@=n!zvW$$Tkg{=TlN_QfJbZcp1KR4bFZrtagcRK%g<{uX}$OcA)&zkgay4d{0W5=2tG&H2ZQ#d&i3Fh?I!{Mo;Gwk zm!BUjmDVpL+3h`3-r0UB9GCr_CZzGSpx)0`oAXBKZxFfPc+O@Vcw zD{nZW_x1H44Inh4R`Lmx$TRrvzan-M06}ZDZ~#I?H-Bv{tI_J@&sLJ)Lz`Nb zae`Wqrp|(b^miUvAkCsCI_@8hTI2IpOtXiR$~7VJe=sFFj$KQ3CjCk1XJF|;I&4(} zn}6OW(#C0arkdN+5fe|r;|DZ6Gn-`F1TRF<&jfURR~k&msa7nPG!wns0LcS?d#}W$ z3nQh7jKgs?|v7B`UUOrbd|XbKwQes>9z+oY0ozGtWunu+obxL zW_Hsd%A{W7x*^Zn3H>%C6hZ%!nUXRANDWwg)hUpABiO{EcXN4p8JK@*@Mm9s)XI}k ztN{JX{=+-Q*lUwxeLqfi21nYgeptRuPb*!E)=0J=GoP#TF%Jw31Zy;i*It?rfyCFn z1&lK{z56manL$ak4*6B!dj?sd=*1;X4~aqQEp_Osq0_!!Yct^V?Q)Zf^uKGrLHa+Q zo^!IjHA$qaCSLy(^MBZU{_n4``hU9i>i_MZcTgrIA}T2cuCoMgw_e?^Hqg#PpWkl=3QWjl zwOm`^0+rwcpqXLnQbiU+dBWTz>AjQ5q=L(__qV&J2S6PM5ORPijjz`EHaO8PU{*tv zbBMd@r=2)pMlXmt^uiATOo{CH#=j>DU>V@BX#x#-@87?Nq)5=qHaLFy0a$9a$-CZ| zkYR-0V`4H^1?j45Nz4T3)bbWmdLyBWfk=C{krCA!z}Kc(euTb`>@lDN_i(ceU0ht; zL5&O_)oZ{2w9h&aBF07cA{YcDATz(Mmz|r7>@=Wkavq0(H8L~bQ1nYr814WYaR3m2)nDhvc$PN0N{(d zKeV_&lG^nj=GK4)cv>?wSD*=+clZ-J!mDEXVy;W=&?F-wPQ;X{bp4Wl7k3K0)5 zwopQ1!0`ZELFvnvRt<1Xz$^(E~wSMNwdpbX z>wClVKoLtQm~yA4^?@+WyjAe4tOlgrZ6GqB%e-yC+H$%DF6862_uaO2n&O-yEC`uzr|G{8|JckY-DfF0{ zC`fmZ9fe+hi{ypR&Wvt;f&H~7eCChI0YuJWCIneQ8%U5Pe0~k9)-Z^J*2h+YTovw$ zz@sj}^!UY&5xrt#5;a%kt?e$@|3Cg;>H?du#b-Tx!%uShyccqYXnGMsO@YByPm`fQZOiqKk$fK(GFO)sm!Q zcG^-<1ka@#lO50dN_a*DeOyDN@S71%{S1zO{(})zz||={(5=gu#SD_?e}LUBe^ULu z_=%3ceZHULoFIFR{YgVzM~2ajKUM~+Y4oS8Vm|Ma(1jt}Y#2Rb zN-E|PuP=48a6?Jc)tm6uTuZ75^HfwsFHw+p-D1Z_m1RXk(ykM84##A!?mQZ&=V60K zRU3~&0R5Eh0!;18eV?ZRi$vb_DOuK>>zAm#9nQ?4s!rroW%Uk#?K!2)&8l>zoJ8K_ z6DYFZA>xkRp)deyt2|!3H5>39g?KnoLLZdEbqpsA;Dk1xq-4cO(qK+#g5*)9u=bzu zW-$Xa*CoWT=OkIGWfv;MxZJpeXIN>fHpX%RVT_X~YJx#;ZxUj1tH+$E1z*n(_$6MN zjc&(gmZ2H?%|^5fpPcpa)A{(dx{z#0gT>NJ_#vn_kx6hDCeC+t(RqI+Le#L?rB>$~ z-B!UdfJyP~fvPmAGRCXiPqkdeoPZZG64Hpd7N#)_+St}IbnT?1qId^zv87X#SQG=E z*FK{*xdPc53G%VUzL+*bL!S&|wL5kht&xH^nnC?xS4{GtgRF>QA)y;cq0>0MU;wDr zmWKFH^2x3kwZ$On5ojWnmvN($h+F>u)` zghD9F5BXuhJ`!Rzgy>+bE+w4X&w-m^UWd0Ef zm4Kw4JoF9b$&9!q^~;=gY^4khbY<>&yGPLbDX6m)RN(%@{{e+qKoeDez$d~`>;X*w z6ZiExt%$fl?JgB5dr@g9JZUi0Y0;~uqNGH?Pn110x-%P$N|gsOk3zIPO7jV(<@_=6 z-()Rhag7^>y+TBLMz)2tWezqnm^2dgGlHt;6d|ivA9H{^S{t@>|1h zM+|h-r7BRyq-d(uar5O#JD}!)IFrEqITO4Mjm8t`7l_dzfzX7Zx%))i%7YvpK z*95{@Vbb7y*Wv;oW!T#y8;fF4dYq zZ-KX=`yDK>Y&S6f!N4umSC`7MyPqK~$$5rNj{7l1sEu|A-_z`0o9&Mb&3Nedz4axr zn$*+SlZ)=u#rUz@$%=;>An%ojTkSv52Hz>WS=%}VU>1>Z%MeSUIEJdJ)1YVY32D^W`acoP%8M6hhL zHT&+iDZadhuS8i!BAzy2+o!O(-3xCk6SnLqW90^Z_3Klej&NPT60;99T(W{*rKWJP z*&`3J+Sl|6uyM433j)AY^9E;{Wes>KW19EK8uMYXB#^$k(jrfdiunRO)ZH85Oov3E zFm4&zq-vMT^HU%|Oxgm)<*=H=Tv9g6rWDrJociRzmB`-p3fd?t;}BVoZ~_DO!!2E0 ztlK>;%b)g|Ov9{MMyUktaQu~xu%bs?Rp?6sxY-pBAi+++lr2xt-odgxn?hBZJ+)oJ_&B_s2~Ccp>uDMJAn{Tb_hJSZp&b@tE0 z>oyu;8$kP+<;mMyufd(`4bRGesAXSoehm6`6-8q-&D&vv3_+=2$t?CIbvZ{h`z|)< zSp8?y#nV$LKf@E&m$_2-`kl`M-`e!#yGS=728(PFIRhnUgq=>NYv_IGO=0bY>MAf{ zZdJ^#_0fzq*hN(Kr?;n3J7uF?fl(u{S53rvSE%Os>@mQs>I&VOVzv@p_t06+ds;pt zDo$VlVebXnw3F#hc#4qvOn6;a4G4G0$~B{vw-jWyx%1?l#Ut#~gn~)Quza6XvZRj4 zLFw4b2a+F_3|)JtBRFrNa~QjC8W#=%)dJZlUDqNUXgG8AnfL1A!@S*Ez_(!$>EZ>3 zOx85wzLAKuj+DbDn6txoaO7Y~L*$2w1oWUn_m|hV2va)?UcOuinB_7-_4p35#5Z80;OQ69K)7Q)l*G<5f=jeOAbcOF_Bo-oM8$EetCI=iM%@ zI#aB*zIC{g zrbJ2n@ORLW!-JuO7tggWgOl@2EtM4kW!QzHcCcn10(Bo5POL-RqhI}aY!=VA3Oh9K z4&wpwzN{Az+)!MFYJc5H(wjC)d~qcfo{t>+&^vw8?}SwvDtBH($YVovNKsm3czFLb ziQml?-Ic%9)zy#97g{`E1nn-NFcbMt+8G+Mj5wzeA?0Nr-hapdi{QYl?zYjpO>+s) zFMW$Y{pso;c@ucJ-aiiLZ&-fmO_Z1mzdBa!eePt6t?K~Ai8p)L;YjOa*cbQma=Y`) zLSSr)=gp_icRgziAskj*Ih!Z#$IxFMQ5RBaxr;ja7Okx>1$V zV#l`n2IDd^r0a3nv1iZ+1g-QXZ`r-xt+e<*gpYHP9z<6bvpfIc&CqL^zx?s0YS2ZZ z(ztE|Qo?>f%sG&sYdiHji=U9SmcOT7O+scIge84~_!I~f>s<%Y@{3$(ZF6&{%>uXw zPO+WA7=y^^rGW#dXsg?UU>Kl3_;9(>K~cliW*a6h(p`> zRGc$dEHc2b6b((&1gt^(dG&WF8TE(Vk4A!H9tRhc7;J`nN0B5-rt^DTd`-ke?W^7He9 zpP8)8xY5-TW>J23aM4u#dt5?(H<;$QASpfl7_=ICP1LYTCG>O`Op!mUKDGHDIl5;e zy(@zWRIg25ap)|Huhl_89fS56vZS_}KlyDALio_gXe2skv`ua7_!5lXsa^XP2Y-eI z#|+-yCm_i%Cn`456r%aw;#0MHc4Z5i9L;o)MM9ecZC~h1O0W(O6ce-STvN$XqWJ#k z>*>dggl9kH<^&z5*a^2fB!9OuWi@_=NJ)(|KpEk|V75z9NQF4Pl^Y1v;q8rnR`46?&i3{>I~LIoRdbj zT2b&#`luA9p=ao1gtZzk+k+p$<_G2(A};ebQ-Oe^A3e&U-C!q_1lw%nIlvM99EHJa zxx!r$niS#){|^9Ak`1IE3_h{>m!(G3Afl-%5;)sA{naHWSal)G6!?p^kwHTpkuJCZ;<0~ z_-L6y2P-Q@Sqo6A*ngwH&dZ$LlkTB1nItEhWq?o%{60DDCbTMo=kTEhI20+b5IGA} z@rHgmju`9eB9XY#T@6Zz98ki(GIPn8*iUKj703~aU*vVc2xP}B8R*XJHL7PeI zuS$a&6-!Te`GbR}?idssCHzypm$G3ZH?5aJc?d}caqK$kwa=EF;0UxeO|#@&Hvq2t z;SE$LY<0-vJzI4Kpn|DxxH3#=5WenXlefAh*Ev;3;je%5v%p`YxPWbH7EeaqN$w)r z1A&W+i*>Tr7%S-dxmp;-mDH3KpO7awYe>h1I|@#{1rC`g&(nY7*RN&WpQC-dLbcA} zA*WLDd-Q0H+~;}cjT~zrY-`Zk0Qx)n=C7HWXTBJ8eH`cWVAG#1(;#~fJJoKCMei-O zVBNwJhT;){=XLSb_n4_$%_jS3=(%EcRZ;fMC?b{T$?b5Q9_@V77r2Yh9VT)%S^wC` z?};$jlM52**scJGNwLBt9}JhyI>HVqDN!^5V061s?iqD~r1xuH$8OTlq&T6^R4?g! z^T27UY*DgwW__(+Bs&eXT(I4#!Vxrdo;V8Nh*wcXRhAVaaB>>@@H7`X^Wtde%k5ji z3nb&d7X9eDE(dq9$JSRbx;3kts6HYRo{>QVL%g3f?Ev1?F@KF3sc_rrE_BmhT6|nQ z>cVbjYgd1J%a_BYg^%^pPh;+ z{7;}{yGB3z^||Cmu`nzmHDQYy1-l&TMenx* zT}gDWln3w)z+;`~t&zqqXUP?hSv0cd;fIV$=If$M_)5*;{E}Wjm{lY5nt3=!Jg&{O^*8k{{hBt5R+-2Mc$2GLbmV>7!k7&MQb#jbR|YHuKcCyBOQt@ zaiNW#@z?%ib`*CkT5a_Fn*BA@9}&3}W2`s~PL^opPL|B7V|bONnp*AfGzc6JWFVvtf)>hbiY3zNy`z5;G6!b<| z2Du5a1^tQV(}fg;Mf?qjpcY|&^xDb1KjS7t*CiS)Kn&Yg0F-ZGd3Wu&$1bR&>Il5H z)rs%Pbnx^(}sZ$m@dm8_iI`cVZiJQQ4_iqO?3-wB}K5j1`P2s|#gf zXBnzt57SRLQ;XduxMgSW3V@mQ7zlA-uOA}7tM#Jq&e+@=E;)$33hmhdUA%M9@Ca!a zvi%8O9gZj<&QaA~LD)L)xt;#}40F_^SwP@PY)JtbF885@lFEsv$9YZ}akSSO0i$E6 zkUDGP^F1&uaDoz$$rS&Sa-qVEWpET@e%`0XX*kds(pQw>q}MD|ej3Kv-=YAr%)~YN zVZ^fU7H|9(o}Nl8*N2ZX{1q(#YYLzFbUgdG6j<~~{1n*@n)Tc~1{>zEW#YR_8AZS& z_LJPz$if+Kj(-Cfi)k32D;BC63rKZ5NMgWZH>i;_;dl0oIQbOLPJ9fBIC9mz2}`Ga z*bbpGr}iva5WS7Wu(J% zWdJbiC$Y9)VJ5<`qMwS#ASWY?yC7hWX(}T`HJ{SDDOu?z&1Wx4uPZP+@S#1>FUNxH z=*8yyrx#c&cOy!eiAKo3o%KI67V|%3M@xI(j@m^$eT)B_(dP!bOW!!C-gQ|zgwQ79 zVPjikGoB(B-m+so|Fy6*tN7*Q5euH;@WpO-KoeS>jM3kag(CNo6Y{GojgGO{e<1Su z3lPCP@UBZs7GdP_u-*xOB?U%Wpx;*S0q_cgF8yl+4&M+mPh$xdmtKj-ePG~Q z!{7Gap1`1JFHomfim2c^f~Gf*^r87prFTk{p_lj;Mfdt6*Dx_@XAeMJxUvN#1(F^q z06k51TAHFgzJp0}R6-}52GP%1(o?7vmCXK~QzfBK8B9PXv0c2FXKU+usknRGOrb*e zTzuS~53poTyjz@7mYeyzkm+9I7w`hMft}Gy`%*AN9V|m7LyVaH_=HGyk4p^Qve};`O26Sqy=7;$V)eK205Y}Tu zS&#iU{;qVx&R)Rc<%0Cg*yi$Jsyu2XUHZ8~?fLXKAM$CjkTRJ?^t4bAu`j=qh6QmG zjiX3XrIfFb;2A@T><`yJNE8Yo%olRGG^f#7C#LOD!1Sa1H3F$C`aOYx4lhO*pdm7H zf%ffWowEXdf%%YNZ=XFum7tCGVe8MzmbJ9o!<|4qLcXS4xFY|#aAM9iTwXeSeEQ$9 z0!8ich#=fAE;>zF>nYFr&rVfn0*w$<8r(BQM&wbqLLU+CE8Oayy#H*Fg2s&YQ88Rf z_U1ZVG^bkcT@#)rsN0C5(72kmSUwM~p5pL{M*U2nFZL1cma&gzt769paS6EbeJE=fy-odc ziIBBtF76r?Ch4^od}cAk5b{ozZQV9wQPko@S$g0UITJ9D8bX|nJ4vcw_cd3T!s3a| zOyDGGY+{75Nj&c3H0}rK1W2<2@<6X3twLzT_)FcRzY{xLNJ$jUvRlfS7A3AA zJ;wVqdI=+8qdWCi7)TV_ZEQFO^H2h~iWguofhT>wUk?)ej00A>0@Pa_sn2;unai&B zr`2P$VDKxIcs&=2pHFD>CXsXS$y$}?q4H^l#(&)ZoTGs{A~xvZu5C-BbZG&cL6>;U zjcFyNe$o3-DOG$|`eV68{he)xkl>Gq*R^;~C=pM2hCA-M3zvbQc0%G+sLx*F69|yV z2>H+&>YcM1a1Hq#Jx{1nwg(b6AK<+DS8&2N91&zhSe)`r8o>u*`&^~xM~oPZTz~xx zJeEQ;Hv8{0tRL_HzB2v4e60Wd@&3R5FE|sBZBme6!VGY2JvqhBKt41;S^nE)8K5w+T=PdgX2E>s<|+km z8lo3kTeDd`acP1N2}nxa`{DCXFpD_C_XOQtuNx^dZe%*cfv`G7M1j%qJQq0xsE0OG{vTr-Vd%7*g@&<%Pr*Kg6i)dIvyL z*!J(2P!j!HS*;TQFr6{`S_AP_5R800HYGVJR&E#;`Yo}`@4Tu5by!!4lp(G z7}qjyBO%?-#yBr;ioCsnOPvY()FiE^B_HZu4*5ofheOcXxS0F%MabRf;CKZ?biXoO zNEQ!hLL0ZitN}^QXd$x|x=aFpXrg&K@GWftp&wwNAtF++SM>-{R#H+sgF|o&MJq`t zJTkI44*+jiA14;IWefMe;#O4WGAz6>faC%An0nk&az3wa=&EUI-f>^U{1O=v5o4jl zrss2Z=rD1Dk!t{VUDbo6Gw|1(cx5p+2uLK_*AbA(30Pl+Bu`&ovFwp?1m4Ql$$bB& zbp*1G^9YxtZ5iuvLmk?Iwuo_W7M-;?Ot;=>3@ zR<10@`9ce@{xUKtgCL8UPyRYyoD|1oqnmZ4GG0^eUW8js5r4wKxLD8i=tyu}04DWV zmy)tfaH@T3TrJz86xR8j+m;@ZcIn}?=rRCvfU7p%0Q&YpB!KpHrzg%ate~`RYs?KD zA48T}Q2fX!(j6w@DcS_^hK*r;Aniki3_$dHni2!?7T$%NcB!n@%t8IYwK@E-jQ7O( zXDwl90e8W+A4kR8x00SP{NL07xvk?CGijk94ks+8)b!{IHST9tCJu1#-U7=Y~jiTinN+J21j5qh+Ll6}3BCM0#Rg?EL-Oy@4wKn`J$`*H3YE!cbU(GmuI2M zj%5pDKd!TjPT6*a&hgPSdlCDU6l~Mm=I2)i=VFCL+2r1fSYVFIT0PRRM+>?8RGm7!5mv>1LX*Ga7 zK->(570C7ukT#Knk|o;WJnV}D){_X;nW z&X6wI0$TMK#5t>CCLf$)9#~FmFGFYhnF#gn6dCU^=#YvNPsEs0UzQa-T^Lsf77t9P zHt=%$R)8}kI`T6LHIKc68${i_Pqb!vT?t_Q*&mn}mp(sT*2fZA=DI*^ljLN=)#e>W z6Zd)}_Ke;bjy&qZqUrh>lLir#cXOo^R{k|o3%VZzIz;q0R@EA4Q4<~VxR|19P9^}i z=8)WQNMln@&<_SSJrny(5EkB^b%oakF)$Bi@X|$g`cFNpuPHwGDiKx5&vgtH>)i*TV0M#smEV4W|6VAG-cECx^M)qSiSYa3-n1)KxW zo!BdS#-LbL}1t zD52K$=GHoc)~E-vR>vPi_O8$QC^IOX{tjI;ZlrTX|MjfAD`&}A70Nh~3(KjPSa&44 zvlReY%zIO?Wyd?;v;E%OkGUjx0atkwEnsg(shdP&CWzEf$}Nb!I`bC6UO=e&8Nvru zt4Z4B3iTi!vM(>WtC!-2Vwf{xQfs_6Ax5bffliBlgG~;HCv(W{YpHG<++!LQO_NA) zy3^q^2)z0Mh!-3A3aFY|Ql8n%<*JVJ(9kd6{2qZU1gTkSWU&X`mFla~Z&JwCX68p> z$?B}>MFGs@*ui%Nl5b0}Dx}sd^&yhEVWsS)r_24usqjfY0rl#uH*xX}gsZBT8oVFF z>(%Z6KHfc&atd)r6FlkmriX?Cq1fN*lMuZBUE!+$Beu~!M`airfFElQ0wc9^%gzrTd; zx`=MHHZi!C*8#Fx#Ccv`|HIVL8!d!I%6(hTEa<6`nV(Yp^JAu(lmV_BK`lQ+N-Sqx zZ{3t85aof8t6u??$iO(A(RJ0esFWk7hO6PQ%|!MjQ~xw zXjbO0*;h7k?Zh5`-RNpQtZ(>3M(6!Eb}g~{bm$aEGmp!B3jh!$yp?1ZH@HCB$5yVn z=0`vqm3hzoscY=_lyPRjaVs#*V%Vc*2&!TgO11nQh`lDNEft&tuUn6*hNM21Dht3ZenFQTiy9l=kOcaB{iD*-W5Y;$KE< zo@dM?w5KJCJJ#ICB#7p;c_ctOi2qadj*3yTrfF-*)=}ZL<-$^aRN4ceh-Z={SW<%- zMZ!zBZdu-(i0)hCO;L#Akj>^MxXcK|&EgeOi(RfAU|6t{vix6-on=(iYrDn)K}v}s z1nCB)K|ys1^m$DIUY+@;lF9a&G-AIJ^u*^J08ZiIa$|YHTU55#BzU~stC3U zz5CHO#7JEbZi(7PD!A>b@VEh5@9Gtr`{vpN{48>Py^-8gMpU6h?Q>O{6ziebm93Pa zo1_YPGS|Z5^v8rld$fH<8e zr1HlxkpFp{tfu;Hx{H@yQ9-q%dRpvPo;+GN7dw6L2`<|H_zN(4$J&GqA(FT zZlQnxCVQnIu`&p_ZIs*x?(%qzzfbb3@T8h9lT^?AkF( ziy%_PNkCKzF3k*Y(BEush=%kbK6GQa&)0=X;`NBjX=VBz>SHl75}?U~sUcYHLV+x) zZruloR#Xa$2HmO`6oucBL3>nRhWt*;^e{}irCyjm$9Ua{omP0(&$RE%u<%$D z6(uD^fE}+|%z9-YcZ|}<+~G+z=JB!|hFbPGtjO5O(ZToSd6!qp6X+V_u^L7t@Q7N} zGfC1`7_3%1*OR?akfru8ZF-|7VOdUbv^ z;Wp?Cdbi$@bO@(kO-jN`e1Mk{{iOmymG|zthe3RdrZTmC;umk~Y!TP%dB5!!nytH8 zKIBp7Bb8k%lmjR+s*kOt;1`CXZVAdo5q2ZS?)Xh1PewD`(okWEGjQ2wqnas|xONH5?HhbMC~`SV zWgf|y#ty($*=1Au*_Rj7fA~sx?XlVzFj0~^8AH=K`GkJ+t}*ev#Z6{4f082@Fi65k z^4e(%mH4rnGqJYo_K9v~nyojn2`b#m*rSZ?htOBO^` z8h?g6%|2&4OoOAVB)0`Tft$)iL^rAm4MGyEqxzMl%y9j~ogk4b47m&5RB!@{k5Qi_ zY;!Lir6jOg`Uy2P*^o-B*TQk!O|*Hi=W~Wj`&aYVsMHc#$w-m&BU)}ZnIo77En$om8-y*P zR@4?6-fAfY4KqiBXhmrYY$uXnE2YA%iv761=+=;+%}i_{EKAZYX7)7%;10}zMt3|m z^rk*gkx?brrEr8|rIIraF=kcLBBfH91JPm{ZopI5hI zQ2TvE3SF)Muh|G5Sw9$W)r_L=p>ph!1vSCB0;i`ycTuKyMBIQdGWep!H^GVAB}hPD zWGrC>KC-GldK@P|OSwqutUM7jGs{%GQmgcvcUOZs73oqfvp+uV#&n&~Moo48}!tB%0?A2z6 z6m@$0@4T(7Bl#j}3W{t~Z2@mAU<(NB-VPZ1LqkK+{Vwk?qdLwJl@^v*Zr&}ZqH?{~ z@gU65D3yUJeR73hecdTWw516ya5iaJP{$@Nii5v#PdTbjPwpn0nt-EDskvW=8KIq& zp2!?I%?)fCJAU3zEtXy;zt-Y%Pd&@${}_KrqbN%F3n9pEEIWJkn_XDzpY8g)o)yZt zv;>cLA!k2HAd!v$IoVv4xYU%omnU>VsD6SPM(!I&p>N$4Z(;H29+*EUxdZ z(fCtK74dUTi{M&&L`i8z5iM-z%k$a{cXLr@LX7?V9)Qkf92s8gRp_E55 zD`N6QhdGEfp*w@OqXJ&5MPgEZ6EpvC?O`s(yA=Z}P8Mwz5vD+2>j$mtwkQ&=+CwlNUicP-{N{W`yRCIyqB?)f9W|HH_f_X1Y8PBuCK`06w zic(k0MeJn-y{veW4^(;GFf3RUsbzD8Dsc%2lYV;RGV+|~E08(?50Ug z?BqvF9Tsq{$u0zMlk5@;_7?3QfXhA0khfwNh_KMI!-vI6L!fh5PY&3@YOXvYQ zFF|t!L+2cUey<6laLwl^?kD^lPC8vXO8Q!_{4xKXvR-rlp^q*U;OvxM8Br*J{I8VH zp*<3b4B98dQ7Cn(G?g_mnSl-+5Yq*nmp?0`Q$~|5JkOeZzykv=suqyk4}yb(&oZ*) zg?b-zZIv4v(wPV)r%{5`K|!Gd3kG=o=?o#7Am<5YL657Px{2>k9aYutN1oF5=lTn2_9)Bqnq5JC?)kT6Hhw0Bk*sg-X^ zr%QUNZNw4&S9#tXx(B!?>1Lczat0C8 z^LACWyUcvHPc*8iFKA8d{_YUv9~8hEBuqwSrMo$=6fXt@1V94B0~|BfZ?$C59xrZa z0)%iFBYn@#=Hk|$B7zRnInC(6G{YUgE@dU9Y6r25n*CR@LcJzxhOYd(WAY16G^SRX z3x?>)SZMoP>ZcPJUu=)lK#oFW08d=5qe|VlYMD;EqQ4pCf!2!Ixv?c3w*FYf(5*5f#67qYTB zh=#_a83K*Ew1>8{#mKVEzYkiD2}z3sr=wLL*_|GINY98tN;r>`#@}ocRjjSI)w+1G zgoUf#_@CgkW4Huq+(d~NQDoU@Zy)l|CcUen9P6UCy4_6K{TX7k=5TqZig${%@8Ysg z`FwZxKiD~KZS6+cQmEKgR7PTgPHP(5qMg$!ojp(YL|)I=~D0%Z$mm zOe$s2z|-?YqYp}8vd~RF_`_Y^;v>77qr3E6;MG#82Av;}a|+1a*-YlU+AS*YWf$5F5_Q)h;+^Qx5$K zOVOh0MfrDsbZmSP)k1$VFR&pn9f*Yk0a9pg`cGgw+}W#fJze?{mu@rhFjJIJg(K#3 zm*WS#8&1yqLfOV6S5{E-@f*K%uX{YhU~jQfuE1H@|NK#AcB99+p@Aq^rF(N}Da?TG zO9_qGWnP*+z)e*ZPV)%A&-HMUqFdb^M&7|GvjSwQmlnTP^`!H4s_b!$C98j_?)@0- zI4hKoIuieTRp0k@k5rTn%PXpjDK=>4H+#u+OJeSvsv={;Z?w60O_up? zb+TRADoZ~5dZR`9obCUJO!HFi*juz2{sr!U@Muu5J1zsWt~*5d_|y=@0oWR>gJYti z4u(#iGQ6SB;AuK3N$iJsGot8R>Rni!KkibLdd0Nv9ZslfL)Nl=2lf{#)@Yuz^TxrX zpWyNAE^B1W0*|D^)^+oLQq$*>u<(AUGSm0euJ_$rG?V z{#@;6f%vDw!;wW>8SmFjbBY@5hFEk=Cu)Rm{}^6A`r-9ubhk%tmZXt2y`?X5cKD71 z`AHj9Og5Q4u_(doiQ6Vh0i(d09_w-2oEY{pMjzX(lE-v)U{8E&T>l$3D-P9$$0ON> z8qti~FSp6LbOoCbueY8~3r}wyiA>X6tQxO33NH; zD&NC*DGer2nRwZ3_)pCb;s3wp=c|hU4-|UK>3Gv}Xm|Ju%x-G#=eB5ICw#qW-Gn72 bPcJY6zKdT+GBb=}z>l)Lx?HJ@Y0$p_z-}$b From f9e9e3afb69786c726c4f7d4526ff37829293810 Mon Sep 17 00:00:00 2001 From: Justin Hall Date: Fri, 10 May 2019 07:51:30 -0700 Subject: [PATCH 471/724] spelling --- .../enable-network-protection.md | 6 +++--- .../evaluate-network-protection.md | 4 ++-- 2 files changed, 5 insertions(+), 5 deletions(-) diff --git a/windows/security/threat-protection/windows-defender-exploit-guard/enable-network-protection.md b/windows/security/threat-protection/windows-defender-exploit-guard/enable-network-protection.md index 25cb0873bd..fbd863f1ef 100644 --- a/windows/security/threat-protection/windows-defender-exploit-guard/enable-network-protection.md +++ b/windows/security/threat-protection/windows-defender-exploit-guard/enable-network-protection.md @@ -11,7 +11,7 @@ ms.pagetype: security ms.localizationpriority: medium author: andreabichsel ms.author: v-anbic -ms.date: 05/09/2019 +ms.date: 05/10/2019 --- # Enable network protection @@ -87,7 +87,7 @@ You can confirm network protection is enabled on a local computer by using Regis ## PowerShell -1. Type **powershell** in the Start menu, right click **Windows PowerShell** and click **Run as administrator** +1. Type **powershell** in the Start menu, right-click **Windows PowerShell** and click **Run as administrator** 2. Enter the following cmdlet: ``` @@ -100,7 +100,7 @@ You can enable the feature in audit mode using the following cmdlet: Set-MpPreference -EnableNetworkProtection AuditMode ``` -Use `Disabled` insead of `AuditMode` or `Enabled` to turn the feature off. +Use `Disabled` instead of `AuditMode` or `Enabled` to turn the feature off. ## Related topics diff --git a/windows/security/threat-protection/windows-defender-exploit-guard/evaluate-network-protection.md b/windows/security/threat-protection/windows-defender-exploit-guard/evaluate-network-protection.md index c0ed880905..bcc8af6812 100644 --- a/windows/security/threat-protection/windows-defender-exploit-guard/evaluate-network-protection.md +++ b/windows/security/threat-protection/windows-defender-exploit-guard/evaluate-network-protection.md @@ -11,7 +11,7 @@ ms.pagetype: security ms.localizationpriority: medium author: andreabichsel ms.author: v-anbic -ms.date: 04/02/2019 +ms.date: 05/10/2019 --- # Evaluate network protection @@ -22,7 +22,7 @@ ms.date: 04/02/2019 [Network protection](network-protection-exploit-guard.md) helps prevent employees from using any application to access dangerous domains that may host phishing scams, exploits, and other malicious content on the Internet. -This topic helps you evaluate Network protection by enabling the feature and guiding you to a testing site. The site in this evaluation topic are not malicious, they are specially created websites that pretend to be malicious. The site will replicate the behavior that would happen if a user visted a malicious site or domain. +This topic helps you evaluate Network protection by enabling the feature and guiding you to a testing site. The site in this evaluation topic are not malicious, they are specially created websites that pretend to be malicious. The site will replicate the behavior that would happen if a user visited a malicious site or domain. >[!TIP] From 08579d2e06844a862a5255c0ae7cda48815ccbfc Mon Sep 17 00:00:00 2001 From: Justin Hall Date: Fri, 10 May 2019 08:55:04 -0700 Subject: [PATCH 472/724] edits --- .../create-wip-policy-using-intune-azure.md | 70 +++++++++---------- 1 file changed, 35 insertions(+), 35 deletions(-) diff --git a/windows/security/information-protection/windows-information-protection/create-wip-policy-using-intune-azure.md b/windows/security/information-protection/windows-information-protection/create-wip-policy-using-intune-azure.md index 3b01319d95..c77253574c 100644 --- a/windows/security/information-protection/windows-information-protection/create-wip-policy-using-intune-azure.md +++ b/windows/security/information-protection/windows-information-protection/create-wip-policy-using-intune-azure.md @@ -566,50 +566,50 @@ After you've decided where your protected apps can access enterprise data on you **To set your optional settings** -1. Choose to set any or all optional settings: +Choose these optional settings: + +- **Prevent corporate data from being accessed by apps when the device is locked. Applies only to Windows 10 Mobile.** Determines whether to encrypt enterprise data using a key that's protected by an employee's PIN code on a locked device. Apps won't be able to read corporate data when the device is locked. The options are: + + - **On.** Turns on the feature and provides the additional protection. + + - **Off, or not configured.** Doesn't enable this feature. + +- **Revoke encryption keys on unenroll.** Determines whether to revoke a user’s local encryption keys from a device when it’s unenrolled from Windows Information Protection. If the encryption keys are revoked, a user no longer has access to encrypted corporate data. The options are: + + - **On, or not configured (recommended).** Revokes local encryption keys from a device during unenrollment. + + - **Off.** Stop local encryption keys from being revoked from a device during unenrollment. For example if you’re migrating between Mobile Device Management (MDM) solutions. + +- **Show the enterprise data protection icon.** Determines whether the Windows Information Protection icon overlay appears on corporate files in the Save As and File Explorer views. The options are: + + - **On.** Allows the Windows Information Protection icon overlay to appear on corporate files in the Save As and File Explorer views. Additionally, for unenlightened but protected apps, the icon overlay also appears on the app tile and with Managed text on the app name in the **Start** menu. + + - **Off, or not configured (recommended).** Stops the Windows Information Protection icon overlay from appearing on corporate files or unenlightened, but protected apps. Not configured is the default option. + +- **Use Azure RMS for WIP.** Determines whether WIP uses [Microsoft Azure Rights Management](https://products.office.com/business/microsoft-azure-rights-management) to apply EFS encryption to files that are copied from Windows 10 to USB or other removable drives so they can be securely shared amongst employees. In other words, WIP uses Azure Rights Management "machinery" to apply EFS encryption to files when they are copied to removable drives. You must already have Azure Rights Management set up. The EFS file encryption key is protected by the RMS template’s license. Only users with permission to that template will be able to read it from the removable drive. WIP can also integrate with Azure RMS by using the **AllowAzureRMSForEDP** and the **RMSTemplateIDForEDP** MDM settings in the [EnterpriseDataProtection CSP](https://msdn.microsoft.com/windows/hardware/commercialize/customize/mdm/enterprisedataprotection-csp). + + - **On.** Protects files that are copied to a removable drive. You can enter a TemplateID GUID to specify who can access the Azure Rights Management protected files, and for how long. The RMS template is only applied to the files on removable media, and is only used for access control—it doesn’t actually apply Azure Information Protection to the files. Curly braces {} are required around the RMS Template ID, but they are removed after you save the policy. + + If you don’t specify an [RMS template](https://docs.microsoft.com/information-protection/deploy-use/configure-custom-templates), it’s a regular EFS file using a default RMS template that everyone in the tenant will have access to. + + - **Off, or not configured.** Stops WIP from encrypting Azure Rights Management files that are copied to a removable drive. - ![Microsoft Intune, Choose if you want to include any of the optional settings](images/wip-azure-advanced-settings-optional.png) - - - **Prevent corporate data from being accessed by apps when the device is locked. Applies only to Windows 10 Mobile.** Determines whether to encrypt enterprise data using a key that's protected by an employee's PIN code on a locked device. Apps won't be able to read corporate data when the device is locked. The options are: - - - **On.** Turns on the feature and provides the additional protection. - - - **Off, or not configured.** Doesn't enable this feature. - - - **Revoke encryption keys on unenroll.** Determines whether to revoke a user’s local encryption keys from a device when it’s unenrolled from Windows Information Protection. If the encryption keys are revoked, a user no longer has access to encrypted corporate data. The options are: - - - **On, or not configured (recommended).** Revokes local encryption keys from a device during unenrollment. - - - **Off.** Stop local encryption keys from being revoked from a device during unenrollment. For example if you’re migrating between Mobile Device Management (MDM) solutions. - - - **Show the enterprise data protection icon.** Determines whether the Windows Information Protection icon overlay appears on corporate files in the Save As and File Explorer views. The options are: - - - **On.** Allows the Windows Information Protection icon overlay to appear on corporate files in the Save As and File Explorer views. Additionally, for unenlightened but protected apps, the icon overlay also appears on the app tile and with Managed text on the app name in the **Start** menu. - - - **Off, or not configured (recommended).** Stops the Windows Information Protection icon overlay from appearing on corporate files or unenlightened, but protected apps. Not configured is the default option. - - - **Use Azure RMS for WIP.** Determines whether WIP uses [Microsoft Azure Rights Management](https://products.office.com/business/microsoft-azure-rights-management) to apply EFS encryption to files that are copied from Windows 10 to USB or other removable drives so they can be securely shared amongst employees. You must already have Azure Rights Management set up. The RMS template is only applied to the files on removable media, and is only used for access control—it doesn’t actually apply Azure Information Protection to the files. In other words, WIP uses AIP "machinery" to apply EFS encryption to files when they are copied to removable media. - - - **On.** Protects files that are copied to a removable drive. You can enter a TemplateID GUID to specify who can access the Azure Rights Management protected files, and for how long. Curly braces {} are required around the RMS Template ID, but they are removed after you save the policy. - - The EFS file uses the key from the RMS template’s license to protect the EFS file encryption key. Only users with permission to that template will be able to read it from the USB. If you don’t specify a template, it’s a regular EFS file using a default RMS template that everyone in the tenant will have access to. - - - **Off, or not configured.** Stops WIP from encrypting Azure Rights Management files that are copied to a removable drive. + >[!NOTE] + >Regardless of this setting, all files in OneDrive for Business will be encrypted, including moved Known Folders. - >[!NOTE] - >Regardless of this setting, all files in OneDrive for Business will be encrypted, including moved Known Folders. + For more info about setting up and using a custom template, see [Configuring custom templates for the Azure Rights Management service]. - - **Allow Windows Search Indexer to search encrypted files.** Determines whether to allow the Windows Search Indexer to index items that are encrypted, such as WIP protected files. +- **Allow Windows Search Indexer to search encrypted files.** Determines whether to allow the Windows Search Indexer to index items that are encrypted, such as WIP protected files. - - **On.** Starts Windows Search Indexer to index encrypted files. + - **On.** Starts Windows Search Indexer to index encrypted files. - - **Off, or not configured.** Stops Windows Search Indexer from indexing encrypted files. + - **Off, or not configured.** Stops Windows Search Indexer from indexing encrypted files. -For more info about setting up and using a custom template, see [Configuring custom templates for the Azure Rights Management service](https://docs.microsoft.com/information-protection/deploy-use/configure-custom-templates). WIP can also integrate with Azure RMS by using the **AllowAzureRMSForEDP** and the **RMSTemplateIDForEDP** MDM settings in the [EnterpriseDataProtection CSP](https://msdn.microsoft.com/windows/hardware/commercialize/customize/mdm/enterprisedataprotection-csp). +![Advanced optional settings ](images/wip-azure-advanced-settings-optional.png) ## Encrypted file extensions -You can restrict which files are protected by WIP when they are downloaded from an SMB share within your enterprise network locations. If this setting is configured, only files with the extensions in the list will be encrypted. If this setting is not specified, the existing auto-encryption behavior is applied. +You can restrict which files are protected by WIP when they are downloaded from an SMB share within your enterprise network locations. If this setting is configured, only files with te extensions in the list will be encrypted. If this setting is not specified, the existing auto-encryption behavior is applied. ![WIP encrypted file extensions](images/wip-encrypted-file-extensions.png) From a89de968768a50169ab962dc4da7c724006011bb Mon Sep 17 00:00:00 2001 From: Justin Hall Date: Fri, 10 May 2019 10:29:09 -0700 Subject: [PATCH 473/724] edit --- .../create-wip-policy-using-intune-azure.md | 6 +----- 1 file changed, 1 insertion(+), 5 deletions(-) diff --git a/windows/security/information-protection/windows-information-protection/create-wip-policy-using-intune-azure.md b/windows/security/information-protection/windows-information-protection/create-wip-policy-using-intune-azure.md index c77253574c..2ca3e9daf4 100644 --- a/windows/security/information-protection/windows-information-protection/create-wip-policy-using-intune-azure.md +++ b/windows/security/information-protection/windows-information-protection/create-wip-policy-using-intune-azure.md @@ -562,11 +562,7 @@ After you create and deploy your WIP policy to your employees, Windows begins to ![Microsoft Intune, Upload your Data Recovery Agent (DRA) certificate](images/wip-azure-advanced-settings-efsdra.png) ## Choose your optional WIP-related settings -After you've decided where your protected apps can access enterprise data on your network, you’ll be asked to decide if you want to add any optional WIP settings. - -**To set your optional settings** - -Choose these optional settings: +After you've decided where your protected apps can access enterprise data on your network, choose these optional settings: - **Prevent corporate data from being accessed by apps when the device is locked. Applies only to Windows 10 Mobile.** Determines whether to encrypt enterprise data using a key that's protected by an employee's PIN code on a locked device. Apps won't be able to read corporate data when the device is locked. The options are: From ea8367658d1826c9c2ea3bbe836dc2c1b8279159 Mon Sep 17 00:00:00 2001 From: Justin Hall Date: Fri, 10 May 2019 11:01:34 -0700 Subject: [PATCH 474/724] fixed image and list --- .../create-wip-policy-using-intune-azure.md | 74 +++++++++---------- 1 file changed, 36 insertions(+), 38 deletions(-) diff --git a/windows/security/information-protection/windows-information-protection/create-wip-policy-using-intune-azure.md b/windows/security/information-protection/windows-information-protection/create-wip-policy-using-intune-azure.md index 2ca3e9daf4..ac8ada75d1 100644 --- a/windows/security/information-protection/windows-information-protection/create-wip-policy-using-intune-azure.md +++ b/windows/security/information-protection/windows-information-protection/create-wip-policy-using-intune-azure.md @@ -562,46 +562,44 @@ After you create and deploy your WIP policy to your employees, Windows begins to ![Microsoft Intune, Upload your Data Recovery Agent (DRA) certificate](images/wip-azure-advanced-settings-efsdra.png) ## Choose your optional WIP-related settings -After you've decided where your protected apps can access enterprise data on your network, choose these optional settings: - -- **Prevent corporate data from being accessed by apps when the device is locked. Applies only to Windows 10 Mobile.** Determines whether to encrypt enterprise data using a key that's protected by an employee's PIN code on a locked device. Apps won't be able to read corporate data when the device is locked. The options are: - - - **On.** Turns on the feature and provides the additional protection. - - - **Off, or not configured.** Doesn't enable this feature. - -- **Revoke encryption keys on unenroll.** Determines whether to revoke a user’s local encryption keys from a device when it’s unenrolled from Windows Information Protection. If the encryption keys are revoked, a user no longer has access to encrypted corporate data. The options are: - - - **On, or not configured (recommended).** Revokes local encryption keys from a device during unenrollment. - - - **Off.** Stop local encryption keys from being revoked from a device during unenrollment. For example if you’re migrating between Mobile Device Management (MDM) solutions. - -- **Show the enterprise data protection icon.** Determines whether the Windows Information Protection icon overlay appears on corporate files in the Save As and File Explorer views. The options are: - - - **On.** Allows the Windows Information Protection icon overlay to appear on corporate files in the Save As and File Explorer views. Additionally, for unenlightened but protected apps, the icon overlay also appears on the app tile and with Managed text on the app name in the **Start** menu. - - - **Off, or not configured (recommended).** Stops the Windows Information Protection icon overlay from appearing on corporate files or unenlightened, but protected apps. Not configured is the default option. - -- **Use Azure RMS for WIP.** Determines whether WIP uses [Microsoft Azure Rights Management](https://products.office.com/business/microsoft-azure-rights-management) to apply EFS encryption to files that are copied from Windows 10 to USB or other removable drives so they can be securely shared amongst employees. In other words, WIP uses Azure Rights Management "machinery" to apply EFS encryption to files when they are copied to removable drives. You must already have Azure Rights Management set up. The EFS file encryption key is protected by the RMS template’s license. Only users with permission to that template will be able to read it from the removable drive. WIP can also integrate with Azure RMS by using the **AllowAzureRMSForEDP** and the **RMSTemplateIDForEDP** MDM settings in the [EnterpriseDataProtection CSP](https://msdn.microsoft.com/windows/hardware/commercialize/customize/mdm/enterprisedataprotection-csp). - - - **On.** Protects files that are copied to a removable drive. You can enter a TemplateID GUID to specify who can access the Azure Rights Management protected files, and for how long. The RMS template is only applied to the files on removable media, and is only used for access control—it doesn’t actually apply Azure Information Protection to the files. Curly braces {} are required around the RMS Template ID, but they are removed after you save the policy. - - If you don’t specify an [RMS template](https://docs.microsoft.com/information-protection/deploy-use/configure-custom-templates), it’s a regular EFS file using a default RMS template that everyone in the tenant will have access to. - - - **Off, or not configured.** Stops WIP from encrypting Azure Rights Management files that are copied to a removable drive. - - >[!NOTE] - >Regardless of this setting, all files in OneDrive for Business will be encrypted, including moved Known Folders. - - For more info about setting up and using a custom template, see [Configuring custom templates for the Azure Rights Management service]. - -- **Allow Windows Search Indexer to search encrypted files.** Determines whether to allow the Windows Search Indexer to index items that are encrypted, such as WIP protected files. - - - **On.** Starts Windows Search Indexer to index encrypted files. - - - **Off, or not configured.** Stops Windows Search Indexer from indexing encrypted files. +After you've decided where your protected apps can access enterprise data on your network, you can choose optional settings. ![Advanced optional settings ](images/wip-azure-advanced-settings-optional.png) + +**Prevent corporate data from being accessed by apps when the device is locked. Applies only to Windows 10 Mobile.** Determines whether to encrypt enterprise data using a key that's protected by an employee's PIN code on a locked device. Apps won't be able to read corporate data when the device is locked. The options are: + +- **On.** Turns on the feature and provides the additional protection. + +- **Off, or not configured.** Doesn't enable this feature. + +**Revoke encryption keys on unenroll.** Determines whether to revoke a user’s local encryption keys from a device when it’s unenrolled from Windows Information Protection. If the encryption keys are revoked, a user no longer has access to encrypted corporate data. The options are: + +- **On, or not configured (recommended).** Revokes local encryption keys from a device during unenrollment. + +- **Off.** Stop local encryption keys from being revoked from a device during unenrollment. For example if you’re migrating between Mobile Device Management (MDM) solutions. + +**Show the enterprise data protection icon.** Determines whether the Windows Information Protection icon overlay appears on corporate files in the Save As and File Explorer views. The options are: + +- **On.** Allows the Windows Information Protection icon overlay to appear on corporate files in the Save As and File Explorer views. Additionally, for unenlightened but protected apps, the icon overlay also appears on the app tile and with Managed text on the app name in the **Start** menu. + +- **Off, or not configured (recommended).** Stops the Windows Information Protection icon overlay from appearing on corporate files or unenlightened, but protected apps. Not configured is the default option. + +**Use Azure RMS for WIP.** Determines whether WIP uses [Microsoft Azure Rights Management](https://products.office.com/business/microsoft-azure-rights-management) to apply EFS encryption to files that are copied from Windows 10 to USB or other removable drives so they can be securely shared amongst employees. In other words, WIP uses Azure Rights Management "machinery" to apply EFS encryption to files when they are copied to removable drives. You must already have Azure Rights Management set up. The EFS file encryption key is protected by the RMS template’s license. Only users with permission to that template will be able to read it from the removable drive. WIP can also integrate with Azure RMS by using the **AllowAzureRMSForEDP** and the **RMSTemplateIDForEDP** MDM settings in the [EnterpriseDataProtection CSP](https://msdn.microsoft.com/windows/hardware/commercialize/customize/mdm/enterprisedataprotection-csp). + +- **On.** Protects files that are copied to a removable drive. You can enter a TemplateID GUID to specify who can access the Azure Rights Management protected files, and for how long. The RMS template is only applied to the files on removable media, and is only used for access control—it doesn’t actually apply Azure Information Protection to the files. Curly braces {} are required around the RMS Template ID, but they are removed after you save the policy. + + If you don’t specify an [RMS template](https://docs.microsoft.com/information-protection/deploy-use/configure-custom-templates), it’s a regular EFS file using a default RMS template that everyone in the tenant will have access to. + +- **Off, or not configured.** Stops WIP from encrypting Azure Rights Management files that are copied to a removable drive. + +>[!NOTE] +>Regardless of this setting, all files in OneDrive for Business will be encrypted, including moved Known Folders. + +**Allow Windows Search Indexer to search encrypted files.** Determines whether to allow the Windows Search Indexer to index items that are encrypted, such as WIP protected files. + +- **On.** Starts Windows Search Indexer to index encrypted files. + +- **Off, or not configured.** Stops Windows Search Indexer from indexing encrypted files. ## Encrypted file extensions From 7c773be415354c7ad36ee5f628d9aa7875c5b326 Mon Sep 17 00:00:00 2001 From: Justin Hall Date: Fri, 10 May 2019 11:02:03 -0700 Subject: [PATCH 475/724] date --- .../create-wip-policy-using-intune-azure.md | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/windows/security/information-protection/windows-information-protection/create-wip-policy-using-intune-azure.md b/windows/security/information-protection/windows-information-protection/create-wip-policy-using-intune-azure.md index ac8ada75d1..1d57580668 100644 --- a/windows/security/information-protection/windows-information-protection/create-wip-policy-using-intune-azure.md +++ b/windows/security/information-protection/windows-information-protection/create-wip-policy-using-intune-azure.md @@ -11,7 +11,7 @@ manager: dansimp audience: ITPro ms.collection: M365-security-compliance ms.topic: conceptual -ms.date: 05/08/2019 +ms.date: 05/10/2019 --- # Create a Windows Information Protection (WIP) policy using the Azure portal for Microsoft Intune From 5a0d6d9e959aa2c19f362029a757a85c08525dd7 Mon Sep 17 00:00:00 2001 From: Justin Hall Date: Fri, 10 May 2019 11:12:09 -0700 Subject: [PATCH 476/724] Update hello-hybrid-key-trust-prereqs.md --- .../hello-for-business/hello-hybrid-key-trust-prereqs.md | 4 ++-- 1 file changed, 2 insertions(+), 2 deletions(-) diff --git a/windows/security/identity-protection/hello-for-business/hello-hybrid-key-trust-prereqs.md b/windows/security/identity-protection/hello-for-business/hello-hybrid-key-trust-prereqs.md index a4a1cc41b4..4d48eaed74 100644 --- a/windows/security/identity-protection/hello-for-business/hello-hybrid-key-trust-prereqs.md +++ b/windows/security/identity-protection/hello-for-business/hello-hybrid-key-trust-prereqs.md @@ -85,7 +85,7 @@ Organizations using older directory synchronization technology, such as DirSync
## Federation with Azure ## -You can deploy Windows Hello for Business key trust in non-federated and federated environments. For non-federated environments, key trust deployments work in environments that have deployed [Password Synchronization with Azure AD Connect](https://docs.microsoft.com/azure/active-directory/connect/active-directory-aadconnectsync-implement-password-synchronization) and [Azure Active Directory Pass-through-Authentication](https://docs.microsoft.com/azure/active-directory/connect/active-directory-aadconnect-pass-through-authentication). For federated environments, you can deploy Windows Hello for Business key trust using Active Directory Federation Services (AD FS) 2012 R2 or later. +You can deploy Windows Hello for Business key trust in non-federated and federated environments. For non-federated environments, key trust deployments work in environments that have deployed [Password Synchronization with Azure AD Connect](https://docs.microsoft.com/azure/active-directory/connect/active-directory-aadconnectsync-implement-password-synchronization) and [Azure Active Directory Pass-through-Authentication](https://docs.microsoft.com/azure/active-directory/connect/active-directory-aadconnect-pass-through-authentication). For federated environments, you can deploy Windows Hello for Business key trust using Active Directory Federation Services (AD FS) beginning with Windows Server 2012 R2. ### Section Review ### > [!div class="checklist"] @@ -97,7 +97,7 @@ You can deploy Windows Hello for Business key trust in non-federated and federat ## Multifactor Authentication ## Windows Hello for Business is a strong, two-factor credential the helps organizations reduce their dependency on passwords. The provisioning process lets a user enroll in Windows Hello for Business using their user name and password as one factor, but needs a second factor of authentication. -Hybrid Windows Hello for Business deployments can use Azure’s Multi-factor Authentication service or they can use multi-factor authentication provided by Windows Server 2012 R2 or later Active Directory Federation Services, which include an adapter model that enables third parties to integrate their multi-factor authentication into AD FS. The Multi-factor authentication enabled in Office 365 license is sufficient for direct Multi-factor Authentication against Azure AD. +Hybrid Windows Hello for Business deployments can use Azure’s Multifactor Authentication (MFA) service or they can use MFA provided by AD FS beginning with Windows Server 2012 R2, which includes an adapter model that enables third parties to integrate their MFA into AD FS. The MFA enabled by an Office 365 license is sufficient for Azure AD. ### Section Review > [!div class="checklist"] From 33bc56ed1e0f1e68b4ffdebe277e2dc44a36fcbd Mon Sep 17 00:00:00 2001 From: Justin Hall Date: Fri, 10 May 2019 11:13:55 -0700 Subject: [PATCH 477/724] Update hello-hybrid-key-trust-prereqs.md --- .../hello-for-business/hello-hybrid-key-trust-prereqs.md | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/windows/security/identity-protection/hello-for-business/hello-hybrid-key-trust-prereqs.md b/windows/security/identity-protection/hello-for-business/hello-hybrid-key-trust-prereqs.md index 4d48eaed74..e7e22f7c8f 100644 --- a/windows/security/identity-protection/hello-for-business/hello-hybrid-key-trust-prereqs.md +++ b/windows/security/identity-protection/hello-for-business/hello-hybrid-key-trust-prereqs.md @@ -97,7 +97,7 @@ You can deploy Windows Hello for Business key trust in non-federated and federat ## Multifactor Authentication ## Windows Hello for Business is a strong, two-factor credential the helps organizations reduce their dependency on passwords. The provisioning process lets a user enroll in Windows Hello for Business using their user name and password as one factor, but needs a second factor of authentication. -Hybrid Windows Hello for Business deployments can use Azure’s Multifactor Authentication (MFA) service or they can use MFA provided by AD FS beginning with Windows Server 2012 R2, which includes an adapter model that enables third parties to integrate their MFA into AD FS. The MFA enabled by an Office 365 license is sufficient for Azure AD. +Hybrid Windows Hello for Business deployments can use Azure’s Multifactor Authentication (MFA) service or they can use multifactor authentication provided by AD FS beginning with Windows Server 2012 R2, which includes an adapter model that enables third parties to integrate their MFA into AD FS. The MFA enabled by an Office 365 license is sufficient for Azure AD. ### Section Review > [!div class="checklist"] From 5dc0ff8e942f0d59708af9683da3bd914bf8f5e2 Mon Sep 17 00:00:00 2001 From: "Nisha Mittal (Wipro Ltd.)" Date: Fri, 10 May 2019 13:19:46 -0700 Subject: [PATCH 478/724] Latest changes for 1809 issues --- .../status-windows-10-1507.yml | 22 ------------ ...indows-10-1607-and-windows-server-2016.yml | 26 ++++++-------- .../status-windows-10-1703.yml | 24 ++++++------- .../status-windows-10-1709.yml | 26 ++++++-------- .../status-windows-10-1803.yml | 28 ++++++--------- ...indows-10-1809-and-windows-server-2019.yml | 18 ++-------- ...ndows-7-and-windows-server-2008-r2-sp1.yml | 34 ++++++------------- ...windows-8.1-and-windows-server-2012-r2.yml | 26 ++++++-------- .../status-windows-server-2008-sp2.yml | 12 ------- .../status-windows-server-2012.yml | 24 ++++++------- 10 files changed, 72 insertions(+), 168 deletions(-) diff --git a/windows/release-information/status-windows-10-1507.yml b/windows/release-information/status-windows-10-1507.yml index 3cab3fb9e9..16bf511276 100644 --- a/windows/release-information/status-windows-10-1507.yml +++ b/windows/release-information/status-windows-10-1507.yml @@ -61,9 +61,6 @@ sections: text: "
This table offers a summary of current active issues and those issues that have been resolved in the last 30 days.

- - -
SummaryOriginating updateStatusLast updated
Certain operations performed on a Cluster Shared Volume may fail
Certain operations, such as rename, performed on files or folders on a Cluster Shared Volume (CSV) may fail with the error, \"STATUS_BAD_IMPERSONATION_LEVEL (0xC00000A5)\".

See details >
OS Build 10240.18094

January 08, 2019
KB4480962
Mitigated
April 25, 2019
02:00 PM PT
MSXML6 may cause applications to stop responding
MSXML6 may cause applications to stop responding if an exception was thrown during node operations, such as appendChild(), insertBefore(), and moveNode().

See details >
OS Build 10240.18094

January 08, 2019
KB4480962
Resolved
KB4493475
April 09, 2019
10:00 AM PT
Custom URI schemes may not start corresponding application
Custom URI schemes for application protocol handlers may not start the corresponding application for local intranet and trusted sites in Internet Explorer.

See details >
OS Build 10240.18158

March 12, 2019
KB4489872
Resolved
KB4493475
April 09, 2019
10:00 AM PT
Embedded objects may display incorrectly
Any compound document (OLE) server application that places embedded objects into the Windows Metafile (WMF) using the PatBlt API may display embedded objects incorrectly.

See details >
OS Build 10240.18132

February 12, 2019
KB4487018
Resolved
KB4493475
April 09, 2019
10:00 AM PT
" @@ -74,30 +71,11 @@ sections:
" -- title: March 2019 -- items: - - type: markdown - text: " - - -
DetailsOriginating updateStatusHistory
Custom URI schemes may not start corresponding application
After installing KB4489872, Custom URI Schemes for Application Protocol handlers may not start the corresponding application for local intranet and trusted sites on Internet Explorer.

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10, version 1607; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 10 Enterprise LTSB 2015; Windows 8.1; Windows 7 SP1 
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2; Windows Server 2008 R2 SP1
Resolution: This issue was resolved in KB4493475.

Back to top
OS Build 10240.18158

March 12, 2019
KB4489872
Resolved
KB4493475
Resolved:
April 09, 2019
10:00 AM PT

Opened:
March 12, 2019
10:00 AM PT
- " - -- title: February 2019 -- items: - - type: markdown - text: " - - -
DetailsOriginating updateStatusHistory
Embedded objects may display incorrectly
Any compound document (OLE) server application that places embedded objects into the Windows Metafile (WMF) using the PatBlt API may display embedded objects incorrectly. 
 
For example, if you paste a Microsoft Excel worksheet object into a Microsoft Word document, the cells may render with a different background color. 
 
Affected platforms:  
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10, version 1607; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 10 Enterprise LTSB 2015; Windows 8.1; Windows 7 SP1
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2; Windows Server 2012; Windows Server 2008 R2 SP1; Windows Server 2008 SP2 
Resolution: This issue is resolved in KB4493475

Back to top
OS Build 10240.18132

February 12, 2019
KB4487018
Resolved
KB4493475
Resolved:
April 09, 2019
10:00 AM PT

Opened:
February 12, 2019
10:00 AM PT
- " - - title: January 2019 - items: - type: markdown text: " -
DetailsOriginating updateStatusHistory
Certain operations performed on a Cluster Shared Volume may fail
Certain operations, such as rename, that you perform on files or folders that are on a Cluster Shared Volume (CSV) may fail with the error, \"STATUS_BAD_IMPERSONATION_LEVEL (0xC00000A5)\". This occurs when you perform the operation on a CSV owner node from a process that doesn’t have administrator privilege.

Affected platforms: 
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10, version 1607; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 10 Enterprise LTSB 2015; Windows 8.1
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2; Windows Server 2012
Workaround: Do one of the following: 
  • Perform the operation from a process that has administrator privilege. 
  • Perform the operation from a node that doesn’t have CSV ownership. 
Next steps: Microsoft is working on a resolution and will provide an update in an upcoming release.

Back to top
OS Build 10240.18094

January 08, 2019
KB4480962
Mitigated
Last updated:
April 25, 2019
02:00 PM PT

Opened:
January 08, 2019
10:00 AM PT
MSXML6 may cause applications to stop responding
After installing KB4480962, MSXML6 causes applications to stop responding if an exception was thrown during node operations, such as appendChild(), insertBefore(), and moveNode().

The Group Policy editor may stop responding when editing a Group Policy Object (GPO) that contains Group Policy Preferences (GPP) for Internet Explorer 10 settings.

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10, version 1607; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 10 Enterprise LTSB 2015; Windows 8.1
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2; Windows Server 2012
Resolution: This issue was resolved in KB4493475.

Back to top
OS Build 10240.18094

January 08, 2019
KB4480962
Resolved
KB4493475
Resolved:
April 09, 2019
10:00 AM PT

Opened:
January 08, 2019
10:00 AM PT
" diff --git a/windows/release-information/status-windows-10-1607-and-windows-server-2016.yml b/windows/release-information/status-windows-10-1607-and-windows-server-2016.yml index b22aced938..d444c69dac 100644 --- a/windows/release-information/status-windows-10-1607-and-windows-server-2016.yml +++ b/windows/release-information/status-windows-10-1607-and-windows-server-2016.yml @@ -61,16 +61,13 @@ sections: text: "
This table offers a summary of current active issues and those issues that have been resolved in the last 30 days.

+ - - - -
SummaryOriginating updateStatusLast updated
Zone transfers over TCP may fail
Zone transfers between primary and secondary DNS servers over the Transmission Control Protocol (TCP) may fail.

See details >
OS Build 14393.2941

April 25, 2019
KB4493473
Investigating
April 25, 2019
02:00 PM PT
Layout and cell size of Excel sheets may change when using MS UI Gothic
When using the MS UI Gothic or MS PGothic fonts, the text, layout, or cell size may become narrower or wider than expected in Microsoft Excel.

See details >
OS Build 14393.2931

April 25, 2019
KB4492241
Mitigated
May 10, 2019
10:35 AM PT
Cluster service may fail if the minimum password length is set to greater than 14
The cluster service may fail to start with the error “2245 (NERR_PasswordTooShort)” if the Group Policy “Minimum Password Length” is configured with greater than 14 characters.

See details >
OS Build 14393.2639

November 27, 2018
KB4467684
Mitigated
April 25, 2019
02:00 PM PT
Issue using PXE to start a device from WDS
There may be issues using the Preboot Execution Environment (PXE) to start a device from a Windows Deployment Services (WDS) server configured to use Variable Window Extension.

See details >
OS Build 14393.2848

March 12, 2019
KB4489882
Mitigated
April 25, 2019
02:00 PM PT
SCVMM cannot enumerate and manage logical switches deployed on the host
For hosts managed by System Center Virtual Machine Manager (VMM), VMM cannot enumerate and manage logical switches deployed on the host.

See details >
OS Build 14393.2639

November 27, 2018
KB4467684
Mitigated
April 25, 2019
02:00 PM PT
Certain operations performed on a Cluster Shared Volume may fail
Certain operations, such as rename, performed on files or folders on a Cluster Shared Volume (CSV) may fail with the error, \"STATUS_BAD_IMPERSONATION_LEVEL (0xC00000A5)\".

See details >
OS Build 14393.2724

January 08, 2019
KB4480961
Mitigated
April 25, 2019
02:00 PM PT
Windows may not start on certain Lenovo and Fujitsu laptops with less than 8GB of RAM
Windows may fail to start on certain Lenovo and Fujitsu laptops that have less than 8 GB of RAM.

See details >
OS Build 14393.2608

November 13, 2018
KB4467691
Mitigated
February 19, 2019
10:00 AM PT
Custom URI schemes may not start corresponding application
Custom URI schemes for application protocol handlers may not start the corresponding application for local intranet and trusted sites in Internet Explorer.

See details >
OS Build 14393.2848

March 12, 2019
KB4489882
Resolved
KB4493473
April 25, 2019
02:00 PM PT
End-user-defined characters (EUDC) may cause blue screen at startup
If you enable per font end-user-defined characters (EUDC), the system will stop working and a blue screen may appear at startup.

See details >
OS Build 14393.2879

March 19, 2019
KB4489889
Resolved
KB4493470
April 09, 2019
10:00 AM PT
Internet Explorer 11 authentication issue with multiple concurrent logons
Internet Explorer 11 users may encounter issues if two or more people use the same user account for multiple, concurrent login sessions on the same Windows Server machine.

See details >
OS Build 14393.2724

January 08, 2019
KB4480961
Resolved
KB4493470
April 09, 2019
10:00 AM PT
MSXML6 may cause applications to stop responding
MSXML6 may cause applications to stop responding if an exception was thrown during node operations, such as appendChild(), insertBefore(), and moveNode().

See details >
OS Build 14393.2724

January 08, 2019
KB4480961
Resolved
KB4493470
April 09, 2019
10:00 AM PT
Embedded objects may display incorrectly
Any compound document (OLE) server application that places embedded objects into the Windows Metafile (WMF) using the PatBlt API may display embedded objects incorrectly.

See details >
OS Build 14393.2791

February 12, 2019
KB4487026
Resolved
KB4493470
April 09, 2019
10:00 AM PT
" @@ -81,6 +78,15 @@ sections:
" +- title: May 2019 +- items: + - type: markdown + text: " + + +
DetailsOriginating updateStatusHistory
Layout and cell size of Excel sheets may change when using MS UI Gothic
When using the MS UI Gothic or MS PGothic fonts, the text, layout, or cell size may become narrower or wider than expected in Microsoft Excel. For example, the layout and cell size of Microsoft Excel sheets may change when using MS UI Gothic.

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10, version 1607; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 10 Enterprise LTSB 2015; Windows 8.1; Windows 7 SP1 
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2; Windows Server 2012; Windows Server 2008 R2 SP1; Windows Server 2008 SP2 
Workaround: Until a resolution is released, we recommend switching to a different Japanese font, such as Yu Gothic or MS Mincho. Alternatively, you can uninstall the optional update.

Next steps: Microsoft is working on a resolution and estimates a solution will be available in mid-May.

Back to top
OS Build 14393.2931

April 25, 2019
KB4492241
Mitigated
Last updated:
May 10, 2019
10:35 AM PT

Opened:
May 10, 2019
10:35 AM PT
+ " + - title: April 2019 - items: - type: markdown @@ -98,16 +104,6 @@ sections:
Issue using PXE to start a device from WDS
After installing KB4489882, there may be issues using the Preboot Execution Environment (PXE) to start a device from a Windows Deployment Services (WDS) server configured to use Variable Window Extension. This may cause the connection to the WDS server to terminate prematurely while downloading the image. This issue does not affect clients or devices that are not using Variable Window Extension.

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1607; Windows 10 Enterprise LTSC 2016; Windows 8.1
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server 2016; Windows Server 2012 R2; Windows Server 2012
Workaround: To mitigate the issue, disable the Variable Window Extension on WDS server using one of the following options:

Option 1:
Open an Administrator Command prompt and type the following:
Wdsutil /Set-TransportServer /EnableTftpVariableWindowExtension:No
 

Option 2:
Use the Windows Deployment Services UI to make the following adjustment:
  1. Open Windows Deployment Services from Windows Administrative Tools.
  2. Expand Servers and right-click a WDS server.
  3. Open its properties and clear the Enable Variable Window Extension box on the TFTP tab.
Option 3:
Set the following registry value to 0:
HKLM\\System\\CurrentControlSet\\Services\\WDSServer\\Providers\\WDSTFTP\\EnableVariableWindowExtension

Restart the WDSServer service after disabling the Variable Window Extension.

Next steps: Microsoft is working on a resolution and will provide an update in an upcoming release.

Back to topOS Build 14393.2848

March 12, 2019
KB4489882Mitigated
Last updated:
April 25, 2019
02:00 PM PT

Opened:
March 12, 2019
10:00 AM PT
Custom URI schemes may not start corresponding application
After installing KB4489882, Custom URI schemes for application protocol handlers may not start the corresponding application for local intranet and trusted sites security zones on Internet Explorer.

Affected platforms: 
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10, version 1607; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 10 Enterprise LTSB 2015; Windows 8.1; Windows 7 SP1 
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2; Windows Server 2008 R2 SP1
Resolution: This issue is resolved in KB4493473

Back to topOS Build 14393.2848

March 12, 2019
KB4489882Resolved
KB4493473Resolved:
April 25, 2019
02:00 PM PT

Opened:
March 12, 2019
10:00 AM PT -
End-user-defined characters (EUDC) may cause blue screen at startup
If you enable per font end-user-defined characters (EUDC), the system will stop working and a blue screen may appear at startup. This is not a common setting in non-Asian regions.

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10, version 1607; Windows 10 Enterprise LTSC 2016
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016
Resolution: This issue was resolved in KB4493470.

Back to topOS Build 14393.2879

March 19, 2019
KB4489889Resolved
KB4493470Resolved:
April 09, 2019
10:00 AM PT

Opened:
March 19, 2019
10:00 AM PT - - " - -- title: February 2019 -- items: - - type: markdown - text: " - -
DetailsOriginating updateStatusHistory
Embedded objects may display incorrectly
Any compound document (OLE) server application that places embedded objects into the Windows Metafile (WMF) using the PatBlt API may display embedded objects incorrectly. 
 
For example, if you paste a Microsoft Excel worksheet object into a Microsoft Word document, the cells may render with a different background color. 
 
Affected platforms:  
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10, version 1607; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 10 Enterprise LTSB 2015; Windows 8.1; Windows 7 SP1 
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2; Windows Server 2012; Windows Server 2008 R2 SP1; Windows Server 2008 SP2 
Resolution: This issue is resolved in KB4493470

Back to top
OS Build 14393.2791

February 12, 2019
KB4487026
Resolved
KB4493470
Resolved:
April 09, 2019
10:00 AM PT

Opened:
February 12, 2019
10:00 AM PT
" @@ -117,8 +113,6 @@ sections: text: " - -
DetailsOriginating updateStatusHistory
Certain operations performed on a Cluster Shared Volume may fail
Certain operations, such as rename, that you perform on files or folders that are on a Cluster Shared Volume (CSV) may fail with the error, \"STATUS_BAD_IMPERSONATION_LEVEL (0xC00000A5)\". This occurs when you perform the operation on a CSV owner node from a process that doesn’t have administrator privilege. 

Affected platforms: 
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10, version 1607; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507;  Windows 10 Enterprise LTSB 2015; Windows 8.1
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2; Windows Server 2012
Workaround: Do one of the following:
  • Perform the operation from a process that has administrator privilege. 
  • Perform the operation from a node that doesn’t have CSV ownership.
Next steps: Microsoft is working on a resolution and will provide an update in an upcoming release.

Back to top
OS Build 14393.2724

January 08, 2019
KB4480961
Mitigated
Last updated:
April 25, 2019
02:00 PM PT

Opened:
January 08, 2019
10:00 AM PT
Internet Explorer 11 authentication issue with multiple concurrent logons
After installing KB4480961, Internet Explorer 11 and other applications that use WININET.DLL may have authentication issues. This occurs when two or more people use the same user account for multiple, concurrent login sessions on the same Windows Server machine, including Remote Desktop Protocol (RDP) and Terminal Server logons. Symptoms reported by customers include, but may not be limited to:
  • Cache size and location show zero or empty.
  • Keyboard shortcuts may not work properly.
  • Webpages may intermittently fail to load or render correctly.
  • Issues with credential prompts.
  • Issues when downloading files.
Affected platforms: 
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1607; Windows 10 Enterprise LTSC 2016; Windows 8.1; Windows 7 SP1
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server 2016; Windows Server 2012 R2; Windows Server 2012; Windows Server 2008 R2 SP1
Resolution: This issue was resolved in KB4493470.

Back to top
OS Build 14393.2724

January 08, 2019
KB4480961
Resolved
KB4493470
Resolved:
April 09, 2019
10:00 AM PT

Opened:
January 08, 2019
10:00 AM PT
MSXML6 may cause applications to stop responding
After installing KB4480961, MSXML6 causes applications to stop responding if an exception was thrown during node operations, such as appendChild(), insertBefore(), and moveNode().

The Group Policy editor may stop responding when editing a Group Policy Object (GPO) that contains Group Policy Preferences (GPP) for Internet Explorer 10 settings.

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10, version 1607; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 10 Enterprise LTSB 2015; Windows 8.1
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2; Windows Server 2012
Resolution: This issue was resolved in KB4493470.

Back to top
OS Build 14393.2724

January 08, 2019
KB4480961
Resolved
KB4493470
Resolved:
April 09, 2019
10:00 AM PT

Opened:
January 08, 2019
10:00 AM PT
" diff --git a/windows/release-information/status-windows-10-1703.yml b/windows/release-information/status-windows-10-1703.yml index 10d69d6cc5..c0cfa4ac36 100644 --- a/windows/release-information/status-windows-10-1703.yml +++ b/windows/release-information/status-windows-10-1703.yml @@ -60,11 +60,9 @@ sections: - type: markdown text: "
This table offers a summary of current active issues and those issues that have been resolved in the last 30 days.

+ - - -
SummaryOriginating updateStatusLast updated
Layout and cell size of Excel sheets may change when using MS UI Gothic
When using the MS UI Gothic or MS PGothic fonts, the text, layout, or cell size may become narrower or wider than expected in Microsoft Excel.

See details >
OS Build 15063.1771

April 25, 2019
KB4492242
Mitigated
May 10, 2019
10:35 AM PT
Certain operations performed on a Cluster Shared Volume may fail
Certain operations, such as rename, performed on files or folders on a Cluster Shared Volume (CSV) may fail with the error, \"STATUS_BAD_IMPERSONATION_LEVEL (0xC00000A5)\".

See details >
OS Build 15063.1563

January 08, 2019
KB4480973
Mitigated
April 25, 2019
02:00 PM PT
Custom URI schemes may not start corresponding application
Custom URI schemes for application protocol handlers may not start the corresponding application for local intranet and trusted sites in Internet Explorer.

See details >
OS Build 15063.1689

March 12, 2019
KB4489871
Resolved
KB4493436
April 25, 2019
02:00 PM PT
End-user-defined characters (EUDC) may cause blue screen at startup
If you enable per font end-user-defined characters (EUDC), the system may stop working and a blue screen may appear at startup.

See details >
OS Build 15063.1716

March 19, 2019
KB4489888
Resolved
KB4493474
April 09, 2019
10:00 AM PT
MSXML6 may cause applications to stop responding
MSXML6 may cause applications to stop responding if an exception was thrown during node operations, such as appendChild(), insertBefore(), and moveNode().

See details >
OS Build 15063.1563

January 08, 2019
KB4480973
Resolved
KB4493474
April 09, 2019
10:00 AM PT
Embedded objects may display incorrectly
Any compound document (OLE) server application that places embedded objects into the Windows Metafile (WMF) using the PatBlt API may display embedded objects incorrectly.

See details >
OS Build 15063.1631

February 12, 2019
KB4487020
Resolved
KB4493474
April 09, 2019
10:00 AM PT
" @@ -75,22 +73,21 @@ sections:
" +- title: May 2019 +- items: + - type: markdown + text: " + + +
DetailsOriginating updateStatusHistory
Layout and cell size of Excel sheets may change when using MS UI Gothic
When using the MS UI Gothic or MS PGothic fonts, the text, layout, or cell size may become narrower or wider than expected in Microsoft Excel. For example, the layout and cell size of Microsoft Excel sheets may change when using MS UI Gothic.

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10, version 1607; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 10 Enterprise LTSB 2015; Windows 8.1; Windows 7 SP1 
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2; Windows Server 2012; Windows Server 2008 R2 SP1; Windows Server 2008 SP2 
Workaround: Until a resolution is released, we recommend switching to a different Japanese font, such as Yu Gothic or MS Mincho. Alternatively, you can uninstall the optional update.

Next steps: Microsoft is working on a resolution and estimates a solution will be available in mid-May.

Back to top
OS Build 15063.1771

April 25, 2019
KB4492242
Mitigated
Last updated:
May 10, 2019
10:35 AM PT

Opened:
May 10, 2019
10:35 AM PT
+ " + - title: March 2019 - items: - type: markdown text: " - -
DetailsOriginating updateStatusHistory
Custom URI schemes may not start corresponding application
After installing KB4489871, custom URI schemes for application protocol handlers may not start the corresponding application for local intranet and trusted sites security zones on Internet Explorer.

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10, version 1607; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 10 Enterprise LTSB 2015; Windows 8.1; Windows 7 SP1 
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2; Windows Server 2008 R2 SP1
Resolution: This issue is resolved in KB4493436

Back to top
OS Build 15063.1689

March 12, 2019
KB4489871
Resolved
KB4493436
Resolved:
April 25, 2019
02:00 PM PT

Opened:
March 12, 2019
10:00 AM PT
End-user-defined characters (EUDC) may cause blue screen at startup
If you enable per font end-user-defined characters (EUDC), the system may stop working and a blue screen may appear at startup. This is not a common setting in non-Asian regions.

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10, version 1607; Windows 10 Enterprise LTSC 2016
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016
Resolution: This issue was resolved in KB4493474.

Back to top
OS Build 15063.1716

March 19, 2019
KB4489888
Resolved
KB4493474
Resolved:
April 09, 2019
10:00 AM PT

Opened:
March 19, 2019
10:00 AM PT
- " - -- title: February 2019 -- items: - - type: markdown - text: " - -
DetailsOriginating updateStatusHistory
Embedded objects may display incorrectly
Any compound document (OLE) server application that places embedded objects into the Windows Metafile (WMF) using the PatBlt API may display embedded objects incorrectly. 
 
For example, if you paste a Microsoft Excel worksheet object into a Microsoft Word document, the cells may render with a different background color. 
 
Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10, version 1607; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 10 Enterprise LTSB 2015; Windows 8.1; Windows 7 SP1 
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2; Windows Server 2012; Windows Server 2008 R2 SP1; Windows Server 2008 SP2 
Resolution: This issue is resolved in KB4493474

Back to top
OS Build 15063.1631

February 12, 2019
KB4487020
Resolved
KB4493474
Resolved:
April 09, 2019
10:00 AM PT

Opened:
February 12, 2019
10:00 AM PT
" @@ -100,6 +97,5 @@ sections: text: " -
DetailsOriginating updateStatusHistory
Certain operations performed on a Cluster Shared Volume may fail
Certain operations, such as rename, that you perform on files or folders that are on a Cluster Shared Volume (CSV) may fail with the error, “STATUS_BAD_IMPERSONATION_LEVEL (0xC00000A5)”. This occurs when you perform the operation on a CSV owner node from a process that doesn’t have administrator privilege. 

Affected platforms: 
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10, version 1607; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 10 Enterprise LTSB 2015; Windows 8.1
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2; Windows Server 2012
Workaround: Do one of the following: 
  • Perform the operation from a process that has administrator privilege. 
  • Perform the operation from a node that doesn’t have CSV ownership. 
Next steps: Microsoft is working on a resolution and will provide an update in an upcoming release.

Back to top
OS Build 15063.1563

January 08, 2019
KB4480973
Mitigated
Last updated:
April 25, 2019
02:00 PM PT

Opened:
January 08, 2019
10:00 AM PT
MSXML6 may cause applications to stop responding
After installing KB4480973, MSXML6 causes applications to stop responding if an exception was thrown during node operations, such as appendChild(), insertBefore(), and moveNode().

The Group Policy editor may stop responding when editing a Group Policy Object (GPO) that contains Group Policy Preferences (GPP) for Internet Explorer 10 settings.

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10, version 1607; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 10 Enterprise LTSB 2015; Windows 8.1
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2; Windows Server 2012
Resolution: This issue was resolved in KB4493474.

Back to top
OS Build 15063.1563

January 08, 2019
KB4480973
Resolved
KB4493474
Resolved:
April 09, 2019
10:00 AM PT

Opened:
January 08, 2019
10:00 AM PT
" diff --git a/windows/release-information/status-windows-10-1709.yml b/windows/release-information/status-windows-10-1709.yml index abdaf311b0..2618d42ebf 100644 --- a/windows/release-information/status-windows-10-1709.yml +++ b/windows/release-information/status-windows-10-1709.yml @@ -61,12 +61,9 @@ sections: text: "
This table offers a summary of current active issues and those issues that have been resolved in the last 30 days.

+ - - - -
SummaryOriginating updateStatusLast updated
Zone transfers over TCP may fail
Zone transfers between primary and secondary DNS servers over the Transmission Control Protocol (TCP) may fail.

See details >
OS Build 16299.1127

April 25, 2019
KB4493440
Investigating
April 25, 2019
02:00 PM PT
Layout and cell size of Excel sheets may change when using MS UI Gothic
When using the MS UI Gothic or MS PGothic fonts, the text, layout, or cell size may become narrower or wider than expected in Microsoft Excel.

See details >
OS Build 16299.1111

April 25, 2019
KB4492243
Mitigated
May 10, 2019
10:35 AM PT
Certain operations performed on a Cluster Shared Volume may fail
Certain operations, such as rename, performed on files or folders on a Cluster Shared Volume (CSV) may fail with the error, \"STATUS_BAD_IMPERSONATION_LEVEL (0xC00000A5)\".

See details >
OS Build 16299.904

January 08, 2019
KB4480978
Mitigated
April 25, 2019
02:00 PM PT
Custom URI schemes may not start corresponding application
Custom URI schemes for application protocol handlers may not start the corresponding application for local intranet and trusted sites in Internet Explorer.

See details >
OS Build 16299.1029

March 12, 2019
KB4489886
Resolved
KB4493440
April 25, 2019
02:00 PM PT
End-user-defined characters (EUDC) may cause blue screen at startup
If you enable per font end-user-defined characters (EUDC), the system may stop working and a blue screen may appear at startup.

See details >
OS Build 16299.1059

March 19, 2019
KB4489890
Resolved
KB4493441
April 09, 2019
10:00 AM PT
MSXML6 causes applications to stop responding if an exception was thrown
MSXML6 causes applications to stop responding if an exception was thrown during node operations, such as appendChild(), insertBefore(), and moveNode().

See details >
OS Build 16299.904

January 08, 2019
KB4480978
Resolved
KB4493441
April 09, 2019
10:00 AM PT
Stop error when attempting to start SSH from WSL
A stop error occurs when attempting to start Secure Shell from Windows Subsystem for Linux with agent forwarding using a command line switch (ssh –A) or a configuration setting.

See details >
OS Build 16299.1029

March 12, 2019
KB4489886
Resolved
KB4493441
April 09, 2019
10:00 AM PT
Embedded objects may display incorrectly
Any compound document (OLE) server application that places embedded objects into the Windows Metafile (WMF) using the PatBlt API may display embedded objects incorrectly.

See details >
OS Build 16299.967

February 12, 2019
KB4486996
Resolved
KB4493441
April 09, 2019
10:00 AM PT
" @@ -77,6 +74,15 @@ sections:
" +- title: May 2019 +- items: + - type: markdown + text: " + + +
DetailsOriginating updateStatusHistory
Layout and cell size of Excel sheets may change when using MS UI Gothic
When using the MS UI Gothic or MS PGothic fonts, the text, layout, or cell size may become narrower or wider than expected in Microsoft Excel. For example, the layout and cell size of Microsoft Excel sheets may change when using MS UI Gothic.

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10, version 1607; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 10 Enterprise LTSB 2015; Windows 8.1; Windows 7 SP1 
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2; Windows Server 2012; Windows Server 2008 R2 SP1; Windows Server 2008 SP2 
Workaround: Until a resolution is released, we recommend switching to a different Japanese font, such as Yu Gothic or MS Mincho. Alternatively, you can uninstall the optional update.

Next steps: Microsoft is working on a resolution and estimates a solution will be available in mid-May.

Back to top
OS Build 16299.1111

April 25, 2019
KB4492243
Mitigated
Last updated:
May 10, 2019
10:35 AM PT

Opened:
May 10, 2019
10:35 AM PT
+ " + - title: April 2019 - items: - type: markdown @@ -92,17 +98,6 @@ sections: text: " - - -
DetailsOriginating updateStatusHistory
Custom URI schemes may not start corresponding application
After installing KB4489886, custom URI schemes for application protocol handlers may not start the corresponding application for local intranet and trusted sites security zones on Internet Explorer.

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10, version 1607; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 10 Enterprise LTSB 2015; Windows 8.1; Windows 7 SP1 
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2; Windows Server 2008 R2 SP1
Resolution: This issue is resolved in KB4493440

Back to top
OS Build 16299.1029

March 12, 2019
KB4489886
Resolved
KB4493440
Resolved:
April 25, 2019
02:00 PM PT

Opened:
March 12, 2019
10:00 AM PT
End-user-defined characters (EUDC) may cause blue screen at startup
If you enable per font end-user-defined characters (EUDC), the system may stop working and a blue screen may appear at startup. This is not a common setting in non-Asian regions.

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10, version 1607; Windows 10 Enterprise LTSC 2016
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016
Resolution: This issue is resolved in KB4493441.

Back to top
OS Build 16299.1059

March 19, 2019
KB4489890
Resolved
KB4493441
Resolved:
April 09, 2019
10:00 AM PT

Opened:
March 19, 2019
10:00 AM PT
Stop error when attempting to start SSH from WSL
After applying KB4489886, a stop error occurs when attempting to start the Secure Shell (SSH) client program from Windows Subsystem for Linux (WSL) with agent forwarding enabled using a command line switch (ssh –A) or a configuration setting.

Affected platforms:
  • Client: Windows 10, version 1803; Windows 10, version 1709
  • Server: Windows Server, version 1803; Windows Server, version 1709
Resolution: This issue is resolved in KB4493441.

Back to top
OS Build 16299.1029

March 12, 2019
KB4489886
Resolved
KB4493441
Resolved:
April 09, 2019
10:00 AM PT

Opened:
March 12, 2019
10:00 AM PT
- " - -- title: February 2019 -- items: - - type: markdown - text: " - -
DetailsOriginating updateStatusHistory
Embedded objects may display incorrectly
Any compound document (OLE) server application that places embedded objects into the Windows Metafile (WMF) using the PatBlt API may display embedded objects incorrectly. 
 
For example, if you paste a Microsoft Excel worksheet object into a Microsoft Word document, the cells may render with a different background color. 
 
Affected platforms:  
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10, version 1607; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 10 Enterprise LTSB 2015; Windows 8.1; Windows 7 SP1 
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2; Windows Server 2012; Windows Server 2008 R2 SP1; Windows Server 2008 SP2 
Resolution: This issue is resolved in KB4493441

Back to top
OS Build 16299.967

February 12, 2019
KB4486996
Resolved
KB4493441
Resolved:
April 09, 2019
10:00 AM PT

Opened:
February 12, 2019
10:00 AM PT
" @@ -112,6 +107,5 @@ sections: text: " -
DetailsOriginating updateStatusHistory
Certain operations performed on a Cluster Shared Volume may fail
Certain operations, such as rename, that you perform on files or folders that are on a Cluster Shared Volume (CSV) may fail with the error, \"STATUS_BAD_IMPERSONATION_LEVEL (0xC00000A5)\". This occurs when you perform the operation on a CSV owner node from a process that doesn’t have administrator privilege. 

Affected platforms: 
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10, version 1607; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 10 Enterprise LTSB 2015; Windows 8.1
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2; Windows Server 2012
Workaround: Do one of the following:
  • Perform the operation from a process that has administrator privilege. 
  • Perform the operation from a node that doesn’t have CSV ownership. 
Next steps: Microsoft is working on a resolution and will provide an update in an upcoming release.

Back to top
OS Build 16299.904

January 08, 2019
KB4480978
Mitigated
Last updated:
April 25, 2019
02:00 PM PT

Opened:
January 08, 2019
10:00 AM PT
MSXML6 causes applications to stop responding if an exception was thrown
After installing KB4480978, MSXML6 causes applications to stop responding if an exception was thrown during node operations, such as appendChild(), insertBefore(), and moveNode().

The Group Policy editor may stop responding when editing a Group Policy Object (GPO) that contains Group Policy Preferences (GPP) for Internet Explorer 10 settings.

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10, version 1607; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 10 Enterprise LTSB 2015; Windows 8.1
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2; Windows Server 2012
Resolution: This issue is resolved in KB4493441.

Back to top
OS Build 16299.904

January 08, 2019
KB4480978
Resolved
KB4493441
Resolved:
April 09, 2019
10:00 AM PT

Opened:
January 08, 2019
10:00 AM PT
" diff --git a/windows/release-information/status-windows-10-1803.yml b/windows/release-information/status-windows-10-1803.yml index 3e58d9c048..9fea9cbeb3 100644 --- a/windows/release-information/status-windows-10-1803.yml +++ b/windows/release-information/status-windows-10-1803.yml @@ -61,14 +61,10 @@ sections: text: "
This table offers a summary of current active issues and those issues that have been resolved in the last 30 days.

+ - - - - -
SummaryOriginating updateStatusLast updated
Zone transfers over TCP may fail
Zone transfers between primary and secondary DNS servers over the Transmission Control Protocol (TCP) may fail.

See details >
OS Build 17134.753

April 25, 2019
KB4493437
Investigating
April 25, 2019
02:00 PM PT
Layout and cell size of Excel sheets may change when using MS UI Gothic
When using the MS UI Gothic or MS PGothic fonts, the text, layout, or cell size may become narrower or wider than expected in Microsoft Excel.

See details >
OS Build 17134.730

April 25, 2019
KB4492245
Mitigated
May 10, 2019
10:35 AM PT
Issue using PXE to start a device from WDS
Using PXE to start a device from a WDS server configured to use Variable Window Extension may cause the connection to the WDS server to terminate prematurely.

See details >
OS Build 17134.648

March 12, 2019
KB4489868
Mitigated
April 25, 2019
02:00 PM PT
Certain operations performed on a Cluster Shared Volume may fail
Certain operations, such as rename, performed on files or folders on a Cluster Shared Volume (CSV) may fail with the error, \"STATUS_BAD_IMPERSONATION_LEVEL (0xC00000A5)\".

See details >
OS Build 17134.523

January 08, 2019
KB4480966
Mitigated
April 25, 2019
02:00 PM PT
Custom URI schemes may not start corresponding application
Custom URI schemes for application protocol handlers may not start the corresponding application for local intranet and trusted sites in Internet Explorer.

See details >
OS Build 17134.648

March 12, 2019
KB4489868
Resolved
KB4493437
April 25, 2019
02:00 PM PT
End-user-defined characters (EUDC) may cause blue screen at startup
If you enable per font end-user-defined characters (EUDC), the system may stop working and a blue screen may appear at startup.

See details >
OS Build 17134.677

March 19, 2019
KB4489894
Resolved
KB4493464
April 09, 2019
10:00 AM PT
First character of the Japanese era name not recognized
The first character of the Japanese era name is not recognized as an abbreviation and may cause date parsing issues.

See details >
OS Build 17134.556

January 15, 2019
KB4480976
Resolved
KB4487029
April 09, 2019
10:00 AM PT
MSXML6 may cause applications to stop responding
MSXML6 may cause applications to stop responding if an exception was thrown during node operations, such as appendChild(), insertBefore(), and moveNode().

See details >
OS Build 17134.523

January 08, 2019
KB4480966
Resolved
KB4493464
April 09, 2019
10:00 AM PT
Stop error when attempting to start SSH from WSL
A stop error occurs when attempting to start Secure Shell from Windows Subsystem for Linux with agent forwarding using a command line switch (ssh –A) or a configuration setting.

See details >
OS Build 17134.648

March 12, 2019
KB4489868
Resolved
KB4493464
April 09, 2019
10:00 AM PT
Embedded objects may display incorrectly
Any compound document (OLE) server application that places embedded objects into the Windows Metafile (WMF) using the PatBlt API may display embedded objects incorrectly.

See details >
OS Build 17134.590

February 12, 2019
KB4487017
Resolved
KB4493464
April 09, 2019
10:00 AM PT
" @@ -79,6 +75,15 @@ sections:
" +- title: May 2019 +- items: + - type: markdown + text: " + + +
DetailsOriginating updateStatusHistory
Layout and cell size of Excel sheets may change when using MS UI Gothic
When using the MS UI Gothic or MS PGothic fonts, the text, layout, or cell size may become narrower or wider than expected in Microsoft Excel. For example, the layout and cell size of Microsoft Excel sheets may change when using MS UI Gothic.

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10, version 1607; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 10 Enterprise LTSB 2015; Windows 8.1; Windows 7 SP1 
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2; Windows Server 2012; Windows Server 2008 R2 SP1; Windows Server 2008 SP2 
Workaround: Until a resolution is released, we recommend switching to a different Japanese font, such as Yu Gothic or MS Mincho. Alternatively, you can uninstall the optional update.

Next steps: Microsoft is working on a resolution and estimates a solution will be available in mid-May.

Back to top
OS Build 17134.730

April 25, 2019
KB4492245
Mitigated
Last updated:
May 10, 2019
10:35 AM PT

Opened:
May 10, 2019
10:35 AM PT
+ " + - title: April 2019 - items: - type: markdown @@ -96,17 +101,6 @@ sections:
Issue using PXE to start a device from WDS
After installing KB4489868, there may be issues using the Preboot Execution Environment (PXE) to start a device from a Windows Deployment Services (WDS) server configured to use Variable Window Extension. This may cause the connection to the WDS server to terminate prematurely while downloading the image. This issue does not affect clients or devices that are not using Variable Window Extension. 

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1607; Windows 10 Enterprise LTSC 2016; Windows 8.1
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server 2016; Windows Server 2012 R2; Windows Server 2012
Workaround: To mitigate the issue, disable the Variable Window Extension on WDS server using one of the following options:

Option 1: 
Open an Administrator Command prompt and type the following:  
Wdsutil /Set-TransportServer /EnableTftpVariableWindowExtension:No
 

 Option 2: 
Use the Windows Deployment Services UI to make the following adjustment:  
  1. Open Windows Deployment Services from Windows Administrative Tools. 
  2. Expand Servers and right-click a WDS server. 
  3. Open its properties and clear the Enable Variable Window Extension box on the TFTP tab.  
Option 3: 
Set the following registry value to 0:
HKLM\\System\\CurrentControlSet\\Services\\WDSServer\\Providers\\WDSTFTP\\EnableVariableWindowExtension  

Restart the WDSServer service after disabling the Variable Window Extension. 
 
Next steps: Microsoft is working on a resolution and will provide an update in an upcoming release. 

Back to topOS Build 17134.648

March 12, 2019
KB4489868Mitigated
Last updated:
April 25, 2019
02:00 PM PT

Opened:
March 12, 2019
10:00 AM PT
Custom URI schemes may not start corresponding application
After installing KB4489868, custom URI schemes for application protocol handlers may not start the corresponding application for local intranet and trusted sites security zones on Internet Explorer. 

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10, version 1607; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 10 Enterprise LTSB 2015; Windows 8.1; Windows 7 SP1 
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2; Windows Server 2008 R2 SP1
Resolution: This issue is resolved in KB4493437

Back to topOS Build 17134.648

March 12, 2019
KB4489868Resolved
KB4493437Resolved:
April 25, 2019
02:00 PM PT

Opened:
March 12, 2019
10:00 AM PT -
End-user-defined characters (EUDC) may cause blue screen at startup
If you enable per font end-user-defined characters (EUDC), the system may stop working and a blue screen may appear at startup. This is not a common setting in non-Asian regions. 

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10, version 1607; Windows 10 Enterprise LTSC 2016
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016
Resolution: This issue was resolved in KB4493464

Back to topOS Build 17134.677

March 19, 2019
KB4489894Resolved
KB4493464Resolved:
April 09, 2019
10:00 AM PT

Opened:
March 19, 2019
10:00 AM PT -
Stop error when attempting to start SSH from WSL
After applying KB4489868, a stop error occurs when attempting to start the Secure Shell (SSH) client program from Windows Subsystem for Linux (WSL) with agent forwarding enabled using a command line switch (ssh -A) or a configuration setting.

Affected platforms:
  • Client: Windows 10, version 1803; Windows 10, version 1709
  • Server: Windows Server, version 1803; Windows Server, version 1709
Resolution: This issue was resolved in KB4493464.

Back to topOS Build 17134.648

March 12, 2019
KB4489868Resolved
KB4493464Resolved:
April 09, 2019
10:00 AM PT

Opened:
March 12, 2019
10:00 AM PT - - " - -- title: February 2019 -- items: - - type: markdown - text: " - -
DetailsOriginating updateStatusHistory
Embedded objects may display incorrectly
Any compound document (OLE) server application that places embedded objects into the Windows Metafile (WMF) using the PatBlt API may display embedded objects incorrectly. 
 
For example, if you paste a Microsoft Excel worksheet object into a Microsoft Word document, the cells may render with a different background color. 
 
Affected platforms:  
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10, version 1607; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 10 Enterprise LTSB 2015; Windows 8.1; Windows 7 SP1 
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2; Windows Server 2012; Windows Server 2008 R2 SP1; Windows Server 2008 SP2 
Resolution: This issue is resolved in KB4493464

Back to top
OS Build 17134.590

February 12, 2019
KB4487017
Resolved
KB4493464
Resolved:
April 09, 2019
10:00 AM PT

Opened:
February 12, 2019
10:00 AM PT
" @@ -116,7 +110,5 @@ sections: text: " - -
DetailsOriginating updateStatusHistory
Certain operations performed on a Cluster Shared Volume may fail
Certain operations, such as rename, that you perform on files or folders that are on a Cluster Shared Volume (CSV) may fail with the error, \"STATUS_BAD_IMPERSONATION_LEVEL (0xC00000A5)\". This occurs when you perform the operation on a CSV owner node from a process that doesn’t have administrator privilege.

Affected platforms: 
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10, version 1607; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 10 Enterprise LTSB 2015; Windows 8.1
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2; Windows Server 2012
Workaround: Do one of the following:
  • Perform the operation from a process that has administrator privilege. 
  • Perform the operation from a node that doesn’t have CSV ownership. 
Next steps: Microsoft is working on a resolution and will provide an update in an upcoming release.

Back to top
OS Build 17134.523

January 08, 2019
KB4480966
Mitigated
Last updated:
April 25, 2019
02:00 PM PT

Opened:
January 08, 2019
10:00 AM PT
First character of the Japanese era name not recognized
After installing KB4480976, the first character of the Japanese era name is not recognized as an abbreviation and may cause date parsing issues.

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10, version 1607; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 10 Enterprise LTSB 2015; Windows 8.1; Windows 7 SP1
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2; Windows Server 2012; Windows Server 2008 R2 SP1; Windows Server 2008 SP2
Resolution: This issue is resolved in KB4487029

Back to top
OS Build 17134.556

January 15, 2019
KB4480976
Resolved
KB4487029
Resolved:
February 19, 2019
02:00 PM PT

Opened:
January 08, 2019
10:00 AM PT
MSXML6 may cause applications to stop responding
After installing KB4480966, MSXML6 causes applications to stop responding if an exception was thrown during node operations, such as appendChild(), insertBefore(), and moveNode().

The Group Policy editor may stop responding when editing a Group Policy Object (GPO) that contains Group Policy Preferences (GPP) for Internet Explorer 10 settings.

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10, version 1607; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 10 Enterprise LTSB 2015; Windows 8.1
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2; Windows Server 2012
Resolution: This issue was resolved in KB4493464

Back to top
OS Build 17134.523

January 08, 2019
KB4480966
Resolved
KB4493464
Resolved:
April 09, 2019
10:00 AM PT

Opened:
January 08, 2019
10:00 AM PT
" diff --git a/windows/release-information/status-windows-10-1809-and-windows-server-2019.yml b/windows/release-information/status-windows-10-1809-and-windows-server-2019.yml index 2b50998415..afb53b80c9 100644 --- a/windows/release-information/status-windows-10-1809-and-windows-server-2019.yml +++ b/windows/release-information/status-windows-10-1809-and-windows-server-2019.yml @@ -65,6 +65,7 @@ sections: - type: markdown text: "
This table offers a summary of current active issues and those issues that have been resolved in the last 30 days.

+ @@ -73,10 +74,6 @@ sections: - - - -
SummaryOriginating updateStatusLast updated
Layout and cell size of Excel sheets may change when using MS UI Gothic
When using the MS UI Gothic or MS PGothic fonts, the text, layout, or cell size may become narrower or wider than expected in Microsoft Excel.

See details >
OS Build 17763.475

May 03, 2019
KB4495667
Mitigated
May 10, 2019
10:35 AM PT
Devices with some Asian language packs installed may receive an error
After installing the KB4493509 devices with some Asian language packs installed may receive the error, \"0x800f0982 - PSFX_E_MATCHING_COMPONENT_NOT_F

See details >
OS Build 17763.437

April 09, 2019
KB4493509
Mitigated
May 03, 2019
10:59 AM PT
Printing from Microsoft Edge or other UWP apps, you may receive the error 0x80070007
Attempting to print from Microsoft Edge or other Universal Windows Platform (UWP) applications, you may receive an error.

See details >
OS Build 17763.379

March 12, 2019
KB4489899
Mitigated
May 02, 2019
04:47 PM PT
Issue using PXE to start a device from WDS
Using PXE to start a device from a WDS server configured to use Variable Window Extension may cause the connection to the WDS server to terminate prematurely.

See details >
OS Build 17763.379

March 12, 2019
KB4489899
Mitigated
April 09, 2019
10:00 AM PT
Latest cumulative update (KB 4495667) installs automatically
Reports that the optional cumulative update (KB 4495667) installs automatically.

See details >
OS Build 17763.475

May 03, 2019
KB4495667
Resolved
May 08, 2019
03:37 PM PT
System may be unresponsive after restart if ArcaBit antivirus software installed
After further investigation ArcaBit has confirmed this issue is not applicable to Windows 10, version 1809

See details >
OS Build 17763.437

April 09, 2019
KB4493509
Resolved
May 08, 2019
03:30 PM PT
Custom URI schemes may not start corresponding application
Custom URI schemes for application protocol handlers may not start the corresponding application for local intranet and trusted sites in Internet Explorer.

See details >
OS Build 17763.379

March 12, 2019
KB4489899
Resolved
KB4495667
May 03, 2019
12:40 PM PT
End-user-defined characters (EUDC) may cause blue screen at startup
If you enable per font end-user-defined characters (EUDC), the system may stop working and a blue screen may appear at startup.

See details >
OS Build 17763.404

April 02, 2019
KB4490481
Resolved
KB4493509
April 09, 2019
10:00 AM PT
Internet Explorer 11 authentication issue with multiple concurrent logons
Internet Explorer 11 users may encounter issues if two or more people use the same user account for multiple, concurrent login sessions on the same Windows Server machine.

See details >
OS Build 17763.253

January 08, 2019
KB4480116
Resolved
KB4493509
April 09, 2019
10:00 AM PT
MSXML6 may cause applications to stop responding
MSXML6 may cause applications to stop responding if an exception was thrown during node operations, such as appendChild(), insertBefore(), and moveNode().

See details >
OS Build 17763.253

January 08, 2019
KB4480116
Resolved
KB4493509
April 09, 2019
10:00 AM PT
Embedded objects may display incorrectly
Any compound document (OLE) server application that places embedded objects into the Windows Metafile (WMF) using the PatBlt API may display embedded objects incorrectly.

See details >
OS Build 17763.316

February 12, 2019
KB4487044
Resolved
KB4493509
April 09, 2019
10:00 AM PT
" @@ -92,6 +89,7 @@ sections: - type: markdown text: " + @@ -104,7 +102,6 @@ sections: text: "
DetailsOriginating updateStatusHistory
Layout and cell size of Excel sheets may change when using MS UI Gothic
When using the MS UI Gothic or MS PGothic fonts, the text, layout, or cell size may become narrower or wider than expected in Microsoft Excel. For example, the layout and cell size of Microsoft Excel sheets may change when using MS UI Gothic.

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10, version 1607; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 10 Enterprise LTSB 2015; Windows 8.1; Windows 7 SP1 
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2; Windows Server 2012; Windows Server 2008 R2 SP1; Windows Server 2008 SP2 
Workaround: Until a resolution is released, we recommend switching to a different Japanese font, such as Yu Gothic or MS Mincho. Alternatively, you can uninstall the optional update.

Next steps: Microsoft is working on a resolution and estimates a solution will be available in mid-May.

Back to top
OS Build 17763.475

May 03, 2019
KB4495667
Mitigated
Last updated:
May 10, 2019
10:35 AM PT

Opened:
May 10, 2019
10:35 AM PT
Devices with some Asian language packs installed may receive an error
After installing the April 2019 Cumulative Update (KB4493509), devices with some Asian language packs installed may receive the error, \"0x800f0982 - PSFX_E_MATCHING_COMPONENT_NOT_FOUND.\"

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019
  • Server: Windows Server, version 1809; Windows Server 2019
Workaround:
  1. Uninstall and reinstall any recently added language packs. For instructions, see \"Manage the input and display language settings in Windows 10\".
  2. Click Check for Updates and install the April 2019 Cumulative Update. For instructions, see \"Update Windows 10\".
Note: If reinstalling the language pack does not mitigate the issue, reset your PC as follows:
  1. Go to Settings app -> Recovery.
  2. Click on Get Started under \"Reset this PC\" recovery option.
  3. Select \"Keep my Files\".
Next steps: Microsoft is working on a resolution and will provide an update in an upcoming release.

Back to top
OS Build 17763.437

April 09, 2019
KB4493509
Mitigated
Last updated:
May 03, 2019
10:59 AM PT

Opened:
May 02, 2019
04:36 PM PT
Printing from Microsoft Edge or other UWP apps, you may receive the error 0x80070007
When attempting to print from Microsoft Edge or other Universal Windows Platform (UWP) applications you may receive the error, \"Your printer has experienced an unexpected configuration problem. 0x80070007e.\"
 
Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019
  • Server: Windows Server, version 1809; Windows Server 2019
Workaround: You can use another browser, such as Internet Explorer to print your documents.
 
Next steps: Microsoft is working on a resolution and will provide an update in an upcoming release.

Back to top
OS Build 17763.379

March 12, 2019
KB4489899
Mitigated
Last updated:
May 02, 2019
04:47 PM PT

Opened:
May 02, 2019
04:47 PM PT
Latest cumulative update (KB 4495667) installs automatically
Due to a servicing side issue some users were offered KB4495667 (optional update) automatically and rebooted devices. This issue has been mitigated.

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019
  • Server: Windows Server, version 1809; Windows Server 2019
Resolution:: This issue has been mitigated on the servicing side to prevent auto installing of this update. Customers do not need to take any action.

Back to top
OS Build 17763.475

May 03, 2019
KB4495667
Resolved
Resolved:
May 08, 2019
03:37 PM PT

Opened:
May 05, 2019
12:01 PM PT
-
DetailsOriginating updateStatusHistory
System may be unresponsive after restart if ArcaBit antivirus software installed
ArcaBit has confirmed this issue is not applicable to Windows 10, version 1809 (client or server).

Microsoft and ArcaBit have identified an issue on devices with ArcaBit antivirus software installed that may cause the system to become unresponsive upon restart.

Affected platforms:
  • Client: Windows 8.1; Windows 7 SP1
  • Server: Windows Server 2012 R2; Windows Server 2008 R2 SP1
Workaround: ArcaBit has released an update to address this issue for affected platforms. For more information, see the ArcaBit support article.

Resolution: This issue has been resolved. ArcaBit has confirmed this issue is not applicable to Windows 10, version 1809 (client or server).

Back to top
OS Build 17763.437

April 09, 2019
KB4493509
Resolved
Resolved:
May 08, 2019
03:30 PM PT

Opened:
April 09, 2019
10:00 AM PT
End-user-defined characters (EUDC) may cause blue screen at startup
If you enable per font end-user-defined characters (EUDC), the system will stop working and a blue screen may appear at startup. This is not a common setting in non-Asian regions.

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10, version 1607; Windows 10 Enterprise LTSC 2016
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016
Resolution: This issue was resolved in KB4493509.

Back to top
OS Build 17763.404

April 02, 2019
KB4490481
Resolved
KB4493509
Resolved:
April 09, 2019
10:00 AM PT

Opened:
April 02, 2019
10:00 AM PT
" @@ -119,23 +116,12 @@ sections: " -- title: February 2019 -- items: - - type: markdown - text: " - - -
DetailsOriginating updateStatusHistory
Embedded objects may display incorrectly
Any compound document (OLE) server application that places embedded objects into the Windows Metafile (WMF) using the PatBlt API may display embedded objects incorrectly. 
 
For example, if you paste a Microsoft Excel worksheet object into a Microsoft Word document, the cells may render with a different background color. 
 
Affected platforms:  
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10, version 1607; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 10 Enterprise LTSB 2015; Windows 8.1; Windows 7 SP1  
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2; Windows Server 2012; Windows Server 2008 R2 SP1; Windows Server 2008 SP2  
Resolution: This issue is resolved in KB4493509.  

Back to top
OS Build 17763.316

February 12, 2019
KB4487044
Resolved
KB4493509
Resolved:
April 09, 2019
10:00 AM PT

Opened:
February 12, 2019
10:00 AM PT
- " - - title: January 2019 - items: - type: markdown text: " - -
DetailsOriginating updateStatusHistory
Certain operations performed on a Cluster Shared Volume may fail
Certain operations, such as rename, that you perform on files or folders that are on a Cluster Shared Volume (CSV) may fail with the error, \"STATUS_BAD_IMPERSONATION_LEVEL (0xC00000A5)\". This occurs when you perform the operation on a CSV owner node from a process that doesn’t have administrator privilege. 

Affected platforms: 
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10, version 1607; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 10 Enterprise LTSB 2015; Windows 8.1
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2; Windows Server 2012
Workaround: Do one of the following:  
  • Perform the operation from a process that has administrator privilege. 
  • Perform the operation from a node that doesn’t have CSV ownership. 
Next steps: Microsoft is working on a resolution and will provide an update in an upcoming release.

Back to top
OS Build 17763.253

January 08, 2019
KB4480116
Mitigated
Last updated:
April 09, 2019
10:00 AM PT

Opened:
January 08, 2019
10:00 AM PT
Internet Explorer 11 authentication issue with multiple concurrent logons
After installing KB4480116, Internet Explorer 11 and other applications that use WININET.DLL may have authentication issues. This occurs when two or more people use the same user account for multiple, concurrent login sessions on the same Windows Server machine, including Remote Desktop Protocol (RDP) and Terminal Server logons. Symptoms reported by customers include, but may not be limited to: 
  • Cache size and location show zero or empty. 
  • Keyboard shortcuts may not work properly. 
  • Webpages may intermittently fail to load or render correctly. 
  • Issues with credential prompts. 
  • Issues when downloading files. 
Affected platforms: 
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1607; Windows 10 Enterprise LTSC 2016; Windows 8.1; Windows 7 SP1
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server 2016; Windows Server 2012 R2; Windows Server 2012; Windows Server 2008 R2 SP1
Resolution: This issue was resolved in KB4493509

Back to top
OS Build 17763.253

January 08, 2019
KB4480116
Resolved
KB4493509
Resolved:
April 09, 2019
10:00 AM PT

Opened:
January 08, 2019
10:00 AM PT
MSXML6 may cause applications to stop responding
After installing KB4480116, MSXML6 causes applications to stop responding if an exception was thrown during node operations, such as appendChild(), insertBefore(), and moveNode().
 
The Group Policy editor may stop responding when editing a Group Policy Object (GPO) that contains Group Policy Preferences (GPP) for Internet Explorer 10 settings. 

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10, version 1607; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 10 Enterprise LTSB 2015; Windows 8.1
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2; Windows Server 2012
Resolution: This issue was resolved in KB4493509

Back to top
OS Build 17763.253

January 08, 2019
KB4480116
Resolved
KB4493509
Resolved:
April 09, 2019
10:00 AM PT

Opened:
January 08, 2019
10:00 AM PT
" diff --git a/windows/release-information/status-windows-7-and-windows-server-2008-r2-sp1.yml b/windows/release-information/status-windows-7-and-windows-server-2008-r2-sp1.yml index ef1b22e4bf..0ce3cb79c0 100644 --- a/windows/release-information/status-windows-7-and-windows-server-2008-r2-sp1.yml +++ b/windows/release-information/status-windows-7-and-windows-server-2008-r2-sp1.yml @@ -60,16 +60,13 @@ sections: - type: markdown text: "
This table offers a summary of current active issues and those issues that have been resolved in the last 30 days.

+ - - - -
SummaryOriginating updateStatusLast updated
Layout and cell size of Excel sheets may change when using MS UI Gothic
When using the MS UI Gothic or MS PGothic fonts, the text, layout, or cell size may become narrower or wider than expected in Microsoft Excel.

See details >
April 25, 2019
KB4493453
Mitigated
May 10, 2019
10:35 AM PT
System may be unresponsive after restart if ArcaBit antivirus software installed
Devices with ArcaBit antivirus software installed may become unresponsive upon restart.

See details >
April 09, 2019
KB4493472
Mitigated
May 08, 2019
03:29 PM PT
System may be unresponsive after restart if Avira antivirus software installed
Devices with Avira antivirus software installed may become unresponsive upon restart.

See details >
April 09, 2019
KB4493472
Mitigated
May 03, 2019
08:50 AM PT
Authentication may fail for services after the Kerberos ticket expires
Authentication may fail for services that require unconstrained delegation after the Kerberos ticket expires.

See details >
March 12, 2019
KB4489878
Mitigated
April 25, 2019
02:00 PM PT
System unresponsive after restart if Sophos Endpoint Protection installed
Devices with Sophos Endpoint Protection installed and managed by Sophos Central or Sophos Enterprise Console (SEC) may become unresponsive upon restart.

See details >
April 09, 2019
KB4493472
Mitigated
April 25, 2019
02:00 PM PT
System may be unresponsive after restart with certain McAfee antivirus products
Devices with McAfee Endpoint Security Threat Prevention 10.x, Host Intrusion Prevention 8.0, or VirusScan Enterprise 8.8 may be slow or unresponsive at startup.

See details >
April 09, 2019
KB4493472
Mitigated
April 25, 2019
02:00 PM PT
Devices may not respond at login or Welcome screen if running certain Avast software
Devices running Avast for Business, Avast CloudCare, and AVG Business Edition antivirus software may become unresponsive after restart.

See details >
April 09, 2019
KB4493472
Resolved
April 25, 2019
02:00 PM PT
Internet Explorer 11 authentication issue with multiple concurrent logons
Internet Explorer 11 users may encounter issues if two or more people use the same user account for multiple, concurrent login sessions on the same Windows Server machine.

See details >
January 08, 2019
KB4480970
Resolved
KB4493472
April 09, 2019
10:00 AM PT
Custom URI schemes may not start corresponding application
Custom URI schemes for application protocol handlers may not start the corresponding application for local intranet and trusted sites in Internet Explorer.

See details >
March 12, 2019
KB4489878
Resolved
KB4493472
April 09, 2019
10:00 AM PT
NETDOM.EXE fails to run
NETDOM.EXE fails to run and the error, “The command failed to complete successfully.” appears on screen.

See details >
March 12, 2019
KB4489878
Resolved
KB4493472
April 09, 2019
10:00 AM PT
Embedded objects may display incorrectly
Any compound document (OLE) server application that places embedded objects into the Windows Metafile (WMF) using the PatBlt API may display embedded objects incorrectly.

See details >
February 12, 2019
KB4486563
Resolved
KB4493472
April 09, 2019
10:00 AM PT
" @@ -80,6 +77,15 @@ sections:
" +- title: May 2019 +- items: + - type: markdown + text: " + + +
DetailsOriginating updateStatusHistory
Layout and cell size of Excel sheets may change when using MS UI Gothic
When using the MS UI Gothic or MS PGothic fonts, the text, layout, or cell size may become narrower or wider than expected in Microsoft Excel. For example, the layout and cell size of Microsoft Excel sheets may change when using MS UI Gothic.

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10, version 1607; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 10 Enterprise LTSB 2015; Windows 8.1; Windows 7 SP1 
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2; Windows Server 2012; Windows Server 2008 R2 SP1; Windows Server 2008 SP2 
Workaround: Until a resolution is released, we recommend switching to a different Japanese font, such as Yu Gothic or MS Mincho. Alternatively, you can uninstall the optional update.

Next steps: Microsoft is working on a resolution and estimates a solution will be available in mid-May.

Back to top
April 25, 2019
KB4493453
Mitigated
Last updated:
May 10, 2019
10:35 AM PT

Opened:
May 10, 2019
10:35 AM PT
+ " + - title: April 2019 - items: - type: markdown @@ -99,25 +105,5 @@ sections: text: " - - -
DetailsOriginating updateStatusHistory
Authentication may fail for services after the Kerberos ticket expires
After installing KB4489878, some customers report that authentication fails for services that require unconstrained delegation after the Kerberos ticket expires (the default is 10 hours). For example, the SQL server service fails.

Affected platforms: 
  • Client: Windows 7 SP1
  • Server: Windows Server 2008 R2 SP1; Windows Server 2008 SP2
Workaround: To mitigate this issue, use one of the following options:
  • Option 1: Purge the Kerberos tickets on the application server. After the Kerberos ticket expires, the issue will occur again, and you must purge the tickets again.
  • Option 2: If purging does not mitigate the issue, restart the application; for example, restart the Internet Information Services (IIS) app pool associated with the SQL server.
  • Option 3: Use constrained delegation.
Next steps: Microsoft is working on a resolution and will provide an update in an upcoming release.

Back to top
March 12, 2019
KB4489878
Mitigated
Last updated:
April 25, 2019
02:00 PM PT

Opened:
March 12, 2019
10:00 AM PT
Custom URI schemes may not start corresponding application
After installing KB4489878, custom URI schemes for application protocol handlers may not start the corresponding application for local intranet and trusted sites on Internet Explorer.

Affected platforms: 
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10, version 1607; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 10 Enterprise LTSB 2015; Windows 8.1; Windows 7 SP1 
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2; Windows Server 2008 R2 SP1 
Resolution: This issue is resolved in KB4493472.

Back to top
March 12, 2019
KB4489878
Resolved
KB4493472
Resolved:
April 09, 2019
10:00 AM PT

Opened:
March 12, 2019
10:00 AM PT
NETDOM.EXE fails to run
After installing KB4489878, NETDOM.EXE fails to run, and the on-screen error, “The command failed to complete successfully.” appears.

Affected platforms: 
  • Client: Windows 7 SP1
  • Server: Windows Server 2008 R2 SP1; Windows Server 2008 SP2
Resolution: This issue is resolved in KB4493472.

Back to top
March 12, 2019
KB4489878
Resolved
KB4493472
Resolved:
April 09, 2019
10:00 AM PT

Opened:
March 12, 2019
10:00 AM PT
- " - -- title: February 2019 -- items: - - type: markdown - text: " - - -
DetailsOriginating updateStatusHistory
Embedded objects may display incorrectly
Any compound document (OLE) server application that places embedded objects into the Windows Metafile (WMF) using the PatBlt API may display embedded objects incorrectly. 
 
For example, if you paste a Microsoft Excel worksheet object into a Microsoft Word document, the cells may render with a different background color. 
 
Affected platforms:  
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10, version 1607; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 10 Enterprise LTSB 2015; Windows 8.1; Windows 7 SP1 
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2; Windows Server 2012; Windows Server 2008 R2 SP1; Windows Server 2008 SP2 
Resolution: This issue is resolved in KB4493472

Back to top
February 12, 2019
KB4486563
Resolved
KB4493472
Resolved:
April 09, 2019
10:00 AM PT

Opened:
February 12, 2019
10:00 AM PT
- " - -- title: January 2019 -- items: - - type: markdown - text: " - -
DetailsOriginating updateStatusHistory
Internet Explorer 11 authentication issue with multiple concurrent logons
After installing KB4480970, Internet Explorer 11 and other applications that use WININET.DLL may have authentication issues. This occurs when two or more people use the same user account for multiple, concurrent login sessions on the same Windows Server machine, including Remote Desktop Protocol (RDP) and Terminal Server logons. Symptoms reported by customers include, but may not be limited to:
  • Cache size and location show zero or empty.
  • Keyboard shortcuts may not work properly.
  • Webpages may intermittently fail to load or render correctly.
  • Issues with credential prompts.
  • Issues when downloading files.
Affected platforms: 
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1607; Windows 10 Enterprise LTSC 2016; Windows 8.1; Windows 7 SP1
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server 2016; Windows Server 2012 R2; Windows Server 2012; Windows Server 2008 R2 SP1
Resolution: This issue is resolved in KB4493472.

Back to top
January 08, 2019
KB4480970
Resolved
KB4493472
Resolved:
April 09, 2019
10:00 AM PT

Opened:
January 08, 2019
10:00 AM PT
" diff --git a/windows/release-information/status-windows-8.1-and-windows-server-2012-r2.yml b/windows/release-information/status-windows-8.1-and-windows-server-2012-r2.yml index e159932ae6..a16b0e0d20 100644 --- a/windows/release-information/status-windows-8.1-and-windows-server-2012-r2.yml +++ b/windows/release-information/status-windows-8.1-and-windows-server-2012-r2.yml @@ -60,6 +60,7 @@ sections: - type: markdown text: "
This table offers a summary of current active issues and those issues that have been resolved in the last 30 days.

+ @@ -67,10 +68,6 @@ sections: - - - -
SummaryOriginating updateStatusLast updated
Layout and cell size of Excel sheets may change when using MS UI Gothic
When using the MS UI Gothic or MS PGothic fonts, the text, layout, or cell size may become narrower or wider than expected in Microsoft Excel.

See details >
April 25, 2019
KB4493443
Mitigated
May 10, 2019
10:35 AM PT
System may be unresponsive after restart if ArcaBit antivirus software installed
Devices with ArcaBit antivirus software installed may become unresponsive upon restart.

See details >
April 09, 2019
KB4493446
Mitigated
May 08, 2019
03:29 PM PT
System may be unresponsive after restart if Avira antivirus software installed
Devices with Avira antivirus software installed may become unresponsive upon restart.

See details >
April 09, 2019
KB4493446
Mitigated
May 03, 2019
08:50 AM PT
Issue using PXE to start a device from WDS
There may be issues using the Preboot Execution Environment (PXE) to start a device from a Windows Deployment Services (WDS) server configured to use Variable Window Extension.

See details >
March 12, 2019
KB4489881
Mitigated
April 25, 2019
02:00 PM PT
Certain operations performed on a Cluster Shared Volume may fail
Certain operations, such as rename, performed on files or folders on a Cluster Shared Volume (CSV) may fail with the error, “STATUS_BAD_IMPERSONATION_LEVEL (0xC00000A5)”.

See details >
January 08, 2019
KB4480963
Mitigated
April 25, 2019
02:00 PM PT
System may be unresponsive after restart with certain McAfee antivirus products
Devices with McAfee Endpoint Security Threat Prevention 10.x, Host Intrusion Prevention 8.0, or VirusScan Enterprise 8.8 may be slow or unresponsive at startup.

See details >
April 09, 2019
KB4493446
Mitigated
April 18, 2019
05:00 PM PT
Devices may not respond at login or Welcome screen if running certain Avast software
Devices running Avast for Business, Avast CloudCare, and AVG Business Edition antivirus software may become unresponsive after restart.

See details >
April 09, 2019
KB4493446
Resolved
April 25, 2019
02:00 PM PT
Internet Explorer 11 authentication issue with multiple concurrent logons
Internet Explorer 11 users may encounter issues if two or more people use the same user account for multiple, concurrent login sessions on the same Windows Server machine.

See details >
January 08, 2019
KB4480963
Resolved
KB4493446
April 09, 2019
10:00 AM PT
MSXML6 may cause applications to stop responding.
MSXML6 may cause applications to stop responding if an exception was thrown during node operations, such as appendChild(), insertBefore(), and moveNode().

See details >
January 08, 2019
KB4480963
Resolved
KB4493446
April 09, 2019
10:00 AM PT
Custom URI schemes may not start corresponding application
Custom URI schemes for application protocol handlers may not start the corresponding application for local intranet and trusted sites in Internet Explorer.

See details >
March 12, 2019
KB4489881
Resolved
KB4493446
April 09, 2019
10:00 AM PT
Embedded objects may display incorrectly
Any compound document (OLE) server application that places embedded objects into the Windows Metafile (WMF) using the PatBlt API may display embedded objects incorrectly.

See details >
February 12, 2019
KB4487000
Resolved
KB4493446
April 09, 2019
10:00 AM PT
" @@ -81,6 +78,15 @@ sections:
" +- title: May 2019 +- items: + - type: markdown + text: " + + +
DetailsOriginating updateStatusHistory
Layout and cell size of Excel sheets may change when using MS UI Gothic
When using the MS UI Gothic or MS PGothic fonts, the text, layout, or cell size may become narrower or wider than expected in Microsoft Excel. For example, the layout and cell size of Microsoft Excel sheets may change when using MS UI Gothic.

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10, version 1607; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 10 Enterprise LTSB 2015; Windows 8.1; Windows 7 SP1 
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2; Windows Server 2012; Windows Server 2008 R2 SP1; Windows Server 2008 SP2 
Workaround: Until a resolution is released, we recommend switching to a different Japanese font, such as Yu Gothic or MS Mincho. Alternatively, you can uninstall the optional update.

Next steps: Microsoft is working on a resolution and estimates a solution will be available in mid-May.

Back to top
April 25, 2019
KB4493443
Mitigated
Last updated:
May 10, 2019
10:35 AM PT

Opened:
May 10, 2019
10:35 AM PT
+ " + - title: April 2019 - items: - type: markdown @@ -101,16 +107,6 @@ sections: - -
DetailsOriginating updateStatusHistory
Issue using PXE to start a device from WDS
After installing KB4489881, there may be issues using the Preboot Execution Environment (PXE) to start a device from a Windows Deployment Services (WDS) server configured to use Variable Window Extension. This may cause the connection to the WDS server to terminate prematurely while downloading the image. This issue does not affect clients or devices that are not using Variable Window Extension.

Affected platforms: 
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1607; Windows 10 Enterprise LTSC 2016; Windows 8.1 
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server 2016; Windows Server 2012 R2; Windows Server 2012 
Workaround: To mitigate the issue, disable the Variable Window Extension on WDS server using one of the following options:

Option 1:
Open an Administrator Command prompt and type the following:
Wdsutil /Set-TransportServer /EnableTftpVariableWindowExtension:No
 

Option 2:
Use the Windows Deployment Services UI to make the following adjustment:
  1. Open Windows Deployment Services from Windows Administrative Tools.
  2. Expand Servers and right-click a WDS server.
  3. Open its properties and clear the Enable Variable Window Extension box on the TFTP tab.
Option 3:
Set the following registry value to 0:
HKLM\\System\\CurrentControlSet\\Services\\WDSServer\\Providers\\WDSTFTP\\EnableVariableWindowExtension

Restart the WDSServer service after disabling the Variable Window Extension.

Next steps: Microsoft is working on a resolution and will provide an update in an upcoming release.

Back to top
March 12, 2019
KB4489881
Mitigated
Last updated:
April 25, 2019
02:00 PM PT

Opened:
March 12, 2019
10:00 AM PT
Custom URI schemes may not start corresponding application
After installing KB4489881, custom URI schemes for application protocol handlers may not start the corresponding application for local intranet and trusted sites security zones on Internet Explorer.

Affected platforms: 
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10, version 1607; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 10 Enterprise LTSB 2015; Windows 8.1; Windows 7 SP1 
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2; Windows Server 2008 R2 SP1 
Resolution: This issue is resolved in KB4493446.

Back to top
March 12, 2019
KB4489881
Resolved
KB4493446
Resolved:
April 09, 2019
10:00 AM PT

Opened:
March 12, 2019
10:00 AM PT
- " - -- title: February 2019 -- items: - - type: markdown - text: " - -
DetailsOriginating updateStatusHistory
Embedded objects may display incorrectly
Any compound document (OLE) server application that places embedded objects into the Windows Metafile (WMF) using the PatBlt API may display embedded objects incorrectly.

For example, if you paste a Microsoft Excel worksheet object into a Microsoft Word document, the cells may render with a different background color.

Affected platforms 
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10, version 1607; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 10 Enterprise LTSB 2015; Windows 8.1; Windows 7 SP1 
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2; Windows Server 2012; Windows Server 2008 R2 SP1; Windows Server 2008 SP2 
Resolution: This issue is resolved in KB4493446.

Back to top
February 12, 2019
KB4487000
Resolved
KB4493446
Resolved:
April 09, 2019
10:00 AM PT

Opened:
February 12, 2019
10:00 AM PT
" @@ -120,7 +116,5 @@ sections: text: " - -
DetailsOriginating updateStatusHistory
Certain operations performed on a Cluster Shared Volume may fail
Certain operations, such as rename, that you perform on files or folders that are on a Cluster Shared Volume (CSV) may fail with the error, “STATUS_BAD_IMPERSONATION_LEVEL (0xC00000A5)”. This occurs when you perform the operation on a CSV owner node from a process that doesn’t have administrator privilege.

Affected platforms: 
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10, version 1607; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 10 Enterprise LTSB 2015; Windows 8.1
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2; Windows Server 2012
Workaround: Do one of the following:
  • Perform the operation from a process that has administrator privilege.
  • Perform the operation from a node that doesn’t have CSV ownership.
Next steps: Microsoft is working on a resolution and will provide an update in an upcoming release.

Back to top
January 08, 2019
KB4480963
Mitigated
Last updated:
April 25, 2019
02:00 PM PT

Opened:
January 08, 2019
10:00 AM PT
Internet Explorer 11 authentication issue with multiple concurrent logons
After installing KB4480963, Internet Explorer 11 and other applications that use WININET.DLL may have authentication issues. This occurs when two or more people use the same user account for multiple, concurrent login sessions on the same Windows Server machine, including Remote Desktop Protocol (RDP) and Terminal Server logons. Symptoms reported by customers include, but may not be limited to:
  • Cache size and location show zero or empty.
  • Keyboard shortcuts may not work properly.
  • Webpages may intermittently fail to load or render correctly.
  • Issues with credential prompts.
  • Issues when downloading files.
Affected platforms: 
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1607; Windows 10 Enterprise LTSC 2016; Windows 8.1; Windows 7 SP1
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server 2016; Windows Server 2012 R2; Windows Server 2012; Windows Server 2008 R2 SP1
Resolution: This issue is resolved in KB4493446.

Back to top
January 08, 2019
KB4480963
Resolved
KB4493446
Resolved:
April 09, 2019
10:00 AM PT

Opened:
January 08, 2019
10:00 AM PT
MSXML6 may cause applications to stop responding.
After installing KB4480963, MSXML6 causes applications to stop responding if an exception was thrown during node operations, such as appendChild(), insertBefore(), and moveNode().

The Group Policy editor may stop responding when editing a Group Policy Object (GPO) that contains Group Policy Preferences (GPP) for Internet Explorer 10 settings.

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10, version 1607; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 10 Enterprise LTSB 2015; Windows 8.1
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2; Windows Server 2012
Resolution: This issue is resolved in KB4493446.

Back to top
January 08, 2019
KB4480963
Resolved
KB4493446
Resolved:
April 09, 2019
10:00 AM PT

Opened:
January 08, 2019
10:00 AM PT
" diff --git a/windows/release-information/status-windows-server-2008-sp2.yml b/windows/release-information/status-windows-server-2008-sp2.yml index 102f665769..689abfde38 100644 --- a/windows/release-information/status-windows-server-2008-sp2.yml +++ b/windows/release-information/status-windows-server-2008-sp2.yml @@ -63,8 +63,6 @@ sections:
System may be unresponsive after restart if Avira antivirus software installed
Devices with Avira antivirus software installed may become unresponsive upon restart.

See details >April 09, 2019
KB4493471Mitigated
May 03, 2019
08:51 AM PT
System unresponsive after restart if Sophos Endpoint Protection installed
Devices with Sophos Endpoint Protection installed and managed by Sophos Central or Sophos Enterprise Console (SEC) may become unresponsive upon restart.

See details >April 09, 2019
KB4493471Mitigated
April 25, 2019
02:00 PM PT
Authentication may fail for services after the Kerberos ticket expires
Authentication may fail for services that require unconstrained delegation after the Kerberos ticket expires.

See details >March 12, 2019
KB4489880Mitigated
April 25, 2019
02:00 PM PT -
Embedded objects may display incorrectly
Any compound document (OLE) server application that places embedded objects into the Windows Metafile (WMF) using the PatBlt API may display embedded objects incorrectly.

See details >February 12, 2019
KB4487023Resolved
KB4493471April 09, 2019
10:00 AM PT -
NETDOM.EXE fails to run
NETDOM.EXE fails to run and the error, “The command failed to complete successfully.” appears on screen.

See details >March 12, 2019
KB4489880Resolved
KB4493471April 09, 2019
10:00 AM PT " @@ -91,15 +89,5 @@ sections: text: " - -
DetailsOriginating updateStatusHistory
Authentication may fail for services after the Kerberos ticket expires
After installing KB4489880, some customers report that authentication fails for services that require unconstrained delegation after the Kerberos ticket expires (the default is 10 hours). For example, the SQL server service fails.

Affected platforms: 
  • Client: Windows 7 SP1
  • Server: Windows Server 2008 R2 SP1; Windows Server 2008 SP2
Workaround: To mitigate this issue, use one of the following options:
  • Option 1: Purge the Kerberos tickets on the application server. After the Kerberos ticket expires, the issue will occur again, and you must purge the tickets again.
  • Option 2: If purging does not mitigate the issue, restart the application; for example, restart the Internet Information Services (IIS) app pool associated with the SQL server.
  • Option 3: Use constrained delegation.
Next steps: Microsoft is working on a resolution and will provide an update in an upcoming release.

Back to top
March 12, 2019
KB4489880
Mitigated
Last updated:
April 25, 2019
02:00 PM PT

Opened:
March 12, 2019
10:00 AM PT
NETDOM.EXE fails to run
After installing KB4489880, NETDOM.EXE fails to run, and the on-screen error, “The command failed to complete successfully.” appears.

Affected platforms: 
  • Client: Windows 7 SP1
  • Server: Windows Server 2008 R2 SP1; Windows Server 2008 SP2
Resolution: This issue is resolved in KB4493471.

Back to top
March 12, 2019
KB4489880
Resolved
KB4493471
Resolved:
April 09, 2019
10:00 AM PT

Opened:
March 12, 2019
10:00 AM PT
- " - -- title: February 2019 -- items: - - type: markdown - text: " - -
DetailsOriginating updateStatusHistory
Embedded objects may display incorrectly
Any compound document (OLE) server application that places embedded objects into the Windows Metafile (WMF) using the PatBlt API may display embedded objects incorrectly.

For example, if you paste a Microsoft Excel worksheet object into a Microsoft Word document, the cells may render with a different background color.

Affected platforms 
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10, version 1607; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 10 Enterprise LTSB 2015; Windows 8.1; Windows 7 SP1 
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2; Windows Server 2012; Windows Server 2008 R2 SP1; Windows Server 2008 SP2
Resolution: This issue is resolved in KB4493471.

Back to top
February 12, 2019
KB4487023
Resolved
KB4493471
Resolved:
April 09, 2019
10:00 AM PT

Opened:
February 12, 2019
10:00 AM PT
" diff --git a/windows/release-information/status-windows-server-2012.yml b/windows/release-information/status-windows-server-2012.yml index 831a726f86..be5f206c02 100644 --- a/windows/release-information/status-windows-server-2012.yml +++ b/windows/release-information/status-windows-server-2012.yml @@ -60,13 +60,11 @@ sections: - type: markdown text: "
This table offers a summary of current active issues and those issues that have been resolved in the last 30 days.

+ - - -
SummaryOriginating updateStatusLast updated
Layout and cell size of Excel sheets may change when using MS UI Gothic
When using the MS UI Gothic or MS PGothic fonts, the text, layout, or cell size may become narrower or wider than expected in Microsoft Excel.

See details >
April 25, 2019
KB4493462
Mitigated
May 10, 2019
10:35 AM PT
System may be unresponsive after restart if Avira antivirus software installed
Devices with Avira antivirus software installed may become unresponsive upon restart.

See details >
April 09, 2019
KB4493451
Mitigated
May 03, 2019
08:51 AM PT
Issue using PXE to start a device from WDS
There may be issues using the Preboot Execution Environment (PXE) to start a device from a Windows Deployment Services (WDS) server configured to use Variable Window Extension.

See details >
March 12, 2019
KB4489891
Mitigated
April 25, 2019
02:00 PM PT
System unresponsive after restart if Sophos Endpoint Protection installed
Devices with Sophos Endpoint Protection installed and managed by Sophos Central or Sophos Enterprise Console (SEC) may become unresponsive upon restart.

See details >
April 09, 2019
KB4493451
Mitigated
April 25, 2019
02:00 PM PT
Certain operations performed on a Cluster Shared Volume may fail
Certain operations, such as rename, performed on files or folders on a Cluster Shared Volume (CSV) may fail with the error, “STATUS_BAD_IMPERSONATION_LEVEL (0xC00000A5)”.

See details >
January 08, 2019
KB4480975
Mitigated
April 25, 2019
02:00 PM PT
Internet Explorer 11 authentication issue with multiple concurrent logons
Internet Explorer 11 users may encounter issues if two or more people use the same user account for multiple, concurrent login sessions on the same Windows Server machine.

See details >
January 08, 2019
KB4480975
Resolved
KB4493451
April 09, 2019
10:00 AM PT
MSXML6 may cause applications to stop responding
MSXML6 may cause applications to stop responding if an exception was thrown during node operations, such as appendChild(), insertBefore(), and moveNode().

See details >
January 08, 2019
KB4480975
Resolved
KB4493451
April 09, 2019
10:00 AM PT
Embedded objects may display incorrectly
Any compound document (OLE) server application that places embedded objects into the Windows Metafile (WMF) using the PatBlt API may display embedded objects incorrectly.

See details >
February 12, 2019
KB4487025
Resolved
KB4493451
April 09, 2019
10:00 AM PT
" @@ -77,6 +75,15 @@ sections:
" +- title: May 2019 +- items: + - type: markdown + text: " + + +
DetailsOriginating updateStatusHistory
Layout and cell size of Excel sheets may change when using MS UI Gothic
When using the MS UI Gothic or MS PGothic fonts, the text, layout, or cell size may become narrower or wider than expected in Microsoft Excel. For example, the layout and cell size of Microsoft Excel sheets may change when using MS UI Gothic.

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10, version 1607; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 10 Enterprise LTSB 2015; Windows 8.1; Windows 7 SP1 
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2; Windows Server 2012; Windows Server 2008 R2 SP1; Windows Server 2008 SP2 
Workaround: Until a resolution is released, we recommend switching to a different Japanese font, such as Yu Gothic or MS Mincho. Alternatively, you can uninstall the optional update.

Next steps: Microsoft is working on a resolution and estimates a solution will be available in mid-May.

Back to top
April 25, 2019
KB4493462
Mitigated
Last updated:
May 10, 2019
10:35 AM PT

Opened:
May 10, 2019
10:35 AM PT
+ " + - title: April 2019 - items: - type: markdown @@ -97,22 +104,11 @@ sections: " -- title: February 2019 -- items: - - type: markdown - text: " - - -
DetailsOriginating updateStatusHistory
Embedded objects may display incorrectly
Any compound document (OLE) server application that places embedded objects into the Windows Metafile (WMF) using the PatBlt API may display embedded objects incorrectly.

For example, if you paste a Microsoft Excel worksheet object into a Microsoft Word document, the cells may render with a different background color.

Affected platforms 
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10, version 1607; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 10 Enterprise LTSB 2015; Windows 8.1; Windows 7 SP1 
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2; Windows Server 2012; Windows Server 2008 R2 SP1; Windows Server 2008 SP2 
Resolution: This issue is resolved in KB4493451.

Back to top
February 12, 2019
KB4487025
Resolved
KB4493451
Resolved:
April 09, 2019
10:00 AM PT

Opened:
February 12, 2019
10:00 AM PT
- " - - title: January 2019 - items: - type: markdown text: " - -
DetailsOriginating updateStatusHistory
Certain operations performed on a Cluster Shared Volume may fail
Certain operations, such as rename, that you perform on files or folders that are on a Cluster Shared Volume (CSV) may fail with the error, \"STATUS_BAD_IMPERSONATION_LEVEL (0xC00000A5)\". This occurs when you perform the operation on a CSV owner node from a process that doesn’t have administrator privilege.

Affected platforms: 
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10, version 1607; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 10 Enterprise LTSB 2015; Windows 8.1
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2; Windows Server 2012
Workaround: Do one of the following:
  • Perform the operation from a process that has administrator privilege.
  • Perform the operation from a node that doesn’t have CSV ownership.
Next steps: Microsoft is working on a resolution and will provide an update in an upcoming release.

Back to top
January 08, 2019
KB4480975
Mitigated
Last updated:
April 25, 2019
02:00 PM PT

Opened:
January 08, 2019
10:00 AM PT
Internet Explorer 11 authentication issue with multiple concurrent logons
After installing KB4480975, Internet Explorer 11 and other applications that use WININET.DLL may have authentication issues. This occurs when two or more people use the same user account for multiple, concurrent login sessions on the same Windows Server machine, including Remote Desktop Protocol (RDP) and Terminal Server logons. Symptoms reported by customers include, but may not be limited to:
  • Cache size and location show zero or empty.
  • Keyboard shortcuts may not work properly.
  • Webpages may intermittently fail to load or render correctly.
  • Issues with credential prompts.
  • Issues when downloading files.
Affected platforms: 
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1607; Windows 10 Enterprise LTSC 2016; Windows 8.1; Windows 7 SP1
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server 2016; Windows Server 2012 R2; Windows Server 2012; Windows Server 2008 R2 SP1
Resolution: This issue is resolved in KB4493451.

Back to top
January 08, 2019
KB4480975
Resolved
KB4493451
Resolved:
April 09, 2019
10:00 AM PT

Opened:
January 08, 2019
10:00 AM PT
MSXML6 may cause applications to stop responding
After installing KB4480975, MSXML6 causes applications to stop responding if an exception was thrown during node operations, such as appendChild(), insertBefore(), and moveNode().

The Group Policy editor may stop responding when editing a Group Policy Object (GPO) that contains Group Policy Preferences (GPP) for Internet Explorer 10 settings.

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10, version 1607; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 10 Enterprise LTSB 2015; Windows 8.1
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2; Windows Server 2012
Resolution: This issue is resolved in KB4493451.

Back to top
January 08, 2019
KB4480975
Resolved
KB4493451
Resolved:
April 09, 2019
10:00 AM PT

Opened:
January 08, 2019
10:00 AM PT
" From def5857f0ea3c60546ae1a6b093000ef1ebb653c Mon Sep 17 00:00:00 2001 From: Greg Lindsay Date: Fri, 10 May 2019 13:29:51 -0700 Subject: [PATCH 479/724] draft3 --- .../whats-new-windows-10-version-1903.md | 16 +++++++++++++++- 1 file changed, 15 insertions(+), 1 deletion(-) diff --git a/windows/whats-new/whats-new-windows-10-version-1903.md b/windows/whats-new/whats-new-windows-10-version-1903.md index 55b1f54d90..673f46f242 100644 --- a/windows/whats-new/whats-new-windows-10-version-1903.md +++ b/windows/whats-new/whats-new-windows-10-version-1903.md @@ -19,9 +19,23 @@ This article lists new and updated features and content that are of interest to >If you are not an IT Pro, see the following topics for information about what's new in Windows 10 in [hardware](https://docs.microsoft.com/windows-hardware/get-started/what-s-new-in-windows), for [developers](https://blogs.windows.com/buildingapps/2019/04/18/start-developing-on-windows-10-may-2019-update-today/#2Lp8FUFQ3Jm8KVcq.97), and for [consumers](https://blogs.windows.com/windowsexperience/2018/04/30/whats-new-in-the-windows-10-april-2018-update). - ## Deployment +### Windows Autopilot + +The following Windows Autopilot features are available in Windows 10, version 1903 and later: + +- White glove: Windows Autopilot white glove enables partners or IT staff to pre-provision devices to be fully configured and business ready for your users. +- ESP enhancements: The Intune enrollment status page (ESP) now tracks Intune Management Extensions, and System Center Configuration Manager and Office installs​. +- Cortana voiceover: Cortana voiceover is disabled by default for Windows 10 Pro and above. +- Self-updating Autopilot: You can enable new Windows Autopilot functionality without updating Windows.​ + +### SetupDiag + +[SetupDiag](https://docs.microsoft.com/windows/deployment/upgrade/setupdiag) version 1.4.1 is available. + +SetupDiag is a command-line tool that can help diagnose why a Windows 10 update failed. SetupDiag works by searching Windows Setup log files. When searching log files, SetupDiag uses a set of rules to match known issues. In the current version of SetupDiag there are 53 rules contained in the rules.xml file, which is extracted when SetupDiag is run. The rules.xml file will be updated as new versions of SetupDiag are made available. + ## Configuration ## Security From ac3bb9b597ae2a230cb762bd95cf8bb28a10ea7c Mon Sep 17 00:00:00 2001 From: "Nisha Mittal (Wipro Ltd.)" Date: Fri, 10 May 2019 13:49:57 -0700 Subject: [PATCH 480/724] New Announcement Added --- windows/release-information/windows-message-center.yml | 10 ++++++++++ 1 file changed, 10 insertions(+) diff --git a/windows/release-information/windows-message-center.yml b/windows/release-information/windows-message-center.yml index 2a4ba41456..fb66108a56 100644 --- a/windows/release-information/windows-message-center.yml +++ b/windows/release-information/windows-message-center.yml @@ -50,6 +50,16 @@ sections: text: " + - -
MessageDate
Reminder: Windows 10 update servicing cadence
This month we received questions about the cadence of updates we released in April and May 2019. Here's a quick recap of our releases and servicing cadence:
+
    +
  • April 9, 2019 was the regular Update Tuesday release for all versions of Windows.
  • +
  • May 1, 2019 was a Windows 10, version 1809 out of band update (OOB) released to Microsoft Catalog and WSUS, providing a critical fix for our OEM partners.
  • +
  • May 3, 2019 was the Windows 10, version 1809 \"C\" release for April. This update contained important Japan era packages for commercial customers to preview. It was delayed due to a blocking issue requiring investigation, causing it to be released later than expected. The update was then mistakenly published as \"required\" (instead of \"optional\"), which pushed the update out to customers and required a reboot. Within 24 hours of receiving customer reports, we corrected the classification and mitigated the issue.
  • +
+For more information about the Windows 10 update servicing cadence, please see the Window IT Pro blog.
+ + +
May 10, 2019
10:00 AM PT
Take action: Install servicing stack update for Windows Server 2008 SP2 for SHA-2 code sign support
A standalone update, KB4493730, that introduce SHA-2 code sign support for the servicing stack (SSU) was released today as a security update.
April 19, 2019
10:00 AM PT
The benefits of Windows 10 Dynamic Update
Dynamic Update can help organizations and end users alike ensure that their Windows 10 devices have the latest feature update content (as part of an in-place upgrade)—and preserve precious features on demand (FODs) and language packs (LPs) that may have been previously installed.

From 0b80b692f94db3055b589de8d153ccb5e7334b4b Mon Sep 17 00:00:00 2001 From: "Nisha Mittal (Wipro Ltd.)" Date: Fri, 10 May 2019 14:07:02 -0700 Subject: [PATCH 481/724] Latest Change for announcement --- .../windows-message-center.yml | 17 +++++++---------- 1 file changed, 7 insertions(+), 10 deletions(-) diff --git a/windows/release-information/windows-message-center.yml b/windows/release-information/windows-message-center.yml index fb66108a56..5990f3d920 100644 --- a/windows/release-information/windows-message-center.yml +++ b/windows/release-information/windows-message-center.yml @@ -50,16 +50,13 @@ sections: text: " - + From 951f8092f962a0932629e8b141b25fdf3f91e2e6 Mon Sep 17 00:00:00 2001 From: DocsPreview <49669258+DocsPreview@users.noreply.github.com> Date: Fri, 10 May 2019 15:12:41 -0700 Subject: [PATCH 484/724] Release info preview (#162) * Latest changes for 1809 issues * New Announcement Added * Latest Change for announcement * Updated link for japanese era content --- .../status-windows-10-1507.yml | 22 ------------ ...indows-10-1607-and-windows-server-2016.yml | 26 ++++++-------- .../status-windows-10-1703.yml | 24 ++++++------- .../status-windows-10-1709.yml | 26 ++++++-------- .../status-windows-10-1803.yml | 28 ++++++--------- ...indows-10-1809-and-windows-server-2019.yml | 18 ++-------- ...ndows-7-and-windows-server-2008-r2-sp1.yml | 34 ++++++------------- ...windows-8.1-and-windows-server-2012-r2.yml | 26 ++++++-------- .../status-windows-server-2008-sp2.yml | 12 ------- .../status-windows-server-2012.yml | 24 ++++++------- .../windows-message-center.yml | 7 ++++ 11 files changed, 79 insertions(+), 168 deletions(-) diff --git a/windows/release-information/status-windows-10-1507.yml b/windows/release-information/status-windows-10-1507.yml index 3cab3fb9e9..16bf511276 100644 --- a/windows/release-information/status-windows-10-1507.yml +++ b/windows/release-information/status-windows-10-1507.yml @@ -61,9 +61,6 @@ sections: text: "
This table offers a summary of current active issues and those issues that have been resolved in the last 30 days.

MessageDate
Reminder: Windows 10 update servicing cadence
This month we received questions about the cadence of updates we released in April and May 2019. Here's a quick recap of our releases and servicing cadence:
-
    -
  • April 9, 2019 was the regular Update Tuesday release for all versions of Windows.
  • -
  • May 1, 2019 was a Windows 10, version 1809 out of band update (OOB) released to Microsoft Catalog and WSUS, providing a critical fix for our OEM partners.
  • -
  • May 3, 2019 was the Windows 10, version 1809 \"C\" release for April. This update contained important Japan era packages for commercial customers to preview. It was delayed due to a blocking issue requiring investigation, causing it to be released later than expected. The update was then mistakenly published as \"required\" (instead of \"optional\"), which pushed the update out to customers and required a reboot. Within 24 hours of receiving customer reports, we corrected the classification and mitigated the issue.
  • -
-For more information about the Windows 10 update servicing cadence, please see the Window IT Pro blog.
- - -
May 10, 2019
10:00 AM PT
Reminder: Windows 10 update servicing cadence
This month we received questions about the cadence of updates we released in April and May 2019. Here's a quick recap of our releases and servicing cadence:
+
    +
  • April 9, 2019 was the regular Update Tuesday release for all versions of Windows.
  • +
  • May 1, 2019 was an \"optional\" out of band update (OOB), non-security update for Windows 10, version 1809. It was released to Microsoft Catalog and WSUS, providing a critical fix for our OEM partners.
  • +
  • May 3, 2019 was the \"optional\" Windows 10, version 1809 \"C\" release for April. This update contained important Japanese era packages for commercial customers to preview. It was released later than expected and mistakenly targeted as \"required\" (instead of \"optional\") for consumers, which pushed the update out to customers and required a reboot. Within 24 hours of receiving customer reports, we corrected the targeting logic and mitigated the issue.
  • +
+ For more information about the Windows 10 update servicing cadence, please see the Window IT Pro blog.
May 10, 2019
10:00 AM PT
Take action: Install servicing stack update for Windows Server 2008 SP2 for SHA-2 code sign support
A standalone update, KB4493730, that introduce SHA-2 code sign support for the servicing stack (SSU) was released today as a security update.
April 19, 2019
10:00 AM PT
The benefits of Windows 10 Dynamic Update
Dynamic Update can help organizations and end users alike ensure that their Windows 10 devices have the latest feature update content (as part of an in-place upgrade)—and preserve precious features on demand (FODs) and language packs (LPs) that may have been previously installed.

From 6a6fe30fe138e9f0ce63896660bd5820a3e92ecc Mon Sep 17 00:00:00 2001 From: Daniel Simpson Date: Fri, 10 May 2019 14:36:01 -0700 Subject: [PATCH 482/724] Update safety-scanner-download.md fixing NOTE style --- .../threat-protection/intelligence/safety-scanner-download.md | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/windows/security/threat-protection/intelligence/safety-scanner-download.md b/windows/security/threat-protection/intelligence/safety-scanner-download.md index 5a4ea7bd10..69dfef35ee 100644 --- a/windows/security/threat-protection/intelligence/safety-scanner-download.md +++ b/windows/security/threat-protection/intelligence/safety-scanner-download.md @@ -22,7 +22,7 @@ Microsoft Safety Scanner is a scan tool designed to find and remove malware from - [Download Microsoft Safety Scanner (64-bit)](https://go.microsoft.com/fwlink/?LinkId=212732) -[!NOTE] The security intelligence update version of the Microsoft Safety Scaner matches the version described [in this web page](https://www.microsoft.com/en-us/wdsi/definitions). +> **NOTE** The security intelligence update version of the Microsoft Safety Scaner matches the version described [in this web page](https://www.microsoft.com/en-us/wdsi/definitions). Safety Scanner only scans when manually triggered and is available for use 10 days after being downloaded. We recommend that you always download the latest version of this tool before each scan. From 9928a0c615f9ec727ca9b389f9b6786aa7797dc9 Mon Sep 17 00:00:00 2001 From: "Nisha Mittal (Wipro Ltd.)" Date: Fri, 10 May 2019 14:41:55 -0700 Subject: [PATCH 483/724] Updated link for japanese era content --- windows/release-information/windows-message-center.yml | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/windows/release-information/windows-message-center.yml b/windows/release-information/windows-message-center.yml index 5990f3d920..64f62b302e 100644 --- a/windows/release-information/windows-message-center.yml +++ b/windows/release-information/windows-message-center.yml @@ -54,7 +54,7 @@ sections:
  • April 9, 2019 was the regular Update Tuesday release for all versions of Windows.
  • May 1, 2019 was an \"optional\" out of band update (OOB), non-security update for Windows 10, version 1809. It was released to Microsoft Catalog and WSUS, providing a critical fix for our OEM partners.
  • -
  • May 3, 2019 was the \"optional\" Windows 10, version 1809 \"C\" release for April. This update contained important Japanese era packages for commercial customers to preview. It was released later than expected and mistakenly targeted as \"required\" (instead of \"optional\") for consumers, which pushed the update out to customers and required a reboot. Within 24 hours of receiving customer reports, we corrected the targeting logic and mitigated the issue.
  • +
  • May 3, 2019 was the \"optional\" Windows 10, version 1809 \"C\" release for April. This update contained important Japanese era packages for commercial customers to preview. It was released later than expected and mistakenly targeted as \"required\" (instead of \"optional\") for consumers, which pushed the update out to customers and required a reboot. Within 24 hours of receiving customer reports, we corrected the targeting logic and mitigated the issue.
For more information about the Windows 10 update servicing cadence, please see the Window IT Pro blog.
May 10, 2019
10:00 AM PT
Take action: Install servicing stack update for Windows Server 2008 SP2 for SHA-2 code sign support
A standalone update, KB4493730, that introduce SHA-2 code sign support for the servicing stack (SSU) was released today as a security update.
April 19, 2019
10:00 AM PT
- - -
SummaryOriginating updateStatusLast updated
Certain operations performed on a Cluster Shared Volume may fail
Certain operations, such as rename, performed on files or folders on a Cluster Shared Volume (CSV) may fail with the error, \"STATUS_BAD_IMPERSONATION_LEVEL (0xC00000A5)\".

See details >
OS Build 10240.18094

January 08, 2019
KB4480962
Mitigated
April 25, 2019
02:00 PM PT
MSXML6 may cause applications to stop responding
MSXML6 may cause applications to stop responding if an exception was thrown during node operations, such as appendChild(), insertBefore(), and moveNode().

See details >
OS Build 10240.18094

January 08, 2019
KB4480962
Resolved
KB4493475
April 09, 2019
10:00 AM PT
Custom URI schemes may not start corresponding application
Custom URI schemes for application protocol handlers may not start the corresponding application for local intranet and trusted sites in Internet Explorer.

See details >
OS Build 10240.18158

March 12, 2019
KB4489872
Resolved
KB4493475
April 09, 2019
10:00 AM PT
Embedded objects may display incorrectly
Any compound document (OLE) server application that places embedded objects into the Windows Metafile (WMF) using the PatBlt API may display embedded objects incorrectly.

See details >
OS Build 10240.18132

February 12, 2019
KB4487018
Resolved
KB4493475
April 09, 2019
10:00 AM PT
" @@ -74,30 +71,11 @@ sections:
" -- title: March 2019 -- items: - - type: markdown - text: " - - -
DetailsOriginating updateStatusHistory
Custom URI schemes may not start corresponding application
After installing KB4489872, Custom URI Schemes for Application Protocol handlers may not start the corresponding application for local intranet and trusted sites on Internet Explorer.

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10, version 1607; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 10 Enterprise LTSB 2015; Windows 8.1; Windows 7 SP1 
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2; Windows Server 2008 R2 SP1
Resolution: This issue was resolved in KB4493475.

Back to top
OS Build 10240.18158

March 12, 2019
KB4489872
Resolved
KB4493475
Resolved:
April 09, 2019
10:00 AM PT

Opened:
March 12, 2019
10:00 AM PT
- " - -- title: February 2019 -- items: - - type: markdown - text: " - - -
DetailsOriginating updateStatusHistory
Embedded objects may display incorrectly
Any compound document (OLE) server application that places embedded objects into the Windows Metafile (WMF) using the PatBlt API may display embedded objects incorrectly. 
 
For example, if you paste a Microsoft Excel worksheet object into a Microsoft Word document, the cells may render with a different background color. 
 
Affected platforms:  
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10, version 1607; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 10 Enterprise LTSB 2015; Windows 8.1; Windows 7 SP1
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2; Windows Server 2012; Windows Server 2008 R2 SP1; Windows Server 2008 SP2 
Resolution: This issue is resolved in KB4493475

Back to top
OS Build 10240.18132

February 12, 2019
KB4487018
Resolved
KB4493475
Resolved:
April 09, 2019
10:00 AM PT

Opened:
February 12, 2019
10:00 AM PT
- " - - title: January 2019 - items: - type: markdown text: " -
DetailsOriginating updateStatusHistory
Certain operations performed on a Cluster Shared Volume may fail
Certain operations, such as rename, that you perform on files or folders that are on a Cluster Shared Volume (CSV) may fail with the error, \"STATUS_BAD_IMPERSONATION_LEVEL (0xC00000A5)\". This occurs when you perform the operation on a CSV owner node from a process that doesn’t have administrator privilege.

Affected platforms: 
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10, version 1607; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 10 Enterprise LTSB 2015; Windows 8.1
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2; Windows Server 2012
Workaround: Do one of the following: 
  • Perform the operation from a process that has administrator privilege. 
  • Perform the operation from a node that doesn’t have CSV ownership. 
Next steps: Microsoft is working on a resolution and will provide an update in an upcoming release.

Back to top
OS Build 10240.18094

January 08, 2019
KB4480962
Mitigated
Last updated:
April 25, 2019
02:00 PM PT

Opened:
January 08, 2019
10:00 AM PT
MSXML6 may cause applications to stop responding
After installing KB4480962, MSXML6 causes applications to stop responding if an exception was thrown during node operations, such as appendChild(), insertBefore(), and moveNode().

The Group Policy editor may stop responding when editing a Group Policy Object (GPO) that contains Group Policy Preferences (GPP) for Internet Explorer 10 settings.

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10, version 1607; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 10 Enterprise LTSB 2015; Windows 8.1
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2; Windows Server 2012
Resolution: This issue was resolved in KB4493475.

Back to top
OS Build 10240.18094

January 08, 2019
KB4480962
Resolved
KB4493475
Resolved:
April 09, 2019
10:00 AM PT

Opened:
January 08, 2019
10:00 AM PT
" diff --git a/windows/release-information/status-windows-10-1607-and-windows-server-2016.yml b/windows/release-information/status-windows-10-1607-and-windows-server-2016.yml index b22aced938..d444c69dac 100644 --- a/windows/release-information/status-windows-10-1607-and-windows-server-2016.yml +++ b/windows/release-information/status-windows-10-1607-and-windows-server-2016.yml @@ -61,16 +61,13 @@ sections: text: "
This table offers a summary of current active issues and those issues that have been resolved in the last 30 days.

+ - - - -
SummaryOriginating updateStatusLast updated
Zone transfers over TCP may fail
Zone transfers between primary and secondary DNS servers over the Transmission Control Protocol (TCP) may fail.

See details >
OS Build 14393.2941

April 25, 2019
KB4493473
Investigating
April 25, 2019
02:00 PM PT
Layout and cell size of Excel sheets may change when using MS UI Gothic
When using the MS UI Gothic or MS PGothic fonts, the text, layout, or cell size may become narrower or wider than expected in Microsoft Excel.

See details >
OS Build 14393.2931

April 25, 2019
KB4492241
Mitigated
May 10, 2019
10:35 AM PT
Cluster service may fail if the minimum password length is set to greater than 14
The cluster service may fail to start with the error “2245 (NERR_PasswordTooShort)” if the Group Policy “Minimum Password Length” is configured with greater than 14 characters.

See details >
OS Build 14393.2639

November 27, 2018
KB4467684
Mitigated
April 25, 2019
02:00 PM PT
Issue using PXE to start a device from WDS
There may be issues using the Preboot Execution Environment (PXE) to start a device from a Windows Deployment Services (WDS) server configured to use Variable Window Extension.

See details >
OS Build 14393.2848

March 12, 2019
KB4489882
Mitigated
April 25, 2019
02:00 PM PT
SCVMM cannot enumerate and manage logical switches deployed on the host
For hosts managed by System Center Virtual Machine Manager (VMM), VMM cannot enumerate and manage logical switches deployed on the host.

See details >
OS Build 14393.2639

November 27, 2018
KB4467684
Mitigated
April 25, 2019
02:00 PM PT
Certain operations performed on a Cluster Shared Volume may fail
Certain operations, such as rename, performed on files or folders on a Cluster Shared Volume (CSV) may fail with the error, \"STATUS_BAD_IMPERSONATION_LEVEL (0xC00000A5)\".

See details >
OS Build 14393.2724

January 08, 2019
KB4480961
Mitigated
April 25, 2019
02:00 PM PT
Windows may not start on certain Lenovo and Fujitsu laptops with less than 8GB of RAM
Windows may fail to start on certain Lenovo and Fujitsu laptops that have less than 8 GB of RAM.

See details >
OS Build 14393.2608

November 13, 2018
KB4467691
Mitigated
February 19, 2019
10:00 AM PT
Custom URI schemes may not start corresponding application
Custom URI schemes for application protocol handlers may not start the corresponding application for local intranet and trusted sites in Internet Explorer.

See details >
OS Build 14393.2848

March 12, 2019
KB4489882
Resolved
KB4493473
April 25, 2019
02:00 PM PT
End-user-defined characters (EUDC) may cause blue screen at startup
If you enable per font end-user-defined characters (EUDC), the system will stop working and a blue screen may appear at startup.

See details >
OS Build 14393.2879

March 19, 2019
KB4489889
Resolved
KB4493470
April 09, 2019
10:00 AM PT
Internet Explorer 11 authentication issue with multiple concurrent logons
Internet Explorer 11 users may encounter issues if two or more people use the same user account for multiple, concurrent login sessions on the same Windows Server machine.

See details >
OS Build 14393.2724

January 08, 2019
KB4480961
Resolved
KB4493470
April 09, 2019
10:00 AM PT
MSXML6 may cause applications to stop responding
MSXML6 may cause applications to stop responding if an exception was thrown during node operations, such as appendChild(), insertBefore(), and moveNode().

See details >
OS Build 14393.2724

January 08, 2019
KB4480961
Resolved
KB4493470
April 09, 2019
10:00 AM PT
Embedded objects may display incorrectly
Any compound document (OLE) server application that places embedded objects into the Windows Metafile (WMF) using the PatBlt API may display embedded objects incorrectly.

See details >
OS Build 14393.2791

February 12, 2019
KB4487026
Resolved
KB4493470
April 09, 2019
10:00 AM PT
" @@ -81,6 +78,15 @@ sections:
" +- title: May 2019 +- items: + - type: markdown + text: " + + +
DetailsOriginating updateStatusHistory
Layout and cell size of Excel sheets may change when using MS UI Gothic
When using the MS UI Gothic or MS PGothic fonts, the text, layout, or cell size may become narrower or wider than expected in Microsoft Excel. For example, the layout and cell size of Microsoft Excel sheets may change when using MS UI Gothic.

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10, version 1607; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 10 Enterprise LTSB 2015; Windows 8.1; Windows 7 SP1 
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2; Windows Server 2012; Windows Server 2008 R2 SP1; Windows Server 2008 SP2 
Workaround: Until a resolution is released, we recommend switching to a different Japanese font, such as Yu Gothic or MS Mincho. Alternatively, you can uninstall the optional update.

Next steps: Microsoft is working on a resolution and estimates a solution will be available in mid-May.

Back to top
OS Build 14393.2931

April 25, 2019
KB4492241
Mitigated
Last updated:
May 10, 2019
10:35 AM PT

Opened:
May 10, 2019
10:35 AM PT
+ " + - title: April 2019 - items: - type: markdown @@ -98,16 +104,6 @@ sections:
Issue using PXE to start a device from WDS
After installing KB4489882, there may be issues using the Preboot Execution Environment (PXE) to start a device from a Windows Deployment Services (WDS) server configured to use Variable Window Extension. This may cause the connection to the WDS server to terminate prematurely while downloading the image. This issue does not affect clients or devices that are not using Variable Window Extension.

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1607; Windows 10 Enterprise LTSC 2016; Windows 8.1
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server 2016; Windows Server 2012 R2; Windows Server 2012
Workaround: To mitigate the issue, disable the Variable Window Extension on WDS server using one of the following options:

Option 1:
Open an Administrator Command prompt and type the following:
Wdsutil /Set-TransportServer /EnableTftpVariableWindowExtension:No
 

Option 2:
Use the Windows Deployment Services UI to make the following adjustment:
  1. Open Windows Deployment Services from Windows Administrative Tools.
  2. Expand Servers and right-click a WDS server.
  3. Open its properties and clear the Enable Variable Window Extension box on the TFTP tab.
Option 3:
Set the following registry value to 0:
HKLM\\System\\CurrentControlSet\\Services\\WDSServer\\Providers\\WDSTFTP\\EnableVariableWindowExtension

Restart the WDSServer service after disabling the Variable Window Extension.

Next steps: Microsoft is working on a resolution and will provide an update in an upcoming release.

Back to top
OS Build 14393.2848

March 12, 2019
KB4489882
Mitigated
Last updated:
April 25, 2019
02:00 PM PT

Opened:
March 12, 2019
10:00 AM PT
Custom URI schemes may not start corresponding application
After installing KB4489882, Custom URI schemes for application protocol handlers may not start the corresponding application for local intranet and trusted sites security zones on Internet Explorer.

Affected platforms: 
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10, version 1607; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 10 Enterprise LTSB 2015; Windows 8.1; Windows 7 SP1 
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2; Windows Server 2008 R2 SP1
Resolution: This issue is resolved in KB4493473

Back to top
OS Build 14393.2848

March 12, 2019
KB4489882
Resolved
KB4493473
Resolved:
April 25, 2019
02:00 PM PT

Opened:
March 12, 2019
10:00 AM PT
End-user-defined characters (EUDC) may cause blue screen at startup
If you enable per font end-user-defined characters (EUDC), the system will stop working and a blue screen may appear at startup. This is not a common setting in non-Asian regions.

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10, version 1607; Windows 10 Enterprise LTSC 2016
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016
Resolution: This issue was resolved in KB4493470.

Back to top
OS Build 14393.2879

March 19, 2019
KB4489889
Resolved
KB4493470
Resolved:
April 09, 2019
10:00 AM PT

Opened:
March 19, 2019
10:00 AM PT
- " - -- title: February 2019 -- items: - - type: markdown - text: " - -
DetailsOriginating updateStatusHistory
Embedded objects may display incorrectly
Any compound document (OLE) server application that places embedded objects into the Windows Metafile (WMF) using the PatBlt API may display embedded objects incorrectly. 
 
For example, if you paste a Microsoft Excel worksheet object into a Microsoft Word document, the cells may render with a different background color. 
 
Affected platforms:  
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10, version 1607; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 10 Enterprise LTSB 2015; Windows 8.1; Windows 7 SP1 
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2; Windows Server 2012; Windows Server 2008 R2 SP1; Windows Server 2008 SP2 
Resolution: This issue is resolved in KB4493470

Back to top
OS Build 14393.2791

February 12, 2019
KB4487026
Resolved
KB4493470
Resolved:
April 09, 2019
10:00 AM PT

Opened:
February 12, 2019
10:00 AM PT
" @@ -117,8 +113,6 @@ sections: text: " - -
DetailsOriginating updateStatusHistory
Certain operations performed on a Cluster Shared Volume may fail
Certain operations, such as rename, that you perform on files or folders that are on a Cluster Shared Volume (CSV) may fail with the error, \"STATUS_BAD_IMPERSONATION_LEVEL (0xC00000A5)\". This occurs when you perform the operation on a CSV owner node from a process that doesn’t have administrator privilege. 

Affected platforms: 
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10, version 1607; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507;  Windows 10 Enterprise LTSB 2015; Windows 8.1
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2; Windows Server 2012
Workaround: Do one of the following:
  • Perform the operation from a process that has administrator privilege. 
  • Perform the operation from a node that doesn’t have CSV ownership.
Next steps: Microsoft is working on a resolution and will provide an update in an upcoming release.

Back to top
OS Build 14393.2724

January 08, 2019
KB4480961
Mitigated
Last updated:
April 25, 2019
02:00 PM PT

Opened:
January 08, 2019
10:00 AM PT
Internet Explorer 11 authentication issue with multiple concurrent logons
After installing KB4480961, Internet Explorer 11 and other applications that use WININET.DLL may have authentication issues. This occurs when two or more people use the same user account for multiple, concurrent login sessions on the same Windows Server machine, including Remote Desktop Protocol (RDP) and Terminal Server logons. Symptoms reported by customers include, but may not be limited to:
  • Cache size and location show zero or empty.
  • Keyboard shortcuts may not work properly.
  • Webpages may intermittently fail to load or render correctly.
  • Issues with credential prompts.
  • Issues when downloading files.
Affected platforms: 
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1607; Windows 10 Enterprise LTSC 2016; Windows 8.1; Windows 7 SP1
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server 2016; Windows Server 2012 R2; Windows Server 2012; Windows Server 2008 R2 SP1
Resolution: This issue was resolved in KB4493470.

Back to top
OS Build 14393.2724

January 08, 2019
KB4480961
Resolved
KB4493470
Resolved:
April 09, 2019
10:00 AM PT

Opened:
January 08, 2019
10:00 AM PT
MSXML6 may cause applications to stop responding
After installing KB4480961, MSXML6 causes applications to stop responding if an exception was thrown during node operations, such as appendChild(), insertBefore(), and moveNode().

The Group Policy editor may stop responding when editing a Group Policy Object (GPO) that contains Group Policy Preferences (GPP) for Internet Explorer 10 settings.

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10, version 1607; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 10 Enterprise LTSB 2015; Windows 8.1
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2; Windows Server 2012
Resolution: This issue was resolved in KB4493470.

Back to top
OS Build 14393.2724

January 08, 2019
KB4480961
Resolved
KB4493470
Resolved:
April 09, 2019
10:00 AM PT

Opened:
January 08, 2019
10:00 AM PT
" diff --git a/windows/release-information/status-windows-10-1703.yml b/windows/release-information/status-windows-10-1703.yml index 10d69d6cc5..c0cfa4ac36 100644 --- a/windows/release-information/status-windows-10-1703.yml +++ b/windows/release-information/status-windows-10-1703.yml @@ -60,11 +60,9 @@ sections: - type: markdown text: "
This table offers a summary of current active issues and those issues that have been resolved in the last 30 days.

+ - - -
SummaryOriginating updateStatusLast updated
Layout and cell size of Excel sheets may change when using MS UI Gothic
When using the MS UI Gothic or MS PGothic fonts, the text, layout, or cell size may become narrower or wider than expected in Microsoft Excel.

See details >
OS Build 15063.1771

April 25, 2019
KB4492242
Mitigated
May 10, 2019
10:35 AM PT
Certain operations performed on a Cluster Shared Volume may fail
Certain operations, such as rename, performed on files or folders on a Cluster Shared Volume (CSV) may fail with the error, \"STATUS_BAD_IMPERSONATION_LEVEL (0xC00000A5)\".

See details >
OS Build 15063.1563

January 08, 2019
KB4480973
Mitigated
April 25, 2019
02:00 PM PT
Custom URI schemes may not start corresponding application
Custom URI schemes for application protocol handlers may not start the corresponding application for local intranet and trusted sites in Internet Explorer.

See details >
OS Build 15063.1689

March 12, 2019
KB4489871
Resolved
KB4493436
April 25, 2019
02:00 PM PT
End-user-defined characters (EUDC) may cause blue screen at startup
If you enable per font end-user-defined characters (EUDC), the system may stop working and a blue screen may appear at startup.

See details >
OS Build 15063.1716

March 19, 2019
KB4489888
Resolved
KB4493474
April 09, 2019
10:00 AM PT
MSXML6 may cause applications to stop responding
MSXML6 may cause applications to stop responding if an exception was thrown during node operations, such as appendChild(), insertBefore(), and moveNode().

See details >
OS Build 15063.1563

January 08, 2019
KB4480973
Resolved
KB4493474
April 09, 2019
10:00 AM PT
Embedded objects may display incorrectly
Any compound document (OLE) server application that places embedded objects into the Windows Metafile (WMF) using the PatBlt API may display embedded objects incorrectly.

See details >
OS Build 15063.1631

February 12, 2019
KB4487020
Resolved
KB4493474
April 09, 2019
10:00 AM PT
" @@ -75,22 +73,21 @@ sections:
" +- title: May 2019 +- items: + - type: markdown + text: " + + +
DetailsOriginating updateStatusHistory
Layout and cell size of Excel sheets may change when using MS UI Gothic
When using the MS UI Gothic or MS PGothic fonts, the text, layout, or cell size may become narrower or wider than expected in Microsoft Excel. For example, the layout and cell size of Microsoft Excel sheets may change when using MS UI Gothic.

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10, version 1607; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 10 Enterprise LTSB 2015; Windows 8.1; Windows 7 SP1 
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2; Windows Server 2012; Windows Server 2008 R2 SP1; Windows Server 2008 SP2 
Workaround: Until a resolution is released, we recommend switching to a different Japanese font, such as Yu Gothic or MS Mincho. Alternatively, you can uninstall the optional update.

Next steps: Microsoft is working on a resolution and estimates a solution will be available in mid-May.

Back to top
OS Build 15063.1771

April 25, 2019
KB4492242
Mitigated
Last updated:
May 10, 2019
10:35 AM PT

Opened:
May 10, 2019
10:35 AM PT
+ " + - title: March 2019 - items: - type: markdown text: " - -
DetailsOriginating updateStatusHistory
Custom URI schemes may not start corresponding application
After installing KB4489871, custom URI schemes for application protocol handlers may not start the corresponding application for local intranet and trusted sites security zones on Internet Explorer.

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10, version 1607; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 10 Enterprise LTSB 2015; Windows 8.1; Windows 7 SP1 
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2; Windows Server 2008 R2 SP1
Resolution: This issue is resolved in KB4493436

Back to top
OS Build 15063.1689

March 12, 2019
KB4489871
Resolved
KB4493436
Resolved:
April 25, 2019
02:00 PM PT

Opened:
March 12, 2019
10:00 AM PT
End-user-defined characters (EUDC) may cause blue screen at startup
If you enable per font end-user-defined characters (EUDC), the system may stop working and a blue screen may appear at startup. This is not a common setting in non-Asian regions.

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10, version 1607; Windows 10 Enterprise LTSC 2016
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016
Resolution: This issue was resolved in KB4493474.

Back to top
OS Build 15063.1716

March 19, 2019
KB4489888
Resolved
KB4493474
Resolved:
April 09, 2019
10:00 AM PT

Opened:
March 19, 2019
10:00 AM PT
- " - -- title: February 2019 -- items: - - type: markdown - text: " - -
DetailsOriginating updateStatusHistory
Embedded objects may display incorrectly
Any compound document (OLE) server application that places embedded objects into the Windows Metafile (WMF) using the PatBlt API may display embedded objects incorrectly. 
 
For example, if you paste a Microsoft Excel worksheet object into a Microsoft Word document, the cells may render with a different background color. 
 
Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10, version 1607; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 10 Enterprise LTSB 2015; Windows 8.1; Windows 7 SP1 
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2; Windows Server 2012; Windows Server 2008 R2 SP1; Windows Server 2008 SP2 
Resolution: This issue is resolved in KB4493474

Back to top
OS Build 15063.1631

February 12, 2019
KB4487020
Resolved
KB4493474
Resolved:
April 09, 2019
10:00 AM PT

Opened:
February 12, 2019
10:00 AM PT
" @@ -100,6 +97,5 @@ sections: text: " -
DetailsOriginating updateStatusHistory
Certain operations performed on a Cluster Shared Volume may fail
Certain operations, such as rename, that you perform on files or folders that are on a Cluster Shared Volume (CSV) may fail with the error, “STATUS_BAD_IMPERSONATION_LEVEL (0xC00000A5)”. This occurs when you perform the operation on a CSV owner node from a process that doesn’t have administrator privilege. 

Affected platforms: 
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10, version 1607; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 10 Enterprise LTSB 2015; Windows 8.1
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2; Windows Server 2012
Workaround: Do one of the following: 
  • Perform the operation from a process that has administrator privilege. 
  • Perform the operation from a node that doesn’t have CSV ownership. 
Next steps: Microsoft is working on a resolution and will provide an update in an upcoming release.

Back to top
OS Build 15063.1563

January 08, 2019
KB4480973
Mitigated
Last updated:
April 25, 2019
02:00 PM PT

Opened:
January 08, 2019
10:00 AM PT
MSXML6 may cause applications to stop responding
After installing KB4480973, MSXML6 causes applications to stop responding if an exception was thrown during node operations, such as appendChild(), insertBefore(), and moveNode().

The Group Policy editor may stop responding when editing a Group Policy Object (GPO) that contains Group Policy Preferences (GPP) for Internet Explorer 10 settings.

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10, version 1607; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 10 Enterprise LTSB 2015; Windows 8.1
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2; Windows Server 2012
Resolution: This issue was resolved in KB4493474.

Back to top
OS Build 15063.1563

January 08, 2019
KB4480973
Resolved
KB4493474
Resolved:
April 09, 2019
10:00 AM PT

Opened:
January 08, 2019
10:00 AM PT
" diff --git a/windows/release-information/status-windows-10-1709.yml b/windows/release-information/status-windows-10-1709.yml index abdaf311b0..2618d42ebf 100644 --- a/windows/release-information/status-windows-10-1709.yml +++ b/windows/release-information/status-windows-10-1709.yml @@ -61,12 +61,9 @@ sections: text: "
This table offers a summary of current active issues and those issues that have been resolved in the last 30 days.

+ - - - -
SummaryOriginating updateStatusLast updated
Zone transfers over TCP may fail
Zone transfers between primary and secondary DNS servers over the Transmission Control Protocol (TCP) may fail.

See details >
OS Build 16299.1127

April 25, 2019
KB4493440
Investigating
April 25, 2019
02:00 PM PT
Layout and cell size of Excel sheets may change when using MS UI Gothic
When using the MS UI Gothic or MS PGothic fonts, the text, layout, or cell size may become narrower or wider than expected in Microsoft Excel.

See details >
OS Build 16299.1111

April 25, 2019
KB4492243
Mitigated
May 10, 2019
10:35 AM PT
Certain operations performed on a Cluster Shared Volume may fail
Certain operations, such as rename, performed on files or folders on a Cluster Shared Volume (CSV) may fail with the error, \"STATUS_BAD_IMPERSONATION_LEVEL (0xC00000A5)\".

See details >
OS Build 16299.904

January 08, 2019
KB4480978
Mitigated
April 25, 2019
02:00 PM PT
Custom URI schemes may not start corresponding application
Custom URI schemes for application protocol handlers may not start the corresponding application for local intranet and trusted sites in Internet Explorer.

See details >
OS Build 16299.1029

March 12, 2019
KB4489886
Resolved
KB4493440
April 25, 2019
02:00 PM PT
End-user-defined characters (EUDC) may cause blue screen at startup
If you enable per font end-user-defined characters (EUDC), the system may stop working and a blue screen may appear at startup.

See details >
OS Build 16299.1059

March 19, 2019
KB4489890
Resolved
KB4493441
April 09, 2019
10:00 AM PT
MSXML6 causes applications to stop responding if an exception was thrown
MSXML6 causes applications to stop responding if an exception was thrown during node operations, such as appendChild(), insertBefore(), and moveNode().

See details >
OS Build 16299.904

January 08, 2019
KB4480978
Resolved
KB4493441
April 09, 2019
10:00 AM PT
Stop error when attempting to start SSH from WSL
A stop error occurs when attempting to start Secure Shell from Windows Subsystem for Linux with agent forwarding using a command line switch (ssh –A) or a configuration setting.

See details >
OS Build 16299.1029

March 12, 2019
KB4489886
Resolved
KB4493441
April 09, 2019
10:00 AM PT
Embedded objects may display incorrectly
Any compound document (OLE) server application that places embedded objects into the Windows Metafile (WMF) using the PatBlt API may display embedded objects incorrectly.

See details >
OS Build 16299.967

February 12, 2019
KB4486996
Resolved
KB4493441
April 09, 2019
10:00 AM PT
" @@ -77,6 +74,15 @@ sections:
" +- title: May 2019 +- items: + - type: markdown + text: " + + +
DetailsOriginating updateStatusHistory
Layout and cell size of Excel sheets may change when using MS UI Gothic
When using the MS UI Gothic or MS PGothic fonts, the text, layout, or cell size may become narrower or wider than expected in Microsoft Excel. For example, the layout and cell size of Microsoft Excel sheets may change when using MS UI Gothic.

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10, version 1607; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 10 Enterprise LTSB 2015; Windows 8.1; Windows 7 SP1 
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2; Windows Server 2012; Windows Server 2008 R2 SP1; Windows Server 2008 SP2 
Workaround: Until a resolution is released, we recommend switching to a different Japanese font, such as Yu Gothic or MS Mincho. Alternatively, you can uninstall the optional update.

Next steps: Microsoft is working on a resolution and estimates a solution will be available in mid-May.

Back to top
OS Build 16299.1111

April 25, 2019
KB4492243
Mitigated
Last updated:
May 10, 2019
10:35 AM PT

Opened:
May 10, 2019
10:35 AM PT
+ " + - title: April 2019 - items: - type: markdown @@ -92,17 +98,6 @@ sections: text: " - - -
DetailsOriginating updateStatusHistory
Custom URI schemes may not start corresponding application
After installing KB4489886, custom URI schemes for application protocol handlers may not start the corresponding application for local intranet and trusted sites security zones on Internet Explorer.

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10, version 1607; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 10 Enterprise LTSB 2015; Windows 8.1; Windows 7 SP1 
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2; Windows Server 2008 R2 SP1
Resolution: This issue is resolved in KB4493440

Back to top
OS Build 16299.1029

March 12, 2019
KB4489886
Resolved
KB4493440
Resolved:
April 25, 2019
02:00 PM PT

Opened:
March 12, 2019
10:00 AM PT
End-user-defined characters (EUDC) may cause blue screen at startup
If you enable per font end-user-defined characters (EUDC), the system may stop working and a blue screen may appear at startup. This is not a common setting in non-Asian regions.

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10, version 1607; Windows 10 Enterprise LTSC 2016
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016
Resolution: This issue is resolved in KB4493441.

Back to top
OS Build 16299.1059

March 19, 2019
KB4489890
Resolved
KB4493441
Resolved:
April 09, 2019
10:00 AM PT

Opened:
March 19, 2019
10:00 AM PT
Stop error when attempting to start SSH from WSL
After applying KB4489886, a stop error occurs when attempting to start the Secure Shell (SSH) client program from Windows Subsystem for Linux (WSL) with agent forwarding enabled using a command line switch (ssh –A) or a configuration setting.

Affected platforms:
  • Client: Windows 10, version 1803; Windows 10, version 1709
  • Server: Windows Server, version 1803; Windows Server, version 1709
Resolution: This issue is resolved in KB4493441.

Back to top
OS Build 16299.1029

March 12, 2019
KB4489886
Resolved
KB4493441
Resolved:
April 09, 2019
10:00 AM PT

Opened:
March 12, 2019
10:00 AM PT
- " - -- title: February 2019 -- items: - - type: markdown - text: " - -
DetailsOriginating updateStatusHistory
Embedded objects may display incorrectly
Any compound document (OLE) server application that places embedded objects into the Windows Metafile (WMF) using the PatBlt API may display embedded objects incorrectly. 
 
For example, if you paste a Microsoft Excel worksheet object into a Microsoft Word document, the cells may render with a different background color. 
 
Affected platforms:  
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10, version 1607; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 10 Enterprise LTSB 2015; Windows 8.1; Windows 7 SP1 
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2; Windows Server 2012; Windows Server 2008 R2 SP1; Windows Server 2008 SP2 
Resolution: This issue is resolved in KB4493441

Back to top
OS Build 16299.967

February 12, 2019
KB4486996
Resolved
KB4493441
Resolved:
April 09, 2019
10:00 AM PT

Opened:
February 12, 2019
10:00 AM PT
" @@ -112,6 +107,5 @@ sections: text: " -
DetailsOriginating updateStatusHistory
Certain operations performed on a Cluster Shared Volume may fail
Certain operations, such as rename, that you perform on files or folders that are on a Cluster Shared Volume (CSV) may fail with the error, \"STATUS_BAD_IMPERSONATION_LEVEL (0xC00000A5)\". This occurs when you perform the operation on a CSV owner node from a process that doesn’t have administrator privilege. 

Affected platforms: 
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10, version 1607; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 10 Enterprise LTSB 2015; Windows 8.1
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2; Windows Server 2012
Workaround: Do one of the following:
  • Perform the operation from a process that has administrator privilege. 
  • Perform the operation from a node that doesn’t have CSV ownership. 
Next steps: Microsoft is working on a resolution and will provide an update in an upcoming release.

Back to top
OS Build 16299.904

January 08, 2019
KB4480978
Mitigated
Last updated:
April 25, 2019
02:00 PM PT

Opened:
January 08, 2019
10:00 AM PT
MSXML6 causes applications to stop responding if an exception was thrown
After installing KB4480978, MSXML6 causes applications to stop responding if an exception was thrown during node operations, such as appendChild(), insertBefore(), and moveNode().

The Group Policy editor may stop responding when editing a Group Policy Object (GPO) that contains Group Policy Preferences (GPP) for Internet Explorer 10 settings.

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10, version 1607; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 10 Enterprise LTSB 2015; Windows 8.1
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2; Windows Server 2012
Resolution: This issue is resolved in KB4493441.

Back to top
OS Build 16299.904

January 08, 2019
KB4480978
Resolved
KB4493441
Resolved:
April 09, 2019
10:00 AM PT

Opened:
January 08, 2019
10:00 AM PT
" diff --git a/windows/release-information/status-windows-10-1803.yml b/windows/release-information/status-windows-10-1803.yml index 3e58d9c048..9fea9cbeb3 100644 --- a/windows/release-information/status-windows-10-1803.yml +++ b/windows/release-information/status-windows-10-1803.yml @@ -61,14 +61,10 @@ sections: text: "
This table offers a summary of current active issues and those issues that have been resolved in the last 30 days.

+ - - - - -
SummaryOriginating updateStatusLast updated
Zone transfers over TCP may fail
Zone transfers between primary and secondary DNS servers over the Transmission Control Protocol (TCP) may fail.

See details >
OS Build 17134.753

April 25, 2019
KB4493437
Investigating
April 25, 2019
02:00 PM PT
Layout and cell size of Excel sheets may change when using MS UI Gothic
When using the MS UI Gothic or MS PGothic fonts, the text, layout, or cell size may become narrower or wider than expected in Microsoft Excel.

See details >
OS Build 17134.730

April 25, 2019
KB4492245
Mitigated
May 10, 2019
10:35 AM PT
Issue using PXE to start a device from WDS
Using PXE to start a device from a WDS server configured to use Variable Window Extension may cause the connection to the WDS server to terminate prematurely.

See details >
OS Build 17134.648

March 12, 2019
KB4489868
Mitigated
April 25, 2019
02:00 PM PT
Certain operations performed on a Cluster Shared Volume may fail
Certain operations, such as rename, performed on files or folders on a Cluster Shared Volume (CSV) may fail with the error, \"STATUS_BAD_IMPERSONATION_LEVEL (0xC00000A5)\".

See details >
OS Build 17134.523

January 08, 2019
KB4480966
Mitigated
April 25, 2019
02:00 PM PT
Custom URI schemes may not start corresponding application
Custom URI schemes for application protocol handlers may not start the corresponding application for local intranet and trusted sites in Internet Explorer.

See details >
OS Build 17134.648

March 12, 2019
KB4489868
Resolved
KB4493437
April 25, 2019
02:00 PM PT
End-user-defined characters (EUDC) may cause blue screen at startup
If you enable per font end-user-defined characters (EUDC), the system may stop working and a blue screen may appear at startup.

See details >
OS Build 17134.677

March 19, 2019
KB4489894
Resolved
KB4493464
April 09, 2019
10:00 AM PT
First character of the Japanese era name not recognized
The first character of the Japanese era name is not recognized as an abbreviation and may cause date parsing issues.

See details >
OS Build 17134.556

January 15, 2019
KB4480976
Resolved
KB4487029
April 09, 2019
10:00 AM PT
MSXML6 may cause applications to stop responding
MSXML6 may cause applications to stop responding if an exception was thrown during node operations, such as appendChild(), insertBefore(), and moveNode().

See details >
OS Build 17134.523

January 08, 2019
KB4480966
Resolved
KB4493464
April 09, 2019
10:00 AM PT
Stop error when attempting to start SSH from WSL
A stop error occurs when attempting to start Secure Shell from Windows Subsystem for Linux with agent forwarding using a command line switch (ssh –A) or a configuration setting.

See details >
OS Build 17134.648

March 12, 2019
KB4489868
Resolved
KB4493464
April 09, 2019
10:00 AM PT
Embedded objects may display incorrectly
Any compound document (OLE) server application that places embedded objects into the Windows Metafile (WMF) using the PatBlt API may display embedded objects incorrectly.

See details >
OS Build 17134.590

February 12, 2019
KB4487017
Resolved
KB4493464
April 09, 2019
10:00 AM PT
" @@ -79,6 +75,15 @@ sections:
" +- title: May 2019 +- items: + - type: markdown + text: " + + +
DetailsOriginating updateStatusHistory
Layout and cell size of Excel sheets may change when using MS UI Gothic
When using the MS UI Gothic or MS PGothic fonts, the text, layout, or cell size may become narrower or wider than expected in Microsoft Excel. For example, the layout and cell size of Microsoft Excel sheets may change when using MS UI Gothic.

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10, version 1607; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 10 Enterprise LTSB 2015; Windows 8.1; Windows 7 SP1 
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2; Windows Server 2012; Windows Server 2008 R2 SP1; Windows Server 2008 SP2 
Workaround: Until a resolution is released, we recommend switching to a different Japanese font, such as Yu Gothic or MS Mincho. Alternatively, you can uninstall the optional update.

Next steps: Microsoft is working on a resolution and estimates a solution will be available in mid-May.

Back to top
OS Build 17134.730

April 25, 2019
KB4492245
Mitigated
Last updated:
May 10, 2019
10:35 AM PT

Opened:
May 10, 2019
10:35 AM PT
+ " + - title: April 2019 - items: - type: markdown @@ -96,17 +101,6 @@ sections:
Issue using PXE to start a device from WDS
After installing KB4489868, there may be issues using the Preboot Execution Environment (PXE) to start a device from a Windows Deployment Services (WDS) server configured to use Variable Window Extension. This may cause the connection to the WDS server to terminate prematurely while downloading the image. This issue does not affect clients or devices that are not using Variable Window Extension. 

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1607; Windows 10 Enterprise LTSC 2016; Windows 8.1
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server 2016; Windows Server 2012 R2; Windows Server 2012
Workaround: To mitigate the issue, disable the Variable Window Extension on WDS server using one of the following options:

Option 1: 
Open an Administrator Command prompt and type the following:  
Wdsutil /Set-TransportServer /EnableTftpVariableWindowExtension:No
 

 Option 2: 
Use the Windows Deployment Services UI to make the following adjustment:  
  1. Open Windows Deployment Services from Windows Administrative Tools. 
  2. Expand Servers and right-click a WDS server. 
  3. Open its properties and clear the Enable Variable Window Extension box on the TFTP tab.  
Option 3: 
Set the following registry value to 0:
HKLM\\System\\CurrentControlSet\\Services\\WDSServer\\Providers\\WDSTFTP\\EnableVariableWindowExtension  

Restart the WDSServer service after disabling the Variable Window Extension. 
 
Next steps: Microsoft is working on a resolution and will provide an update in an upcoming release. 

Back to topOS Build 17134.648

March 12, 2019
KB4489868Mitigated
Last updated:
April 25, 2019
02:00 PM PT

Opened:
March 12, 2019
10:00 AM PT
Custom URI schemes may not start corresponding application
After installing KB4489868, custom URI schemes for application protocol handlers may not start the corresponding application for local intranet and trusted sites security zones on Internet Explorer. 

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10, version 1607; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 10 Enterprise LTSB 2015; Windows 8.1; Windows 7 SP1 
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2; Windows Server 2008 R2 SP1
Resolution: This issue is resolved in KB4493437

Back to topOS Build 17134.648

March 12, 2019
KB4489868Resolved
KB4493437Resolved:
April 25, 2019
02:00 PM PT

Opened:
March 12, 2019
10:00 AM PT -
End-user-defined characters (EUDC) may cause blue screen at startup
If you enable per font end-user-defined characters (EUDC), the system may stop working and a blue screen may appear at startup. This is not a common setting in non-Asian regions. 

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10, version 1607; Windows 10 Enterprise LTSC 2016
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016
Resolution: This issue was resolved in KB4493464

Back to topOS Build 17134.677

March 19, 2019
KB4489894Resolved
KB4493464Resolved:
April 09, 2019
10:00 AM PT

Opened:
March 19, 2019
10:00 AM PT -
Stop error when attempting to start SSH from WSL
After applying KB4489868, a stop error occurs when attempting to start the Secure Shell (SSH) client program from Windows Subsystem for Linux (WSL) with agent forwarding enabled using a command line switch (ssh -A) or a configuration setting.

Affected platforms:
  • Client: Windows 10, version 1803; Windows 10, version 1709
  • Server: Windows Server, version 1803; Windows Server, version 1709
Resolution: This issue was resolved in KB4493464.

Back to topOS Build 17134.648

March 12, 2019
KB4489868Resolved
KB4493464Resolved:
April 09, 2019
10:00 AM PT

Opened:
March 12, 2019
10:00 AM PT - - " - -- title: February 2019 -- items: - - type: markdown - text: " - -
DetailsOriginating updateStatusHistory
Embedded objects may display incorrectly
Any compound document (OLE) server application that places embedded objects into the Windows Metafile (WMF) using the PatBlt API may display embedded objects incorrectly. 
 
For example, if you paste a Microsoft Excel worksheet object into a Microsoft Word document, the cells may render with a different background color. 
 
Affected platforms:  
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10, version 1607; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 10 Enterprise LTSB 2015; Windows 8.1; Windows 7 SP1 
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2; Windows Server 2012; Windows Server 2008 R2 SP1; Windows Server 2008 SP2 
Resolution: This issue is resolved in KB4493464

Back to top
OS Build 17134.590

February 12, 2019
KB4487017
Resolved
KB4493464
Resolved:
April 09, 2019
10:00 AM PT

Opened:
February 12, 2019
10:00 AM PT
" @@ -116,7 +110,5 @@ sections: text: " - -
DetailsOriginating updateStatusHistory
Certain operations performed on a Cluster Shared Volume may fail
Certain operations, such as rename, that you perform on files or folders that are on a Cluster Shared Volume (CSV) may fail with the error, \"STATUS_BAD_IMPERSONATION_LEVEL (0xC00000A5)\". This occurs when you perform the operation on a CSV owner node from a process that doesn’t have administrator privilege.

Affected platforms: 
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10, version 1607; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 10 Enterprise LTSB 2015; Windows 8.1
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2; Windows Server 2012
Workaround: Do one of the following:
  • Perform the operation from a process that has administrator privilege. 
  • Perform the operation from a node that doesn’t have CSV ownership. 
Next steps: Microsoft is working on a resolution and will provide an update in an upcoming release.

Back to top
OS Build 17134.523

January 08, 2019
KB4480966
Mitigated
Last updated:
April 25, 2019
02:00 PM PT

Opened:
January 08, 2019
10:00 AM PT
First character of the Japanese era name not recognized
After installing KB4480976, the first character of the Japanese era name is not recognized as an abbreviation and may cause date parsing issues.

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10, version 1607; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 10 Enterprise LTSB 2015; Windows 8.1; Windows 7 SP1
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2; Windows Server 2012; Windows Server 2008 R2 SP1; Windows Server 2008 SP2
Resolution: This issue is resolved in KB4487029

Back to top
OS Build 17134.556

January 15, 2019
KB4480976
Resolved
KB4487029
Resolved:
February 19, 2019
02:00 PM PT

Opened:
January 08, 2019
10:00 AM PT
MSXML6 may cause applications to stop responding
After installing KB4480966, MSXML6 causes applications to stop responding if an exception was thrown during node operations, such as appendChild(), insertBefore(), and moveNode().

The Group Policy editor may stop responding when editing a Group Policy Object (GPO) that contains Group Policy Preferences (GPP) for Internet Explorer 10 settings.

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10, version 1607; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 10 Enterprise LTSB 2015; Windows 8.1
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2; Windows Server 2012
Resolution: This issue was resolved in KB4493464

Back to top
OS Build 17134.523

January 08, 2019
KB4480966
Resolved
KB4493464
Resolved:
April 09, 2019
10:00 AM PT

Opened:
January 08, 2019
10:00 AM PT
" diff --git a/windows/release-information/status-windows-10-1809-and-windows-server-2019.yml b/windows/release-information/status-windows-10-1809-and-windows-server-2019.yml index 2b50998415..afb53b80c9 100644 --- a/windows/release-information/status-windows-10-1809-and-windows-server-2019.yml +++ b/windows/release-information/status-windows-10-1809-and-windows-server-2019.yml @@ -65,6 +65,7 @@ sections: - type: markdown text: "
This table offers a summary of current active issues and those issues that have been resolved in the last 30 days.

+ @@ -73,10 +74,6 @@ sections: - - - -
SummaryOriginating updateStatusLast updated
Layout and cell size of Excel sheets may change when using MS UI Gothic
When using the MS UI Gothic or MS PGothic fonts, the text, layout, or cell size may become narrower or wider than expected in Microsoft Excel.

See details >
OS Build 17763.475

May 03, 2019
KB4495667
Mitigated
May 10, 2019
10:35 AM PT
Devices with some Asian language packs installed may receive an error
After installing the KB4493509 devices with some Asian language packs installed may receive the error, \"0x800f0982 - PSFX_E_MATCHING_COMPONENT_NOT_F

See details >
OS Build 17763.437

April 09, 2019
KB4493509
Mitigated
May 03, 2019
10:59 AM PT
Printing from Microsoft Edge or other UWP apps, you may receive the error 0x80070007
Attempting to print from Microsoft Edge or other Universal Windows Platform (UWP) applications, you may receive an error.

See details >
OS Build 17763.379

March 12, 2019
KB4489899
Mitigated
May 02, 2019
04:47 PM PT
Issue using PXE to start a device from WDS
Using PXE to start a device from a WDS server configured to use Variable Window Extension may cause the connection to the WDS server to terminate prematurely.

See details >
OS Build 17763.379

March 12, 2019
KB4489899
Mitigated
April 09, 2019
10:00 AM PT
Latest cumulative update (KB 4495667) installs automatically
Reports that the optional cumulative update (KB 4495667) installs automatically.

See details >
OS Build 17763.475

May 03, 2019
KB4495667
Resolved
May 08, 2019
03:37 PM PT
System may be unresponsive after restart if ArcaBit antivirus software installed
After further investigation ArcaBit has confirmed this issue is not applicable to Windows 10, version 1809

See details >
OS Build 17763.437

April 09, 2019
KB4493509
Resolved
May 08, 2019
03:30 PM PT
Custom URI schemes may not start corresponding application
Custom URI schemes for application protocol handlers may not start the corresponding application for local intranet and trusted sites in Internet Explorer.

See details >
OS Build 17763.379

March 12, 2019
KB4489899
Resolved
KB4495667
May 03, 2019
12:40 PM PT
End-user-defined characters (EUDC) may cause blue screen at startup
If you enable per font end-user-defined characters (EUDC), the system may stop working and a blue screen may appear at startup.

See details >
OS Build 17763.404

April 02, 2019
KB4490481
Resolved
KB4493509
April 09, 2019
10:00 AM PT
Internet Explorer 11 authentication issue with multiple concurrent logons
Internet Explorer 11 users may encounter issues if two or more people use the same user account for multiple, concurrent login sessions on the same Windows Server machine.

See details >
OS Build 17763.253

January 08, 2019
KB4480116
Resolved
KB4493509
April 09, 2019
10:00 AM PT
MSXML6 may cause applications to stop responding
MSXML6 may cause applications to stop responding if an exception was thrown during node operations, such as appendChild(), insertBefore(), and moveNode().

See details >
OS Build 17763.253

January 08, 2019
KB4480116
Resolved
KB4493509
April 09, 2019
10:00 AM PT
Embedded objects may display incorrectly
Any compound document (OLE) server application that places embedded objects into the Windows Metafile (WMF) using the PatBlt API may display embedded objects incorrectly.

See details >
OS Build 17763.316

February 12, 2019
KB4487044
Resolved
KB4493509
April 09, 2019
10:00 AM PT
" @@ -92,6 +89,7 @@ sections: - type: markdown text: " + @@ -104,7 +102,6 @@ sections: text: "
DetailsOriginating updateStatusHistory
Layout and cell size of Excel sheets may change when using MS UI Gothic
When using the MS UI Gothic or MS PGothic fonts, the text, layout, or cell size may become narrower or wider than expected in Microsoft Excel. For example, the layout and cell size of Microsoft Excel sheets may change when using MS UI Gothic.

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10, version 1607; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 10 Enterprise LTSB 2015; Windows 8.1; Windows 7 SP1 
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2; Windows Server 2012; Windows Server 2008 R2 SP1; Windows Server 2008 SP2 
Workaround: Until a resolution is released, we recommend switching to a different Japanese font, such as Yu Gothic or MS Mincho. Alternatively, you can uninstall the optional update.

Next steps: Microsoft is working on a resolution and estimates a solution will be available in mid-May.

Back to top
OS Build 17763.475

May 03, 2019
KB4495667
Mitigated
Last updated:
May 10, 2019
10:35 AM PT

Opened:
May 10, 2019
10:35 AM PT
Devices with some Asian language packs installed may receive an error
After installing the April 2019 Cumulative Update (KB4493509), devices with some Asian language packs installed may receive the error, \"0x800f0982 - PSFX_E_MATCHING_COMPONENT_NOT_FOUND.\"

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019
  • Server: Windows Server, version 1809; Windows Server 2019
Workaround:
  1. Uninstall and reinstall any recently added language packs. For instructions, see \"Manage the input and display language settings in Windows 10\".
  2. Click Check for Updates and install the April 2019 Cumulative Update. For instructions, see \"Update Windows 10\".
Note: If reinstalling the language pack does not mitigate the issue, reset your PC as follows:
  1. Go to Settings app -> Recovery.
  2. Click on Get Started under \"Reset this PC\" recovery option.
  3. Select \"Keep my Files\".
Next steps: Microsoft is working on a resolution and will provide an update in an upcoming release.

Back to top
OS Build 17763.437

April 09, 2019
KB4493509
Mitigated
Last updated:
May 03, 2019
10:59 AM PT

Opened:
May 02, 2019
04:36 PM PT
Printing from Microsoft Edge or other UWP apps, you may receive the error 0x80070007
When attempting to print from Microsoft Edge or other Universal Windows Platform (UWP) applications you may receive the error, \"Your printer has experienced an unexpected configuration problem. 0x80070007e.\"
 
Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019
  • Server: Windows Server, version 1809; Windows Server 2019
Workaround: You can use another browser, such as Internet Explorer to print your documents.
 
Next steps: Microsoft is working on a resolution and will provide an update in an upcoming release.

Back to top
OS Build 17763.379

March 12, 2019
KB4489899
Mitigated
Last updated:
May 02, 2019
04:47 PM PT

Opened:
May 02, 2019
04:47 PM PT
Latest cumulative update (KB 4495667) installs automatically
Due to a servicing side issue some users were offered KB4495667 (optional update) automatically and rebooted devices. This issue has been mitigated.

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019
  • Server: Windows Server, version 1809; Windows Server 2019
Resolution:: This issue has been mitigated on the servicing side to prevent auto installing of this update. Customers do not need to take any action.

Back to top
OS Build 17763.475

May 03, 2019
KB4495667
Resolved
Resolved:
May 08, 2019
03:37 PM PT

Opened:
May 05, 2019
12:01 PM PT
-
DetailsOriginating updateStatusHistory
System may be unresponsive after restart if ArcaBit antivirus software installed
ArcaBit has confirmed this issue is not applicable to Windows 10, version 1809 (client or server).

Microsoft and ArcaBit have identified an issue on devices with ArcaBit antivirus software installed that may cause the system to become unresponsive upon restart.

Affected platforms:
  • Client: Windows 8.1; Windows 7 SP1
  • Server: Windows Server 2012 R2; Windows Server 2008 R2 SP1
Workaround: ArcaBit has released an update to address this issue for affected platforms. For more information, see the ArcaBit support article.

Resolution: This issue has been resolved. ArcaBit has confirmed this issue is not applicable to Windows 10, version 1809 (client or server).

Back to top
OS Build 17763.437

April 09, 2019
KB4493509
Resolved
Resolved:
May 08, 2019
03:30 PM PT

Opened:
April 09, 2019
10:00 AM PT
End-user-defined characters (EUDC) may cause blue screen at startup
If you enable per font end-user-defined characters (EUDC), the system will stop working and a blue screen may appear at startup. This is not a common setting in non-Asian regions.

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10, version 1607; Windows 10 Enterprise LTSC 2016
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016
Resolution: This issue was resolved in KB4493509.

Back to top
OS Build 17763.404

April 02, 2019
KB4490481
Resolved
KB4493509
Resolved:
April 09, 2019
10:00 AM PT

Opened:
April 02, 2019
10:00 AM PT
" @@ -119,23 +116,12 @@ sections: " -- title: February 2019 -- items: - - type: markdown - text: " - - -
DetailsOriginating updateStatusHistory
Embedded objects may display incorrectly
Any compound document (OLE) server application that places embedded objects into the Windows Metafile (WMF) using the PatBlt API may display embedded objects incorrectly. 
 
For example, if you paste a Microsoft Excel worksheet object into a Microsoft Word document, the cells may render with a different background color. 
 
Affected platforms:  
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10, version 1607; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 10 Enterprise LTSB 2015; Windows 8.1; Windows 7 SP1  
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2; Windows Server 2012; Windows Server 2008 R2 SP1; Windows Server 2008 SP2  
Resolution: This issue is resolved in KB4493509.  

Back to top
OS Build 17763.316

February 12, 2019
KB4487044
Resolved
KB4493509
Resolved:
April 09, 2019
10:00 AM PT

Opened:
February 12, 2019
10:00 AM PT
- " - - title: January 2019 - items: - type: markdown text: " - -
DetailsOriginating updateStatusHistory
Certain operations performed on a Cluster Shared Volume may fail
Certain operations, such as rename, that you perform on files or folders that are on a Cluster Shared Volume (CSV) may fail with the error, \"STATUS_BAD_IMPERSONATION_LEVEL (0xC00000A5)\". This occurs when you perform the operation on a CSV owner node from a process that doesn’t have administrator privilege. 

Affected platforms: 
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10, version 1607; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 10 Enterprise LTSB 2015; Windows 8.1
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2; Windows Server 2012
Workaround: Do one of the following:  
  • Perform the operation from a process that has administrator privilege. 
  • Perform the operation from a node that doesn’t have CSV ownership. 
Next steps: Microsoft is working on a resolution and will provide an update in an upcoming release.

Back to top
OS Build 17763.253

January 08, 2019
KB4480116
Mitigated
Last updated:
April 09, 2019
10:00 AM PT

Opened:
January 08, 2019
10:00 AM PT
Internet Explorer 11 authentication issue with multiple concurrent logons
After installing KB4480116, Internet Explorer 11 and other applications that use WININET.DLL may have authentication issues. This occurs when two or more people use the same user account for multiple, concurrent login sessions on the same Windows Server machine, including Remote Desktop Protocol (RDP) and Terminal Server logons. Symptoms reported by customers include, but may not be limited to: 
  • Cache size and location show zero or empty. 
  • Keyboard shortcuts may not work properly. 
  • Webpages may intermittently fail to load or render correctly. 
  • Issues with credential prompts. 
  • Issues when downloading files. 
Affected platforms: 
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1607; Windows 10 Enterprise LTSC 2016; Windows 8.1; Windows 7 SP1
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server 2016; Windows Server 2012 R2; Windows Server 2012; Windows Server 2008 R2 SP1
Resolution: This issue was resolved in KB4493509

Back to top
OS Build 17763.253

January 08, 2019
KB4480116
Resolved
KB4493509
Resolved:
April 09, 2019
10:00 AM PT

Opened:
January 08, 2019
10:00 AM PT
MSXML6 may cause applications to stop responding
After installing KB4480116, MSXML6 causes applications to stop responding if an exception was thrown during node operations, such as appendChild(), insertBefore(), and moveNode().
 
The Group Policy editor may stop responding when editing a Group Policy Object (GPO) that contains Group Policy Preferences (GPP) for Internet Explorer 10 settings. 

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10, version 1607; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 10 Enterprise LTSB 2015; Windows 8.1
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2; Windows Server 2012
Resolution: This issue was resolved in KB4493509

Back to top
OS Build 17763.253

January 08, 2019
KB4480116
Resolved
KB4493509
Resolved:
April 09, 2019
10:00 AM PT

Opened:
January 08, 2019
10:00 AM PT
" diff --git a/windows/release-information/status-windows-7-and-windows-server-2008-r2-sp1.yml b/windows/release-information/status-windows-7-and-windows-server-2008-r2-sp1.yml index ef1b22e4bf..0ce3cb79c0 100644 --- a/windows/release-information/status-windows-7-and-windows-server-2008-r2-sp1.yml +++ b/windows/release-information/status-windows-7-and-windows-server-2008-r2-sp1.yml @@ -60,16 +60,13 @@ sections: - type: markdown text: "
This table offers a summary of current active issues and those issues that have been resolved in the last 30 days.

+ - - - -
SummaryOriginating updateStatusLast updated
Layout and cell size of Excel sheets may change when using MS UI Gothic
When using the MS UI Gothic or MS PGothic fonts, the text, layout, or cell size may become narrower or wider than expected in Microsoft Excel.

See details >
April 25, 2019
KB4493453
Mitigated
May 10, 2019
10:35 AM PT
System may be unresponsive after restart if ArcaBit antivirus software installed
Devices with ArcaBit antivirus software installed may become unresponsive upon restart.

See details >
April 09, 2019
KB4493472
Mitigated
May 08, 2019
03:29 PM PT
System may be unresponsive after restart if Avira antivirus software installed
Devices with Avira antivirus software installed may become unresponsive upon restart.

See details >
April 09, 2019
KB4493472
Mitigated
May 03, 2019
08:50 AM PT
Authentication may fail for services after the Kerberos ticket expires
Authentication may fail for services that require unconstrained delegation after the Kerberos ticket expires.

See details >
March 12, 2019
KB4489878
Mitigated
April 25, 2019
02:00 PM PT
System unresponsive after restart if Sophos Endpoint Protection installed
Devices with Sophos Endpoint Protection installed and managed by Sophos Central or Sophos Enterprise Console (SEC) may become unresponsive upon restart.

See details >
April 09, 2019
KB4493472
Mitigated
April 25, 2019
02:00 PM PT
System may be unresponsive after restart with certain McAfee antivirus products
Devices with McAfee Endpoint Security Threat Prevention 10.x, Host Intrusion Prevention 8.0, or VirusScan Enterprise 8.8 may be slow or unresponsive at startup.

See details >
April 09, 2019
KB4493472
Mitigated
April 25, 2019
02:00 PM PT
Devices may not respond at login or Welcome screen if running certain Avast software
Devices running Avast for Business, Avast CloudCare, and AVG Business Edition antivirus software may become unresponsive after restart.

See details >
April 09, 2019
KB4493472
Resolved
April 25, 2019
02:00 PM PT
Internet Explorer 11 authentication issue with multiple concurrent logons
Internet Explorer 11 users may encounter issues if two or more people use the same user account for multiple, concurrent login sessions on the same Windows Server machine.

See details >
January 08, 2019
KB4480970
Resolved
KB4493472
April 09, 2019
10:00 AM PT
Custom URI schemes may not start corresponding application
Custom URI schemes for application protocol handlers may not start the corresponding application for local intranet and trusted sites in Internet Explorer.

See details >
March 12, 2019
KB4489878
Resolved
KB4493472
April 09, 2019
10:00 AM PT
NETDOM.EXE fails to run
NETDOM.EXE fails to run and the error, “The command failed to complete successfully.” appears on screen.

See details >
March 12, 2019
KB4489878
Resolved
KB4493472
April 09, 2019
10:00 AM PT
Embedded objects may display incorrectly
Any compound document (OLE) server application that places embedded objects into the Windows Metafile (WMF) using the PatBlt API may display embedded objects incorrectly.

See details >
February 12, 2019
KB4486563
Resolved
KB4493472
April 09, 2019
10:00 AM PT
" @@ -80,6 +77,15 @@ sections:
" +- title: May 2019 +- items: + - type: markdown + text: " + + +
DetailsOriginating updateStatusHistory
Layout and cell size of Excel sheets may change when using MS UI Gothic
When using the MS UI Gothic or MS PGothic fonts, the text, layout, or cell size may become narrower or wider than expected in Microsoft Excel. For example, the layout and cell size of Microsoft Excel sheets may change when using MS UI Gothic.

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10, version 1607; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 10 Enterprise LTSB 2015; Windows 8.1; Windows 7 SP1 
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2; Windows Server 2012; Windows Server 2008 R2 SP1; Windows Server 2008 SP2 
Workaround: Until a resolution is released, we recommend switching to a different Japanese font, such as Yu Gothic or MS Mincho. Alternatively, you can uninstall the optional update.

Next steps: Microsoft is working on a resolution and estimates a solution will be available in mid-May.

Back to top
April 25, 2019
KB4493453
Mitigated
Last updated:
May 10, 2019
10:35 AM PT

Opened:
May 10, 2019
10:35 AM PT
+ " + - title: April 2019 - items: - type: markdown @@ -99,25 +105,5 @@ sections: text: " - - -
DetailsOriginating updateStatusHistory
Authentication may fail for services after the Kerberos ticket expires
After installing KB4489878, some customers report that authentication fails for services that require unconstrained delegation after the Kerberos ticket expires (the default is 10 hours). For example, the SQL server service fails.

Affected platforms: 
  • Client: Windows 7 SP1
  • Server: Windows Server 2008 R2 SP1; Windows Server 2008 SP2
Workaround: To mitigate this issue, use one of the following options:
  • Option 1: Purge the Kerberos tickets on the application server. After the Kerberos ticket expires, the issue will occur again, and you must purge the tickets again.
  • Option 2: If purging does not mitigate the issue, restart the application; for example, restart the Internet Information Services (IIS) app pool associated with the SQL server.
  • Option 3: Use constrained delegation.
Next steps: Microsoft is working on a resolution and will provide an update in an upcoming release.

Back to top
March 12, 2019
KB4489878
Mitigated
Last updated:
April 25, 2019
02:00 PM PT

Opened:
March 12, 2019
10:00 AM PT
Custom URI schemes may not start corresponding application
After installing KB4489878, custom URI schemes for application protocol handlers may not start the corresponding application for local intranet and trusted sites on Internet Explorer.

Affected platforms: 
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10, version 1607; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 10 Enterprise LTSB 2015; Windows 8.1; Windows 7 SP1 
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2; Windows Server 2008 R2 SP1 
Resolution: This issue is resolved in KB4493472.

Back to top
March 12, 2019
KB4489878
Resolved
KB4493472
Resolved:
April 09, 2019
10:00 AM PT

Opened:
March 12, 2019
10:00 AM PT
NETDOM.EXE fails to run
After installing KB4489878, NETDOM.EXE fails to run, and the on-screen error, “The command failed to complete successfully.” appears.

Affected platforms: 
  • Client: Windows 7 SP1
  • Server: Windows Server 2008 R2 SP1; Windows Server 2008 SP2
Resolution: This issue is resolved in KB4493472.

Back to top
March 12, 2019
KB4489878
Resolved
KB4493472
Resolved:
April 09, 2019
10:00 AM PT

Opened:
March 12, 2019
10:00 AM PT
- " - -- title: February 2019 -- items: - - type: markdown - text: " - - -
DetailsOriginating updateStatusHistory
Embedded objects may display incorrectly
Any compound document (OLE) server application that places embedded objects into the Windows Metafile (WMF) using the PatBlt API may display embedded objects incorrectly. 
 
For example, if you paste a Microsoft Excel worksheet object into a Microsoft Word document, the cells may render with a different background color. 
 
Affected platforms:  
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10, version 1607; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 10 Enterprise LTSB 2015; Windows 8.1; Windows 7 SP1 
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2; Windows Server 2012; Windows Server 2008 R2 SP1; Windows Server 2008 SP2 
Resolution: This issue is resolved in KB4493472

Back to top
February 12, 2019
KB4486563
Resolved
KB4493472
Resolved:
April 09, 2019
10:00 AM PT

Opened:
February 12, 2019
10:00 AM PT
- " - -- title: January 2019 -- items: - - type: markdown - text: " - -
DetailsOriginating updateStatusHistory
Internet Explorer 11 authentication issue with multiple concurrent logons
After installing KB4480970, Internet Explorer 11 and other applications that use WININET.DLL may have authentication issues. This occurs when two or more people use the same user account for multiple, concurrent login sessions on the same Windows Server machine, including Remote Desktop Protocol (RDP) and Terminal Server logons. Symptoms reported by customers include, but may not be limited to:
  • Cache size and location show zero or empty.
  • Keyboard shortcuts may not work properly.
  • Webpages may intermittently fail to load or render correctly.
  • Issues with credential prompts.
  • Issues when downloading files.
Affected platforms: 
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1607; Windows 10 Enterprise LTSC 2016; Windows 8.1; Windows 7 SP1
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server 2016; Windows Server 2012 R2; Windows Server 2012; Windows Server 2008 R2 SP1
Resolution: This issue is resolved in KB4493472.

Back to top
January 08, 2019
KB4480970
Resolved
KB4493472
Resolved:
April 09, 2019
10:00 AM PT

Opened:
January 08, 2019
10:00 AM PT
" diff --git a/windows/release-information/status-windows-8.1-and-windows-server-2012-r2.yml b/windows/release-information/status-windows-8.1-and-windows-server-2012-r2.yml index e159932ae6..a16b0e0d20 100644 --- a/windows/release-information/status-windows-8.1-and-windows-server-2012-r2.yml +++ b/windows/release-information/status-windows-8.1-and-windows-server-2012-r2.yml @@ -60,6 +60,7 @@ sections: - type: markdown text: "
This table offers a summary of current active issues and those issues that have been resolved in the last 30 days.

+ @@ -67,10 +68,6 @@ sections: - - - -
SummaryOriginating updateStatusLast updated
Layout and cell size of Excel sheets may change when using MS UI Gothic
When using the MS UI Gothic or MS PGothic fonts, the text, layout, or cell size may become narrower or wider than expected in Microsoft Excel.

See details >
April 25, 2019
KB4493443
Mitigated
May 10, 2019
10:35 AM PT
System may be unresponsive after restart if ArcaBit antivirus software installed
Devices with ArcaBit antivirus software installed may become unresponsive upon restart.

See details >
April 09, 2019
KB4493446
Mitigated
May 08, 2019
03:29 PM PT
System may be unresponsive after restart if Avira antivirus software installed
Devices with Avira antivirus software installed may become unresponsive upon restart.

See details >
April 09, 2019
KB4493446
Mitigated
May 03, 2019
08:50 AM PT
Issue using PXE to start a device from WDS
There may be issues using the Preboot Execution Environment (PXE) to start a device from a Windows Deployment Services (WDS) server configured to use Variable Window Extension.

See details >
March 12, 2019
KB4489881
Mitigated
April 25, 2019
02:00 PM PT
Certain operations performed on a Cluster Shared Volume may fail
Certain operations, such as rename, performed on files or folders on a Cluster Shared Volume (CSV) may fail with the error, “STATUS_BAD_IMPERSONATION_LEVEL (0xC00000A5)”.

See details >
January 08, 2019
KB4480963
Mitigated
April 25, 2019
02:00 PM PT
System may be unresponsive after restart with certain McAfee antivirus products
Devices with McAfee Endpoint Security Threat Prevention 10.x, Host Intrusion Prevention 8.0, or VirusScan Enterprise 8.8 may be slow or unresponsive at startup.

See details >
April 09, 2019
KB4493446
Mitigated
April 18, 2019
05:00 PM PT
Devices may not respond at login or Welcome screen if running certain Avast software
Devices running Avast for Business, Avast CloudCare, and AVG Business Edition antivirus software may become unresponsive after restart.

See details >
April 09, 2019
KB4493446
Resolved
April 25, 2019
02:00 PM PT
Internet Explorer 11 authentication issue with multiple concurrent logons
Internet Explorer 11 users may encounter issues if two or more people use the same user account for multiple, concurrent login sessions on the same Windows Server machine.

See details >
January 08, 2019
KB4480963
Resolved
KB4493446
April 09, 2019
10:00 AM PT
MSXML6 may cause applications to stop responding.
MSXML6 may cause applications to stop responding if an exception was thrown during node operations, such as appendChild(), insertBefore(), and moveNode().

See details >
January 08, 2019
KB4480963
Resolved
KB4493446
April 09, 2019
10:00 AM PT
Custom URI schemes may not start corresponding application
Custom URI schemes for application protocol handlers may not start the corresponding application for local intranet and trusted sites in Internet Explorer.

See details >
March 12, 2019
KB4489881
Resolved
KB4493446
April 09, 2019
10:00 AM PT
Embedded objects may display incorrectly
Any compound document (OLE) server application that places embedded objects into the Windows Metafile (WMF) using the PatBlt API may display embedded objects incorrectly.

See details >
February 12, 2019
KB4487000
Resolved
KB4493446
April 09, 2019
10:00 AM PT
" @@ -81,6 +78,15 @@ sections:
" +- title: May 2019 +- items: + - type: markdown + text: " + + +
DetailsOriginating updateStatusHistory
Layout and cell size of Excel sheets may change when using MS UI Gothic
When using the MS UI Gothic or MS PGothic fonts, the text, layout, or cell size may become narrower or wider than expected in Microsoft Excel. For example, the layout and cell size of Microsoft Excel sheets may change when using MS UI Gothic.

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10, version 1607; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 10 Enterprise LTSB 2015; Windows 8.1; Windows 7 SP1 
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2; Windows Server 2012; Windows Server 2008 R2 SP1; Windows Server 2008 SP2 
Workaround: Until a resolution is released, we recommend switching to a different Japanese font, such as Yu Gothic or MS Mincho. Alternatively, you can uninstall the optional update.

Next steps: Microsoft is working on a resolution and estimates a solution will be available in mid-May.

Back to top
April 25, 2019
KB4493443
Mitigated
Last updated:
May 10, 2019
10:35 AM PT

Opened:
May 10, 2019
10:35 AM PT
+ " + - title: April 2019 - items: - type: markdown @@ -101,16 +107,6 @@ sections: - -
DetailsOriginating updateStatusHistory
Issue using PXE to start a device from WDS
After installing KB4489881, there may be issues using the Preboot Execution Environment (PXE) to start a device from a Windows Deployment Services (WDS) server configured to use Variable Window Extension. This may cause the connection to the WDS server to terminate prematurely while downloading the image. This issue does not affect clients or devices that are not using Variable Window Extension.

Affected platforms: 
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1607; Windows 10 Enterprise LTSC 2016; Windows 8.1 
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server 2016; Windows Server 2012 R2; Windows Server 2012 
Workaround: To mitigate the issue, disable the Variable Window Extension on WDS server using one of the following options:

Option 1:
Open an Administrator Command prompt and type the following:
Wdsutil /Set-TransportServer /EnableTftpVariableWindowExtension:No
 

Option 2:
Use the Windows Deployment Services UI to make the following adjustment:
  1. Open Windows Deployment Services from Windows Administrative Tools.
  2. Expand Servers and right-click a WDS server.
  3. Open its properties and clear the Enable Variable Window Extension box on the TFTP tab.
Option 3:
Set the following registry value to 0:
HKLM\\System\\CurrentControlSet\\Services\\WDSServer\\Providers\\WDSTFTP\\EnableVariableWindowExtension

Restart the WDSServer service after disabling the Variable Window Extension.

Next steps: Microsoft is working on a resolution and will provide an update in an upcoming release.

Back to top
March 12, 2019
KB4489881
Mitigated
Last updated:
April 25, 2019
02:00 PM PT

Opened:
March 12, 2019
10:00 AM PT
Custom URI schemes may not start corresponding application
After installing KB4489881, custom URI schemes for application protocol handlers may not start the corresponding application for local intranet and trusted sites security zones on Internet Explorer.

Affected platforms: 
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10, version 1607; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 10 Enterprise LTSB 2015; Windows 8.1; Windows 7 SP1 
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2; Windows Server 2008 R2 SP1 
Resolution: This issue is resolved in KB4493446.

Back to top
March 12, 2019
KB4489881
Resolved
KB4493446
Resolved:
April 09, 2019
10:00 AM PT

Opened:
March 12, 2019
10:00 AM PT
- " - -- title: February 2019 -- items: - - type: markdown - text: " - -
DetailsOriginating updateStatusHistory
Embedded objects may display incorrectly
Any compound document (OLE) server application that places embedded objects into the Windows Metafile (WMF) using the PatBlt API may display embedded objects incorrectly.

For example, if you paste a Microsoft Excel worksheet object into a Microsoft Word document, the cells may render with a different background color.

Affected platforms 
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10, version 1607; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 10 Enterprise LTSB 2015; Windows 8.1; Windows 7 SP1 
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2; Windows Server 2012; Windows Server 2008 R2 SP1; Windows Server 2008 SP2 
Resolution: This issue is resolved in KB4493446.

Back to top
February 12, 2019
KB4487000
Resolved
KB4493446
Resolved:
April 09, 2019
10:00 AM PT

Opened:
February 12, 2019
10:00 AM PT
" @@ -120,7 +116,5 @@ sections: text: " - -
DetailsOriginating updateStatusHistory
Certain operations performed on a Cluster Shared Volume may fail
Certain operations, such as rename, that you perform on files or folders that are on a Cluster Shared Volume (CSV) may fail with the error, “STATUS_BAD_IMPERSONATION_LEVEL (0xC00000A5)”. This occurs when you perform the operation on a CSV owner node from a process that doesn’t have administrator privilege.

Affected platforms: 
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10, version 1607; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 10 Enterprise LTSB 2015; Windows 8.1
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2; Windows Server 2012
Workaround: Do one of the following:
  • Perform the operation from a process that has administrator privilege.
  • Perform the operation from a node that doesn’t have CSV ownership.
Next steps: Microsoft is working on a resolution and will provide an update in an upcoming release.

Back to top
January 08, 2019
KB4480963
Mitigated
Last updated:
April 25, 2019
02:00 PM PT

Opened:
January 08, 2019
10:00 AM PT
Internet Explorer 11 authentication issue with multiple concurrent logons
After installing KB4480963, Internet Explorer 11 and other applications that use WININET.DLL may have authentication issues. This occurs when two or more people use the same user account for multiple, concurrent login sessions on the same Windows Server machine, including Remote Desktop Protocol (RDP) and Terminal Server logons. Symptoms reported by customers include, but may not be limited to:
  • Cache size and location show zero or empty.
  • Keyboard shortcuts may not work properly.
  • Webpages may intermittently fail to load or render correctly.
  • Issues with credential prompts.
  • Issues when downloading files.
Affected platforms: 
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1607; Windows 10 Enterprise LTSC 2016; Windows 8.1; Windows 7 SP1
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server 2016; Windows Server 2012 R2; Windows Server 2012; Windows Server 2008 R2 SP1
Resolution: This issue is resolved in KB4493446.

Back to top
January 08, 2019
KB4480963
Resolved
KB4493446
Resolved:
April 09, 2019
10:00 AM PT

Opened:
January 08, 2019
10:00 AM PT
MSXML6 may cause applications to stop responding.
After installing KB4480963, MSXML6 causes applications to stop responding if an exception was thrown during node operations, such as appendChild(), insertBefore(), and moveNode().

The Group Policy editor may stop responding when editing a Group Policy Object (GPO) that contains Group Policy Preferences (GPP) for Internet Explorer 10 settings.

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10, version 1607; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 10 Enterprise LTSB 2015; Windows 8.1
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2; Windows Server 2012
Resolution: This issue is resolved in KB4493446.

Back to top
January 08, 2019
KB4480963
Resolved
KB4493446
Resolved:
April 09, 2019
10:00 AM PT

Opened:
January 08, 2019
10:00 AM PT
" diff --git a/windows/release-information/status-windows-server-2008-sp2.yml b/windows/release-information/status-windows-server-2008-sp2.yml index 102f665769..689abfde38 100644 --- a/windows/release-information/status-windows-server-2008-sp2.yml +++ b/windows/release-information/status-windows-server-2008-sp2.yml @@ -63,8 +63,6 @@ sections:
System may be unresponsive after restart if Avira antivirus software installed
Devices with Avira antivirus software installed may become unresponsive upon restart.

See details >April 09, 2019
KB4493471Mitigated
May 03, 2019
08:51 AM PT
System unresponsive after restart if Sophos Endpoint Protection installed
Devices with Sophos Endpoint Protection installed and managed by Sophos Central or Sophos Enterprise Console (SEC) may become unresponsive upon restart.

See details >April 09, 2019
KB4493471Mitigated
April 25, 2019
02:00 PM PT
Authentication may fail for services after the Kerberos ticket expires
Authentication may fail for services that require unconstrained delegation after the Kerberos ticket expires.

See details >March 12, 2019
KB4489880Mitigated
April 25, 2019
02:00 PM PT -
Embedded objects may display incorrectly
Any compound document (OLE) server application that places embedded objects into the Windows Metafile (WMF) using the PatBlt API may display embedded objects incorrectly.

See details >February 12, 2019
KB4487023Resolved
KB4493471April 09, 2019
10:00 AM PT -
NETDOM.EXE fails to run
NETDOM.EXE fails to run and the error, “The command failed to complete successfully.” appears on screen.

See details >March 12, 2019
KB4489880Resolved
KB4493471April 09, 2019
10:00 AM PT " @@ -91,15 +89,5 @@ sections: text: " - -
DetailsOriginating updateStatusHistory
Authentication may fail for services after the Kerberos ticket expires
After installing KB4489880, some customers report that authentication fails for services that require unconstrained delegation after the Kerberos ticket expires (the default is 10 hours). For example, the SQL server service fails.

Affected platforms: 
  • Client: Windows 7 SP1
  • Server: Windows Server 2008 R2 SP1; Windows Server 2008 SP2
Workaround: To mitigate this issue, use one of the following options:
  • Option 1: Purge the Kerberos tickets on the application server. After the Kerberos ticket expires, the issue will occur again, and you must purge the tickets again.
  • Option 2: If purging does not mitigate the issue, restart the application; for example, restart the Internet Information Services (IIS) app pool associated with the SQL server.
  • Option 3: Use constrained delegation.
Next steps: Microsoft is working on a resolution and will provide an update in an upcoming release.

Back to top
March 12, 2019
KB4489880
Mitigated
Last updated:
April 25, 2019
02:00 PM PT

Opened:
March 12, 2019
10:00 AM PT
NETDOM.EXE fails to run
After installing KB4489880, NETDOM.EXE fails to run, and the on-screen error, “The command failed to complete successfully.” appears.

Affected platforms: 
  • Client: Windows 7 SP1
  • Server: Windows Server 2008 R2 SP1; Windows Server 2008 SP2
Resolution: This issue is resolved in KB4493471.

Back to top
March 12, 2019
KB4489880
Resolved
KB4493471
Resolved:
April 09, 2019
10:00 AM PT

Opened:
March 12, 2019
10:00 AM PT
- " - -- title: February 2019 -- items: - - type: markdown - text: " - -
DetailsOriginating updateStatusHistory
Embedded objects may display incorrectly
Any compound document (OLE) server application that places embedded objects into the Windows Metafile (WMF) using the PatBlt API may display embedded objects incorrectly.

For example, if you paste a Microsoft Excel worksheet object into a Microsoft Word document, the cells may render with a different background color.

Affected platforms 
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10, version 1607; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 10 Enterprise LTSB 2015; Windows 8.1; Windows 7 SP1 
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2; Windows Server 2012; Windows Server 2008 R2 SP1; Windows Server 2008 SP2
Resolution: This issue is resolved in KB4493471.

Back to top
February 12, 2019
KB4487023
Resolved
KB4493471
Resolved:
April 09, 2019
10:00 AM PT

Opened:
February 12, 2019
10:00 AM PT
" diff --git a/windows/release-information/status-windows-server-2012.yml b/windows/release-information/status-windows-server-2012.yml index 831a726f86..be5f206c02 100644 --- a/windows/release-information/status-windows-server-2012.yml +++ b/windows/release-information/status-windows-server-2012.yml @@ -60,13 +60,11 @@ sections: - type: markdown text: "
This table offers a summary of current active issues and those issues that have been resolved in the last 30 days.

+ - - -
SummaryOriginating updateStatusLast updated
Layout and cell size of Excel sheets may change when using MS UI Gothic
When using the MS UI Gothic or MS PGothic fonts, the text, layout, or cell size may become narrower or wider than expected in Microsoft Excel.

See details >
April 25, 2019
KB4493462
Mitigated
May 10, 2019
10:35 AM PT
System may be unresponsive after restart if Avira antivirus software installed
Devices with Avira antivirus software installed may become unresponsive upon restart.

See details >
April 09, 2019
KB4493451
Mitigated
May 03, 2019
08:51 AM PT
Issue using PXE to start a device from WDS
There may be issues using the Preboot Execution Environment (PXE) to start a device from a Windows Deployment Services (WDS) server configured to use Variable Window Extension.

See details >
March 12, 2019
KB4489891
Mitigated
April 25, 2019
02:00 PM PT
System unresponsive after restart if Sophos Endpoint Protection installed
Devices with Sophos Endpoint Protection installed and managed by Sophos Central or Sophos Enterprise Console (SEC) may become unresponsive upon restart.

See details >
April 09, 2019
KB4493451
Mitigated
April 25, 2019
02:00 PM PT
Certain operations performed on a Cluster Shared Volume may fail
Certain operations, such as rename, performed on files or folders on a Cluster Shared Volume (CSV) may fail with the error, “STATUS_BAD_IMPERSONATION_LEVEL (0xC00000A5)”.

See details >
January 08, 2019
KB4480975
Mitigated
April 25, 2019
02:00 PM PT
Internet Explorer 11 authentication issue with multiple concurrent logons
Internet Explorer 11 users may encounter issues if two or more people use the same user account for multiple, concurrent login sessions on the same Windows Server machine.

See details >
January 08, 2019
KB4480975
Resolved
KB4493451
April 09, 2019
10:00 AM PT
MSXML6 may cause applications to stop responding
MSXML6 may cause applications to stop responding if an exception was thrown during node operations, such as appendChild(), insertBefore(), and moveNode().

See details >
January 08, 2019
KB4480975
Resolved
KB4493451
April 09, 2019
10:00 AM PT
Embedded objects may display incorrectly
Any compound document (OLE) server application that places embedded objects into the Windows Metafile (WMF) using the PatBlt API may display embedded objects incorrectly.

See details >
February 12, 2019
KB4487025
Resolved
KB4493451
April 09, 2019
10:00 AM PT
" @@ -77,6 +75,15 @@ sections:
" +- title: May 2019 +- items: + - type: markdown + text: " + + +
DetailsOriginating updateStatusHistory
Layout and cell size of Excel sheets may change when using MS UI Gothic
When using the MS UI Gothic or MS PGothic fonts, the text, layout, or cell size may become narrower or wider than expected in Microsoft Excel. For example, the layout and cell size of Microsoft Excel sheets may change when using MS UI Gothic.

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10, version 1607; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 10 Enterprise LTSB 2015; Windows 8.1; Windows 7 SP1 
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2; Windows Server 2012; Windows Server 2008 R2 SP1; Windows Server 2008 SP2 
Workaround: Until a resolution is released, we recommend switching to a different Japanese font, such as Yu Gothic or MS Mincho. Alternatively, you can uninstall the optional update.

Next steps: Microsoft is working on a resolution and estimates a solution will be available in mid-May.

Back to top
April 25, 2019
KB4493462
Mitigated
Last updated:
May 10, 2019
10:35 AM PT

Opened:
May 10, 2019
10:35 AM PT
+ " + - title: April 2019 - items: - type: markdown @@ -97,22 +104,11 @@ sections: " -- title: February 2019 -- items: - - type: markdown - text: " - - -
DetailsOriginating updateStatusHistory
Embedded objects may display incorrectly
Any compound document (OLE) server application that places embedded objects into the Windows Metafile (WMF) using the PatBlt API may display embedded objects incorrectly.

For example, if you paste a Microsoft Excel worksheet object into a Microsoft Word document, the cells may render with a different background color.

Affected platforms 
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10, version 1607; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 10 Enterprise LTSB 2015; Windows 8.1; Windows 7 SP1 
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2; Windows Server 2012; Windows Server 2008 R2 SP1; Windows Server 2008 SP2 
Resolution: This issue is resolved in KB4493451.

Back to top
February 12, 2019
KB4487025
Resolved
KB4493451
Resolved:
April 09, 2019
10:00 AM PT

Opened:
February 12, 2019
10:00 AM PT
- " - - title: January 2019 - items: - type: markdown text: " - -
DetailsOriginating updateStatusHistory
Certain operations performed on a Cluster Shared Volume may fail
Certain operations, such as rename, that you perform on files or folders that are on a Cluster Shared Volume (CSV) may fail with the error, \"STATUS_BAD_IMPERSONATION_LEVEL (0xC00000A5)\". This occurs when you perform the operation on a CSV owner node from a process that doesn’t have administrator privilege.

Affected platforms: 
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10, version 1607; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 10 Enterprise LTSB 2015; Windows 8.1
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2; Windows Server 2012
Workaround: Do one of the following:
  • Perform the operation from a process that has administrator privilege.
  • Perform the operation from a node that doesn’t have CSV ownership.
Next steps: Microsoft is working on a resolution and will provide an update in an upcoming release.

Back to top
January 08, 2019
KB4480975
Mitigated
Last updated:
April 25, 2019
02:00 PM PT

Opened:
January 08, 2019
10:00 AM PT
Internet Explorer 11 authentication issue with multiple concurrent logons
After installing KB4480975, Internet Explorer 11 and other applications that use WININET.DLL may have authentication issues. This occurs when two or more people use the same user account for multiple, concurrent login sessions on the same Windows Server machine, including Remote Desktop Protocol (RDP) and Terminal Server logons. Symptoms reported by customers include, but may not be limited to:
  • Cache size and location show zero or empty.
  • Keyboard shortcuts may not work properly.
  • Webpages may intermittently fail to load or render correctly.
  • Issues with credential prompts.
  • Issues when downloading files.
Affected platforms: 
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1607; Windows 10 Enterprise LTSC 2016; Windows 8.1; Windows 7 SP1
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server 2016; Windows Server 2012 R2; Windows Server 2012; Windows Server 2008 R2 SP1
Resolution: This issue is resolved in KB4493451.

Back to top
January 08, 2019
KB4480975
Resolved
KB4493451
Resolved:
April 09, 2019
10:00 AM PT

Opened:
January 08, 2019
10:00 AM PT
MSXML6 may cause applications to stop responding
After installing KB4480975, MSXML6 causes applications to stop responding if an exception was thrown during node operations, such as appendChild(), insertBefore(), and moveNode().

The Group Policy editor may stop responding when editing a Group Policy Object (GPO) that contains Group Policy Preferences (GPP) for Internet Explorer 10 settings.

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10, version 1607; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 10 Enterprise LTSB 2015; Windows 8.1
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2; Windows Server 2012
Resolution: This issue is resolved in KB4493451.

Back to top
January 08, 2019
KB4480975
Resolved
KB4493451
Resolved:
April 09, 2019
10:00 AM PT

Opened:
January 08, 2019
10:00 AM PT
" diff --git a/windows/release-information/windows-message-center.yml b/windows/release-information/windows-message-center.yml index 2a4ba41456..64f62b302e 100644 --- a/windows/release-information/windows-message-center.yml +++ b/windows/release-information/windows-message-center.yml @@ -50,6 +50,13 @@ sections: text: " + - +

/ui:<ComputerName>\\<LocalUserName>

@@ -500,17 +500,17 @@ By default, all users are migrated. The only way to specify which users to inclu
  • /uel:2002/1/15 migrates users who have logged on or been modified January 15, 2002 or afterwards.

  • For example:

    -

    scanstate /i:migapp.xml /i:migdocs.xml \\server\share\migration\mystore /uel:0

    +

    scanstate /i:migapp.xml /i:migdocs.xml \\\server\share\migration\mystore /uel:0

    - +

    /ue:<ComputerName>\\<LocalUserName>

    +

    scanstate /i:migdocs.xml /i:migapp.xml \\\server\share\migration\mystore /ue:contoso\user1

    MessageDate
    Reminder: Windows 10 update servicing cadence
    This month we received questions about the cadence of updates we released in April and May 2019. Here's a quick recap of our releases and servicing cadence:
    +
      +
    • April 9, 2019 was the regular Update Tuesday release for all versions of Windows.
    • +
    • May 1, 2019 was an \"optional\" out of band update (OOB), non-security update for Windows 10, version 1809. It was released to Microsoft Catalog and WSUS, providing a critical fix for our OEM partners.
    • +
    • May 3, 2019 was the \"optional\" Windows 10, version 1809 \"C\" release for April. This update contained important Japanese era packages for commercial customers to preview. It was released later than expected and mistakenly targeted as \"required\" (instead of \"optional\") for consumers, which pushed the update out to customers and required a reboot. Within 24 hours of receiving customer reports, we corrected the targeting logic and mitigated the issue.
    • +
    + For more information about the Windows 10 update servicing cadence, please see the Window IT Pro blog.
    May 10, 2019
    10:00 AM PT
    Take action: Install servicing stack update for Windows Server 2008 SP2 for SHA-2 code sign support
    A standalone update, KB4493730, that introduce SHA-2 code sign support for the servicing stack (SSU) was released today as a security update.
    April 19, 2019
    10:00 AM PT
    The benefits of Windows 10 Dynamic Update
    Dynamic Update can help organizations and end users alike ensure that their Windows 10 devices have the latest feature update content (as part of an in-place upgrade)—and preserve precious features on demand (FODs) and language packs (LPs) that may have been previously installed.

    From 774a98767c45c9edaf490cd3ef55e6d0ab648518 Mon Sep 17 00:00:00 2001 From: ManikaDhiman Date: Fri, 10 May 2019 15:38:34 -0700 Subject: [PATCH 485/724] Added 19H1 policy --- .../policy-configuration-service-provider.md | 4 ++ .../mdm/policy-csp-experience.md | 72 +++++++++++++++++++ 2 files changed, 76 insertions(+) diff --git a/windows/client-management/mdm/policy-configuration-service-provider.md b/windows/client-management/mdm/policy-configuration-service-provider.md index 4913c03360..8c6acf42f8 100644 --- a/windows/client-management/mdm/policy-configuration-service-provider.md +++ b/windows/client-management/mdm/policy-configuration-service-provider.md @@ -1262,6 +1262,9 @@ The following diagram shows the Policy configuration service provider in tree fo
    Experience/PreventUsersFromTurningOnBrowserSyncing
    +
    + Experience/ShowLockOnUserTile +
    ### ExploitGuard policies @@ -4369,6 +4372,7 @@ The following diagram shows the Policy configuration service provider in tree fo - [Experience/DoNotShowFeedbackNotifications](./policy-csp-experience.md#experience-donotshowfeedbacknotifications) - [Experience/DoNotSyncBrowserSettings](./policy-csp-experience.md#experience-donotsyncbrowsersetting) - [Experience/PreventUsersFromTurningOnBrowserSyncing](./policy-csp-experience.md#experience-preventusersfromturningonbrowsersyncing) +- [Experience/ShowLockOnUserTile](policy-csp-experience.md#experience-showlockonusertile) - [ExploitGuard/ExploitProtectionSettings](./policy-csp-exploitguard.md#exploitguard-exploitprotectionsettings) - [FileExplorer/TurnOffDataExecutionPreventionForExplorer](./policy-csp-fileexplorer.md#fileexplorer-turnoffdataexecutionpreventionforexplorer) - [FileExplorer/TurnOffHeapTerminationOnCorruption](./policy-csp-fileexplorer.md#fileexplorer-turnoffheapterminationoncorruption) diff --git a/windows/client-management/mdm/policy-csp-experience.md b/windows/client-management/mdm/policy-csp-experience.md index c0d7b7cad4..cbc286da97 100644 --- a/windows/client-management/mdm/policy-csp-experience.md +++ b/windows/client-management/mdm/policy-csp-experience.md @@ -96,6 +96,9 @@ ms.date: 05/01/2019
    Experience/PreventUsersFromTurningOnBrowserSyncing
    +
    + Experience/ShowLockOnUserTile +
    @@ -1569,6 +1572,75 @@ Validation procedure: +
    + + +**Experience/ShowLockOnUserTile** + + + + + + + + + + + + + + + + + + + + + +
    HomeProBusinessEnterpriseEducationMobileMobile Enterprise
    cross markcross markcheck mark6check mark6check mark6
    + + + +[Scope](./policy-configuration-service-provider.md#policy-scope): + +> [!div class = "checklist"] +> * Device + +
    + + + +Shows or hides lock from the user tile menu. + +If you enable this policy setting, the lock option is shown in the User Tile menu. + +If you disable this policy setting, the lock option is never shown in the User Tile menu. + +If you do not configure this policy setting, the lock option is shown in the User Tile menu. Users can choose if they want to show the lock in the user tile menu from the Power Options control panel. + + + +ADMX Info: +- GP English name: *Show lock in the user tile menu* +- GP name: *ShowLockOption* +- GP path: *File Explorer* +- GP ADMX file name: *WindowsExplorer.admx* + + + +Supported values: +- false (default) - The lock option is not displayed in the User Tile menu. +- true - The lock option is displayed in the User Tile menu. + + + + + + + + + + From 4a6b92476cd5d6d6b3e81b89bfafe7f0e8ffddbb Mon Sep 17 00:00:00 2001 From: Greg Lindsay Date: Fri, 10 May 2019 15:47:51 -0700 Subject: [PATCH 486/724] draft --- windows/deployment/windows-autopilot/TOC.md | 1 + .../windows-autopilot/pre-provisioning.md | 22 +++++++++++++++++++ 2 files changed, 23 insertions(+) create mode 100644 windows/deployment/windows-autopilot/pre-provisioning.md diff --git a/windows/deployment/windows-autopilot/TOC.md b/windows/deployment/windows-autopilot/TOC.md index 35cd9c6cba..3b57a30541 100644 --- a/windows/deployment/windows-autopilot/TOC.md +++ b/windows/deployment/windows-autopilot/TOC.md @@ -5,6 +5,7 @@ ### [Network requirements](windows-autopilot-requirements-network.md) ### [Licensing requirements](windows-autopilot-requirements-licensing.md) ## [Scenarios and Capabilities](windows-autopilot-scenarios.md) +### [Pre-provisioning](pre-provisioning.md) ### [Support for existing devices](existing-devices.md) ### [User-driven mode](user-driven.md) #### [Azure Active Directory joined](user-driven-aad.md) diff --git a/windows/deployment/windows-autopilot/pre-provisioning.md b/windows/deployment/windows-autopilot/pre-provisioning.md new file mode 100644 index 0000000000..91a2f06219 --- /dev/null +++ b/windows/deployment/windows-autopilot/pre-provisioning.md @@ -0,0 +1,22 @@ +--- +title: Windows Autopilot pre-provisioning +description: Windows Autopilot pre-provisioning +keywords: mdm, setup, windows, windows 10, oobe, manage, deploy, autopilot, ztd, zero-touch, partner, msfb, intune +ms.prod: w10 +ms.mktglfcycl: deploy +ms.localizationpriority: low +ms.sitesec: library +ms.pagetype: deploy +author: greg-lindsay +ms.author: greg-lindsay +ms.collection: M365-modern-desktop +ms.topic: article +--- + +# Windows Autopilot pre-provisoning + +**Applies to: Windows 10, version 1903** + +With Windows 10, version 1903 and later, Windows Autopilot provides a "white glove" service enabling partners or IT staff to pre-provision a Windows 10 PC to be fully configured and business-ready for the organization or user​. + +## Prerequisites From 3f8aed8f7b7117226619b32b71b2f35501014996 Mon Sep 17 00:00:00 2001 From: Jose Ortega Date: Sat, 11 May 2019 03:22:18 -0500 Subject: [PATCH 487/724] added note for #874 --- ...ndows-operating-system-components-to-microsoft-services.md | 4 +++- 1 file changed, 3 insertions(+), 1 deletion(-) diff --git a/windows/privacy/manage-connections-from-windows-operating-system-components-to-microsoft-services.md b/windows/privacy/manage-connections-from-windows-operating-system-components-to-microsoft-services.md index 58d06760a9..c669ded36f 100644 --- a/windows/privacy/manage-connections-from-windows-operating-system-components-to-microsoft-services.md +++ b/windows/privacy/manage-connections-from-windows-operating-system-components-to-microsoft-services.md @@ -768,7 +768,9 @@ To remove the News app: - Right-click the app in Start, and then click **Uninstall**. -or- - +>[!IMPORTANT] +> If you have any issue with this commands, go ahead a do a system reboot,and try the scripts again. +> - Remove the app for new user accounts. From an elevated command prompt, run the following Windows PowerShell command: **Get-AppxProvisionedPackage -Online | Where-Object {$\_.PackageName -Like "Microsoft.BingNews"} | ForEach-Object { Remove-AppxProvisionedPackage -Online -PackageName $\_.PackageName}** -and- From 08adcc05c8efc4971f6ce37ca17df24e1263de0b Mon Sep 17 00:00:00 2001 From: illfated Date: Sun, 21 Apr 2019 08:09:45 +0200 Subject: [PATCH 488/724] Mobile Device Management: duplicate entry in XSD Remove duplicate entry in the XSD for the ProfileXML node in VPNv2 CSP. XSD XML lines can contain the elements - name - minOccurs - maxOccurs These elements can alter between having the values 0, 1 or unbound, but can only appear once in each XSD XML element line. Closes #1950 --- windows/client-management/mdm/vpnv2-profile-xsd.md | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/windows/client-management/mdm/vpnv2-profile-xsd.md b/windows/client-management/mdm/vpnv2-profile-xsd.md index 87b64762f7..330c7fc340 100644 --- a/windows/client-management/mdm/vpnv2-profile-xsd.md +++ b/windows/client-management/mdm/vpnv2-profile-xsd.md @@ -132,7 +132,7 @@ Here's the XSD for the ProfileXML node in VPNv2 CSP for Windows 10 and some pro - + From 7c2b0b98bdea9032629c8f45266e5f5bb13a4fe9 Mon Sep 17 00:00:00 2001 From: illfated Date: Sat, 27 Apr 2019 06:45:36 +0200 Subject: [PATCH 489/724] USMT ScanState Syntax: hidden unescaped characters Asterisks, backslashes or combinations of asterisk and backslash need to be escaped for the character to migrate properly to the docs.microsoft.com site as visible text in HTML. Github shows the characters well enough, but the migration process does not seem to keep the special characters through the MarkDown-to-HTML conversion. In this PR, I have made a "best effort" attempt to resolve the missing or malformed command examples in the "USMT ScanState Syntax" page. Closes #2388 --- .../deployment/usmt/usmt-scanstate-syntax.md | 34 +++++++++---------- 1 file changed, 17 insertions(+), 17 deletions(-) diff --git a/windows/deployment/usmt/usmt-scanstate-syntax.md b/windows/deployment/usmt/usmt-scanstate-syntax.md index 3090160049..67c879d27a 100644 --- a/windows/deployment/usmt/usmt-scanstate-syntax.md +++ b/windows/deployment/usmt/usmt-scanstate-syntax.md @@ -455,9 +455,9 @@ By default, all users are migrated. The only way to specify which users to inclu

    USMT migrates all user accounts on the computer, unless you specifically exclude an account with either the /ue or /uel options. For this reason, you do not need to specify this option on the command line. However, if you choose to specify the /all option, you cannot also use the /ui, /ue or /uel options.

    /ui:<DomainName>\<UserName>

    +

    /ui:<DomainName>\\<UserName>

    or

    -

    /ui:<ComputerName>\<LocalUserName>

    (User include)

    Migrates the specified users. By default, all users are included in the migration. Therefore, this option is helpful only when used with the /ue or /uel options. You can specify multiple /ui options, but you cannot use the /ui option with the /all option. DomainName and UserName can contain the asterisk (*) wildcard character. When you specify a user name that contains spaces, you will need to surround it with quotation marks.

    @@ -469,10 +469,10 @@ By default, all users are migrated. The only way to specify which users to inclu

    For example:

      -
    • To include only User2 from the Fabrikam domain, type:

      -

      /ue:*\* /ui:fabrikam\user2

    • -
    • To migrate all users from the Fabrikam domain, and only the user accounts from other domains that have been active or otherwise modified in the last 30 days, type:

      -

      /uel:30 /ui:fabrikam\*

      +

      To include only User2 from the Fabrikam domain, type:

      +

      /ue:\*\\\* /ui:fabrikam\user2

      +

      To migrate all users from the Fabrikam domain, and only the user accounts from other domains that have been active or otherwise modified in the last 30 days, type:

      +

      /uel:30 /ui:fabrikam\\\*

      In this example, a user account from the Contoso domain that was last modified 2 months ago will not be migrated.

    For more examples, see the descriptions of the /ue and /ui options in this table.

    /ue:<DomainName>\<UserName>

    +

    /ue:<DomainName>\\<UserName>

    -or-

    -

    /ue:<ComputerName>\<LocalUserName>

    (User exclude)

    Excludes the specified users from the migration. You can specify multiple /ue options. You cannot use this option with the /all option. <DomainName> and <UserName> can contain the asterisk (*) wildcard character. When you specify a user name that contains spaces, you need to surround it with quotation marks.

    For example:

    -

    scanstate /i:migdocs.xml /i:migapp.xml \\server\share\migration\mystore /ue:contoso\user1

    @@ -548,15 +548,15 @@ The following examples apply to both the /**ui** and /**ue** options. You can re

    Exclude all domain users.

    -

    /ue:Domain\*

    +

    /ue:Domain\\\*

    Exclude all local users.

    -

    /ue:%computername%\*

    +

    /ue:%computername%\\\*

    Exclude users in all domains named User1, User2, and so on.

    -

    /ue:*\user*

    +

    /ue:\*\user\*

    @@ -586,23 +586,23 @@ The /**uel** option takes precedence over the /**ue** option. If a user has logg

    Include only User2 from the Fabrikam domain and exclude all other users.

    -

    /ue:*\* /ui:fabrikam\user2

    +

    /ue:\*\\\* /ui:fabrikam\user2

    Include only the local user named User1 and exclude all other users.

    -

    /ue:*\* /ui:user1

    +

    /ue:\*\\\* /ui:user1

    Include only the domain users from Contoso, except Contoso\User1.

    This behavior cannot be completed using a single command. Instead, to migrate this set of users, you will need to specify the following:

      -
    • On the ScanState command line, type: /ue:*\* /ui:contoso\*

    • +
    • On the ScanState command line, type: /ue:\*\\\* /ui:contoso\*

    • On the LoadState command line, type: /ue:contoso\user1

    Include only local (non-domain) users.

    -

    /ue:*\* /ui:%computername%\*

    +

    /ue:\*\\\* /ui:%computername%\\\*

    From 0c29aa345115c4123bf56a0990cc79c8ea108645 Mon Sep 17 00:00:00 2001 From: illfated Date: Sat, 27 Apr 2019 07:39:02 +0200 Subject: [PATCH 490/724] Use ASCII character codes instead of backslash - change from using backslashes as escape character to use \ as the direct character for backslash - replace asterisks with * where needed --- .../deployment/usmt/usmt-scanstate-syntax.md | 30 +++++++++---------- 1 file changed, 15 insertions(+), 15 deletions(-) diff --git a/windows/deployment/usmt/usmt-scanstate-syntax.md b/windows/deployment/usmt/usmt-scanstate-syntax.md index 67c879d27a..15e9ea1b2d 100644 --- a/windows/deployment/usmt/usmt-scanstate-syntax.md +++ b/windows/deployment/usmt/usmt-scanstate-syntax.md @@ -455,9 +455,9 @@ By default, all users are migrated. The only way to specify which users to inclu

    USMT migrates all user accounts on the computer, unless you specifically exclude an account with either the /ue or /uel options. For this reason, you do not need to specify this option on the command line. However, if you choose to specify the /all option, you cannot also use the /ui, /ue or /uel options.

    -

    /ui:<DomainName>\\<UserName>

    +

    /ui:<DomainName>\<UserName>

    or

    -

    /ui:<ComputerName>\\<LocalUserName>

    +

    /ui:<ComputerName>\<LocalUserName>

    (User include)

    Migrates the specified users. By default, all users are included in the migration. Therefore, this option is helpful only when used with the /ue or /uel options. You can specify multiple /ui options, but you cannot use the /ui option with the /all option. DomainName and UserName can contain the asterisk (*) wildcard character. When you specify a user name that contains spaces, you will need to surround it with quotation marks.

    @@ -470,9 +470,9 @@ By default, all users are migrated. The only way to specify which users to inclu

    For example:

      To include only User2 from the Fabrikam domain, type:

      -

      /ue:\*\\\* /ui:fabrikam\user2

      +

      /ue:*\* /ui:fabrikam\user2

      To migrate all users from the Fabrikam domain, and only the user accounts from other domains that have been active or otherwise modified in the last 30 days, type:

      -

      /uel:30 /ui:fabrikam\\\*

      +

      /uel:30 /ui:fabrikam\*

      In this example, a user account from the Contoso domain that was last modified 2 months ago will not be migrated.

    For more examples, see the descriptions of the /ue and /ui options in this table.

    @@ -500,17 +500,17 @@ By default, all users are migrated. The only way to specify which users to inclu
  • /uel:2002/1/15 migrates users who have logged on or been modified January 15, 2002 or afterwards.

  • For example:

    -

    scanstate /i:migapp.xml /i:migdocs.xml \\\server\share\migration\mystore /uel:0

    +

    scanstate /i:migapp.xml /i:migdocs.xml \\server\share\migration\mystore /uel:0

    -

    /ue:<DomainName>\\<UserName>

    +

    /ue:<DomainName>\<UserName>

    -or-

    -

    /ue:<ComputerName>\\<LocalUserName>

    +

    /ue:<ComputerName>\<LocalUserName>

    (User exclude)

    Excludes the specified users from the migration. You can specify multiple /ue options. You cannot use this option with the /all option. <DomainName> and <UserName> can contain the asterisk (*) wildcard character. When you specify a user name that contains spaces, you need to surround it with quotation marks.

    For example:

    -

    scanstate /i:migdocs.xml /i:migapp.xml \\\server\share\migration\mystore /ue:contoso\user1

    +

    scanstate /i:migdocs.xml /i:migapp.xml \\server\share\migration\mystore /ue:contoso\user1

    @@ -548,15 +548,15 @@ The following examples apply to both the /**ui** and /**ue** options. You can re

    Exclude all domain users.

    -

    /ue:Domain\\\*

    +

    /ue:Domain\*

    Exclude all local users.

    -

    /ue:%computername%\\\*

    +

    /ue:%computername%\*

    Exclude users in all domains named User1, User2, and so on.

    -

    /ue:\*\user\*

    +

    /ue:*\user*

    @@ -586,23 +586,23 @@ The /**uel** option takes precedence over the /**ue** option. If a user has logg

    Include only User2 from the Fabrikam domain and exclude all other users.

    -

    /ue:\*\\\* /ui:fabrikam\user2

    +

    /ue:*\* /ui:fabrikam\user2

    Include only the local user named User1 and exclude all other users.

    -

    /ue:\*\\\* /ui:user1

    +

    /ue:*\* /ui:user1

    Include only the domain users from Contoso, except Contoso\User1.

    This behavior cannot be completed using a single command. Instead, to migrate this set of users, you will need to specify the following:

      -
    • On the ScanState command line, type: /ue:\*\\\* /ui:contoso\*

    • +
    • On the ScanState command line, type: /ue:*\* /ui:contoso\*

    • On the LoadState command line, type: /ue:contoso\user1

    Include only local (non-domain) users.

    -

    /ue:\*\\\* /ui:%computername%\\\*

    +

    /ue:*\* /ui:%computername%\*

    From 4841ee484624fccc9d8d0145a51e48ab0e9046d0 Mon Sep 17 00:00:00 2001 From: illfated Date: Fri, 10 May 2019 23:38:20 +0200 Subject: [PATCH 491/724] Microsoft Accounts: small typo correction Change proposed: change the typo "a mean of identifying a user" to `a means of identifying a user` Closes #3601 --- .../identity-protection/access-control/microsoft-accounts.md | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/windows/security/identity-protection/access-control/microsoft-accounts.md b/windows/security/identity-protection/access-control/microsoft-accounts.md index 38c26d9546..18d956384e 100644 --- a/windows/security/identity-protection/access-control/microsoft-accounts.md +++ b/windows/security/identity-protection/access-control/microsoft-accounts.md @@ -22,7 +22,7 @@ ms.date: 10/13/2017 This topic for the IT professional explains how a Microsoft account works to enhance security and privacy for users, and how you can manage this consumer account type in your organization. -Microsoft sites, services, and properties, as well as computers running Windows 10, can use a Microsoft account as a mean of identifying a user. Microsoft account was previously called Windows Live ID. It has user-defined secrets, and consists of a unique email address and a password. +Microsoft sites, services, and properties, as well as computers running Windows 10, can use a Microsoft account as a means of identifying a user. Microsoft account was previously called Windows Live ID. It has user-defined secrets, and consists of a unique email address and a password. When a user signs in with a Microsoft account, the device is connected to cloud services. Many of the user's settings, preferences, and apps can be shared across devices. From 5b409467b1ef06aeeaaa6c6d221931236db7c141 Mon Sep 17 00:00:00 2001 From: Nicole Turner <39884432+nenonix@users.noreply.github.com> Date: Sat, 11 May 2019 14:21:14 +0200 Subject: [PATCH 492/724] Update advanced-security-audit-policy-settings.md Typo line 93 fixes https://github.com/MicrosoftDocs/windows-itpro-docs/issues/3587 --- .../auditing/advanced-security-audit-policy-settings.md | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/windows/security/threat-protection/auditing/advanced-security-audit-policy-settings.md b/windows/security/threat-protection/auditing/advanced-security-audit-policy-settings.md index 842cb0b7bb..6ce2b1bc64 100644 --- a/windows/security/threat-protection/auditing/advanced-security-audit-policy-settings.md +++ b/windows/security/threat-protection/auditing/advanced-security-audit-policy-settings.md @@ -90,7 +90,7 @@ Logon/Logoff security policy settings and audit events allow you to track attemp ## Object Access -Object Access policy settings and audit events allow you to track attempts to access specific objects or types of objects on a network or computer. To audit attempts to access a file, directory, registry key, or any other object, you must enable the appropriate object Aaccess auditing subcategory for success and/or failure events. For example, the file system subcategory needs to be enabled to audit file operations, and the Registry subcategory needs to be enabled to audit registry accesses. +Object Access policy settings and audit events allow you to track attempts to access specific objects or types of objects on a network or computer. To audit attempts to access a file, directory, registry key, or any other object, you must enable the appropriate Object Access auditing subcategory for success and/or failure events. For example, the file system subcategory needs to be enabled to audit file operations, and the Registry subcategory needs to be enabled to audit registry accesses. Proving that these audit policies are in effect to an external auditor is more difficult. There is no easy way to verify that the proper SACLs are set on all inherited objects. To address this issue, see [Global Object Access Auditing](#global-object-access-auditing). From 4ff728b4c6f1025ad8413725522693400c7fcea9 Mon Sep 17 00:00:00 2001 From: Jose Ortega Date: Sat, 11 May 2019 12:09:40 -0500 Subject: [PATCH 493/724] @Illfated corrections --- ...windows-operating-system-components-to-microsoft-services.md | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/windows/privacy/manage-connections-from-windows-operating-system-components-to-microsoft-services.md b/windows/privacy/manage-connections-from-windows-operating-system-components-to-microsoft-services.md index c669ded36f..2c21af8eba 100644 --- a/windows/privacy/manage-connections-from-windows-operating-system-components-to-microsoft-services.md +++ b/windows/privacy/manage-connections-from-windows-operating-system-components-to-microsoft-services.md @@ -769,7 +769,7 @@ To remove the News app: -or- >[!IMPORTANT] -> If you have any issue with this commands, go ahead a do a system reboot,and try the scripts again. +> If you have any issue with these commands, go ahead a do a system reboot, and try the scripts again. > - Remove the app for new user accounts. From an elevated command prompt, run the following Windows PowerShell command: **Get-AppxProvisionedPackage -Online | Where-Object {$\_.PackageName -Like "Microsoft.BingNews"} | ForEach-Object { Remove-AppxProvisionedPackage -Online -PackageName $\_.PackageName}** From ffd29448058dc6c7a1525031b726a6ec6af15b45 Mon Sep 17 00:00:00 2001 From: "Nisha Mittal (Wipro Ltd.)" Date: Sat, 11 May 2019 11:13:14 -0700 Subject: [PATCH 494/724] Made some change in Announcement. --- windows/release-information/windows-message-center.yml | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/windows/release-information/windows-message-center.yml b/windows/release-information/windows-message-center.yml index 64f62b302e..bcea3b01d7 100644 --- a/windows/release-information/windows-message-center.yml +++ b/windows/release-information/windows-message-center.yml @@ -53,7 +53,7 @@ sections: Reminder: Windows 10 update servicing cadence
    This month we received questions about the cadence of updates we released in April and May 2019. Here's a quick recap of our releases and servicing cadence:
    • April 9, 2019 was the regular Update Tuesday release for all versions of Windows.
    • -
    • May 1, 2019 was an \"optional\" out of band update (OOB), non-security update for Windows 10, version 1809. It was released to Microsoft Catalog and WSUS, providing a critical fix for our OEM partners.
    • +
    • May 1, 2019 was an \"optional,\" out of band non-security update (OOB) for Windows 10, version 1809. It was released to Microsoft Catalog and WSUS, providing a critical fix for our OEM partners.
    • May 3, 2019 was the \"optional\" Windows 10, version 1809 \"C\" release for April. This update contained important Japanese era packages for commercial customers to preview. It was released later than expected and mistakenly targeted as \"required\" (instead of \"optional\") for consumers, which pushed the update out to customers and required a reboot. Within 24 hours of receiving customer reports, we corrected the targeting logic and mitigated the issue.
    For more information about the Windows 10 update servicing cadence, please see the Window IT Pro blog.
    May 10, 2019
    10:00 AM PT From 9debc2dabe6990dd5c4e8709997902507c239de9 Mon Sep 17 00:00:00 2001 From: DocsPreview <49669258+DocsPreview@users.noreply.github.com> Date: Sat, 11 May 2019 11:51:23 -0700 Subject: [PATCH 495/724] Release info preview (#164) * Latest changes for 1809 issues * New Announcement Added * Latest Change for announcement * Updated link for japanese era content * Made some change in Announcement. --- windows/release-information/windows-message-center.yml | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/windows/release-information/windows-message-center.yml b/windows/release-information/windows-message-center.yml index 64f62b302e..bcea3b01d7 100644 --- a/windows/release-information/windows-message-center.yml +++ b/windows/release-information/windows-message-center.yml @@ -53,7 +53,7 @@ sections: Reminder: Windows 10 update servicing cadence
    This month we received questions about the cadence of updates we released in April and May 2019. Here's a quick recap of our releases and servicing cadence:
    • April 9, 2019 was the regular Update Tuesday release for all versions of Windows.
    • -
    • May 1, 2019 was an \"optional\" out of band update (OOB), non-security update for Windows 10, version 1809. It was released to Microsoft Catalog and WSUS, providing a critical fix for our OEM partners.
    • +
    • May 1, 2019 was an \"optional,\" out of band non-security update (OOB) for Windows 10, version 1809. It was released to Microsoft Catalog and WSUS, providing a critical fix for our OEM partners.
    • May 3, 2019 was the \"optional\" Windows 10, version 1809 \"C\" release for April. This update contained important Japanese era packages for commercial customers to preview. It was released later than expected and mistakenly targeted as \"required\" (instead of \"optional\") for consumers, which pushed the update out to customers and required a reboot. Within 24 hours of receiving customer reports, we corrected the targeting logic and mitigated the issue.
    For more information about the Windows 10 update servicing cadence, please see the Window IT Pro blog.
    May 10, 2019
    10:00 AM PT From a7bcfabadcbf92e5d4bbd3f63c6d8ec9c4837779 Mon Sep 17 00:00:00 2001 From: DocsPreview <49669258+DocsPreview@users.noreply.github.com> Date: Sat, 11 May 2019 12:19:38 -0700 Subject: [PATCH 496/724] Release info preview (#164) (#165) * Latest changes for 1809 issues * New Announcement Added * Latest Change for announcement * Updated link for japanese era content * Made some change in Announcement. --- windows/release-information/windows-message-center.yml | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/windows/release-information/windows-message-center.yml b/windows/release-information/windows-message-center.yml index 64f62b302e..bcea3b01d7 100644 --- a/windows/release-information/windows-message-center.yml +++ b/windows/release-information/windows-message-center.yml @@ -53,7 +53,7 @@ sections: Reminder: Windows 10 update servicing cadence
    This month we received questions about the cadence of updates we released in April and May 2019. Here's a quick recap of our releases and servicing cadence:
    • April 9, 2019 was the regular Update Tuesday release for all versions of Windows.
    • -
    • May 1, 2019 was an \"optional\" out of band update (OOB), non-security update for Windows 10, version 1809. It was released to Microsoft Catalog and WSUS, providing a critical fix for our OEM partners.
    • +
    • May 1, 2019 was an \"optional,\" out of band non-security update (OOB) for Windows 10, version 1809. It was released to Microsoft Catalog and WSUS, providing a critical fix for our OEM partners.
    • May 3, 2019 was the \"optional\" Windows 10, version 1809 \"C\" release for April. This update contained important Japanese era packages for commercial customers to preview. It was released later than expected and mistakenly targeted as \"required\" (instead of \"optional\") for consumers, which pushed the update out to customers and required a reboot. Within 24 hours of receiving customer reports, we corrected the targeting logic and mitigated the issue.
    For more information about the Windows 10 update servicing cadence, please see the Window IT Pro blog.
    May 10, 2019
    10:00 AM PT From 7c787e3a2c8fe1754a18470c91cc3d0669dbb033 Mon Sep 17 00:00:00 2001 From: Jose Gabriel Ortega Castro Date: Sat, 11 May 2019 14:47:53 -0500 Subject: [PATCH 497/724] More Illfated corrections :) thank you Co-Authored-By: Trond B. Krokli <38162891+illfated@users.noreply.github.com> --- ...windows-operating-system-components-to-microsoft-services.md | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/windows/privacy/manage-connections-from-windows-operating-system-components-to-microsoft-services.md b/windows/privacy/manage-connections-from-windows-operating-system-components-to-microsoft-services.md index 2c21af8eba..67e8c2419e 100644 --- a/windows/privacy/manage-connections-from-windows-operating-system-components-to-microsoft-services.md +++ b/windows/privacy/manage-connections-from-windows-operating-system-components-to-microsoft-services.md @@ -769,7 +769,7 @@ To remove the News app: -or- >[!IMPORTANT] -> If you have any issue with these commands, go ahead a do a system reboot, and try the scripts again. +> If you have any issues with these commands, do a system reboot and try the scripts again. > - Remove the app for new user accounts. From an elevated command prompt, run the following Windows PowerShell command: **Get-AppxProvisionedPackage -Online | Where-Object {$\_.PackageName -Like "Microsoft.BingNews"} | ForEach-Object { Remove-AppxProvisionedPackage -Online -PackageName $\_.PackageName}** From 1f9ba5ca8659274066e82e3671004cc7097608bb Mon Sep 17 00:00:00 2001 From: Jose Ortega Date: Sun, 12 May 2019 04:33:26 -0500 Subject: [PATCH 498/724] Solving issue #880 --- .../deployment/deploy-enterprise-licenses.md | 53 ++++++++++++------- 1 file changed, 33 insertions(+), 20 deletions(-) diff --git a/windows/deployment/deploy-enterprise-licenses.md b/windows/deployment/deploy-enterprise-licenses.md index afc9f144c2..038c839c38 100644 --- a/windows/deployment/deploy-enterprise-licenses.md +++ b/windows/deployment/deploy-enterprise-licenses.md @@ -12,14 +12,20 @@ author: greg-lindsay ms.topic: article --- + + # Deploy Windows 10 Enterprise licenses +>[!IMPORTANT] +>Licenses E3 and E5 brings windows 10 license enterprise with them, this tutorial is special for the use and implementation of these licenses in a on-premises Active Directory environment. + + This topic describes how to deploy Windows 10 Enterprise E3 or E5 licenses with [Windows 10 Enterprise Subscription Activation](windows-10-enterprise-subscription-activation.md) or [Windows 10 Enterprise E3 in CSP](windows-10-enterprise-e3-overview.md) and Azure Active Directory (Azure AD). >[!NOTE] ->Windows 10 Enterprise Subscription Activation (EA or MPSA) requires Windows 10 Pro, version 1703 or later.
    ->Windows 10 Enterprise E3 in CSP requires Windows 10 Pro, version 1607 or later.
    ->Automatic, non-KMS activation requires Windows 10, version 1803 or later on a device with a firmware-embedded activation key.
    +>* Windows 10 Enterprise Subscription Activation (EA or MPSA) requires Windows 10 Pro, version 1703 or later. +>* Windows 10 Enterprise E3 in CSP requires Windows 10 Pro, version 1607 or later. +>* Automatic, non-KMS activation requires Windows 10, version 1803 or later on a device with a firmware-embedded activation key. ## Firmware-embedded activation key @@ -35,9 +41,9 @@ If the device has a firmware-embedded activation key, it will be displayed in th If you are an EA customer with an existing Office 365 tenant, use the following steps to enable Windows 10 Subscription licenses on your existing tenant: -1. Work with your reseller to place an order for one $0 SKU per user. There are two SKUs available, depending on their current Windows Enterprise SA license:
    - a. **AAA-51069** - Win10UsrOLSActv Alng MonthlySub Addon E3
    - b. **AAA-51068** - Win10UsrOLSActv Alng MonthlySub Addon E5
    +1. Work with your reseller to place an order for one $0 SKU per user. There are two SKUs available, depending on their current Windows Enterprise SA license: + a. **AAA-51069** - Win10UsrOLSActv Alng MonthlySub Addon E3 + b. **AAA-51068** - Win10UsrOLSActv Alng MonthlySub Addon E5 2. After placing an order, the OLS admin on the agreement will receive a service activation email, indicating their subscription licenses have been provisioned on the tenant. 3. The admin can now assign subscription licenses to users. @@ -59,7 +65,7 @@ Also in this article: You probably have on-premises Active Directory Domain Services (AD DS) domains. Users will use their domain-based credentials to sign in to the AD DS domain. Before you start deploying Windows 10 Enterprise E3 or E5 licenses to users, you need to synchronize the identities in the on-premises ADDS domain with Azure AD. -You might ask why you need to synchronize these identities. The answer is so that users will have a *single identity* that they can use to access their on-premises apps and cloud services that use Azure AD (such as Windows 10 Enterprise E3 or E5). This means that users can use their existing credentials to sign in to Azure AD and access the cloud services that you provide and manage for them. +You might ask why you need to synchronize these identities. The answer is that users will have a **single identity** that they can use to access their on-premises apps and cloud services that use Azure AD (**such as Windows 10 Enterprise E3 or E5**). This means that users can use their existing credentials to sign in to Azure AD and access the cloud services that you provide and manage for them. **Figure 1** illustrates the integration between the on-premises AD DS domain with Azure AD. [Microsoft Azure Active Directory Connect](https://www.microsoft.com/en-us/download/details.aspx?id=47594) (Azure AD Connect) is responsible for synchronization of identities between the on-premises AD DS domain and Azure AD. Azure AD Connect is a service that you can install on-premises or in a virtual machine in Azure. @@ -72,6 +78,13 @@ For more information about integrating on-premises AD DS domains with Azure AD, - [Integrating your on-premises identities with Azure Active Directory](https://azure.microsoft.com/documentation/articles/active-directory-aadconnect/) - [Azure AD + Domain Join + Windows 10](https://blogs.technet.microsoft.com/enterprisemobility/2016/02/17/azure-ad-domain-join-windows-10/) +>[!NOTE] +>If you are implementing Azure AD, and have already an on-premises, you don't need to join the computers into Azure AD, since your main authentication method is your internal AD. In case, that you want to manage all your infrastructure on the cloud, then you can safely remote your domain controller and work with the join of the computers into the Azure AD, but you won't be able to apply fine control into the computers using GPO. +>The whole idea of using Azure AD, is mostly when you don't have any on-premises servers, and you want and enterprise administration of devices worldwide. + + + + ## Preparing for deployment: reviewing requirements Devices must be running Windows 10 Pro, version 1703, and be Azure Active Directory joined, or hybrid domain joined with Azure AD Connect. Customers who are federated with Azure Active Directory are also eligible. For more information, see [Review requirements on devices](#review-requirements-on-devices), later in this topic. @@ -151,12 +164,12 @@ Now the device is Azure AD joined to the company’s subscription. ### Step 2: Pro edition activation >[!IMPORTANT] ->If the device is running Windows 10, version 1803 or later, this step is no longer necessary when there is a firmware-embedded activation key on the device. Starting with Windows 10, version 1803 the device will automatically activate Windows 10 Enterprise using the firmware-embedded activation key.
    +>If the device is running Windows 10, version 1803 or later, this step is no longer necessary when there is a firmware-embedded activation key on the device. Starting with Windows 10, version 1803 the device will automatically activate Windows 10 Enterprise using the firmware-embedded activation key. >If the device is running Windows 10, version 1703 or 1709, then Windows 10 Pro must be successfully activated in **Settings > Update & Security > Activation**, as illustrated in **Figure 7a**. Windows 10 Pro activated -
    **Figure 7a - Windows 10 Pro activation in Settings**
    +**Figure 7a - Windows 10 Pro activation in Settings** Windows 10 Pro activation is required before Enterprise E3 or E5 can be enabled (Windows 10, versions 1703 and 1709 only). @@ -176,16 +189,16 @@ You can verify the Windows 10 Enterprise E3 or E5 subscription in **Settings &g Windows 10 activated and subscription active -
    **Figure 9 - Windows 10 Enterprise subscription in Settings**
    +**Figure 9 - Windows 10 Enterprise subscription in Settings** If there are any problems with the Windows 10 Enterprise E3 or E5 license or the activation of the license, the **Activation** panel will display the appropriate error message or status. You can use this information to help you diagnose the licensing and activation process. >[!NOTE] ->If you use slmgr /dli or /dlv commands to retrieve the activation information for the Windows 10 E3 or E5 license, the license information displayed will be the following:
    ->Name: Windows(R), Professional edition
    ->Description: Windows(R) Operating System, RETAIL channel
    ->Partial Product Key: 3V66T
    +>If you use slmgr /dli or /dlv commands to retrieve the activation information for the Windows 10 E3 or E5 license, the license information displayed will be the following: +>Name: Windows(R), Professional edition +>Description: Windows(R) Operating System, RETAIL channel +>Partial Product Key: 3V66T ## Virtual Desktop Access (VDA) @@ -211,23 +224,23 @@ Use the following figures to help you troubleshoot when users experience these c - [Figure 12](#win-10-not-activated-subscription-not-active) (below) illustrates a device on which Windows 10 Pro license is not activated and the Windows 10 Enterprise subscription is lapsed or removed. -
    + Windows 10 not activated and subscription active -
    **Figure 10 - Windows 10 Pro, version 1703 edition not activated in Settings**
    +**Figure 10 - Windows 10 Pro, version 1703 edition not activated in Settings** + -
    Windows 10 activated and subscription not active -
    **Figure 11 - Windows 10 Enterprise subscription lapsed or removed in Settings**
    +**Figure 11 - Windows 10 Enterprise subscription lapsed or removed in Settings** + -
    Windows 10 not activated and subscription not active -
    **Figure 12 - Windows 10 Pro, version 1703 edition not activated and Windows 10 Enterprise subscription lapsed or removed in Settings**
    +**Figure 12 - Windows 10 Pro, version 1703 edition not activated and Windows 10 Enterprise subscription lapsed or removed in Settings** ### Review requirements on devices From 36ad8a02943d2ffd1f48afacc1edc1ff613d3d50 Mon Sep 17 00:00:00 2001 From: sccmentor Date: Sun, 12 May 2019 11:18:47 +0100 Subject: [PATCH 499/724] Update waas-manage-updates-wufb.md --- windows/deployment/update/waas-manage-updates-wufb.md | 6 +++--- 1 file changed, 3 insertions(+), 3 deletions(-) diff --git a/windows/deployment/update/waas-manage-updates-wufb.md b/windows/deployment/update/waas-manage-updates-wufb.md index be96b68e59..19a38e1f89 100644 --- a/windows/deployment/update/waas-manage-updates-wufb.md +++ b/windows/deployment/update/waas-manage-updates-wufb.md @@ -85,13 +85,13 @@ Starting with Windows 10, version 1709, the Windows Update for Business settings | Manage Windows Insider Preview builds | System/AllowBuildPreview | Update/ManagePreviewBuilds | | Manage when updates are received | Select when Feature Updates are received | Select when Preview Builds and Feature Updates are received (Update/BranchReadinessLevel) | -## Managing Windows Update for Business with Software Center Configuration Manager +## Managing Windows Update for Business with System Center Configuration Manager -Starting with Windows 10, version 1709, you can assign a collection of devices to have dual scan enabled and manage that collection with Windows Update for Business policies. Starting with Windows 10, version 1809, you can set a collection of devices to receive the Windows Insider Preview Feature Updates from Windows Update from within Software Center Configuration Manager. +Starting with Windows 10, version 1709, you can assign a collection of devices to have dual scan enabled and manage that collection with Windows Update for Business policies. Starting with Windows 10, version 1809, you can set a collection of devices to receive the Windows Insider Preview Feature Updates from Windows Update from within System Center Configuration Manager. | Action | Windows 10 versions between 1709 and 1809 | Windows 10 versions after 1809 | | --- | --- | --- | -| Manage Windows Update for Business in Configuration Manager | Manage Feature or Quality Updates with Windows Update for Business via Dual Scan | Manage Insider pre-release builds with Windows Update for Business within Software Center Configuration Manager | +| Manage Windows Update for Business in Configuration Manager | Manage Feature or Quality Updates with Windows Update for Business via Dual Scan | Manage Insider pre-release builds with Windows Update for Business within System Center Configuration Manager | ## Managing Windows Update for Business with Windows Settings options Windows Settings includes options to control certain Windows Update for Business features: From 12147107edb489af66f821a83bf816fdfafa1258 Mon Sep 17 00:00:00 2001 From: Lindsay <45809756+lindspea@users.noreply.github.com> Date: Mon, 13 May 2019 07:18:18 +0200 Subject: [PATCH 500/724] Update appv-creating-and-managing-virtualized-applications.md Updated extensions. --- ...reating-and-managing-virtualized-applications.md | 13 ++----------- 1 file changed, 2 insertions(+), 11 deletions(-) diff --git a/windows/application-management/app-v/appv-creating-and-managing-virtualized-applications.md b/windows/application-management/app-v/appv-creating-and-managing-virtualized-applications.md index dca1b3b048..a2e9327cb3 100644 --- a/windows/application-management/app-v/appv-creating-and-managing-virtualized-applications.md +++ b/windows/application-management/app-v/appv-creating-and-managing-virtualized-applications.md @@ -93,20 +93,11 @@ The following table lists the supported shell extensions: Copy on write (CoW) file extensions allow App-V to dynamically write to specific locations contained in the virtual package while it is being used. -The following table displays the file types that can exist in a virtual package under the VFS directory, but cannot be updated on the computer running the App-V client. All other files and directories can be modified. +The following table displays the file types that can exist in a virtual package under the VFS directory, since App-V 5.1, but cannot be updated on the computer running the App-V client. All other files and directories can be modified. | File Type|||||| |---|---|---|---|---|---| -| .acm | .asa | .asp | .aspx | .ax | .bat | -| .cer | .chm | .clb | .cmd | .cnt | .cnv | -| .com | .cpl | .cpx | .crt | .dll | .drv | -| .esc | .exe | .fon | .grp | .hlp | .hta | -| .ime | .inf | .ins | .isp | .its | .js | -| .jse | .lnk | .msc | .msi | .msp | .mst | -| .mui | .nls | .ocx | .pal | .pcd | .pif | -| .reg | .scf | .scr | .sct | .shb | .shs | -| .sys | .tlb | .tsp | .url | .vb | .vbe | -| .vbs | .vsmacros | .ws | .wsf | .wsh | | +| .com | .exe | .dll | .ocx | | ## Modifying an existing virtual application package From 412888018f32607672f3e3a839a30e579cee5b26 Mon Sep 17 00:00:00 2001 From: MaratMussabekov <48041687+MaratMussabekov@users.noreply.github.com> Date: Mon, 13 May 2019 17:08:19 +0500 Subject: [PATCH 501/724] update microsoft-store-for-business-overview.md --- store-for-business/microsoft-store-for-business-overview.md | 4 ++-- 1 file changed, 2 insertions(+), 2 deletions(-) diff --git a/store-for-business/microsoft-store-for-business-overview.md b/store-for-business/microsoft-store-for-business-overview.md index 0bf1fdc2d4..f6afc25250 100644 --- a/store-for-business/microsoft-store-for-business-overview.md +++ b/store-for-business/microsoft-store-for-business-overview.md @@ -28,8 +28,8 @@ Organizations or schools of any size can benefit from using Microsoft Store for - **Scales to fit the size of your business** - For smaller businesses, with Azure AD accounts or Office 365 accounts and Windows 10 devices, you can quickly have an end-to-end process for acquiring and distributing content using the Store for Business. For larger businesses, all the capabilities of the Store for Business are available to you, or you can integrate Microsoft Store for Business with management tools, for greater control over access to apps and app updates. You can use existing work or school accounts. - **Bulk app acquisition** - Acquire apps in volume from Microsoft Store for Business. - **Centralized management** – Microsoft Store provides centralized management for inventory, billing, permissions, and order history. You can use Microsoft Store to view, manage and distribute items purchased from: - - **Microsoft Store for Business** – Apps and subscriptions - - **Microsoft Store for Education** – Apps and subscriptions + - **Microsoft Store for Business** – Apps acquired from Microsoft Store for Business + - **Microsoft Store for Education** – Apps acquired from Microsoft Store for Education - **Office 365** – Subscriptions - **Volume licensing** - Apps purchased with volume licensing - **Private store** - Create a private store for your business that’s easily available from any Windows 10 device. Your private store is available from Microsoft Store on Windows 10, or with a browser on the Web. People in your organization can download apps from your organization's private store on Windows 10 devices. From f2e7db1c27a2f01fe8490dc7ce55e3f62a1b8352 Mon Sep 17 00:00:00 2001 From: Jose Gabriel Ortega Castro Date: Mon, 13 May 2019 10:04:55 -0500 Subject: [PATCH 502/724] Update windows/deployment/deploy-enterprise-licenses.md Co-Authored-By: Nicole Turner <39884432+nenonix@users.noreply.github.com> --- windows/deployment/deploy-enterprise-licenses.md | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/windows/deployment/deploy-enterprise-licenses.md b/windows/deployment/deploy-enterprise-licenses.md index 038c839c38..ca9c5911b9 100644 --- a/windows/deployment/deploy-enterprise-licenses.md +++ b/windows/deployment/deploy-enterprise-licenses.md @@ -164,7 +164,7 @@ Now the device is Azure AD joined to the company’s subscription. ### Step 2: Pro edition activation >[!IMPORTANT] ->If the device is running Windows 10, version 1803 or later, this step is no longer necessary when there is a firmware-embedded activation key on the device. Starting with Windows 10, version 1803 the device will automatically activate Windows 10 Enterprise using the firmware-embedded activation key. +>If your device is running Windows 10, version 1803 or later, this step not needed. Starting with Windows 10 version 1803 the device will automatically activate Windows 10 Enterprise using the firmware-embedded activation key. >If the device is running Windows 10, version 1703 or 1709, then Windows 10 Pro must be successfully activated in **Settings > Update & Security > Activation**, as illustrated in **Figure 7a**. From bd221ac09c378556b5d5b985485edcc9805736fa Mon Sep 17 00:00:00 2001 From: Jose Ortega Date: Mon, 13 May 2019 10:11:25 -0500 Subject: [PATCH 503/724] Corrections --- windows/deployment/deploy-enterprise-licenses.md | 5 ----- 1 file changed, 5 deletions(-) diff --git a/windows/deployment/deploy-enterprise-licenses.md b/windows/deployment/deploy-enterprise-licenses.md index ca9c5911b9..9a03873d7c 100644 --- a/windows/deployment/deploy-enterprise-licenses.md +++ b/windows/deployment/deploy-enterprise-licenses.md @@ -19,7 +19,6 @@ ms.topic: article >[!IMPORTANT] >Licenses E3 and E5 brings windows 10 license enterprise with them, this tutorial is special for the use and implementation of these licenses in a on-premises Active Directory environment. - This topic describes how to deploy Windows 10 Enterprise E3 or E5 licenses with [Windows 10 Enterprise Subscription Activation](windows-10-enterprise-subscription-activation.md) or [Windows 10 Enterprise E3 in CSP](windows-10-enterprise-e3-overview.md) and Azure Active Directory (Azure AD). >[!NOTE] @@ -82,9 +81,6 @@ For more information about integrating on-premises AD DS domains with Azure AD, >If you are implementing Azure AD, and have already an on-premises, you don't need to join the computers into Azure AD, since your main authentication method is your internal AD. In case, that you want to manage all your infrastructure on the cloud, then you can safely remote your domain controller and work with the join of the computers into the Azure AD, but you won't be able to apply fine control into the computers using GPO. >The whole idea of using Azure AD, is mostly when you don't have any on-premises servers, and you want and enterprise administration of devices worldwide. - - - ## Preparing for deployment: reviewing requirements Devices must be running Windows 10 Pro, version 1703, and be Azure Active Directory joined, or hybrid domain joined with Azure AD Connect. Customers who are federated with Azure Active Directory are also eligible. For more information, see [Review requirements on devices](#review-requirements-on-devices), later in this topic. @@ -225,7 +221,6 @@ Use the following figures to help you troubleshoot when users experience these c - [Figure 12](#win-10-not-activated-subscription-not-active) (below) illustrates a device on which Windows 10 Pro license is not activated and the Windows 10 Enterprise subscription is lapsed or removed. - Windows 10 not activated and subscription active **Figure 10 - Windows 10 Pro, version 1703 edition not activated in Settings** From c020150f3684eb897ef425c8c9d4a3a7d0008685 Mon Sep 17 00:00:00 2001 From: Jose Gabriel Ortega Castro Date: Mon, 13 May 2019 10:12:49 -0500 Subject: [PATCH 504/724] Update windows/deployment/deploy-enterprise-licenses.md Co-Authored-By: Nicole Turner <39884432+nenonix@users.noreply.github.com> --- windows/deployment/deploy-enterprise-licenses.md | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/windows/deployment/deploy-enterprise-licenses.md b/windows/deployment/deploy-enterprise-licenses.md index 9a03873d7c..8c90e9f4ba 100644 --- a/windows/deployment/deploy-enterprise-licenses.md +++ b/windows/deployment/deploy-enterprise-licenses.md @@ -24,7 +24,7 @@ This topic describes how to deploy Windows 10 Enterprise E3 or E5 licenses with >[!NOTE] >* Windows 10 Enterprise Subscription Activation (EA or MPSA) requires Windows 10 Pro, version 1703 or later. >* Windows 10 Enterprise E3 in CSP requires Windows 10 Pro, version 1607 or later. ->* Automatic, non-KMS activation requires Windows 10, version 1803 or later on a device with a firmware-embedded activation key. +>* Automatic, non-KMS activation requires Windows 10, version 1803 or later, on a device with a firmware-embedded activation key. ## Firmware-embedded activation key From ea00510908b1f1de7bdece0cebfa77aab8d83dc1 Mon Sep 17 00:00:00 2001 From: Jose Gabriel Ortega Castro Date: Mon, 13 May 2019 10:12:58 -0500 Subject: [PATCH 505/724] Update windows/deployment/deploy-enterprise-licenses.md Co-Authored-By: Nicole Turner <39884432+nenonix@users.noreply.github.com> --- windows/deployment/deploy-enterprise-licenses.md | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/windows/deployment/deploy-enterprise-licenses.md b/windows/deployment/deploy-enterprise-licenses.md index 8c90e9f4ba..83fbd2a73f 100644 --- a/windows/deployment/deploy-enterprise-licenses.md +++ b/windows/deployment/deploy-enterprise-licenses.md @@ -64,7 +64,7 @@ Also in this article: You probably have on-premises Active Directory Domain Services (AD DS) domains. Users will use their domain-based credentials to sign in to the AD DS domain. Before you start deploying Windows 10 Enterprise E3 or E5 licenses to users, you need to synchronize the identities in the on-premises ADDS domain with Azure AD. -You might ask why you need to synchronize these identities. The answer is that users will have a **single identity** that they can use to access their on-premises apps and cloud services that use Azure AD (**such as Windows 10 Enterprise E3 or E5**). This means that users can use their existing credentials to sign in to Azure AD and access the cloud services that you provide and manage for them. +You might ask why you need to synchronize these identities. The answer is so that users will have a *single identity* that they can use to access their on-premises apps and cloud services that use Azure AD (such as Windows 10 Enterprise E3 or E5). This means that users can use their existing credentials to sign in to Azure AD and access the cloud services that you provide and manage for them. **Figure 1** illustrates the integration between the on-premises AD DS domain with Azure AD. [Microsoft Azure Active Directory Connect](https://www.microsoft.com/en-us/download/details.aspx?id=47594) (Azure AD Connect) is responsible for synchronization of identities between the on-premises AD DS domain and Azure AD. Azure AD Connect is a service that you can install on-premises or in a virtual machine in Azure. From 67f98f7e71c82dcdb80bd8042948accab6e44060 Mon Sep 17 00:00:00 2001 From: Jose Gabriel Ortega Castro Date: Mon, 13 May 2019 10:13:06 -0500 Subject: [PATCH 506/724] Update windows/deployment/deploy-enterprise-licenses.md Co-Authored-By: Nicole Turner <39884432+nenonix@users.noreply.github.com> --- windows/deployment/deploy-enterprise-licenses.md | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/windows/deployment/deploy-enterprise-licenses.md b/windows/deployment/deploy-enterprise-licenses.md index 83fbd2a73f..9721ecd2be 100644 --- a/windows/deployment/deploy-enterprise-licenses.md +++ b/windows/deployment/deploy-enterprise-licenses.md @@ -42,7 +42,7 @@ If you are an EA customer with an existing Office 365 tenant, use the following 1. Work with your reseller to place an order for one $0 SKU per user. There are two SKUs available, depending on their current Windows Enterprise SA license: a. **AAA-51069** - Win10UsrOLSActv Alng MonthlySub Addon E3 - b. **AAA-51068** - Win10UsrOLSActv Alng MonthlySub Addon E5 +- **AAA-51068** - Win10UsrOLSActv Alng MonthlySub Addon E5 2. After placing an order, the OLS admin on the agreement will receive a service activation email, indicating their subscription licenses have been provisioned on the tenant. 3. The admin can now assign subscription licenses to users. From f5ca28c6688d8184e914da54a4a258bea602e573 Mon Sep 17 00:00:00 2001 From: Jose Gabriel Ortega Castro Date: Mon, 13 May 2019 10:13:14 -0500 Subject: [PATCH 507/724] Update windows/deployment/deploy-enterprise-licenses.md Co-Authored-By: Nicole Turner <39884432+nenonix@users.noreply.github.com> --- windows/deployment/deploy-enterprise-licenses.md | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/windows/deployment/deploy-enterprise-licenses.md b/windows/deployment/deploy-enterprise-licenses.md index 9721ecd2be..cdecd2c70f 100644 --- a/windows/deployment/deploy-enterprise-licenses.md +++ b/windows/deployment/deploy-enterprise-licenses.md @@ -78,7 +78,7 @@ For more information about integrating on-premises AD DS domains with Azure AD, - [Azure AD + Domain Join + Windows 10](https://blogs.technet.microsoft.com/enterprisemobility/2016/02/17/azure-ad-domain-join-windows-10/) >[!NOTE] ->If you are implementing Azure AD, and have already an on-premises, you don't need to join the computers into Azure AD, since your main authentication method is your internal AD. In case, that you want to manage all your infrastructure on the cloud, then you can safely remote your domain controller and work with the join of the computers into the Azure AD, but you won't be able to apply fine control into the computers using GPO. +>If you are implementing Azure AD, and you already have an on-premises domain, you don't need to integrate with Azure AD, since your main authentication method is your internal AD. If you want to manage all your infrastructure in the cloud, you can safely configure your domain controller remotely to integrate your computers with Azure AD, but you won't be able to apply fine controls using GPO. Azure AD is best suited for the global administration of devices when you don't have any on-premises servers. >The whole idea of using Azure AD, is mostly when you don't have any on-premises servers, and you want and enterprise administration of devices worldwide. ## Preparing for deployment: reviewing requirements From 4ad41520e7864728f84d69c50b0ea11cc417bcef Mon Sep 17 00:00:00 2001 From: Jose Gabriel Ortega Castro Date: Mon, 13 May 2019 10:13:28 -0500 Subject: [PATCH 508/724] Update windows/deployment/deploy-enterprise-licenses.md Co-Authored-By: Nicole Turner <39884432+nenonix@users.noreply.github.com> --- windows/deployment/deploy-enterprise-licenses.md | 1 - 1 file changed, 1 deletion(-) diff --git a/windows/deployment/deploy-enterprise-licenses.md b/windows/deployment/deploy-enterprise-licenses.md index cdecd2c70f..38252eee03 100644 --- a/windows/deployment/deploy-enterprise-licenses.md +++ b/windows/deployment/deploy-enterprise-licenses.md @@ -79,7 +79,6 @@ For more information about integrating on-premises AD DS domains with Azure AD, >[!NOTE] >If you are implementing Azure AD, and you already have an on-premises domain, you don't need to integrate with Azure AD, since your main authentication method is your internal AD. If you want to manage all your infrastructure in the cloud, you can safely configure your domain controller remotely to integrate your computers with Azure AD, but you won't be able to apply fine controls using GPO. Azure AD is best suited for the global administration of devices when you don't have any on-premises servers. ->The whole idea of using Azure AD, is mostly when you don't have any on-premises servers, and you want and enterprise administration of devices worldwide. ## Preparing for deployment: reviewing requirements From 33cec4871e6275f66bbaa57f1b32b20f1257d8b3 Mon Sep 17 00:00:00 2001 From: Jose Gabriel Ortega Castro Date: Mon, 13 May 2019 10:13:39 -0500 Subject: [PATCH 509/724] Update windows/deployment/deploy-enterprise-licenses.md Co-Authored-By: Nicole Turner <39884432+nenonix@users.noreply.github.com> --- windows/deployment/deploy-enterprise-licenses.md | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/windows/deployment/deploy-enterprise-licenses.md b/windows/deployment/deploy-enterprise-licenses.md index 38252eee03..b1b4b2b9d5 100644 --- a/windows/deployment/deploy-enterprise-licenses.md +++ b/windows/deployment/deploy-enterprise-licenses.md @@ -41,7 +41,7 @@ If the device has a firmware-embedded activation key, it will be displayed in th If you are an EA customer with an existing Office 365 tenant, use the following steps to enable Windows 10 Subscription licenses on your existing tenant: 1. Work with your reseller to place an order for one $0 SKU per user. There are two SKUs available, depending on their current Windows Enterprise SA license: - a. **AAA-51069** - Win10UsrOLSActv Alng MonthlySub Addon E3 +- **AAA-51069** - Win10UsrOLSActv Alng MonthlySub Addon E3 - **AAA-51068** - Win10UsrOLSActv Alng MonthlySub Addon E5 2. After placing an order, the OLS admin on the agreement will receive a service activation email, indicating their subscription licenses have been provisioned on the tenant. 3. The admin can now assign subscription licenses to users. From 85e9423476bb32060213ca9bb7e15691c189362d Mon Sep 17 00:00:00 2001 From: Jose Gabriel Ortega Castro Date: Mon, 13 May 2019 10:13:57 -0500 Subject: [PATCH 510/724] Update windows/deployment/deploy-enterprise-licenses.md Co-Authored-By: Nicole Turner <39884432+nenonix@users.noreply.github.com> --- windows/deployment/deploy-enterprise-licenses.md | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/windows/deployment/deploy-enterprise-licenses.md b/windows/deployment/deploy-enterprise-licenses.md index b1b4b2b9d5..fd04ba220b 100644 --- a/windows/deployment/deploy-enterprise-licenses.md +++ b/windows/deployment/deploy-enterprise-licenses.md @@ -17,7 +17,7 @@ ms.topic: article # Deploy Windows 10 Enterprise licenses >[!IMPORTANT] ->Licenses E3 and E5 brings windows 10 license enterprise with them, this tutorial is special for the use and implementation of these licenses in a on-premises Active Directory environment. +>Office 365 Enterprise E3 and Office 365 Enterprise E5 include a Windows 10 Enterprise license. This article is about the use and implementation of these licenses in a on-premises Active Directory environment. This topic describes how to deploy Windows 10 Enterprise E3 or E5 licenses with [Windows 10 Enterprise Subscription Activation](windows-10-enterprise-subscription-activation.md) or [Windows 10 Enterprise E3 in CSP](windows-10-enterprise-e3-overview.md) and Azure Active Directory (Azure AD). From 73007e7e463bd4fa727fb2652090d6287a4f9063 Mon Sep 17 00:00:00 2001 From: Jose Gabriel Ortega Castro Date: Mon, 13 May 2019 10:54:17 -0500 Subject: [PATCH 511/724] Update windows/deployment/deploy-enterprise-licenses.md Co-Authored-By: JohanFreelancer9 <48568725+JohanFreelancer9@users.noreply.github.com> --- windows/deployment/deploy-enterprise-licenses.md | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/windows/deployment/deploy-enterprise-licenses.md b/windows/deployment/deploy-enterprise-licenses.md index fd04ba220b..c202b6f22e 100644 --- a/windows/deployment/deploy-enterprise-licenses.md +++ b/windows/deployment/deploy-enterprise-licenses.md @@ -159,7 +159,7 @@ Now the device is Azure AD joined to the company’s subscription. ### Step 2: Pro edition activation >[!IMPORTANT] ->If your device is running Windows 10, version 1803 or later, this step not needed. Starting with Windows 10 version 1803 the device will automatically activate Windows 10 Enterprise using the firmware-embedded activation key. +>If your device is running Windows 10, version 1803 or later, this step is not needed. From Windows 10, version 1803, the device will automatically activate Windows 10 Enterprise using the firmware-embedded activation key. >If the device is running Windows 10, version 1703 or 1709, then Windows 10 Pro must be successfully activated in **Settings > Update & Security > Activation**, as illustrated in **Figure 7a**. From bc4f9a20eb45721386f3bfb236894d72c009c331 Mon Sep 17 00:00:00 2001 From: Lindsay <45809756+lindspea@users.noreply.github.com> Date: Mon, 13 May 2019 18:09:47 +0200 Subject: [PATCH 512/724] Update windows/application-management/app-v/appv-creating-and-managing-virtualized-applications.md Co-Authored-By: JohanFreelancer9 <48568725+JohanFreelancer9@users.noreply.github.com> --- .../appv-creating-and-managing-virtualized-applications.md | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/windows/application-management/app-v/appv-creating-and-managing-virtualized-applications.md b/windows/application-management/app-v/appv-creating-and-managing-virtualized-applications.md index a2e9327cb3..9a68fb9338 100644 --- a/windows/application-management/app-v/appv-creating-and-managing-virtualized-applications.md +++ b/windows/application-management/app-v/appv-creating-and-managing-virtualized-applications.md @@ -93,7 +93,7 @@ The following table lists the supported shell extensions: Copy on write (CoW) file extensions allow App-V to dynamically write to specific locations contained in the virtual package while it is being used. -The following table displays the file types that can exist in a virtual package under the VFS directory, since App-V 5.1, but cannot be updated on the computer running the App-V client. All other files and directories can be modified. +The following table displays the file types that can exist in a virtual package under the VFS directory, since App-V 5.1, but which cannot be updated on the computer running the App-V client. All other files and directories can be modified. | File Type|||||| |---|---|---|---|---|---| From b779a2462eab915da80af93e2075aa45b39f115f Mon Sep 17 00:00:00 2001 From: Justin Hall Date: Mon, 13 May 2019 10:17:20 -0700 Subject: [PATCH 513/724] spelling --- .../create-wip-policy-using-intune-azure.md | 6 +++--- 1 file changed, 3 insertions(+), 3 deletions(-) diff --git a/windows/security/information-protection/windows-information-protection/create-wip-policy-using-intune-azure.md b/windows/security/information-protection/windows-information-protection/create-wip-policy-using-intune-azure.md index 1d57580668..18eb0da280 100644 --- a/windows/security/information-protection/windows-information-protection/create-wip-policy-using-intune-azure.md +++ b/windows/security/information-protection/windows-information-protection/create-wip-policy-using-intune-azure.md @@ -11,7 +11,7 @@ manager: dansimp audience: ITPro ms.collection: M365-security-compliance ms.topic: conceptual -ms.date: 05/10/2019 +ms.date: 05/13/2019 --- # Create a Windows Information Protection (WIP) policy using the Azure portal for Microsoft Intune @@ -588,7 +588,7 @@ After you've decided where your protected apps can access enterprise data on you - **On.** Protects files that are copied to a removable drive. You can enter a TemplateID GUID to specify who can access the Azure Rights Management protected files, and for how long. The RMS template is only applied to the files on removable media, and is only used for access control—it doesn’t actually apply Azure Information Protection to the files. Curly braces {} are required around the RMS Template ID, but they are removed after you save the policy. - If you don’t specify an [RMS template](https://docs.microsoft.com/information-protection/deploy-use/configure-custom-templates), it’s a regular EFS file using a default RMS template that everyone in the tenant will have access to. + If you don’t specify an [RMS template](https://docs.microsoft.com/information-protection/deploy-use/configure-custom-templates), it’s a regular EFS file using a default RMS template that all users can access. - **Off, or not configured.** Stops WIP from encrypting Azure Rights Management files that are copied to a removable drive. @@ -603,7 +603,7 @@ After you've decided where your protected apps can access enterprise data on you ## Encrypted file extensions -You can restrict which files are protected by WIP when they are downloaded from an SMB share within your enterprise network locations. If this setting is configured, only files with te extensions in the list will be encrypted. If this setting is not specified, the existing auto-encryption behavior is applied. +You can restrict which files are protected by WIP when they are downloaded from an SMB share within your enterprise network locations. If this setting is configured, only files with the extensions in the list will be encrypted. If this setting is not specified, the existing auto-encryption behavior is applied. ![WIP encrypted file extensions](images/wip-encrypted-file-extensions.png) From 91623a4d58af4d0db2873912b77e3b53daa23c5a Mon Sep 17 00:00:00 2001 From: Justin Hall Date: Mon, 13 May 2019 10:29:36 -0700 Subject: [PATCH 514/724] spelling --- .../create-wip-policy-using-intune-azure.md | 4 ++-- 1 file changed, 2 insertions(+), 2 deletions(-) diff --git a/windows/security/information-protection/windows-information-protection/create-wip-policy-using-intune-azure.md b/windows/security/information-protection/windows-information-protection/create-wip-policy-using-intune-azure.md index 18eb0da280..33ced2e6e3 100644 --- a/windows/security/information-protection/windows-information-protection/create-wip-policy-using-intune-azure.md +++ b/windows/security/information-protection/windows-information-protection/create-wip-policy-using-intune-azure.md @@ -98,7 +98,7 @@ Select **Store apps**, type the app product name and publisher, and click **OK** ![Add Store app](images\add-a-protected-store-app.png) -To add multiple Store apps, click the elipsis **…**. +To add multiple Store apps, click the ellipsis **…**. If you don't know the Store app publisher or product name, you can find them by following these steps. @@ -187,7 +187,7 @@ To add **Desktop apps**, complete the following fields, based on what results yo -To add another Desktop app, click the elipsis **…**. After you’ve entered the info into the fields, click **OK**. +To add another Desktop app, click the ellipsis **…**. After you’ve entered the info into the fields, click **OK**. ![Microsoft Intune management console: Adding Desktop app info](images/wip-azure-add-desktop-apps.png) From d30d89b19b2259e021a68bc78345dc8a464bf8cc Mon Sep 17 00:00:00 2001 From: Justin Hall Date: Mon, 13 May 2019 10:33:44 -0700 Subject: [PATCH 515/724] edits --- .../create-wip-policy-using-sccm.md | 4 ++-- 1 file changed, 2 insertions(+), 2 deletions(-) diff --git a/windows/security/information-protection/windows-information-protection/create-wip-policy-using-sccm.md b/windows/security/information-protection/windows-information-protection/create-wip-policy-using-sccm.md index 84ebcf1861..8cb0bcd6e9 100644 --- a/windows/security/information-protection/windows-information-protection/create-wip-policy-using-sccm.md +++ b/windows/security/information-protection/windows-information-protection/create-wip-policy-using-sccm.md @@ -14,7 +14,7 @@ manager: dansimp audience: ITPro ms.collection: M365-security-compliance ms.topic: conceptual -ms.date: 04/30/2019 +ms.date: 05/13/2019 --- # Create and deploy a Windows Information Protection (WIP) policy using System Center Configuration Manager @@ -474,7 +474,7 @@ After you've decided where your protected apps can access enterprise data on you - **No, or not configured (recommended).** Stops Windows Search from searching and indexing encrypted corporate data and Store apps. - - **Revoke local encryption keys during the unerollment process.** Determines whether to revoke a user’s local encryption keys from a device when it’s unenrolled from Windows Information Protection. If the encryption keys are revoked, a user no longer has access to encrypted corporate data. The options are: + - **Revoke local encryption keys during the unenrollment process.** Determines whether to revoke a user’s local encryption keys from a device when it’s unenrolled from Windows Information Protection. If the encryption keys are revoked, a user no longer has access to encrypted corporate data. The options are: - **Yes, or not configured (recommended).** Revokes local encryption keys from a device during unenrollment. From 6e854b67b7b882ededbccf85c148659f104fec7e Mon Sep 17 00:00:00 2001 From: ManikaDhiman Date: Mon, 13 May 2019 12:06:47 -0700 Subject: [PATCH 516/724] Added enrollmentstatustracking CSP --- windows/client-management/mdm/TOC.md | 1 + ...onfiguration-service-provider-reference.md | 65 ++++--- .../mdm/enrollmentstatustracking-csp.md | 182 ++++++++++++++++++ ...visioning-csp-enrollmentstatustracking.png | Bin 0 -> 50786 bytes 4 files changed, 222 insertions(+), 26 deletions(-) create mode 100644 windows/client-management/mdm/enrollmentstatustracking-csp.md create mode 100644 windows/client-management/mdm/images/provisioning-csp-enrollmentstatustracking.png diff --git a/windows/client-management/mdm/TOC.md b/windows/client-management/mdm/TOC.md index 07e2cb8f96..3689c9b175 100644 --- a/windows/client-management/mdm/TOC.md +++ b/windows/client-management/mdm/TOC.md @@ -126,6 +126,7 @@ ### [DynamicManagement CSP](dynamicmanagement-csp.md) #### [DynamicManagement DDF file](dynamicmanagement-ddf.md) ### [EMAIL2 CSP](email2-csp.md) +### [EnrollmentStatusTracking CSP](enrollmentstatustracking-csp.md) #### [EMAIL2 DDF file](email2-ddf-file.md) ### [EnterpriseAPN CSP](enterpriseapn-csp.md) #### [EnterpriseAPN DDF](enterpriseapn-ddf.md) diff --git a/windows/client-management/mdm/configuration-service-provider-reference.md b/windows/client-management/mdm/configuration-service-provider-reference.md index 8f8ef0ecd3..640eec77bc 100644 --- a/windows/client-management/mdm/configuration-service-provider-reference.md +++ b/windows/client-management/mdm/configuration-service-provider-reference.md @@ -7,7 +7,7 @@ ms.topic: article ms.prod: w10 ms.technology: windows author: MariciaAlforque -ms.date: 08/27/2018 +ms.date: 05/13/2019 --- # Configuration service provider reference @@ -23,14 +23,6 @@ Additional lists: - [List of CSPs supported in Microsoft Surface Hub ](#surfacehubcspsupport) - [List of CSPs supported in Windows 10 IoT Core](#iotcoresupport) -The following tables show the configuration service providers support in Windows 10. -Footnotes: -- 1 - Added in Windows 10, version 1607 -- 2 - Added in Windows 10, version 1703 -- 3 - Added in Windows 10, version 1709 -- 4 - Added in Windows 10, version 1803 -- 5 - Added in Windows 10, version 1809 -
    @@ -932,6 +924,34 @@ Footnotes: + +[EnrollmentStatusTracking CSP](enrollmentstatustracking-csp.md) + + + + + + + + + + + + + + + + + + + + + +
    HomeProBusinessEnterpriseEducationMobileMobile Enterprise
    check mark6check mark6check mark6check mark6cross markcross mark
    + + + + [EnterpriseAPN CSP](enterpriseapn-csp.md) @@ -2646,14 +2666,6 @@ Footnotes:
    - - Footnotes: -- 1 - Added in Windows 10, version 1607 -- 2 - Added in Windows 10, version 1703 -- 3 - Added in Windows 10, version 1709 -- 4 - Added in Windows 10, version 1803 -- 5 - Added in Windows 10, version 1809 - ## CSP DDF files download You can download the DDF files for various CSPs from the links below: @@ -2696,13 +2708,7 @@ The following list shows the configuration service providers supported in Window | [WiFi CSP](wifi-csp.md) | ![cross mark](images/crossmark.png) | ![check mark](images/checkmark.png) | | [WindowsLicensing CSP](windowslicensing-csp.md) | ![check mark](images/checkmark.png) | ![check mark](images/checkmark.png) | - Footnotes: -- 1 - Added in Windows 10, version 1607 -- 2 - Added in Windows 10, version 1703 -- 3 - Added in Windows 10, version 1709 -- 4 - Added in Windows 10, version 1803 -- 5 - Added in Windows 10, version 1809 - +  ## CSPs supported in Microsoft Surface Hub - [AccountManagement CSP](accountmanagement-csp.md) @@ -2750,12 +2756,19 @@ The following list shows the configuration service providers supported in Window - [Policy CSP](policy-configuration-service-provider.md) - [Provisioning CSP (Provisioning only)](provisioning-csp.md) - [Reboot CSP](reboot-csp.md) -- [RemoteWipe CSP](remotewipe-csp.md) 1 +- [RemoteWipe CSP](remotewipe-csp.md)5 - [RootCATrustedCertificates CSP](rootcacertificates-csp.md) - [UnifiedWriteFilter CSP](unifiedwritefilter-csp.md) - [Update CSP](update-csp.md) - [VPNv2 CSP](vpnv2-csp.md) - [WiFi CSP](wifi-csp.md) +
    +  Footnotes: -- 1 - Added in Windows 10, version 1809 +- 1 - Added in Windows 10, version 1607. +- 2 - Added in Windows 10, version 1703. +- 3 - Added in Windows 10, version 1709. +- 4 - Added in Windows 10, version 1803. +- 5 - Added in Windows 10, version 1809. +- 6 - Added in Windows 10, version 1903. diff --git a/windows/client-management/mdm/enrollmentstatustracking-csp.md b/windows/client-management/mdm/enrollmentstatustracking-csp.md new file mode 100644 index 0000000000..975a1a8c3b --- /dev/null +++ b/windows/client-management/mdm/enrollmentstatustracking-csp.md @@ -0,0 +1,182 @@ +--- +title: EnrollmentStatusTracking CSP +description: EnrollmentStatusTracking CSP +ms.author: v-madhi@microsoft.com +ms.topic: article +ms.prod: w10 +ms.technology: windows +author: ManikaDhiman +ms.date: 04/25/2019 +--- + +# EnrollmentStatusTracking CSP + +> [!WARNING] +> Some information relates to prereleased products, which may be substantially modified before it's commercially released. Microsoft makes no warranties, expressed or implied, concerning the information provided here. + +During Autopilot deployment, you can configure the Enrollment Status Page (ESP) to block the device use until the required apps are installed. You can select the apps that must be installed before using the device. The EnrollmentStatusTracking configuration service provider (CSP) is used by Intune's agents, such as SideCar to configure ESP for blocking the device use until the required Win32 apps are installed. It tracks the installation status of the required policy providers and the apps they install and sends it to ESP, which displays the installation progress message to the user. For more information on ESP, see [Windows Autopilot Enrollment Status page](https://docs.microsoft.com/en-us/windows/deployment/windows-autopilot/enrollment-status). + +ESP uses the EnrollmentStatusTracking CSP along with the DMClient CSP to track the installation of different apps. The EnrollmentStatusTracking CSP tracks Win32 apps installations and DMClient CSP tracks MSI and Universal Windows Platform apps installations. In DMClient CSP, the **FirstSyncStatus/ExpectedMSIAppPackages** and **FirstSyncStatus/ExpectedModernAppPackages** nodes list the apps to track their installation. See [DMClient CSP](dmclient-csp.md) for more information. + +The EnrollmentStatusTracking CSP was added in Windows 10, version 1903. + + +The following diagram shows the EnrollmentStatusTracking CSP in tree format. + +![tree diagram for enrollmentstatustracking csp](images/provisioning-csp-enrollmentstatustracking.png) + +**./Vendor/MSFT** +For device context, use **./Device/Vendor/MSFT** path and for user context, use **./User/Vendor/MSFT** path. + +**EnrollmentStatusTracking** +Required. Root node for the CSP. This node is supported in both user context and device context. +Provides the settings to communicate what policies the ESP must block on. Using these settings, policy providers register themselves and the set of policies that must be tracked. The ESP includes the counts of these policy settings in the status message that is displayed to the user. It also blocks ESP until all the policies are provisioned. The policy provider is expected to drive the status updates by updating the appropriate node values, which is then reflected in the ESP status message. + +Scope is permanent. Supported operation is Get. + +**EnrollmentStatusTracking/Setup** +Required. This node is supported in both user context and device context. +Provides the settings that ESP reads during the account setup phase in the user context and device setup phase in the device context. Policy providers use this node to communicate progress status back to the ESP, which is then displayed to the user through progress messages. + +Scope is permanent. Supported operation is Get. + +**EnrollmentStatusTracking/Setup/Apps** +Required. This node is supported in both user context and device context. +Provides the settings to communicate to the ESP which app installations it should block on and provide progress in the status message to the user. + +Scope is permanent. Supported operation is Get. + +**EnrollmentStatusTracking/Setup/Apps/PolicyProviders** +Required. This node is supported in both user context and device context. +Specifies the app policy providers for this CSP. These are the policy providers the ESP should wait on before showing the tracking message with the status to the user. + +Scope is permanent. Supported operation is Get. + +**EnrollmentStatusTracking/Setup/Apps/PolicyProviders**/***ProviderName*** +Optional. This node is supported in both user context and device context. +Represents an app policy provider for the ESP. Existence of this node indicates to the ESP that it should not show the tracking status message until the TrackingPoliciesCreated node has been set to true. + +Scope is dynamic. Supported operations are Get, Add, Delete, and Replace. + +**EnrollmentStatusTracking/Setup/Apps/PolicyProviders/*ProviderName*/TrackingPoliciesCreated** +Required. This node is supported in both user context and device context. +Indicates if the provider has created the required policies for the ESP to use for tracking app installation progress. The policy provider itself is expected to set the value of this node, not the MDM server. + +Scope is dynamic. Supported operations are Get, Add, Delete, and Replace. + +Value type is boolean. The expected values are as follows: +- true - Indicates that the provider has created the required policies. +- false - Indicates that the provider has not created the required policies. This is the default. + +**EnrollmentStatusTracking/Setup/Apps/Tracking** +Required. This node is supported in both user context and device context. +Root node for the app installations being tracked by the ESP. + +Scope is permanent. Supported operation is Get. + +**EnrollmentStatusTracking/Setup/Apps/Tracking/*ProviderName*** +Optional. This node is supported in both user context and device context. +Indicates the provider name responsible for installing the apps and providing status back to ESP. + +Scope is dynamic. Supported operations are Get, Add, Delete, and Replace. + +**EnrollmentStatusTracking/Setup/Apps/Tracking/*ProviderName*/*AppName*** +Optional. This node is supported in both user context and device context. +Represents a unique name for the app whose progress should be tracked by the ESP. The policy provider can define any arbitrary app name as ESP does not use the app name directly. + +Scope is dynamic. Supported operations are Get, Add, Delete, and Replace. + +**EnrollmentStatusTracking/Setup/Apps/Tracking/*ProviderName*/*AppName*/InstallationState** +Optional. This node is supported in both user context and device context. +Represents the installation state for the app. The policy providers (not the MDM server) must update this node for the ESP to track the installation progress and update the status message. + +Scope is dynamic. Supported operations are Get, Add, Delete, and Replace. + +Value type is integer. Expected values are as follows: +- 1 - NotInstalled +- 2 - InProgress +- 3 - Completed +- 4 - Error + +**EnrollmentStatusTracking/Setup/Apps/Tracking/*ProviderName*/*AppName*/RebootRequired** +Optional. This node is supported in both user context and device context. +Indicates if the app installation requires ESP to issue a reboot. The policy providers installing the app (not the MDM server) must set this node. If the policy providers do not set this node, the ESP will not reboot the device for the app installation. + +Scope is dynamic. Supported operations are Get, Add, Delete, and Replace. + +Value type is integer. Expected values are as follows: +- 1 - NotRequired +- 2 - SoftReboot +- 3 - HardReboot + +**EnrollmentStatusTracking/Setup/HasProvisioningCompleted** +Required. This node is supported in both user context and device context. +ESP sets this node when it completes. Providers can query this node to determine if the ESP is showing, which allows them to determine if they still need to provide status updates for the ESP through this CSP. + +Scope is permanent. Supported operation is Get. + +Value type is boolean. Expected values are as follows: +- false - Indicates that ESP is complete. This is the default. +- true - Indicates that ESP is displayed, and provisioning is still going. + +**EnrollmentStatusTracking/DevicePreparation** +Required. This node is supported only in device context. +Specifies the settings that ESP reads during the device preparation phase. These setting are used to orchestrate any setup activities prior to provisioning the device in the device setup phase of the ESP. + +Scope is permanent. Supported operation is Get. + +**EnrollmentStatusTracking/DevicePreparation/PolicyProviders** +Required. This node is supported only in device context. +Indicates to the ESP that it should wait in the device preparation phase until all the policy providers have their InstallationState node set as 2 (NotRequired) or 3 (Completed). + +Scope is permanent. Supported operation is Get. + +**EnrollmentStatusTracking/DevicePreparation/PolicyProviders/*ProviderName*** +Optional. This node is supported only in device context. +Represents a policy provider for the ESP. The node should be given a unique name for the policy provider. Registration of a policy provider indicates to ESP that it should block in the device preparation phase until the provider sets its InstallationState node to 2 (NotRequired) or 3 (Completed). Once all the registered policy providers are marked as Completed or NotRequired, the ESP progresses to the device setup phase. + +Scope is dynamic. Supported operations are Get, Add, Delete, and Replace. + +**EnrollmentStatusTracking/DevicePreparation/PolicyProviders/*ProviderName*/InstallationState** +Required. This node is supported only in device context. +Communicates the policy provider installation state back to ESP. + +Scope is dynamic. Supported operations are Get, Add, Delete, and Replace. + +Value type is integer. Expected values are as follows: +- 1 - NotInstalled +- 2 - NotRequired +- 3 - Completed +- 4 - Error + +**EnrollmentStatusTracking/DevicePreparation/PolicyProviders/*ProviderName*/LastError** +Required. This node is supported only in device context. +Represents the last error code during the application installation process. If a policy provider fails to install, it can optionally set an HRESULT error code that the ESP can display in an error message to the user. ESP reads this node only when the provider's InstallationState node is set to 4 (Error). This node must be set only by the policy provider, and not by the MDM server. + +Scope is dynamic. Supported operations are Get, Add, Delete, and Replace. + +Value type is integer. + +**EnrollmentStatusTracking/DevicePreparation/PolicyProviders/*ProviderName*/Timeout** +Optional. This node is supported only in device context. +Represents the amount of time, in minutes, that the provider installation process can run before the ESP shows an error. Provider installation is complete when the InstallationState node is set to 2 (NotRequired) or 3 (Completed). If no timeout value is specified, ESP selects the default timeout value of 15 minutes. + +Scope is dynamic. Supported operations are Get, Add, Delete, and Replace. + +Value type is integer. The default is 15 minutes. + +**EnrollmentStatusTracking/DevicePreparation/PolicyProviders/*ProviderName*/TrackedResourceTypes** +Required. This node is supported only in device context. +This node's children register which resource types the policy provider supports for provisioning. Only registered providers for a particular resource type will have their policies incorporated with ESP tracking message. + +Scope is dynamic. Supported operations are Get, Add, Delete, and Replace. + +**EnrollmentStatusTracking/DevicePreparation/PolicyProviders/*ProviderName*/TrackedResourceTypes/Apps** +Required. This node is supported only in device context. +This node specifies if the policy provider is registered for app provisioning. + +Scope is dynamic. Supported operations are Get, Add, Delete, and Replace. + +Value type is boolean. Expected values are as follows: +- false - Indicates that the policy provider is not registered for app provisioning. This is the default. +- true - Indicates that the policy provider is registered for app provisioning. \ No newline at end of file diff --git a/windows/client-management/mdm/images/provisioning-csp-enrollmentstatustracking.png b/windows/client-management/mdm/images/provisioning-csp-enrollmentstatustracking.png new file mode 100644 index 0000000000000000000000000000000000000000..813656e9af8ce2b266dbaaf60bf0f78f0299674a GIT binary patch literal 50786 zcmeFZ2T)Yo_b%9qihvP81QbM3kSLNR3N%@;ksL*mk_E}34S>=}kSG}%5s(Z5k{UsB z&N&F!WXVm2e*1uOz5oBKshOIYdNcKYx9XOqea_i&t^KWUeQSF^P>?!JOhpWX!A{Fa zODMr$$9Q0{<8~*Hf`55J+-Cv)IAW_LB?ilAzB~>7a?Ir3{d+K2wm->^{&DbkB5P?4 zTNv!(4e0+PGD`G|Fj&>PjKn=bu!zwC`ZQL+D zwJy(2ttWEHv3rdW`)uslL}WVOo#Jjz1$bWr!3SzAAE0n zAjkA``MaEKY=_&K7xNuMq688NOO}GPIHs^J^HqwhBT*F8r+11OK(}D6yvdBvpIax% zp>B%O#-pLXPF??{5-jCUGgO8w(@Y=UU2E1h@(Ora-=w9N@>)+rOKV_gh}$2Uj^`?A zsO81c?*k4Pwk9&Ri!IR~To-yPXUq8T-+P*A=ndnR*9yZr%QFMnV{V1`^jJ1#rlqy2 zfH#X$;c)P!$Y}Oh_9*Ac!M5uLglD2%QRmPr6C3euDdSb)(}{`jl@~`~ux~MN)!^vp z=)!t=jN?QXXN$&lPBCer&qe;)TSiaw7pK~;ul#_Xqw!D+_Vx80qfpZoaA~FTJufC^ z`+RP?MRvR^aiLNCBxpC9IEArHuMnBS74N0pef8bBcKSC`>%O|e?kj6{E23aUMWyCY zIr;ga>@kSftY#bVlioq=>_07sbZ(!8Chbd$8X`YGKci9Gd8yOgtP}hm%c&;mUS=~Q zm<)bz{UizR8yaHOV=b}S(l9H5pM1&;T5waPnw)Wh!Co|TG1a%XkJTpXX}(UMGk)@T zw{D!lbF_q8=sV>%9R=3UGcCHT;cqU2Pxb3F)i*aQ=&voq+*V}V4L9q8YJB)zoKbC& zUxWj5KRGbFeQgMD-dL?kO-cB1 zzyHpyQ<24AG>*=aQYw4|y?S1)9NaFiAAk|mJsa0$U8s6$6;Bwn8h+X;P$$eJj2hqR z-RlryLx<++w8ZG9vs`5Iv1~G1r5!odfO(gU8hajD9o)Z6{V<~7rc9x_U=8^#@X=p3 zOsKs$eY58w*s1pg{I-wxk{2j-dC@J|t5g14-l}9HY^firm6oD4v&Un^5H~6@7sM2V zu(lTz@{)HuEG62ejfm!){IGiXU!?+D?@xfK_z;CcOCn5JjC?chTozi+D05)mD%BNo z4GWVEd~IhIMonIk!4}h*Z_+#ev`JQnRhf)IswRf5>Ei13)1XHj{NzUVn4OvM$+R{V z;|rHB%-$+rdR{rjuSS!?mGLQA^`Z@ia!`w(V9V7Ky>=$KX4X@*g_25_@$0PJ#hkQ@ z?dEoQSU#(_#IE#e2EKWxZHE<&T7Kx+l!{4o-yRxNK1&oM+fI?}m~>1G&JoV0Gdw)p zeHOSCSmh{~U-Qwa-j428rc@%A1=WqGFSjlU@wMF|Z|1&~=Xah_a3*Qqe^8EFzI?Ik zMZeM1Fy-I|;cQ+PKgsh+uH4Q1`U1%={Z6FY&{cCV%xiN=>BhHvlDP_>c%U9vU?G$L zWy36+V(6Qi6S)|4;uF!v@B$f6?HNkN$d(e*=O={xi@$7{uPry78_8WP(Tzrq;`#)& zB1sA@EPO`^c3XAU=AsJ=k%~ikQ<|jx`d+gPZwJw&>Y2KjTQa_>b&o3;tJS{kX#VkDDz!G1%$SZr?@)D-#$8$IFRD(_f zix_V!BmwhsUc}oDmY2LGRhzA&KZIzV9gG+g9@eO-sx~Iy1#lf*v8XsAE9t&fR z4`&2t(P%!W@wt_ip2ud&M4fo5~@$U86j3~3g7h*rY2&_ z-ZmG}WfXAM2lrRcc2lQzgiZ8VVg)!zG1U{rmsRQHujf#ZD* zhZz>Q`MW=q$&51Ytn~N2?uN-(H}<^iBy3t@yPk5oCbA`*nPMkl?Wj zSqR;Tnh)RcZ$q`;9u4UZp(o$@Dr`_iF4#Qr%$ny43iv$k{>(ignNJIgN4YVfw%IbL zm&x>4&w}mC_7I_}rdE?Al3%UfC$n)?xC6N8`P`C7BrdYJ05?to7HTORg>GyP(-T^W z;%=;$Ty=W!&2Cbo88&aD=lKvawJT=I(4kbPG)(o>=-L*mBFFIa;OJ97*w)qfJi*3m z&6b2C=H0iO-caC&sm#xd_1CAG#DIfwS>ro+J$gxn4BL=7u{YmQmhGkO5%7Wkj{PI& z&;my=70;V97>kRGv8l&3iRrHV1U@6Iev+4mr|~-xc=cBN?uVoD`c^t?zM;nLVao#AZ4ycLlDp&@@g6^#GN| zSpWUaS(D6A1--o~tYS=dwV}s3auo$Xle+-32{y-lAn<;^j| z*wQMQkj@o7_vr1Fvm-8}yxZy1AH(?XuB{48`o*wEF*T8u?as3?D1t_clI`GaJiNSN zp`pf^p};y0IE*wtQ~x_>t|s2G4P5Z2|1jU z2|_S;{8874_R&wc6#TshzX#V&7T&6FyzjAYOl+snLhPO;J?ua|b>gh#wkl$FZ3xn3n=2vxz^GOzV zb}I{ua6)h_!-_uJLHMW?iQn776+SM!eb;UWAV#ZLm+8D*LYajXk!C@BEIws})?a0B zpspv4_WkhBrX}$iy2Z9hkz%D779?V4e%obWU|=F1S}n^b2n29zD9#Rsn@Go(tFra-zOAy_jTz z4s53v3ZBZr3lt0Y$wUz1Y-Z;qPd<$?pwPuHrxp$k>8z-OUW#tdp_bneGEWjSq`#z~ zqc`3g-Dxx9ooG5R)D;!TMaU(3e^1y>LxA7i734A7yJJEtanQ?=ROCi3E-udY%MdDX z^f}jVxm?9*W@a`K4}m^=04c%X$|8|nR8P-~-K_=299^n;=PWB2z?bjJWRqmFPO^(y zCCk?v6k`N+8@VIJ?ga6b4emT>j%Xic)(qv3QNa5Tf1l|1*4z?!e#OhP9kf~n** z5>k8P(Upo%^jj}Pma+Sx#{2_N6)vR*O$7I)CaNijnE7TrW{`wGBMffF5p51i{L+#4 z?;*iFvo(l$j}kCcOVC}oV{61+YOl3!dU}Mq?v;V6nQSG`2hX3j#)+meRRL}J#rB-9 zsg~3LP;`1c_ha$#?u74@CK^d*w<{S$eYcK~?Qu%_m%h`u?YJ~L45nts=zISX7LNBz z^%$z(PFNgyx@zna#7r?`MQ=NNT&-*XCtEs@Iq`fV#lnkQ+&~WPFB%kIeQH>JU1d)D zmZGJF#WW!`7{iz~lkC$^)`oL0xWAyHd&!O3u1I`d+I<|a$|HyzT5n3IPQw^Q6o?ga ze&u!8)2rfCI{QvToG=Ar(Moblo@HwGVwAVBsQKxRrv4@zk28teN@edolQg{%fl>;e z>z}TMn-za&AARC1?m*kMYUfadOib^2a=I8NG%=Lf?-d@IiX}{yUR1?x%wKF-_%dzW z^DtE%Q#`a&jgy@n&>K*gwKm-vIIELV$S7^4o_>XY#bIaqIEBw7jga$4T61Xkd{1Xg z4CKx*WpGwD(PI-qu%BgeE=eBSq%LtgBIy?M<5ABkQMaV~HaKr*6gT~81){zaD`%L= zTPRQE3amZqDNqr2UNxtnAF24BaogK{pv!ukeO&>Oz3?)bI+UaV*FAbOtG$-`L_X`+ zq@`i{i#GTTB-zf>*`^GO(W1<)&+SH*iD7Azyk<*QNe*7sg3ZA<%dQGl+1{=!CX6t4 z-5T%eQrUe33`X=a-qOr$R@SMVN-gig${Q1AOabfk5j3|#-pz=6hP8c{iqCo|6nK3s zzokELuKQYJ<nR%iOifu0K4b9J6rf7euR{2FgPhC29Bpaje_TrMT zzwA%ZzIEP(A5H1E;u{>KW-vTPtlep)dy*;6gO(kS$9Dy$KH}m;CQF%aPQb9*7<#4Xd%EIHXUl{Z%2yCkw`bQET% z?KR=q-!Od241tPvzlD-*2Pk>ddE<#CX^B(RJ<~Z9Y0O3H5gB+JM{#%WY%+CzNxq8} zIo!f~eb5hg{`g(}g5}*>jFz&drG4t_dKM=MynWh8oQYTe(eDM7d&f7CIHqSvz55kv z31CZnX-HwjvZL6M%kQ8~t(qVc!bebf^LyW0eYBM*<$jBUsCLr;Digx!O4{WampoyU zjnlZ|_)aFOrt;yyx7^hkjCr*DwBN9U^k0*W3y4d#*0TC=ToXMG$|VkCeOja&$EW)` ztwvl5T_0@^5XVjd*V@XKgx1zeF5%uIFna=g&btrVaPK0Pd;X8jI$rY@eDYu`vx9qU z7K=QyZ)qRucM^sBbyfnY>a!o1}{rse~>K3Y!>z3VhZhI z4*bLho!JL?ZJb1`5=l(mGsSeS;Z6#62%!sc=9QLO(C9$kG93YZk}c%s-O_8G=cb>H ztYb0hscVv%{lyDnBh}qp*TdWkzkGQ@qY0jVB9(w<1Z?9ClVeAcbyIfW_Al#jF4MZ;4+3}J(;9Ov2^6;1dQ3qx8UEK)Qw2X|1 zH&BGU_DKWY2Avrw*=+3x;@Jh&$VDh5Wb|FVgWMZ+L9Uh8>P2rnG`l;kq0EZ#f8{TX z?+aNr1i?vtJ<18<>f)$1)yOPNOr%a%Ww0wxFmc}a__NZJJq8LmvCwibvHPnAglJ`|L#%1e`#pK$OvWZyA`r-8XHP80IE2D6+D(?YIm@KB)heo%&4#Cq2`q%Yl|b7}EOT8m|lD%t+UJMjeA`)d^HnoJQn92dlnVZpnO zS*5?fL8sFQNDJMrN4AYeU@u-uz~9pkp_T#NfLxy*Q74cUD}v&nGCPOz%l0tXqs0dZ zdYNqWAf|Y+yed{*TtZiSx$n8r1 zk&rTW&(Y4V>+)Oh^CR%{v>TkV^C6@7cb_gSgCfmgWD`)i0?1zD$%YAa&=kRI(9{BR zy{N8dVCs}j&H<6FqNB`YWR^cc8KJIL@LAy};4?}Opm+H9^Dx+{6TlagW-=Bmxb8L= zCUhrr4AilHjW*=y`S79TesYl*T;@8h+g>gfYh=rJ6!xNA6#o9>I(Z_O7T?{qFWjb$ z&!6W#S&x#rtsFe>;WKdrc1aYF4bIvKdwY8n_7%5bqpKH1G%Ba0b!;q1+v($2C?#)K zy%?L?_Iuq|)q>f z+iu!1oJ=oy#w5c~lIv5F@TI(~A(lD}*I72l!t?UDS1ti#*l%~C1-*k^3?p#7m>8oi ztj5li=b#=Q^T35rO=#XbOfm($n{Djl7A;?0p#iv>6Q==HlL42xk;kmKDv%}*CsM2+ zhg;RfsgPv=%I8rl*de1AN|jK1ccg}RuNA$y(u{u2;EJXI&AkP~^k+uhaUAg>rLuy1 zf4x|xAOR=Jf8XjoN?sN9jWXE`v7rk!at`d|VYT3w+xAXfr@KimVEn0hV!OMN&uz)S zRpA_Do@-(tDfWJH2a`WepPA&LLPp-g;EcW29rF>iUbf3NmI-$4Z$2FahbSX#&6z6y6yuE~e3!xEvwCc|t-Uo=))qc`f zsh2#g(*cXI-*d2;LCo;Xc&oPeh}n-1*q^o+e2S<$i#;YAWK8QqNE+q`G8zSEK`P44 z`|aem3UQ1VCs)aX?R+T}k*Lf>2gQ%anCl-m^VcY4$}}_0kWjuYah@pb+sxs=cm($C z8|2!yQHPdiPha;*7m+qi5V|z&ucoHf^ztN_mlI%Kl$q+U#z@NuDU-1U6T%+702CXr zSVjT|xawOW8e|C*l{c3k|iB?ee>P60i(_=)svr`>I;y;TxU zqQt+9>= zTq`b4?5i-mg)cX;Dz#sWtB(&-Jl`$|h1hqMhxr|z1ES+`p|x9lPGR9wKPDI~@ZSD5 zki#nnCni=^%wfl4ccGL+H!L_{1G1C!C0h9qcK6+;reD7-Y(aja)#7)H;!um>(d-~$ zkA0s_&}|(Q;J31}f)oI8On$zxA1C020lpw2hlh4D*H>3dF8MHL#yB-o>5=BFL#GzT z@l(-iG=D!}`)T&^wnlq8BOpLQy2HtYLWV0L%ztF>SI@);0$7~fK2>iBkcPR1g-&?k z>R8Hd_lv-QjLFKM#Ut#)oKhfbFm$k|b0%|*wS3Qsa96# zG5|r6Iq1M)Lb0SM2ls8>p&bp;N)~osmPk~}M@o>^1ANnA1f|uB0N#Lx4^E9YXK6ul zB&XW%by&Q&T~aKcM&ogJ*+60j004(TTfh|MfHVIkpjT!)pUiE2`Rh-q&}bW_WIoo! z+vdB$^r1jYA$FB(CRC?qO<)JDrQy7H~6mz%RLC1!0dC4km2+ z8GKaCiFZp!cfKyjrrasBXG^-7_cec0PRZ?`jU`VqG@W)nYTin{^{a9GCdh(!j;O7D zEGqestHvwMABx;9SfBrJofNR)zzxNtYum>GabEtqBTOX6>m31wj$Gpn#-a>mhUGn{ z=ez1Gd<%rOvha8%W;#m-Zy|q_ZghD31C2~CF7&;6YLnR5GGP-4r`&}f4A`H!etCIW zDi+^Jb?1!cAg=@WU2pe}uuSFTDIXQ(5)(oBzGR(ZQj?fuVy} z4JQ;td4M=NigJR9 zs)17ljAA)~bELaLyk&W(Y%h`9^m5!+6aJk^`81_b$sYf2ljmm}W}BME8xz_c6V%wG z5YHYmJ-c`umZkQ)Rok{G_-5n<2Y1&s-FBzVpXp_rVTy#CEU4+Tv-3uDIFPwg@Rrr-%iht>yIG%H zE|}1awEzhY8!Kys!FkvVA%I?hWhJhY!wZ*ic}PBFCzSxHUNR%m&)VLXV~wlx^BMf- zj=*{e4xEot3M0rrbzoDVe9d|Kryi(4Q7D-^b?xx?`XQ^b&Bd`1;1JqRk|z#4%Mc4^ zwkAFfYXwRZkU-1PVEMmJ@5noLuMH(ofE0~9`Z%j;2XSH4Y%lD}7qkmg9z`anK zamh&ca3Xeomeb-N`2l2C^zy)MkO96VFHdD>tlrGztR@tBg#aZ(3q=bHn_3eGAxt#v zU^@p|!lBPiWP~8Om#&)`%G3_8)K8maHfn2XX>m${^udt$fx*p???;4A+gnv*{0d0{ zmRK+ofP)5hrHwoalRkOi)^;Btz5uCM(*ery#s8>!xSf8UfsO+Tra%%)Eh=1BLxZCR z=$VLqPco7T1q4*~Zt+SHxBL{5uI6KQDv)3+pmSx+yA1DN!$kO|CVg7s3hU=^`7pMY z=CFm4vX(a_1h7EKgT9ri1Q&I6b(!XUo~Z}Yw9b_t{7%T8n@-eb#a7!3DdM>I6V&#(+lB)V-sYYFG3k-w^#pZ zc>h5BUpdth%E8=MD-xvq8xcog%LiKovj4Np^=oTu_4V~QPuZvW4{WeLCMSuSfC0D# z1eY;>Hkc@XO(-BBFd=;u_VjQMw5yRD85kJsZ4Ex3UY_b)0z{-WP#uah#9pIUfUMT8 z5u{8I+1g+24cs9jM+J73@Nm0recXpBddVQ1u!?dUrgA22w;aAK!li=Q!13}H6cknv zzW_1=$Yp^2H~j_@C)yiLw1Xfa>qLad+zk;Cd_hOhd!)Q5k8{a7K41FMb<Wca&~^! zjl=OLCg0c$BaN>=&?)I~tJuLKM6XGOn_syY!0V?LeP5&Gj3rS5b|H9sd zt$Gi%mRj$QG0PVIV9UC#9h;N%-0Go#LZc9=F2e8K6~<*9&lkHK9`7}}E=uUMM4zt=-R8KmG$kgI|4*A{@05a0y%1(>7I zurQIW9TPxBg;!o#pRB(gV&_(0QMc?|jyXxMj;N58%NTTg-93&oHKI$ZUfMFOU9Jdl zP%tqbS-liFlhGC~l9{iX`M6R58C3c<@AN3Q`4h+ZAMy@LI;t*Ys)#|ANZjYXRlgo& zziUJK02}+3Riu1%l8CO34!0CNZ1uw7&H!A~AZ7&z67qm-G9eVPoa6Mgat1u9RtkE37A;O{U{nw@ z0$8@(He`v<=k)%9af}^zpN*}r`>$)4^N3xpU#J7xqr5MbsYEZ_0V%m3yTU`A;kO1i z^>~r%Rx%7CE7-{KH)(VRcZew0BbT1LUDn25O4T%YHbLZ`uVTGnd7q;vV!KDBo3@U8 z&7D;UY4DPRMx1s#a36__eByPKBcValQg+655a1FSkgFuHS z7}R@BPQ2XIvNE-ZTS(=&`)p0j>h*f5F6%m?KWS)Y|J)dlHaihH=ujI$|C=lCV^30Gf^79(XF;`8kS zE4NJCPz-CIyewYJl$2(>6pCSW~ zO2603%-)bVyJ|4+nR4O%z$5lDUyv{c89a-R>o%J|2+8S#3R+5^uXL*ciV(I7mJn=f z=(HBXXzQLn-34o-x^puqbbRkE!g0L?y}@*^H!@*O3GsLVzG9ITMq7sF8hRE|%eqc4 z!j;xi`bArl*T#GdXPRdUqKdy(1q3~X>q7-)5gPy@%ipw!8GIt)Un11;`n5Se_$}7) z;mD2nc1$0?Ei&ZmyrUky)<4yU4sCi}9&~D$w<14VOi+>v* zjj*dD#=0Kr>7{XZTULo)6MZMC#qxXkNR*RY2(mSndD7LVYm#fwe?Bks-iQ|5yO;te znLV{rJM8siIboh~p)xBkxl_2Q@&3=yNv1sq`zj{Ep<2URW!c&K|7{?U>^zhN^1KPv z$4CtZ^{6kVc48vL@f~>kgdbN2Vje4KBva2|r{YVjzUa`7yeSELYDIoyLO1!toeOIT z0a#x9dYw-h`tub+(I2x-ao0_L&6^Lq`48HZ_T*8|*d6az=z;X~?dIi|{r-!SI!u%Q z_#g^Im*gV_6#`ej+nx|*;Hy1D-RgpQt8+S!fVNJBcInN#igitdvgU$kkoHd=5B4&5 z@3*;)DBH2BArgGkFBO4FNx`Hi5#~-n(xc&Sh0)xLww1CP+3dgkZ_l`m`V-n%U-np? z^OgT7;}}Nq!ucV(`j(FXd2X{G0baR3DgEh>vJGV<0n26hd;z^Abf`e zgg|xJy~r`Z5!NYH_Rxnu8lZcSRt3O5F7}^eFa(7j+}P?Di4rkAeJz*TjZT&wv-(;B z#6L*n`hZpA5+Tg(A8`3pB^bz*m%A!{ln(iP4C1ZP`|51b4S37e%tO$E*6 zH^aC2Bey`A^H$Tv&ZX~Rv9NOo>=5Jtc2yBG0Aqa4m?a4*tUrY)+^I_2Gup*2+5uiP zDzX5hR8!a9PTF+r#q-12m>xjAx{4EMFJr-JaR$L)lm|4*J|;(91pz=U&*4G!0C5a} ze9`>FNe37Js*lO>J@i4!WcNUn5b&Gb+K&oOf=J+n`Mz)zL;-*+g`Wdx-;nyy9V9cp z0-?m!fy3DsgP->R;X>cxb_Ij`PgnkbH!IV42%zPi;KG42B-^jBlYd2j@PNHEM$<~C z^#OszKCu*KK&LcPw1AQ$plaxh2U_M#c4Z)41p#^E`(q%9cCa4-a=W*c4rNk8jfqVw zH+@z_1c7E6qGw4VTwTh&_ZljYvKgI7&jfy>5pn#~zqapm>^}3>ZmthdvH!a(Sza+7 zUm~I7G*NJ~X=oq{apdn^_>qE9?`_A;kHt>BcvHZ@LLAHkf)k{F?_m&E z{KX$w%SfxCofnihD_)E2m0!00_TzvKJ+Od)=gg=X25eyk#7TSyoWuvfNyIX`i^-LL zJA~I@%;35DF0))Kzp_WC8HuKymF2>j^nP5?yCi>T!13slfsf&Zb`GPxo;~UD^mIg6 zz&uy6XISF|p={f4zzd8F&?>(*`zPLe&_~3&Z?)%9uYmM1lzjTvV?bxF%fFk({pxbu z&o?&RWX#wKP%ITn;WamHXcf+ag>>|YllwW{{a6)*U&lZ^^3jR-1{8;QQ|-Da>F74* zF`m+CT0|EQS4D9TMGlIoG(EgE&>7WTb6nfH?bb6@}{g^NmU{6KL2(y4!qNEQw_ z@iNGh&-EsJHDRF1q+s&7tHSB3M?0+{*OnePO&JI%U~WabYgYFc7@fnSk5MG6DPLN< z-{=U6?S!0HYcKnJgZ*pA0RlNaJ)IdVW7gT5JC%E3&p9CV>-7!yyFqchDFRL9bIZ=w zH7bMTxU3kQ_;6XkHqcT7rtJjm@7V!#+h7?IU-{FeJ2_j8NJQZL_!mj5gpr7@=!pjd zSexEEI8+1%%i{8fY5kvkpiwUtQe*FbKu92-a49dBaXxt{g?SU`XNRcDC+j_pgoeBq z?uIUsNT*@Ww-W=YF>$km!%OnKnJhD`Ew+D+PcBupeou_Nun)IFPlscfiwex+DAabV z!#PpS*57BjD`(A{VxKu-i~Dt|v^J^AZyZv?uCV>ON_4z_ z$FV^t(^;Hdd~#E_%j6!?dgW+OeNEqo{-TSkyA$CL$w?i^x0Gm0-|x9xuLgZM$Whx$ z9M#ybDfn&IS8=Fi3R+h;8_PsON?{Qf$LF!!hI5F)?7So!uDzdnv@((Y14<8%n!piW>nn*bZ0p{I#@yAQ2Q?UQqjrImXUe`gYJ8L(G%a)3f+dW3#C{24N zQlceKo{11|`KBInozGwBSWiQy@5Zm@xN#(}=9Key3hJCb=P)zh+D6rFlU<=l^CIKs z?}A$Gru!g5-1lAHb)kAd(3?AHSe&_i?r#rc=rXyax3|K&ACs&s1$75xGo<*YQ>U;2 zwtHpR;aVSq&`g_3B|bl~`uRv)8AseYMc}tnMIyZot7oyloR-C#t8O=o%`mHY_nW&A z%uI4bA-87lMfpCvke`vYrO$eM*l(4Q)^)ABoiuar64_ryR%^3Rj?W+V33=k~?7Ww$ zxI+kbK#=+_9ZNiN+JTgXI=*8U-zm2eb8YdyxB91n%ckN^LW;NdQX8-H3S>1nD>$Ia zI4k=u@#@bKr}OSDU$l~P4*4y`Jpwbl@|V>-xt7;}yz&GWcw&as|{g5%3s z_sXm`;~Tido$ya7-JTWJ*Glm7n&+Ji0h=ju5=pJ%MiLo=Z_DPXzTaE4WQEJcI-F~Yqzq$3d$8!As!ZTb;L+k6n8&o{tUTu=z z^Ei`dC)Ui+Dg2AcT)j;FB<0dTLxEaY$4JIhvA()()`dc_69~HC>>c+L#E$WP+WW;g zocAW9!SuRi%Y#VaUk>W{eL?5dsmDuE+@|uv@5db#BTgsato4jE zkkfB+zhoVcC~)WZo;u-+?FsGMFg-sxtJ+D{VqGTezkQ#@xyuyga6N%Xz$OeAevTog zgDTIviRY%Pj=mKG$;FCG0__PUZu5x%0^WIZ{Wk2c9eB_7skR^Kc;<$_xP?{J1(HwU zeBu_9kv#+}ovLK^MK=vMahZ3N@5kLn*kh=5n+%3{3V!HhcD#?`pXHRWv|nYLjXXA- z+2w3d(M@iCoyl@EdjR2cWm@Go(@}HnzqGcF!LRkimKmJBOf-G(fK*zTp9iUiOF+T( zo5_nu$MJKEDu0*YR{!GV??E5^yNdYo+i#El^61A|!GFKSOhD^ov(?v^dc*eQQAnWl zJ0w;n`|_o@SU^BeezN0Do#@2k6b6($`_l;Bd2{vl?Z2ntGDL^vJ}epXS-oixCQ^dL zJ52l_IPni-l+5^c8mQG`L#p)z^G2xdleQ0)An6=t=U?&9y*P4^8rVlE#A7atH6kG0 zTe4Hf+5I6fz|v@Sc`33WGm_xUCBeT3$qHaZRUxy;?&=LF-#`OJkgiMecGCj3$wvtO ziIl)7%uGxsLD6HK(w=W_i&la>C}jcJVjy4D*m~@2VbOHi5Xema@Nz(o5Dik^AIgN2 zQ1$H1_^e4i5%!yS94~$^a}U>&<}EP^CIZkSpu(txkF)g4ms&Nhqr`t1Y%ht5^1QoC z5|14L;+Z1WDxz^=%-Lk zO-%s*F$q@7mUW%YD5$oIl(A0HMEhNgAUbzQJ^|`K;GAv=?28XrwU%Xw$pt|M(P$Nk zXfarzMHcphS^dvL|Cy)%N4H7_W+JBZ_Cmc1MnJ{@rP4^n z;B@qD4-f%&4*2V2Mp3b3Mh|)_CSoNJChtcT$3f=NGeANdey{!@BLdk`Ji52epGCxJ z*^$FUas8%9aPFs7l~={B^C#9f&#Z~BMwbY;FZ-eY)uB}lIFNB7m(_iD(77eI$-b(n zb>yIfN#;Yzyway#?q`hk-RC{b7pOxYW5|1L`rYP&kBZ5_^KOBma(BQBDD9i_e(xb^ zuli~IuG+53cSb@FKZn>Lm4h!CbnqlFqp0#Im@H?C^=@g|=F2{TdzY2h%{{V=|LhN>^B??AnBnqg`|NEOJYQBp zm4&V7{BNxxXSj_Qt67*V;dLQhY%U{QDp~B4CkHAX89W`Qu^!JT;K5&L+0hr#(Ouo) znh>a=S~vXR&~N%n0gYVv?t`P|A^j>hD?+TbQ5QdYeEqhyiMlH1l#4g&)gA!PznABzvqKb=jU~~$7)bwK@&~#O{ zDg0QeexBuzMiKqtZ8A;7YGpNgM(z0rIaN~vvk@Xx7V8%#DeCnXk^RnYE4=R9c`hmW zDk=+B_cK#*lb1Kmfpu^`FWaMpis<$x`p9wc?C zi;d-tX;;V1VfNUckZ0e zkC<49NA2q7Z3#WyRnSTsx<5POQYl%j^);7qM97>tsWe6Z-`3ZuSK=K0x@?cO`!<^( z-FGRx{|>>{;uOCSfu#$~G*P%r16~=Ij}hH%QB5#)NW{RWIlh>1HWCH($8MS-o7V@K zOdEbp$7}VL3q6P=6-FB5&#RJcL(8}~jqBy~uriGDoOPPZ6?LXzBHp6?$2Z{3R`B3h z)cs^ee#6uwf|kmDWMKT}uwKV32XmJiw}+0>W2pRS5Yr|DU#fI*dmB{CTA*i(H?7cV5cPN@h@)FqaiDCSkK}BrzJ;0iSp_8UNtB1} z@{jDecQ^~E+H5W^mlm|dT~1+~LLT~R^C>4dM{M)YXwFsttwI~N z)s-|c<9yXCm>a6_HoUp2$e40)wUnGwb>GB=(*C}R{P`mc zxv0#sf-EjsX;a4yc#QNE+^PSf{-vWP?XK;&egsPKQQBLsiRD<-ZX0gfT%SmXi>a9HH5;KAJ38$E~ z`6D6K&NvGHPPQFuD|A80UNrrD)S6ZL-ig~nCMt<*E&bJRMuHR~GKOTLMqJ!z9ImTq z-09F_8+37)9=MCoG*-Rv?^%#8LMQ*E8aXh2qyntHFTa~X?vdc{h9YQT-j)vST2 zBU#2L_gC{-7UeO46r_tmx(-+YCXAJ*!wKwg%=pdji}`kE`LcUv2MchidV(Wq3+911 z8lDU5fm>VV&9ZLPwAs4R#%4X7l^dllrhyB&{hDlpdfA;7fq=9hk=axM${kH%;&mBha_y#24k_B4Se!c@(SZ{hqMtJTjs z?B~a$#U!5p%Vwxg!<%WhZNmcO>Gb4(PJ5UF$hFHaPp1MdCns5c}a_dKQf@28R( z4O_+jKA-zU;dHOTaQ->OYfmr{Q-1l^Nzd~DQ5)xZ2nV2w8V3ip(ly5Qg^|poZJn*! zR~YtVn&vpAb#eDCBn^P;0Y~bTm(b30k%XeEhlEe!2ouWm=2;rSub2n7LP#1D^r(t1M^LeyYI#E~;^fOB!&R@=pm)d~a`8TBDge3||0~iq?HP?}oR? z7IfQMma+l@r^PAZ*(hPUrWGJ71+s6MDRaKRt1~m7`72p@ps9_~%PXi2QR6*%?41AGM#=x>3ofz;Cj+{W!O#ln8-xMf$@mo&!T*AQ&MprCL1 z4$#W3vLE&fqBDPM51_ZHbko=}K~?$<-&g(6J#TPGQmN}TXw^Ti7b;Xn_#1uBvL zNGS9WvYei2ZgL5hB;ZnkXTwwQqkl+G^6pCNy0hXvB6Os&68_y6D{z6`KeCmC3Jse9?%aHYk~kSZ}F9ko}VRW5l^3|TII{2Ur*+`*d? zOf6^GdBXNti3w3Wz#<>1O53$T#Vk)+w_nsILm;N;lNvwIl5?Kse-U{A@%EdlZH7tJ zz~;g6as_mu+evVX4u4j6iPEogTtV9{gic7AS!}sRy6bpDa|GvWk6qf!ykx;!6J{B3}H2O1EJwdXsEdg&# zexsTJujz}nC$5U(B>DuQnmD*RsH6YFbLV!OPKp(x=!=A<*S8XW_o;qgrxj4r>3+zt zg`V|U$1S9qP*$SGZqZm8I8FO&`RzhS}CwYAYgGKho)xaGMT+~ zU&E?KmaXO{W@l*{-#~Q-rN}^@h`lkr6%jDi!ERi4eM^pB9CIrt0aZa=3cCvb<7HYa zAL+8urZG<3-LPxHGOk4}HKX}fB1r~+UAWQ>9qJj3#yqn&o8Q)a&V)4(Olke~qWhHf zqqnrGB1dhjOE1EAk&ELcX_T+vYTHC0Q#rW@kDHFIjto4R2>7IH;Zd4nk zw$%7k*s`IlSDT+=*;_ZB(*az%Bx0aF$j(YVt zgX?aER`*qf|1t;Fq?}F{5!phMD#QeIMs`cXS z+urpOOF@Llo!9((usHTV$>w|Vf9kD)Do*C79^39t!N?HDzeIL#pE@`=%xi8g2=7w= z77HxmJlUJ{f$#uC*ZZU(@z?+;@cfw$_uB!* z0w6Jkq4LA8^oHz^YXjMf1&Ym!WU$AF%S8xMYI3=rBl5cj-5AH1kLOh!q>}u=MTH>M z6n^~_jQ$T{`O0s1-oYm^yaJTAE<_2)su4AT8te}I^6a2q?8e#d=V)|<_gxzx0Qfwg zk(Tx$ff)Al@LeHI9i39QNwY4Mj9`W?>xWptNk~k#;Ge1reT~6e*GC9vL9&3=dv|n- z(xA`q*&Y>T`{U)OLV>sC9#sBpty8>P>TbQ;B{ISlbYi%@Jy2L0+5pc8V2}UI^AXaV z985Z`_8UpdNEz6RLskT$F8<2NLuA8Wng4yx;;*DWM1A}v9e~J+zf=Jb=kZs*by4W#xR zpD%C#W!^w1L-|cfw-ehP~8;M0K`gp41s)o#V-WK;cpPkC{v; zCI)a*-c7kpy(s)BxcT5Lxb!q2A5=ZYn&y7aAT#*{WURNCUi>+h07nOqB)I$(sA^RB zp?mhag7m=d(3fwi!GZe zT9m^uoNuUZ2mJFWsALq}7^ekQVDGIou05!j z3ef%Y(4|_CMo6FV)TKWrC@Q9uwy(I&eYk&AKxncTdv;+2AI-n<;@)3l0%cdgiP>W| zp!+p}t0Thx&yyA~BAL{~n$rDZ@Bf|vAr1%tHKqHttKGxUU(c<&2YK+KMedoNaKSm1>?9L-u^pl zw%-FFPe@wV_#SVw&9GGVLSaP%okDN83DNw` zuK6z43`}%9#pajZ_c4Z_U7tZ3`S+sT|M+SE{sSjG8CA6w71Gu(7SJeP#NnvtLzsN; z>es&;kQd7^AfjF(yxEUS$d~6u#32T-dpeA!xwzp%Jndk~x4h+N zJfHG2j=PmPO(=U->Ud&0rK~>Uhu>yj7n0e(#k1+(Z7XFmwqTGeH6{zVt5)yaH+vZN zUjM(Ew*Q@6=J+eQe3cG|YH!$?9A`+UGq4)lr7qhpK3{0+BaVOd)H@aa zS1Y~Z)}=fBZ$|)SvFDKBnZfItO&6K&P}u#p(L4{?JwhnHsg0<-x^gP{O>ky4zPdtcT>g(}KYJxgZ+c6w?@T zK*^xUs&(X2>o$qZqZ324b4FWlme&L~=_VgvGNHqTe3r1tFFk@=xzsGOi@Vxf{gp^d zO?@}(;w6wn4~A}IS7BV^L{&V{y?tqKr@`nFE* zA!ibu6whybl3?kuIFlD&62ou_uQKsI@=C9fP?A8^2<4dhyT~j%&u(g@lTX3*()#HJ zS|P{9Z-THFX@_puP|`H4LCSAjh{&(@{UhQG=I4PO5omy`L=T_4{g;0Z_=YsNMAFPtx%`Jxf7C zcir7(b8W_EYk=I1_mtTg`)j;f3pQ~@Q$|HkmEZoT?ku}fRlL?}r(sd)TSz+-P2UW} z6QJx@e$xldfBEH+!)ou^cYl;bA6%~iT>}@jK4-7}tjSY-5-zJ<8`A&5-g`$? zm2G>2$4DU}0s;yGq9_Ool0}jQqF?}yB*{^bEI9{7q9RC?EC-OBL~>F|N|u~aaz-*7 z!s)pIDR1|9-{>CSeLY6^yZ%w5s@!LXwbx#At~r0S;gJ?O&R@{CF@FPiJ~3k zpzWX7epak8J9SF+P>oeQ*Spjp)w4dj{E0t@%q=nvgS1u`--8yYE#fw$}LD~5O5Em#nO_JBX?nnAF zxkW|xiz~~333?bSj_`q07mT;tKq=kEnd0a^G3VSOln|uCuD;siY2OU+vswgM8OX_08b-H5fGw)MGiQA zP&gP(Ja}{;5v%?VL4xe&Q4f;&cIkQiyIm1rtc$ zMerUd-hZG&K>ju$&&t~aYHVw^BqmJm`)x4HdGn0 zbwQUSf>yR>WvT8C_3=r+Yj}A3Wr~BSyK`#Ay(v;Gimt7k(iwyTiFhN=Rnd>ADM8t( zg`m9D%az1Z?5QY%$lt|l!5i9o*#SgAdz|oB-WP$Gmw)FBMv1`|<5*o&{V;iNPO3*b zvpl-(u_OIh_;p6K$BP@+>gb-A{)T`aK?U}g*+7ihkqQ@na25NpN;7?4sQq}~t0WQ9 z$E(FYZMT=cMQHQ9bB;ZMZ>j!P*F1I)A#_o+O39e8go4#2kVC7oTB2|W%)VYl3pp5W)>+YIHH>pA;U}nz*$i{_r&F} z=uxHy#fU4cqt6+1%|_l}k0S+Uvk$s{inpmxPyV`wcMQ9~OrxaiHV0v1?obdPw0M`1 zzsCssD zTzeh~C+-P)6_fOIy4*4r=1<+%d`OAk^S9zH0rP*5`$AaP>gPTxO+lpR@j~Ae@dqP z)SDx{Za~Z)-_MzvRpi`oeewGD%1?!|Gtt`yBQpnwLaU9r+U=J4x6LofZ8Z_(^*6WU zk&XPWz2EzXR*QOPILE*JlBl%3(L6%Pn2S6*8aA)x0JYK^Rwv}2{8z)A2Zj+;nqd*{cF?+I5hgVak(X*a7UkD87qNzU_x z+S&facU7yTwpQk4mDlUc<)adPiQ`o5Avz5ut=?ULZlzco&a%LqIBse4_Rx_(Mmi3| zDeW*X;|>^haP0 z#_3i%jT0xt{+Ue8gAVB(bu!67Y?SC+9=95-6A8OReRNX&M|Lp)v&5imgXkJuR#a3x zTd;J`;A6L>SFv41!1YBxa@8>j0u4$%GcRtnQq!yV1}XEH*4?=Q7o@PVsxzPy2I z)lfh2*Vo@#2uD!OIoa9LP@_U<(dBaN=g?(#|JRTb2lC1Wc2<)JgU?moe?3tR8^kIo zkLSXB>fAn(6E%*f@26O*xHgfHwq}Hz{7t-H4@WHp!5@gh8A8q;82@jHYAHwrW*aykePDlvyc?LFo$ZIxQS<$u zz=X@V_~9(nv_p+iW!xEdH;8X{2=NfNE)R*Zs=kywV#hQ zfM3+b9sl`oZJ&4s!W`ef6_9PQ$8A^NKltLGABq92?4JQa#d&%kEZBc%sE4;ipDFL( zDC#l>^G{tJ<#Gy*K8Iw@JD@z&P47fTKLo~#fNhTL^s&C~cZpDb=b4TT|HkOT-Tc3G zSxmpoPWv^@flWS?E{-|0j5{wU=a2hB4uE%yvmF^ioT=iN*NZKjz|ZE72N6g?9Ac}p{qabdSCiM)yl`rl3QFSvs09c~f{$gS-E z;Dt<}vZ$pCgPVrE-Cgl?z%2R(^tHtNtW3_%F%Iq^ARUSM#D5SzTTnvSxqZxmbVd=< zDg98$k+=kI7fPYex2H4LV8x(MzSNf(thVFQgos;?V2@J|FxcmF@WJP`f5Ak?Em^ex zedEtF^!+n+W0z!90KAU(&*L4xFZ$hJDT)IhFg-9XuxOxA59xC-`DyC58ee&dr0mO^ zhn9t(dPXq&%Jjw*gikJLvRE%9{j9_W-lo)Ab@=g|&>#z-P%RfZmF#czn66@S!)FhA zl!Tv}>u;K})LFcrnlQ8xS4nuN?0L=eMdn1@$Lv4GU(8BW;Yz-%&T7puj_0d5x&dX! z^f2+ybwjG7KaYpi8%4V1Q|P>U`?qt~Rs2~-ezUB4=DR7#r5=g0nKUIgDpSqcV_nTt z)>dy{oF-X+Jr|(EV`x~sPBz}P;*^xIae0)L>%vE%*q$N*hG4xR5EP#b%x*ZiENhsmMhe-n(t33lLrnNYVLM^xP?X& zg+uk7UWttDv_msq)Utu<&vQP9kwkpH`}Mdf^W9dLejb&9)Y`|8}ys* zKdETVOg>WoF@+svO5ue54cR!GnRVx_dj{{$@DY<$(u@{n+v1J*@Ys!*tz;HWJmnYS zoGx|#_8?prU03n`9yCkO^E`~MzD5yTQOv{tZNz*TGgxo~xyq8eo#s}b+H!uLPiN-a zKPLPe(1;&AUgO9>=pY|@hp^g%Qa-|dNJajoH;EQL+8~dDtaDz`!6Zk&3^V@LjWc*) z-my6q^TNZM{mJh+R^uSbW-8=YLw&ZxSDcJwl|D4>9V|Yc0?8-RYr_UNbc-+EA{;nm?ylCL zVLV$#UYX|*WGowa-TqW5A2HQ{+aFVm5j;)g=bfEBxin8u-Nf_g9wkk5nEKE@yLS@T zjkaOZl1Y2Yv3{w=REkTR6xHE`i>+^AF8%7u%FPZ|?pj?}|Cd*KCWEmdZE|4r=j&vF z@{#VK)1xnME&VDK{9f|4X#TNVsilI!DvqO_dl3%Q=i{`O;Qbq48SvZXTT!%u_8TGjv^U|gomy>Z{ea7sCDb+%vloB1w z-|=PAG!(sDPOnw8SJzTx{ruo-cll~9uh9p?FfZ?JVw{4f)vOQJ-L0RFiMpSGm`5gy zr@x?JRa=7L&ll_GE$qqqzp>KMk-(z(dzJdPF0yD7rkcq~ef;rcDBb-oTEWV_{2qf6 z|DO{U|B1%&Ld>8i&;Z5_KzY$kXO9K-tzee}u|(T|gDV6#p7!=&TSHW6OE@Ahq(h^4 zQ$Fw>PKHow5GM;6g6+hGMHj=SO@6-WFZ@7kKJ=!;th zA>KDq2R>kU$R5KVi^=?D#tU&nz#fp9i{HsA<3SX_E-~frPAI}60;y4d{Y94%;Us4X z8Q4ckz0m68e)uw{euq*3$RWN#pb{_8-FB|d?%25(HlS(bLa76L>OAQ058<7By&s4{ zN79>8FDQfD2|IDG-8K3oNf5}X@(A!DH0?#kgY>ccLHT0ePQP?*kexyDFFhXUTsp{6 zIs?1uZ8ga`@_&N$iI({`LlBgX!A9|zuUSkp!8yr+Zkh(~vjO5aU(IZ;D z^_Pf&QH}YL(l%mYLS@kjkAx6G$!6A@S!*d^Yfmq$yUmpoR!Vi9yn zX!45PvwoQniaYL$?S|s-m7jJ{nIv?F74*>;J`Hj(*36nL79LMs-Ap$=gC-Llfsz;0 z&3Js-Zl0neySPR^o>-WRyJ^UMus9_iNNm|+2dCkr&-Q~{QeYY{=}RZo*Xwaz?R7JkzPXK&Cu3jBD#(p!muxrEtNC?5V9@f6 z!5@2@Bw;btRuW0^eUEBgefpetqIa`ThvzA#yRF&Mw8g)U1dOMIpV+@DG#b3OL>WOM zs`Nzc53p6l|`vXmni8Vwmpos9wOPV~+O| z(C(efRMeC;F#03S*mv;)OlwrTH1NXTW9GE+R}(&ZV=(S&`X_a0^jyw@<)V>hxG#1) zosoJrFjWeD6gV^pY;dpKRc&h_94%n^#VL@Maz*)PX0d8!l!p1p8*e4vUKo1wsDy+j z%XMb&jkw(6Ymnbxsm6IYTd((9vvKu*Pr-a6rDM#;NMTC}%hY)GzlmF6Cx z%P6*sUtZ>Rn$*c?Opnc3GCB7yV})dE170ny2Af0Ebnw% zzeS49F989!^m~%2S8oZSS;BO0tO^wQtQ#;?N1o{&;lpJNrtv&ur~px$sE}}zOfK_U z!e70~xdd&$_>#H9w~l>ZkkhfQ%XqgErK7uzzZx%J_ONjIlYNTc$Nmt%2hEG8E|FUh zn_UVs`m5JunX0fhBdxYbqg~*~`&`*ko}qN@{wgK)C*!|^b)C?vt}(`Q9)bbwyWY&wp4`fm(z=!j#iWX5^jQCNgW4s1eUu% zw`j8H$F%ydpuBoQg7CDy-NXZ0&jPhSeHReH(y164Vvb?UsG6Dagwu`YPYTo>nF4J` z*(J@<2?bO5w(q&`B?`R^Wthzzxb{g`5LmtlXvw+lOody*Qai0GkACNGu21C4f2y#g;tBh zSGQ`#l;8X#;B8d(MsYHUa()zv!+~RhXRHj$Z|rR^E^w4}lx3)nvffe6q?sg667aoM zwQ=gK=bRo3SP5Y|9&eMhtZCi zHqWeM1Vp83b8^Cu5%-EQXRTZ`3=l31E+Hh|AnE0vqVeoz8ZdlQ_8}PF)LPZyLY zB$`H-h6mj!q0)0%K=LI+mVj(vXGSr#;iEgdb9bcQ6_=(;wv>^|!@Kr(Ono+Ei~#-M zo%I-v)wo4+4|89o!5B> zn0^-hFcz=!s`b0%AtgG$XLvsA0D7ay(EzmQAJ z)7o=#Lv(4ck$H&9Z)hpRIaBqL|5sn<#gRMFGbNbT?N=j$iHAalD{V2J>sL-KI}AEX zyyWnWBH_}_vtrU*Zx85HWxD%gc5>9+^3=|5fitVPcoUrWkZ%$H_#hSjcH)Fvx3L37 zTNed2w}SlDH&to9x!xu3!G!rUQkrKizwOa+`M}+(Af0f||T{EUs&c|3JVK}40 zFawfgZ?Iat?K|I&O=GYGCMvQpM|wW0!as@er{3?m1oZe>(vqcL@&ZGgRrBaZgIPT1 zf=12$gtSXj$?=t>kAHOuUHi4n|MwK(O60>Q2FMNeyZn;P-+&vuRgu;@3F5o<#*bCG zl!}=udP15Wbc=|3S(9JXPT}_oOBgY_pwonmZ=mGTbLAdBUlXXmlGKOfrSyRynUGmY zBd=)`qoyE%C`-*^1i3Daz(xHA;~AL>{`P=J=gH!!sM^sxn~|o9(a}+vbQ8RU$;W942<7H{-VPlyzPZM9kV>nbd`fOq zUP{kl*1UpmL^!u4OXPSy-AkGS!_i#|6Ao znA7~K-d(mSM`dVqzmD*)fg{!fJx*?!#__nWr4y+$ZY`?Qb9D35Aa{x1M{gYk#GVo( zM`x`*^k>`N;Tj)O>u0XX!NGYx-7c9*qK^wLZ0+rP`0G$>7ayXZKR#DQD%z_{ClJ5R zp%G!*dyAjX(j?*e;tPJSi8fo+BoQIyT01PEAXP_84&f9CXF?g~$t<*)olLhq+C>D; z$23OWSn*vFlMz@gkZ<5B{gky*tP_Q2Fc3Dl{dIMz6&{Gw7Grq4)F5PbLiR9DKR%j8 z#CcfBDTVNa;r-N|$5DAePO~UCf~|fRdYzVN21oxS@5bbSjFEd)LMsn<&T{DsV}JVr zFjUhonLXI&7Ebu9#Kz-lS(Yp|7uZ9-1e6&8yy8uh4i` zpbb!G^qg(_ll5CM(W();Lb`SkHHvkYuP-L|dU@*n6L^vhX$Qd=tuO^Z%bg9<7=RJHG z6QuEXC49cuOUJ0Xaoyii{^~Vggf)tS;^mWE7X{8D8Gb6(5TTgW$a1lM<+R79^bp2 zNDQg*!ilF&JJ1#{-kP*0S#e_tOL(KXZo`*g;*EvTbS?3@E zjQ6`zJI5MjQN+CmQf!GBR6QE~5WvHZz-YSO>Y412^9yvA)2jK2&#rDL@z3E~rQ@Xq zdSIt2FDsFafM_yEFn4!%v->imi2u3TeSKxi$196S&DukNj$Q(UK3g*0j1nI?M@i;p z!L#$so+bcC1>I;cI<2xBCKV1FgR`{}41*U1e=v$uRFtl7r-F5?8&Qaciu>pq!On(= ztZh;@Z)_9)B<=pWo^-$#5u}(BSe;L8D2?HtX#(+m92CP7_~n0KN#B8Vb@Og=@{R-A zB#e%1Y3^#pb1(hWf$U?$gPUBcYb}{88(AzuU>9Q6JG=YmualmIP&x&bF{)mcjDig! zh&z;7t(^05JFX+cfUYj90XhtqLQROyv4P$a_+vzK71jOs{(Y|?9*d9=0nR>@g` zE(bWJrQl~kqyd`{*tCv&Qa%W~L*7I-(mXnP38_^7$J!UTE&uT`-sy0FUB~~YOq;h9 zkc~eg_75E^<;U+irLP>Q2O-25GshUjQ31h{od!`<1e6YTFNj&BeGcHKY&923z%L%W zJbr-a@{XI>12d4kvPAqV5g!Jo;K;&-Uq406#o*UarbpO~Re{M7uOz6Q5zHOD8Jhz}jA`TFAkakI7yEyW~f(^p9(}zHu(|pvw*oT3^M@rqM{@|VV zHSpRP2Ct0{iqc+KZ}HBeP^ZP9jszfb=q$$;dTODR1&%ADHxGmB(w>D_LxV(&1K`^Q4W>_Duye?$T5|Jlu*(r_ z%0LX2=dRlEmk2huZEMYaSt#t^W&mO7gz@7Ku5ZXjW+uy@x7M@&c?*^^S5V4949TE? z2QKViDX&+(q#00hcBQ3My(TL9g;7YG!c1qQg+H%p2Gq^Bzk&h#=;(Xiv*4kG$O!?2 z+6+K=Cec&VuEoO4-lQBglFN;Y^CbNrdJi}TgF=L*=q>|ty#|gzZLI4H@AdU1nIvR$Zq!6n1rJl&pX&Y5X}er!p1t^oZ(8+^Cw8Gl7bSa@M1Z&E z?W)(>p~k(Gu|b=75-nvMnbshE?`UWsczxyc}a;f`%HimXAG1r@ys!j2s{Jloto z+d7&m%c|D4G>0BOTHOE!F7amH&%OcEr)%&%Cdmil<_hKzaE5<_{D45dOpTIARi~aD zx=uY$aI-B|Lrvgx^O0EYO+tGP|I#QWR{CpE=_)fbJt(g8t3GAnY3PgE6m`KJCW#?h ztTl_VqbZ344&TkKDzS`dW}mUA**5y6y}Dmr&-1a14N=u`Y{1IdhUge2-|eJvOZ(_^ zs@4sbhkxABfF*eew^}A6p>jjdhe9g>M3%>o8gGhdJCe?MQ4FM|&Revy8+c_`VL|Ev z_H}wE=brSx`YK|@(ay9aG-KB?X%_OSfxGKC-{+pH6h`!Ff`EX9uP{T^3HiE1sB6%l z@s~;VO(lQx#A!2}RR}vBojR{MU6H}4b4%6aU{3yGYjw^FV{e&*{V+A#G`CmY?d)Tc z&j+S7GxDOWteBpf3(T&ru#NeXtUgfiakDWYD>!2uHoz?>>QyW>GkLo7;;cZIp6DKI zry5prgx;XhU$#&L4Y-c*&FRgVZ0UqFxF%-`<2GIXnR<@|wsfxSP@zuyfsuGk-&f&j z0xOi^tQ8Nmc|7yHJ;OJuxB8hU1m^pbzv+A|PU~tNCA+wgo+;reYWOXRsU~P)7%7Cq zm0SP_{dXMjf|3?Q4T?|mJ*Zm6-dScdtvJbhTJkEsvol&tyVoI=&)A z8(rFFsoo^9a$FlGeDx}vm7||>^&xsN?fm9wA<=k`yQS-ow6LoQZAMzMfr)+d#>wHo zu1*wVcI^DzC6^AO)H9{fP51W{4qH#NY7E)0^4)0lY^OOn)pFq(o#D`-e0{bS%+lUN8 z?NVAxzCQ}fNizPD7q{rW01mrj8I8X!508ZvY|KOgohgP({}qKmsr;dq$q%o$69PWb zP8-B(lPwa`w99s^5jOIaS!c40r$Qf?xF}evhx+uH2Fu}81B1){3Tj}k+1uKlxU=hJ_(aFZ z=&BmOmJj7nyd0VzePP*aL8|q7+vhzyFU1legQRTG^bX0{wY zIKVRC;A5Z0$aGZ>U1ke@G7JsY1#8U84cQd4B)x=->6~^PiUaKrW~PJh&V>Ic57wJ| zjk_lw@xnxWjBIab3R>7ZAAeKbAO3n`g#mJex}O&JoOOVFin!k$x!PNXE6S>+Rn)rE z94Unk)Ax-x)1ZLHZJ)D*>=S-om;f^2_n)U=;c6i7Z) z?|N~K!UaJY7J`zu_w!uYkkW7#$r8ucJdST>Zv_Q_Em+(&bK4!gHaHD<;Wc^9%*-Hd zriW1uW4+%2pRRO4LRb?q^@W&YY^O8X1M+xaUrksib0A)k42nS-YB$w)5iqk{}X-u2GY#X8!oy4&E zEu^v7TIBKC7g^ACi?SbZEGjOp>xhDnT?&M(E|-NVH~l|2Lr7r9tJ-8n?ZL=qb=2K>5)F10%3B8A&ITLlcR|kOm?+ zFak`B1~Jh!Md*=$F&1K5?+;ptW6C34 z*39f?y@=%TU*I7JGTm@w3?|W38+6!#Z;p_^wH^rHXh6Kln4DKOf;L94!+|Ntfl#Oi zoSO6q!Hz$DDcDA$<5z)ni0~u7A4T013*Kk&|G^y>s$-447wwlxa6zs1?f)GQ6`4J{%(-3nxpSAH#kOZ;N_dvklV&v~%W0>> zcgp2%S6H?zwA4CoPl5-^Yf^LHVfnz{wh!RKt4@TBuALgX6_v%HMwjtlTc?0UU>1K# zQIP=>55P0-fIlR>(BX!vk2+jc?7uKhkpUt)yt&^_W9Kdlq%*>b5fHy)&|zA=Rj?rT zSS9+y(+|*$V?Bs37ns@X4}xg#b_LOrOp682AntgPEumdJ0#)w|4J<|*Q_|W}PR}iP#WQQK~XtZ;6x%X`^wIJ!RddQ=-pZGPE4cJzzGKTl;dm=TZPd1@1GM`|X|w zUqe2I9~?XZptxgELcKcW)rODzrBbPk_mGNZqe11c$K12aKAR3o9QtfC=4?!D7al_Mf_UP zt>lf@Fw|oj)uK7TuLTu}fmsMi?3>Vmfz7_Mi;>J~j<`k&XAQzLi2KaItAwecAK2=BUdTwWauhRi z|4R2k;2qKNfh}pp6FF%C^zA}Z()?LGT!vKl2WQ;+NDqQliI8TN9k(=ki9g3Wgp0&# zn?bvFia}q7r*_2dkqqL+6NGp-?>!Oswlm+H+Ikn86R%Tl z85b}>8w&JsN16-Y?6t}FoB~~5jkn3yrhK$DizOCVSh-Jh;=`8o`QV`kj#|CAq-c#y z=gG)%$)%e@v#Oi}?w=OQDN=M(`naoJ^YoZ87fRTJ#v&N-x^olpj;}E4a~Pko1A*t z;5%*f7mLuO(=UnRN-yuuwAA(9GPXr*2IW(~wD?3o`4CEhznvY=@$F$P5Qm#rrp`u> zQXg*UpV*Sb_4vTR+I#apjxkOQiS<}0{ch#xK)ay&9(D~? z0)kZw|ElCR--w)|Y}-` z-;Q}l=HeDMeqEHsbJyw210`cGJKLoAe!Wp%CU*YH=#W7s8o#W1{hO$<$lAhGi0Ad% z)awkYy(PZ}dR24GjVsK(-+v1pGbfE2SshIofwD*Mv_lu@nxLi+!0UYtY170)E9^1b zJJ}W|x~M|M0uX9mb2A1pT?RM8V}6&RX1Zm(Eo(6ScDX_zMZ~`rY8#+P1?U^|-%GG` z1nFfCX|RYl@j1tF)?D0ii7!Wt$ZWLc>zsVP6b-708nPdQ*#TT1u=Uf3wXI@VZ%tH& zIQb?1vIMy6EG!CVEPy?z_F(htj#VKdO(nor0HsoZg%TgxPaD;DrSb zT+KO&GYj#l+4U(rsNDj^5iOUU~20^^b2d55*ny!?1Fcdd8gtP+oX4e>z+8c-h zZ;F~GJIuQ__TS*1$ASb=DO9Y#^YSnBbIkRvWjhyYKA;^29U(Dl2BtBB1dtO0JCe3G zS#y3k&uKW%Q@G=h;Nax8Nib?{1fp4k8g5ZO8I!2I<5Ku(6nLYS5lCd@yaPs2-(rD} zIMnpjNChp|zU~eGr}-9q<#>>4A`XK8`M3YwF}M>gkH~0ny+d$m<`pOxZOGl9LfQ!$ z(re&>0KS%Yvy{Ig_8k22W@zfG*^49b@$m>Jm;QhY$bG`WvIq$7YCSn*IN(T!2pjE~ zatHx_YZhio7?YaJ)(YaQop=z%3qbK7;{iLqLIpK-kf9=tR73@is?DU4LL%vcHwP06 zfl9l?(lXrzG9PGm@A!!$+HbAIT(aBKL_~6Rrbki00y~I$4cc01MFe1UObd80A6EP> z`&LuS^rs6u`anB|e#cPPp~MPb4=utz1~0#&^^ki)Wm`QNhy^HU1HoCKd^%G^K&!mz z#T7G zip7V#->cWIP7>XTOx{axYYqr(lutuz<8f%{xfpv+9GtEE4s z*t8n1DTr65 zXY5Z|8_p!1^$}X{xYIm3l-nBk=?rS|!hnUN;(IIo^Z5=2?l+keS*3B(m9G{Ac-W+i zrwCIS&9eJ=>-!ZR*PZgO;*Iz7`3?z|J-$MS!iRt=g*TsWS9QJVAKtSSgYfh&8ut00 z&I zxN!q5YTKW8q;WmwS$$taD}jB5Ue5Wid*f=@$iua_$1QL|%gx0Je>p%3IKl1FEv4E> z`U=Oi2(}W_AEH_!2j`BP?wC~wPx+J;SN6P79RcKTU-5F#o`o>qI>I z5_ZfLxGqI}H7#bScmHmepYb8JY^hv9vGZWPQdz_;3)iXzgIYs}9M45dW_@qne6{H6 ztxM!3`dpPoZ_we?1-01wo}`U>KHU{MRHUWpnRx+62sB<%PoN<)Qwh8JwtR18Y<^QU z!pOGmP0QW7QpKC49_Gc-YE^10a81%kR3pJaI9LtGB+_>H80q7&qMvR2?MCJV{mVC~ zzlCNCiVW-Anfp*G{$ooqjpve~%4crOAURDDbxtR|aEdW!8*sH6-Ic&R;9~LH)#E9B z9M7J2((hFHvyzK z5M0ELkwxMqem*s%A-R8qiGe}Nb?cEGA-x?hy+yAw*{xg48s>EeZqh8*F6ODzT4d#-nG+1HQkwY+Nig%o$T98X=em^F3e>5jo|mX@ACy|T&_S! z8E1uT6cTku$VLH6XODDS-vx{pKV6WF!gZ8=yyR~O&ml!ElsucP<<&@W^xO%U?bz?g zgj`qv^~6agP~{^Mw4VY=ytpV=+EY=sb5${FYMJkeY-Fy2P8nDaD?h$XEfh$K5=OKs zGm_E)#-ID~ql{>MPR~G!6J|jk=g@Nh`Mow0%a2X>QDS!>sr)M&RPdNu&myXKM^NXGXbVPo2T>>8;UC~#2j>vk)v-gNUO+N~ z_~xNdU-p#m{^y=PVcTE*u@4k^;(*?`D zm$zfekOZ?Bc`+ybp;sqHz55P#{SzklUbkb&PWt6bVg3`>tA*rj$HcFLc=X;$&BnFU zF*iO1e906LhzC+Yja&7%*@>oKnr&T*J36%sQtDC9fM@voQuNYj_e?x$S26nG3 zVlcN-RpbMg-)Kw3jTfP>mMJP+ks(hhOq8ivJ_D4um8ZHZV5j)|-X6O!-Sz)=H9xYV zD002`MKZGtG7x(cEe2z80ZL2emp(&9)dH!_!%P!q^6ohXwrvrMs2rXv0;;TsJ-$NS zu97;eD2au2)Qlk-1b-#<;@GSj@mM-D$$LIvI8}tRbMAbkwr15YnqYa_StLF`OIV_+ z%iUOE2e+iyd+ir<;+5-V&#{slpz-*7C`c606(9Z>NFwFV)9Mjt=*YsO=xUOxq=B{GwZ> zz-a6uq@pr$I%1bw!IC=xAKdPh-pip&v8?54(Gg1GHyCt+eIuDmV5vyeP)-Kdrv~*7 z0cH%t(e#`r+q1Er(ZK|@QN+1-J1?HyKCdAkc>12FqJ1W&RcNTT=;oAbnPwlAg!|Ok zqh1WjI6ja&A6Qq*i@7f;P|WECw}Oqv?lhRxMcai6ZKzjJR>g;TdTVa6^+$E0Me#2^ zqDsB|`Aq7Ix|4aBTZH3|Ez4<&y;PT0deR+qWniqnn4B)1r(3;U17hTRGcWL~wD^uoB&RV~Io0I5wHUhmXWiZwXqWA!5{q+v{Aby&ym&lwVT|Jc4 z``Og-G_~Mao@mLO*@C6>`78$Bxah3lld?yrd1G&st2Sa{?I0}L@duX@*<{+Q@6 zwe!E1W4q&tv+lHgwp5UIz`e?Qk@(YIz2R3aZ(aRX2WBleqdCo+MA!F=HG}5R2Fvd^ z?C#wRZEe}j0a{I;x8+BhKF8#)A7&aTOwHNYK4XH9E?@oO#I=4a0~=LUz|+b<<%W-| zoYyJm=XwuBO9$)JnbeE&D~^JXCijO&Ca{6o+dKuEXPY0Z-}tn^>Z1Gld18U$bV&== z1!D(=7!#HD?k(J_oEM%s9>XCWXf%a2FPRiF8(NR@tLlg!BiA3eHhv=2V{ulq1PGBdop0Ok zJth6H@@vaXBK%6Y4hCaY;Y^N+w2v*-h_Uv(>#-_cK`1-zV{JSu5E|h0&zJwNtJ1FP z%TAE`?_L1^xKs;t4HzX;{-&ZkxV^{#mh6 zE~>DL`%moq_v8)G_yBPQmaA7~!LTSN=P?cHCgo0;0xSF0M`=<~g52{rcHd2M{98Pf zANUBMZoUPi5~!_&JX&DkmXFR7xnQWJEy`p->nZf8bay#Rxrv4|*bnc6jY05Wd zR9J+F$4MFrd%v{U73$qBZMjr{t-ukuea><+Lr-%GO=B|85G^YZF6jb3$n zka%}@@3S^4$ZEjY42%cWcFAfJh1B+_B(5)geIF;e!C52Os)+|#{9bI{zMV1VytQ0E zu%*CB1)^!gvq8X7VppTWRiVg(R)%TjOx9LUK`) zn?DpG8zMWRx0lr|T{Dsmq%&8IXRBz0U?QL?>*hJywB_AAO5+Q(39n!it*Hd8}LfKm^>Gy!ql+DlglieeO!BJ>O{2PfHnB>Y}}o+MFmdBNvG6 zX>P3=kDu_-TfEZb0w{QRt=qVnz8T-M)*5)fgjiW^Tq_7MX@;>2xxbEpiR<3ewo_MbBhG~EgDeYkdnf#EsilW1kHsR_p7gQ72E6J$|MqA1Kq!75gEQeTw~_@TL0y3yZEtS zY+R3pnh}>rLrUaPcFp*fUQYI0EgAi`alKcjVN@-vQXz6Ofs9PYLZ#8Dzd#zDy#uUC zBt#FKyT;`GRXG;p$4hp^$v{yKe$qgF>K@R;E5)^EY8i% zn#`zu54j0~bjAlfCjI;_?7V`45~W*yN08frgHf4cu&h0U6yN*7&fOlnnU%zdIt*Db zBlqqtqbh;O4x@AAUFYt7qfUi;AH1n9bIL_?_h}DG8UFwIBrtdk3=AFV9U1Kzo`DQ^ z?%eq%g!=j%83S@RwPQ3I4VHdG(?5N*Z;4k-drXN^Xea1%tM6-?ov`yn8li z^w)@;w-{Kdqi36tW!))W6l@W~IhhmXZI(~c?G>2s%GKU3U0X{<=2o{mCBCswG28#W z;>U(YH~;hdE3ufsbNd(ce_SOKxE3FIcaBymFDX^N-HLL4M8ldWrPh@6QAR6Y$E%s+ z>mTnL#dEytqMhssBG&4T?k!wN-TE0>(Gg|IeOaQB<;t9e-1i41?Hu`me_V#cK(s3< zmz)t)yFTyC}#-)4I1aT|HiZhXIDvw38jpX`;&1ir%M*u^Og0ZR<~T7YH%)7_61ZmJW%zw^j!#+P+!QM}<{ zRY9EDa)H}#z9so?H=JahZuPaG@@m2TEU!M!B9E3J+Z)eI(6O1PbztW5Vb;@0V@$F; zY3Uv%&6rj}7GH9Wx23ssIyoS*hklA$fe9;gSCkhV4%rjnOMELKx;|XCjm6S#^Ut*o zthaQj$w`~%FX*7j9^3dYS9Q1(+TPa2Uh(lZOa6Ux#vzUD1j&p;1g_bPi~p=Z+Mxvi zz*r4k(y4emeEh!kdQ+M#`V#PX%y+-%4|SW&cg-fX)X9Pr8ygQ)Yq@V@B?qoea1*jnT=Vj zRn|()s1k0ys3*^aK~3%JMdVEkCu64P=1f!zHtXW&9G5p4XazR>#2OaY3Ove|7t5TJ ztS0hI`tr@kBo+kRBOplrbzg$1CQT_%Kf^HH7`p4(w0G+diY`RYr8`fU8O3I8NG!Oy z^Y0u;!&I|@+v>kP<5t}$5D~WGbvUpw)k%F>UN?OpKiDCS4mfqFg8{ap>lu-G9o&tM zvkbKNAFSOHuCs10U8Bt?b1*aWcPOL7+d0fg)OK!bi=Zt#NjyrdX&u`rxY11|ACPf< z*aca|*;5%IEU_A=IqEDQN;(rIHg1a@6za7x;9JLtwC|ijRL)x70 zjpnfM^0fWj9D|zm*FfYXAArx|I8|lcQ5G21=5^|ln$3zxxI9bIWjB7PfBkj;5?Q?E zvG`o#PZw1o4y?`sbs{cgKzGnrKshNc_+HkBg~2@d4*XdKv|)#F?pml!;DkiXPW!|F>0WAw&1JRXDeW??8~<9kf@E6 z*89e0RdsT)A&Pm7sTr+9_gqiN`xk86S^ShTzzo#%Ygmq3ls%kMePp?si5^I&H#n2Z zSpO!C%`qIEl+)33x3MSS%2ks)bKa_b2BkNQM7>Pv#N-3TQ|=LU_DoQnETN2!)_eSw znl(p%Dqe<-s&|yl!?BL;fofzXfw=qGM7hDmd#*h379rNTX|~6$Z}9PLp3mCgk0Q-R z7uig;rw#WIDIo8zZV<}BL6a0wTT=RzJiHflQX)fEto$iY*1w7^aJp)D&p_P5^$t6$ zWaCp9$um61n|CUboa4P&c@B6fAZyh*?d@@GYx zB{zFPT6{rOlzfkg33d8-+xScppQ=tWqpOGGCS9Zs#f>w{6Zs0FUM>*@x({v z7ZNk5`de_nUwwPrSfg0G(7TzE_i1OWn-Z?8n!X#CGH!3J1?S5dq+9a8 zoe@x?=KbuGUHVa3NlyjSQqY~iXV!d}Q$f#xr}l^Am2ZJO1&0&EpIl9QKs~=MvT`w< zF*3zVk=CBaajdSQO|;zK{7AiTvW$DNBq7CbQ%hvR2V)oyo#9ZTW}`K# z|9fachpF$)p%D3ae}{#;>>&>#kLxv>dL-l|T^OB$yD7OSl3o^8T-ac5Z#*~KPbg%j z+oDT9n}T^I6xT8<>`#Z69A0XEF3E_d)F_GFD!SUd+lF&zZ>9dcn>pM!+WtD1Pk01d zb{p~Hcbj894)?4jLTPw0!WPZcw2j5m6h|J|Z6qELS$X_aC;I+7d%N!yZOaT;uIwk8 z)Mbx{dnla9A7fQc^GgX#bTuqpR4UIi8dnIErft+SH(mTvAI=kCBBTv4AQyZj@?;3$ zo**+(ODCnJF$nMW`-I%2rPq=Y21|}VUgY^wUei`{k96?t=;SaQoIFa};k$PALO%^{ zV$_HT(ejTk&s@*wZr*OlB@oGr3vc-Q<+j#BZv5(!pzl~71)J-)61(1Ln*9aPRNjv-iH|-u*lKch23)loR^TsIVRbJuz_7km7vI^G|Mn9zpu8e6g9S0ikPyK`;<2D=1(-&Vd{wX4B9F>YTQBkmDj z6>1|P+Eyf^l5O>ApJ3yW+Dp&eKc@NjCKX=M;Zs)_{YHK(e<+JtsxS1(3=uO-S}*IW z4oz!&Ni=IyJa`NI&Q_cs0Q0Qd=Cl>|AV5@ZPkw(DqH%SLeU6mBK%OoLU`Dl2YFk$$ zMnobhj?P^ASmUc`Id_hN#mwxgKQnHgJ6XvQm(O$|cJ~{`$+6gQJIxJd!2b92l8JMQ z#MB)D^@5q#TUDc&Wgf1kudn$96Y}5;pJG4PUsS-x014NtY-_<?AqMju%n)5Zw9t1aU>m_82v?FIEW2VSz5LuJmY1xl0Ou_pmpo^@G6G7XSH^W|_zJ z-Tab+_0cB*ZRyD|yEUZrFbog2=S04*$&RnyfB^S)PH9wc2h2kU7K%BfVhkVKQ_ws? z^w{L2v(Dcu61aK_2e=8ZUZ;4`vV_I@J`3=nCx9wck+^DzeUOE4;E7rcUb`DuGJjv# zduOdo%S3CvK9RlMrxT+X!}9C^j5fWE>VnOyxUFl6*RKwUY_shkbpegtx2`S?8Xa!1 zrlux?!O&T$Br1uOkE2?jd~SZ$7st=#aqF(x^t(Gye6=^KYipI2D=tFHOf^mJ#AI1F z$JnaO|F|FlY4So3fpGIB@X0hLXyqm}uu2GI%w|6zjZ$}E6YN2?(!yn~>PZI3de7y|zG$LqadNrid zUI+Wdp*q{_%`W1}wb2v3f@6w`QGCX;`LjF3l6Ob$6+LuAb`-clf}eE=qRh z2|@ebyW%n;iaFoG@7a@9Ji6-E!1_*l5@3apZMZ#`c_S?U!nV8R6v0xW6$7X>HgVnf z@`mlAFzXnNqoQIk<3OW#S=&BEfwEccIDXbj-Y&ZR%>dj%d`9S={u;^tPz?g)hJq7H z`k(vC?sRmckP2jAYPdNm%>HJGN5qfe-u9MY96yb4H6|a?jT%vk=z|-}!t?zyKlO7X zEiT*X71qWr&zd(*(jpm;`8gG8m5x)c()DWB zM8EMV=vq^=MLyS{nC*6R*0yR|{DkJ!SNGrzgL$c#v3I5CryjI9_?ug}ieEEdA%m^h z&&PiKFmXxRt<0fOX0N2y_))m z*6vMg_Dg6inRW(cy+KB Date: Mon, 13 May 2019 12:07:31 -0700 Subject: [PATCH 517/724] Update configuration-service-provider-reference.md --- .../mdm/configuration-service-provider-reference.md | 2 ++ 1 file changed, 2 insertions(+) diff --git a/windows/client-management/mdm/configuration-service-provider-reference.md b/windows/client-management/mdm/configuration-service-provider-reference.md index 640eec77bc..e90f12b931 100644 --- a/windows/client-management/mdm/configuration-service-provider-reference.md +++ b/windows/client-management/mdm/configuration-service-provider-reference.md @@ -12,6 +12,8 @@ ms.date: 05/13/2019 # Configuration service provider reference +> [!WARNING] +> Some information relates to prereleased products, which may be substantially modified before it's commercially released. Microsoft makes no warranties, expressed or implied, concerning the information provided here. A configuration service provider (CSP) is an interface to read, set, modify, or delete configuration settings on the device. These settings map to registry keys or files. Some configuration service providers support the WAP format, some support SyncML, and some support both. SyncML is only used over–the–air for Open Mobile Alliance Device Management (OMA DM), whereas WAP can be used over–the–air for OMA Client Provisioning, or it can be included in the phone image as a .provxml file that is installed during boot. From 56a87a2622afb53586e1b69269a579bd504ef7fa Mon Sep 17 00:00:00 2001 From: Greg Lindsay Date: Mon, 13 May 2019 12:55:37 -0700 Subject: [PATCH 518/724] draft2 --- windows/deployment/windows-autopilot/TOC.md | 2 +- .../windows-autopilot/images/wg01.png | Bin 0 -> 2436 bytes .../windows-autopilot/images/wg02.png | Bin 0 -> 4129 bytes .../windows-autopilot/images/wg03.png | Bin 0 -> 89020 bytes .../windows-autopilot/images/wg04.png | Bin 0 -> 158281 bytes .../windows-autopilot/images/wg05.png | Bin 0 -> 264215 bytes .../windows-autopilot/images/wg06.png | Bin 0 -> 124860 bytes .../windows-autopilot/images/wg07.png | Bin 0 -> 193713 bytes .../windows-autopilot/pre-provisioning.md | 22 --- .../windows-autopilot/white-glove.md | 146 ++++++++++++++++++ 10 files changed, 147 insertions(+), 23 deletions(-) create mode 100644 windows/deployment/windows-autopilot/images/wg01.png create mode 100644 windows/deployment/windows-autopilot/images/wg02.png create mode 100644 windows/deployment/windows-autopilot/images/wg03.png create mode 100644 windows/deployment/windows-autopilot/images/wg04.png create mode 100644 windows/deployment/windows-autopilot/images/wg05.png create mode 100644 windows/deployment/windows-autopilot/images/wg06.png create mode 100644 windows/deployment/windows-autopilot/images/wg07.png delete mode 100644 windows/deployment/windows-autopilot/pre-provisioning.md create mode 100644 windows/deployment/windows-autopilot/white-glove.md diff --git a/windows/deployment/windows-autopilot/TOC.md b/windows/deployment/windows-autopilot/TOC.md index 3b57a30541..e497301f56 100644 --- a/windows/deployment/windows-autopilot/TOC.md +++ b/windows/deployment/windows-autopilot/TOC.md @@ -5,7 +5,7 @@ ### [Network requirements](windows-autopilot-requirements-network.md) ### [Licensing requirements](windows-autopilot-requirements-licensing.md) ## [Scenarios and Capabilities](windows-autopilot-scenarios.md) -### [Pre-provisioning](pre-provisioning.md) +### [White glove](white-glove.md) ### [Support for existing devices](existing-devices.md) ### [User-driven mode](user-driven.md) #### [Azure Active Directory joined](user-driven-aad.md) diff --git a/windows/deployment/windows-autopilot/images/wg01.png b/windows/deployment/windows-autopilot/images/wg01.png new file mode 100644 index 0000000000000000000000000000000000000000..fa08be3f484d7234479a4143c0290f21f4de0835 GIT binary patch literal 2436 zcmcJR`9Bog9>>R)Z7`vXrRfDHs()j%t#Ni^Gi%-xKWVqD89#?BomqFR3|Yseq&{p~4R+J2 zWloPuL{wJIG;Oc7ndm#I=AN5ArqoAi=jL1-`kldW76A6dAoiDcobi#kZwtdw3T^YV z7EcUsvwXKLP91$+vDc!s%|3tv{rLa4ITp9|O`lQi*SO``?%Dlr#;w89rTS!C8ax8| zj5iq!$AG3fzn4-O3OH6>ZmuLEO#IKxqy4?6=%uKbAC2f;S3Q>0T}E0!&wV@N3X1mm zzE`&?wAF(5Yqh=i3tD?6);W0*AKN0=zWHP?MQ&EVww*W+S^$=+^B z-&_8f0k-gDpyM{M2&0u|n_k5I;A&yxK63!Qs9(`ovYfMTc?e98pxnZqk@PP+AWp>8 zDZN#gYK$CZy0oO(S>{70F)Y)gw-K`51s82YD5tKMHa?sp1g-5aX~p**?)D7FKr3kV zP@CN*@8PJSXU?xjpdr#aT-A0IP#}+iEWeN7J5T=#ezk4!C;cH>3?Ra(BXaGmq*48i zWdps4-FcFyA79HJd~VhkS$y}1rEvX`!6qpxq0h zVqzlmBGe-~dd3CP?WvoOdrB@eh+fXV8o)+9c76{#W$w`{%-x~*-g;BIeU`*PbdV70(@1C z#}Qe*nYL(7gdV%SlXv&Pz(9p_ot-Q{a1(&w^v#44h1uJwJO3lp=; z2>lJ8$c!kzAI~3yNApeLOuDPYnKI8R;lcEpEvnfqo0u)1Bx$3m*RNmGqeEpNkS877 zESRDniY!sm+U@@CL*Jr3)ju;)46U)WNt_KlK$5Ccqo?GQG~%CY`IwdGW?(dH^o^@E zGc`LsrPan-h&7APJBL`=j(x&}tqE6Q2KNn&MkR(guHfr4#JiR&>l1u`4eoZh7*Z7F zI0;$~6kdK74`Ts)xSgXUVy!4TF&0E0uw61&4@2G!;rHji;Bq0>%HWf zW}tP6$#A-U%;Xk{&ZZUq!yIopmkp= zC#4rWvg5-i2183CsNj!zC9QOXwp;P(F&+8`p}kf2Nj@E$)dyagUZjC}H_~Yypyk!Z zd|Iyu7b}le|I+kTeP^m|7x6{@zlFrAlI6^9T8#uS5*5pA3SYEk$aj@83n0eUA3Kc~ z2MOIET0Kk-m>##eKAX++U@XeW}EzTBW!87XBTzYVjT(YvOWiXLy$Kpvco` zDb*5c1o%~$$Rp=FOkioYvXqfhrk4igg(Cajr%I{im_hWyHg;C*@p`;JAIcI9YP$0q zHh~u`YPbkgr15ef^wfj95C7EpVf|)z_%cFZ8D7%{8i)wq&7BmztX{$-bf?XcK|yLI zq3XBzIuONoW6DloRwtV|0_ll1->P+}sN=VZQnn9P2W^6#?1B6var8-0)|GU*EX@_3 z#VKz$%_qI@Au5P$0qdDG=w~XUy(v|r3!QtYd|ZIcx$wh&2frhu>yDyBkmo1~k>ynL zM(YmN1lXfo>A=D7@j&?H(vVJ2gF{461M1p!hMhzKp_>~6J}r$8KzG!L#sd8oUe1^< z!QZ>1F3v2AM7VGU>7YrvOyo3VXrdCj(+~Ebxnq)n!*a)?^b+$6T!B61&Z;$61f_5U z0#d*H!d|pR=4c#!6qJEZw{TuqKPdMdTdht}g6$J5*;^C=A zlKszfVuO#(#XwExObGWc>OF*(^ZX2KPUB-I{jG|YRLkuj$kV}dDScX>9m&PR30z~v(W76sL;jV0=6HQ$cjL>b0zUjV5i;)f(??LiJ>zB& e;4B{Z&ERS4cc(6^1|#;*34k^>M^+kPWB&tJjbJ_i literal 0 HcmV?d00001 diff --git a/windows/deployment/windows-autopilot/images/wg02.png b/windows/deployment/windows-autopilot/images/wg02.png new file mode 100644 index 0000000000000000000000000000000000000000..5de01d68032b1fd57b1613fdde47453ed4a30a26 GIT binary patch literal 4129 zcmd5<`9G9z_n!|EvMUUOKE_g!hOuOcgfT)PWC>*$GPVf`!yqLegHX*3jbiL;GWNA- zhRj$)ktNGmqC)niXL|Mh{_;G}AMpHe-}gD^b*}3==XGD_ecmU*>WV2Jj|2|@0N^u& z8`}T?e^s&MATBo6nP~HPtWGNh8hL(l^KxN9Y{aZ&^I(H!4F$e(Q zZ~y)LMGGkO000DP%#00f@42p!dK0DWL}?Kv=8{?sl2(D~CViHgLi97nK$oJI9UKy) z25lcDpAz3ZNX!j2j73AIV6T1MPjaasg$Nu+AD-llhAJ4afF@xu$ z0lhzC|+u`XWd?lSD;A_6w*(z5j) zcxGKQJv6lmRBgqvrc{mDO2IB^rq|@O?r$dE6)Nt|oQ&!^+Yn!Ec+(CdMi8QqrJppQ z<-d>0ZWJ=TQC&;ftBs8>er;iYu{ONpNO`{bTFK6+POV|F*4V$Vs*0Beyjt8#cdvte%>DQ6*PY>aj# z3sZR;7RxAUjY*&vvJ>iKIZHaS@}E0a0~hOXyN^Jf&x&$67R*pRJx7qf+4U&#eIf0~ zXYc7nw0ko?)wki!_8B@(#@*N~hSA2-)S8wWcE5>WuFu z7i3b|0i_RD>76dNbBfMIzF-K#{3c&(Out(}A8PO*uohTE4+U;7ux@QB=@6NFhgNX= zFk%NOW_Y&rm}JbSQ&3@FqX}UVAG2rql+7sP9tH=X^ggnuM-80a8ng5DsS>vFmCRyF zqyFcynbV{0FFp>!WSvmF_I@xx!@hn8EKcgg zDeJSGS+xc88ZNj^5b|K%0@hZ1ypzsxK*OH@EWiI+lmEr&Y-(yMrgCE&N?>e!9hvj? z6Kwr;xYzi-MX5rNg8p?FsqK)-mKLc}8!*X4RGR?T_Sbu{0?5F{0eKx)%qz`=Os#+{ z{YWQQIq$&DO&>%ADIm)uenmKrnlLG!t65}4h^0?FGj zxrn2|)LYb+Hk>CLRFsQO0MH#2Ac&YY9QXg0>7qVTPe*5WsiY$JwYm{u^`=+JbjM-u zz(;Pzg7%$p4|nQO0qM_mXrnXc_dULIA}vnJKnIB7tSk+77r;g5Xb_|=!_qYDLRSYa zI3p{3sVMtU#t**ff0N4bS`ADpD!E?4FH4JIY|qXgh}dRVR9nh%2hF!_1tsjdT=3P5 z4A3*@B4etYzr^v*=J`IQqQo8VoL*A}lk(T+dj(`o1@h-2ckDGlA4+PlT&yEcaHfLOnk5OUF}w`8@;RF7CQc4ELD9}l zeCoiR23rAbpDRzvF1GmF$DiyNOQ^_TzFiq9Y3UU4{qdlSf$LbiWBfXl9jfrS0GJ>@ zcm5Ty%gok)Y+c)L(KT&Fln*s|np4E)4d3GcJ0nD|gDUujEHES0!6uoNGm~IF8B<@1 zCpOxIGAF!itHj=_)JyxE``Z~R+}(*5hwk!`jIID(zypH(*{G79!p4V%F7fDyG3B@F zjcD5;$wYPKVyYp&nSWg!T!{lk5c{PZv|X${jqRUo1eO027D0uKyY1S13&TBYmW96D z6uzSgu6zZGhs^k7AM0~&%?otl-HrRRHbI+HG#a9x@kDqPzp zX7VNX$favfsEcF&wqT23B~7rXx3mpOzwnf5$6ldig1t3@+M2kQv+ShshUK6Z-~n0@8Z-))`uhJir9JTU1zR z=yg%3vI6ZLqp)i_x!&I5?dl<^7w-3}Y;c=BJtQ^`#}xkHUP5sIeS#`hpukH|1T!O5 zwq9eqAg@q`;3rFIJNR0$T1+d7r471mrM*{i{XzJ@s7;@F6LCPvInHp!Km9{HA9En+7fQD?H#rtP%shqOi{BM1hv$>V$7x=j(1vYXP|E{xnbj zH9gV2(-XE5Uq)>5a~B#D6;fX(@_^3I+I21fRN|pA;Gtq0kG+*sgq{O5QNqN zqmJ56I755DfO}`v%wC7fzflN5G%@jJ>Pdo^c5DdBWtw-6)N0?@J{9}RzWHR8yW~1! z0kL%MxS56RrclU`_s%PKJD#O<84L0U_hYw$$AmSYOSFh&N!V!x!aL5p>~AgHd|Ehq zZRv2iE+OPHQWzC$<@7PI*U z=eQ3`1`x229wT9(TYhC2KSg*9OgOv~2W%w%^IKSsNNBJ*`E&;6;S1S;{Q_Zf)JE#Wkzm|;1Q*d*pk=+{-}`d6Xy~w88+7TW)r7=c!$!?kD$}2TWA;;`t@n zy6XdPESOUggC{O+)@7(aJdNfhswoaCc>P|Px;)MTZHo`Mjy!XG%l7oKBK3vz0lD<4 zlpk+k=6(?{(e#Cc$0~ez2T;cG-C`SuQ89tyDNy%MooU$Vkg|`|;|%z7?I0#i2K(eP z`yVtD(U>9WhPq-8Hrm^binJDp15Gjr{Eigf6f{V~*`222`IA5*%*!_hr<|7uxeuiy z&%%cmM%Fk?8=U-p_~v_4>t&8V{u5X~E~pxwn@gFzYvK%z=dnKabR@Ps_qc=)g(Ji$ zuky?T>lS&xUUAhbu=^e4a!?SkYl1P#@D@(Uei$|Kb&2>KxaXbvJ0oE0;&eJ$V?5N% zyn9A$-;TPS#*4O6FWc$d_!_hOQy;JT( z?AOPEGb+}M!N6h-my)=-Ys!i`H-O~|Nw+S8?t^jd8FcX)PS@z4HX5e0f$$WJ0M>B9 zD`WNU(nr?f{jg$IY!>>Q$Zk10VK<^<)JbGt5#!eiNaU98_h$4wV&Mj@YM{05=F zspdV-*GTq>W70R&M^$0W+6(b%-m(`RB#57a4k!j>n!v)SbiJUV@74Kxy^cZzGQEo!z@5alLb43$| z2xvEdWiunYP5A=tmBiE@2o*2!OL3@2+&ncKXt1|jz0$)UYt2d;;ah|Yw<<`0Nt0xzXid=7u z+O7O8iKG~PKCXCiJ+Y_IM@-TI2PCc%y|RGDi5!231cnax@(BnC5IiePCZermBVa?S zEWY#e?!CG9CyJE${@?4oG7IpD1hm7S+Wg;QdjHNq;l9+B6~6}li%MR-S>v`)X@jU6 zES~#=MFstHfvL+j7paSB%Rq-HiPgaVNL7 literal 0 HcmV?d00001 diff --git a/windows/deployment/windows-autopilot/images/wg03.png b/windows/deployment/windows-autopilot/images/wg03.png new file mode 100644 index 0000000000000000000000000000000000000000..f312437f55f7b4b49ede100cd069623b8585c816 GIT binary patch literal 89020 zcmeFZXH=8zwl$nUXcC%$L=Y*`6eWZbrGs?of}+v_C_RAEdsBMnL3-~hO?n3@qI8H5 zKzc8s_maHf+0WkR?DL*|zVn^&zCXS(z8`@R#<+8>`@XKMHRoJ&5u&NCNO6tv8UO&G zP*#$A3IGs&1^@^=NeS?O@o}^IivI<4c&hjqP||;E4gUsYE~6#`0F+0OUl!Z zy>tKoZjN5PfRLe|7ytm5rz|I<<7&8hNscPfeK|wka!__`du+>ewDqugsC;sW_;VHd z6AyES1!l|Ek^j^42U;SicVNGG(7RV6(%qIzpxgYxq_5ampMwGjLOFah-^bq}<6r}F zC_N(LVB?_UsVeqvImb>7`1Bn&XRNqISr;E0Y@9`in3bHil(_Y|4Xk)ipC<_poR`GM zJ4ii!vl8Dx^@jtGOW)5R-TwUFb?-(oydF}O@6I0Z78tg?+hg&{;|Vo^Wn6BW4@luI z!uaY}hgG0Wn_qiMYUe`}8W%aC-n(Hw%jVw8E8bfxg_b6oxXl6Vec@2_`wZM^MnMw9 zg7C|;;E-U7;9Yiq_#+awF0EGnIDj$Aj5q-H)Ee>;%$S+51+w_e&4%s;rB)jZg96kZ z^9!>FUaK-j&|0mzyNSaLerO;Ar^np{Z#liQa-k7qpbnwHfG2zJ!G9H16`4}Er;g~v zfHX~cP2#TESedtJg{xK^yR>Piy|Nz?Vl^IeDykG5%FBM>P8*Vic3)wPy?_CxlE+k- z+TSV~3$-OwrRgytisujL%7HLLxk2J>J~pnJ3}Y_8##?ZTE~R4Q7XlW(hV`_W#p&-6 zg0%J%&dRi4IN9nGZ!5ur{{ED?!Z_`Qu*5oFB^wKKwAu6WBK2Z5<^afYYCe9K81-mU zbP(EN4#7ld+J0qKy z20JVfPL8jy*B@NbaIEA^|p_v>(Upo`h_S#J3SFhe!TW{ z&E9VpiiXr|o=~^n9@|YT89vw#42HFKGtIpCBemB9U1@6-WYwUtX*+5gk%9(tJBGm! zzJcrtOr;OU-H{eg3+$jSft7p#`<{8@k?O@;RTkPC^zx!l>ZKF%GRSz=g;i7PDTtA# z3Varai)36NLLq@C|M6OvQJ!F(|h!+G{8VUT=i8L0SRO=Mu(ED*&Djz0c9l<)OlABvtuj%7ujq zGaz8Yw^G)x`tedwXmsm->_Lpub@yq$B1Y^tm9DMAA^d44*YfORU(4y1K#vaC?tOs zB+8h=8Kth+grP2$>;!k2qE%@0h8Y@u0U6r7&M4^(RvGb0Y%M$GZdMd{1@TVa%E7E7 zf{!^HIC^^VDZ7vW?bxy7koaUXOzN>xjt~NdPO_s?1(zfzMnoU7#GEwXM!LX7ixdEgmN^~%0!p2L9 zVdPwFkRAr;^bID~-X97Tg|S_$vS3Qp$z))s#3&!X64js35tDI(ON^Y2J7}MtUwFGJy z@aqS^Kr4izmH)ODgIfG5YS@rK7})jwqh#)#`9Z@pipfJZu+EpZIwCp~x~hnqPO8v| zj+((Yj%=f58?u36*B#}-(lFNSHk1?Yzg%VmtAW2k1qKsjwdCts9vR&Z039JaqpHEN zPuY0B)tG)+9IZ}ADk=$HJ)5^ifAcr@#@W2^i>58yU(12U$hs--t3*lhn0s3+h3hpK z`MFJ>KTmhS{1o(d`RlOfuw1UbG*5Hds#`I19FkA>)qmSbFHZ0K9WX!$woabiC-ziF zEVkuXAUT|DTIre2ZX57xykY4Ty2+y~my*nP??~9K@wMjAWanYhWElh%Edqd3t0p*8 zhKAJ_nhvV8Blxcq=7rgwDX0?5TkHSGp{O;Hoyj3L(=XemDRZ2tx3E$XySWa@$FL_G z-a}Eo?)%*xW&87!mWEZEl7*^qt3GgtQN!}9s9UAo<_NMwZ%PxfFF&R$R#ReTvhNIRR%GbKf2Hej zu+6;380k?b+%dKu7qk(P0KVtmP+O1lAhr~)*JnwYFeFgxbZwBNP*;$Ut?{C_tY<`s zBNm8|@`GEC&55gw;Tu@p^3op*oB^TJd?n3{mNq0UkiycA4=yPBKq-!$0k_F#d#NSJH3VZK6@vlHDFxR%=jNWhh7s zGIs`1vljw@U8~3p>3aWh0cv5>q5+EMo5UM!&ZJ-~IxAR8qTom-SFBk|7G^jvJwiSL zsVZQh&BRsZ=-#GeWuxy-t1xwFS)$(giYWF;Ltkbw(5u@oQsxa^YYz%uCmkpD5z3yk z_<@ky%(qG4SqkEM3XEFKLc7f1*=Duwqzz%?Ya4KKD2l8V@yGjdqWNbeNY)mZ32oX5 zoc?}!QCf&=-h{$a^P85UH&dd)$m;~*L)Pij4v0OIYOow8JBcEP)8yd`s%lw;W{zgq zct>gyv2cvgBp8{%cW86}|73g?cCQ+w8`m=_79T3uWYf;%`*Xsp1ZhfjCY9Fj-%;Z> zrH#!}d+ZBy?;G);R5k4V=vQbURAF2x_g_8C2o<|;g$rC2nQK1Yib*-`P43!jo5uo`%B1`XrEcy6em}zSdtDV~ z1`q!j>_qT2=VzmoZ~Zzs>!lRXK>^3hKhWa6lzaR|{2arp;W6@8>NIefaynZpXes;d zL$e&pTe8!`DqhGM1p+5e(VBG~jE_i~ZSoLj@^YCASU>`G0~qb|MpF>+G01nOAfgFG zqrS>#3#R24CIHbx)k%VbvP{%Fh3p zLiLXb8aj)B-P?_MvM!DuRm5msS-JOGjWA@cf+3}WA?aY4Xj8B0h^xaV?E;Z+;@b9F zBSg1Q;*kWzg_9lBHYuy94!Lr2Ic_eyr~AHMWc&f_a0|`JG|{O}dX?8H`Z0h~rI-uK ztf$9Pe~)UAdCIUDc=VH+#+c4dm8nSUSgQK(7v*jF;DcFqe^yE1a32OpbB}hnIqHY4 zM%tE+0zBRX2lIzM%#T17p0nuDFbNf6)YG=!p{8+HkNAlP!90UB*LM~y1!_wdaa6i_ z+8$5qZMRfpcgtBsUW;zOcE4XtL*fus(J#7jRi1XfkwfbiV=pRdPq|2mtEi+{uFsmb zuLKP)&Kdiv&C&!v9$C>msJjLMYxzH6X}E_DsTwbQTXZl-ayz1zB#m$PX_zy^6q8%Y zWstvq zq}6T^L;z9!Www&i$3ZMSTUA|ZVnWd8Okkinh4X?qjk4i6fk_3%7C94>Ub$9iZKWv& zOIcfeUHNt`&pESpz7J%w%6XslRluoynx*t)j}nEoK2ls*Z9&-Hl2lYU8_fX-FstW@ zEsJ8@5~XWJe1eP3*l@uLfu&Vm^t7}V)wHYr>)7q~!V1bHJj_o)x>%n_9^|Si8fXVh zgp8{ya_2;-K&uEl>Fv0vWueBvA;wv>p@P+m1*?T3OU6<^71_ZenocetL})}l z=Dionek=<>tX(yJY9<&WL*ZJC`J9+2U6Cfu;8^=7*wcD*_E0m0mKsNvxMi0){q@~? z1aE=<73wY)-zetA?LG`LP}idC6c-1MH@IxOt)#gO$unRkYqr1k@HJfQ^+g^dn~#x#yKvJ?myzT=Ogj}w>A5mK85$kq5Pf_%|BJ=evD|?ZX7k7{>Fs=B zmB}C$(&#U-XgTiYEnHi&fq=y^88Ot zSbQaocfhmfrv|R;uN=ng@_V;&MWR#!SXa4nMSViv$>W${;!Lheg9qcY6&)nX{DF*D zwb@l}$t?#%8=P;_Xplk7Vzz#>9`ji#uCmDiLQ}TuU(Igek|h{0!Jnf4HSiyhKrL4B zog+n~*H6Dyex=VtPJi5ICT8!dyg>lzE~0!&)#sf*b!$G)%+Wxom~-k}y`AW>81O*# zi_2{Y!ITm|pzO}|QMjM)7k&s!z(lWqUvER3nS*xa7Rh$z_%f*Up}{N7&CgS#jI|SU zI=R0_IyB44ka0=;55eC=XL?&zUIbGHR5BXm{%GI}(X4TDKC z$V9ag1KG)PP-i}E{*5L`Fl6KvDT1{?R7pbUJjvN1IAP*kX6n^&)3%U4YbCApK!^K^ zAKPFAh!7ygZj7WQ?Yw6s|Hm^IlPDpV1>`e&(}r;YXm zcHjXn78|dPwOA4v`y#&JqKj?c`0Hyfd5}ew=DuEJp8B?n-00-n{(#hs6w&KnQz_Je&XkJOg4dumf@$07u0$~C_qAySfo%{+kczTn2_**IE9{T9l z^D+LX&_K9wALw{*kQ_`Mlw-SJCb^rP$gKu8dAia0vBR`rRLMxoE}&CHuFYPbejQZX zAL`cRK46cT&Abx;0NgpM^ zD>XqTP(rl7dt{;f(zhb(`y7OR|5;c=zq3@(MsJ<8(?&0ovtqCH;yK^DJrCXVeG*;` zpZ%ZO-d=wZkN}p8*}Da)@0Rhn7|#K{DHdaIM@dbz1U(U?BFkVwVa$n|;6SJ_d!h80 z+tJ`xbq0ero14KCD<$Lnuh^Xf4iRD?V&Q95iE6z`mYTH66@7!wYflHdvb(zS9vY+S z3p)!+olUIP?AO#FPGbdiqV(4EO7}4EfNJ6cHWE?dcr5@_dvcLLZRrS9Ct zUZbw$JP4tF5fEQ+dGs^RNNn?6Xg1IC+eu_in&;k+f(-97k(Ja1DUyW@g1SnaN8#Y5 z4C;0U1?p0ErIps=fUa%UEv^hgmVYO(DjRX0$v7eS;XAi-*_)k1L&v>Et!qj22Xko= ziI(BrLa{%U6gOp`FTrkuAsa@S~+w0l0`TX&3>q?^I4DpN+@O9D!>+1|X#3hGP^D+Kom&ZwnWU z%I-;4>K-=MvnF*`$g(stIQn|SMj6b(RNq&RD}Sb7To;y!u}IsZArgaT7osj%VqQ7E zq$PVPYGX~&*3Tn^`P^eT>i;0b@3m~rOFYW{$#dU@rjogML?RopB2O1z{2Ryg2F_o^T^5FRt|-PO$*T_qXEBaoC^QGnIRbW8lAJPWO#skE6|9 z(Bc)2p2f>+cpU9@eq`Xe+v!cgp+N&4v|yn}Nyd4aaQY_a3-^hK+H{qb4jw2kk0>z& zM)8Kf2mWL?ph2ZU_;2b@xW8SiBCqOO)$T=Hsc_|NIfaBK!zQM_#D-Q)M^*W5bbQRY zQ0LEteE#PL%=hXCg&z|r4a+~&e#~;SzilxTwcHzABHj2mS=lttlK2U0Im5q{agD!yIi8@exIxZdm6JStR-QK5jFqIE57w=Y}# zXro)iNy7slt@o^g7W?BX%(z*nb`|m55la&thjV>1&~WB+?YQQ7`oX$!LdBH$MSQ8} zT2>Iti2&|Fs0qWqAC>29-GJAYWkH(r=u7jaSt96;hTlmTzr8$;YQ9?dWM`*bE-qP- zRBh*FHc#N8M$+6Vck#6MBTdx@;IU;@X>f+#z1XWV)?K0YAIexPqi&|2L_H5 zcMeS~v`19!p;S$+fVYp<;ZYf(2ib`QNdG2j1`dn`sg}<7d^5U+lzXBuVs5vYZRx#L zv}Lt}0*X@Mu}!<`XMg0qPTOv?Y8eT31%=#EQZAh_TbL9&j0?6l95o_CtCh2bTV+&O z?;Om}PntEn?d}Jhw?`q<>v6@x_F5!|!H}CVukIvj8Z>lXAfU+|xhhiXBx-UI^|%~s zND+f1hubO;5hVG?MJlK|qXsiF}B&knAyY9&h24P1)@_B=yHlUc&A zcCL#PF$f#X1{;amzyM{Y)Y1(4p^PRj9je#gzP|r1NiZpm7|z$QDtwzr;8x*kc8JP> z$)nI}wN~l!(rRG{z%nwN|EWc6t^s>N2YU|U4r9)c3uEB^2Y~#b^K%H48-8MHFYV^T{76??1W*$+V@FEkkB&)6#bGQKv!nm=L$ipg=Rt4q^(c2JM0d z*8z^JaD8=i(fvOGt&uX)=kr# zn27P>u`fP@hka&qR_x`VQS4$*5Q!VNL@ay_GhEPOZTAc1ORklJ2Ig2yg1~r`t``7| zUhXEn^MOlwg7e*z`vTYC*)T@00^>(Uq?#b4`4WegYN8G!Sw5GBe-1a9Q}Ufy2N0iC zy>FaQRE{rj9S#Fca)}DVv^EKbLfBe>XeKe>Y1}zZFZrS8`UVfQ1>45+(dT5|Lvnx6 zrvMSIuW`{g;Ds5$aWj|yc{0DQf?gl80NtjYc)6Qgmg>ez{-Vpe-s`$S2K`67c~B|O z5$-K1944doAX%#ET+ryOm!ajtKFy!5vt(&G#jf8)`eFqkj;+nb86@J_bgu(73;nFD zKR4(=Bbt(hiJHda&6}klpOYXxX!QVp!{---Kh6t*|D>054#1O(`bL8sVNETB1~i14 z;9v{>stow`J4oWL!}d7#wrmDRnT{-plw1T0g$jvQq5LEQ!;|I#2dO%x#PSD6S|k!* z8~bb<(R0_*;?GM!U+I5B-Deo{9RpDwE#M@IfeeE6&Ml zm+?z_gAg$!2MFo9vz}daJ&o~zK$e>=dpGmX1)I(o%MDoYF$Xx1^K|f7F$u0G8Zw61 zWvQIM%7yE(40j%2DgUAI-zRr6c}!0nWa|nC~|~m96&w#}<;% zm*J~f{f_i0H|ze-SlVbk-TqY{A}$}|!z&86|A1HOGDFvUPdCt@AHLg3!qR-y554HH z-a4D+l{&FLm%3zn=)HW1e>ogW3Dt%mr|kw z+)rvT)syPtyB!1GM-{Rjci+>fCS*0;wQW8%i(M3Bg}M)gU6>Z$_CK+k-`fPHQ_s_W zGw+I3gsPm`;V>#XA?I0Pj3-bh7RgzcD5L2`wX zoaSCJ;JAm!@%HR;lyB;KhRh{iDxE3c>zy$;U7LAv8lsEuXJcmfjoeosurzLyc%MeL zoM)$`AJj)RF7!iFPXePPPpe#}c6OnXl~YE9#>Y$fLbp6N%ehnSzu_eynB3+&=h+yU zQ8x?d?6k-Bn`OB@MvCDQ3Egk26nM3h zG81$UryNHdt_q~Ywi~|9vRt>4?lFzm_I$9Xw|#uSv!HbK-x6sMWl*EVRb0I@eFwlS za9{s0F7my0sf%`=)5PpCCHlBZDh{PGjr&RoXyVUkor2N)NSSad)T;CQe^@I#FvLtr zX4~8TIob<*->Qn0W4X{VhK%(#CYmfCR2cqCzr_ULUGfbu0BI$5)IWDvC6Y{LJi1CF zTu&)zaUD^n##)?%et4!&1PbN#g0;Z14KSErZMyyCyrum|0AC6O z6|{>jZFw(R;JKWI!&XV*GDa#=0*uVQvwT*UevYGw-eU1TUBLek*`<1(zPlWc+c}HR za9t|v8E2%DxQN&Ap6k&yz$I;8exSOHs3^fzGt3;VUuL-VkVxSSq>i%`4cvReN-r19 zn``@w2zNp6r%v7qqVuygx8LKmTG&b&_kIdT(K{1NQ8t^O!X<;WF=X9*Z?>nK^t-JM zE7mhqCptFdiN_XC7NS^k`(hm;mV#I}z~z z-Y>!KL(!o~da^UiHfI{Zn2m2cRj{V}@-SvT#5*JgiDMCB?-z!3lt)B0em+0 zJQ|CT4`5@iI*ha$GGojUUEm_N5v7F?q4SO%5rn`{Sgw;FJQ_5~CO{G|RP2HpHa2~v zSs$QgU!4T51diTQSEga2UXTYNcjA($@t6Q_`d~S?VGNIX)n4{`5YXhvEv+X()@H^v zTZxI~g4kRijK4sct)`_tY}ev0aAtrx0AtXD{bhY$Oz`fU6h;W+5MvBNPV8xb+W9x0 zR=%bJLMBqpaJFLdN;d7sy|;9REBhZ;nLMqUf`KbOf_NFhYlX!wI$_m4A0pIg zPPL8uI=o!ZCYjs$t(D8N+oB^U+!d=V8uZZ+%0IRcw5dogLZok1sP@wi;tp3D8K!lt z2LJ!yHrV?pGJHMppkpQDH*Q8@N$}E0Ds5vAntq*s_>!^PBAD|7!abs6X{p!+$KXz+ z(0I8&^I|}%t$|QoTC(v3l#2^Oq@Qo$v(I#zulUlKuJ?Qb9-7=Z*^{N3xlDpKolIz8 z_Y-~}jU5}}x*4WVHfJtY`;LG6oL2d`_qsj2v@@UCDK+vwXZgK*O2RVHU+P!ecNTxox`MG%Ii?B?rCSe~#hWuA~oac#Q2pZLAj7Nv(v z9!@S`nsmJYUY*Yhyg^J`U1X_pL|yEBvjQ(OG8kTAbVJvmW3~QZlsD_vjW5397ZN#IDbrx@!{DD?I;#`OH8F6D{N}VDHM(7gY?g z&QU3_Z8X#zQd09=*=SRE4;hXmmCJ{J-JXgO!E1+!>ckU>w}D#x!FbZ=+n7J$brLPL z@A9v;&d>R5Ld6t>NUQpkK0sDdW#o0Jf*kCABE{F|Yw{9|D$J-NEq0Sf(JuK<8hw%1 z#j?@4w%VQDtBenVBd_Z|zuwSf_~$(YEMzm4GUy0BrNzfyM#C0Zd50jTC}PvY<#j*0 zNH{;v5B?(6m=0_*Vad%}TI9?kxj1ma?D(46*ElyD-lVgc&gVO&{*1xNk=wVJoPY0= zCFy@6vyz(ye0k=s71i~W#L4Q9UU0Xd>Z`{l{6Y;|)+omc;Uz=*d46aqRfLC+$W7GJmKW`i;*m?#Oq;qSo_Gj@%->&=%>R>)!t@Jsrco3d_kk_ z61O32^BufLmda;4wl7^CrJ%J~ZX|M?D8g=d4Rt}q@RghluppR?^G4%G^Ex4 zBBEvYAr?D>JD1fAFa~}&sTD8=J6UadYHDsS*C5t}q{W_q{i~FnqCb{w3$6OvjzF5I z?ZVN@!`Zx<)GP^sv}H-j{POf3Et#hxO}wQZndIic)QNj%d4q?V zJ2H_B)~sMLOJNQZ+YmHLsEvm9H)XC#sc%AaU{YIRhu-(R$7Loabiy5w@aj8G?#7UX zK_^^5iSJ`ieMa?GGplcO&o7(If{jzx>+hPN4yn45F5#a*W-#t z$lD=7CFd-TM0E2D!}bJlZQA@o6KD!GQviPo3ce7!%2Av%snt86BDii59tRXWxn_dz z#ibcSx*i>D)#DysxJVm%Uj{(*q(CCCxmhs@k{7fbfA9ol@&ohBBk{*c>SKoQZ@lU4 zctBm++vgEb1e<_|)@G-R47WXhh~W-!&8y2T@0KZe&Gm6UX)Yt_54|`0HKcaB^dvnt zo2fE2vFpkGrGVUIdt0 z_e!jxj~1wE=K`5tq{eATp5kG`qm@(#!-H%F1AH3x2IgLBv!;6;M8(bxEydkAA=M(G zd!BPygV_A_-MR1tl>Hp9kgPqfsOsbbW736SN+&GXb{_;+l*jLdvOcPO0R=+c8B5n| z?iagM*fuG|T~q`JDS)63QA_jXt1O`K)d~-E9QvG~Uhd>4T9`O^QT$II*9%22lW4O| zpe7Y5j3G(s5V8qZ7-=i~iwmV;yyus!8~V<@AZbEql_8y!rPja6iE9P0ppg$UM)Cj9 zKNqv5p?powS=BeaLT`qDFH2yr{?}3`BUoMC2?N1PpP%Xe4D9uzc!+-*pOBuO&9}iV zW!m-&f221*eYRSY7m7MCW-TNpGlC%iVAJltGW)FP+{pC*BWsun`j9#4QOZ#EkdZD; z9eX<6yN&wV$IUvh4_ZvSB-6+f-g69?Ae+Ja_|vd*!cDpISv-;E|cE?q8qi|uNc zDqMV)RaP1g7jTm=(=1MB2Abw(F4u$XPCG6q51|WR&rL>RDIDx;lG5PtvQremz{Yp# z^63a?igEQ%ObyfT-LJJ)?v zg_9M@Qx0PfQh#;i3ma=e>E_Eeip)QKK(`wiQL~xw5sA2kB%QQLtKE8eIASXeu1(5r;=SED*&@T)l!M8*#ev75qKM)D8P>7yL|>Txpv9nL#)%Q*dRZQ&Y$;>u-9 z5-s)5Q7V~gSAy7)h_RWYG9Rl&YagtXVgcAeLs}u*GAVYSjmbpp;c%>x*c->fw$2G6 zQrm(obZk}&?pcOO@kJ-Qd(%=$=|wxQWOE5^blh~qUaCt;>W&Am#yKXQ+oTZ_v7D!@{9c89pK+U`&^V81*gioeU{7+4F2-68vJ_KKv8le|^Sv9m z?J(QA9gNSJxzR+rRLIY+c7xTyEo1WyTfrcL4uIb1&_jWDm9R>WugKdI75uHjN|!ua zeiczp?E`$G3*RgTw%@NQp;tFsyR%@XD2as8t$oEXgtS-?X2O!(6c|V@{L0h5U$vFU zk}yAEfw7u=(nK6~Mb90djd{*}gm#L?wOUMMKN1@KR_SrPg-pp=s3;yxcke)V{VngN zpZ1!k!H}oFWAovd=o$LJB#;udx#%H z9ulhW-e=lBEj3uMIe43hTUwSgN0XdS>?sqN(Y5F>`&MpVyAmYx{xH4FR7l%d0^b?k zzw{}G+2+5O6i5yDL0{CDL}TFRS~Q8Ug54$@0$59Zl-Jb(+K8G|vS9y3d*}@9CzGu9 z15qH82B3)leGlc&YkKo4i2q4@C<6F@?n03!+(S2l$K&&CN*+JU(ghf&0>E?{w|LS6 zDhsH(zN~;ce)vvJ*10{nQiI2BI=6j(6_iO(WRZK_)n``Ic*?^=%-w2;l~m`_=ry|N zH1gaGn}MiH@0n{-rTU&|%tfk8PowZu%y^%h)#zkcw&m@JdCTcnJ(jo2*m%Jb9Iv?{ z?m>djYy$2?``8oPX4JGbf}7d5>)#DpD$Q`ZTrfOpJN8^8pWNe&9$L<5+WMtygu(r= zdpIqmc&%2-oJFjX37tI89KXUoW$T`>+y{d1D+boqrJATVS*7Z(l@tSQTkJsFQ zWEGa&zVw5VkZ6|5n~shTFo*TuFkhqiR(@ikCgFw&Hx`P5oCnT~9&O62lw&#gldE|s zBdT^(STJ?;8`apY4YnXwl7$n(k{0Zlx#WHlKB-<8^TAPepRQzV8$E7Xj8(xO<*zE| zJ~Rrh;wN%Hv`G|*2dG%MzqC_b4pMOn7zz%8kSsfru3$jM2VwxRF%No_$19R8B$Q9i z;T6-)h}7kXYSCp1YrV~N-&i}JGJ<6q8$vo$rHyMmIg7-(>5LtVxvmU$i)X5h>(Qht@t?CZ zxqr>hoXlwizop~v<(OT0EEv!RDH7h>9s0M~qd}Ck5OMfWyt@^3T#}1+5(N!3RBh0C zJk1xVdF=E5N`CO!Xx5&>wObW(-~R9G2{l_{$brk2Q+yJBPAMaP7vh%i$Iz-BhDtzO zRjch}V!dV8xEJ5s^eerLf(HVU7k3fghSPn;cOOaxU2b_aGeSS`C4qsMH=-2R6?TK) z|B%ZXY)TVfdf?)<1jWun(~n072E>4MPD_p&(j`XtHU}OUROv|pPp`BCyfleLJ#)D% zHK!oC<+DNbP<&39rFkwLI_)qMz<|YaW243yWRt(*wwqVGMoO`98o2RQ6dt-(#&B#otte!hGek(Zv`lq9vY?cEwY*hGUvXSrcX6$SJ3y3kmc|S4G-{#biqd0(shLG&7c1knY=&uVrBh7&mTGUhm4T9WMg8Z3> z71j#r=?mP3iIPb*P`BhqE587H1)>D2i$PNDI@Rr@%nw@a? z5uB?P@qT_)@n}UTaXn(;X+qIsNYzd0hCGT@(F22OM||cyU?b&&)P1D$FW_d)S&U5F zwhmX99+a5qW)R{L%904lgnV2kG&*PbL+JQ&?$UL|@ar3tmpj3H(a+V4+|wW^_T(yW zHZGL}adWe>h(owpsiZFAqh^ltdP*=@!1|s3)n>q+?m#1!#puj0!)uIN$^$1$g>M5N z|Gxa-gR^GArmWzXEWvG${^FppUAi7WX?DybdKrCJp`Ydm{u?DO;%bK}(6 zFZi5cwdo4gz^nLBETTDUpED?;~` z!Q8OWeHMzeu&;P_US8$|4CK8bYw?PScmn14Fa`Kn&~mK85w+UI^Z2v5K)ui~C{VB2 zG3m9Ex7C>mBqtcz%QNh5o2y1|b8hwdKk4sJ40!S^Tc#kOgG9<=jF0Jll^5OY+{zDC z4{uYRJ{F4>7j;g?q|#Ic#86N2TM!P9rQW0~qo)}BrDmN!cA3##k258ace1fkC~qjr zrZu&XJ-(#mh>A=z6El~?AUHbU;0fOYVRK?48+k%Ur;+3}Cmi?JEgV`#i#a7(Yt#1A zY6m2B(W`~hf;F$h^XMF5=Dt1n3gs5b;Kn5r~8o5K@)XM$nxDz-NcL9E!} zpGrngNz>DP!<%Pd*O8GH8tgng$X7k9r0wD&FXpl*>|!*V@sQO05=qs9w;&7;ZCEvE zXh@U7^OvCRCAdXh{HN{Zj@fL17Q?6{4@Rk`j&Y3_N4PiJJ2mRKV+XsFn$r4x36|3e z=&{f0K^VTX!|dXXox%Q0!}V-3v42!deS0}0v7NutIG5w%y{@8n5mvbMAYmJwH6t70 zlCm*F2n~^Q!Pzm`a0znGn6z?*Pnh-mWXTX=(CGcporMdp z(`D=x5i*;3Q$|kMNj&!cJ=}O}$ztHm)=#LL$gOgT#ut@zOi#YPW|TF(d(-PDb-D1w z0@bFL1L=f7x^F5z-{BKtGF|~2vv&)DuHoo{@!!?~S#OfXD^rW|=a!|cCi8*YqjPVg zJW|;gCs`hZ$13V}Q?J8i>A(b@fpH5S1lBte;k^*|X0VYp$+ z`n}-~M;!E-)|r#ND|OFv)uHm;(xYr8nURTn548A65w-7&uAEwH!{a(xT=%a*0C$)j z@t!%gPdq00IoWuikU_cYukt&emi_y+FXjv z8+5@YP-z(r+U2fpB@{n01!$3NeQeNxh@dWQ!vysp-dO|)R~9+R_{%V4PJTHzGLX0N zZ_5|(#gidM9)at^s*`4bu?# zIXLpZ4)(uYu%qRTv)crL(6}hapInqO3I$;68~zVn2)=>%c}iO_b4R)c_j4*g4*g!0 z7i=NjziK04*j+KwP!mYET`dQ~oj@Qt@v7*4*b6&nL3fjNGvTk^8*DeK+s6~0eHSUL zi;-iF4=@+UTkx=D^;qidHpA^({>^*w=eJ!~AKGCzU2qp9xb>vZlrq?}X{P3l70Htc zCdrCUJnb0`d+?;;d%8-^Sn4Kxs-$$~nDqwc<7BCL*+^v5drsQ)hMe0Jn2bk5hE$FR z9ydmQ*fD;sa_D9cZ>AyuhkkBC*Cog*rf4hde#J7Bytz720xpc9vZk;D_V71s-W}B! zbsy_im`N6>U*oWsSWXmP&X4#dcKqAnZ|dc-k?V6ef?=!Ke9Igud2ycgt}s>p_T5*kbCepF5zp! zz#-a^yp51-V}_k?WYW1IG4-9ks|P>7%gG4@8x9iD1RdE-_@{Xgj|{ zt)2UraF6E=Nj`4bAT!=7^ zajPEBORCpsqoLwEgDH|bb+{R*=V~dYFRSYiH@{-%u@SVjPtH1gncut8?AVD{KhY|- zZgLI;{+B+@tN8_&U5d8niyyIXeshvsd(hE3m^i0Ub7^$hwk^E4{rv08JQ3#3q5Vk; zY$=xW-0g*cvEofeLAr`#XA_5GOqgq*zfbv_k!XrQ1uE-RYSd{pdF`oPP`ZamjuDmR z&CZ@PqgoowQyZQizb$*cn(`Bi4L+7FLwSmS#KuJ;r9j3qcsQpab$QU_ah&cl?RNSA zf=74+!8`AFcDcm4i9ZLKQ&B~2!G5)$os`budq1qL$sArMJ7~g#m^r~8e{(oWHvQc@ z=)=4$*1RB=-*Pd$!gO}+%IBE*3Ge*nvkD%|uYOeWtW4vW zuwtw>*qSBk*X}>d8XvhQ2c3X8NLXrouuPa4P*S?Brb5fCV1(AqOQ&D5_{zD1&t@Bf zRH;YHQMfdQ-+#zPv|Re9q@SHdd0sR_DP#n1d#=t=dCp@cS`NzKG^UJxkI$dF9}EsYZ%1pQ^mGw+l6gb zdPDPicqG5g80+qIn} zXhNG$Ol}6LM$G)mq~zjjlAD>fNBVf(7dyp0mikhkcBMaZ0*T#UUs*#t1gDU z);8V+ou5w@nKq1mA3v0dzE#g~!>*f@D(`0ek zMUxQl!R!y$p&}=DYR7}yTq;LAjBV@|N>fHN4s8FJg zx?J~jM;F9ExUZHyIjc{0%21eZ{l2;=V*mqT?`&9b%#WOaYJ)F+{F}MIqJz1FR8x|< z9+~)0`sr-a?+lOe3qs;tH)?fApR0yv2SNgdoKe!ock}Brzc2k#HVdA6VpTJxWuXv) zw|y|6VI~ZsN%yGRLHu-_%!EKLPylAqx$>sG-jH?3W5H^m$@kxn1193gX*{Z)*n|%~ z8wuylzBwU|!aQ5Z?w`kZoLph8;O1aRlDOzUJ|KEH}=w748Qy*ocr<@4pT_mQx26T%i zrE*0jdhCf8MsUzK>S{? zV2KZkljTHX8`m2^)pz>%`z4j6BPPx03V90RUWYH)wd{0pHyv$J+0I$BZdp!B9O(!9 zWev6FM^4@4tKPz^kepEs^Fwz7Jq&Q>SiJX3BXP#vcW4Y2&c+>Ryv*`jg}e9pEe651 z6y_7hZOjekR5HTTskjb=pbzxBTO^-(n4_u2jS;uVlCZlG9h?d698I^L+x%GS5jA=g zk5`ELIrv=|9gIq844D~(D{G>h(rs-P*zmX#Z)F$pI!e&Id;n=7oHu&BbeF)Jp6i%@fQjeKypkOG89mpknTO6lox83P@0+K;9|3vhh14 z@U^Yo)+*bdQ_y+A8H?zd-Dp}}WHXCSeksE;JszCY6|8!vDBQ6_^7XUZ3vIqyiGm>n zcf^`3Vz1>CQ&ii=|I0~%$=Q^M&wu+z5Ho)pV@PAr(pkqwDLttF67v2&b9Gf9!kjMo z=+_&lb=$`d>8}*cT{_j4T#5D4k_imk!DCB^$eyk`Pd8kf>r_WhY~XD`R} zu%qO*C*?*>`}nRUznp6AHWrFoR?BeP9GE#9JE9EY`lIEYnTze-{&w^6e##{yX^KX* z21?cgh_CN2C_D`6J%Rz7-j;k5fUA~c$ZN&Ebo*cn#K?vMBdOW(~ z<-O3j{z52XZ9|xVc{|YC+A=NGbv|T6e5{*|)PUGh8{c*CA?Ly|mIUDqOpDg6;;%f_ zeFs9;;_`hsoT%hKc5nNhglmE5t{T?PHOffAl3>Zay)R#@a}rxF3x|4SubRS(rhXbG zgwm6IqtX!PVJjtk7CtB^k^Vsq_lrcn`(NC>1yq#nxA%{LAcBN+gQOze4bsvUqBKau z&@pr)9ZL5gh#(=|-Q5F2cX#J|kNP~n=Q-zh@_*iS*85*emom)EeP3~3*R}Wl?$0*+ z7m?`oFbjCV`v!>M{HK;a6VYH9!lQ~Bfldte1M30t2MBlxstZ!tV|N`wpnghO_gmQR zU`WZei+Q3o>RgtQTSzw&(c$PL-X~uiN~3`)D8^+3)tWyu$7nKt0c-{t#ie1EGVC4% z48H^6l0YDwTV>;h^8eC@M1zX~UB$_X`5g0&5B=6TB-3d~yg@eGNx;(#tWa2k?dqf~ zCRAJjh>nQXZ%i>*YPqtf<9$%+M$TtY^#n4sJ$A?IZa<$|ZXqw_B=X-mhXRMkbwQE+ zp4ltet{l(}bhO-kN50r&`eZ(U(tT|{z+~pMAyyQS8i6jCu6OG$`)`H;;p$?&!|JS% z(OH20)7#An-mA^nS?k__`hlC{h~%~?Hz!px0?X>{GF)XL>tyXsst}zjjBUlpT~E07 zA6WK;fynk`J(5i)U98i|9iha=)qsACRDuzaG7CiZIkbEJER?cDBO*7|X%o1zJ_7uu z)q(No2YJu`B5K62ReCA)P%QL&pyHFloa9k4_91$EO8YcIXwNEzi)z27zz>tPA0Nft z3|KW0SN?rk6H3Hzi4MX~c_L;(LGPf#y<+L`uY>k+;?W2`7KkR~t#yN|PjuKM(Vn<% zeVePv8Z2!Etkp?CBf(Qj?qW23ORhv=H_?&?s2~0vSk+&}lU28ZNkTvGuVd#nG}+T! z5JDZcvp{)=e+>vj03F{ybGxkUu`iZ>-pVR$ck6@Yw$Web+MZ3})IaTUlE~|}^95K0 zlFDZeDLt-tC|z3v>K2VGFHs4n56ZQznzhxh!<&Q_LN;#;2&a#dW-mHqLK@2qK`B*J>Aoc6F6js4 z+aaV11pWcb;H>bTz$iQ!G={?-;Mr`LUgDw8m<@4l4M|2Mhs-%kG^<90H-gYqO4Rgp zs_aHEzCZhWKHS`Wcv7LD(RxVcuS~~(o;c{yvUa5-Az?|FmPM_NecY5?tNlm~{u zN=)jL^~fHPjfhUy!OLk>oU{W_$w)GYhxv0=0EN9cnwpKWZS5ylZc9(JQFaYfo*9tqeNd12CE64KZiUsXr9 zgxr@!Z@e;xEIEzM#3*gj^i_!O?s1eVvJ5PREeCfnI?p$JB-SZV7^RPEF~pF>oy7as z_h>Vm_1D}+xn;(6zx4b-#blzr=cS>UeH=q}96Z#-leEZ0ka3~f)rO^3c*3X@C#kf2 zi)A5&c|b#&bUH!tM}E!+rjJa@h$mSzHzwYWKr4>uL#j51HIjo$@6&#ENECmMbP<6> z?$gES8JlBa<3;cIR9jNI6CG8l2jEJ4<7uSj(Wgon$kM6)2DKih3NO)t}6_*B^v=90yZgq{O=KReS7= z?Os&EC=QDcyY)S8d_?U>H9f3WR|7Nz!+~iVKP$Phx&J0@$(oGYVAxT1|)<+;Q3? z@hBy=AtQxtqirvTxwIgg11_yPfdD2B#cuIC1x`uMHdJu)hH{IgiZ{?C5%N(rnp*Av zd`zAE|B-t0CgZ|%y;7SA_AkK2af5us~V9EoN&BoCQ&0* zRvdN;&6n84_n}5fdrvwLS`L={DccsxJiSFx68lEBWCK+aqX3`H_lxc=i(X&(P+m{@ zP~IFNm3wS>!FIpg3<-2=0(z|CQxE5k(!;N~5gE{Wk6X@^eGCuuEI{I9gJ`3!>~ht( z*qD76MOi$Bl4yf{?_i~?-k+5GmGoK{gz;p}8Xw60Z|wZK%071TI&(rq@-8W>F_X6g zp#bOC2gU0Qo-?x(VP76Lqvfi=roo*<6H-6P0ppQHcAk2}XfK1cFeF1vn335cUXo{0 zBwQ<0^S8+Nu2mVoldn2W_DA=1KwOJ|yDP+o{1+dWx-OdtN@@Jv#CS)a-jyulX{;IX z;$Ac@P*q79RIM7w)+=q!kkUyzxVVL3qv6W5PI2YqcYrHzz}(h*JduT&@nqD} z?19F%)svx(eZ9GiH|c#CIX}?_{sJgk)v|U(nWJluKI^yAhm+$kZeMWm5g%hr1Kk_{ znTz7@$cpNJAS?c$SSi^@fQ?T$w^y)POHX~ON;6$%O)A8U89Y-y9`_+hq>-Zi;UkN{ zM_JTYNmMV4cjkqfTLz6?&yoK#-(d|=#n;zgIVDUDo2J+T)5E;RSss$Z(HgSLZ;Lwh zW&Xro>5rgw^gRyPMy3_2QTM+QjQY9hA=wPcF(g~J5d$ZXW8@_uiFa?;a|@uR9Hb<9 zF5v*k1U9agY;z^CtsxQp!dBE#Mrj)5r*JyKW2r_e`a>Y`yEx;Go&RLSx!_s{6+*MD zlm$2kDy)eI3ma>bmkyzhkHe0i?5J}@1rBCoR`i-G;b79IeQftp*tbh?tvX^b3t>4M z8DTrfKoCe;ME;+Oe*YV61sz(BQko!5D*uw)JCa$J*~m+v_R_JA7RlOwsC})H@j07k zZ0DYl{hKP}jT^NV9z#46Vcwyv`(TOem$Q;zLUy^C1 zAH4+h)_3(}t4YKRHXNRd-8g8Ng(@hFzU)ODe+E&tw5uvIMMwwaH9QW+Co1ItYdRz5 zef~TA+a<$&B9~hLnW}%*+XV1FP~Ypv5UCTRc<8-@%ZT+Z(K&y~gjU2Q4_D$Hexj#5 zz~!u2QX`{7M$D6e@(w7tCeXhcL=Obh{OYg_MRU!g=PwH~p4UA55`+1REJU^xE=c1; zWf3~GN)+{V?HN~g>79zgWA9#C;$O)#5>f3D zV|OR#T*)5Us>lsb;ulwwZzHxDuYG3J0<`Um+cUpNM}NSF5cj`B`+5Pr$zm?rG=||} z2w^L|v7qp(A;QQt2#8dJ>4L@s^@g3QPrZ=1@L_RPw;$8X;++!3T$##jivh9BndviL zp9!HwsUoyVrT$7{1p8Z3!w`S1j|%{rifd-aZ4N=Pm1l(t2!bL0uzjBFi6>>PV(fw5 z1{hE7{dI1aEOloKC#>lQnfnu-ipc>1l7mzg7AuYV(UYiAW$`c~^BRBELxf?o&Nu4V-~Ainw6v>cEcrkFyDoJ@(fV z6jH2z+Dl+S5ZR2gf*+w>e$AH)MI^Gnb^Hh}sa~70Y8^5+`Y`=~M?Pvi7i%4lL5Ju# z>nB-@|HC2!m2xh8HjcI7MhLr{B)MO#p9@j}4BNWdJ0{9vPD*<<=>(}{(@2>f<_d$K z8C1+uSbp!&ND9*oG13=LhK`z%iT(~3qWoH0Ura8qVlJR-3Me=Nb*DE*FuW*!oiPS0 z?JWN9oGh|Grt9IFzksOViVX|+=VSle4J&&78Efe8*vaA@4|sIy&z*PkhEP+((0}-k zoxa4jd%!|lDnVUt@y=flQUF!sZ!{$P+h7(J&SsP7_OPECm&wWxYh?wGdh;^(JwpjM z;0reV%Pd5Ftj#+Yv69 z3mP4+Ebi9bDk>8hiNFj29&QM9`qkh^cD~L_cho4EcBSHE&I|{(hkB%j@9@oEK6a4c zDSohl!_M)jRGKZl$|3l?5#fPU2#*%%$MNJqrqZm|4u**)O7U~06hlFQQtVtAd2W*);V_804BOb)9&siiOzP$hl-d$BJcl>sjv6j z)Zgx6tV>(?uk$nEq@^}=@Q^ zTLh!LUj(BXP2yIm2Cf?UuL~M2PLa3_HuwVtmL?JxP z11(>MTEFx33^)wpZ<%?P2FJ|5d!%>oU!ze8j}((Ur!<%6K2=v0hvy%)QyQHDf8D+U z(!_?Yb>4y`hsCa(OSP2Kx*O!BgbB2cT(y+F;NM)?bLKd}s9($jD3!Z4hb%RF&whCZ z0c9W%lt4A0U=v|zkO>S@{=|cD*Er)JX2YDV{4dkyB(eaCqVmhIK?KzIe<8B9I@y0D zWZxId1j71)ZHaRt%Y#4c1~yFezCw``0cQ`gq_RS6K0}bdW&=6{LL|NP1_4sWaPXJ4 zpM>BwehNJt88o9Ja)vQr7v0?DYfL2#<_e?=?t zOT6%sQttG&%Yd>jjKlSHde=!z^_#vjII{f)o$4nkJpD7LXoXE1>KmnM=j9PnwUl}f zILdI#xxecpfGIEo;y|}<@RLPR2wVe4-0#$uBJ83B=Z5x+z&swDULE$=|3-(xkw;_E zAn!fjIo-wRY8S5W?t3b^I{JH5>{0a6lrzpbqrz_ov&NW$>^|9fv2<@a=X@P!v)JGv zD*4!0s77k|1gUCGy+%tD$4fq#$>G8@twhoE^O|OA%GifJ)oMGQ#w?%bHJxbCptPaM zEQ>^%yEM;h#^%JvJ_1nKHO+ttvjFkl&7lB0A|#@@)^7}Xr(_6zPGbLjmOrKgfVm*8xk-1mp%{{<8~2sp}&Wxn|sMh$@2t8Og>zP2PLd49k59KA(=Gs087`9`1oB>_2sKA;Y}wA~WiKNTC@DmYU;7%~ zep;t6-+z(#n@}i(Nv*F68Qy}RfV>C)f+$=?`q%D==%f*`;@&a9Y2aqI?rWHcTQg&4 zB3@MB@ZN0BG~i|A8)aOHR(fcrbUHm1Sg*=XSe0uFQH$?RAQ$_Kaw6s-I`l9 z`pZ3&PLR$?5p6CMnX+ft03=K^pmhLgI&XkRL5;wyrN2Dg zJr$&aClyZ^rMdyggxWPJ)~do)Aa`Ttw`aS+>kJ!_k~D%o{DB#MQGC^xQ^zyLp)iWO z*yQ8$#(G3R(inVVK0JzXkHAEFb+Jb+BApu$=o$JjaWXCh$hR~j%6f>?Tvz4&lT!~N zX8{Y|X_+nsCM;3IhnEsCfL#4ql_)jo;qR!U@P$}b)00T#_bA%CQVdw^J|jK%FZTMR zd$^WL|7L#wwON8W>po@va zj{W_0i{VBLAS3yA1C{nWDEev2oITW!P%=t`pbFDNmx5$!f?zx`0HE;CsA*Mw(>fSO zCjR`AEn+2aa1wLggFONkO=ZFn0~70hj>PdNEMD006WHsWt@?{Wpc2Ga(VMty;*nMD z`h%L&f~2clVr=N|P-ykn z_!iA%@)%;-6qyu>wYC^l5LhmEgBJ0lMwKEr2e8l;4T-nlNz(-7SXrPW4rl6#}Am4 zFG}I3F+F}DXW+E5|9IBBQ#5cBt)q^j9_3kYu@{3P1qCysNPtt&*8xecl${_QZPN~) z-c?HQL2!_?>4Km(7SE%W2nR_jj?zfC-LM{F!O}K6fV>dQX^u1$0x&?B1A!UM4o{{> zFqHZpM|_fkM7Z#8f;c196#p(`Ca2R13DhI1VhIn}|8dqvI>D!7z)VMZZ(v1Th@Fai5U;mda%g|GS3dhTpu5;&01@x;GW zKvDC)jG%6#SJr54DThnMyM;;>zsP>~3KsY()6x+*Lel8FG0D7wio}J-KIv53Ic6pi zE#T%-$(d07@3<6a&yb04Rcye>wXfe+qC&*#FIR8@~n(i_^_4A)8C7 zm{<&#^+tN*&}o@jQEf^hq9`8aH*b|Tr->Zw+vS}-Ckd-i2^X-rPI7E=hH6Rg6(>QgR;-r+O-G6^+g9S>#GhH z>)C!2LZ|J=g%^Q?TOYs=f-`1DUMdS8_HgzCjyA#?fP=WTkL^1-8+eDpp77M^=`&94 zhl34YzIV%-r^}IpFa%6tC9(HQk<>X+5A@@n_!B?-)A4`u(D)~^*otF=7(7yLu`!BJ zZ8kDwl3DObQ4J{s)x0L{`@KocwVpJdo~&}q-Cgs4$$&m+y8GV`rVRS=Xnkf`H%E-3 zCF*OOb4UjYZoE)$XR{z2Jo=q7TfRWiTZk{dX`+QyYe&;&3`!bj8o6U6BA>;05xDca9 z4Nytzc=pl>7>n7;gCsM+(t*SF)j{iFqBo1A0G4v{bE@ldSNQeSZ#4Mj%xPV=@U}@m zc&zw}qywJW)CTN__G9WPK4)$bfD3f@isCk&XusdD1Hd2}_i{?#4W!JY(C>i^MPcw{ z1J#Xe^C~BPa)Qe{UuTZ?@&{$|cVR>1r!$+zMhyonn@!i#;6Jo+-zVkP&wOn0jR+E_ zI8X;VP4S7 zMw{y1S*;wc4F_VGXgU8#mQEeppxQ~c_Jl-ccu5S0L=CBT(@7B71PBIu)rjH~a}7wL zDyMY9P*xCo&;&AsGzy^nmTF0xX!D`=lIaM9j*()^G|NSWgTG9m7(B%Qp!k#Uq7sP~ z2I%L2`){qKJV&Q;dIePQiq*b41ky>{EE{W3$lnV1Ui5o=35rPbP^%U5AAPs%Q>E=y z^(WHYpvULQSA~8hrcpF`*-F%E?mhSb&h3523MpYt@-f6@OP1bz5D1y4?Ubn?`2AVPV#@NcT65BGhe&+X0*lw9pf>HKReie-o>AP+G&w(Fh%!-cUDMaC}iF{Tm^nZ4vft% zC4byja-)?jn?B#OHR3*ef+U{~D?WC8zH%s{LheA5k~YTv7zgyWH(vB?rX(t zEnm|n018I@`U4aH`Qn$qw4)5D2l6!i@kbot*+;uWX7*nfs@+9=EWW6P}Iq zS{J^Zip4i?d^pZXvJH7kl4R( z?0RQ^x9s8brR9ln~P4K-R%mL^? zHL`Z#D6)bVY5;}?(VnT!Zyd!&D zv&;;d|LnF%I?GprgOa|cHBDirb6Us^*Mbl{kH1=)=S(BNf6$4Pq(0^H!~N`KKb}-C?b>Vbq4kprB&~n^Tbv?c0lS&O^Y+ zH!|j}IcxoCl@35BfFL!s&d&FP4YhiK@>>{k^#sq=`FbM<7CMc;vvqOCL;{g8iQ7O{2yL!z=+SQ9W<_yJVo zS}x42y#U&dt;A*Q94iZ3VwSuAIVMeTn5Y5o?+yU~`Wf2x>N}bYoAFB*luNDzNiKN} z!wC#W1AM+u!3c-$t3jC8x3p8mM*X;{XD#VPmK(@R*lee7bYU^q)Teulp7f4`38{kP zw~?bm6DV35r{V-)9>n2 zhg-*`@wF&rkY0IlG6R*&_I|+Dl|;m1IAAdAhs}Q=nI!d1jjE{-JVe$#2Yy#25phh$ z^3-TN*%Mo0X~6ic(dl+;__(cT+>gXo?u*+e0iM0&2EYtyG#vas6try;=u}>C9`7#W zmPw%rwBNN)>tHY*Yix%A^Sasz7JvDz5~h9lB`H|uNmlaAGn$IvheD^T;hgal1U09% zyQQqh0=)d)yD{9^$+*~We{i_ZH^KBH=$~FVSFf1nb-vN62yGGrl5g3zpN=FH+%z_G zlaU162eHM^6g3{Q?nX!)KJWdo18WqF1{?2gQI6N_A4+(>evQ}GRc#Uxv>pF_DeD?zg&<<8w6--w!@gH72S8R-UH}UNA^ER`L2wV**N83E(d0nK{d!Y770XowER%-yMnVJ|+R|}5gB-HH z>&tmZG!SX=K>c~LqZ!P6fAM(DV=|bsg7djc-Ch(>t2ME1J<+%c{+M97tx2@`qEa|{ z#=%Pvwqe%*mYcHc0==+RzUMPP*52$d zW|e`w25+-YQre~br&4PK*Z3rldalWOVjhEtcjwnYu)z133+JiYqoxcEX~js&LmNZN#za5-T9_$H7}0SRk61zwD|b{TZP!)Bj?H!4obQOad?iKMqdtgYm1A!;CQ zaG-l!=v+n@Dj^vjFZ0NWnV5aT+&_|!*Sy3(V7Z-}W{CFIZf(w#Q-BAe1G?_(e~rDO zs1(w6gzwmA&@i*MEI6-GppYs!rwFZc3xY&j@ZHH-49BTic9^3M^gyyVHYadzi!>On zmnq&hKRT0e=%(%fV-m&`4=agzz7Lea>laP&4s@wXlNjK}wl-PK`FKy{6 zIXnBvHS-TZY!s|u8}K8~?}TGQchos0MCYCeeWT)>2~F{gAeOMRKBqTV3kP>n-;14P zSi^i;g;u*nXOJ~ko&LpAo39{w^6?-#`zn>zZs6ees6;EA^Q{h;7kz58N(FNzY4$F9 zoICbW-7-Bb2299+Xi9kIWT1|_<{b8F?y7T4Da{S_E)9&=Pl8iIb6CrL%b|rRs!pQ% zwq#>1-+vgTwvE%5UCc9I1JS=0!+3Sk8=Lc*pURBBQH%j$kVxldq>p)FDwWjM8jpnx z_FZJ!UU9xj92T~{fi@k>pgv-KpIx$yRsH8oQA=qhCVNnGUjv8tBRb#LT-`=pW3D_S z?uOXUvfAWYZYXpQjr-i@*|2kpYP~pBj2#ce-p**)*@+z4d_=zM--i5X->@`Z3x=HC zr59BuKay8D-ti<|hcx1nfJ0cX<`&KNHLRLMV(V__)8sY?uV95zlb zx*%8F*Q<%qn8qH7R`V^?P`b21ra3I`pq@lemDft!t~xBHs{5q(&^r{ZZLT$?dQP5Y z7A>40hE0-aQaCJ%m_Ua4{q)1tGoR}v>-UBXN$Gp}72xigjn@T}CIM7WSqnx6piebO z3XTctWq)V_;My*x0SK7IDpf<$^n zM&uw8GOwbu!#*&e^&rwoM)Ms{$wabNS38qNCpDm=G)p?ZZPEGukoNFZDpDbkPnA#xb)(Jy7#tJ61r(!9 zqz=`f1B9Bo@E@tkQTqesDlGftEy zENVD8owJthz7P4qBDl)amc1txtB&z~&7s8wZW=lHT{o`nn->IicgJd6wa^i5a1n!$ zO4Ym&B_Mo36B}q90MuHQf$HU1#THt}s>o?2_3nHdJ_Si)tA`>mjXamm^lcCKpXo4A z{@mPHQar6L_usz5lB57is+@Ep4`T_7C0MHNVp*)YjzYZ}ERso89rLZT<@B+& zWNir*R_I5+n(?~G&_{$0-#(Xh?`*Q*7u-7$k|Ov(r0bu=@st>h1HoWEw~@>$XRMb4 zW&;YO#J|)CyNPkzL@HRjD^5`OEf-~6^@v8WVq@^V?F)T~!fNr-8x#AT2C39SSifzP zQR$mhckCoR1^>P11v^Qj#8>XFN$v!8vwT%wE7dmW&InTKlGA%a$+(7yhIyRm{;?E7lnBk}mA%l`KaLwjsr_bs6^sYh4r?ip|*sk}>n; z*-mbYu`C*^xSSV{ynYRezp43bpD%s;t}2#Fy9*e8Jw959NIU&(1Xl~$%FhP?bnik_~QmQG_R&mHqkA-u zLdIg^Y%rN5&Ek!EbtH~1awF5PbP9uLmXxgCo3y=+@qNFOgh$k=HEoD~F%^2vAhQ3F z7ubXBS~iQ&mppYkKLW>qbSco~aBocf{^gfzHwuuZMPAk)MLbca|6=#WB4^~CD zXBKEz>k_sfvO5!zM3chK)=8Z|k&%|H4xuOj#}1O(DSu`Ubiq*7cAVj3?N7wgp!is`6x?|kP=26oCH z4;ZLa0;qJ2C_EY>PaVYoI~H@*c6$RCyA>zUr@9>%yJfJmBTP>?0Ns}Vo06Enbh9zv zOjOMPqfm!4R~cpD%7R2m@@uR2@;B+z#Y?W~(>m3usV-SM{#X93QvlP9yu-<9iH7o{ zV}FV;q$s9GWvmB#rO!h3Ms+WPt%VLl`~hGVMs=%mIa^_N$AZs=0;Kzo-t5O{DeZ{u zo(yi&N}DRrinxLo4S7(Ku_E0adK8XK%R^o;r&_pZ2G8I@G)vl9AygQ9#!|4D-N>W;&onNM>A!}y>-ZDtCCJcv&v2= z35&{o+n*4A5HRQ~)64d5uW|yrQo5r*+60PuZoMs>)UECdS$Z>jku0hi(NOEfH1Rgz zW+Hv*RQoL!z%(aDR(NrWVc2J@01L}0_HnVw&};>YCac= zSAY1_#Y?3a@_4(2Ky!WV;iMw^a4>TiHy6EIk+=&B#EDu|Pw+W}kTSr}9HegtMwEO8Bw*p=?f;?Ko{1 zp%hgR6|C*ixvoS#xlG4kra7#Db>;6TB+eh?y6@}TLfTMdI$!h6FPn+eA ztYYrs5y&C-W5>-$#JmhQ!$OYrIJ?u&cR)XRkz8*)-SD``6FPG{`J=M?bTV1AI}E+~ z75yqjqG0?2qXA$o&oPQ3&oh_nhl|dI3GU2&ndkz!?p;L9`{F7QO$s8o$FP5?WT3)X zrEmb8rQJ9Vh#VJ^Lrn@!j0?SoHpn0?#4~KR64IKW!9L^|^N#CWT+7yLR281mU6(^<_U z4@;?CKCU4rk#Kd@7mSuF$jMpbD~aWJFf&k+&1r4>?49PeW&4fBCjEe};h(iq=!FxbWf8q_3)H-YWCf(IlEO`}x3{`fZ}#j?G6o zR~%>iw-Wa8TKXx|Rg=ACkfnq1;+5emj)X$p;q!0;SJg7rQ&ngm@Br%HCA{Oq)fhL} zUD7J(F<9l*%>UYhuf!HMwY(ZL+@XreBf+
    OY=?g!x8u^OT9-r8Hl+V9sgzi@ne z#^1qI4Y{%W`Vy$=ha)qJ)^W6M7A15p{gj{bj%Yzi|5<}A$@tN*59x}G(v8()MajbT z8Npc*dGj4Z*`9fa*;JEhjdmnIx?a8|?a=wASq?tnGMF|HXv4 zW84DjSf)+NcD_A}eEx{M@vIMuV5b8T5+gBu$ZYe$U3O3Bt^+%i57tSC9WOF`xBI;w z(8UWrC~%}@X)J*pqxB$z+`XB>+>L4j*B|+!r_h*bX@B(Akg){JozTJHqt^Jr@sX~I zi^gdBVDZ}O_JvwAJ(6OyZzb#06!)to&4yPp(T?gX6a*#MND}(oTCb|jl38x1NI}9N z-E7|JhvmS^c?}Ax?8fhCI7(VI{+Km>ug2BRT6~TBYqXlFu$c(2Xb8PI)Yz@UboME+ zwQAW_OELd_+dSY{JL&Z`;Ka1TpkGhg%@(c40N3#*!yebJMuQ|*I05=~QGj*!GDa<0 zy|h>=ecgBb9I23RVPXXro9{lBxRc=a)gqP^tiH0qYYOn#v>)A0^$*Mt@8O0r!3VPX z8rk5&^;ysAq~|>$99X!q$oymxky{~{Y(yD^!3Ey2k#86<-dh(uh4_#f>No<`Z7j=R z)1}%DahJ*^WtZEPFdK17axT8-iNlcl9p|ma^0y60SZug^Bl^O`LNDVe?)$EPan_7L zSGW7ImwxxQgn1%^t&^wWoXz-hcX#fXFib~)^6lyi)&vINoYPu>Q z}U;(e2Z8#dn3oPyfwxmUJ%f#kOBVUK?YS5sL3FnX&GovZzf|x` zGC#nZe~;{S0M%8`Bz`;P!mPyf+U5c}xQD%ctE8T^tDl1f2;fO?&ER6EzNldd9A==r z4^A;<6pPL#=Vqat=YnMm-WN!1xW|U2IP<+ir3$ZD`AZ+}pkZ(%grTHDcSi}2;t~qF z$O3_N!?jYik=&}1)Z?Pr6DujVisSs+DaKSqLAKHi&@x5O7) zr5LkRmXNj*T|7w1%!=h1FuRvf<0iXoWNEo*XYDiC7vPBee1^p0?PcGi#9b2lEteK` zI>YnNBtl?qY#|aU>4g%I$dQXlUFq&84`Fk6+lEcV#ZbTn}(ZSCG&zbToS8NZP?V6rc zDvWu(GVBgCJbc!IFqhAXBJHzcbC2Hk(zYTQVKKu1(cmR6~7feaFyYM_vWQ{l3gfb4a2e?M|WK#3v-2ecIn8<~`fv1S0}GD67{ zYgY(|JuqHm(F=o(>rM0n&i9+<-4jmXC!^0Ws$ecU5=zC>(apet8GHQ=B^1h3cfAdA zbis0(xJsmMM};s8%LN96R0~P4n6empO3B$!2P+XEgIIcpqg~UH;*cKk2RLBSWTDGH zSGfEfp~wpC<0mHmo0>Mcd6c5H`#W8e%u zHc^z^xt4;w!ildrnqG9ax-G3H0mWJVkX&~(OlUdS^HH+jJ4B~ts>+|;QZNFH&YrhA zRsEslZ0=!i?QLwmpC3_6OGIz%<2m~SJIYLorXOIt)Vjw6%xZ;~#(Z&F5Vn?AcAo~9 zS+x(P&R3PX8jv z&v*C=QGy%c(=rt>l{K%az(dg{QSBu|pAYz3)$58_!-Qg{p2!f%^nWH03|JNg1#6;G zmOv>En+=Q!Q3EclHStIn07gm!4&Y*w4;S?vUxo*2?csr1XA@)0F#qez)63lsir=;1 z(stN{wmL*znSj6o*}@t!GGLPTTr=1>k|c^~>`D40Mq@>8dUXig*-wnNz2yzOEjJiM ztq{1wKl#=smrR#TSgopduh?7aeGBHq{TbVS;bz|zc4TtQnA;j=2f`Gi(XuOS718`) zJqfZYTx_diVaM>=-1+^hvhvzcAl&mTzwTl~KU_GbmsDtlJ-m~@2_E49R?M$7J4@qX z69WB@A-EBh1JiNIomp6fLU$$@WzNxLJ$C!gXG&+kY8>3j2ZBR91k+DsD1a`pWHoOs^)<{?uak8tnzD5CIOJ# zMJ*b;UP&%$qk189=xj zlkS(qq1maT(A}Z+9})00KpLSJ@Pi4H@PGT&7Xj%1&~5w@bNr9$HiZ77Z7K8nDFW%* zqhS6+tio94^FN?|`9oL`^dF07-uQdqm;a#~06w?S@z>@C0dgDl^UFVb1o)4Pz+coT zs(7uD%J58wKXfQk)=Mvc4gT*}$j*PynBVV_5&7TvcoEA@t3KsrvFKq``Bh(H?yH;^ zU!H${^7rtsr=^~U-5^0!4xlh_N%dG zhcUCxhimKae|-z^uH}JPwVMMb|9+#^wqF7zJqzjZ8Q>DXzarqvl>O><^J=l);;$Yl z;(^G3;P>$B4b89r{@MQNKY#TkAQvOGKPdE9&$dp6q*VX$sVA>7)rdt>@kxJ+q)Lf} z9skn0d=6I;CLX2VH_Zv&dGklZU-4^vICFhtp7d+FjTs(IegEAjuX1cEy7tb^jSk`B zk3xrszeX&tcdha-?X~(me>j1;vLEho)r=+TdVM^OwM{PZZ(ga)$N30Cc|DKiamIRk z!0I?j4S%?R{xQ!9z<5})Y#3oik>00yUm`8>^xR>f5^Su?y)7K zecYuM^5`FJe)@g51}b>|2atQ?FAYpb>o_7|M_$#LQ<>fKeag$hY@u^G z(9Jfl+fu$DzNpoqV(d=!*=60Sb-()+!&(-hTPd2_pA#yt7#J!CB*ATL1DRA$4aaHwJiMC2~{^tkJapA`Bd_W^4d|Ok0CXPv3W&(SsLfY{V}a6|IZEGG84 zN#2?8sw-EEf9PkobP03=qZwNW0gB;t0oet!=SsXMd&dPHZYqTEdUP1+!akFS*&Y|! zL5{O-r&Q#Rr-0(@S_xKPfHF!N_M@*Q+Ul?5w|?F*2V`|ex?A33$H?QV-Q8{nDA~|k ze@*WoNm+586@rB8l#DKLCmw^id|N2<dCOr#-&w*B6`lBpbCv5wPLkD$7I^P}jANWSiqR72OWHMapsq3KAB~tc8zIvx7+!UQzPmVKSB`<4R ztE^53oSAv&*J1LfnpcaWClDHINb4;7c_SsCCB!3cF5+|V^|bGk*A6=TX1l~wJ*3yy zKQ5#S;m`a87=Aq-hbHQdM&UcoK;yXyELvx;R(MGxw4I27>sCV1St@iQ49%C3X+3!8 z&a)Yw0#8z+{?XL5iu3iR)}_zpS#v6UZhvPmciv}xnt!fFWLbS2gWm5Ec}tTZKGC5V zPAhAFAlKh2kKw0tVm`6Ok1e;hCQ?X#q^5QJynYqbe&P|8t8>-3dz+F?jZw66E5+d1 zq3tpKdVTZ;9}qmYb4hEnr5C6@r#3&zMO7H}JxRVXK{<|GbA4E|KAL9!;h-BmN4A2I zGbip_!LHpKhek2pmG7Wy&5iZCX|q#q&60BMIz-k>zgWYRVY8{O`zlUS9T8V}S?zud z4Xkv|`bJL|vXMex;H-Bk%nCxD*%+pjM-fkwI^iuoR2+U79UDR-$lk5J3GXrf1NeGH zXamI($J{}aJy|010dZ4APPv^<^E1Ia46fGVzPcE%PoZV>DPRoJGy6G9ZbHN9Jdj%s zzNyveZO-1&m04mj?v%z+>bngA5~*00~0jAdZ%hIwYI~nX^qTFmR_v*+U1c!#qrpC+kn@xD7D5IAQBTguUV%8cou~(q>FF);r#~ z&E8*0)je`c869wdb-}+&W~VAzxRcvs?~=yt6@2}I9e@@tZc8S<_X;EHX0J+zDaKwZ znBLYq_EAk0Q~y}+x;1dfPRMfM;W1h3l$bu@en{iOUvApMhRPAa+>Q;or4xB#`7&pH zlZ>n{_ygvIvY{T7qGHbe@tU`zU3?Gi%U&gp*qkU&Jh18z(AmJGGb1oEHe?B~wsn}} z_aof-97W)#=c$+_9zp}=SDpLU{N*L5Z!Mn`OwxUs%aGH>1laQ|OePq5q!JVsc0rAd z$g8FK@HLF46u$H`2kc`nrKNhdq*yvmU_ma0@9K-iJ_RfZ*31o4xwqBS$`8eO)9_`S zys@Fptd#O&@oeq)X(s(h1}V6ndZ~t-_R!U9aaEDMn@aOh??2!by51%Ga8$+g zLLX#(H>qchnN46wkDlu>gs`bjA2;A`8!>7!?~;m(!=s&8H37Jz{K5{x}#__Sz& z9nKGOfW)RRBnIfJ()juIi1X`Zf=agE;JF`zdw%Z;jwyzj(Z>baLwmnRSB>V@p}n7$ zCl)m(UJz?ZHZF1N9zUdP5bxPuEv**aJWog(>+m_|)O*>7chl6qGaVtfqB56E7?;ng zwJbeC$yi4b)Q@PLbn8mj{8}OF%Wrm^KrJu8vtjI&Dl0wCXk3uGzP`D_G;K-XM5dHf z1rZBxP9XJ>uh(pT5FzGk$I>v_GD+N+S2T%4W75g1XxyaYL2KEexJKpL=HSUfJ6Ju; z_}bln@n;j5KUt%FFZ02P$kzd&>yMyd{u0=1;8G|udEyDN=mbR!)P>K{coV{;7UyV}D~ zuvUb!6BLE|qvSgyOr(+6e2i~D&SmwAjee6;!sJaIcXrR;B6DB9O`sAC(;EbP62+AO zaS;Fp1`;9igX9u)@(-0BK{JzG5>xynIs)lGizBaFj@OHfP&nVH$jV2)8%h}O@YKdW zf*`QdUa&|0^hV6IRjGK+oed*A{><-?cWrNGHscmK=vT!H|E{lOb+vp?-rM_G?~n?= zp{*zp@(R-c&V2zILqeKy*2q&f$y|qTIR(3=p7&O+%Aa6S6`PS>&fwVX7ky+3j!Wh@ ziQaT7X=UAR-6%%M<3daYAzfLMq&8vf_8G7r?gX6-xWbiN4g`LkfP*m5$WgRfVVG<; z2~kZmi4kLSl}vTTlTHt_{KXd@?Xg~&_UOYfO(O%XluQ*~3cF4in5?O1*OQ)Q>Sfw_yRQEme(RRl6(zgbU{lH=``#Q6nUlp%c628j&W(M81$`p^B zw=7`0q`kMlrvRcV?jKr-S7eSN)_LlO#GS_xQfPyi7-DQD7Y&{1ew#(rdK^y34^&^D z(*&C}HGj+SOSe`+8a4rg zka@@EoUvF(AWOR@$P_Xn3YX>f+TjC-`>R^hAIVI5A$inpcz~(8lZg@(06cyU#%1@j zy6h`i4p+e^6T$E^z!P{?b5z^jYryB&w^hmBT4m+9IAdo_bGv#quO;UW!tSB)>Y`}h zK5kT5f|OT)O+uZ;zH32w>jR*BXqm}Bi!kgILP;qp2PHI2nj7gS2dY30;ucq+@>nQ5 z99GE5b$%xPvD_vBs_aW$By~eJzuDaOR!fGKpUv(Id9`6!DPF0=Kx>o4QyU67#Qb{a z^z;voo}IBQe_mnHc+mZllRxw1Pt(F=rJbB@0be+xegjv$#UT8Z4OA{MDq zr@H`sAX{xOaU+1j0+!y{eXo{Jl&1j}dye}<%uH)opiB$7FVBT|y#-r@r6ekMX0!d( zNpXLk^hoAfoE6pRo1z0n%wBoGpVYH>OW=o}v`#omknAoL+Ms(?vhO z`<$VI_LgD(y;aMz?$h()4)$b}*x=F{wMr1nU2xY@#|RViG1VeHzn95uJXUB^^K{BV zVY$WmJ6duZszaN_h+0!!`?zHK8>sBzRHUDgaVgDemJHgEC-uX$X2)A994)Wpi}=|u zbOYi{Fx#AWe!E9GxgJQf)9e4{S^bcoc!@}yI=7V4j2JZMR{mmwUsT+?kjEP+lyP{t zcQ#np-M1qmt@Ik7bC=`!!iHBHQtpEys!c^Z__~*>Y#=WBTn#RO#%_gSa^%Cgoh~~d z)9nb{%#mTUyGD)$!RPU(V_8kMfo4|S(Ju;&4byDWQA0RH0-MTGDRYT4lZTs~vsZJf zZf%|G2WL)KeZ624nEs?Aibbi3pId6CCMT-stZIqZ$#6^X@kBu)91NfFYBEo^)lKN) zcf^gxhMiS$zkCX=+jC3%yg>PuCEnl!=xt$XY!!tN8#RJPmV6N7NHe6-`H5i?k>qu2 z=1!4@|GL^(1TF%Bmd?(kKG(0kKU`8#S(_;QAIygH)bf~|U!@c<>+)CEH4v$qz!50!%nrmqv_$aP(sAY{x1lIbi!3YWhFP;0qVoCGGKrk`%3#Wh+i z!Iu~FTAm+%+Nz09v+ax2K%gs~Z z@NxEdT^W~}KxL_iVSmdz>5x1bKb9$@b+=&?&B%o$!EKb!z4X#{*1DxY_U93Gx`hcx zBc3NGr^h72?IWTE7p<02T$2}3qHHAh*i;s_L6sYY%AwSN+Is^?gLx$q&`L!)gxTFf zZY0C6y5P11n$Y)3X#m?bMlyWfzBJzsueGDmrHLIfLDKx&1J?z6;31NNcjNY+lj(C< zgkX7ep(36qAKGm*RGj639QY$?I6gxFkY^Do|3qL+_4)45ASUz44sP?Xb36FWU|u&& z|8TLNq6x!ou=stlx{ed{B*Q0^-0iG|{-vm+@c|wMp#^c=3I!$1)=`)0cj%I?w){`A9!P#9LmP$+Bf=u)+5Bgsl4h+|NaYsrIeT)X?&clug9q zlz2K1NB7$(A2N)Q*XihWFk7DONiGHTKJbQi&a>h5&@qGDOp>kQG%hVo)vyAFVD8q;pj=`HBX)eXp(wZ%ok8u;cJ9#oQo*X8&*R zk{YGqB#4XXb0*QA>o?RNi_&y-EyyyTm!?_YSK(Y=PAI;a?68>i{>u-Pq6hpyy{-}N zCx21*SFfJ&rW$Zb&TXHjPG5NcI+= z^at)R2IDYdGH@WQs@l#6#Uf4N3vr@xJpk~h+ZSv)}CE-)MkhMZlOZL;>H zsl0%Oc9In}U>N-DpNxg`6HNnny9Xd)ddeuXXOfBe1x?a~VUlX!uu5Jq3b32n83lx` zL_J@1VQaVZ3!u3IY8H5@mBX)VDUG{PI=mdyorg4*#YH|Ex;OiFCRH&h!(XVacJ~eO zLGuG58TY4_{nE0m(?F_CI1`2=huap(9Q)U{WXX)5?tjJ7IOF6}hi8J(gMukw{s0Z% z_UFNY-E_=Al9b5yWhyQ`l?%4e=BeY3Qvzd*k|B3D{ed>N1pZt$C={Wk&(hN$uQeg2Jl;@_R0JS|86=a*V;{GM0+9tRD4dv$zwe*Fh+eb(Y}v-^S- z%zKN#rGfvA{{OE$#rz^W6k{FSf00Fv>mH zknDF?@w}-6y2^ftx4+%Czcs(DMW2A!6(|Gnju?`!e10KklDQ+o%LmC>9sEC2N?y5f5 zQxPwd^!NSqxU(U88`=~KfU{A+I>eUx`7+y=Zc9fa)4wyHaM}-fGwUA$9c^^NOS!{M zWca`5fv%ZSdKp>&KZqjwbFk6xUQp2CRc)+jOu{x>0hn_+6bbnSAU_}D81X^giv1ml z>AkKwCs=(Noppq(y?$9_sZD*k03`S6=#NjY&WryE*(^%BzhV)9*7A8}oSGRhW%V*^ z1+bshI|cP;(qV^JPWJyElsUuSC4@Kv^qPg%74Kz7G|L9B_MUM2FQE%~p>I|H{nhad zf3^_f18y)8KP1v8*?V0I9?1)uM6piI^pEsI z2P#UAV*R~R8=^9Kq3x^yV18Fj@Q?wDK%pGqkn;@!&!9Iu{>x~fjYXOvRAKBys1PzR z>(`zE401HSy1gn&kPY5~!QV%oHzxoLvqu7FmbpXx^3~?rJ80-&QM6~wew_a}N1zlt zaI$&MF$n{&i(Uw?XHG@D@iO_-e@qS}tmTQuSZTSw2QQK~ofdeB?6W9%QT2HksI@eq zG%)FRW)gk#O$W%edez~4aunG9@aLFdfj8P!A9&jBw(@k{NCX6`pSM>Z(sT8|3

    x z?^niqBf>N8FFU7AXFvoJR{?sTkNkei_#7|!Fa;~I#cZ*B8!z}=W8isT9FlX?y#}5k z1;Pl{KYS9-exUlE z0=3|IfE;FB?t(3^{d{5;UWNv&o6VD;V0lH@yU0J*OdM04L) zVqzj*AN}ED3bcbok>sz(`HioC2AlmCP5KkS$?OU~`zqf;u9KP{uNUjG{f12l1CZ@X znS*nVfXBI&M(=@#M#>!S_5q6^c=v zvv^CJ-Fp4C1Zr1M+z0U{n1 z6G`@?AUM_&=uJA_0E>=wjOb76u)wk+ah^vkI&N>>*YY|xFbwdf=<6(-(4)C`?7Dn! z39{e49B#j^KJaRq@9LYvW5w!SMQ%F`xaX?fGmxMPyn5z+{e1`g&K)SQH8yA0Kb(Wa zTGW>0h@n5vW`doZJL}AC6af{3@%#GPtg#Q>ye@y??_&JES1A z+lujNhSBdFU7;n@(~@)Pc7W0E;+s3;xm^@R_jm8vW+IZq#93co%M-pC50Z$RErX{m za5)Zp?~QjM*XFmCCwB~PLsdRUA49Hl*MW{$;w^eNRr*YoiTVuUYoPp@pEAWmRwM%2j3dO<4A+ z400z&I#NJY2*ed2fvm~;o_qO(SJY`eCaCBJ_jqorURW;pO9!|x0uO7btVca)(JVKf zGx4V37=(ps5t2xt3tmt++9lr9G?S>YUE7%i6;p{$@OKK54P&GUXok1Op|B2~&Zt~Qx*P#yC|?Pazj&Y=y(qJW;S7uz ztGBk=-~ctnUv&36Vt>8@Jz}t!Mf^vu*>bq^)#!kz6NZQuBN~~S+p+Dr{wW5rK>vC} z`bH>)c`l$;3)Yy4+GV^ql+9WEwdN$7xik1lo+nU$>1h%4xG3rs(DdAPf7}{!t?c_a z>z8ThmTSYs2()eoI_iuQ(ELO@Gk88AdRimOdoVAXqw(Vc7zgbC`{UAITOD>oe^6!Mx#|eUHy$G{@WkQ^j!543`}Az3Vz? z24w_IBQ2PDx}5f4=2`?2=Y#K#yKhKZHHmRBvpkD?5QF1#lk@@(_0XHp%GE}cID0=#lN@)30Q)&A2%?u`uS(kX!xbh}R-G3frDAChE1 z{&%3k?J!x^gVBC2{}2C3gFoEqxI3V;i-q$lhC66Tbla!>R*)seit|n~&4PJ8-yV)& z;j2sWTQ4sGo_b*16W_HyVMYLw7@6~bac~+=4(qkh1V2tNKE7!Pp#&E}X84f^aT>mG13N7T3sp5mv2QMs?<&LqxNDWkE z0egFtL!i4SzuQXp_6yKsv2ZPi788q@*Qpz@aAGi|y`D=R zX#54b8jg-^;ffE0*{-(S{p!?+f)}Wb8d+)(gIl1Vi?_tB=d8 zwv!p10_x&f7a2Rm4a&_OrRh*6(aaTbqq zQt}oRalryS-@V5C?W!DqJ(Vn!!1a99HSq-->MJY2pr6ED{+KorL{89o0(GiHuJSx3QwB~ z;MBhE5Y*OkC!56vIpOULZfD&VG(=0F6gy(U5m%K0(bv{X%c%WU7m)#_VMj#=pgtVo z5IoJiG@hJJ;dsJ19NnVUM|E}bnF^g^{Kxu&D49y)ekY#71_7Hy_;wfBAlr4%kw z_k1BBAPo7Y@X@NMxrE_zjgk58c7ehKi;H&mS)=n!XCu_bLcJ)VcYDwR%g=+LyG_=+ zy$PD~E`!y_UWJmcU_VRD zHx0eY5QwV&EC9Ox&O~E%zOU;X72KaOhYGu*T4degB4qw3(G0Zve%=H~MrUw47)vIp zt8Vog78Xm0mcez;yTN`{Uvcu)IaSstkvY>Az8YFA#BuIZZ33KrAwyvkt_Z;>0l=_R!7-vPP0ATyqK*w9mmj zuW5ZT+8u2s&5Ke)bGvexOTDKcc&9i)^=_T<%{`Zmv~9!w*htrFmh4_s1b|?PiaY*> zUx)+orcI!ro*zb^+uV+91$O!bS4!}=?lbrb@zIo6g`;F-(Of6sy^EgJ#LvN0i)t;{ z#^k$+Xml;lp2R+iee%2zro(EqxmRm}RpZ)=7^N|o`0=}}J1LtpLrq;HbpUPaIbG0e zhDgQ@-v~;t)=sJ~Ei%fLRM7LVIuW7lcSwImN@g16#sp;Q)w^{7>(Oa)SknNSWH+vO z4w&`>&3)+jH#Z7nq1SB1f;9{JCgme#6oIrg*uY1`02jo z*;$J|s!W$SL2Ngk?8ifk<>RIJf-sHs4L+c6S6zSsa%SRi%?5x*IJ&L z=9}#f=f|lUvsVxhLTbPLi35L@70Ja&|MnNd?xZ*fPGHmdVe%wmj*9xUZp*6ZZMEV+ zL4f93;w?yYu(U`=vh!G#?1NgYcl#wu^j~^o zuZ6Jndr#B_5}bI$;H*OOh?CG@^qaijOX1}g+dRxRDzXL!*{L+WDQ0LR2FS$<*_93I zn|e^Wrk-+XKew$+n#(btbai=t2pj`_P$oWzqKfwo!Yfc=OrtX>MQ3)P3^&i!Tg7ih z?3POLilxp;dH^+s7e0eNOh;!X`<70zKte#|&>F)+lLV%X0gM7h<62xl`iubg4wEhF z)t!PXqNhjD{h#Nj)yGzhr;}X?TxX%FHjJBL`l`n=g(qb}J)YkqeNnPHY$eJBno(*` z3;ZGPtsZ`87z`c=^W6*!mbz@?WH*|wIF#l**xP%t$`+MrUC7u88V+38eWH*Jen=Nw zEE`y?xw=052&yT_MOX{{b1zFqya@pZ7~BHU9^-c#F$y#Tuh3vj>w zfS!Hmoc8clC7Z1X>nL)cVs-giQ$$4Pdy-@C}?Xr z^cD7Y$rpz(Pc~$%RCWyCu`Yoe2QeQ__4z`KDbcAhhBxd;^jJR7gY|@Y&ae;={$~MD zU(iZ{qFC2+081&{pZc9~3*HVyC+@|^h7-j2?IAr~Cgu8Ft^NU6V3qU2ufve%7;%)Y zj|Jp5TBX|_*e?3ac9dtKR={I@6UzuH*-%(HE%l|fa-9mmds@>lP>=F0?Qq%Iu-E#A zyhGcdt}fF6d{dm}1FzQ7=2 zrh%tln!ZW)yWLapE6u1*G|DaaZMg)#1612A#J_U5-AXQ_W3PW;$uIE>>Y+Wy3gmI= z-QpS8_{zD$1S@Qru%JDhdEorOm-v%yRQM`N4u z6XS2hMvz_7XV?fH{M9HwHvOi(g-i6L8zV`(7N~`S3{swc9L9@D(mKtH&(G;@4 zM6Vm@P@RO0&_!=NJ30o!b;gt%R#3CWVbsSDS~4D%4LIl?$`9n%>><4RW>vr% z#4`C&8Qx@swadKZZk+04$yBR2sSmPdhfKkkX?dbdblz>j#dJj_Y%4^dfTG^#z0q-6 zF^d9eTGm=|fD}1z9E8wBY*jS4h=ETK5KP>ikiu}^<$6*2yx!$5(1`6!DErgH;4EcDAqN+f)=K*hyCD8OO>|1e&I zwSa9GB%opeX@G|Uli<1Gdr;~`fR5fh_;XZ5ADV|U^g@D9}X@!nw-+$zr`!WE!9Elj0AM&KCamNalgH1vhcBfp0S%o$2;)YUK~=O2fRd zRO?c^LwuJa3gk>XqaR;jj+csL#~IUxV1O}8P+r(+N)M$U==JF&%BRb&ulm-Df^~_A2X(|SpUs`3Co2regYC+4pRJSEB|o}68@x` z`qN<1s!iVKE=N7bh_HqhOkJy3I-ENJ@Bn~+2^PeC1X!`$q6iiYo+b4ZZATeKL$v>_zzQHhhgC}|ES!P|#UL+Cuj z97Mb`G);I{mUikt%9AdO$CO1R^9yF<_3_#33sB1C#ddf1p!JTaV^8v<-(OtFy|W#x zLF}I4c&He6oS>%kp8tB%Q+V;%%4~t_mfkTpwUlUvyf&)>%K+9RlsNG-kn?S~$7^dw znYq5lM7<*(SNk9H2I=Fr9d1t7s4+-3r?F6^aP8RLpJj043YDJsG&%8ArHNWXsC$ri zHk_Ot65mYGx-gSY*)CXy9{Pt;$Gxw7Ur$_V4X>O25Yqu6H_R?i`PL3<0IB+s=RioB zm!n)n20p+!y)z|H&PJ^}f_~BfF+GsT<%e2q2RUgOX^Vgw$)y&+fL0Zx4-V#Op~kQU zn@HWL{I(r|S+T*+&G{unbc4>e!18kzQ!`NdEA?7k>_Sk9R;rDBQUrn104`y^^R;G1 z<_D%(G6`X5=fJu5z>0U7v5ORWpy#47vj~g8=5`9fo5--E8->aXB6-e2Ii!{o%fYJDpsy|vkq$j;wyTDVe?Gssq_y2P7kmFn`ii>G%G!b{7o zN?jR5cU^bF=%O*R`v_PIf9Xzg7oj`*4lODUHnyqjRy{zS(5eGQi-Fvl_7y4_Pw&dw z^8j5Z;zlF2=Co!dvGC^%)PX5!+}m-KX|3rSiJP>nA$qyFC3P~szRNJpj@39r>24?O50-BW1Y2cY5GsWo zd_0pS%WS!`syjfN344M#dhtf5Rnen3L9>2Mk)^~ln6$zENfZ28;Y2XY^}Q{rD;k}ai=W- z9Ne%cB(1>|?&Muf+tnm*(!5me*e%3-4s&iSm7kNl79g}nw#j7oK5Do-Ep-ShjmB(! zxVn279w$Dl8GF9);!pF9!*X2kR(-;$D5L%k+AOi=>8WVs9lRdAz5Hz%=>;vlo$)6B z2<4I7r-wu$yGgiKWQ&zuB-Wkx-h#g0x|Q0Xw&d^uo=x#qJ@n7;xQ%q~II9AZY=|EG zh9Q|T3L>|CpWO4;CTfw15eo7jWar;#Vsx)th%aNS(&eeQRd5;fAq;gdTBsJts=dR- zRU~jmaIq;w81gAXL0X+zEy$N8NDo7shmBR8Oe^V#dfZj|E>%jF#wBbZEbbe}Q>`pr z_np!RW^1=|)@llJe1EUAn)Fv+%e1MgfhCtwVO+3^l_*^p&xiO$Nce6hg4QL^E}pgL z_>dnCJZ(rm&@iqHoFt6FY~FKPzXfi1!a3+AA2p*C6H-uw`JbLw#4UFN16{jz+2S2` zcV&mrIR2EaK`p2L;1|nfT~`<@#CTs^7)a!KS2xtn4p%vPs+(shaIy4AmG$=aBYU~( zjSO4cFoG{**Ch3$*qZp(W7>HHDnLLzNx*aC&gbRT zCUGT1PEH~<%1ktVq83zXfDX^*wC~^@=JX>$DwzDy*5&GqA$u{x*ZmOXKoxYg5l@+J zw2N6%A>y73mHk$lHS*Q{kDdnVsB1N0HpefeRRu-+be482L^Xq=qM~a9o|8T9>H2K( z75*nnrB-p;pNA=a@%C-2zi~}y8G@v7KxTpOZf1HwgctqJ)Pfjbl&ls_C$lUNk0Xj# znRDvbthPxDGkHx?qL@>{le!(0?S^Y8NxlA^ht&SWU$XdjY0*eMl94kAZw`u>s^;XvOCtV zzQyO2`pIgq1VveS0}ZhK?n*bPwvXOrZ+sO5vs!{I2W*e=JyQ%r481V!jtq88h~xJG z{E#o{AKw$BhRE|0W9QLTqq0&s&GnkjGJakQJELSVa=gtcTP+UGfaNJV%k5`>@#?LmHXnlaoSO2iqHx z3vW!_A9>x-^rg!OlA_oski;b)B>}DvL8Ci6Ld0?CEZfO)P%~<+_Gj0$Jo9!c0*F~S zq28;DUu+G{sAGmHbFaO^A?#-lYOF`B>3T8`o8`oTy{X&c64Ilwr(}0_2Yu*sPsP+M z>JB`x*ZAn`RhayM5^9BgK0JmBO8l7qseZ&Kdci|2WGpK>gMfwWkP?vv$QsMl)%O@% zJL310y$@-L`(O}g)P$pkM=m30M5d4D+o?-iIrSjhJkMNBrm8e7`H|Tiw?zD(TJ>KQ zPow?Z;g6(YfGJl#JG%IBuw5!VKrQNp}pt3u5mQ2 z)hq%wC_Q)QE$jpD`Y?HT$a-sl&;#Dp01tV;_U26E)Xl*1Q~*qTH%M z=2Kd1VamL%Gb@rL^H8_lz!^~uMG*U0gvxe2*i;;w)$+r;YMdK}4ma`B>wKY}Oh-(; z$)bF(~f&U36V;;P@eDcIC8Q$}n2v+7;y7_he|~fhEVMy951+aadp|%lehhdA~b;%KE2~Frf{RGR=r`O>=x8N*b3h#3V>z zaLn8L@|`bq7YlOowDH3>9P{>9rZues0t}EH_C-jxZxg16h9NUdvX&T^G%L;nOwtn@ zYpbnYa2I1yMS+%xHa6WAXm+NUGmbz`p+m~h%Nc(_Q;MZxcb|M9nEg=?}V1@97n=y0(m%2yA;P9bpa}RH8dsjR1CJg!(j__z-?f- zW|y7upg;*_5l`4N%Pdi|ouD}fggmXK3liN(w{)(DQtyqbl#jF1F5QC+jvNf;OM=9c25=lACt6^L0vG;Zq4uvWxav3 zk?PYNjHY=JWA}2Tw#b1ymA(&&Nl%)OJDR_B#4!!b(btse_86-#8O8M*<%Sh+=;Su; z=t-U!sQmP-JUi-hpTJ1nyHp#L&{v-_6T7ZhM!V`MLRoB2L>=L5qle*+P-&LO4k5A= zhIy1i3C*Ku>Rc~bhu=>o(uPvk4Z{add`LqzrVNVXVQ|KY+|&u0$Vfb~$lCGO)bPkQ zaR!vX-154A;39TlS3%pDs!?JidDobplEDI}QdIP7tc@Tn?=fm!b^gltTmFG0^{Cf; zx%V;6y~H-h0oGUXR(AzdZ}E7rk0ovtRm4~siIsjAHe${>tUrnePO7m*500`c$hAXo_@!_H_G2eJ5eb{iOfyx`|a1{Szjd=an&NF zIrT$T#m{q~1Ra(qvs=uq4ET;4A2zV1nk>nvK>^7okIF zvemw_=0vf~B0EPRG2DQ+2sBuXH1e#N#vYQL-@lR>H)kb5dv94UhLSN-z;Gefu-JbbFE3AU>K@f&CJ)07ci%2cil-P(9WYPI6XN z?}w%(rBS2E<1U6$$oE3OT@w0oIc4#+FD3o^h=Ao)>KX`ju{?UA)Off!#^l>uI=T2r z2645Ki;V}^QbO^kv@JGMpx0{b$#!FqO7^}k_B|z{8u&4@wiv8zx&fPS zrbkZ~(4J-|4F){uUesi;^sfK#JD-TsFZN6uo2Ig0b??Y36n$d@C3G&wF}GkHa4lt%)BMO&_<`tcB_mEd=k{#${F zW;>(+38$Ko@!U$3yt^r11gIYpU1?Lx|6>eRi$z@2Ypl}d+SdeVy^WPQgc=#&|B%RG zs@^xL-r|i^rLn-{2D|=}a`9D?e0q>WEwCId~cxb}mQ=w<@Al$|ja}%##{5*|}F)zAD`y z^A_aXDzl(dp3smQLV}yFxz*gX&x*)aE>aa1OPxreDuGg~u2ZpEV6KVBQkRrIU^*%d zoOX$tsc?GGRHwSQY}Yfss8{+~7gsU~+~GqN`!}CkxuU6~ly?b(jL;E|bf^89DxI~i znraiENGEFY9L(T(BECTATtw$hGBL>ID{I(evNJl+vAN`5he(=W4KKkRkq7lKaMJOi zEawd?{79r|Di1Rr9+D^#@f4L5yA%%8R}(uce&1D=*IC+6evZdRr=h6e*ogdVOcP^i znj#ND+f*YahJzH4Aj5NJZUVIUbqkn9>{P_w0fb!9kgjtdmZ`iTL?2Z~OjY|8??w?j zgWTusbovKuyscWZA!{^#O8FM~8sg&?Tj+)-5ga za`yUdL`fKZ>}xgqN(q&@;rxN!IiBckl|z3x(1%o_46L^dAC1TNEMr}*?cV%If{!%W}Yc-U@ebWE|REZO`zlA9l9Xkni-2SrHcNrHKyq_P{ zZGqBkb*m_H0n)9TT{h;V`GL?11HTV#JiG^$O zD7ZRY7qqt+Mo|Q1oCG&0wmKoq=6qE=95HtTZQsOFXA)0MJj(sH4m4ra)9QJ{o!T;u z?zxb%Qz-!q3<@6kXjDFNx+lA7b@+|Ez`~lb-diJ`=qh_Evyvh+gcE2hJf53DjgGwR z{TVE(xmyWQ@KS^{z%dZ(^p;*oC7Z(yi-^XHS0-4uH-ZGJA>2Ib*+wvk&A%+rX|Fhh z@ycxaut)EMyPO_m6Y4*|H?XBQpkBR`#tFjqSF1D0-H=TewOmLQUu&UwEtLsH`raz= zQBt%lH_q+7_xEZAvi%u6ZNa;5CW&_!->v3qa_>^9UU2AT#J|ulY*?`xM@u#8Pbl$( zFvCU;S(Vt^yIkRO`FG}T13M(7Fta}fE3xb^Rrd={LZVy0X*eHnDI3EN3pHP-aS+O@ zOu$G*?@&m$-EK0HhPThhhQaA>2ye z-a=dD5h9tjtb4vMnC)>{3Isg1Z|ChWihR0ayJUfZ1i^Me?i75Le>}_O^>;`QRZM3t zo%;a{@a;Z;PrZJb0P3F!a-Dc^qh8tct_Xa(E_fFVj6aXvAZ{$1H;!x%8QBM^)How; z30dN+S)4N599AtV2=v|^p9o?nJLkbM$`zK_<2{mkclvNN;MX%KYdw?)}^OvadtU@YD;rH$Y zyCaYqkclbPhqp!N_;#i3sbklNNQiEa%~Z%h2eL9FcK@j&^(z z8G&*x8(!j<8$6C?eUM&On>JTtMD@lk&jj?I7UAIDdJiMa+FH!uN3awx@t_h0R$~22 zP$j4Jukb|Xi9a>&^@?zyh?%G>sW(PM3vxt@kJ6{Z8m5)_sP4&QAt|2zKR1;whTPl2 zbD`>{n)05O$Z7S?C4PY6@)Txi)SlZFSuPDD@X8yI+$n3Q%<1SyJ=(#Zxg0H zh{s5D6Jq}OV}ZYyg8%nlgFiw1&w@V^yaX|mjIGClKI@Z8lp-bW|Ad7k7V%@6XUm^^ zGM}0J9x+&VGT;5z2u6J$B=f!KUBHRpZEiZ@PiWy1&Y-_zN)qqzV_2)6Yvze2-hT9Z z0)AhaO1z_srX~s}=lM^3gn1mLUyE~P=LmK0@!)lBwE@Mt(%Z9SX{wT zLW~{%;fK?`*hiAbWF5jQ6scd(&A%^{=mN*cvHvkg7@Pj43q;DB{;I}b4p%|XKzKx_ z{Vt7qwch96Epgu>AsQ|1lOqligb-B@2yPi2(7y%dr1&v>_Z!iE)vUFGvP2J;;Uyu# zflyx*8^Lxh2cr{+iTM-eZlUxKqh>#atgaAx5Eb3JABMJ}R-L5~1G?Td0vwRzfdmKM zcG0yD{4wW<;@S~76^eD;Or~_C*Zhg6=)s}2U1;zZb0jTup_Fa>q%Q3INS*jeGtUc8 zBz%&ToKgA#7_lN3mynPUA3xIb6q!+{LAFp`1vUbkLG_#O-EeMh?o+xw%HjtADiXCt zB@!q{m;teil_Y~nJ_Zktp$J8f(ZZU_-ism_1f>^K%Ekcr0)R%+T%4|T^C-stVd1dR zJUP%5RRd;eur{~Y-7y^UtNbKkCUP>( z%P=l6Kkf9+P(tT1R<_~HB!bg4C-Bi$#}XP7MN_+?Dva(1h?BA#HDGe}(EyebqVflG zGQS9b;`!b66bqg=GlqmmqE>y;So=`d(PFjDjU&dhmv157ZD#F9=Ke!$K#CR*AnV3( zni)P?x&k2=@qas-QmWiEbKjfG{+m-;Uo1P(#&)rNK;sf-r3JSd{BS^{je%EU$mhMoyXvtDG`aKw{qY(Vd~Vy~yP8rN zL|<&Mt;=8m5@2eNa6nI;6Fbk-engS=Kn{W)vcKEK6e0-zYMb|@M#PrCX*TZ;utCWuJ#v`tMJ*TdrL-P;)9W9Kq9I#|pp!Wg%x(OTSP%7op15KXUed!}?cokF$3T z1`l^#>A`LA=Ns9eBWu7}Bd?zUBBi;nz*>||`14~f)R0wZrL&O8{l;Mx2ya>aw;UQ) z^Lu}I;pFu&x@$kfy$fWk>(b;V_Sb)B4P+kr%ii8Zqls8{ZFYEmh_UdaF6O=$bxDSL zvp^&>+mVGrkZ4j^x?KxF8E6Z-`L5^n^#igV4#b%8i%S5kRs=3}Nkai1Xc_uPE|sNs zk;op%GftR<2Ew;|&p)LWo^H-YSEE**ja>z*>u=d1Enn%y%r4)XV;G~t{hd<)n0!Zg z2>+z<-Ns))Ls2fX!Gu$vMmmkkNGH6)2>h5tL7v?sR0=H4J1_k<`1NO^4*KW}Z=hn6 z0`F0M1Vc-IVfq%}+iy!#WflNQRCakNKyK8P2Ru+oqXxeOS}$bvaW6J_3jR8zQd5tx z#Z#}v9C{oU;}F4jQ(g&tpGmb#6;T-+CP{S#(y@>Dx^1!F7beLmq>< z#y8*|k>mb%{=>#v8+0;+e`R5_eY&+=41<$UQl-zb_t*ZX>e&wJxXbGhl);DD78qX< z*kFn>WEiY8Utm(_FekCkt2f`;x`W3&X~j-DAzGcp{m+_5edNV~Ud-BnkpOHOw0F5~qayde#Kx2l zuu`%pKQC+ert-{|4Dn9{lxO3AmW0eC(|C7;;xo(Zq z)*#SK&Igci=e;*BMNsE}99II#RuQiCF9ih-~0##AHjFzlcjOKX@!YAH-uE?T$bsc)u>!+ZP5b`QkyJ0EdJpx z#&7gNQEKxj6VdI}qoj}Dg#s%v)Iu9R&+*V1So-84O1IMpKIjGtbet~S1NXLd zKdleG+qg?-QYciE%p&AaecqsAKbu^p{wldTBv;LRF{qbi(ClT^{f7>I-F2f|A^?#)641 ziRWa}Wi$_3njvloJPn!*X%cKD=9Rwncp}n>aurfHeVU~h9}DYLI!<(9)rD^;)UtV) z-m6sT7AjrRP=id{mJxVns-j}4Z5^ht`BVC88{At>!SA?BPqsV=AAm@xTWj)PQTxSKA|Kn*32 zgI2z9g1F?qWS^2t+6el#r5H)Pq*3ArajuwNy)=Ir3nPrNw?RL@vSaSgm~Dy0?d#h5 z6i~ev%qaF$Z=-rZ!v={51Zz@_liq&|?*0Y~I7E!CYLh)|#&ZEaXyc(X9QJq^LR4JD z>OVr}eKWhwYUWm|ED}`Z?nAr3l3$YqCo7)yX*21j4XbZ7+YQO)7tU5FDqGs+ejiW$ zhxsYnq0YMy8Trop$#fd+mVq>uC<0zxJMkBJa}XkBIf`cH^km!j`Go0|fI&a1_@-&3P*N%CT#qz@`sYQ89IH9`w;WES zZkO_mOSbnemp}C1yq{%{?2jbBC@Sq#zV!{Vm7Zj;_flJJ<>MBjTTU%yG7u)^}MbsWAJ%nm6!uFmPcWGYt~1~pJuyt*hbl5 zT2)1LRv*HjCpLT$;N7X)0qHv^fg2@vf`xrnbsO2Rwz(&pt&t>ON~cy-&Kg8PByWT#hsG09+Rv|A`$DqmL#46$)RoD=O;Cd$9*5l{ zCqC3jO)ue^#@8RG8{Hd|SCh==l)~Fcbil&W!%m-kwJfSb6y?Vp`(idNyoExHRzxp0 zNwx;P{foy|f5@jL&Mm(9Dm#`On#dAG-m2SChM*!37h#_Z7O?J}Hk^ih&;mkOzjGI2 zzEO*o)`j>^2TSg^gyFMeXHg0rvDKY+6;1owqup>Z)T; z+2CbbDex9R#pcjQWWt)lv$^Sd=RM2n*;P6Db#-nTF1puG*%^_!d&(`RIUJ2l@CKfy zD%c1L8JDkC;!sZ_zqBiVm0zdBM`duKV#7HCiRRq5H10pz}ffM2PgsHl@cvnbuA z8?5j@Aah`HX~9MU-m3?UGA?v+^Xthd+j;< zkPrpP2FwW^XHT(yof>9}JRrimSlt{i0FKSW$G2T}4|s?2>sN@ogr7C7YDLq|JA(1) zp=$$4J!T+?({B%4J=Mq^$5zu?K)p{m<1}r_Q@A_o>QJNu9jHt5NZS%(;$c zuJ~BW)R&GJ3<83fKfPV(R3o#&xzO%=8CL~SmWeZg-i&7|oW!myEInuC!lK(a2Qsw8 zP>)EnJ9mo{dL_d@BsK_8d|J9_p0gHXwxgo7lsouKK8)$Y9cCF%LmQc7bNFoaOwX~! z3`bgJ(kx`ddosu1E?+Fcc1jd1_$u-4=yn>~uf?9a)Yru1RX=YLMoMj>6x9jSmcB$$ zachZu!_AB8Z_Da^Q*D%;_THftxgbK|TSI%b5y2?@Fd`^tUH`mQmGe8q0EK3?TgCOT zWg~sn>ay?wrx^6 z2TsX8gv0K8Ry7NL;q0H7bviiGa^?C*58>nCklL1r@AT3#)GspLN0&S7Y|Y(%Nkp;6 z+p9JudiwbsdF^DFb9Tx{gH#B6yV>%Db!I3Tmn6%cPKlbb|HA$alCrx=e^ea&_H zrzcebT|u&=+?Qwy#->Rkh8>PVH&l>E-OpDkLM3I8l%FPi_;ayn1~<42e&NAWvrX!i z)JqZ{t)jlTV>(m!_p)V)88dLVVXL5&=NtT()`%7`@lBPzfpRCD>fAxZ;mwcyr(6zV ztDUcnYuLuMtM&WLDlY4=f!F2cj28cO^2-PyEq^eCb|zTYK_-qs9h3WI%BC1IQX2<5 z)-)oBhpwi+H)WeIf?Ksu6X+g&*u50ix=_^0P*dY9sHb3EsO4}$;* zoMvV3q%8-3ChRr59Vw$_ts{3Ju!05@)7CdQ4vX0~)jhOl zflRQpW|bDxH2i%C1C>RR)88A_AvekCBjuQ`9K%X|;B2Tk_tUQEt7pK5^sxNJ+_T1# zHi)nT*rg=%YpX@mWhic$2`1iKo6g3Uq*aJSx$Aw=JfN&!pLa+<^20ePc^Cl|S{Y$}e$i8f~s1%<%|hV}HdV60b1 z=Lb$yjWFc}R{4niOurUL>x(zRh@but#cH7zP&PLG6wtRmCXHxBlX^IuS9ijnYofPM z5VhLw$kENz6SyB1>sUY(IVSj2+V7XMLfahtIsEqtJPGl;{!n2dR471F*}veRO`}kx zrLdG~+1u=+Kpk!ylk~N9mP*d>B5n=BT-DML{raE>$#}-o4?|<_(FHVheY@Esl15p z@b&uOhkb-RMSpV6*tFv3;WKal5j;eQjNme^6Xs@^XBof$#*?0zF&#SGD$CdOF|dvP z+i7s$B`F?79k=MK{(g#wr2}Lo_5>WeJbsp#NbVTun@SYqLN{z3}r*@U-9 zHMUzt)vw`zN`w5-j)VEcdoP+V4z=BZ7wx5?Bs}#nqZ%r|%-I;Rq;L?F%;!cT7um`_ z8NSScV1-W1LwPQdE3_7POtjS`#fW7ttI75Z=!qC2dP+1EjPd9}ToqL(5*Siv<^J$j zbv7Gy3WD8Alv>k%3kpNh`&)KwhGDuncvrF?Khj9FzPXwr#(sM&dSYxdnT$Mb^4PM! z=J_{@@Ja0?7iVEZr>$YcG4kz~>xNNrCj5rGY4QWHUcO*Y*naW=kE-0&a91SPtL~LA zjYt9Mc4TKmKN1N#!Doy+L&VYJ!EMw#oLLA4B8dod=JRf5gzX2yIQh^LdmjhOlp6hJ znrS7kwD0Q`TUCGN$`OO`j{{GeLE=^`^7K?_hB+mghjI>{xz7k$1_MaYIJ~!K>(!7R z{)}1z*Z101z?1h>Ox{*aTa{-%c1q}wB;!pzkAC|0NfeEVG^9mhnt3CM(a&7_&E3dT zm0mLbIv!;&2lJLkF?>)YU1<;-Z+C})-xPtzzj?-elL*`5e z!8wm3m?|hiP21Jz(zBYeVZTL&bGE|mWHT*|G=?2*1T6r$@sAH%w_L#&Xu|{dkI+1_ zp#`5Pf)}mWeb%2oOS`Y?Kh3m;r6$tv%1RnNjb0bcEj$2Qtm9b_uB3x-@B>G(>G|*SM zf?VIe$_~v)Jk}2Fizkg6Wg3&T9Dgr`G&vD|&)`060^#BX!!q@|M#EzqdFf!xClh52QW6`FL;YG0wKH#^17cQM(c2e5vuXHW;VXmeoglNW?;t+ znJ9L&W{9PSd?i2;{X+aS9`&g8Pg~XZ6JYG!o16wAnppk#9w zkVeYV_~68vb*9Ydlg6XVT6)*y0*Lt5OgM+gDuM57>iJ7Et;bK`*%1FV zoL~f&gH!(+umLav&Kza?gU|tppD9@Iu=Z({L{-7TW3@l$GjuSXQ8KLZtfYtM^y$Z) z*{)C5mPa4t(Y+Erx>AMprsC#9W4c=Y=&6txi=s4+U>nn{X%;T}<@#@t6Y~4NNeVlZ zsVZS>sXiEkzQm+|cWKe00+0L+rY`!EnHpWT5uDP82K23YJCLoixZr1HFkMlOE`8~z zOv^wVB7ot&f2oq<5z!>-x6zr+2rv#R5o6Y$S=dWvvmZ$uR)h^WSf*~l7#i?gz!rh} zW=)7g>wEeU>bs-qVH@PMV%2J163Yrmo1vXxpL|!tQZ~YmIKI@(pF13Is6H@!pGi-7 z$J=AWow#me;ps*sqbDaG8tK^hrW4X~wr|xWu|5ko30&i&f0?mALVo%l3~BlWrR%l; zLg&yVAsNka;4DRcHOH%lwP$cly!j}0uM-dxX|H~1vS9R(_k)ZNXaV?ok*M|BDyysf zCG`%ZI&-Im|MPbUNQMnl&Cq7b2DcM-1ut^m5~}hH1unc2cc3_dM;`~n69%LD-=IN?vK zteOA=hV;`A5)d471FFj4>U8H;HV(l4v>Q?~n=&$mE&Ka6HJ{qhoq_nFDa7p)rS1jK zdh>-bBpNO9Q9+yq7wcPJzoCi@9>9E!v9W0uMC|s+Nnfa19SF_{MW&^%F|X}cw$^_B)Lp0ZMc1w**lW&>ual9izdNK#(#hrVBzw`CV&N)ag4!BVWG?#-?y` zZhg_k3$F|gUm(bIHAxOT=XUf9`N&UVy7-$}TxS$=2AmO7-Z%I>GoXzCE&{Yg^??@E zqUzrY;iIzOAW&P^WQGE<1;r?TZrb6_E!L|}R}Oy}y1rV_x1m2_kLcO6Ap(nVz55C3 z%e9j>=1+{{4`mV4CjLngr8yH~Sc^@DpfmIF6{Z8)Qj}k-$|CLpB|mj!e-0D8;&muB zQrnBhzHs>$!?v$EKF^9|bYFD_m|D@4b-GgFj)ziKxgO2-9Q#S-_FW=ZD#KPm(k~A` zM&<_$GVjr&C?XDqo7*VtoArZDn4<_-N2H5l_a!aC@pKj3!YR&wlna zsP;-OlG^7yT6Y4kduJLhtWpf{1%3BOH+!7I&S7P)KxmLQt#2IYw$FWAoVb7bl%3h6 zEmWT<81h)kF&B(fp?`c>gWX{i`0}S9JD^+xv@89!Kla@mv$;ysZ%BS%J>s zq55NNn*Vc7fbNFGSKjrX|Mhou$A5U(zx2C*x#9o8tHGJ|r^@%QQiR{Z8eq7aTK7nO zF%I1-jR0T_$_V~?8ir7AL*kp^d%r6ee*YYxa-_=I1I4EBzkTSh!TDm)Fq)`Uz`;(s z^~ZmGxDawwOgZiAKUd+OJP_#N(9`<^oBlT!jrc2814S1YLMtoVflq%E?|+RJ5S@p1 zPNFEkj~DnqrO7Z0ao4Bc|34ot)i+SCkm7Y|7DELOJM@l`|2-H3PzN|gAr*ZM+O8S7 zVj}*c$^UC;LKDSr-p=_$Z0>*f-(DOhx9k?l30OZ^na974)kQkGM`iZzfBh>_pHYPl zL|A;}P4xTw96>XN_c}yPyQSY%`D&o!t&C9jHGJq*3q%YXOo<(L{qy!%qRv?Cf4=I? znm6C+6okIkdarZOZ57jb@8fZ|OtZ3rGBK$yO=LOkCbesdlr8%|=0^#XI1XG*9`|;g zOS}bd5x0CSl=}oc{pUtbigvBtO6;jW%q-TPTbc|C=>ISqOyk;Il8phHpAg)b}-OB4NH&H>YMP@L_c zqN0^FdtGB+;dz=YzezDW?ew>DQ@`8|`JPcs*_iCI`|}Di^ult!l#xaVIauevyfJ&g zS+J?`2zAd&KE};xV94SD+mag9(Mm; zqG{cvXS7Ig7ZpA5+(xH+gSQdQu_sq|^gS`R)6fKW?f1E_#vTZnKFI~2@M#w}C@55( zbJwN6No@W$XI`vWJQttHoqe;4^v5iN^URfeB=P1A@wyVB`>~h{!DfC*i9(atW#X3g zn?38Si~SAz4ARI947Gtd9ev3T?`fP7#)|mESyXp@2~+0S zzU_Un_p=&Dx9G?8z($0316SF!xB_b91Q;voVdtNEn=(_(&=;p6lZ76^Z@V+Ck`U5m zBQyN+$>LTPlCTnN9Nx|2xe5Y!C%}^ z&^90(4i7@PY1%<19mg{RPwn++v+OFRvSe5v$#A7=EyJpJD`fd;>=1HSqzbDu$tYXx zRT^QMr!MD!Z#_3`Y3z|-aW#nQqjiBv%`p$Neo~8FrPB%tR_SbsnVMlEp8vSa8M{9D zDAI-{IwP&MoC%-e*c4;)<)0g>1NF5XJe#Bx!DsZ8GqXK!55ol=k*uU8??P?Q;AmYS zDi;v%>``bM+#o4Foa zflWaO9w_iVylR%L;W6cmiJoyM7~qn3?t`3E4}cR%Pbc#D~hN62TP-{vS~B!2w9(CWX#2TJ-OEJ+VFN!BAbfQ!)NfwtEF)jK?`uJ%2Yd^ zL}O)a;ngy43<7HVQoaUIsYAt~d17s%H(I6XK2nSdO10M1l~K`<1gkT35>aO>gd?pP|#&Sa;%)1c8<}*sB`n zgilw!JdshX?i znM2cct4LeHT_V0Gj+41_DGl6NT<6t1b4#E5SeWF<>!6v-P2qeMi5Lp~`>G*Dm%0m>{&vld+Nh$NEXD$-Ko zgRutI!J&;Gn1bL`%UVLkpYX@d1W@%!11J%NLWBJRHfhaPKSf#1c{r=*gEm)#Al)rr z0C&b|R@msND=BKOXrjm2mv@_DVLv#@FjRkOvLiJvd^y(g(446MXjFL-ZJLmNdPm`KW2b+^C-E+6twcL(4Z= zA{!vJtdvbR@B6(%#i+0!q_8}PJ7ozS$<`zcJ#(cSms!>K&7gEDJb zK9PCmoARcrEow|#ofeN1^25_G4Y3Pr`#BmVkt=0E3AF^|d}TrDiugeh>c$`kKflX9 z@yV6}-}!Y~sMlKQmlon;cf0Rf&B1l%va7ZYcL<(g#HF5{0`=1rqr|1ERqoGeDphG7 zvW{!kFlT;+XGU+ol-r|F$liZdUqBI`7DCqB(SVMxd~@X?GiQt+&xL$a`0q)6g0%b| z=gn@bcf{Qyt-?lI1M2reBmi@=Oc@UQBItMYoPIqV!nkEFm{ksVju_vi1O(81) z^$aKGcc7JyCSHwII|K(>F+#B81UHHU!FU**62E_(F*M*<5cwqae|%RY?ZkzI?!;z_ zNERTfMdo}A2iifQo=;J=K8$QDv*H zz`^Y43jukf_{BtzG$!wjsSHNE1n7M7oPWQCH|P7_Vb|z8UZwamA_oJ=1&JH_diAjq$3MnD zX1a4^kWVS=BZyWZ3-Qzbdpl}_k8|D4@nqWnhQjz!^2Jy9(gfa?{>N3_&+QQ7ZGcQR zCT*-7BCU#LB)LGfQG`o*M0q^AW?Hr2n^CL5VyD?~ID^{DIo~#6=;Fd>8r+|9~!hWX+b1V{zP_T6?37^Xr5Fg2T4NdpFVswoUUJLjZ|agsi?-N3Z%wwoR`z zeME?HWVJ08+uEI>*g67G78Mrj?=b9SEjau|J*v1=n=A&KUJI-g_3-zWFKFZdFy^wg z4y7FFIJZTUD^9Bhuai()K{&SnAcLJOr*G*r@nvakfxIrlxNw@!KxP{?LWzchJv3~p*FBFzef>adj>HHgj{%P>I{Rnm0(vI=f zHqc!OqE;GEKP!`(;9{}ax^Ew%aqBJRgpzdDdw*yH7POkJ_T61~ro_AU6#kxjj{IEz zdq4WgT-}Mc7x3nY&063U(9^!@C4cymX_@gXABtZb(%R_?#ue_0ahWI3Dw}C)1+M-}An{ zZNFosu>>l|)0YQD#8on_i`M|R#?~OzQ)0EYhajqzv>f_^E}W#+ftozhBzJVreg z2C}!kS2Ob}`paLJwiuE})!g5$L{cl69QSK@tudn2miZ1(o(@H9F$mD-aX5B-#5sj< zzow=xA+r(c*uH5D!y&G_72>RZ{h`@ye|=_zwR!*2Uz@Yr~be z)#_+Sv(4=86tVe2cVd;t+qyxXj`;R=g7 zqplGpi1^{0S&toCHCuIGqkQN2wAeMUWkOq*=yZLpQvJdRr!T)fsFT6-r|H*N#5gId z?G%24iTmI4CUy!2@;`i68l2Nb_jI|Su52()rXj3eu9~_xb9VOr^yk2n#=S-r_UzN7 z$_9?=Od;Kr29LpX-BtXnnCY+OS7(UBS84ug$Hp|nA690;^iWRj^Ci>u7ictj{ zmGAYE?_1)jy5q@Z`1GDDiyi6fmI(=NlKVMZ+uppKNhJ^2XB0y`?}-yND6?n(SbK~8 zj%W^v?hfOdb>tCN$e)t$~@59A2A#-)oX;}Z=ZXmtIAKf;vKZzaO!($%BgFpo7FN{ z7og|~Ic$IZN%SnJ$&35}%T_&CB;t=3TFuj0Z?e8NU>Ld0yB57$jH=w%+G6?4Ahy2^qwRJJ|cMe29mN1~!N}(A#@r>I>*TGj2 z4P0xBXH;?#Ccl-+Za& z;1V)ZE>XHOY-$%t4(+)}(DHg>NaVaDD}|dE`{UgnQwQC+`=U32^GO8m~25i zDza|kB-tm1gX#x1V(xmRHIOhoj)TkcSCnCx#4+)r6N1#vFAQ)a@HCEiH}S^mk=tQ& zcPUrj_h2#=Ww)QxwPKqY8cIF(VEf*K3$gL%#GsyL8gBH~H|-;m((1 z5e;9Dw^0`iID^)#lZpi0jdmQppFdz}MZL!!-uIO~V3fk0_{V6<%sSK7;;rR->kq<@ zEV+1Ng}dIzcyZTSI#o37c8c4Skz>TK=O`feB=1r7=O9^UZ1Ow-|Z4Sf|9>Ko9p?svPof9%)f zNSREBy^Mvl-G$MHPkBfv+)Mb8?Q8iXDvW&#@jdm8o^%>dJ$d=cE6cZVF~|)2Ske3` z_jq_;hHw-CSH9}^SF23$s7ach-CaJNSBw>FeiK0$caOf8?bvsQ915|-6HqjNDb8G` z#zDhYxQs!80|e)98OdLJ!7DV0W8#yO<)@T)2Yc4^T|q<cp)Key<=p*zIEpAM=gEixiO_5f*GsnyTm};wxj`IKt+cz}Gl)48 zkiRi*@+EgEH+vEwm*ly$TbHB8CE3xUG0vA|9QH#v+|?m>RsSS6qGh!IHd8Y3YZwC3 z=A{(T5OdvKy2urthQSNhVUCE;6IzKBs+FG)L1w7?PxKmuPBP-$B>7igvnr?YvI!wj z*E=zpz0r+o9LM~l6S>2>r-ZR-RFJK3%k~msw_=W~|DmaO!6z=M# z-Rd<>Q(;IkXEI4s)z>d^YGUHRN{j~I!;Hj{Zm#g+Lrwy_@3SjJHi@ByL+%snH2M=} z!;qW9I@UK`XZZL@^%z!h2!#4^`;D^6$Tv z6r7;zzry=>e^Ws{OJJ-3-Cx&+0ajRlk{$Qp39{u0?1nCCYNWx}H2;i1~OZ;J^ z!JmVAX*%)`4Eh%v`=>p8DTDvdZNC5d zc^tywKv(@B!R3i_iq}n#zs~h_)mm28bh4()UO8m)$gcn%jtT9z!H{L}YIV5bx{!X& zl?)})^2fC5l4tA!K+Xn83}88LNgFU1(!Y42A<|!l%I;q9ZeTs!wUlcnawAT=A+>}a zd?|SN_d@}>$@}|<`;+fue0ehyQ53f4~v`ZUeHZjYM7s339CWe|{yLzt5bz z^}U1>(sJ7};?uIt{&vEYvRDkTYi7VRO$otl##`A4fuv0v?TC;%_bm5W(d21P5?y5HWtEw1gz>Xca_T=W*)g4x-j27v`^ zDz`_Ml5WIeYJa4*HoJLsHdfxyclJ?u4H%r)()XG~od^VV5PYUKDRloaPM1Cj2U}tm zzm}uY3to~lw5HpP*^;c22%Sfbw;lKcN67NX2a-aj@082n4S{Uy(%l^N*$o`Y*dYp> zi~5m^kWRVDG%NYC{_st@5;HW-t`*c+)ZK%f3E*-5$qims2JqIw3=ajxwXZKaZdZ=v z(Ds%{yao)H+hsoC+qXQy167(DBnHn&Jl?@20T>oW5E&vFj-NK7aPZ-7v=HyQ*v9Cx&>QQzXK|J-Y@dbfRIQjKDLkJn(&iwTD{pl@;vjE%c z)RC5l5MnqU9|VFCl;5*kTw^11x3X+`STLN6pxAN`w-;^!6LH;QYQx*(+MsjrYW=}4 zF+XVN16(u!Qx$U3eAg^@yS0L#X5rQmN1QQp@F`7l7pl?VQhFQv8Z_dSiqQpi9p>!( zu38d0I`bBcz&M_P;G+ruOJG}_$=yAZ{u%6=s^Z8mwDSKV; z6=;;|^nTzw=NQJ@i9&^JRKkUNMYHqIScKxqVUWi%t=Tsp7(GbyG{w29-$fmpVnK>G zb8B^;t0AQF!1jTp4G^qvq`WbOP9iY!FGMKV3R2?w6REouY9?BQzgQrmm{DNOMqn`z zTQ&*O^9kZ>cy968oZ%c1o+sXkhlEpm_-qN^i?K%p`6Q&S3m$;42=7Z`Z7-JkfiOgO{a+>b1d*&Lds0D9Ho-jv5G$xNFwC#3NEw7H%$J}j5ODp(2IgLsDF zadFk-a1Ld6c=s+X2ir={CBBH8X?aW$&jli|d~|Vb{o$%TS)tLpH*=srQ4bZHbGwNX zx7Go<>xuz4iBvS5t#}63YmzW{mX+(HL1%Gsm>-w|KWK2cyE|PaYsNQv?&~HFdZuOW zpd0K~J4s($w~ngu)orW|avx>zTnVe|5_6;6r{Yo@Vrbbx59}NN2reIZ@BB?YyTn52 zN#H5HxG7if@vgT@?-5E%w}`r0m?wtpxLb&ue70RnDXh(^`6nDkr;TCEjjb&uV|CW@ zRux(qBu1h9W4A_bHwR8I9tjcM<=u`{`zw9Kkw%UjuoGJVF~FJsNrWz221 z-JmJXX)|av+S*LNz>kcBfFNgXvH~Ys`%>x3*-CP@E8M`R?I^D9*awLA;bvjYM`CvG z=KJ8y+Jl(@QDL`+^96e6rK8vCmjOlGnq*Ncae~4V3wTU^XS+c2G%^ExMl@(OB-K2jdIAX|KVxpkPpK66miSk`-G5F zaNU#L{mJKU%OZ#VY7DC4pk5z4xBi%F^F^UCSP6+ZbDAj}<9)muL0?`IZHW_)56AGS zvz0w#K}88Rl_GUWO|wk3K^y+)!opkV7#TWV`fAEnV(tli5Haiw@#iM_vHSIzTn<6R zA39k)mb)i%#^7pqw65gR{f$z(rbK!L9y(kKzqG9%7SiZL|yc5@MmuktJhG`VYe zsCNs{WO~+PYVuyJXyrVq9QDRayn=`|Z{$4<<#q36_G%xDO=-t6gy&YXCsRMAN_eIX zBBigEOa}R&tr>&$#^ZXbLaW9P$sSfkKpM=yc~Gi~14w#A+uIe9fmza!VEMz@L{6}x zF1+vf!!Q2H@$DEpNTmZAM18mF<;F6mF(UQ>vTYGR((LG1Bff+X`eP*ueC2}0)eg}J zcH}pA2aDG-;##h(Y$r71eF;`&Ewf9;gA85@uUblJkwQ)% zZv8XFKp08nm64?CH%{)IF(}T7s^Z+weJ>GmTA3?CFHP~9(iV5z%?Ud?YLChx?=N#B zMILKjp`iDKx~y%JQFe8%gerN9(m>%y`L)~#!q3iPb8l{kP-vl5ceP&;y2~M6cN5|z z?lo>mBF7YaCa*eo#IP(99_x1Ar}7)z9_70S6ih5=hb`_~qciaJ5fr2MkPD)|5t;IM zUOHG?P9nAt^}TqQ(nq5Vi5GTwp6uYC-Y2;_-mUrk&&`Jp$xzp*!xG)Z`k7t3%;zhu zappXG`X_j$49~-DejHq1%B}0v;VrasiseBE_g+j~LEq5uMx>#d)W7pK>m1aXYi6z` z2k7FD`}Q-fqWVbWd)=7^EGOHjsJlzuiK{_T2*owjz_k>gN@T;o11XYc#SFYgCM!vYVhuQjx{?(E&C;!ZI(CMTgPnY+m;lbnk)2E5UpcSho3wk-}zuYOT zQg52GC1x0J6;H%Tn0c60)$*PmdNd|K-}nT5qRC(8d7X6pUX(4u)YLm);@#-x1{IQ_ z;oEC-MdspE&a2YrN^%Xy>u;6)p(lM+TZ8>mSdab70E4~LPQHuU*jmCD?&&YFI`=_r zajj>7+#oC`xtY3A6oi$Q-&3kDU&cswxiWQ@t`T_(A9QIl?$#WQV6s|-<4O^mn$iv? zk4e35tC{(tg+#vPm#}W%#UThwH$y+xpsX$t^Ugs|GJ?EHH)3s@NU|s4nW5kM?iFMc z=;V9!_VpfgcO`$O(^;>f2U-m05|Xh6*nV{RLWdnmr0#G5Ck48~zUGSPa+TqT7Vt%) zzNCba&|>=O17eG5tALG@JrnHwr>n7=Y0@!7?R@WYEe#1`bv~o*70K<9sk5+H_2D5G zWc`Tw`Q*WHp~XGW!(m)4WTG=Pi=bS$#Z~OZ;wxvWp2AG_pv~B$=Oa>xOkS|S3!tQi zuOBTvpenb@?D8t;OGApzE_&bP(d{ItC}+lh_;nu}dl#Z^=W zvbaGpv%V%5lAGio*DuPW$vthI*)?$>i*#(=6WR8x>;Q0=_h-Jp5KwK4R<`BUvUJ@@lYehhYiKr9Kw^41p7fB%# z!puV%xLdwRxo&#_DgB9wa_jPq_-+{dyS872Zf`^Qw$KOTohRZ<5-;Yb2n5}(3^uCP zZkOjw?iO!72OG7jk;p3`uQ$P-M@TiNYHF$enei#3_V(ue$2CHiZ^LmiGWRk-SX-xZ zU&qiZkRPgiqnVA?vikJ&N- zEh;a$zZ2~A>OIv;DayEeilJ{aGg9M+BGnaCqv5yFPxrLcLrO4kpRW*p z4j4+v9fA*gjwvG2KN=_??n|i%Dqk!-)0}XEeh{bBxQ8C&ob64Q->pbrWsIW*OjcW` zv{=|9K5CzQSd}63P>8hd!=li)+K|x%@koP%1}{JUT;XyAw$Cdf9X`%fbQ_?boyU#C zMjN8Sh!}IIV9w{_r)fO#U;1B~rXDY|>uDmXlq&{j-4;cORooW2j--n@JSW{i3l68< zfMBV}W2P+ujmq!i5ww`=hg`AHPB0?NmFEvOv7b8)#?N(g?%HO-Yd9YnqH6JY6(38N z%|zmLX9(`jhHd#8@?}zZG`x~lJ(1e7%BQ9rg~y#2wnZWMEQCV-{Z}?9KzaFwX;@QN z=tjlS+7~nzXpqrm#|h@a>!~K_4tjLNb-2m71}+;R$>z%;W1MGU^*=qdXG$l+0R2AC z>vgM|_Oq)Y(o(lhdl0@e{i)knI3zJ?4Gu)OppUSWK7-(Mpw9h>$M10jl$XCr zDLGq>{a{>aoef&&FVNpWE8vfq{f;A`=m_E-hTZv7Eel`6A2gz8m3+`G3$-n(V2{W+ zF_|MLbs-;6DCx6|4?2p$&2|DM14w9aaEY}cO$%q~JuN~WgD0X1v2Iv>!w(yx+lrVJQ8Ep`UU zu7q3Qsoz^ZctDJH5AGMftrfEB0PU@)9Gt(1xR7C*2cGqTM9?CN?C% ztUTJCz-S{M1YkA$75~P78ElrJDZ%(y#{vg7Kso6W4%BNV8UGP4QEO1`0lFG25IP%g^mGrOZdI51QSt?2Aa{C;^) z5cgMhyW+h(n`+xq$(u0wM|f#Q=Kfq*snF@+g4H;h#JI`gGcPO6yY`%Zswp(PW6@d- zcb352cV?5!AGz%Y(+lH_n(C^_4Y){fpLT^8)o;!BXf~4pur75gRvxJh@?f0E&3w<} z0deT-iwJpPq&CebSMSBWVjJcc2$AOB??3g6*`o>GBi-?qn49`igxk+e@_18cTq`~K zIPUqFLJNFc;iQ554VjSWDys~9D(SCNVbyzCAmjN_R)N8gZeKEXKf{kHXO1jUoM zG1lt>6QV}X@oUWTA`FPE0f)55o4Sq$GMzAt!v8{&MoARGnE-#4vj{XoGs(7obRarcgv=lEB|^R_YGFE_ z1>A6xFaIGQFwvq3s)+Rv`L$oY-e4eQysW(-i_S_sQ>FDm_I@pv24G5zF52IE!o@oh zi|)QBFZ-hy-I&%{u%~%3Ymv3v7!b|hvs2I)--HzYSQW^i*s`ne*FuJOJ zxBM(5b|Cw%Vf=(K1$Pv_+fyNgOh5;0x5Z$){X8mr<7_Q(Sie<#<865((MuHmdOVm3 zIc)$3ltupre+k#T8#r0M9IE3;WyelAPvrADH=L^yNQ5?=EQau^^+TFYbw827^#`Sz z(EW&i%nO)OL+Q{oJ0$V~?Nebn8i5Fp)3Ny@(vaPwF18%mMrH#@M^`fbs8rNeG}iv1 zUpZ^F&sZ!6j3*nsra3vB18Cxs_3lTjdfaJHCaNI2i3JNqLO$9HGF-OZoy2^)9i(C% z0V#6>a8u;8ZW@?A;uk{BGYIdx*GPu09lzznl}(rdr6ce>akd`2pZeoq8-NYf=R>tm znRK959p2Q8>265mN3)!r40ZNjRu9HFmLPpB6XT+`>LG+zzd+%ZGO`)P(Iy z^{%XZds-2&&fo94a%rPn6k?KN6^gpWV|N=J3%^fDCk?L^Bic&ejK0Bl77V2OT;UIc zf}OE%&6OebP$=t+SZG)CD16X$V0of!7vPfQ4K87+UDV za6+Dc!1i>qMTr9rf^GY|x3vaMMeLur;4FJ&x;^&IPr%h{!Vtb{8!N}6eC~+C@~)Lh zDdM2rZnKV1)7#;!jxL{~m{azZ2DT;d3XIve z-x(sN2G>$6$!T4TB51(7gTv|!pdy<4Gar=;9u8zSAh1~O7HM>dzV~V?T`QhWa_p3O z|7cI!S$l~=LJ3Xc^ofx`2T&%!RF5#3EqL9Z`*;~bIMema)3bolC(=o_Q|o1;%QRNv)O9La?c zImPk)aRer%cys>Tw8Q=7bFn!*kK@xV^G3v^vE+Q7wRZ)Vd;MNK>k6-zyvLq#?;j_9 zf5Wu4UdWci4R|qK;-DpI^S2i;?0eM3Q7){A-l#0xfT4}5wPZ{H>jcwb$*p$xR6L@y zw(1>N0U7pk{qqAlC||bgriuGp^gdHgvA@^%17}ln2t4|KfjuW`*z{ zP668kVb=YVMF6ER|Dl%t<_!Ke|38U=f3Pb+&@uOyVC6py6dYXR@2`Tk;tU~-WdXVB!)t6&s)(U4VKeY;IjAT z*#_4maO*1O8U1}YxCbx-$dh!*`!C%PUQFMB={=ai{9s`IItuQu&x1*6hH4C*#6bNb zXj|wDq9-w(u3t7LgE>?OML8>IH3L@vuLI~(r~}@oW3t|9w<6E8mzZyH1YD^Dvzw_F z3vb2)n3eHhVRZ)MGFZG~MB2;-J(1L~QVt^ro_5T+X=wgK1i+W@S`FO)4vGPy^whGv zk)rEV{iX(LU1pb%#Iz1XMrDyQ+Z2NcTs&sm?Jtd`D<8fX(5YOhee&rM96wMA{Vy*I zaS#MW7p9wIwe}{?!S`7@d@+#>JGKYu@Qu2!BSPb%5f6TyC8TQf{^Z+`g;1?gBb>x& zk+ad&xw@P;loHd=+^M~)w6=IGC+@4A0OGc38k`K;-2hp1x6XqjLHS?pl(gWoqJiOBWhLD0HY#KN|5x2thDEjhYY(E1G>V`oBPk_HcOxk! zEe%Rbcc+K}BdH7sNVlLg2y8$>kZzAlYRs;+UZCw_VV z?mL{Y*YwzD4Kd`oWIAJ?ghYBYhy)z@2rN=3AtR1xVU0H$a(+0UY3F?sNTe3+YI zeSaTcbA0h<4+-02d3#eS?P1WLu)06Ep6=WYw{B_IHQH4o z9NPFClw$O1>}Hyan4Q-95Glk65rd7}VJOyZcab3kk)%4elGfg{PqcQ_^9kJ?H_dKP zQNtH^TNP*>T=Cr>y!3p?XC+fUMu0(1=QPZl@{bz>d_DtX@ID?2*%;MO?@_|2>5q-- z3|MfPFYSAXy~VpGoXuAYj-jBo9nw%RvWECR_-@m#9Nqvzm^b3@@1{fp$z{x1{p9tN z+xJlh1KmClg)JSPR#XvuV2Bo_1IVteVUE16tt;Q#8IWSz{UaqselrU-_lzbScluef z{pm;IO@`?inyUlS+8=RS&a&LuE zUcPj|T=D`A^Zsw!$Y~LhZs?4yns@+sl1~I610H#8Zv4ipx0)C7frRahmjoRjH)2k6_s&s?s1i68c}}c zQ>a#{gr|_+m?XCguBY1(5J*tB+ZMr@Do3NL;O*%Uvi|ABZw;0Rw&bP@R z_C^*QQGal?nd-ct*8Av5-gPZx7PsZAfsD$bE4l+qtyFA{rBkE#=TX1q~HTg#I<>{u^X%SvWVWW4?3sTaPuqEkT z(zX25)2d9rn8YX(o8oA1wRWwaa?LE)a-~>2KcJ?FX_uUZ_f7(-T3JS0kL!EKsJ;tY zEPW3n3T(Dx?>*DER811XG=B>!hryDUz#NrP>HR@|G<8wk)_9DVuXjJUR1U5=Qa0ff zrfILH9#bQZ?Gqm_wLY0VKFL52q|le)43nyk=0~B|TJ`mVUp?uM649jhtbOW}u4rhM zL@vkVpz<_@mCM;=xlp`wR7TCeaU>PH?xO#aiG2*@(`PvAna}T7Zl|zm9A5688pl2i zm_vT~^~R;5y*!>B&wYdy^Awzlc)3*5k({s6=2|Y==ime;XWfU-WB~qjhy-4m`h%5B zzaaF!?y?`jfGHGifQ8%yBGum0%@NR^f_&@5S!4^)wCbC=7>6bZ;FqVS?xY-QWWC-C zB|=llQu%hHxpu93PPepD>{>25;`}y={=9Yewn8(+UiOExf6FH zRgB~fuFl@SIof>m+)`QCeX;kG|e$AtrN-h^4l;c_i2 zPKxe#71=;&YqzNO&L@?Cv+?;ViK(g-*pI&BJ?dj{kYOfD2C>GxU{grp8N;fVYqO`r z-BhvbV+k&i4LzUtyJN7IlH)HEYFNJZGzIF0-#-iSBj4J6ah!Pcb*BT0U%W_Sn1!ci zWD(p%$h11uP#I6fG9-DkO72e zfgTONLpQ`0gC^iK(T0#t|Cg8#Vi^a|M_x4dj+n$50fZ(hwvcYC@1wgn{u~J^mEt;Y zrWo@sU){}bEC6&YtXxSv%eT43k46&2ytTpmC=1g7B)%p`xgTbSnVMFU=KlyAp*d<( zDMTb{-oPX?OV{||Ew^x6uF1T7P8NccSM4_NXIG;CBk1`VzJhAdlYlNo7opkrSJR2P zLve$vvjg>(~@}~RcrP7P(|Ur zH*NAZ&r4v%psW^(iGS|!zXR}-l}rOP{ebMg{cu6|6Up|IJ2#vph^fU^`280CDhTUN zzDqVMZ6S9XG&J~K0paL`Wt8o?**%o}A|8Fe3>2yZlJ6=YWt|nC#!@xr4e%}VHcF_? z?%O0)2CzU12*}rSi3@xwn8>$tlxVY>lk39ABJWT|w%1-xE#vfuGw=v2&6VtBl<9#F z>WaDrbP-UtxRQpfVCUb|01|va*F5HZ3$$-_psS@9{?F8+v>m6)>XSl=SbwR7{}!8@ zb6Z}$T3FrahB%xdb{~;PH4C&+C`%HMeYc)w96BbZNxgQ2jZ{q;GaA!1mpBqC-<6%>UMZ{YkI^EuSEj6D6Bz=MZ}HE<^Y=1W?XC{ zsSXvo^qymO3cw^2l%3|egOL%dK^^{3isn5nAB&~MA2#rq#uLrjyvz}xDm+Y@Y9ECm zsCEJXn0F!IH-V6>7j=TKdVVKP4-f-?-XV0J+p?1|h2gtT`GZmUw6>l;*=NF>Jk^_p z!K~CGp54fS!u%*w?Y^Msw=h^We0Np%R~8INDdf4uy$9jq+xxbLrF5lyDpf1Zm5n(o z+ZDawp6&wkKG7^ngF>m3os1ZEI|rWi*3NTG?ZMP_M07P!+UEE_J zAOY0QJCcNlCRwJj1d~6&`>p<^QAc)OEcD|#pWH&=o?8ElqBrGlFT<)&|Km;80xy0} zMo(=wJlB>chtvzWyQ<#o{7AR#IB3RFQ~ABN8AU{b+?B%x(vu(|xiR@dy%{HJr6FhP zxe4i#dsY3LtJ#3}95L$t;?wg>`ccK|UleQxP?vz_`Z(x-AfSctg`4Xk*K`5t5P0o5 zr$;XgZla}?qs7JsNoI4LzvA?KWzFrZ^?M-L=s^rK4EnuGjQu!IcLLkNtEhzn1N7!F z=J=4+=W?uj_~c0r*(fZ{`d;sP`4bO`cCsFP{odl% z>=fHmu%z&Ryvb)U`7{`&a`YqL!f)E&At3&6)JSOpXG1XSsT0t97TDONGnRWvk6UhUVB$f=n*3bua@#MJgj>aK0)dERyNjvz1E!idskfp} z4tFQcJJCz-WY1QI)_s_x_2dwd2x0elLpoQ|gG<`9cJ5D@UD{RJaTIDUYq!kntJ`Ub zH;z%k7AVFlEPp{byPcs)(L&~26t!sn1t_kJat@H>R~Ztd!358zehm`!yM3=$n8t<7 zK}y^&G$)_gS{n7h{XTgw2~U|&9u;FBdlXLK+a^CBZGiKG$~0sLRFRzKK$m7^ZwYca zXqJ@Y1WjR;iQ?x#Oa|VDJu@x<2s+MjBW&4aJuwRE%Q?9B71kur0a8N6EFTKBEW{<( z`y`gD`2oaF#*^uNZ;#4H*Xf>xRTKYSKi3>wx}^6@4((tMq444jWNi8(h@Z?^3)1;6 zfgYX0vG%1|ePr?LO=5XTCV#Gp@nOybDat7X>7?D>n8x?%H|n)Noub3#P_-&lQ~O zjlwi=Ipg#jJYKx-G`fSdV1f1xzn27L#z4D6@x%hC!#{@Ot+8L$?f{Q~GsDY$1t_Oi zdHtBn$!||iZ|4*~Z<+)QR$|=1M$GxVEV>$m?1Bj}S*B-T3;4e`4#M7Ed3EyH`^576 z->HY5HQ;dUJ5DA;*zRAIH7f&XGl_}iZ>(daiIH`ZXJL#)=+P1g7XGVt7jg1h4LFqI z;L;NTfi2yV<`t5O!&4kAPJjHZ&wHHp^!Ml5QMNFg_}EH^E(p>6tGvf^3op8hVKWk^dHwr2-I<-P4^k<=_PBi~_MY6jRy8Ki>lfXYN&Htazaea@=#l__eHZb{i z7;)9w6TYcGyyt5bcZmtFdBi86l0pj@FoQ8jE3!YW+akbSRMcZvIekal%HOHnKlW1-h zN-YT>Rt4Ri|2$4sA-G&?>^k0SO$218Q*XsVR`x#+3E3(nuEnTC`lwnBy3)|`|L4I| z0w`pYfOrl`(j}pv*WuqQ$KeFwkbNC?gI-M>WQR1-ix0bWTOKVA)@HL;iP$^=l%s!q zOcHvmz+a z${*DPb5uh*CFG!#N#!vH0H&ino(#F~etexa2omsVx*I)mOUQ-`^f9C#A|ip@7f#cQ z6w$4Z-J^UVOplK?(0=s?U*O3kt0aAU%8@}qI7C2F;Nq;ub3M*uJQs;_hsk8$MmH;i zq}Vx9t(T4x)tVX_0pGO}8~BrbSAA+oAkrt}v15aaYVy-OlEl>R z$DBTZ@KH@o$LjSD<5I_|Z{NOwWFY#{!Bk7BFyPs6%TK?V}w2RA`K6kGm+O%@TEptc#7zc)nLFWQu zTm(}jHFJ+~)l+}@^UuQcYqFCnQD`r;&RbTP!~oi8>kYMd;l^; zp$U*F+>^Z1-1QBp!m*aocm*tZQL34&t*(pj+Q**6aXmOJm1ml_LPQ-Z^I$NoX=rI5AR;v! z*s4>({QO%zN6T=~IfaJHoJiD?+}mHz>Kjwx*{JFs1P&0u^Jfv>>K#ahYm!`GJp4xy zW-+LjSZUDg%8LKYUwvg^^#_*qD#BSi--h5u?w`PAAtD#1$;OHwj{}k$k{v4F9#_!K<5HH9cQ;W=iZ7NuqpSmM^w6qsT(_CU1fKv|bo~xYi_{DVB|l@D-}Q6y(|D zcs_ZdcX_dzmy1%a3|(QoKFZzo#e!VaQkq*c>zOa$__Ug=F8k5OZLXA;D|A3P>w{{& zUlPre$syPoYIonfF}YCwc4EVMH+zi%Qf*z4gU|Fr6m`f}G2sr{wiG4E0d!`J;WjFo z!rr+3IxY}oy)iqm-#*0a6IStR%rtb1zmAw*!qc$qB7PmG1fS^yEs15MC^TIjsfBpX ziHPK^hNf|o-6DFbPQfH(K;GA0f1thQBo7ahJDQq}8}%2QM-A0gW4;NSs$~HJ5vOmf zmLvsLyNkzrCAHKqf+NH$-3@sRg4i6l)$*^CV-N7HQHyWh3`Iw2e9Qdn-u{8LLVnf} z_;U%p-foHuVRKUb(#(naJO-{ta~JnY_(G4KoAphQ+d8gWUOG4x)hwc$ z|4oilzoBT#lcKyTZbLMzNx|aPqihF_fw9;{oxk$7hw8sHuOu?NM4z|=LlBX-3vYig z64<<|Q$+W+YVHaa?+_|GxQc$tgmJV&L1Uj9(2JnFM=5-!51CTG)S0b;;RKkI+xo9g zcb#vg{epuM;_V9*m^v8O_8@F_mS|q6LmP5|1~?3+sRVcvseKo(rgm&BM|n^O9F;(8 z1KiVoum15x3hY3a4QIv^Dqz0?uq5mO)`0Nh%wJOhALP)odNyg@{D(#U1ks8@G<5ih zg?iqv9?7cBP?^iJ3LaaL$msD^Fn7M_RGiN@@LIaiVOx0|(_>K!FacZVtZ!G-y6)m}3tuEYx~LrS z1&0MKR#5c~v$HY;O{O`mZO<3_b1VX#*u1ndkA{K~HH=XJh9BdP>2e4o{w%Y*TDy|X zK1@glpV>&Qh}$1rPd0w>VY8_r#Iz@@3**XTkh~Hw-9+Q1c7)5W1n!gmS++Mf7XveV z%4tSg+SUAHDRXBIxm$?hDCe`gz8szkK=ZwPF;nRORitf2M6>j+wG6qfd4J*c!s9s# zz7o@%_SX4rwh?V&asGUiyD86tqa%H|pzfKv(V55-YtxT&e$-fm%AXgt<+ck=^~plp z7}x^&T>#F9Xea>9gZVIxhNUrPW+8%}GOH>1s;ax-20G%^P}0<<48W|94XAp1Trco- z^--V&!#AJC!+5hh>+X-b2=X5R65c&9pBi=a?ft_KeYAe7^F>D{T@7+Zeu^Qh`vb-1 z$rWCzK!WU>qFiix$|6(hQ3bj2i?eMptGefK)nY#Fqju@dnwKaTZVVD}XXZE?@tRYR zY7uKWA5j=)|6B*A0!5o^JaPno!raQ+G|>o^5wh~4IV-`V z38@1_LJ}`d`taiYOyAukJ`%|J{{ZIJcR%XYmU5XzOE)@Xtupu|m3aX&1!zbod`jn< zuE&OTI>}iCgmx*wzKb^(3b!@<&IR~P_M5+w%_1)((CZS*kB>7-4uRqPM2=vQE;S!B z08+bEe(MHQIr(~wYO{B*&!_O)=d=rmmrOZ2 z5didrF->%eC^ch^W9@VtOLPPG-Ovw@Qwxv-yLW`H z0a-)4lpe0EqWo5-Ux65xDbG?Mm5AqEl%Jnp>tweENJuHmw4A{ZXPs+D0`FUz2BH2g zP+4eC64q(Svz0jr*A%zrm%+*r;h3B{F&??ZPt-<9obAWcB|9f$@6lNI(Uwvn6Uby= zBGj7G*3T3=Nyrk&?%3vtw>|;`PW+)i4+)?pq$7`~sUbN!AY*}Nuwrh%U(giqWA4;Z z^Gpmuu6CXYAdzQYW@;-n8HRUxZIp-Zs##Fx-dN^P76`!hJ2?d=QO;Yc45Mp$=+)P}OEabxnLo3{_p+WgE#pc;eI5&HaXg-D`mh~OKTEsGmY|;f_InoctN5t*Z_|2| z6H2NCr)KE&O+^Ss$J#C$5L(3SoAC_XEf1CJEAg^8V2M#W33n;rGv(t&a+8Y2{vT`G zSfwXT)XM5Bj|Fx3h})w92_H!2Wfjcz)WI2X1Vupi0vpyOFh0d~Q*Kz6WHQ8UcxWiw z2Fx6lC~d!K|GfD*@dB*$q*w#EFIKQqd2Tg*yZ%%F98vd}stO>VBvF@gM(^P#rVAL6b$Razq(LY&x&kK^~J)-vD$u-p$N)B;KSnwFukg zC3N9Gt;NO*<*3lU5K(esw)FVxr>;Jq;qS@GCN7*xgMCW zs%9$nO@VL)sRxhn4a)@(XO~xNg&3K z%_swKV&zBfH# z)Zu$Rij&s5@bLw1`SkpRo1xJt%hgPqLFoa)<&Ru_i2|CEGDrQ*RmI8$;WIvinp(Ot zgC%+UkJWhwh zySGcsvgED!X4A|0s?-%Xp4EZUG{K4=n;~hAB5T>Oe!Nfg&ZQ6F%5|yT5P#I@MlN%e z+V<$m_~XvRVm;lm_N)B1Yk)IN%8!_k@S*^3^i9nt38VOC#A*{bQEhCt={FvzBL)EK zq5pKRsGLTGSxUNW_$JfO$YhoH3BN#d0mro~&JrKNIY~b3G2j-KYLaqe6ORFu+^UM+ z{R3NzeOmqCp7lD0or5V|hC-O?7912GAS+I1Z|dMdO!zpMsUENNKXlFRMAvUDJiHJ6 z{a24g+#_Ec*qaNCjW|(r2Jcx339tDseh#WA2h0SG4Wrc5-ok8loktQmw@Yb9KeH?QamX}L_EDG-ZBbonZXQKrs zK%;J-W(AI8MQ{>hEh*$cS$svnJ^+L*|4==hB$U2Z380Mw^{axrDP*$cxOB2cz6%Eg zs$v#;g=S0PWb;K|(;iFO9jA>Uog|Qi_SNWMK{-{gube_t%V^&N*jf+{Eax?zvqZ)V z|07oF%WTzaBY@I)b8!9IA~;P=`Xzr5%WiTarhFgQwNY$1G&;sj`R9Q!_4 zIu85TVM|nQ6JHat5___`cDI-M(p_NBZSVAyNWp%2G=MdEes28SE}tRjI4Ll8;zUW2 zNgph?7*_#?++y)=vuHaQo`Xih)=9zvR6OuCpW@zEWnEofRvabT@gyd%a;0F^N?NZR zE@z$&JoiI;6WxImNCBnI7MoyKNP62^o;obW9pA|CoXwY9C*&*WOZ}>oRzP5BWVMY)^K*84C0M4p?VI$mq zc!Fr4CkTxAAmgT=xd33y<0s8pb;UjDslVa_?kcLtZPZfAs@4aEBk3R_P>7y};!Q;<=S Jek)}X{9lE;_^z`2XU6g*?l}f}cc;4T^vV`1%|0gHV90m{CNYA*(9X5* zAvD<$+wv>RFvYCMOz!R87-e~8B2ow<|7#Xur2Hb+^ye2vR^`t_^is&JdiLjAU8Z`G z=UEHIeR*Vbn6mtG_qDXhYvb*S&b-nhMq~P=tq<*Sq_<0|?e{wp~!Qro_3f6L*DFNIrPO-2X^lg^FD3#r=sa{KEA9M=@+T zxAiSM$YLJgCTV6+a8aFQ4yj#Dx<%4$-uLh6*_I)Y?xf zK<=}J>}D>apek(U<#YYOtt9dAmub1&4qmHKYdcY*^X_O#&*#hXMlOm1vM$^`KeWrF zc|j&s)*-iMiJN)BUG8YAMNbQjWrMr|!Wk3s>>A0He$jMHgvs}6GU_zw4YIUQr&?Vb zO(MUEVgs0>88wo! z#e$aLTT%+dt-sCMP@mfBuP>y)Vb>-uQ>e<;b~95^;QQD?p!IR=3;dZ6zO3khM>k7} zWO+11X1un_TA;96T0u-!oeJ9JubI&NzEd;hzU(~`o&G3zNTqrdsHnm`s>qUApdWXp zl2^swA{eBWr0F8hUuhlBYLQzn9?$MaL9$7*^^8i#6_t7`AXu6M0Tm=$40TWh>v-6S zg$`sl%=HyXXg!3Dkr}$Eal3NF>#lsYP9y_RNdDig2?+ zr*#6c+H|4*^k*&vQXW?o;@B(80{^tf@IU?kUG#6>MShNAjT4RI=)P)>WhO&<&+N3Y zDkeJ2-qJAX?YTXk5%6R)a7jq*w^0DI>N;F>&i&_P*|dGrb>+0(^7Cdx7XDkN|3zH&zBB)|9@l_Z(Ui|JQ3$;-PB~Fk2=S&MUSGnCC{FppdFxzPTh)*s+fJ;gc;U$P`B4Rh z!X$!)P}v-(&T*GqSyZ+)Hs7-_3R&eL!`6fHH)NfMntc@|54Z#yjP2l~F>Cu*DgRlm zmfX=HN#kF**mJ9T!;uEVQt7@r)Kmo)zxnY%;(8biN0J~RF@@0TC_xPni-J9I?;wdh z{h*BCNUcat+tI5UsFqrC=b`;33O3ePzZS^g4c>BFf_NE*hq(s26+0C6ROS)nBLKH7--B${e`Nxy=gP0o{-+(qj z`G$!~B{BnRBJCfR1@aM?JyCW};QcU&^m3?%4JAEx{P%pQON@SA$8Mu5nBI(7QMjnXHPPOo~hzdiazABh-G%_}aO;64l_f{o9 zM@5NcTe3JOgkGvAu%QVJ9#z$e(1vJi#jpK1#&uD^mmMP05{i~_g)S4I$byWV6~RT! zOR=RDk%metj5%=$YJP}W-8NhltM&U#hlWi>RXY`!KF7s}K5elExE~X{anzNHv_Nsz zrZn|lA2#>bq&6EmzWf+Zh2+am<7$X<2?`7Bjc5?k2dSmS1)VeASu>RMNwsHy|zm~%6>wmjbN0v2G`@ELZzXYEqc-d?7<@9^U z#uD!rjtg1aZiPlC{_R`4CiQF7xmch4fy?!*jpLr<#jnJm zA;@UTm9%Jmg*lZ_#k4jDSuXmc2#d9#ZON3_pgV9N^30#y+S5(SH2ZRXv0_cc67Un; z47M=XWTdRJ)(ZZ{K6JxH{$X<6kzyaV0&7lRG?waOrkk+P7R1XGyGp|@M3-;V0?86# z8!?Y9Ti{wFt9Ro=FC^1D40w4D5F5!*av7~&mx{i>CV5l=os3IPDD>%pDn`Cm5tAE4t zdGO?~a+clEUO-ok9Ow36Qx*Llo&FcglSuca@?uEmrqKN;@+%Vl%}VIDhp+mo38cWR zusE-|Ki~4lRFU%LEa(E9${oc6@hImb&`SB?jz;`+buUzZST^-5>Q2n=|Fm)~80STh z9a>PC4iU{t&v{u2D{#Zwz;h^+Ex}*uuVsVV<^lnD*~DVO9l3Vv!|jE0rr%%Y_TpJq zZ|i8Nngy;f!EE1tBWO+slnA=+8^^)>SWSf-^63}?u5~@y!ITuaYsFs z@@l4&DL33y*H1V+fExBVR$K#&Ahpl41Ro~RoF!WK z;7H7TxgvYa&P4BEPW!V*?}7h)_4{NDFSr-x5boQBR(IXI9qGjqn?hnppnmHLn&**$_j1&xR#zZ zH=!Ec);4Y9IwczI`H(xRCLCStnT8^?SaC`Ikp;O%nXSgXq|u0j7O-e;ONq@GrC6IV z_K<%rWXCvYq9j@GO~Q@fC~k6dztQ0Fn^A=lQCMqR(ATis{7jiiut?*G; z4{&Dc2uqFc7US~Mkgy=wIzR=a#k|Z2S7yAv30C!?{RyonbQ&%kUwPuT*w#d1YH4($ z2wd@TrS;NAc<557HG1XY_Q@m6RM2TN28RScGA-m+tFKAlaiJVmX%7vjHdYPbV(dj_ zP(#fc392l@E>4d$<^(^x?=NoXTHxNxO?L7papRSN>viMd%_QR1eMaakkd2VR@sbIv z-Kb3JtPO}w?$FB@Du;o!nG6hN3pZs+5=)g5QOl)S%_6BA8iD%U6DobSY_3AN%oLks ze;IEgBK)cGLC87bJUMPyWxK=zAD9K$7)Anx%86kb!xA4VD~5W%ARSco%vmebom{yU zsiL$FB;@$Ov!91<<@eq2R=>LnVc0S7L4J%OC8-u9e)YU4x0xlE1xX@I<*>_L|7xs) zw*Hw|plxrb_;{Vnb>8rMe~W6Q`9oE!5?H8)dn5^vG4C z)W*g{jF$-7V5RX!7jE;;wb>XV4`&Ggf?lP@@oUM{6d#+b#S=*c$MWx*dm+8mZYNBPOX>vt!$Z*pqSWuz(~}O;^>9 zLsI=fEP|m|W>f9%Xt}#O{l|q}UuxpN`ThGmaO~N+c*b~M7`%+0JnQMM#!y;brg3*t zU;4N@E;gB7ElB45bw_kR8dBnKx;nTYOu``Uw9-LmUw^)qVqdd*)3-*|$A@12r~$v* z>+7wkgSBr@2;C(wUhPv+y)K3bzv1*(J+-@2S0)jztdcV=I+y$tFD+g-M1F22?Tk=e zV)|Az0ZmMb4l#F!n4A=t3%5Uaf!%#ecg9b|Z0G(fGnMv=O1kZ|A2cb7YDIw?9qJ<+ z7AvtI$&ER4bj$t8iY6g&R)@ximUNk~e#GA5LdZnxHU-AOGbx}!T)6mF29z|D#v?kx z5N4aPim`Y}0v1T2q8HUNf$|n^vXvBORR3QSy>@~wwXrOkbVzgry7~Et8mM;w4voKCP&c;J;+Ll*7>aJ z@*!5cA6NdP84+1{^SOMQt>09Rj#;+uHC+3eT$S8k15TNHi#gj$>)8{x2bv6oexDE{ zdWJh}f%y5f+lVj@=3=@Rx%*dcbb_ZWl4aRu2Giju14m&GvT_jeF6OybE<#SKdLewV z+J)a`kq8?w3MyurUrzk6&P6pWwlG7v&{SRp_ALbYl@cpZm^bvs&ypVn_rYY9)>GEK zX@O*5L{>xSK6bV%R=;pM#*TIE-ZOyZP=8rBG?$cKW>rz4inQw!4!2X(=;j^@(pJ4o zhhG-TD=Q3HCvvR>TPJ9QL~9>Ys2rOC;Dt$9xd z%e1c07fko7u**z3xjK{~={)V4*pz91OwvhuZ$_hITBiLxx_$MOkMDY6iMZ*r`)u7! z%)<5`ySuxX&)z}{t5O8LwCB-enR(Tm=ay~N?Ap0ln;TYi6$E-VAWPXO1krIZT&WBk zTvG<&8YF^BjdPp%lo^PWxeA0$_u?x!t-aASYX`c z8z;Eg`y8&Bp$NYhcVXBm8*^3)I@RoTU+?;jf2vn#CU-#c!bi>?-2XOR8E;=?7B<_r>~kg_RNb$|qq%dZJPExy3Vx44 zdnQd%^|1donl$$oM-twahJST96d1G8uBCrd8G#f2bQWFfeV_+rUM8xkQ}p`rDr8 zh_=63X}uyrPHk#vzNa=alq;W0@~J(UO>rfgZW+$d?{!vuE-vnDqpSYqm~yn?`LCck zS+ansxd2iFixS<6A^Vc#v`t>~l7Lc2RGm_f1sOHQDex)EFfE&8xN)R1SU2Pz>84`z z$(*n;b3UEyV27upIe|->ES8^Ao1Tszi`%UYQWlBF&EGu?ZE8dn%uVb4D+aJl>OY6;@pea`WdIG}heK9IYTS>jh@-j;ux!!jcLS7aVgTXoymi%P|r z;}}Z}!K{ycU|~#-645C!hPmC05i!}gnSy!RC}@wehuSNh7d1joj89-hYk0u5F> z*?)pWJzvyTO4uK&&kATg3SySm%W7_xw{wk=P`=cdX4GcCkjkf1nDQEN@z1maNz-k$ zhqHfkg%E=np@t8@Z)cun$^>pa16!`!maWcFhQHp&9hRVQZ?GzmEz>v23e+~%P|%g; zg11wS#-@D|#jn&eBrlu{*mx2n(n_B7IW<*Wu&_@N^w;| zPN~j& z>{^XXa5Jk}5m$4Rq9VO?bSgqDZQA(+1}z-Y15pkj$&(&Z%7XELP8vksmyN7S+;wdG~6+kboehSLYw4idMr*b zt3KoOT0h)Hr#1;oDNJP^PV<%?FEpzTT+I%m8Ek?X4fa_XZ3!d%r+M@fHYy0CDOAjN z4n}c=@e^3b#h1^k{*{9C4_X2I=C&1huNI-!wqXadBarPlEXAJ?a;BY-cz{?q=^0~} zD3)J=4=2`1xq^wmt|DCr+|eumry1$(0cb+>_8iNM5eZCmr@zRM5AE!`ruArQYMHCu zoAa2`{|Ev1TJZQAj)r+k>kl@IN>742?RWN`)uYQ(vpsyztXalo6d&EiX;dcjCw$RA zYd$94a3>D(3k8-w`xlsIb(SFS* z5C-Z%LOC}=xtn?7rWFA6)lQG~Z-ZBvQ^_B~<@9yICIvHmW_GMxYqw3`VFW_CQQ%nt6$>n8I3(uEFRX{;yYT zw#B8NXQm6LVK1dvA^*lp7w+HF*W9VA!}o2mWHq>p`+UKVZsdu6r8ObF8EwFZtPc3J zNl~qc?Kz%J67QxGI{%DTBzWT97Eu{ROkaV{QrOgLs_p zR2wH9(DHDa&*5RiKSF0eTSfR}KDBV>=x=b+T&bj3@j~1wJq;jKA`Z8K|DG{JlMI;kSwbUjS=@&bfJrKf4 zs%`s5gr8SQxDbD&E!4!`!PUbhPKtYW*e~(Rg6%gaF@)KPY-#l93w~(g+esef&O=iu z7GS-wA$YAg^QM(5WS}o}&R_R0N*9tgZ24Tt@rTF@@lugnQ$>xu+?_4_}mvX{?G z|4t&?l`U+u{*CaO3{Kp!f0b43LRUer5tk_a?IqjYDK+d|mJ`C^{VV;p=BPD3L-`Eo z>4Jj-N~j#=#*8q#OA+LQkHQ6La4n-+Vgr&q)jr0JyD_xe?2uo53b55Y|GR!QBpJnB zmK-84gRS)j(6TuBW^s9gb=WOPk7!lGPsshPkPQJx9zJL{7cq3kAjCqgex=DGcsY`f zgqO5)y4xL-#*O~EujXT3wyS@W8hzPLicV=iy*_dQ0l;Qw%hY%6`+7Q>7UTBh$pU@H z_31q3t!VvXC{Kx)%f>fAUEC^VI2A4O17zg1D*5o{(@^`{+NM<5&7#4mZ{sFhz4}@C zp4ZNA%ur8iB!u3QnObqf4nvOQH(w5(rqY%C;YI;s365y(!t4M_tvhzcE+HC4Wa81n zYkZonah zoZTO5Y?W#N?^X1YikfMjKhTtP%*HJf8TrnXJ-YH3qFj*?+%5lEXcZg1ReStXS)v%PgpT4#HMZyVl+rQGtg_ko)hLx zy%VjP=zBlbGp_HCTm&iqcpd3$o_l!QFLTD)xDrMiyv$=-1TbwHRHU7kySg=I=R}?J zd%f=_8oc)3>^`c$Fa@T5U1+KF=?q8HS)Uiv^+8_a+1Pr={#kQ#O<1J&3TvtF^%lUw zIROZ`dhu;aZx6=i)%vQk#ioC_@S|tn-gjUrpYnYdQ-~< zZ+f(V$D)KcB8GfB0GS44e<~* z3^6&XBH_5Err=2oGgB;BNk&f{J5zEeoT`82$sY4QQkMYNd8x-t9Qo$9f?^zW%@7X)VH79c~m`W`>HV}a<>UsdiZa1lcz5uCM zvL$k5-zcc+;&ptlwSe?wYp^mHAcb&3YU-TcbCUFNs`SCv+UTY4BULQB`e=Ujp53r` z2}C$QMIL*GG7ZTQ%F8Ulxc1WF&y27T#jpNr;nDtBHw;=}xwRS01FdAWc#jnNjOb2E z`YEyyYg1Opg!4>1(<~%5<`bbKRSlP4<|L0OgqZn97`9MQEX(oD8g{!og!EdG*`g16 z&*eZ0%x?O2>){Asfk&Z_<}!fB#C3O!+4t?NOU6na9wqfekmx5eRvrTytCDt zcmRB2<`4j*S4LJ+jPQ9|EPZUH5_DGxb=3z53hevW4(wlFwb_t6Dpqof3%#GkO^xBz zJI?aEji-A%TAN&tr35C5Lq_Sfs+b98ON)Mz8+9jp4p!CnK+&IdGx{jkN?Zm%6Mto= z=K)GgAd5|qB8kHJ=myJgX)HpPzmw-G>(zwcGVKVV4mvKdbk0h@4fn*-7V&128yXM) z%7h0Es;9bE!*ENL%XU<;{DPn4GnK$6BN89L2DM!L*|fSRi(x8f_HqH^~@C5ATZM{bd4t8fo3vls;y9KX>?j z{{DFgg=zTGMAiKM*{@05$Xq^LG>>k#N4GEy;aiT1(VL!6Z8~@#^3yl{eDm(ze3N_Y zEHHgv?vu_np4G{SGx%*Yrk_taGokx*CYsiTs_IXx7%#7cGB7<8>2!E2SXk?~cj|T< zuU5_$TZ2oR(4Lwd_B%~RzdUxw$eAkqz3auT4-JMA-j;sIy>_$xLj8t9y~V~k8-2lm zdM|83MunR6$L6(cfTkTY!DxjVsm<~5YycZWArFP&qv}VbuzjS2zw5Pg9L(Y=)guU? z_1CC?eYs{N$bvXml2^41JZi8XjXhAXVU|FN5D-oj*=4W9vpKnv1`X|z@Jcka>0dd;_3OblR5T?nzGJZn%9LwtE)gbktn0V zkAlWAfNo!qq42*~cBPW+FV=^0DODc+1W-|J0g@Q5H2Ry|zEv~@R}FiJQQAiE9ksx0B{E-*_h$jT_)Pw#B{8RK~i5d0|@1IN=o0idl3BfAe#Qs101U0;E?g5-|mWkVu z!#%z1&4qT{W>`beFDehc4OZZP=fWW4Gtzuwpfu*iw~$1j8z>a=UBu`i`*Eo7>C@tb zLW^Um92VI~Y}q4L0~jJi16vQQX3325dGeQcb9nb_gG^=7Eq^bfhkKko$9=RT>>*77 z@fVNT03Swj-UQtrmI}BXkzhJAp;p)3-mHoPCxTCfDWQ|HE^u3N%8Z-h(J_WGU1K3W zoaK}n{Llp@73x5u35tJVi;&i|!vDq!Cc8$)DGZ!X8#-Npg-JYkQ z@jo`SU~41d^y^#d1D$}JRa6@7PLqRDN4s_v%Dp7T4*sxLrYy&^C@ z-*k49xmayF9FO!pO<}w$SkAco?j?h%1U~I~>1jP!k{vkIMh$4u~X*xa;%QFqB z%bk(s=L&e<+NNT^U>CKq%Mf+rUJ%#(%}IfgJF9s?mpgTlEa%<(TP1Y^zVAm4_W|Qq zyQw6JI};K;o;XJ~T_0DIGk@7IzePka%GbYHcd3V4o0vfQS~z}XWz6#V2AtUUW5Si z$wdld1)k#(SZx5{73ITzUBF%=Nv#DYjR2Sj_K@s`@Bal5Mk4~A0%1sdhV%V zc74%Zrqw&G^QTRiHGb)f)pv9IAppQ;YFZyL^>|g~>wX2uN$L8y>lwc2AZnAdF4jo( z2xoe)Jz?=vkDjV#3Qeh&0mlQH2gBlCVm?=Aj+Mmj70p&m5zdrVD+{ z=IQJC)3hURdMuH?3iV;D#a1Tt-j*rmqL;7kXAi)sttG#V06b;a#}i(6NTg^u=6+d@ z7`;83Jw(seK%9-dY@D$dy;;{QVyb9tb3~r%>+4%`ePWBuyo<>Q^|25qGknJRFGIH2 zfB2JYCQ2S#4x8AoZNODcs%N^QvYQoa+2Yk%+7cFu-)T_BD&K9pIUA!o3kZ`npJ+MY zWqK3j(dR6n*?j+`2pn3!)EDOb8X2WOY&a&vHlXaqPYJYdBtHO~8@JDGyrjycffMM~ zy1lRQ$!#vIi@OgD4yHkwC<@!3?fX}v)gDi}DSw$SGvS3Sl^gN8n}EpL6*MNs68fb! z9@$3<-cTg&bGiKuv;wE|0ss`T9pj@rL4Yfilr!2I$y>`FS4*MB?ez4n2GXp!gdKKx zA5^P_CB#4^3=$veFrgpxeUpOst1sc&M&O_v+LkH@&k5Grj?na<8w>QUW)IYQc>rHCFUi-g#P$_bN5{i zY0qgYn>=l7S7@qs?{6}^x~}3y4>To`G!NVuymxv$k3N_{kA)2So<_J+5uWt1HE7UcL=itS%-#k!?-thZzDb^}Y1fJ)vwdJlWwdyV&} zH5_&uPEFhwgA$BiefP)0D`_~H0*If>_sdl-znm54{mb>F?)O3S#PuBBS!8mQ_|P=E zrNwF#ZV?MA-j7}YdxyM4tuSUZG2sQ3P+{f$3L1sJ&}2EC@ER>dU;Y%ykOie6k2S7UtYMl0%jv5Y7QWb5PY7phMSkT~EX7kUf&>w8 zW;}odqv4<*Wf%u6x0`Tr=qF(m6e@%Yhd;6APo%N=5r-?*oOugoP0%G*8JH-Y&vtiB z5h0jmEeTK2YWtW^ldWavdNXKd8Yj5=;gmm@L)G^i`9KoHPGXU$5rC+J^<&1fT?^;Bi?8FX8S6(ygQVKx4SC4hUW-7ExV+Pnkc>;{lG;Qn2Ko)=fm^}IVj ziI}#l3$KFkht#7j?W5~uKyJ%%rQSLA$w)HO!}|9EMcIT4BxTU{*hfl1&sAPw)jd=Fyj?y8lZ5SFqciHO$d;i+83yAk!vRQM$Amv)Jv*>TMYS@xv-Vs1 z6CD(&U>9i7MNwF}CF9B^mzBhDv!TA-6eC_S$$2McsK$^_p#_sS>f+F02dae(=ge)B z;ASgQ<0dm^&zVtiZ!r12_RX$C$A&oEG4QM6aj+6L3#tU);kV77v&7$pq_jTQ(md?{ z%An}KP%s_Al2K4Uop=7d>D>T6E>c55+?e~%@>qA?Z_sQ-TUm|lSu0v>tBzXL!YHJ? z;ev3KR~+Ax4Xlv3Tsspn&bZhc%%v zVNaE>Ouk=bfJYAvMApKZlk&^mM4t`r!MistWbYEW-NFgTvy*)5oqJ%Hv1W<+LyUAO znEbOCnUM^SqWuCEkA9VBMV3vo#a$o|BeeA&k=;SmBFn#w`b$9BVQoR)cM#e*4#AU1 zGu4k-@}Fz7Awvl5p0vP;EmunDLJO%8wQ&<76QtrYA< zz*2g9<|!q9dhPbDgQT9i*U1_GG}A50+nQX?dK7mBK9!a$7iIAg7+fKo6*wALHTpkb z1LN9woA6j98TCQ8t_oE%gBfcmS6KvM_ht+sTwjIDjohSkLJRJPC*xr3@^3Pbs;4J^ zELL+&6*a+wN_DQUxici%=fxw=k4QSd-wNc{$L{nwE=W53=<|Be@ZRO#`=&u$i;LP) zPqB1UF%yzb{!@pm32OVZxc10;%l%e2zDA6%=~bF2u#Durv&^`>$jW$qG3Dla!9RNt zZ7=Po_&G4fz>Sb=Aebw=ewSD-l0iM5|*Q_SaRL(6wvY~i_s7Y4!27=7Qbl(>eUR0p=8@O9RGmB*Az^CNb7s@82e zVMInw@rSU_+)L_&8<5i1+b_R&^qQg%Vu$&t3*Lh4x-!m%eAlKMx2J#8@vj8o_^N&v zfT!V~rdg}nTuv{ItN2N&;#-Jk4Gb4=J$O&@?ZNRQoPxK3mdZgnziuWMeUglPpw-T& zLq^hKp(^}<3zZ_QSfwR4FGDUjoZs0G;y5Fa-&DG>Qh5t3;@+VOZ<8WlgljK^3Qh#+ z{v^yFF6t-nToTRA4tOlcs1WiEt0271MeeBj$Q|wfuS>{?v>5-RfQ~~=b!vE|TI4#@ zBf^J!d2EhYxgnF3h@W?G7RhXK;UlrIS`~8_x}d}J7Z%~3GdCOpGME7#_)Q_X==|!Yozzm!!B%RzCv=ix^rz3fFI)G$ZrWdcJ8-y?Q4e0G zzA6RuxgSeaO;=+~*Q@gv_K|a^93}OZjtgzR&MU2#bLZVkGN(t9G6zA2k+YFsCo-hm zmoT24*D~iVgVNVuj4v1Wi%B}ioRbOgHqm0v8m<}cO9XJ=Z0gje9sT%qo7j@8qA)T2 z37pBLr$2w*7!8NgtUl_Cp*bp*j(_fDGfec94v&;^g*(?kX%@g6I!{Fx9>p`;-Ayts zD@pfE7&jT%REml}+pRy;aB<&R*SIJ4>AG0#N7NUlevym`kv+F^2bR9zPvg2`LLa5E z=a1hzIt)smIym#yti)j9kr=%`9-An)fYZMdO(6;XP8>MgNuY(WBhyO`^yK@Ai1K|*U9DSeKTe1Yf# zei_XU%#!KVyBR{)G}!@cd<`+dw-(#^xB`dDaA*5Q*U&H6qyC{-X{I55c|jFUPYHAD zS-INIAv@j+oN%3@*}LDFzo&mASkYymQ4sRsn*Z>kE@Tq?U=`%e1I@2kd z|42RoTTmdorZ@hZWt;RZ|Fu5dgkar@nTZ%V3jz~vfl|hANfZAal zONk}fV7sInxBDbe14yN60Zoj*(?L9!!o(oNKG zA1m&59yx5milx{nF@S4Vnb5J(Pm)QDaA?%p?SY7LC5H<{9D$EpU1^e92&kqBAHNb@ zu)N~>s^GbZz>5_)-6!Ub|HdwN(nSDflV?=_NsgBQq(7;E zj}+Q(yrbP_0NIpf?=1+#cQ;Vxq0W8MBN-!~%D*sx7a=eFWy<(Ham+SBnydy@0Jx-> zIbTb;msrR z1~mdWI&;yKOWt6&dk&OK1=nv<>zwYP1Lz|Tj~hFi%DB_VN{#Q)H}$pdo9+ZJV_xl_ z`mEgmM4XFF=Utx-HO#V%$G7+Uzcz`|tJcWIWmZ%7pNE4+*Cm>mgy7_j318QKY0P}a z)uhtB!%^qDBYtPb=_QAmH(m5!zqX{g&2fR_(}CGasu)tSl6q9%-}HH=^_ytJj|UsK zJ{ea_rKB@dUQmq0CgMsB7N^^Y;eEc5N2DMG-x&PyiR+2^V_L(Lj6=uM<_b@R_*XdU z&Y5&3(vc_k%7v%n)q`yLJL!n{Ha-<*@C;+6R<@GbT^g3XXF1N=fBVMvUa4*KBj(fk z#<^gjmYz2X&;MCu5{s1->Y!#A2 zg#&kTvKxdye%`@QqLk@pots=&2%A_lkjIj6jFC|HawPe08}_jUn@8eqep9@CdS6u- zpomaoi3p3CMNe$Pe2c>6b4`gi&U$iy%5>`&Me!wwE{$0@lgGmSH{}W~VBqJ#iv)}M zs#}lo|H64?xZtjT3?PrbDUj~V%wbI=Dk1kmR{vKsUu1E!KvYBY%=MBSgSViZnaKqa z>oPxX3_QjGgqbH&7}@^F^#T2816H)sa7&D4D2)Tu==Q%j$FK5v7U#m{`Eu?Ejy z_BWm5`3g(=nRtoaqhRQbpCKI~+nT%8>+R8Ku|8|`kr(7V`_@b$9-Ut09q+YjU-)6G zB+~bK+8%Qh0mMT-n5E;U`s%%TexHqbKJ;9ZfzciXuqhQR*Q__9%Lb*L_Xm9s22Ea< zaxD0w_oQWx$|I!@zFYb%Q<$D_VYcqiJFNygiJ^J*)6eW9eO5Y7uf}(!$|W&(*2`Rj zmo=sK1M#B8`8%)%0AAz!pyT?eSC6Cl?LHC3dNbK8%{dv5X0)&i0wuUdu8 zQW$u)Qe)UHwreUpv8Cz=Xg3*OZIS7Hy6NYhWg*H`Z7H%qT<~_Rcb{>b&hP`%Ai%X% zd+KXmwAlLcyb{CitK_B3TY2X2v*iumONmQUy#efFS*d5#njI~_hWOM(<4KGf-}fe8 z%!m8IzZem~jfe(P_e5u1-Z$y}eu%-Z9NebsS0++lC$NU7ai8Tb_&e~J92e@#f!OC| z8^f6aFGS+$`@@iIMX!)%;WiVwO|PNV+j8FBuQ8{-GM66by`~Xn2!`}m$G{%werIPe ztWI!2p?e$kY)pLM=P|+SXK%bMBIHmp2xLG^IK2Otw}NW*_N;`m4d^+KF*LtU@YA6o z_3Qs^@%&4I?B5y;hGfbV0C$)JEz9v>P{U^}7)0Ciy#xnJO8E=%RDA{gP(G~I?JFB^ zRrYsVGV`eX6)hG*)yHZ=Q4jxYNC4y@l5C6avkl!K(kiH3T zK?MH?HVrHM|5pn;0#Xxn?g1jejls?>@R3HNMUhuW_|j8hQ^x3tH&)V;;`DAp%_p^@ zrK@B17?c%N(>iZPkk>;Eq6TkA*KEemhe0TD+`20q{_j%hGU#O)^oqWZuLS*IQ%8-X z7&^M0ipfNr9&`Rm3|*y(ak%Ool)5ZuLVxvj+fr&;?OA?@#er^%<3JzSo?;H?&wefg zOazC_Sq9V!o7_X zsx364o9L3i*CMu{GqXr335|4du`OraUGAM1w%vSd$x&&x{j|s|;<>G|Cc6#|+vU9;I+*S0^1&Q=8OI*USLl|Os#+>ZCWyuK%}^buJ7-x- z$G*c0jobCFIl9izzKhY|acHEvZ@)D4+Ha?35_4#t7xw{Z=u1+kIq$>%U#S#8%GT1Z zF1Vh~`};}|wngB?TYK7_Rvy#y9x)wP2v^kQPTn&(cH?h%LHHt+)zF;5#J51izDP^1Przu;kU8~%I$b9JMa*Tn-7x%bFmwLCe3b4$I+rv4USyaCZZbUC1%b?-W^ z>9X`5I*;^$?ELmt)gfV9fpA?X0|+Ueo*Ojh|?1IO^3X zT`ikho}qZE_@LWv!9$GRa**28d!I_*$nkhg|MDfmu6|$9E;e|%YW9_(*=w$y`6djo z#nc=PtNp-nP-%XBwzG@2Q|8^CuHwf|L%5GTv-niFGNwS##Z&mbLup%XocdgmTmls+(qr7DX3G zl)mo$myg`G9xgz`V?X1GXHt@QDhchbj6IeL2u@U`i%HLxk+Kj>U5EO&ww@4?8;AEk7Wa*pOG8=M=O=k~9FvoBa`qX6Y7bRTQ&QBWq47`tm(;S*K~@b53cW-bOsCAW>d|xmRD~Xyu6X_x!zfO4#PQ)O6Ip!`DNo;;`vc#`Z{!TO6}z3c%!G- zj=!WcYVUa4&HEw}a~8RKapueuyiA%N-nze@etD7CbktYuR^=OfXh>24ocZz|2$z~> zoG>yMar5Y}I)nGFzpVRgm+@nYGcG1G8a!W#`7CKN)UMZ|yYI_jqWRO$oBDo0*U#58 zFrg7deANpN0M2^zDG#FnyPA8oxa2-%`sRSo;jw{b$~4FHXR5@^d18tOJVwt|;}dyj zEo_OUJ0qD+AD-2tcQx&tk8T^G%(hP;(gz$Dr5@d7rFqRYk9JkkMCwxCqmPdI_{T%P zQXRI~I`h1`hiy|H&h`DK&qn$D{8HqkW;YEh$8uZLtTdC1<5Js}$!YDC0hOntfCBVTplXiHk?>6B=DDCYpw!FuHVlAGI*^|{`(0E2Q%|OKv zxprgsHC<~~>-%wO)*h@hW+S@%w?`5}?;wDNre$a3IM;1;qp4D_KuCHXDd)8pE}p%i&PLMW+k1Yf`STPv3em2>*>SbrL={4xqi@9Xa9R;>Rs#O4g-O zW7m6TKH$zs)%n+YPqBNK1$#*^B<@RRuMy=$9KU>3yPcX^{W>`5<3^1@ zS81&YQK}Ax{AH=I!&>ZZU&z$Wn}m3C6u8L&UlLeN-+giONr`Nw+NwFxt6GYE`frICdCx*1@dmMOF2}RlAskNoCba*bnFafHIAGQhFJx(2A1+TcsY|KA6pZ5TIMrH^!rUKCcl*LYH|p*PHpiC}}kcuB&oU{}toZ=3+-Q zI*Hi5e&d*PIc7B72$xf_K$~k`+l_rQ=K@)R%;<1Q30pY4e3D7?b^_y>Z7q^e?)A*o zmc}#Q$pyG3_{kQ$w+R#=O`z79TaFa-GbQK?QJxP)YMX3%QKptb&((lB2kVyW+!8KQ7_I8!#6@=(L` z*70!KMv1KmQd@$!)5TU$;ZyD0d27IhU!i6(GvU~uwdTDL)gIo|a)ZXb@rz5D3+baN z8nsJmwG|K7(0OaqQNNp0PoGNs;s7<#wwTM11un~3cPcUA%Zk6*EGvO<;v8HzDnrY;dm(+81Jr1rjq++nzR=ew*- z-%7iFs{@7XicQb&q=65|)`p)T^=`at^gmR1^A9FVsg-=P$B!PQF)~y|sf1LrSB`pN zqJ#zJXQDI#oC4(lk;J3(8;x9ak#~vNc*L{J!I+%-q^q>vTrl;VQte);q^!6DQx=82 zwp}Ia4>#xLu`h4ImEh)!lm3RHSN*T5KM7PAa5}D_i2V)_w=CHlk7arApU!2aoE#j%_o0Z*fVv%nu4={OFvxB_ z7{?Yb~$Pt@uA zgs4XeVjH>;+WBWSYmSB0`_s?&)+eCf4gRwOxi0)`VIk-BXzC993d6nlq&%M6K=lqj zXgmNl`b#e^EbcCbV1F`6uS+FG`bp{rl^NB!l@MSXmYs{-6?U_rg@ z>I?grCWQ(>c7-AD-!b8l!`ML;UHr`>99?3h0Y)zr<2OPa5NR#!U~0rlg`olYl|E&N zsUii3x;C0jT+rPgFuGc*^T>0L?-e6ZCHl0CSHKZQgFzQM59g)mP3FG-Zr;Eab`bhrqJ_<+Q=+<*_M(3)9MU$Mc~1Vi``78m+}Pr&)Sux6{N z^wx=LH<7NFb-Sg7J2uC;umS=1{UQY2JdltyhtwiTD%GpJitkT|?DQ`*I!lf-cYPEfUQRjC&LwYsD)%^s8X*Nuy0EXIT$%SUI@#1A*ApRH3J@;eeiExFU#*0dh z^hX+^FL8#MQH2lhF!lsxvPc-=k6s#+yc1L*WksEM4_AllYgKr#E~=Vq>Fqm;$M2(6 zZ?L^jVDo%-8J0aFx+ZYQv|0y05E>E=nH~$tuu8T*URLq`-n~@*z5*M8ta( zUvzI{H}f=8(#q5UVt*bT-y*KCPw7sxcl~tLZ~{6CUh!lEDrDOS?&Pu%+1r244q!dU z-#|bV*_no3$u8-Imt0It)Z;xo`>&6diAk+maydS!d|MKC!roN)U@nMj8m-zB6yp^_ zl;HRnhC)E;#T?9od5H>}XGEJ)KCO+cHikKUio!4Cso%BIE949-xib7lPJQVt5)OBh z#PT%cgW?jRB!yM!>v22-!!2m2e{RTYOp$26Hld!S!Y2|q7b96m@Fug2AI&|>=+`!E z>W<#Yks3^I#R8p`^+uHLrKJZeygO&{Vlabo^j z--bi)QZTAHq%s;9HXG{>vDPhA8R&JmIpM3d7g0=}H7@*fu`23|AARun=8B0y{22(lv~*HW>OsDgK95r+E#LTSyr{{@98bopOV(o6xvzT<~-mo#}Et zuDa+_A5BWNjx`#MJpb^;BDmR#-aCX^-un6!djrTdy*g7~VwTWO_czG}^3E&HS@Ioc zdX{x5WPi1B+R^Oq)t*!U3scQ7tgh2qs=eFQiQMAaZga*}-9wJW8SxdJb4Aje0fJ?n zbI++gZCJI(f~oOQ&C82-w_Y{CW>PcV_llZ)*L8(x_iWsOL-Z&XL6-$K>M2xvw6n7q z=-~8jf{@OdqW=69Aa^ZaKV)+bWD%py8!DfWWW{Gsdc27b=&PdWn_lUt~RxRtl%MMF}I0V7`9Y)@M|pLWyBg%m0g>tkY!- zoo4i#mbvT$FMpee!k8xy2>ro<@D*Zz#w!Zp+E{!t=Y(M4!{+TAX z%-a{U{NcB`REl)NJ@76#!zT)Aj3i=e%lD;ZL`zn?w_0ixt5h!`MAw@+Y^VEln;B)3 z%HvdV)h4l!8$t^y$8SAw1?oqsb31(58*|-3_NLdRX3IJ}=lS&m-5SbW#K1nEW_(|lM#zdv>w~`ii)9R?u$8v zwI@v}hyvQ9g>st2uHJ(~5{SB#Oyv1Yxv-B~7*);)vUiyJH)icdrcRcS!=} zM;AY5#iY;7vZvWTP#eQc@=&(GnVTkoTKU8VIAjwpc|G7e`rzren zE|ES_h*7o()#;{opvQC`a{E#dk{qP+&F+!rGP&Tvq=GA()6H`hr6GOY=9mt-S=;6| zPJz!ks-6T$jo+rtdK{^6o+eb^uALG5bXzSwovoM$=!yA&)~90o!zeX0fpw5bpWU}h z>#|l6klXmJnb`M{vY@gAVtFt!uzdhi+0^l2Rycc?`mfXR|xQ+CKa>#iwo!aV!RhrEyIFY8xmRGonQEP zLmAdMvKgglY~k=><~uo1xv(EoPkRdKKbQ*JECN4~y#5py=_mOol~wgEq{<3{9MF(z zCRzrdW+IN>JnnvmEsTmA!Xo|T+@BOs+Gh$VcO(8E`x>v6ZJXn* z?$asYaeoXS->tW&!If%{4Vb)SETB(ArSd@d&iLv1t@CdDYqq<f<0nOQTWiLu#PEU#{Fawwsx=#*=%!z z?9Lq~eAuHXyPZmX$>k1k?-1xX^hgLEKeVxkGmZb&d)LzrfNVG+E*q158v44>`Tb75 ziIrmh$x=M`(pj~K+aXrC8z=;=^f6Do#R5;;U&qIAGU5CpUmw6Q#TodnE*IMS8uv?H&{DF_l><2;nez1tA`i&~aOiyH;$3OJ7%Et$V@TG4-FhBM#l=O#~Z^ z#lx6Q@npjveX_v4w9L9IsSiWxq?395xi+EWKrZd0KPc$TfsLwNYDg`AG6Iv2;ClRB zum!;SM@A2@kZ6nHGpU)gv+icZGviO1hfM}4am_-kJ z&X*)j<%shz+q11U!%4K@$Q1(OgSo41a5yV>1=ab9XdqJxylKh z+Sh_mA%;OUW-6!9V~vecKVARn*CFIgYy#?vVeY$&`fe-E1;>HEocCWMdXJD|H=F?7pnL;fpUb8Nsl&B!C%sf1TY`VX-gTIlKqbQ5ijEnc&)bUqXJ3)8N_Jw&>n@C zo5oZrEVFNtv57uCxcL%Y9&y6Y@Kcj$So(ROzh-)m4!9!<049@@z=aWi|CbwhTl{ni zaBa6UZ{sNw6|?uFI^$py`79oGWmoSm z+(=3dm8_JhqFV~Kc_aiVJpa>h*2nX@;)$`HLgf2jI1g-B zWQra;l~|rfi%>TNIikG~;I|7D;k)x9o8{0YL+FgY&^N@f3Bd{EwA~lc1UX&MKWZg# zpNBj^?C3&vCnrucXb~+^DT&6b!Y`UOy}g0O8d#(7sRbO)N~K5%HYoU4uai^M=Hz0%U5x6o%mTLO^!l^d)MuhL^5}?rEv$7qRSbojV^i>fXZThhdDEFE3x8 zV3i%h4CE<0hpV5%22sF@9pK=Ro-vcHZmCGB)GE2rc=n?3XQw&QOyX0wF+2K40u($wi5S(XGj#9Cv-IZElZeDdVjOPHTZiuFb{(R7(Up-d7L z_mLX3QDYv81u9&$aT>ps5Q7WI5w~QR`{q=|`&9hzGvpGMh%q23 zmqN{ixn+UB5D|6Qeh?ACRsSA4_?-;TGQbg09V5!+*d+dt%m-U51P%RsWuNpC-KwCa z+r5_yTd%E1P1ognF?^~}w=MF>`C>!|aDG(V?E<_{2~(pm5|heXV%$`Cc3UX#Ez3>r zWM-hX=sg9<7{}XWN;|6b(SfYZE8%SlgOuk8xcqY28NOpKnFnxx!Cd|T(EksxB-OAP zQ*pTjubv?r#V))td;VRw!S$iEG2SrkXR7}H03ej?Zcz5!4*Vb_hjW8aEPI&Ydo;ld zyL_9kgV{ev6MR)z`W?Gpr}{VA>Yvf7solO+|ChTRfCcF7yEfpr`pzqmt00n_`Kf3x zZ7{WR*6mM&xr0i`XyPW($Xs?D{2cGRx}jvi_=sGgRpx-GTr0mI1^+PWRf4fEmEb=ac~?Yp_KDKhM@Jb-T`?TQb=Z8W`g5oZG&} z2J=puv*@5d!J8u>jPVk)pnvt=8u!~Z^gzJwDIgZQp7q(OXw(F$rCi$`O~9-_f72MH z;Tf97I(lXXYHD9#IB#~ETb5;9Bl{3p0qVPF1B7O17feJ^cv={jy@`FVWXH}B9@Cap>? z-^Y_AD^JJ93e4#mz9U3LKPbMZpnc0<`-4#><|m5xTN8NElj`24&pIxYZOfoj8M&O9 zy4PCIY~_;cm&#a;RW1LCf^sR3x|xK?N8VxmotjEThFpv}O8!HDa{u4U|J&BrTR2Mr z^e?pK7rAl6Mm@Y~69@^Wk?Re+*+95@##te*hG0JmugzTS^^x5N!9kuvstaTM-m1l} zmtc=@nY9=rl^@qlThP@TBsPqD@tmgPs}|!D=1ck+kc62=>>YTy@^LzZ*+!#_u>0qARsC| zH(P&FA&&Ir@pEBP$ z5fuq847>9AaUQSDWAolC0L|_K?8=9h>%SwWqn@(%*IovyV~G5x-@Pip>0#-5Rb7I# zkf=o!zWV*fLApc06ACy>y?#p--wbQROcu^Ce$0^^Sqo{~Sh8C$3gGO@hc)L0PTxw6 zTPm-mWC~|h?{+!eB$S`w!`O#u?iuSax*YS|8ELRf$w`evs~oWhb$OT5(!~f(GNl?x zQk9c3=b3ZLElW?|BqKnk26-K_P*Gp6b?2m%^|WhqSupfF^05yZ9u*tTiOJuy=f`=0 zP{OA&^C?q2@kl~$&3IrRdRA^oTXknHQOn=%F$k5YiJ0%Y3v=I4OAY7Sv+H>!aHpls z@50lFF#*}X-G1OO28l8;;Hq38{QQpjW>NJ68Sx*<0N78X2|Mg0pDJZ8mAtzZt)woI zD2=N7nonLpl&{Z_ES-Y5i_k@=%kRZ}3aAi~0`M`E@(aE7nnI1C^m4%qz|#(Q*Bkpx z%J(`1{QJL1BZwhZLIK09<^6z~O2N%g#{BA=Wi2sc-<~?ks(_dXP*%G0+kWYf-&#bJ`7&e#&4hRW0$u@A4b;4N@cT}@8ui@r5`dzUqwp_WR~L+z1N%C zR=;M(LWBWW$`hE5Z3)#R>zbdd*bKETZeLB&DCcRxdvYZih%`XBCa^4n`qi87@0Ohl zf1UM2-O173ymKhX``bC4brGhTe_0O;WOjc_=v^2N*6wqp$>q<_mU0>q0z!{m$)r#0 zF+cqd4el|p>pJrjxBP_~)7x{dztHJT$E*H;SdZvqkD&PP;F!k|D+OM<7eXKN3&cD& z{yze&15FuH>hfdp?Jk69B>w;Yf87KL6paJO72zd*wl>93eb0kA4SkPN$n9Th33Ug? z&?$be{Q#N?E-wx2#63Tmah|1SE!-8f7%vi(jDIO8O)ylO3{}3$aMuen+!BR}5C$C; z_%mq|Gl(JmF#qQ$LT=~w&M0IQGh>VfmG#^6BR)0VN>1P2bVF+m0EDR_(Wsmd>(zK)uH1dgphV1nUsrF+{q>zx>>N+n&nc1} zx^`RXj*h8^E~nDVC4P~3SO1ZUI8@DBP^Oq&%ZV~u%Fjq5^{UP5s+z_FQD1Q)e;W-%S+-wX&lvWg2PC857|dV-*?3j1~1t#zy{Z{7hHHuT-HY} z(NHHloDC>H=4r6?IGBr_XF3CZy7G4&2|{kK$ud~uKU@-QS{T7ka>hw#U=XigRKA)@ zD4{1?AI};c$S=L@H~d+WbAX|dMJps^&^0FK>TdyCax7PSjWg;^0baLX8V!ViNfmz& z0mFK!_Nf}y@KZ^*BWgky?~mD0e~nhpLA&tIrP?f(rRcnJE1I$lYiD^p|C=&R+?76q z?aarO!GVPTeyzFbms+#!V=~D7srNjCFY{la1;jn06ZoWBUklq9R_is}h@2u+mUwg_ z{P5H8&$VW1j7ApJ7FATt2Q|8-A4vx>atu*f7+-!JkxRU(uo zMn;rN&CC0uwZ`gA45vFwnxZn&83(*1OkXa_de>6C7=L$NgNTUX-_Iq}{GLlDQjj-| z#rp3CrXeBfajf;C&&y#>@o3d_j@Rij(m%T=1d*6MeKleB&i0}I3^`WHEFNuQ_o z4QG~D+&yZjpO+VU-t<(1T!w7lhfu+x#fZ8VG7u^RsjFB)Ke0Kk1v!E#ddI6!UTQDA z3l}criFxLK_@$6M+ZF-T;yo!;aG=*huFhup*A?_Hy{;7%xF5(`!)^TR^ltq4nt=B& zGF9I~o;PRNA$yAG!F{6NQ%$@$9{rTK(o@KxEb)SN@}0PNIagoYQCsYXeDv=rESch@ z49^xe-`P?tT`fc5q(Wz4xmtWz%%Q4+%yQH&ppmuc9D~Av-3Z#6@H^cWY#pB8fh~Vc z8x3*8{*56i>$1F3f8~y<;=d=Vy%svJ4`8*0N_TTOvKVrcNmC!;$^|itU+9@Joe@aA zXMw86k14Kv?~(tr1&5G%hyp1x0`&Y(^}wjRs&d{eME-&Fu0nsKqm2h^z(1zs{H?C| zRx*NLiHAgAxf}6l?zPiM;UZRI>%f|)hr8`deUQPt1mQ(O071Mth=k;~K}-i9U5uTm zcA431$)MF-IVuIPDcu^Y0|L9#{Iij^h*}|$fAiHqjWN*E#DckAO+(ia?7;U0TY*8~ zeS&q}0Wwv}X?DK#DceTwM#h?X8k~i~y)?U?zDCy}@@`eFTF_E*<;Ng(e})hS_Sf=S zbuwi6W>F-t%Wa#YE4jQzG;pALb<= z=u~CgA@D-sR2MGO8$!YLOv5!)%OjT7{c;cY=KUU4Hp%GM0nG0S;ta`rI3}aNwB-7P z#NkM5TgHPg0)9(Vnr?W`^I%nOl6o?4nYqyXMLBPA={{_owo6Q2;i=`%=1j2Y!6|TN zewkblYY!lz{lge%eGo>LDgJVS@E@lu7n;J@RZ?XfkkQsN2Yil75oX3{6%6-tMvHGH zv4k_{P&turedQMuACLrw|}zV`5a(B#TeNiug{u693DVnFpkC%@YR@a`XY>vAG`z^yHV5on=^otgiNjgPzn&; zrsF*3$mcZb&?}E5n$N{(e`}hlOA&>>;ki2J|L}*_T3ZIG-g3~5z2g5QT*cq(s~-NH z!iDENPwp@7w$m!_&@p(W`H}1xk;$S~i6_X22iC@*on;YZf0QVs6csABN@Dqh&Kxf@ zD-dM!GCl-S-Henx1EpCB1eRkHdkKwPC10Z_-q$4ZLxE^HUuc|VN4TX?w1UP;jJ*9e zIv#g|U=W(IkZ$@5pD)=%nlFDOPL$et(|l@`a|^`2^K1OUnGg(E6ia*JkYYIkrEEak zV^Gq(Ieo6uF<<93);3o!4Z~f+U(>h$l{8J4jeG&sqvKsbAfb3#@D2GqpxXYIV!442 z7_OqU+^h5q=Kvr;j)V;e$sKkDqKWe!LD_{%0qY z0`f)ieJp}vo>K8T$I++h$ccr388{C(-aX7Bhc2i5nq~2Zz@rU-l-~2zZPt6EBll52 zzZr7E7v>8XxpP4N{FVLY(ZObol8g4$7K31{$XIzjc5&}WB_Gz+1qHgUz#AB4vR{HY z(lukF{sP~TZW^Y)joSPEUQp&t|9>-C1iK>6F(**OaF~Fl2k;aAThSj#gv#GjQ3R3^ z>D>G#WB_9hYFg<3fTSyJV$*d7{Xdfdm2I?qD>~{4DO`N*v^sDF98bCnk3z#_4!k!P zP2NL3gW%R+w@hfr*5^IW-IEU>Fj=Q&jr<~HKNJK}0NOd&`VP_nGdR)>hm8565pn^} zXj&2X!HL^z*6Qs9VI)s2H;6yDfiXsdl#_r=pZ?HP;~WUT;G~&^5eaYk|7%8JUpUWI z-ALSK+hsX=m!&d80}YT1R;0np(JWzd4qZGeHIajCq!(?{5f&5JGlnus>@}+rg{_>% zOULwijR((%$55A1?Vk7>Jl!ycY*$`G=}6KdoutcR_dwo^NQ7P>jf4xgWpWg~EoPua zWIW59LSy+bB|t4ExYnBeBMx6pcks}|LJOV1zlRmZNa6nl8*ssu^iE&NW!cDdueqg; zOLyP4(;>q*wwW6fOt%s*1aXTRMRmvl5?@{4_{JpG;Fo1JbTVm%Q}t!9D?Wru8t3>) z9Cz2Atz1rK)*8EzZ9IjaCc5#(vUSo!y#wFv@yuNv2gw_v4y+#*m5YBD6?RXgRLIWj zOEw-zA{UhRrR&txkR~HmdLlNEhMk+-sTp|{D6Jak+$fqkD;{ z3<*ZYGL=yq`Mb}sAoZDgg%tk;o`|_#^2lkBjgox&?+KH05$JygI{y73)`s!05R=&S z1;U}L+$sQ{XkE%Dw2#WWY6POGHM_FX3UE)c#)%0%9m}J!X&~vpanwSZN z97niZQpif0^oA-3$&-jK5GDoNRjFDip7$Eaf50H=jBX=~5~;`@Mn!ka4Bd`lRiT&e z9(TW*GH@*qf7)U8$u;4QxhjqNu`iy>&*)d{S72` zjp(UoC2mA4-Z@be>j+#4!mj6jfe>7(2-V`w2kJo}OeHXF_D9GG9Za$TJn!x&A{|$+s`A3mCP>YgbCi;DD%fBf0cy4v_iOq_`?nX#PT>O-| zorEF*8=h@8!?Y73tj_IJqIl)DSZ>C`F!@;-x3ISHpRH{%3{XHuQy4y|m;hI4CI_o> zryPpLIo6kgWtrR<#EfcJZ0HRWQSJthQ^cfDBUOiwG94{tf)-cpuKeT0s$$1)%@7I9 zt_fAy_ik~c>JVkCt_{BGBE1)_8dC57!WIpi#noKX(+Meu4EniRB$NzQAt%c*zUIY- z_VNR@c5ggdP-HGqML3rN3cZ9i-p6kIyY4t5i06y*(S^qg+m4f`j{3Bh^-T_z>smbP zL}~^>jv{W|nwE~|qs{jOJG7S&J1vaxG9+!9a%~MnL#?$COjPcBr|2G!rRW@YLqvY` z3M|Ne!$8f~TW2XS)hlm5f+!dyIeZBm;~*K()X8BaCuD41<&*N%$#GF%r9Lu7&&D`3 zVz6-a5mL-$I^_`Rwzbj35!k8*lKhCM)L|QyrBg$uj#gaWxh}k%pQDCTqr(TK-Na)U85E2 zm)!}b>7R2&!6Mq9QL<9KB33l_XMut%pV#k#LjS6co%Z|oK}Mg}Qi?*nR50u$=&bu0 z>CL#QyCFY^zk)*OLsPC3x3JY^@gogdJ`ay4?!x-|v^qNP2e1xJ`Ssz&6|)0JiqGNJ zo6q$1YEElcHIEyiaF;RNRik6t8pBNwNXfqbY0EV9uy_&0!T@}zMK-(%jz1Bcd;(+! z0jLWyO&tgnKonHC)a)tgLBtiQf_1OaB0u;moly`8B&i2sML{$RZ1YQHFp$V;Jk%(y z>>oBI0)h7%0y+|^WAWTfixzk9QR+%Iu=nA7GoviWf7kPvH1Tr>udG;PumG#k*V}ks z!fa+Y}=EbkAV6>mdW_rtrJ@DBuqshxb3$FYw+^@?-nG5^N z%tgY5TgxvWF!qn|kH}r?aEQRkgcZStb<9`a1zHy4yHFP}+7)r-yK)O-37+ zX;DO~eo><5?lv{p6}1E3_~7x&!-mQyyC~}AN-)%Ei`x-XB?aky;iYsGX0bIOx;{?b z1Y>IlTgBnnk#sP5;9y54pLp3a(efIJaaG&7UbR6r%Yss;2hC-gST*<>L~71oJER2? z2tP~4D%r?zk6g!-W?jk-kDuqc;YL>}8bF!w!Nv&afI_yZ3F*^vo|dI7M&TtWM< zSCiziP18Oy^Jm0c#yq=9=BV1%VNVe!9Io@aDMVc>!_(&PnzWE0pFOirtKqw5mKvjM z-qEvG8P@DdX_CE8eH9mU&=;$o|j0|EUPdzbQlO?({L5`gRFs6DC;Dd{w7 zlp~KfsKN!qdTGDHb7WNEz!a+iSJG=x9{Y<=jnNJKRxGd=|Il6$t`%htdr2Y6>R6p2(uhS|Rz~Au|J2GcVbQ{0l_lCB|VI5f2|Ka1(-b7Ne zxNi}A_T+Y{j@47@*8ltn^}cO1TL_4ZFrGauVJvuG*80((zcW@yh$|tq+X?6F`E)l} z?<^j9{?y*z|2WA=@aIdLfblc&-u}Z=yRk9t6`<6+ImB_MmRz~LpD*Guv96X#l0fx` z8@c3STi=xZ$2-|$?Fy2||6^CJ;h%i?<#!FJII-tOHs5^hPj{|IwQ<-J(ueB|hu6$-Wayy?ZBmEw_u?|I|?ASVAve{jr@2rxOQff9@w|e}0Zm zBPri%QtgNA*hTY`<%ioIa1C1p3%ftI>*UImFYWQ9iO5zw%k7W<__9q1tQX@VOD+(k zo%I$iAu1>!SO6Xo+H^ErbK{GOV(rn``Za}vN?#;O|9Piqycq_FsL<}-QCtNCeI%SB zI??y6fBoe{MCL=oi!qqxGrfBoogL-cwVr){rc)Nwp-2$k#6i+TrRH@cG(h3=a|{B= z@do513$Z=#xi;Tbxn(Qz+>qLn$D9E0jv!WxfV(Xu71mbiwh9S-O{y z_^uuaav~3_tl{{Fo2K6QLdr&QMSD6r`Y@z@neXy791vzelxUUqqGM}8TBTlc94U*-RL9AU4 z7qcqePP=Te7ghPqHzKo;Q7SiQxFi_%5&0>HbU@xEN~ZQClERWf>X) z6HPaIzX&Vjq!*IZI!?k@`P#4XtQl&ZhLsDy$lj~MbLh|L?rE~s+q0nDnDWsDsacR~ zqf}Na(bjmU_G9aNZ}Qhh1Sbv@@W@7;o~3L{CrqU)e%u}DQb2Z9h0hlQ?LQ1WT!mUI zy7DOym@L|i=BwLCxRV!+E@{UlbaR(=c0!5ju`XGM?tM)TJ&vY~5xdlePC%5-I^Tc5 z&zER@FpnTGIP1rtU+=z+-7GgaJrp`w*}Ggnaj~)9bh}{sl>Fn=J}{D3$Pze;-pgv# zLLWGPHWRE-g~E*#-?xlIXyKDS=eq>gg+wx0AQBtSOd_MTPb+Fpz{@+|)p~+lGAN#( zADyazY9~bcP?xQ92tCzuGv4e4-7$JeKPZKE1107C+-sfvcPZNy zCW=XA9R*)xQIJS^-c~m2HOSS_)dK{_xMSYQ7a?qsMXAb*$z_60J4CO%vzWh@B2H|X zV6BqtP{h&d*pG%>RcPjQeox!GyBU{GX0bCd5;YzYH7zGnp@MPVn?=jVa$YiNyBFfN zL8H*Vg+Y6x_^=uCRPl-keRnrg=|yumwfoH=6;F=i`KocTQqWc+2GYvw0h} zLEpQf;8=hZaThPsUBedfe9q?hF{j&*vwN#^8@$N8Bs zp>NnJUBFD8b^K+@Z-^jy9b;wINGDNye#R39mK$0Aw)~#gDrQ0j_s<_hlWvT4dg_Iz z7|kzI2h6w;n$wcey6NF&ZUE27l2XfqmE)25bp9=+61E-UeLcEy(0ik*E{E;Wa_wS& z{n1=qvoBsAJzW{(QbZ|76b93*rDJ_Cx2_P>aL#@xj`7E{h>wS^VW0AHN=n@%?%DJxg}gXS6O#Yk(^S^qt(eK zt(H}|xdM)fh}kN%z+^96w%%7{ZXT_MTkv>&@ND5Cd-<5`5?C&dH42VzhAv_)4m8kG zLIC>27@K8URWE=WQOl;o8Hb#wOaP=#;XV3kV;Ns}t1x*Tc&D?D-)$hHdw{(-C9>8# zDdoj;`vvz=^13C?#5v=nitvT!~^jvrouzgMua>7G{ z@W=IvCx4GzMCFWndlN@Ey>C2$&b*=z7=v+3vj;`dgr+$79J1OdkC};xed1>2joBL0 zLbMuLp`{|=)-UEPT|Yw`nl5&{L)k@u)rLuK(qVp={Ie%lBopxpLFeBbm0v5bUkT8* zS8ebUN^y7YIPKDhd-&|t?bRN{Y+lwAR=3Z?q7Bs*#J#~jaYwaS-oI0`R(Y>}4-Hn- zoNo0j>%ne+#%fZ2i&{~)MdoV7D3PjhJO}keT{~@q{TcTX$zC>w71_9@b=$U-JiO7zuRJQ zb^YnrZi|ifo~hY*?3$RoIMd7qIUVzau_p3e$Nzq^z8<56D+I?Lf;@~oQo4(_oh&Y6i5YUR$ zykuu8Q%7x*?h~%WJfMA$lWLL~&~h+g(V!kM&>+pUjltKTVu8pm?sKP-D4h06C->aOXZ^m@SC&{!62ouhppb!CN6&r*cj52%Tj(69g{M6@_PoK@m zIqx`VTp(IZ`sVp+W@#L+94~Ll1VO+8A1 z9H=!o;eGb+4`*j7Dpv{jxY4UKW&;@GaRn>p;|XduMibp_=#EmpF)rNg4vsfwb-!S? zp4)j)84&t-UZt{Wov2=Ia`SeNa6RsuZp+Dh+f>B{?Z~;~)r66oO-4&`>1bipC}P)oY5S+?AwA#^L6d=-3sHF8U0R&T2e>DQgFLvNFBG+*@hE=h4n#v=_N zpfx5?`P}UY;Itmlz%{Qz&RHRhSqw0_}o(+kKsEf)dJ|I;>|f|^!c)* zU}h{)!BnJWsA9Wu)GrzzGA%8cGl90~FQ?qP^b(EJo7%PJ77T6vh})N2%vIigszmnu zwwuQCxE+pKN6S|T=gF&ngfj{tc>z-Npa_W~uJwb^cDYK?-pdv2s`l9?4dVoCJgR49Uf4mCMg?$qr4A8iJ9aCVop@*Nk}wM=`pId0 zGQ1!SA#7dUWP4f$ld{-})t{U&YKUHEU4vxdx1vI^_A0#K)C1_@mR_B-{Aso@cw-7? zh29Nh%|iij@gt;YE(grOTs{KH$8-JTX`Vg*XU;BQAa$Pb;7i%jk z@XJ)LIyuE3Mhi6@!m$y71kCIdsu}F8H=XJ}k-;T2fqJ7_PFJPzK&M#*+;;~CqI||n zqrBY;$RqjYmPWp$sH+c@?fSXuBM=H7tXDUhcaf{Ir37Ob4mUqN6o1foG5x`yjcB{;6`)~g?(np@u*c*L5`;NyyzVul?JeO1a4 zP@Gf`;M^%(YfO=RQFrKksPuG~&+~kXo1Q*lti$DVHw0I*ZJKUF{H=E;ypsq}ODxY@@5>3X)EG@ib1HTk&lf#%qBuWz zp>WhIpg1!;0M1 zNgfb1%+y)iZ<6_*R|d|Xv!T;}Zl+m#FrGTp+MrNTzY6ysNJi-@az!N7?5=gzvDE0o z6ioWNyCj`4mTo;dPq3ucA(E3cYALWAPQ0P^htBxDrdq<& z{3JHD24^)kec0QC$wCIVje*>n>6V?S8IWWp1h&VZ8s*b>BJ{283NtsI!W=#+g{etf z{PC3x6S7~1FoITR&q0se)8HfvyWQ9r(2M-edQpGb6`!FAw}ur?h2zyWhrUWOFa$15 z_at<)3 z^j&3A)yyxf&;RO1U&&z!oBzm@T3C0jFUyF#zY9mldA?jAXK=}mup#<7mzydL^w^dL z5)SuHI6U`Zi|X)Qp)ig_H@fxF%7F=XNQe7Y!o&(yxQX6ln03g|Y+oAcjvR?OoJ9v4 zGFosr)-abgn~ttmn7VsyN7bC2$LQ7I60z4rzLsqQ0{=V3{)Us95X-1?t3Qc_#5tnDNl{B+2@ybi^O);)#}d(D)fT`>dLPV+)_xo=C2PZ;Em9Kdo0~OMv>^` zN~in&diJ-=ExPV%wNwYwVTWcer!8YD$wrH?cs&Mry+)a-kk!)`>sbpM_UEy(8Pvh# z6S2&0m1Fs*; z_8krgQ9|r!J=k?agi>6@!!paghvn_qKQvkC(%4dNwa8L!D<1n1BJF^&1a(G15r~C)Q0hNiu-#F`dN%WQBJ=3*Fqp4O zVmKXtDdyy}Fo#1O@pOsp&3-ARs4%J3_!qK!!uIaHnexfqSFi$RtU9u}EDCJ-3*KMn zv1U6}Cz#l~(xWovqA6_@&|99a_oQ?|gYE<^<#bK=!`{$ixN|&-VhC-&`I30I>F!c? zIgiyY_GSe2qF(%G^h)>w!ttGBf1cJ*@lwa9XVmnpN!oq;TJyP9W_ec}WGu3URWiC3 zRps@B0uE!VPKBCekCr(wGPLF{pWjbYV{r5Nq$V&C=Iomp6OL+#R>@-W5x`f{S)v4C|A zs|ZGSnagFBmSz1KY!=Jl2~ss-M~^Q|$r0*(?46%V?6=KUCM|^Vm(!X{p3J^7nUNau zE9qmdp3F$gQJQDooR==vu0E;gXG_KC;cPf(6X4mxb-iz`X{i;`q&J=5`}ygQ zH|VP@K!%sX*UZ!c$veA)>CyvH}DDoRbGPb-$GmI$v4gyQ@bw;1}-<8BK1U}e#;z~dL_8|A! zOZxvq-J3@xxxW3Qw)^hfWoqqA%ZbX$%G69v#i_EiG&M8C5i%{OoN^wJ%F5Ez%G7c! zO-(>?OjD6^A~Qz>)Kn6307n!RLEt>J_j`Wp{hjx(v(7ndooD$6>k*#kzVGY0ukmwV zmw4QWY}~kIJk(>z>fnO*T=qAg!XCG-yr#_VG-y)z@x)ALL|fNILEO_;Sj-*9MOcM2lr|I5esG@oKz}{bun8B5_d`zC{>xOfYEKYlp==Cha9xjeiJsihUI+ zn-|3QgDFx6&&_k48{}_M%6x0s33;AlI(u>-)l8($UK>7FR-?6CA^Dgdm*Cgpti0xm zIy(1mP#Z(>OdBMdOC4;u>f7)4Ucg1k>D&<$3pEjPi{T3&{eKi=FA5w>FQMIAzce-S zesf2zVoDOSL<1M)nmlryYsIhc+pv7n+tI22kUl`)h%{8CSNRZ+;&eQs9zKD=lY;~s z(+R6*-olG?iUxv=&SXsed`K_VkRVjU9qhB7BLB2R>RK|gp-PGC7ZZCANtCq-ZJn}6 z-0c+R+sRKM)4oxIz1#}g{Z00~4n-E!MMwv0zcM#}{$->jbPW=_?KXom{PenYYp>6C zHOVD9K50Kfr^Cuk*H+ikv6Sbqn}6r&;#pi+(jv^xgW+O_N284wULts$xS=`3>m&VA zXK^{-9-o+^6ftvrSTdnBCdRGlxTN=hnbk+^G)4*MeBCI6BV#EXEqYg_VlID}Z*Z#M zoMp*7KgTy7vK3YdM)Cr)zNqnlsRW-{W(uYtC!{h5UXKe4q> zhNWZTb(huW7)5(DmVdez6|({p2fA)4w`mr@l-$hfTv&>9VMI(?{Ph((8bj}HcM{#@ zjC+Jyk7?siNa3wUud$I$LYN)Hhr8Dn-)KL)S({UC&M^HhZ*H)-EFZt>dA=|{BKh4_4$u=@5*-#JC@=_ z&HQlIpZ&0RwM&+|ce||!nRi+iGTcD9wRk7mZnSxlDXS?fY^8E!4WKy52fRg7Ftdai zK$k#{E4N#$|0S7cMS5u58M#G0J1RcmE2s9D@@}!dcbl^=Ts8mxsu4oKWkz!E3#8er z3X}3Y=C7dGA0Pc2PBO6L+~k;r(NFHTW*m&dBxdQB(`pAz6jbT5DOS=`bS?$P1JV;0 zB183314n8YORdtTfI?`Aj_K311FN*Ku9PIu+u@%FUvE2GY~HVF$_QK({vjOP_Emo%MydXEWAiv)oObV&LM*6~oGwQg4?KVQDc4inxP{%kPs zR-cI_xY+*AQ=!z?f$=Y2&UIf~ zM5(+~sVo5=^RWX-l$lnMgfUT3D7zNRRhNs(=&|alx+1DU5&jNutUTfd_wjnnHCiK> zw|3mz%_OHS@W|rJ|R2hrclJ*@|Kk$Zd ze6OBQ5F-AAvEgyI4>cE+4r6xOf%0S4ke=;HivjIP)US0F@cKC&qUUgYiK)i>FCwY2 zH)2iuJoZ|iUSq$doJ}B`L^VFMnj79SKOuF-C|X3JQ>#eL+owH z2BnUpHt)#MyRdzh&MdW&BJkBdA{WDZeoE{mZu1}T-84qTGGdRkdC@(MT7wy-v97{I z<`d7+&B`1Vgxlr=F zRG3#xV#_JlesII*pyLTo@gGYkKkqWT|7g0@99ukE&9Tbj2#>E4;YY2rbm}_l&Y+Kk zqJ}Hn&EWII6QlD?G}b{p!YXi7!}?A)G9niohWZFjN)?)xSu0;n2pU%sD*ZIknon-5 zZ>>=A4#@i`PdaF?a2j-hFrbm=PcGR9wz@KaYm|C5*04|(e2lfTz0s2(-&IteRU+Ts z6*hjNARL!~%h@)$U#PsW{=V5)Q!{C8NA3=)iTt9Q*AAPWz^tLvNk#ZRd)-R)duMx59RnXr25gpWExw={eH2h zgTPyqpz6VY_|)mY+R1a~%`m^w1Z)8-e<$=B-KlPcxkd57Xn@Plg2r zojUq4?Wpy)Lr{BAt>H#`XPT;?Zn9qyp!ZhULjKp$cS1*>$#3a4aTi_m?hO6hO~Y@c z?ZlzZ4Z>-`v#GmmQLikXqt4NudJ?~S`x)tq&oc5eb;Wgk0UM%FrNb@sGD#KpB6d)u z5Nq9AHpo$EogVy$*+zOLK{+YV4%bWkc{!14!rX;dVrP&S7Sa%E#+ys60)O}*&J&W0S8-HV?wcfSQ6B>Q4W6`r2+jlR^57; zrD&aS> zBdN~!+zQ)jk7lXi1;EZ{UU7tyGOglyWf1TRH=*x=&6hNpd6(GCKg7UUNW==Z#^V=t z*AYxAx@rhz;zmCuqq@~9Ax1Z5sQEa z2+ap9fz4UCFxuN+yXT9pt@;JkoS+Bt)j_Vw?jgyx))EWEyv;J@=0%GZ_qy>MX+3k} z?F2qGJ#)P9S4{rO$qX&_2g{KLIsV$LW5Qp|XV{HdMB<$3a!bx0Nvq@B9~STr$HZ@d&g z4H0ck%Q`BezV;%4I9>UlVfwEoBAZ(5{e=4w-qs)NvPVnyLwhNQMU!=!sMk+WPlg+2 z#f9+5b`a{7|@QgP=5y?^T)FW1~L-*gg@B@;^3eiFb^93r;F(7LARS z7;m^3$5K-twz6I@SwT%}V-TQb-Utd3B!Iht9qM>tLTY2Xp zTggXsNcjB7DnLo}51^dRdHXkJpcG!l(%iwKi_MF$+*U5fVAsX4tNJNt*1xKx#!hMH zv&P8bgLW2(O*#m_Hsbd~Xe*z6#(!Ybs=d?ipw8Z!AJa*&;7oYoY#*ycXD>6Z1pElnG-zaf9}sj*?d1A zd&cH3!u^l*z||#$^gs96Myj_(cKSp5*&nRBXil^EKlh{a_EZBN+#Y}k^BfnYe{P;V z0dV@mAVqJ(iJ1Sob?Bd4|9nBLFXS)6mVZARCj=?}-@JX)=+A$Dc{UZ8;lH2RIopN1 z|NVSV*-T&R-_J7!0IUCV-OKxb^!B|or~OB29!bcV0HDkt00hdd@KFLN&M|pJ2E66- zYY~@=uD9w}fbFm{)y-&7@7JA`DTlo??{bLW5l9V<@%+iS9`@g z&H)eoFr8D~%bn0xfJeJ4T(pw`{zxr{Ko)YM_sqNuRso5h@)d3V=;n>&m};OmYK ztJN}c_*1OUyy|}&fqJoZcKCsTfV1%voR&ut#;5Pef&oC=DxU)=Ne#D#>k^Q?(tfS#w*y1kJWR56E|_%rD$sFt)ztm2qnlz1DCE1AlfM4K zM1ABh*#RG$>@(^Jg;>E#eromrK1+1cU8N!SW4vqR#3R;~+6n|OTr;WsS-IH^#cgx? zIr|9t?%LLOasr*xe&mz64B)ue90YmV%hj5}2YIlj{a}byh&tA(x0cGocR;@$@l+WI!uDuWtt^(t(9fo%?%zzPoySet@Eiv?4pr?W220tr+PD;ww@ z3upYv8f(lMDCw|sX zYjZi>$5kA0poF-@?%&VytUl%nEmk^e)Vx_hK`J!bMi{wWSoFtXz_|nKQR$ov@1+DY z@#Bami6KjRX)d4IpGL_$S}4EYmtrasGl(Z3@4WT}TFijy`lsHg+7pWF2S@Z2DcfZh z>%_$rZvwnr_<;aLOc#PSmJGb|!xoJrgfj`f^{i452FLuSHZE*lkMr$d4^_|3wn^u` z{U%?!@F8Zg*-CT4$?HnjNMmhreoT2Yl7fvn?T3XoSdPrD1e zIfB0RHJ(%;`JvJhk%}l<2u$R#ij(Xh?N9$`D0q z0d_?*zN*80woAy9N64LYYC876W-b+cC3TXnM^et(ZNQlw4jN6B-G7E}1PCH&SBywR z)-jn3>+&?W`k)D5!)^8eHE3dn9M0L39@Zvt{hTC5&_p-_zW~mxfLT+#A{30adOh2e zESC#--&wz5{G7l3AEkLf$5Qr_UW{|cYA5OwKF$Sf9Lo2VarTRqy4K|0Ox$=ZJccMD zv`D|Jqfx!YZVUqA-rSiI%UCqwzL3s5N-vLD{KVrg#w^;KI%e0V7AU*2K0mEht@B*f z%l~w2cKBt(YDQ7kcVI=*YwfQS(wiyl+s!xDzGDzW0~#ZCjb8I2K^PB+f3iXJ2@rm% zMPjj;7m!=p69Me2e5|o`y;p0no4DIU^Fw$FEXLZ)SVP{3R==YDIS&0}VXRRhN{Ju9 zGBcnR8nk@udB6AvZbx!XBXwR$X@}o(H0eU%y*{10ae_$7rucsZhra_gBvv<0j~r&< z^MkB16X@4Wi@I;p`kV`usKAiCGmV{&m=A#)b^XX9vCe9BS)J;0a7*jw8y^@?)L=A< zi*+31rQf-*S_m=;p^4kp&u3&;uVH!&c$nZ%QKP+4eH5S)*95@Bn*dF-hDsh4z44B& z8?VywEBTOuK9U4r&oqreg1&q|0_Fvve|?);@V#J5+evzhHlf{}H5NftBF|9LQpnw3jxT-I5QxI$Ypb!@n?JZ=San4K3>+m<$TFOcQa@bMHOLua@@i+(YuiYI#iUu zT|&&`1>f>a!Lq&mW1QM1Ab2=47A85mDK(pYFZY;6wp;=|i2dpt+Us5X;S5H^(9znd z?E4puoSqaM^PLk>&nJaZ6q^&|8oC4gqN9)r=QE*9Q=oQrP5VB^Tfj0)!A8Cq|2r$2 z8<`g-xc&1j#xLMdd0>pSBjZY(6EPOP7>nE{loWSdM{hwtrDD9&(lkta@~dH- zLrLI)IG~6GE^B$~H$xM}b)QQR%UQKUdF2l!-PH5$#6}fVKBTjD&j)X^SGV1({2F&e z!EP+Pt6TNV(gtwwBP2p)jG1XV6F8)5f(16{v}w$zKsf1~a7tTlFVR;r?91Gn5tPY^ zu)Mg1Pg>&a`#Mj;Lod8m4(+5}j0<`gaV4-UEJ+sN?R)Wem2M8j1d`4f2jXt|jH>ZZ znbi_nedLGz86y-g)U~=fC)q5NIJ>!>aJJFdj~#n++72#Bay$yh>%7{Ak#{olLB%1G zs+TpKuQu{VkwOI5`B^ApAoaDqW44nW=kURDM3nLyMMDI zg>X$syI=KgkO(d2;L_5!QNGjbURqqDes%)E3uqP0J@C^A(%m_GVQulTL}v32p~>u7 zTv}@C5k*R~94yjZZd8A+I>2bMH&5-<4uB|Rl0>VLv&k^Z)80i_uRrF-M9ZVN6w6#i zd^SLxR-_4I#&oMEl`%EfI20hzJaH1y$n1Vg!G&h_(1NOZywo~)@ARr)H?t5Lu!h>Iqa36tQ9@fN6L~(;mI@0_K4eA4Q&(i zNc+uqD{ZqzL8G;i{i`1MkXU|$s?u{(=dRl0Q=yeTV0~d&iwkC7gZlpHw->HtcpP?a z!0IvjoB=sxphlb?}8d!5bK; z>6#KYWx@BlzrW{lYli8vmU^;moh%lAqN7%ePTt>M=1ZZ>Aqtj{^CpSkYja>{A-QUA zGY^jjNEl|Qy*+_IqX(*=Xx=*0D-GJz%1+)1aV{#sCSt2j;Cd=)E?*(smm5_S zWZCh=f`%&5zP1N~pB~!@jU9j~97awqA*DRC@LyjTQ*W9j8(?Q@rL4`0ZE{hc7;^*1 zMz{O08qdzBI5hGUE^HQ_g%(4Qz5C>f>SB1gn(cb=`v0MjX>bd6LBto(#T;)@A2fH| zGf>gr)wEv3LddukJRjTtfK$Azb3ncLhXbh`K^mt8xhAAO^&iT3vcFv8jojfo=%@7e zD<6SyjhmcSOk23o5B)0a+i2fEoUQZS%6F5?T;$B6!utH|xwKmZAe855r?Qm`IX>Xc z^3*nY(ThY+5UY7N2d&yoN{!=u z=TXQ|7;_NR+>8XcDIi6l@HYlKGk<0lwwCHAxjgn zRas`w~b@~al~pb)FMK+8* z<6BAvf@WebiIz<_jD!%cfo7hs)do=jnJt&%6LOiqF3Iu%0YcI^9jOcIB?>h5fetvA#!DxkK90hsXg36nW(K@> z&VH5+bHG=w>f%^b_Xyee#1P2*Ua}wbit3^0RvBJI8prIdj>*CS0a-&Zy*pZ=1bgQN zSO$KR|D?~`y-3?2C$^gV=ET&X;rtmtGUoMuCVKHu#L(-G)E=9ph67aWE+dr zt#=aWceS>!f_B74RP&zbIgL`PpXprx?r2}>l11t`ceqipNKwNgI*JMEl2`1*TG~aw zJI%;`E2Y%VS0WImNuDJtkdO*aMD~z6OveiA@9q2Zf!|PHXa$WeR#O77!V5BB7p^k! z0yIXetR${tt!FzeJW&Y5okPg+%>{x)U zd%THNnfy|1o-S2#ymTP#Zeci!+2q_&_RR)}LfX5f+ZgzFf(P+`m{_hgG}^&yjXKnR zc6w6(7=|0_>?uQ4$+hr&|6uqsuC@nOI_4o6buYhljr>vrrA`j)B+Vq*lT@Y9)y!ePS>x?}4u8if zyk}H2l!nM-B8oWk)IWvlkA%xwFij`9hjgW~rxP58S^nQ|9yL{t9k0%8cTrEFo5%*f z$N(w}I%S8x0vykXv4$`%(?knx9jGqnRU7Qs53};SS$|UNKt`l$J=i;<|35W3Hl?gB zUfo$myJ;95_tetB!*09O+pfAGnvUZ(8WO|TVFIi8wl1E?+oKlcnVqnKh)d?0E2Lz? zme}t@R|h{}85frhh>bY?Hg^F--uSuySV#m}d6tL-8Yc0-CL|!(mh{QSmmbYi&TcWT z=69lk+P4Bm&fpjL&gN>zzDXtGoe>{5*(yWJ9(f`doiSp_eKu(rRNYadXpSCmbeL@Y z6bwjtT`$R(Hs1|VMD;AbCt6!j+(1Cf3%S z$;}AE@{Z;9r;C!(>23)e^J^shAI$xRvtVz>b?8Rbv&kLaI`e3~5b}aq+ZO&f@nBV5 z23{h^gaSGNOTJ0ka7ZlNkeAgAi|#|2RH9&hi3J}t%0*sA_;)RW{`Ce%adu*zZTNle zMC9h)@rYCh7Oc^5O-rIsieO!W$E~rSf=8B)`kBIyND}k{#}%pDk0;QbdND=3nRaHD zr|V|jb5^uC*X1bY=W_t7RSuyZ)F@E}b?xWX_jl3CWO;3eorQ9LFVa(zFKVIpuCD8x zEbe&uu?sUIj&jaHL5YJyH)%!#TZ&FZWazKV1#VweFXONO^|FJ@0wk^XiNed=mrOsE zw3E5+cV5jsAY@*loJwYR#O!2msj2?G*+g;9Xuj2O41)d^|-Cwj|jt%46RmYClDR*I827F&IKJ@WokU;!fx!qWaATqy1E=x$ScHcB%V8QCbaXt&C2+YbgjwLjc1E%+biO(GDkm z`f#Kx2@-cuu?1D#P)dU}OSR+QwvlQSW96(G-ydB3fV~%SCE@PIAPogyU}rUkws9Vu z(ZB8xx6*d*=7xL+k=3=EYE`M2!n@gEn;ZBXMae2ShDuTc0wx|x#QDzpLEtpj2e&QKd#%PoAIO(+&g>i8yX14b(BOq_ z$*%wg13jv)TpoI?*Hr0*TEww9wJ05bYbc%U2==Sx-E>&JY_(Mu{(tVS9+|Ce0oEO> zE^B}z&(~+D=0&#b_R><6qne^k+>PI<(aV5XTZA|BEdB44h#fduqhDe~)$9%#xcBNX zAUfr%d!ko3MT?_Wb_uQ2^2;6V$cerrWir9sRKajvdt1ZVkk;T}8NpOvA=$%Kd8-pP z5n8q{g<;B*kEkU-;jmv3=AIqR_ZO6bTXF~u# z#kp_q*Qv$X=go~Z&S5D5eQwMT8J9PNz6uQ}GW%5d8bLT=d`=HV ztGmYdc_JTc&qJ9w?fqY5kqW&cJ*vH6cv&SED{lpO+4slxu0J+38wKJB7VsjN1i=b! znS?xPC$63Z8|}{4gW{UUrm$FQ3TV0M|C~df#Rj#TIHtE~y9gq*}J+f~385Dod2vBOj7Z(1MpQMd_ z*|828D74V3M{fKS&vPUlw(@fH8VSw;CsMYYZS0IY;#X1S*>q%*)9ao?@49(te__MT zQz+{m#=s_^X~OYkmdRjO#qPaOC2KO?s;xD}|x}p7F*Z97ttBG)H243Q-vSwjsMTcWKMRo9;N_G{p*4N++%GUy%KJg|SWmNEH@c$8j7F5Gu& zs=fVceb0Ba=NCjNEd)ojNG_4~c=}sdnQKI{Jhy~C2ULprw@!|Q>GFhG+B1>s%ns>w z15ETQERi=%9N(8=@YF;r3RCSY0DS58?^@wOf0vM|dtOgH)3+WSJf|M4n_+LHG#Ik< zQ)^IdtjoY7w~uIlqMH{R&I)SyLtg!8DqKLNcn{TgdhOPR+d`6qQ303pEhnB|r=u?x z^@r}@qB=rb3L62lt_dciq|>9VrgWYkrjG^tknRsal6QIC^_w?ys(#u|!VD5ECZRC30HfW6EXhP59yZI>e z`+@JIb7`TV+{SPgMkjg5disN`|8f`+7Dp+ir9VR$z0!Q8`N&zPa>zcJxgUG*zl=W% z#tToQyG*4tEGoz~=KvwdpV?Q~L3FV+yl(r5PUG=c!Azy{YH|`RdLjC0b>NmV)C!PN z87-eZbEjtH>89Irfzk)V85hWOQMJUZnQ-F?tPRB@&?69YZ!>=!j9JGmD7|M))W5e~ zS~}0gNY`C*#2$Z4ue@0Jspxtx=HnNOhdinE0{yD`TQXZ6CVQ@VO%;_ZMW5|PW1CS) z_A-SlY)7uUQoI1AU6$qfj7Qv0e)Dnar**q(9gtuKbWkh#piKv4UCOxfAR37Dod4c) z-G*D0==AB^mYXNbZg14u<8^)}6>V)-@-U!cM!Hr?_nanQ?hVry$N03z8W`?|$d_c; zKzPLzRODsd{i^A8%9}np0Qh7a+|U^_1eRtm?W|6OI>ze{b)T@g64HmtOq!&q;a*lY z6`shu$XELbJ)@SqSmyER4;0O>Bx7z+(TtFJIzv9}Da}{KEZre|hqHR~n=o@$L;JuR zlo#J*;p#u(4Voytp-4~+xe`kbO1)s3oIt0UD%4kRrJ?e2i-6!Nm4$0GmpC)Wm^Ew( z6bm^oPc;}jEMOhLL`dKsfHiTxj8X%T9PU-LG{^R6bizz_OYbYFkcQMOD05dT3p&=q zdY$hqdnAE8(ZY(Pe7auLa7`6$ZSi&CH5v7T3Z&-nC02MJ56m2Cx1=}ZQ+3-LIncP< ziSf+bxSw7pidPtarXur?NwUjAEpjg!@wc_I*oQnR;%CJHX$F8aP4-8qJ2lNb7}oYk z2?xT(Cc@#aq=QqUQ0dxb5B+p5LCj6UIZRA$4~{EcU%$T47#oAJl+Y?ck93{$C%?|v z^BvW+_~l(A9imDO@Jbm*r|ctM&c*f~S@>YN4iWDzV>|mehV@;|i`VR_n4Uy6$d~t9 zkINliJDHKNTC)o2^1W=xIT9`o0c-hROOjGD^eWPZBn+&O4#dHImTI)}JfaU|+GrnL z9kx1^q4sm&ue{V|Ung~C_3$M?_Gi75C)!_?G`#M!0d6drhDWcCsyD-&HS)5YZ|1XO z!iRoaY%U^;&5V8Hw1&zK0oWa zD$eyl2v|GTG(%9k6;4q`rNP9hG39IH8{3ETq%P`f2pny? z&O8E06nq&}$p?TkqWqk^C7c3;GPcsdPG#>^ys<^PS`r!i8vPWzhZ8F51G#Tsc8J%2 zCnBG{yx1zrW|j)LWSFL;&VMu%?bYiNC; zG=qfSrW07$W5p zkNgwJOZXW~DqL*TRLlp`&wKtf(RF)R0c*4!J?Cx?J-TynVly!zT^^@Z75E=KBzhua zLX-@R4sJZHD3|NJsbSOoTFXqceB`33WKE8--$gV4dv0bV|MGrnCX+%nWdG--j?FK{EZ6_QFs72X7k2Id8-c}YKtqf%h z0MQ`h;vYo=t?k)uD)S1`S!)>Nm(^;l{`Kq8yTxj<0VM#wc-lr68&Ed(A#V&hX5YT| zEs&qNK0)>JUwjR-?(lb?e|KorpW5tZ49rh+QbvE=Z8qU~sI?UA*PbhTY^m^*qU5}_ zt|0!L<2kS8A1-XEz)eE#xUx-0BS+y~ykbF+t0{F1_C0A#!yQ))B*T(7=c;=c4B6|Y8}Am!-cg+n{Ib!=?syooGk;10iI`xm{HY6lj3+^i_}7Fdq^s+Es>(V zH}DQ6m<}8-foXML;Cp;5uO{x*z{dv9ed;?(Oarxm|JSfM3W2qp{|$q%-$L$ zal6+@ElM$5S{8Z_h|OR7C%tCV;m;f_1>&a@)94L*y_mxQMGAXE-RC>IfLSekn@)J0 zpS~MziI4+wm1F_>vixITgQTwhr)>VhA{>_`AeWmhisKd*FrYt;d1h5*&q9D)+ zEfI{<&3lG!t=aZ)eC(1}i62Q~q8{dl*J^unW2i5AGgGWT;y&!E>d!dU82fpIaX0dC zA9FB1|KokB$*(T#ZyDylQrh_iXlYw}pWle4=>MLXcT&i9u!>OtY-ij2eGW5Y$+4e2 zBa&qsbQSe*YU~2N37+6*_)M{!cmLad}%)lE3@b^NRs8t*j4?tt?m}1(05g}d_wmsrWz-6gx~BrkZQN4bbDInQL$-E{*gX+M>Hm_&{eScRW&YBe zWPs1b#BPY7LSoE~l0~E@ul-->1ejer^LVxu-zz5eSp+c>8w}|g_PT|C{Tpp^(JrAG zD9LLoEi?h}FCsvY*r{j2&3w}e;751>a{|PPfqeu3PPmz`1;(<1Tie9MI;4R`{pWf+ zEqdiYSG3gs_qTf&GXCDe_1QTa8&JQd8XOUZ~( z=J#A)%weZoUepJWd~qv!$Q2>tU+9r{)pq3bhxEN0`nwG-+RZe|Z2mvf zJDVoCC#CVp*W-!u)EyI?K%v9@6iY|Z^m%IFzc8sRjBHBk0g&pUl4HI=rw-u#cKn`m z6ZK7WrP^#l-5>uv$2$CgVsC&l_8YB znEaduQA`Q^cZsu3KBSX2I7^}t4qlr58RXjHK>*6k{R;ro8GdNWiKhy~OyYv{7vvMa zZvO@hwhkEV;^x{HTZiovoTUGni#4ZJM-ls#;IaFay^O9#*w0eBxUvy!CqeobUGv}h zSUX4%(qfxlJjnr4XwOy~37aKbw``o7;M^yq@U#u;{vDNQLYhC##e;gRJHGq^7mQXwMFf^dd&_CaJ+bOk!khBpA;e+*noVt7z ze|%ASrBUG6Vq@$DL9{*%V132R=c&9(y5T<$x_8uYR|@DW z0exuM@zI?mV9bNMGAYxx4nX(8J^y^gyJ}Yobduf zCwNo26;%odjNziGtP-{6SisRePg;ISH9Og>gDsl{AG@=l1(fY!%QY`O0>GwUpk_6( zKKEVYD~1LOznpE*EaJI{F6tMA6A#`ofGjL0oyV zTBH=k6!2wne9>S5ycn-d)#M%49r684!05hKas+PH%{imc_xLB-^Che`Ks3%e0zdoF zSqmh=ITH!9Y#<$K=9}qtJ}2nTCk`!X?3yKi%$jdTj9lucCmk_KbO!X*qrOtJ@2|D! z0EAUqO*H6xAFuCEfkKos?PW+StAs@)6+n~%6~hB86|lH9q-k?>*vLyVXcM4ZbG{Kw zHU&SfTnxwi)85$5`ZZ=JIhqOmXKqAvi9zHPS3V2eRuBIToBUj# zy;N?>HG^c_0}?B`j>t{Hx-q*iUetky(!3_^98S-~$Cf#hjRcW%84!MuEAM0ce!Zqs zEKD-6q(%a{`(eI=N7pyfde_nI*|dootGSg$FToPg3Q3ciV#%4F zuGnnEdPk%d1{AHZCu&GzDFSw?QQVMgAw<{Lo^;h2(%8&=V$zVJ@R7fq2}Q04_r>OY~IsirZr7sW+goW&l`(& z8`Qp2&N`|-qrq_qoit^#h*eu(XbRI=sb|>jba{a z|E;#}^&1>h)O5)30u)|5H_bFosFG^bNxf^)D$}z(aWGP1No`b zO^}7So6~_g>t^YOuNLCSnegl4^Lq_Hn8Z-J7F3kikfY1JmD%RRD*4)7U=kAw#f8t;TOW5POI{15BGx5;s4j1YU0tO- zNZEI0=LW+Ti3$%R-gVul$(jM+Wbmt+1j>0ROk&Eq88|TR;06i{x=}W!>%abDL|NR% z8jd)EC>`4eCbdbFzoU6G(%BD5-Gsf#x1Al3ngsVTLf4tOgPZ4PWOPytpDpT&w#_}* znJfB$&Vo22mjQ{!?zb2R&WNbe12%bhyp8($IB#|68U*PGz}5}`L^<+9H4oHHFKXb)$EyGsZaUNTeJ2S_w0OE?=S)>)UB+Yc!o8+60g1gXqHHH{tr> z3l3!hPCj+Xx1*5HbLs`KoW6E3j{D_*^~yEvBPYZ%?n4LGz#%L5AjDmZ=*|)}UW;!r ztdVzlPS!^XlAv4~wKA0(F&^bdDVLm04*m(aC#sKE8*c8}PfidC+;Cq8B=xumtn4x; z8X4*Jf&ed|2){YM|58}*68_}Fmvf1z@RRA`8hN?w)m0o&0e7kDBMP5MxOfJVJK|qA zR;*H-3>?85x!JrdQWDKdhOnWL@jW_K&_XMXPlx^2J$1yfBWboKrRHw?u?@D2i^u$- zg%8uWNlm1Y+M2eDwC$TI=3`xDqOabp1azW@5XAW%=9OcYg+R)BQK*z*h9c+m?IFyZlfM3-uQJn z^BBy!)XfDq7m$?-wfBOrr-h#Fk2Q(ty(d+Mi<>Pd8_5b^YSW3rn)_a#u6X$Y{NhD4 zP^=KB#n}X`9ZI=E?v^N_ss~jn7~dugs4yCsA4+2NcK&&V!~H zicX|VLO)QQBxd2$^yo`pfYYp9T&j;lE*tVNx@v(he+1&))VWNEx?W_i!mmOvE|

    }RRhPq=AQ`t`T6ZFW8=HAy0xy+Ur5TmBjU+&httE8 z{^7Hk+_$&f?hlxWmQbw2yQPu3YJoag2N+o>xSx=b50uO0>SFHx;^igrIQu>5MJ!wyJt<*>~ zF(Pgu91YHic$!;HdS#)Z;T8KfDS+qHfExIvTR)YfR1kU-4(Dable96amb}zKz@m%= z3Z`}En<9ZA{<~6lKA+zs+ZtU9K|7EbjL{GvKkr=5Gzc6wsudYbzIMV2lb3}+74b+& zk3RibzvQ)F-;I^Zq@?#6#y~O$(Q&VzPBBPe`_u5`>wJO9C_oVOpZ(th@%*(&eRP9N z?Sv|D+%ZZXutMUY=;&gVm`|2Q4YD=P(f-5$JO9O?nQhYV)PBZHhq1yA4U>K^*|Up( z5jsVT=fl4-KO#cn)s2Pw-PxGZTeMFa@vwsIZ3#Abo+=Di2Z z>*1W0qnfM>SgWL- z_iTiC-uJK?KsJAZuhw9tfv9S8Vn@&>s430mGYGluny2IQvLyGZmz`IOFV?hkoAg0|hQ6#uXZS4qH_M%+|K7ETWH4y)L6DJE zf@U+~EZQbV#iF-J1rxU>*F&b0QLVZF;QVYYVIy+sbyG>t1`nB{vN@ct>1$x!ab*5L z(H`Pg-#g~|CTpIqw|jC74sJI?H!XitV}=72pMe@A8%{@HIXu%oUGjlel+N##S6_z=$IU)Ca4xTnPl6RAesMDCZ7THq)Mj=%QfW*2`Q zX|L{^s@~2mG~J9B)u9$SwzxTwYgrp($XV3m-=V=b9RVdtQ!pLkD`<0TArb+>(|*dE zpP=(*@DZ5q1B{?wVFbLfEZ5{5rXO~dXKJ+O+~7PnHKy52-;2!);oA~PgUI?D=%b6b zQa?_51xAqu4;tSjwT)VP?FPj3T6=HiT40-~5;@?J0qF{^9G-L0TRvUg<)gltD?Se4 zjXD*z?74a}eC02%oZ!b$j{~zLZ^7mUfYYlm87vS0fx<6^o=v*Sp`r1wh0bq*gM`jk zVp_T5IKUjemei}Ja8AA5@3d@tp&SG!Yx7z6M@3#xGswZ0m_f6PWk)`$&2#_`mrjtb zg&oDL(GHUUEmvvgxp|F@zwmqYw(U*<+;_74MU(MQ6P%2ET#>9Q9bO;d0n29F)1{2p!Kqke);w`SC}Fhee*kxYY|v~#Lzo~5~JJQmkV$q zChPSNB#$;tyfd~nV+}-(JVKwkRENddN;q-qqgR>xys(ay=f{rP<~7~wlC68fHGG<~ z`#rGbzk|^&tdj-)o5x_MKsv?al2X?!$8uVkGF6do**eohj#pwx=Q8b*Un)BfUTZq) zVP_QmLeq*>pOrmze0aeojYzqKE|@L0m#~gm2ZUIz@0EmAmt(WVlLjGE57U7Ny7f_@ z^1*K%_Ac#P`KMIJO@-fj?1s$m9gz^dEN)s4aFAfmR(SX$0AAH2?SodMKq-rU(#R;{ z=QiQmD3XKrPc!8e%+{H%Ja8V3?2gAij?;A!7fkB)Pz$V?g-WJNb*BBxa93efGhmwP zJP6-h$`m-Mb5R0RpwUJ{9XF^ltNcKG;jD6p!gd!tk2}5?q8e`u=OvpB4 zEMqr`!O)alxUZqk`JC_f{^x!?e)r>k-2Tfs-tX&uU9anUy{_l$`Fg%a#XwQahWL-q zLUX-oB|01Z%jxLGfGF9$YC}xJXU%G$4-~MI8n|s+Ve_0KmUE3Xzpen!AakoFWvRUn zw)s$6^Zqt+X{-h-SUZ1>s<>?+|2=1qRwNO*C0ud6knXwzBm$FZjWnfxSyJ7j>Nco4 zC3|xIP6(^WGNB;1WP!N&4p(GU6{;@MIQ2f6zfQn=*x0LOp-^pMO0P2#c2>Y>SMFmh zj*BcsusPhpS0DiJ^1q?hUSRkL)S9LaQf8QKb2QC=dZM}L=>9ng&PMW=MZw%XQg6L8 zm~IJQxFFejd3aiQL@r=cb^qsPR1i^ZruCxGEXLWmfN9daN(CLs?x#YK4Dk{p6?B9- z$O)^b#G%ReLTS+QL$^t(p%yMI@74F^oE8U*+~#^B&z9Z;dJg>=@{(T5r=?*OfjY&v zn4zKES>EMBaEdXsxYYdUkwkPX*fBZK`CU-sRmWZTiN|%81`p)c*fO9?W-_xl-sChS zDS-NSeTr@RuD+@q6fe#}3Wam$Ikq)HykqHCTWWF}VI@l@=6Gp8&CmwpocEr@!zUEB^oezYC5{Z|1x0 zlZa+pV#s`kUD*+?@C@Iqe+ znBa7@wERYuOP_^$Q-p0X&)EY40s!l_VSAyV%3+j#J6+s8gh9Zxu%O6}wRrFONngIz z@H~?e_4%rx{Ui~)mapv0qV^|77cfxsFi=7fdyyNm_2*hUwTb3!f%lV)wU7LT4(>%v zw+~DNdA^klJeowerD{kqqf>BjaQWlzQ+hQmfd3@7Qda0g5dbnWiRIRyl{|ftIjK+` z$_hkP@|#~Yi6MNxzMWQ4OMJI7*mtn1w?q!V0&x-UG+J4d_%{BOBwl=4xrU1?dIH4Y(Tt77D&qMQg z2&R#;Ex@V5nua?A24D-u#iLhjtX1w!o=NNs2{4=nRh#ROyXB{f5KbdyR?~%{_fn+* zeBWk5qR`{ z>s+#iBv^R@`dhzp6`Vrz)zN}Mo@VyF2i^a*IiEyRj!AGHT%Yz%f^Jl7oad{(3E7DJ zAnNn|OS==5dimE?TV@ZLT)~Nq;-lGUn&jldKqx;r+h~&gHs7*O|2%nEjt!DDlntb< z_?!S%jXk`;_Q%JXofdK&k6!4H{9UU@cj-En%D=j&NW6EgH}VHl;=l;cW$_hdqMg$K zxhe3&$US}u-kT^BfJ5pCfcp-#Yj>xj-gPz{t1ivCsH~~2iUc}N6b-IxjxEnuqggo0 z97ZdFv&k`E%uHhh?`{{~&uzFy$i(@(s zIqQ8f_6!I;BL8xV%-g$NuuH^%4I;~=jz)QYj6z3hRD#E;bab<@n3wY@GyjW8d%af^L-rm;9NVNx6cr<)O#9VwJM!yE*F*Fw3yfCB-&(Z z8+JuQVDYOmD}a4Cc7vzLtV}IVf(* z(`Pvg&t=EYv*z6t^SPi9-7fGrf_S@vNo!m?-Y<0URJvB=x=L*0t5CkjeFhIwI<9=$ zM#wWaiDcho7y-`Q%=ld~A@1XqYRfl_$Ge5vm25`rjz5{u+3(BQ;vg0iRWl zudo~XKHG&^2Mc2b7AwKjRT)2A?+Qs1d2r!k0azqqn$v0=nn`xnTnwq12nAP(TdYy(>@ z-R`IL?M&UT+f3D?LX=RQRHJITNWkTthex@q;F%1={6-IwL=uL2Aq2AqvH}A0;lr&i zwlshuYp#LuyHJ_m^!PGupM(W_8`OAqf};$h%}>o~am3m>)#tH)Xz+36qm9B{vD;PM zw6wH2J3VTwH0f%@#&crCGwJ!Fy}UF8 zE*JDfN)hGjKAMYUt0jxlB=6Og(<=l#TfUs+AgWvh6QJWsGV)Aol&F?=(6-gDKzCiN zBfe;yHM3~%St}`rUC@hxr7bKwOVJQeuS4uI;#U<`gp086@7RsFU^fLK?ia+|E-258 zlX)nurW9e3gGtR!;Guz795+#vcu0J{$kSuYAYQ09$x;$AMPHI+lvK3f|Fi0v(vc(k ztIBt8YkQ1ihSV|j&~eqWYX%rv4qub9XhPgecWJDckB!=dZT5=4iH}npqo6f+;vVPq z^S;_CsuFNBcV^-njGM;cf#sg&LXFly>^M=pplw!9&71=*8WAP-KucgdsI2v3S5+j? zk-Kguz?W9WLYYQwM+tv7kCZK{1QD=5u z2}6c(*k?YmUkTra<-U0 zsnm!1B`&Jv+2@Nn5H(qTaa>KAfhL&f@?ZtGSjBfABOsIVZCR$ma!zrZl^T<^YfVFU za?gemI1mqfm)9oO4?;k7F-Ju@bP2+6x;{{@?37NrpA9^7!R> z@oxPH@fC1bun5}Z#grZuX!;Wv8t5o%*PmyW z;Qj@vrR4Pr*rwQJ+T=!$h^oBYgXu}n|HDOv=GW#!6#KQfpc`%54Rig!+x}VTs++7( z%pcb8kvce2C@SqP2=Vf*11CL7bM~*=Knx;o?yZ^(kH@uj+b@3x@aqIwyeJi zZItia0!pbdH2Q#9#f0Wjt|*mQJ}O?YT+1h7|G@$HDCNo0olu7m|I!z4^&ef0A|7fB07E+c2rmoBRc+ z(Gt_IzDj|5r&Znza{=37(eFc6!_k~10x_GfHM|uD6nG|T-}c#Fo!*?!8JHS9kbLPQ z8gA)dsG~Dhpp8)4C=i>- zJ6e+*N?KXjcsr=^bX?ZX{@b5~^B+KGLk#nKgpA$m;h1=;jidTV-|Z_O-|Bh%*m@lK zULk;D!tfJlEc)3-oOEA}%Dso#FoB9NR;sWlt>iQCTy(hCJ%(&7ts0e4jjPqRKkTJY znv_qO5tF~a;_m4Ij73~%x<^*Djc?)VNkWpw&mG0>b1#_rghdP_rtNQfoUR)JHmmTp z9J+NzZ$*EtxL8BFRi?E;@J?>@b3$hF17y$dm8|84Y-ovui(N>de64$ZUH*Daf_!82 zRzXEnHE8>&B%7gSgd0|Z7O&$U*0@ii-20?Oh@^?0Hx+vJ*W)FW28TbLtabNZ~Z;L@6Iv9SlNQt`*4~hW#QSX}#^=qD0r_i;l30hQ6(FG@azP&fzgx|XA@z5OeOsa-yawjN;h zYXJLCK_;f3J56L8PTVFU*?JLN1mp}{J)D5-%-=?yofumBXl90OR|tJT)xpFp-i&hR zWQmq+8bro3`xJ)XSdNSTTDT7Vfpi{|(`kTb*2QSo>Eu2q5Y;Mfg4mhnVpC2xHv*ka^EEboXj^0Q!2?`3b?_Wrj_M1U= zC0GqRk8vmNDqkL)KUiHL$ClNRM7f7WfIFek7jOlF=Nk;qO=)`pY}VGW$b^eddg)Ht zJ-6W_{PsL|Ynept^Bg)c4Pc(y9%>3Vct@4`=Hx$O8Z0o0?frh2#26dE_k8fnN!E;$ zSuRKgrKsZkP@2~Mdl++h!u-YlCsh2qNg}nSsac}g40n^q%uo=+u&mhVM-Q1q2cG9p zu2l`33pSP|2QgxXBXO|ZYoM^KDue5t-e2SL0e4oWCzz9h=JnPY-XUESBse{6emWd5 zd**FSF2d717p|+jn)wp5c|YKCK={ZIG_&~aZt=*yilw<)Z=51%1>1+h%FuRWd8Xo5?`#=c z4m%qM@4O>Ekx&_Pp#)7;3-6qb!?(QSO63fYMk*X(ETLIsGaCv0VO?-ejN-J+-9}ij z^57C~>&=8!s91FVO0RlUg_L+aM<-m_J%GkkxqqxhhH5UotzKjo8}b!mc;4Jd%?4KH z-cq}i?g5Ql5~&^HWDz$FYNDx!T%2qj+1<-H3tK^$tt2;IBRg=lG4SYYBN#R6d!QUi z4TAy zqqpk(>~>w4(jM%llAR9%BK|&y>1w;J?^Yl#q;;Sifq=53(rQ&W75?!0Ce;fU?|z7d}qjg$vEY&y7*aG{Nt+MM_WwmAc-&T9wpqRVtO z$OYH~9VOeIVZFL4cYsb96heyfrKu&y+jgsT{3T}eTU`22V=XSS2}wht)!yVsBxbpG z*#-@amjx~&F0_9QeSuWql(#z0yh330OgWw_ zT>Hz_p7*e(AV0}^VWEUuQP)BVlnFiJ&UOgh0MR%}iYOoWS^dxd!CyV2e@@8l*{#YA znw`u;y>SkDz2Y%);lOi;pN*&XXhm8BCvWrT{Q--9xnAjf|A$1E4%LEvq*;P09?8dea1 zZkC>plX?pbNI2E8?uY)eFk5`_1M&)$LfDeK zlQec5^AItli~_q;wrHaRv7El_vxEb= zOaXfb(kB)?TB=#Hy?Ki%clA0aZ1w)RsEa=S6+oD0!fA{ zUYv@MuuJfsA=7WVe;)}Tvvy(vGKVL*trmz1F9F$G81+}so__$Y6sUdnib)C|4n^kg zp)~O+r?Ir@TIJv`WKKVtNUF3ku*hLaX_t7$;1GGzHCobdMAKG=7c3(xFhg-|#b9Utu5>p+BE?7ZM>5^-3f{@DGTN4Mb zyxPr!FMS6hNeW`W0Agr0kD|nh@ENpsarz$?ifsa*wAVvYBDOjskJ|)pyET$7e zkU1uh8=OVbojap5T@83;hU&pfGi?Jf&+!5D?plSrb3V=1qH{gUT1uBJp(Np^b~zbH zor0gg*Y^sfX?aS~L(xFEFrGJ3N0t724&R8bHCle;L{59@)M(_ zhM$<2G5e_3yAb0%7Fp}q_=KjB{^0rVu!rdl*uL{vjk6$k1HVsw^^e&{j0nz}9#e~@ zWPVj!W24S~2eNZ2=nBbww+BAc(9+pAHDaL0@?M*mj_u;KeO;tRTbSu?$Cd1$LI79n z^?|4U-37&!3Vl%eq=VPos`{0M*_+dUcThNx(GM1aebLLegOk>3~X{rlk~>?o%(6GTNsLN|8|ZN{v( z0qQ!5t?r`6)x~^{c3PRcf)LQ+qd({P{<(vfAE`ZZnCw}nL-&@PXq=s4UxiXG+jKbbkR8ag|c>J!~A-&uk+_?@C3gpi&t8ac3>_ZNJ zUwiIgC_sr7bx{_cvykI`xXf{f%X}7|S>!x=$m*AV@jF9<|F|WhL+5tj6^@v^`u*#} zkNba|xG4~s-aMILy3<%L8wcP^oFqtO9X#sEAnZ0&W^KXBI*9N#iqA-F3nf&hc0qnk z>2Foe3R(~7vZe7_y5vxkSI7A;gbTRjfBsw|3#4Go_HtrfaM!D(*CseMAfG_a#d0t* zBd=KCFr9Yf2x>5$8olq|&mnk858?cS4gxQLOWHjie4CNCTnzGY<%i#OE0!hP+5dZ5 z>T6CwnyewFJ%R>aX50TFKVk|*QC$8RQW7g1$crI)A#4f$KeH1|@l8Sd&yML?lZrtE zYg^Fx7zl^4Y|p&EaiouS)v3AkK&`eR7u4+Q+>{}uMjG5)mRQzGu;O@?2NnUTMe%|7 zKMoQfPfQ0t9*p7JbdY{r+e~rPcm;bzn?)oi8#g33PaXK9BQ{irF4Wfm_%?}->IFHk z;@+EN)Px%`!ya{P?jfQPs!^7qqHC&0V8$Eou;D59tO(Mgn+;*t<^@t$PPm)hQ<>?&vq3ml7>DuDKIw8&Q`n3G)T)J^S=LR^I=f zxDoGA0u5NfPqzc0IoQc_Kw1(u`8)*^So6Clc{%?JYP3i^5rFYF8{MW zkmVD4^2fxIbM~yW|HFs3sO1CcRZgQ3#^^t#_^ik9ZQvaQcrlXs1MZsXI=n6SbzQ>( ztylO$2uJ}x@jTR^eU}hv1l3Qb2Jv%ye>L*b8ci> zWidNiN|)29TP1mYX@oF~NsW9?NYwzjWl-Jv--af-$M%Vs^fQ;+@~w9v-FS@*^+zmI zzngX$tk-!gZQ9_Yg-)I+|9?-L0d))c(1vVT%ACjOXq*--bcCzpYvfWg!vFRCl3-uH zHJe-|OQ!u4F!Pz;6qsOHP^CkGaDpxMZD2-D7u%;A*V$7ga0y7S%y2Bo#{iq|qdm-> zu9nF$!8Pi3h=rr?gM9B4w7A5rEKQ(nwUVOD4sJt_2zjk8ky9Ffm^AtuEWN`t8c@rx z8G;RZOY$&q>g)2AfXI>tv;g=%Pz};RvX|gJQF^N*9!V|o<&iK zkqVj(Aa44v_ovdLO}Y{U+#d1)tQ9D;YOQO&&6X5pgck@WwY%Tt$6L*IUTm|jxv#Bp zkz%RA>nG7c+t{>)NmY$kBY=6i1quzqZc~EDcg4l0Kq__JmU*-r38+QvHn3}Go7$^A`Be0!1o+sM7Z2*&z5c_pB*2t2bB~`!#+yG zPlDSl$3nZ&7B?NgQ0^V`H@hjbk+E zpQW^r)0sfb5IDG*q&Fe5v_=)zi$)7xqO0R{Y})lS z`34w?3<5X7vH~4^%600HUh!%s}%Oa1TwOtHILR zR#XGnQsa44a$ ztBQ>~P=1f)GXhNGSnYZz{Yx2y?HN_7S;GH%)NHPrj?A87(5j+&gCKaKfJv?UU9qU9 zz3s&U-J(;HbSFn|jG5JG)NeXRrD7h+$Slmg^4lnNEu~ai#KI@83miDdTUCdNbjq|@ z{IqogjNiSlPJ3U0SofJhyDd<8#I`qV5f!p_9IPoTpM(A|``OUqzK2lCD&){{4t=NS z4XZWkfe&}ufT@h5uCK4s5Cbz_gkp3_i)wsg_Tbf)#!`3muWy2{EGk+YD%pV9Zc|9f zz`AlpKR;DvkxUk_#{>Ghk%L)NXNKG7J)S>64Tp_@+4Id9TlU6f)_95!cxUuCiRa1t zeUx&niytWSYJFgVmx8cG{N;X(yBturyP$L)DGd}%Cj-amAQ>O|5(&I5Gi)HIdchG` zP1A7~$Ku;%4Tke**}eBU+BZ_$=DlB+K6uCTu1L_4Kc}~GDk->l6r@gpIjp-EczSu0 zXd5eMiVSgFq>S6BLY8r?ks2RBi&l>HLk5=X@bZ~H`g~}H{v8k;zOy^Lwj6kwO5oc#=AzWIx^fMO0@mAFx1JIwO&zif;w}>4JPgeb`uUem6*M?E62%)wh?w)QF_&-ku10{;%q$OO`xI5aoykDKu=Z3c&(Qy^evF6 zWDVM?7$qNgO&Qh8j-ws6T6IFz+KVprLaI=5^l(3somROoO}7fwSTk<&(j_iu;ASox z@`;A;pP>}!9_b7Cb-!_e%KY_LsbxnD;Q6{XKRZ@6U}L} z2ZduVxjc8*hQcnsqj^Qn?XI>Nb@nG>vVlC-l3VFttInqWiMmB zypYa7k@rri#jD5cE|%GB92Sx_1Fn5ex_=JQ{%JH5SPL>Hb$Sz&=lq~JHHS!_ zFVTuEJ#sCf?H^wlhryfY!M1|Ldhz82%aMfH*UlFZXnGnm#dD@v%T=g>JK!XUhWn36 zhQ{5*BdHf>A5r$xV~y|Yc*RFKPb)@SRW3FBN&ZtLXRqn|Xa#p7Lo2!TW){qn5?elT zJmj?@d0NS!xX=MCQ>~d;sls`&sA^#eBZLQaoN{#1S&mWC>xo9F{N^UA`5U&V_ht~ad*}OZ zSG+d$e|SM*7yB4eVGZ3QuSz=;>>nF*soOS|eT|La@E8Q?1*s|VJu zb%In4OwI1X19t4r%CZ3Uw)JD5}?N0V;yQud(u6CfPIn~2{ ztXlJY1hHvFfz59Uo+?tCCQ68KmWm4{(8`t5J?GukZXb4YAf@v#UA1RiNTb2riOiiK z#6;Bv>5C`sXT07cnGdgy)a4l&_spz(61eL-TJ4=+-s-t&x_&<6nny*H<08neQ{@LMQ^V^eqg3fD7xr(4lNZ^)eK<;Ib5lOs z#|zdlNQ$k{wmKMbXiJ1s6j7p(R32Om}`Y>JX3@|S_ezB@Q<#A_zR zSKq~KYQ{5*ISwE_qh9)W^7#6HsZx9)>8l?`%d}q12R%jA_b z`6K~9CKp`~DczlipA)|(b6u7wMz5wL9-)064;Zwlh>%j%bb<>w8|GLTqx*MJm&_bk z;gtBzOg3>eLV*b$re0Bvoq^2@zGeuu5PT5iUsHWef^44|xf9_b&kgQgQV z1WVUL)~LUXi@5rBuLTJkuG?kltngEL^82N2I$dSDO+B*g;!BBdnGQkE+O;0C1RbPm zC1`&~HJ*;GFw1T5AQIm0@=VNes3TBl%cIV-9J^&y^KiG5Q%N zMD4F;M1W2N>^8G~_qk@ZwOQJ$)bX8sHb56P%$@FL2J)f4TApu02olAn(W@D8d(-Tu z`T;sYH0Q*`2j~$_pf&{U1T;rjcuYCz7RMt5D9L>ZmP7EX*#GM$a7y`Rsja>tb+DGs zL{i~6-QHU~Ru%JVc*Ki-6Lelg3^Yng)}`-+CzU>k2oO;^-I(n@taQGQpLil8R>wl; zhKcW7g<)tUQf+)dyl`OtR(73rO_0KFM4jaTdmYn^R-jGwT>B9ng$?Xu|22E)MAsvk zi79NWg^WywC8Y*?{=}~p5r8BB_qG^sJ5*n&SNzq({)@a-6&F^{2$0_1K!n-~kP6PW__l~;4Rwq? zHIJlRl|TRtUfkF9D=-B6K9;=s=?!J?Qoi01oZ6ccf9-+z&Z?I%O)#=1O9Ma!0ZE$NQj&PC8f91@mTr4!>o?Y%_}DD;p-+LXN*m82|W(`@P}O@Yr3< z<|v?v1=$}_$R($Vb|1EndYABPe}Rj!rN6PU)_GlgsFSUL8mY<5ugu5q`1U-MW)Ee1 zgA!;SInrQ1)b$$3s-kSY}~!mb$SwrltYSPYsPa`W%rhHwKwRNlkj0OImuBcBHivfE49>7QB%q<|onDVHf`AGh3XcsC_8->TFj6X{1~cr0?->9GNV@A`Rpn z0F%?X6wM|OXP6G|PFF8tRQX+GWZ-B20$(0kiy}v~ivGB6p6b7hr?Qk0qs+!LvKg!?nUdvGgAwTB1_vf6qLv z2{dp9!{$G;$Q(vlEe7;U5&r4w&U80pkNu}lp91=Jv0+80xa+o!>l_j0MP=RTQsAXm z*SNm1k(=(ey_M$pvcJBz?W#0&jQu>jHTAupI5|mx?0j0z@w&sl$I1oRPhVV3bQfeu{3Bt<26ue`39z;h;E8Wt7jacXek_GnlBGWdv+d*#{ zpC}zon$c#m%hJ19FagyfJW=sh-C$bvGDX|yi&Q*gt6`wB+tv>^CIz%M^6H%`lX`A@ z;PZ1qxnyuzAcNPhd49*TnHGFl9OZkjB#ZzaVbZGm$d^>Z?oTpvLw%11T}~^epwXw{hew$}rfntL^*KpW5_l zGBRbxZdfi^3F88TefvkC z(3O$%Vl`!R#c$L<2b~5e0-jQ+^sf|Af|IW}-`seD)OP}koReEwK>nC5tHi8BIg#M! z?UtsiW9NZwwOJ#pft7F3l97qf$Z{PZo)|G+?{{yG#o5}tp_A>?2tYb?_^dD0N-Ei3 zMh=ty6e?db4^+zlD4Wn+rfjWs=|el5(cC7|7mSsobn|dC6fZ zw>9yjy6Z&?8CaC?3$LEyvyW8$KdWxnUm(r&NwKz(1EkJ+d=vi2heW=t8K-k~X(Oxd zX#LMM4w>Hk@ZkwPuMCfI*NEB(H7sf?9@si1Syv)mp)szl`s!sx;X2r}$Y8eC3|yj% z-Di{=uZT(|a$LGGDx1D2N4&aI(aYKci`=&H03@XMQAd60vR@Ma3}}SC3P5t@@J#(t z5z*e^36gZQR{u&wfFn|a=JaWM&@dgaSQFRW^T)+2RyQ^%nGATU#l6A+i~8kT;te}~ zcR~1$sw=lu93|d=FPx<1?S*x9@sA`Jw7D>yM(Z?2OaD- z{0@WOe=YI<&94Xy@E}K`AA|G+a9Y+)@htF+JovwIJ|op3pejl;@?UTKCn5ZI3h@8@ zue6iH2(sH-0s=-qFk>PDCac5LbA{f^$RPY)SJ3#Pnwj?uH%w!3zaG_2BMX!O=p>g)0Z|LU&nw^pGg9T0CiVwoNJ8>&2l<;?;052GpKGc& zZ|(hB=tEBOkd5r9z5sHH5q0}kKc)n%rOG%}+jY#V&f=?G2*1QskoUx?GYc@Jm*=_T zACJsT`GKg~aBtbG$*6Wmsg-=tK5lo1!fSol{0ykvkiu9z_07yCS-i&1iXLICd2K27 zJ5~HE8bY*^8+K^5layE7REzS3A^VF?vOz?Gz~lGT1)?8pAOO<@6QbYX>!B~J4_Y6( zpjmR)5t3e^YafAD0g4D@ql)z^{4vVhKH^ETL5+BDCJL4{fudPlBN#(zsy|bb@=p`eA}t^$mcup!vCZrT;f_+;htKcCj34GO{*GBaY0)gO zUT@1T9;cs+jk`NeThp{v#@m|_c*E0Z0bg+XR2w@tA3M*jPAR(t(@QQe+l8&1;hS`B zr8&=Z0u9!{6F{BoYimWO4Th4-qgB0iy(!{a9Jyk?JM3SXL_M*$af*>`&OfUOaKG6& zJxnT0YW9uRm?9O0r>^Uj$A&n{sH;?#{QJcIZ8y`^3mCN7PcT0WW>UT*_QFQ`ljZ*fiQkzr3BFb-Smw_xaJy!<%KV~j zWHWZ|<)Sk_V7T=U8{_{yCu-B1uM{gSrLo@=O*jBWkv98(8+vjJ`3EZ(D2p~`?{Itu z(rp`q&o4gI_GSR%U%mV*O$ULemCw{*T%mz&=Vfc`yH#xiW}5d3tqobrLB8WC-`SWY zE}H`9F}7)=PPT8%+ZREiR6SLyrle$rn43nc_TdDvJG1Kbgc32h1x!od+TpFR!VTJJ zNw{S@zTV1$_jTHzLi8@*<5`T4LoWfy=awp%$UlIT$tXZCTUCzYZ$O$rDdeskmk=PT z3jui*plvhu-a^s#?lK)`{HoBoCujSU(JNOP5C@`yzQ6cFz-BeWWG#dWk3hBW#7L)% zI@URWEIy?_7GcYqIg|jbRch%W?5xAW;$kuoE175s766+v_ugAqV5*M8rR>5LpBnMq zE9S=>@)txf$%;~x`B6KpF zQy?0mWN;O~fGU@X8aM0VF?H~kxkH01g;%0%`mZ#ER7+EC?Eh4vGcm+0!3-`>c*{)e zO?wN2uGN0)_HzUvkfC7Xz)dFdo3l7{lz_5$@K^u%3t|4NBNtUNza9TU26~W`&!rUu zt!>GD1EMF;lF!V5!vp{SVf8# zm9Z`&;UwMdr)iq+%XjJm))sITV;;|{!mDy%e!}i|oz`5(IQgp^J{c9XzZ&cAiu{ZQ z{b$w%)?XzT4mXeSIjU`7T)|M$44LnE8QNPU1EZ0tE=)g#vG8)<|YeTvxj-kGbCK-ESn}N zU9pA5oj$1-EJTAZfQ7uxK@ul@vRSI(7&ZO#wVTAa{;8x7pcY~*V_c-QA>_$0cOJIi z<9-mLPOtSVe$Al4x8m!iuUeT*VzY}5e4m0!38FAJ~DSaQ0ycs69B_O`quN}FqWLy?~y;i1f1GE$8= zhOuubESj$W}yi;ChrJWIgMxv%=QB{yhX{1fE(&4(?= zC@f!!lPZK1f;xKOr1O)rG`-(*K1P6|)vpHDh`8A{qbf&_8J{s1bekGpz5pgg%!(a* zB)B>N1$Fw)1W@k|qJD5MCF$g==y6Jq1=Gne8pd+K>^z0M9kPykJt&a#H4R+Y1_sjV z+j6pk>(U_4N1ufUxxtIC=y~<0J{ri?^h4lwH!04cM*>CrvZLBFilMy6CNSOO6cb;7 zE$W@l%8b$XOz#%}Nv!5%kqtP~KsCgZ*9>&{T0+_JH;9}S-Ugrz17Rh0GvOsvuD^~m zAPju?JDPv8)|4aSqy%V$;t?x6$y@oc@CRbW-`YlHQ}hb~F3C@=0o>!)dXb6F2DdqN zbY^Q#N;VOx!=gTraS2wi{X8cLuSC@{nAm{_l}7c~sj(ZR(K$&h_FIFtuT}UDgEGsP zRXGGnNW!C=#g013S?*{ov#V|57mo2x)MLDc%Fr#H*2x&Tz!+V23M9V&=Y`Re{TI~s0F80Q9Reu zTa3HT%rx@RB7h+3L{P6Im;AALr7t9?g}?j7`lHwIwueevh0Fn2|kt4`>yD zEbEAnIT&SM&%ZXz_@4;S`{j&KByR-Ydn3WCYdIjeX|VbV^j?Zwn0i7)#7YLwMgf_* z>VQXU<+-YI`c)TV16&eQCye+S(LT4wqh?Uh-X+KRJnv4&>uL+TTNxh3QJJJwt2Jtq zZA(V1?n}Mauy5QU^i~LIZ%>y82K(1c<4a{)HeOCV4usVA*tLaUT)1_Yk_SKgzel!n zaw_I=oul&k-baI%wr;Jp*=~w1fI<-83OJHO)YWuC5E1mA6Z29sOf78}2%C|-%+vofBVD{wMx+C z0!80Jdp`jK{!BE$o>Aie+HhjG!GS`NRjRe>B|~3pv8H&_m-k!?O%2nDpd&l?K8iQg z_PEQ&zw^5HmDjzf2lmQa2BYMT8+*acrEG1s9>uSSoPD}#l7&@@P#Kq*kKgcbULq7F zytV6jSyfsDJ1yz_EPaDa0wX+XJ|L#whC9u_Y~>1Y ze`q<1DlQ%|a` znjUvqiUXAvb{eCgGcQU_wV3mPT7OXAZ1_bUcX~scFPTuj9wC`H&e{H}Y72|c32P-$ zOcW&{T1vV~O-{i5-nvj*!L;1x6mg-#ArbiW=8FmLZ2xhUG#s#=C!&IYSnUT|qVNCk z2@3d0rO|`e;ZBoUOF4_-AGr*0Q;MPu#Yc?)2_njs0*dFc803IMuXH<*Zap7yhVr9X zyi!EFQ^d;?d$*mJ0#|rZ`3RJ z393cPRG3e41G#4{RjGjfF@N|7kun#QjsSbjBMIP|^D$yibW{b<>E2NAT1vFXWz*_h zZ}X_zJd8yYpf|iikz+zM%Btl(1Hi}a=D%EiETg-AJt9Lc!L!FV)nm}WHceP*bl3y#6o!RztyR3_! zXZgYQ2Av6;38w?!`Vc#&K-ivQ2Qluihszgeuv0shfMJjw;BIw?QeTM5cA-V@ucl~# zaUaF*ON`=WrZ=A*quO)X$EXUl(eo9^lip_sAe)+k0M30-T93$(sGGZ?AQ_YQ75tzF5?ad8^uilz2aQw58jROy}h%qUL{Hal>E&pum!Txzkfd;pE0 zgyJ9-ZdHzfGxY_migblk=x}GSNI#o*Zd)22W0%g%*wjqZ34WuZH3j%i^I879YWlGP z4T5Grw8OSF96O4mijfLD0XWRhZ7>(F81B~1$HbfZV{Lu8a#%pZ{@j*HmLuq{y8V&C zMA1F7-6cX#E3#h0eY{MjmI>%IP`u7L0t62DMH~AGZxd3!hb+o^H_xtY^>RNp+F$D3 zTeV=@nSTKr=!KX8{;Rsv!-tpcynyG|w)JKv)xczX7psh%+#ylL+pk{>61LkR`T9n zAYv3GA~psrjey|#1stBjT04kQz$Kw)A_-TZx3RXS#<=A`IG}kQx!Zjb&CQlj1!<80 zJYe@nfp`ib9aZnYRfY>y3d1RB1aV^c>+ zBKD#55EX`?>m|hH8@Yg#_Km`%)FCV9(yis=pB5Utdjt4#k5ASN-ix zP89r5%;-#{8#HjqZ{NE!gnF{>%gc?Q-Fk58=>hviw9I;c6B9crhUTVy_WSSI3C0<- z!hd@4G5SCQ0Wc0#SzcK&0~r`FaBwY({n`)kDXgwYagoacLS{f7fs5h7OXSHyQH=NM zqG*w`Gh^AEOHdd6~`V!kpQ8Vk4pjeXE-q;4ePm9QG$(*%OFVq4*c9tTk z9Sw#p9_LvI(JMD9S3C=sbTf;~nwGfx6Qw~1{p+tYQ3ajt1C53_{{g-pMe2$E0)Fdl z!KI$|es=!{ZIUx4GWV0Z>=L9!Qca1Irx#KrLFw(LYc zT%(92bp-gpo&4)ZL*`!9{a?g=Wk6Ni);1hO5TrywN)QwTq`N^%q*NrNQ#v*+sWbu` z0g(m)rMsnj(;(forE}BGH#d6D^`86w|2&>w!dh#NIp&ySJkN+~dh=J`r0J*oHf$|& z^9v=5<>}(PyR%>8Q)V+9Iabj)=tKZ0{?(ML!i(-JH1$uwgX|LTXZ%@MopbNxL(sTe zdpIwaeW60+v{;0~)W~}<^Jx2HPEFmx{g@T`8HEqhx1rf?;^m-A>({~}>FjV{IG7m7 zWmyWdm^zG0UvcE-N%*1yAI@?6#DG|it%HpzyE4CZYRJoF^I$-Oz z71uz~kj~?0Y&THUocsFt(fC4rA$C9E;Qhh*08O3mK}bp}bMC0N=2Yk8;9|?olrLoRhESnV8afR z2gb~zc#A0eQ0GuS%#qejk*w&kLpVmIyx>}1+{MG>Wb;K3R6{9mASRKWc#wq> z(z4bF$I4t`_2-oPgGK847+hvtw1cmYA&nyKG0@n zW_e2oP|UBGM^xA$DsB%|uU6Zf#Zd}u<40<-_$a%s4V~)+@cKp$gVTx$-r3ASWL;3&47HQ*~>U!?iEfH87fzKBeeftW9?dcpi_+ zRy{MH4e`V|Z+&Ae&om(@+G%-@3P1@lpaB80liZrTT^sJJ1<>aqkyXzNv;akBEe;D$=cV0OYvfz*f`%gFY65;F!soDYg`WjZQUEg zVGR6HLUYjPM*##G0-F`72{b#PTmR{XwdW}k#u$cqD;%i$k|o7Kz7Ux90`bngJlF*F zl%QYT$#6J$jmCvpS@9ppF0u$Ilc9AUP)w$!p1i_{d394gld+9Z%NvS}MHoq*`|Edl z69AxFr}p+siH(A#*n*qj9$6&#q#p1+jXpO3Ju*5mb8(<#2E56gvho_s`Q|`S9kYJ2 zza~C%ufXI-3ZQa)Bg=k(BxVqMA)7cA^j`;z+6(DF1Z9r&Yi}#pf&Bc-(A`AalJiYT zGS98b^cuIpnOxA>Z+|EoJLzl%4`XI;N5}K@t>wCIHxLvf+rU*7R(`q}N8XYT4E|l3SEl*b#V_pw1rLHz+lKgP=zRD*4(%pehCA z!MoVluyRsZ0AF_1rj^9lXa8r@eIsj-R2Tl&}CeH9rVBk3snM@+;5pmk|K+^j)E$$^#@6oO4_2|R<~Go=$g zM{~|A@j(& z7X{jj07+T`bQnmlUmdzTn5R=W{leC*taZA^6(lRMF&D& zbsW|6&zu0L7^U;;{WyZD<& z^`+9fa>0`ws3^f0@=pWVKcna!`}PM58_TTzw1vN*no=;7>N4h3@e(qvlvUe%F1ldE zrQ!>Z626#^N<7P4&96H@i=3I+Tp$UxAaUTW1qunq!5~+sSJN2&PgRb(2mPq#Q?0dP)8 zE($2Q#uPYgDK)?n=u5G@?#Q&F?^Zf5RSmwN@HBr!@rnW}d}6X8Y}`X`4J!1$lL}3Y zqhL5IIa0l@^QgH#VuE;VU&Q}8Pn6WnoaINU%jv|7M*})>MjT$2mFcRwr+&XPuLszd z<=9gP#F@hvaL`X2UIe8jw^yV)-OhccmbuUp8(MihZ%&+>MywN(qGkWRIwyNce(X7a zCGOYMHDze3sbQ&!3WAz9Ss1{t_Cy|+8F4drSHQ$cvmg5i-~KxT&5dQNE#8es}QV__OP+(<7r8cKt$^qJ$3v7 za1p>rQb3vs#wZSj$M&?}iD0-LNxnUT22sSG;!mTIO*VKn$(k zwx_mwfq^J8VF%9sQw#*J;Is} zD}p+qEi*!=H+jhM&_V*oUhkJJbrBlIHcS zoE8iGujoL&_GJ}glHgofcUJ0!RYFInSq>J=`g{&biCddlxrZPgnqMfK1Pl6cm+eFYFRBDCUnjVfKOPCE3b|_{x5)+QH;KFn&bjVAP-{i(^RJ ztX(@F(Da!?!Zi{gpX88U=RFc#+K<(n;YReCx>;WVTi>Tx#177qHVOZ5X?`7J#QXSt zrVJsH)CL>Dv^<3y#c=`d-rE3YZgQdSq&5QVH>f+SoAV4^)l-j zVG&fCszTKb;E{nt4FlMAskIxXGrt$?CZl)}8ea!X>t+h$7kSfYMr|l3l$7g@nzgPz z7(UCk#a+i-*;5+&@vL;H6i+_{&FppcuGQ;a_taElPBY@#D5#5E)8pZ zPAc6AxW5B4sg3b0VRdG0!cK)ro+)#c{OX+#Ztr|uH zKY=MafB(VSbz)+VJ>Is1K1#>q`xdhk28mXO>FL2n9FKKkYwzYdbi;orF)bIa4fuP2 z5ZZG87J%vZQJ5QKo=)%c!62{MV6?WSq5iiKK_wTi>QoGt4^dCun>&j@F&ikd%Krg4 z?K4dWhXA`W{h&c9EO8^_ScDIc#psuXti-WE>&XfPz;}k5Ps}J=Kt@xN)X#gYRez;O z-C*>!a-fZ&(6W9-p-!wsyaeiRkB0I+hTI9>{_m<6=bUGjJht;B$&{tfrz$<279zCs zcGV(TgpLOyd+V|)cTOj)N4GgxLLZXPAd^HYdov3pgNQOGfW5Acedwn$Zt|Ll4_MM% zs+_ou)1(YIZ%PU7Nwz<~3R5%~0K+x*{_N4}k?Ci8 zJT+2&X;SGBwvfNK{0He-DB7TObxw>4pT|Ykis8`RC5sj!KGwdz=fEAU?XBF)XMxVv z#A`)l^aQR^ulWuSAK}OK|6bjqcskz0P{1l?%C}&otyME;xF4CVXjA+dL;p>dQL4Cw z??5R8KHOLYE({=4cYv687~^2CCA}Sfkyd0ym>x=xmD{j>`w--5K1P-%DTna8NNE5nG&dJHLk2gC$lW145lZDTTAsEfY}JJe zn2jg-uZN23na0zhJG`vPz)iqQ(59xZjRiv)OGMBI{T=P|%HNkehJZju3?yab zpSN_qua&thT1;w0f@Ub3Adwl_>mLL>cvVNI{#s`elJ1wjNp*Klh6MMEb>fS6zGt26 zIVIwqOEG%%&jP|;Au9&-om3fe?x0Wq+Fk)<36uvpm8LZ6AOV_#6n>>a_D?0q-Hs02w+ z?pSPOObLoEMJd89oeT1MMggsm%Yy0p=IX3`Z6;-h9}=p(+IBw*?V+)rqngp_C&u}y zq^0pauLtFeb2m=7ah9d>UHJNQ^c8Wk7c3H6%=O0t%~e)jXK2}N(`HuwwMhxCR(G&+XReSs@g={~9tg<(lP5o!l>9RF zYN}*94!I|wN~rE&<_*rC{P?lI=gG-8)!LI}yOOh@wrmoAX z4Ty5Vv+bs2dNE{?HOd#PUnigk8&=18f6#Jk{Bqbl`N#EP3X{4^1HIDoBS;sJnTQht zkoRs)a|aEv$(rnnrq-)TPVNy@xE1=*w4yxU45Of~UjvlaUqBCDddX78KLjc^R<8cgTp&(*X|5?4S5R)umU`&woA?OFQ5EW$Y zvDV;ulkxPhPWUkEvMMwAyAk5B1(ec(5l1c3u^?5LZ(CyfzRv0R$ePP;m8ztEZkeey(g-;< z!&9XPcM_QB<$gF-Zol%<6398IM7hXDFfUfUD0*VbExTgCjxSvoa7vpe!zT+ zD5Mj*090kzw#)%cj$0ZM23_qy8S3qI`au)%|0I}S zQK(ipFfhUj0&H=->ZxFt#hN6s)+ZryLD?n{IfFT`;CE2$vHrD^azFSE@Vm1R;Ec7E zfm!w6iJ3JsS_^&PDGNc&m2G&ofkn#5-~26eWFMJd`9Cdl6>eZk=&MtZyf~1{*1|1f zBpG6G6PEvdku-N2%vsi(j0Kn_4H>f7PgLXnRU?Ies7HGz-dY0~bY&pjT&Z%1zRdA> z99TIp&@IE;iPC^~8q_oxFlkmir!hw^!@h@a>1*%R`0qZef926k5kNf;ij#zZhJ#$e z&rBL=@+-qYmoz~q24J#O;Xnb-z!Imym|k@#n^T#Y*$?21$royX&cEcZb?U%5c;k&+ zq6yExB)a)4Rae*kU$6Y9#OuFuMgBYM_@9;jcjETng!kW&WDe-n_L}l|YCz%a962Xr z`l{pDpZt}%Ja6st2br1b3!Y*rFz_b*|9ZrM_2ubE?d7Fm2WlJ7!GsS}S2 zkCXS*@{+1z@`1}p)pY5><|fW+!|GiXv{(KtHlP3yAH03{(O z9q(--=|2V;<}c5dY zja%m0z!w)kjfrR{#~AKW=p*mtj3<32_;Qj9_Co?+--`mE>u0g5OwzBnCe()#N6E?>H=1TQ z;iJQgQm>^(uW@(pr@dwp>>w&vOsiVtr5S_Y^rN)!A4Q*3f_8oSIv>^rx$o0P0XHOm zN6iLf|w{f@8-X}TRiHU($J(7l&;wx%-8**%HU+g1IrDgC~ItjavKh) zbrVTXE>@V5lQEaN@4ww`?nc-c$uQh#CntUqFv+Iii28`Zt~zTi==XCUSn5Vb@!>ku zE~#$d!oM$jikv8Jt)F;SQx|@kB2V9!ql_^P7}ahj>AGDg-}~L~E(UMy{Y74zq_;52y=N5FPDs>H-2mU*B zs=l15xtuxgIrUf)+B)9=gZK_6tm;ZPhKDt}s$OH>mv{$u?H%&7kXq1O`66wR_mg{2 z?|B3tU%mGe@(}^P z|9V*PV#QJnkpkuPMZTco^q0)S$c-$ac$aSzmI5_|&N6wN+uwG^ z!rdk(I@Bk^)F{Vr%a8LiyD>3Odx8h5%NBWI*86=V0{(h2ym%DYdtuj0Sne{Hse=gL{p^q;WH-5)c}vFG zII@kOd-=GhjCaGjm)w7yW2#Jjt_xCi*E$UO@E2DPFAmE0*qmH&O{>GhNvb_6T_PG_ zZ}Y`RZ{;0B7hSBtq_NYyTFvc%9WI!_%x-obnFlxaDN2-XO8+6Ny!#jP81>KlKy*4@02au>J62eI!F@lsVPhvTBH-zlw z7N>qyPT0oyj1_^Zd`fuSy>aKa}&F*=^R+ayjOT zp!30(F^FIPi^@*ZCybBzN`0{;Vq)ReuATYFqkgubb0#aydXK0sn8-5B_lR8mAgW%79#k6iA~ZCrL>yR3o_rtZdm z7GCl~*>>@0Am;E@vasi7kqpzb{*^tD#=1RFA{()=u+W$w=@s>8>*ZZ^IdM!3q&*5T zgu=!Bt9)dsla}W((n*A!28bv5#13Tj{EO-T*?D#@*h86cLCb17Sm;Il%jckM)g)fbw zC5%Qox;5?h`F}xW2$cI=u+WkFECkqKX|n^y2kvEv>2P zX<;s|NPm`yFT1X2^mpvs3=IuI9k95#cv=Ek<}0i%kB?P+iHDT3>;!^*C!H7yk_cVo z7ov7S+_1ps*+k@IWtmx8wn*dIJ38)+K6r?+xVpT|8ba2csg%B*jY?N*)cJXOT04Gg zbE*n5ZxS1i3?9OD|SDkm>*M><76g|NhSKjTs_;O}UFCsp1u){{a{$&1fcIM{l>RN=&%rK%@fjs=5D*3Du z5YyAsuNaI{e6R6fO$N!q{hknfCq9oY z)j$n7_wh$woSAX(rluz6na$~%iIU>*T1Nw`Eg7?eakTkGR_Kblx;p#5`XqC>5UM;+ z!y1m=@yjr>;yF>AUbMvoDW+?4Q^-WLXHOLxV9Y0q$;q}@$lWXDdYfkUl*7R51?}qW z!<>~7L!Il{Y|C$?K1=p37QBKkRtVt#R1 zP^)Zap{0;80pwx)W(6G?8X6iIiIY+xA|e7!RX$c1$txQf85qEijw(*Ae#+|t6>@ft zHU&QhP*?8s($YI(Ki_?k`c`8wO96e6(ax*l`+gI4O_DW1zP_Qk*=I##V`F()*IHg) zUQrQ`$f7cJmU+&=z#uJwyNUdayB}s;X)%ogm^lP0`|Wa^mvf zi!=D@y}go^Abl&VJi4PNf^nC?O_yRuBfL)-L5*{)Owq1pSw%XyXGkA2@ee*@pZ ziq&0k+`>74dB$E1<#o!7AiNJ{tY-{1bVS_*xmedA$;>*n!G`1pubx|ksQOE)q~&MK zLd?w>t3;2oQa&A873Sl1P@}>y@a{>Fk6;;x6y6P(Tkg1Mc}INBIYp# zu6A|?Rs~>EZ}ol9#8$3#m5zAJ(0+_u!UjVZIHh;J0%k3{u1!O?A@KC3O=kr%3b9j? zIl@iuL{@J%9f;afZ zX!m}(reRdek}XwilaR0_XRAVjb;ZTKO$F$T#!*eEF^kCb zDtJo*Zwzbd=!CvV#2cENT-RpP#K^&dxCYjD7>>NzxuvYC3Qw=O?TEEj^;VVaTBM4F zl?E2Z9&9SV%^=qF+9I*d$VwuqyNwf3JyjmxG>R3w+U^kQ-L)~xgWUOA!*{ATn{vM^ z8siWgP6e2IeOdBz#U}iYyzjs+@QRp&Fv^Y6@9?29GFQ~1XdLhaZM1U=DtXz^v_rOr zrIO6dc208qazEb7YJY+6r-!VKmjcb_Un8JU+^##&h;4RuJ&w1Y1s+26Y-x)L?l^ z8NidQ+}hg8Iw{Q7Z8rQg#O*l&xPYk@QhmfH6L@S<+v_Wj)wn-I*AB(%5#LA;w*4h&q-10Sdzxh+S?<1x5Z9KOcjS}g zmu=F0Tv^d?NW}(ROD27VqXe*Z@g+$6HjQr7@uSH1TER6Q?!2}Z_BHEv=Qr1;9q~TY zODo3bLpn0gaTlFGV{{ReZymRp&3zHL)~9zU9N1hM=kModv($j|vn`C~2&FO!a}rVA zOVRG(IL%%(`)2+ih>YGCrYL7AQoL#QZwY-fhl)Fnd`hY-bL-tZtkHfXW>;)(M2H(8TL$LbS-QzrNoTs3cN9)){0%JsaF|`2)2Pb;4*p~f$ z2{0d<{Jp4{dHNAPbVJ{zfQDMb8J_-r_443?Fzj7-tH!!bpZu9ZGhD!4!3_9~#ARs59ch+|f z|=xataG*1~J5!uicQ^8=>TU`r{@s|tPk_h#;J#GNJvPM+nq1Y-b%fT zg1=|}xjWkV^~THZCtA>Z!;Bzl0WY?sZG@8tly7%+qk@J!KB|Sexj0S7Ipytb)w+59 zyE`PkZ4tHu)D1foyEi}AfX1CU$@%%A6Igb)lMp4sVY1GaCVvg6J+#G{9wnDe#`N0M zuP)&*?y(pvLSOP4DNIi{wzBFeZR49vK=&~Z*VLxKzeo1A*2m7l-o7A)-p;}z2N-bU z_bVoQoz%T(zpt+)Z zvDVlRjk4R*6oX%kTox81gqw87iX!O^jZ>^ zcR3qZ3k!=qqIa~@8)2?tXoreQXP>^$M98pjNGcrpqjr(q!<=k!#$FWq92x>Y&`%ke z#{bJ&^LGsR^xkh*%E68t%bLqdnaYm5q_p(DNli<8y9{R&6t4obmZ@BSQ>0xwRppc# z(@Eq1AoAHh`iwuxu`^93E^CM~DJdyy2Pb>{Z5wxG>tbBuE~^3RxxxEG&h;( zf?nTbpHYJ*KN#b(-aFE8=Tw6BN-|UANl8ihnVAi)*1+K;6D1&rGr4TfilqVn6g14_ z;4rB4zBY-q?N{Q-Hc!X1Gq7~Vu6oVc++`;Y32lZx*J?imI&0Ot53=2?thNpn z^t=%C+WgoS@mF4c2kbsuRFyAgJ>T_~qOtrOxUh5}wPqPbOHJ9-lqpL8^6e^fal+_U zhA^T6C+)cbP5RpmzSNkNX^~NjHP_DmQq=g|R8vRoV}9$}h?@gS?6eLpEgc=gwxqn= zHAoDs6GQ9Z{&^cCp`VUh<(t@TRwRZ7_B~$MJ=XOtya`(VQ26#yAUrFJ!4*$J!P1h+ zHX0>*R+ztAG4F8kCWe53zzd8+#oNipPz|=aX_TbDh+wF(d8Hw5q@^)jA@9=8n{J8H zQmfq}Jeqsb&2<@E0xI9)(Zg#pAw{$_N18Myq^S108#KGu_%L^z|JSaylj}qjG(0d?t^t80Jbz+7@eus|S?*#?* zvFkYE10+fqkt#bYKd4OD*^_R|lbDMjP~XPiUL74HBO`mw6qNrAwsdj2RgMNpu6_Z6 z;s8!g&M#^5sds!iovut=hwtWN_P5>lrtQ|CKaY)-GQqkZR_e< z)h))V8S!&x6-8p3p_tTzz3n^w6tumTWp}rdx!R4LN6!^TuWlar*{rDj& zN)qXaBStj8EQ{zh2rU)i(6D{$jp4;Rhpp5mmn_s?N}~88@&fPZTHujS{*Ek>ND^@L zsAJ&fx46}07$UQ9%0{ANWA!6Eo;hqMgn+y%ICp8=jjgH;6>%2Zk7J{w0WW|j%`2La zJmgOTd9I}7ZMF_#b7||*zCx-QX76LQyEsY_Va0s+wBt0oi}N(0lp;_rU8<;%xeT~a zmPNjrmKFsA7;DeX#WnU@jK~|}t*@fpx94tl@v106&EM_q?RC4=zOTJSFd)2kZw%YW zhj(V9fgs>{!MAVd9P?hR0a4x)zPld~jef+0Z;kp&&^PKq<>LU8EfSQ|HHd~&zux9U zPy2<3O4$Ai?ZdhdTqLBVU}!@`X_l6hlvE$^BQ3_WL&>QzZP07Bw628>ee~`EdB%3S z8X9B_8dbZ%e-9|Y=F`&B3MgPC%m^Ke3GH~)f|Vw)E5p_eE?gWgwq}*i+F)S*T%0Pqk9)j4 z%P~hvbe#`WF{lE9{HTyKPy)4GTSR~AQ|I4gevGx_aILL<=kQJ#QYVn$Y4E>n%F};P zdvM|Zf!6&Bw;mu7DqGmUkxERY9k(PWF@7lAD{^@Th-(2Jol7K#N)21VwBr~eA+|%lD}D#@D7PZ5ws6z$mcE4!*iMe z#D)K)xp7kHieLHVbznlo|9KK_aA>FqqM0xagaerO^?!@@m)ug~kue$ag&pdG;Ad)3 zhbgZ-y~5etOUqe2?k~dk^oWLhN@%!ha@8T`;!b?xtgc0 zV8a0PtrTAXX8-$b&#ns^$Fm+q=DSJ$(zEaWL_iCFeSCl|0EZvQyzSs+d?CRPzt#Y# zOt%$Top2aIr0u zIX`^%cq!?!KdN>Q!*d%0PiXHW@(F5$|9ZmC;!!uH(4^bQ^cgr8;m@A7zW)B%{q(@d zsTH;E<1UC2&Lc#Q36aYyq(yG~e?%7Zvm23yx96(Gmo>M@(@7rn^;S4gVR1W6SLF6X zqpOUO#`Frm_IYHC1Ykd<2N&O>L_UlF`@cV=t1=dj!&67HT^@VCqIhc{i(X&wSG4g+lq3`Gh&!1ufBpW5-JCXsw= zy-<07x(Eerz#JWxjw);%^hHeqFH@Rub7ukz=SX{grQ z;?WYodS+CYl=v*p&(EjhQ51>iu$oy};od-5i;2E_cVe4K5 z&lE?O4^md)HPdqXV{4qS(0f9aB_*5!0+wf?2z|%?G?@S(4c6F4UkNi+5J- zjk;tkJR_L?Igz}%r|ZQLU}rI@aoQapMvr%g{o3;X!)m3(zZS70H*=f8Ae(V_J-}(M znU?56fOni`@Zv5%tLowMqnbaS1>WGS@O7wxL=HM01WRK5*_UmvhkvePHt{v4jriyP zsL}8cd9P&1R_#=2BOx1%CTZ4DYio@MrbQW_f^Hp0URqN%A@#*|vzAOuNRT-)W7&S` z{nb9SL}8;@wf%8+P`eNUPCS!mi`7F%n-ed7${)JpqFauw&Dc%e$+dal8n(s;8JE>C3Jbb`E_4Z2n^!2*dzc%2!{^KA|lPf;s@!ScF6jI~%;p;hx0g4})5&ZpD z60)`moFaEHZ$;$txK{);{qo%9@!X98GZ^}k#lhH;OFEI`b}*g-zE}+IX6pJ$p@_c; zCj68xnI7`G<8B_$^%o;kwH~={4og*58hoSpi%0YG)cuXYAwtWzpT52fV^f`1`UyIS z+m9>ryWiRI>csSAk5bhKM3CU(W(?;)3pY~GU*sJGD~=QHqs$d>s>(Zz+ax(4R2gy` z(O#T9yD~!~IBvFr?3fFB&>2T_GUyb^LsPW2XhsCRt=$=pt77Fz^I)j(Znv!V_C^x_ zX(MC4Yr~A^wiiA4{y<=(Wv&zgdGKE>J}`wE6FA)}H>AH1Qsimpu4Tyj&^CEBa)>5-g9F@#BW`n%u^tNuqhYLEbbC`e9 zc^41M+XkL>q2sI9mV2(|{9muliQwB5;`7+0OWM9g3J!L2+}3#K*3S~eJ}0b6*qQZY zRmf?^(!030_+~2?jE=VTN3}B|Wi1qb1lsMD(aU^$2;Te8?eyn{&{yzH+w8`H=edHX z7xeJ%BTq6|*chidbON(f7<~Lv1Mo~0<9XTG*m|f!tnKeZ;VmsKL8zGEUH3`X%El)r z$>~aOguhZ}U;NK)$zl2*gB1TH25AqEfmSlF2l_kg!tPmu!vtjI(L3cdu&=GIZd-Rh zB9RvkmQX%5zStdJ#fO{BZjAaU$V=PnLF7lEe8AEgDex!M+Aef-s3urFws~34IgH@s z`?0fAWEvC_@ZFU*1bH}+_mM=5lBiwvO3xHu7GkQLP9Iq7l0@X!eV8QAuQ}AnJE44g zFjp*s@NzipuHNog)80-v6tR5v0F|Pbm8>33$az~=QnKaZoY6CV^6Bi?ccwXT(|e%D zM`h&+Xd=&MSxCU<)cf^s2Eyl&-LPpdf=klQtp($9G!>ZL?YI*W++1>?>EJGY761F) zbw%-xrSY|~3a1T>4e)wx8@?aLK8IT~ip8Zn>gpOA@=`q@Ok6O^$x}-lyhlPZR$@BP z*Z0xX`u34aj8uaHACMo+_K|@SpxbB zd4mGcS!Rc0bHb3NiFwG0f3!5lY3WE99we^68Bbw#UUYuHyt1+as6Ct)-2ZxDi#}9b z-f1(9?w$(#RCxKJY`A@sQ5VuQ_oBzb11&llUb4fm#j3Rzxf|`^Lr8gu0F7tz09z zY7PWOZd??Fh7U(3ED4|qA}uEO}XT=61Rv`x`_ge*8dvN5=Y+P~Lo?iK2J zlt^`@JI#J#znmUmBF6469sEo;HSvQNWgi4;Hr3f0hAmlE8m%KYgQyjJH_Pdmy(tS(Pzv+e?L1H z*Fr4SBk21!*c!mL{o&pic;iQVdwX47av+5Er)fwa9aRz~{Q!?Xeea`)lm4!d7yWZ% z`18p<^x-a0V&>}N0w|7;?*ak&#@cLetPAc>@sAef^N$;i%NJjdt_4%&b8t*dOtAGa z1#s$;l4y%*+r1J;A8a5=#;tmeH9{$$n3mvGgCbV{+PMp7c>^m(s&Q!hmhNhsQs)lQ zUuCyPg0E?+4bTk(|3)r0g$str!!|f+J^@3e>Od|vm-Y8we&VM`zr9k;K*g{)IAgE3 zKnmZcRF-UIlognBl!J-3Fs zx)qpz5NB0s3N+N+-MzH56chL6P1Yq4qJiK%H#Zma;NW2XZdY$_Dr17e;ojaW6&3x* zUU#biPWCkf3blPKY9s{&!i`Qf(28);t6W@sO)~u+%b`8}GP#p+oz$2p(G_SDY z=pvklSP2xmYqA0)64gJK9?zB@#?qp3GQQR9@xy=%h#%&eCMh82|D&PRkR`p zb#FX(fuPThBC1aBd7g31T-2~6SRPr=EN_vDV7Sl!4As_BsFz7DtprtN#StwGiN!ZS z=zSLzS-f#Gkx=p5OWG23tm8BaAhrNq&>+iHr{=?bupdCFhwancHG#5nmQ%r_0~Q~P zHG(Wh{Bk^ZJMEj+R#s^=ih?6Yvkl%RxO`T;&*mhYgIjcE)S^RB9vEOMG?b*)8$sw6 zA{+GOehJlhPTMCej35}?m24ZOU65)Ux1;fzMdmYEKOS_3_0htn5^#{+ZSc8ah0YSy zozRW|DvzIS1X8wc*mEanPI_ute7DwsTS_ZW5DN#*q9#F)z~NjCgiJ%ecauLJ_%q|W zRTCr3>w7&Zifp0tcOKm@&Uk_T_kA28au$=FRC{)E=&_S!dGCCBH?-$MLzw9zU0T{C zV8(TCz;k;Pa!(vj=cs+Z3SOcjwos}T8rMThoo9Z-aeefCMHSNx*|GO1;#t|*z|6|K z-l;5felhyhy{kq*^DZ8lR76BXfCfj@?(pECGvl770e6j%;$u#P)@AIMoHcvtqMdr< zg4f&?whPZ>3rd4lI*%W(J2-~C=^q^QVJ3sI&9ZGP><(rsnfS4!`Io=BiOAWu@nN+0 z=2d#kYoTY58NkEISr7x)z=YlPQZA&o!bG}BEpMO$BwL%Cj$5icM8fq}q`#v&9DgJd zzViv`WmURDRnODYFFI8>(>QR?^T%eY*AOfN_%r+$UBig21J8vZ&!f@3Erl+js-rCW zD3%hHt81i1Sd^knB5VlFrCx?-X3{%7-Y{5;)VP}z9nETq(Y(<# z7(e2=P2$W*PDYk$5HuDgu0tv#ecJy`_Dx{6vx3vzPq8sE4RKiMf#~pO)H4*}@Ymb? zJlxzxD~*H@dBb{x*#ugxi|v+@K0=t}C@2aAP~c}(fK1)zWhFtK3pi8|rQoC?zKJi* z!eR@xzAyYNRC!Lh9*gAmS};;Ezzqy6b4^Xn)YO!nogM8bl4^e;IT*wDYnBlhK3ebO zW8s3=t)heq3P$u(k}HDRZCEK#xf{{yEBrU+QFY0q4;W}yb@^2a2@d|sm$_@tcJ;5= zuD=4;M-2Ztj{RJ)%l4$ue114iXjg6Ih4aYKcRYo}lg1T|1Iju)dHzKt`v-)WC`PjA z(gl%XP_0WDXxg;#nx7U8r^m&|5X8;*@qvSOS`F1DZPL=x`Mg!IYx`Y?ihgf;>D1 z-IGGCas1>6m1v^|6v$qpusbO%hP@^-iO=p0==r6l=CG|C4)0ujhrl;?5OQ6Tkt=`0pa;)0@n#ycH1uo*csGc%#Pw(^EKsCNo> zz-Tkf^c!-pQp0EB^b*fM?-xEf^kn$!DJb{Hu=tCG=Ghnrx}fv`W*cNIIw-E63PZM0 z!V3BedXV(GQs>(>k%Eu3?5Yv@wMV04JRWmlSkc8O z+-LUyCApwuBM`sxbph`QmP!f2_BTfNqY2;W>Y}7R@0-H*?c@%L@1-7axGqSr<~DbC z`>u0(d%k2yJT7qR{AR28rKO}MT=pS65Xw;-|H=|2K*jD4p9z(RLWDZ9q{*ROT*W?_LM(6Iyv;<+DNs*@}EQ$uCl}F=>AHB ztFwR8L*+eKt-9b6BuWJkpiB#4h~$E;!g&O(N^VctyMEbsSQ+}?j!kHsTPe@eIY zb+XW|vmOjO?4hM;>*2Qi4;*kwH|IgLlz)lRg0WfWO(^NtEwHXal^23Y@0ebZ#O|Rm zAisIehKTE~93`Afqm%sQ!2H!J4OrdU2^_E6qhK_V+-XYgv?X}%oJ~{uP77P#2?bFr z1_s8IA-SE#2DnJ2*b}^n@mwo5FX+G-<838tl@;d@?DM*xDBuRD;A`(qmyluv7x^?i z$%I->Ny%W`JO)0gjx>)N+&X{tfSDlmR3sD>l6|g$1c>;PZ2@FL5J7LvU)7ii2?-X9 zM?^bB!M!;XjKdheHB?BEn-JIs$+W|_*R065EXmKRqiG47} zA(VJmb)B4M9``3R8|dFrVXA{IoVe_eR7R^E&uqurO~Z~8w6e7YTN**SQx%T^m+ zz$Jf?uGmY;=(N^{zm&uX5}pcPIfAq_;T>$gFuyz0@3EyGoGC=d$4jV-i=!Q47}GMd zQ&&VEyf`GEd2*KWO2Zf#Fj-wXQ~lbDmz=P2Bj@^fzsFmuM}YEl9ZU<~ll;eE^St=mcix-Q^>!luxH^}M)UZk}( zOwHr;VJvW&Xz9%!HV5J1;0z587T~J91j#}CARllYomcAGevG%0E|lwS(-+!XHXTpj z$j3j9vShav#@1eHZIyZ@O7RMH_@=dVt*B6y%4lc{sjUQwG@qbQPIJ>(y0hE`N(Xm_br zMsQT{AEvzgYS9yUxe7!ii1qd1AdV(%0)r>Jh)z6uuz+h1t7yR;x2 zxU3h3X6f@{jK&@L_b+G3e**mbrBrABR-Nft507#YY++5Q%X)WdJ%!3~$?o|CV|%SE zs!Q63C@9S9@D%m7sxqdGXen)D?;qR}yHvICLZ^o0=6kv?M~NF78{s~IE-gP?O+)3< zk{uGnEGdRUnRq+c*>%=&TAwKMkC*1chkS+0(enX5tg~ZzCoMTwzdq}St@y<#AFlj4 zhtF&XZ#0oj##MV-IPg$X5PM#&y#(K<7?LT2k3QW$8uakbM-LLd4#EMsJi%Gol}RvHnPlpIg^_uhdHCCr8!40gAO2pz2fMdI`W~TG&nU0 zYe$YblY?rx0CJ?|F^1Fs*7T9)=VOP%$J%^3h1sH&T+r~Qho|n?W5(I{3w8-W=$^lo z!hsSmvr&{KtB)CS&)U0xFu<+Dx-THt$j&ZZ~ZD~|?O z|I>w_q#35|d;9x6Ccm7ZwZ4)z>!zG07BxKkz%%GHWxqWvKzpExv6c7F#f0DB z!=FrHOcSo_tI39RTI3u8Rj}FE{Zn#@=+QxPqcqMV`4G+9&ACn#cq2TuY=ut}YeTd5 ziS?s@?Os=V5z0wvI|B)7YaUY@k|&$Yy=t0!SJwMw>~qkrtL8z?Zi^v-vjM;{$tH{Z zJhC1S4i2W4vB)^gYIY66E!vfx31=3sMOh6zoFos6iMiaey^;Y}HQZ`4#HVbzNa@}i z7JwYfOR3ZyIVVW#DsVzeH@WqqNDF-7OEFST&qGM-y3UrL$2_$*yqidF2V2BRgtY5X zQYxu=_$N~j^GkaU^6DOI&zJ_hdS63m_mdjJ0jYL2QCs?`?P>5)tmHEsN4iW7F3F%a z;+F*YimkQ_-@haT#8%ySZwfRbh~ZU1PI`jO<~h8;_SspB7c^#No>$=BLW{fSj6o2{ zOsF1y8=M7l`0mxL;UK{3FdVsu84jgmKk6^B>N{Ech)_g76&^9%{vQ0#>gFl072@#) zyo36UsUKqE|m| z|0Hvuo(|N*gu(*+bF3{0;`Nq6hV#&ZrR^bv?;MwQ?Ko3X4zUEX;|#1KQFzqTv$OZ` z-P>RDVQ55q)zaQL!R0BUhG&qq*iko^f^=Lx&*>Vbw03N4?AfPFp3u3kxsXHeqfeSs zWZlcBrk?yRCo=BMIoWe|5X}p-`>cR<>T+DWDE^|xzs~Mjgn-?86y?_n1w;Okz zsD*Z+pi}YEX-Pc2zostl>GhrJ;Pd{)Rsr4_L${@URieJH?L_sVP;->SEUw-zC@idW z`MS?zW!(5RyKw+8jyT0Z!Cci4kFmgO2JuL6lM;=4Gv1M500|Q6Vx?+JWseBdccE&B z)(_|xKM`C;U?+Yq>feU#7b1|@Q$Sx@dUYb))IBY6yPyfCkmxmsT-*J>T)glXeE0W} z|4H51{8g^~McpYJ`-|`t{`bfJ|K^V^9-?+uSE-8Tnq|I8+a4v>2Fm#a=YK)-cPwqT za;SDYSuh^PSkNZlcP4$#8REB(gzs~Xe;>H9R^vjq^pKkr}9+4c$1JQQ$i5qskO2oAXY`zP3+SF$frQ+gPerga?|w@Gh-ZT64L zUE|FOX7d+(2|#uqBR4CuW2`LgeJ6Hf0sFfBRqO7sWa!So0=WiPfC#@w(Q6QqlxAlygDu`^ zfhjdVAH_G_>P_i{eqXx}eg9-7znGcXxH>tZqLm^qzj@8)7x}YBdh?R|CF=NOK)=ZL zws-UH$Vhc8diDi_hqUx=E0xE}op#2g)P5Ej^blcU9xycw0`&Cy+f(;2EN7iX9lg>H zEDgO)KPbTX9Hsr{cTUBx5z(w~jI}EmA0LO?Dy}7JtJ2Hu%{8^#w-J)|4cQ{+sCuhy z_tzqu-&0S}qeY=7(v)_5Y&@*TupZmX2?7lXJC(HkOAY7=iESK<*<=kYjEmNZxGBwD zaI)s-=f}$hIWMfxG@_#_Y$&Ce9}WY5yYw_U(qcNKQ}-Vuszb=wPpj{-C7X(ycU$P| zCu2a2my!Yq#hIChwhv7-iNP_k4~_>028MjdyD$;CgmhSBIcA8e0WBD^wIITe+iwXRwu7!$rXH`tWZR z-Pl|1*sX5J&?+yPAs1$DABWB2ZL|fnJjh zjw3reJE^AVt;_rM1zYB`bW};A2qy6icFlcwBXz;XYaTm3Hg?^^#bNE{!~JnEB%vsK zfl%CDVEQN)K1}-iTH@xlk#gBqPd358&%DJB#sXVMOZ>^ z{p*9}tqg0ij(v7DjN?7K8}C`Z9LU{S-?5b5m5J3p2Lp-A+gUfy&51)gOvOY;S1$l_ zZGlhMz)}v(sq2PN(rRab+;mTFH&oXRowLV_vfo$svBv)RSQ=sXEg7R zIZgT}C-NJoiqf4l8FPgT1)rXfT9xWf*WEPTC%JSgTpWa@p!aUt;c?LE=95iNbe z4fqF8;X_RW3c9ixiCz4gSc`=f4XJ@0ustDhIuXkGXj%4gSY-v1Fpa;%y*KL!-9&n5YIV7x7+`* zuPEhMs@!e_DesiZWEQ^c8N@h2`3FZQq!1nZ3!sDQ5 zx8ZgH+mfxW%Vm+dCJPTaQJUSbR0r_l7l z1M2XY7%|3n%JWKaiDb8@o!{7Ss>(;L12u8ug~*_kp(2Qr9pyPl+a>fA;EXLS|3}Uu{(#BQ~EEtL;5F zsJE6J85z0oLTi5olRSfYtHHAUcIsj2V%K7B%*;lYgGR~HR_ykCf=-^6$Bz|y7aB)! zq`p^!|0`@; zhX@Aj%^MCeEr;2D>b&FSF;ct86&}d;+w~;zYa_aOJOz%`)KsxRM8g6kc5nzwOE)#< zeX6MNR5Yl7*%ofuiL+teX+R5$iRFO3P8tt$N7F;<3xc>d!|H{tL;2v1nVA_l=k85@ zfaLa$?1+eC4H#B3;r(LuiIsc4WS=oNE5m8_2}NIKtWeU9v!{_#e-soP3)cN4y;Wb{(n5^^#+!ph z_vghC&b$kAj7Kxa@UtTyYg9{pg`VfPsBwI` zRy^Ul!5Q)?D&fEbw{O$O`M*os)a2+IP z*_rp28ELUOeQ0NpWk=7&MY2s`>O4s>5_bblFv8@fx)YtaQiVvunmbI{4_-cji$YjX zczg4GQ>zlEm_^`His8$vTk< z5MX`Ov8cT%pl7r;qeq{g;%8nUOC!C~Jawec*=QKIy>g$n*@6x>MZJ~h`{Q& zIg?v@24^1&pp*4^@)P)qatVW(9hOtMwY3!?CRE#ua44;8<#<6V4M#p>vn)@Dbvv#0 zZmL!xHQIrSN&u$AVpkefBR&s~jdC2JKeD$yyfKsSLwK`qqay~u=`+~grZLFVQ6R^2@K0!Mwy zj;-TDv~XGGQ$f<1D?xMUkLKeRyqCMA^M-p%H@)ZbR&u4+@|(lUL3l>}6MZ4Dc*g9W zy#d}fdV2cV*yELALi3);oO_}qE{y?C8ubew!dc6Ch>9vpzNH)F^o~btq+H2-@}@}B zWDtXQjK#6AqtfIVh01AKRIw!`q=y+lwGl$7*w5p_?RG7k@dnpnWx;pf8{<{4*0~8 zGO+K1)#@=Jp`wEX?r^Eo6`zMwnI{Td*@sA8w+7N0dY<{%Y06>Gj%e|8fP(K`MuyNu zL1qra2M@l3!T{mtWSLp#ewa=hpPEazSIDDpjazt_m?VVz zh)^yB>$M+Vsd@rR++3o57vEvfrN*;`DUj1QG&ZuWYo=$AM(Yc3O%KYp$&Xtp7#gn$ zr&#OAL@t{jNSbdu*l8mL*Bz}L1@c4zDyimU6(0+ZZbjo|aRi3qH`Zq5$R6`%4NNC_ zJSbNh{E*+}LA#UQQl9X$lz;?wMy=!kQAz5>SKmoL@x^fK{qr&-W+N4H6?9K3d)Gne z7(M@i`*U(i%2~G`+45wyl?Y*lvGtz*qSEivr0;iw+gWY1O}pWElz?^ zg5cA-FYZ`6bRdlR0v=^c)%!uha6w^V&nvKpIXldBd695c_}Y-XI?oHCK9%u!X<^a+ zYKOw7tA*Gt+F_F}+`k@DLlh5kIp$Fu)meAFsVaf!cuTFV&IX%pxDIkGHw4MlXw_@byKHG#n%xKOWd9r)WCa)Y#Z-v(~%pn$j3iUFp?wP2)(5I+aGVYDSwS z$5EpsbxqBSp=)`f?LnO=yF?-bx>j}v{6X4&TfYMjVvuNde_yHv*?e7O+PM+B{K(5E{`^Mru?40Ob) zWF47C*DNj5wk_nZf&JTA(STmS$Kav@#{l3?r)o3X%;nOvvS`oORJJNADRr%|(h_9I zB8-KwLWJRVcQNf%UlKUKoiQ}X4F=!xEKmlT`q?fP*BZKoNy zGqu#Goi23wqn0uBs+KG3*-e8LCi(rBqS;aE;c@9)!i8(s>dVT?zJC3>xLD^P#(9k= zq<|YI*sp&2yH+ym_!x5J$8gId%k4@J_wU};H3@;7(qgl-E?I-WlzyOVGpB^kO(2_k zbFCyjUH7IJH4`(u_`jiN#?cM9xFM}iFe){OpaS7&ezjAgTetYni)cRJ?%ON@nY(K}ZsIc6K%Ov~6-V}SI9>{4$SVmqf!dg0 zMj%AvR3PL9WT3sTduElIm>W364fL$nJF43VE$&ndaaxlJlr!<~*#&+ZtkzyO(kOhI z$^GIzh8z|UM78MLxdZVjGshb1>+9p=`nnc%{bbB788Mv+4*KIS09DApirG zNJ~AdwN=0!z|O<0pr`#wE2Nr{H#wVi)$e-k`~x^FmFdFIVL%mcTmg9nod^WT4!{en z`0Q!|+yddsoPWj%YOljR-X-Uu!Z0!#h2Z{$@X&qu~b#NT6DPiwyme%OsZiQ38FcLn(`wqF=)qo-&S)wf(#MTiO4 zgegbw)%(p5O4=(~k{_&;LvHg_pFAfpumHJ)Xjd??r!yYZx>763-H1*%Zayw*5*&oV zXhY+&Bl*0=BeIA42)kKN4^^mKyO?>Kij5ma}bX;XBvBmYoZ|D9fF_Tn3Jl!zX4 z=LYaEKtVy_H42HWy>|pUR_Eh>B|Iuhl=*-U-tnZH+z61Y89KK_HpeL|D@U&0eGN)O zmZu&6`%fs~ej;Yy2KvVz67UF*!E@h}Yv|+@PUCNEPDRul78Dee3+9s2GFq)N(Nyi; zOe6A$zQ=v1Y9oL?o?t$DbUrbiRBG%|LTYMLG~Dj~bMD=89$UYVr4{7vpweu3V`yw0 zn(t&*CR_`Jm<2iGo^5u;mT%uw?%e5YZM7M#qc?;gjIF51$fe_4Nr4zqI+nY={ymHV(FqkRF>-5)7$>9KbDQ^YV#$9e{2=MXrHT1h+JDcyJF}L?_sL?To?;^ z5Mo;OisHRbh+qRvxXJy(_Oy=y-IuWbo}MCz08b~tkWElTjy)t$GzbBsWkWqb-5ey0 zm<}Bc2Ct^b0VAlFrpbc9X-ZP~?6JgZ_jxbs{Qq27AfwrZ49c90GLaWAai{2!-w&x@ z6c0DZ#S#*#)d#{!EghjgZ}?0iUbm_l{C-6cIw=wRP)9!{@tVe6@%4~qSqu@VB0zSN6>2^n{ z?eH{?`AcB`4b{3lwjS}80K)F}*wKu^Q^}~~_BHKvixBTzy88Xf^V?5;A3sn`0!L7xnc9Bb+uJ+WqL=5VxZNl4D*OtS z<*r)Woc2yROM<}8CHu}1hL|7pX}4#)`g+~K+~?0Au((a$dOowiVhU0Ofu*0{9k>E~oSIJU@L%zt~rPXme1B|L5epp-R_+@aWcX zp9ytebLh_;3Nj8++!-_84Oin~0IsO}=EJopWCWK|lodz5j~bTzNNM_*)Xrg6`Hg?T z+bEl;?wGtVjH!^@hp_t(NmKOSoOgA0K1Plc#P;y7byU3epH#0t=ya~*Cy927hYV68 zR|gk*a#frl2XhiujI*8f=av@tDCOhQj&B|9igXvqO~HMb68SqS{6!esIw|VzHVu&; zre#3rgABt8q%f_;b@?{q)KJ|U9V3I%F2fW?P$?uRg`jCr@W?xr z&&6F2MnI&ZGf2qu-HAiU-f;_yb_loRyR`y%v|e zDlS0#`+@>Mj|FLkM+#@3H^F?pzUcruR??x#P_x*1aYX(i2peE}hTDUvDH5_J2*v?HNJ@flw3`dSk1T;4^2o4EJNtt2r1*t2A z{1jCy=QzZCjWJmp(8oGmo{~j+n$nOtxk~HccwM&OzRsd5Q2%TL`o5yamP9oAfxdo} zvEA~-XB<)N9G5q?{^g^pB!RX`!B!!Ak-{RQV6WDqC_x;vhGlq`6@lPKQ9 z1hd5M_~I^0|K0Bj1W5A88u>@jqSH^~lVcG7{8}drF>}3z48?7=IeF-eKC_9+LWhV!_Fu2sEKfi@8l&7csWnz3pl-z!_#3c+& z-rJHomRUO-G2F(TBY_@z5||aSdGzClD^or6Tq`~1OhJW5$r{fzqB&nrc6HLR6qh!dmLru zOfBrR1vcYKTW?UV>w=B87^2{vj~X)m<$rpMd=48yQ9R+5DuRkzuSjNLZYR`M(`UYTMy(HOtKE?ZvxX+o|r$i;GQw&vVjaFho+-mSUQFf{)* zeCR%YcQ%>8!A9KNA~(X^ij}tYF+g!{JuA#+!>t0ke3bi%X!{T)9j~GRYu%D3o_s(- zlj1Iu00<*{$FGI*gW7jil}9vlf%mD_@xdWtO2oNmHR3+YX?I%32J%Wv`D_}==o=jVIKwx`2{xhiO|dq>iq%iU>qPkQx?&aK!Lv39o4AdZ3sgeh^ZsWuWXEt8~@MOM+OoBcwsk#oodi!MW9Vf5h6Zu&}tViu4za5cQ|8jqE*9|IYiY zUrz*1E|8;BY5JQgSoRitI|--JLnfcX{xaNd#F_`X$}QRRlO+S|Vwa}O>A(Hw|bm)uNlP7E7-1+Wy zdZeXgCjpNs?o5CoQ=C6Vg}dnUUS`=alW3iWQN{86Z-e=-p|STo>x+5>CZ04?;HfO9 z*)}n5_wxAB!X|p7QA>))=3|>@^Jl~wp9`jLk?Vj7$3M<=F&kG?I&Uf#vED~(ik8Qg zS61Tc?P@+{7+_}$=cLDM9UO)o$ad~{B85Q{J9KIhw?1VH;>~?`JT!?*+G^S9m+JZc?WR580|N!0H4r@si5%z zMA}7Y^0~J_UiOWj$6l}|sbJt6Jtrr|4_9?Iw_ScpX>rQ3z1eQm1cQWOOyU z9+API$=^{~4KN=40qCnI7Dpk618!LzY+O-gqR$_CJb~aexSNYv_DO+^yGyo*P?5u*4|zu`iWkLN8psaxF!z3%Te*Y22cygAwaA(Kc7zOJCF$j4!eAKU=dU(;ZLcn zpZs3`X7%lF0@|o;4*`!AmQRe$TCVSlUUT+Z?VmCRXppk_`T4cAwbj+t0o-ZsZeDH# zHeL+{4$|usXB02^=tCaP-xCLLvPN^ujgRymnoW*~g@i@Vzx?DuFe)n;TStewu`w4V zWZM}@Af_=R0F&#ml3ER*CZ}av6bZENayC>Qc#jKex_lUi} z%?0Pk;b$vY94ai2n+2U$;2ogmM`Q};KJ895$0qXypkn^au)X#ED-8D1rAx}nL6bJ; z5Uh+0IpE_057z}jYQ=Vw(HEavTU#MAn3xt8LacxWJ*8joVA_Z8H{qQbRd!) za0Kih;9I^<{SA!VfX^cRScye)a&rwNM!vSU$Jc_6$1g9)omgaRvD`dOxaJMM1E(CV zU@R73JVdpwW3>8V_B^EKV~4h*7*_1T6;)jZfiBoqItcCcPI-#bUA%L9sVU;yGbss) zF7T6ziVD?T8?LZYG~+Hhm#FNc@{j4mqzefGkj_rA{pkoyo|`6n+%PPLOpofx958n8 z?b}q^>dut|FBB`4OPmZZm9Bo`>R)}|S;ew(*6#alcq8xyBZ1Nar_o^A=pnNXzt5jP z?>Vkh?^Zcuh3ASlyK=!RC;Pp|GJO=NR18#)9Jb5Mp?-NeScbti7_|y^7 zv=^)5uW|t^9kGN+N)y1pfYu>-bIkL6F?|QU7lu!^`h{H?! z=fI-jTgKfxo6|0G%3qE+toWwMY;O5qOT2yt~ZkMplFZRitcsVlWyM zaQv`Qq=lNKr4qIuu@TZ2SXp03a^Qp>t#*~c!`i3V{uAfL-Juq}Wo%YjLv?ohl(j!L zvXsn!k9D0aETze;=B~0tZ8he9ZB|T~;)qsi^*%FGb}ND zcP(iTGb|TW%3tTum+-ts_KE;-SZ{@P*YSYF46?^!fk}uvu@;3NE6|6gS;R=1yLLu( zcXzh$4-G$55n{i{`THmQMKRp^;)2<2d|yAg{B6fKKNsO#msRUA-15Rh)ZLzcWeM_V zYj%1;-BBCt_bgPAc(uZdJdyb!NqSE5C_v^u8oaNh=K#l#`Co{lvV7$5?&OE&K93(*1|4^E z^yG?GP;C6A9VYLXt?g3DC2u%~^N zS>{m1Q&;tYI~g&}Q-|q%-s$=(=%(`!G`y!Qp?`tp@9R2ueL6J!{p~*>F4pdTaI3VK z+krl-A$qpSflbs6;%{&;1!O`+4ZBmVZQ8-KAW#u$Wruvfkwmb56c=~h8PISjb_FJ; zBL-LrAlMvzje`9J|MS~?9|I#bY9cLGTU|*f`r5YZ+~=j(={pyk7TX!OCdUG9H$vFBRp`j;%3 zgwruEQBB1uASdjWb=3Jz0*k}XZ=M$06IT7>>#|d&PLVuE34|_W$E%048m>T~B3szD zyzwjnZBw~0wS)Ok2&wRT6I?v<=q5gDRN;x94P_)ev&Ft;(G1G9NPFOZ@jRhui^-h& ztfAiGeuE1)lY+;PaADa}ZGM%!+3mCVpD4aq07~g}(PCGB^d^kd2Y2SdYQ&{VyBI%) zGY(FD;0ju`SM;Ejg@PpBCCFI0UM0=180!E{t3UpMR^aH9UPQC4mA8Qx${xkC8vOX!=YzRZ_XPw5hRHaNieZbL7(uv; zxmBcAEPBMY^ejC@Z>TObpwmbO{!qB^&x7k1iHED56eVM=R|e%`&Tge#%gKivquc|Z z7Ed_va_w!ZySKCv(ZNni>H5x0z2cfhBNd^!wr(5|koT7mFvLXq{v z86Y#^>=NubT^sm$#-Izx%e3U=W$XEa13R2;ClB_~!6|>r$Xh{CF)lYNtJRiRGU|1* zqHYVX?EN7F6)`7W-G}5>jp$ifj9mfISsPd2BHPK9y3$&zl#_8utVA;xe&EGJ%Fs~w zFfc*ZI+6@vjsDMD^%RH^geOL(*Zx30K zwOW<2Z@4|@^XY`B2bzpRe>}c`;}Y#{pFcl3$x;sVAXwz#!iXkuANmUHZ?9ryVL^eQ zC9u1Pr%S$T(|A_H5nX+r`_TDBQ%q1m04wneb}WB`2=;(d_~zqyN?~Y7AV|1^jyTD| zs$P2xIzP2gH~D{%W!5g>ODjC3@%w$`_s=@*x`~x3G#Kh>OCDQ~XK??qXgZcZywySX zZ1lz~q;s+kCPrH5xBf^6ZX8F9Gq^*?bSL`cW=RyvH=~?05^m0#SQM>-SfDA&eGBO) z2xbeU*&O?qo}LB-r!I-P{@SGDYQ$w-m2Nim(@NNG!-K}gq9IqYjkw6R@1iUiCAw z3D2|TZ9=9NV6?=;?QP(fHx}3X3=WU6b^^!#o`;ff)0l$E=L%hGtgN0%YSK86ybAVK zi|Kzi#Ytr&mDfpx}V}3}@{A&A&=P@xcAWdyObN|WROZeG^aA(|^k8ml74KthdEZ~{B8 zC`mY1lNc!rBM#S631BI% znsS}Du~~wUs8?xB^sEFO|6GFz8O`7!im=)@d6aZkcp!+7%IE zA9C+9yn0|_avpQ~{tw|a&e9uIGem=gRB3ldriMntCLSO*)E^{j57nHuz@N9yJd{fl z37Nvzg1iRJ%LrR(p1BxxM;iI;RllcB|6MHbli9%8IW`WhK#&3m$3Uic3)Bf}YU0w; z76k-7Y~_jly#Iq$Ar7=(2svwby0^xDv=^BV<@#qZ#p~o*9iY`CtATH)94%3u$`>zK z54Ydxu`#HP;1{OxC#pTo1t?FRJgJ~VhjfTyZhx3nCR8fb>85p^C2QVufUC_c?Wn5P z>p~?-!TM7b?>R#KvIeZWy>8hH2qadT2CCJKWy1mf!CTGmd?8O+DuUO*e5<|+E*vzP z>gws1q+3-M|JM8Hvhr8HnCue3ZRaxLm z%g6*F#fketO7OV${UKKs48FoSw8A4oC8z;?ZbBvUHcm-dxf!J5Q`z_dve8fu-zFJD zK-&cahBj3V4O1>zqPGhknV*EovRG+(jS=IX2p8t3-rl`gW4n2kse(}LCyLLg4u2|0 zgPoLqYI^!&YeA(ty=N` zdV6mRrIYy=MqClPG{tbkj8)UpGCvjv0(NK@eA&>|HA+(M1)QvrHH6LIh@jv&C*_Y) z0wp`-aox->81A z)%m!^1B#uJ*HA(OS`m6_&nJ50`@hblpBnkR6Qnj#7AAAwPk!a^dCg&#^!)#l$#*N} z=9+bS8Yb&OIarHkKpgkF*ZY08@AzuQ56Ci+F4NZ1I*UYxeQId5-7ZFo>!m?AG7F2b zg!t-dZ3@v|UaHKXI`^|qZRMzq4z@wYM+}FWpF0?7Y7|{YGHZT2G9D?jhwxqGX8-Hx z`z5LX+kX>RD6ThB_ahBM!(87-49jMX28<2pHA$(n!r?iyuUJvfuO{@YJZUdAZRfw( zqm@-jP8swDWqRz+`B4a$I}}t@!79Z(m@_8U2QU!4Zw7xw>XNJX3)GGqvQ!T%2oO4O zHSavMcf346R5{g9C|urc?J!^b9{CZbN!Yvn4}a$0K0LIYJRn|685tsnLA-zW4kAEA zXP!V{RK>jvtuiPy5BCVz5l)zcm8s|BowF554}A(_=6_Vu#C$9qu%evlg{Y{=Rh~g2 zYEA7l&l4e6L0MeTfB$OU<9w}ynBEV#=5ExsX_t{)o9|$hjASKuZ9uu0t%hzE(qwTg zPe;W#7%^;#97N65bMEPauaf_DbpN7q5<41jjo6?RfGIeOQ3N^R&-}BSWv4eHhGDw! z)w9;U!G)w8B?JekI-U!N6mfTOYSG@wW!V3DE)<%%yvBEk&uN*==|`C;ny+^GM3WF_ z4`{WYk-|00pi#h*fCNth=D+vA_wf684~7Cd=%20#^%y3#<_Xt2gg&y7qiJR49QeUn zUVKbj33>Q2vK{TT(fP|-i6CD025W%SxctVEM&cJ>5moD4RVFWLRN~uV*!bj;;q8thWf0kKEt5pf6AJblk+NG5OG0jmyR~W0akec zE0&)M`!2`;kskU)Zov=DTE<<-6w1+Wug7Si#)*`4IrA(Cya$gaufIsDA+#OrC_a|= z(Dn4Q8b%w0kqzFf!PPgE2Q$fukIrf<6Bf50d-52Xx7bshq$?Fxtu2yf;B&u{2>e=pQe3h=E1XU?TNp`??LGn;*>ZQVv>Hqj&rW_RSD`zh|p zUVr9Z|6QZ?q6p+%KezcbCh9zqH1+(I~FXRv3& zp}DEax%hwm|F3JUZT)~3`6ShaYX3WIrEMdh+{`iKgDE)JljGnZK;-zp{5wqtdsIhr zG`g+yd(2%yN`Zv{@&eN9pd~+yM~T^s2Y+HvXj~6Q--hY|$Q}2kq83_T!J??l~hS92-S2}gJemFTyX|xK9LK8d~_P%+qTgs@lMW{ z+dHI!AcW>Te!(+cb6Z3QqKc+mnJG>sE?M!B+1+vW` zw5nRO$nmq*Te~+iOT*fVyq2R1mF&fyTau4*mB4oSm~ecEr;r5uf{xoND><HvjpiFNgPzGxg>yu z*0*j5raD7cktT!G2mIMy;$Hky4_$^Thovw^7`WgO7W)tIyjW;N`rD`-;p5&^d0r>? zUrRkJu3@2D)d9IMq=bnZ|1Rc8PiBdm0MZi}ReWK{F8lpPontu4O_A!=s&7$On zp$xvK-QlS(Lo~rrcXe$Z@&6h(ER(%yPe9B2DwoT)*M;@X)UZeK&_gN@={MvXIcEGr z@r~hOHmi3@HNL=Sd;eM?8|5xaU@?Zv%Reqkxt_l9BW$?S_>sDy*m_Be;4HzM`XQDl z#Nb!gjJ*A4-gW77rNXO8X|mc@jB(e;7OyIhusz5A&dGrfuk_KIO8;0rP}Q{LW0;BU#{S?E>7cviFCt*`>F4%_a#5gNrqP(@obxh(o3 zwXwk2(JMjSs^{<{VpJ4|nY8%4A{Yp$vu%WkWk8f+d1T90B;&Y}pC<{psXRl>@hP8` zWlW5soOxf?UH#7~e!c;{sh-W?a7IW76V=&y2f+narlVKV7+cQUYZ)jg#xu5@po&}{ zBn$RO9djINI3JBud8uLuMN{HuNEzyy4r`NQXyPtWUT5UZRrWU^Ya+@_zRtt4Kk+Yd zs^Kfd-&fbxuK7c?BuvHdvfBHWe-Ic<o+am~G6WtXE_+I5vnJAJk! z96V3G{(B=#E!*cdGT=uC0QoS zZ63Q@=Vr&&tsj~|M!b5fdcubfrVuCx8Fh(T2*9&dRaLuG7G@s#BtQcr)YRBXh95l9 zD4WEb9D7||-LuTQZ~no9|I*86r(D&9`#3=BygWPr2Pj@43{8lSuM~Zb7n%$H1W~^* zC>KCiu(q-izWN8MFXt*iMv01%^D*Tox&$p2YimiG?mu`?mtBA8cgX=4TyUCp=cjg8 zc1Yr;QeC!KZRZ|^@NX>-Q7@YRy5TISLyy(`H*ekm2MPIyklJS!8%6QB9@jY$)B&%L zJ&3qW184}KG%v0uD7bt>hzCC0*w}y)h!EG+P&R?8>7AJj{_pe$Y;S;j8SSf)9r@tF z;PIf=mXMT0TY(R>b&z^mxHyyLibS+FWyvv`fwC-`POsOI2aB?=g!vM1E_E=Es#a$B zN<1+pL|VP*G=fHYs`qHs;u8|Qu-Xii>MR2fwUF~|Wk_Abx9cy8%Vw-!_-c@02MO&5 z%c2>Gr|r(;yPP-V4uzMe8;k=SX7DZo#Exq)M>x|@g(P>!PsM5lPzYlZCu`>m@Ww=1 z&)R34Ie<|Void%F*L#MAuZxTiG+Z0U{H}|D8`)1J)r`|-YZu|T7~8uxvb!>_ta_y8 zm)T~o*J1yr5`C>Z1Kf*(cNFw4ri0o@mS*kqobFQ{i6U*I zfJ;QPS1>1arGvm{jPfg=m&o9}Xob!@IF~GhIFF(Do>IoIoef5%4ASX}>x3q!d@|pS zMW6Y==45LNElx>I?(4q{t??R+=(y?l2#~nEqAN@G_r^672OqvJuGn0glcSYcxI5pB zXMgLMCNbZa5}Ou(HDX>lhLf_Ki%#YxuYtubN5A?&w^38J!QS6}frW@>S&7Bc;I?3( zE-QQD4W)mq{lD-V+{zEx=2gn2Z$t~MKP~3+n6LQ4bTHQJnEPTQ2k(!M(6TB=x$)^% z<1^O6<9$PjPfAB_$(+rX0$cCgzZg z+p0CE6s~U4D?S_nSnoKFjHUB`(k{QrRNoEMz#prq+vhI@A zmk@6G?5U@Cuk9_P`F4`_b?rNHm#PN_SW^X+4wyvInXKL%=7}>&JETJ?X~(H<2n)<4 zxgsC9#zHo#NKtIYaZM*}#$*;W-@!ELwxFzZ({qV#q zungo>7(O&&#ZQ-|y&GL!vU`9y^U9t7Y0E2J+Q~}YvHl^aBUw6exo_cpmieyRYH>W5 ziGSgbs`gm7o$3>}PLbkvCLSK>9N0MxIH*Wb3Zds~sOo|i4kOe6RJbR>tU#C&atN{} z6}zXY_=rVrgJuOtpRnr#T3<@-$C=5@Oij_kKoZtyFkNOl?T_jM9w~7uw~09H^0PTg zuJaTg(Yg@%Z~KX~DS}F%kjM$gwKlJQOd3`t02=v9<&;s^2j23JA0r=kUo%%6gf)4en;@ z?mj!0*Bw+`8?44%&-9q-ZC)sOJ0Z8bo7F}>q#BL2X zYi=)(wwJEGP%~fh7AX3`rSoIf@`)LmY(az4!-jvw=GN4YD@m=(dWw?sFL^!Xf*=i^ z@X-|8Vd;DR{tYLY8z7fa?6fV9!*qvU*NtQatCT?Ui4T9u9TXV8F_EP6RB1W57~x|F zM;{a`UeRosg7*~YGfAQ~Jc{RxP2Ff>1YGc-`7vcwrZgA}yoQf<$e2;beB7=-Kw;{N zNawkn`PhiHzvT6+knpJ9FUF9OXb<*3*x>EYMv)5y2I3)x&pr(Sj0no-D`OXH&vO^O zo@HM+d9me{U(wah{-d)(;O8$FULR+PSUjYEq`eL+bl8eNQR|=WL4GY?`8m{%coKh7 ztJ)^lSfBL-cQgBL;05KK&+DC_2JzVGI=1OBPQntoQe-BP4#7o&xc%7F`LOf*Hot_& zC?TQpMDigpVIq39KePkIHG z2tnvE;)FTA+}3;Mh3+3AyIf@zXAOIZb0Lk(1Hb$M4dUog!L%Np9-2PqmcG#P#cSt# z9qx^&)a}&hDwe!J4}r+&RBdT%2XQ4$K+lDfn=IC1|AVw-Y~AC>_pG(porUU99Su!q zxAx)j`@y?4aa3XY+KC@NwN+IdvB4NF0g2m=f56t&ij3h*Y&zyujdGLYw*$CCJFhklkoPvS~j%ZLz6oiS7mw~ce_28RZ zYb?<$H==;GXGlIcjUm8l0v%<0*Uwt&DB;q`$P!NV%6#Sce-U%BQlpZCNcW=|GMyjq zrgiq}BI6J5Sgw9;wp{{-N<+=2ueHlTjrWBYK!oH|XVN_a@V~lPo(XWO%L~1YAd=WJ zS5dj-^(@}u+z9iPMtvh^A{LaHUKHAPp@Ca6vs5 zYue<}m?dMaFK&*R0Goos3=s~P#@3q_Kg*FMMR*GBkm+sBQgz--LnPStYABh5j84*m z^@UeFN6{&tKYz~43l}ff=DeH-5|=Ik+9l2QbW61`37{)*T6SyxGqe2%hJ>_GFROej zosexP#4BWof~UHx>%AGlr-uMK@U{ZEotn!bTX+`rEToL`Fn&g)jgt4E?Cpix(?}8Mq?@SSQnQ=k66NA|!W3`uir@ zGb;vbZ8x_Dg?2OZ1Z1?%&qrzQ@U65aLjH%l|3?8Id;R5KbZ_kT2li4cMeO|;a6cb9 zceCls5P(8HEY8_0h!Z#`FE1a-u063WI57=a`(A)4-HhvSj}s`_)+dh_gTt$^kZ(m##LX|Av3?6U?(cIYcc?z@S42zwPTs)QKYGkbZ%Vieqyv{;+XkrJ20zPEyMJ!L-G?3p0ErR2<<%2;lGfne|IEbohZ2x1t9>ws2Wf}#ajfTkSpj(P}?TK9fu{uBJ5lY zacGtfE+OU%(QE@FBM5fv==>r?@t-)f8Ji=}B1GUEKlfV1r2KwHEv3;g6S)0jxdoJe zE)Xnka_e@stDU!7!htwDX2+i6(5rjxOG?V^vNI2hdIur}&VdvF4BnM8pr-(C4*+Hi zD8Xg%jC68AnV=nHZ7oCN$w1Pwvd!;$id^A@NNHTm>+S7joUoz__Wi{&H2`jh?UO3C zphdeR0+e3fsDQRvfkHJfoCU|t!<>B!XDPzVXm$!}f~0$AqqCr*pfd-NdkZPM*S3W( zV7x?z5NrTPLe<4ClvzyBE4>@$QJ~N&$>a6RKa#y{UDkg9=zYgEF@{6qPsrAs9Ibff zVS2>Sf|X;wDvj-7*&X#@8~551`iTWbz*0+Z zpf@au^)kT21EpM$T85Yr#0k6DEssh3VV-u5e$Pk;c%A`vvNF;p|@FBRj==GYr zt|aO=>CuVje_M`u>x=Zq3y3%Nnt3tk5S^XbrtIBV)gJ~b_dm##w8cTaeSqo2n-;2C zt`%u4Pa9zO*bf%w=hs;@2<+|bC=9(H@qyE>1Yyq6aE|dV znu|wHznGTjQwDI$`K6`G?GZQm{kd*mUtgdeeZzTY1&C?u4}Dy*pYO>8g`N?bDj+}2 z`Q>*bIjg&W$!}uOV^h5!$l`au7c^)CF{JghyhvR>m-&Xbyp=uPwbu`vmq~ntL)a*~iC46dG}@VQabAtA8>`Ou<(I73o$VNPC1o6xbMrf=sZp0f!y`ExIVo>^8|# zDNsb_pBrKQoeg{Uv`Fzw^QSjx1^?XEb>Bpf9{Fcps)t~6g*3SHsv!N9wpc3ja*dYN z{5*IOes#Rwd=zhyJ-I%JB;YPIyiCnTuo4es{;)_Iv&gF_K%N(f&YytoX}zOl4zNzG zlLjPc*hRbZFzdSxhYP>6fEbAXc=@*ad#ImXWLQk;ZgfKVK_f|S-6LT6mIg)4g5LO0 z_Qy$TZi8FK<_cI6jU1ctjL6~6h*yYCY6)%+Y1^rB=%-cW~`ES*3-9U zs=*Xr#pns*S@;0=9`hQ?6K3mFw5kzt}wy!SliF06Yj_Ndhh? zXuM&GRDyWz^A!X@ab{-b1ss0dgLA>Nx&S_EC*7;7!wgtD+B1`wpbPNk6|X3KLl^d$njjasvl{*! zB%|jZa{q?4G6H_Se}Nsbjyf0jY;$@wSj%e>fH=C)`@{?Ir@?uCSC^l~XXOM>)@rF{ zvjR9)V^@%rS8m7Oas?z{*JQ9|md9}*pWa+=nZOF1^a0@dYq|T+5Cuu#6E31Sv5%Ak z)we(R?0-$-Yj!qAYCayKUyAw~viu6LpOVG^GosR(OK~j;G}o?4lY0`e z=x}VyKDLhzh-}rl#4aFQaGH69{#nt(mX}X4JyPZfZ(z+r-2%=@zSpL2I_?yD@?+VL zURlqAZUjWtvxFvTu?_`};k1CQSz4KiZ*J3K%;Ya`StPo0*$)F|Zb&c*CVw?|O&k!TRn$q^Ni ze%5D}y-vGs_BCfzxy z22(&izTTuk5gV%a@dNKX@H_*25&WN@z{<5VWSWVgOSkRXjcJIY(a}N9VNX&N;)UPbI9Z8Ss$mtPHq=fan%Usl%1ZUT zxlmes={2wVJntLYAKiqvUllvzT=s@j=y75_VjvYb@>>`#at^va8ob*LkP}SOjog0| zdj~WFQeb@td=v_SLB|%U+eX zh7tA|l8vv*4!yB^mf3sL>K+&Fk4!^YFc1_e15=c9<$xQ9NPv-Pl8amc7-WrK8~Gq~ zl9xz4_*aw&5}-tWkjv?o?W4XYa-wXn{+bv0T5jSo#(tOUb#W3yXKv7~r3WP$J?0er zSE9!%?(4M(=GSNw)0(~}Yz=5>I6v~hJihXDh4!CjKIbzc-2XEBp7szR7s!avh3Ig^ zEFmV(wn!{MTNyx(XwZ2}cndgdnfDMZ)wKH>9#9x{+JO!9!xq0UDC5#q2ix0?#sxaz z#o}5zT1Lx_rmnB$7+<9r+5<9r2+@)LE5ge^P1r9PmpY6vpAIzFpCHgbkudLlpg_+H zm_Zb=RV~(W5KoG2v`d=#V}r5yw!V>I4)#&-yhk4BH}wU6x*h}OU5`Al<;ODbrRT#% zH?>AF_ZoaxudG18s`v@_As20^-h&aFBG)~x<=nN#OrX}t`7=b0P{|?y77ps}ySAcj{u?O~01J-Qleuj_u z&FjG^9O!{nGa%2}obN(0_s)=Ipa09lzf+GV&$#56qbfSKOzM8Hih@$xw>ttgfD)(x z@6DC4TtaGZL#7`e32*!IRPq!@C2O9-do%tmA^}%Ez-rwDL6tYyyaX)CnhJo70ld&9 zU^_$IS7M)HeoJ%4{7jh`5n@=G*(+e4!=DkS&J1-%?q#~j(GEHY27?*0XPifkD6ck= zRs=AHli&RG(~t|i<2azu8(ZUsroX*V>U=4)1+AoRzP`KLmS{P$>dqQf%{jhVLt`$D!o zmJBDeq{Q@ZugHaxQWgel2;3faTC4`}4S&!5jsGpmfKuC}|L#PS8pyl=bG~qCX$fHT z!b2~bc&VM|4?WpB%$nzo5y*M%WefQ6e#P}}tY@)kJDH2^oP3M?l^so_V;MCtneF>K z5fv1Cjfn(ewHk@R`77)uoQ}=nye0E((L+pKD4E^kU0KHe1V+0 zW@L@lddrp8%I!FIX@4kICf>)Uy{{jAt30iQ$Po8!`Jtutrt7UoEZ6?GzbkcZB~Wr# zD&~{WjzJri8S)V_&-dGFn1=D7M!SX_P;{DNYoQ?v0|n{RlJsjCi}kS4qhvQfP$07mFGGzQC@NxHJ`(TTyrYA9%76T+a9vV&PHo!py`da*8` ze}dY8ug&k33}E7LB$RMuH@~FNH^ck7wxAW?2{e(d!yoyYP9B7iYieJn?U~_Kqe*tYxo~}I>MNpQzYTVM2maJ zR}~?YJ&+WegJf8F>}rJe)2I9l$lWjgi!kdEPt@{pWSi$MvHcyEXZCTn{C0zxmNFsN zlFR_Np9i>>FUle?;0<8LxZ`J=y*|lTQJx@ZQbPnhOT`;BZ;}c?WG5t-Qq96kTCp-E zq&a%o*O>|`m?=cJANJc52m}J8i%`$E_SnOrMH_xXm);-p#2jy+PnV(@>*zog@$d8)f6)m=e+RcjZ*EDc&Ua~!UAg;Qb zo*lO#Y@0sMdAeP^FdZGreFWP>`T>3dBD$o_Mx1&47Oe(%C!#*ew-FYu`DuFhu|D(` z5ROYEtDF%gRj^fM5~F**+WKY4o@UiNiv?vrZF6(*EDP|lf4)dL>{K7^1Ryf};w zZ;y6-E((3ozC2S^3jn8<>{bU%<8JKbEqPB`#T9ZSe2phw*|k1yuS_7E zp3~Bj-++HV`oN&RHe5McS{#~nzFMpGV=d5+XC&qdpRbmxTJ0!+Prm!FfcnE#+2?p| z6lmbmbq_v8KI&N4i4G?c>PZGLG|q>=+DHZ~DP?T)EWm5qQ4<-n6jNGEF5+iu2wxh1 zly+C)%XIFyp*9hfWSD#|45zAbhrQU?fx@K&j~)9 zv(2!EO~&^Y0%W}?!{S>rQ2(;%*e#H6jM;R;J^-LWlvAe&s52!9hUb_BonOBBq?b0M zunIS!J+cU1BkBICWvtsz1XbiO4pg3B!eGe z6&%R9H3)A|U@1j^M0*2~J2miK>PEyB$V`5 z$5f;ZP-Pkf(Ku$L5^}|uQ3v0(xMz1tWiYj5xZfM!7#c`tPG{QtI60lzf+o=4@&#pz z_yYSm-pssaIzz?wEr}~syL!b`9HBzzd9R*5*&O~?Y+F2zp5Zxz>sG6m`p;y2c9>uQ zF{#@|hv1141(E&1HhsC`uj8-Xx05|5rAB~oO4>AhNvc^77>yKLV^@*(j z7HN^g0rfn0ZBzLxN`#-^)V_V=0?gq?0Q(0CdAT1Y3k)TNIV2>{_^(PX+~wGV?BqF`;_r84w{@f^$F%NIBUZzSoG#zRkv&h*5@tb8NL+8je&zZo z_e2uyEpRxPo{0jW23@4F(ZK6AQzb3h+tLMQXoJDTn7oVw@P;H1Bv%1 zHdj~{QV(VQ#x2y*;XZ)O01du+rX%e+zPvFK%F`5La+~AWD-0xlA4Z+mWklD=4+v_t zVZ)o)G`M%4wy3hVpy6shW=Gd!YH|^FP${20vY7=t#Wz&w+<68>YP@`(IuYxzoM3ow z=_9P&RwSn05?O7$NuxjH%3YslBM>{PQ$g-d*rSZIXKtqLlP?2 z^NyD#Q{d}Ai8VPY95&vVj=V-|iX9?Hc2>EUi;pv|#_{~AvmznU^ph6_sH~s}exj`M z=p88^WaSzK{ne}B`0s3Qe`iK~0}smrRnpUB?qU!q_EJzDb^#B1Fu%;w@Z(1Ozy=G@;{rt}LOG`|8fnIFOxqGPIaX8QK zk+|`!=noT`5^{dA5D@)hCR=RhU?ck@LPgea75i}NHYu>{sA|_~S&gZS6vn0JWYm$h zmp;uJXL%bTB1^HmIBeMdz`dzD1g?)^!&(OMCseHOry->VxW$eFvvp@4oLz-}Q)2f9iIEhht0Jne1oxP+KFI~OM=8US<_ z(1j-eENm`1QYRU^=l3l9w68ebm`TRvV6#9BzD}-q{6SEM8X+&!?%Po5v45`#=(AiB z_@He?7nVe$&(Sd?2l-^i#r5he=?~ivccSV)$s1Cy*1N8AS<$515VHEay%tJiwm(@$ zh0xahJ^=3$5)||rZeZ1X{=8h1S=1P;$%lpjyZI{NiaD1A#<`D`9sfltK_<7|A~OTSaEdz{UE?9@$QUDamZvKm3S5n(#=Aw%p`-)5zWDdI7p%Z?YR z{=2-5?`Jf(h)D3L{-5eL3G-E;|4N!~a`ApYP*T&so^l5C3;|EEkQ%vo@BHR3tmlI< z$KAU*Fo4k#clgY72`8{qc5Mjc9S`K{y_6P#`Bi8N&^jvDiOLrFv{<$imqkLND!}3QGC5gVhS2rNbQ70-%K30T_T37V4E@-tO)n$a$^; zPi)}g!`yUd#Z2lB$E9r&O?rX=V0v=zx6w|V@TJz-+0;FDJP3D`hYvZ{b2dJ(zmDBQ zKn_3b<`ni$nR2sv)sjpnRqK0QLdMXp5!fUO?$e{^NO#`G@2=t=9PIhFQb)!|3&Mal z1Yex)mG2cl_pto`n(QPXlfVa@t%ObeuM><>%Ym>7sFZ*w?>P}A9-cpU9S!*SJ;1(> zF*7^c8URrVw>CC3vioVOE$~S55oA>y5*cSza!5_jE({~#Vx?B4vrJtw>YAFgp2mDU zJT`C9s1U|J5W->{-s2<`e2w%;5Raw;9pD!XhKX1~wMzsq44is*Fz2^{z6$$YZ!?~n zn&doUQ_uzlP}3SOPW&odY735n3Z{l1l(Bey#vJ%hF0Gf=W{QdO@%aU~g|3!$$3{RqmAR{GZ7wQYSa-X9rr7d4Ff!Doib-d10EaEXIp0u>I zKzqKVRq^1DU}6-gAQ({JzoQu(4b~B#*O`&}{?kJ+v9F%I%qTx?O-S_xYT8BO7N{%0V=3hazs7$sYS7zqbb#g1*JrCx(b!m8d&(JH! z$Hf_e$~kolqYNU)O#EV3Pfw{d3u3kG+W=?h>~+SOQYoO=O~wrvzT6-!2CW3dm+J{( zPV>b;ABJ;# z0nw04=f^bm?+RxVnf#Cv1u_KQuP}gK8ccgO)z7`$J=tUPC73FP@&<@+(~~9(AQ!=E z4fYEKNrSj2wtXD9R)0c=k3#P(6z3Nf#w?B12ef6Foo#PgnwilHkA2!tn{jLVHVUgS z^=KIBR&uYiV)-@J-#Xy+Zx*i)LPLk?k=INiCkGZN!u>7|-~&DCE~!Jt9ujS=EQF%G ztjFYZwUgWT2O^}bQoRH`YzFs1nDE=FqYgP|oE7LGD39*WKZB%2CJ0kgT_>!0x(NV@ z^=u2)({&*#{oR?6$5SSv0Zr|@mM|(Ns{NC zp6$TAR#$ELN+hfaC}{Mta4IZjN`K54-!Dc1r<~35d}F$ zhrG2I4II%{u-%KBTtc$kqHl6BpIlNND24u{M?U%I0QJP9kEcZx+?OV;MV+>SfyGRU zPFb$N`j9_8aOMUXQ-Ihy8tFV$Fm1`f&^hh7U%<){Ezyg+sMOYk7)qca*YnUIZeiTt z;igLfW!wX>P&g;Z#guE2Fanv= z4fu=!?8{v>o|n9;coN5gma+&h_k8WHGoKLgJ@0&{M*Z3+rqYG=9X;m04%}nX)U2$n zYpV3beD7hfr{nP~p%GG7v6><(q`D1eH0j0Sp7kyZ6Ll4_5xqbB9YBHxFl0Mb6PGyw z*Z51mE_wnh;`b^HzDyjYv4m)^&N)_69z^D^^f} z9e@bk1Mf6Dk9Oy}>;zWQ;>U!pn!eYuP%cd9^jWDGE^%CyYFhmA*WgU!gHn`NHjIx9 z0bC5&GVbkz1>bY~r1{vIyhn7kr2elI3X!}7dP(@4NCmrjVOPubta@%Z%RYQ(lWCwoWs17@9E{ihGg5k z&<6axPlw++?U;9WBfTPqhdWlo3eIY#qLp`coe=jupncr#SQOQCB4jB_O z$?p8eyCuCqzzybPj#oct+rT64lW?~!J^-oFXbq>gKLW{r#}r~C6AC)Lg%=Nw$J0zzeSpF^#tJ3V)Wf2A;QiVD@HDLYOr}_ z1xM8J<(lPZ4RIIbe1g5yM-qwa(J0wSmx%=8Q|D!6ks|l|FX&zhn^Fdc?5Cz-4al+$ z!Bg( ziq%sqdrwbK;O-bCmtvMNC^q17=8=)&X{waydn9la>VDWN(16xG@&zS;-x}q2i0sSV z79_e`Q!=o?=zy-#?Ol%MgF%#+M?HLP-I{T+LsoYmlLvp*aM-zQx%Xq#eql3Q$I*mw zdlPfi1wu%2#Yu?m2>V@}& z%)ek9>Fo5rUMly3x5a)Ah#i4gsUgx%_U>N_zP z2e!v$zn7N>ska|;b+1pi0g(fsVmE$8jPs?5iJ$g|y}dnBdPTXIpJ+{{vZ3^M8|pD zSL}FQ4EZlx9~>2+oRZ*qH2t*gXi`nOa&u@FmEgG#t|fzkvTa%wF-M+r*0u*fxV3M? zZE!10Rvc?liHl!`^nu>tyDByT9E7-vN+&@1?hxMeoY*Guaxf&KqYnalWZ%sMFzn1u z)C-0n7Xu9$d42pf)r72u3IwlX97TynR=F% zJ`GSNQoQH>=Q>lBl-H!6?r3j+^~qyN$X)*7WKxy#?C>DLAo(;s%T6yTP$Wzqd#3rK zfDCvx%AIK6VO1p5l=|A}5Vf#hHWzmR4O$$MFa^%EAtDzs&S7yp*Tuy;%L)4dK*N3= zfCDLm-LSs?<~L1NC8mF#tMR_nk(K*DxR-YtxvkxR8}sV~q9tytar+)1mXb{8)n?Th zbnXQ4=I&=ZTIm6jZvff`@DwMJr-GtaG}Y9)0n(1=-~mm{_+hm+qkx5oq2(3d?@@$~ z_wFPoPrW~J<1sr*O#kxbOmx17cJDsOy8^%x0dJ)z5a{1x`*r;8J0OhVFBeY}14^1b zEd=9K6xfJbebvmm-@f|Wy*ePwCZ}v-4;fRo7|8#rbN()cY@JOxgo&|F5x;iWzuHCo zo%H}NPYb8p2V~%>f>`p`mercqZCv+APJ6cx>?pgD2d7wvlN-kzM&Og!5jYxsZR)F& zae5Cn1%Pi01vV|^W5u(%$HS8kxET)PrneYe`U>{temCH>_Pj9k%B7sF_7Vm5E zA;@iu+Rk0^y|dtuYIv#L7xQ>iJ{FjpaMGC@xX4`xgQ#`R(~jgJVaoX3i{FW*#d#`J z0<~_8UF-~~8Ccc83B<|jH#+N+{RVq&ub`B(KhAlrK#BObgvsY2Vq!NE`6sTX9|t4gVmn)wt?lxY$BLN>H#sy~E<`<&d)&0! z`ueP1_HInfG2Cq#&sfbdWnbC3m2Nx89u=x?>JSpT)(B)yFJrFF0Lux zu}u^BonZGM!GZ5EI`1p%=sO9zT@0ah^e$ zGU+mdUVz$A_7=Ryfvb0*Y-=DxyDMw&u%3TQ!@l*{J)>k>Cu6hQXo);@lWZ(2-o+bg zRd&M#h?`ju+{_Bc!TxlQxexC~f+%rA^>bWF*hgGL#5Vo;5dn`HM4$mh_gM~6i1qV=BT4xkqdlrdm{NR2)j3R3Lf;&?m~D_=)JWC+!mO|y&$>>)VU zFP%Q$$$z&;Zqy3Fn{9m*eeE!hoq#O?4%hhq_do9(ZC+(R`GPC$eIJo-7iQ@7{(OE? zoOeX9&F0u66T}(pFIDMPiJaRY`^)GO;57J@xnksxIZ^bu*k5@i?)_gMVtD!?IC0ef z`~VV+0QRqOF4+Cw{%@}p0$(P`DxUbFk`xmb z=r6W5X2=RFdS*ImeP=2}_Ppn)nz~Hzb)UTyutw>cZE;@76{nky=>0Z6*HhkNcDn5^ zk8B(=*;l}d67r8eED9`St|)R}8x*qc^qgG+HOc$UD%^QqUcAvYI@uhtfc<8pnv-1t!M-fcIj9;Z zN?mv>qo}T8X~eF5^O=TN<&tl2xpsVGD>bQf3xm&I#J@lMZMglx{HSK$>e%;&tNgx4 z&Mdc|z^u$gD(zsg4AYhaZAUDGo2F3vTS8H29GvLCu6*$)t(ctzoqc`Y(#%a~qrg}z z_?mBFcuFSv-K7*E|VYj%tn%d z(xes?jDL%>g*D~ECLF#Wol2~l+>@pK%{~8bE$;uS9G$a@PV=%2SJ8oh&zApV3?`117C>Xn>LDEdOao+i# zUm$}rQn({L9E%~yyC+$wXkz@!N;*5v#k+jgXL3f!$*_EzyZ)W zY20A_A$`oIZ)#ZwP{DCsCkvFWzXwsKbXUk z!Zr-}aPT57$U*aZLpSX9xYB*-DZ5`vtrHlumOgzqsFW2@gg<5^TNJGV_8c8QpXcoh z?<}5egST@i2jhn%kOe>aB!N@&W7yYDzUA1SKCfK~6*b&*2<~*!`t`8TYWSPVN|I-4 zV}7U7R}z5|Sji%{6>Fy@&QCTi9@@fWozy!Y?KHkEEhrF6q(o~?X3cqCs+^kL&qu;oSKDybNVvLwf}fNu=UF2_qA(@p2RI}n83b; zWtEP4Pu1#b(mAS2n9RD`_lNyrFt?ABdLb!mlHu={?JI>Saan4-FwbPnS6cJ7f96}3 zGCAM1=m9>}kG?ey7SV!q#xGYs@bsr1JYGqq`&oY}X83c)mlqN|RE_zbnTHJ|+maIA zihm2X-z*Wxy`@0%)8-H}tV9MO+|Y8eP3C(So`EQ4E)YDJ;9lLlq+0M%cyYqDZ`iZr zZKE#q+SMOnyTgE4un7&jTFp?x{U$SWYxnX8hoWx1m!3E6Q>A2NWVreshwrAGr%mbm zPXE$KQU?9r;-M#FWCKK@pinZJ?3#Q)H<#G3G)2ozn&$smjEK{!{Wq!K9x0*A2JWGM z#`{>aCVlM~-q6sor7jrMBk-mGqy7EdnztdM&sT_@BF2aw+r+{Sv(VlWL;J zt0-Rf;h7vIqD=t~jhj}U4!O2XMTYatG)T&&Ylg~lS1w1RKinP1r1LmRytn>P+A^6o zK|KCTFZ_RY-f8z)k*yKncE!O~2M0z>Xhr5`vH8A5d8f8qlM}@0Gwv2`d^pWgNU3bZ zXwuEbqQwU_qxC!}sN+?~$vZHzL{ti?TB5J2OQ2Tm`jPYJ#Y7Fc?+Az7#%-rUwpG$d zN159O;h%ck?=#OQU8&rzuU~#~&^S9YquBIFlb(bHyOMY<5wJ(vB6cny`KmiTK~58A z)j+!th|9ZJ=u!2Z1g?<%t=qabmbW!PoU5bk+}0dm%Uzr_qZ?$O6jVej!O~vdJ%~5r ztf_eF%8NRjn33pC#5jLHEDQW8J+sf2KfI`$V!(OJ@1*fh`|REZyd z;6t^nJ)vNyQm1a@4AjcjC#SK%PTfnOJG$QcF=WYYGhIG==x{;ycx7EZUbOv}uQ(}A zH|pOXb%aby{~T;5HV&LwOJZA3i**~piD?2NblG^?`7_Pz$W=^;%y3fUfo=s8CwFhQ z1N*qZ;GUH=!@S0hGDlts|At1}RQi{dGoPI-_Wkw~RU@u^3$Av0s+9LDnVCjYpyq|l z+QULpk%CBrTn}xY?-}&;`6rLt1sOfA*9`QuTOp1mixRCYl z2e^@wOazBZxxznisM!{qeRL5Zf4WRKq!g9#UlTTome?)y(MqbInd%4vPk~T27BcXU zwesg`8U*qp2>XscHRb4VV zE{`)P*dM$Nd6K4^XF9dSXYLBye`JrqE=g=Q^48}uTgh>s<~rXZ86%@dPPvGhg|Wl; zq@luFMMbSG@|S;AGGn&FqBuQVi!B3HS9J;7tKNa#qY{YO2`3Pg zFx865-TK(1>TG)kr-2TnroW$KsYKtlZ9-F^>>iWVr~`)8<)VDI=>}FUi6y9QDfjtx zY~oR8M4Z65&G#O^kIU3PPLr4!ZjMW=_(Ve%S~Fx?Vbzx-j@zh|`#?ABDoSEi@bb6B zudYO_F>UNXQ@X3Tln`|%f)7Qn^*vEh$as7GD^wJOeKEh4_a3iklsXd9{ESwg&dDS) z=&!$9pgs-N1uqa{eM2;Y=wAsNPDKee;K)_0`b(o1ag69Q>t|#R~*`-WMBhO_V%mi87 zDpn(Z$+sY@+!69jUl4zEEoip0LYqCz@ib&%2feq5p0s5ZIkIBl{C&V_r#Nt4a)f=1 z0_WZ*+rQjNLp6gL>+rJGZ%jdi3!C~gIcRK@~}`xd(UEEa1cca*z^fac&}auf;-0V zSA?#!-EPGVqmam$ZDeAyY!n)-&BCQ%kY?5-(nO;IU^bw2>OD7xj7evfv zA=9r4a-4p9dzW~ihK)d5F>44gG9>*j{7RQikO%I_eRv?L^~U|*HKjyluQjliehBjS z`IawVdn#69g7v_jK*lyMDpY<#gLLL_7)D<<&IrF&5d8(*UIby-;0oqGaQSd9bsHtN zxwG!nz1M|y+Xm^o)Z}9`aJM^0^}qWr@j0g0VKdIx7gnM;QAuhb@rar0Z1b zkWX+9V71F{J+jboCUmky^9hCe1?d}kui|8nuc zT2pVvGxXcGI5Tr|&HNX?qBspzc?^C8079V|;46-3^q0Hj(UfCi%qa_ahJ*&tNH#tDC{n2m!12vL0p! z824qDU}Av#3cE&*-qu1t=qIXTKvSDd+G4a)yWoAcviY&4^t2^WE1>@4);FIZx64V zqxV{N<5POe#%!nBSGbVYQ{7O(cu~e~$g=wSNp+*$)X1Zlnf{L&3&=wv`H=3-k4J@v zcVTUnJf>4~)AUh@yK+cxVh{H&uHmfR>{ zR3M?N>5kz}P^x@3I1yu>rIeeQ*%C%>Qtg&Kgr!(~OQoaJlPAM+#&jxij!chnyKWyNE8< z2sILc3c70e^Co~(KYf)ve28a47I>LWxiXr=L{rzkh4*RQrC=klj2wME>Oqeqk$x~= zKZusUwcy&A<_HMUmeaW}yIH0Tr*PhTV?z*F%r$Wa!B9C@bl+|DY#mF!?^E;Vzkqu& zhH`5rJ{PQ)W0Ch$-|R$q9i_?cw_JzW4zO%B(mp?b zDIV?Gy()Hu7MtTOkqmqyv%3dtPikWll+kY~{n7v6bo%a9HDJR_6q@k!`R>IG)d%w6 zK+KJ}o zp>oWNcHI=Qiz_-_O)@DryM^DKW%&7qU=m8AB##uR#2x3V0> zH4qVhNl)WkoB)r{UDa%R$Y}7$aJE-Ho8X}bR82bMLe?B1 zzOx$8@m7{S8AWJ_*io_UZS2Vkepdb`It)XOf0SP4Mjaa;Z4y}TlVy9L#gKcO$L=eL z;}s6w;&JzA^hB5}yHaji+Rr57sH%0FYN{{jtNRwPSMC_x3U3V^ zb-nfGaLn`t4(|PviYiGo+Jt@Iu_q1V>~J-j&oYL~(lDHm`v=uM(^d%alUvYun{k(i zJgkW`f^@-VBFcYazovY84LS--osHq(abgHL`Lmf@2|_eqwVhanOz*1%_-W zx(ZK~WkDlD6Ue+}S%K>K5sYgSSacc1UdS&higl|5TU(cf&uZueu7SM^W(Ta*5zl?g z(SYZQvn~9i7DpY;dLQCl!=bDNnR_xwO~5F|Vcy%tv|ky5U=C)aB5lMUGLL81$(5&O-!dC+wCiJF^$Q4=UbqzNfpl zSMwKuw*pssOR++;84c(c>EPT~Kf`Zx=vEF{Zyh#sw`nBb65*p*{+!+jw8Mx=zB=gh z@bO7=z8rc>nL+MnNC;28grkhj(bGUX8HkZ>&ULe#KXzmWBd^jZ3}#Dq`_s9_Pa3ae zl72bAReQ7qjTa`@7m82c15sM}j08ASRHjeXz22+P&GAI{KkD*nX7&f!@k7%stINFZ zM!JXZ5mx&x}WBQosi}8U|lruBX{MeMqQ>qj<{Z)ib7+91{cU0 z<_1`D%sQEn+Yev9%2EE@v2t4^LM21q*zef+PV}4yKQC`ugLHbbmKFKiXmnODULEG& zABW2Rph;8br8DOKSESbQfo{gI;q(37bokNi=*Pq1l;gc|8JGfH;g%m_(#)RU}PkBQT7r$XEc-YJn2j}qYZwW5hxn}HPW@m$Ozgz1GeA?!^H;oS{Z=Zbb15jwd`#nkd zYa3ryC}R4-i*g*ea6?A7<|JL(3L_v<3PCiGK0M_V5f9k0q+RbD7TGz3Cy+;vlpPuAUUB zduV#u@8UP2|L4cCksLZV;U_RBeNG5SSH0frak&v*-0;}3Wz}~1xN0B6wqLbo>UeMb zt(dDvleLhkJE}}D!KtYpzPdQN*A73H#77>dD^wl_lKFO%OB_D?TcO>dEC}pF@N-Y` z`=AAON+zGlszer5dM4)iTs!Pvwckc*|298rJg5rpqY(u@W|y9L7R}+@RU65O?GY}S z>gBTOvJa4VrAq@p>F`bD60T9*P__SC;rz>>@oAIj)$6yvkM;AI(sH%k?27)~mob86 zrRE}sf#K6LA+VybQ0z=9v)K#V)hF2~M6?Fiwm^zV)XK}nmS6@yzXDQwai?G`2`%4) z&}rG}VaRByV>;83J-s+m7uP88pgC-QvoTKyM0nMbh3$(oa{J*A0fPRoLG_nuzPA8W0ydDV>dxunO^cww)C1Iya1Zk*~G8BHO3Xqa9F;Kp)mgBoNh4FN3{Ws_9OS0eV{RnZhZTmrfx5n<(70}B1Mv)<2VKG zw--{0z0zRi?OpgiQWmH-L-<+C(^;kJBaf%L*A8vfZxc_6X&K$(2X{NL1ou0lV9l#O z3n(ajCjur@@HOMexe`-s*W3&)dFlN>Fn8TrVugAaET&jB@+lQVZ>bqMm8?8*fOVS2 zqFIy?G0NIf-(<}B)>a?Yp?M{j2u&4jSZ^fg%a zxo$>_HskR;3GU&al2yvY)+YaFC@bxz8o_|&W>w|r*IEH9X43?Zo(QVjYqMFUb1ddJ z9^gtyU1sdc9Z=_B0ovjlfd9uBVgYz{0E@$-{Hn&PY>{uOICsLwufR`rMpzoxwIHe^ zL#JZTkJc*Zd8CeOTG;q?)_bT;>!NR|iL%t~sza{xnS4}J3T|Ot^}PNxB_F+*RDRmf zG({%@g(-7qYHf#5sx)3l)ymITD}K@3S5-I6S(4cJY*&Z>7)kDD=Og-%TF3cw6N`7p zdME#jzWLtlUZTCWs>PzwrN+1Kcu=wmhS8&q7c0zJNXk}TREZs}hTN8mdiQ+pm!`FL zu>)C!=S?tat<+Aji%TV)0m9~K;EqzajEw2ps=3UX=nfy6;64dfcHAh-gw<{M>StzM z*V&(=Z!WCDRCjFuPjlz}$oAg<{f^T`aXP3P%{f(76h&1-(b_v!?7g=dLCp@TR#ff1 zcTpo&jFyrjLG7)C*wm^W_d9LR>2p?>m3MC!f!IzQ*JAe05YvN!|2~>$yuT zrpedhyEc={bT-_IGHU-y#F&D$%M{>1wbS&gkR(SiWc0U>6 z{XObJ^8Idi51>p3^Gsh{SQwL%1*zUyW20~r`(!kaw;p4FOx_^+#rJ6AFVn>Z{oo63 zjozWwaiKTQjk@cRp57QJDj6(Lrr&j;dhqor>UU$|^(HD2TW(MUq0$bL+h{yeP|c$c zu93G{F=Ah);yBlpcJ9(m%VYPh(POh>^oI)qY3TatG}AW9s1oKi^s$2yiGDHl%ycQ8_vlL>^mU6Y2@7W~PGL-I+eNb2YqWNH{*} z)SkL|uu1VvgCZ#=RJ?faJ-YO|xPgGO2VMKF`pY?d4nOCDsHM5j0UiQ6Ia{W`$-1!j z`j%vs%QGk8i(nRK|29%kYK;sr>GC~d3CO%4jz772Agh!(X_Bqc>M&DPxK3P%AXx>< zpMm`%U9++vvPrto-30N1<9*d>oMCR)#$CzH!hyfqlf&M?r%A1!JJ6mR)M{&^(`R402IN}$W~Ij& z!sMM>u^uT7My(>}b3fcMz)Z5H9>4hyldVSY+E;@6$CFeK?wEdhO-559$spijxjFZF z@q9O z?xqKGu7?XKNtkJ?nDSxx+{-RA9ckwfkYs~i<6zTq>RoH53yT#%tnKPf^tBDgAQwVAjqgoRqU z^!i~Y>pEABCqVzQw1Q{r0hEl^m*7)64zp%eZ%@p4{rmnhc0MSZu=iZXt@O>z?BK_| zEiy?4+;sKq&J2I&Z9-UphXwgM2UDt6g0NRDh=Z-697KbSB(sf<|>O-4??=GFoGr^TAu{dxDRc5ZT$N$bA`mTAM zaPnr(UD4Tb8+qy7(Ct0*C|-&DBHE*uG$!rQ9At7tM+q^C32zEbhf28{w`N1Tq`}@P z1@cJ`F+_#D5aW%WMIBwmht?s&-C0MMjl>ZV_}fCEGU*OxpBDNGK(KmA51HLabPgOJ zGQMPH>38X-eAPmJL3(8dHVpVy?{^#jGL|{uwn&2~ogYN(?<-}CjE}iVez$Iu300fG z(%f7KLvws`t1Z}QHQI03*U6*LSNjqoXRhgal3#@zQqALhpk}1=*dRXtjxctUI+&u> zGzY)U!P;B!k)Z)tqZM^Bkq&6T0J+a{pTzV&Cc4;nrB^!iW!arX?l%SyG@L!x@943m+qbUy_e z4kZPYpg#|8Pyx{?VOpMNhFGplSD)Y8TFi)j#S;@6JmS!xx4aXzBx!n9+ko!n&B^q} z=uvPp7%hy?1t||y9B9Fp?#kUUYV^}Lc@Rfesageuob&`9K~+sFtg3eSql}4plC;BB zveC58PzUi>@hahRrYs1bC0+-IlABVhnXBRK>|Hib$C<_|tZc_pdTRtEhQBOxpff5J zeA;%qsm-~YENd{h>e>_~G@pou z+UpcwW*W8061TYrBm-F+V?4CTaUWoT`fkgneLTUs;`G(2@g#>%wFk7oj^jm-z=&hf zF~nJ9Q=vn$Yc-%pNK~$5Wjo3qIbz>%Wov2d0qR}&w%@r+x@$uWY?_^9?@m>>09_zX zjsuUh1#Kp41!$HXPt<||cMNC!istfJ#>>uKSeC8&LKH)C$Gb**`nK|?uhzkQeCp-J zwrwuza}fG<9K1U{$4yMC@;_zwv1=5m)!VJSWy?~KS12`3Z;**hJ!s*}f7xjNIecJ= z)gq|(RZUkp+Ql*1ed-*FW?8XlAs#Y=cA4}Z2xd?y{J_AJ*9FHmK?Dp$$J!_t^BY zI*5N}Y#^2)o+m6J;GL9#%=jO+%hvW8t{w5TPjfIgSC}vd)jmy0{|%nGP^T3bmE})p2?Bp95=vu<$`2CoX$5A+uT`5+Almz!in-+eW(>LrriGTQKus4ID&v(s9R3aYUs29 z>1&PC$CUU;xeFJxE{M5(% zc1`6pPY=B&q@7eFeq17(&S+eUcY=c<%7~i7SHp-Ye9k5MwpRMF$!-gi(`K{=CnzMV z#Gle_?+PgK#HZ)^*TwRAa*pw;L1-#oi*Gm(ZPzzdS#unnqgzC{eo}t-)Jl!y)ooaDe>VZJ5HQ*=jR21qV5fh9dK_g zByIO|CMY))W~V~r&a~aZM4*E;3*Qo|;+lbQ)!K0x|23oRuQJZ>57!@aja+)5+pm`! zGsFNJ(-~zKAh%Iay&OlBW#dg0@DH3;8!^2J!>Bb1NTI%`za>eIrF|ph%u{O;Af7QY z1G0E_I07)6aAbFrJy)P+FDYXRy=j`r&|1QvbZZTDPswIN~(_`m=;OG9fVW?k%cQ?5_TAqKiMA6{J+g3mcq~l`MGY zc7=v-;&Bs2wAza_ja!X0*Ri*Hr={>NFBU&gm10|#DX8NULBFB>g$vEu(v}^1m;4cH z9y%G4qn|t;SNj)E!zFMFWxZWphAkeO*M_Vu#ZovI8|l#kNxk!I_d?sw)AQfe<}bab z`{-Gt6(T}Fgzmtua*U9_m3m=s+>=77%p+{+exq=AklIt+!*vlz?x9n?i~5+fqKWiE zC6NAkf0Wi-|1xjFCR{t8dr?n)fCxL)TA7jfAJ>y1a^h&UxM9!SBD14Wz5Hme46pny z4}F`7cf`0?h0xhKxE`Mo-`{qbkFCBm^{ zFvalGSBK~B#Z4MEuE|+HI-Yfu{?uBU6mI2+$A|L@F9zE0-XPvTrbbNyPR2L~%Axl5 zPI`2cE8`@qd)G$Q)0I_gVxug;yqE=7dhurb;b1CAU;mic{#1RA2@`6LBj66*8k7DA z+@~lA=PKU;cHNY~Z&)YpRBih{lo?UYa>jqblt$W<8=5M=VrW^Vbz#c*HZHn1!?SU6J?&-vG-)m7h4_Wq_7`WT$w zt*Eb!6h&ur3iN&Of94m(0`tE)>tv9E@X9I+rrZ`=QCk z6S7IA>jT9G4v-s0{(P8oxCZ*lCcoAy) zK3X1;5bNb(zM#)qbAy%H;p|eF^o$IqM1~0J`G*q3O*k`8eU!;~P1l{vA-uvrkd5_#Phdpr)jW6`O{C~{gxCE{09(LW9>Qri1$oHupI~+d`a3%1Yh1V{Xwqv(AFWGQhA98=wYh;mh{gej5JbEJ`#p9AU z9ynEhHjhWHpVN8Q=_Mxif;l45zs+^P9MWLjY7<7(~KIyYv1wMU2I zS%u$}zRd^n{3HX#2<}cPYfyUq1KbFP|G>H%8ABv|O~{Gj-I~x@7;s6z_id0wYyd0R zjglMzT4~Ql)vn8k@EfOr_1TEj7Arw zrG}hW`rqw%@0Wi^)f*X#(}nr*+hKNI1Eh#So7ACHEdEvmh)E}Db7LYps>-KxxK^Lk z?fc3d5SH;H+F_j|RTF}wQ3m*11`D_2=A3d2Ty;~xhrKT%lf7+}HfGhBui9>pUx4oUJBVC<+~MFX`4q zG;U!7;5jsZ*h0=xy!GqJVVm^O=k;yM`&#wt_6_4B-GC*0wp+t8JiyUFmAdN!h49V)3H(?d7K>2BD%9;i@PNH#6 zoWAB6B4Yf_r+Tze)E+1WT0XqaGjKo;by>5^}vM%mZprFN}r4h?C7}paX8GpX-_5RvtQNJ^;_~F z(I2JZHFkqKL<`l}!e>Y^0&H`4YhEky=;Z7BSTF&-J`0}VK`9T7>d?=x-4#uc%+SPV zf#J8oF?(cScT4Uh9Iv}6QdD<3R{_P~dO6vAGfB4NVX;9CPfp2zgPC-%g!sG)Y<>C1 z)&2O|udJgv(s%bvG3BAS+%4>yb6?Kl(U)kdqeqc}dkJ?i$~Q^bt;11;_wBU->-SvhEet*=KsJ3 ziCdcP%U|eUh|s@u%u}blKcA^n!qT_KbYuedSrp-Nq@S*QDxW;87j_S+V($?Qa{i6$^O0iM?3` zj410R=Yzye3ym^!hO}p-*lJEn0$ybJsK%{j^=OFQQ(v%TaW28eBhk?TnKH+X$=a`A z^q6{x>EWsarIs42?h8rq>DiSqHv}RS0Bhg}3b;#396?wL;6^THLL{)ZpZ&?@VrfRO z++fEAXlRy5pfV4@cIjeP&Z&k0#E?$ds|rc#&n5v>NZJ^9%|nJ6xQ#z5@Q;jzd%{S!Ugz$`Konn23Z0& zU{^uL?qJoO9RRO{ZwZC$4`OWBSriiodwZv^d(15@>7uNo1h%;IFXGaga~0@g6;SKT z94pBgjU(2Y)PJq@|B@cH*Bj5D?allR&=+Tun12o$FrVfWz7D{yjencMz9>FStzPys z%Z>+p-vCT#dwt>_>1q}fyv)6x$+1Kxy%OPpGuUEgU0mIfh6bmUl zNq$GQ4=L1)b*$q9d$TU}J#XiOj04c7h%Xll(5M0&=tIe9Lo0K{F9XG2=|{=kAThSG z;M3;1&jB??3taq6H}hH!ug}5GDRP>*5SP~vn0PUO2NQ9cmOiy}Nh3S^)2XdkJPCab zKk=4Np~*S?Z=`V_QQSlas2kNVuuP8VNd=IP99l^c&#;mFE2l(;WqU#5MZsLA0)>+A8dp;$yW6x^I#0-ssW6xCIBe- z80mL_i9hvL58a;?jEAv2kV-34CBz!ax$t5#q#4nh;k!4(Pt*q+?>+cZkt&?{ik<+}isJWZp3O-29sGzlFg95>uYtus%zL?>?pPs%)GuD z!gbL4s97^1Y7MkPIWI%obH%``gr|u^@B#R8Fby!yVD;L^f!6>V7d~Mpm%QauZSZW# z=ySS68`rW_jEK+7*%)cDECH?sI8A5s)hm}+6d8C-rGaP|uPV7^G}a37=(u@>V)BEbEKjBEA78=w`Nh>z zg#Scwa7=k(fxhX9s5N@eiUVFT~@==>| zL=Z72K}q0ulKQV)KjNGaYJa-Zz>B?L8_BUTpC)`@fM9>vJpXwQtngN^lzr#S{s#8)Kn<009D|!fU_!3u8f|ZKH&USryd3V>diRbc-RbR<%-@M8qA+w9;rmT zq)3M=S!kPE6E!)tZZ5^VUS`YO;c{$L^5^ik(p7x-k~Sp>;usA@?c5R^}hJM z?f{(eQizLdz94k4NJz?A7Yt*;A@E9GCV>E%UwdoDvvZ7op3Q?0sEe!m*i7RWQfVSs zlZR~#A|T-he!E70u}}YPQaPM;6Yq~feam=1fa-(ofrcmen1GlSp;E62n`K$TN=PvH zGs>$xHxOZ$n|z)-0gnwFUEk0#9(s}QY3wU2E5Y?qTJ+9cE6&;rctri8#e^!-l?`tI zRb6mz;=!)K*M=K$vb*?7)3n(Y)vqD6+@eDHF<@r57eeUCNYHd~ z=UgO1>9QD_=X6~pT?N8Vr4&O~Fa$xk1jX%gyq)1a_vW*Vxk2olwuSate}8f|fC|5V z?rXsxpx1x9jOdCKXC&#+{Gy+FdtpQmyxo;`Nc!_IgzV%Cw#} z-cI$p`=@}ah#Dd-Txvhc#t_i!%HhqHqLCqz1q{^8N5@j1u}<*QG7F6@Ckw^3Dk7eL zuHX$)&JI(?e}>SiS?6RgaFU-s^S$B;!!XeBgSk|qAn~79ywYcCKm9~5pM!Jo2mK4e z(bqRIVlyitCy$ALuU3ZqAm5IqlIkqq|Gn5HagO1e7{`|5sZ{?e{P9nswzmk%2}B4E z8VQHKC9Yw9yp+ehNfkl=sNMYa%xoMGP^te}(EWW5{=X-1|DWQ&|Cc|P0Ifc@K$nzY zgM*RcQMZYFIF%esWGiyhAxyaD;MtiQ)U1ExKmUDU_8*)liD4l9_#OesI^Plr+xg;q zGbRU2R`%=c*e=$ji%_iHmIAU0BsaD=uRe4*nr zixz1xU3QMi3+g)@zQmzi1_*1Ccl56cPd{EXO*_(a`qPX2Sp3m^&&1(UL;aiw5Gae0 zQWrTqh^a>{w@JV#HY%!Qpl^bRhZ-sH!Musuq8*c*@p_BH4@dWW75;M=z{dL_$dOAk za}Bzls!iB=4egXoIUKkG1oL7S*}iN=aLJncdm@uOJQttg4aU57@*S4w(7ETF8Pa?> z|F;(f5=r_HBB8i`Gvmd!gV&6Xh@I!&u1Pl+GEui7N6cd`$By(ke1SISQ9zQ(6}~4F z(#{8<{ZafTv)oGPdO;fCK6AP1BzMow{BuP5?)~tej_pCcO_40rdtdVMu?#8P-h2Ip z0OHYE-UK?6ecjz}tR>mYKvP)Il6T+}gPu9o@kh1ke}Mg`p(ooId>=Ol0cLdmE$GBb zdHK$&&KaXY#DJo@;^Zb?8l)7`pWY$XCg1^OLI;l=DgY4-)IaF+(?1VJ@G#7GR3(Q@ zyua)XNw`GDf2hW(?k1DBa;)z-&JnH*%2YLskQvthU?cxJ1x%u1}v1C@fRYM5JjjO8L^xp;%j6td93fYv!Ns z3rD4@NJ#QBoIZ;P-{Sf$7xF_p?e98^zr?xr8W|w{UsYML;iM@Ir@zKp0DRcxE?s2r z;0|N6c#FLX!P0ZPAB`1G)zBL#J5iUBVPbQf(bAScxgU*4&8%*P8mPwD8nMSKljN zCaZ=f(DN4Xo1iq zJHFH4qg4Xs1gL9E{Fss^Cu5Xsn?_z^`hheJVQl1<7V@p^bYsFchp4k|_@vVE<@BJo zHS(6a^uD1DLI+$^N-ChUg!@%4A8&C}&pawm^;Dzdp6ctn_nJKi^m%$F!iE&tmXsBu zcIZ#%Q~%e4@sT1Z2cYuZ&{)9Bi3sGLtkdpTWbrLK>`EYQ8iRNP_c`&&R5NGq;aif-jUC-b|UfnP5BVI)D7uAEk{E(7e*J4H{X__2vLA zm15!4@;B&L?s4qPLQ^0uKWsiKdWH>E@A9QUx|Ja*i33LixPP|3yg2`56WQ~E43ba< ztHkJxU0Zv5%5B4v?4ZfcUUU7qyG<0DN(%qjzqmiRF=(=?kI>f|f|B)x-z8lhnr${y zIr)4uFi?Y4%3YnA6KPt8E z!@$rstS_Q%KkQVJv44!J^~JLb>~x1wBK5!x3+KRqwh_ThEC^j@XI&n#{)0I{Lo90g zW!q&wk?fn-#YK7>de+b!lz#VKUg z_WTsNuCBy1D6$8|gP^(%0;CP9kCy+GS)urD*{TKeS^&}KE9br>AHVm#MoC6OQM^dh H@cI7%+3xD3 literal 0 HcmV?d00001 diff --git a/windows/deployment/windows-autopilot/images/wg05.png b/windows/deployment/windows-autopilot/images/wg05.png new file mode 100644 index 0000000000000000000000000000000000000000..eeb5a9beb872a64d5c7a4ed78240c14b752ba560 GIT binary patch literal 264215 zcmce-Ra6{d(>00(NpJ}6?(Xg~zyO20ySs&;!5s#78wL#lf+P^!-Q8V-2MEbOuYKqJ z*ID1ixj7fJW_7P#-Ss?OwY#eJu2>DABF0;iw{UQ97|Kd=AUHVGX*jqyxu^)RGe7d+}l?=S#;4u6C@q-_7tFnfJ`&*$b zC#~&odj9J0Szyg)E1KLe?P9qRi4kxRAyKsrxCyJ(rcK(sLi;P2q&*GZj1kZo2n-mM`@^SD#l+ItZio9(Z0?{>xknx4-Qcb}Ur>|-2x7%D&v+tYrt!Ed3-yR>J>cOX}jILrI_a4$)ecdiN{Rq$2P-uFBW~CoVyux}6%Us~tBy@FZ*)v%2=Mk~krdm6b2ii(P*QFe z#5q;83R`iGpoo~buFMV9&p>=8t_aRVG-jI&{ubY_f}4~@vav^_2MyC1KE8kxGfhdK z<2{!}lCQ8eWFbyOk3qaFF3E658ZsP8luf|*mW}wzEOEw({MX-$p%GBJzl4IBtWL-Z zMEw5tj8=yFglMDt+&lQgSF!b4ra0Mib%L{ro1fn8o9CQQXhn5NlUR$8_bI7hP})zMRb=4m+mB-#=}hdb~c^*N3+fc>L3PU3n4nu<-MmUbdO$jJGI&OkS^q7v40dWvTZ zcyW|o4`dXc+sRM&anHe?pb3)Us3zB7|8Vvr(YHc&_($j$76JavB~h8xUxkFkg&XxR zOlXLtnze~J`5}x-Ku*hDozR+Q(iTScp2K~lkIOGn-;kuvk>yA=k=c`%Z)GmNq!Dza zt~$jTf09nb`jN!ITEB$;?#H+K)6SfX(g{?vZwu_pgy(r)u9P#qQ0tCdeq|i4edB9T zf;1}fOw6@m9A~7&8okI$gkiAmYTvK~$|;~%emh$QNz`ahTJTh;tf%f_dQ~_#g|^35 z3k5sF&jfo7q~mn%Iv1&oc^mQ?D5%RET(@QNYJFDf$X|K%!!?#x02>h)bT3MeQj z38i)t8f}qUnx^@MmDZyhKI^q1QF8IQg#u!a?YS@du};QGiO$K7MAuY*<=$&hS&;F*m0q2Uf*Z>Ab@=z`C#*|{ zPo>4#pTDLVDrLy<-suUHNE9>z(rAj?xoy#9W=E*5Q-8@c$94)BWsb74vsZ_mu}0fd z)*swIaiaWh_cbp1+qh&q1`4RCkmq*~KES@{Yx!O0_lNc#00y`RV=F2e;SZuv)0Cx- zDC{qOh&oZ^OHCVBjeMTb7g~t@7c{tkDWCmudC>j2TcK6yJKc^ybVi)xrm;qsn=Oge4R!pP6g4L=*lA?*i4+pcgO&IgLc(@_C zmCkedj?eXb1wRmye7n3ly|x^W)*gLLgRG7?B}K%wyZ#M=jxPgdzXy^f?vDGC#h>~o z)&zYY-7eUD3C}hrh1nMsZSyjthl1k4WN4~9Q_{+lq+$l~+YKzK z^pcS|*gVZt!L#@o^2LqPT$NZ7>$N@9sLzu!VJn|Z)o+RR@B=xkx>ccrj2aRSmWGG2 zI_y1nG1UR%aua$2cI^#_hN;thX+b{*PH)AuGy!}nkvZBS`O*(a_PI9U9v>Z2101U} z+R9P+1eCtxQaVJ=R|;b^XALQY(|_{t@=fDy?+iMyic~P?|#5`Fz zIXyl%m;X7*#jh#^!^B5DMig+8h*@o;uy|E9fL~1*a&TgL-6XCADTr&BbmJ8G7O&<0 zjaRn7_taVI8o-&O6P|6s(@DpM;K)2_z;p+;qPt*#rVe8#UP?d|5|JJ5##_F@B}Qe6Mz+j#a6Se4SCCdn~Oeq zYYzZY+=rj;DZDJDURIir=C7J4&6m`hDW7jek?xHPf8dbd2XlnT6py~wNkUOR#t)l% zO%`QDs{Mj0O=3}hVAsCsK1*&9YU7aNu7$9G*DFv$-9-7-KI-UmJBH3CqRm=aw6@D_ zk~_#so1KgslbL||2SQmSHPQ-N9*86e(=33z+vmsH2|h3}XF?Ze_x-pN$-2t=fK6Qu zlOuN1aUCe40eKaU|Au9fT&3v3-S0i9y$GtO_T4@Mxd|DfK!s-358VS_IwV%ODQP3Yzio5dt)h2SCic*sX~b_|)J1EOA0Xr?#6^M`ToN%CBH zro2D;y5f-TZnS$1&8G`PNX(Qf%2?j(AjMj#%mHyRKfPX1m+QweA?rr~d364a&@dt+ z4|i;s&l^-R*il?}kk4;DXgLD>UzZ*!mj0el%rE_|mf2IoYY^c*YQpa|87#Fe^zY59 zOiB-0s%{-6xK>j?k0NRRERcx}wz>ezdGp0FF(P~~q6ywbjyB&m@!=~&{azQ8E)P{f zSKxFmt-Zby^>oxk5FQSNb9R1XZ;KsDJUc99rBp80B$v`p1w;N9(dmPRwZ zOmz+TP>uu2JLH=-r65Ji{5eB!Y{gHoKzlHZ?RG9H5z{E0M&HV7Emd3~`GN%SQnrqow9nbIk*lQa+WvF7cR$B@YGh>&~NW=`N zJlcMDlZtuzoH}nrC>bU!_-W{K>BH#;+pMVcib5TkDiM8+vhc$Okz@6CX%kac`5<8r zH_J+&Ba=CHNNO6ZD3}$a%w>xdJCmr87po)j922m3w(Xl$H6vK>m89RxV^|V&>NpM- z>Q^Xm)F#r)9q0$qXpAs~VuP)d7j#6fgzVlAitaYIiF7dC2^p;gvcrQg_2;J*r(rE}=p z5jZ{8dt=www1aKxxApBT@CzEMDBFM_dmMY`6n}b&SyZT+7l}P*a$+Pe_9h2m5VwM^ zm8Li-3B4yuA~}#;8ogErjd7lc(z<)bKBp8}?=&@>C61&YJ)pq-d9)wwls7Iwe)ZwV z!Y0o#VD6&8E%?I`=j-{M##7+8e}Z-O1zypwe#MZ79Tdud-;EI0jb-t+_SUwRAM1IZ zz&RR7Xr7u)9!rzw@Wd1!D5XEm;e9LskC7oIG?pF@sLW#^R~<{CxYIN+I>8qW186dD zk!YIoCLx`8zH2KI<$8Fzs{KO7U4%-ZIz5LvThD!aXB;R-zN-*sIE4u6!dllgZ&V_4 z3=*#&??Xx;zK#hym!#|sBsuUR*!~lnn)-H1&d9yBYi^b`ZudC~VLUe9BF(}aaf~ry zOmQ}|m2KiAp$o7R;KZL!t7sLkLJ<)W5u7(_JU^F?;F zM?M3EW=2lE?td%_w|_^Q@2E$xYJqBN9pyWw&gJd}b=1C5XN*=P%@Pa~zVPfOybC8G5eV1N+t4Z40~*-WTwuP&!GjL=UHejgF6AXr`X2iI}XSHh0O& zZ&U$NZrcQE_W8a72%q(K2Kkac>pwproPUbksQ;j3Ftd6w3n7hr#^0b0+P=qC$dke4k#Z7x2?< z6K`m|Fk=jqL3kEDog{wPD<61WEjE{dQ2haPkpHu0AJpK&Gok&(GXMUkw(T$yu8`=D z2spBg-4>d6V}_^w#HAR=TO9T2gxg5BxDx@p)X2dg^}#|JAJJnkT#bW@p!$y8=PeR9 zyTwHva<2RgSM;+*rM!Vg{&7~CD9Fx!x7(-OUHz~^( zXLY7@pTHvbkI?DY?0-X~_`kS!PnN@!u*=Iuix(hCq~i{IjfL6m>%ivfKs8gYi{`9EtO8dOV@gB_o5|vbK^bs%2!xawx|u$ z$Y#>(`#ji;bM>Sf;nsgx9TfoD;yGpF{d2Q~(^qlRJcCA-?DkUfRxopnYmD7^dwmvYwHYJ%Q-9#2zT;FvA0aZ8Q8ltf`G&;=ZLQJ`uMfi92S?^h< z_!`_hg55jJ8kS_W+&XUu{220C+~!qsyAwMnE^m^4FMj@vW;y9#x>nw`2@&ko)=#6%TQNUDB}8p3Y!20NbWo#wclYR_5V z0-d5dJaO;uDCuT!LD0%fFy1BP_WgDFjrwp$M;+GFL>~Q(u*8l3B;5hCWYy72!HYCB z?539TQc>~+D3n7euu%3Yydx)A&6qub7Iiv1)7(2^-;z#_5&mVC6EV%DckK0m#%Sph zSU3MBt80E3n+iCxsOl-_+~K5E9a{(}g*q+eGwp&LaC(WNwesE-01_3=Ilt2MQ!KMS zTMaQGpCku270rDr_3ccyNU9bPD;MD9B9h6EyxQ`dffYD`5yWZB7iv8@qMH7e|ay%2wUE9&yG z@iST)zq(d6R8PnSs4~)h^wWa*$}%jyeB={Gu1K5O>HZFfu3c}2_06pK`5aseBRoz%@|{Vs^Y`Fry~U<0H9r(+{#*hS{LpcRY3V^%CJ_TdWIs@H zNjM=F@Ed8gVmVQFu9B%-%=_}Vs~JM9FilaK1!#+La~@%1~#dfb4W#xOcS9Hg^C# zqon_N?rhw^GTck?&GYXc5`PzBycP18=vf-3{<0HE2gR7O?9g;I64yA(S2d1i(^^Vl zUtr`7XQAOHlxUbz_W$P^8M7nO93RvpQl*l?YL5;Y%WXM%nrSy2J0WDfSUy`rYo1Dm zq%v-heFF&52Bhe?OG=-FJw6X1@N{1Iy5zs33M{SCb ztjaNKK9ON@Z{IgN#xS=7g@WJg3OA`4Y~Edb6Ww~)pA?jAyCvL|{I9}SR8sQq$z$+O zS}d_;w}rLfo5jtGh=t3ZYC>W5FbBwqTAA@{=Zc#Yoh2{FN_?+hVl+pVw$p6=zkOG1~wVrYhKA)n~k z8=%(b5pfA~3XR0c*1t*#ywRcd#ikYFBkMC!)7G{llwtq5ZvY>6XvA1xJQO3DqQVxJ z4_JJlyFx#*EN(sc*-4#93{7eyT#32t zAFZzT7kij5yRsVm=^IbM!3(+}gRz*Z!jJ_6`W%rX@6VS@XYAE~_ufKY2O3%PS*G^$ z?ugPqwicGP8j@2|xDbr>^*w5%H*^;lzCLD&%Ns`OIURT;pvY=xU9C3J@V#r))vtXQoXD7KD1PYg4SA~r z%jfxsR^3-?e>5C^$HC>Osu(`t?(!*cHgn|HRgX+v<`(7jAQaQR8Ev4?I7)P<*-dDCSX8IKAsaN4Sxx4^ehI;|Ytq~r2g6|mIl(s7P2j{&}1 z1pdvWu!V*&O~t#yaRE&uWUkRyZbm#{ChNugmPPd)$O^#!%a*tCj*Wb_~uSUOfQLy1NTEFfYr&^>53x3C^#SClTahs+sCwJR8DP}0dCnBHf z$l!8i2A0T~7X1wy;GP#c)MTi9cDJILb7?EiEDb96DAlZKd_KFCe4uq-S;eXNw}EF7 zs9%4nNXG1`_65Y;V#MOUq8gj7%c3hG41zc_lo(Y0-_fc#rHrWI$RNF!p>9=ko@RYc zF$*Cul5bOkgDr1ZCw-YEsbr8lnTLBJniMa`weL*}eghuREX;q>8PEUK@kkW&G&peU z;n$>~_~+ZBkG6qTA39Ckme%fl7kqtv9}0^C{-Q|Sbjv1-U-wU#xHn}9Ug)kmwEr;9 zb5BF`0)mxK>D9odry>4My2@XSbr#-^J&^(>C{+QPHpE(<&5qHh6=Id;2n}_Q<7%7Xz;!DPescwvb&eAnosjw)Rq)t|U_Oms zmR-=myH=K0uOsu<=BqhYbYh0#iKjC)t4U>gk|wpfS~|QhU7O8fKUxHX`=ELn3pbTU zFN}O9Rcv~7E~{pR9E(S=N_13gL4=V*O{-U#tTx+J_LsvF>wV?pN!_peYcElQx?eaY zViFP(CUr@wkJ+#SS4?<^$vt(~-Q8suOI{9-Zd)B5O|mzT#6%_Gv`1X>7hZz!+^?7G z%gFSp>%IlqNrBg#{B(fONZsj2d_w$%JV%5y=7s&U`y@wtJly%a z0w&n#?VjV^W6gN(l&#zLpHY;ThffL|NWstoMD?AMq&_M|KwJO9LHvX8!V74Mlb%q- zf;}ZU&;}L68$Z|5h;cf*`iifu-`uwj7g-Rgjnx_FNnVAC-Bf;D<7vaD!Gi$LVkr~j zAnT|=f26M<3rgdSlN4f}ZxmU*i&7VY@A?+|=9Ubvl0b-n=BCpYm@gjIEpxxSd)GE?DJ{Vx-h zq-t;6Xc)V6SlDR}dJVz3F3N7He4`kAf|pc}2Y0-WD@>i7ia9KI!|vpL?2fA6Hs_d= zys)ShcS{*c1`TPd8g<8*%3{TpDEHy4j6aS|h9K)7{L;_(_AZcGt47b|jxbI>pbmar{tKmQi=cNG5sUEmqDx5UELps+EXO`%0>RazPUAp5%Fym>!&75q1v z^4Btqrg+|;V063KXzMJ}J9VjZ54Zc29-l)Mx`MSXJpILs1z%0k0I6p5JvjxNUcDpk zh;Uty1s)HSp(b>tAi^}W`BFPEO_Fk64`c^Kh%JwyLYSOTrw1X1nR0f&s;f+-=!3{; z6F88UaG{OJw;Xzy(7@$a{0?(Odz{PQ);O11PUFuIrRZE7WXD>O-KdS((xwiaVB<>S z&{<`;iGVRmoQjPaj+QKdXsop_DvuM=r0#-{U%5k^(!CMKgPKbDphuQ-fHKWOXk=P4 z&OUCtyfSuE zhd?vol0CyC>t2Tdf5!)#kl3!x@}swmziy6e350bBsy6|C z8q8IO`*fL#ewe30Ks67aPTv$_nc)7d$Sg~2USv@qBPN`y3 zs4ApZ)Bj8g++)2D&4Kjof}^XnktA7w^1#oNyz>juUM)Q{2aI|`r-WHL)x~`I9K)jm zI*m69kXP$1$P?I9s5icePPlxO@d;_G)Ot+i%ZZMfZC<4q-iEkwRus^u9u=hK_Yu*w zJdYL?H78C{5v-kKGaT6BDY$WsAsI=5q1gRi#k+{2MXTg7s>JHZAyO(G*)u*<6{XD5|zp zXfuMfK3?C6lL4CeXQ4^TLTSSUVS97mX9fA9*PSPyHI}Yx;UR&WB4e@*jy0Bj`UjGb zaJEX8s_TPs2gHLFW;=}&ukbf~Ww?lNCH9_7b@?+(3Y;IS^YPl|lo^`mvZ z{uZB6y7TQA?^Y2sDygcMcPx!F>aRTBQ>yLE-v8h~*iA$eQv0H>cb_yeu!R;i(CdwO z@Z50lX-S_9!=5#96~*R~3Y#R3n8g3ly;`Rso~lcrmnQK1B}+R<@Kxk;BGr4ArrTo- z_k@;FYDWA^6~^pqA}*p!E&rtcdm?rW>Vg^~3?3RlUVHiG11o9>>eRTAD&X1Qwv|=)=;!U)Z*%lfzRdYc+0xSu9woqtms>J2@edk+^mK|U? zbv3QU@uC)pUEc4E*Mf@&Jfj|w+mHBDsKr0SOgT)@P^%8{YI{QCgF}qBF>u>4N+fBw zov+q}O4!aoeBY5Y{qWvPF$(fh=yqKby!--Squyy8($|oC;DwF~FwbzQ%f)73OPd`9 z-1a9u#d&sYnH7p8d=DR=i?=_|lSge?m1KGI1IEp`NqoKjUy6$l`56`l*)0X5l@U1~uQ3)r=LtJ((Mq2p141$B}h_4zj?v z`p39AaP|G7IYP<=>&wLMt@NC>5eQ(g<`dMU>x2wC1ZyiZ5DKs-PqMCQm*WDDU%=jw zZ)12%01>Zqf0pGeZwHxNw%*q;C6kpCDZWl|A` z^=C1-I2#w3eiPGlWN8C3#|a=l4qk6qQVKQYZ~%N&mVosR)u&e&DxRVMh2Fq;szEtj z0CbKmy5Nl`=jg90LP?!QUoGXP;SR3$y#?|hK&PIrzbPjM=g0c!BD}lz8?-y^L;d!1P zOL&>j>SH4b^;?erH6PBYaN7(q({Qs!tqLh z-T6i>Fb@y?bReL4g&DGHyy?AowdnN;kEmhXD<9Eji9%>L(@p0&q#UTKyi}Vh>svy$0jJCZilI!*AQU3|J%-0Pn>6fo#=?CN@f?qd0yzNB@_FCKK*v19En;YM<7(N z3wdw`Hz^DUR1*gBvtIv1OEAXWHhOkzR-fY{|L=G_b}?y4h3lM^%P=1^&6@#v2LI{P z`q%XX_fJLHa58l-@0tbAi44@%`Qzzv^Xy?Sx>L>GoQ!>kh={s{gvm$o&!KpXDto@1 zbl_zqt!aAm;z~?Q3i~CxVxB!No>Y|$gV%})?^@h{!gZ~~lomd)B9^Hqvr{0;3s~ACLYU=#Gz%U9LVns{i;KLHTD{7EAnL-%5QW@aFI` zaqXq`fuQvP(|E@_C}hXzeq1caoo6Hxor%YZdrDh=T*PA+1kpLrWC?4|CFH7$Zat;% zwEn7GK_^T>!$jZxJB8A{lp4GU8kj)ut;4a;S=;|(2{tTGal%>|RU(#7OhZN6HTpIC z*7Niz|6^HDLKGmFxPDN(+{)h~3Lcm2zE3Oe{uk8wv;?>6iKg}8YYEF#HN#NhS4U!Z zrz!DG((mlEd?XC;EOixt#0Nu}q!%;6y>M^j6}X#bJ4#9z+H`y@N zv+gZBMujgLSOc`Kpl5C{VpX6OE6_xeFTmH`-_B3-q=H!(Rs?Uj4VJMu zl;?GR9&y%URdHkIDURux5a-pow-iUXY`9#nt^ksnL6^!qb_Dak^u~T9Fay;(&tTfkk7>^v^-Hu%xu)1r#t8sM(j|kEo=`iaxzZZDG9OQp^&w+RX`pJs91vG9 zneDiM6=}HIfUdQz5hT3_(Ol|?S`xgXMgM`d8*=8xYcS;$bT)UPpKat~P@X z=^B0&jxNtbA<=F#U`Cra7O-^_9)hX(&QivYNXe_ku*jFS0nqB)ZveERK=Ms_Q%8Uh zGqlm|V2zkM=F&0asB?r{;VZ^ps5Q<}wgW8hhG|)%iQ05m6aQ*cRL=nyK30H3(Ws^1 z=r?V_sOuMclMY^n%uII)jSn7?{x*kq_9Fp0Lv6`}&Y=}hY7wPyCyNnl6rN_)>2^UK*M-R`h z6^krI6n6*jKZky8yBf@T@@jZs&&G6E>5Q}A)!=rg=h%Hvh~&sY%4=^wXs?^txqvGZ zGW}R#UoHQ({Q=u~a94LIMNSF(g==*gej?>B!;z#HchcOGq#xCwKt}a^B_j2rB|)(^ z!rr@k?>_G2tjsdn|9KY(od63QL?xKE1Fb3tzy~Lz$8K2ThKj3EGq3j#E0V~k*@jHE zjvMAf$Hf1!*}k>^j}1X=mTdd0vSf|;ts+r$GU5CF1B00MQR718jJnW9p$^vjjaf!# zvbqk{6yI@6vWtZLYN9obYET|#q<*|XCr=K`Cxkr78{ej^&d) zIu%S)Lsx9eG6RQd(qdoNMXe-N2QmYfH5Lo`N;Q%B1(*E*A#yy@X?U$HHeZ;73tpt8=)lxu2*gippnF>{6g zHr#slJ*j9h@$8Q?C_udyWaZ(lw@BA?H;1I!3HY#QzhD#IY(+3vMED2W>Qq0bCHoB% zcw3mlvR`FP$n+oR>+TQ$3(pQWla)%Crn)QG?Wm>Ix9dK(;KyB)Xvj{m=--7kNc8AG zT9B|#q@IhSqM}>S(6`OoO{@>Utgv88L%d`$kG@ElSOU}a^787Q^*-e(K?@fc{uDXK zyi+EAhayCw&4PL<+jswaP;8#Vlc$Cbp6Hx2Q*~V772kc5YebU)ipZ3E9&58*mn2#w zA0xkS&vlsoU5g4n1YpDfA?WX0fITtad2b%ymQAk3^c3sGqc%0&GAkTt` z(7Z^)o8WoJyYLy0$Sy1H2ZA$1Aith1N~{zs*_=$sLM$-_Ab0H-JPdK=YB4oI`CHX~ z{<_MQ3${PDAbLgKh6SMq)W4lW+M%4n?O#uhfvN8wj$UedH-8gDHh@C#KX&HJO|zD+ z<|6VpO@S)8p=c1{Ms1}+Sl!+%&}*r4;pTc-pgkVgXln7p3&c6cgK-v ze{e$nT$AoOpA1bY@fTPN)fXLSh-Vj`WL1WwSL_%cNB=UX<1+`3HdZlw@0d-QBju_r zpaQ#yobxLiCoefYONG$c5+=AWkFbXql@^iK719Pqo1Efj8-YYHQ#v@jJXo#(F>o>n zahGoiC3p#`&>+MMxt^r?N7@s`N==y7aY`JqjK0st&$}nPW`z2zSq@QlRwU=hfv-ePr&>_RZXt$Q?%IzUV~#RCGZlo@~`< z5Wp}V{IZ}DjXl)VvM%OOWh%rr2wawkrx_z(Q_D}%BK*Y&zUNp-W~-6t1s|ho&=9<+ zfYzhhuV1mw(%HLL5ig5Wi-0`y#sTKwvI#k#8<(W4Ga}{hmd%R(?r5V0(7?SQDOGCC9)ikOzcFaDWhX69r`0U^Ca23+9+gbD3|n& zO2d$pzQ2GxQD?MnmQ~EO<9DTK%x{m2{=N}p_h;#u*l02v^yZu+x^x?C#CQc#E63t* z@{U8H(&#eh>W)LDx$f1GVmP6}5p?01r%ve6n@PFo8Q;={VmWcWnghbHxG&$LDh%N~ zCk-q^?4|e@!_Ok;^zgrC3Qm~0jo!c@&d)UD^KHilOwh9av^eC~bz&tN@~2ZYNZe!Z;rsB(_QRju!;9C5KY??XJvYTo zYWJ3%I>C(&+(-E=C0`_JThzcz9ZoA+(?VYti#G4jU|SFr9sxe+m3TnCU{K zn1pcN7qub6y+eEd@7lKd+nSSQhS5gm8b!I3akSDT2HnDfv&IIc4cYU$tI8VZQ$jOE zXec#SUO)gI5FB`NK6ZM%-g-)2JEMIA-Gu0!6$J*&c{cUKeW}LBbf=!V4BsVhQXAeF zunh^ebMv`;x%ACyA#s=#(4lek(+Q{~4T9y5eqPU^c-C{s1vz z)G~$YIUxS2-2J`tdp~@jeJLf+cl$S0B-ZsAGrv4gc-0BS91gHB*-xKV%_$7nNc*f? zVQT~;qpVj~PdY34lkbbGbKW1S{N`JvSnX>&YB;`tw$w_dZREJHf%VW?ugI0BiPIsh z(=kV(B~T%&`$vIZbBLxpR8swDW1tHpL>SrS9@R(c?nhJd&~TD zR$mw)vCG#d12=GtXpM5H^48C|v;-W4b9R3OKn%^i{=P% z2PP1x!N6EP8#$NZOOh$LP+Go{%|Pe*0p=Dnp-L7}P+U>caadY>Xa_cOToEckJUTjR zIfugBgN{(3pkS%yR-1=K+#ej^`6-<%8i^~9?I<1N1YUkcu{MDj#J|DTM)f$N%lO_- zMKtp!?o4t3Ets_9Y)eAx9cpQ_&&*QDpR@a-&`pAPT4Cw|T~)*V`mnpqojSVDdJBuj zq|7DNd2K&iqKyLMf72YAZup$3r(QmFzvFeHpSL7PKrWN`9H-#`1d@^KRO&XEpBv>; z1nYpjSK@79J`fme(Q1S*dRS8MHwn2|g&x(BKz#!~hr{r0J%j zb@rfBqJ1YMuI^O^Kf4G&z|G(uvd05+mK#k#6-k~JtwL}dHa~%td1~RbAgb*mplX1P z2ty&*{C&x6e!h@MwQ8Md&vGlD_;Yo6cIv!Di^B5kkSCo|;+x;kRBvm#_NA>IxhIto zM0O(ODCi%`(spk{VyKfFVH}`ph2?exNsadZwUy_N8KIUPxrTIF(sYdWCr1>9^s$5_ zT)uF@BDO9GGfq$s=hA*>HUxB@UIIl>i|nKOR$xpC$l)w>_aE%g+ee^~O+fn9T+oD; z=+-lg77F%0ntC0d40+o7Z`@sQytk6PPV#%550bo_Nf!S(T?VW2`|$)_CI8IVL0m63 z*EdkUp{Ohgw9lWI`=C0W%r-DlvM6)U!A{K)lWCv>1oSDlgKuq)*InHT_0g9$mV&>n{8k)1{u{}ZDa;nTvRO`}@B73G3)9$%TOm)eiQCiW75nU^O*p)q z3iukd=RMb6=6;FlacTdaCot&XH?F12;TK$KO=wOgV14ebyfn9k3w=up(AF{!gRF$gGY|D<(9zRPTWd$CTjvKety}=Qz&Ok z1vg|@Fuzi4E*~b+v9E{e1KA%>4%7vo@T-sKZ!-WNf?SHbnPVPd#NWJEF5c_;?74- zIMip@#E;= zLM4Q2r6D>?_d>yZEMro@xHKBUB%Ac4HbG)>7;EcL-W91GTq~#2y7HaV8^Gz5YP^*~ zuv3;u($?j9pLVhP~JQX6Pf9jWfQ4pzF# zrUO92lIyxaq9WHS7VP?rrbLdf2hj!gm;oO@7TTwX`dwzs$yMfqDh`gu(@DQ7X{o_l zB0TEvziEK&ju=wJMDpewpjtL*zr0$#fT3%ue`6rp>Bil{0bFo=yiAQbY~l?vfKMNPJtIZB~nOHabr zP?K1{bWDAcb{%eAEF6*;*Lt=gq1&>Qldosw!ULBI7cD%GPBi)Ebyp3Yb73oO=mzHk(rFflb{ zkjqy#u%4lzHsX?Ay=iGh3--U4hMFgvRUnjB={zX?pE%)233LqZ(*7!8C$I`UZds!um<&l>$ zC7g*GVe&O0j|M3gnR)u`P1}wGl=zFx!JA+|yNFu;j0ch-lTtm#rKWAwz-!dpa}3au z7m~Zkm=ZznF?j>%{LtsH)vU#s&vMkfN~V2y=b|L2R1%=*jNW*t%3+`(IV$?g+UAh*8bA%f2fbzQ{=@er2o}(tJ`n%rXBa z_wPOG{6XzQhNMo-iU6JWo2oJIH{XU^y4el$ER*3!0jFH6%m|iqm?6z~ztm!Bo?v9L zCr0G5s0})mv5Zxv%Fd;!&rna*h?DN;Fu4Xd%0|+!3POR zcsjPMxZj^KIBo@DR}wfyivMYmUjNyE?OmnCKkP}Rv6RS_i98CxYWXfdI$s25(_gN zv=(RoI}P&$uTFKWdH;EfT2lGf%2eZeeBiH3&2*WQ7q%|_eYzdGopXeIYWtt}`d%Q7 z^CFpzl2eazJIx$5nB=GBXOQvVv#5a;yxFC{xh$cccXU^nRm7dmt;>Qj%raX^@v=-` z(=1yyFD%Wb-mE&$c3+gVoRpJcn~_@Jh(A~{r35vTj}^@4`S5jjjojx(dHCi$T7FTF z=R^Ml{l-&nSpIX8vdkjFpUK+6qzpLLjqOSFgqX| zmf>Q~>HmK)D}k|&<6+wHz5{jFi56DAe?))N3q^>HFs&fjE*!m=`45jj^cn8Iqyyx9 zWzq_A4qn$fvGYQFgnUNt>&;Rh{X#)S^%T@eiG^N?1iof4bM_qZ$z_xV8 zLT``5?4PYn;hl`flZmmsuK&Z_TSdk7wAMP2-XP!KHDx zMuS_Rao1qM-932lZ{@$=z0bSPKIdG27u+xggIcSrs;lNR=kM|L+^y#Wq`AKZb3Q+> z-SJlMU6odgf8TI*S^O?5#GayW9)P3fpY^|mb7XSghY5N|(a)|ogT#&5KkDB&oU(^7 zXLRIY(;PZ~(V*3o6qJpp(U7AzVJfT3(on`5E@^d@` zgH3mos`o2To?7YTb=E1>74-T#8T&r|g?^J^R8RR_9MDCy&gz<5rQrN0($X8N6NHe# zoKF-52BrIHzXi(7k|+KomXd>Jf=lJOMi)~cSy$Aoqlq+gdM>cXdeJ@j((0sFWhQFJvP zP?92tj!8I$aay@>pr>KbR@4tT2byc+x4ji0ilEETeq5%*0Syq6&_$|Ud!_>>qL0hJ zxj-@p%(7+q7mt3`St!s)t@dyS_aDN7$oFMaTK*k_y;9zf3b3cIQ-mo-<&EEU4vyIl z5fmHoq4NC4GsBl4M^=zBzZR#pU$)V1>WF}0xl>JpJj~wF-yNEu1o3!1_!?TW58_vz zFA`X<;}_0efzH~dqbEgTi|l$1z07@AVQ=%!En+6lx_5|?H=3Z&=s|;lbNj`C?0~fg z3dAOe1oXLRY81((>vsS2cbG=0jc?E?7x+~%uVC-Tw*i05#nOg_jWirejLY$@$E**| z2IXl-(-7p3Rl2p5hZse#FIJ+B(7XyW6KCLcDCMsTYj_ksjv=L(VtK6U38lOR4MaHa zESt%BbsFlbM0Tmb zQNAZG#mmuNvV01JpauWB%YU!rJj6qAd>S-mL+{1dLQ1o?uxRNH}$d=4uA8iz4CZ2(QMVK^$EYEwt8GXp94)CGz5Si?gl8d z0>LD%!vt7phzM!XsYJFD2w^zE)6pEX_Jb>GEI+wrPIL1=l?Tm|dNdH)N)g=7#Y7J^ z$uh1rhsO}ni#c)p%A-f;RV&gV8c-`D)|cbMR#4QR{uG)2ckUj^b0>dpWmqUvvneOx zQKR~zrNAQb75#hSD=)p=;z}(rV?I_jTzC;}Z`*^)9YdUcTz+*Js`}evS;Azj3GsIX zp0ZK(dvNB$B>Eh*`>j7;?2(P?zMNG|ujZw(#3CStILD}WxMIqV0%t~Ab=|@qZ1cS} zh429A+i!Pzg~^;mSj4ebdg`sB&+BIPa${8Q1erF;3Ild2qSM$9Z~c8SfnN_O3WR~) zA-0m6PUmCqlIhp)rG~cdg%SiXZ4vz2qx5~yNTiOzm+|INh=SzPDHQDCcz^p!n`7M+ z{XhR<`5=?O=okV4Xf;-?;ggLfVZrOxfRHKMmFN9rQhnuzhW=QmAG#}Uy2I%w;Ov#C zyMU>G(l0;)2D%EIBTur)n2i6ih{Fu)Nl8c^2GaeH=vS|@Zv1{rk^8N6#)v%Z<*Tgt zlmi0h%ILDMhH{7J;Vl|q3xu%mXW-lrm`{T4krlUVjN2?H3%OLL&Wqy8g)V3q$UMfv zp9^d_=#v0X^*9c5rkUO$85k0fPSv4Q(_ZXfz}A?=WIK^Bp%?kY8JQy@%?@!gVZQ9o zdLf$wmK%9U zBK5hJ?_pES$_^lXt_7HSp-t(yDt4Aq>^5OJP z7ad@J=wvpYEK5`6Jl@2_sZv)i%4Abl4o%nF;-=5=DO^d6|By{~*>VLgnHp^BDtYJM zJs5&BXPg-^CXku-w~p=L-(6yqKU+C1wX!5u;>bTEbn}jZrg}^9qKacMq(EClp%f_6 zEIBkQW+dS{9_RM}k>p!#5ggD=HHhDRXWx8Y0J>0bv;xG4X9hdt&q^8(luL@nggF2a zQ#;b!GUXR=c+A(Eo3@6I%?8}Pbou4{v^HY>i$sM6pGY<4o1(F;Y`jx^7}!IsTlQ8? zQY!Xyn{gCR^scZf5EhFpbB)5GyJqcV%*+oPMRf(WX^rFlB(S7ONevX==>-pXNPj4y zTYJ@XD)&G@0`Hj;AHUn9$AlPNG0aWZX?-cdo_tm7%rrRk3w%#qZMDGp`0hAj&1%~ z!{qy`aE+U~Fy@SMBKhq?3aG*Fd-`GDD)b$i`>l1Bydtk<{slY1%2w%{`B&}zSJ~Hx z;RFHWv(FxmCLd0GpOS?v;p=OCfh#oI3pbSseznP^S3)lit~opzhit68NHBFHNwA31 z#zba?7*(ZIT*Tfoc(XfIW(Mu$MS*!vUdHFC8y8$tPw1$Yck|tJGQDcEG5vH5yJX65 zG@}rDSzb7#XBdl@-;PRcg)#Aeo5h`LOmTfm5z*o{asNuq6{?8k$2cbPOA3eCG?d1A zbo{}K!YLF60&}_ZF3m?)96-`?lF&X+dPj5Oy~V<$5x)I&S*MP?S_!-QecT>117I8f z&-fm7HO7C$^4t*BBmPO#LWmeD$Njl^GgTLgb%HDZ*E2luxjgl&!+2+r)#T5BTJ-bN z@n?`cltf8wIx-

    %pKxhY-d^@=mm;3fKYM|9u0%TAhp3YM`3dwHU#Q%!;Rw8zcbM z=f9qeeVy{XJeSSitgS2P!+N6LD-KFIArqg7-}tdkchA0r4Ha~Li)PI0Zgm%#u3aTH z%8#NVVr!Sle&pD*u4|8&Oq90i7wecr342aJ(Bn}A_xqmLB_1ek?9Fp@A`LHCgG)V3LO zhrtc)E_tg415)_ac>1lK)RaZJ^7w+LJreb{70qVCDdERG)gTG(4HF~pkfq9K=f<`H z$D(@C7jvC>(r`O0iRkI6g#(wBYXG6Z4mOCPe9d$40rivqoe zT<3A?(JtZ0FPaX0Kkhuq(IhvNJmsU*ZysCmsr+LXGN0b2XmL!bM%b*~4b3Rl)!|V! zGW8u$N+Nu89pH%8@VA{Huw;RUsk?jCeehgBQDQbp6M{#Fm*S4bzNkVqdxf3OD_YvW zcYKJI*sq(F=jtFn!Qb^3^kHU8kp8E!`vwC}hN&;ix?1$ZO@D?GKdTMg)SzjU;&w(6 z-#!rUk5}pD%SgJ?f-)|ecMWPudk^15YOp&Bu2!lDX5OPgfzvQF&Y)X!INd`B2+3Z^ zL-Rx@>bQ^Hl5UQcmlo{+6_PdaQ64I?ahe^u>Qt&C@7|Ahs25|=Wv#bfCk*^~u5n4D zm_KZ=PJ`9`K+Cl3tyrq)QvJd%jV=(9;dlP1S7DOD2C?Fph3BJvC-3KyA*V~Ov+&VX z-EmIi!}v`Jl_@m3!`iyIA~F8IM5U!Wy%CytCwPb}7139z()~J(moJRD8%%LR4Ox^u z$!NAs7fM{&>tjy5b0)dfZ>rNi$XG3s!99>EcU@b&HVKbJocUJQl0= z@P!5GZ3J+yWN<)V1X+%k(tQ@(4w1%o5MyLj}uU^5RBzHTI zFKPM`D6913R4J5sMVQiXjFr^ zqWg-H-fJEEpxyk)JoINiWJ#-h1`1+pCl%)3mSiL;52cF_#qe)8I^7b|9HYg#x+e`9 zb=y3|8LM>y?-(daOTP`Unjw^C-@g1hW}@1=q;A{vbu2&e=X$laECfJsEf|!LlW&$r z;&Su#MM}sC64Hob8;9}!H=-7>Nc7&s>Ay9*!pse<64)Zx?H%#o@#xgX$yXO4k!Suv z%mlXM2L0x@!4VPetsd_q%q;|mf7*{(Qe~QA&>9f;O^mGzTjJ!+0pGsbM1V1v;@}fc zA{B1kJ;eN<O%&r_0X~L7N98%I$mG+PlrIgd@%tzzP?#q zj7)l$ATH>(FCOK=AW~w0UjS<}WOpc(;Qt|EW^8JXkFEw}5prT={(us48g($mR_QB8 zDqJ~jC48Ov&}N9<+dd!orau#wi(QQ~_?@TvTRS5v zl#)ICsdU)ytbB~{N81Yd0pd68+71EACS2>&K<#At0S?-JS)JMb`zcfGF+s@qnHngb zB)i{t)sAO9Pwt9>FZYGoFK;a?H9&x2=Q{oK;^N|cE_w5_z1Z#dZ15_wm`T_E1U;GG z(O`d8>pt_9!!c>fU$vjj*6~hmks0-6#gV^K(~nZBvh6ju#rmnq;nZ2 z7GT9=iEBHzS;nML83eUGzB?=k&HQ!vnQq7r^B0Cb+9c6P6_!)P(iO+RvLRbue~||i zErZqyrN85q){MsMPZ>&>5boTgufH?bggKK+zLfQJfJ#Yr^NC*A(h{smLKMP(k`}7p zv$|9=nbEnpZ-)7nHy%`AsQ8qv4DMw3dNz^Z$aYi0YtQ_-ti#YfykuUY3dotz*=(}H ztc(T1DrfLOqA2E-V)8p7Az=Z&Me`kNcdrA>40LUX4}94WlNJ!e37h|5k^U}QC zj+bdOLUzMwH z)hqvlW#|K(KBp!oK7A0YNC1njt~$XRxbbUVU2Jl1LI+k&9uZz(kHvuXmaJd+9pDB} zjTX_kp8C}|w#j}!FJI}>c@v|#fRYPWr5yyv#`bC9GUBSwPJ=dkPi8muXxwnCSVNUm z7)`lFgq|{1*0n)i)-%=PPd;)Ne-50L(#(rjYw-m|i*=o)Us8W5UkI(xPEY<%#dHh>`G8`HNeGBw$D>;bs z#)?+P+%qOX!}*Q=J+|tXo|pXk@1iS!t0Rv#iWf`VdyV`Eql2i*K7BELFeL2l!vFs53m>;kh;cwYbtZ8%3f zKS#8vL@c8NB}b$9TWow2`Y1EzuaoLgTJU6w1ryVIdCA~S+kbb7_ZfPP0bcm;*a$ar z+jGol0rl9ZeZkCFKk}96>j?*8rID!v9ta=^+b^3Kqyho^04<_7wv-L=OyA6WD0JY_ zHr!JY^@+YA5{3@2aST`;74XJ;!C^=z9>iS_f$}&^B;`#bX+V+rDwyWq^yNla|Gus{ z`Txy8zE`;NhloH{kss;3oPFYg)h7rq5?@U(>p#!C)p#u7R2nb4W6xsBBzfX$YOW38~jqUFo!-yNNuaj-t*Xz8i45l^W zr2w1YcEU~w4qujht>Du9{O9AtHbYS}`v&XLkfK_J-yAcD7~EXzbt(8rq$7^0!OYAp zQ{jYvQ}7OX^0;b|++4WCXwzjOFOJPh@D&PTLQSb7*VxEa`-;2=RHrvfvtFBU#msS6 zs)x^;PqhfR)GC99!@|{3oI+Gm=v+5@9MXdL#eO4I_UX4thx;M2y-`|8QO7lg z{}SK>I1u$m3|0e(08oh;4uC#ziQ1m%d4bM$$XdiJ3{Fgw|2e&d;=7v>D=#D=INSJ$85j(j;B}pb6f$b2l({#P%N6lQZuEE}Of^heCdG zCF&BxwU2rxZs_}`0$K;JmeTx>=L5sGCb~E zl-rb4)XAL$=a!Z#?Qkk$R-Gh+K%!T}FLp8bS!bbi8F=*rB}OHUy63hF=3j7v8(7fV zbBrc6&oP@%{;D<5F-*IroD_s&nr@b6GH1UOkK#HFv9?{75@S1N%D1puOelT5dOAezp`$rKCyLco_m#B0zUfK+x_6@M{*9l_fJPEq@rFP@~ls9IrE~ zh&?|lr#5LAl-SFP{+t#;)v8Z%kQh*+_?cLIFM@a8+LhIS6_$2}6F6HK$>rbn0z41o zzcOs8{dXx2e`vzWmg4^+A~tO6+*lq9bht_?`NBakt<_gAiiP_k-^jcysm=|PI(68u z4hZ~=T=q8FHIeLFoy^v4Ku*R&VU#3k_mhgFZ;qg{Y?HuXLAhY`C&@-^Vu*`<1Bv3) zKCK>WIvWUPP3+_cwy9`S02!j%jH+25Sb!~|#JN$QEW(v(i%Z`Zme6fw3V8|+a?f)! z&1mjte$!#hk%Xo(HBYloam@fK!ZTdqmmB>nB~r>xP2t{hRYM_I+3QQJj7h}|nk5Lo z$iW$v*|>dP41d3J?f#Z^6hIM9nYE1g>y8%%qU0mrep|Nl)dbNyWsi*D7TqhlqE+Gk zj-EHFz~K9oneCe|O9Yj4SJ~6LGjrUHCak>_jU+(%`99uCF3~XK1iGRG3#F3yAzNwl z&a&{jV_`0sA%A`&I`^bR2A-;4otBqrd%;eiPZ9ebtLd@>^pQFW@1NyGW5RMJ8UCP< z{XDW2Ma}H8pusK3VWWj}p4jBc z!rQ_r(^DuM2i8|3tG%!7B_&_hh(Nq%{i*bCgpM;^X(Co$qGBBs`3~KKFW7@s6#tji z=hZM!QKJ}N?Jb8fq>UBLjy<>QB{Ao04-YIl=aGCRrK|Nm>7qp^309dKxlQSOZL=!@ zMX7&7cy#EAPoadVdz;uFNhD6#Irq!nO#csthcI3ofg*f_2dA)>+Cu1FHwtiAPgikr z*(jGfDM!eAUji4~18g3f6q)HouWQ~PB?aC|dsMe#@ z-(>X7MXN7ZF;0D^WIdlAygi?$RgNCc{P{&R z{Zbo@Zy#zgNPO>Nmi^CV+q`dMvhKb#F5hj%tln+0`|hNc+=1^m@Uy`OB|5MJEg@JZ z{jt^}0)}wF=&axIEC_I=k}Z1r-*|GVI{Iu9L(d)e?W=WtHu?NE*`GGpLEF1a@45++ zOCItXmY0{w|E!bWRyVd^h=^T00T%tgk& z1^%o441;w<^gquN9P!pYd6VyCovM!j{n_Y3k7X@~O9f&ixR<=2>U6N1(65hZMO}i3 z(J1bakU5n8NiuxvM7KT@GGRzNsmj!d`aUYB_&x2UX%ZhHTH*B(=W>;| zq;jr((=eyslG~X~-y3{7FKMYyd~j0s3Y9ySOQna5bC;qp%z!{HnXtZxN=VWZr~#(#UHp`=w;2Ixp>vKV6PMM1Ab0Ht@-!+rd#V5Z{G{d4hAW5%il9e2m`uBR5jhzdE@HrJ{lJ49ZW}LFj-G$J0Bz;UA?9UqNGO0-0M4{SSJ*tT$Jne11O^#b}<_( zC@y2d_8lkZbw)+IHqcfTN4ihx9Zwr`jR!MSP} zs|q_aAWM_&O4Fk7a|u}T>)a!oU>V8d|4gMPUrqnWq%6{NYQf$#9&_azt%7AeK`R@3 z(D~3rzJc)A^n!aXfK5AoKhdaM$FgpEklsAE<>Ty^-Vd*}Dr~*Zzr-FLIn$jk+OBH~RV2a3tK@o7)5{@lgQILnfNW;t zilRk5Th3-+^Mlxf@e%8?=gBUYjrt+C_bS%|j~*=PGr%ob&kUhd;Iw9<`a&cjMa;&I zxa|TC`QY41;rh|EKu|)1*rCs*d~_+Lbe<~b$5;w49Of~zf==qP+NnSh66j)pfq7<1 zfd2T3r&|L_FN-AIsZ?p=0gYaVNBN`BdI2!W>NMaN2z7X{_Q!5BhlrX7N*aM})QY-Q7LrdpF4&Ya0sqb;Sc;pCXf|r!P(w-Kb7nK}$zIMDr)FZZzYR$?Zp1Rx)J4AjRq z|C6$`A(Qc3Em0Z+OJfy93h%SRqnv(f5D6RO&iF33Gl--?J+FCueRhyyC7zK++Ig# z^rHf_UQ{n;c|VkiU^^j6=ao~7#ss9XIyh0wA{eQ6p|tL0;27EIYqcLcYjy3nU5y!y=0-1Y&8%G>PuTMfs>TQf0kVEYwlQ1LxUy^hBmyV60ir#pE>;9~$`Uz1WPe*JQr?|rD> zmh7tD>9qIhJ>X`=5c|E>PX@l6pl4dY{G-9=xU|v&YcFOOI3@++`E4qWp8g*g3!e-$ z3gf_q(L|6kcZ)23n@aEH#``~&waO5Ay)ow05&8;@n0O!cqSq-NdMTJ`u3|2x?*T5c z%Z4v;f=R9Mhw3-~!Yp%PyujQ39yh5wjLSoCCHF&3C2of#eo~XfbJZg?UY9^o^&pQu zelW}%xhZ+G>!E-ye*~#1t}&3LBmzgsF5?#BJPLu{DmYxHBC2Y}BvMNaMKHvI=N9%8 z9E#0WcqZzWhc6Vx$zzFZ|BZgk0xp}56scB-GSDSf3>&KUNOxNZr*ui=Ou=6B>g#~3 z^O`Th7&SjKn95@-p^Bc&SJlEDCZMfQ$?@_Use9W+*$q2a3Z>t@x+*d{Hvd}ki}&iB z&J`pN6xsHEr9a*cXwYT=gsifuJElq0)ep%b8tqz+wT>xH)P3pxjD*3tqC?Td|8U%X6LBp zIFs+4`L--%$`6`0!V4U_gNFoi%Yh1C%N0R!H<36XS)crc@sjdXlKh9VNdF^YVDgrnDZlf&J#L^>J}n(1FUa8&*1NR=(m{>jvME+5IeqVFhfub5WC z(7$ZkM&U6jD*9K}@B31{KWJ%KF?3{-C0crIy{;h z>$&3Z&Cv)T>uuIR1@-5Y?~H@hTGWv($u+h73O<( z;EwO_GrD8)VkDN=Fc7$Py^m%I{SH5~DT<1D1rWX0&4u!(ZBt@h%;WqJvMlolDYp_y zY<_Nz$;`Z_FTeG_i0HwNJv2DYti+@hqlECQ z2PmHuF4Yv=uy8qk&QVd6SL_i#LWpvz736bvYRPHQZ*;bM`h!Mf8H*|JeB9aJZy~U2Mm0$`A$G z0@UdK@=5OI{vmTl0UlRZz~gHC^kkKTyZh$^L2#S%|3hUZ6E#fz;oT5vF~nF z<>#pl+3dS5@8s;enCH+L|I5bfmCKHQBo3B{jFXnrwjs{Z&vXsuSrp@$W1pjsXDa=! z%8af`OMcflc>MXi)BPO>kh-^7tqXR?1VmJ7cWak_xF34^{|;R}Z)j}aTo!wL!tlKe zCV$jzS3fNQPQUPco;RIQi{6cb>of-I=HUJB!Wx#+Bdn=TV0-$E7YZie!6o$?g^mmj zZWpJH=feuH2HhYFdH^(K8dPY%qoi^+wo0*%dCVxuP%8b6plq6;N6q0liR5ZYi25)U z>y8ZV2Vy7%9MW<%<9*?vscT#!(X39wL_3`ls+^q<9O7Me{xWqrQ8dO2ciA#r3v-9bpYHg<1jpTh z%5L2v`zrB;lFc`Y2|g?*U=OgLhys9b%hlj)Bg-sg-cOrNSD6Ml71mn0_)3;8D2g@f5DWb}{|e=$4OUcPOIk z2cG(=p?7fuDuUkTc&3Wcci@~A5=qCk8TvFwUBv0E5o0^fMd@mFUAn4HBhWOuFcw>n+*kPd6-a5Iw88;vvEds@(-9+}ugU7Y@9fLb zvM7Unt!bd=!W*;J|J)^pOl;}|gX`$AFXVHQIMzj7zatfqPhY;%)W%NdvEa{bj&@fF zsZ!{^{;e_!7qN^ykZ2j7c!YxrAr`gs^{BIi29>5FJ-GcG7>2saWg*FpP8Wo2xe1Di z&~nQZ&{Lkf8SxYr$?ZlBl|yzi0wUsz3gsV;=Y3!N2t^oVkbTS)sxJ*E0073**;PH0gEBwvpS?^FqGD9}2!M_|C*2{m?B`M}Sb4kn*_1vgIm~PZt!Ah(`^D5G_aHZ5{?&L3&yL>)pKH zNsm1`v#9lvgS2Y# z$KNhG18+e5j|=U8W<5nO#v6YRT0U*VO8=H6zcHaUT(Y?=*lY*{a2V+i?e^XCK64q( zTRA_L_+O{p_=AU!INRW{LH$6eOQinduQ@{z;HJ&ey`*31YK=;`n?VneI6MG zVzz(xc@Q*hkGnyd@^ArP4?WoWz^=#lijk-3pQ zRS8U3t8CZkuzdGKeizsHFsIV`Xn1;?3aB8!{y!fha=9lJBmA_tsUq?;9YycB;u1Gi z0Sk_ALB1cpdNQr|uQDhv+E!j7rA59NzEom&2De|=SL(ax$rLiuify`ixnh<#Cq)i5dGCc>$wH0S_J z1jF6%#h9iH@NY;&?qM`V4XQC|kgkx(?24(zb zAS$CsyAqJ{^0eEdJP`V0Z}{yc(dzRh%tc^>LFEz7#hkoP&!y*8MfeoZ=4+Dt zE)PkB10C+JF$PRG|2-f!it zs!~xjle33Bz?7!wiQ|lm*cPEB*%IWTJ9sHx=Ce`{7 zSLo)RnY#WutzPz<}$K(?GI27onm!}>z6sx2|L#=v; zNv)NN-g$v6^bS`Y|0wV{Z+2zDD&9%mlpG|c590w|pp|C`gNgUYA0l$U8Qt+1o= z_8D%{vi{KE8Uh6E=?N8BKTK!B1usZ?~%r|5!Kj3pYlPre3hUkzb0 zg>d2I(FQJTkgrwJ9c?s#ve(gg!1{~cuS32(CdE9PS^{S3(A(T7!FE>xW<4YZ?3G#0 znW`4)c%cxFQW;P;^OeDRopH9CpetaduJ90Saj)V4`ZQ@S{LzM`-$OsAl0EdT>}a>k zj|(Tr(+#Y=PG_QWy!m@kS-%p6+2pwxwjfqM;J{>zE2mpv<0_S_h;wh!+2}Lym=hnk z4|>6J#w9ukO*^Qo<=*yFAN_yq?^z*em*u;&{^9tnit^&8HR)IZ)dSL6UY7ht*&h9$ z_>GG4ReQpvFBSCnRtMI12DBwx-CCa+A<4i6Mv0$vYI}@euxudOJ$7NRENJ$7gYZ$o zw~m+AX``f`{)azCKxbzAS4v2qpvrYL$01|`91(~qoh{V8v=%?}3(LhCThm5KKFoIb z^^kMX$h-)DUm2k1!^0&>=xI3_Y6J6xdT*?0VHc|_AX+OkHb+*qb1@-IXz|z~euR2+ zzryYs5GNtOS;(vZ;rIu~)9Opp5kx;*JE4`~+&|h7AH+wTmogCUSM~}ne){z+)6D!# z2vsqtE+5HaDwXnEyaHw?aZ#E9Ko!CU(Z$xS{+$A=6|-81#Ua?1hP0o5%ylZ5{@SOU zhS=vR4HDP^eE31lW~vC%B0mloj^)hiIs{xhYHloBJB}Cl72yk9km;~s<^gw^lvqVa zuvhr6n-$=mfKLtUy}ZgU6*LQMjQ_FVJ$jRo?YQduXh}cD5Y)C=cj{(ao6G3Jhg`Dw zEeFqd)J}$&rarDjeToCBYNM$j?a;}~n(fVlWgqM0*`HT0=#uc4n?)T%hiE2{`zoTY z*srWOf~KA-i4nfFZ>)gnq?i%Ud)l!8!6 zq)|TsMgMIK*!~FhU63p$Cz&br3qx!YF0U>H^}-QGETG$m9Y>#;l+ESq;$9stYAYOX zi_&QV9A!IA1@$@`Hxd}d!rbN6Ek^n4pEPMQCde%BO^ei{jPPbc=Dsg&SmjTGnDS>i zkmS%ulk#~zkO(@dUp0$9%d&^@@;>SxJ*YUL)ioBkiiZ8`Ib1Ng4xMT^K$01u4E-f? zEE!0xC}X@oOoaINI?{g>XPaHpZX|Q4OEYRi`_^ zh7#I(nK9+4+huJqxwV@w&fN}|gW$ILnI>a|SH!bxe`m}#D+32ao`DUjylVrrnuuk; zld0@yA@Y0r_EX1`C;iIy<_l83r$*qU&ewkNu!k>tKL#`Q*(Sc32v~JqjjHsUdcqJp zdz1axHQX>TsIx2Lxw8YQ^r7Vq4GqORg&au?@}4_;XWeG0_-x?(tzlkBilqTMj&Wwu zyq&LY`oT$c6bgM%i;!I*lD$@JU?tlP@t?va=ChRJL*XXRQQ5LL~9W ze!OK=p6Fw3eKW)#H%rj%;d;YVUGO|`U*L0Gd1xbl2zB&3TwFOj$$kRv3wu(JXi!-) z@ACXlBflMbcu1yVI6x}9Lx?yE*x6^zNH6`DA@R|<5s z3UWL^vN0+=W9GMqP&P4qL_ScY!bQJn;Csw$S5$fWGwTa$6g);Nj0#~YKvbG9s=Q5; zB`@pkt&U9oK#OpYuGbko73B^nQ3c=`ABVE{sHPEp6H2lcRPSD5@f@dfS_Z8Kp6$;t*OmkQ|?Cqd|MXTcCQiAeT<-BQV~j)7r`O>80HS}-RM)T z;1xG86K+X}zD+Fv&0hc$o?n8IQ&rdS2u|y&1TwoXt0U*%?p6RaTro`hs)EkA+_J00 zD6LV@^9xREgr`Tc6`V(tj>@!Hz*%n-{mT|beI$Co zU0pd|12khMsNpzX_FQAe%1Cz2d{tUG-x!S}i9-;PKlBdE1&HzAIwdbZDumP(@wdMj zv-DHI6%w~pRjA~=qtVkw^~88l^@|&$AaBMW3ZXJWfUViV5f|c9(HQ(^UTKbdSvAP5 zB^3G-rHS!4ghle1c#mD~Dio_UBcy*yRqorL#6`D^h*0i#MWrq}*vN$AHHT3@bg|$nWqisQ6eSh!*+aIk zNkkMAGESxddHUciR^nZN(`$G8WzJUWoRSPx`i$0i6-x@st{EU-Jxii=Fb3aBE}$i@ zziXa7h^IJCIG3dVPLfXzX(e5=%bxEB{XU0Ni@@6-&Zhhz1wV-b35M^v9RJgjn`VX0 zRqQxg+4FO3ddYP>u35W90#l9=Z7(;JPP$`L(s_$xZn7Aaqb-1#oIrtCo`om4z*}m&hBh zYl9?z6Owe6hi582+NZ}eyX)WDV1jr|2`&kV_|x~Pyyk6gACp;h7@R~MpB+_9k0?W6 zUwDZTS-j~{qn-N8>9T^9o#~KQUIq-&!bti=5XwG$r%eQ@Ues_TtD^kgJ@)Rk1*uDQ z6#TQOQC$mW$tbNp5-fxuE5|u$vT$Ej_$V9=m@rN6oa21)=k7Q2oc#k^A^#fW|VGxmOZ8aVm(#QsloCGAH*iGEKKn3Y;L5pbT8*5qdG=9mW zTo@`A?&!%}h8CtLGB%g(X`u>`%3Ve}Ni<-;vun&mrDom0u4E;kJf<>s>OwiM*~)l| zqRHq8CV!q89%5%U0@^(^raIl}(r2u|F6dXz0eW~g;B`4QemwU-7h@aceH^=YcrboC z=~Ov++}KITzW;tB@_6cJ$=KWetmF9P@At>+l-z%3-qQGM29E#Z>7`Cu(YZ*&>C?$+ zAIp5AxhTsgsX;n_Ge=xyrYe!_Q&!&%oa}e20j;NP_rGiYeA8*AN~PS$;d?$i&}si+ zW*p~C*tn%L(z)j@z`1y_9}xT=nWd(L@=3GJM$vram2IDuZTrukd=YjwHJ<1~vT*E@ zxt^X4t#e_7z8-L?sH#Xk!l}gINJ{ItV?~ejij2iKBCOa``N5m!6Z&9_-KaiZt?^2a z%aFnEA~)9E11d*__WJvU6&vQ4@r~(xj(+1e&p%_@w)w zTqS;+sr+SmB=9+kx!dvyKsnYCTc=X^Id(OBXFkH5fIdK#`)@&IpgM8%!_USdRmuwC zgnv3+w&Up}j-O1!S4MDZI5}Jek*QdMf^WS+a#wQX^GZW4uAsd*O^GhZPONy1@{*et zQ~k7}DTxiO+-72D>+DR~t#3e4bk!E#8*F52HSb6cSK0H}#6gl;K4|3LVcUun9RA$e zOl?%B3)PfQSIhm}4`~r>PXPrw#2#F3XdUIJSdbKid%X@@wNATGUGWNg^e9)xo~k0M z`fp+0K2KihMQ#JV_~OaGoCdI9SHitaVS%sIa8t3@txQ;3V}k+LW3WU$1sDEeJRrDz^=~0bnRPP`d3yPIqjrc%w;ypTD~16LLN%1YsdjB-&JnV39@U0$Al>{zydnj z{NdZ*j1BT@R3Cz(?-AaAN1d=mFmq4MY|I#LQW-G&H@*gh-#~>mFByEpfV8(|2^2?B>mP5&%;bY*>gzl@M zui~`oY2?@FI0&XbMw;ph){Cy!UI{QQ5ue__n%kl0f%^J zpl!7NYT0nH#R@^npJM*CvZe3DMsJAV#Z7ktL z>|K}7&!RIzo}j$6eG)EG$>+m^V7y_XL>8@5w>Rj9ERzDnW?DIY)|DQTj{IAASa=f0 zTRtc2Z*rsdNx}9e3eXxs4c=lJEKQpaw|QtEIlgCTjEwE#A2Omro=SsViOBH909>^t_qIma?B`Yw>3wtFaTeMf6#`j-V|sl<6gDOdq+j2Ax2 zUPg-bM3l2AY>BFi>Zf5InY9#C|IUBlP2%nis34s{uBr zk%l}?^4dL(mY0_e-~W>Lt*I2MEGkE>7zfv@hDhPOWWu?lWsajt$Wk}(B3%hJDV^bX zZGb3xVvKxaYbuZE9T85awJx_ydPDDj(dR{`-)t#@1_cUH(6+8g%<)y3>JuX| zIATv;5ePk-VuRKScQcGkyBG%x$c=>$E%W^T)_W@o#vmwA*20hb@sE^5L)DHUv~9w3 zLzLCEKdL?odq{0J74D1ONr{c?-X=-5u6UpKu0A(r`xyZ)na}3C>7or62N*{Wsh+0~ z;e4m92i|`L9v|;(K;U`q+HKo5+kg7;m+A{d1A+eRQPrG5rDg32b(BlYL~OAYrlJw}EO%b9uEfZK=Jikq|{ z$sSd*Vm=e~OSGMte}kai6u&8+Yy&G-!|s&*H#;+(sWP9pENL9mP4ky20>jZXN89#? zWoGOa#0g52>}Cz&$2+6x&ujO7zegP(&l=kgMZ_N4F#OiKF?=pNWdZ+BIKatJ#sL9k zXh*>LL&nnUx0|HIp9=K!nsn>3t`{}kGrIZV82X}g$j^O`ir!T*-hDTFL?HL$)1$osii5Y@ouxxEs=^cjYuvr}_Nd^EuIR($ya46VcJ^ zleSV+Ma?h%zUiDqxhchE{Vf>)#Szq$_`9=y+#?ou$z9I;-){DZbFC<6- zg?o@fgIjQSmq2hRY)+o{?VkR6W_qojKLFTOi*wFCzkT1=_2s8hp;@u{>Y;3BTs>V3 zFi(o;qGXDOfGzDmO}j@+Dy8m`TYeekcex>sIA>p{VIKqDC4dup7p=qe`zQ_nZky_g z#tGVWu6Ir$nykC_?PtQUw34Z_57|Q@=SgC%Pt|B-FQoTRq7m^(8zYfpVe^C%%1AcobNjE!wt}*QPG>CYCjS6Vp zI?W9$wz~bzEtmx6HEcph-+u(S2m%tjDFTb3p)C#J+2|zA{j_!VN?Ir-(!yA}>LCZ; zy%Sz*uB+?dUxhKt@7h48eYxgF@y|8tbZvM);tn#T5%j| zLDl!C2NV-C%9$#S38F<`wO}Kds-kMrm3%Gg#VZc48BJUe6fn|qH@ra1SqnhqH+f6e zdsa4S!m;)TFI2SeEy`A<^OZTLlRt53b6ClPT{ppV=v|Ve4^A>cGC@gsMcsqk#dg8j zaM}H@Qx}U*x+ygy!%XQ|639%7npcID!x}nZN2c?sfg(mht-9!;s?8yFJqw3-1_xym z1Wgyj?w0$<8IAlM0<^OQKG(_tUoJGI;adKeIdMpUoDf@{jpN*%X7wd0)C>Vyr zRkzNhId2up*p#_Kkste85Gv zEY>TQM^}Ua`Z*4HyI_}Zh}EVLq2M3C5G!RQehR;*_`f&*?|uutYu0}3hYD1wF3 zDKT&V$NXxW|Hr5B!`&6laA)KZL;lRc%WYA=<~5*PO= zNmxap7yC=LvybT-M9HfQqmq0@_)8`zZD#jExIj}XkAhb~{n|VQ;cXxAFdO)Auk$#caQ#naSo;7z#E&Fa%^%K%UK>SY%1;~&uvB7X4w)V81d zt|9A#4$OV;ccgo*1xW0bgVphCb|EL=FOj9QG$D{MlU5QWneL>=K>cgB14>%W_}Ij=j+~{ zElA74eD>}L782=;iY|7XjY-EAlZS@S`;0dk1Ja}6 z>ALzCA3={eC-2Uji6=dux2!3F`mELR>y^Hjp?IbjXi| zbJ9;*@cbBxWRI=sr65w-$tZTIdfyShu#t<$ba~ariW9|Bq?>&G8q8T4U=NNXLkmzK z;~vFVArFuRr#$46d=wpJ&0EF9zAiHVhTSlP5KwK+C>5nu^6UaRMk-v%CtN$YN51Jh z=hv%PN1BIUtrxOC)U@7oS5q-d_nbIV$Nuowma)*C)|}l)Z^_K33FEV0>DD4MeWcqb z!(u=J66mW7dwGaNfwryBE`H5CE2{84x9A(9oIpf%T`L3`cb_O$q>Ce1%26Xn|JL*Q zAk0|)rnEZ!D+cmZvhRm+eYZ=GE+yH_DuUN4F`acq{&7X8@yu+v`b-}=qdlGcX_yIJ zYu`#_;=RBU{1q9umgUO$vHJZ%rGPlpfh;D5Y4WrDZu*olw)HeVwrN9nt)pS{R8zss zo+JL+Qjcs_2FJQ)h6WT;fGhAV&0sLjwA`_|Wd@um%|8crC&YO8$o=JQPwitAezCm< zK;_Xn{{DU-R9n8<`{R}BcO(MfoF z>?lMOPA*h+PE>WXR|;lK+_@Nz@2b)$_5N!n$T-lR%3m!pZvvO}f0>1vtSkwRE=L%_ zM0zht^4c0RJjpr*ErEFRc$TnZ2Nc(@%P*}FfV|Q_ z;UhC#vt*Lbe1ql73HdAQA(HkC$0TYfS3Ft&XRxsI^0sp7kay=^mM%t|(iTr!G1)nY zqn;s{3{aF58r~bsOw#bV*dBM5L9E1YQrvlvWJpWZOv!+Y-PsPYC!^~2tIQz~|Ekk0 z30CM&lOZWB`(kDsSf@mRAS6vAyU>RemS?Rc5q*p^l0?EvUf5`>$P%S8cBy}&!RP6~jp03lpU7&U%>3|Xc$=CUl< zQ{qCnu0CIb(Hq@g8a-V)`K}fL&zLtyel6%lK&JIdiXKe8#?VLs>8arE37CbhJHge|prpINYama5_FqUY2b4aA&Q=0I@Zmr?xm8_E+D~wqRK$TGfV^ z8`8?w*W385`d=$=du!x8>aVcUcN-2~kphsN6^de=gNL7jD-VFcWlrZn_@aL^7MM%@ zt%rFWUID?_wVmU~kwu^$HU#TA$gN>J^lCjf08U5rR?lWATAm&o5q@kv@~Vca!<#Gb z;833-J;mFd#df&9ynub<}Iy4mQBzs-a z$~CP?ZlH7~miW!gi((KPgYD6>`szaulXxf@Fr?%ps$0BmVh;`tZd|mebmqv7nNRg0 zm{!eQ>$1l$_QShA3FGku)wXR<%4ejlIjoQdW{|U!hy`V+f1G?4HQq7w0?X}7%OguD zvR1j--zeGp?PFl>55o^xFkRs3a@ zKTTvaRD2tF^|-VxvWZVDp{wE(5-rwO0i0ViUP^**%Er9xg4Jo$uOeslF0W=)t-eeq z1wt=XliiSbuXtEJIH+W2I87fLN2r6Gjd8hCL&RNM?6_9h+`({z( zr^E2WaQdv7R*?_F0|UDmdwkkXCU2F6Aw|Noq}wimd}joeGhz%A?`Am}$9U-LFnHIc z+?|_)D_Q~x_N^}=k@r24s!;3EpZ!NPowKFMr+cKx5_bS<(V9Dc46rR0lO!VJBv~hB_-BR>!=}JKZzC&p`s}iyfQ|{a`ny%1LE! zkLlajbt^?*Ly<>pPu05v^4i=2UfO=g@6BS;VB6|fVEMkUnc&d%w!&7R-K{85N^2z0 zqo)SdUgZrIKaI+qYlatr#daR?*<`KTOG3+gqfHTKk62`noQ)4$3#k6M7akZcwQF>p zm-F~Fm0M@}rSVNwZv36CY)l@hr-aD+E#AxVr_w1c;y&N6aIaJO*J(P3&=5(Su2Jp9 zSd9aJB;%~+E$Mv_0BizCPBI5A`|>4h(KFFCnHBN-j-NQA>vZ-D6zn!lae_poERGOe z%D&_h{rObrsc6PPP5d*c)B1gLlmgcu290EqehawcsC?5|Ix7jH}|urjQ_vn3tR|3uq4f3U}A-QMYQMZ z|0sDuV)yp1jnLvKI12^m0*SnG%FzbX0_8LDd%#SPsveF?Zegy^VhaJz#F@;nk7$Da zS-*C)MvRguxYWFv!<38IK!%p&Q<6$!+EDfG`^Jg%BjSGJyb|Ar=}$@iNgzgad{v&Q=L4`Benn-4 z8_Fi1N_G8dO8nu zzd!Mx)$ZEwJ%NvA2JQvw!|YB{tI|zj#lKz2w}JN*3ga`%+c0~Ed5DA)L87ZO=hTel zG_0#;pF7}Wx28J7Whh|3Z5p4~jb67c_hl8VIaPRh$YP20+F_|-$!NYZyXBs#X?M@? zYkHV^K&3LN*X~(RRDS1`P>X|lwnHhp=WdNM&mwF#X|J}T|LGLZQ~*&>LS~mL==J`?y6C+ur1}&3 zV&>}o%xBu`{7o&kPe_oAILpkSCMp^?Bm|=o8~Rc;g)5?=>Xb|u<|1wog2hUCk>bV4 zr`eVw`$>G&^Qe+TRQG+e^Kspx;?si2{ zq50>NiT+dflr7eD>la(0y;~wnI$_2*%K0RU4g1!xW;t#Th43q;=wI^?!vS+QjRqS9 zZku^!B|-kim%L+BVUsKJOO?&W$*4OU^bsC#P!DTE^EWvpbay*$CMIR^tUsF>c89j3 z*bWRJ?B-J{1`>~LsTuCCt6js$$p`Cl0s52N5il^iYqOANLwFv^n|k@cr8kjoIgGCR zr8JXhErW3di+%c%2L#2-yl9l)NYFTx`?YL;X}xr^NdCp)H+|LG8jb}@PfOI@a-We> z`(8#z>Plk;p)W!W*?2v8t0d+FNBowOTxe5qLQq7wsLW5s7g75dG?_KZmd=X=@cb`- zez#{weM^@<8W#OVN5d}pz}pOfM}*p@nq}F;>pwwas7flqlXYtcWCP!4l}NF*`K)5- zRadnRgRYuBHVX0g**1T?DEY#2(Gw_8(yEsFvEqs0kZ{BVP9 zp!13Z#2})ZcX-#~v8lL7U3r?TjkUHti(lWwQQDw^Mn-sv^iuy)`(kMjq&HET%zP%3 zKILfD78a!WR@9#@`DuKK3LqB{;Pe&;+k~P;D2&u;Ze(jSU__wXF_(OiV&swxw7@?I z92yRc`){nZucz|wNH(LSb9JC%U5?!BOw--*b$Kn{^ZH~qQDXCX#=AAh?(D(1fDF$X zVyP%Uo@S$20YWZ4N`nJM;S}K1`%~`!L}{~aNFs<%m-(w!8H_1;iV%LfmeMX z+4IbXo?Q)nf)#IduGsvke!fOCCgsn#43@r8lTUccjKr39&j;b3^~%_y@H7(RzBsbB zEilJh&DbR-fR6ago=EK#d9I%cdXdYz%AXBal{Q2t#V4|k8`mxyfF+tTu`$C#7l4q# zUN$#K{F>gI#nV=w`q?8emAa2*%l7}X*&dO9$K7nC!e>%8^5enBi8tU_$LK@XKIw6w z3wjYicHlhGdpLV~@ST0S^5-3)dAJL_+zGsrl*P_@oMaQyOD{0GUE-wRhff7wVaEa( z&4$-zWHQC-^{Ze$JCVX(#&~0>>3l>0R;w`f%}Cp#xhnvOT;;_Y^@b*4(al};&bfi{qEI>07Yhv)uIrb*TyfQ=*|o2bX)iT7*RQvj+;ZgUO=P&l zW0|?8*E6t3>%{B0bd!DZ)OoiG-~0>HoaF_JoOK{$3&Vd=$BNzqnOKq2DL~8v01*OU z@?#4Qfj-R{!`p8hAz^&mh#!tC4_M=ZSZYqTL;f3gt42)_3tQ6;bvRka1zJe zVOX5B?idYvrc$QZzE!4o1s&wh2W^CXR}A3DA?{_x@LenX{^BzKzI;BreIl;5_nkj9 z&UrVBM2eaPDH`h)k*7i>JAse__c$pce^^Ly=!=MPWGl_rIN^fF{ZYt;A}Jl;YZdA` zxn9Xch{$Ms$R!f{EF#T~|9#&zG@r2pJ9ZyiAp(ahvj=Xjz}+-zWAK3@tEnHo41VbY zYd|M;ZZ6)aYelc&6I#`COp)~h2J3d=S30|St5Dff7IgaLp1UufTI$30HJ89fC8^-V z%26OW8x6ykPpYs2q}Uan2}=Te^Q9Lcn39v1I)4$YYv9qfcJc2ih}NUM;TBi9+rcZ9 zNZ{1z;*w4t78*yPVwDMqFiu-rON=sm)5omcQrtwGvoC6`0)pMH3eS}AAk&GEoHYvE zLW+yKpf>WuREzG^S&y3Cq(RmU6E$j<5T3RV0P5JfE1arkQZX3>ZS$np)y80g)8s`A zdq3OE^v+Nd?j!2!3WH^PHOZ4=`vR6WM)fIQ=UEK;q!PS*L{M%C&16~U3MPJ%ok-x1 z5BADNGqy)XQt`6_m-(O#T6Q0C_SDH6g^&q%`ch6<=+NU>v0s8+W(SvR)N`F!x-+P0 z(aszCB+3jFm~_TB5d|7U6jO~JnH-Q*b0^dJBr`a~HmLd7F+!XR2UA6G@#ja`Qdcy- z#S2iYVIfKhXCg>Y;@5fLgljK@H~<6|F5M_ZD$tV2U>n3wIno z1jli8JZh*DX32NWgyJv8nKyqbCBOQ$QiLHx{D>;^Oz1<%2Fr`gTKE)xhQK$6ndb#D zEM7Qj*D)d{?<*$DDxV0}^-C+8fo9#1;7icOWxI-|-(g6OpuMUNR8A}ZOi8)*kyN&$ zr3r)Y`N`<;G8#i(>KH6TE>1W4e9I!VQ(O=4s-gwjXmDp4I8`*L8+jCPp-#0~$UzeM z7s(DM|2kkH1$<0v$0*E3LgAnrN|t&vC3yihE(ATe=KRk&M=s#Ndrr;8Wh8=U<2PC~}g(y_HU^0%bkPQwji8R{`gQz9)65;82xQFni}y zBz6s;GkJ#1cRrFyO&K8ycXtY>NEl^)>aKE>kA4?IY;Dhg#lX=r$^3l}K}g|U@&ZGj z8cwpaIJ?gu2@2CRRf#S{gFL1;$OIGt7p7T>YkSCc|M8KI+DX2j0SL}H$H)7pn!@L7 zRJ(P_Q@05nH$AlAJp`2dn~nKXn71i&+1vrCA;Gye%;=8j$%hQ(Itz=<-n#!%kNpSO zdEp@K)5!o)=e5w~JW+zP&u*k5pYZt+QEb4vTjf)FQQ*nykL}q^;9!C`V0Crrft2FD zFX!fBmp-2@;51eAZWuuNoIb&?Q-S7!*ETp{)}Qxj^U35kB{S!~D96{5!(Tn~&?b8` zT_lr7{(WopByy^OT8;9T6$X)~qz?b<<*yIPl~FCNctiUAZeD_m+Gl1<`i16y=SFTG zKiW55Ro*1L7Ni!|Z3Chr%r$&QA*?NIowVy8L7ORfXf05uV?`4@(-QOACk&G|H_ zb8w4DzgqPCin+bUvs1Zz{QDduLqX3p{2NvN^}?)wOT9HlY4Y=f6JE%#bT z)pHc2$}oPnwI97yy|O*hE6g}DUv*jBrpmybn*@SX99XuSBV($J^X88VL*kmlByQ@T2D;F>|%N1ra1ogm}!(^c`uBK*0z21&)<4-x`wt;2zMtJxiY*F!0|2Z;CqFy2Ue5& z3(?}y?Fo~oTP;Wpopi-o7wfh&nRErfy+k~W%6#EH84KqR+u`U%tsv~C#-$&vfA!}T zfPsE-3!`WdKD_D-GI|X`{zMD5RR#sl+4OV1x(`c~his+mZzTbgp&{TjyZ|z*J`M0% zDZpvY(Am99qM|D(J$)Ofa>m}HVW1BGgHn0}GoA`}5at4|XnJCI@A!Dw3tZ74B(u>R z5coaV;Ig2}kc$4ms+UpfcT}@Py$vnx&eyvxzm9RRAxUAVrQe2=dNkkm{We$tdNFaj zzCeXCGSJ$9K3oE^5e61xy~V%`<81F^^RMD>?qmHC`&(xxUL&N~WQP%;#2R8gW4-_J zC+k{}T>ElPY0$cX@4Iz$JnB7R%XWfsPu00w+B)u^E(X~d+%?__5{n9O!dz^}m&kHU zg2-I(^%o3;>O{;;#a4u$K$aK}Z(9$>{cikCh52(2h2YO9+kV4E%Z*Sf?K;~!H_3V} z)51i4Vw*mmFTcJ8yB z6)f-IP7DKrs6oS|(|Kv15}Nw^KEm6RfdTJ!$+0|dy2c5w6%2V!tKD6VY)YJEOZlyZVu z66uzOehu8~zbuo+HIlw}+5F+yqAI6XsfS6=AF3yLj(|1Zx{LR-pWtnIiA;Qxot*Yz z!hTvuA%yHI(353zVZ??_pv+et;2$=W7z_y~IeyZqcXBNhV-znDiP7Gl7UZ5U9se(? z$d0}~#uyYEb3`waTvsl!1%X_?UX)`eeHj39E24m|W#(r4vse{3uh$ea&N_}*ih>lG z4lQmEY01SO3y)vo^WNzovT~9XPIV)O)awz#F@9ta@b64w4FOe*q?onRR8s`M_-!l0 zK4D!w4&-Cyka|IEN%KTEdoiF8kUv@Z#87`pbagazN-UFsoiq~RGcXY%elH#*MYI-k zXcyOyOCl9J3m}CQVQQ8}Yx#l-=n9uEbqZ|MMLfMcP!O`izqFBUe!GG8D1e(%SITK? zs&`HXI7k1NpA!-J_$M--BD#2t2Eom_-#7KZCJn)EQ5?Q|EpR@1$R4v!+q$>Cux#_5 zOhjC@+24zIL7U4piHangwd2j~EM+`3*Ee#uu#goIpbqWvcrDsIc#dJL$762Dlu_Lv zIW2lJBU~?MoR64MUHXS8#rX_bj!kiNpOtnd`$f6Wv8A@)1Az1d zZ_Lc5H7uPZJ2y{NkBoYS?*j0Mr$`k(e|YU!tKC!Tqtnymf!9hZ*+lfy)(P86BitgD zw`tn$I$+-|@XqXMEBWd7iVhY!{ms)303_mc5;VA9vdZ>HF9rXd@@E-txmTJ8F{ZQM zn&?u!$X-%bHy zFC8he_3TC7(F4h1mzd^%l1oxPSK(wS)F-en=W zTZTi{`H~>f%9OPI1Wn&ldsV_PvTTt&j86JXpzg>d_ax+aAyH|L7XJj+&<`bMM1BQpe&r@^+8SheuVhE{atvf2JGh<|A#0sTo zsZj?Q#5sau=xN##$V589ELhRFrWCH@Ts;#6J71KaeM;edGs-qusyRtQWO-o4YD0pr z^1KvZbj@AO$Tb5`Whnn#y8VMw`zrM7lAfuzHd|%s7vhRmXKC}ajClDB6J^0NmGT~;%LF%%z7GetJdK_;+`Gox7G09kC)kTG3j^aHQG zOGnP?dD^u0`kb_(ty#HftdQA2B&BOXuu;+<K2bxCvnWv7EhmOb%>$vfxT z{#%WVHlNwmInH+X2U*t~*dhF+C#QdI^F!m>4q@b4B&wHVi*+*te5Z%I{n*PtHq$Zd z%&}UR{#*G6r9iRz3F&bCA*mnsongwS9Rj3h0i2#r-(q&^C!8_Oio7u_@;kW>SUb|ya7RgyPo#pCZboPL(eNvC1;Ax}TS#K>)5aJ4w?iAkQ>_D0 zh-M%EDN{%zT`D7sP9k$sW0>0*;qR{cjJlTHEKizl%q3{ILntj=wnnJXm zk!AHy*w2B!FQ0Jbwz8?epLTi?|Csscz`ch5l664g%E6v} zWrP*b1^~FASoCfx4olE7$g{j8`g>a$D8NlB zrgEw_Gdo=mU9e85WI01+h%!GvT2C6jvw=1qSbV|HT0P|52l&sCuLON}Fp3_YiSh>Y z--CEMfPu}c_8*(u39Bzeb2hsH@fYsdhOpcH(vIwt$Lo#R9`vxV)y3g>g3d5Ea{K`A zEUdYU&jH_JZv-DS&@+7mR{2H-@rIj)Dd4jjk1A4WhI#k{{NMS1v#8lXs~N|VxRn@n zlZWy3UHc1DOMkb1ZD3epLvU%Q@mxf~Me*Wt^&~vNNsn^LwJo#7j>wnQeZ~NKRoHtl z^n+wKL&ocnQ4~cvD1kXMRj_lqvcjV~=UczC2|G!XLPcqQnCXuPBF~yf#!y(HZCLmK z!HCjapgMIh`O000lDR}7)1b;Kn4#qxBD}_V(S4^Rf!W|o8P0q7vNt8#%jBGNA|CO* zLd#_EcbQahX?EP6$5A4FQk&}LneDy=?dFfJ{g)XBy{EVHHYvPs89h;L2i5B<;GDq= z=d}R&Q|V)2(<>hP+5&mea4oJywc=@7LHfNhFR#r+T@`V(e&KbEHA7h6i@jo(Bk2=vypHPNmwvz8qh!Hs*h-pWDks|K>pXFU7y{OZTZ;`pEL1u^O^fFBY|*#3>r*Ena|v=k`XBWN5AhKpU}mMdkyCM zXHlJ>(d2i5N$3A^O~esH|LZk5Pg)UtsJ}lTb^_ESal;g# zP+bw4$PBOwZYrq){Z8#KQZ-~_5cIfoAgTJyDaoL<>-PP9(wv+6-Bf3vn?f2u`0~X{ z^vB~A1^jNP5+37|PX5n10L4S&o#@#Xz39{MtD$6(^II!&KKRAo1B9p1WePX=veS=C zET?%EqXjB@9;58uE8sbFX6LJjgr03K!;?g^*?$GJ;JUW37R|>qKcYmf-t+<^dAy1x zrJOZW^VTC&*HUax<6%RgKFhPul%dKwZ<*-xSF%-~SIxU}ABZE+YEbjXy<$haTyiz&m1*Xyf zSQE&yHaF~Va02&4g@lqC#>4K1&$K_6CR{!CFp6f|t~|~LRmvfayR>618FJT-p;6<=}Ehh?94At$$OCxKhleeCaZ2&iT`a9J~5W~2Pk z81BMqU-M^ylOAx2)Rk%IK$|`*TyDLSluJ{0ZH6dAM|{Q!H1EwU!w?&tiyT#UT3e{~ zM3;{~GjRU`#Y}|-fa)3y;xu1gdW__bPjM#U} zJ|p`=JU@(Rz=Vg12@m^_OWb_r7O!EUPQhvSmuFZ-x{I1Qj!KR`^;R1 z!I0X)gI#5@OsYdoovPtauBOI)>AmUm((kP-AS?u)-am|D&+hhxYHCFa`N`WBQTR(S z#c^>!28{eLRaKiVdClqGv}6;Y-kui{SOPOC9E0kCA6P=&cp zNre+=Gs1+4wC3dIHQzE)dfW*)Q9T-kDL}i)T8qE^KQ!C(wChr1*It%`{q+EV6`57w4xWt^# z+Y^=jl(91|z|TZ>MTGfBo% zjQjqXnHC8+ls>RaHXO8;vKPxMoT1wqm(4%p-M_^K`KFsy7JN%RjwfN3RsPqH{8_xB zw8ZNoc*Z{}BbG#B%_wWTdC|LouE`A^H;8L`D@R4y2$At7Kwwo(*#OL}R&+p2@}{%r zLu59eum?D4KN;0EX}_0nB06+pg0NnmY`25yZbH{EKV3L{hvPqVthRuKas>H)(9;^Z`jUEp~pLE(0 z(Tj=#Z_igRS7M*C+dU7x{CBZVDemhtpH?YE1mIuBR0vZWj2?%HRs!x41NTlS?nmz+ zWUp?XYOgEDQw*m4*>rhr!r$afl9dz|_Q(%8>=vKypKYTW1-@4i_(Xqv0f|N#8^q~$NS;)o|-Weu%>fXFPRC;Htbo+RB61!gA z>PFN)K;s;lOfTo8(Hr6pM;j*ab@~Xw)U!TG!tM3!RHIJHw@r;tgC$$#xE$*sv-yli zHl)c!fbo?DCK~{4S$6EI9=-~;@XelC8xT?Xo*(agrgur0q65&A0ZxBa+l17|1f~4@ z$%y^p9W45-%jh#L-$S%R+UYG{6{xO&$;F}a;pN?hX8gJ>mIQhe{kN~-CPs|;&2i3o zTRw#0WWV8RkqEfOUCI=JzVgqh#WJOwm*S|)Bs9NB;2$?bwg;VGcvG#XQ+`FnWZp~*cZoe|afg=9cAp@1+afjSTP4;TUJ2RaSbEDJ$ zcCLQ>15&2T3J=xz)tKd1JN?161-p-QA^|? zy^n?6vD1g1HHE%`&=9I5C-GHqkD(~jCFLd=kbi41Fx_`ozGX-YK{NAqD{$9uldNo2 zcXds~dnI!=z=gMyfWirrE;m_;MT0;~2#XmQuz-Z^t_`#rb9t++x zCIV`UblHz2qnoTM(V8fj+p}r5VI}oL6Vt^J9vFhlJ_)jG;Ia0>`>}SsNcv`1I&*!p zaIKic0+z*KGjsE)kG}mlIcLGPTa*sO`Ao=W2%1$)7I*K7bc(mgsn!b)tPLb&76-7f z@P2k-NF|44#n`$qZ>MwqsMde>L9O1a1LV~N>hpste4H9znIloY|3LWa>jFg~3p!Y% zsJXJSG`q)&U`yZM1*6bBa1_i4bi|1=_b?G>W-}EQ8>pvES;GtQn$06@i43&rK_Zt^ z8dqel1B%nX9>aiavBH$w?&u;mkA`f%kj7hb9)91e)0H z3ztJRsx?y%RhGZZaSyU;j-8{$)n5EK4{Z9`F@D?LuWwRXn0aSbh;~(4wg9(wuS+p$G~rWASzg-+gYywvqd2MK%waT} z@FLa8qx50%cQHvN7b1FSK%~B05sx~^>e|05NNH$(EuQnIF^cJ3?@v4tl2;P-P>156 z!sWN!tktr~wTbK!C_11fhnQ#FEb4Y*rMXz$#kE&)Z$&UE$;|&*qr25&!*|;cI6mS9 z!1B1Fn4XbHOf$Gl7WZgFbtS5dET(5<^YiO5Td=x=ISA=V4mOQ*ahJZKH9avK4?MIJ zNgd$-l;|!7<-XO7#^a6FwJ(IyqTFd|JNR=6=nhpaz9(ZabIJQI@)9*HvmORr`UX|s zfT%~7Yu1Mvw+}+qUo|qX1lL{DB>gUbp_P;x@J*dMNfe>H(QSK&V%PPg&o&8doF-&5 zmdu2@25JGTXI7Q~z5p0|zRdsd1$351>f=>o`{i$^{Kr(Q#|^u{v)$76rxE(m`+X;hyU#iI{R1byzfa}(I#0Yu zP6HnwNBUGAX0K9n@O-i3oewU4CYyM8TuKA?c|s%IE-b4Iclh7iJT=8rmZ~4TZA|#j zFJxe@G>89ugBKh#n)A&*QFN`Yrmac0R+ctcvsO8&ZKc3A3_ZhHfRk0T$*Y%WxB4bg2Jg(-=wUtIR2aHFe-4pKUjs) zA4R)z!*Hlche5ejr@K$P$J>2C$I&Y zJN0o)&4bvkC`t4C0gj_dqk^I!UTGbJqFp_w;Le_{TEh?r0nJbzEsEW{QpqOt^J8t_ zvA(dGUSTps+g5YDtf*h%4h@ae3KpB`VuGL1(yD^@3KSm+keB9L0ms%CSp zZ#5pIJL~ESPHuw_ocN+wOqf_0a}w70jRFhzk2Y+*2f`1`!pDU!2E8Qdnk~PdP-8B%P!!s(|Wn)v{x}v!?oj`w%1w3fST{H^tCa|mCs?s17%$i+K|;mQ7f3^8%YkimdP!j=2%4o*4?j-IaAi( zK_A0v@S>n87;$zf-QA!GJdZhPlape6uj67XzSlF-VywU&-kpGHD!pxv+cu@hJdGH| zb)W?-;(v8Czo8i{#@iD?s>P=d21PK*xo=HCj&lYvBeQ-jVVim6lzkjKe!~cT59(5R zr>vS?`Vn%zJ^g)yp+sFcu)))cqLZr~Nn_0=(}Ee7tSiVFi`COZ)9u5b7) zQ{4Rv$z!G%XG-FAs!AWu?8Q|=1dG-t`kNXH;c-vkvj;gaYoRDmOOr2jEn2z@@gEAMKkAZZqme8w zREI>}y!~KTg3OLp3fnc4v@^pNKaNJ>RXj4$tO}Rv5x3Hk``}ycFxRJ>J4*5@L^o`- z>FMj|dXjkb>E5qRPmLlxbvyuSXDvUO32FQ2=xNr$h1yYZ zPUN-vjUzCC*}bBX%Xx3~<^5UXN=sCo?rsG0{_W0hWE z;hS(R-K4_$_3+&4@;A)=-^M~1{_AQtD{bO^sa@t|UQl;!(}F$8V62YzaAXx7;q?om zRrnQ!|2f;^8Y$5?c(mx<4DZvup3&1}``kU8^Eq&*EFyfoSymN#SYQjd418MV6om(0 zKHUlGJXN;0UOZHaKJsSdxP&~V8iAjDo%CpHjFSFroByD?*p{q)d_wOz}Wy|b)4%qt*92@!^2^lE5c*YrfXZJ|wmzrCDy3iC8 zsknaqb1u*UW%VKkiALn;r@RK-1v=Drobu7-=UEto7XG$wHlyBE|&sy|{ep4MM=6S<9QbA(}OUp`fOAN3Ty^Jk}kxW7K*D{;3i$7k_{NVlaD^q%3 zxR5aGRLVosh55De0i`0tgGbB`222}6-8L9kp(#4IEVm4*wk@$kY=LG`Ps&Zc-Xt|e zRm(Bw@wqtZ($jCs*8Q$f*G>^<8s|NUTKzdqz&-)>a`n5t=6)?{$SdLO>t)C^9GZw; z6rH%MJ?p~P0#aOcgT98GnZ}_PO-H*0cpt1dhs4{SF<)+A6|qipDezVM&?+_>lFwE;fd#w|j%57DY?3?$K7!Da zcaRloO!8ajG*#ru%#I?CjQzB~M@T05*VhO|@;a&I%-)$(w2!s~)Mwey80kcqgXF2F zXVZq6)TuOHmC!xY!!7?=VuG7Dh4jX!Kg&v9<(HzoAS1!dcY%1^`Xr_y96n`g?PzXB zMjRsxrjybcU30g$)1|rQymPQa#Ex8s!}|#R4`0{j+gSLrsXOh&i}7v=WZmbH>Zcjl zrlCY+(7dQ1-RNQiLMT}M&}N>qoNz1S3!{8Zh6z(*&|uWtGkj2eRQaQWRJ@IzXL?2q z)Zs88$qz4t!{W8F*7v)#nrvDM*Ml0vE`R=K<2JlxATyjzS(J1=vE-kQKh{ zxt%IWpvbem;8b}tKX0ptyg*2miG2Xl$gdp#9PhW0Q#6`WM8jc`Dk5NjuRgW$v7LF$ z94~nWnWaCeAHX+IFiV7k+%?p+4({!`!tt7Ipu;nWFV}^TidH>eP?g4n##rzgOTJ$| zfao@WyrPS}8Cf%qd6K~3!wT-(`?2r^X7wga?=KR$=)2xjNtF4KWxZNQALb0^MVVWG zT{P9&z_bZLfjTT{R)v3RuxHsMscKs8^~?W@w)c!`>g)DKEub`!B3(dAD4{96OAQh_ zB$QC33WQ#jq9|3Q2_!+flt2;)Jt!zDRS1goUIgh)ML?QxxBusq=e*(=bFDVse-Th%Hst#k)$adrn|h|AauoBHp}KJJ#*oYTACDFoav(Nmz&ke;pR*> zwBWw^msdeu@>KLk)?RsyV2_5?r-KnJC43EZB{RCVDJbPTB|Y}xXG4f^dhaqzx9Cf+ zq!jpDI^tvK4KLevn!<@!>WnZn9#*6ab%_TYfLNowR2 z4S5d9>`HbrT}YgSc;vF%nLzVPnzX9XS}25Lthuj%h?qzPn4+BspD-knDX#e5_0Cm%h&6T%ID7+K07_;kp0LJ5T14*sNI2=b?|WqGgcjw0Uo zAaGE`Wid`-N24sNA&sPwF9)U|(dAEBb(IRB>FZxL#`%ZeG!MoR{a*^?TC~01^6>KrW=A;s zI4nd6jGG%w3ut}(@S^s?Wqb^LOAT8&bXb9)5%2$2gY!hgFnrxxJG8~(E zH~&@LPt@(whPR>b-VQcA@^xBDhSQ3<8!3+5&xN*mI_;hOT-r|BgJ}Kc4#xnj%?LBE z6@eB(v}o^?af$a3`I0Y?j>KHv{6L2<9q;Dc^#fNcjNtc}jDerX-w^=}A$ReYP3q$J zZ1;>qZ!g2lX}y`Y-iz$i(l1yXe8(9N9h$n>nzSIv{rG-;Sy0NA^asgP`=i@e0C}O8dCpC#2s#7;ljXp zu#1e6ray&>R)%~s)!;#B>`Y!d@?iLyiKsz6_;LN-p3sO4D8?cZ>JocIV3zpe%*(+7 zon|x(_#lD&GOEfjb2B=~{S9vrL5c!R)oHFhKoE?h>otal4rKUidD!e2VBh|LX8NpE zEJi}r*MRo??1*)bWZFU#r6 zQ~H?NaoH2Ys-TvxS3pv|UqEbymt%;w6P4Xd8Ld_3p#=YpzVU6X0BG9K1GNN~xBfoO zcW_p$zUMs%3qcVkZ^PT&}D2@B@>Lf-zu}qJvbW8+$7|&+ZXFDTrg|ln=2s zAzunUS*vY{2P?|K5`VV2RyY!|^bOL{`vqxNh)Wl^N%D!{X>slt2xaaa*!5t`xL6X~ zRQ$tA%JoV!KAhX?CW16jiPWnQZVP#PRx1y2MzfAIHer1t_Nln85IJd3^oDYr%It20 zwu#hYFw*55pLLQgLkURs-EiMcyI&qy_o?TE(LyG8RGbHYNc`Vwy1nM(C~$O?UdEC1 zVe|La*k!@vI>iew>%qxezEd^-z18h2InHS`>*} zEb8Z2E?_(V;YA)9;SN8|mIK7KmiA#Z>GP#4@b{3_4m9BWo&u`!diUr=8-H05FGIdIp6 z!dLF_X{&H94vQim2{1JNN7w;$#I%e3Dbk~S|Fx169EdmgvK>v&;eJAqhRyBv5W}m`VHKFFAmm@|;Ip(Q zu|O$ut~L4p8lD&lff(QIC{ju8mi_+D#H5PtTbPVtU|0$_``Hd<@S}=Z&Oo!?thJEa z-(VI-_DV-kwK-S9?d9OU*rCCr!?+O{TCq5}6<8)@iLy*`et0n(x|29KmMgxJWh`|F z8D6E`y%yQCR{UvbCvMIkFqN?xbV>I|OsVn$0P4H2zE7E%5))+uR_nwu-XO%3h@BKT z;Y;=oF??@Eh}jq<*G3*w69_cs;>wMTX9r=R8JGC8+y^&r!&5&VQPfpx;bnenPc->f z>TyzM`gcS`5+PWObgNzcwBDLw%ejgY>lsx zJi!lbip$yR*zDsnG{6yTZdAjTXY{LXwP59;&JT~u?!}WMtu>dHxm8lSX|Uz-AU~it zrmyH!s(C9l(D(u7cP8@gy(nmVMkRQTpg@)hsa7r;AlJ~Kmhy#|HRK#dXvhZv>_spu zv^mFDrwn|rRCcJcZG8XX@crByT*as1Ll$x=FdImCRr1m1p^W<%myhQaD9Fu=SS9cn zrEzbDPn`X$qsDJAmgj6CEHNflwczcP17kan$nNTr2}$UKGrGlE9?b$Xc3uZs7XWWWeA-;{_BS} zo-rFJCYn<3LxOZ{IE$oFv6EuM{!4glUG?)s7wr@?uZov313dPxeB_G5r_SxAAp~|e zF?^=$W#sAhR{J(^3W5HGIikYsm4j%&OMwJV$Wu=36a+aOEe6Nk(yF*t%)&ZOe=dUV z)1-e_Re9e$Gh`aUvcMo#IZ1g5xObiV%~gY7{w4w1Qq= z?JoMy?f6GCBDo(N=MhKQc<}?z#rpr)jIoTbEaMbAXet^nVADa;0%_Zb%g~4foR8sZ zWQo3kcq81`fRZq|-OxSCL!yG2#j8Q?^xR?Rx}c8YGxf^!V5cXld9W01in%U~o4O27 zf>#|I^u~N_Q*gBzYEc4u@HbzZ<1{#CL{}gv%cgl4I?<(l-Ev!FG9u&UE6`+mJG+7m zr`c2j`#`J_El@hm%-o@0sUoaBwZ;3ht3@<1)ccmysl(s--?mI)yEh;Pq7Pm)ZKpD; zRf)%8cgu|bkBhR5X;pcY-~Ms=c_Vx)@&^6V$Qi_kk{tS=J2{W(UYlp=gBd2{Cw_ix z_QxGOxPIP7r72m&G1-7$O>hv&DJmfO&^(r?~lt_~{*|J&( za4$)yB9R#2njgQhHfR_HY9WoN#MY41AVI-p)SDNMs!sJq5i z=eeVa3`V?W;A>5Qy!Q~ei6BbYoKstt`HhcBMg$Z{(g)y|-kQ&mQU3D2DnG-2A4MdzM4VB2+lC1(F9(sRBvu;wLpR)i@vHQ6--(v2P0U!1)R3d2Tc-N^_0-U zs)hbOM+Ib$3I>obYEbAV#agEtyN_rIoBm1TU4uCG7sIp4272tQ6p@oo2^ULfT$1|< z?Cw)f|ym+N5XFoAl?D5PX}%e@tRYSvXy)lHn`I%XLu^pZ%QjH2Lp+9H;`T5NY2&_q>EfYx``z+T_bnAOIGz zx=w+;tonx#6mAu5HgB{ZKs?j_UgSj8rQ}A`*7F-bryfbLI6In0Y>0C^Su_0bOyH)k zs_&Ym;v)tMfV(Ri7@L-!PGt;mQ$3uA__%9+5Z*QyX?Hqc(B=pnHFaC;v~EuoXVVgm z-Q>Q8oL024T?!P^>Td-@arGDdaa5z>Z`gr{df3RsAcxE7aw4bG76{4MCKA%_@DLF( z#t>*ibVO_6o@WONa3U3B8Di)l?@_*4hKir*tE1XP)9-BRAE3j3N1iw^8{dsQFc8WM ze?K4W?1_!co}G+eg8s2ola!$$_jj0^jU{=Hgnur%@xlR7PB>fxItp>{8k!vUV%Zhf z_@3VYoFM9r$|{s}&3zrOTlX24)*Qf72_|zEQR9(4F)Fp0{zITf0R@;KqGA z!$w@U!}3qqk5s|r0BwdP(+?lth3?mOv^PYJS9JxE+!BDMA_E1y6gHWOVl=K zHdx0Eyuc`%#(7J?Qf{bS&b7vxT~49uvr^uu=|IZ-vHs9}t<%T=hpBo|^!7YfCna~_ zhXO*;U=xSId38v&Sd3uvQQxiz8$`A1=lD;mhRnte-8|TaX9ijK?l}GLPcjLRmtL}NGZ~R77 z-bF$N$sJ5sDJ4FE58FQFOGEuSV_Ju5!Vp^~mkKv_x7doMgfjLOj$ekTWuO(^g5D`H zx~>O9$66d(wq!2Z?#YwKHi`-qvJo+m#lVC5>*Bh{~+x;T_Q&})c8@KeHPZ;5(7Hs|a( z0C7gRZFPf3XzAq&yYwwJrH$Dy(rdCdo%~=9k~F=6Hz=>;8WVV~U19ry zz?xkbs_R8za*U(Gaf-Sr)_=;|N(#!7Tpu(hkM5I4eJ9UxJfXdO7HGbgN2m6&Ef9vm zqwc5K#WbtBts}1U$o?^fbPop3vUirlKG4IH+TLkr*2Pwa*WO@%n;d^*q$*(1!oREx zrKLV|63i@;{ep%7y?nBx2Udyavb)T5=<4qC_ZBQvMF&m9 zsg79n#{P=(G*7`+j^*$RJh0Hb9=p9`->b#B(8UNd7~Vd)d$Dos{Hu3e4d?#60W204LXcjF;Yie;5J+6PC%h8*O-bXBUEQgn ziOxNRY^m$I}F9fZeIw?t%06srKG#V*FO1Q*^%s814;)qqNWS`UT$bd3ckFRB7Kr z1cP^dKSl`qJ=kOnd{vfwQRlqs}c+y9;-~?C%y?iaSgq~CT z>EviJ9e0{N`}6cS7g8q@O^>?Fxt>XDjV$NCucvqC=;Pd?9gSyO{F_H*=23S9t7szI z|FYALd%m2^uJA@4%zxzhEw)F`qr~Z_c$hIXxPG)i=Cs3CE1)R`5n+Y+Qq+32LV$^5 zU(a=FkhInVR&-rij<~{)$~7z+Ehj+$UR$l88lk)cTr}Mu=avUO_{9)NSP4&4>E7^< ztLQo-M*ZZ`c*gSzKrCotF&w9htDnVX3sSO`*EEM+*>ZyXueYK2GlQ%bgS{q@ze|$Xl2yIRqEvJDZ!L z7p#$N$)_il>;0#zff#r2sw>nRL;NuOLLk$vGfzs)lC`lZ{h3>^D5~XQ@IdfmZ?^C4 z{*S5lrn1RU1gBE8M*#lTzOUgMz2`u|{LAoB;Vc43ZWPLG=Cl6NE7$xK_2+zcK;_O# zVUGZ9?ULA@<>;4#c#A{dmH{qfe^1h4$Yksgx$AJp7W(cDS!_m zRTy_KmtgwN@Jk-E_(a)}!|=|L#d3C}5m}YFEpbUk*IM-UHwrdO^8Jl$e?qkai<8sg z@F3Z9&L8Y2cZ+cuuuV+FkHlKo7k-ujGPhi+dZR(nUHllpn0U3`lW}8SfPyQ>hi`&! zLSNnlgSsGXOCq4|6*v;XyRFL6U;f}lXcD|Zf%<2#k|yjVufS>@lrJ|ZnyM`4n&Az5 zDy@%lzpinUNDODruBvopk7^yVeb504YXi)m3~!tpx-()ICI?0EfhMoutBk^Z_~hiYVNAN9Oc)CV1GTUlx5iHn zP&QO%nqYb4Q?nCco&1-_vm48@WsLZAiC_c^Sy$>Mg%}D*+`Qd8VT{AX=#m)x$_?k{5UP>=F z>$k66%tq#x=jqJk8r3DGq6zR(&J@Ig*Cu7GPdld3XXMA#k;jP25f2}BM*qzDO0x;D zZQOODcc9O9RNF@)_5VnCAqnqmmZ^NHVmv%!JZfo5Zb^i^q?thAI5orn&#cnH-Vlpi zd#2mqabeG_#xlNB$@#zIXgd3*jpsZiFr1B!r+y9;`TA`%_Evo3D34iDU3-wX@`vfO zkRiQR1PANNQ(bseZi0-?$oP@n+@He1Stkm;8X6a0o$GBJ#YpdmjdhGI_c>=G7*;N{ zJo!0_1@)=Po$$S(lm@kU)v`{e7a$l`t$=sH5&|Ad0tcyBEv}oo<{sGabbX+64uXz2 zu>DsM+V>Ib9=DrklK?2laJcz2*J4(E1!Z zw0V=+I8kST@Im1(gbvI{trezMJzXr)*6X!e=T>>t7CV%PMdu(VW0RH=a@V~K<^G~6 zpDPcD;rA>V06&&gEJnR1$(z~jx4H%ChDAkgRHko6kMyknv$ym*8gj?ZJxe|wV|O_I z>5gx``k|{`g=*9-1Lti$HCO3!u1>0PC=~PQ7yZR=Oj`Z$Y^2-%8Eu3OHpeHr(+3qq zU<(Xic~@jdsIaRuLUq(CwfNUoXZcreOjn`jf;dSn{wZU{NC0)3rP$r%6s?W0V85TB z_N0!!#G=KmbP?0gGC=1p%mO!4$=RfAMNCJtOBDUYhQ^z1KgzKTZ@hx1iLx9_{7BP* z;Jd@tiVg@c4bY%6p-AzznVD2Eqd4=Wy6ojMMRuYtip)0WV8U!)&NEcc_TRajH>&XE z;9U_z&WmdDygt<~S&vL+1klbZa^KKUA zAcK&ctH1won^laHtyQkMIaxoHQX&5E6X>OGXn!l zU4*$`fNaE<=B!(-qks1M^~mSjSgUtZWkG2O0E%Wi<@gXf=}8hAw;WaEG08?gQ^6)~h1F3@;yNW+Mu?$wU@5HP0Z8f;DN}BZtGq zQ0g^1zQvlFhP-vYK60gO7Bv*W8ApU@%*6Bxmb|HzR8V>+1ukn12U$z_A+V<~Wj7rM z+(vk`Zj(xm+KjSK?E&A=^$`b{&!hNyUf$e^DG#_rC}W-djTh7W9!7j2750P*M4%W8 zSzHmMj=klD7%~8PTF7XFS}mf!^k^sp#3uB9tjw0HO}z%l^1vd8v$*sEUNG_|s{uZ> zff;nhbo=BRs2rdzNYMipzEGjnh3}tBD%VP*5fc-d*)qsKLM?X`i-30)ecVdlZTKtQ zA|q>+Wuuju2xB{{=1E%Wax-6iWY@jRB89Jd51U{kDK^sja1l1fYJsER-9Xd*XMx2$ zd1t+usODoA@if78fX?Yr{`R2F-tQbFP*m*m&DQM`le7|E|Aid4PvJk!i9S;ALKU^3 z_)2@0$&iL;1dpm|hH?~-PLCyg!g8npO;6zS+if1o`A7;0OlWzsjN8VybHOFM zn8$?wcWg-U`1kGFf+I0g?2TG46hZMutZ+2s!g?7at&Ss(Fgn?YZfCmCM~)3NCrm~V zjII@1#=GO5TW&cPgLA}Q(OYX#W#0gJV|mB7-L}uHZvY4Hcp9513M=v9P#6%v^(nE) z>yLd=R(@w6Gq?s!`8Lx0<>dJlcxHeN8iw;HqNjZ5la}3%^%T49u6SdvuRG0mx|UT}rRthTg*m zhWv^Ij=6tP8gEs(@E$-`U^!ZdK-_*0tH3nRg@XM=(G=!~(k%dP0}!?Lgx=eJp#!7{ zdY+S>P8#(_!Set^wWlFq7SKQ7064zTSGoRmAox*x4{&_uY>`V%%J7fw29X;3m;yA= zW4WUneu}znYm4~$4X!1%^3MYsMxffZve?Z_pmtLWrA@x+=wG}lhj(69;(1S!$N}5h zk=Au0a_JT}6+IKC}RSEWB!eiF%xT5NF6OSFhsk<=9I&&Kwj_mPAt;K zdc{?+kI82tRc@-uPwMEZxde4Zw+76g#Fqz1icQwW5<=gw*U8S8@T}mB zMdu0>QH}teJYDtQOAvKH8jIn%7kV* zNOgXSrs)2uLakuSXslx%Qw>vgZi2jbEi*IPKs)a&KryIFuo&Xh0%GsntP;w&^_<5Tem-Yy|dv{F~-iE`y#=O%97GHVU(wV{Lzp=?x-#5!ja(pNpJR7n|&%6 zN2V^}qJ}w(++Wc>F;^IA2{?;UyL8V-(PhkHaf5McrG(W@1 zX?^kK&_XF2EKWZiBydkZoqo`uAk&S)O+9+*)MLy*nuf;3m{?T~;?^Y?u>S&YN3Sw$ zvbf=#c8#UtIZ3EpWBiOcT+fSG1}e=VGM@N%F;+Nz|2PC zwtDcOYeu%PFZXk!TF0VId_NtO5ot-i@8C@n!EQA=`mIw4>br7q7j0lw8usa@DRS7E z=T2dbKmr+SEIWpodYC4f?pnkh(YXtHV7sm2OIMoPlr?U z-2XJo3BKH7GhFpD_u^2rYBO3KLdId~kXHq?cJE9C$-fL;!gM7JJeOAPobyz+Acvy0 zh(l7C8iDRc=*rOE6&aXs=X&F7hH1C=HH^7amiTnVx?_Rg+j_Ykslqb>2?^<6W7`7z z?&mgt9}?ToaL6D7SPY50t*TtdSl59tU1wEgxJ1#lcvVJE>ucO;}>BgQID zdxlG%%*OuMLqV;o~lcFUYfXVLNnhOy%l4Z;ejUs;Y$_`SFMZ-qxW@$`*9a z4l0I;*nlD-!;e}OX+rqu)dfa{&)CA>nsy4~bLh=QY`Dv8>p;mKs1woc&B{0&wo<7S z%!(U@>DI<_YX-w5IU}SaWZv8ovuV$Q`!E?#s`ZF%JT`q$cU+}9Y8yB?b|JkeG-Y(X z%y2@v!h9j-!%}-)FMkaW9Vst6V3i4RCnS*WU1<)vVO>y^qo^rmP+&-0TH7s?E$I(p zYD-m)YBAX~Pw_B$p`@Vb5XWlp6F)!w5gEE{=xL!TT%3x1>6-2l*I%>v5NYa0&dBC7 zhHJlcH4#C6zRlQ@T-^XZPAlj%{tlN!_K4>{BAohL96Gnuy9=h6Y7XlNp6Mbrz5e}EZ4-6Cgb6PmDncb#0tzsTAI zCSrY4GUAG9n#6Cip%Bi&2}QffJ{9wag!hL7+%F=nd_5!CuZWfmjm}LzEi*$)Pa^f6`=I+OGh+07BFcw( zE>qUgQ<)1~ag%-0HBdExm_do!y2GK74BjKn9MFW(IYdPpl}lkc*fl1hJh{;{VKs?~ zG?P`+aZc<1Vps*ow~=q8oD$E+()h5zZ?^3>d!$UJi>`Gp$J3~&E9?F6z?qDve{B4m z@-&>JP^`eCa=>s=>68c6!&Qzgm}K$L^|Y24D1q$9Hp`$8WZF{JFX`!s@ZC#;ifpQS z3XYR5R{oE7TxC%M6r6ey zLV5QRvi+fgOjeXadE18vEr37h!@`KKMF~7JcW3>TO@ZTX>`>dzdfN_paD8%tyuLH3 zY-b}OTS$R!nnl$uTS2utb%p`UtOSD(X@9fBfr*Y=acPqZjXCsRjc>$4>P{gO* z8wX!6wMJguzjJ1~?(Oq>@87AefjFwlm^DzDH$8Qc%ZmQ^j^ilPpx>jC!-1-QX`qvgprw~LA{4z&U#TKHhA+e2edBR)u zBhG)|d)PqZ+u30N2%TI$#EuMYl>dcBQr^L<-!8)5sY%T`DW}!cX@-S1En>)A#_VjC zeZ#@9!$WM2A)o<9*hPS6{Rutg+n{pCuo1ivrdak6_D;Y05te83PyEmzIIu@P+aEkv zW7XCE78>7kKldfTPrB>pY?~($R+i%f&}3ev+JwNWZn1N7jQ@W^+7GR70h!uOZ0phlA_DqaHM{( zclY_0m_r~qF?!u{*^-$$&s@|bJBaX2wMk!WUtSA6X)1dDEHG5keK8&UJR66Z%{57{ z_;&8*6CJN`3ka?isgAGoSur)<+dKD_?n@v>C^^feo_z1|^CD?kF$P#?Y7{lxEjQNg z)Uc>5$8lJzk*9om$EJcyBWxk9R+2@)HI**2{rMf(Pm@IIwFbi?ga}uWBFga66?XQ~ zIu#Vj&t{A+ZNV`tK9dRlncmX+$%e| zYO)A{pVc0gy`>+?@9~ld%&Xei{(e~aOM;fHKi*roa^_r`=rdu<_}cwOp!IcqtKKRD zLwb?x>!fo9uIK3dcAW~gky4<0Y8lN2Kr{rV_nalH3#O?rj^M|D@X13gmTJk|{|fi# zB%yIBrnhb81PHvpQQ7)vn&#NrJ%x&CLJ~Nc{r@G+Z}5a@&ft%EV{q}02OblcCg3AQ z#4Dr_e{%O<2(A5m(e`P6uF>@((xeZ6Vs+Zz`^H5RZ^)9YNW*YB=e6CxLXxjkrw82T zTd91QE20}mS_gHLwh{4+n*39g7qIk$9)mA#(Lq(srhw05HuUj9vR11k^QY#t$);o< z3O7nOc$_0}Y~!kcXTNOS>YYJ5Ourm_vgTO9P9Ttq{=Xud@$^}sB98bn>qkB;1&5wY zncj3IIChvlR_yOsLfYcBZ220T_5vQvPtX9$0c(~9B0WYD5j-ZH{J$(xG`*Ta?DSKV zm5V^Q0?RAj+02*b$dA^32G3$h0Yh4ULl?P!pTrU!Dgha~Ab<+w(zMaEfzMyyn8(pM zwak7qtGLZ9`}$$P?RZ0}S+xG;vKXQ>&~S+7ya2gKfVx_dln zxL?GI=YPl~E)%*RY`uheCSePlXL-Et+&ojW}$&-CGUI72$2@gIy6~3w#_T$Hs_J4F(%2CeS z9Sc7@m%b$#(DsV4F&U%8mXh|wzisTDtO;f6cbdzH;l}sG`;3;OfuqLnjkT_(L1rT zk?e!lfKTPK{vokF3EU0O3=@!WJ0ijNWPL1)*Ul-tRt?J1_6d>fIx>8Ae9j{h+Aa46 zzL66B+ez1wc;$^P2YEj{&2Z{9wFkFI3bmQnC#ue^-ZF(GjKs#d*X<&_g9u(ICBdKS z&A$#;#hmmgYmoq|hy(VU(HfMw8fA~YZDVedn&W3=u|ro?dOOV>2UZ7Lf4riJza_4g zZHkglLqI*sTg^K$V3(H`)8n!rFXvNFpNp5p0cw)TVf+x31=`fQzqKP7`0&@};Cj!< z4zu2)%-QUvjJUQ3;UT{OGkmLAAA*z;&=r-K$RDZqFDi{BSBpqss%yk<4>#0=FL&&C z4w)HvtpEgE_!}kRIpnjkT>klBpj^(otGs1kyo>?X-NFcAsOWUNHW=x2C|f$WBV#NF zl-iMX%X#Yxo9L6Fo}CPfzhsD(^iSY?2b*t-3*GC$oOzd$%K318^#By`yP2Ew4Q9z8 zi?*K{J!MNT#4D9()bstVFZE6k)e{_>#E(C5Wkvp_7@Uem&V))B>z8)VotKaLK~9L~f`(YXIYYhC=~E z(6H;A#PteePJ`K!HiW6WP58}B*tZF%&x>-><-a-KBv(}|u~#Y;1)jRk3gmzWag|r2 zS$hFa&8dWE8;g#@X=27!4}|A1Z=Wt1wqidT<0!{-B~jBSo7P3WC$;s&=9;?Tn0F?K zB@X_oxh(J*B~uT9Gx_0F>}#9ezI$zn>F8DtUy7Uw_PnY&q801FzBT0TOE#pKX#rkI zIPsI|kAzMK3ro1<1e8lFc?CI25IFOzQz!s`zcRwK;;6_~FLC%@sK7W^zYRiN^K_I4 z{AXYg#taf)&mL^@EldBzGa}0rBQjO|+~VzAxmBj2qUq>gZ5!X%l2qC`@-h#4rcq3* z_Uk9oxPA1W4)JRps}sk9!au@+DR=APUGXJ=FzW$;r>SW)MJI=guACsWB(H=Dhls62 zNh({vmJK@mP$=0j{1~LQg=if#qvU{7JIt7th}$PiT2m5EK(H zW%6W65gavc7V_mi1gK%?r7tIXZ%r=Ql4gD`Luj{x3yFfz@^UwL={$Wr?xlo$ z4y{D(@%E3887aWy6v_cpoPuPGa%?`}Y?e??ylFmbdVHJpPmln?Ss`#ZzCIs0tXX(- zVU)m-Fbmlg>X^Dp-e;u@FE9XfUpFxiR-dDybHpYrfk_4kO8$#-|{W`95HeE8nqd9HV5zh$@kUDoyS-^CyI z|9px$J_Sa5ug$ssWh5E4pPZb`d_Vh~7P)y}{b%;E`dMef`-AQ*o`{nVS%sjvwFESg1n0sz#BWff{B>M6DC(2RAO$z0S09u)9 z)?@M{XIGAo)^pA=gMu=D(*7IEyCKrQV$;Rk1Y-@)ZiwXe)k4AFVjL?*KbtByoQ@(` zAgghsgy$thty|^`cE2E~%8Sw1(+n!q(subQ>g$KC$3~_;(t#xc%&?j9&3uF^tyJW- zP03%=2-M^N_qpM!+AeX0>y{G+8jgZBwi>Yd)Ia5b-JvPU>E7FLMg&w?7O5tBKA$ zB}>%mlq0ArIxi<}?CIrxlCddnL(4Tv&*bly=aSzT34ig;1KB1RS(-Doa9~z$f(s@ zKI&N;-dSIsR8D~FE4HR&6soi|lM^WgFrPmIEXC(R#ytZyZZ=V|(A2Ig^b-5L6sbK3 z2%SHDCTkjf#Y1^@X)&sBp{-SV+_sX>;z_!O6wma@0geZu)Q@@f7Q(JsdodD z|FBtiS;;d*rfT`2UC;PB+Xh+`9k!5cAS`05m1&5%rwG-ecE6tE&0Gf|hmT6?mu09e zEOs>|fh6*?R*q1UMslKeZxk9RIgrD?Ypp-cjAiu_HM@nt(inU&Q>QK=$(i(Xu+${H zymi7?ZsX;pMTiuN1^L=bgi<^;7nj?DS?l#pKfl#%UbJ9E0(#M?0~Rj{7FS#BFOELl zkSv+cJ=XbY6)6^5<>#`QB6=>u7c^~{#p4=l$)^oo;=pp$yOXWfm8i(;kE7U_(Syn9 zpFKyHvW>HNgTO{)TT|?%b$y$*R7i39*_T2oB|&E0tqNmM94r&6Me4n+n}MfUE=0nb ziQgZj)EO;j;v~Mk_3`SN&Wuub4aP=GZuJDZ|l670^jVW;c1cSqb zS&F9wHq?^T_o`d@#+{UZoqpdyya3Y|?|iuEPt6+m#yt^kM3fhiMj&tLnAgp~Lk}}g z&1hOX)!{MPHA}yj$f#_yHGdDzU=U1*t3gy^bx0Nlu<`3|Gtc-zm+w>-Ch?Dg_VI7T5U*-~< z+~cTT-bZr^A2i%CBF){tArLkABYm zS#*E&{q!-RIV zk#>(@b{IjFbvQ!+pUqNLneL82IFQJK&-&s@V3{U-4&Oc3R$ps z`SN72Xq0jPEIQdz*|xF6*>K^&jay7zOfHuDvQ|Oyf!Bw6$Hm-|bc=!G!+#=T> z;UK0|PL>hla(~tw=Icp%w+@^02Uv*!1iMaa2wDMTqW(@3mF8iGJ$XaX--XREI>Qs+ zddnZaT3e_ykZwK14xPTp3@dXy4j&36N`wg&OB5tm4~zN95eurs{Zu5_db4*LE%l`U zOg$H4sd&?bh`DynAUGV`qeLXu4o@Ei4W*IIdX&mtbLHiY(ROrP(J_6Wn5SaYo)~pa zl$Wy6^g8ua4dQ6jC(425YTezXOs);Dy$LmB02U@GRg~=Dt^6>s{whhN?Y z>YlJn2(DoEn;`FS(RlVQ#4{vA0Cg*nNo*x`XO$OW`$`)h?L=o_B6JP=xdg)$$VhFH zasVp_dZA8zV&L>+O?uyRkX~_bd^y0Px{$s8yR|{1}1U=gPeRw{S<%o z#pza0X7m|*%vemurs$T4uBV+@w2j%tfm>K`C~OfYXCH%@MrL@T+zI;&7W?Mc4LLcW z3;x^Qzn3Cv-ny5X3YZ_IX6TejU?I^z(>w*CoK(ZVmNvdiK2{ff13_J}k>!+OJ;nM2 zRD}tU%`PM+>1Tx!^lNwQL0tvz%AS<;cAZ`!Cuav-vZRXJUslm8nXqYwh`s;)6fvW;Ko!cQwNKt#p7DhTp zPfWaq`&?)OCuu&}-Xy>MU+8F2i`Bqwz(K`eF_7M?i}gQ>$NvRBN&q&%c>yZe|ES2U zY5u*$bSZpdWN)`SB;-xf3`~~@P{7H z;8VJzyS6UB;-AH8e22XJ2lM$0ZhalC`WNyv5uubqyohbl9+nr94T{O1c@m^)AU?eu zaFOGD3G9X=aJ>8nTKl)t9|I<$4{0Xi!ew;c{Xgr}CC+08ffHgh=kF_nJlb7WEud{3lqsU#D{iTWKTJ z!^aESSEJT?(;hVm<`t+uIQW|G0%)pJzvNp#2GXCgxP(+yrDW^UNGFzM&LkR?(qNgX zzgMvzEw*P=CSn_(MqQ3RD#+vzn)5Li=_2iQE}>bN?JIP3t;MR%(SGef>a-RAgRx7u z;icS^XgbyBZfH2=YuI;W59znaHZNT51g{z92PzC9MY|@E*&JvgthmzK^^0SW3DMrR z?Y_s7 zc3eyW8Fh413+9DYe-4IIx~U1Y^`}IP{_x{MKz`jMBjCP7J7%kkv=tqd>29_g$X(yk zHsO<|!=2Hf?&cS4aatdo(~j87BWhmjM~atQj*csP&zU1_?1d+7qCO;=ALR!!g?XZd zNaAEG}Of#A&*P75gnCQM}DJEK&mv?4|L9=U~rCQ402e zWbY3tdn8Lm`+7U78fJEDBfJ?V4{)|d?+z%(h`Lzbqak*>4z90*-CctW&gnf#Zn+14 zI(A;p97;tN*YEiQb4g22YIBP5%y->DsTxmEe2V`$+L0zrZ(0I0p>o7LILP)DM=P`s zvS{@!EZz4L%y({yi5n(e63Sb@T=R^VB!?vSu`#QQhNep7$|7SE7vh3eJ)u z8NFnoefxH9&(|94PP>-3hLN;7$nc5J(`nyEN|FxVwj7fuJF{HEzK*KyYc?-GfWQU1aYg zd!O^F?tA}U6%<7;SX0NG->`2WgsQsGh3UH{w#7C~Blo{0lqYTz)U!z}RcXMWdeFe~ z(dKD60!KvWhH%%TOlZRT$op99y(MZ3uMi;yju!R8X$Ef~e(1oYBa~aD0a6$L`*3hK9eNj2J~sZw$-lx5B7-Q0 ztYaiz0V9d{eAQk(E$3%E{}Vzz<=7S`b$vZ~;zlpY(wh%MEXgkvOB`E2#6zyjeuqQL z{ee@aAcR|#E0z*O93Gvx2x^kBeF;~W>at3GTuqQ|Q$zbBYvTtH5Anrbw`#sH1+X+O z+(d`@apbJt)PNrR|2Qe|`;`FY<(~2%{`~Z5jTnjopdr>kJcZAx)r`pi_@@TgBL znKe3$wW7-Ds*NAn;;7v_E4hMY5fGP)HFBpJrYlXdd>l7)X{bSkW`f1l%1ar0n%R8m zUI*GIZD*{bw6vm^gU9HIPiydcK`bpE@OX`TT0#YB0dXq`@66?vWe6Qu<@P;aF`K)F zXv;l&A$K~}uc9UwoMtDJFe{a`0TiD*>#L`o>|R^N8Gn?#%q+0_**yVjKr#m*$gR+? zi_F!JaO*P4nN@qq8=+yYm1mC&1vdd%GYZ_*uW^tGc2zU%zv}DuQK5^{%}nQud8>Q5 z;8xxyy`yuj71sgs9zE|CTGSX)71_(FbGWMkxBI;`S9Z3M@U|oWPmb*J^7r}OQy20@ zI}p|^fd;38+h00UiYdi?3_vWYMM``Y^c7t9Qa7Xev1#@93%An4Iv4A!k@LQvn=xd7 zFG*ilz|Ys&&+GVdl?L{Dp``_zQ^gB%avo_YkvB zGIafM^)rL7tx?k(3@%g}m{`Zx#{K6swFJ>!i|?pH-RYY(+qFO9%IVI*@Nm5UhR&+X z6u}tqLfPU2BUwxOAm8U&Y2<`?*WP9gB%WRkC2y18xoOfoWZzL4Sr zB@*zEvd@-k@WscgUiqzGxjAJYxHQ|60ay(k-GgM#m+9`*%kX@i)G{flU^f4`=Jvjj z+f-ChOa4f!^g391uGN>)-BQ54=IBLf*cZAn^|bVAH-4{QujF-pvAf@}htvU0C_Ygo&!PXL8pv(Bt2=f_bjMI z7`^xiPuM`9W$1-wgwu)QW@cF#wMbIJ=mAtE2Bz&*7mbttEJ`Zf^xnad=hvZD^u4go zP@p)Txh_CDGQmMNiX~GoYjX&_{}%m;e%uFR69{0*t7(-H;vkmaGOMtu+QiX_k&)9# zLkyyC*2~9%5MITD^22+nY-TpgTx5}W3Gvw7Qsw=y_!$)!NnjIR;k17^Mto z#Kj_{mhVa#t>IjsB8HM%uFPnys)3+CzOPt9Kzz9)$+A!KBHpRVcQJ|F@8uE1gG=Tb zmf?Oc+v~&Q)^H^x_>gna;w*G*n`6iY=7dBdaa?{MLE{wgI87Hm>N@sxe=R4g*X6On zZiL9%CqR#vH8u7)!lt57hT;Nn$-@gu>)l(4=8y3z+@`F4SsSH^9N@iU;DE^c$8KBv zVs^^+k1)J2Rl9MRQuS)vCm6W--M!SFMlpXg8S-HG>$aUpq~+AI9dat>=e-(m`;I;n z@X@%D3xSVBP9Ne{?~i>>eotEloL(3`c84SgKNfJD25kIbz@qg3HJ4B7 zg&1rC2m4PB)@*HEU427=YDgWViM;&o)0vzthrFy)xPK~j)C_zPhve&&=6GJstt*|Ow(d^9WPpQocTW9eq@J_3PK8(d$$OkvgF}pc8d4R*pU}&V z{I#coi0B$$amz?Cz1sjvBNj~8Hn6?oz6o{JCdC?|iyf6G zAthY+uhdrijbxqv&n2biPy-sXvhu5VW(1uGUAg5_%b(Jz`^kEIW_s_ZQEWL>T4NzC z?T}v0La+4=Zm=o$J1{(}rvq!H9V=^<8heEUP!D6Fq<{d8PB0JMa zU#Pmy+0=T9N=7gq;)_RUQu4}uhbU1g&eO%g1mwSN_LJG3Ql#DCcnR)0=}iP+Wjx!9 zN*W+kln8C^o6=yzl2x*6_%?H1FeRJdIKq)F2sXvf0Cxxbn)&;k^oC~|^?K!7d>IK% zS^t@(EvCYHc!6%qK&V57RUo;wiB2v($U1$$fmf8_UaK$+1X(3=Rla29s6rHIO;Nvz zB#&dUV+DW9K)z;^|Dn>xRWq#{`|d4c$uH*5$dY_FQY6f5sMXaCXo)Yo=|yLN87v!? zC$;^pN|cAh$7^MEaJ-Xm+UQl>LS0h7S+F*xj6{@c|OPAB*lENGa zF?3bbXgc#RjZY3u8%lP6L6`I`gl8bX^GD97nfjp)-f~Hlr}6Uvb(8Myp;9iUR>lI6|K_c6IIOi+eW%rf2%XkmR*&HiFO|;lNaY(h? zOZ7oc6w2qkWulVY^EU6}!;Kwt{Tjm;Fokj2Ou9|8KIq?cN|p*_3?APUT53RHn1}zsWjZ z{z@Q;fC_XB>HSD?bc%E~53lc8M3c3nB?Vy^<9VYd2`z?1gGjfPe2JxWBv+#-T2EK! ztd3wegnDfXONd%psZ$mC=(Ev5#N-+!M)srOv54y#P6u4OB z4R|tSIf@q&n~yPQ3q*19-ju4IEZ$_8boT(vWbHO=UNcQCr$pOBjAL~?_xpwS4pZ_8 zM-R;*%QySKsj!b9#sHw);peh?5#Y1h(cJ1&ocZn*-lo$LwA!QNl+XVmJK^^UgXq=% zbAD!rvVZ^n#6bJ^rzrRYG3T`(AwXchsQ2F9QeyKR?ZD2CA}je9F;S1l-t(}&JACwu z0S=n}Zv2?HqAH>I=<;u~#Bd4CV*5Hs<#odFr#D`Iy&m;6UGMGQ=-$99sDaC5pl)Mj zSEDSd3ZvVOc~{50mz!I?>u4`MRV?R~XOEBBps`Lan&_yfuj`DcJY1ts?NIQ3K!p@L zfGix*(g9bIHI?3Tf!rj|;ybA+D@j)vU8x++$1)*I=X`Y(RRSOY6$uDHRi*WKwSB*O5l?ZT{QQ&-&Asw=Ui_162uWw;e(|icKQUPCm zb|0aDHKk&E+vsqwx5%Ca*XWebe82zfhN_=}Fp^ttrpBpy`Uc&q6KJBtt5;BF83||(nMZOC5X&{g?K17Ay_}K=&)0Fi zbatxfq{&=6W7?)E8<1nKWCgyeKM#h<(;X}PFd5FPYpUxNg|}^K&5V-qazu!dYi_Ag zRoxyQo@rInIxm|^MRSQWz%#Kdo_WasPCrXM=#LLp(5rI}h+ z@0$HeATn7zvW=igZ}>h%(puM5?Va!VxAGLb&>BQt)5Mn-Cesw-zmdhR-|M7VeaJ?^9{JSw<~R?CvL5r`l%*|?)h*VxQV7-}XR zP?YJ$pVTikb!0;`JV8&4Qra4FQR&QU{pg;SpfZ>BPk+oy1L=RdO1{T>V_v07^=s6# zs=Jye=#n)|tF;C@I2&m4Cd+8e=>FdXq|W{R!;ty!?jr1e~_5@v(S>* z*Z&RgUV73v=J|IoEwFOq@vJ@gG`XgYQ4{5Dus2UjkwX%HV`o9iyy_SnHcTN4J(0?K z6XXOS+~AcQs|25v+(s@=Qq}%8h2|JCFWs`YB%~kz8ANN}3@T^Qnf7ikb#{^|ZUmpd zLvBV<;6ajk|KWWKA+)dLzsErTr>DAq?M=7$=0e=-tpTCv-ALFSBZ6cdJRvKZ9nXcj>Mu2rB#kI%6Ljuxm#Pp!zy8d)hJW(kf{(G zWFmEs+_#%6V#6J5j~$3eesb9iz=2=}0DK%jny3116RPqvK|S(evRYW=2BJ;~CU>0^GYnX46#O;6w${xf@3+?Jbe7_c zS-bN<(uRVbZreYkVusXJzA{q@%NukGp9Wo&W7zhY)H~e{J_-+WH#%)G4(xQ3vw&kaW8f{F<25Lpvn$5fyDiMA z)>d&75Xf%UbF{VnvZ^wUnJP7VWR%B(&|fmn z!wk#IKhwM^$KEDHzRpUCwY7g^rqIq-S;~W`V3T@r z$5-mrX^SwybHhPeq21mpWpni>a1@~26d7+jjmVI+3S~VY`MCx??896#sk1Q!5cE1L zZ~4+jhpLdbrc6>D(fk<2aNAw80Zl_khH)4NqYOK^VnG){em3G3B^<2_rE4~?9=YOI zwyefH6EvFJ#-6~9b0PmZ^GRI`{$Gjhq?VOhP;J!RJCpx2?XWK#{V&nvr4^@jy1VpmrefwpM{FstCouu1O=DEPYTrr>)hP68TEMqE@;MvJ;bYuh z+yItnZ{SkHOs#}U3W-QT1!J3$s{Q^yc<{{RrcY|0_S&&%)X-DnKrBFh=3@M3AAYyS zFa^Kgy5e&#(3zzw&PxhPUJG zIbOMDU;f-Eojzbwt=^o9Hk}%El>Nuiy)~F<6fm~jasGu0uzmRN0`XP*f7zt{PtbFo zHbSt4Z_h#!d{ISzLDQ&~pKd`3Vt3F@C11eZ7I60i9*8!$?F|Zf=y>eKSEBU&wf53; zZQR6cC?q05*lP_(+V3$6zAvxzth1{pnRqxxjg}Vco*Zz|iL>Rr!Wx}6O+!Yb3izan zj7>@NPK#2|cMBD6!|9Aua+s6m-4=XAyw$g93DZUbvq$d(nJ5MuvOIfJClMxhtOy!% zVc)ZH+#!G)FpRegIhBB=Dv?6KZOclf>@~V%6l*#YodR_>cg7S>L{GgycOGq))cCQ> z?O-)y0(n;1^(0}QIdL2|!2dlVp*l$+?DE2AAD2>qS8K>7FB&gkdZ84hjUH;dwei14 zMQ_T?|4g27&>;LduxJ=Q;9q?;Bn3Qt~U=qfhu$L38-&LDR#Y=mf(N4_6SlU zUwqmkfBY4+nIOV-15LU}$fNxHG>H$yh9J-#I1kCTmkT0OtpsdM45-A!KBZAIbo5-+h|-5WVP z2gP>uvkzA1JDu!JcpVkrl8dh}%B_QtSSgZR zB9v0-h@riFQQyTzA~h`z!xDsg4j262G6n?JWaiBI-xhw0V*X|_mh@?RCOF!ae@|-P zvpe#?sP&o6+qAey0f}5NsGE6L62g-6A4J1KA1w4sJvC^cup zqpo2qg$bJvt3g*&Rw|`OW^=ffoQSLZMl~E>vUO^q7gx88f>~ebjqco%~^RImUe`_8T1HrFaFNqy0hAeC}=&k-gx5jnzG(mjnh*;`EYa`*#S$eN* zY8SGWn^50xT^5`lUiqG>?IKDjGu5QrgDDKKvj77%bGJi`D|u@vYz>tO#Ol1=th`35im~xF1&yH0VU*q zrjz<#o;1*($OdI;UtCN-%x&D)UfJCDA*yK9aH5y&P`il{m_ZH(thA+unq3+tRq_iYjw zRYJwOK?FuNXM25~X03Y*T5fqPN4Wej1MuY8Qtr^$)n-nn&ZA5wHKdVccVh{C60IKu zu2(Gu`nm^%e84n07`r8m0X>g>?s;$Q*H(Y}|LkV3gG}11^bA+-;}-%9<2#w1$(i_^ z1E3*fH>TW}*Gjp=MD|1m$oKU;Yow)$;vxsPw^yH^$%&uM!WFAPOnZLR-p9-Vu77%Y}I zYXJ`}=y`3p^3Q(F8^{Aq{L3GbQHpXMQsw~p(nWd`?A|6990@S?E?|D##KGAKdFhkqUH z5#}vt>Hiq*ez~a@#=q^~YQD9e;*)b7n#9js&-?VVis#)?WkGGU0oUNa_Oy2;5Ig_> z7ag7HnaG#zxUR2qAJPc_+virChnv&YrKO`}kszY>v#^Kjc*wTZojT@3yQ`NpfP~|xhV<^4vzc^z+0(ScNuTr3enjriu61$Zi zHe&Q@VMA#3ZZroYu)3`Bwyfj6%+Ys~%wQQM;My`^R>R2A_t@6R6|?GRoil?tLC*qY*Ds%DY|nT0KNlSL_-%N#?ve5GyQLF?Hbp!?-AXMZ$vpy{d{KsM01|B zB?A=9o{HH5Me-XqKv=ME!~3KDOf|cVMaK>b5)-@b_f9CsEyu+3^!*q(;QfD0{W5#| zuav6qdv7^RiGDji9e21Fp86A!po49Mroh#-|0d^6rJw6Vr_^XaD{(izxXl;4&#$k4 zlhZ=&`}@%7X|}O_W=6y6R8shA+UWO;k-Kvha`w~XZfzh;-fIJeCRX5_TSi)ig+a-( z)-rke^Bd#Ote&Gg&9U0Ho2{FR&CR6wvR){Z!rBHI@t%`f2;~KY7yD1 z#aCdhQR^ma@1pRR;JI15S_NJ3>3@s^DzJJM&gVAN*Qsb zbpNuqz7G&m0fg+E@4N2arbuV=WB%8G;A}PBb|M4ijqqBLdt6Bu&*OlN)D?m()E3+t zoZx?%4|Vom3qlsOrE$&=rVYNJyaiskkPgP?Z&^K$_i$o$mG&s?)qp9IBTSb!D>A}A zQ;B!w{|&b_ngJCtj1hPP!g52wJ|q3&ZaA!0g;L6{GO* z4q?&=JqSMG@%@T-JKDFJhy3Ru;OW$IG&Ap@>gm2pNDW>OG5lv0Nw(JxiRRdg8n z{l#ugq-Gy{#hVo$4qB=Qfw+WneQ6={hD6jN+d#0E*HQHVbWsKN;m29mysX&$MDbS> zONAp!JG%AWk{M(@_3D&)mX_$=k&t6Dr5u4VZ0vQy6ATaljoEsA1rpo~QBjl-*jjJ) z83s7;O}5B~7yXBJf{!L6V&^clvYkw`8vP&PM0=gDk&Y&*@fBNf?Y6;hi8KCf=|xpD}xglPblr#8V74OXWQObt?+V!EzbmST7L27=(SiBb-QX?0^i~cEc&U1>qZ>i@35XkAJlCWa zo&rF+`W#Gk*)1d%8{~@z>gbDK@F(9U4KhFS_upRA&Of~U@TEx( zIwWws))msG5U~B(Eqn>|yitcxpB8eA!^q;@Enr|^-G@R5JdnmF?&VEEg7cje)*ED9QD?ouEVg{@Yq~;fj_m3{kmdzF96+)3; z9NW{Cx_o_4R#aNxZWWvnjwDYRQ*Y$D_vtviP|NBJg8~;c^xtqAjf;pbYMfQ%Hlu~E zNG;3{RJ1-_(f12n-+^Df0j!4Ux@M!+f?)1-w;o`^k9IR1T8|r8-oJ63HQpTE3F<8_ zGy~Q_=$~`lT`AA+rMAL^*#PymTwj%p_e1Jxd!sS;M~y}3jQ5vJx>L)7l?Q>SgvhwB z7ik*2SbhIW%~g*H*_qms!_x<$2k4N@cha0WmHHOCOjoWj9JFd)WN`Y_LWteTK9q-$B zmbEV!jVC*EU&I}^V3SBWeAm$%`O$NdPE&P^Ku6l$`$%KFQ97dnUhGZ3uNQ@W|1t?B z8EJE*`+La#c)pgG0TsiI&T~L$rHdg{(YkZur)TAGPI=7@P%r^$;)J<}=bMka@95I~ zIs|jeHO@Aq!mhXMJj#2L#3i9?yUhZd)|=QthmVfWGs~arKj+G{J@c~PkR~i3)ub7D z^xX)Y+YpL2yREDKkII_k@Y>ii=PpwA>B~)`wT{gml%pS*d?8LON*y+9|1x310yo!G z@k>l|{9pE5L-f%=Ls_ET+M6%zwyl;W&Txr=dY46K&zGjpx-GeH+kU*z$v6ot0Z2;( zOY2XT&j=BqB3PjQMKMY1dJ^Y$vyP5EPz|NP(b_+iG@9y7h@fnB=4{)!6ui zS|l$sE{c#ntr)F@bA-#hv^V-Nah;H@jS%a93Tx6V)wWd?yMSPs0n`69NSom1p4Ks4 zJ&4kx5?)R8y)W6|Eu`l`XBs{);u?Pr^mA^YHs?k(!v(TNjumRZNMq}0f?&Q3cdWuB zj8t9g=<~6m%0_`|QG2}ib0C40YaNelpB0=te9u z;$tu2NE|ymH|=d~x4u)Oq$9Fby|`g;>P@uGDVpCsN-h=GY{h3$ZifCPa7Fcoo-Dub zT?&5GAo1oRC^M@f)HTm;5vvu(2)NFBU?HYGTZeS(%05o-+H|O=h_1ogddaDqU>_t4 z0+#WUbyz}JHz3{I57p-=*}^zW6!!QY2h#S4Ixx#_?4xXDXOfWQoq$d-cWpGK}1 zgJMnu!X|-J?R#;V_g;(3q?I40r6E-TUrU<}CDbLfnzcvs7DIL=TgvIg{!$)kVkNlQ zLp5Zbp4b#9-%d5OLT}{=lDmvC31xHeRwhe%W0w|u5^g&~)_*Bt5@Vcs9RD+Lzfa%jNvMY$-%z?NiyrmxU3^+HQLODTF%ocY616^?gMK z0XU$;tHnix^_{o1y*8DI$tL8jci}y`9E;cDi%@WQbfxQ@B3Q0gIv&y( zNE5t=|64|H2IhJN9Q9ib@c+9tmCKv7Qe5q`bzf3rH6b(1^f;+XK|j_^aad}tB0Z81 zM2stTz}>zlbi0o?^-6n{xuN#>q8A>gL&Fgb#r?RWEa(qWLoMI0{maM0Z3l4QAzBuTumrg?XJDN?{gLMKh2PkLq&<%kHfGY-5c zy;KM)F(RfJfl(c7a7lQQLGm)i6ov?|rB>RNq7%r#ax+e}+`*9OeKLrF$Pm*_?w?mo zo`3fAnxj5gADgqex2|Uj6-a$0=zk|9uu55Y#N4Ut@y-{zT?avb8FD)~w~#0zz95p` zgN!Z&@!`%cKK~HPPkfcZ>LOeezzkr~o z9;|?atrwEtU>k|397BN|%x}~UrX*<5AZrJsTOvf+sLed%=Q}7}QmQ$+yM{>Fq(;7$@XM()uye#9BA-j@6*NR0b)K8X}ZtVziDE z$+j{Y+}?74yF>#`r!YyUw|SWEp%gM-%Hs(=1Zi8Cjeub>gO%*OXZRTpKCG~JHp2(2>Ds0w1cptRLInqqj^mb6dWl7k zb?xa;z=61oKAdo@Z9lmvs@<|y$c-?1B)pFTq1!gMTz;7Os98)xe#1pm!^`*$!O*0* z_j3qlTQDhIvL2mn6tJ`fxG>C4V$KXv8l>zG<`f+ca$27zq3p)Wz``yc~qFWL3vZt26);Nh5Fe z_6GgQQpNq<@_L+{M1Ikom71E`qzALvl{9QJNZBE*^5j{NaX3{;$=AXScELn=_il1w zhdtD&c(uk`23IJR6%X+BO+irYK;2ftYUv(7>dqSF?V}fUvU(cp{QJ`cxom3j^y)#! z256gWHjVtj^=qFbKIda{wS4OI3Yz8DhrYCvoZr`5nQ4q*%2{J4^8bYR7o5@? z+ELR~L@BMsZj>)lUji@MAIHK>eSiA%kp4o0ADxPJ%&sBooOAGfzNyRz;s@_iv9`PI z4Y}7iv6FWAwgyB`(VXaCqGQ-wrwM}b_sX|3wGA880d4R@g$IJ6Y%lJp*Z0@(b0R|f12X;Tw);{5SJJ}>AX1rL9QU<)iTL7GEo}(b-8r68;C~rRiZ;4 zf*>Nnu~RLuths73#Lwc)MIz&d*1+9B`IyTuT!UbMUu#d6fFk6_V}XS4fHKaIo zp?SfJi+70swe%unPo@Wa<#h4d%Z{6Mw9exb*B_^=g%povz)G=GTHUK0CSv18u|N-9 ztUNAIlgZU^q;mb;vu7sJ+KrVERTuNYh*TrUA-D0(F->^sf?`gX{oHJ#lEkjodf=iv z3@Hg)kF5}C<#$GjFA!cw4+72-wxo&*^v}AjsN#++#3Z01Z1IFxk~(L7=x17qkBilq z*l3(bR;s5xx5Yg(i$hRvD<8MKg}~0wtZ!=abdlA^nSQd*>1_r6iCx+aqzPX>TsZIj zO5)pOil&D_GenIPL7B?5=!YVB@W$CsTu6wo4V}1?J9BUxCHxCEL7l819CJT^R=>@M zReaOVq;YnO53lZzyR6!-sKB}#Sl~}k*YK|8;EhiM9OIK%AeOQqF_*;$;D)Z&Y%4&~ z|8>%RYkVJ1>Tpc=W4pkk;jJZUy**n?{W+{NC--MXDmHn?qDjn4&8o)1d$%FR*V97d zD2t>6;9X@vbP?s2EZTV;6Xaxs$ay2*!c0$o+YM}^fXILAb5(TY z1aGAtC{)<9nATnkVk)C+M}RFM=;P0`Q;s=GtPYC_B3d@Z;UsS$w#|go%BM&m z%Z*K`=3P>vPz{(n2|LQ*N*^lOWTBDO?X8Qpdr1<8ncT0X) zr-1WYrquydE6P#gSUAAfkdD}VxAP^!!!e2G(m1rKF?;gr)g?{c8d73){e1oVb4^&V6SbPlJBb4lRF}#t)x<_r62w+lMe(S3Su7(C#k2S;7;~!nO z_C>|HYW)SwKI3BaG~TtgU62wNEw|z}H3{Pw2?XZ7WLyY_mOt7;0e*bma#kq(UUIaF zQIC}=KZiQ!Z#SDV`4d#P=-n4}5ybXg$y0ED+!hw^Nr5|-=g&IS+tOV^>S1}~99>&V zc+rGET)wg&r|!T$G0!}POp%Wh?8k0vmnJ+E4oS26>ivVly_`&lQfB-Fbx<1+*I5Kl z76PABClKngcNyOjVXhi;?CeP$D{HFuN*+A1A^&HT!?ABieBm#>W0)H7yjX@E5|Tz; z0vDW+k_g9>ye`eP$A$b2cCF%t$qms9IT3q88Zp^|?{%Hz>{l*>kCgwFztczUU!nO+GW^9B^v2oR32)S8S-cdLc z9dfybN)s3s&cpETQG2z#>#qf#{Ik=7H{8Ct+=66lsBPU z;jHM;(NmSoqsMvR2xWj5<3qxD_ri69i>faJ-o>Q-=i0oN*XtEU*NV-=piP7$k3)Hi z($72;vB3THxvuPXI(NAdzNbfG_{>YfQ3=VnaJ!a;Fk|XXJxpVzx7&w$!dyLo9+Es< z*68%&X?B3n38Rf)3I|pxp8kFt1a{;E_O1+ZyjS@b{I2FH7IF;?Vy{UxJR;3`2hj3cWh9exGNs z`WfC_j*{2wqmnzdx`}U|IUQp12jaR7ZL!6-8IS-06U%#{?g5cgf4&td9`*EE>T>g+`1RXW?VG2 zO#hRJR=Hsvio8Kw68(7)G`7`NIRK7E1hC@V5-**#3wtV&7Yh+qYraQjg#0noG^JOQ z=7yfYD$Va+2TK`U(A=d1#>Z1}!KUpcm(I*ORx>8?_eN#X2+L1kTwP;?q0z4%-{FtB z(2>TLbb6rp+8?lYwKY6az(mJviJR6O8mx*(7;Pn23#E!;dK)kcx1EXu?EXFku4f}$ zNaLn465@`~pz3}mr#Gg*yT)nA7ojGO6#l-8I&OI$FNRw=*IzyI_+9+u!+!GQ5huWE zx)OCeMfuFJN15}Jm!AQG!nf=;byj@`D3ixh!~1*REn(U*rY&s2%ZCcNe24)d{U7k? z7RzohNSbi_MheAf(d7mgai`tA!jS%EHRh&8QhZ2KTv|IL0?{U>$?b1j1xYFx%-MH!kYUA?Psrw

    yvi3--)XgXFh7KRrg`KkLd~ho!ixSDH~~SQzCNAf?1O z>rba4+L~D@L`Mj}kkf9-c30*rOOeDyPy}IuZWv)Vinfa;KZ|UHNyeT?2kKLnzc`P^ z^MAD|GJ6N-Jp*0X4?ADCf$bMi`sS&`y$RJDZk50F9>&Qk0Z4e;f(Yk!%pXVjSFeRT zw^etp-csN&l^OyN5;o_a+3(b7=hf!LdRi{d*8bWJ&KI2Q1LK;qa)OGF+)FKt^87;2 zR^XuBS@Yx?<^UntW3~ohw(X{8;~*x0^#`;yV1#uPxeB*gN*b6!v9_bPEPkp@^b1z? z8S{Ml{ulyi!wwj+U3&`j`z!$X?(}Z7p-xsWc|in;IAIqAqqFg6H1uhuSih3;qdf-S zY-|FLIB|z?azuL8Q=(sr&z9oU301Q`QnKIR!}(N17QkK7Phm-!3)z9z2)K#t@ii?u z4%clE4~W)lqUf>G!WStB(;-zQTPeVDAKS;TG5xDkd*a3-WFb+8HCG=?t7jT2{T?;BSl{Qz19Wt?-qRiS*e4g%9ql~=-@pt{($jRhWb^>Pw; zX+dwrbjz|_a3;5ckE^!?X^w*M2dfE18`8Kcc1N;%a6NK$PtQvOlHm#ex5F2{lrv|k zm)?%HuPvVv!t%uRY%ZunC-!Ws%e0A%^V3QqBC%AY!aEk%L;7CW!VNUZ3Rzt&S~YZ?zAz_wwR zOa{>4GeI?TCdI<7=2@Q2xI5^xTaU)<;}Oip|JVa+4(Qlz6etP=?<(DUS!-z8YN$j_ z-MsjR<7-BNrPk8;r6pId2&%5dbE<8+ZLoB{USLR;5_AOW=eU5ytA`O1F&J_Y%>_XB za+XD0s%N%&+td<*Ql@Ex()|~JxTcG{OIXKu^Cced-v+6nZb~|sN7_cjUWo-uZ(VW& zfkTgNK$9_2_ZvypJU7Oe%3#qOmSZopVMueTjT|M5RXaJvTYP9kjT#17=J+2J zUuq-pkw|0Dp5FfXRvhIj1Pmw);6)fvj3-mXS-3&r0ibF1Z3JAD^tG^qSnjcHwL02$# zI~tj1vpcKC>;8U4L7hP6V@?-cw{N1bl49+m=!}^Pd!BS8HlKVPT!cAvOZg~wfrIBftIKnza&c0=9Hf_|r1BH9J+ z3+jv`+$FuvDi~nkfjkj?ee#Qkm8NP%ca2fPwoa&oh|nPOjy|tB8i=?h_(HJ*WW#c( zkpYry#2aMVUe9q6|EA}5-{K;>Dy{t?P)2*=zd-`V8IR_z!^GBv^F{C!Q*{wSsEc0YoU#3~ zf?Q%7Tpg***pP*jdh~iIO#&6oHYlmAE~fqN>uqX(>J1G>)f))gHvi zO7Xd~(KJ{;)GX)+)fiACkxVYZ-=Qw6bsN-A@F>W=aC8v71dnh_IRXv*mAoh&$z;K) zVyW%0?Q6nDPsaq12YF%9c{Xb!RAz>Q_t5sIy<75MVF_7Ah0%1bxLK zV+N7SH4JisN^>Ps8`|9Omd}V9K#0Z(wG)C6)yuB@@4X{I7$+Mg02O(8ymqwh#GQ`U zGJAI()fp!e*RkrH*%y{SfKF~Mz@VyT+-_pB)?#bzBiv5(=$YITK1YC;S$M_;so?#n z+C6o&PLTqw_!yDdFO^(G!R3iSdxbu!;@ z-ES??G?0+Nok|}*#ml)*;M+t+78&k3G;E|AUu`^puNbQJ4BmJKL2RTpQ9qm9GAAf9 z!`XWmmblnR+f~^~?OYq{nxnDf;(iJuN1n?l6@rJ-8(WJ5;A8^27?48x5UiaPcN(4X z|FH7uzdAvoHPz~%o2*B)u6a$hwr`K7fTjY*U1BKAX1kVqf}5Ud-wc}nhV2KJujk8ZE<A(%i<&^E3G9Z8+J_9|4C%bABdvfsC8|iy6hk8q{z0*}!2}HhcT3uMz zV9CTaZVbiE(XWya20z>K&Z`L!kD9w3R;~ z!YEj_+HZkLW@kk682$SnAFq0H$F1%G!nm3Z-KtF$H>Ir#1CJ}qv&mHLJ2E7sz+qAQ z#zep%rR*pF9-iLOtc{9#^Jru5``GcVJo|6oHmREQzTT+#Sq02)4j{sm5%<~kQ=V(- z90%`APFYXgQ!QQ214@(V*CkDXU-2l#XNzPVbpnkYru!9Jo4NG3Z-Y&*5RHMb{|I8b zu|ml(UKMUuJPT1AQR3jv#&$V-;(?YFumup@khy1H$P8R;Wx z@d0k~G2LpvNW$xC#H+U`iCE@k z6&Dtv46R`6U>uj1C*`TOa=Jc@zi-sfFOzrlE`qyF)oM+T#kv4fX>Hp1u()W^fN$qh zS5gVMLDKfj%<}iH4_q^`f0Pa zW~^j$i8-jbngBG%8&?3h!+t}WB8DF;DaYwdn@{;*(*TM&8yO|EneR6*lWErn&r(fK zTv+wV(%f6Ui&?cZQBm{*L9Bu=Ma8-=aJbjJ_%l?$;F8jpYO#uCLURSWl7Ll#FG9>* zny!Wg0b7BxqseB?!8Mf0+d>RElvv7Z>p2OJW?pw^A&?e;80!z}a|=r-90 z>2C|@8A7s1-Jf_bbK{UYfBywD|2L<{fu31TaYy3HERuyXY>5tZSX;w=oD;JU5%$3R4}kFq9b@2(Fd1%qV8 zjCAUlkzrh@x4C(tSpS;@rSJX=k(NYED~4X3GV--p%!g;6Rftxf#eXE7-i6!tQHZ7T zn@*i4`->;bNaTW&NR4Ly6F?Y>0_NXA#ler|7ccK_lk8{vldHbnBc!Pj6lP@K9~L`w zQ!Ib$QGh1C)SwQ#38L5SRxj#W@ap!~i@+f;D^TMe>Xo93%kq^MHt$o$GX}W;@!C|5 z3Qg)3OD+*yGv;TJ8?3earFcY_z|)2cq& zAI(Pee4nDp_4H{6jP({6fms^mZUV?!hM0iV#tb5weQ;W$9BnTt0oRq9#E`&SBPaX& z(jqI&*6U3MA3u&qvCl9bNV{A=BT4P{ouZk+9A<7X+N|2~Yv8~Pg4PmpkN_Uk_MnXZ zo=iqRoPUfE9YyT4SNmU?`_8s{(G^dMIK)ybTvyM|;PL+Q%>0hK3%>{pGeWf+tnE!4 zZjR}(awbA}PsHqF)l3UAR5_cCPcuSWsD$_(MuU+Ahw{B_FPy$A8T7BB>O|=J@wp?o zWk-H9`VX~1qZv4b@3?W>OLoXl&q$?Ycm;)QKz;e|ZpV`otIi)F5ItQ0GDGO%@FBR% zoxdy}9GF*4svI`>Lss$CE_ot9+3vUU3hi`_>ZKK7GO9sMBh-FXj}7r4LeHH)4-{f( zC$B)`F{44SZ*$&>-^;u5Nf&s)?sYh}458IW(TjjkNf9SC$DmKQr^L#;2Rx<`Cts|N zL_a+ec(ef=5W`_R{SEpzV98Rr`g_>z$4$k{RmVHePnct%IPj%PGgoawNq*?Mqn<@q z+U#h4vOOmAU`d&CI{tAJ{(Ez;iObM&qbLP^8ly_^1t+cSaTtYK-ELwAK)R|jy;-7mk7NHMSoyOg!k`X|cPR;*4?xWK$)J<6Ec zL70_YA1=(ZXj1w-^(d}c=_J4{`Ug2eJ$zGv%GyH-Id&qZNw*zVlU(RBVRL9>&qK|= zJZcnI+zz%wU)wziO&DzLeOK(wbX_LSaA$&Z?KbZZXZkP5oPB<@@LOFi#qo2+^^5`2 zxoQzhU(9*>!90AJ`m#kY zA{@j{I3(O*a`f{u20@NwYE+PZNub0=bqUamZB|c8+`w(>e49t%Zon$aHC|eC$a|5Y z1BYRz>z)|7dFjZb$=9V64i?Czata7;TQw@RMfIlMgAc%B#tcwk^gHGbOCvMpu*zi@ z(-mfu%eGpj1C;5=3udRPwAkC|XU;U0%R#SyOxD|F>{2{mjhV`afd#o@OO+NsR+xg( zd?jPn3(_Tl85_*1ssV5M*PM`-(r5zf=q^tx=M>#t5Tic+;_OxoZsqRB)ZB0W{i?_y~la z3P`UxESe^HR8m)oOJS1f!25edUoCJ^$0UvwrszAS*b;EenGG zYOc+;iup{IfqhD#Kxkcl=d9k1A_Oqebnd5GKSoS5&RKMJfS_y{%m?9j#wS#gpU#!2 z@}-MLATFV11(V$u^*%y&S5zQ?6UQF8He(0Qg3Qg((1&$i{Z_D2-exZ!M+B8>v?}qf z9oM{4w3?^i9nm2p&0nllcnYEeR29=%N*b{Vb%?emZ8bhaZ}$Jo(%Nd9pPS-6g;>56 z^B+I1-#ZBoCVi{o!>~bn2NWZQIlTbH1GIBqXh2J{SfV;5K&w2Sa4^~LwqgHWj@{~I zYncqB=i3f4;G)X``4=(|XK@~YOr!D}>LjpN?3?;^5Rb^|vO((U8OkVYf3@$>Ks+Df zAc&BI^72%@e@Zp=6~pvV0xCvEuZqGUqR`dJ)jSdB)swJ z;a}^oq6CYI`fei<=jE@XD3VHELmA~!5fQww$LiAvVXR13Kk!sIgqN>>yp%A{2_1qW z)n*IdZJD63KW+{$U<%%ho(y+0@qn&@O9`lT<~jT>Kc5jyMYciDEWO~^{8cdJu-KaE=0p0n4HrX?EzCUP5i#j#C8c^c&0}djzr>Tj z7ytH&7wCXN#=EM{18IyK5BZ%S3EvG0jY(p~HYXm%8alb%lP(amM!%GgVvzRTn2rrp zqAX7qPni?c!Kh{8zBI_SmM5P%w-tQs5E~gN$zp;V1{plYrnH2UfXk)n((_sE7LDU3 zBE#eJI?K>qZ&nWtscSvraiuQdoSYvxaUi8}9@UJNhqQu7c+-i~vxx3(3^G9keJ2^j zr=qhLjS{Hrx-ij2;`tn!y*8Nj9&smMBDWbLgO1s}$!kr%z@~BD5ABALr#R=!Hhxm!s| zFOT5=ai&w8Y%g-ZLWF{A3YvX90iOuA_MM@P?g?!#7ZPc{3>djCE6%kF$#~h%d3i!~ z!|^KS(ocrK4z>vdI(m zd`-nhR4SH_=0EdxyhV@?F+zg$v~=kD7PuV%7p%2Ow1^zQNGUETlV{w5#%wN1>jS8s zKH6N?ytp`=gfTRB>q%{kR49HLNFgJ7pgC~F_q$5~Rp$t(`+6DXB!C;?uV!NW*6#x- z-%nBQo5C_L3P!JQ%^!p|WY~IYTamy;pq*GSdZy7s4ES#2^Qqo;r{v=*u%=L~)r_4h z?;TxzF#U{Af~4W+<+*-;57^wk&w86PMbrSz`|zh?Y<8*#q$m4(2gLRH+RDf0R@h># zT_`rAEzZ@SeO6N_YN?=d5!SDlq-<{fPS+eoj3|6z^Qb91F9)%HJgc_+VuXrHfA|x? zAvX|(nzQz-0 z>sdH)Vd!4(bI@2hNlR=U6>=CaH{$^I{t29nd^v2S;LS^QSpWgg7AzA-nUxrzqSw0! zSa`1G$p2ORFK|3%?JvFck*imyHR4Qy8RugX3jIgJC z>ix3W)9k*UB_IQ?AcGg5-xz?aQ#7v91S8;NVm3CCT(ab+u~fbHd7bPbRACz6cSi#^ zVu6eA^C^3|NOLOOrMw{PO<^1KX(#R5ZTd8Csr>5K8EY*La1^@3?;+G}Lc6rqsX;Q$wnUnA zp8i7dh(w|=Pq9e+IgU(eEu$ogFm93;f*tMqx=x_05MNXuwEr*fJb>3vfa1-=+h^iC zBnE*j!Vyu+@s(nsOxWt_aBC|-H7gw?rEa~U*Q9iVV~nJ}yiNDd(8Ku1n)3*_lXr8S zfr*^-zEw69k|HOr@avgANb~@3Zexmdn&Gg3vsEaYT*1lTV$rU0n)V>a z#xn@b6=f`T8g6n|*Ydwsie)u|!M8`HEoC?0jt#Lg==a1;%6aaT;r61b#p zf>j$ZH-04D=4iF(PHbpxiU=PrU`N01Q?-!(%-I*^FMt^2fi4Q^LO>wN^=Zt`a;{=E zd8eLa!9GQY{IkGo)f?G-8Ptzp;wgbpBgR#@Px#a7kUE{{ktGevhvuP0f;i#;XV_%} zDO5#Pb6n4$PJ4Ap^E;24t%(V+Tz46l*X^A$AU+NJCbXgzak0U|9I?Al$BkW7<7JhE zqm67SO;yQH(y>M9cNn!M3bg|#z=3n8yx3(U|DhAprG2m1{ZaR>%_4{iA~Tw+epe)J zM@MyR>1Eg>mNKhSGBMzb9g5hU&X2Tb?6JclLQ>g=)`N5m4z%_~gV7m^OyW{p_2zE2 zuNn=;Gw;|ZvM}Ot8=zMMeYjia>BC9yz&~D5r12{3=K;PGi&O6j(r9js=t23}4LQxE z#mQ$pDj*+16wIy$W=JGJ4jJJ`oSB3CXQ99Ed@|7NRZ2uFepj;#5%4FT#C3@D`|&z08XmS1x0;RntY!pl>P9q?P8^(hj6#wuKW z?dp=UA1H^GKwVGqC)Mn}l2Wu2U5asW=mf;Nju6%!9fvuUv!fsP2r!*<07o5D3jahj z;r|4u6rjM$ZYXu|b03#D>~W;5SBS$RoD*?Eyv7dMYJqZCuE+~M()jP=dW8LN56m9Y z5JiAv#xZ6ODRLj(=t2d*hq-92FqG2v7%P)=@16uY-zsntvsk!MPLXTIceFtEzpA{^ zd!SY$#iwC7tBb#MoP1|y7HHn{TQx->y_zb71yNM+reM|27jI55pRr+GS^IP*^kIcl z6f}cUQdQ!&wc5M?)O%y|TY}^l4W~T-u?2C_>5PiVHHI=5&L(h!K0(MJZ4?~!=Y%S8 zSCON!{M9b7!1PlIY?<1&7?AG!L%-QvibaOK2UigEZM*$ewK^xsc_j~?4GpO(*%ycF z4+jrWFZwCf`ee7&az=f4*2*K7SubLt&IHMGek9lL#05j>>4ITC1#CYZ*Czrn3~;1o zEq>I=H1nGQ^UW^I+ln|b^eVJ5I6=sSdCSi=XBh#`6$w-6*M%70I!{=)>CZ&TTtL(s z{60gQAf8*OH*v|b?KgA5Z?%oIi(y!7<<-N>SYDyReL=_$ThIkbI_61d~r zQAWf!K5*C8wjTY=9A)fr2G9&Tpk)KTPpPLr08Nqw=g$;D!$M=fC}Xdq;_wQj+rEoB z&E=_DBVhAxV}V7QW(pxfh=T)S=Fs0D>7UZu?9iM?tuvv00RCz%aA>Ea?^Vh$KpMCR z^_&G%<-mq-E}vhVXoD<5G_<`DzaHX0$;oV&V>q3&+cu(5Y$u1>6d6pli*Dqq(6PmW!oG2)!r?kKqdFhcPVQwLzn<%Y|eNMP7D z)m_@cQ-o*hSc5ActEc9^=UqV~Buk{iWR*_5LJm}#`Bzo}YVrfZ;X@4KwgNtmj-Zal zDYnBIXeG<0tnC$(O0r4m~Tktiv2VD)cc^M?Qks=jay6!rY-eX1ZWa7kf&9|`E)gcBw&Lcslo((&vt|3D^3O* zo9`MyY_ao>#lUS-FrQ>&%Uk^SZJmwn2TtTLFOJ5TMBEKGL%4wLz*k4!u(5q~N0+?c z0qa;J@#)!8So8qyv$37~`eY%tpPLbz7O5X}rpv|(9`1rG{$P9h@AMF8k8KB!$7%R+7K#F<1m1NL6+NYDnG^RsYT3me<+n18PT+1Tt})@h2WN=jseU}VJq z`ifYDg}3__VQWhh>?+_Mf871bR+o(}-+hdaGXwrimspkbmzyO1>CZeu@VH}7&eBUQ z)c1nVB-`D4Um1=AUw#-NIl@hNh=qb*Zt~(!Hz7mU|2aI##gqeZhbLdDN!ae5(X;Tp zjU>Xy;2&??_$mcqyK93S*n*G&;2{98o@XM)&JurhWylu2Ac{jr!U&=;N(5O;yYv3^ zAT6LnR7*c^R*tCJkHQsjpi{ozVVMUK!Q#j{XKX)<1GSKp?cv-HF&coBDbSB24%yYP ztY96onlcuDl`uja7ZH0tBJxN6^A_OSub+6|$gH4xorW0Q5s$-VM?QbOu3zwoS8ezm zdpK1J2RRi%(5ZFW0hj&xBIwj7+F1I{fp|3tB$GoSa1C3+*RM5M2PscXy=D0fHWagt z90zd*xhmz)_e$dT9sq3u6mQuA@%R-e8pHvjVqvPP!=En6EhxKCXrcy;AD2kKSBM%B zh--SUn(#-O@NW(^B{pf1f8|P1JJLkBhy_2|vwzp z?Sll;y-(-g*E{VV_;C0A$Dgf;0neFtLozGEGs!t~dV1}})9JaW{eF5Z=El|NsT^$3 zbhho`3}bYG*JLfbJm+!raA*Z{a~{u6LMG>j?=z=Q_X`q!!q};OgS-*^$M?_A{uzUR z*1xgD(N$pKsxxZ{eSB;h%5epL*e+n(3dq@t@lHAN=4S z4CVjLobY38Slvw*AdY*S-HPgDB}F6^x#`F_6YACb-<{=^wI0cIB*y%oAD-Db!pZit z!G4|9XO4%gpJ_^+*}*n>txj*br~2=IEti!!X$7(ov$JYFszq8cSCu;8Y@rvzq_KHA z>A!FN=f8J#4E^N=3bZf!i>TrDp}^3KZ{6H zTY6Og6Y?P4w+?}+{*A*qnRC(bWF&#FpDZ|*=63JUo^lFxB5NX9|Pb0`xo#r zB`2GqeS(ec9j<06s_y3I`4en+oe%xZCBLX&(b~;+!)fo=<7Ro<$3%Pw+aJ?h_7Y)$ zMLS%6o)dp7T`)Qz?fgDum?;%J;T^I|0J$sjDCG$gpsm62r#A_h$8Nu==2{{0KZP<6 zv;D5hgh@0B90MTQGh?BuA`Q^;JS9s^H<|pG^AMc)c>9uHdb$Ij?O}Vt_|q+}M{C8v zNa(#zEZ2l*@x+|d6K}erb!PontMA$FVh`!N&(B6wKi$K|Hdne}N$OSok2mpwaaQ$Z zWBW|r-;Cl8Uu?L;##XNN)yw|dCDKQgkFwn@J^3GV;#Bo5%&F$1zxI`peB=W|?N&3WvX zsbV8`D)t#?UFAmxi{obPpR*YELxcMFJHo6EDQfPM*>fAvau08{@20a zocWv8iL6Liy|k;dvk^-5@V2pkdfP8k^@otII!OTLzg+XHIXBq9J=JW6!SFHt1c8OV z@6R6yolIWiMOKbEJAW@S|9^gyEc*Z1KG~XUb5&J~vP+~(5Tx(Mzzn}N|Ay_)t3*fI%YxvuQ#qkjggzaGN~&Ic zde3AiPP<-Q=~?yRcf#cUr$;kucg}Z{cHE_e_%z)-&qVf0*{}CX4T!O4DIABadnJ?; ztW8+O;SB|c&t%!Q!LfAIkhR`A<9?Nyhdtao!$@^_>cH8OR zGTIR)(Y&(qF}r2IaBx&Rk)LF#rBCaSvs~r3woSXaaL(p@K zZp@T(Zn0ojQDf0Jhpcau>cs4@yZkqaL5rpk!BbWlb|AwDxbeXCzX@EzWpr9SrO{`P za)NIdY~F>(&Jx%}ME-|d0naN)Xwiw$in-VG+n1>=GJK3ef@Z|m;po2?nlJld>tk=P z_@&BKj*UjBM&sB$P^qbj#}qt<95iQJm^W{ca1?*b8=eaTEgv@LVEwq_1;-6}NM)X#Z=*CqDq`Iy793hFDu{=*t8C>@hmbh&3hzc*B2;DB zyM`j`YF1h%8&_rb>}Ewp^!vZHcx1QnJaDVwM36$cM{Durp|&yI-HdV`jkzORC){(w~&QWk2#NSl4LOb8k=X|kp-@M#inx(cQ&Y4-2 z5wnKm!z97K$Z)zz+-5QT>;1CW2)&7h;)IloM>KWY`(X+`>z4L@{2?~F`cs-(y9fUY zM|+9i=y1xL@Cp9>`E+6(@>5%ur=)y}h3e4whu+rJ;#Dt?1-Fwg2HclsxSEM zbOx$q#I{4#!xKIJ;c$qOBT+D{t$t;)-c^D}aQ}*e&qj(ve&ktnMyZ~>Aw(yE#N?(Y z{Rvzs(S`M*B-&S<)N;h+* zo|zgeN+?MwNl0i1)s+nWZrtz%>{gpkN0SJ-o8?r%j@BF z{%*$J`LlnMpKNE(X1{3Jkbex9h^mrN`WF*(C84TRv2W?1A#}{ ziImc`mU>Q3&0toRTjn+TqZ2PR<74#RFv2Yn-Z%5{SZko2l8@Xqftl;Zdz*I}*Cbr0;H6@B`c8i5tGk39alLE&ZK=!!_6Eq-0uC*mp+k z7v!Z?uPom0vrke^NLe>1WQvam;e4lgUY_k=pL}`dbk4Q?=~kgUl{b0(p12=7fWBL| zZ(iVU#zdIliBmpo?W|#uBK)(OMFqJJy|GS78FU-3w+ou9SXfMO-1k{>D}gU4%%>h} zPNEUeo9n2pm(vR|9=XFZ#3EIjsKk-1dR$FV|1p2}R+Ho#d>CV`v zIkm{xsEH>2Hbv_4eAT&gsTQR-%Ux90Vn2%=wm!3`pvCK7HZEv|0IvpoSNnX$+W10# zVYKS$VBrZ=wEvR;)D71XZ1Qzcu3y9LTUakU7CMuU^FP+_{ym4&M9hLiHpZRt2knY{ zN4NOp@15EB6_2C!s4PCdH=*XH7!hHX2ef_{qQ`>@1>`r zSXL<8GGi6!SEZ? zpNXyHAs&Nl=ycqy^UT!m0ZQVNtDW|&{q{7{t!Xe2+`^0H^2WD`)1P5 zPB$WF(|KLWoJ^~*!eA;kPx$$|He3(#%6-&q(ZX_W*TmkcSH9RK>r!b@_9;@AAe?4(x|yb)>-kkFo&oV*s0BxDX*m=fd0hKgwJ9 zV0THekg^`m7&yK@IH*#qsd`)HG_m+4Hm#$mQCm;$?UX}0g>lJZYw2)D+8L{cJ?=j5 zRFxCl&xl#9)r^!eV%iLYW}m#4c{;P_kWDjP#FU>w=A_4HGD7g}vlW}D3BtECl;@55 zoYSo9zFENkFXp1HYinRTBz&js#(5qPvyYTLStpIxJyoyesfki83w%}3;cRL_?vHl3 zQIhx4QGs#kZSpxUtHCIriMfR_3f6y!_=c){!QX1e$KB`m_+Q|ArpLS75>N6%;bTm8 zO^nAD+;TSiymwhSL3@9?0iLEy%OP(CpDL4fOk*#yW!SyFu1}vCb9zRrXa7SaOHfB+ zXroc5!@_s-VWL@>pj`_sV-bINM4C`T1$HLfvkJ=5wqM39yb-{X1rq1 zXa5Hy)ux4l%fqg;SfR(}jwP{rQ$Duh90!BuW>!}V?4%PDs!&bj!~)-*DpG9FRIbACp_K8W-)UKYCF<@E6_>R-&lzjk3=<5Fov>t#B0-{I?a9>**dRoW^=rUNRRZqh`V`= z?RJIR3ZmJ4(+p}|^|H5r@$jBZEE_&J3 zEh2lo(}mV1bKXT8xz_Mg>)|hhE=F82?!NBM7vA)KM17Fcf?Vdd;Qh|x>^hH_K}^C4 z(x-(dLDJ8rIFt`#xK#|F2@|B`8wE6^FIIA7MLopCNp`aurVD;u;!P0E71Y7ubk*lJ zFns>ya|c^THQZ@@(mpp$%yTcUPAF8PbxLAC{U{YE&9C@u>PP7cjcdk_vo{a(=I7}w zM+;jGiFGXOF?{tuqYij^$U#kXwZ;cBRF-l2$rnD|3J$TG3Ld7mlu7bnZkHHox21(k z$fH(K%!PFW4OI2~aFXqnsHm358sxSulD|$&+1qSil~JawMAuZA+%L}D)%`mHHfCFd zlsLE_G!2wZrMot`E6Jr?TrVqCON$jPns|xb>`1$?)R1o=!S~|k8`otU)*nq*l0NH7 zqf2`AQY%yO4nvV+qZ&cj+Nbh6kCv&Yr}6n3D^Q+66#mU(#C9V-RH9GM+ab%*_DA!k zGvYq&NX+$i!d6_?n=2p=;IrorT34{Bn1cbUJzec|i#e2}(j6xoPoZV*>(|Elr2CW- z-fh+mJSgE#S@u~rIdk}6b+4;IfgJA!a~ZYO5M3=_W&PQnl`u2m()L($0^8n_+fUaX zKQ2vtocE(o`?!H)aWPNT@$i7NJ0$)m#HQk2T1zGDtch>0B=+rtH501|6FRgRDKwRbrAsroeLk^W9C!qtqtx zWJRs5^jbGj7mpE5r^yK2*eeRa$Mlr)8^-J(S$0U@XFT<=$62 zt{Pt(HQ4?^wQMYrjr(Nf(?fp`>8(3INh;Bg*=Mw#rq&c9ifEXZg}IxH ztgiZ#kw3q@Tz>%fW}D~9V&@NvX9*=tQf9-)^5}n+^lk1nR!k?Jkx2MOjaFk;3ch?mW*FpR&kiQ_S%lTVA!ghK)fcIUywlLGM#k%b$~^($#Sb@ z#w*!xCbn67%lVtk{#0ERD7BdvW7Fqxs>~y``F@g^lR~F#XJxabynIU8d5_=9V&5d< zBRvwit=$XUlO7HH#uok^`M1B^P!XI>+oxGQ%qLS&GHYUHtNp-ZbTVb-mY9#&fl6K< z>w(uQzb474Qz|=9u5;@K6#q#Ka{)8qy?)zkRFt1JcgWhE@vSt)FWczNXW<6h8pUfz zmHg2pz9M6#^c3DbE}=JuJd?7QZAN)7N%sZnK*c3ZwF#8>>&>O@7?$a35q7 zEm^q2bI3Yz&RJ#xxu-*#t}N%k`iE@l-3rNz-c<#xmF0rX1`MlHH1 zwPMkdacNP)DE5;Kfb1e>cTOSj@L!bjRfdo8Pv^f6lUSb9*UG$!S2!PQu`kov784vU zp+fIFF-&`^$U(C#qbn!G4Ni_Gij`G&_BOSY3cH(}=^6YIN~XnEsog;ro>9+B-=-lS37!wwwp`y52qM-k3+g89!ry7Z24|4JPaBz#V z?vbiByIPOc+^0>h@k<-Z6#pFjd?yt?gw3U=K9ben`}!D+XEd5|mMuGKo_;Y>!-)8M zd}P*{$ND~!oTMyAPP{VVHX;;-l3txz`j9>F%UOD+piVN8mQpVNZRm!C)5A>(-r1BE zN8T3~mP0Yp7F$2!%Cy}UW>Ft}8u?m?!`zgz>$5V4l$5&c$`X~Uhv|X7be>2eA@8b0 zse{LACU;bv)31jcG>+dc)G~Nta!f$zR^D`)nlr~U`A`c7n)W#6My*@NFV3$hN`+PZ z7E}Ii5y)@?12$hL};?@)nlgC>vY-dlS;Sk-7+is~l^sn5h{+soHKs%)Lw3ct0lSj={ zt~fZ}n*ZpEOLPfB*f_(R^B&?)ady?4;79p9TP}Sz-e>=6=wcLh zVz*fW)q&)y_ncwD+x{3&%uVo5tQ%C>py|61J~61*Y2T&Ioa~db_lB3g_V=i+Wtt|u zx7S<2;3xYi;=WOd9@fATT*rnZr=>eQ zb+X3ytPd|difU6l&VSViss>YzYOQNY!h{(9b3Wyn&W^c*bXyYpM5KD~U~>Xer_>qt zC@0*>em?x6!4{Q-Vy^9rE6z((dvj-kkj=$8%DM)qf(P1~whPWYQ%5(MQxFbXf z=fvjiLX^ck{jttrbv5q|7)zX;<y43YTK*S%|~vr(Z1bDs>DCWDcY zoaC0&^qX$>)TwLpFEwl^$^BEgvbC&A01Zfr6Vj;0b>SS(pDy#@DmTcN#|#3PUPr5A z=HW=oOZgc0%HJD_hrPC1?|F>r44~Jmf;Fdv#0i@;{CqNhOSOJoP0MGZG$!yqmrj3I zVRD+nRYf>~ zV)4tK&t!w{ToBu6fnZ;N|9xwypnZ1pa8U00Mase)mRcsleXv?Tx0uLc%=CBZz6)|{ zz*}KhS*QSJtcQFX@whN6miThqqBTV`nPB1I!81r)Q^bvou0~}|Tp>DIrcIrSp^{d# zut#(Qr6(xq1WvE>I7ziuW(FdaNBtB@uYFqbcX)OS_bSL*7}cxim9L*?y`O5(GV zCnM;$6T3El7>QLqcA9+Y_WP_#pOI|StFLa`*djR9hMtGMzt(tjwHa&R&KCOD_G zyna;SUE+-U4ChYv&9ZXQ2pV3BIDJi+gjQ{iHm#0PO)oKsIg2t5I+a5`9BYxEBbIT= zM{cnAkwxnU(|eEZ8>apbjnQ@I7lM-WWNvF4TaE5nHK_vI zWmji(>@|B%^Xh8t(_N?H`3FBOHO^~mWv(=~@}5w~Fz)9+ty~I`*2%wi8G*z%%o3)5 z4PS|IAKT1IXLL)U8iT_mf|Izs`~^yvV|-ARwoSmcP<^`14+vI6+0+BwJf|=#5 z_`d4f*cOXUcEw**p^l5>@lo2KMVtwI)~_lsVwONid|Nd4I8c`?Z2vx*_$BWu@#A2Z zMZeAVW9`C*y)%~bvU11}?y8KDl=oa|+}Krsi%{{F@^#6UdNc6uCO@jsTF`jrwODZW zJ&J7Qz>a~#WX-U;zk)yIp*xciAbUL~p|3x!#l;^F=Qa4wKhN&SHr{o^&wji!b`c*q zulT8`s$;o(NL0YZG_jH|GmkyEgW*u>=+&dk8V?o%Mkh=hA%Azphx&;8 z9e1VBG;K8T7~0!vtha$vLGoNGD%zl${s3Rr6EaXn_C~D{f;(g5E?(@n9Gp9Ba_qSY zLELWaajf>S=N?v;gTg~8`)^#V@elvYyye>5Tl4!g(JTU+=-Ata#O;bSUrLBjsJqkO zB}B)F5PaFCkF?{n*uME+{|0CLKiF%C#`Tz&I^NF5EBUZ_+E+qZ68OuiVG_cV@;nl` z6U2*a_9Q;Gxwr-WSAR=iDACjkIS2}KtJ2x#u;{GFdLKJ=Et|1`MLVy-*V@jGfpYkr zf0%KR!~QZwM=-B@w6lbd|MJK12|aAiNgiaN50flU!b7~WU9MwKsMlU3tZVj>_I$?f zW4xl#u57p5uYJ{WH#^(%jS%5y#vyCNFiuLD4BpCsl_m2lN_=MBj};eXQzV^G6T6Jb zt{8+K)4+1$%SRpp?SZR<73rAv{;ki#@gBh$H!WEO-n}G_&tiYaJMsNl`KTQx?SSgy z(9pVS=Jj`;)|;>aw6o?so8s=}LK7#o1#6*Apyu->@mRE7hx3+C?Zl01bifj78nG2~ zN%B9L$|42hCHvYnl?#4#yE$3A>J`Q2YVg1JK9PyCJS(J}uuD?jW1+OltD3x9If14d zCc$p&cWbTViZI&_qB@WT^5g#lS)79gfBaHzV~7v#U~*Wtaj20zzaHMxr1hd+&rj10+C5 zLP$t{H@4s3`}lm@zQ^(Y`5upda+u`vx$bpc=XIXveJ4MPmj4f(Q>?XTNO0Rqrb8$@ zwlx@*Vteo-yVqCwQ){?6@w^2hsV{Ia~nOQHMBZsgYL_T)qa=b(JvsCQ%VPIIEx z%32H@W(-EChA6_G|FbXFWc7l_S6R%?Hy> z8BVskZG1xyw6x7muP07S3Pv7qBP74%M&#c*Y}KlbWPl9&9wt8s#s@u!=-8NNUAUt4 z!OIB#4JoMaUsfP*e17l|tEB$tUmdy=SoF_iDvQiVwn#Nc7YO)>Ns=4xIemBCrP>J) zVRZfpRhtyU&AHaujtg+5dN;4NP{L+PqOy!ZH@hXs#c!LyMiDio-hbW-+~)CuZY|N# zEhihR=UZ0_OdBinwzpJkiWJ5~KRU-ot)@>ZlioB?gxAI+SRcC8TE{0{c$y|nf+Zzy8W%hRrS2tD z0ax@TEy-)f&f~{m=2!nF)r;85b_XGXSrix>I~&wE75l5N8k$st&HcE_kcCjj;2EP2 zwK5--drp<`OoHx^5I!t{(zLsk>Fe1l2+5B3hG~m;3{8emA9SpU=})V|ovYYgyE7j? z4ff+Le*(M#lO(I}{$>KdeID-P!;Fj26$pmOoYJbml!;ZcTr6aUs+|gS9yLTtpVUT1 zdFP%18@}6Px$*-nrZ@Xpd%_Wsw=xsD;ER>Ck;i|~d@~vL-Tz|teP(%NCuJrGr)BU| zo*2fVFIXd|(|UJH6~~{8TLo$(1E=AnsC!#vlRQbS;Zm{6w6U<5;{{?z)$U$kHYlMt z)cOrR6Cc3ud^Ow4{}1@ukivS0)YIyI@Vzi?WV~UZWXENGlcX3^qfgzE&=_xrb7CD* zporo87Gd{SGu!?gt*X|p*xJUzxx30q_ZW*ckc(EG)W@p5kB#B$qNmhQe zmOBSd9Q?n|UNJsD=T+JQcr9Q)eDhEX_1F19xW#dpu5}=6#7?i^y0LRk`fq2&I<7aC z2ENGcsu1sZ^V>f(Soqm^^CWRMu$U92k3F)J_y2znJ~0l)U)|qt53gbWBuLQp=urhr_1p>(y%K$8$C>0q#&2 z8&Em`jmCfe_M!r~8)sNrRymSce-j7D4rtX&7ZLT&y{AId!k0t2vs(dw;vga34T)H0 zVD2tiUP=LZjajfqPYx!=xA*X5OG)L-DgWM4M)t`Q(n4KMi_PD046<1+I!)QA^qpDlt1UBgR_o`?Rlj%N;VzXLvKqRfav|7DDpEL@ z&TqfDi$M_^m{Z9`6X};%zeV9!NLnLvU8Cyo8E~WmO2x-Q(nF~1u^W0=Oo@Oe?d>wtQP9tunyndiU+Z-a7DG{=|hl3o#9ru>$+gp;ie zJFHT#b*e9})JRA98>5VR4MYO()Jm+kgjJ65^lrERJ>_z4lD9~a-DYjje#q=S8&qD~ zbPD?Jv!)NZ=Q;&cZ$ecLCKL8z?+oeVLPz1Bzz4-;18_-9!%IoW7-Xp%&|j#VpM zMh}u~JeX>WrlR~MU?TYqJ`ERH6Tv1$g8y&0F>O~g<0M^B(T5rEk02BDV_T4Q5%BLU zEWnKxwDP=R71pKCCE^Ko*iCp@0IAZ&pW|e(t}rOQTnomt#R@-T?aUG!ZLZCp5U@Se z-_^UuT<92M?w^-IlyA4B_;-bi2)=Lycc1(`>vZ0b?ffl#7e=( z2E$caCk{TPc{aIFm@Gxeh#NKXuJE(RuMkWTkTNh>t@rj~U#J zIx>~5*aS}_Ft=n~_j_fsT!XxnBQp*PTrb5mzhw!FB)5x61v)bDoY0G|Cr5qXI^_L~ zp_IM;n?d`N{oU{Z+*bIVEwXtfpYP}ed>KBs%h5iK-m?ID_dQRj*(WtLZ||eZ^u*WM zX82PBpSdIHv6Z!2XgRyR(h5Qv_waX>(#tId{N82-+J#2FY^Nzmv^y^(-C9y>efJZE z&S(riCtvuvm0e6jxz<)Z#k&16?zXxu_tWxn0)4M-n9agiW?Txa3hmD+*VmcF>!Q|r z78Vw^=tt$$t!(eSOnPL1TDMtsnZo>NV6(Jzi7bzcT3zj^{M~L*jsJ*WTwK;h-Yg{z zG$O0MukxS2^MVH(Rz+1+%69Cbj1?407}50ut)jH~U@3d+OR#uyz~Vb+(PlGcJF8dr zGM#mV6gfyG`Owsxj;_=S(VwYLfn4t>J`>B+b(`e9a6NS z5E0&vF&dF6#fe*+CX)wIc3Fsrtj^??Yz&3PG+JUh>235N}ekW3E7bC#~rmefr&jwQ=SicBo7WFpgH4&u{{>VM%470oc%$u>-K9r?#rh(L; z0iaavPRv2%f){roowk!v&GcE{L&Nzw0vbJ2afJnPh_WD!)En0=6AP@2mt5?B9?J4$ z2{}8whA*T@lLTZSXyYI70jUrFi6t8AXW<-XQ0t@%I?T8Xj4DLR(02Oy^f%7<1lf#Y z!>xFmUHzp3PYs8;d4Jx~%!Tcbs@Sr0XUH9LQs`n)b#r$N#&#>{dkv$^GD8(39^r&S zUNy@kWRt>)4Kd@}l8(tdE|5GcDqpcsRCzz-X#R3|z$d>^p|7y~Qx zktJO%0gVf`svnCUgtO**J7hof813KjWsoEqd=3gJSJ;gp!pHdfrd(arP)b5E*H6cI zmd{6)2<8oey3gy99cvAAX0HyaERk%!HHrl542m&U=4b>bq1LW0eD!y8kQ-<;R7~78 z)Q3vr9d~rcj6}!i@8X|HCZmVW*#+vIgu;;Go8vioB(0|+JZp9*)I*w-M(sMD$I9tp zzFpSY*{SZ|YtkFp-@P3u0DsL+7*Ahv;$L{7a`6W(a5LG3@G>f?w{gy3N~40jZ?H6x zx|dQhyTa-yjY=QQO_fzuSsa2MMy^%*MlMX!X-@-XGt|sOnMam`u5dM#F7|XS#u|Mj z-N{#e>|cFcv*2TP9Dhxb*}vkyPmz>elw61o?~o0k51)j?K`o#g%-Hn3^xGpf$tdZ` z^M%VSainnQX-ta`32`Q41~&$MZ#=!-UD=*)Swk3|dCwnI8;{M`@)krQeg}uzXdGss zmA*j>Lu^Mgc`J-w;;PT|KsYp7PTPz^8aV`>$k@TL7{9kdIopF-L5u{x5n{*iHa40}E1$ylr1-L8FP zwldO@wNW^YxyYV(=Cwp=8#^O=%U)5x&3^)QuY0SrWSXEMgrDd!v*^fe8}%VE0DNN) zuiYyC39uyhrjc3|3%UB@dJW%_!tbth-*e5*OPdH4)J$(u(jB4Mav3%5dwB>nh3|L@ zmtktU&0kq=Lv$%~KJdVeh&x7$F-fwwMYCr)bfPo>7&k6)>%ZfEGZ($l{MM1y|W3Y$+Yg2Fxtop=E0_@WD)d~)L5Pm=tG3-A&m?Ac`8e|-bpP-gIKvv zL=bv#j2X52ah$g~67VN_riXgWYLm7olf63@oG0S=(u)Z6_T-XTc&B)W)YfU6cc9I` zjF7gIIxBVVwyHcok0Lr?Z5SKwR9G8rIEs4QpW^Hzjw~rz_0xrgLj}sDbbhowT&?4J zH>^a@ztv)?*&0&{qZ$YzYGB_K2K9zK8MUK*WZ$pKsXwc~-=k~4Vvyj?98WGsGlrTH z%m^>Wc?LNX_Lh9I;-)@~L~9J`ik~8Sm@+K;Y}Hxj#d$^jS2g2?RE>_h7+r6wU2@kx zz}vc~+T7KABLh^!byE@CsCBVh01=sy`464dpT&C?aljdHqw<&he>HIDtRBysrSWR3 z=_ph)bGuTf@qu2f9|>8;YROT_G95cRQF$?hpSg+ykCkPx1MsC*!_C)cJ%jXO*KOR$ zsU(Xtv#Fvoh>P__hJiJ5Q2U~dzPszRz`^?ABRBExrzrkiDYA&oTgQMOue zyAr&$3n|)o9LV^Tr6izLT``kOJ^2RAOljbat!u|pY^=z;e4vkL`1wCr%Ow19SiMa+ zXyQ|z5puX`rBsv+fmmrD=4x8-nXOWd<@EOS0 z%=U0&KzA-;Z$(GjX>Ktwu|8QKuac8j4Q&Xz1n@2!&28@hlQ*j6Xa zC}=}g`VZ>N+UbEA4vWaVbfTb~-=^Gcm0Z_}{kAd;!`jQ%VowcXK}ELU%HCX9=|;A1 z9@A})qhZyL_0Z>ve;E%>;3g4IaIZo16TX+tJvT^&be!g?Xy>wRs**Vs*09%dq!^n8 zHFUHum3d1rGsb2cA2!P77L`Z5uGaIoSJuq@H8;)g2Cekn1_=sn7ji)1AmnR>yKUkuuuTm_&669|7=mf6T%6`TQ?uwG z;^(1h{>PySjCWbpMiMe?8nfC`X`10d1xlSZQih)?DciGrP0>oRatGB;qy>kloMO@u zG#E>8km4>XAd$CxlJfargdX?IkBPsdZ{i5NXNIu@1nd&ZeLI?Xu&I;fKU9uFyGreD z*?Jbd7dR}<1Nv8+x2R4%Q>>8P?G%Jpeesn_|LW7dWtoGPxA!5Ec1dpP7$t7#3-)TW zVBVi4<@h{D*2xoET4s{13cB8n7NW2CYoD2H;O9r8boB}@gq4@3bj?lQ=DYjUz;1=G z>ZL4=N<3n1duRCmRfuG~LTDls`S@}R2QQ_e1ELGdDe@F8Am!6X)v(8V@TVx%4RO=O zRZc{k6P96m1q(miR;?_sY1+0M z6PX3<9I9qefFIoAslKzQch8e}8(JA;B~S=GoNnI#c70(t~Drca$v;fJRPl48SWi;LTC=|M`P@|*Id=6+6Z z>>Ji`Rp!Eugo4@YuKf~rt~@vF$0d&+Bu#&Ojq$B+{Z-=J3qrhMa%QAE$1S{|7Zpa$5+}0>HWqpR5Ul?rm1dBrRulG!MdXh*cs&A zQTZFi-)t;G8!0oo3aE5IF%m)SmK;P+wG73TQjR{ZE+U>kYJrRl?#*q zqGoq?e}yC$MQ&2B+fJZd9SXb4-@APya>H9Bk~z?pjNs%13F?U5!|R^%_>bwLV?bxCou(rC!(Zo2X;fuRn zOxuYxd_{x>cY7mi2oUA;K_aiox}sKuB{UV%eHfkCxx1ic|)>29=pF zj8}(d3_Bih%n2iUT&SqGJE1t3-9w`c&b99ifKVeaT|$5#Ttiz|caw%|XzS78@HR{5 zDxC73NVWnwV&GbS)HLlN*lYfG)%2@T!{3;16zFeEoWc)XPK+!te{=el%5i&_{Ei!X z!^(*j9hbjFU0t;BqqQ@c-cR;$c(5+9th|rfP|nc&i8uh-@1GN{HNefyOP3JVxNTMH@C@9L6n_<-8XXoX3&;6V%SzD$ z2ZUM8GyKISS>2{CzHRZm*Oik^M-s$&D81E|a6gzQk=+CcCRA^;*z68G!!wXSo7p+^ zrnemIz}@qWliEnx>`Nz(^nWJIjr|JiO}m|9lVmlZy-O_f-AgyRYN2xr-Z;&^0aJOQ zWLKBAi+2PRv!QyqwyCjcR~CHLM;sCQ+RuKWmQ`fYRF%tLzo#I|ksw8mm4x7>({ z{%TUU+UN&cPf3d(UrX`IEAL4_(ArUr9cyaAab~Olyh%fPo+f5;K00W)UTzc`<}GfE zYzSrQRkEtLI(ECB{N5o5zZ(|dC|FWy3JCfKJ92W|{d`UY<{uPuD86Bxm1md4ReaT;HN1Bs?81}OcZrM7V^PN1tHlH~1obW7ZIatyJAE;wiom7N7;FM3d z+X{DsHuCoRgnCbdUD9fJk({aZsFZsf_DOEnbD8F-TE(K2l3acT@>SWLW|(3K?Nd_8 zABOTK!qr5b#9NV#qj08ke7&svMN42+~PlK%V& zh$4x}JBxNS!k+uqW2m$=2<6wKn*@Px^p5`x4zEir30=!4NX;}E=$y|bru7_$Q6p>U z2qUO;$Mx8kPJBMUD-XReNzZ2ZLi0-FD-x4}bHq%nzR3w8C$W*TkyE z(B~`1b!O+~`z!c1x|4|!bEbBg(E%rWKcN&|L4;Lw2_W1`ms5kMV@4+_q*HV3_mve{up&J;0b=wCLE|J2)> zy;9{0@u^&hd2N>CuZ`s8?d{396t?XTO%UxmfJ0#S8{y|35r{`xXU~vEP>IHn`woPU zH6o;*sVZXB`v;?>V=i1rXJs;FJBC<;Y;a^{hWxB%f&pwgZrlqoKG6aRldRZALx2%A zuV)U-CqxDiXWRUPS3(K%O`cxDiJ>Yr#4gi5HsHL6LIe@_o(Ma*DTxg!Yv{{O!q->cwlzw zI6#_s7P2RZ9MFcaqMZ-!XB_5KUaQJt&~>C$rYJ*b_!S(t4BXL9jP(F)63K+JUcEuH!CTx<;=1M%CFlZ7aQ|&Y=UKA>+6_KeryU<^VRa&;Ypbk*;3GU zz;odNgLCmkXTs(}tv|;FAG{W;O6-sbf+QUL=*E)F?u|Aad14nA=^c4Ny>_t=G|P$_jK=W-lx|{*i8nmEYUFzO);iByBCKGUF=$Xm2UdcEf|bvOa>!&5bqGGrj8+ z26wIv@H%C+txlAaZO($mnYz4`$A$ngIP-+esR)YaqHS)O*x=0ga9Q;H8Tmy2glB4^ zVBHCN%>VVufH;CYsoJ7NA0h)0=UXA`dwvmkIsXwuE%I zX-M@z1i^&$+d5B;oc*xrUaq+@ib*7;W zVzyng8tTEnc1m|hF$83+K;C+@Iosl|Nf$sG`(7&aw7Xdy7hv@QkoltTt1TstarO&L zTGvfGY~+Hj7eOL@Jm=oEHK6f;S?~z}Vev>OlHR4ysobWdQC&&>1lDWCVnWt(k2yP* zdMT0RtBP|ow3kzHD3w4gX#~-$QSZ!&9<@T(3Xbnp!VYEh7 z1>Te19R->fj5$q6JIPZJ0=&d&{+W{NQRz3g#XwDk@PGLpuCH>yMs62OZAP@)+Bw+I(C9jFK%E#6 zI^QyqC1W zo4qEOb;^rzflsQV%WAIDgRC%BlB;hOdNjAQtt#82< zX8&llsOWv-GVA>M?W)Vh&W8JxTVeN29=L#Ket^N5My}=R-z<|%ggkbP@ex11hKclq zEDcEP@8wJ8O%|&yRgtf10gXPRLe^pRTc3o~tR;Hqq+QW;bAiSNw$v+R-iK9?~-Pq(KO++LDd-})vxV)d;S&aP7x({wX2cE^p$E-yZv$ z8f3E-oBKVEYa?0f&J_}|UI`&yo$=WFgLd8Nu)Sukw;3Z}Uv~VPkN(NxQ11&><$UwR zCu9F-8{MO_k$J?C6q|>Vb3jqEWHf((6`lVL#`#YUGO7kT_m1BMSz@#Sgb#-(jF0s_ zcZ$H(K*Fg2gjIU^5T6fg|F4Dnf28?+Zr}+X1_wQf=2`{2PGGIfJMFp%fX-{GAbxT| zVe38}k37Vuz&>K4`&VXB$-spKa4y5I=-h)%0<~&wv!7h0at&OxKG0sK8Ab>t?93MV z@&JXzMp47zcXCm+C;lP32%VAXGrsc+$rBq=iI`bfX5S6Q8(?i|8;(FZ^)N+$t0(GS zaBAOx?~gJw)%|)c2Sir3i6FsyqK}3Ks(cCA%Xi(G<8gtsuPkdeKbvX&r}54o&Qdro zRZgi_HKn)h!<+*a!q~|E3V`exbUza8K+6YFTPRzknpW+)-$oC$4AM%JD59_Sp%Cg2U(VkcVx4Cmyvu*x z#Xh^d{nuUW5C2f$jrCu5vHvj={r6z}zZq)%y|vGO-NpXL&+z}c0RBC}^A97q|Ie0) z6e^X~3T3uN((o30A~|v}C;hKx6 zdAw=N-&#i|{iR=F%V^kwu+zs z{WmV)&h!7yjsG9S;J34H!Xp?dXO`K^hy=tG&WN?l@c@EhJP6$CJ-8q15HaiD9WxJ^ z*G_R@C)qv2$gAZU&6_#BAA()i<->0@qx5YBL-wmVL}EyvmxwR_7w)KURVmEj&fZ4K zR+~wse_*P+vsMTNy^_TpvHFgqwng?KE{nc9RPGXn9X^Ure5JlUQoVUU#g9N)F}IAz z4F^)j&IAS@e6eNPm(PQY%O>ncPWLSYyg-$84s905Y6I2z(&|wIMEKs`A|@NlEQ-#B z+F$9_ppGo+CCVo%f1CbBorXNo)Hu($yJ%?aTy4ePcWl!s z6fN`yCHRs{>V84fpDuqOB$gFlK0vGvd~+BNZt%;?za!u@_aTdsH{HELpB<0!ZCeu8 z=Mi3I6Xu)xN$2OnA<-@57oCf#EY~uXc z#Ht$>#^zOCLafOE>}Y8a#McekJ2WmzAhz)HPJO>zm^66?!qyBf$?YO+kNOC8GCeMA zvC3c+@}KsBzkpD6e&NLXPNSB%wE>BL5?}55=~w~iV8@wj$3?@Nl;y{5rKYl8cy85I zI;I|}ji7O?<#Je2{N(pq#~*0Lk)Bqr4q4VMN8G4k+2SMJ{YulyuVJ&;^vc3!qa}If zh>;xDk0#ckP#!wD=xZ*4RC&8Nm4q}e&t9(+=;?{zVV^#*{~KQ9=Wq77m<_|6mSnhQ zzTHds0o-l}`+|ZpleI_3+9KNn?`$J6n%hgn4PMRLwT4~8^9f30NQe164nIXCnk|N< zy(dwzD!2&QLZG@(r20%h7IqKp42Bj5raam%O{IQf9Xho9^5*p`rfGhfAr$0_rsA}E zmYYr2I@^AiUdW~mcXcX+uPb+pW$_M$q)Fq~X_KjTjgl4=D6z>JQsb5^`(UeYr1aWikBvQH zLJh_AH$7V~sEtHiim0dZ1$ag0>g%o5e&5sNI4vxsN*zm`gYbL&X^;tSd3fve1$PSv zNf7>2dd%cSz0&3gNd$ft0~t@{iFms49w$7$M;ll3oKnq@e&2N}bP?TEYSzTdW{$lZ zX38l!wu!`%YC60kfbCSflI$Lnau4vWNtWU6vY5#0 z!KlUMMJX;51#6YVGJl45M9-!xqN=t6zs z#3d7zb9gx4U<4b69yf^d#3zq8yl&-`EE(BHIoJH!vHtAXD!nzT!wrdiBYjmKvoA6i z-b1HM>3g~DmewnV6BV_QM=H*^?)DuWH&FSx9YCYV9z=K9vs$!1T=y-GQnb#EnE z{RKEtr-2#2ym%a{0_)K!ikbY)lF8Ea-m|xEs?WK>e| z<3K#FQjEu^7%_shqHj}gk86YpWG=6B{ivK`ZM4ZgUHOy2R&ym;D`Ekf6}mQ09xW_f zhFia=4}`BQ&{*Zlv{;I8*sM=bwmKZ^sl z)W^U){A|=}fB!R9Eo)a9(NIogp+}4pOY4+0!;5RujOQ5<8wE$=4-q_ZI!$wNXK{R&qtQS94K*R-J zmyDuHija0gf% zyi{%+%*-#3Od=Y0^}M~=lN8~JYAwi*?TbrO2Hk~@4@h3!GP)*3{I5hI5#l{yr;dm= zBAxtBxu;iS*<7Ru+U>AbrjI>6mG1UT8%degQZe=Lb@C5)ogQ(HJyOb`zKe-jAF)R2 z+u`@R<2H`L!dR2(q$eX;E_pai0JHmb`t$IGM_#44agT`XuJ3vk-9`{>%fV%{p63>P zp-cG_LDrRRaFft>zezv*I>V4^Q87`%^9I<;q1&eFTaa$n;@R&`{dFl<~oibr23>cG+y7XS{txp01kF3dER@}%rq^^Li^N>M?vFE8zH*Bu`jTH22|>ZRZ0t8?`1>`+}97XiX>`MmsX$k zM@XNxFruT_d_C=gE#u1Bw5ivbCCkuVga@J|A9puC?)x4QGkd?y9o%~b0okJ@9qwkP z9>PG=2l6y*Ndfrmz~Ly9X1Urv{C0anat_(hJdmodxR;3T=L6<*c ziefHewlb-bL*Vl+g}Db>OnrRJFA>9x|B-xdg1xwt1A|6KLVppXW3I> zlzZ#%)hoO#y!Rix&aS$MeW{HHel#7&WS4$C4inx3ISb-t2;(Cw75ck*9T`@I7N^>fS`z5k_f}=ekvg_6vMCP z<>Q0R^xfkxu3UKe0K~aB{?z1lUN(Cf>wd`ynkX6ZF!H|YSuCd>tSGracy9#38u5Tk z2{6Zl`9nBqH@v4bMm5{@wR*wHMp+&YG^rr(Xic$h?z)v<0w;8!QP4%e)$hC4r7L}< zm&PIQ;dYFJ7J&-#C>#D!dgu0017{sz+9x1ku-r4B?@^)s*xZ9)O3P1EZNRDuX$CR- zyCN$_eK*FXhvcm4*R6%PN1n7351Wnhe`jsfW%1^+@ltB!xO?01e4yG_-IKd3_ty7w z&t3G>fz<12g;dY#F}o@Y-J=S3yPev>?{tW@&K~9tni3CpT`ODPCs-H~E(2>)Ur98Z zpTDB@cjoDv{q3H08Yb1 zD9qPutWK^$PxfRCthnX@r-n8Ec}Efqn&`@?Ik5Z$UOO1(?fom7JLy_Zl6q(ae!KVL zguoj@jxEDK^7=uF``hs^E)luB?9{*&RRme?Y*25c(%EFl)+zEeNG-I76-^y?XnWkb z@zzA@i5Cj8khhG&Fz6!5v=1tX$ol%r*At81YotzA6Pht17I0Qm=`eBu_#vWM*Gqf1 zMmaRU)soCNHa=K!&TFX)JrO|yyDW>!$=6T37>olS(sPA2#^<%TGa#v_Q_|7BSsA#S zC#G4v)zBhg``Mwj?4sii6=dA_(R4bUx7XQaME2Bc$RnpBKgmNv4BFn*4ezgFLasau zEfrmoOo1l3xv(=s>6yjb(Mf6(M}(4!an-8fn}x`9;JZzqdymfaUK$LLEU94D3k9Bm zEyl`G)YeTGdn{)^WH~D*3p+%t011FcVM6r~8Ek;SH+T4b)bM(|}K27rpcHpjl zO`=K1#+J}Db0m8o-4y(UGpc8%;E$C?H#JvrPGMA;Q<(kyM12U5~R3C$25B#>b~W zM#X3YqsyMsrSs3_6;s!H$!m5W{EpuP6IU&^apv)LwD@uh_BB4q>xfhQtBGc0_MI}y z1^3LDE_zH^A_dZ8=jPjl7Zws`+WFuKx*P4XkO4b^Hx+~b6F(uoiS;-1yv6t$7=JOH zZ0%rNu&-r1u>Gbi#JFIQ?nyqWSi*YK$CWzGCtX`)MZG{s{pc2WJ{%LeV*23X1+`Gh zyqDJAmAt@oV9-h}wtUGuMEJ>_%1RmC>2|p%SvV}~3@AJ6y*`MY0Ln7OFV%HW*&kFB ze3Jj(l=!U&oNJcO`H4ZFD}j774!->Mvujt~(2E@!iIY)hrHr3iITyg?G}VOE5FSDA zpSV7I@R)}WW^Kf~yl{TL(xg9jO++EvuSe4`@CLU2!&TTGHYiL|PuFQ=)y?62cTJ!#*cboH0ZDJ?4lqO?AhDlF7O=wTJ38NcH!ULf7$J=GnjkXio86$jaFa} zZUi2?pW+hO8Y?H=>yj>7Ij)DjDr-|!XI$_@qJ|(hb-;S&=WrHvSZG<)<9LRCfljp2 zeywYFazVlf;nSKT_My4I@%h>T{k7#64cF5#$b)rg`33e8@BtjtQYPPveUBKTyeY!u!wGr)O5Q{2=R0!Mc;e>(a#OP=+Rlc zP4K!shl6yuMef$xcPtn%=JjqjMY(DJ+%RlfS!QGqE4~b+4zrqfsR%Ll+dZ8UlToC# z{@90w)uYKvx`W5X!$g?g?DUqz!C5#czCwbGZIR3wcdbCZ)78T%mT>SEU)_SAc^d|n zLvWS!qy!`wrkr2}l%#&)DvA>yBuW;oni{}@)V$JNYv)cKK=pB1JYO>~N42b@zHh>) z__ISdPA!0P{-9p=NTi&}Z7j5_ksRFVuW0C3jA-dv1vVU=8}$cdg8zWze>2?eT0enSu1=I47Z=Fd%=iO2UOw-q z*L(~>hxJiUlkpEdY$gBDsI3(H)24rttAFC6u)V$3)*CXUr z#`>wfx?nr`{y9DvU;kn~DMvZsp<2pOegX4FvBVPW^{h}gFWDk#O#l{z^*49mQGUPsB{qQ<@RQ_0~7>>XA=Nlb?J)!U`rM8HRkY zZSvMZN;k?kvAY5p7vBt#P{sb`ldM(s|u;I z+0Sn^cLfN-FN3SGyy3vf){lK7Nrp7f4eh8m8~MB;nCpKrUnMt?{JpS($3D=o@_oX) z<}eW!z5HH@Ji7V1W>k^KVV`~0?D@_Xshc|4{f|Ep%jF=idjgbfrW_5O2f~~yRQabI zf|KL_i00f*xdmGVdVOqn+(H&s@Ot?t18p`X>%n+^_l6(?3jf7jeuueH5?-nC=p!sP zuGcy3Mq5ue3UvW=9_ZDf?u%KohldqUJOWU6c=mJX_uN7elzTV)2iBlX8R#dIwqWPP z7{?9=yH^;A+WmI6*v974TQA!U{_Hx^GcPrn<$`X0nT}(qjXmcF11)D5e&-5fxDG>q z*KsAaH2BMIePA?f%R(_?CIYLDF4=pN%;~U|Y^Z9gZDAqN3<3*0ker+m z1$STju54uU!pyUK%ZMGa7Q2Czs=kBQm;`M!m?&P*N5e!GTQuHxF9=>zSRvM9vmM*F zpyMH)KR89(!z?54*!fS3bfG8b3;8A<1IT^RuA%wE*0u_1dh7klnpP=J)Y?5iX;NN< zmzy|dy9Z&^2%Rcx{E&Rm0kYBQ9R8NGc3F6Xx`5`5_Y!ZyEOMZkTc$*#W168_GLNO3 z#7wYbH_(Z}%uh_H$cmbVTpISisNuTX4q;v8MflUn)JKNi=?$NHxz~#t{2kHrjT&k+ z7Z(6!WNRUN!B!n&dah9eqhW`74Lny%@|;Aiu?R_NrlZ6ZDwbFh9>``n!W>D1V`2sz+5Au&#mq^uMLL|YrpE>T0}E-kNYDvEK9`|elQqI9q<#$=HZ747?|palY%SV?iH=XB@o@ns%VXXP35(D zC~CLi+PHK~M-f!wd~M`#gn(CelA651KtxHZB|M>+*RESObwD3Jnj9hSGJlj*tG*IM43NOP%r5e>qz>HbE>-w zI0vokH`?fEH@?-8HYhn>&b-S*w7fH;fP3_20~q=HLF>}=zbQ@o$WZ78MtFm&wQa!* ze9G1<;#yUKYf&RE70;V3r)h%g>opTVt6cohxTC?NX<#H>1*9^u$G_-m={_##lI6Xg zZX(t0FF1{T27U9(s|$f1J9{5yRzW_~-Y*zObCl4J81m-I$?t8{U82_iD^I1KJ1t=ysA{TaYmb!AQ(hp*DX5}+PTQ6tOOV|dg1}>C`*$Z_$tfa|E zs-4!@=AMm%@zU5CX}kB$*Aw+30UYui*5rEao_q_2MI3Zy$-h z7zO}^mf;Gw!ZP$D-GjD2F3@ulC*eEWg%forw$Ht2Z%Ut2OIoZ&xmWa?{n4a3llp(y zd(XHgvuzKU8OLEp6wX*cMPM98L1_vCN{bC~q>F&msPr0o5K_irkU>OLngIa;1?jzn zkVHX1X`#0SBE5#tLJ~rfcZYNC{SD{d`+j-9ydRDq^ONV<&)#dTz1DyI*IFbf(UQ!X z-)v_w$^hD{+si4^_cls`9(DaVsHs5Y+~$g#{O2`~exs{R=5K)c-Kx zO@pMf9`s@2EPw72(4kddstjcuNhDc#zqQ3?iqy?#gVvoUw`+8lz}7Cz~l_}LJ4xFk^% z)hcbYx_KR|`7odjj_#WK)}48V31}jw1k@TU@yi0v>}aX5aQZgCf(b7RPKJ-ob>x`_ z+WTuvEG0d6H5s~EM~-;W{@Ytm*;fW>H)M^kB#w-Z-trJ$%v1eYb^f~cVR_924IQ|l z@4*|-Q`6)>IA6ung-} z@xs+pMWrN}U-fi@GgGIfJOnxwtM|*XDEAnL@=)v!BMB?PECZp-mm1#xYi9DmuV9jF zTByu3&z$DRC<^WIF{KMKN4lG&eAy=GdW8>terR%FNYWj$>l^mv3{knqLSDY7MxPOH zI!J`w8{XIA)PdsN={+FGm|@QS*Mwtr(8JVghFn5K5&F9?RU}sI;n1NU)0OeUdWt8C zR5e2iLwF{L3ajOCRA^yWB1Rff)i|)1R;k~unoe)oq}!3l#7YC6 zs6NWt@A5F{p1k$BqSspgpn|9Tp13djUvrdg!5rn%O;5KYO;IvR&YKPMV$vf+L7b#8 zs&0V7_Fbh!Q%x0IY7Z0d1dWsdSo@1K2kCFCrZe%`61G9kR^cxXm)_oa#qmz^aebG-N;9+IqakT%Vs|eXnnt zhCS??LJH7m_~uro{2}?)(qFhO5+xYSyvQUNTlb8&*1;?Y5q*l#K~)^Ay5?3w3-1~8 z03YUc=IO$z;T^WG@wY;k=QRjxl;Ko!JJ-BROc>Kqw5Bj8HSONWnPsCuAG+zJ#~U&D1*@_B{pk+ytkha9gES5i{KSb(v-i5m-BLll<*)Yh|~V(f+?uuUx7i zuAASA`aY2V0lCDbYK*?|g6OJ?FXyCSKU$~yK4;FoP#aIGdWx>+^NuV#?aBe&#gSgP06|4$TV|0&MYg`!B zyG{Agb-A5K>poDoHuu47`D9RqnlZ^#v}EQ!0D6Rkrgll;-EcgK7wQ+Fb=YXlrgK0M zPnX6XK@}#o=B6g&^Ngr77Hk85&gV`-4!N=~ME3Q3%q(jAZZaJ3b%cc8fH~=c8T6H4 z2K_x_#wdTH3#5U&6u!6s`#_jYu2E=jezZ6qC84TLK|_0ev}$3@p*yVZNc&?ze^X5~ z2<7XhiQ+y$yoMifnI$Xo@`A^HT|D)7+5M2h-drrnfcConMt>xxFs>&KOw&@4GESAL z3(>K-lHxxS^6?p>!Vc*^A~yEMCMeIh+3)8M6xr?XKh?-Vc3W%-6h*MjKmtQ>Ru{d|((5kmUABw?Tn4|DiTmk+$ZLIpeRirJEu zt`(=>RtZc`OG2kyBli|N)c#J|+=hQLo!ph{{P2PotqNx@@( zzqxy9eVpYNcA2+sw>2FSyPlCjquXuP!swr<_w=g~xkUC#_B%E8 zkO^(cY@97-P|Q(`Y176Cr0&>lAg)(;Elhng`%reK$!$ZIxzY5w?-i=Xqs8=6UL9cK zoLzJDMmVkcVyJy#AzH3G)5%qj;Z=^H=Pah= zV}DO)4qR-oF0tZJE{7gN=$8VZN*J7`1;t=83J?z$#>aB#0S1CB>g8Lz^r{f6T?(eI z$da~4VPjOaP~IG-9jgl?aN&H`hON)NUb7MDO9e>>zNDyGV{NeKz&w&MG>)nms2d8d zFtVt}_7K#7>X4*fUl43)?plP9Do)Y}m=ziWw+;(83VOze(CsA3vlc#Q&SudA-2Rs( zBz$E=FjgNZ4U#~El#f|TXohKc#sY-7%Ib?utM{e$mjwYvGmXdj5RO6fy=#SemWVG7dOUY)SY1>96;BXn5=eN^MpLmC9XrhwQy%P>GPMnty5?z zI>0}y;yDnifw=7Vs zemw0l?un{bbGM;Soa4w!Bc3FR@F%E_EbDHyoo)4g_!T3zdBD^pZJA}SL0DmpWgbe- zfsBl96zM;6v^5Z5Fh8H#rJ=W8P@C_eP_EnSphh#D_)vQpb~wPG?S!sr`f(b|-PM=N z-kxJexRuQKs%vfx49uaH^G&XmryGFbkUW*+{7p1!t1+4A>J%`LS9rY#Ra+o`Z5X9@ zfzTJe0mfy|FJmu+oY5XDmT%O`6690P{P_2q#q1e@kV%f&^LlzpG}t99T}Q+IM`FM+ z!KF^%eZ%bmFUmM^tTlapYeY1vL`nbHz&Ai554-gIZ_i4CzAiAOBqd_YoM2Ttr=5x@ z%x%A*iQCCoRaRJ#HQdhnS~+JES_o4J3?5`o(i^05!K&WK_X5Nk#Mb|FYXtT$M)q}1 z`xqf)eq#JlHY6NSV#AyV32lMni;SmuJ~=1cPL|JEh3G3`hP^oHh^-O=e}pu4OiM@W zAFEsXltJuljCHOH+0t8soa@4Lc9ct`YK(tCN+cY{dH`j zW8jf;lymIxEQV{BN)Um+%G$s9dzO*N6IBnv%&XrMc6kr-=JZrPZK|u2TECeg9o;7X zf~Xf1>_1ZRJVr(LIQ1UQ8|iUjJH@s+jvI`K$QsM#_x8f*CyugVB*oRk%a2_oT=v;9 zJ~{kJ;6Qc!Cwd-ex)-lO_;~-ey7U&F&+NTo$c1pu$fy2B`V#V<6Qb?NkVbuI?)u~& zqTP1uV;KT|w!L2@(JU(k%a|3Jl+_0Ft*@;Ls~N|CRT85~9m9r%XBMe*a+$W?7L}ll zHC*&roY9?}g~Z|o7^XI8^Hkzz=)6H z!3=-y#|=8)6*it^IM$yvt&6Lhd9?Ldj#ml`4ank^<|tUm%Ej>-o!abwigmo2I;DNy zSRXS|1z%f;OpT$>JXl?(1lpz8!i{g?+&Rls)W%o$NtZKvZ;QcbC%x+C^C5<5=>xUb zCAIGbKdhoutR`kKGPIF-JwujWu3--*7P=on5V#Iu)^U7wENSY+HIh0K-W`Z*=8INriG}2g1ok@=oS2x&YP3|0~+z12UM?;O3r?m zJL->q!!k6VE0Xc2p<|DT3^Fo*G3Z^u{q1c69%mg;>O}9QqKc}=Dc8B{ZmWACx~wa> zcV&+=vZ`bXc~b2tMtcw=dWqdJLH*bdvL3v-r=JQ4Tbd8(bfWoow#A_Ry9G{jl32ck zUx-+L^49iB*TAMsX9tWLz#mYtorD7tL94{Bt4wN+eE#6fi7IUi3MT~}%VEO5Tv~mS?(h%%Qy=PI!>KaM_MNGOwJam5 zCKEk8(}aiw?o>U-nUOkQ4A^>Nj5V z1uoHTFt+uQDwKS~JYeJIVk{1TT%1GQa~}_H_((e1r(#ccfR0gGg^{gaB}vM|!=3}{ z@r^RZmFUq)v2lGQ72#A_W^I=++$zJA7zo~6t}z6yJbGeC+%a5I7Y4XK1uE+8sR=J^31+8_2XP_H-jJE017>nr(a#`EJ ztQ!>EC>iAMWo>USRUwU|?kXAjhE^|*Kk^c(sKK^&EWwRk$ys;Q0w2DA*qM@HtQR`x zc>%BR^o}M&Z02;WT8-~BMEQzc=WB@6W}i(vW#~ikb|2Pl*4<@Q8$=5uVqu)ephL+* z>(|BML9!T}vp}jzYHkZZP2TT{(Z?j};q)w!p48-a9*Kar{TApU;j=nj zMB87+T0;de0){N^`z~=apMlQ9kZNJhqKvJCsm@Ss#^;#utER5Lb4AT3y$tP@@VJoJ zX~)iCa&k+Hm)J}@JFX>HT*9GOteD}&$v$-76f+EX=1G=TLiwkl?>*o1fBHhb)|S<- z!pmrKgKwA)HrS@~7vh^r6t#x#R#Hv$u~02k;e79D zkYIJBji4YgDvXv%O-Y$=`wcEqsP)*keEvWQ8wY?M`0jWBN6*b&<2UoCBn{&v!yTou zhzeEz?0gOTOGuAZK7W0>H_8@v^Z8&n%b8_ab=XAqmXW4DhNgXEVZGb^)7acEPo?u> zGjpSa$9N!!ly_U-s!*Kf@pEu#v3z@}gU|#xpL&kM4!G)ZUvDqVZ`=a}gFq zFGeOW>PNLEBFFc~JO-W=v0}AkDqH%7)q>~iyu*vgnoY8o#|gAWe|1Th`;YeF^rji) znQEPtb~K_S^s7nkLSufqgYl$GJ9V%6pkCzbZ)#8OGnO<$z!XYHb*O3?E zysbBej@#uQR?h!p>FU|)S}ib9R(5tL-i$FIU)a#&((tkdd|iHoOMUgQflb@YgP|{Z z0bZ-wh5c*`#@1xJA9_;C!zSTN5O4X9P$eVOmP({W(mt<~#28bF_z|W^G!gecHOpwam9b!_ zp}S$Sn(!_*eDi{>jZ*Pc`VE&rV6;}-de(<{NcL^(-czIUs#eNNPkD$t{U&B%xt4AD z5hH3Tn7W{qDwcd!dW)!=ZthInM@#gRO&`7fyRXns9h*lkMPG{*`(SHjm4HdrK^Mh?n?tKU zf%Ol-DIGfA@w7otye;tnDIbGHY-tD~_PPxEkL;y$Qv?@#l?y49>7vOhk=5w3f!R6b?*dD2elo# z9iYOPH3e?R89?{FqZaP(cHu7vKl*an*4x^76mV)hD)s5I84h<5 zm2R6Y@Kjx9Lyea8eNb$3<-U@=4Esuf*gJ}?J6_5}(q_6CxqfENoxi#wYe>&J?6Ai& zw&fuRxB4l1>>CBb!=d6GO8w10IVr(^$(u)RVhgv1gMNeQ9U=7l#wt=X;hoaH4^d{8 zld|rftnen-k>b}!5KlBVA9?X}FA-(Uqewj=j=E|?GaLAY+>Yw;m0KD`EzL)6cl51{ z*V;-<@jhKRa?F}tL-b?Bkcd;}_Um5DC{}XEMG-Y)Z+tMq)ukv+_TjXOFb)sfb z!C4H)xz;jbC1b^3+Na{g(VXa(b!+g+5!D&q7(Jy}Ag`tw@P72dMh9~tT=Z~F=2?1{ z&ugDPp1CChNx%CZc_Hzf6>q5gTdUNHsPdOr?Cafug+)1oD@kMVl+}n=YT93e8%qnO zhyYUjc)nL1xsVgO`VR5XS1Cr7rtnI^US#;}T$W_r&)O(2SKzH2{LQkuz^u1zC{!8# zR=#)qiUyDO>_jIqZrG)F^&YN+>8%xz!%J4Gds|_syVYx!)Vv(Dnp#_D+D-AjRwVX* z-!d6}9&x%5#9rnkNk-FoRH6Sbj>e$dmgi*F;~TPP$4+}Dq8I5K0#olLw+o{gO-jYJ zlSr?1`+_2}GBR3e16^8^1|dr4(~ykyt&uVdS8a zM*C;SCpoRwK#8)2{JplZR(81;yx`Vet4jeYPPqfNntK=_NtOv7AhCs%0!mY{9+yPX z{C{t8o$4Dk^92#a&!eH{o06&3pFP8?oFP5fWHYld;j7h+w-BVv-)y{4eIn<( zM_q}^TXT0Cv)V^WBAZQP`PA?y!i$v~WPGv&Y-}wk-)KNO2HLD`pWrdZ$USK{+N5D> zh4C2^&2?Wi%sg-y+7mk)I&GhdyfrXTyyyOpO)5Qh{;~C``4wwr zUwd`w_1hhtH%8?~wA=-I%-Y%G)4TTAVc^w9UwI$oCzStS=tZ>i$(j~k5P)>@RazSE zd7P{m+zgRE?y`p-8FYNU$Sd}RC9d7b_=GRK{;EdNl3$pKh9Lp50Lz9QabE9Um5PlH zcXA&&yLwMWGTlL^T!GIJFW0*1|9J3KMishp*vIzuN{^z#og?&f+KP%=_IYQu4e}li zkiq2_{tvt#$RLUy2J0w9j z{}jo~%evw2s8d^=afh`v-nlEQzJJ-1O=gxTq41odr?(J3fx6KX!U6IJ6!lnJTW3Q! z3)TVkfcBgc)o$a-e-F1IPm=1a)zCgkk zgsODt`np4Zu6u}!GXA3@T!nR8W1G8AGg4~LJ3ut@*oSKUBM&oI zJx_AHj^ck9Cf76&8Se;fLPBOayUmo1#t(Te(b)#6Z|ohtV#Qrg3&IC+7KR4tc62czAz_%fv@V@~~Tl_p`f* zsnPb+71SO}?fedvy4mhWnN3$lmm;A@HnqQKq(;XP^A=XV3s2WkPaz^eAL;X9zO$Qd zY}2(Q zZ$-6T{P?zVu=*_7HqWp8_RwYyA=-o+*#SuoL%*MgSA|Q62Lo5) zM9?~Y<#L0em7}M_&W-9OYu`@zl5TiE7+z!3{YOZ0P(Km}$tbLm_r&BqeSK_X>r>L4 zYg-p*2~w}78bAx-rFq`kMpy?=J0EF&r(tj7VxBWwh9*B;TbQetA&@-)r?|TE7^n z4r8ngdz;41Vtt2c&O8`->lSyjL%ZWnFzSyg%=G+X;`U03#zkT+y-7S669TU~O)8!W zxNMmZCNL0--z`-+kh6@kqb-MSpDK7&sZ-(VQ=Fv#4qvT~7o@@Xl)cApor^6}Uoa3+ z*ZPhT_i=`%`Cqcn_R8F1&Qazin_M8_oS0sjPw4L?TQLoQq{4`+HFVEl^$-~=CB`Z+9l~|WaV%Zib0?lx*v<);E#SR z5hnzJ430Q_tmBY<{VkHjmTF+K2|ktfy7K*~L(!KC1>y<6T!6zOyQ_J@O6r~md_Y58 zq_@~+6g$}0Iu(Ek-m6YUO?o#hy#lKg&ocL%Kz3&4##d7#gQ3{+#V-`jOWhH>L6atx0575)B_g*NH@lV$DvSlN zS8BB(Mq013V3KX6kG;0)8Fh4%$c0n+gA=EHeE8p$EVO>HvT4b1C~e3xBDG}e}*%o4g@w_JD@U212flv%Z=;=9#xg}Z(M_YH9!7M(A_6RAdOtR8#*Va0mrI$xSKE# z-=H3UfD~ZoQkg)@I1dS!!*16Ald)NEF7phkvwE)=E^9-7+vIvAmg_WQz>%<3WQbmA zn}p>jsZks%kz_wS)e;dmvSX&#+P*m@;nE5mmv2JW&p`BT#$}c77k+eVE9RH_n{(kE z2k?p7dlhp>`+Gv4JJ>5-8J78hLAyU=5JyS%$v9+rZ9(pW62eRXS%s>*wp6P_(x<>6 z#IW=e`LI~=*2^LbZYEX3n(n^=1C6_zAjkyAK$X(n2Cr`34&vI3;Jm2QE7ne~wL~24 z##YFmUS-@QLwuC!t-Q>vyas zJto&CA#dN<_B2MjJxBmSL+2=(@afG5oPo$DmuH-`}8UJ z8~F-0fh*CdSgKm>6K##MJl z#~=f)CtgY2JCB_;U_3(hX17)@Do{A_&>B>^rA=aHZQhL?m(Ln?>E7U@(gRluCIiHa z^5reY^ixx1YVfm!DBX!eZhNK$-xmJv!eHeIT5 zd>yqpLXg8LYN%h>{9!)G+sa8YaWgzL!7>3mD>1tu^>owVTb~6;dcSju@;rZ9j_7Nb z)p7RlX!`LaWIc(`9~&Oq7@d1j=wqH!=3o;ANT`7OV6qaxlYGd61)6!aK6Yn-AzP=tShUXmzAyMoyN`E2?8%9m2R8@d%W#G}$9 zb<^|J>xsXPMrXC_;&GzR5oG{iB6{R2KEa?3hC}N z{=IG-4H8;L81GuD!W)}n+lHO*e;8gkW?6zyL+Aggak&75iXn$DuCIP>_&{hfgY*`c zfL_kMhq9HP2`wT+4Dg)?ee%1Pi#@HlV5Y0EVm|$c+sNN#qwGw7vj&raSF^b6ysa`Y z<1an~!o2Qpogb^R-S)-y3v6b~njveRa`relx`n`vRz54#{}pxq&^>kQHeI|aI-EWi z%~xPXxS)UTBOi2xF0VNTd_oxmGt*eP~ImRBzxLBq^t?s4cNqtj0GX z2@F+Dum=#}CKVbggru?{Ca=@-dBLyJ^C8W1FUK@=Kqz1z1KE&do_JrQthL;IyUV@c zPVo{ux#1Rd<&$tkeBgRTuf;g=!o)0YL}9l3S_C_iJy8+q*2md^Y(i5C9e*7p=9e_N za5XPGwWQ>g9ipDuP8$XM7LrOwC+SX3BOL}NS+fjvwY84ojr%2L=VZKKy;sj>K>8~+ zD%|kp0B`3Au%@)byYO}-dF`^#5}9$e>UmIL%; z_)w$-7#4Fj{7+*$cqOhtzW@>9lCClBxSxZ&sy0CB!m{u;(npL zyJ(HAX0b?Uz{@JXNG>8kN$`Aka2XX?A83diT-~4G0&J#m;8stDM27iB#3}U87q%4o zD~Gf4{8FoN28v)N(>5`!ee4UiH8DoSbbLaBzit*1p*nbV;0z`$<%eW5pCk4K#4x3r z#i5PmsCdS{tLkdK5(^p6`wdXM8`X7odQ@ao1>9$IQz8a7JjZxs9ith3|JQJj0<^BF z3WYs?bv>s(%cuye{wi28AA>1|+Dee3`Ypq4LMpLuD>NU}sU{-l)WuyHJY}&e4}RrZ zwv#MFrVwwOEMD?_NjF6@oJbta_}UM>#H8`+ts?W>>Qu2T#|yj*eHy8kDE%U1zjDOh z+LlYO;|r1{3ci3qd)b#Mt^Pz+E^dG14eLptR_KSAxKjO71*_4OSwI}Ncc8~z;_&m2 zlBinv?3Z@P2xA-~0e6k4hA!*^}NQ(31nx;H+}J==84?qe_x^fN=>6Q0vR*w+gAxIHK-hO@NQ zdl~{ywCSi&s5oJktZkM3Vmr7NRM1$05uob{dh<7iE~G2wZA zs+t>C1rbpTNd#L|04w{Mm@8nvHA8OC2wx3ZF;g!h-D!m(dhRp-dN&r?@L0~$`{PJk&+^Mo!r0mVWS2SNHXX$!LRyBSC-<(af$*lcJ6|r;xcD_E9g?h4cI2Q2 zc7Ay;?0z^kFSUps?iv7Pq>~8-u~|lp^YG9=)hwWdz8O;^9?ec*sL?xydKaJJa{02o zx$6}lct%8a{Gnk8B|W2n0tk~bkRg7^`ZvF{9U%cb#P#QcH1rlkIRld}NLjaZJgR$b zJhL%Mbb0rFRRWrzG<-&lBzk)8Y@tWZb*PjihbeuOt@KAJM~U16oQxo(O$i z0;wJu6EXtqs@p zFKP!nc}^Kc9a_A_xg5&w4MV=`z}&KoC0Ft{7H1rWSgnC_C5}IsW^S?MOt&*)t@HY- zO8x5ZF=UH-hO|A$&uZy(P3Yug5n$fzYyKYA)@Cl_ZjjLJsHVvePc(E^KaQ{FZ6*C$ zQ{u2S5h-3WmK3%5%sB&JB^B{lIH0W*3{mVz5=I41%(42a{5B^Vgaf|6n z&e`YvRs`0oJnWchx*m2dLc&V{9~RjMU5K=Ha`(CzSVRGT-)t?e{Iayhf~J&O8&=7u zZBaiS0TXue(LX=4Qh7{?(RujbtJwJAx64mdt4i)zn=#_gF}LiGLWuM#tJy#Ln|89$ z|3vQ7e)_vL6&i?GZe|N1(ipU(KcW?_hI*W)Q^53qSs38RLG5;tXYT2q)7f+H42&RQ z@;tx3Ms`aa3~vXNio{*?Nuk9@8r6if zM(TW6n-kC{7}EF4u|&gR0Wsy?^scb%L)g90?=OcVnZ)zr&m2-R038IlS!No7vi!T) zUAR!G^wIQh5NSTzy1`*9bCVEMUGBUch>&^MUW?xGl26-xete{HO(sGx3bHide|{ZH ztBtp>on&NcWY1-_v$NF!xujnA5W&1{qsc;y*$iou%KSgR<@b^bK68F}#qEuQD-7+w z23a0_iS_!wzGsCoz>HOb(T|;w!MwM}sY~#FZ6}#ppOt8C5d*O;&0s49^{4i4f~q_# z<-enq0wSM~(5YQ|xbxHH-*)ZV&TnSB`CB``CH(rI$Nh~q{-3=Q?7)8nUj4wB+Vw-8QNLK~im4(APOqwa#d7(Cm)LyX6 zcUCnwcfd~s(}^MY`%_~`r%}=tfI8r9>n5Q7D?8{6@i(tYX3Mq-!r+k_;2_Q3K4>cQFR0qBO+L)@@S}d}y}AeT{7-BZkBW z)ONlLADaza`@~ape-tRd!OHdMKJ|#sGLjV(gTY26_!oT&YqE^SSMN+-5R_*88@;x+ zKv4WMx724ZFI3qIXm6iB2*>d)>|^Ge9~05jJBOhlrJ0Yx`vHH69*fr4>mcDG4yr*i z!mM*Jr#MAe9Hroy8>0B3 zAh|pi4b7R@Gz$F%aCD)d$MH^c3JLwXtGMe!%CN3@{@$2l%W*KXUN~Pe!?b#&2Nb%@wZx5nRC5W- z;I4jnHxM^fAxmBIspE$A8JoMV<2fpi?G&e2%dGFC1v9$=WBj+>65igUk0HR8iRX?G z(%QVI( z3d`Va!c0z_NPAuTP&@p91j=vw9-mh&xvn?~Ka%d0TKJ}|2hQKju8MN_F?^q;%m?;( zW|66P9OWr9szLx}&uqx0R$r{oMZ~+L zfpGP`0B&FoKYG!de0JDN8z4v{v0r*43}pD@4HaJ1JJja_-sd}^#{&~nMM|2Ja>KLi z1hr75h~0Z<)RNVX#MxCk=ctGxKiLo=qklM(E5G)eDn(ffTsHZ<-cp#inH1mh@_GxWo&r#vzhW0{-pGErF?Ud zos?NF$T5%lI^KOCVZ{w!2G!dI|Eqf`X6UbEt(1Ss(Zbtcb0& zh`Odmsh1QizZ;a3^uAETT7#O4p@{ASgns42TAP_>3OdTIUkN|H$U5Xe^(zxCr-HW-T|TR$VvGc^KU>M$pkig?@EsFor=z(nexr zW9B}fpMso0`Z8rI@AJ2w+ZhsCdjuEJJA^hJ&b1|zO5S3S@e_8Za z!PFC?#2lh=sudDY&)}6VEi?JnJId&X8}016)fdt86N`Gt?O3-eOPku^<=H7UdB5pYd}(~I3Xyh-fon@WqTLOH%6 z0zRswOu%6Tf9Phdu{vANpj+T(`Q+!-+z1mx+(jUBTsk=sjiB?ZS7rA`Muj2ZlXg;J8eqGX)Bg%N=Lt<14*r>0n1ys7 zX=T24g`m%F`JN_bmF#zE(GX}usp7wB!<_^y&ysijm1mBL)Lb;mSqjJOCrOh3P;}<% z@~)bnUVP@w;tZy1>n76WtMs1bnhDRVNpIDy*?b4q?-}iHi z_ZEQ8RwX1++VlKsWZG4QcWsBONoP*PC!qge2PT6m@+WYL2S`If_XI|ixI*b~XJaYr zi>g?)w}Sn=o3zWJ^E!RD^?DwHcPEos%JcCV`Du2GkYP}R#n}QsYD1TTuJY6B`A}S2 z-^1p5rZp&lyBSnyx|=8E`8Wll=7iY?Lan$sE3hdSpKEXDt@Gr4VpK=H#}DPQ%%GHB z_x;oR&VyBfTFZQoca=)5+Z%V56KR`UiuH#_Pmg>R1}pmAcXt|EEv@w*fo_{}0du#< za%A0}=ss`tL-T51r34c-jou(HieB3gPOf*Wi7V5Z_xQ`;Hz@@+r>pNWkb5qH_= zW;+V7!RELiKRR!kPTy(nBUF0(-;NVxAZHKg43y>IHBU3QfmEfwD_Mchl3&77suVFi3;)>sF6NA}8U~emhpD*y>Gi11>20 zkDJr$x#ekw8hFOo^wn?P`2fc=&EgojIuFIsSKv4Vuj0CHlEFudr@ee2D9+!$!5dbm zvNvT;;F8GC-d!7klu9)=?ZM|`khNls zG8P_s^FOLcXc9eAF?rE&$FUUt8G(`|?P{?g1K#E*m7l2gIv z2{v7vjT)#Vs8PQ3BHTJBUu6lC>6Y>Eqz>*bRkM2gJ{1Fq%0_N`a|CG8-B1NG|FB>K zMt3oTE^982qR%J%Ag+d5DoOR-!B+mUD+zPi8WooBH`28$>LO+ZDJz4j=vTksQa)PtCD!5N} zy3+^=z1XDzK^~JI7+o)HKC?d1vvyiZ2wmS5ZFju`1Q(1^-;PgOgp}4SkP} z=!$Ep?qCHwUtzY(f&1O}pFzA(+y9rJmAQ<}g3Mnkp10=h>D~cygnrp|P0#g!z95;h z70*{6QUA4@f9-OE-x!*vrHO#OdU_&E`G5b8hrWZM?>{R#`>yo=Yp=?7@73&wsG6&w z)5_o`@4~+xu?yA_a$wKrm6?Iv{6EjsmxALz051W-EmU(<&@V{n=Uu1%<}m0&lbcH& zQw!ZL8_R*6%7c+t>;=nO8%i~<**SpSQgGM8jz7qq)srULU>ug>DSG7KmQNS+G+N$bO;Uw!mAcSydaI7q3X{n?8H1sw+X*(>x~9_F+UlAB zFEORlZ3l}~cg*CQe*;DAgSL9M6EkDM@;^s#>Zg7`MZa$DO1l{5@ep`e z3avtIWv9`WAZtFo>xM9UoSv4Qc&^5wor2+#0Va44Tv-+4KPu*^QqZuVRNR@=XV9IN zD5>;$BnB`q*vD@t zd_xF9JOF5l!$1CRj^6yLtNnN};??s?6FwHiM7a%n#4uXH_tK<(iSMY>QV#_t(|`5G z`ue1H*d#sYp7D(^2MQqU4L;A>zfv`M2pG}jKXwV^yJ0{F2szsHr;!Xb?ejNA?AW{F zfnJD~oSf8A7qG-hE6v!mAHv8#|7jB`5Wdef4UQ0}@2pyGy)p1ydy_ zyE_%v6U%%SeZ7(ZAR=7c@n_3%Rd5%4WVtS0(O6s<`hEDk4mPwv)Ih}t;quSM3)Zd@ zuuFh@0#I)ORj8y?23oIA4(j#3+nII&e%e!|O=1>iWU7LC=(^RwV(St;Q16YcHp4mC+>G9(N+Fm{s(70E!fU;*!l}=nXHIHI)E`7#XT{ ziT`hebt&wvN}u;bZx_9e-80^QLWbqQjqwVI zRIz=qGzt*A?yXBORrD zb*dKj6gcb`Yl4j3Rg68=)f~YcU$0f&@U?bh7j1vrwg?(AK$f%v84Vp|hDhd?{n=Rq z5{<1w^yQq(Z>w1Ok=VyMShDr6o*ffM)UDYWd}%5nd&i6MLpW!xGF`^w^x+vF`eo1) zG~KGjOLm{D+RC>kIgTP3NlE}Db>mjeraF9K5Z!6X=r*syb-BAWvCX1rYO0kPE$z4m z;_LuVSwI=K9{5_~$yhI~ty?r*`NZeN_wz385&FF(b(iFyA`^Tr?su$cx0ep99eul? zyeMD^vc`*Bt|f~HTO`acO70WBx8tsFkLD9#g!5sUdeKjJ5(`OAea|5MzPuViF9rn~ z%6)4BD|6U!Rz2@0#aWXlY0(0{SFp$v0Ih_xc-0ast&SvL;PriY_hsvXM(adDP2YC# z!#El)0vZX6mEkN>2Ax1KTM=3@EJ6&can%#KZ=@IUfAo@a7G~GJ$jID_eUU`5E ze33)*)3R9<_C65)NA-d;g#I-aM+wb9)>1)KjfR;j~sMGNdgkRsxgN83c z(^bIgt1a?g1;U|rb*Bw2cQ(>L!RzCyC0jjmO&eG{^+rn#?6v~%4OY1FS zA^Eg%>Inc;pb+nzBLCs7jUFHIl{Sjo*U7mi7gJ(lQz^Db$lvDozIFn0197au?lw%f ztAeGa24HJkxq{0cIRW4%?LG$`)(=h;88K$(x;n1|WrNTwkT8-plImxG`62yS)7#`E zH@M4kU{cp&u}+E;urxhxHOh$vAYn%veD)?$fS#yjt+u=>W!%0fv;HjRwo7}3+qx&K}Zmcx=Mc)COLi;*hZzV=F3o9YvMt+Cyeg*w4 z1ZpSwr++}D19D5b-%J0isZnMKKmA#;e_yaSQp~n(fqp=xm17 zmQLX4kKbE_xi+{VhYg^J@|$gzBzM`$qzBS2i)LC7bQj~TsCF{6)=ZeKsyYE-cvl0+ zZ(H^Dy5DB$^-tQl6BRG&(KBIg*K^%`YC$4ONpa13lfs6u`+BcsKTd>%xTvg5row&*PXXb zIDww819j})sDw<+LfOlsQIgVyPF>De-_%y}YK~Nsvj|97+Wz4IvH>I{?i#!JIbr0X z#&P{J<|qDZquL5Geq~|$EuaH3X15RF*#vE|!Kz3Y-+n1DYA$C=e}$88=?9S; z8d~F`-0F{>5HB;3GCbzyGV6(=Q6u=YfYX7mslTI0u>F|f^StYNi!=MxUTFCR>y z%ls!v_7#UtI2(~`#ELyPl#PTefup``heJ%#%2~G|NEE#@0F^mgF$y~54?9+jnAJ`} zUn}#Le2<{h^xF?WL#h0nS-c*){T0 z6XizLuh&a6U7brCUsP2%k7$_ANXu#jHNJyCPVo-JJgW}T3rt_=KOq&p!PgZb^|d*A zBDSK(5LZ>56SA#IY8x-2eyzY72UYyzkYf(L{NA}W6*dL00Ml;f`#Yu<&vH8qoB&zA z_pEqSL`Wnwy#sSolM|1`iiUk)rO+{;_MdNvrR&{;L-Jh?J95QVr4}u!1ER%rX{w2N zUT#>F;iad?7X32DukHl2TIOu+PvrKQ>`GAcC2uG8?Cuy*t@54YSNdrFJiO1OH*{3# z2?p+St8MJksjIW2_m5=wL{zi`tWRhs`Q;I4AeIqfUluIW0L|;;i>^5>#2g_0=637>#saSjy8TE6m{PfX5xkLHV-&&4%Y zUv-`^;Ks6B0*WjB(xQ_Ro%as+WbXAeM)(0{he!>&rMy8ov%oB*s$itX0;tcP4GF!Q z+X2O>MQKG>K$ey*5xZW7kWCE4+mVb-_Lk(dm6duH!d(JjKM2d9b$rjMQ0^aKdGWC`W{TtTL!HKt zA$Jcwq(rT$II>5BU4Pwc0_YBcR|Pugu^?)Ka&2MA2hUCDS0{>hlu0GC27r zf2*UC;CI269536PU04=>*aP`;s>JszPh;dS6?TAz;(#;abX9ygh?<**9gi%Y)N-e# zZiR%GneREyBwR4K`s#`GK%KD>!|WITG+~$TrTuX91lbF%1&Wk1Hb6=f*Le)_nw{k2 zZ-_z-3u!|)Rij`I$!*{2xPbfl2fI-#uZyLpomd01`FW6fdPaE7IDe_*U|=;Gx(B7H zBiduXJ+}+bpQ>1iZt|%M4qsLP7~X(#y3I{z)h!QFY&cUWDSq%LjHc_v*?he(l1Xw- zq;f}gba-0#k6FY+mEojYVaZxqoD+~k_RwESTjiA)UNw~3!e5Cofoyp6t%%?DR<+r! z%mgA$Uo)>=EWD-L14xXhby^t{Av$W`4(@OIL|Nw|vY+rH>OjnJDCaw52wD zyIyT|BjAylv8{%NfW|RE>6hoOq2Kh|Iv?0t`OiytjRh9WPde2WzO<^10i9Rv^cb|! zT4%&Pd9)EqXy-XK%V^`m?P;NFl4<8r6Y8ZyQ)~e99`jhu~6V_G}d!g z6KwcPL4#rRSWql*-}%Y1&NBlM~afLB54tf&w zLhFVsblL3nc5m_||4~?>F>@cR{kefOvF7SP|xU$yyW3AfAXyaj1Y0TP4j z5B_J?u1}k6P7XN(gO#Yw^Z)~@FXMAnL2{6fw1V93n>DK7R(ckt{AhB>Bdfb+{M&p` zP;@zEzM?u|@oA?4^7P^g*I1L70IR@yjHkU@sIsI6R*^E=FpDSdDi$>zll`28akf;3 zjTtYu3S7P~ybOqnI&x##)10bGS(zdqnc>0uZOKbs|7^t zhjE8Pvsy6z)eDZ-UhPJW8k{s5S|#kR`pWG$W}W5Xg&Z0yOx83^Se9IF|ky0C6`~QoXPAQt1gdy{~I;WXg{VUeI+`<9FZR z&4^`z3MdgOXYh-ys@r@4N@Kcw-SGa6*oDE{{HSs~0x)Wo-%-@~^-foY^9XcYdBhV` zf)$eK{l240zHAjo$*9_rg0jz7@~Is?vpx;x7FiDj=c3mw_+?l8yxhY>M30PylQpje zx5m_2C&uX3@i6R<%z%rtcsfZx;#iU9qx)dbPRfR!TpshD^!Im59YX*T*}bTcl`X%Q zof?qbcMtQwd7A^;Zssf-Cft++8-m zU~2Kt(%jx;FhAEkL&2$rjTP7(I$r>~aTbtV2vtckvN9o$LGkwejPQe|9O4U-Foxdl%v-1V09A$c1K(ILydX_zO7I*4sWO zerO6~3<8e4rsbxVpzp%sb(U&dJ`49-x)S>Xde^6z*e___{xV+PRNhHS;#wMri9^RS ze2fmcmX1_kExPXgv^&H_;_e^zyS2k-KDc#RMxE%<$!#6D7=;PEoDPq+*=MPfBZgSs zTiDewA75k~=2>MKJAH2Lle$~n;^&T*+{K_|$@h&m%G+Ti$pUy)4#8{v>zpUh`63Pc zC^iDlf?A*~$I}jj+&M@JuJ=phqx@@hVpbM4pS6DLY2|cBF5n_aFdPpY(2Zfg${~kf zJKQobX7{NtPf(HiSVgO>%Y-8eYK=~)e^)Esi_1mMK9YT<$`}!T+My1IJ10FHC z1%!DtHOLpEc8gXAGM;n+3Q~e(y!XD(<{TuXZi zm20=nT*sDQVR<Tja*bu)&m~tMBV6^v676FlACMgdz~PkJ#zI@ zl^yhgk`Wn{u_xB9By|Fc8Ja(Favk(5Bm&qnzRGJ}Zt@wmQVB?Iz4y>2C#`G%lwv!hnA=|DtT*ZSzHb{Z?T8 z98ZWl=Pev(K?!Jpz|LUbPZWaU>ET#^9J=?*s$()c(=5yF_gbpw@Yu@5Q}r$5iU)H~ zs+v6{eoypBKZgu!j=gycn_fK0nt=}&=-0n+8XH74^@{u`vUw_ zI}M~Sj&De}JwLy8k_$HpkzHw6vIf2R^j2@jLGl%7TIR^`8j>|S<+Y8?UWdACRyg>) zqoqx{kD+@!A2~4^AE-_M(tO9n?Y)1B@$w$ebJ3=yRXFD~pM9R*m`nDEB+#b)>vrPF zQG%f?5NZQA(Ir*<21q(wd#XF%#}#xz^z^aUtQK3_A+(?9WmMfinU^jW9yTE5qW76i z_zjdP@_xyEG12P`Scu7IK`y4ZsveXr+t6IkotTA9J*nC3?s)*Fxb7wF z^GuyrfHAAS9^{|ufoBh&BP&#V2qjHiMib)+t)Afqpumz$2eUk$ZAfW8uNdTVp;2Mq zne4g206gWojevZ^;pT4x!s>U;;V(hyg1P>6DY4R^`lTBwX>xf0^yiv3WOr|sVqsY7 z?@tbvo_-hcZ=dWfL(-$E^1|@JxC~9x=HilgldG36dhNl`?W!m)#wwN%p@Bu2KCul4 zlgsgPEg%mA+j*y7{=j{%I@=_7Odz)1TmFe6ah@Jm#b zetGoHQbLP!5>CWKsnZ_$R<5m=?727rG(KyJ72YqJjhPJ0R#qMzs?_c+y9hYAAG$dt z7gcT@kVWEKo36Tie_)SiRlf!20UU!p;Lr@|_tSn}P7|Na+L{pD{Sagz6ESe(;DgO( z3Y_R)BEz_|>v(>C)X_1~8Y*@cIB+vC z@4S`b{+@tq7$E}Cg&q3FURfT3lu}e}+%h=YOLD@=DNCibAnLG{!L()v#*B2>j_08h zGYu-q4nWsn@$C-K3tp?! z4_aSY8b8`$oX`~$!O%RJvsbZyD?!OPX6gb{6VNRQo>=RzQ)?y`)`1d)^s$#W?Y$NB z;nfewc^=VoIa5u56*>oPLn4uEF1Jj>1y9O_pTn`xAM>vCJ~8bD^&XP#bWKODr10{c zn}A1*;!i)H9IJv$=HZUHp?X8odt#RvmYH-3h?iHWIYk(S=6y(0Wj3k%5^NN(0_Q6- zoB`ex8B`;!2LPzk`Nb!dlkMvmn)nLf1!RT$)C+&t9N^rwa{x1FkNbJ?2U^P?J5-&v zq8!$KzF?k%yV=+Z!2`C;kz}`Dxpx<0_&?QocdjkJAS(oP;UA5yI@-!6-_Es;?{rJ+1PMjz3=0erkdidGYFK)Nw0$=1g66?Mil+;5$58vCAemu}K$XmP^Ad7cu~WIy*le&r$22ma=B2O6wla1clinEfRM@OB5EkGdFWQB1}yA3lD@_|AR@> z*Cf76qFnt+WKL|XT$MW#^XzWWr#r@zsx*8hkomZ9Ga=<=r&)J*lvbXVv?(ZJf8 zBPYPx=+ep@|I)8 z#s+GmUVXb|3x9kA7V_JF@Nn_8W->u2&3!rkjo*}o=XY6ehxNexn_A4sJ!3kzIcjbN z6t)1KZo^;@-S7%{fxvpNAFO985_Xg~{ zvDc?lc|z2 zd(3k}?6sdbxP@l(wukC$8#rT;f6c3BHX`-vg*JcZ$N})uvi(#yU7=JqFHI%J=2SYI=P~ky3V?CPn_Jes~^2IDA7C+vt>oI8Gtq76=VPBytZ>X z&)e?y9j;b94+%nE=9!5|fg?Y>S$nOK1<{fY?gJC8{frwx!r#pKc~BAGuH()+PeV-5 zzG2%gbUP91RQpP+~Nm%VCsEn<$<9#$2$3JQbonxoUg%*D<{K4-o=32 z&aYzm08RLVW8sjt;`=IJFf8zXThbS`yr~vG|D_b`tXewQ3r1ln=0?`_{lw|BwY`Mt zN--zZ#X_c!p+Msb?-Ff5NYX((4z1tTST%Vcx}+R*GH0GR_@*OY_OJ6d8r1=oxnc|w z18^a8wS4K5Qq()IrtqQIn^Ozzt|~v)zn_{gi}iQ%$sdm8z9uWB<<@-fDyT4Bihex-%2 zd1tf+EBXP=+4F_Cx_c>)iQ2?VVZyFrf=CnL2imu)H*ChX+$;(;n6-6tNS%-T2~ZYn zfhla*CU1FrUI6BCfGIimsvlY;hZ;WxjVu4g#Qpsw2-RP8ol%^thB*JZ@^YK?cEPtB z$znm}!uPN{Pr8!NCup0sI_D#CAHKD?fl_w;Tc{P#7}8x-sED2fg<_d_Q1km@YC{b+3Y-E0vQ z(V&BW|FDk#<6*6i5SP^CNWRB_7E;L5>szU1{S6g2pe`hp@cK!Yj9&fx5g?2M4O?2! z%JlVyo{gm$-~g!iIlJ-3*N>gsP=vL91dMLmuwQ$B?Dzc}?{59z=IJ(N_wfL`&4se5 z6+i-;7G=|Xemo8Gy;<1w6`Q_d(^q^nBXv_N)+Mm%D>i+_rmwK7x|n*_tPf1h{_xq< zicPK9)QU~5`0p&|_hw-emf6IhHu1ZUCY=9orWJ2xG^%9VqHFqgDQ|~D3C zPw%vx`mP>3tg2RE&fZeOB_GGus%wru981NSqN=Jhw|~9z?BB;PNNuj|*k^w9%D3P7 z{`e4bLwQ+Y+m5mwznuE5BqI$JH(P}0G2$U}phjnVESZZj1S&f-DLVvh z{u5nj)=<#^fA+L&;n9gW-FZ1ZP{i>5bIHzub1us~W9@FnpW(&f?@OZ#y7R1sE!OK4 z8|$A(sh4s6vlk8`uOEEhXbV8#bHoxi-;hHo_@gNwzO&`j0nf{r8l%*+u*YZrIQ09& zsuIU>72;E!uKj-;x^VXDkY=E~XTPG?mwz1EysZy{*p$`>Ic%=2KNMqA6F&%I(?Dz* zh)w6S>8d|y!Da;UK@OYo)(1IkMyG$sVbeft8i>se*=ErEK?^p6<_~h%+*N;&!~Ze6 z>fcVEB*eUC12;x-*F|Ie}#8!N&HF;sq}ZK%ID|jR@;1@ zF3)xT{x|gN)b3wgbx*0^wS;Z^J93rz&C@tAAPNKwQZ1L@hG8)vX2o?wu`Pl9-}ELre#ak|PVf3AA6>8RXBo1>L3 zCKFsECX>gL+zVH6VetD(;hm#V(~vR5 z^m~hK<{9y5vl+69%#%z-SL95QX7kgZX>G7o-1__;;mc3`+gMOzMib`&ei5QHSD$z5 z(7@E6!Z;6vfut@cH{~kJQVS$V6A>%w8XJYbfkccodqeq*9L>6&=c5u<#~W^h2nM_n zSmk}+ZM;a$fSRF>TgOrp=ViCIOZ6HJCwr3Qm@95IKrT45oNMOUnrb13^j`n@YIB}j z6?UpfhFnQ3O~-@Vx$1haIIiIHPfg8S@08kgu(K)i8CkcB6b_hMo5^R7^x)*Ubu`(hKyaH@z?a zyc@943ggS5GVgr&!D{$&F2)P@P-*JIy%Dz!c6#Yz5rXw|*t9pqYM5a-?c%6A5c2U| zs2Q*j71`-asMR>-=?MEQO{sWYvcfiX%^BFq0o7chKmvXs<_QzM8i!e z?mhn0F=vRDj#@LlZrD*fmiwv{v}5_hXm3Q6B{IR?Qf8_kMzp{Ii=u2i`ekaOwB`D4 zsn)c-Na5&>rFIeKKQzA(a)qLW8wb-wRmSTFNt{^|_#2%sG-J5Q&EYq%(X7aBIb3*h z#TOg2Bc?wL#eKo=Zhsi2lY=-H`O;c7Y?zo_HmBTVlhK7&c9in#?-yz8miMIc4QySx zDV3NSa?DsuYYL3KvuSPwieFO%lW>sn|4~Ard z&+kolU3Dop#6%AV>fM=La#+l~CS5h9&fAeTgtZpVpI41I40KTD~nFG#njd(B^%T}Wp}0c-Wf|6q-`h?xvCowS@gydgxWQtXzbv&pO<(x68VHPD`xTjRr~MKqgs zl|lrIJ!pnuY7}QYE>6}SnB2VDaYlha&%9iuH5NQGox|db9f#Bn>Ps@{O-Twn40BHS1@8GOg`n zUtDN~z!FqoOXFdF{NX$$nK<7y3)^#_raHt;`hGVx)pM!W@Dh}uXU2J*$`uK;0_R^oj=MYDj>p95!i{-J zNsDRnia7r$azW>>5V4ae!bG+cTh2c%4k(PsMGevdn)4X?IV=SGZVJm^G?Rj`>)#*C z7*B7b-S(oSK~1&r*M4gEH#j1@CTEfw-fGDoQ^ub}9K{Q71a+ zot8HjDx?&wPk2lA1xC1N21*IK_FKKwk0wn$P!4$!$0SrLR+Gk#2E*NZb48EZsVL~!Ng3Kq?T-8PC93r)aJtzf;BbSZgVa;TF6 za{m!NdwaXvz^(D%!6BUlB(kG1{k)myl4W6EY8pFMG(<*~0De%7xiw=@!e- zLwei>tCZNMgY}g%lnwWuap>I*ao|{d5Ap_;uk~h-1=?yYQA;M?M`*EZ+cwnXyF!!H zD5)!h=Ets>amN@v_YiD#hp{3tncGpTEOM;Jxe(cmxDt|4jIY-ITC{89f|+MBW>#-p zTS?rFH?em&_%0?WlN*w5k)V1vG`G5I>AYu2gom%-vI@~!u-)*9c}68vV4bxDMOXZ5 zqYt}isI)`lNZi{JtkxL*xx_JS6uYc34GBBm6sOB-E@Bv9kw{|*jMoZoq_U1w@IQ^a zi`x=vt!Z&O!rRZw;Jf@bc~4^~^i5t@-n$Eh{u_3$9l4=>)=c- zyyA|Hk=*=91+rMu<_Qe0VNejF`{jE*pdGy_g}TICLY!_j&q$()`PGCGaQT?G&6SXO zzIB1p20`p&MF#vn;bV>ZMmI;1#exWS#iXP35&mDMOA)d+r3Plg0P=`32sRmUSCB;n zmmOhJKFqW_;$3GBN@M>XgeL|6Ks|Bm9TQpD6sKcn89~^( zs+=3M)UboLs}1AFgpEr%OL3qF^su7kfUBH@o1gD}HU}!5g)o%_!L$$^2!$KAx>0PV zi-`sS^O5!$ob5q)6lDh_lR5S7nSz$dbkEQXwLsE8BeGQ);Z{whZtw9Yv}RDuGj7gR z&k7=PPDt(Tjbb}W1EH%+EYIm3_Rz7$@C>JfNI@Y@#^-OhCD$d{*a0ukW|;kqqN zFc2&3@6!|tE!+ePOg$6)BgqA?f&LtI+T&TLxdxNE^pV#PLKHnj9WbZ^D;^*+p5JK2 z)xw9G(pXAO;zPq6*J%1H0;f_(jUpwc5F(fED&$ro=;e#!Ojqql;k^~egg}uV?l#)x zD)#0@NLR;9Q+J^8HPRP>P_f`Fr0J>T(^s=@F)dHhW$kWJ4Y!KZK}> zJ&nHHcUa1A%W~6}=@>RUA80(Yag*R1q9_wUS*j+|&-PZ#H%Tp#2C}E@MR%U|`tG4F zKjpw;I4ZjD6+u?KNLwpj-?tW8LBriuqDu5x3Qd>899F^ zl*XjO(x2S8)lmM|zZ-OsL%9o%2Haf)-DdyJY!;Wb zPcSxVpXG{f@HH1jz#?7>X;+#-(3_5G^+2y2my6SNhg=K2_BP!Srb-~&0Sg@lqv68d zIh&)lI@h5GZw1s$J{=;c2t`U0)tCvQHGd_aU@XkikjbfV??q)1o?j>JW@wxX&DvaaIv=q-&Wye8HPD1Ws+8t#0Pqy6q#9TcXRvG6->}5ra$@9|h-p!noiyN8rsu zaqt$=oHg-}-Q2q`!Imb^%79iG25T7n8ZN8A<1jnPBO`+D9T0epbg*`7e%xX6kAvbG zZ}I2eH|fk|+u&AR@Nk%>TkQkxs5iJ61N>1j92G#$#U#pFGUId=1DbDykZFBXWL8~` zlnwiu-+F2hilV)k+A|>L3+*8kz3_nJV#QJD@{a;J6(Q#9iDRo)g`#WUH=f$COg#80 z_sp=fC?txAO;h5f;N=vl9DjGH;R^eag_f9JL=AVM7pV^!rYZ%mrk`(&8EL5;v91Yv zD-$*KKr&(&JFMz*?0%`=r(d-TB*cGOLzQwIFNyG8BT z*p>b57Uf*|Ba#K-9jQQpt7y0uvkg+u%h&<^Y2>pFmOY_yj)N8t`&zm2#XK+x3n314 z3W{l#2_b=m<(@E>h%2lOU3NCBdh0A(ktp6(Og3DQ#DgvHKrd>E?`>7CT)$!ocFL723I1tPa?14L zpGuEiSNd_VffYT9iEZ?@r%_#}EtOxvwW@tPOL-^Prda2LzZ;mH@`j3gE8@u1f6TnV zOH9Idovgbq8cRWD_ddI7l&VxEE$@t|7&|7E8pQB$HGw>VV-ga(n%DJwmxk$4F&Zj# zG!VBP_0Ju3V*V;Gowmg@`_VbLXx?sxU|F;03?;m!{W-{Tu9R7F6k8IhpStRjcQEpaIeUQUu71akhY*tbIA&39J215Pp z!~K8$d7AqsFX6xc0)L7AE>8Ea|K5Lg;l2v-r;iR4YXl$KJi(?6{@1L7)Fv#7zj`-< z(ljN#6Gk(Q=#s5XxOdwAxm>{l9lT?d`rylmr7?E8s@TG-c~683m${n%(Gumj$a}7p zF4|&5^!9sAi_NQ_s$NIk98*>2=|rHyUY>U1b7soZsWAg%GjRw0I`cxU3USVHPy&WJ8!Zn5Pdp1bbZQ4wXC_j!*B2feU{9NMlUX%#|by!H4w7kIXYND0r3r z_>WHNcTL{&Qt`BGdAFmsGv{>(VYJenm-(Rc>p0!&9CM|=uD-)~rDTY_O)GwAk5Ou0 zK!g}Ztq-PHNnR;5^bue6gR(FfeGmQ?`l^{Skft#ubknA$lN0hg z!R9MyCK1hlHQi}ox&BBSevS)s>)09A3w|ErfHyScPZ2|AQ+0k?e~xaukn;rOtK~e9 zVM)}~G4<__OEb?H>-osGJk<^qpYys&t|l=8B$zu|@j5QG?(ZzaF*&S2&r2F{y2exI zPZm$Kb{QdGR()DziyWn2@Tv>>$k-Gs`x72sMGoE9gY88dq8M*1GuEIDFNzcV-d(V; z9KA1>yF|lHa($WZZU5um!|rNkxPdSE1t3HFPj0E?j4<;e-x+v zjFY4rGF$&ew(iF!)Qvog2`sBS&Fz`Rp|0woXp{f zDUn`R24T1$p#(@Y&bc8)X=3@&Zla_7@O6N2%s6;eee4XP15K*TGu)Gmu1m+yI+8Rd zq}Gd;Zeng6(edfkj=Ti<>JWT&E$347EO(yeF&lepCK;maD~VT!pRSg8&&Va4hKkx_ zW8Qg&oQFLxK~z?w1L2ac3qhU-!PWn})cgI(57dYWgtM>41*&qBeK~92;&$H&?FGuZ zZ2Ze2Za2mWSI)`3lDG0I-KdC$zy6LL8d=~$CrJ7>JAe`s{HK9F-+qb}A$eWTD$02Ia^5n(~NYCO1ZEiQ@5 zyYdkKv5Vq1JoMd@*Gjv96fw34Mtkxu&hiuUCW^^QNV?j)bF;s6 zvXrH*$rMy~le6q3s$4T;B?*A-<&;yX_ z!#AS%F?amw5l2!;f}Y`Gl!YUHpL90es1BOG<7Rp-GyvJCyH zQ!z|`$)y-gCT=lJPWn1d_pj3$zfM}aF#8K8zz2u!dV3F(eE~m6R3<*NllKgLY$Kg@ zw9Jm9)VzOM7XP(P1ja}5;wuV|6IEoA_LqqY{Y-T%uj@X0gc*eN<}GxZP@i7!5!aSK z3Y9H%b~-*Cd%vvu;?o=*avbrx%86=nJzR;6y|LIl1B>R(%#242q}C`+C(+_O+RS71ahn`oY1xp^?8tGM$7){UjL_qYhy{p$wd zLsj9i?Ut>ovH1$^W61Q(gL~vXrEjZDoMg>6#-Q3RNAs+pqtSiG+ErqDw0KF)L9K5Z zy53=RA&(>IZ?N9ni|0RDbX`#qrhA3+b;Ac6Bo1B+<{2HvKv|{3od!B4wTQEs>n?9O zD@3sHz&1W+CQr`TOpCc}yu$T%O746~$4_22I0LDlWe$Je>1bxUTBtMKu9dPj6CAWQ zOwtaLuyNRIc2Y=CV@#%V2Cv6?TsZrZ_T(>>dssO4y3`@gIl~;}m~TnPADmfZ4yBV? zzH|Bw8YEC;hwq3An!$#Do9_pTs9%b=$GZNtS!QV59O;fUJEoGliWJGGD5y~)Xs+< z2bXa~POEt9Zl5owQyZJZI)i1a2iQHCFDtv|@~qn#otLn>DflaYy)XIv73Ylp)3l3T zJw}=^6&1v-g6_%^V8yD3@1tYpT5ks?qXat1Ixxe?kn@e9Gu2HI@Onw8Z9_)H()L-3 zk?^7w&`nX&UAcp-euX+Wv!V9yZK5^p%?f?Tc6ld=tN&W~s;6@R-Y%OfnABfAOSQJx z6LKj3>cU`?L82LDTWsa5KML7@`aCR2)~W0mIAJ7IH-R*)5>nwl+f+?>1K2dp^kQYC z<72&`E5kxM1}0@b&`H<>_e?USr^PtS>iN}hEuFvg`l)&e!@=udoUR>3h3GSEEJbN6 z6A(r>uRWI)6gg@&FX6Q^6!yHe!Buf1$bcpkHM?VuWQCl?;WtbAmU zD>0#37Fz69@JuqArKBe|U+t3cbYQxyd{n55VD+bV>8vbfnxalq6-sTqO;Y|6*M5CH zaNepXZP2!x~q2PorNyy}F>#g9|_H9M5dVhOGvZ9)8N!k-nH4 z>bzA13!#sS+9t5##rV!rMd~dc&K(Am&e#%OW&9){ zns>(Ef(a}FTC2!(WaJe6BlG@nFdMl3`7GuIFMf5JHWbImPfHTz>*+KEt>g*8)A5 z&eBAay$rM)#$9}mS)<#-KPtKk>|6|1u*M9zg01I`6qyPW_ literal 0 HcmV?d00001 diff --git a/windows/deployment/windows-autopilot/images/wg07.png b/windows/deployment/windows-autopilot/images/wg07.png new file mode 100644 index 0000000000000000000000000000000000000000..bc5a81bb3fbe0721264e1a00d2aa6aa755fddeb6 GIT binary patch literal 193713 zcmeFZcUaSB8$XJrLM;NV15}pQ0g8aKS3pV?1sTfTMhwW7Jwg%{fhr;@OE$`g?8sgr z3Mvwo5J=b&nSrn&frKQ#C$@c0d*1i_d(L&8tG%dYSn_9wea+aaf4Wz7lI~x3CCzXfRhoOI7(XUj22#9G~eO2EU;2 zsNgvn!pP&o+zFFtfW0L(FET+|AFV2m3R^=co4I?35gD!KV6+ z{+RaXd1YOHzI-@8?2>n8bKl4;XAwRkwKKAsnC1F-WHFs$`q#@|_vM3u&-3mpzsG9C-#!|Yz8&=IdPls>X3Vo0eI_o1=WG&pFx-zShO5~n@X49W zk;3>0kFI0WF8D)<&;Iz~iNaHV{?A1&X0D4b+k_gpf0z4_H=z3Gk37KOCxe-G3_I#N zdGJOGLRc)MGtpfdU9D7L3UM9%9iqDZahC90N7m7Y`hYI4x(=SdqC;>9nW=z22^oM} zr1$KQ7$d@me_r~OxW|P)28+~Lx-zDw@aH33=N$evpdb5kA{Cv--KmfJ?jHuP=*qCW zn7vJ`X^l@Cu6)%~AW=Uu43rnHTTbUu>qGK`gI#}3a6js=Ia|r; zoF$2c2Ode#2)~@YF28Jy*`eJz+xA$?>$k!;2Bs+AP}gBSv9?%b*uphJUv_uKd4&J= z&Ep?UUMN-vw)64Bnwuzk396%b0=;J;Wr5F zZSi9v>%N;oXH&C?qd{9w1(}Cm6&~_E+(=02BOymV^5^R%ox4Cl@$SV(fCZk`O;>eA z?^^QkjUzYxxd*PW-2U1jLinrcico5EV+qGOXm3t`4ehfFyv&uMCx%vF)r^Zt)Q*t) zQuqovdZ`NDx~C+JU57u(ok9CC%2(4<{@PNU|D1%|Q(z|)rDNNA(MvT&%qxir zWv3-euogH*&Sy8L1?ib)O2^DKV+jx59KWQX)45XS6 zQtM~HOKcz!eNR;gDf6Yz{>KZH>7_nW61OZZR*&j!Zxh$N#S|oN_1xK)`>ve*?buFC zp0du!cc1BWH&_zsUR9pU>3pM4GI91OVfZ-xb?Dhj-zwU{JWYNWL)>C$D~AGcPFM9< zP(YVQ%{MVhdQdJ2$6Ux-5`9&Xs%06L6koF$&&D_-XI-z6WLJB>=Knq%cIvM>hxOwZ zx36;y0w|7(TYr?YskuOXrAyw9=ZpHtIh|-E##!@p|3;*mcUVA~X~yn=X(o!-Z}F(r;Y z&>Kf^|NV@7;-CPisSZwmaWOHGb?wejuJZqB+Gr&HbT<0-nqE4`dYanq#`erTW?+)8 z5ine}_Pg=GfG@=3WB(hbPd!m|vI!4rm7Qc+p?Le@J7xtQzqoyzdNxA$t0oWL`ZUO@ zz04uK|L+Is*OCcXt2%9IoXH-axM654R_#4-t`n`ZnHncN59#mhJWP;|*YbMrE2agt z>+$NUdS*}UpA|Rx5GR=+uYB`8bn+B^{8rZ+DBqF9cE%d`^hqYxF#2yeZ_} zN8kV68sjgY-Ag+kM13lV%aFe|9l3}dCmDFZ_7Vscz+T`W9n{4-?R?){V>ZViA+;?p?l~ zTQevBtkLtj|H9yJ-TYrV@CT~-|7IS{w}?q6u1GAa0bJF%5pncSh*e%y>=f0Nb9KUK z1VGLC8}4d_C)|VNAX0yzH}_51#Ug8{l8pIQUyaO_=bARd#%HeBIU4ow|8a)wScZ-B zmVx-B?l)MKDQ$Et>62j8(ZP}%EAuO$S$9Hhgn4+XjD{`CTU^ZwR-(N3@!VxogEzKug>&^OPJ#kF zIWF>b6ImM%Eat0Zmwyo8VQerx1tGUS9yH2!&XUw&ERVn?Mdby+Z@Ku--*PB%R}LKf zk%k%j*$uKfYDBr`f+0!-|5~Tc!}D3h-5UF2x?XCFXw4NK9)^n<-`yps8Q<;xHWa5`*Vw5Ogjt~5KQ!g_8mof*P5X@u`w@#D8bD<`4@!fgtJanaSLR zWmIn$J-;nB&8mq#gN@h0-fpifZ=zjdTt6MD$iwqA;V%tJVB`eP)I5uPxMF#asIbOT z%b0W~S+<0NNrJ1f*V_1(!>GIU(VZG!-q*LHrJ=^C<~IwyBjU&zQgGIxW)tLI`~_5V zRoBl$eAg+h3rk`|9;^;#W}M?&>w?so>EtjzJXkT74fc?uDx`8VNtX!`>UqsxFdyJ_sW(ujs??<_$qz;j5T|e zPUnn&E;Q(A(6RqKo6{LX9GXQ1>joG1qEWE6)rt7Kdezflaxp(%{!1al7=L$RJbXN% z)azu{Hd|KfiD}4JHQYA3R7e;#ybE^-<z(*h>zCCmFFX^&Hbq`M%bKra>LG0J*WF4G#3FXBH zqb#G4R~v_B&>uI(@j2 zAaZ@|)8Ukuq)0`X$~5M1_kPpns^yfZFy*g_9W4?$GA7s^+D5s}{8CJ|hmYZ@05IR*J!JP!iLLymK&*ELV_KdU(Cg%p8GUA5PT1-&8Fir z5`F3%ApAF8Lr$2QrgS-rTlEElEnu3`?VMQiX#Qh1!q{eyg%HImc&R$%k6{fnRvMTl z>hy*UVci=>SqQ)JOktDEfOX7i(ZxGcL-uhxh=gZoAN8HQYzf5x=JD=vMBg?u>(1&k zH%COf99@^)8B0-QDKn~yTgGyJ(y9G0w_$3t)W)ABPVD!ktalKqEkgQ6xBnj=Nb|-} zhio61=-})?qzz$Lbz6Z+=7SnJ+sZlw537y(wi#Xz%x<}u zDwKyFKg(Cv$b426Wf9W3t@hyCJckdjVF=j~OZgk+ytSpx`WkaY7nhb{X~6z zzN(=C5|2GvlD7!zO(~+lDMR&PGvggnI(k$2Wh=k-aqBkcQ1fB!q7hIHTe(}=c5G*< zHs)$(KmdcjR6L|MT1ok2PUd7Do4DV#Oz1p{o_>!>Pad8d2cQ0}Oy3pSn(y8ZCi-BMN*MFYaBH8Sb=Ai9G}IQUQ!$RD zSao0-jC4>WXA~Z}IX48dUtyxP4<+8S6P82hc<;+!3jNZ);hf)%Lqcs#SvpnSI$CkM z(#&Kh+{&{Rg9D`H(t0{5)|oX={bwCXoyj-N3QRqhf_7}zm+;NUCKfKzrL-i2m|vyC z*`=Q8f#aKTlDY**d-3pLLWh&8jQMXUMkH@v{N;KDc7&G=;c0vsj^omE)`(=e)ZgJN z+;QXJ3SC!goROGfkMg8Q_t>;6fmp z-op8k5o_DLCK>5$^k@ueOwHkuo_D}js_0mRGed|yqedF@Hgio{Ya^364`O}7rmNK| zP@~ksTT_oaTJLKfPAuGT(-lYVM5#fTUu7vHZ#;nMzV$YNKrSkHSXss_mXZ=D>cb(|`rmhWU5SOt#Pw|f&a<2BXJ-oDuA#LL4| zeE087F!0h~b%F||X`waEAv0vGC9rj1QHQdFQIxK3ljGo=jfFhCtp5XyG?R1NYtr%7+x1}v|rD{`s@B!vWQRI0YLeas5_K%ack{PT3n{jWut zWlNNga7h-ouf)FWTcKDIibcs0D4WlZaLO+~oSCP<6wuxU{R$sz1I!9i$kV(2Il_;i zSLD@Z;vt|~fV16KN(|igj%~$fG;Pd#QciV5?G8K^srXY~+{@7;aCY#QWl#|fInEyM z^o?W{eucE;bgJ;d=3@0y4U6YdCA2X1aHhZeMRgLlRbkL{AvMt}`SRG0n z@*CBF?&7&%|966u`5zgr_>omNss?QxUAbM#b>(d?`az9H;xsoOfl+kV&38*Y(bi&_)|>kJU#_zdD^;RC2vnNBlpSno zqaUIu!;8%Vji>5lVj8G$Nhn6X_mj&gGas5D-9rAxjfn&IxIOvLX>m7meSbP7AE$p& zS7&7kvzPB6AFP5L4z@5+pu;-PyC6~TFwarxe-yX8m519Ux!v`uCGL$(N%*NTn?lH` zuClSp3c^-EOaAcOi*?`2YUWGMwOWcLFSWorNpdQgZ`_q+QV=Ig>Y)?4lpZ|d&LR{l z$V%0mo!M}d4WjG_Wu`s7c^=GC5{QL?a$$nH_lTy0G_m2^tfP##_4Sw)ek(pa9&+%Z zoV`4s_xy8E!;YoG3SIOngX&p010Xh6XH?h+F$%}XF>oD`l;TltkQIJx>}oycZW+vs zFFYfHvQu?9(XMK02y=9QO-c!P1R>A4o;{*t&zn8-XU09uqIC`>7FOZ+;zu_>_ic#E zq(G*kRm{-avB`N-xz~rx18jKu!&j3?eX8boFra^Of^QKcCR;RxAQy}kjcfG5gjXnvi8l+Fv%m*w+)b3Q=&gwf#e8(7T#hg1w z!G7S(oU9#{`g74-%w|&d_ZZQeM?rI9&M}xVFf;VIkm}htq7T4kN^w$=;pGYZ_3w~P zlUlJIOJJH#2aBgny2k?`eWxMydRqoczlRhf9s*@tujh;%&$^T+SAlbExaTh>q(=z<`n+&IpLNQvO~%50A!`zjKTjZxzPI2HU)T z#{|Cdt~w@vM5gxLE&`nWI(Qa8s5HCjgo*PIc3f{(q5bGNX9qe+0IS6SOxb(^TuMM7 z+*@<4zv}hqgMe}Y&pAS1q+40fMi~f{zvCnUqbDqZiraatI#sUiB%s; zJeN(>%;u@Zq84llch|CWMy1t`*w*I+aj*-$l%kGB#7+jL;3sx??#~N*wV;EEu_kF+ zoSg;H?#A_ZU>7??th0tVl7J(FX0g@fZ1SV1Z9O33Eugb~Y92Aj2-`fJGNwu=UL>6j z-Rj$p|< zG@j`#z{U5%G_6&obcrMKmVw9J9I{mJ`lD#A6Hw!PYI*`OX#tWb%B#NJS0iHsM?s!jCv8Ubi-*C5vDRftoQb`ICC*aYL*|gn&D60cvhSXSXGQO0Rh7}PM zrJfn${lr=F^P=5&4k@}t-+445H8*s@6+r*3%JLz%`441r$S`-uIh+xW*ImEK2s>jr zrA`Ia?IzN4xPK1>-+V|CubW$kpCj_fRmVTnilBWQ|8 znXp@c72isS(jIe4$Kv;R4*$|POpOLaw*9>=308id%XFyjjLxtSn5q0wLU(+0cKhdS4nXKckV%KO|Mzn=nG$R=8ays^APjelpi0N@@+x2n{ z;g{Cqn`=#JSD#@!KOqIWk-t_r&->OduTo!rd0f2IiFB>7K02iELCV$_cjq+EoXJ0G ze$((|rb9yfVUnt+wUpi{8gU?U^_KcAj3)SM9}N!Il0 zp*!oSH7gI_vhCRO3vS(wo+EE~v4X=Bda3c==OQYvDVf$&YpBtE#>8F#RVv6;MqK1@ z$GgiGh1)Nz?zc4F*0a4iB@n(d5Y@+SkZA@=oUuvYB;$JAOC8r`;W4S-l4d!OU4nWG>cv&u z6p`CbSknu0pwf%!AeO8{vVJNnjcZ<6e!ECy=3-83nuNtZtQ+0JE)h z)$_NTw_l_1Hf)MO&0uwbZCzkmso&`sDt~L=fE=AV6Yu zh_(FfvBlWz%hrxX6!WJMu9f-(%S0xpbfnXufU5%qZeQo6uCN*M`+G`tBu!b42$Ft% z^9QR1sao-XZWV!fa-3-RT73#btIxCzK*i-jfJ?G{3Wg*R;kLmsttx6BV^Hb5V%d-> z+xpHourmgx$a91CoyI>Xh52GxCN}3@SJSgJXA9tjX)y)(El-y7t!YMgdAt!S)gSs5 zW7=~TezH_Pg|2t1Mc15WBPudA0Sdv@T5Av5jr9xejzW-?-^8-?E4_8$8z!Vduc4j@ z6R8%Rz?me9s-axOR3YZ54Uld~W30<|W1&j&jiuP^GB#b}Bf3~#RHVPqB~o!HISY|M z=u#e$qeIxOEPKtIer`D|lZ|0}7<6oe_|%;2Y2I3B zuYY`cC!#YIycl+yI0DrxH}#JA)LU6*x^RR#k+0wtHu%M~08s>yx+%8ci`nELRWwRv zL`AAPBokaoy2Cajow7d5zE94S%A~Ne4vFmb82(_{_6v5W<^xnu5;PFU2JCfi+XCl5 zaND0H_|6vq8%^D#tJRs((H%qz0M-7~)b%XH`DU{cTrb*j6L5cBhsB(V5#yAem#rp^ zihpdZNG=G@QVu~9a0lpB)aipmv1K#k-iHQ(1z^z-=MRQXB?{|oSKJX=(6k2y4X0T^ zu6+O9Tf>yUD>g~Lh>xllFG{`2R7B4Qd`#(Do*e5um$m{JXY}sU*AnmBm#*8GqfLbH z-}EBQ@^(5)R%^R&TguKY$5gha12n`dYD0EF%h~`^v#LWFKOc^$ItzZ!F>CMo8tIygRaTMJThGVlC6# zu;$VVeOHIxvcu)y0U>1L%i(GRP51m*-)0VHkvKJ^X$5NeFv(6=D=&X`X^E>A9h6kH zKMSApWWGDP0I&|I-hGcm8rGihS1ezto6##Ric|zT&vY_V(v&oAhmZ_D$+E3KCBziv zgK-b)*-!e?{IHK|YYlX+pyLp6L&_##*=sT_WHyqrR=W9Bwp@jw=#nIrxXsL#&L{+S@<| zFEZK;bBGy}wv5xerGiyJ6St20%Y;|{x{#~dFTCiI&Iqk*6K1gD(=`7>ok6) z@pEm5iBrS3SuB$#=0tX(d>uFlQ8`xsn$sEz4Y! z;0+Rwd?gt+9~Iucz6qp)2}bNMBS-@Ir9&pK45wzSF7Tdzq$DTzBJ|wXDWlmKu&}$q z&H)XT!M|C-&!M`ptJUT;FaAo*Ul*-jJzWiE3u-QJD9d*i9%VM0@N11f7Euso@BZsC zP^a7m7{aXy5Gk(o?P-Y!NETGL-;Z zXjfH@2k?}Jvbr=mN&Jw9ck(Sm&1UGNBjHoF*64-O-25Jea@5|F@TmID7fLO1s@|XV zQpvV1<--YQh_ucM>tt-xFRY%s2;bWYI3eB($iK@OnCtzLcaWbQ9}8~dpRA6(*6F#; zj<q|-&5SS;W>ZLC4FzR&LoU@#0Ye1+h#gQL6Z*33a1CXeQ z*2s$Gb%l@F>5is$b_Ae_lN+0{G_jQniogWAL3oBn2F>n4HMYMNE`yZJ{=(huR2>e% zD#llFt)G%I%IFtRKo1No>MlMXw{Q0~bB%*YyO9S2u?Q7FG~id$u(WY=PEg}^-9sNY<5bGj-zR~%>1IfuQ$3KkDBX^5!L{FuETw7jgeD~UR4 zeFffHw30w95DnQ8-m?!C&Mq^tB&t|5P+O45j`KL{^ShE+cM;(U`W2``Knpeixv}cs ztAu6G*kfa3VSwP6pkn+1YdTg!FXKAqJG+#S zL>mCr;Z|++z#O4cx}2)42MGdu><{MeBeA9NmvJGgc zDE;-?aZV`B{=)LbK5O8WZEmoyWwzv8MdBtc=D|%)l({0;qh6kzy@gXoxR7!y(HN;E zT^5i+79e9bnV_-DPEp^L&i=wmV*QfJ(yX6xYI9SNt1vF0R}Ag%0tRm;q;l__#5#oO z+~k}d!p@Q(R>A*3Y&lHX(cKw_3jcB?1&JcN4_(@LnEg1^dHdvNDTD&{dq%q+S{yiR z)#W3y3+pn*#)m@9PQk;7WZWhIKe+X4v#z2&k`I76qHMtcP^(K)yAn6-CpuaOtPOYf zpyei}4?)WEyMN|9ZosZAJ6RkMsk+IvA!X%)IuP+OyRj{e#R8IcM?{q6s9H^+&9vNS z1l=$z=sBHQIWxA2!ljKiy7F-85ZmNlAgDsEUx^Zmx%1@O+Kw58agPnkCMuvt3~rUZ z+{WeqS-Uj^@m|O|cghjZG;QWbL7^9H1G49r5=&0Q*fX4_YcPsgRIB^yo~b?UHN?|q zB!n*l9E(0n>;742cA5wq=H>_wvH6T<7u>3dNd&g5;@KqvKS`1nyE;1_jvAowwxqqP zo4i*vc27`ZQ<|B2Ra92Zj~E0s7K=hHfdhX;Wa?$FUaA*C^6fwfB(dzZ1#L@QWbfHg zVovZ8so9C}4t73q#BG@Wh=$}KcURCb+kM3d)P*qM_(gAWCwpdDRpOvYb#l<+{g@Dd zf^pmKj`lt?z*R+1sbYOmo*sTy1s(h_57QJPLAD(G48j=5O1X1`yN@SeHoilxm-X9@ zeJVS%^V)hCuw_a(kotKAY6q^suRe-@>a81Pma+vFc_U=-<;8ei<|MDF&)n`sQ6wM< zg`dfTT?*1!qC_?5U2t^AZ~wNK*lA4HshLG|KXx3(N=J*9=dK zcrfj&?%6|cFY#yY^C>nkiBx16w}T*oy-QDqHRm3WE}(hAAE zmCnan^BEhWx|$dqZ(Kj>PR`1KpC0heNCdDqq3?M3wt_c5xtpCDxx`?8`i&OblN^)j zq*1H(nwsAqY>+WPt{1H|K3n43!V{^8FlpBYj`UFLOm+!poIi*U0~~#Zw&Kzw61g+T zMvCW1(m$Z#G+s;c^0HH6aloluNodT_F6nMTfp7^RC{?|7u-Ad^^w>*fm6eSK8z`fE z3Y!2qY}}qZCyx2@GGBKTH-Wh9yt6&1Gix#ocPc&JO`ZJGr+{VH5ey*Py(awV8?bl7U z)-=^0+2?hfx}einV2K1n?b7Oy$DJ;(Vuw>1szYsV;8)mIy#f@rEUIH|msl*#R4B zeK6Yjdmff+z>Br+3!Hjr^09ss}hq!zsV;X9l`2XA_sd zBrrpR=Q@c$@&x_oY8D8dyv1LKUyrYeFgv|o7&rOu3>y)%3Naz}^@Y6ZS8HH;*8m1KV{m+9{jKSX$cexCnM2f|M>AB`z- z=UTdsF7=ok(^hnkadC&EChFRb+QDK=FIB*|a{E}O z6(}TWau`ubZpXd*cS(OFiP;VrrC>@lq7Efe0t{!K@Mn4X@uOx8T1|g!`$W|!_hDrF zmkQ%=31MxPFy%2Y)$!X`wq6U7LV5 zp^4HpyK)@=0ctDyv&N^#4YGwi)AkG9#({_yRPU$p*AT2kc8^fw9x2q!2TabfdN5(T zp8bq=unK!N)8Fk;HGNg4S~{S8xP01FnEs=bnGTS?MzmxqmoWSL4q66Mb}kA^_~Im? z@o-b;p*Li|H+GyVOYIZa^$qqP9^_`@8v4?PgG9D5`U`2hg=2PC>okUG-^I5WWO*=k zjqg2RT{YI$A!Xe>i<^i)C!+-GHvVIV+TDd6dZw)AGCV~dz~sU?A<-EqM1)8v*R-Fl zz*Hc?+CPA#cx%uN2nJsJqD` zrF~dMVSp8>h^nJuhPUgf`F4ba-`@dYZDplTv~M#R@5GDdoJnEDwdC_1%<{2|=qoob zi&W$W$53OKaPoHT;>Ud1qTBITDqAZ=GR+aH4~%9N3^|rXNkGK)4K>^P zK8(oK4_EJ=WN9qjFS_!qt5A}OX5HtK!e@VB8;DU!@mT4XykPD)*g0( zLZ(!5bw{UcQI=nYeEl>VQ-DMW;i;OdO&gs2U~$sao-GDp_WWC-_xxRcM|By(EY;OM z8s^FR5HC~$d1<-O#v=m=X~A(*z{G<^E0Pwwdb zm}FI!gSnOr&`hHhP@9|J1t#U9VwD$xeu)P9K&5^fnRl$1$q#FJj3maHX(R;8B(vqQI736HD9%8dCvhyURDrnLSVDlx$xivNweA4yq`> z1%vQn3-}Xm*hrkHe5UDw2kE74cvT2!EXV@S(zOO1-xPGX}=WA?W9XVt!XD6yF2L7p6E|L!34 zQX6IxVP9Hn#Rv0cS-UvJ;(`3fAXVeTEMi#a$H3hh>x~qhn;8j z_#)T8B=p35Fn%4efJ29mXO=fv+ggvZFW6x03R!-vgw1q~w)d&)ONJ>5q-02NH6V|G z5*!klI!4kOikHhR{uv$nf=HYmCX(74=@Fv zJz}Q1-RaQc`@_yMr+R$WY;%ImX7cKnAx~iOub>E75436clg+_b@<4k6c&pDck*mP# zl5-$#w@WSH*|MHry&@+lHvpdm;>#yrvjYD-9dz$XmR@RbrhR>%G*S`3Ch~m!I)rO( zLydD=j=7Hb%g;D@gOx<^wP)FL6nk9qcWy>#Yj%84Q`4Y3Xvvs|NjAi!G=IjQUc7JW zyU+9^HuOrd?uq|f@Ym*HvrVNgb2OP8FzRJ75OxyeSPX5<78Hxdl16Igj)X`>rg7s5$BXsU^mVxB zl0$TG+_skQcLosf=#vG%mR>mII_m{s0xoxfHCe3%D6$8f=Z-R0btkjAV4 zzJV-35Bina7?tAqVLy=6MV=@rG+*q$K~p+Rth)F@@)Mk$YXEAbH|I5D!mZQD+Odqn z^4?@7Yzl`~%v`qfqz#Zb!p6h^=0?7?VIb(=rb!%ml{jb^(<*WHy=N9c7 z)gq8(=VTJ-Th{RzKwkrFeq1lX&s#IirIcF`WoPxo2ImN6^Yt7o!gsD8Q*bOPx7M}` za(4smSiZ|+wzGl_)SA|c8m(g26>NQg6aXj|#4@E7+7XS(wZMVt3TNNeBRq3W|2V!5 z<=AVR?igU8NT0oJF&M!0fPu$UW(#r&7Ygl{QQBv3f5HwB_P9BZ&5IR=3FDhUGLZA4 zHN78h{KVH374j(&Qy^KrEH@6q8JGerH$zQHF7osN^`*`38e*7P(%ocA&vceb@hKl2 zwHJ+2;k}%4I)oeex_{~cuQ~#e@^B*ZOR1FA8LAuzyS|Hmwlcjq`4GzvTWD=f8)yTm zsC-b$t=QN4EG-h-a=WPWAgSKH{643XGJsz61n;f`*DYcLWZLFY2^K3;{r3;1LYgPX zoa(7e5n})Gz4)f4uUH8?z~|El8r1OqC3PGKzd*Zk8a#l2Aa9bQKz|>gP`&Ch%6kZe zp8^x6?G78u&*fZI*PjFSo`}eSZ~HVAR-T8msRz_uGI@G}Di0)xR_$qqtyo*V^ zR8yJT-4e$qnF#%c0e|C+wo=;5l3EdG)&5-CmaOwg*i9QHOxcmdJ&`cmO)0OEpcHbA z`j|%{@QDtI^q1#EDo%vLzr{n$9EKL!H)_v>^lOl!Rknw4Gjj;zz4{w!G703Rfjj%E zh&?-lpfFUs{n|cxB2o_}eZ%AHWof9{3|F%Qwb$KjCTiM!?q$7mSHpXNf;M;L!aY`_ z2(jfBpf6CLg8YN6+u$Bb%d{qD_vUcZjKjcCF3d*hH2~6S>7FG9>eWk=J<6Qtygb7v z|ADDUbb4m;c&&`ue7|f<8Y4>h3T~BaYoR>ISP#b78?HGH3MV)AfGM~Jp!8XI*hS- zE+;XdodEQoo)|yQd>cQSqp%5FB&#yteydzlQ)`Q&tb}q{%XtgCCgCVrRGQM)YIV+P zk_5Po;py9S5U9IN3q^deQ{DK5-?Wojj(foQVZ&S3HiskaxY!im1O+Ke$@5cL-Az%4bNI6( zbV#|7f$*KwqL&E?3f`d&`2aVRFZT_4Ij~yPDU}Mu%?22cBNx)Hp#@U#PJ3_RzC2I~ zdz~5B>2cF+2GD6f7&o7XIVucfw~Yver5?Qx|LXe6Gx!rKJUWAU0 zR$B1A2B1H%)cR5kS@bdkx>MdY=#8756zizn2rk&Cd^fFwy%K}$Z0OpW&rU8OqH_T# z^k^va2jLVu8^SA$m{&`E=ApzrxpIpViSCmI1D>YAl~?RTIQ=dluTwB0Z#nzDeLmQ- z+*%HWnY2igtbu4IRR%d*a`*xrj8#%$kz6AtN}Q70+uPk(+1_6I3s^>QrJ@fZr?&oR zq&4mSFmMSrtk0-T)zPvIU2YsVsXsdwT+h`lOAgy)M=GXt`+liPin9wSpCoi8dT!|O zk7>vxu%_I~UlF2=xY`xwlyvp%Tsv4$*ZGWe@J*GFBkwLn**>KS;R9WZ)OAOmKxA3Q zcmTrFvhU47@Fu2XmuBtgNkrEchJoo8Hu))=psNI4ZScZiPc3pEq|6{2*Kf9}T+=O&}-npjKQ<`C? z|JA2RD5Eo9D<6ldCy~8cd!3_Av(tg72QpHEo^}U54u8AP@ifMKO*~Pf5&^1Sj#d5A zQ*c$rgm@`_kPNOFX?R2Q2Htw0RmFyThED<)VN5$~-)f84NYi)Wxrl-kPWj zwlRSSMgxVL%ceND1FDa+mEY}B)$UNQ;D}T^>{~lPpO43w>!I{=8)xlbf z9gw5eJo}F#ItKLN6i`HKyCwv)S2fL~jq_>0rPIGik1x|0K>mizKrfgEAG-Cho0UuKT%{ECPiM zRWv7h!PQYZ%xl-IWIy3n2V@H3Km!5>K((0{U@WfL&5(@H0P* z4SYKSLM~({$~*LhBgI47;#6h`!iI2oNZ+r4Ki{Vb{U#x@9~@gChlgcfI75Z|_*V@#;8+y@SR@z*U6(AW+q-O%jiR*Ga|I5NxycZ3cOAh?8t&Z-l z*Eq{_SLpBInYV^?a8V))EFx)Cnj%~@o=cvC_Mv>cu!NHxDsM(kjmB6zqm<6xHbDY5 zp;ql#gj}|FDGwnd)Ij`MP;A@6NBvWnEPC3b8xe0QVVVyt4{$%kFy(9t%RE{o^Jf#e z4Pd7OL$ZH~G3;`kml-XK02me&YHqFvuPX?Ds8jQ91+QC5=&dYzBEXGNw%p&P&Aqm9 zGvBHwXn{$|9y;NyCt+$r@D`s;7NAizoW?V?wi@#M~-gnX{h;3U< zdN|-V>ETlz2A0ypl=m4VAWG$8)xcb+;STU3U7`)*#ljgA+Idv(bC6}iWrR9`$kEEN{smE;eIk3$G+u7F zQy7deR0kc_N+;AB4VOe{f)!kRqAq*((1k%+4K5J6-xOtDtgI;$V7HkX?bBS|9#U&h z=f>zmUX7;IN{JFTq%(}Y#xsp2qhuaKSRm3`wnJEHt#AKiF3YJhnRqtEK@PmVGS>qx zDmB>D3wcR6PJ@e?DeRePJ8gnhzVqXFH@kXzFS<3&>cJQ%^Kjyx<)&J7nf;R9Mj7|DOA$I{09w~5~+77-78FE7em*KboS0c+Ng)Bd(a zATRo3geO?7PHxgUHpvcfP0UeWPE(L}3k>v+w(jO*j&&Ape8v?dB?`^3+Rv;28+lZ= zBhu6gyXLz@ijnL&yD+Yo$~BVZt>(d<)G+7nnEE3ZrdRbUk7(|@v-nM0j#lxmrLP76 zHrueY6iuGkb(i*co&SOw_udm&xq8kJYY^jl19ZS=l;_jjjg zSF=ZgvT^`bbqcTE-!_`XbwFr_11RlnU0crGz*PTCUH$i4^SoJVAg}^Basikf0KQu9 zn}h?QwT~sU37pI5-7F361ti!X_YjOBXUKP(xo&H=&ox9^>8ap*sAkt?7jRy<8C-cQ zpQX|`iKL=A+6!eZR#%5$wvJkfyB$p_p{(kas-!228&R{iD*|sSOpq@dR<;vQ+#~Jp zF?ahU2rwxLslV~&6vT0_IC6b>pn3n`$!De|L-;%hvwtx3qy)Fsdkb$_%b&n8 z+@38>*G=-E+pK_V4)oJWEO{xBeg!Y}Z>RNCUTjiB@Vi#1p7b|-f=u+7JCp&)if%jV zhOD@C(8+GU?=Hmuo%#hvat6;gyZ6n#(FdV#Cs5O8gvPEhkM+kHC}YHyxthPItSE4} z(R!)e`y;?_Q#We^8pDqQj7pIHAi(egIHL+jT6XXi07wM|@e$l$ovcJ8Ra24~8(^gJA8Va>eB$^6mww6NNyrw`c`9;V*Y7pkTw|pMqOz zfi{1?EYk2k-4~lVj+F^&<28-m&D%JY%p{yN;%0U*IVMoG@jap{D-Q?n3~mp*xPDtk zF%cc$^B<$Kx|)pudHiOprCyhvo^+mwI1d)k3ta99eB;l}1z`#jTHLOSX`YM#c!t6G z86M@bzOh~UgPS}vULyWSkV&37$89nHhrRcViZa`}h4FaI3azLpQCnM35ELXQZADs1 zA~{QwlqfkAp_OC=l_ar{oI!F%K}E9UObJLRr~(A43Mi`TTN~eZeBGzd{e8zBqx*+r zD0GEq@4fa~bImyyte~&cEty5%J}wrSx7GxuV*_<|;)1lm77LajQu z^S#{hf9O5p`C$_oSKjJE0pS6( zS2NpTMaDlLh5lgP}n+bUEq|4&?*KzaX&zsXi+Cr;w5wE+9n9hYJ)HAduwSI#%jtA|QN+ zZ2dhIb}5dJKazw>U(*$oO?>KZ5htb!AAKtlJ&8^tBI| zgcpo@CIHVIQY5b&J$mV+a$?>pm)Uqz<(uSs(6UC5?ycS5@HcsuPZ3}l1r*w+8}<^q zT?J+f)YFY$!eKO6z{m(3)4a0Fg4-``PR1RvsdR5in3~W5jHrLeOx+Otp5wgbqL3yJ zkQwwD5myw!VUVy$=#Sb#FyH+YWG7B%8uWR>_pr{Oc+ufQWDm!;YdrOJN`8qOTPX(y zp$MH|Q`jFo*cY{6KT31bf?J&B=9a*Jwm_abzT~3Q>|;amDocYTdL#W-dXJp`UFr%yF9p!^g1A5 zhJ+?YqU{PRvs{Jstu(q{-~E3RWI`M+Zmn0vo%R~?0<4!cE@m?p+lTp*29#(W2%z*J zqm9GNJ*%NK9&_p-o5_u*H+{@&y!_f5+%dpnWZuW_bdz-TrbRIJVm{s9=*UNK5V`4B z<3x-x*+X{^HS0d0dARQqugpFd2u#Za4rnA;Lm9q>WDOPWS^#2XS8s&%M9MuPspgGF zx6xUOB5Wx`A%cMI-4}V!&#{C=lyvj}rcQThNNm**(j>|`SOouWKoG5%yKtICZgA<^ zudsH7*fAIP79STHts&<3JsSR75>yvm;*u8vVC7A*E>@Py^=4*I>#m^_C$Z-%Ei^yQ z`FV*PA1kxe0PLizmYN3+m)hJ)i_kb+qE6;mfT~Xz{2mH-J+~0jiRZ|!K*jleRuU%3 z0GgQ2Q#a+Wr z-wFm`1X%3&CpV2e8@EGiLa_S#7%Z2WYTY@&3V_lTFBz>4y-*+zz?ZKE)D#w3yBR-V z0K2OyL#H`2`CKnIAJqh@V2{5;q6;?u-Y>>;J6O)Euuou4GB1mQdS1tDmdurVI89J@FH{cp}u0J$_G#M2eUi*TgBiWITI(5_VG$| zrn9}Oj^^A4H^PJ1y1O?jD{m8hez&ggcMA#j%uy{QMzh5P1VzQD0dl@%{c>UHV{bAXoXc+;b zv_1a9l)PtGqJQbgyA8)`KwW&So3bvx(zlV=S{`wckJYkmSd^~_xT%nDZ-CcB;mj(P z$M4K&EV+c5GHr6(a@eRc@;2OVtj3Iy^{336(p+5%X(Y~Y|(F%_Ff*(ktS8!IaHwfqC2s*_^A%G zTA}d@+2kq`zOeC8fHuk5=W?0fU)Yq*_317t>rp_hcQxD38dQR750sjyOSju*vyiDqKAEef?#67PH^&nQdLmh)ADO zb$h|2RQ6{e7()R*0t^TMT~xpVr65tB-v|0bgD(U%>=A`sl#2|EL{<0Hkwst3Z_soA z?E0A`Eej5moy_mobu|Ql=XPf!Hau&kLRx++X~_$3N%+zbLx&h!Ds%O~x&6(^BL{jO zm3FtzaQd82zuI>o3wlDQIx3~M3OtMY5w|KJr3d2*61O8I08|zQAJ<>cMAdnLL65mm zG?GBsHZ;|q#IxKaUcBd4-nkJNHsRWV+S;0SSNLh>wb6=L{^%v0hF!E%M}sAFTXUS7FlC0Zx1FYB(8^>uj-9^lYEKeCR?U+;~03xr0xr6U%Md2 zV^n87k14G6Q2^d$6f7e>>IUy0e0%o3K>07Bsv%FE7Cb{J|-7m)x+e+yCk0kQUCVMXouK+C-&ZkO0mbAUZ1pubF)C7$S(jyk8Q1U-^RxSNA3&>u4VEbLmJ_9(bs|(c~>MKI@gN z%C*TA%MA;4BJ9rxFYk~X)@7asl;jeGy5tH%__y{jBV z0Nsw9aCeXS&1r8>s^gDV0FOiHbS}_p?rYAOJd=kTy}BQlGvol42P9arMx@PCip+BU zlC{jVpG3G{xsey#HFw)&$Z~1BssJR4#g#ok+2%T0%tyT^1B?^=5ET#9Df5>49s9;n zUX3%Ia$U`tZ>X`>BzM2g%LbgnqOdC7K3@~nZ>$Y)QaO)anu89aw2@8)mb>~@sJ=QT z1ChpMf1J7inm0zJ_JY7{$4wrfENIhaa#^6(%OPtT4ra##5CIVpC_@u1IIYqm7R5Ao4+aawuSrg*O@71DKA7CO-e7#|c=p`Hr==d%$s963O~h zD7|9S0~K@(d^k8}bMnXa<`Hm^^MH0)eXC7mcODKI%0a& zbok|o<3^7b;9l`-jPMo4DZf^e0@oM-6TwE~59Pn49XE;ZIks>UmDGaC8Q^E^-50Zx zZDyHnBS0DuX{mqsmHbgHB^6q{qJU>E?|g;NRBb_u>2 ziV!o${U4JS)!LePd>pV_`~GRA;<0@mrt41%6163id$uZfYs5B(B}>E}IAGAY(!#MO zZv7is#M6>wCADR><42nGZ`e^ah#>LGdHxddF)!(nx7Ssw)*@YuQl&)rM1VEEm9p`% zs;YKwBq~q$_T!XwbmnHv*khmDRMoBHKX1K#cA*mFu=kE4D)^5>H@)b0)a19#8C69H zmZd;i?t(m}le9~|+aeW?p7~e~{Yta->f)GIefiwG8C}9N_b~u&V{gauc*zI1>n7l*}@nd3X-a2T{&{0edAnge!feKWy@G z1O{^#zrx!VUk4^@v~KM-H9KRlo50TjAjO=hKW-ZVSDiE1T&1^!OVupQ&^AY?v)%Zy zaCYGFLZJ*k2$#?NCC8rvR(t%|J3gcxsgJpdaP?e%S4*FC((#@xUEC+9?bX;d9eFtk zuor;)4Vp0FaP5Io|0q=8`^8`?yAVaP15!6J(kZG zPG^kD)Pdr;;LHHXh40?XrGy z@SNUbBxk9_@mHaQWWnI7YWdw?07(LI#E+GOr^V5AB*MBSQTbTEjm56p20d~G{eHK? z?2m=7f01$=xsOQwqBK1`bi30dY#ozrMmw0Jqan}VqJkXLbcEb(_Hv(8gX(UZy{9?% z+FNi5r}QJs7s%sCei%qHw^V}YtIE{aMzDuhfK8N3^ld9cSF0aE@|m0+`cU^LMqDtd zL!x}$(WjmSM%|FL$Pa4-mmYH5v7_R=`(G9>zYVzGJ_5%IoNwlO;s$pffnW?7tn6ok zT;|wSx8r|1Tq5ub@9WWz*GtN5d({|LO+!ix~-JS@i`CN(^9+2+eZBGK$4PASN;tGAkuD| zUKu8W9v%Pb9MWXeQHdu_E%*z0-@Ejt>Ps#fNXTna00-cy25A;ObECeKG$(H!1#UE- z|6+?V98jiV0`&KSL>=M{PL#Qrs&t=;GjLUX4uTlweO~dmeSQm~r5hdku{Z?3hKDkc z7Omvx+uWK?o^R}^%?~&7%7wQovoGR-fYMM~f{}^UqE%&JP?F#>etUbJ2@ms~7j_zO zV(TUEf?5TF#ym@{^riFXK%hJaY_M3GM;$b@@TJ*R0P9PyJQz(wjwCK7E%BG!>5DmU zb#~>vwHldeE{%NNL*z3Wu*%Ow-ZzJx9;@Z88b~E!*z8@)t z(6kI+5k#|8gLCeX`F(Rt9`8}Y@W}HDWZ?YO-0+Zk`Dj^jhwr?FajDs083Z#OCgH!N zcw!|~`??Yg&cR|qVj-?LNfRUgrW{-gx=E4qivc%HJG!GvC4UyUYlMoZ_0J9-!Da0} zO{kp)l27C)2@ZVYD+>S{a>`~~^KKj|lm7|QE=1#j7@)F05@o%W_baxA#1=x7>`J;QQq-a~Ra# zZ@?!SFTbLfODJUtrYyEba{;de&W$M{?YzJ6s8}8w`7+Ce-3I)GH`NOZiU2ocjIL11 zVxR4`+31G#aF^fI1e9dED(ANscRV?Ce3a8{j>>?%DXZLH7^);~u8IrUbgL$NR5~_oK24dbgbwyrJw@#n-7iTXp9GsuFWnb=94Lr; zXL`lp+a>5(FqftQkh*VfENZhWJ0F0h%A8Y+io4K)5i2E@Qj`F5cC|EVVIs?v&aFH; zKupRD7c{X4i&0RwS!%^See-5zw>P*yL0fYxd74G7PFTe4oR~8XAh56iyR~jw#w@)N z+jI|i`6(S-RMV?;7c$w{rk=MtXR3K|;hqaDc$wFTUNi{DS73PF2ss7s(i+*6z8Rq_SA@cAEv7 z>c^vAz^MQQT@`f9pl$2}iYn79p-Yc@!IzZ03&$muym8G|wpX6B??#F9xn$LvpL3eD zhzEe>71+q0f_!e5nuh*A;fi@-RsIDHf1Iw?EYtBf=Gr8E0(G8Rd(6}PHngM%N zN~XW})c%-DE{rNuC|yf3-dstQ3D~}Dk$<%Q;gvwvV~EjedPN*yK-O+r-mJWv%sB!6 z0OV*$|JRh0tntT0eaU_`l%GEh+Dh<*1WXPdy_7P%(*glTfOpbrGFm#&l?X&3ShiC6 zBx|Pm+Qt~{LM{&3UBSLG0$Ur9q!%O_A)m@|@l`_;<2*>(T|`pJ(O!Bsy)6v$VN`{QIDLP=&Oq-%Q6(Y4H}` zbA$!SO@Tm(w50gC<{$jvuzJUO_8}jR(j1iH3(WojzLvjwl9MsW;*+5$byVvwIiLr#-{0~;t6og3=2Dwc90d|zXyy#X-nHc2!b4qYC2K{$H? zsq~X=pr^1jQTJxMqUibkh>!@kS*9#&pBhWT!M<-qY^jvYkCm*yIt%i(!$-f3&sA~X zgk?nPh8yZdbeXd4{Jx0XF4j!M{0box3}lsmgv_u#>2uN(t=WKIZFwmBhF3!O3+!Y5 zUTWPUE`;Sa#vSYn(8weBc(0_NUhFXGjf?rFG^|M^GV?xa%G&G}0~q6fXq-@7kg$h- z;cSwhM>kSV6Bv+a#jn@G!YNBUqFkJzINnNX&yej)IY@4dQ zdB;IGx+UdNZ@Eim9HB)vo#C9P0su6uTJ(kCPF&`G>9701eRAPi1!S5RfoMnEt?x@+ z-&jTd0OE#u9l^C*&@MW=MmZy&PD#~NRq7D0^ve~3Ue30*)VViNxtrw#zY@{xjy8Ff zE%Hb`RLd!Kmoo{Xmvz5f^m)lST z&=0Lyyn3L?Nj!ev7g#sYpv3sDXG4S1m652tcAy5oUANB+sQN&jD+6OC;Hr*NbSZ$) zG&~fenSD7r?xM3RPC{JZ*dKpO5v2oJRC^cpdRY$g<2!Epfagua!&2Q_wCElaE|Ds* zk-kL>!fUyIBWd4(j06bhkHe0`75CI3k78yu?r~D@Id?>gf?w_X2l${CQDB8k09#Qh za;{ZfaATF`lb#AqedI-rE~NW0SFOlz88Ex(Ns^i{@}AhWEBV$ z_bt5se1r}3IlW1b$Dp!dZ9nM&#zz4=xDe#p9naT0d(ss8(?f-nGT$xA*tipqAx0Ov zIZ%K#1t=~)E@GGHx{i4+>ue01AbW$6)|@ereZ3Ggu}wT8Mj$MaRW(Z*d>c%!jMZmq7R7*JqU


    5Adb86EmPj;Tw0U`m8iDEg#G9q>TM zyyuB7Z*Nn}mKLm7#kdd3FOGpes?@9lh**?G>1P1$n1RWCmn>iJ#OL;LD^23pYSdSJ zFV%}3v0Df?N4i;~TFql&dxNj*R$y~;M4`pdCClHhwQJ9Bl+2_EQA-y~()Zz_IeBS= z)FIiQY!)IG4M*iPgjCBk^C0~w;K+x|0_Dq~6GbQvFyE|9YEF#$-+mrK0Nz`VyxZW> z@s#~KBVz-!#aCCN!-R6BuwN%TTqcTzefCzJj^!9!&o=>LH)6<{UZD(6FJ--bmLMj- zT3nDr?dAS?7DO8|k6_EcE$)07e}S(EIVfM@h7=!~OS|{6cLjn{FV52y5>pT(lbtHT zjLgtA>q8D)Zq_W#5fsT3Hwj^Gm#h|`c(IgL0&5A0pLy;!SzFwiP7s8iYmEo7(@lDd zn@LF=;ql3TfIIOwtYS2id|$9DbVkA8$>xVH6%CmjxfqcVO~H;gen z&X96|3puK~Rwgg4p6$wB@PMpK)0b7FB|hsUk;sPBXb~Pj zJN_+sOpDPh8z@RzyWIBv9&*!z6SURCQJMmJj^uJq7VQzrsKJ&d)kfe4|DAcQ=aVDj z_hjA&SzO_s)OdIHA=&OHL;a_phX^CC716#wLO4vlYFxZbM3mrU@ExVaCk?@U8tg$S z8?g?ktZyh3q=?Hu4?eDY*2=^S$BsDX-tmJtmRyk0N-Y3VQHA8kB z7l4scwOBjcEEyW3K^?E_!||BFQ^8l>M854{J_`buRQbE(`%O@R4_DFX`q!`sKd&)Y zE!;qmYR;E!CC(fM+-_dFMTG&|&CF@{8F*6_-oP??ksG_8s;)*Tf%h~V$h>r+^?{uY z-EEqvpS0H(3bzbzSxuSbb=sA>-8wVhA13WWPMs7izc^~1 zc_v|Br8zWJ3=c?q<%7rwO3cAgRdJI!@aziM;kx(KV}N?`&c^pGi2t_x2#QQ&b4yox zrX(gyrOapnFgdQi{m@DS#0j9K>Y*VuCm>gC_J*>kvhllv#wJj7J=5o3&DQp}rjaQ^ zl#uImbyfXCv1aZ(KqqRtUz2;L0P^Z^*>Xhg792Mdku3p0h*`SF4nkxYuil{c@xE`l zZe*{gJFV;v{0$eJ9|6Bl2g`5-lY7qJ(jo9W}uvyLS~I^COGau-&VI zPI7xy9&7N+W3JZV8#`4ddV!BM?PZ~A`D`R`+hI_|mCB|kF$0qNRoiXBO$7uD`*`R! zEr0X?h8UTbr#aR6xVD6P5qt&oJ(HnwdD>MHJ|}D62F=uO&!3omlL56~4I7>t{LpSz z`lVKWdo5nVv*Aa49^qa1>aCS_d=tM-=PRp*7_WfFx$A0Woi7kQ&^|2*7#;PL@efM& z2lmC3g8rd9B667iD66Ry%B!ZCZo4S!iI>$NRz@CQ0xb=YaePBlF2wcDaemF>HWKCw z+cR^u)!IJTvD?}`+KNL{S0f$R+9ad41h)EzNwdzOizzF4EG?CWWdHC5uL{t79|f%d z=i`Dm;{(%b1J1E?L6B5I>y->d`fDF!Mb=OS>Nx#EozVCmi(YPP-I=~`_19M z<@qHje6LzwuVBet84eRb;3No@LL}uI8+MxeYWfr}fg$Uvw`}!z?0j$~lxg_Zb?y4G zHkfE}0_+hbes19a`@9*B{VX=iONhP`o0IYQN^~n?$iv+Y6Al=J;P^HE)d5873Tnv} z{kB$+wrAYh1T&dCW~PbAesucS(@Un{fC}q5wD73NtF{)r13=Fq>ct$@zI)dw@}o3; zfAe7bVps&_>TDuX!gU*E&LSpJ%TBNtb}T2h49^tu@Uezi_h|r5GG0`lE-uG(@sF+Y z$KYHQ0~tO6s4~dn2c%!d+evjGaDuY8shP@Y5PiWvf)w~k?P<3xoCWD&DevWy3vyKO z$R$@-+SJS29pRDnr3{1pV^TSZp7pXXp_D5&f%IeoX_Tvs=Tdb{=D%IBD2x(^Z)lOP zRUdN&^0aB=HBo4A7E8Pviib}WVW2(r_Sco}nQ`;N7!K&_NVP29iUQX~wdTlPID^S9eEIW{3eVP3P=ZIi-m~$R7N;t-DKat`4x7s_86l}wy z1jo?;yaosR9V*M_>~gAEqzz%{%Y@=C@Seu^W`*)<8>bKv8OO2AKK?pZnwW}X@6X;b zjE8Bp>R?D9;7R@nE$%Y4X30I$1w}tp>fF%P2#c1HUa%d8IUJ@cs&p%gS+`20&BT%n z7+b5$T+{9r5$7Kjw+{L6MFZpBH+_D8l$GnW09N*>+-=v(kG9H4q>z-U^F{%cK79_@ zS$fsqDqIj%Tt)2LBnLM#EyRBUNoW1n?pV%Of+h=(L^ymaZim`6CPdgLRwCi@*I2VL=hfVc{lO_Jh|C!t0pgQnbxU!Gg6d&Vn4s_ z*w@T?8(DDQ1NV{Oa=*KH%wp(_*9bMu=U(ioE*gInWh~Lld#1lJ6{C@-)UIDL|6!$z z>l~$Tco7tsyUoJ;M@LKF78utReKMx3x=KXnpy28~mP?W6K3Y5hwsA4C-l^GwQL<5i z7M>EcX6Y_sgh6`do40gmlD5}+UC|x6zQT6?2KcnYP#+eXxlXOEGg;^~F=pe5%L6Fv` zmN?i^EzQ9lK1c~z`?LYz!75B@`6;sGBX~I!JMnaw9noOdQ(*yuXV_QhU~UArG4E>` z$|m2DA&wfmv73~bFoFU@Elu_-e*9dE1+R^IFeF#%*P6q*A45h0HyIjp1B3kQtye&x zye5gKM>Nwbs>TCOfN!i{<<%*2bWF=d9d;7pt+;0-oe4RrjTs3ihTgSQ#50}iFw&Cz z7|{!;8FG98(oaM`@19t)AU3i*9 zw_k*f*R3?N#7jHBe`U$EEct}WhS9S%DL`k4H3lbA9=-f%6Md@2`b{A!mk4GW9ul(S z0Ixq$Bc)8|yn8eI?P1^u@+GUkVpr7HvHm!poT8+{)AZ?Y_iP*8vE?G3_RMK~dol;- zi(SBwKmth}} z$kCDZX(Pye#_M+hnE*?jBXXOgBM+>17Qj4!6chrea5CnBn4m0iPPY&5DR&zwKJk{# zB~vLfgYq|lGDa;ch$>d%6h0NgN(z^)H)nA)b#&j`{Y?)HV!eHfgc%jx>ZX^>L1ayz zPCwO9CW$|c4~5<9r?NUohPywQ6YNzd|XG}o-!ti8a&vTuZn8u_3p z1U7>8WOiorb_3) ztyDguCKZ%R_lB6t0=W*sfC4t7;%>4Vh-G6JP8~eihP4n@)qn)>OkOHT1vp?H>gg{ z3snS+)D;jn(7?@_yf-~*{vKk;TeR(IWcu7p6_Ag==yH<>SDXOzw8pn=@^Eg52@U+E zL_81GZ^WrJR+M)T4VBW57RyHFlW|5?VEE8zbl*(3?*;Uxm!F7XcYp?C&0sJax+5oz zVE^tK<`~dGt5%x5a0sUyIi`(>A*^ei(|E_Kyk3L-`v6DqaV^!S4K_m7S6C6G-BeHnW!n2FW2mnYHc>H2MbWkx-7U zZcJf26|x8=N?KBZWokC%8C*ZplzLZM1| z2UUK2WFCC*TxZ}I^kn+P&CZ|^hae6h7>7eTA6U7B-#6m7!4f@lAT5 z*%>W2FdH3~cIlb~iS`OI|1{vH*jmUtVuK@^QS`&?WYd3HvtJIzQ{vhAo4K*EW1AQt zTId+hgJTMXlFJVMwWAH7s8~-_KC|hAk1I+pkpboyQAA4yU$P^4!NXv`vZ80ZU?g*^=`#Gw0AL>P>HER&{9APnT)QDm2@b_n*z+9 zTGlxtu1tN*H1e7PAsw$A8V^}{P6`wYCS$b+809ccGE-Ix-$s$`Th$|a{k^ke;-!?F zHb(g@b!ybw6^*vgjST*kr8&Ue!$9VGJ(@(SqiN*aNJ80wp;HS+ksp7yD!2wWRth;y zt+#4^M?nL)Sh8QScA*Qxj4Qvh4dG&jd!OP{BJd zg+Dj*Bh9p?evp#hT7k#8-}PWx*hP(Bd&l~HB_44ZBXbXjSv9IrN@=YYxl~|gb;W1T z=Ety~*q7`ei&*N<+eLlhS}asbZHe*%`v9KdJ02Za2qx$f#-MgXHa}^I!-0molg_^Z zhN2x%2dquJLlaS4w)fVoHQT5x-loNilBHl=sRPWcmTY z-V#aBUR?tFtMu%Q4ASJk%_{+K)4<$GNPyKS#fPRdz^Y2dOB<*7@6C^ExCEi(=k%QBwe)#U@V132xP3x2Kq9{D93%p~!K%^S8+jwZK{Lg%3No{}>!B?iw7JOLC|6g# z$hK#&rBoiZF-+27v_yVKKewGEO$GHL<~K<;s&dDmoeQl!VR`(_JwA+WM=gix_e9jF z4Q?$@aw{OD@2Yd3XlZu#w=97wvtqNNZm=obsd9%p{E27U=po>B5rAQssikd!l0uORIBlqm9Ho+x7XrRX3y z8lDNO*))Jm1MEsI>S&_0e}l1_Wgqu%XXYnj7a6Ge^YJ;%9{P_qN1dE}h&PaJ0xUdZ zjcVMp(vJh1FLLV57r-<44(4K&zZG<6xkZu5pl9Wlo!{7!1N3iz<1_)r%Q`#cO7-7X zgMlRT?)=xamZ8(*4JOe< zU+C3?#d(wqJ8QOlGt#(Gh2WDgc+v(Y6l@KY$v-N18}Dz!(n41$QuK$eIAm1yh{m{B zh>pq+D~TjPn31V%U<8=02*0(mod6-r9=}T&gk4`DHqBSizd-sD2RteeufVvBow%1v zGaQ`d;3Aj~bVQ;jpBKB+NZ|O-ZO6fh6;oV+46%4Li@|1gFtv8Q%PWaep84op;Nmjaga@ zPlB_PWKJt8hP_M_Rx9*eV+qXts#1NCvL2SPMDU8D!ER;tGAsu3?hZ6%89Z%xV2X#c zeI+H@!pEUn59s9Pg^H7MY6oATiBee6#k@8a+4Go-tb$tn81-;jK8sFrLHu|x?lr1F4crIz)Rlp~|IZO)Fv4>%)P?-i9MnV5nO}o>u$ZVL zF7PxKJRJsY(j68hKP!DfT7MWj$&oftRM^iuXr?pOOoq=d7|Sz*Ei@^Fkr*tir2Oa_ zZFqc~s{*dz`D%{*3q0NBUgy0{BZ$-BD%9wBDU2)oWNfo2>k7$NPc8FerqLwnZ)n;= z8R}kEu^%DAfN4{`v5k@EtCQQQ0|&a@0=dKYV9z?h!7A$Lk&{aw7>2C?;c?8Yz0MTC zYg?J$Kf$G43xqWbw&NhsMLPm}icPk+wk5h7IK(hrs}@2`H;LS>AykcK`XCl1i2quB zH^n5rmifH|fS`F{1_mkg`z}kPX>H@zSC&RkYIG5`wg~VR=Mj9?t))|p#@iL9kt9WX zhk-;S<2+_GSmpzsa1Jn+76vugK`=)eS%QfvJ?WQmk>(oIK`D=jNF^uFskCajTqnLf zkGxC@(o`AcQ?KddcFP*_CxfEA8ccmfKgizP(Rixko^t?ap+qoLYGw#rzk6p))eD0| zgf_ixr&PXOvW3biu$GaKs`FVuEy&sZe`Rul(v z01ybtfsK5TUksr_g1U}_39l5{ld^Gr+|9of69@rj;WW(dkcMp3(rykt@zk*wb47830 zS6X1^DVmqG`TM4WcpRb8Y5GVR%VtU>?ZdP?cP0JIT^@|(AW&;$==HHkY(bX5+MR`F z-Vqqssz}bw9<`FWjCxd<(@nnBLST$Zn32J#yMX<7kzXRgF{f_w9Z7E081j%7WpHklAEoB^oy9)V^S8XrSYmD&lxi6e?v%BFYinX)S(WBDd@fk zChRb-tU*p-PoTB1j?_wxGcM14B4k_4<(UR|Cdf{kck~Q4v@@_Zm~BPb=LnySN=nmu zJC54f9bCsW{IUDtL+$E^Pj;5PE#AGR*QsrP>>xT*u_C!XU5f*`o!N0u@9H~U*Wr#lax!oU zLbX$^Hommv;WP{R+Gz(H16A^*#%jv;QllrrQ`C-g%}fP8fvH|M#GVK@@y3KPU0ADG zH8WvhXq}3>PIuL`sUb`zH#pDSriJb>_ywQT8Yq6mKC3Gt(UI?`!#tiY^R+^xy1BtNxGv|@aLYEbo!=ZHnZV8Qt(!h(VWp}?vz5bGO4aHBieV7(qEgTj8%)<==No7`^5Chr_cu8S^uZqEpZH_)%J)l!E6 z20F^Shq>IG+cisMQb(*;vJY%u4RmqX<;<4W^u*g^@8r? ziv~irUK*CJ0?&8ari$};wwE`FE-d%i7AAjqz-vFBpIDFOTI*eEb{Zs#SSd8@4E^4H zG(e}~>>%aP^Lx!VfCg>5cp7UZ=F&?IuD3e}N)Y-wPfu0NZ*Au3pYQHd@f>Va#5x;2 ze=2rBfHjTbJMVB$z0UzY?KJg-txD}igF$keea&guQ*N|YJ^Aya2h879EQcH)+?kwy zH*7XI&Ns{uew$aVE(@pBY^PF)?S{=ag5z0koAoRk+b4IwYZf~))@wBR%4qxN;`LB( zLY*(C?8m;RPlP!tE0ebo?|(jPR=;9*^HSp3dq*rb%;l@-ZocwSTyx@sEO!*WsWEq3 zeCVtGyn$C@yM|672blMy| zRiv`ctjnkL%FU-Tb(B2@8*OyVH*Ec3_vrX78w?uzbc}4H$M*E9xfshjTGmWGaHF=m z?-f_H(Fi3*Vx|LmXH~N48Xn(hCKYRnWh&Y3;;D0+8)G32YE{BRU)|i7Q_F(-%g$2d zzD$Iu+i-c!sWt3t`-QzbM`v^8EW>%yA;H+h)pXsdPi}qH-A^oYqF#Z>-)wHY+?j9D z!7XMKZIIqhtxGpKBJ0frZ>@)`bo%|H(dn!(t^gq(Mip7*!Oo|`K5~@N`JGE@*+r+8 z(6-5H*?$ckLOA?_oAi!FI_*_sy@+V^E^eb}mC8Q4(&}~dndB!N0`~1A3N4KJ!lNUa zccq)%dI&NDS^HWAJj_3)mZ`SM)%5$!4R^AZjD!Sxi(sbQqXb?1?j(53MH2?7i!jyL zu2id3Nqw3%mDL1xz}ce~8{YVbu{*W@Rkc#PtB8j?DR+w2_WnC*PT%)=c5RUx=>VY_ z?`_$zF0M*vFf+7^OWJ}iLkzasQx*U1i*6x@Y{%^a3se{Y! z;_sTL*}pJ%idZIX%XNCks9KAgUob2;w^(zyQ?mT6dp^BYZ?$HA(YyaUgH_i1#lZI$ z4!-18oBZ|OnwI{Y;k8EjpnfC%K}>YTQm05>%v!CG(P6uQ+;C#5VuBA19vaa-x5f;g zHGgIlEqyKZDcdy;)1NlJ?um+nz>%yJuAo=_d)onb9HXf_-)oGj_KdrhNF+xW$@z^P z7?g{w$!d!-_3-lPhlO#duo`p3)s0Uv4Zo~QW*`^^IZlCf@7M6J0v!m1`K;yN~= zk^g$Boy?;iix!+Z<9DCz8kW}PmohPSTS-T5tk1Xgrvhr74~1bgP&8M%@wj~{v-gJB z*C>&r2_E0iV|*9l?w%SRIGO%z9n0YtMm)W)FmHQEC8pQ0ucXd*{^E?nWEi|%?TZUjF+7Qsd%ex*F|lbgbIR0>KT)G-M<9oy-y zY_c}B&-eQfW0+w_cU$jY3v_f*#j?e&>q;LXn99$Le%JSj{?nI;qvZkjI*goYmJiOhkTPPicVWX=! zA-GehQGKIvc~kV|M8?L9gP~(n8%03BHf@84Nv7xxKh<^mp<~^8V?J%IL%xUXlRRpo zr!qWsV_RZEfu>N?b@emr*PIVA-Ff8sewXSHY?#`qS!Wih^+G@Cc`GcPEPASr9!BxO zCygtnlre7p3Wj{uQUZYK2VMO>$FRpj& zD;mYKrqfp$3BJ9L@{P$XjkFWP@$~7heeQ<`#1a^ER(Gk@VxLf&uiJfzX^a_zmNQRZ z=g{F?VhFY~b9H{c^2_j)@%rQLBzfC1!VPzbAA^S_JXWWIeO8)Tyr*8(glrg-@ph9D zrP~f$EF06B94xxY4WRU_2_)R#Aa^iMNWZYGx^n56wcp13F#3Xt>gXh{V~o+lX3^Mi zRrPonEtJ4$qhFwA-(5QK{Z**1U6dcKeILuF_3F%3EwZW!BOll9Yx|i@_FMmS1iRi| zGWh*GHLVcKQ+RgiQ-^OE7e&+hG1v8wcGa9k8M>bworE<{A7Y7LZ7Ab*9%~Pdw^v`O zAauyPEHm8K$_h`pxfQmPpM=u-LyN*XV?$-q2j|~k>woJpk!h8*&F&TL*4vJ^GZsQr zbWBFv^IOu)-I&|jx@;@k>ftV#Po;VDS=+4LiO+)a-DJihQGg8R^R!@gZ0oAUv5?In&`Lp zZ(L$xVk&+9=l#RPv{OXkIMdGQE`#)-FhvJnkCvXh@LRSVrkTdCo+l|UKb}4ff8THU zM3`xRYinRA`mGR1RR7Pf^;LmKPBKnX%mQoH@$?fD)4S4xf4VN=?|0JR4rQudS!3+6 z3K_GVoeS9s|0>4%-+n93>tn$E>Djh$$)`#18km;%G3Jw3qUoIOF5sJGYHnqvYyY-SB|GD_+C9jw; zzOUUc9SG;e8Z!V8I(}d~EWf~iS^n#r{T2)k)gu*~^T%}*(c2FHmlynP^gN|?82<&G z*f(t6UsEo!rUkED6SS}VH`BWl|7G=FRMu`^V~niD_Iocso6RpBGYFA$AKFyhNcb5` zU`c)n3sv)97Ai%M^F7A-eL1drMqcRI&i$?MzfmBT2M~`Id3=n4!)JVn8@6cF-?!)= zJ%Oh@1ov_4IS#2U4y-uOTsy__9jd6+1V(j%vBH@au5JLmS?#L3S(%tF@&El%oNyiG z5D)VAILksaC5hHmQsfykY3`iv^n!!QNxR7F@;tPSZ29$EID?(XbyTV$m*6jroPr?y zn41~)iP7Kp$>q5P%o5A^i7^u?>|nvSwXO`os~qwdd#ZvOa!WX${H~GPy_*nfE>`?oDJnm?K?#&I!E<+jJT#^cI2$#vZ8xX!SD{r6{o!Mu7p%qq@zO32Dp z;6USQZhKcmDAuLvywJu{Qzz>-rgw>l{=Qo;tPaA4F|?13(6VfEA58z7m2UM7%x4a zM#>ldPAu%5_pST(7I)sme4=%ieKnQNZ;$n*KMzx@UF~!C`~DD}(YvSMF?{}W-3liY z{<|Fe*GKcuzimC1f1b-fdt+-O{Bu73i4p(A#D8L9*pEl>&%FT8;h&iJ&olTZCjJu> z|A~pH|M$;6_~#k?vk!js!v8r7|D1*YSI@%LuA-lR{`r+=l7=MO#`}-|35S38;&9){ zwQJW-zr2?2gnoKV_)i%3A1BY|R6Kt4=(nFAt4^VxUNHYNsCMC#>|s=|EBOg9i`ZINh1aiGCXN>`y4;o!|D_*rPA}+yBik zY`g1JUD4uCNklP6SEm=a1+=C2(AiE1h|Z8$7wu5V^JympYyvkHl(ut<+Kg_D zHK_Mj${Vgtsi$u9A6-(Cj&vo}K3Hgn`R{yFl`NNRdQP%x=inDc8C8AH81(4WZ3c?! zLBzy1c;B|q+4;sJgYK^c%*Q`?oMtN4`0Mk=c_{qPCQ0;6rbt`W_jX6R%a_6E2cBTgZw7<$l-D>TfS67MokX-6T|Di|2X)>(F-fERP^tFMmW5=>; zC7jgp^%sE7aD0|`o5 z;>iEst#QfpLj|_RwKKWGNjct@U|2C*9oB1MeN1xw`_f5LD)ps?lG)CZiC=xmMru__ zmv#naWk&{Z$(s`gSe495gOXbNjyVp!H)9K&H?mL`q1*nL@ld<-NWoJceKt94f{Uz- z=S7l%GZ1; zrv|o=q9Z*o&P_$;&eQ8^<{tT%MVZz4t^K0Wc;36Z=#tau<{tmKq_aI29j~u_@-iD`E|pb?w*25;_%w;HK}@^) zvDVb4YyFNy;$I`yrau4wMjhHQM;ceBzPbC%=3|}3pAHP0gH`%-6YdC$zK-%{SH+$3 z^KJz-XPYmb5^Q$KH6UMG!^*0Mn{q%y?9PQfe~D#FHo5=1=`^3}{9J{trgqWwg-!`p zE{&5+y-lQeq)e~fJLdn?ReE6Tutm(@qIc7o!?S z&HCdZ5qVtgAIE{!rP|W{rIfdx{OU-`xphXYr8~+^*Dm53K278^&-l$J*jZ)WGbfA4 z`y8ioMm|yAE%tQPPu7!96m`v@gJMdo2130}R?u#2dshNni22h6e8{V!IO2wXItje#zV1l$c;g@N#G! zwv_9W;FWa=s9EXnY*c8Z=`4%QD#V~`kJTQoqP{kmR?~lLzRof)iS9|8k4i)3>dMo5 z1)CcUjCrB+HuacS%4t*@vQON z&vU9mnHAHLTR+RN3CB8aH6}9z3$nY@J5VjBw%@%m(~zy2eI?h>(vyi&kE1p}V$P;< z2B3~)+W&sgU%1GPx4F@{HoNM;kYMhQF~tM#U1m3)NiLvQZ^?|keUwX(d&(NzK5)sV zbD~1t{fed6HGu%pf#%ZJ#IAtgl!4|8TMRl}m}N0ThpYGma&>MEXN>m|7Q4X;+=;Zd zwmfo_T*JG(7tq>!tiv8v@7bM~oKxl08^K~mDu@(ZC|zrD^kenA*V$q`;`y(txB1B) zt?eerJ~3FkgI~;}Kik(ZU2hj5S65c$XwmgbURC0KpR?@m>IqxZGlCvzEm@NR$#Pht zV!W}lPURk1XOrB_$m**6O%~hnfu^A1(mFWxX-{gL_I&9C*6& zCLvtDc4yPqZ}LDGYU-+wRnuVWysg}`i219=-s@v+H4hAX1*0$@pVCpvehKpH@!BL;^SDfqj-*yVw4HG+S?1w_xk5aR8MhI%V8dT z4^gQKv!1j%CrB#!+*N(6rL%S3S5HF1L+;>67R?H^p3w&U@d8kd+cEw-Z+4xq3O}j$H)TPv^fY_p( zHVm8re0;7bGC#OtZ9#Q@zkG%5HsKWQ#XJ!_#| zW)GXqTV63jb11i9rsuK6*3{xFxhvCowIx$Re3ivD8)|lesR=B4edVmD(Z;Q~s`M8zp8xuk_Z5XXgl+qST3+;)#M9JXUXYtLcDTB|{anVbdw^r~Rn@?S z1%E2OUcj+7SHD1rst^-`Zj~M@_Q-r5Q)mkvY$yh2?%lm4pgJ8Q*3>8X^bLC&&<5Q} z)j4B~Nnili+brI$qPr@X#=_D&ItnA!4U^X2-s5Y!k<}g1IU=?2MxVh{aN}(Nx%i`& z&z_eHX9nYf1h@{Y%no@5zr2u5(kG-k$vgeBd5g90aGR{D$$IpLwri}BF{f>!mdIEV z16K~t!LGdbxgeWIH0H&8nvrHEw!go!jWb?OajpLtl#zN*>LmpROW$$G7tj;9Ck&rF z7TH;}_~N96zr(}NuzU}Ze?B|8?5jkoXfW<;KPMuy_i(#>txVqy%p$w>`aX94CPwVq zD^?m;4{UjHdB2*CQ9L>?{e3WfU{TSv_wF+!l;%Ix7AV4f?v-692{tjxm~GX}Rb}!_ zKJ%Kg?|S1JZfM1srGh68(7ZOPlwyvU*7wd|Af4(p-IrjL%ET&|Ndz_Zv0+I2*lI=~Y4y(C;r7&+WRMicY*>f(wyH409WAP_a5^*_NePjH^PQmn7io_6`b+(N1G<@uHMtpWdm(X@7^@1ux;y}&tEfQ zvp#@DA6;Z(lhAT(&$2Hp!wBrNzw~-Os=?w~{GiMUiy-uk%DLL6vY4EI6)4BC4R}_* zp*`%bK8>52?W!8hPf_LZWxGF}63V7<%K5oUO469U=L5wkR}EdA4H4)eSAO?>PgU+K za^hRJMgR5r0Cp~y<;!*BSIKiJ0g@a^g(zHyYr37IX6jXJ+BEK5)pT^Ur+%NQb^Ll9D6TCify$eNpqQD z5zDJRo^DLN6XA=})(JbIkWCbcZ;x0mk`|J4O`DVZ+~;w6GP>_6FwL7+dlmAn=2GLf zJxki6y2*`^xX(A`*N=>QDm-pU_LVH1>rnTJ-&}YcpO6@>FnTl7h;gp$j9GgL-tohC zC3vgEun3i3B^a;6?qYTDl-j7_Xt(4zx z6x|X6i3*y(;L70psS%?IAjS<({@xF2v3^3klCFx29@RzUvK=%RkRuPFJDj zRwSg%oK9^KIO}=O@SH;RC1nzDrdD^a_i2uMJ>KpRkoy9GJM1Ifx&26SVa;N9j57nz zBx$rGA-c4nSKM4eD9T|yLQi&VxG))WxvU?R#j*ApijECd{eIK*M6(s`X%c^d;onzl zcc>?#`Y2vCcr4pOqOBsMv=fbaA?H^yER((buzRlHP8W|%>@|v6py%GY1RbaB+=!!Q z{s~&-H<{Kr{ks!oo_1wi_;j&jQ^A@VwA3jM-K((`uGs>mHpStJQ8V+N#gs-%)8x>) z8Jf^DVL50&BVM*g&OgCKqr8_k+DW}P)#Pcj+0)x^+J~cN3$kZ;%A~cOv6x;A*DfFG zcv2yJ*r!O@M=@$6J)Yw^mz3R_rDlwYU#O21W_j=Cs`;{G|EB@%NAqRj?aJsmZ^Fk_ zjcD10jq3NObFj%9QP~DR;Fm4>Uqzx%8WGYw2bdj7oKCs)gi!H0v5wZ+ru6ixVE;LB zLASX?x4}1Ooy9$Bvb8)W+g)-_xi)Tg1WQ8DBSE+{4i!#`s}kAvC7-&(jlUtQ6*y?Q z)=lwGDbMlaAy%4Q3_eNOG<8%cntUl{MQpZ4`|`?vR7zX1;FSJ}%KDALnXj3-u*09s z9A)2Vu^D!5`2mKty zv8{qd8 zgZ_onWj4u+;cl<wHBR*Elw`owvnrqW>I)|fMHsraqgNMn1#h3Su?Jqi~e2%7u=UW+D|6BXz>5lbV zDkD!*w3|ZZ=ohC(Zj@6xH$#Q92GnO)>!Jc`E_?pKF=U__#>c59%^e<$I#b8&(mH&3 zY!A~wd6L@bd_d005H@suvQuD0>BXg%&cfyc)1{MnRxSB;dzc9MDfO2%qEfvc=8R=z zd*L#0nM!dY758nkOH3of1CFZtKx@W(`KwI63<*6x{u@^kus>)l&#G7~N$an4zb_VS zs+1|W)owMo+IxSCnX`@SqSf}5j?>jTz0sKgl8RQh6oP}(^{l*WI)dHTnPt8?{};=M zX#eMY^})rmVlmzeDbc2Bu8)7J%5YD3A@8RiABwKDp*#GmL(yqWCueLZ!`1acoE`t! zjj-Ol7@?*s0R=|Et+rd4dfisDN^hsO}xB3Z45$4vv$E4qsA-yU7HX-#Xr zg*w}06Kk&%=%M8F>gkHdy#(#)X_SwuYPRM=BJRa&x9@euXj@|snpED`F;BY8YLTrA zwWp>?gOhAixvEF1KEm5pwl1EOdVbW%M~R+vzRtD7KS|B$RJsn!vpC7rr8eth<69*< zicvLvDDUk^&E%;G;{M~r63vH+SCf| zW-^QQWxVt}BzpO3v#ecq(KNY^MONzQ)8mE~ZqNisaFWsN27?s}FvlM1Y zwRl74zu7@Hpj^B$=h-7G!s%u)iVNv+)!mzT=`T_~@DJ1PVR??*>%0qc4}4>}{Y9No zX-O1G9f_Z=VMVb1J$U}v!`oXlZ>%(_dp<2FrpRqBNjx(_7hU`*f7NW-QL~8Q&Dt8gt)|?OH~jm2ahEr7_Y5Wy zl5~T4t3Q^DrI&V(wA(7I$UsYofezHL`|Lze#%hExCdtt#-{ojkz|Es(Nvb#3MwS*= zYG^AeNdcPcxL<7vm`MXAox$iNHHD(^Unlc(Hcs?b_88^P87nTcBwd^UEXOSLqF#ge1NWL5#mY&z4sYVTj?7!cEzsDx1abWbE}-73Y|@ za~Twy<|MUz>Wyk)ExFbrRRM*BF|q;i2l+ZzePXdn-3T}biD&*I@K5smVRSf)7hf>? zN&nvhxW%+mQPlQT_Q329-v(xdEZ$!cZV)tN5oYaEG1D}^1p{7_r0G)^G-J%{Y`3q| zqF=MmSlYVBwEY7)gD)^h!Y&k3#u{Hy?Y{mPhL@FJ4T; z^;xjlUh9s`Sr1@qlk#4(EXrNA?|*E$nW};=my|7jJKpKomg|mAO5NR)YIR&kFlAw$!Q?b?l>v{zW0sX`uG z8LP?F))9em)+qHisB)_TZSr7*V$_(UI7Yk(gZss%rFHYFuKhJuEM8i?;V$tFO3`X< zgYhEEKM$-T!^08Pw)9HQi^^{oj|+yd!fA8vo(jcZmJ^!$4E8Z@8Jv-G?9OtYG<)mu zEYeC}dxZCFu#Rvu6V^%@qnNpJ^@rrcQF*u3_gas6XRKES<_zh0eGC)|u+^eEz?s2- zlhzXFC9L0&qpq^u&gA(;F(q*W#gw+BqQCkxyno!XpnGOd zrT3b|MqkK1v%AvSKd9^+ne^Hr+^PGg(7t26?d6hLM)_WImHSX=pXrQg!(t-%;@|epC6l~wKSqbUd`uA`E{c|`SXhpcp8*=^i-`%*N=EilZDD0@TTnp zmRGRtLo?+@b$-L`Ki^jFi5!a7h-ELq>xd$|8RIYlWo^#j}$gU^!oHy<{9g`GYM`&bLkMkj~k!JG|3E7hgC+rs^ zx#jiKCJXIb$7Wgm-m95bXsg$?zus=R>Af$I^}DTko%6+FZpC12( z7T5nti+vG~x+NCpBp9t_YE&3BDk<2W>+B*Jt6Pb=Xll)~oYXd$&r`qG!M`u>*-dFI z*zFquXW3CLSOI$EWYkz1B^txcoPhnM!jlXMOr@(M#RZ{R>yzp{SGowmpz zepK|9H|}cR0)IpjIVz8z>Tb7XFz+yb=A_M6Yqsv;eC4@K9$m^ik+?k8+;$x68m9B9rB|@(_eb~?ep-qQ`^GuBMqDm!%TWz|ozsXR2yt3bSmsn>F9|yrJ9a!-o@_J!vOV$(A+?|2BR$aGzYa z{2+Fo_%YXn73Fj&Q)ON{DAQfhNu93uc@00p5QT zCEg#r z@_N6iFZ&M@s~h9N7JF+x)rSP4t2~_Dy!fnpvogxw6POFJhaRa6l-iHiGAkHj`UVot z>c5={_Mw^{N2$5Gx>hO4t$aMa&Z+Z)iCyBc`uSKw8K?JJ$I^zrUbUBd74z%D!o2g5 z?OgOFzZFVT2+gFR44-cz&ynbV6YUG2Ir(K0O<6uzYyzau-tUsfKkTNWc03<;TgfRi7sky%3jPIl3vzoE#_~!Le|umq)d6(m1&sd zTLCXu*()l8zg`-poIQQdX(Y#rZwoRAE2@KW%yHL!SY@}W$DHLAqo$v{x)C<8nMw^_ zW}hDZbS34-{w+4Wjqm5eoU5x6@25Y0;TV$VC<_fM|dnYoK;t` zBdz5*i&A&3{Y5)26|B6Info}qS;AFf^+ZdP`^~rF>lqSTQm5{>ZcyJX>X=p^XZk30 zyQz|@mzrSJ%&nvr9lmX+YJk~)cUBwa^J-sU{QY_Uo4WDd=8Y#}ghREnFVL)MZpDgD zmhWcnCi3q6`Xt9?tqt)Un)}QvKjXC|wyMwjgg3grUFGpv;bGyq#z=e}My?`y4?GY# zA4y;)mQBZtq$>`X2FqE=_q_|bH#d_Ud^kpE@;3&dyQH#$<>ae@hk}JCWAIe-Rwi>F zxB3$nk1wTU8J0Qtak#kQR^!>O+NqGzIb4UA8+j5K$Nk;cI+W1VF*b$m&35Kw$upka z)@aHg6T3fyIny0Fb#tILX7FL*^q@t8cg?u?}Mbe`x$2o|{ z-vyjvY&0gZVK?fQB#MzS);B5GDi6P!2kK+Q`HW?}(BZp?M3M~i7hUe*la7ql zv~PGDT})RbDcHBkRwQo>8LkOki!w-G5KhoD<&d*t{D5wXsujR(lpLF&XE)YcqSk1e zv$etL==Z1G`v@Y{JROq;E5)h2t2}<{v6>h5$DxX6#SY>lLLOv@eT>|Cy2z=T|P_qM=j#PsOfQ^d@n!W4OO%uS zn5_!J5!cRXg}dKg`H=MBJuaadUWD zo=w82X>&S(YrlAC=rw6R+3GMmuW@)i0bg32i#{xsrf>oDN=W2m`#S0Zo_?A)lh8>y(;VML*ZAxvT7KS#D z_Peyu&W_)xU&=~3^pDk+JM%9dZ$0c*hkXgo zVIzN<&|N4Z_9dw+)*#G}yP3?x9;wEuZOxRLUlhtIo@3?Mu+P^y&O~YCJjT7d?HNir zI5uA4RaSz%(OcgkqOmq%AZ&+JryIgcCr$?%V$+;B0^C>~CwfrA&#)2tI*-OibmtVD z6;wOwk~ByjH(Rjti7$N5O%kmkeH^}h-X}4EbVTyGLHEGwRE6~PwQ3VLdhYR4Pi|EkzeeqrIWz;uhDo1NvB&3eFDqW7#5A?Bgn*L0 zxdw^V?9FEV8zT>Lw?{HoUW%-=75Or!A{K*TRs7rfv9rs#VKG6+Z5xK9c`eGSn& zcP4b<2kT?)o1K~+2XA*@OWw88Dvm(lzH>N6Bzxo3d_-9M?Fq9;`TnSFLIr0`+_t~c zHRG77ywK|Fru9rRR#w%6JyMh@L7yT2w8PPmr+2H7TPb$kN~OuNt~!8 z*6)rU)SE$f9kEKou*UIosju0`f$8V@K2Z&ZI6dUwA1$3??wV<$DJxd!}*Q6%HAnbN& zD9ADLn@u)_Z%=Pi6GU=eqAJH&LFBVl%_y1}o*Ur9#ITx?0Qn%2Z$iTY&iZgI&9KdP z2jsusA6_5`mnK$wy7g+wFF(_OrTVs#SKIzX@FlIVO$v6Ka_?qXV>R+QE=SD{%Pzfx z?;f(6;Yh_Lz70Gtg}p`@M(^2#B4lq*GO0S}Dk}Bi4QkhFeSjzrwUI5&HOxw6UIr4K zd2Vx+kYn!iJNfH$$caszH)H&>d8%xz?YtwIkwToV^KtkJ=eF01!LB4*pAl2*RqK{z zE%l)Q(d26{jqbjcEwtL~b|3J}vY=;pTeqNN%XnpzgxO_KLR<>VZA2plN9x{8kG}r+ z1rM8hlbKDi7!!Meb{9K0C(U-2k&3m(#?d#-a$5%eoX#I7#%?=CEHYW6)~X_h$wgA) z!j&DrX;6MUr^+zz#la%<5i;C0pZJ@?a^8OmMMUt3jNSX5J_~J!xl+A>$ND8Xc2C0a z#9r*jBPHs5#wV<4ESag0!k~0Fb9tw_UUkY5JoQPH_;Y!-Rz!|PJV6d86kqXk3qGeI zp@~Z{0Ns=t+1E3$d=bx1vfJHxPGcGjcqL8u35v$~2`hB?Pr+s($y zs65+eF7a8C+GU<$$f|_nH&siN-#8bKtaND-IVlrQaCh(TW-&U@BX z_(n1V|K@$0?^-_y1_xOKICXtF2dwQSyYYxG6ur^vn9a9Y<| z<##opbYEgojCyjd)R$JqGugh>GM?Hu(-fv9%^7roOxUbDq)*F2%U4VZ{cv!~~aT?*>b ztAvT^60;)|cUV{*iqy-$0-?@<+B5NuL=+54G)Bx1t2_Gy67 zS={m4kX1LPWp}J6ND^Db=CWcZ75wXAEJ@Y3+Nhm0J^xu_3CU`Ku47-4e3x^1Lr;(< zmB~ki*gH(ME^{=1wbCwYs~?xDPY!iOV;1xFs>`N)@6R@^}=TJYa3nHC0(s>8yQO5(Cx<{6OSK>1}uh>BZry=A~ZDez(^lr z3wRT`DBc%)T#jFCD=|M{j;`Aix!AUuQXzT|`WlFQT+i-SE&tMm0jU_WUw~0o-5u88W|`IMea`J?B-96XQsbHX?W zVmtyRxzWt z#ht0{R#)fQ&8xjFvD9XD^)Qci_7mW2YzD3kyWAP*tec*WPtP~MoX|mu6Dx8>4LDS! z*gVQaodv*)fXWxcRolii?+;Al$DB#B&Zz0(M#=6<(%zxI-_JI!HM!6$>RSZ})OMF_ zH0?uqe8mwX&FKpR(QHvjF;YdnuzsP$*_|39sNHF$)z#zbo;oUcS}QfowKiSoaig5Ad$880uRVnR2PbQo}ke$r2T)I^#{kw=t0z~0BLUV zg1kdWwX8B;rRw#UMio%ROGRyvrpxrgq9pF=AMZ{g6f_H&bO|nOr=#17 zD=U1aV@RQ~NcaCe?++lq3uyv~#Ovr;iEKf38f`+J7@_bD$kle77SB zA6ang{cjfW?%cA~QC=IhT%euM9LDxS0|DC=SW3lGR_g>y!p4W>VEL2AH-!S&gypAW z9bE=3)0VysoD9$Pn$)w1V>PzsQ`mUVT(HOFt`KnFabGrLgc56pxoO@R%Mqnh`KxU*ey_^z_*`(F>lR6;NzEiavRd>XkddZujKi?P)49*8 zqNTkymX^LPyHn9+nHF~pru0mtVaS3$+~Gi~F;sc^sz-*^(18U(EgOWh5~ zikFu+QB0f*jGU+&%b-NzpQhU4Viu^QlM=Bus4Tb%3kAwRw9I{y_S$+MdV8ss*^ezw zRic^S>M}4j8**Ea!|1_c?EBEaz-YOhPH1lm zZlzDG=lam<1HE0}2X_S}skx~a{cyEg<+!GR$p;B#w?O zKIj7)2$dG^Vb$-%=glU0=rX&i1ZJSXOc=8qP|NKP>-Ma1}QGw}-@!vhQ6~NdFQlpGjK! zO$F+li*ZYt5fgS5YXq@?tAS4&VC3HY&h~Y6ufm5Cg&xJIYVnT?@vwvVMe~x>6m!a^ zqVr~trR2gJ!?lgVG9tml$j6C$9uw5RVTbY>nKv#0w%q=nF>7a)J!vT6#Z#vwYg1Jl z>HM&j1#V^?hwf!VtmuszwkP)4zdCE08>EiyH*psr)O};rZ@!4-sM%oLEB!EV?>65-h-8zr(%G+}nF`@j zTr5wZ39f*cYKORO<$uqH+Vjf0%iZqYkiT=djM|71ob|9FeRN}h(OZiBi#%7TF9B)? zobKfFq?YTjXm%OiNe!r?*UE#!X1iYDgw>1}9kp=xpUZy!+T8RBw)26^An2&$iczn2 z<1X@l@o+}r^{tw>iz2?6ojp>nE9#!XPdSkrX#eT!3<*8ii;~RC0!1e8d7Buaa(ZI- z|CT|9{K$0rn#@K>1_YA@-I20#vA*b8TpsC}GY9k8(yfqYSFIPwO-Tv=<)#w<`KI6w z{(f+xgaq9Qo2tk-c20bfAv|)FQ>GGRNsB5D^6J+*REw*UVv4 zo(`53m917BfOHzNx+*G2tr8JJMkn_d@!ENG#nhyh0R0$@`={d?B_s>D2w<;yTdb6$ zK_rEU-G0Us|DAzw%A{fxA`C&yQEXEnXxM?*fLW&Cx8*Cd3=7CHRr7hXTAXg5A4YS1 ze8eoj0n$=Z);hoe)`|jksdn_BL!*4HS#yLh+m2yU2*7OGSg%0pHyvF@5UoJYs?W&P zdz>AAT)tPmQ67hwhU@b6@VEsU7i_9t5(WSi`<^sJhA`>o-MZwKko_x3Pi}J}bX2^E zcfi1!B#`-QamE?dh{x)YhycyRZe>P?o{71V7VDq_Hg)FB>^GZZg$jn?HbdMhKHEfX z#Zz0KpAegBjbSq$NWCLdALoiIYvA;}L%Hvk856Q_1JG!`7T}GPzQSVGc=#j-2ghiU zL{wb>TOZ}IfJ@yyy|6}{K7$6!0L24rNZ6_X5HOuzckV)t*!0q2TZ>t=#fqdmpOCaQ z?Dyak6mA-JY?lL*$IiXkpe9kvyfvB?B=dYu#gj`z;^?i;$QlOz$>(Bi-#vvziGS3pF7f1ho# z4>Mc=0)G{v>o2@oT)t;;%#45K4XVnj_6ZY28Ci(`!fx*wYD#ZTwAx`D`<+5JKPt)p zAfef`v5bVUVlz#s@AA+FUUJI*!x4x=yiLf$y;$*ejMsIv_JMF0C6h=QxnTjHlByQ< z!~XD<-jZr@M*b8CCquRszVLYP^s$(&S(tnPiYO72U);uynf-p$j1Cr>AfO$Xv9>U4 z{-T@6-fj1q68oQ@xwGRZ#6Bmre6x7D8(a);@(3FzRvj@k5D!dZB*|-xCE>dmAv3tC zYqHB9ARd7UG2lKO*O!atlF(FBQc|)G5cOOrLLpB-qoi;Wp8iL^CW!d(Iz%|lfE%KCCr;`Y#2a_eu z;Eg4CpKY3qj7%+yWNeCRWc8$=9g@_jc_MLU2>jQL_nyQmNm*C;FmqvHu#ESxnHkgO zP<<3*W5g>4(tdR3`J==vo&Z-PZ6$cjWx$$*2;I!e?s)1ePJT5#Usq*hl_9=N;4}gjuzy*d1FdtbBp^5P^mNd7 zk5tM))d18Xel#RRU<~+kdd^vOr^Ay2USm(bGc(;E0oJ^TtTo?&@yY$+qOhgaB}b0J zUR07_d9lMHTPkqtIq+R$D39MI!KTFuBB#U%{S;&q;r3w?Z%hDz)_3y?fN>eHZ{V0W zl1QD5lC(1h8*)%HEaM}B>q{Gds1{_E{r$Klvh(T-Eoc>@W?a7ly{c2cCr_KzfW=K+ z@>5`Zq_Rn!RzPwB{z)w}9m#-^{QjcIisJO4E{o)}x_^FnAby)V?Z+cz4v~!ssOx>r zsd{!h#u(no#7BoAS&FPT2y^fw<#JxfmU9h{Ed+i$F|4c-V|5 zsnr=p@qdw7|Kor#cMvM#iY7ESgnoNpA6JAE znTTZp@B&sE_b#RZ{Jw>j&d6{7cK`wG`r3j!^S{su0mc>BzJFR!;Nbla==*|V|8Y;i z!9s53zu~H^WPoT_ng$Z;aw-;2a-y4PWIPwFpuD6OMK+_OAeSLV`vGBsee42jb9)`V z4FMMx2_g#VYh4LvBBUT3cs$tcdv9p=&CT3CyFcp9qU8(8}kdUz%e4<{W zz*;c|@q-N(0RnEL%Yq0AZvf_1YHxbHZwfZ;kFbsr1N?aRovY7}ACc%#TdZ7d`+r?~ z3Df49Q^-b#Fh;J>N>z^`b!%(*Hbm~g9w4@zAOMa#98r=7S&KX&ljLw75?XmaP6G6e zmtbiNutR`w(MTm&COhuPfkKM}P{}(q@TNm!{A5yq5M){*B(HWxRy#osRLs2PyY_tN zM)^$wdqxQsN!P!d0d_PIuayqrz?y+&gkfWZx%XJO@Ls~sKE z4e}3^!xqF60RF5n9juM@X!ptRLi5%`290NA;1#bWLS9y|{CC(tvT*)(Lb+tea>@9$ zId|zC4C6b8UOfvWj&&+S7xC8Du;W$;rQ<>D5;osy4Ew`IY$;Y#lzH{DX+scGupM^- zWq7(~Tor*zK!6|x`UZ?T5ksy3#sD~9d8aj6++-e6@x^9On7KGXmO(H%{3yCbuw?iL zSPqcUCO>Y7)UwY%0eHjmPe-(OXu~FuYBtaVP=webH607-zb1r}1CSzRi7x)AFiR2O zn2f^dQHBurAmKQH2R?<|-{;>L0CuZ^w1Zy+SwuXNRpfB#H(3}gg8O5H_XE_?!V7Z2 zGy0N7j8?8QdbbGNNhBS%-+%6G#vmio=}Q-TYtF2ZkJ-*`K9^n&Y}1J@SiWF2_)Hn@aQj&>;L6HUq};Z!2f{V z*Pb{+Rd;FQj=cMWxrOW!+jlPAUnd-PvGGqm37QaLZu&n!6J7Y~5Bh_p6xqzfY4`0l zCh5)q-kS&i7vea-#H_G6agFq5+t49MmA}BJC-rfR6 zCIyP^|A?9SzfCzJ6M5p@ZX2quuEO&$`)phWMYC6+X&3-Ya`^sbx8Ld=#sejD^a{bo zL(u-Fv(tHlFTkTLC1f;>#fe=NJu$J#bNK|G{IY0b8 zgjiLeO@wUP7#sGxgpt%?uhrH_G-fjZDo#XlM(?C;cqm2z4GTIYB}$2{4ZwvxIxL-@ z^!qX}S--v;E!icwEzpy~vewy%y#f>o=Q4C}RH|6IWY|HK6b?Hc#vJiJn>;Ne2t)Xt zYLS@6HW{L!V>^K5>(FaW@-0jLj*Y3Sgn`0Z2Jpa8VVl@(@-_}bSpa!kHk%rQAr&Uj znz2+>ck)M46tnlt<@F#t8A4vIbDt3k_fR0jn=jJPp%EFfyk}260dhU? zl{oUp>icTNnX@DF6k)NkGz!G1Y@3eM8Nedg+x$X_^Tf_jr~bTKaD#+_l}KzQ&P*2J zFIZ|bmT~;#H5dO}cuE@42jb`oe6TbqGejvs4FjS*g+89ktE4U1F~y<3&XT%mm@Q_>o*OTIl@zcbG^gI020BB+F?Mu zYS|1Z87x0eI8O=nU%kh6NViAiaz9K7C>T*FuzYNQ0PRL>`VGUj zw4Y(fy;fuJjKRWYFb7C65In^y8B}##T$~9DQ(AJeDM-r0^6-}0XXc_9>c-N>v9Ad7 z-{)pmlmWE@P($Dngd^fLAyav=;=h5~e`wPexrhk6U8mvin-ea!D=oiRSm!}Gf+pRO zuM55Z4b}d`_~5dLUIb9yA&7(7{|%7;!^+^Y$gP1W-GTf6HdUbf5H)4;iPVM=_@!tS z#GOLQYk(Rt%Pt{Fgm&0C06Q6XdAx|8cm`l_pt}(%_8pXh!CD1n>fUN?%(7n`QlJqN zNXc0Hpc>5iEP+5p$OvEnf~Qcd2-FIZ3<~sdg(vFgL&2fRnEB4OnF>_lurNfj9kjmt z?CatPz;+}tAq?pVdD-t)UIcqhObYwByQw28ts0!qQ}^HP0sd0CO(Q0Nj(}Tct6uW8 zxd;l=Pk!yyIn(-KK!K8;CLV>&MrO>?BaoR~8}AMvgaD+@>F3R6pl}BS810h72>Fm` z$gTZkSfK6=fjDFHP@#e>_*ejWNSzom7GQNC5uKE7KVDBGZqx1D%wmw0l|Um{9N=)e z4wQ^s$cMfD#y>5rfnmGZ57pse| zSeYS~8jDEPVgd795k~$q6l%-}D;}&NBZwrB7(h@Ez<*v2RUFytm1E_sp2z?@7rj z2@Q~SHH~4L$AX(64&`#p;49LRATT{>hou!LA1N+~3yC|;@8bEt=7;+kq8E?3@@T}L z0yqNM&xcq_#;ZHH!#{~Y2#Bgu0d2*`ai}K*xw(m;&Yz5oZ>WH`ux{>Ua;Q%?hpEDcny}k)-HDvhXiPTWWO+tJc(3Cv_O*`4?>wHK_84Q2C=OXggJO1`f z+p6_mk({t#Z-VLW%=v8iA)BoXoNZVeu-aKGZr2_5g46)4K18X&uPJdj-+&A43iTDP z?Padrztz4b1xxx21?p!JKavynA$$iC+x{CU)j$fpGjOa8f$VJc;VZDGVPB=(K7iZZ zKD)ej$Jt_35!nGn_Mw07Mzzq66ua4veLxb%kq4(pLv}kQ?mP%rUqwuVn#Tus5*aDT z&Hz41+*4PHm0TA}3_)A+S95)xIJkD72m+`aj{@z>m-A4F>+Aw5J6<@Vd{ zf_4%Tns-!hN7)@NI!yR^%g)zGad<7d$VvxdE>iTbkk!wcrXF*1HT}Ydc9lT!>3{4Y zR=^76E%j$sGV0B*K)Zg9G;+}cb7w~qb<>fEv4ZkhN3G|SFZY`U`(C;%1R(Sf=1c6? z9Y3gVPz|BPssLVlVJK36My#CLaci@Qk1qgeN=94^j{o}+-~af0czSb$jDj72@N>i+ z1lj^5-|KiclJ;5khmuL8SUrZ<9Q;~gkB)$v(pTZrw}5lT34*In8nn&@61r1_QK|(< ziGF-Z^yNRdYcn{a7?r(i)FJE~cl~^}bhyyelx%|I+)-MiG1sxZoH5is0CX|KDzVf`jO$q^l(~>58Qo9q(2{>=RDB zn*3&?1|lF5s1rP(fEnpYEl4@Ev#YD0`q9-dQyj{ze#ovs(S2wLcT7S~R}AC?Vwiw; z0<|*qHI41_5YrH8z_q>6AdR6c5$>ctY(TyXp<) zK$=4dS<96bQNS3ewHETLQ6Q+N+7q^eTq{pA3YtSYq6%EJ+EOiqM^-M}vtxh?1=1Ci zp?#elW;I4eH3~8d2yKkc{WqnSpa>?d+1A?Z4oAG{fMBM_H4Wz#NuO0o;Kr01mh%xd zRG|vO54-vXmd*$wR>9JvFCms5kY~Vrq;eK&SX?7q;|a_Pz-ZNCFPx)%sIe$g_p-H4)!M{fvtT)r8+;HuZtf<}P&XpG!JflF4Urk~=gNe7 zQ7CaiFd4GUKM-P!Os;3|803b##Z295Fduj@q^4dj z{kC&<1d)t?&s`K-W40-H=376NCB-dO;AujPZ^A)J_}Zr+1y$faD%X`0zi?beLXO%_ zZpVuP#51EbqxFlYhzJI#B3qeFOE_#`r-;x8P}iKE1fa@@Y!=~dMa~^mhMGGp6hUIX zgcpDn655hr0YC~^uiR-i&!o17TmQw5{_9F%EPW~NLg>$XrX|1C5&Yzmph}&1760PD zBGgmh`E35Rll6w$mKugZ?*Fmp{#2-lZHUzT!hbB0b2R@n7CZUXolGcX4_1(02Hy^8 zSt;wM-onKdd5x}Y`3>X0PPfqr*$h)TZsmm)cBqm5&582mX}c3pGUG_1^>xH-<6{$^ z8w`+t$DNJUJ^9V~yK6!X@r7MaXP8YW7fekqGcJjAF7r2S^QiN7eLi;S1`6xEr%RzAAuWG&X!pzZxnd2%w6xPmbb7xjtl+C{gi;yznY*v zMnZ-uTUXwButmGQ%qH^1a&1ZPPP57QH#{Q(K3+DKEsovd(R)HLMr9q2SdTtSxXJyG$uXFsLArn?DM+*qDa|( z0!>$D zjZ1EKq*%nqd{ih!g_(#52>#-ljov9@3YgB(_0h2N{aNUHSqaL!nqx=Jw4eZ7RRL1< zBkY_8Z$Gbv8uUHp#niORSJ)4-rkrb6w-7#ie%+&BYEC%fiMY*lOoU&nO&b)DiMv%~ zVxZVb!X?K@p5D|v=vb0CPt;|LH+MXyUYU5_CX+EDNsXGH%i($365b)J{I&c;?=P`N zstb{_8Ax~`MGyOXn!xQm33M3bw+P@Aa-a#!s|0TnkmWK+t$^*d0`9WBY&8wBrLpvR zER=8}l@d@7gMVAhyZUY~Gk}sP)GNZqoNMd-+zufHIbc^iZV={gv`k%XXNKZYumEr7 z7!C|3wO9j=0aWcb3@ckKpGVFhee#n(3ROp}2UTijn%VR@rx~8MV4AcuZ4AXi9?(5bjdJM+57DB=?QV3uPu;2SwOpwekiPiqbjt^e4w__>v0!=qr?XuOm>8V9^A?}kPC#nxCI%S zx4hKUbVovowXKNfNAW(x(5mjda6=4b2+s*8y>?DV!cSdCYs$BOS^yeCgSrZq;*jQ+ zC^0Ogx}LCgCm{|OxTn>taYRPD)O-R|hYbX@%TFws7fTN)o%h~a3xpS)MH;jqRhr0Y zHpES??UMYRpt=bjMMK{D?Skp(om2v!hWzH8R-%9^NvC>Rj(9LZKfvMrKDIk{va**< z8(lX1n~&N7T2eGpYOZ^IAO zWGW=Vz8JH;zmk?QKxY^d^u^!^$a@%giPhq$pKK z({S43SPteH=c#nPV6vA!Y}+^)%k7O$27l2Eh=OJpcmAAG>x;I%Waik<*EKEQ;dott z`@@R;BU)u~_7&IHgRy&1XOdzzY*hMcL)pvYx*qt8%FQlT5>o^8T~AaF(q3&fEbTdY zRxxVtH3YAdp;vI(ukB5W7A3dK_k802y3_|FJdy(gK!AiBY!=7qHYP|FAvIk#RbkAa z_+TKBx^S2P&&4teP|ELwBphk$eSQ#kfr&7lO-sOd^gB^jKV4?_wYbL(e$9N%xIrXj zh@pB;5ta~!MPfvaf6-ODqcQz%?TrbfAOm#Djw7TW7OEjH1t$y_Jq!ev!0~Wk9u4E{AK=En{)buoGeNdl|L^c_a2l#A=@W1RB1Zx2e06XxKlB{?b*J zAQ-4PYv@paWZA742ZwQn9NN$;{lwbsrcU>Uf#uIvy*viBP4*7t`l)g@k91pZ`UV=- zq~XiNpjAw~OLNNq!`xekRhf3}!{ex^AYc#*0*b^&N&03dls#kjhj|y$3AN4{yty zkW?W0vqP|M02>^UC#3MLr9qYeAU+Q%wk>_R2#mnxo{7+OUzS7JGN|whb6m~r?YH;? zHxPjd$e0MR%oZz4QuG#0~0!2Gz0JWI}l^P zEt~>P_u7yca`pk&=`WW{btVrFqRK??Ql#z0Kl7!V+MG7qq;Ko{r#)NA1M>+X()`yB zE_T3aR=7}m4G6XEpQmJl+3^wR0q)HV4qzbFkg5TcSql&85CV6dIn6t{an3wSrQc>WWs*~d6~dxPlQsMDOy-c` zp*eqx@S*12M->^9!?G}rO22k6$EoJsgw!zP2a1zQD5W=HBZ2CL7&`uzU$tazxh4@(puT~q5Nog5e~n&ulHrmew;#aFDLc>yPaMQ;(>CT!9K%J{1l5$lhgW$53%$7knJp+EjH72 zW^UKz(bt``pMN#lcv1Mf+pWkXMP#?6oWU2PQ#ve2zhek*uF(#f*>=rmB9La-c9mG9 zb`1ZH?i6Xr1dia|z^nM78;^9CELNuYw_}mET(E!|p3X+xhsi>t9nA~&$fWltN<2-J zy#!ja5e4{@=4sk)hcta&|ENNjr4WvO^ny2=bxIRY+Wu#goc>ol2j4Zgxs)xO(t1Pl z9&T;shR(lneh@Pnt<3yt{;5DzgyY~?BEXxmz>i@oN{>e`p>p`F!ls8nYV3+j3i3C&&n7rk5^ z+j!|Y^tc_nS^bBt2Zfu4O+5qHiS+Z(md3BHt1b?0#^_|1d=+kKHE4@xydMzldMC2_ zqD7kfG;Mm#p&UdYc+N_udVo4VPA5 zV#Yf;xgPGvvoFVRt6P*Y%a61_&OUF|GtQ||nJLA8^T@BqKMw&#BiHnghjE{J=Qt8S zU~58BQLEq@6TPn3BO4+$n0YTP73})(=y?+FwWv7^g)ryZ8#>qw1dq)1f?|I?O}Asn zP&%r>Mr)XS$eC*>?_<*oGF!8Pm5$wGj{^6bS!~^2)Z^XnrSG*V>+RXnvm>g^*muMG zaQCmSq>Ie9{hWu(vk!6{*zUheI}VdGS+lFc;queE5QGzsp+)B12jlOBCWZkNt8qPO zY)fF7Ncsp?ibHbt3R<%?S}@B#{+O!>#cjLRgvh?*wryxrbE8)&CCw_X`ca=~LDJyY zbiKh>^8Nt3k!@4^0AiO*O3v;8W~yDL+IY+cd!NocO6S78KXB9B(r_<_+Bqd~J!ee> zGkcg{ePS$bN9pY?pR6U5bJ#=%yfYi^mvQOng9kZRjO26{yxOwSq|>9em?7y87d!c1 zA-=iIp`&)qc3=tknC5lK*21Sy#DS6?Lv%YCEYC-VV-)O*7p2e%I{f%^>MAK$m4=qU z>sWkA{E_WO4GETf5NE8zVzgmQl)b_d32l<#?E3_oCe&P;#%uO9@iRM;s)YORImj+H z&+e>{fOSlUL}mp2Of`JWDCRrX%g8qL<38NT=JOhHKeUT(zrlX>#vr>nZ$+xq zrwN>*M_5?*bRx{*L4Pk}>m_E@r_bJ$|9;PG%LgYk+$htR6|uw3bSBa+*4w^zJ%Skn zxn**5INHJkjen)^K+0WJVdqQm!LjQ(Tk(y^r~&z@+CXqzHaX}x_4k*(X=`3i;~n1! zJPcIw!htb73YSP#1#((M(R`K{fQgXrvlgZ(?Xsbo@LDP6?8q)j`>BEqOa{$T+k{#$G6pTd=SrFR-Xy~PgTr0WqH!NX=zX9!ymt$-nr;2Q7Q)>oID0S#|)!y zRc*6%&)+_~vmC^!)Q_)L<+7e^TgVu1TP`Rao}ajEI)JzdcbbtB=)YLo2w->pt<{di z!Nk)R;}arJr)5$T9dN)@UJCT{i#>s3Z-Rrqt$+5>9Q zEK9Fd#@GtbD1}TNz1q%R4q_}JuP%ieKWB!Sv{fDOEy7MpH?SOE9eB!CnOWE6($T7B zD(N!&`3~vSU_r3(^M~%#?p73cuP5Fgk-xo_W7L!6YZaqDku=S6{03&XURPn#^Zx2& zxR>-xtlOEJ#w(%3H?$p7hs%F^g<#p)3gIb`LgUc+EFd_x(_tOT; zMa5`F(0M>R&{hpc<#`Z9CW4fH5p92|01dbb>7=?;pamr^!IodZNsxvxqQPX6T>jF{ z8`_PtGjm~VU_Ly&g+>eri_3oCN5rT(*;N?JYm#Vg)+Kk{+bAP!0PkX+wWmrAMFTSi z3fqIyuaZVtTU0MGldcVYerP$I&!b${C<%VM*th|spL8qa%X^E7$CV?ZNe<=*bO?#U zxxjT-BW_L`ZDX`fGWkN|V7v`I=R-<<#w1&7)>&t!?e&xLKuzQ9PO|fbPaqw4u^Gtf z4YiuupkWHrsPJoQqgx6v(`9sQT6T2hmfm<#>!dT&Aw2Serj&q)Z=>{~Tg&@K50jOg z_?2A#=lqMe4m#2!BZYi$9DK>ciHgc|t>@F7or{WGmL|*9P3y-vh$HBEeHzAbYWX$Q zr~31x)%uF_R|iNlHU#UUb1Mw(nCjOuvbXA!Id(o=99eW;={O#_&tu(B7|EoWTL}Dr zn0Gd+9S=&=E|yOBb^RM?)|QtpI@8)NRxCt@?RA@gV_(^m<|MR#nN#2L=$aQsfu?VX zXne8bVjEEAG4EK4zXnZ*Dc;c|>|R_9Q?5*wKaON72LdCH-|v3vH zj=_VLRc3QT>u3`9&vQQ#I+FA49&yXS4zOJzS}XLjHXLb_n4aPb{^j=16VIX5+QO=z zt%YZ$anV@6ufS+y*d0p3h!htPd^tjRD3dfpa=kGv zsu<+!^7I=H8%;qO^+)?GXlG}6yOCTOwnv_EXF8IPBO79qfJAh?o&rjF3MtZ2urD08 zvEkt z!-4AhY@x2LnlR^P)z{Nthw{6O9;U`2BJ5W2ZLxyxc4MU|_bly_ACd*5N}9W~Vp9S6 z)*G{F_Ra~TDe7fPvLnOg8=NbjgtrKX*I2W;i#KzLEu!VO4Tr0%=c0ijjeTMg_f}QtJWI+n>JgzF$72s{NX=qR^0i6>qV$w`=5}FFy@wLmvX4 zo*r%%*o3s2ceawzIP|^=b|k!Om7~1M#!SC(DB|^$#WyN9f6>*6wrRmcC(8k1>@HpY1ZN?u*KQE1xCwG84Y`#yUoyk+P#beNl4jJkx?&5RN1 zKHm%J#3*fV$`fzcb#g`PfDCZUiKXbTSlexO4U7`LXKyY^-y~@2*?Qq(OUvg^uqdoF zc=`->N>v-(^7G!(buky}==ftq`aV(J^`KpNy3%y3T;|vJgnvu0DMKGX6=Y{FUk0S`e9)TxLaKoOc)4lgtoBA3DCQ;( zeZb7+K>yOd+)%@yQ8XuWuqyMpi?kVVe&n zh~;c1m7Ha6I8c&#duC%b>IY|X>`(3I^Y7$?Weo@i(ya$=yFKAMVW0Wzf)EM^I8hKr z!p=deeI60ehX8-bzDg%U&3|u$tfzyRMpnQ5JaOYwS+6`6vv!sE#qh!>^~ zwR#G-{D2fN!8uP_UBQD@OGu#GW%v~zefi?>|2t0z^sgSM_N|k!ZGpMcjTVeMGB7BDll_D*|RWzTd9WI{PwC@%~VP!kXmn_OJanWn+$<-QuUM{R;Y2}PxC~Vrc-}c;c$5pIM zdzgE^?ZZXF>_UY{yI_RuA7puq+Tu4b=2|3q01G@O#|pnN4rA&f7Ck3qt<@C6C9V=R z4JP%E6q3{p=Xu{daK2le3Cw+Y-3zOyx8Uvm8?b?7&?Tyxt<1)9&k*a_wkMmwl=m)u7ku z&<*^KO~kfn0sie7{;z_MgT-3=vvARj!ZMUXShsEW;C0X0r=9$(gbQk{i^;peilgz8 z)9DYIj2<&}e3g_-p5c*qIhG`UZz-L2!dI7|>}qv}x9Q$}Ef@bayg@IiaAJ|wWQXtO z_m&KvRjah6I6Pm>QCF!TmudPeG18vFm1^Ds#>d~}XU7=Xjb`3akn(#FFh6K_mrLe} zz0V_KviOv?naL&3k}!FhA&}0EdChKlbV|Xx``1{bzjgrpFwuMlB^W5d6+Jqv#{J%E z6a@7+MbgJ|$t6z3<|A(-_tQ(R6|larLwd~M0CA;Ql@TCNp62_ zys}GDw=@^V3Rt@bcOQ^r0m3-#O%^Auk1nKE|WUXcj5bqB*c=&;)2$33^Uk5 z3YocUJA9tRvU~vq%(aBWJ*ht&iTHhpTso@rbq59QSxC|l*ev|RQcTJg4e`aw!xc1gBSjm5_e!IPrIBLsiw1WmxkZc@@kG(;y@zfX& zA)$ktT=pI>K2eL2NLzL$rhmIYPjr=Js5vzs$0D{WsrQo-hq#HbCt+-=b)ZFRhw%df zqVRb7QByh9h4lOZ)it+-?%~JS6cYR<^^vB<@sf_mn3>bF2u=~JT$~-MN-nY3;8w#{ z@kY5ntfn<{l}jdMeXDE&{^I?oYWPB`(v@|}y0Z{Q0%lT~$h=mbC6&@$ys_W_NkZO4 z4pw|zsVtEeAwyY&%2GmhyTI9P?h?WUF=AWu8|iPdHd9G?NQtW6A}3q%^-O!Uh|y|k z<00Q0sMmhj$r=PsqOH`9R#@OOtJ#sVFZDK^fLT;I$5^4FQfq6*Qfj}XvxQHMhoPe% zO=`rqW=}J}$fL2TJyVqy618!xC;or)Ac2T4Hx}Dx!P+|cel)-^fi64Zwn9*vx@%gG zbUqH+Q!2R22YW*w#c*oUna7`bb9It`I5SrmY`iUZI^3(OWzt5@#>GocaHu+%tl7U9 zt<)-($rt07=&sHxtVAgcxFz)Z5><)oBoR2&t)$*LEpnTwvv%ip;55kc&=`?6_T0gpXrKn4QCSDvqX)Qd zU0@`dYuoo^Msp<7=1jJTLQVt7@Fi^)Nb981d^o&}?*KR9%ih^>IWfjHFGfL7cHsDI zQ|1h-(c170%rB-g|BH=2Th%2ixTGUZoHI4-GqHsgisg(r+!1yEu#3=A&P-R+!{)eK zueC(&p8K@#Ko;=_-pOhk{#9Fhg6%1Zi%GR>`S8T9+j{PcqOKO>$DOpYe>@rj;+@&S zn@Qh%?k{J3K^%3-zdnNbOWfqzDwPG2GF>?fmu$a;e9U@mahr9GzVAuREoDS6w zjDu9R*`SJ8=&m-;(O_6vUXqr)zT&nn1~fQ9c-N+?G#VNZF%NGO`sLc=%eyDwWrzf5w`!Vg;CLVmjv%|^T@o3eZ0uU zN^oWV3`BYuX;m-qUj!DxYdwt`@hw%a7w6tP;=HPS@lid9jwn6;**y=7ti%0Vw2~F7 ze(R!9;iy|r-5O(jp0GaugH^Yw0XFlI2-__KDT^}lNVMZdzu~9!A1SGn3uR z`+_25i1*%ol`JEY&a`|Le+&wek$0}U4<~ICSEX41<8QLjLLyqx9R)tlX@!qu7%7(jBR>zWsISjjSG0sZ`g9-$qD+y#xdBcHvHN?Oau_(o~&`P-sC zEEGFEwVzCGOceE-BMqNOLnXW^Xb8+dG-yEn%X&H~6x!*K#$$ky;6fw~bvaPX1Ot;^k1&dN##vMaEl1CMQ~tOZaRgraH=b?b4s2PbTIs*zzwUkJfY+cIk(Q8V17< zCa-+Wk|%M-?au+9*yQ-g--PUqjDBPhhN2~koxHEG>uX=?3C!NQ7=O%@)=cmye*50A zU)#3U5DK06ZfMDSG@^5Y$tqZX%rApoDb^=6)#&@WOzwVHb7aR?%{p#)t@or1_6CVV zhlG8hoWe{Bk-rHFv09gg6HZdBvERTD3~8-DwX@51ix{)zXMgwHf3+2V|2Z5LKXVRf_NHN`G8$2=yqYJ~K z7qby*+mw!EpNG;Rj)kp4o{R-7l(qF@vv<(%kvh2_GS3Qb1_$7OQ2v7Xdgxq31dBeH zoUp2uJkbSKVCVLYY+T5fz_u!av~hnoGr#$$)i)oQh=>@Gb+6vm>wuKO*&<^jHA!OS zAT9lkFLUK4_%FF`N?IeNU>+}RMVGwxk7vYsF`Zz?JbBYeA&`g#K%Ag@|{Ij>gG(K#O?TXD;feBYWiFL+cl2v7kpZkS4=uKDKVzxr(mzYwX}3xl%H1f}&^;R+PiqcVBNlQRYKw z_PMJ3@ zv`AH>b8Mi2M&j+$K6g5C-ul6s&-YHA!CV1C%o|IIsszNN6QXB9bi*Wk%@P{7#k#Q+ zE}YV5Z~;!BZRo>=AUcU?w{4@|I3FKs#C_)q9ZRZOelo#jRX&M%Jv}{9Vk|JD52Ew{ zLuT=}PpMIX1Fl630+(?>YoAcyPt%ul<^23MJ|>ZW|FcZSAVrm@2`g8m`-ORzA=!A6 z@`c#OBF6kv_H4#MWD&3I7b;5U^t2v!P+;CK%uYq&SM=zsPc>3Ek4cv(&r3eq<=hpn zb$qXP2ZKT-4C7K;459p!^fUO{sRTS&*156NY?;5MMMbQJPn9J^v)>FUa3zn(t!`?^ zvRl!f?pSab36@+Y#6wBR(mW4;Inw`aHaL52$IO#+Y@0L2vZ#G^iq(1`i8Dd7cu~H~ zbYiPl)wC*yjDyf>pj{Ma)-+-_H|e5`ggQ5VYEG%Fo|n@g>(qEDg=b*Z_{o-EguV-e zi;!{YEtKK+Mu^35^3Prv&`DoSDU*E0VwO^3#WHD~DOsqIRgzzERbEX zEY5ksqhWr_kS0vQJSRt`U!*n9*bp1*F2o4LT`2=q}y8A-q)YT+hSL_XA zoUsg~Rnr-{&H9zY_-}p01eUj$^)IU!*laXjwBcF|K9dmI>@MQ2g@Yk5Gui&imt8nc zGuS7kIaXQvs&s{#;TAjD*uL+|Cw>|{8;hjJTI>yIWwg=g&KZi5u?h*P^$Ke4#VOt0 zLiFc6Y|N#Pv5XB3%66j2r>9`M*zf7_$O5;t z?<*Qq5u>DM%;S$}e}U^WQ};~UsrXC(;^u=!DA&F-0XB$cdM z0h{DnNqn99=Yv}LP~w#q;%`HQM7@Y7OWkg-XGLW(aK$`Ix*095EH6uguAVJkjbP!S zZE?u7&}|OG57^qYa^Ky?;Fnfmp$4`FnV1```Nzv1G(FicwCWr5@M31IDcyQ;AxJ<- z=ow3^SFGfC>m(KBLxy0TF?oD}%ec>2lHe~<=YrCHI~TMBeo=Snw7d(z}ZRrKa! zep8j#P?4F!euP?nKI@Cuj%)e1_Gp-*-{c$2*Nl=_FVz&@4y%$Q3Mtxn@9@lOKb^46 zj<|HJDfoRr$R+f8{)4d>)tq_3Nn6_!$?Ob)EbMZ9Z8>Ml*s@B*|K&g!;K7e%8 zA#Xl}0I$b<8tyv6+bQ}{dr$ENstY$`MFueVL&aZuZuwxVOikiZD6K|gG`mKB^=xn| z8GTItxx`_Vz`o5{vuN!2*LT&_xD~&ZO+C}WUUpk-kY0lsCCzfj#HRX z(83b9%osO1RY@mojDMkT?E&4M0V_4XeVXcg|I7V?JNB|Q%${5Ar)V!Pn{c*n)d|OJ zU0bW?G|pT3QFuaTs}A#B=F?|E_qOIo`I!7dAWo-OE)?1qlD+Nk_(%y zlMkyzhT@lSdGk*5gb?AiuY2V0age&Af%A8*<>Mzf;Pp>au8N-q|(^Fvj!cbgf8t+sh z4Jtv>iKdJr>wys~5BKdW6}RsyC*O1*{bkY1rS!fWWyL*q?Q7{L!t&c{Kj6eyB|MS0 zp&)A^eK^lTEpWM|B|BgtOg>#9YCE>EVFiY0W}bH6kfM{9cy6lE^~jkr5%ZvX#m9vg zd77-W7DHOiFk3bJKJ8>|Ck+#GbLdd?_kR zvwbeeo2T!ckdR-}vWe!*HB^FtZ1U>4pfe|*u@Ihn#F5xFtR!CZ`>5lOh5g3vgYH7IX za;u>C2mLkMZy7@kxjp zO6-gGKdf>laFl&h%yYeUuqtBJ#W7^-9SLsX@fC`$82WLGZ(BuQ5_*J3CWj}b91C9g zuL>GJV=?&6w7)DfME#Y~atc?cz-8Wn=?z$`GiKHzwg*)rgFB^GEPOHLikU-QOLtQ4 z3S73Oai8s;#nlO&J5ffSpY$V!f~9{(w-;}1+km#hWv)a^=ggyk*t3+B7lOR`PUutm zv(uhG|0r#jBotQW<8wiDyeIVUJ&lz-`8?Lo{WRw4L+?HhmdNE5l^h*b6FcQ9Z3?C0 zgRRP9ve&b>6NkU(`*vIOtet)LsmY{!in+PI`4ZQ7StL*B5N{|Jx7L>2WY7fn4qc-H zH@oF0-XcPU7zw|Av+WvQ!TjXO$*iHm1dZhb*`2i4=tWEKF}xQGNqqCUILZ2CLA}{r zJx{|gYMv_JLu;drXTH$2RE(l4zgsi*s>mkSNvq&BMikECGWI>K=4AD=edrsF<3KiJ z8+DV5gIOlzT4!WfC@*)uFWWc52jK%ofm7K#C~KSMh|brwjA;p~5#@ItefzK?9>JXb zD)}}_L63#?R@UD47-b?d^^Y~S{J5gaOVp1GH(l$Sw4BEiX|d}3hu3rovN74lm!|M2*eE~ZZBjT?+O(W} z72h%v@1JZm^TY{j6D2JtD}rxLkRn(>ViCyINr#8|ZtuC|J{&~Jd*Pb;o4O6_P#^S@ zpxFiXY(sT550;ap9GS|G+}w(`=g?nvoQ1Ehm47->kDr#G&imX_s;Wpts+~{E2kY}| zL&h}Da;MJcme=ivXw#nG5|hO`|34sLLRu87!;c4PIA@-*NMl$~h%*H;lA*0U5;CF} zv3@eAF^YEq%1mbDR0c4eJ&g&vjzH1tkKgtreLX@Z#=zJBE zJBKW|+pnHLkS1Q=8m`PFe&BF;APNb68I)5?_o}=1CuXZEOD30)Mf%&alrp;LQr^Yy zcZ;pfbTWggRZUyZz`(%JP@)?PjFV(f%Fl=t8iOZqp>d}k>3*tuVLJ7)yudRSK`%Vs zk>?ln{P*HsXGle|BdJ0D*xjg96>Z0fFBfHkm30dd?>RH(+7MNrO8da65Ug$WrayAyf7?S6Bt@bZ45v)Oesw$ZNaUn*NDUooG~4 zES~s`i#3=#X}RyMwGH_K2Xr^;R+^n`x!wG6d>&a54+JDauah&LGuvWYTU(+D0v4yc zb7Hn1(m2oE#oe5Wao6@a>$I^j-z)xV<~13&)9W^2U!p-kuX#CG;JaA|U~#fB{Ca27 zb$WUeXd{KHr~m4L2s+!Yb5}7_E}=TZ zDk1yiO#5BCK43m~UAnWHqEgcmX@X4qpK=L9u`9-u4Z)!uJ<_)c%5A18h4r5S82xgZ zWH44T^nlUIMNK`lQ=a+5IckW{$WM8K@a*b2{hv-lmF|v5XE3Vo2TW;z z#T%lslVGYHur2^C;oOPnk02MI6Bcj))3hX4QJBEQA{TI-m)8~84f!cjHi9IyK=2Kv z3n%prs4Gj~dV(dXQlGOWctDG3oeRLhsG5^LihFiKf5>4B*T~`rw3LXxeL68I0-Xnm z1ea}QI>Z2NJM65q@Fy{ybpsj`6dEc{8&Y7hlH__W01rdu1^L(&;~Qe#*WPN%COdB| zv<=0An~}UC&ErrjA-`BTTudUGr{(QHPXKRxx$dP`AN%|IY2=hR0^xNDO=3b{ zRBs&2L^#1Eb)+jv^m)}n_r-PeDP4Fm@PTlJkV??bdpvt&CCAdC*0#=A-UhpBz zJOL-d_p1w&b=UoO!9*spnZuWeQQU^qA7~V6Y)oS`uZGVv*&J|HcpJ|mP#$#s;fYrdWs?Qb3*js8I1bb~7PD#8abM6QKnH#X z$byrcUNZc2nq-(9o!2$AC-iTh#@xAv8oT(6h2(_(x!j6ZlCqPYYLOs}WwYH+PjWY9 zdb7u9FsKs6{kZy45&R1B1TF0qLuRh!{R9DWveUd`{Q$1T90I8^IG-R&!HFgCWtp8z zAlxx8(41W#Zz0@(;8D+i4H}0R;&KnRTC5*j72hGUz&hX1k2E!NZ$JJP)85nZ|iC z*8N}~lvj)3T7V*b606-G*fPU0{a7FEh4@$)0KtiE8GD*wI z?usVF^!1*v;Fzk@66XN6ILLs(wsHY4JTff2D=1K}vz<2SNWC_XOTuBEnH*=@F93H2 z{_9jb#y4%g%d&Or9mnH4*j*_y>lg3Ff{(7;nj~$BOVyt1FU}#je3qQ2C%+S%7Jq;l zBkrY}ch`G9#tL|JB))NFy8{t!XLb6~YmPO6L=qwbg1Q%j<5N=^a-aiO|5Y} zHK$_P=gJGX&_|A`QlU&*iFL7~r}Sq!(yj}SSWX11h%cs1!Lb~Yg%xKv-v=8f?KFn! zDK9GU1hiT=H#7te4USJvCMP9{MMd6FN`Jn?kiwD-4bfIqSo)WPa(QYNUXYr`x`)t&?tppu{!+C8vYad?~ZaOBKc8s}#^zVC|!Vk&D1+)Qx-d(OAkV3HO=TqtX;MCPuW}9K!BV}%$-BBtxh7@-s zZVxf^cs&I66)GaTP+19zvik}__#_TdowCOd2mu*IZN46WW%t0_As~x{iZ}=yqhC+` zqRdQV&;8EN?=0Jlp1;H^u2iI&3Cw3(IjMwfvV4;G%(=#o36ls~jed-xsZCePfN;#) z`x|K?J|`!qJn;#*52*hr#JtLTsuW5+@U`FbBv?u`%0-FXbYsGdtSnU@ydyVhHLBcxy38G?S5S>EeY)9bRx7Re- z{yYf*Y^(UVTr~eBNeJQV5%(Zn-8h@`Sm68-kd5Ai6`90z8qP?yc$(O`H%OQU{uaz0 zeG52#+9F}bzA7`<%KpSTd6OYdL`<5918sxP!%OeLF}JPoBXiX*rLZsZ> z_0JF#azsNc9fcAF?Q=n5Y(K$%sz$2g?czI2^#NJ_&W&pMSrk0RI!HEdpMuCZ(iE>~sVM2UBa{ z)&aPq)4HVTy4ERAZ~;1%L$VcGh;>|GCHCNYus{_u#1;1*B(;gIqKT9!Yw&{;+p*Fg zs&LE`#PYzx4S*E^$fRxP8^9nqZlQDcz7OWay!`9`Ts-MNLUfuT`08zdhA~P&b`7jl zJs9qhz=yZP@vWStUO%}PXSbZ1@H!yd;|Jun5JSo>NGsO5G+@3(02vFiLm*RuK}z@5 zdnlkTvIE{zttm1Ty^N=3ssWoR6N;wsci^cuS9n%bR6q|qY&){HxA=;P)pSa8;#}_W zwTD%1dqt+bl<0D`Vsov>7+OjWE4)dgcV2vYjhuH|G0`0YWTSzW4$u z(bR`enSy*lJhfbb<(P=Ajeu7z zWSNdoTW=^|xQljZU@S)F5m-@~zrHhiy5(4A^A_|q-{2;Au6ROU+jUK;1-}ut{sxqN zA;@M|ZqLMa|7x2JXFAn9E>h}i$<3namS9E`tOlloYBZgL^PWd*!hL7AkaT4V_uX8A z;4=u5^83#%_J1Ie8#f@u3n-NJfG-TVzPj@jJoSXj*x|VbUJ0@J1cwbu_*gFl@?905 z+<}@gn6)%q;h5i18qRH>O>i>KX>F#B?<#_w6McP<=~#L?xG-))h;I2IXbs*RSSbMS zLB?$tw2n1%UtaG$=t8K>&23el z7wG%}S|jf)MwOhUEnAD5EG#>NXD2i$(%t{*D}51J%j zD5B;omD`y?8UsaG=wQrm8@jtE>T?#>rET3cFVQFq#QJr2*Jb*Xl(e+;1%Yr9He=D9 zt3j5s$zVtfffNiAV8a1R6bLNC$P3a$*SWu3e(pbxctXNI@INxov)Aw2L5}gniy~o018BK(y>JYCox!%Z}gpY^V@7(5r1+V5?`blMmfc_JQMSnZd29DYDrM-yoe>2k4-`<{}|SzrQ#!H;*x%>#xu=-elF zOgswYGu=4{;Lz7V&MnJ*Fkd_@?(6~iqKb~I5~NJo<`qjK(|uP2r^=G`4Yhq5)~YL2~J#dlado>+}82cn{b@wl@};wVapWc|xavR@++-$O4I6@y|2^ zvy&kbwL0n#(NZy6Q>~Ab2j;pNlVFza$kt}O=KAU_pX%WXQEB{}2V`5fO?$pt_hbmL znGf7CvVgzPgu!UhWa+No`wC6e)gulcrk_()$9|aL0y3@*P+pSBac5Z(G#lD!E#UQT z9G@x?vo-^oG&RP_?M6B=Od(+w#yXC5_Q&pth1P^xK ^gaT@Sr?3IRi_l~qc0#6~pCgbl1ypq8r0SM+Q=ITxr9Y(Day5Nlni5HwO zML<7LFFc_2Cbgm>N%F2SycLqd0&H0ix8&=uP#;2~A=L0M1c_~@3RdAuA#};?8wjxN z87j;`l%y-s)7`N6mu*+d0$o^C%Ek&1B6+Y4fy@w9NcKN`%YaeHS}tF$EnblLhk&I z{yeyky@XF0kfX7I6h;B!9$d8B{qS*7Cceibpr{JS7DSd4tWElPTrkQv|9^1Rhpd<6 z^idR}gU|tSY4iSn4`xV`2Ygo$`B6ZUKMXN`?*I0H{(t{f`d5N-85Xpirjz9LegKMw z>;UZ6d5kDd*xpM-3jk39D--;{Ghpepr}z^%zWweB4^9s{{NN-(f|2ksWSmT*@6}z{ zLjPHOpH`>alU(l}MMTmal+<%-RD13tB(p?fnQ7+(09Yef`hc)$v`F>z^~K~I{7Bfu zo$$TOY-b^=T7sRKc(*nci4O=rV1@`Y5E!?L0{`XA38se|Dh1|zf1~OE{qP6agYZF^ zfKg}_*4!Ma;=?IcfdaND-!U~C7jSPm{b=Fy9!x&0FrEl z5T=}qYx>hur=?!Qm^B`~P9-pFPc%8MboCSkviqU70tqLFw%e9|?=;yieD6Fc7USzA zAQQK;w&rcojbu0LFqe2seEIU_=rMr)K67vi{#xYJL1Gjf8(1zYRH|Ue&|s?l7Epi1 z1skLAfWXYvD~Z@W_0|sv($23r*wTq1?oIW512>wbE9*XB5`X*q`{LL#r%`WOo();t z>Nr6!4BlnnSz$id0#cwr-;pJIK~9?Yub~eidMv&}CLPT546?A}MmpI8AYBBcPT{s0 zM{pT2@P>fqctfF_>CgiN5sDrJko$k&;^CMvWPC=iNM!q7vOtmW-l6kJf(Y?KUnPFqJzE*q?;lATB;>5ge1we z)M}-PqXF;o>U_V7&sikjhWZ1n65z}jJXq*evXNPDNzF~j2!QF>Mx<=9qjyuU?i?NV zCq#7zg%3;+U7PJWmFsk&ynKTe}y84S>^9s z8xom8=0HR6@4@wVG>TlN_)!HRF81fs_tBC#uMqK{HCf;|0m(v&{5wmBC{dt#a^~c} zfYNLPw*#!B*E$g=;DOavsVN30WtpuB9n1G2bUCbB;2h)$5LS&7N~wvd6=!%+V1IVq zh~fgEgAhm)ff^HY_8>Jc5rDGg`Wzj?$DWsiG{hK%!SnorL{cqMm{oMw=hpxzv>`}+ z=mCuDkk@-sbJrzQ`3!zQ+6KfnpN9HLRS6);@&4H-)qpKBQj zRhuWIzz6$#fPcZXA0h1JPeI030Xjr|9S>P}aI@VxDin7n6=%N2eTKBT7;NF|7q%xM z7gVu$x>ad2-?s)ejG*}6AW$K&?TUr*DIR}`B`90K$T*EY($(*+pI446pi3N<9@4SM zDu}%j=`G^#Am>|YWc6N`ZMr_)cUMc`0&X<|*rmgNCV6E42NoDk9wZJYHh*iAU=F7A zfNll}xl(z+EWOt}sGhN`x0{#t`aPWO%39W`OuGsQ4k;7anBBCUQKVyeKd>tZ71o;N z@rdy-PU~bFv)FYV2udI*@+E;rPpa|pOX z;vUBtwI@S0o$AFXWaqS6q(2clXNCXCi_6ytgadV%#`=DM@d1L}6tj`qtQ}O%xG}1t z3tQqulw?7{48)eG&5Tp=mHsikfTgui?D z&W9qXbS6CmiFRWi#y5a=e&E=lVudgyZH52#98c)~Nuwj&7sA5h{$+#ygRX(7^HVh- zi1_d$L0*awx)(Uze0itE+7nk_ez43 ziC>l;wIPgEI_b`oNPm%85;~H~?y4}NKxh*P2R27SZiaIrNI@?{;50941(HC}nE+v5 z{IBGWd<&e%(XQ*gKq{5xldg>-7HvW}L-(&(3Z=~R=*MaYF%9ql`3C>^14IGq;_0>| zU&ZpJfj99WR_X2Sg_02@qvo}*$&zq@Q9I00?|p*cyVju)ecvD96%vWbP=z^7Z|xLg3B(ji+~Oa15t-lYu@NSBw*=d^0W%+WK<-_jb#yc zV_@si6QZAD{XAF@5IluaVg{ZC5@Pj2nm(N(qdn#c(z*|fVqum75OTc?*SKPRF`1@yAB_Yjbe7C`jZCqKI3U`y0} zz6ZQ1u&@NI%X6 z`^{9PjF1A3Fr>KYSqrAfi5pin!Q~o`S+L{*Y8k#ty~vaf(3Z>vsDlCJK?tA?CN?Ib z))=(PR)0H=_Xam5O!S0)<-xu)9KsNi;Sh#{5`-in>jLk2t}?W)1kX`9RR%;MByXRW z5WJg}<>f?sj?&UnBO@dEsYpn8h=_>9iOmBVPWPojxP-ZS02GfDVsLX6K#71N#xEvE z4-uXG!FtvF5BK#SdN>kzfZ%i`*;! zlvzN=djyye_4S_u4WUd?yY!*$;IW9u%nQwxp}F#WXMDprFsQpw1L=scYo|9X`ksg` z;qJE?;My{f{}Mp#_p6YQqXJOWOFuTX6)gc!dXedM?@`iA%~(C2L4Ew zA0J0|M{{T+L-cvSVo*Jdh|nqw`)?;hRc+G$yN@U*JuJF1%*Uz6d}$|pIK@l11C3-uSu@0}5~ z(=Eck5!i1261=dQ5RS#j;-;hsqGk+Z{6xJadU|DiaFt87Ta`>ou!ugr?1PL12TIJsqv&JqcM!NZHEckZP4e++UIC#6}6CcvDPQoQCSc>}WOk{q%qIh59vU zwW8Yic+5fQ0WMeKMI+zfIE#jJ=!*A87%ekgYHis2hy%&QZAK>H@o44gc|+j{o`urW zATAhZL<=UlPkL26V64zQbZGjU_I!kB!3*-v>AnY$NCCSQAkUGG+#6HBT|xv8$V=p> zYT9m`0VnlaZ0zjjHv3|0O!uJ4C?&-iuNshVGGviZ6a)j-Q)C~oZSfGv3Muqro%_*549RPmOC)RsxvkKB%4kR*DeML`1zZq zT;dFemW9xYuU}Fbm?K@-*mc%3UVchCDDO?}B}4X2N&jOk{US4Z)msT^%9Fa`r}QH# zZ6tE&K3jKqoqriEBdF1`NSL`85JsP73n?*eM1|dNS zMf(U6k%<^MIK;P)v#!QUTFFFl1CmH`bqxHDCxWc&g!ON~k(t(C=@8CfxZlnt6H!?C z{gz8)7juIHI%BUB>TsK~O*F;7R zt!JcrBwLwowb-T5jQ_UiL7v#!w*|wX;IZVMAZ7sCo)c+~)4VfZ(2g`U@#=l~1Rbuh zQVLAErGasG7&!^4JKR;4#?9y)0DINLKrm?H*SXUIOf@qy}2g%0=nlAN*6u4mS zHiMB4)LlF-5%XWJoQ)J78lZm7T|DlW6Hole6A{Y8Znu{;=r8)DL;>EXS|R$fHUEdX zHxI`$Z{vrbnI@)%Hlu7Q$r4c{*^){~*^^z#QrWVHFi|NIMM`!evSr_yHd&IfWv8-5 zmh4G*Ki^w3)Al^`d;fUf<2T3gJjc}3?Y^)3y3X%;e$LP0a@@;JiAsV{1piCf1=H~# zf+2P?l%@Cfk#5KQAUyiW?P8-WI=VK)!(62d`l>wk zpl(;Fk#8ej>Fbr+sPktr#24gBKn`Rjy>6M9ZD}j7&8e2GPtT8^I(*=;ePUtv)h#3E zX*I6>{bOGGgr}CTGHVlXe$X9x;TNL^hyKR_^21MJ^`Pv*2$Rtkumv2?4b#py#64a% z#(Z?%PIGG}hsJqwVRBmDE-mkJnfPSVAv%Bj*omQvq^lfkQVhJRWMGf|;ZgWCyA%7b z_)8JX4VEVgoa{?3mg%@%8!1=q4f)?__vWYJkM(VZ9I!k@7~Os44o357!=@hemVLnlgYuggX_6=c=0Yyu@kSJHLJ4g-RAsFT4QZ{ zP0R8D3FX1E*uzhsUJP#F)8BdSSVw0TtL_qS;bfyybAL%bSC^UUO6_!~XQ}4pRTbDO zx3#h8n6J5Q?=auK#wPvfu(%-6F;oiX+YJU9(=pk{HP}6RAEFx!)!Ok>7WS5>w96x| zc61+_lGDCbt<2A5KNECR=1zFFjas~a@os)+SM_3HXD!;DvmZil-fE62-3HS~lcpE!t(0$F zSu&L&cQ$BcaFJEjpNa9gj$-`LEh&$t&aN-l7t(-rb+3J5QD znog_kbUm3IbG@K==h<8r#X8M4E4tIdbsImOX*=9fEFVzkJCz*~wL9Ix<)I(HxJwNS z&6?)BEt1*cL7~H=ll<$v1*s-edL6Y|E#@sc=aMs>>fc7z1pc?;`qws<^kI0Mu!W_N zJPvg5Nmv`M=k^NASNoLrZl~b2hBX>=QW}Levt`R{4kyc1-7@JOl$Aak#h>tDY59)6 z$?=Q}ZS;wnjgd#*M_lcVf7j%ct2$LB%Q6*s(>ys>^VvuZwA~uPCW${5ng(lQmq^;BnOAVus4AtK#?{ISzPqRtl+~ z@y|{8iOpcTKPcu;_ur?BciW`rAGu!SE+C{|RnEQfW}5$_knOBFX#yqB5;-64cAlNc zojv`wJ%~-d;2cjzg{G%*=gYveKf6;KiSA%ZO}n5UysW`^`E8?NnHl=J#JiUIi$yxu z^muaIJa@Zg=@_T$K+sL@=_i4obeFAK<^K&mlhl1cuV4n<3=7jMdj+sha{SMIF)nAB zF%jH1X}aXG2!z-Q{^I8q722mB7(Df=3})fsu|Q`6d3myav7VFF1MGLO1%{wq^mG%a zup8VN2|^E|EW#D*UCXJMZtj=KOuOy;|y=>K7M?60vtggyNDSmBBwq?qJ z&;U^--FU*{AV4biV){;25ii0v*F_!ZMAHR9!PXX#whxVO48(f_RS54gy8TW13sHH> z!S7^xw@&!<6sW?uXF>Fd)8vSmQ<^}=ghz(3M!tPgFH@mKTORU7ovvkfDGkT=A6AHa zh&HoVM3Xn}iX)Upn;9)nKPq1pNZB8_IKAe2w%NJ!ktd6!wWP}_`JN3`#Y)1Kb*bjH zACIglIeZopTxr@$W(l`?FCXnzQ)`y>VXyTJxJ#?TLYwk)%1qV>#C98}wCSwe#Z?;_ zWO~F{>|*fIt{#Qkg=hD^xD#4s%Ee{tn$5kDOHkNE(<=Y)w5f5ttMS_5;9w(FzB*B5 z#^W38j1TzUs1-OK|8D)3>89w3dfpUX11rXkxf~Qo^8d zvV2LpoBo>|?zSu+QWM{9iWR{JrT# z;HS)|oc1#lska|(eZj)Fkt^M}Y2b}%M8i}Fi`n{)mVz3F;~OSe%(Oo9l!vLNZqPo?k>whLo(=dkPyt zsRD0z_!wAZ-Fht8(Efyg2Esn#w*X6tpId;S!((G(M%m0ru2e7N(-!)G_3)AKn*2o* z*U0|KYdIcC!1fI`y+=H;+c*p6=z#jVMC7Fd!vYf(09lGou8JKGQ{#D2&%j0{094F( zgUKylSfOGVp>VNZednuSY_;?eUfIuHv6DHjHtghj?n}!V(!gu$dwRZ^I+HU^QA&xE zy?V~m`5nts43onm2dA*eC1a(H(rQs9&X;);nh}i`u@5mE zTKy?SU50`nr2(SpevvDfEjUBYJiur0r@W6}?JkmiYm$UD!PsoM{Xbe!&gev>Kn7TL*6_0}oaYX3g?y3?`o9{3j_BLJ3hgswiMOqXkDakM-%h*-* zp?tO$2Pl2sQhJ|+Hy`6~PmZkarEV>M9;xS6)Ee2|b}ci5Bbq~u|Is^oi6J}5n;H4} zr*vNo~8v6!YYNEvHkyE$MPHd|X$ErJqLQ&Cs*XCYm9W z<7S!yMd8t&Q9nCyel$PT%Dpmkg=z8N#HDo4j9{v9LCbJeJ}HJN2AT@0$Nwju8DU=T$^S)$S9i6z|d`d@I@^A-CR z^n0&gnU%)XrS`z8O>t4;isyUxC*J0GZfNUhd~M9@nDI~YXh)_8w5N%JA~0|8AR!2sfGL zG{c&eQw~YJL(JWs`SfgT95LU68#oP09$jS+yz6pyIqPm6C*hNg53tj|x?Vzya<_Ng z25H=u~_b66thu^4fUmb$29FC*1wyDxb zguiU+p>0`s#LN9X2v%4};wgZ}gTjR^I_DVH=_>G|m+#7osxz@vM_vBZ;#bOhywp+O z?&UIZ+mtk3rup-FetS$IOikoUVe+H9#o)F?*Fed5EaRshm7qY6ra*~Dvz(*Cz7@6? z&X4x^jFzvko9>9x)&FBu&~vc)H83`@d1kkkycALAr1wD%q1?A3oK;7A^eQtU zmfu(;Yhb!=c??g*O~L#5WA~f_WefWxO;54!e{%LznPIEAL6o3bsztkQ@^b@lqqlej zit=Au%p*`q-EMx=ZQ$BuSwY)-cLCq4Z%6WaYu&OEba~Qc#F94+b=u8xT_0-G6HEwN z_yjI)yX|%wJBDeD+3!XP7tcQ}602=SHJVx8~;rPMuzq=MOR7W!iZel1W1oi@~|caIW>~n=tlk$rKi1MXx#GH zaeLcwce;yD2m{^J12S28<&^;GE822Z&XYwuYu-_@(Vn)LwI}5mtDZjaWV))cS+ZTh zee;^^Bu*pwY5Uc@j6qr+0?9KSISqC@bep_ycnE~~9#P3td_jC?-1>KKHT{?yPMunt z@zb@#A|3A8^r8**It+}5kG9?oaTjQAzvFv-wC1h-VuT&nK6PP-hQW^NqR zK0p2IM%6)f_RDd1v^wY!q{ekstPIr+4g%8GCf)DX`~JHvYrz0WpSNM8cT1r zNs?c7+RSbLBZ*{_rMFL4aJKABdeJxQ^)7dBShKr8sL57;R=Vr2&OFKI5V2v|{EJbm zul1SJnzpw5s!6x2&o=nB=4EA?3RT>swMtSB%Ik=>UQ(W88J<2nEu*O`YVJ0tyjM40 zcbmxtNa>_N}^te$+|;STKD8=;EMUUVXK$oG4w~2&0QHq z|D4d-sAz6kPOUGpFEcE%D>QFW4&LulHj@5O5f}@c)$9}ty>wzPW-XQI$4`)%{DS=D{++8y0x0h;@v#Id7nj#o~3Qs z3D>5~JKb{$Rx_hFoF&q908QUJk>SZpm&)x{8DO<3CBN)l;hEXYJU5+tj|%1I*3VqL zyzZ2I!QM(eAVXNW#NYmlL$W!3RwPG%)a0Cz?Zo?ep}wXQ zQbkis)sN4GT-lT|e!0T-Lha%2T83ptb7XW%()M@h`KETb$J~7y3_p({)@h^O z(}B)ctSS?Y^PP4kt&|FyH?5mEf5r6qA9eO#76Ri{`E6DVQ*x6&5N6K^RO#-0()g}( z=@FYf$(sgJjmmDn3Gfi&TElL3pSRCzrIr#$(%4-Q$Dx)Ijcq&C#wHR&ewn@#rQKvV zXk4OR)9f1_cFenFSg!WjCcYDns;!b~cq>nYv&V61mpAZ>c?b-J$(P>C^Cp1RrElpp z|NBxj+8hPE2deZ=Fz`i zX(jw;!*BOZeVJwIqR-S*o7a24^p^G$yT~P<$991(;FQqmw3#_RxOb%W@~@Y$c$5%M zlN$pzN?ToI*MMy8?v%sYp&M>%=h!wsxT95=CYNm=?P}9*U-d9h$eVL8N3M!?tEJbB z%;whn_wEX315i3RMVU;~zG2B@*Azw+W7bhpP|y4ST28Fga5iAAvZ;^>d}JlBM%%z&3z7@Ry4tC0* z=DPvg?_}mnQg=NBiqVII&a=s`=!%t6kNYw{KaU+`A&>qW3wg4)g&qP(1oSVE-rb5? z=r?tz`lUBy9hz$#_3T-2G08Z>vy;)yCv^Uups?vvgXY67tSsHrY8MZ$=@@>KI1V!s zfst8VNdY@arwvf_ph*oom%6q0mbX^1t8rP8bx2}ip~RVsJGMr>Z!oc+Fw;8kF7Pxq zo1xLX)zW*+C&B)8^La7t%&>s1DfFoZYXNHyFHd! zbLyTf)+osQGe|amov&X1pBrmOEa|3s1oNC*|5IXO-!*>+5ZxcoxhsSjnp#60TDO~x zw%QfOUVSn9xZqBAC4=%)%|0{(&oT8#6oJB#$fThNI5GHH9Es260*Ito+ zCk@C=*%0HzQ1w5BaQ7oxvYUFq5TJO@Gp=OhwtE0QN(F-E9z3S?uc?Vt2xa5pk-yeK zi2cR$bNOa155b~o$B<0`08#4*J+qFYLU0)YJ&oQfjuQmGk|>+Qorgpq-7F{&uL{iu zw6Ro(N@3UQ3!AR(+Piajkx)Cx`1(qIuL7T32@bm}=0EIjT&CehcqsSa<73zm;;r9bxT*Tz)@2{8Qog_YA=x8BNCN0D zZbf#4O|5%>*?yK2)Z`*Du`|dD-g;j%*!I083i8A}Xq6^cFN_Z&rgS(4v z>b}0Qc0h5+^kYeMXJG!YTxZd*&FyqkM=!R@(b&(*W|to`QQ&|%)Zgzl*=SbpXw83Z zB*BvYDD(5^SewJ`iDzWN5)Jb+$lV~ya9U5baZq&AZvq`k{ux0 z2$lhqA4yB^?pR)@Trt8#Cuz7pYw#E#Dfkr6$1jC6KQQsqW=fW9+|PZFDmlig0?)n2 z#yG*k2!1c^iE9*g9iJZUKK-dQYjy+#m~v3H7%T&S5=Wa#?(WG(AJKLwFID;p^8$bs zeH~Zmj#D=v|9}!o$vo!Pwg>Eu;EBnNSKo_m4-v7M1T}5pjv-C}{et`3?`~6Ky@x3T zFaZ|5z0=!Gp9#dRp2&K(-WduziL@h&DtaBQSzY7^eYm=(V(evU9XFd>$x)~CLna-0 zyQ^LQqLIy&Yx$Q%mNl{&eI`qyuw83@OAae6b@9>uadjlPnuc{whB)}U?0^Mi+#4$M&HSij-S zckPmyx*pj7Uk1sxE2hc02h3>S3wl6jS-nJ&v8xRL6wk!9-WMRxns5QSya;XOH zt6m)tk9{FsOc+r$s`G3kvb;6#Tmv6wRi5amSt@QOQhhVtu4m`{jQ%^j=4$#f7uVdq zj2-{lVpp4nJ6GnN#9UqttLQ&zKJPp5@w(j=S@|)uAc@AYl&buqZHnF_F;L4<dkq zHWr*=O*GBBm6r7z-@EGaIOQxxA<_LJuh zm0cF%e;#|X#nDR4aqNJm=m^<557|@wS}y*{&79MS^W$t;j>gHKDnAXd_B-llWmLQk zd@hyj$!^iW60pQoJCjXUrhmFoX6ta2%l5ZgwPSgj17n)kW{L*ST~NApCuy~$PFmjz z!MjD5H=k&4pV;&+_zmp~3!YMjVaL>j>5Z{fzZm{bjFbU1k18 z`h}Nmm0~Gw2@_9*xcvS7RYyDoj_TUo98m2C2Z?OXrQ>@MVeDy^`7?PuwnvhMrt2LG zoevMxU-fxwz7XQ??N}+yl5Jo4=DAFZZS#?W#~JyYyXM2rHYAyf8uOKDhgHAxv6V?} zysK^5tFM;tP*t@5?$%N4ExBz@vNmwsnd~e4WA@}dHWfTMflIQ@E3|Jk4Oygg$HiK< z3hr>O4p=qRFwwKvv3Sb0)$T?uYxuUd*)s`j0Q55sRb@TO?64p1`Bjo)ZaE~Qz}33U zl9j(HL$numbdLLD@6dj1pU&D9E^0LvSC-te%R+N^uP0BiX!Fpv!Pp|*lG&ZzVzaAO zz<%}Apv-(m+FKEW#Y_#eJ0eV0uW;VGpVwp&c6hyAw=+wQSc>&LebcjQOQp`JR)Ti=cUg!Ej9)xH;FIjimBgzFgA*?C?aM6-9#t3Y~9>sqm@cV=Gh z0wuR%KHX$U_MTG^3!N&zP%YnUT2)^YytYSCap=E2!LUpKRq8LJLu;(2pY8{n%YZFm zxmLeU;ro%+7=z5#l4O%5gBk)&H;S#B-de5En>BlGe{XqsadTn+7#26f8kQ}oCkc9% zcq*tcrtG%s8k@Db{;WKlENH-;o=%QL(FeKUQF0#Ii0q|x>WU&*i^aM+{?Y4qIqOii%+kA-DRAzb?G^-rRuyv z#?E&xv1UHo!fkJHvdN&Scq>nXh+^{k0B%=1p!uqt3Qa)34G(GeFq)TyhXuRsDNZ^w z=GEG|%VNpgZ9aVxSZtqeIKInbB&{<+0k(nGX@Zvy`je4aw_m|E zG1%djpquKW;F{O38A{fiS|*%wq=Pyu+%J>KyCY(&d{4Ki?=ERFVvR~&+RnbSJ0(a+ zn>M#&f3F@xgZl8WmYZP}KO?)U&HVeBAFrcYhkl`$75!xyD6&^6)*y;JsONQ^x=It9 zuBG(y{gyCGGXiAAu_)~Kt@0%<4|qlmKG|h*_H=q3)L|Pfk3C7(b9Fi*NaENk6{Q1x znQw3Z$F~P&#`0%4e-EWgWN4gTbo3H;5c=37?eq0T;i!ia$28BjKz7$Tab`2?vmB2a zDx<5)CiZYjs-|HMP(EyYR)?XGpB|v^hx&rdE5g!iBc5388$4i3`^jz6Y4L$jI+x6| zBCppjni3LSH7&2#IB|hvR?njS_DIC)4!RUGuaa0J!8>+*k>O|D1rCno`YajA$+|T5 z|MDVKw`8g6h%kg#>26WC46Z%y>=lC%T`Fwub}%3(z`8ybC&l?5R;^b4IHuZjdjD8Gyx>f9V8zWyI^EFv*ZcR~zx?3x zaypi$i}FqPJp-am?$ocB@qV6E3eOE#=H#DEimP=@`Q*3V zyy?xvv}1mt&eE}$#Bj2|Az|3+K)ZBMyYaDXtETk8-V}TB(&MVGbN$^FmwXwm+YYx^ zSnj@cc`ijR+l{u;TAY3F;PX40Yup-}1|JLVTswbEES{#EuBj{cozr24uyo@I*3klX z>4zmW3H5r1D+WSe(GBhx9GWZS4uHPbTlYVay?sb2_U$ze{Zp&_R`b#KtGaYe^5l0~$@llC z6Ng91*4kKqyC32U)V%B^G2ah>i~ z32@?2oU{u!_948wnK~QnU(3{K&{mN3FEC;t0NBv^@tr%dqFh$lF`bFZ2-Nh=+DU&9 zd%h=6^1>xEjnxGU|3lclhmr&ugJfRJ+)vm0{qkk5uYF3UGj~kT(bLZnCVzoOo^3qc z;^S}`grXA`8?X#Z<@IDF+)d(3_;OF-95(Nzm&iML=s}&Lk-9f)kjd^O_R`2R!}3xQREV&yUsdQ(bjvvdzm};phXVKKHh!R?nVI|j9w5B zv5HvVZI)v=U_p!U4(K$s^0u9$OoPcJlJ1HZ?vj@!=_F9 zCJG*UZ`EEc?%&85&;<2`QNo;(XEg0WmOHlQO0W&doL3n9S=;%NaDN z>SGTF-!1j|s01gA<0tH4lvK>=4y1T>iZA8iIj&kdoQc>zQ3?Wp|r}O{fN`rK+uwu^3FtGG9a?_ zLMb3+{oAUQ7NlJIuG2AF{AveR9C0HakIo*Dvy+G6h&IGqYA)fsUDUKi93b+*H#tAq z#!b;^8?f;+rV zWp@{Vx1ayy>*KkPJr~PE;=tQ?0a7|mFLx|!h#G&=00_4At zUl(U6N?`u9fv2e_Q$VUA!XAR|3Tgu$_`(Q5m`KSW>(}-wXCmUS{Fq^v8|kOV<2Ghz zyfysv_VxS%{E}i7W0=)l`N6A~ZzCIsLYS+h8DV4SVPP@N0LOhRS&bF_t-=$HS${c5!+QwQZ-K1I!0yzhSfS z#}R8#;$%RvhFbIz}pP9J)poHL!RDXG(>X6lWXTvz1tEb*r0hMiem zDbF1Ttx`;6pf(x$mT9Yf8eUPv?`1*zLEOiQ-sA$#I`wU2BD(ClW^I*LSn)^S%4^h& zbUjH``XTvW^`>k&gWXOH}$Jo(S} zDfzPS&$=IYN>cMq=5zrr#y6VP}k|#TlHP8t+9D zZ-_^LHq9eMU8Mpj?tA)>7_PXCD{~8+Y{^P8;mKrz^p?nz00UZqicp`V?SLF5@3s7a z*O&=F1o!3)!?GKYl^lszkrr(}?^Fz5K@Es3)P6Cl>r>gJKiPQRX}fa9-s7l&!yWT@ z!fyffem#zmuC3KvnTA4mtRb|kwCSyF4Nuc)o9g<1{&2`0juMGMK%Ox#5Y zjgIK(jIuvP9;m~SlzaR!RbLyHT+zF?#w-&){SibwrDi5#nu3!tp=xDQfk*T;(bIqY z{!>_Ir8}b+K}~v<)cCbZw9!%l1_QON1)kHtf8+(zvd)SHuzi{~ZJp!E+E|}nllcBK z_-HjnhrSkk&PmXI=~)cPl*#co5zoN{N>x0wdLnjL=T*TvdST~Cy=-wgL&C3XcZt>l zkI5k{SQT!7Oe@d?f#Vcq0E?3=v|Cr*pF_fxYTH2>h@972?pO&z#yvp$wzuPMepE&? z?9Qfcjp+!H@tEVdWM-nq5l#?Y6at@9){EbXx7GWx+_vWZMYT zd(%)rCoDD0#)?9Wq76mmh0HJuWXY}CS*2mq(Gh=)a4i?cZ$m*ENA=(|PvI`SV=qir z$0N-earlo^8h2%U+*j`lZcFA(y;hB|hqs7$Ip{=gm3maR#%vtqGxw9m-|Q)b(ZLFO zVSc8sG_v1YIFYA)?>*Pqk7-BvlXH6*TFh<4-@knZh@SU5~dg~cG6qxGC^)>4DlvhhhcPxucmGq zw)Ji#97mT}Nr8Xr^Y3chfA;)1JU}Y{?D_DwjPM82aU2Mr|I|NPXkyj1Q2Oxyk>AV~ z3m%C771>gUOq$$H4vAbS1UudnJL7!Mh@Gub~;2)xIQeQJg5^MNprs+}2t+XJ$hW-ZR z;d^x#r7SEgqJGjz(h}lc>W-VU%53v9;$&G!y>OdK#ccqnuT+3O?rz*Sh3V_#kvL?! zLjQ($fQBqnYaMy#xYY|16&XXE`r~1rcW3xwvkzf=W!}7Yuo7gmDX5Vvq!>xBD3u*U zyS2JG7n13+ii%*E<}u&%*eoANwno<{sbIK%26BJQNp;>(WnX}+Fnk`aXdSt)h6e@D zhlDl@3L=cA6Pp#APEcb^)P8X6At3Lr4Q*InN5PM(($e?LFt6Z!y;EN4Kqya@c|3zv zow5wY3z{+=?^917hHb|b{?u79hauj<4i_uMKhPi1X4KQNE2@2!Z;QEq5!-r|9aR=gB`Cb6ehb?Pxj)&C~0p1 z2a5gE%)IBA|-X+Xm+ zYr_l*U)?Ph76wbofrCs$zp-^En*7uc#)9OYXe@S{-=BocaODg+e$0F;M=VPS3l-oL5PqIHQdUSL&i`7#BkKM?kM|YbmC-n-i zFBR^$t5E#|>ofFr5w7EeD6y6bU6x%`R-la#R&Mp`FLLmD@M(<01{MASOV)6hb;MHR zJOp!D?Y!9^c*oF}-lW)~ljD6cX)L^nUjdHYoK&4(7l?R&o9}(+ruwS@hWWvY(DN|c zdtj@qOzdP*^d-?|>N>P-9;9hMH+C4U8fXA?3?66*9NlM1oQ#r zwN1|{%j{Q!@@P(j0@%A@^(Ri|2FvjXJl0Q+Trp0o9u6yKXPY2tNrDK{+*Ifte(*01R!}1zxEXc4A zQ*4ZSFp~IBQmxfFa~?cs7BO{rV4{t|S3`+`T(|2?1f?s3vvw93Q8SZ+U?}59z#{G> zj7-RH69h$f9oqir-4b_~5pC~+R%I6jZldg431v1e7ZH|$k;G%`;Po#ZW~{%-&>#ly zW^k{w-_uhSE(y30CwqvQ5{!F6g^*GgDukia%%h9TVm7(KbmbkiIRR}#rDbKx$j{kR zcw6UDH11f?t8aETNmUMBUANtUI1T?q-G7-lz==HCfS#=npb1i04DYeTtp)IDN9hF! z?p$_eu500HTdn{#dKZ&!!@*49+C#%t}GHm$cB*q7nLJJXs!BMSr z4!$Qw`lP$XWBJ^si`}!opD5#P&GEDnT@Xri9;J}M#X^33RqDCvQIxc{PY+bW)lQcV z!j!xw-x6K!0A|j#+-pE*P(mrLka_YP*~dt=q5pZQGf0$1?r`@aA}h zWo2nADvjX<3`PTvE_yQWO3r=Qmv<%|Qz`+3`&;AWKY$G z0iSg5t;Y-S;_n*CVLtpE|FZV@gR>)VFusw{8~iqLGg96|ntR!yo&%V%E)vJCX6i2! z07SIDA?+Ch1A$u9T<^oGQUi+|AL3q$u* z=B?iu+UBmlB34dR?@q!bFHglvCWr`M$Y&IH2q4SGgNh0Yv{*f!k@?0P>3d7ve>{r- zZV`BBq0#@_y!!|K>m&r>b8r8D;om{C&UGc?`NDZdvB!9Q{K^I$3f1jBw0|UP6u}!c zcBI><80vDdBZWk{PxM!!g=gc(NY?`95e)b+Ji>{516MRL)LMA0nL2ye-Gnu=MNrWtBOg+e8i49TO zv$SD_I5(_(@&$AePj^ z&$PFbofBy)P-)a`CgG95x&l2@-_ zS9PT^tX`h%54yAtc_xH6huh}dQOR6`D|`UiI!mV03lcv3xnKYW!zD)N1sJR z1uh3nl?|iRbSM^=Byp~thOhXOHI9zuPhtJ0h`+($Ww*M+3?|T5FB0L-|G|gFIR>qe zrKa+s?TCoEmE=U`S*D$6(B&UbiJ>&fvW?2-^+JAONT>SdA=Ni|d7&b2d zx074QMZ?CDtZ>FH{>-sD0iobf{xDiRB5aA;a41Y1?*gG+(AAjVbqV^)%<%_L+ULqT zAQiOVmj*3@6>;Qt_5jI^%mt?`Ve}}8H?|NU{8_&67kKbvN2SmCnhOXwv9KIL(9GY> z-1oMB#9s)zf`8C^q$7}Yu780~{(t!~+;A-+HBx)x(G3O4d0I-D2BQ4XxRiL*~fhORq6AWJTyjFb6U@0CrNlDB5>#AP$`L1&%K0&1M zm?$84E4qB-Kf^u?^CJu7^}QJXXE2FzIBz$7$qW4$f*necQl&x-SmtDV!F2q+uq`cT zln|h>e_5A3PV=}mZyf93(p7{_t+<08%cx+L_@+Ucy4*W3Knf6rTS^bghKq=A(x z?4ItzO1^XzS;7UiwzlF=r(=RfXQs5N_l{{Y*%c7?AD_H8F7{FFycH4U<>e}pHys)t zV#GMI51!}f2e6W^ll7CZkD#)rY$JfYioChJiE+nC2+EbT`(7pmQ-D1i6dB;CPDoO+ z9*U3U-QxY1Tg`Zqs40x zmpD4&lw7t7hc-#>&<)@r7UgiB>beVeF&ntHm#bG$)_k8K#2>Ct5E6{dJVG9jr9j6( zDO`pN$NgE7v;{Y1FfJ+IHfk^U?EX=HIrDQfG4H&}hZq7Fwi{ePzz7(~$Qe`u&64a{ zqc)&~kTJwoIa%Y44(zf{II8P1{L3)*PmD1ctN?rxgBWXEgNlFu6bm-G*v@^%G(UT{ z{SBSQf3pZ9NFT-dgEV~$#+aWc&M*46A3>+Yt@r=R9}@*o8*y)`KQn|jez z1GB@f*-Z{Mn4*X10_1jt9Q0uH0$=(!9(5ck&q;;}?mXdobg4{Xui(tie~uNzQqL2A_Yo*8^B7 z&Td6U67dP!X&<4N3sYI@n&2<(^58K7wQEHjSTu3G|cP=A7jjG-$uR#SZ0yv7>51Gt7FDhA`ZIJ zR20}~@xvP`ryG)C2ae$puE|l@N1-S$#3h_y^)kA$xyHn?NW~h-gc^A}2~P>$qU3C) zyMUKD`tN<3A{Zv*`tmKbWmJf22!%h`LJyB&p{6KmwDE**86ti#R}wS(zBXbV4l21D z@?JnR3E*-(@f!Bd*d~*VD>jhH7+KG~2kJs`RHwUu;|o+7^qBhzgvKzj2@e@gwv3D& zeG)|3L7}CT2jlD4pDa6u7zq@0m?mREM%GEv#BP-Y>tMU~-OBX)&BXUkMd)|_HksUR z{e4^hZT#l~5##Sg&jE#R*baBJv4bMY-i1F%5@{BaNdIaoo|JNbO>g@$hU>GU70OLi z-@nV~I+6cUM!!f~U8wbxbXIU_R&BcX9Z)x6XktHA@JeCu)P*r-(xUzKrzuv7u=o$P?5*L7@9!tK!cFRXaW*4{dv-F!zBSaI&=7HO*BfTCguhe4?e->FyNM~_vOn_ZOtlaSQ zoW&dpw2|->@Hlku0(>Sp-L-~W0R3w8r6@)_jJKCou(rcKLt?5`6;Ck+#qyy%Ws|-~ z%lN^KLVOF2nq7(E7%l0csAw4Bjz`p%y``xU{VT)D zCnmXf@mCNn9f2(pHszOKhLdw9vR6cn{{^w)Sq@;Sx9K2DHNx`jVD&^2La#X19v0rb zy&d$D4>*1ZLt||R9{BxJO^^mg*WC-5?z^Y=3EL!qnwWafXSbpQ+v3^3C-hu}t{xW7 zWrQ7tn7E5nAA-Mzd9~+7d6E=>ZP#{^AxKgnZw3VK05)l~L^#HIL*_ZaL*Z^nXEoskA79tRfS ziS#l*V*yJNX`||Dv&^-dPRl~6h+0H!t%w6qXfTXr<6%u}%i>2YW^t?zn65+$%L&k> zNcbM2edI%U5SR>z8`K4?s=?18+#)Q+8UKJOW>^zYu%J4IflCw_RrxAL3deGJxplyn zf01!<0qRA z#4GC}s9q+ImL!YfSY?KFsabv*dZaq8Zo6l4$hldB=}Ho~Ls_W%#8Xob!kt4_nmq;`{hyf^=u z1N?zc%dN{aKG39ED5lc?3VZ58^n8HWxTrgQ5uJD!lS&wimeK^?$prKIerEgOc3lO{ zmAgN^e@qT+^lDTEo4vCDl*R2+I-zpkA!7Fv3naUd5V$sBypWPf&8KlyRu`P;vOBC- zNA{x@=`cF8xqSKN0P1bf#Hq%MXLJa1=_ zs{95HcwM<;qy>f4v#TKB>kyIe4|amL8M@T$ap{69EO1L88k=$d< ze_;@mt`L9!JK|huSws=E4EiU7*dl7$02&hLO$Z!OeuRe%aB(5n76b(nP1I`b4Q!UA z92PzVj?XDAMIy5BG6)IW#m}$kw8DdM&-3^!@$rZjvSv3sT!ME13kE;eZ;}!k%JxGB z-*-qlC6)B{+oBEF?+}vs=TY>c%z*=!#@DX~l^_yLJ#bA&P}GbPq)wu1#5-vds(CwaBUluS;AC9{*q>=J&xV1sExy`jCibb{AN=DW{uro=iODcz zz%|aft6?rP(3px(aU=iUQS=D-+!)NkNm(%87yjS-J=l7Xqy(T^#NC6klpvnq|9fLe z3@<*@V@X;l@>$5X^XsUU9}G+jD+GXHB$SWj$6)X9O%%*`HjAm3S53NsFfbW1`k&A*c+oGW9}23Aba90#tS*%a3cvx_tuhqmzH0rVWN6!)j6Z`=vg7M^)XU#@VKEOT~kxS$$)-(y-979WJI+IA?8+r|) z@i;aT3-L}QQmHqq&YLI)=omBFwVT z2;a&LJ!X=Xz+X6iW5ACzXuzMH>`zLC`e1WXZqulEds`&1bLdSl*p6e#;sbaLg-;LD zc`5pA@P(4W$_4kR{CW<^fy|VjB-QY7d@m;6BbFh|z8=ID5aVo%wM|C_YgSi7yC-RN$$4z+%~-A?^^FEhOdzebh4+2Vk;bZxH|v#Ckmz zgoc3wK^o>ru0fh>FwDaQhZO3A4X+7`kAoFvU|17@G-17OJNzY@nU*u|kR^+T$H?~Z zXQtSvn;(;#hQ+yM;{&PwRygz7FCh8%kGQ%P)#YktoV*S%)WBYz&Cf`us!K{Q!AsaY z0NG1Z!WY<)bpH2{^`op~;Ozvk9rU0;bCeGZbYrjA@&nhH$&Nna`G*n2Wki7LiBW`@ z&ZE7{w$ul=5uY7q;FOqN!t(l(_JN&5IwouESSXy2H0l0F$FTOUu{(>m2uv{*`~oIn z_-2#ct%Y)Jv6~ynGyomIc){O|c17d~c7LV~$u~uXvHlZ-p9a={Fq02O47R_2I%#Kh zb4iR=(>*_8+-7SIS^+`5K?sb+WA#Pv_TS@?(XWA@LCPv(rM_An{OD3qcpzkUMKxW> z*ZOL8a47Rf?Kla$?#K@pS>AUCip!P)^8f~?!5rFOvxZP`+gusXT`DLIoSY1o+vsqn1;Tn>xT)P};f9qcp|KNdAf2&!0LDQIzx`|#T z`4&*2udzz%9hCR^X!rpIth->H8ZpaPQhSzvx_(R3y$vKP?~3vGMo(rork%Jo5J#2l zx+TARPvOa22Q?IASnE8u;nGsF>_+21;8=>zP&GW}{{T0{mWepxQ>J^Meel~$L*^g6 zOt7}#u;o4Oj_aYe5b=O@W?OzXkUxZ{p)T4EwQ72m-^4Gp?74o$4jU~1VGL)iC?#An z-F2u+WuO#rh)~p+G(aM2F~@Veo45452<7R08UcnRdJdFYO?;#qn{rX)Rjc=sW4-Vp z4jmrpe?>h>mPU%63ua$LS=>;d1PPRGC?R_pM17O}2Pj+n%;779u;?ZDw=J?t2Xx;E zTekDgbOjT}+{^~{Pz8z;;WDx_MJNg0Hd%|XHM+`g6yc{LwLj`T8J5S_lW@CJ?FG4r z^65TrOJLe>*zVsaKz|Nji5&-PMT(^R87!i7pMMX*iMPLT?gP^e%N0t$D5Lvk35Ac& zM9EtHXViZBJ$>kNgbcSt|7u0bINV4!zh4~9Jh9*9AAfdnJJhFq>nz1k{RtJNc>j$D zYHa_Wm-CtVe$Y4X$(jI+_8dDGn%uunM6Xld*u}kUrEm@mMXFyx;7AY*>;>=gvGWyu zFhHw`3r@N$l*+&h&LkF)?BvA}V}&#}W}D~R<$f^&PYr}2KiF8I!{?OVX!TOlM6MzJ z*^Q<&oKP8-9eVgr9s;CkYWH}L$6jv6PpRQ&3^>B=XQMG3Av->%@JmkI57yXWcn%dp zc8!>LpmrS!-;L%Cl9PD7!jEW_T#RMOK}gMF>$l)o=0q!6{S2_w& zxa&tb;$Ni$jv5^UuYOT$`pt{zdq|{(JqeDQ#)<51As^}k$~Q@U0>=y)^OsXkJiC8= z1IyqZpKP$}HZMg8*1ME`8gpz(3i8F2_`^WTfbfaDBhB>KX4a;3mFT>*kapkQA4{2I z?CWe@2}!w73SuvDlW@^OOu~uG1*C24x-R2n4`1uS27NbOm}$ZZjmT17T@`$h1B`%# zGrg#U$dMmfDik?Fd->1Fn!8s%j{A!WLxcs)&IYwoOUS(0c0mXtKwA!8PW+P1mIaH1 zp4P?t(J+Mo$=gVKOd7e;=w%T5IN`V%^~q(W5wPIn>&^iy4Lh;NCnHLK7Gv`n6UXug95m$`V(b8Zw##U~qtcv(Wbeqb;whx+N+s zB7$v01l1Xeh$I#~A9}vRah0YsxvR-0_lwr&2Wk-M&8Rt<{%QGCft**!qK#xmiWw3Y zRA?)pC3t|hi*wi>m~PEQOWe-I7zhroJ-%`x;yLI=hMw+!qFqCW4CI3hzu;`)Yl8_E zk>r405EfQsKd7~EZZBFPjw6H_k~o~XMKeP@b{6;5lNcf8z^fZQ?k*>43^BS3goFGw zZIA0aaAM1rzlgYm=z*u1l#G8P)p{*}bPz-SBY_F}7xr#a)Za{8LJvV9#5DbHG~t9e z%6fvxLqF$lVQ&97`tCO$350q)giz+_7CH(8~U7}hnFd7l&o{LNcqNtgqqL||fYy?_Mgq1TJ2nhVI3nz8u zCg_vt_=&LU?E6<>A15V~Y;ls0D}PJR_T5YK$$_St>ym1-WZWI3ELuW57iln%w=S8dsGOapG{5ciFVC7&IZ5x-ImX_AF?dKbzp-Fe-Wx6kjJ|+qm(XH0* z_Gd8tCfJC%&7Fg)QpogW-1QBGANJMr>lJ7;lgSI#=0`a-f$o*`;+b|EE#s_Em;oQ= z1!;@1Qz)ElPJq&e@RE^Zw{{M;ZiI?kDMt7#M2sWb3Jyl7P5HI_1G&Z-piy{B}+@gGcQDX zq5K2qX!kb%W##*S{@=l&t4NS}8a<;Qf>23(GS1M+jjNoLVhK`g_$P(ubQWM9kVcF* zqC|v41H~Rf3gM7(Dn}{^*JpFy^s^y3G{)U^>nLH&D!%CU0F7fA*B5gO>4CV#MXFVU zcnN}XaOrwk;d39(^tItQWDv7Y#L;ijD&#n7_*rxI)u0*j-30h6rIdWmNdCP3yvz76 zpYkh7_(JU8zg3dY%7%Z&Qmjh-PycWDT^bIy|B&HOBC(wKw=(CwL5|vpYQ=h9-CxdA z>Qw#`B3}(*^Z;<)*PNLEb2_5S#)|*VQ|}61EW3TM;s47OPE z$^&2PdB0sw(@T*wThqv&rm-c6@g{8jAfRR#_H(5k4K$?#e}J=LU+j^(zT;yZQNxx&5mBqnRHzXouD}FCbS=>gpxuh+^>_xC#vU2n#vp=K&Qz9543IZwEX&7VmQlBax?*SHD zA8@ienB72wL(RpL-gSWyM{vAayb4BB!~ci8cY&%gfB%N(HwGhynUQh|F;qxXA?*r9 zBH6WtbRJ44WOR^{8i&RxDulM$NvT~rNhPH+!=!`V`J|*!whl-qv`AnuJ^yzf3fDL!@ckOzP{J>IbC<4;e}fU!h$xPFe&0JkrL?@@ht>kYz&C|38?{>mY_JSnTAuE9tpkaVaW!mtjrP(nA z<)8`52aHq{Am!>?d2f}ALIf7|orPA~!QxgJ+Q|96BQC<#wz7j3zxa%lyujbLBDU_- zL{%YR$Hh=5rWE^^95)n7wAd?d*Qs;Q1{Z&B;i)~YnA*@@3)Hftqhnuc4nHv3 z1iM!rC(?>W?3dUN`kAmepT9}UXg<7|;zH&T&;f`Hk{#^QTjfvg(;Deb?n{FS-ow2j zn|lDbe+`YdWLsf0l8pI90M#C7KM*+4ItJBBtt z+M`Tfy6Q+GJ)v1+qzV+}jikk&H;U2@ajgPschrg_;{h-fXmrd{b&&CDSmQ)Omhv>( z!bG|F2!L1u)Cldwa<=?PY*#%sDe5P(vlbQ}kLa3(t^-#_V-wsihzP)q!-4G zh_ryBcCUY?G#KcX*Y*h)iCBd83{eByPyK#zwD{k-9D3{g0tG<8^aBJpvqVW8D?{D+ zY}^l88%$!BtD6k?ke2CBuW=$1>mITbADk3KE27W0|3-q4avvJV1n2W#U@hR8W(jvZ zzUvI|UMc9Zumo~9gi}#lhd`jDv~u<8J6Co_R`&5B1;%Payq~lhL;GP->A7WF&h7`L zF~olAH@&g*{^6(jg1)HmWL8!dz?{@;e_;!TB{usSADnM6wGvYhyY?A1SLmN$9R!1S zpR{+8e}QaMv${E|*8BiCWN7F07j_`ofqY*H6Uimb(vglL`^6%-_R-ip7`_GjI)b1Q zxuxnFZjo9q2kOQcRyVNQU}A?spm*UVVm$Nk>~8j-+#8*RFb7zu4{f`xLbZ%+0+W7y zhP9z@q3b%fw|6r*K46K-+Zz4?y3GP2CTJL1!EH{AyW~FHL4R)RoRK#UApz@7+vB@X zwT1yu3nxJIdDYT2rX`BM-gT{sb&hKInmW~pGi4;6j@gc!52MV56w;%S?h1)v%zvio z*oAwYr*i=?mSc8rHSSI6WYr6+R;*Y753kF88yqSmgmX`<45qE_KMqYnQLV2xt1^3{ zzjKKi>+Dy+0f7qz0FL~#+b|g;ydjr)a<7;c);nwH#13_R-r&(L-@8x2wtgR@@6??) zpA3{oLhnenNnigy=&*WS=z|)ZRf`Fo|R9BjW|cCsGzJvw^fDXI}66* zpYq7h(jK@7q)`+eu${T%(0Ae&E2XrhZB@U#d(#I29d@tcphfz9`3SP-;!zDN>_IJG zc}x=0(v$C<;@4cY8Hw2V$`^h!c>+34%`3^w*hdjQv$cazmYb zX%_(X5@50@nS!?e@3rdukkSNG6(Hq}#WEwH5OgKwMTg^T zqr}kDr)6Ao3JMBFsK}o1YBs zk}m36{QOfY1=`=w%V_@5-ZBwJBRycf6kPT4{-GTWS;nBCz=y(RM&S$Pu1gcIz4O2j zfrvg160RUUI-W3*7ovjmI_Kqsk%D>3>hQEIEXcw^^z4STch18{k2)yR=V}OWji1rt z!bT7L7bDXegPW_+93m>GavYjmNZHW!I6TKB<#g8f6JYa8k}8s%LEAtE?;Xw+cuk;B zHo;_%EWMwrbaijsJ7wzV4u2?mvZgWnpB2cQt&BG|d|q%5`WCyY3n#bzIkhdk@*JWT zT(v6gkF6c<@Mx+>i*yNxnBKgjlVl#%QNbIn{_Ibn*pyD>q#o5o7PV}5ERDMY@yb-J zRaPBEHn3h~wp@NfJ_Kwt$(ej!6F7~Aj=x9bRo8ZY-->JSCjn+V`Q7kMm>k2@VvE-U z&<=s-6xlt+7Vt%=HwL|X`+5oZIwUt-NZ3||xhVtC9W>EoFfG1;n#XO}{~+5bg1HU_ z=XGzp4D#rX!18usTh-FHD~T3yT}V5o36kLFv$!n)j_zFCbin0)2wGc@T`{|I_P%~D zaHTb3;yg7*FKrBkX;e-?BaExr0r8IWqovtbJo{kC8ozK`u4v3}i)s)A*#~eF;L#b;|P*cu#jzx;y%)jnz%^8^hcp znSY>UO;K_Z_?k7*L>**OXj5FQ?SsD$U#j};$ixM@*o=&b0EADY1w%I5t!#$im=tIL zrz`xZq4(tSJdAMXEa#XI6N}gF)b1i-wo4~%%c}X5>R~{(hOwWyAaD>Z9Z2DR9^y;(Tn`(|@_J2k%qdWbT<1y?+1Rn>|)nZdp&ww6di$^MYiZ^LO%={XSMY zC;BHVB_HP_d56~peSb`Pxz93d2WF%%f0gr@;qS*}UvTwa{KDd?YkGCV>lF2~HBGN9 z67Sk3?76-5$=<~F?spB7zWVB`Rd=o!>c6`ge&mJmi=VzafBbp9?^b|p)w9kUqB}{G z%{epQJ|ZQr5+tcho2(SlY8VZ2)&_j6RV|y&MF`49ztHR4vARLB=id891`1Ny?O9z< z5bEYp**ucnBbJ17mf=%@Vi>Q@OdeBs1f-;2C{&Np+N{~L4iF4gGo6dCnkNIrB-zIQ!M7=C+YGex^{~ot>h?nnuoFEO;u6ctm-1IJ;h`)kXoWO-C{B^KdX60fcn~iiBWjt zQ@7QwwH;wSCD-%TrNu{$EZlRm4lx?+p-#ynfhA&g+LoKvK+nDNNm|XW)^hCtseChK zK(BSEt_`I;$fx36Rco-ej*JirGfZi=bwAt7`zmB6w6G`J4F{?!466&u*{CYL0h1*cVMrEWEudzuR7QB3)6oX>Ya0h_7PLYot%#{^n(8U6soP zvy4j;+O2T!)^z^x8ZvAbF)kSi{X&6&#cQ(|5Q@5Z25Al3q9xXMkqshctzW3tVm0aW zB%IAtO9R>GcWHeow+3>kDJZ=aau4hP1ToSo0JfNy-n$;GXq76PLuy;j-B$Ful@YSJ zcm~VC)8SFVUEpdnb2k|vuJ|}M&;Cbhsv*v*(pV0BCFwxS6K?UcvQ3&(@tioYf*_RT zHZ{c|j*xNH@bLkqzLSmNJR~xNH*p|hJEvVc+m1Ky@Su-1dJHQ~)0+F<^UjA8{?s(% zIl7xxaVGf2>ginU6vfYh94x6RGN>_J@5R%*u33ipIUN+{qs?+aR-wO}*wi4o80_JZ zN5%;Ek4S(=+pzVBvBw7Og}j}?ti!4Y+#1|qkil!U(lluK;SfdIkY_k7|k(SCZ|n+nQv5 ztOAuhPEfc>E@Bdtu>bdN+;S+|SlBGV_ulSstO9^&TE0CVor(zAnToO%5S`&A$)6EW zIh_k%mzG~BzCsoAq-&e3kJ+E23Wcxp7Y?7}JJ9$8WAoJE0-1aYkS-HleG*~|yS)#X z!$Co(MJE%`)_dv>Q@&}d&v3?0^t8AM$v}lE-IKwZ*3H{-^~q%rHEryn4rLL!e;*#( z8yZ1{$9-andiRmAozuFTry{nJ`uCDWf$rLFcU_IROit>21GpUM=W93wkz1J{0;gZ|pTI4%+?FZ>9nsqK)~kvLgG^`yM%^UU_d z3gu$eZvGPRO2#|Hx^ow9ud~i>;9X5d9cbIfAqda;ZTsAPlp4*0A4bymg!@FkQZP^?rqYQ2V!tSBTPlwdfE(Y0~`2L_^WK* zCL0>?J=!q~YaTF$iur0^^_3dam-^bya&05DTT>T~@4%_0v_U?~>s z_!q{pOXT~|RK{~wa4G%8FCysg;XfS=YHTzTlY1^mWVbt30f{=Af%_FB zhVE@!q3M%E!%A-q%OrWTwx+Xu?)hb-RhO46*bGx#m0akn7ad93Ou`3H;UPq->||Xq zN(w{ynh-Q%2d17^NxTPAL2@mug%VvxYDucz|@0-w7`?HU+ z7arNue*PsJG>x?Kr=C|H*Asa}bAs?frrFnBklBG+^E!Udk6*1_wa2l5lKmu8^E|=u zAM9|j-Hthckz?=*d|>aNisNtxAdgSWj|Bp1(oC0Fn1qjxe)=89tF7X>myq|-p0VOF zL}2A|p(IR}ccSn;hFT?eqI7v%fc?<6~^i_<-y0lr$Kj6m$O2SK6TAsRIzv0tv?s$OaggL{u zIN>Vs$9_fG6IP=NH}>B=as2_;oELs%+yNz3d=vcf*Z80U#bI0G#|QmK_!E3(K0kt+ zh1GfT$09xcfYOHkcRcsR<+g%5tK4usf8ifL_y2OjAMo3Q zRRf-<@j=O(4QAyD|G;+_{c@sf?mVC1(Y0{cmaLLYng2{XnfmCIr}P0O5T7*>vg5kK zc>pGHx2k|?au~YO6(b<^MgbJIt`sdL@0;}FOx>1iN~_z$DWbU7Y(_P#zntr_`ezrL zG`sK=^Xynb=u%<@PhBC5gW<7Pb`Rfj-L`|mZ=^b`-=WbUTu=8+SEiB6w(&jU1Mee{qFVV*8&wiYc<{(%QqK#}H6m}cb=Xa~N_t*# zejhF6fsWF_ewuS70`X4v7Ld6HqR5&^25dT9=+YRg9ofCe6G`=VoBi&9Qq=0x3wNBh z&~pUr(gp~%%-I#j)dq+m&!wv=cS}*Y;ibi)eT)5}6X*V_)R;zgu+>BE!ovuEc;%d( zcuiYtQ@9y5J*i()PNcNVs0o6O?>$WAt*B`*JR{OEk7}As;iw5pKebovewy)!rdj%I z3+9%V^LXh>H>b|!uS2W+@bVqUxZ%a|W*JWW`}KFKJ-G;NO*Cq;c03ioWOb1{B83$- zE}qC}-~||Rrt4DHSzlP2;@4~iCgfLsp^%`T?DbGyGS2(`*~T)wOE=A?kaVD7f4!1h zJKB3ruWf8bIRyCcTPr{9K93$%>uuigk4i@krP7k4)LMn>;hjc{h?zGgMW&I?oEXJk za4s#CwX<7>{Nk9|I!kJ56g<&dd1~X{YqBZ-C19csUfFNA%E_`An z$CA*-q&2HKpbl_>s-WWY;Jt~_t}XPam2^?qwhiNg8P4|NDLVYR;-(o6v>{HaW4=SB zti00&fVC32M)~@={~0n2y;^>r_(LO1|?tNlM1o3We|VZp!XeP$Kw*1c?U@fWnt;bi-!{|tp+`F8$UN|Rrbw0>t?3uiV!&nfY z$qu}>-Zn=L?_JBeLk=uY4j@3ZD3F0fYcr*%GEQ2e3#~wAqsD~_fC%B*pWdMX^8t#} ztQX^hM%)b7d#Wfq_K2X1{Cn_vNj>K*RGEyta6MEf)XcG~`^(v?iVYg>lMW~~*xo(y zRiJJi#uXGW{Mw@K6a|xh*xddK`-S5XHC01ci}#Ew{6_f0lK&1LC9G$G^S@AG{~umN z$qP+3?nB$-0u`?}yEPpC1`r?qzHlz?YKUXzsyv-mdXqbu$g?^mv1LPPMZ;~(DQKP& z41Y4iJOUQGA~uB%xco&m(1E1p$6|iN{Ed?dfu8IALcumomUp5E(==JrnYuxx-diL( zuz@JxQZl7vVUDLe3b8WRza0D`w~6`~@Q_^X&h>i3wt$2@XP9TCxg@CnWH}x^pp56* z3c_l~AmA^O<$=izkqe19S`&^|Q2x50hl;Gsa(8x)Fa9xKy%0$0wkfOtjwyd!FPuh6 zrE<7nWSPUc9acW1`ILJda8}D|l{SnokFhQxEU*HH1MK{ooSCHrenCKkNr&mdWJAE$ z27Hp-&b{M9FfO5LT7=~FO294wi?s$fbPq~aQ5;@fn%ySt$U4^hwbz5gG8fjxMi{E0 zwz}HvJ2gzH@e&#-<@R)5R`R&n>q9RrPV6e!oeqP=$5Y#d_T0KC7Ag; z)V(h1oteMN)@?RVsNH_M&%S}ty_bzF9;Q?jw4gR`*;W=#jX8VM@(&Nv_857htS!8| zY$Ebo{M{H&uQZ`!K~8N|C-ZWbamH6)^_*O_Tyvf9h~+@Q3QP#Ez_WnrZ(A`$)I{3E zg_qdd-OWt%4=BfilBgyQR3Ga~cduEA%cnsm;w5I2=%3#^tpTQynoo5uE52swORiWp z5Lb_NR33ONM#Bv}HC<0pldEbuV$KG$I!bD1#{{1BrQk~m)xlme-x7guKGu~*?HUTS zm-k6~;GFnXuPyNzdnqHNQKqoj2(tqk&rGoY7=36b40#&4`P&dP*EzcI;QJq<-rzUo zLt$Lnsn`o-w7rrEM@5W;>O%xt=t!yUq8qkYun4qe_n6h24fyy+HNxMvdB>rLM)^~} zz51r>*5IGGu<4?1OIR7GQlShD6P5(ouzzXmsGs{-Lr}0pHN-&O{xckG=2SsbM%6}C z52^7&b13`?;k(PfP}k7*{j+k?{Qd7;m!Po}{pM6aMVBM|f-m)T=&2Ox@T@>oTv~oB zK~)jk9;yfudoj==n8uzJgfVTnREM|{=lgQl@gkczH15jl=1`Daz?oWY$8503D28~ zw!(}YJaA;0mUo(nlv)YZaVIp{P7v`DXSIT$b+vANWQj1R6)^_gDl*}iW?{tml;YWkQwCo90QZC7YuZOXCGho8` zI~vs6U(|W-1lv|MUB;QE0W-8mhmvzgVG)u^-=(Lz5#n7LI@06j%Nj;3AMw`c zvg1|xvuAez5Ki|GSc?T$r{t%JO8Ik1cjgr(!Q1z!8whT5C?o34K&?@L$h zHI6SBB=H`AN&}1tT>6s4mbmaZ|NnBK7)zTwYc_Vx!+n5braYoK4piWj1)^FlZF(I_ z*P4jw2_WG-w3s+Y10_`P@p}WDtH?aqKSt7hKd9#+sv!S^G4lW0U$6$8!kxoR3`%oxW|P)% z%;O$VC3dVXDVI`Bk4jmfX8J_AtbPdxYemGO!q*{HP&jBvbIAYc%k(D<$9*QH=Y zz!yaA7ASTZ4Y5G-fY%9UTR%5Utva>0x2OBO^_##SlI8y0%Ft@q-_>!OdGK%WSu3W>OgA(UBr)BIB ztvaAk9hvR(UaVQzSO@{Ei9&;1u5cA_hHmdXYktG6NqgXmAgdsb8BCy)VUmFVC1wi7 z+Z64R1?r ziTUByt4*WspB?$5pbe90rlS!&+p6{llqilX^2Hbiitjk{Ne_q)`(wmLK&uD_0V+>D zK+NxESKJ*srZ8xZkt1XiCa0ZI0Gf?3K}q|(nfo11fSdKYCgO(puLluzr6Sew@oXIV z`5^P44yZ`lhzXX`QetnxNs4ioXdt2>ia}#==4VswEOrBaYpzn0CYU@L5X=ShCX(G}++3 zTLrg3P|RhcQPxTE>WU_q$aWfug88tn{g`;U?-+80s--T{xX?H@UACKnj?U!p; z*p_UoF?Z8=eDMZvtL2qn@849}!gw`tU>XjcZP1^zOR7X*dCFFVp5JcSkIK{aBfE*B({e zW2=&K&7;P5&s8{e#Mcjf`=?pDBL|}=N~G4j+`usvgS~Fs!I}G6Z3kqEDpu^T_H<)i zfoCVWX!8uGs8hqBb*}<98~3DC_6bzmsJUfBz5(A@iQ%DldSogRm4T|Z+7DH-oNH(O zcV&ug2@U~fKz0?|C@Aly_ik`vwDGfdv(v4tW{7CT=W_zVj6(GzInOL+__x*#cg`(4 z)YfZz8PnkVCp)~A8ztqxOGUCFaah9pbnV@%t<_uqG|MDQvwM|?%|70Xc1W-ml<1(R zKfM9#F>o@Yfm3Q{@i`Pm>Hb7;t1>ax*2Eh}M(w+vRE|tq>ulW{Nh;mH8t+JkbCY(% zmb{wJlf;SXm9iAy%FxGbAz&4p*LUj=DW|*R;(0H$lYXMp<~g#Mzz+n!FxF=r;@z3l zwNHg_YhQiqrgcLgJWSx&d*Jd6nfe<<2ch!TbscCSN<8GwxG7lwJg0d$ALc3$ak#*=y*jfze@l{^j1nYnKgQLAC*vDU{|^n=SlR~(TtX9;6X^%A*+j* zy{uEw_0IO8@32d8-|$q~XkyH_)hcl`=voO*X&M;?*4h-8g{7xxN)fSrzRAh~vNnb* z;qvaCxsv!+{TN+x>1VU->p8B-uXeDiXr(TBIv4ai>KgJ!mvfmpPw!rBr^`WeEV>+g z){v^Ui?gZO_X|ZtWr8*nZ$(AKHlqBMI6otF2u&{Nr@s0~YLt%&J9kzaY&HG?v0(XH zDoJyJPFWhH*PC~@4ZHxPW&!6xgN@d~A}=o}<0KR{bQd6}!kpU=gl#_e84&i|2<-P} zw8H=i=^PTljlwqJEA5p7ZkqT3rCj{G&4)jQB|i{2fuD8WcP!u{1Csk7Q4D{j1M|I^HU7-15%;&`9$U&b!OrA3rE+`209daOyIc1fO4Wyd^{>2 z)Ipya{%9hJC2l)jed6*w^!3)!g|uSAFBEYuQQA!04cxNLO0pH1u3I^Ev6yAhZvaO^ zrVv>d(&jx9b2o^Fw$9@hE{rzdYG{Cm00Xv}%Gk)tt8P00CIG42dhFwA@xuVTBM00E z#-$yOp7Pjq#`V9ApccT5S2z5sWa){Ti%o(N!@s361IWQatuhwze+(bP{9*2>-~9FM zs;X?;L~SNA4p(6M>j`~eciMbc*{wg0yN^aM!)5+phvU-=M{2K`6(S*w@huxcRh-NF zmRxM88rS&Yyj3!sb@0DstA)(A%<)7EGko;qD~OUX-xQ*x(uKO>Bs_`nYz56VR%$;v z_ISo^YOD>_G|&~h*Z;tGn$3zh2n2v{IdWnUj0H>_DiIdGXwVQ#v!U@P?lWX2S$erw zpY`Q4JAi_MRi)f-eEQKT)~E7r2e#sXH_qCf4AO@^^)LluxR3C-x0LTkEJ;}0pdTWJ zY&ef;w7B|r8FaC~V((E)%Ki!O_=^c7;Zz5oOu+)KZ*Q zqx&Kk;x`53(3rJLgS(X9N(LsAX6vv93^~22mot&P>w;xj3Nv(}vRaS_PMqhg+;I}G z?v}mNDj+LE3u9Qi;jN{!fen;P9&Sp?ZiOhY>G3ro_95FZm&J0>{6T2uV;s&sX?kDs zWFI%i?Qh?4bFleg13r5VE^oHDIvsv?4HnKUcDfNapAK}ur`VuW{A%=2r2r>1*AA@9 zVy|ND8fJD^Ec1)7ZkUHr06wx{+X%@CQSnK0)VmEk5oq_bTPh6_$9v5<{cpJM=kK6t z7maz+YVGdppuFKQa-co1=4j|5^7teGScIEX=cLI-Lk zp-2U=!(=GST3(Va$(cw#*0IZI_m#F3wy16aZatQC>P=FD_SxS}sZm#cb{j1@)!;V2 z&Rg>CoX*jYyvP?`57KAhj#cmb3V)Twuk7%vsNwMMiTQ{W$PTC| z1wyb?8}zh@qM<^!@sig`QO%0|ynvqa6hM=P>psGzr>KCn8>tG5XyC-p%hvxpKSUA? z3p|IeZ7&&E5a9Zpjss=LrGOY=>t#$6rxse^Fi#cjQb4cjo=bMVI2XE(!5;;0r;ai)404G9a zZqB}TmMR1#Y3E7mRwp?LKbL6>K5wdzD`4XD+zVB511LG(`=Vq3sF5&qGh98*UCOl4 zzgJm(qg1k;+RX}A!p?ErA;RWe{2x+Kw8KqUQz4cLaKO^JXaRtJKp$|IFXQIRr+5($ z*Z>xqiRUb2ikd;L?>G|XWNVQk1z|l)0H30wwXwGsdTxR14grj%nV}(z_j;hl5%#Om zx`wUt9FohDS1Ty3l7BV+^!=b0;XJVY=)bizRyeYavXOoRc@jvIVvqlXyncwDz}F+Y zh@+NnQ*_27k;#8j=uvV;rW64X)KH?poKUf>advG(vJ1Lg6e{$d_7KoXr1VISL;U$Z_N4M zKRd-uyYO96Jhr3efh;onAu4d^zARIKu*G5QJ}xj4rhW~T5F*a3gLb`&L{JDq;F%hYU1(YUL;-C#T%nNY(naA`W7j) z6JyfuJNCEIMHHyHWergqO6K$Lg*N=sQ!*dGo62khp{%ae+!B-)c1LYlK*?F{! zI9V`Ug9t;PBao%|rqUW3ec5QB(1N#g%Sj#SB|k4CE=<5KSzQ1&u9XSmp!Z-X{*ei$ zzrnSX%_FDc;~3K-?nLu>g)32nfvpDvNjlLK2}9`|z`RG#Rvk;r8oovB)gBe}EVfw( zl+dq<^^H2Ye|EDb8$tq-i+O{(CgqTv-L1D zaCbqs^MV#z2tRIN8Db1xcZodzghdk7c;R#Z+xagMTmS5fiKIdwE9!T@Kr4UV>WU~d zQ472B%z#%*r~vqcI}>UN2GNaSB(&$2#bOrE^%k;+6|UG%0{C4Dz#JZAB0*y#dq^H4 zJg^D3Vg-?Q4AUoO5BO*1HE6PN>e54lhwqOcW{?2+ZI2=%wloE8^!_RBAfxIKVAFGc2rl<2aGsh@mI(?q z#4u*i0&?sO!ENi~&EUmVXY#Nl%yyotMnXM)n`&s$x4#?y+n$qWcs>_itFd_zl8pq*UbaNv{ZWP{Ixlr?le-bk1;rhoDt)s^g!M#;5|S~sV^@MGvz;g42dMb zqS8GiRq2NCXD>{S9wz&E4^u(*gHc4VU3`t{N}IRvk-20MNXqY;f(UVRRK3qa&L9>9 zDhV{7HVul|d-w6uSm1;>(`hi_gOUqHRI`QtwC>T8^CyX0U|e8%|8j;WW$h)=if(S$ z7O+td_RssJ`^0C5@4F>k>i^KS;lSHyz7#c&m?$)Zh_<~ez4^UDkHTRR@k4Q7Bhe-4 zPLL7i)7qi$fiyuyAfKNRcsSx{1-f{i*sDmR`#38o3d?3+@sxbeWHiz?`@q#fW_V}! z?n>Uc2t#WLr-z8#aK^dw9i*e|9UJiDpm1wl9IARQqv73dqf6GKE9I1w-;*07*vQAZ_d}t-_F6W;mRp@Yk;wH!z zsJfxU9I`d!$y9bSQF;%W{i$--<%GY&VBQe-+dx88o|>)L-t?_j^+Nw?;>=}-Mps4N zB+!HAb#;tXU|4nOg3$Q-Ul073&t1suiR$U9`2v0EpxyYC zk7`utBYqSD^P2~0he8g0RF^`TvRo)m9c)J60|9|9_QSzbCdBej4dTIYzfC21$%JIM z^DVi*GFs1{NR{owa5$ii6||)>lF*Wk39W_Pel`47uBt{+x)A=a z!z+RO@lxUAgVf!&m$IZg%~OL0&)uXM`?-wdeLv221Aub%ZS_}n@@-vD{_zAj8ydkv zFfOyy*a~6Tu8#h^vV18SLO}FhUS>5L8gtNuq@<`QOaSWQGb-s|Dz5g75w~VSein<~ zJJp0K(@GKgLc|+sH)K>DGL7&ifZXoOvFt7r@y>oR1!yeE@MuWE*Vz631q1 zvI-f#`XGxZ!KNRbCz#vw<|+wpHtVb8TI=V0^6UQ8X zXj_!cWsq_Z@1rS#>*{p8z7-BJQgOLvoyf2S=BO`Ulz`)@T_}Jfr&UB)skPU=Z7D?y z0ecfDf#&O4^-!fl^X*Fid~?xB;Q~eyFFfDSJC%4Wkf_AjS_AGadlYq$`xDEvl$Xo~ zy>OCbqld*_eJ_PW`G~5mrjb214s~78ElS&-_zh=fAQY)3DiF=JC!}Apn8MGXU9gxp zKH`=y_nr;&1nJ-JUUR<x{ck}YezRi$t3E0n^+lahhvT&Kz9BYGU zyv?ZL8;ZxJ`b=$r(M`Ym4}7vbNfoanhl<0D^Q}0&0Zg|ai@T188(~Y zSM3{j4L5=y&nU;j$qP1JKL}{5A&a5mX@hYLE&%>U&dii&Kb*w_TW_1A*sTw4Fy7zo z6(%g}M7@AS3#)Z|v^S*G@5m3Wc_2ylTL2~}8}uGf21P&NDBW`|(Ehh7(V~!8mtybc=1ROF+=le@wOAbK*K@ulfU3?+sl}otaM#vlRxmbg9 z*NNqHWn;dH3tznxbg?NUz16uaTo>A-3)-C|*d>xhfH?PoTn81^^zxT#0X$kzBap&= z#N_5Kd|G+p+NU15YiqGSCVJsQQecX8kKKY`p-An5nh5QY8W*Twlcgp?mikRV)%&Bz zV!R2;8{WNJQ4p>#@8kd$gS2*IxBaz$C@ugDRz)Tcv-0}Vsg7|#`nd5;Ii?GO@?U0B*>EpL(J6BWP0PK1FU^aas+Cfog9Hr4n3L$^kFdshQS@D{R2n@ zgh~O8W!_}xBY3aC20;#o{vO8IvPd0t8XnId<2*)I{nzqc7oTaeQIGA-ZLVSE%FgjY z(4-}j)cfTaq%DQE+HwmseTw7xcU1K24AYymxn&IqevtFRv|vjS+<#?nJ)g7JvK z>wbj92y@v_024ssfQo8bZENRMYmQiafIC&~qpU5u01>ic*Up5BgSj3ZI;W0$9bic_ z+LhyxRki7m)I!gf&ydu@D%obpH&q7%MHT8XyNIn!S@@Ki$V`pJ*)bXB0qPSodHCr( zwIoAp8|H2(aWnNx#Jx_Q!GA>fj8FXO%_|W$-;IPYPH&;2C8eMg9gQX$v}jV4j_d3e z5HVV_)L%V+veglms%g%uklvd3MUZ3y;bN`HxNLxFa5T;Le)ncS(~e9Z_~y|1sUhZs zL>|jSl#D7VvPCFKfl%GKRC736CX#!S?Oru>?_}m~_!px3CPZ{NhNIbfU!>B=^LQ8> zH{ZHBck&iYRN)0DWS~d>i|j<TNffGnhXZQYHkGU>2-mhh+JM&WQAW4{_U556Om2@hoZ>k1-b7BeapcC zr9x;W6Zs*UKQF6a0O|p6^N=o%Ix=I$kwY!a2#-e3HOqa&cFt=8mR{|7lB+p&Xh8w;CQA~GHwddAsj|u z*Hv*K%~Ws!6yhiJ?JM~3v3x&3)YR;^SFqLyH&5!nFkhI1vYjYfsChaK!N6w0l}No!BIcN5L%+_}{?9JHKd&+!{T zQZpc5NLjqWi=EzrNp)e8xx%b;^dAeLZUwT39KbU}DdB(xqnb7PUWnYF#-{OM|GZpk zr_tFUR1DJRxQ2EfZw$z|-!ejZxg?!UxU~&;dkWSk+T|hGNHGjg6ekW}!SI2b_`AHX1`)hGrx_EjnurFT@#27^qp8y2JX?A5=5D=sN z)e<@dj%~o?g$pMb;Fuv!P_$$(pWTPr5)YYCdnj4gOFq=;{FO8%gL~-_Qm^e zP0UyUjT=U~>c|zbT0UafG>VZtL}Sk`pdD%R{CQ)rw?LPe>rT>!kH`=wqd&gaCa>Fi zD`^o@Sm6IaOiPkt817v?J?U@wI53%_i`pQPHh>T8dT|n;Aoz8mumJ_sFvVsKCMSX9 zw?i;AI(2P^YBa!z{Qba!$?p*xDgJJFEA9xf`r1q~^}}Tekv#1|)c@!z`9i%p+aVN( z)mo96-(pN5?Po%I$nY(Q5Ryu8Mwz<}lTDmdy+PSSR1}_Qew9q9JGKI8g+;aAtia@qsm)vH`W8c-NCWsi zbf88WTv^n_hHPV)&=j4TS9V*p_Ugo>R%*aleCX>v$JXQd%AZ;0#O`MSeFdv+k#sOzM{Uj9{fb{nK$);Q# z94qCSJS-3ydugwQ0fvi%Za62}#F@130G`q26h_XgwmGO7UQ;KH-IEJ+0PywDz1#Fw zdKV#EHb7$onHTUDE2+TVCDwO4IIw>z{(>}tSZ7d0Z;0#1X^Ce~`s}ib6kC1#f_Nm^ z=nzrpG^Ym9qx%3UZdjv$91;Pns7*JWaLk>F%SOI?7H~cO<*35BkQ%l-JxxM;3=bWq z8;BUx$Yr3(hS62WFQQ*UZ1ANfFsx)|C{Jd9+mPF zgXXrq0$`9jD&dR%)c}3jXC6>fq1TE!BvH3E0CIyZ|Ns1DPz=M9JHRM1rzLfybHj{p-OYS~ie8&i6$_U(@fD!y!Ono} z1Qe&w^*`QMcCIM}2Z}<1vmg;6zZC;9UcA6at%<5mU`0RTl>__iMqr_hpvN1S$ZXn> zpZ8-k@VFBQEaRo5Y{{Xxb_$g6cv=4nmNKp9n-QdOo1UyO-?u=16#Vn1{b45z!FCXM z)f3?TCK7CvfJ&nUNI>$UY(q^c9)wOKLp2U|WI%LA{QccMFeP7F+($|HSa^YoNh@tt zxu^Je<~go^4V9$$Q5tHdc%jeoKo(#L{GVjbG|86ho^ob*olVI09$hCmc4*}r_?QN` z_|Y{j_nQuhjx&a*E!i98OOwCH;*}Z7i=eZ zS+uC_fc2n5gcPs=0=95N>r;(+;^=jC^VI0vGZD8W3cdEk4xG3i>pl*t^UFSyovt>* zdc(5nEtiQCOYmFkWqO^Yu>Nir;L<{&2HZyKoJuB{>8Eok8Ne^J?(%lX;QKK-N3?}7 zS|MOdZvBOz>fB?JLa@KH08TdwV*;N1k%OPk#Tn?p(o3_iSOM}usHdI1E+!BZZe^?? z0gh{<3UM~4&U*yABaCc2q9k%_pgKH{$O2H9Jux490Q-o~bf~8i`wJsscK#SMT~Heb zA*NOv2{W5SEfW$vRxvQ94nnF#QCJCzBhWZta8z`El7bIx5Jgh?M;#dEUz%f&104Aj zg8W?D)r$U8;N)6}a9CvD zd3FXa8(juF>NSwcG9Dwp{%-uw_b8Z;psWeq$H5Spqrr0z!bfe1d=;eH%{9+l2faKF zf)0pk@OiWERKM9>_ChYO@6<^JOACFKXxiV?J;Oww5!mPM=yjoegz8?%g!w}ekJ2qa zdP33&NV4n^MdzH&4l)0vnH%Uk)vh}@Vr*(f%R0=3$dkeOu*Md~xjQ^*Z%ccm1|hwJ z49ox@6PhBMdqEITIy*jJ7vF=oUOU@iprY+Akj0bPzW*>>-3eg=PDMZyUF`&8#B$yt z0Zagm=&kHCkHTX!>o8Njb2*fglN2`}oRW6sIcOIsF8aOk14R7^D_`Ri9{I{jg7!|~ z^#|k-o1)W-zPk#ML=c;Th|kxNLcu^U=7K{F5|t=d0~;XMJ_}_HL0%$J0>81=yQQ~j zKtV2t_sQ0nNPpZ7YA^gkeG7o9$*k7ELo7rx0lwhEgW$x%Pcbi%>(jEi?7IqcX}R-Y zL;10O-d8kn;YFpfPBd{1fCa~4J`_RsqO>CvD4_cPD((5d@COh=&Wtp~X^!+w0uo3E z?Ahr9=`1ix+DD4ggFUo}K@%C@kU0+H8(2j=7hW^IMZ?jJjUKMPp>sgnBXgsjHA4cm z2RfZdZRR1VUBMEnd-0CaGbyWVU;dN4QyW(B!QPSo?R6+kE#;jEEcK)Va zH|W*`Rfyc9z}XqA!-1YZ#eVEkKNkp#qoHOpKAY9|01wV~3r^SuM|Q_bATF4P(Mon8 zt)l{s8H@a+NE%12hyfD}%p}s{_X;$HyszbpZQtIXycUI-;nG47dp8F1a|jI>6Rh`Rfw%VRmb05gF7 zi*`m3k@T(BN+H85*0)Cm17>hKVmc9<6s29@hR_mn|KM|^HFJ0roALtiDAG1E7*A2O z11Z*raz3QrHcfqx#FOOr>!WXzx2MO9a|(qwT5ke^A#vVegvA7ba{;#!T;Mv!d?$Prfv%okS(rk@N!_^ALgT!C;gw2Ou9 zA7%U_B{cYe5{>JfB(dg`E4x#8qCYSJV2!oxy2#OSWn)HyY%b2a;5baP_&7*kHeFz= z7m>l6Q7dymeo)pH^9cdFz#fo7LUKt&Z2mV_kVw>i!mhtl5;aVNO{wURM0y($;7@;u zs_6i~u_!a-r-=e1z6kLDFHWXKXMZy-Y+da0q^322)}tsU~vsVQMeI7 zP)95X(rpE*p>JNHu|V)hTvMbArdWX?d-b$#*|9Rr%E(!b*jt2gv<|x$vo%$%CC*|w z39?2?JPO7I^+oqQy?ZC?J*57jpklGKC>lwK7>ePNj6?CtxICP~cL~QPQGd1HYzW(7 z7xpmLAHVix)OeC^Kx25xB1)P)@?~_0V|na}Bv2QWW!$iz$J=61nzwm76cJR6AjmoW zV1jMvG5GA4Ot1iux1Tv4!XhNcbEYdhXZwtL;xmSpc6xzmpbXF<&d_i&w1bebN#PhK z9a__ze~{>jRgZ>tO($D-4N)_lFh6{-t_=v;@ueC75zx{+ow>~&a}b~AZ7E06r9fmF zEdXHk{`Ix@6%0 z@%axmzk|oCZyYov!QPg!!Toi5AT&I#2KZ|%=0^X3+t_{-0X~w>bC?OURPS%k2F4uuZtX8_;?U=zlZ)QnUmd>mAqk;*%$ai6g`$zp{^~O@ z;%H7{KNe_sP$>O-Frgo_8xSkG!E6$O2Np_43gmlJlfn13i<8dND(pOlE5O1y4e`X# zN*-YH7;tLQ$izGfa)#*z!}S5QA6O$uO&K~6Q(Ju_9IdqPnEU)9o_cI?u)w?mlL-KN zIA7q@8Znh|1RapTT|;33!ZP}$3xU4+&8;P`WoXW%S`A^)`NBD`42jiccxZAXHiXgLR1p?m>I`2Tw;o+v|wTiMk<8An+JBk zwIjAIuUI}skghB6=NRkn22w@Qd}!wipaAaSIkf<1e+SJS}F%C6n1kc=Wv%UDXhBUFs#Fbwd7sr7=dDoC>vNTq4k4IRzM$S8HOy}j#dYv zH{&#ilhqIFVKsuKg3MnKY9K3{q!h(d4ABH%L3&~rH%Ca-eK?DPGasHZb!iLEL;@Z@ z04Uoxp(6%NgrQQQ#mbkgP!L=|9tbj%==A!Xd95#H_hN!)ERH7qm!Zx_W?}#_7MTzO zfTK>%^@Fc3R;WB85{HbFxEc!Sz}29aLTVA1*H~@Zo?&{)`Y^5r>QO}b%W$Uqqb^Or zQV;)tB!PEC7{Xd7*L;Hw2Q0n@7bL(!f-^gBPIAQs!50Q=I$aP*`cDFewrl`!1-N*t zdGQ*MMtOM@WhujPIS$4g?R!*{)$D6atOm(HE876?G!QF_azq)K1a6m-z?NBb-qHNN@UO$ebt8=`?)!E(spejN+q(nh`vhH z<_%!#j$V#{S$gcHj!89q9EbgaUo@ z=oc3u=d^xy?=O#;)Y%|#EDK!=QW7wl-WEC5)m_|yI14ZVcv)&uj(H*P)33c<)5u+e=e>iR+2~hXeR&jU zh|P>C7DM>lHN@>>?}R2ByI!WZ58YO5Gi9|PWt|e;F5#c7-6lx*@9%ED5V%F4WgW98 zg}6O{ISbt&-GzD(@1(T3Q^8Ee;yzM{!L_?GPsbhxAE*|C6fC`j;xg!wFE@JaNw^g+ zl;Q|r1hBW6z>|>PmYAaEW9Cc#HVIW9JsFItCoJ)ejm%w7N~pTx%oF^wBU*81K%~W3xZ1c zgdOyJa2-w$p^kuP@R!ZVq&ol}-5oai+3R(=`SD2kASNV}2i@b^Qb7*%$XDY7gp(=e zvJY6yU7VBA;50F12tpueg9&N+a8*!``Gq3czy>l|Izfim0(H?tFdATCRmgsXHw+o2 zW`3cVND*f%O0pd^GpYGAO{xeP7uA;YhreJ}BXIs7DhNz{qT*7%e1PSvU(N8P(4v7H zfY3_)QN1hrn`nj{$bt0B(gY$4uu!V zdrY{QMpvM!(a)g=6yh8>V8qTSV@t;hO(<0^tOsfeNhT065Q&r{UrUFxKRo7w$xs$e z7(nqg++ElY;3IfODNY;GU95|NUmZ`RawCK(1S@Mq6Ig&w+ss$G=>UQL!i0PZ44WE7 zP5thVB+$Si8pcsQj2cMZX2i$9C%i2`e>G|X;IKtF>;YQ$Js<_RHWNTfiAN>s91)oi z9@P|816BE%hS?(dZdt=ZJU9|PGW5z=XXOo1{ z>(IW@5Mk?vbHAWtEw!T9a9_7?uv*=4FbWv45BzNXzG-Kmz~V%3?`&y>P_+->hIg zs|jM$%7|c!F2);)B@y7uC}0x=Ff^mN=TXmEGi>HGTUilQwF23O`=zKP*g@Jv7i@P)SUbe zpeSPb{!jl1g@gl2;I+>RbK~r*~seQ`-c> zgWiJ?g!jQ|E4JOh1}ltA*2xNJ{l}y}#-W&ih89f%N*rkL{#N}902(wzv~6eWTh^0c z+VKoi%o5IB63pG2cQqcEt;cU`*pEDczWPsA#m*y&IZRm^r-I^&XMPF(A4lBL!fFU5 z5v~R(a$TCkdJdAt3h*3rB~+1x^UL3V{J_|Qr79>ivD%6Y+@970`p#K|pjZqUC{$2F zB&2*ZQEk^_O2r}|B;>R+M!K`^_XX10pk*j+-uMqds$PckkU+t^(Yk!!EM_QBs%6-- zfJqNYAZ2cDamrk=2~B|QRPlV*kGyUD)Ca-QZ=k>OP&DPZt7!dhMDoOLLoG~neh%;( zdnB^N+~c7V1|U>J_Xgn;r|X3s6RdcOOTM{e5y4;UNkF0J-(*RRZ&Y&Li`R4A82Ye} zxZ5jQ{23i+pMeHMVxC!Wugu8|alj!KoVx$^xeHf9k$6$~i3`&11Y4yDEqalxDA>;7 zme~^Fm)fFGfg!K!`c~q6b@SchhU-`e^?_S}7paK|vazETav@?a|BO zJb}vuM3Fw;0Q>;F0Y_CDVzd^v(ng@n~3IWkadv{HGPTP|a zy^~c3R0NPU&J3QLvETHY;d&S8gsEf-G(frQUO#_=!;Bski)<5wabVm+jVJGBCrd0t z{00(UscU8ATp=cqHjNporC|r1pV*)wI24@;xaAQK=I%VKq_7c^7`U(YNbi8K`+f8w zjEQkrltLmeKi)QUUZ5ZSPYna5_yVdhPrM!i9!O=zp<=k$@So}@zk_UNyLt(~VRzF} z^g$Z~+Q5z*pcfo=Bp%eOne@QeIV*oBAQ%15{34Xmz%Dk>s*@xzL5Ot?u4x@YG>0y8lh~ z5y~g;hDO8sZJ8Tdh(l(+w1uO3wc>er6w)aZY_TqXqehJ^mLJS)f4Ir3P94ji_`_e{ zv>o>t6ITaC#0_do7xcbeak#XsM6gFgVKfwif`CLo%FwT^;n9HcknKLVJL>xr;vw_f`DtA zWSgDs&^InYUB{^D>UkM6=?FRNdA1}j7LP({*CQG(YuFZs+f(poqGfe0lEyy{rUDYq z00qgY^KcO_S5QhpU;+(ZFyw4ZegL-^Lfk%sr$f82DUPbP7>&6Ca>g+K?DY|SbABO@ z$8=Idw|*M8H%9&0Z{V=W*(z@uosw53T0#dqgrEl$@IAJ~P{P4r!QBO;Q4%b76j&i- z^583mWfQ1Cn#4HQK?Fz8Zqn=hk>2{S`$JR@{>_?0?GZ{7{Q=yYLPvyOFfhT76sS~V zL>rIr2T9YRUi~*jDP1%rqMsrIBehkiI-l$V_>zwHf8!#^2#Y~TPv#&Al%>ulB1QEP zY`pE-HVfgH0oZG2P9Y@l1i;m6o~O1x(F~*hEWO}x?H?dg=kM@-9fGHGiaG|5(Ez1k zBLm9CV?pu^}9mp?lrCT87WYY-{hVnYbAU!?%jWwOl-j>oDmrjdY}QY@p%Y>l@g~c4s?G9 z9YehP1&{K52+n|>$s4gN7*24E^B*n69>-p69v%7yx%<}HzZESQ+r?HvLenqRer*so zENtAXap8pfBY`cONv?fBWjL()Z3~i^Ny?>IeAxx_Ng}w0cBK%+l4N+*w-;t<3yu-( zR!Fj~ymHv5qutcgc`EI&K^Gx6R4oDtAtZFgoM+UFRlz-GBme8MLABz4vG<-)O=fG@ zFf)!aiokJDkv=o1pa>{cX^~+R6)B2}f)JHnBQ?}SMMb5lH0dA$(uDw_2V?;0(g_ek zuSuv$Aoblr&l#O_&YU0L`rftPwfyDsSqXWb{p@|$>%Okw*Xy9%0rDUs257)?gf|pc z!JFVHSn*GJg8=|w&NxK6VTLt;&lE7jTmhsnK=MiM7C<}*z5_g>90JZQJjS^~b{0om z?Kdrz8Bi|cAcZk4y?_x?w&hyC#IfznV(cJiYR_1g)7u0{C6J4PM%z}&_&rmZgP#Ho z^}aNdMThu3r_rCpkj^;wNXff+i{dhapv;23)pkJy;Hf29TlwAW}{l9_(iDFuv<^py2jp z`RLQAWELn!ntfvZ0d+Qzpl5l;0%1)~=ECV7fxUb)98~d*r2tZA{IN*!TciJxyl~R7 zKXC$_DCYd%(g6J{1p91-IFZ=Pj=y6c`_xH${jY`^r(%BaZ?(<-6@~rNVu4)q{Qsba z;v}Mff(1B4Q4t=0XQ??dR$Bwq{+zlA&{_q7)vK6{$utg550HWa6(fMCEl#tSFWUTy;V>s%{##?G&Kp^1?Cl2}# zn#TV&5zm<%X#>b>c|dyKI=Ki8jwl$P>mXeL$P^IKEOwFwD_J0kCIs zJ?{grt-%?SHOT~3QU+%~-}pXOwM9d7t5cO_UP-xXVxErrfunWOuGc}^t>X*OUQl2& zL9{=2-`!>W{i7NCvZX%2590$CZ;Lde;xp7mFY^NdShRA`!vR$rf1{blA}-zloJ797 z4a`3>qs?4S;Eg%`wKHoo@!PjXb2!>{)|#n4!ASsC@K#C*K!A=ergJ1Cn1F<-ZxPNZ z{*bwlD|J~prx_b4ODg`pb+MI1QnA;7g%bND(w6_X;RFa5@j%40F< zi$K^HP)Y#v!^kQCITYBoAYghk33``e<{vL@2b4#cpiSo046qbC?K=T&B!_wXg}-fr z>tpf3c~BMNR4ozfoGC}dk(n;eegG)|7;NMKnlK;!&WVBqt5C^{a2?P^{Hb@jMZpXF z!lz;=2;tCH%|C%Q5~qGHy2JWC9pp1$GC;uKB&S9RYUSW`fc`3HDha864D*}TrNeJH zJjokd(}SSJ${CpE;A6SHe1U-kI|zXCA8`tqfM5Vn23s86;D2ZiTI;4)djChP$*Do* z{cBkH>-6#8E6tpz`y=I_lSH49>L7ah9L@bFMNLjx_k}9)XT<5JFZ}%PDxv_h3M|z> zCy)MBng0xO`pw5xGiiorKVJEpF@G#CD`51_MbBM zUuodP`WcZNY9SC&ZSc3W0mjRePcnqTcaDNJ0|1`0z-5CD(t>v;D1(AXhciMn8No55 zpLF9mg(X0X&k@N1-C3~J0YvU9U<}=gT?Rk1VSF0u0@at;Ej-~Bu$ciYrC8eR(Ww>t zzhj>RNemcPSO#*G@S_VHO?E)^_UUOD;P6&}psK)&qX*os2OxIT(L|u!^jcLK&4Fn@9?|^;6m~!qPzfS25YM$$f8>x+Z%w*^!I-Xu z{wi7D5dBy)0!WC>0TjUC1xKOQk5H%!63T;XavU0`@CCp(;qU%FS2egiO{dYQZI})a z-VXLDoN_(LUN}9q(MP92OBV<7YoLz>7QP(RrBOg(-FFf2I|Eb@cmtqqSLwN!0fxpA zS7xXctAFdw!CiY_LWnRv$$;+Kl)O+VxO!VL#=FDZ@3XbJ*R3Ul#aLNq}S)6cITR zm_UP=Q!xO=5##JDNAmQ_0EY#5y;H!*aJr0AdyP5dJO*MMOe#?Hy9AEKr{PHu-1k>( z!Kpbr@>1eseu?}uD}8{G7F7PG3KTeXdqm)kUy=dm8%LCK^6%s0e+?~O+ynBuzZ!)9 zTCoCYUB-`}QoH|EQ2JLK_8Hj3$@M_e`FA6apF_RRz^Tt8(f_L^2Ig}<1G7F8=X_3S z|3fbZFq=54cXe`j`%HdH=O{dX4uvEAIj%iT4Uj{D&S;YF!VwTvb98F~^%>v~10Dm+ zKmihnS3t&a{~;*or2&3u(6WC5>WY9m%H!FuM9$2Nz_ToHZcTvRBq&yaV~}4>F$EP= z;7|b#=@20A5R^52<9SLIP!@n;FtA%eH;q?J?Mm=O4u>MM()dHjC;psE9O+bmE8(=U zL8@8qZVOH#x5W z{*4(q`}^;|Ct3Y>M->WgK;v)72SvaQ_`Lk@<7BGf_g4>o!IAaX0X6XZQ|G@ez<*~U z|F#3Z9fAMi9x0UDO`nGMjxV{}&F0OCZhKuW)spR^9 z(@EX?wfFV}Ohkkd$22_cO2!^HFI7|T8j=@aX5b z!HvbgxMQP-fQa@FOL*ALQW_e6O+ImGTwyVp^?(DdPMqa?g|@@N09W=Lj%6?lz2tqN zR6-4brQ!SYHtlbPzwE%A{b@350`3ql-g7ON>CAkFg(Uc8uN5?y-L5KZ_pMQdCn7YQ zp5a|y>|I=x05>qW>ubON1fyp2?YFPuAggc7T?sX|A;*mdf3j4ky7f5UHGi_UDpx^QMI`u8p9WdO7 zxvQkkE+s?)G{I|Ab{_+^1LRXo;i1Zl=7lTkIX0RB%E`--5?kQz=cZpT-G^rDWL}F> zpT&vr{=6Gi9u4pDc@}x{u`B@lp$!Yf=9x2_D)%t#gi5@+I;s1rY)gHNY$h{Tf5tw93EPIBwIW7W?dm z(Q+T>smHuhrjmO>CvkDJZU$ao?1f#{P9B1tL+Q%I>f$dEdP>L1qZKq|j z2R1qah69G=k4K{JOxQ*dlo2wowPV`@`Hn~shgN;g2%z1Jc4z~5{EpKnx`>(qr2c1y z;%L^+c;;2aCb%^&xvyUkBTE+Pa2q$lFJ7u^#k!+Lc~#A20!`{~GyO*|skjCu z=$sTC3sG5QvjgT*+Rlc1zAD=^_S;Xc>Y|wd8tDjW(D|za1G#$P{QI35g|$DP`*G_9 zEf1uBK@Y>lbr0e`I~h@uS9qsQ7r7E%2UEGblEDwZ0hx?XvQFHdzYQ8+crl1kN(kZ~ zQ9T}{9XrgzZ^wrWm(8K^XKP}!A@AO&Tzm~$fIC3x{aDDosR!_#;E9mtU+;qr#dvmH zEo_peF$HSE&D#STooL>#_C;V$exwb2kMkj=v`;GE(BeOwsU2Gj|HUH~3H~I|Lu|ff zwBz2RJU?0BJyjBTOvRfVWk=b8hS}^TsBA=j&hAxrlHb`N! zjPok`=Eds7z7zGcdDklz< z24)q$C1Dn*lgs*T_CQNC)1MmZ*90*r;>6-WXn`x4a9e7-Ap4hA^-Vf?g#Ols($c=Og+Bujg<@Op6XX_VspP$$nlYAB*F+ z$dAI3Do5}UPe{4+K{$r}ZpfpZV>pL;cN#7}no^RESacs=y>!*FW+8IZuylYvpV<%x ztC)K~%&2BX?5VIZhq0Z0d*gU=hDs?B5-~(g%Q;dA#N=4I+U(k}Z5hg?X}o^cS;L?C ztV?2eQ4(Jsj~~S!=Jy`j97vHBT<+~uTL>oc6f;&(O5Sh=>m`!CqRz-LQ%G)0PFmpi zVcm2yV9`~5ryiV&N4#evvf}+HVc#PpAM&c5WLqI7*AuIzb0NGFIT*QmO_5O|3?(}FLX~hr{5$>wa$yV2D$5ZpgD(o%n8l=M2*|f}|@Wh<@n1GL3lgVyEkw>uB z*;+4ca0%?2x7dy@Bn?)3Ry^j#jh3QVIPeexh@q;`m~?V*MrgSfA<>^e(_Y(e%|6U1 z^(Fn_PDlp5Of90P%vo}w7yY;C6VmR$jqqE%^AVBLTf7z`v2M_T43ha70NQH@GHk0Z zQ51LjNwsgsEyXr{AB?_ZG*i^M!*(Pyp8B5cZ$- zRExG>dos9+2*1wWOVoTiRsHH#5x43{-fLWY%G+6K>d>X(}80(Z5H~ z{ebX~0SZ|Di(}R8BgtCJu{(`oXAR zvaxtqk(lkspMyxGAoh-8%yy)j^gCrpi~_!KlHMjaCQ|J?aZenJsF+ccHeQW}o!z(m zGN%22>GDVC55_cSViC3z=VrSK6oW>i-v%nI1T5{U+O80->BSstvun1)x+TWWjs3qOq1RtWt8IqCF*swxb&!l1*~M)iYs zlQ^o>37%(hl00w6#+1U7)NipeI(1IuK?}X>p1AhZC?1x5g>uDw7~;cLMXU@r^1E$V zu9V$~h;hMwysqwOS3mX(hKDeX!A@2~S>7FvCX37Gh8Ky6FHFx5MczLW>_oHAOcy)V9UGv88r?) z*h11Qso7QVowY!}*ReG6-_4e#g z=;-RWbiSzSA-^LG-J(t%E%t3FYB#}Uv?7=x_bq?pw*D1@mX&w!>s99w|GCUP zq$Yli8&k8nh*VIz3t~{k2h^1rSZMj<7-xp)kF&KvzPgsRULKzxT^mjb}16Fi}gb*y`$Q7;|jC&b&~3ink4(Rk=N(#HdxFs%xR z8TJZRidK!9ewz16%ezPQNUCChkUgKUfnq1CC{8231a9G^4D}%HLqo4}UabrtdgK&Z3vL1wVA| ztTYfVyWV7tFW)paONuW+3#v%>5W0B$43kRjFC3=lcP8_=Xy(T&Qd)Zm7^iO1TfxWS zG?&xM!F5YRAlgzx?tU*?G`;PYBCW#5+x9ylK4t|fV)h^zv8i>z4@|B^uLRe+U)Nkg zsVcH|{E=md)9~mCHdUpTzfI=fTRKpA0&< zZ{QhPTq|_C|9CnEZ+xh8iM3vPKc2OId2AR>8Yr-6XGH98ukea3nm=+Z);ns=e6T3d zp8q%J(&-k_Q!`Z8(30Q`2y-kA18K?PPr}iIq}(@q^zPrtw^n?N{!nI0${lu{$T)JJ zJV|qkb*Lb6hX(9rpxa7A9y@JrQ$_j*IF3db-M^Gt5=`^-Kf3m`L_LqX?sLDL-~^~G zG|~Juw4TCL*|al4ilV82Ai~kRVMCkZywQaAUWH3=^Is%XYLs5YyH?P{hxVUp3!g z4_DHEE^ndNQW^CUG^s4N@`YF$uB<)#mH(A;p=+qjjdS7jD6Yjy!u=c(b#-IVYsQh--p%xN$5KzMYL z+x#m=7Y$y-GCo-f*V#P6i>cD2!ckbB8C%1WE~%@mi1hV=rz?V|;^Nsz?gy@W2JJPTtmrwn zb7CQ_3G9y<@51saY-V6sYMpbnjuyxf8gRH4ym z5nlVe!25yyv>6k5T(6Un%?4SL8=-mK{bYhy`pAbm^Udn~u=b6X=!K3YBV>@^Q8im) z1U9qZpOr>Z+9|1yh{Rvfntj1q(ASsvh0c#{ZI~1+nf*veI8mbCL=$lG$Y5IF)T2X* zGvR#;Q$l3p?erKG$o4baO0;8Nj9a$j(+Mu^NoR@9qVpJP_FVr?-j>Luvun3=_XjGJ z9KvoK`;n|@NS1nBJ`=nAyxky8!H*ab1-sIHb}En$xp=T3KT6+L8YwfbdURUB?^TejGsF1)}j5<|{c?yJ9wl5F0I5*&FaDe8OykdPQVD8Tg2$3w1F zY+_4peqTPY+7i7ZXuZPlcJAZMM>&AqjI?nH@jPc;s+Av}>*RYbi+Q`yvu{J^kKP^D zMSTOSR&HeD(v=&xE0(plan&Atl;?XWUORRwxc?v**ToNJa(){t+e*wQ+;|Ny|72B( zsh5X|Q=vNyyF)5-L=O2SeK42KL>OgkV);f3k1__BY24@pWm3OQhK6*H2c(knfmft5 zw>E6JAhg4&t31brW_{qSz4v#I9vAThE76w9-Q#d5FZ-9#F=cTlkbab>XTTfQ9o)R$ zvzbj$J3>sFJ?TtcD2g~;j0+|*l6*>dG5b3)BnS2Of{G~fGFxx@(43ZlaHM^SI~E}4 z>3dBRhot;s7TEi+mSGy@xpk$kDn-we#bOuyx^EKOBv!^u4De0KKL(Y!1}YePyOivV z!mSC5Ru(-HO?J!JOu4AyWmHppfs|qM%n#;H@5z(@#f08{R(GR9_rOR^X>*rTi;SvB zr$dow5u|s*xI<|e*QtdaNKQ6pukDZH+jViXFRFL6aYQI-mE`kI&F z{%vi*tg`b5_KGK;Ui9cGFSk;g%%(F zj_cM0ZM6FCWTV|po8_ppY#-NB?D4`y(UO%Y+1r9gMt{#DPKT>wFD4G%d%w||p`<*m z9ZRu|v>#a>i!Nzh6O@j9;x0ZcEdF-<%s+%%NwZ$i9=pj z5R5xr&thaCTC^TmFI(d!)0c^<79dhMFYEVN1^YKDzWWSaO0K9%_sl^m3pTnQzw0oq zsU;X6Knp+$wPO>*mGQn#YSIzrQMp}7cKW5WrbxF3Lnp7WjvcW!!Tq%3?hc6rD0?ld zMoPa=YyENBQO_Az0pF7|P0zD5&`$8Gu8LNK^(}hSnyRu`WOI_$tdznLQnhRr(GYEx zSJIUOHNV7O8Zu(&vh z7Kd$3?NHcS>XeEDW^k-CF>7~=Rm@vI=XPZ>1op;@t4$)~KOU|A5h^ZPBIcAz*)M7W zEJ2kZv8OwUnKRYXBO>h9C@OPNQ)IviNA69!zYQavZO#Jk%^uMm?2D2Z+DlT-(vDpb zaT3eYM9&@Fft4H}Hmz4P->bvkn$KnTk;8||CQZhFp$ zZb~ZAKV*jkTA-#PsKj+<)LcgY5V6nN&pyvaH@j%bC*C&R1n55^T!RQ&@-SBGTt)(6 znh=|e-=Fv~rL9aRwb!wtEL-Fm8G3I=k!=yRFuf$%R#I?MH5?T%J@>t;F~TrzfuRFa zaZ)XrjV6YLONjU`g;PvigdsW~opjLk-(@6Bj1Ipf5S@`n3!Kz7Fd8UbyTXqZMQ$ir z%3P(%YUr%YHYo4e$|9sE!}fQ4LOV9uw8>(qh!v4nU~;{ikXo_25U16dKzQ@>Ha2I?rdwQVWI#5_}$z2K8+Sy96KYU!;m@Z#s1~XEQB4Yno z`ymvd8)*jS&y%99 z#171As6(~8Du0MJB<=L@Qb{Yqj{!Aebo!gVR-_`NGK{1$O|P0Rk|-EK+)Yv0+w+#h z*J1@(vKqA874+g|w1g7yESCqfO^N_hca5F?_guBT)zb^Il{xYE%Gn)S!_Vz1&f|^n zSvd=jVZTWR266L?4zhdu%^i~l1xi0o288jU8SzfqCDBaX9>!KoOH^r(LPxCKmp*Y@l< zK3=6)w;XfcQN1ow#sp3to07l;>dy7Iw9gc~S@L4fL^dYdXS^Zz#8;15QkVRH5oU^t zkF0*k-Z815FP^PlkdNYjy@|>Bw3c=Z?%yeuMD|SsU!xiQ4T4(5a3sl{XsaTcn>Z}* z;WRc72n5Z|F`i8=tZn1A02k@8Zqh0^c8g320cuObWz)Si04ikvI%&>iGU5G@7~Za--5(UtY={S+w24|-Z#!rh)11_X0pxR zpVnq!hLWEw{Ctl1=69^!xxl7`Rln|w&V|LA=Gv&ve4b9($~i+7l`G8i5ik>AJ_z2* z_kSsWKRSFOk!Toh@5MDgwxoFp|0 zMFt(_?@KgM?bE)$pSzRK=I0B-?43#GzFE^t(dj3p*K818VmRkjYV*wC*AAnOl zeWx?hbLy9rv;qMQzhu68gpspk9?m-30V5t@Mb$W9Ak({|YI}#{D@}$L#sYGP_h#h8 zdkw$_FS(!E0jWut01#t;#?yuL2;n4~G=aXgrVtYDy13w51dUhzuHrQHO_tL;7>HQX z;#VD#z1OjxljYWyI^)b-xp5n*A_o;EBfpp9=ET#kOU~y@Avl+$W9qJY8U;Pgd~oVD z7mCt*`_OEdK|Rl{(0QkAHKT3Tl{uM)trAb-G_ROg;I43Ue4+ZQ`_lFr(h==9XA0E& zPg64M{|Gu@T1CmKkv${}WyNn`Jw4Fp@lt-jv}a!J@Xe*|^n@E_P^k5MtUJ${(^6_l zaEiDv7>ZB%@pg_yvyIW=&DYAHBZGTEJU_*n#1Ynyr)`TjL9+|q>J`ZrXZRh*BKskT zM;23uG4JAVX3O-oZ($!*y{YcFg+>y2}KaR)fA=j!iz_L53y2|0m)tO zyr@p;Rf*);TM2}hW}EGkL$;tRqEO$Dm%Z0r3mJ``7GBWlOZBta>1Au(`BsJFu!@MzE`IQ1AfPg zSH5(Ir_~{*l{xISWV`ZCHNW|mn4EfRz7>N7D@JXAvGm87xW+;p1L!9@{~&%#TA?`;KSo3`4YDL}>P&Jrq`5 zu_}`YcySqjgdIQek@5ZY%=XxoC>CzqWyQdsnDCEw2(8 z#*o-%rmodpdBNbe(ZjEb zBVI@SAWeJ(Y>8XLGwf_fJ6??%Fi?PGoK{&n&g$Jh&@r5p_{iFhE=jFk(jlXx*Q*0a z_2DpNc7^37I_w3v7mQ&?>ToxNuH*zXoekm+datDqY!@Tt;(0`xi}x*j+&-Dtg36Nw zGf4SFtSlx!^!{#46;n~4azPyzp2b^m@$PH}B4mDWoL45gN^^81j$SiNLpw7r;S3k3 z6=x~Vej9D5wD6L3nNC9PsO7EU@J8YU((w!lN^3_?xg^qS)Zrna-J*W7@dt&eFU-}E zx}Ncvl^(h3Vi|VTI@xbJ#^iShYzg>`8|r7d;TpXg4%eLVXnq`{Q-tptW<)@<#}Kql z%CWh1Cf7#2+*ygo=pP4Iqz>CsLfigJVB{!?FVCe)Ssf&qJu{qwiKo62qcjqvD{C?? zc(=J1>aUYctZm(~<&#p=wi;Cd&ONd5M{1;G{q5aVs+9egO;m42Lq-DTW^z<{Behn> zbqcQH`&>V57~4{Eme{nhUI<9_v8BF%+Llq5JsuGoFdZx7<-!14_!z0WostZf2?kr427T>PDD$?#lS52I9v{ni+vcJ2(4S-=>CQI*kJ4y(@MdV0PbZ?&z z9?&aILP9N*WcTsF&|l0vwtvG`-?TCCs8e!U#XK37q) zHsEq#7@Di1vEH4e85KU3rMYce6k2`sV};jfY26U_316q5>AgjruSaU-CDfINh%)gj zQSI1+`dQ-x{7c?)G;*p`3~qQqQk~5W(Hz{cFThv8O^A!Cv7IZ`5dTAdUOJdjcJH7i z3A=~L4EMvoN4pXN)HSZtckLz@RCvDkvk~KK38{`SbSg-0_hp`=C|!Wf=mmv87VP#O zhE3~Wm&Da+zfB9m`}uP{ZX0E+JI@dMpQJjUGV;-Da>A+}sIkmr?F(2djlnN~0%|gB zF=vfqj8d0!J+Ws!vtHDh)bnHoOaxZW;szH`i|^gzt0~Q^7{_JuYVLKVGcN`lj56vJ zay4UR>0wtaF0BWjsYaJD=fz~|ufd5#S>}!B0p~C9IzfkTaaW_nNGHtA%KHieHcVBj zx%yw(7|NT?laZ9Duv;awCrBd)@}Tp3p}5{1+n)h)m6h%yv?Ivq*31yIX7(#XnY7YK zkL6W-WM_U_r9MlGJdkosOd=auWUJ@BY+{m|&AOAO$0}jhqsi_fRFjq%6z0GbpQL1E zav8ik=*3|P4`OFsSC@&2|1b1Y|CS&mMma80J>!%#-od8dZ`X&5+Tzuat%I=#;wY;# zm|PrW$fLkj%2Q%bz=(w#WL@rA0bJe!9XIG!n`+0> zcc2TLy^cgTc3|Ms`Lw#2vT~t zg(lN`P_XK0!S?9B!bFic(W`31<9rpxZg@T5T|*T!VZELAdJh#3-v zJ|v#8@t&(K;CI3Hg0$sq%tq9vm!}O1m5EqX}iLPJ= z4Km3Xgj34;jMInwj-F=SYXL*ptYanK@&9PNK8^~exkZ?fTz033&4?8*qV@s^;temEZ$}*f!Fh+X^foS1#x#<9d_Kh;cV$JMVPQe>_cY?%jXM{tzEwa0uBqA``#+q!+z9 zl$uHBR9k5TN1?FYi)MLq9bRRNp0}ry)&~2RbDTlFe_}qAje>#Rhvkx0;NpoWPs#AY`BJ4bq4E+{@Lo6Ea}r{L5wQpSr2A-`NIh%RmNXBiz;f9U%vx3uiEU8! zlQAWjm)rV+DTr0Dt;fXD1*h0$_Nd&WYJST$62*G*-*Fw^_f_n^H)9E>=QY)#rl_&} zanSzC>&oxeD?kk>HL+$>{k=)nv=cxr)~+1-vV3swxAu)cvKfyKa$<;+3BugB;*Lw} zz^yWqg#GU#JOnsjkooEh6Xx_-U5hM>t2Vjg_XA{LRbC@FF5gIPp^Aw(+xJ(;!iY%& z<75=*-iB@a>h`#djs+@s)PXjVM4o^6W8~%s^$9b8)(V6E`^PR`#aAwknro^Ke>B8& zsgn4>pKB`kGA85Vl8)9E8j3|*-)enKPG&Ho6dQ3$lY~R6PC^HE;ZwWr6CG{CDgm&u zcIDWY55UFs%-ZO&*Nihi{zcb#>Nai)q{MT8b^=h&XsL<19B{N-nnBq#VR*Q>?k4bj zSs&!OcSk5PH4%w*JLZ2r&XX|56EE(KJ_6$UpSAz}5sC+>lya&p{+(^p{W=q<#7^j| zuCCO&x)=)K28vRn*hvzh%7DkR|M9Ee09UwDe*XH;ajxzCs_MhJ!gcS#!!NryTi1-9 zf4xYYi@Sa*U5Ii5@HTnVh^-F+l%w`ndG^*->2qHuC!apJedo8E`?hkQ+D%(K;@h74 zb|AhTh;Ii1baTFW2(SX*eCrp0gl`@KtiZRB>07Y*PlV351M%%ZeDe_BJj6c%FkANE zn}_&Tj`$ab^P7kG|KcI$w#T?^p9|uRfe zNqfa;m;dqCy}16sPF^TQ>P%40-hZpERsTGsw`1=7x1amco_$-)Z(HS`=pk^H|L>i< z#LfQl@DRD-{r=9)=tkUq{By;c&HINc<&YkBuG2m95Z^UsI7YUjb7fMI3C%$SM?0%~ zkZc=qTdaro&IkVo`|z9X?iSJTQCfp-O+`7S{D<&$c3qjDxcp}_|GiQ}dXH7>OHoOp zY9|%c{MYB6siQ+HJ%6j%Fj_C3`xx`!&+7Xd13WB%RKqWib;VZHiKvR_go>?8RBze_ zn&e?U>t54YbGhY{2uILwiCE*-?=#BFQ;3lh?`(_DOTwzuPF7hC)IO+8PTs@3_EY|;kC2}%TIN_fOQ9}_&*ilC zR?Dibr~mwC`{PJFy%IW)A=rA>pJ*5Dl>D(lK{}$x#VEsOB~2aTeH*&IhQ0-U+ zFqQ_y-)b04^W+??-&JOMpP%v{V7s3}6ia~VZP(Ts)uU8l9CEIDCGYgrzdW1S zrgl)5wFn%!oVJPj@Ej15W`ZFl0fWlf_q^DE3XP7>qLcTo7ss@%q@@8eW<_yCwOc_~ zm*iR_Zr2Zgxn2Fl%@671n1*>Ic_diBxfnnVGf~>HBk?vyHlNj-?@j#f*DMNA0}|Lc zXOFpPNAPE^{Qi|$omyY-IK%Czv%^@NesV=pkLA>*$S(F8YfP4?meiQ}K!iwCIkYQE zB=t<08Vr!~{l4!z5xiv&;f^Lq@~>mwubDoTqj5JpQQ4{4Z9URa7g zHhOY{TvFM=9D0e5Qzo%2XIO}NlYY@E*U7>brXIUOWT5&Zg9TJUD%7NVsOs+GT2wk6 zlN5kd;m2*vu?%Hzu2kCoPHltSvc#^RPYZYI&y%R~V`E%|E9V9$Lgf*2RfHFT0uWka z57-@yE=hFI`65d+%V})2asV@HDT@iR9bqIb(jg|M-}e<5d+sEhq|&Tmc^KPzFayd1 zI?qkh;ny(L=`j$>RmMyR4f+G;K&Ir`$;VDMJ><52Y~qiitog`4OeSGha|)CF=Qlec zo>l`!n`-)!FpbsI#H6dkqc!VMQJ4cm$|n_0US_p}eq^epJP}glMkJw;M=I9(1#0{@ zqV5)?>A}R|j@6EQ>p|Qa6^#Dn`i=QeMaxlAPN^vNgpr>@y{;}_m0IykR(0k~^2Onx zqw!-oIl|PjVIZkk7ewL5_!hf0(tl@$fePJR!G}F0po!JpX z$84+>mIv9$m8;OAPAO_tBMjD{<&(2?R%zX)C(zXOP?C0^u?#4ohsc>0s@2pF-fGF_ zLA>OR2|@Xc8AGc}Ni1WL$k>wgk)TBgm9f*@M)ssNwr&PGV+qC3xyxU~q%2WqmKeU1 z1ukb;?ch$_Cmw|>(^W=k^-YL^mBIa-SHKneY4eIkmLu=Jb3-%IW84J9p+nUZx2)eu zu1{eGNH-KF8^K~$oe*_#`ndceHA)8F%Wl~jL%OkMTISgl(K!oi@oAdWiK^sX(p(N( z;5Rcs6E@nSQv>^4qg{CmswClTilS-04CO$Lm z27i0ja0tedJTzk|?L3uvD6YbjJmmfUXNdG#T`+yN54!89ipNS-jvGe&CcOz>ZK@fh zZ`_sAW>&!LYtLhuTl40hu?EL9P&*dbak42c;IUkVhB!oRWujd_BW;1#+|5}qg?AgaYXJ6v)As}Y?DpB&bzo>)I5Kh;^dGPIo?$;OSOv^nzhhcm;~5r{E& zz5dP`1P5<~;$bxq(@ zI&v~|fBwm=^@L9PjNg7zSvJCI{DthMz&IdOvR9N=bgVm~XHj0_71VWxs=1e6FEKHB z4_0G2To1v}wM=dZMXr~y6mh#<<&~n=p+Wm^Zlw;*|yhUW6L@nCw@8_ zLXoi;q_O99>se#g;}7N2>Vv{Z z-g(eND!7mMw93-^t!&eTge-0#MSvl2(ZhE` z%4nN&%^{kbet@Kcb-@t0(~Q-HmLhJ*#?WB7)eeey8`OFp8?L3S^bgWc$R9+ZU&k$O zYAw83N@WU{W?8qIQyaob8ccVSFv$EFrI&6!=F}=XPpzv$;3TTHPeDVob|$uck?i8gmUQLQiU|SmhVga<}m@n#ofo=7~HKs<2`` zU{Fs%US3s2ktOzHOqqE!`=qKH0p+@_Aj~SC948`gvV&L1sb}TNy%>*bx9pkS!L1n2 z1?cRA`blV95nDZ==GLHGZidn&mx21|WFf&fwyI9ird=sB!%oJL91SY zzC`+FxOB{y@W?x_uk_(<>nYSJSmGQ2^NI0OXFGqo;ySS1bJCcHRFT=09=5P#9FJWX zI~5`TRLvRUGouMzi_vnSOIwR}TBplGp()%3$VC%2HeuCMHchifrs`Q?I_!J$Ef&8Fk>9=(!9fQ2eKT^nw3=&i;P{( zk;$qKmDE8iiK`6xzJFFfzHm9Mpc76`pS<>$piLJCW;yfv4rr53i89+vM8e8*YwV1@ zk{M1dK880f=;W>fIn(QvSy>}a`u>mO+hW7X*5M=UoE`^N5TnlDGMXXF<2ENDjB}IU zWx!?q^1M3jo@CD?@u*sbQx@<@1^D70K-}>_6SkCE5Px%aP7~gjzpeyZdELT~r-U-G z{340ZGF|{cd&JUs_nJf=&KA2+GD-ThHj-Ow<7AZKDcPi=p~3p;jHiIOE+5i=ByS&B zk;hbV@1`=dwWLaG=yXk*dXj$)Wlf&wcTA(PP#ND&x*4VaoS=RHjPuS%bH;fGU}Yz2 z{&88ST|AqoAfM$dO8se}YSpUDxbmqeBJkgiG;k=fc-GBhVsrF7_G}}B)>47xp+m?_ z^O!u5s+C#YMLF9ZUn84NZjt0@n=U*g0Vkz;`R)Wm6WbX>#(12K7=K(vD~x{;j9NU= z&~NclbG1}wHd?;jm=nqZAK7Ic&!0pOcTa;Js~m?7^pm376GI~WI@6x!?*!~{rzZ7W z2B*i{*|$f;j=HfcoZO}#NXZpc)?AZSi6)YzK4=Uo%?I2lx z%J@<&w-%2A=G8!2Z9_21@7l!A zOjYB6HrT%zk}vc~Zo}AHUBNt@7uHEiQ-qC{;n)T{M_4 z;K-kNwC4G_3E2T_zh&8uyzW?`WY$V~4*w`fjPHe(2uEU>_i6D9N+NCrU#s+aUlI6vm{=B8s% zXAaxPt0*=tFkn*d96)Tgb7BoglPF=oO?iT*KOM*05og>rm0Gd30Me0WmN`%rxBN>+ zBX&koQop0P>%Jq~8(Y^v=8sY=@^;77{%*o;ZD4kT`avvg&y>7RPih6~6~}dJNE^FS z__fwhgp94kYK%}}*3_F^nrYnSr`4q$Ya?-kq~4!8g2`Wk*CZtKW}o_Gpymh)TU>kq zu_(X^nt-oHXfCJDW$;}DNi}LE%qh}}ol2c?87kMfdFzPk%a`WA+cRQqE|@~9g;Yu9 z0Rzip=gJJzQ|nTra?H%FvYUZAuSKGE?C74qB-58k?^Rn%dCfgGt@3NuJ79zYOj-9t zGLb#38wo*phA1GaO5fH zj;Dgu&Ya4_U9ailzK$e5>dmrLFUKG-kn7WF9*7N4Q)WR`Iq8=v8={qf8M%%H#y0sT zMCP9x{^Zt%SA`kP3@)gr#S7beosHE)*RZo%vMkSX1M^6$pLH2BD<^e#O{4osvGZ13 z){Rv-6X#P!j&D~_MvV?qTLTo=;Et-&is>e{Mj7ybOC^VSELwtUBA+?KpuS@(_nmIego+uGaxpp) zK?@x@iqbvme=%@zapb_x-o~4aBNe{RtON;S?-CU@$V!^)FBGfvTiXV zubSb&d%Znc;Gkm}?^T0*FJKwU34MYV%Lq9agW7jP~C4d{MUsd&za?cLd$l^CU# zoc2Vg07m%=`dX*NTBD_7W5(stl?|h53A%(Ba`uFPP-NENiKRyi>91A+d1lZ;%YS;z zA>T!PzqHmrMrgO#MImru>nQK)K)=e1Q8hmQVobGK`=}S$*Htb1>^_`DMJV<7-obhfe55RQ5hpcq>L$Q z2oOS$fRORK8#@qs`|Cc>y}!(pKVQCl!(Mw0d%bI~wUUI_xx=5k%@;T-<a(ESi8t+c#o8LP-q$<{j7FsQ)UPdj6$t zn|%m-Chrn6n1y|u_vq20h+jscc4_56lhdbploz;@Zg|jHYKxWr$Ug`(Pn%dYtK`zC zCL7Q@+~5yRTx}%sUQ%hjZb%<8p?zG)lg!lgl(Gf7A+|GhsT@@D^cxlH+BdFD-U)g8 zmx7Q2+CAXMV)VO_3Go`}7l$+YZ1o`S46QJbnEDxGM?u|Lp7E3~^m@(kWE@F1S9Msp zZ%&aB!h2<$YJwRO7y28_6S&HZ6na$FiNLC;s%26t=^1-1(Lvg&UV;pt8U2ujA7bel z^2DLdXb+)$U^|w_RXwu)kew@6h4-#bY2*L@1OIw6}#0Nkbl`slBhp?qT@Y z_?0kE@gAnAz<(vvdKi>)_?lk#HvO-+$W8p+MvE13@p(TR>Zlzd;3r;Wq*$pgEIjX# z(!#a3G)kh=&4ozCw}wJ!PGZ#}lB^^rbX3C#4hQvW&-sK>g3Z>T09nOo`Wmj+Obe{P zw82l4x>olPD#Wi!8eiw3l}LCQTQW62e2BjAJ?Y7 za1qbuWLFq3CJGhy%YuCWdeKjsk@3`r(c^P9W72xbyn-PdBDWl)APM*JFLF0$@|q9l zS{oNApA{&`Pj^5UAVE$gEm@gNygUIsJaTQ#fZ(~F-tLdOlBun+4QB>!5rgUob1-n$ z5S(5XRO_7zS~&;w4_SHrSN-$XqigWmMEV+3H~;ZZsOH;!3zG&`d&l+MuQ%~?k|VcW zwa)6hW#DINLv?FUesa1Yk>2t}FZ~ z#ryng7rJV8YvGPJ)hx3}R0K=LOV4x_PA99sD zwhEdqx_tPre9c{duo-BtyJx4^`qrnYMy3ZWFJJDeHV{5(YI(V^yKVAG$?jk_zy4yM zc5fNViZkcE=raek zL3995j8A-tbQoD0L>$Q1fCu6^m~i$XmCVIAjkwsYPaBUR-GYH^qj0=r2^SkK{%%=c z2~~GPot5v?_l|~G+aB{#rugA;SP}UKsKxthl2s7SSt$*Wtw5sphpS?V#K{lI+K^@Z zoUlS)7pXBY4$2(s(t@E(WF+H*9Y|Sg2sfkt{%(?Pqx9VdtRb{7 zdv=k47ahOtqOG@mtxL+pp$5#)7Sh)wM*yDeB-~np0rUi9SRA;hf!=k{a{nRX*df+)}bl1uZ;FoM;tsGR_Z4*zQkg5Hw|?0}H-aqN@4Cldk0REsDArxk=K{GfK* zI3Z^0@F0P zcOM+oB8%B7d;R?Uhq2#ou-y|sf-IzPPw3ID1Gr4RotvG_Wh{4ySXb=*Rn zfHzUh_C0EWw=JAjGS^Fd%zE9cuEPLa^0Mw@dpMMAcU1Ydvsd%G!zI)s| zVyeaK-m%L6PVU|%YOTk7f8imJmG>@-Y`v=HTNV5+M__&b!7sM#UFPEdNm`|WbJnN7 zeTyS*9@hQsVC`4;w5^@T*3W+$5pdSaQSI1y;FA=D`f=V4UDD0p@As*5|NW;$>1xMW zcaLsHs~=nLLzujKg?Cg~W1>H$f~iRL>Wm+}MW8yMRWD41QQ(T!%IsE*8k<^bT9_CZ zjycnU8p@UFZdC`m*fO0-Kg0FETsn<#ewF6^ z7w{-b(hwA|teA|B-o3|R(HjC4z29(n+oLLhr@irVMGh^?lpDuLm^!M}bjVKeVv|nK zR^)$J)Wf>ivRnaPJ`9SvPJU^t*YINLss^Cuc(0l|D1Lc=gw(yD62$A7K{avt?UX9q zgGE>>EqMAq!ptZIkrzWR)SLP$tdMbzdpkBy>&+TX)%C}oOs;3gg@!kSy;fLa<$7;6vjb>LrhCm+vk z+g%;^7b7eZJl2~|kT-U|7V-6y5sK2pKVHfnHg6P^m4+PgL6jKP`{O%X>6s+4sP)hfU)2ZNOuO7Y!RUFB zsS@jShSRL;u*X3^ZxY5nuraiaJ8A4q0n~7gU%tAfP;@>f1yOQmHk5(L*!WU`pt-#K zhi@k}GS0L7@w2UTEehruhqFI+a=-|E;@D=i<#203_X2}wW2h)bWrJEP=#zJkt51e9 zEPte^+m@FI=&?J>p0+3wbg~y;XgTa6e1bIuWId~+TqQ3apJ~J}3$t^VA7~UNl=s)` z!01KRt6d8zbb?Ie$!5kda|L??bO_&zDH>gDpU%qe26ZDO>p93hoIB#Yt1$Tc(Z5&E zJ9|#MZS@}A+IcR<{dAIeFw$xcPSb{!A6!L93NXk(YwF4TZQ@g5r|y}nn<@gsJ=trD zYIVU(Y@#olDVfyZ7kE3i1M`**+bY(?u>PeeLca`08+~SIVberxdqB@2I*~WN$n$Rx z=Nd8NmY((>u`sz~RVMS#y%u!D^kcbO2Py3;$_SK$l9!A37T_j`NNWXSU9q@ZryyKF zU5g}1d3UGVSulIjpTb>?EWzHGY!4e#1$>=NXT4E7Ntb2}n{$B%dnKDgdD{7&S7u%7 znWxJ5uo1V8f|zBkCwi-88Z}VbA`*@tA-Pq7GQ)$|MSY0lsgxig$yj5oE41=LqFO}i z-deZLmSuMxOk$U>8k}KjBAfR!bMbwdArUIu{$eni4qy8l7g3g9GukeDU%n^jP~et^ zK9S`q2;*j`RhUz)2$eEt17jh3CQ9aK-nl-uh%4?`ueZ$SK>L+lN(;0*ON+n^WgT#k za!IlGB8N`^Bsd8Q$27*fOLg*=+Qh-}H$v5;wuc=AGqU%h@C}--4WRMDr zpp7&Wnr&+Qkj*f2dsf*fXR$BsFOwSf;zO69sPtpJ%#bPzlJ?kM`N;3GYUk zMJ@Vj-59rbb%$>U@iS(PIUJJY`SSdm&IS1?P*M*uUf`@V9!KO8BF$bRGQ!cSDb_=n zReYSO@%qq`1cobi+n3XneCjK}p;IY{3>)<1fKz8YF_h~+>Et~Gv_prLWLA@0(Y~g& z8Y|k}t9{tYAZfI9lLWUd&Rv!-6z|Kd!wWwoXSWPq4cxVa2_2grhwAPtI4iukJ~^Dl zpV+}b=(D1ZN*}+Wm##Beu@N;%boJcHFtAVr^U13FM{+_N7xmM3Ik&+`&3wZH9knp5 z(Cgu3Yaz}S1`2|f6a@9gol6xPbZymFYa|0<_lyGs(U-xN51($JVjOPB6;3v1h*f zZ}l_cs8vEDiLb(-WU5Yo^oXy$yW8?!%YEVKa(ZRiwqdm!7njq>i3Gu|Md&=()i=!Y zYik5r=$zYIwc#Tg{8r1(i<*^d9s5rob8bjpVlQ(jS^UWv#KokQb})III=hCXVXRKv z{=Gh+D0xqdWj;9~A$)zN@{T<4&-EI$0IdUnNk~l%!T-=(`$1PxI_r5^h-xOyX$2!= z5)=GZ56i;}3GJIW`VNXYCg&1K*p$6C^A(hUfLN%xO9y^_Y&+4f1;^+zJy1a2LWu~# z4m6U9IloJ3u_=j0jv&sI)LwiwKy`C`Kg`P!HCu^`_sxuQ3Ykb4LQ*HfmiQ7-=(I>>tu#@78EplXUX?SWJMgN+1qa>X7x%wlfgMsLP{DJ~2oJ7jKJK zV*yiNE7(9sQTho`17h&O#4`IN*C@o%DK)d{e)4$vZgX3Rs7PG?$ie~=R)Ur>k@HDE zmr>=JgYyYX{AFk)s?t%@Mq1-Q9KX%y1uEMXFLbTebr~ziHFhi<|S zl-+T-Jbr!gl`H6H(~Fc+O30z#bD=orhR5D0FfT3{QxU(@?^EYluo1lU-xJs=bbQrl ziy#_%+DMP2>rh7&_-KtOI-prQ#8FES?xTtoX*DN3c1V6ssi2@%${<3_>ZOuw)c}N( zG?N2CEN;>HjG7BoJOP%6*Dp*FsaO@-3NJ|``l#qW4#`TZ8tDa*i`%R>Bzp0F+H63~ zijsemLhjnJPtngiK@awD5Xc@fB##x*%kh+}ICwBYtQ_X}L8Ceo7&kSaZLk8YAF^ta zKFD>fYH-+1P82vZTB1i+2s@*`3uMfW4kceuU~|<+3aY6d>i~uA!sY^8{b)Y%WhL2= zJTVq?N;VFm>@&Kx{D>IoZJ`5n6ME&QK9pdN+F}pf@tyCt<_5f@!v7N$HaAPC5OO9U XdB4qP&yv Date: Mon, 13 May 2019 12:58:17 -0700 Subject: [PATCH 519/724] fix indicators --- ...-blocked-list-windows-defender-advanced-threat-protection.md | 2 +- .../threat-protection/windows-defender-atp/manage-indicators.md | 2 +- 2 files changed, 2 insertions(+), 2 deletions(-) diff --git a/windows/security/threat-protection/windows-defender-atp/manage-automation-allowed-blocked-list-windows-defender-advanced-threat-protection.md b/windows/security/threat-protection/windows-defender-atp/manage-automation-allowed-blocked-list-windows-defender-advanced-threat-protection.md index 78b40b3a95..de4d01bd79 100644 --- a/windows/security/threat-protection/windows-defender-atp/manage-automation-allowed-blocked-list-windows-defender-advanced-threat-protection.md +++ b/windows/security/threat-protection/windows-defender-atp/manage-automation-allowed-blocked-list-windows-defender-advanced-threat-protection.md @@ -64,5 +64,5 @@ You can define the conditions for when entities are identified as malicious or s ## Related topics - [Manage automation file uploads](manage-automation-file-uploads-windows-defender-advanced-threat-protection.md) -- [Manage allowed/blocked lists](manage-allowed-blocked-list-windows-defender-advanced-threat-protection.md) +- [Manage indicators](manage-indicators.md) - [Manage automation folder exclusions](manage-automation-folder-exclusions-windows-defender-advanced-threat-protection.md) diff --git a/windows/security/threat-protection/windows-defender-atp/manage-indicators.md b/windows/security/threat-protection/windows-defender-atp/manage-indicators.md index 46f6939d8e..2a60cfdd55 100644 --- a/windows/security/threat-protection/windows-defender-atp/manage-indicators.md +++ b/windows/security/threat-protection/windows-defender-atp/manage-indicators.md @@ -38,7 +38,7 @@ On the top navigation you can: - Apply filters ## Create an indicator -1. In the navigation pane, select **Settings** > **Allowed/blocked list**. +1. In the navigation pane, select **Settings** > **Indicators**. 2. Select the tab of the type of entity you'd like to create an indicator for. You can choose any of the following entities: - File hash From a5ffadb47d59db4f386eea06b1baa83da95e1acf Mon Sep 17 00:00:00 2001 From: Greg Lindsay Date: Mon, 13 May 2019 13:12:33 -0700 Subject: [PATCH 520/724] draft3 --- .../windows-autopilot/images/wg03.png | Bin 89020 -> 88067 bytes .../windows-autopilot/images/wg04.png | Bin 158281 -> 137992 bytes .../windows-autopilot/images/wg05.png | Bin 264215 -> 133517 bytes .../windows-autopilot/white-glove.md | 45 +++++++++--------- 4 files changed, 22 insertions(+), 23 deletions(-) diff --git a/windows/deployment/windows-autopilot/images/wg03.png b/windows/deployment/windows-autopilot/images/wg03.png index f312437f55f7b4b49ede100cd069623b8585c816..89ac12747c8e62d6b5a3d0ca64d77586f42322d7 100644 GIT binary patch literal 88067 zcmagFc{r5u_y1p{M3%A@V<}1Yl$aPq*<-SgJzLhnSjJ8&J7X+zu#P!Yp$8O?t8|4pVv9(b)JuB>{C4rCI)VXGiS~)X=y$- zICF*;dgjd8SM=wBcediij)AAMJ_Z`9XDS9ji@=L>PAa-8XU<@f7>{k~fY%qjG|ha@ zoMFcO`#X#G{Nixt%-;g7$0|kv*2~!!KA5Og?KaFzwfOrm`=>SjE{l1v@PSrKP3>F) zJ^f2X{k@H z(n<5w!V?a}|N9Uz`2cCC|G$s)hyQ=CwIAoSp6psg<7U0UAZFlc|L5nMsTq*Yi(y;+ za{u1=@B15hFE_KvH??xa&CJ`vTFR`NOj=J5-OQ?=>wY!037!9+qk*S4oa@|RW>}qv z)h|Wud~YqiO{0QNutu>o_RQF;LB<~;2}Ulm+9fi)qQ>02DLIdv`XT33AZ87k zQj_vjxtS0{kLC^ah7~MnZkOblp|D#2NFKSI$>l#C=(K76!Qw&tPvcB%;+s|*mx2)^{J1W|aQD2!ba-$1X*!AO4q8IN-Lq!(#yd`7 zT%;08QjvuAoJL; zM7NZ_=_oVhN_ZDx;!C!l7}<-bFlIO&w-xC!2}9dj-iPQ3a!6(9_L>Ys&j#~Y56Rd+ zORK7DOr7YE4>pF8z>`s(raT_FGX5X85KRTkWeTGO?GH=ZR*a{L_d60-+%pNCE*+ug^c!1m9}Ep#n1HT~SQ$9C#FoluVcVmMNjI>ululWy zX?A0|-VUamP~`5O8Oan6hbwf%P(oUSnW(~fFIo4qZjxN*94U<7j z~!I$ujm6Bi}R!~Zf1j(5?c(s;ttPXqZSWL z!LL+#v@fTUU8VyftrX zr8Oz7eT7qy8QRd`Y7?QCEibfE)&`!M>q&F$O1KvBSi-7NrtFdL1<~50nzMoJXIQUm zF@qi?r`&2NKsjtb9IYXz4`xxkk74$7@@XHFOebkU#vtgITH)HH5%G$CS@Vm>M%m*Ruq*0_lvU(ES{m3XaDBF8_va{ z$H082Av?F8*y6StB32aWW{Z8lqW;VwI#WEnKjM^2Av)( z6d)*FLxs9opQnUTYtk;FzC**M?Rxne_p!By?BwrX=*J`blv;r)yDVP_XW}sCVbA_G$g1j~jaL zbt4?)meI%LohayM5nfhp>c&Na5d(^W^ySybkuy}#?jE4!$0zt;c3^thl*n~v;sXp;WoAPbG5%r z8ZT{xADM?r!W3#HVh5=ACET2*8oE*r%d^~i%ftL$88rs=7wAN+6L0AidCs)nb^h`3 z;m7Cw?}g&Iq}~!rO{4qsM}D^4415VM(0VDzBm@m|K(E*HHRPex79#p^_V8=nZTNUD1S z0*_?KQrAK=95XD{VS{ud@u&OmX>2)5q;x~={U`Ay&~fu{cQ?3!Ekpkxbp*ZPb6~i; zTf!)JT;K5fWtU;yjzy@FRd4oM$yZO?9Smt=&KtkG`<{_|W}=g#i8Cq+DmAQ2EL|L5 zCzdb5@|Vk%uo%ZD<7O7|M5R_L@p@=er4cNA83i}ag*s8*%mJslyhMQSAOhU&arRB@ z21pYpT-nTSxTq!0VAjMY6~TUFpOuOd{CHrNeFIfwFI-W2W7i^7^gDHhFwwPYISYga z90mgJ;P$8|yuS5lwP~|QIJZ0IvS9n_@Jl+zIMnJJiNHolK}O|s#WG?NRfq0g4lJ88 z20#UtH0EY`D>}A4*gbr~pkOp!F9(FO`)cahh+GjJv-Hv3Cr|gw%`|^oWy9}1bXBck z;jwZidihy=9IK}$p`~T`8MAWy@UpwE!y;OijK0c+hlS5p{-r~NWqIihtZ_C|UqMnz zpCpoW_lvbkW>jg5Uny^B86*G7n$Z-whU|7}o4asv0!+m|4HZROew7^^-!4;#Vu~OB zS!wx{hex=edRG=wP#0EOXX;n9EkX>2`4#V*aN)4Jq7{vXlEIia3T&*OJc?b2 zSA%oZ1V`~*C#_q0L^4&6vC{`r66NMzu_z^9e-!n4FE?N>ww7LaL;Fe2zLCxQo9w@e zo&BCUO>~SoUDP!EhB0@m zu(2y7H>F5RITI3k;Ap<)b$s>f>zxrpXb-{EMnZ1V>rud(mVYjpMdQxmd=|)$23xr+ z;tZNZK;kWBF*bgPM$4V+PAA+Ijh11hrs>9^_B>3(rM2-VB_!fui2_%p{v1_I?f6-p z0K_!dEXxSCT-WW$PnugQwTv0ojGWc04F%z&%oMv#Wp%~WD_Vc7gT;{xTcvvFjrxO6 zly0hl$50YJwRW7HLZ9BDWHXJiwxw8D^}1;22cn}W*k@CLm?DXT22u|8_;Om97%Osc+w)1CKZLGZ=`W|pt zzZFO#Z+@D|d~IMW^6Y3X4chz0)cTr|>A+7#diEwLasjwM%lTK2C>KdetN}4*B=V#P zuZMz)m;siWgfom8?vSmB_j7Bp<00f7ecG94AXlB`;ltO;@8AV=EszARj3`1u``Mk* zMtq<%i0AnyM&4R|fA>AK_v>2 zM3Z4$x#oC@&C$~n&JqfDh9dI<_X00z;!fnQv~7o}1=CnSanQJIwe5RU6e5viIyLHf znbf%hoU!i59XI@aAS`%F2Th}l%rO>lpcwX!0{2|40+An7o3!*XhzB24oEuPlhwi|c zf1y_}in>C4+M=t0tDgvQ&rEc(-Kp0aehb~P_(WzqAxx#HO_f*2N7LiR(CC$n%1(RDncJHe8-3~(Ec0Ct@&JiGj z;NnXDgiHuW*zM0fti?mlFN_*C?TZcm!i&A9hk0~!1hmDfQ6ZrnTtlbIhK|IM$SMaj z^^aGuLXnbH4~C10AjZ|yuafl#?l)h(x1p8QIOxt8H1r(1U8HL1uy6bf!ZQ!@}2FI3Zo0COm&QBv}}l zlMX3B=8`Wyok}h{*_*L3uk+wlvgd|o0#%4pR-B`PO)duR-5}u(s({Sd@kG`p@<&mz zrrl9yZ2n9=_467)ppE+VtG&UUmM{)VC2>db8MhU0L}!wk{V zE@R>yrn*(4x*x_GS4NsJ3ojewz`tz#lGsS#Z=&pDr(_^l%xQ=%)fCpolr%LOCFWSQ z^Ylx0B!Ps~9LFyb8{O)u?(!HCwXB68RyG}F;oqyYyPyh^Lz3Kjr`w}CS6G|M2b7MC zi?CFaHmV)zD!TQM`ujSxI-@*|Ehkgt? zaHJsIhkCc#yigrEy6IOHuyc5<0R5BY@HijrtrkG}&TOH!)m`{wHR&3LBq_GE*RCDc z>{odjN9&|_@X9ega!@_TZ`5q_ za0wlac~>PRmdtNs{@{0}eS5pY0E_osk4f-@+1G4yK%%&~*B`n!CCtPvLw^%3GnZGU zVm1?Y1RwXG37v1=8ek+1x+^~N*nGoCe$4AST4uJL>d-5BeuFP$U8UHt2=)ELgRS6m zaavBlzD9U=U32O_T5GfU+?w~{7Y5Il)+g0wXiCJ&9l|H~OB}0rsVF}T5I832RhZKbCn5lZS6%X485y-El&_Rm+L~l| zTR1}^2}R3f?=I|Ud6-+Nyh50JKx^>NiOxfq(+O~Ea4R1yac4G&>l(Pm$=YfVGl+4kC)`naSV(-?*k`N#=8#_EH5na)A^bkq`I z!raQ;ZEE*@U%#>KNyBovuC~+B*NL;GP%A?ZH~T3O3pcJK9ano`CpbWb!+O_qHu=Br#ixCb5`{%C*!zJWWr@Un?MO`!sA5 z8a8)dzo9#Ae*EWXKU@OegC;$pA2SL#8`v8&yc5YEPe144te$gT>y4Yz8_|sL+s4$E z>&63t%_DOc$=jXnjuCfGX1fOGzT>;P@0~dH*qE~bsqei&yzJ&aALCS?WRrOEYc87* z{hR>u#RtdhxcPQQsY~Y~BBd4di5SK_M%S+MVb8d5L|dpO@(z6x*YJDJugtu!47X;r zuLkw*94zEUBVuzAF2ln$-8#cG_4kuf#YgQ~!>J?1o63K;lsD_zP9)O56+Q|R?=Cee zzOgqQ>{*XF6IA=HxpOkY{7j|+uE9OTZrquYOKqupu zsRH96M|(36-#wn;M;41f+kQLPJ%a{u{W%klY&xT4{WDq`wTAO7eB#160d|?0+S=ln zvq?&a&I0+zpDZUVl2$NV`R97|Vs;q>pb9HBX_LOgy0!+!Es?c&_=&6~&W>lu(P5ByQ0!B7X4y>6g?|VzO!WNzg)L!39s;2O4=zAD-Kms_E0M` z{L6Apg9;26d^+R(sCosLAHnTNM9(d~MGo#lNkz+cq=2%HS!&(vSD;m2aq^=AB{x2On(E!)qw=5A;8O_}#2WVEBQZTe6xY&- zD(%%QSxP1}_0O-z3Lo6Cdm+x6E=vGr+9 zMe>VZ;(z@McSXVP{f*GVinsALr#D!0rq7Lr#Q)aUuYiEC=UUg**6pVxaq)bb+Z+{b}16;RLC( z&mBs;Z*B2s&Tsu3G2RSkRcilX81|j0%34IH^R{P4 zQMhL?izRtx2K=;<>Ai%mb>BqA&!WxnYY|i>cT`C2*IMeH zku zrQS1MX-WzlEx~(|=HD~ewQ~fnT;LD!0*jts#MoW{c|D}Jm;SD}H5<(zWp%suQ}bj@ zN6X*Sqemnln8lA*ZqU=g&xqtHx;P!z2shp95ayjo-2GhcqC?i_+8)Wy%H1AM#PQvD z6uts%zr2aI(UAekg^IhxM|wbH-+54($GIk|f8ILXVIhS@#xi81lZW*i`C;Jr)XRq| z%{{aR8sVxR{^)FqUqsL}bQ_Yea5*s6DQR{5;#0JC&c1oBBG$=P82T`4V*8A&tQF%> z3pq}#otbOiLA=BYl$)(M;or1^O#|i#Vdy8^!mV8%@%$xHaA1P~berU8!vwI0d;AQw z%nEegI}w;|7F2gTCMgUEIu-$2iAgM6(-2pd2n_1lyNts{!+O!HME>acA+r|i;v}ZA zI|K^q@)F#VN1gkiE0qclSRRUJEl*@8qg=+}yfTxjIGM?}5*!{lvKIju z_>{No6m4@$IhF=lpzCuD{7n2MfkJXSak{X`lr;moBl4_i9JQir)+`(1g5H~Z;nX~OPcn*ABMgfv{!_hhTP zSCGBKbT)fOh9q&1w;r_#BTrFNYrUGI#`bf`(S_035}IQsbQcW+%Ds8v$Uv16=CFW9_l)_S>Vz|VC&VWY_729q=ko5o>>u>tmf}4UXXbDCG85_% zkjtoA+s~UeU*_Z#Ek%EN@H@fiejoMy4XEi}AF$!R7DyE_9tf*3nsYH8MI;x@Ox?MY zTu_~RRq*82Kt{{joLJa35x3*w58K_&@07w_1k8(NydxsPbH)03>YrvJQiV|-8)AQD zN$!G9If2h%ut(YgcR&{@V?LE6kEX~hzFFQk;U`Nr22IG7^;Bhz2AC1^)jI;>T{FPA zlQkn!ka7DF^Ml8?bl>0f`TaeGmId+@rF> zqsJ*7Ewgc!&C!|(luO%JNhcRDUcV_hd+FHd#OLhYuL|T~r9E(J4{9?m*wco~mwP z?cF03!Fpq=$)ClqD2$bMvZFxxIy6~GCueukXRvuLHn_#4+5|teG=rXy~znKlnGLS~1X!bU6-L7{8Ry@on-iHFvwvoma?$inipFcXw+u7N-YBlUd!G_7UG=xc z(9u=B@O0cZ)pFb?=eq?)uWP_YaPX3qzj0g5bJWw z($Mq$huV!v2Y2TJ=a;tHrN2hpGmW;73pq#mo^WP0Bc(EI*d*FJ1mgE*JEz7VjPyLj z#Pnpy`g$NkuE=1wAua(z2(>EtKq%+{mY8}}VF>0iD)5dDT3`74h+&OmPd3Y9=bZro>kjp(|;5uUisx#=rU16m3TI8NtZ8KKykMVRyV7i6Sh-o)6<iOM^eu_qOojlKx|*mU29qwR^gvX_ec#ve zd&sUYg7&|F`p4|yW&zTSmw&WT9+?2!X`_mbp+{+p@jq|p{K|Ty;p>h#q`59^%K73%FOZbvh2|MVo4iN zC1%Gsv^QHy99h&}W{p04W>|Mgdl-qRH-(XOEDGb{TPg?kvSaKc zCQBT9MSd1-gyQMLa!Hgu9D%3M{|QKdbL>;XM%)+M@dI;2|$y zEx38E#0^K(x0EF|t`MR~^&%a>#@Y{$Ea{`GjinIl>%+UjRkE0JK!sVcvskJNT0(8< zywSgmH|_|FCt9DBRNHcnc2Vv8A)E$_#geTPjlWev6`^s{gp0@bDlfQ*)=6hu78WNQgA%ys;>Ugx`*Bf-1|1AKs-S(B;p~R!F>~Kk8iHyO=qoE z7WJ!}9Uhn06#LDwdKJNLVFH@V4>61#7jEx<@4j+#Ax83^14*Hhv) zpM}5ZYejFZeS5{vU^dg|tAhoknEBbI7eqo}ASxvF@~7My5EnAHJ=nzTfq7e9<=4~q z(%ut>_Z-Qe(er4t27y;-l=bzxu==NA)2=U%1qG9n@j>XSqvya5dP3}w2fCIK2T^(X z*70>7uE}sd{JrDN#R=&Amka8>9SKibAOWc30^_%7kga%Sz=AV3WB7S!oyXM6Tzh0=*4JNl(t~=mbFt_w7w`u0 zqOH?wbel>Uc(il%T*oUbj&2S{j~I@{>StrV*Dr%kZg>ho6@zy#xv01kTgWgj7yU3~ z7TBYEm7|GIs_ocY0EFCNmTr%ll0r_w{@80+z<9ccrNR$%t|=hh>5HcS9N@~AZzICj zTd&ITex8fn97g?VNRrV7MtM(047E5`Iwh|?)+eP|fhQt&kGF@Rv=Oh3suYv*vPz(H z?uf?CxL2vdQ-LoN=59a}OuIzvlX(ppCs3IFdfO0~BE@JXawxXuCR@dhz2`~IwR5h~ zyhwV-LaVbBHgX3Hf9p*}zXi^&3H*HmrT|10aW{I@G(`tccjimcH<+ts>p4ugn(TRa zJoHm5fem+w&N$}SqQJws#4f8RSyx-@;Z_>7WXcoCWZKqZ&cpL|$Sjzb z<)ABtYLsMy+xpf8EOb)gCoCuTbDX_@#d`X{p?$i{)HW%ve@n_*Oj!B8SjS(DBdxoEKPT3sk^T+A zuKW8PuOn^x{sg+s9nAL8zKamJ9~|7e-L0v&&uwGE*Ugrz9erto?(5lW<3}#)nby~8 zAS6c+_~dU=i-%@`;M%_dt*4};__Z57ti{Po_hkTSLa3o zwS~9rN=-J=hlX`7#)%nqMjdwi?-E=z3>eQHy=$Ab6BjJ_x4{~+{}7QTXhU> z9J4vC8$aVR<)%$9wul#mjZ}S|kAJ>z_PYAa^U6Et0|sAP(NA9Dn|88G0eZq?kksG{bO7JbI-)s@4HN4hNV_83`%PN*kkM`cC2*q8O;a%c5~6|{ zS9|qmT}X4<-f%OY?IwPUTh0U2eNp4-_=9-{mvNvA#ihtkJi?s`BQM@$@Vzo$a(WeG z-IGC6m9Mc+lopftL6@<>ibY_bk z3jhXbN>`f4K5bFmG7Rs%h2l9f{x_~_W~Wag^>k@<)*%^|q!JT<^O8jELLsOhGV<856%7pVduj-r82&9Lak;cX6}YYtg%*0)O)$T$d5~7TFYNMVDy z*yepr8X$YK@cjC%cwLbuCRsWEwbi{%wfz{{CTmbqb-X`SONoJ6X!|u)xSO}VJwx!> zvZzXHy|TgF#VXaNjZ@D2C}jR>dSV`OB(3U7F2x(<`RaD@Q)Txrf_|TDSm{an8oV66 zYW0d(eByuy1OKoO*&awt)-x|8PzF3Bsq{C@s=TUbYtcOTy?--bcCug%Lxo^4=9%#gc*IF!B9vuho zayP}(Iu6SiK5YsK^TUU^xlN5q@+rp|S?+L+wUsPz?;+ehr$pM+L@!yDKoCt`fclK4 zqE3J>t39!60fcFyQx>6Al8(n?s$s&+mNK{LiM0=2ZhiP{n)`2oQFs_qKnRpXk`~kn z0nyl9L9IK^QD#z@en1!*Sy<5 zwjXBl9k{!Ihw2C`X>&H$DuO~QjvI~NdRFu6<$#0sHueuT*Rn2fHA@lx7&cJf#8$Z< zFqplId{ohDzEhBpRSVM#0r!=9?Ops#$Uo}1vZjQ|oHzC6tQXIR!=B{)kbVIR*;F}; z^xYTYCwEk^Yyz!BpYrKOQswZsml;XyAVkOI*(G0bGUgR4hSaHd_VMepy&jAXF2{6#GUC{HO4sbcaq*oN z)wfrJgN&pc*_M`Hbx`f=4!0J`7h)&eOAfniO+4Y{3dT0^>3aH>5Q2q5Y5Yn<7t3Zk zNtNPO?^kLwWs=c1J@J&2sm>$b2vQ1w7(IUd~}%?}op3)nTC&E)I2VD~B)J-ZUJm%eTrHzfcKk+dA{?jAN)T<94# zvyS-c_)IRr|IN$4jTmpEjKxooW+@J2Pu0Hvt`$h>;ZG;3=)vG?sriG;eUHrl22=Le z5%eg=(eM?<15=X)7n~kvebtwhwe1=C;+mNlk`xb)Xr_Nl}8sNlX8;#rvD_S5}lT$&v1r zN32q=X8XHKV{5@{w9=B`-(BdXke6B6*QaJ*fV?gxTG4YRfSRfln28(uv>p(pXAckm zjK7PxQ^}Uc7+fK~-Sg@Wid{7`;6m)3UKOR}2kx-1dC_xTA&EQ@EZTokz!KqFU;Epm zuY>Kr*o;5I2WvJ8zRJZ?Zc)0(K9uG5%QjlH4#_-e-j(qkc;PScLOvs}toX|>G$Cu) z{30%GUT}6n0}?^q7x#|q63dGhHg7@OWAFn4O&;cYo6k*?Wu4@@u@@dEDBaAVYSZ?r zwml8&AB-}TjFD3CG1ueCp>a7Q1Z90p&#C|odG^>pM*zApSL9J~SgRPrHD8Uygi2b0 zD#9v66oLyp&v+=zQcM+=OaU2I@3L||1yH1i{&*LByPrX_CbUTJ^gHs{7|K^POj>d@ z9CHgZkI|(7+#)8lwKDaO7uUi<$$XW3t#QXJCXrW%+rt(I@RC-oG6o)i>iZQN4yrgc z3J?_^#oKZ=wA+)2l32oKh6AYcG`%TbezNm`z`Haei^YVw8IDrAZ|Dgli`U-y7|lLRJAvq>j=(DunHu7uG8qtF$~c0(%@_fa_`C27Wj0I+WoQJIodTwrBE^CH}kRO;5-C zFIyV-@?G|{3{H9m=YIr8_et_bMYZj0FPPBMo_bLpHtaWG?mFrBC|M1t^5(Z+rA_{v zo|DahRPmKAn~Tk6<6KG*Y+q4TM8)&)zDnEQpvkEx-u2qR%f9FQQ4{lMf?LWOPy;#y znRs%y-9w$_HY0y{6TE54(oI%X@&34`4|a{_Yt=od8xL=}f-ESXzCO6~}}7$0J+hZYD54R9Pjj%nD7N$2_utdCBYbc4ALS-+yl8*Nrs8~gA0n3K_g!-&zDD6??M z(6aay;5@)C&JPig5C9S>Q+}hqd>*0Du}bcWoq$ah3PZ06+zDyV8jPV;`uuf6euwMV zk$kP7q)Yyg>M7=j6}zrV1;#h%RFkvu_dxR9ChR3~fbtS|%=_YpZ2Nlsyu8qKj<+@UQCz2Pa=1AVgej?JK$7<_b*J@&t=;%Ncfem}9Xg04?(^ z0Yl~@a;I!bJiO+_V3u?AmIuFDh3|-`ALn~(Pz9W!%mQa$x3j>bQPRhujI!Su9f-m= z0-LeAAl3|0lo@~l%wh(p_8qpx;07}O5MUYUX0z--1?{!v^kay0sWqcx7+QXZf*M9q zz9;}`&jc-RF%51_Ed3~sO_2TG^)0HjR=E#s zAu2fnk9Tbge`py9Kc0Tjp1t%f+8Sr%iQBT0_%ZGkZ#hf-UGk%n-GHSPT+t}@DAd>! z$AP#;xlkX~=~0WZ73n}wz$Q*RvQMUVU2$jUv3@_r41_u#~4I+$VYlGa18i|sTU{7LK)LhrAo-9`yM=QJc4@o36h&Ds8gQQ`sefRo{j1esiCTEPEDUH3jZlzxeIu$E~pwq?^b^DC*6d6$uaV+ce_4 zEfOd?I}_*)#u~vk)8(;FGl5lX#j3(M;-GPavdyF=!rRK;3dm&RUABk@vM(77)HIEg zHwCR{6t>@6OMVG$jSh1;rlN2Szk}9E0p`EK->H;Rnl?auY;X;pud0QoRAEec_ynWJ!PnAL}*#=aZjJUP9>j$BJV ziv}?(?ECk_nV{EEX$(MmB7%$M^Wxzna0;ou;UfaDP`Dia@f`d+LMOUztydlvu!wk*lKwEjb0&w zOHRv+B7&M+R^XfSw7sTyYq3TWh*x%b&6kS0Z|^~&))8r+;V1lvVgItm{I5O|nFa4P{XpX{pP#+B8DU7I)h-cK46;^X`%VA0{~QyylzIL+v-`*RgmG$sZU0!j`hc zTGc?$r_A{QUI@4-KajOR6IE6nXs!@RDAsi^3JWGwb;x1{y0pe&z)FIY>59S`dGM+@ zcX)CZ)khcaOV+7@_$_=nWkFw1ZY50O!1`QyvtKN;&7A?PmlidkT*>G%Rh#Ns z_DDWk^+3CTp5tMj5T;XcCg|MJQcRP+8{R`{Lf18 z2Qh?UV2Lj1t&Y>>CGT+&_sqibAf|W#?T)g@CwF2GhD_QBVlhrQ!^Jrq(w(#`pk`j>Pmzm@dF@?Tyo1>HL7nE$(<-nt^y`eW<>BP zFDbu5db6_*VISTb<>rn)VT&%d#*LJRmHxZrt40t;x3pfKZ1@s*QWaiSj#4f)Y-yx~ z814dds1dlW-+?=PihWdX3IXBqK#KrrdZ=`U8t+33Zvyj@3Z?BVO5;D-ViFU1NFBCu zKx!sfkcj0-WJsrd_|q37Ntbjy^`>1A=3Kj=l}dS%H1lIX6hJ#L)@VJ{h$p?J~RZoJBN6YaNL z?7$vuKK8_Uk@g$N5#XFgL&w^n+Wriv=nC0adUKpu^`icJvHYBlRDofrrDp{u)RM2X z`YA9WNxZ7;0QwXU2Nw8N1N=DMDkL#Qv^27-&ncr6pOQyqi(^rM1> zBKvH}1JHwybBhrd_>$wLT45CcWclzTzz1H|Gy)uS?UL+|ON zRW7Tdk&s)ZAKu#nP~kIj63h)l1}!b3Wi!7YnNc&INq%mS z+Og8c_+fyh0`~1i)H3X2l@-_0ix z)WdA5EZh>Un~HAp{^uci1c+4aO?u0B5JsO2i}bwLTK0PX!JOF&{>(3)i2#h|x3%lc zeU2A4BO|~PrDBpE3F)C)!#z%1(epY|HdkYYs~XAVF3oYzC-Mvc6xPZ#+-wIpkOr*n zI}XXq_2yZ`Y$?cm(#DTRERm%Xor~j@U`tA2yTNIQ=6I*Pu2ezY>D6LzNs?c~v!#-a z&4O#uW-T{>Cj0;}m6cS_BHB9t!DS*uUowKdsoVzry;FAbhN-1miL#x)ByU)}B~sch zxHQR6NTp(1=E*-FkTltAr*z;@!T>80Tx#fFp#%(6@_jk;v!rxO>&Dp0^_}B|+i^zb zAHR1Go0hivrav%wo}FSXE)PPjedV|Q?HS$qaP7aYPJNTx_cqhbfBe@V`tLn_65T(q z$fZj`|HmLI$o~QI02=^!p)CKQS&W?G|2=kgU*GQZ_@JP@IdDrm!RR&w(HQujw}ZvFOdf&u2th1esc|6u|%#=DaNjMnc3;O*A7-_TtGlpubLPvV!d$D`iFvI+Noe|Jxger%vjbLHZovi0^37>Q>0)Ae>_%&)c{dHhqIL@yN| zU7w4UJ^hoHly8a#22+I|@5vqi`xA8LlNnTUy1k|v{cQC^zn;DDx=qtECqExtNjzQ0 zvCP+wS*LZzb7i=hT^9sU2^1*cS40&6n)VeJ<(QA~*DL{ev(&-|AJm7C%^m=wu7Ac~ zgn97LOaPxP@0VJRozTWk2Q5AP_-AkP)>9sx9O8V_TI*51(_l`-L&d{Cc|&;`N$o#U z~Rklo^sqM4aaVZZycgrQ0Y4w)ov z!S8b4AMLi@*1OGkfcU#%Ke9Yt?St~~eI?PpaFQE9j`jN9)Ev19n0!tD<)%Br877&3 z0|5Jg99+g};KPq3lS*N}tqUvP-pGDN$Fr?+Dd-vf81C9o)NM?^ZaRVWEUQ$HSztmg z|199VCX}L;b}O9+QK5=r(X2o-Fw5}Ci9!Kx0BdM(92T&lY!?8 zE>rz(Ea@mXubtB!6D<)>1>6zJ;xAzz3*5!HZ!6rEqEWM+3+xps>IP7gD~Gf+>-&_X za5N}A?SgfldSbrERO6?9_{_O&PciZ2SwaQ;#&y$R}v$!F? z+B!L~IhEtvbsU^}3DHBEN}D4^Q2xaqpB@d+G0y*9dtCf97qE8(q(KDm3D*SoX2SoT zcVXdIIu35EV*Sm@DJc~A<8C2#CM+0mc7}a=-p4Vq@{jGuYZCr;@p!(zm~#OPF9`~( zv~!XdO27jwT4blX%WMAUni+wZ{Pq)nJg@)jgEF_V3fmmJ3<&4%T9Rj*;&&l>`)sH4 zfp6Tdkt{s-jxL*H`}mA6U{O0iRQ@u@i7^z{REt@sor2d*arUw@K92Tw zQIWf?qCs=1&odHla zK%+^fy*lYW&AF2N_WF;|Kv}QDD||kr7yJ38{29gex(658c{>~~1`c^A`&U>A@p*{H5JT;5jDwn>>9I=2HiA`(dP<%=mx3~Nqv=Fi2jTyPc}VX;%_@0LdO*9n#+cZ5%27hgFb3#fF`&5 z_=1-&-@28>?1JAA83y=WqngqyjP^fv*%nixUfyx933U%EiJuBmt1N0wm&kQ)-N?Ld zwJodrxUc=qX0dY^_Jinml}XRzs<`A`pFu^gF0MJ#q&HW9#J9%e!*yj(Isc8?gEpg5 zR+N>fjjuV&P_6xyPt1rDR6k0b@?g+#G<1A=o!>&QoGXk+ z$|h7M5muQ($}o4k&y zWO)4n0<*+Z9(V3C{d(8g)KtR}#xaSo5!lYH#d)p->^{7iDRsHsSuTv83=VWHa}AM5 zi<58@|FawracJYt`sG~>kkp$5V zLG(6^-b+jvAxbcMNFsWK5Te)U2}TP>jXJs@-*!Lu^L+1dyzl(Q%r<*(d++O7*IK{x zT+TAk^)J6G1un#XkSb|-?TJcvVfZ|lzLS9kg-t98KdqC(m#=#%0!t%m5=5mB@S?dE zy9TFV7=4)-6kB9P$v_-c$~vJp)z6Hh`$}%(d&H*{D_PgihILjA(NFRR41a%g`~jNX(jqZs#k~~oz^{=V z(3Ia7V3%&=x_2I76-`K?+Uz^=)@^{a9_PF!!qzl`Kq{KQL9KT=kuwBRpHL@@9TxM-vnA@hYf}nH{fZ@Y(dZrwh*r&BC zt-oFnCV7TYC|#eetY$%zNk(HK(1USZ5eom6JcTvCnlsZdVt_Nn7bpFFBCub;EK3>3@eLMg*U3*YYZEmZYi90Ryx+)uWh; z2In!=%BHouEGGhUfdrwEuoV@< z{6joFAl6n@Fwfnp>d--zbE+~)OxgBUMxF?)-Xm97Vje7Hdu=rFS+IcENv|fM;gtN4 zXLYo=QgD=U5aH7NTOHoCI4uNbbHHNy+dn3$3=A-+X}-ZDBqt92zWg$tnG9A*d`c*F zD_EgbE0kB>yOGVAjW$eH!;pEam@Ir(NYSTjIUPv;Tkh(kAMH(9s>(8245=KwUdZ9E zr}n+IgweNo&kG;7Iei>RY5dl*4Qn!z1t}~J&th}N+bT-Z?_f|m!ntw{=nJGPbYiu0 zGcy+V>>bSUY-Q{LpE4e6l&OYo$32&qkYcpKXa|q)PUfc^B6&__{39yfBk2#aM_lB4 z$X&+h(N37osJr6O*dqp>5SYl^IRiH1m|2}* z3)Tt(;@aRq1{0|@#*VYt9K~oOWmPIPuR4mCD2aLNJ6;0l{YF)0J!sXoFaq^u4Ar<( zg`rA#bKjLvI`mKT;+615Uz)d0=y`V@5z9*MDM)*Q)N##9iLR8H#_mAba(o(y3sh$x z(y`Xp4<}HU1V>4Ic#Ede8*G!L=Qh_l}fSjOoV(EuEcM(IwyU zP_55uzD2!=CAk-i#r}H6yi^v-D6NC4F7-GffksIln_8i>4$48{SinRDK4zcP-~d*; z(n{)%iUVU_CKHhQKZ_hzOO$)MEDp$VjI8Nmr#S^RWGj2FbeqcAR^GH085 zj-M^qF7-gPngpqp_tP3~lU`HaRckxng=Ti9X|T=*&sO6a~AHT;)GLBC~8H zXW)p|!dwX6M`dI}nd)qHBM&89`O$XK`OfD>N=J5^i`44^OQh^Y-U+auhQvX$RTMX9 z8E==3?rmfCshKO1UWt1&{sQX$0#fLNvReSVqm_5~q#r~bbT--}Mr|fzy}QlIt`S7L zVgs6%7g~eg1Ix$}hFjg!rJhZv|2Yx1fVx)w9cqRy1PQg|9k7 z3{dp}b0fr#>*w8;omT@8ZMH%l(5}RqB04fSvE_(JZA)X(*x(|%q115aQiE-Y2XV>h znXb9+venrL&J`Db>ny_6dqkqdymgqcuJzn>tTd#=vX3T>Fghg`4?m(CuT50~ypBgh znnp}R9jjMr^~AQiPV^U!6|=Jpp_DWOMYc{=h02wSJU3iUz>x+|exOfeD(4kM%w?<% zh=NVcZcSutWQAm1ZhC&h?{?5BRh|=m1C{FDFl~mn!=)e>w$+ zJ$)?10sd021oD0C>A?GjmCU4EozX$m1Y>4=qb@W#WxV#zS60JIh^D z;eC-~!XS+hSi2olF}Ss#(~QuWfSkw!)$M?=|ig!?ORcQJ`VzTh2P zaKwXyilo@*!^m?j%#B@I z@Y_29|ALAk3QT*bL9^(o_uqXr+*4Ar&`@qs)`VUOko>aP6RPpDzv&g5DLivz>1j<7 zf7tB8Ca;y9r7uz&o)ICgO9bl$rpS^uEMTL9w@6g%h!@WE}aaH>+tQtK-D`rnMUo=bv%#~X_ii%V0*#O z94@wUd61$9uLlQ!3=Z7I3{pc_o$DP$c$kM(!$`xe>pIu7G<+W#Y%bf@tPxXKO!C?)}$=AT|*ob zv{6Z!Kh6W9#oCwY&|5?NWEOgimDk8vA8bFBAX)`NS0Y@H%1V3m*WE1kORCNq<(HbX zugb1F68Ec3u@9IwJ?J~4Gv|H%m{0MTsbg%*M-|iMuhmiBU4Pp zFdwK8LnHh0S&WoGUTDj!t{?FNzPFq22nHQZ1<;A7>jOKlJ_gKM{O8CJWaun`ohXz# z*Qw;r`y|@RxjOziwP|r~@U~z_U*^T3tAL%(v{nw*>80SLyC~8_OU>d zaH$aZ_5M#(h^6^5t{%lRVsp2obtf9X%-6Qx~;w65b=T$}ZB8o=#;D zUM;HLcnYpV;_O1#Zfm7*84B`lc%o(!zDIk%C)39kpkp5|s-P}kZ6IdqpGL-3KQ+akxFPIfN4kPM$IiatwV;_lfZv-pn_^|PMuPZ)tD;FIZt)x=M zIM}1RdtrA}4S=B(@%HIEg z-%LTydYKc=@S3)9%te%&|E`xWHIK4|Sbuev1BcFxnW&vOA9Lu@m|c5)P3V({NJX+c z39oM7qq}n>6gETd??)>ieB(kSMvKxt(EIsLQkqsO4zkK2&yPr~Uzlkf)$i`;Gf^|qMB>NJyy*R5Ds?=cV7C0Sr&`VN&< z*bN1rJ~FGWJuFGGM5mob@q#+KUVE;SC^VaY$@(@D{P04J;&@fy2%C;<&np77?Zw zsNken{8LHyj!*+;wFSjA4vxCxtg^gba9v4tBrp5S{ zzTDs$=$lh-9V<9cZ_YJrkcjCL>kaq+@rzE@9yaLh64nKhSEkN8T|iM{n$ z@O{MwO}P?X#;iKCZ?~1`;r8v7D^qX3*Ja2~CyUYUs_UY7rH?y4s)iv&#!K?HTN1r& zl$jZP?`njgANF$k0|A{Y+QNS_GC2K&J2x2BP_TWg@Z-CH7m%@Qgl}j=stDX!wj6X? zND8OU6nFjmkg|sqniWiMtmMi|9KWzfyraxCR@LaD6nee%*_YHe?J5#+9Z_&_nGo9) z8T_Chbi76c*$w_QC6@GZ*sh+&W0!FYNI9P$APQLmQDT`KIw%Gc2OXBT47!sv49x}E$F?h!wW>bDCvRf_oT0QVqjq_+c z5lDmEl=XzTB*NxVleh*WXUKAvIsqm-B+wcAn;tjS(OZj2R8}Ix%xGVW z6NzmWsRbHg3rT1Px_7DDJSO5Mvx!(&GKoSv<0v`gV z--mkuvYMW?B|SF9WM7dsD&MB*b<0xO-fKur-%s^dq)B+JzXSsV8GdJ}B!ChN*cij> zS;**E=MeX`WRi5zD)i|aW|v}ybrBuO4ZX=W=PtTi1M)!#i!Z2dxYb-wxnsf zOS`7ia}R0}9_iGgYGCFp*4mfS&FWpPKK;GGQZAm#z;eKKk4B)xu=ydOfZ!+}+xe&l zI)lGN)7#h6NOCsDzIHr~={y+on zUAGdQ?;|#>mE#0H?s(}{x{J^qk7Y(m9T&0I7hh|sf87iiFE(^G*`?Xl-s){Ef#`5I z{;lEE?-2|AF0#BwTdSnU@So>1pdo z($m|U4>i74!70V6RQnhPC!-a)Sw0#<;>VI9(TT+|cW!q>9)wHuBBkX`()0cA9TKg) zKD$(ImrzfXJEhnuRC?I>h@39~i{FPJA|WHXiml_I;pJAi`yv)c`nGh)fQLymY(kw& znn7C5ajaowpsSZ+C_^&oG51S0v<(-|IluY1kRRRFSvDj)ck-nui9j}o2mg0{0#;l= z_XC+b)HY|Co#6C65>kbmTY9yzcR7xAcBYGN2PR;Dtxbiq-VyW)l!10uMF@KNKXh7( zN+yyzxXDz>UEqwDl5x}eon)%SC@%O&fimC`gHOICkZCXp3)`0VT+Y zRVPF!gi&d6QFav$L5_Zm%#}AkJln*Z4=r|+<9?J?*4Reu60yDoGxlhJHAj~F}=3R?&k zZ@-!@-2SZ{1AdUUeopOg4yJbfrh3I8E(8u;p4hoc{onewkE4o5_jh!xGa`Tsfun6v z)7TZ~-4TU=t+g)Mp$xU6VLuy6ZL&D+?W~Iw0vGIbvmb3hEyC8k##NkcU{Q}64H-S( zK{lAsi8UI3Hgg{^8EN{}^CX#VpBYDA7lF!^R6~hV)~Uuz^w4DpXwSXXLJ{}o8rROO zhlOkj#ivwPx(ockW2m2lb(V2_W>dY;ZbKCjaahRdVZWz;wS(ubsAtFEtU0m8az5c^kq$7I-?|U7n)3YhE%_p*>-TYhT zSJ*0}at`hqJ{SF5Qpuo15?0l+x^TCi#X~ZD%Rkv-8dhe~zow2~lAcVGsg|f(ObmCaB@~Bx z%%a4VS;3PCtC-rAl=Xm2>}#N?e2cMm+K%W&yM=X3iOi^s}i ziL45%_OBc`9H@Ju9)`~+OibS~!s6ROmsbjP+pq>Cju=xYU5{Q!%z^E40zK&03jpMQQrIdR(Zd6GzoC31S=#Kn1c-$Kw_?NVSsgbl?qKKOc#T zihuJ13?YXBDfN8;L6`A(J}}#EVWUC1z)vuc|Dqf7dq?K+G3jTdK=r0AUSh$^QCABf zLLMk$CkK3(yuDo&y9__k!0oG6A8G#(Go2rERpdYW=$@)ywho!R2v%Kg#N_jvZa-1cR77V04qiqohF@1|mkl?mDUuG= z^ZChEZIkVWlM0ij(~&6mJu^wAk8I}=)2uAMN#E(0heHv_ zl`d9r;bZze5Utz0@LWYXAzw>VKPd{@mzr;$U_a%M1_?#`TYyI_S7K$n6{tSO>r{%{ z)08C%m2h1f3uJyI-F+nE`1!mjX_m86esj8Y)X&>B2bYN`al%;so^X!4e8;lavWrZC zK0ER}MlzAUth5N;9ffLo>zS_mZWS);Dg0hHAIUUPWAU8iqMKl||Yd!WUm~ z8ehKuzMOL^Er}55tuTx6+-(&B(n3RZ^TSogmmN7|F>01N9Or!#Alk5Z>)p28o8zQy zqFV>lwBym+J!yFUzlfh|lN9UDkSHy8X+Gw!RgO51%?$R`rCP%Y%TBQi=#+ZBkFd{t z!D9M7Q~m93y*sI08A4q!i8!;Cwuf9P%BRcS7m+`}fh6l;E+ewEl!|}Ei^UJD_83;b z?uj6L&)cP~lA}_@F36nyE3*IKo)#(DI+nfovUWfuSI?RBa^o!dMMQql*AdD8=>_3oXl|<$`3UW?K(wAA zUd6Z@TxR_b%t+FmNlfGEr33L83jg=TMg3p!MP`dGJfgk(-&g7KKbxiiYMBt_=(eP# zfA)H_zA`&q>QuaRphxDIa4g!YU;S~98 zdH=PS_rgS_@x*iDMKApKojxMKj{CnDQKvC(IwQOmG4$V0y=21N0Q#sa>E!?4<^Zam zom%#JF>Ln#*s31bs{Z(=#s3ZffRyMQHBf*MFZ}-mm;QP0d?Z}%zogL3cEFka@9T^4 zy#OTae}BRi0UU2%G62s_?51|A0!#52Ku%w`MM&@&A0R9;F>VqHvnt36j^N zls_{1&-rlSj|{(m{9$16`s6c4;-r`S=1ieUcxj>Yy22SF7pG|l`6(GSPz~9CcFzm$ zaU2;gj3&~FzQ}aMnM`^9K zos{x@i+`_AF%qY}#Q)g~F2)4_4PL3_A7{$eJ?lfbnEdA)({D?Z8B)j_0Vesgbp9bD z00zA@U33eMe*WPjrVb|`@btJjc_=3ie3^K$vU%sJ2PV-eNT-eO#%12i&G_GcPcKMQ zo!t;KnECgiT@LBLhx+fOy!1+!hA+dz=KZJo)#6KSNW5i8P9%ZRJe#{4&5-jn0V!KSQ z0R_1r8NF~i;6ZK_cG|qiwKH&+HV!hjA*ou~Q^qQSEKBfhca>6!yuyMyzMRP1&0-&DRdZv60pN{*tvUbcZO zV@_;_IlV!s;ucGop4N;Eb26Ih25s_QncPSr$qr%V03s{hqq}xs9)EofdPKFKvj>sZm;A(xC15DGf2fb{A0JLTD zAcp-B*H!%rKo+oUH3PYEQ|F=$uSb3W7}2r&9i@PYqnpzG8y4D$hZk~b=h?K3jl*it zNjd!-a+tG>XguntD|ff}{OaO(OFL=pJ7&k))6GW}PsKHDRom+9QSd;Iv6Ssx%fxT} zri~6VT6*Vh9n={Q0$HJXI~e^Ptn1x{u~; zBLDgh@g!hAT>{w7+tqP6nm*wLVq^HUNAr#Yfc$~=NpERKS(Z~Y-(SxQKmoo>+|zSj zofOy)Hdi_ZGE4a8HTJPBfCC%tD~R#u@V|c+v1>V=aXurtvL@DnOR+|uflF+F{^ZI- z#2WaE(Ep{%T>!KBieQxBE;;yV;pu)tzXJUGX#g51P^Mb6MUhh)PjQC{_CnHafxfOo z-t`qQX93DJ+N~cd`LARI2lMD)<+|MpUA!85M31=;nE|AuQSoSb}{U5PDj$ubJ zu6Ij51_^!G+Uc-d@g<0Hv0T<4ajR$cep0(0Z7MT%Wi-t&gT7W3( zcI;N1ucv3_eu=oS+;Z$tG$50$NLS-b0;k>H~TWAvZ+b^I%n^R-^+~`Ge zMckjx^X{PQDWR`g>RF%uEef1e?=12u9RTije#OQV0bKZUQziZj&XAlp%8wbal5W%0 z9goz39veMHEAEoSm}LM;;3pR%E(81}mqEVWy(iUW)Hw2wVq7{^Ase=H=&=~P_~a0% z&+YhL2cBWWfHbc(B6qx)8+uSJ%7YUHRmQzJ50c_!Ckw;;F=atvKC|;%O^^ZsS)#SwPd=P14 z80Wd3aYFIsA6=OR9fv4z8XFEI*r}=AZ9u$PBij4QR5_yb2cgHTB$XbiB&s)K9lBbI z1+KVQ4SDM! zR{ghRB)COfe;6N=X}x>SPigI|L1Bt> z6ShyC`b`WVL#6Wv8xx1FQ>4%YE4`lC=DijnL&%BqMiR+PAlOrRW^ouDB?k*Xel41@ zktS`uC!7LJ&?H7l_IE{H3D8C$G8d_M z?>B(9Wk8cn7+KP$uf|d5=)ViGSn}A?nlOfo?f?1#n|6)tk$|VW-p`m=& z=~>b{E7%NI{j6O)3mrP|Xa>w_H9m3jVsO*z5w~cit}aS(^RTAgZR|4m1R`U0N44Sx zZ45z$j3=76j5zG(M%gU)yJEXY#=rc~_gP~si;v}#vSJMr6*MrfpL*X9@z1afY(MwG zP{-@W&w5a_VL!KSYBV(t$NHFm)h)G)z7T)jCF(NO@F_QFpx>wc{L^X)jUjPTXx}J& z9mOd<9~eE^KQ6PjQQXmNfn;g+a^#5!`tcRB>?QbnKtLGe0&4{>;mXm3>UGI{;nhdG z)OieA!{=wVQ_PC>)O{C0iQ1!u;M2TcO42z>@15WedA7b8;2pe?YLZINYgrgdU~Zs_ zKfO-t9$YJNt!(B0;7I{rEu|M1pAkq3e=}KOtbkeM7x)_mx52;tMFkGn$q!7Np4d%11~ikic~v__SAu^2j)r+#H+6mOws zJ~Jk}Qg2cxd&TVHW&X8V%MQ`ye`{I|YcRMx@$CNld>&0Ue+PE`^mnimNXzjW%p66b z`j;(uXe@Hy*pS%%<<^WZrvMFfwVX2rX@UOq8t&`liB#P1Gwn6fNKk4v>17LWV~@mm z&wl*em&n7+w$&c!3coszg$9K4K(D-IB!;pOe6O&BQ1{+>8g%>{zPj5Ags zKwAZ^#k>I0ydwc&+v}XS_v3Cnchf>*t2&TnKyA7oFxOvwDZN0v3App!(&_;8NVk)> z4;H9^sbHElDU4LdGU3*PVwZ`x;sB~_8&3ri$4M-(H+ieaC&!T>)U0yD-1M0c;A(cN z-O)M)+#54KxlYmD*ZO;Xg{NX)Q13FqjZ~x^FQn{}2PkPZ$b%Kw4*LG&1Zh}b-aHHL zwy+9*rm)rB0lgrAawo^!wtsNW9<=S2s_0$=cnKr9AEX6z@{$$d5vyv3415BndO%tc z4mfOK0jL*$Hq$0d7Fhvs!-CT;Z&rF!GK&H4;9z-AV3tq?iju_5y5HYC^S+>^%5#}f z702sMxj4R(5gdja#t>=qhmq5zZzC+nsv~oKf0{Fj1q!4SK+crcmCfQP81KNoys-($ zlN`|MY7{H(UW;XnVMN^x5ZL;UV)bYo7ykM!t7Ko$(YTN!#?Oa4Eqsu-%#b{EV1j z(4VkN;|5|yu6lw4c8dIzyNqt09#h<|ZBZgL)~Fw!-E*E4qNw6|*un+VX_ZR02L?ql z)ydXkt#UY1WH`19j6O%2+o&K}gQ|U1W?!-~Ehs>VDhnWNwCQClEQJ*H5Q1i(2}dmr zBi|h~)!qr^&gy#v^Z48CZ`Hm><4Gd;x5ukI^Q)nLrcX>0n7oCX>pe0Ig%~q_q%}B7 z$9^#e5p&fbQm&&yVeAAY+CiTee0+Jy3cgwgEuACj939=}$Cjj;&WhwBALXY} zw*f;q^*}=SR!QQbfD*e+&*-Lko(+7ny8`sA52=zL+i+g-w+!s5HT>Arni{sfk#Z=m zs{2QRyL@Vganpf(q7~^0TXGKm9vv3c`dh*$NMmiGKS9tA$xY1f4=K$2nruHSAFH9lmc7l>Km9>gywvdp0m}%iraGq~sXKoBCG&|-e+8uxO11X_e?83MU&l4j_lhVSrJq?g&aDI=?u)gb2QzaBqhYs1zK-lO>s;U`(ePEO~jlVR%<-5K8 zqQctb`!Km3r+7zKN8{|_NUUUH@b@1;#mURJxxoic7Z1rFq?;7{X1*`|W$ihmY=|?v zGIKw4Dn7P(jY7huf3w&1DFf+BU$RRC&(5?HnDwbGne7o z)x~b@Nt*E!M1r77a)D&EJbaCyGO7i+V`F^T0afEhU`5IGqwu6l6F7oPK1h%4c z=1WF}&D-i+pGfEYerMV%?*ZzS(f+*tdmgW;>niBfv@>}GQ<3+H6`A{?vXNtY?qQ?A z12p1(pKM8Xjp(llL+sDU6WddynA#sZ-9Kr&6%`bV!#z*hJw}KMhY%85J;o}@k7`|| zxj3J7F-iD5*pP-1^Odc&Q_EkR)d;6Jz(c6rHtBmP&+8=MPQA08fh%9%k8#EkJskGd z)RMU>>NU~MlyaH9;C`1qBN}(``^*>UoQF48NBa_TfQYx41I&HIy?%Wwns~%F`%*oY z!*DyJy1*&Y0DJ>x?me%c$XD6c)ODuZrtXBuz%UD@2ROMdJSP=4d+e#Yd)3#J0@VN%%k*5%3PHVRA} zXI$>5n24G~Jnv}8SR??bZ9Gtj>a79H@@O|hwl9u0X|@8-mf{Bir^P{K!c<|aFEK%O zy~#}Hb!2f6K$uf#HRHn12QNxSnrsJ> zT=!-*7*CCnoprkAj6kIAOm#Xt3n{dw6!>@Eiy2|XGrp2=m&|`5yxpeSD4!LUX?Cma ztm6=@Pxp;k7P{m?zuvVJ$ktnXRv{aM%i=vlyV5szbvn z5WYtk?Ptu7uQ+9k;IUHkYg(e~-?ws{c^cQkyXJis#L_+@$w?qr)*+ncE;xteNw|HFa2zK+%YSb{K~hFJyq_x*U!nKs^o1+Hn#%0P zE4NkxA{8XJ=BA8Bz@)Jzff8Q)X>~bSvkX!x;VuB7)g;AHG&|@#pBCaUoaMgt%7442 zH|}C|IK&GVw`?^c_h80noKw-g_})wLf_Om}#h8^c@^pD_!+MIYl=`!JxzKj@0^myF zY<;u6vBc)@(qHy+BiB(wO+WrsPHi*sXFvM16E`i7NYVD&*nQT!1TN{9^uDZ8g7-8X zyX=7YysBs3$JfFoi<(<;?OXD#-j!C%R!Ko4^ZL49EnlxbE+vHsdhz`spr52{zD-4% zY-9B%m6&d9y0-3HC3Q1tdiFd!F+Ll)vXYnb--@{jy#Dv$=3fP`i|yJ!I654Bx6ii{ zb?2-I+I*2IA$SKKhFY;^3~v1p3W_I1 z^4v?F7a!2cPV6*RPCiP7eO~|aY{whMpwzX*%W*GFu|&T=UQTqOk4;=BbmpL`e3&3o zD^00c665|m;_7^cc@c=lRKpKd2$P@r+_|lkU%DR3Gnbxppbk$Q8Rn69OwaZv7+aFz zgC^A1*y)WK9tpAa+RkBB0HjS;2BZEaB$?$Ei7ckIU{|Qti6=A!CbecQIM?p5eKdt+&xN)ZEMXcRMO^)-<8eO?#Xu!B#Xv77yAt!e6&8+!+wvmJ zn`$!r@yRW`G@4WFhAlL)ZJH^p?a9S(j3y)a9`Y;D{*T~xXIY;KMtf0x8A`o+d$nk!v~2Q((8G; zpzKuaHUQc*Y0>X#2IEOt2GD+%|6yvdWS#20GpjSbF;Ko^3STO)&i1m`{> zx;(Rm8a=-(#c@1T51c|+=6YS$03kDd9H-s)T6O6z9NdWf`MV2?c07sQQoZD0qiwT1 zzwyMSzNtAk9Et->x&8MyKUQlIEj1r{hbhS172ki;6xT=*oSp&Oz~tGjw+HN|4o+rC zNfzQ(Bk{fNV8?a!;KNlc1GuRXB{M;<2yLc{DcDoD8%L!#^1mna9rUs?!Q#%&@b*4Y zX9g@zf2?yzJ1G$X(@#eFOtfy-k7X*!xG!$skt#DlP}rW#8FWPBU$FDka#0Wo zR{W+CD)KSdo877OLnY`WfIEZBl&9cX+v`!m$#wl{n-+@Q@ z;cy|DnJO$kdz8!X803Xc^&4lmhXNjT_QtcHM>Lm0xna3xUT?Rh2!VbQLx-E5t#_tY zm*P8mnfua2>6SyRl35UCs1S~AlrsYxsIhFqDw23hI!u0a-16fY{gUh&89`}UuGktO1~GP+^Ds_$-}nz3p7mk zx@@pBvfc&GUYH)Aav$F(O=w(Jwa0@)Dk9+hG)ZBetbK2@;g{krd3Pje{MlzdW}Bgb zk>tA$l&1lkdKCFj%9I`%o=>aWn_=VrEH*Hg7Ba+T% zO4*}W7PodbS)f??{fhZu!m!YUP>bW(mIz^Wf5($pN>jZ*Iz_*rScxsDz*okjpW4_@ zO6i~3JJezUsQAeJUZG@>!x!&-6K=92!^ck!Urza^8YCk}2w(2IyZKPmZL}NkWmVk2 zuK;_-&LsH+sP%PHB1oGbl;y#mj{VVBizDaTvemjHZxte`+Qu7S{TtUj;!-)`j7fJg z?E>qlfGyBNl3&}3G(-6%S-T7YKdoLmEsOrNo|VJJbc!Vb*j<9h!gid|Kf~NpV3SG)daOqzHjEDJ?DaU!ej&f? zO+Y&FP?Ms27?Qd9O#}Ge{O7@R8NR?@Na42WIwo8CRhYpDGE|g!{)s2N`XF2 z1pe&VEifw?$A3z=ylHRguk3$I8us+r4?HczmU~kIbg=xJ#$oJHd21uKAimriLw(zE zmd2UMR<~7(IXo9u2~(-ssTdXi5E|L`E02BFVDYtd0E-O&K-pMt%GG7C|E&hr61&51 zEK`FSkAG{QKRhsT{D8QGo`GMbUvT!XrZ*4rLyAhL~5ow8p4C(aIDZ@a#N`k+T`)bhogM5Gp}HW{f#)zULp^fet^!mTj&iarKPli7oDu%74P?QmL|=Uaci4NwQv<#!-eaJsT{pKJQ*S$Nup1ea&YY z_N{024K5t28~P~TV#PUd+qBESmt_`Ma8V$ZUTs4TjI=gcUW2G8TN$!QKM2}Fo}9?t zl<(+)@*U2?rc+w9|8wS^r$Imm2U4DQ|A=H?Bu6O;b>*+Ob0?cJ1CIufkxTv_`RWx= zD!!>nH{F!Ml(yFgbDR{JsQKL7vTrO~l7;>$lLDKZEtL~v-a&r-r=S`EIbg*Uj1U4| z7XPcf4!!{@emQA8HwD#|UeZ1qHXY#R4d`Ioh*AExTFi1b8+A!SteD&&wnzE+$v=N> z!F(3G4YXCs*sc1?&lWx{e<}3uA#ve_Z@+0X4%ls4cQbA_xN*N)n&xPC7+JqKXL9{d z^;?JNy6by}M()2Q?pYUBSc!t>$)IKcnv=$a%qXLptw zktt;ouJYeXy|L84WqMlM4<9>h_5x&>bLcKVawJ`y%o0-Sc^)H5%^4hQy{`rehK_)^3*?7j6M+s?R@{cD?SISt)A-X47(VraR!(Ds z66WNWKz&<&&!KOkp>`hjKSV(4{s029^J$%xi`xh&lds@JqSgB+C}#&x7`>w)H$q!+ z-!;8#IsfDlZY)*-1L;oIy zmm99zZEQL^61W>2@rct~Pai3x8qxrbngJoj-Ft^?-_vI5oc_x>NZ|l(Lcrk!;13|n ztI1X$3@q_V@WT1!zGPDK^i2RgY#rL82$r~E{}K)93O9$Jm&#Ls&(CcPguZUKB7v5I z@4QYE1M)Qx3}D?1K@$AuCiY_;6g8r11C^3yHGYMHRxP584T2LiDAL(Uvj&I5wXa@F zs^<01#8rZ*gX3IDY2H}7 zgJpH`fNRyJ^KL$@&!Rb)g(>-O_JRcF#I$VSl7QeuD#XOzJmb`4ZzMgrN}uAo+c*#b zn2!))-;e@Pt`$&B9?FxKzN8>&U6TmEzAP}D$s{aku31H!30i%5lp$gxT=(odDTwa+ znjvVbGZ^0D1$cvbC8MxEw786!@UU;mG4kHaUHf2Kzno&0KImMdx6cjQu$~{zI*?im zq;4oRSG%~uhLOs&YDECE5jV=hMSMGKZo^)l_%XmXMK=jfKB=^1B%XZxZGd*rVHwd~ zYdRr@{d~dcF#AD+VB3G5p{e!vB;tWkst916K4)oG6OtVw7XI#$yZFnB##)=q|dy<+x;HryJ%96ZEOsK5cUgc87zqxSia z_a*wm8%5VQR#7+Yo?x@?(lah)c^E*|P5$5oi7aiE3{u!3hJ^KYq>`iQPg`=;_=wsN1U{N+3O9VM?{ z%1ytb$Q(}R13>3{fCJ1pVEW_rBosPZS7IwT>N#Z-9vWEgv2}U#fY-o{pJCo@Ed+;kBohGg1>kgn7@r)-Sf=(kHgU{HnCV zqVD0(u*Y6jue+^Kr8VNsmFoF83a~?Z;moV2$!QHD->J;o_&26Pt*D&l--xWf;d$F{ z?9LO@_*>!%SkU|yv=W*caO)Tk0loyeyY-l0$>y1(F^d!?DOq&<)^F0zwjsYsF--o_ ztml*dA1Q`uP_#a;j_x6%y(k}=1}q{;(l!C%?kkvBmK$JML4g4TSFczVg8I%5Rvd@2 z#IV3MiBXqvhzPU#>|vFa)r3A8!|?;WL@3zxmqiQN;Fwf#w`o!Hwy@CZvWn+r%4K#X zr9s%AK2H@KM@7l}s6GLDu17#`QNF7`ryzNy8&&)P&=Nn<4K%$)BhkLYwMY^W=eSd$?24j8|eDj2yKk?UuxjnKQ{f~h|Q&~RV(%$KVCWK zSPXfcn)-ur>0E~}*@i#-y|l))gj;Gzv&W|v*}&A?;L}I4g;)2Qj+QpXT~4qFD#xVr zZX2E7na>9KfW~b!o;iYhlxEn>2>3n63~A$&A-K2m{xLA(K-z0dlxfu47OlLv87A5p^%N3;rfGiBUZ&_HB0U{h8B{WDJa zLQc8f8eVmW>L_N-#=~KGwP|ywJlejLpDT$xC?wF;fG2(Frbykpw|t<%WSR5QeA$(y z@fD#RL}D684sb+@nP^Ev8yIAVPobWa$;Zs?m z)7XTE=@dV%>opyq$rPZFb=1>wxp)cETf-~=_NZTJ>+wxe8^Sgm30#~qoCRR z2%i#@ds;a9HRx+&av}ccT_@^A5}C*O6!Ui9LUzE4B);YHVnJ8a$Wp=q19}%PSm|*$ z^~GjJPC^Thhk0B*uG@DJlPv!sTrTi*?_lc2;Pt6mnrKUgQGR)n7ktrfu|Ayc zGN(Na&OblhPpWa5(#=&0C;*msC|j*mcL_uF7@6f?VA88X3E>XH1p)%$B{4rx(%6HA zU_IRO=hJ7vjsN*Mtr0k8d34ah&>*~?4d*)ZwK@wFWB-uTY~vIeaPMLOJ+pxocvH=X zv~FueUDMF@cIFc#4km@bXgE2wA8`zaD*P-q<{f1g52a0G`wR$-Ldnm-u|BMOT^l=cEt_@V@qKNb7@bH@1?xG{mCJEv%=^g z@lIR6QK=6p~y%@M#f7qHa z@x5GxTjQA>I$2br4Rue%&$$LWeu9%5>H`S|9_drt6lQ9Ybobpl`Hz-nruC=xN@MQGN;eV5p!~KGxEOnhlFY!Q2 zNHC^Be^~^tTT}n!eWRiR_k-{=rCiZ8#$(Z*;Vgl)gaPSiOIUpgOmOB0J9y!NWLO-%<2ZBR52aY}=^Nw6cejD|? zn1NV&d5vV4cj?tCUU?~UmM1%r-@5Sh)Upa7(ym>d+K8A=!-poCjr%CfLd+|Oc0ncf z&#x~mC$vId*|cp0)}Y&TV$G8SYU#};L*8ChHrali0B9IwG2~zZ`oy*6w1zeCa9(vF zU3PEO_#d~Or2r5pd1+qFS&>k$7&a3+7x>R6BBN+Uz;p~)rE6^1Xf)P(!^+Q_?Gwrx zFq$ClIQZ?|NStQDLLsmTn&uY5NReQs_QY*lAE0bUdWQFsc+B+wh6M&hxJn$nsvU^` zB|4Cn@_9`6&GD0-vo9ZXn!1<4xiOIZRQm1@^vIaF4^CJ1-4Dr$FZio#hh3M#-2%BB2_)onr!?EEs*!^62PmU zlA)gJsWKgkN56QS3M;atuy4!yiJH?hUaAv1y9N*B{P{dffGYQp3*&CWa6T*|}3>xlVz?GuB&H0>_N<*g0XDQ{u zWodbLY^vcI;q=UVPKd(#Mi2mceU54Yp8>rXr_8}Vl7Ey#Q(@2=1S9~4enDNsE*e|}ycLF_zRaE2__XYcysrX$4FNIng z-Tf%)mm01+ky$E<_at4L<25p@0`W_~d0my9TMgx0M3tPV@wPB>X@trkG`#>`?{h%G z2_FXOAZPX4T`cXT95%qui@)P3C zG^V~0n%ku~JvG44hxJ_Kv>_$Cbo(Z^0U&jiumTR4xCaIT*bCetDxLe=Fm55lLeBJ6 z^oCDH_3Gc4-McB>$`84$$}B|hNO0}q9Qy2!V+?KwrXIkW!8?xx8Z4ymFN;{Pw85KR zq+)0NKMD0s+d2gC2)2Y02MFpl^rt1c=JNmj6~s+il_65QYs$3yu8;H%xJUO*%FINi zn;TUE&0XK`vhUbSt@v~2>YMVMH~OL)6>Y*xdV1Zor`{jZ&`3Me>WyVkWM+Lm7eF5j}v#98Wk`SPrDwV^z!*V zJi5&|mE@+_86eSaQS`9M_+$%8VzqA@B(QcUH7na95fMkguA%AHi>zo8MG6mO;FF;N zkt;9U?&gdm)ViNjJE`kyQ&>xrUTW26&>4jB$oPmx zd2(Kh`a-jL=k$2)oEjPB8_#YRlFdB4^vv(Ah`W#X>ul!PmugVP_^aA%@133cQ!oE|xObO=i< zy^Go1J@YRtu>gr0za+$QReT+=ue<#a(;X+&(O*|gL>faxmHt;-FR1R6bjDk{PvH|> z&F}7>@|O1FGCBRK(iuvRYjZ?6;>?-b&Llhvoqsxh!upMP%FgebaSrt53LI*GGxHwk zLDOrHTZpSS+|1S3!hq z;(@CvL&+NaK+!hyTKNM|F)wDt-UG)$t@3Wiu zv?ne{kt=@w%&hr{C8OER1bG^etXH_I5?hHa!yf0Eq zDDW{^^*2X?g#Su3{n+d)Yfcz&a7}-%S})O7>uC`sE!vRyYuX;G;4fGy!6hR-5|Gwk zYxZ?wL9x&K-jf!$&ac54(d0^(3|a3PS$AHv9t&fmo`r`-ZTBZ$Q!4nj@>f>>gL`_= z_D;p6YhIrR*NFS=`nfE<;j}jq5IPRYa=Z$$>Gv1N(JNF)M2-bhTe*7Gi5M-K78tbT zDPT=Gv3%R5ag&BhJh~8MJR9o_=j#y>GTKaKm!frRmyhxt{IL`jc`i|(*Mn8CHkTr{ zm_5x&{}7XnWOE}eRE|=`oigcjz49ncV1C!ex(GNk9|r-d7GU;B;AMF9Ux}JXraqzC zPNCG#dGw#3UfBQJSL#6;sOqvrufO;NVfQ9H$ov01$l|~+5nv_p09B1_SplL6!h7?4 ze*b>VlkuGYx-R3RfY>WPvGsq%c6a`ty`o(Rh2KB;C~*Iv;hgro-&X*uEfLgnmIRqtc;h##GaO^FS>+R`%eDJZ zJwjAH=0VHR{cw>Y!p*(2l-jGBBffC&F9{g9kb>dN8gM91bE%oQDO3`)9c_gc>t^K! z07jsxXJxr7@Mz7mpP<;G#$cnkW8)dE{3{I1E0E&DTIWY&EmDs81btep;=U=q2Oh{p zu+6PWRT%ODZo@%?-Qo`YtoVbLa|^o%zc8=F=Kvy$Q$F8O=A=2Q_1*j9v7F&>*(h=Y z{EenYFck?G6G*+AB_q~A<3;U4o$&9~ow$kuL5bz7(=KC|?4k#n4kjg>R^0C01A{c1 z_v7FGdJ7Jzyft(pE=(T~Zskd}RNgyQ;=sl;ispeNMoNMoomQw@WcNOcI>B zdoKMRU9Ym|ssRGjR$&}CVrH8$;>4H0Wtp+Mi2TL6F6W<%b=cP>V_IuIIFWQ z^jd#NK)KMe4!Jy}?Bzj_JDn3u*qj8E;=#Bg^RinqNpF&Z`@mS4m9o%#8ilQITh#hG zNZHUu$N0-=6M@-eeq%de4Uh8KUbt2Ed*$#au*jwmCLd;&aeGJT^ z``k{ZdCJ;x+yx3%&@Ua)$L_#ZT^xbKJdUQahpk#+5pmyR>4rnMjHEMp7h_N|sswxb z2@m^dC|oyoqiJQM{2PYz2MFHo^ypq^YvYm}$67o#zy12Nfkp7-b;Y%5AN4!MfIp`4 zz9c~W4e_W*t_wu)yYjE1g<_?&0Fi(Mk>1ZxfAtyfqq}M0JbPLz<359_;IuPU_!FxO zXvq}S_(Jc^S?l@pKC3hF4kCgYQ3056YeqjWWyN!2L2`U5urH6apgkd|^_KD?*~z`) zne^Hhj{cU>%=?c9+qwda$vdVPdaY*G6c!+%DOWXBsCAh#sR6pv_mVyjJ^*S|IKvf& z9<19bc!)$$^W%?-^s{k+3Kti?$*Woi#yd}zlHf{Yu+!_3j!?a~ zl4Mfgen4-s_Hf4md+$1fhP*)-K%o54#|26HuJj zGU}juS5aW{1DG>wuB)^1EYV5?)cz$1GBFGXR^VBtLNmETeUYl~`P*~PPaN<+Tm$K& z63GjiwBB5|en2yod$wB?!lzc?Gq}xtVF>~HgHXk_g|2;$^Fx^7%wR6i!?o^*(I`RW z2+sd$!f*j%1bI+5e@K(}6l`DF^I#J_!r4G-(aTUUd|61mK>=6(JyRL}u%^zEdOS#Z z!gcPc(dQ>r#eO|J^Q)HC0iPmB`1k9~-l4*fEauLVS%UMcWZl%t_}xAR*#o;9RJD2z zb5Ds2G6v6|A+kG%xtyf;|AR0geplQhV8NGoRvp9bj!s^>xH2SFi@ z1kIq(?vQHRxQ@yOfQjCH2AAHeWtN-Z$v!@W0Iue0G7Wc+0_nOpv{!(GvCzYlTGu(H z@j~Pby|bxL8YbFDH^+2P-3Ch50m3<+LyBBV!D1|Tj2vI>H#Te9(Ku2d*3RV)dFv`P zzAZ+En+3D3wv9f5%4$IoaHqpfNH7UC5vJRFD(p8|H*c_S`n#XddQcj+$IkE!|C*6g z`k;CgU)%*!@W90-ewsB5I`e@ODD6jl4wzv)^`;ziZZvy+jvHEl$sBgEhfZN6r zYBe{KFSIKyhb!oZ?AhNPlom88`Jda~o2Fn-BYGA)!U>M=$eiZ(12=TBd@o(~nQ*lg zelwU`Li%g+dMoc{@`=2GkT_g13LV>P*tx1pX#)veKV`T61~Bh- zlPtFFmRDorKpa|Uq%XCKR?g%ESyC%vej9xFp!XIT4qc;WSJ2j%+a{iHNy{!oRQ_!% zO5$gXHex79UW^Z;NdyVC+C>c;$rcjwfBbfSthZI9f>G5C^OITHKmA><=|)30nFDD@FTu-Mo1;OvJ}MzGZ^moti$-_DXik0<#sX|d z<&I-VxD7fE)yEYB{uKC*W}zPX0;D8BL%TQGiYnWVoyUjH35ur%q<8i`pmSD0+ORu`2JJf_<7jRB&v}G-MiyRiFx^-win4r}6?`{#1eg?kvW=DGJxv`u^@4 z7wyahXDM_{aFcVZ+8 zyuQ4hXB?4#-lE9u-QfHfri2E`3*daF{l@OUQKNCV-TTO$cy3`@sBh>5E;4+GGGn+^oM_)4gVV+rODB`nYBO{Gi&Sg5!juDwD_JTsEr&L-Rdvny zgIGy9-N@G}IZ*!2bx?e``>zw+#$;;j!%5_#?P5n0ZobE?C17(5tz!)r@+ltA8V|7* z7ghS{g>&2-%uaZ-XL@KIdJ96;cGv}<0Pg5--3s7yNg?H`)Z<@%!-xchN@R7l9?c{~ zX)-Q0=H5%B5d?xHM$-9o?!ZYRz@2mm%|(z}&&MfqAVP`NZh=B<&Q0jeGeD6~+_W0% z`nuCm3QSpS55TD!*?2Jdtn8M9$K3fEJczu({=^Zf2WE5X56c>Hx?3;oVr8&=ILk30 zAL1yj5<3E=W%#aW%L(px?TtI({;PssZzVar*m_7&5w}PM5DTyy&OVVbl55_RsyiQC zqbS_Nh!=Q84rtwF#e3;`!K_k(mLDmbQf2A8R`}bS(3(t$7f$!kcjNl8yDYK?30CNO z8ko;2qsMH%avFv2S=ytmqaYILubUH!xSjZ}K(mKp2pem%4CdQU3s^mWUu3}^g3R5~ zJeN!<)M?E*b$35#DMUn{M2mU3eFLiBE9{?OYzPh0MoV{uI*6npE%ZCsu;wJV*7vm3 zPCQgP+G;Nk3ul>H8~H%e)*4H_=63fL8;6&@cBJ^$8Ev$6)DVz#30hQkUa?yO+FhCk zjfW--eev{@Cn)FE3JVhxT)OOw2+u#B543arO$|`NpUo<@OskCaaZ~P*>-HT*g|t#zL{gJPzoCcAaAIhN9@V)S9^Ov1 zQ0&!K@IoJUo_rE4OKwMbu;mC-PBi%e2sHG~uO36+WM0Gqd$3GJl+cF6JnfZPQEPXq zwemKm<+K2X@^})B9{Ps20$;VY$~JEUJJiN#q(0-KiOjEqmWj~xGGd&j6mF%C!zz}W zT7zu3GY%4Ct~B<8uIVuD*A>zG`hr;P?VPJGZ3FrAg%Df;+GNpzy%ZI8q@>dHlIw;> zI1L3akPrB%VqkBZ{3vBHC0Uk{|AuSqRD!g|-IqWatsg~dW)sN~sxF_zIN#{1#i~sq zfA6G;FPKFE9QmBWAmBEePq088f16_&8YO#L^b&=6rSy(X_6+tm`Jzz~Vk9E?U|%~^ zOns77!v5}1(04>*gQoBI?$IPR*ktcNoj_j-PO;_zBzCG$W&9#+{oz)>aRgDU(0GM5 z(8Pb>!e&kT!F_&L91c|PbhM|JZB{VZN4{oUbfRQ{OH#J@gA{5w*n%7p_`)>1uH7}9 z-Tq+E?hvd!G@9)bTg{vZE8`!}F$>hG*VGe=n78xVSE3*4MMlbr>g+s^PvnhVtbY2^ z7%Erxgd*&Cvq7|yjU)DkA-k|(^wRa80~Bn;hM|Y$?V1z#YSW!>KeoAMC7#YUnthaS zAa0~lvyi>AgKnoG;nMtCWeAjX_C_^_!B^ifOFU%%!H}wnS=(rkhQbRvACOO6vz4a8 z`G6@k1D$d2cX!pmo}!tmM~yzG-zDIYM^Cd^3t`|q+d!P{(@+@AGTJag({63}97G*t zE|Bmpk{OYV=W)#}py@aBfad-5UOl^uI`qY=OyD)R^`Cxa1XY{dJE)Selr=Xur-iuOBo4nzL(DYDPVmvRh zN(dK#3H1cM^lrS!X4G1Rj^K2AV?J?@!LY7^mrYc+yLtd`Z?m!n+u%h0i;BlZm^EOo zAv_w$iv;^fA1A9kB>4xa&bmUyhz8=Nw*b$$*s^xqjACyeoi0+@E+(g*302k*_7B8k zUV0CLyV~5Js`69ubMM8-&HWitZkg1yHKUq~ud2*GR_3c0mOh)5#G=YqiQ{Q#W7qAY z`C?b*l~>;pwS}cGs$<99B&pP@&jXK1P;Cj)v-0DAtj;Oj@rA$#bdzGny?fny<<&tn z^g58P+otxPak6RCXsGvf%j?n7&ED~q^9!bTO>>^_y0bF#RWbJlT(I)10ef$+-+iIS zfTD11Shlgegp|$av8kPU{9vu~1Xq=6Hiak}J!L*&v+(nMHrFJQn;(1CAQB)9^0ev@ z=vn{497iCc8uLmnUfJa`;{6-5j*(f6j#AYfKwCnxDSwfF{w2hiJbA zE>N9f5@478X0K@+-a_&Oj?+_%sqH><#cE9)q>hJc(zt)Gjt+AZtw;(J?mihGg0f8p zOTCZPRS`mjGI5P+dLR09zvg}gc?nc`0$;Xh2Sq7x?!cGea68hr=R{8+_77cGx5DbP zYe(!h6@c~?SvGWvbx@|*VN^rxW%JIuj?j2Pce#~suKDTV(e#(dmcpnS&q+dxa`(`@ zHa$trI~{4q+DSC};{y{T{TQlZ4Y$e>bS!f>1-_h24N*)Jp#GKh;=d;bs?a9Bh?UQm z_YY~{r!10y6(FY8Je$du3lCR{J_AjeZZzl@?ZP@Q$T1WM-IeXy*W54v;_YN1yM4G= z=)U-@9mW8j%{Gwb)E~>%eyjyX|7wSt2VkRxXe@@&%+hQ=P(jI@jph3tlqad@G=_PO z=t=h$n!UxSPnbe>=tvmMHyzvwE#g)lIs2ahrK#KItgb%J1E8?f{JZTNw}n!$qEX;C z4^D)&U#4o4H*HMw{KL;1`LzOFk4cPPn$&vJCc66N`B(nrSKjZQ{K&dCY1KQqz$y-YcF)YC-8ZwV8w&(jTF{&KaOv#`gD_Ug|G!OjIdg3 zrr!aXwe{#E_9^v4VktR>DpnmoP$P%s{k5GH7ctye-1EC#J%a=^_}aJTK;MlWR`&L7YZT{=&a`U zY#8shY(xYaC-4qO6!42Jx3gfV^4^`SLi4s8o_9P;{=ttVLZ{3u+06bFWfxZ(pI=B9 z)ku*F&q}y#1?#xUh-iyA7%2}iK(#yW%wO!%|B%RwoO#|w>b?r|+B%$%t{^q5UDvCx z$e;cC8SQR-M4|}e#hb7&X=m-L`J+6;rwX+DcCLLtCj~`{lh#O>FFZI}I%j`z%&L zRou4;|3o{;CY4(Bow}}2$Ty44;XCTA3m&^PYHfb7?SA?jQQleOoq1V8?~%Ae#ZNpemJDO z+G#|tibP&}vNT?zxg1t6^PyY*elnwnj-u(ecv6Zhu_TF+gj(PpF%CIcM0+8&t>X9P z#?M4O)-fM{Kj9_CbGS#fsY=wYl>%tnFI}Slp^~tIj2LUX<=kF9u@`ZxbnW0 z&OXXO_wWkajf{Q$CW>wv>0J(|;Z$1f<_`3R(#uP%t@-B@GkrX?dJv{{du8+3TWQxdvDn3N)q6fLGUYY5PWIt&VU6g6XtyMG;_zF;BQgbHu?j;@ zO5~mxRm)=&!9#QSp{@LIOk8s(0^6{uq=_()QWS~QcX6ViGFA(>9Qj-`pu{QcjHYL4 z<4gN`Z8BoAbTal6FPjU^kM@e~cT`SO;7Jq^I>d*wuP!L_+!bi-0K&NL_w(Bgvh@pM z=eG{xMV|{w35_))$BBgfr4 zPRZ3?PYb#-t(;7lsIdK?6BPjk#BdAI%VmoevgZVYzW@78NrVyRSYDsHJN5Gab`M`acI1?u5ChI9Ssib3VT7)njc!D@9opzvGs%v0KoEi;7ybw*0 zH`mUgImIUM5g=U@GAlMTD;d%wQriA6yS_A^6^!#1vc?#e6~UvII5%xi=zY->P8 zO>977$}#c$V%-9WK4S5z14+==dn+EdhN^h-DerN)-W(<1<5HpDRHb_2q(X?rC-id^ zWXFxzC$A-4=MaXuvycSNm#4_;`qX*n0Rr zPGibR#yVaYa=n|ghltY!0<;_4>e=Z9|GDh{9n~%Y5T4W*Ng1-L@?0jTi~34~jDXPo z#E|NtoE4}lfccOk%O(jYc65t6KJi^TQ~5}nNDTQVtQugv@mx{S8sbv$QLQ{;4s zm%yow%PtD~#cKq2%melq9O{Vm;BQq+e>YYAj1lMc?@X0n`QM!ibmE}~TRE}UydL_* zMRLDjy&p!orB90q=~S|Nm7PxTez_|W&k&VD4m*T!mnI4ji+A*=2AZk@z~NZEQM9w4 zp}~-rWtqz>e!MWGWDmH$tUmK=lt{N&|^ZEgOIhy7XaI)QF0p zK>5G~0Z0Fz^&NDp&3=dCM!W_8^27i8y|APr;X5*u=mz~q|Ghg8{yRvo5t={ck3ANf z`}%Jva&j5rz<4<@Q~1Zy??yXNs8Ri2r-c+^vLRT8&0n8Q_IJmKeeU<{DlnUd{-0ZZ z@gSH@&v+-a_q#%WS}}`s&zz@XUtqRT1MCevE^M*FASwEPPxJ-&5R-TIXI&g*8~am? zPM55WK6kHp>{hm8g5@pKo_6PO9b@aCap?z^58Aaly%bVA7!P$Nxqdy4i?6Kz{jcQSR~Jb>x0=hzl@J*;Bq3Y~^lE_bWmtix?{F$p#GsFaFIj&&Jz6pPeC#N@`P0w? zZA*lCCvr*w8J*eGt~UPEr{s6Fg{ZT1*gBH^%Gs@@^;+-v8E?U;_O=}WMA~(}zUJYQ zuayy)_Rhijsr86a5bKA)&wWMSGJy~#c%btDs0^yaflym5jc_3Lb?J6;!sBBUz0$Z@ zW}&wm;u0PziraM*dqq@Qv2&6tzXh5vdLQR^tUj9!s7ALoY6p{>*w5>gaoCo*=2pGKi^rRcZKfRyq<))w zY=&x9F1epL*%qASsJm&x38uhlZ-A#T;S>dQH3%Y9X8k5i%8~On^lo?ue|!;p{?aaE zL=Y^CGDL2*RSC6O|I$8phQjNOQ8{L9IdiIqddihCYFJ->0}4D#^yv^b7kvRxq8rCP zV-MhMF#5D(R`jhJEekR$Z(4ZW*PakLX6dH~!ncKAEPqd}ahW7m(`x^bApy$)Dn1~| z&aEP)W@V~5xT&AT_apN*g}qM7&^#a2Kf&D2G5@Yt{JhZ_<`r8JP;tuZ-~JlMFZbzy z4RM{DS5aDn+W!U@{P%XN$6$Ma{oHjbkHD@+JtNcgF933wlN9~u5#OH37ePj=d$8xv z$3*V!|M^@-PB923jOG!P%vWM}vI7D89SdeMI&#Y&^9hq1@|O{hvi*m3a4IYPsK6OH ze7UzP!7s1iYt_nvcE;m)c%|iz{~CLFT0MvYsS{K?^}!Yg}ura@G5vR@HS;4i&4qw zqLYpFloYq2uk+yixamKad4dUSt-wMW*Iww~V_XB7E_!%dc5C;K$ClZO!`NGoWp!7b z^_<1mXyYH0Fl9wkYOJ^lwQto{KHVdUg{sZs+l7+}yxP^a`l(N0+0bLG@tz;T-`m-> z)N|F%d>lXT$QBLvdL>gsdhzR@Pl92`jWJg%_;@z@<=6Q@&PNKcvJs#He$gvr&+aLU z3Yk26a)Uf*CdPR^NBD7%!|Zgu$AtYJ2F#}^T?nb;TyFj#Z@Ej;NuHI3;-3Z0!u{`l z6^&ihuJv~DG6_M{Vgt2p$9jtPW6v1hZ&T<0ROUYijBjth+LGP*E+UfOZg~BlbvmC73WBlA(gQZ^ z)15ki8D&;szt-z&H~)GM^~7SCP$v`<8?~ZGEIpP3%6jlkHzUe6es0{>p;lZ`EAAa? zRP;^?_&k;tmUCT%R8dKr`p-$;J^4l-T)}TNYmj%(pHG^;35)3Gp}(g%LTG8pdWbmI|x(>ORoh>AshZi3FwheWi2WD zifQOyZ$9)`m8Em>zRVJC>MjwWd^vFi^SOGiw@%ioZ+yb)A5!AX!C01v$TcGY21IWu zZ*9=SeuP(W)~TnJ?D52z$JW}<_G1J8*Zy-7{b@w5nTL&R%f9`oI*+48wxKt+`=!ceP#v9C=OaK`HD z?l~9BV2Wvv*?o~%?+!7|k2RZt8O`xN_dee|X7w5LzSW=vTG3D(7hL^=P)eMV)hZC> zTs(@k;1e_{6KtFs7Psx9lm$cmB@oR{c?L#;Ccp`{#Z9B}h7r);!*=`YS15{&0vaEU zybSSgIy0aDX1O`=pifjJ=LYYzQp2~wB^d9V9ox)8VYr9ERE7uUOC{#xekGjzt2H(xjpD(C}=hkb%D!1 z!@yqd<8G(Mskd-{&lqF5Me;O{n>oLv-ek@R!UcW%!4` z?BTQb>e>x6w)OT|E%x?&K`Yx-Fn1WLd0*FO7J#<*z2*WAwo2)P9O4gh-b%Y#IvO?t zCfeI(w`}JZd-t4x5PjBt;^0FDuI%#%^dGQhc^6v}bFCC~^jicE`st&Sauoe~L661@ zC>^O_98uL#aCzaO~AI1nZdN6)6YrKcbAV+ zm?e*z$0h7F)b>e`u*1wwc$WJCtL#pWY=&QK)~r)(R`%M~V(A2)BBSEtZ(BaR-R|m; z2XO006NE~otk!G_K5nlj!>a!R$+BRa0!};cW=k?jYu+O)13^I0s{Hud1pxc$*QNF8 zqT74MKQR8c$tz8YBJI$2c=T)Pc6TFwLOf%HzjDNV@C$T7jnkz*Lh%PibR0)^^!$h-h;EC~#H zT_h25n~ghamJloL>2yyIvgqfNA&Xfls!VwS-Ct4#Zr{`n>t5+={o>HO`4^sQQYMmU z^)p+jXhs$$;^S6&Qm{|VtfY8O%^9!*sD3>J@(h~Zks$H|P~&`n3Ihs{to{pXNN$27 zP~J^pOnZgtSzuA%jE8M_Rb3G0A}wq0xAeQhHPTwz=YandAIT9|XRwGW?f|wEhCStl zfcgtLvH8Az860Ez$;k?w3f}lVU(m=>2a$&z6J2@i*97hSjja;}UHE~3~CzysM1L>)D1QiRz3FL1Ezwrko2_3}~+|O)Y-2A3W z;{KnXPN9+IOzdJd8ro?md@q3YtvXZSjD5P4%R^H)@E{6e-^EL(OF9`r%~!vSqYN*f zX`cg&enu}2E5J5nGu^0x!F13~Bw*wAQO<2Up?aOEb)M9Mz& z(3djN)Kl|;`0BqcDKn+HB5?o4yS_oq0?0I^f+7&Oc>vZL!&7o%E;8%tf~bmHURYB= zbbM?$<2V4QXf7&}Ox(L{4N1Daz;Z~0_Y}=k;6k@9cofz=Tm$a`%*ZgdfHQ)+oZ~{& zfN9<%$fC!|;dY+Yn$-_dMf>-niyY*K)(K+8_D~MUjkQYo9~Bx%zfivm@}<5shEJAh zaW<#l(xKDrE`@qbxy_l?dEf{I4DK2YoF_2m1Ao8|={lj4dO^d?+T0kq^?T#z=LfSS ztf=~)k(C$CsYDM4l5;H-48QJKi3CWz-z~aqjDa(o{kd&ZxXXkx3iRu_G4bbZF>Yvl z+G---QV0q_{n7IH$~GJP;bNTVQwoM=z^oKLin_cRQSqYV1TyqENZz+U zTm~dC^6rn&_XJ|`_Y4VMp~R=7AL*2aLvm!WY6X*T_j%YUe7$<=K)cXmJ*0m`uqZNA zrV9j`FkL{J2x9~6j%*7c667oaf@)m9{3g=V?8I2AjZYmYu+^FfoSWuG?HvEo9M9wZ zb(Ucy)4OiHY&vvThC>eXLatjI**u!JK~&&-brpq^GkFEZNn7i^YY%!PFdXA_5Tl@Y zG>=kw7xd7<=2Z{Dz}*eS+>sVXTT*^Ui}hJ+I{!)gEDq69i6m_j%y(|MuH&7 zSIv1rYncRy2Y`{K4I=U0U9V$pksOpv(yJ8+Fem!g7&_Ozi+LDy&~7wa`Iq(_u!D1e z-`rf~G9^WOqw9u~#N|WI5Z^6J9$SjM6IO}Bv!g}iosfU;y8u06Ax%H9XMs^}`PG{Q za6o@|_3dzYLEf^3FY`A~1sN2ROcPlcr)fs3K1<;z=<`RWZjzhr0}pyO|LCQ*SSj&f zHSGT`m76YqemcU)5XAcWc&mpuml8w5mAAtdz4*DT`60n)=eL6)MTReMZVb(3yXnPw zn35CDsR0fF^m}?v7cW;+x4(TStKWcafe<04b7*cf)RFDQcd7k7OfSxSK6^ z`_SxLLN@`RJQ)Z2uO>cvie@5e8I@W8ogcLQBJ>nqiu>Iw8#=DWKa?}W!2b0D`l*Uh zDu$+u%zYJpn&}wN&jTlD*Q%b4iPTm2{SF~5086-)Ml5t|btjljc~Zxl&Pn>{wb&C9 zoZhj({CiPOLs|x;`$a>w@esL%C~kr(yEV3Y4;aSZtey3J2I(FUGmdpKx{QvEbw|4G zf^*Un3WEefWIGJ|$aRn^U`z~TSa#74l7Sn-Z{Tl}8M#(a|9Mgch!6{^okWWOa3>(# zNKImzio*wsiBXBX41)1u>@vP5kB!f+Yx&{a-ivgSMN|Fx&@GUzl3`F?g1qK^nZsIt zDLr0fRF_*Q_%P*O9JKx(JH8@;*DK4*SzMU5Xyr&atrk|2to%sMtmf;}*OYH@DRt`%6rSOV-Ff zeD^HK&*37wCdz9*Jf*?!-0xua{(kAghH9vMD`#B;;pdr~w>M2RG1ZL@9f;u-h)BlH zSaAlmy43i?CvDz2S-c}NKY#vIRGit{e{lbY61>F!x?Z*^zA8|)g42>0A~T)J$?mGf z#$^52^4C@eUst-At*4y6gxojnO9!v)7nLf`spnrGcj&tNSG09SUE++g31Uobeb~r; z%clFLMI(EqLd3#@ShEPtXoj_cpzt$&pM?tUM%paMCxue;8s}C3_TLs_g0^4ePG=mT zx^y*PI);JnVN8NB89Zi-X-gxx;;hss_LjJP0L>G*Kn|pUdKN5Q50W#EO#J5XO|q|h zCtO8;+&%-aP>b^6F?Q8zj_)23`R=V({9o4a=6*2ofxrCyK31aGri z-$>TGhzMlXgJ_E0*t)?mm9c&?2XYt5`>c-BbZf1AJ9*coQfrK`KOyPH9l!b`G9fB)j_A20ZW#Pcr#eQQ_mT2T7O6n5JfIQl@}bDW&5 zUjED8*jyg^J@Rsi&lNXQW**7yha;cv3sQ-HF|Ymg@~VOp-a0vPNP}C~DGG1iPQMu!BhH+l z_1ft$KDZmnr9j6=wO!jbbYVg${Xk$b+v9y2&p$WIg)Ikip>c>Mh3eV14udGV(W~)G zI*02YXCrG#*elW58;71TPG36lCAUyl+9_CS`~F^=YTM~*Cr@!_vt5crFwt=-6)trq zj66EOPse8|gRp%P=v>p9`A98+`*~W5f>O0zw>3LQYS@mM`@Dlm@_26B(RhVFn96#p zeyGc`pQ(P9Hml@XzMUBti&f=-sm9jtX(9W!#|8bG}fnTbW$hKJ;r{%zv8$C}JQ&QNj)pdXSqg!U+VaezV=7V-eT}|d4Gi%$W zai8(Fb+O(K{MC_i8YaOd1ux|1!}8WewQrAeiw~#HE5SWry=61{Ys!tuN4EZhXKq1IWlqhty#OMotX2+OWol_v72arbn%alNY$P2Ud$*Ri2dXwgT~3c23oFRm9hJ`N;*5_sIZ;dtY-Hyh%< z{e<$#Ooaavi!i+)v(}}}H^FT;y`2-gBdH(t-_*knw6|X1(_%z943q}7T;&LM+qz8T zd&p8^TJgR#3+L1_bRLPPbsKk%-eFdJoZK4BYl586hz>|B=@h>ux?gLvlr(n9q)s+j ziW}bep}eh+@4^UbK?&fzeUr;{6XTfY9Z_^&;Z$YzT7{`&;-QSk-^!hxExZ4ckY0U^ zc{Qe$8aehrjX^chP|~sz@&G%a$$Xky(upc(WvvUIIu+DpmHqU4EzH-_@s=R5W(4UU zLxzS@NO#caxf+0mB+qUtJ>T`(>Nw>$LlvA2ya+Y))8hUzH`8%^vE_kQq)+xzJO83Q zREFts=MJzd8W3G%+Obrvs3vNWe;#?jve>`{5rZ$QI=&Lk$#j~)Kt$yMh6#n@MdRn@iKDoBHL!$v^5yEY)L zAZ)rrKtj6Nv~+_?*G57>Kw7$M(;d>?-3@2?Jn#3N>pj2DKe%A8*lVtP&N;@o#~A!^ zEwXCg6*hK!HH0nz6ko}cHte%yu-KOsz5tbvV#}N~7z3Ft9(mCmdB$|<309BhI_0a+ zh~D=v(Pv(s>9!Ah;}ASi;~Pg$v)N^S(qZE1l;xC65|S@tx6N6ZO&Vp$Ao&%Gc;BAGdKz#_(G`t?K;X3X!9w(WFs82>0t%` z^7brf!+bsD$YoWijk-R1jogSL${!v84}aAj!9KlpWiMJmaYoxXrf&`|GZ9U~o~*?J zNkv={EqX!IJr?{loaJCOV3b2# z!+eMZwf4vZXVhfF*d?atnX5Mz>00+#q&~^X;(l`8Up}yH4tlZ2<}(_jfy2Ap%=JPU z48f?+PDCnIz3VRv3nq%Bq1?z(uLvA@UoHM&48XQWZ!|uYm3*_R7zQCiqX~ho@xYo- zWi93{wQ*OmIDK` zU!<>B;>7JjKTCb)Ox-#*>CW%sxb#f|)#v(pkc^R|ol3LeHw z>Tq88_4GPE{f)VFueP~qvVKIr&}`hO@gJQ2_YRRuHnB?rSN)a{$O*zw{^}9l3_e}+ zH!?6OdgH_UmKRq}%lHKb1T$ZtO(yCQJ|==R6s45eS9*;CJlt^e!p5yILpFbg@;^g1 zd&kny4?#hScz;5}R2XHI|A1*8Kfko6FUy4bO_BH zVJUG`!PzYRS1a5uFDxq53Z|Qea|K_j|5O@M7?g*8gybuQA=RIsDdUZX_aIyts(2Ll z$vYnok_GO~6q0?FX7pPK53rf;qoRilDS>+sBj;sc-n^$s8-eiZ_^y zCNpTFXd0ZgrLvg_5qlLB$TsCqh-nL4R?^p|Vyv{!zkDiQ3B_d!(7!kL1KYh|-&=#5 zhuX;5W9bgW;R<*#gg(4me)k$Ld|!_L8ARxdh@Sbzd%qE8?9GH_{?650Q@vndK;(ds z1s`-wsv>e8%Sv(5s&FNXB?5?91F)_#KTDs~ONVi8mZyNGsXIHVp#GmcR!l)rhn$o( z#-GuWD#t!a7ZrD@T&~7ebY7rw55!j6<@MamqliteS?uL|>Bnw-)G=g84E|!a&=^Z> z)BfWELs;gL)}P_)+t(FTbnM`bftYzDbZVn%w4NmkqSFf)>DIkwrjc3R=w`hEoVLc4 z+8KsstH7#6Q!N8sWt4f5-$FA1fv(=MN11z7zvg#-RrQ)zu-l04($NI}jiDb_c{okl zTY8sKqM7CwFlm~vJ-+d^$MLk}6cO>C*P;R$%dWwvY=VJ}L?Z0q$osx-7jGV0f0?ZT z%{^fy@n@m!U9K=RyMNBd2Q{Ih<#*)C7W1nnVOsU#epGtnL3|=?iNzgG?N5J~*c$it zHQr1t9uSWsyO5q^`;IXQ{l&oSTm?M$Me~Z zrQmx|I^{U7$y!dAumQ+OsGIHFcjFFZhk;Cp)|+4BEx*thz2W^pwiU0m4u@&5+x8dg zKlQGWk2X#FrTjGlpH`*!=j#w-Vs4%|Uq#psACZH@rQaF+&n3Krnjj`W-j$m6|JE|v z9$xeofzp5pnDpPegJPqiltp&X?CtG?ex{)s$?DYDQBnp+D3mhi=`)DAl(kz82#B4@ zq$(uUcgmF4vX57Ai}=j)ri<iR+bK)q{T}jiRxwS#;=|i)N0K^5nuJHu_f%eUXqb z1e@b!(|HGubb)~_FN_Dp3zw$3`#RV@{tO8+C;9|k4?k9}RhIA>C*iYt&27VMSVKk7z~s| z!f2&-XEzAn1m~GGvnwQSf9-t%`<91~0rR!`jY!y?{svA*JZd+JRIYu`P>2^mO{Uekxw*+Qn5!o9E!6mxy)@W< zGmvkeDJI-5^=8Gpd6TrYI&_49Y8lVTVQN#tfBqF>~F^}>e)~( z;OVPj3+(4t@9eCEyV=feJ8@wp-4vOz4l`+KsTXQX*gNkfvI#gXT54!&rj*1m8HLIh^}>&iP4kw!aNKSv?e0W5ZC?^c=(vT_ z8X&bIgVDbyDZMh=jM`z`S`X4>)7wQ9gC4&!*jcEtFZJb60?=sXW_=+5`qUF(E7s0x z41tmIm|K2uV%C#wQRwdKLi(xtm<>b*stf|;eemwkr1EchGasq+qA3o&JWRlqw6H~5 zGQL%9%*Etym8kG5|A9n>Np|!KKN9#38s_rS4s0u}s%y^M6*1?J%u;TB1}|4T@N?wv zu8!aUc;+HgrQVB|%;^iB`lT1@yfw5#jwKN>xJ)8yrQ8B5sUlN+Dlu$|0Nf&W!jx}a zK8-eLaTxe-SjfVlaVBvhc5#IB(c}W#jD$7#goMA&`g5l?s-3q6eP*1J#NOsXpL z`8|3+AaND`HXpRYf&g-lR>0!-;&MD+ArQ#k+`0IZ9y|9gjh-)&d8FP+<`zt+fdP!u z>?PVo6d9ldox?wl4_;R5L<9FA`6Wh{)HCThEwInie4}&Y;_Tc3B=qu)IJ^p9gU6Vz zhv8}i9vA^sM)B+#svNYhfgPx?DxbCb^iA3D__wY|SFsm`b_NZv1O>G_;ttPTE{kLA z9KGIG+RUh?3ppcG3Rg{YJhEyHF_mQEKULN(0CfIHxhcwnOVWPjn?uai-u*0(j`6mT~g@sRlYoAEM^bm%Qcw3wzxS3*qj1t z-D;bxoHu|m0U*gW<#RaSAC>Y~f9>gV6q2Vnh{##Sp%RYQHJarkQe`_%HZ)ndvg{uy z=(t)tG}p0~3MvFsL%DCkiYZ`HKI@4Q+6Ng~*~v6+)I!coHX-U0|M1!}&eS+r`XT~MF!w5jC*PHd-tByB@GOQ( zE^X@9g;VNC`{*$O!u`dYmo_iqZB!(`S0f$j76HWqZ>_p!YkLGs&YLLC6P_G7+qvq| zJ?=t2??0TBSv2R+pNRc|b43;qgPk8jvy1hv)+>8^ITF!xH0ikQfRk%>3r@@;5UDI? zGt-FXY(6ZTI`PwmRO^@S&#UMJ%fu$@Bz9r+&7B>8N|9<)+Lnohh6^z?FrDas-lc!m zLAPraOwfqHEcXlRWv1pE!`F`%8*vYb+PE84D%8IX?TS0h(ueaL)9st~UFmB%*``fF zGa6<|9l6e=Ta~A2%FXw~u5|-F9l}f3=3?Fwr8f_1_DUSp_W#d0ouilqQnlgqZKW%j^`2R&wq4WW-YMsO$xhehr@z;E z?ghZ0z##L}566I11tL<&3$|sc--w$hpq$A&kefK-Rs4OqZbko@le5K3Izt(Ry{5$B zXd7%q3|#-u)nGyKBD?Hu|NFoQ5R>wZ8;xU^K>-}>3H!@K{BrH|iTmX?sSOmrp2oIF zV4mEL1(vj|)jTceu$Tsv_9xIXB^yy>T&n#d`s5Mrebc5F2Awe5KiB!chdZ@;WjBxF zeH7NUn!CCDh0`bSv5Ec-uvG#|0@c6p67c>+E{XrWNSd#O0Q}N*l=-)AeC^@? z7Xn6tb*^3wmj>p4`GOM^9K7>{#+LujKWq;Jl?6bl{yhwEZG!jLKmjiEy0Ux797p?s z|M&IG76;x>;0|?w!}~s^V(e*CK3_kY&9|8o`9NYGQYW?a*dJm)Nk zw`ao9te8jwmK2UkmplZ=(&au5& zfIfR6Di2N3PAB1C4(BAm!TAixllJmFrbg*H(&1_KnVJ7NZ0~=r5DD^vI(Dv{EFJaT zg`2({C6asw_D!4U>2o3jwDC6@T7w*Q16YVJuiGKN&b(5Ok;K$BpLMvVpojxc<)M<& z0sD{3vDSdzZ@RV(6Gsz4-%3&bQJy?}r~9n_|9Y}YtWfl*=S2DuZw7yX$kHukQ|g(a z^=H?l)whcwXNlH~4eeMl&IT)j!-Pfba=T*6Xd73|JiC={S6u2vWzT6986Gv4ylUDratFs5%F2dXSX*;CH z>PB@7zEqg5SQAeQ?4tRtJFn3h9h{PV5C#PrTJXV0qA&7TwZoqtj`43X$wLQGAf_E+ zT2*_C*y4}rctzDz?Spcyzw$Rxzm|i5L_R$MrPV* z^q}~=BvUWeK1nE1|A{A`#Gc^L3{)Lpg@ymzvh>MkV!_TXQO;r2&-3wzvb3mgNc6Pi zSLaPfEG3s_AqJICGeWh&V2`3^$n(Pe5>VUQB&J9^ZsObd`J=FxYSY=&Yx%UXrpEf{ z5fY&=M91@r7G#3kV;QP*a<1po?Vxs%T~hi1H;IQ$+fl8-1`-!JsTpd(jR+)6l!l!l z5yzh~T6cu=UZ<9(MCeuQLMxYA*~1?X)`co9``9`2x}oc!ZCCOt%g~+3>22G?$4N?2 z$EM|C7J0?T;ov=72;UpZy7fq# zy3^%tIzN{Kaf)Dtc!}C~w$m&xf+Lb-$EyuEjbkuQ2^fppc8_He#PShe)*Hz6@ZifT zWrVI%`G&ED4!`1^3i738$W~fQtYsQyILTc8Qidw}rt^sJPW)l!nBZm-8`|iGc)U;g z-rclwwPgW%i;0aK`(~YZ378Ka`DbK-4dz5PIdhcmXA?!?S4l{)zdOkf6GVVmNNT#o z0G~IB&w5t9LoL8VFNJW3Y%*iCUZbeiWB%o|L8Un#5L*F6T&bG&#rOWHvCmw5TtZTr zA8JEH;j~`_e;iKaYvVQH%FsTpnmYpRc3M|xnFWf>+P4&zqTKn=eBl9sh3e9~!dpX8 zp%_pT=UP~xT#oKRh;S1h7&n4_Axa{VqORO#@A-SZMlz&`#F0;6S`fA0%Bptr!886t z@!(>iGsai-p_Ur-!(oi;9O@K$vFTlTf%zv(9L=5C7a}-66YD~yX}u1;wSTX@YM(q0 z>viV+?5G1@4CDp>RLt>-eI%jRhaqe*(?TBa9Uow*d@(m?pTayc&bIpR=D=$+`YQtwK#cWX zg@E1sTP-mxsId1n&PztR=sKht^$v9%uHVLjlyJFnUj?r$q&2~r^FMVU6{7nxy=Us zoAOIdw!#&9)V`yZ$ceUnFCYK1>bI2R6kT7itxryvZcQzo{+-dZ7?w=}-r0*Y-j}+(pj&T5aVK5LU z&{BCL#;B#G^{|*P&I&9z*nl-vJZeS8b6SEw>wW3Z>zqGEroqjjQSFVr#c!MAwGhl@ zDt(*kZ<~m{J!?$5oIVc4t7u81K|)_rPK?sG$3^zz>DM{^g=Zd-B?S#~9jN1(br6Cv z2q*T)IMs3;j72lwz@4~6&pvn}7?x+tC^u?zVFe+dJ3M5|pzpc7@9;J3cC#$$0H=g} ziasUa&?KOXAeIA#&O4q#DUxG$>J;;~ydB4!fLcG8=WgnYB|G>FR#5+lj?N(%46cNH z@5)oS^(@nBQ{yiZgSk zAM*cTTd&Uluv}{5V4n|@9#vKHOjSglG3p~j=vrMeZ69yzkUJmr1X?MNY!C?SPZ1#5 zuNnLqRA_q4X&^6U6sYZ+UiKK&UMnEV#1Qf%cn9r}ASp;9&9i_;`GL4(w~q7SUO|E;l*@7-Tb* z7CZxH)8@b0AHF+tSntD+x!c`qn>_Yn{JkD!S0d+7Sb0gq9xUp!N4$Z@-Doc^^}9aW zrD|(>uZCCIG1HCZSzjU#HgXIs>N|Y%Q6+NfU}A7fUZbF}E#x7SpRx8`0>9|XjH?kG zmo@))SH>nFfP@9mfFTaaK}>Psv;nSCoxzh9}ws5ZpZW8hsT8gAf@G{ z%Jo5$oEyfQ{h2 zlxod$3#9l@i>MGFQA>V9-m^0s01H}sf3kAtLGoEj8r%=sC4Tz?sUI$xKVBZp(eAnt zr1vGZ0WkFiR-{8bmy~Cdk8B*OW7PW$RkLIvQ)KQU?-GNC2moZ;sk*1}yx0%Nv?4EN zbfzNlSQT@46IrOioRc~WGTuGi=&!fYw*bPRgz?}`Xo7T#4D{epn`U?Zbu?tqdEoe1 z<*iw59RVk9ZXbt8sPCPR!|vvqyJt(>@4<%**j}Cs@OHF*!)kC`&*ng&N?o={U`Xr4 zg}yX8jt->ekxnU-`z2z3p}C-bWU_3K!H^?Oewi6y(W#aJl-b2#a+UfU*tG4LcizTZ z&$*cToo1Ev%le16S81uGr}K{Y0d~li&*plqC4_%LT#8|0R1SLiO?K~0 zO})RRgiM|3+*rt*xcXAQauB*B#C4l0HOgQ9n1zhN?`nEhw=bn8^S!&|zrW4M>(Q$% zfbl;I8e9W_`zv{^0%Z`LLgHINBQr_BqiX!(8AcFwJ1R@sC)NCR;3=LD2IXu5od?Ii zr4lMD`kpg~U{OZUN0aB+rcKqy;)=T;PT;Dj)Nom?qw*FQQAvejcK6`Yo{Qv6F@0DQ z;g7<-Os48@^8nyRxg$eSSES@Kp(B~h{9sfJ3>l8!jX+advWP`Yj8k20?e=r(zhoNV zacgyLJ(m}aTx2X2y5m7PQ2}rnIe%19ioo@P^q5AyZDe=0wc(Epl`{t<_qU0pA5l~IlbnP8sA z9+n&(5MPC#BWZ|rER&iA?069HbC5*mVeRG^c629KcM}fRsw50YpP`KA`>0L))FYQ7 z0;x}W4>gBA^yg=L&5m4qW={HemNGY|o-=%i8tI53*v!sK0FoTS>Hz^ZW?c;b}pTY_Y z(r^7PkyGvtmp!+fc{X$*vU;q+&O^OD&9}|vCd|*85$rjn!D;jOG6+S#a~o#6qF?!3 z|K;5_*o12FO^aPq+0tDJteI*jm^82<+c416a?u!U2S#Q;O7>sDm^L+js>ZtV#;SFE=_paZTm2pwD+RXH)%+uFwAk2Z z!gdTq4oNc_qFD7seGsXB6X)xiMA>M7 zY?hEO-P(BUmgm~mb%N&KL7jR)Xgz|wfjs=?tMDM}@kbD6HsHAlH28=99n)9aqxgeq z0@KIw%FUZ9*8>TI*Zsv?_=cFu6^}Nyc@|W!*Me(`8=XK&Cp>4|TQ{ok6zCPA*2fqH z?=>3&jM2+06GcJJN?LiLn)Wv5X~%BZqIWTbu4&{EY6coY_c z#$uW>yB-;G6DmX77KD)J>Dv%)5ggEvB++nXgteN{%n;!%irzJAOWrAZgGSlWGzt%tAu0 zusHU08Zi8^O(uOaB_6VoxNJ_?uM2#%`I>1X;)}2$8Y9Vi`6>;{Xzv$yLmJ!ug_$=Z27InKxzBB;$6NrlRcp+Y>}qdXTX7h5V4U?C0A8Kj#$aR6Ofu7k?&h1gVX( zia{8%b&x8bU+cF%b}k$s;kCyuF#-pL1Xs3Yx!4xZd%fIpAC_sRKyqxo$}+<^0pNA{ z7c)wk`SW#OYm{+CPhl6{ms`dzTdwA0d#->s#s*L#T|ZP9w8iQAdOBjO+i(+2Ef~MY z_EB!J5h|uv+$N=;7p%sSk#|wYF>e3%d{Wu=8u^SyqcnM`0ZgX2kU#$GX#53VeaTcm zEF?o>P*O>d!m`(Z&3#FbU}N{ZBg0F=QnmegATd?953*{!iD~2Ld;j@*1sl7(+%XiY zjA+TBU$~Cqcn9f`#+$f%YbNdEIUWstT^-{$d;m4n_eg}5F7hVrkCVR=ZjH6IaZ(1Gtv)j;3H_5J& z$_rjXa&mvrkQtX%TC6-yNc9G@=?0Q>=YI1R5dnwV`;HZipQglzdCi%tfA-E0+>);@ zPi&XxErQKnp1qU_Eody5M5DwaxA{k{BS$Q5*CkfWQey4EXPPkeXJ@5$%TIT2VY z=stPHbo~0Z!A#`1lipnjFXpnb_hcG3GOog7=pQ~O_5cm0&7m#wos=wg);7g7k*SkV zDWPv|8nqu&v(@KiYn?XRwYY%s&NB-aL+C)G^dt*W;Z9!;|DKEW9j~mbLS{b6(E+1o zRWN8nRl)Y?FnEJevyxO&J%jFiOv0tah_p*VtF3*(5Q^uBJc%*YTE~f@`12lgb0qhZ zSeWlM!c8T201)Uv=19(}nmyq_wgc0L#j~2$Ew9$Dq+G(Q> z)8UKVJL?#|*N{Va{H3L!LxvJDxfhBL88JLQa5K-Z1)$M@WuOS4;g4ME18Volotal8 zI3sn5(rg!V8W%?@503t#j{v^E=ATGP54Fn-!<)QY3omqOVAS3fTtbK4YDpz<=?Ml$ zBc^4!CGmOAREC`uq?9u9*Qeb*;*jYZcxF3QI&#n$Fx$t9s;QKHB!mVnN~Uppa6VZc zN1DySb6heEYp)pb*jNZV*L^m9Wz17neoEeWI%vUR2{#x;cR8}-;q}-=E1x{!yC=)N zFKP$_RR%ns)uMM5DB5qSCRf0z@wq>Y1gVmo}1AiqOWv*f8d>^4SRCNxC{55!&yhcnalFaH@N zW)VYomFsX4;__{w8e%&N&Q_G$dB`=PLdr7u@h#bvReFQ?6b~%g*i6~gpV*3|@Mf45 z9~P7$a{-nq-_VURgVotIFx1GUxQ!csu-ccR;@xWCH3T0pympmaFGZ%Lj}JYsPA zeQl#J&M8r8453#n4R{mna&Rxo+sw-Jq&wperyoV1;ACq^ZZ1Z&zK z!VPll3B@_3Qcz4IQjy8jF3>1yB3#H^pbPzsONu{K3W{vMkvDE{$NE#}L3o*d*_}f! zr#$wPojq-CXXQS^*TIfk3A^<}gilcKK~dHnFn)L0&10z|*pg@nC~k9{2N4QpJb2xX z7J?l`$-a9x;G$|>6j(gosYq_P%lIVCZ;pRP?17cy4TUg4XZg^(bTOYJ@&)AwQ(9;3 zv7R}GHEjjnYD9hrlw*C5Evj7q7OnV0X8u;&wtfR|VHHKtFE2OK=zjAcFxSe+zNQ1{ zqjc{3u*Pcg9~cA@M`)42%2BwgRE;pB+itr5k~Op7(u4BS-c@4INu%uKTi?~8YZa5h zvuH1f`dt}f$K14Rlai?;Tso{SoXCvXWJAb#o0GpAaWZlpNPa4EyzzWBbmZ99Bjn|> zIG0x=V|ei}V3gCmbz$vzF3)IUZzNqg<}sT60)AGCNSIX`Z60fg zd(dd+7AZUBOjw(b=l7#!u0MXGg)}A1doVbE5%-0%8JT}zQUI>kG!>B2BNt}pX)bvj zoS|K@85WbuS-O^{Uv?&0mRcJ~$J1?kMJOX756Si}ciDaW`@t}|_5)%&D3wKJIJ?o+ zH*2>c7gn^>J5EGkaDsRz-C>5rS!uKP$-62t`cB#J?*++3bl zj8V?7CUnN{w}?`P*PwI{&jc}Q2vSW)JIvf=a}f1|b{|;iU+zW1n(j<{FOB$~6=JQ- zo+y%xG>F_{fr1zEA6%?94CFf} z?85GRP*#11eF1XxNDR?2|Gmt-(n(}%+_rt(|7bJ97dd8F!4JtqUzhHSX_ZYJv#%qm z2n2udW<~@Vp?ZSP!;)Ctan+mDOWVa~&`*F<`CQSourO?g~t1}HO!Km&2$1lN;Pu@F^mGS_F=~Yg1!EQgU_Im&-VqcHEsh zvai0nzi|e8UB0(p8y*YCXE+Z&8Xg!Y>e@R60;!gdj_gxtE41hcp`I=r6c#V-;KiTR zxa{_|qbLQQ^K7wq4$)fR_+EXbOV~ad3oOtRtoK69gQVoP#5%4qm<$DU2`+o0sbIsj zRZ|>}Ha*^_@sgQ#$8^*>n#YpyAm6dKY>vweh=awT;0*!x2Y-Y)(~^ZW(d1V`XeBH zp_Ti~b(7;WD0$N!AA7DJ9+vcf3?t?PNQ!=fGS3UED3IuFw8w+aYIR3@JFD7JUO@pP z6bijBsaS0GAqN7=;4zdUtj^Mx%)U>Tm=G>%ShCo6B<_cA2v4`?ra;^>3dc=Hte8Z1 z1l#gcYlWoA-i#E~$R*IvQgy%dlVoltxvX1Z@PxQ`;IP=uw!jixj><10`=WvNo9i3b zLnKf}1c#W9&>%|hH(LAg9jM*Vxj;lTmegGUlab+8;K%FXSQ&@MYC1sConL_g?MoTo z4@v|?M`-{UAA>UAoo7w`XBD^bG1Mf~f+T=8n^*7#Ir!BpL4vPY)W?muQ4;V6W!Fd) zO#`nhdM^}gkTj5_#br72DqY0=WfF(c)H6=!&G!H%b~~%#;=&8yXt6+dyYA*QTG^;K zu^>@aHNR34A?uOv&)p8auiRITZ|ecEIIs280Qc5Hr|DM~Ep{J&;+dL#V%U2J@d|{l zabNsWJj$g))r=Z+Fn)r@`&!ovPS2WOk&+%2t3|_pomCmIM6-8N^yALyi`=9_%})@7 zCI5stI;q=L@wkTYu*^aX#Qd zBp1)7N7NCD4F@bx9XI+20SHr03im7~oNJnd)R;`zrGOpd${H}UVAL!o8Ou{F>Ob7w zEgW~G0!&Dw0PE&ma}P*nbJ%_cK;}>d0$!RQ0PaE9gyHz(Qw0RdO?`YV|MB*eibLaj zoX;s~^9?l}w?%KEUmEFnUZ>X6Bf-*o5qd1~^R*TOdNtPSs8W#D(0Xr6>p+uX;*WQ4 zb}8y>ZP6dE{5YC1ZgU_{fGjAT`S9*-(yhh)R%PthpEhbiub)AHAbD!ByK}V%p%h`+ z907gqEqgjp{{g;U@_4~H;JB1x<^`0|T`8atYvNMoREEN^cYaC~lTc1+!KngKHSzR<{^|8;^XwPs8F`96hP z*glVv&x(MChNjH#$rsQWqX0>Ut$;k0PZ>9z1k02+!h>9;9C(gvcSkML%YfcP#AdeY z9U|p(tG%gT^{eC*6j1?47`yk{mw0sY9{_!xr;lMLAYm)bvIdMXJgJ_5OwAR*x5Trq z$JZ?O_+vzKh-aNqjG#~2&)1ta!Z8IXu@m>)?S4!WeWiqk*{TBE>c9&V+hOygaWAdYw4sqXUcDr%;0Q=@*|g2`{o-RgK=lwY8C)OA*=WV<)%?&(0mNy z+4GeIg)S|5$0jIh^8Ol>XUyPJFc-}b)zi$FDu~}4_-X*Dq)6ZNR^rL{iZXbywngYi zdbY|t9i7?zmbfLVyI$4iYtPp-9v@x0l$%IEhDry3U2GG^~Y>ObKm(@d+?&hz3aM>B#iJ)G|1>Acb2QQ(~ zG?p$$i=uX(fB>q%prIN@|Cv*jkj%=?3y**x_fFgKA&vpE+k=&(PcTiFJ6URE1ksBO zTjJ4Aa~ZwRklIFeJJgYTZj|B@aH@&z=fyU)W{+@XA`$7WD&@ zX)p!9|D?K-WTZ;1Fm!LZ=tEFV*%SspVdp7#Zyc#IA@aWJ;JDrirBbev#|{#U?%Mf< zF;eD@n|r^(kUN}+au7NYe02c#qy){Kv7peN4KJV4^wZs55uIJ zUGp4>j7~A3T3ucFMKb#f34L=Y3`qW?(U`?#)U11+$2RjKv&<_oeu|sA{Rm+*mg;jK z-5IS$Vf;0nhShqX9y;Z1Y}@2gR5nf|`5~OkRvQw}w)>fv*{4ta)0ccp8O-$BXZfOw zj}5O$O2{?ux|*3BZnHkn)&`RWN;b;wUTb%ZTkQU+wp1q1+-v-{a+ayEY?Dj(D-lg4 zNt1S?Ww2jOctYkNVux)GpbO}*W+=cwC(bgR9=is0PjFOQX$b>UzjRjtuZY`sRZ02zkNSX2mVjCNjh2nJ4jK2yvXb}`?Pdyq zLzMmzL3mz&bGFgttC6*$woVg_v2z2s&;-{c5raz%)Cd!^JVm-92{i-?MLo%3AW&^y zVl+rpK2Qz#Cl|9%$KNG(WvdlR`)z@Qn&+@W@I8X(`F0G@UDRgqYj`7H-$11~9p7rY z@F%mGg`>d_)3|KVLc@-{^Zf%s3l%Vj&8|`UW7+wJMW9ZPNS_6?S-#bN%h{fQDB12S zAgBU3a*mc6hbfN(L<^BFG7VqLPe>!P&T>B56n4LoRSfD*RO#+fVEa8%@KOE;@SL5>A$4@#Pg5I^0wGOahByl}dkH!uOVK1n*6-EI88d zbNoz(PH+@V=v!j3)I48J`uU2~hOGGcX1t`;qEHRHFz@PyX1moBKcs*2I~Coe^yt3} zW^UjE(>>8+(R09JFpXYMkN1k*BS=j(=;85ruvSM~MPb(g6WIj0Fd}8fxK1_OKNXJ& z+V}HAfxk1+xlO`zQC)Ls_l;;CRfNMOEBllLyr#L2>is;s8(2jaN}QS3=17%*8FT%> zz5u7mwF4$4_X|MFmSrBj>qy8T#%Eq-F*T6l=?SQEdcKHJk_qsO-z?NQqX1HZNl0`@ zyCj#}011Wi8<~?&f=T5xy)m;u&-BCL{7>3jooaEQKhI@vmM}*)W`a;kOed4ymHGDk zFj~yVbB|XVemQ;fBHpxBhT~1i55scBy-9q2=kh=)2Ba~i`LuQ8)&_eoA{-t z6>9#{rYl zRB;I>FsadFInNsc3z#(^kLeG0MVF~8*KFs33Nlznt{xRK^_4+(Qrq{iwEW2Xd;96x zwYI>hsaVv6bJ{L@UHLG}HNdy#6vjo#WX?T&#FkekMJ9%g8s9V97f?R_y(y z$-??m_cdjsT$+RN!rS%1bRzM*Yp|UVEoAA(`%r*nrP1oLJ8mvj?e6{{*}tm!Nvzf4 z>6U`2`R?VC?*o!pRKJmgWZ#&er_`@br-i1NS)G;;pCqDz~v z5zb;4#y+7@p;)+fJ?V^%QTf~gYqm>~+_xuKVh`6{+fb^G=E8rk>y(eG`XFd?`3+gL)DMC;GSKLTxiGct;@>bY5H?Gd zM$K=t5m3TfGn&RTank@=K_clsBVXD47)qDa=ZLp^7b$tp`AVLPz*_E$qCXHM`{@gu z+CAWo$yYpG`*?j76!H?~zHIeW5lgA2xb@Q<5*0zpQN%k2L(J-9ug)b(6a_}$L(Q*9 zXiJ zck&rHC)NA8&&*spyc1nDHh@Bwz4%22HOBLEK7^`$Zvr`f$m9?r<#%u9W^>6Y5EqFJ z2`W1MMZdDSzyQU=k5U5jyds#btd0ZXsD3Mc3RWhT4JgfX}AQ zO&ZPmih)bPv8lc;Ko_fyWFkYb_NIL-hq=;eX3tj5S+Y2qE$`M$9)_aGxq+KdNOe>|ZB zcv3r~rP@HRczw~~VZD<&&?=k}^SN@OOQy6x42OmLy~2mpZJpv}jS_7Mjpf^2UYpA} zjfBv>QzkwZ`5y`i6R)O!s>x-97(J_T+}~DFS0&_FqvVq)becB;S9#chpu|-vF!Hx-fDpM&cmh3_QOknbe zmiwHj8g?bo+tos|HGrSIdkZ(}>GM?pax_L?NsKV+RuzC;{0GmY=xqV+d{Tul;C-Fb z#`!BWg3@;sT(SLv^_2Osg-a@chqlX$u)+UR*jqqF^{!#xf`WjA2*}U^N=r9Gh=htT zbV+wNNOz}*AUTxMjYvs%cQ;5Q4BhZP{NsG*eCu87buE{~u-(kw`-%I$uHSXTi>w8t zY!0p`-|cK{23cRTd0F*9)RSj)Q>jj9&1S3El9Q8#R^u zQ_f?`$Oe~PyridPJH27|MP%K*V}SUE*Ez!(OLuAt8a=_R6<>|*6NO8UE&u9GhI7g@ zUc1NWR;iii-`~baP{H1cK%;ih;l7&d%iCUwj57s`*+uhMamv=#pU`oTVQH-@EaTEj zKS@LjCEhNU+I$$HxE+qQMY-Q4{JNHY?coEK76o>9cotfJAcQgLv8N$5dxwvt-ES*i z>Rmx`|Lm7|X6oZyEiuO?ZW{GwI;Q!n^sJVrJ#wj&5Q@=$eQ!U>tTkg z0dG*(Ya&*yyCuz_XcwR}TVS>(3y)%&dFIVUR5w*N$fU4y|Gm{d)kW-8n0CoU=y{X0 zul%ah!YEGaheYNl@X$&kEc>Y9%1;am?#}9)H}?jLt;Jn?PQNgn3lAD|NzQTT&d73j zm+katI_0W;9L)L!npmcrFu&}K0Hqh}WY>9U80o>%XUfv=P&CTL(jd0-sT0!DxtIKP zFL{Rm?I@Heb+BB)>2!DQ=oeSMN~Zm~%*7^K<|~UQJf_29b>Y_uyrB~kj%jF2I~}di z(7bmTNOT@GKU8Z*F=6f*mYnIjBZ6jwX+HdUt@Sda+lwK6mvnb(UHtr4*RHPK=qKM3 zg)G%)!?=xswr3&=M-~jWXMJo>X$A3SA3g0XzFc1ITS;rU)aaIYzE&(hSVz0zb%mN| zy)RNx2#>ex#@X(7P47fj`3?6#<})Ji_$>@^DSMiz};E!wM*&oon#+Pa-ahsR8>a`m@r zt(k5vLkwpy;GVg|WY#mGpSL@LvR4T+kM}o}sVb^58DJeXnft$8c!>$Q{p1gDMs)t1 z+f-Zt|D@dK5inZvDT&``T59e`?O9+%I`v3>BYW2pDQ39zY-Qp>z~$V}_;dtfZDq z9>1hoF%!Oj0vq$g+Bp8~<*Q|{jp?fwhdyAHBI+r1Q&2@{&LuA?4^E_eHsUe+N)Ba1%C3c!}!Ye!wId$X&_oF3J0lP-WO4%yfWkADq;{F`M(N#SxYf2DY2wWEXJdBv>aUiH)LJFBu#a#^M=f!&Ph%Vqq;fOfC)BMHT>8 z5nW^x_fmnlGSg}s!+3wW&7sCN?(}cZ;lEf}mxsPoDQ#ViMUO(bq0mrq#y zU5Il>3A#%K}mcVWwNh9H*M03l@8tOQwg;=FS&S%1`P|;yUV8Uw0dX_XxO5 z%kzHR7UxW6Z<}ukHebc>eiL8*j)4)u7o~C5E?Y(bF#$~c$q<8faf3fMz_;b zlLcOCUM9Y|R~{$R$AW$!qF*I9ik^Z#X z9{3HyG8WFRsjV9vmv8r%>G~GLLSDG}(JEIB6cQV_5PoXw5)w^Ey|!g*geDp!zaLog zTDsRRo$7N>Dani6^Qp{21B7U|mg?nWonwsW%`Ln1eTdQ*3*fd7N#8EsH1xuUpY&OP zelOz4E54*9nWb%&q@a;T?SO?fCgPUMM9 z0@FD?q(>PEQ~rF9;xyweoFUV`fgsMYH`L>ak5+7%`uOF&+Y4=>7FlyE9mFR+h@#YF!2aBd&>q z`rjx&sSfC?OZXRz3~GG6*ZyPNrA)r(+~LYJOIO`DCK`vaUZdSXqFw^d`IW8i7+R$N zjj$p0&OicskYrH$1o*sID#O&v*fqkN1Fu}UDg!k|`y!vMvAi_rbm-ZxHpP;CP&Y#H z*jZtRx_9eHPX|?k4P$gSP_ScQdHK9tm7|@P_PLWAY>=|CtzR={C)@UXesPOm z7ndM;joI*%B4&-nFR2!XYEP)Ke0{)1co|iKyPKf0u=vracj~mnjwa4%zv;0|)_|u- z5~clq{tQa8fCpygjB-;$gk_Eg&@Ru<)NRvu<3&9BHM{o?r{hLS;)@Lf&iWSDqDBRK z=EOEju$^Rzni2pKifzD%BYM`0?-z z)BQZxHwAVRX5oU7p_seed34BQ8=VGi(p^!HZDmelip$5_8n^dL=IwV zD_v|flyWTx+KoU3Y<+<)gw$>gTKIO{w?+EJ2N<^&U496~kBQ{p2R?Nj-DCD6X`eA- zzoOQ+)TqAeDqJl zy(Q)ArZbP!g}Qs) z8iv2LImzjsz8KZ>`F8yw6W?vd<_pO=67>N}tGVCW-P%{!SXRiE2aS{3&Y02i?&h zZ44gI;PraRDVLS6Z49*UD@OS%wmC&kn^u4iQ9uuV_0#ucoL%r$aOy*DmL#8| zKZ$8h(ub!*Icfso$v+-Je7R=EZRwYJqfC9AYd@ktfXtbr zrPi=gq;#4P{9~G8q}-&JVhlAle_SMDtAEQG`*q_7>?7JIQ+fZT&*-{Yx&y&|j{L8$ z{mq86ko>O;@HgV)Cjhho3?I;N{G;0tqnh~--vW$Ze~~l()d7KP__vM&U^1NUs1>wj z=&$|LDjnC}6GcgRyL9H*W2=J~sKcY2V2j+-0|6xIV@2~+r; zL?)P17P`R)Vzo||L%@H?3Bswcwk9OO3KjS1Q=@akP_c|}&w)S$P?gB;^l2d*$$Vv* z1|iEAL4;&v5jiLDGBMJ&( z|M^Hc`y1l@OQA|ba*1lvvflF;L)XBWrdJ51%jNCusLuGHIFv8wrZpd z3UMkofSFTG4!)Z>#H>HpHOJ5|v*!`?`H#Qm&S!9;dP`QDM7u`iLHw`)3W!uWUHD-y z@wO?&^O)!q#?jlt_%mdO>>#|xk9LJBpO?v7Sn#^y_Xl8BV`Nz5W^~3>LL`cXOw}%E zrDCTJH;k%w_>B|x*BMUg1zs)hFf%A<(yy?LqPu0rvb8fxL|WN7WJocXHDn1`^YS$ZQ=_b_~#<Ee{3Z9QJ_Xql)mO*Mu!xjsJceMHY#@9n?Xa%DRQO_LJ%Mmt+YT*+jvYLPm#-u^FPDQ4qah&h(PQ`-N z$?Z%D`72DkxANRQXp7o4l~UOSYXX)$X7rj8UvA9Ra5IcqL~+#nOmZ7P*itU^Zuc;v z^4C-uJN0nbH2INGrXUS%E71K@vgJU>lOL527s4x|(POojRq56EiQ7`k>90^h!)r5! zBdPpev?VcCuJ#Yz1F??cPPN5c6X|43Zl3ILkHsLGHU_$KA-XX61soZIM5#1 zi1%bkmv)Uk9KscX%ztC384$?*Nff>%&XJ+lF@>m4Pb;$){Pr#ek2-GWl})4g5BelL zkFUw{)k!5T@1^i}cQS;8B^KJn*=$qK1wBhkht@W)n;6tM`Q!Tho*W0QB;H~bkj*@$ zS1^(&&LzQxIFNamtx1N3>}Q%hb!O0dNNZi{k%3ORu99hz%Wo6Kot@^~uQ|zzEuQZv zd1k%sOEu(n$4uqLz2D0v2g1#}UyXHvBY+odB zofM#*&TmAm1ZcG&}D*n-K_UbsD(5$MBmGZDPg@ zsCkXXM0g$J^Lk7QC*yl^;`kmCJM9LgU)N^5FZ~Ru=p8FlEX*5soT<2{BsJPr#K@En zCY(6SMumRT&J@AzT7j?XEa_K3AGx2u*md>`h|R94S2>YPr^*cZUwRe%wYHC^W#8D)jR_Xnp6q8|pK2++>M5fpXdJ#lv6K^#6Z!r7rJP5jE43)OclCMd5ZS8>>3PZ>_bEd3oFV#a= z2;C9Mj?XJtZXRZ5y4Pv3mMbugpIC-}c6_M2cQZGc)m`b)p_S~20J<0;PW zH}oZNGrGshpi$1{9FWG(J>?2&4a)AofQRaKzoI^HAoNK3I*52MVtJIKN&ZNtH2s;) z!bjocu(7~wAsL#gLh`_FGHoQ78tI_tqAHVW4eELwgn~27qxEP1Mr2~)#bSXrm7^kF zh=oQ74(vg;d!!BB2Lf!FvHAJ$jFcbYPzD?%y3%WYO6O17CQNkQFA7i2+QK zZNOiBXa7DGIYEKZ%<`8${?5qN7SQ;{|G|RT8)sgbB2wSas{+3J$+Sqcve_0`I|#Pv zkOTzh;psrW! zR5tVDrP8w515kg7dF4y;a76I4UK17cJ_!p0i~=RZsOd$R5G;!pH-5MVc?(-L@a+C> zoypIRlE_#lgkrjuFc!@J*@TOxT;3Y%>==6dZ*=n93&lIvhAiU8c_IpY79Xm#<^7>J zAbTA$K8!9HSCc!y5ao7bqQQ=pMW)>NZ86ua@F3o67*p8DIS(D@K3w_516Z7q8%CMT zyerXT7kG*~8*-m3tR>~F^~IBr#*i~fuByu1*Q2NrUl);xzw#B%-@5nvp&Rok!IfIMw5j?;zoz!yW(SSvgTMu{)% zv`G|tl@#eUNFU*7wwKhLFREs;IPK0wyiDTOTPRi`5D?S1siUGBD`8PCR`cC;?4ed! z;x}@xsd^HSOwwX2((G|8e+RxbN}3tZ2i%}`W%IHrY$F8zh~PMqThG6{C}VVXb;6lZ?(@!1#r;_N zrl~1cnt8I!o?0ONMnww`l~*VNT=eG8(jj~;QpGl#alw^=v@Y(O+~T5itse3r92LO=q9`LU2IdclR8dIvHsHN z5Cm#~ue=Kl2@2JD56didnUi;xi2wNeRj`0^;e3P}F&y7NWiI4cl4aX)0=DbjGaq(Q z-sM0MG%?WB_=>u8C5HriM>RzIT5r@hXtGk5VAgkc(*c%oRpPYi8eh({6n80CFn>LB z$_b43I)y#_588f_YIEdXoiL|{`P_e~8+@S^n6tvJ(+SzBJIhc@1!Fvsb0ShlwD~82 z%KLW4Jr9yV)41M&pii*=~tkE zBU`Ahq^TxNmr_w~*yl?+RsN#tJ<|=xb)FC)=@F%_B-yO~`2&EYV2Bbsd2qK8`7&zw z8u8<4_2C+a-{VU*zTXn{POq1EUC9o{O}}4?uPP6I5%5Cd#itMX)#pYHYnwKkW>39N zeR7XZStbmh*}t>%O*okVDuAzy>$IM8X38b^$Brb&Z8K?<+ygCq(RR#DE_b$w(%#My zZ^o6w9+x@|?Edok$Yb{XOG`Kpdeg`@)9cu<|8Eaxkc9ZQ#`mQVxr47mR%hP@Ki;17 zJg8XYMz^OAP(Gc}4{+4X;N+zk=a;?ye#nd*?sc81u_Mg^7+dw!nUYbWaqo$g3@hSM z8TyOmtDkg#VgBCK4!FppIlGuFEG$e~zt9ZFu6$8QmlS`7%Sh2>gb}>Vn9#ieoq6$1 z`4^5g-LVWA$qH(M3-{LqTU0U{ zeK|TO?D-EA^TMF9+jRy(p^l?h{GA_)$w+DU{9i{u;TPV%T4_<(Qlu|6U6D}QhZZxW zT-s7U6OsI02?3^BK`zf-5Sl!w9;E$-_FO`{X!qZC9C#T?&@Y5jFJtfVDD*8`&^%B zpC{yl*6n;=`tw0tmHEV)JyZ`N}Fp;ol za-=#gJg%l{5u{oY!_St7jR)ZAusy9BYl5X<);M8ptvhtH-$WzQea`o`ZUxVHtVU%| z^UIjC&#r$2(mM8|&;|2IjJw6S$n1A?r+1^Dfn|Iv5X#@!IWIc_d0GgC*AWI%_TK=q>Lu_uN47p0^_fI0O*loAgXzdd zmXm+B?Fv5Bkh=vCr#|yKs{^cXB=5ex5sC@{_vOPgMz#ql=w`>BIC+-6ZGn8u|dD^^EM|?TxN)SvKy|>4! z=jBoK6p}vTW(gO`m9HduBc~AH3VK{}Tg?AL2Q>2$+-J=r0K>&~#`?tZ{NTm=WL_kq z;q2FUDBxE_JWfny2JAdDAIh9)|b|3&Ll|8Y9Xu5hS_p84o!~#Hshl;g@ui^PXx844-!Tp>aT%LeC zS^ZLTfa?b;Ir+co%Ttke)83l5pFR>VuabfjcddmIuVMj82YoHUvy>6P*BdT|N{M!3 z(b>w6$ZWfX%?eRzgFa)pw%2(8_TCS}9wWg-Ep8MjkVT9SQDMO%&jA@;{M1%Y9s7YU z=ZX|iDh+2#)T$;RmzWZb#~x3*5iYiW*C;Bl~!OmQ}tMQV! zEr;b`zIPN>R>!T;1{8Sx&4oE8g%BwbyFnv}^gFr&qJ3(xDk2W7zrAr26Bpmy76r;W zF3t!d4%FM5(*~~JxIX}b$QQhk8P*H+Kw-=+bg@C5@^Gx)!!4YY@5x>2VJJTRV5TIF zVCqP!*9{-gvPS@z(=v$i6iMVXb-+_QxqX)^B5I;Y5{Ehrx24JJOK1M%@)(i5)W?<86wMmJ)mPUi^ zu&m}{lTs`9=Btn8)$F~!lf7y`RpyHUw zux|xwc`CP)oeScXjg4Rc0@~pGwd=4mi7R}46mwGuC`cf3`1>$!Hb`}(^t!p)s#Fox zZUrSkU^DxBm_daSDeHWxG-dfsQH2(X_p`-zOADkiWZvxgtxQUHE?AQvjGBaAU9VGG z|55HtVJmde32AQACUODY$)QZYhd3K=9#cz}8}&DaZ;m)T52jw=0wqUU8PbXCB;F|M zofIJt;vgKd;nz`kz5t(>E6Jn3@EPUNTK?@eCsaC~mHdO^_h^sr@q{BB#Q->C%4=Vw zOaL(Meo0A5LY)@aow`GXJ#?O4mQg^ow(JX*(@P*3avTR0jTc&p4qNcNER6hRXM@h& z#R$@rE^w!tEGN@foc40q2QrhVz{1Xil^h zydz9$y*~wbkcz5?P^*(?@IyX_0vY37k=ei=VesoYk1pe)T+iXporfK4B+(7G?!WiA zG(EJ6wLd4#l%}~{`yT*<-XK_Gky`Ev-=4!rq5Hy;lN?l{7VMJF%W03n^V}qSvyX$t z{ouRT&0%VeR$WbfNeOx?(%t!)a?h;LeNFW^Nw7lYwOJG)lkSeD4wB&kY3lA5o7w!` zqv@|7&KZXews{ySo`T5C(dZ&{Jemzorm#0(6#w()`(^W}Ne0;^Xy+uc2-~f*=-edJ z4p@(bwsBhl87m+-3qB!dw8hsR@2Q88;s@v{Ovt40n>y?HhxkE9^HpFtOif6nyv`4( zMLjN#h77YIFPD$D#`2Fj*EyD39nlTL-^l%XX4{C447t?6{RxR+*P86HEQjGwta{^x zI|I+A_`iz|Vdo5VS#-YiA9|%&Gw?-vwl=g_q<5r>zSkL(n6l4ZDgHg@OMg&K3Q=9$ z{L`9)cgeLc2(#$!xRG(UPJDAD1gx8&i||*=z?Mq=?lqKs5k~Irsb7W^|N9_+m85`N z8gx7Vr&e$BKMS}!BdCnnT>~M5=igZsG$Zbg4E~!sAlv${LjBz*8`A&NHTb6}{ugI@ z>aMe~EcTEE~H|MJ^R34!PupX8}B2IHYry!X^kXL3Q^;lF++DKJ|j zPj7Sa6UmEh?$@~&FOQ7-rRWM(Eu#MStU;d>#Ek@kDZR-B!TDomJHqLq`x4Y3(GX~8 zc}-RS=bb2f>pW~DW<$(Q_6K`Tr04p^qTS0rOjK>3n9k_wiO%Qtv%qBh2RbU|Mii9Pohq7|cGeTA;|c;b zc}6^1oZa(Pw&tuqS}-Y4LiyJt0*2s`Y_B#T3cq2+FN2~G;2-ZT-~eN5lmGt8opTmE zsCYmzDyEDAuPM|1#tIb_WOE&*6J$yMH9t1%6uF~@cP(&UYq^KO$3J{v&k~R}5q&RQ z&;##l^WKLzP)iqI)jtjU%{025*&t_&WQUh~;(=RfX+Jw4o1(D7r?PdH`)Zwk75l#7>^xIc#eMJL6?? z)TkMpC6`NFBW=tkgn~~_`5Xs!TK93PLH|0|y|#CJ9&5csnkOI}rCxELwyKq9x$=d1ed}0z3RE-N1lGqgO`}!S=#X<|17@{-W zmJa^mi)tWLExYZ_I1s%D)uqR}2$Sd2<74NN`6$e?L5hSl43UFs`NKbKK<~F6U24+L?)xC(1 zF1i=zA0WHL!4d)BNo@!gB}qw>$F@Pn`zN#M$=*{ zek=-1PVR?nCyhfvtFYASIzXg$JP##g4CQBth>F6|(1=UR zsG(%FQ@Yc71unORZk7?vtlSQpsR4qkgJ<&EO^HSLbF~&U=}9{6e)OfKB?y~4WcZs* z$a|uZ?Q6A4tCv*G%}O_`$F8f%-CJ31{ybJOrrmk^O;>$0?Ac2{&lYOlgD|{_JT*-} ziXItAcyKUqAI~|uuJydZ?@@cb+H`HqZ$_zsrK82P*v|Fc2Ao_JM;r* zk7+T&fr=NkA0vM2PZhbb@91)m*HWfI^oHOUfM;UZ=KE@OmW`Yp)i4m~Arxm5waF*y zd;R#B^=WC;9@UxAGpm64cKbuX%FSr8ZtfX*r2BD~nuZ1wIJ*#!stdnL1U+neEgdAW z&~n&;v$$tZCghXud^O|RE#+z_{N&XuAGEMv`PqBos4F$uw7#$Rmd_7^(2kCMqr4uI zt5phc3yQ1Sco*TH&s7CHglT_~2b10tLb&4hID(nHYub#tB@w}At;`D|$#n$&SQFG- zycN^yem%H2oFb)NT7D@LrLBUP>!Qe|ed{!de~!iL<~-?U?8AxRT5@tU(3b#b9fVCT z7PUKvOH7>C6y)99yjDwTRl~7r_Ami9$YyOP*8M%FOAp%f~!_;gat^WS&XO5 zdCSD04-SH_H}xC4U9Vk_kL;|iSt=qP$9h&o(zO*g;vqvUbrpkFb-x$`L8z_tUX}aC zAf+o`1LUqyqh2NJr8cYl<_(&LCM?70k9w8+Dm$>%-YrYFSW2At^;|uadk5fxepBVf z+hqeO0+I_*bZyTY&yCsK73&OZRA>Z|AU`v5>-mEg5*}m+g}STr14C?O&j<=L9st%mB<+f$uoano|yC8G6bY9z+ zxM#l5T*bq^dJhTdhF|cM2S}j-RltAx>odn?cr);GKQ8JnH=mHvG%EU#D~OY!x-I` zwK3qIJx;Jtt4Lct%ui%{1b(^Hs%7v_-a~&u=Zv^?@&qNxpC3{hyRP(bIW@)i#k2N`G983-N zyoG(unWhk&QEn7g?e}sIp?Upu8EK-L(EDwQ`C>=0@QC5tlc7_{ucIG)ufeWI{+%L# zzt{Z=2ui&ns-=D9qNxHL z4r}J?T&XmtIf;L(-k2%nr-8UKVlf7#yc}vPV9xaoQZIh9!)u37u5>k< zd_{t}9P%%Q`tnHh*EsBci?ReZ>?0?T8lHZ*F_l>hH~MX{^@aYzE$2gabr^--)^c+qA2!U3WEaF^ILo(QbwJO9&EAA)V&@=tK`e3pta?7 zn9?*%NHT<2daz1@-u=dw-ThN9F&ty-O6YRnG)Fccmw~V=W)M!xh8L1|yJnwGyi5Ku z(pt!$D7q3p;$V)Zd9;R)ShQC2;yrajCN(pUtkO>%$^|9hX9jLT*7%}&Mau?*;to)V zca7VXoN0I%c`i$OCmtgLC_%>3n!8=^>Z%6&dVoA3Bk6CVJbAuw{QIqkETmA!AQTr4 z2vTL=r5pjdT<1jCZ00A{?rexe>U^C;YbJnQyXpj>EN!+ovS2N`*E)sTM2g^ z&C|a|82!wBP0?ml%5us}27r(fPJ#lw2}Oi7!U5QJcBZb`p}28XQDA$ixcWA` zPF-nhu2@5^BdyR0jI<68!P1m0TEBuz^(D3)+CBGG?He(h6+kN7CmKfvLDhiTOGA{n zwY|WObh*qx*V-LIE{D#?SYN@u(GU#FKEpO)Zl`&*E(;HR1{fv$i8E3AF1+)~hO1 zYF>)xmym$O2r+;4wL1Mzf!V2c+!EiA6J5v{Od4%XSg}d%+VL;%#msyiK3tZBA5=o_ zYoU-|?ntiTcYWF!!H@S+U%lYPq{Z25tG|ADRB^QPLfgpSZv-zeyZ3u-p5^_4mVpfS zX`D|?=M8L!jgC9yn+0F9J2g=AqcocT#0NQ_oaL%3fSIlL-IWlGuZ&WADI-VNJkzRX z;(QP*97=$kx*<8aN?4d`l!{dy^l0f+PRc{;53WxS#g`&!|nu~FO8^HS_PEN*S)%x|Hhe!{hViB7J(i(E} zh52P0N;$rW8f;nxWBhPmm~)Ik?z3NI+wpWlo~hbo@B6n(jgxMIoH^ zb#Ja#(oZ(cbbo<`^}a*(2V7SJEkn1mw>KT@CI2WH*Qf;bu%&b>g#~A&;Yi zIEf}DJ5IQMB!X4%hp_}97MpN~Uv~S-_$Ftm+mTR zWej2vM93C?be3>;X2{R(;nc_}Rw+Hb8mejxa=r8$*KA%{#ItdF9}$%>@Q`BptH$@z zqnxkvKoa;wE(9CqP_&~45@d8yWJw0KknpKxJfctZ)m5qeRYqNr-P0%f|js3{2p#QBq*Fr62Jh-Tp1@D!2 z^b2hYin(9CbOXz6VaGA2KzP65DWX!WIVO$HVeGn34p@+LAa5kSm8ewD{xuE`2bAqe zTb3=;g2Ztfdv^;GHQM7^#Q--T%`p>}H{D>TVn@{&9!GGxpMiuqeg3QjZp%C&zV3Vs zrX-Q}pzQNJs_q}*&ZR7nB(?o21jNRz*KY(A&pN0adlTYp+E-rRwQJV3L7(xC{(z}$ zBQ{7yYU@FM3o1uu_j-#LBcz$nryz!(_V&z1OMI+CJ2##&&On{UFO9=~@;JMmF)2rR z^KI@(zlYl6xm{_`(tCFuQ$*?+&Kl2QYF#e`?>niX<1rAS5KzWFrW%Q2I-Fad09g+Ztwjq(|MK z(OP+{m=;4?_w*Vg^*VETk$$;LAG6@A!hPw@d1n4P`V({`C;Hs=wkRkUslHD(8qe>y z*DP4D%#*o$yRQ0OJGSw>E*La2@&02oGF!(_BB3u{=LQ}&G00ei3lsAvE}1rNm9PCu zoo!2~+a9c^Ny4Cc9g0DQOZoa3lmfymkl`j+vS6ijv(vX>^P47d=R`EOZ_oXh`y~$aiXE<)UmlOqr>n`>kw=oorG373Stu(*+FWb2Uyw zd!c%2&b^cF>}yt-YrXKyQ}e#9F_Za%1ah`dGlu8t^xiMknrFRszU1fcX1AA}ouBLd zMAjkaXkID&&}5s5`s6dI;%YoF?bD)t5636IG|C6}*)rmH3if&Wv=PqSZOITb%e9DK zsPhq~CeG!y;aFwjr7)ZC6*FK3>?gLM$)}43aQ-G)28O9aK)N-#INIdL5RV1KqzGcJ z;nV~$BLCcint#s*L)X{8wtS@te?Bq4*20AFNNbL)r@_h(_z%8Zl`E<`tzloCVpSZu znEA_AbVn2Yarm~r!lIBlvq2Qknua2O#Zevk?0VP+lf&aBG-7fkf4yyD8#NrTWdkjE zBU2IKMxYewW>yc(BAs3{LcT(ifjf^hmYWx_o%Bb1V_9%Wr&vxM1*n9V&yJvX#Q|_M#Y>?q> z3vqqy()uH1EWw=vV)CH*Gwh^zUNaH`Ri2Q>|4E7 z8EZk7dNkN24IW%b1kP}cP+cuAN~)gH>Iy7(RMXqL$b6**G=33QlfvmlLY&UF}d24FJ~VCy!ji`0#a?I}3r^He`+ScX#Hp3P(z_PinK zNIkc|E%-{*(G+j}jfE}AnIsQ72xR@S`so9TifwYM%g}Zj0 zFdX7nCKuF*Rv&RR5wI02?PUwY5kV7Z7Y~^rmk0$!86PljZdK2KU394H8UU-3bY0$eW8iByq`!BGgjCOgnAKf4*lqZE%&>CS<L~AVY^LDwBM=;&18@t>ze+;t%M!Kdjzk+DYm(as}(a zannhSs3DrI$x{8Zr63AUv@w7fV;&Y`b8TDNO$c)Q9Wt}%qW6o(tkE0E1X#Xrn4U~! z?BKxXrD3AQx+_R3v-P)-fz;WKA%e{4wGo_8J1cu^ZeGpO2cUIES85Q05bF?6%PJ7B zt3#Sr%C;7p7qzCaeM0L&5>1O;RqD8{3=9{XO>~)s{JD(^?zdXN^N+hs=N$fg|M)&A zEs1B#q%0?nmv))fyPq%a>=b0mk$U@6J+{?B5f7b$D|APC!* zE75tSSgb_`1O|hIBGH}7u|I%`B1na2>GIao|2Kt)FYI<7UFdyQBmI=HTz2K7-YDL` z+kE8+u_S8Q0NI)moiCf*%PEOlAqyzL zez!T`(M96Q=bN@J}8s=YsHlLBe^zvgMI zbtg_)9P_1f>Xp__&o9!iZQ6$m+T(%AExiNxRwZ$W9{V}2v&zMzU@4R^}#Ao!j9<||9_Z*jMo zpO!Tl9Vb2@lAY-(h$}BuwSdiol%AhpW}$GR0G1e_{TVHWE^R9UPTo!i4xqy(pZ_i2ECaf1jjP#0Hze=-Th+!Ne5RD+S$Kg$wCGu46yMImz{PU*|6EoVp zNTWKViJp~JRx(9TPtSqz7g#Gd5W(qa^z=bYrS|8BK6DIAkWdaY7IkEop&`jCj z|NLyJVB-6hd${L;(#H^6Dqc44qr4ovV-n{KOmDqI!Ow)0p$T9k;Pc$XO60%K8FhqJ zR;-_L?~@y*jVrBl2EfpwiVb~ZYncuH_w8nSIunBhXM+U&(&rp=BjA-Q_NVPuoto}d z{I3Je?W?UzyS{{~F?zQD`|E(TWc;h2uI7I^t3aIx+_D*WfLPE)z55vabM*A@2I@cG zto-y>@AR*4frjfHzxO|{-FW$T`}3bKScBNJ{~YGI>!ZIlcz+*vhy>+In3Dd`5~098 Rb`Sh{D=s5eB&y^4e*mPqi%9?g literal 89020 zcmeFZXH=8zwl$nUXcC%$L=Y*`6eWZbrGs?of}+v_C_RAEdsBMnL3-~hO?n3@qI8H5 zKzc8s_maHf+0WkR?DL*|zVn^&zCXS(z8`@R#<+8>`@XKMHRoJ&5u&NCNO6tv8UO&G zP*#$A3IGs&1^@^=NeS?O@o}^IivI<4c&hjqP||;E4gUsYE~6#`0F+0OUl!Z zy>tKoZjN5PfRLe|7ytm5rz|I<<7&8hNscPfeK|wka!__`du+>ewDqugsC;sW_;VHd z6AyES1!l|Ek^j^42U;SicVNGG(7RV6(%qIzpxgYxq_5ampMwGjLOFah-^bq}<6r}F zC_N(LVB?_UsVeqvImb>7`1Bn&XRNqISr;E0Y@9`in3bHil(_Y|4Xk)ipC<_poR`GM zJ4ii!vl8Dx^@jtGOW)5R-TwUFb?-(oydF}O@6I0Z78tg?+hg&{;|Vo^Wn6BW4@luI z!uaY}hgG0Wn_qiMYUe`}8W%aC-n(Hw%jVw8E8bfxg_b6oxXl6Vec@2_`wZM^MnMw9 zg7C|;;E-U7;9Yiq_#+awF0EGnIDj$Aj5q-H)Ee>;%$S+51+w_e&4%s;rB)jZg96kZ z^9!>FUaK-j&|0mzyNSaLerO;Ar^np{Z#liQa-k7qpbnwHfG2zJ!G9H16`4}Er;g~v zfHX~cP2#TESedtJg{xK^yR>Piy|Nz?Vl^IeDykG5%FBM>P8*Vic3)wPy?_CxlE+k- z+TSV~3$-OwrRgytisujL%7HLLxk2J>J~pnJ3}Y_8##?ZTE~R4Q7XlW(hV`_W#p&-6 zg0%J%&dRi4IN9nGZ!5ur{{ED?!Z_`Qu*5oFB^wKKwAu6WBK2Z5<^afYYCe9K81-mU zbP(EN4#7ld+J0qKy z20JVfPL8jy*B@NbaIEA^|p_v>(Upo`h_S#J3SFhe!TW{ z&E9VpiiXr|o=~^n9@|YT89vw#42HFKGtIpCBemB9U1@6-WYwUtX*+5gk%9(tJBGm! zzJcrtOr;OU-H{eg3+$jSft7p#`<{8@k?O@;RTkPC^zx!l>ZKF%GRSz=g;i7PDTtA# z3Varai)36NLLq@C|M6OvQJ!F(|h!+G{8VUT=i8L0SRO=Mu(ED*&Djz0c9l<)OlABvtuj%7ujq zGaz8Yw^G)x`tedwXmsm->_Lpub@yq$B1Y^tm9DMAA^d44*YfORU(4y1K#vaC?tOs zB+8h=8Kth+grP2$>;!k2qE%@0h8Y@u0U6r7&M4^(RvGb0Y%M$GZdMd{1@TVa%E7E7 zf{!^HIC^^VDZ7vW?bxy7koaUXOzN>xjt~NdPO_s?1(zfzMnoU7#GEwXM!LX7ixdEgmN^~%0!p2L9 zVdPwFkRAr;^bID~-X97Tg|S_$vS3Qp$z))s#3&!X64js35tDI(ON^Y2J7}MtUwFGJy z@aqS^Kr4izmH)ODgIfG5YS@rK7})jwqh#)#`9Z@pipfJZu+EpZIwCp~x~hnqPO8v| zj+((Yj%=f58?u36*B#}-(lFNSHk1?Yzg%VmtAW2k1qKsjwdCts9vR&Z039JaqpHEN zPuY0B)tG)+9IZ}ADk=$HJ)5^ifAcr@#@W2^i>58yU(12U$hs--t3*lhn0s3+h3hpK z`MFJ>KTmhS{1o(d`RlOfuw1UbG*5Hds#`I19FkA>)qmSbFHZ0K9WX!$woabiC-ziF zEVkuXAUT|DTIre2ZX57xykY4Ty2+y~my*nP??~9K@wMjAWanYhWElh%Edqd3t0p*8 zhKAJ_nhvV8Blxcq=7rgwDX0?5TkHSGp{O;Hoyj3L(=XemDRZ2tx3E$XySWa@$FL_G z-a}Eo?)%*xW&87!mWEZEl7*^qt3GgtQN!}9s9UAo<_NMwZ%PxfFF&R$R#ReTvhNIRR%GbKf2Hej zu+6;380k?b+%dKu7qk(P0KVtmP+O1lAhr~)*JnwYFeFgxbZwBNP*;$Ut?{C_tY<`s zBNm8|@`GEC&55gw;Tu@p^3op*oB^TJd?n3{mNq0UkiycA4=yPBKq-!$0k_F#d#NSJH3VZK6@vlHDFxR%=jNWhh7s zGIs`1vljw@U8~3p>3aWh0cv5>q5+EMo5UM!&ZJ-~IxAR8qTom-SFBk|7G^jvJwiSL zsVZQh&BRsZ=-#GeWuxy-t1xwFS)$(giYWF;Ltkbw(5u@oQsxa^YYz%uCmkpD5z3yk z_<@ky%(qG4SqkEM3XEFKLc7f1*=Duwqzz%?Ya4KKD2l8V@yGjdqWNbeNY)mZ32oX5 zoc?}!QCf&=-h{$a^P85UH&dd)$m;~*L)Pij4v0OIYOow8JBcEP)8yd`s%lw;W{zgq zct>gyv2cvgBp8{%cW86}|73g?cCQ+w8`m=_79T3uWYf;%`*Xsp1ZhfjCY9Fj-%;Z> zrH#!}d+ZBy?;G);R5k4V=vQbURAF2x_g_8C2o<|;g$rC2nQK1Yib*-`P43!jo5uo`%B1`XrEcy6em}zSdtDV~ z1`q!j>_qT2=VzmoZ~Zzs>!lRXK>^3hKhWa6lzaR|{2arp;W6@8>NIefaynZpXes;d zL$e&pTe8!`DqhGM1p+5e(VBG~jE_i~ZSoLj@^YCASU>`G0~qb|MpF>+G01nOAfgFG zqrS>#3#R24CIHbx)k%VbvP{%Fh3p zLiLXb8aj)B-P?_MvM!DuRm5msS-JOGjWA@cf+3}WA?aY4Xj8B0h^xaV?E;Z+;@b9F zBSg1Q;*kWzg_9lBHYuy94!Lr2Ic_eyr~AHMWc&f_a0|`JG|{O}dX?8H`Z0h~rI-uK ztf$9Pe~)UAdCIUDc=VH+#+c4dm8nSUSgQK(7v*jF;DcFqe^yE1a32OpbB}hnIqHY4 zM%tE+0zBRX2lIzM%#T17p0nuDFbNf6)YG=!p{8+HkNAlP!90UB*LM~y1!_wdaa6i_ z+8$5qZMRfpcgtBsUW;zOcE4XtL*fus(J#7jRi1XfkwfbiV=pRdPq|2mtEi+{uFsmb zuLKP)&Kdiv&C&!v9$C>msJjLMYxzH6X}E_DsTwbQTXZl-ayz1zB#m$PX_zy^6q8%Y zWstvq zq}6T^L;z9!Www&i$3ZMSTUA|ZVnWd8Okkinh4X?qjk4i6fk_3%7C94>Ub$9iZKWv& zOIcfeUHNt`&pESpz7J%w%6XslRluoynx*t)j}nEoK2ls*Z9&-Hl2lYU8_fX-FstW@ zEsJ8@5~XWJe1eP3*l@uLfu&Vm^t7}V)wHYr>)7q~!V1bHJj_o)x>%n_9^|Si8fXVh zgp8{ya_2;-K&uEl>Fv0vWueBvA;wv>p@P+m1*?T3OU6<^71_ZenocetL})}l z=Dionek=<>tX(yJY9<&WL*ZJC`J9+2U6Cfu;8^=7*wcD*_E0m0mKsNvxMi0){q@~? z1aE=<73wY)-zetA?LG`LP}idC6c-1MH@IxOt)#gO$unRkYqr1k@HJfQ^+g^dn~#x#yKvJ?myzT=Ogj}w>A5mK85$kq5Pf_%|BJ=evD|?ZX7k7{>Fs=B zmB}C$(&#U-XgTiYEnHi&fq=y^88Ot zSbQaocfhmfrv|R;uN=ng@_V;&MWR#!SXa4nMSViv$>W${;!Lheg9qcY6&)nX{DF*D zwb@l}$t?#%8=P;_Xplk7Vzz#>9`ji#uCmDiLQ}TuU(Igek|h{0!Jnf4HSiyhKrL4B zog+n~*H6Dyex=VtPJi5ICT8!dyg>lzE~0!&)#sf*b!$G)%+Wxom~-k}y`AW>81O*# zi_2{Y!ITm|pzO}|QMjM)7k&s!z(lWqUvER3nS*xa7Rh$z_%f*Up}{N7&CgS#jI|SU zI=R0_IyB44ka0=;55eC=XL?&zUIbGHR5BXm{%GI}(X4TDKC z$V9ag1KG)PP-i}E{*5L`Fl6KvDT1{?R7pbUJjvN1IAP*kX6n^&)3%U4YbCApK!^K^ zAKPFAh!7ygZj7WQ?Yw6s|Hm^IlPDpV1>`e&(}r;YXm zcHjXn78|dPwOA4v`y#&JqKj?c`0Hyfd5}ew=DuEJp8B?n-00-n{(#hs6w&KnQz_Je&XkJOg4dumf@$07u0$~C_qAySfo%{+kczTn2_**IE9{T9l z^D+LX&_K9wALw{*kQ_`Mlw-SJCb^rP$gKu8dAia0vBR`rRLMxoE}&CHuFYPbejQZX zAL`cRK46cT&Abx;0NgpM^ zD>XqTP(rl7dt{;f(zhb(`y7OR|5;c=zq3@(MsJ<8(?&0ovtqCH;yK^DJrCXVeG*;` zpZ%ZO-d=wZkN}p8*}Da)@0Rhn7|#K{DHdaIM@dbz1U(U?BFkVwVa$n|;6SJ_d!h80 z+tJ`xbq0ero14KCD<$Lnuh^Xf4iRD?V&Q95iE6z`mYTH66@7!wYflHdvb(zS9vY+S z3p)!+olUIP?AO#FPGbdiqV(4EO7}4EfNJ6cHWE?dcr5@_dvcLLZRrS9Ct zUZbw$JP4tF5fEQ+dGs^RNNn?6Xg1IC+eu_in&;k+f(-97k(Ja1DUyW@g1SnaN8#Y5 z4C;0U1?p0ErIps=fUa%UEv^hgmVYO(DjRX0$v7eS;XAi-*_)k1L&v>Et!qj22Xko= ziI(BrLa{%U6gOp`FTrkuAsa@S~+w0l0`TX&3>q?^I4DpN+@O9D!>+1|X#3hGP^D+Kom&ZwnWU z%I-;4>K-=MvnF*`$g(stIQn|SMj6b(RNq&RD}Sb7To;y!u}IsZArgaT7osj%VqQ7E zq$PVPYGX~&*3Tn^`P^eT>i;0b@3m~rOFYW{$#dU@rjogML?RopB2O1z{2Ryg2F_o^T^5FRt|-PO$*T_qXEBaoC^QGnIRbW8lAJPWO#skE6|9 z(Bc)2p2f>+cpU9@eq`Xe+v!cgp+N&4v|yn}Nyd4aaQY_a3-^hK+H{qb4jw2kk0>z& zM)8Kf2mWL?ph2ZU_;2b@xW8SiBCqOO)$T=Hsc_|NIfaBK!zQM_#D-Q)M^*W5bbQRY zQ0LEteE#PL%=hXCg&z|r4a+~&e#~;SzilxTwcHzABHj2mS=lttlK2U0Im5q{agD!yIi8@exIxZdm6JStR-QK5jFqIE57w=Y}# zXro)iNy7slt@o^g7W?BX%(z*nb`|m55la&thjV>1&~WB+?YQQ7`oX$!LdBH$MSQ8} zT2>Iti2&|Fs0qWqAC>29-GJAYWkH(r=u7jaSt96;hTlmTzr8$;YQ9?dWM`*bE-qP- zRBh*FHc#N8M$+6Vck#6MBTdx@;IU;@X>f+#z1XWV)?K0YAIexPqi&|2L_H5 zcMeS~v`19!p;S$+fVYp<;ZYf(2ib`QNdG2j1`dn`sg}<7d^5U+lzXBuVs5vYZRx#L zv}Lt}0*X@Mu}!<`XMg0qPTOv?Y8eT31%=#EQZAh_TbL9&j0?6l95o_CtCh2bTV+&O z?;Om}PntEn?d}Jhw?`q<>v6@x_F5!|!H}CVukIvj8Z>lXAfU+|xhhiXBx-UI^|%~s zND+f1hubO;5hVG?MJlK|qXsiF}B&knAyY9&h24P1)@_B=yHlUc&A zcCL#PF$f#X1{;amzyM{Y)Y1(4p^PRj9je#gzP|r1NiZpm7|z$QDtwzr;8x*kc8JP> z$)nI}wN~l!(rRG{z%nwN|EWc6t^s>N2YU|U4r9)c3uEB^2Y~#b^K%H48-8MHFYV^T{76??1W*$+V@FEkkB&)6#bGQKv!nm=L$ipg=Rt4q^(c2JM0d z*8z^JaD8=i(fvOGt&uX)=kr# zn27P>u`fP@hka&qR_x`VQS4$*5Q!VNL@ay_GhEPOZTAc1ORklJ2Ig2yg1~r`t``7| zUhXEn^MOlwg7e*z`vTYC*)T@00^>(Uq?#b4`4WegYN8G!Sw5GBe-1a9Q}Ufy2N0iC zy>FaQRE{rj9S#Fca)}DVv^EKbLfBe>XeKe>Y1}zZFZrS8`UVfQ1>45+(dT5|Lvnx6 zrvMSIuW`{g;Ds5$aWj|yc{0DQf?gl80NtjYc)6Qgmg>ez{-Vpe-s`$S2K`67c~B|O z5$-K1944doAX%#ET+ryOm!ajtKFy!5vt(&G#jf8)`eFqkj;+nb86@J_bgu(73;nFD zKR4(=Bbt(hiJHda&6}klpOYXxX!QVp!{---Kh6t*|D>054#1O(`bL8sVNETB1~i14 z;9v{>stow`J4oWL!}d7#wrmDRnT{-plw1T0g$jvQq5LEQ!;|I#2dO%x#PSD6S|k!* z8~bb<(R0_*;?GM!U+I5B-Deo{9RpDwE#M@IfeeE6&Ml zm+?z_gAg$!2MFo9vz}daJ&o~zK$e>=dpGmX1)I(o%MDoYF$Xx1^K|f7F$u0G8Zw61 zWvQIM%7yE(40j%2DgUAI-zRr6c}!0nWa|nC~|~m96&w#}<;% zm*J~f{f_i0H|ze-SlVbk-TqY{A}$}|!z&86|A1HOGDFvUPdCt@AHLg3!qR-y554HH z-a4D+l{&FLm%3zn=)HW1e>ogW3Dt%mr|kw z+)rvT)syPtyB!1GM-{Rjci+>fCS*0;wQW8%i(M3Bg}M)gU6>Z$_CK+k-`fPHQ_s_W zGw+I3gsPm`;V>#XA?I0Pj3-bh7RgzcD5L2`wX zoaSCJ;JAm!@%HR;lyB;KhRh{iDxE3c>zy$;U7LAv8lsEuXJcmfjoeosurzLyc%MeL zoM)$`AJj)RF7!iFPXePPPpe#}c6OnXl~YE9#>Y$fLbp6N%ehnSzu_eynB3+&=h+yU zQ8x?d?6k-Bn`OB@MvCDQ3Egk26nM3h zG81$UryNHdt_q~Ywi~|9vRt>4?lFzm_I$9Xw|#uSv!HbK-x6sMWl*EVRb0I@eFwlS za9{s0F7my0sf%`=)5PpCCHlBZDh{PGjr&RoXyVUkor2N)NSSad)T;CQe^@I#FvLtr zX4~8TIob<*->Qn0W4X{VhK%(#CYmfCR2cqCzr_ULUGfbu0BI$5)IWDvC6Y{LJi1CF zTu&)zaUD^n##)?%et4!&1PbN#g0;Z14KSErZMyyCyrum|0AC6O z6|{>jZFw(R;JKWI!&XV*GDa#=0*uVQvwT*UevYGw-eU1TUBLek*`<1(zPlWc+c}HR za9t|v8E2%DxQN&Ap6k&yz$I;8exSOHs3^fzGt3;VUuL-VkVxSSq>i%`4cvReN-r19 zn``@w2zNp6r%v7qqVuygx8LKmTG&b&_kIdT(K{1NQ8t^O!X<;WF=X9*Z?>nK^t-JM zE7mhqCptFdiN_XC7NS^k`(hm;mV#I}z~z z-Y>!KL(!o~da^UiHfI{Zn2m2cRj{V}@-SvT#5*JgiDMCB?-z!3lt)B0em+0 zJQ|CT4`5@iI*ha$GGojUUEm_N5v7F?q4SO%5rn`{Sgw;FJQ_5~CO{G|RP2HpHa2~v zSs$QgU!4T51diTQSEga2UXTYNcjA($@t6Q_`d~S?VGNIX)n4{`5YXhvEv+X()@H^v zTZxI~g4kRijK4sct)`_tY}ev0aAtrx0AtXD{bhY$Oz`fU6h;W+5MvBNPV8xb+W9x0 zR=%bJLMBqpaJFLdN;d7sy|;9REBhZ;nLMqUf`KbOf_NFhYlX!wI$_m4A0pIg zPPL8uI=o!ZCYjs$t(D8N+oB^U+!d=V8uZZ+%0IRcw5dogLZok1sP@wi;tp3D8K!lt z2LJ!yHrV?pGJHMppkpQDH*Q8@N$}E0Ds5vAntq*s_>!^PBAD|7!abs6X{p!+$KXz+ z(0I8&^I|}%t$|QoTC(v3l#2^Oq@Qo$v(I#zulUlKuJ?Qb9-7=Z*^{N3xlDpKolIz8 z_Y-~}jU5}}x*4WVHfJtY`;LG6oL2d`_qsj2v@@UCDK+vwXZgK*O2RVHU+P!ecNTxox`MG%Ii?B?rCSe~#hWuA~oac#Q2pZLAj7Nv(v z9!@S`nsmJYUY*Yhyg^J`U1X_pL|yEBvjQ(OG8kTAbVJvmW3~QZlsD_vjW5397ZN#IDbrx@!{DD?I;#`OH8F6D{N}VDHM(7gY?g z&QU3_Z8X#zQd09=*=SRE4;hXmmCJ{J-JXgO!E1+!>ckU>w}D#x!FbZ=+n7J$brLPL z@A9v;&d>R5Ld6t>NUQpkK0sDdW#o0Jf*kCABE{F|Yw{9|D$J-NEq0Sf(JuK<8hw%1 z#j?@4w%VQDtBenVBd_Z|zuwSf_~$(YEMzm4GUy0BrNzfyM#C0Zd50jTC}PvY<#j*0 zNH{;v5B?(6m=0_*Vad%}TI9?kxj1ma?D(46*ElyD-lVgc&gVO&{*1xNk=wVJoPY0= zCFy@6vyz(ye0k=s71i~W#L4Q9UU0Xd>Z`{l{6Y;|)+omc;Uz=*d46aqRfLC+$W7GJmKW`i;*m?#Oq;qSo_Gj@%->&=%>R>)!t@Jsrco3d_kk_ z61O32^BufLmda;4wl7^CrJ%J~ZX|M?D8g=d4Rt}q@RghluppR?^G4%G^Ex4 zBBEvYAr?D>JD1fAFa~}&sTD8=J6UadYHDsS*C5t}q{W_q{i~FnqCb{w3$6OvjzF5I z?ZVN@!`Zx<)GP^sv}H-j{POf3Et#hxO}wQZndIic)QNj%d4q?V zJ2H_B)~sMLOJNQZ+YmHLsEvm9H)XC#sc%AaU{YIRhu-(R$7Loabiy5w@aj8G?#7UX zK_^^5iSJ`ieMa?GGplcO&o7(If{jzx>+hPN4yn45F5#a*W-#t z$lD=7CFd-TM0E2D!}bJlZQA@o6KD!GQviPo3ce7!%2Av%snt86BDii59tRXWxn_dz z#ibcSx*i>D)#DysxJVm%Uj{(*q(CCCxmhs@k{7fbfA9ol@&ohBBk{*c>SKoQZ@lU4 zctBm++vgEb1e<_|)@G-R47WXhh~W-!&8y2T@0KZe&Gm6UX)Yt_54|`0HKcaB^dvnt zo2fE2vFpkGrGVUIdt0 z_e!jxj~1wE=K`5tq{eATp5kG`qm@(#!-H%F1AH3x2IgLBv!;6;M8(bxEydkAA=M(G zd!BPygV_A_-MR1tl>Hp9kgPqfsOsbbW736SN+&GXb{_;+l*jLdvOcPO0R=+c8B5n| z?iagM*fuG|T~q`JDS)63QA_jXt1O`K)d~-E9QvG~Uhd>4T9`O^QT$II*9%22lW4O| zpe7Y5j3G(s5V8qZ7-=i~iwmV;yyus!8~V<@AZbEql_8y!rPja6iE9P0ppg$UM)Cj9 zKNqv5p?powS=BeaLT`qDFH2yr{?}3`BUoMC2?N1PpP%Xe4D9uzc!+-*pOBuO&9}iV zW!m-&f221*eYRSY7m7MCW-TNpGlC%iVAJltGW)FP+{pC*BWsun`j9#4QOZ#EkdZD; z9eX<6yN&wV$IUvh4_ZvSB-6+f-g69?Ae+Ja_|vd*!cDpISv-;E|cE?q8qi|uNc zDqMV)RaP1g7jTm=(=1MB2Abw(F4u$XPCG6q51|WR&rL>RDIDx;lG5PtvQremz{Yp# z^63a?igEQ%ObyfT-LJJ)?v zg_9M@Qx0PfQh#;i3ma=e>E_Eeip)QKK(`wiQL~xw5sA2kB%QQLtKE8eIASXeu1(5r;=SED*&@T)l!M8*#ev75qKM)D8P>7yL|>Txpv9nL#)%Q*dRZQ&Y$;>u-9 z5-s)5Q7V~gSAy7)h_RWYG9Rl&YagtXVgcAeLs}u*GAVYSjmbpp;c%>x*c->fw$2G6 zQrm(obZk}&?pcOO@kJ-Qd(%=$=|wxQWOE5^blh~qUaCt;>W&Am#yKXQ+oTZ_v7D!@{9c89pK+U`&^V81*gioeU{7+4F2-68vJ_KKv8le|^Sv9m z?J(QA9gNSJxzR+rRLIY+c7xTyEo1WyTfrcL4uIb1&_jWDm9R>WugKdI75uHjN|!ua zeiczp?E`$G3*RgTw%@NQp;tFsyR%@XD2as8t$oEXgtS-?X2O!(6c|V@{L0h5U$vFU zk}yAEfw7u=(nK6~Mb90djd{*}gm#L?wOUMMKN1@KR_SrPg-pp=s3;yxcke)V{VngN zpZ1!k!H}oFWAovd=o$LJB#;udx#%H z9ulhW-e=lBEj3uMIe43hTUwSgN0XdS>?sqN(Y5F>`&MpVyAmYx{xH4FR7l%d0^b?k zzw{}G+2+5O6i5yDL0{CDL}TFRS~Q8Ug54$@0$59Zl-Jb(+K8G|vS9y3d*}@9CzGu9 z15qH82B3)leGlc&YkKo4i2q4@C<6F@?n03!+(S2l$K&&CN*+JU(ghf&0>E?{w|LS6 zDhsH(zN~;ce)vvJ*10{nQiI2BI=6j(6_iO(WRZK_)n``Ic*?^=%-w2;l~m`_=ry|N zH1gaGn}MiH@0n{-rTU&|%tfk8PowZu%y^%h)#zkcw&m@JdCTcnJ(jo2*m%Jb9Iv?{ z?m>djYy$2?``8oPX4JGbf}7d5>)#DpD$Q`ZTrfOpJN8^8pWNe&9$L<5+WMtygu(r= zdpIqmc&%2-oJFjX37tI89KXUoW$T`>+y{d1D+boqrJATVS*7Z(l@tSQTkJsFQ zWEGa&zVw5VkZ6|5n~shTFo*TuFkhqiR(@ikCgFw&Hx`P5oCnT~9&O62lw&#gldE|s zBdT^(STJ?;8`apY4YnXwl7$n(k{0Zlx#WHlKB-<8^TAPepRQzV8$E7Xj8(xO<*zE| zJ~Rrh;wN%Hv`G|*2dG%MzqC_b4pMOn7zz%8kSsfru3$jM2VwxRF%No_$19R8B$Q9i z;T6-)h}7kXYSCp1YrV~N-&i}JGJ<6q8$vo$rHyMmIg7-(>5LtVxvmU$i)X5h>(Qht@t?CZ zxqr>hoXlwizop~v<(OT0EEv!RDH7h>9s0M~qd}Ck5OMfWyt@^3T#}1+5(N!3RBh0C zJk1xVdF=E5N`CO!Xx5&>wObW(-~R9G2{l_{$brk2Q+yJBPAMaP7vh%i$Iz-BhDtzO zRjch}V!dV8xEJ5s^eerLf(HVU7k3fghSPn;cOOaxU2b_aGeSS`C4qsMH=-2R6?TK) z|B%ZXY)TVfdf?)<1jWun(~n072E>4MPD_p&(j`XtHU}OUROv|pPp`BCyfleLJ#)D% zHK!oC<+DNbP<&39rFkwLI_)qMz<|YaW243yWRt(*wwqVGMoO`98o2RQ6dt-(#&B#otte!hGek(Zv`lq9vY?cEwY*hGUvXSrcX6$SJ3y3kmc|S4G-{#biqd0(shLG&7c1knY=&uVrBh7&mTGUhm4T9WMg8Z3> z71j#r=?mP3iIPb*P`BhqE587H1)>D2i$PNDI@Rr@%nw@a? z5uB?P@qT_)@n}UTaXn(;X+qIsNYzd0hCGT@(F22OM||cyU?b&&)P1D$FW_d)S&U5F zwhmX99+a5qW)R{L%904lgnV2kG&*PbL+JQ&?$UL|@ar3tmpj3H(a+V4+|wW^_T(yW zHZGL}adWe>h(owpsiZFAqh^ltdP*=@!1|s3)n>q+?m#1!#puj0!)uIN$^$1$g>M5N z|Gxa-gR^GArmWzXEWvG${^FppUAi7WX?DybdKrCJp`Ydm{u?DO;%bK}(6 zFZi5cwdo4gz^nLBETTDUpED?;~` z!Q8OWeHMzeu&;P_US8$|4CK8bYw?PScmn14Fa`Kn&~mK85w+UI^Z2v5K)ui~C{VB2 zG3m9Ex7C>mBqtcz%QNh5o2y1|b8hwdKk4sJ40!S^Tc#kOgG9<=jF0Jll^5OY+{zDC z4{uYRJ{F4>7j;g?q|#Ic#86N2TM!P9rQW0~qo)}BrDmN!cA3##k258ace1fkC~qjr zrZu&XJ-(#mh>A=z6El~?AUHbU;0fOYVRK?48+k%Ur;+3}Cmi?JEgV`#i#a7(Yt#1A zY6m2B(W`~hf;F$h^XMF5=Dt1n3gs5b;Kn5r~8o5K@)XM$nxDz-NcL9E!} zpGrngNz>DP!<%Pd*O8GH8tgng$X7k9r0wD&FXpl*>|!*V@sQO05=qs9w;&7;ZCEvE zXh@U7^OvCRCAdXh{HN{Zj@fL17Q?6{4@Rk`j&Y3_N4PiJJ2mRKV+XsFn$r4x36|3e z=&{f0K^VTX!|dXXox%Q0!}V-3v42!deS0}0v7NutIG5w%y{@8n5mvbMAYmJwH6t70 zlCm*F2n~^Q!Pzm`a0znGn6z?*Pnh-mWXTX=(CGcporMdp z(`D=x5i*;3Q$|kMNj&!cJ=}O}$ztHm)=#LL$gOgT#ut@zOi#YPW|TF(d(-PDb-D1w z0@bFL1L=f7x^F5z-{BKtGF|~2vv&)DuHoo{@!!?~S#OfXD^rW|=a!|cCi8*YqjPVg zJW|;gCs`hZ$13V}Q?J8i>A(b@fpH5S1lBte;k^*|X0VYp$+ z`n}-~M;!E-)|r#ND|OFv)uHm;(xYr8nURTn548A65w-7&uAEwH!{a(xT=%a*0C$)j z@t!%gPdq00IoWuikU_cYukt&emi_y+FXjv z8+5@YP-z(r+U2fpB@{n01!$3NeQeNxh@dWQ!vysp-dO|)R~9+R_{%V4PJTHzGLX0N zZ_5|(#gidM9)at^s*`4bu?# zIXLpZ4)(uYu%qRTv)crL(6}hapInqO3I$;68~zVn2)=>%c}iO_b4R)c_j4*g4*g!0 z7i=NjziK04*j+KwP!mYET`dQ~oj@Qt@v7*4*b6&nL3fjNGvTk^8*DeK+s6~0eHSUL zi;-iF4=@+UTkx=D^;qidHpA^({>^*w=eJ!~AKGCzU2qp9xb>vZlrq?}X{P3l70Htc zCdrCUJnb0`d+?;;d%8-^Sn4Kxs-$$~nDqwc<7BCL*+^v5drsQ)hMe0Jn2bk5hE$FR z9ydmQ*fD;sa_D9cZ>AyuhkkBC*Cog*rf4hde#J7Bytz720xpc9vZk;D_V71s-W}B! zbsy_im`N6>U*oWsSWXmP&X4#dcKqAnZ|dc-k?V6ef?=!Ke9Igud2ycgt}s>p_T5*kbCepF5zp! zz#-a^yp51-V}_k?WYW1IG4-9ks|P>7%gG4@8x9iD1RdE-_@{Xgj|{ zt)2UraF6E=Nj`4bAT!=7^ zajPEBORCpsqoLwEgDH|bb+{R*=V~dYFRSYiH@{-%u@SVjPtH1gncut8?AVD{KhY|- zZgLI;{+B+@tN8_&U5d8niyyIXeshvsd(hE3m^i0Ub7^$hwk^E4{rv08JQ3#3q5Vk; zY$=xW-0g*cvEofeLAr`#XA_5GOqgq*zfbv_k!XrQ1uE-RYSd{pdF`oPP`ZamjuDmR z&CZ@PqgoowQyZQizb$*cn(`Bi4L+7FLwSmS#KuJ;r9j3qcsQpab$QU_ah&cl?RNSA zf=74+!8`AFcDcm4i9ZLKQ&B~2!G5)$os`budq1qL$sArMJ7~g#m^r~8e{(oWHvQc@ z=)=4$*1RB=-*Pd$!gO}+%IBE*3Ge*nvkD%|uYOeWtW4vW zuwtw>*qSBk*X}>d8XvhQ2c3X8NLXrouuPa4P*S?Brb5fCV1(AqOQ&D5_{zD1&t@Bf zRH;YHQMfdQ-+#zPv|Re9q@SHdd0sR_DP#n1d#=t=dCp@cS`NzKG^UJxkI$dF9}EsYZ%1pQ^mGw+l6gb zdPDPicqG5g80+qIn} zXhNG$Ol}6LM$G)mq~zjjlAD>fNBVf(7dyp0mikhkcBMaZ0*T#UUs*#t1gDU z);8V+ou5w@nKq1mA3v0dzE#g~!>*f@D(`0ek zMUxQl!R!y$p&}=DYR7}yTq;LAjBV@|N>fHN4s8FJg zx?J~jM;F9ExUZHyIjc{0%21eZ{l2;=V*mqT?`&9b%#WOaYJ)F+{F}MIqJz1FR8x|< z9+~)0`sr-a?+lOe3qs;tH)?fApR0yv2SNgdoKe!ock}Brzc2k#HVdA6VpTJxWuXv) zw|y|6VI~ZsN%yGRLHu-_%!EKLPylAqx$>sG-jH?3W5H^m$@kxn1193gX*{Z)*n|%~ z8wuylzBwU|!aQ5Z?w`kZoLph8;O1aRlDOzUJ|KEH}=w748Qy*ocr<@4pT_mQx26T%i zrE*0jdhCf8MsUzK>S{? zV2KZkljTHX8`m2^)pz>%`z4j6BPPx03V90RUWYH)wd{0pHyv$J+0I$BZdp!B9O(!9 zWev6FM^4@4tKPz^kepEs^Fwz7Jq&Q>SiJX3BXP#vcW4Y2&c+>Ryv*`jg}e9pEe651 z6y_7hZOjekR5HTTskjb=pbzxBTO^-(n4_u2jS;uVlCZlG9h?d698I^L+x%GS5jA=g zk5`ELIrv=|9gIq844D~(D{G>h(rs-P*zmX#Z)F$pI!e&Id;n=7oHu&BbeF)Jp6i%@fQjeKypkOG89mpknTO6lox83P@0+K;9|3vhh14 z@U^Yo)+*bdQ_y+A8H?zd-Dp}}WHXCSeksE;JszCY6|8!vDBQ6_^7XUZ3vIqyiGm>n zcf^`3Vz1>CQ&ii=|I0~%$=Q^M&wu+z5Ho)pV@PAr(pkqwDLttF67v2&b9Gf9!kjMo z=+_&lb=$`d>8}*cT{_j4T#5D4k_imk!DCB^$eyk`Pd8kf>r_WhY~XD`R} zu%qO*C*?*>`}nRUznp6AHWrFoR?BeP9GE#9JE9EY`lIEYnTze-{&w^6e##{yX^KX* z21?cgh_CN2C_D`6J%Rz7-j;k5fUA~c$ZN&Ebo*cn#K?vMBdOW(~ z<-O3j{z52XZ9|xVc{|YC+A=NGbv|T6e5{*|)PUGh8{c*CA?Ly|mIUDqOpDg6;;%f_ zeFs9;;_`hsoT%hKc5nNhglmE5t{T?PHOffAl3>Zay)R#@a}rxF3x|4SubRS(rhXbG zgwm6IqtX!PVJjtk7CtB^k^Vsq_lrcn`(NC>1yq#nxA%{LAcBN+gQOze4bsvUqBKau z&@pr)9ZL5gh#(=|-Q5F2cX#J|kNP~n=Q-zh@_*iS*85*emom)EeP3~3*R}Wl?$0*+ z7m?`oFbjCV`v!>M{HK;a6VYH9!lQ~Bfldte1M30t2MBlxstZ!tV|N`wpnghO_gmQR zU`WZei+Q3o>RgtQTSzw&(c$PL-X~uiN~3`)D8^+3)tWyu$7nKt0c-{t#ie1EGVC4% z48H^6l0YDwTV>;h^8eC@M1zX~UB$_X`5g0&5B=6TB-3d~yg@eGNx;(#tWa2k?dqf~ zCRAJjh>nQXZ%i>*YPqtf<9$%+M$TtY^#n4sJ$A?IZa<$|ZXqw_B=X-mhXRMkbwQE+ zp4ltet{l(}bhO-kN50r&`eZ(U(tT|{z+~pMAyyQS8i6jCu6OG$`)`H;;p$?&!|JS% z(OH20)7#An-mA^nS?k__`hlC{h~%~?Hz!px0?X>{GF)XL>tyXsst}zjjBUlpT~E07 zA6WK;fynk`J(5i)U98i|9iha=)qsACRDuzaG7CiZIkbEJER?cDBO*7|X%o1zJ_7uu z)q(No2YJu`B5K62ReCA)P%QL&pyHFloa9k4_91$EO8YcIXwNEzi)z27zz>tPA0Nft z3|KW0SN?rk6H3Hzi4MX~c_L;(LGPf#y<+L`uY>k+;?W2`7KkR~t#yN|PjuKM(Vn<% zeVePv8Z2!Etkp?CBf(Qj?qW23ORhv=H_?&?s2~0vSk+&}lU28ZNkTvGuVd#nG}+T! z5JDZcvp{)=e+>vj03F{ybGxkUu`iZ>-pVR$ck6@Yw$Web+MZ3})IaTUlE~|}^95K0 zlFDZeDLt-tC|z3v>K2VGFHs4n56ZQznzhxh!<&Q_LN;#;2&a#dW-mHqLK@2qK`B*J>Aoc6F6js4 z+aaV11pWcb;H>bTz$iQ!G={?-;Mr`LUgDw8m<@4l4M|2Mhs-%kG^<90H-gYqO4Rgp zs_aHEzCZhWKHS`Wcv7LD(RxVcuS~~(o;c{yvUa5-Az?|FmPM_NecY5?tNlm~{u zN=)jL^~fHPjfhUy!OLk>oU{W_$w)GYhxv0=0EN9cnwpKWZS5ylZc9(JQFaYfo*9tqeNd12CE64KZiUsXr9 zgxr@!Z@e;xEIEzM#3*gj^i_!O?s1eVvJ5PREeCfnI?p$JB-SZV7^RPEF~pF>oy7as z_h>Vm_1D}+xn;(6zx4b-#blzr=cS>UeH=q}96Z#-leEZ0ka3~f)rO^3c*3X@C#kf2 zi)A5&c|b#&bUH!tM}E!+rjJa@h$mSzHzwYWKr4>uL#j51HIjo$@6&#ENECmMbP<6> z?$gES8JlBa<3;cIR9jNI6CG8l2jEJ4<7uSj(Wgon$kM6)2DKih3NO)t}6_*B^v=90yZgq{O=KReS7= z?Os&EC=QDcyY)S8d_?U>H9f3WR|7Nz!+~iVKP$Phx&J0@$(oGYVAxT1|)<+;Q3? z@hBy=AtQxtqirvTxwIgg11_yPfdD2B#cuIC1x`uMHdJu)hH{IgiZ{?C5%N(rnp*Av zd`zAE|B-t0CgZ|%y;7SA_AkK2af5us~V9EoN&BoCQ&0* zRvdN;&6n84_n}5fdrvwLS`L={DccsxJiSFx68lEBWCK+aqX3`H_lxc=i(X&(P+m{@ zP~IFNm3wS>!FIpg3<-2=0(z|CQxE5k(!;N~5gE{Wk6X@^eGCuuEI{I9gJ`3!>~ht( z*qD76MOi$Bl4yf{?_i~?-k+5GmGoK{gz;p}8Xw60Z|wZK%071TI&(rq@-8W>F_X6g zp#bOC2gU0Qo-?x(VP76Lqvfi=roo*<6H-6P0ppQHcAk2}XfK1cFeF1vn335cUXo{0 zBwQ<0^S8+Nu2mVoldn2W_DA=1KwOJ|yDP+o{1+dWx-OdtN@@Jv#CS)a-jyulX{;IX z;$Ac@P*q79RIM7w)+=q!kkUyzxVVL3qv6W5PI2YqcYrHzz}(h*JduT&@nqD} z?19F%)svx(eZ9GiH|c#CIX}?_{sJgk)v|U(nWJluKI^yAhm+$kZeMWm5g%hr1Kk_{ znTz7@$cpNJAS?c$SSi^@fQ?T$w^y)POHX~ON;6$%O)A8U89Y-y9`_+hq>-Zi;UkN{ zM_JTYNmMV4cjkqfTLz6?&yoK#-(d|=#n;zgIVDUDo2J+T)5E;RSss$Z(HgSLZ;Lwh zW&Xro>5rgw^gRyPMy3_2QTM+QjQY9hA=wPcF(g~J5d$ZXW8@_uiFa?;a|@uR9Hb<9 zF5v*k1U9agY;z^CtsxQp!dBE#Mrj)5r*JyKW2r_e`a>Y`yEx;Go&RLSx!_s{6+*MD zlm$2kDy)eI3ma>bmkyzhkHe0i?5J}@1rBCoR`i-G;b79IeQftp*tbh?tvX^b3t>4M z8DTrfKoCe;ME;+Oe*YV61sz(BQko!5D*uw)JCa$J*~m+v_R_JA7RlOwsC})H@j07k zZ0DYl{hKP}jT^NV9z#46Vcwyv`(TOem$Q;zLUy^C1 zAH4+h)_3(}t4YKRHXNRd-8g8Ng(@hFzU)ODe+E&tw5uvIMMwwaH9QW+Co1ItYdRz5 zef~TA+a<$&B9~hLnW}%*+XV1FP~Ypv5UCTRc<8-@%ZT+Z(K&y~gjU2Q4_D$Hexj#5 zz~!u2QX`{7M$D6e@(w7tCeXhcL=Obh{OYg_MRU!g=PwH~p4UA55`+1REJU^xE=c1; zWf3~GN)+{V?HN~g>79zgWA9#C;$O)#5>f3D zV|OR#T*)5Us>lsb;ulwwZzHxDuYG3J0<`Um+cUpNM}NSF5cj`B`+5Pr$zm?rG=||} z2w^L|v7qp(A;QQt2#8dJ>4L@s^@g3QPrZ=1@L_RPw;$8X;++!3T$##jivh9BndviL zp9!HwsUoyVrT$7{1p8Z3!w`S1j|%{rifd-aZ4N=Pm1l(t2!bL0uzjBFi6>>PV(fw5 z1{hE7{dI1aEOloKC#>lQnfnu-ipc>1l7mzg7AuYV(UYiAW$`c~^BRBELxf?o&Nu4V-~Ainw6v>cEcrkFyDoJ@(fV z6jH2z+Dl+S5ZR2gf*+w>e$AH)MI^Gnb^Hh}sa~70Y8^5+`Y`=~M?Pvi7i%4lL5Ju# z>nB-@|HC2!m2xh8HjcI7MhLr{B)MO#p9@j}4BNWdJ0{9vPD*<<=>(}{(@2>f<_d$K z8C1+uSbp!&ND9*oG13=LhK`z%iT(~3qWoH0Ura8qVlJR-3Me=Nb*DE*FuW*!oiPS0 z?JWN9oGh|Grt9IFzksOViVX|+=VSle4J&&78Efe8*vaA@4|sIy&z*PkhEP+((0}-k zoxa4jd%!|lDnVUt@y=flQUF!sZ!{$P+h7(J&SsP7_OPECm&wWxYh?wGdh;^(JwpjM z;0reV%Pd5Ftj#+Yv69 z3mP4+Ebi9bDk>8hiNFj29&QM9`qkh^cD~L_cho4EcBSHE&I|{(hkB%j@9@oEK6a4c zDSohl!_M)jRGKZl$|3l?5#fPU2#*%%$MNJqrqZm|4u**)O7U~06hlFQQtVtAd2W*);V_804BOb)9&siiOzP$hl-d$BJcl>sjv6j z)Zgx6tV>(?uk$nEq@^}=@Q^ zTLh!LUj(BXP2yIm2Cf?UuL~M2PLa3_HuwVtmL?JxP z11(>MTEFx33^)wpZ<%?P2FJ|5d!%>oU!ze8j}((Ur!<%6K2=v0hvy%)QyQHDf8D+U z(!_?Yb>4y`hsCa(OSP2Kx*O!BgbB2cT(y+F;NM)?bLKd}s9($jD3!Z4hb%RF&whCZ z0c9W%lt4A0U=v|zkO>S@{=|cD*Er)JX2YDV{4dkyB(eaCqVmhIK?KzIe<8B9I@y0D zWZxId1j71)ZHaRt%Y#4c1~yFezCw``0cQ`gq_RS6K0}bdW&=6{LL|NP1_4sWaPXJ4 zpM>BwehNJt88o9Ja)vQr7v0?DYfL2#<_e?=?t zOT6%sQttG&%Yd>jjKlSHde=!z^_#vjII{f)o$4nkJpD7LXoXE1>KmnM=j9PnwUl}f zILdI#xxecpfGIEo;y|}<@RLPR2wVe4-0#$uBJ83B=Z5x+z&swDULE$=|3-(xkw;_E zAn!fjIo-wRY8S5W?t3b^I{JH5>{0a6lrzpbqrz_ov&NW$>^|9fv2<@a=X@P!v)JGv zD*4!0s77k|1gUCGy+%tD$4fq#$>G8@twhoE^O|OA%GifJ)oMGQ#w?%bHJxbCptPaM zEQ>^%yEM;h#^%JvJ_1nKHO+ttvjFkl&7lB0A|#@@)^7}Xr(_6zPGbLjmOrKgfVm*8xk-1mp%{{<8~2sp}&Wxn|sMh$@2t8Og>zP2PLd49k59KA(=Gs087`9`1oB>_2sKA;Y}wA~WiKNTC@DmYU;7%~ zep;t6-+z(#n@}i(Nv*F68Qy}RfV>C)f+$=?`q%D==%f*`;@&a9Y2aqI?rWHcTQg&4 zB3@MB@ZN0BG~i|A8)aOHR(fcrbUHm1Sg*=XSe0uFQH$?RAQ$_Kaw6s-I`l9 z`pZ3&PLR$?5p6CMnX+ft03=K^pmhLgI&XkRL5;wyrN2Dg zJr$&aClyZ^rMdyggxWPJ)~do)Aa`Ttw`aS+>kJ!_k~D%o{DB#MQGC^xQ^zyLp)iWO z*yQ8$#(G3R(inVVK0JzXkHAEFb+Jb+BApu$=o$JjaWXCh$hR~j%6f>?Tvz4&lT!~N zX8{Y|X_+nsCM;3IhnEsCfL#4ql_)jo;qR!U@P$}b)00T#_bA%CQVdw^J|jK%FZTMR zd$^WL|7L#wwON8W>po@va zj{W_0i{VBLAS3yA1C{nWDEev2oITW!P%=t`pbFDNmx5$!f?zx`0HE;CsA*Mw(>fSO zCjR`AEn+2aa1wLggFONkO=ZFn0~70hj>PdNEMD006WHsWt@?{Wpc2Ga(VMty;*nMD z`h%L&f~2clVr=N|P-ykn z_!iA%@)%;-6qyu>wYC^l5LhmEgBJ0lMwKEr2e8l;4T-nlNz(-7SXrPW4rl6#}Am4 zFG}I3F+F}DXW+E5|9IBBQ#5cBt)q^j9_3kYu@{3P1qCysNPtt&*8xecl${_QZPN~) z-c?HQL2!_?>4Km(7SE%W2nR_jj?zfC-LM{F!O}K6fV>dQX^u1$0x&?B1A!UM4o{{> zFqHZpM|_fkM7Z#8f;c196#p(`Ca2R13DhI1VhIn}|8dqvI>D!7z)VMZZ(v1Th@Fai5U;mda%g|GS3dhTpu5;&01@x;GW zKvDC)jG%6#SJr54DThnMyM;;>zsP>~3KsY()6x+*Lel8FG0D7wio}J-KIv53Ic6pi zE#T%-$(d07@3<6a&yb04Rcye>wXfe+qC&*#FIR8@~n(i_^_4A)8C7 zm{<&#^+tN*&}o@jQEf^hq9`8aH*b|Tr->Zw+vS}-Ckd-i2^X-rPI7E=hH6Rg6(>QgR;-r+O-G6^+g9S>#GhH z>)C!2LZ|J=g%^Q?TOYs=f-`1DUMdS8_HgzCjyA#?fP=WTkL^1-8+eDpp77M^=`&94 zhl34YzIV%-r^}IpFa%6tC9(HQk<>X+5A@@n_!B?-)A4`u(D)~^*otF=7(7yLu`!BJ zZ8kDwl3DObQ4J{s)x0L{`@KocwVpJdo~&}q-Cgs4$$&m+y8GV`rVRS=Xnkf`H%E-3 zCF*OOb4UjYZoE)$XR{z2Jo=q7TfRWiTZk{dX`+QyYe&;&3`!bj8o6U6BA>;05xDca9 z4Nytzc=pl>7>n7;gCsM+(t*SF)j{iFqBo1A0G4v{bE@ldSNQeSZ#4Mj%xPV=@U}@m zc&zw}qywJW)CTN__G9WPK4)$bfD3f@isCk&XusdD1Hd2}_i{?#4W!JY(C>i^MPcw{ z1J#Xe^C~BPa)Qe{UuTZ?@&{$|cVR>1r!$+zMhyonn@!i#;6Jo+-zVkP&wOn0jR+E_ zI8X;VP4S7 zMw{y1S*;wc4F_VGXgU8#mQEeppxQ~c_Jl-ccu5S0L=CBT(@7B71PBIu)rjH~a}7wL zDyMY9P*xCo&;&AsGzy^nmTF0xX!D`=lIaM9j*()^G|NSWgTG9m7(B%Qp!k#Uq7sP~ z2I%L2`){qKJV&Q;dIePQiq*b41ky>{EE{W3$lnV1Ui5o=35rPbP^%U5AAPs%Q>E=y z^(WHYpvULQSA~8hrcpF`*-F%E?mhSb&h3523MpYt@-f6@OP1bz5D1y4?Ubn?`2AVPV#@NcT65BGhe&+X0*lw9pf>HKReie-o>AP+G&w(Fh%!-cUDMaC}iF{Tm^nZ4vft% zC4byja-)?jn?B#OHR3*ef+U{~D?WC8zH%s{LheA5k~YTv7zgyWH(vB?rX(t zEnm|n018I@`U4aH`Qn$qw4)5D2l6!i@kbot*+;uWX7*nfs@+9=EWW6P}Iq zS{J^Zip4i?d^pZXvJH7kl4R( z?0RQ^x9s8brR9ln~P4K-R%mL^? zHL`Z#D6)bVY5;}?(VnT!Zyd!&D zv&;;d|LnF%I?GprgOa|cHBDirb6Us^*Mbl{kH1=)=S(BNf6$4Pq(0^H!~N`KKb}-C?b>Vbq4kprB&~n^Tbv?c0lS&O^Y+ zH!|j}IcxoCl@35BfFL!s&d&FP4YhiK@>>{k^#sq=`FbM<7CMc;vvqOCL;{g8iQ7O{2yL!z=+SQ9W<_yJVo zS}x42y#U&dt;A*Q94iZ3VwSuAIVMeTn5Y5o?+yU~`Wf2x>N}bYoAFB*luNDzNiKN} z!wC#W1AM+u!3c-$t3jC8x3p8mM*X;{XD#VPmK(@R*lee7bYU^q)Teulp7f4`38{kP zw~?bm6DV35r{V-)9>n2 zhg-*`@wF&rkY0IlG6R*&_I|+Dl|;m1IAAdAhs}Q=nI!d1jjE{-JVe$#2Yy#25phh$ z^3-TN*%Mo0X~6ic(dl+;__(cT+>gXo?u*+e0iM0&2EYtyG#vas6try;=u}>C9`7#W zmPw%rwBNN)>tHY*Yix%A^Sasz7JvDz5~h9lB`H|uNmlaAGn$IvheD^T;hgal1U09% zyQQqh0=)d)yD{9^$+*~We{i_ZH^KBH=$~FVSFf1nb-vN62yGGrl5g3zpN=FH+%z_G zlaU162eHM^6g3{Q?nX!)KJWdo18WqF1{?2gQI6N_A4+(>evQ}GRc#Uxv>pF_DeD?zg&<<8w6--w!@gH72S8R-UH}UNA^ER`L2wV**N83E(d0nK{d!Y770XowER%-yMnVJ|+R|}5gB-HH z>&tmZG!SX=K>c~LqZ!P6fAM(DV=|bsg7djc-Ch(>t2ME1J<+%c{+M97tx2@`qEa|{ z#=%Pvwqe%*mYcHc0==+RzUMPP*52$d zW|e`w25+-YQre~br&4PK*Z3rldalWOVjhEtcjwnYu)z133+JiYqoxcEX~js&LmNZN#za5-T9_$H7}0SRk61zwD|b{TZP!)Bj?H!4obQOad?iKMqdtgYm1A!;CQ zaG-l!=v+n@Dj^vjFZ0NWnV5aT+&_|!*Sy3(V7Z-}W{CFIZf(w#Q-BAe1G?_(e~rDO zs1(w6gzwmA&@i*MEI6-GppYs!rwFZc3xY&j@ZHH-49BTic9^3M^gyyVHYadzi!>On zmnq&hKRT0e=%(%fV-m&`4=agzz7Lea>laP&4s@wXlNjK}wl-PK`FKy{6 zIXnBvHS-TZY!s|u8}K8~?}TGQchos0MCYCeeWT)>2~F{gAeOMRKBqTV3kP>n-;14P zSi^i;g;u*nXOJ~ko&LpAo39{w^6?-#`zn>zZs6ees6;EA^Q{h;7kz58N(FNzY4$F9 zoICbW-7-Bb2299+Xi9kIWT1|_<{b8F?y7T4Da{S_E)9&=Pl8iIb6CrL%b|rRs!pQ% zwq#>1-+vgTwvE%5UCc9I1JS=0!+3Sk8=Lc*pURBBQH%j$kVxldq>p)FDwWjM8jpnx z_FZJ!UU9xj92T~{fi@k>pgv-KpIx$yRsH8oQA=qhCVNnGUjv8tBRb#LT-`=pW3D_S z?uOXUvfAWYZYXpQjr-i@*|2kpYP~pBj2#ce-p**)*@+z4d_=zM--i5X->@`Z3x=HC zr59BuKay8D-ti<|hcx1nfJ0cX<`&KNHLRLMV(V__)8sY?uV95zlb zx*%8F*Q<%qn8qH7R`V^?P`b21ra3I`pq@lemDft!t~xBHs{5q(&^r{ZZLT$?dQP5Y z7A>40hE0-aQaCJ%m_Ua4{q)1tGoR}v>-UBXN$Gp}72xigjn@T}CIM7WSqnx6piebO z3XTctWq)V_;My*x0SK7IDpf<$^n zM&uw8GOwbu!#*&e^&rwoM)Ms{$wabNS38qNCpDm=G)p?ZZPEGukoNFZDpDbkPnA#xb)(Jy7#tJ61r(!9 zqz=`f1B9Bo@E@tkQTqesDlGftEy zENVD8owJthz7P4qBDl)amc1txtB&z~&7s8wZW=lHT{o`nn->IicgJd6wa^i5a1n!$ zO4Ym&B_Mo36B}q90MuHQf$HU1#THt}s>o?2_3nHdJ_Si)tA`>mjXamm^lcCKpXo4A z{@mPHQar6L_usz5lB57is+@Ep4`T_7C0MHNVp*)YjzYZ}ERso89rLZT<@B+& zWNir*R_I5+n(?~G&_{$0-#(Xh?`*Q*7u-7$k|Ov(r0bu=@st>h1HoWEw~@>$XRMb4 zW&;YO#J|)CyNPkzL@HRjD^5`OEf-~6^@v8WVq@^V?F)T~!fNr-8x#AT2C39SSifzP zQR$mhckCoR1^>P11v^Qj#8>XFN$v!8vwT%wE7dmW&InTKlGA%a$+(7yhIyRm{;?E7lnBk}mA%l`KaLwjsr_bs6^sYh4r?ip|*sk}>n; z*-mbYu`C*^xSSV{ynYRezp43bpD%s;t}2#Fy9*e8Jw959NIU&(1Xl~$%FhP?bnik_~QmQG_R&mHqkA-u zLdIg^Y%rN5&Ek!EbtH~1awF5PbP9uLmXxgCo3y=+@qNFOgh$k=HEoD~F%^2vAhQ3F z7ubXBS~iQ&mppYkKLW>qbSco~aBocf{^gfzHwuuZMPAk)MLbca|6=#WB4^~CD zXBKEz>k_sfvO5!zM3chK)=8Z|k&%|H4xuOj#}1O(DSu`Ubiq*7cAVj3?N7wgp!is`6x?|kP=26oCH z4;ZLa0;qJ2C_EY>PaVYoI~H@*c6$RCyA>zUr@9>%yJfJmBTP>?0Ns}Vo06Enbh9zv zOjOMPqfm!4R~cpD%7R2m@@uR2@;B+z#Y?W~(>m3usV-SM{#X93QvlP9yu-<9iH7o{ zV}FV;q$s9GWvmB#rO!h3Ms+WPt%VLl`~hGVMs=%mIa^_N$AZs=0;Kzo-t5O{DeZ{u zo(yi&N}DRrinxLo4S7(Ku_E0adK8XK%R^o;r&_pZ2G8I@G)vl9AygQ9#!|4D-N>W;&onNM>A!}y>-ZDtCCJcv&v2= z35&{o+n*4A5HRQ~)64d5uW|yrQo5r*+60PuZoMs>)UECdS$Z>jku0hi(NOEfH1Rgz zW+Hv*RQoL!z%(aDR(NrWVc2J@01L}0_HnVw&};>YCac= zSAY1_#Y?3a@_4(2Ky!WV;iMw^a4>TiHy6EIk+=&B#EDu|Pw+W}kTSr}9HegtMwEO8Bw*p=?f;?Ko{1 zp%hgR6|C*ixvoS#xlG4kra7#Db>;6TB+eh?y6@}TLfTMdI$!h6FPn+eA ztYYrs5y&C-W5>-$#JmhQ!$OYrIJ?u&cR)XRkz8*)-SD``6FPG{`J=M?bTV1AI}E+~ z75yqjqG0?2qXA$o&oPQ3&oh_nhl|dI3GU2&ndkz!?p;L9`{F7QO$s8o$FP5?WT3)X zrEmb8rQJ9Vh#VJ^Lrn@!j0?SoHpn0?#4~KR64IKW!9L^|^N#CWT+7yLR281mU6(^<_U z4@;?CKCU4rk#Kd@7mSuF$jMpbD~aWJFf&k+&1r4>?49PeW&4fBCjEe};h(iq=!FxbWf8q_3)H-YWCf(IlEO`}x3{`fZ}#j?G6o zR~%>iw-Wa8TKXx|Rg=ACkfnq1;+5emj)X$p;q!0;SJg7rQ&ngm@Br%HCA{Oq)fhL} zUD7J(F<9l*%>UYhuf!HMwY(ZL+@XreBf+
    OY=?g!x8u^OT9-r8Hl+V9sgzi@ne z#^1qI4Y{%W`Vy$=ha)qJ)^W6M7A15p{gj{bj%Yzi|5<}A$@tN*59x}G(v8()MajbT z8Npc*dGj4Z*`9fa*;JEhjdmnIx?a8|?a=wASq?tnGMF|HXv4 zW84DjSf)+NcD_A}eEx{M@vIMuV5b8T5+gBu$ZYe$U3O3Bt^+%i57tSC9WOF`xBI;w z(8UWrC~%}@X)J*pqxB$z+`XB>+>L4j*B|+!r_h*bX@B(Akg){JozTJHqt^Jr@sX~I zi^gdBVDZ}O_JvwAJ(6OyZzb#06!)to&4yPp(T?gX6a*#MND}(oTCb|jl38x1NI}9N z-E7|JhvmS^c?}Ax?8fhCI7(VI{+Km>ug2BRT6~TBYqXlFu$c(2Xb8PI)Yz@UboME+ zwQAW_OELd_+dSY{JL&Z`;Ka1TpkGhg%@(c40N3#*!yebJMuQ|*I05=~QGj*!GDa<0 zy|h>=ecgBb9I23RVPXXro9{lBxRc=a)gqP^tiH0qYYOn#v>)A0^$*Mt@8O0r!3VPX z8rk5&^;ysAq~|>$99X!q$oymxky{~{Y(yD^!3Ey2k#86<-dh(uh4_#f>No<`Z7j=R z)1}%DahJ*^WtZEPFdK17axT8-iNlcl9p|ma^0y60SZug^Bl^O`LNDVe?)$EPan_7L zSGW7ImwxxQgn1%^t&^wWoXz-hcX#fXFib~)^6lyi)&vINoYPu>Q z}U;(e2Z8#dn3oPyfwxmUJ%f#kOBVUK?YS5sL3FnX&GovZzf|x` zGC#nZe~;{S0M%8`Bz`;P!mPyf+U5c}xQD%ctE8T^tDl1f2;fO?&ER6EzNldd9A==r z4^A;<6pPL#=Vqat=YnMm-WN!1xW|U2IP<+ir3$ZD`AZ+}pkZ(%grTHDcSi}2;t~qF z$O3_N!?jYik=&}1)Z?Pr6DujVisSs+DaKSqLAKHi&@x5O7) zr5LkRmXNj*T|7w1%!=h1FuRvf<0iXoWNEo*XYDiC7vPBee1^p0?PcGi#9b2lEteK` zI>YnNBtl?qY#|aU>4g%I$dQXlUFq&84`Fk6+lEcV#ZbTn}(ZSCG&zbToS8NZP?V6rc zDvWu(GVBgCJbc!IFqhAXBJHzcbC2Hk(zYTQVKKu1(cmR6~7feaFyYM_vWQ{l3gfb4a2e?M|WK#3v-2ecIn8<~`fv1S0}GD67{ zYgY(|JuqHm(F=o(>rM0n&i9+<-4jmXC!^0Ws$ecU5=zC>(apet8GHQ=B^1h3cfAdA zbis0(xJsmMM};s8%LN96R0~P4n6empO3B$!2P+XEgIIcpqg~UH;*cKk2RLBSWTDGH zSGfEfp~wpC<0mHmo0>Mcd6c5H`#W8e%u zHc^z^xt4;w!ildrnqG9ax-G3H0mWJVkX&~(OlUdS^HH+jJ4B~ts>+|;QZNFH&YrhA zRsEslZ0=!i?QLwmpC3_6OGIz%<2m~SJIYLorXOIt)Vjw6%xZ;~#(Z&F5Vn?AcAo~9 zS+x(P&R3PX8jv z&v*C=QGy%c(=rt>l{K%az(dg{QSBu|pAYz3)$58_!-Qg{p2!f%^nWH03|JNg1#6;G zmOv>En+=Q!Q3EclHStIn07gm!4&Y*w4;S?vUxo*2?csr1XA@)0F#qez)63lsir=;1 z(stN{wmL*znSj6o*}@t!GGLPTTr=1>k|c^~>`D40Mq@>8dUXig*-wnNz2yzOEjJiM ztq{1wKl#=smrR#TSgopduh?7aeGBHq{TbVS;bz|zc4TtQnA;j=2f`Gi(XuOS718`) zJqfZYTx_diVaM>=-1+^hvhvzcAl&mTzwTl~KU_GbmsDtlJ-m~@2_E49R?M$7J4@qX z69WB@A-EBh1JiNIomp6fLU$$@WzNxLJ$C!gXG&+kY8>3j2ZBR91k+DsD1a`pWHoOs^)<{?uak8tnzD5CIOJ# zMJ*b;UP&%$qk189=xj zlkS(qq1maT(A}Z+9})00KpLSJ@Pi4H@PGT&7Xj%1&~5w@bNr9$HiZ77Z7K8nDFW%* zqhS6+tio94^FN?|`9oL`^dF07-uQdqm;a#~06w?S@z>@C0dgDl^UFVb1o)4Pz+coT zs(7uD%J58wKXfQk)=Mvc4gT*}$j*PynBVV_5&7TvcoEA@t3KsrvFKq``Bh(H?yH;^ zU!H${^7rtsr=^~U-5^0!4xlh_N%dG zhcUCxhimKae|-z^uH}JPwVMMb|9+#^wqF7zJqzjZ8Q>DXzarqvl>O><^J=l);;$Yl z;(^G3;P>$B4b89r{@MQNKY#TkAQvOGKPdE9&$dp6q*VX$sVA>7)rdt>@kxJ+q)Lf} z9skn0d=6I;CLX2VH_Zv&dGklZU-4^vICFhtp7d+FjTs(IegEAjuX1cEy7tb^jSk`B zk3xrszeX&tcdha-?X~(me>j1;vLEho)r=+TdVM^OwM{PZZ(ga)$N30Cc|DKiamIRk z!0I?j4S%?R{xQ!9z<5})Y#3oik>00yUm`8>^xR>f5^Su?y)7K zecYuM^5`FJe)@g51}b>|2atQ?FAYpb>o_7|M_$#LQ<>fKeag$hY@u^G z(9Jfl+fu$DzNpoqV(d=!*=60Sb-()+!&(-hTPd2_pA#yt7#J!CB*ATL1DRA$4aaHwJiMC2~{^tkJapA`Bd_W^4d|Ok0CXPv3W&(SsLfY{V}a6|IZEGG84 zN#2?8sw-EEf9PkobP03=qZwNW0gB;t0oet!=SsXMd&dPHZYqTEdUP1+!akFS*&Y|! zL5{O-r&Q#Rr-0(@S_xKPfHF!N_M@*Q+Ul?5w|?F*2V`|ex?A33$H?QV-Q8{nDA~|k ze@*WoNm+586@rB8l#DKLCmw^id|N2<dCOr#-&w*B6`lBpbCv5wPLkD$7I^P}jANWSiqR72OWHMapsq3KAB~tc8zIvx7+!UQzPmVKSB`<4R ztE^53oSAv&*J1LfnpcaWClDHINb4;7c_SsCCB!3cF5+|V^|bGk*A6=TX1l~wJ*3yy zKQ5#S;m`a87=Aq-hbHQdM&UcoK;yXyELvx;R(MGxw4I27>sCV1St@iQ49%C3X+3!8 z&a)Yw0#8z+{?XL5iu3iR)}_zpS#v6UZhvPmciv}xnt!fFWLbS2gWm5Ec}tTZKGC5V zPAhAFAlKh2kKw0tVm`6Ok1e;hCQ?X#q^5QJynYqbe&P|8t8>-3dz+F?jZw66E5+d1 zq3tpKdVTZ;9}qmYb4hEnr5C6@r#3&zMO7H}JxRVXK{<|GbA4E|KAL9!;h-BmN4A2I zGbip_!LHpKhek2pmG7Wy&5iZCX|q#q&60BMIz-k>zgWYRVY8{O`zlUS9T8V}S?zud z4Xkv|`bJL|vXMex;H-Bk%nCxD*%+pjM-fkwI^iuoR2+U79UDR-$lk5J3GXrf1NeGH zXamI($J{}aJy|010dZ4APPv^<^E1Ia46fGVzPcE%PoZV>DPRoJGy6G9ZbHN9Jdj%s zzNyveZO-1&m04mj?v%z+>bngA5~*00~0jAdZ%hIwYI~nX^qTFmR_v*+U1c!#qrpC+kn@xD7D5IAQBTguUV%8cou~(q>FF);r#~ z&E8*0)je`c869wdb-}+&W~VAzxRcvs?~=yt6@2}I9e@@tZc8S<_X;EHX0J+zDaKwZ znBLYq_EAk0Q~y}+x;1dfPRMfM;W1h3l$bu@en{iOUvApMhRPAa+>Q;or4xB#`7&pH zlZ>n{_ygvIvY{T7qGHbe@tU`zU3?Gi%U&gp*qkU&Jh18z(AmJGGb1oEHe?B~wsn}} z_aof-97W)#=c$+_9zp}=SDpLU{N*L5Z!Mn`OwxUs%aGH>1laQ|OePq5q!JVsc0rAd z$g8FK@HLF46u$H`2kc`nrKNhdq*yvmU_ma0@9K-iJ_RfZ*31o4xwqBS$`8eO)9_`S zys@Fptd#O&@oeq)X(s(h1}V6ndZ~t-_R!U9aaEDMn@aOh??2!by51%Ga8$+g zLLX#(H>qchnN46wkDlu>gs`bjA2;A`8!>7!?~;m(!=s&8H37Jz{K5{x}#__Sz& z9nKGOfW)RRBnIfJ()juIi1X`Zf=agE;JF`zdw%Z;jwyzj(Z>baLwmnRSB>V@p}n7$ zCl)m(UJz?ZHZF1N9zUdP5bxPuEv**aJWog(>+m_|)O*>7chl6qGaVtfqB56E7?;ng zwJbeC$yi4b)Q@PLbn8mj{8}OF%Wrm^KrJu8vtjI&Dl0wCXk3uGzP`D_G;K-XM5dHf z1rZBxP9XJ>uh(pT5FzGk$I>v_GD+N+S2T%4W75g1XxyaYL2KEexJKpL=HSUfJ6Ju; z_}bln@n;j5KUt%FFZ02P$kzd&>yMyd{u0=1;8G|udEyDN=mbR!)P>K{coV{;7UyV}D~ zuvUb!6BLE|qvSgyOr(+6e2i~D&SmwAjee6;!sJaIcXrR;B6DB9O`sAC(;EbP62+AO zaS;Fp1`;9igX9u)@(-0BK{JzG5>xynIs)lGizBaFj@OHfP&nVH$jV2)8%h}O@YKdW zf*`QdUa&|0^hV6IRjGK+oed*A{><-?cWrNGHscmK=vT!H|E{lOb+vp?-rM_G?~n?= zp{*zp@(R-c&V2zILqeKy*2q&f$y|qTIR(3=p7&O+%Aa6S6`PS>&fwVX7ky+3j!Wh@ ziQaT7X=UAR-6%%M<3daYAzfLMq&8vf_8G7r?gX6-xWbiN4g`LkfP*m5$WgRfVVG<; z2~kZmi4kLSl}vTTlTHt_{KXd@?Xg~&_UOYfO(O%XluQ*~3cF4in5?O1*OQ)Q>Sfw_yRQEme(RRl6(zgbU{lH=``#Q6nUlp%c628j&W(M81$`p^B zw=7`0q`kMlrvRcV?jKr-S7eSN)_LlO#GS_xQfPyi7-DQD7Y&{1ew#(rdK^y34^&^D z(*&C}HGj+SOSe`+8a4rg zka@@EoUvF(AWOR@$P_Xn3YX>f+TjC-`>R^hAIVI5A$inpcz~(8lZg@(06cyU#%1@j zy6h`i4p+e^6T$E^z!P{?b5z^jYryB&w^hmBT4m+9IAdo_bGv#quO;UW!tSB)>Y`}h zK5kT5f|OT)O+uZ;zH32w>jR*BXqm}Bi!kgILP;qp2PHI2nj7gS2dY30;ucq+@>nQ5 z99GE5b$%xPvD_vBs_aW$By~eJzuDaOR!fGKpUv(Id9`6!DPF0=Kx>o4QyU67#Qb{a z^z;voo}IBQe_mnHc+mZllRxw1Pt(F=rJbB@0be+xegjv$#UT8Z4OA{MDq zr@H`sAX{xOaU+1j0+!y{eXo{Jl&1j}dye}<%uH)opiB$7FVBT|y#-r@r6ekMX0!d( zNpXLk^hoAfoE6pRo1z0n%wBoGpVYH>OW=o}v`#omknAoL+Ms(?vhO z`<$VI_LgD(y;aMz?$h()4)$b}*x=F{wMr1nU2xY@#|RViG1VeHzn95uJXUB^^K{BV zVY$WmJ6duZszaN_h+0!!`?zHK8>sBzRHUDgaVgDemJHgEC-uX$X2)A994)Wpi}=|u zbOYi{Fx#AWe!E9GxgJQf)9e4{S^bcoc!@}yI=7V4j2JZMR{mmwUsT+?kjEP+lyP{t zcQ#np-M1qmt@Ik7bC=`!!iHBHQtpEys!c^Z__~*>Y#=WBTn#RO#%_gSa^%Cgoh~~d z)9nb{%#mTUyGD)$!RPU(V_8kMfo4|S(Ju;&4byDWQA0RH0-MTGDRYT4lZTs~vsZJf zZf%|G2WL)KeZ624nEs?Aibbi3pId6CCMT-stZIqZ$#6^X@kBu)91NfFYBEo^)lKN) zcf^gxhMiS$zkCX=+jC3%yg>PuCEnl!=xt$XY!!tN8#RJPmV6N7NHe6-`H5i?k>qu2 z=1!4@|GL^(1TF%Bmd?(kKG(0kKU`8#S(_;QAIygH)bf~|U!@c<>+)CEH4v$qz!50!%nrmqv_$aP(sAY{x1lIbi!3YWhFP;0qVoCGGKrk`%3#Wh+i z!Iu~FTAm+%+Nz09v+ax2K%gs~Z z@NxEdT^W~}KxL_iVSmdz>5x1bKb9$@b+=&?&B%o$!EKb!z4X#{*1DxY_U93Gx`hcx zBc3NGr^h72?IWTE7p<02T$2}3qHHAh*i;s_L6sYY%AwSN+Is^?gLx$q&`L!)gxTFf zZY0C6y5P11n$Y)3X#m?bMlyWfzBJzsueGDmrHLIfLDKx&1J?z6;31NNcjNY+lj(C< zgkX7ep(36qAKGm*RGj639QY$?I6gxFkY^Do|3qL+_4)45ASUz44sP?Xb36FWU|u&& z|8TLNq6x!ou=stlx{ed{B*Q0^-0iG|{-vm+@c|wMp#^c=3I!$1)=`)0cj%I?w){`A9!P#9LmP$+Bf=u)+5Bgsl4h+|NaYsrIeT)X?&clug9q zlz2K1NB7$(A2N)Q*XihWFk7DONiGHTKJbQi&a>h5&@qGDOp>kQG%hVo)vyAFVD8q;pj=`HBX)eXp(wZ%ok8u;cJ9#oQo*X8&*R zk{YGqB#4XXb0*QA>o?RNi_&y-EyyyTm!?_YSK(Y=PAI;a?68>i{>u-Pq6hpyy{-}N zCx21*SFfJ&rW$Zb&TXHjPG5NcI+= z^at)R2IDYdGH@WQs@l#6#Uf4N3vr@xJpk~h+ZSv)}CE-)MkhMZlOZL;>H zsl0%Oc9In}U>N-DpNxg`6HNnny9Xd)ddeuXXOfBe1x?a~VUlX!uu5Jq3b32n83lx` zL_J@1VQaVZ3!u3IY8H5@mBX)VDUG{PI=mdyorg4*#YH|Ex;OiFCRH&h!(XVacJ~eO zLGuG58TY4_{nE0m(?F_CI1`2=huap(9Q)U{WXX)5?tjJ7IOF6}hi8J(gMukw{s0Z% z_UFNY-E_=Al9b5yWhyQ`l?%4e=BeY3Qvzd*k|B3D{ed>N1pZt$C={Wk&(hN$uQeg2Jl;@_R0JS|86=a*V;{GM0+9tRD4dv$zwe*Fh+eb(Y}v-^S- z%zKN#rGfvA{{OE$#rz^W6k{FSf00Fv>mH zknDF?@w}-6y2^ftx4+%Czcs(DMW2A!6(|Gnju?`!e10KklDQ+o%LmC>9sEC2N?y5f5 zQxPwd^!NSqxU(U88`=~KfU{A+I>eUx`7+y=Zc9fa)4wyHaM}-fGwUA$9c^^NOS!{M zWca`5fv%ZSdKp>&KZqjwbFk6xUQp2CRc)+jOu{x>0hn_+6bbnSAU_}D81X^giv1ml z>AkKwCs=(Noppq(y?$9_sZD*k03`S6=#NjY&WryE*(^%BzhV)9*7A8}oSGRhW%V*^ z1+bshI|cP;(qV^JPWJyElsUuSC4@Kv^qPg%74Kz7G|L9B_MUM2FQE%~p>I|H{nhad zf3^_f18y)8KP1v8*?V0I9?1)uM6piI^pEsI z2P#UAV*R~R8=^9Kq3x^yV18Fj@Q?wDK%pGqkn;@!&!9Iu{>x~fjYXOvRAKBys1PzR z>(`zE401HSy1gn&kPY5~!QV%oHzxoLvqu7FmbpXx^3~?rJ80-&QM6~wew_a}N1zlt zaI$&MF$n{&i(Uw?XHG@D@iO_-e@qS}tmTQuSZTSw2QQK~ofdeB?6W9%QT2HksI@eq zG%)FRW)gk#O$W%edez~4aunG9@aLFdfj8P!A9&jBw(@k{NCX6`pSM>Z(sT8|3

    x z?^niqBf>N8FFU7AXFvoJR{?sTkNkei_#7|!Fa;~I#cZ*B8!z}=W8isT9FlX?y#}5k z1;Pl{KYS9-exUlE z0=3|IfE;FB?t(3^{d{5;UWNv&o6VD;V0lH@yU0J*OdM04L) zVqzj*AN}ED3bcbok>sz(`HioC2AlmCP5KkS$?OU~`zqf;u9KP{uNUjG{f12l1CZ@X znS*nVfXBI&M(=@#M#>!S_5q6^c=v zvv^CJ-Fp4C1Zr1M+z0U{n1 z6G`@?AUM_&=uJA_0E>=wjOb76u)wk+ah^vkI&N>>*YY|xFbwdf=<6(-(4)C`?7Dn! z39{e49B#j^KJaRq@9LYvW5w!SMQ%F`xaX?fGmxMPyn5z+{e1`g&K)SQH8yA0Kb(Wa zTGW>0h@n5vW`doZJL}AC6af{3@%#GPtg#Q>ye@y??_&JES1A z+lujNhSBdFU7;n@(~@)Pc7W0E;+s3;xm^@R_jm8vW+IZq#93co%M-pC50Z$RErX{m za5)Zp?~QjM*XFmCCwB~PLsdRUA49Hl*MW{$;w^eNRr*YoiTVuUYoPp@pEAWmRwM%2j3dO<4A+ z400z&I#NJY2*ed2fvm~;o_qO(SJY`eCaCBJ_jqorURW;pO9!|x0uO7btVca)(JVKf zGx4V37=(ps5t2xt3tmt++9lr9G?S>YUE7%i6;p{$@OKK54P&GUXok1Op|B2~&Zt~Qx*P#yC|?Pazj&Y=y(qJW;S7uz ztGBk=-~ctnUv&36Vt>8@Jz}t!Mf^vu*>bq^)#!kz6NZQuBN~~S+p+Dr{wW5rK>vC} z`bH>)c`l$;3)Yy4+GV^ql+9WEwdN$7xik1lo+nU$>1h%4xG3rs(DdAPf7}{!t?c_a z>z8ThmTSYs2()eoI_iuQ(ELO@Gk88AdRimOdoVAXqw(Vc7zgbC`{UAITOD>oe^6!Mx#|eUHy$G{@WkQ^j!543`}Az3Vz? z24w_IBQ2PDx}5f4=2`?2=Y#K#yKhKZHHmRBvpkD?5QF1#lk@@(_0XHp%GE}cID0=#lN@)30Q)&A2%?u`uS(kX!xbh}R-G3frDAChE1 z{&%3k?J!x^gVBC2{}2C3gFoEqxI3V;i-q$lhC66Tbla!>R*)seit|n~&4PJ8-yV)& z;j2sWTQ4sGo_b*16W_HyVMYLw7@6~bac~+=4(qkh1V2tNKE7!Pp#&E}X84f^aT>mG13N7T3sp5mv2QMs?<&LqxNDWkE z0egFtL!i4SzuQXp_6yKsv2ZPi788q@*Qpz@aAGi|y`D=R zX#54b8jg-^;ffE0*{-(S{p!?+f)}Wb8d+)(gIl1Vi?_tB=d8 zwv!p10_x&f7a2Rm4a&_OrRh*6(aaTbqq zQt}oRalryS-@V5C?W!DqJ(Vn!!1a99HSq-->MJY2pr6ED{+KorL{89o0(GiHuJSx3QwB~ z;MBhE5Y*OkC!56vIpOULZfD&VG(=0F6gy(U5m%K0(bv{X%c%WU7m)#_VMj#=pgtVo z5IoJiG@hJJ;dsJ19NnVUM|E}bnF^g^{Kxu&D49y)ekY#71_7Hy_;wfBAlr4%kw z_k1BBAPo7Y@X@NMxrE_zjgk58c7ehKi;H&mS)=n!XCu_bLcJ)VcYDwR%g=+LyG_=+ zy$PD~E`!y_UWJmcU_VRD zHx0eY5QwV&EC9Ox&O~E%zOU;X72KaOhYGu*T4degB4qw3(G0Zve%=H~MrUw47)vIp zt8Vog78Xm0mcez;yTN`{Uvcu)IaSstkvY>Az8YFA#BuIZZ33KrAwyvkt_Z;>0l=_R!7-vPP0ATyqK*w9mmj zuW5ZT+8u2s&5Ke)bGvexOTDKcc&9i)^=_T<%{`Zmv~9!w*htrFmh4_s1b|?PiaY*> zUx)+orcI!ro*zb^+uV+91$O!bS4!}=?lbrb@zIo6g`;F-(Of6sy^EgJ#LvN0i)t;{ z#^k$+Xml;lp2R+iee%2zro(EqxmRm}RpZ)=7^N|o`0=}}J1LtpLrq;HbpUPaIbG0e zhDgQ@-v~;t)=sJ~Ei%fLRM7LVIuW7lcSwImN@g16#sp;Q)w^{7>(Oa)SknNSWH+vO z4w&`>&3)+jH#Z7nq1SB1f;9{JCgme#6oIrg*uY1`02jo z*;$J|s!W$SL2Ngk?8ifk<>RIJf-sHs4L+c6S6zSsa%SRi%?5x*IJ&L z=9}#f=f|lUvsVxhLTbPLi35L@70Ja&|MnNd?xZ*fPGHmdVe%wmj*9xUZp*6ZZMEV+ zL4f93;w?yYu(U`=vh!G#?1NgYcl#wu^j~^o zuZ6Jndr#B_5}bI$;H*OOh?CG@^qaijOX1}g+dRxRDzXL!*{L+WDQ0LR2FS$<*_93I zn|e^Wrk-+XKew$+n#(btbai=t2pj`_P$oWzqKfwo!Yfc=OrtX>MQ3)P3^&i!Tg7ih z?3POLilxp;dH^+s7e0eNOh;!X`<70zKte#|&>F)+lLV%X0gM7h<62xl`iubg4wEhF z)t!PXqNhjD{h#Nj)yGzhr;}X?TxX%FHjJBL`l`n=g(qb}J)YkqeNnPHY$eJBno(*` z3;ZGPtsZ`87z`c=^W6*!mbz@?WH*|wIF#l**xP%t$`+MrUC7u88V+38eWH*Jen=Nw zEE`y?xw=052&yT_MOX{{b1zFqya@pZ7~BHU9^-c#F$y#Tuh3vj>w zfS!Hmoc8clC7Z1X>nL)cVs-giQ$$4Pdy-@C}?Xr z^cD7Y$rpz(Pc~$%RCWyCu`Yoe2QeQ__4z`KDbcAhhBxd;^jJR7gY|@Y&ae;={$~MD zU(iZ{qFC2+081&{pZc9~3*HVyC+@|^h7-j2?IAr~Cgu8Ft^NU6V3qU2ufve%7;%)Y zj|Jp5TBX|_*e?3ac9dtKR={I@6UzuH*-%(HE%l|fa-9mmds@>lP>=F0?Qq%Iu-E#A zyhGcdt}fF6d{dm}1FzQ7=2 zrh%tln!ZW)yWLapE6u1*G|DaaZMg)#1612A#J_U5-AXQ_W3PW;$uIE>>Y+Wy3gmI= z-QpS8_{zD$1S@Qru%JDhdEorOm-v%yRQM`N4u z6XS2hMvz_7XV?fH{M9HwHvOi(g-i6L8zV`(7N~`S3{swc9L9@D(mKtH&(G;@4 zM6Vm@P@RO0&_!=NJ30o!b;gt%R#3CWVbsSDS~4D%4LIl?$`9n%>><4RW>vr% z#4`C&8Qx@swadKZZk+04$yBR2sSmPdhfKkkX?dbdblz>j#dJj_Y%4^dfTG^#z0q-6 zF^d9eTGm=|fD}1z9E8wBY*jS4h=ETK5KP>ikiu}^<$6*2yx!$5(1`6!DErgH;4EcDAqN+f)=K*hyCD8OO>|1e&I zwSa9GB%opeX@G|Uli<1Gdr;~`fR5fh_;XZ5ADV|U^g@D9}X@!nw-+$zr`!WE!9Elj0AM&KCamNalgH1vhcBfp0S%o$2;)YUK~=O2fRd zRO?c^LwuJa3gk>XqaR;jj+csL#~IUxV1O}8P+r(+N)M$U==JF&%BRb&ulm-Df^~_A2X(|SpUs`3Co2regYC+4pRJSEB|o}68@x` z`qN<1s!iVKE=N7bh_HqhOkJy3I-ENJ@Bn~+2^PeC1X!`$q6iiYo+b4ZZATeKL$v>_zzQHhhgC}|ES!P|#UL+Cuj z97Mb`G);I{mUikt%9AdO$CO1R^9yF<_3_#33sB1C#ddf1p!JTaV^8v<-(OtFy|W#x zLF}I4c&He6oS>%kp8tB%Q+V;%%4~t_mfkTpwUlUvyf&)>%K+9RlsNG-kn?S~$7^dw znYq5lM7<*(SNk9H2I=Fr9d1t7s4+-3r?F6^aP8RLpJj043YDJsG&%8ArHNWXsC$ri zHk_Ot65mYGx-gSY*)CXy9{Pt;$Gxw7Ur$_V4X>O25Yqu6H_R?i`PL3<0IB+s=RioB zm!n)n20p+!y)z|H&PJ^}f_~BfF+GsT<%e2q2RUgOX^Vgw$)y&+fL0Zx4-V#Op~kQU zn@HWL{I(r|S+T*+&G{unbc4>e!18kzQ!`NdEA?7k>_Sk9R;rDBQUrn104`y^^R;G1 z<_D%(G6`X5=fJu5z>0U7v5ORWpy#47vj~g8=5`9fo5--E8->aXB6-e2Ii!{o%fYJDpsy|vkq$j;wyTDVe?Gssq_y2P7kmFn`ii>G%G!b{7o zN?jR5cU^bF=%O*R`v_PIf9Xzg7oj`*4lODUHnyqjRy{zS(5eGQi-Fvl_7y4_Pw&dw z^8j5Z;zlF2=Co!dvGC^%)PX5!+}m-KX|3rSiJP>nA$qyFC3P~szRNJpj@39r>24?O50-BW1Y2cY5GsWo zd_0pS%WS!`syjfN344M#dhtf5Rnen3L9>2Mk)^~ln6$zENfZ28;Y2XY^}Q{rD;k}ai=W- z9Ne%cB(1>|?&Muf+tnm*(!5me*e%3-4s&iSm7kNl79g}nw#j7oK5Do-Ep-ShjmB(! zxVn279w$Dl8GF9);!pF9!*X2kR(-;$D5L%k+AOi=>8WVs9lRdAz5Hz%=>;vlo$)6B z2<4I7r-wu$yGgiKWQ&zuB-Wkx-h#g0x|Q0Xw&d^uo=x#qJ@n7;xQ%q~II9AZY=|EG zh9Q|T3L>|CpWO4;CTfw15eo7jWar;#Vsx)th%aNS(&eeQRd5;fAq;gdTBsJts=dR- zRU~jmaIq;w81gAXL0X+zEy$N8NDo7shmBR8Oe^V#dfZj|E>%jF#wBbZEbbe}Q>`pr z_np!RW^1=|)@llJe1EUAn)Fv+%e1MgfhCtwVO+3^l_*^p&xiO$Nce6hg4QL^E}pgL z_>dnCJZ(rm&@iqHoFt6FY~FKPzXfi1!a3+AA2p*C6H-uw`JbLw#4UFN16{jz+2S2` zcV&mrIR2EaK`p2L;1|nfT~`<@#CTs^7)a!KS2xtn4p%vPs+(shaIy4AmG$=aBYU~( zjSO4cFoG{**Ch3$*qZp(W7>HHDnLLzNx*aC&gbRT zCUGT1PEH~<%1ktVq83zXfDX^*wC~^@=JX>$DwzDy*5&GqA$u{x*ZmOXKoxYg5l@+J zw2N6%A>y73mHk$lHS*Q{kDdnVsB1N0HpefeRRu-+be482L^Xq=qM~a9o|8T9>H2K( z75*nnrB-p;pNA=a@%C-2zi~}y8G@v7KxTpOZf1HwgctqJ)Pfjbl&ls_C$lUNk0Xj# znRDvbthPxDGkHx?qL@>{le!(0?S^Y8NxlA^ht&SWU$XdjY0*eMl94kAZw`u>s^;XvOCtV zzQyO2`pIgq1VveS0}ZhK?n*bPwvXOrZ+sO5vs!{I2W*e=JyQ%r481V!jtq88h~xJG z{E#o{AKw$BhRE|0W9QLTqq0&s&GnkjGJakQJELSVa=gtcTP+UGfaNJV%k5`>@#?LmHXnlaoSO2iqHx z3vW!_A9>x-^rg!OlA_oski;b)B>}DvL8Ci6Ld0?CEZfO)P%~<+_Gj0$Jo9!c0*F~S zq28;DUu+G{sAGmHbFaO^A?#-lYOF`B>3T8`o8`oTy{X&c64Ilwr(}0_2Yu*sPsP+M z>JB`x*ZAn`RhayM5^9BgK0JmBO8l7qseZ&Kdci|2WGpK>gMfwWkP?vv$QsMl)%O@% zJL310y$@-L`(O}g)P$pkM=m30M5d4D+o?-iIrSjhJkMNBrm8e7`H|Tiw?zD(TJ>KQ zPow?Z;g6(YfGJl#JG%IBuw5!VKrQNp}pt3u5mQ2 z)hq%wC_Q)QE$jpD`Y?HT$a-sl&;#Dp01tV;_U26E)Xl*1Q~*qTH%M z=2Kd1VamL%Gb@rL^H8_lz!^~uMG*U0gvxe2*i;;w)$+r;YMdK}4ma`B>wKY}Oh-(; z$)bF(~f&U36V;;P@eDcIC8Q$}n2v+7;y7_he|~fhEVMy951+aadp|%lehhdA~b;%KE2~Frf{RGR=r`O>=x8N*b3h#3V>z zaLn8L@|`bq7YlOowDH3>9P{>9rZues0t}EH_C-jxZxg16h9NUdvX&T^G%L;nOwtn@ zYpbnYa2I1yMS+%xHa6WAXm+NUGmbz`p+m~h%Nc(_Q;MZxcb|M9nEg=?}V1@97n=y0(m%2yA;P9bpa}RH8dsjR1CJg!(j__z-?f- zW|y7upg;*_5l`4N%Pdi|ouD}fggmXK3liN(w{)(DQtyqbl#jF1F5QC+jvNf;OM=9c25=lACt6^L0vG;Zq4uvWxav3 zk?PYNjHY=JWA}2Tw#b1ymA(&&Nl%)OJDR_B#4!!b(btse_86-#8O8M*<%Sh+=;Su; z=t-U!sQmP-JUi-hpTJ1nyHp#L&{v-_6T7ZhM!V`MLRoB2L>=L5qle*+P-&LO4k5A= zhIy1i3C*Ku>Rc~bhu=>o(uPvk4Z{add`LqzrVNVXVQ|KY+|&u0$Vfb~$lCGO)bPkQ zaR!vX-154A;39TlS3%pDs!?JidDobplEDI}QdIP7tc@Tn?=fm!b^gltTmFG0^{Cf; zx%V;6y~H-h0oGUXR(AzdZ}E7rk0ovtRm4~siIsjAHe${>tUrnePO7m*500`c$hAXo_@!_H_G2eJ5eb{iOfyx`|a1{Szjd=an&NF zIrT$T#m{q~1Ra(qvs=uq4ET;4A2zV1nk>nvK>^7okIF zvemw_=0vf~B0EPRG2DQ+2sBuXH1e#N#vYQL-@lR>H)kb5dv94UhLSN-z;Gefu-JbbFE3AU>K@f&CJ)07ci%2cil-P(9WYPI6XN z?}w%(rBS2E<1U6$$oE3OT@w0oIc4#+FD3o^h=Ao)>KX`ju{?UA)Off!#^l>uI=T2r z2645Ki;V}^QbO^kv@JGMpx0{b$#!FqO7^}k_B|z{8u&4@wiv8zx&fPS zrbkZ~(4J-|4F){uUesi;^sfK#JD-TsFZN6uo2Ig0b??Y36n$d@C3G&wF}GkHa4lt%)BMO&_<`tcB_mEd=k{#${F zW;>(+38$Ko@!U$3yt^r11gIYpU1?Lx|6>eRi$z@2Ypl}d+SdeVy^WPQgc=#&|B%RG zs@^xL-r|i^rLn-{2D|=}a`9D?e0q>WEwCId~cxb}mQ=w<@Al$|ja}%##{5*|}F)zAD`y z^A_aXDzl(dp3smQLV}yFxz*gX&x*)aE>aa1OPxreDuGg~u2ZpEV6KVBQkRrIU^*%d zoOX$tsc?GGRHwSQY}Yfss8{+~7gsU~+~GqN`!}CkxuU6~ly?b(jL;E|bf^89DxI~i znraiENGEFY9L(T(BECTATtw$hGBL>ID{I(evNJl+vAN`5he(=W4KKkRkq7lKaMJOi zEawd?{79r|Di1Rr9+D^#@f4L5yA%%8R}(uce&1D=*IC+6evZdRr=h6e*ogdVOcP^i znj#ND+f*YahJzH4Aj5NJZUVIUbqkn9>{P_w0fb!9kgjtdmZ`iTL?2Z~OjY|8??w?j zgWTusbovKuyscWZA!{^#O8FM~8sg&?Tj+)-5ga za`yUdL`fKZ>}xgqN(q&@;rxN!IiBckl|z3x(1%o_46L^dAC1TNEMr}*?cV%If{!%W}Yc-U@ebWE|REZO`zlA9l9Xkni-2SrHcNrHKyq_P{ zZGqBkb*m_H0n)9TT{h;V`GL?11HTV#JiG^$O zD7ZRY7qqt+Mo|Q1oCG&0wmKoq=6qE=95HtTZQsOFXA)0MJj(sH4m4ra)9QJ{o!T;u z?zxb%Qz-!q3<@6kXjDFNx+lA7b@+|Ez`~lb-diJ`=qh_Evyvh+gcE2hJf53DjgGwR z{TVE(xmyWQ@KS^{z%dZ(^p;*oC7Z(yi-^XHS0-4uH-ZGJA>2Ib*+wvk&A%+rX|Fhh z@ycxaut)EMyPO_m6Y4*|H?XBQpkBR`#tFjqSF1D0-H=TewOmLQUu&UwEtLsH`raz= zQBt%lH_q+7_xEZAvi%u6ZNa;5CW&_!->v3qa_>^9UU2AT#J|ulY*?`xM@u#8Pbl$( zFvCU;S(Vt^yIkRO`FG}T13M(7Fta}fE3xb^Rrd={LZVy0X*eHnDI3EN3pHP-aS+O@ zOu$G*?@&m$-EK0HhPThhhQaA>2ye z-a=dD5h9tjtb4vMnC)>{3Isg1Z|ChWihR0ayJUfZ1i^Me?i75Le>}_O^>;`QRZM3t zo%;a{@a;Z;PrZJb0P3F!a-Dc^qh8tct_Xa(E_fFVj6aXvAZ{$1H;!x%8QBM^)How; z30dN+S)4N599AtV2=v|^p9o?nJLkbM$`zK_<2{mkclvNN;MX%KYdw?)}^OvadtU@YD;rH$Y zyCaYqkclbPhqp!N_;#i3sbklNNQiEa%~Z%h2eL9FcK@j&^(z z8G&*x8(!j<8$6C?eUM&On>JTtMD@lk&jj?I7UAIDdJiMa+FH!uN3awx@t_h0R$~22 zP$j4Jukb|Xi9a>&^@?zyh?%G>sW(PM3vxt@kJ6{Z8m5)_sP4&QAt|2zKR1;whTPl2 zbD`>{n)05O$Z7S?C4PY6@)Txi)SlZFSuPDD@X8yI+$n3Q%<1SyJ=(#Zxg0H zh{s5D6Jq}OV}ZYyg8%nlgFiw1&w@V^yaX|mjIGClKI@Z8lp-bW|Ad7k7V%@6XUm^^ zGM}0J9x+&VGT;5z2u6J$B=f!KUBHRpZEiZ@PiWy1&Y-_zN)qqzV_2)6Yvze2-hT9Z z0)AhaO1z_srX~s}=lM^3gn1mLUyE~P=LmK0@!)lBwE@Mt(%Z9SX{wT zLW~{%;fK?`*hiAbWF5jQ6scd(&A%^{=mN*cvHvkg7@Pj43q;DB{;I}b4p%|XKzKx_ z{Vt7qwch96Epgu>AsQ|1lOqligb-B@2yPi2(7y%dr1&v>_Z!iE)vUFGvP2J;;Uyu# zflyx*8^Lxh2cr{+iTM-eZlUxKqh>#atgaAx5Eb3JABMJ}R-L5~1G?Td0vwRzfdmKM zcG0yD{4wW<;@S~76^eD;Or~_C*Zhg6=)s}2U1;zZb0jTup_Fa>q%Q3INS*jeGtUc8 zBz%&ToKgA#7_lN3mynPUA3xIb6q!+{LAFp`1vUbkLG_#O-EeMh?o+xw%HjtADiXCt zB@!q{m;teil_Y~nJ_Zktp$J8f(ZZU_-ism_1f>^K%Ekcr0)R%+T%4|T^C-stVd1dR zJUP%5RRd;eur{~Y-7y^UtNbKkCUP>( z%P=l6Kkf9+P(tT1R<_~HB!bg4C-Bi$#}XP7MN_+?Dva(1h?BA#HDGe}(EyebqVflG zGQS9b;`!b66bqg=GlqmmqE>y;So=`d(PFjDjU&dhmv157ZD#F9=Ke!$K#CR*AnV3( zni)P?x&k2=@qas-QmWiEbKjfG{+m-;Uo1P(#&)rNK;sf-r3JSd{BS^{je%EU$mhMoyXvtDG`aKw{qY(Vd~Vy~yP8rN zL|<&Mt;=8m5@2eNa6nI;6Fbk-engS=Kn{W)vcKEK6e0-zYMb|@M#PrCX*TZ;utCWuJ#v`tMJ*TdrL-P;)9W9Kq9I#|pp!Wg%x(OTSP%7op15KXUed!}?cokF$3T z1`l^#>A`LA=Ns9eBWu7}Bd?zUBBi;nz*>||`14~f)R0wZrL&O8{l;Mx2ya>aw;UQ) z^Lu}I;pFu&x@$kfy$fWk>(b;V_Sb)B4P+kr%ii8Zqls8{ZFYEmh_UdaF6O=$bxDSL zvp^&>+mVGrkZ4j^x?KxF8E6Z-`L5^n^#igV4#b%8i%S5kRs=3}Nkai1Xc_uPE|sNs zk;op%GftR<2Ew;|&p)LWo^H-YSEE**ja>z*>u=d1Enn%y%r4)XV;G~t{hd<)n0!Zg z2>+z<-Ns))Ls2fX!Gu$vMmmkkNGH6)2>h5tL7v?sR0=H4J1_k<`1NO^4*KW}Z=hn6 z0`F0M1Vc-IVfq%}+iy!#WflNQRCakNKyK8P2Ru+oqXxeOS}$bvaW6J_3jR8zQd5tx z#Z#}v9C{oU;}F4jQ(g&tpGmb#6;T-+CP{S#(y@>Dx^1!F7beLmq>< z#y8*|k>mb%{=>#v8+0;+e`R5_eY&+=41<$UQl-zb_t*ZX>e&wJxXbGhl);DD78qX< z*kFn>WEiY8Utm(_FekCkt2f`;x`W3&X~j-DAzGcp{m+_5edNV~Ud-BnkpOHOw0F5~qayde#Kx2l zuu`%pKQC+ert-{|4Dn9{lxO3AmW0eC(|C7;;xo(Zq z)*#SK&Igci=e;*BMNsE}99II#RuQiCF9ih-~0##AHjFzlcjOKX@!YAH-uE?T$bsc)u>!+ZP5b`QkyJ0EdJpx z#&7gNQEKxj6VdI}qoj}Dg#s%v)Iu9R&+*V1So-84O1IMpKIjGtbet~S1NXLd zKdleG+qg?-QYciE%p&AaecqsAKbu^p{wldTBv;LRF{qbi(ClT^{f7>I-F2f|A^?#)641 ziRWa}Wi$_3njvloJPn!*X%cKD=9Rwncp}n>aurfHeVU~h9}DYLI!<(9)rD^;)UtV) z-m6sT7AjrRP=id{mJxVns-j}4Z5^ht`BVC88{At>!SA?BPqsV=AAm@xTWj)PQTxSKA|Kn*32 zgI2z9g1F?qWS^2t+6el#r5H)Pq*3ArajuwNy)=Ir3nPrNw?RL@vSaSgm~Dy0?d#h5 z6i~ev%qaF$Z=-rZ!v={51Zz@_liq&|?*0Y~I7E!CYLh)|#&ZEaXyc(X9QJq^LR4JD z>OVr}eKWhwYUWm|ED}`Z?nAr3l3$YqCo7)yX*21j4XbZ7+YQO)7tU5FDqGs+ejiW$ zhxsYnq0YMy8Trop$#fd+mVq>uC<0zxJMkBJa}XkBIf`cH^km!j`Go0|fI&a1_@-&3P*N%CT#qz@`sYQ89IH9`w;WES zZkO_mOSbnemp}C1yq{%{?2jbBC@Sq#zV!{Vm7Zj;_flJJ<>MBjTTU%yG7u)^}MbsWAJ%nm6!uFmPcWGYt~1~pJuyt*hbl5 zT2)1LRv*HjCpLT$;N7X)0qHv^fg2@vf`xrnbsO2Rwz(&pt&t>ON~cy-&Kg8PByWT#hsG09+Rv|A`$DqmL#46$)RoD=O;Cd$9*5l{ zCqC3jO)ue^#@8RG8{Hd|SCh==l)~Fcbil&W!%m-kwJfSb6y?Vp`(idNyoExHRzxp0 zNwx;P{foy|f5@jL&Mm(9Dm#`On#dAG-m2SChM*!37h#_Z7O?J}Hk^ih&;mkOzjGI2 zzEO*o)`j>^2TSg^gyFMeXHg0rvDKY+6;1owqup>Z)T; z+2CbbDex9R#pcjQWWt)lv$^Sd=RM2n*;P6Db#-nTF1puG*%^_!d&(`RIUJ2l@CKfy zD%c1L8JDkC;!sZ_zqBiVm0zdBM`duKV#7HCiRRq5H10pz}ffM2PgsHl@cvnbuA z8?5j@Aah`HX~9MU-m3?UGA?v+^Xthd+j;< zkPrpP2FwW^XHT(yof>9}JRrimSlt{i0FKSW$G2T}4|s?2>sN@ogr7C7YDLq|JA(1) zp=$$4J!T+?({B%4J=Mq^$5zu?K)p{m<1}r_Q@A_o>QJNu9jHt5NZS%(;$c zuJ~BW)R&GJ3<83fKfPV(R3o#&xzO%=8CL~SmWeZg-i&7|oW!myEInuC!lK(a2Qsw8 zP>)EnJ9mo{dL_d@BsK_8d|J9_p0gHXwxgo7lsouKK8)$Y9cCF%LmQc7bNFoaOwX~! z3`bgJ(kx`ddosu1E?+Fcc1jd1_$u-4=yn>~uf?9a)Yru1RX=YLMoMj>6x9jSmcB$$ zachZu!_AB8Z_Da^Q*D%;_THftxgbK|TSI%b5y2?@Fd`^tUH`mQmGe8q0EK3?TgCOT zWg~sn>ay?wrx^6 z2TsX8gv0K8Ry7NL;q0H7bviiGa^?C*58>nCklL1r@AT3#)GspLN0&S7Y|Y(%Nkp;6 z+p9JudiwbsdF^DFb9Tx{gH#B6yV>%Db!I3Tmn6%cPKlbb|HA$alCrx=e^ea&_H zrzcebT|u&=+?Qwy#->Rkh8>PVH&l>E-OpDkLM3I8l%FPi_;ayn1~<42e&NAWvrX!i z)JqZ{t)jlTV>(m!_p)V)88dLVVXL5&=NtT()`%7`@lBPzfpRCD>fAxZ;mwcyr(6zV ztDUcnYuLuMtM&WLDlY4=f!F2cj28cO^2-PyEq^eCb|zTYK_-qs9h3WI%BC1IQX2<5 z)-)oBhpwi+H)WeIf?Ksu6X+g&*u50ix=_^0P*dY9sHb3EsO4}$;* zoMvV3q%8-3ChRr59Vw$_ts{3Ju!05@)7CdQ4vX0~)jhOl zflRQpW|bDxH2i%C1C>RR)88A_AvekCBjuQ`9K%X|;B2Tk_tUQEt7pK5^sxNJ+_T1# zHi)nT*rg=%YpX@mWhic$2`1iKo6g3Uq*aJSx$Aw=JfN&!pLa+<^20ePc^Cl|S{Y$}e$i8f~s1%<%|hV}HdV60b1 z=Lb$yjWFc}R{4niOurUL>x(zRh@but#cH7zP&PLG6wtRmCXHxBlX^IuS9ijnYofPM z5VhLw$kENz6SyB1>sUY(IVSj2+V7XMLfahtIsEqtJPGl;{!n2dR471F*}veRO`}kx zrLdG~+1u=+Kpk!ylk~N9mP*d>B5n=BT-DML{raE>$#}-o4?|<_(FHVheY@Esl15p z@b&uOhkb-RMSpV6*tFv3;WKal5j;eQjNme^6Xs@^XBof$#*?0zF&#SGD$CdOF|dvP z+i7s$B`F?79k=MK{(g#wr2}Lo_5>WeJbsp#NbVTun@SYqLN{z3}r*@U-9 zHMUzt)vw`zN`w5-j)VEcdoP+V4z=BZ7wx5?Bs}#nqZ%r|%-I;Rq;L?F%;!cT7um`_ z8NSScV1-W1LwPQdE3_7POtjS`#fW7ttI75Z=!qC2dP+1EjPd9}ToqL(5*Siv<^J$j zbv7Gy3WD8Alv>k%3kpNh`&)KwhGDuncvrF?Khj9FzPXwr#(sM&dSYxdnT$Mb^4PM! z=J_{@@Ja0?7iVEZr>$YcG4kz~>xNNrCj5rGY4QWHUcO*Y*naW=kE-0&a91SPtL~LA zjYt9Mc4TKmKN1N#!Doy+L&VYJ!EMw#oLLA4B8dod=JRf5gzX2yIQh^LdmjhOlp6hJ znrS7kwD0Q`TUCGN$`OO`j{{GeLE=^`^7K?_hB+mghjI>{xz7k$1_MaYIJ~!K>(!7R z{)}1z*Z101z?1h>Ox{*aTa{-%c1q}wB;!pzkAC|0NfeEVG^9mhnt3CM(a&7_&E3dT zm0mLbIv!;&2lJLkF?>)YU1<;-Z+C})-xPtzzj?-elL*`5e z!8wm3m?|hiP21Jz(zBYeVZTL&bGE|mWHT*|G=?2*1T6r$@sAH%w_L#&Xu|{dkI+1_ zp#`5Pf)}mWeb%2oOS`Y?Kh3m;r6$tv%1RnNjb0bcEj$2Qtm9b_uB3x-@B>G(>G|*SM zf?VIe$_~v)Jk}2Fizkg6Wg3&T9Dgr`G&vD|&)`060^#BX!!q@|M#EzqdFf!xClh52QW6`FL;YG0wKH#^17cQM(c2e5vuXHW;VXmeoglNW?;t+ znJ9L&W{9PSd?i2;{X+aS9`&g8Pg~XZ6JYG!o16wAnppk#9w zkVeYV_~68vb*9Ydlg6XVT6)*y0*Lt5OgM+gDuM57>iJ7Et;bK`*%1FV zoL~f&gH!(+umLav&Kza?gU|tppD9@Iu=Z({L{-7TW3@l$GjuSXQ8KLZtfYtM^y$Z) z*{)C5mPa4t(Y+Erx>AMprsC#9W4c=Y=&6txi=s4+U>nn{X%;T}<@#@t6Y~4NNeVlZ zsVZS>sXiEkzQm+|cWKe00+0L+rY`!EnHpWT5uDP82K23YJCLoixZr1HFkMlOE`8~z zOv^wVB7ot&f2oq<5z!>-x6zr+2rv#R5o6Y$S=dWvvmZ$uR)h^WSf*~l7#i?gz!rh} zW=)7g>wEeU>bs-qVH@PMV%2J163Yrmo1vXxpL|!tQZ~YmIKI@(pF13Is6H@!pGi-7 z$J=AWow#me;ps*sqbDaG8tK^hrW4X~wr|xWu|5ko30&i&f0?mALVo%l3~BlWrR%l; zLg&yVAsNka;4DRcHOH%lwP$cly!j}0uM-dxX|H~1vS9R(_k)ZNXaV?ok*M|BDyysf zCG`%ZI&-Im|MPbUNQMnl&Cq7b2DcM-1ut^m5~}hH1unc2cc3_dM;`~n69%LD-=IN?vK zteOA=hV;`A5)d471FFj4>U8H;HV(l4v>Q?~n=&$mE&Ka6HJ{qhoq_nFDa7p)rS1jK zdh>-bBpNO9Q9+yq7wcPJzoCi@9>9E!v9W0uMC|s+Nnfa19SF_{MW&^%F|X}cw$^_B)Lp0ZMc1w**lW&>ual9izdNK#(#hrVBzw`CV&N)ag4!BVWG?#-?y` zZhg_k3$F|gUm(bIHAxOT=XUf9`N&UVy7-$}TxS$=2AmO7-Z%I>GoXzCE&{Yg^??@E zqUzrY;iIzOAW&P^WQGE<1;r?TZrb6_E!L|}R}Oy}y1rV_x1m2_kLcO6Ap(nVz55C3 z%e9j>=1+{{4`mV4CjLngr8yH~Sc^@DpfmIF6{Z8)Qj}k-$|CLpB|mj!e-0D8;&muB zQrnBhzHs>$!?v$EKF^9|bYFD_m|D@4b-GgFj)ziKxgO2-9Q#S-_FW=ZD#KPm(k~A` zM&<_$GVjr&C?XDqo7*VtoArZDn4<_-N2H5l_a!aC@pKj3!YR&wlna zsP;-OlG^7yT6Y4kduJLhtWpf{1%3BOH+!7I&S7P)KxmLQt#2IYw$FWAoVb7bl%3h6 zEmWT<81h)kF&B(fp?`c>gWX{i`0}S9JD^+xv@89!Kla@mv$;ysZ%BS%J>s zq55NNn*Vc7fbNFGSKjrX|Mhou$A5U(zx2C*x#9o8tHGJ|r^@%QQiR{Z8eq7aTK7nO zF%I1-jR0T_$_V~?8ir7AL*kp^d%r6ee*YYxa-_=I1I4EBzkTSh!TDm)Fq)`Uz`;(s z^~ZmGxDawwOgZiAKUd+OJP_#N(9`<^oBlT!jrc2814S1YLMtoVflq%E?|+RJ5S@p1 zPNFEkj~DnqrO7Z0ao4Bc|34ot)i+SCkm7Y|7DELOJM@l`|2-H3PzN|gAr*ZM+O8S7 zVj}*c$^UC;LKDSr-p=_$Z0>*f-(DOhx9k?l30OZ^na974)kQkGM`iZzfBh>_pHYPl zL|A;}P4xTw96>XN_c}yPyQSY%`D&o!t&C9jHGJq*3q%YXOo<(L{qy!%qRv?Cf4=I? znm6C+6okIkdarZOZ57jb@8fZ|OtZ3rGBK$yO=LOkCbesdlr8%|=0^#XI1XG*9`|;g zOS}bd5x0CSl=}oc{pUtbigvBtO6;jW%q-TPTbc|C=>ISqOyk;Il8phHpAg)b}-OB4NH&H>YMP@L_c zqN0^FdtGB+;dz=YzezDW?ew>DQ@`8|`JPcs*_iCI`|}Di^ult!l#xaVIauevyfJ&g zS+J?`2zAd&KE};xV94SD+mag9(Mm; zqG{cvXS7Ig7ZpA5+(xH+gSQdQu_sq|^gS`R)6fKW?f1E_#vTZnKFI~2@M#w}C@55( zbJwN6No@W$XI`vWJQttHoqe;4^v5iN^URfeB=P1A@wyVB`>~h{!DfC*i9(atW#X3g zn?38Si~SAz4ARI947Gtd9ev3T?`fP7#)|mESyXp@2~+0S zzU_Un_p=&Dx9G?8z($0316SF!xB_b91Q;voVdtNEn=(_(&=;p6lZ76^Z@V+Ck`U5m zBQyN+$>LTPlCTnN9Nx|2xe5Y!C%}^ z&^90(4i7@PY1%<19mg{RPwn++v+OFRvSe5v$#A7=EyJpJD`fd;>=1HSqzbDu$tYXx zRT^QMr!MD!Z#_3`Y3z|-aW#nQqjiBv%`p$Neo~8FrPB%tR_SbsnVMlEp8vSa8M{9D zDAI-{IwP&MoC%-e*c4;)<)0g>1NF5XJe#Bx!DsZ8GqXK!55ol=k*uU8??P?Q;AmYS zDi;v%>``bM+#o4Foa zflWaO9w_iVylR%L;W6cmiJoyM7~qn3?t`3E4}cR%Pbc#D~hN62TP-{vS~B!2w9(CWX#2TJ-OEJ+VFN!BAbfQ!)NfwtEF)jK?`uJ%2Yd^ zL}O)a;ngy43<7HVQoaUIsYAt~d17s%H(I6XK2nSdO10M1l~K`<1gkT35>aO>gd?pP|#&Sa;%)1c8<}*sB`n zgilw!JdshX?i znM2cct4LeHT_V0Gj+41_DGl6NT<6t1b4#E5SeWF<>!6v-P2qeMi5Lp~`>G*Dm%0m>{&vld+Nh$NEXD$-Ko zgRutI!J&;Gn1bL`%UVLkpYX@d1W@%!11J%NLWBJRHfhaPKSf#1c{r=*gEm)#Al)rr z0C&b|R@msND=BKOXrjm2mv@_DVLv#@FjRkOvLiJvd^y(g(446MXjFL-ZJLmNdPm`KW2b+^C-E+6twcL(4Z= zA{!vJtdvbR@B6(%#i+0!q_8}PJ7ozS$<`zcJ#(cSms!>K&7gEDJb zK9PCmoARcrEow|#ofeN1^25_G4Y3Pr`#BmVkt=0E3AF^|d}TrDiugeh>c$`kKflX9 z@yV6}-}!Y~sMlKQmlon;cf0Rf&B1l%va7ZYcL<(g#HF5{0`=1rqr|1ERqoGeDphG7 zvW{!kFlT;+XGU+ol-r|F$liZdUqBI`7DCqB(SVMxd~@X?GiQt+&xL$a`0q)6g0%b| z=gn@bcf{Qyt-?lI1M2reBmi@=Oc@UQBItMYoPIqV!nkEFm{ksVju_vi1O(81) z^$aKGcc7JyCSHwII|K(>F+#B81UHHU!FU**62E_(F*M*<5cwqae|%RY?ZkzI?!;z_ zNERTfMdo}A2iifQo=;J=K8$QDv*H zz`^Y43jukf_{BtzG$!wjsSHNE1n7M7oPWQCH|P7_Vb|z8UZwamA_oJ=1&JH_diAjq$3MnD zX1a4^kWVS=BZyWZ3-Qzbdpl}_k8|D4@nqWnhQjz!^2Jy9(gfa?{>N3_&+QQ7ZGcQR zCT*-7BCU#LB)LGfQG`o*M0q^AW?Hr2n^CL5VyD?~ID^{DIo~#6=;Fd>8r+|9~!hWX+b1V{zP_T6?37^Xr5Fg2T4NdpFVswoUUJLjZ|agsi?-N3Z%wwoR`z zeME?HWVJ08+uEI>*g67G78Mrj?=b9SEjau|J*v1=n=A&KUJI-g_3-zWFKFZdFy^wg z4y7FFIJZTUD^9Bhuai()K{&SnAcLJOr*G*r@nvakfxIrlxNw@!KxP{?LWzchJv3~p*FBFzef>adj>HHgj{%P>I{Rnm0(vI=f zHqc!OqE;GEKP!`(;9{}ax^Ew%aqBJRgpzdDdw*yH7POkJ_T61~ro_AU6#kxjj{IEz zdq4WgT-}Mc7x3nY&063U(9^!@C4cymX_@gXABtZb(%R_?#ue_0ahWI3Dw}C)1+M-}An{ zZNFosu>>l|)0YQD#8on_i`M|R#?~OzQ)0EYhajqzv>f_^E}W#+ftozhBzJVreg z2C}!kS2Ob}`paLJwiuE})!g5$L{cl69QSK@tudn2miZ1(o(@H9F$mD-aX5B-#5sj< zzow=xA+r(c*uH5D!y&G_72>RZ{h`@ye|=_zwR!*2Uz@Yr~be z)#_+Sv(4=86tVe2cVd;t+qyxXj`;R=g7 zqplGpi1^{0S&toCHCuIGqkQN2wAeMUWkOq*=yZLpQvJdRr!T)fsFT6-r|H*N#5gId z?G%24iTmI4CUy!2@;`i68l2Nb_jI|Su52()rXj3eu9~_xb9VOr^yk2n#=S-r_UzN7 z$_9?=Od;Kr29LpX-BtXnnCY+OS7(UBS84ug$Hp|nA690;^iWRj^Ci>u7ictj{ zmGAYE?_1)jy5q@Z`1GDDiyi6fmI(=NlKVMZ+uppKNhJ^2XB0y`?}-yND6?n(SbK~8 zj%W^v?hfOdb>tCN$e)t$~@59A2A#-)oX;}Z=ZXmtIAKf;vKZzaO!($%BgFpo7FN{ z7og|~Ic$IZN%SnJ$&35}%T_&CB;t=3TFuj0Z?e8NU>Ld0yB57$jH=w%+G6?4Ahy2^qwRJJ|cMe29mN1~!N}(A#@r>I>*TGj2 z4P0xBXH;?#Ccl-+Za& z;1V)ZE>XHOY-$%t4(+)}(DHg>NaVaDD}|dE`{UgnQwQC+`=U32^GO8m~25i zDza|kB-tm1gX#x1V(xmRHIOhoj)TkcSCnCx#4+)r6N1#vFAQ)a@HCEiH}S^mk=tQ& zcPUrj_h2#=Ww)QxwPKqY8cIF(VEf*K3$gL%#GsyL8gBH~H|-;m((1 z5e;9Dw^0`iID^)#lZpi0jdmQppFdz}MZL!!-uIO~V3fk0_{V6<%sSK7;;rR->kq<@ zEV+1Ng}dIzcyZTSI#o37c8c4Skz>TK=O`feB=1r7=O9^UZ1Ow-|Z4Sf|9>Ko9p?svPof9%)f zNSREBy^Mvl-G$MHPkBfv+)Mb8?Q8iXDvW&#@jdm8o^%>dJ$d=cE6cZVF~|)2Ske3` z_jq_;hHw-CSH9}^SF23$s7ach-CaJNSBw>FeiK0$caOf8?bvsQ915|-6HqjNDb8G` z#zDhYxQs!80|e)98OdLJ!7DV0W8#yO<)@T)2Yc4^T|q<cp)Key<=p*zIEpAM=gEixiO_5f*GsnyTm};wxj`IKt+cz}Gl)48 zkiRi*@+EgEH+vEwm*ly$TbHB8CE3xUG0vA|9QH#v+|?m>RsSS6qGh!IHd8Y3YZwC3 z=A{(T5OdvKy2urthQSNhVUCE;6IzKBs+FG)L1w7?PxKmuPBP-$B>7igvnr?YvI!wj z*E=zpz0r+o9LM~l6S>2>r-ZR-RFJK3%k~msw_=W~|DmaO!6z=M# z-Rd<>Q(;IkXEI4s)z>d^YGUHRN{j~I!;Hj{Zm#g+Lrwy_@3SjJHi@ByL+%snH2M=} z!;qW9I@UK`XZZL@^%z!h2!#4^`;D^6$Tv z6r7;zzry=>e^Ws{OJJ-3-Cx&+0ajRlk{$Qp39{u0?1nCCYNWx}H2;i1~OZ;J^ z!JmVAX*%)`4Eh%v`=>p8DTDvdZNC5d zc^tywKv(@B!R3i_iq}n#zs~h_)mm28bh4()UO8m)$gcn%jtT9z!H{L}YIV5bx{!X& zl?)})^2fC5l4tA!K+Xn83}88LNgFU1(!Y42A<|!l%I;q9ZeTs!wUlcnawAT=A+>}a zd?|SN_d@}>$@}|<`;+fue0ehyQ53f4~v`ZUeHZjYM7s339CWe|{yLzt5bz z^}U1>(sJ7};?uIt{&vEYvRDkTYi7VRO$otl##`A4fuv0v?TC;%_bm5W(d21P5?y5HWtEw1gz>Xca_T=W*)g4x-j27v`^ zDz`_Ml5WIeYJa4*HoJLsHdfxyclJ?u4H%r)()XG~od^VV5PYUKDRloaPM1Cj2U}tm zzm}uY3to~lw5HpP*^;c22%Sfbw;lKcN67NX2a-aj@082n4S{Uy(%l^N*$o`Y*dYp> zi~5m^kWRVDG%NYC{_st@5;HW-t`*c+)ZK%f3E*-5$qims2JqIw3=ajxwXZKaZdZ=v z(Ds%{yao)H+hsoC+qXQy167(DBnHn&Jl?@20T>oW5E&vFj-NK7aPZ-7v=HyQ*v9Cx&>QQzXK|J-Y@dbfRIQjKDLkJn(&iwTD{pl@;vjE%c z)RC5l5MnqU9|VFCl;5*kTw^11x3X+`STLN6pxAN`w-;^!6LH;QYQx*(+MsjrYW=}4 zF+XVN16(u!Qx$U3eAg^@yS0L#X5rQmN1QQp@F`7l7pl?VQhFQv8Z_dSiqQpi9p>!( zu38d0I`bBcz&M_P;G+ruOJG}_$=yAZ{u%6=s^Z8mwDSKV; z6=;;|^nTzw=NQJ@i9&^JRKkUNMYHqIScKxqVUWi%t=Tsp7(GbyG{w29-$fmpVnK>G zb8B^;t0AQF!1jTp4G^qvq`WbOP9iY!FGMKV3R2?w6REouY9?BQzgQrmm{DNOMqn`z zTQ&*O^9kZ>cy968oZ%c1o+sXkhlEpm_-qN^i?K%p`6Q&S3m$;42=7Z`Z7-JkfiOgO{a+>b1d*&Lds0D9Ho-jv5G$xNFwC#3NEw7H%$J}j5ODp(2IgLsDF zadFk-a1Ld6c=s+X2ir={CBBH8X?aW$&jli|d~|Vb{o$%TS)tLpH*=srQ4bZHbGwNX zx7Go<>xuz4iBvS5t#}63YmzW{mX+(HL1%Gsm>-w|KWK2cyE|PaYsNQv?&~HFdZuOW zpd0K~J4s($w~ngu)orW|avx>zTnVe|5_6;6r{Yo@Vrbbx59}NN2reIZ@BB?YyTn52 zN#H5HxG7if@vgT@?-5E%w}`r0m?wtpxLb&ue70RnDXh(^`6nDkr;TCEjjb&uV|CW@ zRux(qBu1h9W4A_bHwR8I9tjcM<=u`{`zw9Kkw%UjuoGJVF~FJsNrWz221 z-JmJXX)|av+S*LNz>kcBfFNgXvH~Ys`%>x3*-CP@E8M`R?I^D9*awLA;bvjYM`CvG z=KJ8y+Jl(@QDL`+^96e6rK8vCmjOlGnq*Ncae~4V3wTU^XS+c2G%^ExMl@(OB-K2jdIAX|KVxpkPpK66miSk`-G5F zaNU#L{mJKU%OZ#VY7DC4pk5z4xBi%F^F^UCSP6+ZbDAj}<9)muL0?`IZHW_)56AGS zvz0w#K}88Rl_GUWO|wk3K^y+)!opkV7#TWV`fAEnV(tli5Haiw@#iM_vHSIzTn<6R zA39k)mb)i%#^7pqw65gR{f$z(rbK!L9y(kKzqG9%7SiZL|yc5@MmuktJhG`VYe zsCNs{WO~+PYVuyJXyrVq9QDRayn=`|Z{$4<<#q36_G%xDO=-t6gy&YXCsRMAN_eIX zBBigEOa}R&tr>&$#^ZXbLaW9P$sSfkKpM=yc~Gi~14w#A+uIe9fmza!VEMz@L{6}x zF1+vf!!Q2H@$DEpNTmZAM18mF<;F6mF(UQ>vTYGR((LG1Bff+X`eP*ueC2}0)eg}J zcH}pA2aDG-;##h(Y$r71eF;`&Ewf9;gA85@uUblJkwQ)% zZv8XFKp08nm64?CH%{)IF(}T7s^Z+weJ>GmTA3?CFHP~9(iV5z%?Ud?YLChx?=N#B zMILKjp`iDKx~y%JQFe8%gerN9(m>%y`L)~#!q3iPb8l{kP-vl5ceP&;y2~M6cN5|z z?lo>mBF7YaCa*eo#IP(99_x1Ar}7)z9_70S6ih5=hb`_~qciaJ5fr2MkPD)|5t;IM zUOHG?P9nAt^}TqQ(nq5Vi5GTwp6uYC-Y2;_-mUrk&&`Jp$xzp*!xG)Z`k7t3%;zhu zappXG`X_j$49~-DejHq1%B}0v;VrasiseBE_g+j~LEq5uMx>#d)W7pK>m1aXYi6z` z2k7FD`}Q-fqWVbWd)=7^EGOHjsJlzuiK{_T2*owjz_k>gN@T;o11XYc#SFYgCM!vYVhuQjx{?(E&C;!ZI(CMTgPnY+m;lbnk)2E5UpcSho3wk-}zuYOT zQg52GC1x0J6;H%Tn0c60)$*PmdNd|K-}nT5qRC(8d7X6pUX(4u)YLm);@#-x1{IQ_ z;oEC-MdspE&a2YrN^%Xy>u;6)p(lM+TZ8>mSdab70E4~LPQHuU*jmCD?&&YFI`=_r zajj>7+#oC`xtY3A6oi$Q-&3kDU&cswxiWQ@t`T_(A9QIl?$#WQV6s|-<4O^mn$iv? zk4e35tC{(tg+#vPm#}W%#UThwH$y+xpsX$t^Ugs|GJ?EHH)3s@NU|s4nW5kM?iFMc z=;V9!_VpfgcO`$O(^;>f2U-m05|Xh6*nV{RLWdnmr0#G5Ck48~zUGSPa+TqT7Vt%) zzNCba&|>=O17eG5tALG@JrnHwr>n7=Y0@!7?R@WYEe#1`bv~o*70K<9sk5+H_2D5G zWc`Tw`Q*WHp~XGW!(m)4WTG=Pi=bS$#Z~OZ;wxvWp2AG_pv~B$=Oa>xOkS|S3!tQi zuOBTvpenb@?D8t;OGApzE_&bP(d{ItC}+lh_;nu}dl#Z^=W zvbaGpv%V%5lAGio*DuPW$vthI*)?$>i*#(=6WR8x>;Q0=_h-Jp5KwK4R<`BUvUJ@@lYehhYiKr9Kw^41p7fB%# z!puV%xLdwRxo&#_DgB9wa_jPq_-+{dyS872Zf`^Qw$KOTohRZ<5-;Yb2n5}(3^uCP zZkOjw?iO!72OG7jk;p3`uQ$P-M@TiNYHF$enei#3_V(ue$2CHiZ^LmiGWRk-SX-xZ zU&qiZkRPgiqnVA?vikJ&N- zEh;a$zZ2~A>OIv;DayEeilJ{aGg9M+BGnaCqv5yFPxrLcLrO4kpRW*p z4j4+v9fA*gjwvG2KN=_??n|i%Dqk!-)0}XEeh{bBxQ8C&ob64Q->pbrWsIW*OjcW` zv{=|9K5CzQSd}63P>8hd!=li)+K|x%@koP%1}{JUT;XyAw$Cdf9X`%fbQ_?boyU#C zMjN8Sh!}IIV9w{_r)fO#U;1B~rXDY|>uDmXlq&{j-4;cORooW2j--n@JSW{i3l68< zfMBV}W2P+ujmq!i5ww`=hg`AHPB0?NmFEvOv7b8)#?N(g?%HO-Yd9YnqH6JY6(38N z%|zmLX9(`jhHd#8@?}zZG`x~lJ(1e7%BQ9rg~y#2wnZWMEQCV-{Z}?9KzaFwX;@QN z=tjlS+7~nzXpqrm#|h@a>!~K_4tjLNb-2m71}+;R$>z%;W1MGU^*=qdXG$l+0R2AC z>vgM|_Oq)Y(o(lhdl0@e{i)knI3zJ?4Gu)OppUSWK7-(Mpw9h>$M10jl$XCr zDLGq>{a{>aoef&&FVNpWE8vfq{f;A`=m_E-hTZv7Eel`6A2gz8m3+`G3$-n(V2{W+ zF_|MLbs-;6DCx6|4?2p$&2|DM14w9aaEY}cO$%q~JuN~WgD0X1v2Iv>!w(yx+lrVJQ8Ep`UU zu7q3Qsoz^ZctDJH5AGMftrfEB0PU@)9Gt(1xR7C*2cGqTM9?CN?C% ztUTJCz-S{M1YkA$75~P78ElrJDZ%(y#{vg7Kso6W4%BNV8UGP4QEO1`0lFG25IP%g^mGrOZdI51QSt?2Aa{C;^) z5cgMhyW+h(n`+xq$(u0wM|f#Q=Kfq*snF@+g4H;h#JI`gGcPO6yY`%Zswp(PW6@d- zcb352cV?5!AGz%Y(+lH_n(C^_4Y){fpLT^8)o;!BXf~4pur75gRvxJh@?f0E&3w<} z0deT-iwJpPq&CebSMSBWVjJcc2$AOB??3g6*`o>GBi-?qn49`igxk+e@_18cTq`~K zIPUqFLJNFc;iQ554VjSWDys~9D(SCNVbyzCAmjN_R)N8gZeKEXKf{kHXO1jUoM zG1lt>6QV}X@oUWTA`FPE0f)55o4Sq$GMzAt!v8{&MoARGnE-#4vj{XoGs(7obRarcgv=lEB|^R_YGFE_ z1>A6xFaIGQFwvq3s)+Rv`L$oY-e4eQysW(-i_S_sQ>FDm_I@pv24G5zF52IE!o@oh zi|)QBFZ-hy-I&%{u%~%3Ymv3v7!b|hvs2I)--HzYSQW^i*s`ne*FuJOJ zxBM(5b|Cw%Vf=(K1$Pv_+fyNgOh5;0x5Z$){X8mr<7_Q(Sie<#<865((MuHmdOVm3 zIc)$3ltupre+k#T8#r0M9IE3;WyelAPvrADH=L^yNQ5?=EQau^^+TFYbw827^#`Sz z(EW&i%nO)OL+Q{oJ0$V~?Nebn8i5Fp)3Ny@(vaPwF18%mMrH#@M^`fbs8rNeG}iv1 zUpZ^F&sZ!6j3*nsra3vB18Cxs_3lTjdfaJHCaNI2i3JNqLO$9HGF-OZoy2^)9i(C% z0V#6>a8u;8ZW@?A;uk{BGYIdx*GPu09lzznl}(rdr6ce>akd`2pZeoq8-NYf=R>tm znRK959p2Q8>265mN3)!r40ZNjRu9HFmLPpB6XT+`>LG+zzd+%ZGO`)P(Iy z^{%XZds-2&&fo94a%rPn6k?KN6^gpWV|N=J3%^fDCk?L^Bic&ejK0Bl77V2OT;UIc zf}OE%&6OebP$=t+SZG)CD16X$V0of!7vPfQ4K87+UDV za6+Dc!1i>qMTr9rf^GY|x3vaMMeLur;4FJ&x;^&IPr%h{!Vtb{8!N}6eC~+C@~)Lh zDdM2rZnKV1)7#;!jxL{~m{azZ2DT;d3XIve z-x(sN2G>$6$!T4TB51(7gTv|!pdy<4Gar=;9u8zSAh1~O7HM>dzV~V?T`QhWa_p3O z|7cI!S$l~=LJ3Xc^ofx`2T&%!RF5#3EqL9Z`*;~bIMema)3bolC(=o_Q|o1;%QRNv)O9La?c zImPk)aRer%cys>Tw8Q=7bFn!*kK@xV^G3v^vE+Q7wRZ)Vd;MNK>k6-zyvLq#?;j_9 zf5Wu4UdWci4R|qK;-DpI^S2i;?0eM3Q7){A-l#0xfT4}5wPZ{H>jcwb$*p$xR6L@y zw(1>N0U7pk{qqAlC||bgriuGp^gdHgvA@^%17}ln2t4|KfjuW`*z{ zP668kVb=YVMF6ER|Dl%t<_!Ke|38U=f3Pb+&@uOyVC6py6dYXR@2`Tk;tU~-WdXVB!)t6&s)(U4VKeY;IjAT z*#_4maO*1O8U1}YxCbx-$dh!*`!C%PUQFMB={=ai{9s`IItuQu&x1*6hH4C*#6bNb zXj|wDq9-w(u3t7LgE>?OML8>IH3L@vuLI~(r~}@oW3t|9w<6E8mzZyH1YD^Dvzw_F z3vb2)n3eHhVRZ)MGFZG~MB2;-J(1L~QVt^ro_5T+X=wgK1i+W@S`FO)4vGPy^whGv zk)rEV{iX(LU1pb%#Iz1XMrDyQ+Z2NcTs&sm?Jtd`D<8fX(5YOhee&rM96wMA{Vy*I zaS#MW7p9wIwe}{?!S`7@d@+#>JGKYu@Qu2!BSPb%5f6TyC8TQf{^Z+`g;1?gBb>x& zk+ad&xw@P;loHd=+^M~)w6=IGC+@4A0OGc38k`K;-2hp1x6XqjLHS?pl(gWoqJiOBWhLD0HY#KN|5x2thDEjhYY(E1G>V`oBPk_HcOxk! zEe%Rbcc+K}BdH7sNVlLg2y8$>kZzAlYRs;+UZCw_VV z?mL{Y*YwzD4Kd`oWIAJ?ghYBYhy)z@2rN=3AtR1xVU0H$a(+0UY3F?sNTe3+YI zeSaTcbA0h<4+-02d3#eS?P1WLu)06Ep6=WYw{B_IHQH4o z9NPFClw$O1>}Hyan4Q-95Glk65rd7}VJOyZcab3kk)%4elGfg{PqcQ_^9kJ?H_dKP zQNtH^TNP*>T=Cr>y!3p?XC+fUMu0(1=QPZl@{bz>d_DtX@ID?2*%;MO?@_|2>5q-- z3|MfPFYSAXy~VpGoXuAYj-jBo9nw%RvWECR_-@m#9Nqvzm^b3@@1{fp$z{x1{p9tN z+xJlh1KmClg)JSPR#XvuV2Bo_1IVteVUE16tt;Q#8IWSz{UaqselrU-_lzbScluef z{pm;IO@`?inyUlS+8=RS&a&LuE zUcPj|T=D`A^Zsw!$Y~LhZs?4yns@+sl1~I610H#8Zv4ipx0)C7frRahmjoRjH)2k6_s&s?s1i68c}}c zQ>a#{gr|_+m?XCguBY1(5J*tB+ZMr@Do3NL;O*%Uvi|ABZw;0Rw&bP@R z_C^*QQGal?nd-ct*8Av5-gPZx7PsZAfsD$bE4l+qtyFA{rBkE#=TX1q~HTg#I<>{u^X%SvWVWW4?3sTaPuqEkT z(zX25)2d9rn8YX(o8oA1wRWwaa?LE)a-~>2KcJ?FX_uUZ_f7(-T3JS0kL!EKsJ;tY zEPW3n3T(Dx?>*DER811XG=B>!hryDUz#NrP>HR@|G<8wk)_9DVuXjJUR1U5=Qa0ff zrfILH9#bQZ?Gqm_wLY0VKFL52q|le)43nyk=0~B|TJ`mVUp?uM649jhtbOW}u4rhM zL@vkVpz<_@mCM;=xlp`wR7TCeaU>PH?xO#aiG2*@(`PvAna}T7Zl|zm9A5688pl2i zm_vT~^~R;5y*!>B&wYdy^Awzlc)3*5k({s6=2|Y==ime;XWfU-WB~qjhy-4m`h%5B zzaaF!?y?`jfGHGifQ8%yBGum0%@NR^f_&@5S!4^)wCbC=7>6bZ;FqVS?xY-QWWC-C zB|=llQu%hHxpu93PPepD>{>25;`}y={=9Yewn8(+UiOExf6FH zRgB~fuFl@SIof>m+)`QCeX;kG|e$AtrN-h^4l;c_i2 zPKxe#71=;&YqzNO&L@?Cv+?;ViK(g-*pI&BJ?dj{kYOfD2C>GxU{grp8N;fVYqO`r z-BhvbV+k&i4LzUtyJN7IlH)HEYFNJZGzIF0-#-iSBj4J6ah!Pcb*BT0U%W_Sn1!ci zWD(p%$h11uP#I6fG9-DkO72e zfgTONLpQ`0gC^iK(T0#t|Cg8#Vi^a|M_x4dj+n$50fZ(hwvcYC@1wgn{u~J^mEt;Y zrWo@sU){}bEC6&YtXxSv%eT43k46&2ytTpmC=1g7B)%p`xgTbSnVMFU=KlyAp*d<( zDMTb{-oPX?OV{||Ew^x6uF1T7P8NccSM4_NXIG;CBk1`VzJhAdlYlNo7opkrSJR2P zLve$vvjg>(~@}~RcrP7P(|Ur zH*NAZ&r4v%psW^(iGS|!zXR}-l}rOP{ebMg{cu6|6Up|IJ2#vph^fU^`280CDhTUN zzDqVMZ6S9XG&J~K0paL`Wt8o?**%o}A|8Fe3>2yZlJ6=YWt|nC#!@xr4e%}VHcF_? z?%O0)2CzU12*}rSi3@xwn8>$tlxVY>lk39ABJWT|w%1-xE#vfuGw=v2&6VtBl<9#F z>WaDrbP-UtxRQpfVCUb|01|va*F5HZ3$$-_psS@9{?F8+v>m6)>XSl=SbwR7{}!8@ zb6Z}$T3FrahB%xdb{~;PH4C&+C`%HMeYc)w96BbZNxgQ2jZ{q;GaA!1mpBqC-<6%>UMZ{YkI^EuSEj6D6Bz=MZ}HE<^Y=1W?XC{ zsSXvo^qymO3cw^2l%3|egOL%dK^^{3isn5nAB&~MA2#rq#uLrjyvz}xDm+Y@Y9ECm zsCEJXn0F!IH-V6>7j=TKdVVKP4-f-?-XV0J+p?1|h2gtT`GZmUw6>l;*=NF>Jk^_p z!K~CGp54fS!u%*w?Y^Msw=h^We0Np%R~8INDdf4uy$9jq+xxbLrF5lyDpf1Zm5n(o z+ZDawp6&wkKG7^ngF>m3os1ZEI|rWi*3NTG?ZMP_M07P!+UEE_J zAOY0QJCcNlCRwJj1d~6&`>p<^QAc)OEcD|#pWH&=o?8ElqBrGlFT<)&|Km;80xy0} zMo(=wJlB>chtvzWyQ<#o{7AR#IB3RFQ~ABN8AU{b+?B%x(vu(|xiR@dy%{HJr6FhP zxe4i#dsY3LtJ#3}95L$t;?wg>`ccK|UleQxP?vz_`Z(x-AfSctg`4Xk*K`5t5P0o5 zr$;XgZla}?qs7JsNoI4LzvA?KWzFrZ^?M-L=s^rK4EnuGjQu!IcLLkNtEhzn1N7!F z=J=4+=W?uj_~c0r*(fZ{`d;sP`4bO`cCsFP{odl% z>=fHmu%z&Ryvb)U`7{`&a`YqL!f)E&At3&6)JSOpXG1XSsT0t97TDONGnRWvk6UhUVB$f=n*3bua@#MJgj>aK0)dERyNjvz1E!idskfp} z4tFQcJJCz-WY1QI)_s_x_2dwd2x0elLpoQ|gG<`9cJ5D@UD{RJaTIDUYq!kntJ`Ub zH;z%k7AVFlEPp{byPcs)(L&~26t!sn1t_kJat@H>R~Ztd!358zehm`!yM3=$n8t<7 zK}y^&G$)_gS{n7h{XTgw2~U|&9u;FBdlXLK+a^CBZGiKG$~0sLRFRzKK$m7^ZwYca zXqJ@Y1WjR;iQ?x#Oa|VDJu@x<2s+MjBW&4aJuwRE%Q?9B71kur0a8N6EFTKBEW{<( z`y`gD`2oaF#*^uNZ;#4H*Xf>xRTKYSKi3>wx}^6@4((tMq444jWNi8(h@Z?^3)1;6 zfgYX0vG%1|ePr?LO=5XTCV#Gp@nOybDat7X>7?D>n8x?%H|n)Noub3#P_-&lQ~O zjlwi=Ipg#jJYKx-G`fSdV1f1xzn27L#z4D6@x%hC!#{@Ot+8L$?f{Q~GsDY$1t_Oi zdHtBn$!||iZ|4*~Z<+)QR$|=1M$GxVEV>$m?1Bj}S*B-T3;4e`4#M7Ed3EyH`^576 z->HY5HQ;dUJ5DA;*zRAIH7f&XGl_}iZ>(daiIH`ZXJL#)=+P1g7XGVt7jg1h4LFqI z;L;NTfi2yV<`t5O!&4kAPJjHZ&wHHp^!Ml5QMNFg_}EH^E(p>6tGvf^3op8hVKWk^dHwr2-I<-P4^k<=_PBi~_MY6jRy8Ki>lfXYN&Htazaea@=#l__eHZb{i z7;)9w6TYcGyyt5bcZmtFdBi86l0pj@FoQ8jE3!YW+akbSRMcZvIekal%HOHnKlW1-h zN-YT>Rt4Ri|2$4sA-G&?>^k0SO$218Q*XsVR`x#+3E3(nuEnTC`lwnBy3)|`|L4I| z0w`pYfOrl`(j}pv*WuqQ$KeFwkbNC?gI-M>WQR1-ix0bWTOKVA)@HL;iP$^=l%s!q zOcHvmz+a z${*DPb5uh*CFG!#N#!vH0H&ino(#F~etexa2omsVx*I)mOUQ-`^f9C#A|ip@7f#cQ z6w$4Z-J^UVOplK?(0=s?U*O3kt0aAU%8@}qI7C2F;Nq;ub3M*uJQs;_hsk8$MmH;i zq}Vx9t(T4x)tVX_0pGO}8~BrbSAA+oAkrt}v15aaYVy-OlEl>R z$DBTZ@KH@o$LjSD<5I_|Z{NOwWFY#{!Bk7BFyPs6%TK?V}w2RA`K6kGm+O%@TEptc#7zc)nLFWQu zTm(}jHFJ+~)l+}@^UuQcYqFCnQD`r;&RbTP!~oi8>kYMd;l^; zp$U*F+>^Z1-1QBp!m*aocm*tZQL34&t*(pj+Q**6aXmOJm1ml_LPQ-Z^I$NoX=rI5AR;v! z*s4>({QO%zN6T=~IfaJHoJiD?+}mHz>Kjwx*{JFs1P&0u^Jfv>>K#ahYm!`GJp4xy zW-+LjSZUDg%8LKYUwvg^^#_*qD#BSi--h5u?w`PAAtD#1$;OHwj{}k$k{v4F9#_!K<5HH9cQ;W=iZ7NuqpSmM^w6qsT(_CU1fKv|bo~xYi_{DVB|l@D-}Q6y(|D zcs_ZdcX_dzmy1%a3|(QoKFZzo#e!VaQkq*c>zOa$__Ug=F8k5OZLXA;D|A3P>w{{& zUlPre$syPoYIonfF}YCwc4EVMH+zi%Qf*z4gU|Fr6m`f}G2sr{wiG4E0d!`J;WjFo z!rr+3IxY}oy)iqm-#*0a6IStR%rtb1zmAw*!qc$qB7PmG1fS^yEs15MC^TIjsfBpX ziHPK^hNf|o-6DFbPQfH(K;GA0f1thQBo7ahJDQq}8}%2QM-A0gW4;NSs$~HJ5vOmf zmLvsLyNkzrCAHKqf+NH$-3@sRg4i6l)$*^CV-N7HQHyWh3`Iw2e9Qdn-u{8LLVnf} z_;U%p-foHuVRKUb(#(naJO-{ta~JnY_(G4KoAphQ+d8gWUOG4x)hwc$ z|4oilzoBT#lcKyTZbLMzNx|aPqihF_fw9;{oxk$7hw8sHuOu?NM4z|=LlBX-3vYig z64<<|Q$+W+YVHaa?+_|GxQc$tgmJV&L1Uj9(2JnFM=5-!51CTG)S0b;;RKkI+xo9g zcb#vg{epuM;_V9*m^v8O_8@F_mS|q6LmP5|1~?3+sRVcvseKo(rgm&BM|n^O9F;(8 z1KiVoum15x3hY3a4QIv^Dqz0?uq5mO)`0Nh%wJOhALP)odNyg@{D(#U1ks8@G<5ih zg?iqv9?7cBP?^iJ3LaaL$msD^Fn7M_RGiN@@LIaiVOx0|(_>K!FacZVtZ!G-y6)m}3tuEYx~LrS z1&0MKR#5c~v$HY;O{O`mZO<3_b1VX#*u1ndkA{K~HH=XJh9BdP>2e4o{w%Y*TDy|X zK1@glpV>&Qh}$1rPd0w>VY8_r#Iz@@3**XTkh~Hw-9+Q1c7)5W1n!gmS++Mf7XveV z%4tSg+SUAHDRXBIxm$?hDCe`gz8szkK=ZwPF;nRORitf2M6>j+wG6qfd4J*c!s9s# zz7o@%_SX4rwh?V&asGUiyD86tqa%H|pzfKv(V55-YtxT&e$-fm%AXgt<+ck=^~plp z7}x^&T>#F9Xea>9gZVIxhNUrPW+8%}GOH>1s;ax-20G%^P}0<<48W|94XAp1Trco- z^--V&!#AJC!+5hh>+X-b2=X5R65c&9pBi=a?ft_KeYAe7^F>D{T@7+Zeu^Qh`vb-1 z$rWCzK!WU>qFiix$|6(hQ3bj2i?eMptGefK)nY#Fqju@dnwKaTZVVD}XXZE?@tRYR zY7uKWA5j=)|6B*A0!5o^JaPno!raQ+G|>o^5wh~4IV-`V z38@1_LJ}`d`taiYOyAukJ`%|J{{ZIJcR%XYmU5XzOE)@Xtupu|m3aX&1!zbod`jn< zuE&OTI>}iCgmx*wzKb^(3b!@<&IR~P_M5+w%_1)((CZS*kB>7-4uRqPM2=vQE;S!B z08+bEe(MHQIr(~wYO{B*&!_O)=d=rmmrOZ2 z5didrF->%eC^ch^W9@VtOLPPG-Ovw@Qwxv-yLW`H z0a-)4lpe0EqWo5-Ux65xDbG?Mm5AqEl%Jnp>tweENJuHmw4A{ZXPs+D0`FUz2BH2g zP+4eC64q(Svz0jr*A%zrm%+*r;h3B{F&??ZPt-<9obAWcB|9f$@6lNI(Uwvn6Uby= zBGj7G*3T3=Nyrk&?%3vtw>|;`PW+)i4+)?pq$7`~sUbN!AY*}Nuwrh%U(giqWA4;Z z^Gpmuu6CXYAdzQYW@;-n8HRUxZIp-Zs##Fx-dN^P76`!hJ2?d=QO;Yc45Mp$=+)P}OEabxnLo3{_p+WgE#pc;eI5&HaXg-D`mh~OKTEsGmY|;f_InoctN5t*Z_|2| z6H2NCr)KE&O+^Ss$J#C$5L(3SoAC_XEf1CJEAg^8V2M#W33n;rGv(t&a+8Y2{vT`G zSfwXT)XM5Bj|Fx3h})w92_H!2Wfjcz)WI2X1Vupi0vpyOFh0d~Q*Kz6WHQ8UcxWiw z2Fx6lC~d!K|GfD*@dB*$q*w#EFIKQqd2Tg*yZ%%F98vd}stO>VBvF@gM(^P#rVAL6b$Razq(LY&x&kK^~J)-vD$u-p$N)B;KSnwFukg zC3N9Gt;NO*<*3lU5K(esw)FVxr>;Jq;qS@GCN7*xgMCW zs%9$nO@VL)sRxhn4a)@(XO~xNg&3K z%_swKV&zBfH# z)Zu$Rij&s5@bLw1`SkpRo1xJt%hgPqLFoa)<&Ru_i2|CEGDrQ*RmI8$;WIvinp(Ot zgC%+UkJWhwh zySGcsvgED!X4A|0s?-%Xp4EZUG{K4=n;~hAB5T>Oe!Nfg&ZQ6F%5|yT5P#I@MlN%e z+V<$m_~XvRVm;lm_N)B1Yk)IN%8!_k@S*^3^i9nt38VOC#A*{bQEhCt={FvzBL)EK zq5pKRsGLTGSxUNW_$JfO$YhoH3BN#d0mro~&JrKNIY~b3G2j-KYLaqe6ORFu+^UM+ z{R3NzeOmqCp7lD0or5V|hC-O?7912GAS+I1Z|dMdO!zpMsUENNKXlFRMAvUDJiHJ6 z{a24g+#_Ec*qaNCjW|(r2Jcx339tDseh#WA2h0SG4Wrc5-ok8loktQmw@Yb9KeH?QamX}L_EDG-ZBbonZXQKrs zK%;J-W(AI8MQ{>hEh*$cS$svnJ^+L*|4==hB$U2Z380Mw^{axrDP*$cxOB2cz6%Eg zs$v#;g=S0PWb;K|(;iFO9jA>Uog|Qi_SNWMK{-{gube_t%V^&N*jf+{Eax?zvqZ)V z|07oF%WTzaBY@I)b8!9IA~;P=`Xzr5%WiTarhFgQwNY$1G&;sj`R9Q!_4 zIu85TVM|nQ6JHat5___`cDI-M(p_NBZSVAyNWp%2G=MdEes28SE}tRjI4Ll8;zUW2 zNgph?7*_#?++y)=vuHaQo`Xih)=9zvR6OuCpW@zEWnEofRvabT@gyd%a;0F^N?NZR zE@z$&JoiI;6WxImNCBnI7MoyKNP62^o;obW9pA|CoXwY9C*&*WOZ}>oRzP5BWVMY)^K*84C0M4p?VI$mq zc!Fr4CkTxAAmgT=xd33y<0s8pb;UjDslVa_?kcLtZPZfAs@4aEBk3R_P>7y};!Q;<=S Jek)}X{9lE;_^B-@o7Y{_Ec3;jz~0^VsXN_v`dLczX4Usl4ny*>&sI z$zQs7&T8E{Y3#an8;)(>1pcOM7v&0gS|4C#dS+c=`+g31A?C(B=*F#X#=^I}=(|#|~W_lx1Q#%b>y>jcKQd3i# zFHIlS*Vn(*(04SmA^WxA)BYjbfmH)1pz4LS3 zzl_VTj~-aiKZwuII?~a3*PdqbyrX=3^rIuk1Fy)-)TZqls7>9sh|{DG1l$$}erIqp z2}oJ#4I5u5o;WfXz(jCf--^4GlYzYhm+(8)f4}D}_6&(OZzQ0@}~)A9!;w{OXWLgJ*h>?eqC}5%vg$SX!%^!wcxAQgA`N0TOG?ydfJ_&7nPGy|a7l!z5j=(HV-vm`7Aw$=q_i{0K0}OU zhcx*U463Xdx`ok5p`(oJJqXGzj9+$1cGfi&`+FGmQ)aHj#wi6`=K`v5As)R&5T+m$ z?|Abn`K}FW$dY-8hh{mX)pyPh{_;hcem?{6M^qD7{RTq}uK91Qs~pFdn1oKMjT2lo zQ>P2a(b$?2(TZ+C>?l8s=Fn6aevP?jX<>6qP9EO`35&J##J^!VIXCrX>X8KSFUG4&qefRAEj^s`dN!@O1M#NW`tY$0-5T*m(Outu&UD@V;hpD7&0&!d z#(#ZK-hDd1 zbGZ_?Qlwg9m`{}m`TnlW_xfc`y?(C~Tu(eAi?)dMGOx%6!9vH6luMc7X7E@g-GX*D z9=C0G0kPXDF|4{!tFXw@j-=NwDefYClPl>j>J2r1$9-R^V$9_=tmfXesm`EeS@%up zm`OHI4%qeMtF`{hpVj6}7t11j>6P6MPMWP9Q{-ti===OwGftK^$52a8G#Os8ilhXh zctJ1})8nUvyyBy{PINW=2m4|$5v_@G_crr9fNy3tQU<3AsFtG#oDgWPszDIdA$>#* z!N?DHbL~vx_srrc1mOalLmymT*W!FfCaz*D67na6Xguy6xuxOECoL$MRs@U0@B2a@ z8Zb9?VYi}jT+as7gycbC^hjBnfGi_&h#0qi)?1nsDC?Ad-o{uw*8u69``OSr*^#*r z@^mkpZr5mdX|&DAq%?GZp13a7J4eSsVNTU?go%FWel6Na*jUC9ebTgJ<33V}Z~T)(_w{1)Dfp_Se% z2Sbx(SWXvtctiog!t+2?dH>1YLGilbtuXmHEYucU>LT;n)f@QFZ1b6%B7TowL(ed{ zod|4Spe)YC`^sL*(3Dw)RmcUtDwQ?|Q|wtd+qiRqZ6>8tqL$;%K)kdscUV5?bxE6EP6{i%E z=CK`da{Z2^EwLthgAYT_S>{{_3{gM6f9b-VK3-&3(Sj7GdzP1D$&l&Tx%v9~4--*} zeivn+VRzxbKkw|+%z1n4=~##P1;`D=(u!#U-{e!iL66vq;t zpuDt25ZLppVQ6?cgdVut23wactm*kB=&@ChAuX28i8KqjH?Ji%Mk&z5+2WV{N4ll7 z&?eJRO-i{OtnerU>-z*%^oi9Gt^3Vs&1xTpcH4~EQO_RZ2_D6!)Z6$TQes&3p>Q~U zxGiQBrPo)crZ}!EP#rdw7HL3u>hzTdv)eiO0~dpzYo+z}hal(>C+C14ow#%ws3zl{ zg8g3VqQt8$nJD9VtoK5=^3X6_gIrr^rrK9?b7l%!k}`kVvvb=8b^Mn3q==;Ufv~=1 z9Q42AL07>wQ(G>4ADH@r$6=RN%>2o(YP1R}yP3K76-`OH-R#8_t9|`C-{frV;K}tE zy1;g7pxk?kO~dRv=5}$PzDH}81ETFP_VsGRC+e~H+n3;GrJ?ZS?Y}s4ws%ez-MZ5^ z(ce|ni2&c;R-hv?%)>Ug3PY$%fj>}J_=VY`uZs~-P7E7-# zi-M(}u}hl$By{;cxIJC4;7SH{O?HSW4pF*#D#SRFJVh-UnJ>lmo53MuVGXHhgk(@6 zstjEGlr(KSG0NiD->JZ4$Yc zV798vVlTIf*@3papq^i&EX^D9zx~Oj{z^GnPzU-*1tw*BsIhqJO^C4^wbUz!4=3x@ zv3=iU`}Cj`Y^y;XW%H*^7ahA#St8P7cP>hD6Qg}T^%f9DNa1c0dTb`;aU6_k)i-5^ zje8_4MWST7c0XIbYa>aM)t(Kq#atU7PNZa|P^RE)u5F1^I>9_A(>S^w<|j}i=7%4u zqCLzH9~C(JgjJP}}nxEId57v8qj@kaoLvXt! zF3IeJOmObyJJK~@0aRvddgI{J2!to@z^a<%)T)QxP_jQV5cuX6RRtV1Opu!^oi_ciW=f z?QjV>-6<>wM3I+U?{*iVXyBGL97CNihL^_*h2c|jg0QgHnZlI97LQR@w|1s(3N2LW zXLjLfMDBhPUzwFM-Q%$^WSj&k7R?%y?QYEZ zbHa>E!bzU#Bdq?pM1E$%V2&_;NW7d$OY!MpFet=m9ub)iVP{4Q1X#tz-ez%&Os-xN z1A5vfLem+elFo-6ai)il;oVD3xfr%xyrn_`!4iYl$)W}0%3SC9oa$P{hP1|klaH(n zXNon`X?7y}^mZ@F+Vb#P_5?8kNndC`m1jvrdi52#hEkPdGFV82^%eepc#_7rVP}23 zkz>V|1YM7X{e0}5zBN);QSWG;YZbeb%#)Y>Gy1GM1Yu}XtB)z&{dc{HNVBhTZ&pV6 zVe9&%iP7Co#?WL!q;TUR>5fE)|3T%(y!QA3jo2{X>Og)Gw!UXLYW&tuJXhp!`KuU< zYrYU}A>!U{=$RGRPDt{7kbXh3Y}Kp%w)~D*b{>7tgdUh&jNh3V!NHzcKGaD z{s#=Lph8tl*#q`$ziASYSj9SrrwW{L5pmBs2g4G0R3VP<52#5KP`4e;V7Bg zWGqy>&*!_iKhs4*X=@DP_g+HwP_wj^HbRAeidJzj8rJVqDUBh|my0xffoKL7NcS!H5*&b(Oyg?w26r`X+lU5XZJ2HC3_O%J1Ow8=QKa9VRoi1juys7l$PxpBlC)_>0 z8_dLHoc)w-oWar`Tx@?GXqQ7^r62!3-}5?FKVgRU;0w4|DFAm@XAeT*$)o z6lCn^Xz?jxMXpvx4fwadEMrs3GWYNG;zJkB19yB=c3C07R8z)t_km+>$XjPIXzA($$oRm+r{G-5eb z3Du5h6dL*VO-U1@>roir3Ljg`Ra-Q#dL0^VStr(*#!K_O1#p@`>JE-i5-(LkoYKo} zNTnuBLz_+H341Mlu*>~99oGj7ENv>KaWnaanJx=?DG|-KJfqL%6BVKX@7yqoGpLAj z;P~vyxm<&HC!0CR;zFG0M&JzW+GB>T&$4-)*{%weOGCLv&|}O!8+M!V7Ro?%^}pVq zNEIsh?5&pn-@@u+Xg(i#M9*ev9&t{x$n`A!mw`gFqmZ+mTWlfM!-**f!k@YOUzB=3 z<%%nLXJWLxQ%Ho%*G;<)N06!aQ4grp92fkqMPx}*oGkY{varGwolhX7)GG^E4(}%3 zYCZ0@`?5u@M<%g_n(6b1k1VK+rU$ou%s}2~sdCd!XEd5ml!^LaS8JZ(B6zCTMcZmX zY3>9_z#9}^(0!R7HdiMT`rnaxT$L?q=e%kRU#t!6_^R4DieO|jYnP5W5BdkfCqyqf z-}mebI?D)uc_hrs4Nl!{ER5XFX&xG7$v`bHLV^|3KK&({R=mtF+Olve?>*w2C8O)x z?08oZQ$Np@7H!pF+iR)Np&vfY@cQ@LHBRvnX!ZfsMz{K$vECampvFkO4yhZMo~5J} zN5wY@u*?>Q==M$+E#EW8Xgc@`d%K>f{r1(v1No$x^Uisu&9)H!do0JtDQQ}HsWW>I zI?R6n*kxA;=AQO&pdA%AlIW9#k-EsTMH~N@z8&j zfbWE}@g|LSrRjq=%bmA=ooO1t7l>b8ea1FWgA%NaOJISE;rUah z$|Y>0q(V3Cx@5Vf05%`#gP)4j^$}a8*$-_B8j}lxffG zsM@d=y%vSSFm<6k?KDVASiX;1I{onO`EpkgyE07Y+gFd}Yyh2ryhOP=d2mizHurvT z1JlElM^F!geKL9Atov^<3-tAk6I$t(!Sx^z6tbkhG7xMAHmfi{>LmrAPgV%Ce>c79 zBoqu~j@{}UC=$MGXXn@NuZvh+AXZyK&M|R3`U!kY#zrRh6&A9lBgw`0^3$cN+|Eq2 z#AULC#k@gHJnd|6;IC3u*7h}}H#Ih;C#J1Cl~}sz^R09IVdYz$Y+l5GK}Y9}gSp9= zO{)S{S4-lx5{u(z=a^}+Un}~Ep1d6EhC)bIly0E~HCXZJ`E$&rVkpV)@rA5GKb)S@ z@>O0S&*^bzbc1Q{rbhR*Uk|p=v{EEE*|akwAPH`?vpWh@Mc4sV!V^gDk#OHO=ltMtjZUU4d=Fr@9g>E*NIVbSCZB%1$^D+2 zM9^!=t6BCFk384Y+M@k1uwY@DMKbR|ZJftXzK@>YRllR-d`+e)p?&S$d9?S|{tv=?LkLRMju?t#uH_L&TKn(NgW032g1r%UYo0(!P z9WRn2@!wH;?1CXqCwSb>W)zEE+1qch2#^+Bh%>z?)`>2!Ju6U4cL}P2E(OB;B+}f` zpnogQCJ{#V(<7Qq;ZT~_l;}7O>VN}-2j&uH^bbIllu?pzk@X6FNiQw7mrU(;AZqoM znceEN1toKNGpR-+w@|r<(MYcqNTGQ6U3wx-RFE_1$WX+X_spW$0j-ig4MzU4Yg$wv zTeKN9z=_(R+>w@*QTz_$tz#`M5 zNyqi@Cv?LXoj4^Eo3a#+gq%VwwacWg(;|^&S)XD#fUOgsRAg)~oh^?h#aKC%! zSG`)J^ZKW<6*Lr2#gqn4NQA>ow+)IGzx6I(zUIBv;pp*qvzS`vs&ILEuLk)OtrMkV z@}JwmZ1;L*|3|ymXN3PsLCUn6r7D{bT(Cvs1(*N*7H+f+6*`{O;%$~%hviaIR#%0! zIpGrV@k@Vg84Cp$$x5$*3%*^djwQyWKI@naLCJ$4YU@!|auPP@6(A`7XoAr@}f z>P8V(j;m@6rPbt9M_|(u-Gaer3bEYDo-Qorm~lGth#G~N09y6knn>_f93LmZV&&yf z6L|8EPRFzs_vM#i(;ZWEVx+*gC1;nN{dmHannx>UiwPER?}eg@1VVYzwA#|j6v;a- zHZzjejFy6a*|NNBja8zcGzJybH1Gl9k8!Z{5foahR9NczCCJCmc!yaqR9FVQ9as*&6B{HU9hyHtfw+s073pvQ^hG%U6i zgVcKaRB!v=V~`#cZiWwD8ok>8-M-II3o?=z)RlYf!x2Q$`L*=dB*V` zd(~G5TgU1)aRR`xzjC48{zt=fmgrZSo^DCg!H-ws9n^+*T!d^ZWt_(jlL0-Fv*XMy<)&TM^;defm=!az#TTssHh@Yi7gg7nMtfRcV> z@L*7HS-(fxxPvokK|{V~zZYcH;<7&v1D!SDnER8#8bdx~&h_?v!tL(u$(%YX-$ZpQ zjVAyAG^YicE_pBqizD50gig;F2Xj3ol4}4nxc%HJ%~6A*OAdrhf7Qfk76!s%1D~0D z5+3Q53Q9HlH*3>JdJ18`VUd(8b1*rc-MkRag@mzj5uy%uc7RqRHC_s-lI(0RIZ3Sj@QL z-K@VScZzZ8E(=%tgsM>6@4wDh8%j1e&2mR)NPwM~qBy&>2=S5}|9urjn(sdv92uEk z$?89LDF*;<8cWBVjGrgO-py+-AzO@TrwNk&pXi8Qhf!ry-w*P%0sr#9`8NFZ;kLH8r*K32#wl$h)IJ? zCF~mrYB#49;_=r%t+sV=mUY|*YO_y$aQd_~evQ+|h$clz;G_t27wzTbZ;@>I%AVZu zVa(VBN1YLjdHb-lCfQj3&N|naw~iqau1t1DgR%K@)VC9o)v*jteq3g!HJw4iD51VG zmaQA5?mReo2mPEI7FyAMPExni*U(wM>wR)K?UZrT*S7GxOSsrjO-QQxzjXtK*qnZ0R94avtU7a-__r%H%RFOd zc*Fs*@A6sx(U7Qf>veuQ`h6UqXC3m0DhkYYt_t@08M)_*l+4!Fwcc8WGH&d&1W=y5 zY8hGcNEL-6AIB2PM&nLpgGEH|mAtu5@wu7J5lanat;fEO?N!ow=@`^)v%u12eanNuC*Qq=eBPz+ zt#Vc4#KhMT(evQXs;@_?+*liSkpCc+5o@cdtyghp$~xM+BKuF8 zDg|9HR1NwFqPcgXvb9sF@TUsnDPyCZ%SA!~ zmNy!NlsCo2rm+cNL6|Q_4gmzoAst{EBaZ?Xt955gcMsJ9PJ^`^f^fF!TTb@r$;sLi zraa%R)qJ=230^cV{CatCCh6bhWDiB%Fh_jCEd*RM6v)ug+g{><5%W5??kY&`do&_VKU9%pH^3$k=kH#CfY~l(Lzp z0Iql2%eVxPr7-F%K<{$$>xX)|x>NlR+RnxgEr-&Dzu{>Ye&%~dx(Mb=S7nzyS%0xJ zb9(2PES}}$OTUm(m*JBYeB9^2I-VDH3b(`O|rN`lFvz|pkK&JKdS`6P7${;JmedSAtNE9Xu4 zeJetsuWn6~2;X@xW%28p?4muPnDean0*R>Hi_o=Sh`zi}(7eXliC~brsr%x&QvQOw z6dhsL)JL(6#5;(0<22uhxNkAc==gNt{X2cr^By}9({z2GvDamcneuzeb2r7ckI`m1 zh#vJpk@yF{R27xiy+$fno9M@ou1H0BTID8MZUMC*_von&Ke756QHOqt^_y0^so_bU zD@OB8s;P(UeapL#?fu<;iZ?cH;!P>HJ$!$g@?m39v*kVIY59h=mC{`?gLTcgiS+wd z*nU;MQ{O)Zd=d`fIycDa#Cv|_&kmk~G&#V6zbM#^g%QEzXu#MXkmZ>XdYH#-SpBDz ziNs;WoE&|xqK2)f#;W_QqpDRtOwMgXwwk$ey20CN%Hc~t4|=UXp!#ih&*2X;^-r*R zHA^EOkz$)2{Gg~}5*U#UC9B5J&ZxZ34 zEPrQ}Pz@TYe#q4H{VrM&97FTU_t|X&OS>|@h?Vnxh0%;10h~;x3ffynyxFGq>WyHo zI<$YLBm1{Mr<&eEfRW)u8SIMh>r56_!#TX!h3348awKj*_8t}z3l^}6vFi4?armjz@b^Z z+XDV{I4nKzU!iKf8TWmeO>o^WOwgn5?$RVaDPTDe_SbbiDh+To=Bq=@hGqN2m32W{ zU-0|-PqrL^#&vZzD(v>Tv6uh_@re5aQ8{H#%zI_+hZ88fXr|A#pmC4FC^gq%#P%uk zPz@c)U#eJ@o8ci{IF5{IO^R^T_3W>;6aI(Wgm+9=?@4Ccp(NtvL%5oV&$!S_y>fU) z@9>NMZHP6yuekREANwGa*^c4f&iY5!s_Yo2%S*c3ONRtf*1ZRaB;)<)Q;gO0&J1B# zJWA;(lHDHR?}ob2=<`A02#>hNO2#|6W0jxZOcmq zR;BblOxWQ7jRuACz-E5ZX7)E_lvU$CfARecv6*{6r?w-pWk>)`r%bkZ|!Q5=P#3!M|VC^ zGj9F<(B<9EGtW%!xR|PFtC*;0ug<5`j>!{Ki_heIzxiBuKI-E(!?h)b@!^+;RuK(zMfK|LOWx>uD-{ zGfsSTZesr(%Xadj+hMt}b)~r%Au9JPFKoNGWNkd~AWWrhn@5L<-w%S)v8@~aDxO&v zqVYYb*ID%GnyqxnhWejF6OMx z>DOCY&yBuW5l|!A@a%yD11q)u>(`DZ4>eMp;V#X}9(PacyziBJ!QGsCA@%$*O}gah z)o``6a-e0P5CPaz-__OIIMY!-;8Tgh>lP5om-(_zO}$aR-?{X*0R@^ye?j3?->w3* zwO0`?0%zeaQ%R!T`bi3EG>r*Zuc`imA!YL#HT&9ZRx`-xwi(l*S;6Y&MA}G+l;EE)0G6U; zWb%lU9-BL)ws%H!fl=G^J~OL@aK{wp7B$_`n!!^Vy14H2;>uF4a9@yVb;=e+kEXIG zlY0$3&N$AFgy*@|wtF=%EN6$82QY)N)XS`}rQc5iM_x4?E7rfue^S;)d0YzBzjxAD zKSJeUdr0uPPoG9}eX3>#3G)g1G0Gk*`-Pv2E?uyBcOZ`$!({C~0m)704n75J90fUk4sytn zP^Zd*+Xc3i2Ct%{Q>>P8*zA{?j4aP8`Acg?+%{@c#vA;s_0UBo{luYI{U_%UF?}vq znfDYoebb>obou$IQ|5J^l-KFkr;W$fXFX);=Q4<7RkW-HXr}+o`l;?BKu7ZSY zH&1=7@VVxn_>0p@4aQFY$V~u+V(UcI-3Jd`LwAZg{m=7{c0O@{53erL7Uqx6Z_x35 zWbeY<7qgz_SK0;(z3?=>kiJ*qHKh|h$ru%8~!+$~mm`v1b zS5-5Zd9Ba3nZrRn0Sm^^5fT)~s(2U>Nnmh6< zYVzUR9mVxSX7QHOl*f1FRnFf&aq+N+{OJctF^XZY_nyxk#M&Kl-QalH13 zHw0zQoHW(6P-tT8K2`B)5oZNO1yZHwxCr^ICj!cZ(x zkxIJo8lWkU7ER2-$h1!h=u4QH9_G|T@za)@_-afNUDk#(^+ll~o=784lLAQwFuxgF z%)_|g?PIEVO}`)%&-V!+`)%#!e>NGq?HQYp`1XmD19!7$|z5c=EJOu9=-)doe)7&??5%l=hrrpgF|K1(rQmfr3w3 zKQ(4ovb{n>6k^P4co|?1?XMyd#goVx&C|n}nFCnA|BEi|Ieq3V*M9=50Kx)V|MD=H8R`CLM?e z%jEK$p5xeKz4TolCZ4KiygtV-da}7BDph~m)`M94O#(0o=Kx)lHv4tkSyb!6o7r1A z2doe{YFMT7&qT`a)XzvE&%#7Bj`uRw}JgR!-mA zqk&?Al?1@%#f@@ljg7itj)9=vuuhEM zl2ltF5Jj*wf=XJsb^$i25L)Dg@KLmnS2s-?`sGQmfy?oMGD<8mIFkqMH?Rc~L76vf zg4xWEAi!OGi3D4^6TaEf6lfzc+8laYqr$J-%P)aAGeS`a|Mornx`ORmnO6aQmtG`b zJm~a{cCN2Px<88+z8i?CHT?ttH7~e=jVROLRM+H%f!W<_kno_qxpx^vPy=00Bu207 zI?`{>JjAsom15&6^fs%ZMGk!xFNsrfW}-`&h9Oe`mLuC9T8u9I7TJgfYTT}wsrSK( zihOm`nN030z5LNdbxsJ(x_&2K|X9$g{r^?F=32&h1nElK> zF&R>yve3|B1Y(%x-?(*o^=O*sIGA)D%pwrQ$-NmokA!G?*z5IW!xE^+hl#3bj`gWM z}^k=J%tnL;Lhoc=t$d%N23@9oQ!VQ zgpx{s=LeXZB73s$f)m;Uqj0(0@r4u=NW+O_dLCdigNyxn>gjwWHK8_Is5$-~cI}2M zxipvc)mB#9kE@mLg4YehIW(F2bDdb`y$Rvc)onsmjzV(HF6xx2t(`j!i&lpM#Tz^A zRZU{!)Gi@Bl0pDPA`QqP6K%#R^9%79plD;V*;CFSljdMRs;&lA%=t?zI#NJ+WjKPc{g?nE#5M}09In0N&21V9^Y*Y^t} zVD*P|>*s+GMBda&;j1fH;vQFGO0>Z420U^`a%~*bkx1EP`@P2oUMF_M<;9h7H0;sd z3%=7-HSq5uX?bmcSFim4MDZ*o@G~XuZXOCaA1t}9zC+QKwe4!gkhE;+uw8{MP{h^m z17`k^v@531_g0u%4!sb4Zj61w3<(a&n5qBOXpDTL=9JlKsQ04joct%AQirbI%m}qx zly+}*EB*C}*BAMJ?URIxhpzG5Z+e>Ot}x}6J?cG*2VO3PP4F*qQN2r4rwGGx&(Ycd zO^}x6v?F2uV~0LWe4jAQ@`lIxy`b?Du7qMk3VF%2zuFIV-0&1!k-C7-=(B(0?wpAf z-DJJUP|)KMqvF!zJ9V(9iGeFS8|E_*014AcUu>NVTt1cANn7fr9PC)QQ3{Uwg2~v8 zrORvlhO=n1Vff@1{&Q8-C0aE+H~H7-W&Tm}M5*JF#5J?ij}~k`>@|Fn9PNICJ@ic% zf3%w8fH-)OIlV$!eLa7!FwTAyZh^(xWv5H1Etb3cPHci-2S3jKs z&|Mwo{`Y#P>rLQAta-d>eBoj%kCT15 zr}XganGH|t!u8|TSF9Bd*>-!h3QYE@*e`hpdGNP+=IvTuSDa<0@7(wN!dH??dhUsu zzREgHy&04A1DQ*9|9FI&ytr!I^5rizc1D-fhM2`ClP;;-&0AHztAtlxX`OTJk;jSR zqarj%FQ^;0GcUBgCEnW+t#d1Ci$0!Dbpo%h=4gsMk3C$;+atP*?}lygZ&KcTWO2`( z_VRZ=;TH(7TiKR(z|OwDDJMV#jo0 z>CfyicfE2OO+Sg5X(Yl7hz4Qxa6%zfu&1DwK$a8?4HyFQKFuXa4gG_8t25;tb_Vit`W*WvIXfkTV1?8qvqVqn0ly7^ihjY!uJ8sMc{5ycvfY%i0du! z>HA=a^;R#KpAK))y~nnEi;G)x%-prrtz zV4a%_E9S9aI1m(rw~9Ex_vHDFML}{px1h6eRbh$B9F*coAg?ky8x>I?W>(!|MR0shbF?-%e)c+~M>baPEX&nN5ug_qi>O04wNfh}o?r%W~C; z)y}+F|5aV@AxFclYrJoN)CiUt=;%VP1*c8!R+`NDyoa%AwCbR%727?x^yLBmw)Uo~ z=fw|>VtMb?lmb3|va(=4l| z+$c>28(gh_+=pe*(NID$9l{$s&jkX3n7*Xbg1YsxRMd;hkE3I+q>CYzmO)Ahej)BI za850~Q*0M(Has(DHA3yFBWw*dbQa%O8*usf50z!8Q#Req-Ro1TBfBj*16il?Huca! z`E_G*Qcg|MoA*q|t1fBlJ`QWzNK!*@-?}u=e;BSV4S}^^GEIhzZHLGF9hSIBN&ms? zr&3Sdn8Q1+9-cp7%n3Wy0eky+;h6r@lh~2BDHWu!tjySxA4)^7m#f2C9>f`Ketrn- zOaO=Z)}h?eiMF24oVl&;1g(z`tQd5XosW8O^RQ(eMN=KwI{7{>-w81Ze>Tba_Wo>X zjIs;#-=#Brlch=bmW~=Q3ET9$2~D}&&ZK#(eW!s4U=^%-@5ISIlOAq(I`AU_iAn{q zKp=ZidZ54AGMUPPV>GcK|qnRh(&hhLzC(SV4)(YrPcTJ z)-R{T^;pgUB`y{t?9Cq=brm3;6$+p~-q-`f(^SFGhIF3k{OBYzQ*5TLF}wV%d`pSL zb<)dr#ui)^e+WeaW&^UBT?t@9a8K+=_n>^u3DAO(iAOC}yo)c#>=u8r! zzKvr#>7$e%cG6a$D!Oc8oG>(iuS9*HnkjbE2HP7gIHF*_RGeLJJ3&oCI2y~5g`9jB zi8NVQgoRd^Of0`#IeBl!_j^z88ThbWfkk{<{jvjCjYGsc5z&DbwT8u}@P+>Eoa#NM z*#W4(Q&Y~TJDu7=gL?=r-uKfD6Q8SHgve74W7okvhWd(Dd{?%4mOl8l-o}5kN;0m$ ztWUjtskvzNbFsyt$irXOAF{O8$G$nu-#m(3)xaNH9OZk->vUp2PJ9a-)qc$KA}m_W z@Mcqk=_IFtDe)12&?ff=r9WxA^V?c^=2g_?8^3H?*pE&hzx`BRNh(<7)H#T`dmkj~ z^rxm6tQV!`+`1+^Q3y0G1z~sTgqlV=lR+wVtxL%S8+%@>jX2xK2JR9Bu(jkz-o8(> zcZ4J-wxc(U7oQ_|@QXfMr2V6hYvpy^g2u1=zyQzqd|*Z_cOoXBfKQ1aq?pN>!H5K7 z$3!1n^(K!QK(yKQeHa7FHS19VC6NG;V>vWsBUPLOjDHjmy4jiKayH?M)wY&>$sKG; zJD1W9^{wQ0c+apjhY~T(e!xeGs7T#{i^1Jmp(CrLhg;1spxp(a9NLqu}L)B!R66Z1T6`D2dU%qNBY{Lp+wI-!&jF zdjvQ=GdOyyVue4)Op-h1IjXEy1w_uEFdhl15@>Q1{_Oh0`DO3iw8yPmN)v4>^24v| z#m4n8rbwmnwZhWX|2}#nNFuXv0ZZ!!&*|G4WRIPg)iJP95!eyKfr3Bn)s-Tk{#M4@ z`%@QS!x%F!0LgQ$OTK1TULCh93BYejY0;?a4ut|@j@#=9)Me(tAohu4$$xM;Ffjd| z{f6d93n!aA0stB{bY1pKG$O)f z21c>WsibMn0;iAyNM>!3Z1r8iJ#{~PQi=-rFBJe^RfDEgsEO<^^0?A`|M!(NZJ*`h z@_xcjV9k^x*0j*v?BJ)x2|&Cv+qroXe=3BS?ej0Ysgw56r{(L}U?A+Nh1}*?@9qsbOX*Y4~B@?f&cbin(-9$3`Z*n!&yo7%4XUZCxHHFFsD4eo$a#^ zQ@WU6+57buL2U^}Glh^eMGkbK?t7pDg{ec{8Net&qTihq?*7Lig!;4x$X9cy6LJNE z*#b^AQ6BgaXKaM8farY=HZKi?-SZ_yFs>@Sygy9Au2MQJ1?a))E7i5sokc+k1{qBT@kHPGV|s*u9b1r8 zBaH#P?|*NHJNDYa;$)?|JH#pVj{?;~hzYfV-=^L&iPl)}oYsHYNrbo|4_5&xGt%PL z@)N*A4I4mFz6mN~?#{Ms~v}@@!Z#2xwsy3{^l=E=PVv z5OkL|E(avG{edygGpy|6+m|)`f`*Qy^H(QlDv0(tAR6-^pggaYu>bF{ihX%Ax*XGz z{}EL8dH=Nbo=&m9vWjt9W7I~D*&NcwD~s$YQ$uX>_&V)-CdtB;tfz$d#tvQx7x>un ze0LA|bzbC+f}p5(w;?DG!B;1}p;UI|h4OYpFhSXpZ$IgJ8`>v}gF-}KfwHpzh)~mF z1Iorru&0COu~4BHa|TbhfG-yxQkwG}$8W~j;}L7gSv1$U-D)_Fc=NNADV+#TwT0_* z?CNf{HCA~kvWMnoT@7xe!$oHCQ2DP(e8JFEmhg9W;iWAl{h2}<9J3QRW*py@x{vj} zg&pt_^c;3hBDxqij*m9j+Kp!x35x-j(hilF)GY%;B2TsFh(QjNv&zryB}k_c!&W+$ z2P*&gptDM^?tRD_xcAj#=1F%C%;#ECdqeh1Lazf|7n6qv=e8CoFzUqO%6g#WD{y{S z02t6LYvU5QOQ$%qURezsEQBTChU2R0eqk?2LcS>m{?V7@*oV=qOf)1rE2NGMeJRlD{0%n0P?D^#j;4kT)v2z zu|vU`WAOg4#Cz=%sn(8$N3Y?+(EC+jFH;yvI(np4~#8`TJW@TGLPUlB=J(0*j4QKN`dR#TP zU_S+&ccUUbOS^8sd=(fzh!M>UhK(N=L$K9bs*Dr>af(3o$Fdb?a~MwB@^nQ)Tqdoz z^Ag%!2rAI`v%w^VX@Lrg8sVftmtU?F(pwTf_6gT%8;ynZx6u`HG`7TJ`h;&Xu9SyN-qSbIV-_`U)G!^$o4)5LN;3rHAN+@ zUU}#O_zeN#yL?Ggy*P=FlF1jR$jdFhu>o`+t?_?Zt<@sLVnCQKt^2#VW_=8Ecjik*@G3xkcpu(~HqL96Rkz^x? zxBaAL4^7JkYY;n=#?%pX7w@V-sx{Fv2piq~ygt&?`6L5dyOK~ShWyN2olbo${H;Nv zc}cDX*NL6dR&>omu}Y!#_&g(6E1=ayD}e=jj@13S_K0%IRncz1O8FVCib`|An^olB zMW7W^sFcToBxem$5~ex3(ii$=eX#ed+E^!GhpWh^PO zFA>d*olp@KA(Ar5z8l7_P|8lWLAF%(ec#H?*s^D5?CV&@`n%@+`JQv$=lteBbK~W8 zy{_f;ysqc{@pw+C*>^uFysd|9y5-?GVO?l=54Xna8LdURor5z=b*C$}Sji}p$`HvY zum?0#7C(69>})!3A~+_nS-WbsL(;tVfG7tOMl*}&pLSdt@;^p( zo0@uF*>^FqT>=?LLOEn;r^KExDywfY@=nK~5s_mxA-sql&UpYt4yND;7B%cTCV9hM zFpmD)FRu8me*W7;J$SLVz-_i+vD?KSGPhTcjNT3_X_omBHE*esX}DIN(8OXji1(~W zp&I0|0z`qRYuC-N%zj?!jwm#g%iD2JFb1oc#n0}e$4drpMV7vA(`m@&*@9jhDSw9; zoHGmE`)%Qw1I-8FwqSLwF$RcwdD(G7BRN{?EvPFop+LA<2HL|XoFtT2rit9mfNAXY z^&UODhwLyr^4n#!8V~d|STQ?#|M?P?#^ht5CV3|l1G2LMN!nO7`yV2|J>}kBLU=wg zl1)~%pUjjpidF^3Yrx9G6DY6C<{u?Q9bbU%%O*5))O4G;vS$@TQP75!EBlr1E+FfQ z8YuEe=+YvZ4m_!h8O`{C>}p zES#uqD~=fJ8jx=R9w@YEA<$X;ptG#r4$t-u-5Vy$~5w&j#BWDPMz{75!t2r73aRO>i7?1p_EjFgF>*(t^|f2{{%OhtR!n# z7V*$MK~HxpW^m{{RQrjP2Z!a3TI#aV0VQwMJM{N%lfJQ?n7&~*U_64J*jBN%=8am_ zu-z%Zl}$4oqqfRqXWE-^Pd*r$*v4Ygw##r#RtC|(vx+uxTlOhVgR1&rxtAvLZdsXj zEPJB8cw4g`BlC2P7d21)xm5a0v#!%cJe56O-=fKSZMn~|F9ds z7S#43s-~;yP_kw6ymxY~3~EaER@Kl*_40_|&t#!cc-8~UrYEnrm#QCv?45l>bJlLv z15RUSWADq~yZ=0vr5af!K(`LzguuoTXfgLm044WinnB}r;s0xc zCN7wIrRfo2%#lh8`hOcSh&^HyiSAg|u&C}TuaCPcXSJLxEZk%rVg?~;z1s9=)lW~NB{QdrH)BQl*CR*1Ep!+0Af;djU zLcb!*{<>(AvpZ?a9&a}Fi?y&xSP)`>l-xY@B18?EyIoYvQ5cQZAQ;FsW;n@PRM$0v zGu6GtT`8Ev(9md9Od7T&=67SJ$owCjfezAyvN1pg1NcBLSqnaJH>-=0Z@oVXt?^no zqXb}*JV{+cM^Ao7Hv>hv-yhPk8*KA>-_ruSieyfChsC3}`9?G=V`B8|E%O2+Y_nl| zY(Oz{&m1l|7cX+i`|Kqm}f2{>3M~*=m2+Xg-S5VR`-EuyUdIxFXO$Zv9lYmD5Xf&`x=w) z)4u`APnB&Niqvhg(aL!Ld^mtGJ&^wwo^86rs?#)z1AH-_iYV{)3E~)D0T8Y*Q5}*E zfZ=SDkbq~B zI*R~4AJ~peJz!|ymGbz8W!Y&)exIhTwQ-gmaZ!4Z@!NQN*OYbNC3S$~X_n;f@pr(k z4rbk2#R{;xTk7hoVXjC4QvhgE3q}|0nRnd6kZqF-PcBJEcYihhtAQE@$B5{39L3`s zc_IV`CXIO|;GL0UqK-6Ot4}VwwYsxIxR;lYZ=XEWAGk{n8W){~Pm$Rm@&G!+S&=#E z0?}16+Qta2hEcHKn-o&jq6^1L&;81Ic={wCSaDeH*b|o7Kz>3WC_9W_C0 zhuNg{gQO1JlS^8{IQBeiDO+qXU68tk_$%pp5+?KIn`!S_{VQs$3O z26Fq4&|PhHw+|ns%zqntuR9uw#_0A#v*xa8brCX|GfVI1B-Qc{ue<`+*k2q-Ph!%B z8|Zu<6y6DG#;@xs8onJ`i27aHQM{-o@jWS_QIgla_TZJ(;Y@%1fTBo>qHvA_ObK49j44Wx^MIb+wI)<$nTFZJ=JIpVrml4PCR-S+>w zN=%?|No|{ZW46d@phnT9o}b=XK+DRdz-~cPs!NZ*>t@%2D~YDnA2`jmhX3BObOiDI zix{%AQAzZ{<^V8_8Yr`!BzoKYm;D%3Z=Ok=`c%Sq;K&f!Q{}p$zWC>d9!I@CezAAf zl8*)r(^&H9O4u3M`Efsre%QfZ=PzjJ3spZP<7~fa)BE|Yw-#(;mqCov*+5c%4w4^(JF}NV?-=Aks zh*4A~gSGGCbTcc=ZS$A@zn#@uf8HWKZQbBfd3=7{)X_$roEX!;P1?kNXwboZ>mPFm zVg7yDuu|^HdtZ^`<@PMRhK3}c;2AWC95I*G;c@zMvZ;P8xunhsrm+a|vgkdqI9>nO z=at6m#h%oDC+r_vwq8>8-V)0pJYblMpA`na=O8-I+_8J{BQ|_zAMnXZ4(5&gL zfZoBX^6d1e9}J`-&(1GmL_M6$DrL&x`PVCxb>8d6*3;LtsJ;fCV!Q5S{4e{s*3KKm ziBh>YYS|B%!dQiacg)6L-XuBC0lZO5dctk?*YH4x^oK?Iwjz9=X4a3q+R83EMvhL^ zrQS5PN+2}SO-6VcME{%`54%CMWh090bd{8pM!}GhFjWXlF#}Yh)IX{Oks7?tk1~E- z)*92ZSK&svkJ402WJe@!D??7T;KY{kbQE-_zcOtnYqL%2ya=!mewNrzY%=0BS4BBj zNW64+%+Q*z{Ar}_v04}R{?jPHZJk>L*!Lk35`73X6R-n740ch-?}_RzWG2|WeNq_c z&{F`Q@Qq?HEszmNpyKFYXTNLRDp^QO;t|2ICD1!ow+q#-VOJ)(tr7Kc= zbEBQ#Ld#2@kU6QhY%6r)ML|hP85iET&x19?bfCTE01y9<{F=^&wyZw&IfDaD* zqej%Qc3QWJA0IT&-TmlT1C+>wxVEdou2k2_jLw_gn(33MZSw9(QRv@I@OA8x8ndzh zEIM|wpF4JELzYD;YCO&7e_hO^F`RT_3#e@#Y85=R4fi)mzPkS)VxG zFgWlQBwUA%Mtp8mSx`lv5^%^nBTa-wqqAe2TtDJyHF9>`P9UdP2RykP17~w=6azde z?ioxlw8)`DsBA7Fn^z}vak?@I=;#>DOqgvRA5F~|r+a1vYBz%b8eQn(cTZUw9)Rdg z3=|iM1A}tIa_HsLE5=@Vb*G2F^xHK}QK|~64re^Y0@yKRvZqu_%_dbBh}rsQVy_IX z0vp16L^fafLBFDRMzSuV4~S@<6D9=PB(N}v>^cQDN89^tf|V9RQPbNUB3eKNu#mpg zKJcRgdK-QDujl^X=nE`s8daO!1%79w5LlQE5cP!sRe_MV{%z!YPEVkTYPSS-8R}LO zJWn?>sGpG91g#Ti?aNhx>A%0=Z^;kX@49r(+pHI9U~iY)Eb<1Ea{QPL!@vcyu{-fD zRiJN(4hpi*s=}pDKH_$Y8QSG)FjzFT!^w~JXQRhpj3(t?7u-)j5?Sw>zB~VCg&`t+xREZorLKBfF5O_4@o`7Lv7Cd6CM!#olD=K|>KIScB4Y+QEx6 zsm1Yr_lqmtepJF=y!MKcU$fiS&z*M)ga6w4?bUFR`F`i?_JA$&$zs?Tfi{1VAEp%- zVCsC3)>Nk%D{OL<8yC}f_k%jM&qjp>S2fi9?bpD_o=t94tC@yC-?gdPsuJ_Po~ME> z2Ig_Ew^Kq&UoBsQW@JdE7wynDM2WA0S0z95YXhr--{NilpF;%^r^7gk!oWBRr{Ha-7?6p3jz&iK-G`Iqca|GlFE>8)HJm(m-kpc09Hd`m0Ubn#kl&yiEEc<_Y26=1SE}vMPe|>o3GCh1C zse#S^!YFC#_;}vo?c_ktHC1;n-%NJiw-T(Gf7?P&KWS@ia|uDZBYI-;s<$9=3RTyiJlt}Laft9KO6z3Y4(Kx7ot?qHGTe`O0H+N`1 zsld=fMqQ}|-yJ}A{aClAT+^yq%nGA1Uc6gO)uCKLz83Gg{2N7RQ1FvmYuo)H{SA3; zUELHTGVYl8@u=~VG8O3p2+B7tp_=H1kXWiaFy(=^cOEIciXc0fYdQ)*QteC4NB2l?ra>Ngy;zf#lZ)D<=CM5t z@@Cpb&yU*Mjv^Fl6Jt+*diXf#7;mS`Y2TPvOK88r1u5adihE+Y(z9R`L#+((J+DG6 zN5GEgA50-wi3b?qMy}fpHj_w(8e|yJy=qeL7UM~vTy6@C+Te}cXaGX7c6*w|uY00y z*m+~+_`o35`i(?iWS#N}xkKb>n?yuyGx;6od5<8MloQ_Ns`1Ia`0uC1?4HD^@RceB zwjFx1s79#xqchFE8<~9kst{?U`ELILR;!lL&3o83oJ9e@S!>=|g2Q+$v{AhP(YzM$ zZ#A0`h(*d_tr{2e+d?HXpf8sxH{2#9B-neKG(Wt5agF&?eGAo<>5L~3YO6QO#u#0L z=>?yM_mnonC)qZ+&Y>Db%Bz26AxF*;cETHPbfE8SH$2|nnfkh3(8575OYAn@j(ggp zM%BN&IEB7y|ChhY2l|?Mr0G-SBWlt?q`B1*K}GKw9EyL4~y!aGOJZrRNUfeL?;7`ayoy(bN8Z z9>kDV!lb*IR$=6VuIWiVlmd!8xRysI8#$BOq=jW+|^+4a4^eNJ;S`emJ2m<$#oPR5pAbjU z9|5j@0bXq<%_Y8Xw1A)zRLzhq>U9 z);)^$5cX+%p-A8r zZS${f+X=3HC3ony(N}6jIvN4FeDC@86OU!34|hC+SL!QxqduWgr`uNZ$8>sh0Y=P+ zf>`_9*qiQd&_{A)(+AT$Fa6MWm{Gd4=nAF--KU3Q8)gA6X%PE|7+t(N*&$x@kY`Ed zeT1rKnAar~wu&+J6mQYpP@^(=6GC~C;NgQ4c%AB1oJ8?Fz#-yusP5=fWvP8~T!z&g zmQXRYgoUjvvPLDjKeDZ5DIdB6oqWkaadnkqpLyR8!B){-3|BPJ#BcWI?WMB0@AbGk zn>frN-hD|urZ{=$@--K)ckBkyEZ5^F#p(yR@(d|rU-#{B%pWRxMM_(%jx2iPg+>#r zNrnt}=WE)k{2d;N^x4}k9~(h(8TT*Y(x2~=lD_^bJoi9$duse(t8)sGrL|(b@V5)z zxtn>`-waDGk8Mqss?S^@?n%XKRFp$&C2}_5zltJkIgYwx(TqVH0oxL)gu$}fe^l+q zxpRchqj*>76c*KEI(x)!QhR1-;EGuT>p~jy6)3~8=4JmI*WLneAzOx(pG6NjrZ(-R zYFf{=w~$jpP0&6&;XRiR>d#kC5%l@z?+TGvG`2LwTjs`*-z`SAVf{b0t6hh_4bVjN zpEqJf%n)32h-824lh?m)XhWRF-Kg)KZk(NpSc4dapyZ@+*GaPhWuS=Heu_X>45BZH zZx&8vF7Sk$b_E(Zrt^Odb+2mE^ey?P@g4LV%lt-vJg|m5O;@1;KV9ax@vyB_sGKV6#B$?y!PHV?BLDpa;FFJek<<7u3Ez zzOX*$sfibn(li5CuYaSVyT`JfE=(~LzS2};&Uw#dnky6o+nTRj{;g&xac;)zwY-uX zkJf17srt3X>M1TOivB$#$M(I-4zH1Fc`84lhf`QA3%PD7Lxz$XgoiMt z(;Tx+@{J|a@Rq7@uQW>~@2N^1GP1&_2g3zJ38%kg-XM1sylLArj*JwKhWB2HKCD4` zMPf(_MllT{L+|eFV=$g`ZSa(%DrG!paj^N{M^7hS2emT6k&7aWPD170ZzM3L=)2m? zXAe{59BMLd()fGOZ%|Cq4McDExzH(bGq{l{3NAit6jbc?7hMUibTpCo`eqcxsQAvq z-(}`hFL~%hvC2Wn?K7!4)eo($)wyT#cePzdllEe@Rik}JVqrJAY!^Gm8560dt78^Z zg`AS@J)K1uGecKo)MQ7arBpbFmh>17p*TJ7bStBqyX3XKd{oxWtIQK)zbs6=2Bui@ z=G~*B_e$mjrP?2Oh2>XksozYkbI7yzYHujgXoSe2U-7^sEFhkX{aWQ5%l^MCNNYS$ z-VSTmt8Gy+4(x8Kz5Dcs*>xsFL;uXc&5+{;h*y}m&zxs>8EldkmK8VBUCyyNt`tZE zMH9mJTI5c*z%KjVH<8)PUE(5?8{Ftjr;k(<7pobOx4x2V>l<$qbt|WT;vdQf_SFC6 za3l1qYY-l4Za%92SjIo4hH@k6|1$7eLqye4;k204Um2koKelJ|c+Fk`DMGkUwdt!K z_>zfK!g=v=R5)$(r*6UbYh{yOeew|yzIzwU9rLlI&>C*vOzDA`E?##&0so7KFX7W> zeW&gES|GGV|1y|)zq8%j=1;{Be$v(m>hIp0Zmtgub?4y3KO?({PU&ajHPu#4?yV=8 zo{fS$8l~$E;V?vUJPhN5xy3ciQqpyOnHRp1Ea@PAZRHAT$01jDG_1&*PR?OxZbA&NGlKGSIG%Xj2F z>rEJQB|NEK26-tZa2{)rZZ*m*iBKz7*i=ug7P1{upzO~2_1Z`aeM$H)kSwVP_uS-% zdOmKH;bbg#DHhnB!leB?=-v1R;r>d#{f>p2Tj{5~yI2a+C!{Cus^qBetwzoW5?0S3 z645zEtU!Q+j){;+r08(J^Si}VBW~_^O}yQP17i1ikj$vwzJPNYe1w$ZQI(x77icG0 z5}nZ#Kvm~LhLmvcU%a&A=aO4j7}Xwnf4Ie#lH+qSmHKmdQIlab3>Qf@Pu=J|*+2B{ zV{Y`7Wz7*hHIP{x#Y)Ybn$c+`?#(7CnfOv?$k_uI8^b>6(%BPb2-e12-|cH)<>t?D zdGnN64sP$!c#=D(iz*!Y(=u9T{Z(X&?TCH4iQw`5foLy_WcG0?yg;~_5tRNJtfd@N zEadsfeVzaC3T^>0bJ#1FEf>J_njHLQ=guetWg?@WpZnLezdwRFFiCS%BMO+~MUqy3 z%O)9Ryu5g@6PNckulIzy3y)^*mEEsG2k)n4IvhW*v^idk2w(Z`@yR3B{T?TfvPQ~T z5biJs2SE3e4|(=^5FdE(q?n}mhOWE6YpE*s-{>7Octx3D?~Zb4lP|wfH>yRcXPtJR zD6%ZcjT_>hA6`b0^hHX0;q6C1dpx}00#12b@l3TcUWfh3nYP|XV{w}W2kWkNcY_zX zR@c%A^CI4HlM1@Gtb-R74y2wD4=X}P4!P*KI(3A+e(g;r2+>cdNbvTOzPWIzn={1Z zuy<=ao%=xp?vFu=Ao{{)gO<{^uM`i(rEblmf-P>SzSDR_GWlB7pn>IlD7mm*8`8j6 zTwy{UFFHJfMqemA4hV&3)`%VXDx8xFA~P2m9+8tcUp$ZJbUzSH;!uWohU{5V_BN?i zU9oXNh+4QV-)Hml4OQzRD`>0_B8j_#s3g?K%Huo1u~8&V;=yeP5DRzAn`K9n{a`@U za-F()^=NVOT*oY?ZqQ}19nJ$&8>!aPTVDft{SB=ORJ`)H9A=)GVH+ZZIeszpNpygn z4qX}$-JwzgNd8fx!nD)6NQRnDWwnlUq_q||Hy19-!+(Y`7ctWZad@opQ7Oj;I0i3H z!|;qW2PlsIJeF6R5k3^AFEsAjdG{{hNsc-s6`?>~bXp9Z_gS5;Xi5op3@0ZwI9icL zNi4n$(@bUpo0Innw4`q+t_3iQ`#)Xhr<{LM=NEJi&w5OEs1&^D8&C-gub z>#bk30#Bebs!sWwx?r!8cX~DTOBo2Ki8*pHuD(i@)UK~j$_NQh<}2cLU%VNEPOE!? zw1DnTu~CNv_v_t(*n6Da`wr$~4aLxBM17I!++{4{9(iuYnl~(#UlX*RrT#W2v=K0X zo5ItW1GYLaSyi zUTvMXoz`B#_@I9QW{6sF)KZdsT19@l<`pdNM9h% z*{DXq&NBxoa3A5dKWBD-l9Oile~4JfbbYo2K`Sdv1T9Vopi7^L6>f3aibA#qfT|$^8H6{yxaso=}CmA@O2~By#o-?lhOoTqx3iH z<0+;GAyEYKQe9YImRsvfrEkC&rc=z~@H**}!>^vAJYniCA9#!23j%w1eoE43=1gMc zVc#I(B6aQDRqK_O#tyeqYkgQAJPnnXB8U4DqKVTfRoYGd^1#g39irbqQ-H z$b>#0Z7SqDWE#S(&?qQYiQO?xNw003@>ih3dXgEH)+{m#{+)T(Nc9JDsZGiHm;4AV znhxwmtT^FNYJ*037I?1`oGbO~BULdn^DK#~UN#|jE&}W65^^2bq)m%OwNKmAQl8n|f=oOPM zxk>3WbbaJ?cO&Z^a?2I{GH*1HAo~V&?YiF~)lgi65H53#J~uFkBUj=i9CDcwtF-(P zisOWIH_0p}8;NYsJ?DIMv=x$uYzgZpe_a3I%DvqtVp@BNxj_pdSlMt| zmhy{Do0+?Q$XMPnUf9PvN)No-w4om~hJHfpm?9(}nw1nS$J@B$l?k*4(CgeD!>REP z2L{_XuCW#~wUOSDgOX8uu~7G-e#nvxy$^l6M>*|JJ{d7td;u3Q3<&=qD59R_aqw^h zld@JEI1&8ak`_=p%dFD%VM-|(Vu|2Hac*+82i}5KqvaLd^HJ9&&K>wH@O&W=TMH2# zo@GPdk!YRqZ7rGBbIGN8MMi2SV5D~#j`&Q^k-KWr)OQ2%Mjb-0yMFf; zOscPb+YWztHR7F#5(`@|Vjz%t0N4;FksAm`&m_k0Hq~CS61RQ_s6{I8_IG*P)8hlA zje*{nwA!e5vSQlNn2eBON(ol3=7BQ(#@|%Rjh(dSeCn+qY1ZgZ8m-?coLf^s-TC0A zxF|p^&Uf<_t3~j~@)tf0R6+7RB6q3ds6%<6JzvTgh|Dk^0q=gbU}d6ID!D zQdFFRjHeH*9AcqKRx)g1c9>;;Nt>guM~^E|QeLgaQJ>WP@T!O#neVtR@APj=@;HX& z-<{X)om+pMjPZIXyH17p@`iNz97<)(G>u(l@F^wsd>_|1`Qe=cMOGcige|&W|D~@~ z3cE_JwsE*!R2+_B>3X97%7zM#6N+iVGcPL~^-RFBmO9>Q9iD?CifQ&`6s!7^H+!j> z17LhS*gK6z$O$zH>&|mYF0&Q#RU^o|sQwL9Dc78BuvIsyx(Wu*e3;lufjJpB9A{2X zwaz9VqU!T0O{pmlh5iK&v*iN6O=rPegcIDDw*w!B$WB)YQ5eD#RLsq-=Ye|%7kB3TAq&d=;y*7 z+Bvm4F0J*O$8ShW1lE+`c%vz$XhdTf^FF)hg_qID3!V?#L5+a5TZaV!cwEbrrHXEAZmarO7a> zUeVjQIk;FqBfLHmUfr2ltSE8bsc-N)>cVJZsJQu+O?r)l-t6A~Oef(PBYjzJc1SWy zZ)uc*M9_gxYN%+JmOUczOK(&CC00_!u1&%XIyjo*AxOf9KBbALKfDIbD&|sTKbX4U z{zaa9vp~a8`~|YUVJaS?$I(4L$Kdq|N%z?p+DaX;I62o+-(W-0rUZ6YCm%#i?JkWp zw%mkfp}%-QX}mbkU%lVIM*(3)yj;sWqkte=uaMoPfYw?C1dBkM<9FpNRA6?r?e|A2 zw0a#8huj4DuwG1bYbKv!uhIqCQ%xj_h)z(yUEEr#W7128dv}|1f&DzsDfbSa>M> zwYM|at3Nd`&lh6p)|JpF^}3Ckdj7Hkc>e7yh<)CVJpJiwb|(eXO{ntsc=`#-c$!CA z<(Wp1!}CKW`05#gViIbiS8larN=AW$p;c4}JNNfnoIJ%)qHJ_`gY&GxH#m!Azuuz6 zfXY6d>9RV9kz6j^f_LC|cc%Penh|;K&H2>oMZQp5>EkyZl&IM>kBB2>Qg_PN&4I^D z$i0#FnjC~`-QbBLLFVSJg4@$xW5|IJ}XHxzeYrb#xqQH|bz(IV)>#J%E%<11BG0Vgrn< zQzOD$(9!TyD!#IHm9h5>K|IU#o=ru89?C^O7xxF$=X+}Ei|%8&M*HQ){uAJVkn3(D z5{m6vIA?;v_D3vE8;0*wU|&y^RU5i#Z6@7ggX0$9AI`vj<<8`W*M3#?H6Lg`YGeD< z4=djSnTm4Nc(>mx?YBr$J(W%2UC@~qUd^WIl|w^zLGp4PLvOah$2s~pHxcI!49)i@ zQ`g)GJCC{p&ym`gGi?emN)LtH5;^gO@R=)%Qu(r6vC`DT~WVe zmjw>He)VyGH}!BF5GMP|ws~e-6om!L{l!_<)Qz2vGO{5Cj&x$G z)$7~)PJL7PN8ArazxO16QI|i9zY^e)z(UL6GSZ1>0NY@(R~g+Mn#o6Q?vzlO&Y&;! zy9rm`xgsPexXcu58N7VxC}A}LzW$SG|Kw|)(qla1xv+J&$}V)4B2}xrs^b`@kLh65 z+n=hvC%*^{Ycc{(~O4)|WWT#!Dm zTP`Ec<69^`c0u)Oja6s4k5gRuP%YRHog@|Rr1)m!oQGUHi5QC7+>A3;hSaI{k!LD% zlC6mhP(beIDILsjZFrv@4S5w%$DKC%xSJn7i9HHI`kUWD_rJqY@0XKfF-t;dEBQM+ z4nru^jm^#k<3OzZ0Q|Dz zI2xxc-Ra?Bw+*;O;TN|*KO-$h61lF{VrImvXYVg}I2))P|NdAA z0K|$@H2MvdGDI44x-I=LzU%s{!RY^n(uUPqP9NC)Z{Upozk#!W|MlVg&-eeQ9_Z+Y z|J;Ex-f4AMj0pBQ1HkX!VBk}d*}frT51~+9VvU?kI#3bdp+6ao1}Pc!zv_g_r#xvm zh_ZicaXiXKyyAc;fYtts`d39L-^JY{PUkhHT@t#lgA5Xk=6!G|6C>o^&*AC ze@k9-GfVD-KN6-XRPwlT`TLK)dSB9hVtFe2$8mjtRZ5g~T~GWB-y6PvFlE?&la502 z6LC1y3z8!w7XZIe4EidQ@w1#TyX&ghf9TElVDPgPyPJGfagQGr*$CqsDNb_NG3zq? z>CuK3oBC7Dme1_{07zqf1(?ipW{lc}5BUFi8bz1gf=CmSU0&WE^G1!!JMnA)E2$t92wLsn6_KZRrPP5rcVJ+uo4?0)``=jQXnRqn&85 zAArkvh6Ve^UBo}R$7-IJQ_y_PIatG7x$yoLFp|2LmFS>xBT&QZ$<%~C@ORy=FbDVE zwjTMP$9a(+zEQoa3gArQ(7DgW>3+Do6dj}gGWd%<{WmJIJiyx?{_35bb2vNM&jR@H zU7_M0MWWdVYlf19?g*Dk`QRkI<|GFJ!1$QAP}(L801Vf zFuz`Eq!Q_LZf@2Q+-@Kb5^Q|PcGtc%jq|iW`BV}|)vJ`~#Rirxx-S{^N<^fVIP)`U za~|L~5y^nP+nHdJ=$G&DlhyW$dA@0RT7knPbOTdNw%o=Ba%kcyNPFXoGhk!qCABY7 z%i`jY7?@eA#zC2ox%^{#I1&Hkz{hmo&XEV3*mh7mXMa2^h)C#J07A55?eDddYTg%N zkilojBv{AnFGj8VhSnudZZKrJ9z76xW7uB4*+_-#BeqcUW|EW6C;<8T03RsbW~?z5 zBQG-(W*?!#_`#%q+L=@nv&=P<0 zz2stg-sw|M0Ez#nu(GYJLBgV`kK?FCRt9k5<&5ObdGtQ}qJJI8sUT=rr33*oqf4|I z%m#?+65uF0JY4isRsco2Jdmw>cp8ir!*+hFK(V5t~mat$Q^Emx4p|%DPJvR7Ro-;eRar$IA__>uF6F+Iw4sqgi|4fi*KS7+mV ze=`e=GeO&Z>wgCD^SYDmZ6wIONp_#v!Y}fa1gH#fZ$31?I+SM39BeW0+_d=^^9da z0h)rHqd7mKa(2|F)}>9D>!}PdW*ozC=+1Tl9Pefev7G(zVTTO@S)oR zSwA#4s7VhIUyLx`w@VqZHjYVyepL1Tp%z9vUD77GdD`3i`D^`8p|axp$#KD}GPA|H{f=1J^L>s-C*6pZ zkbxg99un+vSN`8JbdD^TIuX>yD7n9vpPrpV)2KOR7+^B_jL8YOWiMH!uX@paSH^HrVGG##1?vP0`E%5p`qK%=}$n6 z0?cRP&ofb%bWA6$>4?c6{i@sYBYe^cc17bs4u>pv1G1s>3mb&EU6(0e^3rT~3Ovmz z$;VT4Jqh`%zOXI1>(uE~`=qQNLs=wlMBY7c+z=J^rGCA{1iF>|7c*93G|2lWE5QC` zfeP1=1Fsf?F35vm>4UiF;lQiVpc^_<_$Qd-R@SchSvKJ zHP8f!u4R`Pi$3tJTm>UCQr~L$wlG~%j0s1)`@Jdh)ZYVw%iZp^r3OQwchBuV2EBXS zEwj?;^d~wNCn|9jf%eueO>%17TKdo-{9prOg#gTl80lL(2VWIb5PDKmBl5retL*TBMp#~;PwY`xpnJ@r56@>0V98M)+ zSzpIqaD9bHacaJz5GkMXtI!f-^&es4=FsP8+BKD-?|5_d+mV>1rSG=5SpbV^2&?C$ z&(#;nSC{MW42&9374!QTnPpyfPRaQ*F&KLqfKi9yFUF`84E)IXi;D`+FrYB=7PXtI zzyDBSz;04JCM!9wu>DrWv5~+bSJBj$5|9F!d2gu>HCvbgI+A1p!#Z#7&DwO3I)~|g zq3&N+hFp0(9S&-MA-P*7?l|4MeXa4m5*=KU&Jx0SMQ76Ui5VgkwC=Tl+)AF;Z%#(KB%M(?2*pVrC-_VEizIY~h? ztkqH9r*=5*6ol+}Ob)PTX>K$K@nuF0WlwWS3MQX$it73v zl@o`F0(Tt-Yt>QCsiL3T@FGOv+9UxS@mB&YU;69=HYB1{5x@CdWh9$aLP$gT{7@i? zuy^!?j_J9MpE(xrK{IVyd)11#CyfhbAr(DJY~nn#-_ky}cOb9o>%J$d0~ujPMWE1C zbyr9mA8GozqDT#wc5DD;tKhQUc3f|YmT1+xI6<(0zv0+XbSVr7JyKk2cSbI-vPvqw z?OEu&HjA(ja3-lF6YQuYvW(PX%NOli7lu2xr%zKt3!so+Y_GV7-k*}O{A%u)yz@11 z=^ogh#Y<*{YAiO|+oQfXZ%n|GNmEU~U1y*3m^?B*9Km`?@yiu78(_bWNX#j*v7#6U zN&U&v8+z=2+1MJi^WB}QE({NpgPuxC+FxTeO}h0{)N(n$cM7)ptxBkl9QXPLsVQa0`+i>jfUNJ0bnokj{U)H9axj3roct6CN3#^Jom%L6Zy5^G5NV? zzjjUEckPW?kA2b0fwz7vP5ZQ7yYty;em*uM=k3tUu-WJK-KWVlYl8{>m=Z6g=Sxs> zjvnE$Rl+ycq2xmO3-;`T&yi~ewP$TZGoOZxAGEM}zUuZrlp`FZ$g?66hpuXbtyZgouR!S2Y zw4WY|UbuMF(Gwdt-8>-`b~zrOy7H?}wUzSe!4wsjvZqE-tN|6CCPuSCZxd@B6fHe`>_SFBVqi4^CnWUuE6rA*nLemx zx`UCwFKi*940(sV#&&V)UTQ`8-4Rm<&udH<>AzK9gmow)*p%4Zm@_ zS`JK$Z`Wym>24t`26WyTwQHhrY*BtO-I`p7Fk@n1_9^uM>Q;$xU1u{L7Z)h5!3}Jp z=BtN`KRGyhU40{Emj-y&kAC7h#)Aos6NN@0OV$UGQ0eH^`&>M)q7KPGXZ`ajA7_-XTK4#6|NVch*t{kvAJL&t8SN&MiRo9xc&g%vp=e50Y zv$Fd^^7OPO5M*&LRsFfmJ$gHef0HYrcY4 z5c1l8e%7Wr!g(RLa;EUU8=LpIn8oZTsr!0HF6y!;#kzeJxWwq-Pf0H0h)C@ypB^5A{z zRcrAb9@=Y4pfsXXD`C=pOsHf#F&9qBXrGEff|N%ri>z z@`Ct6BUQI%%O7;5^HP+{u-91g&Ookfu2K%7vwGD2XsvI$#OqwaFJtY4n8T};9Dgep zEJ=cuSbIeVjU7MX57N%MUeClU1t|P7GOA({WUj7x>eB8!A%n#2Wj#FQm7r+;0PYS`qkK5$#V!O<@ZVCiJV6Ebndpd3c(91q(!M!L)x^$7Jf7 zozNHO`t4kx+2aniSf-R<`_dp;)65YS?CGm-+F<^>m>2glv049PgXFBtsRFf*Z!r15 zr)TgmgKHwCF2I!qs9W>HCD$gNu9J_36d=s>O0DS$zkags(HEY?Z;PwGmZE+|H{?@C zhjg?E`dg|4ZEp}1i6K$^IpRfe#r{!GD+DV*>?;}?al{0PL2$Ky9w|)?|t1@FpIDd_BCPY>23T1**;`Zex=IdOupTEtC=c{NZ;y-kir_ZCt+FD%$?-r#Z-$PC%Czheo9 zi89CU`o1!*EHwV~gQq{GL@4>actg$riod^vRNSxoN9bg@9o3WQ#Jvm+8A2S2{31$m z|CV3&a_XSWaN0l&szgY% zi!F0mz;O*Yk6S0N^++E(PW3Eq-iOCOB_f)HO1(1V&99BWD7M_z#6`_T%+hsIJ7-~|c@w245)RZ>t=eLVv0V}O4 zusxmrD;#Z1ZEycfR%OH*e4eiX3gk)8<2h&JGVDwsOG4)z_oYBwz)D^hPOQiD+(WeI zk@wY4A*2Ik;VdC*_I7!Y-G!6vWQ>FO=b-?wv5s8%J}u?8DBdSsnZ>h~PPuzTH*b_h zS!`Y9~j+IzIG!z4lad`CyFOa{hxR)+x<4$!&b>`z5(>=X7Zq#mBd|d~+&m zP#O#b#weCMzQMxuk0prx=*=k2B|xoVwLZ6|u@0NuF7;dqY1xwA>V@EfnxI`y86Jo* z%>Hsjr>twdzv5|v8z26`h5W&lDehb#S~{uk6yfo0DwAYSwnKL<6)HfT5ZJfGo(ias zw`Df?r;HaM(_6X7-pmQ|3RVog9RU4KDzHSwIVwiIoi6RryFz($(|!nT`nfTJ?GmD5 zG(DF9lMlO-@kEno&?e<#z;h#+u3HpGSCm8Ip302jbjrS5GEbKZ*ACaABDa~B%9Q5U z^LMZ*XdsGelMF2>w9|6z|5j(8jG)*1eohw7LnWBN^Q1?OsF?61ORtKC?!Lpb4Ct6h~NK zUMMnFZ1jxW6WWfJrtl&ej%QAf`kQXCPh3=)H*uzDe9E_473W9~d=%l0Z=JkHDht9z zv7W!psiX)Srf;g zAoZ&n-Q7{FcmrA=>+CvnXt90R?z`>H@_OWU?!o#s0pr5W04B4vz)YhIiNg#UbUZ63 z{Zg?)u(veFRab{R(@=2%7WB^J_=`qj4D+0Z9WfTc&z;QoOr5dzt-{?VKJ-Re?Z$!3 zl9mCai|HxYiuh_tH}zZK&~88lfgBL`@M9j&zR3cGV6?W+{UiO?qn2CM`=eYnM_bB= z@cy_TgqvB;#+LATuf<#ubfV0!dEtsb3HZGPN&uI|l&21y6K2hZeRULwA>08!#+1Tyn0+%WI<^v-DS3MsA9E|F6rT4X4XP!Mktu2%`2y;q1HjR z*-U>~V&2?WpX6$bu}z`ZW6nIX;ve+G0-@=v*QbXr%%`spOzTuO#a&}*{c3+_K3nZg z@Z}wmmhER}xdh9Pe!{C&?eS5DbyxXDMayoc5od@*#Bd zFW{wu4u(mYFq9a0;(p+;1M158b$bs}YzXfV5;R?*C+gx&4yi}P$_n8WDd7p-;yOg@BwEYh_RzQcD zp41eNqjpI>zxands_ZO#H0q*K>vz(tzDbVHZ9N|`bB$xzZ8#1QcVoF=DSAJ4%t>;o z-r2R~O0oZE?qRl4RY*VpVIOUkP(%}*+jFV{(w$U5qUOyO`;PQhSs+0c8A z`dt%f8d;BY-KHeX1I}ed9Wi)uyzq0cnhD!xru+ddzaS!A>w+$8wy~h?V&?a!-l8Ic zjd3&gbU~;C^K$E9nDpL=H5Utr9!GNal;Ad}w2lcL-yeI!AjebLNGC@gx$u=cKWw2fsL z?DU?nbjucmdwKv2Wuj@e=rDMIj!?ae4~4~Ao$V$s^sqt2y@jm#upu69s*{if4_7|y zQR;2s1^aBILbNBUMyheH7A%GbE zxki#xR&xJ|o+k1m`DDiB*dI~HhXz~0H?`x;X@O8}q6#WftfujvKhYB7FG2c6 z?T3b!w#-wL^lYncLQ_&*R_k1iy2zuakZxv;zYb-CHwvS?#-@Ic(r6*7L{curEqoGRERa=Hlah z&_9UUu73R+)o_b_24K(ZJ>ixdw2Z_HtJ#ey($*QBQ+(DkDh9*)XeWcL<|2U@w?a}r zbBnOJ<3BYLJ$FqW^sALF-cKF-_=bU#>1PMQ9s5(KVYB`~1}UuQOjUs)`7zsLMUZ9KFCkM=;jzO+$xRoVv)i$$b4!v1NGEaV7U03vPUBi!*Nr5LLW{D2PcSHm&N1903f=2l~<5`@>ECbiJ zYh}U>b~2x78r)p}AkS1Zd?oSzKn#y+dh*_sRS&b&agHE5)ii)n@T>M#ONvH^Uh969 zW4B+|rN!i^*cMr5htNPc2C>-ro@ zSYlp^3NPPyaO+LN%x%7gC>fE)@*#Y;{fkKkLr*M)egG|2jtZ5X-cr6i{LsbDNCx6DgVHZiFWGTUj*uw|y% zo>v+slf|P+jVzd!Bxlv2I%$hl>yr0ZL!EyRPuMRgw~qjmR+~hAs`;$Bw1W2`42mjN z(3 z(4GbROC@33Tg&n+zz__JeL;yQz6+BO?OiwiHTgs?`|?~D78=u9VAr8*m6LLAv%CgC z0f_!yiFcBbSkDo_R%|N|vvMqA$o;4U4MU}t+a%?EN7<D2wGabzFZ`EwU7b~J^K}`-d!m` zHe>QD+xb#0o+ReQi&%21pV?5bxQRN&9SonHgoybCufI!*!aSN5(lq2P=Tbm$(Bj(8 zKN0`wG;fT(?nuRrt#+ONLHF|XWvBb?n9e(7?>sY)NHc1FZ*{($H@w*s>2r77bKGX@ zN|`%v$`}22x^9-0Ov)^kDH-1v|40auwh;BMZZ`GT6!(a;mtXRLuyFL2RJDTM^Lv7x zufQ^FW32=0+yV)gJUJL2dI0lYw`yZ5bNR)j2a?oYZ`AmNj!K?vbUnFEWED=~9u>Ql z*!S^0w%&+|%yS79-kpl&Cs}NZ^>qN&r_z02^H#*K>y-8}oQR-aU+R{1X<~Zo{saJiYg@@Kfy2$X8WSK0$9$y2X|(9i_oUVoA9g zovciXxM0Dq@Wh1Ex1#X*`v~XH@I*xoMbyT|s{wL2tUE_F(>(#!dZ^QXPiJ%z9#fiY z_mYm}?xjE33slH(Ngf6t(YP{5Zwmu`I316dw;5|5`jwd&eX+*|b;O$#FMc)($P4!% zQ&Zu~kfZ$WzNMai<`cJ{)?x$(F%M|W*2u!l~R@4ia18r@(jw#%^43|p2M0ck9XiuPIyi@ZoyWxDpV~+@o zak|vpJr=iJYiqb0Anx?;HPlRw0ap9`@drE4+R4L)5$M@LS+38n6~#tZmrFncodN`M zr?&G8bb9yXGdY0f1K?2%*&FQEdaU#ZSw7mPXp=M101qqr5onC6Q6xA_}AubtkfztpIY$8NQd7Y?%_+*Pg1<|dqEpigsj*Sp+0i* zmiVp$;T*Zuy0+90|BH^AL6=eOGHEgnGJY~I!=X^+v!Sq?;nq)xf*Y}n;>6H(ppGU^5K05K!Y6D<_ZNaNHzJw?UBZTU;K0Hh;QV9P@I>S8u!hOZ@xzq2WL z@6&1tSK>W+@y&MxHo1l}LEGW!%+V3s8*c{APoiLrfh#_$^Q0G1!o78gz)z%l%C&XP z^_LWq=%YJx6yIVw#H3;DAtqC+>IrNrwW8k@&QyMcaUFAn9Di7mtH>x94wX3s;R@5^ zL2k(6HyNfwLre&Y(YJnGZ@hdYv zg6S4XPU-wEEqgc5-&^Om!tzgeYi}(M=WBd{5sK?^y4}``0So)~8@Fe zFkI4o`^fHTZ4E2i!NRVLorfO8J&ONbD$#Rg-93ZX>zJP+d^l zlzC7y2&b8I2->O8acf-x&_PMtc&@2bcI`Y13whhdK-iPg6G8Z48RauRl`bwCA@9QEiXEd9U)2hD|e%|J&ufH!BxNI~>IO z?N!|kyxaT0*!U$EOdk=N7#bKb+{fUEw%?KR>(dGMYNs>WK9gDe^<&;<@A?z*RFBbT z$y&SIqd7HZ8u6CJPY%tRv=+-TvaX{QNMi9s+L0<^LP7SW@vhPIR?3GEL6M43YhC@K zE}oB+uAJ&S?cn)Q?8QGlW}`I4f0Q|()Ai(Ihq5s``zJED3Kl7(jpX(=^o<6(UOe?c zLzFJrm|&s#rmdmLJLR*P)nkO8p~JpNJNjt(r=^PLFGz1pKjhAhw%93X^n-UDwxTqp zHhjft2(+Ixm$5RkmznoUmjPC!B$+je{`;L;3${yUjHk>F;rvmo+LTJi#kYtFL#w*T zhd=Uu1amYXH1enSKF9Md@%&XGz&e}ppp1a%XfPfGzcOMVfjFWlNSZ~a-M1wNnzOBx zKT-~c{UpNnTEwX9>Fhm)9({@@IKghQ-|>hm$}1hxbtNNn48P3dJ%(Ay-Nt?^Qz_7S zM5jc3#*0C*-h1IjqTVJ{cGJ7rJb@`QVC$4fUOJL$d?wh zMFqM4!>RSAbNUxwlLdhp`Q;IOJ?4ebKPPJbm#>Su34{o6-~XZd8g*RgYm&zCmW@ac ztb4)hDuDD~Mo$j^H;iHk6`<#euRz;06A)dy&pWREL(?^<*L4e=@*K}~g(qpN;s4Wy z49~3g)}eF{?*r*=)kJix!aLMoK4wIdEKed=`6fB zTb@#kg9TtpxH!|$|0YcHytRC|!&BYsWBKV4U7PkR??WzQ@54oKZUZFST@vbeU(fyt zbXWXB(kvXe?v={hC9z(OHyX9v_|;(ftKRz`VllV{;9&3FQ4NMEZ}9M+&t2>}*(Tiv zIP#YZ3O$nBSY+^$v2%~R&?%E$b;QvQE()`|4ESAte-Hmj=juSplI4PRN`6o(cn+^% zMb@hWmg3pFq}6%`ka&p z3Oz}N)JQyGav2z*a=QKJcL2%Aq-wQq)?!!t;tXK%vml%nk}Xp1_DrBND><(qw}*FD z`vhO~e!Oc`|K?wB1l|vu7PqGmHX2@e_d9q5z^}P22p#WigaI>m{VK5B)c)tl zhMMnkVJ<4~xy&(0g9CkAP*1q6p7aysEyR25<;)Vn#2sH8Z8SkG#L44>Zs|RcW`C6b z9PrFd+QM1ydHm1$A^3&xOn5djzGzyam<{TekU=mD>>6qIaHLs)`@)Qt+2IMt?5)Nt zhBC(o0JiBQzxzSK&gRmLARyuR- z%ZY#4L?}<`T&7;prGK5U##>9Z9kZfVDkLllfBQCs3i{p(YB1Whm-@ED zMvFu1Gy`uK$sm#Zn8CKYzfNax39UpK=s#^6E5 z`%AiF%2KotVoL1X#b&v711J?!I0E>&+KKN^pa<|yw<#Wbqc^+N5xGj~kscTVAOAY1 zYCxU+%b?4v-s-@Uycc3S@s_=}f#pxN^GGb&F>nQqvaOg2kQ~pdWxz&u zmXZP--}saGKAT5`yXnjq*sK99RxQ@h)73UV((B(h^LpHEg|K@mGp3K3K7$7%AM(Va zOGs1wT=!*rHMHmVyHmm3(gj9W+OS=A%06G|VhsM7i@yLyupx|JU?dqvFTIz(quDcq z+n1#mpV_cLlOL!^fY!o)^8cA-Yzci}Y6W7r?RVtP zp^BM@luJq76&5nUj5>^Qzc>pxpsRgen_I!Ei?>19JhX-X05Tc)aB=4kgelelgUiHQ-)5S}>I>VHjiUZ~ z{(j4=dbvE5t5+5UAC4)gYiTY-8>}*C2J(mjH%W~!7_uL9Hn}n*^0#89#=q`}-zOch z1HQ2(z|}eXretVeQ&KV^&37M{;`wTwz=odU`=1m=Hy7;0_9L$y4kD)B9^lFc+H_ zYYXty+9dwlyRKf2V+T0~mfm}l{l7k$7EQ;6NvTa9g*~*}V~juYxF9YFf-q zs8z0eY`GH`*8h>!^rhwZtZg`Rk`(jQ3#N^kxYgqy7N!HCbo&pOQbxa_j&G!LW$ z!7a9!1%9XR*rqh!IT$L`PX8GU!pzK)jUik?ey~lR-ZbV%uST}UvyqCalEVn%Q z{dLN`FSJMNHz4w34AKJC%q|F8#2q%hXAAP(pZ1cDx{Nh(J=ts>V0*_C`3KyLq)@a8 zyWv^rIbf!@TlN{xN`}kh8T(TciSb8VMWf05er*{eNx<61!OsuwdshBxI`%G- z6E>Cxuu6YExZi*Z&pj`!A@O(-tU`h`f@HTVjHVRwGEd{n@EFWMsKg&p-25(xM#+#q z#i_?X`ZQI-UTle1--Ja+RBh%vmDyHhRnwEc270OS2l8&Or1ULF#Kts)^T^h^4l4lm z)Ljnr28*LA;1qkLZqXcSXgNkhHhhMhh>}uQASA+m>VVMV^+GrkE_%9$eJfGv)nZkE)@q^;9XC#O>Ib-IVl!%dNXA z?}oOtPc~qdGxAm0#|BI(wK>W8iyy=KZ*lE)9P&B7+Ane7omg)Q11|RO)vZ#;BvS1@ zC7k;Z*TpJ^GQ{3?TWz|#F1wz2{pGwtmS(prbU8&>qTKFib-*D}yLXR@h=;BU7;G1Z zE~f1l%iz^fCAh3aR9cgPbR!j|AKq-V1ZXoB7zEz&mT8MGe@-ug2@p44G%?LicJ3&C zakiW9H6JL((TLaVc%E&i;B^157o*6iy~8KNSmETO0v_?^KiZd*zlOM zT%^vRAbe0f6Tr0K9+xa%g^v%Q;l9P^B-HJ%WYxicB`qNBirk zE6RE-F2B4jfi|JbvV0Vkxbx2Ngw3$EW`9be?hVkDojLCQ)LKN#7T8lfxIa!6AlkTI z&_tOy2*^ccdU;kF9^C&^Eb_0IRN*V*kFIZ;N6|f#R*<#w0RrL@<@4u`5sqC#TG?Pi zi*!Sh7q=m!9hJz z$0g3^UJ06Fh3eu5Sq->Z`_zoY6s8m@`a4pp2PegYX8{eCr3n;uLh86E%1ZlJxk;&+ zDZZ^)wh(ExCdCl-?bk~Yw9;u>%ZFzpcdd60N*ubphC7LeQut~5VOo?b(vx4Ts*XQI zSWXJ4EysTv~K(Kd90B7TH={@=VB<`{S0c;mh53n=mRg|!`i-;^qny0 z$$_lJoo_$WCpck@C-Qq6ujXZSw;&@M7QwW|l2q%y&wy(9{J>Cs{hcx6;O3@X*pTumaFyx*RSXC`KwMF?Fr^LgV^K15W z^We>a>pgRpKg#*!&ZrDYINE_0E-nTbRGl<_2dcDwpl0!P#Iyex9#NS`e*#STO4|d# zmwK#_Bv6QbpJ{j?Fnignl59MnFX1x z0u`&hx}F%yuM~(;D+@eLg+uM8{x#r;5a$-*y}cuIH0?KN^Q&TK|I{tx*wCV^%P%LD ze`b3OGP_-Jbo2B{Ak%a{u1+a`|46j7Zqv7<%OBF87Pzn0$vn>Gp}ReL+RZar9$J-{>iNqWnIo zB$Q!CFnvDn`=1WTQ6&6L$(tafm=(6>HD2bP3;F0uir{%*a+8*i*iU?G zD-JB8TRAWVb8|}?<$Ue0PnX{*eFs!LkWY{l`#zXNwpTX1aF8_3-&{i&y4<0BIn6I# z5nJXxQe^X<87xn(3*>8rh(dAa)i@h#ck;@#s=}*px8$0Y+M*os5fMbLvKve0ZHKHw zE|2Bv@y6n=O%`Ln=c3fR*Se0W?<<178Z%Wjw(xzQ5G z+;arnNKB>U!xtnfURSMUKE{PemCCN1)$})rc*Uixo;(&`ke2UvXx&$yl}-*<3_F%& zu|E#9%-gH!f6KL}oO~3foZjl0LMvXP4zg#O&?&zLj|0GhyBsBzx^Zu8?dv|6C@55D zUM?O@pWkSWwM?~=R{E}g=!u!BDa1jKcT@}qcg_>FW2oUCDYRnM>QzU$2;5t)`x&Fq zr4QSlWhBCcuaqbQHl|GH#o4z2+2zFr~5JRf)t6ZH*H4hEDEl7nuxcEenTGX zU%-Lham;nrK_)qffG;{S1?h;uXqWljKso?#>1=$0QqPF-LTC_lrRhCmOoeRBBQB+@ z?bo!PM~o|*&qy7w*?A?d_=X!{7IO@*Y5w+-;QiRCoO|+$YE|v zF+jRyQLaHd%zE@+pK;af0QT<>ulz^v`0mD^gH3Xhh+)7*K;WiEV#8%B;Mv3onX0;T zOHMVI=kcujZO4(&T2rNj^YAHL`X){PgMD)4Z>jy#9%uJvn`ZrV-EpSJS@x*{BQ}E} zUk-CU#@>{4ny*`&$_4H|pp)#VhaJb_29EUqiRt~K(a>UAZn-l6q8wgTqvz|NYZ6#RV&Npz%WVcCB*z4Wi_smQtG&k* zOl&T&p6ff0UJs-n_K@ip%>m-rnk3!|~KCo$n3@fN2%9x8P^3c1!?(;||mX4x=Y zcw&Ircn22%a}D>e^$nQ!X5-Y4_tcK{&yB%!VUKHedwC|YuauZ9@fpQe9{h%X+>hb5 zB+c$~>&pjs^!(~B2EHDsPd?t6&7bDpKHau|HRJMH6{i!jJ7YLeB z|HhX778f=bsYI-DD-{ijesE%e$%2Be-K5i%&e9x1&`|d-Bx)F7Z2J|FnyuQ+k`yCt zETcPNR-8H3y;BgejH^o%qmPh<707ZE!bJ7AxNikl#jq70-7%?#Z+Fdy7y$2%Hq= z$;B+!m;AWotI;}@I#|uvdG};=Lw;z|HDcf++ z?@lkOc1ZXB914`ySt?a6^|k1*f1L)SI5XtsuHNx`S)AYZz-)G_-H%BJ$9o$_5d9#! z46}SfIdN2gOk+XGiO%>{??e44&X1Z`;eO~eivWr_DmN0=>Z^!w?e0qtnqdlqbT>im=@ZYF z6nkooFt{7#?|$Q*-~6-a`Nr_I?z=WslBk=7)Z0LR7i&Xu$j?rO91e9Jwq|N$J9Ufg-Us65xov(oQnpYp;@L~@ zU)79!)E)LWw<(e6T#VEI@dUXwSgM65bp6H42*U7I3c?p-Y=TE-lqQY=r`TCc4OqDh zlATxmfFZ*L@D48jyaeCjVR@_>=t^*ywJ7~pc9dZHe}9LB@1AhR0t?;0le`3q!4G@a zs|5UC_9|aF07h@b31pc6dW*lGpZ)cBi2`kl{}uXmixl)K;@Uwp+J9TRD1G?ntv3Mr zjqdqCYvA%}2kcWbq&$u?3~Dg{9^QBq``$lC@s$C2dc3a=8cM3bi{pQz^!Te0PhRNA z{okfC84vO81r*-Yr3Q6e?)fYe>u!NeenP58uaf4r`&r9 z8NYNEPpki`uL#6C|M-8LdWmJ4MV~*Ns`9DZS;?Mpo$9x>(`;Y?LT2$hdya_&dkcT7 z{_B!_t zBPF34$IrT=yak*l%z)Z(Qe+Zzz-USb6k(vaOFW{H-KR};r&>;T)3EFd;9NgEbX z{yYo-&X`bOk#Mqww~+hib;zkS&WWMby~|s?H(@#MR`)^p`xY_&@(Yz*N+TBd-LK52 z>II+)kd4+f{0i*nRdUZ62}0g{F4`g_1d+W}@Us)Jc~Jx>l)Ug4o-n}oaM|GM&|mciI3|MW(P zTR?kBtHpi0JId+$^vxe>r34~3fER?N_Yfy04;YO+Xl}-PB|JX<0P+)^t8V)mzpBLp zi2?;GIlPxUN3EF-iElc&081FOwn7hpcp^ME-xfKm@3)5!@#9(xYkJQV!FQ!U8Tg{%<56AVX#fzCD3?Wg zFX;kL0rVjya;G?Jj*5kKRBfIwG%JqCRD3P0y>XYw4V@TCQMU~>2&M5lJ1+llx% zNXcz~f!^CCGXTm@rWBhCckiMyfDPjOXw=%)I;5mQ5KyBTAI-A-`Akw%AXFX5_HD&M zFx~bpYW>p_rsBD`QjNR75hr~BG+>aUQ?fiYW55?^V7o^;bsuRmoeVIk zh^3YA8_oedc`yG^&#vZ!MPOe~(Ei%^YZJAQ#>3lHOKBb3toYDNg%Nz{+%YlV0LG2S z|KGD9mL&c`dj&0G%`QP7S(>y zaEWui^*zgp`2cx}>tejb>3&4uz@Jj@CFb+Enk>7W^1~bJSMI*bUnIV1-gztX>oRk~ zkBe>7i@qRs`SGMRY>*|H0?m=TY};ek!!GR>T0i&+5Hg6muuqKJY4xe> z;v1j26m$vEt?FQAVXg%hKwOv%$1N}l@%~s*^N=Bc?&MR;Y2uOb)7taX^=#Y8D%C;F zcR?u>!Xt>NYkqjxF?dMPTSXSy*H9$XDEM~C+eKF0P1XbnAR@7Da(EuAab7!^oFdn# zZcZN!l@}QpaZ;Ftw;@xSo=4T4%=5*Evs#~)e@5oB8go=`ckTKKq1FcX|ftkvurSf1_{DONePx}1+i zBl9+y&$}1vz2Y-tJIp7*($ zT)0cN5axAaI<=h*GG=igDX@)$pqKN<(x}}fL)6ShuMbdaYZp3ueF9BhTIyn7#Ql-E zIPW9&Fv-a65s(B|Y>4+@`qkhoh!l@%5MOi)7@UZzq>@_tmLc!OxuPoI;PBbe-0vGl6Bz zft8>qf(dlDMyhj+{O4m6t;Q-!c#Xw;3Bt?kB>iRZ&{?+E9%<(e74n!gh)%B z90pCJR&uvK9=+wht$up6tI9V_L_|)tUU9mo5I^Xo|whO=!}@2sQ5X_iDn*!?#=X*8{Bi0b@YN2Gs8>15+ywssf)Rlnj)@~ z;`e2ocCdVkdZ6CA1EOPhOST?zFF3m_#Ak0KLdkj@$YU&If@Bdj=MBfW=qU9LH+lk; zOrcr8bxSRMCvzBc&35;=>xGhTaVv`}*>*PJ`+p?X=O~^ZW+sWtN=AsRjTBqtw|G0O zO_Zs5$D{-A5Auyf#$JH~^A;k(Hz&0>s36z^qwt=7mK1h2%qkCs@&(*_^BN4fBSh+J z?TF8v8&*R4di3r11`X*6t}Ch+be`6wB0ky2r>iM)Lxs zhIZQLQQMFC$3KnsUCdKb*rf})@q33(f{A42Gz09Z-*E7-ZYzX!w-$ZxKU`9#vW`ILD$RLz!`AvM4z{Ts4L8#Co^SKh}=NiHW ze}Oe+90i04H`n&2`JlAIW3PNy$18coG;TLd2 zxuWEBxr90Q!On|1TB3@bJ`7=DYdr>(n#YU{7alZQlf=~adQnr0R8rCPzWQlrzfj~1qENIF5 z&Fl&GjR`G<+u(>ZRi7ZBuPny%UNPWYIwW)9tA4I6aL=>a>;>IeT%GW~4UYhITCiu6 zbPRR2O0+5>H09Ku3fK%KRtGH^E2@DGOkD!2YI4|~%t(o@C*DU2?^G%9fd1cm$NsVY zWkF2Lb5HM*v05*cZ{^4Gx*q54-kxjep2-$F)=n$u%2vz=$0bLehWqSm9p6tfMbn9k zd`2N4a@J*5j7$MW0olnN&eaB0f%5Sb)L^~zsmUq*wW-;02%zHf)$ANkhNRBv# zM~qHEgR6!M5k#BhRa-J5P1kjp>b(4=bmu&^rtVGX%EP_AnZv2qHRoi4Xkx)inzE?4 z$1yhTSnvuJLxEQ)E9!kbE6N$WN*^g2Jo|oDRKrmEx=rS!rB37n-Y+SoFP-4PmT)rr zb?WKL*RcmB6J`&jqZtIVzR^9IlB|5Tgu52pE9kU*wFb4E#OCVIb-&q&FECpQ*O*Vr zx;Ps)zGMVz2*yw_ipq2+OK`tK`aZMU?BH3TO_YNguy%L)hJVhMy-i2dK!U7gA%&Ru zMN6N|K&gWx)30ETT>r4kG`GbIX6J3wVw8?LtFlRvva+(&?GDt=N@pt$B?$3e>fb-S zW&9t_a?ADJ5&uLCW%K%VDyy?f^Na~_ujNlK)7{QlArWL-rFi^f-ZMC~SDry-HuN<) zA^nsrN%hV^#Ec)Tacrr4qvUr|En6}ThN`O?88e|`I`?DK{|xeJ5pX<MhRI<2m5k zs(Qt2Ux#()SKkLdLn(d5jkGRH8jF)RGn*H0JHA`ly)F(zsx5swQam# z7{74QKUC(hp${;|f8(`a9#&T=jUcu^TKKu}k>XPdBX88?W z6nEY7E7>B4ZRW9Jm(Nb&W=#RR)brt7pOqKYFt*EYHvG!T*vKGL%Rj$wa^uPkMb~@cr1=p_~^n7ga;qi9h_k!vV(4oP~Tll0OWZbM%5P2eG&;@vl%4UJ8!8 zQ;p_#*pYPE@Kvkp{uQrPtqzueEaUsZ({5VBXzLn`6T77L6lR-Zx8PI5t!FtOeQg!O zg>7_|(_T;aUF;^|31YRY+YR7Q+exu_6|H!QW>Lpa<_W?}YL^Xx#igDfS6S3+$(*ag z#m#~YKLrYirC70xZG|L?>?8qig_smy3>(ZI7V6rg5&I;iK_Hbn_``6%9v8P(POnuO z%jc%hwQ=(Ri&yQt4ubEQBs8bgla%f;Nv6@qiG`&M%*a9IG(L2E_?iCYaTC$ztX)jE{5^dO8Q1- zZ0o}Cm~#616(sx985_u%AFNhGP4wfR?spdr%6eye*gF#2{9wzWugS(YT4Y6Mwil)l z>(CX8?xZirY;h4ifll!P=1*9|JwrCQ@?xpD$1YJ7Qoq=^kOsXkV`eDnO4a;4?=zT< zTtw|*W$5HVGVdNk0hAQ`YpKRdlZPA8bM8Co6Zhw~Sl1a-uSuumF?&9uXyPXaAMC=x z`*P5hHx;TYn&R{mp!`!w6n~bbp2&GDNjF)mFLCp6nu}kr@0*4*mumOzu3>@Kf1Y1+ z7q*+?0FR&M=EB~Z9^+-95GeU!i1OiJTO#CoQR z(&SdSvfOe3snJ4S$_kThOR7JvdSfAXejDFB@?7P5)1^_=9V{bjs6Y;=vkF5a-%O0$cyFgFZ!|_exlVHwc=z0!%4f1VaOhf zLf)MV`xks55EG*ETHywC9b{k1K%jP9j5422oKa@UzF6WO=g!WbNeTCm7ur`~vU!ps z71`|U*!JAl0iS;<5FOo$#g29*HM=RW#PX3)e+1-S&;0x+nGcVWgDy9J0$*6>F-;5b zi$Jb5(sc&0PZ_YyQJ5fuBWhfAqA2O~HS0=##YRsbN zBPtBZcvEM-(69wt|w`@OeUermVQ5Eu(^pmFJATS>|#$U7mK9t9fhPue=^+v zVe2cPqVBrARgjJWq+wv_PLUj9=n#+)k&*_bq!~(NC_!4f1p!4;DGBKmMnnPWl94WH z;XCN_y!YPkUY4%qQepma&ffbMdml-SWG)UuDn4CH_D)f^qAck2hXMEDIj@}sWszRd zC%qZ$qoP8jgwyTYC2e2AtyB0-c$&dku9f_|tA*;nAC1^yC+;o}I0`WJ+cH+*X-vaI zX=2#}9?d;D&nTq5^YF(YZFRu02>*wNUwJZAIo}sE%mj=0l)EVIv#>qiB_k@CElFUt zS?;IgvHSINTC+O_`t~^Re%-^Lw0W_y5^_&TS6B?9gE#xyLVd_==lR8ax0&HR#km5b z-Vgfye9Ay{V8(+#;c9zAUBQ3=IHEW1=?Y={^H3q`c4NFSOJ=QV(xiW^(fG#SLzSTtx}C95EWv50cv>FiD9V?os>-B5XWYh;=FNu|tWpxtuSLUx%a` zk=FQ)c^N!GUw>Z<6N5^@zH~>{RrSDn?eD!&rk+i{FJl-accVyBb+tQz9dbcli52^K zmb4(b?8}E=Un>u~P|=R24wKD)isGA@v+QuPeQQ$p&0BE}OfF==gX2kSS;W;bN4=e( z7Np(eo@Ij0iFVUR)GpK%F>a5$4`zsIuEpWT%hi+a^v=sf#!OL^t!@5Ht;cN|cv_qt zw}_|dJXW4f;4(!&mAfe_b{P{ogkr|oKm|mzp!m#2o!xJQ?IBSj86yqbV&4M4{5Etx z9L*l1G!RMWWc_60TMenXxC?#3^GOxjrML4kF4@w>(s80&i+V*`<+koQy$5^dhnbCy zYrCU;Z#$acjx68Xt+S%tn+L43c?msolt=r3*KYQd&aAn4;IVCkjI76iR3>PJ2 zryKC7%Wa{!-vx;or3^@*GBhphc4%%AS`nobK?{MsAD@yMJXRjA;C*>@JLz`jt)Hj% z^9xcjo(6E(KrQ|2}Q zeStKBR20a;!G*N0TC~SPCw{uvqZH)8V3wr*m|26n@{eHv(Fm@gL3_ngZvtzz*V^4_ zZJMu7uM_T5y5@C7Qx7DvYZ_!pg2s!K&@1l1S3EtN31-{B?)3nf24qN$qx*M0hwXhz z7gY^Qr{uk>w)X9)pb@cfzhOx80+++|AFm8m?mHZMjwn(F6!Hr#8daY5x z+OHr8X1Jd8&MOgN$DaQ_eS=GStsB@RJ>fGqBc+qW>CVDAvgk!tD7+o7^zw7r5L?SY9rhr;i7abq*I7mb7A^MO1(mhZBC>{odA z(ZcTL*o>XLocqj}D{EwhB^A6$jq@Q&C7I&B*pm4Xi_LY5eTuX*2-3OFih&$jX?bJT z|HnhNAFs5elU;JVMq(}lfRMpe>^7V&T5_?)D1>~3}u|2pA;f#XJqkikFEf`EJaAeLNOLqspOx~8oA9c6Tdz4 zcoJVx5nB<1Kr3*0pi@R?6D8>XdD3K*|5+orAzk8RLQiq8Ve7~4J;Q|3D9y?v?4;5_ z6~0y#DePOxj4cUyD1oE6?S{tRn5bD1*MIFH`--c0R>3VlfO@ENht0oRG14oNTfRpn zd;7=L)o>s3(*?7|HTK0-6jz5Bnd~z2=(Al1S08ivynNYY_2z7Q@_F-3nf)YFYUkzl zu_^DNQ2Fb4(veyu)O0^~VgJ{15VpcqVz!g|H%)Xz68w!;>FA`&kD8G}Viv<3{{~E= z;7;QF9?{5OA7%#mu4drF|6N`*DmK_H=p=#Xg=0n({)2-;6v+Rih?rhHhkVY!41+`% zn*o6*Bd>A)Sjv8>{>k+4ARjFKfBuj%^h*|<9}sS-2ek&~e%kIjQ#`a9ca!pNM#6tg zTc@~v`X6cLnjS`B34bWV>>05cm*L%<1cK;T^#jLKcANFPefL^&u>ER#*phjh?Pr(z z64mYx&yD-T2l|rOUwArxk*Nar5WgXg(9s)i-e`zO??3B*!7C+JpANn%%vu5_wveL# zeAOJ;UIlA;*Jd!?=vmx-0mHiiFvApR>TWLd1z*yE8fFQMvp6HcFCXR7THo<#s(>vl z^<`_?4W+@B2U4RU{v(Cj?8^f$zWfR!q&$0$XJbcILY0p8I6w1i@Y%`<0A~A39;me{ znp*J0%=PlmmtRz^e0iW6*v4MzrQq1*yFl;=N|qyZejcl`c`j@UWi}ZhdYn_|cy7O3 zo(Rp;uU2||3?|AJ+73`9^4JoX4PR+697u7$I1ennU-XP5WBQz1pH1ImO$e1|z@4P( zv;xmTl=+QEnN4SuF)4e;#2OnIEl=tisrA#pj z0gju-=OEP=0jMP9U}sjE$X;kTK*e*-@U_7m_*016Gb(OAaEL=fVpp{002P0sW#|cc z7EEn-sqgKnxbt@<_vJy@PnlDe)dyma3{r2sHBsNVFZL^o;~=dWPZZQdG4^f$tc)0x zf;=Alr#?mb3muIZ<6~6sA}R+_L#oz`Etrp+`OZkOK}2kwPT=5(`VI>!$F=o^3NgLL zg3^|Hb)h=jXa6mYj&NcY6!aTx&a@e6NWvt=c6zvx^ucGVA1Fgh9i%gxQdF9Dt@i%p7|wdkm( zkw09WP;6=P(%V#zF!k!WEH-s-u1;Lr9*4CXPD9Y|jL|nHMqq>_d!6fS zO2F~%s+Jk*;bT5qirp9dkM2?;dvR|Dp9eH}|H>euzhw|k!pK6wsU7cs*b>O18lOH< z^S__DoF}g$4nD~z9$JwIweT{@!u8SHdbSg#cnQS|BT0$YCs*;)s|EQ?3G?lDSI9-& zO0oT7@d-34Y_YG~@0*-cpzX6DAf%$A{i(X)Ng!8ASr{rGLWen_qfOWgSR2w zEe8l}{{~;YMcf7E&qo{>0TTq-Kr=DKlgA+IDQVE#mwd>&zxBU2Q zeb5Bzd`p_)r~k%9{LqhT-7%abe%?<*i`J8$>)9SxAar)B-mt%$yxBME_Y6g3Oq-C& zY4cGJzdxKK%0G8+%KDeFqW~%dGqF;>#CjI0pI_=5(rWVl@XKPE`w|j%h7-iWYxtN z>bx+0s>hxb@>Tb4yOKIRr{M8$f+6yt--^Pf3lPBt!oyTJ|m@Kb5e~YJ&|u4kd!BqH~@jXTp4*aE|BC5oHnVqOq%Den?0# z#PgnjNo~xJ)4n9>I%ssH;wFjx&1RQ3co>f)aBm5k^9bejN5c4 zolJzs`~})$zWus!olADv{r5cgYmvVm2AZ`7HOr#@DRYKZKjOoe?VOTczZnj@U9(vg ze`b!*X&xe%+Dk)eOS8d3jWl#$m4rcwLaqxk%$`Z`)j)-NH&XjW-L!M~qRQw~B^xG|zLGG*Z7`|q^ zopBR?mQJz)fjI^mmTh+ot%%(qjaZY_@k@4*OewF|o8sQ<_h`i)CiC5^WS&7DFh2pw zP%@xT&Zxrt>+ip5JtyJ`Ia0)CknQ+8amv$X4$U?wMUi~nPNJ}hwtAfJLe*TsGQ0jF zG_mxKc;CGmuY2S_-155y`SR1ivQBU_Zt|^KIn7n6b)Mt^M-9~&l$#p!+$}3Hhu_)Z z0a`#lr*;W|8 z6>K}$oPOgslY_&e10IGgAmL6jO+I)#J5JSC$pjn;1;iEay+%Q?iDf*g`0wA~-(u*5 zVnbrn;r`xD6v*D+;(og}l-2br!B(U!q)_ek(5lw3sy~(1P8oI<06%sIp3%hlxWggG zdn*F~(!Q^Gp!*Q~t(DVo4t%w5!F^Ln<#T~@5y-eFK^x!SCvx3kk@P<(6HtvX;@{^p zt=Bz`EqP#t)fBw&2Hk;0DH(0bMURNB8(-w#t<3hGYvXIYW^N-Cf_B@2x|$w9jUV4;pNJgELFXTk~}e zn^O%3{(ll!Rpehl1g<6KNLdR7{aC{ZnCEKOS)eKHml{>%v;@;tfcmoOV;YP|hoZ^# zjP^L{Zn-J#{4#kuT2asbd++S69K~^MKekfus2E3`@4crA;m$JaS4gE#54TbQ;9Qdm zwrzFrtw#(#UWgSf4+Jav^X`*t0Lr}zn5edmMq*zj^<28^AwkMie)!{4=KLe&SqjjkGIO>`IR`kNJD_Vv~Ui7+q;#oeN%ed8&*ho_GsXa6d4T^U@v3y+S4r5tG0n zO`WWBT?C64%|cis_1CZza8xTA zhlsMAo+MZLQsu80`@TSsT3tclED#SQ&|XvZL_y^%javd5o>AiwY<}qTz}u1(&*6xK zMBaGfLufAjaVL^hW-cC^-jxzJ|G`pYRJrP>ny29K^+*c8db>j@j~|1xgWZ(03HWe4 zVXfg+PQ;K=$(79 zMK(*i+kGTjo_?Ag2(;NJL03r0Tl7)fpL2mZ%BSxcC9e&jo=(h^#;?feZBJRsVKcQy zKM5q0JeqkBV8Q*xPraE4;`d5Bn+~>#R*96>-dEUWF(R8$yF-?a4*jT2Ka%Q82oJz{ zhc&igw@~n#%qHu>k57OI^9ueR9+X+@4)iDTm8;^`bh#l|k9*z!l&~u6{}Oi8NQ?}` zD*%^wpOTHm_R0<)NPZd|Iyq%n#5lA>b0uQ~Pp`%j`uozkbThkKT*1Don#JM7;4j>%@kBU-DpM@71n{Xi6!wl2gmP25Qy7FJk|D)o zQ;GtTS?MvR${2B&TM#x`i^)DL68)qybd1yrcake&%gl4=H{a1S8B^YzSW{dC!GH@K zDt9Le4qi1|3Gm3jZz;9_8V9L+q#Q#8UYsh$0_nyEugn*Y^~Fxd0}qxo3S@~m^FH%k zKSKDsmw)RqvJd~zS?Dk*&P`9A^9Mp*t)0SQA=~jVMV8JRuHz~+S1&dfY3C4v_jHO? z+I25y>^H_VW=2R*2k()T+)L{?MUSlkeFqP0~zHgVy27+Qf|JW;@=;hjcs$Z}gDCss#Mm zs@xjUQ?7`%=dR6;dt|ICN`ntN=EARL$xS^-3E^Ypch<<35YHA2m5N=SeeAk@PJ7EK zjpV^^g&ATTOZi|exY;=os|#cn1x@wAZ428XU$`<85MZ>^v=dkv8H)}*`Y4M>A+X;6 zNlK-J4L?#6w}A9iA`Uv|uRS}@_^nrzkW_AcKsY%{Xjf$J47hy`==S-XgJNO zeowFbjaSVj;t0aAHs0Uap+O)0*jYTkoTF-Yo(T~xVOudN2@b`L-)7QmNbXxv{xH(x z&bU7x&@uy+$x0fg(_!f^W@616koiNEupS8g4T5=uaGCv6j^Ca_XeCcSs-xm`Q!3vk z3Crtb;RY?u7q_ z=;Cb@)R= z+Gmt8nDYwn?f2Tv-VfgrL-5V&r}9b4wtJ~?>`IJt@+AC~ZdiH#$rcz8O$kqTN#UWl zP{gSe*LJ#m;;HqI#2Z1OO$Nix3MGk_y0(V@fyLk|jZBT)g`Fr`+37JB_csAm$%g$tw15U3ASDqhJHeCD!L*eFZ^;)ho{6 zqGIf6J7ElDoAP*9dnis&D}j29M)0hatTNv4rg- zpa(mgkus$Ff|1HgoAOEsW`&#AlqgbTXcg~Wdu7fUKv=<$$jjO*l-50obG4VAymBE> z389C0i8&jeUA~HNX!GciUWvdGWG8PxhK?(y5nQ9#P-r1mVv8*{C4aT>UJ;n(8Oj!A zX7cZy=M5{PcRq!pbWssNinQq@2CwxmIx=Si-V+@_VkVKZP}) zirC#8hSvDHhH&i9y?weeI6&ohjjYMOmuzWxa>Z7`f6q?>6H3Y;k;hn1CjK93(Kn&9 z1+AZlLd8yU7;|jBkoj_`ZXUOj@wFz)|NeNj+<@>e5B%(RoP)2{lj4I2*}1G=8S(53 zp|w+QJ)d=UgkwD(oUKiDcGN3=_TD42Ie_qHeuTp7ErXtLOC_fNb`yZ6OYd`pkoKthAj#+AEXl@G;^0BB23h_?r-kpZ;H%}Yw7u*Z@myA) z@DOv)w_m2Nd&#~J={5j-+-=i-Cus^!t@xi`UiIaN;(9$?u4Sr=f;`;bww#N(x4=6i zRALv{@1_Hs4R*`4LV2xh$J=06k|BuQ8zbTC`m$Yr{PJ&cfgQ~@yC$Co_xNPeI+X!}V)ZZanqYNo2ZHhlYf z&7{tSU9#Ff2^~M^zSvFt3u9^0L$XnXeE+bql>#Z$UMErhqIhbm!9)H2u$X?uXsNyi zKuZP=4`<8Y8oa%)ytazUbT^;WNNwNaax$5gdS8S%cGv6K``%^0}S){8pg{4zd!_k?8nyU*`2 z^xN~vp@E}7qxMv#ySWWOeR`)@$3ljTWs(yBXC&+8zp{_pbf5bebP0?b>lddf7#P^} zUuoTO4S&4Yt&#uqx~JPl_DftH`pyiPBF?~_VPQNtz>NvN*1r8jc2Z%#^vYSb9Z1mt z&cd&uoc^_CjZnp@{GH63E=zt)EMU;(i$zZDUf{3$s_)P{*9K@}Eq?PRwPE$&I}Gi6 z5r?J}mf*a$vML7n&iG}9Su~c%z+xu;5oTtw%T!5gTmm=6*6zwN<#TpRA_EY05bxdP zPcQof*G9|v0pB!wcu8?iHMsZJS6MFuMwJJ{oaXs+N?ozSArGh@Knd9{ zlFB7_M$II3MN{?l>2n%lU`%n+E`0!||z}Lk6L3lSC+<$DZ2P-yu z|16j{9xbjamQ|NKlkdu-`}(F2%wT(GjtV7)-c*|jSjhM-+%5K;5u_-Nsn8xJ@rl5FbV9q*|(qg@hp=!rxK?AM@ z5S&r&%e$1c5^i|}5-1PYyCVuD)nKk5n5&s=_~veZXB5R!?`PJGwTLNMwx=p(ZEx&1 zrzAz3zu&x_))|Dd3Eb^7o$f}qx27R|w&xTQmpTp&J1wO{1Ipj(wmr>}GD``KAn6;g zvi2l6&J9Ac(cdZ)&*#kfUt-BM4NMfo#pJ-?SZ%VqiwgejTIgTAzryurl(usU+36$oizUnZD`KCZkBlR4dDwwLPmJFmH6$z7Q~8Dd z7|tyATAg|OX0*b{2=^BjE>V06f5uvn%Y`1hX75s8lEF2uSLi+y~@5jH83S`H#{Ud5)zjJz8_qoPFNiWr)oq$7ExGx(;Y!G)+>~!Kz&RAgG z=33BVTmbj9k6D5Xl->(t=Zk-*#%&&P*%}PIP-36bgcVPIt#K~*zeuWRInf|tkYIlQ z@M|J2DHJ0MT8fjvy1w{v!fg)-Z+9@^m-8U_XgmL%!)F9=5mgMlz5hPZ@yn~9{;FVx zCrByjCqZBYu--d|JG7#9F#%vyP~(u0Is4g=d$7la+?znqzAx2c8GwF4vGYqmdI)?UX*`0DeN9U=PpFAy4n zaQ@rk=IF(j9bk(5GML#p65E>z>>8R2ol(oHU*A+)cHpSz$oQc!m*y%z@aez4Dzq9D zDB%MNI~JPBXIve5brZBUF@so`YFuOY)4e6&xDd1poIr!lkL^LOD!g=*r2>nT;G=J4 z2@I0%YJkh}%(iUOsLyqsZe#~8EMEcXz>{}TFaDY<@UQ&i9t%hBZSS-e{YufS-j1&D z^y`kA+}-)6S$#2ZI^x(v`F;rcsP<<;vc*oAfw`9oaa(cMkLb@-NGKf123%nV`OCon z1{h}G;Nk`i(dEc3r>XioKy)i&q?E9H1+=zCB2Nb}dHJp-xQE$`bDv+>PeFhju(&ue z0@_%M0I+1;3uEHM1{#27BFF95E2>NRu2`KpF|?wub!})W$T|0?n*8<}{E91;5_SeNh$BlFajFNDV%`JCiy4<|9z&Ip_t|ie6Z<4A0aKfQ`%BzdD4Yif3n?;wyK28yzkWRpujE$+wm^3EL^iz| zyW3(YhNi$gwFDL<$v0M!qT88wIc{eZPNoQ$@qilgawv4^$}pH`;MokG_`lmq$O@>f ze|&(N7{|)~8PKq$!lU88WY&1frC49IKmTpbvw!7xKX}2mpnQ1< z8~{l@aZGEs%9EO;T_zNI-Ups~6K}L9_0UV*lxp~tDZaJ?w9Mp7hW!>cgZr*&Ymk{T z+isc!7X{$T^_gZ#J`0&&|4fEF+BvA3nf&*f)M)-88f#HGDr>`<%P%a{z8cyW_V_JoGPm+o9Bg z=4I-`_#HPFNFp}^TxMpH{;V!+od4P|w6!Etje;Lsg9QECoo7>L2d0^r`sOF)dh^{T z*Nj(ctv|R1R7_%}181TJ5Ux5>iCDLNGteF@LyVGOx?4D9qHmUM@TnybO&meyI?KJ- z3tl1(J_0TN|0^Vl$tE>TCoZtDSEhQ!cgT`%f8S zgcg6wah1G(wJQj6L6j(OYx)Cqiw#W(Zfgx7A31j~^_~twPT(E0BDIWaIkf_x3oE`0 z;))pCE^ugr(uL~hWL-rQ=&gGQ1Q|d}@hRy9m$QVcaQVy zSm|D||09|`0H_RzW}=q}&2nA`Sd3u!#~@2CgXEUcd4|qcB+G%HPiSJ*Ub%9yudbwE z@aI{_-)II^_`GK8Q*lz!h2>9~MqQ~!*GX@IX8Bs+_7n|xPNuJB5I6q!?&hrj`-kxE zZ$lGs@2mg=DB1k|CMh6kFgPu&erUZx9`|lsB19QHooqS@ue`w^_k~=Rs z$s489geyTMTMfX(M6-WgiXt46;~V6DDNy2&LivD)ZY0nFw+GPI?_z*wRRcJ8-|@Mo z@EI5UTJqTX`X)7*>ka}80xaoUZ-&(k0Y!-A`%aRMY*cSt=h~C2ST|kCoqN1x<3Q{k zxSY?cp2C-&%wx#2AUf~ivBfwV?ac++`H)xqW<8R1CQRukfm}(u)9}Z6x3lneF{WU~!-(@oB0tdYk_f(6^UdA223kj$ zmvIKYmcj1VDY1 z;boa|%|kdhmcrXdW97SGVE=77PIsQSW*_bzUe>tpoG0(jV*P?K>4U9jD5IGp)9~%9 zpKF6u^;?jLk+A@tuHO2?l$bO8jTM(Q6*(2~ZieeVja*!-T8v?GudT^FJdr0u`hJwZ znFjpL0<8PYG!pr^30Giv6>PXriAV~d*pgbX^4ww$%90B zIQT}mWW)XMg8uI3oJx!|Ql2F_(e77Cb7p^U`kYiQ(Ew5Gnbd61sq+!toyXWZbitKO zR%Bzxpc^`@g3`Frv-GSd_$&gsc4g(H_2Tg2bAHfheFWAQ{bGa#0Fg=%DE;ozuWQM;aN<=5MA+9Gh}VszhtKyVRNKLdhCXi@|JZ4q`!dnjpP@sk z2@#|P#76{h6en5Z60xP0?;9|PAtJH{oFQd)_wD^6mg_TY37_&-Ks=Q}lxzp0=dWVG zB%u$$?yQ(frqQ&v!u)O!p9PO=sWXabNawd{I?0K%QWn^d7?EXA+pk2qaeN~aS>~OK ze?m`6D^5XWc?YEQ(@(!3$nZJ}h>Ehbdtf=SU!1&RER(zqD{3&c1eFu?`{ej{44yFS z7Adn6OsyHrXyVZzvvRl$^xe^%4^TP#KS$I~-Z`@M?wu^1y!$M&Wev*Yn#(d7Kl+Gm z-|ZZr-A4$^!zW~n`M6}PTwH3o;=c0p=~%*@QA}F1+VwA7pW5JFi?2Y7+7B^MN;D~! zUU6lVF*PlrLd41Chi&upvw0GHwmRNjo;L}K-oxw=Q?SmGTSaCbFy6t9qjSy2eT*ka zGpoykDB_~XCxqzsIxq36k<}_oP|X=Dp33=d%PUSbO(qP7)+%G>MR%@)Zy22C-H#sy zZ}6=6oa#=F&qRwCOH4FG;5$ zdoD9g#(U$Cr^=gDsz7%~Jl~#y$@I2)L=5nTx+w_I#ddtT?i;@|6ML_{%zy+%v3nq- znEZ$u8xKW>$cET6i{wW{6oH~{b^Q+8lc4)dTE@Orb0L>bDKpjII|f!9ygp@e`759! zjIKas*NWP%`@QfURgTmW)3wx>J<_Tqq`r}Nhms;8qMek~JUGefEi9Y`K#P;eqw98h21B*M#GLB14+G7*>vs1gsP7!hTPw28Fl?dL^b1CC$ zrDlm`s-4^{Wi$JJGY7ZWbfnaS^EYP&sM&*_2Uo5lp)w=KzSorPh+_2FbPhTj=ZF;a zUU@olUpm+LyP_$R$h)HDs)h${t?E`Gu5;gGZuR3zhkpfiTntLt^ac{o(Td;~*w>GS z(%IA#OAhf_NS;0sk0h9>aS{ITq5_S@suF`<>Pt=)$X@XgmAKbMdYFgUwZo=!U!DtW zmyLwENQ5mv7RhvGkngzM@X!LX<{LaI>=zw4y8{ zC&6a{JoBtc{|ry1B!Dn5qA$dK`R2ts&&zZ01ZSSoM&&h-$dp2!KwdZq+8ym4l)w^h zJ|$YdL;9VpDmt)U1;t@^up4HBzW8NvQMB^ln|L0HHYNl#g_LqBYqK8G3fE9s-8h7f z#f_1zET1i{?|e%5YvkCYfFMXW$0gs0CtlmY)o_^CqiYWvPhi(9F(}oW*kjf;du>$l zV{DuXkjPD*U;>N4msi@)$C(tk->k^U@PQ1ZPu_f3?lkr8^PcW|W8lOKW-lNN-RH}P zWhl9C=Y?GQnp;oP(=Gql+gJn$;B2ZK7X)9PE?SBNpP%7v(OL9-esPXQMF_Y`P>V+U5sH!|3MWPPnq}@uxYskl%X&1!y?a7? zn0&v?eFY^^v#ASfd4h5MS=h&&2Wr#3_?^wz0WK}4?t!NCzY5`IEcs20xmEZNl@CO5%F8U6>?HM0_(f7tA z?!j^e-D5V5H;KBkT5{^*pIdKHd5y@4j0(!$ggG z=C`*+CSwA60O<75WGM{vrL%r0-}+t@jf9m(E=i`yAiN%q>219P47vJ;TIZsBpIOM- zNoJJzGsKfv!U#eBdj3^9>K9Pmzk;KD-w%R#@Uwwtyhf*3o3Y3`f<&)GSAjC9gkJJ_ z`|3ACx|<~x^AA2#whu1E{)yUz6v%6YIeyzEj-VT!LoaslQ8#@m(TOccO>txzw*M$D zAUxWX?Izf4%BYLn;3~Buy{262WL(67pZaJlc2tds#t=g_32{EyI5hC6;zE<7+Td>Am3e5%@XPu;;;P ztuk0@T3XPkoyvE|6qpCfsh_QA0zdpsYFz^mRJ8`EK6%mIRZ2gc2~=(N-!3$+e-Ls> zAB1I#&mI-;uZ8SVfL5@P;4=vi|!E`~JxhGe54@_JyMWwzWMroUqeMh|t7qe`~ zLWcyF-A!rNH8B>V&aNTz^<_lcHpoFXzyM87o@jh%)?gKeoGsMMyo-RZ6_6t#o_G~3A@lPc z5k-m-2aUwSVQewLN0?k?-QA1YSzP`SM))4aof>?qrlHQrg|)K^P{l~OnF*y!T3}&N zb0eKySEw)e;f0kTq{UG4-&a!R85+)O@qU}p7_?KMED|&&Ax18-*p?*dYW|C={bjM@ zsrUUHzr9W!LYe#s?RLa8@Ti%t7Th6cFxlC)U-7V3*dg;71{osAud+R$psK|t?IHC9D@!>{wk!59U zyXqyq;VLY%S(FX6hD)DAw;2JUY5p(EA!LP^W3wiq_D#D#?H_o5*xlgZrZ8yaBELZ) zYgpmJNSxpP@LNfKj+k#(ed=|L28pArcX zbwibj%~}r&#ms)0Ci`v;fSo%9|B4(Pk@z97ee9ytb;?JYEmYI&Y{6ud{*b#jX+7R% z=oOQwr~WnpeIkVh>KFMYWty2%@6D&ai#?LTvLe($Lk$oIU5MdWGw--PJ4rn>;o~%kG%D%(n2;i#zF((j(r3 zW4mDLvS;!g9hd#9uzhBY1h#aDkjyj4GYATT1Ws6rgc#a{h%D)WRKZlhslC2;BT+Jm zhyiV}hn+y}0LWKB&?=PPegC@Wb?=YcnWJwUfXH}X9Pw$&@6$rubrgDU%R(uIicAu4 z8(|S|GL=<+*Y%EevVeopD{c}k`u)dH5Q%>^;U%YpN8}9$IkjiRS+L8Z6m0EM=JuGo z*-}2wq-Z^+rGmns{U0gpfW24my~c86fH=)Hyc)yjU7Y~OkF+VT)w+~KV5 z?DWTq`{|K;gPYY$)22hghNF$vrKc;uGJ}6JwCD`xxq_aH{QFKJPoy7?ay0<`_9$az zQ8{%b4s^%9klLt@^G)xCV$|6V@Usni*g6^o&E1RT4>ZdJb9z9f-wErI? zvoP!dqOSVITMj=upX5P50tXsu1a6HbAPNitk-;tY=-c)qr|7|#xYqE6=W?I162hG$ zIf>F}C0JiEPgSmekULGV=Jcy(J6Sd3*y1L%&ZO|>>aj4+3jN)*wqd3N7)m3KQ-7w@ zwUecsz~(h7@1VVPBa71U?0a!=&o<6@?q_E3B&b0Il`wm+kgvRVKfa z^Ne{-9mI!`7QwZts<6LiO<;i6!pmZSeCE#YE)MWde3DxRB!)_ zexld+$9>W(D4SeA(-C4g&+PBDs!fkyrxAeuw{7@6m*CWTke$_hC@A^+Yuw1gfg%S& zIFV8kn|gs?c>t}5P2|#0w#h7$Y`{HmKH|%4BS0;(9B>X+0k&@>UlI2hoVig5IHC+f z!f)kfykI}Ppc8x8Td1D2w6j==Oj>&eVQ&w4I9ARN1b{CJVsjy18oeGdG9*2Ut_JKp zFEQQCctBLVDY=HCn0G`>2uwwhymy+Y-UZyR^6R^Ac`kc5(ER-#`O2uG+du^Yf=cl+ zx%;w=^(~hvF5pE-0lzg~syr_Q8`B*qnbSC)-;=u}afxV{!BpnZaxmXO6f~?GzjH_+ zg38>3TVU!gd(HFjn$qW2F5zIg=7R|k66N%+8Nh_HdIH+s)k^h>_UU**+Y9h{e?F}Q zL6j>J8)=sP?gO~e-MwMU1?C#^gUxA^Th8ALbBV_y-InCXJES8U`AurI#$fxp zB)ObVb->l{dt8(8Gd)e@YXvj3s~?RCG@EZG0rF~%l)-IdG`dp2w!=FFT;>qDPSd7eZP>4M7*2j*UA{ z-_0P^Gn^YsDt!0eO}XDGSVM>E>NolBY!`7}cIso};=UOVsZ5l3Y{jit7zrv(6}UYl zsM@BF1xzD}2Y5#VP(f_A{mDE}&~h-P${-+<0D_Z)RxYS1C3wtqP`G~?G;AGsG2kIx< zex`(OF70KIJCIirRP$I|TXN@%a=_jrfD8b&fB^=<)&`LQ=nh7I%Ly$4se7{aObe4A z16saHFbV?no3tqU7;lArF0;mWo6!%JQPA&G_;=16AbNFRyba}R$fp_qEx5B!;-E!K zfN{{p>Fgu_tL?PEtfdi{0@%a1p#RAL(DX$Gl+IbKsw9-jR~`dHm(@u+%=2-J zeAmCOCsvMsg;Jlf@rb^)do z#Ly|w$tXV>sfB6lzN6k$veii_E@qjG#s7?N2CwbfG`d)SB9E75QF zgAjEsXY-sB-oK@f7c!ZaN5@DDy@(KXUtvL z>;gC&g?MFh8GME38AGoq(Xwl%7(Bing0scLxsU#_9$H7aQWOhHy)Vvqa3G2uKSwK` z&bNiSEfE)(g5G9BEyUn_jT^IF{8q%Hr6aH|e>UJrdOW3WXUKOU@sU;HS^X(1c%V9} zaKjV5=^F?;V3hIIon^g0PrHOTzDD-1?j4i%Us{>4ZCcz_ZCw2CVS8B*QLJq@B6#&{`maS<3pV1dA-l~ z`*j@0^RUCO{fLJcwx4ZmZ84-^-bRW+d||W8OEs3aTa(XbH^Oe*79lx;M*bWey*NBm z!0t_I8h%jTRP84m$_f+2edZ9maz9V9{ElSFkFCGu7(i-bhxPcolP^TN{_cqs)&9HXuIF4q53={^NNjzBV;EX{?(_ zH+iPOfzZ~aN#5YmIS3T|fnhys`^%IQ8tMbSl2hd317< zyWG#N2bjoll{1&u=1>B}EcmBS*%A#9jm&biwfl>r(rk$(-8Q?-hZcvOM_(d;l>1X> zM=V;Ddf=;kdA&nsq>5#NxFI_bE2q8ES1ZSbm>qe<(4;A6wI$J*5CWH3N9IsGrW1N+(ItqlP!w|#1I!Sz>W44wvjlXC*; z^Z9h^s=HD<-fq0LBqNd8Wj5D$40ZcTf0y%WhxxbPqclX6RJ)(Cp|8n9-k>?09G_tB z!^>+R;FRexs$)inD8CEYt!4_8QW`<@entOGsGesI5f)W*Y9>4$^5+grC*=3M9 z{BYL$I1?KK^~bYc8>^_5N}{&&w=OTmRAFAmfNZ!Zd$g8Rop{#n^s9;&t9<2lh{TES zu8GW?kj+6*B;nfyAlb?jmF3$+Rq{iEaM^rj#Eu}*^^pHZ0d5ZC&;=Ax#B;O8vDYE4 z;7s9uW6M{_$9Sy`foH&4L(Hg%5H6&wA*?yQ%33?y_~oY3f};4T=Sh1Z4D^1D#I8Pw zPPsNYGjyLlqcGpy!XQK$F2EqR$w+1*4JSX>T6B1R`?6NTOcg;#0RDoE=FenjxKe(U zoQ@FzQ_Z@~-cFH;Yu@tr$J{&aq~CY`980McZulQK{y9E^aK!1Iqkrg)|2Xeqx8R#1 ziCfIXbi^Wk{M+?tAZ&dy0dKwa#X8Gu?YoKqC1;IhjWV}Zjj%rqCdsv?M9EZ`GvhyG zpPAy7j4YT{<*}2x$gw)6KEEt^r z@%d*oGOsxUZ7);T)VnsHl@oP|b%|>fbTVZQ&Lo>IIh2ygT+HtEm&P#--I0mgA4AFG z6Gyk&1<}#Zo?*#;+3~Ar1MdvgXs*ciz2%^H%1<}m)#IH4k-*>v6U&*)0!L@#`0 z?og$oU2uV2$?QSOn(C`WYI4tIz0PSOx{IP?XUVN)z*V(XSM){mQDtq-z%kW=Tru;A z9ox{;5nK4Ab<%*HwO?;y*NCFONo-%Da;FWW^zh<}>l>5UYxdV89ES}BropbIDMw8p z4&$89*}^A3WKh_@oe;Pjy``!4)_BBDMermlkPuOdZdks`)Zmq!Bk|L#aocqsE!q$y zr#j>xuNY@wr`COLh3*s(wrLi=_@Sj!Nu%klVT#pUzrZL)J#2+=%Y;g}{Bcvo^aFp^ zoLI1y4zi?hF-o#^vY&~%-}Ix<>&R``rvH;(f_t#FL=^M6l3%J|QF@6yg4~GzuTM^Y z7kbdrPF!s;i~u?X4{J7oWb(Pdi^elJ6Kj*o6qj+gWQ(hDgJ*-X4a*)K^I#Zk!Wiwh z;W)1iQSZ0SLun_wK!g+hX?V$_+1=m2nv6FCuO9}V~m{A!p{ru(E3JTEo z)O#?+Bc?oEfTi;MABv_+B<^leh3tv$~@E%oz z5k-a1DGjCvcW{&SURieh+pSLU{I@c{W(fY^79g6TFu%mrN=Ptv5%1%}KZ0oezH1Wp ztc8|uwg2FbNWp&QrHd_gc&GMS?A9nWyXZ?D@80M0V{3Og2tWAe*OmJFiuh}WAxrU3 z2D6jZ!dh)Gkx|k0u5H0F0MY&SWlPZQ${(4W$#veJuA+#wa62(c<@NE&0qWb z91;DG0TGl{-v7)m1d>Hin{arz(c|7WdQGSR^Wfw<{NMZmEBl%9uBdC)Vp(^^GS0WB z+#Nmm32EUIa8N|dphyk8(m^77OoZi#NZ& zmN?Bz`k5E~t{5H_8#!QX{HQ-$*8Vz0cjf-;JpO#K{n*8pE2^)s-bprKl>E!{n4-U7 zBPX%!>SE1tLN7f^wo>vPmVcH?84l%IR~|^WBNg*4TDf767!CS`>!(~S^aI4JIILC( z1FFuiXz~k@dV+Ws;pnr3bKAN1dli0bH#tbGXlJOQ_BN(t(iC3I+0FL^5CG5(Z_&=b zwzIlK1pk?O=}~KRqO4P^K2Rt%J1_{`~r6 zD@jNhh;<)+as@9M7tU!@+Fy_3zi8~a71MEM9U7A!#bft#8zDdli^C_T=fvXN#5CC( z4nS+ODv{AY-t1*HY%IxCd!06GXMW9QJHjZc%Ia$HpTC!WBC@MisJ4nx^4fpG2pgA^ zql_p8bmppC+1R%eaUKsj_H4an%XjH>&$l&W(Gy{bNYdX3Xj=1bntb~wypy_|FIdsF z-~DSlU4rt$Z8gTv<&r@x5YFh@2M^)(^_k|+jG`_xjw>VT1FXf^R0Vz~1-n|8lcbwt z+ztgtB=%fypOY+^4(RZGFWB|p?Z6OBI=R9KUn~1DEu{|$lhmhVN$~XzSYNg33lf3W zh0hl)LVs(0Fe89*YUquPyZQ12%?THE@HSU653pDpv(^L!N#`N2Uy1{K2F2eB_&;8G zG$;e-^-o)y6*s)CA5;AaK~}**Y5u6S;x)KMBu4$NthWmrFIJdBCWnQeKvKAJFRpx} z`@)|7Q4E$5b@FF?yNX!1xkO+kQ2KI(htc~kxw)H;#3;X9cAM1GshKXmI{79GWh}!J&f(m)LGk_rVRt6wNowRUv>3-*4K5NT`FSJ>tPdn zCmc!h~jFJIl z($7`VoiSykQ&k`NW6Te1T4rafB8DxhuDQQhS{pnL9-aSK1>nk)KXyO2lMfX887e+^ zDskjglp^=3xi@t_YH9#PIgH;dS$zk|Bn;}_VVIM+;mA#GgvXdm`8K?*K-pYP7Qy(Y!a+UYzG<&bWR)3?X|3a%W@%nB>s`1O9!6xt!>Q&K3D}GZpj0 z-Q4g`cK2(~TtJtvo|-V(17UYT)_3rk%%uEls`kWYz(49R4^??reI-ma0!fF1qNde7 zp{rN=*V{~$sD=ce__{8BiA=BI(tL+Tl3^+LZC(|M=el8fhr-LA=r6@e#nOG^?FIbT zB;6SQtlMZ9BP;LGG!WKfl6MI^3BC7Pji+GdIBxa#ePmPTn%b!A;&Pi6!(;LFioMA& z-G$1n;n^I3TL0^oVoTuCgW`*xbdkjQS zS~1+WyQUgPf0bnt#0FDweVRs2oMpRp4DqC^m)AR`|L`UX+eDtDZ28F10q(q8<>NRc z0!IFxj6#M%>r88ufuhg^|9EWaMAlUCWVA|cTzVY^MFY7JWd-V`KNSSs{ z)CrFWp<1d|^Pt=r!ekk(z~AhWy*hDDI}?1kx;Y0u8LHgtNg{UW_1RVq7&hLvn*+O7 zB#WNbd{0RfV-*bY;w7zOD{a2#XY}Kz&VuhY0m4ipsrnv>=n62GZE>O>V#}cd{K3Sp z3tj<9SnVGW)SgzD+uJvmR>j)%H}iY7yy~gnSWBRuuRX+4}?<~l^FzRP$n15dbgisM|D5!On8CRK?Bxi|fwG)V+jfu2>`Gl{TyR6cmR zr1Kty3E=AgS!l_JwVod}C;Cy72w8m3HdJlp*JQ4;(0@eSYN{XA@bcpQ0HO;4a>MWM zTWC~pCjKaTah~hbmRX5vT!)xG_3V0uVgcqp;C>$$duUu2kmifgef>OFtMx|fGlAuR z6|6Ju8{Aib(_(kIWPd*v+@=6fT8rv|LEdUN?cpKqbq$i0X;FJal^ zX5{y*M~PSH&eH?tj@%9cuE(s#VL3ZQEJ)nP+x1C^=#g3QSjP?(bhsP0Sv#}_sb{N& zSXVB-FZwykYjXDuq}Dn;KO0Gmpf!F>XPVD6{~UL(qu;042bKJO`OXrC#jnE(%z6uZ zRLWSc2l#r)D>r`wBud8OR0x;jaumDz3&9^eOKJysRb+Qof7Dr|&cYc~&}l&jOa=wm zNi}SyGdd|d&n<0nN6}3lVUbRjqm>o?-dHoT7icK?E^DTqD}+&eA#}nw4*34gw^+Tv zD;| zYU0vJCp1%}Jk#iRd%~O-` zFinpJbxIkg(>kY2-ZfjCO>I*DwwfP*`F?;|OSB4jnmHiv84V9#3t%Rl^lfc(vCi~_ zkDYW6l+7d?yJxZH6}aDPbl81zTUsI5Y45ey+oX2~Y;f;hx#Mj_m2!05%Qf_}gwW9C z#S!o@Oo7~zKpH#^v19)gGEuNYM_`R+QXgf&2tuWmV^p!4VUY>DIS8VztY!@QRy)u4 zWTZ3~Aih2s=7xzUfw5qkst4fnwBy8`pFqgNYd2x^+52L!&R?~uJ|i1Ub4KKfvbpQI5&(F~9CruHGgI63~J*y(_8mtWFpxb0Vi&jI0Szhnj#FT&ZdBV*bcWOD%yPHe3Z!hYy$R0VXg!vnRL2R~1@^~hLOqqC48EL<#- z?%UC(^)D0ef{)kr1p{>TPgDh=`)BKrYJ&zQWomC17l(spI=MzMRplWMt6dm>RARBrgEgEM4P}=R20OFPlkM(G!p`0#K;FLfBHneolPt&if z<{r`xpXS>!lx+5jp`O|fLu~7NZUiU{AKy%r2Q`(|`jCrsu6XT;Q&u8BV3R8V)$5Hv zVupFX*e+hSUlOZ<^cGtkrt>T+)a_Ck^U`xAMNQ3cBi7_|he6CF5pjsi98L>;Zv5K{ z%&hb_@TiF8PH(iw@Wd59{-HJSl3r9R5;R(Ce4-$(GKka*nzx)k;uV!nVc0pHVvJ@6 z!Vk9d1y#p{_~=p8tUf*FuExo>>WSskRbta~Bh+oS1RkWjp{I7PjXGl#@pmY8E_vdm zg%=^@^gN7_HyM%!jCU{Y@b6fgtxC#Y+NO$jRgjr5QoMBaZz^{}8aqFTSFp_E+Wh6Z zs(c|^I;X%YBB*59Vs?6>=ueMzkp#n?0(ELf{djW|SNH5j+Ye4+%*W4_Y!Sr7-;=}< zJTgpvyW>msvKBFb#iL}Usbg_Lt}9eBqS+1jY1ezlXnh`{ZxG89g?e5f+T}MaO&?J> z{Mb20)WnJ&JnMSR2WJQyV8|hw5XqqvIi1Yy@@Ci14fW>tXqB-75-**|R^|6y&^Uug zUP;APXKu{N(#Q_lxjF|B(WW`sKO<%&DkPksaFtudoWdkv%ZuC$eRSpE6{Qn|W0N}D zE<757G@vge@UyAW^I6Bre` zcc&?^W=C~~E{5Ldc(*GL%VerpQH%}KF|XXtXt;f{dB5)ZotIZF zrWJ`muXsB(C7U!h>Iy8s9hp}YBT|?vu70P`LFa2uqdQ?JY7X>i5g|dbe*Jg#D4Fki;u4SUHT(#3wHHj~(bNsBB zd0PQMenwKB`)ipM-p~b7?jeG(5Sc`iC37-kz{e{t*JtJ+A@96w1-S2yT`CeH!|vqzayON8BzTOg=XdK zjvI@gD_<<`R6iN<{0k~RxOtbEK$3gmlLV{vSA!l*8$zO!b#r$H9=3aU{55&74Sa_t zb$w7S>moyhz9%zhB7H1t5v~xaBX$k%B|^S~0)s>M=l$f5Nj#4cW;GYm-$>S9((4FG zqM=`(WP(T$Y(Xf*4I+^WRC!&BQYXBDzEs{QPNR6&L8RRLR&Fp_IEeAar8SOCRk!| z;CE!;)5SM>rq6?&t=jxsNTbHd3i3-j=oumrQRwo_u-xUQKXo$KY8t9A;;1-|%z4!V z*Tw|DJgy}3morH&*hLg2^lNDOT{R`?~Ql59&8Mb%!`6; zb}j-G=Tzo6#$%&3YV0a;gZ!c=E0qw{L6;HNlkidGyCe21b~zh{96CM2&XubbN+Re& z6Js>->qfePiI%A{HCIIUH)mh5|7-?YokO(udd#@661& zq#tXIKhm^m0P14whr`MxruuD#?nPJyT)G4}rm0my*(8)So~vaOZtb_$pLF%Idi1SN z&oI`cB?X>JJLhDJCdIv49*VqwDgyVi-z1HPmacd6D>6=GHqyPAYMY~k2iI<2TjKs; z!@ckRP9^k`m1xpb&c5%i%;RLf)VMVSqWVOM2C$=cX^sO^Zme>e_hS6Jhe3z*bC%J=mTQD`7hj{?!!QsXW^1eFy0m26~Vk!teFfh&U3cJ0eF%Umr=ubga+ z>g4K7;v8D5o&7en0w~y7{VIKq21mu^L%Pt6@90OYJKbW*y#5`KcVA+|z64!8nW{W6 z{tW(#740M0_B10sc71`BW9qt6;S2_v^EqtB&99lfV;dlz{DU&{*6-(SE$$(j*{{w? z61}1c*>|&K9uZlg!h77dD<5=*A=Xcpu~AUQ;ZhJwTVU3}YskV8p#oQPGl{cl?y!v5 z8l53__8Otc9~V=qqm;lkcs);=h2JPRm`?BfNq}B%HdvT^Yf^0ZP2`PNwp`_8G)OI7 z=Zf;3j$87tMf$%#Kbr5#BE;3>@aitne&=_z_Rj9PMG1*;*VE_kEyY)Gt_--(b)mMx z)3Qezan0>{2Rg^%7H7Zv-jglqBOGMH3F~|=_}T~0;O&k@n}w3+V4UoivXNbq0a_U8 zV~9NaAd2N)k#f?H6_kQid}6=xS|{{H3Tr&ko7!Vh99S*>M(A%q3XMpS)qZ%EQUojB zk;YWUe-m=jHo_4p)P zd%ECCmbOY>n!^Q4GK@~Gfv^X|<%HF4XwR)aG&g0g7?)(+vUU-g{(N*k6P z5>ov4#s`JXsqG;yZk@{oFR61s(SAPgmCje zhHAxM;PDYEID=Ig0>~)sROU+Dc6<-Lr=?@)CBI&;J{C`xk^T?%A7dp!I=%cw{a7R3 z-@XO=br=(DQd>)~X)?zA#Dq^4he=-XKGeheEW$HPl`Qz5c{O2?S8HW>j;RRi+Qx}F zgZC~t>3bgtZEa(ts4#HGR-jaQ-zV)L`TSt+6p zitzq9nT|96eURajn4<52uS8o_^TX8Tf<7)bPQ$x@rsL!5$%4V*C%b7P`78{E3K5t7OE!UUK)O0>wSTKhL%^`1)i5A)e}tN6MNBI$kYTg@Wm3Ao6^+91Lw(9s-OBs8Q=8wY?VDCYbG9 zPe3!n{ZW*FJ<(sQ0xLU^FDRB@QuJ6PLuNxy(5!hm@9}sJBVjwYEJ`ogU{;TW-{_`) z>R7%LaLvs$ROw}Kr$Fb54<}pMBhVyS=`M=nU zax(Y?zbH{^=8i=3FR!FC8C$$jIULprmvA_)B$_qF3p_SlSS^>}ic${vb@uy5j$-+k zTo1{|8ndDeMIK?Op{dS9U6}k{1SzoF_e<4LlDTq<(fUjWpI!kbVetNT4_`h|+3ET& zFUC$|(_w!9^{?`#Hhxx3R1}i5k4ZZ(4bF1!V2;<8bwBWhL6 z2DO`zd!5JjH}D&kvO!Wgj!*wuE7-9!peF$v_Q6&xTstMI$*!Kn37hH-2^wz!>!HHi z5V?1Um=7-?&2FLscd+``@1YWH@XxY>V^!usXL5#-RFGIOHD8Yh4*);<*~(zBph?yw z;r_QH1>3gre?L4TXpOQw@@O&hI~@%6Yw6e7Wi7S+m!bqM2lIv2H_e*atIe(4M>wL! zYRuWv|6~H(0~=2YWfWz>s)p-HfMwdu(#G~?02BoUl3VypdqT7ON+l~LPjnn`2yWl~ z@;GaP7S`%!537I+lu0Nm$a;c(M{UQu?enrm%+x9GMVzDBC>@m`e{Xn(`E zKR==*-dfMj)T_C&tg%dpXV-ldVsLL~gJu~=3M|4N4;89Z)nPxghnUepxN@!7S@*A( zS$4l*t@twfp9P2Y7$SliGb0;pX1ij|eWq{Xh{K`Qf}mjLDCJkbhmYA4@$1-9laMWO zRok@|@*W$LLjPn~X_{eXht;DNGGJU`!ypqFU>1A0w~j3o$bibM$jw^PbglXq>q|wW zDj#F{AQ`9MS7z}souu=-HuPIyYgVFpbZ@`YNLjY*N(4rd4j@~;LQ$Ny0&7i$NRG2) zJNY|1QcCVSG8GPKRxaswoon@mUmwS}B?@;sc(-@2yn)#qsn>nba9F@4{e8t#jW|r& zYif=E-zl01ez!6-X)OO2vkwC|<#LoO=}r7%6{hA0Xur%iFL_ccH;qk`i*5N>R82?b zJre3H-Rq`ylkl64U{!or$ygT;S>@x~bC%z)N3!o}wnX!vlwDAPSXLP%m*V;L8hQ@p zXa%g3efW4!X%*eDrgY=h;S?aGY8%Lhxd9gidx$QbpjqzuO`_jFM$3{P5cC$47SGar zQy91n=3Zliy4T?3ZF+V2z8Q>Ku_|qVH;=J|G)N_SZWC5}Q>%u0_J>xYd(&b0bA!5q zodqGUOOIr3ClURW`qN}s^0c!&m}pX=+U665^T20)>icj1=eCX`574AS=4UhF-n5}i z0`5?pXQMqA8`+ijQ>U%D&#l-(x>Kr}_9Cb1Qz*$%ex`amMvV_oCE#%hTe0mA8viGf z>T_H$g~x94C^$LXRt(#J%I#7XHS!)X%{m-rE7SVmH2<>lujWe8Re2x;uMXA%-XrC z&#EfFyFtO`*y2U$c18Z97Hf03WY{_Jcz17>>Uy5}-v$Y9GnGp+&q-dac&EF=v3ZG= ziXf)Iyq#rUqHzV}LYQh@1o&G7B-G5dKj~o`zgp82Qd$6>B!Rntf1$FTnIXag-h=ze zw!D$TQNK#G>d%SY5;wVatZk@lIXIhfnTNe6&U|`}ySFgkH)jjRT3X_`9#{DN) z#HG=HM?@}R7{3&fN2C1A9{*AmbWY}tFH?(Xd(G}2&#w{F#?YW*JHH_I1)7sh8Z$^+ zyD6T7-%|}1X{QTY5O2dCv0pJh~$@Ir>D5Zv^fo(G!|ZSjJN2sw;Cwtq77dLy=- z1;qVcB!9UlBnq<9kSHUjBFjlpjX}o+|8rD2!4%&UJN;T19&EeR=n!Pdbf@yyDWXmKLcLi_MN0v(2UiGi%XkbXP>_Lmz#GltF70n5`ZITo)Tb_Q zd@W|#lyEz=q5X37&TX0Kr<>eU!+oOwn=-B=VWT)N#-C1m?zBaVs-C0Xy-uR8i?X{B zmvP6L+1TVqy#IKrBwqW>rW&i3aK)0ma%-Mm+RGp_*_#q8xs^JvWRJM}wqOV-*gW?) z_mlUZf=Cg+sLB*(J0*Ym0qJAVRF3b_{I6fv1z^MNy=?^=w)Fuf1$N&T=^sFwP{^%> zfa(1;K4{|d;mbxyUMT&(=CEfN#jxJ^)jj>Eh3>S*(st8I!m{RK#c@D+?_Ta<_P9~! z`jdEv)f?EK7Y7Bi$qNfE0G@8Qqcpsn3JcK?yCMy+EH<8TXu^EX(e26PcMxz+_E*?9 zvc}x=&MTogzLpDud==efkQzNxM$NB>pg+LO$g=N$CYV0h0R~47r<}=rnql+}+(5mv3}U%(Q&dyY{*K|nKH-4+*+QD;syw{od-|*nCj_iB zzcQH@sL>T1LLek-41T1ZsDc7OSg?t3DWO1&qx(2^W^`tQx5L=o2UK z4ZJ@XxKoL(?}GQiJM$jeOjvHwyy!z_59@C}INS})nm0-1&kxP`kxF$fzB9;gRP)D{n@DGIvLYg#dhw}8TPaW zRD(kVrpX;+2qpF7$|9-}4+8<7w!_`FRzkL3pV#L<3AE5G++R=x*9x!RO`1uSi8OFG zRky_pLBg1%=dBW{C&Oh^`Q3hM($UE>=gFt!F4^PQu8n^cqMav5?!1SvL}Dp+8I2aY z8C&_PJ=RON^t@;E=gapK91Y!#Zqw&*C2DwbN`8GAF=R!e{MJc7W1?lU$8n}DKVtEq*3_tQw&>UxqAy+8^q{~{oys1-8D5~LVca4-yK2$UeZ zaBJ1%O>htduU1$2(oW;fI+@EtdB}J1ASr&>(e?mLZIzD&3Q7A7z|Jk9X_EvDI7OFS z5m1P;e$uaj!<*%BzV0gI2Y~Eq1iY$Gqg)cT z$j8RFnd+URkE>nF{(cPD9I;b_V1;1qRQ=ad10E9IkZvsXetPTpU=o*H;_WLvK%u9#@vZIprolwc9gEtne8_IGUduNRH=R#pih=%qs~+>9)Rt4_73+bQ)MPX)gyC_ z{JykAhs(;C3BKJxQD?f5OXHd(JAI^AY`)Ky#H9$#>+Q{eebi&rj6J<4w(<9B8(DYk zRyH3}b}f3cG>gYmIPGdzN*Pl7j9|@mL%KClE&i=){mw7Asp&yke^2xyC+_87DrZcx z@zj^>gK6h>=jK0-hX!uhRqTI;kHe!=M3rNiIys1?e)2B~cgBcW?OYEg<}u&Pqt9QK zC;#E`%_WyNqH0GC$E}s3u}$#HRw z_$eyfead~VeX&X=jL14|iS_b9n>&VipR^_Qk6c%3&iLKkN-d54h=Ui4e_g`1|85sd z)tq6E_h)6YV!djZbng7ZpErDYmahxuq<{+Vf;ze|c3Y{d+@3k7=#Fo(G%G zwvks4-9>Ji!?A9(5%oUR@pz`tGblciCy3LYfeaou%{b1f&6|g{q4%o4wSs7JjZKMk zgiB_GzNLZC$CnZv=Iq75u{qXWd#d$04T2lPi?ip5)Jal01ygbvV??LvDME~T1x(Y( zCP-WzSG!D@38TYyh?eR^35HE`RT+G796&YPs(`F9RQrKISeKK?1cDPgyaq7ZU6ml=@R!Osf4Ln7k1O2kMtVv zSr2Y9;g4H;NaK(ZMkKDBG7aS+opV44PnTvzEq-*_HZ>mj3x%QiH_n8%Ca<+kT zPK%Xe)ehI+i}=#5(>9DP5{EV?A71kIrYfh;-%He`5@Mv^&+Rw078S}gmmnicOdK8gce#0ieH8kF)xc=3;G ze>UiYx7{y)*O@`!LPzVHu*#QDFOKIq&rzlLwz}53%agS<@-z{kiOdKZ(eKA&Y%d;H z@AzLT03N`{%+QTTvR81>704$B%9J(4C_0~Sm;oY_`_W-8&zS4)QGtew_q;H3qqKU% z$EpsOAR>V2^enMFZFF-#1O~^o(`|`+u2LI9^dh;7a(9w@&G3l0Rrl(&; zIUyf9uw!=v@2$&_3wYq9&9%HoNxoM*T`o39wt025p6z~K%`hO#v1BOaXKFvnd0wT=I7&U3^d4=uR44Qbpr45mPr7dClIM6l0Lbu(2(F zPo`7!SBa(2f~tFdsD1IZ{=D{GzCu+4a<}3zgu{9}L+w#>#UN||Imk08zWNuP+d+vw zDZVYkn?cWU$ZRW;BM7_j)o42wj-#`#@5)zASSp2>=Ce zctDqDBiUN`!? zNS_diO}i(8yC?=w1Uw@`&@U4197NA}{H--`^)lU9y*F%eaj^{qxfdnwzppCFq&89e zl=moWAfl0nXs0FULF%+!H!3gTQPFht6QL=>y$E@P! z+BUPi<_li$^Q1TW>RlUfMm3z5=oj~?_AS@%+mXn#l@q|c^8L>wVFpdAMil=zYRdk? zO_EuAf>h7A6EW-33E=w96@WtF?&s)=o(ko6Y>4p8-mJj*?9N=cJi!EXI|8;{#>qK#)K2eUOqm{KfG2AJJ(WbZ$uG`MMn*A*cJZOpd7nH|es~)LBM-7`std3UZ^?BzqX*v2g$9I5q zlWtT|iWMOET1SsB=Q$<|S~3~G^;%9!Ma5@;LmxssmDKh(LhOf~_I@%N|NnO_1b*eK zEE=ykGt|t!l_GPZ?kP+eJN~UdcoP*yr%o7miZQKR^dX3j-Ip13*rR6>I)5& zl6m-frY%#=Zr!xcdQ|rvk9XW}#j-nbb3q&P?_YUxcMBgf^5q4(&349V60)@Ff)ih)g)^jz1)4Zh39U1?kD3aqwU{6SYh>#!9u%1Ur&F!bhng&M<>@ONzCaw zO#aDOeHScax$Z+eNmIs{B69F#DsvOE0E~>xSk_P&lQfAjMMDga?i7qY##N6~LqY8D zUUnm45YzE)JzQHImy_%SGS*g6$o_?s2eFRhG!)5R<>PiU)io~!($_8G(nU-)X2LlgwlBTm*D4PGRqCX=co)li zay6x^Ic;=xB!HT5gnRjWOzq`mksZc7zxzot)nY4xzw#;@ys&e_r-vRZMg$$mO-xhu zfeu%sQnY_~)Ws`x8@6uB3Bp$FOl&vK-)tpG^%ei}JzZ%VPKt!U4`;+E^3pRSUA_dEAV zPjZxa9DkXhfxc-{ZH%np@Rz-xp>`x4(-r((e?JK4go8SVIp1# zka)edfVovwZ!TElKRc^s-Ts^axx1?#^Sb=TmAue{9>JpULOIX0o(*OW+%m(UvmW%l z-`$%{G4Dtc1*L2hlk+!^hLC{9@M=0GhxN8mu9w2b5n)9}Q61vht!)%V=7YX;J&uzK zB|sC=bKcX>%3UX~v_1+uCn{T}TcwsqD*yskf z!bjmW#>YU^p(z~YXAXZY2##8;?&i4CuPzr=>a@sxQYj;P;00CTR}S81y+Ep85RPnk zc>%<_E%R?a$G{qC2=e3%6SOz$eAl?&-{?y58itlI9LplDgRDddl82K6TD^fT{3Z5# zkp@%Nva2n_wa4$J?!kpHD0Q6w#3;!iUKrN{gZ|G6SJPcL9snM2)*6xoeeaFbbC}4$ z1Dq`AIEN(OnV=srQm5BVMZ1>lEEOeN9V(A#Bq^Ug-$FYhIs?|*SjgL5SDtC>sc;vj z>=1O%F41lz(JIkWz@`)mkBVQu5OSe++U6x?5R|`r#U^{Y_kpFvY*U-jlStdyaR7^H?)q|}^Svpy1Qs;#q4Ql$6%VS_kY66dfqtEdV3oA)dPv)16ka9?DDE9+PJA8W>IcaQ4{7#hAzwMbT4XKcR>-L22 zSioewxJ79H^R5pB6b-8JJsDHrJMXE`*QLyG3EQo8T5IvUhPquY4NUQX`*zj?IfhY; zlBLq)){}gjg-^b>6!5i)2U<-J+159H#2;UTnw2hFA$h^0R|XD5VqZ+ z@;pm3u zbxi2sy`?tgn|EsQpZr{qVDQ* zcjv!eTj92D3{2P3KS5-yn=W3h+&b^yr1fEoOXb=2&HHcahW?FwyW9e^MHG7s zW`>7tE0!t3jgG%Lgu=KvL;PrJ;&rOvaT7yU!FKtTAGWe`MM$^RIj%3iLwLoV6>b>i z@WfRmpqOkbxF`npOXXgcnH}GQvGr{Y^3c!PWwBD}u>!icp{>XJ z`$xV*smZbPqR&o0#;LkCVj4#`qmiNR0&gnv(vQYr_C92HM?CFMA)RRg5Y?lP#w z3uYW|lWWDaZX}8T-pY`@ya=GX3-Q4g#5EmI?p-KRmnxM!Y7^Rs`q))SRYA!{fJl08Fm)KOdr!`XdycEcP9 zVx=LogcF#Lq&3&2I>#8pqO%Q4AMR>HjzTABp{w$Ba&Vwq-8p$eXZl&TB%)4QbSYAK z-947HeP2xc@H7hXXOHIIzT5Y?;VE@E z=IQyZ;eN~XVyZgQY1acmODFy`MC#5YpTd!)T&%d$@AoTE;lKxG3@`LOLiym2=uTib zYnbp|eTj^=D4t?_ta6VqVHy4(kg9 z9j{bcNMCWQUo(yfSQNOv$QL&~IE*#sdY#dWw{%lt z&VB4q$$*-Z5q1Vv^@cW?gkM)M%4UWpXDb&hK+E9#u&XMI(Bo77B;S6#iucC1JEd4;n$ zG^DgfYlS8Dd-*T4rgl?}Fu6|K5+M_3rzDI3g!C{BGFR{K$mug*Q$R?HI>;l`vl(^+ zqkfb&eXcD5RWyrH3G*J+$DAYzwWULScPn$cHn44fLY-rE02mT#A&{JuAUzBcb+O3U zD70RP=DLL$8gspq0}9qT{ZhVP`dpfP0K9fYPThGll2X*7$sal+)6zVXK97P=_Oxk(yIBwoT4tdJGWEOhgp|yzuad*c6;@8 z5@1_NA|az?m7=yReVqQy58p-VTQ8^c@-OZS|IWhP*gfiM9l^H5Gz~`&mQ$=!?%$RXLa@pKWnjkJ>!n=B^!(YYYEvrH!e)eW%yVD{JEl;| zp9BYjN;7%=Ro>vhZWw7c1~a`ez@eKXhKgPF?KqZ$yUdEvd@yAvcvh7Oy(z?t(1jvh4*OA?xs z&2<(N*?cF@!9cb_?EhiwyW^>T`~Q!Tonvpu%t&^b=h%hpQ3{b25<+rpvP<@eIE0MI z-VU;7MifQ1?0xL;yUwT2eczw^cYpuv@#t}!^B&jrx}Nj4mWf73v2u>(lA^xzC!{^% zd3Dz#_19Be?~l5Cxjj0J%Rh@h6$AYgAc_U*OF1PrrJk_!w55*_hY+Bh#nCnZxSVDP zW_H~KG{yE+G?FEauq}uW5SAw<_@-9C{PoP=oFW5#i6fXnsg1&WyB`PTKqNRH%{l{R z=v7??FF}&@yF8Hm_a$GC%NP1Pu)RMqVHTG8quQ}>_QBut>B|5LFOhZ>8IbImHmhGf zm?<-G+weS|TWfIL{PwVJe?$NK(_`6!S~1Oqg339=;BM;s;X4F6$+y=^R*F1m$I_BX zP+Q!0?KdtJl<(9hEF%=FJvSNKL{J%6aIrZZoWZ`fcY~BM(039;1Z6HJ)B$}IVK%%N zZXJ~AMH)^VFDQ;OMc7c-6AimYqzM=m7jcsLV1`vu(?8IuWOYF5nyT8BF{I4-2<_j! z5u^|l)9wsKm5&CN7J{wnHYh|L%?=wX2FZ2>PjA-VaKFjI*)<4!nfr%wU{n86bYJ{z zqqQMS#MV!i`MTZAaXM?Ur#CkG)(r1Y=1#KCClH6~b%1Xh6Ngf?OdJ%teVn*t^RuI( z{K8UC+H>A2#dTeSzhSq?(9Fen_xfYu6$91Ho*)hgJN}I0oa`wT-a25^?3@^LXCFP@ z=YT2yW-p4c|0Zrja&@C#8J*z#?TI8{b&U_vm|TUl?3|fqo8I z%ov^N=X;u8^GYDYp({ROZSJI&r`L^>xYHZ{LQPFecKHVKfLE`)kPW6@X`eCGh)uy? zeLeEg!HCvj(p_Iwsh=-Q%+6o(v$Q4i>6a-kIP}wka_fAA6>%LlkvP;v&-`1B^R!Tw z;Lf! z`IBrzS~G|+j=vdk!)38yQhv~7`sG84hugIr3yi>XlR)||O#T){z&2(l#Elcefx+e% z^|@`U;&jd5(8vh97oyNc7T2G%l543-V=2#TID0H>(TY#&{zi`~U(zf;*wsKsPWjJ$ zH@XQT#P7Ya)hVS}kygA~T*tmqW1hHSG}vv6A}l0e7AjEHnd;Pmj_pdQK$gDFHM~}o znAnbMq3#?*N86^bNE2Na;_g0e6hH7-e82ssd9OT5EL~yNF`;V*t;*0cA6kAdth?1~ zm9=c3B6@4TZlh_jVQpVaN^gC%3C zd6*&*yR{!xg~W(kY1}}I^Ji_mwN3#XIKSFat%%NoaRc|yHwzX-X+5*Ld#sX5$#95E zvOF_YWz%j6!3wfMUw^`n|}3St?abIPTReUNl}8)zbKu(XL#asC4yW)FdB zcA&@@bDoY3>)UtO7nB}_FE~!l7D#*cQ=w*um7Ta;53f5+(BDt1MAEyAgq>2sozaRkQ+I>=tnetCA`<0sf4-VqawFQY(TY zrh8xU{Bo;MfQV?Tpjw(SfHT5}$k=u60R6~~<}MJx-ZsY6+4m1QKYr0rkm!4xqw8yQzyhC>{z%MkoNIS-Uy!0K3D3KD7EPZ8k z>0VNPLocn!5)KEb!|46z*aLInHXaK#4GlNgj=rK~jfI^owP$08)0L3%*0X=flCcoEASVC4MxJ`|4b#5q=i(Jopji{HZmk3br>L8@ zRTdxo@foNj@X~4L`hjKK{SgW%C04w06>mXWnY)P*EPXC)en;<`4nrBI#@Y0`TKZ)G zXGF2jNnB`we*6!|#tbQNA7QI}J>&8`G3>u)^nxTmJCro?07uko5wsh~Jj?D$OIbYv z3Lu$U8)gv`a^M@`5f5<#IYEBnGY^{m8h@W{`H%4@N|QsgfTXOz7V66~BFH6D1!^?i z2pKyI|3N7H&8ORjpcD<>e*wtr?rKGIm3wlI${@V}W+o9tSm0tY4lL@p`T+dvIY1l2 z*FbhaeW-I4@WS6@0yG&o)N%qPM-qUSS0uUsZiAUzz_F}f0GGN4K*a8yLS0}oyP>0F zXP5trSS->AG(Z0Rg#U@+q!V-^LD1*izK8%1BYy!J^TyEFbwS<4MgOG-E5}4ND3T8H z7yyY<*C$^N*n#DAH4q#1{FBgv7xa-}y=@P2x4t)clr-UP1W_c2+iKH3{zQxb!IEDl zWx)T41@!)!H$F4{m&6+mcd=!mFy+=qK*+^Gg%BrYV8=fLc_F%69BoKia7F%*DDC)I za~|BH6Grfp|NS%Y%F9(O8XTpAsRwXL`fLU9LHt_to&b} z3OcK0Y09O8JOGFMJ3zX$03h-D%X*PKwGKbFx%McQnfG|+d z#>Diea9`(k3oc8$qOmMaj6m*~);?8id_+`X*;&}FlmjyTvr$sOz8^v1$$})Pv;M5W z*1AyZxNr4mr z(!Z1ALiBsmS|Y5E#}9L!#Ts5cIhq*jzb5oo$+5~moi6u4U0t5ij-l)G&u?9w2QPX* z3tlA1PF(Qs3-Bfz@@uV&zGC}de~JDw$Wu!WcLH}>8p-CDo+-qpIwfr?Fx zgR5=V#qFQB`OVZBjCyH$u7I8@zZyh|p3q{RPV%>{gFMDAbbozHBh&wWJTOA3$Ai!q zGSaa)kkvGw?VoHOb@rg?;`fc?M`Q8})2PEDtBK@^bADQloKdUaiHiHGPJXzrK;!clY{a{gG#1+q%`Hfx_N{J z)1vjV+d4nqf7tEoS*RauH;cGpLlcp*^Mc>JxCl#W0hodv$fJ{he776y;M}16ozhIs z$zO#7?#B?YcMd!_Uq0B7V)M`9;P>@^{t_hTC@+Q0n>r!7DumY_9HVn@r*N*Pp&ZvU zuJ?pd!lXCRPdvKb>(Jk&%Nhkcf6mi)FTBXyXA&JZ)27^K;ZBGpVgcFp#Eq%0_Zp`Y z^{I_a^KRHZE;5f2fJ7j(svB(JZDYSl2FbADY*;CzuA z-1i1#U{Z$v`F(TN^*&Mf(2$?P{q@17(H8Hwe-Y5Pd^j_MQDFB`{}pL(^K+p_MF>CS zl`L&WrN$kV0iMLRR~P)pZtr6&?az`I$y&0pG!wuLX;rZ<+n0>Mu;e|Ed<%qv3xW-N z$dO3M({(AS$@fHU$MWVKsXCXl`bvk>GOzte5Y|`kvBm>DbRVQ%1boT#LokB*myAt9 z^Xgr`5di(VxnKvmEc)+Aw=yeHjx0tX+!4!;MKU6cOA^a7eyvy^%>7LRHW4AtoH5M~u7(WXA>|{eX<}_$dKmk$jsnH?MhY{J3-C>6e#(0kVN|fCmUnbJUE> z$LWhLA#yPeA%Fq!^gBFtxDQf_;=ZG%wGPw79)5xhIxnapiUC(tZa2({==^Kh<&vX( z+Vf^4SDm-6{C%vT_%xODzR~ew_w+(pa!)~X_wW_x+rzj8*@+p1Ww`*2Jc(w9MiB85 zA;M*zyhV5?r6JsIB~#jcFf8UiM4VP*ORP+V%_aIYataoETK-OmRCQOZ#P*_n!0wH6bDuX61D+Ezy;fTXNQM~ zrJ|w<&wwjMPkz=9Vpz=m&#E-jM9e}^fFD}DQR)cXs&SyF@JyA8GOT`E*Bg}efIyZi z*y&=jBm&xN@QfLk3OWqtkbU^5-v?+*o=(O$w>bZ0(8^oxwxq3-p5zdP7fgsx8FzFa zZ0d0!m_`*|ge{tAt2q9copza7Vp)1~s!;%NK%=`mM=L|`g0LmTgDqPR!OXN+zU1+j zYJ?1X8m zr->_1zI_06R5$pmT)`Q)X$A5dBw?aN2!J@me|{_Bd7zWcsr^&N9n(? zG1d51ZYC}-ynfEHJ?ME5!T$TZpP5cjF{OVMf_au^K0BWnS?~C>sowOV^uh*V`#+L8 z(sBYF4J3ld!}X~~S)aa=ZD!#4)!)Z|{Js1=FyCp64TAd5&!X1d6peTNtYp3XNE=Vv zXi?LvAhgF`c8;~ub`bX90;K3Z$aVbVlboZ*;m15gu2~Pp-4*(Hn%7-6rlS2@S*XZc z`6kTu_(+yV%q@$2_I3pv`YK#N903g{k_GF#&xawmz0S*6v*@g}lYSu~88MISbGwo{ z@1~Pgf%{;n4%M2aG|ax`POE*@s5ob_ZjTESgFGJ5p}!62|7X*`;8GQ{hls*?lGD zDs9ib1-)Ur{H2yRB9(Y3LT9uO(P@_H-Y-x0KVt=@IS9V?*k*U%KK%}oFF(?oNx_4W zZono!xV6=_%GkGs0Vc={3NNgRdaH#PkuVL+B)&W@Gb_rqbQ@|?^bu)+a`9MSI`#}5 z?ung`zFz&>1}Kr$*Lyib2KqlLo!&#+b%+qC-F)y;zcyS} zBx;=qccr8|!dkUHOv&G`u#V*jA}nNu^%}v%Wz)f6FSOv4Wn9H2X z4QC1uzAl6<2uM>!cn35&17pkyjKZr{8}^W>tF@v_)C*(hJKj?9)nxqdF*fq(Hkcu~ zjpfQPTCwT=N&ajXVUttmIv|MHrqXp!N*VKsG<1l&JrydCH1ACoEHsl0Hox&i*Szsj zxy|K7Y=|syEUmUZBpnRm1YtZ5W0>joQY-4U1KAp94Um3t=bk$1dIWm!+gm2w=Rj=1 zf43+foGR~AGtbv4GlnaJE;a-yiW9Rv)Z-%b`(;iqcPtMZH1w_aFy~Da+0Uy6#_{~| zZ2>uhY4P*wC;egSSxX>K?1|D49u*J>?XFxu z_)QQ?4~?~H52s9Bi;@>2ng-BliP!kd?7ULl(QD4+sEJz_of)*qrI@#2u0Xg%Nm(4C z)=smDjnzHt9##&go3VKn(C*n|-X&mR49|;6OYw34B(r7n2k|*lN(0|c`T$zjyyb4M z&-Dm~Afk)s)zXhn25yMHYDW`nfp+cBA+K-2h zD_M38!l8W$K}+OHpTWJh9veu%icfiR{gLJywGklapp6Elcg4`}+%mViXF1+7%H>ms zj!{^?*694*xP-$Jo$8K)2Iq9Aky`NI+|9X4qo+FgMV&jsZaz+wOG$K(9+#%e#SvuC z?Z8hmno7aTET2G>=#qz*#t$MgPuiXo|Js>#7ReD*t;v;}{@9aN9IB z9cSn_AwMv9V`#dQb@FuC;C39=SU0F8-L3+dAE4!E4BwTkA z_#YU{c&z4BJiY<)iO2FlIpQUzN1vFk+ht-I_rA94>mOXNoYA`uW#Z`PJr~?hJ+9Sa z_8pu-t$cq)BgC!w9tBME`{T0~6`&DOhE`@I6I?Q_KG!ilz;S%U+vk-Q=eUn8huqDl zuJg(7QyBCF^=2Q}L|a>Gd5Tk9%Y%cLo8K(P*mHgE4fl%wJ-KC%?uy^<7hoPr(-lq~5zejAKF^P8 zett$%FSFN!yKknfWkyT()El$>jb!P}Fjr4t9&-+hF$s&cX*RxTFY zko+0ydF_NBBj1ikF`R}BGAs|_neWlvS z>v~kenP(RNAOkHJvYUHX2M9>J?f`dz5|lX0_Y$n)2y4t89{Nb0(YM946$3h?RO>%B zUiE+6pz1ef9cEmzKemuA1Y9+*;eA>jy=g%n;A%?{rGUY=0u783GFI9?96$jF28*Qa z_itJrB0#6pti~;+e?V0D)v7x6<~KNh86ir3Rls}}}PxAgN4nw?E0(2t2aKxuF> z;4T-5ow+KG99?cN@7(SzlJ=4b=CyKaGB|Or7g8r+NoYPCztX%_Yw`+=(iG>sQ0pa=OIp6^Em+@ZF3m2#J#ZVaxkd%Vu3zv-q6k(@Opj8RK%kV4|IFB zKCTD0BQ7u`k9h~>)GBbAgZ&m7G-!d^ zI)?8x&KU#6@xZH@-U3iT|I>+SLq0_^j!}NA&PbV&Xn83iZn!P2qsH!C{6{|$xmVL( ztt49jEf2^zq@ukEr0ds?w=T||wJf#ujZ|13O(}osNtdk|I8g4A@!YjerzKM41CMp8 z=Fbph+4_KvYQF*tr5zYVQu`4gapS7ca5Gko`XVT3pQS%a^^1G;h{fJ_`m2U&wlbCk z98`VaKwuUMWh-8Kr@5;7R&N>zR@8yu!<~5%>ldAPDKRhe`qMw2zTX!Ur=%hU15cdU z1}=P-(6$5j#A0KQxG7lbne8VLwG9m#Pd%W-J@~}M)b z^%(=X`a{=$d~Ng_tEw-ohF60F-QWXy0-C)HNNEVLF_lTs8y@4OY73Ym%1F|Dl>|bFl}SY7d}>!-O1jYK3M~2k3Xm0 zNPXL-rMC01rJ{=;^jrfq*w=iItT7bsB@&e&j@Cwy??72~mnIb=mbUcDNP(L@oEj#^ zE%h9?8e#>JMz(@B(W{SNcLSF+?Qcjh%Q6m)3yu~LoGLs7&~K9LkEHAN`un=OFQ4PO zLEyn&IFS@x2ptssgbBwcKpO5sbkr`hB`pH{`rC4TXLa<2p*B4ix6}Az4?%K77H=?TDVY@Au~L%KH!f_6yh++M$x!w`=_==kODNV>Z+)cSahIeU>Q*!eqt} zM6|^@`6}YtHUZJR3InZ~T%f|Ox%LPffF$T`sUWNaG=oiNKL^>8KO{cdt!X~fYO7BR z;6~zmDn^?OmSJ7>tsKtUC}6%_3;s#0t0I+1Z6>df475d$**vw580Ko{R~8l&pkwB( zP2ioRuHw;$=Q4e|DT{*uUehRJ>XdG2(D}&JbaR@)?L>Qd3`G5BRf~1dGA@gz{Q2n} zw+H~PjLN!1yS#$dbKCu0cjo2$;~U#Vak7!OV;s{oi#~J1Y1(=NQduIsk;k01?wY}Y zc}$xT*KGgUOHv9H4hVhCAouenIFdw^wAwe#T}SWjEu=oeq%(c9DyT9SH!^xhI__W)`$O8uL2)`ma~OH4`{51PDI zPQgL=aX!sc0-eOA41Y5ar~>GQ8+mY3YlU1j`3759*y-pWcv$QcB7$>b-H2vm@n&3M zh=ng4G<{m5p3r5EykS5gfK-v~8>@@4Yuw1rc*0l;8H(k1=|~xAVc0{ehcCr6T~t}1 z|G5gMiGcw9&a-R5^{ORLYdUe3c3GTu{bDL|l9SYdzj|kG#8v zx1_f}NC8Dk;-zi=>VeWD*A1!CSz4XpR&RnWrll1;nwEwz{0<0tun`G|IzU{$IYPLC z6@Lm|kY#p|deuhFp5dxl`orzE(-eb)^dx)YJy+@K+yexV0}!us(6eb51&hMdY07d` z;76S=q9fFz`sFI2IxJ@1iqI)V04b8Oae)k-|C5E0|d6VPE3eP4cNLO&x z#-B>O!Rze}hv%wx^qFBz89=w)3<+>pP~y~l9V2Zpsjq~GIG2P$vsCpuM|4Z8C%}8I z$zw1X_wVbldFA0ib9H*`V^Z?oxOpR+&Op-gg>hPGT8-|Y?aUVD4s%nhdtng9g_4%| zOU}%~?X#k5pW*?Tyn4WG`^)mVB#!g%wQQk-yeIGnXnIAsCy@u|lUI&J9h`&|S#nfd zTtDzNEmFMOrExb)8~ZqD^8F6pJE1rU#^;Dlw9$E{JZmh@t$lVS)FR=&1z0s^k|F@6nXA73yo6r;Ua{nS za=_QVKY6OsqJRs*=2u+E^W#MA+(Oe|m;CE{($rXIcJ;6G8~flQbZ%?*cSlpJX^M#3 z^yYA=M;k{X-sx#ROevLkJgSE9*39kt_z(}V5Xo6qcR@YbZFG}?2ltI@b|5|DQ2Wm( zLq}T91Is@G&ft#2n3WV8vD(vXDP_vMiiLh${m?voC{^jx8n>I~lv% z5LZqp!|_KDg~g0Ws$|u<5)eBUA2oI@TXV~`WKsgD7@HlLMDBGn+kstX4=pQGe#2XLl+Gs zPIptSI-Z|9ivPJmM}K~JY9MO-mBZ(se)oSFw@bl`i7)Mo1@1s=#8O~+QW^84%YZbD zXyRd`ugl(kI6HhUL{E#l0ih32F1-8kdXKbv7Z|Q{=0%>b-}4n?IW7T^5DP1T`o-if z$h5E%`UtY#mt{(bUgI7hIVde&K_+c8eDAus?O4Mfs)E&fAF<6a-cl7-egS43of=+G zStdBL^qW?c07PVrP=VNe2VW6QAx&^@>BAR2X|h0tX9<8lld)M(l_;Ue`tF`fPdNd% z12P#e31j2A*I19y-E5r(2WX1lBRcY57ZY@po;z(4jpSS;XiS(!l>;RY|0kY6S)2KN z{BDlliDf=3?~|WN>&P##%#G_2Ozh++wTsR$7|1zVn65zgE7D5gf9=wmI)86ge{El) z{Bkc~3JRdjcYi8ys0f5a*o9L}v4PYm!$AtCTM(sStt=p%Tp5{9<9z@CU|L8l8S6}d z5jlzn5;A7yEy%uXVIDv-^g>tjFj#&S@(dDCTY?i_8zWj=_lard@@c#XYj~gU51SD~CkeAs9|p9pEqX*}(q0Gwxzl z?>HghTh3+`wnX!ZOjxzIi}WS4>?cy)E=QP)~M+5YGFKDIzi){5*!3_fc=Cp;a-hXI&LhG1@IR^S|Re2a$C(8O}Ots&i+dL z7En4}0qqbYB3IEGrnQu<27J29bhy8svc5;aX`wi`0t~b#M`lEo6Xe*kL7c2@C4s7>K@Sb$|yFQR9Uky{i6l4q{zY1ta>0=ap*m!*qpqV?_x9cse6Q zu61@P(svT&kCvFrv%bO>-g3}V5D(4KPU$a*%ohY81#r;I^p1|@9z*f`5*o*KW&@9g^V!RtY+rH=L7pK9XVJ24*b?6!VnE6BtY+vV=&zm4CCl8-fkxB>>#n9?7qX-B}IpMFWIpJ;){ZX9d zmckxS4LwPnb|seinrT0iw)z0&g*}(48{w0RVEp{1+RJr9ysQ|&y6UmpM2Ok$_8w!K zNh+j{?FuW0AOd*IxVEI?xw=DM{PmDqd;NYXp2>TiTSe*1r2S#THC@j~k6IoQc!8Z< zb52&`jRLflG)#mCLikQ6fMqE~*&m{4Hq_=#=oP>+VD%m=WFRkvSQp$WOyWUwPK4lh zBlFnfD1Zu7yDeEQyx-wrNHb9(Cx&Q{{eZWb9D*;UT+29P4V)CK{K}`q8@Nxlf3(oT z4I#p&{&g0uZ;A4it}pb-f93n@`mEV<~zjb;CTQY zglWukszMO*1We{6@AAW32$WpXc1k(OA|-~5Tp7#A?%ld52=m&BQ&JE;nQ0%dJDg;| z9be{!!2w2wj3ayNYA5T+6&zJAjS3gDPUr)gt!7?%N&QF$LwQ81T<8SND z50b8!1Z?>9eaXG7o11c<;?18`;V9~|#86Ox#3!^3 zUmj#ie#1~g6@Y7nqw8WB$rse5FYLP*+G+lYyc1Wg)qlw%m@nEjP!stT;=|yv+c)z- zd4eJ$p3!JkVe4lklyVg2?4h`%4xOp*o7+ToYbAi|ZVQ<;Lq*0YP_m&3uqj()% z_C>T=WDiIa^1A;T+(zaN(jbTegAlcj)OTVodT%sMsd(ajBrG4jG5pBPNlkaFsVj7l zDE_Luk`3;JAbEU`Mw|6Qkw{Oxyo!=Oq0j`-QM~tRTxJP5lzQB=kJq(hg-vV?I}_&S^bAv2_x?>8+230@l;s@GW1~cr$D^V z+WGM>=5n9!V$)jtuKSxV3f=wdE`L8+|2#ZP;dmik?*_JVe97_6Hy$B>r{8Ro@3nf} z>2R&wOOP}9XW4^7-JZA`DoR$!6FTbEteaC`$Cg4~3y7)xrffMUQ*`$9)LX(*2 zA>9sncgNiHVsdA`RDt+Kvn`$qUgtln2AGNejK|h5U(ewK zZ)%>;zAmHqnC+g@qIiZc#xvjW10!d~K$K6kuZSqn;3U0%B%AU2?5d$0it1|JUPoFa zW2UIxjKcR?mu$Hn%M*+}iP9UpY2oEr_bs!=9G|-KFU|h)E8nULgLBmdLr4~qIg|A4>Z6(RfAX z6ZsY?9UnUgqKyGASG8CVQjO*&-}lcyrtajkfAO(8}o66LdW*8_OA0J zp$GcFu7me6`_XGAV_4@&lkcfr!?I3w(f!Q;-A6hDQZVd=7-{_HLvtnEx*w8?S^2U$ zuSW=laeq#g7*-Ab)swE#(s%X(#w8#NCHT^}nIxTZ2$ulV_#+uxdv#oHv$zmJZF~+qf>oL`x*@xZRUb*|{jwj< z^sk72sZ^&{&yY(m+OBfn%hkdbH-(tl_}GjHZGruf@qb^!1ok-5c|j1bs#OPqoN2DU zF>fKyytI|fy~Ujb0G6MU%hE1$!B6frn~CM<@Pb0O_nDz-@>|?qCT8cS(>V_&s=dUu zSRrXqtTNqeC5<20Lw14oplBoi?#B<@>S=0IJNJ_Z(y>|DR49(dYY*xTEuij{U%;EH zRp+(;0pPj%K%JB~e|8?j!Q^#wVyyUnwnD`2gEw@Jprk7vkn`G8$g>-s`-#ampe!ZT zJ6|be*VuoA=k;Qhk@@hsUP(;`xOxA_`_4KvB4ya}Is0Il_;Lh3LfqD`AiY0XI671a zOk+ma#NU-Kxrv&LZClKkG&x^mtnNf1R}jt?$O9`7;n z5ag?;F0eAnV0^WHue<(&*nzsK{O$Lq-^D<$NnFDVROn@<mR|ltJh;~@UOm&xXxi5@ET;b^#Syy zGCtU8SiLoAJD|>d2nhArH^cx zL1QssG~B$C{}5*b$R`c3ik;MXfZ|T2l7^qhaOEq99i)~lgC|xW)M+|~t>t}>uK>7H zjnjpy+yqiv&e-?XEoUj-w>qZrdTWEdU4_jC6JD#Sk<&g?HRrO&)}K9GkLEt-BeZx% z+Q3YU#U{Z?o?qgnc+VSwQL@D0y;f_Ck%d^NZCh?I5c6^Du1t0xj)%o7zt{hmzu_bC z$nTBM^&6VIlU$7AGeJZ7ujqyNhWJ2QEw<+MCHl13>l@GzY1d5nHfJtj>@P_N(9U!N ztqfM{V+=hlhq^-y${+Pyb3WVC`sqCJ?c?tEH=>|J^nQp4w_#^n*tWp#9=1p9@C*QX zS2#J94s|dGCaXB@_)XS5RInifJw?iW10hdO+3 z{3Y%aEXPg9OvgTJA^+F)d1q3U6(=hEosBUL@aal5bemDezleVtuTPMhFexw7vExmY zS%rD^N=daYFm=DkBZbLbc}YK#(*vX^hI~pwZ=IVT_?c(sfmV`K%o~|sgBc~C!g-(K z7;g99uYOkGg@HJ)jui^<8{`b-^pIV*FrF4NFFt;uMxm90WSD(l0o2FGUM;xa{bvHE z-Xsg%(NDeZbPecg6*aWzDgUm`jZ(66Qfahv)&$DK?6A zqOT!@bfvuG6aUzjq{oD zTK%G2M1G~nH3a$B>4vH$8u7-w<3NO!fO~0IK&8O6AS+a3C#TTMeQipQjsP<|ycDci zR~{e;ba`>$TzPw1&Uc~l+edDPZ~gVfF4>{=MXJ%8!#dSjX1xV~(2|=&gK%;EYE8zE zV~MKdD1biNPXvf?BL`4|gKS)!@w$!#&fP+h(4nsDJQVUH8PN&Gg{qc^MIWR9Bx94!`rMBmspKM*a#jtf>dzofYN|?R(VT%75cX-o;44K;egD(Fc;dNtE z8;$$k6B`HaefIRXm>(RU`-*y((_PD4ny$Iv!b?KMY41gAWOU>$OoVT}FWK@>zQmie z_hP<$Zu?No`q4-sD-O`#n+NkG1x=3ey%1z@IS|bvc9cYRFDGk389Mj zz1Iw)O2FjCyf1{soBlH>rdaofybQhFClvebgG2sxCuYz!VDjw5T{?v{Ckzw?8gr#qWA8Y3*v_O`moa z+I&gc1NZ6;GW7uxS&KgS;UMNbh0cH9Qc`rkq8G5MSyLU_!4H9=RC4uaJbh^<@Pm7O zUh=y5y*Id)OlZy!9Qp{*Utp}EsdAsB+5q*#r62*4^RfEVo`0^1)R}~MqdB){%MzL& zgf0y_SMM>x!~%P-i@#c6&WD6w`AQ3|AB?L$Xg|SnrT{042ky4~E-m&u z#isYMs-}y#*X^_VzLl7l*yuh7PU@{~K8p!#E(#zJZ@9=zP%3rYDAj$ZbfSW2@1WVD zpTXS#u>onLps*O_y(tYm>90aP&%kf4zW{xcpz`tRmr8pBL?|fw8O!n& zrQlv!R#eCc&?$b!!`58q;&ojn|ZD*mt@`*Y%ez8;;8}UVK8*!}}n~B742Q*@bPq|OK8m@f(^ikil z*Qw`x#j6MY_+#*y!|P|JNZkQ5?^4wwJRy)}Q*g#ja}{{Hhjnpr6o?pc2_Uld&o{1O zX@W^nWYUa%>q17}(rinhEyVbpPHG9uK&N_Ql3JJI-VQA+xa~ z-s6$n*YMNz3YkY3N(Pl_ig`_D27%7V!}EINPL>y!bO03*24dLF*zTbOWZYF7k*sG~ zTBD+Vzmeb3o)s|V>PrD-tY1L0;xzA;>q9=E>6MuTJyQa zEaO}S&NZb-Pq3Zu7lgI^bDQ`F4F;&)%5)FSRh{S%o#B_z+b<)eVhHaA9!9UpcCiM4lNwIk&;>wu`Icv8*4w>i zNLoorkiQlJ=z5BG&^U8Xcbeah!$cN(mrUCl!gm1ikmn^eEQw+d_t36>@*O1e{Hhmh z#UmVFzy`QELKkr?1LTPKREQYnUPVZJk?(vlzd7I%b;U|`*8%Uz##y`j4{_|65Dn<1o2td#s%uf| zEBq!or(c40H--huS4R(Be}|2G??Wzaf64S0Dtg(|yk?Gqdu|4Z=7ZLNRJKqoZ9Fp* zY&1kFjLz(dJWG^vvD6Y;4<;lwlL)q@d=B1gp%Arz5Nv=j2|R7v6$ke(-Z+G|Hh77| zOicSclTa5w$EDTe(y|gCy@k~$iq`R=pMWi%1_-fAn3nX;=m)R@^7Z3j5`-SeJl3*S z11Y}|qkSPRSI{s0sF~bB*jWBYKU#M@FVk?^Q#9s_1_?6YDpGLATA(KC`CMbrkrPBo z^ll{Kd{6BcSoNh%NF{@Euj@lnDV${sX)|pk1?BV3bB2vYWPDqMZWSO03VG?f@CMUC znE?N|%j~o8viD679ZdVHm z7Q4UB2YW=5y6h&)FZaZ9h5hQV5bN)V8R9f^^Yz~QESaqwN#Upk(w-HDf{3ng=?q{a zp8?4*VgtE623>%9b=xazbL4^i8wWXN{2?NIuK?js?5$J2zFQFHY=9|o|W4}x%)a_f{jPoSV+&%@`EU@8*&sO2BE0KfX zgRUk8&Kmh+FP3|_%aF<=7D(l?uvLo-W^fCiyWQmK_&@h=@ED4Fzr>Cjoz4ESIcGIJ zZmg2M^4`vgEqywDZyT%CUbal+474ii`%U@ri+eN|NgX%(cy4F;%vRVF3UxAJB3Whc zw!N;+MScb1o_$wE%_AHLGFzmeYYlW4ej+Kwh2XGQz#({_IGvG6M(3GJ+0kA%ZtF%bFgetPCoQh`Vo=@5VybKrszOzaoYhy5v6ASz7P@0DHoe+Ja)% z`Pw0ye|1|!x980ce6Q{CmcB0H<<{DI7J1}-&vy(kV@yc!S8a04P&065*yShfMYU=W z2Xxhn-^C=twJ>ay+MV882A=?`DhFb%Ul~)u=aAgiL&_KSl3f!Khdy-D)36S%Bg#cc z6k8%--u3=~cDcO#ct8)LGyLKb<|(U`$3~LRp>ocH22T?qvy1!WX1~=_g=IPan<}Tb zISC})?FfA3dSblJBh5W|858bAbp=l>fF=0O>;okf46Yi$rfE&7OQ5T$Zy7+bHXbEX zsDKNrZEp-$Hv^mdm21~D5hmLZ7n^zM7ao*0yZBdUC{Onm_;@lGia1oEU4a{R%nyl# zsU;~dahE~stOF1WyE`v<;QmDFxE~W7#>kF0fs~NfyGj1kF%vci8}D1Y8w(7ZR7vT`nB$$N};d zI$mW@A<)Rj?8o_kYjRMPf2a;px*<1VUyrkCG0RgArlzWeqdO@sGcT?o{H}b9Ar#ev zV)&jFiwkX$zcWDwKy0?tTsYv}o_;e`fkx!fGo5XVPL^}a896ES_cqNXaFIjgJVgmw zb_t~ZSsR;U-Un9xNzz-a_!L==13{q|=lgii#*;}!<6Q}5DEi(M;YHQ{qLTZSK2!d& zaBS^N!5c08l7V_P*O6hOV!9Ef*1`1y=T^9=Wro5Ow5ZLyv)R0|>vf?#(uyrAdF(WB z?|ZX9CP?_|kIfCX34Pv0_LGH^rC`->%fs2(QZuYKu-O@l9ggrwq@~I{-yhp8Q!|58!@A+SCE$ZKJl!+yC zHXyP|I~mN>t>*zZePGAeT-)YC-i&@;$`A|mCqnky(sirV(&H*z24w?{P61V;TG9ij z1C!doU=7I2?4w-$*!<&sv z#>)CYTi@8$be8Gn6~h@m5#Zd|hI6S>_XTK9W@AS~ zx5t1()#$@_jhTkIN<5cpXi7d?X|oT27$+TT2yc!GVBJt?DE4GlEjjXfY|g8xFK|%a*GiX?#&{%HV(rP=7W~d z%LRc$#n*H8nGn2Y1r7*w45E_0PHH%NV`FtVJM7nQr2uy4FHbXxq}^*Xa125I$IWCn z1WpvhL5dDTI1?Pu2;m}hLhrtSq5Vx8y1#bpGXs5|5YZ>R@ORFDPKsR?$6bv{m#ivHFE*uJc8ds~qgDI;&kUjsu^%8$5Z(590egHkG zMfB*F0yNXQ|BdL$58@K$Wb~1u0+gcb^txm_f<(PNke}O;z^OK`<`ORA3F&esx$`~h zdFVP$4sva2D(o;2HnDXH0ii7(VK7tSj=hDv9H(C0h zyz(G7lO5Ia#!KvyLA3&zI3fgr+}~zfUtyQ~DtDeNV+){C+Ix}qXJTvTYpfJQ#>J#~oz*;|S--9_9U@zH%g+2Es zW>OX|A;{O;@x6#5vVK-(INIT;S7RQgOL?>2|9$a>O;MBaSMvdoe2IS}?^=))a> z&vkeUI5QN#2<)ubS}TzH_cM2q`W&4|H}p1cYXgZhs=-q`^{*xN<>`NaRU$74lpMnz z$2l_1b0{z`~_!x5Tsg6=U&6vjS6yz1r z6*qMhWogJ-9%%tCE>0>E$^t5%LcVorQA&GmuBE8yysk4U&TK3px}`evsk2$>~$MpS1hJteGdxOzeZV5))Oy;l`drwwM zm9ae~++t0(3cEn(`N1F8nkyFjt~y7bCh)rxLZ!Dw$^%P_U&RQS?yv(sX9F-lu0vRsJS;iDBbOR*H2`9R2{&NLpJ3 z9ktX^5+}ftEZs-lYWPvt8hb~T^y5(G@q-_wy2OJqa$e2mhoa)7us=w@KG;u2 z+DL`jQ3;n4aL`X1yQujnbnDrUle?&UVYz?Hdt6Lha4`^va@)SEHylP|z=8Yb3+8G3 zH|{Ghjgle}JnEqmZ0bLLchDRFV(khRM@IVtT!xlhFVw#d*y?}&iyYydC60be$#sh_ zl7o=K!ba$LH)vTe`HxnF-$_6_00rg^`y$W%$6vWMa-R}wr7L~;SEq*LjV1_3F7p-V(Sx}+tQQX1**5Rg>5JBF^`o}=e^-}kwG z{ByOoEF1iZ2>`I5_Cp%EB_EMR-T_W8tjqf*BoNyd)Zm(nr?%+2J#^ z^H=82o`qOP3tHHHp8l3++8d|qXg-)buj?nK47xv&459PD&~GN9F{J&;vNzXP-gxs_EjQ9sHYWdDgsV>#6*p~F3KsmpRMtiC#(mK7yp8t+3d&gCyD5Uv$4$2E zOo&}cm3LLq^!U$t+k{5<6W5EO+dZyF`?GOgRmWwp-Z~dm=yWyQ?P{~SF01!fC1O^$ z*st7!a?uVss`@PtOf=QZb5_dc|Ngk%J8@Q)bLh-sW~f-opV4CT_R@Nfo644iO&T|( zpv@pzb{)MQ6BoVTDt-6G6%24#f@4d@wL}c+R2u}`WF5)invSNuaOENO@~+zRXFs0e zQa)RdvhNk0^^{~%{Kx<}nJ*?<9=lkNN2}7y^mGx@XG@$Ne80o4Sy^a*|B9PpGg+m| z?x$S(G5RS4>c!)nA4b8aBXYTi=3e!h4xLhAD!4&ZLoS}BIL58V^3cG>YP_=OI3Yy> z;Iv~v8EJ3zHxowX9X%ZbTf-|b@Ebo6db5@>jj950(_eZ;u21Qallu78ZJLhj=LH&3 z%AhD2n3GRCK84hYn!dA3XEmwz=j=houaInEItA6nV>0)uuM!y?+Pu9@C}^O*68ndV zn3f(;yvuiwHh;$1>DS5u?yK2oe$>HwUKT)5f0@$cu=ud0GiZ?>t{NHtQxod7Z(pXJ z{nxz*tULS<0E{6946!$S{;eV|vl4Rkh)(+nmPON&DKWMIQHD5DXxxF}PNe@fC}G^H zVc;-S#p-`9hE2-N>XqxsXh>DfQue`{Tm2*@<`+87tmvB6sLI{?tN6g+yo7#Gjk=~R z8do)Yo>%U^3lsD@*FYG7VmiH^I8J)Ap4j+z?=X`Vjrfjv8H^q z1enfo3Mm4rFN*b8fzMH$N9sfNBbza)gjztNDPku`;SK%Q7)P|$>_OV)G~a@LRlHcA z^yf!g;?YiUv0lxm6B(Wm<{SY`IG$X437%ZeS#b8jClj?d2lr&t`ARhG$8?x>g&E5t zu4xUS-?JaP3{GC4!lY-sG@rPDBzzG2(i)P0EHVt!9H0W!4Z@>Rq?*0lKW-QUJbPW$ z4kkIe<6MrH6A!vmShL_L`{b^3xO1!1_6as;vNN)UXGLD3Jcq75(GdH#KxrLw36jCfE>7NfoRI!>y~&H1BDqN_p4<;%QX=KEY4tt+;UWwrk1uCI%Ksf7|7{FHT-p>N7X|T&=JoF-3D_QA(&ixS`I6|r?>TMG6 z`kMUE7);!%k#?PWPb4J5*l;uok=lms?kfuDvytqYJ9zLeqH_CL5q*rWDDQdJqLlB1 zzIxJ&(@;$}Ojnv^T;Ff&=`hTC* z`j4#Ix|lUvuO14hDD1myZPryFk^`;=dkcZVc2VISVHETi$2;Kzy=bu?dA#c+SUSwp z>@V}}7uv8k=uC}uPyYMag>As-HWZVkL;ty&Rssh9BtF<;a@U}+u8x0?KFR5FiaNvM z{Q5AucJ69*4Y(>B;45HQsWp%aW3F*riT(1N%_g|JbtKEfwO?8i?_NBb$=*A<)jOH; zz65D=E?ur=cQ8>LRWO=v`Ib3%-$kaC@m_|mM9l@c+~Jwm1+%tF=~)uQLpuhG!L;YQ z_r~AUy+Wcp61WY=_KMPAaLd}gb5_IRR}Y0zDv=RWApT^}_4uWMMB7@w=Ll0&hD>vK z$(=}y7iw0c_mk>8J$%rk)L;cX!8F#EWD%e8gnfyQUOT!;R*_@WrDFbm zX?PyoNi=Of5G&gmIhcjiv?g));-G{@vfwx-R(0}71_7JRgB3SlvBqY2)zZ#>} zxNOG5NB1;19D5^e%qNF)N?msiyuN6Z=zn~8!iGN8FdtMfR} zJn9f5vL&XLT&m6utj(Di&Vb@Rg?y~6_k$Kg+z><$(t9%2Xx?va+X{B1jL*Mxnf7t4 z-lmzZx2Y2O-MdLAX=o{ml?HjZB~Shnj4!ga%W^*kybIWfW=A6>$DfO=x&kH`^T9HbYOF9diU)&`Z+9IMDLc@7X8U_n8IV_UT0vipb6&#&j8XZ4h-h3R%%S+%Yp^` zQPK2d&*E|{9?B?B)1`OSsq>r76`HBl$thyV#sDm!9346iv5I|KPaNCtiVqw~eC&6S zEz78+RmEnZD{A%dM?s8BV|2TCGdxS%#*KCEj!0(C!|YI%!afSVjcZ?=H1nU8ij+rf zD6~;uDO5-%^LVUg3X^tZw8^^@CaWaQ95-@W-xPaUd3w=lgnh4d-eCZV@?l#)2smvF zIf4xNl8s6GTBQfBaz?3H&)RjM;`7gX+Ms)fBaHj%mJ--Qq9yDh9JVcB+j)jfdF94* zY9)61xU<$OjcFPMI@0w46X~6~PH6q=-CBbti~Ady3P$)?86M8NnGx@pH3@pJrfrT3 zfIHo4uie-^cisA|v2t^{zNT}DJN0p|Ph*wZJ)a*2xpu`I-RH`CMYAmQV`<@2i_Psp zkzYGxSm#VZE$h)EvGVX;zP)^=2I0wKB!{NkoEIk7E;H16{-R;G06Yifz`BgM0o(bk zu?~YvmKZSKt@qOgm7f}WUU`QmO0*B4!1fUjfK*R8|Hc5}p2!al&6z+#2+0ef6!HrPA zw@veHxX3JAd_zf;qu+uij@wl)>V?z&?A=etrJEWuHO^NyNj3F_56>LaJSq40Yyn#B zJ;;Yh!MdPvAa2VAAU!|FkvP6@CNIxv7bLpByeA597biz>=18dhxCn0 zo+={_9)2EeX^~*Go#K(rf-*;aMgQ7b>9)zEeJqg}XzELn#?Y}8ZTL|3Uif?z5#}9O z7>Z{{1ZCbCd~4L zow&5UEhR^x_)KZ95+0a5MK%kYf|sf)Ph&v;G;FAQE^7!_Dj5Lt`rhrAyf7u??cz$B zE-evU|I%klVW$c#N;cE=X@b5~c6!y_+95 zdYzlY)d1D%g;MLt?(z2Y_kq7+Kh~~^cUOIa)-2eH!` zRpsfW^O<@dv~a&C>Mg>lur0*4`F(ErHU8d-zkv;p)|XIO4t!6`QU)HAxbpB?&P zZ@lsPx%F7#=XB5)G$IF1%`Vgg!Gp}Jg6W(hH}>^M@iW1%2M#A!_@1U~cRJcNoZcz7 z8CUwqZ(p1~i&TU_D(POAHFk9#dhnh~P7QU%J1ARX)IRO!_LrV()f_dX&DT!X6+kl}pCVEWvesHt6$( znX+*KnG9sM_9bER7!;;N45V&eYz10+Daaizb<=~X zdkiqJS``yy5YB7GM#w;j)aC|2FTl}93|~6LEu*&VxD-*OXXHwy#&OxX^t)Lv>2D?w zNk;;}^*i^^57Tc7#c)oMWM?dVe0%{c8bQZw;gerZ*h!X@og&ES^oBoq0eF(JC(;oL z)%Z(DO1e1qxglXt(ag$RfIa?WJBgtY*sab#%JM~GK*SQMzGBbkw29!y@Uh-t*} zhu#j-tkS9^3_{Y4TdJy!7k)_#kNOVofp^J4^uD(z^BTRHOM@M?e zGrWarN)W?4Ej-W`2d&}5+y6|Ld6O>Ni3-jfPLM6%I(J!T(EJjK+8B^Z2v#51EqRu% z6cS&&YP@4G_N+2JpROtLhW9?n*dBlm+$ zGt{mi%s4K69lEzfO>Ivm=`-0HXV4yEvU`FmACf`=@H~+Nj`chuX(neN7s$1=v>;yc zBOTWQdYzZ;fh0z4?RV|TjR;V;Ai=-TlU2ANz28hai6bF?m~;;J6#`#B%phnAd0ZpQ zKhJ{nhuAH0SE7G+V_x%RXX<1DweUz1g;zL;Fws4-9(@NVV;#U}s(W|5+!ZBBN8}z! zPNo5j32RvUz#j55w7W%n;q3zb8p_6=``qR2J_suipuADJP{h}Ot`^N}CdY|y533tb z!Ms?|X?EYhheKN4ZJGfS2*Rn?g7g8CXT1Ki#Oax6zT|&qb=V9T9w`?1Cu3sJ6^s-5 zzZa9s*~U6hMCpn~f3=5KS4R*|Uc>IZO)FP1}#GwKEa(?C2XG|wr6NxBG58L#OBeB~tH z-uW^3Wc+qUv@6VH$;m9F+?m8ygUix)1+Y?=%WH$U(qZH8;AP#lxBvA9?$C^X`>R%5$g7;ed zxl*Chbt9GKm;?Fi8 zt|d1fNT+}@f${4mcBY2%ACxO&U`B$jaUGJRsH_RLPeXVRrd95Y`0-znDKL*0tt`L8 z307HmC(|67lJO%%jTqCFMFN_1&TkXvdbd0h?5yFQFB=q8q+U7|Z&GNX)L$bNtghSr zyXNgMsqvi-K7aX7a{r%ehq~UWYhk+h?RM#gk(D6aSZ#C|gGf0Yesgt_1@h=jHLPmc zL$C3?KVvlTJV2X*yv6(}wp87mg%LsOoyqKj3+3XvbITIdNL<0Yo3I5PUwn-g>jzUZ8eJ~?Pr#_$>s2u|i8Y#_|1(E~U|!K@NLvdb@n*&i;cXF}L%(FUm? zxMX~FD0MMXOfi9Bw8h$iVQ$=xdY70a`&_G^^+sERlDa?jb_Z0eL<`5ejJA5uoUh?5 z6ACRHks9$T3_zJTKGpjPV+%Bh(H&>C-K2A6ZUVH5U&!(7f?!-oL!f~)S4LZs6&iuq&{xJ?W$6&>V}dd)xH0e?-TW8!Wi z#ac)`Cf~wGqGx&$TDv~;*ycaRJ5xmi53uAzl^03V|6{gdbwft2IsB6T9(XY7(O}IA*1-kUkt*w5PN3BsHo@(vJK$hKPkAxZO1}@1~ae z?_bx>cJM(6&=fC}2;jigazMP$D>ssvcfNa3PA8`www zyd{O)yb=KnxP*FMEa;Jx57(*4@!TwqZoI%`y>519<$di>ymcP6ls~35Y|+a|$BKKJ zh~D^TO!>E+IMm?8^{OQk7?gr~48H>m!SF|Fq$To1#V-8=3bd$sWX& z6k2;<{{>CL6b?R^C4oV?{Rg@0F)zj?k$SkV90NReMr@NNC`T6js`HI!()uEcE?xAf zs=j{6Cqd+jw0Es3wu4;|@yP~QMf)4szH;6LC>}$D>T|sVsyQ@#jh6kLK-nJ|m6@yQj0u0&~CDYT`q3rS@MQ{7&L?1i)OY(XY+a^UB>ZjN!)( z$kdr^{6pD?iOrP3C$Y^prVU41oA}xjTr$V6kjPx5?o$5hhaTv^%#AsC+i=d3?lqC% z7=6*_ey&2+JMnaLFUiL(-iChjE;F3{ySIH(B74luRx9tdM^%Ku&g9Hi_up^d|9N-V z@UDUw5vLcdLgt@6tFP*QX~%Vi?Apt9KJUyKO}SEo?|6H8U3aFNtp-sJ+x*5_uf5LJ zFnq1T=IJCw(+DLcWiwXgX`O}8?KX-^0S`ShU?9b5^I2>#P7}Lv3;<6ag9Y?0t=YCl%c%R5Paciw=~~Uf zCzUij8I1sRERLL&oEO=Zaj zS#hhuRQ5b%Fio-mo4BjQfUk*U3bJPGIM9D=X-J*?*ftuZP2^V;C~_PYpKe$Y6B5z^ zwoQDFe0&$^iXd)L!7$UWha->HnY0@~@k53#rVD!$lLd2a_##()PC5=PO^ICMxe>$0+v zP`11hrv0zNY#z~@+aIZ0FedfeuiZeI20_enf4OnulOX)EVr_y1_lIK!2Kxh>^g^Md z&G3y1-Kw0Uo*1Ni^ri%Uush?$-0fn;EYVoNoB`Fg~ zuof8zznaZh6U+*ym$@?@@bSJjulw?{&oj_~xCGAAAG?ya zFOD_~Y?~G_jfhDdSN|uptEPtvYfKU1Br}BTbBUbb*PJFK^!NS!fd=TG{yseLN|IA` zHTpKLj`v%Rk-~8~?j_NS?m#cHEV;|)i*M3vTeC1)3xb!GL~jmgC>n1{iM@Qj1m-AS zP!0uP;6NXNnL-qZPg$!i`J*57dd`}3UpKu3%^A+5g-Ndtjv&)AL zwuV5=mB;}zC`)~?hD3opt)+)d7%>bnqHRVVZ(iS z0a_&P<;_QCPR+E~bUSrpQ`8mR23h(W40|EY!3zM^DwxP{{fev)9RAFM@-)wOcQ;N1!Kxy`aVhT*RCVj1qDqtlnx?C{Q{4 z(>BLT9eKk$AoZc$Bjn_Sz4Dsp(?UGo;Ar~s5(4b!E zdvP%+&V0Gnm()^mDO6$8Tj%a{WW=9uXgIxfZgjlFktmLz{sZhcp527!W&iFmIhZVV zavV9Kcnn6rFC6Y7F1HnHqUn+^1w3OfPk%7~dl}8~ZPLSHDSvxx;#)W4!aYep^42W9 z`Xvp2C0wv2)KB=(jPnAdWdAun~-p10Vd~ytyIpuDD3PhpM zRY1AEgMv_@5Z4hIO?-62;8I)tYS!3Cg64!F^! zLBJhZQw}m;-|>7U98C^p+)%KVHH&nlCBKs^KyX8nWWVd>tB4o54!2=prvl-Q4h)co z@_bRu^>|mJ8Q)(_k!v%##4KXepBUJ9;jc9Z1PedmqByk19T6%f@_Q#qsMhEWQ{?Fv zhb`DJN5E%65l|RNU>*_{Y1em*Cp;>B*^bSb2e0@d#8pfKBK`g(h+oHEJED`vspY!h z0v3rBr#~0o(ed%nfE@x*L)L!+GP!}7ZfNkY#NE+y5q`Ti?p|Z*(WOrGL_7(HR~Re6 z5&wLgjwzAM=TiIF;8L~H;8d0rTEh_3^F00`im)0428kf${8+$`6JuS47eQHPglrK{ z6KP5Y!#cT&FVC}W5(bdP;J=}6>bcIW)Woz3(~o!8=_hbVIQA&H$u|~R^^sCpWFcUx z$pP_`xC5e=PqZiXa*ZqXiEQ%8%m_0aRAuwu9=t!M5K3kfdD`0Qbr@6H+l{f6BtU6iqGCur|HBOHF zy=Df6Z`9a{Ps`}~u={T-R{k3m=L540<-F&e4-E&ybsM|tS`*BMXAVm*5xA4D7ori= zJkRR=caBF{dOCa4rOTEb<( z7is4P&|eA6YQE6B<$#Y1MIim$fxEzFO<0&!urGuwqz@kSg>XfE)=bg4QZFRZ;ZM zmpCs}Lxp{osuyKbf6=;t29=ATAA?}aAdIN~W5njobi;zD1f4TA3WtYc8FqLEG0Oia zjjpk@!Wz_7X;!lQvUKAaHP7~l+rf!{9Zc*JaVw5@7Ywvc#z(?Rs5 zVyVsL^WL%&tDsGKY?`aeSo#^Ab^q0-UB)WVgAaZ=4O;m-jpiy+cE@ujgE00}aN)9M zQ1U@IQmw|(EH&}L8F1akNl-<95(Q~hkTzDF1er%AAw$o7>EF8`u?^0Xq|`E8{y>{b z0C4FZ@XR6ET zsUnh0c?+~LSH*)Po)l*Y;s7On04PPXhqvVIgx03Pr6W#JNPf&Igin^vC%m`U(;6@k zl4qjU0gA5>pW}RIfJTdKA$6`nlNI{~qOSRZ%3`;uR)oMw$n&>1c>4d~7b;JFup+cX zVlrN&%a0B#&jA(yc-B&z%|=zE`k$+WUl51_=35Ij;QQP>bzyL#=c;p?Ynssm-oR01 zei?E3@PLBiS{y^$L*$r%foUkfq6w4)lJvPT>%9BsJ|9Fjy4ew=5fmJ}X-dd~7)N!RB!9v{T5wJ{B)oa+2{t}p|}qYA|qY^ zQ;~TJffJZ!KEwIxOx);p|?T*YJt(0T6^nWzvU4+foc+5soH zC%8*LKk0jZzzl6k#z3+56$H+m@u6oTCW;>)B1INKVdu+s-n5S)6Es?jN2jeG76AWn zetvZ_J8qLp)D-L>T~4QhIdSEi1~zk2vhGg&(As zYT<)je%~7t@X{6IT~_U%ZoAw7bG?%JU|LZP4{}6&L%l{v6|jkG@Pt#Rd`OmzjFYK( zX%xvfzb?fupT7d1CCM;PvqCJ(4|_5E8T8oTJOURLvUwf1qewSFAggY;G@(c7(JPP> zeq9G-r}OUsBqBukC<&UdfU`DV7AS*@4F9Y`gfKHCEg8h#)`>tgiyeUc%gIHPpy>-O z4q5{+s79=!Pp>vIij7;}TGcDLp`dv93h3eMwYZe*U?3nLp%!Vhe{O3mN#xXa!4Lh( z+WMS_{$jGEn(>Tx(nxV+3fEZ}RsLz?uzR1Iw(Iq*s>km}%uEOZ$@Gr~M=)7HToi%f zU>^3cmq;leB!&?RNn3)AT}?KK#Qo^SA?3(7)*2n(}ND8 z8sKEjyjakm>$p1?m_Pu*qA$PYvOX-m*|8YxsAoV3P`NB%65qr=ufbsX6vTOs>6$oX zf9ea6IP%{Qw47gGRd4I2>IqTW z+%3P*-IofcC%^Y)e%vDri#Ux>&*C&^CP<{@j9qV8YVuqR7VspC-Ei9A!U1zit=i=d0 zP}>tnnEow77K9TTd@ms4!;seXshI;r~WFW<$P}>nfVo-p>6czThS+=zSJFHb*=m%oBLPjf&RmH1s^fx+S&T5;nLdA zWXG+GXNyP8>>^Kmo;Tz)!P%)sU`SJ%^qBvoO-q*uc zhGMu6ff+-EBFCc83K((pAX8N*80P}YB0K!#7(H#6=#mhf%2v!P)UHVT;474;5N1t& zei+w-vY1}9rIrU*($l^g5DrI3R7`J$-zK;6{@)J;PW<=VHi3+H!4Li+P%3}LGHQD? z`bU;nx9Ua862d(HCN^Pl;zp){*8i@0xE z>}QFbS&xwA^Nz;uElj@?8SW<>(5W960%n9rGGlQw%ZR8ML(7Bis#~x zdaU4~XnJEP{kW0#U^{(zWnnd2yS*)%_qp#?U!Q;9pI1q&0J5A+#mK38402~mRP^tp zXyLtsPm9+NK&VExC91meG_v{3#vCYozB*6{LW_E_!}Vgu!Y=vZ!R+yc(#?}E@wM#N z{%Mh;(T~00vLvKj&*c~sY$$J-ZYIw(&&-w$rCwahHf&wI&+d+u6ekd4F`{tj`v(B2 zmWx?Ez+wD9qK;mpw?0Vv(;}&Nz~0{rsHgvVQDF`~j-bcA-Vh5Dex9xtd3f_&kmct2 zQO0G%7~Prr_PZxr5f%8|J{M!6>Sq~tuA&{4SY)6WlhLY`Pu4A%FgjOC|Lkik<^2nT z=xJR8V(tAxs-*Kz#63|`EgMI%cW^z{j!)1$d?f&va#XgWEb`%JG`kCyzMso8Ro0Ud z);|jgvGRncVQg7k8=iX0$uN<{iGOa96EzO8 zY12W&Wl@{7gmh97=6?1@dizEqHdfxH$UD?eW#2M+-9N#tc~WkCUmx@ng3V?!mGEmZ zywfc(gB8-o8;rb;Y9)lIg)Fo?AM6+nB3qL7GQ=a$xflT*62vPGTz4kuKpi8z5YoH# z<9}xRfA2fky;`3kC$a09)32{Y9M!*s3$S-jQ^!1{j*#y;?qpOyAu3(pQ|2{qKRLMZ z6(I4NzVM^=kx$IP=!y|62y~@F2DYL#SS7RVf*1~VZGGYlE9)6bFSP|lFWi%Uf#|@* zl}pmlG6}1yfW~m;r3&xEZ8Gf+eP7%(uJ-q&KavLtTZ82T&X01eVwlwGb)M^|b67<` znS1trse5$zZO}%8FL6up#DI^kL0OS*=dpd`k+OEp%OJ$sj6RaRi5(4O4Bc^cri*X- zOCr0cJ&k1wnt01hiU%LAT{karpGAV;7wk3F*XyhE^=msAoypd&t*BYqhc`7RhzCg} zT-U);;q;r6v)c(w)}m!Hf8{i}cNxK6z)V^|YFW>x_m$hQp|GU>Lg28nxd?xhtE&FS zu>@3s%Kol*->y9QcyoN+@p$ID`yg(vYqHqN6t$&xM#HcEiLu&x_SQzKUB{av*XdQe zmEYHPy;tML9JRV<--=GWD}7WB$A~OpD=_=IX^-iZ#$UAqHm17?HEtbJo`n*A8lEk}toR-&Y;)tdsU_4dOzz4WDvr-~HymmX)5MVMzLJy8Z? zezf@Udtwn1X|L|i*w$s+kIJJ+eu=d*J(%-(zvU%sXYVQQeRj-!(EGmeT_Ie_v_IW+ znfWGCVO?F;QcI_MZzec8^9*9BZH3wb6?^*Q{x0$mlcU;t8(ZI(Ml9SDWZ}S$m*mzr z>ZTlzs$y)biCm>^ona8|LB(_bI+|`3ERI#%7aVuEx=1127K_}5l4Q< zE^nE6&u+Q(HvkI9NW;Obcwl1KwfcvX`Wte-7b(ns9Z|NH>=yvT$PK5lr#8q+jqN-h z-Lz%iHm@mY4NtW}>-_+QohLWw16yvDi-`mOBDwn8C%F&8cLT_6v#3W~6Mxv<*ybl( z^nulONV?&D-88Gk|h<43*)5XAh z2Vk1?y9`SIh<1i{H}^prXcLSk*2(tY9&M83241`Zk%aHBmfjKadjAqY(l4FYe`z8S`f z0ZA6Lw8s=59^+);v%e@DvXzf#;hMeKtJnCfC!0`qy;(wbdVHg5j|jfl(5ZbBo`U#& z2T*9A@tWNkr}Vaan5US^mL5)#h2isM_mLNI}1I`bCi>{pw<_AK?C&AbXug?a0lKAqJszKu^(ytw-SK}xW(}kJrh*s92KbZAVsJXc2!y$reVvt|@mjjz(q~71tK^gUKm{)(cN%*DMOsw%v(kY1*z)XGjK&uY z*-kc4&&3OHxW)evT(_pj8zj_lgsKGHq}po z$3C+A0e%M?w~6ps2}k`9mqYfcxyE;{B#Zg{>-?c|+pQm5yY(wf5Ud2^Un zT4S+vkq+L*x5W>KzFvZw2Jm%8YVMgsLC|BC1|`~9^n5&FVs0Kk6t;PY766?+V63(8 zLL7}}w{*_R{!|{2TgM;hvY353W9apL>&qp#y9e7f=`n-A5D{sbYKw3) zO(Qx;7jhOFe*ML;$Jj}>2wb~4dNrl+vge@Gz;ftt`(PPfc6*Cl;I;3JM$}?3Paz0l z_K?gTFZaYEOJUdgr9kQ4tRh%UOoo||yePd3IKcEwrG_iI+ z31M`~4TBR+)M|2j4RSy7B{MKF>`!Li94l6*otx!$MA^?VD6%HOJ=6i^tMHY*kG29| zJ0qxL3blD{D7D|7;Gg+JR77X0>C!*k%b6aj9BW9XQ}S*?n|TVv;gKtzx%evYG8vOU z>+bu(j9^(NB2SC0R@X-{=E9W7z~WG@{cOYcG_S;^gOAB1v>4#erB1obXzEB#2OS%T zCK~`r5D8Acy2f}x%%!Kr+yI>YDq0dS&y&MNLW3vep&{iqWG4i^pFo4RwYyuEfO4D& zsHhIYCMn;(_R7V}cn+Gyj;>9>$WQ18h9$%fIGBrP$bW?z#cm(xc-u+&VIqs+Ts{rL zux98|aNJDy=!u8WOTqyPB1>Thf5!X5wmXt8V5asfXIf_%k+1K!m!6i~t5{xH^}ov^d+@vk*cIdbfUeiQ3Ph4>D4l0O6W)<4kfEc&X`q zAcyrBiLbdXuXcUL56|p;{SSk$9ifnAf!tqxBm86P5l@O|_K(v-Uu}M1ym8-+FT*!M z%WqB&OSTxG84#~@Sq*=Z`}~W>k8jJtPmCxtfVvLm<8 zX)6sP#r$Q9V4M3LHykXi8Z^Yv?T*ZMyU?S?n~O%5y3;Ln(N#7VlrIo#Fx70>)cOcE zknJ*yI#)ay7V`s?!>46V2MQrxQ4w0)HHP=XM3^@{r{^d6R;G8CeF_L?;v&WIZx?pQ z>$Y5Y6Qc=?2PuiUu@4<^k{& z&vq}%{m#8Bdhsf3rqJ#1)TnSVf!vM*nS}=WBLld3KO1hjVW1EILL7s<7e97!_*QE; z8viwf$xg2~fjzHxoyMd^Q5yJ(iM<{8o=s0z+2m#F`L%TRK?fGl)@rtEZ|l{&>+aNP z04%*s4oEH}#&Vr_t@8SD0{7`1avs{LL;qd5hKTAaOVFwe7v8(-{SF3ea_#R)yk>JM zNIvoWSgwsc;At4&zhnWEdZkE;Cv{|NqD1y~Zy=a%f)FF{rO@N)0bz;o8O(3`c}l6- zZu<+^PJ8~eo}mYygO63YGu}OT6XR&1P)UJtoGj|oup`rGNj5M1i#=N*Nevml2NUX% zWjCX0S^lrS51KDP?oLDKK^~qazgJc`1cT{{<76zN#zd^~9ufe^ljtf} zX==M8>a}yzt!eiY6dj1eM1)tJOKGDGS*A;v;0YxnBH8-5lO7ARb>GaV2VDbF1fkwS zyKJsS^049dtyjH({OjBYQL#%wrPw5=IadLRd35JdNt)B0TMdv;xoKt|@UFru8v4`mruo|42-xmEmmZLu^~M+&gi2;nDB5+{NE0UM4T~MC%M^V}aDnY&0I0nl-s)Mi~r+JuhLT9CMPrgOV6?WZ1HwXHV7 zf#4xo&{*dtj_)!b)mkF%ndCImA=}$Pg@2qU3St&vdX(!l{I@{h=I0QnUEQAbCukuE zCc)93ezKk;-Fugu1mKFj7A8+^DDNB#>)^Z@a#~z9G;K*c9DdWTdbYAg60Z6PX%_%i zXC6AUm+$lX!JuKZ05V7-%y4R8;@Iy>Glw=LadQU6n9BwwkDGJ1Z~F#lqBaF}mlnie zai-yW4t~RrvE49*&BiH&)qGH^JeR$dXePoDz@i2H0ePqo$7+Dv{`PAbYS8(m9)@<(ouZq99~cj;I!c4m$C>?G_;tp= z$Td5{uOU^KBuj_Nlqji)$#BA^Fz;%oFqaf|F}j^I0oRGQ*9ic6JIKG`ND$rdT0a99 z>EXa?uJ#tO9vZRS5)|~_x1bQ7J<%_l{}|8rYM$iGUf6?;*>osiJ~QS)S)eN=GsQHmy^O}eF3)j2U)`~+p?jbyVp2N)4a^CeBE{-`w zg6@QD2_xI_mj*U;P=90?*s;>(at=N5oIL1- zD$l*74#}u-xZj9xY;b}GhddUBg>jolv&V=D0^ei9W7FZ}b8tpoZa6RNq+Klps57})p3Q_#8yOfogzM`Q$JJ&c*%+k1V54{6f%4}onauJNk2 zAKosxC84MFA>kI04+M{&T@Nj(P-v)iDUpYcsl&6X6dy_;M%jdEyWkNY@*w7o5t^?b zR;f+Q;ZzfS(9rz`{zGfWRp*kc?F{T*ujN2@Sfy;BU5|aKH3L^<*A;S_jWhI6pJUxRZfC z4-2Ca3mW2_k`)Z}|K?X~1-k_-h+ z0>M@D=z%A9jdjELPu?Ix_S*%51>#eD+!P6!It1JXr8C|Kyb3gT2wNjt{+hP!CmvXW zvW7{&l*s#-%5|za5hY~e!(y*RRGn~Lr)27zCq~jWZg3QnwE{Gml$$L{_Y`>uTStJ` z#0Li_AR&MeecH=A6QZDm37cdxeUN1JQH`$vQ;Mc9&6sK$a+Q|gDGrYyMra7r&i_{G zY9uv``!VZXa^nXJ9+-*tc_>JgTEaZ<54|%H!x|dsN_X761HLqC{ zzS(&I^x*8Z(+(sQj(27!Bw*==_bu#7YfuE2ax}qayu`|Fl4=(BK0g6CRvlG1RHRJ^ zcZb?`PaoFrhElV%~lOf?CXyR{b) z9gRJVsX*yf%*^J8&5I-qZfRRHAP)pBu&>d*x`mI|k_FBO%plSk2@EeA-U@wZ2I&5C zs(#}rF>qS6aZ#o-@{)bHLq>22SLRa)hTY7>Z348&`6nN2Stu=ACn8-j5?kIVr0oy8 z?be?>#NtUKi*5EUG-=rp!=Ek_U4C8mEcySnb>87@whbRntWdSpE}~YK7_F_gQmg1w z)LvDO+AC&bQz}-Cnk}tPRMo28+Oyh}KeDC+&e~5A9h#a}sbzSH0 z{OwJ4B>0b%+Z}VQxsJDDV6=VIN02xaW=%*IO`=KjtX58Q6P|eK;631&tE0qgC>Ts- zP<}oX@;5|47O^1JgS+z3{dh8&FT@zD)GA9#rQ){+#gd>iT?ECL%oMz%eI7Y055s7$ z!N8iZV%`N72mFmdD~0+o>7bYSr(I@NtCC z(~eEiZ9&o(@G!oR!fDTQ&bcEQp5nGA;!D03SZb&+PWtqFtwG;&a4-4K+k=$s_Q8ET z3g2^2;qVbpeGT;hnXETM*9IiyV?e)Az@;HreQ@VT^*a-CDot|h5Vu_PZQa@}jL`B; zi%}@!H>4ySDj;Evl&%fsS+GkCG*pm9$OS+ymo@G`PokUY9w|p)D8iyVQQa0MOFwF5b>q=503oTY}P5A4N}KWu0rm3ovbM2Ik(EfgYV{ zY~adjG&nndH2R9X*~FuS(f_WMn*jn2>7;-IJ4{T=?GWoNv+Sj5IltSMGjPwe+I?b( z+gZ4{W<)BRe(N!lc6t|k(ioa1vTL>s+JycTs3d6;!#(NlQl@6Z;$i$;el$YC?~x>TUpfn5F2cvUk$FJhe9eQ!+9?_K!lun6lCHq8Nf_#TahZGEkWz6JJqGn{j z`B7FvuYVMi5e8w{w@=YkwLUQZZBkgy;OxE%ur!7lGi=XLYRawgNP{`Mny2LskQU;(PjUJn>#l9KCCfZE{y3Wgx0rN8slGsI~#S!3Q;N6bHa7%a(BrvD0a1w%2-k{^hUzuOq!|gyfY^BWCIqN`x#xdGFz6qGpW0h z`~#F}JfA)pg-|Hzl|vCB*0}H38|@m|Im{V&b8KBq36*UWQ7;LU6O~$@K@LMgAmoZI zG`HSsJg67dvkqK`P^OvHhv2S4ABitIR~QD)w!`bGJvi&-%wU6*w;+_cmuawb0Pw^x za+T^-@_7jEUuifx^lAU_KprYkd2*c#%jRZZar7+#0UFi(KKsNFqvRy~S2|`3h$z-l zhTDeO$V5o?E%vK-%TFbhEtg4wMn-Y>mEAS$jrYM=n!sQVhy5tbF~)>_+?uVNn^$O2 z(`TrPZLnJTE!db*ezkSt(R9~)0?Q#4mz;LYJX1%KLz3xn2XeC+E^_hd-RU+8>^H7O z6ur|ooexFd8wxvI&&`C)BWL=^SZ8FRv~q;KNyl?AI+@yQ<7=24jRIXRu>Ww05Dt-l#86ZY#? z8B|^mU;ZJ;`7SrvxqBtk`O0dhhd;+cpe?Nqi-6|lll0-Ysk`oEOTK zj`H?*m$t%y(Qqt>TjzJHDjEC;ni4Mn+ z;dR!X^lWZ8P-$m!GAw+3-$rewmIV#nzPo%+>choOqS^`WiSjH#TpQnM zA?%DgDSS3$Co2(`;KA>e)-M>|Mcs7C=WwD+>ln3_vuOe4c? z1C1dD;gv`n?GE(M` zJ;LgfzXXM`Z5lbVbx0c=7Z!USEj=VN9H=BclJ9SqPJ68u6P4!&fkK$pYg?QWzZP7T zY#+JDIkw5mf$eszCDeGX3J9*bhdRsc-9?$E8*(u9aM1Rv7jp5Q0VmR;sGz5jGp!p% zcbb{{PwhO^JMsx*yb;S@Y_WE+yV)dq`65VKx8mdKtcbU&UD?H9PcI)H zQ@%3XqV9dDkK$K5tc~$$prV#wbN}JOGEWCL{mgKI>^mb_dr%?!d}+XsTP(}t0rEX$ z+q4XP{eCKGV=?=<&(m*Ini?EhFD3HLm*c-f*`!^DG^S56V4owG!9h+5zX#2^aI$mr7@r-dmszZG5=Qo^?-9E- zc$Q<+A2gEV%U`4s5)t`&NCWYf3rc|?S{^CUGAB&yu(`4`{nmn>bz|+lGbZ|@>;PqT z(x%zk1aFaLm4osQq3WLG)7b4v9qBSF?vdE-bOsJvrFHU_7?t*;Qu=BJq80H6W{-P$ zLf-nof?pQvQL4Pw5Rm9n5MVJn+mtAQpPIMs7*PnDbXZ8D?3u_4!qm#|uG?H%HxDQa zI_x0~->Y>94?I9t`=k&{_0umm@$h($1utV|Yxm9j8%xnge!&M!w|WozzN}k)U!uJr ze6C0=U=2C;-KOd107RlRlmH8&@3vXe?CjOYIQD$Zsn{7btk}mIZqB?SYEMW|1@VqR z6sZDv`%%;`#zg7*p6oj#SzpttL6eY-2T|aBCg1)2gru%vsj=Cuwnp%Iaz3l$SKEJu zrcl~u)6{-#4s$%3KJ@+;qMIEos&;oDbfoQ67tUDQ3mmI#IUCa@U?}AUiKS&JjF_7( z&`uXkvHlQtwCCKX6i(a7QXZMhM%{^Tr9~_taEWj~h~!Aj=B{R*qOIi?dAvMC(Q+N7 zS!(GkGZ?8|d8Jjq45g*Q7UtBLBU^=J_;`I3hHF)it6Mlb7+unaOOS+9MDZl|K%r&G zTtt%~KH&m3ChAQb4Q!gNnLjLVp53RFtJ739jN01>cNXEtJle98csfu6Vj7~Fm0$l& z3h;=(w%}C%roxW!oGFaF;K1;`s|RZK#L}Frjm$0SZ%|?Ij2UON-f%r9#{xMW{-KQ>!K0>BFK`=z5Gt)j z@v710LS&Fa@b>7a3d>9;I|@=Fe!I0_E)vEF)>qY_ogQiy9H;U%W)NZV?Nae>`i7TD z?9;D}_g)*@7Ub3=xIs2~#jSa|#UE{&fu-(IG5&jFx^w~;KIke1JpdL3Dcxi?y~26+ zskgT6EwskV0R0P?w%ZGtqWtQ;Q+Ip>q)sR6&*yr0(w6|ymxb84gM8O>s zT*W3e1!sL9Ss|DBna7wP%tZyzufDh9v(>VJ=xk*(o`G*54@%P?;%V6qQUpIe0{~2Rl31`U_2B(@*s4H^il_^AkH@jyx2XQR*gvVHw zev{%jiw!cWEYjr2o>|X;e_vJ7aY^LEF*KJgiy`5mwOF@at`6C~07j=blYCp)LvTUK zzpQw%y$d+n^{kMzDS8j^(f+an0&2auak~``lm3gNZS4F#U9he4op*I|PR6z1Q1=W-2Z6#OjL_ITR^ci6WhC*tr z30Pfs0T$o2ff?jR`^Mct(fXiHbM+Auu%6Az8~E0JLOzTb8AIa4ue6RgQ zoWC(U+Nv>=dQZSe^1ujoz;vT+n{^ko&rvm>HY>NSgt2sF&vs9WzW|)d^Ah@RIu44L zF!7dZh^8MEYN8q=+>G&!pVr~(F$>;Hb052+J}|Xw=84H&#K!weCOr`;BQ<5bv&_-< zbSK@Rf{iWn{9ve2{6pti;+NfvP<&B^@|XBz@+lJft;@*vvJeK==K>Ms^QiQK05kYN zeJn~bu0+vmV}l*TX`2*$L2@u6;Y7@V5QhJQV44$z`}hEB^?1Y1-DS2hlQLo(y%E(i zS-f9mY~9!P=x4ZSrl&7e>=nXvs4ELBE+5o)WX!DztZFFd$}oqvy=aZ!k??m8i2O{C_A;QvKJzxYXa~zbhQSh}Pa;eFgtGGMHnSDL|jB4$B~!o9jQq31FJ~ zjj+_Ma4cMa12Y)-xzX>dWIV{ZF-=z`WuB%kFZ|&cLo1LHA z*Y~3jw!QKA#gxMNHY6md^Ih5{bt>~}r-IztOX}a(km}!W8wyHQ3uTy(rFCXnOl>q6 z2)rp@jSpR(Of4f6r?^%J^wh+E5&}kdXwOAZQutfqAxjfv9jLH`d1Cr!_vq!l-?01K zGU%ew4~UW-+(qy&Gpc7wK@GV_(~olN6*Y%>TtpqDpQOXj=4T%D90?v~5X~={Z8Kz7 zUM#w;IH_e|W5s^}Is&hR3hOMfdI6cwGYtdy5$pz$Un?%B<<+j;ZxF$xaQ?GP?Jju3 z-)xTH>;-qe{`nVHBu1i%!Pboki_=T==XUN&6^iJO9^ahuYf3i_UQN#M>F?ZHop+je zz3!M7)|UzV3@41?vl5n9c>w^LjU^o7PUg&iUt~nkkn)Ial(Us8K<1zG+A2yIruLZ>PbY^ZNNst%1Hx ze_~#0{ZR*jLJ7tAQWJl(0+<8h*W17(6d0i0fi%O|a_9FgiZmZxHOW)|&0C3XrJYU+R({2Jsk=<0UMx>kBkN7A_) zX^4yr_=&CGyUlH}>&RC9`;hda`KPV^TjMvj1s8FXe3u5*e3!S^^IdAS@?ECie0QC_ z6S6+F^hWc%(bV}(gQiz0(w?S?p#RO}?G-0d-}P~BX}!NOr9yy_-t-HpBRQi1e%cMh zcR+x3R?>Ijpso>UpN~cN=PR8BAX0Jwvq&n5N8H1+7u$yaNd3;+Or@JGkS(bDKw~m& zxqt+-l6tMLJ-uoTN_^~2YVDr58ryYga1kK7#-#i#+MCR+2V}d2yFg-xl^*0MUza*t zm@3cJ9{zaWUhfn{(77)e*gOZQxkT%=QS5NGQvH9?>ZIc1oWhblE+9)?>Li}WbQ3Er zPn8kIUlxjZO}*OGLQD}4D3p*hU=iF8zk|S@Yp6;lPnYT&c!gr-nG0<1;(76Dx7+t;DHdpXB`&gICOKZzY z0k!%33&2M+jjXdJAHU_hO$1(ML6dgRNG0?jhcoHKyJ-DS41m;K&%5AKYpoW$l1vX8 zW_Qp5U3cEzI6Ei8lML$LbdOSk1-G%QL%TiiQ-cQmbri8jib2o+di7kUnv}N!+>-9y z*%WIrR3eDrr24sHCa2pXpw~vLJw!+%2mry7I)UvelvEzIM8Xy?fhT23js==Wb+^e?i@EBX{Mg*QUGE`6Pw_q zo;apcv-qwwC%|eRdtK+h_-InYK?^;cEWKpkyRiIF9p+S3_Hw!)L_o^9@0zGr^-)gS zf2SCLuB7esAYOU9G2L0gBg5lVW9AyI;gu&00Xlf|%T8S_FE+o%_*4*9=$`HD!M}R` zc;LueWirXj=##{o*yZ~o7O7*zM9oO%b&4SHv;zr?UyID+yRsYc?3$Pnm` z{bCYZUIy^uE7NL}k8fv79*Y1mm(sE0z{bHKxmx1(IR#Dc%Y8;G80Ycv3sLu%l5536vOm`#NunTU@g`Ct(U`x3a8Z^bS1&IMo(J#hWo@fT1djX^c--)L!p7?%_ zI^u5lY7JOB9)+OKGP|@VRtBZ1nt%Y|M!>@eO3*0Oh z-Q#)|3RlIK6eJBf0zasusu|EUJd%k(J_nuv%Z3opzb*iWHwm9N$dmkOnpqittsdTo zI!Zw;xEI2bNg4gV4wGm0ZMOzZ-d)!Rqc+ME1PuK^vDW7q`#`xJ-%{T@<%JeqXTWt< zgdX^VD-gPoZ$4NVxZxC37~nQYW@r#@GaIl`00z>xV}Zotq?S4yE+3?yc|6;jt*-Qd z8bR*=SJ`!akHoH~PtTonUGS5^Lv?@Y_Tkl)H?Y(3P8Oh_#H%|~#-sTtM=6VvePP-j z$A1$nw`zfTU(zg0gBFv2FM*@o@7TcC5eUcT5(&@!nT(!2`aoEz@tS!wInneqcK<2C ztB2U${X0KplyD%i#+TjUbBDYK>w;yV2pVBB)=*_#aMy#f>gmO^{2n9z=ONfvi-Iv< zkreMPe+4-DThF<8ly{91(j~#-*xi#0b}(j&nU4|kFvI9pec<5+RnK}8F;CA8mfia` zlK9tGhMPFHp(d>78~@cCq2esO6M!!p5@SVQ~qFXU$O8l?!&P*rk4tmwH-=1D+9-0q}DZe!^w&Xet2 z6^%zRoRlxVpIp%X=g#ZT62uTn~*@y_LiJ^cRLGF{sq+)$O^oc0d6T6 zBG`p^Z7X;L{gL(Ob^kmn@sh748^d5co1)}_*b4#p@2X&QPkLrlf*SP<+3r+GuW!-qJU-zqj4qT|xFxM2FaH22_Z_rSW$-TV2qZv4MOn#@{+}1~IZnkpL#Y@L zsko3|2&*NlAN(_|@#pRIu5_8}p*l`$4YFuk?*gRwe{Va;b5%k7e^PG0_61O&7W|)c z(Xad)t09;%`Sa(WzdD@{MmE3FZNH95VUzmgP9on!N;AnjDbkt{u<2+TXq2kiM*I)( C;%03C literal 158281 zcmeFZ1yq#nzBfEGG)N2~(lEe7NeR+OI5dL9fRYLdf^z`2XU6g*?l}f}cc;4T^vV`1%|0gHV90m{CNYA*(9X5* zAvD<$+wv>RFvYCMOz!R87-e~8B2ow<|7#Xur2Hb+^ye2vR^`t_^is&JdiLjAU8Z`G z=UEHIeR*Vbn6mtG_qDXhYvb*S&b-nhMq~P=tq<*Sq_<0|?e{wp~!Qro_3f6L*DFNIrPO-2X^lg^FD3#r=sa{KEA9M=@+T zxAiSM$YLJgCTV6+a8aFQ4yj#Dx<%4$-uLh6*_I)Y?xf zK<=}J>}D>apek(U<#YYOtt9dAmub1&4qmHKYdcY*^X_O#&*#hXMlOm1vM$^`KeWrF zc|j&s)*-iMiJN)BUG8YAMNbQjWrMr|!Wk3s>>A0He$jMHgvs}6GU_zw4YIUQr&?Vb zO(MUEVgs0>88wo! z#e$aLTT%+dt-sCMP@mfBuP>y)Vb>-uQ>e<;b~95^;QQD?p!IR=3;dZ6zO3khM>k7} zWO+11X1un_TA;96T0u-!oeJ9JubI&NzEd;hzU(~`o&G3zNTqrdsHnm`s>qUApdWXp zl2^swA{eBWr0F8hUuhlBYLQzn9?$MaL9$7*^^8i#6_t7`AXu6M0Tm=$40TWh>v-6S zg$`sl%=HyXXg!3Dkr}$Eal3NF>#lsYP9y_RNdDig2?+ zr*#6c+H|4*^k*&vQXW?o;@B(80{^tf@IU?kUG#6>MShNAjT4RI=)P)>WhO&<&+N3Y zDkeJ2-qJAX?YTXk5%6R)a7jq*w^0DI>N;F>&i&_P*|dGrb>+0(^7Cdx7XDkN|3zH&zBB)|9@l_Z(Ui|JQ3$;-PB~Fk2=S&MUSGnCC{FppdFxzPTh)*s+fJ;gc;U$P`B4Rh z!X$!)P}v-(&T*GqSyZ+)Hs7-_3R&eL!`6fHH)NfMntc@|54Z#yjP2l~F>Cu*DgRlm zmfX=HN#kF**mJ9T!;uEVQt7@r)Kmo)zxnY%;(8biN0J~RF@@0TC_xPni-J9I?;wdh z{h*BCNUcat+tI5UsFqrC=b`;33O3ePzZS^g4c>BFf_NE*hq(s26+0C6ROS)nBLKH7--B${e`Nxy=gP0o{-+(qj z`G$!~B{BnRBJCfR1@aM?JyCW};QcU&^m3?%4JAEx{P%pQON@SA$8Mu5nBI(7QMjnXHPPOo~hzdiazABh-G%_}aO;64l_f{o9 zM@5NcTe3JOgkGvAu%QVJ9#z$e(1vJi#jpK1#&uD^mmMP05{i~_g)S4I$byWV6~RT! zOR=RDk%metj5%=$YJP}W-8NhltM&U#hlWi>RXY`!KF7s}K5elExE~X{anzNHv_Nsz zrZn|lA2#>bq&6EmzWf+Zh2+am<7$X<2?`7Bjc5?k2dSmS1)VeASu>RMNwsHy|zm~%6>wmjbN0v2G`@ELZzXYEqc-d?7<@9^U z#uD!rjtg1aZiPlC{_R`4CiQF7xmch4fy?!*jpLr<#jnJm zA;@UTm9%Jmg*lZ_#k4jDSuXmc2#d9#ZON3_pgV9N^30#y+S5(SH2ZRXv0_cc67Un; z47M=XWTdRJ)(ZZ{K6JxH{$X<6kzyaV0&7lRG?waOrkk+P7R1XGyGp|@M3-;V0?86# z8!?Y9Ti{wFt9Ro=FC^1D40w4D5F5!*av7~&mx{i>CV5l=os3IPDD>%pDn`Cm5tAE4t zdGO?~a+clEUO-ok9Ow36Qx*Llo&FcglSuca@?uEmrqKN;@+%Vl%}VIDhp+mo38cWR zusE-|Ki~4lRFU%LEa(E9${oc6@hImb&`SB?jz;`+buUzZST^-5>Q2n=|Fm)~80STh z9a>PC4iU{t&v{u2D{#Zwz;h^+Ex}*uuVsVV<^lnD*~DVO9l3Vv!|jE0rr%%Y_TpJq zZ|i8Nngy;f!EE1tBWO+slnA=+8^^)>SWSf-^63}?u5~@y!ITuaYsFs z@@l4&DL33y*H1V+fExBVR$K#&Ahpl41Ro~RoF!WK z;7H7TxgvYa&P4BEPW!V*?}7h)_4{NDFSr-x5boQBR(IXI9qGjqn?hnppnmHLn&**$_j1&xR#zZ zH=!Ec);4Y9IwczI`H(xRCLCStnT8^?SaC`Ikp;O%nXSgXq|u0j7O-e;ONq@GrC6IV z_K<%rWXCvYq9j@GO~Q@fC~k6dztQ0Fn^A=lQCMqR(ATis{7jiiut?*G; z4{&Dc2uqFc7US~Mkgy=wIzR=a#k|Z2S7yAv30C!?{RyonbQ&%kUwPuT*w#d1YH4($ z2wd@TrS;NAc<557HG1XY_Q@m6RM2TN28RScGA-m+tFKAlaiJVmX%7vjHdYPbV(dj_ zP(#fc392l@E>4d$<^(^x?=NoXTHxNxO?L7papRSN>viMd%_QR1eMaakkd2VR@sbIv z-Kb3JtPO}w?$FB@Du;o!nG6hN3pZs+5=)g5QOl)S%_6BA8iD%U6DobSY_3AN%oLks ze;IEgBK)cGLC87bJUMPyWxK=zAD9K$7)Anx%86kb!xA4VD~5W%ARSco%vmebom{yU zsiL$FB;@$Ov!91<<@eq2R=>LnVc0S7L4J%OC8-u9e)YU4x0xlE1xX@I<*>_L|7xs) zw*Hw|plxrb_;{Vnb>8rMe~W6Q`9oE!5?H8)dn5^vG4C z)W*g{jF$-7V5RX!7jE;;wb>XV4`&Ggf?lP@@oUM{6d#+b#S=*c$MWx*dm+8mZYNBPOX>vt!$Z*pqSWuz(~}O;^>9 zLsI=fEP|m|W>f9%Xt}#O{l|q}UuxpN`ThGmaO~N+c*b~M7`%+0JnQMM#!y;brg3*t zU;4N@E;gB7ElB45bw_kR8dBnKx;nTYOu``Uw9-LmUw^)qVqdd*)3-*|$A@12r~$v* z>+7wkgSBr@2;C(wUhPv+y)K3bzv1*(J+-@2S0)jztdcV=I+y$tFD+g-M1F22?Tk=e zV)|Az0ZmMb4l#F!n4A=t3%5Uaf!%#ecg9b|Z0G(fGnMv=O1kZ|A2cb7YDIw?9qJ<+ z7AvtI$&ER4bj$t8iY6g&R)@ximUNk~e#GA5LdZnxHU-AOGbx}!T)6mF29z|D#v?kx z5N4aPim`Y}0v1T2q8HUNf$|n^vXvBORR3QSy>@~wwXrOkbVzgry7~Et8mM;w4voKCP&c;J;+Ll*7>aJ z@*!5cA6NdP84+1{^SOMQt>09Rj#;+uHC+3eT$S8k15TNHi#gj$>)8{x2bv6oexDE{ zdWJh}f%y5f+lVj@=3=@Rx%*dcbb_ZWl4aRu2Giju14m&GvT_jeF6OybE<#SKdLewV z+J)a`kq8?w3MyurUrzk6&P6pWwlG7v&{SRp_ALbYl@cpZm^bvs&ypVn_rYY9)>GEK zX@O*5L{>xSK6bV%R=;pM#*TIE-ZOyZP=8rBG?$cKW>rz4inQw!4!2X(=;j^@(pJ4o zhhG-TD=Q3HCvvR>TPJ9QL~9>Ys2rOC;Dt$9xd z%e1c07fko7u**z3xjK{~={)V4*pz91OwvhuZ$_hITBiLxx_$MOkMDY6iMZ*r`)u7! z%)<5`ySuxX&)z}{t5O8LwCB-enR(Tm=ay~N?Ap0ln;TYi6$E-VAWPXO1krIZT&WBk zTvG<&8YF^BjdPp%lo^PWxeA0$_u?x!t-aASYX`c z8z;Eg`y8&Bp$NYhcVXBm8*^3)I@RoTU+?;jf2vn#CU-#c!bi>?-2XOR8E;=?7B<_r>~kg_RNb$|qq%dZJPExy3Vx44 zdnQd%^|1donl$$oM-twahJST96d1G8uBCrd8G#f2bQWFfeV_+rUM8xkQ}p`rDr8 zh_=63X}uyrPHk#vzNa=alq;W0@~J(UO>rfgZW+$d?{!vuE-vnDqpSYqm~yn?`LCck zS+ansxd2iFixS<6A^Vc#v`t>~l7Lc2RGm_f1sOHQDex)EFfE&8xN)R1SU2Pz>84`z z$(*n;b3UEyV27upIe|->ES8^Ao1Tszi`%UYQWlBF&EGu?ZE8dn%uVb4D+aJl>OY6;@pea`WdIG}heK9IYTS>jh@-j;ux!!jcLS7aVgTXoymi%P|r z;}}Z}!K{ycU|~#-645C!hPmC05i!}gnSy!RC}@wehuSNh7d1joj89-hYk0u5F> z*?)pWJzvyTO4uK&&kATg3SySm%W7_xw{wk=P`=cdX4GcCkjkf1nDQEN@z1maNz-k$ zhqHfkg%E=np@t8@Z)cun$^>pa16!`!maWcFhQHp&9hRVQZ?GzmEz>v23e+~%P|%g; zg11wS#-@D|#jn&eBrlu{*mx2n(n_B7IW<*Wu&_@N^w;| zPN~j& z>{^XXa5Jk}5m$4Rq9VO?bSgqDZQA(+1}z-Y15pkj$&(&Z%7XELP8vksmyN7S+;wdG~6+kboehSLYw4idMr*b zt3KoOT0h)Hr#1;oDNJP^PV<%?FEpzTT+I%m8Ek?X4fa_XZ3!d%r+M@fHYy0CDOAjN z4n}c=@e^3b#h1^k{*{9C4_X2I=C&1huNI-!wqXadBarPlEXAJ?a;BY-cz{?q=^0~} zD3)J=4=2`1xq^wmt|DCr+|eumry1$(0cb+>_8iNM5eZCmr@zRM5AE!`ruArQYMHCu zoAa2`{|Ev1TJZQAj)r+k>kl@IN>742?RWN`)uYQ(vpsyztXalo6d&EiX;dcjCw$RA zYd$94a3>D(3k8-w`xlsIb(SFS* z5C-Z%LOC}=xtn?7rWFA6)lQG~Z-ZBvQ^_B~<@9yICIvHmW_GMxYqw3`VFW_CQQ%nt6$>n8I3(uEFRX{;yYT zw#B8NXQm6LVK1dvA^*lp7w+HF*W9VA!}o2mWHq>p`+UKVZsdu6r8ObF8EwFZtPc3J zNl~qc?Kz%J67QxGI{%DTBzWT97Eu{ROkaV{QrOgLs_p zR2wH9(DHDa&*5RiKSF0eTSfR}KDBV>=x=b+T&bj3@j~1wJq;jKA`Z8K|DG{JlMI;kSwbUjS=@&bfJrKf4 zs%`s5gr8SQxDbD&E!4!`!PUbhPKtYW*e~(Rg6%gaF@)KPY-#l93w~(g+esef&O=iu z7GS-wA$YAg^QM(5WS}o}&R_R0N*9tgZ24Tt@rTF@@lugnQ$>xu+?_4_}mvX{?G z|4t&?l`U+u{*CaO3{Kp!f0b43LRUer5tk_a?IqjYDK+d|mJ`C^{VV;p=BPD3L-`Eo z>4Jj-N~j#=#*8q#OA+LQkHQ6La4n-+Vgr&q)jr0JyD_xe?2uo53b55Y|GR!QBpJnB zmK-84gRS)j(6TuBW^s9gb=WOPk7!lGPsshPkPQJx9zJL{7cq3kAjCqgex=DGcsY`f zgqO5)y4xL-#*O~EujXT3wyS@W8hzPLicV=iy*_dQ0l;Qw%hY%6`+7Q>7UTBh$pU@H z_31q3t!VvXC{Kx)%f>fAUEC^VI2A4O17zg1D*5o{(@^`{+NM<5&7#4mZ{sFhz4}@C zp4ZNA%ur8iB!u3QnObqf4nvOQH(w5(rqY%C;YI;s365y(!t4M_tvhzcE+HC4Wa81n zYkZonah zoZTO5Y?W#N?^X1YikfMjKhTtP%*HJf8TrnXJ-YH3qFj*?+%5lEXcZg1ReStXS)v%PgpT4#HMZyVl+rQGtg_ko)hLx zy%VjP=zBlbGp_HCTm&iqcpd3$o_l!QFLTD)xDrMiyv$=-1TbwHRHU7kySg=I=R}?J zd%f=_8oc)3>^`c$Fa@T5U1+KF=?q8HS)Uiv^+8_a+1Pr={#kQ#O<1J&3TvtF^%lUw zIROZ`dhu;aZx6=i)%vQk#ioC_@S|tn-gjUrpYnYdQ-~< zZ+f(V$D)KcB8GfB0GS44e<~* z3^6&XBH_5Err=2oGgB;BNk&f{J5zEeoT`82$sY4QQkMYNd8x-t9Qo$9f?^zW%@7X)VH79c~m`W`>HV}a<>UsdiZa1lcz5uCM zvL$k5-zcc+;&ptlwSe?wYp^mHAcb&3YU-TcbCUFNs`SCv+UTY4BULQB`e=Ujp53r` z2}C$QMIL*GG7ZTQ%F8Ulxc1WF&y27T#jpNr;nDtBHw;=}xwRS01FdAWc#jnNjOb2E z`YEyyYg1Opg!4>1(<~%5<`bbKRSlP4<|L0OgqZn97`9MQEX(oD8g{!og!EdG*`g16 z&*eZ0%x?O2>){Asfk&Z_<}!fB#C3O!+4t?NOU6na9wqfekmx5eRvrTytCDt zcmRB2<`4j*S4LJ+jPQ9|EPZUH5_DGxb=3z53hevW4(wlFwb_t6Dpqof3%#GkO^xBz zJI?aEji-A%TAN&tr35C5Lq_Sfs+b98ON)Mz8+9jp4p!CnK+&IdGx{jkN?Zm%6Mto= z=K)GgAd5|qB8kHJ=myJgX)HpPzmw-G>(zwcGVKVV4mvKdbk0h@4fn*-7V&128yXM) z%7h0Es;9bE!*ENL%XU<;{DPn4GnK$6BN89L2DM!L*|fSRi(x8f_HqH^~@C5ATZM{bd4t8fo3vls;y9KX>?j z{{DFgg=zTGMAiKM*{@05$Xq^LG>>k#N4GEy;aiT1(VL!6Z8~@#^3yl{eDm(ze3N_Y zEHHgv?vu_np4G{SGx%*Yrk_taGokx*CYsiTs_IXx7%#7cGB7<8>2!E2SXk?~cj|T< zuU5_$TZ2oR(4Lwd_B%~RzdUxw$eAkqz3auT4-JMA-j;sIy>_$xLj8t9y~V~k8-2lm zdM|83MunR6$L6(cfTkTY!DxjVsm<~5YycZWArFP&qv}VbuzjS2zw5Pg9L(Y=)guU? z_1CC?eYs{N$bvXml2^41JZi8XjXhAXVU|FN5D-oj*=4W9vpKnv1`X|z@Jcka>0dd;_3OblR5T?nzGJZn%9LwtE)gbktn0V zkAlWAfNo!qq42*~cBPW+FV=^0DODc+1W-|J0g@Q5H2Ry|zEv~@R}FiJQQAiE9ksx0B{E-*_h$jT_)Pw#B{8RK~i5d0|@1IN=o0idl3BfAe#Qs101U0;E?g5-|mWkVu z!#%z1&4qT{W>`beFDehc4OZZP=fWW4Gtzuwpfu*iw~$1j8z>a=UBu`i`*Eo7>C@tb zLW^Um92VI~Y}q4L0~jJi16vQQX3325dGeQcb9nb_gG^=7Eq^bfhkKko$9=RT>>*77 z@fVNT03Swj-UQtrmI}BXkzhJAp;p)3-mHoPCxTCfDWQ|HE^u3N%8Z-h(J_WGU1K3W zoaK}n{Llp@73x5u35tJVi;&i|!vDq!Cc8$)DGZ!X8#-Npg-JYkQ z@jo`SU~41d^y^#d1D$}JRa6@7PLqRDN4s_v%Dp7T4*sxLrYy&^C@ z-*k49xmayF9FO!pO<}w$SkAco?j?h%1U~I~>1jP!k{vkIMh$4u~X*xa;%QFqB z%bk(s=L&e<+NNT^U>CKq%Mf+rUJ%#(%}IfgJF9s?mpgTlEa%<(TP1Y^zVAm4_W|Qq zyQw6JI};K;o;XJ~T_0DIGk@7IzePka%GbYHcd3V4o0vfQS~z}XWz6#V2AtUUW5Si z$wdld1)k#(SZx5{73ITzUBF%=Nv#DYjR2Sj_K@s`@Bal5Mk4~A0%1sdhV%V zc74%Zrqw&G^QTRiHGb)f)pv9IAppQ;YFZyL^>|g~>wX2uN$L8y>lwc2AZnAdF4jo( z2xoe)Jz?=vkDjV#3Qeh&0mlQH2gBlCVm?=Aj+Mmj70p&m5zdrVD+{ z=IQJC)3hURdMuH?3iV;D#a1Tt-j*rmqL;7kXAi)sttG#V06b;a#}i(6NTg^u=6+d@ z7`;83Jw(seK%9-dY@D$dy;;{QVyb9tb3~r%>+4%`ePWBuyo<>Q^|25qGknJRFGIH2 zfB2JYCQ2S#4x8AoZNODcs%N^QvYQoa+2Yk%+7cFu-)T_BD&K9pIUA!o3kZ`npJ+MY zWqK3j(dR6n*?j+`2pn3!)EDOb8X2WOY&a&vHlXaqPYJYdBtHO~8@JDGyrjycffMM~ zy1lRQ$!#vIi@OgD4yHkwC<@!3?fX}v)gDi}DSw$SGvS3Sl^gN8n}EpL6*MNs68fb! z9@$3<-cTg&bGiKuv;wE|0ss`T9pj@rL4Yfilr!2I$y>`FS4*MB?ez4n2GXp!gdKKx zA5^P_CB#4^3=$veFrgpxeUpOst1sc&M&O_v+LkH@&k5Grj?na<8w>QUW)IYQc>rHCFUi-g#P$_bN5{i zY0qgYn>=l7S7@qs?{6}^x~}3y4>To`G!NVuymxv$k3N_{kA)2So<_J+5uWt1HE7UcL=itS%-#k!?-thZzDb^}Y1fJ)vwdJlWwdyV&} zH5_&uPEFhwgA$BiefP)0D`_~H0*If>_sdl-znm54{mb>F?)O3S#PuBBS!8mQ_|P=E zrNwF#ZV?MA-j7}YdxyM4tuSUZG2sQ3P+{f$3L1sJ&}2EC@ER>dU;Y%ykOie6k2S7UtYMl0%jv5Y7QWb5PY7phMSkT~EX7kUf&>w8 zW;}odqv4<*Wf%u6x0`Tr=qF(m6e@%Yhd;6APo%N=5r-?*oOugoP0%G*8JH-Y&vtiB z5h0jmEeTK2YWtW^ldWavdNXKd8Yj5=;gmm@L)G^i`9KoHPGXU$5rC+J^<&1fT?^;Bi?8FX8S6(ygQVKx4SC4hUW-7ExV+Pnkc>;{lG;Qn2Ko)=fm^}IVj ziI}#l3$KFkht#7j?W5~uKyJ%%rQSLA$w)HO!}|9EMcIT4BxTU{*hfl1&sAPw)jd=Fyj?y8lZ5SFqciHO$d;i+83yAk!vRQM$Amv)Jv*>TMYS@xv-Vs1 z6CD(&U>9i7MNwF}CF9B^mzBhDv!TA-6eC_S$$2McsK$^_p#_sS>f+F02dae(=ge)B z;ASgQ<0dm^&zVtiZ!r12_RX$C$A&oEG4QM6aj+6L3#tU);kV77v&7$pq_jTQ(md?{ z%An}KP%s_Al2K4Uop=7d>D>T6E>c55+?e~%@>qA?Z_sQ-TUm|lSu0v>tBzXL!YHJ? z;ev3KR~+Ax4Xlv3Tsspn&bZhc%%v zVNaE>Ouk=bfJYAvMApKZlk&^mM4t`r!MistWbYEW-NFgTvy*)5oqJ%Hv1W<+LyUAO znEbOCnUM^SqWuCEkA9VBMV3vo#a$o|BeeA&k=;SmBFn#w`b$9BVQoR)cM#e*4#AU1 zGu4k-@}Fz7Awvl5p0vP;EmunDLJO%8wQ&<76QtrYA< zz*2g9<|!q9dhPbDgQT9i*U1_GG}A50+nQX?dK7mBK9!a$7iIAg7+fKo6*wALHTpkb z1LN9woA6j98TCQ8t_oE%gBfcmS6KvM_ht+sTwjIDjohSkLJRJPC*xr3@^3Pbs;4J^ zELL+&6*a+wN_DQUxici%=fxw=k4QSd-wNc{$L{nwE=W53=<|Be@ZRO#`=&u$i;LP) zPqB1UF%yzb{!@pm32OVZxc10;%l%e2zDA6%=~bF2u#Durv&^`>$jW$qG3Dla!9RNt zZ7=Po_&G4fz>Sb=Aebw=ewSD-l0iM5|*Q_SaRL(6wvY~i_s7Y4!27=7Qbl(>eUR0p=8@O9RGmB*Az^CNb7s@82e zVMInw@rSU_+)L_&8<5i1+b_R&^qQg%Vu$&t3*Lh4x-!m%eAlKMx2J#8@vj8o_^N&v zfT!V~rdg}nTuv{ItN2N&;#-Jk4Gb4=J$O&@?ZNRQoPxK3mdZgnziuWMeUglPpw-T& zLq^hKp(^}<3zZ_QSfwR4FGDUjoZs0G;y5Fa-&DG>Qh5t3;@+VOZ<8WlgljK^3Qh#+ z{v^yFF6t-nToTRA4tOlcs1WiEt0271MeeBj$Q|wfuS>{?v>5-RfQ~~=b!vE|TI4#@ zBf^J!d2EhYxgnF3h@W?G7RhXK;UlrIS`~8_x}d}J7Z%~3GdCOpGME7#_)Q_X==|!Yozzm!!B%RzCv=ix^rz3fFI)G$ZrWdcJ8-y?Q4e0G zzA6RuxgSeaO;=+~*Q@gv_K|a^93}OZjtgzR&MU2#bLZVkGN(t9G6zA2k+YFsCo-hm zmoT24*D~iVgVNVuj4v1Wi%B}ioRbOgHqm0v8m<}cO9XJ=Z0gje9sT%qo7j@8qA)T2 z37pBLr$2w*7!8NgtUl_Cp*bp*j(_fDGfec94v&;^g*(?kX%@g6I!{Fx9>p`;-Ayts zD@pfE7&jT%REml}+pRy;aB<&R*SIJ4>AG0#N7NUlevym`kv+F^2bR9zPvg2`LLa5E z=a1hzIt)smIym#yti)j9kr=%`9-An)fYZMdO(6;XP8>MgNuY(WBhyO`^yK@Ai1K|*U9DSeKTe1Yf# zei_XU%#!KVyBR{)G}!@cd<`+dw-(#^xB`dDaA*5Q*U&H6qyC{-X{I55c|jFUPYHAD zS-INIAv@j+oN%3@*}LDFzo&mASkYymQ4sRsn*Z>kE@Tq?U=`%e1I@2kd z|42RoTTmdorZ@hZWt;RZ|Fu5dgkar@nTZ%V3jz~vfl|hANfZAal zONk}fV7sInxBDbe14yN60Zoj*(?L9!!o(oNKG zA1m&59yx5milx{nF@S4Vnb5J(Pm)QDaA?%p?SY7LC5H<{9D$EpU1^e92&kqBAHNb@ zu)N~>s^GbZz>5_)-6!Ub|HdwN(nSDflV?=_NsgBQq(7;E zj}+Q(yrbP_0NIpf?=1+#cQ;Vxq0W8MBN-!~%D*sx7a=eFWy<(Ham+SBnydy@0Jx-> zIbTb;msrR z1~mdWI&;yKOWt6&dk&OK1=nv<>zwYP1Lz|Tj~hFi%DB_VN{#Q)H}$pdo9+ZJV_xl_ z`mEgmM4XFF=Utx-HO#V%$G7+Uzcz`|tJcWIWmZ%7pNE4+*Cm>mgy7_j318QKY0P}a z)uhtB!%^qDBYtPb=_QAmH(m5!zqX{g&2fR_(}CGasu)tSl6q9%-}HH=^_ytJj|UsK zJ{ea_rKB@dUQmq0CgMsB7N^^Y;eEc5N2DMG-x&PyiR+2^V_L(Lj6=uM<_b@R_*XdU z&Y5&3(vc_k%7v%n)q`yLJL!n{Ha-<*@C;+6R<@GbT^g3XXF1N=fBVMvUa4*KBj(fk z#<^gjmYz2X&;MCu5{s1->Y!#A2 zg#&kTvKxdye%`@QqLk@pots=&2%A_lkjIj6jFC|HawPe08}_jUn@8eqep9@CdS6u- zpomaoi3p3CMNe$Pe2c>6b4`gi&U$iy%5>`&Me!wwE{$0@lgGmSH{}W~VBqJ#iv)}M zs#}lo|H64?xZtjT3?PrbDUj~V%wbI=Dk1kmR{vKsUu1E!KvYBY%=MBSgSViZnaKqa z>oPxX3_QjGgqbH&7}@^F^#T2816H)sa7&D4D2)Tu==Q%j$FK5v7U#m{`Eu?Ejy z_BWm5`3g(=nRtoaqhRQbpCKI~+nT%8>+R8Ku|8|`kr(7V`_@b$9-Ut09q+YjU-)6G zB+~bK+8%Qh0mMT-n5E;U`s%%TexHqbKJ;9ZfzciXuqhQR*Q__9%Lb*L_Xm9s22Ea< zaxD0w_oQWx$|I!@zFYb%Q<$D_VYcqiJFNygiJ^J*)6eW9eO5Y7uf}(!$|W&(*2`Rj zmo=sK1M#B8`8%)%0AAz!pyT?eSC6Cl?LHC3dNbK8%{dv5X0)&i0wuUdu8 zQW$u)Qe)UHwreUpv8Cz=Xg3*OZIS7Hy6NYhWg*H`Z7H%qT<~_Rcb{>b&hP`%Ai%X% zd+KXmwAlLcyb{CitK_B3TY2X2v*iumONmQUy#efFS*d5#njI~_hWOM(<4KGf-}fe8 z%!m8IzZem~jfe(P_e5u1-Z$y}eu%-Z9NebsS0++lC$NU7ai8Tb_&e~J92e@#f!OC| z8^f6aFGS+$`@@iIMX!)%;WiVwO|PNV+j8FBuQ8{-GM66by`~Xn2!`}m$G{%werIPe ztWI!2p?e$kY)pLM=P|+SXK%bMBIHmp2xLG^IK2Otw}NW*_N;`m4d^+KF*LtU@YA6o z_3Qs^@%&4I?B5y;hGfbV0C$)JEz9v>P{U^}7)0Ciy#xnJO8E=%RDA{gP(G~I?JFB^ zRrYsVGV`eX6)hG*)yHZ=Q4jxYNC4y@l5C6avkl!K(kiH3T zK?MH?HVrHM|5pn;0#Xxn?g1jejls?>@R3HNMUhuW_|j8hQ^x3tH&)V;;`DAp%_p^@ zrK@B17?c%N(>iZPkk>;Eq6TkA*KEemhe0TD+`20q{_j%hGU#O)^oqWZuLS*IQ%8-X z7&^M0ipfNr9&`Rm3|*y(ak%Ool)5ZuLVxvj+fr&;?OA?@#er^%<3JzSo?;H?&wefg zOazC_Sq9V!o7_X zsx364o9L3i*CMu{GqXr335|4du`OraUGAM1w%vSd$x&&x{j|s|;<>G|Cc6#|+vU9;I+*S0^1&Q=8OI*USLl|Os#+>ZCWyuK%}^buJ7-x- z$G*c0jobCFIl9izzKhY|acHEvZ@)D4+Ha?35_4#t7xw{Z=u1+kIq$>%U#S#8%GT1Z zF1Vh~`};}|wngB?TYK7_Rvy#y9x)wP2v^kQPTn&(cH?h%LHHt+)zF;5#J51izDP^1Przu;kU8~%I$b9JMa*Tn-7x%bFmwLCe3b4$I+rv4USyaCZZbUC1%b?-W^ z>9X`5I*;^$?ELmt)gfV9fpA?X0|+Ueo*Ojh|?1IO^3X zT`ikho}qZE_@LWv!9$GRa**28d!I_*$nkhg|MDfmu6|$9E;e|%YW9_(*=w$y`6djo z#nc=PtNp-nP-%XBwzG@2Q|8^CuHwf|L%5GTv-niFGNwS##Z&mbLup%XocdgmTmls+(qr7DX3G zl)mo$myg`G9xgz`V?X1GXHt@QDhchbj6IeL2u@U`i%HLxk+Kj>U5EO&ww@4?8;AEk7Wa*pOG8=M=O=k~9FvoBa`qX6Y7bRTQ&QBWq47`tm(;S*K~@b53cW-bOsCAW>d|xmRD~Xyu6X_x!zfO4#PQ)O6Ip!`DNo;;`vc#`Z{!TO6}z3c%!G- zj=!WcYVUa4&HEw}a~8RKapueuyiA%N-nze@etD7CbktYuR^=OfXh>24ocZz|2$z~> zoG>yMar5Y}I)nGFzpVRgm+@nYGcG1G8a!W#`7CKN)UMZ|yYI_jqWRO$oBDo0*U#58 zFrg7deANpN0M2^zDG#FnyPA8oxa2-%`sRSo;jw{b$~4FHXR5@^d18tOJVwt|;}dyj zEo_OUJ0qD+AD-2tcQx&tk8T^G%(hP;(gz$Dr5@d7rFqRYk9JkkMCwxCqmPdI_{T%P zQXRI~I`h1`hiy|H&h`DK&qn$D{8HqkW;YEh$8uZLtTdC1<5Js}$!YDC0hOntfCBVTplXiHk?>6B=DDCYpw!FuHVlAGI*^|{`(0E2Q%|OKv zxprgsHC<~~>-%wO)*h@hW+S@%w?`5}?;wDNre$a3IM;1;qp4D_KuCHXDd)8pE}p%i&PLMW+k1Yf`STPv3em2>*>SbrL={4xqi@9Xa9R;>Rs#O4g-O zW7m6TKH$zs)%n+YPqBNK1$#*^B<@RRuMy=$9KU>3yPcX^{W>`5<3^1@ zS81&YQK}Ax{AH=I!&>ZZU&z$Wn}m3C6u8L&UlLeN-+giONr`Nw+NwFxt6GYE`frICdCx*1@dmMOF2}RlAskNoCba*bnFafHIAGQhFJx(2A1+TcsY|KA6pZ5TIMrH^!rUKCcl*LYH|p*PHpiC}}kcuB&oU{}toZ=3+-Q zI*Hi5e&d*PIc7B72$xf_K$~k`+l_rQ=K@)R%;<1Q30pY4e3D7?b^_y>Z7q^e?)A*o zmc}#Q$pyG3_{kQ$w+R#=O`z79TaFa-GbQK?QJxP)YMX3%QKptb&((lB2kVyW+!8KQ7_I8!#6@=(L` z*70!KMv1KmQd@$!)5TU$;ZyD0d27IhU!i6(GvU~uwdTDL)gIo|a)ZXb@rz5D3+baN z8nsJmwG|K7(0OaqQNNp0PoGNs;s7<#wwTM11un~3cPcUA%Zk6*EGvO<;v8HzDnrY;dm(+81Jr1rjq++nzR=ew*- z-%7iFs{@7XicQb&q=65|)`p)T^=`at^gmR1^A9FVsg-=P$B!PQF)~y|sf1LrSB`pN zqJ#zJXQDI#oC4(lk;J3(8;x9ak#~vNc*L{J!I+%-q^q>vTrl;VQte);q^!6DQx=82 zwp}Ia4>#xLu`h4ImEh)!lm3RHSN*T5KM7PAa5}D_i2V)_w=CHlk7arApU!2aoE#j%_o0Z*fVv%nu4={OFvxB_ z7{?Yb~$Pt@uA zgs4XeVjH>;+WBWSYmSB0`_s?&)+eCf4gRwOxi0)`VIk-BXzC993d6nlq&%M6K=lqj zXgmNl`b#e^EbcCbV1F`6uS+FG`bp{rl^NB!l@MSXmYs{-6?U_rg@ z>I?grCWQ(>c7-AD-!b8l!`ML;UHr`>99?3h0Y)zr<2OPa5NR#!U~0rlg`olYl|E&N zsUii3x;C0jT+rPgFuGc*^T>0L?-e6ZCHl0CSHKZQgFzQM59g)mP3FG-Zr;Eab`bhrqJ_<+Q=+<*_M(3)9MU$Mc~1Vi``78m+}Pr&)Sux6{N z^wx=LH<7NFb-Sg7J2uC;umS=1{UQY2JdltyhtwiTD%GpJitkT|?DQ`*I!lf-cYPEfUQRjC&LwYsD)%^s8X*Nuy0EXIT$%SUI@#1A*ApRH3J@;eeiExFU#*0dh z^hX+^FL8#MQH2lhF!lsxvPc-=k6s#+yc1L*WksEM4_AllYgKr#E~=Vq>Fqm;$M2(6 zZ?L^jVDo%-8J0aFx+ZYQv|0y05E>E=nH~$tuu8T*URLq`-n~@*z5*M8ta( zUvzI{H}f=8(#q5UVt*bT-y*KCPw7sxcl~tLZ~{6CUh!lEDrDOS?&Pu%+1r244q!dU z-#|bV*_no3$u8-Imt0It)Z;xo`>&6diAk+maydS!d|MKC!roN)U@nMj8m-zB6yp^_ zl;HRnhC)E;#T?9od5H>}XGEJ)KCO+cHikKUio!4Cso%BIE949-xib7lPJQVt5)OBh z#PT%cgW?jRB!yM!>v22-!!2m2e{RTYOp$26Hld!S!Y2|q7b96m@Fug2AI&|>=+`!E z>W<#Yks3^I#R8p`^+uHLrKJZeygO&{Vlabo^j z--bi)QZTAHq%s;9HXG{>vDPhA8R&JmIpM3d7g0=}H7@*fu`23|AARun=8B0y{22(lv~*HW>OsDgK95r+E#LTSyr{{@98bopOV(o6xvzT<~-mo#}Et zuDa+_A5BWNjx`#MJpb^;BDmR#-aCX^-un6!djrTdy*g7~VwTWO_czG}^3E&HS@Ioc zdX{x5WPi1B+R^Oq)t*!U3scQ7tgh2qs=eFQiQMAaZga*}-9wJW8SxdJb4Aje0fJ?n zbI++gZCJI(f~oOQ&C82-w_Y{CW>PcV_llZ)*L8(x_iWsOL-Z&XL6-$K>M2xvw6n7q z=-~8jf{@OdqW=69Aa^ZaKV)+bWD%py8!DfWWW{Gsdc27b=&PdWn_lUt~RxRtl%MMF}I0V7`9Y)@M|pLWyBg%m0g>tkY!- zoo4i#mbvT$FMpee!k8xy2>ro<@D*Zz#w!Zp+E{!t=Y(M4!{+TAX z%-a{U{NcB`REl)NJ@76#!zT)Aj3i=e%lD;ZL`zn?w_0ixt5h!`MAw@+Y^VEln;B)3 z%HvdV)h4l!8$t^y$8SAw1?oqsb31(58*|-3_NLdRX3IJ}=lS&m-5SbW#K1nEW_(|lM#zdv>w~`ii)9R?u$8v zwI@v}hyvQ9g>st2uHJ(~5{SB#Oyv1Yxv-B~7*);)vUiyJH)icdrcRcS!=} zM;AY5#iY;7vZvWTP#eQc@=&(GnVTkoTKU8VIAjwpc|G7e`rzren zE|ES_h*7o()#;{opvQC`a{E#dk{qP+&F+!rGP&Tvq=GA()6H`hr6GOY=9mt-S=;6| zPJz!ks-6T$jo+rtdK{^6o+eb^uALG5bXzSwovoM$=!yA&)~90o!zeX0fpw5bpWU}h z>#|l6klXmJnb`M{vY@gAVtFt!uzdhi+0^l2Rycc?`mfXR|xQ+CKa>#iwo!aV!RhrEyIFY8xmRGonQEP zLmAdMvKgglY~k=><~uo1xv(EoPkRdKKbQ*JECN4~y#5py=_mOol~wgEq{<3{9MF(z zCRzrdW+IN>JnnvmEsTmA!Xo|T+@BOs+Gh$VcO(8E`x>v6ZJXn* z?$asYaeoXS->tW&!If%{4Vb)SETB(ArSd@d&iLv1t@CdDYqq<f<0nOQTWiLu#PEU#{Fawwsx=#*=%!z z?9Lq~eAuHXyPZmX$>k1k?-1xX^hgLEKeVxkGmZb&d)LzrfNVG+E*q158v44>`Tb75 ziIrmh$x=M`(pj~K+aXrC8z=;=^f6Do#R5;;U&qIAGU5CpUmw6Q#TodnE*IMS8uv?H&{DF_l><2;nez1tA`i&~aOiyH;$3OJ7%Et$V@TG4-FhBM#l=O#~Z^ z#lx6Q@npjveX_v4w9L9IsSiWxq?395xi+EWKrZd0KPc$TfsLwNYDg`AG6Iv2;ClRB zum!;SM@A2@kZ6nHGpU)gv+icZGviO1hfM}4am_-kJ z&X*)j<%shz+q11U!%4K@$Q1(OgSo41a5yV>1=ab9XdqJxylKh z+Sh_mA%;OUW-6!9V~vecKVARn*CFIgYy#?vVeY$&`fe-E1;>HEocCWMdXJD|H=F?7pnL;fpUb8Nsl&B!C%sf1TY`VX-gTIlKqbQ5ijEnc&)bUqXJ3)8N_Jw&>n@C zo5oZrEVFNtv57uCxcL%Y9&y6Y@Kcj$So(ROzh-)m4!9!<049@@z=aWi|CbwhTl{ni zaBa6UZ{sNw6|?uFI^$py`79oGWmoSm z+(=3dm8_JhqFV~Kc_aiVJpa>h*2nX@;)$`HLgf2jI1g-B zWQra;l~|rfi%>TNIikG~;I|7D;k)x9o8{0YL+FgY&^N@f3Bd{EwA~lc1UX&MKWZg# zpNBj^?C3&vCnrucXb~+^DT&6b!Y`UOy}g0O8d#(7sRbO)N~K5%HYoU4uai^M=Hz0%U5x6o%mTLO^!l^d)MuhL^5}?rEv$7qRSbojV^i>fXZThhdDEFE3x8 zV3i%h4CE<0hpV5%22sF@9pK=Ro-vcHZmCGB)GE2rc=n?3XQw&QOyX0wF+2K40u($wi5S(XGj#9Cv-IZElZeDdVjOPHTZiuFb{(R7(Up-d7L z_mLX3QDYv81u9&$aT>ps5Q7WI5w~QR`{q=|`&9hzGvpGMh%q23 zmqN{ixn+UB5D|6Qeh?ACRsSA4_?-;TGQbg09V5!+*d+dt%m-U51P%RsWuNpC-KwCa z+r5_yTd%E1P1ognF?^~}w=MF>`C>!|aDG(V?E<_{2~(pm5|heXV%$`Cc3UX#Ez3>r zWM-hX=sg9<7{}XWN;|6b(SfYZE8%SlgOuk8xcqY28NOpKnFnxx!Cd|T(EksxB-OAP zQ*pTjubv?r#V))td;VRw!S$iEG2SrkXR7}H03ej?Zcz5!4*Vb_hjW8aEPI&Ydo;ld zyL_9kgV{ev6MR)z`W?Gpr}{VA>Yvf7solO+|ChTRfCcF7yEfpr`pzqmt00n_`Kf3x zZ7{WR*6mM&xr0i`XyPW($Xs?D{2cGRx}jvi_=sGgRpx-GTr0mI1^+PWRf4fEmEb=ac~?Yp_KDKhM@Jb-T`?TQb=Z8W`g5oZG&} z2J=puv*@5d!J8u>jPVk)pnvt=8u!~Z^gzJwDIgZQp7q(OXw(F$rCi$`O~9-_f72MH z;Tf97I(lXXYHD9#IB#~ETb5;9Bl{3p0qVPF1B7O17feJ^cv={jy@`FVWXH}B9@Cap>? z-^Y_AD^JJ93e4#mz9U3LKPbMZpnc0<`-4#><|m5xTN8NElj`24&pIxYZOfoj8M&O9 zy4PCIY~_;cm&#a;RW1LCf^sR3x|xK?N8VxmotjEThFpv}O8!HDa{u4U|J&BrTR2Mr z^e?pK7rAl6Mm@Y~69@^Wk?Re+*+95@##te*hG0JmugzTS^^x5N!9kuvstaTM-m1l} zmtc=@nY9=rl^@qlThP@TBsPqD@tmgPs}|!D=1ck+kc62=>>YTy@^LzZ*+!#_u>0qARsC| zH(P&FA&&Ir@pEBP$ z5fuq847>9AaUQSDWAolC0L|_K?8=9h>%SwWqn@(%*IovyV~G5x-@Pip>0#-5Rb7I# zkf=o!zWV*fLApc06ACy>y?#p--wbQROcu^Ce$0^^Sqo{~Sh8C$3gGO@hc)L0PTxw6 zTPm-mWC~|h?{+!eB$S`w!`O#u?iuSax*YS|8ELRf$w`evs~oWhb$OT5(!~f(GNl?x zQk9c3=b3ZLElW?|BqKnk26-K_P*Gp6b?2m%^|WhqSupfF^05yZ9u*tTiOJuy=f`=0 zP{OA&^C?q2@kl~$&3IrRdRA^oTXknHQOn=%F$k5YiJ0%Y3v=I4OAY7Sv+H>!aHpls z@50lFF#*}X-G1OO28l8;;Hq38{QQpjW>NJ68Sx*<0N78X2|Mg0pDJZ8mAtzZt)woI zD2=N7nonLpl&{Z_ES-Y5i_k@=%kRZ}3aAi~0`M`E@(aE7nnI1C^m4%qz|#(Q*Bkpx z%J(`1{QJL1BZwhZLIK09<^6z~O2N%g#{BA=Wi2sc-<~?ks(_dXP*%G0+kWYf-&#bJ`7&e#&4hRW0$u@A4b;4N@cT}@8ui@r5`dzUqwp_WR~L+z1N%C zR=;M(LWBWW$`hE5Z3)#R>zbdd*bKETZeLB&DCcRxdvYZih%`XBCa^4n`qi87@0Ohl zf1UM2-O173ymKhX``bC4brGhTe_0O;WOjc_=v^2N*6wqp$>q<_mU0>q0z!{m$)r#0 zF+cqd4el|p>pJrjxBP_~)7x{dztHJT$E*H;SdZvqkD&PP;F!k|D+OM<7eXKN3&cD& z{yze&15FuH>hfdp?Jk69B>w;Yf87KL6paJO72zd*wl>93eb0kA4SkPN$n9Th33Ug? z&?$be{Q#N?E-wx2#63Tmah|1SE!-8f7%vi(jDIO8O)ylO3{}3$aMuen+!BR}5C$C; z_%mq|Gl(JmF#qQ$LT=~w&M0IQGh>VfmG#^6BR)0VN>1P2bVF+m0EDR_(Wsmd>(zK)uH1dgphV1nUsrF+{q>zx>>N+n&nc1} zx^`RXj*h8^E~nDVC4P~3SO1ZUI8@DBP^Oq&%ZV~u%Fjq5^{UP5s+z_FQD1Q)e;W-%S+-wX&lvWg2PC857|dV-*?3j1~1t#zy{Z{7hHHuT-HY} z(NHHloDC>H=4r6?IGBr_XF3CZy7G4&2|{kK$ud~uKU@-QS{T7ka>hw#U=XigRKA)@ zD4{1?AI};c$S=L@H~d+WbAX|dMJps^&^0FK>TdyCax7PSjWg;^0baLX8V!ViNfmz& z0mFK!_Nf}y@KZ^*BWgky?~mD0e~nhpLA&tIrP?f(rRcnJE1I$lYiD^p|C=&R+?76q z?aarO!GVPTeyzFbms+#!V=~D7srNjCFY{la1;jn06ZoWBUklq9R_is}h@2u+mUwg_ z{P5H8&$VW1j7ApJ7FATt2Q|8-A4vx>atu*f7+-!JkxRU(uo zMn;rN&CC0uwZ`gA45vFwnxZn&83(*1OkXa_de>6C7=L$NgNTUX-_Iq}{GLlDQjj-| z#rp3CrXeBfajf;C&&y#>@o3d_j@Rij(m%T=1d*6MeKleB&i0}I3^`WHEFNuQ_o z4QG~D+&yZjpO+VU-t<(1T!w7lhfu+x#fZ8VG7u^RsjFB)Ke0Kk1v!E#ddI6!UTQDA z3l}criFxLK_@$6M+ZF-T;yo!;aG=*huFhup*A?_Hy{;7%xF5(`!)^TR^ltq4nt=B& zGF9I~o;PRNA$yAG!F{6NQ%$@$9{rTK(o@KxEb)SN@}0PNIagoYQCsYXeDv=rESch@ z49^xe-`P?tT`fc5q(Wz4xmtWz%%Q4+%yQH&ppmuc9D~Av-3Z#6@H^cWY#pB8fh~Vc z8x3*8{*56i>$1F3f8~y<;=d=Vy%svJ4`8*0N_TTOvKVrcNmC!;$^|itU+9@Joe@aA zXMw86k14Kv?~(tr1&5G%hyp1x0`&Y(^}wjRs&d{eME-&Fu0nsKqm2h^z(1zs{H?C| zRx*NLiHAgAxf}6l?zPiM;UZRI>%f|)hr8`deUQPt1mQ(O071Mth=k;~K}-i9U5uTm zcA431$)MF-IVuIPDcu^Y0|L9#{Iij^h*}|$fAiHqjWN*E#DckAO+(ia?7;U0TY*8~ zeS&q}0Wwv}X?DK#DceTwM#h?X8k~i~y)?U?zDCy}@@`eFTF_E*<;Ng(e})hS_Sf=S zbuwi6W>F-t%Wa#YE4jQzG;pALb<= z=u~CgA@D-sR2MGO8$!YLOv5!)%OjT7{c;cY=KUU4Hp%GM0nG0S;ta`rI3}aNwB-7P z#NkM5TgHPg0)9(Vnr?W`^I%nOl6o?4nYqyXMLBPA={{_owo6Q2;i=`%=1j2Y!6|TN zewkblYY!lz{lge%eGo>LDgJVS@E@lu7n;J@RZ?XfkkQsN2Yil75oX3{6%6-tMvHGH zv4k_{P&turedQMuACLrw|}zV`5a(B#TeNiug{u693DVnFpkC%@YR@a`XY>vAG`z^yHV5on=^otgiNjgPzn&; zrsF*3$mcZb&?}E5n$N{(e`}hlOA&>>;ki2J|L}*_T3ZIG-g3~5z2g5QT*cq(s~-NH z!iDENPwp@7w$m!_&@p(W`H}1xk;$S~i6_X22iC@*on;YZf0QVs6csABN@Dqh&Kxf@ zD-dM!GCl-S-Henx1EpCB1eRkHdkKwPC10Z_-q$4ZLxE^HUuc|VN4TX?w1UP;jJ*9e zIv#g|U=W(IkZ$@5pD)=%nlFDOPL$et(|l@`a|^`2^K1OUnGg(E6ia*JkYYIkrEEak zV^Gq(Ieo6uF<<93);3o!4Z~f+U(>h$l{8J4jeG&sqvKsbAfb3#@D2GqpxXYIV!442 z7_OqU+^h5q=Kvr;j)V;e$sKkDqKWe!LD_{%0qY z0`f)ieJp}vo>K8T$I++h$ccr388{C(-aX7Bhc2i5nq~2Zz@rU-l-~2zZPt6EBll52 zzZr7E7v>8XxpP4N{FVLY(ZObol8g4$7K31{$XIzjc5&}WB_Gz+1qHgUz#AB4vR{HY z(lukF{sP~TZW^Y)joSPEUQp&t|9>-C1iK>6F(**OaF~Fl2k;aAThSj#gv#GjQ3R3^ z>D>G#WB_9hYFg<3fTSyJV$*d7{Xdfdm2I?qD>~{4DO`N*v^sDF98bCnk3z#_4!k!P zP2NL3gW%R+w@hfr*5^IW-IEU>Fj=Q&jr<~HKNJK}0NOd&`VP_nGdR)>hm8565pn^} zXj&2X!HL^z*6Qs9VI)s2H;6yDfiXsdl#_r=pZ?HP;~WUT;G~&^5eaYk|7%8JUpUWI z-ALSK+hsX=m!&d80}YT1R;0np(JWzd4qZGeHIajCq!(?{5f&5JGlnus>@}+rg{_>% zOULwijR((%$55A1?Vk7>Jl!ycY*$`G=}6KdoutcR_dwo^NQ7P>jf4xgWpWg~EoPua zWIW59LSy+bB|t4ExYnBeBMx6pcks}|LJOV1zlRmZNa6nl8*ssu^iE&NW!cDdueqg; zOLyP4(;>q*wwW6fOt%s*1aXTRMRmvl5?@{4_{JpG;Fo1JbTVm%Q}t!9D?Wru8t3>) z9Cz2Atz1rK)*8EzZ9IjaCc5#(vUSo!y#wFv@yuNv2gw_v4y+#*m5YBD6?RXgRLIWj zOEw-zA{UhRrR&txkR~HmdLlNEhMk+-sTp|{D6Jak+$fqkD;{ z3<*ZYGL=yq`Mb}sAoZDgg%tk;o`|_#^2lkBjgox&?+KH05$JygI{y73)`s!05R=&S z1;U}L+$sQ{XkE%Dw2#WWY6POGHM_FX3UE)c#)%0%9m}J!X&~vpanwSZN z97niZQpif0^oA-3$&-jK5GDoNRjFDip7$Eaf50H=jBX=~5~;`@Mn!ka4Bd`lRiT&e z9(TW*GH@*qf7)U8$u;4QxhjqNu`iy>&*)d{S72` zjp(UoC2mA4-Z@be>j+#4!mj6jfe>7(2-V`w2kJo}OeHXF_D9GG9Za$TJn!x&A{|$+s`A3mCP>YgbCi;DD%fBf0cy4v_iOq_`?nX#PT>O-| zorEF*8=h@8!?Y73tj_IJqIl)DSZ>C`F!@;-x3ISHpRH{%3{XHuQy4y|m;hI4CI_o> zryPpLIo6kgWtrR<#EfcJZ0HRWQSJthQ^cfDBUOiwG94{tf)-cpuKeT0s$$1)%@7I9 zt_fAy_ik~c>JVkCt_{BGBE1)_8dC57!WIpi#noKX(+Meu4EniRB$NzQAt%c*zUIY- z_VNR@c5ggdP-HGqML3rN3cZ9i-p6kIyY4t5i06y*(S^qg+m4f`j{3Bh^-T_z>smbP zL}~^>jv{W|nwE~|qs{jOJG7S&J1vaxG9+!9a%~MnL#?$COjPcBr|2G!rRW@YLqvY` z3M|Ne!$8f~TW2XS)hlm5f+!dyIeZBm;~*K()X8BaCuD41<&*N%$#GF%r9Lu7&&D`3 zVz6-a5mL-$I^_`Rwzbj35!k8*lKhCM)L|QyrBg$uj#gaWxh}k%pQDCTqr(TK-Na)U85E2 zm)!}b>7R2&!6Mq9QL<9KB33l_XMut%pV#k#LjS6co%Z|oK}Mg}Qi?*nR50u$=&bu0 z>CL#QyCFY^zk)*OLsPC3x3JY^@gogdJ`ay4?!x-|v^qNP2e1xJ`Ssz&6|)0JiqGNJ zo6q$1YEElcHIEyiaF;RNRik6t8pBNwNXfqbY0EV9uy_&0!T@}zMK-(%jz1Bcd;(+! z0jLWyO&tgnKonHC)a)tgLBtiQf_1OaB0u;moly`8B&i2sML{$RZ1YQHFp$V;Jk%(y z>>oBI0)h7%0y+|^WAWTfixzk9QR+%Iu=nA7GoviWf7kPvH1Tr>udG;PumG#k*V}ks z!fa+Y}=EbkAV6>mdW_rtrJ@DBuqshxb3$FYw+^@?-nG5^N z%tgY5TgxvWF!qn|kH}r?aEQRkgcZStb<9`a1zHy4yHFP}+7)r-yK)O-37+ zX;DO~eo><5?lv{p6}1E3_~7x&!-mQyyC~}AN-)%Ei`x-XB?aky;iYsGX0bIOx;{?b z1Y>IlTgBnnk#sP5;9y54pLp3a(efIJaaG&7UbR6r%Yss;2hC-gST*<>L~71oJER2? z2tP~4D%r?zk6g!-W?jk-kDuqc;YL>}8bF!w!Nv&afI_yZ3F*^vo|dI7M&TtWM< zSCiziP18Oy^Jm0c#yq=9=BV1%VNVe!9Io@aDMVc>!_(&PnzWE0pFOirtKqw5mKvjM z-qEvG8P@DdX_CE8eH9mU&=;$o|j0|EUPdzbQlO?({L5`gRFs6DC;Dd{w7 zlp~KfsKN!qdTGDHb7WNEz!a+iSJG=x9{Y<=jnNJKRxGd=|Il6$t`%htdr2Y6>R6p2(uhS|Rz~Au|J2GcVbQ{0l_lCB|VI5f2|Ka1(-b7Ne zxNi}A_T+Y{j@47@*8ltn^}cO1TL_4ZFrGauVJvuG*80((zcW@yh$|tq+X?6F`E)l} z?<^j9{?y*z|2WA=@aIdLfblc&-u}Z=yRk9t6`<6+ImB_MmRz~LpD*Guv96X#l0fx` z8@c3STi=xZ$2-|$?Fy2||6^CJ;h%i?<#!FJII-tOHs5^hPj{|IwQ<-J(ueB|hu6$-Wayy?ZBmEw_u?|I|?ASVAve{jr@2rxOQff9@w|e}0Zm zBPri%QtgNA*hTY`<%ioIa1C1p3%ftI>*UImFYWQ9iO5zw%k7W<__9q1tQX@VOD+(k zo%I$iAu1>!SO6Xo+H^ErbK{GOV(rn``Za}vN?#;O|9Piqycq_FsL<}-QCtNCeI%SB zI??y6fBoe{MCL=oi!qqxGrfBoogL-cwVr){rc)Nwp-2$k#6i+TrRH@cG(h3=a|{B= z@do513$Z=#xi;Tbxn(Qz+>qLn$D9E0jv!WxfV(Xu71mbiwh9S-O{y z_^uuaav~3_tl{{Fo2K6QLdr&QMSD6r`Y@z@neXy791vzelxUUqqGM}8TBTlc94U*-RL9AU4 z7qcqePP=Te7ghPqHzKo;Q7SiQxFi_%5&0>HbU@xEN~ZQClERWf>X) z6HPaIzX&Vjq!*IZI!?k@`P#4XtQl&ZhLsDy$lj~MbLh|L?rE~s+q0nDnDWsDsacR~ zqf}Na(bjmU_G9aNZ}Qhh1Sbv@@W@7;o~3L{CrqU)e%u}DQb2Z9h0hlQ?LQ1WT!mUI zy7DOym@L|i=BwLCxRV!+E@{UlbaR(=c0!5ju`XGM?tM)TJ&vY~5xdlePC%5-I^Tc5 z&zER@FpnTGIP1rtU+=z+-7GgaJrp`w*}Ggnaj~)9bh}{sl>Fn=J}{D3$Pze;-pgv# zLLWGPHWRE-g~E*#-?xlIXyKDS=eq>gg+wx0AQBtSOd_MTPb+Fpz{@+|)p~+lGAN#( zADyazY9~bcP?xQ92tCzuGv4e4-7$JeKPZKE1107C+-sfvcPZNy zCW=XA9R*)xQIJS^-c~m2HOSS_)dK{_xMSYQ7a?qsMXAb*$z_60J4CO%vzWh@B2H|X zV6BqtP{h&d*pG%>RcPjQeox!GyBU{GX0bCd5;YzYH7zGnp@MPVn?=jVa$YiNyBFfN zL8H*Vg+Y6x_^=uCRPl-keRnrg=|yumwfoH=6;F=i`KocTQqWc+2GYvw0h} zLEpQf;8=hZaThPsUBedfe9q?hF{j&*vwN#^8@$N8Bs zp>NnJUBFD8b^K+@Z-^jy9b;wINGDNye#R39mK$0Aw)~#gDrQ0j_s<_hlWvT4dg_Iz z7|kzI2h6w;n$wcey6NF&ZUE27l2XfqmE)25bp9=+61E-UeLcEy(0ik*E{E;Wa_wS& z{n1=qvoBsAJzW{(QbZ|76b93*rDJ_Cx2_P>aL#@xj`7E{h>wS^VW0AHN=n@%?%DJxg}gXS6O#Yk(^S^qt(eK zt(H}|xdM)fh}kN%z+^96w%%7{ZXT_MTkv>&@ND5Cd-<5`5?C&dH42VzhAv_)4m8kG zLIC>27@K8URWE=WQOl;o8Hb#wOaP=#;XV3kV;Ns}t1x*Tc&D?D-)$hHdw{(-C9>8# zDdoj;`vvz=^13C?#5v=nitvT!~^jvrouzgMua>7G{ z@W=IvCx4GzMCFWndlN@Ey>C2$&b*=z7=v+3vj;`dgr+$79J1OdkC};xed1>2joBL0 zLbMuLp`{|=)-UEPT|Yw`nl5&{L)k@u)rLuK(qVp={Ie%lBopxpLFeBbm0v5bUkT8* zS8ebUN^y7YIPKDhd-&|t?bRN{Y+lwAR=3Z?q7Bs*#J#~jaYwaS-oI0`R(Y>}4-Hn- zoNo0j>%ne+#%fZ2i&{~)MdoV7D3PjhJO}keT{~@q{TcTX$zC>w71_9@b=$U-JiO7zuRJQ zb^YnrZi|ifo~hY*?3$RoIMd7qIUVzau_p3e$Nzq^z8<56D+I?Lf;@~oQo4(_oh&Y6i5YUR$ zykuu8Q%7x*?h~%WJfMA$lWLL~&~h+g(V!kM&>+pUjltKTVu8pm?sKP-D4h06C->aOXZ^m@SC&{!62ouhppb!CN6&r*cj52%Tj(69g{M6@_PoK@m zIqx`VTp(IZ`sVp+W@#L+94~Ll1VO+8A1 z9H=!o;eGb+4`*j7Dpv{jxY4UKW&;@GaRn>p;|XduMibp_=#EmpF)rNg4vsfwb-!S? zp4)j)84&t-UZt{Wov2=Ia`SeNa6RsuZp+Dh+f>B{?Z~;~)r66oO-4&`>1bipC}P)oY5S+?AwA#^L6d=-3sHF8U0R&T2e>DQgFLvNFBG+*@hE=h4n#v=_N zpfx5?`P}UY;Itmlz%{Qz&RHRhSqw0_}o(+kKsEf)dJ|I;>|f|^!c)* zU}h{)!BnJWsA9Wu)GrzzGA%8cGl90~FQ?qP^b(EJo7%PJ77T6vh})N2%vIigszmnu zwwuQCxE+pKN6S|T=gF&ngfj{tc>z-Npa_W~uJwb^cDYK?-pdv2s`l9?4dVoCJgR49Uf4mCMg?$qr4A8iJ9aCVop@*Nk}wM=`pId0 zGQ1!SA#7dUWP4f$ld{-})t{U&YKUHEU4vxdx1vI^_A0#K)C1_@mR_B-{Aso@cw-7? zh29Nh%|iij@gt;YE(grOTs{KH$8-JTX`Vg*XU;BQAa$Pb;7i%jk z@XJ)LIyuE3Mhi6@!m$y71kCIdsu}F8H=XJ}k-;T2fqJ7_PFJPzK&M#*+;;~CqI||n zqrBY;$RqjYmPWp$sH+c@?fSXuBM=H7tXDUhcaf{Ir37Ob4mUqN6o1foG5x`yjcB{;6`)~g?(np@u*c*L5`;NyyzVul?JeO1a4 zP@Gf`;M^%(YfO=RQFrKksPuG~&+~kXo1Q*lti$DVHw0I*ZJKUF{H=E;ypsq}ODxY@@5>3X)EG@ib1HTk&lf#%qBuWz zp>WhIpg1!;0M1 zNgfb1%+y)iZ<6_*R|d|Xv!T;}Zl+m#FrGTp+MrNTzY6ysNJi-@az!N7?5=gzvDE0o z6ioWNyCj`4mTo;dPq3ucA(E3cYALWAPQ0P^htBxDrdq<& z{3JHD24^)kec0QC$wCIVje*>n>6V?S8IWWp1h&VZ8s*b>BJ{283NtsI!W=#+g{etf z{PC3x6S7~1FoITR&q0se)8HfvyWQ9r(2M-edQpGb6`!FAw}ur?h2zyWhrUWOFa$15 z_at<)3 z^j&3A)yyxf&;RO1U&&z!oBzm@T3C0jFUyF#zY9mldA?jAXK=}mup#<7mzydL^w^dL z5)SuHI6U`Zi|X)Qp)ig_H@fxF%7F=XNQe7Y!o&(yxQX6ln03g|Y+oAcjvR?OoJ9v4 zGFosr)-abgn~ttmn7VsyN7bC2$LQ7I60z4rzLsqQ0{=V3{)Us95X-1?t3Qc_#5tnDNl{B+2@ybi^O);)#}d(D)fT`>dLPV+)_xo=C2PZ;Em9Kdo0~OMv>^` zN~in&diJ-=ExPV%wNwYwVTWcer!8YD$wrH?cs&Mry+)a-kk!)`>sbpM_UEy(8Pvh# z6S2&0m1Fs*; z_8krgQ9|r!J=k?agi>6@!!paghvn_qKQvkC(%4dNwa8L!D<1n1BJF^&1a(G15r~C)Q0hNiu-#F`dN%WQBJ=3*Fqp4O zVmKXtDdyy}Fo#1O@pOsp&3-ARs4%J3_!qK!!uIaHnexfqSFi$RtU9u}EDCJ-3*KMn zv1U6}Cz#l~(xWovqA6_@&|99a_oQ?|gYE<^<#bK=!`{$ixN|&-VhC-&`I30I>F!c? zIgiyY_GSe2qF(%G^h)>w!ttGBf1cJ*@lwa9XVmnpN!oq;TJyP9W_ec}WGu3URWiC3 zRps@B0uE!VPKBCekCr(wGPLF{pWjbYV{r5Nq$V&C=Iomp6OL+#R>@-W5x`f{S)v4C|A zs|ZGSnagFBmSz1KY!=Jl2~ss-M~^Q|$r0*(?46%V?6=KUCM|^Vm(!X{p3J^7nUNau zE9qmdp3F$gQJQDooR==vu0E;gXG_KC;cPf(6X4mxb-iz`X{i;`q&J=5`}ygQ zH|VP@K!%sX*UZ!c$veA)>CyvH}DDoRbGPb-$GmI$v4gyQ@bw;1}-<8BK1U}e#;z~dL_8|A! zOZxvq-J3@xxxW3Qw)^hfWoqqA%ZbX$%G69v#i_EiG&M8C5i%{OoN^wJ%F5Ez%G7c! zO-(>?OjD6^A~Qz>)Kn6307n!RLEt>J_j`Wp{hjx(v(7ndooD$6>k*#kzVGY0ukmwV zmw4QWY}~kIJk(>z>fnO*T=qAg!XCG-yr#_VG-y)z@x)ALL|fNILEO_;Sj-*9MOcM2lr|I5esG@oKz}{bun8B5_d`zC{>xOfYEKYlp==Cha9xjeiJsihUI+ zn-|3QgDFx6&&_k48{}_M%6x0s33;AlI(u>-)l8($UK>7FR-?6CA^Dgdm*Cgpti0xm zIy(1mP#Z(>OdBMdOC4;u>f7)4Ucg1k>D&<$3pEjPi{T3&{eKi=FA5w>FQMIAzce-S zesf2zVoDOSL<1M)nmlryYsIhc+pv7n+tI22kUl`)h%{8CSNRZ+;&eQs9zKD=lY;~s z(+R6*-olG?iUxv=&SXsed`K_VkRVjU9qhB7BLB2R>RK|gp-PGC7ZZCANtCq-ZJn}6 z-0c+R+sRKM)4oxIz1#}g{Z00~4n-E!MMwv0zcM#}{$->jbPW=_?KXom{PenYYp>6C zHOVD9K50Kfr^Cuk*H+ikv6Sbqn}6r&;#pi+(jv^xgW+O_N284wULts$xS=`3>m&VA zXK^{-9-o+^6ftvrSTdnBCdRGlxTN=hnbk+^G)4*MeBCI6BV#EXEqYg_VlID}Z*Z#M zoMp*7KgTy7vK3YdM)Cr)zNqnlsRW-{W(uYtC!{h5UXKe4q> zhNWZTb(huW7)5(DmVdez6|({p2fA)4w`mr@l-$hfTv&>9VMI(?{Ph((8bj}HcM{#@ zjC+Jyk7?siNa3wUud$I$LYN)Hhr8Dn-)KL)S({UC&M^HhZ*H)-EFZt>dA=|{BKh4_4$u=@5*-#JC@=_ z&HQlIpZ&0RwM&+|ce||!nRi+iGTcD9wRk7mZnSxlDXS?fY^8E!4WKy52fRg7Ftdai zK$k#{E4N#$|0S7cMS5u58M#G0J1RcmE2s9D@@}!dcbl^=Ts8mxsu4oKWkz!E3#8er z3X}3Y=C7dGA0Pc2PBO6L+~k;r(NFHTW*m&dBxdQB(`pAz6jbT5DOS=`bS?$P1JV;0 zB183314n8YORdtTfI?`Aj_K311FN*Ku9PIu+u@%FUvE2GY~HVF$_QK({vjOP_Emo%MydXEWAiv)oObV&LM*6~oGwQg4?KVQDc4inxP{%kPs zR-cI_xY+*AQ=!z?f$=Y2&UIf~ zM5(+~sVo5=^RWX-l$lnMgfUT3D7zNRRhNs(=&|alx+1DU5&jNutUTfd_wjnnHCiK> zw|3mz%_OHS@W|rJ|R2hrclJ*@|Kk$Zd ze6OBQ5F-AAvEgyI4>cE+4r6xOf%0S4ke=;HivjIP)US0F@cKC&qUUgYiK)i>FCwY2 zH)2iuJoZ|iUSq$doJ}B`L^VFMnj79SKOuF-C|X3JQ>#eL+owH z2BnUpHt)#MyRdzh&MdW&BJkBdA{WDZeoE{mZu1}T-84qTGGdRkdC@(MT7wy-v97{I z<`d7+&B`1Vgxlr=F zRG3#xV#_JlesII*pyLTo@gGYkKkqWT|7g0@99ukE&9Tbj2#>E4;YY2rbm}_l&Y+Kk zqJ}Hn&EWII6QlD?G}b{p!YXi7!}?A)G9niohWZFjN)?)xSu0;n2pU%sD*ZIknon-5 zZ>>=A4#@i`PdaF?a2j-hFrbm=PcGR9wz@KaYm|C5*04|(e2lfTz0s2(-&IteRU+Ts z6*hjNARL!~%h@)$U#PsW{=V5)Q!{C8NA3=)iTt9Q*AAPWz^tLvNk#ZRd)-R)duMx59RnXr25gpWExw={eH2h zgTPyqpz6VY_|)mY+R1a~%`m^w1Z)8-e<$=B-KlPcxkd57Xn@Plg2r zojUq4?Wpy)Lr{BAt>H#`XPT;?Zn9qyp!ZhULjKp$cS1*>$#3a4aTi_m?hO6hO~Y@c z?ZlzZ4Z>-`v#GmmQLikXqt4NudJ?~S`x)tq&oc5eb;Wgk0UM%FrNb@sGD#KpB6d)u z5Nq9AHpo$EogVy$*+zOLK{+YV4%bWkc{!14!rX;dVrP&S7Sa%E#+ys60)O}*&J&W0S8-HV?wcfSQ6B>Q4W6`r2+jlR^57; zrD&aS> zBdN~!+zQ)jk7lXi1;EZ{UU7tyGOglyWf1TRH=*x=&6hNpd6(GCKg7UUNW==Z#^V=t z*AYxAx@rhz;zmCuqq@~9Ax1Z5sQEa z2+ap9fz4UCFxuN+yXT9pt@;JkoS+Bt)j_Vw?jgyx))EWEyv;J@=0%GZ_qy>MX+3k} z?F2qGJ#)P9S4{rO$qX&_2g{KLIsV$LW5Qp|XV{HdMB<$3a!bx0Nvq@B9~STr$HZ@d&g z4H0ck%Q`BezV;%4I9>UlVfwEoBAZ(5{e=4w-qs)NvPVnyLwhNQMU!=!sMk+WPlg+2 z#f9+5b`a{7|@QgP=5y?^T)FW1~L-*gg@B@;^3eiFb^93r;F(7LARS z7;m^3$5K-twz6I@SwT%}V-TQb-Utd3B!Iht9qM>tLTY2Xp zTggXsNcjB7DnLo}51^dRdHXkJpcG!l(%iwKi_MF$+*U5fVAsX4tNJNt*1xKx#!hMH zv&P8bgLW2(O*#m_Hsbd~Xe*z6#(!Ybs=d?ipw8Z!AJa*&;7oYoY#*ycXD>6Z1pElnG-zaf9}sj*?d1A zd&cH3!u^l*z||#$^gs96Myj_(cKSp5*&nRBXil^EKlh{a_EZBN+#Y}k^BfnYe{P;V z0dV@mAVqJ(iJ1Sob?Bd4|9nBLFXS)6mVZARCj=?}-@JX)=+A$Dc{UZ8;lH2RIopN1 z|NVSV*-T&R-_J7!0IUCV-OKxb^!B|or~OB29!bcV0HDkt00hdd@KFLN&M|pJ2E66- zYY~@=uD9w}fbFm{)y-&7@7JA`DTlo??{bLW5l9V<@%+iS9`@g z&H)eoFr8D~%bn0xfJeJ4T(pw`{zxr{Ko)YM_sqNuRso5h@)d3V=;n>&m};OmYK ztJN}c_*1OUyy|}&fqJoZcKCsTfV1%voR&ut#;5Pef&oC=DxU)=Ne#D#>k^Q?(tfS#w*y1kJWR56E|_%rD$sFt)ztm2qnlz1DCE1AlfM4K zM1ABh*#RG$>@(^Jg;>E#eromrK1+1cU8N!SW4vqR#3R;~+6n|OTr;WsS-IH^#cgx? zIr|9t?%LLOasr*xe&mz64B)ue90YmV%hj5}2YIlj{a}byh&tA(x0cGocR;@$@l+WI!uDuWtt^(t(9fo%?%zzPoySet@Eiv?4pr?W220tr+PD;ww@ z3upYv8f(lMDCw|sX zYjZi>$5kA0poF-@?%&VytUl%nEmk^e)Vx_hK`J!bMi{wWSoFtXz_|nKQR$ov@1+DY z@#Bami6KjRX)d4IpGL_$S}4EYmtrasGl(Z3@4WT}TFijy`lsHg+7pWF2S@Z2DcfZh z>%_$rZvwnr_<;aLOc#PSmJGb|!xoJrgfj`f^{i452FLuSHZE*lkMr$d4^_|3wn^u` z{U%?!@F8Zg*-CT4$?HnjNMmhreoT2Yl7fvn?T3XoSdPrD1e zIfB0RHJ(%;`JvJhk%}l<2u$R#ij(Xh?N9$`D0q z0d_?*zN*80woAy9N64LYYC876W-b+cC3TXnM^et(ZNQlw4jN6B-G7E}1PCH&SBywR z)-jn3>+&?W`k)D5!)^8eHE3dn9M0L39@Zvt{hTC5&_p-_zW~mxfLT+#A{30adOh2e zESC#--&wz5{G7l3AEkLf$5Qr_UW{|cYA5OwKF$Sf9Lo2VarTRqy4K|0Ox$=ZJccMD zv`D|Jqfx!YZVUqA-rSiI%UCqwzL3s5N-vLD{KVrg#w^;KI%e0V7AU*2K0mEht@B*f z%l~w2cKBt(YDQ7kcVI=*YwfQS(wiyl+s!xDzGDzW0~#ZCjb8I2K^PB+f3iXJ2@rm% zMPjj;7m!=p69Me2e5|o`y;p0no4DIU^Fw$FEXLZ)SVP{3R==YDIS&0}VXRRhN{Ju9 zGBcnR8nk@udB6AvZbx!XBXwR$X@}o(H0eU%y*{10ae_$7rucsZhra_gBvv<0j~r&< z^MkB16X@4Wi@I;p`kV`usKAiCGmV{&m=A#)b^XX9vCe9BS)J;0a7*jw8y^@?)L=A< zi*+31rQf-*S_m=;p^4kp&u3&;uVH!&c$nZ%QKP+4eH5S)*95@Bn*dF-hDsh4z44B& z8?VywEBTOuK9U4r&oqreg1&q|0_Fvve|?);@V#J5+evzhHlf{}H5NftBF|9LQpnw3jxT-I5QxI$Ypb!@n?JZ=San4K3>+m<$TFOcQa@bMHOLua@@i+(YuiYI#iUu zT|&&`1>f>a!Lq&mW1QM1Ab2=47A85mDK(pYFZY;6wp;=|i2dpt+Us5X;S5H^(9znd z?E4puoSqaM^PLk>&nJaZ6q^&|8oC4gqN9)r=QE*9Q=oQrP5VB^Tfj0)!A8Cq|2r$2 z8<`g-xc&1j#xLMdd0>pSBjZY(6EPOP7>nE{loWSdM{hwtrDD9&(lkta@~dH- zLrLI)IG~6GE^B$~H$xM}b)QQR%UQKUdF2l!-PH5$#6}fVKBTjD&j)X^SGV1({2F&e z!EP+Pt6TNV(gtwwBP2p)jG1XV6F8)5f(16{v}w$zKsf1~a7tTlFVR;r?91Gn5tPY^ zu)Mg1Pg>&a`#Mj;Lod8m4(+5}j0<`gaV4-UEJ+sN?R)Wem2M8j1d`4f2jXt|jH>ZZ znbi_nedLGz86y-g)U~=fC)q5NIJ>!>aJJFdj~#n++72#Bay$yh>%7{Ak#{olLB%1G zs+TpKuQu{VkwOI5`B^ApAoaDqW44nW=kURDM3nLyMMDI zg>X$syI=KgkO(d2;L_5!QNGjbURqqDes%)E3uqP0J@C^A(%m_GVQulTL}v32p~>u7 zTv}@C5k*R~94yjZZd8A+I>2bMH&5-<4uB|Rl0>VLv&k^Z)80i_uRrF-M9ZVN6w6#i zd^SLxR-_4I#&oMEl`%EfI20hzJaH1y$n1Vg!G&h_(1NOZywo~)@ARr)H?t5Lu!h>Iqa36tQ9@fN6L~(;mI@0_K4eA4Q&(i zNc+uqD{ZqzL8G;i{i`1MkXU|$s?u{(=dRl0Q=yeTV0~d&iwkC7gZlpHw->HtcpP?a z!0IvjoB=sxphlb?}8d!5bK; z>6#KYWx@BlzrW{lYli8vmU^;moh%lAqN7%ePTt>M=1ZZ>Aqtj{^CpSkYja>{A-QUA zGY^jjNEl|Qy*+_IqX(*=Xx=*0D-GJz%1+)1aV{#sCSt2j;Cd=)E?*(smm5_S zWZCh=f`%&5zP1N~pB~!@jU9j~97awqA*DRC@LyjTQ*W9j8(?Q@rL4`0ZE{hc7;^*1 zMz{O08qdzBI5hGUE^HQ_g%(4Qz5C>f>SB1gn(cb=`v0MjX>bd6LBto(#T;)@A2fH| zGf>gr)wEv3LddukJRjTtfK$Azb3ncLhXbh`K^mt8xhAAO^&iT3vcFv8jojfo=%@7e zD<6SyjhmcSOk23o5B)0a+i2fEoUQZS%6F5?T;$B6!utH|xwKmZAe855r?Qm`IX>Xc z^3*nY(ThY+5UY7N2d&yoN{!=u z=TXQ|7;_NR+>8XcDIi6l@HYlKGk<0lwwCHAxjgn zRas`w~b@~al~pb)FMK+8* z<6BAvf@WebiIz<_jD!%cfo7hs)do=jnJt&%6LOiqF3Iu%0YcI^9jOcIB?>h5fetvA#!DxkK90hsXg36nW(K@> z&VH5+bHG=w>f%^b_Xyee#1P2*Ua}wbit3^0RvBJI8prIdj>*CS0a-&Zy*pZ=1bgQN zSO$KR|D?~`y-3?2C$^gV=ET&X;rtmtGUoMuCVKHu#L(-G)E=9ph67aWE+dr zt#=aWceS>!f_B74RP&zbIgL`PpXprx?r2}>l11t`ceqipNKwNgI*JMEl2`1*TG~aw zJI%;`E2Y%VS0WImNuDJtkdO*aMD~z6OveiA@9q2Zf!|PHXa$WeR#O77!V5BB7p^k! z0yIXetR${tt!FzeJW&Y5okPg+%>{x)U zd%THNnfy|1o-S2#ymTP#Zeci!+2q_&_RR)}LfX5f+ZgzFf(P+`m{_hgG}^&yjXKnR zc6w6(7=|0_>?uQ4$+hr&|6uqsuC@nOI_4o6buYhljr>vrrA`j)B+Vq*lT@Y9)y!ePS>x?}4u8if zyk}H2l!nM-B8oWk)IWvlkA%xwFij`9hjgW~rxP58S^nQ|9yL{t9k0%8cTrEFo5%*f z$N(w}I%S8x0vykXv4$`%(?knx9jGqnRU7Qs53};SS$|UNKt`l$J=i;<|35W3Hl?gB zUfo$myJ;95_tetB!*09O+pfAGnvUZ(8WO|TVFIi8wl1E?+oKlcnVqnKh)d?0E2Lz? zme}t@R|h{}85frhh>bY?Hg^F--uSuySV#m}d6tL-8Yc0-CL|!(mh{QSmmbYi&TcWT z=69lk+P4Bm&fpjL&gN>zzDXtGoe>{5*(yWJ9(f`doiSp_eKu(rRNYadXpSCmbeL@Y z6bwjtT`$R(Hs1|VMD;AbCt6!j+(1Cf3%S z$;}AE@{Z;9r;C!(>23)e^J^shAI$xRvtVz>b?8Rbv&kLaI`e3~5b}aq+ZO&f@nBV5 z23{h^gaSGNOTJ0ka7ZlNkeAgAi|#|2RH9&hi3J}t%0*sA_;)RW{`Ce%adu*zZTNle zMC9h)@rYCh7Oc^5O-rIsieO!W$E~rSf=8B)`kBIyND}k{#}%pDk0;QbdND=3nRaHD zr|V|jb5^uC*X1bY=W_t7RSuyZ)F@E}b?xWX_jl3CWO;3eorQ9LFVa(zFKVIpuCD8x zEbe&uu?sUIj&jaHL5YJyH)%!#TZ&FZWazKV1#VweFXONO^|FJ@0wk^XiNed=mrOsE zw3E5+cV5jsAY@*loJwYR#O!2msj2?G*+g;9Xuj2O41)d^|-Cwj|jt%46RmYClDR*I827F&IKJ@WokU;!fx!qWaATqy1E=x$ScHcB%V8QCbaXt&C2+YbgjwLjc1E%+biO(GDkm z`f#Kx2@-cuu?1D#P)dU}OSR+QwvlQSW96(G-ydB3fV~%SCE@PIAPogyU}rUkws9Vu z(ZB8xx6*d*=7xL+k=3=EYE`M2!n@gEn;ZBXMae2ShDuTc0wx|x#QDzpLEtpj2e&QKd#%PoAIO(+&g>i8yX14b(BOq_ z$*%wg13jv)TpoI?*Hr0*TEww9wJ05bYbc%U2==Sx-E>&JY_(Mu{(tVS9+|Ce0oEO> zE^B}z&(~+D=0&#b_R><6qne^k+>PI<(aV5XTZA|BEdB44h#fduqhDe~)$9%#xcBNX zAUfr%d!ko3MT?_Wb_uQ2^2;6V$cerrWir9sRKajvdt1ZVkk;T}8NpOvA=$%Kd8-pP z5n8q{g<;B*kEkU-;jmv3=AIqR_ZO6bTXF~u# z#kp_q*Qv$X=go~Z&S5D5eQwMT8J9PNz6uQ}GW%5d8bLT=d`=HV ztGmYdc_JTc&qJ9w?fqY5kqW&cJ*vH6cv&SED{lpO+4slxu0J+38wKJB7VsjN1i=b! znS?xPC$63Z8|}{4gW{UUrm$FQ3TV0M|C~df#Rj#TIHtE~y9gq*}J+f~385Dod2vBOj7Z(1MpQMd_ z*|828D74V3M{fKS&vPUlw(@fH8VSw;CsMYYZS0IY;#X1S*>q%*)9ao?@49(te__MT zQz+{m#=s_^X~OYkmdRjO#qPaOC2KO?s;xD}|x}p7F*Z97ttBG)H243Q-vSwjsMTcWKMRo9;N_G{p*4N++%GUy%KJg|SWmNEH@c$8j7F5Gu& zs=fVceb0Ba=NCjNEd)ojNG_4~c=}sdnQKI{Jhy~C2ULprw@!|Q>GFhG+B1>s%ns>w z15ETQERi=%9N(8=@YF;r3RCSY0DS58?^@wOf0vM|dtOgH)3+WSJf|M4n_+LHG#Ik< zQ)^IdtjoY7w~uIlqMH{R&I)SyLtg!8DqKLNcn{TgdhOPR+d`6qQ303pEhnB|r=u?x z^@r}@qB=rb3L62lt_dciq|>9VrgWYkrjG^tknRsal6QIC^_w?ys(#u|!VD5ECZRC30HfW6EXhP59yZI>e z`+@JIb7`TV+{SPgMkjg5disN`|8f`+7Dp+ir9VR$z0!Q8`N&zPa>zcJxgUG*zl=W% z#tToQyG*4tEGoz~=KvwdpV?Q~L3FV+yl(r5PUG=c!Azy{YH|`RdLjC0b>NmV)C!PN z87-eZbEjtH>89Irfzk)V85hWOQMJUZnQ-F?tPRB@&?69YZ!>=!j9JGmD7|M))W5e~ zS~}0gNY`C*#2$Z4ue@0Jspxtx=HnNOhdinE0{yD`TQXZ6CVQ@VO%;_ZMW5|PW1CS) z_A-SlY)7uUQoI1AU6$qfj7Qv0e)Dnar**q(9gtuKbWkh#piKv4UCOxfAR37Dod4c) z-G*D0==AB^mYXNbZg14u<8^)}6>V)-@-U!cM!Hr?_nanQ?hVry$N03z8W`?|$d_c; zKzPLzRODsd{i^A8%9}np0Qh7a+|U^_1eRtm?W|6OI>ze{b)T@g64HmtOq!&q;a*lY z6`shu$XELbJ)@SqSmyER4;0O>Bx7z+(TtFJIzv9}Da}{KEZre|hqHR~n=o@$L;JuR zlo#J*;p#u(4Voytp-4~+xe`kbO1)s3oIt0UD%4kRrJ?e2i-6!Nm4$0GmpC)Wm^Ew( z6bm^oPc;}jEMOhLL`dKsfHiTxj8X%T9PU-LG{^R6bizz_OYbYFkcQMOD05dT3p&=q zdY$hqdnAE8(ZY(Pe7auLa7`6$ZSi&CH5v7T3Z&-nC02MJ56m2Cx1=}ZQ+3-LIncP< ziSf+bxSw7pidPtarXur?NwUjAEpjg!@wc_I*oQnR;%CJHX$F8aP4-8qJ2lNb7}oYk z2?xT(Cc@#aq=QqUQ0dxb5B+p5LCj6UIZRA$4~{EcU%$T47#oAJl+Y?ck93{$C%?|v z^BvW+_~l(A9imDO@Jbm*r|ctM&c*f~S@>YN4iWDzV>|mehV@;|i`VR_n4Uy6$d~t9 zkINliJDHKNTC)o2^1W=xIT9`o0c-hROOjGD^eWPZBn+&O4#dHImTI)}JfaU|+GrnL z9kx1^q4sm&ue{V|Ung~C_3$M?_Gi75C)!_?G`#M!0d6drhDWcCsyD-&HS)5YZ|1XO z!iRoaY%U^;&5V8Hw1&zK0oWa zD$eyl2v|GTG(%9k6;4q`rNP9hG39IH8{3ETq%P`f2pny? z&O8E06nq&}$p?TkqWqk^C7c3;GPcsdPG#>^ys<^PS`r!i8vPWzhZ8F51G#Tsc8J%2 zCnBG{yx1zrW|j)LWSFL;&VMu%?bYiNC; zG=qfSrW07$W5p zkNgwJOZXW~DqL*TRLlp`&wKtf(RF)R0c*4!J?Cx?J-TynVly!zT^^@Z75E=KBzhua zLX-@R4sJZHD3|NJsbSOoTFXqceB`33WKE8--$gV4dv0bV|MGrnCX+%nWdG--j?FK{EZ6_QFs72X7k2Id8-c}YKtqf%h z0MQ`h;vYo=t?k)uD)S1`S!)>Nm(^;l{`Kq8yTxj<0VM#wc-lr68&Ed(A#V&hX5YT| zEs&qNK0)>JUwjR-?(lb?e|KorpW5tZ49rh+QbvE=Z8qU~sI?UA*PbhTY^m^*qU5}_ zt|0!L<2kS8A1-XEz)eE#xUx-0BS+y~ykbF+t0{F1_C0A#!yQ))B*T(7=c;=c4B6|Y8}Am!-cg+n{Ib!=?syooGk;10iI`xm{HY6lj3+^i_}7Fdq^s+Es>(V zH}DQ6m<}8-foXML;Cp;5uO{x*z{dv9ed;?(Oarxm|JSfM3W2qp{|$q%-$L$ zal6+@ElM$5S{8Z_h|OR7C%tCV;m;f_1>&a@)94L*y_mxQMGAXE-RC>IfLSekn@)J0 zpS~MziI4+wm1F_>vixITgQTwhr)>VhA{>_`AeWmhisKd*FrYt;d1h5*&q9D)+ zEfI{<&3lG!t=aZ)eC(1}i62Q~q8{dl*J^unW2i5AGgGWT;y&!E>d!dU82fpIaX0dC zA9FB1|KokB$*(T#ZyDylQrh_iXlYw}pWle4=>MLXcT&i9u!>OtY-ij2eGW5Y$+4e2 zBa&qsbQSe*YU~2N37+6*_)M{!cmLad}%)lE3@b^NRs8t*j4?tt?m}1(05g}d_wmsrWz-6gx~BrkZQN4bbDInQL$-E{*gX+M>Hm_&{eScRW&YBe zWPs1b#BPY7LSoE~l0~E@ul-->1ejer^LVxu-zz5eSp+c>8w}|g_PT|C{Tpp^(JrAG zD9LLoEi?h}FCsvY*r{j2&3w}e;751>a{|PPfqeu3PPmz`1;(<1Tie9MI;4R`{pWf+ zEqdiYSG3gs_qTf&GXCDe_1QTa8&JQd8XOUZ~( z=J#A)%weZoUepJWd~qv!$Q2>tU+9r{)pq3bhxEN0`nwG-+RZe|Z2mvf zJDVoCC#CVp*W-!u)EyI?K%v9@6iY|Z^m%IFzc8sRjBHBk0g&pUl4HI=rw-u#cKn`m z6ZK7WrP^#l-5>uv$2$CgVsC&l_8YB znEaduQA`Q^cZsu3KBSX2I7^}t4qlr58RXjHK>*6k{R;ro8GdNWiKhy~OyYv{7vvMa zZvO@hwhkEV;^x{HTZiovoTUGni#4ZJM-ls#;IaFay^O9#*w0eBxUvy!CqeobUGv}h zSUX4%(qfxlJjnr4XwOy~37aKbw``o7;M^yq@U#u;{vDNQLYhC##e;gRJHGq^7mQXwMFf^dd&_CaJ+bOk!khBpA;e+*noVt7z ze|%ASrBUG6Vq@$DL9{*%V132R=c&9(y5T<$x_8uYR|@DW z0exuM@zI?mV9bNMGAYxx4nX(8J^y^gyJ}Yobduf zCwNo26;%odjNziGtP-{6SisRePg;ISH9Og>gDsl{AG@=l1(fY!%QY`O0>GwUpk_6( zKKEVYD~1LOznpE*EaJI{F6tMA6A#`ofGjL0oyV zTBH=k6!2wne9>S5ycn-d)#M%49r684!05hKas+PH%{imc_xLB-^Che`Ks3%e0zdoF zSqmh=ITH!9Y#<$K=9}qtJ}2nTCk`!X?3yKi%$jdTj9lucCmk_KbO!X*qrOtJ@2|D! z0EAUqO*H6xAFuCEfkKos?PW+StAs@)6+n~%6~hB86|lH9q-k?>*vLyVXcM4ZbG{Kw zHU&SfTnxwi)85$5`ZZ=JIhqOmXKqAvi9zHPS3V2eRuBIToBUj# zy;N?>HG^c_0}?B`j>t{Hx-q*iUetky(!3_^98S-~$Cf#hjRcW%84!MuEAM0ce!Zqs zEKD-6q(%a{`(eI=N7pyfde_nI*|dootGSg$FToPg3Q3ciV#%4F zuGnnEdPk%d1{AHZCu&GzDFSw?QQVMgAw<{Lo^;h2(%8&=V$zVJ@R7fq2}Q04_r>OY~IsirZr7sW+goW&l`(& z8`Qp2&N`|-qrq_qoit^#h*eu(XbRI=sb|>jba{a z|E;#}^&1>h)O5)30u)|5H_bFosFG^bNxf^)D$}z(aWGP1No`b zO^}7So6~_g>t^YOuNLCSnegl4^Lq_Hn8Z-J7F3kikfY1JmD%RRD*4)7U=kAw#f8t;TOW5POI{15BGx5;s4j1YU0tO- zNZEI0=LW+Ti3$%R-gVul$(jM+Wbmt+1j>0ROk&Eq88|TR;06i{x=}W!>%abDL|NR% z8jd)EC>`4eCbdbFzoU6G(%BD5-Gsf#x1Al3ngsVTLf4tOgPZ4PWOPytpDpT&w#_}* znJfB$&Vo22mjQ{!?zb2R&WNbe12%bhyp8($IB#|68U*PGz}5}`L^<+9H4oHHFKXb)$EyGsZaUNTeJ2S_w0OE?=S)>)UB+Yc!o8+60g1gXqHHH{tr> z3l3!hPCj+Xx1*5HbLs`KoW6E3j{D_*^~yEvBPYZ%?n4LGz#%L5AjDmZ=*|)}UW;!r ztdVzlPS!^XlAv4~wKA0(F&^bdDVLm04*m(aC#sKE8*c8}PfidC+;Cq8B=xumtn4x; z8X4*Jf&ed|2){YM|58}*68_}Fmvf1z@RRA`8hN?w)m0o&0e7kDBMP5MxOfJVJK|qA zR;*H-3>?85x!JrdQWDKdhOnWL@jW_K&_XMXPlx^2J$1yfBWboKrRHw?u?@D2i^u$- zg%8uWNlm1Y+M2eDwC$TI=3`xDqOabp1azW@5XAW%=9OcYg+R)BQK*z*h9c+m?IFyZlfM3-uQJn z^BBy!)XfDq7m$?-wfBOrr-h#Fk2Q(ty(d+Mi<>Pd8_5b^YSW3rn)_a#u6X$Y{NhD4 zP^=KB#n}X`9ZI=E?v^N_ss~jn7~dugs4yCsA4+2NcK&&V!~H zicX|VLO)QQBxd2$^yo`pfYYp9T&j;lE*tVNx@v(he+1&))VWNEx?W_i!mmOvE|

    }RRhPq=AQ`t`T6ZFW8=HAy0xy+Ur5TmBjU+&httE8 z{^7Hk+_$&f?hlxWmQbw2yQPu3YJoag2N+o>xSx=b50uO0>SFHx;^igrIQu>5MJ!wyJt<*>~ zF(Pgu91YHic$!;HdS#)Z;T8KfDS+qHfExIvTR)YfR1kU-4(Dable96amb}zKz@m%= z3Z`}En<9ZA{<~6lKA+zs+ZtU9K|7EbjL{GvKkr=5Gzc6wsudYbzIMV2lb3}+74b+& zk3RibzvQ)F-;I^Zq@?#6#y~O$(Q&VzPBBPe`_u5`>wJO9C_oVOpZ(th@%*(&eRP9N z?Sv|D+%ZZXutMUY=;&gVm`|2Q4YD=P(f-5$JO9O?nQhYV)PBZHhq1yA4U>K^*|Up( z5jsVT=fl4-KO#cn)s2Pw-PxGZTeMFa@vwsIZ3#Abo+=Di2Z z>*1W0qnfM>SgWL- z_iTiC-uJK?KsJAZuhw9tfv9S8Vn@&>s430mGYGluny2IQvLyGZmz`IOFV?hkoAg0|hQ6#uXZS4qH_M%+|K7ETWH4y)L6DJE zf@U+~EZQbV#iF-J1rxU>*F&b0QLVZF;QVYYVIy+sbyG>t1`nB{vN@ct>1$x!ab*5L z(H`Pg-#g~|CTpIqw|jC74sJI?H!XitV}=72pMe@A8%{@HIXu%oUGjlel+N##S6_z=$IU)Ca4xTnPl6RAesMDCZ7THq)Mj=%QfW*2`Q zX|L{^s@~2mG~J9B)u9$SwzxTwYgrp($XV3m-=V=b9RVdtQ!pLkD`<0TArb+>(|*dE zpP=(*@DZ5q1B{?wVFbLfEZ5{5rXO~dXKJ+O+~7PnHKy52-;2!);oA~PgUI?D=%b6b zQa?_51xAqu4;tSjwT)VP?FPj3T6=HiT40-~5;@?J0qF{^9G-L0TRvUg<)gltD?Se4 zjXD*z?74a}eC02%oZ!b$j{~zLZ^7mUfYYlm87vS0fx<6^o=v*Sp`r1wh0bq*gM`jk zVp_T5IKUjemei}Ja8AA5@3d@tp&SG!Yx7z6M@3#xGswZ0m_f6PWk)`$&2#_`mrjtb zg&oDL(GHUUEmvvgxp|F@zwmqYw(U*<+;_74MU(MQ6P%2ET#>9Q9bO;d0n29F)1{2p!Kqke);w`SC}Fhee*kxYY|v~#Lzo~5~JJQmkV$q zChPSNB#$;tyfd~nV+}-(JVKwkRENddN;q-qqgR>xys(ay=f{rP<~7~wlC68fHGG<~ z`#rGbzk|^&tdj-)o5x_MKsv?al2X?!$8uVkGF6do**eohj#pwx=Q8b*Un)BfUTZq) zVP_QmLeq*>pOrmze0aeojYzqKE|@L0m#~gm2ZUIz@0EmAmt(WVlLjGE57U7Ny7f_@ z^1*K%_Ac#P`KMIJO@-fj?1s$m9gz^dEN)s4aFAfmR(SX$0AAH2?SodMKq-rU(#R;{ z=QiQmD3XKrPc!8e%+{H%Ja8V3?2gAij?;A!7fkB)Pz$V?g-WJNb*BBxa93efGhmwP zJP6-h$`m-Mb5R0RpwUJ{9XF^ltNcKG;jD6p!gd!tk2}5?q8e`u=OvpB4 zEMqr`!O)alxUZqk`JC_f{^x!?e)r>k-2Tfs-tX&uU9anUy{_l$`Fg%a#XwQahWL-q zLUX-oB|01Z%jxLGfGF9$YC}xJXU%G$4-~MI8n|s+Ve_0KmUE3Xzpen!AakoFWvRUn zw)s$6^Zqt+X{-h-SUZ1>s<>?+|2=1qRwNO*C0ud6knXwzBm$FZjWnfxSyJ7j>Nco4 zC3|xIP6(^WGNB;1WP!N&4p(GU6{;@MIQ2f6zfQn=*x0LOp-^pMO0P2#c2>Y>SMFmh zj*BcsusPhpS0DiJ^1q?hUSRkL)S9LaQf8QKb2QC=dZM}L=>9ng&PMW=MZw%XQg6L8 zm~IJQxFFejd3aiQL@r=cb^qsPR1i^ZruCxGEXLWmfN9daN(CLs?x#YK4Dk{p6?B9- z$O)^b#G%ReLTS+QL$^t(p%yMI@74F^oE8U*+~#^B&z9Z;dJg>=@{(T5r=?*OfjY&v zn4zKES>EMBaEdXsxYYdUkwkPX*fBZK`CU-sRmWZTiN|%81`p)c*fO9?W-_xl-sChS zDS-NSeTr@RuD+@q6fe#}3Wam$Ikq)HykqHCTWWF}VI@l@=6Gp8&CmwpocEr@!zUEB^oezYC5{Z|1x0 zlZa+pV#s`kUD*+?@C@Iqe+ znBa7@wERYuOP_^$Q-p0X&)EY40s!l_VSAyV%3+j#J6+s8gh9Zxu%O6}wRrFONngIz z@H~?e_4%rx{Ui~)mapv0qV^|77cfxsFi=7fdyyNm_2*hUwTb3!f%lV)wU7LT4(>%v zw+~DNdA^klJeowerD{kqqf>BjaQWlzQ+hQmfd3@7Qda0g5dbnWiRIRyl{|ftIjK+` z$_hkP@|#~Yi6MNxzMWQ4OMJI7*mtn1w?q!V0&x-UG+J4d_%{BOBwl=4xrU1?dIH4Y(Tt77D&qMQg z2&R#;Ex@V5nua?A24D-u#iLhjtX1w!o=NNs2{4=nRh#ROyXB{f5KbdyR?~%{_fn+* zeBWk5qR`{ z>s+#iBv^R@`dhzp6`Vrz)zN}Mo@VyF2i^a*IiEyRj!AGHT%Yz%f^Jl7oad{(3E7DJ zAnNn|OS==5dimE?TV@ZLT)~Nq;-lGUn&jldKqx;r+h~&gHs7*O|2%nEjt!DDlntb< z_?!S%jXk`;_Q%JXofdK&k6!4H{9UU@cj-En%D=j&NW6EgH}VHl;=l;cW$_hdqMg$K zxhe3&$US}u-kT^BfJ5pCfcp-#Yj>xj-gPz{t1ivCsH~~2iUc}N6b-IxjxEnuqggo0 z97ZdFv&k`E%uHhh?`{{~&uzFy$i(@(s zIqQ8f_6!I;BL8xV%-g$NuuH^%4I;~=jz)QYj6z3hRD#E;bab<@n3wY@GyjW8d%af^L-rm;9NVNx6cr<)O#9VwJM!yE*F*Fw3yfCB-&(Z z8+JuQVDYOmD}a4Cc7vzLtV}IVf(* z(`Pvg&t=EYv*z6t^SPi9-7fGrf_S@vNo!m?-Y<0URJvB=x=L*0t5CkjeFhIwI<9=$ zM#wWaiDcho7y-`Q%=ld~A@1XqYRfl_$Ge5vm25`rjz5{u+3(BQ;vg0iRWl zudo~XKHG&^2Mc2b7AwKjRT)2A?+Qs1d2r!k0azqqn$v0=nn`xnTnwq12nAP(TdYy(>@ z-R`IL?M&UT+f3D?LX=RQRHJITNWkTthex@q;F%1={6-IwL=uL2Aq2AqvH}A0;lr&i zwlshuYp#LuyHJ_m^!PGupM(W_8`OAqf};$h%}>o~am3m>)#tH)Xz+36qm9B{vD;PM zw6wH2J3VTwH0f%@#&crCGwJ!Fy}UF8 zE*JDfN)hGjKAMYUt0jxlB=6Og(<=l#TfUs+AgWvh6QJWsGV)Aol&F?=(6-gDKzCiN zBfe;yHM3~%St}`rUC@hxr7bKwOVJQeuS4uI;#U<`gp086@7RsFU^fLK?ia+|E-258 zlX)nurW9e3gGtR!;Guz795+#vcu0J{$kSuYAYQ09$x;$AMPHI+lvK3f|Fi0v(vc(k ztIBt8YkQ1ihSV|j&~eqWYX%rv4qub9XhPgecWJDckB!=dZT5=4iH}npqo6f+;vVPq z^S;_CsuFNBcV^-njGM;cf#sg&LXFly>^M=pplw!9&71=*8WAP-KucgdsI2v3S5+j? zk-Kguz?W9WLYYQwM+tv7kCZK{1QD=5u z2}6c(*k?YmUkTra<-U0 zsnm!1B`&Jv+2@Nn5H(qTaa>KAfhL&f@?ZtGSjBfABOsIVZCR$ma!zrZl^T<^YfVFU za?gemI1mqfm)9oO4?;k7F-Ju@bP2+6x;{{@?37NrpA9^7!R> z@oxPH@fC1bun5}Z#grZuX!;Wv8t5o%*PmyW z;Qj@vrR4Pr*rwQJ+T=!$h^oBYgXu}n|HDOv=GW#!6#KQfpc`%54Rig!+x}VTs++7( z%pcb8kvce2C@SqP2=Vf*11CL7bM~*=Knx;o?yZ^(kH@uj+b@3x@aqIwyeJi zZItia0!pbdH2Q#9#f0Wjt|*mQJ}O?YT+1h7|G@$HDCNo0olu7m|I!z4^&ef0A|7fB07E+c2rmoBRc+ z(Gt_IzDj|5r&Znza{=37(eFc6!_k~10x_GfHM|uD6nG|T-}c#Fo!*?!8JHS9kbLPQ z8gA)dsG~Dhpp8)4C=i>- zJ6e+*N?KXjcsr=^bX?ZX{@b5~^B+KGLk#nKgpA$m;h1=;jidTV-|Z_O-|Bh%*m@lK zULk;D!tfJlEc)3-oOEA}%Dso#FoB9NR;sWlt>iQCTy(hCJ%(&7ts0e4jjPqRKkTJY znv_qO5tF~a;_m4Ij73~%x<^*Djc?)VNkWpw&mG0>b1#_rghdP_rtNQfoUR)JHmmTp z9J+NzZ$*EtxL8BFRi?E;@J?>@b3$hF17y$dm8|84Y-ovui(N>de64$ZUH*Daf_!82 zRzXEnHE8>&B%7gSgd0|Z7O&$U*0@ii-20?Oh@^?0Hx+vJ*W)FW28TbLtabNZ~Z;L@6Iv9SlNQt`*4~hW#QSX}#^=qD0r_i;l30hQ6(FG@azP&fzgx|XA@z5OeOsa-yawjN;h zYXJLCK_;f3J56L8PTVFU*?JLN1mp}{J)D5-%-=?yofumBXl90OR|tJT)xpFp-i&hR zWQmq+8bro3`xJ)XSdNSTTDT7Vfpi{|(`kTb*2QSo>Eu2q5Y;Mfg4mhnVpC2xHv*ka^EEboXj^0Q!2?`3b?_Wrj_M1U= zC0GqRk8vmNDqkL)KUiHL$ClNRM7f7WfIFek7jOlF=Nk;qO=)`pY}VGW$b^eddg)Ht zJ-6W_{PsL|Ynept^Bg)c4Pc(y9%>3Vct@4`=Hx$O8Z0o0?frh2#26dE_k8fnN!E;$ zSuRKgrKsZkP@2~Mdl++h!u-YlCsh2qNg}nSsac}g40n^q%uo=+u&mhVM-Q1q2cG9p zu2l`33pSP|2QgxXBXO|ZYoM^KDue5t-e2SL0e4oWCzz9h=JnPY-XUESBse{6emWd5 zd**FSF2d717p|+jn)wp5c|YKCK={ZIG_&~aZt=*yilw<)Z=51%1>1+h%FuRWd8Xo5?`#=c z4m%qM@4O>Ekx&_Pp#)7;3-6qb!?(QSO63fYMk*X(ETLIsGaCv0VO?-ejN-J+-9}ij z^57C~>&=8!s91FVO0RlUg_L+aM<-m_J%GkkxqqxhhH5UotzKjo8}b!mc;4Jd%?4KH z-cq}i?g5Ql5~&^HWDz$FYNDx!T%2qj+1<-H3tK^$tt2;IBRg=lG4SYYBN#R6d!QUi z4TAy zqqpk(>~>w4(jM%llAR9%BK|&y>1w;J?^Yl#q;;Sifq=53(rQ&W75?!0Ce;fU?|z7d}qjg$vEY&y7*aG{Nt+MM_WwmAc-&T9wpqRVtO z$OYH~9VOeIVZFL4cYsb96heyfrKu&y+jgsT{3T}eTU`22V=XSS2}wht)!yVsBxbpG z*#-@amjx~&F0_9QeSuWql(#z0yh330OgWw_ zT>Hz_p7*e(AV0}^VWEUuQP)BVlnFiJ&UOgh0MR%}iYOoWS^dxd!CyV2e@@8l*{#YA znw`u;y>SkDz2Y%);lOi;pN*&XXhm8BCvWrT{Q--9xnAjf|A$1E4%LEvq*;P09?8dea1 zZkC>plX?pbNI2E8?uY)eFk5`_1M&)$LfDeK zlQec5^AItli~_q;wrHaRv7El_vxEb= zOaXfb(kB)?TB=#Hy?Ki%clA0aZ1w)RsEa=S6+oD0!fA{ zUYv@MuuJfsA=7WVe;)}Tvvy(vGKVL*trmz1F9F$G81+}so__$Y6sUdnib)C|4n^kg zp)~O+r?Ir@TIJv`WKKVtNUF3ku*hLaX_t7$;1GGzHCobdMAKG=7c3(xFhg-|#b9Utu5>p+BE?7ZM>5^-3f{@DGTN4Mb zyxPr!FMS6hNeW`W0Agr0kD|nh@ENpsarz$?ifsa*wAVvYBDOjskJ|)pyET$7e zkU1uh8=OVbojap5T@83;hU&pfGi?Jf&+!5D?plSrb3V=1qH{gUT1uBJp(Np^b~zbH zor0gg*Y^sfX?aS~L(xFEFrGJ3N0t724&R8bHCle;L{59@)M(_ zhM$<2G5e_3yAb0%7Fp}q_=KjB{^0rVu!rdl*uL{vjk6$k1HVsw^^e&{j0nz}9#e~@ zWPVj!W24S~2eNZ2=nBbww+BAc(9+pAHDaL0@?M*mj_u;KeO;tRTbSu?$Cd1$LI79n z^?|4U-37&!3Vl%eq=VPos`{0M*_+dUcThNx(GM1aebLLegOk>3~X{rlk~>?o%(6GTNsLN|8|ZN{v( z0qQ!5t?r`6)x~^{c3PRcf)LQ+qd({P{<(vfAE`ZZnCw}nL-&@PXq=s4UxiXG+jKbbkR8ag|c>J!~A-&uk+_?@C3gpi&t8ac3>_ZNJ zUwiIgC_sr7bx{_cvykI`xXf{f%X}7|S>!x=$m*AV@jF9<|F|WhL+5tj6^@v^`u*#} zkNba|xG4~s-aMILy3<%L8wcP^oFqtO9X#sEAnZ0&W^KXBI*9N#iqA-F3nf&hc0qnk z>2Foe3R(~7vZe7_y5vxkSI7A;gbTRjfBsw|3#4Go_HtrfaM!D(*CseMAfG_a#d0t* zBd=KCFr9Yf2x>5$8olq|&mnk858?cS4gxQLOWHjie4CNCTnzGY<%i#OE0!hP+5dZ5 z>T6CwnyewFJ%R>aX50TFKVk|*QC$8RQW7g1$crI)A#4f$KeH1|@l8Sd&yML?lZrtE zYg^Fx7zl^4Y|p&EaiouS)v3AkK&`eR7u4+Q+>{}uMjG5)mRQzGu;O@?2NnUTMe%|7 zKMoQfPfQ0t9*p7JbdY{r+e~rPcm;bzn?)oi8#g33PaXK9BQ{irF4Wfm_%?}->IFHk z;@+EN)Px%`!ya{P?jfQPs!^7qqHC&0V8$Eou;D59tO(Mgn+;*t<^@t$PPm)hQ<>?&vq3ml7>DuDKIw8&Q`n3G)T)J^S=LR^I=f zxDoGA0u5NfPqzc0IoQc_Kw1(u`8)*^So6Clc{%?JYP3i^5rFYF8{MW zkmVD4^2fxIbM~yW|HFs3sO1CcRZgQ3#^^t#_^ik9ZQvaQcrlXs1MZsXI=n6SbzQ>( ztylO$2uJ}x@jTR^eU}hv1l3Qb2Jv%ye>L*b8ci> zWidNiN|)29TP1mYX@oF~NsW9?NYwzjWl-Jv--af-$M%Vs^fQ;+@~w9v-FS@*^+zmI zzngX$tk-!gZQ9_Yg-)I+|9?-L0d))c(1vVT%ACjOXq*--bcCzpYvfWg!vFRCl3-uH zHJe-|OQ!u4F!Pz;6qsOHP^CkGaDpxMZD2-D7u%;A*V$7ga0y7S%y2Bo#{iq|qdm-> zu9nF$!8Pi3h=rr?gM9B4w7A5rEKQ(nwUVOD4sJt_2zjk8ky9Ffm^AtuEWN`t8c@rx z8G;RZOY$&q>g)2AfXI>tv;g=%Pz};RvX|gJQF^N*9!V|o<&iK zkqVj(Aa44v_ovdLO}Y{U+#d1)tQ9D;YOQO&&6X5pgck@WwY%Tt$6L*IUTm|jxv#Bp zkz%RA>nG7c+t{>)NmY$kBY=6i1quzqZc~EDcg4l0Kq__JmU*-r38+QvHn3}Go7$^A`Be0!1o+sM7Z2*&z5c_pB*2t2bB~`!#+yG zPlDSl$3nZ&7B?NgQ0^V`H@hjbk+E zpQW^r)0sfb5IDG*q&Fe5v_=)zi$)7xqO0R{Y})lS z`34w?3<5X7vH~4^%600HUh!%s}%Oa1TwOtHILR zR#XGnQsa44a$ ztBQ>~P=1f)GXhNGSnYZz{Yx2y?HN_7S;GH%)NHPrj?A87(5j+&gCKaKfJv?UU9qU9 zz3s&U-J(;HbSFn|jG5JG)NeXRrD7h+$Slmg^4lnNEu~ai#KI@83miDdTUCdNbjq|@ z{IqogjNiSlPJ3U0SofJhyDd<8#I`qV5f!p_9IPoTpM(A|``OUqzK2lCD&){{4t=NS z4XZWkfe&}ufT@h5uCK4s5Cbz_gkp3_i)wsg_Tbf)#!`3muWy2{EGk+YD%pV9Zc|9f zz`AlpKR;DvkxUk_#{>Ghk%L)NXNKG7J)S>64Tp_@+4Id9TlU6f)_95!cxUuCiRa1t zeUx&niytWSYJFgVmx8cG{N;X(yBturyP$L)DGd}%Cj-amAQ>O|5(&I5Gi)HIdchG` zP1A7~$Ku;%4Tke**}eBU+BZ_$=DlB+K6uCTu1L_4Kc}~GDk->l6r@gpIjp-EczSu0 zXd5eMiVSgFq>S6BLY8r?ks2RBi&l>HLk5=X@bZ~H`g~}H{v8k;zOy^Lwj6kwO5oc#=AzWIx^fMO0@mAFx1JIwO&zif;w}>4JPgeb`uUem6*M?E62%)wh?w)QF_&-ku10{;%q$OO`xI5aoykDKu=Z3c&(Qy^evF6 zWDVM?7$qNgO&Qh8j-ws6T6IFz+KVprLaI=5^l(3somROoO}7fwSTk<&(j_iu;ASox z@`;A;pP>}!9_b7Cb-!_e%KY_LsbxnD;Q6{XKRZ@6U}L} z2ZduVxjc8*hQcnsqj^Qn?XI>Nb@nG>vVlC-l3VFttInqWiMmB zypYa7k@rri#jD5cE|%GB92Sx_1Fn5ex_=JQ{%JH5SPL>Hb$Sz&=lq~JHHS!_ zFVTuEJ#sCf?H^wlhryfY!M1|Ldhz82%aMfH*UlFZXnGnm#dD@v%T=g>JK!XUhWn36 zhQ{5*BdHf>A5r$xV~y|Yc*RFKPb)@SRW3FBN&ZtLXRqn|Xa#p7Lo2!TW){qn5?elT zJmj?@d0NS!xX=MCQ>~d;sls`&sA^#eBZLQaoN{#1S&mWC>xo9F{N^UA`5U&V_ht~ad*}OZ zSG+d$e|SM*7yB4eVGZ3QuSz=;>>nF*soOS|eT|La@E8Q?1*s|VJu zb%In4OwI1X19t4r%CZ3Uw)JD5}?N0V;yQud(u6CfPIn~2{ ztXlJY1hHvFfz59Uo+?tCCQ68KmWm4{(8`t5J?GukZXb4YAf@v#UA1RiNTb2riOiiK z#6;Bv>5C`sXT07cnGdgy)a4l&_spz(61eL-TJ4=+-s-t&x_&<6nny*H<08neQ{@LMQ^V^eqg3fD7xr(4lNZ^)eK<;Ib5lOs z#|zdlNQ$k{wmKMbXiJ1s6j7p(R32Om}`Y>JX3@|S_ezB@Q<#A_zR zSKq~KYQ{5*ISwE_qh9)W^7#6HsZx9)>8l?`%d}q12R%jA_b z`6K~9CKp`~DczlipA)|(b6u7wMz5wL9-)064;Zwlh>%j%bb<>w8|GLTqx*MJm&_bk z;gtBzOg3>eLV*b$re0Bvoq^2@zGeuu5PT5iUsHWef^44|xf9_b&kgQgQV z1WVUL)~LUXi@5rBuLTJkuG?kltngEL^82N2I$dSDO+B*g;!BBdnGQkE+O;0C1RbPm zC1`&~HJ*;GFw1T5AQIm0@=VNes3TBl%cIV-9J^&y^KiG5Q%N zMD4F;M1W2N>^8G~_qk@ZwOQJ$)bX8sHb56P%$@FL2J)f4TApu02olAn(W@D8d(-Tu z`T;sYH0Q*`2j~$_pf&{U1T;rjcuYCz7RMt5D9L>ZmP7EX*#GM$a7y`Rsja>tb+DGs zL{i~6-QHU~Ru%JVc*Ki-6Lelg3^Yng)}`-+CzU>k2oO;^-I(n@taQGQpLil8R>wl; zhKcW7g<)tUQf+)dyl`OtR(73rO_0KFM4jaTdmYn^R-jGwT>B9ng$?Xu|22E)MAsvk zi79NWg^WywC8Y*?{=}~p5r8BB_qG^sJ5*n&SNzq({)@a-6&F^{2$0_1K!n-~kP6PW__l~;4Rwq? zHIJlRl|TRtUfkF9D=-B6K9;=s=?!J?Qoi01oZ6ccf9-+z&Z?I%O)#=1O9Ma!0ZE$NQj&PC8f91@mTr4!>o?Y%_}DD;p-+LXN*m82|W(`@P}O@Yr3< z<|v?v1=$}_$R($Vb|1EndYABPe}Rj!rN6PU)_GlgsFSUL8mY<5ugu5q`1U-MW)Ee1 zgA!;SInrQ1)b$$3s-kSY}~!mb$SwrltYSPYsPa`W%rhHwKwRNlkj0OImuBcBHivfE49>7QB%q<|onDVHf`AGh3XcsC_8->TFj6X{1~cr0?->9GNV@A`Rpn z0F%?X6wM|OXP6G|PFF8tRQX+GWZ-B20$(0kiy}v~ivGB6p6b7hr?Qk0qs+!LvKg!?nUdvGgAwTB1_vf6qLv z2{dp9!{$G;$Q(vlEe7;U5&r4w&U80pkNu}lp91=Jv0+80xa+o!>l_j0MP=RTQsAXm z*SNm1k(=(ey_M$pvcJBz?W#0&jQu>jHTAupI5|mx?0j0z@w&sl$I1oRPhVV3bQfeu{3Bt<26ue`39z;h;E8Wt7jacXek_GnlBGWdv+d*#{ zpC}zon$c#m%hJ19FagyfJW=sh-C$bvGDX|yi&Q*gt6`wB+tv>^CIz%M^6H%`lX`A@ z;PZ1qxnyuzAcNPhd49*TnHGFl9OZkjB#ZzaVbZGm$d^>Z?oTpvLw%11T}~^epwXw{hew$}rfntL^*KpW5_l zGBRbxZdfi^3F88TefvkC z(3O$%Vl`!R#c$L<2b~5e0-jQ+^sf|Af|IW}-`seD)OP}koReEwK>nC5tHi8BIg#M! z?UtsiW9NZwwOJ#pft7F3l97qf$Z{PZo)|G+?{{yG#o5}tp_A>?2tYb?_^dD0N-Ei3 zMh=ty6e?db4^+zlD4Wn+rfjWs=|el5(cC7|7mSsobn|dC6fZ zw>9yjy6Z&?8CaC?3$LEyvyW8$KdWxnUm(r&NwKz(1EkJ+d=vi2heW=t8K-k~X(Oxd zX#LMM4w>Hk@ZkwPuMCfI*NEB(H7sf?9@si1Syv)mp)szl`s!sx;X2r}$Y8eC3|yj% z-Di{=uZT(|a$LGGDx1D2N4&aI(aYKci`=&H03@XMQAd60vR@Ma3}}SC3P5t@@J#(t z5z*e^36gZQR{u&wfFn|a=JaWM&@dgaSQFRW^T)+2RyQ^%nGATU#l6A+i~8kT;te}~ zcR~1$sw=lu93|d=FPx<1?S*x9@sA`Jw7D>yM(Z?2OaD- z{0@WOe=YI<&94Xy@E}K`AA|G+a9Y+)@htF+JovwIJ|op3pejl;@?UTKCn5ZI3h@8@ zue6iH2(sH-0s=-qFk>PDCac5LbA{f^$RPY)SJ3#Pnwj?uH%w!3zaG_2BMX!O=p>g)0Z|LU&nw^pGg9T0CiVwoNJ8>&2l<;?;052GpKGc& zZ|(hB=tEBOkd5r9z5sHH5q0}kKc)n%rOG%}+jY#V&f=?G2*1QskoUx?GYc@Jm*=_T zACJsT`GKg~aBtbG$*6Wmsg-=tK5lo1!fSol{0ykvkiu9z_07yCS-i&1iXLICd2K27 zJ5~HE8bY*^8+K^5layE7REzS3A^VF?vOz?Gz~lGT1)?8pAOO<@6QbYX>!B~J4_Y6( zpjmR)5t3e^YafAD0g4D@ql)z^{4vVhKH^ETL5+BDCJL4{fudPlBN#(zsy|bb@=p`eA}t^$mcup!vCZrT;f_+;htKcCj34GO{*GBaY0)gO zUT@1T9;cs+jk`NeThp{v#@m|_c*E0Z0bg+XR2w@tA3M*jPAR(t(@QQe+l8&1;hS`B zr8&=Z0u9!{6F{BoYimWO4Th4-qgB0iy(!{a9Jyk?JM3SXL_M*$af*>`&OfUOaKG6& zJxnT0YW9uRm?9O0r>^Uj$A&n{sH;?#{QJcIZ8y`^3mCN7PcT0WW>UT*_QFQ`ljZ*fiQkzr3BFb-Smw_xaJy!<%KV~j zWHWZ|<)Sk_V7T=U8{_{yCu-B1uM{gSrLo@=O*jBWkv98(8+vjJ`3EZ(D2p~`?{Itu z(rp`q&o4gI_GSR%U%mV*O$ULemCw{*T%mz&=Vfc`yH#xiW}5d3tqobrLB8WC-`SWY zE}H`9F}7)=PPT8%+ZREiR6SLyrle$rn43nc_TdDvJG1Kbgc32h1x!od+TpFR!VTJJ zNw{S@zTV1$_jTHzLi8@*<5`T4LoWfy=awp%$UlIT$tXZCTUCzYZ$O$rDdeskmk=PT z3jui*plvhu-a^s#?lK)`{HoBoCujSU(JNOP5C@`yzQ6cFz-BeWWG#dWk3hBW#7L)% zI@URWEIy?_7GcYqIg|jbRch%W?5xAW;$kuoE175s766+v_ugAqV5*M8rR>5LpBnMq zE9S=>@)txf$%;~x`B6KpF zQy?0mWN;O~fGU@X8aM0VF?H~kxkH01g;%0%`mZ#ER7+EC?Eh4vGcm+0!3-`>c*{)e zO?wN2uGN0)_HzUvkfC7Xz)dFdo3l7{lz_5$@K^u%3t|4NBNtUNza9TU26~W`&!rUu zt!>GD1EMF;lF!V5!vp{SVf8# zm9Z`&;UwMdr)iq+%XjJm))sITV;;|{!mDy%e!}i|oz`5(IQgp^J{c9XzZ&cAiu{ZQ z{b$w%)?XzT4mXeSIjU`7T)|M$44LnE8QNPU1EZ0tE=)g#vG8)<|YeTvxj-kGbCK-ESn}N zU9pA5oj$1-EJTAZfQ7uxK@ul@vRSI(7&ZO#wVTAa{;8x7pcY~*V_c-QA>_$0cOJIi z<9-mLPOtSVe$Al4x8m!iuUeT*VzY}5e4m0!38FAJ~DSaQ0ycs69B_O`quN}FqWLy?~y;i1f1GE$8= zhOuubESj$W}yi;ChrJWIgMxv%=QB{yhX{1fE(&4(?= zC@f!!lPZK1f;xKOr1O)rG`-(*K1P6|)vpHDh`8A{qbf&_8J{s1bekGpz5pgg%!(a* zB)B>N1$Fw)1W@k|qJD5MCF$g==y6Jq1=Gne8pd+K>^z0M9kPykJt&a#H4R+Y1_sjV z+j6pk>(U_4N1ufUxxtIC=y~<0J{ri?^h4lwH!04cM*>CrvZLBFilMy6CNSOO6cb;7 zE$W@l%8b$XOz#%}Nv!5%kqtP~KsCgZ*9>&{T0+_JH;9}S-Ugrz17Rh0GvOsvuD^~m zAPju?JDPv8)|4aSqy%V$;t?x6$y@oc@CRbW-`YlHQ}hb~F3C@=0o>!)dXb6F2DdqN zbY^Q#N;VOx!=gTraS2wi{X8cLuSC@{nAm{_l}7c~sj(ZR(K$&h_FIFtuT}UDgEGsP zRXGGnNW!C=#g013S?*{ov#V|57mo2x)MLDc%Fr#H*2x&Tz!+V23M9V&=Y`Re{TI~s0F80Q9Reu zTa3HT%rx@RB7h+3L{P6Im;AALr7t9?g}?j7`lHwIwueevh0Fn2|kt4`>yD zEbEAnIT&SM&%ZXz_@4;S`{j&KByR-Ydn3WCYdIjeX|VbV^j?Zwn0i7)#7YLwMgf_* z>VQXU<+-YI`c)TV16&eQCye+S(LT4wqh?Uh-X+KRJnv4&>uL+TTNxh3QJJJwt2Jtq zZA(V1?n}Mauy5QU^i~LIZ%>y82K(1c<4a{)HeOCV4usVA*tLaUT)1_Yk_SKgzel!n zaw_I=oul&k-baI%wr;Jp*=~w1fI<-83OJHO)YWuC5E1mA6Z29sOf78}2%C|-%+vofBVD{wMx+C z0!80Jdp`jK{!BE$o>Aie+HhjG!GS`NRjRe>B|~3pv8H&_m-k!?O%2nDpd&l?K8iQg z_PEQ&zw^5HmDjzf2lmQa2BYMT8+*acrEG1s9>uSSoPD}#l7&@@P#Kq*kKgcbULq7F zytV6jSyfsDJ1yz_EPaDa0wX+XJ|L#whC9u_Y~>1Y ze`q<1DlQ%|a` znjUvqiUXAvb{eCgGcQU_wV3mPT7OXAZ1_bUcX~scFPTuj9wC`H&e{H}Y72|c32P-$ zOcW&{T1vV~O-{i5-nvj*!L;1x6mg-#ArbiW=8FmLZ2xhUG#s#=C!&IYSnUT|qVNCk z2@3d0rO|`e;ZBoUOF4_-AGr*0Q;MPu#Yc?)2_njs0*dFc803IMuXH<*Zap7yhVr9X zyi!EFQ^d;?d$*mJ0#|rZ`3RJ z393cPRG3e41G#4{RjGjfF@N|7kun#QjsSbjBMIP|^D$yibW{b<>E2NAT1vFXWz*_h zZ}X_zJd8yYpf|iikz+zM%Btl(1Hi}a=D%EiETg-AJt9Lc!L!FV)nm}WHceP*bl3y#6o!RztyR3_! zXZgYQ2Av6;38w?!`Vc#&K-ivQ2Qluihszgeuv0shfMJjw;BIw?QeTM5cA-V@ucl~# zaUaF*ON`=WrZ=A*quO)X$EXUl(eo9^lip_sAe)+k0M30-T93$(sGGZ?AQ_YQ75tzF5?ad8^uilz2aQw58jROy}h%qUL{Hal>E&pum!Txzkfd;pE0 zgyJ9-ZdHzfGxY_migblk=x}GSNI#o*Zd)22W0%g%*wjqZ34WuZH3j%i^I879YWlGP z4T5Grw8OSF96O4mijfLD0XWRhZ7>(F81B~1$HbfZV{Lu8a#%pZ{@j*HmLuq{y8V&C zMA1F7-6cX#E3#h0eY{MjmI>%IP`u7L0t62DMH~AGZxd3!hb+o^H_xtY^>RNp+F$D3 zTeV=@nSTKr=!KX8{;Rsv!-tpcynyG|w)JKv)xczX7psh%+#ylL+pk{>61LkR`T9n zAYv3GA~psrjey|#1stBjT04kQz$Kw)A_-TZx3RXS#<=A`IG}kQx!Zjb&CQlj1!<80 zJYe@nfp`ib9aZnYRfY>y3d1RB1aV^c>+ zBKD#55EX`?>m|hH8@Yg#_Km`%)FCV9(yis=pB5Utdjt4#k5ASN-ix zP89r5%;-#{8#HjqZ{NE!gnF{>%gc?Q-Fk58=>hviw9I;c6B9crhUTVy_WSSI3C0<- z!hd@4G5SCQ0Wc0#SzcK&0~r`FaBwY({n`)kDXgwYagoacLS{f7fs5h7OXSHyQH=NM zqG*w`Gh^AEOHdd6~`V!kpQ8Vk4pjeXE-q;4ePm9QG$(*%OFVq4*c9tTk z9Sw#p9_LvI(JMD9S3C=sbTf;~nwGfx6Qw~1{p+tYQ3ajt1C53_{{g-pMe2$E0)Fdl z!KI$|es=!{ZIUx4GWV0Z>=L9!Qca1Irx#KrLFw(LYc zT%(92bp-gpo&4)ZL*`!9{a?g=Wk6Ni);1hO5TrywN)QwTq`N^%q*NrNQ#v*+sWbu` z0g(m)rMsnj(;(forE}BGH#d6D^`86w|2&>w!dh#NIp&ySJkN+~dh=J`r0J*oHf$|& z^9v=5<>}(PyR%>8Q)V+9Iabj)=tKZ0{?(ML!i(-JH1$uwgX|LTXZ%@MopbNxL(sTe zdpIwaeW60+v{;0~)W~}<^Jx2HPEFmx{g@T`8HEqhx1rf?;^m-A>({~}>FjV{IG7m7 zWmyWdm^zG0UvcE-N%*1yAI@?6#DG|it%HpzyE4CZYRJoF^I$-Oz z71uz~kj~?0Y&THUocsFt(fC4rA$C9E;Qhh*08O3mK}bp}bMC0N=2Yk8;9|?olrLoRhESnV8afR z2gb~zc#A0eQ0GuS%#qejk*w&kLpVmIyx>}1+{MG>Wb;K3R6{9mASRKWc#wq> z(z4bF$I4t`_2-oPgGK847+hvtw1cmYA&nyKG0@n zW_e2oP|UBGM^xA$DsB%|uU6Zf#Zd}u<40<-_$a%s4V~)+@cKp$gVTx$-r3ASWL;3&47HQ*~>U!?iEfH87fzKBeeftW9?dcpi_+ zRy{MH4e`V|Z+&Ae&om(@+G%-@3P1@lpaB80liZrTT^sJJ1<>aqkyXzNv;akBEe;D$=cV0OYvfz*f`%gFY65;F!soDYg`WjZQUEg zVGR6HLUYjPM*##G0-F`72{b#PTmR{XwdW}k#u$cqD;%i$k|o7Kz7Ux90`bngJlF*F zl%QYT$#6J$jmCvpS@9ppF0u$Ilc9AUP)w$!p1i_{d394gld+9Z%NvS}MHoq*`|Edl z69AxFr}p+siH(A#*n*qj9$6&#q#p1+jXpO3Ju*5mb8(<#2E56gvho_s`Q|`S9kYJ2 zza~C%ufXI-3ZQa)Bg=k(BxVqMA)7cA^j`;z+6(DF1Z9r&Yi}#pf&Bc-(A`AalJiYT zGS98b^cuIpnOxA>Z+|EoJLzl%4`XI;N5}K@t>wCIHxLvf+rU*7R(`q}N8XYT4E|l3SEl*b#V_pw1rLHz+lKgP=zRD*4(%pehCA z!MoVluyRsZ0AF_1rj^9lXa8r@eIsj-R2Tl&}CeH9rVBk3snM@+;5pmk|K+^j)E$$^#@6oO4_2|R<~Go=$g zM{~|A@j(& z7X{jj07+T`bQnmlUmdzTn5R=W{leC*taZA^6(lRMF&D& zbsW|6&zu0L7^U;;{WyZD<& z^`+9fa>0`ws3^f0@=pWVKcna!`}PM58_TTzw1vN*no=;7>N4h3@e(qvlvUe%F1ldE zrQ!>Z626#^N<7P4&96H@i=3I+Tp$UxAaUTW1qunq!5~+sSJN2&PgRb(2mPq#Q?0dP)8 zE($2Q#uPYgDK)?n=u5G@?#Q&F?^Zf5RSmwN@HBr!@rnW}d}6X8Y}`X`4J!1$lL}3Y zqhL5IIa0l@^QgH#VuE;VU&Q}8Pn6WnoaINU%jv|7M*})>MjT$2mFcRwr+&XPuLszd z<=9gP#F@hvaL`X2UIe8jw^yV)-OhccmbuUp8(MihZ%&+>MywN(qGkWRIwyNce(X7a zCGOYMHDze3sbQ&!3WAz9Ss1{t_Cy|+8F4drSHQ$cvmg5i-~KxT&5dQNE#8es}QV__OP+(<7r8cKt$^qJ$3v7 za1p>rQb3vs#wZSj$M&?}iD0-LNxnUT22sSG;!mTIO*VKn$(k zwx_mwfq^J8VF%9sQw#*J;Is} zD}p+qEi*!=H+jhM&_V*oUhkJJbrBlIHcS zoE8iGujoL&_GJ}glHgofcUJ0!RYFInSq>J=`g{&biCddlxrZPgnqMfK1Pl6cm+eFYFRBDCUnjVfKOPCE3b|_{x5)+QH;KFn&bjVAP-{i(^RJ ztX(@F(Da!?!Zi{gpX88U=RFc#+K<(n;YReCx>;WVTi>Tx#177qHVOZ5X?`7J#QXSt zrVJsH)CL>Dv^<3y#c=`d-rE3YZgQdSq&5QVH>f+SoAV4^)l-j zVG&fCszTKb;E{nt4FlMAskIxXGrt$?CZl)}8ea!X>t+h$7kSfYMr|l3l$7g@nzgPz z7(UCk#a+i-*;5+&@vL;H6i+_{&FppcuGQ;a_taElPBY@#D5#5E)8pZ zPAc6AxW5B4sg3b0VRdG0!cK)ro+)#c{OX+#Ztr|uH zKY=MafB(VSbz)+VJ>Is1K1#>q`xdhk28mXO>FL2n9FKKkYwzYdbi;orF)bIa4fuP2 z5ZZG87J%vZQJ5QKo=)%c!62{MV6?WSq5iiKK_wTi>QoGt4^dCun>&j@F&ikd%Krg4 z?K4dWhXA`W{h&c9EO8^_ScDIc#psuXti-WE>&XfPz;}k5Ps}J=Kt@xN)X#gYRez;O z-C*>!a-fZ&(6W9-p-!wsyaeiRkB0I+hTI9>{_m<6=bUGjJht;B$&{tfrz$<279zCs zcGV(TgpLOyd+V|)cTOj)N4GgxLLZXPAd^HYdov3pgNQOGfW5Acedwn$Zt|Ll4_MM% zs+_ou)1(YIZ%PU7Nwz<~3R5%~0K+x*{_N4}k?Ci8 zJT+2&X;SGBwvfNK{0He-DB7TObxw>4pT|Ykis8`RC5sj!KGwdz=fEAU?XBF)XMxVv z#A`)l^aQR^ulWuSAK}OK|6bjqcskz0P{1l?%C}&otyME;xF4CVXjA+dL;p>dQL4Cw z??5R8KHOLYE({=4cYv687~^2CCA}Sfkyd0ym>x=xmD{j>`w--5K1P-%DTna8NNE5nG&dJHLk2gC$lW145lZDTTAsEfY}JJe zn2jg-uZN23na0zhJG`vPz)iqQ(59xZjRiv)OGMBI{T=P|%HNkehJZju3?yab zpSN_qua&thT1;w0f@Ub3Adwl_>mLL>cvVNI{#s`elJ1wjNp*Klh6MMEb>fS6zGt26 zIVIwqOEG%%&jP|;Au9&-om3fe?x0Wq+Fk)<36uvpm8LZ6AOV_#6n>>a_D?0q-Hs02w+ z?pSPOObLoEMJd89oeT1MMggsm%Yy0p=IX3`Z6;-h9}=p(+IBw*?V+)rqngp_C&u}y zq^0pauLtFeb2m=7ah9d>UHJNQ^c8Wk7c3H6%=O0t%~e)jXK2}N(`HuwwMhxCR(G&+XReSs@g={~9tg<(lP5o!l>9RF zYN}*94!I|wN~rE&<_*rC{P?lI=gG-8)!LI}yOOh@wrmoAX z4Ty5Vv+bs2dNE{?HOd#PUnigk8&=18f6#Jk{Bqbl`N#EP3X{4^1HIDoBS;sJnTQht zkoRs)a|aEv$(rnnrq-)TPVNy@xE1=*w4yxU45Of~UjvlaUqBCDddX78KLjc^R<8cgTp&(*X|5?4S5R)umU`&woA?OFQ5EW$Y zvDV;ulkxPhPWUkEvMMwAyAk5B1(ec(5l1c3u^?5LZ(CyfzRv0R$ePP;m8ztEZkeey(g-;< z!&9XPcM_QB<$gF-Zol%<6398IM7hXDFfUfUD0*VbExTgCjxSvoa7vpe!zT+ zD5Mj*090kzw#)%cj$0ZM23_qy8S3qI`au)%|0I}S zQK(ipFfhUj0&H=->ZxFt#hN6s)+ZryLD?n{IfFT`;CE2$vHrD^azFSE@Vm1R;Ec7E zfm!w6iJ3JsS_^&PDGNc&m2G&ofkn#5-~26eWFMJd`9Cdl6>eZk=&MtZyf~1{*1|1f zBpG6G6PEvdku-N2%vsi(j0Kn_4H>f7PgLXnRU?Ies7HGz-dY0~bY&pjT&Z%1zRdA> z99TIp&@IE;iPC^~8q_oxFlkmir!hw^!@h@a>1*%R`0qZef926k5kNf;ij#zZhJ#$e z&rBL=@+-qYmoz~q24J#O;Xnb-z!Imym|k@#n^T#Y*$?21$royX&cEcZb?U%5c;k&+ zq6yExB)a)4Rae*kU$6Y9#OuFuMgBYM_@9;jcjETng!kW&WDe-n_L}l|YCz%a962Xr z`l{pDpZt}%Ja6st2br1b3!Y*rFz_b*|9ZrM_2ubE?d7Fm2WlJ7!GsS}S2 zkCXS*@{+1z@`1}p)pY5><|fW+!|GiXv{(KtHlP3yAH03{(O z9q(--=|2V;<}c5dY zja%m0z!w)kjfrR{#~AKW=p*mtj3<32_;Qj9_Co?+--`mE>u0g5OwzBnCe()#N6E?>H=1TQ z;iJQgQm>^(uW@(pr@dwp>>w&vOsiVtr5S_Y^rN)!A4Q*3f_8oSIv>^rx$o0P0XHOm zN6iLf|w{f@8-X}TRiHU($J(7l&;wx%-8**%HU+g1IrDgC~ItjavKh) zbrVTXE>@V5lQEaN@4ww`?nc-c$uQh#CntUqFv+Iii28`Zt~zTi==XCUSn5Vb@!>ku zE~#$d!oM$jikv8Jt)F;SQx|@kB2V9!ql_^P7}ahj>AGDg-}~L~E(UMy{Y74zq_;52y=N5FPDs>H-2mU*B zs=l15xtuxgIrUf)+B)9=gZK_6tm;ZPhKDt}s$OH>mv{$u?H%&7kXq1O`66wR_mg{2 z?|B3tU%mGe@(}^P z|9V*PV#QJnkpkuPMZTco^q0)S$c-$ac$aSzmI5_|&N6wN+uwG^ z!rdk(I@Bk^)F{Vr%a8LiyD>3Odx8h5%NBWI*86=V0{(h2ym%DYdtuj0Sne{Hse=gL{p^q;WH-5)c}vFG zII@kOd-=GhjCaGjm)w7yW2#Jjt_xCi*E$UO@E2DPFAmE0*qmH&O{>GhNvb_6T_PG_ zZ}Y`RZ{;0B7hSBtq_NYyTFvc%9WI!_%x-obnFlxaDN2-XO8+6Ny!#jP81>KlKy*4@02au>J62eI!F@lsVPhvTBH-zlw z7N>qyPT0oyj1_^Zd`fuSy>aKa}&F*=^R+ayjOT zp!30(F^FIPi^@*ZCybBzN`0{;Vq)ReuATYFqkgubb0#aydXK0sn8-5B_lR8mAgW%79#k6iA~ZCrL>yR3o_rtZdm z7GCl~*>>@0Am;E@vasi7kqpzb{*^tD#=1RFA{()=u+W$w=@s>8>*ZZ^IdM!3q&*5T zgu=!Bt9)dsla}W((n*A!28bv5#13Tj{EO-T*?D#@*h86cLCb17Sm;Il%jckM)g)fbw zC5%Qox;5?h`F}xW2$cI=u+WkFECkqKX|n^y2kvEv>2P zX<;s|NPm`yFT1X2^mpvs3=IuI9k95#cv=Ek<}0i%kB?P+iHDT3>;!^*C!H7yk_cVo z7ov7S+_1ps*+k@IWtmx8wn*dIJ38)+K6r?+xVpT|8ba2csg%B*jY?N*)cJXOT04Gg zbE*n5ZxS1i3?9OD|SDkm>*M><76g|NhSKjTs_;O}UFCsp1u){{a{$&1fcIM{l>RN=&%rK%@fjs=5D*3Du z5YyAsuNaI{e6R6fO$N!q{hknfCq9oY z)j$n7_wh$woSAX(rluz6na$~%iIU>*T1Nw`Eg7?eakTkGR_Kblx;p#5`XqC>5UM;+ z!y1m=@yjr>;yF>AUbMvoDW+?4Q^-WLXHOLxV9Y0q$;q}@$lWXDdYfkUl*7R51?}qW z!<>~7L!Il{Y|C$?K1=p37QBKkRtVt#R1 zP^)Zap{0;80pwx)W(6G?8X6iIiIY+xA|e7!RX$c1$txQf85qEijw(*Ae#+|t6>@ft zHU&QhP*?8s($YI(Ki_?k`c`8wO96e6(ax*l`+gI4O_DW1zP_Qk*=I##V`F()*IHg) zUQrQ`$f7cJmU+&=z#uJwyNUdayB}s;X)%ogm^lP0`|Wa^mvf zi!=D@y}go^Abl&VJi4PNf^nC?O_yRuBfL)-L5*{)Owq1pSw%XyXGkA2@ee*@pZ ziq&0k+`>74dB$E1<#o!7AiNJ{tY-{1bVS_*xmedA$;>*n!G`1pubx|ksQOE)q~&MK zLd?w>t3;2oQa&A873Sl1P@}>y@a{>Fk6;;x6y6P(Tkg1Mc}INBIYp# zu6A|?Rs~>EZ}ol9#8$3#m5zAJ(0+_u!UjVZIHh;J0%k3{u1!O?A@KC3O=kr%3b9j? zIl@iuL{@J%9f;afZ zX!m}(reRdek}XwilaR0_XRAVjb;ZTKO$F$T#!*eEF^kCb zDtJo*Zwzbd=!CvV#2cENT-RpP#K^&dxCYjD7>>NzxuvYC3Qw=O?TEEj^;VVaTBM4F zl?E2Z9&9SV%^=qF+9I*d$VwuqyNwf3JyjmxG>R3w+U^kQ-L)~xgWUOA!*{ATn{vM^ z8siWgP6e2IeOdBz#U}iYyzjs+@QRp&Fv^Y6@9?29GFQ~1XdLhaZM1U=DtXz^v_rOr zrIO6dc208qazEb7YJY+6r-!VKmjcb_Un8JU+^##&h;4RuJ&w1Y1s+26Y-x)L?l^ z8NidQ+}hg8Iw{Q7Z8rQg#O*l&xPYk@QhmfH6L@S<+v_Wj)wn-I*AB(%5#LA;w*4h&q-10Sdzxh+S?<1x5Z9KOcjS}g zmu=F0Tv^d?NW}(ROD27VqXe*Z@g+$6HjQr7@uSH1TER6Q?!2}Z_BHEv=Qr1;9q~TY zODo3bLpn0gaTlFGV{{ReZymRp&3zHL)~9zU9N1hM=kModv($j|vn`C~2&FO!a}rVA zOVRG(IL%%(`)2+ih>YGCrYL7AQoL#QZwY-fhl)Fnd`hY-bL-tZtkHfXW>;)(M2H(8TL$LbS-QzrNoTs3cN9)){0%JsaF|`2)2Pb;4*p~f$ z2{0d<{Jp4{dHNAPbVJ{zfQDMb8J_-r_443?Fzj7-tH!!bpZu9ZGhD!4!3_9~#ARs59ch+|f z|=xataG*1~J5!uicQ^8=>TU`r{@s|tPk_h#;J#GNJvPM+nq1Y-b%fT zg1=|}xjWkV^~THZCtA>Z!;Bzl0WY?sZG@8tly7%+qk@J!KB|Sexj0S7Ipytb)w+59 zyE`PkZ4tHu)D1foyEi}AfX1CU$@%%A6Igb)lMp4sVY1GaCVvg6J+#G{9wnDe#`N0M zuP)&*?y(pvLSOP4DNIi{wzBFeZR49vK=&~Z*VLxKzeo1A*2m7l-o7A)-p;}z2N-bU z_bVoQoz%T(zpt+)Z zvDVlRjk4R*6oX%kTox81gqw87iX!O^jZ>^ zcR3qZ3k!=qqIa~@8)2?tXoreQXP>^$M98pjNGcrpqjr(q!<=k!#$FWq92x>Y&`%ke z#{bJ&^LGsR^xkh*%E68t%bLqdnaYm5q_p(DNli<8y9{R&6t4obmZ@BSQ>0xwRppc# z(@Eq1AoAHh`iwuxu`^93E^CM~DJdyy2Pb>{Z5wxG>tbBuE~^3RxxxEG&h;( zf?nTbpHYJ*KN#b(-aFE8=Tw6BN-|UANl8ihnVAi)*1+K;6D1&rGr4TfilqVn6g14_ z;4rB4zBY-q?N{Q-Hc!X1Gq7~Vu6oVc++`;Y32lZx*J?imI&0Ot53=2?thNpn z^t=%C+WgoS@mF4c2kbsuRFyAgJ>T_~qOtrOxUh5}wPqPbOHJ9-lqpL8^6e^fal+_U zhA^T6C+)cbP5RpmzSNkNX^~NjHP_DmQq=g|R8vRoV}9$}h?@gS?6eLpEgc=gwxqn= zHAoDs6GQ9Z{&^cCp`VUh<(t@TRwRZ7_B~$MJ=XOtya`(VQ26#yAUrFJ!4*$J!P1h+ zHX0>*R+ztAG4F8kCWe53zzd8+#oNipPz|=aX_TbDh+wF(d8Hw5q@^)jA@9=8n{J8H zQmfq}Jeqsb&2<@E0xI9)(Zg#pAw{$_N18Myq^S108#KGu_%L^z|JSaylj}qjG(0d?t^t80Jbz+7@eus|S?*#?* zvFkYE10+fqkt#bYKd4OD*^_R|lbDMjP~XPiUL74HBO`mw6qNrAwsdj2RgMNpu6_Z6 z;s8!g&M#^5sds!iovut=hwtWN_P5>lrtQ|CKaY)-GQqkZR_e< z)h))V8S!&x6-8p3p_tTzz3n^w6tumTWp}rdx!R4LN6!^TuWlar*{rDj& zN)qXaBStj8EQ{zh2rU)i(6D{$jp4;Rhpp5mmn_s?N}~88@&fPZTHujS{*Ek>ND^@L zsAJ&fx46}07$UQ9%0{ANWA!6Eo;hqMgn+y%ICp8=jjgH;6>%2Zk7J{w0WW|j%`2La zJmgOTd9I}7ZMF_#b7||*zCx-QX76LQyEsY_Va0s+wBt0oi}N(0lp;_rU8<;%xeT~a zmPNjrmKFsA7;DeX#WnU@jK~|}t*@fpx94tl@v106&EM_q?RC4=zOTJSFd)2kZw%YW zhj(V9fgs>{!MAVd9P?hR0a4x)zPld~jef+0Z;kp&&^PKq<>LU8EfSQ|HHd~&zux9U zPy2<3O4$Ai?ZdhdTqLBVU}!@`X_l6hlvE$^BQ3_WL&>QzZP07Bw628>ee~`EdB%3S z8X9B_8dbZ%e-9|Y=F`&B3MgPC%m^Ke3GH~)f|Vw)E5p_eE?gWgwq}*i+F)S*T%0Pqk9)j4 z%P~hvbe#`WF{lE9{HTyKPy)4GTSR~AQ|I4gevGx_aILL<=kQJ#QYVn$Y4E>n%F};P zdvM|Zf!6&Bw;mu7DqGmUkxERY9k(PWF@7lAD{^@Th-(2Jol7K#N)21VwBr~eA+|%lD}D#@D7PZ5ws6z$mcE4!*iMe z#D)K)xp7kHieLHVbznlo|9KK_aA>FqqM0xagaerO^?!@@m)ug~kue$ag&pdG;Ad)3 zhbgZ-y~5etOUqe2?k~dk^oWLhN@%!ha@8T`;!b?xtgc0 zV8a0PtrTAXX8-$b&#ns^$Fm+q=DSJ$(zEaWL_iCFeSCl|0EZvQyzSs+d?CRPzt#Y# zOt%$Top2aIr0u zIX`^%cq!?!KdN>Q!*d%0PiXHW@(F5$|9ZmC;!!uH(4^bQ^cgr8;m@A7zW)B%{q(@d zsTH;E<1UC2&Lc#Q36aYyq(yG~e?%7Zvm23yx96(Gmo>M@(@7rn^;S4gVR1W6SLF6X zqpOUO#`Frm_IYHC1Ykd<2N&O>L_UlF`@cV=t1=dj!&67HT^@VCqIhc{i(X&wSG4g+lq3`Gh&!1ufBpW5-JCXsw= zy-<07x(Eerz#JWxjw);%^hHeqFH@Rub7ukz=SX{grQ z;?WYodS+CYl=v*p&(EjhQ51>iu$oy};od-5i;2E_cVe4K5 z&lE?O4^md)HPdqXV{4qS(0f9aB_*5!0+wf?2z|%?G?@S(4c6F4UkNi+5J- zjk;tkJR_L?Igz}%r|ZQLU}rI@aoQapMvr%g{o3;X!)m3(zZS70H*=f8Ae(V_J-}(M znU?56fOni`@Zv5%tLowMqnbaS1>WGS@O7wxL=HM01WRK5*_UmvhkvePHt{v4jriyP zsL}8cd9P&1R_#=2BOx1%CTZ4DYio@MrbQW_f^Hp0URqN%A@#*|vzAOuNRT-)W7&S` z{nb9SL}8;@wf%8+P`eNUPCS!mi`7F%n-ed7${)JpqFauw&Dc%e$+dal8n(s;8JE>C3Jbb`E_4Z2n^!2*dzc%2!{^KA|lPf;s@!ScF6jI~%;p;hx0g4})5&ZpD z60)`moFaEHZ$;$txK{);{qo%9@!X98GZ^}k#lhH;OFEI`b}*g-zE}+IX6pJ$p@_c; zCj68xnI7`G<8B_$^%o;kwH~={4og*58hoSpi%0YG)cuXYAwtWzpT52fV^f`1`UyIS z+m9>ryWiRI>csSAk5bhKM3CU(W(?;)3pY~GU*sJGD~=QHqs$d>s>(Zz+ax(4R2gy` z(O#T9yD~!~IBvFr?3fFB&>2T_GUyb^LsPW2XhsCRt=$=pt77Fz^I)j(Znv!V_C^x_ zX(MC4Yr~A^wiiA4{y<=(Wv&zgdGKE>J}`wE6FA)}H>AH1Qsimpu4Tyj&^CEBa)>5-g9F@#BW`n%u^tNuqhYLEbbC`e9 zc^41M+XkL>q2sI9mV2(|{9muliQwB5;`7+0OWM9g3J!L2+}3#K*3S~eJ}0b6*qQZY zRmf?^(!030_+~2?jE=VTN3}B|Wi1qb1lsMD(aU^$2;Te8?eyn{&{yzH+w8`H=edHX z7xeJ%BTq6|*chidbON(f7<~Lv1Mo~0<9XTG*m|f!tnKeZ;VmsKL8zGEUH3`X%El)r z$>~aOguhZ}U;NK)$zl2*gB1TH25AqEfmSlF2l_kg!tPmu!vtjI(L3cdu&=GIZd-Rh zB9RvkmQX%5zStdJ#fO{BZjAaU$V=PnLF7lEe8AEgDex!M+Aef-s3urFws~34IgH@s z`?0fAWEvC_@ZFU*1bH}+_mM=5lBiwvO3xHu7GkQLP9Iq7l0@X!eV8QAuQ}AnJE44g zFjp*s@NzipuHNog)80-v6tR5v0F|Pbm8>33$az~=QnKaZoY6CV^6Bi?ccwXT(|e%D zM`h&+Xd=&MSxCU<)cf^s2Eyl&-LPpdf=klQtp($9G!>ZL?YI*W++1>?>EJGY761F) zbw%-xrSY|~3a1T>4e)wx8@?aLK8IT~ip8Zn>gpOA@=`q@Ok6O^$x}-lyhlPZR$@BP z*Z0xX`u34aj8uaHACMo+_K|@SpxbB zd4mGcS!Rc0bHb3NiFwG0f3!5lY3WE99we^68Bbw#UUYuHyt1+as6Ct)-2ZxDi#}9b z-f1(9?w$(#RCxKJY`A@sQ5VuQ_oBzb11&llUb4fm#j3Rzxf|`^Lr8gu0F7tz09z zY7PWOZd??Fh7U(3ED4|qA}uEO}XT=61Rv`x`_ge*8dvN5=Y+P~Lo?iK2J zlt^`@JI#J#znmUmBF6469sEo;HSvQNWgi4;Hr3f0hAmlE8m%KYgQyjJH_Pdmy(tS(Pzv+e?L1H z*Fr4SBk21!*c!mL{o&pic;iQVdwX47av+5Er)fwa9aRz~{Q!?Xeea`)lm4!d7yWZ% z`18p<^x-a0V&>}N0w|7;?*ak&#@cLetPAc>@sAef^N$;i%NJjdt_4%&b8t*dOtAGa z1#s$;l4y%*+r1J;A8a5=#;tmeH9{$$n3mvGgCbV{+PMp7c>^m(s&Q!hmhNhsQs)lQ zUuCyPg0E?+4bTk(|3)r0g$str!!|f+J^@3e>Od|vm-Y8we&VM`zr9k;K*g{)IAgE3 zKnmZcRF-UIlognBl!J-3Fs zx)qpz5NB0s3N+N+-MzH56chL6P1Yq4qJiK%H#Zma;NW2XZdY$_Dr17e;ojaW6&3x* zUU#biPWCkf3blPKY9s{&!i`Qf(28);t6W@sO)~u+%b`8}GP#p+oz$2p(G_SDY z=pvklSP2xmYqA0)64gJK9?zB@#?qp3GQQR9@xy=%h#%&eCMh82|D&PRkR`p zb#FX(fuPThBC1aBd7g31T-2~6SRPr=EN_vDV7Sl!4As_BsFz7DtprtN#StwGiN!ZS z=zSLzS-f#Gkx=p5OWG23tm8BaAhrNq&>+iHr{=?bupdCFhwancHG#5nmQ%r_0~Q~P zHG(Wh{Bk^ZJMEj+R#s^=ih?6Yvkl%RxO`T;&*mhYgIjcE)S^RB9vEOMG?b*)8$sw6 zA{+GOehJlhPTMCej35}?m24ZOU65)Ux1;fzMdmYEKOS_3_0htn5^#{+ZSc8ah0YSy zozRW|DvzIS1X8wc*mEanPI_ute7DwsTS_ZW5DN#*q9#F)z~NjCgiJ%ecauLJ_%q|W zRTCr3>w7&Zifp0tcOKm@&Uk_T_kA28au$=FRC{)E=&_S!dGCCBH?-$MLzw9zU0T{C zV8(TCz;k;Pa!(vj=cs+Z3SOcjwos}T8rMThoo9Z-aeefCMHSNx*|GO1;#t|*z|6|K z-l;5felhyhy{kq*^DZ8lR76BXfCfj@?(pECGvl770e6j%;$u#P)@AIMoHcvtqMdr< zg4f&?whPZ>3rd4lI*%W(J2-~C=^q^QVJ3sI&9ZGP><(rsnfS4!`Io=BiOAWu@nN+0 z=2d#kYoTY58NkEISr7x)z=YlPQZA&o!bG}BEpMO$BwL%Cj$5icM8fq}q`#v&9DgJd zzViv`WmURDRnODYFFI8>(>QR?^T%eY*AOfN_%r+$UBig21J8vZ&!f@3Erl+js-rCW zD3%hHt81i1Sd^knB5VlFrCx?-X3{%7-Y{5;)VP}z9nETq(Y(<# z7(e2=P2$W*PDYk$5HuDgu0tv#ecJy`_Dx{6vx3vzPq8sE4RKiMf#~pO)H4*}@Ymb? zJlxzxD~*H@dBb{x*#ugxi|v+@K0=t}C@2aAP~c}(fK1)zWhFtK3pi8|rQoC?zKJi* z!eR@xzAyYNRC!Lh9*gAmS};;Ezzqy6b4^Xn)YO!nogM8bl4^e;IT*wDYnBlhK3ebO zW8s3=t)heq3P$u(k}HDRZCEK#xf{{yEBrU+QFY0q4;W}yb@^2a2@d|sm$_@tcJ;5= zuD=4;M-2Ztj{RJ)%l4$ue114iXjg6Ih4aYKcRYo}lg1T|1Iju)dHzKt`v-)WC`PjA z(gl%XP_0WDXxg;#nx7U8r^m&|5X8;*@qvSOS`F1DZPL=x`Mg!IYx`Y?ihgf;>D1 z-IGGCas1>6m1v^|6v$qpusbO%hP@^-iO=p0==r6l=CG|C4)0ujhrl;?5OQ6Tkt=`0pa;)0@n#ycH1uo*csGc%#Pw(^EKsCNo> zz-Tkf^c!-pQp0EB^b*fM?-xEf^kn$!DJb{Hu=tCG=Ghnrx}fv`W*cNIIw-E63PZM0 z!V3BedXV(GQs>(>k%Eu3?5Yv@wMV04JRWmlSkc8O z+-LUyCApwuBM`sxbph`QmP!f2_BTfNqY2;W>Y}7R@0-H*?c@%L@1-7axGqSr<~DbC z`>u0(d%k2yJT7qR{AR28rKO}MT=pS65Xw;-|H=|2K*jD4p9z(RLWDZ9q{*ROT*W?_LM(6Iyv;<+DNs*@}EQ$uCl}F=>AHB ztFwR8L*+eKt-9b6BuWJkpiB#4h~$E;!g&O(N^VctyMEbsSQ+}?j!kHsTPe@eIY zb+XW|vmOjO?4hM;>*2Qi4;*kwH|IgLlz)lRg0WfWO(^NtEwHXal^23Y@0ebZ#O|Rm zAisIehKTE~93`Afqm%sQ!2H!J4OrdU2^_E6qhK_V+-XYgv?X}%oJ~{uP77P#2?bFr z1_s8IA-SE#2DnJ2*b}^n@mwo5FX+G-<838tl@;d@?DM*xDBuRD;A`(qmyluv7x^?i z$%I->Ny%W`JO)0gjx>)N+&X{tfSDlmR3sD>l6|g$1c>;PZ2@FL5J7LvU)7ii2?-X9 zM?^bB!M!;XjKdheHB?BEn-JIs$+W|_*R065EXmKRqiG47} zA(VJmb)B4M9``3R8|dFrVXA{IoVe_eR7R^E&uqurO~Z~8w6e7YTN**SQx%T^m+ zz$Jf?uGmY;=(N^{zm&uX5}pcPIfAq_;T>$gFuyz0@3EyGoGC=d$4jV-i=!Q47}GMd zQ&&VEyf`GEd2*KWO2Zf#Fj-wXQ~lbDmz=P2Bj@^fzsFmuM}YEl9ZU<~ll;eE^St=mcix-Q^>!luxH^}M)UZk}( zOwHr;VJvW&Xz9%!HV5J1;0z587T~J91j#}CARllYomcAGevG%0E|lwS(-+!XHXTpj z$j3j9vShav#@1eHZIyZ@O7RMH_@=dVt*B6y%4lc{sjUQwG@qbQPIJ>(y0hE`N(Xm_br zMsQT{AEvzgYS9yUxe7!ii1qd1AdV(%0)r>Jh)z6uuz+h1t7yR;x2 zxU3h3X6f@{jK&@L_b+G3e**mbrBrABR-Nft507#YY++5Q%X)WdJ%!3~$?o|CV|%SE zs!Q63C@9S9@D%m7sxqdGXen)D?;qR}yHvICLZ^o0=6kv?M~NF78{s~IE-gP?O+)3< zk{uGnEGdRUnRq+c*>%=&TAwKMkC*1chkS+0(enX5tg~ZzCoMTwzdq}St@y<#AFlj4 zhtF&XZ#0oj##MV-IPg$X5PM#&y#(K<7?LT2k3QW$8uakbM-LLd4#EMsJi%Gol}RvHnPlpIg^_uhdHCCr8!40gAO2pz2fMdI`W~TG&nU0 zYe$YblY?rx0CJ?|F^1Fs*7T9)=VOP%$J%^3h1sH&T+r~Qho|n?W5(I{3w8-W=$^lo z!hsSmvr&{KtB)CS&)U0xFu<+Dx-THt$j&ZZ~ZD~|?O z|I>w_q#35|d;9x6Ccm7ZwZ4)z>!zG07BxKkz%%GHWxqWvKzpExv6c7F#f0DB z!=FrHOcSo_tI39RTI3u8Rj}FE{Zn#@=+QxPqcqMV`4G+9&ACn#cq2TuY=ut}YeTd5 ziS?s@?Os=V5z0wvI|B)7YaUY@k|&$Yy=t0!SJwMw>~qkrtL8z?Zi^v-vjM;{$tH{Z zJhC1S4i2W4vB)^gYIY66E!vfx31=3sMOh6zoFos6iMiaey^;Y}HQZ`4#HVbzNa@}i z7JwYfOR3ZyIVVW#DsVzeH@WqqNDF-7OEFST&qGM-y3UrL$2_$*yqidF2V2BRgtY5X zQYxu=_$N~j^GkaU^6DOI&zJ_hdS63m_mdjJ0jYL2QCs?`?P>5)tmHEsN4iW7F3F%a z;+F*YimkQ_-@haT#8%ySZwfRbh~ZU1PI`jO<~h8;_SspB7c^#No>$=BLW{fSj6o2{ zOsF1y8=M7l`0mxL;UK{3FdVsu84jgmKk6^B>N{Ech)_g76&^9%{vQ0#>gFl072@#) zyo36UsUKqE|m| z|0Hvuo(|N*gu(*+bF3{0;`Nq6hV#&ZrR^bv?;MwQ?Ko3X4zUEX;|#1KQFzqTv$OZ` z-P>RDVQ55q)zaQL!R0BUhG&qq*iko^f^=Lx&*>Vbw03N4?AfPFp3u3kxsXHeqfeSs zWZlcBrk?yRCo=BMIoWe|5X}p-`>cR<>T+DWDE^|xzs~Mjgn-?86y?_n1w;Okz zsD*Z+pi}YEX-Pc2zostl>GhrJ;Pd{)Rsr4_L${@URieJH?L_sVP;->SEUw-zC@idW z`MS?zW!(5RyKw+8jyT0Z!Cci4kFmgO2JuL6lM;=4Gv1M500|Q6Vx?+JWseBdccE&B z)(_|xKM`C;U?+Yq>feU#7b1|@Q$Sx@dUYb))IBY6yPyfCkmxmsT-*J>T)glXeE0W} z|4H51{8g^~McpYJ`-|`t{`bfJ|K^V^9-?+uSE-8Tnq|I8+a4v>2Fm#a=YK)-cPwqT za;SDYSuh^PSkNZlcP4$#8REB(gzs~Xe;>H9R^vjq^pKkr}9+4c$1JQQ$i5qskO2oAXY`zP3+SF$frQ+gPerga?|w@Gh-ZT64L zUE|FOX7d+(2|#uqBR4CuW2`LgeJ6Hf0sFfBRqO7sWa!So0=WiPfC#@w(Q6QqlxAlygDu`^ zfhjdVAH_G_>P_i{eqXx}eg9-7znGcXxH>tZqLm^qzj@8)7x}YBdh?R|CF=NOK)=ZL zws-UH$Vhc8diDi_hqUx=E0xE}op#2g)P5Ej^blcU9xycw0`&Cy+f(;2EN7iX9lg>H zEDgO)KPbTX9Hsr{cTUBx5z(w~jI}EmA0LO?Dy}7JtJ2Hu%{8^#w-J)|4cQ{+sCuhy z_tzqu-&0S}qeY=7(v)_5Y&@*TupZmX2?7lXJC(HkOAY7=iESK<*<=kYjEmNZxGBwD zaI)s-=f}$hIWMfxG@_#_Y$&Ce9}WY5yYw_U(qcNKQ}-Vuszb=wPpj{-C7X(ycU$P| zCu2a2my!Yq#hIChwhv7-iNP_k4~_>028MjdyD$;CgmhSBIcA8e0WBD^wIITe+iwXRwu7!$rXH`tWZR z-Pl|1*sX5J&?+yPAs1$DABWB2ZL|fnJjh zjw3reJE^AVt;_rM1zYB`bW};A2qy6icFlcwBXz;XYaTm3Hg?^^#bNE{!~JnEB%vsK zfl%CDVEQN)K1}-iTH@xlk#gBqPd358&%DJB#sXVMOZ>^ z{p*9}tqg0ij(v7DjN?7K8}C`Z9LU{S-?5b5m5J3p2Lp-A+gUfy&51)gOvOY;S1$l_ zZGlhMz)}v(sq2PN(rRab+;mTFH&oXRowLV_vfo$svBv)RSQ=sXEg7R zIZgT}C-NJoiqf4l8FPgT1)rXfT9xWf*WEPTC%JSgTpWa@p!aUt;c?LE=95iNbe z4fqF8;X_RW3c9ixiCz4gSc`=f4XJ@0ustDhIuXkGXj%4gSY-v1Fpa;%y*KL!-9&n5YIV7x7+`* zuPEhMs@!e_DesiZWEQ^c8N@h2`3FZQq!1nZ3!sDQ5 zx8ZgH+mfxW%Vm+dCJPTaQJUSbR0r_l7l z1M2XY7%|3n%JWKaiDb8@o!{7Ss>(;L12u8ug~*_kp(2Qr9pyPl+a>fA;EXLS|3}Uu{(#BQ~EEtL;5F zsJE6J85z0oLTi5olRSfYtHHAUcIsj2V%K7B%*;lYgGR~HR_ykCf=-^6$Bz|y7aB)! zq`p^!|0`@; zhX@Aj%^MCeEr;2D>b&FSF;ct86&}d;+w~;zYa_aOJOz%`)KsxRM8g6kc5nzwOE)#< zeX6MNR5Yl7*%ofuiL+teX+R5$iRFO3P8tt$N7F;<3xc>d!|H{tL;2v1nVA_l=k85@ zfaLa$?1+eC4H#B3;r(LuiIsc4WS=oNE5m8_2}NIKtWeU9v!{_#e-soP3)cN4y;Wb{(n5^^#+!ph z_vghC&b$kAj7Kxa@UtTyYg9{pg`VfPsBwI` zRy^Ul!5Q)?D&fEbw{O$O`M*os)a2+IP z*_rp28ELUOeQ0NpWk=7&MY2s`>O4s>5_bblFv8@fx)YtaQiVvunmbI{4_-cji$YjX zczg4GQ>zlEm_^`His8$vTk< z5MX`Ov8cT%pl7r;qeq{g;%8nUOC!C~Jawec*=QKIy>g$n*@6x>MZJ~h`{Q& zIg?v@24^1&pp*4^@)P)qatVW(9hOtMwY3!?CRE#ua44;8<#<6V4M#p>vn)@Dbvv#0 zZmL!xHQIrSN&u$AVpkefBR&s~jdC2JKeD$yyfKsSLwK`qqay~u=`+~grZLFVQ6R^2@K0!Mwy zj;-TDv~XGGQ$f<1D?xMUkLKeRyqCMA^M-p%H@)ZbR&u4+@|(lUL3l>}6MZ4Dc*g9W zy#d}fdV2cV*yELALi3);oO_}qE{y?C8ubew!dc6Ch>9vpzNH)F^o~btq+H2-@}@}B zWDtXQjK#6AqtfIVh01AKRIw!`q=y+lwGl$7*w5p_?RG7k@dnpnWx;pf8{<{4*0~8 zGO+K1)#@=Jp`wEX?r^Eo6`zMwnI{Td*@sA8w+7N0dY<{%Y06>Gj%e|8fP(K`MuyNu zL1qra2M@l3!T{mtWSLp#ewa=hpPEazSIDDpjazt_m?VVz zh)^yB>$M+Vsd@rR++3o57vEvfrN*;`DUj1QG&ZuWYo=$AM(Yc3O%KYp$&Xtp7#gn$ zr&#OAL@t{jNSbdu*l8mL*Bz}L1@c4zDyimU6(0+ZZbjo|aRi3qH`Zq5$R6`%4NNC_ zJSbNh{E*+}LA#UQQl9X$lz;?wMy=!kQAz5>SKmoL@x^fK{qr&-W+N4H6?9K3d)Gne z7(M@i`*U(i%2~G`+45wyl?Y*lvGtz*qSEivr0;iw+gWY1O}pWElz?^ zg5cA-FYZ`6bRdlR0v=^c)%!uha6w^V&nvKpIXldBd695c_}Y-XI?oHCK9%u!X<^a+ zYKOw7tA*Gt+F_F}+`k@DLlh5kIp$Fu)meAFsVaf!cuTFV&IX%pxDIkGHw4MlXw_@byKHG#n%xKOWd9r)WCa)Y#Z-v(~%pn$j3iUFp?wP2)(5I+aGVYDSwS z$5EpsbxqBSp=)`f?LnO=yF?-bx>j}v{6X4&TfYMjVvuNde_yHv*?e7O+PM+B{K(5E{`^Mru?40Ob) zWF47C*DNj5wk_nZf&JTA(STmS$Kav@#{l3?r)o3X%;nOvvS`oORJJNADRr%|(h_9I zB8-KwLWJRVcQNf%UlKUKoiQ}X4F=!xEKmlT`q?fP*BZKoNy zGqu#Goi23wqn0uBs+KG3*-e8LCi(rBqS;aE;c@9)!i8(s>dVT?zJC3>xLD^P#(9k= zq<|YI*sp&2yH+ym_!x5J$8gId%k4@J_wU};H3@;7(qgl-E?I-WlzyOVGpB^kO(2_k zbFCyjUH7IJH4`(u_`jiN#?cM9xFM}iFe){OpaS7&ezjAgTetYni)cRJ?%ON@nY(K}ZsIc6K%Ov~6-V}SI9>{4$SVmqf!dg0 zMj%AvR3PL9WT3sTduElIm>W364fL$nJF43VE$&ndaaxlJlr!<~*#&+ZtkzyO(kOhI z$^GIzh8z|UM78MLxdZVjGshb1>+9p=`nnc%{bbB788Mv+4*KIS09DApirG zNJ~AdwN=0!z|O<0pr`#wE2Nr{H#wVi)$e-k`~x^FmFdFIVL%mcTmg9nod^WT4!{en z`0Q!|+yddsoPWj%YOljR-X-Uu!Z0!#h2Z{$@X&qu~b#NT6DPiwyme%OsZiQ38FcLn(`wqF=)qo-&S)wf(#MTiO4 zgegbw)%(p5O4=(~k{_&;LvHg_pFAfpumHJ)Xjd??r!yYZx>763-H1*%Zayw*5*&oV zXhY+&Bl*0=BeIA42)kKN4^^mKyO?>Kij5ma}bX;XBvBmYoZ|D9fF_Tn3Jl!zX4 z=LYaEKtVy_H42HWy>|pUR_Eh>B|Iuhl=*-U-tnZH+z61Y89KK_HpeL|D@U&0eGN)O zmZu&6`%fs~ej;Yy2KvVz67UF*!E@h}Yv|+@PUCNEPDRul78Dee3+9s2GFq)N(Nyi; zOe6A$zQ=v1Y9oL?o?t$DbUrbiRBG%|LTYMLG~Dj~bMD=89$UYVr4{7vpweu3V`yw0 zn(t&*CR_`Jm<2iGo^5u;mT%uw?%e5YZM7M#qc?;gjIF51$fe_4Nr4zqI+nY={ymHV(FqkRF>-5)7$>9KbDQ^YV#$9e{2=MXrHT1h+JDcyJF}L?_sL?To?;^ z5Mo;OisHRbh+qRvxXJy(_Oy=y-IuWbo}MCz08b~tkWElTjy)t$GzbBsWkWqb-5ey0 zm<}Bc2Ct^b0VAlFrpbc9X-ZP~?6JgZ_jxbs{Qq27AfwrZ49c90GLaWAai{2!-w&x@ z6c0DZ#S#*#)d#{!EghjgZ}?0iUbm_l{C-6cIw=wRP)9!{@tVe6@%4~qSqu@VB0zSN6>2^n{ z?eH{?`AcB`4b{3lwjS}80K)F}*wKu^Q^}~~_BHKvixBTzy88Xf^V?5;A3sn`0!L7xnc9Bb+uJ+WqL=5VxZNl4D*OtS z<*r)Woc2yROM<}8CHu}1hL|7pX}4#)`g+~K+~?0Au((a$dOowiVhU0Ofu*0{9k>E~oSIJU@L%zt~rPXme1B|L5epp-R_+@aWcX zp9ytebLh_;3Nj8++!-_84Oin~0IsO}=EJopWCWK|lodz5j~bTzNNM_*)Xrg6`Hg?T z+bEl;?wGtVjH!^@hp_t(NmKOSoOgA0K1Plc#P;y7byU3epH#0t=ya~*Cy927hYV68 zR|gk*a#frl2XhiujI*8f=av@tDCOhQj&B|9igXvqO~HMb68SqS{6!esIw|VzHVu&; zre#3rgABt8q%f_;b@?{q)KJ|U9V3I%F2fW?P$?uRg`jCr@W?xr z&&6F2MnI&ZGf2qu-HAiU-f;_yb_loRyR`y%v|e zDlS0#`+@>Mj|FLkM+#@3H^F?pzUcruR??x#P_x*1aYX(i2peE}hTDUvDH5_J2*v?HNJ@flw3`dSk1T;4^2o4EJNtt2r1*t2A z{1jCy=QzZCjWJmp(8oGmo{~j+n$nOtxk~HccwM&OzRsd5Q2%TL`o5yamP9oAfxdo} zvEA~-XB<)N9G5q?{^g^pB!RX`!B!!Ak-{RQV6WDqC_x;vhGlq`6@lPKQ9 z1hd5M_~I^0|K0Bj1W5A88u>@jqSH^~lVcG7{8}drF>}3z48?7=IeF-eKC_9+LWhV!_Fu2sEKfi@8l&7csWnz3pl-z!_#3c+& z-rJHomRUO-G2F(TBY_@z5||aSdGzClD^or6Tq`~1OhJW5$r{fzqB&nrc6HLR6qh!dmLru zOfBrR1vcYKTW?UV>w=B87^2{vj~X)m<$rpMd=48yQ9R+5DuRkzuSjNLZYR`M(`UYTMy(HOtKE?ZvxX+o|r$i;GQw&vVjaFho+-mSUQFf{)* zeCR%YcQ%>8!A9KNA~(X^ij}tYF+g!{JuA#+!>t0ke3bi%X!{T)9j~GRYu%D3o_s(- zlj1Iu00<*{$FGI*gW7jil}9vlf%mD_@xdWtO2oNmHR3+YX?I%32J%Wv`D_}==o=jVIKwx`2{xhiO|dq>iq%iU>qPkQx?&aK!Lv39o4AdZ3sgeh^ZsWuWXEt8~@MOM+OoBcwsk#oodi!MW9Vf5h6Zu&}tViu4za5cQ|8jqE*9|IYiY zUrz*1E|8;BY5JQgSoRitI|--JLnfcX{xaNd#F_`X$}QRRlO+S|Vwa}O>A(Hw|bm)uNlP7E7-1+Wy zdZeXgCjpNs?o5CoQ=C6Vg}dnUUS`=alW3iWQN{86Z-e=-p|STo>x+5>CZ04?;HfO9 z*)}n5_wxAB!X|p7QA>))=3|>@^Jl~wp9`jLk?Vj7$3M<=F&kG?I&Uf#vED~(ik8Qg zS61Tc?P@+{7+_}$=cLDM9UO)o$ad~{B85Q{J9KIhw?1VH;>~?`JT!?*+G^S9m+JZc?WR580|N!0H4r@si5%z zMA}7Y^0~J_UiOWj$6l}|sbJt6Jtrr|4_9?Iw_ScpX>rQ3z1eQm1cQWOOyU z9+API$=^{~4KN=40qCnI7Dpk618!LzY+O-gqR$_CJb~aexSNYv_DO+^yGyo*P?5u*4|zu`iWkLN8psaxF!z3%Te*Y22cygAwaA(Kc7zOJCF$j4!eAKU=dU(;ZLcn zpZs3`X7%lF0@|o;4*`!AmQRe$TCVSlUUT+Z?VmCRXppk_`T4cAwbj+t0o-ZsZeDH# zHeL+{4$|usXB02^=tCaP-xCLLvPN^ujgRymnoW*~g@i@Vzx?DuFe)n;TStewu`w4V zWZM}@Af_=R0F&#ml3ER*CZ}av6bZENayC>Qc#jKex_lUi} z%?0Pk;b$vY94ai2n+2U$;2ogmM`Q};KJ895$0qXypkn^au)X#ED-8D1rAx}nL6bJ; z5Uh+0IpE_057z}jYQ=Vw(HEavTU#MAn3xt8LacxWJ*8joVA_Z8H{qQbRd!) za0Kih;9I^<{SA!VfX^cRScye)a&rwNM!vSU$Jc_6$1g9)omgaRvD`dOxaJMM1E(CV zU@R73JVdpwW3>8V_B^EKV~4h*7*_1T6;)jZfiBoqItcCcPI-#bUA%L9sVU;yGbss) zF7T6ziVD?T8?LZYG~+Hhm#FNc@{j4mqzefGkj_rA{pkoyo|`6n+%PPLOpofx958n8 z?b}q^>dut|FBB`4OPmZZm9Bo`>R)}|S;ew(*6#alcq8xyBZ1Nar_o^A=pnNXzt5jP z?>Vkh?^Zcuh3ASlyK=!RC;Pp|GJO=NR18#)9Jb5Mp?-NeScbti7_|y^7 zv=^)5uW|t^9kGN+N)y1pfYu>-bIkL6F?|QU7lu!^`h{H?! z=fI-jTgKfxo6|0G%3qE+toWwMY;O5qOT2yt~ZkMplFZRitcsVlWyM zaQv`Qq=lNKr4qIuu@TZ2SXp03a^Qp>t#*~c!`i3V{uAfL-Juq}Wo%YjLv?ohl(j!L zvXsn!k9D0aETze;=B~0tZ8he9ZB|T~;)qsi^*%FGb}ND zcP(iTGb|TW%3tTum+-ts_KE;-SZ{@P*YSYF46?^!fk}uvu@;3NE6|6gS;R=1yLLu( zcXzh$4-G$55n{i{`THmQMKRp^;)2<2d|yAg{B6fKKNsO#msRUA-15Rh)ZLzcWeM_V zYj%1;-BBCt_bgPAc(uZdJdyb!NqSE5C_v^u8oaNh=K#l#`Co{lvV7$5?&OE&K93(*1|4^E z^yG?GP;C6A9VYLXt?g3DC2u%~^N zS>{m1Q&;tYI~g&}Q-|q%-s$=(=%(`!G`y!Qp?`tp@9R2ueL6J!{p~*>F4pdTaI3VK z+krl-A$qpSflbs6;%{&;1!O`+4ZBmVZQ8-KAW#u$Wruvfkwmb56c=~h8PISjb_FJ; zBL-LrAlMvzje`9J|MS~?9|I#bY9cLGTU|*f`r5YZ+~=j(={pyk7TX!OCdUG9H$vFBRp`j;%3 zgwruEQBB1uASdjWb=3Jz0*k}XZ=M$06IT7>>#|d&PLVuE34|_W$E%048m>T~B3szD zyzwjnZBw~0wS)Ok2&wRT6I?v<=q5gDRN;x94P_)ev&Ft;(G1G9NPFOZ@jRhui^-h& ztfAiGeuE1)lY+;PaADa}ZGM%!+3mCVpD4aq07~g}(PCGB^d^kd2Y2SdYQ&{VyBI%) zGY(FD;0ju`SM;Ejg@PpBCCFI0UM0=180!E{t3UpMR^aH9UPQC4mA8Qx${xkC8vOX!=YzRZ_XPw5hRHaNieZbL7(uv; zxmBcAEPBMY^ejC@Z>TObpwmbO{!qB^&x7k1iHED56eVM=R|e%`&Tge#%gKivquc|Z z7Ed_va_w!ZySKCv(ZNni>H5x0z2cfhBNd^!wr(5|koT7mFvLXq{v z86Y#^>=NubT^sm$#-Izx%e3U=W$XEa13R2;ClB_~!6|>r$Xh{CF)lYNtJRiRGU|1* zqHYVX?EN7F6)`7W-G}5>jp$ifj9mfISsPd2BHPK9y3$&zl#_8utVA;xe&EGJ%Fs~w zFfc*ZI+6@vjsDMD^%RH^geOL(*Zx30K zwOW<2Z@4|@^XY`B2bzpRe>}c`;}Y#{pFcl3$x;sVAXwz#!iXkuANmUHZ?9ryVL^eQ zC9u1Pr%S$T(|A_H5nX+r`_TDBQ%q1m04wneb}WB`2=;(d_~zqyN?~Y7AV|1^jyTD| zs$P2xIzP2gH~D{%W!5g>ODjC3@%w$`_s=@*x`~x3G#Kh>OCDQ~XK??qXgZcZywySX zZ1lz~q;s+kCPrH5xBf^6ZX8F9Gq^*?bSL`cW=RyvH=~?05^m0#SQM>-SfDA&eGBO) z2xbeU*&O?qo}LB-r!I-P{@SGDYQ$w-m2Nim(@NNG!-K}gq9IqYjkw6R@1iUiCAw z3D2|TZ9=9NV6?=;?QP(fHx}3X3=WU6b^^!#o`;ff)0l$E=L%hGtgN0%YSK86ybAVK zi|Kzi#Ytr&mDfpx}V}3}@{A&A&=P@xcAWdyObN|WROZeG^aA(|^k8ml74KthdEZ~{B8 zC`mY1lNc!rBM#S631BI% znsS}Du~~wUs8?xB^sEFO|6GFz8O`7!im=)@d6aZkcp!+7%IE zA9C+9yn0|_avpQ~{tw|a&e9uIGem=gRB3ldriMntCLSO*)E^{j57nHuz@N9yJd{fl z37Nvzg1iRJ%LrR(p1BxxM;iI;RllcB|6MHbli9%8IW`WhK#&3m$3Uic3)Bf}YU0w; z76k-7Y~_jly#Iq$Ar7=(2svwby0^xDv=^BV<@#qZ#p~o*9iY`CtATH)94%3u$`>zK z54Ydxu`#HP;1{OxC#pTo1t?FRJgJ~VhjfTyZhx3nCR8fb>85p^C2QVufUC_c?Wn5P z>p~?-!TM7b?>R#KvIeZWy>8hH2qadT2CCJKWy1mf!CTGmd?8O+DuUO*e5<|+E*vzP z>gws1q+3-M|JM8Hvhr8HnCue3ZRaxLm z%g6*F#fketO7OV${UKKs48FoSw8A4oC8z;?ZbBvUHcm-dxf!J5Q`z_dve8fu-zFJD zK-&cahBj3V4O1>zqPGhknV*EovRG+(jS=IX2p8t3-rl`gW4n2kse(}LCyLLg4u2|0 zgPoLqYI^!&YeA(ty=N` zdV6mRrIYy=MqClPG{tbkj8)UpGCvjv0(NK@eA&>|HA+(M1)QvrHH6LIh@jv&C*_Y) z0wp`-aox->81A z)%m!^1B#uJ*HA(OS`m6_&nJ50`@hblpBnkR6Qnj#7AAAwPk!a^dCg&#^!)#l$#*N} z=9+bS8Yb&OIarHkKpgkF*ZY08@AzuQ56Ci+F4NZ1I*UYxeQId5-7ZFo>!m?AG7F2b zg!t-dZ3@v|UaHKXI`^|qZRMzq4z@wYM+}FWpF0?7Y7|{YGHZT2G9D?jhwxqGX8-Hx z`z5LX+kX>RD6ThB_ahBM!(87-49jMX28<2pHA$(n!r?iyuUJvfuO{@YJZUdAZRfw( zqm@-jP8swDWqRz+`B4a$I}}t@!79Z(m@_8U2QU!4Zw7xw>XNJX3)GGqvQ!T%2oO4O zHSavMcf346R5{g9C|urc?J!^b9{CZbN!Yvn4}a$0K0LIYJRn|685tsnLA-zW4kAEA zXP!V{RK>jvtuiPy5BCVz5l)zcm8s|BowF554}A(_=6_Vu#C$9qu%evlg{Y{=Rh~g2 zYEA7l&l4e6L0MeTfB$OU<9w}ynBEV#=5ExsX_t{)o9|$hjASKuZ9uu0t%hzE(qwTg zPe;W#7%^;#97N65bMEPauaf_DbpN7q5<41jjo6?RfGIeOQ3N^R&-}BSWv4eHhGDw! z)w9;U!G)w8B?JekI-U!N6mfTOYSG@wW!V3DE)<%%yvBEk&uN*==|`C;ny+^GM3WF_ z4`{WYk-|00pi#h*fCNth=D+vA_wf684~7Cd=%20#^%y3#<_Xt2gg&y7qiJR49QeUn zUVKbj33>Q2vK{TT(fP|-i6CD025W%SxctVEM&cJ>5moD4RVFWLRN~uV*!bj;;q8thWf0kKEt5pf6AJblk+NG5OG0jmyR~W0akec zE0&)M`!2`;kskU)Zov=DTE<<-6w1+Wug7Si#)*`4IrA(Cya$gaufIsDA+#OrC_a|= z(Dn4Q8b%w0kqzFf!PPgE2Q$fukIrf<6Bf50d-52Xx7bshq$?Fxtu2yf;B&u{2>e=pQe3h=E1XU?TNp`??LGn;*>ZQVv>Hqj&rW_RSD`zh|p zUVr9Z|6QZ?q6p+%KezcbCh9zqH1+(I~FXRv3& zp}DEax%hwm|F3JUZT)~3`6ShaYX3WIrEMdh+{`iKgDE)JljGnZK;-zp{5wqtdsIhr zG`g+yd(2%yN`Zv{@&eN9pd~+yM~T^s2Y+HvXj~6Q--hY|$Q}2kq83_T!J??l~hS92-S2}gJemFTyX|xK9LK8d~_P%+qTgs@lMW{ z+dHI!AcW>Te!(+cb6Z3QqKc+mnJG>sE?M!B+1+vW` zw5nRO$nmq*Te~+iOT*fVyq2R1mF&fyTau4*mB4oSm~ecEr;r5uf{xoND><HvjpiFNgPzGxg>yu z*0*j5raD7cktT!G2mIMy;$Hky4_$^Thovw^7`WgO7W)tIyjW;N`rD`-;p5&^d0r>? zUrRkJu3@2D)d9IMq=bnZ|1Rc8PiBdm0MZi}ReWK{F8lpPontu4O_A!=s&7$On zp$xvK-QlS(Lo~rrcXe$Z@&6h(ER(%yPe9B2DwoT)*M;@X)UZeK&_gN@={MvXIcEGr z@r~hOHmi3@HNL=Sd;eM?8|5xaU@?Zv%Reqkxt_l9BW$?S_>sDy*m_Be;4HzM`XQDl z#Nb!gjJ*A4-gW77rNXO8X|mc@jB(e;7OyIhusz5A&dGrfuk_KIO8;0rP}Q{LW0;BU#{S?E>7cviFCt*`>F4%_a#5gNrqP(@obxh(o3 zwXwk2(JMjSs^{<{VpJ4|nY8%4A{Yp$vu%WkWk8f+d1T90B;&Y}pC<{psXRl>@hP8` zWlW5soOxf?UH#7~e!c;{sh-W?a7IW76V=&y2f+narlVKV7+cQUYZ)jg#xu5@po&}{ zBn$RO9djINI3JBud8uLuMN{HuNEzyy4r`NQXyPtWUT5UZRrWU^Ya+@_zRtt4Kk+Yd zs^Kfd-&fbxuK7c?BuvHdvfBHWe-Ic<o+am~G6WtXE_+I5vnJAJk! z96V3G{(B=#E!*cdGT=uC0QoS zZ63Q@=Vr&&tsj~|M!b5fdcubfrVuCx8Fh(T2*9&dRaLuG7G@s#BtQcr)YRBXh95l9 zD4WEb9D7||-LuTQZ~no9|I*86r(D&9`#3=BygWPr2Pj@43{8lSuM~Zb7n%$H1W~^* zC>KCiu(q-izWN8MFXt*iMv01%^D*Tox&$p2YimiG?mu`?mtBA8cgX=4TyUCp=cjg8 zc1Yr;QeC!KZRZ|^@NX>-Q7@YRy5TISLyy(`H*ekm2MPIyklJS!8%6QB9@jY$)B&%L zJ&3qW184}KG%v0uD7bt>hzCC0*w}y)h!EG+P&R?8>7AJj{_pe$Y;S;j8SSf)9r@tF z;PIf=mXMT0TY(R>b&z^mxHyyLibS+FWyvv`fwC-`POsOI2aB?=g!vM1E_E=Es#a$B zN<1+pL|VP*G=fHYs`qHs;u8|Qu-Xii>MR2fwUF~|Wk_Abx9cy8%Vw-!_-c@02MO&5 z%c2>Gr|r(;yPP-V4uzMe8;k=SX7DZo#Exq)M>x|@g(P>!PsM5lPzYlZCu`>m@Ww=1 z&)R34Ie<|Void%F*L#MAuZxTiG+Z0U{H}|D8`)1J)r`|-YZu|T7~8uxvb!>_ta_y8 zm)T~o*J1yr5`C>Z1Kf*(cNFw4ri0o@mS*kqobFQ{i6U*I zfJ;QPS1>1arGvm{jPfg=m&o9}Xob!@IF~GhIFF(Do>IoIoef5%4ASX}>x3q!d@|pS zMW6Y==45LNElx>I?(4q{t??R+=(y?l2#~nEqAN@G_r^672OqvJuGn0glcSYcxI5pB zXMgLMCNbZa5}Ou(HDX>lhLf_Ki%#YxuYtubN5A?&w^38J!QS6}frW@>S&7Bc;I?3( zE-QQD4W)mq{lD-V+{zEx=2gn2Z$t~MKP~3+n6LQ4bTHQJnEPTQ2k(!M(6TB=x$)^% z<1^O6<9$PjPfAB_$(+rX0$cCgzZg z+p0CE6s~U4D?S_nSnoKFjHUB`(k{QrRNoEMz#prq+vhI@A zmk@6G?5U@Cuk9_P`F4`_b?rNHm#PN_SW^X+4wyvInXKL%=7}>&JETJ?X~(H<2n)<4 zxgsC9#zHo#NKtIYaZM*}#$*;W-@!ELwxFzZ({qV#q zungo>7(O&&#ZQ-|y&GL!vU`9y^U9t7Y0E2J+Q~}YvHl^aBUw6exo_cpmieyRYH>W5 ziGSgbs`gm7o$3>}PLbkvCLSK>9N0MxIH*Wb3Zds~sOo|i4kOe6RJbR>tU#C&atN{} z6}zXY_=rVrgJuOtpRnr#T3<@-$C=5@Oij_kKoZtyFkNOl?T_jM9w~7uw~09H^0PTg zuJaTg(Yg@%Z~KX~DS}F%kjM$gwKlJQOd3`t02=v9<&;s^2j23JA0r=kUo%%6gf)4en;@ z?mj!0*Bw+`8?44%&-9q-ZC)sOJ0Z8bo7F}>q#BL2X zYi=)(wwJEGP%~fh7AX3`rSoIf@`)LmY(az4!-jvw=GN4YD@m=(dWw?sFL^!Xf*=i^ z@X-|8Vd;DR{tYLY8z7fa?6fV9!*qvU*NtQatCT?Ui4T9u9TXV8F_EP6RB1W57~x|F zM;{a`UeRosg7*~YGfAQ~Jc{RxP2Ff>1YGc-`7vcwrZgA}yoQf<$e2;beB7=-Kw;{N zNawkn`PhiHzvT6+knpJ9FUF9OXb<*3*x>EYMv)5y2I3)x&pr(Sj0no-D`OXH&vO^O zo@HM+d9me{U(wah{-d)(;O8$FULR+PSUjYEq`eL+bl8eNQR|=WL4GY?`8m{%coKh7 ztJ)^lSfBL-cQgBL;05KK&+DC_2JzVGI=1OBPQntoQe-BP4#7o&xc%7F`LOf*Hot_& zC?TQpMDigpVIq39KePkIHG z2tnvE;)FTA+}3;Mh3+3AyIf@zXAOIZb0Lk(1Hb$M4dUog!L%Np9-2PqmcG#P#cSt# z9qx^&)a}&hDwe!J4}r+&RBdT%2XQ4$K+lDfn=IC1|AVw-Y~AC>_pG(porUU99Su!q zxAx)j`@y?4aa3XY+KC@NwN+IdvB4NF0g2m=f56t&ij3h*Y&zyujdGLYw*$CCJFhklkoPvS~j%ZLz6oiS7mw~ce_28RZ zYb?<$H==;GXGlIcjUm8l0v%<0*Uwt&DB;q`$P!NV%6#Sce-U%BQlpZCNcW=|GMyjq zrgiq}BI6J5Sgw9;wp{{-N<+=2ueHlTjrWBYK!oH|XVN_a@V~lPo(XWO%L~1YAd=WJ zS5dj-^(@}u+z9iPMtvh^A{LaHUKHAPp@Ca6vs5 zYue<}m?dMaFK&*R0Goos3=s~P#@3q_Kg*FMMR*GBkm+sBQgz--LnPStYABh5j84*m z^@UeFN6{&tKYz~43l}ff=DeH-5|=Ik+9l2QbW61`37{)*T6SyxGqe2%hJ>_GFROej zosexP#4BWof~UHx>%AGlr-uMK@U{ZEotn!bTX+`rEToL`Fn&g)jgt4E?Cpix(?}8Mq?@SSQnQ=k66NA|!W3`uir@ zGb;vbZ8x_Dg?2OZ1Z1?%&qrzQ@U65aLjH%l|3?8Id;R5KbZ_kT2li4cMeO|;a6cb9 zceCls5P(8HEY8_0h!Z#`FE1a-u063WI57=a`(A)4-HhvSj}s`_)+dh_gTt$^kZ(m##LX|Av3?6U?(cIYcc?z@S42zwPTs)QKYGkbZ%Vieqyv{;+XkrJ20zPEyMJ!L-G?3p0ErR2<<%2;lGfne|IEbohZ2x1t9>ws2Wf}#ajfTkSpj(P}?TK9fu{uBJ5lY zacGtfE+OU%(QE@FBM5fv==>r?@t-)f8Ji=}B1GUEKlfV1r2KwHEv3;g6S)0jxdoJe zE)Xnka_e@stDU!7!htwDX2+i6(5rjxOG?V^vNI2hdIur}&VdvF4BnM8pr-(C4*+Hi zD8Xg%jC68AnV=nHZ7oCN$w1Pwvd!;$id^A@NNHTm>+S7joUoz__Wi{&H2`jh?UO3C zphdeR0+e3fsDQRvfkHJfoCU|t!<>B!XDPzVXm$!}f~0$AqqCr*pfd-NdkZPM*S3W( zV7x?z5NrTPLe<4ClvzyBE4>@$QJ~N&$>a6RKa#y{UDkg9=zYgEF@{6qPsrAs9Ibff zVS2>Sf|X;wDvj-7*&X#@8~551`iTWbz*0+Z zpf@au^)kT21EpM$T85Yr#0k6DEssh3VV-u5e$Pk;c%A`vvNF;p|@FBRj==GYr zt|aO=>CuVje_M`u>x=Zq3y3%Nnt3tk5S^XbrtIBV)gJ~b_dm##w8cTaeSqo2n-;2C zt`%u4Pa9zO*bf%w=hs;@2<+|bC=9(H@qyE>1Yyq6aE|dV znu|wHznGTjQwDI$`K6`G?GZQm{kd*mUtgdeeZzTY1&C?u4}Dy*pYO>8g`N?bDj+}2 z`Q>*bIjg&W$!}uOV^h5!$l`au7c^)CF{JghyhvR>m-&Xbyp=uPwbu`vmq~ntL)a*~iC46dG}@VQabAtA8>`Ou<(I73o$VNPC1o6xbMrf=sZp0f!y`ExIVo>^8|# zDNsb_pBrKQoeg{Uv`Fzw^QSjx1^?XEb>Bpf9{Fcps)t~6g*3SHsv!N9wpc3ja*dYN z{5*IOes#Rwd=zhyJ-I%JB;YPIyiCnTuo4es{;)_Iv&gF_K%N(f&YytoX}zOl4zNzG zlLjPc*hRbZFzdSxhYP>6fEbAXc=@*ad#ImXWLQk;ZgfKVK_f|S-6LT6mIg)4g5LO0 z_Qy$TZi8FK<_cI6jU1ctjL6~6h*yYCY6)%+Y1^rB=%-cW~`ES*3-9U zs=*Xr#pns*S@;0=9`hQ?6K3mFw5kzt}wy!SliF06Yj_Ndhh? zXuM&GRDyWz^A!X@ab{-b1ss0dgLA>Nx&S_EC*7;7!wgtD+B1`wpbPNk6|X3KLl^d$njjasvl{*! zB%|jZa{q?4G6H_Se}Nsbjyf0jY;$@wSj%e>fH=C)`@{?Ir@?uCSC^l~XXOM>)@rF{ zvjR9)V^@%rS8m7Oas?z{*JQ9|md9}*pWa+=nZOF1^a0@dYq|T+5Cuu#6E31Sv5%Ak z)we(R?0-$-Yj!qAYCayKUyAw~viu6LpOVG^GosR(OK~j;G}o?4lY0`e z=x}VyKDLhzh-}rl#4aFQaGH69{#nt(mX}X4JyPZfZ(z+r-2%=@zSpL2I_?yD@?+VL zURlqAZUjWtvxFvTu?_`};k1CQSz4KiZ*J3K%;Ya`StPo0*$)F|Zb&c*CVw?|O&k!TRn$q^Ni ze%5D}y-vGs_BCfzxy z22(&izTTuk5gV%a@dNKX@H_*25&WN@z{<5VWSWVgOSkRXjcJIY(a}N9VNX&N;)UPbI9Z8Ss$mtPHq=fan%Usl%1ZUT zxlmes={2wVJntLYAKiqvUllvzT=s@j=y75_VjvYb@>>`#at^va8ob*LkP}SOjog0| zdj~WFQeb@td=v_SLB|%U+eX zh7tA|l8vv*4!yB^mf3sL>K+&Fk4!^YFc1_e15=c9<$xQ9NPv-Pl8amc7-WrK8~Gq~ zl9xz4_*aw&5}-tWkjv?o?W4XYa-wXn{+bv0T5jSo#(tOUb#W3yXKv7~r3WP$J?0er zSE9!%?(4M(=GSNw)0(~}Yz=5>I6v~hJihXDh4!CjKIbzc-2XEBp7szR7s!avh3Ig^ zEFmV(wn!{MTNyx(XwZ2}cndgdnfDMZ)wKH>9#9x{+JO!9!xq0UDC5#q2ix0?#sxaz z#o}5zT1Lx_rmnB$7+<9r+5<9r2+@)LE5ge^P1r9PmpY6vpAIzFpCHgbkudLlpg_+H zm_Zb=RV~(W5KoG2v`d=#V}r5yw!V>I4)#&-yhk4BH}wU6x*h}OU5`Al<;ODbrRT#% zH?>AF_ZoaxudG18s`v@_As20^-h&aFBG)~x<=nN#OrX}t`7=b0P{|?y77ps}ySAcj{u?O~01J-Qleuj_u z&FjG^9O!{nGa%2}obN(0_s)=Ipa09lzf+GV&$#56qbfSKOzM8Hih@$xw>ttgfD)(x z@6DC4TtaGZL#7`e32*!IRPq!@C2O9-do%tmA^}%Ez-rwDL6tYyyaX)CnhJo70ld&9 zU^_$IS7M)HeoJ%4{7jh`5n@=G*(+e4!=DkS&J1-%?q#~j(GEHY27?*0XPifkD6ck= zRs=AHli&RG(~t|i<2azu8(ZUsroX*V>U=4)1+AoRzP`KLmS{P$>dqQf%{jhVLt`$D!o zmJBDeq{Q@ZugHaxQWgel2;3faTC4`}4S&!5jsGpmfKuC}|L#PS8pyl=bG~qCX$fHT z!b2~bc&VM|4?WpB%$nzo5y*M%WefQ6e#P}}tY@)kJDH2^oP3M?l^so_V;MCtneF>K z5fv1Cjfn(ewHk@R`77)uoQ}=nye0E((L+pKD4E^kU0KHe1V+0 zW@L@lddrp8%I!FIX@4kICf>)Uy{{jAt30iQ$Po8!`Jtutrt7UoEZ6?GzbkcZB~Wr# zD&~{WjzJri8S)V_&-dGFn1=D7M!SX_P;{DNYoQ?v0|n{RlJsjCi}kS4qhvQfP$07mFGGzQC@NxHJ`(TTyrYA9%76T+a9vV&PHo!py`da*8` ze}dY8ug&k33}E7LB$RMuH@~FNH^ck7wxAW?2{e(d!yoyYP9B7iYieJn?U~_Kqe*tYxo~}I>MNpQzYTVM2maJ zR}~?YJ&+WegJf8F>}rJe)2I9l$lWjgi!kdEPt@{pWSi$MvHcyEXZCTn{C0zxmNFsN zlFR_Np9i>>FUle?;0<8LxZ`J=y*|lTQJx@ZQbPnhOT`;BZ;}c?WG5t-Qq96kTCp-E zq&a%o*O>|`m?=cJANJc52m}J8i%`$E_SnOrMH_xXm);-p#2jy+PnV(@>*zog@$d8)f6)m=e+RcjZ*EDc&Ua~!UAg;Qb zo*lO#Y@0sMdAeP^FdZGreFWP>`T>3dBD$o_Mx1&47Oe(%C!#*ew-FYu`DuFhu|D(` z5ROYEtDF%gRj^fM5~F**+WKY4o@UiNiv?vrZF6(*EDP|lf4)dL>{K7^1Ryf};w zZ;y6-E((3ozC2S^3jn8<>{bU%<8JKbEqPB`#T9ZSe2phw*|k1yuS_7E zp3~Bj-++HV`oN&RHe5McS{#~nzFMpGV=d5+XC&qdpRbmxTJ0!+Prm!FfcnE#+2?p| z6lmbmbq_v8KI&N4i4G?c>PZGLG|q>=+DHZ~DP?T)EWm5qQ4<-n6jNGEF5+iu2wxh1 zly+C)%XIFyp*9hfWSD#|45zAbhrQU?fx@K&j~)9 zv(2!EO~&^Y0%W}?!{S>rQ2(;%*e#H6jM;R;J^-LWlvAe&s52!9hUb_BonOBBq?b0M zunIS!J+cU1BkBICWvtsz1XbiO4pg3B!eGe z6&%R9H3)A|U@1j^M0*2~J2miK>PEyB$V`5 z$5f;ZP-Pkf(Ku$L5^}|uQ3v0(xMz1tWiYj5xZfM!7#c`tPG{QtI60lzf+o=4@&#pz z_yYSm-pssaIzz?wEr}~syL!b`9HBzzd9R*5*&O~?Y+F2zp5Zxz>sG6m`p;y2c9>uQ zF{#@|hv1141(E&1HhsC`uj8-Xx05|5rAB~oO4>AhNvc^77>yKLV^@*(j z7HN^g0rfn0ZBzLxN`#-^)V_V=0?gq?0Q(0CdAT1Y3k)TNIV2>{_^(PX+~wGV?BqF`;_r84w{@f^$F%NIBUZzSoG#zRkv&h*5@tb8NL+8je&zZo z_e2uyEpRxPo{0jW23@4F(ZK6AQzb3h+tLMQXoJDTn7oVw@P;H1Bv%1 zHdj~{QV(VQ#x2y*;XZ)O01du+rX%e+zPvFK%F`5La+~AWD-0xlA4Z+mWklD=4+v_t zVZ)o)G`M%4wy3hVpy6shW=Gd!YH|^FP${20vY7=t#Wz&w+<68>YP@`(IuYxzoM3ow z=_9P&RwSn05?O7$NuxjH%3YslBM>{PQ$g-d*rSZIXKtqLlP?2 z^NyD#Q{d}Ai8VPY95&vVj=V-|iX9?Hc2>EUi;pv|#_{~AvmznU^ph6_sH~s}exj`M z=p88^WaSzK{ne}B`0s3Qe`iK~0}smrRnpUB?qU!q_EJzDb^#B1Fu%;w@Z(1Ozy=G@;{rt}LOG`|8fnIFOxqGPIaX8QK zk+|`!=noT`5^{dA5D@)hCR=RhU?ck@LPgea75i}NHYu>{sA|_~S&gZS6vn0JWYm$h zmp;uJXL%bTB1^HmIBeMdz`dzD1g?)^!&(OMCseHOry->VxW$eFvvp@4oLz-}Q)2f9iIEhht0Jne1oxP+KFI~OM=8US<_ z(1j-eENm`1QYRU^=l3l9w68ebm`TRvV6#9BzD}-q{6SEM8X+&!?%Po5v45`#=(AiB z_@He?7nVe$&(Sd?2l-^i#r5he=?~ivccSV)$s1Cy*1N8AS<$515VHEay%tJiwm(@$ zh0xahJ^=3$5)||rZeZ1X{=8h1S=1P;$%lpjyZI{NiaD1A#<`D`9sfltK_<7|A~OTSaEdz{UE?9@$QUDamZvKm3S5n(#=Aw%p`-)5zWDdI7p%Z?YR z{=2-5?`Jf(h)D3L{-5eL3G-E;|4N!~a`ApYP*T&so^l5C3;|EEkQ%vo@BHR3tmlI< z$KAU*Fo4k#clgY72`8{qc5Mjc9S`K{y_6P#`Bi8N&^jvDiOLrFv{<$imqkLND!}3QGC5gVhS2rNbQ70-%K30T_T37V4E@-tO)n$a$^; zPi)}g!`yUd#Z2lB$E9r&O?rX=V0v=zx6w|V@TJz-+0;FDJP3D`hYvZ{b2dJ(zmDBQ zKn_3b<`ni$nR2sv)sjpnRqK0QLdMXp5!fUO?$e{^NO#`G@2=t=9PIhFQb)!|3&Mal z1Yex)mG2cl_pto`n(QPXlfVa@t%ObeuM><>%Ym>7sFZ*w?>P}A9-cpU9S!*SJ;1(> zF*7^c8URrVw>CC3vioVOE$~S55oA>y5*cSza!5_jE({~#Vx?B4vrJtw>YAFgp2mDU zJT`C9s1U|J5W->{-s2<`e2w%;5Raw;9pD!XhKX1~wMzsq44is*Fz2^{z6$$YZ!?~n zn&doUQ_uzlP}3SOPW&odY735n3Z{l1l(Bey#vJ%hF0Gf=W{QdO@%aU~g|3!$$3{RqmAR{GZ7wQYSa-X9rr7d4Ff!Doib-d10EaEXIp0u>I zKzqKVRq^1DU}6-gAQ({JzoQu(4b~B#*O`&}{?kJ+v9F%I%qTx?O-S_xYT8BO7N{%0V=3hazs7$sYS7zqbb#g1*JrCx(b!m8d&(JH! z$Hf_e$~kolqYNU)O#EV3Pfw{d3u3kG+W=?h>~+SOQYoO=O~wrvzT6-!2CW3dm+J{( zPV>b;ABJ;# z0nw04=f^bm?+RxVnf#Cv1u_KQuP}gK8ccgO)z7`$J=tUPC73FP@&<@+(~~9(AQ!=E z4fYEKNrSj2wtXD9R)0c=k3#P(6z3Nf#w?B12ef6Foo#PgnwilHkA2!tn{jLVHVUgS z^=KIBR&uYiV)-@J-#Xy+Zx*i)LPLk?k=INiCkGZN!u>7|-~&DCE~!Jt9ujS=EQF%G ztjFYZwUgWT2O^}bQoRH`YzFs1nDE=FqYgP|oE7LGD39*WKZB%2CJ0kgT_>!0x(NV@ z^=u2)({&*#{oR?6$5SSv0Zr|@mM|(Ns{NC zp6$TAR#$ELN+hfaC}{Mta4IZjN`K54-!Dc1r<~35d}F$ zhrG2I4II%{u-%KBTtc$kqHl6BpIlNND24u{M?U%I0QJP9kEcZx+?OV;MV+>SfyGRU zPFb$N`j9_8aOMUXQ-Ihy8tFV$Fm1`f&^hh7U%<){Ezyg+sMOYk7)qca*YnUIZeiTt z;igLfW!wX>P&g;Z#guE2Fanv= z4fu=!?8{v>o|n9;coN5gma+&h_k8WHGoKLgJ@0&{M*Z3+rqYG=9X;m04%}nX)U2$n zYpV3beD7hfr{nP~p%GG7v6><(q`D1eH0j0Sp7kyZ6Ll4_5xqbB9YBHxFl0Mb6PGyw z*Z51mE_wnh;`b^HzDyjYv4m)^&N)_69z^D^^f} z9e@bk1Mf6Dk9Oy}>;zWQ;>U!pn!eYuP%cd9^jWDGE^%CyYFhmA*WgU!gHn`NHjIx9 z0bC5&GVbkz1>bY~r1{vIyhn7kr2elI3X!}7dP(@4NCmrjVOPubta@%Z%RYQ(lWCwoWs17@9E{ihGg5k z&<6axPlw++?U;9WBfTPqhdWlo3eIY#qLp`coe=jupncr#SQOQCB4jB_O z$?p8eyCuCqzzybPj#oct+rT64lW?~!J^-oFXbq>gKLW{r#}r~C6AC)Lg%=Nw$J0zzeSpF^#tJ3V)Wf2A;QiVD@HDLYOr}_ z1xM8J<(lPZ4RIIbe1g5yM-qwa(J0wSmx%=8Q|D!6ks|l|FX&zhn^Fdc?5Cz-4al+$ z!Bg( ziq%sqdrwbK;O-bCmtvMNC^q17=8=)&X{waydn9la>VDWN(16xG@&zS;-x}q2i0sSV z79_e`Q!=o?=zy-#?Ol%MgF%#+M?HLP-I{T+LsoYmlLvp*aM-zQx%Xq#eql3Q$I*mw zdlPfi1wu%2#Yu?m2>V@}& z%)ek9>Fo5rUMly3x5a)Ah#i4gsUgx%_U>N_zP z2e!v$zn7N>ska|;b+1pi0g(fsVmE$8jPs?5iJ$g|y}dnBdPTXIpJ+{{vZ3^M8|pD zSL}FQ4EZlx9~>2+oRZ*qH2t*gXi`nOa&u@FmEgG#t|fzkvTa%wF-M+r*0u*fxV3M? zZE!10Rvc?liHl!`^nu>tyDByT9E7-vN+&@1?hxMeoY*Guaxf&KqYnalWZ%sMFzn1u z)C-0n7Xu9$d42pf)r72u3IwlX97TynR=F% zJ`GSNQoQH>=Q>lBl-H!6?r3j+^~qyN$X)*7WKxy#?C>DLAo(;s%T6yTP$Wzqd#3rK zfDCvx%AIK6VO1p5l=|A}5Vf#hHWzmR4O$$MFa^%EAtDzs&S7yp*Tuy;%L)4dK*N3= zfCDLm-LSs?<~L1NC8mF#tMR_nk(K*DxR-YtxvkxR8}sV~q9tytar+)1mXb{8)n?Th zbnXQ4=I&=ZTIm6jZvff`@DwMJr-GtaG}Y9)0n(1=-~mm{_+hm+qkx5oq2(3d?@@$~ z_wFPoPrW~J<1sr*O#kxbOmx17cJDsOy8^%x0dJ)z5a{1x`*r;8J0OhVFBeY}14^1b zEd=9K6xfJbebvmm-@f|Wy*ePwCZ}v-4;fRo7|8#rbN()cY@JOxgo&|F5x;iWzuHCo zo%H}NPYb8p2V~%>f>`p`mercqZCv+APJ6cx>?pgD2d7wvlN-kzM&Og!5jYxsZR)F& zae5Cn1%Pi01vV|^W5u(%$HS8kxET)PrneYe`U>{temCH>_Pj9k%B7sF_7Vm5E zA;@iu+Rk0^y|dtuYIv#L7xQ>iJ{FjpaMGC@xX4`xgQ#`R(~jgJVaoX3i{FW*#d#`J z0<~_8UF-~~8Ccc83B<|jH#+N+{RVq&ub`B(KhAlrK#BObgvsY2Vq!NE`6sTX9|t4gVmn)wt?lxY$BLN>H#sy~E<`<&d)&0! z`ueP1_HInfG2Cq#&sfbdWnbC3m2Nx89u=x?>JSpT)(B)yFJrFF0Lux zu}u^BonZGM!GZ5EI`1p%=sO9zT@0ah^e$ zGU+mdUVz$A_7=Ryfvb0*Y-=DxyDMw&u%3TQ!@l*{J)>k>Cu6hQXo);@lWZ(2-o+bg zRd&M#h?`ju+{_Bc!TxlQxexC~f+%rA^>bWF*hgGL#5Vo;5dn`HM4$mh_gM~6i1qV=BT4xkqdlrdm{NR2)j3R3Lf;&?m~D_=)JWC+!mO|y&$>>)VU zFP%Q$$$z&;Zqy3Fn{9m*eeE!hoq#O?4%hhq_do9(ZC+(R`GPC$eIJo-7iQ@7{(OE? zoOeX9&F0u66T}(pFIDMPiJaRY`^)GO;57J@xnksxIZ^bu*k5@i?)_gMVtD!?IC0ef z`~VV+0QRqOF4+Cw{%@}p0$(P`DxUbFk`xmb z=r6W5X2=RFdS*ImeP=2}_Ppn)nz~Hzb)UTyutw>cZE;@76{nky=>0Z6*HhkNcDn5^ zk8B(=*;l}d67r8eED9`St|)R}8x*qc^qgG+HOc$UD%^QqUcAvYI@uhtfc<8pnv-1t!M-fcIj9;Z zN?mv>qo}T8X~eF5^O=TN<&tl2xpsVGD>bQf3xm&I#J@lMZMglx{HSK$>e%;&tNgx4 z&Mdc|z^u$gD(zsg4AYhaZAUDGo2F3vTS8H29GvLCu6*$)t(ctzoqc`Y(#%a~qrg}z z_?mBFcuFSv-K7*E|VYj%tn%d z(xes?jDL%>g*D~ECLF#Wol2~l+>@pK%{~8bE$;uS9G$a@PV=%2SJ8oh&zApV3?`117C>Xn>LDEdOao+i# zUm$}rQn({L9E%~yyC+$wXkz@!N;*5v#k+jgXL3f!$*_EzyZ)W zY20A_A$`oIZ)#ZwP{DCsCkvFWzXwsKbXUk z!Zr-}aPT57$U*aZLpSX9xYB*-DZ5`vtrHlumOgzqsFW2@gg<5^TNJGV_8c8QpXcoh z?<}5egST@i2jhn%kOe>aB!N@&W7yYDzUA1SKCfK~6*b&*2<~*!`t`8TYWSPVN|I-4 zV}7U7R}z5|Sji%{6>Fy@&QCTi9@@fWozy!Y?KHkEEhrF6q(o~?X3cqCs+^kL&qu;oSKDybNVvLwf}fNu=UF2_qA(@p2RI}n83b; zWtEP4Pu1#b(mAS2n9RD`_lNyrFt?ABdLb!mlHu={?JI>Saan4-FwbPnS6cJ7f96}3 zGCAM1=m9>}kG?ey7SV!q#xGYs@bsr1JYGqq`&oY}X83c)mlqN|RE_zbnTHJ|+maIA zihm2X-z*Wxy`@0%)8-H}tV9MO+|Y8eP3C(So`EQ4E)YDJ;9lLlq+0M%cyYqDZ`iZr zZKE#q+SMOnyTgE4un7&jTFp?x{U$SWYxnX8hoWx1m!3E6Q>A2NWVreshwrAGr%mbm zPXE$KQU?9r;-M#FWCKK@pinZJ?3#Q)H<#G3G)2ozn&$smjEK{!{Wq!K9x0*A2JWGM z#`{>aCVlM~-q6sor7jrMBk-mGqy7EdnztdM&sT_@BF2aw+r+{Sv(VlWL;J zt0-Rf;h7vIqD=t~jhj}U4!O2XMTYatG)T&&Ylg~lS1w1RKinP1r1LmRytn>P+A^6o zK|KCTFZ_RY-f8z)k*yKncE!O~2M0z>Xhr5`vH8A5d8f8qlM}@0Gwv2`d^pWgNU3bZ zXwuEbqQwU_qxC!}sN+?~$vZHzL{ti?TB5J2OQ2Tm`jPYJ#Y7Fc?+Az7#%-rUwpG$d zN159O;h%ck?=#OQU8&rzuU~#~&^S9YquBIFlb(bHyOMY<5wJ(vB6cny`KmiTK~58A z)j+!th|9ZJ=u!2Z1g?<%t=qabmbW!PoU5bk+}0dm%Uzr_qZ?$O6jVej!O~vdJ%~5r ztf_eF%8NRjn33pC#5jLHEDQW8J+sf2KfI`$V!(OJ@1*fh`|REZyd z;6t^nJ)vNyQm1a@4AjcjC#SK%PTfnOJG$QcF=WYYGhIG==x{;ycx7EZUbOv}uQ(}A zH|pOXb%aby{~T;5HV&LwOJZA3i**~piD?2NblG^?`7_Pz$W=^;%y3fUfo=s8CwFhQ z1N*qZ;GUH=!@S0hGDlts|At1}RQi{dGoPI-_Wkw~RU@u^3$Av0s+9LDnVCjYpyq|l z+QULpk%CBrTn}xY?-}&;`6rLt1sOfA*9`QuTOp1mixRCYl z2e^@wOazBZxxznisM!{qeRL5Zf4WRKq!g9#UlTTome?)y(MqbInd%4vPk~T27BcXU zwesg`8U*qp2>XscHRb4VV zE{`)P*dM$Nd6K4^XF9dSXYLBye`JrqE=g=Q^48}uTgh>s<~rXZ86%@dPPvGhg|Wl; zq@luFMMbSG@|S;AGGn&FqBuQVi!B3HS9J;7tKNa#qY{YO2`3Pg zFx865-TK(1>TG)kr-2TnroW$KsYKtlZ9-F^>>iWVr~`)8<)VDI=>}FUi6y9QDfjtx zY~oR8M4Z65&G#O^kIU3PPLr4!ZjMW=_(Ve%S~Fx?Vbzx-j@zh|`#?ABDoSEi@bb6B zudYO_F>UNXQ@X3Tln`|%f)7Qn^*vEh$as7GD^wJOeKEh4_a3iklsXd9{ESwg&dDS) z=&!$9pgs-N1uqa{eM2;Y=wAsNPDKee;K)_0`b(o1ag69Q>t|#R~*`-WMBhO_V%mi87 zDpn(Z$+sY@+!69jUl4zEEoip0LYqCz@ib&%2feq5p0s5ZIkIBl{C&V_r#Nt4a)f=1 z0_WZ*+rQjNLp6gL>+rJGZ%jdi3!C~gIcRK@~}`xd(UEEa1cca*z^fac&}auf;-0V zSA?#!-EPGVqmam$ZDeAyY!n)-&BCQ%kY?5-(nO;IU^bw2>OD7xj7evfv zA=9r4a-4p9dzW~ihK)d5F>44gG9>*j{7RQikO%I_eRv?L^~U|*HKjyluQjliehBjS z`IawVdn#69g7v_jK*lyMDpY<#gLLL_7)D<<&IrF&5d8(*UIby-;0oqGaQSd9bsHtN zxwG!nz1M|y+Xm^o)Z}9`aJM^0^}qWr@j0g0VKdIx7gnM;QAuhb@rar0Z1b zkWX+9V71F{J+jboCUmky^9hCe1?d}kui|8nuc zT2pVvGxXcGI5Tr|&HNX?qBspzc?^C8079V|;46-3^q0Hj(UfCi%qa_ahJ*&tNH#tDC{n2m!12vL0p! z824qDU}Av#3cE&*-qu1t=qIXTKvSDd+G4a)yWoAcviY&4^t2^WE1>@4);FIZx64V zqxV{N<5POe#%!nBSGbVYQ{7O(cu~e~$g=wSNp+*$)X1Zlnf{L&3&=wv`H=3-k4J@v zcVTUnJf>4~)AUh@yK+cxVh{H&uHmfR>{ zR3M?N>5kz}P^x@3I1yu>rIeeQ*%C%>Qtg&Kgr!(~OQoaJlPAM+#&jxij!chnyKWyNE8< z2sILc3c70e^Co~(KYf)ve28a47I>LWxiXr=L{rzkh4*RQrC=klj2wME>Oqeqk$x~= zKZusUwcy&A<_HMUmeaW}yIH0Tr*PhTV?z*F%r$Wa!B9C@bl+|DY#mF!?^E;Vzkqu& zhH`5rJ{PQ)W0Ch$-|R$q9i_?cw_JzW4zO%B(mp?b zDIV?Gy()Hu7MtTOkqmqyv%3dtPikWll+kY~{n7v6bo%a9HDJR_6q@k!`R>IG)d%w6 zK+KJ}o zp>oWNcHI=Qiz_-_O)@DryM^DKW%&7qU=m8AB##uR#2x3V0> zH4qVhNl)WkoB)r{UDa%R$Y}7$aJE-Ho8X}bR82bMLe?B1 zzOx$8@m7{S8AWJ_*io_UZS2Vkepdb`It)XOf0SP4Mjaa;Z4y}TlVy9L#gKcO$L=eL z;}s6w;&JzA^hB5}yHaji+Rr57sH%0FYN{{jtNRwPSMC_x3U3V^ zb-nfGaLn`t4(|PviYiGo+Jt@Iu_q1V>~J-j&oYL~(lDHm`v=uM(^d%alUvYun{k(i zJgkW`f^@-VBFcYazovY84LS--osHq(abgHL`Lmf@2|_eqwVhanOz*1%_-W zx(ZK~WkDlD6Ue+}S%K>K5sYgSSacc1UdS&higl|5TU(cf&uZueu7SM^W(Ta*5zl?g z(SYZQvn~9i7DpY;dLQCl!=bDNnR_xwO~5F|Vcy%tv|ky5U=C)aB5lMUGLL81$(5&O-!dC+wCiJF^$Q4=UbqzNfpl zSMwKuw*pssOR++;84c(c>EPT~Kf`Zx=vEF{Zyh#sw`nBb65*p*{+!+jw8Mx=zB=gh z@bO7=z8rc>nL+MnNC;28grkhj(bGUX8HkZ>&ULe#KXzmWBd^jZ3}#Dq`_s9_Pa3ae zl72bAReQ7qjTa`@7m82c15sM}j08ASRHjeXz22+P&GAI{KkD*nX7&f!@k7%stINFZ zM!JXZ5mx&x}WBQosi}8U|lruBX{MeMqQ>qj<{Z)ib7+91{cU0 z<_1`D%sQEn+Yev9%2EE@v2t4^LM21q*zef+PV}4yKQC`ugLHbbmKFKiXmnODULEG& zABW2Rph;8br8DOKSESbQfo{gI;q(37bokNi=*Pq1l;gc|8JGfH;g%m_(#)RU}PkBQT7r$XEc-YJn2j}qYZwW5hxn}HPW@m$Ozgz1GeA?!^H;oS{Z=Zbb15jwd`#nkd zYa3ryC}R4-i*g*ea6?A7<|JL(3L_v<3PCiGK0M_V5f9k0q+RbD7TGz3Cy+;vlpPuAUUB zduV#u@8UP2|L4cCksLZV;U_RBeNG5SSH0frak&v*-0;}3Wz}~1xN0B6wqLbo>UeMb zt(dDvleLhkJE}}D!KtYpzPdQN*A73H#77>dD^wl_lKFO%OB_D?TcO>dEC}pF@N-Y` z`=AAON+zGlszer5dM4)iTs!Pvwckc*|298rJg5rpqY(u@W|y9L7R}+@RU65O?GY}S z>gBTOvJa4VrAq@p>F`bD60T9*P__SC;rz>>@oAIj)$6yvkM;AI(sH%k?27)~mob86 zrRE}sf#K6LA+VybQ0z=9v)K#V)hF2~M6?Fiwm^zV)XK}nmS6@yzXDQwai?G`2`%4) z&}rG}VaRByV>;83J-s+m7uP88pgC-QvoTKyM0nMbh3$(oa{J*A0fPRoLG_nuzPA8W0ydDV>dxunO^cww)C1Iya1Zk*~G8BHO3Xqa9F;Kp)mgBoNh4FN3{Ws_9OS0eV{RnZhZTmrfx5n<(70}B1Mv)<2VKG zw--{0z0zRi?OpgiQWmH-L-<+C(^;kJBaf%L*A8vfZxc_6X&K$(2X{NL1ou0lV9l#O z3n(ajCjur@@HOMexe`-s*W3&)dFlN>Fn8TrVugAaET&jB@+lQVZ>bqMm8?8*fOVS2 zqFIy?G0NIf-(<}B)>a?Yp?M{j2u&4jSZ^fg%a zxo$>_HskR;3GU&al2yvY)+YaFC@bxz8o_|&W>w|r*IEH9X43?Zo(QVjYqMFUb1ddJ z9^gtyU1sdc9Z=_B0ovjlfd9uBVgYz{0E@$-{Hn&PY>{uOICsLwufR`rMpzoxwIHe^ zL#JZTkJc*Zd8CeOTG;q?)_bT;>!NR|iL%t~sza{xnS4}J3T|Ot^}PNxB_F+*RDRmf zG({%@g(-7qYHf#5sx)3l)ymITD}K@3S5-I6S(4cJY*&Z>7)kDD=Og-%TF3cw6N`7p zdME#jzWLtlUZTCWs>PzwrN+1Kcu=wmhS8&q7c0zJNXk}TREZs}hTN8mdiQ+pm!`FL zu>)C!=S?tat<+Aji%TV)0m9~K;EqzajEw2ps=3UX=nfy6;64dfcHAh-gw<{M>StzM z*V&(=Z!WCDRCjFuPjlz}$oAg<{f^T`aXP3P%{f(76h&1-(b_v!?7g=dLCp@TR#ff1 zcTpo&jFyrjLG7)C*wm^W_d9LR>2p?>m3MC!f!IzQ*JAe05YvN!|2~>$yuT zrpedhyEc={bT-_IGHU-y#F&D$%M{>1wbS&gkR(SiWc0U>6 z{XObJ^8Idi51>p3^Gsh{SQwL%1*zUyW20~r`(!kaw;p4FOx_^+#rJ6AFVn>Z{oo63 zjozWwaiKTQjk@cRp57QJDj6(Lrr&j;dhqor>UU$|^(HD2TW(MUq0$bL+h{yeP|c$c zu93G{F=Ah);yBlpcJ9(m%VYPh(POh>^oI)qY3TatG}AW9s1oKi^s$2yiGDHl%ycQ8_vlL>^mU6Y2@7W~PGL-I+eNb2YqWNH{*} z)SkL|uu1VvgCZ#=RJ?faJ-YO|xPgGO2VMKF`pY?d4nOCDsHM5j0UiQ6Ia{W`$-1!j z`j%vs%QGk8i(nRK|29%kYK;sr>GC~d3CO%4jz772Agh!(X_Bqc>M&DPxK3P%AXx>< zpMm`%U9++vvPrto-30N1<9*d>oMCR)#$CzH!hyfqlf&M?r%A1!JJ6mR)M{&^(`R402IN}$W~Ij& z!sMM>u^uT7My(>}b3fcMz)Z5H9>4hyldVSY+E;@6$CFeK?wEdhO-559$spijxjFZF z@q9O z?xqKGu7?XKNtkJ?nDSxx+{-RA9ckwfkYs~i<6zTq>RoH53yT#%tnKPf^tBDgAQwVAjqgoRqU z^!i~Y>pEABCqVzQw1Q{r0hEl^m*7)64zp%eZ%@p4{rmnhc0MSZu=iZXt@O>z?BK_| zEiy?4+;sKq&J2I&Z9-UphXwgM2UDt6g0NRDh=Z-697KbSB(sf<|>O-4??=GFoGr^TAu{dxDRc5ZT$N$bA`mTAM zaPnr(UD4Tb8+qy7(Ct0*C|-&DBHE*uG$!rQ9At7tM+q^C32zEbhf28{w`N1Tq`}@P z1@cJ`F+_#D5aW%WMIBwmht?s&-C0MMjl>ZV_}fCEGU*OxpBDNGK(KmA51HLabPgOJ zGQMPH>38X-eAPmJL3(8dHVpVy?{^#jGL|{uwn&2~ogYN(?<-}CjE}iVez$Iu300fG z(%f7KLvws`t1Z}QHQI03*U6*LSNjqoXRhgal3#@zQqALhpk}1=*dRXtjxctUI+&u> zGzY)U!P;B!k)Z)tqZM^Bkq&6T0J+a{pTzV&Cc4;nrB^!iW!arX?l%SyG@L!x@943m+qbUy_e z4kZPYpg#|8Pyx{?VOpMNhFGplSD)Y8TFi)j#S;@6JmS!xx4aXzBx!n9+ko!n&B^q} z=uvPp7%hy?1t||y9B9Fp?#kUUYV^}Lc@Rfesageuob&`9K~+sFtg3eSql}4plC;BB zveC58PzUi>@hahRrYs1bC0+-IlABVhnXBRK>|Hib$C<_|tZc_pdTRtEhQBOxpff5J zeA;%qsm-~YENd{h>e>_~G@pou z+UpcwW*W8061TYrBm-F+V?4CTaUWoT`fkgneLTUs;`G(2@g#>%wFk7oj^jm-z=&hf zF~nJ9Q=vn$Yc-%pNK~$5Wjo3qIbz>%Wov2d0qR}&w%@r+x@$uWY?_^9?@m>>09_zX zjsuUh1#Kp41!$HXPt<||cMNC!istfJ#>>uKSeC8&LKH)C$Gb**`nK|?uhzkQeCp-J zwrwuza}fG<9K1U{$4yMC@;_zwv1=5m)!VJSWy?~KS12`3Z;**hJ!s*}f7xjNIecJ= z)gq|(RZUkp+Ql*1ed-*FW?8XlAs#Y=cA4}Z2xd?y{J_AJ*9FHmK?Dp$$J!_t^BY zI*5N}Y#^2)o+m6J;GL9#%=jO+%hvW8t{w5TPjfIgSC}vd)jmy0{|%nGP^T3bmE})p2?Bp95=vu<$`2CoX$5A+uT`5+Almz!in-+eW(>LrriGTQKus4ID&v(s9R3aYUs29 z>1&PC$CUU;xeFJxE{M5(% zc1`6pPY=B&q@7eFeq17(&S+eUcY=c<%7~i7SHp-Ye9k5MwpRMF$!-gi(`K{=CnzMV z#Gle_?+PgK#HZ)^*TwRAa*pw;L1-#oi*Gm(ZPzzdS#unnqgzC{eo}t-)Jl!y)ooaDe>VZJ5HQ*=jR21qV5fh9dK_g zByIO|CMY))W~V~r&a~aZM4*E;3*Qo|;+lbQ)!K0x|23oRuQJZ>57!@aja+)5+pm`! zGsFNJ(-~zKAh%Iay&OlBW#dg0@DH3;8!^2J!>Bb1NTI%`za>eIrF|ph%u{O;Af7QY z1G0E_I07)6aAbFrJy)P+FDYXRy=j`r&|1QvbZZTDPswIN~(_`m=;OG9fVW?k%cQ?5_TAqKiMA6{J+g3mcq~l`MGY zc7=v-;&Bs2wAza_ja!X0*Ri*Hr={>NFBU&gm10|#DX8NULBFB>g$vEu(v}^1m;4cH z9y%G4qn|t;SNj)E!zFMFWxZWphAkeO*M_Vu#ZovI8|l#kNxk!I_d?sw)AQfe<}bab z`{-Gt6(T}Fgzmtua*U9_m3m=s+>=77%p+{+exq=AklIt+!*vlz?x9n?i~5+fqKWiE zC6NAkf0Wi-|1xjFCR{t8dr?n)fCxL)TA7jfAJ>y1a^h&UxM9!SBD14Wz5Hme46pny z4}F`7cf`0?h0xhKxE`Mo-`{qbkFCBm^{ zFvalGSBK~B#Z4MEuE|+HI-Yfu{?uBU6mI2+$A|L@F9zE0-XPvTrbbNyPR2L~%Axl5 zPI`2cE8`@qd)G$Q)0I_gVxug;yqE=7dhurb;b1CAU;mic{#1RA2@`6LBj66*8k7DA z+@~lA=PKU;cHNY~Z&)YpRBih{lo?UYa>jqblt$W<8=5M=VrW^Vbz#c*HZHn1!?SU6J?&-vG-)m7h4_Wq_7`WT$w zt*Eb!6h&ur3iN&Of94m(0`tE)>tv9E@X9I+rrZ`=QCk z6S7IA>jT9G4v-s0{(P8oxCZ*lCcoAy) zK3X1;5bNb(zM#)qbAy%H;p|eF^o$IqM1~0J`G*q3O*k`8eU!;~P1l{vA-uvrkd5_#Phdpr)jW6`O{C~{gxCE{09(LW9>Qri1$oHupI~+d`a3%1Yh1V{Xwqv(AFWGQhA98=wYh;mh{gej5JbEJ`#p9AU z9ynEhHjhWHpVN8Q=_Mxif;l45zs+^P9MWLjY7<7(~KIyYv1wMU2I zS%u$}zRd^n{3HX#2<}cPYfyUq1KbFP|G>H%8ABv|O~{Gj-I~x@7;s6z_id0wYyd0R zjglMzT4~Ql)vn8k@EfOr_1TEj7Arw zrG}hW`rqw%@0Wi^)f*X#(}nr*+hKNI1Eh#So7ACHEdEvmh)E}Db7LYps>-KxxK^Lk z?fc3d5SH;H+F_j|RTF}wQ3m*11`D_2=A3d2Ty;~xhrKT%lf7+}HfGhBui9>pUx4oUJBVC<+~MFX`4q zG;U!7;5jsZ*h0=xy!GqJVVm^O=k;yM`&#wt_6_4B-GC*0wp+t8JiyUFmAdN!h49V)3H(?d7K>2BD%9;i@PNH#6 zoWAB6B4Yf_r+Tze)E+1WT0XqaGjKo;by>5^}vM%mZprFN}r4h?C7}paX8GpX-_5RvtQNJ^;_~F z(I2JZHFkqKL<`l}!e>Y^0&H`4YhEky=;Z7BSTF&-J`0}VK`9T7>d?=x-4#uc%+SPV zf#J8oF?(cScT4Uh9Iv}6QdD<3R{_P~dO6vAGfB4NVX;9CPfp2zgPC-%g!sG)Y<>C1 z)&2O|udJgv(s%bvG3BAS+%4>yb6?Kl(U)kdqeqc}dkJ?i$~Q^bt;11;_wBU->-SvhEet*=KsJ3 ziCdcP%U|eUh|s@u%u}blKcA^n!qT_KbYuedSrp-Nq@S*QDxW;87j_S+V($?Qa{i6$^O0iM?3` zj410R=Yzye3ym^!hO}p-*lJEn0$ybJsK%{j^=OFQQ(v%TaW28eBhk?TnKH+X$=a`A z^q6{x>EWsarIs42?h8rq>DiSqHv}RS0Bhg}3b;#396?wL;6^THLL{)ZpZ&?@VrfRO z++fEAXlRy5pfV4@cIjeP&Z&k0#E?$ds|rc#&n5v>NZJ^9%|nJ6xQ#z5@Q;jzd%{S!Ugz$`Konn23Z0& zU{^uL?qJoO9RRO{ZwZC$4`OWBSriiodwZv^d(15@>7uNo1h%;IFXGaga~0@g6;SKT z94pBgjU(2Y)PJq@|B@cH*Bj5D?allR&=+Tun12o$FrVfWz7D{yjencMz9>FStzPys z%Z>+p-vCT#dwt>_>1q}fyv)6x$+1Kxy%OPpGuUEgU0mIfh6bmUl zNq$GQ4=L1)b*$q9d$TU}J#XiOj04c7h%Xll(5M0&=tIe9Lo0K{F9XG2=|{=kAThSG z;M3;1&jB??3taq6H}hH!ug}5GDRP>*5SP~vn0PUO2NQ9cmOiy}Nh3S^)2XdkJPCab zKk=4Np~*S?Z=`V_QQSlas2kNVuuP8VNd=IP99l^c&#;mFE2l(;WqU#5MZsLA0)>+A8dp;$yW6x^I#0-ssW6xCIBe- z80mL_i9hvL58a;?jEAv2kV-34CBz!ax$t5#q#4nh;k!4(Pt*q+?>+cZkt&?{ik<+}isJWZp3O-29sGzlFg95>uYtus%zL?>?pPs%)GuD z!gbL4s97^1Y7MkPIWI%obH%``gr|u^@B#R8Fby!yVD;L^f!6>V7d~Mpm%QauZSZW# z=ySS68`rW_jEK+7*%)cDECH?sI8A5s)hm}+6d8C-rGaP|uPV7^G}a37=(u@>V)BEbEKjBEA78=w`Nh>z zg#Scwa7=k(fxhX9s5N@eiUVFT~@==>| zL=Z72K}q0ulKQV)KjNGaYJa-Zz>B?L8_BUTpC)`@fM9>vJpXwQtngN^lzr#S{s#8)Kn<009D|!fU_!3u8f|ZKH&USryd3V>diRbc-RbR<%-@M8qA+w9;rmT zq)3M=S!kPE6E!)tZZ5^VUS`YO;c{$L^5^ik(p7x-k~Sp>;usA@?c5R^}hJM z?f{(eQizLdz94k4NJz?A7Yt*;A@E9GCV>E%UwdoDvvZ7op3Q?0sEe!m*i7RWQfVSs zlZR~#A|T-he!E70u}}YPQaPM;6Yq~feam=1fa-(ofrcmen1GlSp;E62n`K$TN=PvH zGs>$xHxOZ$n|z)-0gnwFUEk0#9(s}QY3wU2E5Y?qTJ+9cE6&;rctri8#e^!-l?`tI zRb6mz;=!)K*M=K$vb*?7)3n(Y)vqD6+@eDHF<@r57eeUCNYHd~ z=UgO1>9QD_=X6~pT?N8Vr4&O~Fa$xk1jX%gyq)1a_vW*Vxk2olwuSate}8f|fC|5V z?rXsxpx1x9jOdCKXC&#+{Gy+FdtpQmyxo;`Nc!_IgzV%Cw#} z-cI$p`=@}ah#Dd-Txvhc#t_i!%HhqHqLCqz1q{^8N5@j1u}<*QG7F6@Ckw^3Dk7eL zuHX$)&JI(?e}>SiS?6RgaFU-s^S$B;!!XeBgSk|qAn~79ywYcCKm9~5pM!Jo2mK4e z(bqRIVlyitCy$ALuU3ZqAm5IqlIkqq|Gn5HagO1e7{`|5sZ{?e{P9nswzmk%2}B4E z8VQHKC9Yw9yp+ehNfkl=sNMYa%xoMGP^te}(EWW5{=X-1|DWQ&|Cc|P0Ifc@K$nzY zgM*RcQMZYFIF%esWGiyhAxyaD;MtiQ)U1ExKmUDU_8*)liD4l9_#OesI^Plr+xg;q zGbRU2R`%=c*e=$ji%_iHmIAU0BsaD=uRe4*nr zixz1xU3QMi3+g)@zQmzi1_*1Ccl56cPd{EXO*_(a`qPX2Sp3m^&&1(UL;aiw5Gae0 zQWrTqh^a>{w@JV#HY%!Qpl^bRhZ-sH!Musuq8*c*@p_BH4@dWW75;M=z{dL_$dOAk za}Bzls!iB=4egXoIUKkG1oL7S*}iN=aLJncdm@uOJQttg4aU57@*S4w(7ETF8Pa?> z|F;(f5=r_HBB8i`Gvmd!gV&6Xh@I!&u1Pl+GEui7N6cd`$By(ke1SISQ9zQ(6}~4F z(#{8<{ZafTv)oGPdO;fCK6AP1BzMow{BuP5?)~tej_pCcO_40rdtdVMu?#8P-h2Ip z0OHYE-UK?6ecjz}tR>mYKvP)Il6T+}gPu9o@kh1ke}Mg`p(ooId>=Ol0cLdmE$GBb zdHK$&&KaXY#DJo@;^Zb?8l)7`pWY$XCg1^OLI;l=DgY4-)IaF+(?1VJ@G#7GR3(Q@ zyua)XNw`GDf2hW(?k1DBa;)z-&JnH*%2YLskQvthU?cxJ1x%u1}v1C@fRYM5JjjO8L^xp;%j6td93fYv!Ns z3rD4@NJ#QBoIZ;P-{Sf$7xF_p?e98^zr?xr8W|w{UsYML;iM@Ir@zKp0DRcxE?s2r z;0|N6c#FLX!P0ZPAB`1G)zBL#J5iUBVPbQf(bAScxgU*4&8%*P8mPwD8nMSKljN zCaZ=f(DN4Xo1iq zJHFH4qg4Xs1gL9E{Fss^Cu5Xsn?_z^`hheJVQl1<7V@p^bYsFchp4k|_@vVE<@BJo zHS(6a^uD1DLI+$^N-ChUg!@%4A8&C}&pawm^;Dzdp6ctn_nJKi^m%$F!iE&tmXsBu zcIZ#%Q~%e4@sT1Z2cYuZ&{)9Bi3sGLtkdpTWbrLK>`EYQ8iRNP_c`&&R5NGq;aif-jUC-b|UfnP5BVI)D7uAEk{E(7e*J4H{X__2vLA zm15!4@;B&L?s4qPLQ^0uKWsiKdWH>E@A9QUx|Ja*i33LixPP|3yg2`56WQ~E43ba< ztHkJxU0Zv5%5B4v?4ZfcUUU7qyG<0DN(%qjzqmiRF=(=?kI>f|f|B)x-z8lhnr${y zIr)4uFi?Y4%3YnA6KPt8E z!@$rstS_Q%KkQVJv44!J^~JLb>~x1wBK5!x3+KRqwh_ThEC^j@XI&n#{)0I{Lo90g zW!q&wk?fn-#YK7>de+b!lz#VKUg z_WTsNuCBy1D6$8|gP^(%0;CP9kCy+GS)urD*{TKeS^&}KE9br>AHVm#MoC6OQM^dh H@cI7%+3xD3 diff --git a/windows/deployment/windows-autopilot/images/wg05.png b/windows/deployment/windows-autopilot/images/wg05.png index eeb5a9beb872a64d5c7a4ed78240c14b752ba560..cea36fb6bd9182ecd9686bd0fa066f5747b6a04c 100644 GIT binary patch literal 133517 zcmZ^~2Q*xN^gS9aN}@y$29ppyQuJXkB3kq^x*(!Q^j@QjA!<=yY^|K57<{nvYUEsL33+;#6c`<%1){={f$C{a?dP~5t8i&91Th0d*8#NM}V z5w4Qm2EK`ipZNv+B5>DHg59bdX4?Wj5ZlVD%ip?HlW^zKk_7ln{$AP0{njn2?*D!W zP%g!9Zr!>mPXOzlK zANBty8cIw?!`XJSpd1k%&LwxN=9hSfsQ+%=Fh+7?flK^kA>3%>5c<4sGGpd>o$biN zg-qQ>y}MEEn}H;5wKT#1`ws)dfmMzF=NJET$Pk6#7tH^DXzd%LQ0`>N|9$TNbv1$N zH*P%tudDvI$A%>B(I?2w#p2Dg|9vyQ*O31hNyl`scylfO@PFI#A}r6o7$&VExZST0 zb8eccWiLmswk>YlI0E)U|6ZLej`aU;n;}Ar{kFzBaIvQMBC1D*B`Uajh^Ny_hCbr2 z&!qmYYFEyybepxV+-^SBeD&U?LyNtTq%h8&UzC`B2!RJe?<28Cu)yOmC<~1U7 zbneM*Kbd#F0Wgax%ZD#hz2cV4Wu3yQ18-=kw;mugp3KHGi?)!Vl$lYEp#e`{BG|_{ ziP?tE3j##U)JT`zUdG=Su-t*mUwOSwhwi(=)E%L)i1qshuQ%VHCkJez&PO-!OIls` zplr~WPu`pwiofZRsN&eT&9o)oUHbGr?~()u!ks7};3o|SMPKVRbVqo}XUgS$G#x+x zR!!J7$?d!Q%+h_7M@v7!;RGKd!~O)Z`Q6O}v3D~o`py^4lJg-Psh?Ggs>sy*73 zxvun)1m{%#+(sepI`ouLJmT9E}}^Q4chuvVh1{GXD2X!x6fuIJ(SwRJG6u1nb4Sei+~}<13_V}l zZ(V_4{v7mFt$ke#Cq_a}kT4dqU#$ROdKx(m%!JLyh=R8MJT~ zi@v9fd{p5TfkydkWO-wjd*dQ@Ecex8|JuvpHe<6yI`_3BXdxuXhdsk&Q@C(&<-B&A z>4lOKkHzQb&kX2~I3)Vpj#P!Gif%Zkf=9J(V31!OJydjVO81o0<<<>#l#XnqX(Ut+ z^2gCH5Hx}*_d01MRHw-ZR(KSh42s%I)d)dvZ@;Lr?B$U*oyq*(CnWJQU`5Z4y&?)9w^D<6fmE+gk#7#Wfr0cuD~v(WM5S=*mEkD?eWb$ zxLYv{clWzfKPVbRRzQq={(>xf^syT5F6+95A2+m?!2a3nNezwEL$K4!2njzGQn_~G zh46fAW(m;!*RXduF zA4{ZK(?wbjp7QK&-!i(_Pd-T2o;F(Y$d|BRpojEqtLV@54<9==H^qyQKF5NHelTMA zD-X9%__zHfpZ?66L{SR2B@nqJwZTI6GyROg>~kKBU2R8i+1S99&Hb)pouA{B2)^1K zq}*G9SecV&i9{$CZ+QR>9vm18Ytk5`s0#@f@OoE zKqu#t=0Z_(0cX$Ic0I`9ndV7c--<_hlb3px@`miNqxR6`gqsyBc=R$uBTL+I%13vX zGEnjnkXBpMg~~F|v6#mv40*bX#x^Aj>vdv^4Z{f=%f4cb!h9kfLOdEpT0_TutS-&I zhwI3QJ4_S<-Ky*c`-WjWD!8A71uBRH{s&eYtDh?8W6EdmZ_a`ix*LLhd=4TcA6hHQ zkC+Ey+=Y+c%Unx0v+-&)IxCM!qpRorz8FK?M4^Lh}8(&ZSw zeh|s(@N2Lqr(3`ePVcT#P}N~>;xn3O-H%S+|6si}kj&{V!ajyxMbJopKq*V=RF+TY zz8cGmz}$cKv4!S#n607w!QBs|`^-yoB%D5kp)|@MZZCRO9B*g$P{6A_Udh)3VbhGu zo277EG{-Sv8s^@qMEG#@Qa3l3OqWGBY?I!S^Bq62nzNlrTy;oWP`QS-fLUbBie3fH z_n;%kdtut`94fje^vFC{GoeEICYmYdQ*=6-n> z-z9x*SkX^I^6pYls~gWF?;UJb+77dy&XYI5eun(d0S{q>aA z_M1a=m`vmYjk3qXbVb%}B%X0s<-yP!`}_mC^~0P>xR5_v)0UxacS=r!QI6hhWWxd9 z(IsEGCV&00F|Y5oM1L~P#>dM(9cNob!yKRj{2S6zyHcjMB0sdo9z$)ff->W457i!;Sq7=ngmG8HA*z(>8r0h)5~(Gtai&*t5OBz9 zZ{e+Wj0h1-Iy+oQuLxBGEy?`eHCz7pW%-l`c1g)HP#1_0J2O#d&r+V%$YN)`HuZEV z4g)&KsrF052HnbqPz;{|cGK2K;pIpC%G2^}Z7bXU=zS;@N+X>JQ2_h(L5u<)_E7bx zbGoKXhxXL04u|B@y_oW*3D@9^Hmn&B-m~Md?bR@Bql?bRj?|`LV#u=(k_ExO(WK8% zNf6lasg`o+gUTL_h-&iOK5M=0{X46}#rL`ck>L;X1Gp1YFa)Z5yd`-r5+-Y6qaT?6 zq!r4D&kz zc;(w)q?)oagw}_==DK>(ao!w}BoRCPb|j&4@{hzDN_((Z_>VvO5K3|otAq4wQ*y9B zXE+5f^7-ruc{rkS0ZebD)Ss1T5XKWy9}NDUlP~)r`;g!$G`;#f|T<9iCWNeDL1#w9fRs^&`x+%y~cW<`V%7nkF z!N}~RVU@kJnrS4ysvu6mu}NxMq1gFVfxhjy0aFy?CUB8{WS#KAPglE84NK2(frB&nx47L&;ev4wA&_&e-?zYmUHu!q;gnbYU+&tR@vCTb$~$IhtFm z0H-(6l}8^6kHXp@9JLEIZ)v5mTd;q;xWO?=&h9Y$|t; z^artnX|C5JnQh12rv&+anT%Ocv=AGN0vy-Rg;fZ=FQiaI>c;aUpI#g^*8BVOsK(ER z*F2jP$^fYLPp8$EnQvP;GuCJv8WpQ!CC0X2Mr7)mo-|YD-oQBYZkDwP#5e<>P@ z)NJuv)38BPEj5>>LKJ@S7{T_cYhOZ9{L1$^V4HGdn+{(i1-x`tH4Hl+p2g||H+*29 zX4KX_2qJsb4>I^Chuc$0qk(jj6Qy9ti4%hD@`Eo8X<GWjSUam){AAb*! zX_QH$vDIO^Y|D1tnS02U5K1d0#!i+)fmHAZdwQS|m4EqEGFdD?_}q1&3wx;$o$(Ar zlPtk9<W~%wo_BMFTDPrHBT$XXcu z+bl9tPQol*REYf9*M9NC!PdvHp_|7@3GcB>6)@Wn{QC9(D)gQ1^A_(ly|%FCKFFf& znWB!JwsDugf4Pvl4^&CJh#wRzWkVP{sm_+i69s6giC_Il*P!4w(#`km0A*TuVyoKq zd#G}A!ilu?r)8@7d}=-pfGClC{LPZjjsywxT@>t_8;b6z=g;T8JbmB_n8 zo~wYY@Cm;DEIogb3g>D+|GI`_iPdpIZts_;E7PeEed2^l%>Jm1_o<*7IlH_(t{=++ z#9S%J<6OnS5UC6HI(l9n`SJ|An+?GGo@UmfPH zI^6#h^s0~el}e9~%p3VZ#%N;LnCbz&4HI}ZzDM0I2DA)TH=G!WvUls9i&yVw2%hI% zdH|MkpBHIH>{-8h(ZYP(oa#g3)^; zkhBRtau(Phcrqku(jA+{7tWX9`C4dI)_`lN<*PHtXvOZ3}%y z2G1n=Km~jZo(QTDi#Uc4GNwEJ_e`e_%4`$xlP{$oFZStzqv2!|VGUCUidBsg?*gsN zDAa$`Z9AOh(_GL1r9SfiW6$fWipQx+s24kVu5pHo^s@0NOEygce|`?--+#O+4Fa(< zPb1GAGNfID&?Ox}wAt+Ak^tJW~g<3cq)nLjZ`RyB(!ji}2}ffc)i~y1u?1U|Rq9k%7c4CvaHi z_>JueCQfG6qR#Jx_3t?qGrhsTyHq(gWg^A-!0D1Rsv2aSBcV%_<@yX)tV4buD z-j&RJe1q4v?MjBmnNcg$RGWtk#O;0SO1H$t^GaY}wNOjoRDn1(Ew zMZnuo^tngR>9TvdE0nS(kD0X}#BpqmkEfAdG3~fbtO;PLy_g97NVPLCv-c2~k0%f+PXVUmPk_3yJ|m~!KbJQz)bC*dlfh{|SdotKsJ z`*@U%;Dr`^UoTlQw;dc@aQ9%4g8k3ElRzn{o>V6S)diZ_W;6lVS^7wt5Bb4DW%ksE z)1%AQh~eO+Y+IMXsb7B)T+uKnX|2lakH1Ch2BLB{bVA!o38oAJzvu6v@&miYBENBY z1_Ubyt4f798XhVBaJ#y=7EAQ~aQNLa7jBVR^ei}$$~DXTh`AKLCt&9=<6o_hE&wiR|I+YG>bl`_O6ouMmMJ6OX8=N=6}d#qg}i4hC80zg3Wq`6mD2 z%?$|pdzqu2h1>hoOF+egep3pURRAk37fZOE^M=xM7s0VQ3mTtlfLwAv5JQdmtWLzAGhY)9Nm-By3r54F-_x zF`P2J0Q>yV^qJv%Wb(x>25zprtTG+R8D#nA(vPm*-aoJ2Ro$e6zM5|GpvmT58nq8e z3DGJ?PHc++tc^%{{1IO(Kj^Z&13g2TD!`?w;HDG}GQi1wliNA1o*c~Dqc&O^7c@iC z8SKa{pN`H6e(L7WO4|JNzI>-?yh@JK=TxN35V@kD%!S~_)96H1PrDZZFkCr%&kB|E z;n|UtY<9}TADV*~{a>|1eM%A`478{|QOc)z`wod5%Wr+66Le}H(MYP|ii2bSl9PD~ zsALnWB5sWVXwDta;T7C||6lmm!w2R`qMsh$p307&v(`u0a$1YCi6=r9MijP7-ykM+ z@tx~cB-quVPsd}z?XrU5)qMR-cevf@OX;jod0alRiD;?sQPtX6GcKf=NmAUMy5Tm) zm(`?hN^l&|uFD4=gyC+`N8gpXTGYWf&{&ni4O_d~U(Fr}>M=!yxLLPh zm+Q}a{^t$UQ#M>W8-=f3x_q-Sw1fW6ltQSREcyX;WSXU^MZ%(VXS&kQ1Tm{uRqdq+ zz1i|BhNd>Q<2|14)QGLTkgiL`CjYWT6)%G)j!a;D62c$-f}XY zV@dy?7T2P{sp}TR7CthSdNvn1i7FI*H$FMiXFV|vcXDMFICkhz^*z3R<6P5$B_GIh zg|#&qo3RC7?xW03aPww2*H`o5|Ee^YMh6 z3gL&PJeduno|k3+Vurmv;h9%wP69kIVZzfZw>?Sy`b zink*so48%sarMkPPWzF5J3bHGLB0RpA0E@G4U5E%7q)nfoNFQ*Ya8eQVT%J#;)765 z0)Rb}j}X*$L(Qd5)YzLf=+g2j7AtR648wLO3thjwktu~9@`to@xkNKr-WUERoHmg~ zZf>Dh@04{)RLZkMU;ewDYfHV_?crT5&>CGKd%F{qb#kn?k-pgE(kQJSS=<_rT7>C7 zwnrP8=o@!Y5Ds+L^rdC;0St3@80NkMbSP|3+f7Ma4*|zjpGQgvc)fAS3fm0rw{!u4 zJ;IM_%6terb&VS6j{jLI*oYZCmK{i{=JXmwL(u*>;w02b@-3aN9EHWcBRt`S$1Hw>#0Sa(*-h{p_&dKwo83 zr_;0R<3!5T82>C>u^Xi`vR%nK*Fb`a z`m}o+O~=#11$FI=22=ElDbSpodX0M<4}WcREV)|U7)vQSJ*=n(7%_lc-T$l=$mW14 z)Gyk2ZUdLGEL{{V*H~cyp~w&2+I%4eO;UFnOfvhB!t*yjKj7LgIEo3SUI((?L2@`q zzudXAbNJNag-6i&m*oZcfVf@%6Ysg*rgZxO3%SFz^DfkK4T?Qkv+f+f%`-w$)p6bO z110nv`P{{It!nJw{n}Bp%fTPduF~gO+h|8` z%&jS0vH5|f(eAPTbVEmx_lNYgz9(n+CJeiGyz4GR(`~~eYv=7RGrurf90rNQwf^(k zoon)jo4Q71O8dHvRY`Wfo(;O#ogWFlb{BVD?zw#o=tgt%0f)aSj|6DVeb*S8dKpc) zoSg|!9Kk;VyuZ}uqOxlX_TFqf#$89Tdun?7w{v=*x3t4>;ep<_Dam_2CP8S0`?KQ3 z7hd!y%Iy(zwCbR)tqph|(g@H9tLES0wy>)0D|Fl~u)bQ>BF|15<>N#>#BDQm0St9q zba;f>yO7>hfnP1Je!f~hJx^B;CK^|f#FvEh>AMV-w3CZ{6#t=ZFsE~FY&kfEEgOf1 zukPozS=yVF&RTmIRP6&SS?EN`tw5`htgzJ>*`ct%e^Mc}-wO?q4*~WK0uHYyzrfK@ z=U7HCNLvCNB9=ZkD1)2%7X`b)E`8YtX^Awp4o)~16>Ohx zr;gCutL`BW>DP8sT>h?>EKboNIzh)@qg##%{na_5fFKIhrIGeC1qMm`E-ec++-M|4 zC++MTPXo=&HDkU?o^M-*i=T(nI6@xFDYMJxKFp_TZwpt2@#W^(qxm`&`fZI=cT&o{ zC}1yD?!)GC#45bFT_t4GM)`JofOM?M6L1%)w7=pK_y*hIMdk^3r%cD3%#*JUPs{E2 z0Q5dZ4N(alSvCcdZk-TvGtjWB(3VD|d~v8Rx6Tx>YD&K`G3~_s+7lhUkw9P1p6U^j zH6@}aSd#D{D7Rn%_-AF~&FG??5}(1v+5hwTIu_tD#lw9JrFDMssK%5a6_2NTCFxU< zH7>e=^k4km)Hc)rXlr6+Nu?8Z=9omPCIxQ{u7BUEmI3aB}uXL*`(UoF>f)HHd&U}Z5|vw zhwT+-d2>dC+Jm$>E*{gQf8xLRqr_nbU8Oo0?zk420@$(1Nz-7 zfw$Xoe3EZbt!r4n=`8;KAQP7`g?KO9ZddL9`lsN@%`p4sy8zFYX&qmzWq%?VH@A4* z2w9GP82(D~@Yi$htG#Y&o-3hBA}fa}=}C(}t(vkYU2!rjr+q<$N4HWz7-yx(s6&vOptR z{t_dc8bE;-w;2H$bv|bUg=_wBBdz5rpC!*^rOQYKgd?CAbS3bp?ffsU{5yLt-CRmJAVwAc zzEF6fY&Veg!2C*u@r7mqg7#!oAL51AkO5d(3Epp0`sfDwUhAxNp`kjPmF+5RZr{>= z&>xbH&!gIUM+~ErpE248kEn#oHTp9N{VF{U-_)En)-Yis~ugpvanCK45UYUz%_wBPqlYPnBa1C~Xf2M~JAlpW6Z`2Ife-u1p~%)3_T6pD$tCIq={ z^ux_sKje7s9wQfl+F}dT7Gq`!-^zbTo=cEQerO|+fQsdo^>3G&4vb^likZ}w9WP{>?zEAhi#mD2k{=@PS;y&Vul7Z zxBd;g1DF%OKD5bw$hD{$e6DLGM883x3TT$!*=77v#I756uP*{Sd}W{$bTar+eWiz& zL%q&T^9JkMiRsV4HKz~>kNOB3hyQrUofMS9ld>>u5QDAP8h8Gw4&~q8&xE;svkV3fi3sL2OiJZs?Co*c;uEAIZcotv!CC( zaUEs4VVmtKeB^^}8>>s$MmGf`|50V~3w$98|I4?W2q|DE3)KbtEo%)h-SV{>VB&^X zXLk5&6d)^79VOY{r8H7#ATtGrk|5;^d?$cNl{Huj8nYY$ z6wc}qfZhC0UZVSld|2jv7uj88RF3&GQoHIdxX9j`TU$9x0OO_SRiWeHM?UX6Y3d;f zt=G<11}T4uJeS+y9VIt<7*2^Qr;(Byb=Y!ZZW@>sv@#oP5*ofSuvLgh1u+5~YWeRzYYue5Y{)!T_spSJv?9X}_yb1~(DPqFnJa%2X_`Ykz7L%nAqvRmI+w z*3$uEpgGZZcoz7NJsoQAj^L@gWpDVGh^Qmc&%GXNj!ZEaX3~O66PyjIM$wX!g{%Kf zW3FZ6{;B~Zf1WvKOJp7JEUax+_Qqx{B^B=6zNXMMXCobo$Am_QP8-pN6_u<~33wd) zy-$Pe)lAKQ85v0x@#|-5<$Jz5+&87}nYk$a`wCZRUwg2jl&<+0ek<#I2Q!wg4^@KV zBYXHV(Xvs}`z`qcnnnqT028Op#yu%SVE;;0>&RE!kewXvNT5IKUFH133G&!mJRaj~ zeGO}x%gT%Rb+)AV!L*9peg1a(`9Z)r9nZ0=67*T8kYO|L7jY7=0rTK1d~#!!*Q|=y zM5J`6owiIqVMz0|ZB8I&fG0;VhhydkMSn7-*tA?Uxia8sTIJDsM11$Gan?cLG_`(|515TmCOIY zW6MQ;Az4F8MJ#1G`AIcAIsM|Fbd%jq4L1?AD$(cBLgfZ0gU?=t8pk3;3`2+!hJzGUvd z+i<{KpWv2)$z432_qNzV0koniHf|v->c|jIt-4uF;bwY;OG*JSubMA%1ch zC!D^jah71D5P7CT-gv*3D^Z+A+9}_(!A*%Qg(7A3{_-Jg$IwlwpQ-CXg%tR;v~teu zwFuZpM94R`nHJKt=nK~m+O`I-E$ed9h%a#y2a~t82YeCywyKVfE9}}9D1J3Y0RcN2 z4`k7bzWWwC4REc26&^BLC&odptn{uIPEtJz!9B-gDC^>XvIa=rfjppsmwAy<=0()`Vak|1Vl^8&K*PStn)|DEcZ(_3xBXO*e$C~eau zg)ph=Sh-}GRKNg|zeuH@xtJFyP} zoPtY+yUu&vJsqG^XXehX#{Xm;>T>Z@Xh}xZCq~Pp(*d3Ef4bm`6Z*Db^oKOM58gZm zJ3Tpe5dpcEszE}+n`i@M@MBxIsP`&l?9e|tW)#McxTxAu9=-}sE_Q>{{nT*3Opjc^ z&YTW!1usX-gsv$aK`O%DQG}67^G$wO2xJN-NW7 zMxvw-`g|Ed`@Kx_04O}%Z^kfB8(w|4S56_Kl90RoP$06rikr(YW}-y5C~38ZQ@A}N z@^9{|0F zFJ6q+EgqV0iaso1S<@Ad=0$%1u1Ik&e=C%Tw58*6O;{g#Ynf+K^ma5Ty1C%$mqvfq z1^atVhE=MY&jrCzm6`k}*zqY(|6|FihD@b|dBvLo;;>9qWI#qijt$9sBGDWhhJ1}ndxKbveRb}$RYYW>ND@`P#%WP`hXdY&fBmIdR;e@s!1!<3{q9O|XezkbsBL8>l`{2edT&KJno9O<%99cbnH2gE z!%xjk_xPW_CI=~scIwhdsp3993g+~I&5+dSCPG%Vb(CT_)Ub9}R&GkOua_BB+B6la z0Xvj+S#u+{^ZeeFhyDy9Vr$o`yNS@qQzu*%ml#!@fg#7I#iw!~U9DZ14S;STt>uHa zB#F{4?{Rby!uI6)X&7AtJk}69O}ga^_hiD=L-%RKp?AYIBL0%M$nD6jrm*tS2^$>J z2#f0+SFa-872gF0t^^v1UnEE5fh#NMe9dOB?jH=x1lQ8Oo0syY>@VeA7mhNh%Z~Yd zSqM#RvPXUJ`=$5h>e)-q;;jv{uoWE*DEo*s>s`Q2rF(2h$_rolroVpEkNVDcUGtbh z?Dn?O5A$|oG4$N!*`;{7?%+E-qxyb=XG!%_L)m5g0lF5jPq~zB$TqrOJGC$_*OG0o z)rc)iEtJPUIj(DwsAx&)z)EUVoB?KqT`23V`nO>LlLs2eF5@T4Boa zQZJpxo3YLriK$Xv37~$Ea`v+X>KHX+j~+=LO1L0j8Y|K|CZmv6dZ#mQi(U|Uc(B@A z5Oi=!9g!kGLc!YqRsQ*+_Y^)*Z6|-k@A~(c#gL`Vuzp+E$mq6|rjr2R=1BFm3w{UAa^JP_yX}26dY{|35 zrzp0EQch_S-yhT5=hKOFRjdd9S9d%setI7_5{_~2wexAm}fSUK;kj1r|{{2}C#>T~ru(w9Y z!|4?mPWsFPK6O<9H%);14-JB#LrFkD6MLdS-bj$wY3AIL3;QEe_urxlQm_Q}s#7Km z1<=xZbD9W(AHIo;fzMEUb#w4<`WJMe!e+J61WY~ePVm|~edm2z9NeE$eh_r7dtR@7 zXl_W|6aD~Rm(8ih7OelZnyL|`#- zOcz$fypWR9ciE9Q(v&WuEiLDiehn_y{+_{n%B=@gab}&GQ6>)h{$Sw4+@+-{ttWsUzcwO_zUTDhA z*ix*MEOw~klyBf>Q-Iy_Ny4Tn=PIH{fCiQ>F%|qtX@i1t*EHAiu47X*R0^fPE_x}j zWmvRtti`ci=8VAe^_=NkZ)WHq&U@M$O&#letuoQQL6dKRG2mK^{bJ& zLI2y{kk+%EP-w2x)KH`L=#|=PB(+ac2VD`=!{N~+B!(Q$tKDi`m zEo@*D)6Z_-Qz+4`np&U(<-C<=lLtyGk0S2Wy)FT}AFOT3>f4@LC+baM6RK^Kx z5>9u%NRxtiIOqi7dB_w#Qq}kC^FOh6w_>2?;>RyqQIWqKv|b8T8?VIhWEYRsMEyGH zxCxwLx(y@vuH@|WqdcF;Qsx1{vq*w`dxJ_lBfg|Q!ns~13)4a)Bce~8Jg)-~Zvw$w zhP^Pht`7_n0gX0+A!d^FL~iQV!Z zSPyI%K`Z@nWWF%FZ{fhy8Z958w;JVSKa~0@&8KY-e%(c< z6V=>2s6$7U2ipn$@M3Kk7=3K~Y&r@0)?G?Vz=x}cHYA+9ZKF>MbT^@#YD z+rg4{pTip&l;$~2S0#L}bDV7zffjK11PKZBIPHnO@>fo_I6+&|*{I=)ug}|EknR?D z{f;SS_pp4P{aLmdFK{1oL>DW9_i4Z`&|nAIlhx6gg7}e!7OLR+z^ifsD_hxY=XWey z<~dXK9WUVzHp1yNc;O!t4Rj)}EDZmI?Y3-J(q$&y3qaJbARv>MccW!orv*sAhmDj@ zyT25F`i=rg^hw_Qr>m!eHCb{u6{H;Ft|V*m9hx8G@?*abSCDSbKSbok!FrJGHpmBK zeA*27lT;~mHX+qy?=1@AWmUPKATt&w{f@+-5)~GSi9s&IzvMHNuzp{7VV(JSyrCM( z(sWiK6EU4#DzIyi6){`p5z(${dnxi**cTv7C^~g#+>3hNAH*LX%WZCU*vRkP-3Pe0 zH~POv2O|ezzv!g^i}Qlk42&GG+H_q*ywJmT;;;8M0U6eW7P6KNA^A^K384oBq|neL ze%J%KMtUxJPAh)mkL9ON?7!t$hCb7Vd%6pEXiw z_?EIi;C=&}hnlJ>7Q5czW}Z;$-s4M?M372>-Fu>bfQ6)TDizmxC#b&UwjC=$h{0qWWkj{tjqL0EAYN zRWNCLnvY9@0)|87bqS=UXo@7UfI$y2Sk1V?3A6 zl0Yvb6TCgH2h6#qvURa|F%4#|{kYITAh}4E+!Q)UV1H>y{bePF;=de*&K*o{6;zHm z{zDG=4_kbf@y>|D%&fJ4IT$fNPcVZlJRkpUeB>g&jHkww=`y9S4g(_l@t&pVh!m4% z5(6xN@TEy(TOQygNzZ(Rla{heyFfE2%nLu}SUzsE{g|m6;MMT{&jaz3iimfZUuU>x zR3Ai4Kl1MxhVKd^)K=K4s4dy>ll>_TMdIDd6xhubxen}Ro?PYy=^L^e7Mm-f zBaZKr#;;=~mDW4!?qqel9#6jn_5%YM23<+3YFIYv#}*bM&m;tJB@tluBx^5DQFnFQ^4P zc};$nX8o~Yvnqn&^q>P{`j9ltQnDbx>nM{YP{a`0hfrEQq9IBYQmwod9qOP%dJy9C zVuyZJ{S}t?Pd8LL4WkW+h7f|)J1E9XYJd#}`z!}nh0({Xq_%mn^bI*iyZ$ufe?88U za0UC}wlnxNaPcW3hP7uE@Q`VLt9u;;hbgUOH1+_i3F!;kq6Lr-xe%0BS0p-s?}B}I zgfbV`s!J=$UYlE+B*9+mhoXV>3^72yuOtf&QWGP9nB51KQuMQ`?QKe14uF=QDQ!yf zc44;{PwGzYOa(`8WB8{au9uhiswrskFG;XP|J?g_&R1JPrGexEqmsjsjFVHd))wk0 zC}V?1jrq7k-mX~oL4$pn+RTcG-QcAQ-a+kbqRd)%IYVP>*=L7oqo$>BnoOv?ssYuW zfd~|I*s^LXM5m1eJKszT4_kYx*W5EUv~Wxa6a`%vPK@>Xsf+7ds1;S8(bouRpw5k@ zK;rm=lJ+#s2Iw!e*FxjgG*xpHjoadwzqU=UnnI6_o!yFqrhMRT;NxNIq1tNb&xJeI zt%cofqV-SLY(4+uo8KF;Z8KDS+aHJV{6~b_AJzm| z(SJdy!9!MS|GgaE&bom|9cdC}z9|@cxjlNfGt36zV=VD3=}bSY)~H^u#a%U(%WV?7Dg9kp`ZwA= zc;5h5y@J*Ww!HS~Q`Ypau+mIwCL0UF63>$#h zxJWRfkv@lShW@?J2iPqie80^}!l@@x|ALYjktDHGk(aMQl!WRAbnmJ9O->iVRl}vv zp_}AVFmBJ3zu@pqp1XV2xpp};hKgUs1USt~m)k1{$5u~Xn{(2S6^`1s{J`-l9FS(R z&CLxZ*6dsjGDs`lUpC1X>ZFTefj_Xd?*}>35k@s{@}JX|PyV5)P9l8<3u7G#Qj^m@V?x*}Va1Whqm9qKB*a^&(A@g=Qw9&}yZUee@D(rkN zz@W%=SG=q&b<$^$eY-;Fcw7XGf(HYxLPmT*{avAPtVo3v#Jqeyk`Z7rCMc}4(7^hu zxZFnLV`Hu0%n__e_DFEA(u#qt^JGWOlS!jMr@9tqhccUlPz&tWK1;TymK5_Lu5!g4 zqn-`UWAy^^&~^PD-*WYh_llpZd>8WCDR-Y9LG>0ADB1!aGss%kwHUkN8yX8Y9nT_~ ztCII?f>?Ma{4?<}3h~0?ZX0x~ryBM9BSC5Ny4Ywx^w0XgyI!z@41Z zYzb?yF_@uvB6+wRTBY%mphrM_Bo@jk`c%AL|D7M;nXDFnf!=y57JRB|DbH_@_pzkB^@$9E+0Hv-31wu57 z32Pn-_;5N92L$PZeRRsaPU+PEGJ_uI%giAFx*{01jO@ggGwr#~d!xE&B~{lyvN0U_y-S(a zcH_}V*gq5eWE}%4BZciLOO4$VHo)~efVh2#8LX6E8{l|rtV0o+l>lRx1PKqFAQ$k~ z$+02ecK0CwJZfZDjOV83W-IH)Z*ilNyqwZ@L;*vRFRCscaOIpT8?hLhNo1=>t>`af ztt~gi<4rbyFwJ?g*GC5~2h_++7VWrR``Ppy>wy{;t=rb)hN`{3`BrE;#pSkRndTTK z-yYg2pVcg2mqjdhEbcVy7{7GVY!E$;IqW?)%&A2INpNpY*YgFu3g>!%l1iisALIOV z0)A!H+BNIMPRS=bX=3*E(Z?&t+%&VH=-raWKB#N^H2b#haf(I)D7`{?OO8KBz088G z3ED7bP}OJ*<+LeFty=o3ZUVDg*~bXWKC_$spcQKFOnGlU{f9+B&L1Bv9lv6E6ZqS! zcme*C;rBn9*}k2Xs|Q+}J@QVw|63FH=1sj~^~Ui0NhD>ewOiEhl+c~J=OT#`OLhGH z_c<7){;&csQS8VU{NL&pisjyppM1;pSkmlrDbxLPzVMx$dU|zWO=FFjkavMm6CWK_ewg zf~QUKp1uEJynHL3iRFr|j8+WeUgU?@kjKd#D;om5)GAdtVh8zrx(I(*9*v2C3iHaMDT-j?{5c zk>?T1bG~^A!|)od>xr5=;Kqv_x86aVsyct<-RhdC$IwYbby$<(OUC7pqs`w`8NqDQ(ay+L1v2PdQ*4!ycoid^QbZ zu3FIEJPZ4%ty45{<`eUj!HTr&r&Q@=fxqqN(Rs%$!rMu7Rj2UmGgEbrot>#GcKE z+)b{kDPIc+NM+R|5F{15ly=gS58{i|Xy#hXo`Rh7bX1 zDJ29^xr_kBFy-u-2cV`lF? z*WTBs8M3UhBGu;+sl?NsC6b^6=Y-+rU z73XZ6+c(2(!l(00Xa-5(IH8EIDX*OIWSwjay~9Gx2jsp#3-*-Sph0tcssU4{v8uA5 zoHBQxu+q;sw;vimR<8&Wo=yDdYLmsG=O-F3G!Ut9@X71#$2+~rF@ptwwVQv<&IXVX zG5k8^C_A1LtYDx$XAGN?oez;)*ZxWJq>GTyUwU-H7`=A;Nmy1n%oIS%vO6%ucxBL7 zu9-d5yK+=jXuOPjnubkcQ?H_--0FcbQvF;h9-3mX5v(QAnPL*Ui~oEuZ~MtxWdIiF zSCVBDuNW}Q`K`M3QnvX>F-ZLSqt}Sk{Ku#7l%#;|=Fvk(^DP<8{Xpfa^>}t1nozP+ zt*vkT!y1C5jx2=2*%)%%c@Nki+TCx45hD{qUWrVM(Bj34BA0v!olD?21zJNV`H8nW zfcx9~`23w_&{z2~Iy_AY5D=1eCKbl<63;)Fn5^&fFo*2^?93B`UiH{eie`X_<{Q5XL zV>Gc~qpq}b+$*|=ifBby_wNqJNF74}<9etHz^{PJu&~^NZzd84FABi2>B;j%ktGjI zrNgLDT3d~l(qYt0j^Z`ZqK_R~dT`fv#U7*`n!}_ARaRK8#+Q;X0FeC=7t8Y65T$!| z|CK-QoRX4)hD{W z0lOPc@W|V%8KrwQCg}|jgyxJ<@)^8AJ6b)bcBi==^^nyQ4P||zInyR&m~)|W&{JJ# z?qwluxl>(Q9Vv42a@q)1qsIH_!04IQN%qrfh2tn|-48m6$AHa0vM~CbT?H?=nJmL!kDAeyb*Mo&}Xzzrt@gC3(`)o66}# z*9rzL9<5UTYb_}SQ|0Ts0ILU@1k;pl`i0REHVT@>LPQf4J6ly^Cb5k zFu4|nrlM=+!N3v+fwwM_y0TQE)BviiAVyH*A?Ro-?<^h~60&R>edORRPT=9Gh%F{W z+g~$8zU-9=jtniSKYt{CzSaEGOtZfv8{G2VI?3fDBJ&`s8{m#xkk4+y!z=WDLJ?Y$ zQ6Zl1-jgxZ#%iYFbL?#6fIZbVAw_l0wI;=C`HDmrI{kpf0iKUXgsw|UDVg$yT3WD! zp6SmaL|bEI{gA3pVT6r?;H2Jo<=od6H&)or+sHX$jN8#v$k)kI(aEVD{@@+IN!k6$ zsh+j+L=Lk$hdJzm;cFsY<3}D|=zH@er*)#Pmbw`iv{xA!zSrZA1U}aJ zEfYB>TUDh<3|?h-P?VQsij+u6TNKGjbVcO)U~&)IafK?l+RBxie0w(S?R<@pLq34# z7N0su76sIGv?+*`Aqz5#dmLj$s|`G~$m;xbLar`q~0zw#Kei z{SA<2KC+%o%?dk#`pv(SQ;3JF@hN*c6^Dag@8OSLe-S3&c<ZmSVr5<#hJVLuc5~ z_Ei^>ndF*oon9$_cxaw=`{M@y#%6RV9m5xR?YasiundL#_+N@bo(;-TYYskq%t-ZA z^qYV0wwU&PE0sUZ3P0i9PICJ?Y{I#g=&%km^!D^ zxjqOJ$T!|Hbc85i_PurxQOc~XM&@ty7som05!coiKpMF zjZj-|XIM;f&n->(Ez0W6SxTGc#)EHG-K^em>A6yE=m-Ux{D$xqqgdSx%fUW);LN6YxPs9$Lt45A_ zy)>ZeaY%_q;+;L!gyH?|bb!tl$2n=CKY-C?Gka~(n(&HXjsK^9igc_TTo6ctRX|ds zO-}P^GtxbGNl}{eFe`-;CV)kZw77o;9vUK)UC_y}wXz+b{u9CDu{WmgM@A z3?|pE=n~&JLA=oPUor32k-qcvoY_(6&wF|(F*xyS&UAyL;LbgtP5Nl*eQ`FrUn>j} zCpy$i>6$gw29KjaM1Df?Z-_L zz4jQBOZzt=?YQLZpOop`ut3zLngdTf=d~Tp#VbZCm|SsC61{+Q!ZX@)>bJAt;@vkf zZU7MX@jHY!$ri|q;ub54RcpVzpfWf{5Ca?f6Wg)1NTA@sWm)AuZkDEV368(xDQz^}K&1Gv3? z)S;0XQX$ukn(@M0Vc7n8U&z+7u{v6H7vXi#YGR(JIU=J4b{Z5KKg$Y~x73(igH^P` zJVlTkUx_b#HsokY>Xw^du>Zf_$SHph+*H5VStLTdR8WS(=YYX!Y;nr5N@c| zaDdOxC*C9OP};?p5CHv+Mk7_8!Ph=Tll7bO*ACn9$JVsDw>HQMWxPrFV3VMjUOqmc z+cEV64*qhrqsB&S5e3gTE6SiQ$A>c(?wMgf8nYn40iPPIQod@5VXUtZr3@j<*do+ z0K$2J&!oivNt=RILW5W%MqH|>FPE?^I8JH@Lp`KzR$U8CP!mUE^@pZ*OU)ct@Fu>q z)ff40n*|Q*1+aJVqg$2Z8XK*jV9q=VsZh49JR(C{t}kEc6tM_C(8?sB(cF4B-qVSD zCF~+PeK4dOTQS0*=PNQ(=It-0q$Q)EE-l{8TK6iVR0e@)E!WV;4z#OQovosvm=o;C z7%t=bT{|x0VS6L7B`m040J#uafOk`{+hZE_V#8CgW&R;8S8@AC2nRk!9P?vx(PDoS zsSuoC%E%FpKG#85LyWP z$C+y8ty6dxGwLef;I3>UO%AidTf$%XFUOaoGyQlw{!JGB{sBi(j29L0?>K!zlj(1C zRi9FbUq6jm=1s6_s*h#^L>xdw3Bu-v-*y+_W{Zqxg5T|079|lOJC$rsvXR<$V}g0z zPN_Y(HqDy(p{HFkGwRZid_`xx-J;{^p`DV2;MZ@L6NCDVEn78ayf0@Ue%X@(j zk*|U|nkvBKa(QR93Y2A}tgFJWRe1q^fzf{a5CpU4q|gx62k`L8M&Auooa-A`_VD*@1ERVyurfY=mviv1V7aTCq3px#j{?TwaT$!alNwvBd zVlikEIp_tZYdmNOjnDXk3u56QLz>1l4Ys|R?tO=O(IL;-lw`QQZFn#<&@$TuK{MTwKUpPg?Isv2_MT%VH>mIaC4V#xrxD~lSqPZ#RR zPg~-+^9>-l`BapcOx^4HoK}0QrA2HTt#rv(f~m`pP6^(=2%)>elFN5coU5;aZ$J65 zs=NR;nCW?Ez@x6Mcdx3oK>KtDbnWYd=8XcKnE2fVV78#*&K;nJqKk7OEhv147Dkb2 z{z zi_3z`jF;Q}454Xvj}g`}Q!mxAu|UtBoL#>20TSTQU+=w+j6srT0oYorQdpi3C2h*5 z^!%gVl0T7fmdh*>joA;Ff3S(MB)Ug$sNZ?l_|7QTn<_tQmw#&?NqZK!a(%Jgp?OVs z?W8eS(Z2hD@&fK;@uJRTey6{ZfpXaW&!B@K_UzYUt+X1w{8DT4jEK|1#a!^Tu)`g{ z?Y@IxQ10biYlUEn<~SSMn+YX|3!sYT%$a-Ua%xs*%VZYyMsvdV##3W(>6YT z@*ED-p6OCM{B%()g6>#;1HHAg&Pr?VK@V`OsXvECJMPm`tN>~{T{UfWWuCeBmsp$wfKU{%+g6CR$@>T|g4f*abLOYK z=byr3I)9;$=kQ0zfe}9H9Vx>n!i;~%&c{{B8^WiJXss% zyn);XulhsSGTB_0s3CMk>hR4Z9BsQ|jURi9m0WEL5JD94i371**;i&uM}6P=fU-Z+ z<|^==B6HZw^72?u#w9joXuFK58;?z2hQ~pnOlQO3Yr*{JOMXme&JI* zhABfLGNBD!5wrZL^74?c!xo-7w$sSu_qr&2ZE z?dYttebtTTC^MXyuqoY`s;(68F9qulnH0iEc_AA2>!(H%8X^&1K}rJ^8xw3zjelxx zerP_GnbBH5wHp~uXDzxrE}B(mXgebfoh`m|c=4iNahBL(BIj&kzxekB9uoIB#t8YX z{$*W%oof2E=2V6%i=Nn@tg9!0sfQ~&>#@RX*78-!kVV-Mo@TMNtt8A!#0u%cW;4BM zmm8e_rGd(jWft3)7WrQXDLLRa{{jy~pnm&7o*rnJ4b6Wk-pconDT^6&B`WHs%)770O2=I%_S8G9&Cgnu z?f>Pr@i}e&&Q`Wst{zijlZ_#zF8Ofq8z#2253p4nGfW{Ui+^OOPNRoji@Hs|h=srX#8Lf+lj@Xm z>GH!wMUtj&{QP$z*HYB=RNE_){zc-ybUaECk7`1p-O{E~J@Yi@`51bsxYiOsj@s#t zTi`UqmpJK~^saQQcjt9&4f32VZ!PRNxV8@4?(a0|-S~0E?yrUxHdE{j0i>bitH!P8 z7XVduQZZe)fpzEv3;y}%VRb3 zml?LqC+gYiWc$Z_Sfc8v5`H(5uadRCVE$M7444@t3Cdp>cLd^QVsr-MlNg1jZzck) z!CvS=-~elh?7}0vp zY2234F0yEEd#Rm%zh=YyHMY90qz5Q5mPj16>))LuwI$#dd!x=Z)}#I7tNWN!s>yc? zyQ0%sIwqeT$x9w^nY0t=`R$qTD63^ZZRo`N=`f%X}z(|5d{}v5rPkPV4mU=XPJT1Hh2t`KQ(lTo;&bd!tz7 zb)RzRGEQAbaJFu3{{F7^g^l~`)<+5$9*xgj+{ZRu5Ni6tXpNQDMHh*(Omj|-=fy!O z7#^+Y@p8qhyu{f>xjS`AEkHXhtu_NcqVVhhH0*=|uF@;A24^@nVoC@D5I}J!+Q?C<el=y$$Uc$u^PcMe0Kn;KnfzWo7@PmShJY^W`LMRc#Jna6) zT*twsi%7Z`#pi7G=VD<~G9pgMCT&`!`t7f(2~EAe2#^DoW(k^eH>p;A)u14og_TlQ zS9E3#)=gZD5C9D~55SH|C{1L?Z|IB)3Na$38Lt2NL!QRxa-|TPsAr?3Zc#To(SVM` zq-3{GIt*Yl+m}R9y!p_ovU&5D%Xac0dRR*yML5{mFLE)jmaXYi;Jjd8)v#AN5UxJP z)H*pE$E9gX?4lDS>i=c^&i?KSK{gv+&K>JX3Oe$=Gkmr(wzNS%ewZDvWO>9z@X~(s zyLos^P0-<U9Huni_oZp?ky{h! z%$_bJesZ5@YjBYzpAoPT0qDG1B6dS3LaOY*7 z6bes#?xt;8|A%*u(dKnN3CuRf`cIH9&9y|;j@TZ?qjRbji;53D!fP|!;Y4(e zY;!hmk+Eyj4G5w+kovsuCdi7kkFRWd=FquXCCparw*0xpenrw1IidCFxTDPHCJvmG zQ%M{d;$)pj)rdN13aY2$biaIJ4`A~X-kP4O@Tx}4%U+H45Ks#ywC6f&{7UkmQx?7Y zbQL#TWv)D;V#KUP^GUU+)Qyl?Y-0?9NmB&5zcXFap8g`_3~eJi9L}Ql_szwjRR=4)>C`NT@T=u~|oIeL6Px+R-)WlO?TMl7@FM`MnW3H!n zBVNmVUpLXnY<+B%QcXLo2IUvqa2(`+ifj+recn1rcoGZq*t#6^VT?*|PUybMRJxW2 zWZ{ri`)l*@oBU_e;LJ6D7nRTY*fve!=T+f@7y;OzS8pZQW7~zrmsArsYu1LtCt>HS zWtoV`335R#dwrUEoSJlA(8idSLrRP;TqVOt|AKH_lTNOzG%08`#+=flRVO8Pr0RK=2jbop3deY-oZi0pJMfzL^~D(BR*;) zUZJ%SqIm>@!LdEpwTaVK>B?mMPn|bSl*`&KF9q$UQ4dw^Ziq%dqz%Q?av#LFJ$4ve z6QEe(Pbk^gzSTj6xyK7ve_tEL;!q1Z&I3oU>6+Zpi+LAu&blZVkG<}7ui{*#!f?c= zhtlZ5dCa!v`}$v&LNC1-3Yu$rIO7_F^I_rCV3*(a!u?s0m+|2IEh=d-KIZj^!*9A; zvkDNBOsxv!*fm@<=Dn_wru!JyJD@MZS^=4-bG8n5^PAIVUyzw4P1ia06qRJE%P=U? zz5gfv);`s{FNaR7E;l{W+C^t5$auPRcW4AASkVozK~E{yl-f zwsAWb%Z!JNysD(Z5?k9blkk)m~hixo3G|x3WG#{=Jt7vHO>i*X@27-Glhwy<$>sbS0J?i=Q;84J7gU{w4Nb zvkpR|Jm?ZCWvjei54-WUzaO7CBR~-ORczd0+Is?hCND-BP3Z^44h?;i1%RfD%SgjV`v%A!_0U``uF?!;rr7@VWMa#ln_#F8LZjgko?VL6ve6nn@CC=RZI@psy?0VbVa40BIe(o$ibl8BdbM`q`TR6fXCDus^G@{h!^H$eeU+qQS`G2A`ZZjUE{xFz~+`m89Fhm(`Nh5K1PWe-#hVXoHh#S{llOy6tV$}(B$75AG!|LA z+<0fpj?K@5UD+TE1qI<^y6f^H z$$8Oi$M`xFk$o(8!O?P0M2@Iib|AL8=h$Y3h8Sq|!)XwwS4Mc~<;;)|Gui7U!PDhD zN$+WLNcR~^2d~bx%(o0%aK-{-q3o{OrIPARp3IH{QX$6HXi55e4 z^_EyoCAP$Np-1g!K=F`P8O#+Y=~8g?`?mbOro+|^DST(tp1ByC!$SxT5h)G%Q4ONK zHPHUf?NZgGb(l)dQRcPM1sZ@55(xAuuZ(`o|sow+1BUb3NcHBb9CzBV=Sdy*wYj&$2i`rYnMst6-VjhWk{%YJP#3 zQnhAH%ck5Eo~ODR5)*pjJ5tS^Ywz*M-MYtWnWV4y;Z9k5^b*399|Lm1Lz*jziKjDH%(pP5yI=00G}-s=0Kd9@wJi zceZ?z4kup&hhK%-hV8NSG`~k?nde-Du#Qb=-X)V!jLpk)Y!A3kI*H%9hib)POXMM% zG#Bf=1%1?}2s53th2@92Tq_J7NWv^>>8pc|`>$k0c0Y!Yd+4uvL=(<_g7Z3$^F9aU zjW6V)|J45)ypeLJig=v?HXM3nGfKF!=wEhTBm$`^71+s|Vgi>=QYADFP5fAjxfC4n z7$@FQFtQZpnM`?pdD7e`|JtD&@Pb}YB8hcHd@f0ho~;Np=k!qrIykO|vGhX&2!k|b zvfwn(ja(dWmk#<-cr`)ou~vZBKfc^2zkrpC2seYg4WF#3PiX;+Ys+uaHX@?uC? zSWH!VkfSkCyP`@pM#$GMQEb2x$JWDoJ)tt^L6(eBuJr&O^}PO8w)>GDpgHkQTIQLE z%U8K`cDv~m6^;z$omjr88I7G-p>yW`KXH^y9Z`v`D)hE?t>?e+S2llllJYV1kn>$# zt~@c>>-O9|ipk(xOXiYDuBOu)-VMN%ykQZ$3hO#vkx&9gmngf_S|HBKuW#6Np-)e8 zqcsM|GHj*+m2)TnQ7#`0K<9nLW^HYLOEh|1CYN21B=R&)Fdgq*(Ikb5>iWuXxOctj z<0HBc`O7AWMiq1~-Hv_rheO6M{U)OEg?e5rT~7!`13)u$@LzK}w!68M>*>>AO%j)sOk9Z_M>-t7=Ei9(qN6>cM=sk){ z10()JHx?BO1I3K~Q9o z^Pd@~XGZ2YX0Nex4xD&7{S6Uy_0WBOIb8UNqYYIUsyzKDwSMFSWrGw*L_Iy@iP+^Y z&^kr<@Xm23Kp0KMe(?Tpyu+gP)AB6`)(|zXk&}PL!jB>s zUnW=W9E@X{Hu*6S+ex1GQ;rV@4+OdG^7Zkfkwr$gg}>A$rh8)_kB_ zs78ipakV6!pxdxY#X3P7!STz4et-+d1`q3_$WG+!$TK|u^*E!HwVCn7N=JY%lirIE zN;i&`%`R0rHbPy<%^GclI-%ylktx6@4+#N#CzrCEuY{k*K7)-P1CD+i|EHjHOvKpv zBXD>Kao}kgIP#>#sAMgFScw|SS{)LiPdZzStOY?`tlzloYuADxf}0fPH>yR*4{j7D z%_EwqN8D^^sy3BVppHUXn(KnHR{lb++%vRT?rNXv?;)n7-o4Rf6S_7XQ|F*5dOj~U zul@qj-)-Xp!FV=V3XD8P+HoKjL|FF{!#ky|pc?}@+fhpZn zi83XC&=Xd~*VgTA4Ofw~20mpBsac|Mo!4ewKD|SWN3h+pD6m~xr6j5Yky*dcPuqXlXzf3cKd=Wy?EBKP?6c;PQgFx}_|_^NRWnv( zEz<`lO(ZBvwA~`hAm5a2RL?ho0CQsM{7Mq_>h*&G3|9DP$P?R>X6^V*l#AJ2A6yX@ z6M|#A*@z(E^G2fj zfxq?rZkFzEVZ!`QP9YCgwfMZwf>M>+wS(p6W}HGq+z6wWo;Zg1WGZTYQC47_31OpQ zuAezQ>b{y%%tSW1U8iC@d&_Ll$71sh3LuglItHGB1Ck)r;Nt+7lC^1(A8x&fOP!_o!36M_WJVEyO7_enX|f*~ro(b%5Rd()ZLq6MKt z^l)Rt<#{JXE>Ugnq2!-w34eH$Qg zauaz-!XJI0nxB&p=aWdG(1)`rmhsd9IPQCRFPqAMt&2H@3}yOD!r5%ZVEUo1``Y<- zgMxun=wxg|!k~6}m_$wO|^T_^FXa<=@l6#^Coz$uxtbD-VPwhOmU1)OeW z%}; zUeU{d^};(-yz^JEqCY;}7#95_FSLbma@ zrf^gj)e`w;8?g!>tIhj(VkUc4a&_H7yB>4aYUQ zMT)}fC*?)^e@Wx$^2xS`xR^T0!RPID(Pz4A<0jX-d8y$Y-n z#JvTHhLcN>(?**05Z->;g}Y@c814~@yt=?qQSx;XgbpD&e!i{!K|0Qel=;acn*pS^do+qzjxsnOY22Srl zyND>6dFffhLB&GIGZIh0oYjO&Ez>}#4k%3;HDAJ?hM$M4rM14hg@YGeYqW2sHK)ehwHD&0jIEZ~KpJKrY zryFco7oK%$Vefd|3J5a^)p9SpKc#1kG8{UNlar4ZikU4csr|9HhF%d6eStSi98f`l zup`)NVt@}{$d+395N={y$b|9_ojh0{wDUQoERYiM0*X&6ZyJpZv#t{uSDHE*V;S`? zJ~Pg=vM`mFfE+>Jmj~aR{NWsF&ZhzN%}*{6H{7xPQ}e#nCPuW9yfWbOEEYzaeTT)3 zpj<$ladO#=1JjTyDQI5jX&B_2Rrr=14(TgZABxJ3D2_XI)`3x6@MFmr^1C=-9Y~G! zOMpTppO|p;h$XPn|E!-`_-g>WjWiv{B~f4!ie2XiYmBu^D|(`vo~B>mtZ@MT`uD1W zc9@qu15jEnTw?x#%v&Gwz~3uyw~00&a{fo|VA%CWLgwZ`;+e>KPHZBxtG09Vpx`bJ zQA%aqLjs{at}C)aAgQS&gQZy}!8;OCY`A6+2kF}IS{-^rQAD-om~ z2NIp1ve6id2R0Md{pw||UV)C-p2t`C_YsR^OstV13=F^EHH_(xYWAk($^dD;;>R6| z={eUNx7_i4Y3#JlBOx>FHd1brCa5AlqN;zG{^pur{?j6c z|16lQL-cPKa?yYOpOpRIkK$07mbFix-tqyN?AZT2D$s%3Q2f`y#`S-l2>#xi2FR5C z`;GtkkLu@%Ve{XSTfhG6E)*0cp=Qrr=gk%q{_{U$V@E9izP0~6dK|m3lYC}dTt@Dl zS_V-$o_F(#3ss1lK_tH`3E!SSZG!+Agz3Av?B7)We;uEDAg^xgcU|wW4rbo~B9gHA zU(}AHm^==%1uTsrg4S!Foo{q2i+ldBOVP6j+fN~^fr{b17LV&v8&W)XS2>vnO8=q> z{=cKzK)5-_i3DbUurQT|s)Jy=dw!4+Yqgmb1Mn4Dq!pKOL%nioPb{h!jdMUnKB{n; zznOmk&qFQRe1(0GChao#7ha*=SAOZ&R)23$A?J87q>Vdb!GmCSeYq%U*=w~BV8jaf z`%WH#7rTvIsFg%`WhdD=(uGmVec@1Fg&?hk9owcuhl{Q^Lrt%ST3@(T zpH>~@HqkuoK;)0TlHJsJdmg3HaLgf7C1S0``J@14wT^zKR86X{$xQ%`a05O$OH z2-|z6snabDeHd8FL7DnSr*5un>Z|L1lb2SxP3zt0ZN!)~8r0>|DlP_1I(2r$V07E% zqE~G}PL-tx11hpV*mm;N^%E*0-prRlSv2o}c>ox$K(814kKuizEw~Z`Gj*ixlG@SW zo2~c8S~y~F-(38wVc@&!#wN3}p(cDtc_Qj)70Tq@4hV58V!{^>02Hq`RPj*6Wz?v3 zkLC(dD68kRoU(NDS@m88o*L1%N+7h|%t-IF)koHNjxb_aR}3Gos7Gbw&0COtbqrzd zSDF91Nz*6j`;S!@tN&~K_4Gr>Z`zuV&gfyzSxP#ULrl7lZv2M^SU8QNOja$BVw@Hh zH>fyhgDWSi;Sbu`X1CKXFP!_*3=L_&%~2&o7U2s_Lf#{{KDT8}Gv*MbDE==jV_UTiDBL~-eF;Rre{hw!MBJ}K+dtujk zC)Lc0tw&%-gBAoFanNSiDdIV8E>HPs;3ed?a&9Zcs^QNhs!{0P&WN>-x)h$~QGwv2af5J#h;JeC^?P7Rb1d zjh;(GedgL-S5K@`jJziHS5U`gt;Mk{kbVyS`!(Al{5DpX_B_2gRO`m2@3FiN*;8aT zjnK8AlAy?M>~X&}Sj&Q?Z3N6magR{;&ER$58fI2bW9&qWhu~2*h+X0ILdhj3o2#Hp4%mdO`Gk(uB;zE=u%tnviZA)sW6OUw2K^vC?wLERmU($g|o=rVE#zI6NHdvKr-B!p8o)xiu9j%&(Pz+o!Y>Umb{ z&8H`YlWAe@quNU^a-d1+qliPk>ft52k z%SavUH6Q=T%uBBZbBghO`B4e4yU&gh8jo#^g({DgZ&y4)&d#K|A>uSPoC==cVnlyg z8d*RtlaxBuk;Q#diqt!B?@IeR_^q$<3FzzeE1e|Lfcb{wdjVJPeM)s;IuACL?M-_b z&s={xBmz%!(Dih^tx22LF;AyYeruvX+QzZGNoi*f{tzWI%e@nD>akEWReubYX4x-^ zLc6_g#6E1}v#6>s9pjPp{?H?hTW|$&H+>J3FnXV=@$6=`Ei*=_Q~A1@P_X%^C_3rp z4d@blygBl5Cr-$~rHHkyp*@_qgn>N6r5AC-=b|@r8$~P z$*qCrk14n6DQ${-&e7>`)ZGdsL5wt zb}z=xNgtO_DX>3COv~|o*;ebH>x1oyT7)Gr`O2RTpplH7+yJWS5iU1z3X#fG^@Y_? zBU@FUfk#u9A-IWbdDa|JO!Tg$jVF#5>uXTWZ9%cCz@{Vr)55P&D_7=CjV%|mW4Gsg zZ7z`80nLMz5E_|l4mLWL7h+}uU#M)-<{OZSDf;k;R|>OF%39|;_v;Q9W%d5Izq3k6 zgr#j78jJCkF~7X0cg?pd6eBabd3gZ?-8OxY1n^vIhF-_r&&}4C7Vm>MQ5xwJ{LSl< z$@_IP&q_Tj96O#DCtUpy>TDAysr08iw~(c}3z-P&m7Sr}`1(!3$`>rP&XWV((kiW~ z<@%r#)UiXEUPemzi0_a>24}R{D8J2n$~W{QH}khr>4Ps+%USOTU_ljb za&$N>G6@+hK8^Z1*@s_rqo0?)StjAyjH-{m)RBbus2vIyziYIu6aTG3CMvP!=4D8l zgwLFM{_-j{!cE^Wb<#(+Wk{v0UJ*HK;XDvNH#pBE+x{Y2=#<-aDNB*X^}sv3N@&01 zdYvG7tfJCiVMK6!@WvsdypEZ-8fi^y9lDc#o9Co_puIo!BU$KoL${Mxnv4CxIjw-} zu4`HfUrz&Bvq zA--JlQ2_~?9H6*~f|9CrQIKHUjU1U3mH3iAqWx+u;uzv>Nk~u!tj~-=Osc zEYafGFm2g~hl^R*#jG%`KYK@EC;XOK9M^q%PVquO=iVlgBI?ArWm{idvPVS43AxJ0 z3%s^%xlnOEY0zRCsFbP+4C5l@)R$AN#6}NR|m+Bny4C zP~C1T_Dg>E4z>sOh(&La{VIR@bT4BmWQVD#N!(}IpQT%Vmn#_oxI5pn#29|R0X>Jz zE?Z@)wcWu>p2t6NclPi2@XX~Ir64nJ;_fd(<^1EA4$R;9&tQh|VpSfB>>U}AWI7ya z6eW-7v_P&8gM5olP4>p})c!D6#qPW8_^em4nnsW2l$he_n)2C@KTLUnS`oTNG7Q&o zf}OLckI-Fq-sih(bBBu=zs#Qe-l%Ghlu}*%HnBEyaf8ze%k0sG()Y)<@!>S*Y8;d9E} zq|F^_sbOpm#(Mo|NNmWt`3U`@j=I*B%(ZzKpIZ21DAi5v!e=YlQ`t!!^VEZAq4O^~ zOkW3Q@QqH4yswz*mP9?9)RYDKY?_dhnN1tHlsS*1r;alpy>s2?(UM06AWuPL&154{P=8h(x?S78}eX%A!Lg?%Zk>eDBZa zY}hs&TMybUXhxR2r>HYo4ppRSRMHuGW~1*?mzVAm;^S|VfjY&&uBh(GEcdT5Ko^)h zlgH=`4F=vC@WE52YHXzBu~c{Ku~pc7>|CmLN{lAlR)HOvtJBvR!3Hxsb{u+>Zoni3 zd-Lk;LSp+JOErs`)ywii8Gv_*7jABIj-e{lMZxxoZcwIbG~_m5d{K9~CF9;VbI7&gk;@&P;9_X>mjs-mx;9LJ8Cs2$t>Uf7#dVzhLwkyE5 zw(*gyH`)EJrz7wG(RJQYO>}L$7ZK410Yw3o60m?gC`geG0kI(hD$+|-nn;rxN=U#$ z5u`|y8Wj|g-b)}zktzWJ36O*!Ef64~r$CZ3KHvM5_nhzKk1ST!%$j>Pd+*t^@9X|u z*5g1bvdu~)`D%p+LupF<*xCxajdr;D*nNA2jXi_N%U7R(;7ZBYz;B_Qmp+t1eHQT! zU_N!t;jO`nW%+J**YV!y-sdiXNhdlPC9%9m)B;}+T%SL>8Gtrl$ToM}+I|I6%kb+7 z!=jO*>6vkH&GuVI57<|f++`HDYAUtelg#!eRP2i4Ria^*>7lmD2c|nJwO3E8wcu*U za~+nmznf|XN$Gm(>`BZ*~RiY7Mx|qF<0lgf`M1w1p+8$%IR7KOB=P}7Q#i#VU^>mDz{74(d zioV*bbam|VuMA^{XqCZd5*RH*#}W{1TCbi1-)*{gHmbLu9?qW65nTtyk>w%YJwfow zUCw^^dwTq7C40wqY5BFVmE`DiI+SrIyk6MqQWKa{vNE{ey`bB?VuSnRi@|=W3JQwm zEgg1nizh;aRo0QuWGN^j(Q{ZiW3!3cW5p{vh>odOqv zwW&2ujLg$)D8Uy66X2D5389hlF7+pHY3^5gLG&l&9V0x77GEiA-cxqR)#jEZ|FRMX zJwD*~xA^Yw4RQ2V`==GQ9?m<_IPwTp5$kcO)1~G_aMXLWoY?fl@D7t$=NiRVf{REKW~*L2@fNI%^3;}3-}tIa4ZrFg)!7-T z3_ajtyzk6)#7cbIW<5nhwI`ZxAXV`(4=T15&&zsrC9MuDkdIw=n%xH~6E!hhSyQx0 zl0E7=9&Cx7wOuQd!oEeAlENdP5?h|nehAi&W+O)La~cww%@$SkhCmSz&A&&ZK|kHq z^_sh%Ft#MN4SbArhIZdsTtjs0rGX+1_GbN^z&DB|?@ESFZjW=NF|ki&!^gkVczw%U zFol43nu$SatG?Bm)uLNav!mX?Q&02x=)6TTrimU3IA8XE?4Lk9xtlR|9?HxU?cvq4 zx;i*_WIW|yB^%iA4VH4E@Hzib35znzPu-$F^Oe%dn~*=M-SfUb7ciK|Y`0!02tx|@ zJ#Rk6dDgQ#YKkFj_TSB*O$B(jT_ZKEoWAT+<4xnME$0;vOQLTr^BxJk?T-j&MI<#U&CDF>Pl+_) zPCn4v;Rp^baXnD5Pmz%%nIzQLoL9N})B<_7ZD!*=SFBS;HK+`DG^U$Zik{evUWEMPxue-cDw$1Y>myHQg(c1!bg(kP9Pp zf}1wYg`(rf!?6yh=@o8qEKfIL_)d^p&Xi+7l6uLaf!W^MIPE^ZR;Ju3E-4c!o`_4- zxfIg?LEUG_PO;)miFyKgJTAsUHAx~#d{k^dkMc@d2IT8TBA2fL(ZD)sAw`|}4(_ro z;G2M(c(L;YZNSa!^^FCE_O!Xc69j)(>X7?<^MXsN5XTv(cvIV+iX9T)%JE?)32V`x zaQq!L%NDHkugX;#65LgMd(L3qFn`L%J8aR2VbCI8U$Col$&p(FoJ)r-J=gN@+U<(1 zoM`MYKHBPRXjx%ddLVmL1>ge4QZ=T zjc}f(1Dqur-yhX!lZ=u(V8HeCw|RZ27*GAdle|Z@nXsv>hex`QkFG?G$v`KSgY%+P ze-om8|7vS@#mEuk=i|D1B)%2eWIzxZVf5ZIqvyO5h_r-3B{%!G7th|norQYa$R54u zSy8f%L5<2nr^GX-if>0;L{1xg z5p%cfyNjsperfy{OZ%YE4bFC)uyOkM{X1lF@^wU#_uq{jH%1F;*-jLG)*%gnb0Ryg zQE&HG*bVgm&@_EJUYo{O^@=8L-h4%@~be5v=-@2}KEj-&fneKkD zqGtX@Wb`F&&I5@`IfMN;es=)n6C>jA=)fA*52*Ee6jBIKmI{QXHN;iwCW1OyAK^Ne zC!BCv*t1Yi8yLB3*bJ@iIw5y0Z*s<;Yi2KEwg3acM-Ti-D8bO3eYwD`$w* zHt8Ur>N#e)yry|P`^?#r(4RVjUXlT3RLNmuLrQ@j>S`XiU}lqC^eBzr`7Jr?D&=k+ z(}TshVhG&mZJBNN8yDpCn~A=~sbYU`ss~?W#j%7hE}4If*t;E{l;LxB^@df+-gL&> zcj6JAvFaLek%L8uQXP$o{Wtr+Slv8-OX^WTcgVLc`_YW1MOsdTkLRDdJR@m!dx!5I zr>oV1=CP{VV7FcUeF}1of8H&7)jxkNEWQ2tuHvrMizNF=1v`e4EG4K$$xfxlRG+>wV~R)77Fer+fD4Sv^jRe=7x>d6_p@wWd4K`VHd$D{Tg` zuvC~QdnM&{xCeRU?2Ji059I&b{GmCQoJ3JqX*lVZ#<`wfk zcPIR?VhjC@bbwSgeJ-ZyE+Qc|H+1o@3*Ym?R%D9(>9997rPPft@+>;O+TlAU?;6wQ zB$8k=9HmvMv{TI%UuzWZc2e=~+E21(ohaEiTdf(RX}P}Gr)bGobbGQ=bimh8ob?MH ze+;`Z10StYQMPn0Sm31V10{s}3bQctzls6I_LPm5cU$d#}>o|OoBQL}MHLZ1~3k4iJHH&Fnxgi|}xOZ%{0hzVQ_X?$E zl(kbr?N8J6NCzB%EsDW9cI}tnkl4aQ=|zO+tEP$v@SY+!A3L`)LIs=tt z8&=RX>p$8h0H{w5zy4n?{ueF3={xG1uDPEG`~EQc!o$|I=pBfKWWvy&jKM}yWZq!N z__Mec-+)08OUC=eUamt2dd}^P{5}pMoV&9c0fWhO5{2(estaApx0Hw!I=4a=u;Ehj zV_+buRZkSp9TYT5?H}OvI|o#&ZfZHlmEU63c=8n6j87lIHR2FPWK+GJ+TX#Wak`N; zCdRiZYayb6h2?TSyKmab=R7^1@8FOy2j_!@2b)tEN2#K_seQ}em0iuIiM$;?@9J`TUUfQAA%9(-n@>?X?=Gbd z)GXk7Y0_FTX>{1tvhiO!NoS9mFJ__2rqi>%lR{U2_va@xDaWL#?f9$r&C(-SuP^Mr zjZ+lzlc}9KXs5xByed#dJ`_G^1xZJ^k8J)`^b*}2N4Q=-TW0xZm9Pj*%>81`7dJah z?al?AXg<;n_)}UR`%qx&!6`m|?r`9|&0VDQ;|i|JgNI9N%a3((4~FY#`%Rf6e)AV~ z+>ae2!~?$B>PX}@vRQ%9q>8W(}V z;UK6dhmJ67punaNL)$Fs8}iM3=tW~C3BMgCKW+naEZBM7C>?J5AQ6!3@gLwvp01?w zBOML$3VI~Ad8&7#pRJ2Uo@__X-cQ8x9@x0S@pe!TNH=THIl2Rghn@U*hhv!fV--u; zWZ~n;Bb_FDhts{E|M>gEE4INa4f!`0#B|VJU*toIc9+roe1$KWqi3Ms<_ZmMYWQ|P zVy}jknyDD5*A3Tr+g`Wl2*;`(5NMiWzsl>)p*F9gFYZmgEH9%^6Vo4q+k-bR1{}R` znYB)&$c=xA(^@1Sv%B#%A;QTc$7J|cYrveFvy-BiqI3wOD^1v-Nji(L$0rmsJCi?e zGvwVD1^a2ClVsZTxXWAFb=i6M3`KOgaCMfhD0#1?n}4+}V`nMk&bE?Z>}d2a%ds1} zy@PK=KX$!^nP?)!71{A+nsp@x{#0X4vEL;EBmEyxW!YUnRjCx-B;i!@6z@#;ECw&%_K4ZBaRvuA^t6 z*0st(TRjDr@&mug-UJ5x8Fvp4>tu3Pa%I&&3Bw9Eqf3vYGXNu!6OW1M`<)Ld4vGL7 zrPR@)(j;vqsX=QlZn^8M`+B8^dk)6Pk`LeOaupmdTf~=%JE#6c18&~L5CqO?La@V%+w}xRyAMp%lk|D2UwW3AbyhZtJk5V7iLW( z3e9!rppuIZ*@3wCfU^pqAek4iTwQBCDOj*F-%$u@(t6@@!(9Erf9N!P|MWXidPae* zd{D3weOJaqCV9ihM4z&@q$VFadAgB1II|FJUN?5I_@TlcF5_it#7ce{Ou6gnS%+7{ zW8c7Xl^a?v9$xxU>t_Vq4;JwTJAOhpUDeC?dZBC3cu>l{jJ_*6&licKv2$>b^53Jr zK@>f&aNTPMQTE8u5NM%~!-RaAu+OY1D|JsoGwdY=$WaPKi)+m!7WdbQq;?!!UqJx2 zS$cW9-b~?j?eg)IRE_T6yq;t(15b{gL{8(tQ}62S_Mj7AwFj{CqRVCHXZf|aojBH> zqqOOPjFpjJb{M?Lt&CYrbBPfm1YPh@cnHv5{M|iGY;={;>)rpqC>Q>qM4TAh`xkt~ zN|&atAl~m+LNS<-Vp~ma8(z7;0R6z{M}n8m-<5)<_EbCnC6C&n51h6r4rEtOoWA-) zoYDP@aOvmHvAz5(LPi|RIB}{f^sIMJwiBm0w5YHQwaC;yJxT>|?=-*2j+jbje=NJ6HA_n9iiBaWVo10b1+e)oN$%qr2fX@+MBG0uQ zOm5FJMtN369lZdEp!L$4LNmz1ZUsN9!GANXCptv`nj^{cENf3JuUBgIi0wR^+{y6h zBRL(_-;+x?552&d$))2rHjS@SB5n>&jOB(g-fR?Eyw0()v=3WmQBtcF0{j)q9P0l) zq}vH{vniYZsCl|Jc#)&Ijb8J|<-Zl)RVr$SYpyT=$6c-ScT=qm+<-bOhsEu zqUVpi=OW^c_GU^|a`0e&hooB4nU$s5k@B$pa>J4(=dnH^>^54jI$ ze3X@KB|XPmmdiV$#*?n>`HOHyp+gIhV-nfo)wd5qj46O7f$+n6HT}*9&pu~==Y+P_ z;Sbb?Sy93m+Fp(5+TnUg;?}vH;ot9$>Um;3Y0F&c%^%={5+dxw^4BT*)O;On{dk*4 z+`X_Z#+yPqP88iv7PV>!vi-kF#lE$c?Y&*z92YkF=xQ`nyFB7OxoRhynEZzx^M8G^ zj*a*b`gA#4XN_h)OXg8_n#JgAjo$0OAZF=yeE*ECf5YuOaorz??Fa0OLPDVtjDr+js=^54_~W&WFNuX1J4 zFEzV7nE8a3-u>Jy!IuvuxhxW>jcH-w4^s#vvjA$#vyG}`ZLkAEw_eYhD*JpJzTwnn z20sE%O|HB@8x6L{vZi^7P$FjvN`SU*des9$(T2mvW&V+w{nyt;6##8>;hn1c+iabX zs%&MK*ML_t77u_=@bRZq@GBG51bm}Ep*dtTJr{rMdEq(e-v`WOLX<6o_7En-n zVX}SDa-Ep=SA5x#_{sxj*EXyVwEu~w4RE2(*QcC7x*AXxdHyq&^?O}EGF4Rm^u6?B zM>YT2!Ez;Om5fJ@|MoB8;S)I&TkScA8H7(pOuNU=_4ZiX9HpW*bE&Yx=IQ_JuXh7?`mCYIK^`Z8G4T*NFkjX_rM59h+C?Oz*699{qC<=Q~4}S)Htg*LX&mz2~W4 z@3y;ipcF%M{HV>NiHCNbA!xW$Ax8M98KdNu^`u_wMp2RXw{i8ib;4YuxoStLcxbxR zj?F1wlMHM+y_v9qSEUUPO&H<&_J#3}`~I{a(mdII2wn1fy;0AS;P#GMcxmTl?m}v*$c^}u zzk~3;H)#OI$*uz6FEx}opk%_G@IW2C5fJ!@sdl43M)PJ*;<#Gq){`RR63EZBp0kM! zdg07-Uj4_Dob0?CKf!KXVy1L-)!C-!b;j$RQUxhb3o= zdEfYjcViSsh?-Apb{Br9RZ%GGQMj#=b(c`1Hcb+~&{KZ@N`vkyd+GUjp=MifCDusy z8Gq2?kipK!TN6&6{y(o_moi^dk%P!Z%U#kfb>|tow|P1q$pxfKhtz53zt>5~HkvxP zo%b5x$MDVil^SO0QL;C+;z`xE51UnM&HmM8cEZgo|8$vq9&np<^qokHvm_(}-TdX# zid;dLoqvMC(Zr6rXOP^Tt~0cOjvI|23H7e+(*zjlebJ$A&?-D&&l-!1j|8sNANX-e zIz^;`A4bfDnXPJucN@#1h@Txl z@)P_3A#@5IV4|(Ufr<_QsoH%zD@_(CDQ?68B$fWO3(KYTdCQ|kDV^)5t~^cM1@Hw6 z#16@nE%(A)87a)TE#UrpUI36OmYr1de1`)FW@3w0&iV@%Qb!p8cj9I9A7op0G`{zo zSy$iwo}6gO&>=$T@+Bea=+bFuA~HUv8@&SHtv@ao+9YWMbByqDnLEz_=2|*l-#jR; zn~CuUg9ERoQQk19P37VmlP2LT2_sM#=?F((Z7Q7hu9DJx(+%~=T%@sFQu*^1Qe#=7 ze&@H-d3L4ljZ|j8Rx4%mP09we+4Jk7mf$?gUPh}y>$@)lE!w_p_?yz@D zN*4-}tJn4>d%bQ^4#i@r5ELiPo_R>9b?Jh)F8xHVPv5EMY>(j8!zF^6Jzu9X3i)Ju zmEh0t8uhyt<^;RA_Rd>q^sLCCn0(aEggXASgbY(Bg)n(DJ}@jWbijd5_bj5>Mkn|} zcizdvZ7GAMJM)s-rjyU%C}Wvj9dm-uVAdk~cfZcY&eF%iW{aIua`X1MRsNq>gi-dI zzZ_V1dPcl@VDa}b9`4$cl&>pO*KE61D z+=Zv;>3V%keFaw2l?7{mM>>_aHty#59eL6!;kT)(DYKqjen|+yoK+MxNq2%T_f#q? zRM=g1JjtCCo&OqMWMziwJyvg$0S~L-H9Y#Qx4`-IE1)tpfuCbLDxeCY`%EmT}Fmar~txLSP9ZGPw?e-*}euRG1d>0Ysy{1Xt zIVE&II(M(OY<9$vdpy=7HxsoFtKgJA`z-hV!R~JCb9g6Gk2xEXg0~Vl?J(9d6`amq z4>v(fG=8W=b85j>g0!-&v>oXXD9tG|Os}>I_iGCX@1SoZ_9hZ_ncn#$ zGO7OWa{2bnMy%^MPmLQ7d{WX_h*URCnH7h7^ayG|Mukg)zCD4ytN+~}Vh$<=`7-~` z%kQ9PPj?fqslykvH>QrxHo1}LVLbuR1;c6>`;-N96~-!6bb-ykSF+Ih{zF}QwyWv4 zIdKQOZe2gUy4KE331yfd5*jj0)||*!z>4uFbi2n_R*cx8$Qe?TFIy{XK_PS|khl45whPN(%ZZxA@ zx$T+CVL4?&Wp1%}O>EDF?$H{9vRY+idl?QyTrFUgH6aHtOJwF%EzJVsVxBb9>&;Kh z0Bd+Rx2mHpCB?wcR&rIs8;`?U-^k-`HP#>j$V9&dG4$c}gW#uYv;jHP_dhHl#nnpo zhiFN^KhL&KX`6<`uWvF!+JQ2u{_q7Aq%VTr0mA>`E=^vt{vOGyZ)KJ4E}0?zme(8d zaNH_t76+t54_NDoh*S-v&m*V#PU&dzGjpBg@NM~e03_89zi?dE^aOZ8de1si_2IXO zuYO!!GN3u0?GHLVZz8#QU$X#L+h+h{w6^5N9>A8P3g~X#J&ag;0crp!g!fw1mnEwg_ZYjL~kC$Nz1`$D56o$>|*5? z(d`Fd2|=YNXCaCOp7MW7`JcE=-UEm-K>)lGk(B||d|3bV#X3NnqCxN;)`ln;n&B8~ zbjpm;ht@vU=%iRzcSvCaP%2x<;8PvegE{qk{l5zih6d#FqUXyt1ka)%x+Vd9#1M#N zPLx@AH;Wwq@FoI{kkVjNY=k)DlKJOWw45V%*JF?4OG4t#^M4+&SsBv|ZO*>D>|lfp zre1_jzNj|VKGgkg`k)!yZa6nDcX_8lMjTn?6Sia$OWbSEW=q4WItO7->JazDs9l&t z^OS(^9+aG$kPMCYY*AfCRA;NN#(~~5T)qKVusRmJ5}(rK2b+n;E1P?o(b*HdG-V)%iEuj zTt66KrKfT;paweKIdpT9l+$lP6EolGV5|RlCaQOgyxTt_(-;QHmGxyJwPpr2KO|)F zimf8|m?-bK&CfA{%r~aUIgo&1SotO^a7MQp|As(n3NOo6Xlmq}I)2njM``*JZMj;; z82NUp6MRlZf&43_Nj!MuNH6yjQruaQ*Kg1+do5a_kA5}G?{Uv8ZsBz&p=iW2$xG}4 z=njdRRpy`ZG+xQ^{yz(zjeY$>xKsxN2;w_ZaK_#o=cxQkcRUP@BY%9xE)okj&Cy!a zEV8ibTH;BJW{>JQ#bcMvnD&VVnp=WwagXSJ$COZ@)QI2S5Ew zRnoU%D#T&Ey{B(nn6(`pk0e+0V3E6J2;Xy#J{Lz6M~w#+8MQhacY%`ba$R!q?1SBi zh6L`(4%o-;iQ6%aSLF(2FY? zHTvDP*AUMJmNiB+<99w{gH(9^1#Pn$RS%xqM~c&AdwdUkx;pwQ1D0UI((rjY!aP=3 zz9K$A7gJ_Pgk(1CG^!IM+4e$-m2E{Sc;mC8jj`3DsB#IdsY{{i&0p*}d)eN*#t@Hb z&YO;Il(hNPMv>gS@DYiC%{#FiN{$?b?YMbfFPswgHhRNoL>+|luj$l0SU0grOqmq| z&yC&fI?gR}ix7ic>eiNG$BoFKxZ`Hyw`rTd1jJ?6&qsRU-WyTrZXaVQMu=uE_+EJx z^&|p}lvfK7V`?=wUWPq2ARy+#W6hCNNo@nNX_nG$&`1LCcjd}i9IYm?$pd5_Ez49) z(&+9o-Fu1v<5^irvZ?BAZ-Q4H5Q3Qt6j(^!;*wSS=ZK7_dD=GjGOFb1;&Fp=PP)jY z65tI%$j!%i7%(hzoE=w{d?76G=au4>s`S9r`DFm{D+Zu-3ugT;4f*F#2q@#z?PLy{ z%5jEAHfSvsq}+zUn^s@}*QuGLrzOGC z0`~yKX|%CD*Y5)p*Fy@VU(#3lnfgyyn@CQo#`c%Mgm;BYsQg4dTk^XN#+)ozP8xkw z_oxocZyTV=rs|DCdXe&F4If7hy$yn&gu3i=PS}6{W^AsD40Jr>-1cxbpwfL@?*L6c z9Ee)23q57rt7t{%Np{ebN?uN$g0@R@rXXvE%39V`u&G zO3(oXFNns&oG>?E7a`aW@Tg}*J+jmJrg|OVkAj zfgJioLQ~cbqFmZ{gUNREVMKoq8J^-o3kJ1>M(vtJ7x}HUI_MDs#hQAyB{&IoyFG`| z9O5&Tg%*g#!D&3}(`-#uZYvo2b+pJ*H+BTl($#X-x2yf&s%!>)+8KiEM}|~?1?qjI zymzPaw3q8uo#Gox{hfg2W=2~#2%+Pi*rxf}EU{%b5V{$+NocO;%tIpDD>boO+P*ln zZJ@*I`*n+1NVi)H8&<-(s#zYNHh{?_@2sc-MPZEA(r%dg()Q(r222c2`9wxg$Ovom z^JUq)oN^}9EcbX9Phfrm*<;yz@Yp6lw)nF<@2a#ZuJnzXFD0h1ED}U-{7QX!Iep(c zC|AR1CZ2nv*krx$T~v5MV7Yppc}Rmy)-Y{L7<&xMY+;A$tkhl3_`dmiRb^{@`OUm- z_`jyK5&CdqXYb}S;t*$hG9RsF>ZM&{nh}t>tfuFG+lK0;m@Cum?P*%X<2V;A_q#hj zmC&A0Z%ylrc;%g&FUzdd!4BAMDgOM`#CsnSMy#xu9ojEJvtT;OgVP_F*+kGWR;C%g z-)iZE*{ejw0sE&0txs(t_5`=ewuGIi-LfWrEnQK|=M}og646!us`R749>5?EPxdj<+w{!_Nn+3|}PO+$&qr zGE4BaORUFhQ!Oax-$d?8$U6jA-kA_SdKh4J-sWbd%9-O2ig`-;_Hg~@OodUB=K2P# z#HXVKB* z$%ZZNiA)dx*dCUIc_N0rSIs9o3m-h?p2N9jd-eG}k)O8%O{vo#M`*~WuWD9(BfT|N zIJRF-!Eha*2pU|4aRBakEU}T4Cx1&4y~uSgZQ=Yti~flG@zkNn?0Xkg8uM?p z>;ap3G2`L&4)c%4;V3Uc0s_|tV90w{>z2#-_hwAeq@i19JUk*MTnwv#WuAt6;`-?O z>+HyfPt&{?V4TMxZn9R&cmk%Ij`8Ejx8G{#COM(f;c;>yb(hO!&hVp&J6`%NC zAK2aW536zOVni$TmP68NHp4ZsyjLZg1=a;$kPBH?ZFcORqGT9O-?xXf{7mZ_147f@ zY;lK+^ffwgQspS^vcv#E=GG^(!A%$RJY@gX@NYHh;Ad|1=&N1*NkvqPw2qS+8yIYV z(0(uI*SyZ{y`ydyJ%`}8mv~Llhy+x7Ju&^!VC!mF7^Q?b9IrG}huQvirKj9uuP?Q# z@L65C)h;ior}4AdPhYm;lCl~3E4(hemfWXdp*ys0Qx0w%Ys{lA*WMkb?bu4yL2@-M z%Al~u1x3osi)UY0Y<=16OP6aP0t)-acrLw-7##P;qvIu#C%&j%?c#55qnN8*{$26W!>!_m0qOf zKZVtFy`Ltq*8FYn^ZdTy_)`=YUrnurS*P)JBY2tQrI=57b*xG9ZV< z>OJBL9n8Mf2#?p9S_4zT-R3T6e^_#Rsh zx#u$CFq0%#;(bp{ar1Pv#*oIf1IQCxdp0e+njeGqN&5krn%gt`pS&7nR`I}0{LD)Y@WLMOj+AbO9GATwenNYt;)OUQk;nSp%hkCQv-DrLYhI|T zS$2)@5$Rp(1@^ZD?GAn`b53A-WTD@KO2J-T-8+R|P`v50KNxq->iHqaSTrj|%1M>K z=m3{%__rXOmn<@6oun9AcIn-qbYhHo-lY`uaL^>v?jZ>@c)u=<>o)n@&j{DEK+4Wi zMt^OK{A%EW$_WBT4q67j9M4pA{;Gh!u!R@XG=yn zl`cn#(I$Qww$WdyFo*Z0UnRBqpdfkcwwaPzzaZ4Y)&?WVP&5SP$I54T1;h^>_G zMiO=*T7TmAM&>6l%b@jWJ-ij{lZE&IE8bexmd=sixF1FKf^T4KwjR0L3E58sqU~s% za+D{W{l!gS2UUlF#2v^3at&n0-yOHT>Li1b<$a~~v%Z)DHrOj1+|Agcbz%)c{(9)} z6=(JOFPlxWcYMW=!WbtAr=mVK(Fc;+%Q$-g1^v2JIYY_gBZ!d9pmE?s>IDX9#ly?L z%m)R1H&{rJqGDo*)$rC?FOU+8^;LO=Q6BiOX#uR~e%rm67tRmc=#@>Wvz=}#^jb#R zHcpw7h;`+b4u~*}D(9_483aSZ3Lwvg+n0llIG9B0o4qUATeY;h|8Z!W4xxjl1w)P56#X->cxE}dzUBoBQvQ%&5vC}E>2cvgX}up zcay*4qr*E!9Q_@l(Px)NuRI%d@JVG)zYHTan1gcUeY@Jy2vCsy~~ix zW|ykxwFXbW^i#+Wx0me<^nOx8MXs+-H%)%4kF6OfcE`De4vdQR@7V6oYMrwF3|X}D zI?E~yckOm`TCGIaN!ZGE9b|`2Wg=qK)e1YOGu$QT7@lWb%p(2$r;exXc2q(Klfy3g zhV2n^bWJeErD5+evR~^fW{-B#EOZf1>s@}<+Z(rTVvo@71Q@Gi{N2+b{@#V_6e;>n zs?sig4f++M8T`n(A?PR9iY-{XjQj?C-Kjfqd5=8)-EW1LrSg(|BAURC(%wwIEGf*3 z-)qV_3pmAxO8AwJDS<#831*WY{R?#k$9Oxj=H^LSpl_1LbtXBhUrFaFzqF$7B1f;- zlv8J$?nm>ony=v{QDftITJ;8WqZ?)AD_v<1LRGRU-U)75}BVf?! zHbxEu5|fR53Jv-*Fp6a(8)S}(43n(rX zxNCPF^R?6=0CopLypvY2jqgvxe|cmLetA;POkOZonW+P(;iUy4ALDuppO(Z=JS{H0 z-LBtXJzZVGEvQp*hX^D>ug0&F6bgF#Aw$)&0`4s5cwtNy@BPCLiITeK1`56PSxfmq z;=*ybjxCZS3dfsHSc+Vz1h7Q$@mdk%M&E_y{JI_O2e`cZv?03vt)2*La#;xF5;VQF z(heMx8y0ry>#)t*fd6d>UoLO!tRuUm?y&u6Q7*hKhgK#KIb z6P=2u>Wp_!>?T-Y-ok(RQI}i3tWdYj!cAbc@v|(xbt)#?@pDKpy7uNt(9z(UH_G+s zfX~^eMdByq^BsTmDQ;WSmQXU|9#5nhhA`3$|@aeB0fpY8m^HAeHM%^drwTOx1 z5Y9|~(~0!0(+^;?J-vPdPeO-MqyA%>xJl>rU9B$F!X&}5>o&z;E~mK7B6rM$yWlJK z8KM?j8aZn&iG9wD?4SncZ`HnUCf#ga4o$GTxXH%|$*c>k#~#`oc!a(vpyPjmifhCqd5aLmtr1D?T^_XF82Poce4Q-H2YlH zz~<2=-bu!}gI?uONG(aQ)5TZUVEF0ji%a%jr}a!Ywh|iC=~x$dq2PrKzZ$~0GNx!NvN&qr62E<3}bSEeC)Uiu(>HEys!9*RPbn-vtZ}J-7jm(LHHNJqk732sWTB6FFQ z6H1}y{kMYE2L2YC!OzU=H@iFXtTN^m z5jLM*#C#Oj?S?&fC3#GC9GraWcK(EO`lNJ_B_w=%*i>Tl2FpUwS~E&g==J&+xV-#> zKa7^j)LY5g|JYA`nxD&XyW{T=)ofQVnQ&K@Tz7F}sx??Td&Uv6M!hp-n zUF>anZ(@2yuQJl5G^QQ$!BD0)UH|ziK(f6~&X@ipB(lB@V37V;R@quvTKYxr0keIR zHo2_v)#vSVt+!lzhwIKkQb3n%l6xiCUvpcv5Y!ghUnc#B!*tgtPG=h;QvaA|oidIE z6l}e3&l@lInJ8Wgn04b6->Q}PU^?pMK3|t1Y6Q2W*3@mC+|2vqj^$;zafR_yNN;%| z?_P-(oDhBjmZgnVTi4$H1Y||Z1o?XRvgSTz!e=p!r@>D8?z1`Yg zls4a6EEs@%g2mMC(hKo!t@ZiYkVU7))x}kNZ7LKuZ7T_~U}R`}p#llAXu21zZ_9Sn z8kfvzQ5j(Q5`N)9iKy=uQPa_sPrPM8sJ)Qmw8lYrACi=aszswdXwSsU6H4ki7W9)0 zB5&Ddsc4gzI&P@6sZX|Y^Ol7Y%! zf}{mObZK8u{hN=}`?s>Xg}v8>gmjKWV4bUt+dhO> zgJyE7{TDb{WHpApHmxX-J^lH!r?NJ_-jf=f)>TOD@70EmyA9Gn-liU$`j>pnIbE@I`h$Qgvpf zb?LakRzt#XUQS18{m#>mc3~Y}_)Z?-(>Ho^TN0O~*;O7Zu+&aS2L)POzuSOn*t}-s_TM9E`1CN~Q&hk7Ia}ti;(!vl17L7AD zXnZYuYR4Dw7v_3Z=RRE80l)7W?LBaf@&mLowliPaLiqXWW1X{~+xHAX*OnPHqbP`y zR2+8VG|3VD`<7-oac^SGdrpihVynmrClY?bc`I4Za66P2S6MwFs90|Tab^DV#gZf& z&Mp>5+2BSf*1h3`TyOmQR&Q=!5(}yAmdJk{+Sl>>^aDS)6qeSlrVo3Ax$87g<1a)L z%5L~7>*(Wt=-{$ttDmb5eNM93XKo9MUJ!%hGTGGT3m~S_V~qjsW^#vgV76P$_I>}MlWroj{q|@;>m;GNZkFM{B8g$DOzRB_T=Fvn4f)WYv z($tCdzHI!LQ$E5X;8S`b*^9_icNrJm+B&VSL2r_#Udc$KFa08*n{N_@kq+y}(lrRH}^6zVc zgzY+cPla*hE(Q@leE04&PHgbUEYB@8mv=X{TjVC#Zf|c)tw`S&U=6HOS}Drd-_3ju zv`Bs<6sMV%9>!#6<29!^?Q!LSFAC8%*3F}uH*PyNtn9;5%!&RTA{Pv+hF0midL6a| zU7f!xo41I3_yjOBryhX`%v%(rl`nZ$|H3hp(esXZX(z*|CeZA%ZC@;9miUZCJktH- z7DWTfFtCd$GpB04_0GZjdNcVl!jNW-VNr?~RsYB1q$a`oxtmd}gfoC&QiBo-o98Lo z;pGLZGo~3R-Fn=JLs-WZ?+juX;YKUe&A~4XwH~#M@8xB+Y!SR^9r!C)2dZ}iN6|)cG>>PAHUhC8N=Sy^*bq;Astru5Z=1JQ~=vr$ftt zbno!v6?StMF?!Dwp<5FfjR~?V@=dL5mOi!@#F;Es2-5as_fH!;D58f6!L!?xkLCgw zHmSbBVNk;MqgTUIIF8<8Jsq_ia6NjMB#2remFev2$8u&n6DaRnXwTdrQ@yzrM9jyL zovC0}EoDu&PQ+o>tN$)w5Vg7C!rR+V)+6aTJb4^~Ykg2%-a{kA)aPaom%gA=u^;Rn z-Td5O(wq=}GpVDV`FgkgYjF(mE5v#rd|n>nOA{zglBry?83&DVqUeanX@h-v;7%-V zMoK+worC8S1yRsd%nW>YOF~P;1)o84>Low*6X&6m5Ll6&M_Ld?1<5EWz=b~!gmzRP z|4Wf{P}ld(ZkHR24_zO=qk=rF2jY}yFMjQIxzcTy5Aug>1~MiUX>yj2VAH01{WN=& z#hCA)sZq*tkixs^Ao_g03*NCnHVHXS?Q9`87<^m6`V#CNr5iImy|3?X}nXt+F#QJ4wa0 zI+FCKk&Q3I8W!|B{kj?U6EK~6QX7~JVu!|qQP*OxtW?aI7%d#{hn2!4pn-j6NX(%nEv`!irqD=IE~WPQ4Zw0d-9?mOkSlhpn}OWuk)QAAr< zWK?zyCeLt-oG`xF1}nU0d2|(gSVX&}Rn{GZnx$}yS!9H5Upqn<5He$X?8CUa0#QHl zg(%X)xPj2a9r#`ou9la3ZpG(Ut{b{OnL+nfy2^d%^v?kRJDp?F#;Vl+s}t;?N7j|T zs9PZU;Aqg<3_MDN_t0nE+##K7D@sUx!*NhpYTxUqw-W6T{b6f`7Tcp@+|V4#C@?(Z zvj@mKrx3J{BpK-T@g@}nEYg|JiH>!|Sa|5Mn`dr*eaYepI!kFALOe^e=yv?WaazI3 z)fpo7VhJsILBk%C!Cet|3+kBOoKB)Kzrw>HlJtS4N zak^1-i698Pv#EVFxxa&k6FO2v*_1~+xDuN%E|%?Y9pg3|30>~UB^_?3o-cQ=q^73o zZ+r3M4$vV`E4OwEdu7$OE78$-(U7*KlqXk+n4_dENT@l{bx4x4@piUV^JhNV-ms z;*lL#B_1(eL zI~j_}Dq-yG{~@=u6p*bQqqX;4J@s(=VHvt>x4RE_uQ=>9OBZpn+Yp0oRYSGobo3o^ zQ>KoNR26*Z&Ytx=gq#eF4Hkb3-pvM|DI79mIEd}hXG>C$&HxN|VdYZa7*eST8!5gQ zjf-t9I2+SL9pFxb#M6tDQjYqhTo!*}cDH%7lb8!!X9z@^Qu7_V#*WImQp;18RZkB_ zUJ;O#!qZc<+{3sSGbb139#`sZ%;lX)p6yUdMKR)b)%dIySKg-|H^DIKWQ;A|$yi=Z zh~Dh+w$;+XsQLK@aBR)!!JJTa71GaBYcAh9k!Sm8mvn0I2q6SjK0kwf>O|~;i?;6d zGmz<^MOxGGy&hKKPD7ULMf#gmuigJ}v@l?uC7*JUz`DFQRFVWJA5 zNPDJ61xpn#Y85g;V{h*uf?%aO_NcF*&1> zGJYd2wE1%h?_;&j_Y0*Xd;&+S_S6G#3sd7_iyt(DuwOihpS_~R5e=LpZV4c0I2X~d z`QhvaUtu3Db_;IVm5W(FrtOuAfSRvgJ?uJHyd&zp9p+LJ0g4cMv#vXVbFiyh?j3l@ zbT)OpE9@~?(QarA-(4q-r!RDuy|^b8T7R5HKdCaYrRKETD8L!Az|$0AuLpYvhpgn# z%$l!TAh(esGgx~$491p_slvu{)!yzqhiKWT z;7l>@{=;*t3RFdheTZ*hyoGUg`r(N&3JM!h7$N6U%rZqv^ct@G*lhfAX z-FDze_)Kx}{s4PyQ>|H!L9Zbq(J2M7y8_NL@|)AsT8?$_>*e=TslNwd4LP;p&wdlV zfVkXz6rcOOFP+ZTQm&JsP($n8D?+G_qNl;A>wOh}Qe)iv#(} z2PA*oRor>yV;t_I<+EE)FC^!dN_Xaq%lt|*3U zbfGo^j+jM7MKjE8nPqw8;u$O4BH|t7p=!Qo>HXC#5 zuVY;mn8@9^0-P^Iw8-pmNcg~iA?qq+YT0y;1 zboZMaj+?$y*LCg*meE<$<*E?@3hx<;q7scrxj}reGy1vWqtzg=|t_-xH4YP8V0R zL>ooj4cmQ{(R{n|%R-8}Xr9xP*sw<*k>A7izNtwsyPrOshZq($*@ zO&;uCOg-R(=Q8I@+*L~oMjaH8c4`I7>ipil?Isxefm6}JH9ly{3Z(`5g9aFLK!gy= z49mS%ucGXAq~(Y8@gtp{WyK{%9d>gEBR}3)ta!QJkP{~8H0FA;+--A`AA@4VIab}E zpoKlQSHgKJVi~)3xxLaqjxC2#+qprGNG!jfS9BZN7}v-pwN_}Zs;@~|qim$Wyqty$*=i!+qKEW<`g&wLV>XH`Y<~jh@9pzbxWZ zG|N-fi$^}Uh6>&i|I4*P+jDJfw@Ydzk`jguIm>jZ=}-UI1UJM=SkB>!rbR`rceW%} zQH(H;oCGf`iH?RpG@H=C#j!4{7Jo0r-exp6#IPKu#%i8uJw7K$W~ysv=D1k3{^n>7 zMs+n5^=kM#q6ghVM9co#ZzbQpxZ9oJa0iwjHpIbuaHb9oD^~}Po$e6l{y2&~A{-Q9 zEISI%*{)Z6kS(C+)~$WhysuGPZ+}xk2(p5)1uez1Tlbw6=9vm*|LRV4%yB5QV%D2M zU|oN&(x(-7lfPsKeV^~VPw{9aD#V{hTGgN*O(q_HQAj?n>NYe;^=X48&(oEi-a{kmQ} zvd14-l=;lo-+5Y6BsOa7V}wIIq$x(zBK>IZ7H>_3854I+7tUB#Ov621^!QRxN@-Tx z>z5AZHy-&YrV=Qf9Y1v5IJ+xIt`-g*?Hp+}ybM7b)w?OvXm_VaHO1J~ALrV=5SPpi z(Wp3@KDe>0%4IF+TsSRxRG4Ib&9a+uRH6iuoyJz&L;u;!f=N(+M+(OhACg)xTQ*zE zM5(qJA1SfX^)(@XSqdE4D$H2iFqdMufw383RO(yx&&a2O7eN$3lSmTO0$7^RpF z2sn;df2*V$QLfXqPE0vpvIhv%JeH^+gpYLd{F#|qI%C+QExleg40HH(+@2e&ctm@$ zd#9X($h^HPrZd{&E$&d0hkOvCl#FQAG1%6vvgl9f)NG34hQ*$4jl`FW2^AEL77M-R zrZ@wStk0|Q$JWSS)xju%hcJ7he6fnA$mR6?|sJ`^4$g{+J& zoa_e2kV);H@2BG?BrV$eQln{ensMU!yV&E2^dfGl`#-bZ27hPO;G^b&+6Wdg;f}kd zkWwd2(+8W5&Yc9f265BYlqZPZrlzptBe_1T;;r~ittm6Ic{=QiT(BZ>?ymzu_9H1N zooIZ=`X$Vx*k};zs1h2t8+)*+2IImVIyT7{w(@IM?UlrohFd<90ax~phkKKK>%2pR ze9>hn^@Ls~8DwcA7`5VaX6}xrl-e8H5axrlMwe@C8Ah?;$ZzVgPx%}M!=hJw!usAx zG0BXbvPh8iO)Hcm77{_G=Ox%(Zfx~gr_?#5f2?8<8G>PiC^jk6ZL`dOah-%)0&2lW8mfjVZDmWRWdY=1MM%1<43bA%5 zU&?Cl;nbQCbHLa+JkypxPjq3~Uh8}sMo)asSeO*en!eBdG%~xJ{u5HsG913RI55*y zVKK@~O-GUapiy$tbyGp$edkEkU{iuw0nF{7QIGudn# zQW_UAMOtiF?18s_lSLkhPP=N1y`0z0dw2}Sk-Y3vZQV+^y+Mp#pBBYWbknYSm;+Aw zCqcXX&*6_zXZKv`(X8oli4?cAvEK{#mVR!@VL9iz0=C1n*Xp^akMeWRE;;Du4KA0F zox6T%g1O2`rUV@BR4o!FA9jtgH+hCT`jia<$?0=eci9;_8+a3%g;iCjedq*MdPlOS zyl=V%X`w9m9t6F2kMLqqKl-4dWij@J)&4MtbpPb|g@mKB;wcqxw9E*lcwGfJmfx|; z`or;t_$w3SAVqg|3J)a62)>fsMUdl4LJJ1Z<{+>mPU~baBn1M8j@&e1DE1(U@(6+R57Rdg7GosyvYNjVJ{5lCurJA*) zTZY2%XZvc7{s|iae=PNFX-Gg8U%{pTRQ}LB38W@G*Y!cDyhyDLd|k9N5>tCV@!$j% z?!)XyNw=H-$47n|8(E^~wN^4Ep{g1V6g{c=w7>_C4|^5dw|;=-3%MK#<(%L#+l(fW zHt@7~JsZ;K8;tu8E=1w}cdc6FbS4{j&~on(X%GD$dt;zs23$si`u3miuibZew@mij zQe6Q0+cyGUYVndlw_~3SO#hZB;N>U5YqYvH!E?xep5tjC?f-vn@+KA@-J~trX}F}b zA@s>P`Sl;B9xwn-_+`A%>oKJd9DC27DTW$6f)n4aSk7b<4q7Jr^U;LouS4=pKdx&+ zundLu`~2?qZLFGajxkaB^1QYtpPYmL`*sr!=-Wl3(l(sq`62WL9hJtKuh&)CMSkLU zYE{;{GA4U`XH_^?Y_aAf42@$EY~}XLdZ57uSvft}xcyw?KmW0oNL@(&n*;wRZK|b5 zt*Hm2SMs2wNi(q*`~ zmHYFFS7wYb8@kl@=vA?S7F8NJog zkn7$*-6I zihXrXXe-*bg6~TJH#qXp8Ph`T&SdHS+bIuc_!(GAdJ>rX&=gxh1`=12t3CEGQlPXa`aIGdkS6KcaAM{gASS&ZU z1Iedp{kO+?A)A_#b`UG9Rn5aMRv)D$KV`vXE|xWMvURrWYX5!Py1N&P+S14z9kYIe zVmz+N*e)*#1P8M}>T&}|sf{95k|8VSJ~({OqNq| zBfj1R`C5Od45%5ueMV2RaMuSS3JdJn$>`RN-?w)Tfe$fBDy-{WSG5&=T`5qgKV6fy zqO(RJteB^q$dSExDj(#95I?om_ef`%SZeQ6DMKuGpCc!+AFKF zNQdh)`GL!)->dc~mt7ud2)+G!LYL|v1Js@XXseMwpE2LeoFDR(TKrQv;JblP~vu}ik7|&bXQiD4&vcPb?P2A*% zvLP4$yzx*;koNDJX8x@|zZ;J$C%<`qaW(aS>CEYmJ(Way{|_&oC)TIF^LrrwOZhrc zzAfx20KV@Ax6H*}@~3pZp%ID<{4JdVP_{>YfBxotGm4=9Z!QKF$&&53{;uG5DzD(C z1!r_th0K4%WkJC1!Oh87|O*=C9Sr%DPDj0PyO3S<4Xg|k*E4IBTn_?$*kK=60-heL9spQa}oOZv;{81N8czh z77N{lgE_Ah5)p?9bh8!8KmAE!Pi&zbdUO5LPW69o4%Xw(9{k=MYPp=P2GNj;{Z&ES zBzYk4JfV{2OKthlBhIszALeNF`S5vczJ;Iu`tn_%_Lrl^6k^^%;z?zB#G1IOK~VxbZ20%B{OV zb4Jx+R+Q@w*!sa3gGo#sc0Y4_lZ+2~+4VJ#I>YQVckcO#Gi4DwCBwk~+0##%x8J}#rQG+Zl3k}-l=~qcygUOO zb%iMK>y59G*AJqX;IhQ+43?SX#)z>f^xRUb)oaXTv8rl>cK+bqNcCAzNZ>7&64D5LM zY@qJci+abNBtc6QGPdGX56yw2thANeWTiE>ssz71MGA&6=v9PR0UQ1L+sHwLx97tlU{7o3lLrhB0^097?+5Kyc(_w$eIU5ntGGHpXeOjeTqUi;O+~i?MsmeR= z5+2&QiI}xL!GY!8tmnbQKF4??MhGwcD*WCj(0M1jR6qRC9U7_ zU#nFTVxMESW*ZIZVXgk8HXv!k`{ZH4LRaeOBf=o9h||gO$qBc<*XmZ@y_ZlKGj@^O zB92D3MvxdHyRED~LY5?J-K?@@v8;k>`>DLRqwTr!NuqWH0KODkMSmIzo|?Q#Yl;Sv zx;rA7 ze0@q^Jq~QDNLMV9KpnQTGLV&C(mJ8n{5i?6$F<~dysp8BO;>tTi@fOMvbROO&xxFv z{#uUyzujAXd-QObvEg&-@dC}C*U-wJ9-X1vlvGbW5+5Co%Vy{+& ze0c3-C0)-w^PWf=d6xO!ucsX3HfZLR=Mh@xh@*P(Og4;;9dHfwHeQq&!7GsAb9fJ{FXkg|bi_vj{g`>g_Z_D`X%V5x7xCeH$r7H`HnhXk z);y)xoF4yshF5ztD9#oD6Mm$L1$pD$+NIBZK@_aRd}0o(&6mG2mBinS9mtd+j3wat zaDD1sj{u(h7;Z?)bzOS|{zGUL=tp5+R6y&^@lN$Y2sNqlCtzVKY|l34YGlj$I#;e` zD{Oelj8M?q(2-~Om3OuAt%n9)1&$%_|8jNNCorcUgBRmSCi-;vYF3as&ax}+M9Vw! zR^6Fus+dCXUCtP@r7QNnhjJ(9rw7E{T7Hbym4w}-?>w7RS_%B|%N|dn9AOy4j4+<{ zH$56^dv)s=Hf_)pn)+*~U@iC!NuyL)>CsTa*gfs~3@#o4JMD54<3u_UNq<$mlzPO< zC6ZEnLb8IzRZrqS=H#(%iMj^Yr2!$w#)CM6Ho=-iP;)~&7RZq%pf=#Cb(pTrTz^UC zX*ZM?>d}#eN*cRAeEyQ53(z;%HW$e$i4RTebj0&UH`xjIB}r+8VvOtE3N1;2_6ux; zs7#}0yYn9DAZTxT@D1qCzwG(nj!NvvGMO^olsbcz-0jt{A+=?FkO%3uu}X`fds}^qAb1V@5Bf3(IKPakZkKPaA4~rtLq= z`1E_g*R-{&uUlzO3=|ng^b6S^>yi@M$ws)UD+GDKZ`4`@{D=sgMBw zA=lq!QXgNx%L8&)%~=b}oj4ip3iOd~SMgh*uZs=}ymBseXg^h53rmhe~5JYmEHfTsa6V6l> zNt4w38urT5zmBZV_)_nansOrK(7_YKRS2moc?+G)e#FU$@RTIY*HEXqmy#UbV7%#I zp5SXvOnLegg?~G?7o&U0pQPnp^JgL#57&H>R_k9dLT?0eExxYju7FzM1bm%p9mC$is-1kEBIcyZ!l~{fQs+{nV<= zC1Zf*ZGGvBM47$9+7i5SB>vch)^cSYqpNM|YlFEXqN`-C9?N9QDJ}4qU~j~@UJbCz zl4DwKaCP6r@AqvFFDDYi1va!uvQgwwtcPZ5U7}cg`GRut+RA$}k=>tQV=$Ff0r8~D z_KJY;pzVtK5eW-_o2XfR+BmJu!2XUM_y=D&eUb4Sju`6eR9vsQNz1AnSmnvBpJMKC z8NC>}%A$7h?U@6v{ibiD(xM6SXnIQ(qFL6#Gc2{`Z_=Ade#lU?{!oYItP!Oh-mpd3H!zqf4n=_vH4P&VotllrqO9m(;L`2*W(VLREV%mMSX(dJcZ2nRsdG#9R z(!q0v1kuxm2)AGJPY$O1=IATA(K1h`|7i>X=`H$1Vu{C$u%BFm{4&lofkG`_A|{ss zjqvcP{OIC8GzDOcD$|6lUOo%%xFm7gzcwKM$8^gt87~P%wVcg|fM*xw{g<8h2VX%w zgIEF9Sdsas6D6MSezoLO4m@+tVmx1XHoJn4?mq}kNjGNwU_ttitwGfL#c$*#_?J&l z(gVarGXCW}_D^RPko*an{_kCU!A9M8QPGzlDiP+!vS}D0W4P!w#~qgQ3pVfm%lfwC zg(|vI-9r(o#5_e66AS|8DyKK*khJh{Yl<-TiN*xyzre!8OLW6%ZEDPxuT7v0V`Tw@OA&af)Mp}KD(5C2LpaK`))ZaOGP`|DzEuAnKdoWx9Qz_?xH>`ktEjo z!xf=O_J3ibXnP2HsWZAg3G27-!4G%C(ZaoLVs8r!ex04pOe6RsA~5~&FB7;EK@g+*KC_?9i2{-uHnDx>gBS5jrna#7PKtJg zF5#}C$|ylvrJosh2Qy?sLc+si2Pi0VZG2f#`_#N9G`c<9er?Qv+k)NqDp#1R)!?&4 zS}4#=sC_DGaL;XR{t#2CaBJ#Gp1otk3L3itT%c*)2U)- z{-OTuDP`xTS#_@Ix1}8Fr^$mRVNJECfAt49)YcWE9JE zUVA08G@GlU$zcgM?UCG_@1oEY40km2SXNC%n4{1^RhkPU4Zf9W*?LIdtF4zeh_>lt zKN6+J!1rcmn2^m+Jf_U{P-k^SHq?#*Gc!~v*Wu&)Cm0R%t$!`W&148Gzs|ghC~iKDgF#rg?L_b>dn>8|BT*%> zNff)+$g=Gy!Oi&aFbcaU)G@0sqY0E!Ldb{T z3PmX+8)FIwdb?fUQYlfF5iL>2hc6SQN|Kix`t{?K8Iv``TPj=@?@#c3b?kRy zgZ>dh`^oi}j=WHNx%DKmyM8Q+3rInHYblG~)V#)9InW_iOY187C^maq?a2Rd{zsgv zk9B?S6l)u{v8Y6_N3$ZE$qw+>PP=rpfcJRpYYD<~FwU-NDQFrH5D=|3+7mhXq!(kB z-F`JbeOr(^A)>%PGL(8&P4R9ACmdYLMiiv5PHaGgKdB@M(~kiGHmItyvht&uMo&E- z9A*v!dDgbr9-ixQuzrCm;4W)XQi2IUKj$u>Wl~vOvXK3wsTxPUE^0HtI4=s>T!uDb zQpLTF`MN{+5ZgXRVBTMF`CM_hLiN}Y^}_v?u8oJ9`ZVcMxwy}gmeHB`utQ0_s{nF z2;&$fJYvisE6u+6n&l=ExTMr>0cZvBSwSu|%_R3X#8_2tcDvp_gRG)ZOoWVOLhC0VEw;f)#Qbt4u&zEK7E`^DbW}+XKi)jDYP}8L18Uo%cX5n-Zg1P0L`el1`l@c*(fhF0qIZ zIXGX-M(O?~yzOl231(3&10lj_%0PSI;-;&?NM$loq(f{(F}=ao-hi${)Nc3ejfBvH zbOF4?3QPq#o#7mmX0yDj_xG&JGddh>_fj;L&t`vJ|&-6vC zjHPJn?DrdA){pHseiB;{Tl7dC`*CIE-3Hm$a&VIm9)xhE02UBIm{C^12$--TbNKTD z(3B>75!kumb#;PC;S@;wd7%A`!Gm-2teQ;HH@$U@0O;E6Gi%b5Hh^&#>y_)CIQ6~b zx9Tlu3Mgs*Oa1+}ypSr(s_By6!(DF?UMJdwj2Fblb(xp$k>hNGuj(CXLOTGSXnuM5 ze4-v&zMgW2OBLTsnNH)h?$eIw>BsP_PtYijZ^&C&`v{C@C^RamdgXx+dRCv~ZuHXn2j@3*(~l?b8P~qatP3jumFWY~Umg99;5`|d^*zAXE$nU5FXQ4Lp5xj5 zDU7!jzL+#$`&wx;+(Qbp`SsDvXdF-a{@f+$`gupSx%wNuL`U?8ewpv8OZ30yJ!0Gf zS#;bGG`bCI@5nCC3_`Htm5C}-q<|)|KwJMu#(r)N!v&F#z_{5Dbz^VHYQqW$%W4qi z%AbwX{jjP1Fveq*p*5hny|#71I-a*O?s*2V(SIxu$ zvQ3_2CiQjbiaN{kWxN7PWdbU;)pxJE;ZFs6#ieTqkwSep=}le8dLWm?UnX?!3?2f5=Ah0itrrzpE!*3jAC>qo>;q zUxae_X2Q`oFz!@uIY`>&j#%x5M;E$R+swg;%HSvZ`ZW0|%WGQ~ zqk;P)2P2r|l}j?D^t#g&z3#T^tee?W*9h*Qtv4OXN?Q*G_MRPX+5Fes z-t^tJVGvFRsL3gcg}8GGX4>LNoBGGIk6~~Qcsn+Vm8{TOK8tj%9VHW z56){y_vu7l8=l#3G#n?lH-4~$h=76Jet7$nr2ifk|J3KBhChbD-NbWC5NLKbC+mOH}OKTK;*JP*H<$# zh5}(#F8Q+NZZA{l#f-yB%?oO*yTy+w>Ax^Ycog)Ki(&3O(pI19UR+aU=wEv!+6*VN zvpzjbU3sUU;jypD^J%TW;~3zo6l9WcZ2+w)ahzSwpLK}KzlzX zx&65|c{d9c`Km}#2I94x_w0?q?sH$s8X)RX+{=XKPw|sf`#QV&VSS@;NFy#xoG;wm z1iDh!W~XLM9y+^RQmzosWvp#z2EIlQNhS(9*C68wH&3GlzP9~))idvIXIGOI!Ag|V zPjLqWd!jeqPEyU|PngO3SIj^J)%Po8;(ZG^-Yv-T;O&62RO~{5xjRiMAey(8dgG<&(fVo)_-xd?47r3i+naX&<<@VExLy8Zw5m zN!g%*fW5t?3!GgfQV#^joYaz6wnHul3;o0ScMt+tjx?K;SatKE)ZE*((Nrpz4j_zG z7>6f@OyF!Khu}!Za2vJ^eVfl#U19=o zJ0p?2t2{}mgrvK#wXRrZd?ipPIK*SamwBSjvTI5eDO;l_vO==&z8G+G9!#H_(c(sb z(=U_fl&a3}$~QPb%3b|$EWCGiQZr+_0(=i&-c;`y7+UGaH6#xEO13O`sV=R0F=tsyeT|TApt=baViBDT7a7`QS$bvk0YCQrW_{;9Cn~L)C*QOcA3Ct2Q5M;~l zFOR#5bc%=hc3bS8B|j*4H|9GP4iV?sNNL_5+Jn#2rMtHs*_Z;$vGw{*)>pJIsSlh0 z6kGkQQC;r5=CbMN&*wkBH{3m)yv%QG9+%5xJXk-bPJpcNEs(0@mG&M;>)5t4JQogf z-WN4bMmQ|C&g6`Yzr5`Y=WfTlFs7MWlmm?&l<0;lnT08*7yW$v` z24*Y%JE7utW{dMzIDY?xY=XpcYk!+x&_qy6u-LMiG~s30YuGXRaWVf(sr)gJVQHvSF|n@3;+#k@!N%boj!QHr1hVg4-3Z^4S60@h7xkXuS(0aziQg9I^543DtA!xz_M3Bcw@@0v;YQRncuorF!;vP& zrF?}dsLp4#A=~~yw8&BV1X)2c7vaEk} zbVP~1SxJdhE$75jR*=Bm>L2Sln`)J$+P#u3lTMlC@~hrAQ~uOMn*Lz>Q(ME`I?3h} zDB&9f8|_MQA7`T{sbvNSZ9y=${`<+|wmu^TOAQv&FB7Fs7Ut_oJmmsPY`=CeMQ~#$ zw}<&gFMQFFWQ+vHxHVbzHSPE8H*>HKH{M#`zACe`?>_JI0q!?9{AKOmrGJbbV6 z9obVLsB&hzX6|MbRR6?ET`nu4yG7t(Acm(WD&*aQeRU_i^*MR8C(S=3C<`8aVv4@) zqR9)s#&YON)+$e&1VR&nyPxb6J)oCgehO)yu^66yGED44dGHJw`L0QDn(~m`Do zUq^6U-D|R&k-f-8zQ`#4pIo9uP~&6+n;+=Br7kpUn&n^QvWyQps){SM^V}95wZDxL z`q$5N3WaO!j>InwAi!P17}&$yU|dfUE2qx3#3WdTkuh|wbWlqCT)ni9dh)4r{OkK; zjKQ19{KHM)=Pk=akL8L{(9vye_m;xcjU1oc81WI0;PNYsP*t?{n*B@G{F0dnq0)d; zp@iviZtu2|o$}*A+f*e3GK1GKu@&VSFr??d0aod9Z^`jo=kf&Nb!wj;HoyzIs;Bs3 zR&-m~W-7$2DcZ|@Fg-vn8N{P;c`eqXL&lv0iWZOAz|87cLk^AO1M>BXP*JIiBa%T9 zW}8M4?NC+4=%gQ7hsCV<=$uXHYwPCei`-DfYPuxNq&|`B2_UTbNq0*B23*M{s-B%a zAik~mASrZ8(XuggH|Jlx`s^Mg-)n-;Y-1$rxu$CvukY?|5bh3-Yl?xy)>U@hrCe>y zgatp;BUGP#_g5wJ!d&}Uu4RzXpz~@yJDfqWToKOf)@xGLxcm43<*fcpjVp+{iSyx{ z@!H@%kY4(A=(Z)gVQ9ODrzbUFcOj;e&r&gJxa2U;NS=LlVWcriq~Q6yi0Z^-m~%d| z!9-CpmW`|Yj;GG2yX?##uipi7#DN%%#ov*57Q-I;(wmJ~;n**J0*15d&SYJmY>kaZ z!EaY-opT?&eIM}3j9R98*bU|q#(=zP4arlBpEuJtq--nLx|s}mc%yX4xEkH~>E%*y z=fP+Pz2TGw`rpe%uNyv;d%~!d2#WL(?4pKe2dF0|$b98u6f0AvCFvZ5Y_D#q|3nTU z3K+~^jAn7_p>|UHVl^msK6A)y{fy7Eqo5wbglbQ*Z3hC?gL^;{2XdyK>fP}NpoLDy z$==Gjt$uK+Byfg8|DhygIfMg@m~H|RMkD{$4Mt{Y)8jiVnrZyIO(S$59;mLWPfL<; zOv-W?jWdez6Us=hwdx&B6l%((2}5T|uw@_x&MTRYs@Q)qyJ5opx;J$?b`qHyquf5K z9K_>nRZ+PKG9lYG%8%38?_C59l2Hg@_Oxb)hV0PHtgK3<230xFf^J0#JDLQA9|4t@ zryJ$@e9jMep+HccJ(!aFuskS)R#4B&ma{droD!Xi zSLT)}1>8otB}aj3Q9C;`TJ~cUEanrUM=B@}PHnN_3Wf(BnuAIW?2DlX00PviW>tu< z?f{9Il9_erth<8s5xeU^wiD|{U0MwEKp+_;;jtg_JoxU(SlTa{o){pO&h96tRjB#! zWCM&_2UDy8ZfbXm=ulG}@Ix!&LMnwP$?WB?-B0xWOFeeFK?o^W7Wr3uU6iZo&=$zs zvGg8EJ*h2zgi1gz4Qz|34gv$BS?uZ=?>_zF1#NRT{Ce-QJ!_1N=Ps{i(rjJAo?~`@ z26Gpob!aVC&QQ8)duJrb`3dZ1`Iv zWyYY`!{Z%u>(P=##r7}3cOKuZRtx^C*D&w399p7)E?v+ln)*>$Zo{>ll9t zcYw{zW>zoO>697iqilhaNSd|-fFu^LmfvKOy;5aaVC%Paku{)QsQH{4*6a4*gZNCs zE0vtz$*>`h{Vg?OC}W4ZQvvU~<7=PfV*r*N=6@jYe_E_tngamG3iEa{SW!77Tvb$T zL+pL408||dz^jp6z|hPwYxTF8$g!KKSZ{v~V3$XlganuTy%!RAWTg}NESFXXvTdj# z4b3;+XI|1G$RiKAZ(1C#08o|7{^Zr>^deonzHq-S10Lnd`@RKCDU{OQCLU`K;ci<= ze9(P(nf_PVSlN=nM{qy4oZ&1_lHsuChg^u5VKz@2=gGBzgA^9C*KFdgB( zx2({YCZR*K9tVOtR7rJL00E&Q7xjy9HQ3KGLF^Ld37ai|oF0*`T*4>J@F}n=*eW0{ zD-CjoB`m96jFWyMDMX zb`eJUQaF#lsUT5V9!jaQ9gj_14zNeNhMdqh*L$JzNL2&X2BlmmQeAe ztKSWwNo5=mxzu&~qIc`Hqy28es>h|X;DgGt(8Re37NB(CA8}kj7LtV>i>@Wg2f&-> z2k7n2h#>^BSG#FV-P(9Ll>8V|fSErXOMBHG#9=sp8wB#n)n&nDVLV!f^X?ORE_*=F}fAgWj zQmk9j0Kxx7LJASwMibW7bo^%6Sc5x62MuJkjr6mb@R~5SR_@=YxDi)z;YE9=`jw4@qIml$MAIj9X z4EuKC4-sfQ7jq^A62!V#H^$2K)@>6j!~@I(TXDaSwM zzEoJK?Ijn_fJuky8X?#ldtPSJwz!G7%(9E}FL{H%7V#efn)V7pxVJpdkK*BQ5g>iX z?pr|oPQim$`C2q4i-OFQt=Xd4=Qp1h`gP(0Y@8W%5<8y>qW81t66hx@Cx9eIzPo@> zCYVZX0u(BzsaZdasCVkh$}1lP?J^IAX6D6^6{BZBuvq!Qp0L~kZ-&| zij5;fSM|*3?6`kj>ovY9zTqm~ZPrcO>WB9~{KNj0=vh{kb&_q2*u;}*=c$S6kp^@Z z_um`ze<~_ionNCZ7=e^h-E{JH9u_Zy=@5UQNkGc`zjl%T%XTxFF;FCBY<6o3h{_jc zavd*Dd^Ynt6}$P{SZ2ojk1v9}pPaY|*e{^vu_%G#-B@g$hU%s0n{pe(Dhcyc=?Q(R z-Q^l^JTKR7cQs4FV`s{BpsabCqcQzxYl`w1NpqiB{C`xAbH}S?k%P))(6Ni#f7t{F z?6&VZJyPlCpIV0onO*3n}dep6)r{M&fe+3M-fZ|4tw*gf#nmm zewn_S+Pg@HD63g)s*636R4+pgnq)!=(A47jgxRdw)+dtf*2h2e{nv*Dyv$Zsc0l&R zHR1n;$p~BWx}|$h4?vRHK@Yc6CEjVhC3_VagccM}$`a6tv4U6ORiDNg>xmAI-Z+-% zbP3<-tS`?RpB(P>+<0dciMi&)lgfb^0-IU{-3T{bZ+KO1>NT>8zpmAsrJp zw^oXr)7uH=Va8k0a*FD2{$v_hLmjQ7bTnQy^FI1!7XJMCewDZssNpTIlCowqiXsQs zz@P#KG!Xz!UfHJ2V7k_7Dv;MH0>S91gT~5eQ8W@Ln5bSj!FG?){JLune8D-<3(o@ZAfrJ7ygh#>t_TMBKrwoW}I^REYyE8ku5-DY2}1 zpln$?y0n`qLp_MY;QKyXYRy>F69}{QS|4s5sBuR>J*GNd{mUp@hp|@w^RtUVgz_ZFI?W}A z_ghdgvoh`S!tS!}sr1Xl$`X%CX%tM%ARb zre<842!pe--y%hPkc!6=@jLhd)IjWH1ikOt`#9NcUyy%OYbUrI-*GSvoWU zS%FbkXYc7f%r?Osjz!EEw&B79o8}w8h{a03B(<`5$rlf45ac5yG4cei`h4nh8z^sh zA~h*E@q~k#bJy|rxF4$CcSiE>feEOWMK&08d+5;WY`GCWUQ$~X;8abeFF|2W1UakeWZiUM0a_WiD#k(iqL~Fc@=7J=EV5o zYGMB7-4@l^yp|~H`-v&@@aH&iYM0*@yGp2+8H(?Iwa%Q8mk~}s-=pFUZB`5H^VD^y zr|XO6pd2>nEk?*h073JX<`+}Si(#q5#Q4_BB;B=q2c0E=2=X7mUVCCLKB!14dj$f- z`kZMH%jXhUjQsDlnnk*!;mseQ{WnDk4Rm^aV!Bew0 z2Uy9TSk=?4QI@JxzG!ru;_+W2*{k7yNkOE9sTzlwyo}9+?{5?KZkI~`SL*v6VW<4Yv29a(XcnZRl8|Fgm+dR1M+CIa=9W9ZYP>p8MH|^Zk2MFF_|1w zMEqyp7-hGiD)vyX5YmDYeB`NkHmPj%Bd6Gwozp@AH&zt*81(&xgx}7F2cwAy#VA1b zmzf)TN0EIbR#2b_!N$8#w;OJ52#u*WEzvG0=Ne7!$=A%0E**^$cq;}?E|Rs7-`e>2 z%Ag>nr-O(o`2uyFOoddaq1VfcZ6{CNB&pEUZtOKmr$ms-!|wtOIm@PX6cl}rgM-74 z@AhV81(K{%EQliEi4LOwU|<55%McCmTlM~&$!7fWVTal9YFLOgAMTDt6eY6h(nGQI zs&{;M_@K&~^jGAA>gFVy42yT&14S(S$K24eL<#6k$zqXCv+jpH@z2+VT^B(%GTenD zoo1Ryo_reHRz}7ma~`PM^=@1XkqyvXO3Tg+OO}Rcc~Lrm*%tzDx6NfA_?yk$vKB`k zt8jHcl!~Xpqc(P)trNMk1*^v&Ip0ZY$K1MD=Yx0LMe*{XqcK-27Yf#8tOeacihQC2 zHDZ>C03Oq+pv}a<&rQockgE98o|@ta>S~Lk^Tu7*@2E?{UT&3m({QQOa$z=pYv-I! z8LMVh6725B>F)@F;T96d8@z_EJU4ahwmzM3pWr|=kh?jZ!PVZCr0!0{+W}XwKME@> zlUrZqI0xblr@2MdA%&GC_r z+&FPhr^mZ*bnY)*{El>14k%^@!hN=7BKVR;2N$wwX)%^`#29ys-eWvgm!U%B^GOXMs%qG-_t}CJG-9v$ z;-X+X!Yc78>-FVt(0hl>N7G;K9!)dSBRc(1``j~g<)Kr|D4sJp(L5hoQ&Snp<`^iKD$WY%J=<>14^VxF(k}JY?;XnK7?ZQ*tH8&)9(kvRb--&lM*s zYV-qD?QY=f$9pXsFHZ_KT6PLDDHf28h@To+%CQ$6rH%X6|u$jCH#i(=Z=hTQR z)v*5JqrI&PiJN$FSB#n;JZ(wdoM~u44Hf5Vc?tG`>Jb3i7LWR7I~(3E7jPpllN?M- z)Tw1UA&MkX}OdDtRwG;8t5ice4k*!F<*Zb>^hg;U184V3zh05m7=3$5IMp^T~>{<=!s$* zwO)z2ZZAPN`Wi~Mc0j^>Advwf;nf6k`x^tP0$OonG>TH=S==!=i*{ zw?}Ap_z?C|sDG^an!;N&?nx;F29)cgD8Gjedz>7&jQi1Zm{#VmKi%D!>b5a%R#Io` z`3L3yqq70l?=f|w{K#}R?5e&gny-kZ$EL;m0uCDeA-i4}C<6Dj?>L8Fj9wf?kWZ9F znObv_NMl}U%MM(6_newNs51qd`P$6;NIz~6vp-KWr31f&R!3gxt)py~8(c$-Bd2CYO4V6w2J(^8N4Stb( zb_s4aF}9=dS+Y3jOt7`Z!gTbTw77xqL5@*Kb6(z45L-i$J`X?=jN_L|0=zwJzsQUK z{#c~!dh)59N3v8RGG6y}Lk0)?O_dk;Su8&`i(YiI*-x2K_P(n>02eKgEODLS$!T!7 zlPLbm3p>Qb{EH4RJCNO#urtb4f#>RodB4hvJ1p^`^67PB?^pW83zI{KyDWIgp-&STWv(2 zc+)u5Z+&bj*_GjoR`-fa=XxyQyEm+`1BRXS0{zlBOIeX>O0LA{31|;dNzeH}m_Clr zKu_6+!S&EUE{@X}p6vvlT@?+gi|smtRT{(~JfTLsuKQO2L9Lav)##^yiDM?u`eqCr zo2Auz+WrY#fh^({*u=Lfl`q#xI}D_b+bfbZb{oI+-j9eNA3pAQB1IZyGT9xO4%Giw zWCvC}(ndria-HZTd??)=SvlQ`+=|rgd#~MAeuf&*n=X7#GhPkNm}gFF4yy9<_1h~p zl0VErLS)Cxq-|RXp5F8FQM%GSyeBe^CrF-{fg%XW=zJ{#|01iIACtD|GgY^0C+KBH zIRVg9<#^WX;B@I_IbkImPuML!8lN=;+B^R~KaP;Ri4^-7{&E9YJbPhE>-yyNu33k|!gpxeGWKE5SGghO#q-^g*<=$oPCz;${s1Ut{ zi0?4wvBh+Ebwm*$r1FrN{3-(qb)Zop8-74{t75@|bp#k{$G<^nahJ@5$VSYs;75eV zQjeDv@Z2*KF#iy3(v$xNYW9!=k8GwE?q-%ozE;(q_!K9*$?0QhNW^Mi#wd>$ve_dh zia>azyX1I9D^EMhO+Q7Wn0~F2#mF;N6dDOFUj=Yg0AEwzVXe*RsMFTo%CHPMr_rM6 zV`=MT2B*%GS_A8Jith@-cY-&Z<^gb}*kC_C_VwmV;O5i?0=3iIfqRYJZ#ta`DY+lW zc98Oo;#^-0HG6Cw`cFVhS~EuHrxISTP#%|ScUn0f4>szie#)|7p|!vc+BUE}sWL=v`X2A;uR}!YHTD}g>S*(CGDm5dzF3Q^jc&$QUOzZm*QCsSYSAeq zl}|X*;=Wam2tNFB;!V+(x<7Fbc4?gm)i7+DKSC^CsOj$;)f?K`hX{<$-dOI>R6~OSLQ7xS1(v8qhEW)m zE&-P=>sp3Px%hv6N|6r?joNKK@P<=l3NQQp1wP5WHYiT1K~-hrXVWM29F#bUWuUI- zxmI(BQ9e77?MHqeKn@DPt4X`wR?BX(GDA6y*G3&N?;L4_HT~WWDA&-yOQ~aW+Ch^F zVqO7s#y}x>sFFR0ZrZcD<(tvo)ShVivLi46Lc0Qua0GaExnw=w64oR4v)!%|u#W*J zny2(W(MPl^xFJ$3>|y6&H(n<&=yku*bRMHOYhy|0-AQ8CW7oV>H&^^@fO2FxvNop5 zb8~u)me_C+bC@6cR_!4Kk#MUhadgJXWC&mreZWK=G=ly$AN>1kmNjFLv1%F3rPtk; zTjRI`SJKaHDNpR?_hfa(c}K_?Q?IlrFKqhV5drkYftPXPa{!3p;IC}^Uf6lOG=YcP zbK}Ejjr|lHP*Q4V_`q%?L%ian`-(5-3R4R>7ANw9V~!WQHr-IBJgRk_-+t^0-n!JA z-j^;5V`t|_Rp+J58eR{mm5S+eXTgQuLDd{&EAYfz0Sz+sL(SfkgGt~Q5tdTE=Ej{X z0h$CmLPPldiZYnGyQqQF5{ZWyk~9~;9TTRw8Swrxzs19(CJHr>lRB*x@_x^8;PwiwoUo zK%nZ@vvJaW039G8Ld*tCU0}jlpMH5bHRM;gV{hlyV_1mwP6f0s1prCjDKkA)UV8p! zcDV2=fKts~7Dc@o4%EtPa@cDdY*}@erG(ABp2}LoxbrUT#BL-%96dQte;?DEK6?Oi z@+hqbqh-t5&!&}6#MuazQ&Z6C7-WtyG8471{`lhggE{6Wd%!MMQV*81ln(^RU1_xO zeEAR6gM?hc(g0;kKMl#9>>3%XGW2@|c(AbF(V!%!nw+!l+!QnWW;=T6Jc^oM8NWLK zj)5c)53#cQ7L>=N$_HgMBe#RfDt^TUDrq*Zwu1)@wX*aw3w)ZYF{TPl46c}PbKAZ3 zNucgdmY^Oju1>j8j1eLtJUqkiZEEw;U4+pM*_U>4+6s^~_RWAevr84F6tHe&8YCv6 z!noI(v9gQTGaEn^^mrcghd=nEaaZq|fyWp3$2QFiNu+xTJHI0de&z50Wr2*AQ|zwQ zP+_|5mTVUQ`^OCuiCh9fuW3RBWA6C$6YDocMv4By`jcs}V5^wBtqhl}fqj1mjf`zR z%aMmlR?|n~Qer^yrkk9r8VP9xRONhx@JUIMrNic=g2SR_1Gt~|QpTsn#AN3N@IeJ* zqRcIGRIepd33=rM)vlV{Zt_gP9ECN}+7q6d@=@aOU~}W*8Bh+7i!eq$ymK8tR(E=~ zbGuL@t8&NI4cjbiG@09CtcG~oLSB1n4R$RY;0v&q66n5pIiNWy0>DdyEa{s<64Ug{ z;o*sKFJ1(WXelTzvjoQ|x=2(p{Yu&afOoviV3K%RCZI(_utTIe@j6(V`IA=+ypTm| zX@#m+kQ90NSd>^$`|7Mr)k&P4E~p^@EzL}62}6h@uT%0|ct@7Pa6Ot`YL8==?qAGaC(@6}XACxXnpRqp(7 z_@YU<)m<-J;RPwBP`?p@oSX`JZ~ezQ_K~|4Nw%++G%XFJv2*&TC07q*xUfOiU9I}> zHfibJ`0K|+-a=;h40tQ&^vx7VP7b3J?Jh3)<^?QP4DTr!4S$h3PHB1kqms}5Lr06+ z`T#Y*?($6I^W1v$)%1^`D0DLgQu)&!ya3YuI-aEb%IPzYix{i1e@_b%`+~AhRZ~!d zAY!!ulwLd%Y)bOcbT=>KE*fZwqvJe8y|#)s`5oHWaJIMCOz($8oej?zH8`@xF{{O& zogQKBNZxrJkuxcEf*?+ddP*d!J3iX}gW=$##2RqPgMrLAnXK&dE(C2h_$mBHryjw_}MJr2HomXu(( z`E?k73dejuWKR8?sJA$1D!BuOz2#qOWo9QS>Ue(`Q2(0Dp`~S1?vFVpdyN56gbMU%a_)fVOsNE}+>x^GTpT08P{W#$S%mw1`OM-6w~ zrKZNdRSB4)+7b(X1biMHI(RSv+V^p8v!fLYZDEDKpQrD=8Jg0I1i5gcah>dSO19*B z2{m*K+~1F%OGPur=g}2-8NVOnc?@SnMB!gI$bvoiCu;xxBma35_Kx;v-xOqvI0}gP z>lF);&NMm8>BMocNpMYy=((>u8R1%#`}Fr&Lu39>#3@Qx){`B$Evxd zRsZ+fa%b<_Konb_nC;ffd&6D-c|Riv+_3%A4}!);y!VRzRgM_WL-1)%9ENSc@Icp3 z9T$Z?*5dcR&d+Bl^E?BjSRbeZ$7|slD-N&0so$@{`Vlo4eGCGNcePV| zEerwY?PxNLITfPw0uDmPn*Ml-ptB2^Hb9Du;6ir|Q|4P898`R^F-H_#^bRjUJ1N6M zuvG^-$ivA%bo2{Ak)=4Bz^6UbpuOW~T+jfU(LXKg6fh=xPbE$R5YW-Dwz`++fUGZ#Ix5QYD?LjFF%O&bU!Jvq7WQfBSI|=Gc&zNVQOkO+sGk60PZxe* z5JZoY4*^tCMOx1s8pj>Ab?brSo%8}lo3UJChvXxWW)wjR%7Bt-EKTe&E6|#-f8-;N zq40RGrNU|f%F|L+m}jyXct86_(F%Xj*oVk~@v1@C7_l71lR)u+9j8%we!j?dWxCemg7dfA+fGc367+GU}4ZK9t<7)E!i11*`5hp>)ToGKKZm zgQCPmPQ$*sBjR3sL~)!q3!-33ERt7hkroVuiRM`5R37QT@l`51 z0<5J4NWzUtp!hLt_iNP#TC4FhfU?AT&A}CxKE8(6Dbq;!yhLCyU0#01qxO*2_|^u- z?q_h<+cn}Rl3cqMFBR0n5OMjqtNy*UoRNn-98j{cATFs`URZeIG;plS*j5vd3Xu@;$CM4P0Ol2Q}ek zJX$1S(8BsDHXbDrsa?KQJmDZt2mwO945mphTm8gq-q#?b>^40tMn8kt3L^$vJ{n*v zbnFBAbdtxPj4!NJsnIXiq(BvWw)sGK4c;sX3ZBg14}vl(qobI+-m~u-rThq2GB!5u z=gieTJoj&c7pkk&d1r305D!GzS#M9hty)U(Ydc0@qSUJ{3y!sS zOT4^k<1E&!At8R;psaEie((0&k$%B*BaeHhxYn>%mZBHFhe`h4rV{NZ&y75933tv) z?GfZYazCO8Ptu!1&F?TnuY-fiqt&=8R&xh2Oe}gpalCr8ew4b4Z)bLQWmg7M%^PMxee>lYFq-aF zg{M+r2kY3NBTvLyA<0XhdZ=Wo(;3u;1~32&7lK%Y2VDqx^jU%K0}?`MhH8-7dqI^z zwkE>D%v@-<#bCt70^UP**4pm9a(3cOhLv;MRQwkT2c1PSW8tFh@trEpN^=+69)Hd2 zCcNQwzFTWK@WY$f8*JOE=|TdW5E|BNQfd~zrE-! z!wCqS)q}-2fsJMhvGBFcU=`{uA+e#7)x4B>qrjM{j-!d)D0yh@7m@dGpCO3X-$g5= z9we8>4&~IOr=$ipYD%~L2pu~KWnO&Y&`#0|y7OYW}Sdni!P zzZU8c((=V*_>%(tF5#*#np@N}6~CbpbXtS2B~D3TgCTQ4CPkDo^Ql8R33$!%@xu28 ze(;!YLf|#WQ<9hjAjx+e6|c%Z1@kd#d`Z3=X%(`M4T~Emj%qnd!E; zaz%VG$EE(^CIFyw3(sElPj&eHpgX;P`f7WH$*T9W&w{~h z;wampI~~}gLRpjl2IwNL|MPB-S$UFk?+Dk-LlQrue*t*A3d>2Q`G@66N9l33I7wr!lg*O_AKpKc z(vonxSp>pCm!X)r{m`iki7Zv^w`3AOYWF8QV|TAtZ+Ob#{_c+dFTG^XE3*UQ5cAJH zgz~|{Jw(?(qZiHkqT8~w?_gin<4hft>W^lLZqE4Tpp{HloTSBsw&j}!5zyBPqfYv@ zsjsjZ>=g)?Tt$TkW&`ZpKBJmk_eKP3zr`H~^g{5)rGv-&9HN&#EID7oikbOi+0ZoQ zPSdl5z?$8g&I#VDrIOJ%*q{#+8)(^WioF{I^8q<{acL;YfL*VgC|}?P~7Q3ya#N)lk%66BbJz@=AP6GA30!+bDRodtEkwH>Up8sB>KIc6| zz7k1+e|uYi7*WX8oJgsl2Z1Bk$1aBSKgC_vqss@Ja50ZrwS;>wksf`1ljE?o-9fea zNSRG^w(CDsuUeT*==V|+&|86=f_;I!$9uvn9`)Fb7VTL3>m_{Y*b^iqJ;k<6_h|N2 zguO=jxn%6)QUbv(4A%u&~hmix%q1#nbVa0%5l~{0+iR*+a8K*YQ3DVW=x8=$JuJ ziO##;ka%y{RITCCQ>8!+JpYqz1^YBZb-)YCzwe7<(QCCHN-e0wKtjf7_9qXKr)m5! zc0k@H0#!|kw;*8LmlRI520<2ur87c!YPvTPuL};c<@6E)EEcRgCF~juyj`gU3u}V* z0bQu{bZ04WNA})7UFgnUU=&*<2I3<-ofmgPj%2gKAI(@FotsUE>O8He`ITKTb-v3l=&Ys1#_vmHl}DW>nnWH1AiohS{kqDKaRhFegcQmXO)JyIPc0$P>+wEC{u~ z))R@dvF^wO+sbY`IH`>i37n`hEed&7FmAHi2U013mIVm@S~JQ10S97=DAHmjwRA22 z=wHzgK?Qd4^}ED&JDz>_%JgJWQR;$fghei~i2%kJwZ?DkeAp>a0RRW=9pPOIDl7s^ zryf7h`!qO>x=u*p!kjA|cHfF=^v=>-Uu#^4X(j=+-tF&XWZ{???BZ@c`t)PIUBTPe zXZn#e%3wGVuq9Y-NG4mRbl0L0s%r$lHy0XTYu=@Z0mBR~mq=EHBi^t<-TfFio!=VS z^H@3d&wGX~vT1XS4nQc0DCL8#Wb;8njph=Ll|I7|Si!(t14o{L=PzI01aj$@ zkT-*yovQJVf!I+QXt)X^GeAX$Ie1Y^WU|WCz->#ico(QB#^KrMBo?aL=k?7&urvXu zcnI6N_aFp$6SEFPHvCjyzrp{v5S_BwGLy)di`z7PwmMIENh)Eo?LJ3#fUpVv*{K3hm@|UA)o|ol@DJ zSTL!ULoj_ZJkm4L(=%DAnJLf!9U^KY3aK(}a2jVH7gkM&N@Xw&LJINLg867~>C&Vu z$)K9on?pw&s_MsH8}d>~_&iFr|B&70F>i||Xa6x-{(+TE(KVAOhs{dy5$1Ydb%!ur zj+-d50}0O7fB*AJelG?eYH{a=cN&ZIwQ^d+@qdM=jbY%Q@ccVEhXy--7DT@`!w>V{ z#NcoI;XiQKKd~P4B$j_sX~Cn%hUI5V)t3`42;nv&$SQaI72>;H>i zDsBOp0iaDq5QP~y(&#*Y8wY3G{t&RhV30si_9m$n;_ut=!IoJRgi^#P*`i41E6Y0M zxRr6-9($SXUZ+W7i89%(UT`HX0+vl`mCvhK@voE#T0~)nV$fE=eK$B(pfORz=`T0! z{-$znzdZ$f|$S~%t{^b4-H9uNc_W4Lyyr4rkBdo3zq*I;m}uCw}= z0X=r+n>XC-gd>OqP9{K*X z^9x#0PgN>8nNU0>HbFxwb|7p>0{nkJc*!qqHq9prI*e(e5O1GRSgnnfu=@h$vi8w1 zqaF&B4Fwv`Sy~vY7EGJKKn_YY39Ew+Rq5^_pc8@7h&_ryv@;dVp(%>wO+9pAct`^Lv<7k#CaR^+og!wTFRmrAj6{5L?c~?>0&O7)dajY zAEz5eDjW)>4(=7CC^h1pgZ))@g3Kfh7IehUxi1NAHK64!qujS5vtBmT_GU!Ze7_t-74@iXP! zcP_*(K~|JfKt))eD(b9}My`uBmZ#u_*8Xayvc)%R^zyv<_n)#O+k>jCr*=Fy zM{dRttXAFUx0@9jpR7gtKp$y_7z*S*`S$kq7!08Fh;Kl&(&Nd&?)K}NP@e|8D;RQB zQ1Iu+C*vfrvDf`y{sMiamOr{}HDQ}j5u*a~5^JOS;<$UFQi>k2JvJmwnEJI9SYT*4 zI3gEFbN(eAYTttYCfNUrDy|0;9dcPClvVzya(@#cJGISqKKmjmjqX8sS?yZh1JgHT zmYw3mzdFZUrmt*54TS-^7tHIjWBUX5`u%1z;q|iiuQoAK{m9`@SF4t}+QOTE=GNg^ z!f*a8@_v1%k^0M@&z`V5*5EMtM|<>?#F9YS&@ z7V%cvS8B|!v$*5XK~-A1gE~N#ZUs6~WppIF-6QxcaGnB2#Pn>*^h{2iDdTvGlrw#3 z{nr4Uf3YR5WYLO3SmODNMdHT>r{-QEXs7bFYe;Frc+xJw2ifx!k7*2rPjo%p3tu%!RJ!<=}% zsMY2i`OO`@E6?ftOFCb3@4n=3S8M*#XtqQ{or2rjl>B235nf{g9TV!^#`SAL={_aijgtYI? zc=sP`r6TW?pgz|uDXDlc2WLM1xi3i*692$ceiw`2|1Ns)MZfIu8mtxi@Ku9^Cf`5? zP#^XJ!m50Rhdn;j6*l7+R;ZSixa#5YECi401v?CA7uTFSQs|;`UGB3*xK{n~568h! z>SsRi0>#hLQg-l&gco9R&#()~IJNIyCF3B9m;a|47EBRshrIk~-)8xgyvoSALMI~DC)>|F-X|HL4dy9#{Qb;YfpTtV?(x?W|0K?Pr7NYYkw^yfotva#PFbOBB^Eq~Uzltw%z1K94b# zVdh;b41?W!iHO|g?mxJWA{gvR$s~5e{$T)e3v@Eomd0vRqWo8hKd?+ zSJE(OKY3@mL*n{e#C9Mp5jr1Tp-#o^b?w@J8oLH0L(9^B?DDrVU?#{z5O6e1`($s4FLOlpw}X1X1Yl zj51#k3CM)DM6O~J(&<9{^OIP$q~#VrDb#_qe0Kcv)Fqi|*+=UYO_%ned9e)nKpm?* z4)Flp+e?wA_LC*9fMWVFoDhtiF3izk?z{5$P5cg*BxP}S>K&)Fm6L9B`k(D)>EL@v zTjDa_f3I$9la2vqr3__=HsMi18CdTCf|7AupQw^#q#hn<%buS{OG{&o8(eD^Y<4e} zQEm~WF5t3{PBG_HIuyH2A^_3`XI4)yW{hE2{th;2NxO%Qh@4jJpVSLb<-4!W8shhL zxweI5Xs3v%F9FnWNp6hbJAXe9|Lp<`ageWF5FGpnT~<3tL?~3|xu8qg-Q(?8jX*8dbX41#d`T33?7oL-`QNGKS152&2WJyxn4aCDx$DSIe(R zJ!7nvtxiq){-ow|a`o zwg8ObB(1!A|7tut3;fnZd|>yyhSeHrq$x9e-j?AeLN7jof4$IQYqs^VU_qR?3YF-} z6NnOAxM?Y`cn@96^nt|F{48iFPyZ}cGs7+;P?aM(9(9T!@!b*T-YdN{brw$Yu#Qhp zu4}e>dmJ|TA2&ULoAc^{{8B2Y8$*22q&aHEU6F=dv8R?CdDYliw!q93c9P7qZeNC- z-`~T7#7^f*tf9xd$#K3{bO#^U!w62ym_{xy{5qBa2jS=enSzHawvJIEM8Z+E(j^7kl-dXG~%6)W|+3&{F7ZWON z^7jkgJKW6g{^r7S-b)5|`1GwBnIVr)gE>Jj_K4`NlV*D+8a4r%0J5-^&UPk+D9u<2 zm{AkKA}|j>Q%&X5lDni=VI)_8Hdozv(}TV9NeIL*==C2o$?aN~ZlKVHYg%U??H3}< z-{q(g($ok}gGSYC4xQd-zSl^46pNxDqhcWynXDA+*6@}&R*e0qXV3MPXLDqZB_-|) z($cumtnL-*p-;oC<uH39$(<2bTZ^=7eA2m3+?p8CzOmYlybjPP)clW)g^S-wpKQA+LV=U~0)E;Tb zLvx5n7f~gsoiKM+T(9HxjI4&e8IF}JL<(@vTs=;k9EWceB3~Ci6i3>!*H=hz?cOy) zJ0ds3-LDX0dzzg2HHYINK9Wp<)@1fcx1&~_xZ{NjYNfXwn7y2+aXZA-d+GUM*17P? zE#L{&brFUDjbyMmuzop7JHbg6dl_Iag>Q)56b_A`I(bxEP zhh!5<*UNdAd)|rhi&PnA8iue@-UE(#?O}N#|77z6iXYq|?}S5>p932-ghgOUP*s7% z&H`(Hq&s1+CMWCsWVtj$^LDPEW2~BWS~BeE>Apup#w$atozz%SkuKax;_mW?KJ{cF z(W|>%HJXC0gd^q*sgs2LFN^AH_#S=xq`N7trTgv=mJB@w(x_niN7BTp1xBHIK8k=n z%HP~)#g;r-2=tq{i$R^+XanK<6)>ud0n&A5tvevfYf~DQxQEPm`;7c@W9LiY%TqFg zpiPB5>U$z0Z6CEoT&(GgugGq!c*w2>i^vyy7uswwWX)my#0yF}fq{?2mJ9J1r5>b| zR)JD6Lg2YA7kq$C97%%Al=rbAo#vjkEUL-bAzG^*vZgCafx~mtcmePy1gEdzySk}S zxt(o_lieQmL{EcOD3Gu^pc~1yCBu`E7JqnupqMy=Kn8mi8mWmDa?3o5AwvWF9w7&2 zrbW#b6CP-o_T~SZ-H)dc;e1Q2|=hb=o@h1aO5e8s+g zXT%IRwVqm}9Dh1!?4`|LJ^nd|tTOlMZ~5{9yIYa_`x%B7bdnSui8-LJ-~Ia?**J2%$3M@m@|>4Eo4 zu}70{bXKZ$UjT2Y>+R(Fd%#KQ#>b|7=R+fnacM}%${j4nCTeKTp3Fdo|3;$@s`9RL z1+J{y@+z300vh-K@owq6mz^EIo)ur%T(@%Iu__45d~KAg`-X&_$w$I-g@`OCcex|{ z*)zReZnI;cltlm#PDcb)H};-0|9UWezxQn#(P2U zk`mMQHd6Mxk`)vj_oYfBGqVu0RQsLGC7NZK2n^mU$LJcdm;;#gG|dCQ00g&q32>-b zZ5#!8_E`84N~{@q8;Lp@vp&k zTd2346Ju>ptYpEcVk9{cZ)702aFx8Dp?ePCE=JSFK})Iv6SC)Sdd%tJ%on=vRI!G1*ahE*ZUPc%W-=#LBFH%AkfgoISEsR$_M^`$Kh z$u#!0?|;00{$apo@kA!VZ|-sE$!+UbueqI`Mc%E}ng|wdQfK`Oxb_=mcn#u~3Vz}~ z{|h|E=QZ;4h_kYD{?Rr5MuEane}x8rKjrYO(!KxNQm2aA{bhsvh96|z{)!F${`vsC z1&pn<;?ci6;&0gHKNuIwSIs&n`y)J$_Jm6KcEn50zV~Ru*6d5fyxZa($7OcN;NvZX za&kKVQ0&0Dvh}Y4rBC0j$g*r}XJRdH=hODQ)maUV_K$9^OQr2=xONR|VY*+(hFZA( zSKEbvThUo{-$f>yy}AC<4KE3mM7z++zTq^&r7~wM4BRR9!96%RE6 zwoO{nlDZ=#?3~!g`0=;95<(s-U%X6Tc&=-xG!sOA%BhwA`*(MBV{y*uszn`;89qAc zgO=x?8Z2(lxBsA*vIHZR?C&PposAj#$?mio%^DS!{KGw!16&79+W_{7E#shXZT>+O zc?0U1EQ`9&bzkovjZS&B|Ma7PPW*36oCN)|u5vP`OP29o5(>kb05vnrJQ#DIV(do$S6{#TOR&1Fc;zadEnkNeBk(@d z#6o_2<%Kqv1ndD1pK@LZ{*BuL`f_tXJ0?+$zYcx+j^!qsxuNr@wEIBO@%IAdP@s%F|&C(qzsbLp*bjSBT$ zclb;06*VHk%uZ`$GM(alo9`>MBpZ-Xw*Z|L3yk ztjzIly9t$87=iTk7?{7%_J^sZ^c2kfD2WpEIe@OtRXAiz=%W5kQG=0a<)U6arm2L< zg3tA{6s^9AJvzy_6RP;7tzX;sowq}Z<||JaICOh zwbJYl%LJTFnEQI_G*l`WKiBKFX&c9V5ifl^v^oWJ7MFK!L{X81eLDO;QuU-f@tUF|HVP(&=JW-;qDurFjbo=m&?78I-Ztq4orHLJXX# zf(EP8v*Gj-#t?($(0VD$#ERu>)Z+H>5!a;o2-Px?Nq-dx)cQ#;3AB#MB0km85H4jf z_1WJAm4)@^TZX8l+C84{t0Z^c88NGp-~|N+bu=&OM?g&HJ;nP**Va(DS;-s9Hsul>0`VhhJ{j*of~#P5TNS;`E0}4 zbqlETFO^Hl&})mkM47B>xJ>oFy+8h^xnppU@~n^-K_A3ICR^wCM7&%?FEh!w+=ZTY^eJA2>q_b>rf z>DEJ9U7({;_4mhwp$K$q)wuX)5qysr#D@qPTj#jt0oH2q@s2Sl92n95-2e1X){cXU zCtAHvUp!y=i*(8MU?C|io_%31X>x`z=F&~&d+0o=|2kp6JV+6_e%XH#0U*9uu37D$ z_tk&7im*7FQxKZjvw45ejDOS;*B4iB{>=gOyIzQgpa{-{wz133ZMU0!Y0#0mM;m_i z%`OWeM?QDf>dd>b{OuPl^?Y&qIC7`BZ>C@mK)n704}Vt=z(zzX^iUE_ft}s2HVXi! zyu1D8dh?_0T#+*{2gnkw5O7;oKPMLj_*Xp81C}j;d1n1+8;Gm^xBW@ee!$&Y0v`+y zuoM}B%mGD<$e4#=|C)yW<#B&MAutW`S|cgXQ_+`vg1IXgl(paUj5T#}(Q=;)Z5ukG z=s>;)ApsWOLfbvo^&1H2?)a6rv4^@ln$}rA2TbC8yWV0q;hjCM!w=xJgGj{rc5)<$ zHqsS7(7Fiq1DE?P@ClmzP*3pf3U@Btp9k8lUSJT?6HnqYy$up8v{yd?+fS|gspkFy#WQa zM4%>n8L#;-9Z)tn&omYtUklWC`6^z38Pl~jpoO_rAb4*UB`_!-b4D_c?H$uzYWC34 z!v!y=7C)A!dQMdpj+~JXI}|f${zK(C2HjkK8wZEOA1`1HgTYiztS`^=J43$)RZuu1 zoE8HmBNbnHKu1^LSyB{AfGv9uE_wyJ%s_!p@*H?1s5tg7O##eYjV&73{BcQ3Nhz*C zO!hvpBn6r&$0KpDn1GzkYOs!>$x@vH4XSTS7KUg3b_g&c(IjyEO)1-Cft5w?8RFKh zRKS_#jIyJiim2Ncp?5t^jnl2*FYM2;uKpnVKKCl%QBxZ0DyWUjtJg-nW+(3Fa<-nn z>`B-p{HJ1{@hhM;+{b$Ef2p4EkG+?>^m2U6O@eq^l%F|c+&Td z+%u^x!0}Gd(5~4ntR6j25;{S;dk5nJinWR+GAtg6a%cU`ef)P@L=G$tfE9%vh|Vf_ zg>vjz8>Mc7Ujarxy3cC$-p25^f`DrMy9PRoA4>4ae>VE5~Yz6L1(_nWfB&-*jN=(Phd0*e=f&j*G}q4W@CUw$q+@606kcH}SU z84@AoS7zg~o=u8>7Is3|STipa^Be>R?;OK=Vg1e#y;n|Bi%f=iwq<5^cP^-AW`uXF zg-#S%zs4l#Z9aY}F@EVJ$n37*ojp7PR3|7oMD}IXhS~Aawiv(L3i9)UA7c%P(F2%I<2t6nmyW7aSuO zkd4fhO`aVsx5w)v^&XK&`!Qrj(JK_}p_2X>?hoP{D*_UX+Os=Sy_3G_ejIizJiQ{aB~hOSmVhA!P1Vxzfylt; z-bV7fhYeBEU6|NaXz{^l87t zIQQqX+-QrRM_;#wcJkCJ(N>PpwZnDj>y$gK)&Ce^{JR5enrt`MD=6LJz5D5A`Sk`iL;S1K<*bx=>393uX>>Nc>ma%M|mM!@C=vu%85P5j3a0o`tbj zcWBr`lI3AVogv+aMm+~?+4c39_SAe%4I80n5F=icd+7dSg1h4yl0rn3phO-DjA zXzb#PKeiz{AZ=2jmF!p))Pm0c>?lRHG4J$6Oy-v#?Dj{VE#g3TMmy5-Oi}H~zyO5h z-5mq^1j>P~>n%94Xz*(gr}|n>-TY%6uF;&ai)LEVs`c0q9Tpj_digZ#V$aVRq? zKHH4ENDfC}BV_@PbkGUT4AJP?=~n@yQ$Rc{T*(2S>t9gK|MpSw0M|YiFf&0bzXAg) zkCpN4=ZXTuHd9sEz$?i)0EaZ=zPEsbDYemN+DBlyBV#Z}!l+i7B_k$Mj(Z_4@{Dk$ zExpz=1L_W!A{m5P z>hmCJ$*iFa6@8%f;wl1MP!L_9mJ=YqHT?NQlBl-`L-7lH`_giY5grzp38>9V?}?)t zb%0<#FU(6N^kR3b zYsQrM0JvMwD4k2^>2B z0`cHSZN&XHU@GJ&0#|yA^>pm*vjky_SPp+ZI(5UKd$2g1^=_|N!PiN}zCbQ}z5oMVvYxBNVoSbvSp6~I=tBXE zBRY(79K(wDjjKmF|Fbvr|Hy(ja$k^dunSxyK0nCgclP4fd(R@^qJmz8pg~AbMkkcL zf4=V=mTR#|Q-x0N(?+t~6+d8}M^Ld+3oW9v zOV;IBX0z|8Jk^ z)W1VspX3E1U(&Owq`VQXNZJ&qm+)gvnZz1u-I~<`;r~Plo3DR%yxoMWMj+pvU{m0r zf~>vM(K?b3S;7wRyjOruhjlQr!XPO*@faA2szLQ#2rBO3?igHKh-LLi)mM1?K5iJe zte+?8HotDjtV_%8e52%VAFi%YjWye;DKL%^09^T;*9yYk?@H)6zGCwHXCwg}snnHP zg#DA!**62B+4OKqh?s)|u6X?a@&?BXUaA$voQW;5g4v6hQ=6`Z{Zl=rwf{v+00vQU zyM&Q5G1e@X#Rs;>;!Qz2z1_y0)L&VnMIBuvFZwOB&I)CiT_5T`S*s-=Wc}xh1QAui z_L=_(U;HkE|A#fw@6OUDni`2S-<@VgNQ>Y0U=MQXC7G=^0Srhn@3!1w;^-1du| zl!g9ZSf=K{^HCCXLh)@q_T59kz%rV}NXlE{}(=-}|Rd`}ZvX z*as>N$p{#&TyRsrloYrL-9+(Xe4wj{ z0icKsIC0P}aVYo{Bcr0u5mFNW?{Ej081|um1H)_Rx3_p5&q#ni9{4kg$KQUt3ij{P z)ycz^0ZE|FEZj+?0H!Ebt+jwIsBDHZz6TKv&jC|ykmp&d4=Tuf-+HR*Muw6ib$L_T z6Td7F^|2~>BTc);+rYq}{s-_a3;?15?LtFxFP|jPB0aE8LNz^HTEYPFU;>AyiW!8v z9_8|hc#5KZI69ND7?UR~34kz)A!CL*R76rLDto~r0h9Pq9;~?nG{4u!2}D1Fw4s8{ zyvicn4l5A&)bSqHTz4`qn<}C+gzpMiu{k@2H-Mc zC_T>l%=M?tHd$VNdOU<(zifu`cf19p5(HqZPeXEx4kDu0R&UGhTar#ItjA&Mht`75 z=XLglgZ)ZKB=Bmd`G{Ig#o`tW<^8OkB)wG_};q3 zHO}h+0r&%>^|Ua1zr_ISz`YpKN1 zOPgE=!^cxe0;C88YDylBW+eNVEu?(}HP(%6kPg+K8ujd#LqPM8;7rH6sowTXo7%(N zBk)d&WCOopGx@&B62srBzaPoey=5%i&bNu%AD&B88-Os#v0th)YpU2AWsBc}=-GNe zrwU{Xs$5bGcYHY=mK86@@ht-|IvV)Vo<*9XHGX{0LwDzv-@WH#Y!KOZw{W=RZ?|A={TbjyOU8g z*<%Ap*DX9+x0gg0_4<4D4}2rGQT+2Wy0<49rA9$a_@cM#ja|~PDA0~=r^kJOwayh+ z{r)t0h=79tR>;wj%V%Ix)DKT9#2b2j4zhT5orm$oqVzugsG`9>);F#fYSb3WW5c2p z_AdYfyMkn(pDqp%UJ(GnHi|s8@a(|1W{|iZ6v}+TCt7}^zIGI&RXn*oJ}b~V9eDPD zl?K9Fyl*P;=XnDmI_&gE^}VD_AVK~T4&nmUhnrTV7Eth7Jj>a_bHbVd&*@N~CuqPu z6z8!+@9su#-l7PmjnpKDLdft_zefzaIn5Izz>=;S;yK>EgWdP-{{*$M{q1>KIyuRx z$r6Vp? zsOxz2qr^?AJ{pfQ6nc_=I-=_*{Ib&OH^u+<5w~Mxh2&LsrjnlJGQZmuFArNG5_w|+ zta^b}zjIql&x;DTITt?k9^9o{dZv21g9BWgijoU{`uGLd-LU3bzSx1ut5p}KxH{e+ z=Pw?+=0))ne+RBzYM$Z7ugEFTR`S?ZvAcM#R~1!M%ZE#P-@~Ls(XXxn=KLt_EI!I? z!w;lrSm||5dLA9BHkGE>Y;g)! z|MpT@_WR))3kCB%F$^WamyeV`hYf0$E3A4Qi9e3Qc@^`fwYW3mJ+Cxq0Tw?S6w8$5 z$f?rzYs9M1N`{1kiL*wfxK{HkRwhs_$gC_Y!~*Zg^D0Ki%EeBw{4~KNL`qEo=05UB z=XHfJHmZmORf)X()xKxHGA|cpx0}opIL2-u1vzM4Ab8xe3|@?DfhhN*@;t89(vOpu zG+780j!lE_kPioCQP7?P_l`RqfKrV8RzpW78eLhi35n@kyc1Z04Dmc$plO88`QLhS3U9pgR#E8@@ac?87YoQU zY~p(2>NWx7_-ZHN_xy(3K$t=FFDb9NYH^M~bnq&4#nVn`5O1Hmw-WFWm{0){jv@j& znDDhxVqzW1ZTN(p?4Uxi=&#lD+n10NpF|LXt#`YA^y+DkM>f*APcPB7L>D@&0V7X!TJKuuRxKsp{!`}4bG%0Gr4Iqmty&O1an9_Pr%-v>&VXrMXf00S+A=V=9pne9bhro7Emfm#}s zW_^5x>FiT!3Qjsx!7eU}vJEYp8;jj5zk#T~+#Y8MVM}IzBG#qdlV*J-7WMVgXM6UF z*WV9sPZ2M!`nC3__g(=|AegiYa_LRV@OinxhV%PFvd_b9T< z4;l9L58^aR!7kvqPD6Zoc`%Ju9ZV~Cc-Ygm*)!>WIDOnZ^|e7zux#yCiczl%#V5NK zegksD*X?8Qq^O(M?%~~#dW*#~ruUd`e4*>geR9JnSQyGuMHPrClb6I$dp?fo;?R6yC?)~DWGzf(^=0F?y?YbUQy(!uYWsk z4A*h}`>PolqgK-65NgXqS(*L_9+y*WiSY-A>-ndaQ8%9Ibg4oHaTmWj`YYm0Q~7VB z0xu^U$;1_67^9deuTS!k$h5bQIet2$b zbz^~(Xm?MgNv4D7`ar%$Ae$GhV6RR@*ObWvL&OYM z$s2A-I zPSZz^?-M!jik>BtuB@626ix-Ux61ZG(AH=IV7@u0RnmBvNLdJsTf%8n7LYx_#H2B& zqpY~@VU&n4(|}V-?2Xgj_T1b@o$bu((DsI1^8?xAb$GQB?N$PNkzW0e>+5{*yLq%& z_|-Th$+mFXJ2|AEt*2y0DjLSQOs|LR{frlE!w7v{Df94wLnJ>8DU~fl2#dL)ze+%c zvvyvu-I&0Kw9B5>VB00xn@Ft?VcOyFo3 zOjtX!Zi+HCydHm_*BJy5urM;VgCNp@GLfV@S@~DBOzu725B+#4qnwG>`^+@)E2v^+ zwz#@QHmBWp7Ys4cB|&<@&NstV6@yA^{ibhiEIpIyo`O@>lV6llDxqV?G&q?C+r|Y4 z>4xi`6_D=R#ki6w5Q#1+l8}ssiQ+rBw5`=Y3!a>xxK2Akr(>Zz-$bHtS4|XdHRaJP z1aZibsdz7tuWab>wdA=Ue$%G)nLLLCt$RLvve}fP@C#=NKWh4q2Sr|7M+fl6xL(mq zZGcH%4u0HyOOF> z+uv^mu>SEr@+!+jC9K>vx~32OSCl&b@oT8*BkiGnFCglo*r#W+r`=&MQ2z=?iPFRV z@mK!BPwc4=JOC*eJjZX;zn|zYjrTua#Q!J1C|bKpUQkYHP>$)vzi-E%R}!s#QPd%C zV-j;aB}GagYb1)vt@-whjZ--)qu})~+;|B&$ zPP%^C6WcklD4zP%0Ytcy-ZM4RLW~8F#sB=?bcBk>f35%i0l@7lTaw99faN|%CdIqX z<@P4A8q&)~rnI;J{u!zi$es-GcYA0S1NkcS{I)+H_q^EVx0~}{pIq@?)-5p*muIN( zINu*Zd3vDi!L)1KxaniV*S?h+$^;W72sY=w{P&Y(w1+L7ml$U6uVX8l9T2~&5pJcP zF&JkejgCcjM`her`D>*c_-#>O1EFo#t>yrmy7L!AEHBd*LEW#VR%xvRjBBmsZ$B;l zwR^F0IR`8Jv3ue3BIP@?PmNAjnC+1tEI3T(`-Dz`kC6C7u+nl}IGrJL*}&t!Dmfvc z;1rk*-VIxu`dS(G6h-TM@bIBDz}}#MDwEIy0mFK^36S>@&t(?bG7CrLtAjIJZKBd9 z4wT{MUZWCj9%d9mE)Z>^FkN7(OEm+?F|7D$DWkZyRBfo7R#YS{KxJZ4FJ}`(9p$9E zf<;P7s{GkpP1p-Khr8jRYoiVD_@QI>3u%E!dwe?C@8@|Sr{1$^znM50S6jt!HOUpTqz#t;8|Aljl@EZl4=Vq5^3iw0(PnK;vARP^{(g=0AZJaUI7CPT_x*j;Ul` z3ZhO*c~l(ZsRp1+Hn!UBrzz*WAI#N0m`>Mvz9|H3ro73cRw~a2#!KqTsKr8HgX{s0 z(M`0nMcRlAZ_q`LUIBV$6|@@?m|ghrCy(I4*Y%d+N*n+d#7=yG4i^UZs&lLZ9jZ@; zUw=NDr$pOLFA6hRXp11525ybzz!AEsFKiMdcSs*i>e0<6*-?a0`;HOr+D?BHYsy}`pNA@DKCY-kedL0P(%kR_0SjdEK%FejAkYc-Q5P1R{3ek9yfhyw$UY4PPF_V4m{`Qr ze7OMIlmeqg)#6t=^Lpd;9wqE8q1bblvNb!L&bA`xhLg`MHc{c|;26rt^wi_I%Bv6} z@^p+3qde3s5KI*pv%cW$uuI@@@$3oT@M{eNbQ~>tbLD=p?78l;?TN5tf2E4vjVtqp zdrrPZz{%<`kXWHm!X^X<3;DC5G? z`FJ-%gOTz)zxU7hFA!%Qin<4#xH{n}-uw>=V>hE}*Kj-E7Pe-O&DAIYnPJ^t#znD! zL<#)Mdk#*qg)lU&7fIkG(QU1UOq#mJ*sz9iy~#~O>%F2d?3 zkxZz!d=BCafH!)x^j;siGUIOhr(-|-urhBPKFoQAc*fx@pDd8Q5^APW{7U%zozkOC ze*KOCK&P{>DE0kmKrTWe=O?5z4E)x)a4;Vd$0A_BQnGLYgq1YrV1_j%@T1FaG;(pw z@PGM&>;Wc*M&KPm%zcu(`4-wb*qY8cvM}T&`M?!PN?N(onKWuCa?~l#%`m)i%w)M~ zv~ezjv_d>E+wILS^4R62+#lG@V?kJv_EGyNY8R_?IA&tM=(d*;l zGtWtsGIE}H;9b~yp0n?jFLVT#)!c>hv1K(}7%mm9w9#Zq)?DeL3Az4Mr-WKo`#jrv zf;KXIrXX3pyePLeMQ3TG~>>>A&c)|9U63P zo7lJu`0yC54Huf*mjk=Y%85#g+?JbjAxhT(Xv;D9M7D1m1Ql>k7HX+?ljlf1fMFcp zo57`1crk!J3kHlIBBJ8?#RMazMrzzMa(sjQ!%oBRk&>mRq|kvNrpQM+0v4`0*2{{x zfW!q_z7NJkt3G?kGsR61!#(IwUjjshFM!T00GqM^`T&%p;9@#}6Zv932b2qYH703N z1temmn?3(kCkHo8HVo2|K!D4sQqu!rVPPTYZHvhtVpt6xR~Z=@tEdBTavtk*DS(SS zWS6}+NlWt6Kw>j335T+DOJO0D?Pii77XEsZ$@SI@ib0IyOfOT+D`n{WkA>!L11u7~ zpIodBJpgYS?zqr~H`PKW`ck*mM<@c_QJhlA#zzQGA_Z__d!biIAI`Gv6ywlRQzeA?S*-1a>8JyE~mkr$*yd@01BHZR~Mk#%Llyukv`&U}Iy)ONYjCG=CDyNED!hUwxcy6{pvgzFUO3E6U0__d)t!>56pDfPnI_tS_eJqoz4}f zEZ*}KL1Q+&pKY$VJRX-9A>{EjkXA|%{64PeUQ;*s`mFrttErZmzRpK&f$0^Vp7lzh ziPgxA1PE!0I({PNbhi||3 z_1jlgq?)t6x-RfEZ)6eyYn;%~Slj3G?>HePRR{B)C6fwQz7E?^VOOb==V%*1D^ z6{zwRES{@hW)ww4zChTqUOuPec0sK#Q%?P3*nY z6(5DqeA4VA^r;7@1EUSsETT?h9z*y3+onA>cLLlTg>-8YgdrAXNM1><``F^_nFl&n z58g33u*r~5^4Py0Tsggu1kPi^S@KEbKo>ek2Ied57#Zyd~G$`9QLIMl0$r zLn2GU$%^T!Klt{lJ5`n=(<-b}lKjz19@T`U27%=DEiUnE94w7OHIuD;$ z4q;@sRO=uPh>bSuzd&+s5-EJnrMh~yAJ5(g7i@C}&NLj%gLVN3KOB!INE{-2?uiQN z>+vTcn4fP*+{`-IDyF;I4=kVh5>32XqS|{|iBBVX;F_Z*{(aA-28wNTx&0vtfpiLg zJ=M<1dm{}30xfOVTB?tWeyA;fNoo1+3o*c;ji2NWkZPxkrBsPqOx0DIM{Bw1kH?=Z zT5a7iI*JTqx3*NdanwJ0d^D%O>X7KA={07b8qyyBbTL5?NwO_9ch5|CB|41hSSRt^ zwTrS+zCIedq(v~ABcpV?1xw;_dZ8r{g~j=mE`3uoj&o>jNj6ib4?@_LXGOCm481{?t8g9}k z$YPgGd>aDpK!epg8_Z^ZHDxLudIUHjlp)Hc2n|@PPcK)Fk^Vy1R-u7EXa`nbGd_n$ zLhDZiAud-W>gs8(%&U8na>80adX~+-V>TDL0*Am`Zh&2`$T()sww4I`^iv z%O4b*=5aM!FTlFGfoY{zQPP8#W6&@u9q;;LejSoCz6g9z2fN!9$rBl01#$NH4>aX9 zc-=IP=$&lHqyE_B2a%;o5d76aUrz+BKLVakocITJ(Y?B_ski{q$bzVJEO>N?M53)3|;(OPqCaK$aBA=>x6RwNL1{ zJI!tkQh_cZ1U@DHj<9L(EnywJNqqQ{GOC67`;d9=mixx!tyjSXo-gnPItSX_@9SG^zO(W!TA#>2(ZW z$Bv@F0%7TYhbP#(FYs|~Jq_nat-qf+j+Nlv=V8j0YdeEq{Km|z9bqPiK_5yl2i3;h zcM9aS#Ds>M`0Y0n!ag0Vb$XgtSqkoj%3E~;yOX12cKW?h1+kS9uP|xR?Ri)N?zopl zo|PxE2eamVTSVCyH2u-cD9>#kco>6D3!*;GX;-U`Q*j|;O3XY#Wx(6%UZpk zZ}6tlzL`|zTQzIvbYQtlnJR!!944w~Z)4(3*mT;@m$a3ziMCaL?y#IVew-una+}nq zpi!%Qb>u_tifjT;p_YXJ2^X9wb|$e}*2@|(YO@r7$6P&%el^UaKs-!B^{x5`)*g;nRwqnBwzI5OY{J&cN z|HKkJ=&p(@@#g%|YXAQMMESpmh2p=kJ5#a3D$A)($X6gpUb2Ji^t_Dl(@#r(QJNlH z{8uwgzmh2k-K%O>~RV z9&Cu6SgBIAeyn*Jmb8xu2<)1n&E%}KaM{i{-}1;P zg*X4BsFtDu+nIg(ML%}$KHFkBlZ7U{4_ryr`_;14RZp9wC+ecR_Oi+3&*nh#c=Mr-XS&iP79vR^Kl^vye~L5vXbH!`SfZ?-){X&-+})gyoB8>Ri}4~4~{ zrN9mg1>D%vgszx4U9x*NLh(7X#IGnHE>csb%`Q#5C@@8D=FXaQypNH|J~90wn|(`p zahd>IR0&$Dda4o`K>dMT-25#4YXEhTu$=jM#fJduf;dJ;@0he%Wo#3fb3p;~ql*^U zo)@C7&vL5h@SXh54?$|PFFnc0*$z{rWJUX5t#_mfak;h6i>P*7J~NUPxhW{P?rcbt zd7ak2+EH!(NmjI{r|XLBE+O+;o4wdMTQlT3L(ZcuHmggRABA$5?d-g3;?_Qh$6`EP zzk^)|5-VNL^Bu73_I7SE9)6?27QGxdWxSLs2uNi;tX1{MD-KBYvPe>`t*Z>^R83(} zyGZ&t+xo$aW@u|OeOA&!J|>|~VQ{<2G3WWlj6>hHAGS!OTV0oR9L98Vww3R;6=q%6 zF&Cl8zmWg~PG?KQ*5xw%frWP}W!W>Om*J0gFCS%1WbnA42M7%JiXMJ+o^e(?b=oij zSe5IX`@T#BP`)68dKH#>Q{w>0#u^JtH;xe-G9(p+j?YC;c9US$oVms4UMOR?y!cP!<_%||mlM#^ylbIt< z5d6vZ7j8TY1{PuLPAyh0uP*HM6h|k=+|KahzsyHt&Dd*~h8YEbf$(W0v@JoD&~*D5 zhXOF)VD=jrcxd&VCV$6i(N?JOZBy;e;tW=6-C6%Tf!jAv0r<0MvB_mU$uO8teP3GG z&Hqq;PqEI+lbh;Pu3AU*t2_g)-RMY(A%Hz<3OygkONn{=d2ey}<9;pcadW6V`Zj;o(| zo!miQ`t0?-wjR}&fNO-JbLA`mQq0=ojh{gr#ePLj2CqR1e3EB&=8G7-oD&snxDeMPRvxfjH@5 zgH(V9^?{5A2;*Zw8sSs5^#zgET~C}5Z~5Qcti@UE_| zq{7!IC94B)tDYb_6zRGfePcVD5EF)BEDH#cd$1r5yJXU z<5Z*Xdr2NA_YVv>>VoPLi=2l=U1%KB9-H=8G=v!lP0O-gcFzRHPaNihdD`fAgK)p| zgI7p$^IILCJ&1d~$>;%)e>3iNb&hqm!;bdnsqI1UCLXMPhm5(nM6-Zw=z^}Xd}L2~ zaw~MBflH%=S0l_5Aw6WWQYW36e%YBwzrg7nMlG6RQI3O^!e3@$L1HWqNCtzGzWJ{W z*~b_C+M}9Q^pgNu=CmCJkeQR!5eBc7yFm)j8?0c;ryRt(1R zRzMRwU`qut=@NL#HyqN%-iWAyhVnIvH|Y)%Bcp@rJdW*)c+zgi{<_)mf+jslx2AZ{ z%hw5+Uo3o+;Bi(=T^Y#j1Qu9>Nj~@dPsr~`2-Ta?EZEe0jsO?YBvz%e8_3qBRPUk* zK4^s!Fla1ve5{#7JC3I7^r%d12Ag379m$ME2?5GsZU@WnNWfDagsl3z zT?x^Yk(TcJM43uGFP3@?M)x1+iW- zy_FfaU4P5nZ#PFLUW%D4^{@?wpyn*HIF4z0jr9x-B|w97E0LYf(`%q~{R{ndx(MKrwHhA z6aDx?sGf?^QnXLzzf6BU+za$Kd}XiRvyM!%lSM{EeCSdA)e;iMA<)X2Wm{j5U4z{? z0>KD(52TV7zI)bro;p$bUK7JOBwxjzzasGr9KA5*R~Rj~dWd!JKv=_ZTCiks;FMSB za5^~jP6ok^vzHqw#m0#a&6gYv(5oG_IKAS&hZiO;0>p-_76W1Lf* zr4Z&L&`AAE>VpNd)?ROY2=e20`ZU}VN+zgyu&U}%cLZ1@LGTQG>uGj$|Wgaa@(*>zTj)dAY4UXpyB62@m}c~d=p?R zFFi-y(?El8JkZPllC5_?J2%%%gn_y>13#=Bh^x(vUs{+9 zcg1svI;6`95o(~S`eyx2J%MPeyY+2w0mp*P-FU$wQvH6tPzKrj#z1kto;Opd@*CrR7$C(}QajL1?o45nYrM*V&&6TSBVZLOGWVyC^A4un7F5{nlRZ z`j+@vysk={c8V`*e+~OaoQ^F)5U=#il%8|3%SRvqPvL<7wbV}$TQ*YKRuWanlq`kB zZursFJmqhP1SmSzibw`+`t`AL`9V!NE z^EoOBh>j_UEDJn;;r->w{HZz_Bj+hw_$^A#>^>U-3+*j?F>Y(~_xy;Ro56pDBEL}p za_u`)y)jcGiSYA8lF%+-H)W|v(czZiV)A4P!TB8525*fteN6R(9Nfe1Pf!w~ zQ;5P1d(-6vOcBai;DA2*-nERV>jBIVy|Y}hv5AH zc78pf(zsFAGDU5%8cD7i4f{8|O{PkB@26Tc^y661SAodtMb|&L)|Vhia*VcJ!4R^? zevAmXRe!?!l5hMK7a6Ul56J5HSnuL{4->-CorE8v0aqrOGOFKWEUU%MfmR{$YOmN8 zjhetA`mbN<`mnWwBE|o`*m;R9$LeiMe2hgB6$Y>&4NQTl9z-+v8}4!vI-cQzrN(wV zR$ip=P%n@33x)1T-yw<4issbL{t}C<(_J)}-0bb!PrS5-*L~j^op-U?Zyw!PIWnat z)pq}AsavZe!4uE&A;)N?E#=#HNB-KS=n(4z-!2)QGNn%#zBNAuNHhxBW z4fo=St~1WXNu>pc`4la9K#HpRD9S~C9*9)B1+lU$LrWWY?`Y`(4np)09^ZRcIa|Fv z1w!!4_#j;v>+hdwYHE&hU4_4R!>F9|2mq$wu4%$~Uo|ZI>ieI(2ZPypZM}s0XHU-~ zhN}^saKS4}{+gg@muy6^wfpF=-jcAO0VHt@~RUGuO0 zIl^P5NM9~|&@ie2%!*Q6+6Jf49UCS}Kmu*8l3Lc$<0Y=QqY^k57toUyZ98eU?Dk{) z5y2@l?wKf^wSz^=8-X-zc_G}+wL+fkLc(kBhTM(11IdksectT+49~V-{XtqIZxWUi z=S3K>#4o}y*M_pV%Gzdhf?;r=E3EEZM*1>)OB)6%q|Eo*{wYlVu&kH9 z3LCpn^wm83&gw3>oEfATf=D0d_iLjKN4+-A{TI@@&hp?F%m0n~lw47%g@|Jw0v>-^ zwawQ3W?X^XC*OFS>-+7%vcU9fv?FzFl^$MS=QYt6cu{GBzChNFPw-lZ6|=NE89IM? zABN643>lt~cH`I4oQWfl|0=lVgXQgP;3CNIukt;J99Z_viT_3-(qLrI0HV6*Y4MV8 zbG>i3zj*GZ^drHSpLsal3rxO$iILdUn@UET2x|-S%v~JajH*KKO+1&I0h4qR_wckiqxm$OAYLfBRUwj+_5tJ+};%{_C<`Jqedbm7L zD)X9;_1&+s^*>Ro|54Tc! z>a+fvuJi3&*mc{h42+k{SFlA7Tilh?9YnE3RlGi`G7U*KL7C*jnGSPIkAj$@vd2>+ zxz1jOGAhsGPH~^vZkQ>rRqAk`Db~p5pMJQG9cRv`vO3eJ)O5(3l6ly99%{ViRHN$< zi7|65)#SLj&XT>>^WC;^#xY9L+%s=>)p^@CiW?U1`$N0g01|MtY;eq=6F*obX5 z#%TwqP1w-37Vcr(k}h@TEH5=R16wVJa+6K8bX1%!MbT_&uaVT4NucRb3~@mFnnJe4 zQFff96oMYz?C5wz;`yU>ejJ;A-DFgscHYXuzdUI=zqHq;3)RV; ztzA>-z%abXn0=Ml(-uhk!i>*#%{5-c;Y~nPg*RjT%5(0dqh@G4w{1kg*Ubx=wLz;9 z^(tZ5cY~FSNL#w<};3T&n>KM)Yj~4}w=uQ~V`|srO_=81 z;Q_4*;|yr(6vNx2j9L$@R<2^dkFS;EAle+*&U-Hsm7cmjy#01ew{4qW*VJXS^{dfB z7bRKG%TMYpT}P@-E6;J-PE}yz(Bpfgysl9JD(aLmLGxu?lQtW6@n>F6U-#Mt9;!$b z0_?5ZWU*&Dv)>*TXzcbW`jP-qD}85p2(Mxc|uH0tvO$jfe!V$@AYVufLR^ ze_k8-7U0$-2HdYHJ}axJWCPYuf4Ufk+4RSFUWH&L*}s>}e|}ckh(y7lpdb$0AN6^I zK-Xk8Qc+lLJ*7F6WoKxULZAl!d*}F1>K=-WIZZ7HSYFx;@8Vdx)d5zI!?iDdx~*_|_3uiJo<>XSczCeTWq_xvKz$(Fzc0kylU zoz=~0bDXem()H6IS}Cgk7k~!ut;S?{e|1(E^aLge9Z@MA!-`J}TG>XD0N{3z1s zug{fghW{5Q7WN!2I8^W=0$>hHL9Gl_gZSPN=yqz;MJ#51=#M)qx_P(>2Dvj!}xkCGzT8X55Qqu-s#0dXXd z6Xv?cuwCXL-@uxj{7&|pTw}Np5@Eloq9)_d{-TKyyhCt0Pq%Vx%`5EO{7Eev&xB7W z-;wzfpH70ySx*K;y(1)LZkdAMi?n7aq3)@V{aLkl)CB#O8q2!~;%P0E$rout4)f8Y*NP5STv9m&7II zv-P3iw|}6nL$mM|cwzxh^fDC0GhD2d`}4E;a5NA&%Gld0bXOX8lbP42d2Q7lrVLZ> zKOR?0=Kz@-*+}fw641Jb2Hr!9FID6nq}CtwZVJHG+{}1`xo?o!-T!nWNPyNGF055) z9dkJ2tuT-d06TphKQ z@QdX{Mh}GdkyQLDr8FeubXdFBFu4*pUa)EfIs7 zMT4w-h^5|UT2q+k%_c7PR6EEjV4-8nh>IEH`z3*U*@{Sdx|uCdNOs# z3pJCi+L*3kRw$<+1C zj!-s6`%sF1bKxgJ+|p|>ir}=$_=~t*p{xs)-+48Xbs zRtoBAVjzC1FJECaklPs|lVhJ9EMSjrv8#7N5JFNd-5H`-0xEDeJ{+^}u64GvuQ!`i zS-HNKD`wui1Q>x?;tvw{DT?Sy%N6C&N^bK(Dd8Lt+gu8GqJV2Pg1I{IwUSJ-%?8N2 ztI&H|cadh}fX339#1Cr(cORSTTT>ppBNeAx`KxbWsxOPz#Ga>s;C&Sbl-#SX`csr} zF*;A_D6oc9laM_i_z((Q{Q0$Juw}{D0adl<#U9F<54inDml0Bq4V)(|SmJH#Or(Cp zC;^I)#6YAx1Pn9({nE&HYMwM>PBXp~S>$EK9LU>Vg~>i|oG1XM8kEx*12=vWGFN9$ zz$@PHLhmKJG86h&LiLr5%BH^9(F)_(iUo#*}^CTqksDYlbw^3)8xZ8W8V2s@g(r4 z%+XNKe{S^qAxoI|R?Q)by~pn^rH|Jc#)xn=-MkLY^gnmaGCj3|F5MAT4t3SHnkvYO z5I4;iEJNGL&W*G8NJ$0mwoWVD&@GCXSF!trXhs0urr8+C8)^$8q`ZZqC&u&Iq;w_m zt4La0{h03G_lji2PkqMFpA3S$HeG>E3Zk+gDNzs<8Dgj*1OyC11Vws~ z2I-+&QX~a+Xb>a}x`qy=hgP~_=%Ks5b8yxD-0S)Ceczw=-L|#X50`VzHP>~(+;*uM{i`=z5* zo2Kf~z5<|;(6x^fxcA_a?Bj`M-#Eu_yuQpKFe>O2!MtAMX>SEo`)>jBaRHU`vM{Q7 zYP{Arwt=|24-oOp`?9&g>Q5HPp%@z-^@@t<-v$Zk{+YQiS7J~gsm9u)XfJny&FZ=M zTcA$8@@cht5-IHuH3RUYzx=@Ck}z$y#*9fofx~=$`el=~5X>WyypMAD#rk$EiU2W$ zdV)qqH;~0ZP2dp%U~Zt#8r&K81mOw=>4Xp~ILiPjlh|{15Tnpo1A*WoG*#=?ZZdcQ z3*_uA0*#ao;xIx87v6&RRNk+5F|l*4jYLCa^a2rp1Nga(is$PaD6j+^83X)oaT*}n zdkU2T{)t~_--srQ`SDU;W+!c@n~@Q|VoL;&3ITC(oz|deCcQ+A_FL&OMN@mEA{aMO zQoclHy7zm4RA0Qkmr;&v;bmI_c%BQMy(Iu)qbFv|0L}oh0GO~AkN<3{!b^MnfHQyw_TeF%R!;fRB`IgJy=wquzV9DEyFTuWWy&%2SA|xyMXtR}3V)lsI+W)U;qW3_C7lD9AXEq@JX;;=&&gMA=b zy2&NqP}6)0%Nbr!xP;heMeKr2`||;u3XBJM8Zqgap)@?Crl0VTc8yC-S`Df+-KV@E ztWpQie$kCh$eR$~+#tR-4qslUHods}d$g1$3l|b@kRN5x^laVi8Pi-te<%B(ID-9-Tppl}VbvhDn(3 zaF!un-!QF618IHGwadf?p;Y8x#xz`_6$y8cyiS3rk|+uX9fQna?^N?umct>z1EbkB z>-99$yMHXYr29;BU%H1=GOwPF1buACRS`b1ne*^MGEyeIRJ<*G2ooj66kfxbD{w)a z>4$tdtvx;qGm;o$ur&VwZ-`dIpp7D0Ux7Fzxz<$>?*Q$}XL@-$R7IM|z!8pk<3Y~y zM1rV1yM|V9*CHetBvAz@MuWZNsxKcJ^-)|qqW!DtWloPmU@_N~3JsakDl|=5w(L%| zViZMm9zkA0K9TmXnO;_ypAD}@d0CdqOANSb z6f+;oopMn}ry>qBF?V9<%B+$Ci+7T$Fldf*!PF8x?7wA8zjZ-iFAoMmq`Y|bH44pq zaBf-!|5qw_Q)h>0&%aV(!NU;z((!Teb#@>3v5>35qnGq_Z+~V52_-SUxL(r>=F7OY zzAK#J4F!WL(c)kQ@TNfh!txpulafvoOr7ys^S{i=ECYzXsiCn@i}Xgox+j1SCyRIL zvdM*X3N!TL&%RW+qzA%D8EJ2)AAzzsXU);IK$il`?DmjuA#5E&NJereZXI1HM5D0W z(lLx0=$nng>1601g+$sf4MX>gT0QLM+KRL>N5pfCfp?(Ai8udl#dqnYNlsmi!T~rwTp|XS@*|THW8UFF)pa zV5!7qS8#fVFM;cRKFRvNcPeV~xZnYnGcu_07(io$@ASuenIbLc++BAW2J9z4hjshB z_wtmL$HM(OCYL|Vyz`V_zsgMYtpPR1D(IS8&ICHzm7|Mwk3j z$y=1KgOechuI5QG(&kBQ7>rYSOYAn;7%auik+GU<2O$>05zYeSTL1R_fs{`Wrw=xl zWhD(dV6i}(o?VH&Wi|T#k$ITmZ84r%9uvv4XG4?YU=Ta3d5L7jk>=VFKdeB?+-_7MuNzL=XN^x153ppeVsHoF3je-KaU{FiH2+32v9Q|5{~s>0EBcvAb_Ds4L%}Jc2TFmzG=P7V-ls@lU(?#}NKc?C{I7@j zrv&h?MIgN&op3PvbvZN;drQ5CL0Kg)`rprgv9O)KM-jyI9Bw;O6cs}-&uIaXl`}tRbejrJjGulpr$!Hz@aR(ci8jRj>m3I-4x@HD1{%mh z5+3)*vCH3A|12xHB7u{t=7Zv2+jd33lu|SX%pZ4An{jU;33}>u+wL4ay$27%ULriy zyM|G=|9*O}1ctB~ws!sfsFmaL`U7m`PB^N2RFBJTjDW0c+F}(zId5MXH`Udlxrz3xemwCu02DZGN67;R=-#VRr8t~IJgj~# z=#61~GyoGeA3lh5byzgtS4weTIy#>qY8C^08apkcV~RX0f#cqj)|&fi!PKMO9zY?T zYK!Ryf{RDs+|g(A27|7j_1R}_7nd&&!?9nwiOAlzyyG$#1{lCMc|d`v+XIm?xJ^8H z@~;<-lQ1URDs%q)8cq+R5Z`t)6Iv#I0-HHeHOTnU&-^(eTW;s%7NfDJ9+T@P#XzHe znsSdWYCXTmrH6ffu;@*IzIIKg_q?wqVE2pO(J8wQFo373sYY+El#NvBz@Ubd#4%#} z#W=`k0&4NhqExFSJ65PI8uSa-%fWkbJl1cBm+;UO1s$vdxG1+~>0>}WX$CeO*HI?Q z+zf2txfBlcf{4rzI&sY&fXYOJ*1Lbl433Sm%Yp_neCP>q3~K_~$9jkSj;`z}a6&T# zIiK{2%w=;0#_heXA?=)RTHgQbSOj$ZtxIWYf%^0TsGfaauZURj>NtMh&rMIkP+0#<2kZn<7f5v10r{t|fYE3t#z zP)>`|Wb1cc{8z)x^k_$LDlJBC!%5EHq_D?pe{Fm}3X<*aJCpn(;LgdpG4(XMA*^d@ zpun)VDbm~ud6A2S|*}!=tOV(U{iQl+fFItZPp^Bp&s48u;y?!hCWCDbj5R zY;WlNu@avGyno-7G4?Lf_}!Rvv(SqroIBx9SN&yr7}I!8M+h#j!_d$$JirHzfG02@ zZ3QDdV-ysuLB(km&^l*7ksi#1XlQEFrZ5V=|~gn;-xQ zSjkA~3mU?-IGh;F7tY>e+1h@Jb##)8eL%Fi6@woS^V(8sPH$2TBzO`@~%NNH+_S zA;7$v^tSjg>4w2i$w%e-C#*B(Cl8r!Z4j^UQc*t|U{|^hm^MA1pWfostEzB(HH(h> zkiqYsI!>SmxR&wUb_F#drT~a&f98JKn(p75g24o)@>lnGJ#H0LL@nLw<|i2`o;EfzCb6=DLhJNzp*uo&tI&6YI;H>N&daI91cIAqeo8Q}UNocZ!{$)O;K z=*zO1uYs=Dk;8IRTv>hQUCnZIB=NQZRfuJKikKVh)~!dtwJ>D@*uk0WJl+PBGbs6T zz&1a!SWYbLN3mrz-ogIlF_iI9`LZIw{%U&%3bXK+!wev2NOsqyuD0B}+Rl3^lSD$s zREA(uA>+~x+rrrdu#HdIWS1HX_W>LxpjDc_M+tB1`&Przi<+Z1!axrN#(kIPJ=dd>Of|N*&On~pSVmrPiR<8MS{WtE6lxz6B<_3$w9IV- z>jqu{YxUt}sZ5|j)m;jtsIzHQ8o6+(L_uk-p)qKcfGOJne?W2V4r!Hj+w6#wVuTQO zTM^45G0NBr^LY|@9B)(;jHtWRP<3Rhoo&GErXwd8QRn~!@WO*@06 zg5%Y>!J;o1Uc)9zm#I)80rFYRbOkzY3QNCvn>puemVluRB^%5EyLGJc@?g={#swL| z9qLINt2;Moc38Gkxg&+-S|$?jKYZ9N5Q%-%i{HnvRTIuNxC-2$`UJ9BgT!pAlaEV3 zjJYmyhw{vg3ii*O8CHhS*nYLRjz27O?c_9yfqL;_olP#M_x!PzmPn;lMyHPwf$)us$J?ky`-wJu_ZtMwBrA2SkN zx!gPYw+f^*(!aUym{ofor2)L1KF}g?MW&Z-CRG9eZQTYs>lPV)erM4XI}yC|*F1N42MHZm-LT4R#I330mnA7A0tzX!C>+$t2h^vUzw7j!8B#8%-Q^ zx|6@T^jF<+SsmcGXyv9h<*|s`6r1k4YIOq+P5aqAdFJ!t{hQ|;+5`NUy7yZ)I>Z+h z)oB;#T)j0J%pqe{rdw*6GH>ID`L)M@+rUZ1rxKl8C51-X1F;b$OR#%Wk>HyWDlE4GI7Z)%g?5HOV+oO1tgTh}O(e z#ca+g0DsC#5jR;!>@Z!ndYY0zduuQC?4nX&uo`=fLoDC~Vk}87AaK&-i2Eqr%D$lhW4=kl zsO`PpW=cCOWa>pZU-iAHNIn%$RgY#`e@sT$`f+EaWo|1WhCYQGTXkT?_|wo=h1$x5 zVb)uaFWIB5iQ1hAPRmN}fGsMcaz9%HJo)$%bK#{4X)_mHDb+UMSsSCPoH9 z$B#hob$iQOB2AghLC$sSVORA?IfrY{mEuv468$+JmpmuE>(C2~_P~O~#-q_slmp`I zZbtHCw*5Sxu=q%M_`VgcB?y$;Kt7@LJ(2=bOFu3(eArQOQB;9e_LY*P=(mQZyC$s& zs)%;o90EIe`ra?<%9;QfO&~>_i)d&N6!OlZ=^jX+?djs5Uv|ZF8%iT|lrR?XyI588 z^4hzY`1r4k#vxB?_DT~j!#}*<6@jH3if7p zJyjmx5mf#ZnQ(&@MM3C3vP(-YNT!i=t(3U!J{^prM0an-SLGt)&dY+>A-e| zK1`F^ZBYrt0O~NjvYS@f~i1;`LHmj8(%yRV4el+7y)l((*Ehlrg z%_Od>);FAVYK*_t%_?q_!?rp@Z8Y5;qU;Y_Z!@Bz z%9a}K_7*tji^qw9+Y8`hbe%-*Ec>oS^`^>a7Qmj<_vR#7=mA)xj?E-j9MUUNB7X>H zKECFawoG+NZW*}@R6fz50fbBH5&%a$%QTk_GLV=ti@VIFE0Y@q)3{=RJdxG zAt!JutKyIGQ!7AnXkAem)&k7JH*=2gLc<<_{S&y1oP40BSVe~6cWN|JU57W;XV#dK z9)?3#zuEiPb)M%lj&vCpN|rGby_`8q;kimcR-Ql#h7#ks>A;f-sPXwW&Yp=H0WyAW zLRDV{30fEZg`lb7EhA8tRqrxedYj2w&7MUT)_^6BP(!r0Sw_bv$D?fzZ$~tl&F>;( zI=Mu|PHMOWS5D=&W+^vBvH7c)&(WOw$JFzw1PKqk9r&*~WRoJL0}mQ|nH~6-eT#+U zmv7aqxuW5%>A2f(leC;xjuyAA& zbky3zs*3I69scm_ZJiFc_nlZ^i*@ANdF+`a<(qS4Q$Z*0$c72y$uS*j@1^UXHPw?J z+u;b~wPoqv3cB$Zbisb7Eg{mvi*>eo@Rn+c7|;9{&s!#UR&d-=Isi<|oMqF;QDlt6 zDy^S_@`Eu7z+SD#M+a$UQS9{9FMinJ4EJIMXvKYn#m>>m5T4n6bL5P7Pq*^P69fZ= z8bpUZggJ*IX?dt93K)O}(yyBC?$-MD7y*yJ3CnYA!SHhfwsM&Vz)=QqU3usGJ&#?# z6kpMl$}U?hy{pY&(XCzy0^)P&b{^3&S$iq&(>|8*>eA921Esby{padX9-xkj6;j|V z*XAnuqq4)p;(yKZF(ZTE!(ZVY;L|5uLWt=P0&e}#=;+rPozBmn1jqg%1w4bdjMWZZ;$<^RYG1u zAxBy}eODJ8aY&qq^mXBkR6Q39ho~fJk)i?iwMF<~zH1_NCiq+5&#}^!-`R#1<>;gxT$&9R zK(-iTS-(cTI%r711R)@uk12*Zj1%H<>!Dlwa|R;IvlFBIeQ2V9a8#hGs_MpYIA&Ny z-987-6>COtV1J2|46D*Z?%Z?fE(*e~B0mPjcO1ofOuc9)IN)V$87}y9xGFgD%}l@; zDP)?M9q!Q|2E6!uBRf=40LUq2A|-qUtqvw&cw^j*baH zMfa_TZ0$&|^M4t`@7y-3Mhu4XaE4fva?Rsj?{nw$!{a$MkbFhJ(!qwFR*VGG@nJtD z?6TYt(m54WIj~AzC(3}V7j=}~Pjj9f_esC^Cpejy|rNSm6gJPztWAr%a0RkM7CA%IZ7vSGvyIX5F&s><9@qmSfcDmp`>eg^9r))Tvv0G$jDrEEn7r`DlL~_* zH!Gl}IVHlqc=SNP2_j0c_#EjUeV%oVuxjJM;nd&YGcal$+%eGy!D-lv9tL2q0U&4B zji9veRwKPOW+P?q-1p}*T(;RfJFp`zlllShLXtY99U*1aMSEhlAeskR(%dLNGPg+^S_%`xSJ;+;1%FHFv2VuSe>2d>N9Ss%zZC4*^LX{tx6L z24>xRSVRxYYCSI5)Y!J>GgBSVrmxti(6`U98}i!1==TCHlsNwF5Ypw5a`}uqG0>Ml zgfthO2CR|Zzvs@Up=)^Y?s@0Mc?{@0+S2~S<>Z9cGvwk;0$Wtb50b?rIQP{8TK@H# zy4TN1nywmf7JOn7Nlc^l9i-HA$SX1k`Os{>eg0c|{{b?Y&y*AGEb^1x+J*vvgp6 z5(@rx611$wBlL$q?$dpbD>9`t8CCO_4MYdgBCl<`La~k@?q`b@$=~0gDFU2cFO9CK zehQ}EBzty~jT7jY&b^X~2As(;?9VEX?Q6}zG!*l^m#n9#O|VYb+Rv8U8HS9@Ibery z<^Ow+<|pXUj7mO4GoAEVEZkL;KcR4$%NuhG4^^+#u9a@tTKKhv&6vbddj9eU_#3k| z$I@1gj%Re+{@STaSDFn!QTpt7>}5B0eYIgXLMdsMnx9)*RzD%62SRsm3qLo0ia;^(l?^+?-=SAl3eL+(A4+y z{`&PR(({CR)`V`>zvB|;)xU?%FcL;Z&GSduK__Gt52ye)Om6Y0XKP0S@8g-5uRW9V zY@GF<00771i|Xwfi-VIHy<^!sx)sRFQ8b9%wO~YQ($SJhcfQf1`O(Vq+uEfNj;CD! z5;(lZp|(5z2!%WUVTVd`#P+76*2jG*T5yNTcEaUnC_5t;OpJ*DcedncqI!z7e>|1H za++H{WRS2==-E!}Bd|dfpjJ8{I4ncC$P)Ogl0teb+HOkZTrI7K79ZFJ^ou=21qP1e-XkY z4mc!Ut1UJldI#F6?~|p{`#oP~7ZYc_&_qp($f;NlZqPs2sXnO;&;j(i8{oK4-%$Cu z_@xFJi1T{Rt`wg+QHOcP=cMa8f8*#jgB7)XMlQDNRh5_3`$+-yyAL2vx*l6kp><^c zes5W&XvRaH9TJ|3Q)_<$=Sx>oxtnbX zF!gY$L2!cJ11M(Z3IEA@E04u6Y^5Ug!1D96Z=c`z`?j?ya5ETH9bn7pXY=8;XV4^d zLGgffG_%x9LQ0RM+dVkk=$QSEQ3lLDBOLgq^)Xc&WE~`del}v%COgv!{9(PS=aN#w z$N&oP89sqVjvb)AJq%|OFHEq#?YDhaSdf$R0r~^@4rN^PeGQP;I>V^CUkH$O*WbLU zo*h5zu`?2@r>PmMOHw!i!dNzi>jCK4tBnV#00mLDK3)&efet)uV0kT2@=)sJqoSVM zGL-D#E(`z`N|06?X7BsU{y^U*EEyk;;;>vYc=V3zlibzzMkWWpZRwF~MXU=wfaew3 z=uzRcq8l3CTWr)4-L))vycRxK1z(%|p{Z^P;(X|52^{KY_m#c&qkjGTPG?U%8`MFL zB{aZeB~Sf0>O4gjn#5-m{ENgP0c!C+y|yVUnEKWNYP>2y!{5GvH>h5ZCi;!V>kYYb zgTmNmnpAbXFlYnKf+?1IClNgD*uyz_$?i>n-~JRJD);CzW|!<`bb+6!DvN&tpreXJ zm1;x=$>70&NzzZjx;d$Mw(be~iNuATjPUd~h=gI+NhTRjVZj?WWP8T#&9FuHchb>7 zwOrT7v}}@Xk!Enw8Y{oC*HCFX_{-Zh8Ev!N#oiE7yh2lWqn+@ceG-czNY8Z5Yl|<(}B;h*3Mq!ri((a_4 z;tfRfx|R?DF=<2F^9YVNi>cUP9ok@k`!Z{v$;8tl_tu+KpuchdyFSBd~qAK8>M zzbyBYp^rVmt^gS{gPX^6q^%?hA_aeV7`2g z5LNsZfz-7N`=f%%q`iz|I=d3ZQ{YDnC20(M1)^EBL=*8zvWx&gnJ^%BIf)8~syYQQm1d5(^P8=%K~!b?&W(~1LlU$ryI zh187WR|%eVjEgINQ*4ROqm}h`BUJqr@_L-0F*Zy@g27Z0mW_k3ML#Ypde|yq=utBU z_x$%P`lu7!hf9Rz({{eSHu_*u!r0!3#K#lCjf+70!Mw-StTZ@b{xyQf)%u3T~Z zPJ35eakQrJ-H?(a%jA`?dzOA@YY%m zueaH5I~26aXkH~4-VoY(oj`R0Lc$hejeQjrX{p?S}PtB;>~jtvo&lZHt9`It6R z_hPn1e8vtjLi>F?L$8W`@dFOqtfl^edHuN?W(kAca0z{qK2%CEw(VO^$2)i8u3u^GQua6{mC047K<|01w6QraDagxlj?A9Q@0>;AZOC65b zNElIh&-zBviT24WFq-{`+LWwIqDHds8!VW~i6?J_nUUPF0?E(MYxhbQNe9@RAfKB< zvd=)^7xu?&++*S{GP6`i!f3nje9tB;^xUc1ewE@U$OrHBeqen$>sz_QB70AUa^E~X zksiaDa`?J`p6RW^B)Z6{dMwhwkUG5szCbw%xq!d8hBs~0j;^8@URR`#e-lGK zeTI!ZiN7zcaPbB19l2Mn^@S9AubF&U9#!2g%3UkUIT(4hs4vGg;E=cGQ3CgSE&h{o zhZM_LlCUI-bbUd^lAVX*fEyB&yC1~6Z`C>Bx4j^!`ha$k75x>~XhJ%+0wL7Fy((cI z1G^M4`)?6f8bMR&e0TpCe(6r9rxlETsf_-bhc&~JD{?VdP+D8S(rV1BrkAzbn#9}X zwOJ-%%z=NX<*($?2u2f<)W^$~r^d{Ga z-f%DFCBvr}K<4`r+ZGT7jG&|g&oRoLOVFZ02t(}7BwtOFXKZU?`~VtF79d}h#l3c1 zpLr`!DsT)c1bKVbV!JdM&Frz+Ws^uLnwAXUO3_#68ELd>Xv$>_OK!-K)%Mox)u`1; zz%xpQnz7ee$>iu#m`s`Ze-NA)ggWq3hL^acj8GQC9Os0uk@s~lR{9q6soL0Z>t9Ot z1T4I__X&hl>)mvGmTS1TtO7 zD0$uc3$otX05-E8OUf*=Wxqvka1P z8?o;YkEM_sMcNmv5R|w_5hY25z-v7H^dG*sP9WjiM8Wt{o0*~fj^ogTyTUAe5}kW- zB=Ik6UZVpnXD{J=8{)1^+P42%K;*-q`mLHBhMJu-?Sw7^;}Z31w}vT719L;Gje}XR z)WhngZsk|ueYL%p$5M7jYw{p7Rjo~o(f*?PhzslA&(Tg3Ut_drO!d%rM9v2bTDf3^ zk+~Sn)FX6}^zRwmc#Uk~jp)br-NQ5dKQGO~m34|1gB_i!OKiha$zCqG;tjufZb4>? zDPgM?ELo9+FN_~p)_|MdbN;%~#P zy`)q*^8O~nY^b}9M7sF$=C;VBFpNy$c5nUHW`fS`%v*!!*aYxIX-o+S*1y}Dsx!|; z#DWm>g`lwfy)g%xc;akEL(w+81lgXh#yRSeZ?-w(y0743NXOT`y6Ja>CAB#&TVI}k zjwe%JRo(gE`_Xi9$_U00H}Qq9sJ@Kg>7Ekah_R{7bBs#~wGCq@-;#F8%n%vHP5Wg& z8xIv?gnJ~9!WC_{X=}N${(gtNA@W(@jWbQe0oT`gRX4p?66?ZY3s}!|5_7$2gTX#; zzPt{?S)Yx(YS?3^=r;!~>g2hL@IHIcYtxiCjx8=6x>kMA>g}!~xGvCl{vK}X*DXQN z?xiyWjT80(jx{UZsAu;rTEY=YEMyXHrjoq_f`@HtkER1H2$uLf#)kT>yXlu)X&=9T zeJc~ad_d9fa96ajV9(Mgcg*tOW1XM{i@TMMFEL2T=7%xf1Ei?4zqzJ@w%2gyI%nK+ zKM^+TRIB4$lv}gOV?b1Umya#v6=_v8`dZx>HDWtAH;dPANrm7CzNo7)ucoi~1)m6K zJQCd@Ye%-)I_OK5q4C$idI2Z>|DBJ3L;2pCV=32lYQMzg-Tiiy4!vt1`28~SjM;duJGA) zS*M*uk3E=D@`}z#JW1UFc@m%gw*z-p|8C#g!?opZr-AA~sM}Cd-M;At^Cy=b01!M; z`-&?~{!4JF`Vymbl;||g=irVBQ%TAbaL)XQlQR9Qn2$DZDps^PY52}^<8elarp<@2 zep|A{be)xLjI4@3H#l2!O4{S6aI<;0jxr-wrbw~?LDWgz9SmD z6N0|JKGcbijXgZ9ff_k4u#F($#gJAT$G_NJ6=g+KoTLjkve*M-xq2`gTVFMPp68&6M>Gz{+o8@M4o@z>ZdGodA0$C7=-f(0H4q>@+L`tTn8D zR5yUIS3vQkBR4N9f83FCYkaFq7$E!6k!*5)CA_a16F)-XgDZ6h+Kgh(k3k|dc4P;h zMV#jL;$!St2=z;T{6>~4AZ5j=Z(D$c*H4?f+I#EPm=@wj>_DZK;&oV+?nqfakhf_A zekB?(PUSjPjap2#M?@XeaAeYB=x23`jGT2xBgSUXaT8ZZ;e6#AWB>&&QkRo+!s8~5 z(RGfUUi*96ppygayfj@Ugo$STy7=yY0DYd_=S{t-Pg}1{2m`Zx*IovFRj0IiXrtbe z(7X<{fa`h7QoEU!Rl)4IW(t=no>SidFl7Mu&K2-X=Y{w7GZO?;y{?3LO;2X zQh~PlTfh{(51iy?0Nc`h6h0O}rtvnqS4J@gC}05%MxyRMh5ZFKlaTqYJQ?Cj`1$h* zh5+dV^kL~x`J>#MEa@5OL~$+Px%FvwtmqL983#x)nwMy4iusH;r)w(s|Kr#kF z(~&%8A)?7HrVn>?x~q-3-YFA?>H-r9@Hd)4x?X()RgK;$QxXgbu%c{Ip-?^glMeR8 zBsb%B4_3<6V+GA_gQ$zX+}C>h#~sr{+$SFgkJgqaoVBo~lv*oQLyyVM!pP+)Nm)bQ z`tZJJBRtm-!h1zK#x53WNuO9om|Cx(o*zm^%MVd{aB*NR0h&p>b6YiYbVwz3@pXO&U;M52&^lroGA|WLg$FXUvxFf&eibxrNjy1K>-m7A zE9$-kBU@PfAy4aIc`BLZI1r^V9KH)IOG;4@-zzwpBrJhc?4Tl2VYht zv}pCuOx5bvH=MH=gC|^tfov#Xp-VH`aFZckxGe~v(ciyYiEdqBgFlv-4B5k1WzW+R zA~QfJN@0{9+T|DWHAUiY0aMIF)#=h~H zl-ZJ?A0)rI@HOXeuQS||LU~CXtSP_-`}zF=sIy)5g`@B%-$r(q%ebE8a7Nd=M!z)M$Z1qIZ2Ec@mFcyY$f{FseM}Rk)!k6&PZM_O-mA+Y@ zJbMtVk~<%nn3!%cH%>dv3;4X+F0p*x=ZCgHS`8{JR*E6H%GmX}Cobg^;mjZN+MYTT zWia|4>TFXMtJVfl!fpQajYQh0Fd_Fu&O)6w;v1pMN=@8V9lfLYfK zbfu1F_#vv0c7NmXuB5;n%j0D`S9JAfR8LMlPo>L1-M$b+8ctLr1|hjtA5`+kP10M&c)n}Z@v+T?YU+RWF4g34*yY`cC0{YBtZ6d=_D*wa0s!*4Wcdv!4TR{@W z2i_+*lKNKtwR&f^_suk0(h^M+a#W)&MqxtM`*k95WrHr#4YWQ>`$Lwm+|hGvy+0*5 z4t6!677LE2mT%hnBP@Cq7Z<$6SV~3|HB9+8o{X2iWz}_W$ zyV7K^x+{RFUFJ(U@mk!6Rk>Rk=}$+{iJ#>sVzb2gWj>In&i<{7})0 zyYkAOBIC`ysi98~zvwkr?(BtE|MXYkE@g2p5=pnze;7mOaPNoGUy%Fhdc7u{2SNkt z!^gPa#T{vClAWLsd#f4UE(^*IuFqyL)$bbWf|9}H@wP%yup5cNH%Rx9srQ3E>plU|IWa38pr_4V}k;}}#Dd4zI*}}1f zrlSh&3E~W&o7BvH=KB|#c4?y%fJf=0R3`@4@RZEwEvI$jKR@;3C06W6jZOq4V&m*S zT8idbzhNw+oJ_1EXJKT~p!jVDCY)()QOeHY;A?-o1^kZ-gk0s7zH&#KB}ecjH{-Lb zkD=P7@?7X+=|qbjE#vmX`#rm1|Jz4z>y)WIdGhvCd*?i8mW>{cm}8@pay2iNJ469y zprRU8M5@xp;cKT;gV6V(p4Gc9?ili6}iAZO}2GRFBiY&Gv1t&hB{pmb-3VA z7dTgkW+xx#k=uo*DTglnyaB>^a2Bh840TsHLHYhl*p+<$sVLXYPCkHgf3n4%V_T{p zJ8W6$&+|=;YyM(8B{wmJ_WZuH*e4WU(wqZm4R1lCt@Q^~rmW0iVOlh?1y@ODr6FPH zD|+uiD%Y3W&rd#uXnASe@j4LF$lXnImn;lFb-)DUXgVMn6%}PWahV3Vl52 zHa(LTxxQ*a{mJ3Wv$sG@L@!pgnGIr4PU{yEnuovX48FKz#x*>zNG$MdBqgzVO*A3!a0DQ1fR zD?=P}v@_a6vfG~;Zt96Ez`lOH4RzEkHf6N{P(O8#>#dU#7|)cwV8 z-3eG$&Yp{fiO|tVfPqu-cw;0N>o&fBGX{_c)tR{UbeO)VsXORp5!*A)URJoQcGW8s z!2IdPMCqP@yDS>Noj|m;Wq6Tj_YDG^SI9DIGwG15#zPrEp%Tr@0)?t;dt#K**7dRd z>@=i_gd4MqE(s#`?0x6hZa*FYX*ig`?cAM|mzUG8wVGf`xz1yhM%r$zqvu=K>$TU) zjg|=`MVPNr#KEeq5qAYW_Jm@1caZP0O@E)Nz>N5J<5)QClEEVnKYA82X zXT2CAONSB0RN^ET-o88uRQh>CIqcm`p5o9pX*76KL~Gk?O&e&t8M_}+>=e^3yQ}(S z2IkRm*&qO*aKj5H%@Oe}J#0(3KT|(E|MS+3tKo&E&#Md|%Ut5(+%G)01!q2VwAntr z)Rus0t&Zdg_l)82+-|OJUN_^gYfJdTcT(^r|Hfkcp)!Y#O3s0uuL!DH?Vzv zZ&t{z@!TSaH4_#lVhf~{qw9*Mus2y9U&PR)n@rSIuI(?14mL8PdQkRf&|agl`g8Uwpu1dvj9ntHRY?TmbYjXnzr0+A2LZRjUfZIjv!N+4w7 zoPiGgSCsEXK|r*Q#z#>AeY7wEFXayU2<2d_;rCrp926&+ACZxEd;$e?DLut zZ@4M<{T)ix`WP$Lpj3znJGjDi&iV}>`#DmIjpD4dG^VmS2&fRN8%P0}AZW2u;zT`D z1{^^k@!`tOw`kV$$6olmjw?O~vdtnZ-1{T8*kNI|j~^h8De=}{c%MblJ$|^1K(Yr2 z**?wD>HWKEXt z@?OhsOEBMX>>gfQN=2y_uE&UEn_~aDU44W)DSf+0cbwFRj-RoV&3_^*k!3HAohmtM z9Q|tbeVA7@FI%ToT=tgakDwP&Cwlbrq(?K2InhFmGf%TJ5_d3CDtWjuEo;vq@%InB z_zg96=c7A9aeGZqp^_=E$az~~jd^A6yPn+r5q0c`lQoL54=YDUk}Xp_6|4-^&leRL zickhQdA?>ESbDKYDz;!Wa4m3t_up3rWKJ8$QQ7Dno+b&;#h~G}%h-+C3DaI!N3#Xg zyoER_plNPebiK!`LJ{j+9IL&N7TPkr#+|sNWjK&QD+Rm_ui~B~$gGt)Rg!|5x7C+5z#i^44&+EX_4WJI zg2d@&S87q&A78+LzXc5CS^pltui6s6nYo}D&apYxe7@tdLsqFX-6rbgscZS((P$-N zLT4Zei%fw7>1h&Wx0rxiaYgy9T>N33yEHR#bFrW8iY89!X16 zG*ydZ)uld?%HhSHopPRsl|yOLja8#Z;4%wWB7a{8=Oc})@y;fKRkJ8jMMUlv%$WJ) zf#u0@uNS3AaZ{4@^Eg9YP0PLJ9qXtkMq`oo86IZRppH{13HbeUeqVsn&KHJxCHaJ}GbQ_acD7=@zSU{Z;>Z^hWc`Mpugu@6F8h^W?CcQZRM5I$Ow{eH}+ zr99ZqiC!CGOLHWg9ITwS*A@@%HGtlVYZV|6J?+hFK(l%W9UpTvBb_4b#yp zFrBdf<&zxMDzGuxDQvS=LuiwrQyGHO{Rh~mLFEj#$-j$Vp`eaoI@j{Cw7u*WcTQ_M zp=(3K=PCbuy|TE3vD4>aMVW-MH}u@L=u|JRaxVP~u}%4c;?z^N*Z>CRCEV1%nb zaou`5Q7_*V6q%Z4J?7aBJcFj!8kshjWPmLFbYA@PYL~4)qU@(W1M@hAq)1MFK7OO^ zC6Ro~p$w1+U>w8ml-(8&)oKW1-~l#Kt4xnn^4|WBOT@x>Q^Br{qm!6oZfoQtvVh5t z%Er;q*fE!ScH+D0Eo)6e>}!>=mew+h>=bW z7rVx+6qgPr(JY5aOIyc6R@LD?Qej~IJ-yganBsdv*boTcY;We+m~Cyk>EK9@hj-rg z!96K8mDHIO;zuqUenjN7ETI4OrZh+MC)cP)m#JB1HUL9GzC=ml{}|_;!>{RZ;O5KS zu(qbd`#9a9{2jyQ<~Kt|V=*`EFzeazm!vISmgB#QBiV6MsGj0yk+;;dn*dSclTyOq zs2JsL=`WII&EXl*A5R9*=Jm5cWkAuX1( z57Sivj0>-gT)te7xzs&Xs>Hgb@bJQ{?2qdIcqY=5{=iyME|iHouHCFQlnY4@T&<6zwoKf3h}t8dbFT>w&p>F@R{=5&*@h1#sl+Y$4{j(1?aNyiOo3 zkqcxQyvMPg0XuCPNT|(MYeH&8z{^oC1K!%;blH6*Ok_+R#-n$vs8MR;;~pKu$*ooR zn9T$LxqN2b_n>xHxV3Kr6Yie|5lloiTvy}jICZ4{b0pudcnk&(m^9Np%R|tlFJ6_` z)T=AwqY9el^U%{ab-s3A^#-&>MJkG4Hfi!4?eFa19;=U(Z@WVQ;9XgPY_sl9_Ok$d zRw7SDwAmWSg}*P9@~y*!(YZuLbUuJ#L9Q6FJ}d`RQ7r(3g}yvnF!xhk_m@C%*F8dc zP!>@C4H~aW0{}6LfN1VkyNpP4t^F57WkODlPE)%WGlct#){Boq%1uZZt(0$+%ibrN z8KAQ_|3xc91hV5K$k#}&+-@q!@hEr11tXKm^8t!&8!u&;*+9O3dadoY1Q+dp3@3n5 z1Y1fO-G1wiS+{~ZwR<_Ra5zcQR99qLw{n?E8PN)yV}?1ZT>)q)a6as@G-#@s!=+D% zJxy2G6%H8&;UXsqZ3&=S$_Kj6Ro+gJrr=;miB1@A`H#tYUH2x)V4movXa??@`7dT3 z>Zt8)eoELElEm;Jb9zurF1z~Hi4m6A&BY=0#lRn7d6o=(QS6G{ya5E) z)|{(TyR9%JeLOeq1#z)+Ml*hG^hE&oyj%aVYDYMy0B8M7{rZ6YhOdCiJu^)o0}fzx z;+RTz`Q^LLZtpZ65vP;1T`8cjM)5UJ06BQ=YOMtt&AV$c>P@J>W>`SUx6apSut`Ch zh|5qDYyp(35{$`**PGjd)PIx$f9z3y-$`(2)%o-1%~wGlK)NX^9_FNUg!>*9) znLRPrQK#>dN=+zW;eFY}j>zjdC3d0;dcSB1jX@o6ay?u3cntQ*l;3wTsR1?`F6VWR z_o+|wPBARp|MpO~Hv#-A*AQ!FT=NRozj_ZgIkna4gWIVmL7r*WN!+I!*^ZR$mQEX^ zI}1M_-!zz^qes8*iR$TdTvbpTwNemr%(fp%NC!*~fk*QZel4-VX?86O5{65u1^|tm z5w^4ckJ|};^5^ZOn34kH7qC|zMF0XPdw6YuemxN#AS9@7xk^cSGo`u&08&YXKE-6a4zkQD(xnT1vi z8Q@3jwJ*@Z;+q#4r?MsSWi{XT7gY!lZJUuxXl{(Tv+p8=Hc^fj&n?al=ON0z^z zFu1_)AHa11yt&Nr<{gc&XMph;1-xQf0gex%#;K;km*SrJ>67_U@aIj*e*t_>urQ{4 z)hbZ}Eu0(RBpTj6ytluYQ^{x$e4)&pnF~-|-6_;&oCNkCy`$tdoIj>>}=Km;g76&;1NdFVL`AXCRt=tVh!70`T|@ zR^Sr4e~t!?n5tnd&_h`@Nlem3XIq8TGs#D z(|7OY_Wb!$HlP{=nE&TKZ+)o+O`c#^hCJlzRzF;QFhmE`^k_b4uI@kY%Ga_DbIt*8 z&s#0W_hFW`M}ph?1A>QY);YKHtvuO$v>Lb*bERZ3vMH_l75Wic?7S8*OY2i)jY za;0zPB;e7%j2;Zl?Ah-RJUDm|c_(p@d|?oBX;I|gCyV$ zWZzcEJ}@nxz`(}8EdAhvgCe>!Y$8%5XF3|xplTD}BmTo6!bWl#-?Ajhj2}5BLMt}y73ZkqNttc6Z6mYNEb9X@2|jYlDIU literal 264215 zcmce-Ra6{d(>00(NpJ}6?(Xg~zyO20ySs&;!5s#78wL#lf+P^!-Q8V-2MEbOuYKqJ z*ID1ixj7fJW_7P#-Ss?OwY#eJu2>DABF0;iw{UQ97|Kd=AUHVGX*jqyxu^)RGe7d+}l?=S#;4u6C@q-_7tFnfJ`&*$b zC#~&odj9J0Szyg)E1KLe?P9qRi4kxRAyKsrxCyJ(rcK(sLi;P2q&*GZj1kZo2n-mM`@^SD#l+ItZio9(Z0?{>xknx4-Qcb}Ur>|-2x7%D&v+tYrt!Ed3-yR>J>cOX}jILrI_a4$)ecdiN{Rq$2P-uFBW~CoVyux}6%Us~tBy@FZ*)v%2=Mk~krdm6b2ii(P*QFe z#5q;83R`iGpoo~buFMV9&p>=8t_aRVG-jI&{ubY_f}4~@vav^_2MyC1KE8kxGfhdK z<2{!}lCQ8eWFbyOk3qaFF3E658ZsP8luf|*mW}wzEOEw({MX-$p%GBJzl4IBtWL-Z zMEw5tj8=yFglMDt+&lQgSF!b4ra0Mib%L{ro1fn8o9CQQXhn5NlUR$8_bI7hP})zMRb=4m+mB-#=}hdb~c^*N3+fc>L3PU3n4nu<-MmUbdO$jJGI&OkS^q7v40dWvTZ zcyW|o4`dXc+sRM&anHe?pb3)Us3zB7|8Vvr(YHc&_($j$76JavB~h8xUxkFkg&XxR zOlXLtnze~J`5}x-Ku*hDozR+Q(iTScp2K~lkIOGn-;kuvk>yA=k=c`%Z)GmNq!Dza zt~$jTf09nb`jN!ITEB$;?#H+K)6SfX(g{?vZwu_pgy(r)u9P#qQ0tCdeq|i4edB9T zf;1}fOw6@m9A~7&8okI$gkiAmYTvK~$|;~%emh$QNz`ahTJTh;tf%f_dQ~_#g|^35 z3k5sF&jfo7q~mn%Iv1&oc^mQ?D5%RET(@QNYJFDf$X|K%!!?#x02>h)bT3MeQj z38i)t8f}qUnx^@MmDZyhKI^q1QF8IQg#u!a?YS@du};QGiO$K7MAuY*<=$&hS&;F*m0q2Uf*Z>Ab@=z`C#*|{ zPo>4#pTDLVDrLy<-suUHNE9>z(rAj?xoy#9W=E*5Q-8@c$94)BWsb74vsZ_mu}0fd z)*swIaiaWh_cbp1+qh&q1`4RCkmq*~KES@{Yx!O0_lNc#00y`RV=F2e;SZuv)0Cx- zDC{qOh&oZ^OHCVBjeMTb7g~t@7c{tkDWCmudC>j2TcK6yJKc^ybVi)xrm;qsn=Oge4R!pP6g4L=*lA?*i4+pcgO&IgLc(@_C zmCkedj?eXb1wRmye7n3ly|x^W)*gLLgRG7?B}K%wyZ#M=jxPgdzXy^f?vDGC#h>~o z)&zYY-7eUD3C}hrh1nMsZSyjthl1k4WN4~9Q_{+lq+$l~+YKzK z^pcS|*gVZt!L#@o^2LqPT$NZ7>$N@9sLzu!VJn|Z)o+RR@B=xkx>ccrj2aRSmWGG2 zI_y1nG1UR%aua$2cI^#_hN;thX+b{*PH)AuGy!}nkvZBS`O*(a_PI9U9v>Z2101U} z+R9P+1eCtxQaVJ=R|;b^XALQY(|_{t@=fDy?+iMyic~P?|#5`Fz zIXyl%m;X7*#jh#^!^B5DMig+8h*@o;uy|E9fL~1*a&TgL-6XCADTr&BbmJ8G7O&<0 zjaRn7_taVI8o-&O6P|6s(@DpM;K)2_z;p+;qPt*#rVe8#UP?d|5|JJ5##_F@B}Qe6Mz+j#a6Se4SCCdn~Oeq zYYzZY+=rj;DZDJDURIir=C7J4&6m`hDW7jek?xHPf8dbd2XlnT6py~wNkUOR#t)l% zO%`QDs{Mj0O=3}hVAsCsK1*&9YU7aNu7$9G*DFv$-9-7-KI-UmJBH3CqRm=aw6@D_ zk~_#so1KgslbL||2SQmSHPQ-N9*86e(=33z+vmsH2|h3}XF?Ze_x-pN$-2t=fK6Qu zlOuN1aUCe40eKaU|Au9fT&3v3-S0i9y$GtO_T4@Mxd|DfK!s-358VS_IwV%ODQP3Yzio5dt)h2SCic*sX~b_|)J1EOA0Xr?#6^M`ToN%CBH zro2D;y5f-TZnS$1&8G`PNX(Qf%2?j(AjMj#%mHyRKfPX1m+QweA?rr~d364a&@dt+ z4|i;s&l^-R*il?}kk4;DXgLD>UzZ*!mj0el%rE_|mf2IoYY^c*YQpa|87#Fe^zY59 zOiB-0s%{-6xK>j?k0NRRERcx}wz>ezdGp0FF(P~~q6ywbjyB&m@!=~&{azQ8E)P{f zSKxFmt-Zby^>oxk5FQSNb9R1XZ;KsDJUc99rBp80B$v`p1w;N9(dmPRwZ zOmz+TP>uu2JLH=-r65Ji{5eB!Y{gHoKzlHZ?RG9H5z{E0M&HV7Emd3~`GN%SQnrqow9nbIk*lQa+WvF7cR$B@YGh>&~NW=`N zJlcMDlZtuzoH}nrC>bU!_-W{K>BH#;+pMVcib5TkDiM8+vhc$Okz@6CX%kac`5<8r zH_J+&Ba=CHNNO6ZD3}$a%w>xdJCmr87po)j922m3w(Xl$H6vK>m89RxV^|V&>NpM- z>Q^Xm)F#r)9q0$qXpAs~VuP)d7j#6fgzVlAitaYIiF7dC2^p;gvcrQg_2;J*r(rE}=p z5jZ{8dt=www1aKxxApBT@CzEMDBFM_dmMY`6n}b&SyZT+7l}P*a$+Pe_9h2m5VwM^ zm8Li-3B4yuA~}#;8ogErjd7lc(z<)bKBp8}?=&@>C61&YJ)pq-d9)wwls7Iwe)ZwV z!Y0o#VD6&8E%?I`=j-{M##7+8e}Z-O1zypwe#MZ79Tdud-;EI0jb-t+_SUwRAM1IZ zz&RR7Xr7u)9!rzw@Wd1!D5XEm;e9LskC7oIG?pF@sLW#^R~<{CxYIN+I>8qW186dD zk!YIoCLx`8zH2KI<$8Fzs{KO7U4%-ZIz5LvThD!aXB;R-zN-*sIE4u6!dllgZ&V_4 z3=*#&??Xx;zK#hym!#|sBsuUR*!~lnn)-H1&d9yBYi^b`ZudC~VLUe9BF(}aaf~ry zOmQ}|m2KiAp$o7R;KZL!t7sLkLJ<)W5u7(_JU^F?;F zM?M3EW=2lE?td%_w|_^Q@2E$xYJqBN9pyWw&gJd}b=1C5XN*=P%@Pa~zVPfOybC8G5eV1N+t4Z40~*-WTwuP&!GjL=UHejgF6AXr`X2iI}XSHh0O& zZ&U$NZrcQE_W8a72%q(K2Kkac>pwproPUbksQ;j3Ftd6w3n7hr#^0b0+P=qC$dke4k#Z7x2?< z6K`m|Fk=jqL3kEDog{wPD<61WEjE{dQ2haPkpHu0AJpK&Gok&(GXMUkw(T$yu8`=D z2spBg-4>d6V}_^w#HAR=TO9T2gxg5BxDx@p)X2dg^}#|JAJJnkT#bW@p!$y8=PeR9 zyTwHva<2RgSM;+*rM!Vg{&7~CD9Fx!x7(-OUHz~^( zXLY7@pTHvbkI?DY?0-X~_`kS!PnN@!u*=Iuix(hCq~i{IjfL6m>%ivfKs8gYi{`9EtO8dOV@gB_o5|vbK^bs%2!xawx|u$ z$Y#>(`#ji;bM>Sf;nsgx9TfoD;yGpF{d2Q~(^qlRJcCA-?DkUfRxopnYmD7^dwmvYwHYJ%Q-9#2zT;FvA0aZ8Q8ltf`G&;=ZLQJ`uMfi92S?^h< z_!`_hg55jJ8kS_W+&XUu{220C+~!qsyAwMnE^m^4FMj@vW;y9#x>nw`2@&ko)=#6%TQNUDB}8p3Y!20NbWo#wclYR_5V z0-d5dJaO;uDCuT!LD0%fFy1BP_WgDFjrwp$M;+GFL>~Q(u*8l3B;5hCWYy72!HYCB z?539TQc>~+D3n7euu%3Yydx)A&6qub7Iiv1)7(2^-;z#_5&mVC6EV%DckK0m#%Sph zSU3MBt80E3n+iCxsOl-_+~K5E9a{(}g*q+eGwp&LaC(WNwesE-01_3=Ilt2MQ!KMS zTMaQGpCku270rDr_3ccyNU9bPD;MD9B9h6EyxQ`dffYD`5yWZB7iv8@qMH7e|ay%2wUE9&yG z@iST)zq(d6R8PnSs4~)h^wWa*$}%jyeB={Gu1K5O>HZFfu3c}2_06pK`5aseBRoz%@|{Vs^Y`Fry~U<0H9r(+{#*hS{LpcRY3V^%CJ_TdWIs@H zNjM=F@Ed8gVmVQFu9B%-%=_}Vs~JM9FilaK1!#+La~@%1~#dfb4W#xOcS9Hg^C# zqon_N?rhw^GTck?&GYXc5`PzBycP18=vf-3{<0HE2gR7O?9g;I64yA(S2d1i(^^Vl zUtr`7XQAOHlxUbz_W$P^8M7nO93RvpQl*l?YL5;Y%WXM%nrSy2J0WDfSUy`rYo1Dm zq%v-heFF&52Bhe?OG=-FJw6X1@N{1Iy5zs33M{SCb ztjaNKK9ON@Z{IgN#xS=7g@WJg3OA`4Y~Edb6Ww~)pA?jAyCvL|{I9}SR8sQq$z$+O zS}d_;w}rLfo5jtGh=t3ZYC>W5FbBwqTAA@{=Zc#Yoh2{FN_?+hVl+pVw$p6=zkOG1~wVrYhKA)n~k z8=%(b5pfA~3XR0c*1t*#ywRcd#ikYFBkMC!)7G{llwtq5ZvY>6XvA1xJQO3DqQVxJ z4_JJlyFx#*EN(sc*-4#93{7eyT#32t zAFZzT7kij5yRsVm=^IbM!3(+}gRz*Z!jJ_6`W%rX@6VS@XYAE~_ufKY2O3%PS*G^$ z?ugPqwicGP8j@2|xDbr>^*w5%H*^;lzCLD&%Ns`OIURT;pvY=xU9C3J@V#r))vtXQoXD7KD1PYg4SA~r z%jfxsR^3-?e>5C^$HC>Osu(`t?(!*cHgn|HRgX+v<`(7jAQaQR8Ev4?I7)P<*-dDCSX8IKAsaN4Sxx4^ehI;|Ytq~r2g6|mIl(s7P2j{&}1 z1pdvWu!V*&O~t#yaRE&uWUkRyZbm#{ChNugmPPd)$O^#!%a*tCj*Wb_~uSUOfQLy1NTEFfYr&^>53x3C^#SClTahs+sCwJR8DP}0dCnBHf z$l!8i2A0T~7X1wy;GP#c)MTi9cDJILb7?EiEDb96DAlZKd_KFCe4uq-S;eXNw}EF7 zs9%4nNXG1`_65Y;V#MOUq8gj7%c3hG41zc_lo(Y0-_fc#rHrWI$RNF!p>9=ko@RYc zF$*Cul5bOkgDr1ZCw-YEsbr8lnTLBJniMa`weL*}eghuREX;q>8PEUK@kkW&G&peU z;n$>~_~+ZBkG6qTA39Ckme%fl7kqtv9}0^C{-Q|Sbjv1-U-wU#xHn}9Ug)kmwEr;9 zb5BF`0)mxK>D9odry>4My2@XSbr#-^J&^(>C{+QPHpE(<&5qHh6=Id;2n}_Q<7%7Xz;!DPescwvb&eAnosjw)Rq)t|U_Oms zmR-=myH=K0uOsu<=BqhYbYh0#iKjC)t4U>gk|wpfS~|QhU7O8fKUxHX`=ELn3pbTU zFN}O9Rcv~7E~{pR9E(S=N_13gL4=V*O{-U#tTx+J_LsvF>wV?pN!_peYcElQx?eaY zViFP(CUr@wkJ+#SS4?<^$vt(~-Q8suOI{9-Zd)B5O|mzT#6%_Gv`1X>7hZz!+^?7G z%gFSp>%IlqNrBg#{B(fONZsj2d_w$%JV%5y=7s&U`y@wtJly%a z0w&n#?VjV^W6gN(l&#zLpHY;ThffL|NWstoMD?AMq&_M|KwJO9LHvX8!V74Mlb%q- zf;}ZU&;}L68$Z|5h;cf*`iifu-`uwj7g-Rgjnx_FNnVAC-Bf;D<7vaD!Gi$LVkr~j zAnT|=f26M<3rgdSlN4f}ZxmU*i&7VY@A?+|=9Ubvl0b-n=BCpYm@gjIEpxxSd)GE?DJ{Vx-h zq-t;6Xc)V6SlDR}dJVz3F3N7He4`kAf|pc}2Y0-WD@>i7ia9KI!|vpL?2fA6Hs_d= zys)ShcS{*c1`TPd8g<8*%3{TpDEHy4j6aS|h9K)7{L;_(_AZcGt47b|jxbI>pbmar{tKmQi=cNG5sUEmqDx5UELps+EXO`%0>RazPUAp5%Fym>!&75q1v z^4Btqrg+|;V063KXzMJ}J9VjZ54Zc29-l)Mx`MSXJpILs1z%0k0I6p5JvjxNUcDpk zh;Uty1s)HSp(b>tAi^}W`BFPEO_Fk64`c^Kh%JwyLYSOTrw1X1nR0f&s;f+-=!3{; z6F88UaG{OJw;Xzy(7@$a{0?(Odz{PQ);O11PUFuIrRZE7WXD>O-KdS((xwiaVB<>S z&{<`;iGVRmoQjPaj+QKdXsop_DvuM=r0#-{U%5k^(!CMKgPKbDphuQ-fHKWOXk=P4 z&OUCtyfSuE zhd?vol0CyC>t2Tdf5!)#kl3!x@}swmziy6e350bBsy6|C z8q8IO`*fL#ewe30Ks67aPTv$_nc)7d$Sg~2USv@qBPN`y3 zs4ApZ)Bj8g++)2D&4Kjof}^XnktA7w^1#oNyz>juUM)Q{2aI|`r-WHL)x~`I9K)jm zI*m69kXP$1$P?I9s5icePPlxO@d;_G)Ot+i%ZZMfZC<4q-iEkwRus^u9u=hK_Yu*w zJdYL?H78C{5v-kKGaT6BDY$WsAsI=5q1gRi#k+{2MXTg7s>JHZAyO(G*)u*<6{XD5|zp zXfuMfK3?C6lL4CeXQ4^TLTSSUVS97mX9fA9*PSPyHI}Yx;UR&WB4e@*jy0Bj`UjGb zaJEX8s_TPs2gHLFW;=}&ukbf~Ww?lNCH9_7b@?+(3Y;IS^YPl|lo^`mvZ z{uZB6y7TQA?^Y2sDygcMcPx!F>aRTBQ>yLE-v8h~*iA$eQv0H>cb_yeu!R;i(CdwO z@Z50lX-S_9!=5#96~*R~3Y#R3n8g3ly;`Rso~lcrmnQK1B}+R<@Kxk;BGr4ArrTo- z_k@;FYDWA^6~^pqA}*p!E&rtcdm?rW>Vg^~3?3RlUVHiG11o9>>eRTAD&X1Qwv|=)=;!U)Z*%lfzRdYc+0xSu9woqtms>J2@edk+^mK|U? zbv3QU@uC)pUEc4E*Mf@&Jfj|w+mHBDsKr0SOgT)@P^%8{YI{QCgF}qBF>u>4N+fBw zov+q}O4!aoeBY5Y{qWvPF$(fh=yqKby!--Squyy8($|oC;DwF~FwbzQ%f)73OPd`9 z-1a9u#d&sYnH7p8d=DR=i?=_|lSge?m1KGI1IEp`NqoKjUy6$l`56`l*)0X5l@U1~uQ3)r=LtJ((Mq2p141$B}h_4zj?v z`p39AaP|G7IYP<=>&wLMt@NC>5eQ(g<`dMU>x2wC1ZyiZ5DKs-PqMCQm*WDDU%=jw zZ)12%01>Zqf0pGeZwHxNw%*q;C6kpCDZWl|A` z^=C1-I2#w3eiPGlWN8C3#|a=l4qk6qQVKQYZ~%N&mVosR)u&e&DxRVMh2Fq;szEtj z0CbKmy5Nl`=jg90LP?!QUoGXP;SR3$y#?|hK&PIrzbPjM=g0c!BD}lz8?-y^L;d!1P zOL&>j>SH4b^;?erH6PBYaN7(q({Qs!tqLh z-T6i>Fb@y?bReL4g&DGHyy?AowdnN;kEmhXD<9Eji9%>L(@p0&q#UTKyi}Vh>svy$0jJCZilI!*AQU3|J%-0Pn>6fo#=?CN@f?qd0yzNB@_FCKK*v19En;YM<7(N z3wdw`Hz^DUR1*gBvtIv1OEAXWHhOkzR-fY{|L=G_b}?y4h3lM^%P=1^&6@#v2LI{P z`q%XX_fJLHa58l-@0tbAi44@%`Qzzv^Xy?Sx>L>GoQ!>kh={s{gvm$o&!KpXDto@1 zbl_zqt!aAm;z~?Q3i~CxVxB!No>Y|$gV%})?^@h{!gZ~~lomd)B9^Hqvr{0;3s~ACLYU=#Gz%U9LVns{i;KLHTD{7EAnL-%5QW@aFI` zaqXq`fuQvP(|E@_C}hXzeq1caoo6Hxor%YZdrDh=T*PA+1kpLrWC?4|CFH7$Zat;% zwEn7GK_^T>!$jZxJB8A{lp4GU8kj)ut;4a;S=;|(2{tTGal%>|RU(#7OhZN6HTpIC z*7Niz|6^HDLKGmFxPDN(+{)h~3Lcm2zE3Oe{uk8wv;?>6iKg}8YYEF#HN#NhS4U!Z zrz!DG((mlEd?XC;EOixt#0Nu}q!%;6y>M^j6}X#bJ4#9z+H`y@N zv+gZBMujgLSOc`Kpl5C{VpX6OE6_xeFTmH`-_B3-q=H!(Rs?Uj4VJMu zl;?GR9&y%URdHkIDURux5a-pow-iUXY`9#nt^ksnL6^!qb_Dak^u~T9Fay;(&tTfkk7>^v^-Hu%xu)1r#t8sM(j|kEo=`iaxzZZDG9OQp^&w+RX`pJs91vG9 zneDiM6=}HIfUdQz5hT3_(Ol|?S`xgXMgM`d8*=8xYcS;$bT)UPpKat~P@X z=^B0&jxNtbA<=F#U`Cra7O-^_9)hX(&QivYNXe_ku*jFS0nqB)ZveERK=Ms_Q%8Uh zGqlm|V2zkM=F&0asB?r{;VZ^ps5Q<}wgW8hhG|)%iQ05m6aQ*cRL=nyK30H3(Ws^1 z=r?V_sOuMclMY^n%uII)jSn7?{x*kq_9Fp0Lv6`}&Y=}hY7wPyCyNnl6rN_)>2^UK*M-R`h z6^krI6n6*jKZky8yBf@T@@jZs&&G6E>5Q}A)!=rg=h%Hvh~&sY%4=^wXs?^txqvGZ zGW}R#UoHQ({Q=u~a94LIMNSF(g==*gej?>B!;z#HchcOGq#xCwKt}a^B_j2rB|)(^ z!rr@k?>_G2tjsdn|9KY(od63QL?xKE1Fb3tzy~Lz$8K2ThKj3EGq3j#E0V~k*@jHE zjvMAf$Hf1!*}k>^j}1X=mTdd0vSf|;ts+r$GU5CF1B00MQR718jJnW9p$^vjjaf!# zvbqk{6yI@6vWtZLYN9obYET|#q<*|XCr=K`Cxkr78{ej^&d) zIu%S)Lsx9eG6RQd(qdoNMXe-N2QmYfH5Lo`N;Q%B1(*E*A#yy@X?U$HHeZ;73tpt8=)lxu2*gippnF>{6g zHr#slJ*j9h@$8Q?C_udyWaZ(lw@BA?H;1I!3HY#QzhD#IY(+3vMED2W>Qq0bCHoB% zcw3mlvR`FP$n+oR>+TQ$3(pQWla)%Crn)QG?Wm>Ix9dK(;KyB)Xvj{m=--7kNc8AG zT9B|#q@IhSqM}>S(6`OoO{@>Utgv88L%d`$kG@ElSOU}a^787Q^*-e(K?@fc{uDXK zyi+EAhayCw&4PL<+jswaP;8#Vlc$Cbp6Hx2Q*~V772kc5YebU)ipZ3E9&58*mn2#w zA0xkS&vlsoU5g4n1YpDfA?WX0fITtad2b%ymQAk3^c3sGqc%0&GAkTt` z(7Z^)o8WoJyYLy0$Sy1H2ZA$1Aith1N~{zs*_=$sLM$-_Ab0H-JPdK=YB4oI`CHX~ z{<_MQ3${PDAbLgKh6SMq)W4lW+M%4n?O#uhfvN8wj$UedH-8gDHh@C#KX&HJO|zD+ z<|6VpO@S)8p=c1{Ms1}+Sl!+%&}*r4;pTc-pgkVgXln7p3&c6cgK-v ze{e$nT$AoOpA1bY@fTPN)fXLSh-Vj`WL1WwSL_%cNB=UX<1+`3HdZlw@0d-QBju_r zpaQ#yobxLiCoefYONG$c5+=AWkFbXql@^iK719Pqo1Efj8-YYHQ#v@jJXo#(F>o>n zahGoiC3p#`&>+MMxt^r?N7@s`N==y7aY`JqjK0st&$}nPW`z2zSq@QlRwU=hfv-ePr&>_RZXt$Q?%IzUV~#RCGZlo@~`< z5Wp}V{IZ}DjXl)VvM%OOWh%rr2wawkrx_z(Q_D}%BK*Y&zUNp-W~-6t1s|ho&=9<+ zfYzhhuV1mw(%HLL5ig5Wi-0`y#sTKwvI#k#8<(W4Ga}{hmd%R(?r5V0(7?SQDOGCC9)ikOzcFaDWhX69r`0U^Ca23+9+gbD3|n& zO2d$pzQ2GxQD?MnmQ~EO<9DTK%x{m2{=N}p_h;#u*l02v^yZu+x^x?C#CQc#E63t* z@{U8H(&#eh>W)LDx$f1GVmP6}5p?01r%ve6n@PFo8Q;={VmWcWnghbHxG&$LDh%N~ zCk-q^?4|e@!_Ok;^zgrC3Qm~0jo!c@&d)UD^KHilOwh9av^eC~bz&tN@~2ZYNZe!Z;rsB(_QRju!;9C5KY??XJvYTo zYWJ3%I>C(&+(-E=C0`_JThzcz9ZoA+(?VYti#G4jU|SFr9sxe+m3TnCU{K zn1pcN7qub6y+eEd@7lKd+nSSQhS5gm8b!I3akSDT2HnDfv&IIc4cYU$tI8VZQ$jOE zXec#SUO)gI5FB`NK6ZM%-g-)2JEMIA-Gu0!6$J*&c{cUKeW}LBbf=!V4BsVhQXAeF zunh^ebMv`;x%ACyA#s=#(4lek(+Q{~4T9y5eqPU^c-C{s1vz z)G~$YIUxS2-2J`tdp~@jeJLf+cl$S0B-ZsAGrv4gc-0BS91gHB*-xKV%_$7nNc*f? zVQT~;qpVj~PdY34lkbbGbKW1S{N`JvSnX>&YB;`tw$w_dZREJHf%VW?ugI0BiPIsh z(=kV(B~T%&`$vIZbBLxpR8swDW1tHpL>SrS9@R(c?nhJd&~TD zR$mw)vCG#d12=GtXpM5H^48C|v;-W4b9R3OKn%^i{=P% z2PP1x!N6EP8#$NZOOh$LP+Go{%|Pe*0p=Dnp-L7}P+U>caadY>Xa_cOToEckJUTjR zIfugBgN{(3pkS%yR-1=K+#ej^`6-<%8i^~9?I<1N1YUkcu{MDj#J|DTM)f$N%lO_- zMKtp!?o4t3Ets_9Y)eAx9cpQ_&&*QDpR@a-&`pAPT4Cw|T~)*V`mnpqojSVDdJBuj zq|7DNd2K&iqKyLMf72YAZup$3r(QmFzvFeHpSL7PKrWN`9H-#`1d@^KRO&XEpBv>; z1nYpjSK@79J`fme(Q1S*dRS8MHwn2|g&x(BKz#!~hr{r0J%j zb@rfBqJ1YMuI^O^Kf4G&z|G(uvd05+mK#k#6-k~JtwL}dHa~%td1~RbAgb*mplX1P z2ty&*{C&x6e!h@MwQ8Md&vGlD_;Yo6cIv!Di^B5kkSCo|;+x;kRBvm#_NA>IxhIto zM0O(ODCi%`(spk{VyKfFVH}`ph2?exNsadZwUy_N8KIUPxrTIF(sYdWCr1>9^s$5_ zT)uF@BDO9GGfq$s=hA*>HUxB@UIIl>i|nKOR$xpC$l)w>_aE%g+ee^~O+fn9T+oD; z=+-lg77F%0ntC0d40+o7Z`@sQytk6PPV#%550bo_Nf!S(T?VW2`|$)_CI8IVL0m63 z*EdkUp{Ohgw9lWI`=C0W%r-DlvM6)U!A{K)lWCv>1oSDlgKuq)*InHT_0g9$mV&>n{8k)1{u{}ZDa;nTvRO`}@B73G3)9$%TOm)eiQCiW75nU^O*p)q z3iukd=RMb6=6;FlacTdaCot&XH?F12;TK$KO=wOgV14ebyfn9k3w=up(AF{!gRF$gGY|D<(9zRPTWd$CTjvKety}=Qz&Ok z1vg|@Fuzi4E*~b+v9E{e1KA%>4%7vo@T-sKZ!-WNf?SHbnPVPd#NWJEF5c_;?74- zIMip@#E;= zLM4Q2r6D>?_d>yZEMro@xHKBUB%Ac4HbG)>7;EcL-W91GTq~#2y7HaV8^Gz5YP^*~ zuv3;u($?j9pLVhP~JQX6Pf9jWfQ4pzF# zrUO92lIyxaq9WHS7VP?rrbLdf2hj!gm;oO@7TTwX`dwzs$yMfqDh`gu(@DQ7X{o_l zB0TEvziEK&ju=wJMDpewpjtL*zr0$#fT3%ue`6rp>Bil{0bFo=yiAQbY~l?vfKMNPJtIZB~nOHabr zP?K1{bWDAcb{%eAEF6*;*Lt=gq1&>Qldosw!ULBI7cD%GPBi)Ebyp3Yb73oO=mzHk(rFflb{ zkjqy#u%4lzHsX?Ay=iGh3--U4hMFgvRUnjB={zX?pE%)233LqZ(*7!8C$I`UZds!um<&l>$ zC7g*GVe&O0j|M3gnR)u`P1}wGl=zFx!JA+|yNFu;j0ch-lTtm#rKWAwz-!dpa}3au z7m~Zkm=ZznF?j>%{LtsH)vU#s&vMkfN~V2y=b|L2R1%=*jNW*t%3+`(IV$?g+UAh*8bA%f2fbzQ{=@er2o}(tJ`n%rXBa z_wPOG{6XzQhNMo-iU6JWo2oJIH{XU^y4el$ER*3!0jFH6%m|iqm?6z~ztm!Bo?v9L zCr0G5s0})mv5Zxv%Fd;!&rna*h?DN;Fu4Xd%0|+!3POR zcsjPMxZj^KIBo@DR}wfyivMYmUjNyE?OmnCKkP}Rv6RS_i98CxYWXfdI$s25(_gN zv=(RoI}P&$uTFKWdH;EfT2lGf%2eZeeBiH3&2*WQ7q%|_eYzdGopXeIYWtt}`d%Q7 z^CFpzl2eazJIx$5nB=GBXOQvVv#5a;yxFC{xh$cccXU^nRm7dmt;>Qj%raX^@v=-` z(=1yyFD%Wb-mE&$c3+gVoRpJcn~_@Jh(A~{r35vTj}^@4`S5jjjojx(dHCi$T7FTF z=R^Ml{l-&nSpIX8vdkjFpUK+6qzpLLjqOSFgqX| zmf>Q~>HmK)D}k|&<6+wHz5{jFi56DAe?))N3q^>HFs&fjE*!m=`45jj^cn8Iqyyx9 zWzq_A4qn$fvGYQFgnUNt>&;Rh{X#)S^%T@eiG^N?1iof4bM_qZ$z_xV8 zLT``5?4PYn;hl`flZmmsuK&Z_TSdk7wAMP2-XP!KHDx zMuS_Rao1qM-932lZ{@$=z0bSPKIdG27u+xggIcSrs;lNR=kM|L+^y#Wq`AKZb3Q+> z-SJlMU6odgf8TI*S^O?5#GayW9)P3fpY^|mb7XSghY5N|(a)|ogT#&5KkDB&oU(^7 zXLRIY(;PZ~(V*3o6qJpp(U7AzVJfT3(on`5E@^d@` zgH3mos`o2To?7YTb=E1>74-T#8T&r|g?^J^R8RR_9MDCy&gz<5rQrN0($X8N6NHe# zoKF-52BrIHzXi(7k|+KomXd>Jf=lJOMi)~cSy$Aoqlq+gdM>cXdeJ@j((0sFWhQFJvP zP?92tj!8I$aay@>pr>KbR@4tT2byc+x4ji0ilEETeq5%*0Syq6&_$|Ud!_>>qL0hJ zxj-@p%(7+q7mt3`St!s)t@dyS_aDN7$oFMaTK*k_y;9zf3b3cIQ-mo-<&EEU4vyIl z5fmHoq4NC4GsBl4M^=zBzZR#pU$)V1>WF}0xl>JpJj~wF-yNEu1o3!1_!?TW58_vz zFA`X<;}_0efzH~dqbEgTi|l$1z07@AVQ=%!En+6lx_5|?H=3Z&=s|;lbNj`C?0~fg z3dAOe1oXLRY81((>vsS2cbG=0jc?E?7x+~%uVC-Tw*i05#nOg_jWirejLY$@$E**| z2IXl-(-7p3Rl2p5hZse#FIJ+B(7XyW6KCLcDCMsTYj_ksjv=L(VtK6U38lOR4MaHa zESt%BbsFlbM0Tmb zQNAZG#mmuNvV01JpauWB%YU!rJj6qAd>S-mL+{1dLQ1o?uxRNH}$d=4uA8iz4CZ2(QMVK^$EYEwt8GXp94)CGz5Si?gl8d z0>LD%!vt7phzM!XsYJFD2w^zE)6pEX_Jb>GEI+wrPIL1=l?Tm|dNdH)N)g=7#Y7J^ z$uh1rhsO}ni#c)p%A-f;RV&gV8c-`D)|cbMR#4QR{uG)2ckUj^b0>dpWmqUvvneOx zQKR~zrNAQb75#hSD=)p=;z}(rV?I_jTzC;}Z`*^)9YdUcTz+*Js`}evS;Azj3GsIX zp0ZK(dvNB$B>Eh*`>j7;?2(P?zMNG|ujZw(#3CStILD}WxMIqV0%t~Ab=|@qZ1cS} zh429A+i!Pzg~^;mSj4ebdg`sB&+BIPa${8Q1erF;3Ild2qSM$9Z~c8SfnN_O3WR~) zA-0m6PUmCqlIhp)rG~cdg%SiXZ4vz2qx5~yNTiOzm+|INh=SzPDHQDCcz^p!n`7M+ z{XhR<`5=?O=okV4Xf;-?;ggLfVZrOxfRHKMmFN9rQhnuzhW=QmAG#}Uy2I%w;Ov#C zyMU>G(l0;)2D%EIBTur)n2i6ih{Fu)Nl8c^2GaeH=vS|@Zv1{rk^8N6#)v%Z<*Tgt zlmi0h%ILDMhH{7J;Vl|q3xu%mXW-lrm`{T4krlUVjN2?H3%OLL&Wqy8g)V3q$UMfv zp9^d_=#v0X^*9c5rkUO$85k0fPSv4Q(_ZXfz}A?=WIK^Bp%?kY8JQy@%?@!gVZQ9o zdLf$wmK%9U zBK5hJ?_pES$_^lXt_7HSp-t(yDt4Aq>^5OJP z7ad@J=wvpYEK5`6Jl@2_sZv)i%4Abl4o%nF;-=5=DO^d6|By{~*>VLgnHp^BDtYJM zJs5&BXPg-^CXku-w~p=L-(6yqKU+C1wX!5u;>bTEbn}jZrg}^9qKacMq(EClp%f_6 zEIBkQW+dS{9_RM}k>p!#5ggD=HHhDRXWx8Y0J>0bv;xG4X9hdt&q^8(luL@nggF2a zQ#;b!GUXR=c+A(Eo3@6I%?8}Pbou4{v^HY>i$sM6pGY<4o1(F;Y`jx^7}!IsTlQ8? zQY!Xyn{gCR^scZf5EhFpbB)5GyJqcV%*+oPMRf(WX^rFlB(S7ONevX==>-pXNPj4y zTYJ@XD)&G@0`Hj;AHUn9$AlPNG0aWZX?-cdo_tm7%rrRk3w%#qZMDGp`0hAj&1%~ z!{qy`aE+U~Fy@SMBKhq?3aG*Fd-`GDD)b$i`>l1Bydtk<{slY1%2w%{`B&}zSJ~Hx z;RFHWv(FxmCLd0GpOS?v;p=OCfh#oI3pbSseznP^S3)lit~opzhit68NHBFHNwA31 z#zba?7*(ZIT*Tfoc(XfIW(Mu$MS*!vUdHFC8y8$tPw1$Yck|tJGQDcEG5vH5yJX65 zG@}rDSzb7#XBdl@-;PRcg)#Aeo5h`LOmTfm5z*o{asNuq6{?8k$2cbPOA3eCG?d1A zbo{}K!YLF60&}_ZF3m?)96-`?lF&X+dPj5Oy~V<$5x)I&S*MP?S_!-QecT>117I8f z&-fm7HO7C$^4t*BBmPO#LWmeD$Njl^GgTLgb%HDZ*E2luxjgl&!+2+r)#T5BTJ-bN z@n?`cltf8wIx-

    %pKxhY-d^@=mm;3fKYM|9u0%TAhp3YM`3dwHU#Q%!;Rw8zcbM z=f9qeeVy{XJeSSitgS2P!+N6LD-KFIArqg7-}tdkchA0r4Ha~Li)PI0Zgm%#u3aTH z%8#NVVr!Sle&pD*u4|8&Oq90i7wecr342aJ(Bn}A_xqmLB_1ek?9Fp@A`LHCgG)V3LO zhrtc)E_tg415)_ac>1lK)RaZJ^7w+LJreb{70qVCDdERG)gTG(4HF~pkfq9K=f<`H z$D(@C7jvC>(r`O0iRkI6g#(wBYXG6Z4mOCPe9d$40rivqoe zT<3A?(JtZ0FPaX0Kkhuq(IhvNJmsU*ZysCmsr+LXGN0b2XmL!bM%b*~4b3Rl)!|V! zGW8u$N+Nu89pH%8@VA{Huw;RUsk?jCeehgBQDQbp6M{#Fm*S4bzNkVqdxf3OD_YvW zcYKJI*sq(F=jtFn!Qb^3^kHU8kp8E!`vwC}hN&;ix?1$ZO@D?GKdTMg)SzjU;&w(6 z-#!rUk5}pD%SgJ?f-)|ecMWPudk^15YOp&Bu2!lDX5OPgfzvQF&Y)X!INd`B2+3Z^ zL-Rx@>bQ^Hl5UQcmlo{+6_PdaQ64I?ahe^u>Qt&C@7|Ahs25|=Wv#bfCk*^~u5n4D zm_KZ=PJ`9`K+Cl3tyrq)QvJd%jV=(9;dlP1S7DOD2C?Fph3BJvC-3KyA*V~Ov+&VX z-EmIi!}v`Jl_@m3!`iyIA~F8IM5U!Wy%CytCwPb}7139z()~J(moJRD8%%LR4Ox^u z$!NAs7fM{&>tjy5b0)dfZ>rNi$XG3s!99>EcU@b&HVKbJocUJQl0= z@P!5GZ3J+yWN<)V1X+%k(tQ@(4w1%o5MyLj}uU^5RBzHTI zFKPM`D6913R4J5sMVQiXjFr^ zqWg-H-fJEEpxyk)JoINiWJ#-h1`1+pCl%)3mSiL;52cF_#qe)8I^7b|9HYg#x+e`9 zb=y3|8LM>y?-(daOTP`Unjw^C-@g1hW}@1=q;A{vbu2&e=X$laECfJsEf|!LlW&$r z;&Su#MM}sC64Hob8;9}!H=-7>Nc7&s>Ay9*!pse<64)Zx?H%#o@#xgX$yXO4k!Suv z%mlXM2L0x@!4VPetsd_q%q;|mf7*{(Qe~QA&>9f;O^mGzTjJ!+0pGsbM1V1v;@}fc zA{B1kJ;eN<O%&r_0X~L7N98%I$mG+PlrIgd@%tzzP?#q zj7)l$ATH>(FCOK=AW~w0UjS<}WOpc(;Qt|EW^8JXkFEw}5prT={(us48g($mR_QB8 zDqJ~jC48Ov&}N9<+dd!orau#wi(QQ~_?@TvTRS5v zl#)ICsdU)ytbB~{N81Yd0pd68+71EACS2>&K<#At0S?-JS)JMb`zcfGF+s@qnHngb zB)i{t)sAO9Pwt9>FZYGoFK;a?H9&x2=Q{oK;^N|cE_w5_z1Z#dZ15_wm`T_E1U;GG z(O`d8>pt_9!!c>fU$vjj*6~hmks0-6#gV^K(~nZBvh6ju#rmnq;nZ2 z7GT9=iEBHzS;nML83eUGzB?=k&HQ!vnQq7r^B0Cb+9c6P6_!)P(iO+RvLRbue~||i zErZqyrN85q){MsMPZ>&>5boTgufH?bggKK+zLfQJfJ#Yr^NC*A(h{smLKMP(k`}7p zv$|9=nbEnpZ-)7nHy%`AsQ8qv4DMw3dNz^Z$aYi0YtQ_-ti#YfykuUY3dotz*=(}H ztc(T1DrfLOqA2E-V)8p7Az=Z&Me`kNcdrA>40LUX4}94WlNJ!e37h|5k^U}QC zj+bdOLUzMwH z)hqvlW#|K(KBp!oK7A0YNC1njt~$XRxbbUVU2Jl1LI+k&9uZz(kHvuXmaJd+9pDB} zjTX_kp8C}|w#j}!FJI}>c@v|#fRYPWr5yyv#`bC9GUBSwPJ=dkPi8muXxwnCSVNUm z7)`lFgq|{1*0n)i)-%=PPd;)Ne-50L(#(rjYw-m|i*=o)Us8W5UkI(xPEY<%#dHh>`G8`HNeGBw$D>;bs z#)?+P+%qOX!}*Q=J+|tXo|pXk@1iS!t0Rv#iWf`VdyV`Eql2i*K7BELFeL2l!vFs53m>;kh;cwYbtZ8%3f zKS#8vL@c8NB}b$9TWow2`Y1EzuaoLgTJU6w1ryVIdCA~S+kbb7_ZfPP0bcm;*a$ar z+jGol0rl9ZeZkCFKk}96>j?*8rID!v9ta=^+b^3Kqyho^04<_7wv-L=OyA6WD0JY_ zHr!JY^@+YA5{3@2aST`;74XJ;!C^=z9>iS_f$}&^B;`#bX+V+rDwyWq^yNla|Gus{ z`Txy8zE`;NhloH{kss;3oPFYg)h7rq5?@U(>p#!C)p#u7R2nb4W6xsBBzfX$YOW38~jqUFo!-yNNuaj-t*Xz8i45l^W zr2w1YcEU~w4qujht>Du9{O9AtHbYS}`v&XLkfK_J-yAcD7~EXzbt(8rq$7^0!OYAp zQ{jYvQ}7OX^0;b|++4WCXwzjOFOJPh@D&PTLQSb7*VxEa`-;2=RHrvfvtFBU#msS6 zs)x^;PqhfR)GC99!@|{3oI+Gm=v+5@9MXdL#eO4I_UX4thx;M2y-`|8QO7lg z{}SK>I1u$m3|0e(08oh;4uC#ziQ1m%d4bM$$XdiJ3{Fgw|2e&d;=7v>D=#D=INSJ$85j(j;B}pb6f$b2l({#P%N6lQZuEE}Of^heCdG zCF&BxwU2rxZs_}`0$K;JmeTx>=L5sGCb~E zl-rb4)XAL$=a!Z#?Qkk$R-Gh+K%!T}FLp8bS!bbi8F=*rB}OHUy63hF=3j7v8(7fV zbBrc6&oP@%{;D<5F-*IroD_s&nr@b6GH1UOkK#HFv9?{75@S1N%D1puOelT5dOAezp`$rKCyLco_m#B0zUfK+x_6@M{*9l_fJPEq@rFP@~ls9IrE~ zh&?|lr#5LAl-SFP{+t#;)v8Z%kQh*+_?cLIFM@a8+LhIS6_$2}6F6HK$>rbn0z41o zzcOs8{dXx2e`vzWmg4^+A~tO6+*lq9bht_?`NBakt<_gAiiP_k-^jcysm=|PI(68u z4hZ~=T=q8FHIeLFoy^v4Ku*R&VU#3k_mhgFZ;qg{Y?HuXLAhY`C&@-^Vu*`<1Bv3) zKCK>WIvWUPP3+_cwy9`S02!j%jH+25Sb!~|#JN$QEW(v(i%Z`Zme6fw3V8|+a?f)! z&1mjte$!#hk%Xo(HBYloam@fK!ZTdqmmB>nB~r>xP2t{hRYM_I+3QQJj7h}|nk5Lo z$iW$v*|>dP41d3J?f#Z^6hIM9nYE1g>y8%%qU0mrep|Nl)dbNyWsi*D7TqhlqE+Gk zj-EHFz~K9oneCe|O9Yj4SJ~6LGjrUHCak>_jU+(%`99uCF3~XK1iGRG3#F3yAzNwl z&a&{jV_`0sA%A`&I`^bR2A-;4otBqrd%;eiPZ9ebtLd@>^pQFW@1NyGW5RMJ8UCP< z{XDW2Ma}H8pusK3VWWj}p4jBc z!rQ_r(^DuM2i8|3tG%!7B_&_hh(Nq%{i*bCgpM;^X(Co$qGBBs`3~KKFW7@s6#tji z=hZM!QKJ}N?Jb8fq>UBLjy<>QB{Ao04-YIl=aGCRrK|Nm>7qp^309dKxlQSOZL=!@ zMX7&7cy#EAPoadVdz;uFNhD6#Irq!nO#csthcI3ofg*f_2dA)>+Cu1FHwtiAPgikr z*(jGfDM!eAUji4~18g3f6q)HouWQ~PB?aC|dsMe#@ z-(>X7MXN7ZF;0D^WIdlAygi?$RgNCc{P{&R z{Zbo@Zy#zgNPO>Nmi^CV+q`dMvhKb#F5hj%tln+0`|hNc+=1^m@Uy`OB|5MJEg@JZ z{jt^}0)}wF=&axIEC_I=k}Z1r-*|GVI{Iu9L(d)e?W=WtHu?NE*`GGpLEF1a@45++ zOCItXmY0{w|E!bWRyVd^h=^T00T%tgk& z1^%o441;w<^gquN9P!pYd6VyCovM!j{n_Y3k7X@~O9f&ixR<=2>U6N1(65hZMO}i3 z(J1bakU5n8NiuxvM7KT@GGRzNsmj!d`aUYB_&x2UX%ZhHTH*B(=W>;| zq;jr((=eyslG~X~-y3{7FKMYyd~j0s3Y9ySOQna5bC;qp%z!{HnXtZxN=VWZr~#(#UHp`=w;2Ixp>vKV6PMM1Ab0Ht@-!+rd#V5Z{G{d4hAW5%il9e2m`uBR5jhzdE@HrJ{lJ49ZW}LFj-G$J0Bz;UA?9UqNGO0-0M4{SSJ*tT$Jne11O^#b}<_( zC@y2d_8lkZbw)+IHqcfTN4ihx9Zwr`jR!MSP} zs|q_aAWM_&O4Fk7a|u}T>)a!oU>V8d|4gMPUrqnWq%6{NYQf$#9&_azt%7AeK`R@3 z(D~3rzJc)A^n!aXfK5AoKhdaM$FgpEklsAE<>Ty^-Vd*}Dr~*Zzr-FLIn$jk+OBH~RV2a3tK@o7)5{@lgQILnfNW;t zilRk5Th3-+^Mlxf@e%8?=gBUYjrt+C_bS%|j~*=PGr%ob&kUhd;Iw9<`a&cjMa;&I zxa|TC`QY41;rh|EKu|)1*rCs*d~_+Lbe<~b$5;w49Of~zf==qP+NnSh66j)pfq7<1 zfd2T3r&|L_FN-AIsZ?p=0gYaVNBN`BdI2!W>NMaN2z7X{_Q!5BhlrX7N*aM})QY-Q7LrdpF4&Ya0sqb;Sc;pCXf|r!P(w-Kb7nK}$zIMDr)FZZzYR$?Zp1Rx)J4AjRq z|C6$`A(Qc3Em0Z+OJfy93h%SRqnv(f5D6RO&iF33Gl--?J+FCueRhyyC7zK++Ig# z^rHf_UQ{n;c|VkiU^^j6=ao~7#ss9XIyh0wA{eQ6p|tL0;27EIYqcLcYjy3nU5y!y=0-1Y&8%G>PuTMfs>TQf0kVEYwlQ1LxUy^hBmyV60ir#pE>;9~$`Uz1WPe*JQr?|rD> zmh7tD>9qIhJ>X`=5c|E>PX@l6pl4dY{G-9=xU|v&YcFOOI3@++`E4qWp8g*g3!e-$ z3gf_q(L|6kcZ)23n@aEH#``~&waO5Ay)ow05&8;@n0O!cqSq-NdMTJ`u3|2x?*T5c z%Z4v;f=R9Mhw3-~!Yp%PyujQ39yh5wjLSoCCHF&3C2of#eo~XfbJZg?UY9^o^&pQu zelW}%xhZ+G>!E-ye*~#1t}&3LBmzgsF5?#BJPLu{DmYxHBC2Y}BvMNaMKHvI=N9%8 z9E#0WcqZzWhc6Vx$zzFZ|BZgk0xp}56scB-GSDSf3>&KUNOxNZr*ui=Ou=6B>g#~3 z^O`Th7&SjKn95@-p^Bc&SJlEDCZMfQ$?@_Use9W+*$q2a3Z>t@x+*d{Hvd}ki}&iB z&J`pN6xsHEr9a*cXwYT=gsifuJElq0)ep%b8tqz+wT>xH)P3pxjD*3tqC?Td|8U%X6LBp zIFs+4`L--%$`6`0!V4U_gNFoi%Yh1C%N0R!H<36XS)crc@sjdXlKh9VNdF^YVDgrnDZlf&J#L^>J}n(1FUa8&*1NR=(m{>jvME+5IeqVFhfub5WC z(7$ZkM&U6jD*9K}@B31{KWJ%KF?3{-C0crIy{;h z>$&3Z&Cv)T>uuIR1@-5Y?~H@hTGWv($u+h73O<( z;EwO_GrD8)VkDN=Fc7$Py^m%I{SH5~DT<1D1rWX0&4u!(ZBt@h%;WqJvMlolDYp_y zY<_Nz$;`Z_FTeG_i0HwNJv2DYti+@hqlECQ z2PmHuF4Yv=uy8qk&QVd6SL_i#LWpvz736bvYRPHQZ*;bM`h!Mf8H*|JeB9aJZy~U2Mm0$`A$G z0@UdK@=5OI{vmTl0UlRZz~gHC^kkKTyZh$^L2#S%|3hUZ6E#fz;oT5vF~nF z<>#pl+3dS5@8s;enCH+L|I5bfmCKHQBo3B{jFXnrwjs{Z&vXsuSrp@$W1pjsXDa=! z%8af`OMcflc>MXi)BPO>kh-^7tqXR?1VmJ7cWak_xF34^{|;R}Z)j}aTo!wL!tlKe zCV$jzS3fNQPQUPco;RIQi{6cb>of-I=HUJB!Wx#+Bdn=TV0-$E7YZie!6o$?g^mmj zZWpJH=feuH2HhYFdH^(K8dPY%qoi^+wo0*%dCVxuP%8b6plq6;N6q0liR5ZYi25)U z>y8ZV2Vy7%9MW<%<9*?vscT#!(X39wL_3`ls+^q<9O7Me{xWqrQ8dO2ciA#r3v-9bpYHg<1jpTh z%5L2v`zrB;lFc`Y2|g?*U=OgLhys9b%hlj)Bg-sg-cOrNSD6Ml71mn0_)3;8D2g@f5DWb}{|e=$4OUcPOIk z2cG(=p?7fuDuUkTc&3Wcci@~A5=qCk8TvFwUBv0E5o0^fMd@mFUAn4HBhWOuFcw>n+*kPd6-a5Iw88;vvEds@(-9+}ugU7Y@9fLb zvM7Unt!bd=!W*;J|J)^pOl;}|gX`$AFXVHQIMzj7zatfqPhY;%)W%NdvEa{bj&@fF zsZ!{^{;e_!7qN^ykZ2j7c!YxrAr`gs^{BIi29>5FJ-GcG7>2saWg*FpP8Wo2xe1Di z&~nQZ&{Lkf8SxYr$?ZlBl|yzi0wUsz3gsV;=Y3!N2t^oVkbTS)sxJ*E0073**;PH0gEBwvpS?^FqGD9}2!M_|C*2{m?B`M}Sb4kn*_1vgIm~PZt!Ah(`^D5G_aHZ5{?&L3&yL>)pKH zNsm1`v#9lvgS2Y# z$KNhG18+e5j|=U8W<5nO#v6YRT0U*VO8=H6zcHaUT(Y?=*lY*{a2V+i?e^XCK64q( zTRA_L_+O{p_=AU!INRW{LH$6eOQinduQ@{z;HJ&ey`*31YK=;`n?VneI6MG zVzz(xc@Q*hkGnyd@^ArP4?WoWz^=#lijk-3pQ zRS8U3t8CZkuzdGKeizsHFsIV`Xn1;?3aB8!{y!fha=9lJBmA_tsUq?;9YycB;u1Gi z0Sk_ALB1cpdNQr|uQDhv+E!j7rA59NzEom&2De|=SL(ax$rLiuify`ixnh<#Cq)i5dGCc>$wH0S_J z1jF6%#h9iH@NY;&?qM`V4XQC|kgkx(?24(zb zAS$CsyAqJ{^0eEdJP`V0Z}{yc(dzRh%tc^>LFEz7#hkoP&!y*8MfeoZ=4+Dt zE)PkB10C+JF$PRG|2-f!it zs!~xjle33Bz?7!wiQ|lm*cPEB*%IWTJ9sHx=Ce`{7 zSLo)RnY#WutzPz<}$K(?GI27onm!}>z6sx2|L#=v; zNv)NN-g$v6^bS`Y|0wV{Z+2zDD&9%mlpG|c590w|pp|C`gNgUYA0l$U8Qt+1o= z_8D%{vi{KE8Uh6E=?N8BKTK!B1usZ?~%r|5!Kj3pYlPre3hUkzb0 zg>d2I(FQJTkgrwJ9c?s#ve(gg!1{~cuS32(CdE9PS^{S3(A(T7!FE>xW<4YZ?3G#0 znW`4)c%cxFQW;P;^OeDRopH9CpetaduJ90Saj)V4`ZQ@S{LzM`-$OsAl0EdT>}a>k zj|(Tr(+#Y=PG_QWy!m@kS-%p6+2pwxwjfqM;J{>zE2mpv<0_S_h;wh!+2}Lym=hnk z4|>6J#w9ukO*^Qo<=*yFAN_yq?^z*em*u;&{^9tnit^&8HR)IZ)dSL6UY7ht*&h9$ z_>GG4ReQpvFBSCnRtMI12DBwx-CCa+A<4i6Mv0$vYI}@euxudOJ$7NRENJ$7gYZ$o zw~m+AX``f`{)azCKxbzAS4v2qpvrYL$01|`91(~qoh{V8v=%?}3(LhCThm5KKFoIb z^^kMX$h-)DUm2k1!^0&>=xI3_Y6J6xdT*?0VHc|_AX+OkHb+*qb1@-IXz|z~euR2+ zzryYs5GNtOS;(vZ;rIu~)9Opp5kx;*JE4`~+&|h7AH+wTmogCUSM~}ne){z+)6D!# z2vsqtE+5HaDwXnEyaHw?aZ#E9Ko!CU(Z$xS{+$A=6|-81#Ua?1hP0o5%ylZ5{@SOU zhS=vR4HDP^eE31lW~vC%B0mloj^)hiIs{xhYHloBJB}Cl72yk9km;~s<^gw^lvqVa zuvhr6n-$=mfKLtUy}ZgU6*LQMjQ_FVJ$jRo?YQduXh}cD5Y)C=cj{(ao6G3Jhg`Dw zEeFqd)J}$&rarDjeToCBYNM$j?a;}~n(fVlWgqM0*`HT0=#uc4n?)T%hiE2{`zoTY z*srWOf~KA-i4nfFZ>)gnq?i%Ud)l!8!6 zq)|TsMgMIK*!~FhU63p$Cz&br3qx!YF0U>H^}-QGETG$m9Y>#;l+ESq;$9stYAYOX zi_&QV9A!IA1@$@`Hxd}d!rbN6Ek^n4pEPMQCde%BO^ei{jPPbc=Dsg&SmjTGnDS>i zkmS%ulk#~zkO(@dUp0$9%d&^@@;>SxJ*YUL)ioBkiiZ8`Ib1Ng4xMT^K$01u4E-f? zEE!0xC}X@oOoaINI?{g>XPaHpZX|Q4OEYRi`_^ zh7#I(nK9+4+huJqxwV@w&fN}|gW$ILnI>a|SH!bxe`m}#D+32ao`DUjylVrrnuuk; zld0@yA@Y0r_EX1`C;iIy<_l83r$*qU&ewkNu!k>tKL#`Q*(Sc32v~JqjjHsUdcqJp zdz1axHQX>TsIx2Lxw8YQ^r7Vq4GqORg&au?@}4_;XWeG0_-x?(tzlkBilqTMj&Wwu zyq&LY`oT$c6bgM%i;!I*lD$@JU?tlP@t?va=ChRJL*XXRQQ5LL~9W ze!OK=p6Fw3eKW)#H%rj%;d;YVUGO|`U*L0Gd1xbl2zB&3TwFOj$$kRv3wu(JXi!-) z@ACXlBflMbcu1yVI6x}9Lx?yE*x6^zNH6`DA@R|<5s z3UWL^vN0+=W9GMqP&P4qL_ScY!bQJn;Csw$S5$fWGwTa$6g);Nj0#~YKvbG9s=Q5; zB`@pkt&U9oK#OpYuGbko73B^nQ3c=`ABVE{sHPEp6H2lcRPSD5@f@dfS_Z8Kp6$;t*OmkQ|?Cqd|MXTcCQiAeT<-BQV~j)7r`O>80HS}-RM)T z;1xG86K+X}zD+Fv&0hc$o?n8IQ&rdS2u|y&1TwoXt0U*%?p6RaTro`hs)EkA+_J00 zD6LV@^9xREgr`Tc6`V(tj>@!Hz*%n-{mT|beI$Co zU0pd|12khMsNpzX_FQAe%1Cz2d{tUG-x!S}i9-;PKlBdE1&HzAIwdbZDumP(@wdMj zv-DHI6%w~pRjA~=qtVkw^~88l^@|&$AaBMW3ZXJWfUViV5f|c9(HQ(^UTKbdSvAP5 zB^3G-rHS!4ghle1c#mD~Dio_UBcy*yRqorL#6`D^h*0i#MWrq}*vN$AHHT3@bg|$nWqisQ6eSh!*+aIk zNkkMAGESxddHUciR^nZN(`$G8WzJUWoRSPx`i$0i6-x@st{EU-Jxii=Fb3aBE}$i@ zziXa7h^IJCIG3dVPLfXzX(e5=%bxEB{XU0Ni@@6-&Zhhz1wV-b35M^v9RJgjn`VX0 zRqQxg+4FO3ddYP>u35W90#l9=Z7(;JPP$`L(s_$xZn7Aaqb-1#oIrtCo`om4z*}m&hBh zYl9?z6Owe6hi582+NZ}eyX)WDV1jr|2`&kV_|x~Pyyk6gACp;h7@R~MpB+_9k0?W6 zUwDZTS-j~{qn-N8>9T^9o#~KQUIq-&!bti=5XwG$r%eQ@Ues_TtD^kgJ@)Rk1*uDQ z6#TQOQC$mW$tbNp5-fxuE5|u$vT$Ej_$V9=m@rN6oa21)=k7Q2oc#k^A^#fW|VGxmOZ8aVm(#QsloCGAH*iGEKKn3Y;L5pbT8*5qdG=9mW zTo@`A?&!%}h8CtLGB%g(X`u>`%3Ve}Ni<-;vun&mrDom0u4E;kJf<>s>OwiM*~)l| zqRHq8CV!q89%5%U0@^(^raIl}(r2u|F6dXz0eW~g;B`4QemwU-7h@aceH^=YcrboC z=~Ov++}KITzW;tB@_6cJ$=KWetmF9P@At>+l-z%3-qQGM29E#Z>7`Cu(YZ*&>C?$+ zAIp5AxhTsgsX;n_Ge=xyrYe!_Q&!&%oa}e20j;NP_rGiYeA8*AN~PS$;d?$i&}si+ zW*p~C*tn%L(z)j@z`1y_9}xT=nWd(L@=3GJM$vram2IDuZTrukd=YjwHJ<1~vT*E@ zxt^X4t#e_7z8-L?sH#Xk!l}gINJ{ItV?~ejij2iKBCOa``N5m!6Z&9_-KaiZt?^2a z%aFnEA~)9E11d*__WJvU6&vQ4@r~(xj(+1e&p%_@w)w zTqS;+sr+SmB=9+kx!dvyKsnYCTc=X^Id(OBXFkH5fIdK#`)@&IpgM8%!_USdRmuwC zgnv3+w&Up}j-O1!S4MDZI5}Jek*QdMf^WS+a#wQX^GZW4uAsd*O^GhZPONy1@{*et zQ~k7}DTxiO+-72D>+DR~t#3e4bk!E#8*F52HSb6cSK0H}#6gl;K4|3LVcUun9RA$e zOl?%B3)PfQSIhm}4`~r>PXPrw#2#F3XdUIJSdbKid%X@@wNATGUGWNg^e9)xo~k0M z`fp+0K2KihMQ#JV_~OaGoCdI9SHitaVS%sIa8t3@txQ;3V}k+LW3WU$1sDEeJRrDz^=~0bnRPP`d3yPIqjrc%w;ypTD~16LLN%1YsdjB-&JnV39@U0$Al>{zydnj z{NdZ*j1BT@R3Cz(?-AaAN1d=mFmq4MY|I#LQW-G&H@*gh-#~>mFByEpfV8(|2^2?B>mP5&%;bY*>gzl@M zui~`oY2?@FI0&XbMw;ph){Cy!UI{QQ5ue__n%kl0f%^J zpl!7NYT0nH#R@^npJM*CvZe3DMsJAV#Z7ktL z>|K}7&!RIzo}j$6eG)EG$>+m^V7y_XL>8@5w>Rj9ERzDnW?DIY)|DQTj{IAASa=f0 zTRtc2Z*rsdNx}9e3eXxs4c=lJEKQpaw|QtEIlgCTjEwE#A2Omro=SsViOBH909>^t_qIma?B`Yw>3wtFaTeMf6#`j-V|sl<6gDOdq+j2Ax2 zUPg-bM3l2AY>BFi>Zf5InY9#C|IUBlP2%nis34s{uBr zk%l}?^4dL(mY0_e-~W>Lt*I2MEGkE>7zfv@hDhPOWWu?lWsajt$Wk}(B3%hJDV^bX zZGb3xVvKxaYbuZE9T85awJx_ydPDDj(dR{`-)t#@1_cUH(6+8g%<)y3>JuX| zIATv;5ePk-VuRKScQcGkyBG%x$c=>$E%W^T)_W@o#vmwA*20hb@sE^5L)DHUv~9w3 zLzLCEKdL?odq{0J74D1ONr{c?-X=-5u6UpKu0A(r`xyZ)na}3C>7or62N*{Wsh+0~ z;e4m92i|`L9v|;(K;U`q+HKo5+kg7;m+A{d1A+eRQPrG5rDg32b(BlYL~OAYrlJw}EO%b9uEfZK=Jikq|{ z$sSd*Vm=e~OSGMte}kai6u&8+Yy&G-!|s&*H#;+(sWP9pENL9mP4ky20>jZXN89#? zWoGOa#0g52>}Cz&$2+6x&ujO7zegP(&l=kgMZ_N4F#OiKF?=pNWdZ+BIKatJ#sL9k zXh*>LL&nnUx0|HIp9=K!nsn>3t`{}kGrIZV82X}g$j^O`ir!T*-hDTFL?HL$)1$osii5Y@ouxxEs=^cjYuvr}_Nd^EuIR($ya46VcJ^ zleSV+Ma?h%zUiDqxhchE{Vf>)#Szq$_`9=y+#?ou$z9I;-){DZbFC<6- zg?o@fgIjQSmq2hRY)+o{?VkR6W_qojKLFTOi*wFCzkT1=_2s8hp;@u{>Y;3BTs>V3 zFi(o;qGXDOfGzDmO}j@+Dy8m`TYeekcex>sIA>p{VIKqDC4dup7p=qe`zQ_nZky_g z#tGVWu6Ir$nykC_?PtQUw34Z_57|Q@=SgC%Pt|B-FQoTRq7m^(8zYfpVe^C%%1AcobNjE!wt}*QPG>CYCjS6Vp zI?W9$wz~bzEtmx6HEcph-+u(S2m%tjDFTb3p)C#J+2|zA{j_!VN?Ir-(!yA}>LCZ; zy%Sz*uB+?dUxhKt@7h48eYxgF@y|8tbZvM);tn#T5%j| zLDl!C2NV-C%9$#S38F<`wO}Kds-kMrm3%Gg#VZc48BJUe6fn|qH@ra1SqnhqH+f6e zdsa4S!m;)TFI2SeEy`A<^OZTLlRt53b6ClPT{ppV=v|Ve4^A>cGC@gsMcsqk#dg8j zaM}H@Qx}U*x+ygy!%XQ|639%7npcID!x}nZN2c?sfg(mht-9!;s?8yFJqw3-1_xym z1Wgyj?w0$<8IAlM0<^OQKG(_tUoJGI;adKeIdMpUoDf@{jpN*%X7wd0)C>Vyr zRkzNhId2up*p#_Kkste85Gv zEY>TQM^}Ua`Z*4HyI_}Zh}EVLq2M3C5G!RQehR;*_`f&*?|uutYu0}3hYD1wF3 zDKT&V$NXxW|Hr5B!`&6laA)KZL;lRc%WYA=<~5*PO= zNmxap7yC=LvybT-M9HfQqmq0@_)8`zZD#jExIj}XkAhb~{n|VQ;cXxAFdO)Auk$#caQ#naSo;7z#E&Fa%^%K%UK>SY%1;~&uvB7X4w)V81d zt|9A#4$OV;ccgo*1xW0bgVphCb|EL=FOj9QG$D{MlU5QWneL>=K>cgB14>%W_}Ij=j+~{ zElA74eD>}L782=;iY|7XjY-EAlZS@S`;0dk1Ja}6 z>ALzCA3={eC-2Uji6=dux2!3F`mELR>y^Hjp?IbjXi| zbJ9;*@cbBxWRI=sr65w-$tZTIdfyShu#t<$ba~ariW9|Bq?>&G8q8T4U=NNXLkmzK z;~vFVArFuRr#$46d=wpJ&0EF9zAiHVhTSlP5KwK+C>5nu^6UaRMk-v%CtN$YN51Jh z=hv%PN1BIUtrxOC)U@7oS5q-d_nbIV$Nuowma)*C)|}l)Z^_K33FEV0>DD4MeWcqb z!(u=J66mW7dwGaNfwryBE`H5CE2{84x9A(9oIpf%T`L3`cb_O$q>Ce1%26Xn|JL*Q zAk0|)rnEZ!D+cmZvhRm+eYZ=GE+yH_DuUN4F`acq{&7X8@yu+v`b-}=qdlGcX_yIJ zYu`#_;=RBU{1q9umgUO$vHJZ%rGPlpfh;D5Y4WrDZu*olw)HeVwrN9nt)pS{R8zss zo+JL+Qjcs_2FJQ)h6WT;fGhAV&0sLjwA`_|Wd@um%|8crC&YO8$o=JQPwitAezCm< zK;_Xn{{DU-R9n8<`{R}BcO(MfoF z>?lMOPA*h+PE>WXR|;lK+_@Nz@2b)$_5N!n$T-lR%3m!pZvvO}f0>1vtSkwRE=L%_ zM0zht^4c0RJjpr*ErEFRc$TnZ2Nc(@%P*}FfV|Q_ z;UhC#vt*Lbe1ql73HdAQA(HkC$0TYfS3Ft&XRxsI^0sp7kay=^mM%t|(iTr!G1)nY zqn;s{3{aF58r~bsOw#bV*dBM5L9E1YQrvlvWJpWZOv!+Y-PsPYC!^~2tIQz~|Ekk0 z30CM&lOZWB`(kDsSf@mRAS6vAyU>RemS?Rc5q*p^l0?EvUf5`>$P%S8cBy}&!RP6~jp03lpU7&U%>3|Xc$=CUl< zQ{qCnu0CIb(Hq@g8a-V)`K}fL&zLtyel6%lK&JIdiXKe8#?VLs>8arE37CbhJHge|prpINYama5_FqUY2b4aA&Q=0I@Zmr?xm8_E+D~wqRK$TGfV^ z8`8?w*W385`d=$=du!x8>aVcUcN-2~kphsN6^de=gNL7jD-VFcWlrZn_@aL^7MM%@ zt%rFWUID?_wVmU~kwu^$HU#TA$gN>J^lCjf08U5rR?lWATAm&o5q@kv@~Vca!<#Gb z;833-J;mFd#df&9ynub<}Iy4mQBzs-a z$~CP?ZlH7~miW!gi((KPgYD6>`szaulXxf@Fr?%ps$0BmVh;`tZd|mebmqv7nNRg0 zm{!eQ>$1l$_QShA3FGku)wXR<%4ejlIjoQdW{|U!hy`V+f1G?4HQq7w0?X}7%OguD zvR1j--zeGp?PFl>55o^xFkRs3a@ zKTTvaRD2tF^|-VxvWZVDp{wE(5-rwO0i0ViUP^**%Er9xg4Jo$uOeslF0W=)t-eeq z1wt=XliiSbuXtEJIH+W2I87fLN2r6Gjd8hCL&RNM?6_9h+`({z( zr^E2WaQdv7R*?_F0|UDmdwkkXCU2F6Aw|Noq}wimd}joeGhz%A?`Am}$9U-LFnHIc z+?|_)D_Q~x_N^}=k@r24s!;3EpZ!NPowKFMr+cKx5_bS<(V9Dc46rR0lO!VJBv~hB_-BR>!=}JKZzC&p`s}iyfQ|{a`ny%1LE! zkLlajbt^?*Ly<>pPu05v^4i=2UfO=g@6BS;VB6|fVEMkUnc&d%w!&7R-K{85N^2z0 zqo)SdUgZrIKaI+qYlatr#daR?*<`KTOG3+gqfHTKk62`noQ)4$3#k6M7akZcwQF>p zm-F~Fm0M@}rSVNwZv36CY)l@hr-aD+E#AxVr_w1c;y&N6aIaJO*J(P3&=5(Su2Jp9 zSd9aJB;%~+E$Mv_0BizCPBI5A`|>4h(KFFCnHBN-j-NQA>vZ-D6zn!lae_poERGOe z%D&_h{rObrsc6PPP5d*c)B1gLlmgcu290EqehawcsC?5|Ix7jH}|urjQ_vn3tR|3uq4f3U}A-QMYQMZ z|0sDuV)yp1jnLvKI12^m0*SnG%FzbX0_8LDd%#SPsveF?Zegy^VhaJz#F@;nk7$Da zS-*C)MvRguxYWFv!<38IK!%p&Q<6$!+EDfG`^Jg%BjSGJyb|Ar=}$@iNgzgad{v&Q=L4`Benn-4 z8_Fi1N_G8dO8nu zzd!Mx)$ZEwJ%NvA2JQvw!|YB{tI|zj#lKz2w}JN*3ga`%+c0~Ed5DA)L87ZO=hTel zG_0#;pF7}Wx28J7Whh|3Z5p4~jb67c_hl8VIaPRh$YP20+F_|-$!NYZyXBs#X?M@? zYkHV^K&3LN*X~(RRDS1`P>X|lwnHhp=WdNM&mwF#X|J}T|LGLZQ~*&>LS~mL==J`?y6C+ur1}&3 zV&>}o%xBu`{7o&kPe_oAILpkSCMp^?Bm|=o8~Rc;g)5?=>Xb|u<|1wog2hUCk>bV4 zr`eVw`$>G&^Qe+TRQG+e^Kspx;?si2{ zq50>NiT+dflr7eD>la(0y;~wnI$_2*%K0RU4g1!xW;t#Th43q;=wI^?!vS+QjRqS9 zZku^!B|-kim%L+BVUsKJOO?&W$*4OU^bsC#P!DTE^EWvpbay*$CMIR^tUsF>c89j3 z*bWRJ?B-J{1`>~LsTuCCt6js$$p`Cl0s52N5il^iYqOANLwFv^n|k@cr8kjoIgGCR zr8JXhErW3di+%c%2L#2-yl9l)NYFTx`?YL;X}xr^NdCp)H+|LG8jb}@PfOI@a-We> z`(8#z>Plk;p)W!W*?2v8t0d+FNBowOTxe5qLQq7wsLW5s7g75dG?_KZmd=X=@cb`- zez#{weM^@<8W#OVN5d}pz}pOfM}*p@nq}F;>pwwas7flqlXYtcWCP!4l}NF*`K)5- zRadnRgRYuBHVX0g**1T?DEY#2(Gw_8(yEsFvEqs0kZ{BVP9 zp!13Z#2})ZcX-#~v8lL7U3r?TjkUHti(lWwQQDw^Mn-sv^iuy)`(kMjq&HET%zP%3 zKILfD78a!WR@9#@`DuKK3LqB{;Pe&;+k~P;D2&u;Ze(jSU__wXF_(OiV&swxw7@?I z92yRc`){nZucz|wNH(LSb9JC%U5?!BOw--*b$Kn{^ZH~qQDXCX#=AAh?(D(1fDF$X zVyP%Uo@S$20YWZ4N`nJM;S}K1`%~`!L}{~aNFs<%m-(w!8H_1;iV%LfmeMX z+4IbXo?Q)nf)#IduGsvke!fOCCgsn#43@r8lTUccjKr39&j;b3^~%_y@H7(RzBsbB zEilJh&DbR-fR6ago=EK#d9I%cdXdYz%AXBal{Q2t#V4|k8`mxyfF+tTu`$C#7l4q# zUN$#K{F>gI#nV=w`q?8emAa2*%l7}X*&dO9$K7nC!e>%8^5enBi8tU_$LK@XKIw6w z3wjYicHlhGdpLV~@ST0S^5-3)dAJL_+zGsrl*P_@oMaQyOD{0GUE-wRhff7wVaEa( z&4$-zWHQC-^{Ze$JCVX(#&~0>>3l>0R;w`f%}Cp#xhnvOT;;_Y^@b*4(al};&bfi{qEI>07Yhv)uIrb*TyfQ=*|o2bX)iT7*RQvj+;ZgUO=P&l zW0|?8*E6t3>%{B0bd!DZ)OoiG-~0>HoaF_JoOK{$3&Vd=$BNzqnOKq2DL~8v01*OU z@?#4Qfj-R{!`p8hAz^&mh#!tC4_M=ZSZYqTL;f3gt42)_3tQ6;bvRka1zJe zVOX5B?idYvrc$QZzE!4o1s&wh2W^CXR}A3DA?{_x@LenX{^BzKzI;BreIl;5_nkj9 z&UrVBM2eaPDH`h)k*7i>JAse__c$pce^^Ly=!=MPWGl_rIN^fF{ZYt;A}Jl;YZdA` zxn9Xch{$Ms$R!f{EF#T~|9#&zG@r2pJ9ZyiAp(ahvj=Xjz}+-zWAK3@tEnHo41VbY zYd|M;ZZ6)aYelc&6I#`COp)~h2J3d=S30|St5Dff7IgaLp1UufTI$30HJ89fC8^-V z%26OW8x6ykPpYs2q}Uan2}=Te^Q9Lcn39v1I)4$YYv9qfcJc2ih}NUM;TBi9+rcZ9 zNZ{1z;*w4t78*yPVwDMqFiu-rON=sm)5omcQrtwGvoC6`0)pMH3eS}AAk&GEoHYvE zLW+yKpf>WuREzG^S&y3Cq(RmU6E$j<5T3RV0P5JfE1arkQZX3>ZS$np)y80g)8s`A zdq3OE^v+Nd?j!2!3WH^PHOZ4=`vR6WM)fIQ=UEK;q!PS*L{M%C&16~U3MPJ%ok-x1 z5BADNGqy)XQt`6_m-(O#T6Q0C_SDH6g^&q%`ch6<=+NU>v0s8+W(SvR)N`F!x-+P0 z(aszCB+3jFm~_TB5d|7U6jO~JnH-Q*b0^dJBr`a~HmLd7F+!XR2UA6G@#ja`Qdcy- z#S2iYVIfKhXCg>Y;@5fLgljK@H~<6|F5M_ZD$tV2U>n3wIno z1jli8JZh*DX32NWgyJv8nKyqbCBOQ$QiLHx{D>;^Oz1<%2Fr`gTKE)xhQK$6ndb#D zEM7Qj*D)d{?<*$DDxV0}^-C+8fo9#1;7icOWxI-|-(g6OpuMUNR8A}ZOi8)*kyN&$ zr3r)Y`N`<;G8#i(>KH6TE>1W4e9I!VQ(O=4s-gwjXmDp4I8`*L8+jCPp-#0~$UzeM z7s(DM|2kkH1$<0v$0*E3LgAnrN|t&vC3yihE(ATe=KRk&M=s#Ndrr;8Wh8=U<2PC~}g(y_HU^0%bkPQwji8R{`gQz9)65;82xQFni}y zBz6s;GkJ#1cRrFyO&K8ycXtY>NEl^)>aKE>kA4?IY;Dhg#lX=r$^3l}K}g|U@&ZGj z8cwpaIJ?gu2@2CRRf#S{gFL1;$OIGt7p7T>YkSCc|M8KI+DX2j0SL}H$H)7pn!@L7 zRJ(P_Q@05nH$AlAJp`2dn~nKXn71i&+1vrCA;Gye%;=8j$%hQ(Itz=<-n#!%kNpSO zdEp@K)5!o)=e5w~JW+zP&u*k5pYZt+QEb4vTjf)FQQ*nykL}q^;9!C`V0Crrft2FD zFX!fBmp-2@;51eAZWuuNoIb&?Q-S7!*ETp{)}Qxj^U35kB{S!~D96{5!(Tn~&?b8` zT_lr7{(WopByy^OT8;9T6$X)~qz?b<<*yIPl~FCNctiUAZeD_m+Gl1<`i16y=SFTG zKiW55Ro*1L7Ni!|Z3Chr%r$&QA*?NIowVy8L7ORfXf05uV?`4@(-QOACk&G|H_ zb8w4DzgqPCin+bUvs1Zz{QDduLqX3p{2NvN^}?)wOT9HlY4Y=f6JE%#bT z)pHc2$}oPnwI97yy|O*hE6g}DUv*jBrpmybn*@SX99XuSBV($J^X88VL*kmlByQ@T2D;F>|%N1ra1ogm}!(^c`uBK*0z21&)<4-x`wt;2zMtJxiY*F!0|2Z;CqFy2Ue5& z3(?}y?Fo~oTP;Wpopi-o7wfh&nRErfy+k~W%6#EH84KqR+u`U%tsv~C#-$&vfA!}T zfPsE-3!`WdKD_D-GI|X`{zMD5RR#sl+4OV1x(`c~his+mZzTbgp&{TjyZ|z*J`M0% zDZpvY(Am99qM|D(J$)Ofa>m}HVW1BGgHn0}GoA`}5at4|XnJCI@A!Dw3tZ74B(u>R z5coaV;Ig2}kc$4ms+UpfcT}@Py$vnx&eyvxzm9RRAxUAVrQe2=dNkkm{We$tdNFaj zzCeXCGSJ$9K3oE^5e61xy~V%`<81F^^RMD>?qmHC`&(xxUL&N~WQP%;#2R8gW4-_J zC+k{}T>ElPY0$cX@4Iz$JnB7R%XWfsPu00w+B)u^E(X~d+%?__5{n9O!dz^}m&kHU zg2-I(^%o3;>O{;;#a4u$K$aK}Z(9$>{cikCh52(2h2YO9+kV4E%Z*Sf?K;~!H_3V} z)51i4Vw*mmFTcJ8yB z6)f-IP7DKrs6oS|(|Kv15}Nw^KEm6RfdTJ!$+0|dy2c5w6%2V!tKD6VY)YJEOZlyZVu z66uzOehu8~zbuo+HIlw}+5F+yqAI6XsfS6=AF3yLj(|1Zx{LR-pWtnIiA;Qxot*Yz z!hTvuA%yHI(353zVZ??_pv+et;2$=W7z_y~IeyZqcXBNhV-znDiP7Gl7UZ5U9se(? z$d0}~#uyYEb3`waTvsl!1%X_?UX)`eeHj39E24m|W#(r4vse{3uh$ea&N_}*ih>lG z4lQmEY01SO3y)vo^WNzovT~9XPIV)O)awz#F@9ta@b64w4FOe*q?onRR8s`M_-!l0 zK4D!w4&-Cyka|IEN%KTEdoiF8kUv@Z#87`pbagazN-UFsoiq~RGcXY%elH#*MYI-k zXcyOyOCl9J3m}CQVQQ8}Yx#l-=n9uEbqZ|MMLfMcP!O`izqFBUe!GG8D1e(%SITK? zs&`HXI7k1NpA!-J_$M--BD#2t2Eom_-#7KZCJn)EQ5?Q|EpR@1$R4v!+q$>Cux#_5 zOhjC@+24zIL7U4piHangwd2j~EM+`3*Ee#uu#goIpbqWvcrDsIc#dJL$762Dlu_Lv zIW2lJBU~?MoR64MUHXS8#rX_bj!kiNpOtnd`$f6Wv8A@)1Az1d zZ_Lc5H7uPZJ2y{NkBoYS?*j0Mr$`k(e|YU!tKC!Tqtnymf!9hZ*+lfy)(P86BitgD zw`tn$I$+-|@XqXMEBWd7iVhY!{ms)303_mc5;VA9vdZ>HF9rXd@@E-txmTJ8F{ZQM zn&?u!$X-%bHy zFC8he_3TC7(F4h1mzd^%l1oxPSK(wS)F-en=W zTZTi{`H~>f%9OPI1Wn&ldsV_PvTTt&j86JXpzg>d_ax+aAyH|L7XJj+&<`bMM1BQpe&r@^+8SheuVhE{atvf2JGh<|A#0sTo zsZj?Q#5sau=xN##$V589ELhRFrWCH@Ts;#6J71KaeM;edGs-qusyRtQWO-o4YD0pr z^1KvZbj@AO$Tb5`Whnn#y8VMw`zrM7lAfuzHd|%s7vhRmXKC}ajClDB6J^0NmGT~;%LF%%z7GetJdK_;+`Gox7G09kC)kTG3j^aHQG zOGnP?dD^u0`kb_(ty#HftdQA2B&BOXuu;+<K2bxCvnWv7EhmOb%>$vfxT z{#%WVHlNwmInH+X2U*t~*dhF+C#QdI^F!m>4q@b4B&wHVi*+*te5Z%I{n*PtHq$Zd z%&}UR{#*G6r9iRz3F&bCA*mnsongwS9Rj3h0i2#r-(q&^C!8_Oio7u_@;kW>SUb|ya7RgyPo#pCZboPL(eNvC1;Ax}TS#K>)5aJ4w?iAkQ>_D0 zh-M%EDN{%zT`D7sP9k$sW0>0*;qR{cjJlTHEKizl%q3{ILntj=wnnJXm zk!AHy*w2B!FQ0Jbwz8?epLTi?|Csscz`ch5l664g%E6v} zWrP*b1^~FASoCfx4olE7$g{j8`g>a$D8NlB zrgEw_Gdo=mU9e85WI01+h%!GvT2C6jvw=1qSbV|HT0P|52l&sCuLON}Fp3_YiSh>Y z--CEMfPu}c_8*(u39Bzeb2hsH@fYsdhOpcH(vIwt$Lo#R9`vxV)y3g>g3d5Ea{K`A zEUdYU&jH_JZv-DS&@+7mR{2H-@rIj)Dd4jjk1A4WhI#k{{NMS1v#8lXs~N|VxRn@n zlZWy3UHc1DOMkb1ZD3epLvU%Q@mxf~Me*Wt^&~vNNsn^LwJo#7j>wnQeZ~NKRoHtl z^n+wKL&ocnQ4~cvD1kXMRj_lqvcjV~=UczC2|G!XLPcqQnCXuPBF~yf#!y(HZCLmK z!HCjapgMIh`O000lDR}7)1b;Kn4#qxBD}_V(S4^Rf!W|o8P0q7vNt8#%jBGNA|CO* zLd#_EcbQahX?EP6$5A4FQk&}LneDy=?dFfJ{g)XBy{EVHHYvPs89h;L2i5B<;GDq= z=d}R&Q|V)2(<>hP+5&mea4oJywc=@7LHfNhFR#r+T@`V(e&KbEHA7h6i@jo(Bk2=vypHPNmwvz8qh!Hs*h-pWDks|K>pXFU7y{OZTZ;`pEL1u^O^fFBY|*#3>r*Ena|v=k`XBWN5AhKpU}mMdkyCM zXHlJ>(d2i5N$3A^O~esH|LZk5Pg)UtsJ}lTb^_ESal;g# zP+bw4$PBOwZYrq){Z8#KQZ-~_5cIfoAgTJyDaoL<>-PP9(wv+6-Bf3vn?f2u`0~X{ z^vB~A1^jNP5+37|PX5n10L4S&o#@#Xz39{MtD$6(^II!&KKRAo1B9p1WePX=veS=C zET?%EqXjB@9;58uE8sbFX6LJjgr03K!;?g^*?$GJ;JUW37R|>qKcYmf-t+<^dAy1x zrJOZW^VTC&*HUax<6%RgKFhPul%dKwZ<*-xSF%-~SIxU}ABZE+YEbjXy<$haTyiz&m1*Xyf zSQE&yHaF~Va02&4g@lqC#>4K1&$K_6CR{!CFp6f|t~|~LRmvfayR>618FJT-p;6<=}Ehh?94At$$OCxKhleeCaZ2&iT`a9J~5W~2Pk z81BMqU-M^ylOAx2)Rk%IK$|`*TyDLSluJ{0ZH6dAM|{Q!H1EwU!w?&tiyT#UT3e{~ zM3;{~GjRU`#Y}|-fa)3y;xu1gdW__bPjM#U} zJ|p`=JU@(Rz=Vg12@m^_OWb_r7O!EUPQhvSmuFZ-x{I1Qj!KR`^;R1 z!I0X)gI#5@OsYdoovPtauBOI)>AmUm((kP-AS?u)-am|D&+hhxYHCFa`N`WBQTR(S z#c^>!28{eLRaKiVdClqGv}6;Y-kui{SOPOC9E0kCA6P=&cp zNre+=Gs1+4wC3dIHQzE)dfW*)Q9T-kDL}i)T8qE^KQ!C(wChr1*It%`{q+EV6`57w4xWt^# z+Y^=jl(91|z|TZ>MTGfBo% zjQjqXnHC8+ls>RaHXO8;vKPxMoT1wqm(4%p-M_^K`KFsy7JN%RjwfN3RsPqH{8_xB zw8ZNoc*Z{}BbG#B%_wWTdC|LouE`A^H;8L`D@R4y2$At7Kwwo(*#OL}R&+p2@}{%r zLu59eum?D4KN;0EX}_0nB06+pg0NnmY`25yZbH{EKV3L{hvPqVthRuKas>H)(9;^Z`jUEp~pLE(0 z(Tj=#Z_igRS7M*C+dU7x{CBZVDemhtpH?YE1mIuBR0vZWj2?%HRs!x41NTlS?nmz+ zWUp?XYOgEDQw*m4*>rhr!r$afl9dz|_Q(%8>=vKypKYTW1-@4i_(Xqv0f|N#8^q~$NS;)o|-Weu%>fXFPRC;Htbo+RB61!gA z>PFN)K;s;lOfTo8(Hr6pM;j*ab@~Xw)U!TG!tM3!RHIJHw@r;tgC$$#xE$*sv-yli zHl)c!fbo?DCK~{4S$6EI9=-~;@XelC8xT?Xo*(agrgur0q65&A0ZxBa+l17|1f~4@ z$%y^p9W45-%jh#L-$S%R+UYG{6{xO&$;F}a;pN?hX8gJ>mIQhe{kN~-CPs|;&2i3o zTRw#0WWV8RkqEfOUCI=JzVgqh#WJOwm*S|)Bs9NB;2$?bwg;VGcvG#XQ+`FnWZp~*cZoe|afg=9cAp@1+afjSTP4;TUJ2RaSbEDJ$ zcCLQ>15&2T3J=xz)tKd1JN?161-p-QA^|? zy^n?6vD1g1HHE%`&=9I5C-GHqkD(~jCFLd=kbi41Fx_`ozGX-YK{NAqD{$9uldNo2 zcXds~dnI!=z=gMyfWirrE;m_;MT0;~2#XmQuz-Z^t_`#rb9t++x zCIV`UblHz2qnoTM(V8fj+p}r5VI}oL6Vt^J9vFhlJ_)jG;Ia0>`>}SsNcv`1I&*!p zaIKic0+z*KGjsE)kG}mlIcLGPTa*sO`Ao=W2%1$)7I*K7bc(mgsn!b)tPLb&76-7f z@P2k-NF|44#n`$qZ>MwqsMde>L9O1a1LV~N>hpste4H9znIloY|3LWa>jFg~3p!Y% zsJXJSG`q)&U`yZM1*6bBa1_i4bi|1=_b?G>W-}EQ8>pvES;GtQn$06@i43&rK_Zt^ z8dqel1B%nX9>aiavBH$w?&u;mkA`f%kj7hb9)91e)0H z3ztJRsx?y%RhGZZaSyU;j-8{$)n5EK4{Z9`F@D?LuWwRXn0aSbh;~(4wg9(wuS+p$G~rWASzg-+gYywvqd2MK%waT} z@FLa8qx50%cQHvN7b1FSK%~B05sx~^>e|05NNH$(EuQnIF^cJ3?@v4tl2;P-P>156 z!sWN!tktr~wTbK!C_11fhnQ#FEb4Y*rMXz$#kE&)Z$&UE$;|&*qr25&!*|;cI6mS9 z!1B1Fn4XbHOf$Gl7WZgFbtS5dET(5<^YiO5Td=x=ISA=V4mOQ*ahJZKH9avK4?MIJ zNgd$-l;|!7<-XO7#^a6FwJ(IyqTFd|JNR=6=nhpaz9(ZabIJQI@)9*HvmORr`UX|s zfT%~7Yu1Mvw+}+qUo|qX1lL{DB>gUbp_P;x@J*dMNfe>H(QSK&V%PPg&o&8doF-&5 zmdu2@25JGTXI7Q~z5p0|zRdsd1$351>f=>o`{i$^{Kr(Q#|^u{v)$76rxE(m`+X;hyU#iI{R1byzfa}(I#0Yu zP6HnwNBUGAX0K9n@O-i3oewU4CYyM8TuKA?c|s%IE-b4Iclh7iJT=8rmZ~4TZA|#j zFJxe@G>89ugBKh#n)A&*QFN`Yrmac0R+ctcvsO8&ZKc3A3_ZhHfRk0T$*Y%WxB4bg2Jg(-=wUtIR2aHFe-4pKUjs) zA4R)z!*Hlche5ejr@K$P$J>2C$I&Y zJN0o)&4bvkC`t4C0gj_dqk^I!UTGbJqFp_w;Le_{TEh?r0nJbzEsEW{QpqOt^J8t_ zvA(dGUSTps+g5YDtf*h%4h@ae3KpB`VuGL1(yD^@3KSm+keB9L0ms%CSp zZ#5pIJL~ESPHuw_ocN+wOqf_0a}w70jRFhzk2Y+*2f`1`!pDU!2E8Qdnk~PdP-8B%P!!s(|Wn)v{x}v!?oj`w%1w3fST{H^tCa|mCs?s17%$i+K|;mQ7f3^8%YkimdP!j=2%4o*4?j-IaAi( zK_A0v@S>n87;$zf-QA!GJdZhPlape6uj67XzSlF-VywU&-kpGHD!pxv+cu@hJdGH| zb)W?-;(v8Czo8i{#@iD?s>P=d21PK*xo=HCj&lYvBeQ-jVVim6lzkjKe!~cT59(5R zr>vS?`Vn%zJ^g)yp+sFcu)))cqLZr~Nn_0=(}Ee7tSiVFi`COZ)9u5b7) zQ{4Rv$z!G%XG-FAs!AWu?8Q|=1dG-t`kNXH;c-vkvj;gaYoRDmOOr2jEn2z@@gEAMKkAZZqme8w zREI>}y!~KTg3OLp3fnc4v@^pNKaNJ>RXj4$tO}Rv5x3Hk``}ycFxRJ>J4*5@L^o`- z>FMj|dXjkb>E5qRPmLlxbvyuSXDvUO32FQ2=xNr$h1yYZ zPUN-vjUzCC*}bBX%Xx3~<^5UXN=sCo?rsG0{_W0hWE z;hS(R-K4_$_3+&4@;A)=-^M~1{_AQtD{bO^sa@t|UQl;!(}F$8V62YzaAXx7;q?om zRrnQ!|2f;^8Y$5?c(mx<4DZvup3&1}``kU8^Eq&*EFyfoSymN#SYQjd418MV6om(0 zKHUlGJXN;0UOZHaKJsSdxP&~V8iAjDo%CpHjFSFroByD?*p{q)d_wOz}Wy|b)4%qt*92@!^2^lE5c*YrfXZJ|wmzrCDy3iC8 zsknaqb1u*UW%VKkiALn;r@RK-1v=Drobu7-=UEto7XG$wHlyBE|&sy|{ep4MM=6S<9QbA(}OUp`fOAN3Ty^Jk}kxW7K*D{;3i$7k_{NVlaD^q%3 zxR5aGRLVosh55De0i`0tgGbB`222}6-8L9kp(#4IEVm4*wk@$kY=LG`Ps&Zc-Xt|e zRm(Bw@wqtZ($jCs*8Q$f*G>^<8s|NUTKzdqz&-)>a`n5t=6)?{$SdLO>t)C^9GZw; z6rH%MJ?p~P0#aOcgT98GnZ}_PO-H*0cpt1dhs4{SF<)+A6|qipDezVM&?+_>lFwE;fd#w|j%57DY?3?$K7!Da zcaRloO!8ajG*#ru%#I?CjQzB~M@T05*VhO|@;a&I%-)$(w2!s~)Mwey80kcqgXF2F zXVZq6)TuOHmC!xY!!7?=VuG7Dh4jX!Kg&v9<(HzoAS1!dcY%1^`Xr_y96n`g?PzXB zMjRsxrjybcU30g$)1|rQymPQa#Ex8s!}|#R4`0{j+gSLrsXOh&i}7v=WZmbH>Zcjl zrlCY+(7dQ1-RNQiLMT}M&}N>qoNz1S3!{8Zh6z(*&|uWtGkj2eRQaQWRJ@IzXL?2q z)Zs88$qz4t!{W8F*7v)#nrvDM*Ml0vE`R=K<2JlxATyjzS(J1=vE-kQKh{ zxt%IWpvbem;8b}tKX0ptyg*2miG2Xl$gdp#9PhW0Q#6`WM8jc`Dk5NjuRgW$v7LF$ z94~nWnWaCeAHX+IFiV7k+%?p+4({!`!tt7Ipu;nWFV}^TidH>eP?g4n##rzgOTJ$| zfao@WyrPS}8Cf%qd6K~3!wT-(`?2r^X7wga?=KR$=)2xjNtF4KWxZNQALb0^MVVWG zT{P9&z_bZLfjTT{R)v3RuxHsMscKs8^~?W@w)c!`>g)DKEub`!B3(dAD4{96OAQh_ zB$QC33WQ#jq9|3Q2_!+flt2;)Jt!zDRS1goUIgh)ML?QxxBusq=e*(=bFDVse-Th%Hst#k)$adrn|h|AauoBHp}KJJ#*oYTACDFoav(Nmz&ke;pR*> zwBWw^msdeu@>KLk)?RsyV2_5?r-KnJC43EZB{RCVDJbPTB|Y}xXG4f^dhaqzx9Cf+ zq!jpDI^tvK4KLevn!<@!>WnZn9#*6ab%_TYfLNowR2 z4S5d9>`HbrT}YgSc;vF%nLzVPnzX9XS}25Lthuj%h?qzPn4+BspD-knDX#e5_0Cm%h&6T%ID7+K07_;kp0LJ5T14*sNI2=b?|WqGgcjw0Uo zAaGE`Wid`-N24sNA&sPwF9)U|(dAEBb(IRB>FZxL#`%ZeG!MoR{a*^?TC~01^6>KrW=A;s zI4nd6jGG%w3ut}(@S^s?Wqb^LOAT8&bXb9)5%2$2gY!hgFnrxxJG8~(E zH~&@LPt@(whPR>b-VQcA@^xBDhSQ3<8!3+5&xN*mI_;hOT-r|BgJ}Kc4#xnj%?LBE z6@eB(v}o^?af$a3`I0Y?j>KHv{6L2<9q;Dc^#fNcjNtc}jDerX-w^=}A$ReYP3q$J zZ1;>qZ!g2lX}y`Y-iz$i(l1yXe8(9N9h$n>nzSIv{rG-;Sy0NA^asgP`=i@e0C}O8dCpC#2s#7;ljXp zu#1e6ray&>R)%~s)!;#B>`Y!d@?iLyiKsz6_;LN-p3sO4D8?cZ>JocIV3zpe%*(+7 zon|x(_#lD&GOEfjb2B=~{S9vrL5c!R)oHFhKoE?h>otal4rKUidD!e2VBh|LX8NpE zEJi}r*MRo??1*)bWZFU#r6 zQ~H?NaoH2Ys-TvxS3pv|UqEbymt%;w6P4Xd8Ld_3p#=YpzVU6X0BG9K1GNN~xBfoO zcW_p$zUMs%3qcVkZ^PT&}D2@B@>Lf-zu}qJvbW8+$7|&+ZXFDTrg|ln=2s zAzunUS*vY{2P?|K5`VV2RyY!|^bOL{`vqxNh)Wl^N%D!{X>slt2xaaa*!5t`xL6X~ zRQ$tA%JoV!KAhX?CW16jiPWnQZVP#PRx1y2MzfAIHer1t_Nln85IJd3^oDYr%It20 zwu#hYFw*55pLLQgLkURs-EiMcyI&qy_o?TE(LyG8RGbHYNc`Vwy1nM(C~$O?UdEC1 zVe|La*k!@vI>iew>%qxezEd^-z18h2InHS`>*} zEb8Z2E?_(V;YA)9;SN8|mIK7KmiA#Z>GP#4@b{3_4m9BWo&u`!diUr=8-H05FGIdIp6 z!dLF_X{&H94vQim2{1JNN7w;$#I%e3Dbk~S|Fx169EdmgvK>v&;eJAqhRyBv5W}m`VHKFFAmm@|;Ip(Q zu|O$ut~L4p8lD&lff(QIC{ju8mi_+D#H5PtTbPVtU|0$_``Hd<@S}=Z&Oo!?thJEa z-(VI-_DV-kwK-S9?d9OU*rCCr!?+O{TCq5}6<8)@iLy*`et0n(x|29KmMgxJWh`|F z8D6E`y%yQCR{UvbCvMIkFqN?xbV>I|OsVn$0P4H2zE7E%5))+uR_nwu-XO%3h@BKT z;Y;=oF??@Eh}jq<*G3*w69_cs;>wMTX9r=R8JGC8+y^&r!&5&VQPfpx;bnenPc->f z>TyzM`gcS`5+PWObgNzcwBDLw%ejgY>lsx zJi!lbip$yR*zDsnG{6yTZdAjTXY{LXwP59;&JT~u?!}WMtu>dHxm8lSX|Uz-AU~it zrmyH!s(C9l(D(u7cP8@gy(nmVMkRQTpg@)hsa7r;AlJ~Kmhy#|HRK#dXvhZv>_spu zv^mFDrwn|rRCcJcZG8XX@crByT*as1Ll$x=FdImCRr1m1p^W<%myhQaD9Fu=SS9cn zrEzbDPn`X$qsDJAmgj6CEHNflwczcP17kan$nNTr2}$UKGrGlE9?b$Xc3uZs7XWWWeA-;{_BS} zo-rFJCYn<3LxOZ{IE$oFv6EuM{!4glUG?)s7wr@?uZov313dPxeB_G5r_SxAAp~|e zF?^=$W#sAhR{J(^3W5HGIikYsm4j%&OMwJV$Wu=36a+aOEe6Nk(yF*t%)&ZOe=dUV z)1-e_Re9e$Gh`aUvcMo#IZ1g5xObiV%~gY7{w4w1Qq= z?JoMy?f6GCBDo(N=MhKQc<}?z#rpr)jIoTbEaMbAXet^nVADa;0%_Zb%g~4foR8sZ zWQo3kcq81`fRZq|-OxSCL!yG2#j8Q?^xR?Rx}c8YGxf^!V5cXld9W01in%U~o4O27 zf>#|I^u~N_Q*gBzYEc4u@HbzZ<1{#CL{}gv%cgl4I?<(l-Ev!FG9u&UE6`+mJG+7m zr`c2j`#`J_El@hm%-o@0sUoaBwZ;3ht3@<1)ccmysl(s--?mI)yEh;Pq7Pm)ZKpD; zRf)%8cgu|bkBhR5X;pcY-~Ms=c_Vx)@&^6V$Qi_kk{tS=J2{W(UYlp=gBd2{Cw_ix z_QxGOxPIP7r72m&G1-7$O>hv&DJmfO&^(r?~lt_~{*|J&( za4$)yB9R#2njgQhHfR_HY9WoN#MY41AVI-p)SDNMs!sJq5i z=eeVa3`V?W;A>5Qy!Q~ei6BbYoKstt`HhcBMg$Z{(g)y|-kQ&mQU3D2DnG-2A4MdzM4VB2+lC1(F9(sRBvu;wLpR)i@vHQ6--(v2P0U!1)R3d2Tc-N^_0-U zs)hbOM+Ib$3I>obYEbAV#agEtyN_rIoBm1TU4uCG7sIp4272tQ6p@oo2^ULfT$1|< z?Cw)f|ym+N5XFoAl?D5PX}%e@tRYSvXy)lHn`I%XLu^pZ%QjH2Lp+9H;`T5NY2&_q>EfYx``z+T_bnAOIGz zx=w+;tonx#6mAu5HgB{ZKs?j_UgSj8rQ}A`*7F-bryfbLI6In0Y>0C^Su_0bOyH)k zs_&Ym;v)tMfV(Ri7@L-!PGt;mQ$3uA__%9+5Z*QyX?Hqc(B=pnHFaC;v~EuoXVVgm z-Q>Q8oL024T?!P^>Td-@arGDdaa5z>Z`gr{df3RsAcxE7aw4bG76{4MCKA%_@DLF( z#t>*ibVO_6o@WONa3U3B8Di)l?@_*4hKir*tE1XP)9-BRAE3j3N1iw^8{dsQFc8WM ze?K4W?1_!co}G+eg8s2ola!$$_jj0^jU{=Hgnur%@xlR7PB>fxItp>{8k!vUV%Zhf z_@3VYoFM9r$|{s}&3zrOTlX24)*Qf72_|zEQR9(4F)Fp0{zITf0R@;KqGA z!$w@U!}3qqk5s|r0BwdP(+?lth3?mOv^PYJS9JxE+!BDMA_E1y6gHWOVl=K zHdx0Eyuc`%#(7J?Qf{bS&b7vxT~49uvr^uu=|IZ-vHs9}t<%T=hpBo|^!7YfCna~_ zhXO*;U=xSId38v&Sd3uvQQxiz8$`A1=lD;mhRnte-8|TaX9ijK?l}GLPcjLRmtL}NGZ~R77 z-bF$N$sJ5sDJ4FE58FQFOGEuSV_Ju5!Vp^~mkKv_x7doMgfjLOj$ekTWuO(^g5D`H zx~>O9$66d(wq!2Z?#YwKHi`-qvJo+m#lVC5>*Bh{~+x;T_Q&})c8@KeHPZ;5(7Hs|a( z0C7gRZFPf3XzAq&yYwwJrH$Dy(rdCdo%~=9k~F=6Hz=>;8WVV~U19ry zz?xkbs_R8za*U(Gaf-Sr)_=;|N(#!7Tpu(hkM5I4eJ9UxJfXdO7HGbgN2m6&Ef9vm zqwc5K#WbtBts}1U$o?^fbPop3vUirlKG4IH+TLkr*2Pwa*WO@%n;d^*q$*(1!oREx zrKLV|63i@;{ep%7y?nBx2Udyavb)T5=<4qC_ZBQvMF&m9 zsg79n#{P=(G*7`+j^*$RJh0Hb9=p9`->b#B(8UNd7~Vd)d$Dos{Hu3e4d?#60W204LXcjF;Yie;5J+6PC%h8*O-bXBUEQgn ziOxNRY^m$I}F9fZeIw?t%06srKG#V*FO1Q*^%s814;)qqNWS`UT$bd3ckFRB7Kr z1cP^dKSl`qJ=kOnd{vfwQRlqs}c+y9;-~?C%y?iaSgq~CT z>EviJ9e0{N`}6cS7g8q@O^>?Fxt>XDjV$NCucvqC=;Pd?9gSyO{F_H*=23S9t7szI z|FYALd%m2^uJA@4%zxzhEw)F`qr~Z_c$hIXxPG)i=Cs3CE1)R`5n+Y+Qq+32LV$^5 zU(a=FkhInVR&-rij<~{)$~7z+Ehj+$UR$l88lk)cTr}Mu=avUO_{9)NSP4&4>E7^< ztLQo-M*ZZ`c*gSzKrCotF&w9htDnVX3sSO`*EEM+*>ZyXueYK2GlQ%bgS{q@ze|$Xl2yIRqEvJDZ!L z7p#$N$)_il>;0#zff#r2sw>nRL;NuOLLk$vGfzs)lC`lZ{h3>^D5~XQ@IdfmZ?^C4 z{*S5lrn1RU1gBE8M*#lTzOUgMz2`u|{LAoB;Vc43ZWPLG=Cl6NE7$xK_2+zcK;_O# zVUGZ9?ULA@<>;4#c#A{dmH{qfe^1h4$Yksgx$AJp7W(cDS!_m zRTy_KmtgwN@Jk-E_(a)}!|=|L#d3C}5m}YFEpbUk*IM-UHwrdO^8Jl$e?qkai<8sg z@F3Z9&L8Y2cZ+cuuuV+FkHlKo7k-ujGPhi+dZR(nUHllpn0U3`lW}8SfPyQ>hi`&! zLSNnlgSsGXOCq4|6*v;XyRFL6U;f}lXcD|Zf%<2#k|yjVufS>@lrJ|ZnyM`4n&Az5 zDy@%lzpinUNDODruBvopk7^yVeb504YXi)m3~!tpx-()ICI?0EfhMoutBk^Z_~hiYVNAN9Oc)CV1GTUlx5iHn zP&QO%nqYb4Q?nCco&1-_vm48@WsLZAiC_c^Sy$>Mg%}D*+`Qd8VT{AX=#m)x$_?k{5UP>=F z>$k66%tq#x=jqJk8r3DGq6zR(&J@Ig*Cu7GPdld3XXMA#k;jP25f2}BM*qzDO0x;D zZQOODcc9O9RNF@)_5VnCAqnqmmZ^NHVmv%!JZfo5Zb^i^q?thAI5orn&#cnH-Vlpi zd#2mqabeG_#xlNB$@#zIXgd3*jpsZiFr1B!r+y9;`TA`%_Evo3D34iDU3-wX@`vfO zkRiQR1PANNQ(bseZi0-?$oP@n+@He1Stkm;8X6a0o$GBJ#YpdmjdhGI_c>=G7*;N{ zJo!0_1@)=Po$$S(lm@kU)v`{e7a$l`t$=sH5&|Ad0tcyBEv}oo<{sGabbX+64uXz2 zu>DsM+V>Ib9=DrklK?2laJcz2*J4(E1!Z zw0V=+I8kST@Im1(gbvI{trezMJzXr)*6X!e=T>>t7CV%PMdu(VW0RH=a@V~K<^G~6 zpDPcD;rA>V06&&gEJnR1$(z~jx4H%ChDAkgRHko6kMyknv$ym*8gj?ZJxe|wV|O_I z>5gx``k|{`g=*9-1Lti$HCO3!u1>0PC=~PQ7yZR=Oj`Z$Y^2-%8Eu3OHpeHr(+3qq zU<(Xic~@jdsIaRuLUq(CwfNUoXZcreOjn`jf;dSn{wZU{NC0)3rP$r%6s?W0V85TB z_N0!!#G=KmbP?0gGC=1p%mO!4$=RfAMNCJtOBDUYhQ^z1KgzKTZ@hx1iLx9_{7BP* z;Jd@tiVg@c4bY%6p-AzznVD2Eqd4=Wy6ojMMRuYtip)0WV8U!)&NEcc_TRajH>&XE z;9U_z&WmdDygt<~S&vL+1klbZa^KKUA zAcK&ctH1won^laHtyQkMIaxoHQX&5E6X>OGXn!l zU4*$`fNaE<=B!(-qks1M^~mSjSgUtZWkG2O0E%Wi<@gXf=}8hAw;WaEG08?gQ^6)~h1F3@;yNW+Mu?$wU@5HP0Z8f;DN}BZtGq zQ0g^1zQvlFhP-vYK60gO7Bv*W8ApU@%*6Bxmb|HzR8V>+1ukn12U$z_A+V<~Wj7rM z+(vk`Zj(xm+KjSK?E&A=^$`b{&!hNyUf$e^DG#_rC}W-djTh7W9!7j2750P*M4%W8 zSzHmMj=klD7%~8PTF7XFS}mf!^k^sp#3uB9tjw0HO}z%l^1vd8v$*sEUNG_|s{uZ> zff;nhbo=BRs2rdzNYMipzEGjnh3}tBD%VP*5fc-d*)qsKLM?X`i-30)ecVdlZTKtQ zA|q>+Wuuju2xB{{=1E%Wax-6iWY@jRB89Jd51U{kDK^sja1l1fYJsER-9Xd*XMx2$ zd1t+usODoA@if78fX?Yr{`R2F-tQbFP*m*m&DQM`le7|E|Aid4PvJk!i9S;ALKU^3 z_)2@0$&iL;1dpm|hH?~-PLCyg!g8npO;6zS+if1o`A7;0OlWzsjN8VybHOFM zn8$?wcWg-U`1kGFf+I0g?2TG46hZMutZ+2s!g?7at&Ss(Fgn?YZfCmCM~)3NCrm~V zjII@1#=GO5TW&cPgLA}Q(OYX#W#0gJV|mB7-L}uHZvY4Hcp9513M=v9P#6%v^(nE) z>yLd=R(@w6Gq?s!`8Lx0<>dJlcxHeN8iw;HqNjZ5la}3%^%T49u6SdvuRG0mx|UT}rRthTg*m zhWv^Ij=6tP8gEs(@E$-`U^!ZdK-_*0tH3nRg@XM=(G=!~(k%dP0}!?Lgx=eJp#!7{ zdY+S>P8#(_!Set^wWlFq7SKQ7064zTSGoRmAox*x4{&_uY>`V%%J7fw29X;3m;yA= zW4WUneu}znYm4~$4X!1%^3MYsMxffZve?Z_pmtLWrA@x+=wG}lhj(69;(1S!$N}5h zk=Au0a_JT}6+IKC}RSEWB!eiF%xT5NF6OSFhsk<=9I&&Kwj_mPAt;K zdc{?+kI82tRc@-uPwMEZxde4Zw+76g#Fqz1icQwW5<=gw*U8S8@T}mB zMdu0>QH}teJYDtQOAvKH8jIn%7kV* zNOgXSrs)2uLakuSXslx%Qw>vgZi2jbEi*IPKs)a&KryIFuo&Xh0%GsntP;w&^_<5Tem-Yy|dv{F~-iE`y#=O%97GHVU(wV{Lzp=?x-#5!ja(pNpJR7n|&%6 zN2V^}qJ}w(++Wc>F;^IA2{?;UyL8V-(PhkHaf5McrG(W@1 zX?^kK&_XF2EKWZiBydkZoqo`uAk&S)O+9+*)MLy*nuf;3m{?T~;?^Y?u>S&YN3Sw$ zvbf=#c8#UtIZ3EpWBiOcT+fSG1}e=VGM@N%F;+Nz|2PC zwtDcOYeu%PFZXk!TF0VId_NtO5ot-i@8C@n!EQA=`mIw4>br7q7j0lw8usa@DRS7E z=T2dbKmr+SEIWpodYC4f?pnkh(YXtHV7sm2OIMoPlr?U z-2XJo3BKH7GhFpD_u^2rYBO3KLdId~kXHq?cJE9C$-fL;!gM7JJeOAPobyz+Acvy0 zh(l7C8iDRc=*rOE6&aXs=X&F7hH1C=HH^7amiTnVx?_Rg+j_Ykslqb>2?^<6W7`7z z?&mgt9}?ToaL6D7SPY50t*TtdSl59tU1wEgxJ1#lcvVJE>ucO;}>BgQID zdxlG%%*OuMLqV;o~lcFUYfXVLNnhOy%l4Z;ejUs;Y$_`SFMZ-qxW@$`*9a z4l0I;*nlD-!;e}OX+rqu)dfa{&)CA>nsy4~bLh=QY`Dv8>p;mKs1woc&B{0&wo<7S z%!(U@>DI<_YX-w5IU}SaWZv8ovuV$Q`!E?#s`ZF%JT`q$cU+}9Y8yB?b|JkeG-Y(X z%y2@v!h9j-!%}-)FMkaW9Vst6V3i4RCnS*WU1<)vVO>y^qo^rmP+&-0TH7s?E$I(p zYD-m)YBAX~Pw_B$p`@Vb5XWlp6F)!w5gEE{=xL!TT%3x1>6-2l*I%>v5NYa0&dBC7 zhHJlcH4#C6zRlQ@T-^XZPAlj%{tlN!_K4>{BAohL96Gnuy9=h6Y7XlNp6Mbrz5e}EZ4-6Cgb6PmDncb#0tzsTAI zCSrY4GUAG9n#6Cip%Bi&2}QffJ{9wag!hL7+%F=nd_5!CuZWfmjm}LzEi*$)Pa^f6`=I+OGh+07BFcw( zE>qUgQ<)1~ag%-0HBdExm_do!y2GK74BjKn9MFW(IYdPpl}lkc*fl1hJh{;{VKs?~ zG?P`+aZc<1Vps*ow~=q8oD$E+()h5zZ?^3>d!$UJi>`Gp$J3~&E9?F6z?qDve{B4m z@-&>JP^`eCa=>s=>68c6!&Qzgm}K$L^|Y24D1q$9Hp`$8WZF{JFX`!s@ZC#;ifpQS z3XYR5R{oE7TxC%M6r6ey zLV5QRvi+fgOjeXadE18vEr37h!@`KKMF~7JcW3>TO@ZTX>`>dzdfN_paD8%tyuLH3 zY-b}OTS$R!nnl$uTS2utb%p`UtOSD(X@9fBfr*Y=acPqZjXCsRjc>$4>P{gO* z8wX!6wMJguzjJ1~?(Oq>@87AefjFwlm^DzDH$8Qc%ZmQ^j^ilPpx>jC!-1-QX`qvgprw~LA{4z&U#TKHhA+e2edBR)u zBhG)|d)PqZ+u30N2%TI$#EuMYl>dcBQr^L<-!8)5sY%T`DW}!cX@-S1En>)A#_VjC zeZ#@9!$WM2A)o<9*hPS6{Rutg+n{pCuo1ivrdak6_D;Y05te83PyEmzIIu@P+aEkv zW7XCE78>7kKldfTPrB>pY?~($R+i%f&}3ev+JwNWZn1N7jQ@W^+7GR70h!uOZ0phlA_DqaHM{( zclY_0m_r~qF?!u{*^-$$&s@|bJBaX2wMk!WUtSA6X)1dDEHG5keK8&UJR66Z%{57{ z_;&8*6CJN`3ka?isgAGoSur)<+dKD_?n@v>C^^feo_z1|^CD?kF$P#?Y7{lxEjQNg z)Uc>5$8lJzk*9om$EJcyBWxk9R+2@)HI**2{rMf(Pm@IIwFbi?ga}uWBFga66?XQ~ zIu#Vj&t{A+ZNV`tK9dRlncmX+$%e| zYO)A{pVc0gy`>+?@9~ld%&Xei{(e~aOM;fHKi*roa^_r`=rdu<_}cwOp!IcqtKKRD zLwb?x>!fo9uIK3dcAW~gky4<0Y8lN2Kr{rV_nalH3#O?rj^M|D@X13gmTJk|{|fi# zB%yIBrnhb81PHvpQQ7)vn&#NrJ%x&CLJ~Nc{r@G+Z}5a@&ft%EV{q}02OblcCg3AQ z#4Dr_e{%O<2(A5m(e`P6uF>@((xeZ6Vs+Zz`^H5RZ^)9YNW*YB=e6CxLXxjkrw82T zTd91QE20}mS_gHLwh{4+n*39g7qIk$9)mA#(Lq(srhw05HuUj9vR11k^QY#t$);o< z3O7nOc$_0}Y~!kcXTNOS>YYJ5Ourm_vgTO9P9Ttq{=Xud@$^}sB98bn>qkB;1&5wY zncj3IIChvlR_yOsLfYcBZ220T_5vQvPtX9$0c(~9B0WYD5j-ZH{J$(xG`*Ta?DSKV zm5V^Q0?RAj+02*b$dA^32G3$h0Yh4ULl?P!pTrU!Dgha~Ab<+w(zMaEfzMyyn8(pM zwak7qtGLZ9`}$$P?RZ0}S+xG;vKXQ>&~S+7ya2gKfVx_dln zxL?GI=YPl~E)%*RY`uheCSePlXL-Et+&ojW}$&-CGUI72$2@gIy6~3w#_T$Hs_J4F(%2CeS z9Sc7@m%b$#(DsV4F&U%8mXh|wzisTDtO;f6cbdzH;l}sG`;3;OfuqLnjkT_(L1rT zk?e!lfKTPK{vokF3EU0O3=@!WJ0ijNWPL1)*Ul-tRt?J1_6d>fIx>8Ae9j{h+Aa46 zzL66B+ez1wc;$^P2YEj{&2Z{9wFkFI3bmQnC#ue^-ZF(GjKs#d*X<&_g9u(ICBdKS z&A$#;#hmmgYmoq|hy(VU(HfMw8fA~YZDVedn&W3=u|ro?dOOV>2UZ7Lf4riJza_4g zZHkglLqI*sTg^K$V3(H`)8n!rFXvNFpNp5p0cw)TVf+x31=`fQzqKP7`0&@};Cj!< z4zu2)%-QUvjJUQ3;UT{OGkmLAAA*z;&=r-K$RDZqFDi{BSBpqss%yk<4>#0=FL&&C z4w)HvtpEgE_!}kRIpnjkT>klBpj^(otGs1kyo>?X-NFcAsOWUNHW=x2C|f$WBV#NF zl-iMX%X#Yxo9L6Fo}CPfzhsD(^iSY?2b*t-3*GC$oOzd$%K318^#By`yP2Ew4Q9z8 zi?*K{J!MNT#4D9()bstVFZE6k)e{_>#E(C5Wkvp_7@Uem&V))B>z8)VotKaLK~9L~f`(YXIYYhC=~E z(6H;A#PteePJ`K!HiW6WP58}B*tZF%&x>-><-a-KBv(}|u~#Y;1)jRk3gmzWag|r2 zS$hFa&8dWE8;g#@X=27!4}|A1Z=Wt1wqidT<0!{-B~jBSo7P3WC$;s&=9;?Tn0F?K zB@X_oxh(J*B~uT9Gx_0F>}#9ezI$zn>F8DtUy7Uw_PnY&q801FzBT0TOE#pKX#rkI zIPsI|kAzMK3ro1<1e8lFc?CI25IFOzQz!s`zcRwK;;6_~FLC%@sK7W^zYRiN^K_I4 z{AXYg#taf)&mL^@EldBzGa}0rBQjO|+~VzAxmBj2qUq>gZ5!X%l2qC`@-h#4rcq3* z_Uk9oxPA1W4)JRps}sk9!au@+DR=APUGXJ=FzW$;r>SW)MJI=guACsWB(H=Dhls62 zNh({vmJK@mP$=0j{1~LQg=if#qvU{7JIt7th}$PiT2m5EK(H zW%6W65gavc7V_mi1gK%?r7tIXZ%r=Ql4gD`Luj{x3yFfz@^UwL={$Wr?xlo$ z4y{D(@%E3887aWy6v_cpoPuPGa%?`}Y?e??ylFmbdVHJpPmln?Ss`#ZzCIs0tXX(- zVU)m-Fbmlg>X^Dp-e;u@FE9XfUpFxiR-dDybHpYrfk_4kO8$#-|{W`95HeE8nqd9HV5zh$@kUDoyS-^CyI z|9px$J_Sa5ug$ssWh5E4pPZb`d_Vh~7P)y}{b%;E`dMef`-AQ*o`{nVS%sjvwFESg1n0sz#BWff{B>M6DC(2RAO$z0S09u)9 z)?@M{XIGAo)^pA=gMu=D(*7IEyCKrQV$;Rk1Y-@)ZiwXe)k4AFVjL?*KbtByoQ@(` zAgghsgy$thty|^`cE2E~%8Sw1(+n!q(subQ>g$KC$3~_;(t#xc%&?j9&3uF^tyJW- zP03%=2-M^N_qpM!+AeX0>y{G+8jgZBwi>Yd)Ia5b-JvPU>E7FLMg&w?7O5tBKA$ zB}>%mlq0ArIxi<}?CIrxlCddnL(4Tv&*bly=aSzT34ig;1KB1RS(-Doa9~z$f(s@ zKI&N;-dSIsR8D~FE4HR&6soi|lM^WgFrPmIEXC(R#ytZyZZ=V|(A2Ig^b-5L6sbK3 z2%SHDCTkjf#Y1^@X)&sBp{-SV+_sX>;z_!O6wma@0geZu)Q@@f7Q(JsdodD z|FBtiS;;d*rfT`2UC;PB+Xh+`9k!5cAS`05m1&5%rwG-ecE6tE&0Gf|hmT6?mu09e zEOs>|fh6*?R*q1UMslKeZxk9RIgrD?Ypp-cjAiu_HM@nt(inU&Q>QK=$(i(Xu+${H zymi7?ZsX;pMTiuN1^L=bgi<^;7nj?DS?l#pKfl#%UbJ9E0(#M?0~Rj{7FS#BFOELl zkSv+cJ=XbY6)6^5<>#`QB6=>u7c^~{#p4=l$)^oo;=pp$yOXWfm8i(;kE7U_(Syn9 zpFKyHvW>HNgTO{)TT|?%b$y$*R7i39*_T2oB|&E0tqNmM94r&6Me4n+n}MfUE=0nb ziQgZj)EO;j;v~Mk_3`SN&Wuub4aP=GZuJDZ|l670^jVW;c1cSqb zS&F9wHq?^T_o`d@#+{UZoqpdyya3Y|?|iuEPt6+m#yt^kM3fhiMj&tLnAgp~Lk}}g z&1hOX)!{MPHA}yj$f#_yHGdDzU=U1*t3gy^bx0Nlu<`3|Gtc-zm+w>-Ch?Dg_VI7T5U*-~< z+~cTT-bZr^A2i%CBF){tArLkABYm zS#*E&{q!-RIV zk#>(@b{IjFbvQ!+pUqNLneL82IFQJK&-&s@V3{U-4&Oc3R$ps z`SN72Xq0jPEIQdz*|xF6*>K^&jay7zOfHuDvQ|Oyf!Bw6$Hm-|bc=!G!+#=T> z;UK0|PL>hla(~tw=Icp%w+@^02Uv*!1iMaa2wDMTqW(@3mF8iGJ$XaX--XREI>Qs+ zddnZaT3e_ykZwK14xPTp3@dXy4j&36N`wg&OB5tm4~zN95eurs{Zu5_db4*LE%l`U zOg$H4sd&?bh`DynAUGV`qeLXu4o@Ei4W*IIdX&mtbLHiY(ROrP(J_6Wn5SaYo)~pa zl$Wy6^g8ua4dQ6jC(425YTezXOs);Dy$LmB02U@GRg~=Dt^6>s{whhN?Y z>YlJn2(DoEn;`FS(RlVQ#4{vA0Cg*nNo*x`XO$OW`$`)h?L=o_B6JP=xdg)$$VhFH zasVp_dZA8zV&L>+O?uyRkX~_bd^y0Px{$s8yR|{1}1U=gPeRw{S<%o z#pza0X7m|*%vemurs$T4uBV+@w2j%tfm>K`C~OfYXCH%@MrL@T+zI;&7W?Mc4LLcW z3;x^Qzn3Cv-ny5X3YZ_IX6TejU?I^z(>w*CoK(ZVmNvdiK2{ff13_J}k>!+OJ;nM2 zRD}tU%`PM+>1Tx!^lNwQL0tvz%AS<;cAZ`!Cuav-vZRXJUslm8nXqYwh`s;)6fvW;Ko!cQwNKt#p7DhTp zPfWaq`&?)OCuu&}-Xy>MU+8F2i`Bqwz(K`eF_7M?i}gQ>$NvRBN&q&%c>yZe|ES2U zY5u*$bSZpdWN)`SB;-xf3`~~@P{7H z;8VJzyS6UB;-AH8e22XJ2lM$0ZhalC`WNyv5uubqyohbl9+nr94T{O1c@m^)AU?eu zaFOGD3G9X=aJ>8nTKl)t9|I<$4{0Xi!ew;c{Xgr}CC+08ffHgh=kF_nJlb7WEud{3lqsU#D{iTWKTJ z!^aESSEJT?(;hVm<`t+uIQW|G0%)pJzvNp#2GXCgxP(+yrDW^UNGFzM&LkR?(qNgX zzgMvzEw*P=CSn_(MqQ3RD#+vzn)5Li=_2iQE}>bN?JIP3t;MR%(SGef>a-RAgRx7u z;icS^XgbyBZfH2=YuI;W59znaHZNT51g{z92PzC9MY|@E*&JvgthmzK^^0SW3DMrR z?Y_s7 zc3eyW8Fh413+9DYe-4IIx~U1Y^`}IP{_x{MKz`jMBjCP7J7%kkv=tqd>29_g$X(yk zHsO<|!=2Hf?&cS4aatdo(~j87BWhmjM~atQj*csP&zU1_?1d+7qCO;=ALR!!g?XZd zNaAEG}Of#A&*P75gnCQM}DJEK&mv?4|L9=U~rCQ402e zWbY3tdn8Lm`+7U78fJEDBfJ?V4{)|d?+z%(h`Lzbqak*>4z90*-CctW&gnf#Zn+14 zI(A;p97;tN*YEiQb4g22YIBP5%y->DsTxmEe2V`$+L0zrZ(0I0p>o7LILP)DM=P`s zvS{@!EZz4L%y({yi5n(e63Sb@T=R^VB!?vSu`#QQhNep7$|7SE7vh3eJ)u z8NFnoefxH9&(|94PP>-3hLN;7$nc5J(`nyEN|FxVwj7fuJF{HEzK*KyYc?-GfWQU1aYg zd!O^F?tA}U6%<7;SX0NG->`2WgsQsGh3UH{w#7C~Blo{0lqYTz)U!z}RcXMWdeFe~ z(dKD60!KvWhH%%TOlZRT$op99y(MZ3uMi;yju!R8X$Ef~e(1oYBa~aD0a6$L`*3hK9eNj2J~sZw$-lx5B7-Q0 ztYaiz0V9d{eAQk(E$3%E{}Vzz<=7S`b$vZ~;zlpY(wh%MEXgkvOB`E2#6zyjeuqQL z{ee@aAcR|#E0z*O93Gvx2x^kBeF;~W>at3GTuqQ|Q$zbBYvTtH5Anrbw`#sH1+X+O z+(d`@apbJt)PNrR|2Qe|`;`FY<(~2%{`~Z5jTnjopdr>kJcZAx)r`pi_@@TgBL znKe3$wW7-Ds*NAn;;7v_E4hMY5fGP)HFBpJrYlXdd>l7)X{bSkW`f1l%1ar0n%R8m zUI*GIZD*{bw6vm^gU9HIPiydcK`bpE@OX`TT0#YB0dXq`@66?vWe6Qu<@P;aF`K)F zXv;l&A$K~}uc9UwoMtDJFe{a`0TiD*>#L`o>|R^N8Gn?#%q+0_**yVjKr#m*$gR+? zi_F!JaO*P4nN@qq8=+yYm1mC&1vdd%GYZ_*uW^tGc2zU%zv}DuQK5^{%}nQud8>Q5 z;8xxyy`yuj71sgs9zE|CTGSX)71_(FbGWMkxBI;`S9Z3M@U|oWPmb*J^7r}OQy20@ zI}p|^fd;38+h00UiYdi?3_vWYMM``Y^c7t9Qa7Xev1#@93%An4Iv4A!k@LQvn=xd7 zFG*ilz|Ys&&+GVdl?L{Dp``_zQ^gB%avo_YkvB zGIafM^)rL7tx?k(3@%g}m{`Zx#{K6swFJ>!i|?pH-RYY(+qFO9%IVI*@Nm5UhR&+X z6u}tqLfPU2BUwxOAm8U&Y2<`?*WP9gB%WRkC2y18xoOfoWZzL4Sr zB@*zEvd@-k@WscgUiqzGxjAJYxHQ|60ay(k-GgM#m+9`*%kX@i)G{flU^f4`=Jvjj z+f-ChOa4f!^g391uGN>)-BQ54=IBLf*cZAn^|bVAH-4{QujF-pvAf@}htvU0C_Ygo&!PXL8pv(Bt2=f_bjMI z7`^xiPuM`9W$1-wgwu)QW@cF#wMbIJ=mAtE2Bz&*7mbttEJ`Zf^xnad=hvZD^u4go zP@p)Txh_CDGQmMNiX~GoYjX&_{}%m;e%uFR69{0*t7(-H;vkmaGOMtu+QiX_k&)9# zLkyyC*2~9%5MITD^22+nY-TpgTx5}W3Gvw7Qsw=y_!$)!NnjIR;k17^Mto z#Kj_{mhVa#t>IjsB8HM%uFPnys)3+CzOPt9Kzz9)$+A!KBHpRVcQJ|F@8uE1gG=Tb zmf?Oc+v~&Q)^H^x_>gna;w*G*n`6iY=7dBdaa?{MLE{wgI87Hm>N@sxe=R4g*X6On zZiL9%CqR#vH8u7)!lt57hT;Nn$-@gu>)l(4=8y3z+@`F4SsSH^9N@iU;DE^c$8KBv zVs^^+k1)J2Rl9MRQuS)vCm6W--M!SFMlpXg8S-HG>$aUpq~+AI9dat>=e-(m`;I;n z@X@%D3xSVBP9Ne{?~i>>eotEloL(3`c84SgKNfJD25kIbz@qg3HJ4B7 zg&1rC2m4PB)@*HEU427=YDgWViM;&o)0vzthrFy)xPK~j)C_zPhve&&=6GJstt*|Ow(d^9WPpQocTW9eq@J_3PK8(d$$OkvgF}pc8d4R*pU}&V z{I#coi0B$$amz?Cz1sjvBNj~8Hn6?oz6o{JCdC?|iyf6G zAthY+uhdrijbxqv&n2biPy-sXvhu5VW(1uGUAg5_%b(Jz`^kEIW_s_ZQEWL>T4NzC z?T}v0La+4=Zm=o$J1{(}rvq!H9V=^<8heEUP!D6Fq<{d8PB0JMa zU#Pmy+0=T9N=7gq;)_RUQu4}uhbU1g&eO%g1mwSN_LJG3Ql#DCcnR)0=}iP+Wjx!9 zN*W+kln8C^o6=yzl2x*6_%?H1FeRJdIKq)F2sXvf0Cxxbn)&;k^oC~|^?K!7d>IK% zS^t@(EvCYHc!6%qK&V57RUo;wiB2v($U1$$fmf8_UaK$+1X(3=Rla29s6rHIO;Nvz zB#&dUV+DW9K)z;^|Dn>xRWq#{`|d4c$uH*5$dY_FQY6f5sMXaCXo)Yo=|yLN87v!? zC$;^pN|cAh$7^MEaJ-Xm+UQl>LS0h7S+F*xj6{@c|OPAB*lENGa zF?3bbXgc#RjZY3u8%lP6L6`I`gl8bX^GD97nfjp)-f~Hlr}6Uvb(8Myp;9iUR>lI6|K_c6IIOi+eW%rf2%XkmR*&HiFO|;lNaY(h? zOZ7oc6w2qkWulVY^EU6}!;Kwt{Tjm;Fokj2Ou9|8KIq?cN|p*_3?APUT53RHn1}zsWjZ z{z@Q;fC_XB>HSD?bc%E~53lc8M3c3nB?Vy^<9VYd2`z?1gGjfPe2JxWBv+#-T2EK! ztd3wegnDfXONd%psZ$mC=(Ev5#N-+!M)srOv54y#P6u4OB z4R|tSIf@q&n~yPQ3q*19-ju4IEZ$_8boT(vWbHO=UNcQCr$pOBjAL~?_xpwS4pZ_8 zM-R;*%QySKsj!b9#sHw);peh?5#Y1h(cJ1&ocZn*-lo$LwA!QNl+XVmJK^^UgXq=% zbAD!rvVZ^n#6bJ^rzrRYG3T`(AwXchsQ2F9QeyKR?ZD2CA}je9F;S1l-t(}&JACwu z0S=n}Zv2?HqAH>I=<;u~#Bd4CV*5Hs<#odFr#D`Iy&m;6UGMGQ=-$99sDaC5pl)Mj zSEDSd3ZvVOc~{50mz!I?>u4`MRV?R~XOEBBps`Lan&_yfuj`DcJY1ts?NIQ3K!p@L zfGix*(g9bIHI?3Tf!rj|;ybA+D@j)vU8x++$1)*I=X`Y(RRSOY6$uDHRi*WKwSB*O5l?ZT{QQ&-&Asw=Ui_162uWw;e(|icKQUPCm zb|0aDHKk&E+vsqwx5%Ca*XWebe82zfhN_=}Fp^ttrpBpy`Uc&q6KJBtt5;BF83||(nMZOC5X&{g?K17Ay_}K=&)0Fi zbatxfq{&=6W7?)E8<1nKWCgyeKM#h<(;X}PFd5FPYpUxNg|}^K&5V-qazu!dYi_Ag zRoxyQo@rInIxm|^MRSQWz%#Kdo_WasPCrXM=#LLp(5rI}h+ z@0$HeATn7zvW=igZ}>h%(puM5?Va!VxAGLb&>BQt)5Mn-Cesw-zmdhR-|M7VeaJ?^9{JSw<~R?CvL5r`l%*|?)h*VxQV7-}XR zP?YJ$pVTikb!0;`JV8&4Qra4FQR&QU{pg;SpfZ>BPk+oy1L=RdO1{T>V_v07^=s6# zs=Jye=#n)|tF;C@I2&m4Cd+8e=>FdXq|W{R!;ty!?jr1e~_5@v(S>* z*Z&RgUV73v=J|IoEwFOq@vJ@gG`XgYQ4{5Dus2UjkwX%HV`o9iyy_SnHcTN4J(0?K z6XXOS+~AcQs|25v+(s@=Qq}%8h2|JCFWs`YB%~kz8ANN}3@T^Qnf7ikb#{^|ZUmpd zLvBV<;6ajk|KWWKA+)dLzsErTr>DAq?M=7$=0e=-tpTCv-ALFSBZ6cdJRvKZ9nXcj>Mu2rB#kI%6Ljuxm#Pp!zy8d)hJW(kf{(G zWFmEs+_#%6V#6J5j~$3eesb9iz=2=}0DK%jny3116RPqvK|S(evRYW=2BJ;~CU>0^GYnX46#O;6w${xf@3+?Jbe7_c zS-bN<(uRVbZreYkVusXJzA{q@%NukGp9Wo&W7zhY)H~e{J_-+WH#%)G4(xQ3vw&kaW8f{F<25Lpvn$5fyDiMA z)>d&75Xf%UbF{VnvZ^wUnJP7VWR%B(&|fmn z!wk#IKhwM^$KEDHzRpUCwY7g^rqIq-S;~W`V3T@r z$5-mrX^SwybHhPeq21mpWpni>a1@~26d7+jjmVI+3S~VY`MCx??896#sk1Q!5cE1L zZ~4+jhpLdbrc6>D(fk<2aNAw80Zl_khH)4NqYOK^VnG){em3G3B^<2_rE4~?9=YOI zwyefH6EvFJ#-6~9b0PmZ^GRI`{$Gjhq?VOhP;J!RJCpx2?XWK#{V&nvr4^@jy1VpmrefwpM{FstCouu1O=DEPYTrr>)hP68TEMqE@;MvJ;bYuh z+yItnZ{SkHOs#}U3W-QT1!J3$s{Q^yc<{{RrcY|0_S&&%)X-DnKrBFh=3@M3AAYyS zFa^Kgy5e&#(3zzw&PxhPUJG zIbOMDU;f-Eojzbwt=^o9Hk}%El>Nuiy)~F<6fm~jasGu0uzmRN0`XP*f7zt{PtbFo zHbSt4Z_h#!d{ISzLDQ&~pKd`3Vt3F@C11eZ7I60i9*8!$?F|Zf=y>eKSEBU&wf53; zZQR6cC?q05*lP_(+V3$6zAvxzth1{pnRqxxjg}Vco*Zz|iL>Rr!Wx}6O+!Yb3izan zj7>@NPK#2|cMBD6!|9Aua+s6m-4=XAyw$g93DZUbvq$d(nJ5MuvOIfJClMxhtOy!% zVc)ZH+#!G)FpRegIhBB=Dv?6KZOclf>@~V%6l*#YodR_>cg7S>L{GgycOGq))cCQ> z?O-)y0(n;1^(0}QIdL2|!2dlVp*l$+?DE2AAD2>qS8K>7FB&gkdZ84hjUH;dwei14 zMQ_T?|4g27&>;LduxJ=Q;9q?;Bn3Qt~U=qfhu$L38-&LDR#Y=mf(N4_6SlU zUwqmkfBY4+nIOV-15LU}$fNxHG>H$yh9J-#I1kCTmkT0OtpsdM45-A!KBZAIbo5-+h|-5WVP z2gP>uvkzA1JDu!JcpVkrl8dh}%B_QtSSgZR zB9v0-h@riFQQyTzA~h`z!xDsg4j262G6n?JWaiBI-xhw0V*X|_mh@?RCOF!ae@|-P zvpe#?sP&o6+qAey0f}5NsGE6L62g-6A4J1KA1w4sJvC^cup zqpo2qg$bJvt3g*&Rw|`OW^=ffoQSLZMl~E>vUO^q7gx88f>~ebjqco%~^RImUe`_8T1HrFaFNqy0hAeC}=&k-gx5jnzG(mjnh*;`EYa`*#S$eN* zY8SGWn^50xT^5`lUiqG>?IKDjGu5QrgDDKKvj77%bGJi`D|u@vYz>tO#Ol1=th`35im~xF1&yH0VU*q zrjz<#o;1*($OdI;UtCN-%x&D)UfJCDA*yK9aH5y&P`il{m_ZH(thA+unq3+tRq_iYjw zRYJwOK?FuNXM25~X03Y*T5fqPN4Wej1MuY8Qtr^$)n-nn&ZA5wHKdVccVh{C60IKu zu2(Gu`nm^%e84n07`r8m0X>g>?s;$Q*H(Y}|LkV3gG}11^bA+-;}-%9<2#w1$(i_^ z1E3*fH>TW}*Gjp=MD|1m$oKU;Yow)$;vxsPw^yH^$%&uM!WFAPOnZLR-p9-Vu77%Y}I zYXJ`}=y`3p^3Q(F8^{Aq{L3GbQHpXMQsw~p(nWd`?A|6990@S?E?|D##KGAKdFhkqUH z5#}vt>Hiq*ez~a@#=q^~YQD9e;*)b7n#9js&-?VVis#)?WkGGU0oUNa_Oy2;5Ig_> z7ag7HnaG#zxUR2qAJPc_+virChnv&YrKO`}kszY>v#^Kjc*wTZojT@3yQ`NpfP~|xhV<^4vzc^z+0(ScNuTr3enjriu61$Zi zHe&Q@VMA#3ZZroYu)3`Bwyfj6%+Ys~%wQQM;My`^R>R2A_t@6R6|?GRoil?tLC*qY*Ds%DY|nT0KNlSL_-%N#?ve5GyQLF?Hbp!?-AXMZ$vpy{d{KsM01|B zB?A=9o{HH5Me-XqKv=ME!~3KDOf|cVMaK>b5)-@b_f9CsEyu+3^!*q(;QfD0{W5#| zuav6qdv7^RiGDji9e21Fp86A!po49Mroh#-|0d^6rJw6Vr_^XaD{(izxXl;4&#$k4 zlhZ=&`}@%7X|}O_W=6y6R8shA+UWO;k-Kvha`w~XZfzh;-fIJeCRX5_TSi)ig+a-( z)-rke^Bd#Ote&Gg&9U0Ho2{FR&CR6wvR){Z!rBHI@t%`f2;~KY7yD1 z#aCdhQR^ma@1pRR;JI15S_NJ3>3@s^DzJJM&gVAN*Qsb zbpNuqz7G&m0fg+E@4N2arbuV=WB%8G;A}PBb|M4ijqqBLdt6Bu&*OlN)D?m()E3+t zoZx?%4|Vom3qlsOrE$&=rVYNJyaiskkPgP?Z&^K$_i$o$mG&s?)qp9IBTSb!D>A}A zQ;B!w{|&b_ngJCtj1hPP!g52wJ|q3&ZaA!0g;L6{GO* z4q?&=JqSMG@%@T-JKDFJhy3Ru;OW$IG&Ap@>gm2pNDW>OG5lv0Nw(JxiRRdg8n z{l#ugq-Gy{#hVo$4qB=Qfw+WneQ6={hD6jN+d#0E*HQHVbWsKN;m29mysX&$MDbS> zONAp!JG%AWk{M(@_3D&)mX_$=k&t6Dr5u4VZ0vQy6ATaljoEsA1rpo~QBjl-*jjJ) z83s7;O}5B~7yXBJf{!L6V&^clvYkw`8vP&PM0=gDk&Y&*@fBNf?Y6;hi8KCf=|xpD}xglPblr#8V74OXWQObt?+V!EzbmST7L27=(SiBb-QX?0^i~cEc&U1>qZ>i@35XkAJlCWa zo&rF+`W#Gk*)1d%8{~@z>gbDK@F(9U4KhFS_upRA&Of~U@TEx( zIwWws))msG5U~B(Eqn>|yitcxpB8eA!^q;@Enr|^-G@R5JdnmF?&VEEg7cje)*ED9QD?ouEVg{@Yq~;fj_m3{kmdzF96+)3; z9NW{Cx_o_4R#aNxZWWvnjwDYRQ*Y$D_vtviP|NBJg8~;c^xtqAjf;pbYMfQ%Hlu~E zNG;3{RJ1-_(f12n-+^Df0j!4Ux@M!+f?)1-w;o`^k9IR1T8|r8-oJ63HQpTE3F<8_ zGy~Q_=$~`lT`AA+rMAL^*#PymTwj%p_e1Jxd!sS;M~y}3jQ5vJx>L)7l?Q>SgvhwB z7ik*2SbhIW%~g*H*_qms!_x<$2k4N@cha0WmHHOCOjoWj9JFd)WN`Y_LWteTK9q-$B zmbEV!jVC*EU&I}^V3SBWeAm$%`O$NdPE&P^Ku6l$`$%KFQ97dnUhGZ3uNQ@W|1t?B z8EJE*`+La#c)pgG0TsiI&T~L$rHdg{(YkZur)TAGPI=7@P%r^$;)J<}=bMka@95I~ zIs|jeHO@Aq!mhXMJj#2L#3i9?yUhZd)|=QthmVfWGs~arKj+G{J@c~PkR~i3)ub7D z^xX)Y+YpL2yREDKkII_k@Y>ii=PpwA>B~)`wT{gml%pS*d?8LON*y+9|1x310yo!G z@k>l|{9pE5L-f%=Ls_ET+M6%zwyl;W&Txr=dY46K&zGjpx-GeH+kU*z$v6ot0Z2;( zOY2XT&j=BqB3PjQMKMY1dJ^Y$vyP5EPz|NP(b_+iG@9y7h@fnB=4{)!6ui zS|l$sE{c#ntr)F@bA-#hv^V-Nah;H@jS%a93Tx6V)wWd?yMSPs0n`69NSom1p4Ks4 zJ&4kx5?)R8y)W6|Eu`l`XBs{);u?Pr^mA^YHs?k(!v(TNjumRZNMq}0f?&Q3cdWuB zj8t9g=<~6m%0_`|QG2}ib0C40YaNelpB0=te9u z;$tu2NE|ymH|=d~x4u)Oq$9Fby|`g;>P@uGDVpCsN-h=GY{h3$ZifCPa7Fcoo-Dub zT?&5GAo1oRC^M@f)HTm;5vvu(2)NFBU?HYGTZeS(%05o-+H|O=h_1ogddaDqU>_t4 z0+#WUbyz}JHz3{I57p-=*}^zW6!!QY2h#S4Ixx#_?4xXDXOfWQoq$d-cWpGK}1 zgJMnu!X|-J?R#;V_g;(3q?I40r6E-TUrU<}CDbLfnzcvs7DIL=TgvIg{!$)kVkNlQ zLp5Zbp4b#9-%d5OLT}{=lDmvC31xHeRwhe%W0w|u5^g&~)_*Bt5@Vcs9RD+Lzfa%jNvMY$-%z?NiyrmxU3^+HQLODTF%ocY616^?gMK z0XU$;tHnix^_{o1y*8DI$tL8jci}y`9E;cDi%@WQbfxQ@B3Q0gIv&y( zNE5t=|64|H2IhJN9Q9ib@c+9tmCKv7Qe5q`bzf3rH6b(1^f;+XK|j_^aad}tB0Z81 zM2stTz}>zlbi0o?^-6n{xuN#>q8A>gL&Fgb#r?RWEa(qWLoMI0{maM0Z3l4QAzBuTumrg?XJDN?{gLMKh2PkLq&<%kHfGY-5c zy;KM)F(RfJfl(c7a7lQQLGm)i6ov?|rB>RNq7%r#ax+e}+`*9OeKLrF$Pm*_?w?mo zo`3fAnxj5gADgqex2|Uj6-a$0=zk|9uu55Y#N4Ut@y-{zT?avb8FD)~w~#0zz95p` zgN!Z&@!`%cKK~HPPkfcZ>LOeezzkr~o z9;|?atrwEtU>k|397BN|%x}~UrX*<5AZrJsTOvf+sLed%=Q}7}QmQ$+yM{>Fq(;7$@XM()uye#9BA-j@6*NR0b)K8X}ZtVziDE z$+j{Y+}?74yF>#`r!YyUw|SWEp%gM-%Hs(=1Zi8Cjeub>gO%*OXZRTpKCG~JHp2(2>Ds0w1cptRLInqqj^mb6dWl7k zb?xa;z=61oKAdo@Z9lmvs@<|y$c-?1B)pFTq1!gMTz;7Os98)xe#1pm!^`*$!O*0* z_j3qlTQDhIvL2mn6tJ`fxG>C4V$KXv8l>zG<`f+ca$27zq3p)Wz``yc~qFWL3vZt26);Nh5Fe z_6GgQQpNq<@_L+{M1Ikom71E`qzALvl{9QJNZBE*^5j{NaX3{;$=AXScELn=_il1w zhdtD&c(uk`23IJR6%X+BO+irYK;2ftYUv(7>dqSF?V}fUvU(cp{QJ`cxom3j^y)#! z256gWHjVtj^=qFbKIda{wS4OI3Yz8DhrYCvoZr`5nQ4q*%2{J4^8bYR7o5@? z+ELR~L@BMsZj>)lUji@MAIHK>eSiA%kp4o0ADxPJ%&sBooOAGfzNyRz;s@_iv9`PI z4Y}7iv6FWAwgyB`(VXaCqGQ-wrwM}b_sX|3wGA880d4R@g$IJ6Y%lJp*Z0@(b0R|f12X;Tw);{5SJJ}>AX1rL9QU<)iTL7GEo}(b-8r68;C~rRiZ;4 zf*>Nnu~RLuths73#Lwc)MIz&d*1+9B`IyTuT!UbMUu#d6fFk6_V}XS4fHKaIo zp?SfJi+70swe%unPo@Wa<#h4d%Z{6Mw9exb*B_^=g%povz)G=GTHUK0CSv18u|N-9 ztUNAIlgZU^q;mb;vu7sJ+KrVERTuNYh*TrUA-D0(F->^sf?`gX{oHJ#lEkjodf=iv z3@Hg)kF5}C<#$GjFA!cw4+72-wxo&*^v}AjsN#++#3Z01Z1IFxk~(L7=x17qkBilq z*l3(bR;s5xx5Yg(i$hRvD<8MKg}~0wtZ!=abdlA^nSQd*>1_r6iCx+aqzPX>TsZIj zO5)pOil&D_GenIPL7B?5=!YVB@W$CsTu6wo4V}1?J9BUxCHxCEL7l819CJT^R=>@M zReaOVq;YnO53lZzyR6!-sKB}#Sl~}k*YK|8;EhiM9OIK%AeOQqF_*;$;D)Z&Y%4&~ z|8>%RYkVJ1>Tpc=W4pkk;jJZUy**n?{W+{NC--MXDmHn?qDjn4&8o)1d$%FR*V97d zD2t>6;9X@vbP?s2EZTV;6Xaxs$ay2*!c0$o+YM}^fXILAb5(TY z1aGAtC{)<9nATnkVk)C+M}RFM=;P0`Q;s=GtPYC_B3d@Z;UsS$w#|go%BM&m z%Z*K`=3P>vPz{(n2|LQ*N*^lOWTBDO?X8Qpdr1<8ncT0X) zr-1WYrquydE6P#gSUAAfkdD}VxAP^!!!e2G(m1rKF?;gr)g?{c8d73){e1oVb4^&V6SbPlJBb4lRF}#t)x<_r62w+lMe(S3Su7(C#k2S;7;~!nO z_C>|HYW)SwKI3BaG~TtgU62wNEw|z}H3{Pw2?XZ7WLyY_mOt7;0e*bma#kq(UUIaF zQIC}=KZiQ!Z#SDV`4d#P=-n4}5ybXg$y0ED+!hw^Nr5|-=g&IS+tOV^>S1}~99>&V zc+rGET)wg&r|!T$G0!}POp%Wh?8k0vmnJ+E4oS26>ivVly_`&lQfB-Fbx<1+*I5Kl z76PABClKngcNyOjVXhi;?CeP$D{HFuN*+A1A^&HT!?ABieBm#>W0)H7yjX@E5|Tz; z0vDW+k_g9>ye`eP$A$b2cCF%t$qms9IT3q88Zp^|?{%Hz>{l*>kCgwFztczUU!nO+GW^9B^v2oR32)S8S-cdLc z9dfybN)s3s&cpETQG2z#>#qf#{Ik=7H{8Ct+=66lsBPU z;jHM;(NmSoqsMvR2xWj5<3qxD_ri69i>faJ-o>Q-=i0oN*XtEU*NV-=piP7$k3)Hi z($72;vB3THxvuPXI(NAdzNbfG_{>YfQ3=VnaJ!a;Fk|XXJxpVzx7&w$!dyLo9+Es< z*68%&X?B3n38Rf)3I|pxp8kFt1a{;E_O1+ZyjS@b{I2FH7IF;?Vy{UxJR;3`2hj3cWh9exGNs z`WfC_j*{2wqmnzdx`}U|IUQp12jaR7ZL!6-8IS-06U%#{?g5cgf4&td9`*EE>T>g+`1RXW?VG2 zO#hRJR=Hsvio8Kw68(7)G`7`NIRK7E1hC@V5-**#3wtV&7Yh+qYraQjg#0noG^JOQ z=7yfYD$Va+2TK`U(A=d1#>Z1}!KUpcm(I*ORx>8?_eN#X2+L1kTwP;?q0z4%-{FtB z(2>TLbb6rp+8?lYwKY6az(mJviJR6O8mx*(7;Pn23#E!;dK)kcx1EXu?EXFku4f}$ zNaLn465@`~pz3}mr#Gg*yT)nA7ojGO6#l-8I&OI$FNRw=*IzyI_+9+u!+!GQ5huWE zx)OCeMfuFJN15}Jm!AQG!nf=;byj@`D3ixh!~1*REn(U*rY&s2%ZCcNe24)d{U7k? z7RzohNSbi_MheAf(d7mgai`tA!jS%EHRh&8QhZ2KTv|IL0?{U>$?b1j1xYFx%-MH!kYUA?Psrw

    2SZweVX3o8$X2Sec6?LthA8=0>#W<(&wm=O~)V-q+tRl^m(QX+QYD`S?Hf4bRf$mZ*1&o7@d6Or=erJi4XQ$oR4Ei~Rw9&{SLn z;kOLDOv$7avV;A7!zCHwHDZ#_B=vm@n_78?l*m9N>VEPN@QX*rOf2WIh}d`_E^aRr zw_}9V6a&R(AjZT85X2TDq}lCe-6q3FdN}zj)!-1uMZGzjb8q3szsfmfl#4^B)v)$SXA($K3K^{QM#qu)z$u(tc_X*tWEqB10SlRQ-|D z%QCJwTW){eArQ`cN4$I>QaWC%AJ{;s$VV?xbSx0GJeH%#fJg>I@vu<<0?ryHxgVCU zobMBaP1}h>fiW0T`4>$!JhF>=#?rV_ki4h)SN)zY`TtZ^0edXCz_f9y3l8c_w6#t7 z1Haf%3~@mLwMjs-9mGK!)-<5~+(18RWN6PyXl`aC#)vtmAG)qZ<7WPu1ce(aE&mii z99ybTk7OXmWh>6X#+F8ss%;?)fechKsL+7?_%0#S-h5~*oC%3oTN_F|52VTssY&1+ zsc(tFW2I0IRP*A2V8=oWfZeztiwGVl-ozdX%A`AnE%Ol*|Coye4~u{}22q$_mERl0 zmOw27{Q($gBnRhL>mUGXirCU0*%f;+-F?jfL~ohz$NX1D4P_(+Y7m`C#SBKyzGuBF zt5hE~&`MHjFJf7l(?|eRxBaGM_%IZz@J1d2kpY9HF#sq@7*8<3uL~dyQIx*d=f;3Q zLBr$=si!X6zuM+%ECXQ7foxLXNd6>p$2oEqHy3XYz2~&4TcJ-oVG+DgL~sNa9Q*+#rnILZ2UUkGBugJ>s1N)D{#W2WOcwJmhwI<pv8BdRcVBohu7Km%X~1#$ zUfp`eYQ$#v-AdXdKR%E~~KoaCTk4_#H+C=KDdtpf}Y!yr&_tpPqaSO{tW?WhlNh zm8Wu2SJbFH)-tWBCU;RFG22Ou(#Id0$m-Mj=wduz^%AAmXCnz=L#ibLflr~ed%=O# z`J=N9j10df_0KFGF_D}#$5>X}qaYrv0 z&xjh(PLYr`{<2I_$E*67P%ub-&Z0YEg_|_i>1Tf9krSetVB2?=4XM0l@k4z?4 z<811vTr-WxDd1w1{y^@$Y16J2Q;2k){NqLqf$uJUj4ym4yP2?~vq3z36V6Lf>sn-Wr0Uxsr5zNke)a#%x-0qmL`cl4EzCX9JJuh;n?}Dey7W)!pHR7W4UjST zTeI;E`Lp0Vn5!C~nbD!W92u{{oA8zfGabbZYVIT@j5-`u9Zzd0vY!7-h`BR@QgrCIz=1YLpp0TuqJ~=mZyGB+ zQeVi`>2Mf{cA|+N^I+o5uC#{k5|@dgm40=_yCjiAd-{1MUYO#+R|cxViR3Q|IGz6^ zL4P0s>PiA+nFG;p0i(MPrXwh33=owYr@eG?E+0SY;PXu}_tZscHbfpcIR{K%Cj!tvo)?&E!$mpNK_*!Afm%jaVgy>Qj#?iam#UlAoK2L)>6-lgg-+?VG z2EO|I(chGI#(Vq1`+A8dF2MNXTm29uySDn>J4vL zyF;5ZGoL$oyT8~HpiKAmbWmua9=6#e9{1qT`}%jd`0LvMymI&uu);(d=7@uZc}C5+ zeA{I$EiDyo*NrpFB*lLAXy%C0<%*2f*_Vfjos|irsPFI2_>*AEf1v6qSO1ghC{XY` zE#kg?RM{h6N#kh4+o6V@=9R=kD!(-|jgo9xT5osOw-}$$>iQpjPWHmP0zovz1?ChGOQ=Ch~)xhW+`0x;^0NeLv!qf-6M@lazODMFcA(NE^T*2By@Y2!*cMGV*$!#m$tgug_)YM9&g(W`x$ zE;x5A2y8iPNvSU>`P(H>uw&o)l1J(DH_qLlBsDdw$CYE!YgsFkN9T@a4p^`CY)nc9 zTJG3hxBsiRt}^RBruW=GTc%bIBN_d5_kMqW|9lGkHTZda->$%L2s+g_JNC~3bF(nz zRjVSeu{{ESQNv}R2y!mZk04}gc_L_lP0j6zwRoWn9kTb1TCVcSsu=w3Xz~}@d~FKu(i*iq-WbiZkJ%6tDL>llku6@VYHohj5pb6%WI6WB8P>W<-s<Wlr%xK3={o)>6z z#j$zq&B$mf({$&n0*gPaM;%>G1F6tod#KlXE?6@$(ERC!n}ax*t=7TuVXXU@q9lXt z+i9I9dhYaX(lca)F>`hDCf832ZLSP)A9Jb9E#Qb5jXwhq zn?DfD7@S?i?nlHkrcXrFjui@(XOmaF-K#Jq07ywYF+zaB2rWGu1Y|{?Mhe0hj2nTK ztd^<VT4ul+emZMqfBstMno;`aI>2^D~*6K0M>1-^%^Cmsa2kI zBUN$V{A|b~4cnRH>2|Y~_e}Y^fFKqWitRU^mcYB;%~4qYs{HNS98$F8goEWwZ6clu zl@84Q_Y%5*Lil?SDj;|LympyklP$Ten%%>|R+5BmZR0>NQ}QbuPE4V668cNHt~^yM ze$`}M-FE6#HaK^HO(Xnhr{`qC-!<=(Q0>8juYXpvz4EjuhofwP=g#MwUw3DZroR=` zc9|XF_$$zUK+g>O9$Q+l>isB2+JCYp*CZ@$QZ#HVw0RACHc5)lhR>?zhbDG1(PKC2 z4t}wmVQz>HIAc#B`E|VCw(ulH@3JJQ`k=) zMNme&ev23?Cj>yK>7eOBsW4=j2Cva( zl{dlR(@~ju6>S<7r3MndZjm!1OpYiT5Cg!$8fMfRic5?|MVfs=fq+BEV$~?%2r{(< zst7LOvb}AO}`Y5XLRV6zJT+23Wu2E@YJ^_A@dfbqZ_uV+6yHKxv2qE&&L9 z2Z{I;-xXARF#530MuHd|1zpLZyjk@%jO@2mX)nvkEqae%!O7O!chX8m30uyf&A7+r z|0z7%*=EYT29_`bl?OxBYU;z&aBW=;Hor1J}IUDdjJb`QF7OI|wqEi0R; zv+q^WcB0}_REZk{h5b3<{ox6A?i0eY%#f~_iRG5ZqAa2;GiB4<$qxXb0GINpw-{wE z$LZI40{iZPO_oEK+mg*chQ8QyJZJD)nyK@-yppsL7CvOUnUh^zfnsBY%CpO9fY{kj z=qeUItQy`dN7g*Mag(iFI!h+-XK?C%zKn}I79Sf3?Z)st0ZU;6;2I#vyRRi8*f~HG za12%vO>)6qQ$NyBRqQwf!6-mKz$GA-Nt`+biba7te_q3FaF)U?;vABe<-JiJA~QM5 zvpfHw?Brw>waVjHeB-G3%)OMAWylX9a@Sv_7X!L|e-{8o|75~af(Ca5LOX!i5Sbui zyij?0G#lr}U_lAbU_1Sx!St^%*lTSrX#mg&7l{Nj!I6d4U$cCSkJ=?hUIH(u}p^!QsMEvYAOCkMR3&Zz6TJ11jn)s^8n1th~$Srj8JS;I|zoy z>R*Zz!=_}aL>gBZpGYm}oLuGoVG!p&5?R{1#Vz5pDrc_~bE9(V3t93w|Lps^{<+rU z%kG8Q7oPJM&^SAmEZ?)Xo272E8uj0_kyms#S?~9+XQ%gnO&ZR6o#9UgRrs!OH(v|| z2`)%=t!8E|oXNN7)}E&sw$vQb3fMD4gujneuXYUkF8QY*0vKxp2|hmpjT#GWtl(qx#$7-JX>pTN0+Nd z>fwv06U`n2l(-<=CvF{c3%|Z{dUjmX$`NWSG2z_NB!wX(b4pm#*^(1LPSC@Q1{Lug zYF3__U5G&guSouaF#2Nn&JzTmvAZ#+fI9r$$O5j|da< zhlD%Qx?nFt`JZ}`_bHR&#X;W)oo$3&BMQ>eqgv}XP2t1a#A@A2>Z5Z^p3|h{kct3y zKP!3bJ@)qa>^r#9)i(6X;4spBj7UmAsE|ye-X06vt~kn;i&%+g5A4Su3w}}Piwq6m zIi_ZyuU;>Gd@3R~|EpdXUM6yO$Uc~~`Y;^B%7!%?AA$1fg%Bs|1WkN2hO2{PL%XPq z#uSst--ANiF$|`-^1y&Vuyi*7Bm=-wOD;rTrA<%$IsogwHruT+^xde?;;TJ&t8R8B z-aGSKOq@#-v=vdkYHMn9n5*`@3k0m-s!r=qa^Wit`&2x&II0zX{p+0D_u@+(t#uNY zm=*(Iv|zhF*LJt3_V<>*_6)!!S>UGsOJar71F^%SR?VAwl$WFOLqzptk?*GAeDBLv z^S$sF&MQ;3hQEbUJmx8^%bVVpFOhQFm^zbyv+=};QkngeWrEUYH{U3$o7eGw!@{xe)^=(M!~}CbqkB8w+83^h80bldG6(g;weKO?{R1y`U6~Po4PQ3RY)fY(+2E8Gd&x9UqAHEF5_M;$(H0%Y9qf+t)q2 z;JV1$YHyf+?gvMznr74Gp*44#O|T*Fa_YwX`R{%E{cxg)h$&V1ey=x2=N>m4wNL)}Fx^$%t zWuk>YTscU=W|Cbex6G=_OYY(Xf7tBZ7tEAsHZ$xs6j|c9YP$J-6cE~bDAb|m{`PHV za;sUd=#1{#ZzTJ~SeJJ=05=dpfB>FhZxqw7Y z4%O4#T55gUx9#|jSCf1;8n-JlpO;X}lyT4bw(Ict4t+{-o$r`0A5UxZ?ebo3q^dfM zEY$a=lW;0*r=%rOPpWv~^sRY%>&N)Q^+e3jVkd3q>RY>H=hZp-7ezSIESWchx2G<< zV{gX2avXL~1m_)3j=?xG)C5ygUQqv*5u>Ayz)(Q&v(}%zo0d`T9kklt-~hkcj0(D~ zDY}whOBwgE-&_fbRW3&Q?7kW3NRZ7s|31k3mdtkMjAmLjt4+YS^9zo2j_L=yi&>6| z1#ye>V&9v^w=)m;;5|b(px2HkvhCexNiWCG^;P1|B}CGI8T`>7uUmskL!A75)3xh0Q(8l&|$ z4!@08uy6P*O153yzGkzMvQN8(o^IXiu2|4u!#TBo<+Qvu$N6ReOX!Bou*viG@6@+T zf~%DwL$MDzc-amIzg`_%xI@DwZ!DgE3=(y;x=Gx9Cec*&5&%$Y`(?^8p;y_=O7!*k z*w=>2h2T`)#{O-5{4sgic}PN)qLnk~bMWmso8|+=d&x%o9(B=exYk}dT7>5rV+5yYzxN4?jy&&;8A;=iBBti+aEn>ss!{Qyk&Qkj+e&MgBX z8~d9tAYUABlNGYmULd^H&t&?Q*WuOG>2eP>^@)5l95X{F`7$mEhZ*(OU;cLt;hFu< zpZJ=%WmRb>HR3)VxD-Y-xR^kdu;=!JQy5O-;; zXs(@|t2UeDXrlAnm9GQwv9?|;X6@PUyx)IzPTnFIeup8CvOxnYIgv{Q-d!I6?ocA$ z$j1c)lagCmPuF>llZi$Xg0-)rB#ypXbJO{3A{P*HrkdyN(R(+W&J}`gC!goI=p=tF z?X3$6xSez-VCF{}uC9~Z_w8x%dIL8;UoS`Ri;%(ZGItVX^P`6>gze(}aI| z3E%+-#&ai-V?^tW7I(FksiO9-e|HcL+xQ-I9cZb}!bsmQ{N8xrZad@aC6v_Lo7Z{5 z@=UyHxA%u-FK&(9)%B4#_2s1$)&}Ll@)h0GhcgXB3qG-tM)#iI(X{BD+y8C(Q`1kk zZcg4b<-K-+m8`9=h-!Y`HR1~0^|3n3kr5X!m8b5VQK@qaQmK_SCI{e=fFLph4x&|+ zo;NZ`fXtx1&8xNb2fu#ww4IMWt4pUMV7d2FB~$ETr$d56`KGU|CwfP6+u(tJL7&%8L`0Q#XFXH$BUa z4SGbG1jL{7B}DXmkNa>=1)_=4%9V73Ox`eL1kvzX#QQ(ZSdoqK%sFkb-LUdK$&Qe3iy17q#=f#@fZj6xYR89hKD+ zy*0XUN)F^`C1 zG7@lRNm3e54!=Kf&6 z<(KbGhhebEO^z{KuIRbD)hV@@x*6uv}n1rJF;G%cC`{2@h|9=7CKp(%;?N{c{`m3-1`IA5R z?vu}K-;w{}>+V7d7F3TMdhXc{Is2BIzWV8_v-*N!&sRSGuf1x??yBm`%XF0!0}dPn z1qG_e4dPNVP!n=k7gdYa-@an@qQarm8()9+rJsovuiUn}cFimw#bcPp#=HMs93HnRIf^Wqh?AP^Y<8}mO)^=5lX*yjBY(NO)tt%q9=d$b(xSXFZ6 z%oWQPXNNks9os*8+ci#zH8gi9j)L`TrWS-=``-OKMy|Ya&Mm9v@lJW{@oyb$TU0`d z)Q1u4`MRh7ZdTp!%Mbi)>#sH)IQF;KU;dR(51w{Z%8Er_{+o;Sr()8rC<^C1?RNY& z@mI{9cVn(PXMl;*&;ReM{U=Wx?4DlJv1`9R?S|{Gyywc91p$qSxC8(gj&!vg+I;q@ z?cPuR=FX)xvkJz^icE7WL0=F+MRD%P=PRFMT?oxnFMM~?(8;#8J8u5i|NMEw&Yy^D zKe_haTd&9-7V%e}d|>DB!YgLqymFz|14kbD){)LxIlcWycfIm@)0=T z+5Yq|nHvClfYfXP=)J zg(G~!qfK3%)$v)SvC+}j4>m8mY5vTbVq3xW<`{<2+1dHhOE1Oa@g+-^EL^y7WMpLL z&YeWGa^=e0+>5ssB|6WXXp&fkcNT=5sL zCss{AE5Q-#-`V!(_sqzt;w@)}&mK7Q{E53a{2-b5`lWZxxwI?W*jxex2n39P0iqga zBHtmkygXpe(UHv?e)8WB{_nP<5XtedvQG^T@>~xKxMjT_3HT~{%6c zQ?I>TB%+RaONxCR(+8k0TofI8F;H>^ugRUWsDkN3g@5~zHP1Glm4-+}$xMLeMj{3z zr4&LkjsP5_0#YH=O$H1Y3dN;qL@~G1ljmNkPFXhZLzj;_20gRq-#v5INI_11RfW^t zH|MH_%fEhnsChs%mId)>!_cAa5A1ySfxqJ}Cv$t^w_Fp7G$s-?4o5PWVd|ZL>5qv* zmyHd8 z+4$KneYRMJz!(=dUwPNs zl03{V&7F0{ol9~8KsnQ@tB=ipqqVI~F)J?J6UM~4oSdBe>`6qLOMr-|^T3Ix{%_si zJr6)cRV(h8f2Hc8iptvk-+9_FnZNi;YjZeH2EFLp{qiBPOI!Q+&zBWd=Z_P&5D|ul zjizujVx?qGMiVXsT?bD-{r$CHdlrBcDqD2hoXaOv%`~C4vqwL*@xd(*J_t!;?3>oz zG|i1lu|99!ohxKMk+OLCyrVrUcQpb4^>y|}Yqji|i)Jza2}PGLU;a3?_O$der~$<4 zX|F@YihGlTzc!)<}ZJ8TF#6-d!&8~`uqFuzyE$I<*m2gx^m@8 z0Qlk;zj*)s_ix?0H5!fHb=O@Nog<<=Pm@o!AJ^N8RajF!?@OQm#V6(gxB+whcsHvL!rO!Q>nOFfhc&V4RvAJNFL{@m8_99IdL1tA_6Q;LICm&H z?%a94TIGS?{A31iEyalH%qc`K%8-fX&Td<9-}@Wmc;=44g$R;;_y2ISsqPgieUmGv*H3M993W_ zfDl1tfFL9ZL@5~4h2hdv#?fHHAVW7zhc19|P!z7H03c0}%p4W*7$e=`NU-?{WzE0; z_TQ%DC#JiznFG&wr_3ofgBpMl17ws8RiDyW*x0-^Nh?EZQG)<2k&6K^5@49^pp}up zti_9#txISl-`n`&7e7jF<}`IhatAO7YDWKvKf(G{e@pk!puw9}(_jfj#ooM;ewQQ1 zC*6X9WQ>?fJVe43r|@X3C_no^Xv7)M1ziGQ=6uLf7dr>vYr#a ze4@iGKq;CHD&(1|;&5}n&WY*!<)`(s(AuBU$N?G+A z(+ak2-C@p~#|p=X(Wk)!TVL4o`*$Eq-Tk+#SKey1B%rUj zSR8s|>+svDCUJ)lYi_vnsV8HtFaEZBk+J2>m7nqZ{SI!A*%!o}ciuT;#*EB=Zrr%> z(y~f9Hc!GNIxf8AScU$8*Qa~*&QpDbH!aC3@}x4CX3ff}xUu=@?l3F$th=Ww=+~I^ zdwse`Z$H^rc++KBMP4iMkeRrYE8EyyBmx1rWF)|ZSVC{#`_Ql39COQ8eRxrkG&gUp zH!8C8Jl9@cm-X_&!N!KhxNinH42P4uJfOXq;aQsAz;3&BQnie+=08&+FG=U@;=PGk(j62Q#6GM%C zr&@%_Z-xV#k97~^N%Uw6aF*Og3xOdArbu7{Br;MN018Pu2Prr+Ow;918K8;6Al)!y zj)agN4xDpUK>#w*;ATX`V@L^y7GUu@e&FcYBeR#?GQ$%D4$~Y$s03mJ%ouPtC>|mh zui&z<7td_c5Ln>|aqQnj)>2>6P7fI}fN)=bq`&W2c2!xxIS|bc>(J4%D|_aLa_R;= zzC&k+bI-P3xw=3z2hTJ%mLy8+N{jps40v*e6GCS?D(Xn@K>e#Syv#@l1j)GMDzOj= z)#<9pt7$GMIC|tr_cV{Etca5;5m51%Zf~qvLN65EP>T_1Op&@qMoh#>aS};Ez=$C* zyF1%_z>!QVE-5an&gjDQzPoD7A{&)2uiVfM)MIcxj@c z!ItgM{L4?}(!ZQKb!xdP0N#PUm~o)HWn|>Ir{d4%PMtc?cOniW23p}RDr$pyt{aS4 zIKK1L-unK#rU`&x{*-GfZ(Oq4KNJ9Fkh-!UOZMkY?AIp-p;C{JnckBGQZHG4)%Xp3cg z%|6HJBO8w1byqE@&4=nw9ytomsQ@fHCtK@j3n?cXaOqT#1N#phbN3j9vunn^tq>6u zXZ4a9>dWni_V?;}vBm3agC2+Nm-?0jgTdQxzkS-YX&%qmz0S?eUA=nsr3Ecy=QWj> z%#Z6WcHkLH)nC8!g<;ur+zZHf_T2SLrxw)Atyyrm@tL3g_@M*AfJcGs%EGDhZ=IX( ztzBGdJbtt*dZ_s7zn<>*0|1m&K8r~c{8#8WD7obgsywy}8!&|EoiB$ z%+64c=*cd;Z27ts6>b;|XU&=(+~2yn`Jt|2SAP%W`<)aqdp$vBx(f~;dgN!c=(5Js#BN-FmkvRlO;qrsuj;!ym;5E^-r|@;6#4OutzgTWARE1nWTeo0~eC4 z@a+;n4u=G4l%**KGf21y4MH_xm>!?Yl(9$xB?!OQ<#Vcri>m}&)e^eF!k}a+p%8a_ z6u08^XkI-hckL%?x3#_Y@{c<^gL#@)<7W0Pnb8vsa& zTgjO1nMVmwT6>cuJpqaI@L>DN6VJca>G6!}p|+j@QMTseE6MYH6txulAh`qa@`SIvIm#4C?HaO{n2GdwyfLL)p8ccKgnRZ+kP3OXD@%gLYT zTXa?N=I4I6@o2%Z%0ex#yl(ND8J@ylJR9pg5|E7Xyg64domx@o+J06^T4RkdLL zn(NlIKE3<-Uk)D1Ee<5#6a|Z>7rFAXve5@`Z2Y0I4M$Hj4Y86Mfhx($(yH*@(=R^z zEbm`1{kFL?*WOt0RKxBKKOY#Z^#cH_Sb6zuUu9Y0yu$5IKJbH34a-y74)(v25 zQx>c)8hE33>o30>FIQlw>1?#5Xu5_m=+VC`q9~Zz|FI+3gf+chEPBb6b_4I*V08G(pBK8%ufOG{ zS;3MyQ=lm5S1+xyHa2eoB7)G0YO?n1+Oy-Cqaop>-11NU)jwXpw5Gxf3^nh9>#v=+ z>#OjU#BRpnGt!ljA1dHGsNNj3w&@;fb^2y*m@nM zKBW}|Fc~^S2HY&9L_42*;_;~TDx)y(#)a!{`o!{bw^_daw$H^M-}v-nkDWpPFa)mu ztB)*QUp>X|R1z~+-L~?z?{9tM#Vxx^rsT|?wrak&x~R|z#Qga+wUs5o9CSKN#gSie z^=+S2hQIuy?JsYA)#35gUUg&6)zcQNyZTNw3>$v^+ZUccu8ol9U-?P&lwVfNOi&mD z&PWo8lmjzf;HsmI&7UkNTnuwc=H(n|K78i6!`lEjSL)2!rG>dAfntC0)Ej5&zbRNz zP*9M~kiY>r{njts+xz3kHoX4a!#j{Mjw_04igW$><>fP6B^p!FAnx$zmzU3QmS{|4 z71J-Ps_#Df?53wriRv{o@`9EKWjYbE%jT5jjVDvE>7&pNB$}>mQ9f6XCbBY~l_tfm_(p4Y- zL2cNxL%olF?>8?Tg7W1{0$Rlk zG~61~SjD0nZ;R41r+)U>!z2-FuK3IiYi?LlEp>pbqUqCRS(aZ*`n+NGg4u;XJyyc@ z)?K%ZJ~d@zbKKB{lsDge^Ri{j0)fE0R@V0!c#$Lb zmaRfLJ2tafEf? z8n}9UjQj#O0E~hvTBNUH*fg`%0l)$S%uu(;DRh7l2G!_<>>?0CNNEbq;RGFExC8R? z!l*d_w2odQFJILlBI2WMoq>u1CwRaBIWWMA)Isn&^{89ZdV#rmm@fd}ghXEqG$(23 z)WBpW2o3@n3Wg@Anr@655ue8mpa2jE8RM$U=mxbALg5C#uNHIw-UmF#h%?m*14A9? zEpbGKJwdN75@tkkdt$(Y05CEX54d>(DS@)zbXLP4xB?(a5}1_i#)y;l=eO>$nX!26 zow)v(dDHjR#2cN|24$Rqj3J_F8irwXc6Di*!{_sPy*^CtDL??kQ89#(=pOc#i6GsHKH>0k@Bj=0xd9_Rkmcy>=gwT8 zZxFyOM@Cqn01^a7Tz9*aQ15Wi69fdtIDABwepP{os~gJ*WQp zj=x_a@WO))649w&ed)C>h_3qnSC-p@EdW3?8XX-S&CAQPnxm(ur=z1|;lhO%xMM*k zJv}|UcJ11@apT87{_#0;<}k*>;c$L_el!}j><`1?@aD~%Pj^LoYCpce&pF|Al;(M2 z71}rI9pYl!(U!N~9dre}d6r+S5HhOzeLV>XpedzL9RiS%Q?PI-pg9N}N`Al%!w~gA zR3&dkj6py%0UV||64#kG=pX~)pu}}ESBoJyIg^GUBQdIQp=W37rlKLKh*08JVOU5X zGo8NjYJmm-fCj86Cn`aT_<&5rOw+G$XPz4*f+UegQA$LC1%L&R6QLBqfCF+ty2(-X z#szQ=DsbTF0sti&5@GOawLkzUz;H+jpn;T-6D$D&@CHo*QAnVRLZ;U*02l=P&KT;t zVI*`TTfr#Lc1c1eQApDy#sCo+AdbDGGTsrH8n4tJTgv)Vy+BSxef zpaC->n_^*MFff7;0I6s`BI)o+S3Ci3hg4)Bz;t1Z@|fG@V8DVw55&THO!26SsyF}u z6selAfTj!zm)`)NB8h;Kf$NiXv%9N}jm>*V!`@f+)*o(}dRvKP6HK+=9Hr~!O`Vnf zYWeMR?AO?P21B}-ScQmhBUYi!I3}^QwfQ4J<4W2Bih-&zh5#HnWN6yi?MxMaWxh$)K77$+tfa20@A+Dpk1oj|}DP%11M z5&(co(hW>Shek{hDR*HaRdN?H1yBPAqQnl2BKtc#DHml8~_0r0jQRG zo2<1IvZ_o@P?1?R1puo`$he{aa)wHB7jy)sC@LTjV%kj1dXp0%j(2()7dAfgeSfa> zb;&zW*!)4c(D&8&eYYt6*ZRgL8SIlCg#effG(^S0foTNX8iY^*LO@2SaAho1ASWQ? z#2hF%a3DZ%AaYOu5f}hTAe9jS2OwYw3NYj@&^Rz63CKXxn8F<_?ShZMRSnU{KxJgf zT14qeT&z)ojg5`X+s2G{9eM5b4Ntz-3;@vA+UKmAd-q4Ls3g)ZAlM*^#7O_CZNL8h ztH))mcHN3)t7_cro!ZUp{YN5^ICJLAC5WW4*aht;ea_aDW7s+_n-3yMiHjrvASe!G z8Yd!7oPdx714OO?5D-ZsMxc^{pb#Re005kTGX|Qq6i=iAR|!cVNdRPug4Q+*9DxC$ zwU913kpf5@1p$EsL58IZPyiHUZsq_&5Dbt2B@rpWIiL#>EQyB`FtR3zh^T;KZFnTW z1VRK9f*}%D36KCJaU`Y^5t1YVNr*{-5*(l+5-p1YigbR1iU;)o}@|{s{t!0fGXYm{V#*BuF4bbT~MoGS&kTP*XW6ToRGU z5Vlg|-dLO%8yg#&cL&KdP1BrC1_0$#*G^rtfHW4IB>$AqRP5_phl_ZwbM5?X2p1d>2RAXA&EBcy%0#?)0ALf1L|h*qlf3ro|qi@1?Ce`<`5Mo7v;BF;EV z_t0d|OFjeXFf1uGs}(QM>bj{tvC_Rb+4B)o|F;4mTIPxXKvuU$P=F)>Szr=C$e6jL zRtb{2t+a-YAo<`UIJ8Uk+_$+%48yR#n5JpZG;H34_jOlcc{5huG-LHmna7Nas3gy= zUH!T5u1@~zeb+p11Jg8#NY{01`XPkSG_AI__R{>gnwy*7GMP1&O!mX164!VgS1cC0 zKvkNJ%^xB0csw4DPdI2jZ0QYs(~^w@nUY=rGDMt|p`0cCV0yNgJedf9FeO!tdAwvk zbt$2X(sMtgl&w|r-zhx+rW|F`KOyTGPr@_G7kMNx>(x zq!}V)x(s7>f|T4HmaJJXrZY)Tohf}1W@-q|wH~z2meO8pv(;bzpFc>(dj2$aQ=5{HR+4YlU2~p^s zZW5cfAQZCO+~$G^hr{7;_`NQL&7TrhcpdkWvb+a6aZk z1?T8P&xOV$tBhk~yjd^1uugaZsqFq~V`F3U{(~_VjYj{Vm!R_vF>k5kQWWJ)?0*Ia z2YY*Z2L=X4Mn74C_ z#{yL#WZ3$pyV!(r>)dXYjN+2&fh-kB=3F!S3`@e~nVFW3V;3SIAiICs*x1;-|4@|4 zcOiZUK}<%EI(N95EON$M#VV9i#^dqc-rnZs=ANFOXf$dVhLket&95k3-Cb?%ZRO?V zrKP3W+1U<B{Ig4A!5=hQ4*09QZmLk=gAlb zh%)7H1^`wnDJ5f^F%BRBBoKp?Y=($QOX=iox-O&0TnXfmt9H;q*&rHn)(?d|QyjvX5s8d6m)H#avYC&%aWan9rM`0(&> zfB!&lZ{N_+@X*lE)TvX8i;ERSvE!B5{PDoXqC6m_+@P#3$`AwyVA_P0cmxELC@>xR z6EUgsf(*B(WPRXff%q%Jpn@$hys9t zOqD7rlZ~A>_L(jWC1VwkFooc#AaIs07D^$6DWu9+GPD5!STRFjEEtF+5>g_wLcuWr z35X<<>Bk&X$1a=^Q{LtSLHgcXi+*Ddk9ANc!(mv8t+yB>Qb8~=r7liC#S%aQs_E!8 z<1}*xlz?!=WVVXuX8tw1zKX&YRLqp@p$jF*CYqGPm-vwQsjm-r@sbzOUfQ)T@L4rh( zoEQiK1pz=NCv=PikO{;%vZNs$0g&~ZB}`ZmY8V1bo=5+0LO{+LfPxGev#Oem zl*pOFR3@0^ghLsYl4Gtm$P_>h+^Rf+0Azq{Tu1|}K#+{&L6W3IM8GlM9-H?o6S@H= zx1h5QGXew#3QP7y$gp!wp9@42Z3_u3S&AO+`Mm z7X@u>Y;0`a4%S5QTp7buL|or?toi3pHuVpW z-n6RplQ&G^oCo}Y>C>mVoX+mPTAJ z3`zh22oekxNa~A-0q8Qh-LZ9yz*5O2B_|WM5Ew_EJRcPR zV2mSUmcU4qRFk2#jV({TAI48e({@=LSn{9=l7m17=LG7J1X2ivSvoK&g~>UCWKnJ2 zw@}KEG%1|}0007!kdh=QDgjfH2SFy+Et35zDHT!5!!Rw5C0((SyJ#U&DpDZ{kU+wc z_broLNOxEo_a~)jv)nZiEYn|1K2Mg>;YEiHwz09Xv9U?oD@_6+n?&zK=htx!4h}Xq zHxCUB&zLczva%u&2yo8BQFCxm9zEID-XED)5im{DG))3>yWRQu`LTHX?AfNu%F4>h zN{`0_A|cI&XTNnc=gLJ>medx!$x3(ssip&){^R#YsAAn6H>_Scv)K9WE6E1W?Ax__ z=b^-`Pkm--4!G=D;`;>z3Bx@Q?|yx2$L_4!o35EJHoLZ|KmIPs%H^y#877Bc1zS+j~l@?@#0}n7icG zo7YtO17PCN=^y^`Cx=4Lc&ujI?%i9eerNz1tgm3$jbIrd=~<-t_Bc`C;_v;isP7e5T`YPo%W2Ja6%5ubf{| z699#PNr6BNW#7>q$ItF~^zd-3Ib5^wnk(0r5f?_|8~5+n)No=@#2Ip(m#n|%ldET!<@rWqohP3C)~^oMU4PBm%dVQ0 zlXPH&sqJzuD zzN{|C@vbRl&3HU^^6CHB;<@&!*>h%A2GYm755Mx_t6MsH=H2#pH&g_@T5oE$C7NRD7FsS=G`FHdf@o>=O1{jZR`+tab?jxe{qmZ}Vb2GP*a*#pn~_oK(=-udAx7A&s|0ss*qG;e=+dzYD2b@O!#vuz!=&ASAjw69I> z#|0BZs-@}a>FMq5)iiC&lse0C3jmx7R1|C1FE8#HNldNr8-`&RhOQez2&c=Ll@)Aj zYins~&B@8}cs#_S2DBb{;y`hAao&>Jg7XxYXsGM>w%4D0YIkSdtTHVX0pJe~(NM>! z#^z)3+{;(i285yt$u!PQ+XwCa1Q8*Mj{2P&&px;Nd1uejX-odyF#>}gJ`n3lZ28rr zJ%LhB+c6pE$3QEYr&cL}TvdrfBHmaZJ^aiuUL=SgJloOPH{^FY>swxEYSwbp4^>Pl z&QiocD;snRRVL~WpBfHzEc|kbOEnZk05rm~_q83b2B%&#E9!I)pX?8{^rOkU_wNjk z%F<WfE z&G3T;5>P7O7DG;>D+X@o;EA1`Erv<#^68764%yKc?;i|t4($ha9Xor)tb&TX0C)gg zrVb2{f!WaCva^17U(ZbE@TvVpdD&Gp3j(^XwueCB0x^aV>Tey{GFW)m$FocZQj!!g zpR>F1nXRWH-8f@fuEU7bzw-2}(-o)h>iLEqI=$<`jhh!5zU;hN6*(DV)o@?^p4Wc% z^M^JC=(6jk%qTB<54(=dg_9Py2$JDnq!q6)5gBfK z00lq+37`Ww(%~)A`Z9(xy$5;fGA0ODjv7IiNf^=G+`$b?z$22Tq3edKIgpPz6_P1Q z0pI`t3`t590yr3qqT%+IW4pHOKX|+?swfIE#AB{zPb||kw}xXE+WgGZ z4;?rVyuAD)cg_z^wvuXN^9KMC8DnXmk$8V|XV2gXW#+9$+lgHV_U&yL1re0}2cCJM zG;mYCFP9m89UU4XDDnQ5gNH(5=BzKy&u27vdfTC0n|C(F6~zTyvEor(I07T#t~1+y z`rNLyv0$#VAZJ;PC11(j#?9ML7?pI@wYJ1%0|2IJj*N^nG&Ed-P!S4+E^v2ZF{#pO zGCwW^%cyEH`uqB0u~=SSp5>QCL`1|mE6?}ea!q+6kqCGkx~^Limthz}2vt?Hv$K19 zdLpBd3$GZ8p3}z;@7~7NfA2^CZwVB7FZ|TE1&W^2n_qnPCv8*att@c!EZ_9Y)=$4| z{kwE^n|B8yLcROpXJ0%l;v$sDlTp(Ir{bn~bMuywA2eir{WpKP#^-(gJOA_4*2hn; zT`+r!0s!i0TSI^MPhK3_fBe}|h|o4bpG{$*3{U3=|R zGbiidix0g1vqyh-`o2G#r=kPAkm%`c*z@@Itd$>^OUwNM|B_iZ-F?;Fp(z!ezx~hO z9N50;%&klF{k#9=<-z5*e&VtFRu1j^{SW`<2Z!n(bh`A4c*pmi-`P@9Ax0y!xDo(x z8BBH`+x|+w?}{tFaQ8LKqK)5L`PrjqXH-oqoTdl>F2KQ~?FU-b=Gcn=_cyoQG;`oz zuK&x}>3L1P(-!&wPyuA1d40u|AN#`JexW+I%OhFk;HFJyZZG%y>vA~& zNGWl2@3#FN_4Q_Ou^s-y=3T{EHh;k#^M7;)004+Y+pcGJzVh00Q?H$&9(rPXD3N>R zH@|art#RasxBO4j(Yk|mi3vNKQ@;<;cZX+Z0j?RzI6OA=lf)=VcX-oS~TUF zZ~bU}{-u>fG7X`63hX_8eD&6nSyfAX_CmSMx#+sy+uJ)jI(iA`TGAT5Rp>7wI$zhD zd=xpKj%#>$*f5Oj>}+eh5-U{3a5%pGK<95>X ru3D7yk+sFTuBYTKT?mnvmwV>) znMp-MOJ+mFbR7^G03neHc}`U?EhPs}Mu(%M0e>oCD#-BogQ?Ltm1kOzO(jdm%myjP zTw$z)NJ*rmbX;#DN=5n}x1$SML9uYG7U^FR8Q8Ig|5#y+#dz6Q|MkZp&%FM#jW7S- zpkabjaq`B~$5>0`@{cU>`v>FE`AZ!`!IEdTci&o53!L~+TU&p(XYQZhP^+p;t)4sE z$}Ox%XVfT1JPe%00e@uCT4dmifIC}a`EYL{=#Nn-2p}Tiu%qYo(p!JDeA%?17c^Kl zn>2EPSz7F%?oxRS^2{MU ziwuZzU5PtY4jj4<99Fzt*RE6*x0|o|+|4t-(-(cArQ?d31^KEX0JuKba^QI9BX{3^ zI5^D#ri>}bkU0T(T$L)R0HApS#UHu*iXS~VT;JL_SUDE}0E$YXZ)o(;>5*G%@{*5F zb5r-|@S!WOyzc3<*{Z!S?Vl1U$E&fJf|5{43=Va7^%cztn7YRs1T9#%7^)-?Q+1FU zFc83yG$w!)E24}5P}wL*FR-MEyd>fhK>#5Vpdk(BBnhf&3dw;Z3Lu@N%1Gsw*q7mk zh@26c5{M*%;M|HP6FGZg_v1f(sN_p8tXWpKtPlYJ6epBjx27z4-uVU~NRAPhIm9q9 zX$+8((uvb)(tc^_LvI?@TRsPwquzw-oO@B54-oR~>BBt-HdTH6A4;=#{PI{yZlH4JRPGnB z?AE&iKj#@M1;?>Tug ze0Ily-ozcO}w!bCJ(fQ++JQCIDb{ilr6>6|rd7GoFfuG`nwH!v{p zmdV)pcUqlX;yRy>D;kZGB%jZRh*C-+glU?(t|tUwBps>$B&H0RELx^BADbNs=-`Q2#%sJi-#x88c|$1V#BAx{0|o*%z- zW=9*TS>g5&#x`^cx?!<%X*&b)Oi3z06Zo{sHe{p8Eo{F9JpfEZ4oFkoe+?^d8T_$*UVK{xLsb$ zSw)iw%ms8RG@7F(eA7i&&q#;c>-1_~7Xp|(P+mE3LJWnYz?=Z6GE)elx&ta8cr*yt zUF$wNk~n>2C^$Wqwfm>D%O3HUIRThMVGICFPwkw-rrn1RojFoeHpjc^cy0co&J#gAsK)L2E^ z_KjPb?{A#`&A*&qHrVO*R8{Ae1vm!)E$B_O#70M>01ANtVDxwO_V@}MpPXK+sK`M@ z2ap6Q0e~YJ=U*Z!zjD3zbOblNe(<{6=MxYO9@>AlzfFAVrey;!w4LuPn?FX}YY&;8erF3n>hQ2YuBfI)q*{(%R6^VFj+=*pCyaNghj_J5Yn zXg9a)`t3h$QEpuN?8XLip75wH`uZ@n57BBh8l^?n7Q}fRL;+}tacvoYG_R{0W_kI8R&ph-gWy`<3bh5vx z-|stqs`9H3efBct=+;Lb{pIhrw3-|MmVf$x?zn#S^0G-Tp2l5LQhLKx{O>n3FLYPe zO)r(gjJ0ieqJG}u1x0gRa4MOs;jzDctJe!_8m1_55Mxl(MP_vn>f~e>@Poe)Ag&XFQN0O`Ri9kf7LhG z@#B|gedF43{=h_pT`&LS2fuyhlw$ zWWA@LcKXNu`|H;hmS?Ll+}v>BnSc7)ug(%BSCn5W&ev?XZ+dX z`B$%=eX{9n(=UJW+zm_Cl&)H}xPEwG+epcsAHU(UvdX~V$sI4e^t)Hh<)6EwmfZTO z(=BbAAAGRlYoAz<7a3|gaJ*Ib%)Ii?KT|R_AUj)kZ{HIqdENTY+_$D-<14!#{>iDS z%Vu49-+gPbVdGQBkH20}xoq*eO2pj7w_lqxID5Fizq|d_-~RUK>U;ARuUdR&sBh~~ z$wxoFZ2s)(;*pNs-5tj}ye1?>^Pwkyvuo#&fBn7pl`AlG@ZhP`&m3{|cIfMFV78lZ>sio6Wa zt!m8W;!cODYYrC&=smq_r0J}deN!bT!At-E&|oCm)AQ2(LsRaqn>Me=MaFPf@9FRS z;^m&R#`N5RY4?5Nie*j$p@kuG_DJaTbKx03tZ=&^qJT>RGa;%)8aDrO-*BaW-s0uXiAt(kTz*0}el|NMWy4~)30{@;w%6|;*QBKte)2WE~AcQ8FC z(RaFM`?jAy+t^-JI)BEB@@3hj5R2)I?SFRTw#LI9qQ9>EA3w3``ami4AMI#4++3gU z^7EE~4&C&!h_D*dk>yRqVv%r!0DuxCh6nf6$IdwYS5B{0v}Bk?L_h&R9IdeWV8+6O z`(8fi$||kME%7rL0RT|_msOPPFot#?JazlrDUuJ@AMd3eS+inF)~nJEAor(5+VqcT zO#A}y&#bL7Z~sAGkn=Y$8wi^;%n8EU`?m@oodJ} zc2B{;GRNsWjZN+0}D6uW-GL9f%z}JE~6^a{Grv zEvFy)$GuJY?7G|6cwBe6-Q}z2S9-el{`8@}I~-Sj=o(Cd)X~<}|Hk*eSM~M#E~`q6be!6K z;Apt=;~&1`Zb#?#H|o#6zTx0i%VsUP^O_SKn+tL(sy=+nl7+=y*V*otou~S{>fnOA;h zarsog=9XYjO+N?_5y0@#eW$yJopnp=oC*!zj2!!Y8*-GjRy{^2Xl!%9(b z`uzWI#XJu&Haa>~-x<{kO76Vk&%CU0*Yk&u7v$yTT{Gk2qa-;r;1|QtL`SD-BqJG$Qc`lE(wCsQJjhUZaJm-pK zvnt!p*8lv0XKz?|XCPp9?AyNS(bKs%-?t)LD!r|Pj?PzhMP@I3XRL&6-k;!P+aCjv z6&`v*S~$OsOI1|_jK|}ab}KD$8HT|*S5?*0(=o;XxTS|RO*0;ktEy^+*_f8lUD(OoF-zV**m z2eIB!|Ml%%r%$zvtg8xOesQ_GJ1zzUgk$2=nbQN=vsN!%*xb=^ylu)IpSr6QveZ)@ zR!b4cNaMjbx;w;_%RljjkJb_l9sJd|zIU{F*WsR(3;h59ET?Arst?__5Y0x|_|e0? z9j)z&sReF(iSLgS3BWkB-0LM0FiioDX!)vv5GbdIU`{F=joWNL*+0;)d8WqnTWT0ro<8cQ|)~vn$@`c`R-|^iiYB%pZI(YSrKuH@&(Ipyk&ifWULtgJO#B=*RH>JiHjnyKKWYrXywXl zK6&5G<$@2*V_*MvWAna~{j#Ti_`O z4_+umG# zrI|cx#>L37tuOS^?YCWf?``XHqikSy-xt2o+d8XpFnflnAR-noTz%czYx7$UzxKqF z55C^od;LKEVC#w9n_oQa`pm2flR3=3mR9U@bb~E%*}Mrv=UX1WI6p40$2&3-8W{=c zx?!4DOhVnV9^{;>Dss*lV~hb2gI^8QwGZgTcig|7c$J%6Q za4=e-6<1VO10q89f`wDvqrF1|gAxEZl`fh#YvI&F(=)2fn7vTjV~)hbVFcT*@Q)HA znGASFBn$xnoO9v`PFGA9V1htkq!1y3L{MY(hx+msd#hG14my#+5KyA?c=+gxFKyqe ze)w0H&r8fKRv7>#z7<<~9rGn6`- zQ6tpTcy!m{Et^l&ef?u==PaA*mqQ_Dx)KVHlL+ac2*5d|A zNRZ%x;1v4+=s*|0wUh#-6xvcMv{Y#ELZLu#3lJ?H&nc9Tum z4G{WLWIlgnGjr|SnRDiz=RD8zeWu1Ot_Tp^^x2Az=w8F@Km4>Z9m#h;cfotBmk-YU zX~pyl{ybe40EQ<@hOenvSXZ+UqWd0w@b6F8$Ex+?tMfDUV#Our7rM_63>^OC$t!=g ztT(54QAKXmnMKnHAQ}xZ8sPPS!ayjE#zcxJD?)??LV1uMrD?U_JxPP8f(!+ZvY41`mphAMc0O1*fghj zQn4O3{EvD{g0Dk7jcX_!79<1`5@noBpDF@9<7W@f>DaaYrGGxTviaGvnNMXqs2FP5 zvnATUX&-yEU}0Y0D;2ki=L~l5sE+CRB*)#$yHp zFYj;Z>gvoB3JoWU!IQ8*>;oTDU05K~YAE0|OGe@B%C@y0DHNjsdRvmBcxJ9l29S}N zmZZ*Z@HiY2QGG6~LrSqETZ+?kK*Pw<*DGZSrp(MtU=RbQx~fvf6Z5%T6vno=06->_ zWuAGN@c1F;-c1L1+_Yg={=x?`QtZtnF3?EDu&;f`#~-}6{_Xl67GgeN^C$)YhAI_Y z_E|Fu)6FW-Sd)^|CdKypT(L;N<7(Wr?t^z8{p6@zf>1vcO$HFdtkXA`Ja>9gTDA=_ zU@}cTbF#dZL%{m|QEz`w)ahUKawE@Uj2Kg%I!!_dVJXF8$jDDim|H(AD5cQ4%dX0j zr&UzwL6SfwlSz^kiw(J$q==tkOdQ7vI;(BYoxhs{(70mB%WpjSm~>w5j2okb%PC9G zD6h~1At*Pun%ZR!&sWe|8wsJQ#pM-ZVBm@OJ~~pI;*DZJ0AdIY_PWHPLaQ~!0+>+{ z%ZzCi{w=J}86@$E=oz&o>FF9!n01+%Q_vc}TMQ4ngI;I5w>|LTvxg~z5a5g{#YM6I z-Y1vf`^XqRu2HoLDU4l@OQ+NI5A-`6j$klIDTya>#k00pmPH)HaU9FWl|2!qR20Qf zC^RrIpx5i=3i*Hap1u}rctGlW>(>vsi+_3dYcE%54(xdIC%*%EViElZ!%&X8h9EwI z{0M^_K+ss+eAIuq(M}3Ye23lD5_5;fCu?Zi%4I8h)urnEOhXKTj8J{o>W1Z;|J@Xs z^!NAflhp?lRWX174I11c=rtM{CbqijS*z{|?^%0D4_U37_j!&SM)EMQ&bOqBlq}M#)7)N+nU?yF*-(Q9Lr>9+0!? zpk)XM;E#F(VZoA~URCt-5AL4|fMP!2)ZU>&$OI7)P^v8}lP|w}Z{wd*RZK?uw^#Q_ z!aPc@EK#g&>1tgYE7{z0(*qM!>3Xgi006KQLA~!j_Ey zBgvekR4N?~hr=-#4u_9v5=JD1I5{^0p67X<#~4Q<5tqwlOSY+0Uqj;EVAN`z8qa5I zw?H65z_D%rZpVgQ(`MFz{7ct483~C7QF~icwwY0xRQ>^X+wPC{qe$RXr^4nGi}paQ zXYY;!Kq-ZuPuA26t%JoACL{!Tzl+3EOVkwc5g>p;03bF?x=XHXXzZ3E9{=FhO`*X? zRBlnr<&B#)Mdqw=<5M68AjJaU?|;WHPo2z)r^GT1}V+POCZ&Tt5aTDv+7 z+gDUs>fGSiw_7p{=G2`vSq%_l0Axq^wL4=Urk{IfHKzp@D3BOPf>M>AV?ElXZS-~f zdJng5U-fn%OI?<%)nfnvi9iHmDmKb6l8D6Ml>D^T{cVljs8b&9>fE-a{!N>b3R)B5 zWU*MpsMV%hl0pH0M^~qd#)t%;tyvnSM@ww}<`4ck@0NErbrG@G(bMicKp{XJPWdNI zJNt0MwR$-~-{FI9wnG6{zNm8Qp_;-?H;($OAP&8Bsxz)b+;P!0;KA_->`46{t?WzADJGanSgcQcD z2fBB?x7i)0B4DLi1;8qM+`Q!DSdfbZ!XR)4zB>PA$I7?&ezIAvHf2o7R+AWlA&W~U zrprvZl?8_yTbt^)`@_Kq0RWyim@FFPRrU5QdB^1sgGALJ#xw{p0D%~loPf=?%&ebW zaO3m8n)~cKD>roz001!zogb`g=s4_AsPwEkvT|E}w9kpC_h9qk18=UGJHA9_FrH3& zp@cZFW~K^z16}*~?gNk_(79syCacq1SUB#BA1E?voi#HnI&kFmrR%xrwP^yYWQNw= z2_dMrt=l4tnvKZ;Po#b8x&zT(-zlGxgS~^CWY4mti6U#S-*;&6sGT7SUbH2pG(TTo z-?+OC!ghQ6d(W@%yL%->wOW;)wT70z^esC6j^bG7 zhs!?HV%hkDjMHusLzRY<%EiC@`QR%{*6!G{8zICgq>OZ{Y*SZTQ*$#w*o|A?d~0QS zOqp7kJLZTZ2D4u876#Tl^ICVGC!v&^;7ftV%Hu+#t)P1b!M!V`uuCD~La(}uV1 z{lD!~FaOc}q1_Pz;EJX%oE}=aXYKtz+Ly#g;ecS9R55E-g@E7-76cP~3t@o*03)#k zX=72BTQchyeerp9_QU(P+;_`Qv_=Zyg1Xwu+4-`jU7bl8)2voO3BUryEYsc9e`NQj zgPrRJ>X#|CNCZz&#e(VM%52S_t$6A!2eCUPJFm-^ow;aUQcSzE!DK8{B&8@203a#i z?hhVnJ-F`3ipZ_*O&9@X6&hp8#QAg288?4!^|FTT550Iu7xaLo=92kSij&PMN@IW| z3?`h6!<-}H^@74eO%tzAJFxSkM{aw=h2?5*WcFDXlvE~B0N{8QfKiM)tFrO6&08P; z%Mn$?6I07m3MO5Ylk5-q2R82Pwkyu>3vKn+Fa7lSu2(yIMH|AtqWsBqbBZ8*xaY{D zAHCPxZjX4?Nt}504GXg6MO^ns{=n|;P$a~sWlXP|Fv#zC_xV44@IfTXDuUbyZU`>$>L+E`ROKyMOi`7u6~i$u)HotFE4r zNr5Mfh5?{zOToC=4_zAGeE97re)ZZ*N)BTNbXk+Pmio={P1@- zY&Ie(91wD5O`bJroQwhADL+<(B*baPP0Yz3m=^GlJF7sW;E!!(7zWZNjW@iqbJah7 zbtpv;1ixHl*i-3OU`t7!?VzFIx!>QqR;e|59D$TP3ZPeLDi>dx{f}KQKeY4Rj1*pD z$k1T7oJEAOq!-sNzI(?LAN}p`^-7&u#%NQORp;D2|4Y>dP4GPflPHC@qX&%2TBTkO z5U(C!ow;DH`{Qk&{^7>=^~fz2ojb3#d_q#lapUW!Q59kx2|9h{2M##}No?c*+VKBN0BvlJr`G%~+P@-BW)k%+esQFlJAfbly30(gUlO ze$s8J%dIReP{Vl`&avn~x?K z^H@1YFanH%2;ttA(6~9{t+}ZhRvtD_DAu|?gC3`sQL=)p=0{gfD=s!O02E;iln~Bj zHjBy_+S(qIGf`T0-sH)JbFvX4NkP7}vecSp_C%fj_I<4oQ%9x9gee!-EtpuY^NM_L z`@z;8hbu&6YF<}-)h%*TCIC~`=Ze*TnnfoRNDjgoV0X$>*J6`|> z%8<%tW(+m6s2Dn&1BPK85asW2+tyfMPuQ()cnc}qnfa$X?3{qQ4|S-kYvrND#=g~OmO^VZdGZvLZQH(FhB??`ILgG**X+tjd_KcC8-uU z2COos7#SM#4)lkB#X`okbLLN;kZa>GMKPa`O`BAfo1COO*4rf%4uOzl&8aNOP!OUr z$T(wWdd~PM`BnxHLE#X{OqT5G@)V1~80{yqs7urdmT{BIl1r+pGLkiFilU$`m|m4> z6l4sIMzIL$g6UORX?h)w2{HG8pJhy?WhKeutH$SKXCx_gDK^cZFA@rcQ zDB9Q27e;bp?G+0q7nh}cPBV0D5S35_g+w8HR&AD9sp0`Jiv+Vp!^n)88D*uF3#;?ZNt`4}QY50tnN^!(QYmGz5idzH6~C*vT&~{UUW>(Y8dcST!C-H1uib7RKYo1t4AE#*sZ_>dv3PagXf)c^ z*5>rb{H6(Z|HdK@7qGAqpV`2A>ajHOK&B0HPSAgj4Vw1l=)KCGk`Mb|{!DUi1|cQNsNp zNLGPI1T7N+B!WKzDpPErnM<jL%0-FF)1PFXGPyvVl*iV^Y1b6}D05TvTVIl%T5<((yvMA6Xp}MbL zd@#Xxj1j6CfDjB9g&cay4TixafanHR7X{!cKnOq*LCzjaE_VAs7n8uiIHT?euQOB1 z#E(W01916>SuFy9BOn@;3JJntU>RTq0EkeKBvHZo#Rx+Hc$rKTd6ty`-2G0Y*#KfM zFs49^RdON#CJ0lY6etTAB!HNh$k;du;%M&P`pgY?c;`HL)53-2+27VAw*(0iBsc{v zEiDZV4P|9zr&j^Fp`l^du3cAOeRcc{KA+EQHV1>jc&wk#=UcaK-BEjBpy1m2-jkiQ zh=`*-SH?>F0ssI(5Yp1p6bi+*ZQEK}T3g$sB$LT(HtTe{xK4({>Fn?CcMLj=MniFN zacOC(UY}SGNbs$LB0@o87y%R_28bb`fXytTR02ujm8n1}0hz`y`L5>x0R>4EqXali z<5m-hh(!`bjD&z7JqI9wpCUp)B1l5OFf0Io(s15S7s)AQqF&%M1c3wqGB02?07w!@ zv5<`A7{FSt)W z=7||X3>sSVCICReB#01<61hsF-~q%aAO<4_5JM0KhyoJ=CZRBUGA?`T=69ahlk&3*RI0?|JVAm43C3hh zt-?|BxX{Sw<0!B!YciRpPoJKdnbq0RF)%oAU6s7>g??7EQ`ew z4<<~I;M)d9JYfKU1H=FT3xH_6*JBu7`-q!8!_`|c!;Ty;aeD$$1PIf3#tKi74#{N* z;}N5WV*ybFR0cpXAOJ$+)(ilH0kiQcc69ipm`5X`DG(lZ77zp!Q5MiKK>`*S)rf&Q z+JNO4KpMb20CU{KfZ|bJm}11CA=f$r;D+?_(TI~F0ATTmQ)32Dd@l+B3_?6X7y#4w zC%^(=ihu!-$AwTS0H(mfF{c{>#Ef2$J;C>flLIH{v1(j^vA}V9j06}ST*o#6FaVTe z2%>;!ylW#2yc{rd%y~Ps-T??Rz{wCA9;_TcG!ifdqyogncV~eaI)VjI0q|^m01Sz- zU=9ESV4w&n0Ac{~qYtGY8YCL^wJ!V1?Qd=$Y<3Y6kwt^&-}>wo(<;(*|LdkDNRS}G zw--uBe}qsvN(E#@DMbjzc61?xSeDi4bS%pznM^*PFBl3&A`wa{!!Uv%C>2VzMy=Iq zWwJ!dMS^c76acXpv2?gND;uBW#a|&NZpa`CEIk$(g%OM4_~HeQ8)y_$N-0nRBIOX` zksMImAQ`gMH~@rzA{n9t6A1uO#6#RdK@_q4ur)$}VxR~R4`ldggeau|5~TzIML-Z@ z5Db+N0!BG}Gce*m$89T$S;}kZiCZwnWO!1^9s6ORltB~#QGzJ~f&s@(P(T>Rr_2Zd zD1*?*`6vPo0mN^gVhSt;AQ%`5$K?ev1x({R#ZL%;6LZ=h0K;XtMm|XpU?jur&~t$S zVB&iY^#_&$WswL7$KAUCz)+Tn2O5ruO2h!bFu*Wq=nMeIRzna*NI879_*OJ@F$Dmy z01O&Z&Ov~Hy6!Xd|^Sr6{Zvmaz1-XMOvzg|JLf}CrFSW z!MB00P>+iujD{yzr$(hxeJ#!R1PT7vjMmH1$?u|32M|KT*4ptyhU}41$IkGC@z}^Z zA+H6U=v*3plOEH0!vGW^e0_XnaH(B@V#cZgC8>wC<1hnxixH}9P?R?c=sem*jmH?88L+D@Rdd$OGh?i z6ibR8I~S&iB03akb%O13EE@5c^NpV5g@TitK4R+$RuDqRViboQY$Mw@GBWIhOCP)U z6Sp6;Bu9AQ=;w^t1m9=kUpJ)yC&#sq(G5oSp5fkvMp+RU$%sCDnnwN5;||f|oi;&& z1PKx(I1LaQy<*g8J}v-Czod^VL4xlnCrr)g=x-kf#iQy**@{N_gGQW&o@i0UCwFjM z!wp87DWAJE8fkQ)<5u4>JMe^CLL);NPcR!tuf})6UlgBp9y|S*>n-%S5k*gG_!xH* zzl-BS;h%3{g6}2tq+tQaqf<}n0VgaA(Bo$Ri5-5_YaIWVj@WTHpmC^6esO0*=y>#S zqI)JtkRU;V(}Rwg$2Gc-Yv`aaJa2DrZ)azxy~plwIQ)LUBuO%vOsmxzjmDJJl=SrU zuT%9nL4yB(49%_Rh*zfwq&qeiMvHYi`JEG-SoC;29Re6ura%Y^5H!3zfAXVdG#}S+ zp2^tLFG-RDfk0bZTWf2p+wG>5vK(tP84*H+5K$6)>^;4Gy}iA?nVFf%$;k>uLTop| zw~G_Ywo>F6X zm0@q$khlzD88Kc{0T3VzKt318J66Ku@W@0s(JvDuNRS}G*MUK!tn7{I0 z-EMbNQ&USzizG>LkCs-eRjE`6p-3d+^ZA@Emt)Y;)zuXY2E*ZSPEL+YCOeICV+j)c zf8qp3)QQPOl!{U`j5v%i!=8|pL;)xvI7TST!~>QHB@{+lTtF!qn&%ChL;yo&vX1$? zn320jViLm4iQ|w+k{FGNJi`3QQG);|h?FvMJ^N#OQ-Tl!0LO!YDFJlMs-XZt$%y6* zzl(;iMx!EN3=DJ3;v!;<8M3&549N=;bV53)L}?6$e?UYcaloLFLWUG50YYee5{u#3 zB94?Ww|+33;Q9P~upT846M?}%hiVBR0D7!k!B>D#kSJn7qJ$Z;nh+f}w@ywT96e|d zB_in)BuJ3pdygoJ{r&x?4C)yjpU?Lt_mswn5gel)*VuVnfk2?Wy}hBKL7`9<6%}S? zW-3+ca1{C-p=eanYV@h8si9EF?RFnMag4qAMt0ngM7h5acC6-VFXNkpos{$;ROA8d(?th?KC1K@0uM`G^SoU}sa*+^VcX!bf%w?~ANeRK(aAjH=QB$1LBMJz@P zVupuLJZ5)vO~O&ryH0=t!hjJFf*1*o*Gm4p*3B`+n$b@e1tNkd0K-C}hbBmnAi?(y zK@c)CGb<`8P9yBDudi?0wryX=IX1dl8A4h<@u~;l7#sI)%G=@T<#>S?`#-{xIJdH*J;1i>JUbuRf@rs$_7mUj~ zMU(A2_O5y3M~{96d5eGYe+$l;l%@Z|yZo=?tY5oy!-wmlH4ol9*9y8XW!xtCE+Fx^ z{U{ZimaKGsv|YUF4;M~OWwb=jhU!~Z9k~6`C-!;+6VAEg%<`HW7Ea&*0GJRSkerA6 z?P$@v{mbvDa&3FztxpcDtnX>V?iq{za$arqd6ic0{-qn9c>2SR$o4~#%5xUZzVw%q zCP9W2cT`azE#X~jf4rWXK7Gbz*8XJ=-Sv+*4wLkfg6es5F1~rvR81y!!I49cz3``} zKG>0No~*zBzJI3VS#nhpBQPDikZ;E=zdn$4-B0G8kyj=VmiFS!A3yQto>$j>7Lw^_ z-2BE*=BraoJjWoGAL^;WhBtO?-*nTzJ~47>C6g{+eA{*7GeL`i0jdBgHh83`x&GA` z*S@o>#o_5V^V+}tkSiYluQ{& z_lldITgyp?adnHY{OOG**ctomiEID(fn1v};~*S#DWV#u<&ryoyI}UTLN$OIL|@-0 zpWOfAM|-;WiBXIg5#=rZ^{>yHoS&t0xjHsKf9;>vR{ZGl3+G=x(K7P83byaux8mu$ zUW+cg>z;*E3bOwPKLiQBE_7JBkipTYufKio&wl>o2}gzxKneJqWQ1$Y1>HpUj_GWmSDsHW;O@sAJF5*T1j4>Z;l^%1gDw(*kmI<4do- zy|m@<>|2*yJI{f=e-{^gsE$KF9; zV1;QvfA0FpQp4JJ-+Abr-3-I#T=tJ!&n~IW;2o_SS3LOZR~o??A~{noKKq)x7MBej z*t`ARjj#UYZ<{DW*=POV|DAKrluE;w4u&B8J^MC3bIV^hO}q2)hH7c`vd{#B3qQu|TLjJo6KT7~gEuF>f4>vy@_YK=N0BVD0T z#LX>1hD&pGKfS!z;|~{Qsbj|wMV8~#YBk4mU0q!^n^mLH0Em=$y7zZVgZ|K|n%sS4 z$GTPT>{8TSdscOMS*lL>QaAeb={~xCPs3-fq#GAk>p>+?&YVzprcO%LfRKna`My9Y z1!iE!mQU9nsXw?wfPo@Kn%YD9HOxRyedou|ZB0Mxr?d6W?oG{ZlGId}k#99H06~xk zJLujwU&^ezYrqllqsokY)75!6$~1hs^uun@9?BInGjf>hb4$nhYNq@4ci30`XLWW- zRfxekh;tM-6i9J95ZVc;3$*yxAF8zq6rr=Z7Dc*PI1{d+jryIB4a? zw@p!ddN-Fm%RZkj5iA!qAuS8w#AePw9}O3Wpi;Vd)a>^rjcqvt-_ zvBy&C3Aq249Vfw;=H#$+a!eRL>KSO-w`t|W`8k(Zjo>qYj|qjHZA8c-5{J?7Q|)-6 zgE5UR3P5>I;5i`@+&ydYe6KPqjq&QSCLAU#i&*w^ZnDoOlTi=}jYtxMVt``)?hWt$ z`=d@#o<9AWVmU)8MMw&TLLL1~vH2^00F(l4UGwiP0eyPb+)3kfU)Erwltv_XcSEyg zzS|cYnZ_A#*?8#6K| zUT~diApSDkxx1;U=~E%k%ysWtaj>n|F!$<3DWrYp$M5X1vPq^CtpIHH)e9>T_z$&o z3~YLNdF7uMIa#e%$6a!S5GqL+(ImZ~ z6tG&sM5EDIEOzW)hG9%5)8N2BFcADI4R-Xj*_)3lCjb1#tINUq&50d4d-m_#{B~!~ zqQ&DhppvI%Ri$QCePdTo@Qpzc4M-M?!VE@x07;<08ss{>zo~mYjQj1a*W?Pl^{z*^ zcJ6z(ZSq}4U|3Oz^tIW$_j<~W@k}}u+eaOb_v8%h!g=rNl+eZ+}fy9 z&YF7l^)-dg?Y=keY_iWR4yKu85@3b^i^J`E4!FI1<<+-beukp?^@jUf{g(Pb-Fd(O zWq`;i6Vh5rtIwT!VV0Z^u8sX_-GQb9tx#(Plsx&|5(T5v**kYH|LpI(n(v&Qid1P5 z#KlD90}UISoSjKCe{#)*HoAA&?!O)JWbJU*UR`~~H8miU2xYw8Th?!CBmRr(GOcPv zfC0h)2F!}AEVXLlnb$0ut{L=fx8L^ny@zu%yQ)h~h{IA!8gvfWJ9c%1N=k>uJa#v= z+FMsSwOJIjWc0d%3BHXSe~3_s2e~2!0p`4&_9G2%beVp$=tngs&K&G^bvyPU41n>F zstO)HY()Om$+NE$R1jr~it^bM0L7#j0uXp~LIXw~dt6Os2%bRh6mUgc_ z>@F~B^zyhAY833-Hur|RgM8-Lb@UP>`2T@m%FH%p-aHuqfKpfEYWdo*9G^8kFTCdY zmYB~v^_H7wSYs{PZNEEcZ`{{wnVXzjdj8D99Lk34KX`h>viJ6M;|0ld;K2R^jXqW8 zS=ZfIZ9Kh}NQk41wIn&xbF_JTYEh{rjZauu3I0cnwOTNCJ+9I4cs*iF)a&&e$5Bct zrIIB1f{}ek`=9%$&Fv4*tudzs-AOrw{&So;1lGH4v)Zg1= zcZC8GiDfyW&B#w;!}fs=drw!y$sgQvFq$$xMFz2udoZj{PuI#Qh#`-o&))Bf5Cj0~ zq;#Xvs1qoXB0bGLNRC1x^>{o0pfKko8x(5!SNnJqd@~?~04!CP-Cf1(UH$y(Rl9;= z3I-&g&bHoYxNXwx0#;(dT3VaZ%=Uk>FMz8FAeQfM?TbX)iq5(>3A1d8&Hw;Fh`>>^ z$*S^bvA~!y4@IQ_pa2Q0R4U#`^^8I$0k919xPraCyGky)Dj961Jew&m9{>PYY*K5r z3KK62Kl19l=MZoLz`|Tm2AXN)3dzV^U z08rT(GtEbv{6`MCpg=AI00yIQTYKBUhW4CA)6Nuh-k<<1*7^zMcWhE7gW17E=n;ZEqWN`vXylVOU*iVUn7Y zqp;sS*wNh|AqW_`KFMY?Yh?_e_)`$Y?1%O&dvjav?Q74OWGylQ05A*#=1Jvd002pn zNYL5V*&B#R6sSU>)FkIyloZpb%i#<d;vVen8}!5=+=l(l zmQ+J_ehQ1bqu=wgc1N`O3gKDl>$qnL9e~V zt}rUx{%|lD#Bncs;)9Hf2U^E&%>1>$v z+4p|>w=-VOy)F0c^_#YDZ`5RrpYYSSpI_9z=7GOF^U|s<5^xtT`}AiY{PF6EXC$|` zu72*i%OBs5qzFOfXWw$!FCM#dB1O=!{I@S}+quV)sd;Zz>XTb$_dT}GKj`PCC9V6# zKX(I6zV*39l^R|BA1`@)4*=v|^588$y5_c7CPK*GXD|8VD+gCLNsK9vz2M<(zhHL# z>F-Z3`E-i}%mp7jwD8dvf0mxSzv2C-JM!Lm>he^i_iS7L?7x2V$9E1%001*?edgvL zU9+$x0I>P_%l<7DbB7|mZ@s$_V`kiK@Bi`YiD#8+zxtPz;G2XZpomgQf)EQ)r;|p5 z#mUL>xF)^Ph)|L>2JXc&)!*R;5;v7gh;~d3i7q@KV zu8WH505BccwzH$x9=`tEnTKCF^ySZ!;9CpL$V^UFOx*SO!%NSwE*5ICRL3?k0~_9X z=+Q@>`1BCSDLwyzckjA%fy%S~}EKmtOVWJ(Gz_V3>~e8$RA} z9cRS^roABHSyr%=im8y$6$xJg5C1z-!J<8 z=3m3IyWVQ(KHP28Y}sA%*w%Yzb6Y-o_{oPJS#g*k0GNBvTmN_E`Df*x>eExCq@9@XbhuDkW6|17qdHMnQf%dh|I7r*%k0RTDU-urI2^8O3+ zkQ9O5cb~fL(Iubmld|)RuD(9?;ZO2@d-oX^&#sg8`;RWU_maP@Yxg>t!irhf|9!=e zYhc$qzkGgo(;<73ZbN~#m@=gN_P_o1x@#8X8@_s` z4M~|dJ^a_hz0FU5I_1el$s;#WO3}cICBJ;~+4nYehz!Qe!hdZ4*?DD?Y<>L)K7Mf8 zbGf(WzPD-HwrxjLX=N3+Eq(TKYqnWV0?ln}p1<+3f9?hdqe*jby7|6;F0T78d|C;< zw@~^OeOzPZaUFvYLI{y0DelM$MhU|(EX!hy2_f;cG>q{Vi-CyYu(bO>UFTkZ>*7b0 zNB3@9f5#Iq)}L`j&9835h8*ki{@g#`y|A<(-`2nD{iPo)*<1L}O}{H8`ta^8YYuJu z=O5lq|J4~5i9(B0Wig&{>$YE~rsZ_LD|Kz$8b2%^^Z-P z1l;iapFeEfwr<;@X$uM&JmI>R|9);b6tZ_7-TUf2|JiiWZzlZojvLGwmUjkn|9tmZ zd6`9-_5*u&5kde!gnb`8wdAu#%~}82^lS-$ea)Ni?AZ7sHvH_oSxI699bPjysq~!7 zH{JX*y65Ga-uQG&g{`2ZJUg+#_w5Ezz?6z24I>GN#DX~be&XS6YokqGP30vgBu@q$ z-TRi@c6j-@{!dg7w#k3cAU{sW6<)f7vu9h8#c@Vr3VjsqV)cKd5hP;}vi3ufLlIX8Yy=c>Q` z>+SU`y7a~=7q9r)r1EqPZKZVhKsrX$@z8aNvteh;p_b63b8Rwa%srz4kL!~cR;#Sz z^U`w+7(4&~gel0+U*&VQZrTggWfD7ZpxMh0a%E>GqZXV9Df~WwAT@vTH9vnd_njqo z{N`$sJmW{_Tz1340)n97?FUzO%Vzv^=^x7V0eW!h@_y&e1F>9i#h{}t^>4p_EW0$e zZFg(yBU^XeR$Z1xh4Y4KG#GiLo-M9}c| z-*<+0Z`m}}G@jr2;!mD%7hLi4tEX0}ItF(wxd;4e31QUHxp&J;ckL*-_qD6C4JPm2 zPW!;iZ}$|O6~VFgfFdK~>>scHeR7Uft2)(4V7DW%l4bxTu^*HXK{9MA9{b_n&-Bkm1bCXX0 z!%FbI2ca+T<3bQGr8*jdObGY`!C>&1cPox4iVVYW9LF$B+{!wpf*6a%0)c=a2pl_# zd=kc(rD+uv6?JvB)h3G|x~d-9-Zgk_d2PBa%a$gm=_NHqsi2J>*w__pb!E+5P+eyO zotS|geJ=a~C`q_8#dAlzElv32A9*X=!rED6Jiz3VO~Je}+*C z$lZ3dg$eKlXP#ACW2MMru^+sz-go5C0L)4Pg!Jk8Wz`d>))Y~c(Np%H&9VLgM?lI} zCEU;7YT`aFhCwXP#^~5{`nKJjdUeD$q4HQtp%m#oxOwv@OE&~BK4a#T+5)qTftXCG zE}nDtMb&P%+cmK9wdW4ax&EqZ6RU8vI3j_ris{#Du|96okZ91=xaHL+H#%~Y$Iq;( z$yPFbU$(j)0El7g+WlbzVKS#&TrgXdL>zd$q3L#+EF;e})a9^ePyNw>4m$3lA5~JI z*t6Bus&0^#7S=9$R41!SF)9d_w3d{rbFShXBpS5uUGc_X+nE=fQ=vz)%!#%0Y`Shw zINbQgzxLY~U0s(_Q+r10?h&l}PU z>gJs%N_qQsZEN1V`h_TW<+ZbuS`IeuT;GRv{p~yCBG5UI11AeLg|H_{(#u%kupOrj$a&2vrrqsLlz-s5-rgqQeh2;ent%W8h7Znv2rx1(@P@O3? zx2&eDx`c(nk6MokVs3uzyxLk5!2w}T8Tqk@`UP%b#+CR8a;$u zMgQ5=*B1#`6#AIU*Rt(}5B6cwzpr61#X8RA3n8&>o42&MvUc9gnp`HiS8<^5>2(4F z*z0w79oo2id+-BQt4R>Tc2`W;Upy^3I|@{%O(`g=DVtD{u(p0!U{AxIU`kY*IU|)j zR_AVXsb@_ZgXZPwCUu>Ft&81Z_%9{(aQzy-xUY(|rvRZTQYYrXkbirv^ zTFx9qC~Mw zYoSzjs+D`{3kHK0PMwr&280mkGIOoU6saz0|U2)Bg=T9B4b?o2x!Mb+riiNrkHQC)^)0}D>hcHG! zqRy_ShPCVV_ezSAb82d8D%0f*!)P=bZ!j8&NB}?x@p(LQxm+e2ZQw)#!2=&|Xcg7P zbFaDK=IbwAFdc2&xVz~<_i=riVDo3Y8++}#iI?7d^UXKka+bBHt7-q5PC=hP>4tME zv(0jh5vNZ}sk`W=n{K*k{y0nUz@hpz^>$1tRpw4PW8oD)zI^^gCAf9ND?5+$^e|}! z<7*esF4760QmG_K3IqZ}7YYP;!Yh@^_{(tnju@+w=T&6uNB7djJe_lNBwhQpJDGT5 zb7I@JZQD*~V%xTD+sFw)OS%{?_{XzwXt2R@FME`c&Qb-q-fsN8LMoX`ao~ z)XoNK#3%fgnxJVWvmA4;wX)gxns-AgW{IsRSxB+(wAD5INpZGx1U>-YQLp|#4?U}NMr zx0c95KPWjf#DWt6aLsGuCt8%nTELr~Ze1XRhYDGTX*7z$FspH~uQ zsRM{W{$H6|hhLD<^?jd5cQ(->dBGcL4yOf$*rjc9rZx^`n8+e4OLRe=!0Q9P6vk*X z1xBjstW4C6>!t0q&prS+K#t_kJ}hdqLOCloKnu)PcB1J+hXOl7>gRGS=wgOy20!r1 z999V+Fcy@`6Cy*6B7#?pV1n+bbBx!xz)|r+)PeRI|fJ z4BxpL#f~n*=4}5(0-$vqaKy)or~i$uDg&w<&mOyT;Y$=N7e3<#1;Y=S{)+O8$E$#o zV#9_D%@MAZ5Uq67Ih8ZUa`kz>()@-Y*uO`ajy{gp#s}&LKa|ImnrWx)gOlOjhf`Cb zglyFzixt6z@}O`%Z-sydh?Llcpo#=S8nyDI5&W~Uz8$`GVcP_i?j9v&zQ>5!7#Lpd zSHCQ55*LF9(Qjzf3Z5&gfxyMi$>Ha4(kW7GR5vy_-~MpaRd~$4ysiAWPsphMnkxjw z6D;35$BJ$rNx7fpO<&b>>3GhfS(dT>i6pI? z1Bis`m3)F=TaK9^GYz=*ag&hV?;C^*hZZ8(pb7Y`KH z3G!1|FT%o?rhrrKGyk2cbQLF@FLvn94ha&@Bm$LD*WpEP&S_=8T(HGO1nQf21hMy; zRN=jxoy^?FwoQ?ualk{eH@YBKGIH%As!v?51P7Q@lUXGg+eYV>PPxBZY#K``Y~80QnJ6i%zY(W=<`5O;qH2-$L$Cd(cU+T3Zm}AyoF30F zQW_6fWt_t~qd8d;Ob9Z3cqngQFJZ{3Jmo2-Kve#Psy??w7$xGpl#& z%9w&^WL!8hCt8s5BmZnnpF5JKq~S`P93AI&9YaJ4JIZM>qftaa{x&YepH2?gdB@Bn ziBf-d9sk&Iq@LQ=c;nFN)T-_pc01s8h@kVfahyNaY;c>ekSXQm*~DN|@K1*~*~Lth z+-+>xcWV+9$IkuD*kBVCpAwS#gH>u&6F44qan6{L7 zK)pQ@*qu{GsBkq{Vjy&?I2x`-^~?2~q{heJL#}5-zNho2FZ8#YO{6#8vnRK6 z=jv7-o4A_ICf;*L)IIJw=f49BipQE5RMR7i(u`yo;cC(9t+ao9jh=Q3zx(zGlnQ3> z7XJIbf{Y@9jaNQ96@&1@*ZaiAZK1`iGly`-sU)Q-H+LFSe!z}HY_l=WKL3K4e_J)r zd2V~MaHgikMcL&1fj0|Z@&aD@x@RqC{r1=6g*?IqmtDJi@55fWvSmGlTJ`eDAh!2a zt-1U(fnnu8*`O=ph!L^%&RPK(vZNBi%kav|Hc>Zg|HU68c*43Gd{~$!T|TY@{lFax zC=yhF{e{)j#adc&Dx{wL^mCoXVc7%WlelTg{*XE0sTorr(f<9$?=d;*!)X5(=T+KS zhd+A#c*JCqRHWR=Yj!|8{snls-+?@aAAgIRDo9G1+^6OP5ukFnA?w&@d$upGbDDze zf*^(p8gDz0acS92?mz4~blu$2M)w`8{;2BckR*@q!RiAF(wtKUX#!)j4MGyM=vH66f@+;ESJWoWB9 zP39N6H9tXm0m4ZQt5|OG2u))OnT7i^y(d-wx(WN7 z_J5b!5GA!8oYP|Ev9_m>(bZj1zyp|4RHeFzc>fVmTg=g~43uKF>X!YP7VFKgy| z?vpn!71pWKCO2KN>!`-zXa@J{$Iam@r4Ih_`Xl-`B z$5F0wJV2R>)vlC$T{1S?z`=bGyoIH*MwpL~Yj&<7X>79H2!e-1S$-V7-&xABqsW;G zy>?|yQAq-yaY@X_66`B_Z_94T9yW_^!4ZU>?`Kp0Zb&o zUVQOUiqnHq*Q0H})zkYw<#|?r(Ln>sUd!+pCMvm396R%58S=;YKGGiEe`cMlL>c{F zL_q75Q1_VG`Q-E1@n+n4&ZkV(Dr8pZ{}`^Win7RU$Nrnz|M76%oPUTSVYj_0{T=hm zRr#~gG?7?W@OU+!FZ=F_Tv5RBno1+N5bnH6|EHeF}>DX`XOV#)BIUx4);#l z4<;%_j0j;ki=`i4eV*g|Sn@BF$=Wuq;deI30S0v$K8y9UZ-?26+b`RKDy;G+?28l9 zy^yMMstdHB%p;E-{`hV8<8b3NQykSi3lPp;FFPaY6B*@a3I^{5w0&2mO)etQc5m{L zp>OhWtvOI%@TMLv2#)c6sK~Qbox*aqtu=nj?+pl3W-_M6Rr?rcsGlaX?DOK;eqW>2 zwO9GQ>=Tky@pX@Pl49o5tI0HJYRsIj>*N%nm(fiejA~iMVo%<`^Q1C8joHU~;%XW0LHdY=p8q}Mfz}CqLySGU*5@1aQ3jjS8!iAo@c`L@} znrAL7sPr1lHqil;st%Q2f(&uhmaVD9XwBujpMM4y{!W+zqs@}jUS#mo15z>nIZ)#^ z{gIB(mKhmUIxvQglgj@6fb+Ze764+h#uJT(Mnz31F-6n&fjm?#wJ5%w`R==6n#y1T znUUWnq~-@#`OsO3PU%WU9QZ4Ev$T@P+9qT>%(~kzi^F4b>%+z6W8HUYiy{+syPNaO zu^Jg$C$QnM3|&?Ito)LJ5E(R!uOmr01&1zFCS@hBck>`1BNt2xb#-2iCc0&51}tD# zt?L|i8OyPqj9o=0S+*=Ct>R#i6j(P&*SV5lFK`qKZoCPZZfK}%FUa6pI7!1eA-~wj z%BWp)nT%ZcJ0mIEFw;1h(4b3`oN*58kZ_h}x2bHpL+a_tX|>UPN&3XvlSZO)Cado+ zxT}HRMnS>Cu^f)3+3*bvRS*|l>Qs+v?Rc9OHi+WZH8rt@B|eq9e<3hMYkf2&Esj}x z>tO?@vT<8=OsA$Zoyq_hz)_`0HP3!94(z>G&Q(e^IardDIP94$%2bd64Ct^`TIrSP z(9bVLCSy&gyz!v~L8J-ekc~f%5ixTt+f$V4J!DMCA?(9eT|w zVKBQ)X44(!#0rYiZ+ZZzVLp=5MPPqe2J3@s9LOjlJ5JQz$pN)v^FXS)VJ z@obUMXuF1`MNW-%!e8F73c1F#nV!EqhY$b}Sks9~I{bW7Wk5is&vqvjxw%iYq8T7S znx0-!v8nWo(UWN>sZtJ=3P2K*#F;kReYg#;my@1OVH%(Up)%f*T_0yHU&&L@Gm_@~ z7*rj*X5XtIW5z;EnY~D3o|UsseN0<4BFX?V*o~y5YgZ7iG5sE2E9q&{PB)lBS9jt4 zh02tXI%Ur8DUF#44?isKT-OhFbq*r|n}(CrOerVBN(B?N)YN%=GHD{s^Ou>JZU2uf zq(<6I|II?p%4vc^UT&eu{8DyEgA8yPTm(jIP)`8(qbVaQ>w_dbq0d7`-#Si%T%5ED z_E^9X%`h>&n5)iK#!BKQ2y$IzyyhE@sBj*;!%U|%yRj@PqftQu&W;Tesf0SuSth*$PhWWpwnP|gaef#(mW_^|q^ zRM>jbcVm$H*B_b!ZUS?$B%nfGe33%G;&>r@6NWic)go?|jjAtbcsPo}^k`|4ki%v)lMW65 z2s5r&V7c7faG1n{uWqJghZphEoen)Niit`4q%vmWNXh5!Bhs!dU=bZjnIv4XolH{k zfROS(H*eBYDobsl0o!1$IzoYK(MQt~b~9t=?q4i?jA69!P{^KIgtT)$BW^f#qK zO(Q$$I;*R$<}G{_`d?P)PCL-h5GcsFuTGPy#{d&lphm+TCki88%-p|ob>p$=z&Y9o zs_O5L#Hxa*V>RgcM1!0#k@7k>oi~jQ2hdf3v6A?lG&$6<^@8#{y%gakk zORG3Uc5-&M(dBw3N$Bgctge}wnra;5E0DithX@sXqa~O>3$k!`6+aFL4Yoe?Qp)m> z@0a>2*^bB6^KkGBQ;`z9H3H=q7tHT`V4czj`^|IJ)wAqn*mLg;ch;-3bg;vMCfCx zBqI#p?WF_#-q-+Bm!^*}x#CH4#iE_s_2s&O`k!@aW9px$w#$;29!w$gWBgE4&A3^X zfUlQ^h6c#pCFwmnPb#_P&`u`p)VXQIq*c4Ju#nW#!xual(C4*$4YCA)F&$xRFqaSn z2Lv~onf-6ba7dDQrGIm`-Lw8yqE~@nB8}?B+Rt-o;>|466RPy%|1+i_Wi|Q{p~NJO zVi<0{?h&emBurZ@o;{fFPna}jP(^}dlt1;jO*^nP_rkdc+tEX`p;#ec0XYHXD{3{zU0F}^Z7|BuW1*!MTQI{Mm2`@bNc6t6wo*zf#S@%nUnLqE&}Hc^p~fXY}O7 zBNu+KLiySC?ogppMM;TRr5Xhd5#_UnFu8I}h!&0@%cDBDkPu2Fm<1TKRFw2Q(;j3< ze0&NvI6OMYi9Srv03HxV$AI#is=@Akx&k5tN1N8A0<#k)01PJ9ghmvixNs|y3MI@q zE>-~I#<%mCR%A>nI0`(GNG5Q2zz7flK8A|<|7URUD-5)zz+!oXMgO4-FvO28f~Ig` zp=j9#6yiJ*&j`9k!7}}h6X&|1>bJgwtbLuG+~VTmmDJRYRyClvt*z|1v7hY@6d*4w z94aHx6tjvF{`?w_vKY*8k+O0TD!|;lroc$c!3qnU2vjUEDpHG54#!6MK!F7_3c!X1 z!vus_F^K?zcCm?!ei!bO0SZv1_KaXEq_kjuQvHg^5G$1ugNuR}5ffoSG{FuCKrbw` zf+vfN#It4wNVr4?qB#JBNXRhJV2J@v*v=pSTkii`S%Y7|f7nn%E#EXc(5|1e8tQz%9*{$wvJbk`0q@>jLatb*(QY@BblMa5i zcXV$JW@MyfW!Wr8%_Bo?u5!#ByHm;0h;+up$VCLg2mz?T=upTazkw-Jd-y0@((S=@ zHi^s&WDZW@O~GNLGQ|xV8LE;=y@R1L(bytbNQA-~QN!U=c0%(yiV@5x$V18qiv*BM z`u7(z2BgT;C|Tg#2RZ(Vz#Q_+w=J-pLjuT{+9Vm&rV;K0s^C6$=lb%`fWo(0w`p{z;$R3qJB0(pHBu98=4s5a zNoA->=KE$i6p2uYVF1c>vN8&b)sR2Xs8Ji-Tf)pVnw5(+zf=0CCI-y18@Y$Mw#oIr zmgve|6Ntf&`h1IZ%O{gY{|+)-r`hc?=WH|bm7Jxp9CK|9G zyD#iNh~;1ss}WwwvX!}8E(ssIKZ5n$2+f(QIX7H*a&z9Arinttg0}}(>H(CpuTcPrSl4!Lc$NBr0;a>N(o)&6<7);_~~g%sIlnBRg(T|Tb- zzOF%9lXJ9g#NL;)&|&hUpiEVUt`B#`izfE~ks&c(Jk5`jI__l*jA&3jU>zY_2TB~; zf&feb=j8PHyfa_lYfErjuw#oJyeQ*p*RALM_pC!TuAv4GaK;|EuDeBvq}%qem>R#S zr~co|^~6v>-;>L6&&_?dEIq%csHv^2t*YwuRIsn{ovQS|YT(gTG?1&is;bIn<^B6- z2gT+k|4Vp~y>92}yzZW*!To9~EfO@iJ#U-f&xaOicJ(2(6@|LWj;~UJE&dDufJE7d zqu1$fPqwPM8Z?HjjV(?6=f)^B;wxYg%<^diNimn__*gd0?g!V2&fsG%@0aV=k~HV1 z>Dq2^-jB90h4vjEw=)bGS^SdeU@9j4J zd-f@Vw%L4hlkM+jp#9(ZZ7soS3cfw&{dijCJJB2>xUcbgui?$t?{e-B$M?r0+`Ru) z@5k|!m5Fq9dMBp9GtzuB9`5&8d97W@0}t=9XnWn}b|KbIA_ zxJ=sIgKp1a5BE>6u8<(!L7XR>)+RbUe+e2$i&KxqeRoBtVUZIr1`cpQ!X#v`0kC~z zadGj%i@#LuKuj5(TskV&fShi-X=Mvfv**e9D+qc;k9SQa5xA)GDo?jLzjAS9x7krc zd-myl{3oKIKGV%rVfI3Po%m&hVgFTaQ#WX`PM(PZ1=o*$Icf}3>qSPMw^!L2x?_UiYC=z+i!QcSo_#vf zh#+)osY{)WdF7s=M5mfW5*Jte&ByIKZ@$1yzz=3H`RlC^FQm)up2txC%1e*W3zA%; z`!-(Frnaq$D)ezhTZAkYmIk_>qxtb1y<$$k*fhx3_i4hfPtMs83O&DV!>jJq7#QLj zpdmCd0Y9_vM7jYGI^a1Te*JESQS%G-_&RB$J>u;yZ;dSpYV1W?_6Hgk1^D+ zwb=VMF%C?7dp$5Vl@0;7o{m2GIEHh8vN97rHV>2B@cSEgYnEHyd3sIFk5wvB=d_grv7>Q(~i8(2c{`TAEjcW`!x%@4#(x8sKbui@vj@lt{Au8TZJa+k`C!t1*#!gkH)`-bc@@*G~!B z%xdT=_`+v_tGgVEl(b3%fRg&&%I+&Ei9vhvQfr!M&jq-J5Dvl%(z#@3w{A z+Z;^xk=$~sLJ8~9+|NbI<`O?cmz|Hcw18Es1#M=DT$kxq;<5InrqOa>{5r$}UBmj& zsWa@N@k|f6)l3h1o{^aOSa-XE9qDSCtj}T@hJZ{|M>s2e%>DsPxht^D#Tzk`IoJwO3WQhEcAP$MBi?yu7IWq$#H8 z6WrMNvw!|FrKhwei`q)j2Tf#Y2n1e1WqBEx+vkdx!5w*g?7BrxTw5zdGK~Q?yqSBiyl1K&&(@4ht$ZVffQHBHm#*ZiCGI#^)I0PH>Nz+M_Jxds;jFixss$c>DQoi0^@%YyVIbY2; z8mrwvu-{EKby+Hw2v`ud0&i26JFDtRx*596qZuZ~88F9usCFBFb|t7nHV|79sm5~! z++TnDEU#L{)s;={U7l{WS2uF->SiJ*$y^H>yAWdGvd2e*mzrARz54n|C%N$0>utv( zlSn6VV%yt0_xBer9v0n|gXjSmqZ1^fCd@LG^Hx?sV6>P5V#vVQ@zsT`mZz4w+3CL% zcb?oJnR>=Nc52$qX6Lg$diii4hp()3jY!sV%q+XxhU#+j{gDp`fQYn;j^9y7eHH}6$^C$Ip9Y7#-g{y!AR zB01h^S2nH>9tp164Me7mfZ;m|{1ky!5xp{sBvdg8ai^w%XZRDiz)+*9$ul;x@XXsCDIL|L6BSR2U{_}vA((FhVL0Wl`)%<=^t8&eK!e!7jdg=L~+H z4YXt#$FJO>U)u>>HPlW~M95487ZxsHY>sEg_Gu%Z;BUyfWA#tTq<0lTy3I`~=|~EqmyjC+Na(C-zXHGv`jM#@KQ_ z{1;okyk0Lju335Z^lH|vm>60q=!sUAL$ATLZr%B}J#@W~JxOMvhi709$qu|>DRmhI_S$8Ce*$G=CmTXvR3PNHZU+@$wALz zZinYLm{E=84@PH3iv@J*-CvHXbeM}|SY}5Uv7Eea3>z*5y`3A3Py!P$X_|CYqV~G$ zIl`7oBfR+QUCooze~bkk8+N6<-vg60IC_~VhukJ~Xk>~P^b&X4+6t?cG_9o5nAPCk zbTzM1Zx@q!4=eMCIq&}##)fCFXW^rcz{}*b+2+uTM{o7oL$9_|eUGipb!*?4wxyFE zUM#Z&)t?}{9^3IZTbsiH08;`@oeW-LRauxorL(wNXdSN{qE$R+r;aiPQ%`FfovJtl zWy{Gd5DU8}L?xG)+;X9YgrEZv$bIhC9n9kAsHECmKqpR}&RpJ=3$a7n1MQVFsL=LW zMuO3Q6ribIB|qH|B)7M4N};2{9){N~X6)nSr7RN^2zPSL&Uef`YsCyXtKph zDZz^op=0{f`nD)KA!4d|RRE%WP`keFX{$P=&;$lXjBYJ984n3?0z{x>jg8gS;dI|1vkc4G^K%pn2@nC z#l(UG4S*jGn*Mi&05wbn35EWP5JwhpU*c7gOZY< zU)Y2W+wx<|`+h7fwwwE`ua|y5X%a39-V{(&6e98)s6M|&wT@phwD4|RlfE) zH_4I)PZsjIPTqrj0tYACZI88-f`2wWmZquLMlw&isd4F?FRKju?r$sw&i0YTnyTx2 zPpe!u*goda5}u*o2>STzsN0XK?z@sVK=l$R-0YRU=YN6%wvkZ6aA%8AvUOv9-hNf` ztBqel*wZE~PX?OAC(-gsAU3u24HtU1^F-^Yc1w~h3@I>iEdDf`+^ z_ie@I*2eY_i}LTJxXWsXq2$o>o}~-iULRpoC`+#Yss=Icfq3;qd4U(ezK?qLGsOEF zoU|Bf*TGQ%+TN>nOGCR%AzmGho||8SnuLfRMe`{wQJslR=bj_MXM}H0k8KJ-2M0^Z zZQtbEdz((Xb8qQu-ymdEu0Q`qB6z*M7=pcDq13^%OH{!CB2t!3ok*dTqiE6Ok(YIC zgAGe=CBeoetTx|qg5vSHPi?oGi+5h6-+oLzC)+r5+=P9{Qah;ZYwA^yN2~thYaj03 z|0O+KVrz4Mp0Jv(0%uYJyjpPo>OI=ey$}xjTfuonbN6s8pQH27xuwSc=G4CuSj)Y% zw*K>)s#@;X9i6NLHEq+x@4VnQ0pGiuaLuQm5n;_EjC_U@ih{DE`CT}$esf9_M%dza zxpBL$1hUHe*dYlW!64n6I7y-v+XNH*WE1=lvIt0}2ZQ8Xb@!JD1F3IQwd3ETrCaaU z^A029`rBC2MevEL-$OLsW!G*}kuy+N=j$rlmePE^-S_sjdiDp+*J#|+>eAKwbK@DD z^^oBYkLqkL>fMsMf|;t!r|ygVEoZ+t^30a2oz>pD?gK>-WZ3KUi*A~cztu(bqa*z6 z>+^ey+EIVtToP4P?jclOPO_ljp5zkWB81y z?W)7hs>eNgqz&xnG10&Ph-zjfm-MR<22y6|N3ldCvl2i;iCRsjRe^dRFwp00{yYZd z>*s)K(Fj2W4;UyacnkL5T;O%JI1Q1*!;1FE>aG8LE*I>te(oEYR@g{78&S9RKn9r9 zks|D6x&KPVpy)N0q7#4$3H#Tl`PrFGd}-Yr6-$S~Z;^%q!2lBgo3Jz(5F5)pe20HlJOTALR>Ptq@8QeyW-)WP1L#5|tACoQi~8zdUBh(c`>H z<3}qulh00Z-t&lQv9I-iuZl#Y)aWN#kD}Oe_j7pn1-SwF9q)qH@qT=0pS7g6uPTf! z`G(G>-e3KhU-BB`?VpdTK;*`IW`T|$V!++T5@ zsy@=nPTJA!qM@knKvS7gXEa_dyJjcB^R)BT&{<~9^96OYF z3UgM*hctRQ$y21m$2_p*$b^7~fQBYa8ga1dt>?L$iH?L1$ zY2OR5=j&u9{gR(kdb81P6lF0bTkv^ud2y!uGRd3J&v=}&T|JW>zd$3NnDY4jZN=|B zxpQ2;`s?%DPjb+F_HwiFp}BVQa+3Fcyo_^u`v5-o_HMDU>1Xm$-3`~<`UZ2zR^nwC zy-KLMCGQUf_yq6q{3~zkv&ReC)w<_tb#FoI?H!*1QRG{QlfdJ3n)?1PLEdfO`#{Jw z?|cu_V!^*fY~~ZGn*4pWpk?j-(eGb)5q^=a$(xJvwLa?LIi>FM!ML;8_kJVz4sUOj zK+=nfytLJ4xwYSZS<`dXs;O~V=YQPxHWNwrQm}{@L$Z0Kd0d|B{$*KxnUVkKxyU~F zgeF5x@uADn_UHl)>X|Dvmb3j?`dDbi%4ctVte4-Kz?n7BME4i$DmTnye>r!@;{dMR zPc0EV7FP>y?{fE!98C9Dv5~9aOgY!P1}7sTSSY{|wLFGyd@Tccj@vX(+ktx8Uyt?^ zt6#0J`_tWeLXOBrtCRepSX;041e1B5?^VC}k@_3V2eyV<>~vfGP8JKBx3^!$!(IvM z>G>@6?t|kMR@^{+Q3zxb7q)f`5mRc*n9F^YF$^&Of#bX3Ufp>sHW0m38szcY@92mO zMgHY6wg<}a_z^EzsC2zaRSlj&g{nz}xZ%kNiTU|_0b*H12-BCcVJX&T!0Yd&a*(Tt@98r$7H?zJB9 zRW&tj#GA&Js#|p7zXe@hJ%#ndYd}JPP1*Tp`VSA|hwzOo(Lp6fbu#5J^R>iP@u5Xk z88G*!r`INI+n@T}j4%M|@0N->{cH1EtFZ&%Fy{H%`t0^9eJWUmsul_u+v%RU3|Ijt z_x-I9Uxvb<{9};_P_mGP7GeO2@X7THIa~k{4UedR;vB|bt$G)aeWO4Ujdas_fK-NM zK)BXjcfGyV&FgK?6EH_#H^Ukk(72AjwMY4>(oBj>@b2+Y?u^;%b)0l;)1u~AB1)F? zxd-{;GzHEC$Os|%_UP*0`waQ8yl-=)$3==$z>iL};nDJBU!9%4EKJe88~tlSoQpX>2*Y;S_i~Su#W6hXs56;$m?v zHeaKEP1apH5OQ_B2RR$+d93nVrq5=%YrC#_Hi73kC#u$s!QArPcbVjkC^wrmXezzP+=;C6^SiZd-(?RF!!=oojzwN^Yq)Z&jzuyg%2RN>iH& z(o(4H_9GF6P|;G+r5+1B``O>EgYMq+->zqONBui~Z7vdQe$8iRr#W~W3LBX85YVI5 z2u@Scm+MGq@Klpb+AQ2OiQLU^XDZt9xOj6bcIonAYTA9ixQY!TeJO?K7|&iVdsC*- z(^XT;CLxTrNCzW^7hB)e#S${C-xGp4Hq2%^tvox^fZ2`WQiOhU>?jw+MKBp2&%=oy zJuKPs81Yn>$W~7%yjdg9{chR6br|765|Ny=uwb@~wUXgN(`V+RY@-XbRP<*20ZcQF z!3o>tN;8KAC?#cP>Tne<(KJAGb$f3O-`?)Qmg3jX3B86oQ`Y{Gf#!kMYREbLW(KML z@S?fwzrNPu?N95$n^-v)?UpTwgjZ z`+S9t9C@Unlq2lciaJ}x#WjRwlfKhpMG!upHx_K4{KVg0dA|vdM(QDsKz4hPTb90~ z1*j+#8^iihDe*`+ZdB-mnnrh7wcw_29J=s;sKlFt80{Tm%4XV_Klvt`uvu@EctoW5 zjzA^^8&@4+0T~rlzG8|syT9x`C4X^h7i2_>sAP80LJP&1WgIgWDRBU@Fj}=Tr7X7K z@?ZlfQ^=)6FgzH9oal`ub0;n*;}kK}Dp}|`gCXiSwNln96WE>Th!Ef^SC^Xk+^5S& zd7j#^rdK-z>$UucBs{T@!OZlesv~y>LUSieK`iJ9BUAt;waV4ASRLV%$QogwL=tu) z$pZCE`d@zpZ~!JTe1r*RBYgRiwXg(q?hX za6_^H3L?bxB@vhXdwL4r%biur<#QAAD6qcy3fQW22}b-X1V{;y!FYVwWD;3&!^4XU z0ZbFLa1p@*W)Z>-c+Pptoo?@0%TKxeL9WsskCJJl@e1q}k6Zk$&0Y0S6%c2GOL$}; z;3KwN$7>@y*fP~(8NOcR7A}^#*vte)(gtZWP@t{!_XC`iO%QHosq*kx+o4_Hx3Vr^8L>_#&^dHW_3kw~oyN2{8Y z{CiM%)RLec$lK*uW*Ad?7{@r7uWw;a4QQ}tXXnP}3D8nHi(!cyDrhPzEzMQ#J6ya7 zc3Li%2Rk3DBd9Os!#(|xA@=k4{$19+jc_Huz=`FrA~Ne1>i;6k(qfTC1~P7&qT}ns zjZ5b%R1a(fwiZ!oRfeRuaY&@8g2bd2PK1oWj5`Y!N^#!hNk9(*X_egaVd9fa0ZUG) z169AJ*dhe$-Qy!gkRfW5pkYMW{y}5VR=Vqj)#r0k4kt-w@Lk`6=0#m#&0R0a8g~_}v0NraLI<#v?^{$>5(}e~gs=K99~2x3Y^@r?D3N z#efS9g%D+?LEvyO=r?_UYJ5$ST^w+~PS*G0SCUy%qAQT%v_kg+W1`Zswc&BZPfI|L zl+oIoq|6s&R4hl;nxK-uJ-4fEf zl1fYk7>ppfneaz{;^RFzD9ey0Mo`Isis2{L)-s{DE!m3bESYp{c5trxYS)NQ?^VfF^PvbRa zoo$gT6%0THJwKwjvP=k5O)0O>MXMjjj@<(YTAd94KnxYo9=?&5rU@nq4wA=8L*TfI zT2LUi_Cf_=ypeIO*86~~XBT@#mBX&;+TZ{s=8=F@?~JhdN}K z@urE^`IRHb6CDu6LSc+;+yn(y8aMU_af6vw%=&#G3|?B1?}u`&GO|ae9({>L>Rm~C zB(b}9v!!FbDtkGFVuMcQ>P2iTZwWpr{Q0^qB^S9MJ+;C9^Vp|bLg_}5WIVm_SOTlx zV2mweHverS`>#9_(1cr5%V|Ge%GSHR+AuU>9+Ed2Kly*0DPH#r-y?tk*1`hxqN0rp zNhv92s_r#zZ{n#k<5aPo>Zw@zzQ(U}xA^4rZ-_B`I+jhPD>M5$>uSK5OUvd-m1<}6 z6u~}`F*r4Id5-$i6ZeNF$!7YYKnxii+6os9`SDFc{lsGIQW+M@=2G+7oPS;~y{q;O z355AcMZ+P;=NAoLQa&zno@4mVX2|dfsje! zGBn)|1E#<`DUMXGhF(7E@cuomNUYr!QOv}v2( zAA$b&i$(^6a9{DgcX9E>TzJ>K%@|ma;%rVSZhr++i#V*b?IBVFP~h}4oRZYFoC{)BOdOSmKINL?nk-pC-h;@2Zx+H z2}L-HD>Vg<40B{NYG}hWV#<^?u#+3-ZFQHIadB~=Ft6(6Amk{T4iX4wd<&O|W6!vK z?6Am@I3%cGkn0~Gk(`X;-+jKoKgxyC;o)lhuC%SI{4ts&Q{T}i%}9dnQqDu>5$8Da zWMS&zKu0QA@Vd*iD&n1+{n2i%ZU}5vzFFt0!Mc%C+^mFruG5GZ*2m-)^2=a}VAw>WZyRsJd4Y+cTk64L*d;!H5^{z*GU7%=^xb!p3Lq-NMaOvw-;^n(aud>Cg?ei0rq1?eCuw{7)fg_?!+*Sh}OB3yqO zy7w(TE7=i?WY_E2(^ZuOhg_T{I}D9vps|(FtfV_%^6O@Pot~A;ix)KF89sN0QDEVFkMj-I?#i0yP#Y?%n3qTTL4UYB=s?wjuEbS1iaHkO?{^jpno z@ORo|i?xvj$z>&}g)4erm~OCsX6AFSqLz+y9Do$?)PkRny4LObISCm?1$}e<0*br- z-`EybRu`HEukr~9NB-#h_SA009?wWGt#_WsXzK99*?Dr(S_UEjwDfC0sNo*+ZL9Xf zDW=~0!MX%LKk3sT6W@FJI1$L?6|D|4;V)ixXg3?kEp*bMhNBL)XbNI(ZH|j--M81c zUw8OW2%}Z^Ue0zw>a1QAq#4P#m<+sEH-=vq1R5BRno|lAO?1t5!LjE(Eo8~mGin)1 zhMnas+;(?GBWRL3aftekx^3%LSsnlp7-q5R#mGV>Lt9&2S`IQEg}5q+pJQoB$=p7U z6`un~rycl_?hfmV2^M+!eB`PS$J{_75qy@E8M;l^`?Gx zsjIBt_1-S)LTk_4+v{VdEicPuS7qcR5SV1G0GTau@hXdy#ZJ%nTU*Rjm z#QND!8mrLZaAahp4-O6a8IF92uS(d}$u+!P!-PN6x zl$4c~Wi%Q;efLq?jFlJbsP~RLrd`C)keojIs@uN)+uJG_ipZx~Vq~;2WcD@JKYPvJ z9(d>vP-smlJg->fHAF&LDXE5J>wEWJw(idtKl0CS#*e@BEKIrZYd1nobS{9mn? zGzI1Pm#x0+2M^CH^3V?snl!UXMm_*bf$;8bud}st|N7duE3baT&^jc7Ha0bX`sKIX z_p7U}z2p9S@BjVQYyYq}R-04&mxr#MmS8gj08rKoAheUFbkhPM!iKbQs)Qf@X34$x zKK+-=?y4I^4&zl1ZCWw6H0PuynM}Ru)}hB=edbRqXS5&$(z0Lv`OeF4Di~_sHd=ty zd7BTsc>m8{sgn_*WZDf6-1@cK&r1w*sBg_}_kDP|QoQmo-pxX#CDu z7hH4g5Pklix6Swk0A2Ba@85Od!kICEhzLwqce7ocXRv)53;a=#CEYUP`tMAY;x5WA zDA0iNihYT|36@ah2Yar(=_d>g$-qvzYSB&Kdi$bej8m?>_YUtvk3IZ@mH&*YpqBmg zr(Y{wb;kK>vnIY^9{c0RV!v6Y&&t7Ys_h;_)x0V9!aqIGdDYLJd-9k6CxhN>TlI(i z-&>kJ|MIIDc;UO>xqRt^Kq%p+UcKa&yVrcZbo^XoNjEL~$@=W%d%ykI1CQVBBnWd_ zY3jHC_G@8YQj*1Z;dlNtvU>G3U+?w07)SQ(i|>5;_j9a_7A6*EB*XzKEt(eC@!}sI z-?a4)m;G|*eJ4v|j43U-`nz8bKJvFe-(3ECgk_w4!~K80_^Nr?WaMK#?l}vlPY-;X zb7x)_r#~eE7G+gZ=~WlKf5+p`KXSn%N$TvyOXDQH=3IstIA=~p&EdM&@4e(j0rD=L zrE-@$fCU|=ng5;pF1qSBkN@zoAH-&5tpf;*kzr=EV`;s<^Rti1BUCyQn;Pyb9gi>Y9Q zq-(!-2q6;rSK(XM-DeCm!VeCeT-VwgBqAu9d*89S+?eNA3)uRrLQWqI}L z)fE*Lryd>|8EI^6Jbd`DTBS)yOfZ>@giv2l^2;1ygm|;sZsG|ce!suHy~F8rs#L&^^lEZ4ECw}?Nzm(xZW@gwG%(^C2{0dkceGW@BAXPS2`QqkxAD1K>vA4g zHgjr@U4;PvDEK{f?mkUhPdnmqM2>_>B-T(88yDgEzTO5Df=~!T8s1cpRje@_{l|~C zYqRDSUXn3YZ;5b}2PBR3b@dN*IfsDd5i9t-o|qUbII^bb2YEkRH`whQ8d2-aS*azQ zR%S6U7!V~GNU*-I->6Qp+h{Nx)-qgg$Iuk^AW3HxPMcbV-OeFrck4h9 z0624Ua=a~8Ers3A>H#i0#ir+^k-@&U&c5ghxY3^Ka5yX)go6W3Eu8~ikx;_(f+?*e z(Z~qm@PNzP;}`PM9RdS1INaag-`qU}0M?Yk#2B4U#ZXESa<|vHS(82{)^diuRrF|Q z%>XeNO|drPDbWcCAvEY}uXgh3DOQtK#Zo!!?`!STCMFuS0sxI3)ubmFO-A+UKAsBy zW5{8jYoN2C(?ux-%4lOOw)pILJpe#xq_?NH+c^{_2mn}9Qi|QEMxp*@k0B=|M#nM? zrj(LMps%%V5XHvE#>QLJlu{Y_opny45%ji1qd;Zk?`>%9ANGV~U|B9UZHmLBQbEu& z+~3^R9evtQYj+GvDGj>X+uHj^LWB~8FxJOsCC6F}8brdfZ}3D@w?8ZcAi-!)O-nVY z0Mkf+pVRM_jj0oC`uZAs`iEVjinpc|B%`6GAz95E>`A7m)nwS+*VEh8Hy9=u7*%{q zy4`A2u@px z7n5M%3HA2Yw>w?lAWs4$eB$Aoj+g!Uw(~BXnS*8Ich)zxkA#3wf;dg|0$nXGQDBXZ zWRsGL@+$+S6p7yU8kdk@GFyz}pMBXs)YsS7);EF>j!l~qZ_#LQczhN|f$Gh+n8eI@ z0|EdDyT>M17+KPD6O0zaC(t7ia&q=)F{qILZQHgr^!odAZaLU@ zX0Sj+rHLi3{Lo%sU}A|&lBAK5k%oqb*4DO2B%)HObUK}0uhVL^JkQIr91I5CZuiK@ zNH`oZn@#EI=~-D>f*^c~%TrMJk0S$wK-K~SKmjNa3|OXtP>2X>9R*!D@qYgJE~KPzC{Q`pj>oe&Kn9LEa>>2%FV5;Ei0zb9*01bWsYG$ z3IXB(F#tdi$db%)Oc+3b0Dw9ohb4kF91j45h=3>>U8*2Vhyg7R092xgML+@(iJ`n8 zfJA^5DF{kF0tE$ye>cI7BUNwRd*}1TtADfliWPZwB{YVDg2MkGpM%6z-|HXDx#hq_ z64%6jT<1{cvMg&hoAdMYRVr0mTbtYM4u?Y?x0~a*Xj)`Zl0;EN2;$=6($muu5)#yE z#pYGviwXmTh3NbN0U*Exh!_z$l?nhj05DpMue651P02`v$Q;&iSOY{25Mp_bNHS(e zXCD!nax%q|4|o-@te{eb0VIekS!@H~BmfBj%M=&@Rs{ew1d=REa)jd%U|C>z01W_O zM#V7@0pI~JCQ)4+q979*6}JEYv51HfIUJ%YBLM(lF(~4ef`Y=o2TCalyPFPdtmzGo zgkhw&t#wO({EE`FG?VGS-8TgV1%)px2+odEJIdJ-7X?Zu^W%!bFpSA$DlILIi;L@M z@963285kJw`Fyf03xZ%Y8Xb0fVp3vCO3G*Q-BM8ad^qzZKrExez~R%1s3;;7Q-nAI z2rz?K9)Lk;RLVio++LUgP5{gR00Y2}EnQH6s9i6@%qh(P#=x>HFo>KItY%Ex7X6Qj z);|8vaWKZfsSx@MrtS&~3JMc}s2B-5kG}W#3;TweT?8YmV7%rRcdnR~WL8#o6ciK` zCWFHG#PG}mlR4B*T>cCk4u{=tr(=wrd6G}pT?K{D141Z5fDkZ10T87CR0hC+SVjOi zW!V7%3j#$z5fA_w03jAL?5HkytQZ3T3D zDIjvHR5n^I1qzfhfDj;{c+?SdtVIf#!JG;K;OK=+_L3_oC@6eVFwYsXFZ}KL3kac< z0w9bq$8*XzMnOSA;T)jJR8|O0WK{@oZXMStrz>KW!v8E|*0W>(LqGu`is)I7^q7;@ z*k7Mat%Sx}IIDFyb!lVlAE&%}Ru=PHPaIC8kk2 z>TpR%+Zoj$pVgPs)nN40{fhXdprD|jprD}eUxA)&CDt$YYbJmnYakQPg#d(o+PrQ$?y%jR{X_Kv8rlC@3f>C@3iW zw?PQVL`o|NU={!nkw6N{EK4xU z0S6>10fi*YNx*OjSU^BTkR!kdfLIwoqQD`*qgpYb0EEaa5I{0QOc)qKfJ&5O5XWEu z07MaBKuD57k}1a!785|+Xn!S9#)5=_MZi)3AOM6SmH;pWfQY~-xq%fF6ciK`6cqkD z5DNHX$0|fXCygZ!0O4@Br>E!8p+h4hBkAdBNl8f-i$$Z+a2y8!q9_J~L9f?0G&I=R z+1c3G==b}lPoJ*W>lICx!WRoFQ4*kx1_4VzmPnYx7!U&#XhZ^b{MC?0Lz$VG85tQin++&x?DcNi-{JO$%d=w_OtY!gYK=zC zGHgd@XHQR0O-)U4aj{0D`L|t=g2HD;!UBo-1j!#_)dI&+N*IKJ0ALBLctQ~XP=pwX z0!INMpd4U5BLc%~001xm@lZz3gaE052LO-(tAL9TF^m}@ECXg>T)gnLssa(ue^F20{Tx zAixUw&2FTB&#JroFD6r5XPC4_Js7i)_ZC9$ooy{4unAt50yE{^AULI{$bM>qCq z@)HtLtvZ-g@g?~NT^%*+k91ON?(`{{+3^NEv7+ujiQn1W+SS$NPnt0=#XuP5T<&cO z|651^L`LrVDLtR4+mD_p*lgu+^Su?ZK9Rd?_yXvYc>pOZvh||QT=TDzoVDSOfjE2+j0LXRw zIt}UeSd-i{(!BSCF9AC{^;xC*tg?z&e;D+_K>dN*;kMoZ5HuNS3(^Y(L`5EnVMd3# zY7d@h!zt$C+%zKx#Lvj2rMjl`_=!%eNl4F|Q<$MO>rTJMk*<#B`aQM10AS9ZU6_%O zVm%qmh7jWIZEQY%sCEb_rH;&!wCwzJGawRaKeDx^(=`;3H5zTgvvb_LVd?J?rZah!vtZ(@Vu>H?wnMspq|_ymr_?- zZQF1UwUtdxg3g1LU6Ls_Ej!ntoAi`_i6lv(*1d<^HmhBm2;LLBPV^>~%+8OGx2R7o z78-2pYH6%&Lj`l^B&obT?Ja$SD0y0Wvi@@&jHtKQ*;cous*hN6W)x*-*tP$Ku~^{? z45gIz*X*nINT!%6rCDYK01)h{X>4q)>huC2U>sA*r(|SUHIXoJo>+IN&Fv5CW0T`^ z%BH7k0l?j~udb=BaZo}C$K=f|O1C*opJeq=4*LhYsy6NKNh&GHO-;9rzDI-%HyvyW z5W!wp6sJFT6$%Rf9?+z*3McgA0+`H?tFN!GqoYHX<>KOEtJN9}MHtQ6VYM={ENBHr z9D`D7GMVi5;E^Mh&CShPtu`hm1|fHZ9DVz~t?@s+U_sKn+{pwk5(&5MJ@n?^zx_;G zZ0XHE{+7|6U^IW?3;)CrLV_Nb*Cndr90s1^U~A)!t?zFN%*>x>QDc*07x|@NG+}q$ z2~V)$*|)0R{s_J`eacl1ft4d8gKt*7d+0B(z11NPXOw+yaqHsmfBn2z3?cxB`v<%B zHXii;-y!XWuh|=`-+ATz>W_AJ`8hm&_D^~))L*?U&R?~5+e5D$>pCfBRvFXv)q@ShDykyKqrrp0VG#{otFg z{q2o?wPszm>W=UKj$fHoVAMizaPLe0krRLX*3rDX?=vK3l$a%sKR*2GyBpRuzjf$n zkKUNQ_;>fO&YO{GVA-+9R1OE~Hf?$R^!-tr%7mw+$i+Vk2s zzqg(;evLuEl*h@7ew+IB*~!_l++>y=2-=RXd42n4vEa#q%ebRkU)kx+oW3~W(@R{k zEE7*p^@mSBF*0xF+|)&(BTudV(}yd6`q%GWa#4AbYJ5y4k%6l9@BQPcUu=l^-kT-Y zrqS|ekj0U|i;Mq#qNGYVfF zWGNIJ>1`W1{?cC`apHm{-z&*1LkIv|N8Vcd@|wr?gsd6{VA1N|Sj}l>Zn&fO!zcgr z!tve#moal@>4loCo2Kc&*S7ENx8Gj3wnk(@GA;e-cduW5eyKw>+5Ge@Bxazm^~0xb zx@Z0Q_x|LrYj0SPp;IxGQcN57J^5^nm|AxKlq>Ygin+q)!DN0}h?2>k=!w6h1N{Sj ze;_6%#%8mzEE}Dd#>~J{DvTRh`ibO-Z;yJKH{TH_NC22=KDti+@GbsV8)}NQTi^cSJN-Kw4qbfSQhPYe z2pr`Hn);4C^TAyYtikTBLzXM&fAgN-{zWA)dmb(STYpUONWsi$Q)gy>{g#Wf+#2@S z;pa9z`}^PJoc~9oS;c|KgKxm+-1Pi`;_qKmoY2tGPmNa`JNA&E68FCRy$|c&dc9@N z&3Q)WlYgyFS^3*-&rc24y!Ftm7pgMmsuBm7gMWYK(br$LFD~>arnrY=3Zom zi{eHLU>Hjf zd2+1n)VEj6TXg+5EAG5zrmAP~^{?NwYrWlS%(}*oF)uMw(z^C^bWGhlm^a=@1Z|zQ z2i|$AJ}6E3k3Sg-p9_q?+g1JgUAJ#2{PB@Y{12&JkQ2>Jg-8^}K$py(}XqVVZU9ZNW815ANIiW(yc%06=Y?b-}kP&L@=P z=;x_ol5xY%EgLs)rdK|E;Ky@_UDLez(Z6k6=gWTb_tz#;4X+G~UvYecjay#*-VJ|C zT$RwRU6Ob5TR%M9VxBVVo45Vxdldu$=6DWpZ)Z!*AMfRF-|)(ef}!SrzW?sC&%Cy% z2> zD0~bi6Ba1KpG?O!GBP5GqQznn1OXvLDJ6vXef|TD1KV~vJ%PydJl)(9t0;<*NF@5V zBuTNcF+Dv!!C>$cbeU2@3_O#Po~kxzD8qbSpLI$lNs|3Cr9delggA}^B?8=+3xp7m z`1#j;CrcID_}c!CSN#$I0bttNnpMN?Gm39f2^Lks@7WyWWisIIckfZL|!-mS4}V9u&l@4puwscRZpl3phF&45Q`S8e4;|eHBX< z?j5nCiTzO({+EzK-7N<;zWAE$>%U(zx1`Lb(eOy%g_+;@1{)j8kH&%dPqq&%&+{6M z#vGHLbHT+6U*6u|zM#7>#ccf7%X$R!=deHgm_*#p?&@8>(i?3yo0ajo05HaxF}SH~ zu&K>I%{prQL>o@DFhYA-+2SUo#SsZH9QR+avS6qf9gDM5d4q;vJ|am{I2=A#d@Y5q z5L#pEg3JE+;WSnM&L17;kUV}MjNiDEyb0MC6*# zk8ASsKA%q}ve9T{7={o+2$5yk7m|jY{%t3m!^2e2((-(rcnSz1i^bAV-w+Om&!~-q z;i0CM%}?wx&yTBVXld_us?G7q^KZVabfoRQ*FRXhWmk8g_R$}PR^E2W%+x&nNKf6N z7hm1nPcWe*E`N5};>#AMQUq;#Ua#!z?DU$n4Gp?Wzm@0R)8Gw?sw7kOx=sBAXUx5# zG)XOVY)-fr&ARP9f#bjX zLG|p5@0c5-9cn+m)91M9(o!>0``fDaZ(q0ZsFNT7$eep+MMXuaEey2v!^ie8R;Di; zI(DKS0L9P0?fmkz{5Zw_>5B+L2pGXsFw@91^d)Kr`LGnBgeAU#R;}9=EL@hUW<@zM zCtZ8UIlQx~TV8JCfrJLDydhO%)}lNX0Gne}5Q8WI2EY&uI%FEdsEh!D)f#3%FboWd zJl~sc$9gJ&j0gimZnf(Kl-)GjN;QW4O6{Ow0Ra-JDd=+;!y$Dz5(;~Iv|^tr#f*%`lcN;k z6JkxrJ;TF8ewpF=hq{wlTTC3+;XHKY4~L95oIfo$L9bFl^ch9nT|*Y$Z%WRQSr+S! zQH!ZzZ_w3SIX&+JgC?f`*rA%v^*u4SUs1-lwGqZ`Tj=L-L;gxmX@+js0uD!P42UZP3E0{}2AV@^*4078blt7~??e2B~8s(N&p z)21z&7ia7_{PJ^KT797~L6+o#lJjp}o-VU6aANDBre>0G#RVlMU}%4IGyd|GQ%s!) zo;%=HBV<7}oA)?ngZLoYwKrNtWz6J$=x zFI{=tqBKyC4U&{nLRz*ye;}kwOI|V~Uk?By)gQjGx3acw7^zh1!b@(CXvAE9YD5w;f)$d3$@L=D{D; zR9tcMlANMs#Xsh&46D|g6Q|BiA_p3b4Z{F1YE?DjcMsL<-q~=t|A+<0&Aavd^0d^E zfsw&Jb-^;DhF2rC&2CFd)>qcG1r|?9hz>cDh>$xnY!w)zTK|a!CWMe_%K60&yTy+6 zZy(KEU1B`-D5VsQ9NqB2j{QeETtE@RMHhc}PGLft$u-j2y5X^%vGZfAo4VS%`c$U4 z`1!Y8RjQBGv*33QHXL~Il}%kTM`&vHyz*rim8UDRoWeOFr>9aKXX1QZlNr!O#0aHS z5QM09OP1xRA}bIfE*A`V#h{l;k|fJAAtY*Zh!9e#RFOzTlBF|hlaSBVdt~FoPs)Mi zNDfE(>)o~0@3d!@q$arBexJ`5AR*0w%M*ym(x9{U;I{YQ+;IdMY=jLD^tr;$P<-M| z)01?)wHw~rab!@QGlLB#`bpRE4ewSpdf9p9MyGSwd7^2U)Fvlqv)%pu{j|Skf4gpw z#!ksBG6IDCZqIQ4U|%2*>8v`yF3p)891i;Ze!m=0^$)v;BOc-$t~|K?rH-77FU!*n z_w0Lb=eqrSn`E7tVZEK(!$vRB#Vt#WQ@0#`=7omLL^dfl($fwDwOjkrt;SW!aS7)L z4WjVh1tCDdV2mgQNtVMPiEa;-!a5_*V_<;8STD(g?$9t$0J*2}h}hd@EMIOK4P6KT zfUs}4`rx}q%;r*uA)6JXa46WbVaE=qHzd1=Vd|1!V&<(^6G@b znem5u4{d(($Yzhnop$T8JV*Q~qZBo!m50;<+0aO z%V%U|Bx}Gu7!7v;zCNEVt1zq3&Hw-e+7BPCZ*T4%3WbEc>u2V~8}vhaYYrcJ=5Wph zmz3%JLo6Gw*N@J$v^t$1$u94h5?c=U*0&6}yoOaXQiaJapv0iRqq>b#Ypq(d3cw8j zV9uVctFLE!b|39qnrf%4ud}+z@AO+PUXrp)b>;^|;eV3Qh$kR+xEa*v5y9FkBp2| zA2sCOX*8S0y27errYzG{uAx2J%8_ZyEffdp_tk~L>X<)Odl;$!Ajl3k@87*+eIS4N z#Zyc{_tCA}w{PE5)$Ro?066@SuEcW9BDcH&hCY2E8|R~H4{QW z8mRi%CC)=zAAT$xxB!z#pugE4s(zy_r#N+vMkDwd zD|dge{y?J(YcS&-JZ@I&r%p{zR~FM1CWq3=k{W-qd|Vh|1Sl#{5ke$Mib`CONQ7Y+ zmSr)7wjLY=!KMZf#nvP&JUdp~^nqVKG&yzAF1Z@&S{TJ_UC zS$}-ux+E~6V;`;Avgys?sZV_HtzzT|?tTB6H(q}0(RUZUbVCLP7!hL<6BmE;!HZ%M zInWNS-X2M!B`-exW9zZMeCHR>Z|E#hee-wE|0D(+PwC3umvw56#{sVoJ1)KOnj5Y_8sW*#>_7kg+C(sOb(^ z%P8tu|Ce99-1yPk+lsz@O)5~Pw?0y_bj}^WUMj$mKQ6rEP|bpZ_E|{<{Mi?+@WlWF z0E-X;pb{ZrBC-fmDWny6h*~x=dRZo(po;>4+|zJG>>Uy2d{0l1jH7~d&@)(FdFcJM z!=*pZ%1w#qz~>(hG_Qa3jeYIr6)Q@o-8m!Q=mugUgtT;bbRFNJn*S3cs3-sdN@)b# zz1=%Lc(qx3NnypDJVSrGhc$zmQ9%%c8cSM()*p@xBUz?|ktt#Ta1f9-6al1Rkt(sU zBH`c@Z*N(5bkJg5^|d$kT&y}8NgeDWWC%g8*F(= zCY_39C58+&w{Cg*ch5CMrrmh^irDjVgg}IlacF1tiSUX!0)%TCTJ-v&rE{lQ#_K@-U?AvjPME4!YxvQ<65=S6TU6$6 z2|8Xo9Hm=gP;W(P|Jz9*;+oq(~$Z4u`|xuqcYMEVC@j zaU8=i7$cTtIF1tpL8Ve*j7LUBG#X7bu;H1FF@k`LSFf6xpYDJ}M{NF-3u%Y1Px5(B z7X@9zZnq_1te86!nN&cmGYX0`mQC;I=m1HQ7?POe$SNxx9e5a$STtk)*KS(oU@2cz zQ4%xrqPXm`QVT)|N@q;BvKfA7?*I@&aOIP~{N~lA<>y~?>x1ti$#u?qMf$r3f>~Vr z)RJOA2$8sDi)W~(CJ%P^697PR{_+{+i)N-_wH{_Iny>chT;7q9kMSEQ{I?(gAX7pp zrI=w@l?r1lBF%_DM5F6s0;RI3V^s_u@l+^s4;o6)> zzkBTkQ*vX00oD+2U;4*&A8gtC-QvvQ1Lt3S>t+{tBavX;FpvYe zT7U6S6F=>{kL;}5y5_->{l#x?-+ie2q}?6v+xYyu#}9;-J+kl6frAHc!H=|Tf9Zqa z+@$mG-ShYBmS@`p287g#vb$g2yLa!=n^Di(f4KJhPrc(rlv3-`dw%-&5BC4#TYs>> zzkI>hf49D&Hg@sy8@}_=uUBPguv$LnG;8>98yD|Oo4+D~o*l!QLd&KXeth?eX%$N@ zx$t)}%P+s^!t=9YPB9luEm;_sn%B7I-L9~FXyY3)FK5hI5`XR%75=B7-XI+B?I5Bb zQT^15F8bM%yWacNO~x2IrU1Z#j#C%SD^H3sX^7h&aFc#!Rav>lW+upxpPE;4{gS$& zA=w>1*CT--y?p-io35H?<9QT+*@`(NGsfc_!VDD!a^lqo?zm}D`J7Acx$D*3AO7s} zrNxQ*5np%^^{URFRid_A2r}d+<(J=Z-m#$}*%z8Xjl+fpf}KZpA6r;jlvh@CGSwt4 zoRSeng}aaK!(tF0t{j}LHBMiY_pxqE&f<&ptiFEJwvLGR;2Te>GvX7cPqE=MEom7N zVS5i8txMNi%2zBloYpJQvBH#j)05&YYV7g&N91mP#jFx_j1?h6eq!GAYtOIoy2PN$ zVIA5Zc>53Edb5AXF9SfdaF1|ad5J#8ia?*2lvf@t>T2HfkC*@S+n3YVeD9LtIT_kd-y}*apFQQg8;yT{Vc)=rZ?t|fz;<-@g=fd+ zC1s}r6^u0Tn#-1q*oDA=i(#l1qq3V<&M3-=rMBegMAYw;J?$Q^tMNd~+CN@Yx_EZk zv}^wF-luld_V#}IzA1b)n8c53LaV~bbzCN+X=rG8XlOVP2ofSkbzGt-N|MAd49{bZ z;~0j;7$JnBO0aM^JUBRHHk;LI^~99|uq;b>kPwG4WqJYN4(P+goCr7)A5MmgHVL;*#D`6fJiBgd&)5I?@6aZvGDW!l}hGQ6m*(&15 zh(F{H1=LziptlW(RG68|0zU9soxkYHtn#c(*$+qne{aJFuXOe4)OWo6qqMlI zoGd`tPt++{$*vQTuGXGlRt^af-0#<`^%_n9K)@gXh5?b2{W2y}(A)RkuOa?cT}Ezl zEW*LG8Rat{YwyYI9GshKk6xea_`x7+Q)T3(>Qoq`qJoO|YDi0M>kY*j+?cuuA!N+>Qi2&FAD~P!NSE!tgct#~5>nMn|aVtz%=R zFZ=rMau*!yuKMNbE8Fug``Lxlb(m5B7%vyoFd0r5N zXt4O<;USydrqzCiMGJ#gulA{eHOJ~9D1z*3YH#x#Ybh+sp}h9fgfAlzKj}WSeORkb zDVsSnw=hxb8)R|hoUy7*W{aj>9PVgq14=2lDvvjE{hq|M)K7Ow3jb|n0Pq485ylJw z4uG-5$LTrO`q%me-ZgZrdH+aw*fKj)6K>zSOODfU2?c5$LVAKh?Aux0)i5g;*VN9yuOn`}F4Gm@o@C2yDPvceJ(pBc>?3 zFn2~#jz)zE0Mf>4vS-1LEqFk12Lpo8_V-u%a#CWm?E(M`gispdkcG;W1yErWh|lYA z^S&V$0$>7tE^ohqXiuH|saWuOynVxNH$s$xd#FzgdO2U0^Uyo@{e4qar_VFgKkV#j zp+G5M4WqJ3}JG#!u`|&roel+?1jj3+Bw7J$p`myhVM+;7VCXVp8JV zT<Nh+_qfhIr5B8Xj;iI#hDOojMbz8d z-`%m}*!1KyPOsN%EMe9>Ff>F6A<)s@G2DNG8Oy#+oWsuUx^6Eb5#p*k(P9rmTvCz* z06^ByL?8LRf{o3SkS8Updm+3ZD?;*X)Ohr^K|Oki1sF~*jRtfbEHNZqkxp2_YU60|xsYaoYe+d^&+qTXI-SNry()6x=E zI9$;yH8X%&~j=`};eBqE5|PB1fZz!PnQ{-Ld`XwA2JaV?5{ECp+u6e)RU^ zZyy+tf@15AmtNoS*3J{d!C;`~{rjI2HR^X9 zZ1sgaq`$GH>*&GolA?Itd1!M-utl3Yw`5vjf`;cms{uJt$C^@0?pT&t_s+WAH8rgW zD5JtwtAT6k@9*#F2NDU;{ylrD(nKL9VRHLLS+Ccr7#(=~P<~O_jCu3s&7EFYoMM=) zyn+HmW3)_iWFkMVlYgIy-EQye>uYXqZfk2xNJzjKOOhl>5~Wnb8Qq&3PI0mT1cDM9YOg)9f6J~W`xPgIbq(r3AY!v8=xnhwwF$T6)YY7L zXRX?zZa&uMzC0(@mSf|i-Ib&ek1Zfm761@R%1kcWF+8yMz2^pOCbjcuE1p_rC`dSI z;G|BUl~!9h)cD~`FV&j>8jgwDgv7Fh$Vly$hh9r9DbGzd4s^9NZ0{A#2q9=~Xw$Ry zsU@S%Sm&RKbJsUdc1nQb7{u;?& z#Goy{D5o@8O(~_gyR}Ls&R}d7`P0SuCYZOxrx(tg7I@{=j62hl(qr_*|4A}SD14zo z$ZSn1Sa{{kqc0rTxz5{LWwns7Kh)&P%FBt!JRdbmz^=K z(9S^L#JwUKn=L(g-aP5ZyKC0gX=2cTv&%i0e)WY}stIi$5T{XF^UuG`@n-$*4KH;K zq!~GmPnotNJ5F!5=h_oG6Z+p;4~ZAX#pT$~m_C|}CS!KlP))0MT8uTpcJhEsbV(Tn zY1w%rYjzY~nj3Gk2)OI)rX|El`YE&Kr}rFc-}k~Z{D~L5&iKdaJ=4hx_`wJwqAST$XAy$SqZSnvS;)h$0d+sdlSTZ;mw!>GPIJXB56P)#%VT zn@_uPv);@KLd~J~-e8JmES}oea$wK4_uU1{F3K}?*1WU1+fr0kk&{ZAcR%~4+LUU{ z%t@K#Nl^H*5?y+0Idr(OY0wpN$%6-LVb;|6jI^W}m6(0KWz)8g-l?+=2OC^&O~rYI zChpL|hE{Jc%j_|X>;V7(LrQU8W@@J6Q!dkEjJ2lBl1o?T?)lm7K+q{;U{%yuJbTF- z`#blpf6><+6Tw6E&HRG7>Dd_;BsEW5k4hDnoReIfd*uD+o=>hdoAd%UBv?}mmreQD zsbv+udQ28J0|1>ZaYaKaOaG+M$?jnR>rYSl6t0<6q&YD09BWm%mm z#+V_S1mF+>){#4B)#V@^x$oDH5gbPGr59a)<2NoXq!fWlA0KNWmeDjRm^UQYEb_TF zV}r3;V+_u`;EIe7p5L*1a;l$Lm)ck_JHBbL$|HA*X8xriM7<)?C z$Wx5d7hHL5guMFjV-Nm@Qj9as|MvHnTrww}L?|&CGwdW*tz!u*v8QgrrxFMiJ`Y$x zC`GV(4TT=#uuSX>=nBh9)u8#toj=?8x;!%P(%=1N^~G7V`Oxu?@)A}j#C5Ch5OVz2)=&iz}Cmx-ftcZVN;?xb;{*eU73H$lJjmu&5u0z$dBrhEi*D6z3YzL z47(ZtfU+SB#%}XKXm-=%j02|G}@<0KkIpy?D{0X;Vx9au{Sk zg;bM1F5WOvyaA#!C&e*#t?KjyvIKFAptI&CnDr`wp-7vcExGcp1;~DW)|6x&L6PWD zi$N`XJOeF-FEYG6Cv(+3PsBfQ`=8%??Aa~=Q0dIsH~)S5)T~t9V1q8!mXWMia{>my zw&a2px7-t~`OZ_%eB=#MM^43x)jz+s%m6ADvZj`IwKYBZ_-|?f*qQUPx%g#?u?C)S zNM=Z)LGJCZfA#)n8v$VMUDr*YSC)ia0c?y*kJA~o0(06Jhp{CwZ`ta519jhh=9%?w zk;bHzpMUEwuA62Am8>yXY_UlZqd-}zGbK7mOpKOMV{OLV@7>$}?LVw}W$pVisP&d5 zKc2VRpf|^)*y59y#~=K;_KEc5_%ze$7taU=i> zTvkf?#ot&Ko4PD1*~Wpa9zUw0DucylOAf>^h{wh$SKU11d-}PD|Mu$-003rv?Xl~P z8A;lhnDiv8mJu*uY>CTRa?6hcHQ)K?Ya0grvMpuWiras6V`(g?8xFkj?%RKP=NLwe z1k1j?D!CvhBPpP}<;U(b3YXbHEvwbBW?Qn_I%@Tqnw}G%lhXair+>F&*-sN}G3r>e zEm<(~gdtjEf<0o^8!(SJO>A0{VAQH6OF*OWB?I$1M~tjD@|Xa{7_}dH_oX-A*eGzxTwG`*4^bHf>(P1$QeF zm%_Q3EFTvt{rj21m81Qw!pH%y&m+n5>eZ_&Dk@Gr>i7HG+S+#Q+C^lVlA00|V?_uP zLO6~SctKDJJkLpzx%W^!2F`|@;5fK2f9Q%nj5rSxfW&ngS zMgT0wjdm##k!6`-SdQZ;CF9+olt_{!M#N|zIG$r!Hfn(x4uu(pWmx8n&Cg_xtni^?v^gNzpOYn%P24m1w=uDNQ6eH zh(JVu5nzllVGxxmktxNL#gqjmg4l?_G(K?m;oOjM&0|3aBh(wlTi6Ih07{W1xW7WW* z)6`1Q{0-3v&J4ryJdY5_vMfu4<2i&tmgGnzLV*GR$MG!7VvM4%RJ~(#q)ouB-7zP& ztqCViCbl)PZQJI=wr$(C&53RM>*qb^ylZ{+qyO~kUbX7(ySuvfzV^B_C$^}k9BA!YffW}%V1`S!xcHwn*WbOF0#m47jv8nzmw8XH~ zkLAtEkMw7blK4$pl-W!ylq{rguEp&_2>|G=2c|ihLg{dco$oh@g>Z6;3g0*ZnAV*(@$}!;41`V97QSQkaiym(F#w^#;!S$LCrL-U;_TvA~~n z@e${{YZ&>8B_Qn6U^-J>R(5%Ea&mRWmL_e|Fs8={kk8pUfAj#}RNC~I|5aI*0r4M| ziX`j|I#Jaz@Fb)yBP`J>?3hx2*{wk=$4v=O_#mVa`;sf{of)`~k_|L)0i+;i8Y8Tu z2O`2rw}O3r$mwo6nx-?n3|L)$Bw)fW42`Tjh#zk|qTeA$GVa6yT=U|~kn0v<^i<>$ z3_LDffFDFQ1Ob+xb_CN8wG6)C1;<8H*`lgs3%V(*d^UaM}$qUQP?LsC=1Q)>Y#(95Kt< zi2Gg0Y}xfFHdsV13OL7S+|#m)vvbvT&uzb=cfC6add#qixUSD}=DY5OjXmm=_5HrA zIT|tK?W7xOi8IW7i7YbGh@)v&=gaD^B!o{NbEj7F8{Cnk1(ZNOA zvJu$eTFhFIQit67Tae)(HmhNza(M&c1hZHUbGd=KO38wE@)fmL5fPf6;6^`;A$tB8 zsRaNqtX8s6R8&;9bk^M5?C%fKvvcecGg~K`ZwXMTAgBIsj9E1K47*AI!KqN9(xA$G zId3j7J=yU$_9rnQP4ySL2u<%`u$|rYnooQ~S6f?KXV7xw{|~#BKtg#yn~F@BVDh~=LO8dKBW%V}? z>WS*eOf$K!_Ic{lsYluWWhQfPlmq(!e&Mu4zj5es75D+*Ai~C!xdrwx!w;aTyK`n= zTrfzW1R#D925Bg1~8ks2j@t#?=sl@1OULGTMP}qmYvRes%skkOI zSwr9zKvhG}mn+>z0mGk0^)(UaGmRVSt;>7D!e~2Mkcf5Qq31}MV572NxTs|l! zC;&|vnuy~P5%`Nm6pi#6 zjE}&jcrx$x>HodXUP-Y6pedt}ena~G@)00d0Izf>)@f>W6DEKdXI;}0ls*6+fJPjt zrY9dO>haMh?!+)^SfcQYMob186p))39ihoD*NnkRiTC-e78bNnNr2wHCtcp~7Wvvr zRrD1{p}Ql>8rrB*C0dXtK+_fy!mZ;3y;IVj+91Ndqo;bD+|y#>ZD^rkl^+hm314_P zF!Bs5f{so8S|*yCD0rUSlEES^eI!y;mvbX2CrARq<#kY$ViCDuf`Kk4!Rm9Cj@I4z zfWPIL>uj0ucGrjV zWVH?S$3&|j1NKaJYMnexd@^ZRR$cyOQ9d~Z{1nDdBOj8g(N2{dX#k2vd<*Tnx5JJ3 znTdkkT{as(ZI|RF%Zl_QfbZO|MGD~GSaxkD*wS7om`}rZRMpinsl$D}b^LzPUuEht zTCT+NWLc1VZ+30|6OGwjxp=_{Q=&s?pUnaM<88@}1L$SCZ#OCrNV9&#iT_4@e}~RT|Q*GsO4^VU9oXKVmbXU zOB-qjDDXIXH3j$4=7}8pS}Q2DPeuA61>{;!ELhTHyk!D;I3%kK*H`5QM^wCWdA*ZC zD7jAMluoz4$-TC=Wu*<+hZZNiualy!yi-hV_3V_B*-vgCkKk{bdfI}xg6p2HQ@sT} zameJ|!NE4w9Cky=a*>xA5%2e19_L{2j)n5)6Dri`|pYtwcD7OUems{NjiB6it3q89{KbqE3wrYt;*>4;D zX=Z&|&u;viM%EzMwY2lkFE@3aJOBRdbWje5!7{1m82AQ(JU@%MdOsfKqPE{onkd0E z9sGjwB@O--$X{qyZTazH&@ip3oCysNn9U~je7^Gb)Wsc^-rK}Yk)9ZJgeGHzuhRT# zZ8qsWWGzlUn9*=I4@U+7`Httyjh0I{;iIkkMBiOwxZ=bjP`zE ze*z#T3Igx2jJ|erZEzb|x_YuRHPu$qG)2@u;eX84rew4)<{)cs{`1)ADcmx$wRU|D zEj!jxG25pYiTq!i>KS`yms0yLiVzuL>k(Y;j&{G;-C_Y01oL0_ z+m^(g3-<@$&mkHb=oXje9jsiHR{BoKdTn=9G8A*JkYT9DeBEdA|jI7xO$%7cGL4A$;qvR^@%0?Vvt#E z*xH)fqKoRv;$vSGh zQ_Zklh;AT*kks%xI$?WJErjCM-Ph!6oB=scv+C&-yjx1#t#YtIYyEk&|B`eYYc!vVlSsxa?*fJxVw%~76)2+ zqJ=|Z%7~04rY|lMj5w`kZ`!f8#7&iQP1zY%S+(AYjV4~XIOKv1)2g2nl* z&i$KzWP5}+YKfYSRFfvD%JLSqwlDu|C@TUd&1k&P^i_LGqfvPIB}gr@=zQ_n({=I3 zwIdSUOqwL+%%WU_?PBa}Z23B|z6tmHI(S?=gEy7i)R|rcns{w(e$FvBzH8q!m}&B8 z`T(M#+hqljnY8!fYrnsw1A$yQIsF)mHf@F1(;b-=9MSjTW4R>Teg9;o!IY#A-cR^? zR2&$yw<*<~5l47Tsnc;;kEugDjD_!gzm17#v(ss6ev7`$Q`19VqUAH8-Ew4!`}A#o zn1et|Uq5K*IdCOY^YIuQ1n~+|%M1>P#VdaJhilnB36x^T0`DC{UHKYM{0Al^fei0N z&>TC0g!4PQt5bWi*YP!9>!SU^?q7l{p43)fi(U8q2_lYMnJl*R^A(>0teal$n6I7P zGeowW*1eFmcn19;o}IR36kD_Nwfnvm2Jbo>`%Jp6SY8(bSi-GV%Ti{R>%Np4YX5P{ z>KDx!|CfCT_R997FU)EX08tP;!A|RSmuYrPPa$oe0jDv&l)1(0coN)Iw@LK!+BdMD z+r#oWn`2|K(}=)cjb7Xt|LQ8cyT|t|*t|eVl7zjbS;ePzy9h-FM_pa=BPUdmrj3gm zq3dp?r!ndCBDAG4m1}75rL&vV*EfI=Mr96|fS19F?zZ zXCxWRN=ZlcedlZUL$C547ZXmsMtbx6l$5*{q@2T6zl)CLo6o-IB?lg`tR$mO{r$zv zd^{9|FitgVSK02fvQ3;dJRLBY4u`3u+Iqv>{7LNrXPpG~bj2N{`gs-XNmDA~?X-2h z^L66wy4yg$QWhtw;NsoXN49rav;MhQlOvaEi|{X?PL2gu+2=){%Bt;OUrNexxEO)@ zt+=6aJzb!Y3!(R&{r9};ce_{e;`@4fi>{mHR1sz+#?9zx7*oMsb%)Q_l;RJNe|i@` z8T|*AR(${fqIkSGl1@F9aD-;;6tZhu>+H6M=G9C>ewqTkTnoWksUb5KadJhyFxrIL zNn$`G6+h!T1_U4$X%z5l6bA_;xL}V!2qvh@4@=JtmIwqIDXDoDn@0hXGFSmAT^cXP z%>Qivv=y2-Z<`1CTVXmsh2yiS1uvV)^EijVa> zviLi4n(5r1-C%!kNyW9QTaFL$MFDs*t)W+mK9JXcDp6!5#Jj=x+TD3VmcnF?sC8G@gY@LL_0}M>^o1ioWUe8`VtTSA$HB#8Jx;l08AwO(z zCVR+0VjWTNTksUjqhYdDY+5sQF~wg;ZeDMahRVtnvPA@1p=N z3K$JyQcmokZwq#`Za;a^S|i%-FG67NMUQ0)CRxl?AsRlXe3l*-%_Ox^BQ5)9Jgz%( zr;Jz!Nw&D$ZhzUBM<_iVr--h~^71wUF^n*Uf^9Q-iMf|QFM4ME35qgL)QtEHZ2xpE z{0tnCByGP%Qf$KkjiuSkOK1jplJXCDIOtkhf2?8vd?*N(AZHc;4-uI9(zh`+ARlWF z2APb6;0LCHhYijsQZkZ?ZX}brK?w?Y^kc*0U1MS~;V~LE0_PfoGz=oUV7tIfrUTpm?gNeAKyMar}eD-h|V8nOST8 z$b~W*{%VzOcsn)mD}tG-kwq&xk^a#+Q=Da*eU)}_Ys+mfiJNeH3|PaS_`AbwjMcZ3 z4Rh@A{QGV${LQ3AyWu@{|2-xNzM7NZ>Kt`p6?kS10SJfdahV%GOp#TVC_EeL*dCEe zk=2aXzpC)M+&JH7h}ltCQ`=ZAuQN8%{hA=8Z|0B&b>refta{%9t7!t|IHHr}$FYQx zeLrBnn!zU>)rY;d?~|;#1~iv5ASmBVOpC!9m7yaTz(pqB_7o^D@Nu z-_fTPe`pyeSHpC9Iuh*M+__({xmVmnX&M9-*nC zjmsyqkL{P27d=Ynr*?p7hM08}0nTarNB(t%`U0m9m~2(D0!P3|iizS;w&}@@2%AlX zwu3P}7@)eGv??&`ZYgCFy7Kxvh_AjM6Z!1))b@HumCtmJrGhT`@A@5aklTL&I9Wg5 zpSpa%DOhkXYr?5@>i*qLFdN{s@V)$9sp#B}g@4*i`)l(#)fD_^s`<*pSm{wA{wb@5 zp>6`+CdQ`N$M-QmH678X+kI4=NX7Z4$W;?0UKMBoy+5Mmwx$K1@9ZtYqcg!MNfI;u zvswH2$DqS^bQ@$;d-#X8{gHh|2IL33Ms`s?ytD0xLly%Y_w)GQpOt8H{yg6wpBtJn z1g8ZWRW{RE&)l+|RO$7!jw-tGZ~%T>UN@U({-jjr>#7FpIU+N~QJ#a}Zu0aUOvKy2 z%58=_DNf@LFE%bgK6j6>;TDjIxN3bhc`%tWTgW(_tQY{|(hJ$DEvf|YMZV9taQH-w z)x$q(s=V);Vl)^5(mhX@m~_*!7dzi?3~YAHtz9z7nL}_ktrP>xoj^I=>(FlkH@+`U z{nz^w-!@CInVai=$jY|&`J?j`mB&@^#L;x5{p$wX*C{4L3}&|LM&OEc)%NW_-S5}C zWiYUOYv+YJ+?q)4JN>0(Feu1D8TO{m&KK^U_9N*Uso)wkXyRmJ>?#EjaCA7JKAoG0 z@YIOQf}mN6O-z(3CnCt9>a5tD+Qle^8o}pk*Xm=*?the=q_>AZ6 zGqS^?xURg@<8D8e>9imrMvaq|B+JM!6t;^EPaH19fd>zrc9_<59WvXykRj#E!lz?` zY!DVXh(t~#S#NpIm!sKZ?AfIo4_eQ1{dBBK&y*zC<5syJ!{^4jKb}9ZwB{LBBh|YDud?PhGirr`jK}ZLJxHDi2>^g;k0!*nBK(6+U!Pgdgy0e4$<8;Qt*Db8AJ@N7 zyR%>6_4%5mEu^0vmEkawv|ylyK}=-STF_Gc0MC`3;7p11Kt~n-?SygV{UCgkbagKHTOFk@%UR1)53QnXZS109m z?Y^(@Y(Dk)xc!NNfpL5@5a{i!`BRA9b6i9;`F*1UvFmvz%UjKGsW4Gn=T9yeB$8Wn zSA&hMwy`SK2I^J2y*`k?Jvl!;HCxjiY6Cd+5e=&q;VA3e1|apt-K_5AfOj{yzg1Vu z4+nr2@KZX*#0l}v%vAx;1++5hbYg(4TyAsH+2ALmo0;oK(i(M;Jv+g50#sq)>ua56 z;^QL&gxZ}5G_w`$bfiA~ZhYefMMa0uyQD;lAtD7C7JLzEJY6F#R=CUM zrZY6^%~T7@O}^L5T^iaN2Gy5|*|B+f{$Nni>!|d#n$~A|+r`=$gx+}zzr8K;mIbrG z2EgV*BI3owBqV`Qi>|S@Z}~JH2C08`f$i_^YM9+b&YuxY0lDL{%jX@Wn(rPJF|NAt z832IyNXwJ+dEuhEhGJK59t?qp_Z|IU1eLk^EGET zd^Q;{8S#f#-q-B1V1^ZUqU6Y&cJb8V$Fj1qH#)Ho<5rFJ~CY zK-!7Bk5#?$`A~&bp{8Z$w(xZ?%Lb4V56UL$OYHufF662XH$eZgRLF|x z3+veC>69x#a4_K+PR-jbtrP*eZo`mS)1<4vFm^@-ntG%i=Rv@MSqEti%n$Ef+tDG> zf0VD04aby=CkMTpyhgXY49tdmkxi!$J^lhuFwLUIl#WZrvIr2FXXQDyG`;PDrdUYg zkeikV4_+~SeHGwIpq_SX3nN(3wQd3{7VNX?-c6IhSbseB1-vMMcbR3%wG>%>4Z*3b zuOr%e8E#c+W@H^355cptvR&4!OuHXspEn?Hyllc*%QQ{)+%5lkiReT4v-E5!n!0$8 zYPQH4hqQNYX~EIxeGF1#{S_I|4-O|v5-z^&|CJprD;~iP8Toa@=BgC{@+Z4^8$`9L z=b;(RV2=qPFDY`(?|Im~)sZQg;>>|)Y-ZTK9D)b9Z$bjA_XE+Y30upLc3f)Ng5 zAggdPobjF|uV06@)fY?W){<6{NL2{G3KL0CbQwZX>J%9mi=>4VBK=R?M8eF#wbRdO zSg~|G@dFPD&D`3OEmSU%d1T?>!AOct&m_$*aZzKU_~jbiUDsWWdTBIjtCn72Oi_#M z=*)Vx`9^Sg2o~sB@$vd|VPYOtS^AGwLeOfapk;2J@prSy3@dh{Nr%#KtV(>%z4hk{ z=TEfm)zL7pq(~$Ka#8sAKrp%~)+W}B07VaXhh(ALM13r_>;9jr#uyvvF_mRsc2z&` zi#lxR8;S~=$ER$0zTQh*opfT+9O>T&piys0#iWlmGi>P@5idW_y^d~4SWZnW^4#F+;{H&ChI2h;P5AunhV@J? zPwmXa?S7APSXlL6Mok>gq&>)X9V*|fPo3T;wDx?i^6x*sYIQL2qTlfGdgu22TuSil zn3h`ReAnIv*-8Y~1lNcob3_O858S@BH`xLOA=h{11{8<2r?X2-!q=sQ4sKPg4y(C~ zC;grcO}mMfYAMhuuOHn1?xR}aRDIvu$!2fHHOp@7^+jyS^6{IGEG(m4J-Vc|B3W7I zcP7*f7qQVXjs9o>@^zETbvmA&r@VugKHE5%BH2N?q8%uQa9|%;@_wdM!|BJ>6VsIP z8_Lntoo>-3mV9q&>UP?32onVr65;kU+8z8rbX=pu^#07hr`^>*Uhmnt?bVZ0@O4Yp zxQP3G>0MlTUekF{p4#5-%3kHIKM?z^C|6ih^>h=8OJnW&*_($Fyo-pVHElie`J4!h zgeD0R!1_vhFX>lBU`Zof5w3$Rc&F5s1;%6d-tb>*a4r_vLyJ}c6vdN`3;cndd_Q6e z;>KApq9zXGMWdlST`HW)D66V~(AgS!!yCJ(;JXVt1tP%&mu`)Lp`o(ao8UX5YhpsR zRmPOXBG9yf$l_w-_R%7z@`w;AF0h==WeVKi>2VU%QxtKKve6J4a1t}Hwt1;g2%zJWF_oTGq!4$!j!!ztQxp);t4Akf=_ zwGTbH_-=VrUUou(MKAXIT;wzpiHiRjVEhY0KgZhA8#%GDKmbK7zc%MuO)uY^3A0jP z7i&^hnJ;hv{~qd|?tMOb-2qXA-EZR+eBW{3Xd^?T40uEo_ZesuLb8ylEQ=+W{!bk=fCxsQ^U^|MUSF+#ud7RhidcKXB zj;*+!jyWycR!SK?-Ji^`=eth3ssg(%;&XalEOA4|N2Yh2_^+}an>voR9zHtjB2Zw9 zwcdOGu7Ljey8kBdIds)@uz7h*#AOaQKRW9$>0imB)L`Rjx_j50`QBGrsiD%WEw=)$ zDEwWjA{PNf_UJD`_=)H;P!9yxTQ*;hF{=&m2B!XpMJvA6(;JGUT+q`GLY^KkWA}38 z%zcVLm|(}>#M7@w?ICd0XB%y(<}(wi%u|ug-o-g8yKrD4nMm+Jhnb2 z`g0zaxkX5$y8AQ6qs6XFAWZTa6@jQ z?1z?gY7E?5Ljq!^aPpyi?aD@nfTd9_q!JSqn4d6%7MhX@9#vL8MI7+X4Vv_5(!6p+ zykr)o2hm}scOniFH!zTN%eAeo8W3Q};#R5{D$WG;)*YBl7V6+WS@bkSHDp=URdUrE zc)mindHom6$tiseMR=jB`)%8b4YUd9)u|y}*PNc_vA_U;LG1kSN91Wni(OZrY>KJc zi9G2UaB*KqL$DBRP4=FSAuJ?Op))5+yllah4T zPd45)aDayO(5946a}Re_0aU%%Rti)MA$+-m^P0K>RD6CuM9pQwxg3j-$o3k#q>@di zg?&?3cg+S&EN3%2+YFQKBcTdU6Ca9w2Xf?4ecd|h?|LhEKGjP0-ZJItM%sJj~Nrda`|ewwBTYm}Q^7U8nljT= zzh2}L4(r!*TengskMr<0@%%^sPZ{bPgTJR|W#;BbF(ui?h7HV7BbnKc+)qJl&AL8Y zlA$KD-ISHV!YD<3E6%9M9D-fz=~&EGfIxi{#b#72MRuq_@Zz~}+o zMU6crTQr3g17CShs7`a<2nD@{VN#M((ivY@(^-63toYK9000}=J003z63{-Z3H#p2 zBj#dCZ(sx>Y58`<8LAuX?@^K(u2ByxYkkiwrA3r7U}74Ud0o|0&(JGM6u_8=i|kHE?V;j+m+w~KFjDkud8Ae9J#9e=$ZzEFXV znuhhGH9f1wFe@U$t4y3i_(_a|OEh|}4*tdXCH7Xy;w zjWs0ooGO^emm3I#6oW!I2$z=@Rl(S=kj>A%yaSD?g_Y*Zb=Q_tM?9qE?JsK;C{0}G zxX#KXLIeJ1sG%@FCiv5~ck^~b2GVZX24ACB@?PW>Pide~o5Y2!lOFM>T@6!o(@i89 ze-&_AtD#GdN|#j<*j%3yfqnIzrQ{%xuU1mK46JD%a!l{qIW@DmJUqkzzyte8L)kNw zb60XQIk2l-X5@Xn9XtLiO6I)|65}|nNyu#skIa03rCU#ZZbwglJ%wn%P(fg@wlw8+ z(>H7(At4f4;@l#lM#OTXoNzSKiA^xC?_Or;e2+Z#Xs#e54W$Yj&M>-mzJbFiIv8zr zkRr!46Kx1mL#(MQA3la2ysU0f z-7WqO8ASguzr6I;=7-LUV*SB`|DIMS$8K?HZp*8~9(lmH;rUPAJ36xAz8(M|(^IBN z>H`MCK5}&>>oW@a{lKXTuM=&?=fQJ{0<_|c;QrF2@Q7EY;LU3#v3;&X{jsz}2?kFR zBwc2H%hq6duW4)TqE4Hfh&E6r$B`!*rGlEV#K}Sy`dP9hT}#)(NX}z(aE8*ZdY}s8yjC58m_fy zTF=zca2uK-Y%QK82KOWn!{F6I55u^!Dfe++iQmNQGvGNcjBmd3{7mcdd9K0bGR|@P z=-T=ETI;FYVrE3KzxKT=e%H~^bnh=H9qo?L^9(2`QmwQ#BhpdldbqOWMR*`r+WSMJ zytE6Z?c*ENtEa1~X=xn7Lwwc_4;aW6lCFKKLd13!Pp~4{b7Qd%0ud2{&wNFM?*-_g zNBCidBeDK66cyv2MIY9AO1NJB{e1s9;=&fM*ExXIOtF5Uy}f-EB75M_9=t46W6e6= z|L`Yk@)n1QWDcNTrvVOmua94W?yk;4W@e~H?dA3kwL~hIsUcHkm5LN%Ak2g$vZlMrQ#kgYTe;18;9Q|Y1bj;G z+Z~9{mthKR8E>`8-xtq&@QgV?5=kZ7_a(=-yM@(X?J`cKW;~x(%Zt2kxIZAjPuaPH z@O8~wWj#jlbj)}Hb2Yrf;iqi(FiH;Z75UZq?`@xaci-<@C~n?}t2#7V>Y0cs1bnak z5r$4tDnBWd$Nqjzj1p1~1&JUd@A<{s#R31X}0LTuZTOo;;4}+lg#7&Lo1d zQo6icCXRlH>3$s|uE4@y-lyG5N?{)Sv)eE`fHxpGy zRezpSB6NE2WP*^)M16L}kvD`9W!&$6Ho`BOIh-A*-pz8ImRFcomX@ZHbn)cX-VT(a7z60d#~Uqe zTW_nzNo#mK^yn;!_0FxtV*2yU{2hd8g-LBk3Lo~vOkQV1NUCbQr?b>{0#)) zdAw_k%`PiPq*2so#8Lw)3&!yro#%5k-@Jg)UUkc`j**P4Y;+7=$IDZo<&MYAToonU zj5y=quM!yNpkg)DTAeP(sT>~-zWuulj90CyDw)ttL98io)#te*o4?a&;bEmc&bCD! z!+VXjzfye;flZ*^)8lt>F|t-)Q!#9m5@4ja_okS~$wwz5Nzcps8M?kNCmpmw1Nw6u z&)tV?3DwUxxSCJ+Rp;<8sdiHDi%Sb7Q<7|B0=V+T%P>e)uw55#SCL;_3dlHcBB!r;L6HT||y0 z;#U(zhXj5PRB8OYtv3>G$}1@ zf|mE1V>NbZNCwjxFtfYRb6&`;Aw)4mO^7HiF-1=kTkEY8?Pt#|WV*C|0pE4!ha{ib}`+hh#r6v}jY&pAMeufH?BZiMT^XfhY z$njpd)B2$(LlH~k#hL5SD+A4B!Y~;l0$(w&37^if|L-X4u^XA%{-_*6>ZgO<^A$V$ z{+_Z@!=Cl}Tup^VxN|p&vCJH8H*NB`|NyuEo>Ljm$utF5CNX=^j-qx@KdK z%>+237gNWd95mEmS$oB zVSw!m8YCj`;Tf>S4VvEPagLlNpflao22|7wf55?EhZT@%6( zP5;_Ix}Kh3+4y@8)r)zzAaz}SxQxOIj?wwi~Rf%A) zy|N9Q(l`Obb?26_nPjJ=CuHg?WN$-6NnjGbK$xui9-Km#Dp9erw!|YFl4r)Hf0biP zAWVFM8LS7~0iSZR_$>;wEOIpI5a#eO54l$66%w{QKgroYq|Ac*jGc4BK9M^fI2aiO%{c@sIN00wGh8X%U7I#mSH6%|CTb?yUtK zQ#^Y=B9a4!*4U=?W+!w^Uj~^w=C9feRHhSO77AX8L(sdt4hA)q?cK4Ns8s~uBX|ij zn)FOWBXgHe)tjiJqcWTo%p-zLsf9m~b7Cem7@4;s$!Z46tjn1HDmDhtO;NmbRS%~_ zri@&=oX?Ldp;%GSwsmT$tJF^dFMTy-7g zL&uL$K@rB7le7~ukxS~bbd_@1?Pt*we`!0@f3$`gi-t*LC}&oR;1ysPF(i3tws+b% z&P7T`VYvOzGx621?r)^)4~rL_4{Av)tN!uhB_?DWQx@_s^MOQ+^Flw&ZzYrx=&=0P z(~+cveP?#ZUF7`I93I&*l8cMhqcj4`5^XoN7Zw)y&=`-3r(5r)MQ(9iYJHyj43nmK zCs!U`lQ*4a9`YYR;qGtu^hf~0B*-md261%WDgs)O8a4eiqD4z-Fc55PMSA0%A3^=# z4QxzG*SC?a9Wfo`izmuE?$7KcMyHd%U&Q)RSjlE4Cb!L_}P; za0^nQgqt;K{1;CTKnfRLUtbUDG$1N2+;Bb8;LHb4`uc>|kK|fkL5m|LwMik9s8Fq` zE-l64Ti*Gothsc?DYG9`R8Nlkjgv1ATd(@Dy0A#6>)L(Rt?3r zLB({hiQ~CO+0B!~U@)p@U=_@Zs6!hRSI@|kmT*UES(RmytAOL7w7zMy1#WDe_u8d;CBe9O~ zZUNN6X8%CIDIs$0TNnh5C5<5Op+Sm>Cj8U@07$AZern(=z`_K;`N97IZotoA6d=h! z43JQh>ixvcSmNSI96w{`fYo(tYw9X0A(ZuNyzH_ijyv7n=gUOrv(ex-}H=UJ6s5Ul%$p7xIeNs~X(T3Jhj&`1( z!*Wr0U(aFC?h})BeRW|b>LYHdfoKGvBL>)Y*S-Dz=qdHbych;nzDhf*`!1W)b*p1w zmNLz^ljiXLDj!Iepuz(DKw==s$il|MKx6CXo-47j^ZoKA+K0g`qSegG_3KP-SW6-4gbKPWfp+Jcf|CBfW6 zMg@T17+I*?*$BB|_s&m`^$%L{L`7ha8_1~P;TW}V%!Cy(wnB!s%uUY@-1$zQ_{0+; zuh->iQxrS^Jd?%#XuhMTi7bw!u=U*cPym_dyNl?5hi#EYVu!=(v+LBfR^J_1Kw`<$08CF_g_vb{bEgA?BKMZI9bg<(A zwkQ^3!0jmxd4Vq$q#p>sA69O`f?^O^EIBv|BWP}&vOG9H8BW$6GB_GlUXc7GquHOf z5C9b@f1)@V7y+DO3{~txF#VBM8V!0kjn_OdFZZ-{(*CcXb81($+$z_6hT&uSg|GI* zy_kySCH5LnOc!3kPHSzPpMPzui{SZ>>*@c-gC>TlH{J45A4N;aeP22JjzXFoF_O)} z856HFnoLKxRFONQ?q!Um$jd!(yvzb#E__%tWWPD59}16X`31?IsFZYq&>$ius-S4Z zk_E7oXiFXBXhWZH_?i6K!kzy=R1&rTbX_dRWjrwU432m(fZp;e zN&TMhI2pM7WTX7Zc`t=|M1ojRW9(*HDNgBv|C|IOL6L%hDUm_Y_(`EBsl6h|dM1;q zmcQZ11XBe7VW1F_$dPO@!;$d2MiW?6dHfQKp+9LBMCjltGgyCmJ@SW1mo~lu^~jlk zpU?sd5>t8q5Bagf`8ATygbW!q(hK}xl@y*N@`3w-MyDegfMbCa8JfJj15}I0}zBNukI7VMjk3m1E_d3_i((| zzb~_1M)dC#8uoDhUol&*9ZozRI95hb_M%CaW~6|j0GPre*k8~hex_mg;UIZQ**Rko zOA!_t(Y)JsN+xJw$|XamN>WPWy4$y5&#}E2%vqh?d-5rGxk~V>`#baq$l>3(5wpN@ zL44o(FYKS8zfjLcT zv=zVhmlyN{kDskGzv@z5qfuEY)4lHCX71s;l8v_>^Amy&@$Ny{?byo7+S+(pJ9g(y zcnsvD4z&}uA6oRaym$VRp@={mO8n+u-^Tvul@GgZZ=hxP6^&>}OAzyH7Sq(2`~-2p z$bdM4ddp!7A0B}rF6q#?94D=;%)`#f&c5Q7-Isgrga3a=)~!Ms5G4JdktrLmgsl%IN&}S?bN}YMh{^c=!?YJmZ;%Nx z1bG0ENLp<6XP#vc*)Ecd=ob`vpE&fH6HJP|7a#cpYw@tjg|5%t4m+aKiC1iDZshr8 z%m@TP^7qA~?bfoVuIdJZpXzFxB&bjEV4RsSba*68Cay4QlLlB|1>(<{lExg(q50n% zMgZ?Z(EnW`B?&(oQUiX_I4uD~1xik`%V5B}6ItZAU)*MS^83_u= zUo|~F&@g-X;ldyJk$)sdusG}nL6F1@o0i4hS0vIcq<5#(=7P6rKNXI_K-0~BSKl_k zQqsJG0{nQpO?>~|CMWl#)~O>1%hQYkz-4MDvq`XM$9DDdJEB5`V&T=So`m(B;eIx@ zS8Lk1!{nZ2trPt3G@pMgCtB4J$ry$k!Q%c{6D)VST`Zl@Q#rN+^gfFbhTajLq{M7iUj}=x7x!@)-#DcMe!TLX`Bzq-1_&I{aH%mk@3L-)Da;FIkg9J0v#Ppow_J}4TJvi>|BDhSM0clDO80~q;HPaT zM4p)=ri63%d>6_s?}`>f>uJmS@Vt;!)tXkoJo(!N>^NoM(ija8;C<32+qvL7Pe3)b zKT(_;Y=VS*iT^L7eYBXErQS*#yJvl1#YW^E>+gI*qz?_Oo&+_mv#EwpH{A7&zjg?^ zqh1|)CCQ`6+AhYO6`zW%kEf$DPtLJmTUasQl?9O|l$sO@ca+^0N@?`Hv-L;QS3+~Y zS#a5qohLS*9bS?z)mzvi=j|f;BrbQ^h#3! zsL)y(&FDny<{_A?oUD{?(ax_h2rNR$8{|FKvM6`NkU%d2Zz?0*J1)YiFg(kUL@=6n6_nFf9oSW!_|xp4sOWEu4UYX*#1 z@a*&fAAsMkLHJ=P;eJ$pGJa=e;huSy|TXokMRJ;U!cc$QNzpgh5@(8 zGf_;{!37SMe{!>^|K#2KlX!AuvFQhJRm0>L1ddl|hYNG??o6Rjp_55OF%476tgstI zGAWrwT8vQ*pr|MZ^#2)!Gr!kZEXiM|@p}ajkx)I`nSw%k74kr2-gi@hbL5C0ot}J9 zrYa#cv87&uw4@z?%JhuWGz`Qmh9Ta#^oqFr(d_3Aco3((w>x4Q=oE}iz%v}BBqGyS zWdQM8BVc2e@U~}xUlredVbqhpiH<|q26@s^h-5NGI9Q#4?dO=6JywMp_>XYvZobG~ej00e-BRZtF!+F` z|Bt7$42vq<-u@oCySpTm?(XiC4g~?}kglN{q`ONR1VN-jx?8#jq(ge(o%3G*bDry( z5A$Wmv!5Mnt$W?SPn=^&b61*OIYOXlrZF~Ynn-XaS^I;7Ad(D|qqw228hNA-y&Mbw zFNbJ+AC$W%O%*iALDMhpH+3ihp}LG#ZXi|l?~=d|WQ}CK2OsQGqS2Ll3XiclRZ;10gUE>b7t8TGYX&H%!t=%g{=V11Cd z-79>GM!UA0aA-2Wv6z*mzH*Ydhgo1mQ2Z<+s%o5-VE9sH&{xBaU2C=6w`~D?s$jTi z5srIZct`R5MgYEj!E3@$N00&5u&S$yHZXbtJ7o)ix%E0+4g;u=({F^gyE34ClW~7v z&Z(>o05DGiL<`%9P+HNOvomALJTKDTp6YdG?8`HnjV%O=Nm_`Fb{@+u{6@f9^)~+(QNDr-Y}R2u{55NHx^#Q z1|-e+YXJ8fi#5;o=-M7bs^+NRP4*pDFdbJYsy;DUEDHrZ@YWuPVxd!W>+Oji0JyM7 z09QshJe+S}UL+cLMc^$>nmx*AAk0Pj8=xo~#jUF0CrQPZy)+}`ZPLakMY%MvW5Y>> zb&(nDLVsFtJ29QoOw=sLw<21F1?5pGRC|*s6g;>#uN%7~(??>xN?Xul{}iVG(Pd8A7kD-T*c7Ob7uDVK1yqw7#gP)Bg3y9 zF_@|uFW)5y_oggrxp1U8Ha5lW;RM0qR7XlVOpoF1pg$`w2#iDqN_v}2R0Ovu8?94_ z!HGQH7$zwX0A%p8KpcRf38#yIia>XOH;d3iX937IF~%I-$U<@7LkKo}DVMTBN}yfG zaJ^B?j5OJ$l_a)Gseq~u8J+?GvCfW3G!HBQ#X*`N;36A){MAj8aFE*;D~}sT=Yqu@ z90o`6lcq2!Q3(?Wp36LlYQ2~X31^!RepSzrczT;3%YnKPAgZ`Ntlt=h=!bs1+CzgyJmCwjLS<+PyVQ-f>*ZG{(v$r zmgwzZg%;coXCjR0O?+}RJ`4k8%%r?q09|G=IZIqi!8 zY~6+86~77ps74<1%|z>8i7o^_tPnH^%b~Jg`$yot4NFb2{))=_Pf~;4j$|(|!E6PQ zBiJRD6zx0D9t52Fv0t2uL6A%)vOQ&AUFMUxLwpEYE{Ke)S~81_RNV8BbrM9+h>O!p zaXR&ssOYfOzSI>W<58SNmnt<~7C$e~f+yugm)bkB{%fQ26A_$^or>qpzgv{8pR0RL-e z*5_%Dte3gCS5V!2GcpCXs`H~kbUm~~AVyfn0KR%qK$7!;D>W9wAVMUiMMe>4>DfmH zWiDX()5Xso5lQ^Nl^nk*kiMdZ^_MnB4G~i5lK@&IU&5u{ev)_1O-XVuB1 z-RO{AmH?~is&E`D$2jcSA6gUm+9T8;xJo&&;OT3K`uJ%q$bu5dWw~e&g9G!@g4>>F zFnF*~45cheh{Ay2LwY=)tfBMXyfN({jqrc|QS6!~%@C7{f zlWJ6R`a9AZ$VIvRJJh;X!5p0-nXXxvUwpifXt42^)WZ4b-yvLgnaeXsNyiRv8Rw1# zc2NcK6=`L^AkoVHL<2;}hMzN8vd%S}+?@!swTjnk+`_jrJg-7&8St%Adh&a^S1~a| zIh(%5`HS+0DPI+KAxSgMcVk7!|pFTY(Jl@o z$PV`?g^#*?LuV~>`OW=3WLEZTw=hkvW>0W0D}I*CaJKf^`_WQ@)ddwZio($W0l6$N zW;7mIXJ@HEH|yXnviG}Pq+r2!Tf2yw7Mj11MgroQYj&c)X#1M0(N2?w-&$E;pbTaT z#5JHU9Tcs@gE2Inwy+{@WslzM?hE|QouhDs)Wppb^^Z#Z5_0<+tS=C)`p&Y|UNo1^ zzO~Ox_%URQjjkF{I@F;@D#x7rHk(T!R=cMF?AaD@86lRkjJr41`?m5Zv7KPRw<46MUnU-#8 zB^1M@N7-0lp{XV1l`gUgACn;84$1o@F@0l`!JLGWPE!k3o>dmz<#C0NU|bvo0(ow# ze>o}YNRvXn&YcP97RBTde;oM9z_TRD%nU4L1oFD?8H!M7qZmd5{4utiX*DM3q_-+a3b;?piu_V>T06S z)!4R=0yOD6lu+9WufF`_!)Fm39s<`MGO@1|l%I=w(3-{yH+r!=cj%?a%HReIkqV`N zdZ}atGksN7CBf{ETDT%s!zz~<_=1_HYYe^PN)5|sy)?qp$hepk&ea-7nT`-UxYJl3 z!mm<2W&HfA9|r0;P1Dn3EebL!NVrh8I4|&c&PjW)KYEJ3WyVM%K#*}Mr2fE4Qsd8# zg#SsQcz2i~A1u!yO7{M#GIO!`fe04j{loIC$vMBiPMVNll!P4&in+l!g_0)?YK16s z#!mzYhGPU$izpG9g@SKbV7$?HXSr3Vg>}PE6bL34Ewu=44APGTf;c> zz=C_?)4+>;ez=c|$%zz;IEnudD>a`|jQ>Wj%)enBKGwly2r)v6jIWKYrLfqQRFVc| z`Evv@`7kV zw3A8cEf>SKQqTt-Cx&r$p*SNTktRQjY6Red*2{duK_Hq7Jcwmqfp>RmlM`f0yL@6DL34SX& zporjaY*%Mqafv&c5+*a{#7+wA)tyX+3~1nz1S279YVcd@S%kC5aW23`)4muLaN-~X zun;qHJL?0DwZZ#%Cyo+CnbLQ|s_MD+d(loCgPOmFr$2yW{4%{dS~hSCOiR8$hH!uXZ5 zSwZqcNvE>b@-o6dokG^cvM&nWdDslS1o!xyW8-hefhb#q4BQ&66_S4OPkkq-WTB>x z;Mnaxw~1Bf2Bu(UH)VLO@zJWJilsR!%ejP83_3n`f*qO_edtnNq1fJ$V6hSO_1z{m)$kVOAj zB!C5Vl?0R0c+Ahr1W|wEL8B(^+?q$lXJ+T^J!KnusPa?1o+JOpllVXntSCODFK(2O z3C1>l!6hyoGHn?ix2_nm)!LwELj~;+z7FyO07=-mEh;yNC$cnsgCE)%GASa-iK>NZ zoL8kPxzI3#!5@96fCJPp11M5W64x~0IO8mlEY`Lng9X@$j4Bowbl^VlV4*t>ztD&- zyhWUiaM5fOR!eBMX~!CTHIvko)a@4%>`9B9UF80p3rm|7ejq~t0l)fajN9fSKEbKOhiQK;rJ<7qSdc`4 zA*9}PdSOh0cvuI-qL9osX9b0|QPC+$2L&Vjm4nr_Aw@@M!%R4nA@7OEKf1Ym8ew-m>+-!68ia!?-Sgt`}%cj7DZix@B7ZDFmG)rkLL?zSIl$-DGSPKav zEd8D1riPi2Qyge8(2(PL&w|PD2k57%5g8>F@KpJ8EkP^@mgc+`h)gLB5&%zLv#25& z5|7TQ=Qmy{s$yg9o@J%1m^JM7ly4ge?5^CwN5v`-_()aB=|X|=IgnKb>XixSbm->% z%`hZ1!@uF*&#nENY@e05(rn%M5QHcj|1FJKBYN@hKcX^|Lc0|3$+(#gneN9kAG{lL zCs?&a5!Hhj)OCwvkV?RWgu1D4$;oYONn5VCBWN_Zs*JSO1cDK%qXP)qQaCj|(m3(u zNRJl@wGm4Mv>~){k_b2e50HL_OD6IwBd}mr>8U-AdRG`)*AsjledZH>qh8@=8uQ_- z5kJyrfCSU>#H5k#^{Sff+Q#Bf?q?Hj+KQCbQ?775+sy{su}NQeZ#Zo(#b{0Q;W#>J zdFHXuKc34=W66(W&Us!j3=Al?>K|D8iGn9?FYI`P`3Lkwba@uZt)H5ltk>XmR4rl~ zf6UA<$T+|mQ?c5t(QyJUITkTFcM8F{CaT~v8}+GEur&F6d8$q5aK>n^Y#azpdO7ZT zq60}M2VvD&Sysdyd`1Hk|sf@R2Bynw=6T>I22Kb}_igNOt z`@PbAlmM{B-8WA`f`xK()2Ol$SI6ma9+AeQh@}s8<>&1M&VaDxd zx9Ts8Vp=ywB6V4V>C2k9$UsAk%iTvaWkX}I09W$7h2y)_w5Hg1%LHzA2Onbk(Ag}; zL&N3#t^R)EDcblA?er(6uZRq3ZI#SG)2VvE=#!Pz$g3&2et846Xqm4XayDAqxND5ce`Rk~<@X#Cm<=-F~|7`*UvHpO!dRi-{@Ca(Sgt^=(vTz~5 z8>s{J*b&YqGS&BKcvQN*V7@eXF%K*2>HTzdGA!_nalC8Z(X{IUk#12Z{LbUzq()9m zj2tjSt*J){d{bmem#=zmbQqLl|D8`CweD^oq;K|29y*0;i4>|TVq;Qo0bKY!G*LRc zHJqKp&kUbuBHxw$L}Jd~icGwuBq+NnF@faKp+>fEqtg4IXnXQWk1$hQ+L0%h)}YJ- z39|AEn4_)WImGLC%Nnsf=d8t`Ujb3)I^kpN;bXW+K-J6(|BVAl^h1vjHi7~aN`W-& zez~K4g^#Wy1Ogi*dweNYXrB(PefDkjp0Xp;k~-Bir@&cF+0C5hMw&*~_;V41cmHBF zDb&Pudxz99Coot&ja_g2K@QaAoJLgkwf`sr>t>J!2U}UhrVycuH6-VtpAD7;***N0 z(Z%hgObY-gNDY=s(rcFT>cmxEGX+G+NfVn#GVLk%f64Ufqb>anXD3Npzh&~Ao$m*oTGehx&u)Q$su7H}7JnS>$7#0hY!44G`@GEX z0kIE_`vd3BOfnlUBVsH(4qP!xOawDcaHt_-(kK|PXa4I!#VY@VZ-EgUMMFgV>H_DK zpWX3`#Jn#a73(EHMnSqQ5=ZbW5&)Norc21HNCpNh5ST}>ZwnO=?v)As+myGIlUXVc zq;8v#h^1WIwpl`4slR)Od(&(=tjT=n5M~dIxcq5l$ljVUgm(QLz4w@l(lH);H0W$stvzHum zdaNM?2ZDprv%#pViGfmN0gweqr}ln&n4XpLqc5pn))rqLD4G!VePp07eT|c{_rA$hmfv2{1OQl(;a^b^*Bj=5{)SuT8*PFiCLx<|w99KD!VV?S#5Y9(L*%$*+Wb;^PD9`$;=Iic2z zr|ktOPJ$%Z9T*T|c3qx>MT+kUH_ETVkdCo?Tyd3P{gf^QsGo89+<(2{GYA5TL2F!$ zW&Y;x?)@zwSw1_ohjUN>f{G}jUpfhkz zDu`8j9Im(iR3=7)41goqq4j=X4nwj4G-)u9vy&4mFt#M+<+$HQEi zWGo8$FkH@2!39pFI2=O6x3o3D`&sl$RZ}8qQUUl>{#|Pn*D%3-Iz${0LTXFtR9%{l zD%wz@!(oT9YUy~j>BaH_4K4tFd3iZIJA6IPQA`V ztWVC((Wc7IT)IEuGHL>uk2OLTMZ_8FB%gj{jwzCsQ#e7PR9P_QTsL-E~(UKSYD~P*c6Rh61|5Sn~S9xph?`ad_Z~@ zUkZ_6O8{0bJOs=&hysEe4|Xr~FNMxTeiBQsO^JZ-+oi(XU2u)>kk7=C!hv~~`wx}8 z;hi^nPJI8#USp^p83{>O?}t(C?+4SlcM|$Z&!$2~ngHIV6EKc=y(SjNWAA zJFCna0E`L9%fo#Kc~4dq2>*9biwgFm;E<8-yk%=8+4-Z)B6*~#`#$v2p?Bfi-cFW8 zZpn>-0tP@IhGQWab)6(-1u9XUAsYNTNi!b9zLljbyM+SkEBW^!mwwB3oJ9HPFBbv@ zNYm8y2q<(Y|9gbbIQ;e*dqCdi;ComVb;5u5D$Eot3kQ%sBtH<-sH>~}BD2Ji;2-4E zzU4D|=Hqr9K%p1=#$9+r@`E|WR&a%ZOeZf*OUHIR>?)LWftnRG0x7S5b zm4%N41LjiB!BJn+QBzely6w_Y_VPbHlfMP6puJ2Iq49GmFsGDD03qWcr{+0LT?UQ5 zpNQj<5cSDNm9G=?Ao>zf`m7|Bj7U&aEE3)IO5|Nf%F=9UX#65(!UD5HA)S9PR11UJ#&b zK|za!0#6_JfuXeGTVYuM=l3AcV0M4v5sI*BRi5Zn)L$9;mTOq42IzSR^DuPw6RmR* zT!Trk=jZo4+wJY_Vq#-4zjG0&P@ba>YB$pjX=)|qs4~j*Y8w0bIXgS+=rqmP*3{Ld ze|n(&L-N11aYslXSd7MiNCU@|nfsZb?q-QBk^zx^o9-h(A_!-JK_V9gmk!3Ok~VUs zRix1aSZP=RD%5Xz8wWp)j(O!gtKRyllnDw`12|*?{%D+maj zC}WiQ4f%(?pOdmc0I!UEFxWWlDcxTpm3Ty8)b>!+t9QC84k;$*;yDO8w4&UQFnaqSL^n+o7lePxy`yc6TiI|LqAxW>fHBA zbUZ@sT5t?t+U^Q)7WIA=6WF{H;6N*TAs3r|&7KQ ztLp3PtE=1ps$h$D&!j`172aGw*L4osVM1 z1)Y8y`;euDg#}aS(K*yr;=q!9UQirmHSp$gv+H@vv@ zcRIIwj=P}kgI~XXU30Wu?FM~zCL3R#`2MrNx&3wWIPjvs`_y4Fe{%1_JkWQF&BMb3 zV(R~UIZNTQ`75l&FY9bCUcv|ZZ}4y=C3JnY;1Q~Du)y&RcJxp8cLm;ELaSFvLxH!y z6HAR>mP;Jt;VUSir^n_`3+qSe&iCC*ixe8=!k%ZZr);sr9Cc&d^?^#zj&t#r3L7vS zKvNEE+zza_u89Vz!|rxy$Ya~J_)7}021Ozq1QY~O={9I_*e9k6a8r0?sn!iS1f7bIkafCRE_R&G z)W4qZQyV_Sn!;DC$A{zu-BnMm2Tm{rJ=UA$&u=W8{q_GEEl|7qJV*X_kTd9IG#owX z%H(*xB*6{bA{5?iA54(JK4+Uawwl}!VK~p@~ z8)8RSa_lH@1f61O4!4eurwPpB|D}1qBQ9k~3As|rqM<@zF zki=8i9w>_6eBR#->VEkw!CW|Ef&(gPoa!vO4gI5)I27=*?~9=VVGEtU_u>iL*zh(9 z4Gm3l8Q6A#`N@?xAqYXNvsm-DpGR!0!*`Vpi%MZjzbd8}_QT=MihE!EV`v_u^AbEL*9LF^t$^U%$WbYdiKNR1DF7M1`lQwG;KmF zknLQKXNdif%zT|JPlu+a;KL+CZN2=4HrSZh+xM`H|Jv4DYW-7yNca-(-Y>6gcDpsJ zvcJtW{Diyq?)84%7&k$HpW=!dy0Gg<)&7AW_Y<6?4rG>=JwoQ9}4a(11O)ZY~&3T9U4`q?gb>X}9(9iDIjK*^waCYGuqjmZ zq_$nZ8{EC0WfAg(e0#^Cf*3!SvHt67lyGif`XU|qrENbRuA*^|4j*P8lxgW;xH&8C zQ_yW&nj(qpOLo_BF`a+bH49GH%?!lK-$gLOI$gUNmg$?ggMRt0$E$#Zzr3*sG?mls z8bVtzRF*xq+3x1u+Dm$TZlNDtgPNf~3ZVBR2Kx_VFPoIDZD6hlojk6(e>XZdz4t!t^uZX3V*yj$Jvf8Y|HnPHp;arvn)_88;^il$ic^(?(q>DLfQ~k$151VsF=1RgD-4O?UUwte|4oE60mz?bA|$`A7cpZ>(>0 z$S|2w)G={za_cb215$M))!?|?=->dPX@EB$2UlKF5CIZ}j7XJ`Toc;B$t}|dsXwc=H@Uoqa@nzX9L;R)RwNeR)8XmDW0HD&%>UREzw3$qPvm1 z6Ot89_ffAhH1X{G>pDZRtS^+aW-kZZlfko99fp%3v!DN6o0PxU zh*J@iV@w@O^o1y9-pm&gTtQmN$h}P zC%0fds_TZ)wthW6=NZIm4ww7>eaH50uP=qJ+Dkj6RAB%`S+cW*g@w6|fBsl**5=ZR z*nH=PHYf4dU59=e;d9zPv-+iW_T1Ol{S5Y-;q*gIn&iXMn6U7s_Q8*Fy~z?DQZG4E zzDTxjR|2e-+=I@OD>w}9i_*}ms@F5MmFX1JWhvx$4aE#lJJ;J2Z!%)e^hnlT-=EJ~ zSo24JQ~bO3#lc0s?zbfoE#=PfN{fgc>IW~j1!}-!Lyy7OY`eLm?=t|zJtTJSkqeia z`8};&4XfCP>atXJJN_%C@Zb+RHExHRDm;$CdN1?+lmZP|@U?}SgWT^DZUHdT2K~g$ zhuUVVKk=>lS;-$*$yjjtzNMA;JrqqY;v_+a^ z2@HgU^0BtIx61u|nsgR8q)`mVlJ!@q036L^@HZfgXPN+KSm{xD_j6GOW@dcG)i?Kq zugYa)30eAUaeD8UD&jvs&qVl@_6fIH0RG8qtWoOp*2 zz!d}QFW|KNjEO}hG4I{b$R%9b@iMzYIyY6H7N%I*O@EXrQoTIhfOqBDLgjd*qz!;O zMh*A(_aBHRVQVlQKL&G%U}bX?8+@{WUXk|e%7N~%<4zI4p8MzgCRX?cR0XyB({*Z}&>^*=#?fzqMf>G7h>*2~MirVwu_FH_j_I>_ZW%Rp+Ap z@cD$kIwWbqmeIONRZ!5Xopp@+ec#Mkorh@z;*U2}?fpBFL<+t#1a?h$y?OZhyODR8 zx@Hc{%)@d-6Gq>6+#uOqlFqA*SWcq2$wX5%lC_w$BXVPm88o26k2A&3(4mxC$H2^# zBqiqgBgzZPnE3z)b@jT>&s#wH#O(um#XutRQz(=xwW}d*F%=6DKHw=4*?LI`z|oJ$ z&hdky?v}k{ELgUr_3fH(OB|4`q5WJ~{f>K;)tL1`9oHQ zOl14t!;UUN*)u7z>gBL?6vmwgweSkT0z#O{Z=EWpr9H#%3)gXvzN=(r#&f1u>&Wc+ zImY|aFe_ou(1{)FD%dKKo&0evoT0XfFZV}GI}`ha)9N_f2di$k~m&OiM>Qm07Gz5qt2#q8*XmphPAM;2LdkxJ#X=s&(d_S^F`Nvx0&ykLHAAUK;VD?g0di zLhcFs`5Nq}6v5 zBc0nC*a4z#uOk)aj}Y=4{J+8H0-pYVw>eA&oGU9UFVngMkB_IkNRp~5_hBzdkEMXS z8kbC$xj}P@?><594ly?8`LpLWhSSg-eZMEX^iOY|UhlnCxP>2notuf$R}}6SaY!tv z>Tp3~I0A1qr7TSXm%o`zIj{Vi2Y{se7a5=(s9 zoH}Rya=!ZSx!{-G%Vm!O8sEu!$98o0>tk;%ln$Jp8whQc@V~BITKa%~;=7YCF;IOf z_VLSDgqUhHWc|M9?#$q&=#S7N^nikn01eg7O54flSJ>u(iwo_%`23KMkY!DG89kM% z-c%O3_n!40m z2_2Qr6|+J6nbY2my3ZDMooQDueCC4#)1b7;ed=U_v+QJ+$Hi!F2y{BLKb2uaP7r34 z!#dv#ns_jGBixVAVruo2pS<;UAG_^8z1;~w#-13ft;_%D^v}uvW>8`D^{NTGK3|8X zS~WTnJ_*4|aAnu+?OeJ3cU^OsvBB@{?^(0!7X$=fT4j;R`JKc??>htdUVXm}?40w( zoIO)0_=>T&il7<2y5JNd0D=(Zp-WlrqQLuuKinCN!-G3V;04g0ndr}BE2AkyWsz%A3FpVS4jilbl8@VEOuawPa;EZ3dv@NDg2 zSfl&7o_@wwdN(`;!uGHkd2V_%+2ncp^t8Ds)}`^Q^5A!OClxBjpM&);mlLgle*4oB z=TFy<^c(Eo{bE~fCeqA(x7}BcCA=Lpf?B%;UuB>6p7J?ziC1n$`!z&w_JYNOL(_9T zR_mSHw@0xj1n1cLb9GEQ+|s<~RPu<^eoPM6@3XvFeE54E`a>YUKx6{%52e!7V(UXu zw^-*vWq%b-RF{u=z+r54eP;c?Grxyz@|VAlCmj-Ra4XSqf@2tobi z^%Bo1)Q;MMkjl^0&>KpDfa_nM>0;#)C7=U|uWi;EA}kzrzi!;N^>Zo$?o=|&y8Xp3 zZ_mB2^f$eIgJ`}^zh&g;xs`!+O#GS_8d93498| zSZ9ZaK7mu#-S|^KAFm6b7Yq8VK;LPP24+CPt@mg!J?JaA8A1B?(;S{L(o?&c_VqX{GeQYS%cnn%v&t68fiW7wXR)9d(?x ztWpKuZ^I*FG2li2jwOEG=Lq5=!N@QV^a%)n8uAJjArp`>#fHL5A5O#|kXpuZsm;NX z!vt^YIO7^=P{MEqNnjlcAL8bcFELIv33RqEb~|;Pe%%Qmn?LtYIaP{XR5RUSWUxO@ ziWNLxF*#@XpT0gVoo#M*S}DoBo-O73K29mv1vWWPL{L7NJ)Gw0%)C$sy^c`r*$`;@ zjh{7|KCYX#clmq#U`q6X!7=_!>pWf8inKy6=kgc3UmnblJ*S=*&eq$p#qOhhiY86T zy(nd)aJa80D}w%wpF!J~M4zq`&93?^pR%v*CGLK=ce~w9q|`k;H~9$!p8r~Km*>$V z5q`X)re688W%Lgc;CFi>bkT?X7YWG~_|O+fxjr!@o()yLtx2D~%FRpMbKfTx@-mfl{rBCZu}SEkWlwENkvr(Yfm|%n zgik6&)$sPTx_ZhJJ3eH2tE;n?ZKxy`a!{~+qw!lBsv*(wC%altHG5~$#6_38A0EX}om)>ewaB`{huRgyvf`n^>9G>qTOa_Yt;vd*JO2vDaDrI}E^g zH6dI&Pv6XImm${T00AITXMi7iefW`MzD->F{8HZOcL&P=t=#F0Fo_r~zS=|W>kXY= zmR=@AZYl1^!ei0!ju(;D|7OiZTN4o}5Bsm6D~Ac^+)2Ey`sEKl1ZhBhCSKr=sb4lc z_|(jwPP!8iAB%gGoK?6V>xchVn0rH~&CfgO6xN@1Hp+9$3VaSAtu;SSEU8~spoyYg zFYfN{wRDBIg-zd2{+>Jf?>A)-^?+h`|69uQyX(3fTsdF&yE17(LDy2esQz<%=QTJ#WX}f`9qlmG`=c z{@NEPcvNe?ZK)USgoJNG@7-<3%m}WzqjxtJWmW^P9y&cXU!Ej3mfP?COa(#FUWO%* z`dkq;{br2}-S)j&YTF?(c(FQD&5ss6LJAHpkn{vI=MJa$y`%@F{Y=7C?bp9lG8SJq zquHNk6`b>uUd+TqncwFIK~n-m?i`;NYCL8lYL8po74fj(sIN0)a0*kZD+FnNzpBo!#9&R+uok|JfC>p{(RnvUifKa_Yo@4N3_w=wtiU)>b94?Jxb zF%$19TU97apZs~pVt)DCE3oa;#Cey;!uQ};zrgk0gYCVuy4oTBm*~ljwhwbHYS^#0 zB?1M+ey96Opr1&Ez;v^|-QvHCyv-)zb0UEa@7-J>_XJ9j+hxnd&)MlO-kxe|1iR9^ zi>^h{mL~EgTtxA5Fj7Hnn*1EEbQH6+(I?t4PWjISa;TC0@+DdXLrRVPrW1q}>KvG5SH8gkb*#Mv#T{kyBDed#R%s(hJd?>t_fC^paET}^*>x3*D8 zo1us}XoOc+N98Gk>HWXRy5A&nSQ2xs5{<5l4<7GcAP;2RO>|4+ zsBD?Sr@x%V4T!^wc8>+159E>d9PNMmMlaV`G>?+e4+O{FlQG8baHdSow{7nZc?bUd zcG3TabK@uE)Hwg4+oPSTRYjD~A{Y8cubMq`hjE4z04(BEAPWju)Eie2I`#Hz7>8w6X^uZO2N1hAobq#31Wzt80Ea)84)CB{r$@ zB!?9%8X<3sx!a>O^DKd&z#mM<`n~?0@bK}gcPD0E=Z(bUx#68%9oP2kdB|URX1UU1 zN*0G3%71g^3VT{H6OgI@kRz%!GT`+|UWJdfvq5CfdRpr##H*4A5}uz~nmB6fnHvqS ziN@D>d7H;p#ceZ_?3+;1zx_FJ6RLe5!S#u`zS-sKZs)Viq-(qF z1-+nC@`KyIlaWslbFR5z1V~@34b;+@ne=ZHdCbC>AM-F~spa}Q2&9nfuFh+%NTo}` z!(reb`RlZ)zL~vJS8yoWrEdv8QCg*-|P)d6ry_{@w&tl4U3+;>~!O z1LabXZTH^}kxbQcm}3+o0bcgFdDY<*=|n@ziI zfB?Y>?!_I76AHAryA*dT#R*zmi@Ot`c#B(ccc-{hq(CWF+~MT?_P6DnedY)J;JU(- znYrhgS+j&DG@-r~GW3Ulzh2LES%JEDJBCp;&E})XWKpyI*c5UmA_%)}-FQ33Ll#ZN zY?8vdUg#%hiC}_y8y!=ChBSDPVp-(9q+@MH&L3A{%uTK2T3yV|AG7hVu0LLnVEl;; z`0-=WbuY*;124MVWBP+T1WtfB8u1*)W&mr>RMY2#d2`0E7L2IV2$p7i)sOna*|AS# zT~7+^3w#Y!0{|j*F=w@M$4bPDZ0$nK;d8l-)uOGGq3zo7joVk6_YJQvju#t{^7#~CV5Q-$IOb0cPveH3;3uv3D4(=N|j zt;<(mN4xk18M$ed5|S7}uLU<9VDv?5L5Uu*eA7|RM;J|^2c_3-vfL<0-Pe(FI>AT)kUM#Yt@!;u8YGeK>;N$TgTz=XTq-FcqPKMQXbFh+ZBewS+mq=_=UMgQHg$!?YnP%O0!g|A08H#`dDjmkT9{`rO{YSb@VGTJR~h&v zAxgR@Sef%P5?8P3$ZHRD<&O%HU6Fnf)F2^V&dGpd{!iOiIT9N^77WqvG}W^Nais`m z2IhMT?egBim76;3S=r>#QGKXKD7hQQ)_a`Q&MOnNx|l@K40%I4=!$o5uAP3q{3#JL ze(E)+@}Q4vafslS*;bf)!!l(B&8`6uY1&!|rAdd2DSpf%B4koFfK-n=rla9kde1b7 zluwVf^w9_#3K%*1)oj9K4LtgfcyqKhMXbLNz*KC?1b5@L84WFKb%7xR`YoG} z3Z_U{kV{>Ii|~$(mv5SA(6(d8`0$=UERSV6490-r^qD9rv-Y0anJNv$fBP=WH8?^XS-i<-FGOW-(P3m415 z%T@AY&r93Z;Gx1mhk<{`U2`Tr;LSAcnmtz}4bjcRQ#TY6g>?zEWlqgLoe{P;PPYW+iR(G4YpqmvybNZiCGD<(uW#@D#?EW|;NOEOVYtLeUbTBKFU7ZdSsaug%AoInrQEL zAV=R>u#gc#MXlqGr5TDDij|QL?>{Gg;JbhoEJy1EoTrVU^H%Re?1X3dTG=Hg*LstR z%l~#5+_Wq?8gmVGeEHb_gb08nCc@cHnArDpZ(mi8k0@<3%Jb=8MBBXXcv2K3CYkB; zjYl4lMrKGIJN%Sq&?aD_Yn6F2S)0({-e2>PkT51@c)TtA^LHsuRM3z_XGsukI!1O; zeaAC7y9(&uyi*L25t6?oHdP}xAy9guOtrzBR^zu49K~-y-qbFl#%*ZVD7qgg5 zJ%P{hShr~?lBS7;wUY}TS?q%pz>p6$trJ4fs@ps^q71{FrG_)K*q8%sb@zRR{T( zYfBOW!;<`TkryrLZ`I-8<&%aHM8q;gyxZHWzrL2^=9{)o;NC6AgUz~K^OtR<(!6pI9_4#l*R&fwUaJPK# zyQM{PIr@~Na!p`CeNn^k*i&U&qo+^D#zuI0ru8Gk-kLlz*#bZ6KwQYSM9Kc#nnT2ngdd&a}nJ9<#O|V zbyG)Mb*Yo8#Y6X5nviC6%ZO)<&SYuv{_88thRg+*qVHpE3j$6kZbQECYhGapgg}kn zSj7F4fz4%q;<4WlnXt#(8(3S}4(wV{yfnj2aeP4PDAGFr&jZ3;Ua_!d zoL_!L;nAhcsn}i&>c=~t3VRe-99~TArx1QpxZP5o61^YEbNo2Xm!+dm6xV`7slT|m zuzs^b?!;B{$y%w-c~a<{O6coALBYQLg{@E%ae6AJp2qE3NPtd`khiqewV;XIJ}l@? zAC5+MI2V<+wY9CTx@~&-OsTm|7rEwpX;_(kKJDLduNLs?fPeedcN9^uG$!h0QEAOT z6{yBbwaDBC%V8HPR6%2#d<0W1rU$hPg+87q_UE5E;8@*OGkO|gJkw_$i1cGnHdLW^y1H%Xcl-F(t?e*V^$sgjxH5&bY58|Ux$sM$9sM+b+F zr|-_k7ecJS8OFkQ${y4bAezPC0ZqN$CWl%7p*m@JR%%M@xyz(xty&FWJ9MB;zb*cB z11dotllLtvOBRotj&hW#y~*K=?fzC{&xsjafDO~p#sBp5_oOcy=f;hnkH5;OjfwQC z9It-4!h3;rwkO?q+4Gl};wPpD375eug)to32o?|=WtD=t><=HPsj2hhCdKjF|FJtc z)Nit`oMvw;UG1HwlNGqUZ1TLhx^jH?iFRRLps*2GlzDZrjdbnzK=sbGp!DIEjr>}v zae1ox>n25@CP1J^5d@^*D)K`o?bW4WmS|=Lfkv!~3Df=m(1jf4LcD6)SW;5XG4R_> zWd_vq1CpD}eh=4T`Aq~YFZ)GTwtrd4G{=M+K8%y%p=Cf+N&wWYfXhbL4V3Ye%({Z|CLS>Z`7c+E-7{H${Wmxuua>*q2Til8TAITz{GO8R&> zhF$jH;*|=!E{_YQw;n+Q?=Jt?Rh2!g-$~O!v2SjGp6$<%xq0@tdW=usk7i!4d1*iK zpYNegzI+JjO(GcGuQtAmH8Io)lYD)Wjup+$U#O~K_OkgShdtCm5oF@tTouuk_b$#eqjdkrfHXaD;X^?Rxcg zaZt$0?OOZB@L}YorJ$d>`*YXXu8IHYR9DMxDU+dh*wsx(bHN7hz+$tLI<{#Q;=ymn5q=ecmS@Uj9-U&pEy}#S;$0Ix;qpNgu3Uq{ z$rdzLHyP}X&ZjEXr-%f4|6P%&H}vh(c}x28M2F*dR@WsD0u0x^4%n(< zAVUo zNBObpuE=f+lc#4Z;wQuH?z4u&*PUC*@oW4JmU??xN6oi~)kNBUFP%SM{wDf##engY zEB4}E`77%iYW%7*I?K#^fWznHPA~qtW+yY=>1+2tnuuGEC(&kTnbR;=*7V$Kjb3i2 z`#kM$ceQUiZ||msz!I2yCIP2LBdE{!-3}Q39Ok16)sN?%jx8UhIj{x>9nJ_oroGO{ zD;nIKJ4AQb&S1_n4QyGgGJYr?db!^pd&SI~K9#4F;To5mA%dP+XMb?kH!&5kD;Zr8 zF3%Wv-A4mzVa^;n!H$DbyqFdK98Ngi&;$m?-|tq^WQ;3aFqT;5EumWoSMzk z)e{_=pKEnoKXq)cjlG}`D=S{CejdGfXDA`XcOjYADfcv%+|_x0^G?p?s^E2i-9pku zDIzi}0B+rk-_9d;kVJ|SK@+2e2o5SoM5OLk{55mfd7tlKqSLD4HP=c1qYpF7VUd8Ti4-oi*xt>jcwL-ZM>iT zR&SUE)5FtqNl6JDk}zOT3l5gZo)~4m8TcUA6Pg_@S_D}fCxJ&Mt*?tBAt42e!3ABK zdU`BlJVj6(FZd!I_?>nt$7v5C;G&arwL&k9GZ|cJ-m`T%BtooweRXp^2(`2MG!DZZ zPw}#3=FLLyb2T=z)w`mPCxzf#QXI%Thddqox@l|gk<6WhuNz4watV&X^G)Si$4d7h z?CeLBj_+o;hHGtBj#%{~q)^^yR_V=(SjVNR1*i_yE^NS66N3eRYvaR|Fh^>EYn;*LBjUcveBtp{{Fd ztGX)ZvPG3M%NQOrM{py+=Yf5RER!0ztZAf?a7gnUB1=ZcY6i<(AK0DO95uuWc)BM4 zu$R=5&Yo*M2Kzj+6$cl6ZDUIfsHq^t-JSlWXgFltPY05(BA)zT53mm4JamEYpxzQgZ1s@A5@573#_wl_LWH!9VRc z1&DzqqCgAcATJ%)g9$bXnCjV~WQkJII|Uu^^@a~FJa3ss(ZrxNrBA^OHGcD$rJ2*5 zp7e190cAni>(cX@r9R`ZttB;srm3Md%@Xf%_({=3=V5qAZZW^{q*Hu=9gY%m$^WIg z;u*;`(A(z8zr6k=te@S6l1zZWouZtn4Lfa=SDFpaZgL;d-fi&~D)hwVSYDieD^jtm zl(WSR1)RM49gD*Mkm8C8C@9o~#_E4@53s9#S7ciAOIVJ!6wZpM0`-VJY`uLrTBd5V z@BdcgMEz9T9fc?90N2s@sf#TjmL`l&Ot=%hhhS159{XgsO9p}PG-WDxf`sEIpO%Mo zjOstUQTJ;0yxB^-{B0@KnDBTI&D8Vvj7quY4IA4G`PU0^(<4cvTqYaKb|0dXfiXexN4yLli%$YH$EL!^4d)HlgQF0 zwzs!?iB#E=!DBTNW61>tZU(|Xo-ED2&Y`WsogGv+M9!HS4+`lF!~rwixRxhJ*o2f%hfukSHSOi1 zYrm!Q#og`gaJx}%h{lXpr_!|{$?pRO8`(5z>x-@zqrFB}`AR~PGQhEHcb z@=d3tka;ms?HOh|yfZ$E4eGv;cDBST)*_Jp+^4Ru&l+W}qoV_%h?6NauGUGj(o36- zVoOyh*7(-j+q<%&-?Zu=kWFe4RS;2do7++NyPdB6r@u*$DO9=hvC!$gJ~sl1MPO7| zIqSx0$t>ht3C^xdi0H=;ADwOIiehz<9|QKYkEqJ6t{8!z2r+v@T#9xna#p-}kt z^Yk4?$cWr84m~fI$sxFSt-4pePkB(6kL>Es_keNc51S}n`h+#K1%5kLTUl8NKarG{ zGCg&`yE}V=kdP4G;hgDX*7e+QrJd;;1-Pi|l4Q|f->}^$=kOFVHQ@I)4eIxD2sb|W zer*(h_f76%CC~RhpVDs#5uj%3VfftfDo?PZUoNC)6FByJ@f9Up$4un3dryk}`N{tU zerG@BNEq3lt&?h#q&#E+11HE<=r9*ocU;5IRPBk+5!{TST!SPQw(c29jLC3pH;?NW z{3?0?o)UV0e}8?lF3dyb`f0Dhz~S0gv5`dqmhYjc2=V-Z&q3st zJ!CPDWb*2%y6{4Lufy$W3ucFQSg^9|hKB?Qc0Pj3cpPYLMhB+ ztwe99Z}suL39~r%2#Kpm9*!eED!fpVhS*7I7As>&s}lf&G|FtrBtRD9LaKH#yowdP zN`9viU+bwWd8Zupj9fY%+S7BrCd2>TQ~&W_-q;Mac|46zOo;Z)MTRd1pP3s5;&QUG zW(j*%m6h3cq@-yte**!Si(_gv3DQe!gW=o#g!e&o(d~o-#n3kvY`-T7wX~m{Jhy&s z8?NnJ2rb@p#Z97;KHdMLK8AXK-TXI~ zNa5YeAOj+uHa+-COcQD|QemuPXfx2#JcJnzUB!O+|9#}A0p17Nc1I1GsP zJiLsrp{m3tIT{T7v;{NeQlMh~CAlcePvM$)e>M`=UG@Zij*?B$PMlUYL5Wr&jXAZ^ zFTx`wFC0KKU#x&CXU>z0TG-)(iR^wzjQ`U#ya@?!>>loi(mbIVQ4Ch@1jjVLDQ?k} znp+yJs(m5RvFor^-Jo@1b)Br)@GPP_s%*F*YC2PH+BNk3>0M=$3X6X5W#7MtSIHf9 zp-I3$Qqak`o4G3}Om4CHZS3; zYLr>6LiFxp6sSqi{CmEZkk-!}S(21Tst~a-eFFo3^Xa9p6ZoHNkcx) zlp&*x)Qqj*n*I2mlm?nz>ih9U3&@t<<7It`%A!Qr{T`j>;ik=J5XUcL1MT2C>Qd}8$yZHtkk}#u&MH*MW*>jYTCEMg zA}hz7Ch@Y4r8|_?qe&+%%(8sC6mphNVp_2{)gzF;`)A5aBo)1Q5I=MLyQXEjp8v^l zfKi^VT-7%>FIm?s^QA)L2HhiG2@Zxqkl;G)e-tF@>WO7#2Wt|;3g0Ts&ARK$toU}} z7ilxJ78Pq`_~)c_)-sEk$JXx$^N-}lKS(*oDnQ=y@W!y#He>{k&lGNRtfdN#PTO<}c143q$s@QH2{St5y0 zn9_5+F8ruwofxAgp||Ct!AkRrEp)R;9&n&L^MMN^Hi|QMULZk!iTvyj$p{lgVVn%6 zNL{SuBF1u@RRa?upT5t4>^YX~P2b207sqN~X{<_wNG?G*UIznTM6$(A(LQ|RfktNr%#J#$5Vd>u3(X8Zjx!2*c zc-XRK9k>z)j?^L^K}YYc4JL}{Y5g^D>RhU7XP`&^!$+k`zp-L%Me4QQ4;ECQjE7GH zig)*Yb~e3zV27S-H^Zbp3;%2Vpj%YsyXOk{6M9BK+ zU8bbQYDYM%s;&&0akq8k|I{T--S|~YBPN#c{eUEsrC#H0tKY#0`xB}QkOCt4 z0g*1{hU=d4rYriNU60$d!GFA>ao&JpU+p0BRq1TW9Wfd(3?Kw*Vw2h6p`e9G)Q)nC zYl)HdA@(6|!JJKDylIuTWW2^iGLUsv8{eXVWJyQ_jY1F}HHn#&6s}ZBQASd)RIe1U zinfY5kN^b{5sX0Hi$G_}d@S38Ktr%U9@rB>GeSK8L68Sz21$t1DA6dH=@#h%xd6i; z0!;Ls6yB(sz=Up6)Io03elT4MI%YYAT_9Lo*Yb;oX$%QTVr?2NUolt-4NQVhf`khI z_LDk?gCu|us~GNXL?%SFFik=!1Yn|Vin>A|MmH%Vfkg#gg*hjyT(6k+BpgIm{kL7m zKff-FL!ob<=Ar^#Bq=Ea!SE{-Ks4+$QY70^xj6sjSW*bB3Is5cMS8=; z&|mF<6J0QXz-}}YuuBOro}a?^&Ont?hLMZ8XD*@CaX0wzMBmUp=VSiCQA^@n?IGB1Mi$)^x`{{2U}1L18(DZ z^WS!ybw9I@hrF`J0ml)73;6ip?JuSwwkHJ_I{v>VGYNz1&VC%O=Dtf5_PY-*w^2={ zM8s=tw0E$zyFK9jyne?ot+{XHu{xl+*5b<7EwtT@0L6tMW5ez(9-2fi=kl=&-#EYt z*Cs7Lkmb}{l0J%DpC5LK8eS!4?~RA|5a<28AHNS_Y;yXdGoG2EBO2hJ>;CDnn3&vR z!U&00Kz^8@VQ&!ssXpD9*JdDi+wySZbED4sbK)}Z=!FuGjycGsmmi)3v#~>&o%itk z>Lv*84Efc3gF!Rh|5sIURpQUE67%i9X+NL$b~}tsk`Q^C)efvoZhsZndUIxS5#8(z z+H~D7cH|(@0JvJB;Ax2u-xwNwKaYEN|7<;7c6!_H)8o)&$aC|!vNry@XGP$}3TiT^ z=P|1t?RsgC``?BV&wuro|Uxq3;G|EfI#Y_^Bkye?jvyLhHNNwy>6@>Ve)_R|w-mkFnra{F`i7XeLA|jizh{X>(@labv`F9jZ^F6nUi7+0nfi$)ks42( z&y!g3A}l|>^(vo$<=@->-~im%YRN>*H0=(~b4@bq@I%ho*HIkY1DHdSU$AR_h5e zz-_?G=}Sk5sM*dNn-~-Jlq=R>-7<(;dZ?IHAJF8b7#E9n1=l|5trx9OL=Muu*V|>r zRk9Vcq$ej;b|oWhmddc?N({xr&!7*Xh+u4vm>|-d$BUFxqD`_-QF<@0%*By!8>-$r zuu(;a(?u<#Ltv;ULxEC0(yfug!kUx-NMhBV>bOo$pD5GQw|1aX(ba8sUTHTd<&0#@ zvaE~x_MG!hNhM1&yUDk1ZhgaNyXL(mIw>o=JQAZJBZ0f42#I*#Nwia!wSwMR@2j64 zr!J>+YuJln-#Mf722H^uNvm&5K|7>9Wtyy9T4<^s+EZMyrv7prVA* zfkA>a+rrHk^A57)IP%e_Pa8HRzcvx^9Ca_o7X+W5my+v0zH2gVRnmYDlf&zdn!Zo# zH*ejy#)Ew^a2`+$a=pa`NVwn@6SDD+-e(8+sd-P=Ht#2{39>Z&PdgpDTK1i)7a>P+ zj})O_EbJl z+7`@f*$tb2z&(CK4twFF>-;uuTSBi|0x%hLkz9w^QbsQg4yR4xsMbo|m6|y{OA(7f z#+$AoOI9jiCU1~3oG*~E24`3jgh{c2v1Fda$$lg?7WhWfe`6<$lBy^W%I~LEk)EKp zmC@de0=y?ah?c!gm?BnKQlbR|bLW~1%q8IQp28@jd$-E^&85j2o@-_BVD;2!6!94X z2JsZ5wniQFJZ26U`vjMv$kPzpYLe41>J7pS7XkwJT7d4jPNitYe(r5Vac)v)hk61m7d^aKjHYQjMkG2eLCpWId zNK}1yrtL&`FJCv-g+cGFXVx&M*PX@7$H(Dc!H>UwBp$CeQD$F%Uwl8lc}Ii|5b)e+ zZ#w}3q)_7;DK=I&+aB!#y4;A^Y7kMEGj$&FReydzxh^z7{sf;Y*zd|1{wDkQth?lY!< z+lMK?d%^g(Ek}>3R`bPd{im^`q!Ghs~7^ zV|NDoj@NP4d@P>AQi=VZ%2#iYQ6~nn7(Q#VUeIG)(|b4_bT;#qwl=4bYBQw%NU95E zC^9omsVzcOs>@C;fCpU{qQz`EOMz=G`5?^vuAJs^T&O879#U|(qmVB!r`Kio(+znd zwGThY*U_ZibS+s1EMv_~v*zvjNEtQ`>v>$9y{OHKT&<{NDZWN%F!ln$yka6@;33_9 zU_t_7A|lF{gRRM4{qCPGUuuPzNJX9Y=+U!KGN_l$J$JLCOI~NM5Js^CbqYA4+EM7X zS|YfTs5}fH9_NTEd@7sGnAjkQZTFg9lb6qA3JyAgAro`590_7p2mFc+3b@Ib`3H^o zR}&(>J+gWCFkkKOek7P~=sH3dFG3pyUp9y)&1kE8;ouEj0MA>J%$~s6ol7zXq!Q-2 zj{GxO&sTga$}+N(6%3314g-%u1FK|&A|GfY)nW+vj#g3(d{bw^%I*VsPrcy`I=wfmj8bWUDH5WkfS;L?A*Ep_Z#y-vgix{t+a@=&*r@H)JnmTWP#0)5w zJ3S9qB(<k^H+AB3U zT7<_^e`yZQ56#j5Cs*i7knN^$Q)vdu$K}gZ>#VE`9E!xV%*~4~(Osu0Aq-*$YLLvv z)Qie?2l1p7;qrKmMzQ4xt{dNv>7W|A)~{PA^w&p4Ys|eNF>1ShesrhD5@;B_ia2aZ<=qSh%QzLZvBSjK)h;{LPWq)hxBy-aKe^2=t`7 zn2J$7&c3G9g!P*9_C)6#yC`vBY$|W>r~9j^W6ED@{>v}Vr%8xm@&YtJVYyiz^7(T8 z!QwnQ5ubgL{0$SHZILCf>QeU{Rs~-!BHi6@*xi(Wl@|Qh9{=KPk7H9_lIRDX%=7c} zjWfd7SBJ7Y-h^@AZY7q%A+xwKMOslvX)H_q!M(kR@e|D2Djo!y2vH@!oQ_Hc!_8b| zRL(c6(h7Pr2{9C4iTK&ZOYK7$hr{Fo*eIIn9Ltk!?XyVS^BD$Od>8E))fvYsS_6!) zL~%9L=ZsRvPd zN^?xqs8ukiH^Tx5mvM132I4xKf|$3+5aPgFF!eGrKBV+Y^Ey$y7+2+Dlqexd`Ascp zkeM}4RD^ttMp@a%U}sY~fmNuYD@GRT&D)mB!@edJPm95&;kjggIcq$iIAdW~XQkVF z;~)D@Z~vBFtrHTny}9PTgjGzCqNO=Yyg+WevbtVVJyg5qQDmYg zGNGw1;Um#GiOc;N#lXB1(zu6ffbGowhJIQrWB=<{=JLkv43WaGGH+{aAah&DI7RLv-*|dJE?A%M#5s_Vmh5>lpJenL^$fhL#eTTvd!ps z^ib9qgkoknj0`c1*I4otqzJ9eLt@J8sqq1Tae}mS)ZV+KPhp{sW}`N82zsTCU%p3V4RDuoiZ9Qdz9c&AHwF z-O77;+^34SIolpM&G1H%z@Kx8Eo@dBB=WzcbH?rt;vK~0kI49lK7=T+#6=WY!ad0% zu9EDtzzUt+>MyUxn!0*<{1N=QjFlawO~f>3wDtx1?)I>KMAAwoTY5_t?|QpEHWp|W zizuOlm(k6lVb4mEAl0of0Nmj&mp84`+-6ZiNI(hX#?z`OOTbG-ph{{@9uPt%>meze z`}+gIX()fY^~EJKNF(hR1;7jlq=|vM!11xt1TiKHT~v2iZw#f~XVQUBZu^pkTt$=5 zE6GrTxdv%VD0t!dctDbjZo*&?jkT1vb#rRF{!Ms4zO9^W90oypc1gM2l8snz=)554Fo|| zNHrM}KVU^?88#|n;tz_?;-bb#VcEIh z#o)=lH*ux~uIWaL(KG~!W6ax`Sg@U#-&4#(u5VR2RgEHV%kVHC`PT1^#aPX`=#jtZs zKmH9dBG58lN&_q_$6G+Z#aamC8U3n|IXHtt8pAC^IxD6ABTz$ubT^QJ)_@>5q1N@} zsDPrR@6a*j*m0@pG~|z9Zq(j z)>bwDXPvphtwz6(Le}MWauD*-L=1)~2p1{c36RbPsm znJpW~4LqjzIkzBF%J?i1S7m%mGdSwB8in%|uPu-|TX^Z>sl5KYx;c6H{h70Ce?|}P z4oq^@gxT=Q_@*gVIL>Vo&!%5Zzs_>kDz#2=jzl_0%-<(3;1f-+7&l-$g02W53Tw6~ z2(JmIm>?4#8~$90)75w~Z{$!$5s6*-Jfr%4yy8+yzYVVJykEI(dgre0;#j4ZFw^&L z2vuDvCDI^OvQM5#V5aDs=}J;`)xn$d-dtq_mOq|Z=~L3eRrbXv5dcqmlQj+K2Jd(J!Q8YbjdnpTpQbORqM#E_WX?uKV6eD?k6C z7a&VOK@`slY);vkHZP7_n>pA|za`DndjHmGp!j=po?SN}RVB+~<9i$}d2b3$KbSfk zSC)BELnGk8TT(3}THHbgqkOnFg@8SR_LZRS`|+=hI(w_TepAKo+Xp|CRCM}Qcul)-{QG^=;BO)VQRDx>zaXpF0xgbYu z&R>PSrMQTrh>qARvh};#JNYj9O~9z07NtQUcc#nAshWZd0|vu#i2mq z-G9PxlsV9JxP(6M*~;agb|&0L8~WoG3Ex!=`r zgIbcsnhl&Re!4Iu(B9DYGJ5*6qiB>BgB>g#h)bQ0^c$BlqBO>vDx_OeJ&*m16rX(` zy&1c5R-o)EeF$%2F!NXG;DeWX&y64#a-HV@CzNgv*OsFW`4p)uPQ8gn_8a4!B^Mzk zl`Dpp6h+sTwqKm-+n0vtik#~lamPz8^7dnOR`O|53m& z6kU@G?xgaGF-)zwGLZicu;G(pzTvMlnerIHRZn5w29zS@JUM#0)fh-BN{(eG&MxEs zq7ahB9tJ%sbkavdJR>DP!AQe}QzmXAPV9880BglwXm>n$=5K&-bMHzMd)&k}%C;u2u(e1SRDgmZW@$AE!7!uoeiMMF^l=EEOvBi z^V_wVl7RffQF?1M<{TzSl1e5>3>VZxOS73ZHF|X!WDCh~9AGA)bEf4P^p@){C|G15 zwIM^m-|SnYBHX~poV_gvMMTuBhH0Ug*sR>@jp>4t1Lat$jm7$rj9grd0t zI;x2?Cp$d3+bcvw13p44FnIrl$YoPTxW_B!(H z#Axb5ITyIuY6?XuG=fAmUt9wbfd?ohuaT63M<0v}LV`NbZp12$yo_erp47ZZKq*M|vDXygDFfKh33Oz8fp}bBTUs7x`5H}Fa6FHt{ znk3hcOiZH-01opFI`B&+g{FW4rDAxi4#x3@aT(;~>E-cgEX3rJBDN=N$ZRkJT_Rft zl*IM2gazqzW`%ph$AER+M5^QORR91NE7T-hghUz}*zyD-khTU2UeR=-p`}Jr8vkQ8 zCJ?0>#*RQAoFXNGC<$OJric5mfpGa**iA7L6%)L$2jAzwFIwyOiG8eLhfmdNu&J+y z@$f;0k=jgM@%jmK8C6LrwSrfCk{nW#_}oN*)IlVO&fx$U2!R9<5tpF|jA%=Nx5vhU z3`USo0-{w*w_!Ch*4q4-A?1;x#gkYOU>O8N$V&n6s3X}CY2^W+nA-fOW6IE!Nb^hw zxq4+~xBy)ZQI3TH9$i8|5*dN!is*{l55`RZbK%W&x(_!SVQ#;Oul`^{2!ax&*Fh|C z2!KhUISxRC2>QgQprVB9qnXA5jH7XSP-w<)6w}7A7(BH5DgGj*cNf{)PvTcy68X1Z z)D~ZbNw{=Mx+L;Sc+!mE6Q*-Cg)cX6kDwoa2g;AdA9KhBN{O6_g3$mHrY-{^E(U1{ zjmH=o3XBH*Vr!m>%NK-ncwjx++$5?9?!e~c0_ub$02-K@Wj`TMOb$(o-hrHQP)B2J z9!IyQa)=`{{C z&q?qR=T8t5MhHP5=AI35ddW1{119(M*nZJA-ZsoFT&Y(m;30O>eDdm9hk4Rw?n)M3 zg_AM$yZ1t)zJ@6agUAV>GTOQ)G^{>Qn8YyN^m{Qeu|`;JD#<{X(i|#~CC;6z!R#F4 zK~d=__Ds4#C!ul%PhvVQG-}8x79LWSgl{#ihCHIo)k5+*G~A;uRsj#RgLXz^C8?kS z%7Mr!oTM14P-U-E#1NCdqat}PSj@R{<|^q*qNP>C{NHXp9C*kEV5u~hP^~({?ZJMn^{>`!J~R^rttH^UT_L_AY#XLviSc zJ~SLfvqaey;al7%X;fI8WmGqB_VYb-woPk~gvhb*GTa}+{^3$}?T8RRh@}2MOPpwj zKirdF6E0b?d=tr|4_8FH;P5L$Ar!4ui*s{J-=-ozc!_9fyvCGI!B6=SITInHm#LvU zgX_L$`w+f7r{O-4aQ4x1$GJH}X?;88*LI|JUH(E5n~f#clv0p*2ozX%Kboq;7gpxC%>Sxe*gh_Rd{-i4V=#4mj42eZ zSj{T2&9WY=)N;2V4+!_g-3d}TbN;$TRJ4_E;sn)u>ySJHH~L~nXfraAa5Xb0+sXf3 z`AfS^KV$qIJ+`bRk>Q#cu)+mpAe&4H}Qk$)mWR?Og~w zgXqm;cqc;>B+#Y8G3D{(6XlNL&fYQE*{s-y)7iftiINqSpy=dI6zK@j`S(_fnZSnB zwgcU&Oe%^zz&@Zi)E=A`BV&PW**bZg6TaOn6M;`#gU^tw@f?ZouGk6-Dm=Af<5W@- z6R|IB{w3d-3IZf%z`KW$g^@iPYC0UqPQxH6g%Sw)Wtn-8?xd^GkKbFX(Mb*-No8%- zpv2h0PGQlzoWgFY`p?ZC^G2?E$@m-FDhUHC25A%o>Vgz0sm#ph4-KM3^-8=MYX|)b zs`+TPLdb{jHJXe30p0nb#7um&X5SR1#iW2R-brr=!RXi&@jukwoFeXJY_cp`JAy*1 z-a{^l~Mx zq#$3c9a$;Rbm|_ql)>DAW42<^pD4k0b&*hL9n}*vV_)`PUwhKrIrPfvgY-S5DpA}7 zEmK?y50^yNb~M9w9v*J7x4RSIH`hGGYCv&j0f)VLHivAi&)&2a5`d~@*APKM$~k~cU!V| zO6YGWPPZPH|HnSjTubwX`N9RuA7a>$u)&N=VB_nY7RIkR)EwfBnsJU{(!-pT@O>B|Le^v%s( z?er+*VsK+ebFB2VB%+JW)V6}6h_G3UTiur@Q?12R^i1VSj(;*kU$rs{2}!Z6eqv)$ zVl*4ro`9?837>&M7E3;IOC3X^4&;zD9g-AWqpoA+PBwO$3}uXr&sP2He5WjqLBy~w{&Z%>)Ia~|FUmh|FUIyw@o#{ap=%ASWtGTBWNzDn3uF$03z!wJ*)b`k|DawW@Wlb~W-zt5i@Wm6v%v7+bkqtjn9(0c! zWp~|U?2mF@uLrOI=#jUg9;R*Lw}7wA;vg~QIGIEbS^9dfA%al`iMOtAkAy|KOVXSb zT1klU!+yad*%Z{6EO7x`;A5fpwzAJ6z`M;{@4x)H%Roox-}uBF!91u(4j?8@{)k@T zug%CB&CI%Im&HuM3rMABHUi?NGB70M-4XW_>t1lZ{@3wC4$q6^%@}N;ziq2*Z~m*l z#5^XjEK^5`J?=*^O1y}(_@{f^XTj$z>vu7F1RevFm;fC5tVeSl z`S5xGbNve=5N*37P_7zHXL!!j!yyRr)M3qU1i=1R4FK)NctGWHnJD-#r+(&$~( z_HLg>Qu&%E%=k}B*_j8Kfl+9zD1`hn%n~!XmH(g8Dya6S`aZWM=Q`z}^^t#7u|+;M z5bIk;#u$!%Ak}>{u_R25W4st{*D0WyF#gKS|D-t>h)N&s%de{UXcG9qT23kh7>Tj2 z;{-U0H-}91B|QcBnF(*;;D&=4+3noeqZ6U@;<@nvW@5f{VsezGO9ueIZTJrgcUkrb zWQviIm!4vZ2o;M*rEz<5tKW5mH0DS67v|Bj`7(u{PHafpxa7cZ|5NU2=Cs_+pD#=8 zW9bHe%6d%o-^MWcp$GNbiU$-o-yact1V5}^R+&qYdUncc7?4w4R{g?SQX6mNL=sG& zb5Iw&aLU~3^NVCv#^#Q*%}xMd@}Ww&`;U*k1f3Rn?_S%8Dov0Ej{f08m0>_vwxVjB zeiNrWs>Dki)hQ1qW+S5b8uOKJ7Txgt8@Dxp_@kz3dMgJbJtJ@A?cBDv3W{uc&#mrt1b*)$D#5Zgak>DLt7lD*;-ka>=44Ip)1MI5D= z2k;5rFcC-!GGMTxTkhvkC7-T101Kto&rrPyM1@r9%SM~Y(LTv!lcqjL|A9h|iPbM( zz{H=EKT1&!=#!y$^pGo{!67A)-5>d=XOHxZD<=gNn6YG-%NMaW4SavRM6<+w>xo{m z>)=a`FQ=JO#l}R9H&oJxa`Cb&M;bzL+(e%7!?1ri9TOmkN<%-yJ0!Rx=E!QuYKS#J z2Vl$~=JebHW}P}7w3k+tH1@cm?SJmsnefwjF`z@-L_@8peu%tv{Ga4c@&lLI!R-Kr zfMvQvkT5nbAw4$#?XLlX8^=qB(1UG*MS!-TExy_pBXOUhE7yrM8kFfiN|jLVGG3-{ z(SUCBPGE#BJq0}>+Bm8J_8LG+kbyVCDbguC?l+}pQYN6{MLrW6UU-x;r2{~081+_;39VE7%Qp3>ukYK%@)*g2US<) zDGCM8<497Z15x;g!pl-$ojCs2vU_BOv&~YfDU9ohpIWz#|^&&8TEzc{ye&GuMfG7#65p6X^Owf zK6O12Y2US6{HZe4ues64+&1*7VPmN9zJLy~NEbpO8j;wr5!Xa}yQ6oSCA<`T7WcOD z5;N;L#`r0G(yq7?{_wfx+HCV6iR)gEq&o{mn$fEJ^qtvgh`t=QUq zQQ)Ho3$Z;)j3+j8C}UX3@GEwaX!7>nPss}_0Db(CmcjJE#5GJwCEN2U<_`cZbCfy0 z^uhOkrm+c&QRU${Ssv+T?Bs|vYfD5FqZ6wMbP@>Ry}(Gg7)l{g8~PcMq**H+-0o4| z{9$pPiZttBVl#Qb?W5G9ti zRlgk9^#jB|)LmblQKcAs z$)FEuxi=D`Tw+(g$h4OK#Cu>hsl_ChO=~&hUxN3U!u&smL&T4K!v5XJ>}tEA=R^DW zS{(Mr%Qk~c&3r6uG=RN$!W+7+X_|G2+%}4+9L>P11i2>pPIE8 zi`(FCGg!)>J2l3r=iy>HzG{&{6(8-&)KNjvSdWWL<9#QRDsHnF=}H6!c^J$kU0y_q z`j?eIIjUv=c}Yp_Y#cBo8nT`^2xuoU2j75@&(kNrO;^#-q?K~uD{$PGj+nt66&A|% zTnEUG*4CEEXP5IM8}RYkvr!!NwQi!V6@^a@ykgbAW5jcezm6BsyTJXAa&A>S2MWp3ihk~(q3&6!^Lu|tO2Kb|DLa{6ja-CSmUCo zF9{p1;%m+Lh=OYXf-DC*Um+f7{ns8&K$yrM&_j42jXomFh-Y`hcrZW-z) znLt0B=}U0AR2s$j4xn(J%8iPQQX20}o3W*FjyEEw%0a`fj-gMI8xT0bY0cT)pMs*ilA6$C4oE1Ido@P$uXvB8 zkh@$S9_Yau{DOy0%3A*(r*4FUfDy(I;C|kjC;WJ5fjETWt|Fom)g>OUd=Q&@F zm;cAM=U*>pj^kH2VAF%`i#j_&@mBzK%$jfr?RG6eq{@*#CJ z5>!MtqnwEfgDbWuV6;A2;R}YTM$8Wz$-M>#1QZf@adtOW)NA$&YHoJ<2^4e%9FL13 zoievFsndBuwmFT;YR}(Vxtkt7qGc1s#&Q%%kyVk#(B8M!WA)q`$^i=LDYrQ_O9?)^ zNH_GK%b3F5iNziYJ$iL_aq3Xjd)~4_rcqe%(*0pMJN@!zQlyBYlmMZXTx5PA%?b4n$%FBKG*~NNkC2FN z(D5_!=x>h8smOWEVnDN%q34mQzX&5TgoVX{PD{BNVrSL%Dn)^5Pyzh0hN+xa)MXVjB7X- z*4t2C;I~+Ft#l+cYxvtJcsIYg-?Z)YX4gR9VdqXjCZ<#JgevUzc5l0;;6(i?i>)d? zweZ=`TYCAmUxS=}xaAqcYDtNXKidwcsvOkWjEqeR&O`^AYW^cDD1Vbj1SS87=iAEA;mtTfFG*% zQ-yn66y-7#Mq(bbKRa;nr7yea;K5!MQ#B38e9ELI_u^8i|;WO7ixl!+Y}$u zCJR$djB~G(lWj#L<~NpJo{+QU=)Asy{{{r~gubRUpti)cL)JTPS7vuHylIw<4hn>} z)%g2+jilw6oqFpyunGQko+=uTCWLd^L23QuRukYlS38TfZEq&hq*TuF{y*2F4Id39 zJ=i4kv||VM+~ly`(j<fkUE6Bd0(UJ*;C25jbcC0E`qif9%6snwUZfPd8dxBd*v7 z!@KW4Z&L$qnL$TLL7XWwg}46ljCpTFuD zbImKT;B%v_`ZeZFDDtG`wQ$n3*jw)ezQ6Hw+gyGpJXt&970~{RySBD4&*%`HW_P-J zyfW@tU+p?LnfmZ_D*rtRA@|(w{Nqa!d$Y&Uhgvq?V;8Mvp^xCAwP&AdYB1WKuHHei z3-9OqkCr#H;jI_Zoik%(wQI*0s;5Qm%?=Yhp-+_#OUGhw)Y)B;6-D3(e2%=X5upZ)MAR(m^U7YIxLr6pk=V)LsuAD z@N|B)LrRoJk&GVnaF5=9vl|xRdM2~`^T90#H~j9|Gk6vfsNN#b=P=S42N3R+G zDw4Aq0oUUEa5LEdG(5C-V9mSeTXrsEW5%?TY;M45ufRy;a&Oj#r{D#(3iA_|*>Dmv z{IAM)<7GZ(5SpF!zi%Iz&H7Wg+73stY;*x50h2zA>q^fP`S(TUopm2=lwbbE!kF!O zr02Im6tq_dLQKZ;+)rNZEyAwXNrpJvgCC}P!_Kz1&pLNw-qGcVoY-7A6NFwg zI9ggqrgRjjFUQG6O3mcH2516byk3)FTWGQko%8~#~mp-dN^_FoxcUWUPj(;GBUp1?GBRG3${{BS*Kdld*iBN=kx=Lj>JS0au#f3u1D zYvLakQWHgnzi9oed>?Hr7q4v;vMT;(P<(XIr@H8SdHJC8N>8y)Te*K+_O|~U@pys# z4m*8zlncPDLN#3e(e!V>QzT4_hvFpy@Xe}Pq)4>sJmp-PDV?;C9g}%3L=%V%HGWP~ z{d>>%aYp8m44(oHnIEUmgg=mTY+yNz@=Dq03`-ZT<{M`MFv*cv_l&7J-2=X5Q}I$N z)Jt8d)Y^alHQoz#=$fDtE8dITYEbHc_3ys?9r9TQZWBfCZZ#`EXr(i=$1$hbj&xLz zq$Tz+4Mxj&zBtVFm8xy#1|ohF&ZG?}nsP5;tf#hBHVFfPU4AEbU#UuvO(QVnC;V=7 zbUi}1r|&S<(E&nzuO{a=A_W=%k;U2bx5Dzsfx{V;&is)HJjyQ{Ne52~cs7IL zTgT)>4wH`C(zT8{SELoS^7JzGoa2IA1MY%CLi>BWg$-M>)Gahl0uK3cNzi;>z&n`% z-daOnZC{PwpIj6Ekye9)?%>gH{%t>+2Dp^|Zgi8AV#q-)_q=HF^Pe&ZwUcAu=^fdI zwtzxj3P-^fWsS0%9NUZZ3)2wLmb+LjXwOr9zt8f|f167!cxi4G@AV=uw)p0Z_$k#hJ@CD<$g}^al}c84MJD5{><+*m`1vYBUJPl> zj9a)7Xbiu*=sVm6sSG-QQDFMV#~r`?M>b*FZ4!gh0OXt|9TdD?C35hpH3^kGVYqB0 z$)E7|Bqbny227>D=xYC7*h#8+q>2%QQx3&nk_C6kQy}3ta1`PNOk8?YTUq6sX>ei_ zgwcOCdzc9o;jSxHdAt@Z<4&zJu=e;$)1wEF+2QYoTI zn?=i+TVXN8xV<*la;56PLhfYMm48=Bs`%7DJ`8|dpZul#D-7Np!!NkEjR-jzfDF2z zG3WB(+fp@w&yz#XS~r4*eg17+<7=Vbzm03ESPt@VccKkkF9$BkU2RZ$5E zuIgFt5d&k)EBjasrMmX{;D618o5<++Oh)<*YtnaRVC?$xoSRg$r+;!)hM-d>r3U=h zAKHxt#rG23lBFO&4G;|Lp?jiq8Y_+L)ybY8O?+%b{)7<~I=0>vHH;`dg!6)sKQ& zY5|!~7xDWs4`X>n**n=huRU*SOqJc~`}d@`B%TpL4xt;i+(@!G5`}}<`G*UvDg~a~ z7e`XcR%d@`rHv7Zvv6I}YTYUrjmzy#ONvz5lsGK`@~#Km%KLfASFk;8!J$9V+OE*dWqie;>NZ`+0yX!q)#+?A>Q%3vWPwPn_L8&PIc*gc$c@Jqf z<$f3dwslwTsb=L4TfcbF7Ymw*Yb}o263a;$XUC8%ciChcuT)b({JeZ!nUyO6e;+if z?5vTE%3R<}Rs2PLWhi$H)!X_8!(jNt%>Cr6m#isELORgUe6S;D2}vlcKR;I0R3g#*G92vCIVhN*_35u`IKCVsg`t4 z66@w|QSWk|t01vjG%7EjoPK@p?iYRHXRk?0NG)&jAnNgZgT(lS|4n?rDO&f>QXpBj zn<3zo-=q6ySES#{uy%f)#kg*l+NJ!M4_VP#MdJ6Ck_h%InXHU-5}`PL!7qJrCT6n1 zfV(TCnI=#gCHlL*+Whpvp}DQ1qM<1w{!!uY~^IM%E+AIv_5VRjWiF{EnNVUM8+} z7{Lf2w(genppch|>&ci5!O~9G%50@%1~4{*iyjqah{Fk2w8*p??*>+LKG;zfM=H>+ zYqeRGlz&O}eNhLy$Au8g`mY>~*8IB}+(OK`(@jYL?$Ld?0m zuJjqo9$&sCG0>->GXh3aNdPSO{jQ;ngC04uau)c=O=BjZAl4d{h>F76&x_h>RQLaK zaLhmv2Ow5rWUgRfLAS)JR09AacUsXMi);b1q-X3861smCs?sofTszR&Ni1y{G5Aa( zjq6~?_{!I192^`33bB9L69Z$C^>!d#U{7~<@cq@{S%~Dnx|*1&m=sljiRrQ)Egw#t z`ca&af%vODbE5Rn@L*hxf~_egpfPF-7>1H4Gqg*pLLbxWh{F1oI1T-~z^gPRAh(mV zlnH{q+<0BbR&A@;f|#L%ONM;a^AmB!*LHhmX25etM1m@X36It6h@3}<6Cz=Jyxlc( zbO7BF$O+FzPeV^nbZSLKW_ZsBVHE-M2Iy{Bosre{Z*MycZhn;-CZ4(IF$v!YfUWh zY#Uc3UE?d7;ZM$KAl6o->Lha;xly7ZVEs*Oggp9W_#iL`Q$quv)utjbXGC<40^1rj zoQaPVO%WFtjf;khG5v*s9#DDk8ND@IiL77RX}bOkWO-SEhosXTnq?fmvb-9@P!JIS zKw6zpK_yF7JQCu{?jJ-`uk49!B!J2I3PsB9Jnld9gYb1kAThw6GAfCc=mACX|A&W$S zw1!RmjMATFA%yvOn!m6I1Mri?zMp^d_~)?J$|tM;$;CeyE+3cuIdfhcfVG`aqi!o7 zZ$89ND1>hB@GC*lVz6K~708T&EFVntuy?oTXYF{`kP7@@x}7fo)=Ocw{K?3~iHFwL z2P6?;d8b77l_cXQOX`qvLUE$U=oUPVScVZ}C_*t!QCmz~Owehtj5kN444SVb5Fx0L zkK-xNy#1rV5eon|w4)2{&nEnl_|{vCUrx-s1SrVlNN@9;kiI@DmX6t*jm3@?4UCS7 z^@+Ot193B+smJ)tG<-DlvwXS?v9dA}nXEtu`>np(#h1bLHGaW_s1R9l#+0+1^wZQW zD+^pglpNbc>$mZEsRJnAoau$=iP~U9BkeWVf@tI!k)Pfjq#p3H9NMc1kW(aSDFab!t&0469h#&|*RUOEWYuDvdxlq2&t=Jm zHQJ{_J(*wlI~-WdG{qAXgc-4%>SYjY5`#G+64}g4eC=;&fGLZAXp^j@hPs3i5%5cD zh^X8iFh_o16e=J%y|6fG>gte1ie&^O#UP=XsYRKRF|UwbMoT2&PiJFs7{TfQZv!~G zyX5Arr3JdtaucFh<#H3BVO$Ej^4atCT)LZo9kZ%;|Cyd%mWnGfxWM?6sqwM4*RWaM zi<%$Yl+QikP4B79KO;GC;WC|CfE~A!T4blW)t+(WN8|R-Co8H7tOdWpYotL762EzR4rg;B%J#8%DbW53g9o`yH#;pP*e~2m zO)I?K@TtaxuKxKm&~^7^MK^0Q=gT=Q!Z@h4#@`9nKzkMicFm_s9X+#XA&5N z-^z}qTD|t~hmS7KKz=Gt4%=03G*YsIZ4e1z`n$uQUBHcXx86n>K{by- zJ?x=5CSuk{l-2E+wQI%%pvQqm=;AjUzBHBwzvkLeohj{Z+)(LC<6>k z{vOG_IxjDOc1@EP!k_6v>&6H-G?K8`2_jWIwkiwS7wbG zde>VGTNs?U9(-unsL@em{IcmTf=c09`CKf%4YIk8_D)bj3v`nPa#@GWdWi{?@*YEx z`T0eN!P2#Szx~wtdRH5$_elw;w&e!$!p`?XK9>pXaq#`#me;Vm;uF+0kk%&tHc~zc zi=>R1SjSivbr6>tJ@K8gG4Q9LwG2JE;`%hjoYDvCQNj)>Hz~iMlFf=QbBxKk?v6i2 z0k4wMRMFNWFlYJSMU}}3{OV;&QZ!$iC!QcYUCZZO|6l}qh&z*PXl!U=u|8b0wN;su zxcQ~p<=5Teuv947g;<0(L;-VV90iw+A?=%kpA}8OX@aq*&A-UC-fvrxVa+swoF2x= zEJW0xMN+}daDT(E1M>C&sBBYc`AOQN}>61 zntaoys;&~F^Y>^R@=?;6t+2+?2@_Yu1SWp4p1RwLt+}@8M!O=TdlaRT#T8xT-4;`M z@PMF6PmNjnORH}< z6(rcG49ZK^&tpn=;!%YOk+NwVPP*M$>ug(M$AD%9%#X(5F6#P4wEanYW7tNmEk8XP zOC5_cP50FtV2*JvlP{?|*J{YL8?s+`Gc&aznimXtbOn6z7#@j;Up&9U!V+Gf(hv@6MtdQIYO?9K2b~Q|BVNBkq`G;BVIdjJ%bX zc#m(ggxg(pyf0XT*H*LLB~|q4z&nxyljz4c=7h9Sbd2vA;91=7B)NPt)_ifK*udgX z+L_86g;ug|POI&n69NjmyGzMFQMj{O8Q(~niCgPHP#atGyk;)V_ha1ReHC zJ0l4j1MkXKC1Syie;fs$(^dpARUFO- z&q*q9Lub}h>c8S=zwSBsF5@1Zf-jXa9K|s$(-xKA^4E#iE#A(gl7(W*7h8bQj4yYh z8kzH}Bvo1E&dDe_GG^se0DD=z$Q*?n0|il2rIuU$#2L|vLE)AV~Y48 z?c-F1x3JEb<9vL$ylrlU$0Sh6uz%7n3Ny<|nH_6nBb+a5H5mC?0+Zn*M^VLLz88R4 z)=>Yk<&}-;oZ!$jw^6!n;)=8A61g0EIbr`sx|eHPA3xUv#Sinr4*RxY^Fg5`KKmfu z<%E7g^|?$Ph0>Y&!x3))qY}IN96A7fNMueBFPw8u1)cb7E%at{*~KyuJgCAR%_3;l z7P3;FDgV`Jt+D!NALITSx0Z^NQPw(|uXqN&f&6(%YH?;dkdR{EbgsQ;k$ZY$d4sG> zuyp2|%y=V`HPPOqpOV6jtN=ITvJ>~9a?+h-IZmh%#M=Emn9JlCSxH@S{)`% z7*xyfHf!o)S&@BsOeP1sq78i%WZ{slpvra1_0_i4`ck2!Pb1AXCp)C0$;WSBgfreu z?x3U6g`AN>bDxwuLljL`F11@FL}?v<@iXbfK40XB+(rl6D$ZX-)FHo#MA7Vnb9rW# z(+VHeXhp@1K);r%+MGlK#rKC*kXBb+44rnce`WH1^Cw;(Q{y}2hm87#O%bz z&Ugax=Oj%q{QX-lTApz)PCBaCMpKX{ppU`@Nc^revbci?>1^iF}+-bVf0Zvy61+XFM03(1w3CTMmRt+ECtBbi~Iydqn z3zN@UV`Tc-upzm`M*J!Z;;trt+mGALEzcZc#=kIL(r9y*H*wlc(ZVu`-Q+hBZ}!x- zblbyC90F7#E{%E{sWyabhPE?1``o|2vZb^^^h>~Dv(x6uuoy-zzMwod>I=Ew2j}hH zWKrvl3pTqnP@I7N+1)GOP9`=9AiYQlS%`u#^u!fEJF7Fu`YlmYFzw6?1V4uKn1JjK z2aF-^8K5s*(#3&Jq}V>~bbS@@7}y*O^Ld6wvGJ96y&7`p8N*~-9~`TCMHl%t;}W~k z7)F!4^XnJXV^73H&e$)+Eg;#?(h>y8<9Hm@Z#F?yRJSQq0xj&tJUN9yuPa)phgj*l6Stylh155hts|Ed^M?yZ z3!P&ecE%^= z_;1C!+=h03|8Cbgy0fs>tu92XdD#YD1QOVmkKBGQMkOv+zjf#S>+hs4Bjbw$38~F;vxZ7y~{_o$7 zUSJ%s@T1Rgv-Fy{-i|+|Uw89G%d1?D-b=Uay^F-Y3FkJSYRN)GOIHQ$?e=gOOl7@O zVN^hMCmM0_M^bm_#TPuc$EP#U(_Ilh3gB1w-MH|Y`vA+rIlhA9^7-u8XAsyp(B!Z* zr3QL%@K24v1VQk1qlA2Tp$oJy=tdY6dd;gG1aYo26D%-)c#?#KR`gba0=5P6Hu8N3 zdq9YTpF3Pu^(TKOr8lli^^X1P%0Ew11RV~CA!g!kUavsrd+!a3?m@%&sySUdBuf@y zPXz+8(faj<(#_S6i^8;_UKY*-JZ!XH6J((engSGF?#lCX`kAse1EWfakJc8oVPCWu)a5PStWKO%L|dBW0~`?#K6Pl?wc ztQTH+?ZYM6O<#B4U-x9cVS;!($+lQ;(By?Y<%M~!WW)WJ%FbDG0O5>d9>X?8q1+Pt zTNJ`(5*z{w?fY?>(lmu$=gm|VdN&`R)cp2j5Be-rx2*3P!dxaf9|q5TWbL@zUER zK>XGdLwG@0NHzB?aoH?Iw%N^$8&YkK3Y-h?pSDvFE{YuOK<@iT#D>?5AgIIRE&+7k zM@QhvzPsZr?KglY%z1NW`ga4~ZtW~eEOR_PN4<4nwnxdYdjEX%-iln!tIN&f`+Hu$ z5fZ)jOAW5+y=#qwML`Ee_M#U8d9XUu>n(z%?2vEAhx<#yZ`vFdIKTLeXCt;RKANRi zeC?Oy5=S8MopaCBi=;yAwJkI+vtmy}x%Vxkd);r!RBBqPJhlDQxFiQ7D`t0Dfp zh?{dfi>IRf8(;6Gp1ZZhwjooGB{`Tfz|!oY^>Mc^wlH`TQ~MeZah~Q(YW_yTx84o% zS4&FRNo<|mPgE)Rs@>AsMN-}neix$=QP1w@qTq)a13y74J-yM#mB}wx;8z~?HGU8r z#8Zo68-W57s!Ani#{v8dB0VAaXBr9$@!7An>E#%9h0iegq>U_(OZ9$)?_ep0!taI& zo-yffKJzp87&w9Pj6DyJc?G(fPM|WNCO*KPM!N8KG;10US%L~^u`DD2zzC4y1J@j9(I~OB^^ARUya@B zHx<7h_E_pbK$y+^%FF|y*A{ZsNtv*j?9h8*Doo&G4+J4XXaMicU}t_7CdMlrZ~_bX zxj@fbc)=9h?yknbtnDfxfeER>0>vK11M4}QVVlS*-}q6Q@vuAT6duUxvifXBP7~6U zLPUkNcIi$c@s~R`&r;xbDVlD_^b=)vMfZIt<9h+J&_&6+B!gQ<_}=M{=Bm1O=;^x! zAmHmvpD_IPez72}!Q$?AcCC}F_eK^2_sX^pho>6_@N(%9Y_`PR>3LB-fk-3TcYf3pOo$fOB^e7xc8`p{oC_9#h33x}RYxpzu&A< zCQBg}HQxxnhwlr!apE4rL#XIhZ--)9kHQey(JV8+H-+4!I=5g`AfGY_-p9TWX^`7t zS;>c@M1@t1-HH|h>4))HcxP*iYE_WS1qbXTZC+Og&3F&R?J#RRxm0n%FM1)?=->Vx~JQdfO)~NbX86knR#$O^H=AA#m zgZB%hdl6e>c6z^v#9rgq+>gSF0-e1a=FQBsf<`N8yMtVl=OW(XVZiGAA5$#g+mocj z7NK63Q8aDG?bitwrbksDLY^KFu-k1OP+YB=_XE%U0n-vU$Mt>S0BOYUGH8@`b3Z1r zAbUt8o@?O!`L3pPXZKRSIZox;HJ#s@`(geKR}dY%twk5^FtcXV)I8Aca7IAuUwqMJ z0dluCFJ5rJ9hoeu9eo<2SzWd0UH!{Iz5Q(LS?>v`>)~wG_C%)MW+JyBx55AdFP$>g z6YuIrOEa(XxD$qNr{v{z2Df;rI9KfS)OR5pv~c`r(e?Bvek1oR^mJB&_49!a+a$wm z)i>`B?DOgzvy#fTO897Yq_Ejj@w;`C#ZzeD_MLET&q0ie%U96%9+S?_=UukLI8)ae zv|i`4|!kfogOm6#NLZKT-X&o9l!KH zD0hGzn;`TLAC2ZzoxYwN#JH@t++FUQU5~!rcv`erlmK;%u#Is0#&n87lY^dDzkQLf zMsajhEq;1BUQq9jb#r~)y=dXRq`0S9_@T2;!|GNo(1_d6xK>} z;=1sfkS}cGWQo*w;^^%3gR?RGfW(9}yB&iHnta_&(SGDrM1=!D5=ZGds0Nh~*V|}! zQsN)4-;LFZE}4Y|>7TW7J#-mJciqRRy4Li^a7{@!IobFv`V`%nKFcsOX*~;aKEXNY z^_`u?a231#eRMFNvtVG_WN96GBsv$;@sccLvzC$wzwNlnS@M2Nwa!A)$u(LIzN?rtc#=c9(cr{&E}>v1rgYHA=Vq0T6OyGd+7vOu%Wi9IjJ zU~4~L0-k@aO4oik4O@z0Rj=yZ${lP$;f8_!Ko#+?NHx0eBEX*3)y@OX9EHXakDkO zIn+$q&EGZ9{62Dc=vEbU2tsfVoB3b&=i|=2JUP0BuC`uKbaq^?e0E!)sqK9d$lm9T zxm(b!^89gh>?pbX6;J-THZMg}^{w?6+i#VJ2QxJ5s!~3KTy|t?3qfrzAtwYFUbPRm z>nQf#Lf2F-Jay0_Ug3c^Y@@vu8zEpgp}GG`l3f5w5l>t7Uu=JAKaGQo*2yWG4r*E6 z)qc|hIa|n?L9|lqpi^}o%B>}RWKD| zVt0-2?G|(w2DgYs%qB>Asy8%A&+5RA5Kr!(Lx)R@?AzP!encd3995Wm4c2t@nTg-P zKsVV-uH6R}#`YrZPbyyw92^ig?xh@UA8MKMxUZee}08xNeW8*J8AeJR_YUHma(?%O`3k!P z;9~H!wkyyK`_|q)xLIIMbix)tC?+o~yLY=l>q6mUp!K$|ywt~QEly7jsSdxAV8Py_ z=R$RK#@CfL7!I1CJ&rT0$B;eY~S#N3Wz`GWO__d=$CmHStILT=^) zsZf)~+oqzzs95v+?JO>;c!5ivLf=tIgQc*bn(bK*r0|W-u5vQ?`kq(>l^u`qU6OHs zpTN0tK|tFO(>sMheKbq@LH8v!5BiUr+0IGeTQwSuaA284_eH~JMKSEX(49*=bDX0# z8rRchFG1t^rBzRN6WF6BS9h=VXyTa6)^ld}`nsx`Z9`6;_((ioJKAdJ7Rp*aHZi|}-1zcZ< z?SC$UzZV_u>qNuAuL*hlUZQCs<X&-e{*96rG@M>UoKmJsm^VhRonRMbFuDJ{*De z&0<>^q4(B>6Qh*MUI!m7o+i*;e|yM!_c6*keW(s|42=Q7nWLkW1^->2AXi_>Ja}o|yIO$5 zRvU3%P$#%R$CK-GH(bXBJ9zN@SR)?HmTG3SZEs4RYSHO<(TofSkg`7vRN#z8I-_&Ab=Rwvo<2DYu+WWz12BG_%jLKf@~KQD4y;OP$B`b@@6 zonc3b7h*& zsi25HRRayS*9EVYba9J4j>oL!kn!{$RoG=vGu~dv5j?rY@g z?Yeo{#S96WzKK!!KqF$NYL|yGMOvw4Es4|nI`u!TH?hLUZoxK#MZuoRu7h8WC9l=D zKa9y1GsP~|ZP2=WgDmLi?p!J!fnlePQP9%mCBN<(@Sj-g^j}&I15|l;-SKxgbhpdz zJsbz8vg_8w-cgHIqVC+Oa1j{d;lf55c{({c8B_cC);{lP zD!q~)2|{sG2D?(qu1ZzVb~qCzb?hH;C)3RLo0vau;P<~R-&<;%$6M3N9PuBr#l-*{ ziv?b?nu~aB9*?pV&aZ3B8$oUs!lbAD`dkufdv0?1&Mon=UDgABFV~8lCGu=|*ihIH zC)b8-rtMo8Hx(al81oo?4M?QcoX8)S7G!_Gq`qCupz4wpyc;7h`@OH|jtB!S1l~^1 zz;nuJr=usISZpeJdT-K$HDR||HINfGx9T&l!qihkLbP2kf$oXnqqc<<&|Vfaep=JS zfO@&%Ws71hTc%KHa(*fzx2y} z(CSRJkMpg!7QV?)r7kAirSy zIEeb%=GeDfpND?oP(L;ar_E<%7Qr6+Db&mLPIg+RQa&p#ZRYt@_8}xvoY{SIlo4=p@C`5L~;;D<`gx|P&4^F8ySqe6Y z@bRC6%PA(MYi{^}Ulg5a#FW(3T-tKYoAn+mXPdULRn7;wZx5YtSU@VsvY$=6U(>me zd(-v#ih`XJ++S#Wecd(;(t0sb(Dk)~e@WS%Jklo*vfK^P%_nj1D$za`Zx2w^ZNasN zwX|G`U*(Q-S6$!r;2(Swr$v%}oHby(6>1SGs(;;+z+)yB z6kpfm3|YMwf;fKse*pbJ0>8erWx%f?8Z5(6G5_ML#@1?8fhSjN`@`n_UAI)`lkE^_ z7)JiYX_04p`@7oP0{!j#59BW_-{0ES-rU%p(SC4OXT{8d40j6v7}DYOmQKI*f=y2x z>X|Tq!P2Em^CHCS0l@7ps+@em)mIgH8^xN>Z0m14dOSL{KpPssPNy?FJ9}XN5i=YK zH8&3$z9S);lNC>Y&0_uGjw5R}YE@rZdewz9#>oAL-Z=C;>N*M*YHw;dw0VOu@eeoM zQ0pszmc6U~((~Krw>RBcn*|nVy33bYG3~;erxmqjcK!H?m-cmpZ@=RDg_+(KSJ%(h zZa7r8fAES*kIc%-;>S9AdwawEy#w_Jj&}|QBf~Dy7HFC`Cwu(D>#r-zZ1;BmZ0-6( zb^C%>RCwa4{8+5tYT5bfQ-{qvZoc@6d5cREqi~>Q#m<+m-$)Q-TqFKq2^YKvtqnRC_R*MHcMIq#B-m&}>&@9Av; zMD&-;zhKGIiz++155Kx*`9SX17hQh!1+zT;14lLaLs#i>|(;d_sZagk6VzXnLTma>m6UT9Tz5!A)P> zG;pl(Sa4oR;?;&8>Fhbyyn283lKXDDaxwP^)GLG=@&;>p?CZ(w@=NX1IO#$IB@(> z%f482o-tURowWy!bai#b(p@TzbUG>eqcofS^p%uKGiHqs|?lE*Oe7j zO2p1;y)2fM;X&_&vMHBdHBY(@n5&-HKG-*K zEY_LV{MM%DS9br?KZ(A<>}XT7gcn~w{-KH@p6!bP_m$Tyy4zgy=yLC@n=ZQG;z_P8 zq3%7ez0{fgk!cs+aN&X+&D>q}voC$SW%9Istjq;&Cm=)w)CiaiV{}IH((2XnL3yv7Q}xdoy;bsN`N633;1FFU(>{!I(YeCX5*3UjlnV@+M%GL}fyzznxm zIQatS6UPp3S+kzxxa{omiG@D2pFGG6%dW#mk5*USTvl5(Z%at{89CHhl zuJV%7k{M&)*x1D)0(C2|bZqIgi>7Cx$*QWyc*c;Uq^2|%z{JX`v7Rk780za|;DHz` zo-t#_%$ZeQ4KRD=%<8_4EIJT2Px0vZKz}6Ido2Na{r`>)$XpA{_dX91-TUow;wt3(o@g8cC@1>Xbo80HzwYG43t%6 zPr7Vs79wR%99M31HV!LF#zL|F_7)0+s>F*zkV~z!ii?iL+gL_x6d&}A5tE#HXGc0qUqZJ~-?W@}MI~haG zo10rA&M+SuV?dRQE}A`le1XS-kY7D-eDkJQY%nT@5`ji~n|7~V{qk#1yw&Dr(XOb> z)rS4V%yRnbhmABnk_T4^9xw(%+U5X-rVHr�=Z%Ju||;_{`q z`S9+|Ygk`!Y+-I;X^uaBg`rr;>J4_uX%`h_Waq^YvfRZJmrZM5FCx)F!6 zJU+DqEo{<2xUKAx>#B0fa)l;y3ujy~Lp$u`5Q&6iA>L<996LsHdI7O8zog=V+LkwZ zAz}eQR(Www&DFDt49Uw&3Ue!GHuIV>euD{FR$iF3rSfQRSC@!FU&os(UVd%s+P%$0 zvR6YBPRxOpRg#l6etxA>6QZ=NDB!NF@9pgca>tK?$NC4mnhrEhy0o&Sq-03+v;Mx` zXjUvUe_WL?m=uAU31wMr{rj4_B@s!MUsG0d!GuChi=?UvJ~6$AnS2I$ucCoh@W^(KYFK{!!yNhztPrz<*mpt0GxynR2H0H94b zGYu)3!@(;mYx4Y_QRNl@pj9-nx@!7_QsSnp9zWi*u_GAl>tm2eqGLsZA?b*eE}c`O zXM4EAS6Mc0>J(gsh`hf)I+zu8=Z~+J4o2XcFt#kWt^4TVZfO!{qPV7Z;_M~!GTp{t zrZ&!*U6N5%>C25-VWX&MY+h@RkqLuYxxtsWytwkEy$4^|d|bW(SPb;%x+;TF~0XP9?#5pl(F>z=| zUBiK{j<8GHvoq7_Xz6nH)Yr!bHtjgN>|#GU{8%$>@~oPB7hN$1UH!dZ`N-FIcenCD z<+5rG+yRmXNmEj0DEHbi)#HovWIh)3j;pP9^>ZdQ5SlOn`XyJruJqIq|MSX*2APa%#s`!XNKGG^$&7Se&xbNGp0=~%k~aBswPa%YtR^BzZeLH zj?2D*<2yndn_O91e_qAZX)(7Kgc$|0KmZ~qAWOzfAQPDp%ZNp12XZTlit}>Z`at!x zF%!D?yBbX^54cH8AR!S7$)sQ)SSX4yn3R!GRaIQzb~~9daoQwrFw`n_H@c_K8f>A~ z!8h1IKNxebpBw#oL#WHx-__sLoVVa30Y{3D10oVtOrKCOp|XHH-B?pQiEq+EgM(dz z-iY2?xpYd6ugHfEZ&lHhnNzXeL)?`&b8!tVKFRMvp-`NiP&7~Iy#mwU-g#_$&}Va#9|D9m~3zF9%%1(cv6Z&L;$}oFTec=xP`a$=8xR#;H*;k%ys*Lj&n)`=GdZ$bX7d%yqOy)Dmu{d>Rv>HpE} zYd`ywe<^30HRtk=U3&A!E~y=6B3)Lyw6*;&|NPOfZsYSmd&hmBzH{b14?cTO>+}Eq z-QWH6S8~>kU-+xS?6`3 zBgS)(jCg&P92NHOnwwl2XE-}q^7@cGWFnF=<0K~(5fNux@!<=u{?gSmlU^58zw4#C zGiyWICP^vnE3Pjy)V7|%W1x~&pq_xC(8V$(_|naLc#(QF%lVMAR*K5ldL=F^E$)5 z*c)+${oLObf7fwbx5(nT2ng-mmxH!D^=~e6hzG0Ww^Yo8>8U;BG24zL{ z;*v&OvzoLWOE1V=F%W69{F#0SF@Q*nOjB!X`?lA%d-3KorK4!S*g0S}V{;V3g5(L8UcBh;%i7fMrd2D%f1oD0c_ab`Gl zFNq29i}Zq}E{Wwowfao<jgPWEGK*+U`d6*Om#aT{T6-9_?t_tUd-bx{B&KvFluC+%tPj|C$ZbhPyD-S&zQeJ5Tr{eHi{hxM)c!&7bT z{js;LjJU&-nY~~M?tXm5uApX)nOvTkIp^Yo``0(Nu_9kpO;!|GRF`)xBmS5_g^%<5Zb!>PU-k^3i3UNS=){sJ2??x>+7qwc#d>Tm{~jO z<==_~&4G^H6U*Fgx1+nM?eNhphvSp*=;C-&`{9kdIskyT?>KNII~bjkT9oPaI`SPA z{BJ8)@7;ZP@a>zYIe9@zk-n{`zW%@w&SL%0^2}e~m^k1lsj3>;LY`Tid(%(9fB!`@ zi&@v8bmTj#qo;?gNDwx@`Q~76gY9W1V<76b?mg1f zG)S@L!J~)P?zz0QGPfu%<(Jjb(w4zGDsqYEH1q1hu^t>*_=|X zYfx$h-ZAv@>udI<_6FwGR#){oXx(35ZA)foG`UCD^U5af?hQuz`f-4?-rlqa@WTP%{;RBzz=RJ#ksk;`6X}v z(2s~r7EPbzj2_zl=9_g*bLSTG;yKehWcT5^L%?UvD$?64t9{!_Z33L)TF%aMXi@MmR3dcw!HuBo%S2T%KAY`JnB<>Tj1er?N+y?gcy z4R6XW$n_r6I(Dw#1rZCN+^cyqWQdIt)v9Feh;gYo^65#)KQWpIi=NBuxzU z@$Tj(4<4=}l1+u7g9i`yysz1!@46p z!Wc6c^PraP%l0?}j=ori#yfj<9cX*u(K~(;c;NPlQ%WZHb`La*gNr}^@BjPT)$7)- z+PL=h4X;1(>u-Gbvet0V{>=@-@67fZxfwwy^tll*!W`{`*=?__Kki>z`pI8B{P+u- z-+Xo5`ZcewTmP$nz4V&QwXeU`7!-X4Sw-H#9P@ZLac()9xono-m0@rOhIBY%KHVI{9UQ`KhS%K)I_EsY(h*#Y1-J(z!W77z z=rw)WVXxtKuX=0s%AGCPEn@DRV2d{c4V^i3W^iDdkeomeM$r*wuB@*9%<93t{aX$l zXb!h_?eet#_32mdbGeNIUmuZ9#29lTL&PX&Lens6d2*cFG-}wjt-GaVf7Zad7uSX& zuyk6Pv#6+i(meO^ZLiiHjWx}@vWOMUo!iuXeRYWF@cPHjnPV;AlU?m8tSa<+yT;9$_NSjTdKYPBRe74z5;aTa z1s>Y+)Q-KY1G>;N^NBl5v;D0#E7m=}Y99a$9*6R4@+VfG()>i4K6d`K7lmHky6U_4 z?8w&5n3-8Jf7*phrn(I#Csj`Gd2!2cx3o8}UwrA8uC9(NN?&1S@wls;fBfr%dtS)N zfu3GxF0-G5EzPUPbm+x6tr zJ_mDW!<0L|a%E|0uGc=HTuiK*(fh)d-)?DdUU%`u|90urt3I*x`8DgF`No?s`9Owb z=AtX6O`lfd63Nsc)V%erb*mp*c>n+gkIT}l@@i`f{rdd7{%hGUUVl7U5l#N^SFX%0 z8DnlgwEUrOhF@Rsp|4(5X4i{|D2f&@p0Z=jy8rv;wv{;=FXq;OWgCbD>ck7&M_+#K zSFb-a*eRuS-1V{Pr3FPgCf{9%vZ=MX&m7zM%Wr(~c~53`FU7`shTlS4w!O7(^&el` z4*-M5BPCZBPMA=T;hcNtH)SrIMEf*rrh?W%Zg?#TQ*?5{@l;M@R?`5 z$gq0hEsGW{n&~UO^4jVD_3Hoo@rvL5Dc@movzVBh#Q==ddQ7ck%(O*U-+T1ePk!ma zH+&AK!E?su&%FMtSC`wFGqAUzW!K98d2*X&S>f)8zjFHG>AB#_xcZ(;La*#z`Ge2w ze9Qv?SbOtLwUE)b=l3h>03g&9F1;+Lwy?GJjc307)OOP}?S1FX%uG%JAatLvaLyh7 zdGRA}KKB3CKJrHc9pudW=siVJOEqyO*0w$)26`N~yqKj3-xnBsziQ-V+a@4swxWM@Vj zdi(|c;cdur=1jlyp6Z{h`_+SMA1*I8bYF3aIpE|#T0!OH3$FWU!()H=!gv0H0Oa+S zmVW&1Ik{Tk)FzTb-9=;O&&_&d*NfZ#b4$LPxyetOe)`vE&1vM1yZm2nZ~xQF&wl&G zm;4T=H*5N>|91Jf;yFtfht1W0{m#b^1(;=-8Tr#{uD@(*hQv`?$jO7Qs)_TCzWCfv zw${}zT~d2nO5#QxeXiUYw|(WZC*OSRS6d%@*g#zvnIHM^wDA>rdUxXqr3uu9G3D|* zFYJAJ|LPxqcJC8j0N~@Vy?RNY__Pl)J&cMgDyCn3{kjML@Uz~2>=eEJGhH97S>F`EzX1sxeMGvGAYcM zr*yD*iMOYD9zC(=g#!<4&T;fHUI@BhIGi!mQJ_;02pJYq2+0fyy5({)4?`nrD=vl} zjTr(A)ER4OA6WkK{|jw@MDx0{e4c>oYd`$V1r_B1*U=+ejvdH}p9W#+yItN~R?Kf=y3m(nm=5ANklshIizPZP^apuCsw_RLCrWq0x z64E&(JJP@Z=i9{%wSCc0{pL3}z1H`)mkSF;Tb+OL^$TXtykKl5pcK(4*9Gc@V=kC= z^@o@L=!HKVe(6`9{Opc!?vle9j7awc3MLn{99a3M?|iz$h-#&=j=faoD9d#g4*C|% zyXdgB;^51__{Fiu|J2JnMeRjbE}VMhqN#e!(oHkw_mxe|+`fGIQ~&k#>KPY){<87Y zrjEI+x%tmOd-SbGTce`0FmOrDNB(ncPH$8iE~fLCLyI|b{RP!C+yA!tx9fh;vhaf1 zPflSz(-<`5RXb$w4zMRPm=X~nZ<==kg;XmwH<@IEGJ(-a?cYa~9$M4I? z@?{89lTwo)2_xVPb63EaviR1|9QgfftN#48=QidPV=xxEd|_>E&A5{O`a=d0N9JOP zh*8Et(-|+lZ2Zkl4X^H9^{p?}73N1Gk>Z;BN+y*|tLlu!^hq04x5Kh5(%y@P|$@Dw#Ec(Hd|FidbM@fl?!e!O$fJ-1mdR68Oh2q?V z(*ODqdEqtR7_q6ZZ(p(25e|pu%$eiyc+&1DCDrXeSXNS$o10^Qlbo67_(f^1|~DD23tEU%bYlIOIiVi7TcMpjYP%-T{n=uAW{G_s1SXHG0~N)a=% zE6dBr<>keiHq{3Oq1RtpTs!aTOUD%?9=s3{m=-9{a}0#Z3`caA)9EU%omZ8YRhX9* z2n71t+Q{X0xr!=h%~^8kjB*#_+zf>sfy(mo+TuJX0<%tB%&si2oS2hiG_QO30IST; zDaql)oc_Xj*WEI|COg-qG0n)y_P6#$Ip?1I;=JmqOUtTiE}U8w2xL0Q;gEf%;Vqsp zsj_5DSwU`YZn&oh+#bVWxU=%JN~>mb2dXyJmH z6AN4nnAgqvBs0L1n^Q7&c9lOqe~#|qPH!%238UAMSzb~#e$K4Q%5js6yn@31KvAHe z+}qzDb7tgBSa|9Dxsxh91`vcpTH)jgl_h048UB*$LaQ$#G~|ZE;qiNm#?P+y+u1%4 zF}2>jqMBLN#W^L}(uzd~qv&!w{S_Bocjb(+g#lye=EMfuTH8Ahw+%WR4p089`HQE| z9bc5;$SA2Q5d9IslNC*vQ(c(vA!e`$^LdLV46j%7`h4M-G)>d#_3Ptj%rC5%J$FKR zd4@62u+q{_m= ztV9BN8R~9tZ$Ff5_$CqU}e5sA}cs$OcNwde~H+ocwAD`U3q2mYb!kD)ErJshM`c;zd>2%#&T5ts#h*kPgG)aJUL<$LDdU z3?6I^Ivfsn{;atRXU?w5qn=xrJ&6!($!MJiS(>RdDG-r;zXr#ovai=3DvkNLJ=FFQ=s4)<(17^FuurzC@~V#d?iH{lgAgi+#appWKPSKn^jsht2|qTT?Mscs>+KpoeT&f zgRcBZ)m7z1S&4W_GQ7I3XR*$1;r8T=9Y3yO){OC$W5yOb6IzaGT=NzdWp#vzqYM-k zS58_yD=&M(!pT*+g*n;&f)anQr9(OlhcBma(ws}KSuoDabihbV^XHeAPpK|+AtRPt zEJ`lsl~hb0UyzsWH+v86pq~hbz<7A4DI|EG{lDo>&x!n0o02Q>ya=9tQ`_UsRD7 z4fcgC;x50hpmyo4mrgCp$mCL*2u5zrys3qLV3v`YS5i4`Y>CU6Q<80H%#4`vfs|h} zt~{?S%O@OJ7I2SrRhd)%1vn&Mms0JDNoJ!gDkF?oe_ zy7LP%+j~QXVdPbfs~$IVR%!m&`7?_B89BMRzD!rJvr{;n9#2W_f&~kgOf7RF2RRVY z3dUEL*W~(jfuzZhJF~RBys9AI1wk_s3cHIYj;|h@U(R~-bkN;peZl;i$}zL%PMSDv zQnA+|BZkwTUp=|J!e>~f*I!*$SzS`-hJk1>807gAs>e+zEiiOOIth>z3x#Bi`yGWv z4kSlzIm;XKsn2}0B*Wo$v7VkT-BVONX4=&9fYUHELMAy9Bh<9Kag{llg$@SJY^|_> zQ_So2WMue?^YhDdoVg`arjIWx^&3&svVedgA~*u2g;kSg7P%q=D6@U8oJsW8j#0(e%Ph?nX~$adpMiF_oF_ z+>A_!1dVV@R#u7Ot(rV_((JjF1pz0R7ztZp$f~FvJ7scVsh2xEj=pe4Y311IGb-~O z2xx}Fj@;_XvT@}B7si5)k~!lm3JbDyun_FU@`8%&Om{(XPIF((p|kA#>+1wpXZKe+S}{rV4GaL1Jk^3=8PJOxEt%YoOvck#pJzx@6s7fqa$d3vFM3Wee< z0l5@X0s%;1$Qd%Cr3dMU4 zLEO7CaT~Vp%tR!l03v&e01hN12tmjJIU*tw5|AWm-^&R|NPBk#0+}qy7E6EtwyYx( zf=D6~0ulme3_(gFdsDDW1+t4pw1rcAkq9IaAY%*>5XsJBA^`xAF+@yMWItdaFanOi z009^y#sGi;ARtlPsT3J#3<+3#O`>0rAwwR|83Z6D2ate7ND>5rM36v|2nb0sMBo}| z2mmA)0&>QX5J)1kkP$}&CW(Y4IOoI}Lqrb95aKOC1Ok+jBnU|a2pkAW0>uxLq!0uQ z0FeQ+r_qvt_MsAxee{Tl-j)(fLJ15QB0~;H2ts&P$=GO?5BBv#0?P0mN}9nNJ5ad5uR5lu}AtaoP4XLdF^))4&#kak&Kq zAV>-!C1Z%lfa3Gp*b-5YL?i&lIWk0&KoXG%KoT%QMi@^a3IGI>$O4dn$dEDHIt5Gu zS_lkT+>%5@M3^f2kdPr`j7iCXB%zQRa>fuTem3H}AfBP(LJ{pgvgYLn|Km@GuqQ%t zFf((^mEZc&O;htSj8mNaL!nTdWnkjn-3i&E)6IZPrk?PFA4QTi^p z5-84H{8@PmZvRP+Z$@dMgP((GJ{1auO*{-PVTejX5PuR!LO|e*g9gBo3L$PGO5I`T zuf58C;~6)?B=%s80b<-{0zi@gC=rZjmmr5;s@PR9pgeSD<$K zt)F&xvxorH+!@*9W|ijnnN*Kp3dK1Jjkx}#kj|^{6b)R2^3>9B{e!_616DBQvVsq~ zA&L(e;tof4`JCIz?WGU6H425|Ou@KSCn<~o01{TEq$**6m~hIA??%HtNQPYnM&2G1 z%gnCKo|`3Z_Ofj_jIpFYWAZN|r09?#NtW8iWIJsM2MH5ZVo$rOxI&X6#eS0X=8IeQ z0FV&?NjcEC4`awg(>~N@)RrZDF(jB|C)Tx{V=dj1glpzD=UT z(v;b2hIeJ$cxS6ruvHlXYLIgJD521h?D#tXd+IAl=@nZFru6EN<0m14Bq2>1FAaeu zB0u6s81H5rDbi0F#+WC&c;d1g|d`p-?E!9}<#Nqt!Shg>dA?h(m6136lxzx2Rm zb8D)y-i0E$Jh1ZDEA}7eRiFRNvI5g~7&!HPU;oXk`wp=)*jI5bl1!G7`c;CV2kl{o zq*2~XjwXRd)CX}_wbSCnFtc=JQ(B#Kf_O+NYJ~Pn1T9<6BLQrx`p-`M00vv5-hxFOu z-=B+$r)1L9t3Uav=>nnQ%|E@_PC2DlT{<(svd5Q}_y-R4wzeN>@<-7mrY>`%LiKO` z`K@NtUv~9nGXp4DsJp$nwGWG8ED^Z;UcqE6(%IX#zb(VE=uAV06(f+I@slsrD8`?+tAQgF=@cm(mMAG9PDpyZ*Png#73?~)*C!@e4wavw0(zalv1OEfB(gLsvciG zf8n^mdpm5>LXJ#N`K;?cQItO}5OAH+BkPGEG;Drh^YJF5_?D|@WFfFnZ)a4sHdZ)?WmS{3UdtpLn3AO@m;&tKDDRtp8KYkIM0{&DM_I*q&jaUUJpP*PTCu%ws4r-8c}45roo}a66t@TM3fSTmJ}(N ztTegdNe}1b&F0ICUJ_ym^0LF)q1k<_Gbttax`p zU*V+Lg<#vM-j^CVnUXi{U$JU%!0DQ~VBGss=?IwNb`{lLa!V}$obl@wqMnBB+js5K z2d}zrx?ia0pmzepzMf-s8=qNIbKM=|^BsQY2i>6elN3`*nw6*KbbmUQu2UTFNwGJi z`{H`-gaXnvl5CsWP@;_#g_YWxR0%k|$dU5z#A7_6-k~<9HuwZi@3$JScS!suCo@gc z@^p4YI#F(=tsz-lVwuu!q);dn2}Zp|5T(fu|K7IcbdXZA!L}oNnu(<0$;`+rE6+9n zK*mBn9W70*T~Ucb%P1}>&dt?nAk=iIiF^4#Omq3N$_p~N*?+j9X&`J0G+e%{%9=tC z4Mk-TQGfG+rmn%ksL(W>{1p?6+)j;px_i2tySbNl4^mEHNnVC-1v`%%ZH@{g?)2vr zlojVW_|RK(B4RSu(Ri?}FB&qX!{H2+)#kZHS8EfQPIqyU-$^Kg4r-rhE79jx26RTkA02msK)GR=;ref2VXTp+{kaWEl-HgIfD zmm@2Xm7nRb-Oub+MIsS2Tdw3m|7IqG-p8pZ|`^KWoHGloEkx-_i#f~e<&s?-gO0D z(9!Dc>FsIhNj=_-yt49aN9yV0WOg(jZ0(KM-JVrCq0om+M*F(jjx~2gC8FleD=y2+ zGawjlI@H8GEEFZnvYal5JFmLXhnmJ^EEMYRKG4OhOR~M1+27rs+&8zVG(X>ggOTG0 zk24R8m}s~&vJ2dyqeof?K?vc_$PN@$6?lhUvc_VuP}81cy;j5m?(n(;MPm!Sy~p-N zjeyf%VD|fjdrsgTmc1K$38hgy-#x+G5oMLUQZDAAqh5pPG!(l8I3pei_v9VpP z1;JqO`0i~@G07bMg52EPLf^>W5kz{A9Bu9!j3P4T4%AeaxpYJXDW!l<5ogAoAap6szzrQ8wgZ)zXx8nj$m??BX{Nnci8Mj$WS!vFw+t;c&r1f3;*-h8;( zTT<%F@HsUS(ZPz zGQ3VMrNn68k)zGM!HD5-crvri?*6ROB438jg^}oB-=X^BVUq|bc?e8K+uPd1Jz+gV zZ*K3FQaUmVa&vPFvxYQ{lu|?oj~_e^PKa0tPJcydfz#@-D*`}W&#fL`>^2x!;r{OS zqsQB#5;Fq%T$&DYcuPzCTDY~ol|0VOoP4)|D55P#TI@xa4jApLZ*1uq2m>IxvTCZ! zTsjPPHFdOibcZDX-}PduJUV)v-SOnRCvbb@$C~+?51K0>Rx16bgk3l)4LbcXuzh z21QyZ#a)AI+})G4tY&@BnfH%H0u61szk4h1-R~cKnC#3ma^}pLXXJSX+T;4$xIboi z&91heUwi5E%C=r|$m|JAUifgH761gzCyuOG@!m(<>k$zIlOFi+fg5g6F{+PzJmY&f zg?+L~8b9Wmr7z~EwQhX>_J190)Z1We{E&ICY+E{lhAiS-?P!{=U32?~>+AM4(NGcx zroDFf(V=M?L&cWOKfkjVPG;}grCspCE!R)uVF!MC?B1`cFxroXj9qf;W3SI0+Rw*4 zM*IC#+rAH$e0!j!)CiSvgQmW^|KZ%y10Sw#?2F8P?$KG1K^&It`*3Z8Q%K?LuQS5*Y*OZ)__ly!U&D(AWaRz5cw{c087+-@E#?BGXPJCeRywp*{)%X4OpyX~=0=XI@l{Pnd(?M(>bl_%bt@y4Eq2mkR)x|5#Dpf#>j+eY+XaD00Tr zixw?S#np|rQWarcrtlEiHXKArMIa6D1gE>mX@ zU$Qi+>9HmMs-$}QQ2faGb07PBY5oPrIKbE2R{F(^XSUJxrT`v2GGWfcdmhsr{QUk3 z`SpoY?!GY-002iv8BcGe>P-PGYDD6!r}saZO)>xg06Dum&#d_IaZfKDrHh~W#;zywg`^k&0+_9Bg`drNZA)LDsr(pm`qawno;di(V3z*i zFCTrgV)f}32oOROpWS@-tlUvCSU-)|+J0)&syCipRzpxUm3!mMH{N#N4GC7NYyB6G ze7UWt+d)StVrRd(`^jNs_0cak9^QVsFN?9`fHzjtnmGO8aWn6`DGLAqK=m(QZnL(q zV;-H)Tzkz5#RsoUo{*W&^}Frz*%14iXvJLk!79?$dRhNBxkUiSUUlPv@r z1gAZ>?y>nJ?I-e;$(06@rabknC_fA_pML%AisR>6%>D>7B6JKpR)vO0;|gq*l^d5o_2SxkgeNUr7}Md6go@PnpPQ*G z+WhQFbJFNx_uep3nrxdYvszkcG&ttXrGKrL3!eP`Fwkurbd_Rm&-_3cm1 z7yw}66Hm&T>pM2AEA&Bp>8TYH9)J3l1&>UL{JjA?%%94?@u9ww=J4+`kf!zfrT9E2LS3X;#nwJjJi3?v``(7f;461)wRcUS! z_y}M%`i(oPi4`nk$ed zjlXHuZ4K=mNfAIN^Yz(IAKf-|)QYU6NKwC%KuTZV7xaqf9z6I6s962!){fF6C#%Mc z&jc0UzVcgtE26_&ByzHC9!~*tpqX$a{=pH^;dtk-tqqXFOPYS~~&$DJF~4 z**07+|3dM&z+FO4n^; zEu8*L{D)Z@27~0Opp4nD=i9?Y%~3b5IWR(r2dg(9@;XkOvCZJP0aeo-@#3vF4KCod zb~GNo@8roP>6t(*FzY+@4JFgAe<)6&KlQ_*qUOj@TB>GCp~rdblw~H*59wNC#50R; z9yv*6vQ?dUM)TUs52ht*_)M-yET{W9jR7oKbj~9Ozq^g5f{kT`Wydye-MZkV+>sMX z>KT=FO&~K40MJl!SgsfsJ!D9vf>b=lVI0jP}m6%WglY zxcQY2UPy=vHd>mCmhb9}8LJg5Neaq&F_RwN0a^EMb`Q!=TR3k_lz>50taV* z{pS**sU}Nv(emA0v19x+*3~N%u<{<;@u-O3v~F1oQC!nr+|mceC92~Ub$gJpv9(iQH0I@>x5^v0e7D11bns}|Dmr&`DRV-_UKTuXevBu}^4Nm)c<2~HwP2X;}mFzxVGHq^lKT87vJV0TUCiT77-!y(o zx`5SF^3}bEM6;fI>&f_7)M9HqvHU=H)EKvQ^SVO^`U>7Z_+dKct6lR`XX9z0PW_Fc z2Uy*`XTQCtP&)I;Hy=-m1Fg2k6Uz(r3DQ$%`gHDVzb?Ec2>>9Js-Um6B3sRWrzGl) zXC|b_WoW~`-ou0m6DG|6=ltLGA9y8O7;pfM>+iC`MPnpW7CmbGq@jbfTHM{%>S(WO zY3ilpKwDc|>EUuK+tyLWL&#WNtB{Wo@khzo2v^0Yq-Ufi=tLb26_qC&OMRP`*GL7- zfW_g*%92L=Mv3|>nOsNR@!drytJ)kEW3A1X?1DZD(iq9$L?#azG$@&&4wjU4)|@Cg z9atG`7SOn(t&5q=8af0ty=6e$T-P-`P~4%oyBBwNcc*A^clV;j-J!T!afede-5K27 z9p;9HRu%N8zJ&81k#ywLU=c@&_o>?=T5|Gl z6#QgN2t}&wV6B~BP5YvwH{Y4f`3$$z4CiN6*WA=3yb|g=C_T&!DZ0h-GAE{-y|t32hzm$cf9>>0@A>UtcLpH=#t#Cm^VKOl`7H;VHa; zeaw1qBElxJII>xrhN2Zz!GN3nyEG_Zx>l@qSIqZv|rgtJMC}E(n5+gG+ zts@h`?9N*@hSpr7G>mjYth!D=d;~g@>F+)Erq)G0^9v3xdMOn`FxUI8Po+pnjvTmT{w`3ElUr8d3E%rwr9n*-yhFGgL4697BoM+ zCX3km%fDnM*?9Oa!l%(t($mu;1VL~xt<5cLP?{kr6ADm&lSHE|G&e;csVZ9Q=$v=^ z)47(HE6m}mVOWZ78db5jP#53m6vRu|eYhF^dtj%C9aa+YKt;X-criGh-Eks-98OUy zho8&g=jGFpfn`2IyS8U-J(o@Pt$@jHhm95{BuRR>thlt~bOFXy(OyDZK%H37-_N2Y7_4DmsjLe$__>AaNt-u*VMT9E$9nFPk|qV0IC$|V zN0G4Es~GjHhTSbIPH&iT>L8i&3u%OIQCfogX-0}fuF5|Ua>b8-|1C%gxBvj$%O3vm zmG&PLkS9P|fJ{462aRS|G^ro~j>n~P{PM5Wwu>rd-!5W_0vC+v!uAF(Fdr@nApuU^ z##}%s8zR_nOj7r!4BhsfmjLw?x{JALg$wbSpMQv9N1Zb$tx;1@izK`MFjDfAI0p{^ zFy=@Xmn&>$g!xhgWKsrr!zb!bS(tJRDMluj4GkIPSi&aEFI!%*P$@(u$UL75AAchj zi`1V;hg$(WGeM<_C6xl(`gb1TGr)!9i9-=Cv>3wd$~hUQti#*Y+cr0xA3!vrpGC}vWHxxhb* zGgp2qLLLE`5)2s$a)6VTN=^di!6_A_gRtN>hRDqN(IcXDkJ>j_KoF@B4uvJ2phI?u z6iTan0_Chs3I=`=Z_a&_l?7`U8k|pvzbFY7P5M_8?7#3#(uH`K_Plbc5U9~Z8H{Q4 zLI#7TJ3&;ta_#uNvj_Rs5CWDPVSQ3-KiDH)*T2}ihY91256t%06773>cia6n9XE$U zWHUBXvd|D~i5twv#Z4(UBdb+x+>ahczEhT#5D_vbI>?PzdQ`~q~V zXIJ$>m(9OdLQ-!9{X1nPkUu5J`4x5{My0Hq2vw`(2vWo!agCcS?$pPBsgh z0w!SmrS|OXtP$G&ab@2N{p`I;YM$e;p3e$}niLu%30n3qfe@Q)HYunEoiXTc-$lyA zp*pD8DN}#Sas*PTHDoBLKe8<&2u&`NaRjPshXR8F22&Dj!RcNV0o|zj@C)H^A}t?% z)MaU~M>=Z%yT|CZOo<3Jl5vv;ZhA^k9yROQ)f2QpC_#Lb$}SQYbb$_iYUy#cv>&FV zYCsIb5h6x%u|m$j5;pYsl6-wF)Q)p06y#L7iXa+t8IrIZVoQ~w!)QqX>}VC&)SLPF z0emYvQmPDUE=?2`B-1mKgIgEHH^;S^BEOLnXQ*Pv-^an_)^zl$F>VR4UJ0A3E!L9A zM7&-uYUf+K#o`$(|2_G4%8+8G2wOW4M+|{yj^E6j;PRuVm2z(HlVor2a14T94+~!r zomr6jGxh1Pjhx2!)FY&ZU75GIgM|34c(41@dd}Z!d+*k)q)sxg&cMphFo5)GG>RNa zG?(T$;givH3t8OW7J{En)ID%N{m;n6sB0M$em0G9P8Eu#=e|uA93W_x5J8@h7a3Hm6=O<0p0D-L?YRUcD>eN2l-vZCG$DxJC)fV**R!`kBBd@V)$P6*xU{3gmHin z%7}}aI~_qS=7e3Lcv(k8ALke;o@7!uj7L5}QDrp1_CqI84Hta!sM(*uEoyGFKR^9e z9^#Q2Q|(q-0v4l?r+8eVsF7*lbTwYLGnF?vb^CbA;8bD64#5Fo^k?dR|vj>E+)#7-NSw!5j95`K69nCVU?+-!CO-)$v{5Xw6O$ z$)QB^%Z7JPJm4sJSD+7&hn+FL{!&r6e2*xNQ&idqO_3u)uL54r zrTEj6*t{4agIxJlQ%KpI-OLoGc+Nhbe!o2iH790qxt^O*r$^h~9SQT;>yHh_sK|PQ zkl-|J(pGTG->mgi89io*-1AhbFd@=!OrWqM2HFTsTL)uhV77DaBEI0-aV-?b6Y(F! ztriV{KGo1e(M+9mL~=Pz-izNXK3mFF%z~YKx(%~&W(e_L&$0PsZ)71NBp|5!7p+`< z447cPx_Va&T4Z66hwed{ki)Qao?}uKquq7_FNw=Crpuh(D?ezV$i7hU5;Bt8Ui!~d zo0q{)5il)h$3tf)Hg=Yw(n8T1yWc-NtdgMuf>a5Ev7p+937|L>#mgoMkvd4hKDv}k zTN{@tcwd?$eKcqQKsKb&wJOUq@bSL)G0MJ!ppEr3!2GXOFVKP8gBMCw6$1s^Lj{`} zoC^8z?;SsMCWu4^4(9o7Yi*w{6m4vgP1WCVZ?wc+5$07fDL8{}4V z)t}muK_4b;Nuyt26nlO_vu@QtU4giMW9vG;@6tvMp(JBUjA=Ky3gh*fy>3rBf@HjI zy|&J{>|$tmob;wo1*Yx~lW{6g0McU4N;pJnmiy!GKI4Q+0X@6ZisF&23gSKlsZ;W{ zvdXcjsT@|L3Xk++I5addNGQ6f!hnOr@2PAtZtl&*g5FJugn4D?P62h`lpz2YNva%o z=pr?;IT68xFp+`r)TI&8q+^u1PW^qJy70uDMv z)Np9R7JKvMd?G`sdzB_(#EYnQi9P#~;5`78`aQnyuqqddj1?dZ0 zbIkJWy1T`m&`0VVd8kzu3QS00;?ripy!$e0DqidmqVs>g(w~J=n>K}<`SnuA8af-H zR_DHWSxv#yJn116S6@|KZBjJ2Q-;&5693JKYSDY>*zxHD4Eo<$&c<7jW4At*y-Mz~ z*ktJ?n3AG!Kb5d1>06pxw3aFM>kDfiU=jBSb@bIXsHpj@v%>A_&4$jVx7dW3lV;Bf zb=g!Y1ze8Jbaiw0xP9tq`J`wu*WxeMoFtNSF>;gqBGCoJiq)l~k~D|8>>V7rdBy9P z!heXA%{7dzkBy<^u^3fglLhzX=k=JFlIKJ=(SNJzYVUaVlr;Eteq32qhYHp0|5>XD z9>Qx7lQ&wjMnZk8trAvqx;w1E#iU|q%LS?zBLoJ{EtHtt0k22bis@xZ@KRLxY23%~ z@S)kCu)->01N3zGMU!uLGdHG-SezdS)tHeXoSRW!^yGs5H;u1myDe=Qq9KCN)H1|~ z=EYfk6idNw6zueG+7?|s2&BlUe{sKg4QGuo73VP}6UU0%Y>l3uAN8RlJos|az`8|} zsvL^y`He3t%z0CR9tMhevqW00|L3@7K>Q`ey=K7;{_?yB3HaL^c@tywg>2yZS+|w3 zG+_1mBinVzPYe=(n+awKO?60lvEs+lxq;I!p!AcM>8$|gR**R%g#;g%;&Tu^XNqM9 z08FJ87I04i-xqpN1KwYvt!iaT<*8(*>O35c6&_c3!Bxpr<->1={h_#_iO_h-*n!UD z?dvCSmQkjzhyKr{CyCR-z}r^>D5j;7IPdGTLA-{X_uwp}mOwAiu~8e(h+-nRAcFyN zTt?YZh{3Pl5A%H=f2s~Nxl^`-1i&E@`<}w|93#kD3GlMUR<7JnGI(MK@|^5AI^I8m z7VC0Y^j*8eBTk!^1#o`CkNlj5G7Kl#3);Tc``!DtuKD)q{`QoY$b&#Dz4bA2%&Hri zfUg1>OQYO-BIPr_goPRh{8xbXO)lH{t{N|yEyNEHzU6h*j!>wY z7zZaN_ibL$=YCz<=;QUkGQepLSDjX#_~}BOVpk)}Snur$E6L>nPz)N{ zMe-7PTtlux%ySPJ;_}dOGlTmRkq`h-ugexx~wzHvRRA&Ycq4SxcVx}VAf#dDpJXDfoYsFa+tWtRP}{1JD&YVLcZ5! zs1i4j*c4poh9??iCBHD)5ik2-ekqvBi5e+xog7g!*%tWK{tC{f*<|^aJA}K^K1mBh zg=0G;eDm;yIiUUh<4x%E*I(z_7~;nJMuNsh@)rOApMtg0SmjfC9JRNx;@IqTe?9#h zvB#czYmI*6RYd2q|K#86Ah+Wh)Y#t%>!1@;`!HV*J8$nvJb=g_W|w^;)5F7I_@CSL z=1<-Ci>L8ducxM5f7{t??kVzsPVI3&C1!1$Wnltr8ea>%?RpO9s%$wh=p$mf4@G^4 z`=10KzuvNmm@Q>Ew|2MCb{p?}mG@)tbo6srs^ta;b5fgvPg4Z!%)-0+Z}Sy5@Y!S0 z+TFdyZmR97ft;R> z9c2jb`PtzY_Q@ZkI7MQql#@uKrQyIyv> z)`gKwIJ9&5{3c+ZkSrU$w0m>Ft}Zq4!^-eecaPm-!A#GIAg5?ChF{NPRZ_fWo&oQ~qn_=Y%%5f?msK}hC*h<9b z_~ibpO_?JP#^OI6T0PxRph2`Q!h+;;>7@JSNs#hA zy`HH-qS`9Y}?h+ z24v(={j);jHkoL~FcecScie6WZIg%l=W`w~iUOZev9xj=Yar$!c>Q zLUpF5aTv(3E!lV;`n0C{R}M`w_PqKX`D+<`35)-!foI7KN33WChfqNI_O1t^B7#K6 z4@BYszHubK;?VJ(F|RhYzU>6ue<|o8)SJ&L5==DQl7s(PWRf8ZxIhgf2+-mqG5CH! zcV|P|)E$Ksfy?@Jt5`LPlv{7_W#M~`!#axT9y)R(WoO(AZ>i7(dLe#l)qmjtHEUCn zZmcm*HVAkfdh^eJk~+6MuHf4$p|7ubmJi*z0F@#qQ|PWw5|8=|6}l9IY|`jh2G?h) zm7-{T{6A7m8szb)c_-HM-9KoUG($&5uC2x_0KoQXv8e0~B*x7DOnS*hjCuQO|!@%mZaKb}R)NOPO5L=gf z@#DaxEi|F93O0tDFH`zXSVOdWfqWrV1zs4L*E&Ra*ezCaY)eMryD1Bz7b9g~kOCHP z<(LLokjT&ky@uRXO=&aHOvO?7?Z=u3ii&PK#R}ovEj%bYK~>IVY>0nWt<{HsxHS`3 z2+dMrhFZaC(rC0J>J>vk&+KxbnLFDGCi?lh9Ib>Ob>1YY7kuO%_LdY1D>Nh~B~{i+ zlU-_ptZ4aorVzIU4_Y3xCTP385B^%`Hiy>{u`R@O(GHF*p9jJF@&WPB{*F{cd^l8} z$eK>G{)BoAKCAMFz8noe1b5iZEw{Oe42~=|@qI#f9ye2!!pAu$pPV8Unkkh_ifMqh zMW4&<6Oz$8qc6Zv!!J}$79q7d)DUTxBMLtU3s2nTxUFyRG9V8KA0)s@Ayq0dMqsFj zCFKfg?IMf#FXNWM5=aOK%Y}vtF`?`6!h9MR>ur|0YS#h!e8WN*6gd%Lk+ENCa((_o zW?dosUz&ORpfCXRi2O%~F)S=BH8qvpVq#=;w0$iqw4L5b`Yo<`Yq6aQexBqvJ}9Ev z=Up3KhkpVVEY2psn!tZJnJrA|$16Mm;`UmLKJ)PRzDlor6Y6mn6V1T@%^PuRG@MK- zN=nkc^lKm5F!2#1{cnUnKGEBN4nld#NyWo^FYI>*H(mvLOWhXZQH#RLd3=T?DMoZI znKx=!^ z>^_ngopG(Ox=#}l39ne;HXMjcY5#xql>a7^7_AUO8OyMb1P7r?A7n*((CD7C@;nl3 z&KcSM)Z1kC&v=xCMfG_LKo;89@=y8l*~Zhqo>-K$pq|e0Jd4|2B?b5M!PfzNz;)xM zE$iBi$BBP+QG}CRQ1Gz|{Ge{ZyE`hoC9HRn&*kXQA0NsA;s19Pe|##S;p;>M!y$JK zV|`kIibQ$TF*I2~js1K6#Uhnx(I7Ttd@-4#a#ne53*gQT6gm_xfZU)uClDHu5PUTC zeAXnI>5QAHsUHqeg|tY!K~zyYjVrx*_q~u{w;otJ)tqW#IG>hZ$S8FLyzPdtlnXv1seYo#H9ODsc2I&XTmD27ODc*{>e%SnF@pM+N!~68 z^_S$npZNdc(a@J^7s)^+IHY4;DnCTB|Fix7pA#*b;ZDwWkgtAV7B^FGzZI*8=PGlf z6I}ZkPi_Xf6F(ugurQn2hy+ed5=ChK^k&J`gQ)uhE^q)DM9VF21A;U%RUY1+1070cE zLBp%Sg~|DoXTN~JGbgY?dynW@A{$vk5PQy$*qG(z2?y^Nm3J7!xmFv6vKIo>Hv zzvwI5Y@Lxy%;UOUi($7s8WxqwPvNo&ZA7WJ3$D(JVY-;O&uMIoq7RQw;KBu_gkf{*+Istkz)P?RF=xw_fPZZQa6Ub6r5u2^aq=vwO*j|kxS`-|&OVk`)< zba#@#5TDz6t~l~5jned=Cu%#GMk3UG2YdjQ2a?qxgrdQWKL%WnF4w*L>BgdoaY%x+xe3KvpsZi@ znb4ZF?DZa2cb@_-3om*=^S-|AW_l-)oJIof%X-=jyp*A((--q5;s5fsypJZ+1Nh1# z0$;Qk;}n)2FY*)u%pMBTq?V}=VL8q#H+x_2vJF8Mg4cm|qrxc2RS3O)J2%-RMqP#E zXmIx+c(MiG>ts*xP@nFE&smVW&J=%6b%Y4}d+gbs;nOvGZr=?B3LWvyz2N+W%zcPh z3TU`aH98ffo+f$i$W#7gke=vG+HkT0{!LOGZVkNO9G`yw(+_3!3g)?AH6R#%E3O*X zsy{qABYpv|49$0S0jsr1cYD)V)1FA7llEIri|;gnE8k~(dq8RB(cLHou1TQg?Gus~ zEe+n!vyY<&);nQZ>=5&HBfqON)K+4ykEv(0sIG_9RNM62+J9D<*Fn3EMgh-hH{3!V zSK7lJ_0eHxTawPz-Dl@5%B8~HJtK3oPdG@TxQy!$V-XCSYwuMEYr((!x3=E@MIo2T zUj%Mp;e?`@Z+6~>d2afG(oKhc>i_vHdxMc8=&Wi9WO=zEQN~}(1yQ=6y}$2oSx157 z*FZd=KI?VIAOh4H-?xiaLqk2Qzn>`0pZuR)aGF9~2pZC7i>-ggpIh8ewlQ~>BEl4$=xj(MNG$gy#vltf51lA>b~#*0%mCGH0negj4Z165FJ;cNY{p8lF;z84kFd}+VD-ABUh zMxt$HwI0L6+(JVKgr-p33Y}!SFK6DYCL1Zf9JBz;ba^-C$s4g*R=w{!%4|Xc%*(C7s5iguX$7WRBY$nHHO$~hRZtQDMb?jezytA@LwBBW2V~iEjbIC zwt(GVVn_m;twHTGW2}gI@QU4#I~B`UL1;)7YUv<&|h>KC!v8#@E|cK%xIq+lr1h804I^5(EgEyd`oJSJW}x12e*XCA785A&iJ4w0i&NwRVqF};Lf1y zB2nKct%X;8^9yOT8FA_}007ME{3X+}HgqUdDG)NXu{QL-4JKblJp+Q1A-@I9bYikl z0c>$|y_v&17}&H4XVuTG^LKE>vg{-tS=#~#q-qkneEz|qy}o@m=HDilO2mV9yWb&xcG2?=o+nI>38`9WDA?1{N!Ux&YJ4%s^!g$ zegPw!;}R(qLT)`+>sc+l&_Gj$uK2w+?l4>^3O$=!F#MR+lOv^Nm2800de8Oiz6~ol z^?9G>Ah;B_5rB_lb5NhDJ|8wo)4CpJO>Q6uhOmaRh_5DMBiv}TS9CzcGK;4dl=QqR zNEWgG5*JI(OvlSE|M8$ZNu~EH|2wUwgRy}}a>L>#BtW_!z2WpMI{s?Y=*z?5$C-a^ zWXt*U4lCon0}~_TSxcKg$39$f!K=%NyrGv~e`H5T2R#KcfYhzMf3D~&R*aCVSENDLFE!*U zZth@TPRHa>4+-VuZeeI47mWLOI(=D>S7*sy7>uqjHDf(*w)Y^Ro*s+Em0~gP2#BbYBm1yr=4oPn?IG~s=w+6Ei?zi6hQf_Ub}XQ7U0`i!W}&90mK7dL zp?-5|1ABN)ng(RXlna5FNi9UDux#R5~M1162cigGOWsKw-FoV(gEvrEx=z7AGr-eCU0~_qy47Vxl!O zvj$5Wi;K|D)k{iBo6icd14nkX!u}m(3q0^4?DO;FV#LT+YjggU#|s7O&HlOFdcBA! z_`KB7kO1Q*lKVwM;OeRCs&k?iI0+>|h%?NpCoe0mC>bUMUdhPAkz|wUKNM-WF6tg1 zuMxRB64$d51?VNQlQz`!{Z3~p)_OdaOH((=D27oA#oa}xPK)^Y{g?=-V`hr6z*kSq z%9hTdUMIoI%R^v(>$~5dQq4L~2(Ij}ncNKW;_#{2MS8ji{(1M zgX#l}ex%Z&<)eR7kr+fF7M6(=OY&9FGK{I-a|`3e)fh0BwACcHz3HjkG-jclE0v%^ z9h!ah?SL3mcB0~oa4sguIUj($ERdFXO)6k1}5_`Wg|?yKGL1v9%ww5kGr`@w#O;N zu?9B6!z*ta-3gPd%C{~hB^Ix4F3*~pu*g`yhLSm}K}Vck*i`bb zQ7d3CwVYmf@XHr#m7$Q}O;f-TdRK=pttHc(Rm06@usNvsXlWJ0k;=TR$sttf`S`q| z$+DTcMiiYkmXwq%3Z~fi+c;YEf#dt|J@%HxTprbR;Tp8rwxW;clcYlj#9h`^mlY#X zF}NR1^$uI3>{M8sulfF@s&J&<3KsgW2@8m6KSB)kJSQs@Vd)JFCX&~4s`Dufcqz?h z=jP{})>chUuK{Ts{{LpYGR6LiK%kmCYy?)f4M(D3jJmGo9= zO%iqei<|b8a8k$PSaR}DTv*s??p}~^k(7y96Oipc=6{a0NENM~tuQs09_|OT``_wk z$`R1z`w5AI=h{N6L8}aly(^{WPK7@ak0QPPOX=h5-mtA0XOg7lfF+V*A{k-kSlrU8 z9T#`p z?W_U-fY?%8)UEm(0zF_Y-TBK7wrrACyoJm6kJAU?O-0HJgL# zO+tW2WhEwx=YJwY%>HV)b`51x@W8lsS#8>V)gL?AjFTF?QcQKPalOHw}!u=G3^ zv-G}5zI{_G6{PS#B`s+;vsG;@Sr^??*lZWO1^3nRtrkQsdtAu)N%L#}R3=qxU%0t( zZsP>8WO4#d@swrF(XQ^w!TvOwUzqi5KD%SRl`Ba-f+~8IOWgjV{p2g4GG#|rR+g1K zlwy80HVE9>1{ddl)Yeq6PEI(vFkKVU+7+&lPV?sotECkTw@05?(iIHwQ-TA-5O`i&x7N6?Id~ zLarde0rFY73&&8w5gZ-=Z;YAnuQVNR)mcn^w9XOTH~TGxOcVA)T0p+=Jf@wtvBbRxq1N`nn!OwmYQDg}ReDQgSMI)Ko9-5n8IPo8=2BB>q(vej{n7 zs%BDYqzyDuT%0w~<8q|qVut|Wv70NHH)J`U@O8SZ|Cq6N_Vr=~r(t!iXC*u1G`X~v z)O3cm3jYygk{mI=m`lgX<~+)IU=DAoH<*IfDBi|8x{v_=9=V2mfon1z9b5JSEjzQ0 zI?;`tF=>y7d@_H46dHM3iOEG2Off*TrZiB)qfTZRFXw85y-~z8VN4#c&DujEd$X9u zVqbi(9VJ~hJ&gEC#|gauVCPevU_)yYdrD%9G+W^7Na6_`I7|o-H?_`fAJ)-yF#U5P zQ0sN`M^rWa9$DUW7CbxJSLM#zxEFE6moz`=S?ApR=J&ReJmZ`nJWj{uCn$~VXC?-o za=z6F7|cUBr3HrG7p+I2sC{1>N2z(a?39Bg0VMF|N|&?kmT2o2nAw6EAp*}A%0z+{ z=&EyGUDGy>YfaO6fq`y%Dcr^aIFoA4U<6Qu_+$VfO%{cI$8agKybv?wlTLPYREr%L zDD=0Kp2p1ChXLgrbZ~vS>w$`rz`k0kIf>?k@p2@Msw}@+pm+xE0N~yT0f4S1%uLy1 z=6${+D1n!yICNrxcCcgk_Wlx^6k3eF+^|00S_kYb`X|iTQ}kWhg3d`^Z}9gwVY?cn zhpMhYsDf1FudEONC^k;b-{1H(w9Z^S9N#KNzs0237AEE)WOY`>VG#*CSk*Km&QX5F zJn=M><@vkl(PDD7mRf>Y><82Qxp~$Y;j*r5FQiHGhb`{H;UUu5LPBPbJfWiM-p=}m zb?*9Vqpy9c5pKaRIgxcl!xyum@7e0AU2S#R^Bn-Afs0Y~A zT3(fnxeN2#!Kj@|+d|5qVLom%vQR?cpyb=~6`xn-m>eV^JTatLtzy7X+tq0@s&0Hj z0u5S_++HqNy(|O2Y`azaT*vd;n89&srq&2pH`CvDiSYOutWdbI(1n+j z0-Z={82FrRKFLVNZn)t6>{PZ6-6+UCkx5O5*0(uVGhKt(`?Om1puST{YYeqpfeU;$*B)7RzgfxM@ zXNk4ckqi$9>NchuG^6?YZ;0G2~vjnhUaVtReFk$YOQr6#$+A*a>0}iWwPu$M4 zM@OT#$r}{oI|$9O>-wyl3X{Alm#g2govlP?w~1)4=ckd?y7M&3V*@{ntnQ+X-l&JO z{A(Xi`LasCP*BzZ*}6z)9m)ls_vW*oTaUQ3xK8->a0_KFb*%ppg=lse8`++$cI%~s z)XoQ-H;NSXMEYeOWDNh#1#~&B$A^{J+bhM4A7G6fJb&(isqLH|)$ZfrHu3ZfX?^UR zxvPx_VrvU$bW+6vc_)_wFLz6t!^*8ZysB!8`TO8vgxh8`2iVI4ath{E*SG zKqBK<$^|x`oRQcH>Px&BL`~533%E?SxoT;WHm!HsC_D0O%vqKwU7p?FgjCOprvQpR zy6rWA$cEyhqbNo!EMo7cyFW~m!$e(e_Yz};Kb#7I7sKyr=C2ul^PeloEv!xwf|+`& z+|I_0e5Ita3#w`=v7rS%AvdF=rQ_t$RlDtDrMYSi{R<}#`v2RF)KVeM`R?cGW15nb z7{^Y#Jx1%QvD+O?fXYgyO&Fqu@83AbUXSr@M$bA z7T}N0(H!_Jtkugw6rD`83g=vMc<&Y|Qs=rTR3a8RVZ!mm8W^m%1a=k)cpo+^95~wO zd)O+w9=!hh9>MAK8Wdl&Q-L9dk0YWbu4z5{S$HVoIQ?mqB}iVuVZm`bKQd>at)Z%C zU0dR#70@szUceMeE}?vJpsSZ-<<3JFP5c%DHM` z&s_~;hjyEznVSgcS?pvKKOR2kkRfF2FaY%u#>oNZ0o4%MOD{V-53f5ei(FxoCK%yn%a1s5DtlrSQ5LC4=?XJ)x~JQSUq4WUX}9i{mgC5r ze}(x(#XUWDxe@PuLhn(V8|fE{WUS9>YWINBH5sDB&6V=JkYi$r7z)3cucHv!2?Ejc zaUsQvX$(1S6Xxc;EUvN^Z7Xvi0U}fSoYLr31@}Pklzn%voZ7us#V~j4VWx2}&Ddrm z<7tK5Vj}hYH^*lAyrCfat7i@VlA@z1IF4|Kj%dn-b%QGaYBLX{ed& zta4RURSk=>x=SJM{mB>W=+a4iPk*uD`n<Yg7%V=qu<;Kg0l!!2N!h|3$lUzq#b|FShL7stnmZNG@6 ziL>8wVGDe(`kI-D5w2{suJb&;J}gZ`O;<=X9A^i7*=ylKMTMwSWbJbNhg4vPt1Y5M z><8kv845<{9;VFl@*tw^=|0$#*ZWzz z(Jy(LqcNw{IHk;0{V*Kou-;=~YfDS5 z8IyqD^^K+_=LF#I69{qFM?hUEK|i**?tK_xFKyg9c(G6QtMTJSc3yJgaMviH;w%*< zN-ip@n(ulR$0uxsj>1OXRwVB?)8DJ^AC+>&2%W)DfWHi@zP-W1wY`JXbm2&XrD-7q zqj^HF4&|0l%3FD_K6`!Yo@NIoM;u?RT2;YP5bzG(+k@zccd1|S(ZtJNuHjW5Yg&8W z#*4<(uj2e}>tD%GH(Q>Qzc9aUM?OglxmNSgP_s*;m&p=79)G@%#lzKo#iaev$Tyqi?7RZn*`YOidgv3RE$CmAieKO^?qmGPt_bi0W{jv39W zSHUf~Rn{kdI4w(-qAGSqvM(Xn>iPJ(x$e7_nUgzhT`Aacvq^<|sS?0hManAcqN*32 z^M2i(OwvQM4KZ-jI{aZ=DN{Kz6-Qhi_Tlxq5HTMvbw;_xLB$NRGlZh1I*Y^6_3_P4 z1BC{>Uq}1B9xsu^^?=4NO+76S`)+|%D2oq6Oy582bQ3WHPWzd&tEJ_9>u@^B7`MuM zcf$Bd3<>8|J1i$NXaX3sKK7enFR@1#3gg!>0-n8ku+x*=BdVgrUVNP7FV?2HwPD{~ zm#^~bE}yndTuC+?cgaHMAEcM;f%mfo7xJ~;hkIo!(=}C`@(qSwJ|39JD$cUyzB2(L zghmgC+y;1_z|Xq%y6DD`OQTEO+xZ`mH=H5KR>I+_4jlSV_eAlVgqG!Noh}n!&y=R; ztSJgLKZr@7`OmT^1(Cl7uC=p|{duV3_SAM<@8EvwYfpsxi=FM|aT(l6j7K5zT#vf- zUP^HhH#mN2i0cRe>=kfZkB@+-oI#Q;{SeiuzZAK=h~K!|%`QHAe(b~vbfJ`{Ni*Yq(^|Et6a{a#nB1_&+SYeQiH@3)p;mAG0sRE<@R4;Vg1AVtak05@jZh z3-q|Kk=IPQtId?}O;`DO!urqhIjWvAlN{al?`%!u09g7@a{|}Xwuta8Zo0z;R@ncr2;xRP zZOiFp?WX-@>X=7?R&-l`-XfMCt+sfdU*UcbG72_X&x6%ly2y6UY?E1HxHy{KIdd~# z_E7b9*LpzP$(&VM+ASLoFVh66U8e`k0h$3m(>qCF+y~@P#^V)iv24ym()@W^o(^7* zn;%%xUg#(4;m8Xk0c;L)L@%alsWD|JRDPd}&7)$RbtQIhiCA^q`~JNS9$-Mwig#h* z!#L2O=x7#daR+;!+UV`LQ62V?>Cmz6%%<^b>iPKEv>l_bE>~c^qpGDQ@Cdk9q%Hhr zHmj zL-g_dyRd$Cc9apJqpL3sndpf*aA$V(oLw(q)fIF*S>`B*PiDv8d@ypeSIs;AWQ6mx zo}uTXeoEJ?!T#9ztp(>2n0I}?Z)pk4U_iivQ_`~Yr=h;gpn2F^u8sc76EkOUg-y&q zmeuG7(nsFc2zW9z*!nb`3<=i?yjj87l*|)+xNX{zaDG^`bR6h%0k!8kA@u`Bet+Cj zFd9zuQS>w^8=^+8-F$Wkt`mlA(fN^YF*lv--K_rp$YWm5dR=oz$IXU7tBo1!ecWlr z0EMRhi%5^l<`j^&yTg5&*IA6CKv%!&dMGNp>WlN^J&f$Olseg+BkYO#x+SEU{05A| zfuW(`d8(t7tYxBQh!kAqY#lE>w9~>I$M8pq7*n787OGT zyZ?5TH?0*m7vMyCFwbnXFW4njH-h&%V~~vHe?7oirNkpzMQqdc*^mrVv$bF$Z|%A- zh1(ew2ieDyHSce?{z^nJ!Rtt(pQRja4;%2lTxyW#-$M8BkjW?VBiFz1`S?WHUsxR6 z6xIOX5!|!6RDNnSGm=YE;6s07=l>(PM$vm`rCO`%eowg=MoS|Y*H_d z!-PRw_=hTcck9FEdmNwCihf}J!ci5l$$l4+xr>Lpw8Zc3kU(g|$s#~N-J*QW)oBY% z6e4+Kno-H=AX#3V;g4Gxn$Xf8K~xj!?R8l6n7#u`oyaK}4ga2G7JS{A3T8gK2E@e# zU^JErHJ?hBWGy#eoEicX5P)LIkwn+?kCq+J5Dalims??L>Rv}U3myq zoUA=Rs{7(UUh<}S_e1r)wBnsP)Cqj7hDeTX1>PMSD^_2K=<2RAWFtY}(IT8N);+=Q zmHD?mIRhi(uY7C|TATaJwmzpekBaw4Jso}P8uz_q7Z;9m0xrJLFpH2810P7A(` zsVE<9ego_E?fmRwmhGvs-6|kD`&*3VdnjrA?^Tn)=J+C_roR;0S;H}Ti}fa4(zAHA zn?@*5zw5bPFMN7(Q3Tvig~#84O=Lykb1L=>s#W08rPm12P-C;T1#1W;;PB^Y7OD3w zuyxz`VmG2EJN>+0l zZXBYw?aQz5TmJ9HhITP`UiK%EG~D+{*>$^YnE(JG^t;>J?J?8PM`Au5zZ6@7@$X&hC{#f)BF#7K2L8)kJz-h=xn++Cg>jXO?SAo6F`(ES4 zy2-@AZ*XyMKUsbIt_jM*YWYhyZ(sDH(TkC4s9=RNx(+A0(AmsMz3e`QI0=+v4DU_^ z%wuxEtQ=8hL1}~`{|Jjs6{q?80BtHsXW0|)?(m~{5+gpl3?+pOpS8};%G&mwMyr#| zf75{i>sXwh$szK0*46g&5q0N$jV`$Yk1d%U488mr1pV~BP0AbmffFeleS=p*Hgx<= zCuM=DRJ{Sl)+J?l-g7<+Wfiojs=) zAfU41fA3l{eShB!mtM5oBzah9+$!Dj9{)x{;@20E_v&=cPBYd(-WXAtle zoFjkep_NBdM!ZBz@cw7XviXRYAGs<4FeR{5ZwrEUvK=DKgguC!`tbfJ`)4#|UAx0I z00);0+|u9QZ*#ydk`&GrQOY^HqPToT2Y%EU8vL!Hr6ETv87rQuQ)RW1Dv#LyjIGU% zgN!5#jx04ZwWDSZqug5LRHvh*{Or4?jhur5S`dT~i&yLD#_}IW(52!*wvb7Iao%d8 z+ucO_N&YnIm=^H$WOhlZdp!;}c!LrUr0ckcibIQ0R!RW~^4pmB0o%$|w53mQt@9xj z$SvqD6{Wyrsp3^kS-+ijLc;mx2WFLkj-s=kzzsbfK9H#rZt=eJnnDmdiFr`@g-TS9 zdLP%n;L*d!EBuP7A@Oc2Dhk0xnmp_Y?+#n%*1CAl2&2`mV-NUDIit)-2vIqFmlbc^ z#Zp^jUG^SibTak!Z^Wc=o2QX|1?B!fvctQRL3W>ck*tH(yCWvYF*MPu zgJ+L`6b=ERwHjd2wHB|jAkC6f_XaAa_(XJBX+$}C9*s>dDaQkO?UMVo#xVc?W9lr! z;%c@m+<4;-O$hF;!5xBIaDuxN+})*vyK8U=4#C|$KybIaU$s@fbaz7*|;%ow|v);ET#(bdIodvG=S&zFA% zk7GC=Uj6EI9Go{-IfqS-*57BUSg(F8^-(K*m%{mMwDzQEu#-POklE}%K#p-ZckH~g zv%L-ADRCrAmn|^x-!L zuKnq(%Rc|++Na?9mV$iuje1fV6^hLzif!^i*uTHNH)Q(z&B0h;(N{H{lmwd#X8Nz# z^?gpo0bh}+I%>QAvXr%3rg04c2!W{}ilcj2S@tiMiGBsr1!uKaW4`2b-C3 zf$5Fj+;%Guw-CkWOpYb7B8v(w*xrQMInM9Cu21$bVo0#cP4zXt1=bT#_yw6Bg3v9^#{F z{M^X5lb*86S0za(KwRO<^ik;8tA*O;iC$FnhmKUi7QVS8`ZbWYx(u0Us&e z8JoiaS~wV$vN|HXA6_{K-l~!JVX3`(?El`{HSSUy;bm_AcYvs-w`!C+%FU z6BM>ZU$t;bdYUq*Z*Jjgv){0K<&@ai@hkF_fev0APp-JMwXgaDx$qic&KAC?_>myp zqG~;ApBQ!zqXeR9?H^ByJ~w%;)w?A|b>3Z+yDq+*egEmn_tBByWPHGV;$ud^p6u&Y ze~9Bn+|tLQH1o`=;+Ci3$xs@9L-ND=+cGICg%Q}zg27M+>dawnmxE8@stx4Cd06~4 zneBBmcrK5YNc0}YNl7)kwZK*D2A(9peB(bD{bt)Z6fA;;!`lLDtHHFq!6LtUJbxt} z4;_)hsLB)b+uqZ~DtrsWUuR!EI;sEkyLAjH_m@3UCO{N@KtoG%_vsZXYhmA1iiR0f z0|z@iNnBKk%~lXzB*TV+jPik9tG#N%Y$1~@uFxQrmxW1X7>?FzxSeinMOVlocEsF< zu7Y9Jxi39g9@dwu#M<=a21qWV%*w_q#3z)24Dyr5#B{xyyG=u&u$Ua_EP7Y9g|GfC znfqkhZ2$$p5R=8Evsu>Co_UHq*$N*V@q3<8W_9cZBlgjtC2*v9^q-_-FD|fV;W0pb z1TCWntnHYqH=2*b>Xg&hMtyD@Y%?_2>HR!hAK$VqbY6wJlCdgC`zf*VcUb>8KYUq} zQj(7=mykbf^qgR->YSyRT5E_=Fl>mW4$X$^gMp$0$O8bU?&7Z_bDzXb>}5xeEPg_3 zS9SP8r;>g85K#bZ_}e8@!v1eEa}jk@KmG4*I|SNXvENgoG|7x+rD#7LjjG46p1p0 z&3>lEc292=wlJ+rD5zw`_1sO1hof73v$%oO3y9QuMPA{$`?-~Nt{v9RfZQE=Ymmc@ z2lsYyQ0CbFhff7dCg-WN7Z>#t>{QXi*ryJ#HhE!h9)gIVlL<-^}TVS^eLZOL! zDAIJ9v9A+B7)TEi7}q8Zg)4@9tyd<#zlZ5O1q^E{Pk*Zd0Ns-!1JH=q?h5{(Zrx0(=FD6yLl+rlu?&=b=F3c0Gyyg!F z7;?0VAre9Z(p2ID#GU-->gW~b)Z&~dsA5Cw5djW(!4sO%9p5=mOIR{6#Z$IB_~{w= zcCk|#XL~vea$`nnX65mMjaeOyB$ATG`qL;Oa{oFy3?S@FcPw=I;cmpkqqqqf0Dy7T z|3JyS$GRE8fPaZd90O|Y$1Spait^$=b#K$99N1w9#aDV2OYKo{w|+#>D{n6& zFezIfl=Q8-=N^s35c6wBcXFUk6*mUK19TX1A7#Ms`XT`6E&23_p?z_QpCH>#AbN7t zSxvS|T+f~p?gyyInK*(xT6&DU*T89QQMBj*h{p=B^~J9X-3f?S<1Z=y@sSqAIBrn7 zQI~PMHqGN_Y|&)^#H~tMt;=Rp^c!G=GjeB$c{~;hAQmu&wY^gWII;pKjqUlcLA2Q- zLOLP!5(0Q5`G`RQK1~?Tb2#6fcjku1bw;aP|19`i=X_2PbncJ96mRUB*KwfMOcUT* zt{+=GWZ+~Yyye9{u%duX;R8YeBz~e3$Z1qtan@s%Y^2cqyuo|*01uG^00CDIM@^lI z`pps8-JZr=0i6J#m#>=bzJr;u=nt$CD1cUf+-gYl27r=~%PmGkRdZ3N{v=XxA<61K zmgq*Of-BCL!;woVLR?yu)k8 zQ3);{0j_c{+&z_~0$WkHP8vCjN=FeGs%gO<7z7dRlao{V;04Bi#ETvX6WSGRIQNmF z(pn$BL_SY)cX4qcc{?m4Vl|meOvEN&Cq@H^0JntNhWd=_JlKgHx2lS0k)HCxF=`(% zh8%%QAJL?k4{cCjF~o389a`lZHTwJMx=k<{bJC#1zX!L-Cs2C!7<{9Sqvsak`C!r`Ri|l%%y)`wDuxAl`zUW z&LGd?)_BF>F+#ys(yJFJy-}%F+Ds+JBzE3cso{VjWG&rb$dBp7)XA{6*Y z(m;nF2@Dtx(jgo&F(UFF`RGry(qaivaP(zya>h8BJ;t?^NgIT)eqFhD4C*s|gUrPE z$Ydb^+3f;~w4|v$*CJZ~j(&0Q-@CdF`x>$AF$~!+pGNPxAphv$4LmYSBx2ZOJ2TvYb#LsYX~qXn|CXW4v}1+ zmPrnug8J*Tg{%#Sajl-;!4bK*u9T|A0$8A+IK!;Uo)vMDhoff3$!r{e#7YNmKw4xN z2N`3ia2%&Kcyuw~3~0oZ{m~X4APNA4q4JJS@6f&r$;7GpvBzu&`(0=F6{0=PB- zg|U$u^qYuELm&mh-#vjsIsh^_wuHVtr%+v`wr~iZHIB?Ya^8t81jm>hd`HnWgnj7F z9#o(lfH=}nyQn0Sf}{-_WQ!<=&vei{3xaGsYV4RXb38iTeV)ca6BZn#MTkuS69EGL z01uWLmfm#PVwG+(nQ>&Y{ueiQz>Iyyk5C`i^`G9<`lU4j8VDjBF)b)unIopqDG>yM zw`bw%UcsFZo*>Ivg4v{($1L2AG$R{bj?<#}XrMnFKr8|xhtQ`TwYBHM_iu8^0Ti%ltDK4OO8xF`;J(Z%2@G@l&0T` zY+0T8T8h%4!rrlxvos36*{-57R`~~=si=E{W(o964)X6~HzrWzCNGT~+vL0g0Xy=< zV6ZB1615BB>L;YxJ!10nQN{kfqF#SliM$&(3Ijz9+_UAtW1Q2>c0*Uf16gg<+fWz* zK4{_nY0Nk``m>H!U4+e9UoY(n4dR8K?*zoY(d)UZh|JP%Ube9*DHkaxjBlQQ`%EfE zl}a;C)L2zHI?SoTbAu*6JFO;U+9Dt-vMFC35ef(hpu%!YhlV#peMuQ7HH7T%yX*ug z@BsWNwl6q)P>dNASV)-IfFOq5OAi4Ye%fIGd49;&^`li+TSs%F-LqPSAcByh+FVqFJF;pa?0(Wg1S1 z2xU@m9(MrkU#IJ|_d?wfl0{qyB^CSR6gxmlE^$ydakqS}`P<5rj+_mujQg&XgJ)M4 zf&*eh&DgZYvvcugdg^{mgcIjxj=~ccWO~cY%~E72y4$Y#GGb}4!ZRgFQ)yl?OI^Z! z#7Z1BE|g?!r#o9MBOF)O@G7#`gL_ZMKLCT>xa=<=_Q=4`gMzsB{?5UkNn%h$6Rv{P z6@dhw@^-Hq&DgZ%(KKv0;XmdCBslzHS}Vzbr~p9)ezybP%}Q*t%sm$bxnmVw)R*0p zyjVY|*d|a8Aa#sMc?OdnI?fJO%Ys$rwB8pVnge~f5=WBglP@Xu*Kmdq%XZ_~U6K}G zMG^70%66|h?WLq#>uG4tvThNV=T}xVTAQ-&`#I*MXjGV1xNXa<9#9EDVKY8t2plaZ z9U2VKF0s7zNPe3}yorRYY((?(9ePH;Z|T1`1C_+|R|kyt9gb5btv!H0P=nKq=h?_mAo z6sjwkG=bOOcV#lV7;>?ygaK2YC_iiZWlcSzsqb=AhP=`4n%Cibe>txV+9-Z>FIv3Cb}Ov3afdKC18?rER4@XGuKQT8{Dio&GAiRq>Ao-~dnnfbgWjy{S|$ z!ttu*tKn4?+(=kxy0ESI^z32j0n?z7?E#cboYZxnUzYdf>K5g9>TB_Z@nM|ID1AXb+48QdrgP0M9;(KZr_N&V znY+p-hBhTahZaVhoH|}ijoFS!a3ig~NRzlfGoHuS@VI~U$G0^#scuK(jG6Lu{}E^% zIhBG!SH!B$>#P?7Nf$DA^@HO-a%D1+KKAyg{wTH*yQYVn^j}nOOz?Ck(0#h1VHLRxI*~4p zmi($ZlVl22o3P+@ZPJ{2%BxO2H`g4-=dkX#CO2&G(M7XHU9f;q;!%%}onCg4l4z~2 zpq;sYxH^877?0mPp%7@K=Z^qaCe>sbmyv^M)-L@5A6o*^RMdg{N)X6v)YS4j-w`Hu^k>Lb4PAA{iG}qOd=BCiG4Gd zHtc808vw7?wt*N|6dc$p933eNQr6!{5`U;US!H%MZaai~xQJF}`KD8qyyI}H4x6%@ z38V|$KY2Q){wZ$-AvnX)IalzKT@{E=n@BvM?BbfSb9K!Nj`nir>1*%xdB$qjIjWI?&_Qe@%D&_q!&>@(z~7J~&1`s-lv&<%h?6 zPN6zCl})JTYzxM^-O=f3V_P5w?8n=ACVGKL1}rE;etakkCvC=*B!*+e=P^J3)ZqTS(=d*Vo-}Z^{g%_jW&0DUwq0;g-=adha1KuUfh1$p z*biae)6Iq`TiANLw@mieiRH?#M3g9~CF6MDg*MUN-ee^YTJ%G9Ao7-clLUuPilw)< z_RkizN@e6Q>RMokGwjD%v@AhEYCsa8zPa&lz7TDUx*^ZRPGpwk;dLu3=>?V^5o*sS zE;?a|telg_uuR&r4PUip8HWAI8LO)cG(8kx*uq(wf1lljaK;d~pXjv8%kpa27}wur zxLB_v<*vMOubn10TZo?QPy1=AovVUBt6iG2?sws8XT&!fv&UE{Iuf(RMYrV_zcNbm zi(!#lqr+ZIg5`j>9Ya49sNLw>bRCA{@rBVRxB5t=YzvdmCBx<3%CEH(X+EorRt+~% z32a6ZJ}!Ab8lI;2#jQ+|0e~z9Y&c(hs{7?~LOw4r#GX(dgxPm&RerqI&L5tr$Uiov zaX3-^M=qvLIS#_N;*o7D?kF#dp@^XNq+c2?y34r2LTun)64XOYrfOz1hXUR{ z;P<9Ov^We_3XVz>m*P}K3vlv7N`xE7mbVJ@7*P1O@%@e5JioR?UX zDu4UkEl89}^#6JxW2J?MK?*~W+tB%v}`M)2k2o?#T_qSsGuSf%yWTWsCQ3eoeO zH>5&15FO3m;z*j^G)R`5C9)ad01@-G#+_>eL}HP)^E+01s4gC=XC z7xtbuKe8@opl7%PlnVc`lv6t>F0$g0uV81I@@r|UZciJ)0FC1+e4oaZg8D!qlhCuZ za{ImbQza$N08ZKGk>&kDo!CKMmrHtPQ->BYtA@M#b3XChwPh2#`4s>^4NW1E3Ut;T zjDzA%ZyM%bEmwW}g9W{zZK7X1xZ%6NJ?m^Oyu`Ran(I35Pt#ULV3M>L{6?yZZ535l z3>SmX9pbP9P70K}n!nHA_8dk%cwt$F2A7(Cr)C+lrHw#;q>)%QB~a?# zB?nZl&Ce%`x)yxJ!wf|nJ-)Z)NnlqTw7`yIikEdvr?kenzRuvVaNGWaVejq!MaH=s zTS4ziyT}TvhXVAoqN2Q*S2=To#N}wDKv{$|USYWex7vS!4DV*1Why55!}lU{+YaKfOZCk;sV?4KI1I6tWVW z$|VaVkpke>8sQHIYpcp>}h-!ynL;l4RX|88m5&cD2Hp(l*cymhbtJ zh)qTqEIMs5*SwI!#FU?=?EkZ;$Yjsd?6XSVxvo<`R^ev_rAeU+> znB)Oz_dK9bgw^tIX<21li)B-14bXEI*$4n%^vxw*-iMI|4; zPQ5c@*^vLC*T1aJMNS+XNfJviywrw`x)d!ELsRv>wn{84ZyH2NiYo{*R}F8RTa}8I z#M@QN-iqT4-@V@BEvx!Gghu<5(Eul$6x6^<|9JpO&+rGxN1o60CStFRPcHTpJF>1H zAd=3dPy4&{6JvJE&du3eyp{6bYKF2KH-tfE+1|9SU#|Yu=pqr8@oDF$4NaU}T=ckF z1>DjMR?TH)`Td)f)po216hQ!N2?-inRqWW)mpzdyP_c@H6Rb+BE;A%`_hJ}ZRa;y8 zMaE`Z9sm1x);~U;`=$dqFt=+9TAuqYuxtQMEXkqIk8K|^l+KvGOT&2FA8q5Y5hW*M zichPl>85m*)YP`LXcaXD#f-X@U_UFEAW74zInaf^o+z!1r4fjx9LcNesnYy_0!;Uo zJ{*cj*7ei;D6-h#8%TyDMH1v(mk^hN#L4OufDM)rFII=|QLn5HXJJ zb|JKLZ*0Q{Vh*oK1_+3EpQ@6p_T_P&Cc5cGKYOF6^fWEN0R$A@jMUS(`@g@Mpnrdb z@2*5Ri|H{tx}n<8L`l4mxZI(h7q~pDGN4{{9b;;4=kVSxWEj6^@_P$yM&TmWD3)*g zHek_5Zt2)%Ay=YAr1P+PrJk$%UIms;=at-)+uY*WMk{+Xg%;(}oAIK9ErIsc3A5#!ISy^1y<#}_3s5isc z8!borX%b*C^j)?j1Dr)+3mUDhJ8a?PfBS!QTH|9UPh8(AM<|VVos_EdTbf29#K~ar<8H z4>dM=wK6-75=wDU5MZh~A3VMdN{p!DG51eLrRwXk9w|fs$Prjt&r%3jP#&|f!h+O} z<9&6y+Mcib007vM^|!FI3|+R;wswy9uRwVsVPgzjOjIoD@{8-g8pB4>!v5>y3e7(C zClzKSL&!To?9H_B>L}ex6X@1dRIH)*XF{$(YM(wUEWu1H2{c|R#o5Q z_3rqL*#8Wc?@Pzsajd3)Q^$u*TZt(@yFxB1ZQPkeA!e4_){=eu8?V|PajZYT;(->* zC=N$9(mOKP`x7S9W4T_JVI$wfVKL%6JkAuF{atOI9+`_(%9F}u5Jm?@{&m7tJ${{CDwOqMXO=8BK1Y>cfB#$?CSZ4#BUDNv>pQy~%L*!iJuE ziQjVC>~%4q0n|cmkJY?|)TlXRzN3x@RoCB|pW8*U+0LHYgggY4L@*EUhf1TNa42ej zFW7q6uJ+9X0_dhHbGfWNIH53DycSNh84TVwSDM={Xqns(hcBUiB;Cx>%0gVurg&~2 zD4c}}ZhuENPx{+FG7|Ux@O`G=^)v7zg`33{q%#bhQD+epG^O*9%!&kC>dOIGx_HFT@S1ow4;)S zmaIKZB2ZM1LRU7Dn6Kg;tiw75h__I5Hly+bzC!Q?MTsw946o(EMdg5E+^hs&Di zf_$8xhTMGy4h)ERZnhe0h`n4&`PdREEK}!MudkCoCK%J0KOwIK&rb#+Bz;T>(z0C# zFHwHI{v)2~7l09%_N95@ zm(>WJvzGfZLJqP}RZyUduDk2hn-qRtaOUBGs~qOD#XijF#7A-fNH9s7R0 z{ZMsON}Ta1V~cye5GHo{yX$j`rGmrN%KLqcr<&W=c~*uE;}+Ys(-M=5;0E`v3lWIHQ(2tRq)&?L zO@}E{bR?(*k*e@4E&gM^i~7xOTZ`xZcf_)ZL#B!{eSc7-xldOb><6$nazg-xwRGry zMPnpMjMwzJPopl2+bru(okKyEx+wt$*ZW&i;nbg5MGo5$#RV@TX;9HS+OB4l)=S7@ zusPOwJl=19_avILfvOQw<$qzS=rhv0uUFj*y6d2!U~vAb+=~Q2kx58LYy~?@9-~+K zUK+H;m``=NFH&3|ROwyR#0ov9$zlxcj!O^8pnVUZ_1bMX@-Y}F`h4#fqzxsT<8j$k;Mb=L7@{CjMa5-hAH* zUnKeP%!`VdB5;3n@J)~N6RubY1C2sX!_KQ~uFu1rjtay>#7>2T;R7iE00WQUS7j)# zu?{jUCwRU2a|-C6=%j{H0!4ZEgnBNcZ*;l|74j+xx*r#m$sDfcA8ec^`k7^AC3|yc zy_!&o#4Fd-7i#( z&9KfeZuzIx!G)3dtV$xpI)W^9?DLndE`6I?EhJ=Q1_lO;@wE6v=Sg#Ph>EX+3lX`A`6`t zW-*{eYdSxp4`Ag>50n3kvo#^ug@zOYO@7$m)(jE^k^cDzKWLhuo31e|0fJvaXA=J9 zzPDakRikLC-?ZYVO(r_M^AmJSof#YUzxj&j0VFiDQ+u|SEwhCDsfCr5m3fGE7)U9L zalxK0AEP$+9+Eb7fDAg;ImP%1d4QLoG8W72XcQ-5PZs^@L9gdh8i$`S&ADcA*6_75 z27snT&b)sRW$Gi88#y;^R(f3b{OXrrYD^ivcX{E$N0v%(!$$xW5!m>!Ng-&%2Ricm$$c_zBD2^_Fl+}{Utn^CLWnF z*!Amg}_L+a*FWg(FX;d4lJ#52?*)7Yt{mvDf_Z5A2ekA zLQO$d!2e5_iaR@PZD_-p3a1Tw#SbQ;rhzagZHratu&*t<#vmV6d=e0<=`vufANhEJ z!PqD}ECHNx%gipI?UWET=9DyeQ5R8J$Vt&}8&lfhNgV69%$Faq;CNwf8#vszZWNX<*lX7px{uY+O7G0>FqAMJFS-%1e8`qM7KW z5|M>)c*2T0&<@XA!%^-Xe)572pjiy7v?>fJ@!t_?lAuqPlxC^kds;&aukBb7g~{QQ z9qo_bFm`Zm{ECSz0$fFtqop;S)z9o)T(!A33832Eg6b6M#+4;t1+gx;{|OQblOT`R z{j>8+zD}~&2&P7RV`%P3EI|;>hL)C;u4G`>*+@4z37@m^ubrY2AehHA+N6-vc91HU zQ2No9x?|lI`PMF;UXpsd7AVo`wZey*0|>$}fiRdFxqh>GO>_w14=$AYQw;w`g4|MWdW^&CICa^ph?x#6@wXX{WO_90C!#^OLW17rF2-CT7#>**$fDr8){~BG!F^=C&y09BX1d@zLcSG7v}OnWOf)@{A%wT zokOMxi3?U?+|crZmBVA{w73ycvZJiMWh^q8#PeF11`Ju^HQbBxGI9^H)tX<1Bq!+~ z#&~+gk=tc2M!e`x-AHh3%N9qCH=cCyd|yRoNe_=m`dNWN`l%hwg)6&-WblrG5@d;E zJe2*GU7b>~4jQH3bg}w<7S8Z=;wJDScqtoPv_1H;LxMxm;KNZo3EMsfzztxrNj~2& zJt?QNv_0Y8+bPb0OL@$l3TqasvK%k$E>C>M-OaY?4*fcPh5kT&~$R~gLwc2r5}K}_Fq-bwcZ=1XAHK#B}_PTl!`tuT^jf9)ni z#JJ$8vda#8Gg}yKNvSrkn8OCZN;+xrV2#Y%9ztxN#Z^hA9g^sab;qS5!i2naO7bB_ z7MKbcD6$yo1;)3{gRpeDttE4&u1}UgK$2v?4D3g={kAxk5Rek3DlIOAFG80)V~9dZ z&e?oIvKu#TX8E_)%O?(!-7?0tmD8*r*h0fi2uEmPuL^+F_T01)4gPTB58*6W@`+R< zAlozceHv8$+N8DSU-*d=mH+zfFc_SfM3KTs;Pi%-vEggv7r~mMm7fy*n19LTBHjP@ zW|Jo{L@bA+J4LP^nhWR!nHtjqr*%Z%me1XmyffRF001t7-d?Diz-dz$SV6@KI!+~V zkQ}8Z9VIju%uVk6i(8!NZK!z_&?264#AI7HJ!J~GEbm1U3PDp6W45R)zdz?2H?K?_ zT+1ZfcnEZnJPRYl4j~gEpMTQPsC@H$`h7{ihkKqFjudH>Hg}{(i(}u+4?=+kWGPx0 z85!xtR&ZO5(7o;rrI8Z7G!BMx5@lWw%O)<}lvwHd>y&m5Vtb>V39oV7bm9-u9=*>Z z-m>~5l6|ijB^~!T9XTfddGSFZt&1t{3TpcS-`W2}ftcfDop8|R?JsmF;x#u#k)vQKnxhPkX_@m0j?-GZ+Cy9Qtfj7 zfUo7Vljf-!_MT!?`0i@iMW`hw^k7&>>;ARp@bY!7Km3v6#Xrw+{&;P$UuW{=>yB8D z|Ak=nJ8}MNZHg+yf`YK3ijmQ3kd?{!U2rui^gkHX-j^Xv%I}K1KvkUI0s0QTFYusK z?xsar+hBF|Yy{x34R*z8C`Yz3~BBUgdj!XYp(5D!G9rK}(h|m+H(L1A;~Rhwm;l(QG+GskJ>6oa1y-Xse31Z| zDA;&{OBKu*gXG&72-Y0KHiwp8P?5Ud@rotKT@(lvL8pbmF&)bT51WxBO^WIKmN!uH zE@(M^dPvK>-n4g+((+idM@?z{oZE(WJ+<|2z5RfMHvtuNvG@W1$zWp(8qmiYP*x(; z>h!l&IAp%+okfQ5UU|8t>lX$D9t)KQK*@PN+wA%Ug1oZ(B4s}1Wja&|d8rvHo5|~Z zbe8V#%I1eJB#PE$_Bj8T_`V^I!|ycHL4m*ateHwNZh$NX!=QJ8#D(&{c;E6LvxfgQ z9m3wH4~Y999W93O_H`#{3r6EV9%TQvByz@uR72o@fE1!U>6|)}g+R!6x#jNU`Vw9l zk{3e_qBRo>b518(v2MSIJ*e*4+dA+mu_t4;xAAD0=giC`^^zH8|9zGJP;Ofx(KXl% zhSA4-&eYo>R~DZcz2*1k@faL@c>M!0G-1tMTliXc{H(Wksu=zrwYW*EY4Vsa9v-XK zfMObor6Oda>8)weJa#WtBRtD_dRpJ8@%wIht;bL+6#3tfY* zX=LiY<3ZA&UME$#V9~BEL_#s(?;U$DBSrw=Z4`%03>a?qy#CNiR!VqtGOHcmBb>kj zQAsw2<|@9CS;5dC_IDkwW!Xgh;di+(Nrt=xtcd+5 z+VAbj;d|?f403V#jZO9Csa9*-gBrsC_D>c9#3p=w_Q#!lO`5toP1b8Sj^k8d z1~yGh(-(jUNT>H36&=M4#|J!#Q!euE;h~OVNpYXzpg*MsK_*@ z!WT7GOSXAD*Ypv@M`TwSl37H(nkM)$?Gs3` zVYi<1q;RZ$YCVk7@?wv`I{&hoNr`_w&%SD2E!gCwGy5=74(#gOe^{R{d9f@QUc%@6 zr1s(2I*W~>PI5%~+iU(Ds%W;bzjVgyLzC(RJickIHm3qbh}b)M2yIk>)rS&q!kCjK zO*5n2JvKT_2pQQ5Lf{Al#K>E?oyMf1Djg{2t3eE9NKk@=AR4rh<(k+T>=3u5WP6QAua8j+a1}YYXFA}mKBUgt12f_BI#pn%GXXeS< zLkW4~EJk*3K#1{od7jg;;j84KRz=Im2*qG`y_dZz{+o1JhSA5m7h;3VRb}(T3IM<) zrA_1UyxNV&Mvw`0igTEJwGaUg()RHH>jISfxF$n zNk{#I>)FyGT<9=bz(64guEBck$Sl*x58lA<-tw`#xVRA$=`@d%3IMTm__p5h_?#T; z?+#%>^c5WkrE*i>EDPW%@n`T-YnR81BgH0B;;r($4kYT=G^2+r_hJs3?f!i@`B{zo z&$y2ZgIto|THYvGy>;|1?lI`~RKIEqym&O#WZz$$#(q*TP8cvyqLE8>c9s=CJ#(F!J7C zSJ29x=w}}%FSj7si2z?}XffabR!)6qO@2WO+%%`1uy;Z4>de)~Z&}uiU`NVJx+8)< z>X=a(Y3x5rT+7csU3<#WhgPNTu;bhPLBD^WSneJN+rRI9hm<6R1&|?>5bEgRF$6IO zcU0J~Ecqly4PbA*nuv`~J6KP>o1Ay<>{3s{1G+dUth~F{jyv#I4)h)SP=k*;+_9{o zcPU_jGPE+%V&|U>QPPYv%?a=Acl4|8_3zG_R_~HIuU~5q{NPpPNoTG(hOE97XUDrW zdVS(J_j&0b%FJe@e0#u!JY7MGU-Ok|aY}H6M8!u9?Q~CQ{_cjsRmpynja;d>I4a`j|IM@qbnfg zu|=GLnfK;mex4RK?M)YtLFz7LUN^NlIs5Z6fIvjOZ+#J-Ku0Yf-q`dI6qCV}8&*u0 zZ)_v!)I)Gk)@1*7HMdZ;0vEfocgE84i*^F5=J=G?*aj#t8TG0o{Ee|?Gl(3A+EVOs&o*>Fy(wgK>LQ z|Juv?#SGSwj)(1bMrW~%zM_JNMe1GCfQh30fYe9Y`hL7m0(=d_RHcnt6|?CoQBFjX z`WPZM3bG@j8mQax^0j%5)W!Qj>cPM{oms3z(+Xmr7SA;rWbRLHzo?j*sx0r$saNb6 z$=oHZ)t?V?{T@e%{bvt98q3JZCsaxXl85wX&HdOrxn$9K-10_f86Po`W4}uH{$ahK zc~_Bl@!}?Iieb$<`R_@*s-)iArk$&QPM2fq9Lv(Fr%Cn8PBI0S1ku^S>D_PLkx55r zJUTqs@SSOLl-avd$XNb+Nd12NiM;CL5TVfL*cHcM=i}0DlQ{u+=jJ6D?om5Bym`vrC^9|LzSm0b}&5bPSC;IIQ)- z^q{?dy89b$kV>@9I7pjf`Ig2+q7B}`$NkUji+U&OF`PDp{Fuc+3iTUZoIkz|!2led zx^~oW7IIAS2$K0-;CMOwj02hEP8~S#K&-?lWdNJkj|){gnsZ0)`vzTway;ft{kuJ0 zxNjk;FTn@3pj}6oT?56NhC+Ny^26z0QdCHNK_v4FF7jVuACL2>z)U1v zdxg=CCk6kz5dPJo2RL3Mj89r~?6D;#wgse8m(1{gD+g)7-7$!( zx`&(K9KOhu-(dkcGHDblz<^HwA{{2xWGHkF#I7y{uK6}jndt31<KbDn$L;KHijXDQp^Xxq5rE~nma;5vHDKZ5#8F4n# zx}gy>s(PgVT^;!kHG$KJbw((BB>3Wo5**b3v_5oO3mh-1YKpQvh^w=uh9~t;Q{SRV zDbd#lL*Y-=Jqi>f{$JO4@JwtkfKj#B4UYd@Jal`PG(_>YoWsuuIjc>T|8^oO(XAH} zA97|`Fx^hef7=?mO-Tl_eKG;?7!jtObR>)&31MG(hyedw&1ny0A?#TQ~JNSJdlI}FcM)!6`&{#!%fiOAyN%85C?onoHS(=019A&Vj@q63meEz zJu(~F8@WSKO+v!Y9AyIYj-f0|U!Q5yR}sWneZ*(3er#Vvq@VM8stf?Nkg8+grE|>i2?uMlgLjF17Y!)uf=*_D}aD2S8tdjQTNB*c?9YfC_L_MUqrTjpHF{UNY(c!~(1zSmF^_A<1d~tPmez z+Y8;$VByKlkZY=UQiML9F!&EGATb~m)S%HOD|86erX}M;ZvZbekZm+=JWayHqyqz9 z-ng$1Ls^79FR<1SNSgqK*$sjj#GxPsQvg}>0ZDAKbjftdX4(m61aa~nc+V8jQOSy- z|DAH%-eQNacDliL^dZ3nEQ;z@#;7V0WQJchee!-#69Vo$Kd8_AoG48Rpdq!=?wSVy zX3jOq%Gsm9(GmsK4q2dCWQkDAu8|MPB6k%8)M;eY!4a5?gg_W}N5*wS6%L$Iv=MXP zAeoqQ9@L(X;sJ;?+l|z`mh(ttWnXOSXY!VM!6nt5|FouS4H24_OKTsjb=Rq?hXsoQ z6AeHN6cNmyuA{;G?dpJo+I8A-dQJC)w&!g62VHYQntI~n&un0tB0VZQm=TIS;F&hol@|F&-r9H|EfaD1uEua<9< zMA&|}+r^)kF24dqoI(n&?(Gfem9oF`Q3#iLukd$yniCBg5dgXkmBx797`k>PkFRe1Ia?MD>AcM*aO!ry2Gk{D%@V zK`vlR+Ca`M{B|~7Jh34Xo_Tpu1Kk@;w~*c9n=43TkQ|Qu{{|D0v&usGNqaRgq^&E`Pr~08+%p&#?H6 zSBN}CWG*s%Z0+#Lwk8^6csV>|VIJZ2sfY8!RqKj-lH=J=LQ>2C$>7cP`u57MYG0a* zNCZhLbT({A>?nUPX&bB$OIaluuQ@)4u+EU2Rc)xJ;vt57Y3ZtIvwIFC_V6+rF;J&h zk4k491hnbUTT3gJNyYqu&KV@iUZ`LhQF7O6lrHATbiU!k71i@@uGHyp`0TyCiyW3I z8cp%aTw=3!U31}{CA@0O{erVZ_fNb(c}&NI1~)opUs;u*P3FS^(*W`!YInBP@$$xT zX3+|nf*uXoY{8rO#Ssg%!#@(zQ{{P?8Yvb3G8vdz(Rv?MHR9>a9;#K&4pTCM1zzjs zN`4#=4pgr(pgzB~ZdPO^tj^L|ebL7aq$MfFNM+|@FzF}A8s6%7=nz_rXicmZe!cN9 zz&K7viUTYAQ_2Q>7FW>0v#Y_)b2z)zoFF!W8eCP6HhA%|S*pWb!VZ&m=QvM;D-#`Zc<6wr((EoAs2LSxsaT-@r3ldpxF|>wh!(oGGiS z$Zf4aUqFfY<^OJ~ex|_&rn#0M7w=Y*PpMDX4rnJu+`LkyLlSD5Gj8^U<#d)#rbhI;()Tf~`>pC=?2`xVsm3E$&{d zxVyVM#R|bGE(MCaJG4k}cTLgY!Ch|7!}-sB&)%7tJ!@w9cQaYiQITeH{d*Bp$orJV zTM^}|rrpo3s|pvx}XMdCsHOhjv|~EpIt;BBh2Yi6;}9nZi9X-TL{SiVZ9@dF9h%MFaLU84+CmnEogz zi!Mz5W2g5Pufjb*%tdY%Dzv0 zKQe+jXA#yv7HB^sMNJ!;x=zNDOe>n4 z!Eixw{4VkbiDe;;y(I^k`!DsYLY&_iRyj&q;glbLkeCd(;)&DR@iRvuhSP>Kn1uk? zDa7Pt0LYl(C=}xWICx+NaE}6pvq-bxIwX-3X`sqEN!ja2!=s8s@-xZWo}*vCHF+*! zV{CAY#L)lDZCFO<&5z*mhI+y;j8pNaV!Q|t=ub<6zk zz_B~|+QcLbqodqOyiP41~9OTMVkQOl9r7qGe$BZ+0B7|2s1X^KGz1rXqA`^ zL}GlJ39T>?7I8u==8Xe;)EBRBio`?T+!_9NKtVwZGvWPN6!J65U|4A4-YQ|0!qagk($k=+L zVzAlNVx@k8^pIUc^=cF8;!mije+qUZS0<4Ji5Xm8f_iSuQicbS_FM_9&xf;0Y-5>@ zECalF=17KHA+th5!c~j5CoR$Si2S!q4{#a$g!33&WSWYmRhCn$WkIQy%bNZ$kc+Ts5zRUZcB`PYYe5^J`l zirQ2%D$m0m&FJqghYV(hS|UE~m%mp_3!AB9Knz6+$Zb|koA>&36{tz3JK}29=PyxM z+uB|}w178FFBUEP4}zFv8y0Fazp!E4*goM%Zuy_3GQf!Wg@H(@Mm18%@LjQ|VY*K9oZYX!=1;1}G~rZ9-vl-8O68>ahf^z5NN~s6>`_ z8_;j8Edi~NOo+_MEbI<5QhxTn#5wMmSg2uJi$sK*g_Ei;sV;Gw(9UHJ`rG*)L*frX z5oe>f69Y6mE$z1ZjzP@MR89TiH)$+b4{r(j$$AGH$$36alt%lg(&_op9s+DffiD5h z$ax3a58eug7P`_^OTQq*{MS(W$`Bv&m3f?B+|GypZ-9a5FZ6e$_|Bw6xOn!?k^l;m z-w+N2%6TL0jm1s&o442dCqfMwi*1__sW7jiJMyJ`@IKMTd{9>0U__zb_ew+u-N`dy zw}pTsph|crR5y?e-As*+adC z-V)CO_H$0%t`4GekfBKL3SaK87J-K!b&7LQ)*Y zOg+$F#{_M=xEf^Y?Xq6XW|R>BK%bDq_ZZ)3ozV1&)0bPK!Erqr#W8(R>&=$~AtWv9 zg)*Pdd3QQM9A+H9Q^Ig)IT^urCoi)jGW_Mvo?aPrW4|=<@O2RR?``4dBFIJngnO+O zDjS|5K;3>{(>a*sJRA^>(YM02Z&WpxE&8&PLntW29+$xtiNA68T&EcyjC}a>E3kTgG!5oDL{r$lHYQg`@diP%Sen*EI3OBpP+tO~kcl zC(B;N6}2EIoy76ke;&xi{R5N}uLJ9Usl>`WKGFm-8w3`l=cPz$eVh|36)Buui7m-- z?Uv@E6KtXondD;_cy4M`qCRz1>Nf`<<>+M_e7S9SB4DLzX?$mrEwMofjI5*Y0U#Y3 zER=}8dU5^wx9Pvzl(6#dL5HFJjMKMlKo{w8R7hx?rHzHMBZ3t{{fOo@%X$pc; zRMD{+VuO^p=E?aZL5T zNJ+ipq(B0Gl}Ai9=QNAvpyE;@EQzK9`Cu}b=wc8=D}5NDPzxiJAh9F}G5zq)RNUkb z1}?iq2(1_(HI_n52`d!d{ELL%03{M7qnZ@*qM3|X8Uwt1u}91QJVP$eK85CFUzWSV zLrCGf^rBP}KbqGWMS#6IYeJJrE+lMzaZ&!k#CGHOtR!iKL5++d%|H};PC%`+O+W#{ zkW4il#gL9R18IOXqTQtS>zHF2a02R z_{h+U5Pk|^J^N2g42h;_jzlTK?^R}{J>UQ5I=YV_9`27fEBI&$NIlbUZ)QOyiR34>IN-U>FV82TnRF6B=sqLJZ8J2Ie8Gb*}Ib zj>OMMAX724GPFM!GU1#UwDJ~8@HEsiw0|;oG#ST9am6`24vOLGsjYvAq$;cZfA`W5 z(#xKSpIBsQ0d^$L$$c~`+*6+W4O#b3$v1N3RFf-ubUkc(m|f+P7d+S}nb@$6*>;F3|KMYd7e=m=|OZR2;&-D<1fB;eE z+=TkiGR60F3=$>pd&7eMO7b8eI=2n!O1;Z37XUNHHP7NwX|Xk2f09j8X>C#GT&>!m zt^<;L4xEJvC!qKb0bR5UNeLR);@T4Fmc)x|hlg$~%09o56%{+?$X3ZM*>^Q(_Cu6y z{(->~Y9SqNFBfmp+*6Kk!{qEfr=m(9o*n}?#peIX@tj{4tY3?g6my?k-LDr4a$F2; zT&mS#q2G4A07L)UEq&+(PUDYYCahs6)o)^zQma|Frf3k)BQ@@ayKCfQptk4MyozOD z<+2Rc3=zB~@@gyC4nS{irLTW@Rfnj~P(Drmt^-58@1iDd-{r=zb1Z|w;A0euX4*~W z@Gwe+%$fb^b8yghL8=VAk+ZW@I!38Rk~q^aK|lBE&dJ{}74xQmgzs*g7P@JDuPUW$ zCY~8Lb`nU(1%V$HU)uk2AKmyMV6NE2ie^&Z_lBr5M!XmbljRDil+Km6zn!N8i`bWYkS7`ukc#mN1xP0UP|yHStrBE%a#4 z&a<>85sX`$8r}1)RJE9k7>EQn#(iLSdND$gan0DB<#FRPek)bY6PtQqZ;(Ywc&9u9NRfk%fps>J8Y zstQGAWw+%WvxMOWX8Bpy3q9sd2_OfEVd^S0q_?18anEfZg4R5A<;VmBP)rDN2W1p+ zBif}c20fnS_~ZBXu9`PwDJrVhF}u5II?nk>%)ItQXD&AlABH=Q<=uN+&`%_dpPYCI zBStbH3dHoi*Ei&sg9n1-G+qvaktQGmaQ{FRX@jZ?IBuGE0z)^ACM*-ncD*AKV?o>eYNYfRA9TkQ^x>g~K9Y?(J*)RgUd6bf*>dTrT!fr32`k54}jf;~6#iBYs_ ze7Cx%HrH3UT=nuky7vC7c=mZVd>#E1?EO%Q-h$@tr;xla`phxlb`!~m7j(T1+LWJj zZ~l`)-uoq0U2Cm$>Uk>;*D^?*Q*h`$ze|C-$!g>IlgKN?3bJb}phxFY`n$*AX%?R> z!2FQx6Q70BS#VPi{SOY1$y@1NZ@rhfb{jWeHu(0rSQYxNl95SB>nWd=1OOOj2%%mx z>bhSM9{*##ms_ZQk=Fr=gTCyCX$u#pV4vc}?srzl?;=xY8+V?!cbig=jL4Hd6Frnh zQW+iG?}id@E)(+}xw)y^;=kSWvi9uE4B=}Fb&IE5-$+7wrbRt+1Oz5)9$S=0F#ol5 z1&xde1rV|F(JSAj6YX_jk-W5_4NqK&xk;LOng1tvD&*M_h#_+}YTmzK(Yb`bK8 z9Dmh}4NTN6bxY@d6b>^Kr*bL~6A^Vj4n_y+SpQo_Vi`Dq#mr$Q(bh%$Q859rsSIW^ z!5-li5t?wa{)eM4^R3N}Pm@z3mj*s_MX=(Hs818=1p5qoHceA&O}9{cA!gThh#@!q ziVY`?t)L-e6&=cjIFCjIAs!(XEwhYH-|mwUc|nUVw_fiLe4qGqOFDTfx_1bF-<89n zSy+hS7!(6$r4;|*$^lfOR@J?z%-Xd!6{b~8Pl36=8irZ}5Y z*R!$GfG%~$;0P@q=5uL!-zQ;HCn4kSGZYUQd%`wkweHP&#kUcdt|E<13Wmgp^On#8 zd!OrJxW+xfDkP6Ew0}{Q0#uSKeVskYr7EPn<|i1!>>wNNVWb}8AiP!{%gsN7`JPX` zbhanoie}c9>aJcygR(dw3F$ymj^;lWb6Z1r$_Zo2^|n3TJse4LQm+D9=hk)<_DFyJ z0wd}Nuv5`{(p9AuuAN0B&_ZN2qg)BT%b3kzT*)j@;iGkQqEq3N;1EQ{tH?DSS_DfK zQxX}i>CUZg7(pcd#meMTHsc{ulO*>i%Oht?+R5WdQ3&QLpsA~{??HYes&W4*{8ohd z@R-SP)YS2cjPW(yLId=UGm$k5u&kj0=zXc~F)`Pn$F`0uhLTkE%q*f0nTYK|S><*Xf6H8H zix27j8NXoliyN!jU)9)ce!_gP_OluYTg=HYRe1*h?0b7RxbV9Ugkz>$ejdV%j(z%+ z4t?61w{w>mIS423U_G`yvUgrr8+p=^dKH1feWZz8H`LPVW)=}}8=V3m`}$|E5;0l+ z9F~&l(XV>w4aJZE#up~VlbdQNp(zSabXK63B3{b=p!bbTSNqjlTx=OEhe22@D*gN& z13r$HYYHA9`jYuvieKq0a~53ElOY3xL@WCn9x=Q;tm{6N`*hf4XVI*X?8EhFb0L>5 z4i%%tDZ+)M2zXIpCY{(ZF`4U1autcrDKbkS&kaJ-K?s24&TMIIL!SJgrMjfz!IcXf zz_@FDZN=N`)V?Z^^a2|rrufGj>y_&ZGCH~}lHrg;93{xSWRO7uBZ-peT`kw_+_#lF z>${$;O+7=+2&N8#=>KiLYe>oQlu0`|YD3g~-lc-lPJ zitrrtK%yke*0Pr-duR!(eaA$W)76dVDY&ktpeUgNZ6GyS*g;)ICNY)>)0BWqhBmQi zVeOlyuYh;(AB#A5w0vy~S;m=#Rh`b-3IS#W0L^~<@aU)lH=ty)q1kiZ^tV}EaXYPq zn%m(x&i1wUVp{WiKq9SkUm~zg3gNmlXYcrkMH2g|W6eKDSjmwW5>NiKMx#` z1-+!IVIb_Kl$h({?8_Rlij6GD05SNt0v39E>a)lV9`x$mASA#@F&ApGGVjKgdw8p@ zb6{Ygp>dTTwagy9wLpAFIjb!ERvw5&pRpVH5KB(q_}_HC&9rBkCIBPfFe^7V*Fq}% zCbhOQL9aPlCM!FupOXeXI|+1$)N%B&=>hIfj*zKMiSXa5n0H-gF+4(RdnT!Few~z# z2S798kWOD`_u$lwD4gGw2C#AV`(e=5w|5J*oc(7-VjqVk)D@(SRj=|q7g$M>Gd_z@ zH`^$glKc|Wwv@JXv{$VPx9u<4FBuptAB=AGpURRkjIXI&+Hq^=Z~mLiXR4D$Qnu=E zG8B3wR%(4nH8H(a`ttzYH29^*YjV=_ZhJQjrmm4L%{6%1|IFqXEt^To)8j4~4(j_9 z%{-P<>v>fZL)OX`)?_ESe_%`d?c{VFyu9V1mOH)LpODE;L#t97`E_|or{2syPUD*A zl;=#zeHycf>zZL&OG{U4ZX2jY>3NX4p32`T^TFq-V)2{wPCXxRVLzOb+KmMnt}XlS zbgefq*z*@p-BI9A_wj*3WB`Rg*z-@J#in6QQC`|1NNT*ok||JUcw-YrgeY93$Be{w zi`w7c6Sx-pc)B3w9ccb=X2)j*T;Yncvb3b#I?E+KRuZ^?g)tk~M);d4oiEEga@EG> zY}jYlnqbq6RR@jVj?WiRUoj(_5*^wu8^b8qTSb6GP761$EWA5UzMr0%L)N#@RjqGJ zo2yK9j$=!Im$wL+zb>79;8eVb=Kcf6k1VUQ*L*Zj8V$A`v}h|;`7xfcr9Mo(y{v$S=z3duE#?~{>w~~jWeuw zagWzkVtCCeUBXbm{+#+%q}4lb$LcGeXBY{ZlG6LW%!8D28SM9~yr!Zs3Jws@MwphK zM$Q&4k!xvxj3yZgqA!ywZFF+Z7MNR~p53~8N-(&)Pc|dM4HWk0`PWRvCzgugu0RRM}HwdwPgE%J@^T-9tvaOQDty<5+iKePOMloL7XE zZ>ZqsClJ4Yvm#lF4kq}(aAw-y~%L)7ePtqS(K>7>Xok6hK7dKk$^D~NMx!C zV;UUb_t)Q@b`zVUCaHEijdKlGipkA@5cmxkAsZK+R84`w3yqkMnfh-P)%A4Hfn9}N zMLAH5z23%5#m_BFkfuYA_mtTiv0Uyt{&&-s`3DwcOgtD++ODSB?poqxB;vCb&Orru zjf~IFqfokNFln=C_ljnl+$7PO+ z%1WkM`-I_)r2FIHe-8=^YeO1A1IC6-%Lr-fT@5ih5rqQXg~@cF2Eb(5-m{30UrN7SYw z!?ve4_sOyv1a7)yXP@k1dI%k{?!$q1ZKMb_M; z$kmRuYNGsqvx5vKajE+j}A{O zR+oQIEwp;x_;nlooOFQAlapn8y|vLz)iN+&w8!eY4zi|5iukI7$-#P)d0J!-#% z&TV?7EzrOEeF&V;wZ!*)0XVS_jj!=>LZdk^YB5^h>=(~RBCK5a&YVtMpJ>pRw$u~y zz9m=94SMmLqdgn$S?=AO24bC4rE|VE&GI)MINF_6c@oExo?7m82aTjACM74O;4F8x zgZ4ftKDKGf-qt1A5`os^I*BEfNVRpaYKvr`hgS%r&y$p?KpnXt_b1VW3sBBjxqXARQr~rjdO#oQ%0a-@oX`KE<%H zcdkC+u*|49&hFo;n@q#X*AQeh^grMtaOKmgT2?N(4^=Bg1u&IG4- zQGW~<9B%5LO3S4f za}qO+zUrB{|E#Y5E`@4d)3MNL9|{F`TDAVusgk4zY>N& zPrE<4PTms0dpEwMtE;BFw8&&`WIX)PKkE&3z7X9%$V~h+!4rW&)b#_kfZQKxw`er% zz!>wr3R5jUTCxp}R< zpIo72%U)2?%W#P;$**^SZ>c2U;yFKCnAK^qf6l)Y94whMso%JJmagH{6*Qp5Rjr@r zf4Fz&PpjqVY_pxIJvBk(>>~bw90|l=Mt5+VkL3&2iKD5rL$lW`}cd`ww zljVcd-WhN>F1n1sEZ!I6ZnC>4-3=`*^e3iAPu`dDsQk8$CWeAW)0gzvO$X-tyJ1wV zWx6K5syDX_do9Gbo*roRly{oeHx2by6_>daa2j1@qV>??6kd0|O~QLPY}Bdei8yQe zV*V`N9`7;xZGq1$HK|=F8V-_f%p?c^aVO{Xy6Y4^q6RRLdwshlWkYjI4erl; zr(&E;(P?xLC~&WGk=5w=Zx2Js%;vg%aPW?Ryhh`vz;<;7TW{Zmtca;E%{{Wx$)I@d zC<N*O z&Ds7(A`e?@(IChk7aPgv=$^bsE!D1eyymvTWZEf_*DSTWDP9!xwavG>iY2{A z7a2Rf6@1mMGgq4&x-RcEBiO@M!d^?bjjSZ)g4}&k9CQ!NruhKd=lj9QDVZtk6U^EAoPQ0%7Dp>AF78Fx1Z%q)TcX+I9e+ONx*Aj&y8 zOb@xo;LcOeHwS-rb^*`fT_G7ueFDmP-FDN75;opb_lV=Sm+ScQUan)TWP(_^yt59^ zPQ2PG$LctK8LRQ9{>r62dmm&z=<3xTeQkGVW$b%8yvh3oEeO4U4EfOwjc4K zM0~D(n|%q{lV7D*;LTa-7~hGs@XLH1s_6gdkK}si= z7t9rbRGh3?S>w@r@<9z=x1edO!J?f(3l$|5bi*V@0gI%ND6qf3w4t z^#p2XuTGCcm-{dsyM(*u@qN87`47}R@MR?T3j5WgXWii2#bE_!?K1ycd-sG+F&BAE zo6Ya;fDKvlpv#9m5gve25A6-r_YFpFK1aW|)6ymGXi7Dukv#6B@wHezW8J3am6bKa zUNH4pwts*4yM>MfW4(^zhE4i|iQ95-)dr$wKhG0G#+ct`FB(_=mvpLaEcPY)=i3KD z)+)$QBe%P;bz1WPC+oS}YD1l(>;k|0m>KM=s&Eq!L0HL4en7M1TFVBd)pM)=Rh9o7 zDZHr}#q?&o|KVdoI`@qytj&*-;M;z$K}Kz4Vx`|)MS`e)Q$qteHW7)}D|j5D#DPl| zFg7FSKlqpceshtp3d43*>KHI-E!WTD3ub@IY;HE~Whk+T7r2TE3lk6&_*cH!dD*Sn zt5aW;9V`4$C@=!LA+b4C333|YdrS&D2b@_9BS{Je5!XH~jalZ|i7i`8*oHTjPteL>p} z)ur~(2HILSL*uRM?|*+0x;uVbJ(SPuK+o@Lb#bj4$9B43LL^F^Z-Jps-a01A^Bm&VZZ6&?_%;IX=6!F~S66#%UwiZQjB$Ukf3{F&B6IWIH*8ejj;ppD6VZFv zgj;w()K7OrZx@n(?Q(@|Jhm#jA(9Z!939%O_ns^a3c(xMMzpTWuTAkOD-0Q0#^QH3 z*ab$+CD7zSu4T-d87J+7%uuOqjLmzH%8y z&Rp*8RhPphljHt`oxWE|xm&%~agiboWvRTRQu^LM>3_f2ILV17%wIs8);X3Q-1Yq3 z?rLI3Uqokid5zY3f-LZsCAf!u>d%6M??ZL&gk#V6{C>%azbuYccMG=(Deq%VZ0X@` zkRSNCfa`T!N-cdpQ#v)&6hqRC&N1UCN@a?n~wklf#($gwa&*M<6y;`mD zhc#Iol}@w!+?0=wE7^{fY^9kfoeL@C!dKT^Q{;sbZc^(n(ALGl6$PvHl)bNTF@f&V zt7CW7I`>oft?gROma8`ALOj$w023ngc}Ih{i&AKi?u;sX9FqHF2Qk|`wzM5IudUZ3?>+P&w&k%i# ztE5|rkua5eLulp7^Xe06McC{UYqqUm-EIQg`$&O~uWb(2gxHcD0>N?B{=0nXCyve= z-F_pnQ#D6;VN?^@Zij@Rq!o~f_d_ymZM9)@t#F8C-#}mGPOXsn@-VZr@y2LGE9*3v zzoV<8r??<8LtV+eYRZT{olUDUNWt|J`YuN4jS>wX)bKMMSe5AL6^ zFoTYMdV6@rOCTyEP-4gxdflGyEEy_)Z=XV^1iTgUZwbEqd!=}HcV9TO`+NJx(#MHx ztD23=+qJdPtS|w>W}fn1CV9T&1x7I-M`GV*gQaoT&BDjOioh>IlUS8moyEZ;@nd@3MbZNx4_!F9t zzO2Bv&eMs6qur+2_ci(1K5ZuRYeub?Q0J;IvMy}JzsmnR5S6T^|t%iV24>SyWiL>3#)Y$ zqj|v0%3Y6(quL2qbmG!lxA)*2xfAq8hR^H7J(k7VkiQzhP+W7{F^P-&A4TgvaCIdC z>^|7!TkP5dUg^CmikPZhp4-FJH85MfW>Qq#ClX^CnB>C5DSNg1J7;|A-h#vr%M+dN zw5C7GZejEB_b-~_r|sVQ&UREJu64NQKH13~=#>^P^)#wo9RP`CYvuFdM~7WVyr->@ zqdAh9p2-(`k-)7VS{q^X@GCp}6FmhKQ%1LgJ6EP>$hjhVcW0M@^R;i+aYiFzN<~(# zPxzZ(L{D>JShbSL>jll4r-O&mB@b5$h4Ox@e1B<`OEl86%2%@oeI}8OO{!%jc}O1X zlZ396Ee5fYL)t%cG66r|b6!>utm0}pL0EL*@AUETFI2exXi79>YNhqie}f6n1speA z$NrOTkT)M)&irH>{C+t3d}c!IGvDh>?~5nfiu+mpvrZ0uQk+i9&+0w3`NeC-hT3_$ zH?y^5_7$r}y%3TOTjl{+di2tI7Km^HiN9aWkEp5;)Y<1TXnwhRV%ta7~k=;_N2nQKD$L{ zj#MMh6;b>RC-B8MVZ!>;>NzoM_jQD4FmhdOzR+5H~XW54B#^Y_g?^96Tr`(0=tcUbPLm2$Pv-M)9e z2z5juDO=Ct_Dai~OByf3PQzlVzf-&WY>pXr@Oo4z0!lg?7>A|V*mtf2^$HLIL5vqV zLd)iT;%m(fda5lF|JU-xdvWOOrM)xCQn~KaGp_ht&5d!u^<`d;?4qbJ()|0)jJGWa zbmzoOrq1AIuM?G*Zy^8mWOYpj0erhMr&=iy`PP2WvTLY1 z5qSM(#ME)yFlJ=%7KPmUa=4P<1Qz1<+#N>AjIUDjuJylT&76s>j!k0;yqQa=$@4Yc zR%@pC+W1%4br+buDEfP^MKo~HeC-xZnN+~d>~^cvC#!|^@j3T_n63+!izl!95uK7m z;y+=&tK~{ZU+vBNBTsw_->;BD@W#cNpvt@v7gf3pt;fHjGgN5L1)sBp2Z_$rR(tTP z%hbBQ^}27=Op=pt4dd}3{?r&A)=gX|B7 z@Y5@xdAIT|?|!T=41ZFQZ1-D)oS&awi>T*I)3(qiO-0zuQQ$Ec+|>H{V)l+VFPE`E*trXQvhmz( ze|?A$Mb2|teirXUc-42gCR?TnKXifY`*He%>{9#5UHsmBMp&G;V2MZMKmfOLf19gar3;a`N72=fAr98JsA~xm-B`l$w!c z3~m!dEkx>lRI5wQo$qq;D;7~+v;Y{2-hWR6-k`^ik&_P_vTVxiuyPQ5a{JTrs*_K= zReo1L7CwIpc!jtM+Hd%i2VY;fGxTIc0}xp9>op0l@&l>|gC@1ux;;((yr)XI$v6!^?dgAkTk|^#Ye9 zK;F*C`Igr2_w(O=e#0_owYYec-F$Ue+iS;eI@&GgGvqn!U>d}z6RtIAobC<2i&x`{ zB6~PY32<7xx4mMi74ci6={lXGC4POrwKg_R;uDu;rWX;Ai8wiI1!n1F{C?btKS|Ha z(I!Z@6?xV+=yr0Z5b(RzKd$*qa?hWV*04vs8CYdIentNJdFkZ9sJ*D+bb~ZPwd=0! zwd5|hy)^D+p?GdPEK8Uzs60>Tu_g+fk%ScTPMm*aG8h=nUTxG+^KU)7Ch%yhvkf7C z!}HkwICkd-#g&>lgu}|=J|f{Iei;w{?DvZ57Z0@$Gi6M@RHQKPp|NBB!(?yzE-!0< zUC_M;1Ja3);aeqaN#9_8a;}!Z7rQZ5Ei{zN*`bx zmXqBWRd#+Y_qs<#B^z&~xvtvOSh>EOU95)`Zq&Y7{$%R+d)fAEJdMgT&cPi`3D2JE?Cq1ikbY5zBSsg8RcPb;NgvORILY^$n=HqREuJh) zL6?o`Aes!Va2FB?>h(v5jDKm5!p2=eVEX+i(ZH>yT`H%k$)8O5&vQ`xViD2W@S&zo zj_vY`sn_k7r)_rnH)sK-Wnf5Dc~@Gz-e}2fzRJ1!_2P+Nvt#|BURv3|%=N zHLShPzbf@V6LOacXsz9!>vVcqV(dRX^2L_bGao9u4to#P%Iq1|gRuA+RCRAGxLX+(7p3^~F|l zh%9IgYu^D{@f7fI!e{(kN8tFhU9EKt&VPIOEt;FuM>BuKX<0J)@}g+H{O+{INvvK4 z6UY%WrtJXC4w&Fk-3)9D8k^%HZ*TWK+R!$>U44A-_o8o{`*P4>XwKOf>qtmgoD$q? zx(&5}r4sn;G%8o7vG&|I`F>UcIlh#n4y=6YI%jLN8cN|iMbqT=$PuN{NdCRixnu!Z z&lh#e*!$P~VaSdzsQJ7xqMG`(XTN1etT*Uv0g+g{F>FgIb?eV|I{ry4Ue47C(-L}0 z`{LB=?Lj09xkB1+)RN=Sx-1@h>>)$%6%B8&!}8IHDDCg3okA^5n` zTBO4Yd;ko?a=+bzv{f#3za8Qmp9;Km^G(GjbZdoN&Hh_*-h8qG1Hqd?OA%MU2J15)Sx5>|@hl=R}cSrm#E)>-T zIy<~zuH|06qp{ci>^pu=2U7h_-<{Y89@=2Tw``8&jb784u;#J6R|q{~u&~gL%N%&C zZzsNGRk?P(f#WVh+lf3gZKk)q!eNR!zd1gSp0b^(P`PE|xi>vuaT`%2?N&_&jw;39Q-*?;^ zJB09T(YJ&C1m67HzZwuh&Qm)Helm2AI*UX#kICuANZrB4P36Gd%oUBxn7GZJhR{(e zo7G0kQ|sE!(%$anr`u!26rDK4K@o(+Vz9K%Kx#2{i2B?7is=r~_ zXadc`L*WZEh-d*;(L^Zk!zFWoJQA1Fl=1hO<{CRJf~FSocKKw#<-`yKX(%$?0=_y% zdw3mwV|E(H{zNdTO!E@KD_(8or1D-3MVjb)?raIm4y>y#BkOS8(Yv2GW(1O|+TO;z z%U3e!bB7+O#Z#H=R@AQEt^6o7@M8P6T&l!E=99}PZXWiUSWhzy2_-)a8 zCC+bs*X4gG$=Zypk3m!zCsZ2TK!rV5R$Z&O$oCTT>y?Z@V<51qgax~13c2aIh0|)i z=Aeg$$7bgW!c*wMMAt6x3XNY&(PpG<`=pAdk^*g3SPWhT*m}6uyRNnPtT*a>mL)QL zPSE4HQ(-xl_izFTDJ@dr3H>`jEhB^Foe-tlg=lRkYLxDP^u=#HarNxcjXuGmzI13M zUum0D7JbgP8LfDVP;}eAr?atNo)R&{GF~`v^nQgpg+wlc-?OQOHY+nD9m1~DcR5hL zU;yi;$&=4tR*#bl6?MT*8D7nh+j={lCu{ReBsC6E zLUA&S)6K@HVly;FF~(X-8!1=wgX@v0**{G*++QDq*j$rb z8|iGeCm3;wwAFR^ny>pOzu~!|xpDjU8lRMxqntwhF5`>+Qp6CjTyCg`9{axxUi@$c z<;f6)(F0R)$sE(Ezm1oaH)ueC>eY!I6Xd-e9-yh zb}?Ppbz)KJ;*!HHf$S4UfgFxexLBzPPx;Q3s5@|YfzQAoE9qbwiPOz)h_%}JI61P? zud`e0xb?(1=(y#<&ZH;4r^%f@j|a_!V!Kc#g>}AAuX$^xi{3duFT)m+q+~f@o+AwH z%G8kEqt^>}QM)fJuWgq7{x{8KK)1Eqy!&obQDlw+2Zkztcn&9Nul9!Y1kBCP{=iOY zS`D2;EqXtt(jbEozTBCsam>>dz`#+&JT|?$a!|W|Ju|6wyk99G^QeEM$kllA4Ryh{ zfwj%Aies%{)<*WDy-jXYeMI^v@1-QmOjxE4XHFis!)~hCUk3hp>wK=WMoS!m4^jhp zc^$*cD2O8~hk`#7lQM)}3d@~&q`$wsAd#vO#`V{9pRIG~+PXf9xor-kkc<*1Wf52} zCKk@GN7m1b-a6@OV%InyFID#Xcx*X^cje+9snO1Xl8R~#`J1&EI_^(qe9OJ6EBIMz zZF6+U^zobMySfsS{=?8%jHl4#(d^v+#zl2z(#EPd;9@ zDBA}GPeAm5MVpDN)SUG=wwOb%VH9OB3Cp_l@}CWrUi0%Ojkm8MvKF4HB>yx*6y9Jp znJr+e?i!;@Iw5pbSbjxZ98`<{Jp#1pCKoFZPc8MWa)A*Sk6qeLT`$e`dg02=fj6a| zJJ_?dw5z=m7tX`$PP=-&=Qy@jG{`7XK3LIRd~{-D1%QBw&y^k5ZG4^fQ#AADpL5BY zZ=Ol5&_Px0(R#=0r=`I1LH;9jySeW>kt2@X{$nXxk_xK%Ic0GhtVkiwT~3m2$s<-| zoQxZ016{343&uT;OPgA)r+(V#{L7~*8Q-`&abP=00;$^Qh@_ zTG?98s{ZX^6~Q>bWbs!W2?{rmC{VXSW~sH&+j+3Jf&6j8qcaV{Uu|o$(G|P_dyHS+ z9Nb^b4Cip*4AVcups8rZkVMbB(|nu36-D-+M%={KH}^s!RKn&GpY)8T7J zcmD{L*YCd}7*yddejm-5k;4>0AGXvrU58a>Q48bB#2i)YIIF5U#zDO?_Bs{{$p(l-ZHFpICSawB8<7oQF4CZ z%o>g%wtqiUY%W`3?}+JieSfh&8|wM#Om5O}O`XlF4U`{jBqNc-n06Kx0iRUU68Y6u z&&$uNCk3AD+g2=rBbDvUe*?%)hTqA8_t=7#kTG8FMe2r&nrbc9+R+->tZkp&iQR z{vo}xqFmJLbZQq-hoA}L|8ipSBa~7BQNr}97b&FR0G#v_8Qe~b=es`t=v8tVn6+*? zzf`-HxolczsNKi8ViciS}3BEDJofh5tq>%&P%O3-oSO6HfjI&yhR5v!7*ECM(Y2@EySObhcKMO^s^VH@R6v4A$>?ro}Dz-CG@Sgj>c;qs9l_p4-%)OcLLAM+A_pfjrmqksMnkU~M5@7` zOaN$B8wMkl%a!5qNGLOF;7g|Dys zd|n5eN6(D~{>bZb5t~4h3(*;{BneuL2nOQa_~|cozeZDVBe7#Ikl+{Mye~5Siv4raCKV22R_6q15-+-g763>(V7?s)=f|FU|Hq8? zgN#uThYi1)bmD^99(6!!Bn<%Y@!EFeW3^W0ejyo8srd_K(pCzY%g6vm9Eg5b=h7-c z{vQD#F`P1D&}wB#I%Cq|tNAGkUxZ`Pe$HU&eCr+5|2T9ZuaFCxp>CndK~7S(!(!ap zWoDhieljlb`QIAx263&>QB4B#nCWkEB=@ekasdDL!IDPZ-B+FRLN!vZ3?;e`A!3eR z1U}uyCkg5R3MG8}{|84wxV{&c5NA?D6s#5pHbyiCgNCD6Kvs(tAvsDzq0YXxy`Q{L zWyu|pHdOXBHac4d`8;E)wOA|(W);NF<3nP66_R8%X()}=xE zL-H12>&PjyIYU~buX_GpH@Wjpzjj=5G(=TQUpV2+ndw?VMJR7@sB;}!q4n_IASyBC zw0V~so7=nlHof|nHKgdw+o$EIjvUW73SH9SIUjb6>^B{2|@WeD`Ml;mNC+zCTs2b83Y7?X3jmov7G96ys6k{f)r3;w>< zlRfpSF{yG?#PH=xmSW}EF~Q*}@*2!d?2AcPPJiBj0E zPZ=`o!bzC`2my)9%_y)PezGn?ulVHkB^&a_jvQK45E27&UeTB#S@}s8 z1cY#qS(H;KrWkEpV!glq{U^4$^QK%nHZLP{^xWHm8NtBHMQ?n%A$QEki6aXRMjx^) zOJP0?iDtc8%>lw1y zR;$u6f{3V#PqcrG$x(u_#6g|nNkwsZ1Fmtmt>2@fsJ}2 zZ_x0d1~8i)NaiCl^|rTn?)>bnmW0yr#j0puS-n4u4jn#TV=(L02+7Pme0<@qy^)4h zn{9LCFYDt+7TFUsR7ac%rBIaUK%bam69tNi(P1)~^xy{o8VyR49`tIXQI4g%NHU^2 zj~tc;3TaEW#oLS=Cq>O>E4B&-POVlmRWMdaBuA*Xy`y{A;@4ZPLnr2{M0Z7l$3Ms( zX3P|CGucd9rV1mA#erl@qemVTCI-C`6qYTCNg5)fSh@>Lqa+xOQkzz*HK`cEMAABv zY>`$>BQlbaz=I(<-e%D7NYE0KK92ar5IH_c5<&jGP3W3h}%_t+zOEFfNWG1aZ9Hpy3U&6d1_%@hx!B+1a}L zqn8>i#UnC@gSV>5$->42zo(exQtUTf~^ z^)#(~;fb||qBC!wm}Dn|l7mQpx8EptSs6(ay38KpxK z+G{INNHQlSYt`R1)tVFrNv$#!PQGA97D5;!&YWt_w6kb^NS&aw>8u(AR4pW@S$K_1 zf2L_deh!Z7H;4{RNsM6d^q&mj!Fm;*auT30lU0;OWJ02Xfm7*dq(i3BC=n?DmU%)5 zhcPe-KoXcm3wl8z1vl*6(o5#2AYbr?anL^ofY`iakC1YjUi5HE&>|TGSf6{r#9G$jIyUdcCf} zW=SI|om#E7Clw4k_qq$y2gWWUxw~mk#kamXr_UWZGq<3yta|mopIGvFd-8cH3ARHK z7j*5}yx--tjk@_)GlzusKfS#+eDv{0yhhJ_xUZ|BgC*EO=<9a6n!8an7l2diwSt!h zU0uBh?7)1TEl%PI8{!AMXErDt=yo^metnDizPm1-nopaSF8-{!_9WLm5>uIUCSugI zl+^`Brt0-N004v#(HOM2JLGeFJRqB8-rv^HVV3gsW;1~2d%O-HUZdtf6YlD6Lt+A9 z;O=z?8ha9x9B9yat~icE28|I5DWlJxGoyHzb>OBNqrJyJ`FIoy*q~7nSIFmfyP0em zs6r^)lxYD7eV-~EiKujXPM;8;T5`tCm!=Og4Ij5MPq8{6dD?b2W|-${v{o#t4JKWD&eW?e%CRLH005X60(Ya;vMbQC>Cu+N@YMi1YnMdB9-mcbe6wN)NeI8@X z)Mj09ySpc~s}GrsQlze-DG*@*9LEtIQ9(zqC(!RBOdX1Ny2_fPW!o_xiA0NI#UGC3_Tzq(<=f`2Vr(q@^GpfelQYOB_oHvN)I z3*wWE2mmmRGIBWLB7}gkXxiCDfx1mwm%aDe+VaNKEAr#xW8*m`;0V>J%t0Wb{wS7Z zS?Fr-3Wt3F5S#XZ>v1_levd@70ny#MzcEF1no4W@&bQ$ZLP)PMV-?F7HRgiL&PpC+ z7`ALoD?TkPGrys2<2(QQ>eF`PIJ-X4p)puAmegq%Uoh03t`i_OKa4xcX4~x!cQv<1 zhaB7#qFRpQR5n-04`CS*pU>~^X$2|$xUV~=Q>oSJ1Y1V&>>Dpl7mm-SjkVVJlBpNx zj_%tw|F!u`w|a%BBRePFV8lXV>C9PYPa0!C;zXBLl$qbyzG?oyR(#%O7;8w(JGXes z#W|z;w#|S2-DTUnf|y)VkauuD@ESoYYiYC78I4*Ez_~phPkDEGoQ>#I-#O7EAq4bl zHFSEt-u`|Jx*+m2)pW#>{MZ%ece_H09U~pqIkJb1KL4tDDTB{{L~$S(b$51#*zguP<7Z|m}} zhFQpi)S`2;P=XI!7MN}e^y1Ltt?2vJ!r^_8_ait_DM+ZM- zoSIYX^_(u@wDZp#pHW~MNRvZo*Wla70;e(Ph)y$P+KdZlk54#wu9mCUom>f#tQAZF z-XHLXB><3mdwRk?7k^aQ0HLo$~ zh%RmHx$~yw6q=8l`ifH%bIF{GN_-V7)_k_$gRT8lX*Uju6M5Mm_Iui0K}c6|zSib$ z>>*A5er(P(p!y5S*PE4 zdB(tPI27?x?|zNH+TB^~bQ7~C7-}qQ5q4M>&=I+iWJ|Nio zu^g2-gc#y-ITp-XMCnS@Qk72bW zWSCPbXHKtJUs=0{2;p>#ntE+%*(Pgpc5;7bbM@YhRXHUHcdy$~>4@eOjmZ2iH6|e> zcU4waRwNR2TxVNV)q%)4H)k7@jKpg-BxH8(+*?-zqSv*5e@ja_(M&){#)4MBGVSeZ zYidy2Qf!H7NrCJ6Wkpu*gg5}eTASIdw`-(i z*SaOEFVqcJTe^1dEvv3(`mslh<06E}@flg@)qQ39FH#F}YL938`U9Sxc*aq|s7^>2 zmR8?dQM2EwWGNy)b2Lm8+s z)oKMSfv2ajwTYP0?1O*35JIpuJ1g0{u4VuFLvTfKbyHU$yL8mj>5)NJx(P+@;^EqAp zkaYU#6B;yrW0Yc*Eu$!{Y3Ht;TP-@v5HmuU=xh$H914ZpK1s@%cgeKcReCH3dcA!( zw(gV(t!ke!A|DRPsnKYOH|E4w@7Z3ND%-PBQ}w=vJ#A-Rovk&Qzx{K85aPg~(~154 zEiD~6$thq+NG(opZmF%^yE8!(=MFb+*-|@w`X!DW8##0lfTvz|TA9-eCRw4?u4!$Xji696n;_hjwX(S1p?daYj`h=u-6sNA)y0$87 zC|JUK_LfH){S&Uu$3`;Pr&VLo#oJ1gE4HoOmWBf)Q%?v-bhbqE32MTrS$sxudh@3J zyVu1f#ErB7AfmIy8&9?q8m37}X}Gqfvu1xy4P&HXcSVo8C*`P*Egz9(D)(pOptGSP z(otF2+1!QGW6_$9O0M3{*2WfQy@C3bePkw|8(P!94ggiCV9V zw~b9L+qQLEq9)8`8!;xJPe`*0JkJ3DrIdx-tvx=G&rBIM^K88R)2NG53gGE>g#x=P zYV~^P+)&o;kQ2uY&s7u1$xmN0;yGjn%IH zEG2Qq34PJ7wWA? zwoJenWT1d#Ld3FHHfpDk6$9;xXXFiKEUP{#ZxSBTqzXgXW}w zG5MOmEx&7Y(cBv@kG%8#)3;B50U?C4=KS{lD=$4gn?z22mMl!Q3>T!fEqvxr|7dA& z+R{s=J^tmWWMak0QZRf}&Gtv`pY#>R-00D1vhg%V0Dyxb`Ni_i1+V?(=5>#p`Pk|^ zOXpm7X?XqzPd;|Z)W0GCz@u)y`l{1z&iIy>=0Ji23;yxy;`i580kcp#^^aeqU=rZ!di5ymu0~+*uPeQqIwX`Wa*l9W#YFE9Txm=_`!0W}lf#3MSDY01#Gk z`n6X|3;zAYUDI9z29P!P&U-GuVrIcf_w=>LkG}#hq1@}9cy{V(g_+3N zeS!@!$Vf@FWv8rr_{P&;oc-WqH)Q1<{nwI7^R6JiyMKM=wI~vX#9=coyXLVQC-4Z- zL2gdV$YD*M@!Qv2zx~}SPkr>~hY=7{3OnPGk8l09Io<&PfMS8d=qvBP@!4nIdHt5B z{|3AWIoJH{>B*-Try}=>n#mYs#3#fTrLTS9<{2-{_`~BjW*42{nJQK=`HD+K?%hZJ ze(B7AUUN_eefon-OLL4#7_;$bU-y6gciwU9uiuPDC_-ryGta+wTH55*U&LhWhQ7ix(e);uh)V%W9Q#Zf(nmI22rt6aFjtmeHvKr&3-u;sEclST_ z=u530PGh!@zxLT@#}yls&a+;ceD8zTT=44|X|X?{%0+L!vhdl@%NSOp$mzeG zpFFfMJ3U!@>m%;lZ~yIY{~d`?gp)_5oOj={J4Oy071;9eKi^uvE_LoL%f@cI@7a|b z4zyAfZ*`pY$1l>85)QTtAw;ob(zF?yU;XguS6_WWV}QBSN4lYiA^_lJUPgJgzU3c3 z_0C@^I`n4y^asBzEl6@4G3Z>zc^SDX!-fz4dBduIo%z^1zcL(KrP$LDPhiMJcV88F z>EEwBaM63Qq|(#wx$o+W@0t~x2?uc1;=&2?9C{p3*j646GR$N?^>offNan~Jp z{O<0zgAs~Q(n!ZS_piFMblk6R?S1OCcOJT6Di8pe@!PkqK7ZDYrHXxio1zjN(C_7l{$b@$@8u6%MW z07x+AoVzCedSaFu$KUbf9e;f2tygb<>Inp#+900s*ME<1DciR4UyJr&M51)YZ(dC) zwpQ{eja`nxkF~%{&)8scieEB+ZUy_jL~P@@Z6)5Y(#w$ z-?ogIh`MCbwC2CQbMKp*rrJ@z#Ib`q-b|_~+{nyNOzD7=Gh3|C%r&E&j+6 zfG9I7T@%NB`j6|^KYiw(-?+sx==)VdJb@wS{`%U;>uX*YMPiS2g!Pn5s`W=He1%jyr8?sHfq||2yq7jC0PLmxj{D%6zPXXWw#l zbOEC(xR(^xBuzt=L7L$Gi~Zo8Oh(Py5_=Z zbFmPuz5MbkU&IlLis#&P;jjOA%kZ%`|Mlj-Kl=7_*FE|m(h_yaP0v0#c}!*k*U@;Q zEuqZRG<|~k%g3%<^X!?Ay?k?=@#w#n&N)xTLcjg}lna5QIDXW5S6_Sol_L-u^pH{P zNXnma&&%%HZ-4Uf`8^&4Brcbq`=@1h41RnWQ6W6x+Q)w7dhE>)?s@rnAQ%&N#v@PP zoN|&g&Q+652YKIILL<7Uk&ak9}#M}2Ii#N2e;ev5SD<2SzQvyV=(=_llx z0f4ZQf)cuI!RwFQvi6Cy{<7?jkw5&h?VC|7P#80Mg7eAGA9;PnmLV5k{pD>ZdZr^j zXWD&l+;ztt&;RXRrw0MDX0tOMS$$_|L5c|gz~9AhfBNP>E-!EHV=Oau$k~7SBHl*Y zM3Q3e-`}_KcT@jZNhuw5)nBhXZ)P#(WEgYpL%;I=?d^B}@0HhL11QdT^r`D-TsU#g z+4^wpIal8L67nF(pL*HZcm3(E(cfMd1{uYtpLG@I-~FrWZhB3MGR$X9$-CgU%kLb0 z&26*pePQWeuYcx+BuCM;H>R-78Or2cCn1(A0|wGmFiK^P;}9Bb-!VWVUOD#hR$bLI>yEkKdx=3P;Ke5RFvzr`PD@sshH7KBwm)IdZeN>~!8rK5XqkH6m8 zWlu{=NKHzR%3IwAPAE=}^NR%2w${dwgyK^&O=_QecVk!l&^Ue2;;-A(6u=Z?nIvQ; z#%CsRh;Tp%#h4-qLNW_GTb<5Ur`OkGj?W>b#c+)zEw}oen0Wa+jDc`>_}3pHRjCW=|;+NM2-XkeeDMtdjNo# z^eU#(Gh)onk5fyLzNW6OuFjAeS+ho_Y1I&NI-SjJ-4Tia02z{!9M&Xlq`9nHo1bkn z=?>*{2LL2T`g;5Nx&y}Se3RJG(&6lJ`!FI1S+a_=;`H31-WQZocW0xs+v$lQthMTi zXo^d)SS&i#;S=kTg)~?kY62(%u|k3raydIy5aXGqGk^Zw3`PB|hN(o)T8cT2ewS*(ZFJ+ydaAt|Mjzqhrb)=4pCRByJ& zrQ{?TF^YKFTHCsMJyA*+QKe<)#hLXgLgheTb6K}0FUxAw9HLo}g1-o5hh%=_Anbn6s6tT&#TgsixWRA1P4OB3ER25RQ za_ts_iclJKH67?u=VsbWI?d5zfP?+6{`TqyH{;By>G38N4R*JCZ8

    4dOs_yWEEs zksNmSbT+nh#@<()-foLe&Ng%j?=hB4faaO0TwO4ox*+8gaI_bai$4Bmw}o^paEyF9!R& z+r8H8Y@IIJ-|mbA@W9@X!(E+ShZiHB_O|xU9``^A&8cZgj(8mnx;hRt_E1W7rZ_KalAGuiSPBR<17|OqJfvVaBpoxtFu1}fH<{2Ij1;Y z$2bt(Zg*F!C$_0?STw7_-`m>V)$Ix~thE|A$zrt{EOssR)>pL~)6&fbb=dFjYV}yN zvu!%Uf#~=2wzl}J+1bt|H?Qm)Di6Ev?x`kpusxVk3Sm#vfi6vElG$QL5s$a6s@_G3 zDJ3=0o@CV=QzHZzAxnBedV*PvX+-k(me;ihqm(jARC>XdJ}k``=&tKOuJiLt z^OJFe=LLJ_kOZ^(n73S@uf3?%#bCdywZ|7Lb823y zT_Xkh+K*f}IYp-qhw7`^wMofli&;mau|pP!$N)%XiqFW*Fsp&EXm?k)-y@kbGml?9 zbi8C)_OWhRqi`9{oo2WljDgcB9ZF)|AoSr)-Ep5=%(bL)5?xo0@Rg|cS2E0DE zc<6=?z~gvqvp^ASl^tDgJ#t52Qjf4Qy*MFcGCY$@@{=?Qu! zqkyy8DXKVALb^#s4=q~blMKjTU)8QoNVHfjYL4M(|DcPpH-C3ibyonepwkINtJRnj zGxcg;Z*6aE%jSa};hI*yxOU^REkhPOK1XXe9Cr^V?D6z=l{fbRfYBN+Aj(O^l9d&! zU{_aHYe!FnVun?TX_<+3i-reEUCm|Pf+OB)vmU<~E2Q9vw^%JW>g{T*IV;1$9EOrrsBUsGk12Y@naw8q<#vl9&fVNXkQONT4S7$9Dg zo|A7iYPC2L^0`|pdUORj7K7%PMeujJI~p222rQXJi5e;7^Yn%dS$TGij4@(j$mi~< zZD@_i2xFp;OG!yhF{vn$BWY#(@4PG6N(jsuxM{j?=g!mXE65l z%0jNLuCAso4*()In>G?P8jZ)4iirJvjb*KV4)`N37&LOIr=h#MyECN5w(Jq98a0Hz z^|I}l>xYof-C5D8$;*n&0iRCA0A_g2?6$0pwcPJ^sjLsJd0=@2DJBKm|?ZnXw59jG|^q}|KIx+ z9qRO3&n?Cg05B(HCL|=py8N+_yREgYyU!c@c!DJ>C)s8IuD+IoB3KAsnJ z$;r6etBa32=F;mY5DW$l27@37q0kQ=O7UIj^?E`G0QB{`-g)=^bI(1;Y%!u(28vib z#Q5S0dtxY|FR zpsD&{5!azyY6H(d7;$Nx-Q6oztgfkUIOp8CLrV+wL=;`>phJ+w5Ff^T2!|XRIU40D z;wh4lEP-s&S^(S;7K}t}OqM{BRelkfbP)rAe!oGhmLnl=Si&lU7O*z#>*ftWy$Kr8 zOVu1x5l~AIkx>)@Mu@~xc1S29qlkb60fev=R_is<;E!=XMCxkWv*O9w@29`}+|1K* ziUz;=t5EzhAi3LFzwU|C=O;Y<=&aL+3^9M_VJH8~D5V%Re{%0XyR#-0UU0>1K0dgSiY=S&>&4O#6K|1)9{*Xpl=*)RR|vSfPv5V)VH7@nrJE0%3J z;2w6z5XBMH~*tK*S}9(P(tV z$`y4k+?{^$uAV_6u2V4s@^M*oAQpQaYWiXfC?JLqib^^`F9;DS%yC#im>?k%jba4A zWJ+aVGDD%TOCvBQYGg5l8A1qTqrf4G{ZSdQP&h0gq|+K?qQ*2JX>>*u6_MbPfJq^W z2|>UE5)h(*7-AHFAp{r!CK6+mMwv<#VubuyEzk;uLID5(m`1f}Gm5gZ3gVRR84AUB z7E58;vUhz$ZN;u`70#YHK82~30sRVv;y>mazs(r{z+g%701)~KWYIa zLQ%{ZAS@GxB$>zngfI>PAc8Q9l@CiY0|tlYphCbHk})tq7y;1OqsXvf~qU;OB6!7%;O%gz{Q#mcv;;=c-}T60{2U1u=x%6t14<)}Or zN6d$QqB*usL9W6<7%&RaL(@MaKmZH@!VF`E20}2Ifh05h zBV1m{$evJm#yzV~=LLZf<-?=+Wkbkf&YX6~vWdJP5GCOH?`Jl~Pq}^3IF9EzP6@XZ z004k8CtPyFxQi&qix~gZ^Yh4v$GYq@9{hN=ObN&FyrkR+Q2dvnB!A}JSpbORmHS-3 z1V;>rKK21P7^IwZ8`mkvfHA}XGlnQ;h{&-nhb$zMAX8}&(Ey`J0wx3S0I`{m7z4)8 zp&pM%WqB6k%m`Mo2 zh)FosrUi^4pul47QVakAMt~3l#1K%34R4Fh`Ft?kLMZl=q1cX~h(&>lSQK%XG0KTN zFf0=$W5oUwk*7kTP$(1%g+ihDg<*$&45X_-2%%V4KE{rZx!8%uah>Fxw%@OWu|hIL z8KMlZ%m5H&MAmU(vA?ryev|E-8A&$11|tj{rVL^s6=M`J1PCEO48@wT2DTLIH5iMu zV!y?rucL>g@r)24D(32{ZQHyrm^ghxz90};#*D+1(37q)jRsL~)$08n-arHZc#YAN zGj3G6?)V&%bc%u%kEBHa!P7isztdW{<9*5dpcU1syxl=i;{Dj1W zpUbY3!m_7r^R5naPGMTI!+`vvvu4%4c2S7SPO-(Q#p)_&;>ZcwKKj_>k3as8r=ENM)7=%V?m&bx#>9}XqrSr%h{`er z@OT>6yno~4%l39RMNUZ&%lY>2T>SaxOLkWHe(0t!je2{#dwcqV(O6L2xMjhDPhS4= zYu8aDc!=mD?(HjH`EbR?+WO!x>EadBXn&vca0O5C3-vgAPxTAI!Kp=@%}#$> z);;;wCm(Jp^PZ}YB#L-FZCgKidcperE$z{t^n)MU?QUo1cirs>dBy&(7vA&q=j-a~ z{JkCfR=Tc?Gc|(#UBjgSB@A~lG zXFgw7R~PuXjPJ$K{&3gUCC`1ZW=~^FNR)f)T9!Zk*rSg>_{!3+zW%zpY~4pse6*v{ ze=_?DA+PM;@yUJ9f4QdO8!CvTuIewAeDs%(R=Ze4J|$--N~!EE+wkFMtG?V-=~qsG z3Wee)f(DZI0iYA4%0loHzfkb%{<^apGS^~gC;+cdckxERINEj2Q z!D5O#P`Di~B{HP8`sSnH!UaBRk{Az3qH(v<)3rMWM-ZE`M9F-Gp=}WDgfem3WLPY-vLGC ztDgF#&f^&J`@80*o-kBkDpMrwg8zGK9^trO*6@0Y%GW%zq{3+~{=@IiPL)nwhGB}z z*FE>yflfoo1OGQKMZ`ZwQkD}z&{Vm4+2VgxWxx95*_qg)jCVK=;x%H*ynCLTgD~cQ z*wAE5qrmoj^xF?S!zPZs_R^{GKbNcLp8(UvTZUfo_eB@|^l4NWV+i(sbpHpw)X~Fl zxng?aPu+0A^aUkzbDx5C?OJMk{rRH zL6{IEA{-KZsyJkd&#CZ?_H3u|=@Gv5rI{QHsAIul+AKo5H|6 z-Qh5$r}hs0!58AAIQkQO<%^;i3WdTl5|sq*gNeOkiRMSzIebV8`{jUqs^3LFHwYn) z<2dd=Gvt*q2L5m~8vW+8(6#u)Sbcj!%sPPsxkCNq}04oL&wY*S;*07?Y^bko&C{P z#Ci5@Q9F`Q$*fF6I6t`a?G5cFl^|q{o-|>?&_WIP0yUc!uid_*OSFV_S#h?4+b$U9 zFnVjYZK>TO8qbV#Q^Z!SiCRa@57bS+xEjW$;;c)GrR-mKH&N&x@>d-ra7f9)5YjZs~4 z!uZQC9HuqvRW#^w)$dyP$p$CIj3nfY9zA1DaRTdD``R`S7xp6Tbm79>MlS7^VOfp@ zb12wczx=JQ6D~P_NJgBAxx8IXiw3d(-I6HjQWJ@SG zhG>z{=!=uoD`djrjHsmYGRh=|Jl3m@HmRI0pRbv?#%bc$+m2thzSrv^8TI& zqrKbRo1NXe+qrk<9Rf|;p4!KACZ-jqMSI(iy#MsBc9kcn#AHmIFmKhY6ya3(h;t4w zRQBF0d#k!ST+C>V&Rc%RtP~m*YB_%7z?LmXx)}k0)G5oSPMw+`O$an?e|mo?K`$$E z{lP=sjN~u9wNTUAUw3fhi9P^`nSRZJ;m^K*JyYFesW{6?!|#*M2c znC$xDwqwVS?COfW;*#-JNi7Vt9Xoz_XJ_0M#l3I7xn=*J2A8Jc@9Lw|F1&4iVzShC z;^@K6n-6z0LTTod<+G02sIA>(la6(yb?JU+y}*`EcKm6t`qSfmtBR$YRU|^9s!^yPiAbkJT{F>JA+2 zW+Z;vWpj$N^W(Lrwypf=gN?6m+&9ou|Hv=ur(bmWECB#O_A}?Mx1K&SFfgEs$w{Af z;i?HHL7>8LOU1Fn8#f;8W`vN8$xCO=nx1j$VjxPOr@rjKmiNL3m^^9eq-it52l(zg z+bdcJ1B%VyD7^R^bJ9eO27EpBWe2ye-`ftH^Q7V>(ArreDPo)DLsAiq%?z%Im_3*yQ92iz^{PDV9i^8$J}(u zrgL_dSL|O`Ynx>|bf|t{V89TYl`;LIRTE62I8v)F*YT}Sys)dja?sgdt#X!4UUtWV zIIX*J&+a|D_csgz2Y~E_H`8+WXErTNn_S7qh?cWa}U zX4f4!*wWFXiOVaTbMg40b?@(QZ0hstqBByaufA-8PNk9t$~Pa|zkPE92LPIJ!NO_d z=4Kmx!wp-XDAg=pkeg|S){4@%tD~n!A2?py-`_ua+cQ2iWq;F=t%pi?AMGIkkURgH zspGS=3@&eb`CD&pY4QXDj6@}7)-|-#C>#N(1*~Z)r9lj;* zL(xvGdtrBjuivZK;xqCWT|Ygg{lwb`U4lUEw0hgVUM@sWTsm#igvlv7#u#;$eenLC zBXwPV&`P@Tm)x=-%VN-g&)HUW;N#ayJE&iV`21N@N@h>6wrzc)R9}+m9j>o<<^9rN zcjKA|{e4$0nURzdY~TGxMeLQAM~Y6KJ3dL%y7kFYnyl+{x+`lNMNx_^xn^-uVwwXx10aMx zADqLfeuNx28yWX>?s^egT%S*#^s{#f;iMKE2nPxvQji!IgDz)t^SW2I9rOn|@iR|| z2Ov10$eMtEsJw1NOIgJSyN9DwylYfGX~~HiBdy!_?pxKZvTxc9TV0Fm$o9^v z#=3D6+F4C&OJ7fCQ+c)2E2br9sm;NF&efm{xAim}^YFvlLyITnCojnBZQ8$e)63q( z`O~u;%_r8qTUy>CUpU|2-cI_eO53OtY}siA)=1SQ_K*7%4fhPYi7X8C^b8CS`^;S6L7}I*tXiu$1D%!K-txDbGR7rOpQuxO4TtxC z^wGhp0jeW{tIMy|>I)K9CpPYX<<%yeRY}h=`o$Q&en;;GYP~sL>h7=K^xn%KCS;YE z&E`Vh*i^OcjYHFCO_nQnY^io8Oq?_!-*f1L9fuqH{2*!EvJ@8}LFTMKy8GbPeaCBE zLg4HkeE0({*1dK&N<~lSFg+Mb~}S1p{uWR$ge1hq`3R~TZa!tsoT1oeO0?# zcrS}8%uKXE(~(y{2rShJX$Gl#_wyegmo-sTpkPgRg~U@=9%C#x+|zMr{gyq4Yy0FN zr^b*N=Lg0H8joz*|Iyx^RRM!l0C!irNA2cD$HJsoL(_p*Uu#T?(?*H(3K_e)1J7v7!3M`8!F#^yR@vYI}i{; zUE0pUkLOy|olcL(;|%y|=V0fM-_zZ7?9idj`>VOe3;@w?#XoAoZB9Gtx9vLCVHiJi zVZMpO$;AoNXXRPi4!!-_i%Eu1P3g|Z-|=5MgLzX@a{IcQ zJNq`gcc9X#ND2wGd%0RQX+lbhDm<88@b&h$m%hI7pof~6paMgjH^>+pII(wQ>8_fx zE~hAp(AT$fa;`zmdDX$!ww?%=S(E1W4i9+x54^GIkee8ppyK*iw_hQo>FBx*gT)JY zVQvCxty=fOmYu$Vpid+K3q3%QA&_BPU2wXMr8isHh!_TFP3z2#Y% zWKFW`Rl)w|w!N=?P`7I8B>B`Emh-{-J@4+`T)V$jHrXX_nYYp9O9Wul!#wSk@4dKV zr>n~!Pzegi{`x?U{?ZwfGl%=?4s3ezb>Nq(`r7=Rl|!`+N4x1_OI=k{Z-0Ber@D4$ zSMsEs*;yi20-mA1uJ(4B^TDPnrdFx5(^B=WnmtdwZ;i{drvz#J!EKMe!2|OH{mxKt zjk~I5OJ`bfc1gC#!`)~(=adCIk8j<-d&k}rO~YIV0Ctxg3Ho3RvV3W7mqszWhJJdDgmfbFwroX?x!|PSZ z!0~t2l??_%g@qbHbo1W2(sjEwRqt;JX^dQQw{`mB{9J3DZi*PE;e4>8`p~{j+fTk1 z`dGBdm~EUPR&Iapx!$78P;6FOT0)RfP8322fuY{Upu0CIg!%$z(z;K^CeBy>0YAW;wy}z?^c%b{e zw(L0Te1}!fI%*ET|L)!s{T`x_K$pueOH-%Drl`W1mPo)Ux9)#y%aLBc$VGKPvZV$T zmC|1R-uf~Z6{lor+S&$P9Y?!q0CWk_Idn zo{vA?U)#@29Jmzk8j}6NVD+vS-!mImTQtLigM&Wq8}9EO820)?g99xUTc6mFJ7amg zgZSzW@7uKfaLoYG0(bSvQ3hR3#{6?$fQF#a32ROBi13AcCUHjJW-E?eULr7;PlDng+myXQjKZwalB);uw;LT3Z`Cm7%r|+cTmp3u7&DvMl=tJNvrWkbkJZp|7D^J-2v8 zf~v3L!_7^manp+P5_!Y^=U(j^pRPn31MN*@sOiJ@j3|pf&Ki$dg%CoYmouiR;+#bu z$Q5ZESEO_r{~B`g)d7Hn6AThgfCquQcu3|-ck`~&fBd6y{5?OMcllCl)6SN6|8{w7 zPd)|WJkhu3=+n&xp^RH`wcT6(;maT1ws!kBXQ%u9 z02G)&nE-+d)a^qgCS;kj=BYcy!;gRO;hOq=<&~Ed%owBp2sdaT&T0XW$QgaaIU5-C zStiV#yJDQCf9uOB-}%1_W@qN>x|@$41-WxajriR=zIkchVAIBzSKYbp_}2=O;s$FD zlz#Y1Px{06FL!{Y_5E$lo{hWuS6>B`b$jCH&A;SpHy3ze|IjO&J34YxgQ^~PW38{y za-^*%SjF{fT7NzEg59T<`tHtvR!3$L1W{k#m5P67Z3Re$)_o)ewc>EHg& z!g!!ZpMAco|4{kB-1wL?4oXl1cYnwJ*MIY?x(lDU z^5!{4gxsMHYFPEjwU#7AV-!x5J+3k{<4TIip4sG3cS^QFQY)kL}Roo<3B)*KnfZ z@QBxTC5?!PR63c}t#2%OREy=zv5s|CYi4%8O8W5$!G%$(E+m)QcV+I2+r=VLvL<2E z@$exoZf5EDFn{OMpYxj87 zYw`w^w4GOlr{%If61k)G@WMsLBxJ62ecdZx1n9W$6~1j`Z*Z!W!Cw#@giTMx&1kP@ zrIppn@|c8urW^NNB@p>%?cRk-=WnaGA>_)`xOA-2gOcBG$72N7HQSj$dixuL$H|)-><;W+I0=UvH-|5-U88JD~SrmRr+E&-8Mg}@&#Ob_=w~mh1>A9k7 z#AJ%KmbyF>^KRjkANao~XN&%bp!SUP!EeL3UAO z2+&^3{57C&Q0Y5?{cWA%yv~=;*z5Lv{4VBZhqWW#KkF@qn(VgO?RVeQi3G5oHy{wM=$Ii| z6=v)CJ4;@BEaM$N!2z0Fgev)eDt&d|r*~k?j5C@AW$g4rjo~?Nt@v`AASn0*VYv?D z)3LvL_qi1bgJN`!(EZY-b#_6!_NZSfu&vL_bCvP_PM*DG$gh#py7Hj?A$FZUGKvLu z^WMLa2q1(NPpQl0^~K-&;uzol{B7iFs|mwU$LV_LhuTq;&3f%?-sa2mnHE}=+40)a zZ;qd3b=FhBC3c@R*~*sl{yFT#;t~9X*S#-zvPl!NwHV*ITU?IUD*VhlJvWm`H=c>y z+B%-ReopLa$0>Ne91XCS4$1gjmK|S180-%qufA)}aS&!XjFF<7*1di;JX>ilJMVbL z(mBjSICHyrg}V2AZP7X#`gn2XVX=tptVZ`y{p*fov^-6qh3++BH%a z0rYSUMzA6oepq|Y<=u^se~(j%WY`cMU*XHQEs(I8zrk3mbH7|+^NRMek5kBOyi#BY zjq%093%ZVAK6=skOp}HasF0r4(YI{B^XmJ}LLpi>ZU3<<}#Epkhp_9Bns@GhJZvR>U}ZCXy1G~ypYQPy*Xi{ClIp}O4qpArs3xXyy` z88bO(7IPPVJ6tCtR6({tRAMDpRc$I>KlNL32+GqKhNW;&nW}*SP~tMP;$kzb$$3v$jn z>ULa!yw=WIu+f-IzSj@idy4GTFpsc1;O%tG3IJ%c zajnSgwZ59J>|PdswcKYd;EjIMbA0-h-0Rf>9OSdwiwk5`mkpnWr8|qmWYzm^V|#}L zAH!rqtcfbe@tkk7?zY$q*{+d}mPIH?rnov^5diJ+yi%{_Lg41MKC-z@v0bI*bZg}M zJC>gQ%a2aAr;Syj!kxFLxLG?pa0FM8jEd88&sT^>J{VE}_KngRMR*X;bLo*43%Rbl za5;76!X|aDRNh!RKgE>ABudfD+=AwO`)S59mY_V`egvg#lm>fzb%5<1ws3`dsw%FQ z&zoaJP)Slnn!YNA*pY>WN>pd(-Zr-0qgPXW5ufQwz?>4ZAICOK)hiRl^+Iw!7Wsi_ z?vSnEwY_scAaBg(TSPC}EVeHj{BpWyZv&4++l(pfPGPU-$9nmUZg+_0ABr z^a#lfBn>cjyuXq(X3^}8E~;Y$D=^ArFn72rOA*F`dtTkpB&i1lJ$rmJ@U-5%IzK(_ z_%0H@;oy;Q^;X76kG362M)VZHytcX)%OqG)Y$lE+Ig8V|)zWOKhyTSFs(mff&)Rru z<)rwx=mvRzOv6JEln+lY|JpZ`Ev!8Amx}e~a`HKAwuju>BAsj{`=b876jj+QwDeSt z@N?V)ePQ&#Gk%XX_s#iE>s=tskI?G@MxfhXwS)E4At-Q}Pfb6cixX#9J8g2Q13^G% zR;a%L5K0g#c6r}S)7Bcw4`eMb>Zm-pxbO|WFWF;A&u-9w6VkPpADOFNI6GAj`jMdQ zp&4g>SPF+18DhCqwRLi=LQK*#C;8k8Qm^OXh7P;abf5eLX0gF`*ZDc~02FZt${q3|DxYaCHK|Z} zS+-Ff{;7O)GiPsW5gk244+&(1{;6tc6jTw6xb~O0U4(s;E( zoBQ>=)_%M-0JjPBGX!qtF4la6AqE2|9YVJ9J1p4f&D-U+@1)V}sRRo;^#@2Lk2y(# zhd0|^MsVIg1oQH~iZ09+0)M{`5D8qX6GK7@-_WJHeFk&kEPLW}sM12UQAK@VTmAab z)itSTco-U4rPuhTkib$HbAn*1hrxJ%>y)osTh8SnQj_bS(mR*T=;;`llv!=cF)2vA zGaagwjD=ns7CK|9z_&EBerg<1op~p4?`qZEoT($!wLvMe$u!H(X+{IkjTeVj1IU!m!)fOyhpygzfm|0+lN0 zI$pZ+V;N!qUt4g|EmfJ2Byfb(4)@5MeT9NQ0tKnq^BBAKZ*+q?5$< z<_2Zarw_JH3D{74W0K(DH;IR58No0??@4?$^H9XbXeh!&z)AZ0v>LtN7Ya(^JKl?` zXyAVNac2H5i6hP?Nl+T5`G&zokr1F7rj88`5JsUc=pycg0&w@_e4XBkzb_CwrQvto z58%@vQwC&re=9h*)u`vUC>*zdG86D1lZqvmf3o_2$>nGQPjgJw}v5 ziPv#BMBrxg@J(hZOOw;fqzDMRD;+Kn5&lHtDH=}|SZ(w!D}5K`7K;4p>V<~$jT~oS z4(q4x(=S2!qe=$;hc|xC4x^N(+fHqZZ(wPHyZ(pqHm$^*FUL(ZBn%8^o)aHQK+uD# zpF}Xk)e@9ZcUZ+CEoR~h*B&M<5rA{c9Q;>TyhtR57G|1~PKc{ab2y zJ{(0L!K?0i5pK~qx4NYB)Jy10M>AV6i-<4I_I4f(mq!nb_k6kIEKtw$aJ7@Z{A20U zF_F*jZ&}{2TZ=2^wS8LI)viF9oYhF4#Q{&s^6x)xg)9nm? zs(pJ{n_M_5#!1^yY7xnp?r&_7dTytd`01LPr@HC2&3R^SK=C{QT&+D|IA3ouylAB6 z1|;l3h~~y-%Pw$)IEYbS#8)Y?I2H`l#)WW+YUzb(Ea-XtaF3<3bP3ZHbn-KjXWiTH zwV*bSg%v(|+@`K8s_`}5T;PK?4C_Solo}{Gn?~_u@8z4w-3cj@t`o z?Oeeu(xKVWHDbqrsGbr=e+AK!?06995vGa~RtK5@w-(($5S)SQ;6UV?97HJ}%)eoIb z)LB!uI*Ygd8|U!m0kP-o*}2p~$VcT?a3m3>6p@G#_QDl=7D`A#Wwef0{)h|BAR+UB z0Rkm0q~I6S9uP=9-J;(Rl~$bU>pilbYF!W8eFj62ZqE6>uA=cZzQD(_#bI;|{(83` z|4an~MI10$kM8&N3>t9X!&q`PXG32o9&1Wv__sW(Vtd7je8z+QRO-|qL_}1rH|*SWCCA?%+dP`Qp7vNnsCySGC4@Ldw)f@Yh2YrQCNgi zx2$AHIKMm=>;?2~Z^ds@*k_`*qvXw(n`myG$M-AHv2jI^0(?(Q6}?)nAlau1u#KM@ z=FX}N(LY|!uztt2pSQeSU1ewcmCVg8F)%wkq!*Qngm|=)`x_Lgb#L{!XFn;y)z&p= zkOC9_X?xwv-M5eb@`xcCIUmb07t8UnFW4hZ=2gO`!O6qhDWpK~#HfTCST4fLk* zBY}f`8wzLo*bx}Ztm*REstTvl$nL=3d?^wRI8!xIIlZrr2q+{zk2 zhacnC^B(N}-D}INLJ*e$_s%yijfv<dj9$S`vy5lODOScG zIdIQb@8pC;iPd|cAYj9+xjI{Ng9wi@5ip+OP9LL{hWt#ccP+_I>%oC(ultO>h?ag#xNI5Y?K;Ruw z&9lXKCuC~4o0C%+ru#J^p3mIz^xqPD2DwK?5n0J^01#4K?v*>EVDpngfn1@tz`ocN7%#uRh% zD6*im;Y^{0JsCsFiUoUg!qY|KG3Q4G9Ng0^cL@(B|1E;hgHwgqb89+*+G(E(f$)7b z|3HQpkcHG-EWBG(!O;;J3Gt`n>(6N?gX2rPJDPc%i1Y#v4}W&{?Zc z=-!oiAVgrlRw#*BP6$a@mT@uYVg*GLlyZ8+$>B=b_dZ+n8BHI5)+D{h9nj-k!^v#R zycSlU=v4Nd5K%l9%a{lM@xwsZL|3zctj9x`i3&qjO0v2P!*tnJ&D8w$LJargpuUZb zjp06VG%M^c<9fL$MG;ktTupe~JgF>+u!chH2`TPJ4!aLxeT0*2YTwuQ)4rN1S_+D- zC)w)YhMFp>u$4^e&xQerN4)II1PZ-mysjV0Pw3ir@K!qa6(@PmMtR{4X3brx%q`cn zTsFgu^lt}_mX0h$Js3!O4QegYHK7SADz6}!lR;HrikxwktkHc0@iP@wMu z?jyu5!i1XSh9kbM5xmJbw=ppb^Pp&WQURTUV$}Dq@7`9{39}m(3Ayahgnb^NTJhb= zR5Vm?FIT*FqenOg)70v*%Tl5cvW?HsTb)p!KesgoHXPTlA@wbYL7tdA0rNX&s>=IRZaeIaJ8K{Os2h($Vi{BLwlLa`)^!ElJ>+w&^ zY^j)Hf9*<9Gvd0iQz6PXVi@G`B?i98#Rhxkml>#Nw9cU0y3scr1o+CKR!DKj%SJAz zH@3fpAui5wOYzFdci`W?-|3q9Uks>bo)IO zS{aW4m}F0;qRb3%Z_Ag;6^7al;9r+PCw$Id8hi0)-DRd9xKr;EP7Dm!-=f-WDllh6 zzhystwMk$w+~MNqt#XopW-ubDFfAT^YyXQtPEJnZ zxCJ1jN+q@|>)xtsGYIUA@M*HS7I)E6kIR(g3876(G-Tu1QIr|;i^LD~hr2d_PFre8 zYYFlvtY1yqj6`!PRpMOfP0RdNc4os<_ZHb$>gQe><;?r}DHdPbFSzY=ceiz+Qw=}+ zwP4KgDqwU}`}vU9bQlD}xn^cgyMEVF=`$SB#+?2V$G~02R9ab9;&?hDrE=mg)SZ@@ zmZk|b;db&R7`uJ8^Z@gfqG5KfU96l=XT@e9CnES=Gqt>u@g1N<+mD&F16uT?5ABl) zzFr?Kt5ksQ579trm`gz$YF~aF<4tVkZ06;O_zZDc0TCevt7uj+L^Gr^aQ|>{%!1e`f4olWOnc)QxFs*`R<3(U74 z1EW{5qSI1OZlZ)GJ>OeFrLVB&?xG=zn&4}q%BFPbbjg+q7JY7Tl=bR~g&7B8tB2;Z zT$xEed2jm4es9r4A&OMO_Gxu@|Jx5oFTt}A`_mRj7 z-ubl_;^SiHuo2rQ`}0c(o7gZ#1-YV;n5PmODVl;XdXMS0hp272XI(e3G&2a_-)*?5 za2yhvS2u_0!yIk*-Wl^q{5ln%&zcgqXDH%nuFhduLgG$-_CX#&BcHFPGVGX)GH`j> zj1^1Innq=rtgI=uURNyeT?##y(Z0IjUiNK&gd}CpCAU(Rmv>Z~tM+2-y!w)%Q&s5C z%`C8(WcXAkfs3nD=Z}J!%r>jo>hx^ww=2GzHtY;eev8UfFgLNqQcmoA%UMz7eUR^N0XsVQwwno+us^GYAu^%;-3&tsuE`6RH#5_ zPZSDwH;+ehn5~?{KYrngOGAP5Kgnv0Ue^53e6hj#^r?iSUfft=Pj=*VOu8 z49bbRKM{AkwoSFfFT6(_py(y86x*k^+_XQ&o@>IV}LM#O&*|s(Dq3KgF>pT zdNCcz#-~&LxU%Am@ap*O(FAmr(bprpz~DLW+(=dn4d3{2A?*n^=UpIcuPmzTpe}%q z?-diKXW+;e#~ga+qADmWS|zgc0(>75N3oxR5;|4?=l*!>TV>k9`_*vJSj8o}36(4` zkpO>Ky$jl0i9#Lnp(Ri7d7Ib1P9k(jlil?4KAAx#TV7q#n3H@lPFAyB8tnrLIyUyGarPV5X+s@Q3AOAQTq0&qK&T879a%(}52TDp)pUP?|%abS>S5wHS zQqpF8&-Z9VgUlqNVuH!gY5yf?4T$nfqTSkYyv|jNSQ5Q3k`)zvihHIGAL3G!lYbo% zAY972n49Majefk(elGZWKc;5&xh4e|>#)gx&zsvF+w^1~*nV|CKas) zQPgA$lO z4xAnBDZWY@v&?*6-h*-xL}xA8*^-mkO5c zOWE{=M%wWGG!X>Y=In&EDi`h+;e3w5_i^yJj@Daw>)}1O7mv97xp8KiOSQYxubOD% zaoOByrEBZbpI;i8-q7BX2MtNTe|_H0&CM$2Q#yi6GGCs%I5)OB(Rq`e2XI^~56v|! z{AH406grqdaqyX+K3Mnh;wuDz?qO|#5*xEOYPhB^Fy$a%$Df8Dx#MBrb*8hdosxb) zznZ*XbCz#qLe9aR*?1|i49BPJg;7DEDb!(u?fnWtUB|h!PweT_2xsSA7XnNVjO*h4 zOc8cI-cHJ~&*f^;bJpV3*7GqJ`i;_X50T(0HG{7GCLb=|xyMNkeSjUuw>e~nb{0!F z0Erjz!); zQmjAghN7_keD>SF3mj>C;w_;lS?gZ45xBWKjoV@iyEC?_xg~tTp!g+ zITnjnZzeP1S;w4nj1_GfCec?HS-45U$;fXNx`TS4tv5)gvSC_LTAQ|kDc4zUnbxB)>Bd{ zIeWz)3B>crgDnj=$EJ>cri9bW| zg+5l&z8ebLZX*#{;4b+Td^^HOkL$dr0GW1wdfSQvxlQ2QybS+D2WB6Tz6f;G$_^5sl`Qup6jMfQcAg$oqHL^n|^Z0 zP#T6Qi-p)wYy$uO6Or4|x!YUht9&OoInR2_!!o)GWq&Ccpty+FcI&kB&CcUIJ3J-= zm|Et|#yd>R#)@Wm>w=Wne!cv84#2dXBq*E4PNRf@@oR_nthwSi2b;6)=~7%gBwq#V z?SXMYE`!r@QAEo8<&4Z{6$(t;p7CKxY+>Ej95|Hpv5M7#Jv+9p{~*CEUcP`7{#(mM zt`e;jxqDAf0h&^j;6<;V3w#7CiNj?bf=!zD?L(Q3menw5RcyLK-C*$O!LWB@9&;wyhsg21d+X!<4XJXmnVmbS8H?>kr~FP z?r0Nw+AuN!jaf}J!w-}hnj7%3LjQcf&BLmYvg3)D$Bf_3UIj(BD%}jCN0=%2rFq>% z>g2_s3ORel#LDC}Lj%<3aq9CL=Wy!9NlP3lEv4J!B-r1RQdv<&^n`a#C~=5hXAc=e zmAoGNGqDo^G~O@e(fFB@Z)>tTY7!F9jh(L`c$LAz1le(-WQd|d&)dge z8TbnI3*wsA0Zd{_7-B^;&Mq!K50`tTM^AIujI?-J19C|9RnM-^w*FFAD2e#9VxLsR zvZpF%;BvB!_D)yB{Juu&Utj7bf>IxZ5jwgDYvFy6O8O>~YpySeU1fjQnvuq+?+Y~%#gBFUW+Z{=yXGgtbepygm#$y1u?Rzeazvd_UW*EK@Ecf0}%{GiUJOt-}2HZRXBm%59U_^ zsgRh`tQk9?iyI+Oq+5vT<&!_LGm+=>!MtgM{F3d&cam9m| zKq+3|S1)5%&CXM3&!ygcf+PCgGztJR@7+IRih%({%v>kJNVD8YA_qU`#L$fZ0?`QY??}Z&;F_y6rMw&x%tW^T&6kt z)ShjdmM61Y&DftG;tvd>^+5q$MRVMKyiR2+ARTQpJ%5oRX{IsJHo;RURi~<`d0{q-G z3ar&3gwh*NgtV!wB+a#-hYhxIVVHb|I65`< zbXE~hYCNiv@K4P^K!|jKK^SS+bTf?WQQY$m#K(3V@1g*Il0ar@8Vb<_P%MGl6wF6R zxdc*JUltD9zo}g?lqZ%OHwT)mWa-iWMP^Ow^xxI2P@{qB0|IEF=iR_%HiT3C>VB^+7RjS{^ zX_JXhpH=!>MGyBMC5=T8>aqDMJ#^p#BrnO2&)V6He}S@K( zaf+x`q{aZb=|UJ3;E=w-$4BLy<0UqJw!0x@+f4%IvCM%`ZQfASnAAB5Xi^2a2?3o0 z6p4@*Qp@6P1|ai7TD4%whNt!^al)k|BR~)v`iC$IB;eo}-}SN}S-nEjygCi;B3>{m zn!E{x8WZx{Ah%JyCWN056N;@UFCQVYA&_+s8B*ZoBCix_!M3}iAj4EaP9)_cvqS$r zKM}Sq5}&p{l28-r1@Ufxzqs>ltDmX3mKY@-tSAJcpP+7rB%C6FEs@MD4Lo%OvY9A* z!PBOqPyca3ey zks?ydlXRyYDHs3H2!g@*L2aorDlCjqaML7ikrLP(i+arpf##?c_SxeqULLFd zMs{&}6#M>Wfik|$W5#KONQV4uWijBjiBXwDG_^>HIJf0)NVq6Bt`G{lMf;)=&o%-p z5TDqfWW2-{ts2Mu2jMs>VOPZza1JaG6kA!yY8NOlZJTU1eat#brS^-pZt~ZhPLnNU zUQhHVhHaU;MuN-JJ&UkBK`$i$P#54uQf`4A-JrG{i&h#blXoW*0t(yVH^S-!^lz){?Cw!~180(mO7}5~;jTgJo88_46LwSkn-Ai5e0TlfrGCmSj0W3+BX_e$Qpbk-#*)$&^Tj?=O#xWuIt4 z!o^QL4n(k!vgB)|EhL6T?QA2}o!EB}87M8QmVYwaq!U0Dbm({A2C8vq{gf<$H3*>@4P47SuZ^{xT01P1$E@C*xF|V2%ncr3Hgsm7;`1Zs6dy8XYrx=g4$pYReMBxzG zl8IIxp4NDZXfOTUn$cMtZ&V7d#bHSTCb0vepYC@ObjX2W1hAU{;+fI3(_EE|J6JD{ zS{JHC;jyTO7_bxpia7kun5MGd;PVn^D5aSTBW{m2F6L?{+ghtZ8_V+iMCU<_mS z`_U$-K#M{va@k6QCf_*sb_A2WFDkeY7%W6(Kr)>A!6W76(=b_YTAZca5R|WiyzvWB zq*9`h9HGnNXaHnJ#ctauWU3a@hBB4KdoLmKi{?TufAHHH8qQ&Be0;) z^%RZEguaENicr@Z%VijF7KtBUEP+5!81+CUU}LIz;Kjr2E+<&kH&Yp*0bLRWjO4(8 zYd5<}-yXkt#W$aXk&@VSZSJw{xaX4FINMb&A3KCHi@jV=b#sXi!CNVsz z?RW~yv^7NG&kF}OzS0nfapOP~a1pKsEO||zwd+07fPe670^YDQW^&|h!awwSjT?TqyLxcq}z7hJNCF-H#bq)^2dGDemk!-=E~T;=|wAi?=x_}SRpKK zjg2WeQl8QQGC|W?)_W;=`3_leenP@Ead~XG9yy)}8&Fche>fCaOs#+h?~*rugTTu4 z-_{NQrt@vCFTR9aXp#wYg9{BxKG42A3?W94#U}vQQli<$dfxFdxA6#+5d^*MsqzR1 z_OSk;gCcS;1KTJlFW&6hRDsHk?3$0W&?%V&0?Z5#)Ju1ehed^A#zC|nSNnuX62Odg z*2*=F#gljHQiI86A#dt!@_aHXv{L*9iv*RBzxD^oza(KZL;zfWt#4v-fd0#<;P^n8@wYw1f2E4@R8AUPF%EQjh@ThzPeZUI7^pDWv7gmZ z4fH^mKPh|=e;Gx_rB(m7W2X)H7;OJvM)ApdF`0S!I2!-**@k*W({BfM_vsJ0oa=$d zBAfxJF7E&LmsrR@g}y}~{H2Y*&u4%TCYo7<0HOVd4aYTD5>$L8&vH9$JzKZGEK5%VPBZTUj8n8c!*<=9dJb=U>T$1wc%OsMw38MTY}S--B5Gvg-o_j?#=OM!Ns0 z7YF-~M7-e14F-B7nHdD;9f$t39YBg(`vEgYog{kp9pz7DMbWIups)n)zw(%L!?zS* z2mulh+Dd~mu>OY{kDliVG4}rkWP+Tp#4bP_J2WOK#x}zCFB@(M69bqu_I-9A|H}j= zq_5a_NiiT8t_S9yIXU^bZCKP3g0sE#d*|;6Ut?sxaT%o3ZgDY$Z8!ZD3g2aXWMysa zU^Dz;XO8TjKHRK-J9%s(-T4&3)$~`+iblZe!B$`204UXcf&XLf zC6fKsZb$TjE9$?ch(HUx5Casvg7aTpzwRZCS^&X>*nRW;e{^?V47IajqzV7q4cGijO+c)n_V1OyB2@50(>ENg z!KC@$+-hS+BA=$yg6t3R`UdKm58n_sjpf(m@?NVE3); ze|2C)$T)KQQ;HCH|2K@JkQjs|1eoR^ZNYf>!v+Zk?!GqHISw{h2%iqiU)~&0H>7(r z{bTJh#YZhd{)~?qVu1JwwIo+K&UTO8-`R0PBYHxOV<*56_5UPoCm=2%JgWA$Viqce zXSsNS>o^&tFW?b8*dA3REvJ@S^^9mC1 z5Q7$LO^+R0^qC$4JN}wYK_Zd>ae2PWIbq42fOB&Dh+_oMt~r@euTr^W5F1zg^S^rG z6{rZxd^(w|6Xrv(&u1SW3$j?Ry!wuRWWyh?KK{baX%rPEn-iTe0nZr!BJ3cxsOkfD)ECSZJqIQJ?%4${F>Kd3il26%GBp zMhbf14TR{%0zLfu52XyM@yD<9#jwl_;Cino5q~uH<{Zrq61xkBmDmCCzmu_u`3u=6 z`#r?(e~sFk3kpM-DjswKK#-tn3jhFZTNCV&{D~pKg~2z;v4NnATgl|1%vf=|gUk#f z9b4#;f3+>yCL+oob^nm`q4pmJhFd916oW`Yr7zX@*kVTm2Es@cZL70kn>I$ z00@5(&Bu+YuKug1S<*W=>iNI12ap2)_PrzmvndQ^`^f;o|Bqt5ll6n_4Xf!NO#m4* zvVKf+Xrq7ILlN1JcE~n_toYgYU#f5VSOQ&3;T z*ygzyMmJZ`? zOgMIu+B6GUuUxN8-i}&k_e4 zh`+t1*X?1-EI^TAYD(l`W$0laDr~6ivk3JhjpD9}$3+w+H7Fx3LkVc02+9sB8NYu~ z!BPcg`bB|x#9UTwsr~rRI8W{eTr<~nUBl8dT-hjm8SGY5Yq=c^ZK?bQ5D6T8T#z3Q z3F8C|67H41*skX62_wr%{v06J99|m5W|UI+`Fr9dp*VV|dQWybnZNPcHBLM})ysra zM17?C=<~7*TM)pvSK$+(ptW;lhS1CzJ0_dPKJtUsuq8B@{hm%DMZ+CC;kp*5D6A8P z9v`hB3A^;zX8~Ka%I6Istt{TblfnRCpSoTL1&f#ft+&~PR`*7 zY|IS-<+v0X6K6}9rcAit09fcRIm1U5d%Sr*=uVXZrDbmsX<%<}^|$H9uqy zL+FfGdO_U96@xWjKU7{h3#@>0%wf&a8k|tt{j9eiX|W>u!s!7{Y$?ag-*e+1uG!FW z{f#Mst+kk1?RrkOL?Ql~YX9TSN!9vgw?xu-aZ~vg7tEz|!orE`abCA^>c|K8`cJ<> zsDHbDDbaD!g>B^ugp*ZQA) zMZ0XQ2;%zMdczIyrL$Zc*y)ubSf8Q^&IrvIP8%m|5ic{Ztf*S@b6TQ!SYwkYe&424 z|GS6sauTx^6$`WL?sSr7I8z3HUJ$tGpWO1WZrKk@l;Y1xauRI1T;%6Sq!HjOvD-HU zfyCTQ1~)Q{j}dzMEYn7>BE@j_XWmpx^)^W2>{e@xo$(!*MN?iz{j@EVEi^w=H{`29ZErEF;AXA>2>nb zJkBk=+n+DIZ)M&7P`B1(c5+^7qEXTEX{&bBzZ)el`@OyjN(&<6)a=VzlIDAm)hf0Q z6ucF$tDrC{35IeiGJO<|#qT3}{?W{Zmrq3IjkA-zFLMvjPETd} zHoY6|t^d(M4_Y|Id0WTB$LYKNzF)&^%8bI~Sxs0ZqxN$!eMEIvjP*)bIVnISM5G40 z@++5>UG?e-m5S;3{6gGH?~P-6K0#8^I55vm?Uc~IF-=lWg`IKvq4qcv8)`f?I~p%V zkg;j&ib!F>PRZ)kg6gm~f4pOlx0zz0-uuF*^Knt@ZTScG*s#o)=41DGlnq87)rWf5 z54V|f3-VA7dJ(S~$qFC2E){RQI<-*=HnW3+JiR^);0t=6Fa1ym1=J{nW+m0}B|FFy zd%e{>vL-3mnPD0qt#AhwD!RMN2jQ~efqrSUaEk6vZV zRV^J1!wKTyRjze{T#&IOOYch|9^BGr{USkka)K-o^7^&!(^3i0&B7HFn$k{qu`p^F z#nSY)c=_JAvSD8~Y8fBzu1?5<69H<6fxm(IT&+^~iCO#MD7n+A0lna5bMA{PH48fY z!CIcI{ks*Kw|gC>&egRmbH_(x>8X_zcmu#Wz3`E$lEV_$hr)%{B5jBFtz1@3oe1Vs z-UvGx>t-8c=mHDBQ0QO^=A;<$Tr<$lP>M=v_}6W@GJ+-?EXhjt7o|emah&IThwy)w z5+5cO&}Ip=L4RK(k;;X|s#Pm?xkI|U{T#LU3uYu*jUv|7QngL|#zAW!sLhYfQMJ3=pTClA$*+n>=MAx}>75!=pEqnxNF)m4pO5HVrDUsGF!iU`a$n>6qjlCtA^e>=45|*NS8JtAVTnT4J16Egzn6+13Pdr5)y`FMs~YM;i_1BRu${ld8Vg7IiX zRCRI4yh#+Zg6yls7o>l;&{^Q7s5TyCk=uB+2wSF8(oE2A6+2;fR8GS%^N|j zKDD0HiGrQY`|1K1ULSww#VC@=>inoaDX@&>(|9Ar~CJ}9Bg3JP#-RL-}Sew z(1^_OR6xk5cKI?h`7yFSdh~G9yOl|`MjLv`IP!wXtXcQ+vvw+P$7Q@hO@T2zPN$V;8dBtM_J9WzzKSn$1X%!Z-)+z($}o7b@Kc5AYF`MmSpilQqd zg~N1ZxT^D!Ke0boi49MhhD4MS70b9jP5DImUq7s)hqTCLLnw?$uq?1o#e-v%c}`vJ z%gY9gprouUVxR~pg0~N39*2~M@^fDqhB@ZMmc!$$rWR~VT|WJSv5P)}a?`r<3xZ*N z$XM8F5|^H%9T2w6y8(Y%Pe; z*i_eG7B8KLn=0_sMYLzFqC>=byoVnK35a<;+uZz?%qZ$>FKiWE18Nh^)*~1O+6!oA z^(F615vg?7%<4YkIf`h7Zj}ot#{^iiW<{){czqW&LR9?&<|#1rKl8C87x5o-f57BA z=S7bUW0hw8v;jN%Mv;W39RT!}3Q{^4C|@>*1`GMa&zEdz^U{@TKcZTQ_+m#Qs9(@n1fAB)40r&^Z@;nNU-41#EctUB0FI;z04a(**Xf*p0(f>|>M zpohrUNttIEPA7#%g^7#=W;Ay+cIfne+xeES@E4$khnPqWt`fWvs)>xkbmvc?QNy9t8eq z$>(iwUiezy?iCfN!U96z1&?6%;`n#!Qhy)S4vf{*e&^=j*~upT4G+vWHejDkGK$EG(29+$%k z8di0FHix-nov3#LQXCM<-_z5Ln%;Yj%)h?mr263hG4+)}ZA6XQ!3xETyR=Z;T>}&= z?i8m`io1I$?(SCH-MzRwfubqy1oyy~zVE$rzYN2VFzl?H-LvP>G-}qL&Qt#jU73ra z5Pwjo2E_i^+Ij|-nEx+M3f(8QPN{O%(?>*km_F3`U!>wS9fdfZIqiz0K!3lv_5Mqu z`+rUe?3dv9C`bg%R|DCF-ufe+wSmmh7Kgleo-DbqPkSVcXw4k^*a{%3T-K;goXuD8lS43nME z9x4Sb3Go&nA^`A@W^PJ2m+B&Vq~qU*QLUiWE zU^D(BkI{aLp*T#5-*!MbO>K5`nhcrV$$f5}5Uo+hmP(eRjVOtwB|>q+OpwDt%sP3B z#257ytzp|*e&tI=1U!oZi+&a+bPpu>NW)gIKdAxvi>3WQ7%=v;7e*o@0zRw3{8h7r zyrv2%yHvQ>R@6l3K@!wMMARBZB%bz+5wKeZPm0*uSxWVpbGD4$RF0iU*n0Aul%*3{ zE?B)oq{)^YTdhnJ<~jn`npO!v0s?!D>G9yHU_4^N6u(Z^6^y7w4Z$l0{Lrl;?viMA z;zy3waz0}V3iv&;nY(fY6!C!#>$UwGjv;;rfW%uEq4$#t;GmNd7(j&|)X*&GiWf1_ z$Fx12j6!`48VrYJq%japd${amDt%RW>z`Swp+@x=86Y8hZ%s>tjw2x{P6iV**A3nT zABsAe%&%m=Hj)DXAE&z>=W3u1pErA&5D&Pe$M{|!X8EuJ>kn@C?U>NP^eCMz6?=bS z1#2149Y&Ms?>j{O%qMG>Yy>>9;&q)y`|wlo$ziRQEGDaQ!d~{HXg!_}M>=R#im~8( ztCc`tra@NncY*D4T(20Aoq_jce`Y`5!0k`8@A|NMk#X`8I~5CuwCm2-zg^aM8g7{I zgf6Oim837v4TH30byfikIews7x}KX*mfcAxz&K1!uHzPR#}+H+Y{5@?QU-p!j>fXd ze&`pf&hkH8XpJXl1ZBQH`}y_=96y1-;MDxho*|65>V0WOP&Rt{e(mc%m79@j2c469 ze~ukcP_qtAVXOJ}tjT1~-`xls2qwGM{syZq5~FR~z48(KFurH}cKsN9Kig0Qh;to< z@>ORwRQ~p{^35}Qy6unlKce?Iw3f=Ye>rcvyYtm&I##%yu!b$EBCfMMiuPw@ATOsa zY#^r|^lj}mzgbX=L4y0E;utc?V{B!|ne0W4ma>A4r&+)Cw6LQJ+>Z%RPpc(p%?#-~ z!F73z@CCHTc0~_lHkKy(aFqLMqN8y?Od>in(*psKQeYZf{EjA6l8?m~K=T60v5&aH~emk+;d-AB}{9-8$9iIXcrRF94MuRVrkX*Ush=^ zRafA`8QTka5kI`-$O*( zPrG`aFN;Xd5JgD(* zec$i$=vDyebv{(q;AB(4ca>7}Y60!=U$*Kz%rmMUX&xeRz~h!cfyQo`Mo&fHZ9n#P zvxF#<{c*Z3U>VW`KIwe?@x4{(8~*BX9{YBrm-zK4J(`zy8myZNxEIbd{L(IrW+T`q zfc*Nap?dZ3?Fi?cS7)zrUzEMCZF}~i#sFS+LL82D?89KoN2lDHhWzW9UaVEzZr4>8 zp-9EaN!i&k13PmA_nuHs22x*8eDjL=pHJ|fC%sp$A_@pOSwF(YBO!t*qKD#@~9xaOOay50@iv>n6!R2EHJ&vn;&hdbo5 zG^z>p;=T(Wd6^B10;c$tx%MQ~@Ay)5cvR`Nxy%v_&QAPRYvFNEBxTrf5&a1oa1z;5 z$8Rv->V7&Ns$RoOLRXlUecMZ`DX@7LKK@GiKk-*wqlr zQ%3<^b1Y8Or0jALDOHQtZrGLuxyiayD>R~Ndpo(zO{ zf3mm9xo<$SWS`UB&Km!FWUbE0+IsRc{GqNlqBw?L)iyse7?)d2kXhUt~h*q<3|=R~qaR8Rjc6%5>zls%3v^osP;R zYOx~yl5?$G;%ik;Y`WjV5C5r&CV6Og8gb28-*a;xGqxhFy|<-T{l(xL9681{Ik?pm zN~&DB%*p2)K04r|NEdUqrc#vQvivi0Z%4pJaLXN|X~i9dAn?s|KZ}{not%-X` z2yIx0h2-p%O&PNKG;r&Cf%#8;s73?7*r_oJT5)Ratm9`j;F8uS%zO2*s$N{hH8DZY z%kV>v@{ya1IjYau3;c0xJx!O%Qrb5j$v7LyY_*Y=7RF!aRlW+i%*deN1xCXN9xOK(EPgCcb!`G6 z92fD_YL!&-#9eH9250|gjh2Rvni@98zvrva3qA!scGCzm53pO_b8@z(?{+1uM1}7o z?ckVh;0yt#2?y_A$Hh}C-q;?$*`ETAFhJ}@WLl$T&F}ya`3CT#{?|#F$Xfm^9v)k_ zl~Qrb3iLKRyGvduL?^pFU3`3%bkQcy7uwuTenbF6+R10 z>3dY_1YTNyubj~oV`7Rk)??2jd!>>Fx}-S#Od-eR$|w&xVMnLqYF`jY#71?cbdiJ_ z@pl5J<3?7b{Kxvol%SVvtTU_h!3OVO?`Ykq{ISAG)LSq`NhJh-zg$er>BjZ`TPVqOdYxAoM(X>SRW`om*=L=LkMJ*fd&PTae&%73QPTSa#k!*^`#BlPLn*x_N(jQwGCWuX*ht` z&~>DjkbdCs9a%aNP(&K~K>7ADl^$-|*xvk;bEpvGT&^Z6sD! z#mrople|{*19a0FMgAq_JwPz8?O6TJ=lQ)Bi1$Hn&iPbuoLHbnxU(d&RAlLeWwa_s z9_D9aa`-J#Ow6i{>Xrx+3ENpmIkBAyp_z5jH9_W>@vtR14ma<6`XAWu(=c?ir(|h* zv)E6MD3!Nm7Wp88ZYMh%`q`7daC}6=MSoh0=$Y2aG#6op$2qIU1W+a2cM$*pIWAhd zYStuxL$zaF)YGZ=_f@sw(hu#LH`r1fRqV}GZAEpolesCy1ZlrNW#cD{{50fh@>ol$ zuKU;xqb9F`Ke5BeF(1VEi7zVDQl}bO%If*-8uDpkn!S@JtAe+?(30y9Q*0VyA2%fjF@IzaeauWuQn?DXe|{O%ZXttwb(0`?xnA!` zxmYLV)fQe-t=+>)Eq00l$LlI~@_4TCq`UXjTE`3-JMQFi(CZVJ1$(U7wTw&Aq(>x_ zYE=MjvoAIxR-{9h(lnF2+XE}|BY6k+6~>LW9qaR|hhhi}*SU^U7>vy%Q$Fc->K6NLS zQ9nb4_H^6s*aLxi?b+$D-{W&}y_>6@-Qz^?o{YP>h|_C=)Hd1|@BNJ>zo&wdu}*Qy z9YsAS(A}%kwgNs{lfC!;ETNIt&3POsOt(2{b>f%A`SF~utFPen6$gI zJ0{n_-@nH&&ZK~ObFj3O-k-J+^A>) zkc6Em=<*1&$?KPeNzMq|4`w5J((i?A~h5~Zk zDgppENi^u)lFIz%6>Xo+hbTBP(|4w5^4t(tS69&Wy{x&>O&;3btDHGGgAgn>MN*N0 z+XmvWNNF$6uqA_enq%akU)r?}2B+T~8C8>+gCekD6?lGkaV|Ueb)6^wtox=u z_i-y&hWcQ~FhY^r`ACzXcs35=HF0}qZ|6(IY_IFh#7o>$M$O@*^G%tJ52jI1t?2KI zxSx4?uge$ADvE#tySGyX5pgsY%G>^xUOyR94ve-a^oD9(Q75DPB%Z^+0^3 zT6C*GOM3)A*I!)QOR?)oX{q9Z?wuD?nUrTbt$UPMlEZ15jM>XpE}sq#8t!b>iw$nB zR$q9P<_DEJUp#c&o0qR3f*UpH1s^>z{_>VMmKcD##J?&8{hB^Z3Q zz6lUjhObz@Us)md-c9#kyWK&QI$3|&t4Myz^%oX=S)`5Gwx;wdHW0cB8Gfnd&h!6u zZ4WGgM)li>vafZW&aS?~5kj9!fEnxoS*3sK_vrGOK1woJRtwgiW&?R9JPrcA=OyK* zbGA><+(oSz4Ch`SAvw07iPpVQFq`5DB|UVNEeI|>vZ3ds|CP@;>K%W(YxW|a6!2l< z&61d_=dzxEdFRCo8m{RUF-9YKnc-^*q^9a-Pv3WUjJ78&lfqEZn1>G2gR!D=zS_iU z)8)eego4rgQX2z_PdQhgU&*o@`1)Qoxi`(_;%;B~xddF}Tf3Yl>UtDQ$;fNPVqS?W za#wFz(|vtrRP$J&ZJ%>qMR!?0kK@C#Td;VMf1Vm>D`9j^X#Dr@p*h4H4AU74>pg9~*$sNeyPo zQUX+6s6~r@9aI@cm(>$|+XU|5mS+5utm zVpbZ5=S2~iC)$3k#TDF<+1YQLdY46WKtgFg`LvNAFnt&<3_k>gWg+Z5u3F zB3ApTFf~24xV-y8rXtizw|)=I!@#z|&bc-M9B3!0Sc%oDw%%~}=+HU83o)*EqiBARx&1l6oN&#z1It}sfN`9x#Hzsbxo@>c3uh4Hh+all z?LFa3a7;KoNL#sS>8Cok`|xQQ~srowMc2eBfTy=<{R zRw-3v@0Uff)%i7JQU5S<>z2&xG$F!&h)r`5IK*u?sOorW-jsYPdhzd4o7tCiY<6u- z6Up~I%c@ieRoISJXR=Bzeq7=8d{$p9x*o^MTH{V(Jg-nm&}n(&&kMBeSANyhGD3}{i=c2^Eh0aDI~AuEa*yM| zl)W~zlnMTHhMfsH*=+w&+HTJ^6I#R{+IYQ^PHenEzFE#u}i9Q3n_mFmic^u zQ-9o3>V@*@BRmi1Hr zU71{vb?IakoSLzCH_Ie^F_*TM^<{r{+5_hu3~=BhvL+*xjBt!+bD&QxXL*+Emm zkLLAyEB;i6VdjZO=ds2tx@^Op2@v}fb!a)dfywX}%jdG1+iEle+d57X5Iet(s7=K| z*Z)hM9uRoGz%81p=k{l-pnwyn5>eJmNmt29?z@|G1OozK=)m#;7)GxvttlX1Lffsn zsJYm|_H>OknsmrB)L2gC6}xywav2{%k>l+I=H_Rya*@AO#VGH zV)rS(Hzx!5)iCmKlrAPVcYd?)nb?SP>n&oSm(Fom^i~iy`@qnuD@S0U0qc~3XpJZj z>tcd&{(HjUlSaI3t27wSDUla9u9k*f)ROs=@jGux;WzB^{3s--lk9D|X#yuM?gD(# z#o^+&PdS>qRaXaUIQb^Zr;Oq?lz3({U!omT@JC-evtA#ry?ouN;YvAz{O&Wq9CElwi}>E!rz5P6a{yLy@MR0?uAOptI^DTeF+qKr@q*z6D1e zEkB|jMHmhbht0WoCmsZoak)kw5xX!gl<*2I;7zo7w!KB}%&E`uo3Uza1Vb)7I{_I~ zcdl-?X`i#SY6uZyOSv$SKPhMdo?m9p9r(oh+PqWHNkk3`H&QT-MvB$YU_EgXrMfk= zj^S6VMvkC92GtKn<@Fsk4MlZAzxpSL&E+#VKG=a_ng%SP`p2?_>xUwNlqwx0PYGq6 z;T-bls~XuR_&jFzHACO6kpR>@i##dYmQ@7Dp>L))0gA5M1a!MPQ)x{y3p7PE(u75} z4-URJjZB=AjyM1;&kQ|2yGm#2eG+nxN3KY#sD@&Eu(7`z#L!gxQ;k6Hn}hLBjgm!| z*d@*uVGc~luPQxy7x&S;Oz#%Fs(O}%{+`}(M#^2dyIvy(M!}3;*ix$dWfTrxA{3vc zo?oh~S*4lv0jdZj){PA2i<3azWRv=123Wni_DR(Y5=^URo*MdPLGD*agAn##)VJnS z{Ig7Ev_jpC>0Co5;Sm@}p-+OV`ogLR-Nh@cf79DIta>Ug3i>6UZx*jD$N?qHvZ1lI zYc48EnSxh+_=z?jh9}@Ren{YD%S|KUXeZ@f&i<-c-@Xg1scU5Xoj8e<{=w3@wPo{f zZy zkK3q*@b?NOvCuWzx{{oC7wn^g;^N}?AM*9~jr5($HvoSQ*rb|7c|Pn}nD6FbkY)|T zLQoWB!(zXm=0Z&WH)y*Hms{m)tcQ&7u zCz8|(Zo40(eZAd##&<8he51+-{tRf0Z;oxtxKSQCwCR6{U9#7`TR{W+xM&NR@w<;% z1bv}n)lGRCpH6WLMI0bRKgD_H@daDhS`kj_bXq{ z_z?7f{4NJGjsku5=LeCvml)o{Ip@n*h(E>kB$A4>T_{)GJ^mcJJnHg7fbV%-l^Ge| zB#`Cuw{}4fdaH(^fv^T%NY(1n>gpTRr3%^#jsoaz7jgzBAEw}Od3m$lpE8e-Pa5o` z`B4&$^;eUw_&ilzo7xxSzfIL}kz3r8$X8tZoSn2q6vghvK0$7WSzixfJN+nZbhEP_ z!!Ogbs;||(#ID0J%@z7Xunk0u4VPq z?Fky7A~PE+Io5&wq4bwREu_V*?MZQ`!q5JLNBDhzP^6y*xb@WDePEF zwOBnLT{(f|s$sGy=KTrw$y^oT=Wl(Qu?wXUd~QNs67jsL;nT!I-d$PQ+biCNt=V@` z1@Dqm(?t+CIBrKMR|;J6IlsSe|q2$_WFj6nB^(8g(dz@Y@S=a@v+qL|?LxI7-i9m7ZBfj^PZ0)hUU=*n8p#c*49H=X7WgF7ctiMUI8IuBWbP=!FQS`n6Z4>R8i4$*EfQ&IYCTXo%xh6Nl*Kal{32N z%4LltKZgIhz{EIg^bAt8mQuwoosG|OJQdl4b8s2ZZ}$NdT)PM_5Pt3~7T zyIAvWFeQ_I3s@+dm#>aqNq9anc)f#~cRap@%O0(M-J78N}h2K)St(SD_R3lI9T zRbLIgnoj*V-Lpkf?7eO8KIN@E30E0R2yT5$NKVA7LQ$`I97+gXw0oGhwO;z8@Hv%L z$#_@|1)Fw*O!KnqiLLu)8N2~aU}9imXs-Q+dD8q@e8_oN(dhOjmmlJL-U0R`{{aZk zO{%?KY~qXVxojT9s#<>>)?2Es%fw}CqcRl8xz>!a$d-4T(D6;z>pH9I_ztXsGuqh2 z(s$ildvCa8;K*;bg&J-7?YW3~-1l@cz?Kqtag=N1D~9jK?tH^mommKa`f9gWAJ%$koQzw?RPd0e!aqWnO+xO}S!2%0K0JC1l z)U}q!d^1|r*GkXr(43g>)6G~px=*QmenM(5*U5M5?5lAzb*Izdd+Gag7yzn&U8Scz z$li2bR)dq1MhLvAuYtr&>ZE7k)I2t3!ld|*_JhM2pfm(nT)_!jZQ}-p^CSlTE}h?b zASKPmk0IWt&Qk*BQCtCP;=d?bE_)v*r4ok}na8l~cilShcN6_3+-?_n7E*XzLQ=_e z(k;ty6BGbsoh->_H;UwehS+bLz9lOth0kS5{)h{`(XwSdh80frep4f5zA!NK9o=cA z7noU_o!tQ`XC@UQ@E`$d%zt%R9oG>^5Syp`Y23+ro9>2sRy`Im77_z9g#sj_n6ila zC3;mNr`eq)9$!6bB&LuvV|hEwMsqSL-8s7&{7WlZiuS~+5_oK_!X6);yZY%r;gQ()uXlM(Zs~)2r89)M4!OyVRwkVI?WI#v-Lv6 zgwWrk(q#?aIk;gMQJKa^yW}Sr{|4(p)(8a4m-=Mq@1f_scl~)(us}=rPA7Sa4EXh{ zA>M&T5ItOM!|R_j5^Gh*{Qh6sv66PaETOTy0=`FoIvqXhLfEXn+v7>YoB@_KYksXC z1`wkD=?!Mhr!tZ%xp3Ugt+(SNqpgeJ>8YXMR}$_uuYtO%kA{5o?HuzIwz zmW~t2CV2wD@06_E6nt}YPz}_n0D3tdIkaDtA>(!IxuT@O*T{YCp=?_nJE|}>G8(NK ztSkqP(=(TsWk`c*X*U^*m=D~svi~f9&rEu^Ut5m!aonla6CBXqZKxe)VY}&!N1@~v z(bCmf-rbfr%!KlO06%$WXb1(t*1%Wh$>r)}u|;y;Ui;D5(9}7%U7aTvXTr9!ubQLi zA43p?LM^|4vxxLsoh$#Pb&eFi|G8z15iCb9ZpT*uw1ecd^j1 zOvjVBqyrP)lo|Vg6|7}HG8qva*<_*Q&xJ!f170`uZxpc_OZpNi&BA_XY~=3RVyPDM zDFKlJ9cY~^EHG6LGEpFhaYJh8Z$7p5d@=(6Mzc0Fs4eiBdOIqPGpS)Gbr)Lu%T{s@rNu2mIFkr)d%uqNszJ$^KafeK%n$H;fa{vl2Ex zkJ84#AHQhFBAyHleZPKg4}S=K90z*+9iof%$_ROj;&?Hd3O%x~C{ClfNwd_3K?bnX ztKd^f-0T7KGu-|WhiwgpGf1;NPXRyrPC`-x0J}d01wXEc5r1Gbm?(^-e6eWGRuj%&1*)fbA zqV?xX?EjdVum#zI;_CLc1zQG#fi(Z~pN{|DQE;iU;-` z%z5=w1noZu0n={z%+{@_{Bsx)?f$RC>#Bb^LI>t8h*w^N|F@s8qn$}d2^W5QnbwB- zf416v7N^Uoualw(DMxo7uGk;S>kG#f-pG6(`x#YVz(BTa%3m#6_8k2YF#4H?~l~P_KbiLDo z?;YE0ncx+g9g_6L^m!*?OMrHM?sVMoM~BmP47t#Tzyb!Kp5N~xIkKd9bZV}J za(%(ai&lL6>(&jhy_B72jPuWoOXqb<&6}Do@41)ZH}u|&egdz97po&WE)y(yr7d@u z!kwoc{^l*^u6Y(#Tm4Y^OeqHo=}Jw(EBph3e>xeyq)mkOPt{}jHQZV}_B}Yur9`<0 zQGT3pFWN2fbC$11-m*2K$QL5_d_>ruxkhiLIBWFMJgnXsAy}S1|YDI zt0_1+mCsf$4m**Y8l#$LIlvMRN+red=&9ki6;cp>9>voqVnR0m`>zBdmWhwz>CW9H)AYC6F1@efu2n@FOX&lD5lp>aeJh2kJj9bHM~nV7^+ApQF~90#0p(J* zt8v6Y;ZTKrv_4g?%`EPpIgjsGPYck=-R0e6VkK+2w7^DDi`&Dow!quB$^RT-d2H_@@1Y7KZ5*r=N?P}xUF>jFViHMA`S~9{UpU4H z@I9Z`ql+hL566(cUi`#3HxP&#z zX}1ug$J;yfIDSiBRweMB4lnVSAqqUex!GOo%+pD4!acXc&r8(W-ySNXZ0lQNbyM}A zZ%X#TC*nn(IB}TJNT{0#a39~||8g6zYkQ{b=VaD-`4D2lzaOwMv}eFpqob$oaLmS< zuB}go41=S+njvI3B5-bJ3PedrZ7SV&hfT05(eK4O!^A!CwlHnXc_a7SpH&YV`G>+a z0fL`zzrmhJd9OA;6UB(YyXG{XAxHh4iJrGG*ZKPix-n{qib~QheKg%)Wsc+Yr4q!D zZxkwGgD9GKADIGv^+8eR!}VEy%6!c+mcO;6Qgn%eSKvDx@b?VLpU}$@>H0N$pALz95o+Lum^KqLd{o|rsoXniOZK^u&6_v zVr~UJK#Tz&anpbEEW~+AmK!w6Yx*0KDy52pxEbZA-&t2&Tw2W2P)|M;2dMj`0wTi^|Sp~o|cf&);) zDr{8o`1k9XnId2kHY!-?Qo?+$aMqPE)d<`_F1^|$p zs}CyT!hPQvM}>m38KD<%CV+>E1Rr1=Cz~)JfY!qe!2XpWm!AZGe!iFGEQch4;=n40 zLyh=@DFT*Bgh>WK6vvZ_SA&^yKXGoO1NafB^zmrrEbkeH((ZfLQjJNN1{7ugd+(tgtKxc)+js3N-bDI7O~)0~*m> zk?msHf@-h!#&UjLVP*G?wz_$(%ERIk#1aW+#hNDV}qP(t)raig5x2$l}Rm(f5yL@CvQ z&SZHl!-p#nang;=>uRhK*lSCck0?K34}3FslPLXO5^R_;sZFW@~EKQySQXu zv}jhJB$`_=ZUzY_0dNdJ4+*{rubDo7UR>(mSf7Ud7(%M=s@P6^j}5$ml*TqdgrPnn zgdwW9Ab8zb+-*>$#-HJ2qQWi~0f_h$SPh0ovF^?iDj+Py1q&()(8OLBNl z-V(*rV=CpJ%#kD(Jq{7UE-!cc`5tJ$>-?wLiQX<{+vk@%3ZXt?xXF%-dD64{9a~!l z3{2tcB5+Q`T{c#&_HEHhrt-qN3#7eBJ_UqZECcn1bR3sCmeiC1 z*N(cP9;b5;huI(KUe5#RQhZ!}J!y806Ce}S*J z-{q)`iM2^hjzE|1Q@kHU@Ry zr`nGT6dQJO%_9V#hBL+@K$76I=-lYWXL=&E+n!oj;WJ^m=*wZIL~=61#V4s1O02Bz z<1uv^EW1^(lkN5d)5}>6;d$4z|FLw~sUn7=mEF%h#RWBV*r(gkmB9VD>z(%V7U$CtZ8`n(Isu0T!vZl^P>_y%50T zud0)sa? zM;NP=*5f{X2IxIxRuN+KZtLN25@g zcD4nrdKbtoo!@2XPK2_LgI6nJJLcKSg$rR9TQ5%M{(^d}=-*XlU%(%LLaw)846f=Q>opi%9|wW-gYGf~mL!61 zM>d|i{mh>OB5zp^)W1&{q3+@A_U=Dz0bgw%p<{H_ z-xSdqB~iOMt1EhaJ2+@&;W^%$(tGXMGvsi4-lY_No~UkX(b8rJ|0I<2vRN^ElY8&s z`J2ztO+)BzU@<;jKB6DaerUHh5E+X?xbrI&LD&T=*s&{sQ2(J2@Z$%zhH=);1-g0> zQIeK)efs6x(TamQQBk|~()5caMAoRXL=>M~#J|uTx`xli_*Y^&9)Yc!mwiEa9O##C z_dF1g*BoxM9sDNOs5*PG)@C%}rbStZGHt!b^Dg`aM%p0Fr?BZXXDhkryZ3h@MLRP_ zCIN~QslWMsi;9Dj3qz0R7)qOn(@-#1)l{LNjrdm2LrY5&OlaWl%1By)A+G~CR8;HB zWs^nKXkx3fG8*%c4s19ye|dC(#u zBZ+a4f6QK$VA`*@zAB8a>GA4|^b{3M-2M&=<5pA`cQX*_Gj=%$%7{?T63Ij-$ToN7 z12-4mXv>VPrW!VR-DE`2L_*f;Ooy#i)N#WR6W)^f*e-44?9I*27(=EK@tIzS$*qMV z-Xka@BP(@>y@gqYMhl+aOc|DT9?4U7`-U*m?uDE^T|^EypOEM;>9FRNBU+ogR(9St zFN^YXJsY>gLI`c_o@PZC{|y}UyMaB<{*9?GR8IcG zQvb%3rvhA5Fc*rZ34l|5>?nh9;&sP>GNU*ML5-i@oNImgi_CgniS&2P+bCMg>*sjq z;|(Ei>CAd}ei6r$nH-zZ-(f@e$?~?elaUFV`M->+BUA7-dBs(2ZKzhrqJi%w-r!hi zd@gQ^5~c|?P0%mIC{}~hM5Q)GCzg3578XTqijxTQDt#3U*9fP6ANGxths9N`)@1T& zuk*>sb~lgit;?x@*W8=$Js8qJAH)qV*$Z|x>i22Rq1F{$YowHeKVgzr_Yu<6$1jc zB8am!2Y>6BJWq5lscQp^ULcxdC4?Lvw^8br}Vc z7$GMPsQm(%7#Lq^gA(4kDIx7Te>EH749yG+;S zZOGVO`VE}rVkbkH(qP16ionvk<8w)@=qgA9m>~@?5$+Fpl$lec-34J_lq2FKvFNYm zb;XUw#Bef8{URP0BsHI)SB>>KQfae2&VX%18l3jo z?i#mWMEq}3jXs9a?96Wd?MrT9_B#hJrF>;BC`t_M1;o;?#%+ZKB_xa$avdOu0WC6e zB}RNkpd*^UIATUL!fDg+z9&eGa0(ZRlYD_!LHf3n=s809w!#!y=>+Wjl~f9-sVw&~ zaa3QL$@~k|`}cEm-Iw*3V{;}@Iq-{!oP~jl*ZhuaAT0>g;&V>kbzl3JB$S5k-F~*PyA!wJu&3nnm@HF{);hKU|7lUGd#szGf!2wPZ#1fJI0|gz zOK2T__r_3>X+L|NZx*jmp#P1epb>@SwPmFJ^GJCnu)(bvOf~hU1=w;(ww>M>0&}$T zY3BfZmENnSIAbPwGLi1wf|!X+0ccwGf9}r@b4n;iH_-i$(qHdp6H2i(HFvY-7gEZM zXWK`z@F_bW{WWKg1Ao)My+w45*AN&N*e3?w^Gvm++*0>{rf{QrFUyl$)Z+73+o-L$ zzI5TqZTvqsyoZOg_zsEwJN*q`eEsj+2?2|uBc)|&igM*+JZfgr)ae{UT*4RuHov|Y zv_7AG^I1ikc0DCYyDCGf@T7fHp$$Zy@ZdrQ?^G)}Bz7m3r3xRff;z;N z^oH^m$2RJRE4VwZ>UUArX|$SsLCgWlS}28$#a40fDS%>ls)ui=NK?bH(8HHp7xyw2 zcR#x})PO)NpQqR7dn1Y!E}!&M*T6&7vb$ceZDf{ms0qhT7S~3PJ=lXcF?x_ykVUA? za=7=*C~Ez&m#K{T`RrA(I8^@k$a#>UV|i7x?#I`^z10O>!|l$_mouF`U+&_)Uk+n# z^IkSw1SfSg6_2a<{EiyH=lhn|D^0zn{w{-{>%n&03ss|9TwheW+spbg47~wyN~eD#;>;Y;^99LR($@G%e#L z%njF`&#}OFH^Z@trE9*qF{8iJfq1sv4_xjg%{D7_mgAUlvZyMWrUu3ky|`MIE&i?6d(^^;@QGNhFV zFcyIKLF)4(C*3XZaoT7ji+DKV@r(Ta5&k&1r&T;9l2D#5Hg)h8pNAEM1NZszDU+b4 z9eUrL3%xLR_rD7NE1=10na*drIabqU|Bm$DjG$-~_a;IL2D( zWv9cx#T!IEp33GAVIDLhqsjTjyiL?6Tf@sslgeAXMnC8a8WC)#@*F4(PFdL zRCPr-{LHL4x|wtJnJ2DQL2C*i_%K(Kv)1nFpPCVL;aoO_Rb$lp%`Ztl$;{(%BA&BN z1TRui?ng+d5~a_xUXMpGJr~VG#@>d@Fh;|BR?E`Rabh(cd4roe0n?tBGjk*Kl+;4y z=p<0GsaF!F$jy3mN6dAU6>iqmN`+m-pj@bm`g5MKl=bS-WyjF#`Jcp|HE)yAl{+wh z4IjUaCIZspOcTi45KzEFuU3atX?8F1< zM#I(W>rLBsPl6SR9L_d~%MsXsD9@1Q)>nH!``(pa-w}uOCZj+kwD?2}dcyw)E()*WsqQ1{PluwT>%}77x0P>j? z1RIw{q!|%-_H6&&9$@puX7tanwBt-B__Dp?8UfZJ96FM~egr6VJcWgcm37g*nd1P! zAvwgJnP)1ayttsHv7~Wyr=h8-i813c3V3Uwfa04 zGjCrh%g@{&ECX?&3+)!Ril&-6VsG&V1wy`<>B$%@A06fe6$1tX%o_{U^zo{6Kw7XR zsmITy+AlOjC@CDMMr|gi8P>1X1tgkey?fDWpd4B2-8Z*J*iEhxd`uQX5Z|wcIHjQ?6iFjG5)yiAq$ZCt+ z**_}Dhs$7*_(gWIsv1i@zy6T)Cb-=4G1?mt%hgH=-!%H*6PMZ_quI4(vMYr7Q&e9$ zDqWtAB1WMES?YUuId(F%MYh)O;`5E|Uu17nHDe&LqH7(c~f@;{!_)986UQpPdH0^bj1wK(*dh6KNUxP7tix)LFu z&0iUtb8s{^u?R|1QJrn{gsu46zS${?rTkEHEOJs(pTAy7g9iX!!n~ZUUoHIoS6`q1 zY~?%rh)+?JAIuwTuMlF2+=W%ImQo|9%)&>H6L4z|y!SJm)6~L40WI=QWHr?`R8beg zZc{n2LywH$J~^8q5NWlMa7CWlcapEVH_AqWJ!PC)%v{l#uUZR9gZUUd`02B%8hA!3 z;Ymp{$1629j2Gh&KllCrzUa30LGF%wMwMw2yzeNjtZgGC`+`x;8__Fl6nv{ZX5wyM}|g99_`>N1M6>OVx_vz{}84mBYq(4@vyY|HVpA= zeHw`Khqj2Wl<9i&dH)CU0OH0yyq#S2_qhuMV21&~0>cjc@5gc8p<`k~pHq9i5Y9gzb(7- zVQP26xV?skmwe}zV3NQu50}O=VxEPK)C27TbK*_0laDt`C_=6K%0>43 zHtFBkt)7xs`rA|-GahHv()84pLFnO$W+-j#=;9yZX0*oh!~5{#Yx>&<+S`X`YMj+6 zYFG1$Y~iW0J3I*i*Xl|`9sY>o6uln~$-3LO|60@m3xAOM=g^$yjL=`YMAroV$CKn(y0B~TF%(pf-&fDafVmpE`)At21E z#Iq_VLK&ohhLC|2=Nz+~IB19j1V{)7NPx)c(!Xba({Y*P0bVxn?mE7aY(S5)mzE6_ z;H%daBd8v$&??DuQCYvi2_!2%0cemIcxCgm_x;Bsr&wB}Y_hEWiren_;?2d9GL{C0 zOo)7>krh}Cpq3dQKC$%&|NPjYV0ig^*REU1lhDstE|Os`YC3#9*=4q}3Y+})BLL{p z)Y7Mw4S*@9(OxqiYvj^*)~Ez~KmvO%B1X+z%q9SE#mub#%Qs zU`c4{#J#_Sd=xN`MD7$3%xo;L_Y1KmyOp}auw)@`2D@R1P1eqZxTs3fne#* zyhZ0OcCjc4SSk`PfiYw(UXFoaK^!%_fIG4}%i%7-H>OMnaS9?2(?DvO9K?DmlF2XX_?p*<9$WUjn0uNF;0bhcu&a?F`08G!nL1wcbr6i)kA zymD05=RqVgu;`FNhGX$DhMfCN`iiP9=0Tz{x3^j3wmN(kg9Djh%2#%@FFC9YXH|_M za87`vXDrmlU_vq?y*`E0 ztr-abi8wGv=I3xsw*0`+Ph<>ZCJs)aM4huotkkphCG=u5{&ofNT$+qbjX~5 zp)iz0Ukpa9%_Y!~SIp9Zs30;2ynW^s8>g>z}BJsWdy(enVy-cYzg0yQC8p}nA`7%O%d=i)pn zU$z1cub^h2fUe-;=3V*vgj}zJH~|xf3EDMj^WhG0A#bv3Z-z_I0yjn2uQ>GJl*g@U zudCZhsTvlYHxlPZ$< z>gJLPD+uczR48o31jm$Kdjrp8GYpkd0bS0|jOp zxfpNv$ga-WPAxYnuo4Exqy`)bi7REwtL7F~#PVP-?=Umh;F6n}fY3%qq_mj@3X zJa~XV%OL&MeG=^9&tGq@5{j!3O(Or>Z#fQ;@`=ALyD3z06w6-Mi>?PhW3gd9=s)JcxA*lorx zA>!5^wjpmU8ZFYdEnbFV+g&8LGbIj&RT%%f6$YcEE&u@JmZBq@>g>8g;*uHN&` zN5i8>BsC#RT1u0G1$kUvn6kh7|Ajwu@m%q`k1&L(j(+W+>4C0?l5<(v7PH7UtFV7=V)vTnZNR+aUD$Y@}-(wNSD)jGnqY*c40%K_rx`?Hh*?D(YO&>!rsO$wq0{gzPa-tUsovb` z_{Qck?hU7${DsXMh2{W}pcxQ%a&efqQOnu&gbo!69E~wRd8w*lsLowxti(|`79I{R zZ8Q^BLr^aCzQf_<+CkuL2V0 z24G&@Tp5K<4#VUd7ztGX58Rg3BntoFvvoI~QxHg0q`!`*^#!eaPcW_84vs!va7c z7wK4ZKH%XEu5L2fSYd`^%z#@&y0b?125m$0_@3S8{Z zAzUfvb%rg^Fwbpl9F;}K4S96LoW^Osf@>4vu4BV3oeOb0_gw3&4Y7p2bREVv;e_S$ zE%VCV&Fg;0hO3TD)LA9>jKP+v$3IVvo z3Us&O?&87V?Cy32CD_cYa7vWxaZ@@3BI~+Ks3udN`cnN48SL7#jV#?ElPR89IM*(d zcrG@$MR&9e((*kvg%CGGHrTsQ)SgI(12W_qAUa!}8+w`%vmJ>hkvPl&nZeiG_sASR zEXT{p2K4RA1->R3aQJtfu*3h_f{~GG>*tt@J0Nm2E?7~~tc#}10EEV5#$hHLP~4_M z=MF|tGl`?v!NM5G4K$Oo)jRrF1ai|AIL8?x~BeuJ_G&M8;?|DVrIB&1E_)!6rbyb>&~rStjSe80VZZM$U#fX->}NlKARZEWQ_0 z>vgHUuKa~06w5gFg?Bv`YV+jfU9Vq~Y!{>LH_~etud$1fXL6}7hFX3rrglCBsZe-h zsc9NxtWZhwDgYpHjWNmadq9Xx(^LRNh76giW*tHB{{iDPe*IGr7)SsB002ovPDHLk FV1gnfn)?6% literal 290534 zcmV*wKtI2UP)Px#1ZP1_K>z@;j|==^1poj532;bRa{vGmbN~PnbOGLGA9w%&|D{PpK~#8N?41Q* z6j%Dd&-H)aUhl3~xeC;vSg8TUi@RGA;z}SP4oQF*apFRRIB_Qlad&r@O|mw#63_0= z|9dk-aEgY|?k_KIzo+wN-h9u-epXUerLLx~q^zo}qOPo>qO78*qN=K*szL(3>Z+>B z3X00$sRq8v@(@A>Dl4l&5b07zzbIJBi=@B5pU2~o6{f0=PZ0x|0kPh$P8J%?%-+K0 zVbjx^s0P#&+F64oc}Z0m=hz9gm>^%LGjdT^4YFgd6f{&uM5VM0}a|WtZz{to5?ez@w z_V&`!Gw@t8p&&>K3k#vb63Pbds<5)2;-u>SiP1R9`CQ0k5{-$ztN!`rX*JV~NP|#Q zQ)0Y}m>Sj459SHm+`Mc;T^&UdiD(){o}MOuo(i#8#OL$BUwu67szbb)e_K_e`6)Rq z_0uTeNqCxL-JO3@$@kPHuRfNrJ0nQbG6p31J!0R? zZp#1B+*x4}d7V$DVPdrRPqzPPYa9Lsw4NH5Hvy-eZy21i7n&}DyFAooo ziHQj+_&Fj0?GcM5B9R2i@K1=vVz2=az-Njq7DSUEe=^|dkw6ZRE840AWlnA4M*vk} zAkY=&<>|HfKy+4CmPb&oa!5accN3B-_iGM&4g9{eD5$vZvxJ07{6u8?I0&c4oO8Nu zowAEY2+*y)=b{LL@8cCYO%MgO^+bLND=O5+(Nj!J5t3=UHAgEYL?uQieVT!6)zU9lQ2VuJ_nvRQ zSh8x34VBN+5qr%;oME`mBsC}pS`lbQ`Uz19WG-{`;L$Ih=Fm}elH6Ni&|_CsRo%F8 zgNpP#ncz(FI^eX&#LzZ!iOF%&cWiVLss{vth}SRS_K}_<32M!r0njb>I2@`$1Pl2g&c{q zTgD`46+tN2rxKzGd(TjiD+VfvBKy`bJqvqx6q_KRNi3Rv$|ezz{o6miwKu6ATOD^r zKhAK&7r*?Km{S4%|69Hl%KzUpX@0ufph-NnQpO?F;WvNy3$*zxn2qZ-4y@D$Y}LZ-q@xPF7Y{78Ddv!OxTNNm>9z zXiw%KGED#9D(B}z^4`~667{(j~IYxx$@Y%YnpBN8l5Qx zP2y6MlF^O=Vyfu0h0*5+FT8d*@TU94h4bG2c>*5QBz__v zJ6s++CMlFRvG``sxeqtmK$9r5W7UxZd#J=uL{`8R&?)C?!PUs}TFEpap4?}hNQlO) zZEPX5XP_j+%ii1l%1o1}u~8v<@adbxjf>5=qn(F09noET)_KQHj1ko=S^b!7vts)WX#i)t1gNY`{oc?m73$}(=d}f+N*{!NRoloB+Zu-); zbF}lgqA4_quG_ajlh`}T%4ivl9hfTcIU|H2kfck(y$MZXbY63i;^t5{3yA#fd*8MX zjnG*#b-8G`Lb^0b3`EMm-77q|!31WpnBtM1893v8%#5w`D zeKz|L4NOU7hr}~iG~@XqjC%zUo-?iHL!`D!P(8T|zw#Dq-XOfoCX%a&<@d$^LG!2z z1IZ+&M<^8DlSXQu!hG%_h6-EkDOuzxS>i5Q>>*j~^)zSyqbh7_Y6{%t<>geclxJa@ zykazk3>qd<{q}PnCBnq{lfALIxw$ZL{@rW3Frea27A#l4c6^i4k-uz#i8H&*i_!Wt z>o?RWF>9O%FJ)6>U3!$LvL0knfB8QTT_%J>Go!>cyLBw`pMI1$*qCgteP!Lb)IhVH z$MqcDi<#6~VzP@4JI$KMp6cwXwxMA*pUULvaIkQI zQ6es!Fu#b_1SI3_EF!D1BFjBI$*6_#j7#0OD~y^r!=NJ~BI3m?O}zpHxjxg)0WTB| z$z2t8pks!(aP(k-Y2j2%BJnPV#zYjWi&OjII7Pl)* zOG^vGIk~XO&&PQHhGRoGkBeg*F3uNVd>%xASUfHYlroD94i4T`VdLDU z`do*KNK2QUyE!e_pi1ic1S1&N%~%J+1*Z==T)Ng;HG~aggCl%wl+(@R3U+R>Id9{! z(Y2n=QpyV;Iy#!mMe1>Hg@M-aa1I+|gHB;wCJu2hoQs2nGl*%VR6M=_sUI!?2?tes z0HBu-gbuzBI(XKhH-8^=@SK4z7RkL8Ms{pmHiyIJu-I()odI0PjV#KWwCQZ_h75iH zbnt!9!Lts%`TL-Q=L~eQNbapL=$hKvyW85kNc&FH<#ROv>X6A~v6x`9nJi?}*+`i! z?yoQ|ICdPqD1hl6%<-ntawRY^P1xBxc9eI3;<30;ajf2+Vh$T=A)S+yS>fIa121rB z$ZM1Z7%2aCRY!)m*@B%$dS}4X&e2V4pJ{uUS4FDJNi}&UGtBwwb!mmo9yl7XKe)mk z2vivA#_og6>=l6S!JipAyE~u*o*6p3`+y*UKmY?hkRMQCLZOh1_G1Hw(eCpwbar=e zPlTs7bawZHLb1_NR4+fF3VYQV9UTSxp%v!$qr=nF)63I?{sR#i5Rm0X{@#fP@}WXO zB*P&(!i&!C4yb@K!6J7%IZX3$_7HzKC%SJ)N8L^H_4T}g zmYE7;aFfCtg_T{naVBo062Qj8l06)3*X-u;273DPo%|DP;=E7G8XIR+pHVY0^US_* z{McoMlhFOA+UT%Hg}r>PfmL+#B$3v~Kfd6c#zLh_C-w~u4V^t|sr%v9Fx~akR%V6A ztFRvvd>&fJh7lLolz=>MX)>H)ls^*Ccnkv24=JKZr03JO8PAI!sIY+Zr;cn`Toz#f z^88kkMn-fqgbo9>!&*O)!Tu*$XFz;CSg%g7X7r9JET^Ac0 z?7A$w>BMh8EQs|vx^YQa2+|~rVrG61w`CxQGdyrr{U{5IKeA_w*~*<~C=zvGW@ z$$fXyOGo?Al3go4T>Luh`_ zjmWs{&{#-yH89k&gvH;MPJ2~;NkcCL<<;fE zz@fb=0mHiF-rQVyGc&nrD9+E($;fE}+??$B+}75T8xXC(Ef8#Iwxt6&1k|Xld_lt;ns5cLL9n{G9yairie(3|5yFgWcNMS6fip-_;HS zG1g!o9CRoI3>M&6_YCvFSyx!5wn@FUqBbu#zoeuDj!r`dqoaobnLsEUxR&bH&fdYY zy7sQVp}gGsk_x)ey}f;%3=H-V!!tv7rf$5=!+DexSn6 z9J&a0O)NTh0LTvP;ej5?DP{I~RE61A;=2!D)LpQ(D$Py6Ed@^)){kaiZpgS&+`)%X zl!27l<@pRcq|6%93VX$PK!uHukHe%gCpQOV0Uzd)s81B2iKLX549?>-7=uhElaSn7 zVZ7{|?5)Ph*r>oVxV9$8^^ATbdoVB5>|D^z#-XMns!L0DG|^wQgUm|GY(Q1mFq0_~ zi|*C1^t=MTfa3tO7YB#_uJYt8G(Lo>71#;o17%I+`S3T`Rm_XRV92E$tBoAQw(i61Anc!-`gBtx;-w;loZj@`6Gbi#b6Auh6j_XhVRiZJSR8brFrz?aXaQ%8ZpM^u~AQE zXke)K`S$vB=lt%9%N5wMedo7AT`6bi8wbAsPc7{|hNjDQ z9RBi%w%Ik=-+h_lc@E~w=MJvdHJ~d@ZP}jI5)T}!vd-h2*rX3WZKa-BRoQr3$W6bC zJUknGSgmQiX1~~)T64b)*|&F@DC?^JZFSByD+oII-z{LDOK*v8;^nuXHT#5WbVr!_ z8jZ7S_kj?Smc{P~D~WWh@6UHAXM)eZ|EwQsuh!eYY}?Q+Fyyax((cUrn{m9mlTpd;i%9L@4-9i*MqJ&) zx2r-cu5GNevJf+uLnpCX*91F5nAE$K@eIta!{kTdnC01p+p5#up&#LLBa_>3BmY9! zmbdI7yv+?F8!p+^oaF{SjPeU$KLWDC7)<7HRAJA3gO0o$HjeRmaB8F5McI7mUD+=m zO2dW*8Npd?_f(i5H#6(EZ@m|8VN{uHo7~i2(VK^1Xt563F_<{pMOW*@RoSQXe0e(3 zzogb(7A^Ij*=Nkku`2MPTcqQM^j3WGW^QCG25DO+)!(k9)Yg(}y=bIYj45So$p zp#jja*S9#!uTcP><|4OPi{pxaT9NI2HY2~H)?Z6S-n^oP0YOTa%-40`6{hF^!oe|{i8#8ieY4@!Iqu!uWh|( zWe3T(y!#E=i>=VXqj{3VX$nR@f`XT@|LHqQc{0 zRE0^In@B6{RpRyqOlgI^68u1gt^4NVoiYb_yws{Rw@)@ItXcH#5I)?QNMF~vpSpOb zxSY5*{`|(;ulKH7_#YmVvkcKfT z$T&{`pWE6!#8a4etgsJHY3FqoL{)Wl547hWIAx6<)p=|b|Ad}cxs#aY2VdM#+@;0B z>Mj_%m|x9E}`XQT4G_cwm9c2yUP=aPekxL%?XJc9OgulL@2A1dsB|9kK4_vUk%jO?1;CCk5s z`g@`Zll${uu9+O_i`3`zG~{-%p@^~B=$^a#2|j)C!~eYn!ltu9U0q#Dn-|pks$f{x z_uqaFo9rzJhft`nRZHfrnEwHlq&VL1$5~-g<|YrQF!G8sc2wr{h)@Xa2+|F{All(9 zmEaLn)fFXFci=-m@c8o&a`^CJN=WTME#Y3{+xH&bLquNtT~9Ip1bA?TK{dgF_$nfa z&1R_2-;MLxLB|zie(2`kt3|Z%>_pn2$-}bM+i|=b!?25LIx5Rmwr_K?me(HOB&uHU zp`vAV^H`NmE;(H$o+*^ikDiBA7>?oSmZ@7cgr5JE-ZeERxLsk<(b4M4$|`EA%2010 zsHmu_D8oMq2#QLo>ZG8msG@{IRZ$?=>dH!_h(JEbQ_72CYHA9q4b|2OB{e_$GksYe zrmkt++H}@9=W13NSuLu0ZOzra)j|2iR-x_IIu|nn9m+$j)KpKg`8)-ggQk9AVL93H z-aZ7;?-P5&(^7weH*6P@1-XZ2w^XP2QCpJo?A)#`&>1BaO?5S8H8mAY6%BP&C8TRe zUDQ-n)j;8t(LZ>i8dOnL17FHVO-&6v6_pj0RTYsBsbOj=N}B4*s>;ghYO3mLpqEme zdk)aGm7bms6$ZqRAb}PiO57X+ibU-KK$Y<6ptGBkh(w~oRt)JDNRJ5&MgZFJLktZK z(b5ZsDixp4r`$HXoql($?1uysqPEs3=*3K4Fn;Y7J->2p%XtjkakiuHAxT_p7G57JfEZr9wCJN zq=R1!6C*K^p+OTv#eq6Ddp`JhY%GZm5Q%(b)nrJbO?BnhD1eWj?E2HPa&oeA`X^<4 zEH6%11yV5|231>zhK5vaMdWopnQn)nhMsI*TCRWrer!`FKVSNnu> z!Bt%Z(K=4>s{L~Pot(BT*8tqIAx=Lb8l9AM7DRyzXK@`aniSQLsh=J_TXedw-LjW* zdR*2*hgi()1os$LOVrno;*lMAS(&Ep0&21A*3=w|6q|nuP$_5-BVi=6BCqf+3Cyw z{O3RaCGbb(t06H37Z!n&7|NQSPD81m98R_)bf=VD<|-4RWlf}LG))s>Ijs?0Bj~HH z1aZyIkSMZ0dbP*IAQW0cJ3VHqu@i=pR$!vU?_9SzenwRt}| z?y9Zv@o}mp)H$X8k3an5vyVPlu*}TD*{{lT@85s_cR^)1F`W#Z4NCWfFf;9N7*`O} zExAdN7qkPI#9uV9+qh)U5&2!ZJ`k;bLJTcoQ?e@@1j!gy!kiLLKWozhE#Vle zYsspulr#34o@8oFFx6MrKazr@5!SPCS8e(E`6nm8koF2TQXSDSH9~({d}@krb0(gq z>R%MYbG;$FySAL2uXuXi@m1O92i@Sok9ZoaDUld0Gl9=ss;#-tgIhv5)iWQy_Tll} z8)W3YG|xM>M4tcPA0Kq2UV)a7YPFt}!3?W0vc{79y~7PHY%Lvy87Eq&iJbN!6MMfq zTSDy=4%HG~)H6m2o{ILOgkuU0auzq^F6f`wzH(gHeel2`zxGMRWBVbrEjPkKR#X19 ztwER198=IdeE6_+MEP;^8z+~2OeKF7>f@c)I(5?yg1C|BD47~$j56|jxWSz;pL{0n zsx1!>&+zaF(*OC>Rx?0LFO{TL3LiVayKAfl=B)+>Uh9KigBE3y4 z8!e7&n9dv{q8jeX;fYLg8_~g)tPLa*n#9^6Vy9$LS-%MU6PqPLsggTmK40_ARa&@N zL44tZ4zzB9;>Ii)$Dy`FPVY^ix#BSGrrDOu!6Eb>Nr zc3*_YG7qh-u(0sFynNDM%5wl6TJmxYWl;Y`1w1Wx)z-+!NL3ZOcKp^sXN85w25Y0) zEY3$8PL2z4`2|PAPH%_VamQ1w6V8kYH!SIebB*k2D(@zw`*&3bd=5EkcQ1>vp}E# zC-MM+1o?o?MlW%HAXKXRp@Z*(4xV-B&EE$dJZGSbMRI3L$jdJ%ZENpoYwsdW_l#+6 z@51>4CX3BvvROIL# zv^~JngA9kT+rb{5bar<@2R$=%cDJA^f&!Y!N7a_9;%=oyC&E1*{K=VN&O;hm4*D`Q z`U)9mc*aRloRUgQKM0lf7P(z)9Ub(UtNURv?|OewRw-F{yqYdvKl(T~aPdYL*cgVI zo7CtyXjf_iFEuwagIY&~g3-eVk8C=2iY?$Nzp<5r^P%+d&hZ#e2(i*Shxs^@J2Z$3 zMrD4p9z$Oie>pFD`GMLJaMPf++>R)$vu|4_GK?+6&$OIZ>zUSsHkQ3 zfv3#xUROSFQ0q#X!h7f=X@FHy-_6U15BpT6Ht;QTP~j@PRDEg&soFZST}Q(@_0YdR z_tVwnaJY?(#`^wzw>sXneAp2@x`}7(k=$45S;j7B4#ee$UgqK1aC9+lrAbPU;?DCn zn|77nv<)-S;Elw!rT8b+_hm=>@+Ky$Dyjl<`f;xC&mXLC*OHqMj$7?eXv)d$ZqH8Z z7aY0Zim@v7bX;WrxLQluB-{3woO`8#_4Px4d&k}0k}UOX@Zj2NXuPcrKQ?ZSyQmd2 za^(yM57Lj1gF!=NG6E9Ff8>N9pF7*eW^_0;5p?jGSvwd znXN@GE!g$qfukFjR3+P8mfdvXw;w_T6J3p3F6+>-T`Vkq-KuY~zNV&R^e#khhfhGM zu(^A9=l9>)>0eU%^GfjiSjNr0o^P$Be01$6r#5K&sjRPw)We6mp$){auCG_DjcMlV zYPj!u{hby2v|j1=5dI*XN7U96aCbKYTs`>-ExiE#^*;JgU90}J+|9|}fy5%TeK$KJO9~dvo>QKk~U^>*VOf8mxo(H$3zN7^}T&0NT6L z3YWnrt}zYAyXF40nm617PEX&!+{!ixEovT)@^?+oOZShzl_(DcCT-hM#=9!@Sv z=zGQBti0js>~syBRo!S@Ll?!tLG?;h&j2$c|0Zn9AvCA53(pLW?!s`NNFNAIOO6jn zs|(3$&Pa%ad>+W7Y7359LwQ4cQ$38YhSuUr^Bq&f1dP z;^N}=>U=0iZf-8LQ2Eszr3JZpMdi75{rP$M9X;sNku?qIP@-O+ieh&D6v%097YBows%c#(SVQy7v5p2D!vF^klRzfHomXhjL*kW;gkG+Y8 z-u&&u13loZuBwJZ#Ab6q&d)1=Fi>qLg?{VgFTTEFX#_*T>MTFIfE2l(f2E_O?w(OYW+>$a^6=Uk z8RcN(L%qf0qZ5UF92j_W$C|9ItqT&9Y%in11;_&}=wlkuc31I!=|z^=V5YY2Z3#z4 z$6{}E!6ev2>nv93&gG(;)P4{gtD>ccb7r40C1~zKHzGci@=)si{H+WDOvos|J6Zpq z^|bWl?09!0E!{$6tp+W@zE^wG(k(Q<)ubhuhSvDg(%oQ;C|Y_n_pSQ?f+!_gdL(3R zVFV#bDrvv7w(yZrfq!8?pU1b~cZ|ahmDe>j4$TW~=j)qBaJiAfp>~+%&D`$EXehu+ zT|rfwTLTf*nxE)_7}ORq|CXuVA44 zT23$eewf-0q{SJ9tqPR$VNkUNsuh#hboVG@baWIS;q!2)FjA{9J|?{t_a!rU4yuPjo_@M2L$mrEd>op?fo1dRW%kCAJvG1 zZhiQXwvnYvRohTSY7j)}DEH=bN~kN1hc86c1)S2+aohRtF9VE}E!OVC*+byZrN)kRhW3dvfBoLt+UC=LE|d9Ur}dsyLtP>68ND?% zHKFxAI-W28L$s3NpTdxw*+Ip3c*4C?pw6QL5cu3y9%tBFcURXSzF@a?2d4u)eD@4I@Jc^`VVIyX9E8Rm z4CCSju|BT*kJ{|~z6$3VM|bD;^+QRxy^Rpz+`{z=TP;nTQe=L++|~3bnfle^-aFK0 zYAe}Et2^C_(^*p5UwHVncRqRRJ?w|x!4*&|gxZ42hhtRJ!PL7}``&x+SGdW6GtcfI z9qIA-Y}v})r(L&Q(EDornh)Op;PcNH4Ls!2^Ei8`$m!_o|9<`fyo_`B^kom{WBU?grH#O)MpO4-q3Bu#tQ7GjFa#wAYlvP26 zsjF)!oIYKW?svt;RYh4zT|+}zRrQR8kNu^S%1Wvlnp(;#3QEeV>Z+=$DoSe9hyDQ- zrCiqVc@^c#-YP9sO%)9VB^50?MAg9bjGCH~yoS2Eva$*Q4kdLpWfkSbvMd#OWi=Ib z4OJBd6*Wy2c~w> zi%Z#wVcyn;un8weXE65m_B#3|sv2i}98NXk@)cPkLk1W?Z0MDOE#YZflo_q`16`67FPbvV)f93`0XhU_(1$ob{V53MhF*Q9c7Kx_CV2P%uP;?QPIlwdt z7Z*%TO%D_#2B#KCL=sfA=}8m@dxHu(g?`X}LdjojxqEwiY3T(Z8SQj-cBUQoF*Vl5 z@2Q!IK$V2@3D0e#Jb}8*bV`6j0YPxwDCY}BAP|5}+)ZI&A*Ef>#l2we)h<(;B(UA8 zt6PU~yK8|{jMT#F>WR@fDs=8ZX_shXq@bU0ku_4=t*-s`Ztb@f;(ac3*A`DriFU0x zu601`)OIUBbv=WlI>clsG078&CpFH7PKygBi8y?c70)3Ij6*G>D&xBeVtN8jRnj2P z2~I*eXPN2gDIp(+=Amy=;%0K@?5X5*yM4xQEgr41Z%ecvW2g5_64T7<&23EtF##>d z3oYdf)vk$=7_fWt!i?>%9-4Q!y1GVf*~v5)GjADmLXM3kwdZ+(a48@Q?3t4I$f|+u zQBfPwCNfvpbX9(9bq^nWOm?gTdx}|_SCuZAN}3k3qpPY}t!bcdPEDc$IGC3dOfN=M zJ1MNZP=+#k24=KNS63J8kdTl&wJSKQ4a{xr8hfP}92}$sv<8hn!Gd19iXIl^3;E~* z5PC8fZ1nmMoGaj>_eWAMi6kE_sL`JPFLLp^PXULiuhPvoUA zFgOUMK^KN`0V)`jiVMGdj0gLO%1*u<69RDbR$3lTCwl?FIZaD1o4HdG0K+h_QHOO0 zGuq{w+5qOZc0pKH7HT0r-4(`UGOu5c1fRUZb}|*wmF7B5eZ}`7lqX-KrP(DTJW(Pd zbWa&W6W)-U7=Fbhw`ugknUgp{h$jb{%To*;t`S(ht!F7QRM8}w_H#GyWlz9>@r;=r z4_bX;hn}%HA*?%h*$9S_%-U>omsm?6B1$?ISCQEiXsXLFNU3kK`mGi6UK_UVQ%tPF;v0_5@zTKww?YZuzA%n z&?S@JbCL2;a|HzjUVpLq^@gO&Co?)E?54b{Dd?k_6cPzm*oG65F4{epn9(lEd6#wt z1OzY`jHSnJw6(Pr6cm7uM^LV9QkU{?SDjj{9ACIH{CCq?=?hOPA5+j!t7xr&H`D!E<|m}6wxc}P6MS;J!3QhMIZ?6YeYznpf1S` z;_TA%&pWq^5RFz5L|}3M3WFdHj|-}`!?KVN@d;>v*pozSFEKf8V(Hu-2z!A_52y6S zGvOd;{%O7a&UJ&5!AcBmadtr8CZ8q-2qM(xg2m~0CZDhnk5!a z<`M)S)NPWP-h+~S|L@bR+O&jAhJ>U_FqJD7iy2!X$X{~n50n8pME@JjpjL2F zLBKT8-@+wyeBDG%&fpBK?`hymtmE5nqU*P_P3PS_O1oZFpbU z!HGg7;wds7fC3>Aq#z}TNBNORXs1LnecN-^k%-7*lOol1A?Jh2BS8`8ZeR4{hSsWE zJW9J#Qc|G7`*?fU(9lp^TpaksB-N48h}vM?M>pJA-nO(fyZE^ViA9okmd*pYvnuD( z>Af)(LyB8gq1If~KG|O?qhUj|8M!@!eYf9sIgYPaSah(Fp>(K(BK7m1`fW4FFpASsd_ z&{0i|p1X|3iU?BQrp2NlC$r@;-lW%qao(W~Hube`R<7sROgl68$h1B3#TQ>NTW%b6 zF1{xJWpFJqR2E|zkVgjtVrEM9u!yLqopXstX;;v-pn-vbMaMJS+uNy+`QJG*jJ{|h zo*W$EkGBiy)@Qr$%eRX<_C7HnjG-DU+!K zL`8xRI5%i|78jp5oYhMuw0!!}`$7$k6W0(MeGazrkaSQAm#r8{;R&n|bx_;z>qvdrkki z=;e+K(b?5ZC>uMMI~{_lzPH9|E$>nl^V@9)H8Rw)G!?gdi$tQh);?-v7)mypFP9(N z$Pf*R9yDH(B4ze@ly=3$#DYD4ThQR(U`k3V$ljr7Z38HA*pEH(B#yK=Lrb%ZwdsY) z@zJ0C`S&1~rYY-g_%fgf|MtEAV}X0Bo>LpYY>yf@FJNtO9x>5hhEE$G+|e|I21dX6 z&2PYlsXP)SUH|^yC*UNSW0q-!|Lsq||IP3J0VSCBBC$TQ|@vS9Slql1r-buBGh}&H6Ep1At51seSM2hWOa0OXXylU#K3+{DD3WNxKc|ntyLbI_ zcV~9+JtIS{GoI1LM{kb|wf4fuaJ2l&NOuM`GHkEAKE*E`Y4)BN=_%`~Z{bh9^pRn5 z8=pim=2)zhkz1O8}KJkU#x46Pc4bc~nBk8fm%Dg^zI z3umO0^e30n(DaIQp-LltsTZP3k@6yVly*f%qASR2l%g37Mp{}L$k2D8SOk$`y7dtw z!=bLBR5wf7F^j;SSQ?&}h$jE``Tv14KQc&LX|rou_mMA`b%Pu0!rP0!-=aPo;rF#& zNM})SIVQ0WRM$7HjCxY{;x&yWEo{Z5(b;e~x5 z|M~BmG-V%EN0A1bm`pUFez{DK3y)}pFcL3(^08*Or-HI)x&EF7(WOIlFxhvxr?$R& zBg3$;@ZR3uB{JEaot@d)+2C{M$S~>h8IiD^J6QnfXGVr=SDMJa^&K@bbUA*6z^Z0@ z&G4$Nr1u7!Q#0BVHzl5Ob&49{6T@PmTNYm3I}sln0&}djTTZ#IUqOh*stK`uQrBLy z1V{*t#aZthK8Fe8_{ruLZpY2?tVDAI^Tg9~Fjk~8pBWjZ8SM~AShKHP9{V?d{+F{m zdiaE84(s%)T?Tt)uV~A;Y}+j6WMGUa6iL|J%_FW9bN$*U6JRjhg$78DavQ*I%?^jL zU!Oqum1>myYg=JtsBy{yh2CWCdF`9VR5aX@xpe))&B4>(Y&x~_REqUELNq)!)ipNS z2th9kTg_mwEqASWcbOebH;mlxm~`D587dsxCt(JQCr5Kx{nW@%FX!bq4L`P#p%f`| zhkLcFysY9*?V23rPja?3CN83!87-ryK3hfI3w#$7JZL{&IdFhELo zQn`Hkuy;y>((wa~Ny#*;t*1D4m+YAa?+aT_Uad~?YnmobojjOY!-TXeHy_}R!dz|m z;MVU%ME(BVXx`tG;ILys64 z?%KIad@B@2h85hqVoIjQ0?YER<~4&1BSZU3ew62#oB}9g}2;m=H};bLZ?$M8bv4;8zIo3@bTt`H zSwrueg5Ewt)G}UL#cfH-i14=1J{NHO1gIQD0A@yp1vb0KiJ{rou4tvTGb2NT1kSM~ z$4n0&xU6#6dFOY;U^G24oNDUeN_-kH7#Sw@VsW)-WN5T+4cP5@*I{JXEu2`clR%9O z)zwVEA4Z19{`P4_j0?!h*4GVU1`aJeM2`$5UBaolN#4tx)xgNm_@s%)w*7xS91?bJ zJ@}YgU8RCZRqAVEPafR%_DGLEHq6WKXSd?xmr`5Kg;fh*_B|*+(0APlgD;U9shJCA zV4MKcPnto}9+)5o#)yGQf-#AL7^DGz2KZ0B@KbkyPk_0fM`_p9tgDt6;#_lZGlOf! zK2=M+i1L21VS)sNIcqYzknLTL3VFVUa497`b49LYgzQ!E$^ha(G?Cm!XjBoEgM?lI z@{DdG%u~b=Ik$28U?37)YKf&@L>(>ySvi@=?-AQo5qV9>S;3GLH&14cp-t>fAQS>` zZ+CV~(KNCXn#5&&BK0V%dFpK6e8r44C_Qly*g=m!DI1cS#&Hl)s`MR0p|4l4q??B$2_9 z=;jeiuMyu}MKwBij7An+s-@SFGoc6-51hfV#MeHANfGkQ93)alkO10sElXTpkK*j` z6$O_N>&R4Jc@sCegnl7$tqKL5_LG1Ugt&%jutB?y6r!U!``QJYUVfFRY$U=8bTEH{b8;%z$>iRq#6Bqxc4xTY-|c0JCk zQ>m$`mlaooQ*FP_Mm1;6KP>~fCDCE_S2a#;I2B1gBz`B2E%!c_t8?BiIqL4)5vS2U z&OqG>wdXbTC{5Jq&2#xaLqJ;)#O57 zoq_7eF$qdPb2a(fz2{f{ai!+c<2T(eM(FHhl=#f@)#RLO9t69%VIXm$&K{hHZ8L{C z{Ei+*KqGolL4c#_z`(%Sb!XMy+(WGy8u?@@*~UXqW$)mXpd@Zf<3NAnbXQL zYTM-!T!?Oo+@T*hSn7Lv-aAQGE>iay@?A&an;GuHoFCaQN(XN~T8St~niy;GDV zUDU2yMwe~dR+n8}w$WwVwr#tr%eHOXwr%bF{ z#lmG@Qh;`C0JhTO!g&Y_-T+}8pLz!vr=Fh*Mhl!QG!r=j0Unki^D3-ZY~0L&s<;bN ztvx+Qhl&8yd+=sVdpWB6n;i{_XBD25pe?7@bX_c;eggzuKqfBC$E`VW|59fziv^xK zy%9_|uR|MWf8@YkdvT-D`no8V4FKikD~smlpbr88U;I^;um#X$%ExCFQ_PCUR{w=AG8 zHr}_`S$c>^SRCrhf5n-sRBv4veR@P5G+S%#ERV3mP+>eT@yd4;Nu+-S1qDs6q9QC+ z&&?^&hvci78I1P6B4%kv!9a);O!wQvL!LO;qyEa-9Xj}H6*bXk$0yk@ST@JauD~c6 zobZ=(a!(#PYs3p#9$pUQ|9`5F`t3NkzNIeyAbq&dPC*Qa_kW+kAv}6FAf{SvaDWL; z9>5M8rGW1GPO9g?q+1E0hC1o^p`FO zBmxqIC3>g<_sw#PBAtanCo-ls_qSA8aThRc&ZY;`8wzgAe{ZY09ZrJ2cbZI0DTnSv zeS4djltgB!T_~Yr%WLLKinv>hq!M8<&^@I&JCos2a;PyZw__3}uAWw^Wy&2zpQnKN z1Xw28Rp-DL_Y!wYz`DT8YvI?0!0p`~*6G=3nOPS$@&f-NAJ68zVpc|)iXe5Wa)&O^ zsT8W?7!Ujlsr%XSpEeS@7_0Yy1q4eBFn*-z>TN(@!p+>kkA?O8x1&XmgD&U-cz{X#DQ{u-CbRuAo>x_QZ)h2siAI* zASl{>!gv&nM$0FqmiYiGh<<(4EtI za&oe$l;Sb9mjkd4VXxr+fe`*QK%kiW$w=rcBEeQmiwg<8ua6iT3+)bqdlGZYcs&Xx z*Nbxh#*-Ckf^_=f7e_$q-zk3(b${|8XbwgK0tN90XfFUsn=`rg2)t-$)%Z{6} z=K?v~mnaO63<9f>_MW2_32|pu!368%*3|sD3SA&!Vg&lIzu)tLnj|kzB{oe0z(}Di z>j(i?#(v(eMSjwb-;v}>E!-Q+pj*4F@!E^O{Zlx@Wdv$KO#DLF}NstfcR9LHZ_{Ez1ioUA5ZPiFSQ z!9{+#@7Nt&4{smUdlfY$l(4rezNvlmV=kPRRvddo_aUFEg5$l_6kS6pwNZ<<`Y8(T zEusv-Q=M)@+Kn_bE{x=ojv>2O)4_yuNna21n3}>gQcz;VaPH@h;stL-6sw%>0`Fm& zFVHWI@V%UBS(QMQr?0o_YMb4lLQ^A~4HoT#%$P7)BQ(+?Z{pxrIj(H-aPOCO~zDx``@ zAHT@)KCRu|TVX8`CiuM_d@OfB>^&8v2+}Wb?N!7tjm?ePHLHfM2eXmbXo|(^kl_@_ zXC28%S$V!0S%E5f%Ur6fR)k>p5wkNc6ydMe^0LI9MifS^w!{>CoEMMoXR$@gDLacm zb~;`>H)ltFIzEi+tUsFxW%~GJBoc5%tzS?BTMu!bD#5U=D~U$rV{%CBnNrYlH9F8P zAzfVGx!%ufbvxb@SEWF}pE3x(b-r_wLo=}mD#h}Act@#fHhgv(_D|PBK zb2U?HQB}RiajrFLElei_;9(+d8QPz(hQ0YRDEQM~@XatkgI=9R7^Yg)T>4NTW zEe-fRT&1*Hzfbh4m)DDC4jKnBnrObYHkiSgt*GEdZ{x%$ zljrH6GjAML8E9@k<1NmaupQHXzDlvDgyz7O2KqaxsdC8KY^mj*4u4;4#mZIkJ3r4x zG~HBRMX_o&URsXk+u5BKqEw@w@x~=5sliVxS*no}S5!B`XGOCmC;gBBp|ywR>_IlW zw47a;6&H5^M;8=peg0KtEXEQ`yn-ys26jqNyu2@m7%xe@QxE(DJS_CWup_RbkG4wp z#Fq4MW_ER2SWHn;^#F`VkUExEJOXhHo&*F(oJcb|&5)nP))E8>5|1VAq^`N{NtH`b z)LtE&a&1`JlbNCm%hKe_@7x3+N`iR0T($rO6+DG7nEOu6!Gl|fgbh2;hKqKXW^CIy z{`RA^;BZk1^72f8Tu{R_w6fDc3bJDQ7XjzvEO(z%X=(0BvI+sogJW1BO^xTVL#>8H z+vQ9*&)Zr&YKbF=jk%?$UqgeVa5I7k{TUTFT@%%biI8u4>QpZR&N>pg-VB=@>8 zYhIzBp@zC`eMZ)L*%U;{G-etYx^L5^4qwB{XkT$-9m0)mN@61S+jUN+55^Z;(<_|5 ztn73g^}-Kwj7k&iErThG6Yf>PM#h7uybZesXua*t_^(>OYTBpv9<61@VQkvt+q&sV zo2(M-MQHET<#(lT(Pg&~G_iUl+?1W-8!165dA1NeMPoin2 zpivC+Ebzq^mbIn<9?wwhY{~VT%*a?dAFV5kh#etoE?uJ*4TWOys$=mlB**$Ue38=JWi3Qs^G_$VIWW{z z&}g=VDXpQF+_$@o`y?6%9(XC?ZT!c=dGlr%r4*j7BW#gMWIxdrmyV2ZrUX}EOw^7SisGJL_PM|Tn0Y?BUB2X?4>sho6H?C z*(q}l>;}y?Y;(NxI@YD-^{DV(_NfcZFqdn*1{|OsF>RToR}z@ zYYrW394rH5&oF5}ZyjR~K9tTqjbg3aYp-Z>Gm}5y@nab-b_%PdPRK;ZW0Oi&=rt3F zMaPBXEK*Ua7=D$x{E5FWa09u*CLnRir_757SW)ManO$OoI)s;GN3l$1lX^VC%7QiTg%6{)#UVu(q$*_jp z8Jw@HIj88=7eec%7CfD~0H8B)K8py9zGfMr)NsHxS!z@27&N$>y=8nl`w%zBcvRMC zTf>}2Dd6CK)rYN;(Pb+6LXEE+!t42{H%FPP=lI}c@*kb?lS z^8KrB;a@0+4F@d$Tjo%%*ZtYF@6UsU$>cu6qS}}3_L*gL2KSQ_+^1~y&w62S)5)kV z?1je_LCs4s*Oc!`^fGcRs42+6WUQ}U|HEW*q*i4_z%-s}Q@GGj8h=mKqT^Gi>#EhX z_yhmGLz{d8AV~DMU)c^#m07WW6uuEOU^}khZZ9zRo;apQVlV*2%HH4GpOfuGpxllc zA5q|X)|Juq9@c^W0AG%Y@2iQK?scFw5CGryaH98v6=cTk4F0i*mrG|y^YC%A0?E$c z-BO-8azp{msOn~!d08h6J%q=Z^0X7%9j8-&ws3>i(NI0@d4WjE^ZK;GVWE*b^#e2x zQA`chaJ07s$i-kVvc9jo-p0H+r)?m9p20H7U|0zq3`9vd*|s&+4ocpZ&ZqKCG5}6i z6pf+f4?A&pctDTivg%bbgj@GHev;b*Eh0XR) zcZb8Joq#dUG(Mn85`5PTk=ye!Tz&)tsB-{Fyah-G%rqUnuFJxl@5LYb?bCk^u7wHF z-=;XWcHm2A*LBk#H$4yJm%D53w%1K^$x6vEqgLGCTg*GMStD2>!h7zD#|tmpL7IVC z>0MR3hOI^`1U}!P$Fwbb@0Tw-JG1T!E+xT4mn%w+QXP!5^w5Hg>B9D+RnW#!;*%Y2 zv#v)+$MzIrt0*X#(-_jQw;ih}hJ_$j+O((QvB-BpJiwunZWMVsjgRNEy2qkYGtg2n zi?}@Si#lNpcuh5nW@ki$?pky6G{KoX9!gg*NAOqJgdg-`ZYDY+vMYtEY{SE1j`fc2 zUeZ^wIIluP!z1EBBp~-p%6uO2lP2VG-fmp);pRKLskCNkTf&iprhD{}VcV6J~f z5DJtCzVVRH*3QlI?yezpq{5Dr&%*V&BbcG)ppqy0T>pj0q&wZt6$i~mbG}&kf@Ov< zKNFO1DVoZAKE{4qX`Y8q5FEbJ;(0o@y|ER3*dqv<+Q)UK?q;ca{^>3W!fa?rvg1eK z?&O!bUZjU6(uaf7l`6ZRF!Kp=fgTYbsb`5iLZz?zn)u!I6-xUU-DR|d=|-J8;y`D` zd1I@xnX)n2&g9sEQS{sR%FAhKdpKbC^BrWC{$V!4c%(8xl6r3HZ|JhqaDn*gCyn}a zDlE#C%Gc-TCyG>`xcLY0EIlU1o|}`J@xMBx_POiUN?lzR@#Vpd!QV&ATY5}zZ)%@9 zl^$+g&Gg->#a6~87w6p1?;}S!Fd{AKLLt|0Y$a1V>mL(e%$htpS-lMa%ck514Rmzh zrHQIw(1Z46nmV*RonJRs3)^)I4D6wjt74}fX2)=E`Pq{35hs4F6#N%11rnj`Xg2vKVNxnQbnm8Q% zl?FL)Gz9gS7VV{bdT@y~zh-K@gC4VJo;*$Vbab?-ZEC7}p0jPX=c{nGDQ(+0}O`t&5T%(TwjaX?u!q9}oZLiut6a@7oD1gZ`F=Vk?i{{>d zDN;K=H!aJ<&*e`Ixm5hUNbhJIa?y*0MEreL{QrBh{r}9o|IeFR4PRgVod`4 zegw1Bh=^bA>6jJO7OhHvQd9hWpr6ZDcLr@dECPa5lT<{~$pG)VC@(K`KcLv!ckJJC zRKmR4Sxqi~W^Zoo%z|Hq(ZRaH})3;b6y@E%+!zb^ipi#pJ@$NoW9jRX&4DG`wKI&iLVb^1TH-)G69x9pKizLD;7R(n?oD(!KO*6(yx0gQYa z(LDZS&dqO~THj>t6)lf=C{zQoh{%#TdMd>t9(cv81mYu6`xV~%mPRRBbbif_)d@9xkx_{DH={5f8@$4PE_prN8@I! z=`IJrn}FlowT!(=pW6DGsS|tmQQ19u+?B1BG}L?*l*Suu-}NcK&B0e4w4(Q|ljW`y z@TnVYyUs?>7-lLaHrgHaYy%-v$HL04-3ut70_6Zu+dpWKBD`IDngeZ5tV%yWza*D! z^N&m~`URSNuY=;we?ZQ#7v=r#YFRqfMvSf6)ipOu{o~}TYe3?U8suHps=?sFjHt1r zmN(Q<%Z$RgS6XdW$tk|ofUYGG&CX%v$wwVA75^wgr@hR&D{quQm5T2>|Jrs4&d*CK zf;j_~;z$aD*Y4m)N!E?9svecw;<4yJ>R8XRySIi5@3Daz<4VBa-BoKY;qrE(!C>V@W4!DpbOrJnaQ7#R zY4T8*7AZ4s*9u~pxHr`Dy;YiBFe<8n5xt=&^RAUZ6m~n?x6_gZJR8{0vR1}GoW|{iRO3TZEpd}D~2fZsOswk-` z0<2;?j%2v8{Ij*WagbFW(cT^rk-%&vDG2?jp&^QOuM)VJVmcFGGQYa9 zq1J>(2Cf5!la+2hwqDZ6&D`1d+SBZ@#6Oq&gO1Y@BUR+vQl>hHCOMT*mc{Ad7 zAamxgj}F=KoWG81Cc1aaE-~@IT-Wq2(e8qUTW{l~js?onqQY05CtTha5Aes>YH}79 z;^}8(9=};rNtd6U9ud7#^Q1dw<)vz7JM-bE20|;d6J?_5*EKTMPsgcB%R{x9dhl_p z%Uq_%KFhnq0Scz_n5M3_fAM2yO4!)gDf-2=z$h(g6Btnd6Nho3$yo>$l?G6{MA{{6 zMQ;IkSEgbfK$PM36PjCR+YD@!5>(I?)gYl?ZE*T~n{;Q~S<^o_-qOJ1Bq5~!W+dj( zrlr?uqhC27(R2)lCio&^3K}Q`hoZNoUqMAy?TFrVS{b`LN}^w!eq;B;Nck{@C8?D{LN$AWi8s5qWwDAqAv zGoC;qOvc(1aEBwEYXzFX!_dDdr2u$-{3EI$EGn#kHS7fNsQ48zYn^|FhCLV$aV-0H zRv8*@Zgvv-t1nAZ1Ir4ok!t?H1&lQ{5ICQibIuOQAOVHRn9SIDwLK%D9$ET{P+11a z#KxkQjWXnS#(LSQ_B`Nr4g#STzK-LX5K;xR_f4kg?x`w98G zpfwx(jdMxQ%q-Le4e>JD!h`#sHM`*xU@!%vVgNZ`RrKawl_wcJNl6Fx02rx(r)!Q+ zm;&Ul^VLb^M2w9tWMpJ>H79PeQ9Hm_PultoYk-tdnBbq50NfM6_gS9-hZ2@<3K$Fo z81VY9qy%98S6VTQI%_{=rY5uol-AK`X;F|Z>5edTl-7Xbx@Bqt*izK0k#Xb=wua_^`mx`1qJ+tC|$`xw=Jb_QLi&dkM2mJlYIxPNBO zsczKm2vn!OIk(2fMCadi_Xvj^IV_628gEWXmSq3Sijw_40FSgc^wCG5)9mWr(NUrd zA3!}TENot!?W3xME6GZBWc{Heh;V^dW-B1#9i=LdO3-7CU9LXe*JX4yUuk7TFGg{i z7**GqxWK7-yrF`3=u|bb_{#EZHVvJxcAQX?3Y)9FHW${JYFveJP_x13ZLC08v~qY1 zJ03e5tG?pqfPt>tHa7+hJcLFfBAO2~7i?5>Na`}xwlAB*f)irRqpm@)fIeZc9t9Qm z$8CraAwIhdI=0FZt*hKa?4F^gS>x^Sab-yk7dOG2lhq3|Yv+33 z8%X5T2>wl`EU+YHv=!*DI*iH_j^881$kJ-MjlB7nR?K{_3px}Za}7+~sVgQX#xs{! zUXh_kyTP`KumH>iI*7E$;Lxwa#BqMW17`EM;Ll2 zFQYw{xcq{da^QsARzs4BwZwOkthy2B%}^IA@dBOWj$({1+PewB-Ug1eQ6qqb#aoNHlhLv{RIIItrp zNa{&Bvp?I{$Ae0cCKGh%@QX98(HaHZ2=VbqoH#dg)w`AKj0_grWMab1>$AEuXp$Xb zp`mTKF>VomWs#M@`m(c*VPzQqibD$ttj}uM3*wWLyCs;jE+_bf$iNBu3V;{h9S)Lm z{v8B=6I8HGby;q_SoSaAK=4)*H-&V|1BpqzxkipfR!Ruhk2gx#X2^p6_{~P>_lk^3 zGmq5;q}%AiizLT;6Vd)xT8eZ!RoUzeD{ZbC>w2-;FUo|mrOEO#Ibh5vU`jla~N-O9ULszF=!EMth0eFUon6 z#tDulVAv`hfVDg#tUkb$1s@;(g*3CHmr|10AB*qtj|6HUjELDcG@_tT4Lop*8TOk5 z!1+jssyA5o7>bznV;4pS=~qbQs6Un_6ww2D%bkM&Hy9aVWS~nVYY{7)H&&Zv(Svcy zUCA^_W8{6CR7ZV-V{0dq&V^N)3I{7|FKS!_7^U{F!s5_4@PVo|NSsPU>8RALFglS; z+Z!uR<9{@#)9r`X&?I~}`{b6^Bw2*0Q`17FJxWl5wKA2J0aB#uIk4>5e2H6`_s8!`Q zP_a-zISVgv^s+3{AWnDbra2&q$ZCC13brOk|E`=P4jEtDN}kO(eqG(b=e^qlRtmEl z`+|T454`x8uwyM#h%z&D-6E7bqAlHh%m=o1#;Hs5yq~d@cWHpGX++`0n$~P^GMs>0 z2@LJd4am;8431cD(kBswoyzP18h3w<%vOE`_{=ji6Fon&IgVTXy!3pd*biSq2m_&k z1v3O_v=m96IWGLsjeMrIULessWUUv{W-!+yfRg{{=Pg_jeF(e5eu{s$3}p?V$L9;r z-|{u@)%B|)n3H84kyiUnr_&yFUn2kc^lQPW`P<%7js&agmc4<&NY#c@OJ)j!g-^KaRQx4@zMjeGub~6c)=zRw>tM)Eg zi9&=dFG8UzkdBxy$iOg2ibjE!Si5RbrfQ#oeqH$JyB`VZ56U3+7Z?GJAx8~u0Y@Mv z9T_8E#Ukm*06O;h#G9egf$#uWyyAvogEYgAC(3EAk;P|1G5Fje3%Ds|;}Lo!lYutP zD#E=XVvvf4YnU$(Ha9ZcA$f>pTcyqjz2&z#ufsHQt-HgkxZTEmO&9&W?Rqx1R;(m7|e03J#8B$qo1 z&lTGzpsU}GeCLv@G8?~>{+6=NM*D_zylcQQ$TwHTti{ZN!+FO$O2 z_aPGL6{oQTIzlcC1v@IeAAZr(f|$zH=?#jq{B}ckZ*-A~hTSRF(bv~^cXy|wqXRHR zX4K3l@nOSrrO-@$XaV)|(ntkoNuBiLz=p)|o~Zw{jDV!+^-H0`+>Iph3BICa=cS@R z4gda0JCLx|BhOP)zF~?+nSD^~^-~qdHGO5pKIr?4Fx8iXvNNMpOhy$uQrJ{cG5Ab> z<$)$hLF7zdkp4>(+HY)>&bQIeU&JW>0vL)J8!P)VFHVF!4_86}S(D4n92PXh zY9g-q-#Fi@vr3!c z>F9{Zz+u$9R_1pYJhkZQO<1GDQh2w0(u9M-Pze!mYqcpt45gu&RUyUJeBAp1z0;R> zlrU^<~T2>C0TtJATy?r}k@I7N_(NEW1zt{U(Z;q3H z_c{U>ZQ}oY$Jj;q(+i*U^NsPrqrDL}fqxCYLDx0nQ4CCU768q}32ww7(ym2r>7>|MSMM`AiA+vQK$j#U@F0hbGOf^k#kCm9pWZkG*8lXgznw!45@TnPTmrto}{+QXIoxQZk46Ep3xl~`hiL6OJD+$*p(90-jvb*9U(EMlb3$EK#vQ+62=S)}N>f9&g6T@a$k zz+`5}<)VMJH&l~%Xb0Seu_F=TX5^rgEyf18z0=Zgn;XvJnw$!^-so zP0}(F6hzCRG^f8V^~#3{Q&FF)kcHUtUH|T|41u~EELEp9VbA-3wLFj)-ZiWiLrl+d zu#E$qJ}s00+w(mItsO~A4pa)#Ki{$p`O24<`G$MU$hXV-`kJ%M(=nYgyb5S2Wg7tP z$gX7g{Xwc)-ud*^+=CZdse7HFpE#nhYFP>si;Lc9BkcY>_{fPT2C_b6BelY3V0fK^ zRM8Qj$r9DXDF-=29J@>(FX5ExQe0G2R8q3CvZB|4?li-Ex(T-BCk~B#nKMzAj0X7W zq!FW`5={UxbmvyzeW3zYRRSpVF}pEe?b~qz0|P@tLjx?9ly7mxX^An`=E_;;nLM`S zn0Xhj`UMn-1z&~}iAB;ve5n+3VC4Sk0AiW;cG_^URhsM3$w_3;nKJ3_$^@MG8BuG~ zLcbO9F*`=T$j(RP#Slu6Q9*ap6UNWWiNEAYjq8Me0UooBJ7il7wo{iH%CM z{(Edsr3kbs1|@V8rEli7=gRnB6Yx2F`x|7~%n2@oG*>vgS%LS4rxMEl8L+lL1@OuiK26VTpH>RVoOf44~@CVxbVF-KpsZ0;=` zUKnko-vm^*x#VL2x4!C-K%pmg&eYbGpjmAQr3|%X47wTGTM={8RO_&B=zn*xJqPqP zKg3t@;?X7RyiR89nQ>9~h&U+maAi!KbF6d=M7dV{*aMJM09u>&Xppw%+ij;HQ#r7% zvg487wf$o)QG2K~{FylJXYTISW=3#Hf08x&e5o4!=YG@we*knq zXaiM~3?0Ena*cy8GKgS_bLhrM7bXaW!#GFAoGqDSrX`IsYc-7c-TBheg)yU#1#A?@ zk4=vd)#?r!T4)*JFoMA(ClkoG+A&X{1cx%xVwlEESd%B@EfHze$Npz zW@@r*`m8<_#8>FJ&3$ulSbc4%j-DS?W2vsK+3!gW7GO zHN#Z6D-`cTb|uRYK!42XmiFFg9b89MNXWq0xHvcWho;U1O5PHC_AIJ!L$}Nmss!xd zz}fi}neo-XJz7>Kf-G?m>PdjvnLjDXQ=?NNHKhoE#s1T&!C#bt{Tt5#qdBo8#Wd5l?-MJgHpi13nA zQIEStOhtO=BQcurJck;wRN5o7-Lb}siV7GE=`7b7Yg^ly$;lvh476}Wx#=Basfib0 zLy0FcH+jhERDL_W`lo^>X?BwXLQUNQe}GK&y{5<})5 z;TQF1V~=L%qv(7cFR1-7ch8#M%lG01{8$rt+s+4t8aIpWPWOd_{uw?Yj>1X1`&6?j z`JYy{Bd>6tbQk{=r)Svmj2&8P>I@AQo@UE0I0W9W-S#TW*t1sDZ1u)D-S4!^;h9)` z-iSY82ca(%tyuWYQ%=?-E;d|7cq+bDH+7<+I%S)BoCd@$R`2qELvt%cb!tJ~7EQ6_ zVq-fxz!8qQB%-B1}zu^);O~ z^6X5e>=;Kdz#7Y$Vp0!4F{0^_1IUwmd?0fgewBd5*xAX~U*_`FoVL0<-Kh2%(V2z$ zjwIFBrOSu}2dh2j%*2?e6a02Kq%>Pe&UVP=@J2;Tj!IyJd2o#DTWZ%&Ug?(8M`>?b|x+?sfKxnaDXVlL2F!;FKGLiW&2&}DXDC$<+ zs6%9{D=NdfWC=}HhGl(UBzl9GnaLoB>el}Ar+uogvi0lM(&r^ zz>(dL>=T_FqcURvwFtK9cHJ^npGyB!UGsikfh9wxtq-w(-^on+X=8@FsL%jBN_HA?+dsO%=5S!S&VX#N6pb^0$h0;X+p5TE>9qHE`b z5daF~K?x}g*;aITxRZ}1F%6`CA}GA#x zUPvBsp99<&$*=9W8}x)VQ9AMA0tgRf&!uHYTn*oPZ#lks$+L|cg^~x?|x3P z06NT;&UYbL2qx8|X$^t23bV&9fkZ?0)$u3AP@*{ieNn{ErC6>mV-i#=;~|rZXLc2^ z?0R&Q6zVQ@GjRe3X|jk4TEn&Ht#eu0QYXaSgeugHqhat8k-jxpr&wZ`BZ%X};MZ!pzj={UIeX zx!&m^2>7j}(>$gbU?;j)D-0QWvL!nqfRyIdpFr+qsD0=V0!odkjYoZSEnV z=AXovCYC_w=cFLtPr@iEJ$!9pe>5AFEMl9qhN1;>vp1Nm=1B7&(_-(jMloJ8WRtWO zWB;_k^O&N^hQ}dhv)RSHU38w8V`e&*+|^NAOx?ET9Js$|!_-_lOQ8m$a^x<_7pbyI zem((=U(NIgYTLt7#6UAS%WG^S&d71`vNgplUlTtkQW-e5Yh|YBnHZbe<|u(E8i=m% z-&of2;kVboKcZ*9R2i@opq+E`#mu7Lsot2z(vpMO=ds>{iIJ0cDpNMBiyCHRm84X@ zTF>tIdkVci-PCl0`qEhpPTNiD9z2+@$|F8@L>>~h6K24o^#Hogd}xgZExx5MT0_Nz z)qZDdlDr(i^g2slyi<8e{n)ivJwo;3)3*NfwN7(_HUn9#itJ2e=O%uEQ(kb{$)2QrQcB+aW>ZL_rqSRlRNp zq8ETAX8xEhrpf&!z4v52C#FR{)Rm_L;zQ?Fz&3DpOwPWiF>%~-xJasrtgbdg+GXM< z`VrA1tZj#TUj5$)#tdnU0Ea#cM|e+#db50w=QCaJ~G*YTyin+c@-T z{#QZ8xzv|NGi<8RfC#wb+~#_M(`y=RI)@ov#W$iy@SxZrEjB-r1}hzZ!aU!X;c)o* zeC(!bIft{6H8)=r`e|lZJ?8k8S?Yo7V+(SYQ3B!eXPfd7=c?#!*xmNsSF#yjk;~#U zQf=NxpoYQb_+ut}Is1V0L7+#akwA-JbCPCu2VwYaAz#5TXO93+PZ{{WU6xHJ!j^PO zbomVG`=S!ji=AEv|Kr#CEOJkbU{J@gnqW+rM`)B1&n}`a`OCG~8`y-(oLp3{ROeWY zW^zWfeb6O6U0be{L!qF z51!y7Dg`-RcEjd&xJzC!b30E-^bN6BLR*QxD9%>b`yeTwSIdXr$rKcsQ1@tQ^GfHs zI}ZA}9HE8NCrLO>#3>bqy&h8|X$Krm8F6ty5^a#{cv(YH{n2M|sE#Fdz$p>8s}sVv zC(Pmr?1BQUM)S+JNOou|aTgS#{x>4wJv9bHmzYsBNv;OF0~0dmdY+Cv(r!?Q-@V$5 z$n%h9fj^ahiqKPg(E8evPXh1VAWfA{c{uWe{M|4jsc=UdaWW?&rS7H3HD?)*1{jjA z)aGSe&K+GLNmjF)K63yVe<;X~T`(!^gt%Z$8lDdb+wDzH3isTy4s z-QPt}H&5qp%^k(OO;`kE*kSWVW;zT+Bg}MdlFPo=@M417VFP=PeEXl)xL**a8;Z6< z!)l~B0gaYxG6pJy_Xw7R$`fRhdsJ)$#7&@YelB=j5!mqZq;}W$9a~C*>wDK@lT7Pe znIzg!-^@gDTB1lh?GD-#|=49jmc9690 zjPToBk%Wz5=hOu0H&>7iIr6j#N;{$HT)ixLerj}-4ZA&iD5uo>PU2@9j?TPvB=juy zGv244i?Ok>in6kcvokn^E=mva%~ITbA*9Y2@l79)Fz*l7pY}P&(;^CQ6iDRjw(~aw z_xf&_f!gr9vCI0Da;f$JW^D5}V5eB=Fvzo;i79H0YHYyF+q~f%HT^1! z(*Jz?c~~SRq?*&j=h3~ynMX-Q^+xVE$wF0|%CP#L0zy<4aVttdHR;T{v>u{+iF=ct z=gK!Vd>C;9_Xt#Pt>|PA1#a8<=`#bvqYigyQVl!6f-zj=zVDpti%)np72M)X_776@X5Zni6bkXa zg*vk$-n$R*Sa|N2brd135$Nb?VxH#0Aec9jyUUFQps;`(E>eZ(eU8!4`-eAkQ*)P7 z8-Ig}^3p_(GNjJM+x572Jdn>J6RS=vFfcF~`LUqp{Cod7A8CbsUz=D-cIoKBxjd3j zbfI}o|Cnz8iuaMyt#6Hkyse9R8x7f>BG(Ht$uC&9PHf8*3hnU@dx)e|FM4B$)3M^e|87;C0q74C&ND;IX9i+nUX7np}RJf&Y_&h+6;A zWqCNAS!#A=u&!>>UUljA)-I!J&F;4cuIGa4`GMS)#?!#GXx7hJk(XnyjMnzB_ez9< zec!EsoCiOk2S(Wx8>FJUUeV~Dr7v}pE;qGd%pVi_BI6K@#~uaz}TUqrzm4}C_gnyY_gMxx?erAU2Vw8G z2~T5|n(a!>VuaMsu&EXDvN7?c+MRjMRtJ3puNFR}4&WJH2y_@gXx@ho$JuAGV|<$f_N>}6=1Q1ON4XKE5%OSl8Zk*Gq>E%w%~9ti5}e#x<85^RV|Q^ zp}N-}u-@?bFIeQTtVzp_aL*?DhALH6cJ*`le*L!WC?W?K+}2Z%bjs}Rlwa>3&+WUk zwk%@8FzrYd)0@ys8!O_LY5+U0R>3k55D;P#5)@?QqKE2S)U~p^il(`es3IP|Sy21y zUHmHt=NGZ{qwDKwgE~S?E3>n*QY-dMT_WqZTQ)p zn5hu_`J@qq2oVADSVm@CETmt-Ag?D6eSsqwP_H2PxeR%%2_q+h%zjC82){6H6|irC zP6Zw#eGua|py=Wc%>2k2z~kBi2$t!3Nw)R0RAm$BEk&c^(^|H#nO=Q(6y z$ql6fCzUs$`7-runE6amGO;tJqRgF>zPC;1E7cVb6@IY=0Y)S7jF!E+%F--zJ?4RN z+K9N2j*Di19x1{?HNeK*aku4XtHhgW`Dyc(vD@=Pmo7FaZoJ#kL9N+p zgKSq{4b^yQs)p><&E5_;&>j?n*`jwKjl_w6<5SxugpSa+g^(L)lLa0U<_OGqZ8HId+hJel7%q)*AfxD@q z#&$QwB|54%3@B6=;lSV(Ds`eiKd?_Qqzy%C6y+~&nr!qfQv;j~t+0sIzi$6o?gy;k|XY7RN zxc`G4{Jo#=EDkOeUTB~b92IVFpfCKeknAjL*botlup+&Hn4rDgVYL1v1+eig>HlRU zeYA>qJQMtO4|U0>89iKLhR5((8wC#;GHH<5!yl#GjRgvq8vd7W7{^D69tx`E?lrpj ze;)&`7OCa`03D~pWO_a)E*`%2s3DZR3LRIR+kCiBA_Au|DMC~MAz5Xo&u0KXWqsHNbzJ($A(MJ_X>v^VQCe~wF!Fm5ko9_0Dt;Hh72ACtMLf|T zkcMw(!`cWqgCoYm51*)^HDPvxBgn!55X!tk+m*O5VMc9uV?eC4Nn5Nm z9@ZzQh_9=Z497b*>+c0~7*1qrJ7xyk#?Xk5JmK6 znDHc9r?RC((a7LrtOre_pH!55aUM!GJo2YWYFy5ryUFtJ?(!2oa~NbHcM*LaBORBj z>awVnLB-_S=5W0juzu!ZlR>Jkoxaj{?Q2m+%u+P_3OhADu*HDEKmV%tu5*AY(QHGT zn?U*8WB>Gd36k|CXN3cv$9FqPnf|}CU<$BlECy(3-c53HNCRywS5W@@ZqwWAtDk&! z?m1328t$$Z=0#?FPJC*Lp1k%SaA3tN528Gn7ss(r!k0nc|J2nKTxnXJh*uucMe9$* zc`M=nEozGok7xVe0={+rq^IFD37!rBco_g*0^A9ZscKLSpgqv$H<L(y%1<#)yLv2~q!2vR7&ipdBOQO4 z%a<9E?M;^OF=QLXw-kpQEGZFOx;8P9rshT&(Eq5JHi5p7!^sq{-sb{#AmEf|NuY~F zqO~O;--JB_1%Bp_bxTK;XRCrv!$Yy+;lcLM8%6jq?*^po{Mn;^_hioMA ze@+c}ajBm-{pptn%&o19RrYmfUvH_JVD14uXGhG(UJy-^5V5qGgZekZ+cvLLA}}xd zm}n?*PM)0q#nU-PN7l4$JGO0SVoYpKY_ntAwkNhZv29xuPHeklPBO{Y_w%mx)xYjl zyLPSa+O?~$y3XSSJ2mnX8WX?yIB@;$gy@B*#WRNcDO6X3-l%A$5F6{5>1}8yppF|1=|tw zeg21EM`@K(lyRZ381vKPl{R9I9|(JZq|U+JuVcCIAq3-Xl4(SA+F;TWukL{y+!Tkx zjq7>ThV*^Gc9dr+6|MUqNhsEv~A-Oiepr49A z^L#@Gt@R!_dq+)_he6)pGKrZgbPg# z^76MTfB|eef39G_pYe%5>RFT6E&PGIM78{&^gRu!!;ue`%q<>Js1653)s968GBfP4 zo!W~>_t?EvZ^JiClYNzTy>_R*&3AQjHo4>pF`?k&CLMTF4@EPg)ZsR!PhFs?TjtKIFQXE8`C>^2Tuu2m+>LXg$KNEDH+Oz73Dv!$KYEei(b7z3Q^{;};*M<5v8gRtj*YxRZLxyP z*+SFgGrWDp#McQpwHHA8by;n2tOyLZ#eD>{rFj``OS>ag+2!<}ffzJGI>Zi@Hv#G@ zQKjN@INIEMi5s?V)Uw;nXQchFVgZ8-UV7$H7ClyoYvKwLIOv?4PY`_@W<7sV4V`(2 zV!}u!I(?%&J0Y592^N%{=DAVAGW+%Hnq2RS{CBV0lT^Tge1EI^gJ}vav5Z>W&{xjn zcsb|zLApQK!E*4YigE?!`ggOuEyqt)Qd3ApUwZtyfhj|-?!1C(OfP$U2uNpAm zqJBAcp(jF{%YL`#fY9G3l~s1W6+#r3H<^F#!Sgrf9{aMm2dI8dL5p>O?pYCzm`9R^ z!OHp*v+i@aiSe(8tjLoHkhx~hv-&(Ub2-B=1v3g$kA2hrUF{Y<2#WMB)}WngzeCU!Ow#wUNqpA;ZF~WoIw^AH66{Wuy zlwh3;3B-f?rGo{t93`1Eq>>*rZE;_;9t6(9c80DkBqZqop*nPhxH#yAC7G`%+@cCNht)Ie*7Ga+ofA+jXi6Y5iTwC2wqufEPa6k>Pp~O`rI=sn zmxT{lwvu{$oWDX3S^(Hhry%PZnN18gtK$7!7Y}ekSK9 zKL^Zm>m}H?(G#85vs@d`$`6Oo!(ej?V&Me%cs)tM3a#P!iT;-(%XhjG%_DtX)IsWq zIJmjxmAgOhg143G!SzG*--fvduIH_Wd|g(gW@cRgaBcIl-jEOZuH9iB;dzRfttvp~ z{3&-LcWh7BZ>;h<6{0A2KiIvxueZc?5||33dG`MF?#tnM5$ut5W}{C}u<}^Htf2)4 z{Oht@#?6sJ3shylf6~-Ow#E%`g)6h%d?r?^j*To5`W%?XP0fzFV zdWbTht#LI3tUAAk;W(kR0>XLqL>vGL^&;bx(`8lzR-3;l4T+tVMK3uB0^dtG$1l!y zY8}S9#ND;)O&izd0No`5QWnKGP1OfXAG-n%mp@r;cmEy#3jc=B z<7+jzN+{Y*=C+`9dh>w_s1Ee*)&iiW?5`-nd#NjxD70a8zbTv%a?WFrDRA_BI z18&Rpk2!5doG`Im{W&%K<)3I5n&a;uy>Hi*wS|DtH8POJ`M}GGzs+7&hXwz)*7$u+W^Y9)d--TbJI2jh!7oR`jB*$>0Pv z_qvz(WruxnL!{nEI0SaKwM#e0>KsR*Riow6sp=tm@cOc(0M3hydX(Czx$B~WPSS9- zm||B(V;>R$%v8W;@rhAQ%|jR1V_j0CV z?n>N+72gO$cZ$j$TlZZcc6Mic_O!Bs$$J9+?N+t-HmRr}gWpQal;vb^4=kTM^cU#N ziWdKB>W3kmxeK%m%9x*I^WbVVlJ9%3mH=fT|bax{Sz*$-Cu{vvZfX{V?*Lsq*g68 z9b@fP&Qk{EfBVMhyg&E9zcIP=e@%@JzeKdtVGR%RGEP#j%}k?GsOhNaW$1O`NBb=4 z;?9yt;m*ZY<5oFHiqFQ!TTKw0o~~`}vX7jkwYnY@QxYI1V;~Y3i}SnHD1CaySc?2m za&J@nu~W4>6FQ;k!he5p@8@r{7@mgeRH-l!5IkTvafcjVH}%`a#jVTb7=frDwI;Qy zt!OK{jgVx2`l|~~QHo}KAY`JXOZ53xM8Qx^M_NGlhA!S?&TeQsk9g0@vV3I7Sl$`Y z{RI)^`UK1q+h^_S>hkAy18cG_{)C3vux;OS{`5xH zQE@$6H+%Q+5V>F%RIG-3Mrg@H&zLzlf?-O@KgAAF{D=4@F9--)co>)MouMfwW61>z#hoCu!Y6Sc zceM&HY#R*tvOQa*Ez!sgB${oRUrPSHXB7n&B)q0PDu5yjG3%Qd=bd3s9nk8q_5*jj zsJPpRA<{K(m{7XXq0z13g5b&~P6Hxvp80TFDmO1Lj(dW1-S5YZSnj2a_ie`en^vi4 z8CeO}?Oh!s4NY^GJj>ccGRa>XwyTE~$N0|hvTT^NypPdU)&*G?Zm#Wwy53(kD?|%B zre~EUejlzaX>Iy${m{R=jb>r~C5TRm=vU7VFq3cF@mhiOCWQdpc;X0?+>hZ^rqS!O zlh_j+cXM@&y(J4sTZYT)K}H9;n6(V}?Dupe@+1`P2+w^?B&ND6uSw+NwtM!!0w?{IfH zUlYjl32`n0^3q@?*5Lr3FelTi%&MnN@p@+FF239-W`%IRmIk!;sio$g?M}25u@%lO zdlRTT4u3eU-%|cJXA{2K4zg?W&`b}1)iYER$$3?rk$9qVacDWSMFuN?Gqo2r$akuGw26x5nOz|mjJZ&GzCd^0S z;1WTfc*prm|EG>mFLyJ>qKAhBc}7&sSKJzRF;NyNk{x&?v#N?(`XJX{{F|($Z*XX* zDJDrqLeZwTy*MCvV|i%}30YX3utF5%7eq$N88&0Stc=1F63Qsh-vJ@!`Cf=Z9AP$3 zb$W8rrg6f##O=nRuCBEl^d;gi#6kY%4NXQ_)Dt{?jDwpofb&qzPj>pZ>F>^p?rmhS zsJ*DQuX{kC7QbD_R8?PHU(v6^=F+6OtC>j_bL3~yZ>+xHz^Tc}(rEBQOslsGgz4z$ zXxJ|PJ*e=Oy%GvkB%~vp)MebFcRal+z3%R=A^_Ca!979L)~*3+E!{|@a)Ytwz_ppt zeA#2`@^M-bjvxz5eO-$~VYz8xaZy#1O#?bH>_ks-BsekdkBCrlAlVVpq>jHm_HrC+ zA2baIIG~1nu7%BNw0bJqC~RFv4^9f~SF2XhZ)3OBZT;<~Xb06Ah8f%IQ;_f307{!D zG6$B{64olK4}Ya#$QA+uf*yk_IWmv&hvsTnRr>lS0yG$DV(``?pY*1->LmWz1m#Ot zZF7HR3qo#ZxVgKzx3WS*PD5zy?AS&G7v4azOH-teuP?caFM$6C3^>BdjvyHS+Rj`s zh3GEg26l>pd>(2jK!NkA);`X?g6fLgCSgG4nhk{?aYI5PqNTOgpOr#{`UuI@mr$-s z?{fOVmO-v)4Gp~I(#GfekFyKHUlh1FILN4vN7(76p#U;*V?IK9LOwh+1m0om^&NHL zd5BYzsviyHmQG?E19#sLJ5YwvH!@c zfx`ewnsLbV1jyL+;2E?^?V9~rF9Cr#hy60jqH9!q&l|?GXKIvShu>G^Pz@v=rQd%9j;X7a#NsX zpfQ%AANGN1{)bYsxNgDPxV1|kl5 z?mf6SD>JDd#%`y^5=Z9rpg)Iq_Rt2`M}@&Br>gDQ`upFouh12wNf0cLXUzTS)`}te z?y2ABPB+cljHz0PM;M6V>bJDW&c#|EM-!Db1S_BB_e3w&8|eyzKxH9&MI2H?0~;;-xSZYw`xw! zme@%7ZbE*hlxO%Vc>NafFG*8c!TK(F>*Mdz?WJFqCV_`KOwJG$c}Lp1|30{>O7fc9 zKZT*A+m!>-J*Bn@<9KlqDit2<{Z0}6GsHjn*#AQ=VMNIB6*bWJVNdaq&llksbs;4_ zXmrdp)d_W|uj?a!b7n?xc072R!Rxu*Vej8e7C_i(=`}a`oz(1CqLyU6UH}w?16}Cb zo+tPOy}+Q`#$H%lkpdOa3rZZ-%UpQ$t)ZLbP`I6_x8)KR?^?!TIPm?Pw_0W~X^ z1dCiCo>B?GPpHmYQn)fAOZ)pP9B`;du%4@whvfCOo?L_Y6lLx`MX@)cxH(y?ZZy2% z$&jT2pD2G!HzTmyh3sns_U1EVxUV?-TAwu0hF*s?~=CIL1S1fcW?ARap*h>92ga5GOn-d-T#5wbRD<_OCQD5Uz zthBp~Wb+TSmobL!jr4E`5qy8B|H?fvZF>z3bnVoy!W%8Zd7t&k74o;3tjq*$fAo%t zDVQf|c`WsCMtYmA;#R)-%dG>;RLpIKKg_=PH_7`tKgs|%_7~Eu`W?5f%1bOe{_o%1XsJGtY%ZUwJH;-lFZL9X`N6a*U zo(1Z!jTOopKY%X&*FyK1ivH-$&Lh*0`V5<^+OUa|X8z(({=l7&2$H(!;OJam>VnO` z8-$Ln<(X=Px({Q9hq4DAft^ts$~$PVsrGYPF|ZMx{4XSYwN5%367JpBACX_a)!p=$ z{f4AY8~#q08((`@Ma)Q~RkAwOZf;gqc+c$#%QQ4Jr#ALYB6O_RzhN(tOrGL(=tz0s z6xU>}Q~z*{KJay~Ub89jfk;`TOn?8ruYTcYkv^?AsTuYO8nV?*7WROt&9P@PQFKvn(a39t$ARVNz=H;5#(PJY*+WWVlPeB+7?kiK_?!ax7r2$Z+ zA(u_Cb*}G6Q0u>kCvGHM2cNH*z=rP2(>d{avp&Z6G=pT3&8rp_<fJBeE=M>;)Y^x$x9i9|s11pW_^$W>{ZS(m=bPac#BtX6j0`P6 zwrg@LN({r1(#gOYYej&%<7)Ur#=*1+1Sm!x;p7NoxpWnT#F4%f16HUJWFfLmEq6TZ zoxN*^$oa=jkZ$fqWcQ|`_h&v7Brv4U_Rpzfke@#Lz`!*DToUqHd;-c8Nf(-R9p8h1 zho7~xY zB4JltlXYJXxL45s@pY94ZGJJ3D**+tb3+V`Y`G1#4^ZhNPRoEZAVx zQ9;Kb_BbfHH&?Cepeo_z>lBJd1Icec!|Q?6W|f+$#Yw{K-%K_L(Z23l8uQc>=Lun25zjFd<7s3^GYMQs#B=Th}_`mD}Y@$%1~}u=igDK-*OPYw% zCd0rEnF@P{4LRw!cHwDnYaj{W4*pD7;gr2h4BuK!rOYzDx^`NFq%ViIUhaWc#}NhJ zI$det=eaS@v1qkyfWy%EeFr8NN-E@=eRRcz3xUfk4Z?5RvH8;FKM1&}OU%{LGR*EB zRRuJTvCqCV*PR~LXVeCyGF5n;#U711@`3$egO5--vt}-3I5?~Xw$XhZtlwqu%jfRa z1f=69jhnPt@w%~jEE<6egH(6`kAA!>QvdH~*R=g@;&$)A4mm03tO}gQ;{}SEw;dQ3 z;bQ~ajQB=#yLBTw=iR&;n+BbLfIfYcgh7i39(iUb|!Dk_hNdu3X9ZCVWu)A6sgNqP1 z-&&5Ypb6$K)zf&K$u6mQ>4#Mu7!+Zx_zwJE7uo0l(#Z$I<*m4Yo$5wxy4h`(J3nGi+`XwUD?|LiI-*-J&EK?#~4 z5{*wH^x<&v#6ywF&+xQ0VAB*Jl@Xm^WXb%qXo>8w^}YuYmqbqMr73)U3r(a+(zG%A0_E5qfRna9J7Pcaj1nh z8dNxKZlE0ni*HL*AIWOkF`h#Gsb8A;lZ|MX*%wW7zB68CK7Zo$ZU^d7zYI>=31bHG zdZP%I*VXlP6EPi(SH*{Y6a@O%cg6Hfi2^tUU2mZvHnsQk-`C;OYWWA@59=U=Ym@$V z2#vLF=q`mKdrHQ*)2&O`b5y5BUj^McucKk|MR#A>&h@npkE3fWMcLZx%gO@01Hury z!tnxHu_fL9Y2>r+Fhg+u}kcjy0Yzw?$Kk z)0Df*tV&r0o~?{JG8EQ6b5ZkplozZa_sqT z@g7n+X2wuNLkP({b6jzRayOZfnNiIHfi@cedw)v1ue!(!a%px&Oh%p1C@qmi|p&$)2UZbA^rmqW(e7t}cuH z(UxIpqvIPIJ|vBQEsK2T476Oq^yDm*t$4Sjm8Cb}i;-N`^Dy9XR~MHWUG*5htITh) z^TTOfvaWO#{=0HH@=Xa*p~Xp{8~t(od85HMQCOvWz}nRvE?Q1@xzn;__1tBCdGLF^ zMcX2m`T8H+T#thN@7183KfQH-eZO@3*8TgX}l)4qYTk@$orCt+yjxuQEGKgiiZozXZLeF+fywr`bm@ow~nDBcgB&32ZP z)X!T8Fd>}my?wCB@cM?8Fs-4b1v|Ic6x|)$9mTDDdk2<-oDJ*o_>bm*3&ucZU+RjA z+}p3SePi^{#>OV<2Za*L?&cEn5Q>PQm>ng#cgR~o>t&mxlFu7dVrxv;QJ}~QGe&YG zv`)9QGzrd&RySCaM^fSk>cobG*nI<;EiU}z@WH1IZs3K-jVHQCPz`{JYT(~;ox~1M zQ=jq*?7!>4nk=RNf8~(>YM>(i*NOn+|FzQ5zoB7Zp!na7z6L?petg(^Rs+y9M8xh# zC^5Ey;=-O)0QkGR3J;JI*39f|(>mkSQGyLFJpAO>kz(ug++4!{8ii8Fzw4fSed+Fy zbNqxf15%KClNC;F>3661#Yc(;CjYO}h`lYYI@2x9e?5nE-rRuBAK13ZI0UYU?Y=H} z-r8cv^a1Yolo9-QypGX~Vb|aq^TLjjz^Z=R+phlp{rjs15Nm(gE`{?{u+irG!hTlF zb3s!p-jq}5VZYnw@8lw_YcM)AbnwU3p)}wkG9Ev_LCn_n(=RzUwXPinctDrc0LL8lZy^JYCl$NwY9Q33tVQFG}IIxA7NkNZGEaP z-B`vlwZYg{pEwC?FH}M}&l)|i*=oP6bVnn|33S|@w7R^QW8dZ^ay1b4ja>oc8K`mb zOfGbC$uss~*7XOPP_+F!aND^%456axcfD5c{`T$G zGi9=yfQss62J}OD&n1Q(;qH~U%BiVg3WST1|8E#X6|69ebwl}mZrf;qN2=|7YZIpO zD>0wiq@nt94E-&2Iw<3(k@eb?-+G|JoRY1<-f@%2WbS5FL2G6d;(wNUJbJpKhNr(Q zewL$-3VHAjFc~Lq*zr)ed-p!_x;$d@MxfVnRNup)1gb1yr zY45TQ5L8@VX8fHl4YsKtb9?;G5n4>(u_**A=ZiZHTI>w%hK!mVlAaJw-H;k3n1#BQ z@W-xet@5mU%|iRjoKDI<_wKrvZ)oITVCgOUx`!1X;+f>nQ@#DRsKka% zwp%dwze`C#vHzqkt;mY<-W35>xu}P4xPKbzHANFT)B&QS&kl8Q(2v*M;zK+AS_Hew zF=#tsZM4GLhKB0^SHV;rPBZoK!2r;%m8r;Qd^)G!`>qz~n?SHGL07X$oaPSb8JvT( z$xxJU&(G?uWB%I|o7~Cm-=Za@m$8k8glv$x|8p|J?pCSxOvOvwxI}1nZkr_cbCyI1 z=9JQv@ZtfJ>4Tl;iedsgZSsMw2dbzj-$VYJZ3n~S?KLHbrkryGAnj7IQfs08O*()R z^dKk!eZKy^_>Ngs?*{ZY#5DblnTr={)-f)Ha<75-0KG^9ZU-Y7N=P1ywUxW~UcNpZ zXNtiKP%_|5g_gQnaaj4)~i zV8=%IM+S<<%RIkeKoHyS&YJseZ^1tzj|xmq8)a_&53~Hr-i01MlXWx+UWN3(5sjd1{=cb6If&jBwH2}J9xP*!pM@?-eM>kzaFQsH zAr|)Y!<)p>V8FN`h7POqK{ZM1UFGWC{K{u2iG778=nuwKaD*tAl%7uZ#DL?dkvO@T z)b@M!+RVN_@&gT{9T#Cpg}ge-OISfF)CY|2uXhfr1bk4(NgqbdEb6yF&+&G9uHrMCc(-)QqLlER1JjqZ@S zhbO!D(>7*KjUzYjmll<}1a^Q{jW+o5`7o+5)akKn_u%Qo_?aRxSpL}M&bEW$>r6B% z`5c3mAD)x{$G|vgnC6{ZJc$}&7hjrXpUnAKws3Ud<~PiZ+9q+%wX-YgQ@g`BORYMC zIs8kXuS3WKJgNjnP}gfcoY(YW+*kU1QpYW_&bu4B5F&8j@Ps|$1v5G4m3b!)zMoQN z<=!gh=S0xQJ&O$g)8B3#v8DL|gou$J5{wyUK~(8Bi98po)jwrt7*aGM#Tcx8NWqNhh9MEaaU+7?<%K>53@x< z1TeyhHp)ontAl1(7|G1QiYn2YTN-NW$%zSiIy#2wX}U>ChytRLJ5Avigd`LXf5S7xq9Am?TLo z1cc|$e^^*X!uJF#I~lcZM*Y#2EH-?9JLF{ZH4-K1=q9E`IlLvPd7&pzn&_verzfX# z(~{efUo_K%Ao;^SM1q<^i11n%ymts-f$1k$im)3B(`QnBIyJwSJj(h}uatmDDL zf71*D&$RFYw)aj%O}AQ#;PGNAB=P7blk^kT)>UFC^Zf;dmS)!%7dGZ4&>rG)Gz~eI z)tI6|rL`$BF){gN1Z&8QM1u~6b%iD7NDDP_tv`9F{wtow&d%sqHg0ZMKM?8GFt|(P zG$j>fRCI7QY%w21FZ}cr6LXWhe*J2bGfFLQ?E2{|lH8uACgP;1uWu3svb*7pfWJ4X z#X9C3f(Q)-i5f6J)KlY3Fq4OehQ#W^BLBi#P<@l~)}y605Q`3J|F{*$`;d~xZ*-`^tdM5y^;e0H{-0$qPW;~J1$0A&=>zEOxUydn?%Mvb z&7KbSuBwGvw`tRwV{iWi1Nai1@v6_YJI!g{@fc*QC0bSN838s@n`uiWX-6gI8prGx zT@S+oTae=ZH43Je*^tASt{4JGk0!97rT#w%O2MmG#+2z0rlVsd8=Qz5PC*|!`>N=v zvbLSOb@MDOfl=6ou%;$inxrrqRYCNqCiFkn08GST( z;P6N=94;gU3J4nmKbhB2>lWvs-+LZWR1^CvIXO3^DK)#PH?*&^G`u+HXW1hi9roof z2Lti+_Shq6HGURMHCNMcH8xcQ$$X*N6Z%u?gse5aOr6Y)PCXez^;K7AUP`)hhx7ds zO3G4W8=#GwtPI4q;*a*TbdeXV1yXBk2~$g{IM-7wb8~8Up#3(GWs=_Zl3x%1B1iZ9 zd_qPS;IW#RDB!NRKC7*usX4Tzp#%6IY zFvueB5oBFXnPmt!bJn!8@u!H=dJ2z^j%yg*4P-=hU_#7Vn1C}^3b`$uAj}#Q@Tj8N zP4whfZclbyZDnV8ao(V}j5#Gh2AYm~Q<=0frd)$b-yUh{>2ZdUk@2y0X}RT5Lqq-U zgW>FwkW9(mT|t{7rqr5eBys) zD{fOZW3Wtk*Kb%^QWRZM{46WIr-x`Frl%)4tYpjD++IA5y$P3vzNlQ2)h}5~^~VM! zB@LoY@m5&X78YKl0Fl7uMAfLf?CPMzT^dogvWJ`@@}S8^!Ud_1+XLP877Jgv10y7fWP0tVwvj6O)Aa`99itamxq^E#U-oWe_wm6cGyvX)?uP z}d5UP~eiDp56siJUl#tzg`nCKU|$%psQ0-D8u%_ zjbI(IAd;fKm|p`;D7Pd($U=KmCbr2TI*S13(wu!w%AvP zi;D|{xA5>VO7Apo$Nl<8y0*CvX)<099WWjrb|i#uDCr4vF*>vNB&N@~r`x~270e$g zfDje)GwevKq@h8X3WG^b%K_7UeJha}Bwt`BB`t{E<>vJiA(9t!F^pm<-b{*tOs}c= zeRWmSBhXMBK>D!k$y-U99(A8RTqGPANeb-LIt z#xiDV7t^w`=wAIHrCjtz2Kybq(a@Z`b*+is`-=JD|AX4c0KGhhhll_C`E!6Q?NsO- zY=X`&ogT!tf9GWaJECtpu(Y&fO_j6B?)n?RRgKO9MObU{#8P$U zD)6T1CFgpGE4G1`c%(^48c26m9h*tYBcJZ?$^6eZ-zZ$Lf2y)Df z@Eil2o#XqX;92cdI9RmN;KKZhoJ2=(nT#l2A^GH6v4@2DJCfg?Nh@a!<%=3S;qFml?u}QI7R*k7f!Kn zsxp?);x?m1lhaWWMf`=>0R};Zh4FW!_h@}x{^s`Aj%wh0i^1SW<`rTf0uu>&NRVC$ zVjFT#MMn>iNyI9#MD_RlueG@MmXRtMujLTHns=u&7Bk8BU!(G-mu8KJ=tqi+&>CWP z!=1Hm)TyYP-0lTNM!Rc|;1fIeM!0%3kLDFYguw zAmXx*q2Oq4Cgxs$mcQK?ubrljO!_V1JsM_eiAxqst-{;*uMoP<{%o5R5e76w?D#mV z&7cSXi0epP=%n^s%PT~a*_5t4Lvq=5yNw#oDW1|sAjMH1g;R#RkAVC8X9E%SHk>>w zlRo3>$6yFAvA0*o^P_*`(qhVBs!on=lcM$;(0jb_;3G2{&6PIidH zP(4pGn7&gx8HyLgK&fqGf4^h&bi^!_Dy4iF@@f8d+l8zytS{A~2zQi3sWr(~qOJtD z-=Q=$E+G(+4Uw+qC;JKW3%bg=bDn zoYUK9KYkHfX2t`L7aCJ^08nCU9HFPFY2kFMZs$6OBh&4C!Wb6fmKD*VL*tHd7jC+$ zSbz|68S4abwJ;lfKo;(r9_D83YL~anFSs~8MT|<5j+<-P92iUK*7+Ff8#(Z`DEa~u zZ1h<5s|5Xr5Zyl6UMx`gK1(w0S&y^$04k6nfF2+&E}ovAjszpFq=cF+HT2N7h^@BR zZg+380MCF7w-NLpT1J9|A z?YD!mf3+#*FqSpYF)>NHW9WHm&SUp%8_#V!s=8(9tbTf7WoUY4POb_H2R}aEB=+5l zQ#^9t+~l^QmJ}3-o?F~GmyoNBf0teoDRa7V zH1n3_53U+I2cuQ)&X`Rfnghr@QTI^qp(5Om#C)t*;m82MOl0g0|$1lvXz z7u22~!4vB)2l-Cjw*;6tiN&WxyMEUkkZ}sto~#Y}OPF#?I`(6G61Z;<*_U3*ioP^? zKjym&E^gh|AYw)r4kL$v_c9bYp?5u;l|A_kJ7?m$k0dH1{`~>h z(jshLDF{Lz?dNSj-q`8f1N6hZVZPoTBC8wM{*{=s9{vPh=K1&}2?80?o|LimD%|Z{ z^f4W5gBE1qTjLcBWYy;DTl9d{dPADFFnf?=3@8l^lGM}) z9_=rqE3<+NlU@nNKMy;ObPd_37DIyExCEEs}pG zGjrOxozBG7cr&SLWcrSm@%hIK8vDjp5PAZsNR;f=w6(xdo#?2+*QP70MdCIL?F^z&c>(L=mp2jZH+mU65_ge3 z;Xq@>296CJgdcwTy90b^_U5OgF@91_+2c2hoQ$lhPZ)ZEvC0!m{=R|KcZqsSPJiQ& zVR#RX!v8q(+`mNL!$?k7|G=v~`he-S9*j*( zO6S=D?wJ;6e72mIcn6``s=LlFOi=4^_tuwT8BQ;-F>zMwC_BMu7ji(LrQVQc-=wp}4LSA+* zb*eV~7*|5-_Z=mU|HKT>(*3LUmUzFZO^p3Gd=e6B+ZA|HfUOQqtn(vfm~;63@R3zP zf|R_h$~pF`BP_jU^e0ukAh#~ZyQhkjlmW$MCUf*`l$nOY=aqtSYt92f56%O*!eq8c z99Wy8o<>Uu&?mBOb^XrP;B=ljr2S8V&&OG99t@%E@({@K9-c7ck>@lSyaYvEb^WGp z=RD>dql#%Kw0!Mo<0*YFt+&2s%VH;yLR%E2Es zW`?K?T9*eT0Sn8I3;1nm-P{~~uFL6`q1mr%eirk`)!S-be~|e!=^Gzv%B%nA9HP}F zA}pq*otGZ1^6D7bqq`vICX~AsE#PnnzbfM*7#D4;s_AU=rL(8InSD|F%3(^BZ=HDI z#%10IpU9uH%UqrJvHI3$jS84P?d|_%z%igRC2Fw_$={;p2Db@ zv>M2|=6fDX2j^PJzBcwtOLkxiB&)zBlo#rlHqljvS%l6bNhsds*JzN~lBcG|MJp#; zr)=DQ%qf-oNBC40bT~+z`plrp8`rr9b#6l|eczzKf@1scUe5T2@OTG(MgrdRG~~`$3*r<=#z%cwBRX z5xhmclAT11={-C3mrE=8;S|vxg?q9vSxAcbELaNLy{aDlE1h*k-x^zOc@@2=o~{dMYKgBapAsItbRsL-`ntj@FS_=Iv-A3;ai982f=a+V zzxkyByH;9pH7E$^`MuVLZF5s7fm4Izth5HCG%;468$9WFBESCWXH{Qxj011cv8pdW zGR!D1Lf#UsierKX=)3ZhALLhJH2~Hvtf~uDGE&w%h8i=0)E?Ec(pB$2%Ek>mSV#=9 z;46=JaA)Z_of%P=ft1TrS_Hf3TO>X^h; zPa-o{HibF;)Wp=3<(nhM58;OcQyV8$O+Zg{%u-_IWO`2#;7WdqkYSG7FdZcuapf(qg+ zLiMLhlWGVA2)liE_SAVP_U?}(*6`58a(|aJOm!Ru&S_9Ta}PDceJV65R5Zdi;pu+L z*$k$H=H0v8v$2gU=ttw?TIcgct2SBcV^)pieBg<7brm`e704~Ew>{MqTRDp<$%;wp zN{&*c#YeU|ONg(EU;Xi+u}$Xo_s6P(8b{)}OkhW)0AMQAd8RT4&7BTQGl0(DBXm%n zQIfPM-v9ocx2H)qMELlbgcisc(seI}=eb{q`x7n)ZN?(BOd-m^5^x`atYT;NghQU_ zb<)xT4suxtbK-XPz5F(>#=(&RgMUvg;yI?QYgGe=FYy-o!C1I< zASfVHXe#-Ke<2uA;=!m8?@l$S--?8M1WiOP97!yUgyNtOVt9_-W#A3n*pJ7(15=R_ zAsp-4rQlY}B>0cJ$*GoMK-*+lgY7vV8M!yDK$M$CdBu)Gmoy3AJl~$=RvG#pG8IX~ z6&2F8*i=~LFKsV&pNBRuS*J~o%FWOrR%6LkyX#+W-b_jm#kilX>ox(p*uqctJ z;g7{lqTmM)_oh)+UT#Cs&H+dWFk}j#XxSv@V5oFP#^esaEUwqzzkgSjmVW=9b$@P- z7+dEcU}C3a|Mtydf4sR%CIEdNvZT}*TZka^8^%pCOYr7x1Zr#IfhNW*!*|tC(nlB^ z8`#mts4_Gxn9f9D-Fooc4#?nay;sO#D-%1i=ZOCKe^TfRRg!WBCbu{Qux&ce{;D07 zcq4&@93z%+GN?s=+k*+dwm;(m)_da*ViY)LxV%dIc57dME`R_j)Nhf%~4f=e9ypIMUPs%0GB@> zs?g51evLue3KxNuy!z-hAi>*iQDxN689gWevMsUEf_>9xyg|aavKP?f6g&mUlzDNH z&N~RPi)|aF(rD`PU6_>RSm|J6D{~%6i*Nkkwqv?BrRu7l?kV4dx)`5rah*9vI?0k+ zy?ZMZe@OC)=*)eSUO%k-2cf@J(VN$dSFOCCiW?Ev^bIG1p+`LC?;9HJ5e&iKXH)Im zi_V5R9UgXySYlrlV44UHHy$(IGANbTAGQ@e*V1r0|gysz*|_XQjIm z69Lyq!|Z{(6{#FiS0Ub*=l=YY_z|d*FRiR;w(7o|k>3a9AJldK%Qf_?ozy1pqov#tpB9zP&sr&@C@ntgtdgEb+F_Qs)QIiE;Mg4OmY%lXgEk>RCew<~O;H0N9K63S zm`t*<&(cMQIyAtrYZaCyKIi*%2?wBXTonJ4DT?1B*Uta8L7~Du!c6N}fLnvr#TfmL zi?}x;Fl+vp$*Q|R>;>CB*kd(l_@(_#`35}8hFX=Cl_+rqb%YYvEQVB5!DzKX#G=B4E%JAF($FT{6cogUcS_`vcz%&B$0PmSxtG_8W4YTiM2g8 zI$D|ZXf5YD8+JOPi6Cg>mW3JBhPOI>3x~i4#$7f0_O%>_Q1CEiD_BP7=X@TLOK1;^ zW&`{g(in}cn3G?vrUo8U`oh{5%4y3H~Ww;6YE zerjfd#hzj3GRy!cVoJApv(iGEUEG%kI4yT!0dDM}TPB}l=P1ErCkI*W>Cy|LZN|&2 zD}^Q}#uItB`68_i6G8U|;`$8-dVV%`(FtMvz;VveE0=pLu2f?YTPNEZF&0q=(8p z5T`}}L+#z5y$mHRvc3)G%DSLdrR^_mTdX<9Un_4IrAhmSAk1O<2(PGe3NL zJdZtpi#Fr6*{F5crcQ$)JR%}gw7LBG{@Ct<+`UC=>`lD%7Wr5~u6us`Qd%G{g=Nt* zQJ1Cf(?wf`dhKtlsS5%uN%`_*Y(r`1>uilchH)-_4vig<~z(PjSaa@|e! zSuuq7lyj0!AsNE2-S^TXXyw#{WVi=N^i?1S^LNHMmy9HkRe?>DPfKw+BYegI$jZ6> ztNw)LvdroxK3Jp1_eZOf<}T!3oa_R6a84+Ftr>g1!0AE~>#p#P932RR8D~!#w3yhr z+hMG@7!9K3Vo~YJggysO1Dw>+8l2=wXwJK}Tb_eCqDOi>03>#Q-7MF6y*6kDS>a!u zs?SC^E4Qiaa+pFkX>@bdUQ@F2DY2j_W3_zT??-;eRA`4{ZSf7%M$S>x-43`=9yV2W z=5=^DUN2oj`M&Hv5~wW~Gl)G|& z?vp>y+tVC^r;Bjk^+dI&crkB@XnAEGXN4Eu0yfm__|Kt5O-_~u!d33+vruBT`3B;a zb?Xsp9)AfJI&Uhszj%Lrrxt^1W1!;aR}@&=nBWs&Od9kGg&$yvk{_Toz}nr10kHuM z^W@*(LxMT4^Q?A&hhP7!;}7!gY9(|b;NalsFs&WIByY3&!_S(X-@_WapZc_Pf^B|D`UiVHx)hBh^DDnXa<+wKN1G?qJQago6b}b0Z_55o z3I`>2_P+6|!jpUy402OIdueOE@GSZtTfI07%M{)|HFbw{lQ|X>g`#ICntd>I4O(~u z?3CZf2g-c}u#M3*WUgm+Hp)Y~a=$h*Ho`MWQLJr#g*ikxPruVgNVLvJqAdy=LRwsb z?3kSLg->Fo>H_uc0V-4`o`fpo$tCVP*NL@HBb@!!KPqbcJU{op zE3Iqo4<$mW<$8+{_ZcbpKmuR!6S9O~U+$&!prRw)e%nq@XBoO*8T1u~i#* z{Wvhlz}_IG=H!^yX#&k62jK^R`3zVX&CUIyl%xz3lG3m%>yePkvMB!EaoTp9=0KZg zi?56_#zqd>FTUA)k!yQ{fm`wMZ!GkJ)E%5m6tDzSh-JOQK}T7_t~VS2^awWG0+U(^ zI$Z8$hB0rdg~11%+9s2f{9)w&Ui#|_aWAasrpl3cBG?Ex=p_>mtSjrTv5ummoe2M1 z{6H*EA<*L6p#0V|zphLHks#wwmzhOEz#7S}P2Q1JNu`2~*-0%$dIxioTVGuu4Lbdr zZ`Bs$)Dhc=e{l8N%J`{;xG3?OU}5cpXZdExg*swXp<&brwp9n=HBAv7IeLWWZ)+8X zb5E0J<&n5wTPy=iR7@6acA#@jhl1C3Ypq(0^@-CZLC#4_g*j^Dwy@mSY1_BK6HMq6 zip%CaSpp^8>qM_ZJpzHWuQ}$r>A!R)=SOPGrkrU1r1kr1fNw(@)&)oqH!#f5{Q6*# zPCW{b)%df~c(M5*UuP0(s3K=myM^79IZNtQy68gZH24hD7FEcM$oSE z@#_{BAgLhk#$aH~Y~{JDlyUb5@tu8}N8Y${p`X9GY1BymP>6!rnruSGcJnMrMlXaw zOHW%l%c5>jBj$11NG-4ZoTG}ba%bqz{iA|4`b4bm%XM{m_mN%B*Lb_jxrW^u^Wdm* zf~O;%4hh8oed9qg4uIA8&vJrKj9&e&UPIDdd2j-$smr?_B(r=$3V+sV>8ecIk2#7n zIJWzVAPBStPI5OyX@RbCN5^i#<#}#vrb&gpF2?4{@4bR5hP|t!{jq`g>ZvIOLH%za z5;zyJmPNCu9zdW<<6>_=v(4x~X(k%n0bEn&b54QxjfUy!uxpGhzM>o8hroz77#<7y zT~#g4ZQI!HNAUT&zon@J48n_kNo`?G3*Jw_Ra8fZ6CUFLuo*e|sER^EU|xo@^}lxy zQ+`=#(QBx)@7zzN?@f2TY`{%--+V01A0eP*UkiSxR7tA+hP*gwC5JwA8h(ha@;%=6 zdmX6wo<*!FSvc)}n4=9XsNk|t=4)U2kyh*hpD}n4EX#M|Aa|1q(Xhl5ypCLc;~O!^?XvnUiW5cJ}vZ3oF}Cd9C0iSs5!&Ey=J?15%{_UmDTdS5V1!v)1s_SnM*>LDab4 z*F&T=BlfDNFh`7c*WPxHuj|tz0R~%?iWT^(`)QU-(8C3#8-i%mpZZ@VXg%lMz$O#> zUa2Hm&SL%RE7s1%IwoVkRv0_~?Z-W1a8lIXt(_?_oett7^2bgyp|53bd;megMVT{l zkrZ?6h|){EY!A%p;7P<5eU#g}-Cc$G)YMcd1sPWd*IWDN(XolZ)IE@ReO$KR;QB9M zn&^{v;*laKL_Py>l7o`^Q-NneU;YU{vo`{FPb%*^Lb(RiB=oZf$M7wZ9DmB(NR-$_jn<)5#(ursoUOE!Uca+4m>Z zGT<=Fa&YzRK_b`qdwY8y7NX{p01y2FKY|>(?mRU$ zvB@O|Nj!vR$SSpX7-(;T)Cna;$$=t78_>z9-j|J6EpJ12?1V`N56eIXiou&&P$Jf8NRprVNvRp3 zhOCvsY+2Xo2^#o6(*dA%bu~`lNYZMTk1MG^r|`9>k!9KE#+!)i)Vmyozf7i>@<-mTOMXa?+p*)!bDCkpVwpL+jwUh#3t=>~JsiNlzA@gM z)w>tP`JL&Iu^RdlAs-0!@7_6DctNZs_xxzT*}aR=*Vvery#$UF>4rH;q?RwN`-13q zI!CPFfnSU^d{?P5?(Mw)2z*_pcY-#SvDiy(}eLGVR>&DtqGgV3Z z^so%E#pQBwYkcqBUn(s)=9GZdwYQZzajLZoqRjAsZAhx2`>*jJYVw|V@1Rf$UEokA zCnqPSIV;QS&pp-R@;}nnK%IxNv6fa^WCNU-W_Gb*%34tP4+j2@u7pi#x%sdrws8r4 zPgKB}4NeBbJij?q2U0>}CH*aqL?{FpOh zckSjJI-?&7plVNxH+0jY!M^aDXHsZi>m<#fhW`j!<$z!2Fp2h;Wg=FUe_|H>uvd}Q zA+2$ultt(t%7RDoiuJv+37KyWli1zZ;Df)x#Kb(3$>hvw#DEoVXlRK3np<;-29h6; zoyXxtdwT5~?MV@(mdB2>eRmHv2%HA*S*&NBb zdalchp8tLB6I)1l_?tdZVKHoS6}6;O$*--u7_4Mkm0_*5oH*fqb78Z+Ao zeox#pcHyl_qOqKHf0z6aCC;=NU6RWLIfXsdZS_`SsW88J=`rzoc~R2Qv}@e9R#!#A z*Actu;ijbXh=Ws8e0%iiA~>xFSPlWMOPZf`JTF75(|$hMEtGhXHAWAqSn@P<5x|Zx zsSm^~t5JbPttD0v2%?uad~5bH1*=PFk32Hvst=F%%recEJ~gdP1coJ6<3X20pMvEk zjv;8Qw!QvwlVoI71>m{GIBLgVxOFr$F30>v2JT*lKlqr)hqq%BCtzyYJMyT42YxW_n}|EbY3#LMRV;J`#u zQc_5WI5zak^wwNGxCs1t$iJ{2pkCeEckY?p2@rr?!*Qy z*3`eUhiU$FAX47vM$7SO;P`~U0Bpu!kK z2rG2fq|MI_uWdFueiw5!N#BQA$sDOrXzD-udeCOf=SbBr$lmchOqGJJ`y;eVKKGwg zzvECYR^SRMy78go?`y<=!o!&x~OA zeKbDI5-5p{@Mq+Cu&h?HaEGX8C9ifq4Pg9M0VrjPAX$dlzoZ(?jq*t?*G0bfYH@|h zE9%`xb}75GxpeD$-_0VSayWTcj;>>nN>bsVE07NHJp7ZaSh5W+j$X=q&hrd(2ggQ$ zU%nQ-Uzd>M996ifojsZ(g~gH>{&{W+DDJSCUJW$Cd_C{IBG8Tj|R0C z^znPS zc!a{5>0MLw`l*PS4*)rbw`kgnBG2VhBU5H{+D)fk0Y7K9ieS+6-^4vhz-e4;S7sLC77xFNjre&->alo*2j~7A~2O zjEpEK$lu@Jqot)ODY+HLm6DRWLcz8wv`M^Bt7W-)yPiV9|2T8cd$K=yz3DeMu`0 z9bf#laRAATQeVF5Tw1+#1&10KzrFkzB7CmJ+jb&-<(`nYFkD2si~M=<}CI!tDLkr^;%+BV(<}BE_!@I_BN$jA=CDY_1oOD0a*({ z&ajb=p&4A}9ApyxttjQhB(utq0w9HZe-xBNLyODOln)X#Z@QmghfOzhAC&4`6Y1>v z2siKX_|TX~t^?}X6!)<`=N$}vclCZ_0gJ>OMGe1u1A===yzdDdzIz! zWlIzV-=&Uek>2KeE-QRXX*?@@N`Ut8elk~?m@D`2^ruAC3dtlB0m#kHX|)tM-VIhvu4I$@MAOcl2aX<2G%!wFw7e$lW8-ffod;+MI8>3mMGCHLMEqVdQX{&lbq@Ne1zqJR zas79lgIT^Q@6`3F40CvC9<#t$V%@D81N7f-3*b7sP zPtOY9AUSL4(%fRUaqfqey*QwIC_pa&mw9K0L@z6vVCP6y`SP#ofT23 zT5bf+yS-q@daf*HYQ@l~M17lqkyZ1K&NOt#yTJj>?49z21Vri^R3BnAx!Cn~g2*zx zx+X>o`lJ7n*Wu5*W5_i`jY_|9f!Hw#vaZ&6dL_72QSopvPq31;A*X}rGBnG^s8w!1 z<2(ibJo9_aH^enY*FmH|i)9h`40RLKZn_&Vz6vQletXFd0G3B+F6s;A&&5_-dulyx zdp*;D%70;li z!fwB$XrNM={vy)&!~j~utF|{Gtve31gjdQ!{ms%h4Q#O&Fbk*j{Zl!nFwOHRWIwKA zpG30*5$&og7X6WC&;K&E!fY;bglnY*^g5?L2acrMr9kvQN+ zGOj}DN+N7wU#P|=onizlx^L&-K}ReA1?ulHN&}ky;ed0hbGJbmtY`0W^{iA3j;0HjW{QG3%V6e#Q*HgKg_dY+g~mheJ5lj65W9&KD2(Bc zq5UhcVXiCplhsRUouX=-)jZdE@8Is>W$~+!1i?~D6t_-`h)NTS3Zg+E?%SAb1)B=2 zfx*9rS*n&ftVh5A^n()umILDUudwTv1Udq|pD2i*ZZ9czEpj$88fu%VTWqG5Q-W4+ z$cv%0h9KuJ{?3Uz$B-nI4+H82qy39tfs5Uw zCLiL~V6{!H0Y814h?>Wc-cjwY?6#H*ERtQ|CV;85pir2$f{wMz9vxM zt9a;(uFDk+3XhHfgy`}x$8b%pouHe^z}7J%E;|D+qx(627R2EUTvSd(dIV#wM-~m81_N)sG)T%53_Y51|KHyRRH&Qq- zlp#1=Y>!Bbhn@{D2^qgd66_dLC1NU)db!J)i7cZTV`_jSexf5}C=qQSBdj?CQA|L& z1p&|XxUY1;j-t65haACH0abyAC9KAi5Tg4JB}a1Z!^%tp-L*&xBFS`>(gT$j!(Sm- zma-T-jDU9F;|?On(~z0Ie==Z&hYz}G);FI$SC3d^i&Y#ud6uIFC)NkQQ)wnT0C1^@ zOc-rO0HgCUipHDC-bLpAw1RQL%4ievz7VcyV>i*iHtwYVO8OYMu(Xw!Be{T_FP;jO zQe9Sd$}5v1?;6wQ(3#g*(pNOzoDyj`3W>=?tc$peN=(Zso8n51nd(osj7^HnwEtrQ z8H>i^(N!`m_X=fJ>Rv@uYB|QavKf;^PEj zUHeoeTp7sJUwhL@45t;TcI7McO>kvjkCyOL=v+SU%nf3`pl}`N0FgYwzbmnSVEb8k zlok2%)J$}wWR~sBa;Ilq2`~gQ`wnr1rLZ*RDww{1`l{hIPvQM03idWAg(wG)Z-9;B zyruyVbWgC*_u`|OvGBC!giIDD8eMxu;IA_!yrfm)e61S1?IsSu+ep@s%nsjH+t~4?vzb3 z$I_yr1x+1ynP|XmN|M}X{%4`uIDJ(2Eg$6_yG}1PrRV(-jog9`feJIr& z<4g$oE2BWUaa=sVCXlJc@vGQiq7C&`N2fg6{zqPk9~;3sTG*)$S_xwcO>HG=fViP$ zDU<}atPNG8@F9J^uk98ZsjbiU)YlRx_49nP_~n1;8Sb691!?@|K6rk3lBZONHH+`@65)#H zAL2>bOCUnz&6_|@8Z2&f`@b@R1N)l7sIwA5kTh$!-`x8=HiA@2#La?G4O9Dmz8=DL zCbJDF^U~R0{ZOo>XrDWrpDysl$v=$QC#s->rYfX=U;&L}@dHVofFAaHRM7YKcG##B zKz+T_Ij_WuuCdOU-0dBdhuuHS|AO=!-@hYS{aq~Ie6_E9MjuF7iI<|96WI?#43-n- zRQseF5Kd%-plwEP@rsYy#qNCe?tXS(3tH$;RGzE=sez?ji_yv_uLIt|o@VF1AIg7~ zF^@2tIhv)zrEQ*kCNC*~GBuA*l)d}?5HLC7PQ$qAIY$Kxk&kG*6tW<1;zWA}Nxi!^ zioYW!J zCOTTVj4j^=D1y)8r%%lR%t-TiE+*Ehw4Ef3A99?0^^oXIx;s)0d{_FLr`f(5ZDBhEEzBE6)dGM?9(M zlq**XzqQHeP9?zr^?mfHn|8!R+~fdz{#A~Y35lB|fzGP~k|;fPN3EH8D6h1N^ousf z#GMY;_i~^u4-U(0hf$TE>JK5tYn~mSA-11wxr@Dj1O)6|3n5`93bUjz(3}xm0k)#K zmX5xmxT~zYp@Eg10%MIAnx;}1?r@e@rVlZrx4C0$8$*pp3g-fMFP{R&agK!CG?Nw; z8k_!+-6COWy{GC+N|X+wNeQd{UmHs1?$y!E9^FIHs8?i)HnKrgwm^6=KWBdx;y1L5 zd9(a-se4xhKHmDm)nDBsi*PjUnShh?g~O0svHkFDX2^?xAE7Tiq>lbU#`6LE6hahT`zjI%+c&f5jJuKv8Y9*un%oWSd zJfozNmXRS#7tXS^Je6ta+6*s@kZDojKi+EVj+t?MU`}3Kl&r8zn+=UM+{9UR)nQ2? z3fjd<&wi<`%&h}&+y&J2P1YJNW4F+c+`b5`ZkTD?$8o*iWJu&2P&1ZB>|>CU5p*7!LiAWDK%X z6qk1W<*7yaVEOWxw|ZzQ4x^P;`phXw4;wQsT_#5G%fV1E+q9cb*U-?guC9(r4md-M zmKwzm{rRhimWwNOVD}eQBH(C>aoWV1D>3M%v85#?De3h+@4n?D$)scgRDgr#`GS+6 z5^<0AA2Vk0tGlJ->7R5HwXH?~iRu`hEH03XF>-opor>-IJ+<_^JKn}&VTWhyr~4|k z;RhXS2b%zgY15h1tTCltu=AuU{P-^_O8y zN%HcHL7D@#4vn&pt?5NEMz1e}3AKPc>?Qy50~pW9@4m~D+#joA=eo7YtZp9CqS{W`68-M& zO`zJ*8Vk8~Y6&fxMulgPVEaIJCR{rjc;6sRh3vw#T<_c1l9qxC?6zdX)GMoTYr2WT$`fzQ8o6Y3u{C^H7w!|J_q&*Uy62e zSQr@Wg0acC!F|Y4xg|KpK8ZLMw0L(k9+92J=kha(!GevY67~XS zGsBYDFVO^7N-Ab%N7$jK_H!UUHdq5@!)v`zROOfH=@*kzV+`$E zs3_VJC3y(q$4@D(*wqZ9N7is2fe5ICZEsz?S-7aQf-Lt2D1=8gJ^ zp-XG^A0J>`SOcG%H?({5LP~##-r5;5TLX6Stc`;jDl|H0*c%I@HEI;62P}{0G*!kG zNFVCNne;QVKo3=78L!wj)DfOC%Wbh|;F)LUhCkZM;ysTKq$!AiQ)`e5@ZM$ zFm$ej{{f|HT*5_9R|6HrM}c?SaZXWh3G~VDF$Qy)Jl3{e>s?h!*IkgfEVDD*+rR$% zgu7De5*P4`suDv3`AY}rqAymg7?q#Lbain5x(w&!IG*u7oT_tnL+nF{n0KnZ`0*hk zD(&iOX{>K2Nd8M#8EBK>e3lbmbuWU_Kve(Nsmk3mdv^JaRlUIvKY+!O(T>uV1G;VB zJ_a|mRSXU4$+t6-V@o$DE1737t%q5lo%yUEB64FY6LSeTYbq7jhQUUHQ77NL7U}kgvc}Y>;%F^=m zY$5zJj(A}c#7<8yM?Id(I3U=oNI`V|Pu(ZP@b$~fKVV&OH z!L*X-0&5k6wEnd0Y=AytEL2Y|GZ$!oU}ypKcfxO@tvv|noE%cbVHB@Tmsn0oe^GZS zx`$RPTr*JU~b%e%k3b98WUl^BM^F$Y?6 zN`lpL@7mt<`3=!|2*V#-!#iZ^CL1xlMt~|p+l%>yb@}H2P1Zs}`*vp(KvY0{sHjC|`C@`j3NdS_P`RV3g@C*6 zdC-G@{q3IzVLWQssA*sbFJyb)eyzI>=ACJS79T)Kj9|~+B9ofK%PM_@`iaZg<{QRk zy!OH*)(NV6v)KtK8+`+J_EdH#_Ot)`VDlp8JnG1TYP2z;JPL-#Oz1PL*Q(6B7170b zJU7PnOLyy{5uj=5;@WsxIZfzLkn(7iEZ1N0vwv^dCWu$6zni9)ifUWyJ-A!3N%tSA zjO5^MbgN11rrbZp2w?bbbeV~h8~+M=;xJ< zcgO{A@AR}9Jx#Rrig6~M+9Pv&Y3AR^dP}YQ1A-s7MAzCLB{!NnOJW&AoPKWug4ws@ z*5(X1B`XPuY_GZXOX61(C#u;&&V%@o)usj`L$#hA#wqtut(nxADSbu_t@oDgp$j!* z-?WWpxdn8+4E3}lvvVAF?r|)`{jKxxdhsR6vg2$a9NI3E+a&eb0)mP~bM%Gi^TSk3 zN*Sh4X_Z?#i-}(DK}+NWf}Y6h-5a9k>_ZA~F4i?C$zXo>H!PxR)HgSOlVPm0`v-s^ zij+u!MCN0{UN$!+{fzP;GoY}E!^yUy%{z>4vziolfFBlGpu_BYfyLl8z^ z^gxpG)$ZZFipoYZ^TinVVJV`3If?vz6hacFsX_ekjzg=?&qz+l0Y=Q0k*EIM?%lR( z8KN|?p9!3-lZGtEH9UH-=5=Ou;_A;3J=*X4iOCK;?Jdyj4yhmTi(Rg&0<7cXW)*FP z#@==T8Ex{9I}lDWQ)$`x)5RUYXP+Kh(rLk0@X=5{X) zMtCg>4vT41%1S%7|Gw9i_&1EbZ2o+LBqDjSOs@5DzTkNq;QDH*_|5l$`V#0~VQKVwcd0F6Zp+|Cr%gay8&%Twd zEYSG{(B>j27jw<)vaWn^B{fs^GEJ=j#cTsVxgJ0fa|Vv+=;WM!NK!d-_@M09l{MfK zhH{SY*=y<`0_2e%`)(rWQ*&pjgA$xrCvjZgRxc+!K!Xqln6_S!O1{u=6>)Us6G%~;pshtK?(Ev zlO2dMFi5e##272s@kS!BbPRBGwK#Z%u=!4D@C+IM_5-R(#KC#-h85+0GSdcwujd~a z%98uE!YRUvXzf6G4HfLal7C45x1k6CWW{1=}7 z7l{c~21{Q5%K|X}d`P;Zd_MdI!*KVFIrt(-04VQ|0CXEY&8IZ0LL?#v4G-a z%5GoHy+wxio|&=0kqVH4@MlJ~H4uFnqO9MS4uk^ZzYOHxOz)2+j_=@B2I0Q#+{64I zWGI=_A%&Ijul*B2R0#z!w5669o1h>nT4m&?h3t=uRvf7B9Ne4laN)nR*Dt|bYgE{^ zkqP;7N*1C61uF9mdm5cLEuFp)j*6Q`t(-U;=D7KJIPd>6@rf01`^&Hc6vdXl#KA2@ z@^eeuSzlu^l1bC;$98-CM2>)XS)Lgj7eN&s@6DchwhG3+WyZa2|0^cf5BWVSX%kFJ z;tz%(Pv2i)M4E40V6<=KfJT6ag@J~LfiNg0IU+7OA~`ZR;vX&n6fh#fI}ZE%={U>T zz<&fPI&UPM44NinB?YB`{4em44R=XnISe4@nDk|4ny_&+M;uBJqeJ)hU(?DuH#j+V zdz+#{hV?MK7~5O+w~*pXHQ2w30%9MRFc;**XDCrp#HNQnSu!}~i{>raV54OM1lf3^ zWsK*rOaEe^@aW2v6WbS*H67<3V& z+6TjGwG;`4UKoA=^cYszXiS%xx98?Sj^y5i$s zu>nPAWm;)oF3^}ZO$tPuOr1PG=^i<5@%oSAkoO#cBDKA#{o561bs~1@y>T)DUqqU- zdI`d^eO1g-v{LLWW*K@WROP^g`shkl5rKW{qC%HrjpcpU4=kzqyd)w1|`yaL=xZ zF7b+*M)_OH{9w-+V4S;oP_3)6wzdT~mib4EHLJEX*kkA)04wjum=tZ?`UN^JZ1+SM zlR}X{QMRWtiWt54)(|q$9}S(bIpH4{V#5w8E4h_noPf*$LSoPrYeSr#6DmrEk!8W!}=a48sQZ%IV zzU5#5M8iKA-rI1*4(Vds9UH?Z;-*aQ8#)Cp=^=7J-MaI^MmLO_B0WQ6<|zv?2Hq7H zyYnH&PWNNBMsZ_iOdiPH&XmO5JVD|lvOWa)ZGqZc6q&!fgG0RU*lW^p#Io{FW)1~o zt3mu#5|}k%;Y*AbNQ&vc_lKcE3%bPSm^_rri(buqZA-Ic5cQXTZdAQLE_SbVdjQZN zaZ;i6Ko9<5j^`y|D2CdZO<*8oRXlHGw=GN7b;dHacoS$-fxNgY72z^_6@#x_Rj zvyZWYC>WL4i^U;~ZvA3IhuzQ-1L@|yMG0>Z78f4pZErgvMoA>bcycK?f$sf261&O8 zqh<_6ZPVsqNTgkvb=*akMmg;1)E@=!EmqX_cA{#=xl67rJB7UM%Lzl;8F?uTZ<|HuF8P?ZaL z1)l*%Rc9Q>m{ad#`D$sFrRdKX`i~SYlbg^^Vf?+7*}gfY)&6V8H;6%!L|PBDE2C!`VLoDfMBE{T7sw#*}w`N$1*E-ILzCcbz5rK+GZyct$|bC zjQRN<{=+>_@iEsx8;Yw&gs^pbCL_+emcD&i;oYzmsqTbRyBU_4&d=!a?1u*B2m8*G zr1gJ>vwS^*$IA_)*3Rr4;kX&dwIycm^Yirb0|^N(GK{{Pqj|>I`h%GnXQs?da{iOf zPe`#UR8CG8mJGuebaVXq%1d%shEdHNV^VhfUJB4D;68tORujxDaG3^E=iFWNuaKQu zTTIQ=+1Lda*SCdFb9BVEHF0$_Px;>ean`+(dBfuo667hyJlcn_suZQ@y%l@ci@Z8j zfll%LF-hd-7Cw|SUeSSaL4<`A%qs=ijUZKER(=t?MNJ{iw1B2$;EUf5megwpP;EGy zgO_+VKjWN+4GVmtZLdQVHX`IjOr~RVy$3k+SL1YEEs*KssHAl!v$>tRS5IrD-6Wq< zFR4W*B->l=O)+mWKAArXv5GP`KihV=u9CLLj9(AW7MnuiW9TDiOAKU%xF%OzGMH^@(l&I?IOJ}$KeotYP{Vg+n^+_VYZEOHG z{i8wqtbsL7wYekQm|*-N)e1D5pHhXIgI9W*3SSXvEby0^pTp%^%~B<|0Fxfb93*>T zzseZ7IkvQh?ohj6*Vm%PImZQ`&N?^1F0RrVdpHk1>szEbBD|Z_?9X-JyHoYsxqfX# z$JWXsa>?hbIW5V(ewyxMN&=G2@9doP$||CM(_i#U1TyEAN#4GquT0jJO>&#>xF{RR zzORw&cmf~CSk$^yrc3riuUYS8Xbo@c=bVDijHAQFmx8JXUb=i9X{E#bi@s)gMM};o zdK=C@wK8v;#+&<{?&p!T8Us_yIga#_e}~(FgIXMr6t6D`;&png7T2PY(f?-J+l~lG zwRLp-ep;_lJ|TuYplqss%Sd5pc1T6zM|j&heI-$E9%AFD5WW)(?HIm^tRq|L6YSGC zdTDbizP$z2draul9t)61TUw9#=_V3vLQikU)k{IiR)Q7|FkhTTl}$_*_}^Y|Cfwpjb@9!HkP#MdSMq8vcw#%f?@)H>bj$*lA542 z$A~iL_5nhw58D=Aoy$XJ1!7&j2yJe7=bh|!uOAj#1^}qG!%8_?*K;Uxu5y)Njhh#TTn5c95W?Uptuovti%NmujN#dU6~43 z7kovuTMU)09Rjyug>JrEYE5wKx{=z|lH67%O-x5e9&!@17@sO{3T>|_CFF%(t$f?8 zj)v^EK6K*!n8-y~fkIOyc6TB{wgAr7ZUj!^F-hR__dtUKmL8T`{H ztY1d@S2yT>q#G-|1%rxahgb8wEw3+uyzu-#Kfv`TuJXkuCOhT zJxRFmwG+D09$(Yb6dG7H*=>`w5|9HPzYWk=X@>yoV71hqb z%9$UTgo9aOX?(W&3?`z|@*P!no!o-zdJ0vD#2UW_RHRhjnWI(eBsq!Xr{t9DM85Xf^s7!Z4ZXA*TChfq&kBvPca@hU+ zzSX}+bS2kJ3RSVO9Y4fVjxM&D!bpRnhE_(Ya5}^!hlEUSK$)FtnP%#k9#xv4xbgpl zX{g1q-wNf4-!c=^*w+oU4m0q|k`d&Bd|q7qrhE^4?1Zu)m}Q`HbP%Bn&i4Vikl<=7 zPxtgOo*2GBroxY{|_T3wAsH$sY|g)U-BH_CU~EtkE&lce5{!h93;Zs}dA z1W2Dy^}4`42Cmp?n@}gP{@uOQouAHARR1ZC)!^Bn8y#H*R5kNR(EKuHSsQ8C{49Sr z*IWS5lB~jCy|9`4)^g}d$ZJR}RvN?Z-;P7FFvL9ilEa~7E}@l?IFNF9u^iFN9^#VJwbjG}Jb#FmuS;ncdCk3J|8u8`_l+ zrl(|?oozFX5#Te(j9VQz@?IjSsTHBy7)O-C^JK6i|G`ia+tZJCgukv>rzk~Ch|&xrK?*^N#1?STp@;1iAol~Z zlk-MT`Y^6SvW-wsZbsBkcn^1kctJa|f4PDE&udQ_u&*>J9f6t96+6#PpA1(q|_Q{6FKd-hibR?3h02%*>t+R}3YYV$| zTZ$HIarfeZ7I$|o?(XjHP~5e+yE}xUMT)z-lc2$!n{&?h-En{1U+lpcS=mX}-fQi5 z&i9#1kSjwD{L@7*%H-hHl!BVQ9wTf{E~zsCaI^C)~7uft#-QpJU;Q!tnZ;33JGN;wnp|iZZFOCQY-kWOL29Z%CYHlm3ti9 zpbhc!L!b(y4ERN3bOp1zxUa z!)&f1R*>2gUoQxwp9`Yng5Jz5)%P}WKk%#=S(ch(PUH~sK0S0eAmEUL7|c4?1iCz* zPFvqP-2|pzh0~_=t*C5h@ctONnfkq+C@TmwcLdElLfUU~eIfHLeEP!9lQyINXV%Ao zXAI;`iR*~@x&D64CA7Dv>N%SAFAN*i2hnZ|ewUMnxxW6ZAFGANr--R?teYn(*;Eh2 zmY&QrJV|Bf;9V`NSQ$IF>T9^epU1p6mCBn)#i(@E*VA%*M>uOR_yT94_Px*|_UF6u zQvPT>VHV}bO5Qg}ses@J`m(qY%br`DCbr`}!$QDHMQP7aY4m87>+=)K-3wEp+MoBUeuH`*H3`KR0g{&n;13;AJhBG4YrbDJ}C7 zH0$pJuC*^#D;}}uZrZnJ>T1=-a_hBJiB0nQOYa5%>eKDruNfE}m?8dzke1Gf%s8vcr07IUQ~GZp0J0-1NDhYqbA) z7yZqvR;afoxvi{0#5F6uy!zyi@pO2Yc9Yi~N3JjU=B?uH+v9})HTBXi)a?9vj`nsp zW+%c673wJOdI}kJM`u~5lEXwAAf0W`%)kl0R=f;Q290y2N)yiqC}1E^)k!Ye?sSqv z9YuB6$C0=thI#Pqrn)lf;y608UVO`I#l7=J07hZ6*bD~?0iK#atX zw~#yzLpuGTxqR=hAuczpL%Q77FsH_`QPIx5d1GYrkBIEWvl0W8P2V;K$vR{IGe`; z1}!kcbqG(*oU`%s7(j}HdrBE9fDu6&Np%$c4;Ecq{n41ZtbzoC%zl;|-ui>J|aD(Jpzj&O0Qim4@llhrsVabar(7k6he7 z;eEDOs;tPu326umO1G9jr-c$80Vqq@S$;Q#(gc$wXd5&%!oVZOSMVbZ0peqaNK~eK zt@;V^p)01w@sqC1)!dyuuJJ52(PVW65rcM4iI8kR6glP)KbvH3k4f2;;=9~mXAv%Q ztk6-XY@4W7R(WL77n=36Sony=sF4SzL>R!em?;c zw}hnqxU-!NSZJ9^WaY<+1~dYOi-?_W51Gs7D&JLy!ttd^F9xA)VRD~U>cw;Qa+UTD zY0jwC7$-F@gPqWND_(HP{~L`6<0*%h_}9`kApyaYHu{@(J%>7@Att1X2nkiBbLMVD z;q}<^4chBN7{)|s&dvFp-a0lkG_Sf@_vC*0Ib#O)>G5Z->*?dDwiHTm>`bDRO)Rut za51xhCEeSv>=Mw6$8x_XP-^r2*SACx!f)ot&Ayit?Ov?PY2*3&X%9Qk4w2Vbe+24ach(VH*k!*MB8>6e0rlmikKg=AO!w-ImmVO_yiW;XhN&>@>J@HM|S}AgsF;<1&`cw zUqfz{j^b4jDD*CvZYc{6NApiz&G$wBlUB24oM%w_CtZ&x*vN*58#XqV(1B%TQIji5 zPS0VS{P{d&DW3;lErrT{X9a?gWR9VXUM4c#K%~f5Mr5^`6i20mu`BXF$m2wFW-w zSwV`{J1F~wlbv4_=djBtu=v8&kPT<4tGoCT=Voc&7OPF~>A`}AzhXqTaX&A2*FhT- zZwv3zUMjp>tv#9ax#A}s23&#l_i0B`w)?_L*weo#Uq$lp0t;q*G)C4fuuH^e=)J|=bUMi5dBjv#FR~mSHMZ?e-m59X z`rG@v1}k?mV5}^oNUfd{tjGFyY5_vh z4ex8m5Al!(A@)p|JBx6^vu>B=r9>FuC>U49oz=us*SvOv6c4E|6_C%pJ=Ak3-Q=Q3 z?4^nqEBO>XJ}z(3oLA0ey!YEDo$*`I9YovQrqM#xt)ay+#O3qk`Ev0_S`g0<8R28j zyS0M~!p+*Ti^foa31~Q>Y6u?NO}@kpve&62?6m{YU#Bk0q@G>Z(zAyhS*928;AD#k z(xJOvKq6)>Fd)r#SCu5{2sq-f%h+r{zuQ_&^^G(lp_&6Vg zfjigo#2hhjeMBEg~KV4 zIDgd1^|ut6J0& zw?Zz8?=wJHPt7mh*O|EMN|UeiROHkfViZ+HKjUjOMnAzLPy1HY$|yBUibSfp;uY)e z`n2AAnEKN{^O1{NCABuO0HN;sn##O$Ro9S`y@r|$)+ffxu6Qk5Ym#r<@d5EQy%XXH z-y591^76=tbSXn%a&ta=1w7mR2?#2%!1xpwUB7@ZJKF9rPy2kl8uSVWTD`!WOso6sXlp=y z2PKc~OIgD<#H#xI)@&augC2x2&dORIs&8}AwIUe}M4+NS0nKS%<*2K;IeM}Y@{8gh z$1uB$hbX4Bx(k=xg5CKj8cCB!XwU^_k6UEhOS^hTVuWK9`DlZzMlMv{BkYN)pi{JYIF0O5)&9nw zjePsvamTdwEvYUPNHI?Rm19aA1K1MLq6LW2ISR5kS;|gGvadFSCi5CSQ5~N2(HIj& zVG09RuAqKeP7(4H#^AFds)Ff()KcdKYyeyw22L*`ZLmwW_oMyBG?!tERm2Spte;lq zTp{Ge?Z~H%sUr>M#n=G|9(6%A33g%R$qbW8j-wM9iD_QE`tpbBca58?E8}_??##m; zA4PXn0Xo*uk&`e`5TBz$ycY@{YhFd8DK#6k^D}j}wI{jn|3!EQ_+8ThmMg8RYG`mW zI{h}qj_0Y0V0%hLk2u3~s-c**Meo>W9PKRk^6?0T0J!_Pde=?6>*{aKzA4yp8D4_h zGF_AdYGU>+#C}fzy|CWAa6)!8g$u<~oDWrHrwI5VkEO|-ki|-<@Gk5@JlToA?a{ZeL2YkI00l zZaEri6p5RJ@qpp9?#}bo2>16zGSHOfa8pxa1UF;h{>!RLvh}#z;FA}>fNej!@O7$A z1Mnp7%d;A9p35}oT0#~0k8wzn_y@5D(C_#M4l+6pk+A4wUqJw3U3UT(56@3sLXfqgW}9pXhw zbzSdd?3v=OC+)`3AR&JV-3s@={duodoK%BDKa0S=<~xxzvZtB#XcQx57aeFRjT1M3 zulTS%J5MbK&>tp*LaRDWQ#^I(OTU?1ffd||XNgK1YQ()re;RXSkW9b%)?`cmW9gv0 zD2w^;JInF#lLKXBXHykN{cHacB9r*nU_%*)+g;*v6E~jluL(r>GVi%!hV4>@;p0D^ z5aG*^D{JY+9)vq{DJZFR?J^Qg=XrG(YFhB~^An>g*1?8Bj^Y{LxzMn|#vrfb;zbSP z6Ek<@>0&`$t?wD^?dF`=VJ5}8Fn01h!a@7`PjHr}i>DySXeu2hxX@;2cb$~{ zcR2)tSQp>|mD}l3Dr)irM^hy!F|TK7(MWY){iuou@`R1$5Wi3>h|R~y%1zglE|Db7 zw7NEEcigT<1FUQ#_YEy|wW*JdGnpuxZdr>T^=Ltni1jTksT*A~bW@wH-rqNWFv5Mg zW=Y{OH#puh$TL1elHa@<;?PwhE@bA41~hqW(S(U*GNIH%YZ?cl4S0f8@@EG=gpHxrweM7t?k;o`rhCy}emz*htaw0Mmla zlJmW+y=e&0k@s_Z>sP(??&!Lte`29{IlJpz96j4y>cxaVN2h(I#bk4J%}2l>-xn4T zPzP#MK|3-UG*6a6n)W2MYu3xt#1)@Cn+tdU_=u+zBq+bI`FFM z6w&`S#lIw~@xLf9T~IxM_4ga}cS;l{B4J;>P%-@Ucr0)D_N0FN%`Rx3DM^Vg39(^sqd0Q}_eN z*v)K(iKZy8AZQ#~AK#@X4v}{};stzi`?JlQj-EcS>$JQ^ON>Uy0EiklspFg_oFEL7 zIjsAo9M2({^6iF4@6&%y%EOCKQaJEZD4FBCfiBP(>yUg)d}h084p!rda1Cc%3=V;} zP_h7C!#UXCqV#k;eO9?b2Rk=>C*JNJ41E@Fb@D5z02 zAXXTGpE@{R)x?2^OD_1I6s+k3oD=|d+z^!34#R`oWWXw#ouxAS{cknVU+ersR^>*5 zbHfZcfDS@D;P!ef8fwszGIVq=F}JXFjje9>(_xco;^Y}RJ(pykb0sXExX(?M$2Vzc zyJ}Q+X0chJOd&%bcP`uAWu2&Uh#bxSFq~0({YBrb!=BW5l;qyuAzVRj!-xLTFzM9X zNZt48i$NojDk`{PS!(6c!fAv^QcVS#w_p#SIZyg>R)6NWF;DvGX-414N%|KUwls3T za!1XeyVYkaceF^$o+o4Np(j@j2Pqonlc5xK3pL#D&JX!0+oxJ_vP9@~9$AAs|^Km4>$ zCY6Tp$Dl{FSf0)rRIGb0WuIrVpkOv9yOHFw9Xe`Q|7(_o*Z*y6roozs%T8$EW*PPI z_J)<)J_GTo$lM~UamU$=mr5a{==u}&j0qF$6zz|%sr6hFN}=+vD10JIW1LC77ST?# zal^TL6T&-YVf#v<9#An7g9rRE~UL zV$^K8lMt+UR<96y_g|G#B5Rw*QlHtX$<14FfYh5*LwYt!f*?WPm!>s$sMD;&^Ce@F zpTGWD?8jf05V|TZN~Xq&u3>w#m3ik=8K(xssxp#` zn3dv}eAn9#(7j=|9d{JFp|_pwtRkerrMVc_uVH8Q#=7gi(k8KcMl7shf3k+!8U*{t zuXrJ+oqcdm?iyFSqo=pRGqM}In?V;gQ2dh2_Bvt)<2?7oT2ABTv76m)?YdXbm0T;R zdXMT&yzW}%X*hjg7UU8~VXwp3c{?9fTdm){ePxdt%LZ4L5&AhH0__5&{Z9oVe3L9)AR~M`C#`hq%b8bNf)!z8-M*?3r27dSdipudWw9 zKW4OrPD5IpbSG8F`x;!Ne5l?ZPD|)g6{S=(pN=Z1*>5}#cSE1A$xvHqU1o2cjWNI4 zx0#I2)(UI-)_b~}%Y`TAa3n~2MklGBy*oNCUi7mdV(e&we6a|Pd+hojHfJGV@kh}{ z)+GO9MMF{_(K-L~xqp>bhvWJP+HN6}{r&CO5v4Kk3O_{6MfOXs7{H2Q<7s6Y6~BXu zNr$b0dPG)}!#RW{g96h0NVx$^4(+Pvew-{^9BOMiv(n{oJpRp~`$a$JguocegobVU ze&b#pOrdo*y!v%o4jumEL0<(1x)y#_ZO*s@k4s-|hP)4}rxPi-!0lbkg7bj@f$~aO z63PZJO&O{{!~5UACb{$9SO_NgR$Bai)o|YR7(8mu6NPx^3dM>m(jLKp%)1kbZ4uRz zZ-VG@ZT!ZXEi{f_{;?HeJoxkcW{m^*Ap^2BQLHRU9D^OiA;CugQTyU z88mErK#;{GezX{MRcB?I!^>6^NJrkx|9U;@TB+WZpSA6HJGXzlGa^>${-_x%})t?8q)lsw&DQ&5D9RO!atp7lo)i4bxYCCA5J=L}$oYJk{X!JhlfWTL=SWpq?!7Pk(>4d3M4o_v-;1eIL(Capx|QvJZ}!AucFI znj%wIliA1pOa$zmS6h*#Z$L<5ex?TSmt6WJ-`%r$n1asp9wu-E1x@667tSy~Mw>s> z7HV;{x(gpDG1q%_I36f0g+i5V{+h@HzGO0WT@Tnvp))2mX1+aN>L)+br3qXp_?&mM ztUf{C{PJ&Pn(y1kleAU!W>B%Zp2q{91(O}IYyDTaiE3{&qV?i?LD+$wmi-#~M8FbG zBj92^P2b~npKX7gAs)~;r9_S!^baTYr$|eGS(M`UGVgjbYCSJVv4FiAX~9p+)1dxh znDN-A4f@(-BbP&q{Xh=PNo)5wfVg1Bwxl3=c5m`N!u%SfNZBX~? zO>ORToxSHAEQp3g=ju^llmGHn57+hEC}FVe6LZvk!P_NzjDs1sROj;u!77KH zekvfM6;;^6F@#9Pk5Bi-?)jli0|vrAX%XT)$TL>6PH^5e<_xLB%$t zH>$QPT_;^O8c2T4COC{6^O=PA?t78(=S?_Aj{!Rae@HrptE`%O11eo5S{EK}Ix-t4 z>IQtwuI4({+v`&$lifY|d9xb^q_k9l@ImCf9SHtuPS*F{-6dlQMasbccEDB)6VN%c zyUFzXK281Y^SNyxuRf=eY8oA?sY{^C{$1na42s^%RaCCM2*t0D7;=+evC9&kIW9w7 zrX{>Nx}W;c0Alf&$yb$cuQl)O&jL$uXAfT=C+}xI8qJB(;5E}8Bpv32>EcS{cYTsv zY;RroeY;|9jaJ#`dhE2fc6s+I1dPs35)y*0R>8A>X%WFI-Flweqm14{!0^BEk|J3* z)(wuM?pD8C5f$6ja`>n^)UYp4s&D_uFm?G1(jg|!_}DARlcaHD8gIqFldrzJ(>pz7 z(YPDaSGP&yqHbi+6)n4k7Z5a&M4!-=OXNzv1r~ytGZxodvE_kgvM-ksN!E=_BAW$N z!>{dWdWcNnX?l!&qT4f%GHTt|&r$w<0!^`QS7lLrE1vg-Z^DSbE8@YP(pH{jAH!<> z4T$c$UHT~2mje`qmQ`^`X&r<||Ik5#b{~%u3P)$=Rk0rrDw%wNo&q7M`l&vU@yW_n zi6ECaLHr?Eqob1_*(pz{@Jb;rra*illY;c1Mt@xci;Plw} zxt^5H4B#?ohv^R=kJWygLCNud{b{SV(B1I^Co^VyMl2tyvZYgEwhpABQ75AgrfvM$ z^Kf+BJ$J1)GcS30d6touE@`WavP6v=*cbNhF>dgnflK5#I*0bzkpR-*_0W6FX2}eY z_%4l{rwf@Bg|VLiyNj6?OmQv>)>u%T5&y+Cq6VUBG=u@e8YNCJAy|#wk!z4gVCXfL ztl0bXPP{&UL|YyV8@^77mP^C8`_xAA8g+G%;~Kcx-{01fASUbQ>@qAU`$OLbvNf3o zs6R|}8NYvg!cN6;SkA)3cDJ%3pX9O(VuLa2H&&?UvM3k?G2RE*K%mS694cPTvD*J z|936FWClDW!QicJbqw!^BgbOj)?W9)^}?Shk62|N>O*+@4fukZ$)Ap&B<&LDubD@o z|0R=MmS{L`_;(?%VyKew%o#Z`vb46UaqAMqfcXh5ee9h+2l@N=@65jaYy{mN z?EV$Jd>T@df|DIKer~K2RF2WhpARf*3JQ$QaseCfQN4?l%#J+^TI%2vPu5?mVLRd0NRqnUr~%k*8-i^`#u5$^uaAAv!C(A3 znR$UW;hMN+Fy0YWW(qM)zsf6U%RMpNW8NK6mvH{AdNSyQ0_UL)coCnVj0!FBbxs$7 zq}iG{_r+uDa_tUy461iOwFnL2rF6@Ugp?MnMhuvajfD3?j_9|pN3EppTHj5M$d4$R z|M2nxmPb}7AH0iVL$^CcI~A63)Y5YwA7)ZNOZsMep4*l~9P~YPk$Fv(@Z{8qi;~3c zBNCA<+6LXvY(h2vz*t~pg04zXVW0YWt@5V|%Q5lHdoy+@WE*oZA7+mkxbuRcG4^<0 zhVVC3*97si7M|(LgT6q#<9H{&iD6~}k`ycsYM{TX87}3Q1YHTyDwgEZ^pbkmGe3mw3rJ};_i|x}HCxyg+r$hGYb6JPx zG$7jm{;0xB#h~b|UggH2S@BF+T>qv&Lmy{pCO(BJUBcO?qp1!4V;2p9z;?KLYzzAK zrZ~Bn``57o+dMK^L4T?WCpm&+Ee)@%Rqq$-=f{jWuxlbE0Jbd(< zQl)w57oq;$zS>pUitHvS8d}_lkhEVD^+!)C)xHF}S8r`0|3A<@dVsvr@jQYm)_hMg z(u#v?d}(8_J6tklKjQQqUY@I{mZzn)H9@KnLw;fFh)+miQN3R&;bD=ndm&c%;!5efWu)BrbZ&l**9jR_ zRW?z<+TC0p-@40*CO)VDZ=WSOtNkL1NwvOhw0N04&b*0o(ET7Ml$Q{~46z!a0kS&f zd&4gWh*X~JE7Gc#Bi3&rkCB95eP5iKvH=&$-?D=(%gePMga(E`A=MJ#$2B|MwVxp6 z$8=(n3ndN(hkex*o`TkSiA18Ns(^XFC$`pNx3X@%QvixJwCqtVVP?2qX?rP)sZa1t z3>SysJKpZ*{L-ywZew%Emye*{d2(nv*@pPRadm6n^^#9xmbXu6W(&xMTd_Ak!B{CQE6ooO71LG++B1+lLf zeKmyk&(F6Z7Gy+oZ{59oBBXx52+_wCu#t_aNp;`K7l!$&mwcb^6^}%dmIpfuDIQhC z>1nM2g17TR zC#AF?jCRluEKuO_#f`-chO zbaks|TG8%T61AiLh3E;y`GEZQQlPSXVUty&A>$4Z7x>9X#8*KhzV)OS{TgnHUFd&W|K zs$6BpgpRya)Mr=g+=~LTs)<@}m4`;1Ggjs~74eKM@e!Ef8*oT>0$W|1kWn!nxgmr2 zIdWy>0Y$Xk&4mU5C^M#esbZX0$4Knm4NTm8R4lCl@)9hP(8pIPy}=q!1|gMI*Ttu^`EAzMMlwDNil7uF551mq;Uw+Y8>MM`H~0?Ec{Z_EZ<3re8UvI#3$q5gw!f|1A5pS%2&gCvFt;*C z)oW{YEE8fE7aM=j-n*SgMT=2rL360L+}@)MjcIMp(f)e+kD-HgWWqraxcFa&%ScD{VYx(r}TiQm<4IvQ$iLK>3AxL1L=k

    $iIWf=q+ogzrg5zQjM(>8G+mJ9J_vT? zzD^;XESZS)8AJWlmi%yXv^(e$4Bo@UX~2z_0R$l!`U(Ep$Ze*i&;pcXSR zeqcbSHgyW>Gu^Y&Z+Opx$$$T6dsqFH#_=Jalg69jFP39~Xb{IClFt+s2enako>cj z9E?>wkQ@33BM@FoX_p_0wxb_P!%QQ!2V8~-ctnjKIC7ExqJg)$zWlCJVsT1S7EePS z`N{JG&zx8jWBq?9jlwY|YTZ0t4yiQ7zq?MBDizS4$_HJ3{jI$dr_I6|&G?!fBS=QO zWP<}<-`f@o{6L?Jx2BeK^uNND;})3|PJQTh%nzJUMg}C_P9OhNmvwf9z0$A$Vg(S0 zpEVaJ-{y+a6yE*ULr#f?^gjpxYF#lgaY_GI>w?n786b91}Ayo6>L^t;D%5n`JrE-y{N zK_vf$QjmE{28^sFxwyKz{;zws1@IXmrwgH;p_HWUmW;`0cT!JQEKkb>ErW-9v|gnAEm5Otz~DXlHvhw65Ffx z-7k+aB%!U*Am0}Hl88Yk;0fVKcGN&xzW0^!rRlPeb-IzNaSN|U_w|WfepKN zQTyKBU`jm}W2v6nkr_LIBqy{qY_s7=jJ28QGLW9@b4p_0`4G3bfLBUTwMw)uxgR?~ zV;xopN?Oq;9)F$wjr*^1u*BIwC7Eq9Wqt=KAyG1 zi5xjlqP%4?&(--fviW+uu@cElL0igTv>GOwH)6;c*`4h~l?7k4x0U8Sj?Jt8l4-+{ zbm;lWgg!!Kwerxa-s@Z`7P=oho2M#kSCXzum?lM)1vN}VEz|I2W6b8 zQ^L)DwMDK#@&xjCDvO}Sx5K5>qv#)9Soo6uJ>8W+v5c-R(Mg+!p|7v+9xKX!%J~FQitk22ilOxvS=ze&aqjBd2Z`FIv32y@xom| zR9ZQFKK-Jt?MZQ+28wgoOG&p8@#)PbY;tDyi6 ztMVLue-sDkZTShQhavX*+>g35XY*z9rKZzMMh3!dYxya82M~y^E{TBX=RCF_btSo;@RUu)IGOG_| zdhR}r!H}z%Bm(1S=xG=T9)XcW-kU4lc=Lcurq+>ojG6S1$wB5-+LSF`bt;95^! zy^Qq;{nwo|`<&)&hqma2U;b~G<~+6x0A0kx@wm#ahv!-C7UHMr)%o3%3DMcj7x3XZ z$z7gKP`o`k`&n=5j#qnD$1*Adbn*=9%t$kvU#?ag#Rt?|uiqO0$ zbFRSD7mSQq$BgPnG?}l-+C@8+_|B$h=TYLz!Ge5rBJijq_2!VzTHiE?EEvJwK3ogObfQxwO z4hZHd5I&Qy;0i69m_Mx7U<|XJ{yh=up;O<6+1x1wMm%^MI-8 zgse=)J9q>)Dc8&%JR7#qCbH;uyIfdIQMPI{8NFtO_q@R4m{+qT|2dB1tmtOA=G^{0 zSjqqP1T0pvjG{c}MF>0fo2;awMGFP%SSr$8_h%TK~jZE>)$~W;ZH9rL?kX#PH$Dp8@jY#L{M?Hmj{oM#?2yBe zo7YXC(xeKmxZ+fq;+;5Zzd?IJM&BKa&0#|eEcg|{zm2J{xv?~qkqLMEp?G9s0oAlo zST~y}o4Lf1txJVnI@%J~S#aaxxeY}8%aoKP5vYjyuJ&ce{_a*T#=GKd*=@-`Xj4cT zC*}slAl*J3Xff4B05dHCc-l|8U5;%yd@F~aljrW%?cto?BoyEm}G0qH#bL! zg3sE8^=@=(PAnMipJSPKsrltm{~TKQq`hMhQO5b_aOxiLUc*eTOojow@D9w|6)=f| z#OZUZ)Y4II&uAUk`8R&c22~wl%aQZM6W|@#yUqMSm?PQ05BWui9sFm15-sb#cU7*i zimE(h5`7<*lL{h6cG#>`vCPST^IAy~=kHxB1{QYB9t}wj)-b>}^#Qs!P4;a~wV&q_ z>>&^o$bGT$wjb!wVKjsC_~?wTQGz;1fTB-bio|j1Bp%b8MITQ3Hjc+dY-Vx=Q|lek zO<&FfM~P-1y0aw!+Jzk2zolR9P?k=bwT2{v;bPv%p)>c3DtE&WD<7{F)m&=9nxE}HL!D18>+HqzOFJ$uIqjov(}oYXq^y% zcnu@SkPn1>DtHzgGPzY+lNw(l4h$G)itD!0>5Gc!?sEH7B0wSxU^%*YN|3YAG%Smv zZ;p*+DZ7Nh%Bz{MA(^klZh@n#*IviT*zbV2r*yzG+~WtU)&;gwTXZD;%2b?Kpt5j_tqg%td4S?OIPvt#%1urFO0 z8X=1tdK8as^-kM!gf&UdFxU>_eXam+ivd@97@}jRCaHMsq2HgN+`-T1zta%W?a!Vz z%2(|O>+xazoFl4$^bkV=m2e6PH*+_ljbr^~y1=}L&NaquuQH3Mx$ywiNtm>%Gx59?P)99mo#2)HMOksDhWnHA(tCvZa$Nw?kQL#43+p& z-rD5qss=x#V9yM0f_P1JerTta^3Btqd6z}ulawyjt_6>7=uLhaKXaCGY zf(HxX4bp2xb&ZvSYNd72Ly!w7`X$2s(8B^*>(I$*c7j3zi{nw&;;}sf>|pgm$c)e- z31t8KQpA5>x|>ur)RXpSdr4yz3<5#RjmMT1*49?#mQeO4*a~cEWeqB~CU{r;p7p)M z{LI3F%HkYlF>8+qL0^x8w)UqN5&!K;B9XvwX?)6(!s_zc;@X1hd>C@>6@0oCny0IZ zcv3w02%(0ez&D^4cZJnq^Yyh0>x3{a9%`Azyc>ZLwW8Fk%NNfB)#8YB%FWf=((iSxu%U~1@@7z&o0t*Zf? zZV+w2!B$0-B*H7m>i9@;T>$;vhwTF7Izq*ioYb1~sKVlwoG$*loZ@UgN{{zc!DR># zcuA0DpbUYejEug_aZpJ`XijtCHl8H*`lk^Yj2&=+4tfH(3LT%5)s+Y`%=j2x zUmsrAcBiJvb=%FA^!rG_me$TefX_Ucw&Z71v}f_}Yht>t6t*;<`;YE~)Fmc|#|aEf z@(OG1x3;%I+dG0kEv*SMR)pi@!lG(o0eD~=dz9CfSUX~3;>U}q|E9v>&gf+-5SW@^ zjTE+SU~8JDwrE@cTakkAas?FU24*~hC9`MPraJbr=C#wkRn@PuGC~7mOENb0>AhC8 z=(MPrEb(*{MP6R1f@Sc*6)P(^2|G?C=+y5T%Z`t9bB!lWJuL{1te#5Du()t>!T2Cc z3v2v}ca~*(taI$lii@7&hv19DV6u83X2yF#3qI1NSN@V zh+`F>?(&N(3=N9jBU)I!lY*r*aogk8z)!EJv<8E4t*m>9{@72q36>=dav!p>vCTEt z9$6okS5)FzSmi9v2L??|!M&>8A<8K@vCYr7Np9S)PfbIRk(?S(s%fLIfMDX|Gn?Fa z)zpZi&%Lb%oC1BlP>4M)b9uq$;_Up`n5@iXHz~_7H6@3@GwPpd=tTq<1HbdhV{~B< z+vAg$v8o)(-B{N^yCIV`k@Bwff*U{LH-79;HK}4y2{2Yllh$(?#Q*+t_H0o5s+gXd zmzH|aZq1P1Bx6H+k=+@VMsmiN)Wi&QjGTmDIXSqM#s2aVA{dskcQBX$wqO~M>W!(K z9HY1v9l$bOEEZ^I_}MP4x%p;XSh$mQj*t(gbLL9AFFR&Em?H6e1ECxfciTZ)(ZJyz z7NrL+L4dI7ab{);0rpW@^(i_I4$hYy#IYzBwyUkGtg(wD1bU3s=YzoBEQBQMuaa1^ z?FU;#YKhvIXC}wQ8Ae8Vjt`NJ@=Z}0fxcQ=TB6d)oq-YVes01xN={l;KO^MyW@Qx& zv!Vu4^4hARqmd=FN1H7C74yqT-g9xS{f)k+Jk9x`iFXj5Bvc+%1+HWq3BO{UZMrx< zuaQ-lM1a(Nlfsj|U|-~@KVy`kEd1y81Q!#w9d*q}K)_d2VL<@a<+Zk0{N5bBdvD{~ zPj$X!szXea!_UL=YmHxEP0iu9pdvlTO-x`T*}SG0%nmR&593-MN=A5!!noo|9g@}& zZglin9v`k2`deAoFg*je4*UME^*pISc2t^6U&Uom^xBuv0$mu4s870VGXxb$)pIwj zw zzV)DdQYNyUs&}cqiNOAVte^#_x`xE;CdbH#+%&JuQ&d}6YE8JNp2JP~ALmYjrhX=}nL(iQa(^n2TTXkIyOLK$)U;H`vGRVt!y+(MFA>rw z)89`+ddDuafGyLBGdIgrZ3$Z(hy39Ptg(?g>HU%V@^H0QcLq>t>r9^&;l?uktpT@O zsx$<;Za{DRA{Vf~O-+p>)EF(S2rR9#rst*?+bnRLf~j}Jd3ahbArl+J(}S`U-npwU zva-zh=VqDwd4wbN-|m2bLC9sn$=|xa8tTFQ&uW(5MaFxKT+SmiOLcDITDIPr5~G4K z(5ERu83|pP!{4d$qP9W-2d2;p(n8`4m|T5)Z}9dw7R;Sy%$;%Niu?zRMA3v&WiKBS zrVXkD4K3`!YIGbx$yoRncn9N*;*VdOCs@A@hDm(9x6nmp9F3Y0ww4goZ6p}*KD|MS z8Skt#wp~-Aw*wwoR_4ymF0`AZ&Mznv5D|SoIJB|c*C!-MPX1w2RGG2JshEn7M?zxj zJzs%l?umzo@4Y`S)&W1buhM2!k;y4GK(#nO|D^rnt{aKy(0nN2P#&H{ZO-XnTxgX`VRtAW#5ZQMuhwuJSPf zE-rowgCQ!H{L1|i38WiUSrDtC1AKT<%fPg8LJ}5cACOZVZFeOov8ce=z(D`9j)v~J z%l56^Z60pk0ge{>dbZu&BUKqO+6KBoIi)Q%zOD{#PNoix*o>!RL458G%r0OIzKxIt}_ow zu4rf&S=m}ys+rh3T)SeRscK+irDLS7N31C%Z-N9`TaG3RHC0sfFBxd)YN+aHXdBvk z=xJZpF*dWdcXBn-H8;DWqkGNBKto4Y*TmlTvc8V4;YDLZbqyUevnyAu?3^48v~~3L zHFaIAt!*4EFP&96X=JFar3;LxuA`@OPTRo3&duA=#8R18oi6^M

      )K-xu~b7t7c?kZfjw0=i*>`&CJi$7~c2GnH`i8caX5?Z+9erb4Tky7nax*ryL^eA+D-->){0vz2(GEBre$vF zaHFERJTF>bOIt@*LqkJdS6d&tT~L_RG}YC$w2ZYb0R^e5t6$X8GSX95(*X5KRZSD= zQ(9U&IvSvAX;4cF;X?c+_Cz7w4y=$5T3oNKqk)!hXzJ+bp~dOi5M2Xu(bdt@P}czB zL-(eor>>y^F?4nHwY7m_HORP#6d@MeoF=GS==~BTt))RME`-1E2Snk1G&H~kw~m&} zg9x!EUQXwaZ>2Vd}h3wTRcPnYOl(KapU`Jp>j*V5D0y{w{j%1}!acnfWh($oM=L01Ra z)PSTkHGu1Y2-G!!8Z>pafn}h}Mps}HA}z20VNh7cC$J z>WG2}0rbuaagi3tpmY&~0B;eAAQ7}{3xxvX0#IC#LUPDPu-6I@C29~PY+lP zZ7)WQfnV4?QY<2te#b+yinVLqrBq@`h;8ph1JiH;d2X zEiRWE5fS0(>FI@x7Z?vu4-ZdwZ*MPePfvFM_yJmA-p-ZW^?ph4psL`+P~DsKe^1r@G<;;oz&WUe41BZIPKW@cr9`7Ef=yFrC~ zM^<()H8i=TeuG(L`kn}P{l-p#y5-d^72*Qin^X(H^?OoHBV?|g_g_# zoSmIqoSj`M?o<(Blkk;a;G|L56X!djp7alY3}e=KtKR7qlgwWXi>`=v^0rT6Uc^E zFd#p|`}090L&jeL%+Eo7}@dG>X-BaliR2i1(xq3#341M1uwm z5+af4Zr%!t&ndh;PnvspOI=+(?|&Ob4*?ZSgT~ha^%y+_#l^*><;IO0B_$=`Dl9B0 zEG&dSgegL%s1Urt5RN-xL@)qSpc45mf+{8&H2z~i!>O&Ug=^I3LPJC2KHdt5%g$?^ zCC&Z31$OLz7~+S33jUwRM?papz#3c>iaC9OrU?E95e_lFE7)N%EK@> zHwV|**;$1`L3{@C0RXzv)YQC>xBO$XZ#2)4<~zn)%7=go{+|c^H2-gcdW;?fXk8!x zSDLpT2%5J(3!1k+2Va}F{9>}Q8>dL~IlQ&hkZ@yik#c+y2x0o^{UY4`G~>#VFh4&Z zclW%ib}^1i6=FFimx$$ZnG9S~qW+YaTq+Y|xExbpa=8LJQA{S4O69m*hA9=e5*N!L z68Pf^8HOwHmeitV9uJ&?o?EV-UXg(z0f7-IEt4%Jc>^L`E|*}KR3gV9WvNsmQ$nIB zDkha}#WLReHhPXzT#;XdAK%LxP-0{)|nWy<$1D5SHsrFE2J1-O`( z7!eo{968AlQeNuCExg#w zF$)(jxxcqTKfFt(kVt@3mLxKTyfelxs1NmKICOyu;1{_>DuqrDEJ`^hmML+d7aW6s zV!2o*Rf0t-0V2e0cN|Hd6euwq`ci=Jj$>()KxeodUs8aqT(%^WOXX6Kmq^4wRZ1x? zfwX}0BtV5yq7y|1EO!hIR9QH5M$+Iwump@&T4{kgCfTjQVEDj zgeOM`WD2!dd7uvdTygiVkMQ|>4ha2-)8ftWwSWt{tn`SyronsDI0+Y@|Jg0MtbcyX}&CPP1Gl- ztEl)UlovUv4YDvyIA`vg&l8Q?s{mXEY2NyBxaVnB6gpX^!{A-UYSYoQQY_-Z*N&bs zbm|-*JHPqw|NP)$$&hS$xJXOojIm#y5-1FmuSL$4%by%Ha~0rtU1CN~a=X)`nw;zX=F!4ADfE@~NeOLSd7hVVL43f0lV^)6uU}L> zWfEO4kqc#`g{DVOpSl#tT3m$A_YPgHniUXw!5vV(j{wL92A$E&%#1>*l*%MhCDs*T zq!(KW{_-Up=XTniKD}2}rF~i~Vs~bgcHlBb>eaw;9xKtv>592emlVr(yL{-#!RS^g zE@--PdiM!kHy(z|6u^KA$bib}JBW3_TY#<{-=YD~qp{-b>kO$ZE6_?sRjX=@)n1-e zlotbiTr>>xEl$7k%&QmU+KJfr@RnRGa@f7Ic#>)qpU+!2z0N~|@intjDZ|!4#o($9 zhhK|$OWbYZ7DLJu``d(%+#**eZVs}#1?L{Vt4`L&)A>8 za4pC`<{>EN{vQ1!32?n+oYtrcIEeqoaep>HtFq6lfKcy(syXAGQbbmcPG$VqzlY zcnEKKMWm-zkCNug@s_wr<=F#;m9_S+E=!fBQDwvP{pC)%eMKHuE~VDi#+sjwZK8SW z%i!*(8CMipSmnuN_>yeYURP5gTI?Sh$StrjE|{$GvkYyV;|Z#c{APP%Wuc#kKL+D; zrII1WOB>qaE^CLhGt&%?y%$)#-0r>ifE|wAu(Q1`5#!+V?1)Y_HFJ@l-_~dbiHUY=EqJw_EJMHuP4z@H|REMk(k(K&q=rRs+%F&J_WrpIns+UP?%v<^4-LDnzt;U ze__LG+unS~WuZU$LyH@r&G@<6$r#tw^pNl;r` zYkuHl`UscOw-(dX)m>_fGxj-@l!X}C-%@gFBVK-4Wr0XT!Fvui6;eB68Z(wX|*&mODk=$aWETv`-^B0W|S>Y3A=8)fCvsf@p55IZW7 zDC)27cM^|=2E;bVaE{G8XDX&-QaR||xLhvu*mn5l0xnTv$p-q@$9Zn=oVh+F$K@sV z=BY9{)A_ZdMg3!&fBbPqb$x&LAZTs4Y#Ed~G#*2j`^RMzU#)=heKY`VX?b~Rc4i7! z$Q25?6vh!!2`-UzWZOM+Dc$U?YgNz&6)Z1r&K)2R8$^^Z~uV0~%^yq9>WiD4ejJH6QQQxHAwX&}Hb9hU!P^D^CG&U5Pz{P_>R&@Ur}0ZoZES8v^EVx@lWA+4QZhFYt*(qekd%kXWg*wp&s~XI!mz$V zzc-HBK*aQxZko5g4DRKv;^QA*3IA-GB+&}1g zaF30xU08CyR4P*{6+QW$`ewG5&zy9+&5bqGOP<1)r1d689B{#H^%E)-a2rTEnC7wk$SqBGc1R9kLApXn^z-85nMCY7ksA zndWgq%iPh~$}B3WTO?@L)VS>F=e*$ z>=PE!G&;8o`m9nRg987~7Uy@Ix85*z3=oYn-oNeK{Jos4qRJ--e}vEBEquIU-zVq1{hihHoTVeTAQw{| z!wG(+$!X`VSQU$a%q2q2k~4=iPrZH3(H{iT8fG#BE$#gL)%G5_J}Qbhy3-&e7jEgo zi3<=KbfbMR-{);jzYy=MZ@r{4CmgdskNhv|xev?P6mMZzg1gaST_@r4xBr|yaGvl! zJcPHdCzKD8=5u)Ke-Xs1fCm^V_h>69@MdX7EmZVDzh%d$^%w_R1E?3Is5)hI|WkMu? zw1pL5Oqm#Gb7vNLJSnz_V?5+3kqN+enFGp%R4$jHXPYFg2NW#9S?i6o?t7f>{P-32 zhC%|~nwp+Q9!fBB8K_)PoY*2_H3(l`f;v&KrI>gT&9^S%I20{+fyol$9Gs7|Uhr0c z$UM}wQYMp%mzSUyK@08Cnoydz))79-Ti*nxZ+^PP_F=EDx}&sQs{SV)vaiist|2M0 zrTwJ&j`7xa9ry4SvASBR5R1^96VQtslSt)g%g`b&BKQcG0P`s2%4I3^f(n^bu26`@ zP}>S6t`tkr>TBo$aTu-hB};PXM&-CnA>ly;w6+bcte0S74E(_jVra1&klC^fgG`km zEGE~)W4K%)TZ9zIc+e%It{P2Tp>_9EM^0D?kT<_-d2}EaFHcR+$WZy9@>4Ezp^Feg znW23JOHzW{FeN5~lEme*Mfnn9GbnBeE<>fggo}ZrKx>mKkR*&h1W+@?*cyiTz+7Z5 z-#O5{^;vwwyfxi?)U(=L-aa zMLsej0r+z`Ai?Jez#lF=s521fK^!g!3&3!BLXJSd<%2Jz!WY7SWasg@NQTdYaPS}` zxDW?oLbi|=2nq!}WcbKHu6z+>3VEWmz(wRnWK1MU0wv7nQ$OR80h7rZ9vOks%P*p?# zM(wMADEn8%gQJ1(-2p51`@FvZ4;H0<#v=nzgyBm5b|vUr_m#@3`%9MXXJp7+XwY~R zfL;}UMc#4>ObjpRBF+80Ma9E$NOXLB{QC9lVPRpx!NCy`5g8d7pyE-%H2z~KQ0Irs z$yp;DmthjJ>%-uxz%Uv3qX|3k0Xc;dZS(;%Ct~5~kOy1_ksx^@QD8n4PDDgKF8Dw?=>V<(gIh+LL|_ZEP|_Wr4%i=Ai3G=` z>?Z&8?wRt?D;Lig=Zp)K_;Qf9{#jEmh6u*?%iR9>u*wdZa#=Kzee(Q8_v~3IdP1O6 z6_uwsUOcT^!;laM6Nx8=a#Xa{T@o50xFg>Fg8CW%$_d0sNPUo2WILTZuT{sAjpw*u zJg=&H{_tsCe+h<5F;R&}u$r3Mc`f@nAugP4G7cz&NF=(m+)`>MDaZN(unpoUFbcVV zHEf{r;n{Omy-*^k+R%zYii*%C1SO%xLYd1-Jfr&O=E#RyDna7_0ESU@0wWU)li;ES zZ!>i*P3`J_HVXdg5DRbLsO}-{9fdI_DTAaPkR0e#%OG;4@fEQ=*#^%!f~J1$B)2TV zLqkKeXLeaI(P5~gY3H9nirw_nQq!~=<&v)Z!5Jwt3MmH*JPoz+39THuF4l&(s;jE= z^YfvUA?Y~=ud;bydU|?bVDR?s+c7b*Bf}#~CD&?$N&mgPRS~FnwT!ZVRg?ug1P)R5 zM+K6plV&GWUvg&Q;?{udaxS~n%_(6}1R>p(*{Oqq(vB{Lc-d+1xmz={O_g$7Tz`0n zCr<%1w_x{)cJE~Qtu9cHy009xz*(if0abJLsqRUmlP$@+ov&njHOXZh*FC387_%0C zd9IgFe@am>sihLiFyWNS#kg20Bor>R+HgrkrhrS)@yVDH z?SGJS`}ghIUONejt@u{Q6cPLYKw}Izpjz;daKS>hV<^?I^PJ50?)_wlh1#crpSSU+ z&qs`sAvC@gFiEP7=G0`aomDy}uCesY5(&E&#fl7PhcYGJ5U%f3^m(&TV|9@S-hVc_ zUI0C6oT^sZ^h5jWM+c*$quCEfdV2b2zrXdxymdY0dUtm>hG9!fONlwR|NK!(Pft%v zOG{N%Rc%deTWcH1TYdPv{k98dPab_|?}=$%%i+KM`JXTCs2N!rF7(^6dE+rdSE#3K zJ7;4<-K^mvuPaukx4fq5d85qz8$+Z*P47J-mt@>kal?xgyTTLV+vAO~KopZo&Ah zAlgYRmqM>6lrlZuQXg1`j&Ttmt$0W82F{l*GYWK*22j@sNyu&oXoQX??MY~y#g`X8 zv`N5W94{{p@PiS=Qkwd;>V+wbU+)|ycuUUja@2Fg@j-u|%IPZ4v~lngg8F9a8a#mu zmOvAbcKq{V96nXN$F^#|%+#V7Dco1x0^o|_OZi!egJ`|J0>`B89~}nXQYyDO4s} z`?gJ!86Ye!T>9`Gc>etxL2(;!Kd$}u+i!oO?JVS!Z2rIBJpG=^01T{i{E&E`2cw&47R`pKgQ-#w_x6G^74 z6QBfoiq9yv$;;f|45kxI43} zs|$SU>+35kE5SnY)_`JC?T3FZ?iJonv<#@7yBTN)I+J3t_4LNmoF!#hxVd999)13Z z{VgtzH6Gq_hK(t%9ex)%2V>7@1w$=X=A}4YQFF){qx3C#zy2%gEapwkQ??Kqd-YsY zAK!N4R?n(=d8g~u;1cro)(e1kI_zF{VqsXU-&N$%8NbE7MmCaR>y$x`${VBne6yP{ zT)9wgdB)VnC$?b`!}DVN8uqvV!{qpfWo|tyBeknFRnN%H&FA{e zV4q`T!+55yW!5wSVc3pA`w>kT1V$&G#mUD7bn%8Bh zbT3b@f&P^B%3Gj7DT&uwpvZ{0)5Shl&S+ezoySc-dh4uPWP;wlz>4k*f7sr|5a)%v z*UgHWGX2tq#J>Aaq|bw}QI`mY&hf zxvsM&IjJsYNZ(@ig$DY5{D1E@Glwty&L~rB%SWxV z%JEFSOM#`G87{{!xrNvpY;kE0I=m8^g@^EeA;#0Bbe9KwDTNfRJ#JqXy zs|HryF?~GAxeJ;QIvlm%_Qnhq=UyP*x-rsI7;!3N9C#~Zly`Zl8pv|9#%7udC0<$Yd}WkA7D9~&E6&L)tbVq4HYjJq>P~`#y71+4slDD@$fR;Pp zW2VpBiE-RF#&u4L&r~{U#I+~ttChm@uTZuJ+a+*8&r)!dNYPZ_l3bhTXW3)k`hMV) z;8RW~kMePJY_6zK-L7&-x!89uC_;fIt!{=omMI03CqoKxp$N}252$A;<%<4P6WhEw zNXXP83cXiZWWX&*@TIXLE2j!{P6r2{t-1EMrg?NuA-mr9Ohi5O&)yLMa@q1sj($=P z@tG;KqF~wUjdQ5s5g>W1uPn(c%gZmR1)S@ew}5F@meVM3aZTitrn$E78Vo6Mv0@RI zcWM1*-vAGEm9}HyZNZL#LTu6Zz?th~wden!GKvd;xHzN9`}Wz8LvyqjTp^vRPra1Q zArv`;x(J7~X{71i(EEM+eEa2hjFx5i4aaNI!_rmWGS?5l-h}Mh=RNcN;h3i&2O60&nU5a?dy)?=KAUxHT7JVqK=hbF2+=2B(hf z_Xedw#LTq|Dy>U!NE=4C0X=od5sjSn`O5N(fniu+67l-B%F!sX51eLR)G>O{#p&eZ zKx4>J<*1)<=bhr+AbCp;P3fKQY3|a>7@Rx*f_6Xp5}U#!AabH1+BJ6=m(Q#J@Xg-A z@`KwQpz~b!0CM{8^A<#ijEwB+>h9_3afztfs9HZcIXN>k)6mcu9v&`{NIr+RASlW7 z^hH%Q9esy+`RDPLax~-E(PJ7Knl8mdo!LI`9MP^Bt^wX+FS32~&%u4`ng($c>zKEo z%i&($ZjM$+)FgzQ<~?sPc}Aoxv1Nyp5JF^Ua(kZ z7gh$eCZBEh{J)oX>1k&DgeDSRNwL-pM8^E!4Td_2a^^{nb?4ZU={E$vU|)1V>w zYo1p<{ZVdy_p)3Zb3wO_oTf#m6^R`_JaQjzDTQ-qHhj>?kga3hLX`%;p7`6E?Wl83 zbMFa*>@jI)f$@iLoj$L5F{P)>;Gc)4gg7o^TI}CpmpXzgmL2w=Dj&v&3oK8*ee8;j z-I!P!r+r-Ytd53rI?}%sOES@9q}{m_r!Qz}X(!woWe=AgKXhL8f~sjiwG``E@Jed?Bh6dlnxHuJ!5W-D zVXLd9d2xSw&FDy>Ka`A??&ThV5)`R(XH|9`(;Ruof(w$jz#`{%ZGY<3>yz@9sLQ90 zUQ|DEw&3>s-MrPq=Omb%R5^EE%gUdOyIuk0^tE|wk=6ZR-U2{mP_4?!%IfRudwYBP z`}=R*x)mKA!{t7r(*3 zNA{h>%pY2e2A!l7SBR1NMt;j!iF1U|b%F@`HWY+H2+^Vx#F<0@V68Xp?&IcU&W0|38# zZQc?rJbd3V^j|z4FYiX4kB^U|gJWPo;LV$*kPsD27n9yHH3o zuI=8mY14~Op6%xoj}r|VYXcysugzPm$>xXh7L7Fr(fz>%amp&MKyL@6KzM-*{t|s9 zItrKcA^rfVpyL@a0CM`;yd~t$ z(!BMpfgp*y3<=;JL@6t76hyEN;X(9r&^aOpAxH+TMqZU)NdY-2L%0d+N~BdoB}p05 zi|`>x^3Hz}kS#hy>QUq^R5ED90Q_}VfgtOhdbtlMjPi%SRDs?B8B8AcM1#g710bib z&0Br9%O1*G7>0FrcE-lW#>dAeCnv|n#ep4iqJnAs$Dlf@mHr=-p)VQ(U`P)xVxkWy zf|yt$Y*f#NSZ%fYQ;H>MwuyvHwqghM2%UY0te_l`Igr{J;waKW^`=TpLQWQly6%0|LgzFwCl+^KA5QubI z(t5WnkRfHGLF3T?kki-ZEx<#0tF^T?E-s$QWODf8&H)xAF*Gz385s$QQW7-&QxKel z`ZA&u!03QqrRzkf9Takc2P^5%|khoL8G-x~u7#|-mcsO!$a=s34&Ckz=goFx-MQN!; z!@t-T$!4>srl;CkTRl8H1p)z%3nNbWjgiu;m}}Xxb$eXh{oY>zoF=1FPCRmR%(@4L ziw6sis>E=WOG;70zMUHn*oKlnT{K_0#VT#E*!rC}cBlm1fKDw}YuBs)+Ll~LbaFVh z+!7w!GM;hi?d{ukCRIUou>H+;fBf!&g<%m2?+J6eF@)w3YooSrc+D`1y-W@G@mt~g zuWx<-);Q5$D&;c`(c8DZq2qR4h)YX+R5opU)xA!#TKvt?`dfFr4Z`gS7j|sjv3=un zufFF=tbUiLYaQFNWy_{*XGgg>XCi;EaWoMFp)pw9>jv7#yv{&T4zi%KTV_n|ee0vw zUsJ0f7sMcSiwL;~N`a8=eL<&*gDMV1qrC6%)-rmXDV1|4^!IPxy5pT2Ef3zi`h}3N zDkC$fnf`MD`oCCIQ`6z36;kt{)_U$_wM}_R+(vRNW zcH*)-DVBC=+t#fo9(M5HY)8f}(^Rm)Lvq8>t(^X-#u}YZSW#Y4TwDyLjA2;+2s1vr zdvbEJudlDAr6n;bX=rc=$GNsIUFjvIS5V<^WL{6%zbYyN?fuaXherrXe8D;JiqWeM z45hdz%%?|;SG!+xYFGd|Y0XI}nUf6+Pvh8<_eV#H=NNt6z-F!IU$Evw(~!)W?$@7V z4b=@{a;(|*tfOKk+B?3LJ6UF$*gV;ms}^Gs>{q5#@GL*kX%ui>H@*6L(wsCW}SmGO0Yr-K9*4-wZVi zYyP~`kjLsG&mDa$q;v{;RQh~E5^KU+Nl8h-QgXQ*;v{6Z{c2}YcXxMlbMviRw;CE6 zfW21t9cw-D&i3uk{rbsGlMAN`F8}0*-+OJp9@JBms@~!Kd&9cY zt{y!1#t*-@%P2O}@U`!M|NFk>ENG=4Kl}LOe|WBYycFX8;0HfUtSvCysL5T%v+a+9 z%=?$3<+#XkYZA1~}CPlsJk=(zTh18B9;URLN+TRkZoY-_+bH`0}Q9VHjL zylL7;XiJKo^p|a_!6NJ}(Yvv-Oj*(7crI$(@BNH6o>DmXwi(*VuT+-#1eCyIk*ce5 zbACqa=UPC3NElo2xay!#lm>ej4<;C--lopPyXx+Px>HDOruFAqd3ayu)2HG_({*eL z(55j6MPWEzn(V(w?kmG2o;y$9eLkUUY?$q-Fi4~#)XAebasBQ)zJtyjo1G3T!?fwb z7k~J@|M!D4qsmc@U%d6tr*?dLZof#3;X?(#KkV;%P^A!+^!To)zW=M={t4)$E>!o2 zKltHkhb%I7eWW9KKn4ZDtFx+Umxm;=2HLh!^eL3_ia<$ z67_9w{`yZQ^K&R)kjx*vpSQdkvcqy)pr)b^e`0IY z|LyZ{GX%1+0#ES&e;-+)nB&oZdHnl3T|DiB%iwW3^5p-0@9~#zDP=*Y)b{S(8#_vE zB7Ee~5u=qnGaaY0dd?H+9pvW)o!CW3wNHNdz3*+h$|2kAXF%>dwl!6`!&_5H|N7Bm z(5KZ+;ggLq?j{$Y3U>OS5o2G5F?620^%Kds>lJIlTbUV|t*xy~OG^v}BPgliPkXX} zx7yp=fwaoX$~xLRR(VV92QSu+E_Y_Q_}rSJ&dU(go!+9x6XVT^w&t~Xr0OZ3CJ~M` zo_|kUsFXV${{)V1v?uOQRcL>dPIvd!@v)=S(WE&43 z4mR_JcD&BeVflg`7sunhuHE6S;biCFCPXBdB-2ATp$w_D!p@wK0H14i5x^W}$pO>Q zC*t@LyT``Hrgd`pfxM-ZEhmOVh6INMx$2QegX7%WzAk>j!NCdHW!%BKQO2^2I~5ul zYGv!(!d5H}*8~Oz>KQssO-&`1^-Wzjyoa~gjrQIdB)!3nxxM$!fiv1C-Z@b;z#z}d z$PBccT9$ixdW{VxJqo-9t*)~u_LAoL8{JE`AHEHxp|fwJM_IY%Z?_IGWHo92&GU_W6VAAGVw?H0 z4DY|;b*<*!gPra>=c(1hHL-fS`G$YdJ-o#o&Cu0EBbw?!E#R&7dd?Gp!K=?(FN1;` z=m<oP^1x@zO0RyPaf^dq3n~?(nt$9sA;6a=T0gNb_Vx9HA_d;MF+6kn zU#B~kh*yWq0+kQ#?mmN#(U_v*c@y+AC}+M%S{rX4+slHI4_A4%i`n%#=M$QLtWyVk zC+4}ixqbG0!dvcFwJh!07X;vp7+Ait$D~sx^4z`WzH^?!&8}79^7PBvxkJ-uJ~V+L z5o;*SGO)4{hEFZ%wHW+_NBNv582<$%79d-lt6^j_l=e061o^TEYJaG}*SG}Nv+{<~ zBq!U5Y+RoObH7QVb= z>j6D?C}it|CNk{&UMK^E*n;L0Z*SYa`Bm%q!Kr-H@OtzniC+`^<3GO$p?g%W$b?M8 zv!A~I{s+zD=uifdw=fK=3N_raW$W`7z4(i0UJ(>B8`TdXihFw7K)inH?dhsWQ*a*A zapdv%w&(V5*|O!lS1YK`Po0Qal5&EK4{zG`Vpj74)Tz&I)7z^{2p_~-(4McpakNLE zd_;JwFV}PXw(T1}IzO_o#HtS4`uqkc$(UPJByZs|q1&g=xMXyZyai-4HyF9=r7b&m z?HOZ=GaXKE-LmzKGuC8M&@*=C*z9<9#~W|F8DBZFINx$$+q>I0?R3eTk|{b@c?)!= zO4lRL?NVh3iplc{7iyy4d}Z^N%^wzY@g8tKp{Uiuc_}F= z#9~4k{~ah~Oneb1kEmhPU=qVZpW5}n>o^A-&n zG#(|a6>rJq^6Kj9;NXz-^z@>lqLh@Bz`&r64*IJ+|4m?0@;f8MF+ar7O^TIM3W-CP z&_W1e0lN}M-z&jocPbhk9f-EOA~8&k5sTT-e{xmZ%4bZ-uVbtpfI))>4I2LgSS#KF z(#p!p=J9yrbNrN|K}ceBbTlD8p|i7-lA!S)L%PT(_z8V@OSUXT6op9%`a*;wRkGz0 z#7{ECA}&V$i^N+8LTqUnaT8Czge}Pxiv*!9E0-}ju^(B?AlMF<;v5NxJ@oOQL4yX3 zZvkt|)^5-vf!r7SjzEbI+Z{nKN=`lWT%959sjfv2AT)BBw>680iKS!}8s zSb`F2_Wsdh-`nMLXQ+{C`r+e`Kc0D;I(cNI$p6Pr{P=B6w9P2v@(u{n%DOWfoM!eB z_++&4$}Lb3;D=9~M@Mg960eUof%8W{+R?_v7lxz%ewaF_4Nzvi^GaMhO z_y70!xkN~dAz5Pk>ebWmTLp@+%Ejt zgt7yS4(yElnyEhO;CE({PyQ1>`cq`*e4y@oKl#Z|i+hFhU0Hws_2Zik=#yf8hky9P zAHPz|xTil{#b{%|pN^vqsY<0XR^2dt=D}i*6xM{dZr;3ER#pz_Vi?xcGvyfBFg`xs z)6>(`)O7uNYJYz}xqqww-UeG7eATg;vVT=j`;H$a$Z=6YNzkPYb|RpYK(`JauQS=# zx?~Ol>Wky+S@_)G1cobv&mJxApPd*H;Y%GCHo3AvHxo|js#+~d7}GNn8Qx>7?ZIpE z_es9Ro36VYUd0>hiYfK;^ea{>MCQBAyJV8s5C2_Hp6J9WHZq8mDW@DgsDo;j1RSLj zkI;9h!sQDr0WO(1^K>Si+YWU2~tuTVDpu!IIO4PNQ73!*_h{p@*44 z=$AjA@W_cz+Ghymdnjo0Q(Nfs3I8Kt3*P6i&UZzb_}#+A;}$+iV(~mCSLAuQmnrdl ze}|mG&pS+HtS(YVk)R`o?DaDrGO)cRZ4&efK#}(ByJr ze56w1UD*n6$r#to?K9B6o(?Ss3UPUYYPH>^ttS2>R4Kb!=)LN`~8%_~wf* zz4+wWo~2%mpKN)1=kXI-Cxpv#aaZQEY6&g}&H>r*#wrfK^}@C{-W_9#^Srd7fn0Q< z&L^ylbIzTj-gE+Fvz_~2+xGJFPix1IO0f?07e3g!b?Ym8wV8~P*M9Zuf4+5!At=7E z?cMF~cnr42Zh7wIm!JMyd_Ctr-tuoO3(TkoZO`-IX?qj24S68hSEr+!*>?0YY1yYujVlCKIcg$lR*#Z85#u63)e23eetCy-%}qVKF07_ko%5(%r&4t z1l~%W!WL@0$%-rJ;*Hlw85!uj`0P^~&Fj&sg3wFwY@9WTr6R9WtO;*rXJvzG1rZ=x zU}F8B_hv)y*3r=cp2fw*ogJNb^A-&2h6;RrimCGnac0$-ttLxSWly%d(Jege;`!)q zDULO2eTt6Y^FMPEoJv8y;WryYZup zL9vpN2t#}F_SO;lEnl%;z+}n()|e8PwuNo7F2(u-EE1cD$tPK~+U}Cp1vxI4u_tP) zLOztf7{((g-`k)qG9qe0&<5G9W=-iu` zg;(EiBR`$6Q0eFrRa;vZ7MHfn9OH>3(j`HCeZ8rUVbKgOW{uYtXYAa0adej3KD01* zUH6{z3Fj;9f=a2CkC?>c-5sxN+P?XzV=W6yAti_fw$o4o#}6N z)Hxj9uw?e())!uTo>{48E@sIBfvlWe5ArC7`nx_GEkG1kr3 zfAy#B+jl&-TbE4gR=i8W6q+F>Q5$a`-pv8Z2|D#;C!3#A8S01NY+qZB3+mE(3Glw;P@mAM7 z)|TNBST~Q)H1623-$gD z%I_$kd-d@T<%#b(pHLxPf^ocyxnb@YcJYc6gf8B=WSaWm&+3xA#c9uf+O`Gp))4#R z%colw6-wcptzSIwmO(@lzC5An4cmY5hi%)ozwrJUD)KtTn($Ufdq+Y-;_U3~ z$jFFSROP=9R1FOcjg5`L5W~;Ue`b2-bIy5E@N3U(Rp(3a=IgGmUD)TH^VDGPlF~d; zlj2!0em8G1XLGeLcz|%evrf!_a9yAC)MfdKqX5UFTug?<%DyyTqr6^U3x^H{T3s0E zW>?EYRVx(;W<<+4&JR9zWOAa}&NC7`v4x)VhSq3ONhz0CTDZrTGbV~Jhock975L2n z$0FWz|3RB5P}&Bfc1KptgTEl}>ZSM|;GWA)?wpaUV1%bk5UkOTLPsN^s%eBXZ7@kTC`N%K&Kl#294D67d0J}YJ z|0Vw!KFBKO7`&DwJO2g_=)aDizCOf#`1ypG#Cq@9LKs@`C!AcpKYKo5TZF|i9mBqP z2{=ww;Q6Hoj& zv9u{{MUIiJ$!Qts~14+~C-rfBj*5 z7twH(cyW+>6ZE6}f~&v%{$sy99Z!B01s)Wy(=R;n#1sBSqvSkcsrQ8+Kk?%?)VyWO zLhW~+{n3wpq>lYa&e$Z+NDyU!=Q?R)sg zPrfn5EkV2m6*`gk!V^FK(N8zlEGQmuKB0U*_>#8-qi8JG{KFsr?#bh?zjGgNHO5^1 z=}&*Q>&*}ICvka+>En<8=mTdL(5*54%z-EW06*%lMkS9jZ%L&^AqiDrfok&8dgo_9 z`+3cTqBq?LYJcOWy3n%ZQzftb`0>Y&1dy%lvsgW!P%f8$x?^kFv_d(U_|Km{@sppt z*~`T5IagPp>`OF;lz+bA02z0^Voi7pz+!a0V_aqb`^FolCfgGx+cnv??V608Ysbm9 z&B?Yg*|u%lXMg{{^WZ!=J*-!~T6^8=vu<7Qs}>DCAwEHchL)Cxo7>9TIw3y3uD(7c zWdwcL@;ybcV@YuvPPR3$>G#dbTm%W%3+8(gBXYr_U;|8?DzLr6Og?Ok3BesgtU!A- z9z#TFni4Td89~IQQ1rZsOekzF_XczN_(Mq0hv*I;=GRf*)j8XxE*h0i|-M5z!j9o1+h}aD5g!w`yay3mIVkUBVs_`Be%9*jY1A^WV zcZ!X0{D!3a)8?B=IGBi)aXmfI&MuUSeqOMY{r-U{vHu5=d!I721;Q&|U0&MRT3(!; znba<>vD^cQ+;E^)P>4{WalSL7;R*u%trrwE8}o3a5j4-D5z^q?16tAl$650JuVVaN z*U`bt$awYs{vI404B9}}&}eRJys z#q~g@5JCvFkgNi$l%eazlu>rfM(sS(PKMCS6HRo4t!+VEQLM@IP!RvW(h(k1I?^yO zFwoNnabAePC+8sw=h=hgd+h8{MO9xUWX4T6Fw)VkCe%y_aWRRyam1n;P}d2O5jHps z611CPaxb}I;NPfl=V;f zJtOn+u4BSTC~3r!)}v#g)e%7(F+j4^yX7`HXZ#fP_4XFwfQh{6_4J~-UprG9SOL8e zkQ_7o5~yhFREeweOM5Jl(~agNY3Z{|YaunPYbdCm!s*jAeZjeJzZKhnzc6EPkevVf zrq3&2%9Bza63XZ~pRAXpLL05}Bc{9iw!(8g5XXRttHE@SwOZ}r8j7>J{CbuA$_gQc zzJIOr@jkd&?sPwJ6N(Po0r+&M@I_k{&dmsDpxXtx2)!%z*=kYCH*-Iavrc8gSa$WxoRYFO62E(EMYU^6^;GJhLON2`Z8SUQ`kfk<~f}LZNu8WwU9H%Tij53?qj!?!J<$yzcW&9s&anXdO`>(SkV|)(uR;`9hs+3E06vm(aYPq@{_byqt@ zmayw-WmRhaG%@nMT%&p{QP_>K;qCiRtcW~7c-Ouz6kL{MS>lA{r)&gwP7TLxz5K>v&?!doeag%W6Wt_3>e}0C?dU1lSN0VGA zEgKCRl;g&`VeaRC#^|ZN9Nya0^Y+w++98Gn!B5o5TrBO$+4%x~^w^m+8;;?8V7M!@ z<_cUVL6&$)A9mw_I~Q&?x-RP7$S5FE8!qN9%S6^p=)nAOEdAP4%+(m}SX{n~L@^Hg zENp=a>a8!*@wSi>mPfF$&N)We<^iq$o3re{1hS;bQelXjt$%husr+e3&&Vh*E4$>$ zQ3MTG%B+qr-`q9ke%B8^rnq@|)OvbQj2zyNpcl($FX3X0lBy|WE!NXyjB5ZryJuEZ z-lhzYYB;zXtqY`dzppo!*N*P=Nl33*v%A?WKaK?HKsMhSC>_x`Kp@IPMxQKC!U7+w zJ3K#U4^((^Vybj~b%-R!4QfrL2BbF4h8L3F?vfp7+s<;Z<0rf9ASSXx4I;C_qjn!PZJQzev{;A@Vmn8kOfj^f&_#%35&KSXc ztUP~qi5Nj!rDdgYd*2YW!0T9WBP)~rm==K2>EtT;P&}2RbZ19c&i{D=JA9n!J+kXH zHUinMbevc+enGZ=HUAzH5boGq=#mGiX^!Y1{|>fVVU!157Wsn5`!Rt- z#fqZ%tZ&ji5wEXf>!<4*K z_rlLXekV4L!t%0-52dZ;zj|^E2~@ru{+=AhnQqa6yRSo!eb?B451l%Sf3c+&gDz*q zGBi)DL8g8Gg#1ScHdqLeYP*(++kwdv&i2p%uk>RNuywXQOon#yafCi;x+-2}p_JNx z@uA`KzL)d<9L6f*7|F|6K-TLf`19`eR{L1Nhs>RJo!lup#%S5gAl}sE)VXY1n*O(uFlg4-V0GU8`f+B`N^T~-GGG|o-#bt#n8CVUz^K!KkM6pXP_z5^}rx&b=D5Uo*HV^G#LL;CS}FyIDMr{AshbgrV~GL zf#_KS0SslvN%55Z(gT-*?UH^i=B~Sb%Ug-==B4G82G5y|b7e+IVi6T`f>D<&Y?G8- zv2rl2=HnFs9!{n6qwF6z18oa#Gfc$HU>aX0UNQ&W(N@dk&`C;F8u)+f@D88jgnP0m z$9G$VD)6tkUAi`TxWVFQgGkZv^ear$hjioq_48+rf*I~+4zMW^e9Zy|TMJ12q-Rll zfaGG;$W@RyTW{TQX;||EYcOCEXzZ5aW4|9TTz4a}pIO{mG|pG1q)R@TCgm1d@_qBR z(qt$9Q^eN`kQw845c1MgYX`0GXsxu3zS8bSOf$=C3NLo#@+#Yl{}&J^)u`uYU-p|S z$cX~r%hI;qG^+Ej7ax-7G%W=Y>#A+r8dG1C+rg&yw2_q+4QfQEo*kA5e_3O>t7cRO zv~8>yWioTozhCJnd)7?UtLIY4vz9U;B%WgMg_Efa-gmH`T=*JX(Cr1USy|0Vlk0lP zzlm2uWo0~Cj;7+tIR=zRJ%%ZlKzO=IwrM&|H}J3y_rCdA&&RP`l6tm#4)^zoE7x5n zujRtieJ$atD8?R9e?^Ty#N>{Ba)-+eROYiUdEE~bSTNOY)>3ppNy^DpR#lxGAH#%~ z^SU?Mf}+F9s;s8wdJs|gBrXDy|0XqgYPrK539m<0$IAKOx3{q(33CF6SD$U)-Be}= z7OYyfl~DwLdU3~v52A~&WwLAG+!%;q5QXn?_p%gY5LT9>X(8zYN?)8Z$_NC+&RC=& z5OTa9x%Q^voKH85Y%O-AEwcdoa*40p{>scd9=~w2^0_!WO#7N3)mLU;;{G&9A&A&G z%NrFSze^6MR3;0Qq<~m#US{RKLl))(PL5yFpfoU++tUklbEj^Xhk5 z$j#o|V$QTUAaAWTcxvbMj@!X*{ngz>k^Nv4>-U}dDgF#a9**=q#c2)$0@KI!`l+nC z(0^nRi>*xzrE~r*LN|IY!E9&nw4O8l0;(Vd+t?sx!?}BGIrvGqPQX`ZRZ~T z3JB+!c@7YDn+^;2`4lvj_JWj%jxcVRA;u19t_rB9=?C?~-r-T+R&Hw@#wx9xnE17I zr+v)d?xs4kVYLkv;J)#Ftp8Oa?^-78dKvKb^&0fi3f2(y$Wz3RQT6`hDi|N7x&kc< z{}w5~<;q?Pv9j&IU6g<;L1#rg^H=}d;e9{g+x@&N(|qI*DNyfu6s^E+E3~sHa7#gR zV4f2cU%a~>k@k2$?ARa=O{4nOFEtM?kKJ|muU?_s3!i&xB^m((4l?d&3hWCpsYUqc zWp~J}ZPz8NahKjtFg86Mi;z%BTYGhJ5qc>$c6xW$c-od47S9?iEOkKVJ+nTorZkW1 z^|I=8|A@*jUxL6I9{V-hp88bLhOchF3b8dRFafsnT&6C-l6k|6dIKH(=f z{5psP>-Pt-a41FTu^MK2DwE-)V8szMX@vSj-;5tSFzC_wKcrT`pf9#{IpF_A@_p%5 zZ~+`BZawRBbTSRTc%=U0$?lyA31xQ|iPDxO?h7p&hJJBs6GZwKre<>bL~+Iivwai9 zutg>{g+*bY2?Jf)0liJ!M*0Kt<1>#px#zxP{{8=;v>QG4wO+7UNYZuKe+tQG$p^$* zP|jJnnkr(^48nuDR7+bjl4EO>!(JWttHJC@`HySj`#t(rZx?j|+p=S{E!WecV-yT~ zlZP({BTWg!!_+3aOLdXoBMPs>fzY)+k2|pnN&SZ^Z&a4ssfBa{I~OSzqMS|k?Z*Xs zl>A)2nDpv{4n_(iNHJ@+Tz*3_L|@Mx-#z2d|9ZYYf5sqqwM`#2B#wf2*OxwQpdM0! zem+c5h}XAFp=};Rz@t9ji!zQ>6k?t6lI*Vu2pxEP6Idz08=&msELC;%c8Mn9Yoo2m z{n6^+)xdnS4@#Hj&w-9oc}GbmA^d!f7s-K|*@*vkJg@~h*}BVlURJ}R1J83@}2K7*d_u|p3-#|H8wa(pmA?}*XlF;co{0zTK>=aIxg zq0y%?p}cL~kFjonRbS($_V$dS5q}+Uhsn8JXE}>=?DN;y3D;Bi->#S~pH4YYt&=Ea z<7P`^pqebaza$(ed|Yl)#PS~WG^OhN(45q0bR6+FhAkIxK`X<3+vZUY!5Oqy<+ih2 zi@ZlGE^0E7L&)uOA32DFoHNq)INx3zLwF~i@kbp#l8k=3c7H5O?s2NSn!hcQaVPvb zLYyNw8KVcFjN5>v`t*$hTw_Oi7sCd2bxhb>Bw5;&z!(t--&d2jOD}v`Yw&R%W;%HJ znE_ZIv2@s(r&g#!Bf9ejG)s|G#Zu_;>V6VsMLZ6JyNi*Xv#b~*c3@)fQzVQW0X#}6 z@;{3>NnMrlW5;Ivu%yy0LKxG7VxJ6vD{$VS$vpR6>c8fZPSyACE-4;IjSK$l)|wus zwsEYM^cc|H!cz4P@Ls?Z+Q=%o-z;HTJi%0DPPEvhAX|EPqDvT}OrTXc4B9PlivMP= z{(!dybu=lq?s_Zj6Xf-K1AhRd5T|~lAzGPk)e5JZ+hq;oNGg5&4pBjcghKrNwbN57 zVYGFlsaL4J4#O3h8%_T?3+i>o@}wQ3_%(%Z^``LW)QmmN=>+`SeE$k z#oRqJRbKVhR{!`83y>A2x;HS)POgkB6D#=BqBESD%b|ly3KC;X((QR!c!>rTRHGO< z=Eo%cp?hslpXBb-zQIymwu$(7zgYSPpTqmOY{D|x6_;+l(q~zo2Ta+d$I0k^tr7}s z6uCK{&olWJh3W3mrqAWG3P3IAYV*zsQShriy(u{4zg#7P(ts}S@`#n z{1>6TejJeTv{R%Aa$qj$+WfyoQs49c`lk*`nUo|NEClh* zEsa=9?;x?ty2))PLt2l5K7hg?*PzeNJW)Y(HR;Hcf2FIukeS=H zHa<8Zs?cd;{{qSvqdOet*Ct-3^JpQxpht8>xQh6>^qjKN%;zgMDx>5}#hFvu)u+Z{ z>Et!j^+8TEjHhYN_V$6YM=X&K=+HCgXibJMb*mK^S$F#yGrMQI-wSX6=x3?-D7PJv z*QglIBhPrEL`E@XU;ET5Df3m6>-DF?b8xO5xi?sX{uAtY5LEJ=(_wR)FLG zp2QQ^ekgS9q^>A@E=%A}M-Shz6d6ywB-iIQcOK(3u+2G*T*t?C4X{N=vF!t&Q%eZ! zaSTV3{{Sy@zWOMB1nAwhvx?Zz7S~F$ZdK6ZHUT9o^HXgTt%$GdFL&)joLUCuj?x4=XGet)gOY$FB-l~wa(rGpW%#nrlE)&# zV6wZPz2&|iM{{33qt5#BS$C=qd?j(c_qXsqqM#6pahA;%SK)rjyz94H|G+lEF{f+5 z#x)%W(TeuF_ROX}^5p3Dx<5~HK&e~NQdXY-DGC0p`E)3s%+-`zj>2&H9l~&)nXXLd zd;K$nZ#m3u=>FRzW#rRcHy;O5K?tZX&$em1F767XJ>p#$Tq};rjdXPOSzA?V|LXg& z&GMFkue|z_CyI({lZjFpI=O?r>Z1WnQ0m>cwSp1kwmC_9CTn~!`97-mr?KtgfN|-Y zG*Z`KX;X^+G*F6*py>&YX@+jYKpZjC=CD5M&*4XBo}B+|*5~L#kWMlQRZ+-_aT&p3 zI8l4^%?L3o`}OgvQ2l<;+TGy>?Jo1UF#mjowiw=gxQ4IQ%pv*xSJ>OHM@)ejI+Gtm zr`bnH6!8#nQd40|`ZpbjAJ%V|-8Kle8H2^AUx0-AKO62l1PhEHmHqe{4Nr7EHYWe+ z8=>ju=(Vdw;%IoLEQB@)Aq1UJO^dJB$thE^r&z-^ZIjzSzQxJOs(*?G(S{KnljLjY znB@UEb9sTY(t|tP91VcL9?8KkK`RwBN4@0{YHe)J=fhg!7}%RC z81UrfS#bUM*Jv|ed8E<9OvU7^a*iQr)(?Zd6XS3G#2^LIY3;H$DZuzIw&(OqV1C|d zN^=Lk2H#!iHCBE7?>+e;sB`_z_=l{|3u{t*QI^@Vfxeb}-0kBHEAEco=DX#Xl1F`@jGnHop6Z>&^w;>p}7 zSM2*BOau>_yoDXNe0lu~oove_!9%f#l0ql4yK`*u{OBEz(xY~xw zKX7JfVYknqmKNd*MeQU`BsX~ z`O9nWS3azSw{9~R#V_;z%yvf zuc1|eTJEBJp|sGwVKUsab`5o}Wp~=c@l4`BFx*E|y(0lT&Gtenb(l98|O;GV9?)chnlrlt^StZIey z9B466TVOT|3q?)u=&t$Z4I8C{4GTdDd07!ZeAkV@FGdhqTDF`HD=(ox9JWVk(`QFz zI%b5G@{=mx0XN5P8ouHic?-h~xL4Z@ib|Y`uQ#5z5-xb=iz|5f&>5^5o|9FGeNaOW zIb8Pl|0*b2*wLeLpv!a^rFM9@=S)7HkMCk@!jLS%?sTm2f!TP^p~qkqU#%DXQ$ZAvoc^Z{OjU6=x4UkMA`I){OxV2z5X zsbYkaTKGmzr}HO9O~Qj&Ec2>d4!DRDw8B~UY;0Z;=2UfUM9YQ>Qb2SJR>2)BlPwlF z`g+l?{VwE~lgQBPmCy9dHl;L2X6X$hb&`v6q}g>(uNWb)2_1v9X2BJ03wLG3w;%cs z)xEL@U#_*gPut&ERqotA???0Izxa*`JijJuD`S{S7O;@P+0bt4zESJ2b$LF=fRbm& z)koh`-zN{mwAj|I^XwOWye+(GwhlB6Doix$TCc2BGBU)K^c}_(xq>U6ZE4xkp1+Ce z!6SuCB>hZ(5vsP6X)))IMuei7&SJYk4W(o(?U1t%LJM)c_XA!>p>bcx)IzdB%vf#t z%JCv06FuQ*g(cMn<>+b{E(U2>q*f;%-l#8TD%2S;cJQa+o~r)+^5AVIHVHqY{d6Ia zNy}dh<9~kc@G63IX~HypGpTBRkN`g@W-L+4@wPtg&aGE``;;3kzxZDbd5E?akY-l6 zIjDQ}XwFcq-YIFAdv}3HWXpd8!R~W@BL8FY5|{2LA@L_$o=KAZ*5Ch(|NQ4gHhPPm zm9$3#G2prDaP?MwN>*5wevZDLvb@#EB7Bv_M$4}oOZ>;`bnveRAv4bwFP(2q?8>d| z5NlZAk343cfx8bdC_PPqW1Eq^%|TL4L1Rr4hQp%5R4hCsH3V@uZNl6;b(K4HwmY{3 zJAuf=Km*q;uKE)OCtiZMVNi~#z(%y?xXF3gWNO?lBAg@k&o&^ns=^MvR8{&8%hp2V z$7)47HmDPMts#7)A#xKH2tE}R2qcHu!YK11NAqPDy|rTMA{PA=XF~nPLTjc%)s@!b z4^D~e-28Fb(G_u+u~+&07~@xt&kLukD=lmlIQiM!V~4dCFYtmtq4R&ATD_J2janCG z*)mR%7p7jGo4OsW%0CyA)ZK-j?_vg%(Ksl5zo2&3M1&6h{R)BXqc(sCmsjq_x3%=ceAMhl5|lHAhZw|w})IrM`O;`VPAWxtw5l}`e$JssQ) zS+i#%3^ZY*()t0e)U!pHb{rU<@z<6N&>T|G0%(dwKeMDTrYviUh6#YK=Gs|fS1C27Iju9T5dwSNBz9x{2hfphS7^E`>;B|+wRDK97l7~CeJ zq{_3VAh&eNq5e(0SqD(Hi|KJY+G~s|Ax}--+a`lrmq<)Wh@*72!n}K4i(4*o_p&&i zOmuVP`1F9f)b{U0jaqV5>_A%$^z+(b>JpIN;q|vJCjOd$ErI%1fW8#mNf^|PD)x7K zIp_>!r8I?P(?9h0MjS?wk?0N&si_Vz zRAFphSGMe3yS2I${J8I=jw9Ej;U*k4VV%@T-2!aABJ#I3h)sycHrE-V%wMf@SKnE; z)&Dd@WBqPS7>(&mdLUWPM`-Q}dUD6^HV4W3_+ zVE?gA-vWW!G)ZHAtto{1`yTOWY2er4V_by@}+-SmM%w-osQpx7d7DAMeH2 zZ3dgCF4OiKWI)-IWFiCf9$(i~KWhsRY6k*h^8E$X{3#GT7RHR8M}D{qGuy4?-plu8 zeP$HTGa~1z&1!c&oyw2sXnSKy(lKYSLBl&JCuj*1-cQ<*|L?Tnp@zWbW?2KhWZo zYyj^F3PY4HHq^DaP`5|rIb=i0&DA774f^4TBKzte&lxk%);sfc@W%zsfjf*ryAn=G z%uH;NDDscHJ6XCZ&K26Br6^M(^4LCP@Cr1#KJ2J~#8HOA?LAI?W}2z1f#x7;*T96R z8~KFy==3iJ065{e&fVOehZ4c!;S#Eb<+q>(`uNx6zt(y3`xi1=HZ4gZH&~o!TAWmx zhm|dQ7_-fwu)r6&T}(1#qyD{>cR!}Qeq1nL(2pd2;x~DNcXKYxb=59EA?K$)zr`4I z^rr#R4}7W;4b+*SpM%@RoYP;YAYyNt0CFDd8~V{9snXE1Oh>Ru_EzcbBshdLD~|5X za@1eR8g*txbQ1-aZ}g+rQ|BxIg+Y-AUg?w#CCTSzH*X2eSO3du{UBKN-|h6xK`AP5jNEX0u*2gZV8 zglS5Ax6o zUIFI?>72po!%uj%vloJH>WeJQ8c4-09d%gAIHdEZOz6j0$*8qFFxR9NT3sitU$Yfc ztGItN`;Kf0{ZvC4K>b8X{ijwxrXRUj36BloNAFeR?(`aO0-Dn-$)d`Mcgo__Yr1 z4Cxozz7q?<*H3~@3$E0F%veU;S1C9jv{V)(x2i-xu(U2~%tyQM_=bu}bgRS-+_!Gr zfHO12?4I88$p_m%*^SCdy$~y!TmNE)sH;@b$rnSRZMTu-XCb^4lJ~>d=1a8_NqI`a z3yxvkgs)r)f2O0&W4CS}Jdmk&Uv2(HoIA{5PJSri9v1(ux4zTv?;Ls(G8g17oN(({ zXRO2aDO}>{#F?efUy%$V}I1ADifuuv}Cy-_i^jK+o$y(^@mXL-3 z(`6BqPNeMrOHtJ)ieS7%V$apsL?r3Vk=6XWTv9-`O}t6f!MoLgxzic}HFCtuV>6sg zi`Lud5G?&Z)hIS9foSn0BQf_KjO|yMFNf|C-^?wY6KmI5dvVR_VZI$(i-4s!|CcIG zn=RyK4G@QGOjpqj45GXYq9EL$7?Xy(!#pZ?;rVx>k@#Xl?V!9`g*rmkMp&zaqH&(H zW59c|V|db|m1<>({De^k``6BDa7)0x#RlL*vD|>$L(BYslj}oiD4)M*99=;_GpDhctpr1^ValFBwcy&ZW+&GL^N);NipORjQqTyq;N!7w6aHQi_7+{>J zm}oxb*=MlUEDE7UnzFLz%gd?CrQ_5;Uhm$RfBq8SFi=;|PECb*@e}aPM)s8gqB*vD zSy@>D)1HUlmmn#OSTtiM-B6S24!EF^eHbw~F*bN36kY?IlI!WT_5&yrX#HmoS&n+T zsI*EgnH9(eMJp_?F&GMxdrT&##>bVnGBNJlg)K-GGb4WXpsc^F=7tVI5S1q0#?iya zfqnNbd2$Mrf;V&wmhwVS7%`a)a5BR?D2ZjL+~hKhn>u8a2BAQq=20V$a=%?#Lp_0y zhW8zYb|1q_|Ac1e<>Mp8DhPk$j*Y+;lPPr3>dD&Mv<$Yvdb19=*%G9@U%b2A;yRRz zM7PpKmBF?tU-aI;(Ia?;Cd*RPBY`H$3yX`%@s0%A6p7T%YPDQ?u@l3?7Ut&Wf`UKi zNt_GSf5^UGeMIYNlwD9h4kRGV!}_Q-V3K3W<{>p#K0Y3KUAyUl>$DiV9H<= zDb%&cnU@0pI)Vp9E|^(iPb?-MU~dl3t`#ixn(YVfACkA{2xR{hBFakGFS#o3+CWRl zRLMMYx^N7XojI{Na^m|(@p{;!s&Z*0!>+NF@iVzB?<5|@^HOcXAzmFLV9^}W@m6>J zV+@9af5t#7*1)g`SgAqXRb`8wPE=f{6oH{mBfi0~in-6z_LAfXZ3Pbp$09<&VR0D8 zvHh^AAJXq{-{}S!K7{p}&}{S7kR-y!WYc?GDquy~K>XGwJ`{x#a+db8M4G@&o%0<6 z&)i_n_LAkm>nEu5ddB(&fd&V1;F&FxpxT-Oiyw7(v@{ZEae=|ABM>PK&N?%0`N*Aw z;9@1Y`r4jS5Q{`}#WO%v28Yb{`V%mieOPLS4Vm(z)z!y=y`uH>M=Q`(qpFemrWDQK zEj4sE^AX65u#`MQM>K<>&MCpKM)W%P2Ede~-!-OF8>5Qz^Fl2KFNAo8Hy)FA7Y&`l zA0xw16XK9$-sbM70f4{#$-1v7C*Ab+w%r727eTJ4e$M1*QdUAwMd&M#kdT6AAQMUs zz~=e!F-TD^No_S+?Y|EvO@l>#4)&n3+WW#}cqIRD@cT&h*Pm3!cUMmlk-kF1vf{i4 zbys=srDt7ppsVX6jtWBF0ta9pYaN4*8G>Ej8tP!8#+-+S=TCFdn~q>nl@r3HQEnZo z^6=zjs}80nWe>FMFHJ~**c;E-L2B-=-@YiPO}EMVxb^7EkXRcdV*%fd7=J(ZwnP+lrZH1Z)b!^li&qMr(~rbW@2l;=%+FW$Jc zHMgyzp`)}EcOloJtHlAvJ)-^_q=S^pNYwi~1Wr@^V0)fl17d8W{}VQ}R#JQxE_iFp zp&23X7aziLy}NDm>7S`^YaY`v73eirEebVZ9qY;pda5pZtf>O8`ud~5r)%}>gx0PE zAE7l~w%Rz(3%+&*NPvUHnjlNDCEVq=jo(^YN+(oN>mqd)qxRX2cSjDfZNrLjf=}m`CuQpO=)Rq5Qq#?FLh`y zNFVUI5n`EZ37(*)p#d56CuqMCd|-co=$*5pgmOuYyvmwlY@xr@k2ncIclB0&3Isz6 zB5X)bg>RqF|1Nra>h}34|8zgT62tLh(1q1W7Fkzlj980KT_(@hP{=pBow^@$r0u^| zONPc1{CPhjGoWszVK_*2h5KC(8uPK#hy^{U6U5Cdwd5JmXz=9 znD6^W&@&ec`|-f-I^+9^TQ>tg`g^uu8#kj8K<|h?O zWAWJrTR0RWeU~Sp&t?CdG=hO5+75Qy`YF09DEBeuTH^6rUPVA`xrT`EZ9$JtF4+r# zhgowpC0qA&efr2n2y++u9_lY`ol|miU$nN@j<``!fBj-+R|;6r#$g>tP}gh!&eOaL?&LV$&XL>?Um1 za07z(*57WC^WHhi>}Y)(wqP_4!Qn@?^}knB%#KKO?>#=J?(nF@jRcOIVh;7{=hfy*3}?KwG)ig1d8 zK7S}U+-vpE?d4AatEl*oDd!yt1z#I$>m!tOsg|2be4?v#o>z6fK#^58Zj|HT&8xMe zHO6j}2D&}~r+x%sGBm!T*xZSGYpV~~v4}X)k498W51*S1*__Wl*haYoSsArbRi4Wv#<9-pWQiLD#&?6p%Ar4lx$Qc1?fGfT z4gw=oNlZQXmPikD`29ik-=}o#xvH{eCl=jLrFr16I72*Q*n)YEkoRumB4WI!S%GJJ z<^mm7<~xLhuyKEJs#FCb&N7?9>g(&>c)BS76XWCGprB%+qd~Nmc2QM6r#3S$FMQS3 z%}sr5Yz@VK{4vcnejsCv3!GGh`iAm<2OuT(fH+d^LDGzRF7rB^TWxigj{d3MLi10a z@;P-|&MT$u%3Z^h#JCX{?}BsG;4T#;T=$V##LkzTw4E4*eOY-q1+}xw>8vw3XBlA? z?%S&QqevEFjNt2K_l_tDD^HgifIP>yxQ-zDIsv76XaWwgH%2Hu-b7>TVWsl3xj9x1 z{47at>xxps%$XEfmZ4`2ffjA9e4uY_lfGdRVYwPDN40iL00zg8K-1GK{VU*%F&s2KFH8AcAtLQJLZb(3Ree4 zOyX1r)@thI=wWhVBB0B~ZYZQPz=Rb(G!sShBP07mM)zU-eBVO;Lh(zk8ot-Ip1?Gx z%Vtc`b#p=|k5bKeO*0n&4iFk;#&&JRlAT(B(r(2Bh0bx1y7_tcuP)?0Li^w+#;k?5 zRqolgE28$xJ$g5uyP^@|y^Rn@v$R~mfV$jP-4@jAqJ7X-I|c4_L8|Ty2;3P@`1S1d zJ7c`Hf{2+F{|aAsyrh+#n=9qgl!zl(kAnrlmMFZXr7;&d{h+gaHZ&|cF4_JFfBsDB zwe#y?IbwyEcfUZxxO{LZy^<6#AH&h#x-T@o5)os2W*V*Qvr~C#N1QY9kC{ADo(RhO ztp3?+Gk)YZ@*%yTx3@QF=@-O=G6ITd8zEEa3u-$!+~m3lQT<-gS!*xU?9x+4jpnz*Izl(~=r3sW zHfoK75AtM17LR8{bm;k5Ky*(M#E26I%H8>GYF0X}(q4v2?S6|+N z3kR1ZZq3C8_uEqBsySC#u&8kVFkiGc`&cVV24b|MfvLKt#v;8D<|02YzoewbT|RWo zLCMVtnU~n9zWf|0h{CPd}37vf`Zm|GfDmNhBkpxlYgXm z&Q6PSt&+`Y?i}yn@Pcwn94Mi&4GT$6M$0j%?H^^QqB_QrQ2D>Xj{iBff-+TVZfiOeM0b{%`CT0i&b%DTC+H}>_s3b zuIY3|rC2_TzrZK$Hc!x0BIH=$B2h{L2nO-#|pfGk~8rxyK|tcO&l_eG%sOtMzx9 zjQ{>xlnY#0`VxZbFE$G=dc~L-jUnvoXBeK9r}R-i@A*bx(Jlsc|87X`O`{;6xB+TDV{5j(g+=VxLAa=}q~_GjQe3<~oIosudzvzin%IE?Q#*1t-6 zR3T9|{#yeK`hP?%A?y&N7W6`<^`KD5tCbg0y93?6;Q!g$zJ@;=Z<0Jz?(7ifQVj>O zd@DeqzMc-c-9^hI+f!ue$HXNzl2qVFt{~~MM|D7SxY`cdt(qn>h3U%o`GFcq$2%M( zp$JNBzQujTwfxx^%cV0EyB2BUTdO+(OgVrB;2!OqDU+7Il2 zLh@AVF|+@}nrb5qx$6iDx@qi~u_Fl6pClr7v)5W)6hs!{BnLHG5Ic3TQ|Ws(K;B>2 z%!o042NQShXv8tSMt7|&ScN^=yVooDUHGUNDd6*cd)I+B#1j3eOe+!is4;zpVPsyv z5{UODDkSv08V|X;La;ERhg7R+&7Hq~hWMrM6OA6uU6(kA76UB9 z!H8`TZQ`y7>rhmgfhj@om%v7`kH^&8RY@{y@kYZ_*V|`R7QolyN;&$@jDYd2$!TSI z)>*3NAdHm)lT{ZfVgk!?Mc0ttCqCuyU^=4(0o#G{d`k0?{+|2t%kan(kj0El?Z#hw zv{5OswRJZrK_s@=$dk=-nsWrFb!S7Iv9aK~eZj}$*0~cWApWl3RrBPtDQBql!Q*9BMM+|u2(O4B9Zt~;o(q{tXS3&ZAg;w_4uFdg|84@L1^GN6%(G7c69 zzYfLF_qiZ~*y$7@Gu8q86m`2xYQSp!mSf8B=W;+#myZ2cr0uD~tibb4#^He1q*qc- zk=7x8^?RL3M=b4c_!e2zfU&*79L1OAZ3|CileDeM$3FVz)CXwB%ruN!?4SrO}=dvGX9Y&zAC$uyxd0#r|8xEnvBmRTI1Kk=ceHZtwiD;ziG~ zs@|yp$JwL8-B3H+lm317-eZ=p&6*M^QK66{ZDh12ir76=?)(PmRGRqjsTt&kQk$@b zruhLfYQ`!VvVeMheU0IJ)KpfUz1(Q`eXP#`9nVVOPrDI7Ytw9dutXXrgdLkBx#sef zy;L0RI_`@1f2k0D6_cBsUH)?iPwUm6wGSd=T0%38-b7z}Y2BUqm-D(GrsEPnG;80e{xbI@~s}sr;w(?lVAAo z1eVn~Mo@0C58LDCCq0~i7FD&~++!Ew)@4yzqX;+gk%DyvuqPPyIN%cUNs+GLfFMrm z;{jwZ;AZ~+C|&d|EiGU!;DTED9sB{+Jv!5!0Y+$9(2`?osdRVk&5v;X7g0O| z?zISGHr!Zw%i0V^_ij0DzV?>jg1p2PE=%iADX`QfWY=3V#R${=euD#`augNtj?8fN zo2n!Qp8C%k>k+^EKDg<1mfvVy{1a?F`8b5Ny{U5D{$}60e$9GSw0Q}=X_bzDtG3X=rz-h> z5Ht&~zU5{B(TEP{6`#0de*G5+uaxs=2(#w7B3jsY>71hB-ERz++EMvtc@FN`y3DkaMl~Lf*RYKR z6GRV2!pt3p38&xdV$rEO)lcgy;D_;=(|M1}gRfE)8SOufoptA0n5HlooUm#7WJ$_j zr6FwSr4NOs&S;Sv<9+?G$Kmh%joGc3!p!WH~72(qSbV_ zx>!l|(>U`tdCo}yGFfnbj4cS*4xux&XM-ll@r7CL2L{DeFz&plIU72to{n$rIoa$s z#!`Xr4h31kvX?C1l@D$@)T$QmfWk)QH#ianM~D-LF<^eDIO4?fTT4_)sV-dWJR3CFf= z+nCrB+sVYXCbn%m6WhPowr$(y=6U|_hkf_j{d%rCeX9F3s;ln0>%5Ban$NAL))vE# zR&u-k`sJ!KQ+A`?3|r@DL7`*y6_J1Id6e=UCS%zBe!uX(#~)Pk@DpT;XjJ>Af_3uQ zn$K7Q4f%&Q&wS>ELP0}ALseC5?T0MlhfQ7b-TS4!gPn;h>;Z*{0a?AT7mFlZqem01 zAo#W=h(2jlR5)0PNbiXLHYgGXJhh>A;1G5Ymd+o~jNy(L?6PLhA&4Z!O|uV;4!RXq zm_T_b)zKY0dKa3RBDOv1zJ+dTBTd1N z)$N~?*VSBsd3gWcJ!b2MW)y&J`tatZ;og3pB*$E_XE&my0~=U^D5d%mgW*42$h(c+ z9q-;2J~qk20wIRHoChfff-$n6NpOIU9X75{#{-^0VFF7Hd2N+X@WhA>_H|T>HgA4(=6_3A`BsK6ay$DJkz&{#R3CLK&wTmM!Wv~+a|7A)c z?pM8qm_`7qb=!Z;3N|*dzc;%DeEsG|7>F;y{f16Gpf8{xtGs(yunOZVcsGajvtNcg zC=}`NEh{n@vG9gS*x({CBQbLa4P1F``ScS=k>h5d^1#ovm>B*cK{^<{79cZCL~)=V zSx8}seeQT9$ay?1z{0p-#b_uV#5xK}_MSQ%nY{D=T@&V&puAB48XBvsV|pUu9~Qw4 zAWQgO*gPeFpweG?T0%rxZxS=;D1w-MNbRwTOmX;b_bYVzxM;v1am0l!KS6GelOXu8 z5fJtmP{TNe0kA4)3wtnDl(K@#Fjj6Nma$MG)>6G(J9l7a8aU7kpV&1Vj^A(0EZ0s}0Fl(U=6pfKoV&D@ll2 zG$>Res2AOuD*q-KYedKmSug-`DB>o9%TYpns2V#=W(i4!om(lZ9HQ|W9SVrK=j8QSu;;3450Q*=7>0g zRwk-G5Qpf{9tZQ^b*q8+W9)?wCcL}Dw!{}Q_$!R)GtHWb&(H`U>%0mRvw-#T4k+kR zyjBWHjMRkXo8X*?Xvb0f^0Bb6fUe#Vg%izMa$uav=v5W*0Re|gzUYLQ(%a8ex z9u`IhUJXQCl)$v3K*L<5lRtnq0tzxhWULF^k^}=4;-)`>)DnPoDzxGtQdQd;e%)_TyPXOSR`Z|k%NNHLBD^3)%G)1%n+_2 zJiu(jtyY>JH0J*`$D*$px^V1}`K^I()CMBDz$1|B>4N{T{U#KZQkD~i163z!f+k8O zCFnb7fom;9iAb~u4~d-B3#0B;NK-;c4UxumZrzb*N=H$ao1S=jLM)hP!m5l%p1PoO zs_nM&F-&L&dc)ZNZg9l_aztDG{{Ft&sReTFfexi4_D3Q`A|;jzYd7P}bon9ecXdsz zY;SLWubdeBE&n`X8xZ`VCoj(-4TVPx0{fW1>a5!7qpG{9yY0hAe^8@!)9p8!VFHcC zOA!cdaTi`?F?2(BNpa1QIkh8F$MmHIH%AW!;;+%h+hY4kv_=n)*7k`1 z{bcjC%z0biP4)8Dt>b%}+c0rOmbXgrp zBc{yUs0e1x5T>JM1*>on2z9FqGFF-vn@E%PkC^GCtZ)#h!`vjJC;`r}{(?j)46%X$ zTi?&e%Q_9COgg9x-lSNcdb#~2ou)5~&apELbgS>tHa~hTY=CCfHDhAhXYu>T9p7mg zcMJmqr=6LeLQI>(`?+?2e_!PcpYP_%olE2xg!>Sn??o0XZT7Um+grpsYBYVwd!Xj+ zxt5DHv5w;{Kl^^=x3=QgW8pzcum4>qqfPBtO?v(#CWdhlx~h}LfQE}Vst~89XIrVA zM?DGutB2Nb*o{^JQlT~!7)YJ-t7;qjaOe9w#(?;?kJJ0QW0e(waA*3$R_VYQY&^y@ z4naCWE`@oMk6ddaz|JT_{`w4en!8S|#Kz4sX{zJZrY%_H>{)MDYrRS8t*xrrcUHpL z+=p)ZN|!sH;Eyl!M5l;ZOq)3ttEB2OWorw!R4X;c z_4>Uu40x#5m{^KgQczy(L1=zntk|0LrZ|^7P{sIuPtX<-*~iKzR-*qO&68fY+kSis z;-@Jye?;vyqDIaT#Jbe(5MrjD)@W!90_;vhP%yKzvUK*x#I1yN9L=}4ifMTpto+8E zQ~69S4USPVJkHO5Qr9lD@3X8ht2KGn@wB@d5U-WDspO%2p9|8`)A4a|Ac_p?G;&au zg|$a9=geBP!Qg7)& z8~aGI&oZ%@p5@wXo8F@ropkV@NiOHeKNG&r_+{51s@SvSe;4pBA@u)Q3ooC2A|G@GwjNNTF-QXbrI`e{D)b9h zbJxI9&;dZ<1$3DAp37AMAAMsHCa0g-B^yeb(@xV+6zs?SpnlLfi&cI1X4;a-=W;LO@q{ zba8IF=;i~`|BT9y8rBYa)u^D(AKjY(mISuQa5Pz#xCL3;z*p`LA+6A6Y?KBx(B& z_>kUNxWu|)JZ``4dL=l;0I6&A3&i|CgN>Okn=akJ|B zKYxk{32NXPC*Sr~5MckYem(Ne@*g>A=rh|20hHLk$^RLNFg#)(5JgTtNvh4g|Gbhy z(O2;)aC9|&bg-#@AW9*+L0<@Sl@=FHh>?i#Z2F=9MhF!xI(4lXkp+5{q(oOJ>RyP? z?rWw<^D0uBKq%M>`rlT0N&efa;)s;wCdu#3H-!IoJS{i3+W|7|8`)<=5DBotmdAgf3s3B5Q!~S-UOogu?+80Kv&WYwk&C#7*sc8ZY<2iwjKt-!Sf;106`l8xV3&n!TfPq!W zRj7d$Az+V1#bLo!RBuAdm7tPISVwR`LH^T61s`OA;GYQ`aB^}|)BUAIhS(h@_Cq5E zeU{SP{FfWV-_4wciiWm=hPJ$7jHZHS?5CP4O?mlP5aW7fd3k9iRRvvDX^=BFSx-62 zms$Y&iduhxYH|~ko}!|fq9y`{zC4bKpU6lh6{!_bXCk*rEgs$PB_&N|`Ue#`H8nX8 zFbM@+RTK7!6!id34Zl0aJJJWyFZ8z{O-GW+o)BvXF&Fj)5srrXj)L;aC})wjs_N2m za#}x+(V|g`1caUK49DGHJsB|TLL8aaezoulbd?YJzye{pLJP8py*D>E3A6NyApU~9 zUOGWhUJOECDpSX(ARw6sx6ll^J??l6h@t&i(nwsP zq2tH5U^+Q|?7`EUJN9V@j=bie2+?~9c6o-v-FMtdFZ1h1Ch zrJ2*YfnPw+#_VC+d_PFY|EwK$K(sFQ;{ zIln&>bsBh4lO~1%+F0gbslg5}E4<%F7jXX5sGO#hC9U&d3_Gw~T)mmO-IGWgd$RY$ z{@XiVvG;ZpldxT=H={Hc+v&JII9}acAN*bm@p= z;3P0GA~1yM!45YyV0x%s3XI! zFJPIhK9P@nfzu}b3b5PdKtABch`c0=D3-K)l*lggBDG1*Rvp}WLP7?^8L$ zBaZBjHmKP4!()NM4Wjq4898qW8Q~K4sk75Spkj(DcRdT<&E|etUgp<*w@IcyizuVB zf11uy&pt~nNrjHr_p`H~kRGn{4~5i+Vc2LJ(X?^Erk{ALIwSXr#Tfz$gpT=yM9 zhuz-xf28Ct_J~tg)S%*Rckt{g<}s_3SGi&w-Ve4u98>&}v4Zqutn1|u2N1p|hHAR@ zP(SvvE1rI;Oy!_HTN_MHO$GYY9;b1x@XEPl0HnnQ>|%iE_iA6Qfv>F$37o$s7u z9e#UXP)k*0eZdSMEQCyFnmM^UDfIO^@Rv|96{Rw>E?^q$Ck+`u3&KI~(E{^>j}0Sl z^xbL_MD`o2MCvNsMV;zTdy5P?=pY0oM4u9D4R&fGJmt8+QSigs+HE22aP^ut5XXQn zt1t=;54^uF%P|D+A50IUL;`j?#-HnDR4`9*oX1~g=K?IfMwsS#14$6oNL2Q!gdSv(m+mw+=MwJSq8DpcaAL2 zzLUpkFq`DSm%i#ck8_m65DJZ>C&op*48q1poHWEJ$6GGKL9ErZz5z|CMO&eJz*2=# z@CGL+J>bh0WH)jUi)=@T>V@dooJTAef?5}Ba?cMow%edC(sC&wnKcFZR=`~320GZ7 z|E}e#MC13?73qh)5Cr5omC}@oQGLS_0MVG`af3L+>h$sgJr%AKUef3@>S$76#nD2P zysaQgQDZn>IY8M2y4!~tkUD;^r3(Q0*q53Z43;tIR%#bOuQ@=3qAz?e!@~10lbCkk%3&bKV;K^yl<<>N0G<$x4ERj91t{Y`y zA~0uahcnF@>dw@`@TUNImvqC-P31*5GY>oKG&E;p!ARQ-+n(*&5eVcf~Zh$BGGVyvFS z`8>^Ra-!bC2nlkkVYt>}?YU!B@`J}RF&;N;gT%Gn)j%M$I=Bi57u>oOL4wyHrO}q! zHrW}0C3(Z0J)w7Uxy!h}+IfMsAvQ)n9X)2$`l&XjSW91D|IfXfa>Bj^{Wg-Pjf3Vh zw(03^ljr9rs9X-O#n}mFsgv*q2Y!D-_s2&;Zt6Ow-UuM-S?b%w6F+-h`N9TU-I&(l zp}@r6)3-e_tuRzRFZ&-)jGlnQhn9>K{l${lE}~Ku9_3etFqq!@5(Mg2u$6J?^H3B~nv*3_iIC>_=-7s68A}1I>AABh#%~oqqQp@4 z(%%(eFK#+qRkOcQeP$YXzGqZzN((%#2d*bHJ)eOjP$vr&#z_eY;i*r89k~txYmPKV zNKy07@cr+W-mZA6u#OFDZK@W;eic&iFi-O=PSPa_%b?ajgt+sOxI^vt`Pf|y&2!7| zS~cyzE#j@#xPOt|_n9H(Ah1JdiK?K3WBZittNzj3b(CA%d$TVxzS3Ol?`< zHE#&7m-GXKnrb*$=2g|y=xHf_3R7o}%q>3VVvWSbb3VEP1n!D#mu2Q()z#KoUTAdN zbod9s)F;Awoz##)wC3w#|NgPdDua(_I2}>sFVw*@w|@w8(@|~zyvjaq+yGrbJb_4o zUH0SQTf@b}qobwB6cDZ^9m;*M$AGr%I2SZSRm6hm?x7pit1Z_b5a$ zn3t%EZD=pK%rl~>C`TI*Y(}u=fYUtN%-Bfl0fW%lq9srew}k6)5MgO4r&;?#psVdG zA855@K@Zz@IPYJgb%MhM@p?K!0Z@(XZs{AKbdk}Jj*4&g<(a=7sh%I|^2gCD_ry$S zo#`~`RZr3d<%3)LIv3>Z96sBl)*}>vw+IdpO1ZD&J6;6&tU|a{UP6F@6|mO;7~x!3 zNZvm<2y{rg`;{uc${_cj%XxeB4ffki3pL?zWKIvah$i=K$2!k~dm+q!pF~n$zPLqp zn>m_zdgQ5}&dAz^K1AxV%{uT84Yl5vZ9SPhWcGR#7ySbvNO3s*$G*()Cm!Cy^v8Vw zA2m2^K2`Fpwd#gNo6R{+D96Tjcd}Q1WO>jmH8*soYa9(4D6G;k2gM&I(QuXjxo7L| zA~N};UJdaEZb3t3{Jg0TYs=JjAN%DLEh)OSV7xNrjrnmospea`5gFZ*qxA5A;KI&{ zml?w3_^V&da9i_r4cMb_ih#afL47<@F1}y(lwj%fl3VSJq4UCc*vZm#HztKLDVkMV zWNLs@UX80P$F(fWM(TZ|VC?>*>E+5{^LhEVmb)kIrGu0$c6B6%dgJpWo9_KZOvr~{ z>|sB~6grZ8LJ_`QYqP^^miTKlO8*7P485&qOIn1ci3z&P+PJMV8~g-m>ainfH2hpp z>R=!{;7KmYQnwL8{mamCN6HV=;!iEeCQDsd-~`>|G2WcVSZ_zYfi>pjXOaCkQdK^Lak@P{fPPmN%nzQv#Q4 zq#s`X$3m)2OUao(fWMzhKeZ|~FcO!r`uFBh^Y}z7D&n;{jM22L5lV>}UG0ag$PluC zfUz!ZHopMh)>|DW!(T?xo#|&KaHYGC1e-Xe&w!}P5V^4S7ah5hTIMJRiNnNoPG34x z6gi64jRd6qiluNDn@@b|H!A@x$jKGc93xLLfS<_H$UfYcAV9bZuY&2y{%d&r4`usR zA)QOaFO5Co;(ayU?LHeP?fWep`@3{YH_f!N7F7^80-DF5x$-tsDS$`Kx?2gLM@bWg z(X@$Oy3+}Vt%}T5unRTzX=VfsV-q|nW3-!8x2ZQZcMXosFG;9dweOGAJ72-Ik zhi7``6LZ6C)j2DT7N}u(McT+7XDVfDJ}y#e?~XQ`$~eETb*dvf2 z(FORY9C_`T9qfNUHhmVc1#F?4T}UHrN$m%$ytG5QqWqIPwuFcEiHUW(4O4gCW% zHJS-+r+me!wT=jM~5*# zoc*svOY+SSZ2h#-(QsPbMegkT!+bEq_tGw-dVaNRpqJJet%J*J;Ru{Rd-_;e!mY)Q&3$ z1`hknVBO380#u%X#AC@bjNfxcOY~U%CE_2>(|>12{36+P-BrhdP5t1^+%G}0@{+@^ zl`{umuPd}E$>Ip$K2{{;bqar@Z!Ng?c6i!JaW=R9O$iyVgqyTN>SuwceN-1Qn&eBYYg?W2}MsifwNeu1x70@9D zmgnV4)0V+ZrczA<8%9aYU85!x31>_LmPkyLa) zrr$z(+m{c4!V<0FRaX-w%^1=m>VtBcCbCA;M~SJjO-lT2g(}c=8=yVD%K-A6b(vSQ z^e5j>f~%i<9;~blUmnLXJe++nUmdn$YgS2eQy#QZif!QiaSz?w!5pa?glf0+w1`W} z@>v6vmW;k+d_AqPw#@U7>|PNeky&sc5k67?3LaL*?bEv7m$1bqI)+s8R|(uyxALbL zp{z8|HJpy^VeyW3!!70Dn;<6jpLeX8a5$%t=HKLPs`z$=$ec1Y5gz;7kiUj#2LM@_ zrhEBsza$e2ZOIWFOYC%(Rc~5*`!>3G6P1$N@0=d7D;<`*pW&D)&|S+L>YV8{bM0C< zy<);7o*mo{{&jBR*k$47nlu60A~csbu^2Sl)hpVXid*xSPIoBl_?kSv`FX@P{OD!n zS$`E>Ew3)kZ>ZF`pGEo{xim-fvl0ZGB~QNP-+A2N+W>?#OXWP4NRh$)*lVv^7klCLP>g@Z_+n zf2oXhvGd^+T{~w7M`v`ovenc)kBnazKN@Xs<`COXAoH5b7UbCQCSooB)Df)B!B*3* zwGma5u5R~U6AWpp_vD;^|FAt~S^E%;@YlTK+@3HW^C?E*THE>iRZxv-{XlrGrd?d6 zrZKMKJ$8;{mrR+((JqHC5k@&NH(wPH_xp??{HV`(CHLh;p+%P~dovp=L2@COnu-dG zN3SHnm5Bk~AsDZ_19!Zb&0#2G1xLEcwev+(CS--wz-k_jv??Nx5 zYZz5{*yB?(L_@t#TvqdeN__zmtf|#-}gJLuimrQlClP zMTk!=)bgufL2<|l9b6Kx8cZ?O9ONhyTqCd|uSTns8R;We+DSP=tDqT}G1L^suMUSq z^ud1`pk0-XO2M^{Rm~UeYKy!bf~Wz9tZBQ8y=D_|J1QimtV&jtPywC zr$4^G$b*QFa7stKP8!8XN!1QisP!E)BZ0f#uS`&KF!dhP+SP+k0x+~bXi!%i9oQgo z9fDkmKduMJT(IRtZeDlAUWN#mahx|$FWY;0FJRg|*~j*pVBZvwK`}c&shXpM8gx%| zjakzNPy)uVW{@*79O6v*w=*pKn*H$n4uQkLbT^Rnptu}}-x)pjd*|*NRk$hD!1azeN8N?7)u*ApUl1X`og1-YU=#1l^Z32XQdgZ0C(&;~X zv795(1RZ}vRuSFr2q;YiG3U>K(t#VK0AZjniSzf8vH|S^FYet-f`ib5=w|-26%A$% z0t!ZZgPaE0!Yf4<-+CZUlFwI9DYPGazP7eJ)oq%|OyaZfR2w*JE$z0G!0t5+ z@Sj4TDG<{SV`EYtLN}R-XBJn>uhwz2Zd$?gNM)pM^=lDEXkh4R>6_~|tJWsCl-M)sm$=H%uQg2hFcf(LgJFgK2a@Pl;AiZC zYa^<95JG{&(6MiS0O7%g=2>XlV?Q}nCgDp9WcdZ=Ifh^gjEnTZw7bMdj>cM>398k5 zP02R}_6F!{{2S%h(*r9`mzYhk56ZBBKmi_ywscDM>qHc>mj}cdU*nsd{I`{h_p@7b z<}G`;uKos6LDxlk2?7mR;$n~7gaO1K@9)!++!X2E_urC%Pkv|?S%87tbM>DZT3>%< zlcObm80zDs>}99Do&Y7^mpWUS=LVKmr1uNT^5Ni%nYNl=sofus*rzHp^r;UT?zvJo zqw-0$VdVRuSWC&xcp%5)@)_~Nrk*d_)BNzT5jjb1|FkuHpVqoR(eDB)xNHAlq;huO zJ>i;d@g}f_p++Czd|JJRTrtxPZx0M<;Y={RJ}X3`x~->h=6*d#MDy)uf!*IL#CJ#^ zDVXHF%;JB$?{```9C&-H`b5+z*N`~jM_ zdSn$jy&ayW=BQj`H%#-k zi_GPWW2LTsZ8^!)#}XQaRFr4)G&x;D*1W1E{ELWav$e1)wJ_)I&2icKW@*$E2#s|e z3aBW_ZCjY80Oaj=J^H?OcYnz8QmAMT&dlFjPk#t(z5t&{Ql@Xp3%nrTm76g%Xz!@v}DT~aY6Guvim8%;!2$t*fG!76g$3qcvAkhUx{6`S&{2;R2Akw z3WDfv{)CJ=-#Pu!U6SLmMshp-RY3!Cn@4A`Ddno%elZ^rZIb&X>TXT-)$q(29v*Ik z(r`|9qi|D2V!HP9`S>`0T!Y8$SZLzs6^KW7ZdT!Ww__W)QZ0iBpFFYJTDQ0Pt>OK8 zm)vP)JYp#*HMaq`KZ1MK^FpwhpbYC*x8l~{d}B(%f6{I=KShf<s3WOwUwTZl=!9wtb)CKPq?ZmK%S@jd=-lO7HT4XwB}% z7M9`ub3Z)7g#QgpVP3|w^(87JVb4;BE zAgqmvX{-6;p+{vf*~V}tO$8Eroh9Ga#hJkKD%$9{S{RVpr0nVycZ*RPbC%-d-mkOe z7Fw4a$&{OUP^zCL*fnTGwC!_VEuub!=Pp7|s-)Z37}kp`sh}1+$X&H1#7sKbo2L!l zi-AFY@C91UCa~_Y(-^eU#eTKg2MKgFpgo(BKx1&ZV$Wh7wwhmyZ}m4!@7MD#yTF`y zskV@fa@+cJarA8-HpEfPr>gDLEjw1{Yh>zQH5b)fuk(eOsJz>@616es%H~F;F)A~% z!#N?N8@R|o+tF2W$FxpLJx^SZ=41{-{UXVQr{^1d~xc%EBC;VwWLF=@uB9RwTPsvgX@joG!OFxABL~ZFR20B@E)= zPVzd0<#wViM+7n+deKnVMipwIq{}!?N*KcNdq<8*%ML;K=c*2N%Ds!8nwZQ z1EByO5>AW;FV6L1ys0S)rHMvZHoI*J^RN_p^0!4=u`})T{6tkWny`IQy)K=VwIcen z4kg(bJA!$Adw`0ISj|VC-&~Jc+nL$kt1_>7NOJbQV4bJFII3s!`^R{0Dj=26UELaN z-}w;Y)HsIT=PJzu4BmO1jVU(onb7l)>+wl-OR%l7fF}mEYm6mNyLxzfNQjpcxuWoh zRp-DMPl={7rEuu;4my!c3h=^J(Nvr~CkzI1EBz99vIOQdCvy3+)?_8nWhi}$5wp)X zt7XNn)8KHt+f00y4(HYAygXddjNfILz4hawfy366OCYRzHQz)Aug76X9mQMNYQ_IZ zJG?K3)%oLVH>q_BE3ibLHp|yQII%=6`s0y79%`Js@~vTKD0GhO&r0dCH{PY59c)9N z3yd}9@vT4m*HnRs<{I{gO70Y+lg9G=4xX@T6)*8E&iDCi9(^lC9U&lzK2IScxUYkNKi87*q$ ztd~?Q+v;?3mLz*cLdF>~f>)6QriE|OdX7}pstGs=0dP?9znpq8GlWi;CX6!&B3$(M zw1)7fUAJq!*e4h}oE43(1q9~CH7d1d2pX*P{3gYB+na#Se(j3-Ls|#JS3DU5WQ_Lt z^nAKZj`Kk!a@Q3ljnv<01nmfUE7&>4KYy?|Ve!WQV%2?Gp5~{=Ga)}zo_rr>*BaiZ zUjL#fTZr3LYP{D4q}8`Ex>^dp!8%6sFa35|aK$DjF;jaxCWw4^XV{b=<_N;vGDS@#mNQ1d`OTVPizRy|f=gmVctGQj@y8V%_ z6KZ>G!LpR`cqgnF-MKIzTI1}#T~PM@EHSe9VYIkiNxPu;`d<7w0gvdl@ey{Xr1@2TF+|EeX&_6e)5wKS{?TBxrfB(in2{#C+x72=yN}_{-s}6ifJtrawPV z-!{FcelJa<1!OkaxY+z1tHw;(_KQ$Ra40JWivV>~6)O6o^!ml+88+&vk>g1&0!7DG z+G)Hm)(eQxtZBJPV2ua)q;Ypv?0M&d_n~e#o_f~FamEGzGTW69+asXIe@16f#+&v^ zQW!~8-DaM#^4UMi7hgflSN(l&{hz3QRIfiVm5oiM%_)IyN3oa9Q@wA{Io(>|aYpuhN@-H-?D6aSPA@IHa`~}r&SxV~ z3`jQp=rNMZtTEBM2?M#n0|AOn%PAOy^7eP_mRnJ{t{d>#`9*aSswu2l;E%gzW%lLVykZXxT?t>l3m;KCb^{Sau zXzTrc2|)DBMtbrad`A71torWWhTc5ukfoNQjgT*C>}RH+!RGQLTKgUu86nc4%W@tv zuGIgNJp4Y4WnYYOa(;@Q0_UNiriy6V;U95f={Tb|Qx$XP?CSbFH^i?XHI~MfNdTsf z{ED1p+j~Wj=la#sDD>x^i&+zL5(+Ll!yp`C;r7VuW+z(-R8cxbo$V!yz`DxLuC~+u zp)z0F$gb!C(kvh_K*X>*kU2@L#k0keT*k??2kQnNE;Egw5rxNjsHds5o066WRy<{P zO6vwYRed@Q2l4Ly4o)_pQ^#UB$EsN<5H)a6liXfE)r{Ov)?<=rA@dSGn{Xc$=@&QY zuXJk~I+_aF`-hv#tMm|JB35P^s`51E#ocQT;T&BcpzjAsQ6Uv@*w*KH$<6ww@L*$| z#gzbC7j+XM3q@T{qe9Rr+&s1t)afW#kZII;IxY3=&`=4Pse+m|`_}w18XSy_Rrr5Q zWQ(g=e4WQ|Crb(@C@;4Y7sbw2e#}^e7>J7Mx^h`1q07QvOM0o0re&(1{WgoT{a8cU zV~BFO2D2=r|2jJADa}Gky9)SU))NWqKNn-Gj4UNL#~A#p;#Nhs($(><;pHqnJpRct z;-f2%mlOI=EG5j?)L1u0R0D51PS6!Z8B9~lG5BW_^N;Wm5!pu&|60T^r3C0pi7{TN zICS|i$@@rzV2#VlL_gj}Pt#n}Mh8yJRcoG%?sZt3s~X#)I(rHUlAN5-b#``j^-3Ns zXsWiCUs0>skvn_pSn^>V4-C8oANGesnZS8#V4Oo#pIyUcXPwU43%IUu<~e1+jL1pT zoI~vQ^%N!rVG$DQL9y$bmC{cJ7d$}RK{J_Gg|n)9N^2gvB{xAb67XDW)-D}8qtoysA8vxc&qIQvd$4}u4Umj9Me3Y> zw%}xB9-i-loimD(`F{wm3NXioPjv9I9Qm04=CiTSAWE&9t&?-urntb^jUt?4AJ>|- zSKzdd&dogyqTk-;Uz}h~_t3p3s_(yHf$svl65NpjyVT7-$<`&l?PYl>@=$+os?KKW zxoxvmW-U~u!L6Vto{xU)7L#ZQooO@mh}s#MkhcD#Se!LTG=Us`fhde&9V+v%3Wd6< z^wxw-$WM2H{W*{0B^-NhpbohY6}bfY;KKIzKGX7!R?{?&%a?^0*P&n zBUqQj3HEnKU*q(0Q}vQ02)Y+PNn5K~LSrR|QxV}(<7p4GWf45)|8)Xy5imn9=ReFS zQd0#_#K&at?jGWvXkfAO(6aRK^LGQ|DC1hYIwg zyn9>K*_!Z3^L389*K^!_UZyw)eAtpv3XKVTUuj}xW;c2ap7LvLX8`mZCh$U(*zN8> z#b(~~+-F*s;X3n{VWO5pmJ>xFinRN!SqcKgwcLjlhE{Ed^e;%8mOK2m3CX@r$?u@) z^BTxzSgNs`BUY5ZAw4af8sixsZt{<-1atrYCqimF~*EA>WmY+JlTNTw}V!m03fr7in&Rhx`_b=3xzh z8)2mIGiwFi!C5H!$Jyj?QAEp=vS3r0ecbzZC-QC6&AxKg)#RH>3cc&7sNj^iT689I zS5X~q3z4x1x$|M$+XtVXM`K9=t)tjta7%69dmKU?=CwzF5vn<1XR7xk{n#Mcs` z{Qmt)e^+D9>M&YeW7Z>m&-CCo<$SOcWC_*Ke9EwASe%O08n`Cb@)O`mC_k^T&4)&1 zA@d8M*j={e0;n3`qLJ^63* z;cQw@S6$M`DtF6mtUZ;=W%KV?u&i;F_puA@I>rgxtazV~INn2SGUcCex|rCgUHLZObg;pK@wBhhuTe8lu8u4#bvT2T z)NN0aA~TiKZpO?(*N5PdG_obtVcbr8{)Fv}muF6ukT9B}%`y9_gKI)2Rt*o~{zyl3 ztIGX(|N9nn1(@RogKsb97)dl&N&)vBU=8V42=?xRqANGk>Y)Y4@NZSiJSN=Azbv-keefbM!~YR^_sI`=a`_xB6w;7BnY8X zgH(>=#8l!S5*C-o0v-xd@@DGLslUniO|7# zha$fAoRL&p1%v5r#fsd#KVTebPacYwNeeYby9I1JdA+B4VM4`{T1|icNN}*QoNYTv zK*-!~-I?zAUx3`gAB{S9{j79T+UksTsr84Y7&!##=aJPP1k6lTK)jqJ zQ!z3+@{#wyR_(2|HGk&mOATU7=8yV*$G?^Q28O*kh`E z|1LQ3k5qNKR-;Qos?feISf1Qxv9gx(cFA1nx!X-%q3Yc}*J}*@Iu!Nlju`k=a9U)G0xDnTcQ6t z2Ht00X1IUV>-}5@U$W!Xr_us$%MVK+h9EgAUjQy|RE%OVzg9-`7pJj8xUhgoc}|P9 zQ>0%wgvtV}Fb?m{H2T`abSZafx}pKf$tYOAmgB6gPLBm#^3yj3E5+T5%|({XD`r~KF=(T+lQRs zra~5BAgkuh&rRFar1wDLf)K50C+^#om?6Ie(!%9w6XUb~O|ZQBB2cu^NQI7%}={tkZKGyQAxziN}hn=B;cL`5cSg0i{gBl51_Tzq=cOV~q<&&qn% zAA9zMmyoGbzG{Gx^B|S_ro%V?MM|QDn@E)Oro#7?BKRKe^yP3&D-TPd#owz-i_)lF z5ln*b_sAY~T`i#2^s%LZVfjB(4+W0smM1adh^5PQAsEza*)_w#?vun7=GYC^ZG!A7{noWQ+n`0{z*7{ z6Vqj>Fzfq<4Ddq`6pAz4uKcGt5Tp73i?g>1i(~o1ev@FqAq4jj+}+*Xb6z)O>aObQwcg*mrYJasXO-f$CTO?i<>=#; z_`HMo1!pLW%u|MKdx-6MS6J-Z55Fc` ziI2>W=Hcz>%U+o*T&Z4msQE(jv&qyQzb(TF)3AOk6(cvtJf3sfrrwu9%j&DhuIL3p zL9iPkfLOU?r;~WWPS2}*E5>yw)nVu zlv$p{VVjeeS65Sg+y-J@T85)#uemOWRT0es{DjmzZMQxb#o84F`lX1;=_<+$OD{hk zIZx0g-;WhE>&;${8deRDXT(4uCzR);XP1^!@>AoF4g7NO7+cs=CHvL(zBUN8D&-W- zX)JN4I{y1&p2kw(F}L-Q)j!Osv~uRY$WO;CsJz9CsGM1DcFMa`!)jEH;jP-5u@9!B z5FAQ73PmZ)&GGxT)yF+Ulsk+VTK9MB2s@c%E7% zElmC7mLxro1$}3~^%-d!WJ@0<4EnyKGQ*;@en^h%APyXQ>d($OzMFE^?2`V8)&0B_ zG!d|})W^oAn@?2$osl4i1GF~*_LEdt9GUu#=&6%^y6JGZd*zlX+Kh!X zQWDe=@@s|7z6?bM7AsQgKE_Yc9zfQw?uP-yu6b1RSEWm1TXuE_Ct*T6GH7Vq)7bk@?})rRw}bAEr6lX=ROROc$c?|&_*zk)h7^Cz2X<@@B81g4{j$|kILIa5 zRZ~hop`|_^-w1Vt-=ckg@f&{P!zV#xqCbZ)`m}#PNjsLcw4B+OgiJG6o>+{LkMBNJ z3tw^!ps1ZgNQE%>ML$H<^RndZD$RB*UC@&rsc+#~)RW`+aK!t(*fcezR3G;=QJrUv zh;-=jlA-SC?B)a!Ci(W{q_=uB(6C;)g`5G_X5n@<&p4mRj8O&sqFn7_C@Ux+qnNe$#o#CaJT9P_Ln9;zM0zX5<1>$H z=eS;d^YNMr)iX>tc6D6u0|6KxBBTQ8a^k+pM1G>$W%5=DY0== zO+!m_T~!Ajb>HfvI84R7C?8-j%q)w({$}Uof)wV5gy9|KwPb6q1QI%y*3{IrS@|px zf4)2ExPUzIew97l$wvF_HoOf0XKU)SCe!x%Zaf-e_CB+qHriTGW zn-WFE#p&tk`Dal_=jN3qWoLwj9Th98%OXuU*qEnbC^k*#v;JuItBhjrD4Yscf6yi# zLd_LhdGTrWKV0%1W>>@KeVT)^FG+Q$P>){MnQz%ho|}ixSLu%o523=rKfpJ+=&=9k z3fTaa02%0CAe339VR?Z7oaq_GO2!izN%O$KWh)WRTETIokndNxH*WHP7TISifxiJGN7M_Qot{k`(1aWE``SS zE;+YC_iBRAl!gb+NDeqW^77$+&>d6?_a1T)H$KQ3Mhv(|mVS?CjNzP&U>6?Q%-$j; zj_VK4cY9#JuAn=vO;qBaRrNIuanSWb{b0_R?nMZRdQC-rmR023$`s15$i*}sDY+c6 zK970xJVrrB&v4mOdQi$@@RWOMUHA;4EIHD7leexbG>bp`n?|zlo1m@GE0g?j*)bu3 zUgP{%so-ESeZdPFOH|m_(vpURmrb`nkujwtEE(Cig7%uk1TachZd zg!Ayv1X!PK?i*|2rgJAwCyY5No}ULW8I^?*v4mr<5H1tV6bN>)vyK9FzB&(g#z-z) z9vvNJAsaAv*2FQN1n%6J+E`iPNp%i&$C|0J0#o5D_*ol_>(Oa2;_p zlrjd(6#!7&5O}C0ygSvfxsX2_*kfR>y0}HNW4g9;;Gpr$HILqoHu&^w7BED)Qiv4qWzvkt2K60x+n6t8DoB~I5Sq<5$s?>mUc16pl` zej-l*5U?XE|^acV5tsdz61&*HYEVKFk@#Xq!52p1q=LcZ&ca2EY$o3x-Ih2 zp85v5!w{DJ=61@KAh0Fp!B@f?JjUGQ$NEVTL8#|H7LcD6cnPAF*%W?=(j+NO+dzC~e(6YX?m~ zJUft|fKc^K3!2{JBGGW~La0TQcjd#_W4*8U=O}E?T`(bG~VAu~g06hScRSIDfl~7>A5=yhy5m zj6;8r_#y@ie!GC^hsT75_n3)#h@_pPjb_{}<-!k#O-~oca4e;ro+GLWVdtfIoxCd; zB$EQBz{d%a6bJpox5L)PJBIZeKZ$`%lf{PEMAv2>dH(nZ!hG}8@$5j-n4)rx! zs>N976Z{dZv3DG>jr+MQlX}Z($Uqlyfq1-4hLv0hM9AQ2bRR7+%;%WIFaep(PZnf< zGvOsH${$d7cuicD+EUsm>2N(IW8|hY)P9~>Lp;70afWLYY2L*awpGR3mnB05-&B`? zs=D)G@W6lW$wd6e!U609zyprLy8rvZl|rE<5PbM|KIA`+B?2_0|6=+-DE~SkfR9MS z{_kf*|HAr8pZ=HRY8PMqX6yIl%!j;j&47T5i#t6v=f^|fyQ%%DrW3l~t_r2&-Gff9 zYLL{Gp?lN*@e?1Rx$pPB&H&wxfc|ZJ*t5+2+?T(N?BCgR8eZ+j+`ke;8VK1K8y{V7 zwDTX-_xt55tK#VBCfZwm-cGK1yc|41D{Ey{WE{yXZR>{DiTG(>KTDfufVk0tN1MSP z?Gs;Tw{7@%dNbvp{;EaJH@sA4c)kwoU?PqePL0nbsiFV$bO>#tJTw#zC3hKU<9R;{ zYzM1)R9f;8sd~3IKE2^3b@zW>Q}^HsW*y!38s4Z{z~k#oCiZ9KOX_H1M(`VdJcG`3 zIBo{8@3;LB#yE#&xm!NB@uqGZcar!!?`Y67vaDCzoQ|LMN&(x3OI%t!d`Z6Weq}Q| zvzFvo4(u0lA^ZF)%nsE|v9oY=y^Rn_NuFiK)@Ei!6lXZY>BouMWSWzSr}`#N7v&L5 zVn}xNhHaP;VH{XMUfHc9Rq+0^c9^gM-5( zyDR0_CV~RG@-ArDO*`mHUZ?UfQ?A>n*~sG6XknD%zP;*JQoh3P^_^BfNz>UC>`q5S zr2*v1I;w?bsOExyd%?pK1pww?9%8(_hdIKxmjdz}6+!v=y3-Rh z!Sf{7FD9xiNEVH{cH46$F>)b=_blPe`yf zw}1Q?d0goWz);G6$PH9?KAH&mR&S^tb*7#>iV|-vc$?6dO2SL?-6JK7ls_L(QyQ7h zZ!^Kzo977L;?FZxB>$ax`)XtU*dCzUj%&=PMHM!1i-`yl#VY^~LaRS$dH{-wyF#mA zn}azQpx2_4kQ9(2d&3SE!7$3-`tU%gBCB(qq^+izg(b_;hku>^b*15n5ozoXQsa%F zjP!B6$sKDr^WLMf0VZ2OL&Gp%p^U$41QxTdCyfi1N&uSeTAl~!e#k%>X8`**oE$Sh zu-2wV=Gt#oBQ8Bboh=_g#0JAZjgxUY*Ivfgx$_=xJy?cjVSzZUc$w>1TDami8cb-l z3Ysm5u2KM6f@=g}-2wC{PMe!K{^>?ge*pktf_5MzJe-QU^5HCzVeRQn9Sk;%5)k4l zPfh$GDR`B)Q3N`|-!bUbD_2HMQr+K>)862&!~PL_9#4`-)b%hn>}KiwfrNY7tRiO< z=O*SHE&choT`qFee#F%y$NYJX8IpsPXaA*A%EYT>^PFNnYT2Kswd#-%Ne`Z40RG`w z>9{7in7~l_Qt~3(3o{6umyft?pgU~!l5g29Ai^cr=IlJFdI^OnXLiB-XMyd$aCHhJ z`bI(mPTw1aea+V^0%(5@4j|zTkoG{r#Vw2|E~2h(zEV4L`lD~iT<7(S_KsL#9{uE< zIX~{bn!Hc3sm9q$*m9FJeq_CdS8@&7QtRJymVQ?Sg-MUtk%iBv4d9SMKFDTLlO;Rg z$u(RW*yI@;PkVEl zBvxqvtBy7jmT9oC=*Oj$-+;QtwM*eF#X5eXMnO-{|Hks`pRci>+)l0H)wUbN}t zv#W&?O(Ykj?JpVtb3u2#4FAG}a#ab_D}?BU|XE<(Q*?a}7RF38 zrEQgLnBl%1dTLDh=D-br+ZK`#+sOL0;b)0WXG!=O zGYNj`-v{4N?i?-NPUs9RMlk>{93K-OA1hUHqL=RE$9_GtSBy0+j|)vaE#JW$g_VrB zI%2oDfUQuiCo+*aYcc_dr| zdKBl`-}hZPs6;~g#afCpyxAXf4{gR= zt6L-GGbk=mw1I4wryf4MANyeZw=uuC6W;yu3XQ9l?}tds6Kd@%q$9ssF**Mwq0a%| zQW8DEY*2To@-{%S(1_(Sv@^|&ydx!G@$?d?V`Z4L6Gi-6#o<^)af{f@LAgG>pZvL@ z%ncwjZ?%8TeSDA;+pLdJI!?EX^g2Ymg?fk)MU;y(k?QV5%}2IGPsQ4tp1j;SVwU{4 z3lc5=n*+UZbmUBvdo0|A!6pq&MQ>g}vuxYAa|!52e_W755?9D}TKdh;KECHMY&hkH z@b=ka4xs`PEV1|tvzo3$C5oQy{b1`;Pms$v}^o?JN)vE{4;2U8?1(+3;y zyF~!OxM`DzRy;~fLGCtril?KG09WGM14RpbR8mFh5xvxl{crnOPjiHDOrxwvf!r4x zc){@E)>qNN1J64HB%qjE>J>s*qjkl$SG#gV|EQBYKJbp*1-fIOWym@<9cAs#37H|~ zQ9CyBoM2whlgCCQ{*l4Q`mll<XZ^8ZO2)ka7TkG>)b{<9Kl6wc)tLJSsSAM+FTZIew|yB zZJF*e$%)%}corU=5v)RN3nVn5gnrwFNDZ*)vkGJOe1E;y;}u!MMwV2VP?ArcEmh0p zbAfWSC}49wUM^K{doEBv`yAddq@I88d9jA-&oOM#ocMm9u(35+?3?Hbm}_Z%99W=X zSI{M{iL-9Gz2LlbP@zPh15WxmQp{AAgWoP8-FA|N*gxO{F z%1MHq3$yaCZ#+r)nAea1jd zGbFy(L<5d9OVTi5neJtzren7T;E$q$q*-2hLmN}Pmzgptm**FzH3I9?Q-`+*bvG} zA6;-#ZtfQQB6e{>L7T}ecV-cpEk_miMrUlW?yt-Igd@r7Cn`{+@$vd|l8^#(8U+Vc z=8OJqaFE?>7nvdh>{d`19dP3M6Lg zCoR92r^nKL9p+=Dlf1033QZAZIUEO`dC!YCNmcS6&NA0MXZPyXmlcGgH!~lQW91gh zvD=RMJl+FBxBpEFyB8hqfNo0@+i5XZ2K!3$)J_+x47!71e*VF;_pu&!dL3sTr{gc` zGYT&ye8ziv%(G%l)9t_sq#|^)TMQdkMf*}V!^%Tr5K-|MYq3-8_2ae#`9@g8&MK!q zsGxARpIR^JvOE|?(_=a^BJ6)pgpq+CS)p*D6Q}(n z%s2GjNXd4phTwheGXL8}x>ccp_$`ljM48L&S{$Z4o%eIQ0+l6667O7jbJU4JJJp$~ zFXD+#RrgP}NrT(jgx$@JC3B506>ipx@WW~pqIsN0=?R<`=?bx@GS1KYh3Eyz4}R9@ zNY(CWvij-K==S7(*s(VXh-?MhdrJTZaNz<$tn5*C zRgH~Ul>^6Sw9}fj%!?7q$VGsS#D1e%&D=TzPaXI)exggD^y-V&Y<*34Rg#^X{sFZ! zYZm%8^Y9LG=_Y%7O?yr(!&2#W=VV%BqRaXt12EGqj@kdZQ}X(<{oFF0xRg9->t{ui zU$|aT+whx zpP=PtT&!dKjL=W(_*Fk{n4*!f%C0xch1{{~v(}$PRRoh?DlaS5PSo?fly7_t4WgJsSaEM-0@yVMX`I|4U%Vmtv4FPR|&rKyBRUivf)kV>)5}A6li4- z=&?BYY<7^~W<1>mFNm>4dkJheCD{DwitAcel}3u}`EY46p&t9T(@e+-!HLU$Vnt|t z!QpRDUp{J`TmVErg!$TK*Jl1YXNAkZ@bgbWlQfeB0)(M0>FZgtZ!z4hFtja)uQgP| z6naDD`o&K6ZJDEI?0R-Kpj^0;|8*=m8(XlVaL6RHoU;-`;!w>fFHlIE-KNBsigaG;^8rRY zT_n&IACjUAOxBP#q|=>_Sj5nkUo(H5$!VH(%)Um3E^aL~4ZxL;mw)(wa=+ zj~MPtjDtk4J`~1ems20ITyBro@oe0R(kD$YY4pceapTnqpx@!CM?QS< z`)40T7!8?M7T_|-Tx}Q6FY)Pc*v5Lf;kBFINCJ03ECX)7MS>Wwv<5I!Sx6Z@*SxiF(hSpI|Xx4Nv6MFwx-GZIh8+kGO)XoFi!{YQ`{=T>0B~)pwompu$t3v7 zh$<~mAS1Prorte#>m^A2u1<9ca(k<;)a|VX^LlzKbw)5UvYwh(`-nwU9pDR3&F%&A z98LjtOHF@QPd`fUh@(YE3}f&B-CU7RRkeX-3N0PbzYM2;T^cx}s+!wr5qqY|S5#); z93;jne%|#K1a@3A;QQ;xgYa58)?$^fd}728bEkV(X*1uAu| z1a%DmL@Mg?iQcEM25^wI-U)Mj0eW9#Mh7f}rK0y^=gDLBAjsxE55Lg-NZr7KSuHuF zSbW-Q-}vxoI_{P;JU+*c9K@Y}8|;+{>g^N&{%HNCq=b8j9ieRIgw`$u{LI#uHyLz$ zgRt;YAw4eHux&(joJVHT#M8-x+~3`sAQbe#ERxvphj*-_r6M%&J`%f}GiHsGi+%V$ zewidmcm)1)_@dJ#zc{Wq16^u2u4FViFqo<$Rr;A-{-B&6Iu)^@Iz$xDQuGzEzc$Fd zCsS8(vHy(rGi#(7Edm1r^**erXdyqSCJTU+M5-SjY^;oHy!nYPAHblzN9sP*7BDo^ zl%pIW3&`M*Jj8G*d)Y#j#X8TSsqnSt43X?Zw1fTC9>V8V@XS2SAup* zI|3YQhDqjTsWGVIeQx6r(W-~7z{q!TqAtw69X4@Mof;sl)@N7cF7}SHwhMlp9r-pO zD7C5oV?X-ldf9?Z2zHmdTL;viPD0opHN6J)v_J>^L6 zd2G+*5uiAA(a{_KQ7H(_nSgmMbHI52eH;~3p|1(QdSEW;prGJan`#r*ajH2)2NN6} zBgdB@IQ-ErYNF}Q3((dk#vo80QRea=!F)l-bv;n-PBkdK9q0FCm@MrJ#VS=)4UAEa zR40~)(u)T0!*BO78+YcWqK5}u@+Y#u*17|(O{Y}qLeGJZ1VQRi*Zm}14}NV#*xA;U znmWO>`Sniz2VIlk?u6JUw3aaYXV--8=vV(KU>Id4v+ETU>w9dC4v6?PDQQ`0s;;8j z+Ul96zENqD&X4m~sP{1?#mg+|i_=_7heE-&q-Jh47dtBuK@lTq`AfFv(w`P3kpv}> zDu(%yl90b*-%U?J;w4V6PACIL;U6<)etg=4IoH!*Q5+c6v00l10GAjHRJ!~51uP}mwz|aw1mdPM(zU&4EMj4HDKMW0?D5zf z$LmHzg2Tr)X(&46GA>gtR@+_4{ekl6`nO@-WwggtP^(l2rYrX+Z9%YCJpSX9GfkG# zASkTu`8EDzexj99&WI~qQvJ#?d)80tD)s@2x!$uM#0Z9&F)3Gv%qTqH`BVI-(@Vt9 zj}mtSEiSuxu)v^4guV=Ol|;_UdIWGT#CJc?g>nVV92g3G5%XDh4rpQF=0yGMqC-%A(--ep&7Ulv22kF9O=+YSZ077fuT7nkl`$dyXce8tfBPi^l zpE8M(`!*CdZo`kbU*6+q?aNe6jlb^t7MS$b z460(i?gv4^YiYl}G=9Vw(y>fpoXQuqY2=5Xr-SVOTkr%9*3Mrc#xKHGT$(J+Z zm8~GpCP&s)%5jA6xGKwVKYL8y!&q8sW5AO*f3aO0erFlQg`s?^w!W3Q)z)~P2?Kn; zJ^6H&3s^i0j!+&B)qQg$ti)A^j^gQs_C49q+uf1l! zffTEs#!&|7+zqhHNOr%ko?v0=F+}=hDVV*BO|`oQJkF-m)42~4HBfcGaO|Y9hk`Ez z71zs{x32bGg9$Be-M%uLH5&LSc^bzsNZ!%^Q{C-xBW zjQi>XgJV~9uKMbdTiIAo{djwo<>FJB*GU^_RtMvykDA`2<$7TJ03&MBZWp^II9=LS z&L8>2o&L?iWtgH(14z^Zz^^pSCBC~lwc|`cKrOR?oXI7OD-z+OjnCfl@ThB{WbetLGc4F$nr`CKloAZ>!@z3*dRs`klXp)<$9zRi$t zxAPpSE^)nnxT7Rg^eI?4`gSPeE??%*Vh zAA3DF_#K6O=;hkr@TFCA`_gZlWg9Wcdv9%ppKAN{u%dcL7V@_YVgJCGo_ChP%^peW z{p$>V)o*bmWQ!_A7j$q*GXj5WSP>8_{Y?45=YF4s#-Yg`DJ_q~3;(0Ui`M`wHa;wQ%gN5OoGz7kviw-BLS^ALolbL)Z ze{I}DE;*c}J31E>6;UJK7$=QL>~={QN&VZEfCKkDho<@t3p^HHkx|oy06KfqoC$mmH4LuKdKs01lY2h*0~Rh!7frNGjY=io<7CP#~<6w6roN67gqc!T6<6 zd|IWHz5VvR3l5$i8KWkn@YZmUJajN<7Y{Vi(w#hn5U7nGQ3>TP+Q0oKR(oej6}xC; z4|zr~Xvy$vr++RhaW5%nImt6)dTbu%Z!;y_zy0d2oO${l*ipiWeb4#zoLEMbwJlYA z!$`{{q8LwOb1_--=q^|sS+T-<(C=tUPp+o!ZC0>#;2Wq$ev+phPjfgvzP0g+$jdpY5m;y zEF?w*u+GELtOSOe2VXO2ycF~SBQoPvA=ZKOZ^`px`qdiu&~SUW^5o-!(hj zxBj#8UH_ijOv22R60=^;z6pZTH+ygB3Tgg$X*!)2;g+hoU?aMLQ8m6ADf#Ec@(|NC z%%bY0q@d)Txw(0u760#?8tsT8!eH3DvPHhj==f;X_w)8IY?4_3wvX9;T0<30J5dZI zvy?bTIBS=r9EGeSv!fF|)D>lf+j3AAT*5^xb82F_^`wEuo!MvlWd`PE?7bT^#sNZ3 zcA}?U;LM0jdzIblN29Q|N$pvZ66X|i4BzC58OMDeXD*U{9qf}@ZjpZG-JyjQ=$Cn; zAi)@bBOjJYBP3amh(JvP3+CHW->fjRP@T4rr_OBzZP1~Hx~TCc3hvk|iPa~=Q&qOg zl^oQi?|)8eW))^9E^xXIvzIEI8{T-kfC%8y??t7h&0@Qq*milXfuIyowC2aD0>t3> zaChaZe*GQQhG#0f93^PfZV|#Tf-D)wfP$!Tc*KkfXMd1IaiQV<7Nr&hqp7I&`q{9IueGJNosOQJ)jB&qCzs=+{max*Q@EX; zp?yRJ@QbZ3`tCt~Zm!`GIzP9j^Gz#j;Y`|L?I`gW9jM?^d7E|up~{kA^F;ty09{o6 z0l+`lGu*itcQlyY*OhZu3>vAsakP(;DkIG-@L_u%z+VHMtLR&!A0)_bI~q z(=OO&m1nB}3vl39o+=f4W^#H89#URtr0Cc&?18BJdgbYvO6+vs(e$I7Pi)bdmPhHa z8?{f5E;ldm`VN>KG1Qg`DJlI#H=7!qmL&VGnav{#CoF86XN!9(wMR3Q9 zs)($t(t~0V1{~$gpss^ZYNT6h-J3+*wN&`xCZqAt5jf=rk!|ln9$v5iIEHop{2Ty6 z$3-{W$4A$mAXH;PNqpY`K@CA|PIDY2Mw0nD{cde2_DCC;;?hrBNHC-}NCbOPQF8(1 z?S53;43v;;Ujys!ttSVt2&CqlTzkWYGt8_jrQs75C2gb}W*W?rZ`&K5tCShrdo}}Z zkk_;^_sr(0@RT-P;XyTgCB>;-mb+#)9$CmnD}2(xhlC20@-(<|8TL?K)J?sJ!86S=7W84 z^%wOuDVxh8BW+o8cfJf3>Pdkd`hWhewd?=vhUO+;4@^-Oa?rgg+=~F44H5G;X3bp2 z>af*w`ULhjWwF#b%z5lSm(Ok;)X@^H-N60G)yBxmn;I33Z?!s zPF%)oSL2K2neT({(R=xxpT{~b+t5%icedh2b%JFL#{^%xu`Rr_8e~YD^nNR-!=L+o zL4&-Z;ubW_crRDg31ji@G?sco9d7XWD4FRu$EH`^(b1t=Gr9AO18wo{nQd%Pg>vuP^}AUX@;Qd&f$>O zPoJ^n36+D47YLWI6}mAUMI}p{>E_BgAXKk!#uBj%^Dl5_=ihNv$UuVaY?BEd3&Sr% zFn#$gDL$t#mc`WeGoBYj`bRb`#pv3?VXBO9mBmrOX;>Ny$@|4)0Y07ZsD_G`Ey>K@ zjSf4`*4N*XIL-7@V!hTsh=fKdvg&u9_=ao1UhmA=J7DMaQWvE7$OfI~=gu)n!EGn` z;P7k?c-7jv$TXH(()60a#2A-BJ?7EvDJH9V>$uE}p%_peVs7wd z(=;P~E)Mm&(skvZQ1vCp(FpFjw$1jWR7NClrKG8}Z}kZtQtHA>F^m}Pn?;N^E&f#b z9^c+R@O)d0sWracJe9wbi)IA-1v!aHNj`$5#!ys$cI96- z9%;ir4*sQe+r8AdCBy4XsGsB4)Pa_C(%gmn0`6Mw%SHW716l&)pwzh2?+GV{Txhg) z_(GjT%?4mTn5U zZNUB4s})k^-OPEwa^4!piu}GB*q=_AMzl`)?Os7%Jmkp;;BH=L0f-^C>gi#;@7Qh{gAFIbYB?bRFE3&L1J4hOlOAbTCO%NLhfn#DCTiu zVU3@%7Tb-Ir%N!{RYTgWtF0{;AW4?OhtClO$ZnJl0Tp@(0>NnEO*Vz$eVPY9Z+Dfc zt4L24m!d#sa@9D+~E`Eh{Zg;EbD`Uf)W7E%Maxg7H5+C-mkr z$0|!xQy%*+=kSM4r!D~)@db0RD4PRaVG`DVgloQbtT$I{7hbY z(3^@d0XyH;*8>Fa7{-|)kYHZPfzTH(-$UplUJl4P|MR&WcQ81vuj+SE_=`Qx@gC%} z#nQ=3Wic>{!NF+co7LF1gbm3piNCk9D}QyF#ySA*uuf2jiAX zxnShQ+`O0QIls_jjUr(T3-q-4ad>2>8E(Xs9-CGX{2~%UU=^g$2KP8%t?axE|?DPj}E{XFw4)-W)LEy64Z|UP^rAb&f zBbn<3)$0NMLg{@Khy!8G8n_)QZJte*fy0+-Yp1#I1Z`zszUV{vu7cgEIX9>zyK#1B zksT8ub=9t6?;DaD@i;n5!944^vs_URc0>mabRrT6YP8YXLv)ZTKs#`v20Rw%=8e)R zD{#G|wCy6m0&)AF@lKs!T*HnghMI3FQO?v$B zye6}QjvS5rF+HM5mfl^s{`SP?;2b@SvprE*0NzkuF1K#43QvGLnZwy0mn_!a93Em9;dFE8bJC8O)GoSMiVSyw7>oz0EyFdT!}Wy5Wrk)? z5FjwXY!m}>MHegoVbiq_?L+o-p}ywSpW(pvs*{runiBhiHjfsSPpre(fMy zhO5x;3}p4=_0hKd1+5lf52XNTAF*qfK1|;|FXQ&_%wvP&2qvScFtuylfSE&LL%D&a zkw{!wT*LsHUy23K1_voNW7k1iYRF)G?-X0`<(Mt$E&Xt9nK;0lAn%roBcLjnpj6Sp zd?KxK${=4jjTug;HtYf7Lc%HR#as6w z-K#(WNQ94#tx7yYJCO@mUwuLciLS{@fMZj0d)qv0m}n?Gd~UhVcuDfB??`5UP;Ce0 zi4A$^HywwjKg5& z@oONA8Fj`7(|!F*UVPb$ImU1U^x?053j7@sSy5I7$(+@^-H~FbRPE)ztRH&Cphf|N9|$3tU*i=UBmvO0%|KDlnUo)P=~ z-=;o{K9GXY@$nJ=LJ_o5vH#WLWZ(8a!YKN3pe8B`g>KWS_y2r(7X)RjAO7E&NRjgZ zGxzO zhWMMmIoC=?<-+}g+KQ^ddTC`_$(|0;&=au?8Co|-&VT)VR|a+%S6hFS7XaoN$*O{t zpveS)jjk@S?9zqLerwzt?PXg?87aeDt)&%iffG3;9i*CH(T zgM)!WnlN#yLG zJHhA0e)Si)(COI`Msx4t40V*WZS3s4XyWYI+syC2O*W&2WcsP{3qB7TMRjVf;Hh$R z`a$+}4~KhE3k2!88ARjFxRT?$!aKXm5DnhufIf|g_m}6}_qY3Y`T-LmED>FOkF+Xd zGHwTi9>iB}=}+53PuFoIM+e%5m#s(DJEfP!u3_v-7l-S*uGgbL-F3&W{gtKWf1Q5I zWrLM|*{-ShWt*|=!u@l{57}e`AiT8Z2DL4h4sVi@c}M%#xaSyqX>VfKUwp0Y7|-IH zm#WL=#zcXSyS1w>5ZX#VQ^Lw~B+p^icasN(Zuu@pI}S3D@%5+t6I8SmGF-SY)8|7gL{ElcXzgR}W+8?;(qfhw}W8m_0!!_!IAR>sMqyR_ES2gs?BtkZG)j zM3oBMl;I8k+!rE$=O{Y*?SrEQmy!X!tt#aYwfI_=jz;B*DRCb7W>K@hvxEoLE8Cj3 z1({&xxVqKo;`Gw$yi}=4awjCQhi3Ab|20gL=Imq+LE5y3Dr-$e6nd$Fod>=@8 zOj~YG+1LMDTW$Ivj^^&yy`E1iXUe4ri+6{Uq?5mgOi8050ry5eG9Hj*wbQNfw$}2j zAk4v6h1o3Bo1wF|i;o#)@pW>Si#DQ28v5|;*zjcw&<-2Q72&VKa-L`08QDK9%nV$% zrV_hNmBL6p<8-qPKEyfyAHx1BEY7Cs0!EYI?(XjH?(XjH?(Xgc3+^z$4DJpgKyZRX zaCZyt{PVp3{`NlHeZt9HjC5DuRjXF5W$4^fqG!(X%&|9TUd1uS1T@ZgYK6Tfm&qG> zP2{ep-mVenb;LB5d5OnjKt36cy%Cu6`HRin9E6EPNL^td`m`Oa3l`YPN5ZE7Tm`IeEZse3Yi4`ugfuVzV^jTil^M9I{VRPueaMK>9pY5W5rX?| z0)m-p>MX-*EFwn9AF#ogVv)>DyNa?;PKdUwS=vlN$4}n#t9TWv=RwkfHWq51=T1GZ z7WIpYO&)osyx%kHpc`eZ5zlzKFF!ecinAtxIB#^WCS};uU~b?ln5yY^^)79T)LF#D zlzQg>@tyUIe?*ilQDoIXiop5u@S27lQ-wc*&8N-iK6mp;R$`AdPaz`@@8vtDzzBAm z*S^f?u%|aBO;xwS6JTktrmvbru0?r%@-c8#SecmmNwOwRYW+?$F11LuN?OLwFwv|- zr5W7@2O5_)e|FNucV|M^?}}HLFWZhNpMy;()*}{`$pVBqVmIz`&ICZaa04m3Epovz z$2>Z#I9Q9$8iw5b_Tkn)NP;yYMGX-x1S_nZQ3qZOLs7py$YDX-oia5qHOt3ZBcf_c4QV;mg6|Etxo+QZ%!;gO|-J_WJI~E}UkjJvlje zFZ-C_Nz1^pu;Y78$?gIhFea|28PU1q$4&4GaSWziI1DDRFd4K>mPJaTMz-!3e)c?X zo?ykyzxbWYkF=Wvo)lN4f;H5HS6_xhOpG2Lnf@XoH&g9K;C%Frtm_)AwNvOaSJmXX z-yf5W(`_`hwnkurk@5~1Do%FN?P;-w$$x!H(!jo|ZETUMYeY*3a zsm@?uE2Aplcrv}{KQJfr=n?q(-#qdQp+NqYQAv}!PvWXq<5wL5p4iIwdHh|XMN#}6 zReTaWUS~!S^U_MRW(9k@kbdI=G1n$BafUt;%(nt%o>ngm{f))ixMWz5t8X(*M{l?= zd$P8Ek(oVF-^;u{Xsy7(@Xy!0YuHNhZm4@=?CiNYpvRMFzJoBje}%^F;_)~$)Bgk0 zr|Irg`7hg!$Ea`R)zbZ%GKol!A$w12N#?We*3KP5v1h_}6uP`u^{yXhWfax~#CWN4 zNQz)&2f;4FUp|vH`aKzo3W<-#M{l5u6ASv{qraBaf=0L+%@4K1-?2kYZEKildDjQm5w;irMBT~@jar*GQ$!F?s<_VV*# ziaICP2CI66uUW|%9$)OP4z#H@tJNy==iM_w#|cHPzQK2WP*xZay%0K(o9OBi;B>2s z4D;yq4*;hk8GY82aqk4q4Zxq(+TGx<;fV!oc7P=7zHcq%#pv7iU(2< zwnd_6WMpL3=-IEA@UH*^$XcfEE*#Hlp$U_*b(_HWIHe>>DXEh)ynW=<;K;7~OPrBu zl1&eQy)V4yL`CSKxeEt77sv)jmG~;z6X74sq1?&R-3lwl2e>CW+9a?6CaZSvG8kGL znEMosSD)FBbSf>^D#>lIyW7V^^c|1e&@Ws;>UOtRI5o{cwf9%Q`;>yYkZ8rha@rGu z75}mfX=?7YQs5k8%xpn?0TZv%gOcr=Hb?e$&4Sa#lO`e#rL(=m?OJzD+xcBox?}u3 zk#kJE2H(?+z3k6UL_(dZlHpBJ+ZQvn7zrrF~N}neK+N=8(0eRy@8|>_@6&Sh&35ibD-T#0S7kh%oApuNY zv35VMx4XTG$P~ zvyMVqSJ?bi(W)xZ6ZY$18ZywN0~jF95;sNL#{rC5Fahs827;n zM1akAcJ;p+$07l~=rnaarF@?7Y#DWaoI~A0ZS1;((hx-qpEt$iD8hxRgX~!tpTj(l zufXaNd@*c2^-ika?Iv&4gWhWoX2dsqZ`vQBHcqQOgI;Uf$v(qfa1e*$4so<=bUSZ5 zBtLPVDTXX<4(k52)#x^w=NTg-1~vzIY2JW*_Bb)X?D9$9$vBB3N5goq0MqvEN62RQ zqR7Q8|AuSOZQfPAVIyCcKYn!ZkNG07p!mOq8wtDjp44Imm!9UEjLbGSSGw+c`y+vd zp>d%Hs&qQ&PruvVGHri*{jVyA{5!gKD+X7!{3Rq@tLow#(gPJJSL?EEFtHPgYn}cF zpaT~Ht7I_MO3BeOVnDWMscCuC>&@^NI>8lRqsxSiNg-gDUcQ|baiWzEVlAl5pEge^ znD7gx!pGC0mIJpWwl`S54&vTyMAuE7#y8XRIpQp`SGdvy<6$R@U+v(-{;EDOq(7Tj zmgwXtxJ#Q8dArABDM6gfe;p7U6IJ(>SCnub^ih zzjP6R$CdI%-ob?~Ub#Um4FdP|FbF5J_f6&KTzlqAJ;kSfo8w=QmvreGHaJt-4f+2s zf$)Fjqpx9?)HdXOCO-4`i9L^}m4-o}P^EIg63=%_1d@dwzLBGUP=v@H$tTBQ&sY)GpTWMMpPBrf$qjSPrRt%vFtiA={H<&GgA=Wj$N!IC}*P%!VDP*?%>O zYhXBjK2H!^K(-6bi!?iBw^TjEC>DLooq1D{Paebqd4#4-zxG~)+oH55kZ#?#!xC2J zFckJvQfsYpQ;+-SD<)&puS#p&Qq7Y2{i+2I*aja7dT)fYe=Qo`;i?J-v2i6>^tiBr zg`Rx&9E7KT^BO)-M(@qz=4J1p_Ye?HpEJVT#N{foyzb*CZtn$#kI*l#+42NZ$lZ28 z6ip~L^|_1ksZhrELkS;_CpeHWCJPd9tAcS$6E&uq8X}UKjh;Ez>|^d#FS~4IVf&Y( zC|Vs6OVM8CU18J%dzgEiEcO6;Wam|*r9V_F&7H09rG`5c8f^i8D(=&}|CU+x2)!*N zFSg-XG>B2$ExdP0K7)7YaWdj`iRC>R?il-74U-wiQ|6}y8V^0EuzJx?-+Vs*j+KvS zGi;Zpy&{-9pmUN=E(Gi@E9kEz=z+#!s(n0?e~Eji_Z4S0N3X?F~uAk0$Sy7shsYgGTW! zc%_`GHus>#qgJ6O-U$_Pt=;h`4;qp2s~tDIJ#Z-%{$5K!6IEaKL{@A-Eey=0$En06 z1Y0IV;B^aA=H)I=5uGV`aHvH+bJXp3d)fi&&O{8ow8`EIanZoVg&DC0cvb-lO7L6! z-&-E~X_nWgH?EV0hKd}2mCpr#eTxhW{h*rO7n~PlWqTWCfegF)zdI(pw_crLr9t90 zfPN2oj)Bk2kptKjtga&6B(og(qbWbb!~_&x5&<^dbhP}S$1`me+;1)#9Jir(ACiEi zAle^b;=N1H-p%wpHFsUSjSt0!{!DFS7bgrs5{HauBRK_Lo-ar*F1F77(l`YYS zB>C!arwoAqJ6W~MWEjlo@4Wr7cW-eo^V#=%W=>97+1WgoN}m{9f?<>b;IrSgil*@&{q=^ccAlHMT!^zK*yt(70ru!1rKF7bc{uc1cY| zh=s0J_F{;*#ht7C3U@|2BGI*DO-9lM;)}TpZoP}R^ewZhyX}g62JYDJi$Bd39(pr5 z;--Ch>%DYLW1SxN=IE<7AR>M_EUl-oj^@>#TOq8G+MU7(s&zxJBr;3Qgmu~wjNa(; zSdfx3FzEhvwg)bcaHBUKf3X7$z(wxsaesYb8j5XB#ulB)82Zn{=GNAN8)%-ZB$2$%k2U_r9@iz}t14!_rrislBo2BV=2ushftemzG`u zlpw#Ge6c{l-~LA}#c8Exjl`r<>s*iJE51v0&hdlBqd4K=KP?r02O}n*cgHyz^e@v| z5x47t%?WLK<*zh|v(AAhH-HF(2={KYp5`qUooUp%10t}U1RG1ELKcdV+vLRuQb^>h zk*iEQWJ|@oK)XqbPD;R?}Ta#A3+zj6L6-aty%r-_G{UH$` zF_>%DZ66<@*;V>eAn10Qmc|zJ@aMgm3M}Pw`{ar6n@s+{nZf7VX2Se|gFlVD#kL-f z1GNMzyy-02gK>V;31j9PyBpT9hqfFwYg_Aw|N4q@b8>9vT{gCFVTA|q`=b})-=|~_%4eClEv1;W{LYPdN(m2KT>_vQc4Uuk8Az|7R-Emx~RfQeLW0?^LRpT zp^FllVQ&f_^8^#83ijX+-H>Cx_z)r%4Zq~6Tzi^@nb=xITUFRZ@PVIQ zaL1XduB49Wr`XeG5s_|wfwUAJRkrY+3Yg+zc%%4uR;l4q%9dZCLq-GHohANNjHK}t2$mqORYP4vRkK52;4_|;j*gaYf&oZNM_V;IK|4A&F-|uzAQGPj zFV7AS_6v=_k&lO$kB=XZmzS5n?k^=T|1s9jDu!rmA&NGE-17 z)z>s^!yTFym?E!>rJJceDYOw$k5)8kV*RkRq^dXUrUjBxR02z?0+pm5GSYfFda67m zVK2tua-lZp43*S``RHir(>Hu*=nNr0)I#ebm9^B=wX~>l)Kapv)VnJ{H1(x*pwePy z8UP(#9Wx8K;a3L&!4s%SNy+K?4LpZ)xRdKR{G+^6RxWh{dl(`PL^P$LE0)(bK!SZa zXAr5BRx~m)4luPwss0Ch{cjgImzI{c0&kJ948MBv6Nxhh1--AY8-h{gU_v*&(KvEu zEvp+(BQ+&4V>LMq?L}RljvkMUpuOs~EqLdUpmeX>wK~uj90e*pBli87j2I7RDm^}` z*ou9iuYxbAj=a8xy1u5auC%7Uv=~rcUQq?AuMAK+1SR&Ahc_`wx{SxeyMpTAEB2rH z^G6s)t4A3?p(0Sc6EVk7;?V3*6rZ9gV$i6+PGBlOe|c512SZxPWrmSSGTg}DxXa%h z%DaEXvbY0|we8{>@F6)-VR_kB)zm1A-k;ZvT^cetAtgDWj@XVdREv9Hk`{(O(9%jg zN&S{X9jcdb&n*pyu0fL&$vuS!StBO{TTL1j#0i~R%*brN-X--k zxR}DhwqPz~U~)!=Xho?ZNdiqv8S^#wu`LSeD(8JT)kLTu|;@gAl<>k%i z;^TiKUjl2}kNO9q6>i?&nHISAfm6k#C`j57U-Y6J**iac#A*F@T2MXV@>J@I$Q@Dj zo)mJ^+AMnz9cp14TR}}}@QSAL{^}W88Qm3>PL@?=)uaeUq)64uzbifou&m~PPF6TO zetj z#I$#EYx)ui^Uq8)7H4KSTNdUP=CxHb)jHgjcW5zB=}t!{K*l}PEL05jpz>lsMO{6h z9=h^1O$XC*_{R^*3@ocElJHTIJjnuAk*e5)crMa%)koDurpdyR#m6M>B}^V0s2pIn zojt8_YIAdvihZ^%V~dvdY?k^QyQbQrriQAzW>&^xe|a$(oUvv3;_$Gici zT{A;XQ+r-}kw;B!K9pBQU;C!%TuaXn)^%a5L;45em8EH`=8r{At&BxWtRHpb)z#xC z+2cUa7}!5oR>82x`#v`jaYb&TD-vM&sM409H%14{kpwi>ST3O zD}0n!)_{OjRb(s-H1&+k^<;oAYUSa{b6f}q39InCH|}%n@ww{s*5mfzD)3a5lG#H^ zOj;UdmtN`s!5%b6Pk(A@O2+`8B&$Z8ZOTYg6qOWLK?!2~qb6tc+LC;31q&Y)^xm(! zxHLN(W}mU>nQ>=+YJ2bJ7L0rfjsKGAEp5NA;xS%PXJ*$L;naytFP&Q&MH_z8#gSer zUUTVeKgUa2*V4+kq$i_-L9U9fg(T$n`0L^DEyL8tiOPw{V>vrB=aAFIgn(%L%YUtn z|H1QKf{sI0c3;u5!gJ$u3Dm4ThvX`-dQgg2BY8Y z_4TU%sF`}?Y#!sCXd#L4d>5aZnwo~1I$FAUme16>YTh3zMIcv>nW3ulao`B zKM4WS<5qB5^!4ZU3~c&f|3K+%b!lSjC`rF$^@nJceKjaLYaYg)LmVTV!aP1;4^!JnhSh9yeP`0e8My5Qh>eVN$&cyP<0=u2heF{YH99inW2ZVV-2V*sRKG) zoMmZ?@bkkv@UjZe7-kUKJC>HBYjblWSFdjwZ)xW214^ra;?ZoVkwE;Fze5YHNcV%} zEwhaSVFQQYQ9FUb|PbDWCGu4Z~ z_u#Q>S_wFtTd~!9^|kiC^+)evtexDTz#+(@c@DtS&*7u;+_2{1Y4`N@MEPwcCa$j!%lReA zzFDX^ChdvZ=MNVyug&ZV_zC*fu@8sxGJxW@ur^?x=cdwcR}F{!PGD+Z$-WfAW5W~L z%}FDW5yl{hiEq#JtS9*Vp}qZiYb(EBNGflKt-+w(W$S!uGN@_fSs$a@2`f1#K8l;e>wH_?Cj`9t3hL+Dp>}Gu~eSNcSQL8dFgTX_;GdD z%ep#3RgM*-q7yt*da8=O8jLkTEqub0U37fIRS5?M&(xMBL^(U4L(NniPgdI8jH)_( zLY;%HpjwYW zpJsWT9AD#YJ!#Pk6KlVAJp%d&v}Y7(82BciTj|p5f`K@lbVBw zW$BRtxWw-VG?j%&PGYwAuj}b4h{^qCX5(*niD#QjH&+^V2Z8KQSD~?~p}|7*pGCdR zUsCpX=e;k}4BfNV5B@~`OY?AN8^SHKG_cIHYGhoxw9m;Ao0$B6mq0>uv!H;0;JncM zr_M%mHI{B_5Z_wbtD2oRd>5#z5_A^O-Bo?nRiLswGdVfFIX1P%2XJzAZ(yR~{HY%? zrx~X;crkVV1CIFcH*NZBX)VCQ>?)Nn^1JrXP{kntYq6elI2Z3U?2Y?+Op(Rew9O_U zlg(~eO5*>sZc&ar=;{`q(H!+ld^S4%^;aLHM{8X3|vhiJhZXR&o#9Cqdh(Nw?=-xJ~=oj-yN-Okk@-xdyj80r< z%C8SR8(Czl$ej=`Q$$+eY}MrAbOu!e?egr81q7fml_swViF zoSfPkE38X;;52>5wzj;w%nUtije9Jce!^{baiJAFt~NK%KD*S|dtkz@e9eHKA9UxX z*jnqjF-I`0fHeD1sI4X@=M~`*(OL)M?}9!(rPs#?`AZ*ilXYsnPo}<{ufyUnEEm^w zkivLCa9VXGw6!JyIbY*6~_c`99!A%Z@j+oehfMT`m&G4Kl zEmxt!tQih<=tJa zlH!{K9tKqu+z#}MKS;+*Q?n(5t0rxAoSIt)+n%0qAs=zUlgJQ({>T?H%%v$7SO}PE z+%b_5FVWBh_8a>wdd!3ZSNa>)u%fIUbDRJ!Orkqvd$e@sJ zW4#0bj7z#lD%2G2;oQu=239wgw3U=pl(ZX|3K;ytfF0f~umanyg3p&KM^~^ru!2(H z*Q7LrCMux`6P1#Y7gJEdnZB_#bAiOf+8XbGRsGFT-c7#q3U2Pn=3SD~C{gwqgDa2c zQn#Jix2_dQg{kYVqNlKyMz^(9k)dD<^Cr3}E*TAP&1UqzqQIYQ`7vAT(wzFv!rF?mb|pKG5CG%m z_>%MpA9<=eYn7O-f6igc zHCIyu>q!NeG?p8Vp)++AqsX4}CZo`O+V`U~GcyZ!Z5fOxm}-wfZinm?;g4q59WLNC<&CB!NtJU*vfzyjq z7EOxTCV71$#VSp?@fY7oORMKhx|*tvkq}sXeg!NR#H+DRO93CG4xU9teT9W&t2(fdoLViM zi?fvEj?g3cwe(;cZeTUan3pGF3HiQ#xT*qtYy`U))2VIMsr}DJorupWW!oL8mQXT% z0kqm*^}yPS5+Jl+sVS}a#Fue!g%JS(sI7(};qPkj0C#@RZXAHAFBtBk^CA1pr^Oag zH(D?|wa_6gT=%VBQ{eQq~!_iXPxh< zA1b*jw=lrjB*f0zF_w=h)As*XA9f(}Fc+I{7Dm9<4~_*fDpIM?A*?yUQ6L2aNn#)@ zw8lq8?z9$_5f+jMOMhhSO9`4aPZ=Hc+{l!s#)hbtk_iH59yTn_3SpwF5$j{B_*bVg zK;75qH>HC-dLFq5;>kdXJ8Qa@!|q&Y-AfS9z!J>Ya$rS*Gf+bVny8|pqAXa$ND0dc z!b_~$&lUs{Z{QDIfSN;rAC?NUZhjCz<&?GEKo*k|-6xCTL=B{g5Vfs*BAyKWMU!_~Y7>!;fjHAA5W2g1esR)l&*8#ALFNO`-+653f@qV*ibf?_F z{E4$KdQlv;GK(ey2wfH9>Oj&Ga#xX^Q7+bJcnE!q`l-h7D}6wg?iUMGyqX44GQKR^ zicAx+Et{7S(J1l*6!{EwRhn(c4o~S)73Ft`1(Mo(lz_Sfd+06$f}wW)xw!_LD$@mG zQKz&tO(ld#(97oPzZAOt#N;gcPL>5U3N7+|$-^)4Mi{~VwCX6iUq)5EY|&&@f9crL z(Vy~XX(GCS>`oo%@y_gusW81-w^yn*dw`{Zx73_pnz;A-N)1a`W5dx)q<%6NOQFmn zjHw!J`$SNLG82YAMG{30ii;DC3duyz{C}5V?4Nr=99NQI05m*|5-^kq!JFUT4|ApY z^*o5v1hS$gOgJ#KH2~w>wWW?MmXeY`MKNp$l#!#N|L0gqyPW(RDTO83pveB{q#9oF z&`dz(sCvqaXmV48+$|ASKn$BA5R+aZbUbOb@C6h)F44&J95snDO#5wzB{JpyOKpU` zM1|@x1Z9i&l)pQH(+!hZ`5H?6iz24o=n1{LLn>7>`R5 z`UT-?q@u(H&kG7Mm`_0^;|y3qPOcTtB%MkOM!Q)Nw>Ls1-A7!##6HHQMTS^4TTybK zPFNQhw${AZX3)bKr#lsmH^%?Jl{=FAS-b1*>Z+=vvphdfaRk#M=L2J_hD7A~J-1Id zH%By`))xM&l5iOA%-rnXUJ5iuFU!fYF`^bIUU~>9%_Vr5_mWWe*$bELndR>F4PmI) z_Rj!8$<_BxhSR=oxGs!;-ov92cMazUUEQtZw?@RJ_VJuPBop183?z5-4)!D|6hDf{ zk?@*D{yF2{`Pm@uK3tYo8Oc6(cgL0D&Hev2t0FLS7mU-M_L8(?;e0XJ^&#JiNt8qj z+sn{Fdz30+??jMV=RqGH0DyCZ=Q*|fXknBEIfKUcKDV%!n=e&UcEmK8Nuklv(T4d&-uU``6d3 zv2_7hI=b>|2iq^bm(IgboxJ?~zkmORPJeoRetvz0d3uF`hJ=I;M?i%C2J=(ri#S$t z{DuTtNJv%2W8klmpn`9p6&UNcV+kT}@RsGWkPO=$dx#h2VukXEhV}1Wy{{0dIu~tS zO&p1A3}SzO#{K6dJ)8L76-I2r&dzRaZ4LQt;Pez^$lR~v7DbJd`B=Ysc3Iy+D#OIY z)bgbWbgBe~*Qo#m%k^6wVT6HDJ`wJ;8SpyAv46jlTe8Tf-rR~>l_RQd5nC+$_h0+S zF)K@0AoGi~G&P+!d*U+rv@{}EP`^RIwz@Ltn`z=re>@Vfq;v~`)^|o@g?v=*HjwR0 zs-}n+DmYExH5p35yW^K==j3$o&lg42a6k@aTwxA6Q~mtHNq zrGAbjSUBKw^aauSOX~s?qQZ57wjn19Ty2LfF}l9nY~a^E^kFR2ti0tu*ZNoUcn680 ziT04w$Os#`4G{S;$xyVe>h|>{4KguRD?>af_&EHwp=V|*A_Z-1`94H_zSPqg2feH~ z)c5(F58r~A&2kEYsu{%-|Lqf|CVt;BPnDhAi+}o7g6c$$*+jEKL6JVASB~BUF%H*> zIVee@Z zYLpd^IujjtJb`qzV6(&2B?qf@2wj$EMjE#<_l!93{Qw7rnD=^>rRZt%`^QbUh|v37 z*yD7*0M4>7yC$j)(8?;$xJS;Ey-;)<%c22C9F7_7O37q&-@H*a(V_t&J26FWR#Ehp#Ciyc3n5}?=MF|>XUx^D0kAA{J*bzR+m{8*{da|%NsF?YPUKobZOsb(~ z=*RfH?(ktUUpvDw6ez`0VbjM{4YFdb(1oe7gZgDpQJW`dmb zW`EoDS=tWY{|GfR9X?nUzP~&Byx;d=>3#SQS${q>(Egh!wj@%85&N8wNcVg4oci;j znnIR4>KFQ&jgkb$nGB#go#|t_|9!Au`1TxurT^b47{2$~@3p8n>2&fqJAdVjhM{HF zwsDSsCTPH^?|=Js6>@)T@_w_d(s%tk3<9PehO<@Ki2+>*l{aUUs+Mh>-&$vV?&vC5 zWzK0RaC7`l)T68Da>Qm+=nGVz+f&){kDl9rCGN}RU^0W1gTDif&j7Bv6ybqDs6eXt z2@z(RN~aHF83yLukxcL#D{7xUof`DD0S^cwH5pUT6KX2HRC`!wWvGw9k%eL4B6Al> z(x;9}q0cB+`N#_p%=LH{&LO+r5-CIeLtmMj?#7Okkt+jp;}NXl)B zP&t;jIB+Q25Y_}B9_K5eyzoTQSz(i-*GEZFE}+iJ!tgdD*q%e(!^w?s6hjZ2O3%trlH_k27 z;tzuiLubr}bxP^W4p5ZFHVzHU``Ich*(_$U3z+pod+ z#>Oe6NS|e9ZX2d9j<}JcZkUa`mN`~ll|Duqh4?~^38#*r&wfnnxd@RZ9x!aFj>kMA zrYQ&2L6|GxDR^w5}TBRz&#_7#g#YyKV%d=mPtM3*>6}pRldwX8^u`1Q;0nSo4Fo7Q|E`FHG-|GffXnxcvGg{^q`ERapwECSE z%D->$F@x4^shn=BFCQ~reTv(H8g|1YxV7-N>mQa{8wRHJhylej>%t-Fy%gw!9sVfh z`4m~1yghGmwF<^l?C&e1IzNxp4F?AY8yg!_ba(pG!9`9m+h4t@=Ets(nqB<@mnmhA z`95zc0}Tm-R}CbMEZ6>?tzUO3D zV&P1Q#DkAnPR-=YqK~5!LY@vQnzHLKId@3!FNI<0Pq2*<*#;#wJVj4_3nNknSDkV2 zj>XZ!>FF-!nZbzh%hl)8-$sSZ@nEivJq8Y%2)W z*MRdETZVw7>dJaLJP=8H;(Yhr>!Vf;J^gYDH$;MZB8GU14m;3rnkv@4e_3Ra_3HH4V3nXMpXcQ%=dr%Zeyw}8i}&=zkVE*P zvi;8r)WVc2Y=vcM_21DM(Z8}9_i6EIH$STNkuTB_r;+nhFp&p;UaXeK`$cze6#Rrc z8=#$=6_g$oy`;qihoYh4A-Yct1V5ZUB6Kc-OfstL(hGm!f=ZR`2_y_~Sb)$#p-?!EqY0PTz z^xee8dpXLi<%e#gsdq|J%Xk=nLEcK~K1&mv`ebU^eUUFd>^LtJ_PxmHYV?pbmDN<$ zojP81^vO?6FKE?%VgKRSI=Q$!d#0T`fO z{yh89+*XIrAI*=GOf2GYPm$L{H>;YQH(seC^!PSk-(P=bn;|&9j;V?#Eb1nfZ%B^` zH?sTV!*Yi>ht2nq^Qvgu2zAD1CeuP9Ej??v;B3r z(I;iMsl$_@t-fDGYxyR+BG*CMdM%9{hj*B*x;c>WPssKbc`5?sqnc;l-qgLBzoyt# zP$}>Te~V2uwdQdr)#PpGAmXa93I2hR0B!H~BGtRylM_e*{1^AT_Sa6>VicgQhH^fE zq)1akXP(t@y7d;1qzhBWMzM(v|AUK! zE0Z3xV_T5LVfF2u+n<}aub!@wHH}iA?ZRv-i7vYP3H`H2Eisyg5fKq&WMt0H&T?{c z;PkV&h7>^VoCOZzzS+NcN{Im*BARYYSpb8gk28^=*R`#UgQ$6zfFH3>QtgFY@Chz> z8OkbmR`$ej_65dk#>{^j_-@aM;#7JMw8X&=iV#ecu4+|n=l9d@C2uMwM#Mx>L&Q1r z;?;>EjR|_ReWbQ=ATq1}=d;WEc2WO*Z4vm7$(+Ka%kD!fb;rs3UD_3|3-XcMQNsMj zpPuK7kk_U5{`+^5kA1LgcCE|%p8y!4Ro)pSDs|5&$#E*ki6-(rp3j@Tt4|Ke&-0MN zzWt5w^|Acvtz1lho_=$b2Y!X2(BJb^QWWu4B-}znggK^r?xb9H9Ea<}t(nlS2gfRB zB10kCD5Qb9BJ!$C^aLwVlyNm}jQ-77pwc2&d;D9THYt=^bi38*=}Nx$_aZ}_o#$Ye zjfUl^DGRjfA#5_bTY67QQN`RQZ#}dvboqabGaRjCaUn z8#HIW@maBb!I=`417u4^%5AsH_%!X#c`pLBc5%cTb=BD6iW z{oTYq^nDu9?wqL6s)|WWi5n^{P})&XIoY8Jxm6K)t_=Ci3VGga4|!7gysIsn&iq>j z*`mSLb%L4%n3)_HgQM&sUTL%YXq<^ZW7ugv?6BNT9pCrDU%jw2yzpb72s;lAO?X;U1 zA)v$DCI3Ewp~L6!B7u$>7E@)p-M1h*H{?iQ>-nMm^X zg-D+t8Ys+jc9Rh2_gbiX{pWpqfXq$z)_c}fAyWKw@>tTt^PTk^X0&pK`DdzQ2Ua4Bw`eU!u} zEbE`wg`DJg_-ipJ2$)Nel45zR8abUCIUBZJbF^RMTGzvtr*sSrZqLozc#*N$u&@Q` zkWGms!U&IOS-!4zx7RS_9>MiR_EO-1-1xU^rR0cC+O9{X0SOrk)Y_!#qkNO^W6FSI)6-~5 z4cn1sU77_dovW-0};T|A^CAO7fjR!zZlSMK_TFM}kqu`b7k8E6i{QP_Izh|iMPnUSLL0n)5 zB;s#G4?DYx>n<6DBBSHC*_d&j zz`Y|%$U6#ahmOp!JO|0cRZa(?#fvBre#i{3CRlSD&rbc@sjVIxY%QH$J^?lS;%5^Z zqFiemZlC?Pv5#=tUI>^Z_TQ^Gl%qUJEqFxALYUq#aAd`tkSd}(yhm-!Uz;&4F8k!;w^ zNp*RiPQL>AW=$&BmF-buxm!)1Ry0m^w)NoBZDANdi*Gsaifx)?u0ptJbLK=M1e8okk( zA}db=kNY3%(tH;N=ClHD5gM7JYOpOeVm+Qt15TUpYgmg5;(yWA9gZqnaec)uA|k@U zQFfgI?iJm{Ps-L6^ehLl4Yx93FGvNyjCC$!_PAZwRu3>SaTw-v2&?UQ+_o+wtD$8n zYGJ^P4)}I5{hnMOioCo0g;!LwUW99&M^zeKrBI<3$Fz|bugS@2lK4m6&~=mYx{J3L zfyTt|;aZ`-@9u4lg}57Emz!%alWYQEi)??=oy6+k(L}`ke4|YM_rv(AT&>2QK%{3C z>C`#E2c_q=&ri{I4Ku5K)cJ0S_hxp-#w74?IHJBlr#qiLtT5yk<+a$TU;gkW?1s-D z!l3)w32B=}rQS)$Ih}vQwW<6l%eZR|>saE5K}0UqH%N$_31da*5yLWw*1ot!ymv1G z^})X9@*VY4P!lU1bJ13;Dzg~6=6H$Xk($W64mKW@R0_kaWL0$;Q-hR{D&wi!LROcT zW)*Qc3JKrzG)kN7#7z}8G9A-b(o9={bBS()4H;wQb5 z+hQ7gxnZus?64i1yulLU?liI;D7vAW+LNeN-aYV4_XPlA#5m|OyDQ1hzw%482;4w{ zi|kDs@9nsUj7iWfK}=S`u_E$1<7&@VE=%Yeu}j z6GAsqr0lME23W5bf?>@mh39)75#ErWW$zDxso5;(ZBoW?lVG(FS>1%*oc2xMdsMxc zWs}$IjI?y}>eqj)@e1K6nEU~doARp|WTgAlpgo~FiB^-4+qBNyieO#Kz(rn-)$QPu zyBO8WE#yLx`urKPRClTfDds{lW+S<2PV@ZjzDu2*3ZP2g#dKApgX}%|Ddl zao6=^!Vn3eRyS`8nI;as^zDE>mjI|JX|VQ7vG#kT&i!=n^NXLwBJJE4V^Dl!zZ{WV z#tLs)RUVxgGT7EBm8`yiXHKWLr1D>l^+F~Viey-)*+fq*i4JBIXN(QFr;oaYWp`6xOYpPqZCm7_%Eobt zGm}0YLsMdgn-SK9GGNQ?tBccOHBmWwx)BRul4HR~sc^9ycj#{plo8^|-@>{tpBx)kK1GQch#3^GJ7fA` z(A$R<>;L4=HDkrj%09m!q65y6!F4u7=cBry5k_lvkfq4A9}LlR+8pDnvymO4fwNZ( z*kSharqPOc=cg!WT1$yaRJ3eadMsx-@5nSIaq$QFFvICJv@28cS{{39B`3mCw`FC)M!s)mK+xAWR`UfrZ_v^bSP-6hme<-K{adAhA zUF@U?UMC@!eN^*Q;qa7B7K+Re7cnL9W&CA^JF4gWDc!GMzHj?@-oIHW1v{)+QMQ$AQ67d{F*VU^3?l(cvo zqE7;n%lK04A<*4O;+Tych$+NR_T#6>jA0d64MFVIN)%jn#q7Ij8=8NJt4KxXby3G< zX8MRq&-Yey1!KDdQ^1D3JC)96fec;cKBvOee|WOMjR*yWiT(Zkg(DkN(`_=WECXGA z$Km7N%PR(EP~7~Cpt9)5mu!WE3U%u3W-eBH)e$t8g~VF7(T|-WVxWf8_Wn$P;QFNgjl2GY@O=bi@s7Qv7i58X@Wr_SI3Rc|{ zo-MJ4wat;KBmo{?L19iwF4UrE)o-|D`)*CxMf|Y}nN~_nxge`>TM7d<_uF=hDrxvs zOToZ2vnnN)t2X&B_jFR~+sT=7i{YM{G=_#>VgxDUH~z;V@dGQE<2|Dvb{I-%lublm zd4!bLow;kyJP7{}WA7N<=>JCj&eXQ; znJTq0bvm`}scpAYcWT?V?RILXwrv~pA&8+C(OYg=1BuK64FSnG09i-F~B`4sc2Z$5ggQM-D~x0p76KI7+pnK%18 z8zW?reVa8%d1|IsPH@sZX3`{C6&;jQB1e_DVFU3OpHDgeCC$|Ohsq&iF6hQ7Ei_|V z>W=m2@}j_KRL?C`lyDs$TR5OuxS_Ietq1#{lpp&EC0>^>I5xNd$}6_$yK5j=3JW=8 zF)}eZkXF#a_n^j%IQQB(QqxgT1f=kBawaDwVdLZDV< z$t7NKx~CVH+39NC`M2CPHqSF^6O=A3`kx>pW|1cw$dGy!I`nWcgTzZ1+D`~$nA$ER zB=tBABnlODe-b!wHrkn>8oero2R-E^R|20FyCq$!k%#MZ&yQ2#+{2jLl^l}QTs)IN z-p#-};fu#^3zBB{|Af(WU;-1+VPRo`wz(}~x~kRG%&eiIK~%Kg)9a0si%VGcruF^Q zc1XM;-K`NJVAfM8Mp$ip;$UZIXE%TMxHL6B9s^FrS|0pO`Lbg5C3;Z}GO2d$#W*N6 zc8r<4F98F?@c{1rTCgxy1VKhbvNcFWGM63>Hx+6mC zi2!XP&x0|dj3h@Br$C*MOd`n>i6&jta)2xK4ReRAM`$HhUW=R>))O&76#n~dbD$L5 z3?0P05)pTZ|3jO0Cd4vi8Jqwo40ez#840UuqPP?zRS>8Un>BEBPjpaG2rW?(rVsW7 zG^zJ>U*GY-Q^7~_E)Uisb~oSAZ_FrHdM0itE>#>+JbVN%eHj1wL9xPLpR`HaQ4`tR z4m6aDZe(PRR$6urft>0+B|Ss2gK2{z8<)u-+Sft}Lc;OnM!SDn|&v-ueWMOtML zm`=MIG$!o-SM)PTn z){Esp+5%sx?rz_rB9q#jSPg(##Gr}mbXxE? zuIT>lXMCahgOFp5s9)2>OP%M5+H4~ME;Yp-3PH(-uhGn?xTmOhZCY+v33ya_tDN&)Gt}&HVy`l*=yd-~D0;se&BM^8V^8n#IMBD^hk;OS(BRMpc@y?uM}~K+7JQ5M$T$M z>3CbrGs*%VeG3)MQ$KYn{v@F!zG|&m>MJdD7JAZwh zC;ga4?S2YZbF^d9MwhzdfaS$kV%m<4CJz+C-%)~CGnQR4ImOFf==9M07%C}OuR8a+ zYss?+gL`)PNlfF90|4eA#41oMWO!e_4w0m)0Cw$=4ql3>i{0+69m!Cj1PB28j%6Bu z_ihJ`kjm>2M+DH@e<{Ynrx)S;gewzc0JlTmec0fC^*ywdXxBY-m(vG}dW`ytKhlLM() zD1Rh@u5|R@P%v)x$DCoHIZPd{xai&QDD%1+uKqNwtFH>YPkml?U9W4D=-6z5Hne#p zuLQWNNgS&3S)IH1+C1G;8_Sv1(d;1h`I-4nPbu-0fq@=7=t;+MuA%huy-XtHBzBG_ zb{C>OdYB*TCH;SjUJjX)?Ec-J{8G=V*EVZbz$NRD0Op4m4|2p*7Wo_@rQ0!+g$pHl z*CnxedV0>z&GqmPs;X#UVPh{WF2X>dhx^Nebm`AB&u?euhKhh3x9bIjB_$<5An@(& zO&HkR*f_tqn4FmS{PK#7iY$uaMhl?BJWU87Dlya{u0U{@|1B(FE;5B90!Qcbo7J)4 z4Ti20+>)uV*@gU7+z%oVW~>UuW!6g%d29nC7tJqH^yH}%t56=j`)q?=MbRw1=9`G| z@+jPjyKZ650b8>;#r>|n5fvl(Jh)1V6OI1Nd&;yxUajygsntTzq8mNJ#bjj%24w>R zztnD)nQBK$>+V67C=ii=vu_xPDJN-w?EKn>FJPi4jK=VS611&7SMZS+%26?t#$VV| zXrLfM|MhFb#i5d3P_MP;+AiEU2UHW>^5T&lEN00aDH%6OG9o6h@Noo%NE4-Js zqsQKmcN-&m*_ZGR<-ce^5$kKq@QL4+S+iO#2!SzZ{h;0J0mtl`hJwMWc<~XWgvU1G zT4V=V9T9O#%;ZMy;8v)>i5X%|V*H_OSF?Jp{Zu@CiJ4d#Rt_%0+!wo$lP<(N`=C~e zIIIie8QkM-3@=&}zra9fS!*-%73g8SB-T9Z5xgR_2bXWJr-JBOV@KmGB6Qdy)g!Ak zr|VmMN5<)Dkks2oZJk3$BiP#Gjpf*ft77e&Jv{}lqkVIWJ5d{mgKQL+MVmNGa9 z;FK#UHT4^P071#X_$mO7c7*#lz(@qpH;7TELi2Zqg9XWgR)u8NRm6F&A{OlqG<)|( zh1=Fj-bVAiQICB?D$QtpG#M&|^7rgShPC!eiaV)Si5tc>Ekv39X#!NYNHvD}rtr6< zs)qn+oLJd5rmudpxw$_6g;#yy<5~}Huy&S2zlWbzOY=UYD3j+bJGpFFyQI`?Z2p@%va)Fz?G-6TYsyfBWPr^*hiZ^E8ziUK&= z6mH1DoAw4QcPR;7bi+hNEd@b~?h^2j$2JYL4F$ic*B2(LKDH5}ey?6x#A~|hKEc>^ z6dzt%EFlRZ8at31bTPvWHY%;c-g*1=q;8Y|yzhte3qs-re&6vOAErQK?T53ZyTVCS$S(0og} zx2}V)ykCr{@qMmC$ONyQ`6*mb1)j1C~Ei`}`!0SCI$5NwjyJZw!eu^`=|g!oe#($!$V?_>K2HQ$`IIUF@7h##Gsv4yapS z`H{DFbpTWL5l>wAE_)qMMq6rW5c(A&ca(PWU+AT=WkVZu>QpzxPX^>g(f> zub|!TX4 zu&61wSBY$`H!=h4LHE)5C5XX*WkXAlF zxX+9;A;J;&Y$_Kr^j{>GC^{`wdh@YTyhMt6G6GZ5947E0=U9yzC`XsZH^;hixkR5r zhrzguRK!=PRhTdDJ>w@U~g95`F zGQqhCSy`J-?bVb%3-JDy0A$x)$DC8y{~&vNnkt+G z@d0fq588~ke0n_7JIFZyU=4*(0U6nu?k9<=yL_yB_y6*-wo5b5?%CJpr_jMf!f7+l z{PIpwTvi_kugW(BDfs#M$5b^h%6UpF`>GzmG{Z;#sqjWYUrEd}O;Z2$H{5z?%$1=M znccD7!1Kx{tffUsSsy(eXLox8za7{b3)n-~X`AV&L~yg&&ef)(Q_le={)v&f>)kpg zX($)qRt&FC7w?=YLUd0n=%7jYv>D(bO6YweXV!f={HldxTD`+UF4$+AqW`vX7DB#2 zY;{KOW1^^@I7$5R5s-T*M{-G`_Aq|-cL*dOqwjw9S2m@wurL`vdV9Q$E%=ZgHd2oH z0w!UjKkyy0{h6!|2ebO>Cqr%19|>G3zp!TYWcp4U8E0n(9cv6J={L1fjiL%%{U1da zr;CywU=z zeHaoVVobZq!4B!kS~MVUmOtOm-qRRMUDHC-*;&TN2Qnw7aS<$QgA-l1M^qG)#_w>Y zeV=~D`FqX5jb2}0Z*Lpe+1Y`~K|MWi{SxSS+eM>%@N1TmQSb&%LFF%x4K_Oz7cYn_ zcRafx2#IU8LnZ4bfbaEg1e3tixzq3GQ9>}Npa76$_`sdd)8SmMK4wKy(&|^o*cLEFLG^FK*v1!aU3NnD5~Td22}ZjHtzCF6{Zb* zExm7nU!7HdOGlzthA6r9FX^`(&rj+lW6ma*&K7=e5+U&{hE5qNv_3g}cGvaJoPy>3 zI%$J>j0E__rtuXh52H5tR80{!tdBci+GCSKpxpI!f&4(KVEAm6JX>`G#QZ{dD@Tf) zReN8LV(v^dWuCFZ)cBXaVF)`Mkuw%$@C^z^57k^RwxG9rdG7I2FV4s49>av_XfFsW z`irL!GC4kibEog_Gj$2tF)bR>zn8Uv)p_^$o$(&8$x`#u1ls++OJPSH3Wi!o6zPV^ z92f!GBWZWysaKL6^O5CY^4O>XqZkd)}OsxYcgl_q$(AJ=fzUIldR8xO!f< zO-tFH(p;RmdA^0c+D|d0+|4Zbd_j_|0vg$upP3fVBd4p5vbGxeZ&iyPA^|rMf2VaD zIHRRgQ}z$n}z^kv~c}opS{3vveW9JRiy4E^_4ovA48?dgtfgPejY3us_V?YSx zp|9U@9Suth0IAd|8%^nCM}$?l+1vVf`8KX1P8HGrItyPe#ebQan(|KDVth#W?X#1F ztLMHG_Rm|BsWQ*X$Fq|`7gA-0Wkq=)b$WaHy>U?%a<=XZET+b`~TwwN0siK9ctMSKn~W z&+7X=ROTto!)ek?Qo_TP)JQpun#@j@wB{zStgL{OLH73c5D^iYMwa<2TG?kSbx}&TA{1zUhCi#vCQhhlCa#jt{km|kw zZX6fgmsrgrwzn_zg&a(fr$@%3^!P6K0 zp&RxZC>-CLLu_q`tHToVoRox}f+Yq|w(0H`g!)}r80wfZT4jtTnJa8FPMD>R1_R^o zO}F)rHTCK?c^f8qoY&9+Em-IJIG0dk6c%tjFxGX5cs)`h{uhsMp-lTQeAG$hsjrG% zUF%78J7RAon=X>4M5(X>H01Wxk>4M^H))5uebI*hR5|1eU$|s3uSpHzG}kpQ&ze4! z+)e$Q**8HBLt6y^%&+U~>XhKGG83dtl=6A@At|j8E1t(rh^`9KJs2_R@tj;eOe-Yh ztVeNL{)E%vx`f^d8-n(LFl)^%M+0j{MqWnzBL}Eg9z~PU3oVZ{Fu#qJ*U473GDojx znin{~pKq)u-+3lXojmiJ(M(IX;r(HCtw~aAbW=N|Q;%+#5r!$LrOn&qm;(NAn3orK z!@e}j*(F$xN5HQl?mo(KKMYG@-;3AQz-tz!uLhz$FJR{*f*VNFoskx|&DAe?al4(0 z5I=slFids7%iZrUn$|C^s59x?Ut6x=jLvjb8>5;;nuu3?jN?yp&WzyPqsxRN+s!|d z@YxkP?CN+MNSuVH#@b?vMI8;RGr08Mmf*PIoCa?Bs*ZBdby;arEeD{$q(>~5G1e>h z+=mxS0W#<*?BRqlwI$znf;0fS{+L`trv%}O|7PZx^sg%{vwN(xX+|6xd#P8q(B%=Xk;Md!m0Sb3l0g<+!z+u>+L_ox;Co#t7{Jlo57XZMKJZ;vJ3 z^2e{?R^=QsYpaKUTu%$J5}5C@ru7$D;3l=THVlgi-ybw7r{h;OMOyiJF(d7HMw=z-GXu2$Pi6lKllbWG0gt9G+X1|Y>qi}wwW?piBGtYf~75zWSS z6``#IwoiT=7!~Lz>{lfZNy+BEwV-qIP3Wu&K17Gb8dJ}24O(M6`!$mz@9RV3>K0LfuM zge*3~_HSG_jE}}v@zv@FAea{rme=$+Mtulj#H`M2y84VL8{8&B1>2G;P*qx4T6%8v zTVACZB4=Fx$V_}=nwD4y6Rh6KwLgh$GYN*3)tt~C5`jF%q)eWn!v{4^t=D|@|2{9t& zro~Hr-yySLE`-J|$8VpQXJ$IftBb13s*9@}=O~KHYrT}%)9`bPepOZFl^0kZkS1_3 z_>m}|7Gb7tsleZAHwUVjV`7{sFGR%^^K#|kmzABA>n+VT*rUeS7&~xt*MSo8&PuDi zCg+EEDAM-5a7 zXG^a;?FM?){JuMnR%r!YMJXX+M$kj}l0lC;?`wtQBn6-PjMkqZ1B*_kaZ%N21zlCz zN>5K?O%$4Xm2k}ZY>Mgi;(ER6-EL`ojdeUZ$(hq=9TDD@b8OW#-9VUT9|NeEp4lwZ zV^~pEElyFI9Xr-Dh*=o?GwWqMrSq9%CUbaH)CU+z9 z3b}D++~PSJo&q~Zqk+)RiX0(zb>_G~Ybh3(8teSwonEm#X3u7gm7_COlW?2HKr>z2 z4Q?$Sth6w+jLQ_1IuTm0QZh1-gmQoHY%e9t>Uc-zFURPXc3zzvYb+hEDMLiV1ja-A zyJ|PDYDT6RdOI_Zrf*SwKwwYl~PV4C-6;@eUdO(<_j_NjFnt<3+D z4nzad=!fm@+90vLK?=6)LVzss>FJ@Np?!TnHw6XZ;o)=pR##Ws+uI2U3GZ(2C@Cm) zbvJTNbDNf}wOm2o#BrlgtWP~X<#FwAMK(B-bh`H{v% zLP$jb!_>=yJONPIe}SvP`xnuPq}~`*d#;!XeFoc?Kn5DuWH^?4VdD&uA_eGJKtK=1 zh>o8cfe^eQUmVuPXRwm+pZw2jS(>=`J}fesA`IsXQWU(Y;UbJ~F&dol(Ij32LT;^N zc<$vIMtpJ+o`hk4)I)?ZhQl& zbbbUfnPdd{ewE(23mIC8>AcbbiEE98Y<7maM&=%wMErh(k6mt z9gbZV*rgV^E}K3~aGUZigXg=a42-PCOyL#kLT_$XJ|cnRJ&MC~z&#E(E7Ppvr@$3% z(3m+FV!g3AV$mv%3IWHC9q;iGW<9V%nH7_wZv-wzN>b81AGaT@^m`P3-MI%NCggTD zwyn>&4^871@mS)}P9$MYH`e#+L;u{rrLG9ONTZC6O%$$N z*^W=OOy|BcsHR-n^@#Dr7@xW6|1-Yw+xpqRN?|Qc*y~n~5C5Yd6z}S6tIcHwa00$F zk8Dl6A?0)f04+s1q2#|JPz zn^h?K9)rh6wX@+w==vSVJ^w(hvT20iMPC4F+q@uyGhfa5`^rM4czvlV#f!$qj$`!%~5H!v>*>6?vcJU^^-#M~NWu1ZOv6gpl%wpU-X~6SON2-oC<@=$gr=kH zz9R$ihY0a4FJWP=V}1_}p~o7fW^LQ$6igH$&v8xIY8&+NgJL!Ja&%mgXNh+~kaPf= zG@&MXbM5)Cs4)MRDKYsANiu0-LMB$mCMRcXY>cV0^*eYjr>CY$%E%xfBWI+iL(oD8 z+c*q(EJUg^9e#dh8E5#Z0o-8gwRAO2CMJYF{`ONEJdyn#d<4$`M5@G#mls9gKy&zuF2rBw92EQ}z7l9OU z8@RMQY)02UWAnVo4K!oneBd)UY;t=|HRKqzupdOLNFCtGJ9Vihe~on^8{!_Lv6i6?7aCu!h|f@Mqk4`wJYDLP5B_%5 zGltrSn2bGd;=VT~UugL940#z{MJ_tuGdl1_QL2+`k50aaj!{4SKTA2ktwPHo`Q7oI zC?kGpUfvBgZ8bRNY<|8maUPsM7}Z5^7aTux5_Nqq9CJMNH=U()Zg-dBSQ2CkrVYTg zyUc>hsv= zsEcfg8CigEDW)A6;|&BMJmxPP>BEromSIiRi3ai=R$PKAeE;h88HFcC7wwIF%Q)%x zgUX}Ty@eWU(&E!9d@h&Aa303(Ffs?H+PyK8?pF2+*!HrLf=73R9Sq6QzATgP>Js$*Tq6x>&PEN{x{)xJtl#+>n zn^RC;V&@zuLU({SDxMlx>|0(WpIsQ1zPhJJN$YZAcwAM||Ct@rR=rmQDWAFuwG>lu zD*60Aicv6*qQ$8t2*@LWIoiCDE7RB6!8G?5htdaV;>q3Czo;C=cbFNZ`pF&)5vIb9<6L_hWxYH0b~-92#{XQ75aqDw9%j4`{2&g@3J9G1 z+ezU>W1>VWQRF8}8`}DDp+^Q`0w>3Cj9*G?VM%J@pfHCX2BPB(SNY@9rl9}C!vfe! zHoz#0?R9m(gZ{ZlP<HFLS*i0QiZvK(PR^wX?tgN$3OR%Hq85zP3Nhv8_ULJw30Yr~IUp*qx5Zlh%@@`ZQ-=Ckkt-;PK!b;?- z7~y1td=>{ifjQCI^2*Mobv2_5SzjoiQwqv@k-=En1e!;b`*b1I+#{e*D>ax`K@oF; zSOv@_u$8_bEe^bB3Z5y!Tp*?o7#MlizR_Rm;?;k^x&D&u%=sAn4&ynA0v8e-K0Bdd z(xXS04Dq1tO>q*UWUnFD@7o}=te%2a{+SFcK*Nkf7VhTc)!h46?Xq|Lo|P{wsD0uy zK0ZQkl}S6LEMS^Kq8OpqO1+|GAnxrvSin$_z}{hBr=z!blU(%M{s7PT`{4+#(uB$e z1Y1Um7`K}t^WE*0&K&P*shf);gL+Wwo5to?daNW%fcn98x1E8;6xk^da?Xkm;)K|g zr9^OSY+UJEnVXyC*WN)HQ@7cstqe1c>B?KTX0;UHVKb=1k3fK-6Vi4lel~`z`8F!6 zOSJO#scS)Fek&fQ%4eV?`rF~fBwlRCw$pxil?j2T;-R430z!i4aNXuY3{yJvN?}Z% zx^ciz!YI_nDD5Y&yycnBzm}F`F0vme6N|~AX&(ov$~((Ly129UEWe#BLip`a@1G{^ ztnXNm_MA8kBQ-L!2ndNuNl3D@#IKA48(5OEyQTg4NvCOXeZg_BxqD`J^lTOMd&-&$8vGU!Bwh)nAl`dcBkI^{3 z$jZpjmHS7mSTP(vPk^PR-rg@_QS#Fb%M@kKJ{I3+E{})Hb5^0}Tg7msta|LwSbgQiHCjj0KytK0)pd$ah%Faglk2hMK4Gu6UW;+es-v zc1t^iHK#eTfy_sfH+x#A0;eE!MF-ZhiHRUZosA%>ItBRo|7u{;!FbA088>|Yg)v3Q zCcVG*Vost-LOqz2o=$*{{`JU8%1YQ{ZEa0CvS?)DvSj-3-~EP+O^KF*8Yr=&qr-3w z9FPgjCHzZDj*AQoQbc=LRZ z!%?=wmn@sPOxaHv^;5>Rr)XW&OS+n?lNArP%UhVi+ z0U>Zn@|!-p8wIa*3m1&K=maTpL>@1V-I^+*Kp?EU{O?Mi(P}7bHEtP*!;ujoc{eWy zz5KH_{hXLm;!~o^$QGp^A1QOD9>gyF74)5->C9$bM++jwe_VDH^7@ez#{q|c<`5;E1@J#xU&A8g`KefjNDym6OC$QgGs ziD*xOV^hOWVx`aHalS3iR#2LpN8L?P=iU5+>vB@SZan1}@s2<4F2pxKk=@`iZ36F8Vn2otXZep^GM> z$_#B9Uy%VzK)$2CF75h8{=4z#l~ty?AJ;))s@902f5A9|wxeiejE!GYh#QlCv&n*l zmxuN$)FMie<;OE~RVxXsF~-c$x};0}+``h9*O@AHN9j7tyxKwiCIc}g?5~)S{LARW zkVi>@wdL2!o$PKA+=GA5HBSr;@nhRw=GJ~EPJj(7zGJ=BV1$3hZ_;$M^z@zWewbX9 zk@?ce;(x1VMDAK#CUoE9>3RA1`a&Re`!Hp>#M-vn4UUtyR#sOR)6a>plFm2XwLv4C zUaPF$TR#Zq>n4f-aqC~3S=aD(pHJ_kNCr<1vWORM!Y)IGQI7}jZJBODq%&3IK5v?i zWE#p()A=wN8ksCeJJ6RXHM1|G>I58hUNW2H51y~ri}7ku1%3Aa#u4(O+vo<)Sqs~R z-{AKXhPZ|i+t}FXwzV|MTM@RIa@7b*f(39BG=Aoc+{a2Y9fu1B-mfrYpg<(nQ0!nbELH_jBZqYmHqeWpziO7+FEj)wWD zy~kdqsEmoCuA8>7wP|ap)#G*~X`2PcL?Yy3Q$FH8C#t^j{nUQSqv`rKl)#Uu!e~92j57q_Y z=HH`abN~xoeWHPik60;YGcr%kF2b?Fmq6Dp|NP^ zJFC$73nRkUWv9sKZNjaWCo?85cj_f)Y>6Qa{m(v3lu^n`Rqt;4Z`X^!bQB)lhe=}l z@IR4}>@^zdiC_=U?RVPh^0D&N)aBDt0ze9)mK8Y92;rDC9ZtsDcSq^uN*;&MlRYLn zI)Ey08hkwb{QNvTOrDsitOeEHI5>;H0|q(fh>C8yTDqi7fo-M#7hdqHq#Kyo7DtZd zU88_Ns`lafD)`FpN_rwz)X~v$894) z%28f28n$jorMPXQLwhHa&d`{MD)kpum!IxGSWV?M|D1%m$#FLtN%Mai$%;9qwwNpw zi;RPN#}NyvR>;X1`5Qbvabl<9>Tz3k<@N0WGS+KQOjCxAY}Gwisl;=Vdbpj+4u+k` zzFA4_9%9x9-1l&JLlXQs>Q6Njq{~(0!f@?@on77xe>-~f1Dbo#eot=j^%k9e_NQ7G z^A5a^aj1TP3`G=w`U&vqU%I^ymM~(p^FB@*)Ja=sb_U2cNYcVVtMaXQ23b>U!>>+Id$N7K);ZT(A9T%29R zDWh0~rH^p_ZJXG&-ZQJeZ)D;;f>(%={xjkKCrHroKm^Bob!LUTS@-z`ECSNGN=@ii z-?KX1K7@@|Pq}u!2y1+-VtM@ukIGEGu$FZNdafRC@fQ_(?~Rqf{(H*>-(ifk=$$1l6?F(wEquC zz`Hw%>izE|W=f~6yf6f%c$Bg0z7JVX^_j;-`vDXHEuLi2O)hkY)9B?Peh{QCx+jsK zwbsTS~m2>@D_O zT?bPe^kZ0JtZTE~Aa*6`r;>6YQX zW|H8!;}BPClW9I)&5Vn3?`yN)e7>Tpn)q4V^EMDZEYUplLbpzZT>1}beTfAB=HG&4&n9-9vpt%K`;u_+9|;VlORZo22VwE|Sg}H+G(3Ktn&$3-_btz` zV^|{nl?>Z_1MgWPe;*BvXd{smD`ClwnL6n7*Dgjmj(|HK6ak`@MM>A!RVrF?nsg=p zrku`mE(#ObLl|)yzTu|}>g1S1s$h?gg>FR(;UopJRhnXv1-&^pxN4%LhGby8i?97W zhm%kq%Vqi=g<0=r`@Uh0ARNv1)U9#SRFA&X*vREdiKLcKq)e4Ow`z54g{`w^kBPP2 z9+ZSd{bvvH-SoM(k$f~GGIC2?oq0&#{K$Es&us0NiqiAVbuEaW;WgEf;5l%e>gB1f zZ)F=Fvyj8|4F#?+e{j7wL(NjXUwdD~a&>Hqt}F8=O7iWBwZMVjwV3nPw(dI5unX)P z7VdeCcbgmU?HuXHw%4>3bpd@=$A4fEQL1H*En|2Zbxqbz1@X-55N=H7pX}9rby%PG z*OQp0DnyO&M3Ay^U(F}5?MPPjaK|wA1Szq*pOWzc#xuw26 zsQbRouMLYH%|ve5TFk@z#2Zf zQmvZGHy4Knhk~CH0|$$b{k6j3r3-x_L&>k3p--;!ZgMyFBK2%~8Oi9R=r}3asoJVJ zDL-m^gDtI@qEM5?fdf%W^41WJK^v8Fjq$(y;P+Bq1Vk zAz6EohuNhj<M`dj4QOF|1U^BbBmd~t8P@!JW7Fc#5z4& z{OOf;Tb4uhfLb_RKxusSZ5uY{Vk|-|23k~7LfB+09&ad#i0i0u{q%BjO+crY=p@v& zF{ZF`_ce^z8FNbN_b&^YpaGg<4(7tn4QOo;JcRZM!!Z$QIxsvs=*NbPDkVQJd8Oyh zW?AzGbZ`n13gDJ`b7)aaT162xl2nA;s=J5e6)TCXrTVuuq;5>&RixSx^>7fltx=`G zR{~-o){bT9Z7rb!m={A9+&q|S$ymr)d8{k8BwQ-BTk#=&5eOOKm9!ps>bD`jkVUNQ zCQrF-wE5`lqvQK;p6+F$P^PwlLua19r(JaQz-?fbe-^B(Paaq0PVMLAp{J>02X?rf zoHImnrcjB)C|=Oz*H+lM+WNSba^^W3Yf3W0eYJsHy*BU=kuXtbTKQJyx}dMNwZMyX z5q^u3c%Y2TM?-_-xtRP#;Hr^x_KUyaKKy&Mqnj{tD&L|)CORVJmqPd$q)D3`gZyaP z1URY*|Jfi7%P&$)mS6f&fHnTh=~tKL0L$(gw_l~@bZo2?diCoU?sC0#t z^O@rWRG7mnwc)ih zR+0X{e|KuJ_HkVwP(-PBRLFikCLR{&_ot%8$6?wZq^JuhrH5==lVKZG=G6~ypE7*q zO9jEbu)@+4tYyGFy2c)6d|`hTD6su!LAsSnV*TCk@av(`!ZnTOwO(VFz(R5DuE8G$ zi}N+FTC1hj013F_C9E?i0{OxR4bt=)W}2VdDz$7g3h_A!%8-5gX@*|aC3J+IZti$m zIR%0KGJ?laI*aocHdnXd%{+4#JUiqnS(M5Vx9um=Co#-1vqZSi4^jX$mAX0y@NMowc<> z8!{tCbzsk^jZiA>EO>3pD9knIe@jt#9p(-0kYQ)<2)8mR|DD?bIpH@IUA>vD$*wBN z6e0}HBOSSgqX&TPsYJCT_H9Iz`}0*i;R^rz9N?Gq;V__v10w^2P&fPy{H5(>GETB- zv8ijb>!ep1DQgK)tr)AMss zW##$nYe*h>qb+&FV1R(8jt&tish!=`cUsz?Qc_bRBYs4!I=4xPU{UFteVF9LM( z-B*lfCW?QO2O{@{UAvpwWjX+ypFv6xF4$w_`z`9>y)5wi(rSq0f!&h!Bia5@=TP=3{xJ!}>?fSbc4i@_!{DHI{EV;2;h)HI90{*WI@v2O`|?Ensy3>~Vk=mc;3YtYhQ zA{N#cWz{9Al92BhSRoQl20|8GYy`5=Ya2lvMR3~3*?V~B)pXby*;-n=%6-Xzk3)g* zfrcI_QUd+@MVK1fGP;t!YTyEhu9km9oo1?xqi2J6wMVm?D6$yZ-#6HDU;CRM`E3Zk zaI`SD1n!f{$vUvEF^G;TWt=KVtb0l;jgSNnKP{V3TMt+9s(cNWX17kWL6j=eWI2Nm zL&yxvab@BJovv>kLkk`aV#jzuFFT8bFr*j!3pm{L%zInTxkGZY0+J05dIPL1-SKS1 zS@_v!e{fD8hL?5+z6t{LvcPi#zi<~8Sgc{KV)b2-ZXY0nBsWnd>{|-vGyr%x*;s-OGo~gUFyD_usz=9+(r#zQ1zV7u_U~FdNkHev0E!ahZnWW^u3-z2kWl!Sp8d=A){d~7 zV)Jo`h(J&RIHYm5cC3qtitMbt>}_H0ZsZ%)4@}{}-rhxC#IW*!uA2TSdS^~seR*j+ z0$^i9oGnl-{5fC*kL0p28ClsL7ybDYC!(pgmKnVE1xwYpmEGNf?CcEm^oS7Tp&wU! z`J19{zxNviMi-NTs96s-Oed+((r3~b{I@IBnPOXn)gDez&Wd<1i>ZhPr&YHWgAdPs zyoBB9q?LvSmCpCiE=gt=vxQJ?g@-bBz5&DVUen2kr#oNtbw4u3gt6~fMFz+VTNAe@ zT}*~_I*n#~3Gi#qCa%8!B(*)Zv?_C1t@8Ch&ijYwZI2NKQ+#``wq3J zw|9pu<^iqkB2Dx?hv_P6>?rK=I;a?}TJyTf%Be?yO9PTzg=Rki22a3DWhcjoDH|pm z+WV#FJC}a}GoQp$&Z^BzFI=c;X-3h>ng zn|{N4LFAO))HlD)pR3ubN;}o=0Ml)KvEOjZLKnN)7gRFmXIEzz z#hgSveyLhGS((@x{yDfg(rH*tt9bLG7gRjJJoe~kD{q5w&q`~Tx=;5Sy^B0ja$my(h5diXdh4J#+9=F7!Gb%%Ex5Z&a0u@1uEE`c z2X}V}?(XjH?mi3_bZ~a^?cKX~_x2xM)l=0|Q(e{bzUMsW`8_S{>R*pDhy@Cc4>b7O z!tJYLN=`pU=xTZ%@|9G_-ldHP=cT$+FR$Kj`F1?j=-N{Kh*t_@d@LHNm^4AZaulre ztZZ~7J-xJ)^p$hZopCi^0xs#X>#3+HEwI&Rt)~re-f7*L`|c8hc#-qxpsQv>b+om4 z#|IiR%wf`UJDdRIWLFa$?r=z>Hd-$PCSkJ8_gYs6v^UKBw+oP8bS-x|f)&6AyBjXzjvvl2U1$CrC zAUn0(wDvuu<6~)OKQPV0#M$P@?~%!^)ck*&eZQa{Z?E)~NdLLYHdbW9jB|HHE0Y$w}1I%@r zh)#5crhrn3?MQ4VyTCJW5*m04$;;cDkCzv$;N|av>rMrQnSg-L|G5y896jk4rhW{) zZC!v-5!ct(r)$tyg}T)az6CtnFYD=r{@h*zWHb$SaG2O$#Mp%`%%m(Vq-e@1i;Xdr zq+MSQ7Cdykos}Hr)stfrI>{25jO(=du zcNdK7Ch0hN$vYuLPMNXbDf?9C3fve-R(DW^CM!%=GBU{{H>EVjIE`uK{na>mIde`h zDXkpmqr|m!G96O)lCk#Au)(vY9Zd`FXRM!QH!v|(=9Y6`8GKw7IMJpgE$Q?!S@;Ht z;^iLsM@knyh^o5#K=q{`#1(+1_lH_2%|0>_e$;FPv^Y;{fgX5`&&H@32^~ zM;$M4HS%ZMTZ@4`L}km6ciYAWmCLmQSoa7$@d-3R7~ym?=S8OrOXYlgVfr?@A{}_q z6+Pu_ZfcoT5O;0yRl9%3e~hKa#3;Lqn{6|3gL@i#0%}R#EyqZE?66h>^&B0as>X1k z(sMj=6=*vOzrvrnID#=?S-xA%MRIkkUd3GIPJnMyq04dKfi>SHt_F$SfM>klwTQB& zwe{GyafcsA3~5@yz%jSXM5u^luO(JL|HRmLa6z;z@>{qwTQQTboaj@H)N zw^5(uw&B-oFbJ8c$p@(hDN?vL@5i~XUoC&sj!k^g1*-2=`Y}0`p&H;;Pe~QQDA-iC0{h=H(@~t3|MKoQm=877xypC(7fE+2oCII zLu>$0X?{-o!`mh3edLTa7>-gkER27^+xWt|71;^)a zkEr2F%1|&~nYn`0ADyG&_G(AYHfPkRgGaaOm~hET zlk0A-of1wz)i#^n_CgO4GR<|(O&~-j zqu-+{eRe}3oqPzs(PpMJrFp}3NbF;wkxvzDhQA+No4~tiVKHrWzo*fdeX}&<=?7b4 zGg(TCuNrRh1FK>wKW?S|HNqDc7k~f$U025f5J3-ziZE(e!&pGrJI$WSqI+EP*5aLZ z1<&00`o3*#ZPnU=c^@VwWIm3aN3f)E17PP4sZN^hwZ_u}$lpKRZ0J#)J+4geTsHpu?Pp_{7#KC2x@Igtcp@ln~Y_)XEzmxa@iilxcYli}%ZbHc%& z6K)Qhirn3(Z_6fZL=V`%-nRJNZR}K7AmCQa_KfaJ?TY=XVb}05@P9Y>IP%_k*|q|$ z1997;*4X0zfZoWu(|r|16(L&CYHD+^IcYmY;QS0H$6lwfBx=QMDHQLA0vl100_$?gm&eJ zD9o6q!+c+lX`Igv^;5FM|2f)DjgB4NG%oP-y!Qu1gnxPes`Hf{5o=$LMOlbAWBHUp z(cWa4&vJffpYyTQL(sa1w-j`FME1LVSB2Is)Cd|eYGy4dDN{>AovPUt@&=mdSL_6uC{W{;-!wxh&>5+ccPSBb{yk4#1}T;jCjQ+<%=aUBoOV{fHERom6=rh@gdEaId>TVk`FA{hlxl^mvLA)!4A{$cY_ub;#S2hSVi;vf#9OGqPdxqk+Hh7GfNsJgn^Oq z0V(DSIeV8!+c{SWZ4|!_c-Uk3hlHf0uy0diq3u} zZ(Q6rbPiq4b7a*-jWlL z9{)ej^8eQTh`97}QB7Y0O-SW!1EGM?vXOWEy9+eEa}Zcr@}MNcmstK6I3D}OfmsGt zzVy!~U^do7?;zPd4@KYS%j-Ul>B$1SwkL9tS*gM|CjZfg8Ug_*Ksgpx;{#5q4l z#!F7UB;7a+Ru=Edmj0PBG8WP%H@A4CeUyV5L)dp)!UJiog9G%syU`fpd?vMXj6j zykF811;ppfsqW#uXzk=&{x$m5Q$cq);GqOMx39by^iirzgh&7b;wWYTr-yUNa`kTE z0P=j#i>(ELAn13z9)8@}c9vL1H(Mt6RC3*ppJ4yJKK55MA|s3~s-yu}B^jFPgt4^? z_1wgsMMRo&lXEUm>bNnI>UW>xsBV8Dp-|DB-rEe`{KatMdH#1}) zyec`?pWX~`%@|01AxO`HlEvG~vf}uWm$R{}b&e zb^6W91-)q(ngvoH0t2m~ZkQM+ll$=Da@m;#&{FYZHU9AN+C8i1o#RdyMpPC?K1#1N=YJS5Rl_s!5;_A%e~#AtV-> zR-oz#Z9z;AJ}gi>OaCu&%n$sWT>ID{I|29-Nw+wc&D$9Hf z^fcc~ZrO$vGb95fe>m1@Rwg9O*Vg`xiJ3k<^A!#l*_iH;ZB@j7#3`BZ_F*wqJ33Qe|*DRa3H))oJFSm^%;>IG}R6aVDP!zq6=4 zuc61Y)yAiof^<;*?DtPgCif;j0eZpVHjg+V4E@$$Bp#yB`P=FWxDu{0F_X2LzM?_5 z&I^f=Y=frd3*Ou6F>vB0SjiL;DLrrOd1*Z2T6#F6$^ChdIfBd3*-lZr4Zn$)^a`a0 zMmvWYj}>*A8*co!?-)u6HheoF0kO_bF737$I&94FNSyb}jxs1SX;JfCJk_qlv$isJ zoVa}RxrD~H#)V&%xrea1j?~;i?8wMS$ehiXUu^hY$yz;Z8xI}`Qo%^=vH3ZnAu`WA zcL$QbcN1Tf+=69Sr`jaB;)-%;D2wfq>m65(J->&4o0FTSxhM9nkN35jSgj*$!O3lcR8waXjgKN5iA#MehPbiSRql3fhMZEAr3K!*KFOAG zZN3-99O|TR zRPY3=K14qxwd#I1Bu-M|lrw*K*sN;(G{?!AY3Xn{z9xLxm~t-Zdui0P>S z4M9tlXg39#si|}hc0$W-;MwBr?4*G5#zyYTNsYbb(nwnnUGSDskF(jNe`suJY;NRi zxkpsU7f(k`voy2*`P1!vuPgE}8{m+knGU=g-@`?ebe2POh=5AJ5Lt%F2#V z$Ecy@sx&mMp_zGYYZ;un2H~2fzkV1wmyJO}b`m;_oyv82pHKvL0e^;OOuVS&#D1|5 zqEVTsjQmR&IA(2IR$fs9iNwxeUOB1eL4Y)RMWBOq@t)xnID>1DqiI=XV{Kz)Wm#EK zSpzuJ(=leKvU5Xeymx7AVsBh>xxdRB`VyW)jj*$rR^3;{fU1k$7{eD}S2HOW!_LLQ z+0xYFa<8_?d54G$stl(Pp{%Rp72MvKRo>v49XUqjN5md;pb0Q>DwAbAj-8pQU*6RX zxE+FkNUX=vyI@ee&?DPIieA{rG`23j;542F-k376Yveh*pvfxePGVQG@JfDd@dUh3 zI>S6;4*g|k-I`7R-NP%exV0Rijtl?-bJlz33ho1|)Q)|24&gaWV78On9IXegDUe+! z_}G29MJHot*fe@y3(6hvY26%Mto^K_3pF(iK4ZcQLPTMz!b<#2J79}MkOABfoa$u}6yUi@N>XV`ktms>e|G8UTK1D{ z>*#Hst+kMRDIMMc&nXJB_l%+Cr68D7gz>CGLQ3f9*mz%!o~L}$E+*(-NkeET1c5H; z6=FawEw1+<=GAYu__S@zJ*7BNpI9u++_E-zmQxws@dv=clXF}fLiPVeYy1pp9ILw<*M=8EpMhuBA&k52Y z_kWQrNfF*t+~ll|J8f#ZeNshgTzVTOhgL;|>4@Kp7jRZ$G#yC)ENx{ceCEu|1)X$6 zv!=CS|N9aok}Zx8=oDURYjU@BaNIGI%aDu)3vHh*VLZJ%T3WE@M*>PCVikVKk4=tF zj!#M}$S6ol$3%x1y4>y^9+Iny*Wn^ft)Q>zEq^D)2tBS*B=0-Y_I_~{um7$p2!}{EY(Qe zed)*tTb8jQPwF5^TgjCE2y-L8C}<;DBVv>Os)*t&zjWMguBa6L=wFoPf5+t>nu@M*orjwnCmkIfEp2>B0YXp`)WCm=F^N z)h!fnVsbDwHDzUG1vX!UyN=+I_{PhEr*_iRaI<+iTvDj)Ks05v>4CX7U#S&CAJPOC z)AEg2&#{nT2i#Qq@Y$EfQT)#=5UD@m4)?3NMygHY%n1dK#6!D5NL&5xl^1Ue?Gex2)mUdrN zp`K}la{m*o|D8a8sc9HTTN)bJz-~?^rr06lALQu&39%I!9+$Su3dmGxk1GM)+6D#& z`uaKP=~mX(;5gTqn3$a0+>#VJv6(C>E#D$v3}+id59PIO?5LJH!S%GPtOV6%w(h}z z3rsWv%Gagzy`0b+37E`P?;mJW2LY%}Csj?`&;9+E(BzhiHc1FYf!D*qhl7<_^ZWJH zq{x!f*l5c2`TbY1Xce~@V?h;(6*}ineW&HYfZ)6H)y>X;d@R!3xNtFBb$?MS31t@% zClPh=1z7Fk6iIp6_yt9Rz*QhUE)KEInkh@zFdkWhjEvJke?_buU^kTWuS=(T0X$|b}8j9>8We0D&l3e(2Jbu z?jF|PoQfmB;Q;?hn%Cll%f4pjvyjChGnLnb$|otsEkV`>arxQ3{io`i`b~D&$*HL` z&A9CjAmy~t^uuxjE}hd?XLXI|ab*>iG9eNUXeY~T-DBn0^+cYU81+=lKU6}t(oW!K ztOc6SPoe)B&JWEG!NFp2I*Om>IiGC1pF(04x^7!E6f9rI3NkPaxmnb)(@met#rG)v^;OSn zycdARLTju6d&Z^)V=W`rWFmsRdjh{%o-4+++i$}-p&*DDs}Vgele$EWv795Oh^VVj zXIPe(zm|_@O)~M9sEmKDiwB}h{a#8QdN_37ajnKVHAO^fZaH3dd_+f^u8~pZYI+}} z3#()N29v$bj_g>IaZ)4i7Gmvt614j|BtPw<&{Q@(w)3H>_f(Zz@x+HYnUBpLx!TX3 z+p>dF|D#em=8fz|dnr?&JQp;NW4{=!l_J4+X&=&@Q>-%pqGnZ z@83|04tAbqJ|1UKelFQD+8tOjqZjr`p?wtn!Wb|UEYGOvtkEGisuO3umP(E-Tw`Gy zvgxzzK6OwJy?Nbv>ieM9Y5sNcjv3CvoL}Ox@ue>8|QYu1@hW*YP#N$fzi>?^)bEz zN0T6~t?XmV*J=EjkJqO{E;+qh%3<|ED1XV$(bWaNJU5E zHmXegK~>+}nh5+yi-~~Kv8j1&og_9<$S?YT;rG>Vp^$yEG z8q+0Upc{W1#WA@GtW)~x%kgd#P0%&rQBTP@dmN%OgwCT8dfP6t5J(^xLy$NM3x1AB zVw52r#CPYSAVPH3IZX#U{k!BvahIMv<2sQxS>&k#wg+E^*xhxnoHU_G>%2(k{rd#q zYTkkd+ZR|;7$a7Z&Q%^|b9Yi7b4RPp-dSLXvdhG`KZFwvZlHNYCNuhK@*dAgGPWw4 z$lXA#=K2iphgKD3?JY`H??VzeI$eGDJCyRQu!JIrISIF4p>>kVz9^|P>7|Ho8#cn? zZv$DrC-E2Wh~M2cHfo>c!Vz6Z+#c0KDe0Iq2ki%ikJ22bD$iR%tNodyudDx%gX zT{4T%?bgt7hBW%psYWLYBpmt536l}3-=bUIdlPDH2xZ^S&OEMkmX(_c1jWwT3;7Z3 zD%>4CQh)d7&2vB4MwlUqNE?_sRe$G!BYpS@_d|_L_WG-RGwpoed;^^CQ(e!h$%BMN@09b=!0?QOgn#8jVC%vPQW86z z9R#kAYwBba5fkuQw4^=W2y?pxK4sug;akV*`iMkQ9ZFFe6% za_E_9h@7f9Q|5Q(IA0dO7Q;Myi6kW#YB)f8XCn;ox6fG>){O4R<~H&N4czj5DAd5u zy&Bwt7vj6dyV2jHVD~%Xz@RY;CY(;R!cW_~8anH=Om+vv4mlvo+Y(}vctA9=$Zzdb%sHor z*01GRvRqNTCx1VYru!`wR>-lf+YA+Tp6hqcMW8l)wfvtBe0`5ArjOfse0y$kdeC&C z2G&)8{u8fy>RFZZYgtLI*A0!@%xi-1!*V}$Veiw>SzVC{KyO$?!X|TO%_7(LfoXhO zFx?Je(v^8M&$T9{4IHs}vqFZw?MRD5kiLEhYv@8BbI)s=!Zwx4Qs1Qa&;QAVNzwF_ z;r(O~i=*r@bcZpMERiaB-H}30H_bt5TljawM zEPC14jG;+d7jP|`8}C#U{W-VO7tp3+v3aIGgziH#@pOmF(69?J%uCHUutUh|Ey47M=x1vCSttogEVIxK|luZW9$_YHT(_IU)0w z+1j9Lw~k^n>p%#;-nzaF-sSj~n=to{jDWz2_3c>!ksA=zP*0vkh_v6(Zr1v4pbB&G zPo^$x$7Zoa6?MzMzu>T|{iv0WOHH)jLXN5m^kcGV*o_O`4BdB-c9esK0nf7_?QlkA zr8quf;11_nTH^Dj6ym31jar0F@Y}!t)ff@j(7_SG6=YL9cYBlc=N#3=(@Gp5x-aI- zeSR|<0Um`Pdk~|fqMXZU+M+Fql3p8zzchV3CjK}kAWyl9dN8L(SEvh<-m*j5X8qI` zzL?QjGdUptA?F*C8hT7LR0LbpE0$I}b`l+1+2vFpQD5$p90M~sRh_s}cmiBUx9h3U z5&&0-1W)XOf*=U2ePf@04#hpH@bs5=q>XxHNcogTKZZr zrqTB{_!aK1-qn^<>7&UV$+zA*#R8YGk9Oz%Jy#Wdo^Kh>T+*Vk&)*NEEp@WlX`08m zDseQ%)|`BB@rF?dy-oUAaAn_}0V+c>4y@2{aIy~%4Pj$p+1u4|adPGX!I;-BNR#*L zXeK?HkArkpjH~9ly6f=p@UgM6>ubkZbCMQxbo2w`gW{4oioYG0E3(c>!=UX4#&p7? z0>J^x@Z!!qpG!sE{|%zHRQhb#%}c+u|4W{xuK#DG(sEtrWja?0;NhQn29Ff{y7oXvOzB&thp35_9E$GpF^uz5gHmHUueR;wgj;`7-3b0#N?y$27Hqea9!i zGzhIJXp?W_FzyxF+IUwS_>wUs;@;+s~ zD35e{o#b0bzL8-dnMihSj{qIDIxkQON1LZll0w#~?nJ)hYp7eGKp2|StX0#teYxaQ ziaQ1?nzt3rF`-<^-ROgzWr^|Ly!0#86>rf9=hjbW@PHahu29%Hjde=6fw|c!hGiP3 z=+JhEtwkH9=1WRhvGdT`_u7^voV;%AaL>-JJFAS?ykvfUJ2+^3?slE^QLR46qg zO1yCzKR3o$=+C@rdz7PPoGC0}x7U0+UgF|vYGjXPw1-o=|GOkG#8KPMtoYU5`&ioA zE~7am+TZC2$|5?V2y5lwmrEtnh~%jT_CULPX-U3meHDXw^IVOfLySa(O>M8iK`Irb zHrKIx9KTJB%j;h*N}h=gsodVQ6@#1_5dN(A8y$+WZU8tu2v?(1Ni|N zEgRo5=B(w5kgxbrix9&3dD=R;eO#*DL!$&=&j($hEoCOHrCr`P1<;Db+Jxe4S44%W zlUv8q$zn}oAcB|0LuOj5M=>q!WlFl&@SS>&~=>QY3_ zwBqw3b+ykgQp2d^&`od}Go|?E7*ryPoGgKpH^>Z8D>^mA`u)!LBjcV2nREwe_ruBS zz&-ikikL0Z+Vb+sO3qF2fvw9M1622HH6(s( zNPPf&k3jJ1R9$yDoEKx5$?@0$3S8q?$m#0aWh+7o2O;a)k=?Y{qCaan_9zese&(7RS_h7-U_>cQ^_x?{4xI6A7*^lxMIsZG$J4N{3T^DG`@jc#EoS!3ltJ@eFOs_Tc!YqA&EeD4z)%-y)@f%;`8?jhcaj zY1Q$4?a@v1pFVxu{SXsYZ7NI^KvzygKRC!&Dpre)L5Z$A`_`H0)Spn8sNDIcCwE>Q ztU7}_P$d|k#N(GdP^yYsM?spxhp|at^YNUes&Cl%ja&@41Bjyy7?{_9H%v{ukxNcS`uIygT!Eog(;LK9-)J* z)v7ltE{hu8!Bv435C_}=%*ryh@LJmbo?qK&{q4uqi=+?ROG-1YZ_pC1uq9eRQj)2K zw}3a*OI8YWb0ZlU8ykkIij$LrOI*{#7fu?ahNzq@G5ZNB#$gn&iSxc2{kuJ#99?G8 z>L8}ftfUXm676N~@?T3LLL;nB+$rtp=63nz^iAPJ3w#OGwLX^8LzEae!=cvtko#}Di;{Ha$ z&%(30F>ss`;bc9L5*Kz|3@;FPFUW6}OhA~M@YSlseZ2Bp z`1R}u3K-uPL*@F5u2HY@(L+Cs&P=~QHw~tk?Ja*bsck}Uj);u~E%4hD>1(kIHmqiP z+V7he{}SCSYyHhL+iO0utpu8hs>;mWInRUAJZwZnmj9o2Y@cI1|H9FmnJd0f^_FV7 zhs^0kw(V(qEV;?%oJ8(WTbK zK3%;cT5>Ot4EE(Lkm6Hhi`ii)V_Ojj_iTc7nn35hq7uKS#e6#bwOf&N5Aub>KXobL zZ5krVx~dT^;loG0Nf|7Z)35YH&@iMf3M&mG+lmixaIqoazx5>z zaB;(b|As|CVq#!8J3l`M0xto8^NS07T%zopoX`0~hRiT9F!lBI0|R8>vmpvgR95;o zZ%UG{;Vg)f*_b0C5Ty5n{h&?y*&s4-+8umx6@3W{)i2T%@FIqv_0xEv6Wf*(^h zGuIG^61XjwSJhDaF7P*6ba9BGwazo~<>FjjFzf5^B6hN3Q7HZB{JeO9PXNnMo(zXB zxE~xN2cK6EyZDP5H z7pV==+lswDvp*DyQ;6nzyHZUo4#DwelVzWTIT(^=-60c-Mquk%Vn5M{>JX+g7MRnd zCKd&v&x&pYx0<-+Gs3RsMT*PUmyP^1p`=L!iLczWuQd z*KGOK!aa;E6vfhY9WIvV6h=xfI1>xz*5ulmh7ssqZK0$Kz6|>JJ%})DT4_Eu|Ht)X zI+n%{M;ffVbS&_Ysq%z}h(vK7pH_dh1Q)&Wzgzy@xr3CP@yj3Yj@tkaDS+q-LEhSB zgTo9EbSGS_jzkk`8f*>=4fW-*BJdGNDk8TXDn6`%ga(h6kEdFy^mWv+GXBYughr$) zQ1g%~ec1!>7a-3B#4~=39G55(elqsEmh~E0DhBhpLQX7E{@3q5 z?#L5X$fHam@q~%{sZ1jbKW7|vN7%&Dd#9DJ7>9yRl%h|Isu^VJf+-{%>M1=5r}#cl zAMsVg#ErxX)m-YH6!*98yIf$J0ZyW(qp*Czc7M$Ifh%YS?VeHNhRX?v-7J`~pl4oy z+Mp!r3jtSBBDl_4mNh3Tz^~0AMGZ`>hAuW+&bK&7u(DpCHzqzFNq&=zO%_K<2kr0g#pjqS0ydd~ZiFJ@04a@(0#@|}r*Hwvtdnv4!i4m;X!e=?BptT%HJ zMUfn5j8yo`9%R_N!AttFi4 zyp$S|lap11lrT_*6)$wdQgXN}uVUBIb8ed~yAN|dR=i-}t4(5S>ZfT8e?l#rv#nvM zVVoPW#8f52kH0~me#zL1yUsk`TP%^ZkeVr{W{c9WI0<%*!M+; z*NXV8zUJGLS?Bl!pqc;p4A!+b18eiVV;3rbT1~O``pjHCTFbL+j(G{LDPIS@()I6T ztS}lh<%;0k1H1O6TY*>iI4#7VyERSrtvT!GZNcyeifGm(qHXjPB4QLo z1N_FL^nD(BXebpX(s>NW9kCN;y|)uOgB;`2v3g@fl4SsbJS!B-tUgw}$JN7tQvhCq zGMNAj&9^QwMlfzwtVo(IfgTv6bms273_Q& ze5*&_2y*`Z_*{Cnr1}-u5)lBi^LG4m&yUAsyEwM*)gf=X*pyt;e%;pz6v#joRje(5 zqbxPs1dD}Bnp1MpZaSf+Y&IppW>WFC{O$@EM5tqrcppF9l?j`MX`xLcM3El1amL^K zBj26oajj3cp;I;~*w)HVr$CcH3oG9TsS#$U!bCpyg{DgwF`RoUmO#TE(L>WpBAVi#Bix%>7j=ug@A7x5}xHqE8(oUZq6If&@~HJH8mbtY_$9 zGlfQbdu0}9kJ-{Qgcym7GGDgaXk~E&GAnRNlAzU^&U5^dwb$2g0nhC{1Ss-0*7zIA zN4W3D)7UXzQt7^s)`E_M)YVDh2n$P?x%(@}lRP@~HX!hAUP`ee@}DkOL5@i9>05hz zskSV&u+vvc56bqN+I(+kiPc8e7lqEe_l9qRZXQ>GbYCh6~u)^D67#U4`hW2Tu!-K7;xkcClEa}c33VIB_m3MaiYq41dP(NZ?U zF+iXEW2j8aNL^jY)xu+A@p5oluzjRFU92GZdg44IP~r>}fVPLMadwoO5A&sHcJdP- zG{Qku4GIjj@s@9uEJ{TPK5ws#BSfg)1_?H-+}9tyQ8wZ5mK^Bn)zpq~1X&x|o8;Uk zWaDcv>b1M9?IAqx-79j5ti?GEP2I0*(K#QO(bZ74n1hxe*SV%Fo!}_ zE?iW={n)Bz=^{^9)6>H^X7|))NnFB46(gK>-_dku@_fqiSxLjaedhE?W|`i=X>fUZ zetJo6f}uJx4q0$QBQRaI6puK}GnSgsC`RLV=Ka?zHz1X%nWtrK$H69@nY0rpB|U5e zN}G8~FFpv8jhfLcU_x3HCHC;9t|zHQu=T**tXrPIInFO2xsjse{P>j2=uNJYC6QKa zNI)fwZe)x2&h7r$Zu=k(NA0(|`%;0R=Xu?cddn;8SPOKb(~wmFO;xL*hWfEDFw16F zAkLKeSgX5d>N^-9bN(%*^7P$xgU)>V$6JuKTG_|(0@2SpPrG}!Q-7aI1jX=Ug(=2 zQ=w}OUl(sI`m=MhYOgXHALS|Z5X?mqyXHHXhm|^IwsC90sBFisxr`sKzA2 zur+(8?LTNQ^v;p@b@{6V?|F7TQ=a@R=rBod$aXy1SP5D2?a zmAPCkR00wxVR)T@O*^w$v|HQj)(_oA@q)Yimc6%SIy{?K|8045=;{WmCl6nHB8ADI z`L)z}K1h2GY6!X`@O^a-``d(Oe}+_pU1nL7TP`bzjzWB>b|3zyniS?z3zI(bO=s$i z@O->t!_6xaB8V~QFFvPjXO=EL&=zl(*rO$&I=YyKg_~M)hAXv9@BrogbHv$XxPMt&g<6){W(E(# zsS2M=lxYDc?>e(|QT>>2P?1fXyR_2Q!LOstz=?I}qZY;xFZ~A}Rnp(9Tvz>FI^uw; zZNPYMPQqbuM@xTAI)Ol=Z)l1nTOa=TJzw|J-*y#stHY4Ua*@@o#=n2_e}8pBJ@avC z$yxR0Ww!fOL)321=GriI^pZYV9b-FF_;Hn7gLFlyehnufZk6^F*0Xhyy|G1F>H)BG zvh2%0!?MniB`ZgK;O=t0tSpQ}^M5SyoUBQ?j)=_mW0+hzSF~iRDzh#W;m<18pA-gv zifMRZWRod19TrE$&Z%Ue@}qM{t?(Wkpf^M)bw)jCYhK@Vx;F4Ktgn{Dn zH6zqh5GaN=Ovi{b4=XJB!zpbe#CZf{_uc6bKru5KwnU)FP0bt@b&8JKFigq*<~@sFBhzpd&u(zPub0R3yZ7s^xW;M;5?s2g{zE!FaZw)a&M3o1 z+ww`EL{ea_$ zjfW0{EXXQ6GxGDwPVf8G^BPiv(cj9t!VIEuH_>vE^sWL|?lImdVgOI_pReTSETz-W@PPE7sS+vDL8Aos~uN#=R5x777GyXlr1_l}!M z&g&wGPU7n-r;G5QSQjF=3O05>)^Do5Z9B{);ZFniXXes`X8!%@9chg&t1fUaX)|zZ zEqXUGpykW>a4=Yp_P5--3ye+5+~!ENtYhPXZoUkY)eZ;a1iB(yU0q})&whTn^-7bo zBk6bahANq1Mvq+NNz}$PfliM};kT7uKA!25EO$}!NKamTvz!~x){(CziYn}5i^aYW!1Gp6F0%8nfzor3MXv&OT;o9v> zrW%=-ijNy-yK#K6ZE$9#Bk%8pPgD3_9Aj5(9#6{#L40?unEH*T^48;g)yXnL>d4KD zIX^DsYESW(Bd)o;Nc9$}=1{tj3&?6}d0cnaB17yfCx6c^ho4$q>1n?7jrte7iW{OM z%*lUOP>iJeH-gh3qH*au^MUUwhpgvoq`|K4&~)%>{bkpi@@5;udz`~};Q_W_r>pYH z@MZlbFWQ`-ae+1#%Ffi`G~Zaa`&w(zxl39>CTJwrFj6rdy}k7hr{VbKgs029 zvw2cGe16C3==s4Ql^>@B#C7ZurGSjhd+Ce7O(8q;w6{oO#!)wEsRR~1hXDJqqxQln zsTLV`3k0;MN;G-Ky72s6rr>}^x=3nbgPR%v6$eLh%C>qN#V7+43|w*xpaRe^WAU1px2 zPq>4^KuP+F{k1lF7rDpXXEUa8*YA32LA zP9Ft!eqXR6tbK~zs;scueRwn_OmG9eyXU&udd9JmW-krB)sFuKjcU;Z5by8Kk`VM? zZGA0nBhWpbo101%L6Fnd5{jSQcAmralDJG02i%)$D}*>q<>BicD?x4wa|pQsZ4ui? zBRk0zw-)tIOFue7VjTvXWC?{}D4;wZ?{XX3(7kOUQdfnBXK+*NC+xO|!>W8_Xh*OZ zRc`3;u~t0Xw`~5k9JpJ3*$o~fFL4thFzZ&QxW)4QcyRQV(d`eyc1p@2%2Pn6)Aso2 zQYO(Tk1to<*VR*`t@xcjI$)x#!_2VfLfLF$W2Nwt_GcH}<6*ddEUpNX2u^0pWx;Rn z{U)t|ZwtRHll9l#sNzLw{TkDX*wv3>-=$m^Sy~&hp0T9-sq$nEs63uF*I9|IoOySP z&S0UI)6}M^>?dD=?L8%U00aE>dR9_RwRWrQ*#cJ~{Lq>g5}~%&`*#hU7-4md%$B1% zQ??eoyjhM$$DeKnPqB+^u?B+=`n~RhQ0>Jed~+gi6MDuF1ceYs&Q-eJx7MDXZLm}^ zAN7e9;(qd}Hdjz?Q=}y4FLh6{P=M>=n~@*F+qR|FK3y{$XQGO>o}qiIC>!4P7tdB zD!y){IqicDr-oe4lk=X zF^1fJzjkqTx5z;4v4}1(J^zSalAH$hG(M-y*MXpegv%+{e|ARs@Pj{HNtw%|due0f zT{wO0-F_F#f^D|_d~feBclsVZb%Jxj<+DaXUV}Rs2aG>u?XmUDUA{a_NIG$tvDWF= zz>GDG-UXK{#(H33>vEOXv;YD6mYIld1|!dwd%yMcoH_i-nrc(we$_HzW8>}dyL+T- zA^gEcPGF3gCf;wpJh;uWR&Rav!ghp!=rVnp!?ElpSqnfITd4nZj{Ek}q<_Kg|7dUH zWjB7xpq+-T964^>zvctqLcrc;@y()^ugqtXswSjxKenqPo)Hn&WS~sJm$i_)+gnoY zrD!+uOobM@{p|7>kC4ar{x8n4kh=PkQn67HN%2H#H1pm?!=c?WviHJY{I5pb<95l3 zIqN9Qd5t{QA22kvms2H>>Gn~$NU=|@wlcQUUS0GwRK52> zYMi;{9$&K%f0&bkU?br#ZZmIvbgG?aunlWkjvAXKL_I}7N#qi)MZG7+=F@mMxVR_B z**un(P94F+NlhtRk59}$n7RD=-WMV#hd26F@Nmf^9j2>a#SQ9zN}_aeP%J<4J~dtW z*r5~gWhn9v7_(&>EBNreZBAq5)GM4`ETd3B=}}GFadnygaQ@ARsscLJ&M9N z+%9z=Vf_sG(HsE_+k0$-$o_S98+GDRjOMGLe!b{pZSGg@Bdsw#ptt;~Rpe)eOmR1J z#p{g2oD@1*)cUKs*VfWnD``75wUdI@TQ~bDkow7kS?_dQ#{BE1dfC_9_1*p-HNCr> z&OLN`(X*WT<(b;kmcr8>a)gq+(*bX=Hpny z{|eqCE$u7h`Z{B^PhOMGhflGp`f{|ddBpeQw* zB}cp>Sg;WU<=Yn)h_G2wj)efH_Bjy&twDsf0rJS4yd!~RHi6~rw8fF#DY*P8$5S;s z3z)c*@#3(#wEKv4K)M3UpO{YBG^)4<#N-^=5uu*efHBNR=A;PFZ}z0C!5Eg8yYqUf z+rG=_{(6sv-l^OJ+`b78zJsGS@*%kiG?{RXF6S|=mtSD$L=pPSJShLC>o1Gt3mRGO z)o4wQBQvwFH+c?&p?8o&OR&D8WWxH>COs^vbGkOwT^D0uPcV<6A{L5Yk*XtDLLUsw z5Cc`c3(Khw*btokQk1Llg#o0b@%+L>D3Cb8M8v8_r?4UYWw3+((li=n2gjqqkwPP? z9L)JRxTG^5P|3jWQzE-%{?3lcWaK|Zac!bEVnbgJSYL9p1O9u264d*yNSz{`q8x#h zG}EQL5LK&+o07@OVM&HZ)?vIIT`XiL=@?LoyLluQMdnPFu3V@TF9lo%MsvKTGCO}| z!13KcMzxOU!Itx;2@+) z(f}P`E_~y&9oCYg!ppdE!3twP17FD&Yt`JP;mXxN^n;74nx-@BOOdg3TiGN-XySS> z^#7J=n>~3?V)l$O?-OpxKLF?+0PI6!w?=1Pi58Mh-I5e~q0e_kSn3VX3mDm=uZ6N33=qCrR5l7SF7tx)2>vc{N;b{+o}AuTbprK3B;HR-zWf&N4G#+L6|Ffvnuhd z5a=p-?=!XtZF!ISw%ed+WaaOf8TZVFJc#jQ*BE(MMgKv^-Y5ic!%=h?6)lglfT1jn zYtn6H1+jo(o1BRY!m2|Hh+8O00T=!{cpKOVbj|9|pmS^1=z7xhl@efv<-E_s;Av5WATH8BKAKv=FUwPkUnWnl0fl#9l=s>1~?}Kr_ zYsd&6%A&kflS53)o;L8^{{1n0gSBz}=|CChzEZ@EE=Z4{7%)D;Y_umrTASr>_EM&0 zn^T65N9eswfv#yf#-KFt_!g{<2?zc7N7CgL3GNSlbgQadQOo>n&aT?bnnc0$EtS~- z`VV+^XorDQ9^CQU*=R;e;D%Bj!jhIy?{ ztOu*@Sag?D;C^@&I*@F?#bo;5D*^soxWRmJ_C4mBVcONK_+CJFxr`f=wuM}h!9JYM ze-12#DV$UTJt{=@6~W1tW2EJNb!V=LVaXi>(8TDaNTR}NNs)ph%z#K`xrf!6mxa)# zP_I_0wPww=hcW`ss?*>x`<1zuh2S@A>tX3c()4kZ;GW?FR=e)O7?i8}FR1Vz5ft6Q z>W}_vH~vx>EPMvPYXr1MH#;G=febAi>^v1XG@&iDLe|SLM*`QXXUAY_$>rnwTcNKjrr#XTYhc z33hllf28Ck3BF3aL6B|y57jZ^uH8(SBW$Bfxn1AVA+o3yj50k`c}N!686~R1#j{IN zQ>b=EiLyr;WdbBog75XMn}wmY*>Lk!(ZqH);XGWp7iF_F^wH>y2cpVshN!Xf+>93k z7gkM+1cQ>_m}j^YQB|WA`-*ej7Yg`^%0mC<&kK*MT2_nV#{EH@Q&hulQZ%xkuy_!n z5z{D_wJXnm9o{`YJu^c!eJ>qAyd>SVN_zCXQgeMZZNX4vCY9ji?I3in68MK?Bmxr2V z&WUVjtBGC^I<+D z9Ft<+lhH0skuOBK^$#%muO!HrIHN>_420LJgDh?dlGGB32%d2J+J7mewH7icMDXlr z%k!`wDS<=YcL8SBFuG_qE56mu?3t|#vI8aP5~L^mti1-_v$f=QfXa(q7;Nrp+K5(V zQzR7v&7e>%80IfR)Gg70WVCg@aIW59V;)o`N{ATt@vL9_rMXf2SQ$u``5k}7)!T`0 zGCl{KkzY!F?V^%Qo+T`>NAM{}&@5xByo(V*M$|6R&Evt+DeB}(5>GzHPjoEtEK9J` z1*c<4dP6&W#G7gVlc9eiJM=(ht3hXjh{%{7m>@PLeV z>I+4Xr}JF|fUgX%Fk9j7%NqN**S7BtgdhG*t9H2s zD0OvqqNAw8*n(T-EIbj{5u|D1q4RUc)DYF0V7u@_w{s&(jv(1yS%*7A6fVwvq3RNV z{)3HU`Bv2!U_d39^m^us@RsJWOM0_liKDSj97?5$W zvSwKvOUqc6V8{aYVW&@=SV(60w=6j>dK4F2dmq)-WgyYOxf{>nJD!pbx+~2fQ~^sJ zECJ%?H&rv3Z);5Xx#3b|j$!OA4U4}VKHv~A0N%@nqgKmsq}@omdxC9WerL980dUsMls&r_qt?3ot15s01`sJY}wEF`#M>Z zj*W%y%~F3;*ID`Wvgv0a4V1e!!ClQSDb;sjGT(^vWR9Pd5$`F?7$_f#g<^J(p{}{$ zI$jpc3#-WR-7WVWSkobGPk?b}X5Y*7cJ+sY#3ZnO*5W@!<7Y4<8Vm@EIA-Wv z!Y*30b(!xRv&7cU0B(i}{X4GUZCk{NowB^HD>o~nOY}LK$#y3W;hXa;AQIh-G;>UPVW4A zxaA4fu5p}}Q$-tbe)C!QUJlM67FXtK z`B0y}z&!lam5{Eg_a&{Ahs9JdC{v+LVZI5uRG_IjrcXH$Y0^ba&g7Q zj8qR|QrGE00{z#u17V*d`K-f-+ad>rGC`NBRXatoCbZ-%QQ{nFKH53^s-`vH?Z@v~ zdmMCJpe|_zJ`I~hLc&=yB~+k^F)EZ=h?3@88aNM=+n=EzzQ4wERHX+faxkEhzrD z5|p}&frpOM6cXnSr~vjo)OKFjdpyZZD3XC2Tyox_t!4ItRs;Mst!U@*LGt^4l7XBw zspLgeW5B?YIoeLjK=tr_iu_&TY?I#;Ji9&=igka4M?e|2VpBrI`Rs78e)XYxq~n0; z25uS=?)y?aH)1nT9Ca~xv)aMh$hZ<2f;10c!&)0uGdSh#jg zKIYBXs3|Y>_CGBvLt{+9xm|Zyqq^CsBCLj7c^c7ag|Osmi$sog8JC0gvpI&JktTS; zg52M4&eVcU+eAg%aAg;o*VMR~zEIRmuV3xHr14cv1uBu9!^-JZR~+9JC}x zr{USqE&&*Hj5c2`;&Ky&e5xvu)|c!FYxPRg(x*w^q zAgvAsv5$Rxi*`xH0KvgZ&=|{UzQRv;lDkZ>o_v6EmTS| z;AmGwJ+scG$#0Z`+aW{KosDX@|GnuIynF`BMNrl!wqh`@JH(BUhp%T0Z2b#}3tHqM zOW_g`Rpoa$<^(47Go7b(K%rT8M!f8M;v)Dtja1F@>6RHNa?H(C>+e+rT~KjaU@A1} zhwmzvFKjC~fSi;d@J?HThxCu4p$WF-vG>$PDSH%+)V17YWzSAH48|QyP$e7$e_RLu z_$1pI#b8GPm0W#c+?0Xzr3yMaIQeHsRQFv9*Ub#D+}TgpK^aGkF_aV1?34IvQnl^* z00zKw;*THw>HoQ<&6^z}$B`Lk(-$qYJQs?)GB?Cyo{SF;B`25YNjZ@>T{+OKZMicW z>%^ohz=C=kC%EO>KEYo3;v56GRxgY=juDGC;MkXwBov03k2+?{5)ksUBFg{9WiI-b zXVyYQY;t9;cowu1ZSH=xsyn<+wdNg3fbcCYX4vf$Ol=|l1*!LCS?$T3qo)pTr(vY1 zm|LQ%4?suZZ+Y~Kk30j-Ho~-u>mW9Nq0mD)xWAAO$=?+WN*y%|CGmSVREa?LbwVJf zS!_BZFShD7B?JSSncGaP;)fSSq%N?~?L_fW7Xz?hXG?$MFB4o+i4;;84=MvPZ31@# zYv0ab`Z}>Tt2K0Mag}tcdF2pA5N&B%RFdLrOO}*+yQLf!BW4-2Rqwo1t4c1Df|KI_ z=;hV86#&J}Q=>$y$=@3u2?JpDS^4r3L)9mW+an7z0wKX@Z>&Qvftl^Oz%4Y6%qvhk zlIv1_QS=d|UP$g<1QS#%_&zlAN5Y(nPPYX_Xd0H1@+0eR$bSd}lcWY*P+fb`0U5oN z)Qo#NyLwco`cmGe!f+0xikt$`>9~TOdt%-nvMcN4Ib-Ed*wb`hV# zbr2IC{b!)nprz^k)3K_!G!>E&Q6A)iE?Zy}?JDad6k|J6s>{t##bkGTjhi(gSpU^o3Ww&J{CsytWHohW zAYBU;HS?@AcSo4K#eJRAW?>U#V~9>i6`Z&g{$VtR(n_;uW9N_IIaJ>`2*PD-&tNE+L9Q8`+Tr1L|)l zJdzbCGoy!mhkYGL5Rq+o4sLT+uVSSjg34Zhk%*DzyC0C za8Az70QmThbf-&QUQfGwdn6$sl)1mZAQ91aYwPpcnie${0pkCt*MnX-*&%_XF!z;w zHZj=eL6$IxD}UC@-c(|c?%Anp?dz!u<61>Vsqyg4$gvO8Cdjq-b{*T|Gg?}nF4kKr zD=LUnWw~dj(TdVs$oE^8*q?;Ce&Wkp%bXQTl!F3{c6LznJD|URKY9LN!TiK8j9{(u zWNIkKV&QV)MTF5`0UW*1?2!6WBeQqlf?$@Ch(&~|bf&@5vKG*=AzCD4$s_28E5eih zst`#^A#hM7I8u>`3dym7n^c0uib>+3IHj-gKOVl{jhnI3FiJA=^Aql4g;S3pID$*$ z{w6*Znt#J9_~Kob82)6DWGzz$;R&_1wM|V;jf@h5f{cBAy9J5;|4IuNBouQoHY0Vb zEL40pQ&yae(cSRAkB!%MH%=@a8Nz=ZSxn)o>jg%w2ACd!ufYanyAHg2TC{r2i+@F# zY7o+@q1|FsozPjs@P3|F)^^{|$v7eDx8?R0gDd;n`VU&~-UpZ%x8ovd zwZ%@y%!9dy-&6hfyz-{B{0hr!^6XrtVI`8xx*d8w$hLgDEa#g$Ygygu0Jq(lEb}w|b-GQeadec1hp^v1}o%F~I5E7Cen-4>4 z-C%1z*pgh2yPT{$X{qTT*A<3LW<$fddiTu`UNYJ4VvD}VOSHKwRZ#nyFoz@x4xx4$ zqxXT>{>zv(Q&-~}Z$*tbjJW_|Dc9P2mm5FN?@6kzFa*BHMv9}l{!qWJwpcjX4kJpY z^Vd&pbNcM*T0|F*Hu

      qwc>g-=;K~ z1XuMuKJ=NY+tD)SUsPiGXXuKvA+vBgYC}xYZih^&Y$UsUt==XM^7Py{hO<_PR%v1Z zkJWh{tGi~UX5UIGuqPA(^SQZZ@ezNKb>7|%*LGQA=nWgFZX>emd}plfeqEc3!pVps zJ+8=pg}i#0_IpRdb-=o0b73l&2lK2Ksl9riU$5=FJKe_0d5EAnpbjSyE=izc&+nHE zU_-D8Py&y5$0psE^BL@>()arMFmCB{3Y`YW6=qk&a$6etIIp%KgiI_*LZGJPrp-W@ zlf#X{{j^lYjY$+N!Og;f3KlZ|uH}%BP_C>f4h{S?@LiRq985{g#KOjYK2|!NnL$a$ zRxDRVt81(Wj(^E#tWOrS4ljaov_L?%rY09m%oN4CiHV7k5o#j)yrCg+NwCnQ-rjw9 zm6%R@vlw~&JVhVQ1WcV(47u~DSlgamQwEgGevE*bKb5gIi}#&PAZ~XKtO(Fm$4px?PQf&} zwO+Yis_6cB3VV!?h`$fuIGIiY^U-b#`nfK zPMg=M)O8&nJLkE%8UG5!!~E1$L^w7?d5(^m^}Wg_A)MWJIFCPj2uGt1&F2wtJYyy6 z8OC8SPA%uTlR(otG+xRVcx{F}?H4a!x1p zyn#I?IHOK$2pvP0yIX$zR?D%eHEa>P_-^@N9cyaco`{!`MqSS;eyfqG#P6lYX`)Yh ze8^IKg1m^0ZFK#%fh)FL7U$F%4Z5eNtH4~c_!V~gPN4u7gM;7K*>Zlz*i3I!jzLEi z8+#K*NKEEOi^g@=xOnXG$z@iYR`#9bX$e6OycLJSK&ScpQm70+&P#t!KQa5k)5YXd z54Zh#jmt0@9^G50ONz35BNVpvMf%538Xh3~$)3za#Qiet1;@Wc8=dITW#ZU~KTQ{4 zWb8iJ$5lu~KCh_qo}r6nhuU)5{vG<&FkF>3e-A+3s>9DeO(G{Esn#WRnWn>}i)fc3 z$m)m+4EzQOf|&=#15=pDUGw4db;^3kLir88p>w+IyA!>BXlS*csh@axN<5Jfq24Dn zW@)uku6qZ1lBDdsRf+p1&WylFF#++vA+ypbng&ZUC|cxWJ1VLlQ^__ZVxts#H4f!M z%*gN&5)*e5X$^pg6>&(Htx z@DLxST#k>AAFRXEo?+-FQ)(0OF+4Yt1W>WIvKkv72TCiJ495|P48?~}ie)7xqDdN7 z?OLh2H61?Z1V#2hyWmHc zn8&p5xtSXG)Au-Rk5Ui~?w$Lw<-WHF__`To^co(pOBd<4(AsY{x(f8``g}dJm(BQi z5735U$Uuc&SO2>EBHjk*dEB{F#~&9+5dU@Vo&g7=Oh$^x+U=uvoA$&}_S}on(EC-r zN2p4iNKFyUdeRsD0L}AsvDR|Zw5;cK5YnT-=fzVK{c+y2X5@>j8WY#w33{2~`Or$Q zTm{bPdERQ^Veam*KN!U-mj`~XKKx}^Tes}1$D}4|Bkr?mOGzWr@(dI&Mri;-JRJtV zclJ-ciFpq^w*E4;DX- zEi5LkF7`l56c%Rk4)d<}{DZ*}c6EW`R>rVb%{dFFOOOq6M1IegS+%|2*qvryo!nNsgqwtQG40JgFAFh40n@(svl6vk z_tP}iQ`sGw1ICnk@2~ySpZ7;S9}i!88Qrc!gA;m&70V?M5{L9#jkZsvY*m+!%pF$t z9%r`xU{FK(%lf{))efT08P0;eUs!`KzB`6#yCxq`@?M(^RYBdw$;f}kcw6i`9NvbY z`r(fNbCH#d&yAm%Zp4c%+rCFk+CGJMUi)LQujFw_ei_DgzMh}&FU-C^%sxA}<7&FR z_ZIDDHjl1GV{T zKzvDb^rV0P{*{zaq8Oy6rh<~v8n>ARns(d0o@(-H^_7%REf_|ErjJB?IUcGBcV6wq;}!ohh$eroj50SA z3c1|Wqkoh+yUMQkFw!sX_6i%%eeB3D4;F3p-TWl90fyvtM??{G@3^RIj$CGuY8;Wb zS;0IjMT6qyl1a^Q=H`QH`BZmG@Xm}vV9R!T>SI03XH|;PYbyJvD_=s0Jc_7XQC8by zyV^LG58u(|SB|+$PkFAsfL%|~^(oCR!>#&MNr0_8ZU zkC_yhS50gVut8B;Q>o+srSA997~~))^Gw{Vb=P@`+iC6k;V zzNx8$)fE`S*&no31Bs%S(>DE2>(h-vYxQcarps|RfepWY3Yx;(Ew$>j!>p|f+ru&# zB{iX{<*8Nq3|UnD`A_DtqxO>+{2Cj@6c3PhT~X&r`wj9SK%&&932Bs(WVxJrVPk>0 ze^bBb`SKphTBBC4;r6VY?Z?^qLwRYJlK)&)mb`VzFY+gtJV!*}A69|)xgiZ#4~=@S z?~A_^uSQ}!+s{C%?oTUMm+byFGN;(|;@fy643pq2JbXnC;wp8~%9fAp%bEX#&X9b~rmmp_2Ji{4tUnW5pqj&EsqVKMRa zO{Fm*6c+=R8&eD|V*$lWbLEzm!Oh0g7yDb4gc(Z*6vpz7-vk$?PT11$zyn1Kll|M9 z>$JC7oKEoxU1fB=R?xH6X{A$h?xU>53Fh((zMki)r;SvUYBlz;SxWnbpLJWrQ(-~# zY5ni0l&`BnOQ%$N%{te`0vRG6_txv*qcYB#tKDov5}XtZv4Un)gcie?*g*RI?t=@@D2@XTAvjg1(Hl7|8yL>|98+qVA7(2>6^B>j@TtSTP&x4+KXRfTh_zFw03>x zv7DscBj!-&xhLq5!*!TBK$(=tOxS9*s^5w73)H*@MWx(i$g-mnbws_0vFSOW#ypX3 zFirAd&i^P1xbu~3oLq!g7k}!&C?NgegI+t5e3}5i-x`v@_{f>|?wEd>&@0GCodnma z(?|$SW#TbTrXLripT(=%#AhzF`%8iU!l`pt`MQHEAgftF9B#x&(Dlza;#%hz>jab2y*QR(;4IWz zWoSZ7kV(1NQ_RD8ZT160ytBseQPch1frxU#FY*$0a_0$BKV86{F{37eY3iu>#aWuM zH4u9)H*=vOYTB!WpW5cs#!{BfHtZ$4VD7C?EUaq^hm-?GQV&?UL}9K_i;ucG2wnN1 z@ccbYVlgoUd;FQB#-S{oEV5FE_?$)>22_~N-S5v8=JH1@_8IC|wfaJp74x#hZ8C*= zq=zaZyA-#!VV}R<_Zi!Xq`%x2mOenBy@|I&PMEA!>~6?+)}Lq*mZ}8nKzq?z^~Y8< zwVs)k_&kKRc#-6xv5`f}{6d9{9H;$RiH)(wjH{s+y8q>$m6MIU!=6R99mx+$GFBlVaClGnw*-T~P;dG}rvozWQ$O z6N#i~iNAhb%V~K2zVFd?YfySIzlijHLMkijhoFPhsSh#(mj^>htFEB`u2HJa=F=go zv_r~vd*jYa4C4vG1R3i%}WVxNB*Mwx|K83N)J>HZ%~P_5kswW;w2!byT?yt}BL~zDuYXcM#g@6()841o=s`{h-9LIM`j0(FT4t)9*q2JSXXQa1p&24NJzjw1B#1HU0hri7Z+DOC}KY~$EUESmKdAwYQyM(DEY(O+}x~eY#$%s zf&~t3I`v7wh)s}7IGksMn)+Vg#}!d+*W)Ru1NJ(YNyZ3VRBprq(z{~~E|RFo$b390 zXkX95*ZQ(v%^!S6n$rJG(Nrz;bK!HQ-({2N>t@%Q2_KQbOARPl65mWNs=LCnH@K|l zaj=-C|9Kj}c~SHzl%8ok$f1c-+v?w&I-#@7S1XL?byAF3S_1_L51E)EoK{{&ExAlFBJH=c+m*WaC(l^)=^)EsBF6Ge0{WLf^b?Qs*^>N{=VqrcK^|L37HnF zr$6jWDNVnmP(jz_d868{O^4BQ|F_+6V49xiOHw&oT=2s(8}#e|26k<0 zK1)CGGK%NpbA}fIL+Kq9J8XF22d_HWwsR!o5^= zvOmq=>G{NXIu1!+jCXq|H|CcnN2w4Xx=jWd$-daU0^_$Te2Xg%A4k+eL`2{mPO6Ff zA5gxL+BM0@SKx`}pz`67ZCVzeJe)nz<-KRTb60%Hz5nTps{mMP7qvJR3SheCheE`3_^APWCpQ zUa#^pZyhlfeQe?mN=9bkURPs}gHHOwC!GQZcMUBWG4z853TCH^WDTD$yp68E{cJO) z40{}U-~_qhSU_8=tAX3^-(`PY-V)lro^}`1=BwtsAmczo=6n4S`L*Bc+V=hTfc)>>NDz^a zi(#4<(kYQ|7m-nVgSh7tw@(gpE|F=KGYYh1bOsDoz($raoBsCcua~j6`EBi*uDi;R zM?;I4vn&h^o*puRnd|3hzwZ0Bb$bTxde2!aC$Fbg{$ewKrikUuCg)Rlrq1Wt>^5us z3)k*Hw*|w6q|M5cwigOQ5_{De`oiDuq7L$YnYrF5{{gwsMDtTi*5ugyr3j+s*eirI z1A5lWF`30XAJ?oqbe-6=pfNiuLe~MQou6=vPd!_%k8>hGorq99&9jdzz~hAP+2jv> z-@O!{OT7#RW%6PJ=0w!fS>T?mx!N^aq5a*FIf(Uk?@l4Rj2Lv#%i85 zk2?zt7ch1C702$=@ip)348@B&>E^GU@|Tz4?zn z8;ncWcWm9rWg6CN@QLu1S)OGfB}91bxY!70Xu@uL`h@k}^{iJe4W+nx3KbuzNB%R5 ze+`(^^YCBU@2mf_+=}+c_ONNuK~pm`PS+UtM)WjD)l@;^{J9X_=V06TU-5j9oS-!_ zGtVq8h8(9c>PCi#k4#V7+t`>itj5!e249mVgijx-lpA)#|K6Y^aGs@NaOR){eL#i> z^5Dy%9+=mR%{U*|PJy==fuzo_xw9jmiuFv3?NSj92+$bG*YS9Mre$tnA^DyN1rzgO zB67Tc+`eG9zOfPX#EUR9GZW56H2}EFCW3Y-H}~^+mh8C*zZa?x6d>8>YG=oY`Ax?F z03HuJL*tE3y=m`{#KQHWForz*drrv5Gzrj-`=1T_pZ$=6*F^-G8D2(#3L*mhppLgd z`tEZ9=MJd%YR_)cGn^YM6NKY6NAK_YDFn@j$+<#x_|JT|v z@sW-M)O0`;AW$-iudnap<0B_0fPjFYR?nr&@gTCWFbD$M$T?~tmor>Y=n~oM@8zG_ ze1fq!q#vOyy^4ZsDWOwTO9@SmW};j!N*kn52bnEuRHsNDxRTr_D#K3A5Dx9jZt`tR zQeaH-$gq&O3rZM_NI9s-5R6_}0^Si&Fabqe zmL$1g1keD)k7vbXg?v`20~v7so6t4E6!`i1Np#51=;U;VI=HyB1fsL~1CAkzFya%4 zd%=k>1V_IsyUkbysd9h21rt!FCMg%e6>LN1LExFMaaK0Lji-SjpNnFBWjcr^O~jR@ zr$Dqt4kKbe|Lc|8JKN&hUe14t8jD{wepZhFeR1|Hj_Glx*iey z-#tbE1%%^Z0KT#ApFBAzMOL7ghU8{<&w+Na(St{kqFuZ+ zaeUP1V@0eHst9o4?}7p|R)I^}`4;5=-~*u}3Q+e{@KnKm3L}Xu45K!LpaCUW$Vp*x zWrvJdJ-{O*#q%q12I)in7sm`AZZg18lbCjI6|wTWetPpGk3r%z1(>12!{F?XTpc?6 z>LekF`v(J!Ba9TcOk%ct`$Av?8%2R*A_Y_P3(PT$$-uE~lNSu0lytHmD||H(EEWHr z)!v_BpQX49flDR--$=2}j1WTXuO+51_F`c(rl{%D)Z10kX3-g@9eDD0AsPklzoQT)g};edgB`_)GbUfAQiUX?G;UF_jaN z>Gq$(iFyAQBNy~ydTkR4pI+7qGJuMM+GS2>{s_Tgza{_?9{Fvp_^?ijbLm;f?(c1Y zBYSRF^{;}Ex|C0fr}f1NMiv%o9MCfcoKb%SAWRQb1nucPng%gy_>8HG1%cFG0Q?IY zsy?YWC0d}o@KZ!UoMInfYz16>whNEM?G9ec69gn|2TGI2!+6w#k+d{X{#ZYMDej29 z5-_wdGCJB%oEu1K!W{6>=`t~K-x}GN8<`NbehO(Ab!60^z`9$>_am3BNgo8%K|w%) zbs*D!3@3YpAsTDL5NgvOJ|e>5Ik8nEzfY$DM9$`az1*ZtU-?=dR-kjXi;Ex0P1L+W z7a!fT52UZG;b!Emws@`9GwFXhF9PA$N``7kkkPH{&l+kjJnSlT6)lC*;_1{PaAZlc zX#TN;VK;FB0Sflpo$gl&Dp+Q(sjprNIsDeYd+C}gE8`HiWBq4ma{*^1PKs~IHB%nX z!ZFilrxz>Um-42%-!0Z^+J{V-_BQdF3AihZjcqI}%KR?xd&#J>?GI9Zu!(k-R1Dj_ z`Q5Ei-7V!kb>(df`|JpV3H*P2y>oaaU)L?#aniAqj%{~rc5G+I?AW$#+vwP~opfy5 zc5?Rnd%ySl&OP_u^VhED*}H02)vB6n&auWEqyMZW`O`TfmKx^bo*WqVxSP4joVKTsdz*@BGL>-R(2g5&dfibK57zw3ottp8ARn7jUg$t(}BwBwJ_ zkdNDGIBJfdo8zi$cb)je5aJYvhI+Piw$T06EYKs5#7nHhU7pr^jQJSGD*T!avfeV41di~mS`q~7<(k=_P2NqmfZU@KY-UNXO=dZ;hdsu6& z3_Ops7Q?89^y#>=!~jc#f=W^HZE*;mFye!zlFJ=LgjUtjHje>Xlax?hmFE$qBOlY2 zz?6L_JGbve$`kQ-%EG&^W+hpsa#l^_``2WOL^(7DPmG%OQU#WnUv@Ea?oO!Xob1c% zmUEf)E~4S||QdOWvsVrJ1_ z@>>+y;OH#I_a5$MUY*G*ubu|SH{zF^C3xo+0 zg6zbz5U3u=A!Mfu;yC8`fR&qdf+L?+^Mm}X3^fY^b{H?hQ>vJGKC=UBulkVT^JM!( zQMHt;?qhE%qP#MmS*sh9H5z2L*}NTkwGTYHCs9=wCsS}M-Ol|zCn=c?Fp|FA$){>v zFN2IS4{t3&mB71VwGzuU=XKIYJE2-EQlw*5Y+dplCXvkIzwIs``PQ4AE-R`>`whfHGMDLhk%>PEjYxg_2@ML~np;pl1^lm?NGP1S-7)5qjnZ(e zIWP8e6z7!{?v7XezO>CT7c<8_GmkyZmd+SDyFJg^oVZnOc#M5`d1ENzLNyeV0Yh{V z?I!LfV|*!^5?0-Ty=Q8YKVbj*BYa(XzFpt0(?e>}V_v_uGB;I>&E1zq9RwBHhXoGr z_yYBMsUg8TWrCW|yFW|1e01DZ6`#@D@iI2Pw-95sRD#TDc|}$ySkeW-S6?JZ zwH0_hW^#Iru;$A$ji7}Z!*p>s#1PcElv7=pzNvTC&;F&Rt3!#u0NNk8DQ2sa?@5u; z#)*IRop|u>mrm)p%XNI&}HKT5V1fXy~K+dJxsl;3iV+97$c3?;MuP*-iTQaIZ2M z`2-o^t#-HXA7NNvSF^cH3DE@U2nI{iQ)&p6ie!we0VaRaF)#!0;8EI*bv93dWAl(>+d=uRxXr ze>-o7-~Obtu1}yiH(*SW>dn0METpV@g=88^SUs~B{=(xY-j_i6I_NK}AZIgvVRonF zp@v^WjpB3qeaWR^LI${oN1d;=({D&+oL5X-rFCmFaAKaqtc9iD!CS$?jr_}plmcF&HS*^~m zufx^r*`A!9+S}R+NNMwrdI7vXB7K^N$dUwm1+4R6F9e20)C2xLPNjp}pze{p9v(eB z(4Xeacb}Vnr7o@T^c*#)p{;ki%&oqdXvnZmRBzym&C4Vyl}8jk+g}>?tU-ixz`ir%kiYn7gA2a zOv1uc*(AoW74a{V3aOv;L(BGH!0;TDz+eL$ zKCM#>@76f-iK=4z_nK3TjMkmuCo0fgV4kJ*s|DsKD$6^q4&7It`=~zZkKml(BOiG1 zl^ySl>?gme&8R2+$o0`&S{9$~8|oS4r!I4UE~Z7HuUAt?aa-9OiX9kRoaHU*tWSAR z*2Q_Fi6hI`A%E!+zAhhyVd_d&oL}!H6i#qF*u1stcBUgGvf006_^(P5r~v&lTgJ}G z<;go^*W6O%Y7dldghDV~o)kGe2oy$+5;=?%OsEz}sqqbv9!bh&H|+fa0g)p@3l$}1 z)9pFDUKaNdZ}Gfe7IMr<6!6Wik?qWr^2H}a{0(}X)J@6LE!A_8V%rj1rOZQ!F339| z&TmIpp-hdvF9nqfhSH@@x&uoH>Kc}Zgn}gQ&xao|eI!4fPLX56up2P|iu^2mdmPj^ z5B%o`t`TWcFvC)#_1kCpC5N+fL-#;0PY9gO!-(D^2O_w6AvpA%2!SC%Arwkv_k}t* zJaGFBxgJb$h+U#tUup1Y#rtr^Qc8koNLS%JHzS#yp5DA5@L8$0KtLBX0t`Vk`k#6c z+W0UL`#h{sNym0vG<Xiix)d8D#R4izgNR)NsiNi<9@?DLY{_}_`MA- zI^?!cQHU89963}FiHZ0gMW0@-XV>4Jcmb2ly#;`<|4kFxUmR+Hne3Q7T4cmTN+T=4 zlZ}!+TX`h@_LUTrK2ePrxK?2xNVNi>gv3(Dhz|-NO7j2X-$sH5fh_>if=mAgiIOT$ zoE#FJTBKSkxFZ%E?Rtg@O@dVM-qlmt7KBTA-(s8)0$)VTI6#=H@UP%%gtyEsDcI_0 z;s34jXQ8Z$oXE`bh?Z3b80M%f15L|e{J0zWz`g`Ydk{M1Btd5&uO+nIpu@q+D2iy1X0C@8MM+^QCQ9J-w=ni(6Keo@4WJV>3{HZ-v2%xK7vvLpf0u$ipGi0ude<; zM|V1!%4&DH8uACJaeBJ!Y=1(!27aj5sIOis27B)CGouAYVg(Q<^lXMIAQ-L2PKdiE z(n@|G?7#uT0AtI9N~5u&gajoMBNt9GwL~)7M#XV>lAYLCtF3j(rLBRIP*51Two|69 zlkO)AK$!~?qgUoSMpR)n4?%eSSt|as|5q?Q(QCwaCR|7|3Dv08c3zk~3tr$UGyVIt z$%!1iC;VxWVv zf`Xlb{w(AEW%CL+;h{?{@=%c~k9m!p7vFD^48xb=d*q-Xy&wp^Z>zbW=!k1(KcQcQ zg^JktWNxA7_T_|*^Z$iaO8MEwh`1x`JO6d`=@9~=$M%}Sauu8@NZD+{Pz z6qj2ScJT1>~ z+4snSDkX~Yccx&WmvqaVq*p9bnqUR|sg?}|a*Pn@WLS56a#lkG0>+T0E}4`ZP7?<| z5`rcfraT1p8}jX#6Ic{!F6Woaj54Bd;P>Z-U=s^N87+(9#?6ZFe1Q|xk&Xmw%lnPS zDw^j=M!jp2V;hmA{okNjH^@PVnw3l&C4h{KjIvO_6i+TMDX3rQI67n6`t|j3Pj1F0 zpJ2h^+vFkY^M{r6*xsbYvKeL~Usha<4WaQSA4sBGlx8kwOTY_6?@(xORke?;fUTLS ziw%E5Q1%ysqBMDec-ipET!aT&Zd+;h*6fV^Dwgn>iCn69;HEX3Wxrog!ly*_G zb+D-tpr=~_5KDZ(jSyGU9CLDp1I&Y}fOK{9sC2^lbbX~5mTQ%=1?s5ahFQHIjI4FD zJ&D{*LnC@5Aj%{}!(zA@+gLbuzu4G1BnyH;1=Cmq6-D8wh-hawhC9x8F-|Hfm|D$>};xSY%Fh%nLInX#scs~jQ^@8Awm2l> zLm=ZOh&qR0@?kvs<->$s|C*^h&gT|#SN00zQNb95PGo^QCQB9)q6HKZ#A}(0herxZ z(vwH*Id2qnwW<&%GjjsSQ^rB}eC^b8%VvBKQedegM)e+<(kwAx6H#K&By;1p`EwNI zYe3$RP`v(D3l;0UO5~HO>YFbXqXhi0n=6%$pEJO#l+Sz~Xj< zYBQ1**jU_MnkpyaCH{4VVt#T5w#gkZn&$TpaE`)3?{~=G9~1LRyd@ zrXON29uh`SWQ@}5fmGd2|34)LKhtz^3$U%K8|Yr}?OlJ6EO{opJX00WA88#9EtCEDa6w-Ar6;WC2`6DW4Q7 z1Uf8KK95oyFV5F20TqR{mq2^iKbG1*mU3T`OFzn9APS=`^lyV+`CU%V?G*=!ns{3sfaADDv z=D#VJo!cEUY?PZsg(PtQ5JcM)IH*v&OibUN!*G)F2TOR@o2b4zXHc&uO&TF%^q|Jo z3r_Htu8T%RNYy13(8Ks$HmG#OVbIQ@B$XSFE_WFVDZXEffoxCV_LK@Ja{1q)Vgo$D zJl)*0@s|Yb{;`u& zRa9PWveCGor(r}5cfj3Pr5Xy*f!A9Nj!yc) z1#gqZp=+h{`(|uK&CKBLyt36aJ-kv`a=-wvO}C#I0WGC`yfL_qJWhV#pw3mAzFTet zyY0;FxF@Y~F&kbQBY_4@`Oq~zOS9ExWivw*V2lG?Z-8-wqc4x?)vtZ#VJqp5SlLvM zbGdkS(A5Y@A!ow2_w$F{4eQ@wO7ldJ8ZmX?kcL#$JNKqfnLInV(|q2gjEGS?&JZDE zkKpiR)0Eq@9eEp?8B*%~-$2VSH?~1CjEJwOU4JyHRtPv6`Yv^1qgbF<15FiEzJ<8x z$Ub3vXqVa2#bHTk3#YTu!ewj_&j<@(S6^@`LcOERANKS?wSfh$NbMi(H-g?aGl7Lg1QP8lRi=fkhqj! z+sf13lkwmL?Snw}=wzfIB7ItJF>-3{8D=0P` z-O+P=V=>_k+A1qEW9enIQChwnd>k8VPy*!j*;>r{l!*R@z)=7t@EdYaMobL-2R}ZwBqH zvhsivuqWQ`EDNXl($ciZzY7DB4%`lwTg6W0UFnYt=hH5nXmuIw_&WTK>ZTbg0vb>e z=*B;tI>SWGJU0tGx9YFD+22y7?8QVW(st(lA5ZU#F;$fU7W%?0W(s`0($a}LWLp&M z%=K8Ee`QRCrnFn-{KLZp<#D-;qsDL7_S|M&IN~UF=M*Go=OVWpjatWx@FFDd7v%Cg zWHL!nyU=8(<%@N55clC^_fm#~v0fJLS^WHolH1QRkY_fsEiFXL#rC6*S}W7@CMk*b*Mf6yrJIm;6Pb0s7F|R zp)#O&oetYdntaxk38>MxMnSGmoPW>@m#>jJ^t2v1e@=U9Klq*N}Xxme$DeTY&o+pSvsmukA?}HgznBBIS~| z(+RgvprHT5W#)q}gGRH>S(go9PtqsRV-GrM9><1uz0~VN_NX)&2lgNQ`%ajddEKD@ z5$^vuNh8l*tOC3*JmAdM*49?DE5uXQ;ywEBaL!L^RxucSp>cuP7pMqS$?3GLW69&1 zw){fq7EdKyQ^W@cKo3-i-`k!3kup1-H@f%K)DO(%% z$GS8nI-BLz__4{)-@uy%L+%wmI*5`c4@6r;c%B)O5k^9czyciYx8PI(U&ufyy=wPB z(e#-b=cbKOC4=DCo>9+U zBU?JMytbyvQ(G=~rOZy6{bdHk*#K65>=FMW50KkuX5=W8FH1BRsw8rMTT!d__{vAe zG=f=~^Zq9-m&OP8#Q*;|h`%|Jz+>WCLu_0Z7A^|Aa+)bMc(tzI6D3lxbEf z2gJ`Jef(Fha%afIgAd%D_J13cyshE~crhtj_kd_2uF(UqAC96#AdunX59xA-O0XAS zKY@CZ|H97?SFrfmfct)&|7Xz8mk=sjj(PLs!PmB#85wgIOXq*Um(u@F`Ul*JDzpom z3tV8F&K5)s`Ivz(2XR$GVsj88yu6y=zpv?7|HVTXVHMSCV)2?{GIUrSCwSd6eOL(# z$3%Jr`KV+yW`uqJr}q_1aKF-Ajvd?Si{n?VSP9$M^K!$7S+3B#P_9&9FApkkV4PS? z{9v&PS`z|)3fgZGOpU@(L@5+R!uS!OuS*auXya*Qa48CE}G|B^owzX65V z_U_ozR8xOzv2K&nwS^fj%+_0Ytv$4qQ?=rj zZ7Hk%e?|gRc=##zqim6HR_sFz`;2Qy9^Bpm0BRU@oA3WuKh6nZ4XfF-&eYUXhy+56 zZ8o9lrq=hSR?G@+B+qJj2s{stOwuMs=Cw==@{L?9hN8|Uka|x2*yP?pI0Z4ljr?C* z{U-H;227RM-g-djWcd)*Rot%3Cn_9vN~X8B_wexW^`EEt9dsrG+TQ=`_4Nq;e!9N| ze|3o)k*%Ys8g|MEiSZs}>S&r|4yc;Qhz1%|?2j#vWAvKHePHZsaC&lbn#DfDLK>jp z=SYOboJf8FE}vl-wfpXdmLB*A<#%bOvWEQ1!^5#qfixVPm{i~`0X>SgusM_^7W2~5>1#oyn5yGF>*jN;#KCErL0q!JwBh>)K+DN@8U z3X>e|A?zTipLh=@%**kODlw59?XIMVC)0Og5tmnJQ6v!1YgZv4Jp>)vjWRZtL2L>M z3MHY3JSjtdK==eU2uX%EFb{R3XA)Jw9*j6I&=UhJF(70;&@+*CEQ=Z)8&R=<0&YJM z1i~Mn0M2(3bIA*;I|3Cx9w7JUyk<~T)*w%w7(+_pnxWadWT@;>h9 z!(L}NsP`ReX7boH2!%!6F6zJH-aA)p=s;qexOhR6UU-zryV;l={Hz)5;kqJ|^ragw zk7}du7FGQ9018MvK8j?W?~Gt@BD6aiM$Yh_1BYj}GO7INfPJfSh2G7}#kqA=Ec;JJ z4i3T;L^wiiq7&2aEf=_U47xqYc1EBGy?Z0A21G8Q3@8pzE%IpCHnB86j*}!>8K2x#W?~w%3mu@7zbMz0Gj5{pmyUbZEb@W(!U$3LR>3Nzbh5TL(+{E z>jR3PGJO!9v<~7=_hXyM$dgGo*QCaHU5B2FLlTCd%Y+iiGiV>jfC!W0kaBv*KY{hd zSODJx?hrc<7!`qAmnhTe>`tI56B%n!D-3&QRL5RAX(W?Nk^lFj z=AvI5t!*1ENt@BpKTJ>vfi6B5sGbL^nmCbm4LF3s3YltX*5~#t%yiu$|B~_8W*(HW z!^cSJ2mm&`e?50LlH5h7ys5lxLsb&<`TXQgy%J)HXlVU`_L^IB0fnR7(zp3p?3h!4 zNrJEX^WCgcZCynLiNMHd>_*mDm*Oskx%SOjKvJ1E`fky_L#xlyc+n&f>U9m0w7CcA z?qd^0XVlGenr-c0lscq@m$s+hR80Q?{$6@d=QPJwVYN4CkFuqfuB^mrQjQcNsR+K9jB)TIBTSOwcz5D zHKezfL+e_8tFp+VogcL1DZ>e|-(&jG@4y2S#?AKmo=%idx^An<#KA9=GjB ziR2f9!15ZMd%s_o2uGUs?VdJ77sblT)9h;0LCpI%Yo=_RI2{s#z^0Kk<8Qy)aO3r< z;y(3h;l;cpugMKE)@JLsv<>ldWycX{gbXt9BI)p7zO*>Z^N^(h0z!@X$hq11i-~$r z&1d+{HzE)LFPA{`2Q=>p6TnwzkJ;bw7J&r%Od2)d=BF- zlHqWcycPwuZqUcJt2ZHF-%mVt_gg2)KO4<{4oT~X@L>E*l9FlycEoL3A;~Nkfqe}3 z1a=khT+j1kWV{p`JI+LRljr*LF65c&s+;U&-G7)w`G=o}j)&-KS$&n(7gJD7C|^y) z*W;_?{_L68bXLl;LP51~N0ry8vE)Yrw#8TP$v zR-Z!u-r^aoPK~P!7iJ6w@DrIpLU6Jrn-J_u)f+3^2=D^b%1cYmp z-rfpM6`n?y^w&_O$Hgs?KSh!~_+QtOmo-`Ihwqij60MdRhPg{aB&xxF3SQdlAo(eT zsbB{5-C6_Nh>q0YmQ=#jSZHh*gUh&{*0mPj3;ZiZh(&|ZAam&UA0^a1nGEGg6UJct z%;hPMV90Wxmr;U4r}aaPX*qmxIlO7BeEU^Q_&OXH^@6*8q0SNCIi-sI|%)Tks4a3Nt@o?kn%dG?`U0C=aa(p{W^ z0j*Ub55NeATd0Aou)X;R@J>SBR3Se#&g57~?ZRS<-o_bcyyb8Xii28w-3gY%tR@#wo>ZYk1#U%Ph(|A{GYG zp6qAcQ-$~lmne(C6e+1v#!YImyk<;D4X~O-c=&j2fK|#Dk-8mk5D;{gSvmf3(dcv1 zv6ACeW4q*5&uxX2N-@#-+sJ#ghouXD>eML?a=d9G19U>Gaf4Z7d6AvVE~JO?w<}PT zAPk*Az*mm{*{<7de1Sj@K(a~pf_zaFG-)>mo zA=}gNZMu_;>5V0-nA*4&Ip@LP9`!EBXht_JVqlmq%Dz1B#qh6KW~2hiyNB#cN1|9h zZT)B7#wyL=_9f1|C?w~OkJg?CgWX@BSJj@SSn1>%3@bOO?RoHM)cLX z12V03CyBFN7wwPuI;{`x-{mHD^K=g~=7eq5Y?{PT8Xj-;$m5VN&1-wVH3(u#(V9(% z#ze8TePaEIy{fxd9+S&0&6(2ptd+2r5Uv)OQNTFTZ_obIo9LA+$Yg9tE@z~eEcN*E zno6%;^9^)jt;*1|JS`qK);@Es)rp`0ysTw*kZw|xub80wp_kzE^;W9--QwhiZpzK@ zLBhuHcijoa_>ni{4!@RN>}?U+QtJWK#X5u4$GKtY)h%$|K;#B$>>-y+DPvc3yN#+T z@nzqh#2aT+kvjw`KkSIJp+Tj2-9EPae9TEPbiGf-8)j7R-@bq<>~)?&wqyE8qT7y9 zRj)@v{vjlBRNZ`PTKl#&JB*|k<0fDf2F<*?1c7C#A!*!TTOjlOEN`+(RG0Vb$>;qe z$HuGHHQY{7-wG3*pvxNOD{eTNWooLH@hVWe6rnL=b#+nGe%SK#5=TevzTr`T$z)2a ztH1M4KEx?&^yzU#it}v9O??5MUkrI-T|M>e(cdAtZ_qX4^N8O^O`jslh2Wa$-+n}Y zl}KS!w%g~7k{nfJEl6~c__?G%Z&I6EGek6|Ha%%d+liJyciqHoj7|MnU%Mo)cTPXM zNaO#?ER!>L^AS}F->W)N+R=JGo}+t%^S7Uwo^a&Mb>@AD0Y#A3WroG8LicdeW}dnA zZ=sr6GQ#AV%8~s#M)k_MKPA_3xd8j3$>7TmukBx^sPkP|i~Zqh3yJRXlI>vq+mfDQ zVXp^Utwg-xQe<(&@rYWvfJ(`PLH#$+xF1K`Yl3UZb=>|!+orikiM~GWWdItVe#f~ zBJz6v)Z3%(g5o;8EBlZ{K2<{e6W z88qANEW zBST|>X^#_e`I1VO)EVa2h3ZpLV}`V+e8IdnsO9eJCFaF=y(<#N3p%L}>w zkRIq}2WoV*@-~v>$iPA}KK!Lp#Uj z$^0({{;zia?)%fVt16biH&Q3&k@eX=Gsnx1m0HnO{MeZwsAsS88D8aO433AHFR#t3 zLUObG(JE?z-2As0;@an~!FWIqgE->x#5qq;pPHWwTRxe0`n(%SwWPjwDw z1pt2gc+45T9sE-5c)EnT`m}ht989@vbh3M{>r*ymh}cLWKI7u_&#bAZ03hV>75khP zOcx6*sT*M7XKxIFqeD8}fpj7LOr;Rb`}GEB$5}d1{St zfoO7RDVMv>cI_vV)Xq@VCDp9Nhr2tCEWil%IYC8`?clAfvN??`@#>0;Ar*^d;q3Wh zG5xjUll?Y6tknHiLb7zf!G#P%^oP~6G6_>D(NTNUhpieM;Zu zZ8H3>@s)o2QgWtxZri@pdzEtSmTyhf-9>)s-y34%{kiny^EGuh=bZgB;`afJk%-fI z63bdi_tR_SG+)}w!BVid)e7D_pS5bQ_L89wzyMV(u79G{rl|a`HQJ)GP=)UBk?dKA zum1M#sr&so0FnRMwq5(VQ`1>j+xpKa@mc74!=hkbMHR(S^i4y+Ce@_)vWqfWNyufr zto3hiv;?@zwyOG?i$XiM5D^=q4%%>%?#?L|OI zuqz9D`;`2ND+ZKW-nyK)d=G8DE!2@p2%46IH_D4Q(< ztN%1jewnQ6o1i4%-uS&nCsgO&_D0dg1|EI)apu0ZmEJv51nvk5ok}Q`MV6BVV~OeP zyzao;@Ug5ayk&o1bj{@u0QYoep5sDujsb1Z{W}WQWa0e}sgI2d6x3eA8e8?JZH!k~ zX(z+R+4E!NT+>DOD;5H6GYM2YS4oi+nJ87&{%QCrX^G6&+hQ%I|fQ|RJtL56; zt46C+|FHi1kCfC6x^w8iSxvWvWxAHUuWh20R4GmLtTlI$rNxHd;%|@jLL72znBXUl z&rb~lB2raU5K|o?CbM>BkglLvv;)? z^G)xK4FV19CX8ytuN!n9y#9(Ut&0-@!hiWUN2Vg_Bth1(&Do`^*Uv-PRnhTdffO& z1q5t@SY4ow3y~$ zx%kA4jB^p#Fy4F3OD19OE(V`;HXr+{*s8j*Xbu&{Ec8tV2kYD{u*&?l*7{_d?BOOU z*8shXT%5?@a@b_Kal5Z6Ln+aqbCM z>2*g@&dy!9z}V6;mhl*}IGt0!cfK*@-SmyL^rLnUhfV$0V=fKRi;NrMB{;Wso0*lT z?Ue4(v0Jfma|#cF1JCP_=5T|xJVUP-RFh||afXd3Lju$)BHGC7gDUbyK@b`*FwUO2hsh3t*6^N>OrdzgVSkJU z|MVxkD^BAZc=)6DaD&27t<~WD!TFKuUg!}~g{M_>6&m*yusIt|e!?(?(Alyx2Tw17 z_pkvf_OLM$@n*{3{r6E&%gv##dv;bB7NH$IE~V@Vt>@(FKD)Ci=7l#ikmd}tI=i6q zAd5ILEU|G`(*cuy?T<~;8d0*ih;h>}=J^sIwqtp~?C1%$`AEm!mHkeB+Gd;;jjql~ z>d>^wfhd5(qIUbdQ4uCZ?YPZk^l`ym%w;@?n5lc<^|~V~WZE_4(IpgIG0m6GL=t>` zJ)g0pz(@Oc=DO-a2^t)VC!6qm7G~Qyui?>J*x=vKrawb14pNT9*2PPqBD>M=&$%1p zE-x5GD$S@Jt93Qy9-nQ`mWoa~h$&<^yG(Dh2UhkF1@prji#MTy(o%9z0csg;Hw|gE zor2QCv9T{s3k)nEe%Vsa^VCKxoKigYEEHJKX@z*N7$_6b_K`R4!pWfHa zbYn$?N4skUk%_Q>)?=4bxeRkyFh24x;$LS@oeOky*+={U!^>E#t-kFiwFZ{X2b~wk zUNMW3z&3hkc~LD+Jc4OFF9*ztZRmyhWXnrQBmW$kXWj$doG(>Uaa89yN61^wA6 z_iiHGcza)!oV7UlCd?Hg+#|3TnxObz&N~cU0fr1AD1$w8yt_r z#!W6Xx63OMk6flD1l@oo60@-G4x_tX?UeNlE+bmV_S?+`REx$bbq|xI2L8p*{biNr zkfM&rnfp5&L^Hh1YIKw&RTZ?OJ!AK6ab+!srG5);1ndikP;mVXr}5){IW@dCd)7vY z<+Txs?v~dLx>xpidoD@XD^5#Sk02#W8PSqZg&f=~N3+$OF6OApQHCk;&`v9Y^c6v! zxUk;$lz&oyuxe`D6^PcqeQqLDRdGFZE>;t4KKDb3E5kMsGcnSn@1M@rHwPOzxPB)> zy{Y9I12T3*hvZr&8Uxp(TL1|EKOF438w`zxq)yr=I&Tg4&MQJ=+w?p9?)FdbvKcd{ zI`RM$B{dxFP|#7L!+N)M#cJ)GQ%zk&`iei2cbw1dD}=S-t7JmfhLZ(n9^TwfRN>{E zob!E-dyaG5JfFvdYye=X8}Zv>va&BBeK^Osbz;%~4dKp&b5LiA$-dpdhoyw@;dUvc z|7sbJ-I38Y(#nV}OcM9e+j(N*&YP*bgp9w}`EZ@aWlWwaP)JNlG-=PDVe@qj^uhwf zt$?cEPo~Rx=h)PvI`KB{lhmb=kLz3eq;a0=+B6>L?x!y;KCU0=^q$&egP!aQP-Cmu zZV(yM^y4zuMN=gpm+5WMY3;&;kV+n~skz#wB^^LLWuu*Qm0fqrvl$ z)$QXov2Z4+ze3ku?cIGf6!15=wi(*HUnOYXbHjWSlB8ZQR-z_C`R3dzao3#on(KDB z6{Gis&?z_Y!noG??#uS^HK6cxmQ>HgvUzy>7(WJzIN4YC(#I%fW5E|_QR=^;qkYg} zaM=Ep=`(=*UBhG8d6NJUAVrO@C9W@1_@STG-)>FnAQqx8X@K`N&QqRCD`_WK7X5ib zvn(1;({uRTzLr(jD&u8y^^6~g6mYgkk z41bD1c5aF&*SW9(X z=(}v_RUag~{9`U@2k081W^P1@#>YKsQv6Er(KR~ENY+V4peRMZI^MLru%WQIFq1`u z=Y8Bs3yscisvs1`+dw}$DFja=X}85Fa-ODJdZ51u-mBpK3arw0q_6I7CPG)9IjEVZ zKwIL>GCmU94aPc)zKj=dE7wAyuYNgFNI8Cw8zdG0xQuJ8=`9V7&)APp48nv9%WOO} zW05im*mG1a8`}=CG~sV(j-rw&wl}AzQ&7?`FSyyYE<~X%Cq2$L@YMuG0vnbE#RPmj zyfPng4lkLQj1T0f>7V|7elo`Z6Zey}4QT=;#=Kl&ircXp%q8LNxO(Xp`)XZzNoW}cJ(9i^HT+Z zWPt&;`TDO`wM)#>l&rl*{q%K(j~Q6PwE14dp0=9h($ejB>mR2__xImPs;V}PL9iE8 zfs84QhqfwhSFx3E-7g9?gXs%h8rln4LCD3XQxkJtfU$j8ML^00<4ha=BHu{dBa2bo z(&FX()|pp#GS+@x1d^L4tCpq$(uMu|OHnc6pFbX0ied7LYszufjfbLH^^RnE)2Y1LpIr3rnvE2lysh+<2OJQ{Rf3wlA{AeK!BoP zPG-My=w-WgHuqig^v5NE&*#OJ?#tfQ=WWW?=OK`GR{fL=kVd_8Zz+qGYC6Vqh%{4? z9K3D%Tzi^q%Hg&+zgMS^vltNmL1YoT^+wsh_pV=_o4TU{Shb`R)yS(Rz*U@}c~x=n^h(c0WiR~&zg^^bD4f~}8b-Y&z(pCceL z)T}nW0T$EIbRJ8djTa*F>S7i#zT;)n^er4VD{U9$Y!{n8?>$w*?MLs<(Z(X8f^w$% zg#jyd%|}%$?PrR80r6u^!#kg1T3wl)=5I}SrLIR83?h7=VuKI~QmJw3#Xgg@ZAyt+sma?GU?*TWn3jKA zQP9;wlHDo0MC}@%np1|`IC56otq+_-+r8Ev4cn?NpT^o;EmJKZ339p(AN&tAqYv4~ z#e%^F<%BOjaMrrgYu)ZJIGE+DwP{=w!pDDk9A(R;ob$PTk6-QdzKJGTOcA2y0?%T6 zDne5el42;}+{^2qilSkw(&$F_zu*0p{umEhmV%dpE+wY!}297kf+XH)3_bU+H*6jnznOWr^l~uXL)1W)+cUH z`mDf?YDM#I*S#Sb8n$zh%FBVv*6s`o6oD$cCx@7%R>*TEf! zv~AGz879j%ZrHSV{hmW7 z4jnf?!Ked8Nh)%{2Zeiy~%SJbGf?C-W=l)O&k7%8~k=obX-BO?A;jOb{ z<%(UqccJcl^z|S8DkX}gyeJ=r(Hd& zy<;c!h3?;WK+7gBrL4PCSosviRmtyXx0i;Q8}8kahW~& zx1&!loVk3*hAlg_bhMx)uOQdB>bpA{A9(qk+c{GGBd6@pdMTF&)d$68qZM(lb%-nM zY*j=#tXpq#>RLhzL9hoTylCfT8;nl}hO|lRO8xiGpS5ep>TT!t?>%&I$+X3GX$>8s z^jkJMS__QrN*GLbq|>5}=Z<>bYa$3PF(gj)TzB-?e&_3rElhE%WN2VWOb`Q&ttk$B z{`S|87Ovg2ZsWckhfW^W)4Snc0E)Cv(2#T4U3d9xgZP@Z?j8x3A!Ts}`ry2mYc^|v z!6m(ouEpA3eEa-6Ab(w~)l_R+g-nE#X4H5%EL=9B$3MsPnUC zuRC~P)2@@+r?(wAu;Dj5FDBMk_qXMy*tu(cJY~({y_@zNJiBep(yiOSI`7patdcck zN0>Pr-o9+%!E>8+4{qDH??OPt!xF)OLM9wgutgk2ePN=7`O*(&Y&)^TJ}SSof|26w zue)d2QoY^V_iWj+;`Fi0m*Z>dB)z>7wp1dJ^9Ga*wUpD~zh}lK7+*}BF2*OYI&Rv% zvD?@wF}0824Yap*2bukAleJSyd=IOqJvY&O(bx08+^}u?o`c7SQxS zav7gn#qNqZ`_UFd`=EzxCU;QW$1N|ueEQ_dZ7Vh|KXLTX$(?(47NtVhv~`dSCpF5Pxy-|0QujvAUhxE5X0E$x&_`#2dk zMr$^$`Ty))1z;OT)^3xwSGxb&D>Ele!_3TVi0wFL#+ccTDaJSsn3*wVW+oYB%P4~+ z+mb9M+i9f}ffvs^p22YT2{ow#^tC(?}clAhrlow(6-vPRsr1Qcq&!iS)jSB+?41Y`rfyW_R z@*&&k0c}OL*y9TYJmI`>;r_xm$hPRn`Aj@6vMC<&BMeu-V+%PPWHp5+vU+c8ACYf5>)+LOySvFW!${w74h`-sdA5A96qva()#| z|9r?pz@HZ)XLG?sE<$edfKj7|fAK^x1qnEOK8MTau*DnyK}w-Ov>;l9#4Hw*!{Y!U zMz+%vpTi~2o52&zaCuBFTPWc27WizK@R3zO@Hvn@*%85fj*!C?aM>I_k0BItkur!x z$o7pO8#x#Z3~(RuQ5IQzK9kF2K$Jz%KZU}t5zUZ{*vOlNAe+Z!^5`5W^!&FR{ydY- zm&LdV{;0Q#>W`bM+pUoGrghi`XMyPj>~BPz1^9y{;_<#=ixzpjdC(j&DaeQaK>5XcDI(j(Lvclm$f;#QC=OT1 z<_YN>0SDPq5;?I9>^8q3n1_cVk<9D6{{iMk%1eSxw!C4U*h3^?EDOW`BrwMH7+{PG zV_X<8#)SdHe+ht@hb3-m%!gG>{j^5c&lvc?iT=BhCO!smMw=ng?=rl=wn+ zOax-YVS%H7WQJ^74nU5hf_NYfG7#TKGe$2CU%-TiKo5n&`T2!K_(#0eJL+^m;e^O( zRzM$+7qo$D@R7fPaUqOsesN)OQG^^s49Wmc1J=kxmc}5*uaVEyz$SdK2QV=%5HJuU znCFRwqxLED+8U zAEzv4q+kb#1UiE<$l+m&^Y<5!!XTz&B75`mM93*9$t09q4@W?N$P@z&F5L#e9ppl&g7iY3BgagMFNqZ75|bOamLRz=D@PKN-WAie zhk?qFND{|FmWEI!DNYF#2BoT!>%m_ST~ZB~^pq)rj6PDkpwb`2Lc(G!ON(lWK0*v8 z`4j#FyiKed8c(Vt0W(utvpVCPfJgQgm)r%{LA*J{^<4@M z4pBdpRtlgxP?ee9w=>c!(48%ReehWHxsmqV*xVNUclb9dY#f zK_D3+GSScv$9zZbF{m^>qz(wRJ5WJp)scx23^9n;PzIuB)!8si|z} z9Gsvs1kAZva!*4mzPqEjt-G5r$zrj&w5hJPW=LCI*V588M3p(|6#)584|ldV*MpFT zhQ@k4g~?=rt4f&|>uYKs=0M+l9LjYux--9wW!5H->i?{WTu$`NhXtac~@ zb*=^&m(3;D*dEd_t`794F%f?eDpyG9Z|@x)B{QV1IjU8EH*R2H0AvDMdxnYAORuCe zD5x6fqn~8KJ9wX6N$g&2HPU>!N zL32S(2TcnUo1P>tD{ucKb6NF?c&w@ZHmTVM$s9-vYLG|qs2a5mZG`bzXd4VFrMIyS z+D2PzdsAa`XJ;oG8RS5G>f}&;=jb$z#bwfD(+&`4AT5(Nji&8r$MyD)P#BbvPH4PH zvuW$>8=Xa_bSa?TDfot#26$Lg-`s&4ng+{*k|QIdQfmOG8YB$$jgX;fP4_p-Muw_^ zvX2iF2Koup%o$n61(F|)j503sGgm`ehCyv;qAlG+V-zL`k!4({oqIZ3!OqZ|8aoES z_^8_OggrM%s0%RKbU^EhlYe0sDjC`L9gmaNCVrH%to9*2bDB8Vjy|vHz>iJQkbEGc zUR)d6dLbi71+5oKgm3QX?(T*j)ZE;RA4DQc1X0I^28Vlwrl5|X-;Gbr&WZPq=P;4Cu#9mnMHZK}2I`K=5H}u3Ge<_t+tSk7M;PsF>_m$I`hb0) zaU$b}Oc9`JCPoGcZC#^-__{iA)9o6BUWsOlLR=}cU@?3b(&{?;#t@q>5Ho0%6aMcHu{cN5#<)<4A+3&M@GhqUzg_qrCt#pp{!!iKQ_0nA>o>(rq-r&LA6{So!gdXW9y{le50Th z&>Usu9-0+e+ty#>r@8Xwqh=9dx$T6JuHMEpm({0TLUMB}+gkHu@7-~hix~z#8xQRYXi2|170|XT@$LKYpLX!G%ybt&GV|mboC&ZOrY|3 zxh@;OJfmRl5Zlz-+c(R<=e%LHG&sYnx^Yp}#XdBysJ*$WxcRo0VQ5oPZ*|#ivx{%9 zde0y!y{Nu9+0$NIW8EqLD*h~?Guc~CUj3wjcR_FG@C=hti88L}=I+S|xr5fJ(bbcn zCw;iB!u+qs!6o_K4452IfWIE8bN=X8$M!mBwzjslMw+Ue(U!AHZROITMsCY**E4jx zp4#4CU*4W>r*h!3!;M08B@Klv;~JgoxaV})L{8Nzss%)~=lR&E>S`N@$1y_-oA8dZ~lS_U%1KqRT6(LvU z|N7-SdI_lowXLb%Zn|n;9==)57D(wX(CPUyr}L)%UJ*H9_O7mO@Mu}g&dh5Lc4~G3 zdCj0kV~m4WNb1e1_OX^*+Ry&q5yRkHnT?$#Nx8Rm-@01bIDniPO{`72XSGuyY_wyd zK{jnutRtiis%#^+-qv~UFDDEGZ)UX<8jG6Kojy?sPRv2-x~G2_n1j@w05+RFGtz~_ z;o4f$B7E%Cw(CdtQSmAEW^TbIvAt-VPXFWX-u{8*R3K4kiwY|Zj%;gThw|krR?ZU>U=Da}b%Q|XWzV}9{Y<@Ay zxQa(7r+czoHlB96nUY@K(OR5Ze8);5st-p*s5LZBCX+bQ7G|;WxW3l4+m!?$S3GWA zr0RYnO((D9R^WKJOb7L&>Q+AYkb`cez~^U$dTcX{YG`N#Qw$7`ljx+G-fXwcXB~r* z)5_W(WHeS8XQ6O@({UyLs>YVi-XvQ?j{w~$$*_aFao)?zJFvKCv@5~z|Mt7ZH8fDB zhb!X(wRWC&Kw3M}r|?7MSq5koensEOGBBj16*xv?h@nMjRdzeFp*WNRdg4@nT7agC z`W_9B+^#0VER9i{XsvYY-EHeM?&Q_gH%D7(U(`8l5ZB0Mfv5;I14oO1@ca&`sH`^e z8R96G7*}LJi^*w>P(Nm>VT+u))>zw_<*0dF^Qu>7^~5A)Fw;StRU#a<*-z#rvDUXSAH#)V`G^}loNNY;ARXOs-o{iS2Rdvm+ zu{Jt#x<@qQ>&3suqu}vK6NG4^*WWm<;}MY7+~40nHdx@f{i2gk3K+J%G`;+expGuj z<5*)spn=tii^gFswT*3MQDz!P_w77t4LZ}f$PVvz<`J?RzKero>S&JF4mmfUgw)bD zsi@YR(CgQ)D>@~BwE;t8Q^NywSvM>%ynf(nOl48~1Zf6a#m0aE0|pGgEPivw#rdCI z<9hTwt{XkPsh(IDxzh*MA5_rQ(-*_oHzlRMrmreo{rSDuv-UM}qz4m1|DP zscPsLLL4JYCvbTm{KCy)a4D_1?zW}|y2`p*mlfr9ez?;mrx!=Tl?1yOY}5$qjp!`fbF2#M<3f-x>W0-VeTUN-X&Bj_f7>~}k}3EA#ee2Ou809R>GTX%-nz7?7gHT~$3 z$F!l=0__#HQT3Jmon?`3AUU9mL!yKAx*(|cg&G<}q=UBXIl)9lw1<Wj6#S?4}Yd8tg?pd=}n%2NO5z>yfhf8-OJGsBvp^^~HK zujr~l-E*G;eAY#Jps`9P*|xqUOd@yYHOlyNooROa4rJ@uK5>@m$;CQXRH zrMv6!f!!yUx`w`CP*DkPN)iLG>@~v21rZV@K5JMHI@zuhQc(ss3X40C-zFq@II{5$ z6DQAm(u36N{Eztf_}ne;CRX|%J>r*DN1zJ0K$FOQ@g}bxa*nR8?Wu+F>iEZ&X;X7( z5hfc_Q%ycHOq;~CCGJOF*>dExB5GJeQ%mFU zmfqU9TV8$!_F2$YwA!0-zIV_c8HZ^gKP2$AXaA=-y7?zyZTGsF=C z+$lbLRF-jpSJz+Tr}g}^d#y5aTBjtjWOfnYP=k;PW?lS3zP&G+-=9Fx`sESn>ifnB&RD-eS?840RzY~F7X-1Cp3?1 zx|H(RY!1IK-c#91PcOV$fQWM6^|_8g5Qw6V_27N?uKjSEyh~c~#L#GSu>SK;YXnvn z<2js(?yhvt9nWh60UH!_|4YUNfR=-r2v|_zb>)4210ACkF~+AZ?znh4Vu;CPq1J=O zAj`Orlne@x3cV}(=k{v2d4!`Z5sDvca{9vd3o7A*vT0=*7sTTs8zUnaEAR`uZhIwa z1c@dFf26)O()78#-bqaa60t19NB{U|%0QwJohK^t!rb=kQCHui5!>2}xX2^*T~S7V z+IKy%aR4G``WhVjR0$3hT0#B9B+2^+}3l-VFU()$?Z?|)UwjK913Qau5sm! zk4|=k=>Pe}{U%Xyb;!$<0Hmob84_h&l5>iO`3RL2N?Y4Iq=Cz&A)FZqn0;V@ zZ0*aMVldv=%_rC`yMxpjX84zv51WL=){@XiXq$Y9aY2rgm4%TWs5Rp1`i2BtkqqN% zrA*=TgI$k*vfrb*abQL)gbQ6mC@kDiRV2m^nX8PJII@faVb#rGri%RTw z{q@CdhM`T(r0#|kd)>D_){2|J5n1f<>bxMglb>3rlNjUt=AX;B&?PV9cmD6NPFPgc zgj8Wjo9ZmDzW1DU0e6PZ9!)maKC*M&G0Ug{HkC7!Zn4MO&gD)W8~QIl&+N$NBd4#1 zWf8|G2V>0N`0H_b*1`JOE7~^^jV48k{j0;?f&dRE~%66H#oHEqiT9s7=^a=4T9u5j=#KETG2#4n-p0&K24K+qy(9QXW3hkmJuHj z6_*^JU0$4buWMv>nmIk((^i>Txs)%ma53HAm=PWk5gq|@B2o(OwaEMyF8=5O{PL#E zq&Q>~kg)jVjM`xy@*xKq-(7tVxfK=`lV6gXn%7v-G(ckk8EeWaYU~&QM;y}122p|Y zGlb@{d#JRqu<*#j&R*ikNN+o;mDnw#K(HdC0u7RS>#DM%pnwq-MDpxtPfaakB()?i z!ob5uStn6uDPRd;c8J_i-iStC7F?JeMAe80kBkV<1m9O;*d-uek%`slB?0r{is<9R zt)*zC+>J`9Xz7=hh(F$5o}U5tBO@d46$PrUzTy;cuYL|`atq|{vaEQhqsWM;#Ee1^ z#o!1*@@QWND*4f%L?(NVH(ZyIl7JW~GCnc031|$EVIG|%RRejFRaMgwyu z8qlWFnp4``);&q({z&BV^o){%obd2)&?>jG4RQpaY1@y=>V2$YV!KrCF+yT}%H;b={$!Y5+ zK}Hay&-B$qOFD1Ly^>ZUB;tcs?N#|pT_Y?kuO0d#Xh(H{R8&-6bLa4bw+dw=qxqtdQESxnOrh2QiXs?o$WBiN3DNO) zcm?Fvj&5JVC~V;fVwMI2L_oq_e&y3Jj-YP^Hm*ge}3>YwA!0-nF#<(5>jB)**0lpxIL7nJp!F6T%n?U~h5Q_I%9U2^- zW+IDt7%*VKfC0lF3mD^i3^2xp0RsjM7%*VKfB^%BCjyLdJqAyNaSay+`JG#_a^=bu zD^@&>0RFr3x##}0*)p%Ft-4rd=L|_=@fRS%{zMl!)ywMM(rq?=D~PzArMF!5Hz1o* zEc?pkr-LuElOei;g%rq-=*vFnf6{;~kX(=tN{}GBCx^jmjT=3@W!r50Tr88!A1_b$ zFh8+Q<>wxkj0zEd@qz^B3CUh+msRCm6Z?PrAM%A<;#fz7bYBh0T`~B)zRDO6gU^)w za4gx~K7LUkdqtR?-T(RiFCEI5%%yYH!~pY+#_Ox>-?8wTi= z-^3=;9&D2F+X87uG93YwtV{IK{!s2l18t1@lRDi}^5sPq3w}s)eUdLo4y>mxlPny{ z4AxVZKW!`B{NoRSWd;1Xn4cj`lzSa}bDwp1t?aQ7e+Wp*{+Me2LGbzH8Df&@dxzcb zl*^X)-w*{rl89R!qyovaR^60Wv(~?nIrJ~a z2Q+e!ysNi$T0I~6tdU=2cVYJzD?Z$}!z^V8+1pd19HQ+~6BP>jyYoYI|L?G00kMDj z*B*jE6VUngB~1r)|78V)8e~mp*?xY;IWVVU^7s47E|{G=6zgO_unwZf0Fiz;|aQLKLT*QJg=x+QE&q{^%pHQ#<(7X zC%DE1ZT4U8RfyjFz2O&ST;RaM$j_SGlYbrIu4xS~55 z{wJb5{hEvm96=$c^2S9~8-t*K z$%}p#K=QxGxa#=iIa0dq$D1v@v&si05l{fd>dLz-rC1o_`bB{jF!Zu6_*#$UWB(5R zn2d`fpmMo64ja$AdZZ)UME@)-+hY2+#uIegeh>I>WnABV_Z<}K_sh77f}FHIKVWv- zNA=j@1M5E6cvMyCMiX-Gjrbr`o6Fae24)2l6&@P_c=4tRqnRs?7^*D zH?Cd1PyT>q$_RZV(|ntS`<<{lqzS|PF_&$wd(~C{Zi93e3WQWFF|H{leX21n)c(q$ zjhnV?*}8d+qSf7!su}j|Xt%87J(d~JCD?2>xjsJ3Mq%%&tq@t>-t^**i~1_p9xyIG zzB$>`Xw3(&tbG2%Pgk!~_4ml_;!gGuk}Q=D?ccm<^Og-??caYu@n%QsFn!rq@&j2O zzUo^yZ{ECN%c{3eyWP5nBeO>db1tPpkz| z04>jy++O5B>MD=z=MQfOTYa_n+)k6&K}OAO)#Ll$di{;p-~4pvxh-xLox?>yz%1pR zVg|W<_S|?;fZLU`yVh<3Y+m!p1&8FcMiPZHHqsWR^Xw)QeVq#zE`nBIvDN0KwF7in zrh)JiLp`0H^2VOd%GY5n%?JGPoYXx0+hmYN@H5T)%4T)~)BfD`R}E4V8|A&YL!F`pT@J8c$`>35}`# znuoqXZKZuJCbQ@9z6i>=Owa53=4V>He=(u}*9R<`H8a(d>u~UVXik`&mbv9=CzNsF zA`C1Qc0h5qZr%3kh2XsAQP5e!xLRjA+B3o|)GnUTmcLy$%bp!CyK`MfVc*7WTeoc6 z@`bv4PG{HbgTusyR9u$7p~60>X#`gz8k>f@K$Pys3MhF4GE%MU4sWT5s>L z3h+|7aPrWGk2dc+bJVi|J&Jm`FzA-fHfa3NLEby*;G2+HogHYl{*$*?zVgAxtJYp} zw@b!LB^Tc`mP-E0I3ljHtSQk$_qE-Y{+^dFok|W*4@t-}2R`Th;u6^ZF?a%5;CC*=t9nTggMv{Pm;WA)#K**6N?W z`^ukQ`Eb?7^+tEYs`}`|ZH*BY7k2O1x@GJ3btmLCf|AFnEMAe{$@40E4qi~!I(YU* z!6XxgStt&Onk6KIDA&lc#<79cf*`%apKRN@4GN{|5SrF0)0Oyq<}?vs9pR?D<;ZTN z)MwPpgX;Kmb90jwAwGsk4@D~Ft545bM#NN4fzFiC1k<;6>uIW8RFMON!07muQAU0T zg~=UgPxsOIzip;ArYBCE-0;<^t$U6gaIFSgaX1`GM*$2h&{RPG9cwP?c%>DQ*gO^; zTKHYdi}DANCIkbcQ}#Vq4TTf$zwzdu-}-3N;f?k=)qR80xI)>q+McOpq&Y5aYBLpM+a?(B2kkNbd7SQ~- zs-=6z0EHnw6;1p@On=2Kn@t~o^xR+G|LBXgat@}6Wx%*B-rH|%gdD(kX49JWYrgo> zAPqgagfZID8e;>sk5799*UK-L89aXvNoIW%|XA9UBw=ODO-g@YwiuRr(*D}X4UFEOX z>G>vg68dZWuI}A;Q18Z_qK8?O7*fXNW9yq(8)>`wlaK%O%6lJvzF*Tbph)7%Aj3kW zjrOV!UwiJQ_dj31PV>&~!lJ&sn_4e#Fn7DAdP)BH+RwM{*tgBT3O~Vs!cx0Sa{Y9V zt%Xr&>-H}%Xt_ogPCZ!3N7!0%pyo^K&0O6e?ZGXpckVs3&%O|*NIJLeo{zQq2U}Hj zu58=q7@XhG-j$#4qmGsr2HWFGMvkcja2|lHhA65U98)rNu$9}fap&5Pb|^c0rT0uT zr=^UmYMjj;@9IggxpD}pvTbXRpH;jTJ4T=8B5C!HUNUpEQ{22|>#Fxo=y_iAy>-{> zA~b$*KQ=15T+8T}9^wz+2!{H~Zo*V$;o^8jN#W4eFL&%YxW_iXWr)UNv1mP|`2qT9 zc{i^+qwW+@FiGUh-m_VKSo!#gQ;Is!e@iAy98@JP&~bT9aDk?%wIM1xc2|6nqiBd_ z?&|x{r)MrGdKH(ro!PVF^*7#n^X*UfUfSzbLFlWFby1by`z1u!v12C;kL{25Gbt=q zmff18h8l)2*Pq+6cI(>DHtUARSC7uJ2c?XwcbY!aTUB_&P^zA6{aMU1<~!OtOUfWB{LQ6HNz+25CBr+IAu&Mg}^Z9IJPqI2XJ zOS(xij59(ma}r+ylc~z#4UlTvw(T~Fy&YpruvL-2)*hH7#T9y3LC-d^4=R+)sSVRq z)7^GP&rBc5X4Sjv<((Xps{7jFUABF^`o+Jz^Zuu6&X}u*;Go5}-M)e#NXw}0~GORu15FGsYZ>VcJdbA$YK_Fs&q5=ck~ zX7&_T+|YPSF0Qn9WT+u_$>rMuBjG81@0*3A;B4^ud2XA}I$ujg&j*qQizkLg>cTXh zUZ zU__G9_M^J0y87lw4Q~AGtBF&G5*|acG}3VsEAUHq;YawO4MZ zc`8h=V97`WLn{SmaJ*4b`e!exXkA9ruGhSarbRXUPk^m)JqEuHoa`pH8vWC69g1a15r1}+SL%B4F@;d}XzHZ@a>6qL>g-M#vnYib7S>qwbC7!lr*SNr`?aA~$yy8r7d4E4s1U+*K zR~mld1>3mxx{(L24}jO3o9w9tloBS+w_n<amQ=BdrTZS-!>vj7#(L3zm5k z;Nr09&4o7{)xXlXJupuuWL#H0EG^)=&)@&(l#NkbG0M11L+hGG*dpctzC8HM$|K&H zyP^c8v>N z@&d*c*GuLT!om0sep&T%$OO-yBWGCdb@#g+*Eu3#Tz6}0hk2mYaAlC(vxlJgU~oxh z$b645F1_RCzSZF8iMUK!?QPxbHo9IlG#F5TahY31WDT%|%<09!5QB{xc0L)>j54kE z!BiTH8%7zIQBZN|Fdc~WbWdft!mGAX_0@!KDdQscXZdR!-|*_2U^=K4Fx>|ytn{Mt zC5-DvUPV8X!x$Q^4p#WnX3Nm(`cVOwIXqT#OY!-mUMa1uJ*C+`T3godRSU<1=ONMl zaX=XtaH^=z338R4fywRLIh}n?={e53)WiE*$7<21DB}{fMO`;lSigS#>eZ`XTe00L zx}}BO12jqf&s&eltvhZJ5MGRjiUW66Fc@L5bKRm=% zCtNo;v+tOueI^m6D7XQ>)Q>YRqvOUmT45&U3MMjc>pWzfkB^&agm$8W0g!gt8W+O2 z-Z^QW(cd%0<1$*yqpm4_aw!N$AE(dr2FmgR^w7rt!OI&IY{K)#M}PVn7cef(w@+9k z5xOV2sAT2$m2Y&=pb<)r=jxf^w%h=R;HcKM;BtyY&=UCUIsQnz%^_WLw}cXzyo8iS z=vEir*NW|@PjZl73J7JWS_)i`Jv*un)%3aORR zmd3iLY{8!cUIdKGRO5PN>kRT{BZE@lbj;J!E4q2|v5X6X&7^MGH7-!2>WrryR?n=apKZ696U2zk?O z(AwocyK=XEa#-pfvFAj?QC0`Eui7V8LK}eI%b?`Bp7HST3~M5zjLXRXUcnHP&mJXp zhFyO16zJSa=>^86_4)y{e&^|3H3{DGZ^_@RBaagDL$97*|H>O^Q(6DT2cI0#m-ox1 zG~81BMA1FAQgYg!7|YhUcvHDy7H4GBetcN(l5Zxd?WW>>^RV1@%~O|VhsUmQ0c$dHO}>YxvRLCYy;17# zo^uW_X(qJPhnw$S@yf@aNh)Ra)F{*!gEcM=W4`l_nT3yQXnk*ITam*7*W0$|b^N`eOIjOqL*);96cTVfg;6$^ zDhHg?XOLYkq06@>y7-x#w<_mMQ!9aSL92`DMow*mnfj)@n!=Zx&s;ex@16_9;D;9d zq>M|t#%1-%Nw=H%%a-^aUE>1A1$^5gvZ;BL!)A4LWcXfq<%C}aagb0PYcIe3rPq<4 z57uwku`Xd5%FTyRP8wf&`_Es|MfNlw>Ju z_BEULymhs-f3yJ78eedR$S|^TsX0ChiZHE5cX7ZP5DbvlGSLajn0PP;p^QuW`JLwB z4XDl&&G+sqya_C#7FU|!bV;_npBzv-8d!ibE(`Z0=s4hAuxdR{ZrOOsJT##JIpzfQ zrclO}(mlkk^E|b6)3T@1H7?Lf&>dlM`S_6w=3e;^oq6*JB#g`0Dkh~HIhYh&rc~oi zE+^VwZ?+4!!`Y#@8v zx1G?98yOS-#0E}Id%E4er(gQ$(=XSqUAKPC7i%|e`-^E=_o(Esey9#^f2j7B%MQ1) zs%3xjo2*Rnv{u}1o=6cPot;I;W%>o^9k^N`8kwmF#$|ZUF}NAX3|}-|7^tRgqVAnO zPF}Xg1yA|S;ZAxNQ6*nrxx*&2w{4&<)7L?Dr)dBDw)N4djRoS7Q zDvDkp8OqC^sfOl_GA_gsy<()J5hTs1>ZX>bow0wdgmD>}-A%;JFuBu0O5)WG#|-Qv zvk9De_ACU=H(avzN(Fxy^~6-p9z;E{FTcD3ZX1bKw~TR_Tn$a@okP=_Zd0)GOnD;9 zzZm0s41NX1CHq#PGzdg!f?bU=E@@;ME;rdt<-nL3?C4%J25D(MSNUwm%ekK;?=C?|T$g9A# zo>15G3YRZ={|Mva)BE~!{0^_&eLbtMo63cb1k;J*{x95fIy+=qxd?aL_KK~RWeScn z&6_UsIw9wDGo@r~YOE#E`pu8*6L3xA^IU3Af2RAk72BLsdLCt5vdhyD1Z$u{&>4m* zO?k)A9=en!fs#WFvAQdEd!%-OyCWL}$v?!nh+~yurg{eI4zi;74q%sogy2gicc6{dN{^JaAZ;6q0qgI3E=Ko$c;#TZ{U zIBMuwO@+yIex^CrUe`*?TC7!`=k|+sP6>s?c_8P)$w=cZa#yb zZjZ#~)@kHewq-#gE>aqV_)OaLL~)?4!e%84{~I+^jLH7;@QjweNob|0K!B8SMH4tM zq}JXrb=H?Vr(q#ymqTQ-Slp&~Gh~e`rhAH0@1=Cm!Zx%V&mJSTCYgP?2dEvwxMG~O zUtO(ce(kLORk!f`=0PfQ?%7nF^$s~5>rmjIlAIm~7O}HE-cDoRdzZWlvO2q3Q@yP> z9C9kBj=)e)s?Wb^e&XYcV%F67(1FP0{JTclSB}}<>70G+CsL0xF4?yVWrJXRS3}!N z`jM?%I)A3zUrE`~Bl>4Cu1AAfA6$gs;A{)ZxWWlAP9jRq_Ei`9YhF6KRX%j2V{B;GPVoJz&{u(_%rR55e^sLzZlRq3!XiXPU_0N>vHa}N7XE0200M^@6R`);uH`>5}8g_D3$6T7*GAf{r5~9&iPc45uN#X2->B#Nz z245Ysxt&`{lwI+7m~l;)#aNjr?=uQ)r_x!HKFDK@Oyh2=Y*)FSScjZ#NEzxcaX9|g ze(SrXKf<^`RIIhB>Os?};duyx>j`w)Szjl(L-;_eAAPG(8g#i;T2JVxk9Rxq`U!`e zfnJ$Rr9c_i)enzBWHc=rbPg_ov<(T@PW|60*|gx@%Dz>I_>p`v3iXCGR1MPl z#z#wnUBX@Uoo;#^)z9o3pJP%gp%H>%BZm-&75w;;a2H2iE&on7nO!b@jSwYKx8;wk z?mDex;dtKAGP-<_IL(5JrVQaqB65(`B&luxUB)H*R-tULd$1;-5uJ`2@w>*63KvkN% znerwr?^ZfYpeUd!fpOWdI_K!0T`uDgQaf^zT$L3roBwmG=FJ}OK1(7u~KAz`ke)cOxyNJlrrrxaU z$DZ2myZ{MUpGH+M`is<6EWkG{h?eeTLNg7xgoBqr%clZ_|Tpi zg9Xv9+NZ^g3;eWzD_X$wQ^yc(=Vu7n9!3uK4pF@bO>*CQ-qAG~+)gM0@*>aUf`zyy z)Dw$s90pIUBHG>Tu-c=H%Vn#)Y+8?P7bL;|7#QPv44ydS0uuEo<1*T;CCj)Vh%zqd zLI~q(9%QF$ef8mApMLu3r&g}{Vz*~LbjhVst9R>!HCxu7p%Wm9C5`a3sd=B3XkrbF*DGVr}@-pe_iqH zP7|0#z_$=~`>B8R?rSSnu3Yi@duuiQdPLH34F!1W1zt)Qzj$ipORxWFo9@Xy2VL(V z0}5|ugrBXq;nO!Ezh}N!^~QzEz~wyBx}YbIl!XPIM|56!KHzTIJ)l^!1Po}BG>Ghe z;if1p;4?dnbtCh}8Y1*o?g3FKw~-BwmWSWGfJ9z#&i_tnc3GqwkT)p-s|hhVvm|P- z{;jCC*~#u4zr8Eo`@faXeYER~-52$g)qru4==|<% z{+e^gN6$X>)XEoDtk`Cr+##h{Ixp;UPw9L#D6teYJYGGB(pa_a;)M<9-YvUzZ$`F? z5O-FP@3lkD-Z>FGMKm&G}8JQ-w$770@^4~~&W)A_sw?i^^3mnc_BjT9IL%jUFBBhDW94a& zfV>B<5(#VkuAWpNn} zA8$WnTZDK6qT#Gt#>YNKhOB3vdUm7k?K&yNvUu~jEaQTplyMond0v)rNeLKG_v&En zjn6){a>Yu><=G9F&)lq+aEx=C;6B{^^Q&(vM@_Vi^YIziT#rBX^b3D|N;&>s%Os?& zxuqkU_H+ zDr&`w&yO12${Joi{n2Mg#a18g_~6-R)~lQh%mIo8G)b0mJs?rDqcfErXWoDH|HS$~ z`|id!%}Yi|l93&ySQZ~0mt|ZJg0rL4YA@NeZe)&z_TC2!Io5U}(S28Y}daq+$NyH)gqBMJ*{ z>%VdorAcC~A22R|>m-zMS$}%UWW8lnT+g2Ujk^=vfQyh!IbEx|s?N9e{_G?3D-IBRMqesjWvvf*YD&m; zd69<^(=ut(Fm9Nm7Ewgj#JQE7;jzB$>KwCSx;OxN+CoT3XA zdsDY%i&+UOu0A1{4FDzsF@Qy>)QEMd)~0d{U~!ea&;U2*8hq;&Uo9I7yWm@+x$w0$R`~FM3>e`;F=? z^mNLCb$gd37}j=O;XIZ7-6oo2t@#_R&St8i!Lq*~31NEw@ih)e0>r7tE#!T{?STTA zPJgZ?xLRp=vEEisQ1Rl-OD%hRe6A~2(z>{nBr91&(&)E?%xTWIW9=)sj*tq2CS{*i z=i53ezxyhkQElh>w+@vr&GDG23}^62;2(2hFXy+AV5N}d7M2dbr z_n;68XZTc^6f;qwpKZ(6H_j;mCih~z`R%F3 z7W(YsN1@wODPXNY!PjkoPSr<}n!;XbS1~Rmg~n0W*Q+Tlp^oEujFxZYExfYeXcl|w z%&uSH`pHfGCDiAHrRW6rAeh=}AC#ICZu*;bro^s*GT;5^H>pUYY z4g`^*R<$S<&u|NchiQTJ+|#mOcWRwaz zA$7n`f)Yyac6drUH+kh6mhR;y`y;^sc5;$SEQKg8da|NG*h=H>Q*#$@o`X^GcZGR` zqpj0hT`Hj4fNzm=Uf;VT*a1Bh0T9hnZ|PkM9h^1^1eDD9dW+HTkEjeXqdXu4!uiGg zBXQ~$Lu!*R{0T+4RNRRK(H}vjI3B$`CfL7aq&&P%LiTGl=@@!bWW8$SY`?bPwx3WR z9^`FM4T0S^e`@nX9Qhv1Mrvz}Jw6EF=SndmiuLIltb$%~#>^$>1yIpGZ^0@@SOi|P?zWWm*YxcebcimeW*wZn@;pYS8}q*cuYP~rf2r6QLEOB7 zLlT6`S&%@X<6}Pf=Rar#GjOIpYKvqRzGQ-eg83yz;NNO~WpU0r^KBy19pGw$3|oX-{ zJkIU9orKiVl2AiP`lv!t`jR8yp`gRhK|+id!;o~x*?5Xzs`J-LMrV-)j8kX*1Lr6k zfv%dPxSZ6~gBx^eFP>B6hQ>XWoxpC9&p30x8k2V^BGZ4%ZvWMhU;fJ@8|5fcwtlp8 zcXw9?D$&(Mu+Clx_IfNis$U~Ma0RS|@KR&b)yHbwlL=7?iRBKCI_cdH?r(TODtT&i z{ne^tWcfa=`qbNs3(WTBa6uhkG&#F&|Fr z4?2=AvWV>0jx!{(^LI1~tG-6ILi^>dd{@Xnu{y)uO})K0P6|d_}N#cdE5OP?%e3m*hClsA?FUo+bZ1C8wZR*{h;ouh*(0$;& z({ww@D0o&9H>+D#Npa4P#~wqj6!#wk;hpYZ0|6UEn?-&&i8^CY3Qo?+*UcvI+c-a_ z-TS!#aqaNR89w*GP&vgVoa%Q|7HslSnk7NlZWg5Tu4_8bQXI6$;~f<%I= zRW!@+g5s!xtEk3$V$9^Z^K&ygL?=5%&QFIDt{1YKd$tphUG0$v(FqU-DYzFKf!1R&iTXu>Vc$B|z|R zts=zj-|!Cx;8L70-2rDQ>-e`#U1zaW&je5ipEyf4d>S_BYC&k#d^E~wvC#cu6CHV; zui-VK^O$wGRn_}2r#CAlBqJdK%b!3F$m!ePca@mgWvk1Q?ELpB5P9d1Ny-X}Hi&yG z_0-m^sKV;pnf~)lbJa^(|2{O48F(+T+2x>4NR_jDKSxz}X^nRwnWV5)qra#B=xL)P z&>$~PGyMa#+*5g3TW);}YGWS~;lCd|>|NoXiNHhE9uLNK=gK32J011CFF&cl((Jrn zf6smo+0cpNEj9LT`Qu++fVUueVD+| zLuL(+!u22b1!#7!JqplB{z4f`i-_OD7r{SF!LV^+gnxl#bYbDsnac|Z#ZMRq`y@Ju z(Co29;Rks9(q<;lXUZUOc+|tsMs~!Cj))C{sfXd-5kjmFdco=n``;e}8@2`Yt`LJt z9yzl3rTZO{Zv1vf7CHEYM?|32*Gg4fTw`lXlBLty=ZT$v&7I!GupQ7PFyp%qp}g#L zLLsFl3}q8Ig^B{$m@xeFM&QXohFD1WD?!gLT@lf6two-3$~_Vhxb-?9UAVBjvzH~* zgfuB!WDi5sZfFb;-n0h{egyXW;*Id+a+5 z$jr`eV|h7(qxb^yu+JCoR~uj6-|oBL?V=Q(7l;T#N%2?=z}DY`hMZqKaqfkJ{qu8n z&cQYI#It=CsDv+r5|n4&GneYx3D;p8h!~`sjn_A|u=E)DpZD<vNkzx1?HImVeP60yJYQI=_ zGiniED7Iid8jO!iB7$H^H#d_lsXc$13=y#ar#dOT>GA$Oz9B;b%ijf*TA$-6*z+Oz zjfAcC@Q{H-_hf%xG7%E*cA043NnB%F*QU>Be{NT8uOmm6pGUxg@^yR@REhNZ<*Yq1 z@}k5EzuQ>;zAUujRHtEW0%)J|OPWUAtKv(;96jz9`w*CgLrP~hNXdTHX&qQ#89{qW zR@++qnj_-Vzl;^l-Cv9>o)Q`=+FiGImg9s<|8QMIv=0-1b-#KkS1ZCVQwoC-FEJEe zby9h3?Pal)jQ!`)$4M&acXVKFy&QHT)2@>>q>7fZ_+5=dS@q@!;`$LFH|!zm*OL10 zRTE&Yw|->oRhXF+8D5xFpMAo;g+S+|^%1I1^Ir>%jxuY$K=`INk|+S%Fu&k7MpG3x zu;(IZ_}Jc7V`iQ5AT4=K7Uy7a`}&%cSKq-=i7Ahe_y_8or&qd#mplDYZys&WXha*i zP+3%XqZn%BwF`cdb;&28ftPung_6oHZ8`!g{QsC?U;Hk&23nymKU|VI`3@NgwQcMK zIzlrEy9UXjQ1*2|vQN|djkgFmYlkZsSIg&#o0IDro-__W3ijX~X#G$AGHt40arATDw4|xnFXTrOA(} zW*@d9@Vm+`GwfziD0JHBL)`A%+$E1*N2r=YIcRZa;CnQreT>hWG!ClC&hg@}FHp@P z8H@+^+=)?u@8*;fJ}?kJooh|4jVY00Sn{Pu$y1{dE8bbQZxFH@HyeP-tZuDT<4A{< z!DDaZqyS){M+y@6{`KB<_7VY+hX zD>+zb9yR=$(?f8OVXJ(@%5;P^K834eP3@Yu;>KAV zE^Oj_v1P%*fM)LhP$~up+~ErjSsXQ*_;PkN(bqEd%X7=G1A-Q9B^%MgFz6sk6Jnb- zNVR?_a`amJAj9wtCG#2v#W3Zd@u|8=?fakkmo4~tPoeaCJG;F*r7_F zu8l>ED=dIr51YW6#hUfb)t-~S>tA%xx^v7a7zj%Km`-B4z_x4yqL|_QD1Ph`y0K-sFtoS8Nh!7G)`T&{L#|A1Y z%NzoMo7n^&yGL3}wmR37$4X1p`c2;btK5b@ZW-Xs&rqd+=3N%Z zZy?CF{92x?Ib(BzoKUZXOQUU6uzQuWp}|>GTo+5(($_b0@vouwhT;XW;oRjI>^IZL_}-h4p}Q)a+v1GH&1|JSwt%b=`BZqF3Q*d+ou;+%&u z#461igWpebP%j73Q(C`YlY$HtqDd>PD!b$ zsit+JSG3XeW34^ikoptS8V-sC)s8?u{dRrZJ;8Z$`S355ow#Q6Kiu36c!k)SK;G3B z?6MH~USINj;8b?$6o&hHr^6uEJZ)8R!_N7i^7qc8==f&)O_%M2^~h+=Ng_OrvpqhZ zYoYvUos+uPa$cUgN2j?v-)D^BT>jDvA}!4&sXtEeTadHr6KZtLV_L3Q%m_G6pM4k$ zosY~82F|^Gj|MXzF6?1IFz**?r@PZk0Nz{NPa(`d$?VNbfWT=9L%-`g!49Z39!6q) z)Zt^065IBXfYM)0%F$LRJvzIe54HEDtXj3}-*ab@@vM)`N^1z$1H1H*1Ky{@bWUuS zPV1%RDp(nQn|*rUU8~|bUGMTmjQCP_a;VQnn-;PyMMwaH5j?A(XwvxvZsB2SH+#VX z!(1MgB(B~tApUXfXueo)v$?;UC{J~VI~x&%G2Wj?fF(C=bkZ z)ZBa{pw-GYt0N%5w7l=)t!<#wFO?gx2L$YmL#kk?rZ|lJd>eOO4!#zc$y3-@U$_1S z2sw)AHXjOU+_2~(RW=ap6B%xmvqXKq?t~At%zNfe$zd^7mFOINe7xx1_q}$<*QMEJ z-+6m^q4HN5*uDDU0*x8ONlG3*_>?t)=MXa9jS9aN-StL491``xfgVnNGUzbh&>zTZ z%E_0kN2%uV{zi3>-L2ryq(bn&OFLwH5AgGkK`qr0uEUBDX8;#L{$f1k90vwnRB`;9GvD}g^tI_|Aa*ImJ#bEkq=L-;Lz?bN*-x~ zC@jBbHrA|gODuS18YuJxZn|kW(}-K>72&~F7-iTQ$>H4maQ_{9qZ-lHcs= z;RP9IVTQQf-XL1NZ+g)V$s;hJTO}jCkAeNhocsH#YN{+}dM2E*)?SR93XRN0{jc5M219_VNbnSgR3RHKv`K_kf5Sp6f?q^3^Qa-^`Oc=^^K0#zzrGUxH`+?z)nc|txEnP|A zsl>>BSl{0dfxn0V1nmiXZ{3I$^=(9d3H@S5x8IyJ?izZHl^K(RLkd^;Ff1XktYO^Z zjSWG;V6}#Z2IXgyV)37QN{m3&9_^BV3Wkx5aOj`{RXV9~X|+B7I#oXuqaM@QvgfN; zwK$?Tzgv>zYs+ogG0Z}oF;tPGALo`F3hjZ zjF0sb9{atcPU4;*B!Vnd_+Z~t)W})1_LAiMO0=X?6N}0%$dbAV$QF- zzK0Xp+7Vw;2AKRMEwY2s_oLDPbBsnrnVc=+?JQ-?#UQW`(7Z?U3{i680a3@}3OOyE_EuwElFr~z-IuX!ti>W8y? z&0GFT8ZB;%kSMw}asX|~d3xSoA1Jz6j5y3DVp^7(Fk>cO!p}cT37aJ_eILyZwcur5 zqd6Mt8PXcsKxac6Ce90&-9gcD-mp_}&)hsFcon^Y%6vQ+eyGK`yz~oBd@)AiYt{Rr zTYM(j>p__S7}=mlY3zL6Xg%*L+$!kw@ey+hiLX`KpPs5vR@NSfm?{(8N)v82UNoybokMj%YWWyWzm1DJcVDgaq~ag=pZcs7P6d zMn`+A3Y^O@N!j3qd<|qa;Ec25*>p^%ug(GT||la`T3bkLLy;wedd1=s+?@vJD$tF&iU|^GO{wV zbA1+~qhsvoG?VALM-QH8o7!Rh8-l85N{tt|I@@zdS(4qnjfJR&FOV-5K4alc?30+GtxdF^5Sx!IO&uR*k!J7O(XSF1Wrmy zENG=_rQ*rV#Zjd`V|`TH=lWH}#?KASXyvBj`V2Qq4>$iS?il7rSZXd<*{9+Iexx#< z*8J+%?CfmRdt6lxREIeleyg8CbjnKS+dyEdV9~{%>n)BH2(kT>DvI?d*;&;w;`Sl) zuMIal&7G|tKM`ogKUG_kND)6^vI9)#i*M2o%!C()2FlCUZOF_}GuEvbj6B`^tgNg| zziF^0PVPksGtt2>VVU?pM(0|v9s&mmw7@?su^qTWXQ|Y;Ba+nt;$_K_$KdP2y9Vdz zXzLDXX+trEbVAdDpYJtimFI;m&cF`ItUyO19~YsYowO|6Wb@J!jPN6ePFSr-Vy&y= zA<_wGXO&$xDG*(nbLYy;`Tn}40g_a;T(X94>LEy`jp?$r|D^Fo1%IoU)V5AoPL&ns;O`;Xkg$a$ur;6 zYDAkc?})lED-j;wJKcp;L~gXuj*aAO0!wrU@tT6a72qfHD5s|_akH^cFs9t1Lo_hL5CykwDubk;qV`4BO%EjGsXtt?rKdws^aH1O3e=pw6IY7-hG+cFIuin&9~%;p=6a0O*at+oWE6jp74&0; zjD`^JUP+Vv!Ly6??HMr(E_O!4&xJy;vatyUK&8pc%LnlXVaxEa)b2IUg(eRzFA@%_ubMfi%;RWCKyCPf=fb?Za61ILnaD6{a^t?X7OZqbd>Ix_+fdL8RXsh zNF-_^gWni?*qZWigFskJ2oqLKJjfz8V1>tf$?$GRi6DC+nK zYt@5A$yxr>3{8hNB})F#wsw@o+P+pvUOq(1D%5ovhL%5)q~}!H)$!-mV|OjE&iE+l zD~ecEwPpg`F%o}kN>#Dzygs>;!qxf?E2hl@twhQVuJl4rE1J92W@T@oD;yCwrs@oh zvea({Gi9k??2gJ(XK?k^x(KouZcX!h>B77sOz;ZP=JOgF`k889_4IO5bhtkQ=XF%p zRJS-q^T8b9+4WIb+1V$RSR=^Dk<(;h-fP6N93lq~4n_#Lmvmj^Aeei)D*Hi93(zx(sCHCiYtxEUjc#TpcDbpKw6=QuNV*|Pf_$s4-;I-r%&oG? zvhFAV2UP5z?t-#p*#_$y>jMOgY3wKBB~nLNYEJU@f+|8+dei=rHi}ZRREQK&pP
      W~rR-xQ?_`F?8g)jKvh@yIj(}jn7uNu7se$UQOU0MAC zUqiOmDd})8t1FZ5N3X~S zf49aaDgu|dc)1AK%CM0jP-*N<^O9MrE2bNPIbC2yPSR?e$S7AWo0u(-(8!osRAEV1 zcS&as!Q`R8*9vkL#w$nuBT7j@JPIpYTW4ApPN|x@pWvl5*?SMo-hzHUrtobxzSZuJ z#A7JD#Qk5L2)5LS1CbJ41+*Yzf69La~CejwVYO*LCr{xE!!AZNSQ~|?{Ba2x` zHlgu6hU#q1af}l-Lvn=a&dTD@yI8VVmem6C7jp#eyk1FlSciR8iev%ySVe9n{F~(|#JqG^)fkY%7e|gg0 z3LZ)$5jAQ35py(R9_=mFsTPc92e6GpK7{&O-y+#+CARrV0pTM#a!N|v4X&NpIl9Xt z;}@j_&`ZZADR<+kt}}A&ej*@RE8|1&(A^poZPe&%wUUvH3J*lx`~7|5JR_Hq-P(Or z;wu&f>X*BEVR~?E`*)TUV;qHt+ZIxxeCj=?eeIwhQEc1_zWUEU6(@Of;5YTo(3^Za zHn+OwxJ&{#=qp{i>kUr=3`B*B!v)jbTyNnq@8`Yr#O&M0NDz>J>AMi>X!ksdqrwmh zXSiU*gK#ErPQ+lRsyk1Kl2o_82#gtXWGGXSw*W-nGd78Qmx}m^V?hHF?ZZC|X2d~s z7zcS{tMN-dg%!uSYru72a!K1=!#%_`-<=19QTznQ>r-e)q`ARDNL+EN<-LF8&Xes; z*K!lj%>&{;_4KRr-WNW&5u^VohbfN0!72NxyQa|U(*g0qh&hLLfn-WyVoj2+9(@tQ z@9705nuWTOL}db~qo<08PdlpN3{gh5Uhmx^jiGu&#zJcp11i@`;M!})>Lght8OlwY+}j(!CG(B zS-Nr4X088)f=SH4AX(hJAJ+O0?&MHjY}BT7JBN!6wW#*&#dbqTp{9eya2e#i29kKb>{k~&_*0Q5gDO2CgAq!N)w`hu8}pgl@V8faDu<@JF%eP*0c`)xV5vL z(6R1hrk)&2CMmg1Tj^uD#b(yuK|9I1d(zpzW%DscGy zDX_8i?Z-;q)D4q!`AodLC8UZ`25h;_v9@H5jp~%3JMZ-wz|8)A(0URStMGLZN?lM5 z0%`*`Drzm!mxS?1k%v-Qe(x|kOi~wM=bG`;IvD&y#)BOFBQpt-Vz$k`Cfld)B9wGr zQ-&pN%OGl361$FS|GRZb5Mm2xWj~J#U6e9x+f(-ZAR<;@ntCgd9f3iYDqEcDv4s|W zKklvk`civSvPN!Wdp%-`@)gg?xPiXRq0o!9`|=zCcCEsz&%@b1>!hpu+&#+Ps`O@& z{xQq95a|&^VfIkLk&m5M-NgG~`Ju6@qY15sbPh=x_XDpec}ok=PCEoN@m9mR{StU2 zAGaFfG8cdV<*v|aZR|M8-kd+VPk>0O1)b%BsT4{SlxBr8LDy7>e;9H{U&Rdu^%9W* z(Eh5fJw6Q)Kt$J&HNrU~LG8%j>vvw++C(Ma=vROD?GZA=)6W)onY=>$3%K656HAR7 zPUo)5fmJtqt)xES0x?@P)V6ZQ$*Wn2X3==6X?k>XWbbnpv>j-&ESXSPTw*3cb zn+f;spGx%XMxvrX3=b%0&d0oPjnh-AC`r11BO~qTT!Sm3>pCARWntuhC-96)p5#uQ zO*h8F2%w<|_1@HlZxoH53;_dZs=B==i(N=NeYBJ4Y+GF?#*{X@6|H3s3t5PGV}#lc z)p$@kgI1GNvB2eoo9x_~C(d7I`Ysi{C}ukzCEUtS#p+782afiQ9K6}|pjL3xsN8r^ zr${^*G9*az$)mWuUl%YJZ4A+W3@Evv?E@)1pCjx{eFe3XNUfY2+dXuhlY`56fd@Ss z#*W#lxqmRboA=2=x3dZvWh3)T>lb<2*8adCh$%aQiz*>#!p6-uqS*(%=C(h%yA|z- zDXQ}xYa46tK}t9)b8y}c`GE?R?fRd=}<$0T_r!AaWZar;u^{j2-ZoX+!6B-q%A zcbVdmaAUj+BvIJ;dkgybwCSip2l>ncTzPQQ(V z9QRUnbOU=p7QO%p7fWj;=K#$$W?cIwpo)ISk?;J;zOxE%5j~I8x3&5qZlTa!$y-Z) z#{yWto{H()c%**~BP~~j=A^u^?gFTQ@nl5$!S<6UoD*4L@bs114f@fHT9|ocKJr5c z>*hjpw2W2Z%+Pa0DS5e&fSGSgV;s#76I0v5rE>nY!?Q)yz8U%-dXVyb-oYQR|LaSW zT1)g3owOM*S)HZbXWWRz88TWHZ{O~Da(+9ns5BF>%e}$Z1yx@$>b-5JPW4hN`l}yo zCBqlov8NU)pYeF{?sE95%|CoWf zf3vAeG7n>qAFGO}3;M<-^rTD>mMG+4nnni?vK5OeZ`u(mp7tY`#?V~%-uW42OloXy z9+qoCdq8TP9)sw+?A(xwk>9ZyqjZ#DwXi-(<ntL}mK)suB_*9Z*R1>aH+T3%9cUZENdY_R z82VJh2gjU_!~gE$o*6W7JW(+mK$gr#;o{7I*IV)}vctn!leUn*o6__&c=#Klt?ak( z0ow4i>S;aSAi0}NL$YAU$@zEP%Mq(NHrW8Q=A0mfO>Qjz(%OE&(v|kvAoOY!g+1Ti z5~>A-?0$TNXmWdYL`H-K&sg2O_hCZ`=HyHVz=;Jv0yNpi4zLr1kYdK{Udy+! z4E{1hg*yPW(FKGFIeTGAtK(<ow8~=V zDxQ{_I$-~p$oCBcR=qW-2PbK<-CqHt`+;f)dud5uR<{ftTlAb zLzub7dc*E|95E;PTdd5?L2v*>Vj5UuJ)SuCWGB>B(BJk7c>Ttr?>Z{ys9^w}sAWAVPk7r;2C785qGIsbnLw6~P22Ur&R^XuCOngqAq0F~rthD1{mlr4 z+NF(u9kluY>N)6k8xB^s@I!vs=&7}naP~a>ue{$ZnYXW!i3=A10+D;tB(hx&*22Vgq)R3;0#qT|-z zMz48gf<#s$l#s1}D4(vMUuIM`XQ$aJzgwl8qAhfSt@l*8QT3Pn`uU{dZ3*FxS_2FE zLD#k9N0td=6C%OeM3@U91%hq9nlHt+_9_D_cx8!pw;|z*!f9rD!hC%$x6G*m$q4%* z=$j5X;hld+1f8^gzxWIyMX&;nZOJQQMKQNwM(Ptd0Nvy>1LE%bit8ItbtmMt=H})Q zm7ds#Oo^DI<`*bKAhojz1uF$bhn#M_Hhjr2Ao_Y}ELjvbg{x@b6iK@)9b)`CmH7)1 z6D**^f(!aJElP|NI?kJ-tPZQrb<_PYuSKk>ltbKcI|rk0xwbgDU#3oidZmd!$g7(^@#kpUr%&t`5MeV> z#WjIbr8-=%UjTt7=(Ugv+EMnVF3XjGTq zaEl^A%!Ldjq~|gn5DM_Xel%UzrjU?y$KPm{aXV@mxIiJUZ~kH;A$3~{6udSzCnS-j zv0?*}wU)tOE;{hHmZ=P;XyWIGM!wjSsp{zHrr}yTZQllGk>_o5QHP={pfK4SxNWhm zo132GFHt^o^3^HzwPr1w%uA+xlR%@2{te>?OB{2WX$;{KZ$MJ3wb4<335)m7gPxvV z`Uv0WWR3M3NHbtW<{{2Dr%W!&x3s`8e`Q;;$ncj4q%euCPvb{NWE1y-Z~j?q{pgWQ zj^AMnzrFa!8A}ZMZU_^Ls2d52ZVLY`7OBAmh$gVjYPbS>M22AaS@={ZUHe% zJP#2qF;lKUAYHYIX2QP;+K<%iBGU~Ux>A$Zo(ndL>aepY+CF*4I;`l1zJz_Cw?PUE zLfpc&b~t=FQqwBIBTmrMkB1!NM4&EfCWYZ&Lg*jvf7@3(j>j%CF5bq-(Gf8l0|MPm z3bvi~d+87rZ1v}KO*PHT7#E9Um?j4CEh$?soNWUwKQj${J(ymd^AhT^1Y<^Yr7zqV z1%YQ|1{V9Izq}i5*+616E*r~CkbJgq?J1O}*&4)>;ouNV-C_MLSrrg-UpqHM4yMF2wmN^LoKUi4jwz=m@66wCFO>&cfVL=s1 zdLmV}Sn&Dr%GFgAzrVsCOsfe=%ygx@{fvVNx zlzUR{m)WH;HgPH6ApnVwRS}bHU_qS5x0@6jWrK|#q(Y7rDTArug}K4CL1}G?vmhal z1thSla?30#+{p0!IIZTx>T?GoT0wzzQ!E4v?8lw={mA)mBH13ZS=Cm(kno|>o(WJdmWf* zN4tpTF9XyXxiv6ZSC-cnSV81>C071LYhgl3+r}UbuQ5E=ab?<4KS(Fc3<_-qFCnG> z)?mP8KC?QJbz5!zmfikK@E8^jAslWGJ;{PL29?U0u}1rsyOD#NyQ70+ci!R%{oG0a z?F|dSGXOC{99!AOzQRlQ$b&#W((5I4kz6ZbN$d;_N!lL7ZCYmF-1c*YF`m`qC+UQ- zG?CWKLqW*5QrAME_!P&cyA<;_5^|6Cg1GzJlW&=UJB%}bSUU4Qa^r2SWhx94hW^%g zs3S@@b@w0w!M~yPwQ|hPVS!Q;)TTMIme`ZSvnPfo_M4Ornv<@9mfdV%7`t>rg7AJF zy&U>Px?+>Qvr`u0W1x0lURM@dXt$oi(a!BG6Uu8X@pny3BK;Cog0`IJ=;$rxaa3_p z(9#xGJ@;u&D(Qw!goo4CPlmJR&ic|cf8w2!MxzP=zWFKKE{b*`FY&QbnkE0QZTF_QuRH)8V4wfU8dRQI9p7vXm! zXSiy5s)o(+b*q|>YrpZ(TOkBE#dZQMyVjVPkIpQ}AcXy>eQ2}bVJ3?lkc+Owg2~@> zU)lD-9?ZDd$z6XGFjZoL9pOhAH4T-nGlSpRe?_2Ue1uWI1l z=duz#3^{I$`Mq+-Qef)n>uyriQ8Sx2wZsSuhM|Qp2hjGos(0Hv+S`G07oROZFE5ug zIUP;&LGJL${<~##gRe6LyqX$|9=X%}binhX8xyTW&d_=0Y&HhH=G~TRr@XwggZ(KL zq4K|{g2#{%zy z*OK(=&ez@kxBE*PnG0+KhHFQJULIpI+Lo2)k<<%xA1eMqR{(NN@{=h0^ z!+b+*V}D4v#`5Tn@wtOVR`^jF>-|@A({yfXt4pz9T=k4`Cw)Z{B4XVT^+;OR_=J7S z@lx(u3UfUbSX+#a{kXr-f379>-I=BvfA^O#>aYS9Hol#;%kdJUT020vpp(|&La&!O zr^E!)2tsv2d$WMwOm2W5zgt10qa+9JwX2@Jbo}-q0-OmUFCn%BxEjj~8_KHKU_a{` z1s^^?>E&x&q9tX8h=$x-tK@7AyNOnmFExVnx3>Nq;H;dyoE$2}iGpsm0tnj#ea~+j z**u@(m)v)Ti!y1$9kHGQ`525KG940|Xg$S@^dZ#`~?LO zy)$3aKiIr%Ryd0a!Cl6XJ@Q9`{mH zz_jQ0d9sE$R(}+JP3GO=FFi-U=3lO)>wVhOS~QmM9iT)4%F_Mvt>@7~C zPN2av=1${^mgix|rK0vSH|b3vTTmB#2n_N2%?IpMJ;rtb#G z+zybP2EiBELIov-ICPPp#ifOptDe(Do_Ictb}M$A(kD9005d)AJ<1H(>c#5zT`dGz zH?1wXYiGfZKRS2Ary&J@3^@SMpQ~`;6>TuGyd`NGV`7trD)vb0eplTx2L~3o@n~?< zdNSBHqmJ27ct7yQy+C<`VbkmW-1B0pT4X51o9R({oHJMPtsc@m)VK4}gq;y(d2N5} zV;k%>^R)To({+&IZf9pg^7&QB+|7D)2a;_jcA3vnI|>?|RnEr501l=uw9F4Z5ZMfq z&1-{NX}sjsOW=U{LN1bTDKBTMjv+>4P@|}6yer;^PSQ%;jq8NoU`|Bdb8&Hz6|npi z;U^+~T32^BH#Y*r)zP&;G0eFqB~!fuQ`gpo=WtRJxf9}JTp0N#0QvMAFCoD?gjD2d zdHQ8H!_Z&}x{NMHUYT&t*6Y{%&aIbuSBsN_{=|ZvcCGc=*>^K8497742uIhcJ1BOx zwc5k4%L|{`#EP3oIRHNq7;M`wewtfqX{c#wX}BcBR<-Z4G>($@w?=^bn+kdIfBQ}| z(7YJHGAu5IQ+%BKnUSQ0mCg>x$ZCt3B^lz;S8jHSsg%@3hiDk>e3=KmQXqc)5)OZE zL|lcjRzO8co;(R;r;0&MBxt0kp|Ef}<7R)>6vnjljIn zD&xGA=I=Jka7kTp5)p8yH86GF=QY=(Lx?-Xl+bJb0^mwQu};)*B}3phLeeY^L^o&( zs2qMCU8grJ7hHf{Wp_6P`GQ%PM7w2P6d_1SeZVrmy%k)f!}iU`vS=~ArcTEq$Qj=E z)8WhhwQQQ^&M+1n6fpSq^0C*z8hF3FPoO~=yw`L2aLRmJ&IY*jgy6?wTWr_Oa--Xo z1Yi5vfGyFsbu)@L5{Zw3Z)(u&V6ifb<4 z*IX1){}|vhmZ!dq`3=#E8!(CkgfLSe5@I4kE%oY}COI{e2H_qYjt=BMcEvvYYU26C z#Plim=+}=fmOC&Ey-P5ZPH^?o53kFgyGmJk>pFjQ)5s_ zqx7i;hSJsb_BV}C25NP$*{r!_`!-!cebbLZ_@#|?^zZC@augRQHUQSDO2qW&5x53< zB{a8UYpBuet5=h`>ddS2ziCq4z9BmS;-n%H>QeyA@R8N&~JSUd=G^6SYVJ=VBldqYVXomn=EOne{PDIT0l+ z6h<%~x3Zyzfq^Clon0D3AxRH*Kt`b~23l-z5+wXKHBCqT*XU?vJ%A%rM1)#y z767dp1eCBm5uKAg7t({fwIWr{R()vQeM1ICStr#52DX~PS$OYE2s8~d*kob#pmc{e2| zT7CyYW}L#pc9&{VLH+zejOOd*(=3TL`h}kcOufD&#%FU zJlO)+zMU;i7@y!j{VMBnH4S5BpWMq(pO1$#?xKkoEld6L2QM`?ciK@BqG34r%;xU4 zz#Xq3&qYm={$ z?usK6R1zY8HbhhU!NsjkrTgRJvFhiX~lM79>m+BB)Zg(5?~I(XiuGmU4+ogwN&T zm`0%1f_M<#ZzEi+@hpi2%{p|$qSR&*oY&@C|7q9dp3B5 zaR*DL)xdwKm<*XT=MpM`;vO~~onQW`j&5llkD%fX6U63$ao=2M_5V0~$MDRWt!uP9 zM#r{o+v(U&IyO4CJMP%FeaE(K+qRvYd++`3=l#C(dJ!SZiZj#Mw!kh-Nm{Tr6_=aCM?=75| z04Ig~cZ^5c9D-U&cWXutC_Nil0Z9qxPu2r@Y$?pmqr_RGOz{zs)VFgj>Fw-1y#1rB zS3wX$58u69Ve7p91@5K<*8B`FwlndY3;sDsvhXZlkD}iVT-Y~&wER!1G}vZKLkx*s zD?hBlOX5?3VTfEf1&WaA#_txnk{n1ev52X{{hK5|-mLpb@E-7@TXnlYKJ6l4p%B-< zLjw^2{NmDba`movok)pUI`YGoWM)kY{Z8Q-Is%Cc&*AN=l%b%4CrMD47}-NR)mIGk zF(b+|iZkqs@DmfV-Nl!%fnVF+d<+?847Wsw-uSgOM4mobG>A7`!tCOVLt=;5UEXke zaLGM8HOpS?IL1B4b>A-0!^ghUHw_=b1ckQ;U7?HS**=Hgfe^_L@7-cfAA{j;5+{`fZEC2?KWK;svsXnI>9SA(i6&x`7 zWcV}-iTRfLVv@>!fTP>elE-YN- z_SAJY$e-RosIsCg%swrBj>53I(lGJT$G}gRR8%}P6C>-nPIH*Tt~2C z583xco1Fkf#q+zYbc*v&2YxV$;_=1j} ziT*o+iFWuf^srZgJsCOKa;pcpXo1Q6eKDI{A?T82#%M{lOclahym8m^_*#-y1u`p6)q9Q`8>+4Fa%1yS+g!bJJiDSsN`MuOIa&LkM#>@a_NOsD^ zgu;U5=q-2MV>#2n%(HN-hmF&raLiG*H7!e zZWSkzyZeFr3y#2Zt?*X2){M!E6h}bqpXeI?(f}U_x|SF5Z>V;rmfBj~dhq6AagHCp z287|rb^AAd_SB#&1+XusTL02PD)_R#)^M5;jQb!1rN~bBx~`Bv-aZchG)BJtShxb4 z-VE%8^hEnq%88Pl-&$BM-A`YiCg;aGQ3thjxqUvKV&ln{&mtmE?Q~tfkaOQqA!v=y zbsdz&^on>w1m&wADPx`I%+=j*S^WI*| zs^qehCd+L3H;tjoTaEgk!ObK3O6`oWH*5?B-8||w3GQ4Xq>~8~`s|~;gV-Xm?KM0rX3Sdzrb=^V7gpr>?ek^As9% zsuw*RB}O182!3KvbH;pCm&x4<@gV85X8TK5jhh#D{OGn_YWvTe9A6YA4AI}4{(r}i z>`Sh%h+TJVyEi`veXH5#qW_TOAm4)cJGo>(Sd@?uZZ!(~0oB_AS@Wem@!plwgInS< zSroz^Xcz$$Pzi=B+73Ud77>^M0<<}zKz=lIhp5mG;uW>m{_j|PE{?r=Ac8eMK);|Q z=?{6R?I+Nt8$O4T9%5?Wdp*z1E_ffZ!H2c)9)xwqotH}(cz)t2Mh?+Bn1+$PVUjI$oSwUVYP-<}@U=_Nnoj(f_a=*S4n8AHJcN2$0%>Mxn25=AF!Hy zd1_%Vce0+vVkYn7L;S3}#~QK{PoQs7Ju_V%%{@~7x7q8b<3}gWbsZ+3Sp+^v7ci^KaAWdUhna_^3nD_gK^UT=$0QPEHnqsuW{*Fz}?+oHH_ zxN{u#cgegV@tl*_=(EQl6AxTw-RpI|J{#_AtvTRrEwBylg3qv-0T+#wXSnpjT`e-* z@^`_G7fxts3>m5_D)US=(6;C?#|59e!)-~cFvUArdG9qejjp$0Vo6_85zn!>+F=_9 zEZM%buYC-zG$}fr3*4N#xaIjC?nhLz;_?B&lVixDZG0VLqpy5_RS( z0|N!ZZB^^m<7it}15&8_9@;o~dD6xHR+eL-h(e)$ob6=)Ew8DX>H&ESP_FKaUAI(FI3 z`cYbNQgE;sw!_d=Hh-roA2Sfz&9kI~eqwqb6n6i&^0veZqI?R{r5;REkE`jlPL-fy zlgzfvtIqw81Yv?$h}M}@q>(obg>SuY0iDd*iz@YKGJ{2%=Q{l`(6MVk($%dfOw{FmwmsUjD&$v0Jm%TaTS!dD|yATLC@5DHtAO?)>PW(t53SK!T zI#3lHwQ^_SNq*K>t_62+)rmuxC)W}j;#ooakb!8)zex%zJw>bkQ{pMn-QsygS>Zp`k>wt6&5CS*-NmQ3acyHk>@E*rm|9ux&p7G zwG&7b$kP$KPsnES|37{)a?z#Vh=rayltLVvE!+@ zc47ylXQm%ZI@>R)aeK=M$;rvRJiCDRr5gkd`&gN4DkxmTseX=HQis97h(Bg1cJ0RS z%ZSK%J@R|J-YRmju{cW5bX|=-NM#K-oALOKBV1!mqOfxHR-6YRlD_$Nro6HQ8{xVREfF|A08g>IgRD zLASJHZR97WpFgMelNw{WwB#*vn{EeC93)h;_&g*PCCBoc-4jGinhIKuExmmN=LQuu zHGl40A8s5yu)f1U7L^ghMG?Gj_pxQ$uJ{hjFgAwvQeF!<1DWD~dV8|vUt7-V8x^$` z17I{nbanA9cj7v?CbZv4(YQjN6$javMes{yqaEF*F~+@-YlES8htqR4M^D-`-VV2O z(DDa%_SR}`PCH#7X5l9rjdfY3-+yT|thmlU zC&{~Xq}W?`Io0%IcKcpU4?@IXJ&(}d5 z92Y#57%_UY8>^|F;%ABRpFw*uF7^B*JtN;55_|30P^y*_gs?qrs@ZzyWi*ja6;;I- z<_GSF&pZJT82sbSl>Ms(z^v@O5PHgCn$tBb$}B~d<-!o$fw7!>lecFa%4}|Ggoz(v zIXP!2DI1`5-vTlWK2GSJ(LjM3*s?DuFmFqL;Hq>ST|3K2TrcNeyw4UXLxA{nCeB`9 z;>;k9l!v84PJYN_Sr&^tZcYv7dD>bsE1feaGXxdk=waOkV{Qp1mWbA|VGMhx2kNX8 zDv*e#?+V&ibdar!5djGZpiRm!J~}@^iOWz}#8YKL{>6oj&|Ypx+UbP}&;#mFpZ&6% z=#!-nxnsM79LUu7Ey9syV72^J2pl*M@>|g+#|i7(aWGC$mmdUm98{MdoUS4sQewz9|g5 zXK)UNGk5K%VXV)#m?^~i!BhNSAM<+I9*;rlThDiDM-{m}RNA_KGIzLHw&=-2)$wwR zY+P9>E1x_?on3yWlw~!9xejjcg&65;j{xK_T-^>}180eFOtfb#F}!=3ft-I3wZ9{! z_g1WJM)0-+ZddXH%XrGBE^jB#t*>b09aS~n&ciVDyiN|1zutGl89ujGmDhB_|Jb+u z=7lpZGLC?CtjrmE3ag#kI8Q37Jx6U*=0D*VNBihDpp!>bF6UI_EL_i{@ zvH5hGO0?pTDpJ@u1S)`r@d&sdf)5`|`HDHX8(gUd49nf0Fz1A8{Yxdrm}@A-#&`*g zs2JH_9c{w^a3CGcdkG9FH?6+U-n~`S0Wr6VTuOGOd>xug2=9^yY6IORv|~83*FY3d z8?x@Cm=-K+dz9UWK81HQ^@zJRJG?!Y2rs{<-0(#Gmi^=+6TYVWHY4G2t?FhES*e@h z-(}2FAe&`za}qf+=ihcsVaLV9Wb6FXa)?$SA-=g?iYi6hU;|^yuB-c2@sz(R>7cuN zQ>=^Iq`7DF;~kF<@@mq>WJpH)d1>uKUqi^po1JJs8oJW!&C~f4?^o{_L&rO^L&tq` z6Tfb0s?LfsrF5PssAN_eq|0UOTqs^r91N9DhJDKwpREOsw=H5R2%}2jn2&8&&hR2+ zxO%h>P=ZLKr#zS)hAt)`gR$r#G>jmMZ8dqPyg|LOo#BF6rEQG}2`r^#_)c-{{WC4U zv-wfccmczWpJ?jjT6(JMcJ|Kv``6V(w3@kbVq);inbxT`4E4{=f}bd`e+)mM_R3_N z0e7+Q53O9&Qmm?~+r>4PEr|>r&&;eoh;K)#kOHnH!t9CYpg(xh%$nXB)Zx{(d}*ac>5dlIrJrerv`8HCkU5Qj^y#s>Pyvwu=euJEC(-Yy!$vbgQ)1CX8;F| z^~7=qD1U+<&M#m$q+jLt(J)S4!&;K>F_q8H&u<`$FevoRw>=ZF@ZocXzm zZ8~O_m{{ejv0j5~%$@(tEj#I3DG-s}cMfGBbJ~qiHMVEiUE5bX zm>T@7bI10FAL@EvD9ps)KW~%OvlOG`Mk8VBYC62;d3-N>R@!pVMw@fm^>L{NfLV(n zw^9M#9qv0xW+v7Tv*ZWLOG;*|AoN++VbteoySL5Sfh+!$Lpj8ngFzWDXGc{=h~Z{X zv9U2L2`47GUE&0%u8j<$te4!b@o|5M{Z&qv#fY(Rrp?-HiT(rm^4tZvnrf%F?sTW zFr^5lYJrWe&Y&lcsbzfgJnoAsYJTjd4Ihn%ej8X}`!e7PFy}6ZB!5zND+~^S_h=3| zK)A+vtFtL-Z<%RwD~X&_JwN;1I!K+9DSo&pZfTjOd))!_o}ah}{vk3;rGT&L4jG1p zVxT<{Ey^bQW5%M167Tl#zA7CG{xP@x%^pkzrjzjJ+4f3!r$LZ+ynil%dpRQ9DQ^d? zzjc4B7lGr;!tLQf0%UPGuUAqF=DsBY8itjs$=ElRXb0wO?Gqc!%OczD%c@;X5wvdY zkc@r8wyI;?+|K=^(3;Vax*b$6z0V0CNa^S|$XW7SuJ{e*UYvJ1qJJzzFd~@1$@e`i zZamwfI?7GSneOgs-T-3jZ^W;hHOxv!eX{7estwFmRKij{bk1-(?rX=L;D5){ZKNHT z9O~_a$-cIshoyz|wV~>)p=Ue}L7lVx9a6?E`e$zKA`zNi3S6DyL(-7>e!Jq;0Je!I z`Dz#!q|LUd3&pXL&0DXF0BNUG%Gu<#_aW{jB>LLNFT-O~*ysU#9MTpN*Gn5!rWm*? z%k0`%q+jdgAKPILOh1KcB1CgJfDVm~CyB)Z0^sUhadgEWCvWCE#^n53KCw^uMZSBWte!f_ zC*7$Ntc0km!H0tx^Hw+DFaFbd@Y? zD+2%kE~AJ>#62!sSk@mnHO-LL(BRih(=UxXKF(GGS4tzw7FwC}J6w;*d)Sz%C0*su zqv&hH9(F;oEM8j7RhJt_@!HX}{U6=X!%FBi5%zvH%?T=PA7-+EU=Wl)L<#a`2#c-z zrx@gKaG~Zoj2FQdMVU)u5{`2TgPa&F%4EM1>|gLyYrC*hIf!F_2;ENz8k^(~k1j7t z>&b5Q^~~lv9p*Mw>*u7%ImRk?oZ@Qo|5d>%T-CK6nxR2AQ0TsCc5L zi6Qz}S(IauJ_kwwHt@~rTSI4Qg}LD+-o~f?JJJldm66W=ChxwQ-1j1ioG54GEoMHa zS5rK9yGF8w6|qM~6IQ53AYuSKvvpVB0mpp=5pzkV^=;;EaFFBAAE8dcQ{j76oeo>m zXn7z>`$J^%(CQiW#e98LY7#zYz$~exu{lnyTcG{-0pTesbQtWb7ES4ZxMP7=pqA0G zLwUUc;!?`7&*MUe*vN(sioha<>08;=izSXZW$9p?#GDDozMRD<4+x)Fg%A~#Qiq|n zD~XkU#v)4D+ola&bi(@gR2$|s`>7$Vy^LTTwx6$U5G6OtnCeSz&UtmYx9n&u^|+Iy zpai*f5B16#_9Tk^#7My`vQJ%2Ta+cwM1wyoWp3-{`K^%G`T`(iF8;RUGWZ%te`e}F zj;k~t1%hG?5Q9WqtzkjcL zUUfX#>}{?s<2T*7c_f++vd4h5_(nqPVb)R{(Wm_R+KT4amyE{eixb2C5M!AwLrec^ z-N_WV`kGy)uoQlMz-tkW!!Wbhvp|Yxd%t*c?Nl%Gn2o3ypCHaFdSO;___c^_>$A`^ z&*802d*n){%hl;QCw{i%+wNW!^^#S`;V3?sazVEv z$9OId8H`2hQX$8 zwCJp`AZ^uTy>+Baudax2W4v&<)%?6tws1NK@H*I5#lh&3+N%4y`Dv#H6wr__OM-lj z`;7|^(7L-^L`y29>nj{#cUg+)I5HD`>K)C+m+$;)FV+*2b+qd`DrYSEF zqip{6Fw)W9YxYHv4Ja6G?=mSi`3`+#JWc&K$O*_3_d4FqgR@zD(#wIMef`*11npbG<*(j54jNly==sIp zUiVnA%!8*}_nJvpP6uNHcbkJX;1hgDV>aRQ>#l#d=JCgvI>MWot3vdP-k;-1Ij83^ z`WC~9(y^Vy4X}p_Ofr&jhpnQgV-xqceAUAjIMDS?704qJE4Gf2rK*e%|Fqu|I5cWF z;`8uPpLPxLd|WYbB_P+#(_D`Cj+Iuen^^Pta*o>UxZHK#N1FlJvqn>p^Qs7R@X|(b zSWF%?2JU(@Fk#d*or(DR4GWy@I^5t$&~iZ-k8%r%;A!2r043X~g*W>20VhjKMGlg_ z7fwDB4M8Zm>OX;^Ip^VZT+Knc-E6i#)w8r!09&onV=GDfwrb?lykLS_C^?&A{P8kM zXU=vg`|n?4=lJ&>ypRRrzq?2^Jw7lhL3 zK%`g2*9=yd^n7*rjHeVonmt+qW0t@&=DRM_6u9MdJpDARJfDp$Ll@g?eC~p_O^NDZ zl1jK}mS4p^*x;0{VCQGoT1*cP^RqdZdbubIUjL2_<*JseSGv1D*t9(-xh(cc{4j>u zRB*2!%2KVau1>$=%RAUV&S0jElPvd_!|`bCPmWMb_8=^odYVO9)ZNN;-WgZ-({Z{Y z9xY;Y{phGpvF&(x#NSHC5a>9zr;BYP) zkJWiWZqTcKX;%dA*d$EMc3?T}!pq`dl|${S)#-Lxa*EJ=0o9iD>@*mKBhHdrBfx0~ z@sy@$zW(B62f-6VVPvhY0}i;$+HY5=D~^0itSz$io@#$0ZxB}N_*#Lc;JgTaLZ#H+ zKQQ#2{q8|zPj`9&!)JCoP_}^cWa~tYb)*uU$>!`Fk)@};uVGQ~abj)tC1neqUJ^|H zKq3U5&-I8S?@pm6lFkE5GQrP@qcW98zbnhZA*#38;Q{^uqWch3YGYSwN4sP&XHgYc zHjv#ooWfYS09kCX`dvueFS~9}ap*{wbkfqpK1vZ*p8A;RnB`4ZyQ8(^?S`{oud1AL%9>lB%ENKLqlyRAI_v(j)W!CG07#Q1mU5? ziCZ`6JP*_su3QbE+u>2{Zq6nH%M<=L-PQU`v!u)=Y}NHxH~U(tRegNS_2n7&o?Y%b zwbG*VO&#EAeUMf;Bp~3mIN3`dCS*s}lqW;GUMYN+GN-WYoIVNnaCdNQaiXiS=@$kT z-j(@-4krj)6zW5U_pYDpLugltUQT=TrQaFHV}N+(!}E#IUTEG=SU8rGo_}V1yuGv2 z4-n~a_4#pix$%}%=1b)>1fB{zNp9@0vVOs}h)SdV!3+51+*Fd@7tc&ZMG93aB}Tn~ zFhNX2I((Ec+LGGBmFOTwrH<&(B17)?C8^3+Hn) zlF~5KsosPYEL&1EAi&At5!DU-J+m1X=(Txnw2+2CE)tG~4IR66__66^wGta@8q9Jo zL&qmP=ljXAAtW8z*$)YPn>Y1!%uftObkFj1C#^jnUtA)WX+sz|J~0VB9}4?g+VA|e zc^)BESRnORv^VhCtxh@_D8WF8?&tY*DYD(_N?^G3gvggfX&*b^0aMz~Hn2zv2!4ei z%k4bkVO1&2P@WhUPE!)VWN9 zh(P?~x`LHQGWB69V`p>m_1@_Z?0~ulZBl@EmAxWH3o1;FMn+1CzKxBpo}T=YSU~fF z03#+Ya;tG@ctMrDtgI|>?r@X{>BPOx=DsFikq1YB6a7t4RQ!9Y91|Eunn3z4r21n- z3NNxmPPwWzKsD!6gf9&61Ev>M1%1Rv@A<6j9(b%k`bS zcAd&DGOe7pN`!(GX3v{(PRIuvn{yU5{hYbHy zVcm5GDg6W+{fxhrwnFGDw)$?bmG;w>^2XAZ*BB-?G<2kgVJPfktm*pJfMJcHkr5p& zt)-O}Tfo2Dizqy{%p$MNT)Ms_kipfuU0NEQgTuwaAx;K(donXKJK52u=b)k*861QF zf!A4U|NJgyXHH5^|KG|3L(iBP?TP+#n*}AK9qkti`=8r;QT<(yA2Qm&UIA8>O96ti zWTe0QuTBEq@*y!;?qVB64U&->{qsy3_zXnP_XF;K%fAPqp#SqviL?g)UnQnAR%#`N;`AGSG*o@{*MQEmfnp%j#W=}OVs>zi8zs)bic*b68a&-8o&1NUy za@ybiDO0oe|0)xV95B?~AM~FpJct>AGBE!%9L4YdcgOsHea8Q*O5OSXpK<%!+l2qr zTX&yFPM<3{y*lgvzrEH`5*j|Xx3IAEe|NQE-O9m%iF9VOK0s4b69olj+VDT)hzJs6 ztlQoXUP{5i;aZB4tW+APM*N>w)4~Ew3cNz{JoZef7L^1x&00K2GAwTHmzF1{;AOE!8 z;l3Vask{46dOFVkKC5T6-?)c0m9>Ws3R9t!9OictSIU%PW8vT#I)Wv{6{^x8E%H_Q zSxgG04-E|s%+Ymrc2+=($UDmj`EM80<9-B$N*5{#kr~!t{&zT`=pLgf=%J)ynvqdZ zCMG7%&dv;;J3OC`xxe3o{4)g(jzcNvOTy$dVGaH}PwB+v+3nd_S*IH|+FY;JY`cPd zb20A?|Bu&K*cdu=aR05yoXbNhG#n7`a<$3#f0SzhESErdQHh*>b6(%p%mhcIBnCN6 zNFKzqpb${hp4;lH#UhvsgnsVKOE~(#8Tm6LSVH6tZ8L?eTIsh1w6DKj5+!NKZR{cc z=Lf^sRDQ)<;-w@@@@I#`#PJvU$}g-d zle!7k=4|8e5_PEm{Ag3LzP$EAWZ?jNy56HZU--~)6}w+!C?ejtRC1F`aoFU+?x#%5 z{7jmer$+}T$H!<$NSS(Z-gJ3o$$T$%4&3%9DR_)6NvOUSTli1&jZyY1dHn-;&8m1u zWq{2Ys`i{5lMF(rxMM1KDSEo$i3ynpR|gjd2f0ck7k0Hovdw}pE-pxn`+M2H2KWUk z61A2n{vGR?cp11K-Xxv_H^a#`kyP=b1 zv->d__~3dnChGnyysHUUn3|g$OskrysoO^~RfF|quNme9ZQj}KcOkAWSgR|dZ0p$j zRHEmlQM1!lQIm3$@RPYUEe|9GQ2v^V#!8Ytay~BH6=o^yEvC(trJckp*#K(Bs&X?K z365|787Q(ku+Z=cQ-QPopK>FCBkWa`vmL0Z)8H3)@h-3C9iO4O(qcR2zP2sti&dZ5 z;eOU^GEgQ|lF5zlugU2XES_sEX{7|@fIXXci7b=r$+Gyt z?w`uJq#>G^cN&b$o(TWp6D1$%}19kG1e0fol$tjeX6^am$oP-=Hi%|ClD z4aFVY2g<@hN{eckUI*(mAsJSKp25ZBqaY-p9rA%}@y1aXkXBo62V*Fg1Nn3LbuF)F zOP?nVeUCQa%A~Gf9s*tm1)Gt*i%0Cu|6Y`GkLKqjv>C$y@sBJL+Qdcm6MM_ld`Hz~ zE)U;?$?4l}(>nAtWK4{t8;^=6HV3?EoqMs*EAIuK#wI2O(wcKZ10C{sm*tjjYh%?V z2s4{k-_~e)0qGYUb&--05peZfuZ5+dD5UhMv~#Bue94*2QiBqy{-+H-R#*8Q13D9U z(2Y1>2Ph)y1Ygf!F$qbTT0{F#x*1y`Jw@3&Ka5v=?8k>!$SX7FwqgJesqW^^Vp4+j zU289A&hyT^_;q!Slw|8mSEmD@knqhW_bw66v@+Vjb4ghI&0`mSCvGMpRyr6BHCb_e zK?fxA(!xUs{Tdl+G%`%8MDFm%jP8Hd<)rC3IqhqX2%X)26MLJ5Nmv8-P)+xo0ziXN z1X;40m{)_U-qIvLBLf2o5znyj8SK*b`J>PPXB}1VM`kj-4onMvW-{8@W$xFDo=?ll z=@ltG8(CZDcJL+!!^aLr*Rp=<=9~i!$N0u!etyx+3fGDx$Ndv7ujk@HF$Lgurl#f) zEPA5c#hj-Zj9jGdE}RDD7sa!?y1Y(3_n{W!>-wgp|8MybDOs4XvEYlWY&@IS1v8Jw z@AeP4Eh$yT1*s=K4X#7{D3AggL<$;%rmP(E-MePwq7bLHJOoN=t8-d-XC5aVl^7s* zDCL+xT-2?~+6Ibo1b7Kh@sourOKyW(H~If(aXmgd`PbU&8+w&Ngk-O2^nt*X5>MOt z$`9wTdH+0&$o9M1SKmpBGG2+|WgeVCiIIz!RRZmjniAf1`BnNNXV3tGPfcVz-B?!E z?l{dnP_)}5k_94!6QopI?(fUoUY`mXXy0D`I1{_47GX9Av|P1GOm)&cpC++#2e-A!1&V69 zIxQ1oAnQ~LHN@Iqra_bugB}Ayvj{B;MmlxMfaDm_?$oMkU-RGo6U9C_?EK%Ylt`6l zX>PO$#Hq!87!W?Am~3v_-w{=$!LN(epkl^V}JE`fIK+&TO)Uf&?+)%jH7YjT&c zZ9pq1kGh{d0yy<2{KccJqtiBj9&FIA$@}l++(VJCv_CN>M&Hy_O4ql`dY)@V~pDIlsN+*G~U~k?Z8Qf2_5!nRqGf=nnOr4xog_;aSzyW=C6n zXn4%XfWHM?ry!+{ow#fLyhI!-^iQB56NN`Jo_>xD`JTPIQfUOCgxhy}F6{~Q0P8^v z2~wrdKcK7u_=w$y3B3gf#S8P#--HkiYc!NSJko~tL{!u4Eg7xckc2&tL2%)dr%;BC z=dF)VY6?__4=k}oBGE(==Q&#^rsd2*6N;tEd+e48M1^a#qY&OaPLC&^jDGo2DKenN zp~3_j#_q2)?h}BWp*$+MeV=Rl_D8*4f;7)X0A8FDmCnOJIl3lB;+TS?yK`{wCI>Tl z3?;nu;hR3k&fSZznM0{cna?=r!%#jM#-iX=7c7pLY%fapV)mASZ^bpQ2G9&B$%0O{ zDKHJhp8pmO3JK=?eKHT^eiR8tG+GVz5W~0g@XO^U_ZuzvID8c8DX}(wvOIyWeuBrz zbF>`zabXHW1fuZqOD&`Q%WDXW_z)WjzBnPG;C^a)dO(xWUsWKV`Mn*dkSuVRYHCU= zD+{fD8AGFB6qi!(2QLsQhc7QrFE4BOPW=tcxVM>*sK1xUV?SLF#bfBGd8t>k106wD zpn#QnIhL>m+q*e)zsUFET@Bo3D}OW=HfLM(aJp;uVCc%~IsRW@jn2XJU4B&MNaA)#U6V4hle8wTY1 zx(pE}_Z-uP-A084ZHz7T?`9N+I{R>-{VWMJD2(JV9>nr0McJBL*HuRmvudYgw)FBG%e}a+me4XZG03A zVvbGG#IJe#(|N!)Bq&emWx8hKY%p>7$3z9_P8)}#b*7!@2=E7?lk+i0O<9?ra)0J$ z7I9)tG#h&E@7^I^Rerix6o2~LY9LIxeZSwD$=<+KXSF7Iv7u|ie2_;f7L{mPOxCyC z7w9zc9V-$vqo?K)MB_c>IHftgD2ZDw7@e#7`ECvw%qk7b?77&rVRDu8g(A?MXT`$% zHdn|=YmHKV&|KD8;KjG=@pUnuUUR~G4k0_0NSSdIM5bQt<7DgeOt~$tG&V&3NE~?5 z_j21oR@W1*4j3s4pvUSH1~}~u1r`YNvQI0iYf4a2Q`_JjI+n!S#r|cP)tqM>Muskl z4-4w>dbIO3bN3b(_qMR`oT3!ZiIIHXi+Jsg+eI!Z=q&X%*ZL?evMZ}<=*(-*X)YNpu*3e1$ya5g)ic@Ii<7BfWnI59m0`$m@;vbzm=R_Dm6>m(n)*9)+Phb9+f# z6qr_e*aM9c!PoUzuU?#i4?D-tZa)FVtwf*A%w@Yf2U3*>3CacP?auM^HFT46YXf0h zLOKftuVRS$dl;pId;O_AK%d%~E@V|LRF>g_AVJ(pm6LpHo#c9W5d0 zEPH4CfB3@i_PF_ZsmNya4At-uKz69mJy(-8H97#s#}dP zG)ux7R6hDT<8XEJ?;S(>A!>tcFQt&L>|JCZ&V?n7M~OG`E{rGR#CF#YVTY1_@U^H7 zOpjaTvF6=J$(lckiKuSx)@!|?Syav)g5+^5@qlB!2dHrZLQq7-AHv6?>PE^9{g}l6@2e%~4tTgswcdee8N{=VoWorsU}rI0}rI)q2zA zgIt+z^D}8N>-fyvemSGYdr)XN3%2cZ@x|k3AscOp@u|U;vApss+=iYlGb>;F7Hc<0 zakS5$wy>CpBW*{gmgk*hZtkwF3nli@f1OIRco?*Il_Ub^IwrU{ted*(FBcMrGUHfE zxg7W7K(6FBxvE@0#ME3}rGI)h4kVvN|JtH0&HBe~1;Uu;*Omh|$2VPU9Alpbsy=TY zhX7~;4YpX!L3Qp#py&Guzk%y@$y&41=>Z?lt!^sbRPyQSL z;pW!Z<~v&^rrS}LZ97o|VYE+#z$ADdu>E>ILZeZu zct4{Fky|ZbrDi=E72vZkecjU;*I`&OVZ@h_jtwQ}uHzMWca5KZt!=GMAZ#KD5#cd$ zSf*4?B>MhJP^Eo0INIQO;poBR8Lof6BSM4++X;X;@`tJAQ1k3ajJH);L;SY`vkvLqw2RApjr>B7*Bjkrsz zx=-n$g2&UMOTcesSbS(%EgD$b(KvKfAsy80G|`%V)oE%^HbBVn+-o%Y#1z+6N1fBjD8gGjv`CB6qVI zLtlT}w(Z%TipwJ6LN8#JSl08)Jn6A>kvBH|XhIFr=4*QCe~-FsNyqX3VF*33oYIM4_m+B%rzYZ$15nUKpe|YyPzs@Bfr?-i!%nv_$8RqvWAl!oY zkQZ;1)BuH}A3E=qcHl1A2nb_iRy30|%$q`E*y=8^Oj3Ehu0@j_p+x8^t8{*iSfc}% zA3Td_-aRA0Rv4L!NDL22mtqd6YSD9Sjuqf#CiC};5#$E#)G||r*n#sHhVX4x< z5J~ad1Wp6y)y??d^~x0AZ!vM>Uvvi8ch&skd{|eH%?r%vNM_<|6cl3Q!q$rBTR>Hsir0DdoBzOVNh$|dnyu|sfcqO zXYksOHu#}Ru+H@o%dqUxf7nl8@W5xzvavJO)zr#cry?s}Q5iEhN1h2hH7C`1h@UFi zG;8YCPgziQs&{(X!=_@3?M%W@t zKH{X+q&37ySdlcAd2G7SitF3gPgmBc+=FE$d;jvhbo60$%VQ8$;cqqM^Ds7H8cj|Q zOe!qOcd)R$A_%~O0uu%vY!MH+e``Fv+|W#71u(|o(_26dS!vh*3=L=2O}cbC z&(!-I68M<&m@9CR&_;B2(&am!@5aMD>Vet6E7cpEGa*QCPI1oF>T*MvjGzfFMdSYp zcUSfFst&q5BhVOAr8S=#sa|ko%q)I2gjCTsC32y8_TAy)`Pn~ z4}3f7ZMs0o0c4EX&A$U+$3pZ8iW@sMXk(F^;^^Sdehd808puvFgk8K+}RQ zehnkOlHZ!)GrH0l%*H*vZ0@}KSRgoW`a6t;lX@P;{37sGWSyM4$jawK!?I?$_w~8p z@ewmPSPB?irZM}voh4tJt!-5FptpNg9v!vydIUrz;pwOrFC7t7yy#bHE{8isTA6b0 z75POz8dS+_f~6-PKCVz%omHP-X2nWvP06rex0YDR&WrX^5wF>WtjM-Kqi=!|$7-yv zv8(7Q3vQtMj~$^6X{Bnfn&8azq13-&whcfWS#3i7DO;Ue{9NT03H!rJ1Z8lUV&i8y2CUh7jq zq{VX|)Cb8@b8tVcMbrvCEWuienCuw_tq;2@PVy8$uAZ&yK2`G=m|2Lgvz2G1eJ>aZ z9vVKX($T`@(&qct^;JCsXe^6HF#1<~WBTrFply(iZ&Otr`%ZADGFa%<0i_i2zA5RT zNKpjEa1RDM)eGKRjo|>Lk4@7;az3S^V!yU*wb|dr^8DV-)k;K87DJwB(FHs#{$d?*Zm4*|m`2~kbs!y=2XR_qj7gkjxfD;p%6I)`c1H&0nJyl`S z4m3ewDbw%9zlj>SpubzSmS^C@*M^n-qQLk0f>cPZ6gzcbRyqb@wD#c%$$Ffrk+fK0 z>r0y|Hs}Odv~yST;R)#Tz4rgs>$h6l+rA#ArXeV!EuS711J%;eFv5i3(v-5lpU~cD z5hVzNrQe*-PNvJp%HPmln%yZ2O9<2v9KF?Nbka2Waj1;xT2bkB)@?Gx~~S*2(96YN8>lE*bQ67*o5<+GB2Z(DGZ;P z4LeN_3A)A?ieNu7EAB(&L}iWUYrg>d?G0^K!Cu%H%_ZwQ^R1DPHJ^~=JIqkQei26m zpGT=I{M*%QmmA6HHgGe)n)ENSs=OD`FAQSnJ|( z5L1x_)B?&IB!YU$xP;+UFeg_YE4#$U#>T&}`7;n58s$gCg+{j_5TObt1QkTGU@>6b zk$>mP;{Pl zX)+sbImI=A+KT38PCl;9hwZWKjGCvBlY=%lQ&d~FqURhL)4LKG(?o9Dm+cCT_@2Ol3FV_9)qQ#Mmk zCr^gyzvH(53Qqn{;1G(B?jJwYu|>~+!+XN=u>Xxn0bOAKgbb(WZZpULJg%29_l}AZ zlv1ita|)SC0Hx3)(x$6n9_4m9{Li^jJPd0Y*@*|b-&H|_2XN*6$f+uT7#g!fQ?sj$ z%r;L?IW|WeQ&MzC)WG}8^NI`=2eQCG(!@HcgYgI{E{=Saaq2>cIK&v(VFC(n(~(C;sLb;!J6uc zG5r0@Z*Tg-ATYaS{>Tq2$J*3nhiS-wLMD6Op5}}YLJ0jVJ?+E=_20dF_sJ(NDsDYU zTq=cPMj@Y7N~H1`&RkQbv);uIb$ysKqipHj+uz@o-JX$1N%53SE)%Qn!nAWTp-e2` z3V3n}_YT34Nd?m)F;6NMk|K#xO3V_n8I??RM=X~MMLeNID3rahaZMxnmhg8rZ z3eH@I>Z7&)mv&5TFC;E*OJ;%F@l9^M-J=2+yQmi}Q|i=Y`o-misfi#6u~-Z*GawR) z>A*nW1s;xB^k67V61DS*3(82u60umaFkL_z>CV34@cAme6z-xY*wPlwhPOttqhvCf2+FF#D0*k1 z7C|C~IRdB$riIqdkAm8uB#oZ$PXWuw?u|A4-FAm7)@RLJ^sN&6#OlYj|1fbaTm(Sx zzkpf;BC7TCD;7r4v!xT_=w3JZSG4nBF;3R`2%tHjmQO<_QTQku%H7%ztyzH8pjxuP!Ij z|Hv7APnXz$@M3#kZ=YD_>Ry2|$aw9Fk9VKfcDWf7>>G7q-`e#z9JA`H`VzyuwLbdQ z+S7W@S2D{QhX|SS>)UefZGrr@xV9w7#cG{nigbo0$%{LFLGO@#+|Zoj&TUd5luJfy zlMMY2y|0_07|yUib*)g)bx|>B; z0+bWw*`cocwt3cYASXR$Kc#0B9UUDNd6k-xu6tomXLZz7?N>k8yGP3;G(W3;NGj>b zvbL}@v~%Hp;5?tW?88e78Va&*TAcafa(265T-Zn_uCPAHf*sjc zPnw*)aM3Y5GBhy4?d<6zCiecNty4^D+TXvt^{~G2wa~B|PF{MSzqG+6ppr2upB$`A z^gVp~l2d?RP7?`S|MkbeZF=v$ z4ePe7e`nhX9o^WHNkP2rTgQyAW@e8IzMo@D1d&Fs9JIWaTh8q5Eces;=dHGR!yQxP zccf@mNy=yL5R$JIvRj2A9#-pJ)8u!iiK3*_2F71GCk_xQF?UAv^{i^7I?=^#r(PIC zH7#BiLF>maMeLzYo}0?0*f+mBdUhUAVYp^UQkrtZddudjH0-3OaDs%xj_HjG%>}?ZuTNcFT?1+-ru*WI|8oaDEmXznkEeU9yQ)ikbl>^)AKzNHVZ(+G zsm0!}yU(wIBaqTHAcPP?%g_=et~+KP#iRPWW_kX5fT| zlt~o=)ot-N-%91oFe_{89UF`+&wIs;&9MpbZAD48=ZXD)+Hx#rdWbtKoc*4hnY%M1 z;Rs^v{&@C8b!;X6j%!(a z^cq)ZYMi_2n%x2Qe2HK*$N!@C=>yjDVd*~+78cz`5HabJ0p$F7%FzH-*Ls*0ihcA`{B4#(s)jIYqEgZ*k&+qme?G>$vT`{fBMc3)ytFKq+ghkFq(r>Rq!;UN2k8t&Q;2+p*#=dt9mo z40d(Qr6VV{op7$46-pH|V+Da`=6WZcbGafZSva4#=z8Q`QP-Vp_wLZT^yPm0Qufd^ zA@3{B33Js$YF4Qd&8Wr)Dslp~wJ(~Uzj)D5SI^kV>t@QWi94ig(fk)2*P7 zl=FyL#S9_2E96adXE^EUSs3V_H!?Wy;O3fJFD2TGt|VqvwD)rq#WuzDhdMU0#>&kyfqZi52YXkRTVc3sy#k7cZKf zGjxc`>0q)%w-tOitx@#m#wDgl7IpC+d~Ez;lPMTANj@IN7hqe1pyFZrD}^dTLJ~dM z9?4aeU5mn}Ou=Ifv_u<5H}|t(EkW-zqdeNs=#rtHfw4N9@o^#dViti2-5{Q`BD3x}H?UViCm8TF$ad0WzTXIpsf8R%cNaZGO&i3P-PZANNJ zaB2ffDj_%xN!M?9`}k$G!;9?)zc`YKRFf6)9!_RP)JxaE*h2q$R>J^SND9Y0D$_kK z&d(?-A>UT|?meP3Ns|JSD^!ob7zIjD$lLTjYqAJqV)D(tX z@w#GeW`5$YCxf~KQ$ococd(}<#tB~M`UZvuc0p-1u(PNyYV{WSMrLMI&3_#i^dwk0 z8SdQaGsqRf0aHPawbU1-UkW=E}H}~(~rEW?{$`vXed0V2KQ_RfX zRuSK+L{OZoxFeqVS~2$xp_r9P<#LIP5KClYkwhYtDuvQJLa9O^6Z7xNmESAw--VVd zxO|0df}E8=R1-~+3YGNh?-g_3%|YIii)7*{rA&T@{7x}@SMv1?IWs#apHs?b2)R-& zRmsG&q zHj7E!x<@k#A%qY@KTk`MxVW=VG;z_lhF7B}Q7T9!Nhl#$ElgwZFIAKvso|Oq%1|Y# zAATuR3Y8KnpneAiL*y{W2NSBpo4Qjy_yaoiaP@ywDfM(zM@>haMM1Mkxtx>{q>P%Q zLJoDRJ8E`RM?$Br9wD?`L0;mHbT(v#M?^$~hlfXmXXaM4vfwE7(+&<$PR5&PD~wBx zNh_)E8Rh@ae!GPbLI|N}Vkr_AXXfc9E={tcz5zp>xxh$L3F+oR4kBdmFBQh9s_&ynhc3E2LI@#* z5JG6VSc1gG;;5c(;-XR(m8}TKTvXgqC<&#K$~x5dcVvWI0-;MCeiTZTN~xr}`O8;O z6CKy6q^9oFK}#L0)ZP40;=xd=Dyk42%YJYTOw$~7g>-Y^Pe@!d>f0$&BN0LfA%qY@ z%gK@?F7jz7E~=w`UQYd?4n|aHg1@OKMi6o;kZGn-r!1 Date: Tue, 14 May 2019 13:25:19 +0200 Subject: [PATCH 540/724] Update waas-quick-start.md Link added under Learn More. Resolves https://github.com/MicrosoftDocs/windows-itpro-docs/issues/1576 --- windows/deployment/update/waas-quick-start.md | 4 ++-- 1 file changed, 2 insertions(+), 2 deletions(-) diff --git a/windows/deployment/update/waas-quick-start.md b/windows/deployment/update/waas-quick-start.md index 9ef541fce2..af88e40987 100644 --- a/windows/deployment/update/waas-quick-start.md +++ b/windows/deployment/update/waas-quick-start.md @@ -69,8 +69,8 @@ Click the following Microsoft Mechanics video for an overview of the updated rel ## Learn more -[Adopting Windows as a service at Microsoft](https://www.microsoft.com/itshowcase/Article/Content/851/Adopting-Windows-as-a-service-at-Microsoft) - +- [Adopting Windows as a service at Microsoft](https://www.microsoft.com/itshowcase/Article/Content/851/Adopting-Windows-as-a-service-at-Microsoft) +- [Windows lifecycle fact sheet](https://support.microsoft.com/help/13853/windows-lifecycle-fact-sheet) ## Related topics From a85191934172c161f20f5b713725a8aa1b616aee Mon Sep 17 00:00:00 2001 From: Lindsay <45809756+lindspea@users.noreply.github.com> Date: Tue, 14 May 2019 14:49:57 +0200 Subject: [PATCH 541/724] Update troubleshoot-tcpip-port-exhaust.md Added to note. --- windows/client-management/troubleshoot-tcpip-port-exhaust.md | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/windows/client-management/troubleshoot-tcpip-port-exhaust.md b/windows/client-management/troubleshoot-tcpip-port-exhaust.md index bd7c5fd2f8..66d2a7ec38 100644 --- a/windows/client-management/troubleshoot-tcpip-port-exhaust.md +++ b/windows/client-management/troubleshoot-tcpip-port-exhaust.md @@ -99,7 +99,7 @@ You may also see CLOSE_WAIT state connections in the same output, however CLOSE_ >[!Note] >Having huge connections in TIME_WAIT state does not always indicate that the server is currently out of ports unless the first two points are verified. Having lot of TIME_WAIT connections does indicate that the process is creating lot of TCP connections and may eventually lead to port exhaustion. > ->Netstat has been updated in Windows 10 with the addition of the **-Q** switch to show ports that have transitioned out of time wait as in the BOUND state. An update for Windows 8.1 and Windows Server 2012R2 has been released that contains this functionality. The PowerShell cmdlet `Get-NetTCPConnection` in Windows 10 also shows these BOUND ports. Until 2016/10, netstat was inaccurate. Fixes for netstat were backported to 2012 R2. +>Netstat has been updated in Windows 10 with the addition of the **-Q** switch to show ports that have transitioned out of time wait as in the BOUND state. An update for Windows 8.1 and Windows Server 2012R2 has been released that contains this functionality. The PowerShell cmdlet `Get-NetTCPConnection` in Windows 10 also shows these BOUND ports. Until 2016/10, netstat was inaccurate. Fixes for netstat were backported to 2012 R2. Network reporting tools, such as Netstat and PowerShell-based Get-NetTcpConnection don't report Transport Control Protocol (TCP) or User Datagram Protocol (UDP) port usage correctly since Windows Vista because some new TCP/IP features are introduced. This update brings some changes to Netstat.exe and Get-NetTcpConnection so that they can correctly report the TCP or UDP port usage in Windows Server 2012 R2. 4. Open a command prompt in admin mode and run the below command From b303dd9df51eea083b0af7dcc32fd81c5b4b24ba Mon Sep 17 00:00:00 2001 From: Lindsay <45809756+lindspea@users.noreply.github.com> Date: Tue, 14 May 2019 16:38:05 +0200 Subject: [PATCH 542/724] Update windows/client-management/troubleshoot-tcpip-port-exhaust.md Co-Authored-By: Nicole Turner <39884432+nenonix@users.noreply.github.com> --- windows/client-management/troubleshoot-tcpip-port-exhaust.md | 4 +++- 1 file changed, 3 insertions(+), 1 deletion(-) diff --git a/windows/client-management/troubleshoot-tcpip-port-exhaust.md b/windows/client-management/troubleshoot-tcpip-port-exhaust.md index 66d2a7ec38..5b2ce05b0f 100644 --- a/windows/client-management/troubleshoot-tcpip-port-exhaust.md +++ b/windows/client-management/troubleshoot-tcpip-port-exhaust.md @@ -99,7 +99,9 @@ You may also see CLOSE_WAIT state connections in the same output, however CLOSE_ >[!Note] >Having huge connections in TIME_WAIT state does not always indicate that the server is currently out of ports unless the first two points are verified. Having lot of TIME_WAIT connections does indicate that the process is creating lot of TCP connections and may eventually lead to port exhaustion. > ->Netstat has been updated in Windows 10 with the addition of the **-Q** switch to show ports that have transitioned out of time wait as in the BOUND state. An update for Windows 8.1 and Windows Server 2012R2 has been released that contains this functionality. The PowerShell cmdlet `Get-NetTCPConnection` in Windows 10 also shows these BOUND ports. Until 2016/10, netstat was inaccurate. Fixes for netstat were backported to 2012 R2. Network reporting tools, such as Netstat and PowerShell-based Get-NetTcpConnection don't report Transport Control Protocol (TCP) or User Datagram Protocol (UDP) port usage correctly since Windows Vista because some new TCP/IP features are introduced. This update brings some changes to Netstat.exe and Get-NetTcpConnection so that they can correctly report the TCP or UDP port usage in Windows Server 2012 R2. +>Netstat has been updated in Windows 10 with the addition of the **-Q** switch to show ports that have transitioned out of time wait as in the BOUND state. An update for Windows 8.1 and Windows Server 2012 R2 has been released that contains this functionality. The PowerShell cmdlet `Get-NetTCPConnection` in Windows 10 also shows these BOUND ports. +> +>Until 10/2016, netstat was inaccurate. Fixes for netstat, back-ported to 2012 R2, allowed Netstat.exe and Get-NetTcpConnection to correctly report TCP or UDP port usage in Windows Server 2012 R2. See [Windows Server 2012 R2: Ephemeral ports hotfixes](https://support.microsoft.com/help/3123245/update-improves-port-exhaustion-identification-in-windows-server-2012) to learn more. 4. Open a command prompt in admin mode and run the below command From 40d597db7bcc86b0bf44975c5919ce5eb9ac3484 Mon Sep 17 00:00:00 2001 From: Reece Peacock <49645174+Reeced40@users.noreply.github.com> Date: Tue, 14 May 2019 16:56:45 +0200 Subject: [PATCH 543/724] Add files via upload Fixed screenshot --- .../wdav-protection-settings-wdsc.png | Bin 200075 -> 211629 bytes 1 file changed, 0 insertions(+), 0 deletions(-) diff --git a/windows/security/threat-protection/windows-defender-antivirus/images/defender/wdav-protection-settings-wdsc.png b/windows/security/threat-protection/windows-defender-antivirus/images/defender/wdav-protection-settings-wdsc.png index f55eea0b2ccea13da9674f04f5164071d9ee6bb2..d04325618767fded194c1c46cd0600df9fa9fc5d 100644 GIT binary patch literal 211629 zcmbTd1yo$i)-H;>1`pnZ;L^Cegy8P(?(R--3ynJjhd>~>Yw+L_+ya3B!GpZT-aGr8 z`^JCoyW`b>L9@D6)vT)N^Q(7C3exB(FHxYNpwMOBNT@(T!8QWFTH7z$Sc{x5)M|);tGe;A1W-ogupf?nhfUuX7v8k=O z8-d56)ki_i)W_D8*9;^qL?PhC2Ml0u z?q*EkWpC%;%I75r`fFT1;Pdli77)c>UEFL1L88wSQfSF5QHVRbm{V{vb1|8MIXEe} zd6~gn>>Rwjj1+9FU>+7$9u_b=6PSySgO!hsjpCmM0%mhDv*1&akospX;6Fi-m7ALr z9}A18rzf)~JF}yUB@39BmzRZ=jfIVk3FyJ(>h0iW?8W5ZO7&+133FFd7i%XsYexr) z=Mjxf9NpanK>($HFTvjF-(ekG|Jf#B!&tnGomjxktj|mOtD~9ezx|xtUF`mv+{~24 z+|JzI+`-Ki=nMY0ualLdo1?3h-vhlI9{@qpH(ahSy`+w@n z4hD|-f9VQvjhV5V@&9LMGgCebM;CizV9nO{#+K$RP7anJihp;KPu$VY(FK?oppN~& zpUa4gE4esYSla<#xT;8tQOHP&bAfrexR}_O!GDn}FV83A;Ob`VU}`QSAqWEYhuPZN zj1O$VVQyk!V#dVAWx>s4&dFiUWMW|ktQl+$HnCteUJEvMPIe{}c4KxXZf*{CCLRt`VmrDY{q#GHGo0 z-=jWLWd@AMWy}UU$Zl1<2=AxFs-u>S&BFq1deph3U|1(|D^t(%`vqycCa)D zR4ohWc|9!8O6l*TVflZb+F#%Omje6K9ngx;AOBUyz(4;gbaMw_Xcs_Ti~ly@fP&@F zmXQ!u^UD75;P0g|mvNO~XiGCIL0%c`fgx!FHZHCHWNI7AMED~LUd6B6R5?U3@|>6{ z^8#Ae9vSB9lrRaUXnre|c8)A{Vm9B(Q0;BVmYT|^L>*_T6(MTu^1?~2==s_p>ZPOW zq4(~4dbU6LUxh&^js*B7#yhVKd^>s`mi9a68|8M{Y^$S^wj>@Ge0Ms2Vw?6yX<;*f zzFulS8O3THkq!l_GHeNn`&gJ1&-mRDb$-T6UaEb@>_uEdWG!mQGrm;*{Y-K)8k$)xmqbi{cw}H#eL$z)X}G^_Ht=| zq~$4y1nbhp;o@<)r)(_X!p4!AkpmgiD8{F3uBWp&k3fo4(B~)E<@mrO6(rIyOHx8n;h&cMc&@OsUH06HWJ-sGJ8e0jR@|W~IiPeQ zmC!1RsvEz0XahHJ=kkad<^oxEsXj;9S7^&E=;=kw5YX1^k@6TZeUeX z9@k5z;(YQN^M(1$P>+4Rj{{;Kp=-q*6;k9}5DM-rpR$;`BKuKWcDKDWdNgmS_Pu(X zi@y(#bH8|XH$0ABPfnluu~=yWzlQ6)&uW6`s8gO66+J#i82^saIZ*CJQETJ$%2~TXF8I7dVK`UGOUixH^2==h!@9ceBP3jS=Q84& z*YRZcBJO)d@lkd|a?ZTNxUh2;0h?6f_+WF>}>@5kyvZ#ULnv~mi4 zsHtpW2zlIWsSd?c!(5LRmOv)Qyvq~PP2%>DT~YY{hI&djaD01vOX4k}Owt(wMS70l zJt=K!m&_0+|9G@sQ`JeJv9*QMFDLOBsn&X>yne-s0Z+^?xM!tEoFXB}i~gPbX=W~I zXRG6n-!S%EPJ|oN!+G_;EZoe*p<+ZJ`=8)R=2#s#W)`g4v~=m-7UkR$C!1Nk!6ZNk zL=Jz%I2Bewh;v(boyx*;<9)!4ANcDb^VE>NMu7)3c!XZ?%HaSXSLMLa{;}!EliBsP zg)-~i+OSGnKk2j~OD;x>F!56D%{u>>mP2@>N~+h>%X4Ao)#&{FhVlJ#S4Hs*$$o=y zA7uA5xjf62bioft*FwJ%d@(sm`1)5xq|JHd=KAz+G(XTLO{hgD1B+FPx_k;a z3%_SkykgdtyY3vn_Z>(jaZA0>65>YGBzl6Z@vO?6KdOr|yyzO+FtBob>-zqQj3|$# zVGiTbS(g1<$QSl(_l1;Pd>7k;B*gc5D|`e6tc|2G8PRN1VZ_+40sWpP`?YhRZ&Q?dm26P(N& z8sDxx@23EpaccHtvCIBpHkq^a{4kXl#7|3WH^1OQL%?sV?R+FV+hiWk?G0RBmC^T??*d5@J@r`frk)$wP9sa_-mUV8?5&d76rCpWZnBtQEcxU#f#>j^wH zd_0GAoy9r+Xi$uaj^^XXGz(ZXe5~Kib`_!mfw<(^nQtEt9i{J&V~GqO2Y)OfR&-OT zMfxjT|N1GS_E(#QhVT|XX3aq?$Gpy|Z|7Kcas+wT_o^n@LGR8UxgTT=b)I%uE`H4u ztgJNMLkF&YvNk=Q)1;Pay5D@7pL~>ZGCq0gFYVy1hCHp@nf!ioymQO)SpL*tKbrPF zE^e^J;o*KgjVUl)(6uk8==V)*w1#wP!hbBUis{p$7&oBz|6u@TVBo^`~F?@KaCHhmWumn z{``gqhg;jgfEjdrd4>B6G zYsn6iVJD@f;cw3_E)Iu(`uv%gfculz+15Y|!4WpzLUlz&ML|JujCvd)I7D`jFP0E2 zra1Nb)Uvt&T-wp0&!DQQxiB@w>VBwZD(CLb=`j2CtBSsU&U*PDd!#H~<+7FFy1hgr zmtF^~>-_w@w6v7dcK(3;lA*+M{(N_|x)C54uvHC~lMdF_8GP;)jT#c&5a6NdP`tgZ z?aXK#xGw@dOUVB&0-YG3NTXUuU0Hb=m`Yu}(cxQbi7aG(Zm!y}tFxklUYFa}-re2Z z-(OIntft1G)2}6f3~VAHFE4Lux_y89%bt>0P?bW6MZZ-|VuE)+J2NvgEiDZm6@M&O zP*)=0qKJGvPq>S_MDkDjUePR;2{s+1tQ-+~-#65PZ(_D;C7UM6m!Go)w>;9aaoB+*0yJ;#Z*#$U3ug*x+(Z|eV6W&{0 zU0t`y&f3wDg@wh@!C~G)>JPEUs<6>Pk|+q|vIRHMKW>3R(9zL}x$M$~{9Bu&cGeKd z^L!4=J9s~|xBK-+VZSs{R#%@}U47;_;OE^iKyq~>&TBc=@L!EphFt--=ezoG6uYex zzdrz5RHf5c@$sW`ew_0^+^eSc^LTz*#H`~B5 ze=@?BqW8Ed(AF zP;WkEPrx9bI5_mq3v2#$wBnKc9hd3>e!u!LG8({WGSSXoyg%J%rtto=@EhF9nwk?p zN`-^K#Q(}mq>4tddDiMp-nkUZHR5;m=*S{$Bi(aRsR`!kQ=nsQWK zUteER5v4;i_eSSVmHk^tK+p zDEikga%oszU?qRG!*5kWw?nT7H6{M^>!>tGaV&u3b%7%O>tT#}>?{8$;rNq(Sz@+L zXCB{d&F_ilh07l{nQhY=#2tH+L>~Abuk`Xnqu^$H>qkL+{6+20AO8EKA5TCJiLa1_ zimmBEgXtXdfLgyu@OkBnfwCFulSww~q7?i}hL4~BQtY9&asFnp210Ba3(m>O85kJQ z3!#^vc_kB)GQ%M`GOv?O1p=Py5OKsESya#24Fwhxod0Q%rb#kKyW+7Z>*wD-E%A9u?Xf<1dg+e~aJ_sK+rP5&q z6WHDklJoQPH@-dSj*rI>l($q!e$`XF^>L8GrRz*>AID1$arvHwjxOmh_qwd?;eAqP zKRJz5Y#$vZ3ih>a9J!-&*To%iEn<(jk*a!TX%N)?8hd6?9+Zf-l*|kVl#-FT6ASJH zVf5G2jHgjBn$JZgM${u=k7gDn_N}^ix)sZJG~_b zWE*I6y3o;K97MFUhM1`s= zLSjVAuB3#128(dfMM_G#fq9f|z1{U2q42wUkV^-ozPteP;{g3c{1nRuAhYWIv<52J z)`_hFvPL@iYI(E(mk=f*pz%%ks{Ei(HClvtw(A(hXin@XxGL6DK(1nI%Y=b*deBfLwKO#L&R5Qx-#0Z0x!B%-W1v-!%`&q6&=IKb`0&8Bx`Pl{6Ck|4MxQWutB ze+U+ZOFn0{MxQI1gL(h{EVZ|v#Et(KA2%-#IlK$;tu~T;U-;OPmlmJOUf|zSKKoc6 zsWl+>J2ai5J2mh}aI7CpA`D!gGM3oSHfS6)l6Sh=)EL|u2#X~+g~m>V>zYWHUpc~W zBQ>wkdH?~Y4bGwpYtsK_Qe8rDMnW3A(o-R!?#z@vqS8!%jdvXz<>uyQ6%M;kDBev4 z1B%?W8!kZ8iCi1@Ni0KV1s|xaf~-n0@;u@*XM!|k(>??YthFz~ zTg$_ka>~5u56*unR?6m+OzzG~iFkAWkIguQ-0c7|%1D$bX4}+HNsz68fW*}r>uWyN zT-2+=O3C^{jO2_|JC$51L}@XI(sn9YaO?*|d_Z(eOe4kyQ|&Dg>Qrkpd}?Tr+A-pu z^%WBA2dw+lul2$nQtIWX-MfWhTlg?M;ve2A1|OifWm?=KnP@G^?AEa3!i^y=(c?=y zS`jq77SYzzL(!c*FxE4vp2Le?j$4)#__9S7y-2sOjKsIv>V;hJ0hO|Bw?_!9Mr*_9w^2T83qH2i)n-}kLtpek;SUt5+O{RSFo0^OO|^= z0&UX5B-SMEz79Zv$1=_=1@=D^GaeeEzxjh&2eAsqOi4jc0r|mn;}qOk6s)J1op4+d^{{!G@;6gT)&?1~Q3RM8xo$7Yt8fR#_{yInt;RQf(q7 zK5(!}t?72o_>8b1Mad3jXJ_zWuhLYDP_)rYM7V?x*agybi5K1fSq9U}hkLxi+i|S{ z^ZQe!`_q^%s2FfaPt+1B%Sj7Xd%ZNTmn{^P!1j-!B|sxLfuO^)8_9{540@h`Ay{s~RC=2ozSlbYceYPP zLR!~wy{Q>DbW}TU(w|=ZqiQfOnI3uEtKeU5ENqDhZ#v09m&U$_!nWWqh#EWLzq?%~ z)VP3kv1VbhbAM%vYQmXg|bqzNu`Vna&ENd8r1P8`Gc%huUJtm$K{ z&%042Y%}AA&JQu)z>7b2&{doLFl3>Ap!Afu7koM#Hi@cMT(s#c!q8DC9QpC%doiyB z3CeQ4a`+peSz@?nzeGuEgBqy{A+7~n{ zt;tz~uTLSZFp)3D_fK}kVjDV?^W*6(JNu|aS@W053-wUnX#o##8?)Lu=Udz8_pj_ipUDBy0-q) z&DdQ5>RW;Q!hZW%ntt(l!>>csr~W-B@h>=c$h>w3X4jYD|H9<_-(N(omS|u zX$L4bH){Bc#*f2iQ{v)*iLD&F$gbVVu{6uD)5=YRS2@Z^7 zv5|PXwNsJ#`oGrz-@EJ98|$WWQ-|lt^)a%K`wyR6zpJW!=2HN6}~6D z@auFU@SoWEFtQ34Zb$6VnP9c9$U0WL(Poa+bM@@B4|99KUz0BEr5H;ob;HYd*FWJK zN|{@O2!0@zg@r<&E(yed^DTu^RI`wcQMBk6eYM#{F(TH^5qF{Xpw_L7>Nw)SxJ>BX zd{ELC^i5H)+b})THhVhE(th}66{gMHpG@I_oa>UY=nz%_l!;py{deY*X=RX6z`%3sVtF1@#CoZvN{H{NsAd59`O zKt)5NRNFn22eI4G$RDgv8OTcYCV7b~)>{FoiSf9!$LXEAUJ$(+nsIqHS+F9O@GDpf z_#(|H{v`JJI6=yEt_c?f>m#8v*Vj=A={IA|2|{38!(a^P&tMo7YKIg#IHWua+6la> zG2{g$^u#xc(abE>3zW@j9E7;soUcJr?4Oz?%?o$}|~x6bWSg|Kl60Qhufj zd=eNe2h=Dcnb!vY`t1a84(FZM9W0lSs~B?pa+Z)KUeje%Bu*!hhFK&ZC7l81_J|1t zJk}yY%ir)n$3x4|wpUFAVNmfkjpqo&iJOO}MjfEiu3)_|H0e^_vA3V8zb%+7YsaG0 zj*f>qBaUXDUfU3GrUQ~ERDg#nss_cAj2t@}%;5NNindK-ERyF0agpBSaDXR62rDJo z!0bS2)44bIlUuoe3;jSeoA^;z7q?wygB2n7=>TQy7&wuC;>x=svZ~Vi`=Kq?UY$x~ zJWS#HI=&%M2hKgp?OuZ(n`DCHFB?%`8STfR9#KW60B1xAH(LGoc;bh$q0Kq)T5xog zEH&i?y>P*SI%NVDx-p~a3zG_QLWJx00aBd?dtzsrzoB)*O(;LfP2i916*j+lLHS}J z!wI6^{yu^p3BE^xoEByALk9Ph-$ld?T&(fHg~)oy&8B*TXzmR(Su@0DDqnP!H{G2u z%19dT=mU9=x(^)mi+i(yZS$O|!eI9Qa28v*Dg}WhruO%MVBe>Q>%i}_hM9uCS3t6< zLBh&!R70Ys<4R|T)3jaon-8bn1lkuG)MMQO%h#Xm(|J(wFCuKLqQug~2#LZ${4-;j zyp%8Z2ocr_Lu4`DEH|6AiglaCem^)MR7 zq(MBf@kIV@`?q{b@?{-eAiPkQ*MEVQ`_w8=mGG?~`;W8tpsdsF@Z~xITj3PabuWpu z(T#tfg-(KPf@&cu;mzg&C?STi@>qG+xeW*UaaQjrqQZlVQ^gH$itY@hi{;BgKf+8%XZMG$9PD~g-s)A_oP4xDZzL)6GE&@XEM@hfz16vm)= z@5KI$braJTb&|+fX?9O+KUd6SaN@6~-=EoNbMity30XuqH9zb%-5A)S(1c2mT5N_h z?fD3TwRx2OJKb|B{f;iZ8#F1b&?b(7i`#h`&Z1?@(tg^T_wd8g+}ylJQ3wZiRpLlY z61}5AD$2=0ePd4BM}7Q?lHWTSQml={9Y^ku{RxRH_Xc<6n>jA#7f$Rv_ilp-F@B!q z_wq_L9|{&u^z6_4-*WY~Ar4O_SmgKoTNK=zcz|>@}9yZ^ig9(G6j+x>O4!ykc6cW1f386QD_*+E;oy> zqyoEppg}I*OCZt1k_7q}GkK2}{y%-m1Bo|a$c=YQ;?0gydy<^z_e%P|)^4ck_yIj`6Eg0%hY; z2DogeJS|9^*8LkjJ)~rD>$;L2r#nNbO*{301Y?mMSVcm&@S8`D^cVgi&;zE5-AAJ8 z-g4gaVCQJZ;}4(i!Rb#uK^XsKTa;9$geJC4qXLHqD9`tWpKc?`18%}_6p*rcWj9+y z-~>OUc#O}n@s@|0r z{X5?bBN&A(s;F?zR6Q}It`G_olKx|!ZiL%l2&@!RE#y|QE$MG+?`ctjxl2{R8 zk(L%|(Ss311)blW`Kt;>PGYVhYY~tZj517PX7k0-U`l_Z7<*kZ{6p*)d577EsZi{H z#S}ntqII_YCc1`vrxzSav;-a%o|H;)IQd>we+u zy(JI14brB;&5o->)a&htEIm80Y@1HczI9{|I5p0G3PnIq{*%B{H#xsfN`v_=ODrBl zm^i;PlJc}I{Adc8qw;fFu3hINp&*3O**2?xAF(uu6mh#~Mk3rS2)W!t58P|q%jL|23DCUwg% z`9OLV+LKwPE;7iIu7sbodRse$*n2InG_?A$C`1idMbZ(hbWSOPjoHjnQ0>`F{1r*T zl=LSltGABU$KQZM`4egjj`5IP!72cRUiVg!gV7aad7Y z;D7dZ!**)`;7%=8+qQ?5-(E<9u+Yp|A@g!VU!q`4#zOqos>35%w*`geoKLy&%MW zKlJ5|8dL)MvgW-VmKxzD_(U{>9F|aVT6oZWahQt;6A#F)3+!3}U|2 zEevaZKMwI>Ght&d!M*?TD(6m_L=5~wEFIP3Gjn$k9jnooZU;De@U#WPJBw0Wy{su1 zmf5!?1ck_An_YCrdQ3z}Qpf`NOOtZlX|aJd2(3Ah3BTdsVGeHRL|O03@K889QAe}C zgacVrAO|dH15^VC(}5aUpZ;GNZD{%#nx{pbj{GA_Vj-*3==HAR-^aYL8mB9h!pCEv z!N6Z9>N$*Zvozy7@TRypK8@pK#;1oQ5ZK-z+i==AY}J+IRsrO4S=V6uluP_5wWiKC zANC)uxkk}^Jrl<s;<;2+SR#pQR(;>HgDneorVOvFY;4%C+}i z6gE{XnBU_ER?^kg74SUaCFkLWrqk2h;-Z$me)WveY?*Ql0gKQo=X1e?uXVPsa#7$( ztCe&L>W2t%wh943{R3Tq1GEK3x~m9c0r$ojR)k;k?6G~?*9kM|BP|G{7$ywPWmjFs zz-|31MzrRP6$V*ZwRfQ$gf2Mibq_EB@y@A#5DGxB6&m_+t1elJ76+o zFB!c<{50_Nc_^F{>v+uE-Wy~}BXkXMm#zZW7jLnGAN%`a6OqTm5e2^dh(FsMiGX*q zvo69yGsoiYMw zNJ*eRs`^3U8&GsBl#Ia#N|Ubp6L)uaK!vzZzxFRo&>P88AfGr`42ROA*w`#7>vhW@ zM7tr$s(>WG{`$>nN~gWzw+Pa-w4ojowE4Jqlla~7-EHBOh-qTh-PnTUSnn))Y1Kt! z^f~B%4<(-!gqMMlET$&y5ZU;OXozAmR_f&vCR^UP2mPoc1f`^q-8CW^nS*b;?V zMM##tH+xAd%mDX_72ZS%YF=RXg>WD|NUFXF^T2F{CyH!y8rh*=Kbj6Vo89R7gez-W z-%6ac?C0hx`tBr2OPDQxvc4Mv3dLio|5C-J41(mWS|Cpv=b6v9_{uW+9=fQeJOvsB7vE1d=G}0LAgBRks;= zKd1RBZBRW>pzcg-a@y=|YHEU2YZU)*yz-fwgQNXykT|jp1dJqIE4T2pOPiN)3nA1S zxDVEXVa2j^!3&}HFuoLXve_tkhshnWXm4kuSSOO_##sm*RM7^Xh#@2#` zpAyLAGuR}3&^~Ilc^m_rZ)Ix-S$8w{w|o!<#)krU z=a>63N4szAi5UlACn+`XAfaO-g<`eS(@gpH;wP^u@Y0$_w2ISmal*d3Eyn7T_WvNFMPo=PADsk***Mbb#O^?n>xE&}i&U%q?+s{G?w+?HMTj*f;cEJ^#>S1LaV%H0z&z$f(p;rx5tg9w<>6e1-L&xIws7=t$MsqaRTj5n z=i}Yc=$9{p3FPaeVmdlHH$UlYlCuzt04M{X@O^sAl#5;x6T8aJ*b=Z9RE>y)Y#2G5 zZ}fy79Ui)b8gMzT2>?H<%)X^pSBoD_C5y|;kvS8}4}g>pMu%PSP4rf~D;{>Qgi(-W z0U?5TPcx4p712f-d{}C8&SpAVeO0JfzvqGojhG1Rj=5=q;S9TqQ@Cn0KAt74>j?eT zeNbq$5|GGQW?ypX@#nQCQVId^0jf^$y&B9-)gSY`J9oxo9^xNjLYG$UBN^^Z5A=qw%0c{UOxW*iAkZQw>t1%(_m?|5U`Y!g4e5n{cCaEf4p1h z3OK6%d{ra_*bD&Hp)-t3lU?V2G!JMKYT2|4wyoQW%9^`{z=s80hZgg#{&$wy&VzvQ z>AD$Ui5|vL6u^elzsLt5F3dWg-beuO2}udzm|*}Z5yD#x3WR1h>K_zx z?hKzU4Y}9-T$>iXf9-K{aLA>zK7%&|Ic_s7bFHnctnBRkw%*ZrDV=owKB=tjY^|!Y z1HOkC_>@Og>3&w2w6nLL+f6ndjMe^RH4Q*)8oPg9c}>Q-dI~7 z`LZIqd>6RY_2B7kj|brE_wxHwdS+1Z#B~k1OyrR8(VoykA8=VO-Yl4L`2>l$q#3Nz zI2^$pWpzfe&)YIdYOu!C;SEKF5`%||1Hu@*;;prYi7oDTpAM~~hK!;xD>9oO)~Z}N zre&cA-(g;Cg{p}W%V`Oha*cvtAS#!xNTcilm?8& zBwbv$+No{0&oDUe6WHAlyvC_97jF$!RFXSJ+n&K7e>?L41PHnFC8v!VpxgkmVgs1FyuSWC*Y{-PYoKG8H3`Xrl)8pS^fUNHWDS`6{rmU)o+mpBGk1U? zwMf#G03`7?U_8= z*1&{C&k9QXHN*M+5!;jV?Y5yy=eS|sQ0)7unsy3g|H}AZuoYOsJE3LT^%3szC?jp+9KfCZBGeM|KK;bQ{-Pu4vTlwi zjD-Q?N8)3z(nhemg?C~;EVp@GAM)aIoGBBbaRwvrX3eE3E31r`RrBZfFb%BBu;u%M zg<3u^GIX@OM%Sq-Z-1rEShz5-S~hoVr5uRlKDls|1Hhp#sdV=C_M%Y(z{-Jr{~(v~ z^|ydS7MDHBMsw{~T%4!M9j)B1z=x$@vdQ{WKWxxC>(5YRqv9S?M z67$B}`}T9^B@;GKcu;q85f|_4divdk$Z2hDt=;Uj2^ z(k&*L3leq_VP)QYO;O6_95X0q@ey)EJ30Mv9`pS~xXvoB7~3;UH1qEoJZr=!yOPj9>x4jhGoAFk}Q> zuLlZ~&k7%EcFejj=r2rWW;^vFZ>7x~M|%8NR0fp8a*$0-Kh&4A9w*eBtJ80hKiQ=f{+AKpmdGwY=@>A|K3-fxrtYOPGWND#CLR_eT=f^c&g!`X~2e zjxGFsXcHrPL>?q@Y=sY$>q)To$|0BXZL`OFSVqjc?PbV)dTBh9ObRb5=kKH;?``IHooDiKYiJJpFrmb*SVM|oO}GLc5%osZB9%9c;afl^gx%2^ ztnvsv#1vGzdvcQk`Yki8rLo0;MI^WX8g9#=S+i5N^qxU8?fv^p>x6d+emhhTRU<$e zqPFYt4p4(St5?(=3-P4<6_u3$NB(R*V(#!b-RJ=nHefJ=N813*9iY$yG}I-8u3IL} zF)PHg#|5i;2!k`TvKSZ`P@;_m7+PlQIQFTuT^{A*A$JfA4UNVY_BkDqt;nmFub|?gOY1a;QV~vj zo%Ke`ASy<*6_yVd#y)xlL@joq3)f=JMOUo45%cDs#|^&DeauLQel3PBiO#o53=!Bd z2{MI)t14Q@9ZHJBkTi}X&6j^lkK43B*u@?~AeS4NPsqb4MI@tS1szD;V|RoJfte`? zaiDl6a_ZBLNzY0Y3vBwjq%{)DKa;vy{ww5fbpnm0m1)t)+|8{{q+-G>0|YjHWR)BQr%qx+{s zpw@(tncREJ;IhpiL8}ARH7}=}PsI6^5a|WvBOWf0GQ%SThqL8>pA0;luL*WG_9%pV zby&aiE#xZ{KJ+JQ=4H+po-I|nQ(7oPER}BV0}ch8o>$RNy}x(5VN;xAmUQQ+B1pba zT!4IE6)-(Ca}!FPy+0Gjm3v(x^|q31+8QlC-?*U8r~pWVdKdUM7dN zing}4sc8|6xv8nCq~w68&OCxSRcHYKCj}bd#V#x?*m^lkMpfPVa~^3^NbLZEyyh~> z)KbtLDG9i?KfDYGGQF%8V)>*nr1*qiGm8T#ahI zE8D*=m2Qmt0)}pij89me_#n)5S^sL3YV7lj`>YAhcuOvqvpmYEI?5S zBr2hM@5HWhTWFmsrW)Y#ad_f)h6LmeoK`2WI=2(NgpkSJD2a1CA!R;A>H|)8O-+r^ z)BUfktgL6Gx7BnZ;66sb0o;!D$K&-i|Lbpvrv?BV8IU2p4j*>_iwzjGXZSuzckk0V zB%4II>u#>rr}OaH+%;Ip0~>LI!Zm+3M9u=z{p>LQfFFzx2-5TGoqpbqhki&LfM*B@ zCs{5|zWqwmyW!y^ss=;*)#kJA1xBF4ToFj$E>PS3_;o9wZa^6$G^V7)uARx18RZSa z514aVI+%2E*#U4y$)fhEtlkesR)`=MCBoMolPya@oDlX?oX|`Sk?&!_gRN!eQX)Yw zKT}iW_S;M4OgRij4ILaDY#b6TlPlD+NgT#@ja`fNAc!#JleNaIOgvcAf#7LQoAY}Q z%7S1vrw}K=P0)x!y-<4@IB10`Z8zW-dV;aIni1r%PStC;u6PgKIkCM&T8QWO!asnl zgQJ~YRZY#~4R9w5(Av)#jLE=9S75(@d{UMS~H zI>PH>%z;oGJ{Ywmh%K;YSnSd^@1)_w_-f$oXGSJxKOK~j)#3;`Tbp5O4eI>hQj9UdX z9uh?WkO5js(X2HfEjC{JXgZX}r0dfFXFrk63ossVEECM%Z2{jI@VNmq3ka^RE-}l( zk@m};ufI7%{M7-pKJd`r-~UQo#MjqXU!U~R3jo1K4|hGRbe-{5YSzwIH-y?YE-$ST zJOlS4<({)_8WP3C7%E?)ccYK)ax7d?&meS6{Oru4wKt-l#iq+hzQ+(e+|bLs_~HE; zx88dA3iTAS{^5v^E8-R9IaJI+b*Q=J2Jyq&1Y7^+vDG(*tIP!*M`4TD3n8Q}4y^n{ zTd>QfQV_I<7;@`zG|LfQ1$`X^J3gzCnzUHQFQNqVIL7j`bl#BnV3+5aA?V9>rJl>?=0tZsqfZH%<5l_tR0Nm4n z7zW%5eNcT4APbZq?*teIbsQUD>#)T!k&@T3T@}CMUj5Ayj*8RxM1yl9Uuok9|`vQ9tq?CCG_C*22SY8 zQe`b_UYtuee1l0f`@+#FjE*A5K7!wjg+@C_if1}+Ha~gHvG%QxCzQ9_WP9IB!(*p- z;sB)>Zj%`P!RWy$Y2!Pn**9nc*7b38a|XDf;M1TJqi$eOW8f$&D=U0^1Eh|$nw^Xd zXUKl4ro5Kd=?Zvw=1c&6^TPUl*W+caCDS2rMaA)3Yhz1GOJ}En1fWP!axyA`8#V?3 zx4Xi3(+Pmbh(`o?+w=?!1dLj&0ry@dn|4w$WGGeTbTH_j7$OHjAsOemtu#AQpP9m^)@!qusE#=KFK*OVltB?sPsJJ8G({??$Mu z16fJX*Tuy$e!IYjBSYa0&S#wNp-lL~eg^wbj6kc&mze<%s=mTbAp}dvHydRd2vnsa zOf=3*9=9dl($YiEH4_nIl_WH{pcF=G%WipC6tf?uzp=df$9uMD2!rJ`^ILs=olxF#4a6yziRb9o>&?-+&a8*Dz>6p^J4!P(f& z@EQH!WO35hG>|}1`f$TykjU&dwEo-gcEXS|V43@cznk0tfJJ_%o- z#yzYkM_3FKuYyVMyQ6bNFG*JdgPeA(bSR>@Xwzhtzxvw8<9BD=qmWG@zunt_-jmE8 zIkBkYmztN_o%&i;glxivd;0~;0{ISXaOzf#dWEmk@dvg)Rfmcx0;n&(&XK$>4jfvpQrx^#druo z8KU1i{WzX4v*3K4lHj-`CQC~MvmJiYkFQ7jc;dVv+)0qy_^Peqq*eiSDy1A(Z}hXc z`VyB^+v$>0FXt+U^I7Q_w;rMh{Vy;p(rO=cPg%IXyClqaFw=)tUlCwyaa!WhM z)Xg-Eh=_$yYC^ujEIKE_mmh<~v(y=cc-#BsP^qZZ)(xppT7Fa+!RjMI1y1m?HLRW# z6_N3C)Imn7r3L{=#?9m#e}MHB!iUCmiYJd>O|02@@4cu3#oqGcvLY42Ny)rsKZD?d z#9t2%slZS=4CH}6mRxj zP(s7;%MJctI6A>84QH?i>S!hlTB@1s;&gKtVpqM>C?|5AsG1R>(B1j(P-VN3be@tB zHi-oANz7m>h06Sb5?VVG$MvPOW{2()6z8jB;T|ym>l(vlU7$g3pdGdIRHBL&eL&MD zHjL1sFHYc3b4oOmP$s89RhkI;%X<|Rqms8CzFtAZHORE|B|&QPvx#3V2AUIBOlZHP z7}gViRzf>Q;fX+%fTx&Ep&P$ZMyHV7_OsQS=yyE86ZnZi`^lA9yvdn&mT)g!^%C}j z)rPB*cvJQ?lbH2SCm~uK_$}8ubVMJO`=R$$oA$%8nB6a7X+ST(Qb^p2C7=)rT{K;O zGbDpR3q4^%P>!9ZeXU`_o^w4w5vAn~r@AJH} zCo~_(*ZBbckZKqq zym}+gsdz%Nfr8e^-tX!+;VY`@S)&z=4P1H0S(A;s%+)y(Ya4Xh~g zSP**TR5?|>Au}gTSMMn1@7km@MU;Q(?;HI0ldRyQZKaFS2||}N@8z6WdDzil3!pDe zt?ChXZF$6mTC+0oNu+8z z_B3e)dflKvXHKi4IN{&N6Vsm9n*{$5cX@2%WYLabnqd-b z2=Q071P(s)1sRj;z`L;FYR%BRHMBs*wZ+;%^m(`ezlgX?^sCQ=Civ2y;q+doFGV-& zvB<1M8Thf;82W`UvEBKzbh$;pgf(fNfIWe2K{UdKhC%Kla%;u~34M9Q=l4P~AE#v< z&fwugFrF}77V9>J9Eoy0+?2S_ApzSt4Ar5*lzB+k_Y?PhqB1RO0q8O&2a64Nt~bNU zpl`u))x0D7pZa9FTf^v1AU5_r3++dT+3|5@?-{b|qBUGYSQt2tsgp=7Djf2zlJ1m( zIByhI$l@0)XX$rnwRYD6)v%3S|7;&&BH44J4^=UTAZEt~HciZie{-F~I~Afb{90ew zu<83vcUJ_Xti%aY1W~~>!1nHn){}lNy@;`q^kz+Ob&HeNJB<#at!N%Ec~OGp$Y6Lo zy-E*IaWWF5){_%JNiThjD@h5I%MX%DJaNJi!F`dG5+vyMUmdj^A?Vr~>J4<2H5C;H zATbJ0COSS^e7U+2epBA>#$k)+N=9SySULy`T^jPTT`s>w*H<0m~G zuLJa`L%AJ8IX6%2X)t8jIq?Tqe$bPV8Fah9O3HzUnBMcYNXb||TwAPpO8x5EzaUM; zm&%;^dcELfFIXDE9b7AkEPP`xzR`g~hZQEi`@siI;X%vN2~Pa1>(zju(o?^R?EwF< zjX~(&AS8!KtnT}XgB0m}LC0-S^;LXqZ>b_0&lWdu%@8JT_&=XG(c_wVED*c#PZpQy z)#0+|<^FRIs>N&~Yq{0+>7vSa8BDjcL_J-=CiwH_smW@t^0{nD3GiM}?!g(_6o8j4 z1PMkjqh*XjLNkGe!0KS7-7}c5{^TIabL(3ZfpwHz%H_0bQMZrvzUt3;^t5CP?k0}8 zICvz1SPo6xichp=5~FGqb7Q|lsG;&W{s>CyA%vs3nK@^8zGLL6;ke}^HC@=a%!TTo zo>s0?M9yfbOn4~I!^bfo;sP{=-jh5A;}2cyXsB$b=o*N4BCnAxEpL`aJ~VMkUr zL7zV-htEl*cZ5_HzwJj|-9O#)4+8%I(U!jI#Bu0pjy{GgVpcx98yJf~Ppg(N-|A`$ zl~aqzo@a5ZD=)jiY){~OB=enwA9z<#UxHp(v&tYg!hqjSx+bgI@o`)m-Hy}GLYk&| zmLw0uW#9aiem1?g9}#}-zV|a2EJ+w1OWwdQG6h+glZK%^^iZ;;VW;M=%lnffq?>4y z@Kw{WBrQ9gi%39t&|nEhcO{n)=f>jBA_icbD1?`GNwO>?@zV4bBpc6VctLAqeD#lX zA!w$7s@ZF2{M*x=@6*x8kDzV??dzY+p#Sxi_ixTD+kc<0^lDG~zJ`Dc`sL;9haha- z9RAl_kn0=0O-A?$rVKe z({tY@^$#CFL)sPeEI<$S;B51`l`}H~W+6UTt*fF4&i@6^h`r*7y3nZk>An}{^7cm; zuru-sF;pnK3iqyK;hk|T_GENqt5^tM)?#(AR=hvqLG%)S*D@}l&*MuZ3qXt* zIkZ|*uhV}-ae2s9=H|v}T2`zS)Nk86+n4ER)bcTmYXzDx9fKdiuAY@Gb{w@qw23OqX-MmPd=gOVy z%YOlOy6fG$bp%2|uW}8YuP&sYT#i;S*{7*IL(=@X@pN#D5!ZLf{Q@>dX}eiAy2#*f zi9I@_UgnCe;rby~$Kt$@;6lF46S?ZS$6~jTcYlCf| zDSK7Oge4k-41a|llb1){LfdB@VxGCNbG3b z2F9FX$oxYZl$5>uLh@9-Dj=G$5KOk8JwsAP@S_s5vSfkv#C{S!vwed_j|>x13?+qg zyBNNuFq3ugCi>?7^wRh<)%Xms@_l~LShs?8NeuGOY$OY-sy;C8OU@EXHepcV38q|3 z0pejy#Fr>vHbQ>{w!Pyv#a9f|yJ0664Om1%Cj@mj6}1kS27!JWxX7M=SMe?_EJPe| z1)~y8&0@PYaOnjT^d7CD|5Ye@7c`Gr_hZqRY*x}Jtjb+vCNyrwgnwHw4+0_ART1{E zWAa&%NMy)-6vA<$b>U&d);lG%q+3eSz^9w&8l?(g@#bBz^6 z#II%mr=A(HIB(H{L4LZ)4Z~E%FdKqG+oq)#gXl$gYW!;yCasAv9S1&ZHpv8bnbb@R zNp}@-lyP(4p(}(&S7-3s){S2%nkt<`iTx|3e#U;}$~vFd4BPvtVeh(kd)k%ntqDX# z-L54rLjt6QgoM<@(>5U!PyYFURx)_l(*z$=AH>ePm8*{Dc8Sbvm4PqlX;2-OQY`4S zdo*yFf)3UHV4QbHQWu7=whpjqjlYo;k;J$jEMCMUZi}zHh0;a2LOX}e#4(E3V@KWX zgo0I(g8ZX&Fup{T?q8FpVo0hO7N^+0WG4^!1u>x;C+0g>*0UEePrX<+KS^|C&gSxb z!*IhM_w|d#G^hNh%pzuJR$#~H(B$@&H8$~%nLj{R?ngZ}s>4NN`ni!fmI~!@+ftVZ z_UG!)GNe~|2=&3Or0vl{=(0V?`6Tm~yOyf?LNG`iz-O!i{vEZo4!}9%xf2YY2bODLj2jSdJT-=u1AUO4<_nNV_Vk%_1rP+y zytC+k{1cM$(3oG%87>)C`t2-y|g@ z+8>FXc{lOj1OwMDT0Q1hW_I=v+2O8&qldTs^RG2?5EwM^^X9*{7-HnEVJ-(P+*a~r zZ1ppnQ-nbRhiH(A<%nwp5{3P-jb-XlODJO;+}X(<>{_SjFSbgs+XYwaEMxn8@EW z`rbA2Oo%vw0k79RXw^XC!|@m?_tBn*0u;e7GdrGf{7mou%--t4fIh_A8hixS$3J#C zN|2Q}wGh@H!%@00#q`HI{BiI195mMSo5#?z4R2wEbcw>zmrMjUCJ|{^``ISRN^ld9 z$$YcX_np|-%bQ!X0i^f7K{ban5l;wB^Dk8bINRf#DLCB*pV6J1>V^Ou6Dk zk*6XYJw_X*nK*~DFfqEU9UNA|XlZ^BEr&lTweo#xyEGd)4KhZOwH*{wfQ}U1pAcFu z*)Nv!MH5?<_oXVX)+l*M>T-W$;X6@3YDcpCQWILLC|k3LNCMQfgxu&1a{N5e9=8GM z9usCUZU@HzOy(w1Vj?AshnE>#UyG4r@v#YsB2Qk`lcD4@ruyjyj`XdPsd&atdD}$_ z2ra1T4THw>a|aiEJ*ejzOfOBEWGu1^NC+@MAmRspvJ8|k^l4qoVgqBr^Lce7WXbU; zjfB}gU9I!;Q77;2lZ;@*uJgN7ob|p;X4$Z^KB`qr52;SG4%gsojbh~uSqF|%&?Yg# z=Y$}`td-MGBv26mtpf@#Ul;d@sPmz&OG7h(7rOl)8RTz86hG~#GW~3bh^{jZL@Bj@ zWM3HC+t(;#P*C_>OJ>$!r9*xd;a~V45_r5c^z>Pqc=}&zDDfG>j}jl(&z>WQH8NjL z_Cb7&PfHoInk?e@&Wi^(b%Xcc(dej44n&!Ym2`FBGbxV`FB=nryqR~M#x8{r4`!lj z%KLY3#Hbp!JnhB99BXk({cr7TbLk>M_3Mv8_K{-i9S!5jbMqL7j`sGy^~5wWWHN4Pgmz6b1><%A z*vj3nuBjP02qxU1P~kW3MLB4Em;ZVz1aadY%;f;aJ50>uc5En?+urUC0_1J7kM8^T zJ?R;;CjY_9ppzdV|NcGRqbXwX^Tng62x)72W~QOBap#BeKn%t6+yl55MU(==AP{83 zcDrwHJ#fBPRqgnq$rKb8_7T?sPbBN~c8f3tTN-xeSGU!ZH_vM?7mN1rb^9=zQHrHS zzyLOp#Ah(@i*q_(`H_N-S~gh8{`l`7?X&JBr2fO*7~ivz z{OOp=8(Lu4IVtdTc1?#`w{Y#mN_d@de*5WflkpOg#Medj$*$|-e|~U1H#d~RX-v5v z$su$9WA>#rz_7Xr($45}4|DWt>>CV*EX(}PZ2#$5U`qZ zUL{k&9!z1}@=%J$m=-p7Tr*11u~gBm~@W0CTl_ z0+_G7l9m>s2N&=S7y;D*V%yZ@{8kU!o z7@shp8E@X~HJRO_HEfNM#4NTDv~D=HxG&>~5%d!j$BPWF(fc4_WYIXTj>)651ta7MmHj4Hyo#xj({ zbER@+06!-VbG3#e$ zi@9viXC&J5@R`H14$o76Nvn!c4* z;orcM2V<{G_o?SN;hK$0SJX9O;q$oh;spBngl;UTJL+@h!w}3s2Zbs#HB7GS@Tf0H zP}E4OaME^Axuv3dHMFuv_>ZWpZJm!0I*Tb~7)Yt%?BZexzit_5gV#unVUVjuX&=Iaf%lc#rymJ{b4{xK zRSV)b+o3tR$m6D;KM~f3`c0yQa_n-WEJCaew;k9m!9(3&U2-kc(bWYT6Ml^h(C+|T z14OA!^H$2*J+K}Fw^Bdh52QM(8X76f`yLS`1Cy(jA>&#Xpo53Wch9jehnJ>DoUI~qlv2upg zm_Fs}cmG)8NwU3Bzpyj^A5Aa()NMGXGVHsNW>;~9&|RXe+-71BeVN{)JoHt_1$`Le zf^QC?)lJ@0-K)S99Bwm@l_SacT*5O(F{mF=jCg4v$fB3d{p8%TP)jCCA-xx`= ziZ4RS`rRaJcAN|U$Y06snvS0&`e#1+*)!lK7Yl^3i~HT+N)PBhaBg|XWXdc8wLza{ z8O-wmtX3hFq0a&AyHx&|eSS7e3m^O$j9zEJob&`H*0bU^D{akyApG&;5{AM2&r!(e z*H1D>$J)=+cb4=@B8~K?H1{^1*f4{W`AZiNRLxpJ%-=kCuh`{&;31Y%XeKUIV zvi(HYEqC(cef-I|s(FwA1{!x&&0QF76p#19fUMklOo|%ySr=C)l*S)+@m7UyKLhCp z@8Qo^_2W^KeLHXyxk9dijSf^Vw!&%efOpmkrMv{|8h*lv$CJ2GoPw{{D=~5pU_onmp7@ z*${$_yK)RJ=x%cvl|{CZ;zDGfii&@*H!K+{{ef}E04gjxQc_3+4FVrA*10eAl5l+- zV==f&tug1V98Y0=D>RL`3@Nw^>r1ypF}wQL2h($r#o!aTQU}2}DeO+%E zzYv6f_f58#?mbc#A%SA#X=mbh{8!7RQg*DgM}WMlLneU0f6t!^j4f;Xld&uT*sY+) z;j0|8Ece$kVyE%3`)8vo|6urDyxim5%XAzEIB^%%Gk^>f5`ZIFS*di?ipBSUP*DF4 z;Jyi8dv zXj0UxNV-|~7XPXKcW8#_NnPqV^Uj>P!7zvwepDFz_|AqAn3HIgFN)s}-sbEAg=MG; zg2>Ax)u=b|3-|(q`4Mm=>}>QMD3m;t{z6)rs@lPm=%O(U8%m1UFX!dr6d~g0!6d(~ z-`oZ;yzp81jE@N6H^Hr|qEhO!R(uxYrUAJlHbTg9{Rofun13V?!NC*( zbyj9oMe5t}5`Uvq4}Bq3VM zZJe}DmV9V%*7+J1MIk&(><9$-Wa0wAe^Q7a8cbF~FiU2CQ%W5nT~-V|yAimO$UVc3 zM(d?|pJqMhUXMSzNl&nigVynZrk!*{eoxKZ9to+4#f7{fbBP#!8gh^Cmp`;GYRc>Y zWB$`R!r8hh9ul!Ni-0WX)3aGIi}rEY(b5R(6Ux^iq~iW*ILJk5*Jpew7ksPJJf9B| zq8Nm?)E5b_`%q^rLP9n30@E+U@fb6m~fDO&@I+39K_2)aa}iE1cS z^tl9S$MC+7a-sllqCNc;>*JJdmgNQwhmOwa{nc#eDg)^Se3@P`iJm29-xok&$srV7 zAu_TQuai?#K?Q}={SI_60F<5%3_M>$!sS8f1bhY)Jr96&;5pS0xaPsFfy@t1{>AnA z->HR6;8+=iWT9m>S7jg$`XGQ^%z*z6*x8nei z_ulmP>#Mfr=5*~kFuTv^wzRSWbNETxc1ZEtZ$cl)UfDxsK8+@-h$%Ey7|9ko4H2x|%y?x?rDoSL;;pucj$Xc5!^UQsVggOZ*er z7OeL}|DtAIX)eDiNZyi?P!I3?jo#R0EPT=9txgZd?O!kQip-JS)jigbh+g{RMp=!uVDxU|emYq0?4{7_ zMpk1N6>hYkL7m5IIuB;^R}2Zca`;OWZ(pY$mvU*P{JvkuJwzLQV-BhXYw=E9L~&*o zeblRUY+twRVDp3q%9Pc=`e+Z7b>NsxE-tnJZpb_9rY6=~iF^Im!!)e5y!!Ndvgsos z^q1qfpqzBvt7`#%4Fws)1?6lpiXEVsqW02utlKpU=F|fYr5|*4%gU_Z`2)!zaFzsV zbb7sJNtv0t4@C)|u`Q~ifFJ=L(PjhVo7E)mXose~HLot;dP_m%!`>U1u-+ec_1V``6 zO=oSFz?fm2s(N8WY7EKgTi7B)1%}upsB7@YbFxpoEY$*VFf;T%FDi$coZKp66X8>n zEJA9+yW``7-)IKIXj~=)-f{}%!*MbjDWcyjMcIUWY(=m5RF`y$K^>-npa|o>FM#j= z4s^!_X7xVgk`IMPnykh5nV-H*pZnEAZc6Q=AqK;ganj%1>E?hEq>KD5FtFbjG8|*7 zz#O-r_*yy!wCT^y!QA2b{&wl6s2Ew~@Gn|Z$o+H^q}+d1onon0pfk$l`*;t2e6lgH zVVK*r9?8+6C36V0LEbA)_tz(1{cW;2m&wre8mKVCBS_Ooc}$~7GuM87{Yv`E-fJYWb*PCp2)KY#JI!I3Uf{(if+4GQ{y$Xnv7Yd~;)a{$@(0v54LC8wtj{ku}ougLT}5ht#|Y87pZ z_0{ssr;k7m;1c!2W_kFvuHv?GmF5@GA&5W^8(tQsI_NEp;R zKr3A2B`v7M0f@E%;@rYW`-?kme{drO5tI=m!Dq8oP-;#4+gMuuKF1>U2L}rwF|`xJ z>9H~%dek3HHbaJ0J6Kkvl3hu8*5drH7G}Bbu=Pkx5$YV>3>xp>8-6r5FOcsBIkmt0 z_=pw{g+h6k$+SwprbsfircCb9=Q>;TAMCIO(S;pis!1T654m-lbcw)Pa;1OJgOxyc z_rHee{dKiCKPljx9-IFAxLXYaX0JbpQEc?&5POV@arzs!fnImNPrVt zbMq4XeWoE#zle~34}5^Kp~h_MClrb365UAz3a1wvQ#hOIlTt`^G>ODa7DIkJdxc59 z@Y(jHn#o+L3;Hs^q3{A#66x|@T)}Bp+YIn>-XKvlF1!2zZVWGJTlgKcwHJODDtcz? zTmvna2WZ6tfE^?bARczuPB)AAlj07}*t~5lh-7~zCsp!2_!uF!NnJ1L~1x z#_8#4z>Iz{SpEEz{@b?$g5F)mF+4KzTq^B%DnF}6s*T`155Q#^MF1xrgl^!M?e=(o zgS=tzL*^FWmv#1czXNSTkp(a{T&d&1tF}jR!BaGtLlT4AgS)kpXaDF3F9U~+ zBRsQSBuQUks}zuZE*10#31P^Ta$njBuX7ezYJFK$C^Ve#JgUF;?;s1@FIp#No8fy* zdi?N_i^feS9d7DhiXz9bUSz2%qy*cx@z!Z{gp+YW4td&*(^2he2tssHAu1BOev56{ zKYfg*js=n(o7<)bogF#ztx&NrL_3%H& zw*4=Vl!3GXnD2`sa9qJ-m0Vg0#1<0();FMy0e-iBkSh!sF2O5KXAmQI6DhmieWC?y2bfBLHeJ+&Z7q($a+uGXl@}RT2wtf1yI#PhZ2e#)?;-IAgHW!;gM_Xv`0f-3C z?%C`TRzXOhojn1<=gQ=yUlmY&CTHzTWE&V5U?)_Tl>s|%W00^xfZ_PCPcvL7zSnIz zd=gvnCyMlu&}Uh&6jlOqpV=dYcPiJg*}IjGxJ4ZUh&EN)N>Zgp?caT-w)-S?C#XtB zt2n{%T=a=$=-zMzKSNu;xoPfMm^Ajx3eapv|JG0l?6L2W7D zQp&6pyd4xYy(1Z9!pAUV%B?yPonGVR^SgmXYTWkB?egpE!~U^tB!z2C!@t~QNQO1k z^U-Y)L2{P4bvJ%n2x$=J&pZQj8q;obx%yJfGm%;SAb zk<7tO$1?#9^a_&_W19xM_aFHRkXc$nPxJGz{GAXf2as6^k+E!SpWVpc1~bqCrrOv8 zfSu?axbZ)J@WmZ!n|+&^oh@orju;t^veWXei!H0=pQ$JQ`u%MzxMP^Brg)SHbby5l ztp8cw+)QGd%_}UI&7KWh)Th5c_n0DVeudspW~rP9Q&x!ufm7Fj1%8?UeD@y_5oiyf zxQ*zPl3Q=e;sYh?ePSW@lh-M1YJ9-Sz%~$X`jU&k;(b^waSdtL48qkhijpL_rV9&w z;9U6upY~Jy378Yf2^>?TuU~uf6T=m26E&mjYV!Yu=+O1;(mi%yEN}&X%B_f1WMsr~KY6-#ANKl8VzjP@?Kh4Q zEczu$`;qBhUy6w}lmwKVmu@@bX?+Dh$yl^}naOmMp`FX7saPj40wlzt+h%06o5x(P zc}g}pCxOUHS&0>l<|QnhS1S6rLh9koZ$qgIMJPv&v^fbHCnv8p%%Oxc>;AB^u-DhG zp`l)OEN-t)5<^ZjFHr5hIHv-*aEE6{3r0Tl(cdSZe9_!ir`YvNi;Mx0{Q33EU;kekMvz;)rk+tQ?)&(QF?F8} zDhQ=rsJJ{sMG!3tT~z@3o}d2LcS)2o772|+@Cq>d5l49WVp2vhQmW(gmOMQ_y~0ua zd%xU`t|OCsjEqLpNx6+}F+P&Y3?Y1k|23&8`R(Fki!?G*_JNAxUV%PpGtWD>xZ1Dz zI8l)zgveJO3~H8~LZ6oUZaNGNLezN?a#v2Foclwu0E>F1v|9>i+g4w+7YIJ2aCwJ*Q7=W|W-8oIwN+u&Pi(47_`T6B1?A z-wAaiZRXy^Q>q1$s`zvQtXmd_DDu!3vVt9p2B~9g)u{%6gdHK&q!+1Y8w|1f< z*@4Hh$x6K0ilv|Ws;o!tW=zbmlhJ~x-o$=6*G;TGNJyE$*m*RGe33@Rf-|aF`ucE* zW~sddb(he!x7_e&;8xXv?4M?~V}n;y!OnO0xu^o!wwAl7j9uDJMUY6dZ`+_>@qb+h zze`OZ+}y-|+53F_8J?i)#W~@hmJe^6lL8&w8hoH~hj6-hsnsbKNal!-5{PjMQDwt= z^D|5e1`w@Wzly{0Q*Ys1UVJ75;$BVI9KlhT2I!$0KMwu~@mEy@9veoV81zFD7oq6v z30M@XH^OM!|*kT>E6xjI&dm5lvp-!I{4-KJ-wVsI_!mOp~{Op=`4OW zzhV$|&qR8ImxjzqCqygzpIfAXFKnD2TFo)OTO%#Xl<2h(^0+mtc_E?@p*5xVqc^+jW47wRs#dI&590n(p^ zHeSnW!FRArh*Xnk^U;z$Q@j)aN3y|;3EdfPN}v46@mT?eUhLBvXH#2yu#e%IhQu^a zph?f7n*L#ki@j=-Gy0;N$wL0;#qGcTraHBSl9{{w)vUJ)-1E^!qO||lq+8v08d+?X z%4u79XF#@6I@gBE0=< z9ZKd4#*?xVzIs1Dneklm6j33U|NnB(^ucqdo5%K+eGr-2RYC!?Hw;?u(K3nzLL~`D zvIMBpei6o5>hHrkzF9-5EknzCul+>eZkH?YdYyv5#eLndr`ldvl_9u=Dy1)zFkJl4x^c|QXXLugSn5%QQhjhc;MXkrw!Cfp`QUeT?kl%<) zByK*HaxHtKzZz-t!tvG6(6>YKna;5l(1&-%CHIk2@)6@gvm`y=)!N96Duwi#KxbF} z(gQmQfiR)EH&Om;>{8NA8h+L>(vaGB!SYGDQ*mVx{SN+1@9x>KnGQ=RfTpQxU0P5n z5934%5|s!DqyG~aOMFT~)m3lUlkAT=Dmr@*l_h?%=JIb~V2+Z61B=mk+Aj2=a;<>0 zepO7MGn5~=%rG%VQqvh_JbZXX#ovK5A~!!k;DEf)u=P6t*qmScKXREsNqsMfmAA#w z))_n~AL7(R*#G>VrD=8cVGDt$M-UCMETgmGmg)(t+$hTZWACbnO}0e9Om7Bb#m$^& zqJ)GM^7>Qy^36*mz07P1<0KJ4ApS@Hs!w;T+T7Q0vF9e|>0a3n5W+A&91Ki!azj?O z1JjcjiCgHlHl-PE7x=XwBZ-ii(*zkn=~7Q2j$|c>saAjD-$)GJ zD_U@AS0BDC(c1f6LeeOJjcJmiVBt&w2cxP!2e~!Em0Am4mw(eQOJ}zm0CBTdhZjh= zgLF?pIhcB_jd*vSPOnK%{rvqT3EK=4)^t|#WB!GNb|Z6$w@v|J`Qr994&z@YIhjqSYa(Qm)8{WWCOuYL|5QwiJ?~u zgFN#SEPZv~h!N8L>U69j(lHHh3QdOM>qu47!@)vCg4d16{+Ru%W$7dMI|VO2>Fc8~ z8aI$(REa3rdP9Haz{C1ViU#J&wFYskQ!4}s{=UUQED52xQul(WFt?MwW+OX|)FrF6 zn33G6(B)i`8~%Tu&uFqN+XGaNDCLxJ_n@wf;!%L*b(6I@gA>B+TVr6ytTAv)a z4k>s%ae3*mr%BI2;eNlqf1zo|ACQUF#u>{@^shSrx;9Zy|z#Woc1@ zszL9#=Vto5d$DC;V>S$-#z|Z~C!=v{x1GRa;QwS8U;}y6M8-t_$%@{Fp8O1%oZ~e+ zO(mRbL?>Yco0h)yK#-Beax!G()IzFcz-}lAS&Bf1Jw$WeobQOGo39u$V>Ix}{%97n zT?M(L>tdR_uU(?iM80Q=;OgVY%&PFa+P7h;*OEEGCzv{2>{n!#D5J7oh(a*k!q)aI7~onq1|L z(iuPQJd8y@v%-J^uTWa2_qe%J)Lkv>Q8Zhj!s`4N67{=RCBEO9#s`V(Sf*OC{)DIV zr`Bf~`Q?ws5-b(iN22~^#5R7+dMwKBktq%j&EtA1IKT8dVKfTttJyo?h|yLsRaKbi z?fhKt`KVC(3=tx>w!CK>Bcjg&liv$Yrc)uYRvh%;#2_i(GnuhP+rEg=_+{~3w{DPy zIyfv-xO-9>tHbzE&av8#Gv|zYkVY|1lEcVy-Am-29OwVpKhn^t?e6f}dVgf_OW=}? z1q{2$-F_W3v>)v=5!Q+md{k4WUubV|Vrk3X4#zq!sC*z^ERTPD89vqjOyI|etW0!y zM;JhSa_7%s_B0V!o{il-+3zexPQHYNWCT&CP>;GRwkpuu`G-aA_X9@a9gC@f^wI76 zMy`*BN=QD8Au|ax!!fK#0j|-nZ@LSl&ib$?wpKndnFMSyq7Bt$3Tnu38@{Z6OA(ZX ziZ=1>$?tEE!2jJcx8J33B5xkKI!{9$!dFkh9Nh-=!Jj8_juWB-A(=p6^dK0TNNT8R z_$$1#0)9Z7dvYx{s&m10tP9=ljno}$)8X!GU7ASsdrXP|Tve`mFR^?^@q0mVd0WYUDJx04y`ToXk34MundkqTuP%?y^FJL~W!&uQ8!D+s(GH#t# zyGFiF`;Om7YSust2P+XWiL>Fgy5>-k5Rm$HphQb*WDw?qTi^r*J#CAkJZJB0#k;Aq zg^}Jt($u<9HENF1f$2ebv!$1>MQp?JUpM`@FYtHC#WJ))kxTnYbB`0ko^3cNgPe+d z!Y8?t!xHrr0G<3l2vq+2PB;5h@L3l&c6_g!R;_(QW4&yr$g0|B?2m|)J1p++4jRSo z)2CuYRh^rR4*qp6JjOiChJv4Dr4<$5Bi~03OeC_oSt;Vb-1rHsvqhfL%DJ}~?^~XL zACe|`N!0V(y<)xhKT$pG${n>Hb%47s7?6_?)#B>J(xHG7)$%ZHuPxkI9{W?4$b&( zthMR0*4+D-#s%JF z3v>O4=f&tO^FBU+N7P+#eg0!P`)<-6`L9bhv4_&}dIYk8XzdE>{Le7GOix}n^zzM< z{kjR|Z$i%=Q&fTu1!2UW#sxN_0Dujw5dgmP2!y|)WN!DLCieRvNLB1^b+JO6?Wh$= z#s;${YG`4)3WdUKXDqgg{&nG5f@kpH^Dm>j8|;i`hiO#w*#m*U*HF!! z7|yvTn+1Btb)8qQ0uwr$FI7Ck!$zt2H>dHC|K4O1>zs~`t_$GJmZwAoo(*7XSKEYU z-A59+KJ?Unxt+PUm$o5&dR%kiFZb5BO%h!PNBPn8juPi)XBhAB;pdP?+@G+sD!1bq z&DA|E(Fb@By$n`bom#NFfoyKmkxJ+g)I){(FKEkrpDsJ2e6z#MgBx_m+Z_MhP>Cs{ z*R0-FgWvlkxS`&VVyks`E1Iz~t)ZgxIFSAHcp&xQK6QPS@z3|F{jIG?`TU8hZO=Ww+6p-(otwDNjWP0h*ql**CV)Z+750W=QKjoggc`ryG-s%Bal{wQQG zAz~!<&FB6n+#!HTGJvtgvUd7T>T8jLLkNPg;*`_TN;?ec$FKc&FC7*8jQADss94|? zbq8x@d)TydrH+S}`h@)ueihU4{q7Vl?}^t zhfu$fSEY<;eBR%lmLz)9<^BIx*B!AxK>PH0C_TP_HD9pxPBXfiX%spaeFQ7n0Ty52 zDeJB6qOCXa=J{BI@9!xwuKE{bAuP1uWS#ueyfhaC8^_%37E|s=pXypp*M*WAo z#tSdD>QHn4jQ&moX1rvhhmFAv*ajUGt@H-NWvrmrn-M*XkIkn+OOD`QVbU*M<=uJl zR`saN))~Xw*1T;m%-oeZ_}_*<-{nrHFIn`%&C%-Y_zl?ZV84A(U&E7*{RR5~qF^Pt za{#5t%{BBn;qVkwSan{kC&mC*!S^MC!P9g11V~;v2xm)<6CX4+SHVjwp2H%^_Ic?2 zC#t*o=U545;2_ghmT{nM*5is}OsjezbE2W`SV_Jl0(2VJ0Qq~+)K^ohb^fP;Sc}fl zW;av%fle-lm5ojG;e0BZi%8$;9Wc)VUy6$8#@MFgnKxNLBbW9mh6F^P6SfaDtz2YT z-G>yDY&oLRcX9>w%=KtVtTO4>eDgaTg~?j|t{-7*8Sv0?AdG1I^+jxjnFHOV9WY}T zI)>yiJW)F0i)3tXnd386?*mWf8vWP$z8I%cz}b8aU?v^xBNhJ_JV_TMfXvVIb^@d0 zClm4+m2}rbiYh7IKiy7b+ehSB$TKv0#K3mj7c=3#E3nnf5i4|pC#{&2X_({V(rdp* zQ97*@Jk3N9e|Lzyq4dC)C&kb(y_2;v5HsMaTrbYC z??E7_<{00Z5_4Rvd5*}jU)+V8i1y0IBx#=X+yf|YMlA*&9k)Vp62WmqLKnS~yOwE7td0*yFt<&e9aXXsECH?F^kFFwoP!C?@5H<)Z4;Ar;bMXJW4dAUacL%nt`jn1`Mb zs|6Bo(AK2*W$?WUdGFlg^4&_{#NAtEMhb(?r<&`h$G=q`!tBqn!cJ60Oss$zs|$jI zpU|LLmrQlL0yRw6&pr>&9WW2;1M7GRvemF?vFfWFu>I`+ka;#lhgtYng2OB_JfX90g3oKXR{)pc0=7Xu<&Z;xk!{}oA?GMtbHUeWpRxP__=Q;m=8{o7B zOq7On?xw+v?{farv&}=prXolC`6}=OIqH0R1Qc83U<3h+vhV>fPBS!ulZuD|oQO=@azYD@Xmq=lXt zH9?*fb#1%RdW2eG)tgfd8~eK{f07LvSfr6vOn>`=^TIwqXx1EUD{}H?qBk~_3Cn5W z=q45!+lJ$H=BgC=vvcAp6|joI)_f~d0K_e)n?sJ=2%0RarUdbM-L$`;57ZBY?@F z;BPVFPhb`6#UD>%qbiz2{Ak$R!HAxoo_>JbarAF-_R7i%JAR{K)Gy6@YIPSvwl`=6 zPB02^b4^SxW^4;3O$a;HX3X`SyhOP3^VUmH6pb}5&BA(S{<*l-4fKi-3>1N|Zi%tr z1fLf+8>0W@N~uM0SlfVRL|wD~rEtTFBz zP3Jio0P|CL#DNL1yZzD+W%c^V1zoU}7E?tHKYm~#2oT0+-)}PBArJ7FjqBAI%N}Yr zE`ddFT>9PVaiIJBhkWh{!d@2mlDpr7atg!Pz456Ko^L(EY(=DmAkAePl{`|!;)Y5b z6b2)~Q{y83`KEP?m;EasqxMJeKcdwPuKqdie?HFjJSvd*=X}!p;RzHStG3?YRj!mA zwAo?}=OAP23U7uqRCR7=K!X!Vtit;E=N>K8j+U0dan?SMtkhYq`(73bYQC0~s*3AQ z-&+=gp9E7s%v&9LIzDiQdwvJsxv5I@RJ^+z#PsV;X8lB?i=*~5LIjKRx52)O=-X9Y zmbq&L;(G1-hc-%VkR2)rv~BHe3wV!Xm#`vDHSKSJuxK4aBRMoaeBe?=qO^pG0l^%M zYJ&whq2+K=HJ#QHI;&Th)M666l^HsLC}n*kPKq^kQml~<5{gUWqf7f9dH;Gz^6a<- zxdH?*w)V7rC396VVA3*rzPOuN9DX>YRm@O7lMX)NQ7ox$46|3RHchE!uYoru8b*F) z`j7ft4*{F_Ay9WmO-#3~$pXAgYaOVzeCgZ>Yi@;}*kmuXPV2CR@pdeM(-TN5PGGHD zyHf75pKh`NZ$NRV17JS=TTs`_FXoJ&{NTU*Ni&Opc;&Oc3CjF;=$C7SFW=LsOIUDZ zP{0-cJ?)nI%l%xg%lTfp*nHcGC4&=o2W23$cV*Ti?6MX708Y@u#?I<*ted6K7~!Gx zG1BvU?2#V?rRxRQ6ju+k`~)3W-)#+!`JYqo%0o7b3XH2UHG~J#;v8s`Fa2WFXZ5Nc z&cnMEI=n4G0g&mwqj4Ut9P3N+)IoyXUX*{+Qy0qc)*PKY|>Hvas-uGGr*1=CY7tbiLPKeyLStIEV~LnT)6~ zpO9Z6iHo4fzBS1gc6*8p`uzaa*$5EAMVr91F?v`cO_9>${MNMCy=(U>ii`A*Ayb-6 zGFhDwQw$;xVJw$k&*P|XX86s7bX4oV(1e7?e*J^&fW{lQFQOn)1Cf#F`J^;Q=Y4I~ zF}TZqbl*z$Sls=UKSK@JmTi!^2*{^hA3Wk#ug^}NO%cKSmH}KaD{iS3yy66G=u0q^ zB?N(b29QjEOUV#+tqj8;>yT}tF7$N!ZD{%VZ}sygszP6$)M@0FOdEt0nmq#K|6x#0Oif3p)OV@flfN{G z2VOn^lw1yAJ5e|)%}I?vn~Yi+-04X97kK5ve87o|b5@F`ddx6UOXgaozC!eyNf=^F zN3`7K#Tt@zg~cRMc~zzZ-rDRVv6GJ~bwY#U`B^!*36*>$?)PtrLw?FF!%{ywcX3O_ zH^IStmi~d`-z>fzlQeeSERjWxGhCdn&a&?o zOej;Zs-B^y&YO(RUlWQctgvHDwy=I+w}QnU6+UV^16f#|7PjD}+)F!Netut2)6Px& zf2exvuqwB%dwA1GZo0cg>6Q*rK)PGHQ$o7Cq(K@f=@L-sZd9aWOAAON4d2@5JkR_5 zzWs;Sbq+i3d);fzHP;+tj)7r)eFe0$--33jKp@Hvo}L-VNZStAfIx{9qdv~TJ)CxS zI>xI%4c|b_`ePu5TVq-7fLrBO?Zf&?mO9|_mjmel&~pU_Kd)66WN^hmyBiBVe8c#m zA`yR@*8caUGMI!XfB!7Hhl;g2Q92g6M9`I2Rf+!okOEjyTwVuDa1IYH*j5_hZv>=7 z&~TtLm;%sE!J9jC5+a%Id7d$#c!9Y z{1vEw%dwn-aRRjDEAG&nPF0vZ5KMz4|EwYu9*LC@pf{^S#`Y`F`}xL|8q(DF(s0C} za7Z};0i~o{r&sveF_}@~W_}Xx%SKoA6~q~!bAkhdfkR#$Q2+2+dAt3mW%cjY{s^1mzKVIRK*%|#$)AgfMf@ora? z<*ADT(}dyVLm)75{T2w?^+sUZJ2?@{FZ$f3YAF8}4l@T&q*y)?mE{#6NS*C`OO&`5 zQiiY?xeYS``RUy@qjt`CUpTeSI+-Ma~Z3zCUv9&@8EeR(f&nSp!wF60OEqE-G{Gyww z8b^a*4dDLuD*(~%L|DY}@}cNLiW0~zMQ zS3v9?bO`0pDpqgbtUlb|Yx00zZq<=Y@y*(u>pzG33bh4wVEgeyW&AVW$a2i9{;0&z zR8r|~33Dd!x5FJ&YrRu`MxhXymQ9`$#sP~<<(YM>mn7@>lKe_RZy3TimT@hwT$_GQ z(wLfJMIVvHa3zF+Tb@cmZ^6+sC0B_@T(rqbVBZz$Nis;O zbNPVdm{*f>Gl{9e4ZG<0@n>=DJwNi)0B1s0 zm#WX2+ZpO{hESxr2tkWBo5$Nns@#7!5Se@Nx@6b>7IwYAsJhE)l{G?#Kv!qv&cj|1 z9)*1gWr)Xg+nhi#N2xu}(sSiJUiT+!^Dd#i=qwa6+Mw#)OjmmKM=PElV&|UHScm?J z00>U~LWB*7zMjm?mo&9vc^R_&JTn3>-ISLO<1z@3Z=;%r;}q*9TO^;kh=eU%%$T&9 zX1>oy`)|Kk=bc2zn_;F5Q4oj;n3cSD3L~9>vx$sJFfEo&39QCwp{y*yzw~74)(3rH z**Z8!lLNBpZwK~p5X|2TyE8{-P-1No*CZk=e5aOt`|p;}cDWWCYI+6+C%A$-;MM6x z2C+m%)_o3=4rvKzz(!Xg5PmDjAk91J0@_$N+Ct=t@W z!6uHeiwPWE&-T#LVkSAHEuL_2QyQm+4&g11xH#OEo6v1-5qypurwfoATPyMiekDZ{ z6FM8Fep)0f^lDJ^UFzxyl32e=$UugB*UMza&r&Ug{GKog7^lF`byA{$n69vQN`_yc zWg%4kCIi+>p$Hf1vro#5vfnDWTS93Od@rLiACR;`u<->u*s(l6+wm@0Pf-i(5-ik! zueyivfRRfs`^sUVDf(_-+_qB@z7c}BQu0$9Yg}Lh$g}Gx;%}8xA6lA+es-PBbsJ%W z_Xi(nWf-~*gYHW(=iI@-Bb#jENEN!it{9xOKl!WI3xsUxl0thad}_h>xdVOH{dY9F zmXXHipcvfi6?ts(nspsbzo3>c^vUH@~kU}?lvd1@@Ovs zcMZ)cg!j^e*JUKBmjz{C@bC9HU#8s8-nd=ZD|y8hRa}@)zSkHRaGCf`A%^CXD=`Oz z4y()7mB$W$sWgu^A=^JQU_{)b7Qi^Q3^TjlkZv7wsKuC{jI&=`<5sQj;u?thKdiIgYI%6*s_eJm^Z*V9*aL^n7fvP*{5`Dae*UeO*Rp{p_-*-y``|gKl zS_=2Y01FA@dElvFU@rnH2((s$%8oDmweHet{p4^vPDa?tZ}nM4%)nd&;-!SzviyRA z66ezzH;&u~UbbKh9swDrbK54dsm&A=FAF4*HH!rAz7@-_`X07lw`C0bOoAaS%k#k~ z?Alk?(b1{ZZ^keIUlRK2;r1IT%c=m6fA6ChcH>-ufLrx=8f@YxN27!u8t z-J#c~LwI0#sxc=$ky!g;=}^q`8EB5H3tGh~3pirUk2CSwJ0Wt3dyV4-5-&kpzEns=S$s9Kn%y=bS zqfZ-r?HHTv1>M~*WW9jtg&aSe^cVbegL_KCO}4b-0LTJQ>wc##2J^G=tQVv%phuXP za@M0IJD$#K@hdppkBle?#ojG#nRhCF0mVnaf*J+kSHO(NJcGyeUPn0#Fe7yTW*Eq9 z4uRCt51vQv7%Q)V);L|R2pO455Qx*Tt%ShufPDG;tZ5wl7uYGW?&1Ykyur4Q+t?+0rF6h+JjqUr>+cQV5>M%7{0A=>h`!4kg6?Q9Oc$HY}qm4_plb~#y zbF9|D{(2g(42}idR6A488NDk`puGzWOamv0__wv$K>uASxqkkV#qjn?-Q}=#z7{$Y z0`@?=nUy%fDwcW3YgK4|dKd674nX2Kd%pM?x?(Di+NU3dOLIy5>`~=v+%-jpOptT; z*wcHb-WaJh0kj$1Iyb3$!xwAmF5Hxr00V4e>5nveBP5?`a}|XFrC$$fpJTNw6E3G4 z$Uf$lROx8`ONWY{BHxL<^aG~v)N!d)%RkMZQSiFU%aruA>DT%#nYUv?(iIIqq#5L8 zAQwGynKgs_2L1O60>y@!nh)my56b~4dVrx2DAmB>kUKvB9VfU@rd8hFl{}-mf%;sn)_seyrOf`%(pFRQx)Qtc4MC+du*WY3{kYEj8vL4bE6*B|vkRifrM*F&=-f zglgi1_hLe1o2ZPfsZh5=;npJz{V#0xT9R+Q?9%cHv4q9^=Zh0`QLc`=N7{;P9^{X4 zZ9+*f6Gge|xX+fhNuMxF7d|x)OV5se;4)=pWrD#>UHJcI9ENAZq~pY;J&wDeZ_K%Z zpU!XFoZxXk6r)DH>1+pS9Mz^CW=J2QD@7Yv*a(%>0gCPy83(rmWzSUZO^iFZo+IQu zD#g2K9N*+p`;{n(z22FDrbBi@qM^@DoM|Ur5b+&qW^eQCQBJz*zDy@-zI(R#k}t$6MMt;gF_ej)gl$d`gAs~1_M4YKj@#Lxzb@^z1y#GJu126 ztVPnn(oOQ{S4DuOUSh@2qOH^W$c5?HA4_u}NArmDyzb?*Ed5mj>(}a%LbVhisSo5y zX$jCWG|aJl^PKgJ>okkFKe#`-6ZzHTBfpUiZQe zIO=D&pwiX#mkx|5$Y2x4d8~K&NX)$ z8|z;2O26(--PRKM5gN?2cNysmpfb;?QfLx*O@Fb=Sh2jffT4bxaX}=p^!q|c*mFR> znsJeY>8;Ef&Q*?1Y{kLEu%(OsTa&Ulr`11AO4O8GxenTuPKVo2ULGZQ4s|m=PxL`t z+}M$E{YE83Q2oNDgv5)`xy+hZs%id6Z(;{a@%=Ac1`ZDIAa-K!v6#+inmvb|B*m4fzyAY|3MtPoEGBiyUy?r^t_-;~4cgWHpomXo0xYC$X__Pjs^c4#n^~=d z1bpU?P_-x!-?$3(Q%Hq=C*@P)CR$9HK_Tn)(qVajHvwU4jLvH84NeaI)7@9Lu5&FbaZD{qX#vwygf{hiPkC)7pz0Lfi%@`ID*(Vs3N`+ zN?@tscW#Fu%|H8qlMjm7va-hhl>kI(5E<_L{c?~5z?rl05goHPyCj?kYmeoq+7#jl z6^_y;2Yq-b6+W@_o5&Gy8- zyNY=JiM`DUlEGri^LOe^k1lw9Z~t3P=4`UuYZ5qb~);j z;?5Oa=Hnf9MKumxzUZr7{`vsFaIDLJ`XT@$#NOE>;3W07DQ&D6fG>Dcjc~ve&%PU8 zxi{7+=zTEnzLssbw~)hdgeH@i&>1E0cKSpZ3_oXH8A3|#LLMri&2kKQZH@7cz8tgm z_q(RipR8jFn4{_4;nh+^U$vB9nGO~7FS=KAwJ<^0a;jcE*HLZp&{BFp_ey#yvp2{E zp(N1P9pF5ET2jqAvajtp)M}a8TRlG@5Fq-FUx%!a*roliO@Z?fcols$`w!)rX~T|ie!zc0p|=r#NGgW z0^zuR8;r$hD&YpK=f1w=Vj)PGG|Zt8@PF{F-*Csm{8~Rm6B>~$?BmDFgVdj5C8@C%;FaaM$xI~hVK zdA5>^JM12HrWWe6mJm^;>Xd4ci63BB$Ci6JIy5z@l)ht)_pO>c%u{hD_=PPdK531< zeo`*Bk@=tmFOE$& zimlT5y5=F*s?yuz03E>RNz>AeN;~vlVZ`V8WGA4=pS2fQcEw%*;v?Y35a&<=1zGF{ zlwS6ei%G@K=}G5W--2>9ZN5PQ<-yBn8tCy)*

      |(DZ^GdB)RIqmne-zG=B&0NU_z5MkUMUR^bl)RG*@DAo$r_S zWWt%j7btx$idz-t1>+BJ&0)BArbnN`>6d;(s9L0&ugC_4y=50_-xSyXF0~^h z-A@}IdVh(~P@ud1U1FW~l*YWK&=f*6h)R0$v3aW%BFt*e^aJMLUsiCa_NDCDo1 zR%RAb5?J&gmo|O`Ma~Sr*ix|d%Lbal>YC+wUC(R^#HCe3h+QucOz<@+yeyi+NzL#T zx|y@MOmZegBk`4jk1P{Lw6#L4O*rdg%=T zuscx~d$K(oTg$b)LTb>+W@!X@gz}Q^j8?ZhSuwI@Lm$T&x?O~NiqUzABb50Fb=#ux z0g=bW#0u|N28DFtL)~mtHt$;9PjX2ufpUhI_!AC60Wx>L`ca3|@UntNcnyku%0o-4 zdJz=#7iN)KOhpK-QxT0d0!N8tv_%$hgq|lw(*^R~$ea3qaz4%s9wuP)?7Bg4BAk>| zEe)t#4tK$nQ%MMc3iJH0S;j(1N_JvZLd8#II&Dq3b`6GV5{xoWODG}vW5dxl;)DQ$ z#d3)E;O?1kPC-&Cv6UWZb09#y>m?0iHpdk> z{$s7&JLVGofM^hY88?dXp{L#oYCR>}>6(pmCOjd($$!qXx^SJ&d&E(~WFv}EVQ?`Z z6Fr~&`Kzr|cxYRg=dlH3$K1^2?(GCD@z#NsLxRtf=%rDDfa?VJbN8VCQ~0|d(*G@U zZ*KnC9BWP&#oZ;qM94tNckQNP45~yCl-y@h6h_d8TaO|F>%1IscD$%`d`{z9j+`73 z`rbjYO~De<65rWVp_hKOOmx*S}d=TQy){YaJCIwAUFs#n;Tb^tQUf*EU5EK8L zVaV&>{640I2sj}Q6XVS&#HWuURcmo?WNT3?uY}iAvWMXfs58+1!HZPf=sc zrrViuBC{hcUwYcSJ2x3&K$FXkj=>@Q_W6Ue4dH?%kK(~p`;HP{{0(K=#;fO39Et;9 zU772n2uVm7gpm7-PPscS$KH{)o~#bDp_KjOQj7 zhUQFWKoT=QHFBXbZo0g_Bew5^U7>hM*#?a&2du6UoSz~&d&*UI|j-CvmRL<_lOJHs0*rzLW zF)*&ioilp|<+1qP{ZZ4^ft5>cNnLchv2s|}JV?2eolcpErZ6l{rip}!_mQhaP*znZ z3g3OKfd$0`cdJqgDW2mKPc&p5I-X#8?3-VD5_TbUTDPF~L;5s_~j%5m>8E*V}*((iJ&m_^!EsFC9IL+qdrSw z7sAKk5J_Q=Q>^M#e`WBIZDlI|k>#_kOzdM@($IujtZR>pauC%V@dVjS-t# zs0szX2xS_s4}@i7B5*9_p!1271@7p7TWS`Z$r!?`$`Csn5(I*TCB{IuVqcZQSUMO-UjpBu zsYk3&J@lGVd4-s=E)zJ#U4o@wM5a{JysL_fn*J)4@|qDXCsp+`$CRBkcWW!#to9J~ zz;@7LSKk~gp0m$rE{||qyEFj$Np%T*mEB`_S&7+`{+PhY2E(q@c0_oTSr5|n`}1nVKBq2G|JR;%UlG}S(B|h*Z4hc% z4J7v9gfDnO)BaBcHU*Fq_zdnX^kp(=<}&nJ_5elD)Mih(%ux21j`uM_V|+tAv3*Su zU$u_gkh!`|M;zW=7B)$9;bppDy>&nic?cuz*9XI7%*-N2X2`^W-dahMf?PF*{qpWl zv6=(1W7bdAl4%uVD^_ZTLJyB6qyZEOm;EY>Ad0&I)`*y6w54pS&1pH{e9+3am{U$o z5>>-%QBcJ4tZw^NwgfTbpWXpf}xE!syJ-UlWi z$plwrqS>W$;n=2UfLQ5} z3PK$i)8*T+J8@#GlGH0qFDYq3Pj@w*jM@uJ7A;IQPU3b1d})G9%g==$jB56J!<}*x zNKklsxvSPa$8@D@7@Y&U4g3G}gwy_}^^~Tx-jkAiDns``@&<=_Ktr~UfNmgRuXKyM z%3qw$gG_YFbC3Sbyp6oWbD&uPo&TJ)ms;eMtTcsbN`m(G1kHb9KkwN?f1rg(>S^Fq zfz-bi=|mpTREoeS1H#2QM6G*>3r4i4>=3@XH zhMQ;ta({Yis>6Ike=DiprRk9wS!GY3uABeS-0KP7sMim_{?i2JE zpU-CutS54!7k^WEAmo(1Fp=d!Hn!>-NzbwEP=shHeRc>#+ad1rMi#=1B^(0!K_wMu zO+Z2f{#Ed*IU0VH%A}}@DuU)ukzVn_E)(${8=Iwjzg9d^BP{>j6XNw>vN;SjQdE+Q zUCOBA6c5J?r09i$Na*JWgrC& zkfWfiFk>NN1>I{o+0)59G|5%FT2?NH)Bm?3;FXdNF~3ZP`>Ft;`B`J%Kfsy&6L4?> z8b38@k4>rQ#(JdY+M|d9j=IriYmB~tKLJo%UKUu82?)H>V5tUOAjX$nNVw?llCnp- zs2n0919&&mVrUj2hXkZPpnTub)TFCGorBE<_3`Hvf5zODK|LT>`}pb8<EG4)T@njECUNKU?2YTqb8h=4eZ#uu4uV5Lx&Sz2^qKd4X}hxTT9&N ziFpHE(p}q@)c{Z=xpTCyb`pQmLFMG)(LTJeTg%3G7j5Op@Xy|@U`OoI>=o{K-k^t?qS0uTFayrKBom6*Q*~uP7kP(;}3Q|+#LdqT2gZ$ z$mj{UQ+9OQ`GFk~29#b)uJnNWat(NIcE4~%kGkNNjO~5^Z2&VLP#-_rB{@o)j{zb; z1`wA4IIMwly9bcmG`U%r#j<=X$qG6gz}tZIX0CvvKH#()7`)Fr`dJ&${NclgrY6m| z3#9I#L1{9Ze-A7`?@8a4(@~TA@A|Qq*qXzn?qJ63Nk10@03|0_iA^mn`Cz^os{90C z2i*1!lzP)rQvv&ud)ClBeq}Ehjk*;;9JOs**+5cOt5TcHoZ9b5s$Iv{_BZHCvWlCp zdo5#YTM-2u|4x9-a`~sbhui#z;%)HX_`Md@a9^4xZNPQR0e~OCOlNA0Dys?JB_}5X zmhVg7^-qgVKX`!)9U%4wJpG&S>>v~19y*=ZT7Qlfoja*y#wL*{6}y;ixSFx#6imN{ z^$=CjU?Nb_FZDMflZ1p;jFzG92^tLV-^z>K@ID;p1lbdil$+m1a@0Kk zPb=^}+i(8>L56|Mn%RzlOgLi){xcB4wM-;Uc%w<+-^P4wx5)ZKrjGv64rx<)EA0?4BR;2g@E4z5`l2S9ChIBF(9_@gI@yzW#IX|vbNp^8Neuf6S3D) zQ*#B+9SD5dFAc3HN^}6)gbS{!E#S(N{{kF}8t{E=KFlvqfDuA2xE=6CS3qX@2*eg8 zz!GWs0a()qfL;yoL;IZ}IH=Ks$r&{S9x~XJ6K!7%gIn?fG5Uk;$DsRAnp;zF$MElf zp-Ef>AwGPdWbu(FU-{J=X`#5Z}Pk{cjdmYbq+bTcmHE z+Sfc z+}s34lOOYr03p&7Fmrr{;iKHPP5mbatTcGK^D-Gew=#@8v(is-AC7S0Ba)FnwIJS_ z3?gNw=-US42EdznxSf2M7U$&T>^%Ff_=68v=X?g~VBk?Gjp(s!yFGhZhyFY{}5!GIiC3tp-ue!;a?M@-JtTRT3h7+L85>{u>FVw z1b@Y6uNwI1*MmGb2QA-UfCG&l!k)!A4Ka6+1I}q)#-O1TE{6-|uh{+N z`im)MLdZuB&bXBtV*D`pOlH@vf`>T7_ zuPBSh+K)k=%_XU1*#Lxy6q$F}%5sXHyk{H+x?@1MO2`sTJO{*4sWfAs-zD&*)sH-q z<3lQybfw6f9aY&E`98Z9otOQbQ!E9>cz`Ub18k>d);P6$$>oJQfS5Q&cU8IdE;0J9 zVGrs;+z>kbHn*HXLvAQD=2dt1ej4Jb1g-b)!P{-Zg&E5=%q@uvyZ=PBfJ)r^`ZOnw z>DBW?zirUR>$3-fQc#q-=M8)@!}ktA3YCW1E-O!TPj&{N`n`xSg7?*c91M)dXP}Y= zM3rjCeSDRKBUaYIV9i@*02i%2K;Hl=xH(%cNlMwTpPn}TP`&{pPzOE+=mIJAbE5Jr{=fR3~Zn2nzWR2@wx$9+%;Zy!N;b0 zMmCpV57&x%lEP?fZx7apy1^N6K;86pTiMiue0doj6ve`ZvRfqhcsfLyhEBjP+!i3 z_x1v9zVY%PuZwJ>!itLDfP8Wo?xyp*#%fIDwvvXiyvH@u4j$rw==VKnK}&RKi|$No zY7JV3Pipvv(S)UA=qjf}Pz6sR6#+?ILBXlx$_o2dReyJXpAv*hIFnVZu&L<{xG4~y z=Yb;}@cq$NS9b%O7HP(flFIX%O8=#*mkw`ep2EA{vq(Iy%Lw*xYMd6 z5)3Cm8TTB{T?U&F&Kr7LkV$x9B}M%DCikXJDI;1qyYqIScmkUP+DzuDqpa zmi|QvA^7JcL-dn|NI%kg;_EZMB5{8OpFeuOk?lINj4$zxj6O&l!FkM`XC<6>z>fxA zIssRh@E=#VBUtyEZgpd0V{5B7NPp%;CZ_It*A9=2c6kR12l|ftEk}xGOBM~ap+g7 zCv${PK?_)}n6E(X<6b5y#eOeqY&jg*b2i8DaVQ(|Yna-!h7AIxQ}BbCVbY)AcJ-Q% zpKuDWVC##=U5~`bT@9ubNy+^t+}x)WgB{0+ri84 zQ~2v+#_o&F&sMhc>8D!2O|^f)FM^ew9nK^60h4D5EN{386JTNg0=5|I*3`9Wzfc-} zp=m?(yNwi=J1j@&$10>WS6)13AN25X7@AD$o zXvxM_+>FD-69`~!6k6+Zazu!tuy)~bJ-NB&d-ZD+m3C;kKiAf#(_R!msxw>&qYrgr z>ABxl#~M1C;@+HhP)M#}l1Tg@-WBSL0e;UC@E80~VeGo1W22TUnNjXKcFCh_wf_Q$I)4FsJtRXizE4FpXf?pw&D$d( z+%O1BEQFU#TN25;GcH9+IX!s`wT99C{rM}y)G8WDmS~zt3@&w%U$d)*G=%TfJ;NbP zcp9T$qrLshnfB_pUZGd$tM zlqqN34&3}chf3Ul)rN!hdOxT%RU>ZIzL@e10!@iUM5<>)M^B0S7Dc{h5Tq<{)tk(u zh&c3I3!(3*P)!BL93`!Y*A-_d*%w#LfoDs^yygt2#$Wn^}jNh-JC;vXSiD=gM4Q)E>>E# zw}3B>|30cVs582g5WkVtV-KZKrYn>Q$@w4J0hozYE}O^oMBZWh5B09B7TojzfD;|i z#u0|i&R{^h$iG76>7w2xDLLuq&{}*8rfQs^Dbfk{8Y5FO_bH7T{+^8V(IPJ0jihiv z${EI2TSkTC8Wtf$iRRSs42RM3{(1cpUGlFN>)SZ%HK>I>_kP7G?wpLd_jU-FE=Ehgbx-=bH+`<$6f5q5H9&}~>^5YPC zrW82WPmmkU?RXDkuL>?LkoLO*Fd*|m&yc7$YcKKBjYFD<3}3p&jgFB_6Idg{u-a?4 zp*XUZ1?`ly-5#F^pN^Yilp;gXj!7>$QwTT)(PRedpjLGHrl5}ZDBQ$)FS=%(fmBG~ zV}JNCs^Uc)%_xE$U)EgQ{?ki#N#4W;iz%oEIu)s?4k-quytBcH4foGNphE;_bAZ>m zM!1lWS0MDFd(|V(q%YR_Bb_S3QMW8TVXAG8#7AJ|{OnjyHknb%4uy!)Fy#@Vl_qu( zIwV$4_Ypc4KUSO!-31?n$FM}}C!k)U6%fB24=Ya?Hx-IP5G-z&X2mMPsLMl>_WMH8 zy!mITHTKDTx%7U?7p300nRRjpssifw#V%2e=%Y=M&Y=_CH1kZ@yQsV2ofGl++pmi! zmQpUYd+Dm&o5QIYUG{*m;D4*JfxDrB4zlWQ$X{X$EbM6UWw_tHv^ppC^^Vdt4S6le zovIr0M`Ybke#KWB4{a60@+VP<#9w)`39PnE8_i@r+VCRMm+`(73A!kyS`m!m=s3g} zW7v{8t7T|?aRwA4;_26T?FgbMZAGp`zJEk@mw3N^!a{X{I?>%DMU4B#1SO6N;y3i3 zTPRO4Bah4*NGd(Bk|n-u1;(b#rl|TCeoTEk1Aq&h^xrZ$5a)}$C8A&UwMKVEf+D*> z&`k^aXryAKk*(ssc{n31zP7~2P+{8+g3jq}mmJ4u9%Y(OVaRrz;Ir~29S&7PBSRlK zRz_SaTGc{x%xz+^b9zxf&}EQd|AJ`0Nmx-vm(&<39vhsOk31jMTRF-WKiA>g-KJHk zD;#_j$MZRsZc>#ttRxD>l`)0_ExS0HHaj980mfihZ2EWn03pX# zTLnFjewAe=3$!BS6{_*;EpDAeOu@GY%=wd=k1hJvD3Rk(@yO$%X96V>E`BeI9f(T9 z7=k#t`p^A7APWSTzJdBeryuV{#HRo{5NpyCRa z#zRZi!m7)IT&P#fLj=`XXwMa8DZAFe_0s|Jzt4W~^*hm4jDCxVC&jX?H@(1Fwab#r zYA^0jtU#%a?d3miB<7OD>}NNKX+Woawo?SzX}fy#ba!o3&3(oCJrZ3Kf7_5_#<=64 z5)8poX>3_qZ|Mi749lEgkjERL?1&|tXhi}#LWH_~SxxDMNY~b15JF5Bx8a zmMFWrT84#@>7$l~45okYc>}fUVO4&50+oWF{qTboq4|di z)Ff6k-k+|{6eJiSgGf|1ikOrhg2V>|{#{*IQfh0Ql6~=)dWa^QsLDrvya#wuzmgB5 zMqCy{Ys~3Mirzk{*f`-vNQn9`&%%Q%^^k^_I{MIXcTzxrIy90*(qfI?|D3i;qX6H) zwF1)v5*ze0(<_)^AG6_(8JVVlb#E{ZqdIKe>l#M%TrB00gC!SHOe&0^tHVJF1Fume zfik$uCZQa)RI+g2HoYN^tU;9QE2-9(=h;WtgfkV? zlTIt$pID76LX)xEFHvpWs1OA;(aG>8f+t8w((sblBOufLa%33Q%0|=3HESQ;6tM5p z5oV_d5JwPTs6jSHMP{j!zMb4;Pd~`a~1y~lWqW*YmB!-XkYODLPO9hZ)JrfwRWN24{xVguXS;Ibbog!MUz>(P+L=f8Nn_S)d~x5oHPIp{%L{+sN%)E5a2)$ zj#aRgD{y7@=b90Xzp6mRl@mC1;Rn`!|AqWj{G%kSO0m#UC60t9X#1zSQitVi>5ka4 zu!Ow%XnD6N=*pm*rx;HON1I|0`Ij_q8SxEi>nKu@3J`K>O*IckCC%A3LVrcS#bIA@ zX)9TB_aQfP|MrVDl8g$O=Ij$)%XihU@(Ku8ai8WprZvBi8%lU+8$zpF-_ zYJ>_CVEOz-D$l6x(GleknokPNdp6~r+?u{a*@Y~x`p+fX! zzQ*s0L-{G9@~`m9T3dx&xI=Ab`>K!E?0=miJkjj#FpClpm}s?B{3P-a66h$?}_;Op~qMq6PchGDS8gg zbe0UdkUerJ2$UJ`$BJG$je_d1uvJUcr*+h~#XjAqk2txN*w(Uc@^82@2bQix$DfG# z9{DF${dWO22kt7~V?3mZaH6i6yeSksiO%mNW+b6R$bIwXjmrU|D=R85=g=>vzQAZ2 zyEtFlCiW=g=jNuZy+V-aReuB<59fef-(wYa?s(io#vRVF$K(tfLG z;(qc6qCf?y0dk_QxFNcpZgpuZ&iC`bu}O+NBKr6!n@BbpTFJz!go89BJR+tZ^I>uO z@L=xkh;g8$&5F7TnJwj!Qx3hebZWgUk1OG#i2Fh}`Tizp@LfK=cL9)2g_9(~YZur; zmTnEucxfOCA$4BQyv=#!I6Ux`=(cHn)(E{H@>YoyVT#sI8$H^k+9TkxiA_#gln+Lm ze?;7Kx~@&POb3^0@^mRIcIQOvI5JR*edcHLrBLV3P)6KXcdIB&zu)XU(-p^Hf$gb$ zaq!-5y5Y?B08gEM47FNq>U!f_w#@UAP1CG`bD0)|cdhBwdN>kYX0m5oYmH=-SD~)# zgu=J_OV@I`H#X)$g;J@AGEYS;V3UE-|6aU^&`4q}ESK|1IBQq8f(->Pog$XR_KeAV z1dT_~6M2*Z7obH-;^ry}IY7ySK`jPw?kSf-mW5DhnU(2Sm29&#*J?`|Ir2!KGwVm% z*(44J0G5RO9-ry1@Bk> z(vk28&NB^}MzP005oL7J5g=sc_`qNCXYlJ6Yi%1nA0z5IO`Sz_hvr^A8(n>~4^}_|y-D+g&exil-ydr-W6FDLR)PM|g3)ozgvHIe72? z0)4<0FtZSffL|%Fk&h?kmcFs;i^B8p@Tko6cVwzO*#oBINio;!2Njs|KvA06v>^1VE7y5hAf}bdN{4H*tpzaQ zCv!z3)d7rEQ&V%lM$!q4?LPTkodBCT;N=_u{A?^OE#XQKp!ZkMdBv}FkMy5n)X$Xb z)XpA*DdMkvXyoLpudotewCGAhrLWi^lDB`xgBl?WOBv31Q;%0?rwnW(;;ItSYZL58 z9juM&*w9f~ihTx9_IVIv4(UVDuS%DQbwi^&r=UNf^0uT2L6+wop!9^lriO+5IOUqV z7L=mEc|Fd@k7$3+louzpD+4BN^nK7)24A9p*uykI3A3tXJ^5`ZSxlcPp+JBp(v~C_ zUxgy(xH+Bd0}xjqeVrU~_#dZKm4K5JPz9s`^~kNq-^T@4ZzDk)HE{ge06v=(cx_2> z+@Rq(@(VFsyGi~F#$C?VfKFzga0pCJ)`VMmm0wU=%@&$W~+d2_x);@)G|}(jrch|`wJCn zsO3cXF}TwEh7Up@n8il3y5^mfne{B6J&4dYA`d}mNY`*W^0I=$Ou$u8Icgj4NT#5S{EfEZl=bBcp6@}M2h4hKUIS#>SMVN5ynCv0&K?V@*W};!9~JF zw!rOu0X>+Y;Q1E#^vt{e$FQ5z=<}NgXj^-GuDL)QH!w`G0an(~pZ~_dU2T&Sov06I zcA3J?pwce5{N@L?;1ax-A2i9Yy7Xc{oNzwCE4FoeS@}0oDV!B@4p){3S zq4a`5EHQJ^7(bYr`RL5|h;Z*1sGH|E-|nX2iNFH{zOY!ph3V{C-H|B-Mdc3QPXWAx zrdfd63#oCN3QboKPwfb|8i*ct~?XJCng+W#|%mc$hB z_y+CXng9gH-3E9(APrdDY)@4RHp7*EMLufoI6AlE%ETy-hQt*QCweJ zyA+M(RW_g9ba^b`bpQhwxDlNz5W!niZwZQS(+L0CDSb5ok&JKI1G0MXlxG*`tO-R70 zewt7azk{vHxg%P*V_YNfY;#~WCNYwKSTQ{KX*ah8{r7L*3KL}_-R`&V$Hn*-+T6>c z;7&SV4FKGfzQOY|a52c}r>_273^m2&~#`g&ikTSl{_%iH*CNT-lEX;Y+j-M5LMgb|m) zU27_FN(A|}lQ6{aS5}=Z5RA6kH_3Hg_N-;Hl8dBLD~U){6AU(N)3Tl4e-?Q(^KG1FhP+K!2|DVx#TzXSq^6)154-qi>)2uc91sFiv=mLSbxD;--u z*Ye{5vFoTXF=S+eV&Q?7@^2i+uEKCh zuKqycwby?hZdF(_%ObBhBVXFTpfpo^k$=_ z1o6~l&pfNx>Q-t#fA#?`AoS`cCW$QcFJw5+ypxX2B_2Pa2m9MV3xE;xz#b-U59X#_ zdpNh%bh#S0pa~fD)Qy|L0P!bP$0TOqLFDJsinVF3l#sqBh?z-Pfu!cZVhF&84*<5W z`;z`Lx%F;NRT(1kNUoqr{DoLIHgaYuVGv!PR_;UK-xaZrkGo430Rza{$SNw;(;1}B zb!Mw(b)QQ0H?^OV(h+@+iE;T{D2$=lJCA6rUZMNGojvAx(t?vr@n6}7i(d1RjR_`wl{_U|SVj zazQG`yswmXsx0hxlvFnr(I9^qUf#hH{4xYYT_E>iN#A72rlvUVgI>~abRf;VJ;nKe zaj@9J$;-4m28*pIDJ~FxFFc8*(pv0U~NC(U+mWc z1w+t;jYY}@15`etX^sm(`@G&@mAS2NzJB1IYMOzwW8g-hg9(-*+yi`ke1t?q!b3e% zk0x<-A++WsP#jC(ta<||QWYxxADf%cfnuf~smaWMHRn@B6vLRugpx)y~rQnvayDcD# zRKTEYM;Fw=gCsBFx94hx=I&UomKf4eJ%-k~^x*>yKEctgf|nc5g5D&Rx{(b3HH#ai z+(h>k86n_}n(oA)RO`n{4hW9k)-b&md6UhS-yg_#!}j-XjtvU;;LVD6t-Kn-rBHSS zaVrq*!+Z90MMXs$j_2*)enOzlEE{=D)v)m;1#V9bVhV4TuJ30X7;+AysIU^R!CF8J zHnOjpimGN-R*hH3(=dsPgC6``-+}2(be41=)4yD3qcR^G zk6o`ekEdWq%W@aMDr_2W;7`0DxBJFMsCIpe(})27*Cz}|Bvu@&u0(+0 zU}y0+OjOD91}n4e$qMwjHLwdPuc){<`IiwJn5cUob<-sbo zZ*b7s+WPyr7HJXx*GR`O%%e&!{iuV zYN;QHJTtB8>T1(BZxG#gc>6|e->WS;))zqVTj?>Bf#T%~c{qqfuEALnP2M6NU58<;v@+>VX zvKmO{1I%jsXpc8DEpl*m%7EyUe(G|5FJ#Y%N01zsl#~@oTUE_#x1=hbwK(D2U?q&Dc#x z$Nu)Ts%k+|QJSz5Ol}2=p%W(Ik;y!K@W9;0#v6tp*VomJ;i+rtHG5qRLT0!#^OZOk zf)sSv;Sbx}+l56%_qa`ha&2FAiB(#I8Aznqx!M2Fbz;U{ID}`Q0uTZqq@bj!uApG+ zrxFKh{DZ^Fs;XIVw$;Ga)>WXoG0Re>DAE0a+rig0|kjcC3xdvANCjGI*er%%EFra` zQmzJoUfNBbZZO~h5^xAo2z-V{B`Pc-VWOM1;ek}ZQ?G$PM_DYRC541pofa6Qy5P(O z(IOlH+d@p<*xZDLGQl$>>adZU5JARe1U}{gALSQ+YrE(Cz1=`xNuoJYZ8MMX-lC6z zxD8iq?0tIRj0mC;@bM=_E;Mb+>FH@zFd6fSA2`|=W&Wh7UCs<=oXaW8lD%gX`r|0K z;HxCIi9rp=Q59ukHQiI zL5{ec%Ud%vZ9lop7x@ju*K{NcAHIfOuZfZTped|2&Z8P_Pr6yq>oRa04CKCH>ogVw z^K4Bh9f)~_15#dKaP{!Tdm;Ce(SK>@^Qzw(PnqfW$Ev;c1b6!pyF=H_zfP0~2zeI* zg#NIdlZEdQ_#iy#PINTp(IA;GeqpH`b2C^eoy@w-Bm8h6N}eMe0YAjS&0j$PvcRJu z^1bB<5wSLYSGRkmrM^sam8oDKc-f3k71_FnMm{hGzicWeEJ^%^4H$dsZzYn}f|v&9PVpL@cL5HCLc%pH=u4O+Uup5{+m(M8@s2PW^$+j{lMO+q@!SRP zPk25O0vHSR>c7|3O(i+^Q^EJt$ryf7WH_Jqk$E>UH|MqA%gnP~&Q*w7Zrn{8>*|V> z>?<4;G>*0SDPDhgnVITHe9@2Ck4n2{;=HsBp&}4*L3mrbmorkP)J8pcp)`t))EHXM zhaN?%dG{CgQm~-wIxcxN**&tPfa4_T_kL7r)XyC6#zuI8EEP^R* zh0n!35of_wyYlb4abjl;7d!QV+NvBS?GyWd`oI^S|0<((R7K=zFn^i~oEE6pU>xvz z$Q($~3hL@~RP|wrccJ1V28#ovnLavu;|Y6!IUEk6(<{Ka7UfAp?A|!IL+8ka|C~0b z15>Z@o5wa57Uj`>Xpl@0`@gh=RF_F^<-xNrqHt)?xrSJAD%CgwQ@q7W)Aa*0`)$m9 zdpJi8&LIxIfP>`o=V<^&6LlH{sAmUUUS2}{9t3R%B(R^%YKi8WealJ>&{EZn!03w5Q#oQ>{B5)c9Ru6pZ>H%PcMSHS6X zcpv_0)r5XQUXgBXIZWOFYtriRJEWxMVmX{R_k8^ppRiEsczD!z7cX8PSa08ExnZe+V}Dh3HOj4UF2L#` zT7uR7&pI}pN{nC6@Dtg(0J=2CoC<*-r|b0V`3!Gtk7U3dJI6we2k&0*5KzmrhYT5x z^OC&i8%_;N^G_OxCNrbxKFS{Sr0B@Ht3rlG9TJ7nCNu4(aCqsP)UU1PdM(1a*?&VD z;@36WmNno_O~PM$W-k99RvA%!c6yWx0xf~&vjMQ|7HTZESYK<}-JG8zJM(60*iYbZ z*^~8U7i@{40T~$_NG>2D5Q3x-O1>@tt%Fs)9%R*&K#F^D{@ieck{m*_k7=o&CWVVk)I>W19UDx!Nbg#Sr4;e_ZMc!Yw6a|#y71>(JdwSA65 zq$;@@2(T31Qx!LS_YNFf#~iGhum0Kq59t6A19HE0I1(TrW%tAN_ODq96CacYG=mmx z5YAzZFbCt?i!p@83}*CR74|*nbKU=vVl8Dh4tgRdU-vbAh=Vlwm4$_mY7H9oKh~g{ zezkP@;cBV(FtZwN%Hy?QoB!zJrD1p=1h*W{%x9a=NXK)gNsp)lSrvGRLTvyS9^W*MY->Vpvp|mvS zy%n0=^t2vZM6-eeoBEA7^%{nHReVzaMqf~&s+gqcT|eSaeNTzYwbV0%vlS)kaJrf7 zYZ%i@lc4v#GCOLHM8^B0TX#fWxA?%*V+}L2>%MQp{fEPK%GmAa|DMS-UCjOiqBspv zB7w*Q)^_orX|l|`p)&&uQ7G(N=tNTRZ9<->4-fU}-ZFlJA416prpI7=-w3iX4+RT# z0|Rg1m?4w>GhDcXQds(hNC$R6#7F{A6G6ljOwnPs^gy_3LWqO0JqSNcsK@NVBgH6y zd9r^V^!e?>mD5a$*vy#*1daYAR|Co)dX4T?L52E_h>F`+O)ML`*2&qkrey9mvS+YM zgpIiWt(r((>%~`Y7@aMWkD&URWQ)Jz<_d*$*c7%|ypIYD{xE?p;sagAZJj#Ul3^gY zyWsV@36}R}fPQL9^+|xk$;wsrl~SBs7@7L>=SQ6!UL!xRZKaz37?Qyd0`EtxtYEF% zwe>Egl7_y+vUk)tLsP zZBU!Q(;6+*6&)_0uwVv^_2&TBs*BEqh8`Wcq05KJ(e@-@Z>4_yIkQ>E*Jfkt ze;KSMvX=j{@WN_|YCGd+bSp#kEY|e%v$*8WQY?eM`)t>qwEQrm?SGx6b(>!?Ie^c( zhR^$TKi>)gSXC!=il?7tKoUrm6KMbf@l)}ewHw4IelETaABaJ^t;)sCg#m?w=SU`Y zvG~PinQ!y8WT&f}+m&%I+346<$A=0y>^A?2e?{Wo9Zp#dcjBtQ+lg%hzt8fs2TC#dgkZoDM?=!}o5d3ws66z}EI7*rXrW2=+3NB}?1SN&{58>g~ zzt5V;(;`RzGfy>x1MK0OZ?69NkB9Hs2rc=ZsY>^y+ltttjpAgqzedOEpl)j*Pf5pL zk(yRMY?~Ddti7$4EkWF&C1WRU8|(ia&-pjDD|$co-au-SFA7$ooF>vjur!8pC3?t# z!U7J##BGx{pJV! z?hvSR%<=~dD#{{qK$X0*w&wdDw$GT!|6DcKj_@AZ{(Qn*mW7Ref?{J;lm@jHP~459 zbgusS1J>I1pTMqr5~Y`Xh>k^{#-F<>mv6j_pK=<`)59T>GW3a~H2Wv>-Wjbyt^VPU zR}Tb91UA$o@Fy*$JGTR`^3~@uv;7cC8B{Oz=gTja6 zGM-Aabuq>4J_V85!UF=`W(qM+S0$xTY36`JqlQ2N+ zBhj+m=kmneFF#!_f!i?Ab(rnP%E=K972eFkIPGT!8k7bCqtF;>ofnLDs#7vuY(IEO z1Y+Km_-0ATSZ5zO)ZCG#jmsx{+K!HD*|9AAf?b$7D3GsR-)ZRymFLk7sL zoCMb1NZdqoPqC@N<-Yr!FDi-u5_H|~V;mfptRxJ>GqOp)X=J$mji}TTKVUwd*dqRV za-!&#^R9=)JN3a$Sy1#rlJ)r*5^vFz?h$pu*{3GT3TPf|#$a;l34FY(n0WGerxNr(@Sbuy#P5&eS8 z9?c@2tcFxZ>@hGzD$3%{RxSLQ(ecv9FB$uBOJ;7P=d}miYq;)}yTAM~`qUHE@QtJG zjZrym`tb+vQn%i?V38UL0kwP5SshRL;&8$imIr4E@%k1z7qB@8f|~htP~SWdV9RHj zJDRvv_SOIyA*?d7E2LKu6Q#6 zOc?64JTyGQ4xD+XvS$QCEWCa$N9|^tl8-i|#Zi{3Je`A*@T-3r2I+0QofO}l)ptnu5=8&uJM z8x~RSEdBNi6AR#0dN~zAM%YCZDf%{!7qffn15Y5gRotcu`8`zOV*UxgK#8SjI-=H$ ziY@f1&Z9+lMHA8k$sGbyMZtz1OfJq)f--`iL=x%6y46t{c|xDIs}97My@&J>7fp!Z zTJi+*bM!SDCHf&Bx={5p+RS^7liQV*H3MB*TNN-(C@O+u<+oawODBTYvwI4oM`(iBAU& z9jBZWJ0Dhp>*w3TcPbK8@p7IDOX;w?Y4&^XLC**-VI2P#b!Cw}|1zp?p4J5)Q!5px zEhYB(+%e}85e`BNGHJ(=Fz#iY)v7(E7c~weF7^=@qWbtXbU^ei9%Z9vw^j^>f)8V` z5gh#5B}w9m@DxNhQPOjbowHeyu^QiueUEQ=tTuT?F( zkjEq+wL1<*qxwRR(MZH+`_{ad#C1W%3|EP76xVE*mI<6D^uE*h`f#U8;67rJ5y#Up zSHFy)eAj`2`dN+s_C&y5kl|Ix0MDwDbQg7yg-vAw_roykv*%UMUcDup(R+e%w4#QU zWs6Kn9u?o9OiA-0?5S-jPKK|mVrDFFcvN2jyz$C|l*$XM+$Q~nZM=f!eaQ@72JHbydYG(H>r*uivHOtAG&zToZ=h>J7%i_DGGE`*xq2d}%9guRi4o;@C8`bhh!77a*SW zAdU#Kr7hvPP_T}r-8!;q_`0!f_vCQiCht*lsrY;hnWe( zvPARiiS34r5!};CXr}Vz*Yu;N>Z;1TPK&OkHvyCf(6^u2ng`&8D+VZDIDOf8Y zS^+g(%`S{1fdf;~Il1e()FvjK{p`Hu?fLB&$u)U3C0m#T_qO9}?wc*8v&@gk5Mm3G zUo<}P^Tn~6F_t1@Q#V6bLF2{}Dp8@6Ixeb64ljCk$b8&Ty2oc>MmXIbmZIR)ebu5J z&uDFo;>MM!VuD?bdJyHor||g(o5x@6WcBPH^rYZ>Yqof7f-{y+i4I)xs5BM;1yK zStO>rUWyURT5rbk0_E{N7CWrPe$q>}X;)?Z{;!_p1jst}sH3F0bUk#h*G={{9e+C$=x*rsYl)*&S{ z5w0Mq%Ut4hW*SYuf9cc8^HfV>|8z4+c%Ji4M6+e@KNmoud(G0~BegsBxI z?h&rJBpp|bQb=I!7=V)e2RBUpvhjz!GXC2xcTS$uw>@$`A{*Q#NBWF`5oNT@^Q27I z@R%g&4P(MNXJB7gl zU+;$zp(#-fr+G;;FHmK5Sdp3OwRF$2cN{8qtve{w;mta~%vdWLo)YPJms#)l(0-KH zfUm3iWXSt}gQE2KoNvGPBcd}CEQ=Owx|b%ejc$g9br|W6e?HfBO|xP-eU8B-5kl2Z z+o9}wV@>=@PcXl-Il3b`;!TfamjnwPCBBpKg7j$W5MC#DccxKT+hF}Er{a2OY^&Qk zIUc9PXicKw>+7!k82F&b+tmZ)~jvM9k2?fpk| zgKd-=Jv@J1cZRMh-}sVqMcTYfkgiPiPiwXP4wT)mF2$tgsi#Gbeh&YE38r3HU& zO$c&NJO46VE3_}u?{!m}a_2^`mdIA&3&_Ph}q7#}4J9C$?4d5-tOxwCWi+$75k zJsr$7X=`_Bx(U^3>95X@mL2@&I`inF?Fw8|SZ<90&`Rmk3-K1pZ;2B6;UbTsz8FRpXzz+oDCc%M(4v;-E-0?8 z>cz6ugN5`suXp*$nvX?J>PFiFZs#~?MF zjI$MuQbEB6P6T_D@%4o5hG&X{*H)%>Vhx7G^b<(N)~} zBf|D``tMxhE0!@obnMx-VJfu%v8$Ot{x7SyjEtOL>_73Wwz9q#Kzh(hje8*8?p;fh z01YzG>qBkw^fi!?P*Br&ey;FqWJFy<11Lbd&#X&-jxfgrEc6BDJ;-ldZXEtmOVQ2S zc-HTBzrx>LVV-hH{@3V<;j(wW(o3y*Sr&w$Z4hrnzn4-()w`Gco2XyI@xe_UO8WWn zUrHIv35ICFwg-|JgNZ*GLL#aTu~N<+uuYLwO0GY~9;2sKTX^5kDOtOWg_1E%LgdcR9pjtKLsiOXkk1)oKU}ahLS(vUM`aHL!@axZI=tR}65@oMx2geF%4yD$@d5D8^1tua4 zdYBBz0^Toq5IW$X<>1E_6a2ZYzWt!N)wIW05GB&y*lI@W?GKZ4JN+*rj2N;m3pH6q z^gb?hjD-uhGHM@_6Wk3Va3vnMD=;k%GEMh*d&v00)_xZcEB5_iZ|RF3hx)sPg+<+g0aUFO>7Q$AI%+9A zdq%ACY|5ElU}4$fgL~7RAaSS@ADZA^F5G7!=&stWs}l}Kdy+Tm$!$FbkGr;Z?2#fY=Hf+$#{_1b;NmeG zuDAO?)1jNHdd{!{uj}~qoABg`SahB)O_FQZg08pgm~*Mu=$bB`GXicHy6v}HIR4yI z_!!x9Oz9Em$}`xNBD0>OM(_9xRgeMQ_MJkW7(aCq)^LY8k+%)CoMj4CkDM{%vvU(( za4?qkAg^zI{*FFdtR~Hxvy~veQiX9xQMe||V)+YEx1%0mj~=d>bN&cf&fE%&RC9cj z7+l{>_RL?!HG2>^}F9qylT$m^h@q5|^(Rpuv4HV`AA76b|iYwO}5O_|NJN))>su)fd&22&h{ z=k1xo0s@PbBh}7%AUm%t05K43a@|{kClBygJQ^|Gp^rHAEOTx<=v?a|Q@ zg|0fl)@uhoV$ek7rQmxF|*S zLT+G-*|W|@?%P~t(NY7I?L z81Y;4OjSvEV9*?>7SSk?{R~Kn&$DuJa+er;`1on}@eV8(S=AtnxE6)oSBM97)|cLP(>RO6eCyYU=lB_(eSLO(&CfJ(Q@ z>z}8Q{NCM&B)h>fdT#iLhko>3w>Wv!5(;F9*W75kO_ns)zmlPL-6^RKqt0X&g=m!W z-HDN-VSjsQJ$#U6=H^F*_`!t$PwMi~ljmmj;o^e}G@-%%>RA5l`HS5g$*oV^@lp&i zGEi&jS8s_D%Ba_#Pe-E|$3|B9&%9UbNgNS%f1OWUktk4ARB zHYdy7h`|wRjAg^|8b0g0a<#_`xPj{B7D_{GD!BgnykY3socmad=3ScBqV%WFf~hw#2m?@mBn>p#)2HEH?2jHP$BTpT z0IaXT0|zn_-@kV_N^(^4sHP*$pIgmBd>Vh{J)a{_aeYWFFT?WhIFnfH-g1(a_q5ia z)t1Z5cQ5n^@sXy{TF!sXrpR<9-Z)34+mA;pOX*39Sn0u?X9@b&tPdX+R$XF=h3yl} z1CN5RkpfBvv)HJ?_fePY>)OHDgFnvL`X-8q zmU})l$cU>!pItFK5UcU7sGeA02KsQ)`V%?}7ZqarFR}Q{cpLkFhr@A3`X;OL^ui$7&7bYXDAE^uKj*Rd2@NyRb7w$wgw(fPZrA~UgwXI420zF zTmL+$29M883Ia2J;@FrM1!Wyc(AyvV(!vK!iH?~L-DQ0^i$bdVH*+P$6M9bMFT3~+ z!6|7GZ&*k=3vTT9Z&CU?wcWk#NdMEvCht!LA8WJ$tKBleb5zGAqAwOjMAIShMo91C z^x4AD!?I)6agVJTqdSn&%;{}N^{`6DqBeRkg0gWK*czCe|(saU|mmgz%&Iy&=#>``DJqu7nm zce>?Em!>P%Rqub%>|-8aU}(o6AaDY6DqAxwNZY+Tg<>8I15fAz2)5_n4`Yj9K_s%$ z5{$2|(*9hBtHa9#r+9$~B0V-XHo~7LGCxLNzftB!=dgBq{9jKE!%j?A#`WZZ_W(vY zXCl7L{An9kHUD+(n!^J7{LM@~Y^pXoi>7!Do+UYY$C>+DW~JP(jR2p6&V0?~ejlJ# z;vBj)1cOP}I`H4!A%MD|z3vR{Paq{UmN^)k9@1O}QVK5KmTJXhT3jLj5sQ=`W0uDi zyxTeXW`N<{TcwM+Co)colnpw48ms8UMJ45XpRCOMW&H9a?-|C?C4N;{qWXF{NQKPH(brGG~|f73FWV82_j1paajV@ceQ%W33vxy{sw zbm)ti3N@6`);PmBALP;dpG(P=F&P+E9|V3|BGRM6Jken}_O-FlrV`=#G>^*W#&T3UV-2gys=8PQ%?ovski!?QRY0T8 z0oq2oCWz+5x!DaA59$HZe7E^};^rLTCkC>izx4(tN0{UvP8ZQV1#PC8l@o`5{|-tP zg*nd58J_zH&b8>3fc;7jCv_*b?(2(ZJ>Pg&i0|``->RX-0C@@YB#WDsAx}Ygw(c&r zGa90-t*n?8A(S>}e-gH;6nL3d!i41?)ecHl-pACR7x`XIK%e3&@i6M{EA?&hvU zgvfJzTx`GRKAtm5M617!pg1S3PP^P*&5ZisK>!wR2f?zZj0eh2>o}s9`q=#tfG=ot z_ojwuw~|EI5-LA@Piu#fUgW5({&x8NXi9oSB{9`Asv$HYJ>({o~OIX$;q$* zK%W>4N2yh@K~srdt}_Cy8rrAq(PQ|b5vtI47q9W|I!KEZdV;#9wNo6mv$=2-nYrVo z{&Z1w)@E=3yX0o`g4xTRhSC`G@YI_D6obZXB^vCu&?TeN(q<+B?p7XhCU^ z#Ii}k+0lxlDt5L4&Uo;&B3OC=0LlRD(oU_FXLSb1@q2YOJ~{X2+}t-{kh8tDhGOVqJ~UIEmolqP`*7_^)4xY2cBf`xxg@y|0$uI+rUy zk-6F@+xUa9oCIG$PMFaeeDGL>pJarNkhb_`S@!qu$H1L466a+FQi=8|h{k=q(iAi3 zdCfnvq-4#J>_h&M_&0WfD@M&IL4bN5O43x?-s8%%p_Z!;2RF|$&f^e0L$`YYkTf1G z(RH8tS>KepS1UEuzwl~iYu8FzX5GDCB;EzPP6O8$VB`TNcl9ldvjt_>_o^y#=p7XGOxEemUPy5ooAJ24n`05gy*u@(VhkeKK3!XWw`tI_t@p8Rx?GwA{f{v zE9M>+eEj(F_}Dp^%Ak8d7B{U_OPXW7-L(e8$V3|J=Nm8XxP@Kw|0jY0N z`}m`imt>5?E$ujONzg*qI9&ukYSjE?y1uj(JfL}g-tzy;IbW?Wm%}{YDT|IBHD7Nv z%P@RW1kDAhc)x{h6EN>TLhC*U*!^JGR`tL-Ph??XA+U86#)uiBpvZ(@ z2yiIW(Y@tvP&oWqS}ow11v?Wo2BftOe!e8Z!3w_Ry7fTEEMt6Bio`F4EnZ z-Gx;ED6>3xpj~5|#qS0$n@A>gXakG@naJ7$WR`b5+Airo-qDXu>lCCU`t3c&Gu%D+ zL(_S=Mxn^WI`v=Uakz4CN^(y0_(y)&8Ec`;6O@m%HQ-$bfSizV|KY|c!UuOjOV@iF zL5vuHzv}oDf}R7$otWEfQd<+*_%1FduL74FH6XMs9H32JQ zxD?G}nVwo$T0Tqk0-2m~6GdeX zfQH%e@p#bEWMtfc?pvlAen{WYkZG63ET~H7!DhFvt`7b#?`g^xJ*WcII{%$QXfBG2 zf&8`wuSyU}|3(O48-SC7!zdhnQ({Ey5Cga~Gkl>oa5?1vUeDnP{nFk&9d z1A2=^7iZ@=VCdH!P=5f;yNS|&y;tQ7MwbW(^#_cM=g_G%1Ka7Y#ICNc==<`3x*>>P zI98?$JAIpjJAVKKfi`G>0Ox^V_DL~!93&r;lV3?ZKo8&o>8rEzV1{_}=g%Ev@KmM8 z##T6PXgn4(8_uM;T9?Ove5eM}b}g-mqX~n^Cqw~@z*=7c2?nmIa5W(ui@!V_RVOC= z8wKwV@n=va!3MX`qZeGF%Nu<+qRfFQrQ_)vKRYGS4sw--j*K*_Y3h^C7eN8~Z>Xj& z(S=P@Z_e}Dgz@wLx5yt@faCd&A%5)p=g%u(*@@j=3J5s(oO3^Ve)Ttl)3EL4GUJ8^ zryZdiz5roE@bc*|^ymfLnsEIfhZYukv$cVg1dwROLyca_(n>gOaA@dmH0T%+GCO#5 zMko;~Z7A}(w;c?L+W^d21Z3g{v8pH?J*XwdK+0zpMh@Bw;3`Rd7sr z5ZneM*<^SJAm)LK1HKe~p$i`_Y&v9ZudxQf>KnkrE;7BYyj}M`w(1!W0qI;rc?np^ zzFTDU-0-o&FcU~h5VS5L+xVHQM7jk5s27{PMnVSsDjoHjojc)gEiElupCA;M$+YwU zr-PuVq@+Y%23?CUO~t@@@(s%x1f1}3x=)JcX?7yI`LIJwmgMKZtaJQ|cL+DDM5dtr z;y?O(ABa}wJ&9LJBgg=@N)O>s@U8=w^Qz3q|Ah#AJLfsXe;rND!_^d2Aj4F!I|J^TeD&^g-N$s}2<`_iVJiRQ*ZcL8 zEN4DJeul2#TML+z>Z6iB*Fb4Iph6oe#g;PPw_~^rU7LZ>P|| z{}cr7*4{8}7uG6>npQA${CyGgZ-Yn?4zmcQRAC{=m{oqAdY3y66D-*xVg&!1&hR4U5f={jy>4sL}%QB$9fzEaq6fy<-g6GX%BQxoFNJJv@F0F&5l|kZv3~VJ`-xfOOk7Oxh8|Y@4E@r(0i#q{xy%`=ghF zS=fH}G~&9)EQ8(34%k3@xm6t2s9jYr=zv}dU^ zR8~g%KBS9?Jpwk6Vlcdccmbfe7FL{Vo$eR%zm+hYT}y^HL;A&w@y91KIrFfydc$ad zWM^Xt_ZA*`8eeHK2H`94I!<51xgfl^!xDk?tcnSC+F{sm80p2oQy&e1U`Q-Y1@e&+ z{l?_2`}AP$Jq^S*-_M*cUl442FBf7)z>)L+3U>9>D+8gV_T^~`q$*ZLjqo+ZkcVvr z*g4dP4d9uFor(8X7uT9ZU*1;4Ni9k0YltWKgHW%0`iu|xKrKDZRv^LL~fzf?^gf82l5er{>(Tl*Q#30L#O;)Wvkpsn z#%~|a?M|^cC4Av{O`~+vK~0WPveKi(-`~c<#${anFv!`3_#?w<$L?>k@uxFh-z$51 zf9?$X(5-#pZ@Q=?$g#CY`EtiP$RX7&&R{*qlQ~Lry1=6ibwq>5ncn{t-}fU?8;c|o4rqadnFTJR$C5p-HV#vBd-u8PP z6dgoI`ftnX@T2}TOYkX{=Ud12UcB57&q%|3!~`=q7WdVewxx@Rcp8bU2qKp{pOSM` zy(}(D4-hk1j-6(q4=FX{j--_$94_m3d%YD_iV?FcV)Rn7w@za~F7$7uo-m_dPvVKb zBwy-T*S#%KS@2*q!?$|-H18Kx`A^IL!A}1>M7p0o7@+Fx`OZkGg%mV6sM4i)dHkwe zB?fkX}WE;uN~1W04iTcED=vc1d;ma{QYltDeU|kxB#itfto# zDL5x9oU*Jd5#+^OkFt%c5@19_;7BWyVd8LOqF+R4e}$F^uJ53O#sT{D=@xQ7ih)8p`>6QS)Ngm-?K*Q*3w4D`RTka0{G{|Lj(STFLOG z-_2c_y=2d4U&0ws+dQ9p8G&KA(3?%n?Kb2*zpy8q#1t5+agtcUzp20py7ks0r7~g+ zso#wr0s_Omj&JF`DIPaKrwPV4vCq`rtyTzn?`t+>b$z$Gt49Zm%~n*)G;WV`L77_5 z3tbNVX+R}1cbKyPjsnYoU6as@-;<8MrZoT z=t$Pp8_UbfyWI84Jk-f^c)5NYsV(e$?_QFAl{>)2L~n|2&t9g!4JzU6(!1%1XEQ^| z@HOj0xqOFWl#P6nLubV9Uo&b**rb@fZun%FR12pe*Q_(D_37(>PlM&@w_|VL=dRg( zE+xuLqW|uGXhOwwHeS4LZ4V>()H^;ux?}Ls#^QC_Sl;A@Yz}5xA-eEzAg1ZhRkI=&if@~ZO^~Lk&FkV4# zsN~zXr33AI_wFgSKo@c*9u*r57Dx_l*|6j>%{-uAFD)(Y!uFg^yZm!Q!^}o8il((S z`-$hj5zyGpfyy34!iSv0P>;%BAa{WBWMNRpwlWhN)ymVyRO_w(svTtdMiP|*B_|iL z&G*QQJL_GE8>3anvG_hrkaZ+DZ=k)6dHLy0&cZEC%%Jx5uFOY!t_GSvyXFTgy8G=Y zQVqgHLU@)HO=JW2F410^Gs~!lElZ*0bv^Xi%*He%@bLMvcip>wYbTI%%3p<^MQh0< zd1dHbY@qs2US*WmG?9Wic^&s3+lsMcE`Mkq>@SP z=5Ia&BeP$i{F#_oTU`~dMobGhbbu1$pi7)e9-QGxm$E*7MD{l(6oTHKfb~pb1Hn=M zzyR2ndqJvrsJeQ(1FN9iYWlmh@3MX|+%?djl%X%r0Cr3xLw;!-eZ_lEhBe=nF8Vru z%SM!C_(AJlJ8}pqn)ge0H{7L>d9UNA;asr9HzrDG^0j(6I+UC#|NNGEkCU4|Y#}Jq zsY0#4jy;0YOoNUow2mYCCQ+$LB0+i5S%^d?@_@fbklwDEEN7ubxMWv4BT;#-w(7-| z=GcH-F=r5!m5htwy5u`4j8L9he6Ek{1Yvx|vfjcfqFsd4MT{4^0FI)37!~ZH^iW$S z%Hug>`!IZ89;ls0#Zo%i&roJRMRm}W0UM8mN7~snFp?r>B)T)yiJc)$#TU=;Yuj>R zaq){9ncu!%{zR2{k2wwG7A!3+9zJ^HSjv|JrDqr(>mexVhTRYU57!0Eu3A}LjiBIr zh?zX~vdPKNa1m0en8GmrZ-FmS+4H`Avw(E#vB(J&5;WWE(Ho(W0XGSZzN_FI2E~4- z5+^}drgw7<+VY~1+@%SV;&%V3t*uo#g8TZAmDP1>lj*rKP0=121x4I6NFhe(m?1Va6!LP11Aa;iOZ=wn+kU9{<#Bvdk~j z?3{1VDyipV-dJup@u)~hp#*R;A4@Fl72>GY-23?6POLpvhKfo9W;3(RV=o{RYbs&n zpuUuh+r;+w2_)NieS7JzxB$8{w+bQ-U#g6Sp!ZHL3gC z1<6|nhCO6%lRT@R{C5Y{#csBS`SDp?NeD@Ly+_IhU4;%LLw{K~bgB^t&U!3f4xJk8 z5RSFui{q%UJ$N7lNw{1%1w6%v;O6n5-MsLd+@$kegDmU(a=b*2G?fgeacx??;9Wv9 zS5U`iR|W(Gz{d&ZL9)3}Be;=}FonY`-fnQv>hAau^r&sj%xp_3-C_9K0&WFAI2}S& z>Ay%tRXNbtH(h2dKU4+n*_P*Z_lM}rK-u`jU}gm3l-MrSIMj9^=k-JIBrOSn1W7Fk zBAN65AtXsSE9>j)iI7_kRzuei=C{bw3p%f=0*fNi0Cj_J->{6eo;|C8p(8M=NcJye zZI(9pRD!l}<7iH!7T{*}s<||ONjlKl4)^+(6te3ZKJThOzk2C~&Gt0b%mWqIhEqN4 z!F2TnD+OIbhk1+I7kvW!=KZ$}F&G~S)eM(8%1`*jA|x9+DJVm5x-I^d34E0mdf!>~ z$&4$B;LQ|Edx8w>&`Xxo`n$(;($x5Yj9bZWeKBPgy*8`N=!a;V?N^cNqisSDDBF3x zRyu7>TqTQ4MupuMH^_eB+eljRG3BK0W z(sC&c?JE6l1CAdvAuGmD!1P{Ue@+rr>D~1AztD@6o`r2^M7hI{Dl@e&ZAUS06sGv~ z)*-s;L}yEzt)V^ecUW;Y^~Tt6P}!LQO3yC8Z#WjUFuAgjVth zfr-yi8mDHULHA3%h>$^U+`xCg`89XbJu-|(`DWRgt?XYq9>~+* zC6~A#Hxq7-VrPd62U4 z0)1zdQ*qJ+iPYvW*PL}}r1!|ib*!rxrAZh8y^RsQeM?roVw!@%NJx;cibufquF{iv zwZbYG+|r#}ihbyX#vh3cZ*m1xnrjL3B z%9~M+&Wt}k{2#8qGAgU6>lUQDySuwP1*B0F1f-=KlvKLAL1`3FB&8ITZlpm#P&z~; zMNs0d$M^ldd&fOL92RxXK6|e<*Nl)0+z$05VtPpr#$$coAxgT#gKh#Dr4QpUT=F|N z>Fd~l-Gv~*cKiMU)`D8BK)VdENsX$_=2iaSTz>b+Dn%UAa$Yl`5v8^8CXG}Q=fC%y zL#c!*W^L{Gt*|T|;8=x3A$TjEIb_$Kg>5b_j(uyM940Z<7JWnnSQ|o}?$V`3MIQf)`SQ z%B=M(_y2?l!3g+kUL|rRP5R_0$hvpVcPe2gf!S|sU0d5l>8mopFecuF4_FZ8kD}8s zGu}k4i9M%#pK{G{NQXyxCr4PxMw=|_tH9gm&dg)RuX?3OFvFCQq;coIHUEn)S$&&J7cI^)^eb^jgL`RupMGa$Lh~g_k3)2-l5wXWX ze|zK@m1a^=K033eI;#9wl3rx_R%s~X14UUq^ry1RrzK;lfE>IJ0S8CBl4 zXk@5|5F)tpwqpv6Hh11jU*??@h@sAU$~6XAn)N+DEy~Ku0vI8@(Jt_wbiR45WoPk5 z(ZKMqO0x_~Pcm{+aN)!-11#^`_L8rwtG_n6nvR`S6WG9fW!l7163-dV-|Ig$*RKl+ z#+km>*x~M=!swB`NA3S{CS5Sk&CQ%JCOX%peli;M_zVMZ{624QfY9 zRvUThvxp+io*`A3Ky!pKtMj{S;A{p_lHfjA&h+OlYk<|uyxx6SkQpMP%ps_&n#Fs6 z^1*@H?f2w~pSzzFwKOf*n7o8e$Hn@#v9aF(7d1LQEhaIYe9##w$WjN>B6(f5L2O0|hGAa{0Av2kxnxb<-7pFhp(@jr1!fzjxiLMO^-)id0#n#K zFGFNw%k`HV9^wa-903b}5#Q_dq1OC3ZepuQm{JB3YL$l~ZGQL6ayh2%Zs@xg%9wtH zV>}7eUZqH@i?%d-BIW1`-rNd?9`Sz0d>^!zC-z|(H?PUxRu;yHowOsPpx_CFU*5iq zTQ=ftnB35(I&Sr>Gd2Kbq{Z#qB_5^D@2VlG6?~ZNoeuh#Bv`RjsD&p~R;6q;G^$6S z;)w3!JBWN{R}4sbNr`ehH$OjuAV)LhgTJ&J336n@d{ z#AjuS4E-rteo1KJ$tWge;4TUV{zbnw>OBJkAqeYC(DlD{3+wT|%=eyK&pyBpdAM*@5Y%j7 zepUm(P+U!IUA{{`pEzsXJhDjQOEC{)L)IQqWVGiuc*D-DxiT0@AH*s1o`396Wn)q! zsp4KEV#!$J)wGT$H0A-u3sC^G4151yFYKl3Uzppy5hz+Pmx6qGtay$H*@l~!EWR-u2y9j?c*(#{> z+!yh;FpHrP(pm6(Bluf(p{p?0+JOC!(yCv7%NXwf>PV!GqRxd<*e8?Is|muY7i&95 zeB=D=fnR+H^=@GQ@hcNPsqK-QMF3t;M5Q|f!(mCH5NMpO?~u%2Bm`0+@R9nN{4W`? z$%!#P;%O}-7Jjp#b)g@Qo5p%`>&Ncku~(olYZGX{A5qkfrZUkesPMv7=R%!O>r8lp ziEb%fcVhh@xx=`T^qd>Dl<}sP6@l)xhl->)3O>JZ5Hi)dc}oP!-3i5{u#WBR!Gt?4 ztyl3SVQ%Dc_l1jp@qFFLi6$NtQpPq@lfn-_@;h9^kS0{)8pEa!pwq0T8TGZZBy>%% zCn4g>i4c!t^(1&#%AD z5W%rO`Xd-Cdvh8C<6MsreNk)+m4jC@w}3aM9&cFnMJ0CyhVz) z#oZ>fwZxld$t%AhnQx263RrZHJA~psR=#-Q7hQMfFg#Sn!(aKcrd$iPhoM?CxB8s|Lo&zE6HWG79Ic(V6yW zeMG-!Mn4k=TwhT9SD4j3)p^#>EMDM^lsnPEJUS-sp3YiYrZU5C^9xsbPIErs!fcBUb&Q zDl)Dmi+n@&X8J%Ax;1`@tram5rI{-oiz}vZ5!KM$gaEH=!S_;ST-#HJX`aqsW#?0> z_#*<8f->pN%ncKGio8eWpP)3a`J(BLW7<(4i~df2Ntq0+k7c1Ez#0GNyHAzllqa{A zq%={^y`Nin!vq~;QHZpZD?;C;=~kW&iphMRepe_7)5a~0E^-XRW%H=VahpyWvWAA& z8>|lEUS*x;Ep+$Fg)(+Or1WR+V#$&*2fCSP&~SNYnN{PeI}}M_7Ius~U@0n|5c|4N zx;|oBcN0Ff>UOOzMyX#MY@zKQ^6T$@p}darnNVF{XpsohnM+cMxvP)2aecx|0L{RT zn91^C8oB0!yv4;A|M&Y=xkGTyBiv`C;h@r_kb8Wf#A!pZ7DkAH*;zsuiKJih=l(K# zg+?(djg!YZk_xeR^4de`{S(*4?3w9Ou8uHn5-LClhm)(E76#- zOwxAp-R#Y`*k!g#72Rwo2|UTIbz;56>9dlu{#Oq-@O{+nyBkxR=MC-ie)@p{4kRu` zL0UAXlaDllogGBu=FYUcTqn%*5*wE2_AC+@zmzrmhiQJSi~#G~Yr*C!JH9tE&qawC zr`_^y$?F#K5nC>^%)fDgY9&9slAW z3ifMvA@Ch8%eM^$h;gjeshQ#@g~`@!{(vRd(mljvct&e_$*UkCFemnwEec^=Z-xUJ znGJSGxBt>eOX+F`(THe^=4uk}kT0har%OkQn8P5wuG_g))!vupnpxyFvfb1OG>6g_ zw2W@kyEdtLOek|{5EFMtWB6*0>TaX~5tmA7}4 zF`eG+cAcTKsrOze+=gE13ydp)?*kVgv}y;Jb4Wt@x(sLhWB??C=EmeWx#8YFeV}?| z7s~JCs-@qip9U?g%noJTRKFd$xAkQ6+zR4K%VMco3Tp}7o6vZO}#j`CAs|awHok^(FTfW#~(W=*I^gYP9x*32drKQ(r5q3>+6Xc z-TJB~HF9VYj;PEU!2#TTb8zlaavN;CWT^_=D5W2 z8l$Tg#09V{{peQpWUMVzS+FEHi(l!UiWx5@)p-AV?3(4}|A)$|#~Zu{TO~N~SRUXY zc7mF(CE*9jOm9|&4-fP&4zz-h$!$=>iQZC}FM2ciJxunBc%%9BIj*@<9TI+-9?jkv z(pksGkFUu0J=9NqsA9(_85c|?W5f%P>M@n1j8m8f>n zmWhpT4o+X-)f}V(x(*^KKz@ykjMmnn zc|t_5Q_mIIN_noTUc#**MkauL0U*rJ3YlQmTY1wKkj;SF(o&XuT?9QAV3&^{VfGBj z@!e*$>esKSq4TYNiJ-SRQ%U0%6%Ak%_E3x}K+>5p$Y+-I1s zfUn^;TX!_U*r!i3Ccu(#*1;F#{qpZ_V-ESm_sjk1C%%*gd)U9N8h;QD!a%0_7Pv2W zxd`?5%uFPXRgW-s&Y3W8zd(j$yhlt}!Ps9}9KO)ob(eNkk(J+5*gmt~mnh%MYI55g zalZ9jUp2*#GANvW+1Yi`K^u>`s`sz33aE1V4aenKe;+5?4~dn$e69l?d|D!}&p@(3kXgGi9wgJoJl0d0G)3&PZp6X*SiH;y}eX8+W4Fu=bYKjTKD#ydt!ybz{Oul~vie z&!MIFg5z1#sWmN?ZT?_iI8TEK(Pm{9lKGa>iUf+RmEcYAgy<(AuK3b98cY|T?0UuU zU}$)_dn*(L!|iJuRWLrKprV39o|^9I=%45xUyZawb&V0TUKk`+22STni^%}^qIK1ud zZ6cx5Y$Rc>YK=!I%eN?E*s~?Mweg6(r@&}ja40IiX}7nx2jn7R0uCgZqdTD`ZBvzI zcl+fw>T1_tm7*AU(@O?9Z+D^-HRHctwT+OI%3d=#>|}q1dkw6J5Lhi z0RaHsRoJT00pRsq+;x=&Xft5}-9WCF{iaN}S|A3J7YcK~P@ap>?EmocJ?SEX-?Ulo zunFj+wEv7jUNXWiM!zzQJe<*J3l?Ce>T;kUxcq(fcRv^;ED!|(bgA43)-HT>`R9Yy zKHK-N>4dB!%n_5(?~b4i2FU`eM2bHq=_;xeB@~0{p6u;E?Sm;&J`Kc=5vyz0Qln4> zkeT){72Uv0x+n74OGeuVY~TfsJ4K)^@!t zM@=t=rcJy%sAy@GO0ZP#P0!2-DYA5h>fQTAyB@;!lAE0MnBPj1S z3e_J@O`7IeO|Ha%W3~^JEh|cdh=W-ehTKd=$X2B@I28OpzO@JI>W%_gR!6S*-8+9! z&;i^9^!RvkKJ4yVVEn7-0IAFV)3b+FuI}#p@ZU{MpTAEAdB^(#E@lL^4hUN$sGSg; zaFT`yQjjUGs>0iN10!`FZ^XuA()b!uAXK99(Mm$&8W`Z)1(JSIq(kJ}`uab=_uHLj zxc9~)aVWsr7fb~2n;;10|4!ZSr;fXC8rS-hE#7%Oya(s&YOL zdoNa{&Bh!1r8D7Bj6DkpwVv>{xt$I@CR63zRjtdG^B8(7?5${2dk_B%K0d3SHGRTw zOW|AXiT8}@2QIe8qQ$TM>Dd{?1@W|f3ECLqeRQ6)3)4t?So-p;fFcae-oRR!8JHie zZ)`9bEKu3!F)_o$4d&CTeG*AEl%Ny>MunaI7dYP1TKSA?mr?G}L1_WXqFVyFGQRxv zu5e&w!70Dcf>4kRV+86eDJl8;ziVoK@dA}g_`ipjGSAZ0GxDox>1*FdmtSYE5pL+& zYIkB{`V1M9N`R#f`5n6nJxUY-UPos@7ffcvlZy$y3v|;-Vc38`h_wKF6%f@7xg$mH zyvm4a1J)?eJs@|EA{F*9;G#RxLyb(G_?s~G{CLazNAy)C9#N_x_sizpA3wBT-iE{i z;?ZfEPlXB=I1|oyUKvW~_v!rd`%i+wO;82hGzAUJ=2&67^Jo65U~r_BMoa`vS_))? zuY%<2VW0fs)~ZuOmKuEhJGdXgo?Qi^J}^|dGbatk8<+yf7Aih}kA^Sq+^RnSdL|GC zxPj|5ky3En03y$6e*PQ+9IT9iIX8uu zw2&l*v$T}bPh)LrY3#q?=sqQvL4xwnc6#z0oDc_07IR*#4uVVJ%! zH|GZuxA*}dhXRyKcwLky;dfwZGXe>4&vnZS{Wqzq)THwZL><$}jZIDeKL2)s?rZR6 zf2X`~ba2q14KkoXy#m(gfuKJEnscLKtU3jR+${%#$`K0KxcN$$1Y{{Lh~~gF5CI*s}<7H_(Xta=@RLJ5v*nUiK{Gj;?_W$gn>k z_`^b*z~JZN=6(+vk&Gqq0D#e8&2L~()u#43ut*qO{sQWxIZZ|6$a9H(`11NBhPR%8 zxw4ZeVp0I*1#zlXcht+NX|Pn?hH-h!w72UN8HobX;g$j?p8|n&&w9F`lqa)uR7q!vm&cx=@>IU{_g2M4X$X<0F z-1omXI8Ob97w_A}ri8+u2}Fut0Voj=!Zx4-6Q_c*^261i-Dlft8`&20q7ErBqTt2M z&I^y`b(TMPo36}SHRv6|Dw6g)SZ36ujcPtd1P$D7%lDbQ1#&3&h7Yd{hi<#{L5|>H zC^985x@3tib2VT3;J8H&fB>)^mIb4-OGBswvVDQzx+g=FRYhxD(Lx0}2Cn61M8*uV z?>=yTk}Tval8)o9suXu^kTds|OTZ(>8fx9y91nX`P`w+xg+~U%LCR zVxBebLgQ1O;zECw;#}py`@e)!q7yMJy2@3(L}T|okcWbRNDZFUaTJTNiPThAqvNq? zd&4S&ngsM2!fr%rTz(e8myaTKlkSq;pmW|sXoKO{HgQHM4f=i8+3p0agU~|nce{1GH-3$Lq-+_JB!9d9OL>5UBSAZ3hVX z1oL%|wa#~|Ta!LtOT{=QOgxOwqgUbyX=(#*bllM>p$4sSZrwO15xip}89B{WMxKB>G@}M&Um+!)5t+&BV8C+ghv0~Y# z+%T1wZ)^$RcEc^H2Qfl8&&dU_PJqY^QnT&5z;CAjRW6uoK&6xER@De^m3Ls^UvLg- za$7<;ql3gE$FJ-QA}I?I|Hw>~0p{Ow(C5K^`k>Al&B-}oBCn?}2fBRt61Ts|xWcWP zDif-6WI_mw{(es^(<^+sk!keZ2+YOrLKjcn2SGeWVE13>3MSYPwrE8O5;+a`^5GEJ zz(gr#?&!&(9cSLZ=SV#7pD2`V=5-5%3Q*}Z20%H0+YL7yL3vMhS$h8q6fd(OKn}K7 z>*sd-0IEVtpS-ds@`0x=uEUVk1V0qG{o*dGV4|YyuFmp~k>?F|ViC{3%(>}dD#Vkv zo=Cl_XZW0^!i)UCa}K=>nMG_YD@3?6G=#w8ismSa;PI6Vp6V`byBP!8MEXA*3Vf={ zex?~|sLA73og}K$?-nq&NyTj5f?TKB7Z`rN6_q*^) zH;h7w4apeaq0a_3DS{)Oo{lmbVUVp`4p@t>>jZ4cVyxY2rn;Oc4?KIx5KMH~-m3#k z5qAB+Q4eqW2@lN`)N|d&pIjO%8|4=Qq1>7A_-@Gk-{_#y!1*VrGR!|8gS56nO8Vj} zFyRlna8k)jAvgfs#}B%Mu>bZ+;3By5KGJfw11TWM{Bl;B-gpXfD>x&nPG{h`!;zV1 z>-r}&(H1|~@}8aTh(^ksAA#=MDG&WO#Ssp~_Bt6@89k+RO@a}~E^AyBc#-EN_h|jc zEDqmf`JpSi^%j2$HZ0guc$Uz5-2UJD%@C=*qW8d0UP7R4WpT;>n$Ol~1Pi@aFOYJt zg=by=^+q4fo@QQUN@<+yyOgGYrggPlBlzi_EQeyirb}M=K?q{`S}?UcGK{7RuXw1$Pjp749=n9ij-%#w>!juRjI?$i+n-``iX z^?h3WHafCQV0lO~? zXpqBu?^kY%WXz)ekI-VdYO#Brs+Eh{7Y4{n%%t+6?o!GuF{fWi7SzXI@%^T!rq_St zEs%HZP~RkE!}Q-rgHb_0``&(NpS&ke3q6wcm7sS-Mv^8bzY@14<~XitLWuImR{E6? zgV->vcql% zIp#>Gsw!rO?ITPYRW!lIL!Es>-(6Dr9^W?}Av2+liF0-VI9!3@cf!W27nCJq3}%_S zE3DE4qo|c#X$Vx2rR`xz9-%Zv`AW!^n(PzG^#4n$Pe}dwR7YgPH-5D7P~uEnGxH_b z4pUIBn2OWQr`XU!f}$SS$of%zWFnyS-6DWWk=Y1EplAQx7X4P0s30lt4Ii7yhqY@I z8)rr_Ty@I2{%Bh$PU*3MR4vGAX@XT!*j0-sVUUU#wbMRXk+j>2e_IX|Wq@p(IsfQp%+lk=!YikaZ#w_)l4K=|UZb$bkbi8)V*ABM_J7mhgoUTX3Vz#00Yi6?2z1TbqfT(`@Xs z(FJj`>%*T|Yq5dz)TCbIbOYXAPuV)PIHhlFyro>G^+C@R)-Q3xf8<#BoYM|vJAvF0 zRj^HOPn%x9&n>7jv}yZg0$msf_EWEp5l=58Q_Z-M)FCD2X;ivh+g>$`x?%pqU#=Ge zD?X({AD&$O-uRJX7^Ppl?0+PJc3G$Hb)OK01#M9^ zLWpt1&_AP_QqqO=1<#2x0G5`h1~@6+KfN3|tt^~b-j0vAx@^hGG^4q%%-dvf^4y5K zky1P}kcPu+b0?R@I#-o#^)q8?HS#a3TJPG--5Tox6$S4fs1>^L%IMY~8@pX~Nkh}W zcPcq;K8WQtr{fi0n#irtQyl(GE7+^VAso?ff`L!KYN<0l#AHLOO7I(G;^zw6$>#r| zd?O@a9_wp|zR4MICq|`r-vDwe*>Ck5$nnt7eFUh4A#g^Xdj{a%NqWS1L9eMR{3zK~ z)?soS$6C?}*L1YitK|vpr`T_gV(pohovmCK9F}Mn^_Qvp$vD-$mO5&R7znvRf%7l~dy!7X zuEg-6EVHGOoq9Bd)oo!S&5KtkR_JZnG~?o>Gk6U7<(e-1YWZbjvhSzp+c^pAQ~3NV zDRH#uYn$R-y(#+gk9v)|-(J#yr%#&qU z_y;o>0Tr|;MQpqFIjsN@fdCJnnSeHMvTBC0!d#1I>AjEd-%~$aT?Z`f=TB2OgUNor z3jiY-4SMbJDNxKonKwf{`}uPznTe@9-jmEaQ`&T60U{zkoiQT<({REQQT#6+(yv>i zASMppn}?#w{+vRnR0PufM4{c`16ERqyePoxfgJoOr)6Q0);>oth~Ys*GVm}s%$F`p z9@F$XlxFw(9ar~L{Wvl0z<3@MRPPn*Qz#MQpIxWMgQVGANVOzJ@*&=rkkFitM4`}T zXRj&ou>%TmsGao(@^9b6E^it>|Mq+r3-?x#Jg*Z8-_ca2Q$YPfBL4f_7J=ap#Yybp zGCw10k>%!7#?veKY-p3qQnrTXx$_J>Hi_vi_5C9)3&@ymc3IMVPaso!g3HJ0^FBsP z<=DTRtUz|?fv0Y`B6fs{`63sxb}!OHsq2G%BeRZ}AXm^wdybxjQhtuwDG1RvkG&qovG<>KPv zf=gKF5e>>yG349qa z5<>3(V-MdCAR1rU<_(r!H8nkk9(-^O-U({8uJHIdVmXNNezk@({#gc}R#IOE<|Xy= zlTb3XJc8X1y2r`Gs#mWj4rewqva@&DAYn$bFxmOsTs=EM2;w%jSP-#+knoew0tJ5d zQxDxMMHs>Sv=rFETd1{Cskcvx@!@zd1CfMDK9A(N>CCRMiz!j&Y<^tqcmlGefW#@jRR?Bife&Yi5I3DwkY7}PAuWkUPRu5&*Ky|Y_Y!ZxNv6Cbq{ zm41BPp51a<;f1jkljzpUn!HjdQb3SKlDt#o4S#L6(N|^~K#lTRfAL&?c6u6y$b#!Y zpJ&8pl8`W}Qax}0(j{mUK%3)n1;%it41K_VhQhtTJ_lRsq?=I<-Hm*diHzfu zdS+p;#o+ZIO$F;4xx%%(^k5?ezn!)R&bMTHX(>v}_M-tL&oytKZrEhzty*753|f8n=ddQ z^(vv`&{$wbeiCbmI?E4o zg_n1fC0ab9RYL*JWQV|c6oe2UIvOYkZ*!l3JJ-tFk3HK`_j)QNcAYK$QnxGmL53WF zO7JWof93Wo(xh$snq&(^Soq<2NjyK~bMB^A4y#v;(~ta-B{~13Tg%eT+;+<^k(j_e z)6We#h4Z=h2w_nKt9cF>o7p&Z#p8ia=b&y!9SW!RBkBin zt&GfJ6BszZJe=EN>|c`$3*_!eN_X{4MHjzx$>_>M_b5e)#I@8qFV6pBHEk&9W`MEj zH?6~(MW(xI$$?r*%Vf#eB4I~E|YU=mhk`JdqqCSmq3}fT( z$B0)@c)Gvx_bz}#uVY-mA?5mFY5yrSig0%epPb&OeYaf_f0l+w(YrRv=q3QG@FA>cLxjhKa+ZPc!I6)+SrZeGWxltqmpWu~_hPaMEf3AsLeXf~FAICZ({2QLS z$K zSaiz{UsSDP(dC!|f*4g1qPUPMp1CURNdjNYD<8$gcUfbGp*rs#j0B61o}A?oy*gL3 z3gWPh4Aj#4bRbZD1H1Ibc90MLGlo7R&U(u!VKi&~xyLv4&<`)jkolywS4(4~1!S(O zMWja)TeO5C^SlH0F81+mIMc&`5{?*rPQ(O?wyzeUglioJNO)v_KEE|1GZS!iMwT)H zN+r_JP$S6&%h4-fx#6 z-j9GDtNQ=O70xa|gcsy~-E@2ecqt44lqo}ESPx;yo{I?V?l93)mss+d`uy=!Ob)T( z(W1+N2LPW!rY3|RzJ=;Yfe`*Z{q{~4pXpCoXq4sUvG4DQ2j66uPbv|jRVOqk4-ib)@>m8rjZ7*h>NZkRU4--B z@0vlSXy_SPIJ6@{9W&!dNNtJ|4UHIIEo2xYw_Y>SN_+0#wV zXV(mGq1~Dbc~eof76j6>RZ%=0^a60|p>t_K!bxoj^6kg&eI5|O?;yz29`;!a zUf@xlb#ejoApJ~7C#NoigcE|`iZmsS^FhOAoS)?)HhvD7>7YxD}-PUu_BgDX^pql;ZfOMNkqhn2;c*SlU%dO^YA07lyKAaW*jL^ zF~}nPwfi}K0KgEy_rbC5ys_qqj!KHynX#PR3?f6YjvU+RPwf-%yWur$!WE(fi>q%i z>mtoB2BRs!pm(-dLtX=6ydxNjDA`tzZ}8VZ&q+%87r7bo62h}w=Id`N-B)#MJ5;Nh z`A@diF(~zR4k4tBLE{8-2n{-uND2^9{CpnaBr>O zF13fuJ94*=^};`Y4W_4tFDmGz;wpUqqcR$bAs+CA0R4u#^jS;IK##Hn)9<9cyINNj zOc)b=zx7j8bwxKRk;uO;u-IjXQYLg|V`OX@uR0Ru&`EXIp?7f$c&Ub_`0}jRdht*O zqy&txYd_SYw^wxJ4B#K*fm2Dige3R(xt4V~xWhkGa8@EVJuE3!NU5)Z(Gx>Ib{z@B=hrjx2Q zCUx*92;v0w%BMOSldUS>0o$Y@EKpGuQDQ4~0Qw4Ehl~6Px_wDr4G`X0aL1H!n$n>C z`*wK1VYOnijQ{)zkKvkP6D}_Zvjqgy&tRE#8UzUE68L={>o zRaC3-mVG$>^Zd4Jp8kR;^{T=i=GOMYsq8oLPpFtODw4I#yMz(+N-;l z6Yuc9VG_kAM(1H8BOm9Y1QT0mMjjjRbi_>xa*`OvJ+F_ZR>SGizR;0aiw_fEp|;73 z&3cpTXDI5O^YZtVvI_-k6P=Z4&x1L2)M}x7(q_XFUSH2-h`M#JY2rH6F4+R!xtI1n zuE1(ie~dn=&+VY9CG)$>e)Q9uYi6|i*nTEUZtTNmLSJ-Jqi!9=C4FiQ>d4yjPqkkl zJE!m3OM(7Z2+N<6l;m39;Xo%3rqMz(YI%_vrg3JL?`*y=hW(y-PZdxNOPwQ0d|3M{ z&1UOjGPaafhoNctJsAS%5J@kKFK=J;OgxcuWKsg5A*9%Kk=X&L|)14xR9ExBj zLz)Wj+8fBe6(E7F_3w|jV~E|C2Fxg!_9Y)eH@_RG`YLi$(s@(>c zhLtev;pbg~)3Qh-<{^B}eD$`=8-bL3={L$eXhr%hb2zt*6c;}4cv?O@Q8ifnddZ^V z_K-N{ccM>FD>lZ@!-nzb(+}O}SzW3AjM|H?H-i^Av3rqKfpvTsfFI3&5b3wPf^F(m z^bX5RC6GO#WabU00gRM)3faVAl#& z^c&lAxgLh#qJZkm##53)<#om*BV(F1R=En!K?4lpu^U!{nd{Bp+rDZH(5FXi3<_uH z-y{A>O_B*V>T$&ZDI!He)pdc{3FK%)MNzo+9z{yIc?;w(rK(ga_;ppV#D~_%^=WHk zYd+ZUk_4=csiFn#tNgt#7EL#<+){MSF`lv;q}^~T+BDgNhVU>~JiyGV?@X;nq@)r~cnOu3QWg&LA_$nM#z+d3}x&P{45uRO<-bO1<&pX=4qXnPA{~sy%^;X|)&w3<^m^mfki5Wvq!FSR%L?Kw}`CoSp4^C5ZcS=S+3z zaeKQ@-vt@*cp75}8i%mW?Tj-X_u_mOUOwg9zxKXR~Hke!?Mq<#=<$R<_iPakxfajmrLBWyJDI{PeQu;bU^F4SFt3K+Z{6L|LPaGJ8 zxo5g^Qf|ZKJ!bi#2qhj#@}NOKM;N=OQM;S_16s7e+U%KTO&2@0<(*8k5^-lU`*YI zWeMfl#YI_JS%TX(oQd}#tham#1~E$;PA$M6fT^o{P@zBM-gW3@Uw_9gxIjxnV(Ve-Du)7N;~Z3!MOKX8k&>BZ_yWa3DpdPbD)JiNDBw(>x>1)GhB{uNd16>ce~Ek7+L z8xgmZxOn{v`h=Gp(^lFbO@3Y*S`114T0&U?ttxWMsE4-{zK^wsYeo}p=K31)%@gT6 z15zZ7Vx$Gbzk6*JnQ*hsZn?21%a7Vx?m=K12Z#DUQV6~tRD7`Y`1ro!OTtD(Z9{c{ zvDy+S6>vW0bu8`wtA^_15UB-|GF1wnwmdp%5IVIcsW>C)H!j=WTg>W|NRd)e6R7f) zglrnJnKdc9eSNls79;C^aZ%PZgkd9hCr`VC4UZn5)*_{>D9?>OVHUDRH@J!pnSHRL zhmYCEwuss@jXqH#q+&o4)x?5Nyn=0&5sLh<1mo-#lEh5|VhPV&76S>7;vSGYy3?z7yZQXH^FqYk@1;HXVzin>MWyy;ge8C!pjO+<{{vl|%wG>1{gOfqQ* zHG?<@Pj(vl=bJ=k>;pSmc~K3mU4o!gNz2fI^dte_cztus*m7+0BVRhVHFwt_D{IC0 z4&|ZGOa|oQK4Sd14xR;R-ynx?C0SZ_NKExf1mUNhpy@a)vP@f1)ll3we~|Z)JN`JJ z8FinNMB4BdYgfOO$1je~KO=N|3Xl(Ck1)T^>3Zz@FKIGDK9KHBfZ}?>`O*lmvJzrl z-_rK|UO+-!#-M5cb9VSxd?#e3{M+|Hd&`G}4+|}Sh#aEUiMvsT*X7X6DXGev9AF>U zaVL;BI68X#%?mRB+Zr`u7`s(uDKPGTUd_<)4B2&JL_67sDyoF5h%xS!V(|C&sQO_~ zZx>Qz>p`>6k2`hIzcK|WxA)$VG^CG|Y~gL#FJhDUtcG>w6H1p%r`xA-7_$0!q$Y@I zE7K;Uxgj)WdFeoFAB;Cmnki+WVs@GmgJX76QobMe$S-2Sq+5uU|>}7y1KJ_nmn4-mHI)Z zMn%xD(6;;h4)W97(I)2Gn59?RvLo6-X3d{$y6lXbQ#TS6#Da3e*&>uBQ{IOblXPNj zb5i#GbF?SGz`N!Cnl-T%2`~R1Dyc-tH}nS4@ia`BW~{QAGaW0LigRnd8!3bP_ad`PYMXKW2D`O2*B73hTPMqh|6pkC?0%>usw5Zg-oAY#^kZfV z>fc`k%+3T(!8_XX^sGPgc4{Pry+ajFw3F-=bANu8MM{32o#d7t z%%})e5J_AyU5L>oL3H3aN2!~ zE3()ZKdee5$?X^OsfCjm_>QmFJ_ABp+by^Y44S@byZ?Du#Ra}^i@dI2(761AVDS|q9u+PF0(V=H>ak&3zc>X~(j^{)E=$4wkIEud zi(QRBNW0WYO$K{5kdhU%v@6>Lo}q|JhK+P8GDL|Oc8sS<8d6>iSytKhA)&UdHA%jx zh;+^oFxC&$g9N7l_K(Mr;_B;8vUK~ZX zQjP0!4wi?7WU=1(CdEx%^J6~Nc2V^qE}xn$ugH>dZJSrpa0E}XQ~2@8+kiUdHiuQK zR$UGj!W*ZuMk7k*L1cE=ymlrV@(OXA!8Lc&ie;pw0cNvAS2*k;Y3rR1#YrWD3KTAA zx&VJc+=dcybzcvCb?N+{+uMYx32J`-LUCR`Rg*f-xW?iF%)12AR~{^;iBa+T3%hyi53ieIRtwgIEy2FEz=(@i3&4spuo-t2L0 zsy*D>=>|wH9HjL-bA8J5VV#eashD!Ma+HvHjPFN=GZHVUn&eKZdEVe8Y3t&QBDlEs zfY>-(rrzJBRPbS$gd$Dy4T%V%**d$^`1-RAJCkv%*qNW)UCopX6Y z?)SXf7{`J^Z6I{ErGue@qBoZwxs82M30q5iTe! z2T1?`0Ut2_ck9GkXaBWRQIK$55Cw)vng%F*0)n8q0goydM@J%}M@jjX)`{~2U@nDF zT2Sr2@@ND9j6eS_813;@m6TY+VhcC`j|`t`*mPdKc{A-!!E0QEL6!u4@~;+p09#a6 zfH|*ndD9js?*VNM4L$&TNPhHOQzM$Ff#C$E1;}SgHJQWA!8z!E#!bU>+W%BmDpN}R z4Dmvc)GZT2)i>U4kT&tCuT!1LXy&#oCx!@RTt6C><;!f9mj>y)!LtNNq&bne&u-27 zP~$a^VJTalc(!R1+G^~sc)Wuaj?*q-=S#ByGk=#uyW9z}A5mUETQ~B}v9}LCEm@Z= zn?wt%U{l!L9vgVI=y>4~7AGVx>}K~v^y^ahxcO8IUEmgb!B~>f#Jt1h%QXy{JCW)` zDPxIt(!N`Lrwfq0qzg{w?@x7^eMy45P(M)$Esl>DX>AvQVZ-+$nTPXh$qMEMEdbno zbnh#{SEU{fopAyD2WD$DFz$x;5Jozs80n$I0QMt!tO2=d0sJ*+_0Z*#;eo)DJR>pR z2M_{UDtL+~3yX_pW_QiZF2J2Ffm-Y}>|_vv(hpWgqA(4F$pI|pt}bQTcJL2N?R?3YP54{_F{9%B;oYcoGKH4oyICd5ZmKZZp_D1)Vq~IkX*?vW8VLtYU<# zSDU$_Js8Lxmq@oTBLeUSZqZC{sd?cNaq;q!roOsU4m@uFH>7K;fm2`zT_<4fz?SX` z0E<7k`XVUvf>dyfz}^J}GP}T+rMpbY&W`p5vO)#Zf_wYrDHP2_>Ycyr16yUD|KpVI zj!%bwo_2*%;)NOUWgkLW1^Vw!Q_CN>tP%zX2d#!bDXGNX@CbLvP3@_Yk*j*~;zeB@ zkpv$%cK~P&)S<#}j0p_&L>ualz&E(8t7D}v@jmye~3auPyw`f#pZtFj)ml!V;|H#4^ zJ%^s*oSU07FPiX}P1G})s@tB^S6D^iH@e%F?9FA{j>@%tVf`orC;Zc@ckb!=DS6iy zq7O^nu>86In^AV;e18P_sfNbrwRs6BIr!H+#XVHiQ!fH4T1uW5wILzRV9LS##11u(}rI?7lRYdRxzsu(iH`}an(yc{{_ zIS|b*d&_5MmKa>v9O5u%LAhWhQ|o(Xfm8(821)f_IcKn}+s0GS{pU`6KIa~=^h zxGb83m5CpSYiq5#TkefW`+w6APTloZEiv8_yby-s#}pW;~P@ll-xaU2G89G z>GVc}n>q;Wuhz^LI}(oDvoS}vF`S_BLf8bI55Q0zaZay|K^0=J9q%~+V!wZ5hNWiM zJ3!Xw;NUPGLa0u?Y6kXNaC)<_i4+!<30LHY^Wfh@jACFmE<9V9`{h;0zoy6Pb+mr( zNPA;e7S&<0gtn6L3#9+U)LVc>*=_y9ba!{BbO=LtBPrbtB8_x+w}doEsHB2~(jC$u zAkw9DH+*|M=ls9d>(T3BX1Hf&-+QmM_Fli}n%{~@Q?$5kp~(rRck5< zi-_KMsd))A#7O%z>Kc>1`t(*752-DMK5!E4P_-Rh59tjSUOmxhq%poq?3oXHXHoNn zl-;rLVF?n4Kx!(BJ%eJe35uAwfx9o`^u5AQ8!*)hJ88#*9|UrAxHs-4!YtXKOsGMr zt^uIv2gJNEJe?gJhJO5bqj;O9!U-Cjn)}l;M6K^#K%V(tUJc@!-A0Q@e(>WBXmIMo z|D2h5f8{<$Al%sP@J#L!sDCcwA*!65kAk8Hh|0-S7DFc{sDCSU0DC4=0#H>+=xA;pnsH*I8u~}-cU496B<%^aWc22sbi%P5 zzKWtE7zIF&IX8t$1cL){s1bzYL2}SJeH%{j_U0zkcK{s7(tQrNIR*XsKRT_#(C$r) zjWN)?2ax7|rcaGtpx@&2q19tY4cY-0c{rcGfZ|BsE2TGxUjgVRV0l#ynECxF+bIkV z0swtrhZ2*?XVD!2MC(^?_iCa174Uk{xH$yTr%WZQ9l*vx7y;OF|3)DI=LZ0phbt&= z;lvwrevpS9fAz3Wiana^5~$v2K|>4;$pr~1KGv@EJiuI6<_LNI zK*0Le-KB^vq?-Eoz2Nz0=^Y7)%c4+eY*Yp1JkJDp64xbE5-9aS=v)^t==L_Hv|ql_ zs<25&h2Rhp5ZK?m%i;h~ho^7L4G#Ed<0Rr;-(XI)M2*XI5c!FTi2hOqMQbSO05l1Z zg`qKWjC`EDJ$onjFQWA5+4m)8#8{&R|9zY&@V12P?3*wL_aE2#kVFB&<`rNEakhb} zIy5$RxWA8Zq8Kol&8R(>qBDwRNfNbkJJ$p~paaa=@B`WRfLR2XD_YOq3WMPSK1D$f z7eDt7=Bkara`V3ZQvv)TUR8tC`E*_(kq^}7uj_!t2iQR!05%`V8I+o50Re}6j}Ldi zod{|N08$P({0Chi^a@Fz$Hu8%i6E8yTB_<>xHdA9=-i7C+FG?pde zFgyp{ncn~p>^BCO9-thsP9T*Cx^DuS{Xk#5o5TaOi=gNC5|1azUBR@G#3}^IY}OLw zhL1Lb)P2b3Lc!bwA?VjC(#)=Tsl;8)0?vkfcTo+mv3f9Hd7AUYAYVg&c(FQe(eM@f z0%3S#lLpOL%@m7%fp(F*-a2JNpLZ-c!wYg|c9ugkOT)!7(}lRZ_j>%gumOzWPtD?P zYM0*))g#M1y+V(`mkoF{{@3(Q-J0za0fZ~{mmP22mlX>x$wJ- z^M{km)o|<@qb49nD^sMlAH}mK5P{Q z;i{}`Q7wkhaMU_1d*okBU+Qt5a-%wT@8jxhk|`~TSn{@ABJwipeow8rnNAyLrg3>y z!=!T8?O+_#iyftr7b1DU3n}rYmYHpx`M?7TJuKC0DLnL_9ba+B5@tZ~334f{^>4x*&%aZzeD^)eVATdkte0C{ z!K7S~k*33EjGgR|c<$o}c1cGkASMaUaLcp+fib|yhSq2FS z>Y|=&MpRLq_{9{fxb#VQD8*U8X%Q@8AbrMB9jh_OTgpvEo>nHLP9{Kw1^Y9TlqUu+ zj|b@f1i|Yt!p8hx9ujWHcMHd>kMN&m+guchrRCc$~)b z{Op#8)GntQ6T71)pb3Mt-7(>z=6y!ZUh`H07)&*pM^oL1!BYn=0X# zfur4M_Q?kIlm5DfW65d+HwM=?z~tiUpup{fstQ1zGx)y%?+$1pQYq8Q^QUDk7mU_* zBQ*2`4oMP#7!UY4fC)l4W`STgl5C4oDL zv$Zf0&QQ@*acJmC)M}e5r<}=9C z5p*NQf$xS(hCX?6)dmbp9ViBMB!c&V7cgPdwFP)k;>x+T2L4TFp<($~J$j`ERH(~g zbFH?8m;u+!8L-{EPU?73=>E9+KveKE^i%YOZ_eqrocUiyj!qzF0DcFk4Io8y%*@EN zL{PJUp&=oV(X~Gibi$$cX<(rsB_I;5jUThVQCb3Arj;g_6&0?w20+>Xc+F9HGzvc3 zQ4$cXflbwqua#4(fC(rb*t&cU+)4nTv8N0ecLLTT=+mk!tv6~G{RN~MK$v}=*p355 z|GoG}v4+~qtam?e*Z_Gz=d(fMD;>ZP657d|o}a%ypH?Tg0yN*}S$y_LDFam1G2cPy zU|tJm#66(w{s1}1leUAlmN6ZZF~GpQJ8o^K|e2|E3{c<6ul!&D5MDp^F1^npe2 zO1b(CFstkn0=|^$$!ru7w-r|ndEn6&r-vk91?>$?vEJdkqUJnk&F zfhWOh>b)@x#2K;cMhNGo3hY;6hj&d5gAacfiaqH)1dQy$M$es@(&2fz2-<`t+Y7$R zHd2>(XkcOp0yhVgvkQPb3tW)L6mS2DZ2(gu&<1wRM!3tzTQP?JnipHalr88&Rrd{K zo%VK9dW~=z;1ro7;6%pV*4AdClFMtO3^-JcKTX-(oKbp?0lSBi&o-ez0$@Xc=~MwA zy8#XzwU{5jV9yP+d+dY)Ze1nDkAxlB^+ zPJv14jWoTDLp&r_akBoIn>ZIe-=;-)g5&$R`WQ3!FdVx;8NBjD?md3}q#zNnfj;p4;!5myKGfS4 zxDz9JJULG8oc91r=x+{2#G)I2b^^AqT)Y@Rd2cNgPTGX+U>^o=E!>R@v2l@)AO~OG zn`u@RTpq^<6XRYKT=?`9F6Zi!I2z7QADQ}I+Ra?eemcJfu>qY>JlOSVor~g&*NA^* zLeO=v#1$*9rt>3+7R#dI)|AEpk*DzZgh4G=hrd7Jgyd7M5*RuHyP0a3)PT}z<{rjK z=I9ip2VL(G4;BrMA#M!7h1S!{>eW*qwSppV78Y0$Fahzp``b13)AfMF&5*hzIq+Ko z6-TpeLyFHOXIsE2a4KO|C!!N@JOEJu9PB_84U084#3oewv&o&C*P_UsSD73;qd1SI ziJ+cK_S>LV;g6(P?ud`68I?gaXHgb?ABsDj*66?z&8g=4`R{4kb1_(2Or`g8_!P|% zmqTTgHfljR>MMTY?&0^6c`S)^yU1wM14W`XViLb zf!t4%DzIf=q36cJi)E5Rz?PK!@qF23x&pG|P6J!}%Zdd-kXe2CvPlfo6Vtz|e_WaN z?|eDsWk4LhJIc{R6SjF)x1RRmmsji{i1m6`-UpdiW5XkATCcq$T^8s12t{aLJs*<* z!~Zw7g)BT22BTI+1N+F5FX4r~m0Rb_;ULql+QuOHDrO1@esDE=s_(Xb;CK1qv}BTr zxHg*hv%21ed{zb}2UR_qWE#Vxt&nEzat#4axg45B`*0Ig6_q)5Cyjm2e0U=W+`Lwd zapSAEF$p9*bnio6cjip9AYW*(d9tSGgvVYdymFl38bA}l@9eK$+H@@vbX{tBR@Cc+ zx8jM!(XH{hEzu*b&2BJwO9(Y>+g(~&t|DD`dJVN&dvjs=Zl?oU_)gY1L>9Ib-8KS8 zXI)^e?M8D-{=C-vKCl)^Goa(dDJeURW2h6Tm{|ud?_{^T??|kjnuy%{SH~Vy|1>*a zkFug4-z6RdEKthECNCTg&)Z7|b0LC>ik@u}-LGZ})K9=S2Wq?b;e7S+RZfyw4E-_j1>`g}r}+!p z$plIbl{fEItg_P^mHuZ}!Ka*3qLbvM#l21Ql6o8MmDpF<>V%#sQAiO#<`bvb`(!o( zUZSFMayv0#HMa%->-Y!4z1KvL@PDk$!gy#n(-~N~DtOz(wL)M?*s9&1UO^aCzNUUe z%Mn%Mf{%+hZ0#ka0C@rt`$fNEB{V@)CkD@rt2Z2NMj7*-PlHU~7A4V^)!WG zU)iu$1f*6wqlX-lOQ8K-xE(-ohSb@>bKBd#pmfRl0y2-LD!ZpkJd?zK` z4Btt$AVWL3(C1c08C4~Xj3`jeI<~2Lnm@NlRoF-Qc@2YU!)`XBuZdnRUu~W*6 zr6;0ws|P;%_6?y>wjszEHau3I(8dV;R)o^=L|xN6(SbiYvG8T#gG(&NV=uO!t>H#e zW6(s0ldj~u`-m%sdHe6&?-;K_`!%M>B}ano4|`cFzkCjg;DvHL>U{%Gt>pyT8JiyE zg&#XGR&2RTst8rAt?Xw-iRwe$vlBzG?mzpiII(!tZFHQHyS6|3Q_>}G(=hvUT>vdk zQa?=Ar6fl=oJM0f_1ehCxk`5EJAfp!xoV%snucK*H{;&r`%t4OK+-5N>6>ZXE1a3U8+g$crlI6X><`KaOMD4+=DG zy7@hi@g-wo7!^Lnr=KU*KW^Wk-v#$ z8a;AvQwu92$5eZa{Bf3{KKD_c*2OO83S@o=EO#7Jk!6UY@mTLrF=D5|wuA8?iPN8l zkj&0>wDeFrbO~Fa=3RKwVFx{m;+g~N&n{s_42RO3B3xuR=!A4{!Jy0+XF!^|OlR*(aLNS(X|e3|){D#V>P-}lw8-NY zxHVZ2B^B7hn^EwaT)LK;e*(6Dc8><^Di(Q)+J!2C0FHbYi2zkeXVsB@_AWS-z3a7y z_@sK69S<23^zg_d-$$n}gy=!MG?JSp(pj8)fiQy)2JKX2>bUQ&Mp)u!r=srPP94!y ztIIvrCr$v8GUWA7*aS$MWVEVSOdf2v!Jufs1?{`3;cTTwGR9_&rRm>TZ-nMT%obv3 z@vLDeq_V4ut(z<|zDU<<3Ahhu^=j2|$9;xLaX^$*jJg~%*WEBG64YR1wDqEB+(uKq zWv(d3S^V3b@+)o(d%eDIm&KS+_7hA?4s2O2xAg-Y1xMt)duWk$jf4bq5vphv3$?dG zVBH_2+FXnh^K9;deiC(F(bVfu1o)3Oe@nwadjNc`37PoB*FjV$OtuA^B=!Oq{x?up zk{S>*pBOqF--xoP%;{|dvrJ$IvVlp&@{|3 z?l@XoS*v;rR2nZ5G976nlJd~LQHwl#QtSR%^o`K!B3If@w2f43jPuFszIB7iPdI|0 zinHb5+$^^EoB`o=_sAo@HO5RpXNn4XJ4*6nI$R+RIX>RTE}!`=&X{4EDHbR3@b6GH zq?IpsNvK3xo-Y3d3xc2(U3wUn%;@omR&ROL1)CWO3wtt+rEk3ss}Y9!k|{kGy+x6ZicGl`tAjAEhG;dj$EOc}}m`n?ob7#umZ=^lD~>uayllB!~I<69;%@A&Qq& z$?U(z{px^Qg)on&CvbbmeJ*S*4SG#8$gO(2A3_dpmL;D4H5P#>pn_P{_(fERt}aEcRaa-IcKMGqu<^@xP%vKZ@bTbIs`G@VDn zc7AY2mkDd#txaie#t1lQh!pJyRl+A7?|*iS&b1>x?Arm+hU;H)12d(Vs;WHUv3`Cx zdPU2Y&C$u780qoB_G@~KbT&LgdjbYygk}P}e@+rWTzMY?7*ezZij*r(nR5!u5yGrNMZj!wO2P)Ynr)WFtVnVJ(vyPLgOSa!RPcaIWc#q@yK_ls~5; znLx06j5x6g7KrQZ6uQ^>KQq0GDznw@vH1Ckj{yyOGs4RHj+s&zZAcfcakuzx`>-5E zC)aL0v5evk0)--?^uo0=YjZJHt^VS1j@$4FSyv;|WBITCEGO86<~21gA*O~zt*@cg zk;@|+2%f1MG+{qs_01KKJgK-UqG7vWykjk?xOeY6VO%}sm(qM=Eu`@o3hKL*{Ml1s z6P%@X;Nve4$b*gD6vbj{gEp8EW)P4B*u5yE(w**cQRFWE1$pCtL7uA?ex~bY;JaVU zN%w@msW}?Aygj)r`v2Cafmp;dTd!j2TMlHFhz9Jl_IQUzqKrFy9cAub3iWgY3Z(30@-%pWqk)<~?CQn~ts?W5o zN-T|_N}#Zs!o`rv=4u)lZZo<~|I|XWrh;tii863Y{<@w15pxe?khI zL(G%$8bm**JRj$n?EK8^gt5Q5F6yo>==lBkU+wHyO2^Sl1QBZ4I48`@c;6oE**N3-AkXH)w%$~?I!Li{TO zQp*S;b5zD!9NrgFCVs|O??a-0G^O{VRdW~I%v(rBPigS%XYOMl-%7+}&biqMA9U+k zG!$X_Um!N{MM_h7N#MeXG$6uL%CB|o3zqIoawcRI>o_Z+8y6S)kE057YU6nGs!7V^ zRb#feVEXn*J4EG+@8_RM+?X8>ltLRf3V-LGG;W9W+TGuO0;W-07pQvn*zQlF#n}ku z@?S|T_<1|mvdCQ`I1K9W+;m8)AG*T=A@LNwtf-De3hdPqRuze*1f4`Ip&z>I_spfy zVbKg>B}klE{&o`V6%iUMX*A-mb*9)2Wo;d!Mk_?RyK%Gf=E5Q8!!}ySz^O|89kYrm zeiJm96`hvIgVHv!VSl=OowVeKdWpM<$3S)4onXJNbeqS7aPobG1&zjekiph$B`0nu zvjhul&FpS#=l((BM)u5SevCUHJ?WR+JKvL2$fkZ)!cMkuTxp}@DY1y>h4^02{w%Uk zG3DY$*+uff+)(+}9JPuRfVIw6!cOXfK`M!lRoEE`-8SLGxqS~U=)|;ccz)tk*l5{o zMH2N&2%aTh1C0uiBgMNxpaJ1W%1F#Nt87=HMJ&Miy7qL>bWo9n z`Hmab&`(0iyFKuhpS5O)`SXWT%e`JIeIbtR`aCJ_e@fyPnw8(~3Gax_y95z^gpN)a z+nG=iisaU;zb?#UPvd7_5>SNN8>7tA#nhg6bJWeN;bCMoEV))sy-hT2mhmI&u**W3 zQO)r9F(DGjq}We`-=?ncoWfFV`?Kq7+t}}>U*jmJ)`^N;){ZP$TAZUYZ!K(S6|)Lu zx>-cu=}q!{SyU~5z8D5X_9e926L+-n!_=Zbx_R@H+H`*+DtR@kZ`^GXDufCRF#G>0 zBDrd@<#HaZ*!mZ7mY8Dmj0fcyPxShus$?fH2H|VpUj1g|9g>yR#^tNxM&^DJ%Ibj- zpoJnnv*EwFCQ6gcWRO2|m!z#qZT>Q1PSBr~v@3@1LQ z;aZK8d)nm3!JM%1QQ7*LO2i)u-)?y(;*k@KU5h9anPeU{;x%>dhTbf0;nMLr@!QNo zoy+k}h_w}7Nj;YH>HCANvz7nO40^5YduNM`4755+he&aHMV#tpIOJnTo6F641VX>W zF|O2nSCkOAx^T_#2Z3102ydF6Y8mCXAtlY*(kO3b<*~?dcx@<4$yj|5k60yXa&3LtClh|=CW66P;Oa_$%o*2x{v{)$T5vr0e?GIKluNgwZ>;k@>sk#9 zCy|eex>Wba4!=neNTUVJcn{o13CH3-i^j;lfiYG59XY()II4ABglX|r-Wk@o8>=w9 zg6UD3db`9UJ|%NbNdGlnRAn)ya@r0b-U$auYM0TmE~)heoBpA1MFbYe(R#q5J4aLs~q=L|RBmPwK)#2TfX^9Hn!ZLd_{ZjPn*5rBW z`|kj|T9H=zrMwrT?#5P{bTEOpp9jgVof)Yl+y`Imd8Z^1Cs#LuGkygs)@KS z`Sn3^D1??^_xjtSK)bRE(ko`Elpmt=(Ys9j^vK1R7xa;3B^2_idG-QmOcu2Sp<{{xUCc!s=Jw0# zNdvgkcpO`+f4CRn`el6;^Q1P5dm&VWXDbi?FK*Dx{vLOb7hm?~eKHJ>co}7y^^1i8 z2EypJml6DvGK-k&Du)Dy(Wh_xzN>=g!?B3xaVAb)z0>}6QsuLr`i;#KW%id$?;`^R z+Q(6%*^VPIdetIHBdZ$?dCw>cV2@8JPhcq8;_xO^AMvw_o>~MU`H0ErBJCEUjMP*OPA6!XUkllElTiP}vJ&rcm7 zC?hMRBImiiZN60E=P-XmPBA0t_nHz0ML83y_f1R3uljc+k|DyPG05}tyR2IqdH*3B z{M%yyMWxN!I?KDuKlliDgR4-%IG{$VX=?ho9?u2zqF22;?tX)oK%w7XR$K#cJ`JSy zZWCPsHl7|=p6*7>9#0ea#(Ylth(X&@Kjfuke2ptk0UL$({jrsVDAw!MteJq`VzjS^ zl5Y%QHR5AynLU)PqP$YZXkX*|Hc18ONpg@13!kS^$;10;KcRMZL&`HQtnJ6cA5W(C zEjtV*lk?c#rf2+tq9Q82bdlo6EGrX1Ig4b)ep0PD+yZhM6W&nhn)cGjhz-u z%63R8ye9{dk>3T8*z-~ngj0NYpEGf+QYuHSY^Ovoqr1#&Djj3S!5zW1oChoycBfh8 z<0hr+zaAp85t)!*qqea8wZkCtjI)$inm<__8L=ci)Bu3{*xca0%>6ZSC2QY$D2z<= zsUs$zz#5mPV3(cJr~6~hUkHyap70qld@P;tOR5w0CFVN0^O@*c1+l6jxtyj4_Nw~? zN7Rtie6rmm5PY|Lbh)LUQ)ucqZ)(4&2BMxa660X{0^L8cLZ}@cRDY7V<65rY1;{hD zf;J)mtOhl|y`SH_%7Us{-zwV375K^o9UI-8jbW^KIm)hG`2&;$6ge}a33bBa*#=}; zz$N`RP%YzuYAAk>J5Tq8z_HExOx1oX-5u}gazl@rYnoX#I|ZnO1AO*Bum-?1A;>c- zMewge3g?!V@_>5y($eTxo|G6a3wFNAQwV-+J@!R}P~5B`_j}D5Amj_qprf%UhxZvH z+=}dKF#g(>>Nx6`R5WSRWk6*3tlXXuGT2G2qXsd{b^4ug0iGBL`&xmXtnGLKW)Px% z$q@KV_WuESv)GU#?fxGjWFG67mq?uSyyP~gcKBD$ zji~n={bM|fz86$~6CMYo_NCJI?>BKMX700C62yhB(#|@*J-H{#KdfN~LjW8CsL@{s zya$~c5Ej1fd;f2M9J9N{pO2scL}sP+ zVa9EMk~nG&tTJNrl^yY`7VninVsW;Z0r_vtuJyF2w6OizpxXz~NL~Q6{pJl+w-pEy zF0{V+)T><~w9G)B36*6&uBoZPrI$yMJK+UV8=WsBWnoqOui33@-Cg0LTY1I5HZ`pT zoc#bOBdBPa{pgg}z_Ux@E{oMSVqFV0LJ845i?UT887$vf2%@GSD`jjx=Y#eoUzgx3t(+nMDFO_^nkRbJr< ztpM~z#Isx#tWp$;SY0jmr!(2-lY4M7O41s>mmA?UtJT(67LQ-(lZJ|r7! zI4AoJ%N5|bzRj}ob0XI{T8ISs!bn!zl{Tsbk)gY>Y1vOj7SOC2)js*SC9fi=sdtf} z`M=#`k5x2wW)~MpB@u|j+pa+(;#-f_#EJ%(JxO(P(7yHR2GK>YN*`9&W0+XlNmQbU zcQm6J_h&K4=22A|+g4t?JuFPWSXcVnOpA9d%I)xjf5Fsj)gj}2DMn@xz2W{*%G@I8 z`HZ)Sy8C{>QY!b4lp-D&A`Ix915hx*v`GTsQXBv<#n8}O3|GC-D|e4&S4Xd+xCi?go_2#ezXbgvJ-?xAkL z^1Fu*bcSwyYfIH~ZsxU!>HyA!A0XENJshB^z5)GSC>1pZ0Drat#td||ODZc_n3(~% z?GAuAK~vc%uh6T!FhsZegJ&&5EVAM`V4YS#JCy*ub1lHe#s*#th>H1RV7Yi*?l0h- z41mG18!vFG{sH8Uot$*e4eBlBychxv){!lm^fK}psoo8u!zwzGw%T8 z1Dr?jS?WY5mhNh;S&CTMbMtQ+C^ciUUCS-CZ38gK*!})a00=1l0azUqdg$0Y2sqKxgRqjSLM<`rsw1 zp!U=OI@01SK9lM$5HkmGbEuf7wEz$`71PqtfN|FC*4FO;^4U8-a+}`l%>icv&|i0+ zdatyb86sW6Q$(gT1-_3Qg3YvCJdp!200I}gfNx&?wig|C7El18b_kQD3QdiT;3?>s zWiu?oLzPP#>eGCvV2am2z$oB6b#A+ntZ*W@&|)Cwms(~&xrV_m-OtnGYDE(y1whUu zFk}jzusB83Az;4z41V~j#GIcYS^yld0iKlFoE93))kIHZ6Mtkw+~|Ve95ntc0P@iQ zq9sZVB7~qz`^`3pMp;nNd3bEmB4j}F&;X_}kxRfnnC>)M;@$!Xm-uaNrmLF*apZ!V zesY)BOU;_e5);t-wH7Q%DPh~}dasyr!&@;!=il<0G!|3T)xi;Tl5!{Oa}dA8yAXo17Qx1tR<$=>J~dofRL z>lWW>-UQbZBv#pFDXF(D{#2$kjR^9bkO?(X#jIXF83rzbp>->7Fs177bwv^QRY@A3dn zR(ON%uYn|nzGKIAAJ;NK+yGIdr>U&=^QSLYPm=~ZcFV{C2QrnF$vW>Z<$_okaw-h% zGNxpudKxTIHId|0RX{_@v6II0{j>rjiv9r#ii4w3HlETOB5ZMbDb{K$8^tPBHdaX5 zK#613fi@m1-lkK$#9yO6+PsHHxB8BNEAcBzd>p0Sc3tAVv6k@#yQj}rI|1X~X1@&Y zz)~;#!I%kG$z=BhxL)WQgQ`1~ zbPiDYgGJ;9RJ`hbF)5t_LI7KxAyf}L4hq-;+VI;z+75_Dq%)8Tyw-p7<^rg*b0uk- z3;6(l^m7>-n=SBs0l>=ZnFThsw+Hpb5gML>@b+|_{G>5OCg{8bV5egr-v{{s^<5z5 zk_p8Se`>JoivwWT*bN{PPZo6XzWL<*!#ABg(9=W zP3$FK%rQVFI|2Pxs1!QDuO9*6qh?DWs4PH1S*noSZ!KAq(B0h)bm@MR@PU#BIx-`> z(ESRKDVn^6#vds7%CtG)#{I!{!6pl69F^eDb5=FZc0XN#-HI?iP;OqFn0V^F$%o{CzATN#&0DCN~teQId%ysU315;%xvkLX#lZYwE!gb}g z2+0FHiRF38E)uoT$=n#547*wT_xJCi3L+q)mN$N_s@mrQLfzGkAl(!~+}7p&r@+!?_w;mu*o4%~i&GN2@K0$UO1H)KA}pfrF+RPdI-xuzQ^5Y3dmm>7GyZ0cwO z!R3vb8CVgZMxz2`Hz+jy&veCxDlN$@Ump*YOMejoFu+~yB|1~Xd#PLjYv`aj&rCpO z-wSgFUn_27QC~%5`6Q$yzAl`ys*{BR0Rs;+q0d~S24g&U)KsQL!{@u}V*O}v!gFoN z3ZmRXx}r1{k7X~w*PEM20--eva05)(87lBgf!PTVCo~ZGjC4-|bdf@&;1H^ckA%

      @T>`QeetCKYYvT+`;2zNuQv%WukbDX}0?8-v>Nhly zY9MPXJH?O4$tIHC-hlFiFtwzFuD>)S6QeB&xr*EhZ2VlHRqi_j>BfT)tebX2J0gX~ zJhP|UpNq%fJ)rIoyG|;fhC|YTXb{wTT0Q7A9jrM@e|zN6D83`{vr)c5Np~QY1~`Q; zAAzwJ6sV>_-H>|oR&SMO@pLJ~4~?&(jPb2TGwv<|CsEZe-ItQ5WnJ@_&H1ezXI^FTAU-EN!;N1*f) z$dm&?;J0#{mzQ2k&LDXM;t9E^4^&*H9tZHZKeV+y0Hh?jko$Y81%Qr=o>>A*t~X{< zyTs`BBsD^}pD~^g*D8UG1FGsYXXNt19kAYS$Di)U^Y-Ub#0Y#UM7t`xA{f+M#k7ze zs~cN|Uzn}4A%7a_CMm^uKcQh_A_gGVK&0g}q@qC+`~DyX>0^|$j zp)?FWA-$C%{|0POUa-*80anv8&aD6{?hVLZpoqAvb_rB*IXQ3%7I`rZiia)g$2DrL zVR0nR8R2A7K3kB)*I%Q80{b=|mD$%C_SJGomLaTa8yo|^kmh>PtqCF(&dq?c!lM|6 zQpbJqjGN@}BI|ap^629H2K6K`!m=tVBS6VMRm5_>A@1C|DIleJ(X92lm7v5E?Ff zA#SP2DIWV=PI+(@5~KIdZD8P5ZUF1yg!)PIr%532BA7+gd3{bGEfytbT4T*h&(0Sb z!>$jUsP@91>C=mGX0U%qh z6sjc$jMg?{yAAKkxB?vjY!o6j>*sg?-m=woOjJWZAtd4s*8ddG_ zNgweei%yMw>LxwC9<5~6R_`UYGPE~kdry9u2_q>inF&MVe3GMnYT;3)f6y}*%E1#S ztOt^z)oY#SK61$*-mk1xcW3X=d`Eo!?po=ULCv(p^Mg-Xl=i3#7Nn9KEiXfj@6{+8 zdd*XtzZ3bOV(AMl5hEh%|13)=yCS6fKI3$e;L!|aAvRMmQ;7QDJh!_@rNmuQ)#2A} zqUXQkk(}S1&D&&P;3+xSmE8MQ#$$a8)7g`_7#7&_HAb=u(;02+t&Yx|EYDIjvl)_P zAF)9?!y4z5vX`gl?s0KqSMP={_s@0CxvNo6@h9!3{NdRACuj_W-m}uAfLs+7wI?@A z(GPh0c)P9%B7;qczsIyt+VGL(LTSS=OGpbqekw(^?8}PoN=hhJCW%7O8C$poE~lwZk-0%-)Q!Nr5Oq^96%wFr?@*4TuQz0(!!k7eD1z3=`BCsB@vo_m7{0e(R>1g8)s5X;h zc-9jt*@h76G>_WsC%k`|7X$+FR2d01r=%IQQ1-0W>KT~)`;i}M%wvKLu{>Yoj$h>l z=1J30=ZdHDsqogo4C!ORP;^SQ*D|`m?;e8;*>`Yik|d!yE2%t#-O3FlDfN4__*>Z+ z`FPx&5uR^~yrKj|dQbM3ft#<6H((#F*9sN1r2xYvWto)U_|w1)%lTlJZ}37;r}iL3 zlX{0-A{W7%edcQQ1ANs7X5=q$Us!gdX9P!4+AvYJ)syr8@5dJDAonyVrrus{%Dd|8 zOAb8Fq)>jw9ka5}*LCc7pOI$GGr@fn)&zs2@GgVFoL%=WL`1qD!`5Ihf<=@Cb_)R# zgJ@B8VR*Xgu7dd?&EXxDsLw>}Xgk{UT(JL`-!pA`Vc3rhGWw8m&J9@M7kO;&SaoB} zgjC4V=}-te;~ILU_9k9oG&M(Hi&jbTqV1jgs9>QLJLU11Vk~7|9(C$1Mc-GvQ4Wyo z6peg8FdiKHpIXO~qHwSgJ&Q*=2>x+a!kyHOuoGpUFk81c2i68cUXOIAy#OH(m`I2J zRf(fTVh4wm_=mCR*Xo5>HXaq~ko}v=;_HTI&eP9#eT|ta*v+5G)%Pn^yVAf67O|0M zv9mWDe?r)ElEyM;`6jIqDR{l43FYi}33J|}C0fd*E6hP0C@A9{HD%H#6E08!+Ef#9 zoNtui52PtO=TImt&?;I2WZ!Msp$5cDA!i{6Zt$VgBX)#e?aROx1QVMt_E#GHuC*xQn!F#Gx&X?oSis{> z-oNSuI^LY}%(a#tCp@^!b=V8-`iuOVL_cl}C=B8XW#Q_&8SEYe$404D87fUX8(9t1 z2;EXhvtSVk&2^GdRr6l4y(h{|;38V;aW92T;%0fEuA1W%o5nxacd(5ll{Gsd)Y$N} zv7a?oKa}62g0HLkajP;-;;PAZ@>VZsIV2}yAT^eogkHDm%V#!kA8xUb@0GN~C~Fdx z7V-MtQi9`B+y07qlC?yX zcwPuQkG!Z>Xx^v{O^Yaos2G5EvW?}2;)exew&8PgrXyiHua8b-W|%b8ME{?;Ei-=~ zlJ_eZLwxn;^lkVLZac-DaC0Vc#Loe2q__m-h%(yW0gz_vfIgC2lmmbNMDbEw*znx=mj9Wsgg7a{rM9kY&X6ho;M@4%+EJu#7wu<%^?WS-T zaB}r;XiuEFy5jwbE+qx_JvtMwt-(Q*&Z%EG=Rnje>3If(-caQqIxkq{csetDcU_b5 zXx0&!o~3vn|E1VXP|<2~Pl_dKilU}}b2HLBUDY@!I3Qf(M#g=WJXM@jMAY|+_xrW$x4nDoyvyg|nR})Y#@)qyN-# z4s>UKuUt1Tso^Wm)m@9-4A6VcbdWY+gZfU4#`Y2A5hyxGUj@$M-#K$LGANaZgt#KQ zGZEv5(b8sjHo|@~;EhG9t<$-Ue2`S+!x|-Ar>C5Li*v#)6P}whg`pIi8DVsYi9_-z z_mgz-4O|n_uQ5l);8DfI@;eYl%T&z-kOed5JviAxAhp^rH=1AX9M4?hr ztP))qaTz}+Y1E&eWBO-R(%u8H{;!6+k(Gphdu$Awa?Fkw^M9deBYWp-xFd;$?c0(> z7WvJYX|Qae`~itok=$W+Yvx)C^X>Ncd?`Vk(n?c zN?ge#%C`JdQClV6;>b1C46L_c|1Ok%QMiDR>9hhkK zYB2Iwa2|>12b||oLALQIt!%El%1qSU<2mMG^%U{nko%P7zaHiM|8pcE)kQFL=}v{( zU1BPf{aLS!hDYl_uG59^f>1-~Kjt@6UcapGmvlv4-^d`93slamf?wTC=)Q*Z0$*e%}I?fI&PWc`ay~WON z@;>>0x!q*bpD%Z#X)X<(_e89AAKzT=1&^HevT_uwlnD#N$wA!$bx=Q7`-f`*c$sxN zPCF@rlmRnDlB{alrliR@iI`HBC>0J&CS)da8RZHd`3udWFE~h{%NPrf;0pUU}050>f8|vBY#gtLWlyI#JLsD8-^U z*A)=Y1!%9OA&)O+T-}WM3<1}B9DB(*W>aXWUY5G>BOfS9y@*-MB$3+NE`p;k2(jxKQOe*mw zkB2Ps|CX@3uNatWk%h84x=A*6#6niR2M>N#*}>8DI=D#3z#F0kjo~+4#%toiFgy}D zhU!*48fLfzSi#32E5MO|Dj%@yL^L!oB#wNB8XK(oOj=}$X9tnOAz)TJ{Or1<=Zk9; z{dH#>!Z!Z8N>tq{E?kz;;+gcF?j6G$e}fI{lNSv_sae0`b3Yq}?8FYm6p6kP=6vT( zSF{%4)!A>yPlP56&z4NH{l3{Czx5&*RfvVVH{rXO@1x4U@EwD@K~mzscShjFjyONk zTZ4diJhvPE&EqvC*`s;`XCX_3M?VI;aGc@^!u&(vm$s6rZqU%u*YD9tt0d z)a_m!c4!$k+HLt&PqT=Tne$nHIXac{64{HdV=JRUNKE@79icy$K2_pTDY6fhNt4Ea z8Zq;YwBJH~2a~;*y91uD>;DSLtZz9DnD43hP z`MXqCtMuF3eO>!_@ZzM_h{HbvK25I`k1)8yF8EZ?qewn#4X49U@wN*vi7PQQ)S*I9 z3fVsM7pYeMe@wk)Se4t?_Dy$6cZbp`Al;oxcS@H^NT-w_-61V4ARt|f4g~>`STqO{ z(z)Kb_TKOP{QcnJ!B#eFUh^7r%rSoBJj0VmjClqsAj5h|fg%cYV@sU}Til3{?45VdAk4MTggk3hL{y8%m2w;zz#`95~VczHo`=JtPqbFSAWm zP$Xs8MhN6@3Kh7*ZJnlahybNlVD*%eWreYBxZ@WNzaN-I_WCLK`*3HW547&z;uXDM23ppwn933KdU}3 zoi}L~ zxrFd!tH~?c&@FpA%^~vE%kLg zh6&RdnD&zv8rs@5aieEVW?(}Wi+#rSEXx(5vLvt*3_o3RtG`W8^8)AOd)RlN%?&;e z>zEZIzx{Y-SsAM{Fh6zH(3n8K(WauJQW!7>&HF_lapz#C* z()A@yuXhS~fEOAk=eV#d5Wig{Srn95SXvSXKL_}!b~QXrnGeoV9B$!SKY0jExL(yCx7u6*kvK~&q9$}x7FD&$o{yN_DaKgPXV zQ7LnnF};-P4acrC5uJJ`$&yc=qs;JG^zlQ4%EXE!cBa|I?a4FkmLpdxi8AvGAb2eA+&%xL^Vd?1dpGC#NY;SO?GIS+|Xj&Ij3KG5riKld>V$O&u(|vjfBm57cVYwq%K3 zP)`rb@muSQtO&{fxv;PR9>j|mgBi0we!w4+nM*2Z?Y!Fx+>hB^e{Q9ngu-`u+2X88E&11F%ng z9MEwwGBnUS25biI$oD)!sa;3_@z^(#DM+w7T!YpNM|-bRiWb1@~0uPH>@D8_nfO+XeU9 z2FTC;xir<`?PgP|yMv&jK9%%5oSfelL$UxcJ9Mq)32AUaE8xP2zXiMow#7B3A_S~J z*V9y`S?neIFbFCJ^7a$i=exy;vC49Ca^QJAaw4M=3cB-6a{+H$^WE>?P6`q)JiN^# zzj#Cf=*15xw{3`gRXfSZ;QGA-;vnP%0)YTh)JdWM@CCqKIPM)SA6?TUH?YCy7J(Vz zEBnc9jyE=;W@Jp|VYCBq@0bA|#`E*@>l+Q`x)9T()8}Z|Cy`I!}_BG3Bkv)ph*HNix^8<=AJ~Nn3~*Ya*7arh#6QWazV4q38Pt-zrT^E8K7g zeGYA#1amS)pHZ`mk_R3$X0Xcp2JpPXe&tEax%7VI?{twIueynGPNp_DVE}5+R%LQh z2J17rzZ1dv5weNYbX)(XnkgdSm2MA{p&sH%BMp#yR8HZW#A>TR6@& z#?fgZjbP>`=UV$C&}FHpz#u57TdkgGm*y$&?hD-U<-T%#SOgYPpsm>nzB61N4yat! zfZnQ{gq?_TvV5B6-ER}ABSasL5d7G@6J*o0o00i5uQ$zTktQt()WvL>n8V4*e9!BE z2%4n_t5Y0_!Ehq>#CLo1UJe`?F_QHfgjF5ib<*^Pc_adtTn}!^2+w64$E*Xf=?hsR zg_&Q80yfET3<@kyyo13T3N1We1gL84(KN=x?Ldcul2tr(j==gA zSGp1#J6k4<9gGBN4*$1|LiAQ|Xgi<>VAcL`Ywcjq6{V@7<5Hf5rfmvXr2yl}s_N=- zzo4#)>S`Akm!+?-IjV_4#0PsHFfdPF^#1WDCL{9}#tE2vZ;faug**g8G;l=!6vGdE zSK0w}2M!g|u^;j}K+eYdn~661eNyA~&upkIt*QQHJ1roj02#UqTDsSSEblbs%X4pc zX!!b&*!8?JfXV18=$r#S@CfWnu-46hjahq2#k1AQH`0He<8d&i-5O=$;@7Tn7dBZ)AR%4T7IFa456g%Q(S*~8P1-p zCM{qpAr?kEwgS8aU;H@ai*djuZ@+1_C(v_nq9OMP)d=Koe?j%gEkPhuy1uFFsP8K1 zk*`3QBysZV+pAm4Vur^?4Wacfg|IgN>R_~{w0O#dk{h|vB$8D_WH50)BL+C2Q$EH0 ziaPZuZ#9GQ7JDj^uZ7*B2;jkuL#Q46M|KqP;Fbh_+mX zXZI7?X(=6KT*k!DlczX&cq~9H2FIyqNnC<%w48DAe$WvnMC;5ghx-b1Nq3YiI85EzmCSB`j4D za}fX%WpLbt3rO)IeX0cy-pT1xUEL6qs&Ms0+;H0+Npzj)UvsMIEM3M(X<1}OW^SLl zqz`1Jd^5-B+I>Lv6t4ZsNTL6`qedohKuM03{Qfi)ofaVg!<7&xQmY1au5zsUE=J2f zp2<=~q6?g2aCuEYCd@D$0fbQ1u`kS7=PC7o2J(-&q^B8#ycI`{_3G5+N@Jgb;MwPLfIA6WV8P)FBPW@q(VS4}FcZf)wm_?

      =h|IGR#A!O_HM|3bl{Km^2q=HKD_#%4}$VTmb>Q`I`c&`Zo*kCmR6PTX?=as2HORX7|m^X!e_JhTgln zxY!DK8hrfp$qBTX{f9u7K0(==CUXSOxX2)t+BNr;t>euKMBurk&xpBTh^|!*&)*fY zevNVmf@ImXn(}kCW@FdVVwegZ6Hz*b@Lv_b&%bHl2zb4?GI{&6@a+8<9-de~+HBsH~2;97sQ8ZB<3=!8s zJfPCDw0f)xQQ~r%IFj$G@r*PlF!!O)PbOO9iwYsLr9Mz=&li$1r|{3gqA*wI6MHn2HrVOl2|I z)I#?T$axz~z>yw2J0sY+lmB*7;&Lez8GXfjN&=3u137R>09AnlK>T9C224a?{`5vh zvyS^jt0fRMKO1TL+0@AShx4~Oi*Dc+8LOOK28TQ%Fp1zS&)x|*FF;s>OOTf5`~LufR2adbYD|J=HODnV3m*>T$jIsXrx8LDBwC+E_LtNxdDf^($teT0gPbQ;zn~o z2aljLf@UC>Qy?>AX1u>SZwHd$)y;qm2)=d$5;wZ;b*R*}l3BoV>I(?;(Y`L2XIiiU=e485unRpj|^s0OJNQ3^O?34ItmofL;Myaqym+h5uHX zf&3m6!33`Jm}_VgfUFVBJIQJUB+d&Ib;+R|9O4MI5JP z0P3;q2|+|gQ_mN_2I8n)fRTqC9z7g_R1twAq$OpoWIKZ$ibo?R zXg8V)3@rAp;mjgj{E*8PfOT-0JB3ZavXgy)8{0uLLF@ps`L&&$G`E{NJcfi>VEuu* zVN(P!F92d{r&Mp2owk4$H`xbJy52+IawIeY)Ej`x080zz`@r$x*T&MAdhrYV38-X> z11=JEG@90bcP*L@at-KWgReKY-LPAr7)xa{35Z=dCRx`BI9K1sL{1(w2(sr{S@nqX z6<#7=D1CqJNu*Y(iXl(oBGw4xx9xO0FM6Xk?i17~FS3)*0up+0zjt?~2g#p?cB~JR z;ERvP^?F=-<^(nVKqThws(LoD(0+S$O2-tJWBt`jV(`)mh%66zP&ssr?3szKc^)R` zZP!}t!GbP+x3hf}Grv3d;WJ^@{q=TlwO}_EbZ<9AqM9#!nV;o6^Klb2IJ=lWqnul` zX(-v5ODsxYX+nroP`ay_$`aTC04|&>gl99scSFIm;RtwYPiTDA#(J^Wp=`mxxdHsw z{3n(EcL4Qz1~3|+!fIe)Q77ovnvbGr+Sx-A3t-t92f+1x#W@85i4H)8r%szh-s1PiQ42)*W z^_Dy?z*-8>6UPaOip0n_>75?;CJ`V=tz32T>2)i@$O052;_qzC7r! zWx~Xz+MbdZh8xo?-)RkNPPp=EUgJd_MGQ=t2l}i&qbZy+QJsoqru?V&?Qg?;y*j)- z8SIkV{CsZ{h#C3~~ly5TlL96HLh(KH9A&rQ*fGQ~a-R3KviUt|j(|h!~xZyLpj`vKfs}Je6v2M6+vmvs_T=VIxAl0Ko6dz*`t(`5^5tF}&-idpQ1GRp;j7a#z)T!$An&iomk{ zD_rc};I5e4b_fSa>NuuANj;#0=mT&&q-VGo&k`7H3F5!;UOME#}Z#}PbsL28SL^H1X zj`|PGtth#I@X7ETFKs+ zBbej4U+fs;Ux3}da9=Qx@`G}fI>fw7-rYZXwQ$Qr@S(ln;eI~HsM>+&Buo&0@!jJxw*>}a-5;y!wQ zC%S!X1w2PG*Oj`<@7Cyn9nx|4gDc1d6t7}CVPOTGH-|g>KEWVtwWQ_?c@5Tf^N60V zQB5ik{S&hwBb0e}so>=cxV1x%4!Gk*1P|tqcfsuv81gvDxd$^RumcAvI0OqUYT!oG zV0bK80(N%_p8$b-$F5#Mo<2WpE;;&Kh7p1EP4@dUQwA{$40@a`Ogt#UxWgWeM0fAg zrqvw2ZTQU>6q2lv6qg6qFbXM%!NkKrj@wt2Jmx!D3;wpyb4yKo-1p2uq~@%~hq0WE ze+`WK`6#hhU3;o4z9hj=gpo<31}_oO$4Bi$z=8hqBA&BxU64EB7vn%RXnKL!ZFw5r zT~VH1;yy=X*-19UqSXFf_K}iusHauH5mw{++D>s649qUX=1yy$-HjIpsn*U{2mM(R zz)Iz8EW-Je`{}|ia`wnQm}9JYCiwV<=b~$B+U4*jji1kA>?!W3sL#k`Fy&^Cm&|42Z;~D$huBwE=!w{!(QZLn#rgXyFHKSD_ z!j}bePsNm8u`c_-E23692td$NuP&FJ6Nw=1H8yBlk_>{slP7TqTDmZc&` z)m>NNkL zE*n!^UVnI8)n(gCLBb+oFHa~6X0Bf=Z56=ob_$!ARX}S7s9YBrg|Q)N_qa>>hG9>Q zCLmfB2B48a%VOW9zme2i5(QxbWTZYnUKo&&l6HYSK6G|xk>=2SC>|qUFSCCqEDUKv z1EPU;&JQt476_f~p+BLBLyvfdg1hP*hwT z-bjzGg?fx&Xp9(B*JLY5rw2sxw8@XT@v~lkdcyI!m-rEqbI}mV26j*HF2ctFYt{=_hj7S{hZ7L zwWX)<^A-?6=6}xqn|y0_)iYkFpKi`3D(vnUDc@lWBNHte_uX);>3X4IvoI0$A#E0- ze#R)3hpH`jU^4KsC;Ta?AUAKm+?&~n<*1!rmKZPyK&G|ZeU)bw1SYECw~_U~3i1=k zSh{z=3*JVNOh6ObS|c8XIJ(&*9LoOXl@u^`eCfCVP2d?YGt4J0*AF|McB<$OsGDW+ z5or2A`!(*UVhRW64bG@avIm;=A)=Zn%XBGJVe*zRfaDDANk4CF7P5$a4i;qaEdLtz zZRoP4dl0ge(EX6|XeR<&6PA(QQbeEy>)n3~TR6#*iC%j>f$i>dPdcNRe;wC}UXOB| z{i80>UR#PhulwSR?yP@V3-&-t3YKTh91%0 zq4XUtgI6(Oy$0xc=y>KBDSRrYnO>@nf3)f!Z`)3vN&sah*x3Ec_4MzJpPnAvW~BFb z#Qks?tt5zfU6jw7P4J;g>IX#{+DY45xfN#NyPoxGzTz`=E@eo4}RQ@bAxfo{4OZ^J*Asz9a~~w8XV1 zJ_*E5=9rf+pjjNG&b>1FquXMJO%~_eK#3o0oI#n$MMwT}UwlRehAu((ywYJZ7|h5wVsUmn z`$qCF&fNJ-mxC&p2?X3wQyy&ZqXLKFFH{SHCzQZF2$36+1x0dF)2USN|At| z;bIkzFXCF#e!nDQy0Q-OQ>-6j`Xp>2{9HA2)?VLHJ?N!oLnF=4FrBQ2c^Ebsw$uNb zRd?f!>q5)!j0@hP)tBlg9rXNEM=5XkARXXOdiizr3UAxemXDkK)fZa~D+xC34F{4d z?pdNfP16nY#~4LiUsKz|0-3~bOixQP#$o?~!4RG3w2sF~-X{%&`$xBttL`3|w#jJZ zEe6z$^zRZPO&~_+MNigwNqHeL?$d$~V_PAwBY3gVi?I4Ra%a+d=lT2jwqD{|Io4~w zAADg-Q4tkC?8Jpi!qVi6U1PuTc#)j_y{s0}!RSQndmN{q<=B5nImJ*|KQ$whNDm?z z|A4Hkzlzj0Msv*&F;UQ#aMPJKfMi%AmMtmfczX6&jhn?{R;Jc% z3%_IT_HCL)XSl;UOpne^!Y8a5&Ss@ciL8+dLt44~jLK1x)^_Ly*AL^9J$f0nNaMV< z7pJL7B`HcgNP51B3>vgF5PW=ERD$)A&_HV`TY%t&D#&~nCzn#buY8l`q_jFV)mS3y8Xx=W{kSk?Aj80>3_!~0u|g%8 z9$%K2e@x_V&6vZI3$L1f6NIHYJhTK*)dGhO$!?Ks4lrquwGN_))r_i3Q{`KeptCd? z)zN@k|2HhJ-fG?l#4GH*DN+jbi^m6V#g9bqnyC~fcdw#5L_8!x;sRdIKOqRMIP{!X z^d*aE!|b-td)i-f)fX0qtffVoq(Y22IlSkLo^x$c^D^VeeR{5L<(G*~_?;*60Hyi? zi8~9Hc^78Bb!hiyhqdsv?23Mh&I?ceF0267iboI*mVFEZeuhRY{DRhMJe*b8kTF-= zk6ZbeVlyJ;5t5}I4C%tNJ)PPVn#{>pD$|^m-JMR}jP3coVlaMpsYAsd`PM6wu1QaWV+UU8_?T`rP6q2Emko)zsU>(+JX zvoS}J-bH8ddi32#hiLfqINzwZAu)+I-X}8U5L3>pn8y(ot2Wmep7z>v7;UO~Nw~rr z%1hfG705F+Nqq@V5ZhX9JAxftNwoMwcwg~|<1bxT)KBa3>T~F5#fw0)pHU}oreI87r!mKs1OyB+jAZw(-%=bB{XjL2D#QV2k^4h#{Wje`8JNn;PO8btdkF3 z#OYpmOHYT}Z@}v{$gSD>UMd)Tt=^X2K#Xki0%!RUon`k$s5@fDbN7YlIzhS8wta)I zryXcG45mo&6r!#Sp>O5o4})$lMfd9<$+@)nojj`VPOKE3&h5m!W6&U!M0xm=5l=eI z+#52?Qs3mLj74HCGWR&rL*ve8Ddah;&4yar0yPTBwk)TSR1FV1ns(_<{Xum5>2(F0 z1D$~8alb~E_BXZ1eyK(ib{9x51fI&pMwxzsp*<5oX2DPVy6>&##NtDbVjl#7K9lWN z)cEW%eoh8Ml$M7Y%zf=$!qJ`^LU^s=AsTh&o=Ksbk&c3fGb^6SV9NK9u4Lrjf0qFd zg}cosDS5$t4>EZJ)jAHYcjpCX0!-)NF2h6ptY;;-SF38uq{%OsOrmRa?&1L(WSXWM zY<94v2z0@4|s)C!>4=vh? zAwMm~noqPAB5$P6qXLb8z|4(4@KnJ1~oj^hK#4M~)` zhB_1*sZ!Kd8;HiC?YkpThPlkPA4>x2xfQg<7nGSwBW=JLZ2e>{1w{;J* zd-U@NuKR5Gv-sf7vm+3G;qZDq*NI2n>>q{b!!5fo+2euSC$^H?CQu7B&Xqvi z4y62Tv{=d9mr|{&nsw18Y+Ma^1O532)lD|BEpRJYm(4Vo|R(e(qvQ?sm zGmv!Fr^xuU!FpQVmqbCjT158HbR&-NvI}Y={ik-NzRthD3p%d(Ej9~+hs208vQOf*wtlNhVTEXw=y z^7vn%wezXlV~KtE0drU$3=17$EK3k?boyid!m#KY+OrWK2|)n}Nc2m;L~8=AHANZC zkqhKr|06o@KM+<%#=7nq&lRJ1P) zv{bGnQK~3pEMjh+qaZ&fVOC)XC5XF-_r^hP%nU_p`w&AQUP6Mbz?YBZr>kSBkB8#J zU+CQ*nK}kFwx5Y0MWr-eV6*jCY=})(#;InL%SNRrwzXFh7lu;DQ|8ovGc9-9Y>7rcJ4xoalWT+J;yW>PvqZo48ExwXd7$m~J6R zK>srLqPkfqb=BZqE>ajyVN$eQF5kQu(C@~ZirMVbaQiG$92Q&5j%5*}cNl(C(iM|+ zYR_Be&2w@Z|5{5#oWqy)cN3v8?GXNx@x#pA3Y^0}eBSEj%Z2|on;3kvfsZq8)@@xl zUb&~)3O!TExvWB$lb3vY*K{+2{BtL%Q&q@->-tD-@_BK6l3}~YLCECR!u$@I_wsKx z{0{g_{1pF1RTJ&qZL$De*V+<1RdTz0`#Xc&SFyLR0XhHX2cgs%xRDNB8&BOr@=j;# z9!k*b%Iv~;mV|L4@x_awU7kBVK1GvBQ}ai2&)(?%A*a*N{7@z9)#ak?zfi z5L-ieUK&U%1n|sGllPOOv!kdBJj80jsx>}tS3}Vvi+{Zs#(8JKuZSV2_f1&(1w*3? zFZUh8s=;_hJ^Ha}U+44>!`EyNE9{7Z*hciz9`&q>Sn4CQlX_yAIHEf$__?tAo517m zNB>_#wMJ)nDi*y51}{ScH^v{mm!ZVA;-!4ly;Zi* zFj72E%_V0~hU$T4Sy_5!xmsj3e|q7Q#?3x*tk0Ox$0o$i1?k@ljC8|v=r75;P{Zw0 zq)@V14u_j?*&rWIE?ldZu%08N<1fu>D~i{W`xsA?rn&@NV&rpZvr?jN_ebV6@x6ZI zYSs+#K|Hb+A>Y@*g;;pXDr#eEHJIqhM6-7DK57nhWU z-AnN(lm3UPvvN01tH!Wz;R{vAN{U>xC4=>LZ0*#p6MT#pQ!=9QFCkkbnx^(*=cM6E zKhYVx5|OG$d=pq=Ai)vJBTQ9?ak+(4G?5#;8|${>owjz1g=)B5#hVn5#G4F1hZIu{ z)}+Wmb`fUYKKz^YfN>}YpS)9hn-m6ebkqn&?9~U&nbhE#-ZwF0wUMVXj|xd4Jo`8} z^d#ndXc~O4DSozEhwfHnpuA+1m!foHtMBU8cP(6GPr@pfk-qQEK#=#K9mVl|udwk5Cw(`D{V>$W$-!&l&7j&c`o#mJ!%klhr{Im-C4gy@-2T$9K45YlvCcJU=Ssf z-?skw5H9h{kk4*?t)0Fcv711N;aC~N^?l*|ItoJ!-a+Pzhx#~_!|FPIJ4TE6luH*T_|E`ip5T5`--PLdY53`Cdb_WAu5+#BsymGru`CC ze)wRl6H9+zE~hiJyg~JmKH}UqL#)F|DmtnJbR3$zYlLVPq?MoyjKmF2Oi)v(C>l`kdV ztUodN|Iav!n&B^v`vtQ%%=a~=8CN}ccVGJ}5Uwm43Hj|P%M*XYd)RA@@4$4!fhDE3 zhXw>?yn?b710l}H5EBDO2q!|0;am`b-!yWw70Mitri-_h}gtUv0g*oP9wS~CkBx{A2FIVdBd zGM~tJ)L&IjM@Z+cmZJ~En}lC*ma6reML-`bUqae-3SoZrtq#7f6e!RhH--n~sEKo8 zM4AkDX6ESqk=#y0jMT;!Y2N!{TXEL4N6*7^rla3H!G!ePTo=8)`hPP+uU~x>+L}#t zU3Wj`cwbemra>Z&fXwoM@)(OSlTUHJ6V)X;O@&>&G#6Rc(jhM$^3=M|=DiFDG+>KG z`z8JA2NMQ7bfO)z?VGsn#wHdnedkPVLyHjkV#C+=$Q)uy?rbQ9m1B+sSGa~s(Pv{u zE63TA=LUkm9fnh6#l#Gv*3uZJk_drDtPFL`x?;8!rNWw@;;G=N;qj=jcr>pA)s8Ho ze}v_^fpYaA5%DFn5Al?)dIx;k>@NEMrp>&lRoi#!cq_Zp-;Kx-3XEJ?oQNhFTTQDE zzsDruDrLFTUi6qr{ro$&;H#Q4o;+qpdDHozO)V{%n^$E{fTUh!5<#4|B{?oNWqizB zu+;m@JthAo$A}&!1Pl7u{cB}RmjIhrPzemDv=?%NC)CtP{_+C8D9-49l9q-=DB;9F zoCkXb6`z8#kHk_L_esoDad5(cq(mLNj;N*EB}9kPs-{~PunZ0 zF^Ha^NLiA?R;p$YV$1T!zh)Fgd|t2ekzIQHK=o!CA8W@uvsTcncGbGts#8Ei?*J|N zE4AywyIyTlZ2hC-nsiLuG&?oudzOqa5mO>5XGG+tB#WQPV~imOg>guQJKJnc6>&UD z6X$Orq9`Fz!`Vwit{D@qL+VgOJM{?bgvzjubvd?$ry;LjiDXAD;l-#CF>E3ziV@tlzCI35{XU6KV9t??_6^36Zz*biBNB+NoFA1fEQw(qJH( zKqS5z{}#o%b@SOr{-uk;{mkLWm$Yh6+U{0_{!b@Ci6&23bE_R*VsouV|4J59Qdz6u9^h(4Mg zLpe$T!iAlc?z_wvp0?;n#iFLT>Y=hfXE^OB1epE!efd7o(mE!89}EtfR^#PnFHq~> zHGCvrb2Mk?EVDlMu~(U1l7E|c_-9tqSCk)j>=*Iv8#kVxa}xv$}m6z|Qjj zrm<(OT+J0Hcj|WgEeU%n&|W?3i9NS4_s%wqDw*}kM%yDiW?fExj_FAj(Eq%*9yNDx zE52N{px1sfKu@{cU%cH9ee9!eDW0nE**aC>$ZL#QZ3f$jJY*=#WEx=-M-;;BpaR8b z{qjkn(5lu?xw_%qc0EF85g}d(t%&r-85QJPrz`H`mAhDStP~qNZ8p)hSDa%{TBp4+ zz7Dpg`Ryv!NZBj%`Uy%mxrFRB{O=C&I^nw)KGhQ1KnkIsSind6G!6ZTAiW-sdzUiB zF*Ois^LxAKgv@*T-sQd?X^#A|09!NviX)KCoZu@XuSc+ z*&tmXPe#x7K7J(XB=rPUj3oszM+uqVri)M)OGmP9TDC#Gie39p{yN(SC{pNhAvFT- zE=rV6Cl7K0%NTk;(J8fl$C{T~+s>JwulKh#_Gk(k6uPr749(w@R+(6kk&9iwxa)Kg z1pY1D@RFON&15$9D-tALKby6jLvm9Ygc>p88A+2JtnW zcV4SsTUMa<5Ptplo@7BqiB2zF+tk&fEY&E$8#bOSENp${#&>SIYas-4vK+|I`C=BQq8*d5Oszqr;csT5B(_^TC}yKod~0J zs>PlsC+gLOx^xwnP9!my$PNyeUA>Y0&h$VW#s#rvsJH*rf5_as%SHhc#8SV1?bRzE zmKFM#qSR^bo zh!+EnO8Wi|G^A(}-{!U3?tlWokMq+%_hg&l8=w|a3(A;un$7=V36GYK4UV&VWYpXf zu4@FlaHmJV-Y*=tl%D)#bUFwoU7vpQYu%b%LQo1?%gTPy5jr`xtatKUY@ zyq~3zt(xW?*d5`lF1~D~er|p`u=dXLtyBF6rm-dM6CDaQVXFA{6OvU+RctO5`G#Hr zIZz?`r(p)TnPNO=meoWjyx>R)bxhKw5kn?CjSzay4T@D`$|Q>6a2bXW5(HfHN@P-_ zF4SP&u~*q4gI2*CS~ zh7f+Z(E?TVE5NXTssSZ6B`6gh0Wf7Ra)&%F4{v?^X_Q4BR0BbYr{O414!jG{*i)^*%R&X* zBT%u%cMZNhzaFFusvG=A7=nl}Z-K;ne+ck`Kd<|e6%YwhriJZglgWdwLTO|_WwInB znIYnE$Wq(iNn~XSEEHy4aU2`sZBF%akq=+FcAdQCs1PMjo&Ro>AG?0hPOKA1 ziI}8aX(iR!>0KbywD2>6n(|L}wWG@K3J$=Bfp99OX0m7~kr@QU-d z?R(?x)r{Qh=5iQ8z_WkB9bIVP#^g14DE<~bCjbW6!#qzx*9TpI#fRHEn4t5l5%}L` zyGy`8DH3|6*L^bs%D0JfE&nYhQS|piAgedXx~+_djzA6jT|T*s$r>WYZtJVORO@0% z=9#Wf3K5a!vZPe28$(VPGqnmn&q0gpDx}+1JHbU*?^Z{bEz(~-dY#)I_Sy&su~q>^;_>E;ozsxPXk3*1G_%Sqk&E&hp`b$VX(!>V z!cRukw%N~}9H?-7KA^ENW3u8?#yt!KHsWLUid-CDuOe@NI&$Tkw`zMv$W!cB!NFJV z5+N0<90^ge-WJ(<-hwwKtRQVK3q8D znI-ng<>d5fFGnv&(8lwgRP(O#uBWs1>ZJjApL#J^228XcwCQ%=AGAaL(R{3EBgHc9 zOmoM}ta8(ny;~ByRq|=SX)Gq2{@S3~3$&Og{`domaf9+&Id30OQ3z?as^J9>xj;+s zL<2~&toEQ%w}f1l<7=?x5c0S6O@qHtJkhN4Tl-Tb_4)>V?#aJv@ln~e42wyUrq@@BF1W<6$jI3?eGy+!a4%bY0YhvAXG?GznIZND1$u!Z5c@hV*W}71a6Q*c>3d zoHy!VXIdMQo(Ijb|IjlMPyXH)Zl4)YD>5oz?H@EoV>3Qri}07G*%mg0{6Oll4nq{H zZ$dNO=r9vzD*GGv_N0OHmW113n}F`tBZm8vnyI8v7Y%ztO~o!ES{Fh&&R+1#RP(`K z<%mDqM(#cqcs?o3C1)>qR>09y`6i3l=)o4EF~aSV8!(x^B#q}VU~9i+jM`UowUihH zDVQ@*?@e`am%c~-g-rL9I6IH2qUMn|XybyNp&t|Iu3c>Ucz^_^!d_TNH}~8rCs~8SBnf-&mCuOR7*;!4WY?B(bP~!N5?!4yTLAA51N0KjdzmMPdoGYam&4U}T@0YH1DnS7j zHnc-*cjVO%Eb5ZOjS4kPOPw)le+gdR#rM%$<}1j47c#c3d68#w=YX?2a7R4wJi9dz z3$c2Rf-Bkdr?3Yl-USG;odV{qt_y8yZy4JKKw0*X%4bq4;Z`2B?Xs=ce{1D+9p&|F zF@czB+T;iOIC1OE{cWEape=z*vIg6MAiTm$=I{#b9SJDhs^gN2uvuX3fM{_SaDNzS zgZ`?!=ARS2SSgy%@7xAH=p^@cukdVAhbH_%Y1DmT@ZR#Wi0cEzwunR4>l~4i&1O5j zva6#?nI}nRp&B@HI8Fgb9L>oxq`4vPr#~5>QSncpQqO8=TS1ye|>R8MQTBA z;Y-TOYWiH5`2K~kMgR}zV(CWMsB%;$a;mzc3Z0ZC?|dx&u95Fx3oma7XWL9>)G5o7 zvMH96oR?Q2$Ei0e*1V*ZkwHLvSSyKdW`FPQ+3_{3Au*71DtMMpa(r6ddl~iY-{i5M zsrm21*xx@pB}@}1u7{jDNk1PM%i|Lgch4bE9z57Bw_CRQo_4B7&#^Q1JoBVL$aJiR zK`4ZXzpq5R(l4Xneq#AdA8YWjH-xLirgr_}^Gf`$lk6w^5v~ei5D_$Hqt1Wsz%`@DK%V902;Q%@r<`8CBf_qf=@L~Q%PG`H^W;KmqI_$5@n&ck5HbA}8 z3aHSW_Mm2v-B7vH`hVR2SItuL4xoAZ9Xk_8XkoU9y2=jCB~i3p3EkypNwVbe>|KX( z$@r@|rrj9N=}U1%e9Hy*d6N2Q^j0lnHPCSsiue7hK&U(^liM6K$cg zZ%nu&gbdC+dM0F)_%2iwT}dotl-eVd@o11xhPaN|q8^`{QKY{zQdCqk!SOQXRwPL9iEux_pxB&f9|HS1Uy<~ueA=De0X0S1G2vs26j2%c7s>N?mgO)BEtN1^o zJt@z=egG;)M=hq*Eqja%1S-ew>BzdH6+K_cIIQj{y6@9h(&S!;M_}@*-n}rb{TrR8 zurF_VA3~zp%H+g2V1mPelR-aOjf%7*;E1?P&Uiw>a_qQhP|d$>>)b`)%EKQ(4$!wPp>ZW8Hyj$AM3xF_=9Bq=_{klJn? zWp{l^p`-aVegW(!%_rVF1tDx`5zfkF8L`1qn z%#pNZW0_k8!-I8mAv>42r5&|F(~GB1Qlg8h(j-u$NHTfH??Q}0ynz%fCN)=X#8>QNj2<*B-9CuOju`i-g#sL5Nva_uI%Uh>1j2 z-;b%hBHdca;;isVqza1f=M*uBACb;ihOsA+={)a!Vof z=#re(lePxPQgKZlI$7v#QCu5pwmV(ikH@Y+N?tX+~VI;rW-#tb=tqlA}d9D>F>Z6}W z|MH`$=?C)Q0_-LFZo(954M|=ddJm|N>)7)1YJo4PX9BmJSn^mB?9Onj;9l6tPg!iH$z$o9EgFd5(*C<)iVC&4**7J>Uq`CebR?FPn_}1RzTRR7K}yV{L;10B)6!559MAc7Dx=7}IB?N-wt%A6?o-6RU~ zr9@wn!(%69v$hu!q@t_1|1!JDyjAe?g=B=hT8HT*8yqHQXODXvUZ)RDW5g~L19hVf zl}rZBH`PG4^doU3@hKwfysF11&c(vvZ4-#1`dE zu|m@02%!e!3;u*Euj4o}nqrLZ=(h0sS0^e7BUCp*`Q|s@RO-YA1YM2w0?lwrGQaPo zxTz29h!G^9B-a})E%6RsJugQB!#4dVC1OF!))Elddk9O5TB7f`;Lq1^_M^RSxiOmz zu2*9)Gwz^@FQkcZP+quO>jSVeBe`qjy`BWjiUI~4wdEU;#} zL|Ii?N%DRdOvv4xHq_GcLF&K%eG?WM@eS`PeC zMykV-0etZ=w>`1fXg8$x(+{f9OD z3zV}yzCg})9Unyupa#v7_Uo<2_)p?yZCF=!o1w2YjW$`@Rq`SqI22FMDn zP0i0slr~QF)P~xPjD1Yu#3>Z8;+erHeAGqsiQ@5Hez{p-;k?t|XU`lwZ2d3?nnK?c zR>Mh2*-iLz08o zjL0@ql_LB`X~rB2rNV@RL4{U!g~MJWWBzayOu9ZH)!$rr!*w!{l~55J701?%HJ6X3 zlf~gATlvCbo<{WbB!bz%9~cPX>J?WW*OaX>xk{b~J^_{lL&rNDI1H;P>8M;LG(PjJ z{=W54+r<3UES;I)-7KKk`ro)SNaeCq#XdkHE-C2&2T4(hh9Qs973!bl4U{L)3mZ$8 zuu3#fo@J?*fKzKqN>>@s--6zZ^HvQCjjbkvdYk`_T%v9Ib&u|B(xN zc^@v3&8$FmZ$AEN>%6Z8=dnd?5+BRPsmvc%b_n)wzNF|ckPFEFy(esXRQCIh@;VDn z_w0Lp)KbEv8mBQiPZ#&+hWA2MeUpjdtBsEq(F(15gl-L($Oy5kO#c>tcpl*Ol42FX ztKmf$3o__4I-}hp!Q2Q>Rf0Y(4qs zv56_GUr{K$oIWg=c0@oy;=1nvfA<6h{*~}Vt*q_%2!pj(2yr+* zCI3O#8jOISMA0m?moQt=)tjqdK1BsPV&*Y9KYzDhaLf3JqXicT7!VezJ|*6)SO3&G zjZ|9g-!a&R39%s8gu?H7B~i9aU{uXV%qq2RykTiD6?V%&s2wJTutB)>`px@|#bjK4 z`O<0?S{`|mH?Pc>w?YDO4}FOV?89J1v&bS#24rKaJ)Drl`0Vl5W@k(xhZ!lwL`J_P zsySD8Oar|Tr*gY5AV%*VRz9(mdb&j-n46sDWGAq{>I``~>n3lzlZHO+q>vfPc^TBk z5m|E5t~7)(9zyA`PpTUiw0=8q9~W(+^ymJ6j*j%B?^9c!=MUr{+S50YRA8W6t|;HL zZ|qCnt8j_raFpAu@^>Si5ie7^W4iH;GjIZ~LMnqd3=V5w^eEWLW;GV6!*}m9H-}3s zhe$c@S*Cd5h_8km~+a{u$XTiKSm#<8T-|yblZaP++R2?_8CY9Zu8t9ra27{viuWc$%a$xv~Z2Mh7 zPAlL3pu969PABL}0v>L-nxWBI$yz)UzL${tbz4-pUZAK`1?2U-C$^rEHd<*!GI}hJ z_MflPFNM5R3`zn0<(U2pce(W@>5#W)hqVN}Ik~PxqXjD9qS2rpN!a-rB#qV=y@O{g z`D};VrE_=^8v6k|;2Qa?PNOKD5GD{ZGeQ2a>p0AF!K8ee!8Q=q-^&a1A?!~p883mLr5%6t%bIlG> zsxvd#wxM&dPq`U@z+H=pH+7(ov?E*1hg7d}w$z?yw3eF*;ds3`Wv1A2M2A;G{9FD# zt%9qUVE6U<**0l{{sBWKVQm)CCHADD2q9+fjLYypb*WK5ddQ0^C8{WWH)=602NUCGPop0L(&5MklVtKhENiE^|5gA!v}O; zRc$$b@{U6oM$-+puaa8SX6@#)jY?Cvmel-P63Xi=hfYYFFRx#3NZh|bPN|;^T^<++ zAnm#VYWN9y5mn?|F_8|RNUXMmG|F>{D8HFz9h686O|U_g=hhNEBz-A~z9T9hD!?40 z%*hS!GpOgIcya@Kg!Ct;|N82cNT56UPI}T36?()8nx{Gs^8wcCv-G*3Lp2uFiv)=% z_EYLW>PsfP$uu@JBwqjxabPolOMqXiOkT`Vhj?5`9qLn{U0Is{$uFf|p`+pE&Zz5S z7pI?+pJzE{IMG@X=xcI`krRa2*3EEY;K^Zb)CE35H6-{?e_q7NlmWz7X#yj+a!k#F zpZ8PH?MC_?LPDr{G2}=W>zsszd~aXMzzFC`gDC!AYblJ86aYheA4vSlnW-K}-3&Sg zM(_$TIzJ53NU$}FvrA+;n3-#}V-oiS5fG@|VlU%Mci%&zk?YNNSazuW*1zQc(iisk z3}_zo8| zeeuuI33tp&LvBG|+nDS#nw^}nt1irRKF{IbGa>2zW``NR@lg|k)CqB7r(kc3?o>nm zy04`W@q_k|1{~i7_{?5jGE`YVd`UUp);ILZ=~qY98&rak(I`^>-16``o0%jEudB=h zq&L(IBbB?t`%LwF&RMQ=GDy4xOhNyvqO-&hOh+3>?Wl@<^762*$wC`%j$;qp6w}M^ zvrof~TH2JPZ$Y@mP-ngqaAsP?KL5NpR`?cJ%m1!CQ0a`*Hpe^ceA-^~I;CHg(L<)t zS8qU73I4W@K$;`pm1I^+>0};kj~~j3YgIj%I+}_~gP^#{NbxldvxRh@C)iPwDXxlv z^!Pn=ALLuV7HnKq)cMOeSLSuI-`BM02!ubI2SeF)vl?LNUR@(#xjzUui@G zuRdnKWX{vTQq_Yy7?vL-w>IU+Uc>9bAQ1ZQ21gxVl~ZzoW{S1mDD>Fvv^RTn5f;wDX0 zbIwYn?sWIWQks`qLo%a$<}uK#jgo1ou+|j(O4dfgcve9n8@#!_&h;ppqbtQ^2?pq= zsVZMS%+jFZkxhm8OVX{A0E;HDGUysyVePw=8`yJIplEbJD4)F0v^shzM7+nE9lgvw zt`&E7^p6P(&_{O|N$Tv`H$%4RLZQ$$Gk*6lIi*VjCc!lHy|V3x?ipcm$fbF?5IJyG zJD0{Z@u3)BT2t3pkQ3Gp6Cl!1Z{|Co`dR6o3gl_;5WJ05<@dtRZ4K? z7&eGFoAEVq6qwJ^>8ba3`sRk1Y(yB@B6*67a-k4Z%r&}{XX25$j;CJ}2JpNJnFq_gfC&%;W#$;$L~=X3C55Mg&yCtm9BZ9)5%eK+vJ`2yj9Y;^q=$ z#jGri!zG52HZsN2mja~}n!@qef4%qVGHjkod}ZaAjnTwwwuQ)yw^5izGmhP@_s7WD_C ziuds=Qv5SA$Kc^EstFvPubXg+V!x~ko8OK=DPM2>Lz*8EG>3_QEdLEL&L%R9MEGIZ z&!Qxk{b`>68}%YeU*PpbApBWsVU0Y6EcW~H@lz=lfib?3NR`<>{Kc-?K#V<)a4pyRw@|m%L{V=vr@?V!tH>h~H(kTRkFi%a2 zK$cr?D9Op&vCZ1wX~)P;{o#CNTI?-9-9SFcs${4tsSg)BcQNV2Us?1zKd!_(FfA?Q zli$Wk<9J1H^*fQpRrV*>$A1g7x6=T1*EkL!uGam;^sG55rB%B78l0bR@Bs8yx>ibo z0)Q?oD4<-+o&WiXNh>GP$DN_|mndEV@(!J(Ce-$uKeq4W+2xPb9^Daya9_Njb~wr~ z!Uo4Rp=2$m1{30@Et4u7tTv%@n zX}oW^m7gyZYV=inxjV|wDFN}9R?*sszX*(uBW7tdx}H)^{3tAgC(>g>EKymY?vVqy zFxg}NZn&-G8G!pOYMl2pP0_tNox<%UvZ(j(J>BK1m4icNNePg|Wnp6K?N-d>&F*6C zzu}7Qa~m`=8T+W!&OCcIfSJ`TcF&_s4nKcTpVepnw)%31s7FuE_7j9}YL5FWfh0A( zqF-426112}Gpwk&Q3lrql65^)2RXUTxxkNaF{XW?E}w%KLKg1CObFgUpTn#ELV^;* zh+)~4>TOt;F8YkJj;bM@iY&}77W%qjn&h(RW)d~g`?Sjv{yl|n4W{zfEs33qO*dO% z3V7+^c>y;S^siFmUVDwzbbC^g+QDH!YkYkCMoz;f4hZuCxn@5e-#@>zM1zTd@c3`!sq+R}zbZSPQ%h%OXGuwz z2}dg{#EISSK>W8}Z22u3uFoe;y~(YNywZbjQ%Td>S$Wd=JwUU28AI1qq%-Mpn3S27 z_4!)b+0Bk11h`z)6D|8LBPZ+Y>yIIG=jK*yalE$qR!H`B-Zyh{D9rVg1*ZreQ@kBv zW7IfYEp5Lkt3*q5FRYu`k``Ouu`;d-p9uSQhWlvqM0$)A^)(r-0mX=H)^+mQI@cCQ zR*+0f&HTbAG*#N~%BP&d^x{J+L7U-?(U8^8$<@JpnBqu`h6nF|5C{5vVO4mYJ>K{+ zjz(WY9=Z+lFXz%(p}b1-)n~U&eO7`qkY(GO%H95CC+=U9`#B>BOX{|ac&%ZvjpF;C z!rWfN^x~oykmc}n=>h6}KUjd+;*{|FgCvt^-J@oX5S&_U{nE(_zLX_BO`LlJ-Xk( z9S7RajPC)i5ZuaV3UVirpobmM0J61ZQt8Og&o3@6E-j5Nd#k56`tV)$>(O$H>yKLV z&B6GldB7Otyy05XCe;x_1vtg|xw-wbxiYPV+1Whzy(938%1hU#f~4zO0e^EGSAIB7 z%)Tjk*Qt04sL8t}Np=ZBpO*NfGy6npWST(Uha)z6da)hdEapnhaKjG0we;wp8{Cn} zfutQ+2`J4}=|>rHbz*^uFkKR8-Igg*Qm>uJQxh)fJ6Z@A3VuQz{feac%QG>^$Spr9 z)g{%zHlb<-Z|h>szm{-0(TgPn!;aDu%XEp@O~l2mdJOAt+_i<2e3O^jOswt_PoUN@ z?YQA0Q7DGWRQ4By!hb;;E_VpHtyJjNDh=CpMVEmZ3#1Teh4jP&CC_$1l+5Y`)a!@5 z)2~(lz1!1ZyHF};pskHK0pzuTrYcM+xVNd^s*>JV2>;Qv&QrkBX>l<(H8s`J#PQhZ zHfXdX{Mi81w}EV$ov0IFR&L$^-KxQOvZ^cbnB;sQE6GIptRM)KLE-KJ{@MZP^Z>1( zCLq2llLJumfPT1+2jsgYi03YsKPer`oeuHx@*eC03Na9&%sU6VGBcAuVPlOUXM;R0 zC%JTwhhFq%jvTCae{6tNAX%UQ1QhWK4Gl1lBGk0gC`! z_;F|X<&Ts46fFz8=~Vh92wjp+4V+boNR@9K$dCKoB;-40xTUd?M|(lQ7|gK2oNi|s8#mJkcUjYV1;xd0_AB&M_4V7lFDxE9RU*4( z44@7XF46~pDB$AkEHx$2>9x`{5%vd4zO%PTj1Zu_cLDqm&_7FPjpG0soHILahHo@9 zK9&9kdhiLkA$revESe5~WiqYC8_DVZKtt#mX_d$Q1F zcC#5a5qq@G_3`QqEB5>m!I)dH!TbyHXUQjv;68#pYTI6!4DptxdTuzB-?g+Ir4bp2 zT6x9Ht}tXQ)?S!a-L3;PZ!E&Oiim=P^6H?S)lw($a6S+t&W?I~xiV^4QXn;Q5QJe8 z)OQ!lzbddMw>xEBl5i4qgO2$=HYNTcave)zh^>2X*dT~1JjWz>VlZ|?7fzXWk9AWo zs3pDF2F!o_>q_|+wzg)hbQvI-i?^*=x=ME#=T=4v0S%lxlc_xMQ)4%5G#SI-r`Fs%e*;;pGjD)@)!}mEbpWE6z!L)5EmF-;pmHs8;wsi}S?!Dy9NmVd@A?&{_zGI(sK3#7^JRxYqyR-5Xx zmSWb9bd93MC|{P@mj9^{8cxhHYx@*_sbnEF)Sl(n)w&X%-$?XTvvzNEC`OkfKUhBP zi2&yZ;;11?g_?{E!Z&j5B;NW2Rx1~|%6D%3k8p_4huyEq<%h=F{F(B@tcoeDH2xNW zO`+Uy0`D2Bli7^6?E@@02^0T;f`-6z3p?1kdt!KFD(Nul4>VefsVZ4kFW^g35SUZ& zygEap7Sd)Gz5dSzxt(ukBD?Hl{MJ|tua!ZXhmY@Kqs6cL#YAfHW3+hyWuhZY4Dek* zC=?eTU(&>&-U=(FV?V6bL0M{KbQGUef6+Tg0LJhmh*Us@{>6-}zR&(=z$F06p%y2h zr7PVl;5pjr>M(bqs=uD)|JuA=4GavF)E!lxfaa^)jP-7|CutQq>f>)YzzT`c(&$ND z1~e4`rdMahB<@={SuW=_4UeqmI%y$;kiiPQ{m;_u-vghVVAeAzTF|#cw9vJ(9$ zeMj8k$gtna2{~a4X%*fK2+&lwyi^KN?`d|oNb#T>NLTP;WRg%ZW5f=aGYD)crk?!) ziBWZ>U<<`8-rsKBC&EBzCMl&OcuO4C*E_%F3`2q^q?H$e#*inm8k=`vEfRK%caty8 zG^|t1BETwk6t2*P#8Sj%MmZQQnd6eOW!NtD-H1BbI*n&Pd5rY`#pyqQWd=fZ3Qgif ziwgc?+%vDDaQ~OcDINf#Wb@dj;B|mx4n!o0jFoz8obuLzG{6q&oX`n=^O6yy1?~?-GYU~l znCuY7?L%&NTY}UnmYX`J8kcRkT=u(@`!^oaLYDpCf|rWEXL~N`n&&FzYO^F zc%2Y0pCWNu`Y?3W(KPq%vm~bG-^5rMJhd{+5m;nODy(MYH&C}YnATZIP`HSVobcP! zgh@=$kQW|=-AuKM2S@mRFp)fkIomGs^N0>5nrsC4j|nGC7T=SFSO_?mQ4A^`qK>ysHa>icWv`+d z`i?;dW_#AaLjA4y@4{tAaYe;SgRNE*L0L;oWA+on3j z^yISuY-WHv-)z@0w%IoFr@(03dc74)GFTqTW`^9NM2HpWImSm1&pqH6!7^N*2t}2k z^2ZO2WY~vMEIJVPMS)n!hu}V=mar7s`h7_W`NQTp1zjJ{$dLh-&%xB?d~mC9uqoyu z^Dk5-i+dz~4-sqR@oD3RLyrhEJE)`1hT@*hng<#4ZU@0f6_h4=SH2nc=s8Awi~E~Y z0ks2e0(CDP*SsEm@(m)z32Yv()yF^iHx}{armumU`}fdHD@m&d_19EstATxe8GEsP~ zp_t=9GUyYj<^Qt6CzW>D!T6xYom>`b?e zrsmXehdM2F_3s9$r)MauDUJX|GXHbaglFP49UHvMEff6bCL<50si(c1qKugl#+2sT z#L}D5v_R$^wbuOtc)&`AdW3#1ci@~j1>m%IAL&I_C5xA z_k2SAke91d{KtZe<=v(?lZZWxSY6c%6>p&zSK#>d1MYJ?0%ulLBkq_EbX@{~=JkFb z4Vv+H33AXxcWc0TN|1l8^A;&VgIk|;ih>wBfe6*hM4zZ3(5=O1%q%F8@sifSuhTk^ zfjN6aR}+WD+l0`bP`QPPzf&p?xiBKA%}xk204@!lt%9q54OVIX`{HA_a9~J+ynr*? z0RHGoFjmcr(!VaQ&C(L#p<)(09UF~iA5*2(-==+jznlU02q`~L>VRr-I! z0*XIBt2Nb@vhQ)DVqaqp-ntY{_osj#lu7uS9Q#VsuFHP2z4EZhldUGYnep2Fx;l4 zut&(ox{*?7-XEPgGfEV@ZVvF+(<=4JWAXTh1Qv{SkZ9{Z_hwQ-4X9OeSg5n8s8{IBxOIQu!>oVh+_JS;LvH52 z?RkCoDksXw?>DcKrX`06f#wY+w4oHvj6x;SVc80OLJlIcGTn0a%VDUJLu=4LyZ_xi z!qJ-X7f-*;RqRc$G+kbJ7I$^T|E8Qc!apu!yBt4=Cve34qWzprq&Bknc|ok$GzHmA zngTQEWw5whmP88mFmUkc1JLd)&Y2;Qb+?L76d$p#xAg+~(YzH19iYWuc%nWkTE9%A zSYyPe@jpk-Vxwj~|3d7CGDYB-P4N^+bGgek{Y&Cp;0+UsM}j=s4+2yjtV<@Lw@y4> zel6dikuk#K!?f{q&dL)LzY<i?acd; zd8`yzsrz^|>;dcjO=gYwBFoPH*xVFqO&t&t#9ligT+wWHlA7?Wj$*D&w!=O<-1VT| zP9$@_q%le8R`gh_WxPOf<$?&bicr%EqH77qb+6N)udusCn{v_0i}&z>@{-?gRH@m8 zv}JAy_Codh`GY#2YtoYe)BpA=uVYQ)Nc>O(!XB+<@y$rOox?@nGoZf1d}3*Ve*>op z)i$d1(4eT`PE@iqAn}G|+ovaiu|9B8ZNhj*pzl}s-*o!e69f1Xg0(zUW>b+(u3ujF_};zyCyGSO6PH^xe?Itp8RGT3ZSa?#x@&uX$l|$|zqJ z!OGt(155K@46DFqIP#m2?398KF=EXZiW**uRHwl8WrJl({l$L{Y4t`g-rq909Odrr zI(6w5&l(Y%$;ONuvYNq|FPnHPu(XLGvqD+CQ+Xq?-;Uh`VYTI*g1F{sPl(e#>NaH= zsvYjqbPbEySQt6~z5NlJ!zdC{=$CAr3u z)rVa(=r#$&;&g4%C>|P*BR2((8z(qH7|hzF$Lgl2Ixb=No>cr}GvMTHjuzT8#`wO_$bc zsA~ibsf|QDX_{+(e|uetorIZkzCu(|(d*+o_9+5QZoHP4p`^V0CU7@AX=N$(+W7|X z0=C3;oGO`ryQiqs|7jcHdyW2CcP?KZ>*?wVSe-reXk+_4tB`d}q0o>m54>^dt{5aZ zB*h|ebKg_wo%?))G%|0$GX7TT0xuU{&!FVdzZ;kqzVMl+5*{}HTp1)~&Jpc1;p^{SPiB{pYe_llg}@#pZq97!JI>fGoDq6(Q@8bQsNf(jklCY9(9CGWddjdO&cfl{k|rAPfsaHwOQ^ zpFI)Y~7ow_Ra zcycT{V_!@$F9r<;nxsj}&9nmPOIE_`+AW?z^7E$Vmr5`?rEV|B0CuzH_zIe6Nb&gB z{|-I7ef&AWJk)Y!YMK~mP|Y9Z3{;*zh+~A~HF5muo<#{8yJK4pa+V;Li5cDMf~D#( zg=(_!8M1LqnYlht{6()ag#Kp?g+0{($BJRsqbps(Kuj`01#cg_X*C8{pBusL6Sb_k zIMkos%|GXmv$BAXutwV#OT}?{$&~R}u=vE}%A<9>>zq=Lj46)e%1AA%v2D z5|~SD5@(w18gGs|8=s)}o0y@aWwDvL*bSI?a(N=z=*KsDE=AxoYdaM%xhR;#mJ}EB zPdD%*6*f0F*VkW4El`4i{&sR~D&7G9CVfA<_;QFTBQz!?$Lqb`>0g$5ZpGz4$XWf3 zg@si4ur@Ld$K1SU)?HH_9STC-0?l%^{eSgOV}AF>U2{Y>X~U4juzjIr_2n2@Cs11<5Z!uzk(R)TMgS$J(}XeQxZ7D8iQ#7IwJs@$^~`J z+YVvy9hI4{K~WhGA0IFvME*VllAa+^u$r|0IzmNaTI{uK@Nk3pj#Ok4u9JMg0&^n? z3ONV@j~mzYXZ?2zvj+05Om}cJtsHK7SCq2A##=r}oLPzoRMiy;qHkLhyUm0KcGD9( zPQL%>pV+MT#U(#fpiV#EERMh9f^n8RL`1Xx1?9oz%;~oACUG<*sI)*NT%TkAmxxmTU90DG`6Uo1wF89?8x<>~P+ zF%i+@AIGQ0m<3Rx2fV$x`FYX>A`coM!7MK?pP8Ad{1#5LLRUjy|K8+NN}Va-$+ZCI zj&Xpx2dFE9}^A4NhtH^4IL4zx;}KYwfqFG znC0l3M>FAsL?HI*Jh7c+b|_L0`$RotoxSKcbfSvM;h{%4&2DmpfRpS7F(foG0BU)f zW#b;Z84HH&jsoamsIL{;4d*7bqE+g=-QjG3nLdhIN(x&F_C=cJbwCz=#5@`pRA!Ul z+GcX31nSLOWF1!LSQ@ZT0a_4TD}7B(UH}X5zS!a6<@GrG+3tH?sn>MetXUOP1K>R=DJeMGK|oGF z0#q-_G_8fdnu6{9G;wcq(aOk)MMaTPdx!!YLQ%rsq_upM{Q!wa)i08VhhOqIz97q= zr0R_GC~@t$tMcO@21`I*p=!*p<)OQfH%YwV-}2CDVvJ$Hdo(@6m6B}nZIR5egPhMuREKbcxp5-E6M%oO(9qQ< zETq%Hh>|+_PVf4}gwvUvQhrN zOZH9Kkv`iWWRqxlczE2m#{jGcyeIf~)8I1(hn$=opxyWs*iIku|B-#S{N(bw@*a0% zJH3aE8&;?-Q)vh{+Q{cU9CIkXj-OczUtUt5CsyFwKFiclJZY#8&Qk=1p@X}p4FdTo zwoJ)SC;>!(18booKSCc9O#U^roSZ&Rc|IgdbTRSX`X2U0m;Nc!$u*QVszYD2^(jT5 zmu&@ODw4N-x7o5bDrNXmLR{vcs-N4AKo<@YE;^>BpFKe})5IC}-pG7QQw!4li|!t- z>&&UmXAwp^qp>uOP0(IL)xOyOnv3@le8v4-P@)|mXw#^wsNfl}0~8woP#$3M`5q$v zYrqJ*$$4`iIvV-tU}k0}s{>sMEG$s)h+*p}#?@|h+Xpy`tFoRR39KLOzMc~(pmjD7 zOGrftuG@WeQ9e49u%W7I{;?E3`s?6LA|2gvsr+UJ(m?eR zixA9L4R^j$`71T#XrQl8;ze+I9!Jb~fW&Us1{g`;lbd}tG;no`3cnP5Ys5D{UhB+l zU(w&SON!$F4`#dBHChWz0R~o(r~cm-P?BmV6IdeN^y=FhPU5p$#3b=MAEpCXA}UJJ zyXkn%a&2eIgR5Nv78aI^opHhGh9N9aslEyD$NEuY8X+QL?MI(f^zG3!>4sKyJsAE% zN{sPFlpz6ub?fOVm>3L5d_wXLu{uL*2)BceSW1#rrrm;ogQvzia)U7=bs4r+4J3Qi zH=PD&Q9^n4B9R%9xfelvZzU1n-A3ndDCyw&(?pqWM<`4c!`xCQ?JE#=}p@ zv^$yv!FF+C$Y{m*@yHS=H{5QLn34llm)=v8LTfh)?IeHnonsKahp=@cBJyPwFkY<$NO7QeCAtrlH5J=IqS!lmy-h>w&TvHM}P+_ZEL#+ zgh=x=VvcuGpvnZAE0;?&@+r^Qle;ceP#?wVh9%<9j$c+06W>8l;`*$T-kb1DhwL@i#0GZKbMx8?3X-% zkbicwT>s5Q^sF4+$vYGm64yMqPfSDWC?&CLIv2!$#A09QmL=b@DtK5T+rNxJarWL= z@(?F3zx{<6$pzTD;^MF@6bp6-YLlD^`4r6`9o{pG44M(!z9%G*3R}1=b~@0+gzh(% z9x4srb2TP$=nI_i#PCB&@CxBTma?q~caWm&uoP=aa#wfrJ;3Wa<3gfhKzB)uHs*HL zkJ%8yxJM1d%eNG(k8Oj3MG+3FhB&@2Q(((@qSHYoU^fQw6m(|(u3mS1b%+Kb7DNb! zMR)A&?QJg0iQji|DQrfoz_t+Qp8qRE)(_gSpv?$4$iK_q|IzBa`xJ>v#7(~&ma6YE zEO^pJMcEsUrv5>yzP`R3w9H$KI(2K!WC33>7q7nT%ar8RvaM`+jiHn) zV(<(tw*}lkpL3oC{qKNnt)=yq-bhmu{3)7PEqetq!5L=2k*{_oh0j-4RyypArGpQP zBDDhzID31IBYmkqCu^eMrU0J}%Kz4iBO@aK^Yw@yaE1>|vlrM70xE%ure=7RQ(**| zfAibij1z0t#*ks_ET0PEyuE1;+aWj;qwkSRuYJ@Uk=Y{83_Y2 zGr+PDBQ!i}&w)gxS=ny`2jI9Cko)+RIJ{2Rrwe5|0Z9y;8J(h<6uKBoppXP8A!f?E zR#-R+i`vb>5T0H2-+sS@IqRt$;s znaU62TYSVDQkivXLH~i<6_`F~sbL(CI)fnhDJA8Z!K=I}sFcBN4c65i_HXcF;MT3J zt@kyw4Eoy{xse4uev4g!Ys_W;lY1GCg$Oj4Q-(jKb6d{U!Zf}2R9VuyaYrHpiIHS4N`zh&v9GtZbNyoIbF-9Z7!(qlpY>1it1;(yyfxCYdk07 zr%0Z~qe)&GO(11Z0(!ePi7^Sa*^^s?DnqSo1QQ9%nKM27$0XcIis)~AW6y%&bDP7$ zH||lHvAODKlM#b`;{{XHWyv4dQEG;C$A{8@3Xmly^8DX3`kthOuX13w>5>@Up{TA5 zC*nu`_i=pfUa{#|OntZbuIBXsqVo}q8$9mtb*A$|GROJW@Q?2f-;NqVTH6HHX?=Yx5s%!{+s1(~U}CDHCm&u4hNBW3?>2u$( zU}*aH3gq!BL;rdP81(>_{n&@23_elltPkhZEox}yv;5N1k~2~!CO>#k#AWNv@<+vi zi`~hE#O`D9s^}r$ZssbACTn!#p6S9@Yzz$PT$UgFdA!fJz^qV3qyIO6CjDy1dXk4ZgW*xBL5%cMD$$#?R+;JT4lIYeAeNy~K^0K0%Qhn4LQg2(iXj6_@(3ScdR zCKcUAjZFfGt$Cbx0CotP&d)4+z{hs41+!7?2JXVGiTklj4d5a$P5=Da>ag-^Q%2>td8&bj zTZNUa?K6QlrK0nupAG&5>e+s>T-_#dIa+b;YKAN;0ho8twyGVT;`U3X!_P*0Jzrm6 zYwHrZ$D^a8s`fv+0J8@0Tg;STeq{zQGi$Gd-AYj-u3Q0L4ysE-Q?ui=2W0~hgKvCy z98Jj-6E;`l?c2bLuZo%QPS3owC(od#w++hmK1^Db`n6_J=ZBzv*1ZPa9JoK3m@kT% zc>Efe0C)P+umbzi0t*-s`Vaw!^M;gA4L1+ZFIkvtweZK46Ms5NFoi}a?8B{FK{gdZ zc|If0W}bu&e6i!+RQ_E{Tbur2wcqVIz!m!P^8@2ztqkAVb0CWz638W(5(bqXS^d{6 z;rYF5iA<1JG$?Un0V!tEXVO!U6=*rGM`FMGvfVlx;upb;C0~J>Em15~msJ|n%~LX9 z#_3zhyjp+h8RqO@(1FY+{p2LM4hzZXP0!1p8oTbHakAQ@*$7p8RP9C@YBY&V3$mhT z9IjJ|jneNtSZb=8=OvIMXK2OuRImzpmGfo~%}ai9|6?|;(B-S-Ze<2f9(W=QiutB5 zu(PCF5b^6j1-Aj5VXWcLf&UuZU*HIe$1i*1z;+7wH((>>hV4F}A1Ey?Eqc?9;iA@z z+}iy#s->aP{_tn138YScj+WdhenuGf`kk$ZU>E|lXm>XXTbqiMq2F2mb23)O=ka?H zC@wvM%1n7#nc$yH(uHvqko0|K{`H;#J|d%E8in^K)#2 z*#bp5+_>~jIC=={JM>0YdlFLAdgba|vaZ>Lxl9@4mne9ac}?k_SfButTkZ_9D=?v0 zVbp23-3zvVFAW4hVwJr_3ce5c0riyU6}oa&co;UBC7^EfNd$l~WwhFl2M8^*^2yGB z*u!|%Mv`2yE&~r@$@uV`-(d-W$akI{u#;{Xji}HY8Sr!+kb1vkhqVtXRe)Ciu}bC{tK`Owj-)92sS0-0ecvXP`UstA~CNW;(Q<_v|jZ9Ske)wgtfro zKU+gV!A6$rgsST_h)cC}d^|kkxuRrZ^SHG_q#V{WMc~9xsjybXq>Mo_kyHFe&u^SJ z&+GrLuNGut{rc{{fIBK9*m#j_^PICecjx|absG+9)i>6B+*7Zc1Oqh_M;DbHo`qSt ze?zlwSA_T>%82cq=>BcD{lcN#;S$9~KDhoT>Gfg~5c18@xDCfmyDXw;sTMyriiIGG z!?2X_$$Pdn#K>OXqF=Bnx$o(YzW3HNCUG`$&WQjg<+ej#gSoT}Ijsuaew|^FWcq*2x8D822xxX#X$2VpSy+RX zEIO?P7SefM4Y{tSrpNy0R2$7uKWX9n)86hgjWW&sr+i7Y5q!quT7h4C8=wjY_^EdT zd>zwK8B1U{NV>c8IJ+zxJiC%{dE__Q`0A_t~qpB^8;mW{MB zQ!`NJv@Z9d{3hE-L!$xw5kMXDgy2QYP1lEqh=3aetd_sW-)@avU0p%h4ov2Dl)dvy zRy8#20J}l3uLHro3#sdDSlJ)D)*Q3&bsU&@O3eY#Z*aVv{tqZT)X>Lxfi(|O)?OR) zT@J9YJ(il9nszVABpr|CtSF4Hl@w$m!SqwHwG>Q8nCpZ9!eh`x$jSNnDBJGa?hr88 zu~=;q@~7y}0SG~3BGC(mzKWu#q(TH58)-t`=OB0(g3t8ZXpOY0%mnWPGWOReiQmaw zet)dO;8A13)!KdkXTtm~W(_RDhF??opDYyrM(+@AKTOeHv5ib4dkZqyKzRuVT`TJZ z_pp1I0qd@ytpOS*jUT(lRxHV@#o#REO>Fd;Kp^`R>2=hNpIddM^m6mvmX1tESe%j`ts#VFVwwX7f*fR9V6w%#myiAh?ltq zWmqs~4t7=Tw>z2f8|T0iT%D{vfsKl8wXwLX>qRgeikk_-hU3#8M{sLarlzXFQ{YhW zxOsU&%E)V}3W_pd`njs41eD&vtPuDy0Izg*KC5V2Z3V>yFn0x}a6vu>2B3G;JK<3Y zraA+jT3cH|`OZ|K{F~3!0eEDT^;>ykqo(>FR_$uYH48Jdowap3u!4a&VqnznKg?6% zy7D_Eua{lpbEbylNCWPjlhuLen3(~4o)INKbU=I72Ghjy@+b$IdU|CYCWf5F7{o@8 z=c!=lR*W?J4CDs2LL=|(PbhfIi_Ol39v?f}=bmd0y!3c${>FnTpFUalG=mK5c`;}k z`5raU(9mSSQoUA=1RK4{Tv1WFh3M~8I(2=Nbswo@92Tpg;G+N@xv0>q!) zzfbhfvNs?H+Xb*uvlCcSRj>gFkqHC5N^9^ecI3iaEd%#CfDmi~;V7%*4m{jzRuvur z#?}qFqjvnxlXAD{aI~dFs&OOz-Y>4MJ_c=m8XU4}TZhxTxkX^;;YM2Kxb!hV%m)e* zxr%3Bh_&HwxTwvbd1|Zs8D^Z=Bn72idHR~74>}irK&kZq7;zF*N+Q`}Q0JA#!9K5p zk6CTDX0R`cl|mCMSU0m^YZnZatxv6ZK>!`@|C`Rzfc=k2uYIKnq;`3@nWT5bYp}N{ zKkB8EXO3q|^8T!m4N?`a(rYvh;*d(r!R2leW6k-3YI^o>EwZ4tP4>QA7o?!28ld6= z?2!;`M!|Hk*u2k7(z9&lVFi2ArLmn_G&6iOE+5Q78XDm z?FsB7O>P5#>jDGmx?p-8yw%$QQg&l8dHI-E6Lbn`?BK}4cqZQkn|Y%)d>+Q{MQ|Lb z(%_p1@U9>UEBkN-s%js$+dX12gp+&E)5E2=KuK`=|M+^#uqv1K50vii5?F*F-6h=u z5+dE5(kR{C-Hig$2+~M*he&rLN=e6=wcr1T^W~i9^4cHNy_U=~bI(1$8qjHLZo%Dm z>VvKfbX47;v~qDP;0Oyku^d*DwRTT1BWFkdJ?n{b@TkGF4VShzHZ*KBOzfw!VP$ig z$%4auFSgi<=Y&8kz!5?FZM%sr_Hdd+uXxH)YuXb2dCTThg7rIo~oR*TA^YM>6i+RoxeMgALD5! zfU$FE?g3fxoWb8pbCic zm|1FiVhVZ1FPDm{(a)n6Tg*6ww79*Wh$5QKy%RE2<`3gWM?(`h;d~|+|7NJs5ULqyqHh~R|Ef(#W>mhB0xXM7!iIk8r9nz z6chyJ*!jGJ;l-*wxP0>1 zQCaWx)$Cgi9)!*_oSApJ{$XR^7n5(RS`&~W+c=J3k-?Qlmhu5RmQneKX^(@j1X(fS z5qBuNZ5yMQ!woA$Zt{)MaEEotK31yqo*N#Y7ia?~q(5+8t_UfbGTDY=?Nsz>eRGBr z%QR+b4#%|c+7q?H!YWav4lfQ|VkDp!ZA8kSX3&)fbr}lh=R~OHHh=&A4|=;i6mXyAMKtyAMe*Nz9(6RIJBiNFmEMvq_2Xj#;lzaDoc{X@$aqB;V z?VozTOmW8Wn%Gu$R5oU$3@|k+;iKo@?zOsl{h$hDoTi;Lf3}6 zk<={ZMazWFOQLn$?j}o-$yS5`SUaRIoTEq>$VUpVy5WQnLO-Xl#I$LxEQwMR%OW#S z>mjZSEnEfN3kNtJqt~&-7H@97le625bafBD!eDilswt1jn(`Y><7+j$lfFZNOwE|H4c5I!cU@muaZEj4J(g3)D*>~ z;Fu=e4Z~c;9>m0oSk8c7mGD!Wc1WI@lx*Vb-Z}0R#!@EF?UA~j~sVuPjleEs~i z4*Y%K#pQfDJM~}j`7~RdpT~PPX2jd+xBuy{uKV@1vbDwkrF3vq{vpm~04nGh3I%oN zwu4Ao5-CHygd)i65{Ox_U+AxcZU@|)7A1K$%ncZZ3-p6IR+Qv11zsXMQiY&%_#R8X zAlXqLQi8JX_R(+oh5Wy}$len^f3t!yEj{|4h9G%mz@fNlbSdaT@K{1Z43m#D?XnI+ ziJxTW52`odTP44EDLxq^Y8vxD4`WjXKEiw$Q|6=8Kl?R|>ddNF$C@eL{Ok-@VhsS@ z+f8J5@RN4#O9K~NPbfM$Ir(Iphe!Wixz^S5fG-3&Jlj=vZ`JU>$_ri|WV&T8WwhVA z*Su-#wffm;m2)%o^+o);9|sk;y2AV$4h4n9zJ)TfGP^Q7GooZREhR3y8*OTg10AXB z{wYGWm_nK$Ox}$}aqkwNx!Gnn{8J>3!xEdQ5BbibjG2?fJ&SXp0wLpjZ#Fm;hW(t( z?NNVYpe{!$3KEMmVArYk7(4&YvrrWo;&_2FJfQQsc_&4QVC%TXhwPK+M4htMKoDOC zvH6l{11#lHSl5z7-WbsIUXOVc>~_;Sv7Gn)d%mA3q$PH^-N3B)PX#U;6EA?JgNoWK zv!)^H@nM_-p3;;TE2o>nY>1bcZWJ~fP8UwRHp` zg+9a`7Eg*QP>zk$Y#?GN`88ke^BE*w>Bb6o@v2EB_TgE-{XYKWZJVE0&@nW9l#;Zy zPDks?M^vp2pk~HRK>kt!x}>#T?f8fxz$wlDt6Jp&7+c{lKc4BixxQ@oVmPvenAVGf zyG#lIW1`-jgoG1v-fHX!-v>`A8qN!3R+GFW;XN%y>f??TZSZ%LMAG~sWLQg8fQN%}I0U!mxu0!q*w#zH3m%y&Gy#b&{Y8v*=2QI3wm6ZgE0P%k~0IhIY z#lm-MM@J}cAm;Dq&JfQMYUXhU(Pe(<&Daky9u<-SxoXXhuo`6~AG1)d&~V|%aQJ9x zLkuB*=JFEt(OXzvC3>;9GZTwh1>HnMPR86H;7dKBxuG=2;;OE61qyfy-0;kSn|Xw7 z-%!Y;QdhV#Ywz`Ss9NpG40UBd9uDv@5Y{7(jUPhho#Ht{FQgLb9`5PRHvefohSDWg6BMF1L$vYlH8tY^zYaB>$;DGX z0)#dv<1V-PAk2@&#XKKQQPNC2WUGb|Z9~O}#jGWoKMAJxsQl#_Dj`g_xtYAVh`xa- zxU!Is^F3!92^xeNeJWGr>)1z~9_3+t7C)?Sblcw$6F9pLb%n%*XZ^dR!d3<_63bZ0 zIV#zGt_pJ-LYp!3O(c!q?TZdF23++0`c$RviaESIKinGje&=`J&>H^%Kc$7#lIzES zX69yo4#NS|9pSs~CTM(Yd<<%-|5L-x-1?LAn5Ve(e;_Jb1V%9(v@~vqU~y@_dp9#T7qacdOZ`8=5Sfpx&6G5t zYkTPd*w~E)WmLbW(%69zK-)P0hW~T*_Pz(!Szvy81Ot4Q7|qto$mkDj|XPoqDVgcH+ELm)wWNLSGvy183mBC_^^+D z^NB?oXgPHHCNWEZD|6yROXAo+;v%X|K;A#2W4lx|8{5{_YMLU3%uQu z{Cv;7OaR*${qHb5&1K|wy9?IBP6OsxzSy((`hDI!>;Teghz=_zcoX&>L%&b~$$$`7 zQ3LOF1%MVUH8t>+aR8n<)&Rw03b~P>4gg>(e&@+It{Yu}g0IUzf0mXj|MF!QU^abc z|D*S@KIr`L@l;n&7J8?u46q2G2nb^PU~8Kt<}cdxUK&Wsme$s)<-pm0)_~!9I`pu* z6OIH{2Wy>XoOKrINn@E=`>jih0V#!A)|V>ME`L}Q-Tm~96~jB&H{UZ@s%8V=f9&|Q ze!Vz6SM;$YvktLFF(XaJQGa1ivZ8e$eq3|b6FPt``{wuo+m<*mA9kxqfFTkma!aXf zlnl6IWsMOxMJoE`q{iC=_lo)Z7>qHPOOWq~`mn3A5YPMgJvI!j1fRufh(4=rjcpSDolcV$uSq7CZhaum`<#eNaWfRan zJ3!nJ%oUub4E&=V9lii*W7ez$p=wvYIW*r_FSJ4yYqYnv9&`qFgQiBiXy*Bif*ukm z-aZK1vCwQ0HAhwDOSX+{;_b42-oRvxb)*x;*!&{)Ba|}cj`@rO(b7W8!6pHu+7x#o z6d+t7+E*FDl1@*ixgDpp|Ek1v-L1kGZP98mfO$P2F|@x`EQamNQ83?xS-`dEGil9B z`|XOU!9=5NQ7l%1f9F!B$vo8QEOl?g1xHxyq#&t%mAark92jpT)U>p&f#m8e@&7cR z2pSAviLIh*6Yvm-`vb+u_GFG0U`{Im)g$J(Pzy*DN$IOUtKVOF2(iXIh_dB}WUBLI5WpP%lNAP;C5UE1G@4InD9H9Sk>gfxXQx@wx)gxiENj z&JVe~Vm^$xmkjYT-rj9O<~*RfRu3{L=QIOyUc>}^GJr1$iOaO9gijB&(^Y*AFo#LO z?O-ie$bu~XWVJF|=UF;UqOS^fkZzJ8cs@iaPR){k2J@;K0s|O+d?om#wEBdy;41|S zx14mC|64nNYtU^-V`lkK6Dw@Z4*e_^XNb(D=3570`iAU=q|_C*RLv^vM<;y>Qodhx zN=0cYx{!_SwhIZxAR*nX=Es-KI4kLPaaet?eIu^BySiBtZ}{{HhInjp31L&l$iz6Z zD*E_&fyiBM%DZ;z;BsTfS5oI0?#c4wV7+>LE=c~ihn^Rb0GJxq&~Yx*%#Du8I>cT5RB50 zWyKKK&-(+tpz(X3*Wc*>B}$CU*m*sn?G|XWvO*l)IM52jUvjKW3%wu!zS-B7+$vZk zh$WsFu%8H?zw!niVJl&fO>jrWbJ!IrDM7~4L>sudCw2(tUS0?wc>TG(c;1NyDi|O< z`Ct!tWRTVJ!xkh1m6y-dDEueTc8dm|MAAcc?Rgz7(wL4_ePKs_iX8_C@VtRS+X z01$`(+!v?`6g?uvtfvaPWWW2~fBYGSj74#?WLL9!^TYSPRlB32y44oUNlI+bE0CxfeCf@<|LIPC1G%i5T z0VJK$K*DMMpK#Q^1qe9OS@o`fRv>B!z@3-IKeD0GSKwXbg7c8Niin1xp&_VWUGUf& z%g_NIVXm>awbcda1o$M-h(7=M`{V#z`~rnlRVUCt{P4k`#bp;@{9t|XJFfZU+<|JB zEC3p?s;J_puU`|}ie4MK|I`34ZY2zp{1ngV1X(_EYHsdx9=PR&wk8W_j(n>B=xeVD z03u`J0cdU5>F4`NeM>1vz#073(o6wXu3OO74fvl4A~ZUP2D1RW5R+{%nN^BJ*kJ}X zbpW)d5eENTgqes1O$UE7g^@Ea=&7MT1Hk(1^29;WaWF(TuH#v}N4kK5>Wm4_N|&lP zq+p=^M)>C9Z+?2Okx9SqyQhG{hcul7hWtp0&YxPR#smqOKVlj^BUW#!;o0zShFFr` zzGDu_9%#aiUZ;^7CcV+k8GHBT4AIQ;MQu7{o4pMMPxoZ-ACK~!@XCJmlDE*BK1Zyex7@8Jc!+z4kytAT1Kbcqb?#PHFZ4qwbqvvfOrDG zzc&z)0!^BiB_II-;|G+XKY?n7msP)!k1f<3G1ESjrzlK3+qw-h7wYkdr>}ziKxcxspiH^uZEk#8W(;%i3^iss1KsIAmk+^~x>hKb zA&8lXMcy#&d6;u*WSVY2f)vk>D&d^{T! zgf*JYoZIGDJ^Mnt#a*L6GmJm0D+|&upL7TT{g=$=uV3Go5CG~8%0j(({gE-)78+(X zH|O*mLnY=nTk=+*u%*QlcnrWA&wl-h4eQ*-s|PIZ8{~J_3M6{sZ@gEKHE-{;G7Fxfh2_xoF%a|!fhoAqT)>!J zqbuzHpfe`(BrstS$Yz>JL8Z!R{hZ-vZ-%pO5Flz^{g%r{h(zkUgOkFBAVb0C8rQQ* ziS`elTcBkDp+N6}vcY*dGRwA@b1QB?u{6`Zg~QkjF5 z#-LC#Wg+>8h#`CxVP|k>O>tA$Pnl0GKSq+DGhjHWSw*0_E|icVVpvn-&jIX2LKMqN ziJ#^Z{Iw2voBq+id)wZR(nBs1z@bW}Ah4o)?z~kI(%vI^1%JFFb#~o|vy>3eDfFdZ z`&1U$@j=b%I69O?rRRAhy+9P>BW$C~BQ~~=?8knamEHpt^XCmc1- z7xIN!oZAV@(IKq#^XtQ;BMo1|G2aK5ng*PcST~xGylV^m{XmFS6b|lCpZsU!P!kV| z+gOeuG-w70FO5NCW639SF~%*k6T>~hINB$t`UOxXNOIq>wn4=LJT5>2iNN{*IhM3# z8er0Z9;VQ{%AKEHCx(P9?P*;0Pg6q|mUX@)i2c6aThM~bfcwtw?unE{*G=ipl3Mpl zlY)#1-$|0Q@X|1hz;wc~Yh!d@`&<&?cfWDp@BXi>+6)7ok|i2^jxZ|f>5VbbZw(~j zrCQlxhAh90(obZKp-eCsOP}ft;Ze6B49%(h#);v53K_tlY4~h?Rmj=~g0%_|%9*0J z9>`zTt91yK-a1#J2;pc#C9MbcNMrn(fhZ-Aeuhu!Zi8tVH~ zTZaw~5;swX5 zun*|UXc>{-T?ucf4~QUW(&0`jMW*d7NYS|iB=+xd16ZjP8-^K^I2-g;03=E0w(@5ew{r4~b!2&iD-x&ZdYyiaSMV3an&E(f)+0gVcX zUjq(>$DcsAAMfzE@_Z}yYz0IGKy$m8`)N%O@aa^~H-li`1we@S4lp-(08YK^CxD7T zR^Icb8#n<&*Vshjjz4j>w{M<6H-_+_CnZeWB7R0MMr2!g{^ohWD^fR-qz#0C<&3{U z>C<2%wD^dTfI>)wEK-JH7we-z6z4qKxBf?)!Z^^LCGz{2o+KqIq>;P98}Wiin~DCH zJvF~>X(5-B6?3FziFvg}Qa!j4=esRr0g-vTnLnAaki3cQCWh@@4PuCYwd|=<&mID# zIAWMCbO`P&QRjr=*ET~`fVvu#XLOm70sR9ooB<(3iE=Iz4e)vf2AcxsCWup81!5sE zh(Z9iy}R?ml_>JV)d5=H>SQzT-pTV7W zs_VuOZcw8sJ$!dd^MRAdT!H^uFHm7VDjMiBZqohk@!J*&@rxj~eq>6~_vHCH^t)&g z*o%v7G8OQXoYe}$o3V8Rs^vK>qC)kJxi@@xQYs4iu+Ex9$A$!_5y()(_Olt)eMX-E zF4$S?K#=7cJ>7o`=d$(Y`RRFwTyIzG=NHzz6v-t+84*1cg%fVVX;7BIU!*gv|cKZ!0_jv_zAfSsT=s${o0l zR+v3fk5$Wgu_h>yKLe(Jy9~U@%s3+~-4<7z-rTxJSeWTj+n$(2_xo5 zvVSK&S!~m7EB}Yz4NHu?K&-G6EpkdP)CVk9Vz=o3ex|hp^H(ZZqRM!0Pzi$aZJndjPS3S`RJ)>$bGq8CA97$e7<`wj zJ0BxEg|Whxj8`*m>|uW!6B3bx>~Yw={DDb;6KUBKRS=NW`tL(CM*-CzoCneXGFR4o zPmeN+Y?ro-=gP^;n;iVF!EZD0bxlf~99<7{o6#6!&nCz#Q_z6($m7X0i`Mc0}l$Iy)X=~aoUlQQ`CbBf+I14W~ZIe>mamhXSFYdfRJ zHTTu8JK^xzK&8}H>6Q)FH15LAEfGXiV zmCn%vHyWZ22*1&>B+uvE-J4Z?>O<(G2=imk1}LZjrY|v1jPLTOo4ywPmEVq#V}f$L zynNi;{XpuqK`9$U-A!$TKk3(L8pAXO(S1~#FU`EK^#a_i%|5QuSt4>%T{?;kdE@J* z3-vaCvF{c@>Jht3U?9Zj@PdDfBE3i{`b~)3~ zmdh)STnF5w;P~-Pqb*vcfeE!*YQLV$1U#-Aq=&(GjLD?=19RwPUEg7~beeLx$_ocK zU2&Fja{~oM=Xjwh&^73?Z6u7k#6T#pf6d z$gA%vNMKpDTqM4p8F4a1!4XU1(G$Z&Y|{^7z;p~!8$f;OvJJ4&P2&;sp}kj8pXU}^ z=swSx%AUDxS>Zv-(TcC&qY<>Rtkuaz7=KyK?_wk!*>pc#|zmK5{afpWnFI6!i9^B_!N*`Gea>vGr8T63iHVd9H z1#8v(&-x7<+yQ?Z{OOUAC>}OJE7*IJ8;4XxT~)Q<(Z+`=D8V(10V$bL-Q(lCLY@RS zO=Tjlhk(SA!HMVJ;3f~zOKAKo4+RwaU~t~K=N;b^YrK*#N9Mp`{%#DH!GdWM{t(Tk zT;6A+LyF-u&=6kp^!&TSH%IfQ=O6zX5ve}aAn`I<*2o}^c)uKayzYDAy^3D*c`MTC!UGWBYN5cA zeqy(dfh>fQSPwY63D`SQq7b)L9jH*v-;#>&kda0Fa`oV(GKxT^tgdB1&dToMO(A(B z(M5vt9yQdM%k{YczZ^u^zWd+fxZCmGgF)|ye_r2cBV7TV+za^}#GYj4VaK1I9f=7d zFA+zRcNq&S308PtG7-0RMisIlP~0!nzOVDPDv}B0ZO#p>kJ*Y(`KK4qR3-dS^URBqskDY#xH%e5LS{cr7 z=U~H-2*qn$_K$JbVo8y|Pi7{07SQ9gH`akGck^vM9OTD#4?Oeeeu_OO1CJwkycpPL z7VCe#-=m6dHf|SOVhP62Z1LzwkH6-$OyTSO3s{ETUN`H{o3(uS`V*D}VF~x;3(*9DoR1i)6;!8_{aV3|TMW~2q z$W;}`qYaDsAJUy&j#`uecop=}SHWG@QMs@yKv;#z%flzj@XHzDyM;iN&{I^mAcRV1 z0!dpMe!7fA(Z(oeBi`4(3-L>d5)%TWs%$j5xw&0jZd|&yG(t}3ABas^r^q>8nFMj2 z?GpqCzUh(b?Z~wtrKJ08oK>W?Si>4C11n%jU^{kA=w-+i619(cv9dL6BnQ!7K85<- zhdRlbe&caqZk8Kav*V8QIG@?5N9*uO7f7v1I35@C=B;XOS`} zv%0E1y{x8)qZXy^cG8kV#(o#kwUE9WV65NsR$S==5mBsQR8~OoFk`&zE(9Kage6pW zg+S(w{g#(kn)oWoxld;NgeEh#(7KG|H{6_HoxU%D>~&;Gb-bk*ki4P+QvX{>U@7dx z{(h!y-gBsbGw96U_$uwkQ|+Y3Tq(-ti}|U(qA}w0%rN4*ODSG&c|O)GC!ZJdUr1f` zwwh@1{WZ6%aZ&f;4Fe!7UI1F@vL?toyH*fh%A1D|NlLS{B0f$nE-tREVX4obGXBE(hbzf5ds{|`&%`ur9RWwG z{V!NF)&osKg1MP&PlX_^C4{SG;!Xf044pw%9+>iFVXz-Xo;>wc4j!c!R{x zO_^SnJ4p`?G}Xn$y)D*Fi0zGhI001l4@cXB*>7;kg#y?wgsqDC(H9v=?)7u1=Lf?$ zNupZ_kGcH$7(I z$(-+m3z}bCFdGed?vm_^e4wVeybNOEEV;Pc#+?f;`^Y=_+#|LO;MLDfK`TY9Mq=&< zyVob8CLYgrVrTnQHjA6-F`C&Q$A8maQalK{-zM8p`M$w^^4?CYbv*8@_nn>4lK$*q ze1eFNwA%a>YCs%6Q{$lh?6Y0Y*J;kP?ly7K_M>SNQGLQhOLVQVR7#pGj59(`K96&S>2E2o!me%KeP#NM{qBco%}Xap5qD@B4W}b&e?V)3&^U>)XAXg+X%n^p zVsV`BNVV<^D}`smjq%h-c)>DF6%nm^Xao~BDR#rs2H_kj|5o~;J@b6uvJSdVIUYAY z6^OK`D*TYvqTPif*L}prj+KUkwkdvu6sC;8P*7}4Vx==*VUR`y%^Vt&6T#+=%Xl)?>TT%G#^MRaA-@_gLFvoHBiO_YMaM+T3P<`2%k4q~XT zgb4Z$_IgiHiADVN>%H6W1cNK`d|djGQ13bSgaJcL9@}B*_K5yk)OEHL%TBPO+QGQW zh|3GSKt8{xGBBLB0+sFZ72{gs=#b&f0d$POiGuV@q|X=a+st9C1eI?XRT z`6(Cgm6ev{cJImjE5$lD1YfdBN4TUgtcAh5eg17l$>8=YW+;;X-xLDYJ0d)$%Phm& z)J`Tuoi4NpO!ojx7EbR%cY8>ifE0ypH=UL)l_;{~!gq7IE4p;}R?~@NN^UgbO^0?G+v9u&t%r9a7wEa$EW8-`L54RJBCkny}@`Zm`onSr0 z?Js}N92Q=4bW#46=dY}|%`APuuqd8~KqeK(%C~%}6lW!#_&addIpC!O><`%I-3Ht` zPl$5r$w%$Q0-5jQRwbN175TThqQxW^Z2aR1XbJWc$Na2BN1L z^<-LHTpR$~x`m0n*tm*eQU(Ph#yMU@ke$zJ8D;)g<9y$PQvUhD_H&ml&xgx^*G=ti zi#sNt96W874q&}b!KT&n@MG0y3H+GYDfN<(bl~O!TfYp16faSPBAIyO9 zw^QXU`BQZn){vcAYk=dg{$fyOz|_-&7rZ)@eN!VxxWznjoz4f!b^3Jpfni||yb|Pr zuO)?}i%my+nXVxzvKwom+&Bcq0P=S>G57G5wt76ZBH2_pc~3%=ZedR?(lpviMErgO zGctZQ&MTVg^zO1SzCJz+mkoO>D=W@|o(3@xeiu{;A!TGdVRxLKZ-FzIKOomSg@XwNaTtN`jx31hp> zJ~NpY=l+#}9i{IZGeUuoPrvf8Tv>lxS=!C-zoaOde&H~kMvHyOK;sT?w>aa+JtzB5 zdgDB2`BSPWH{FTVzl8PJ2%Nrv^(Pu()Ido_I$d9E!K5NRqCWmqt{*0np>%N{S+{5h zBhQz8YO^*E|5T%XhkH_ppyH?;;2G;n8$@N+H&I6|R3cl^vKF`&97LkV3b|KcbP1Ll z(QYUG($2wEg)>q=jh`x6eL4ZlU^k9i+MTSRIN$FC?w6A?+kiH9cSrDHRLt!wpr>2}B_@}X6TiawvG_HtgFVAJ0ju`?4e z4?6vhQo)*dg~YK^`{XIjU{@CWjjP(?d;jTbV`;sI^4FB2b7KY|~}HKo)IW3DKyW`;)n2He_b7a&l}iX5vLq zTfhz-9WlH>c{&D(3{He$^lGiIi6eSsv85V{Y?QBNHH;;0X_^#6LsOF?M18s+Vrrk(EKv(QK*8db=k#6*Mfw-hM@lZ~+=ab2tk! zOs*$Syh``}dwg3zFI0dQp^|$LYo+0WuyRa~`#u6xhxaRnee9&MLzWwR7RljNzL)g% zT-dhyKTG!WIUcAH55T@D32~SvLOcMw+zzN%t3|8|P5iz`wP1ije`sxdX=l5=A1@gy z=H%huN3|`R{qaZE7V}j;Q}ynvc(IQYo{q%Euy7gn7@u2lxVz{Ekysx%Qi_`cJoFP_ z(_~4Rev)&>Z^6U#BVH#;)DLBq{M6CT8X)95*f#AYK^X4FChdQJ<3Vl$?*!NuiYM3v zmpX5>iP0@<%sp@7a0S<Vek)4IlH1xxF& zLm>afOVn0LT>K%sn`}>mpzTo=VoRaS0nL+#boeSq|NCX2i@HDg7){JB`gF5BDRj&N z4R0Dd`dM+kTm{Y~YZ%U6Xhc?q(29GW9}&bT;^`Qdo$4tClvH3h7{n?Kyb(oBu zB=%jA?9EOXvCcnyhjMfFTl_X49G8*RQm8NC$y``3)L|V$)Wm;(r`+G{g-4~-@<8L{ zIUeJ5M$AYHIILtTlUk1Uank3yYg|Cp5PimO{sCed*z}uEcal}AD=L`%+Cb_OxEbeY zA7qU5M-!(Larxd|&bWd!xpqKnJ^Ji|lqg{9r}+jPpCE_>I3S_IMzFYy0GE@&X(s)- zstU941#s^=eaBs^1=qje+5iiItu0ekF94&}^az+~KyUU--}UX;O}Rz|R1}mCc-kp= zutvRVz_)^|rIf!j3kwVL^P2Xryo^D#)E5J2SrhuAczxCD)%J^k4;eQRKkWMNu!PEz z=bnJIy5!fkIN?lC%FIRY~{EeGSG^)qQ(57!>t7^*5O9#Gu2-N0zOnP#EFe1KQgEx^2A!cw)im01ZqH2xI_bu0OOlo(-^3wFy*)oGz0ofQyU# zY2MbXF~_xJ2p#ul;bT48Ua15Bp;NRctB>3P-WfmL7DLu;FI7i#NB$ zZmu}>_ituk6IV+FG~+wJ7cf3}(E3YKzO#6 zfy@j>VV~=R@b>l~g9@8te#Z090x-Eh0M$^l@*j|_lLz#d`Whl{HdD9VEJEbcBb`!j`Ei$9=GGFrinZe@?D@u1+_IW`1trZwG;#l9vvTp)UkKEDDBHY zY}is&^|rzb#824A;%Q!AG@2L6D=Z9X=XMw+eoC_-dmHF?foS%Q z5uY1Lq%@bE!gJDc!g!Hl!it>SV4v|2p`Ka{$@q-IQ6h+qH;)+!u8WBVB~sId4izbD zAERy6y5=ypJoot>VtGYHHZW|1I4?8dRlssycl`DB(FLpyz>)Rn46xp-7C=MVkof<8 z0rTAx8q|>pCi!Yx+ZFl-bvP&m?{VA9peECDnj#G_eo|ARM>pH?T5fEXM^lQ;fzAK8 zCxz=lW$IHC2YE@CXM;SAO0C_Rx>rKe_LOl#{GCsB~1cQz`qdfOLvWC4*R{sK#(#?MU@Q-AO#lALAGenAA3>)(# z^Z$bcu~N9SY$6RkeGu1lXk9glJ~Pz5u=cAJ3`m`{LLbktVvGu;#U9PRG?&RK@{O27 z5O`bDFWT|@6IUAHw&tym)MQC!fY#M3=a(d-iHR|;`Z@pRXNC9x%ZF#x@e}E&!iVa& zY#b9&RGfw1?vE|8={gx{saXN0E@|n48vSINx$^U3Ns zfQa&k0ya$?+{7Pn!xZ0#rH1QIRH8o3ky*g1Py4X(i*^=`B87{LlFJ+gj{Ci}j0&p| zNSwM&q_z-M24S5``Q^1O4Jqe!_-aL#rTCZdWX1(1lrzCYZ^Il-e%s8zL$-0)ic`Mi zonEeyKJYFT1y^(mA*8 z*P)@NN;X|^FdeCC)R>0 z8IY|$$6JCQ#5|^|dGS!g1oUCftwc)Qz;oKk#t@numl0px9?4eoWh=X(_KJP5OieI&Js_Xk)%izRll2mRlth1K4rrRd)4;!Um7~AN)M>-~ zDRK0Aa+b;@Lk}ft_XWMnh%{1XnoiUS4@IJ69Jkz8R1CNB%MZLoWKlT9=^#0!cp~q& zthkcZLXXy#y+hvBn|Z`{PVWqIa>Y#twZz~X_3d4=$XvQ$_Rn?|ymWscP4R44pQaq| zb?lGR;uv?$MO>VfP2r!pwo!O?2$Vq(gbs2W^eDL*#p+1TEroW1AC!9HUN@z{{(Ar2 zPFEd8VEIBHlP7Hu<=-Lmg&3Ha;Q2~C!n{{=VB()3P)nH4E0%>$u3~Ny+nE&N02xS3 zk^CD+?>EbOwro{sFhwWJ*pV0#5S2sZj;hnSSCAr8L)Ol*d%WBJ6#DVLg14>v1o+Ew-R9|8*|_nh~?2R+@MK|_6_(&?X6_B)$! ze1R@8dIRmdXs{RpSQ{KQF_}$tvdA!uRG&6;+i2l6BJu*M@p_4z5UM|`hAI{dT7u-Lmw}Z z@&vdR;paN%LvRl=!n{0$8=h)-OF&nykp|iN8#h`XXIGXw5!^~dcZ8?f2!;$5yRTW^ zM~i{Hgwz8wEkYEFG2Qptc0FqC5s!pHVquLmdfWx%7uskkES!(UPO?svst?0q{7hZB z*gf;HTFpKx-E<|#UH&UL)GxJ2d?NsHOvY&*(+K}vjSE?gq#asUy~Xi- zg`hGYJAtZcNzQXTdkqBSGlIOz($28Jk*5A7U6ikLo$R zgbm|>nu&QMI~Ll$+JJubd4LCgYkcD8%9k?kD0j$t2C;`Ty@X|0dy7BGR%lRd9X&*I zqmWsj;`8yVt1NGgp}}3$gm5~DlM-yAFxuFPFz1b6U$XkKq^M|0uw7>Aw5)zVHbmgh z_Eb6`y`W3fSNH#q@k+Z)`z87}KRn+-mLdTYg=_Kx+~9$~vvC;8)n>#P)fx0XZ7{mp ziBJJ)@BCI07i&QyBUoBQ2G7d5i#bM|XM9@kUk+TNFXR+vfbuV4`rvU_*P9YYgN0XF zq__qQ2tgE@-Fk1fJz-E8F_5=qZ@OZvJ;>VBI97#5m|4z}xVH6886}2=85w8Q1dwHk zKK*jwPlT)__a~sLTRm1{eL6%Pxs%jKzb3;aM)JAu`)`hU*&URqywK#Yy$bs`Np%oK z*U|AFHc|0hOMromuXiIK^(5k@xds`fsnM*uJ>x3P`9c6~0ezvWA_wynf}n5c4SYqh zQ_i#;>M%(%n|5#sSxgl;^9<<+3eo0<7K-ypNbupE2Yqj9auur0!TZUXWfpHi@a1ha z@Obq(`CxrwuV)z)%V>JI(R3X2Mn>CJaUv+D3H&Q)AB>%4Ta4_6jVpreJ4EQZDFVZ` zkBqSfi$GL)h4lYW_0{oozW@I^j^=PQM|V$mGZWL@HPbOncjrtD)3%v59Y=Rf&ak6% zrlKU(Vk|jUo&YZ?)8LkpJ468@&fCgGV{5|FteX0Piqnt~p z7uwNgLBEcGslV%zDEJ}uJyp=~F7P^nQ=io*PkA2i0CZ#(fXYc+{Yg~najXK~OaOQz zNNo-M1_1tE04L>RDz4hqYI%Q_Sg~}MHoe^$ZF=qdGar}W`sTBo`|$&_*@N;Z?)|dc z7(yiijd<`~!3Rn2td_k64Jv;CI%h%2kjMNK#hQ&pKu}q-s(vd!x#`r>sNz~M@)v!0 zqok40iY{Auv1WEgz&~^?ggbNbaRx7e-UK%!2}afagIjNMS};g;QxaFpV&1-BY~8|S z8TGI148pjo=`NyVcD$AFz^;w^CoUnqVT!!oNra?jhvqLvLa|K{nP}MXwzwBdceE{_ zJka>bScKmE*Uc%wcPG& zaYHavw{Olok#bGgrnm%4fXVWl~f;ql7*%MN&m@q~DloyBW?ye-~bu6`U% zfR{OhI;+Z!oCYNxfuI>hLE>vfuPLby<5x4b9-O`?MrlxW4OK@M2}r>rGqctJB+{c6 zN{B7BE%cawMzi(E!A@)%~6Xv6*^OCW$*%T$EpSNIaqSBSE z-EAs@j&y{&2qZI#R2pu|2x${6oQ8>1`B2L~yYlOuvBv(gkCnjK*kXZz@m@+kGsDyrNt zBbu=YL@cjl=;}_+l&E~RHUR1e$THEx&Mr3}gRjz8OAW~8j^B9GJjTE2LT<_e%HJPn z-$DcSDo+htrr+sok4f*VCJ!!AYiTiKtP2v!QdbPmh>k{TCe_W)rlm+dS0h3nlSRX6OvK<)v`x;pYy|K;`RJezsa{X|2S7qj{cpY}1e+{rM zj~OkC)LTwI5jQ*K{-gFRdaHhn=8yd9f3-~KjZeqoXmJF@-6wi60J;{c3YO``Hk$a- zo85NlmE~k9#c%wVVd8L`#JR;nRzEHA325!??=J>&CO`uTqpUyscGjQN8v5)iVdL>S zT8b5Tf6Ij$b3LcB74X><^#cq>#Wxf*MA^9-)+`YP@64>T!sfymUQ2LE+n{` zkACg7%LvKWQ2U7Wd-^vkI8;eHdDA@xSF}ZAELi2KAN%lmEejDq?pNK^An>E5nZl^5 z7}|jKy5ZiXOE2039!WI{2{@3GkQ(hAzamY@Q`U!_K4~2$4Fse4@hA*Nq4=dYKz3`$ z1=7_u5ZuC^htieUN%2EMNB6z6)@U)xKl9Zab^)0{28r+XVrbde2(j|MN``sg`+ofx z379viE60cJe3a>DuMZL649K7~pnu9GM|&YFlk zD6X8lJO1|9^mOPDN|pHA3cq%PxbDc$0(b=9Lrk|R1W3qI;}iN7){Mbhj#A*GssuV0 ziR;WViqr>eXMOz5J}TLVPbenVA)fA6U;Ee>HH8PT*l|xP-xsge;Q1*`Nyi$_h?HMT z<71@GFp*ZhUdK1W?qcw#k(yPsFEy%V|bxVN4R~Z9GDb0>F;_CUMqs z>pKAmchC4nu>SUEy)p8qO6{)#KH2}l7MgD++8{R>1#zxDe%ot&BHrN0kXI8P0 zg_@ok_vn?a!wc*|j+lq;aFCR~a)G6tc@>@p+vV-seNPKf$>OH?@HAqi&)2kgff_3*E z8xW0aXXPW$Z8=QKRv^8{nuj_9?s*1@4l8&|CPY=LFDLZ@-(aTq%fy7bGp&iUrap-W z6Pz79NRC2&;Dky|mouNtwkR|jF$Yucm9=i)VNRaq!+UGjCbz^!h4m3HYCd8^iR#YpZ% z>fTB?zaOaLCt~;u#X8;z%fx&`xpQ13L2c_C^x{P#nvom2N9MXCwD{SpTw<tuO;#jDBXk%Z@K7M44HvFqS7$YIkM} z1zo{Lr!|KYdXfT%rn_g89&>z?9r*e*=w&UjDLG-xp8akj)YQUvA+CMBF_ziF1@^m5HI&v5#5p=?VhCyiH2^#5EkS-hMJk!v3 z6ij6dBZV|s=;F_7QNX|IZp0$pGaGSRGn)^|`JVJ1Q}i^7QNG>5^Zygv zvfT{YcGao#E&Tr3-MNmJ(s#rf)PksTnLZ(!6esdhP(a_20E1COR5=Ug1XJ5 zhQ2zQ(9vo*I3A%^i`8=&t3nw}J+Qda4XfN8O5O4TVaw%zbMiE3kyVPL5YKj&O_%mu$=pY`1^5G{K9^Bbi#Ca7#(ca&7|cbKaF; z#R?7ah|^kg?1ii&3q|adsHDChR1u#-2?DQC6l#b|;JH1!`PVQA6uA8kf5lDe`5i3; zgaGXjNKhfaQ3B&;Vy)kBXqId!3SpOk{gSpDN|8I%BA&x+FVfheHV;f%<bF=+NW3ZyIyt2IhgG43lok=0?SbBTA3;n~)6Hy%$cK)54D_$G2?22*e78$PIgY zHq7F&W68AMQHJp#m?;d7?T@NCHK0av$MByeDd||2d4yejJ~oVDcGA?om0yE<7>H7V z8)9HZ#r-NZ3fE=uvlrI6BIi+po>Aj62#`3qS0TzkZ{&sXF-uQ zcXBK9;%a_6O)}^<8IP2S^CP{+;?Sm*NIs&(Sk1vM z?|>J<1Bx70q}PYClS+~Nh>yB%v7xWkWCiBoOd3o7R+R!}v16gLYH~CX^3~>qkDCKx zjWXO5$L@yErDvy+^g^?6VfT*kM}!;#ID{&J{IChrmXyaEU)7R5GSU|Qyo@9~fl`px zW`w+$oTc|0;pqpQ-)m}p0^vc@T1lI%qZFd%z;%I5NE}>!eV@WZUkgqIDt}L~qZ1)t zz*pq>%ZX2e#~|YTFeV4%l+ADp!>8OJDSNIfE+9EH(Q^cYsrJ?fUi{F2Q z@83TZpEfn@59N5(wEpBN##@yM&tA;?-713tMU~udvksCo?Ze1`BHKxZKpM5AZO@JD zSOcb_c#IF;I{WM`uJQZsuS0HlAmf}KMn?8Ei^SMkN)+$FllBbj#yoW4P4G&-p?&uU z?U*$luI;iYD#&b8SsVN^_FQo z;q0~*^gYZ#tN;A2FROJ4@s}!JN?!W5U~dCUrMC|CU+1Z|(+;B!CS}7Aa3&xi1O!C{ zbB5!OE;@)}Db7-wd=?m}b{bjD-irxLAqvVa&}XgWtz_kn(1` zeA6pnR5u+wjw56kc!Tz)s*AZiowYHh|7D0P6>1evaD2nmv1AMM*osk8*m&Z`YpvHV zC<$9fsf;xVekY#P*B`Z}wnizQ7tLv5G9+h(mKsgCvBjN*P%;rRvc@3`_)dmDhQve_GxBPCP!wB5H=|-;L1(kf(#XaQqFMjI^nt0 zU$pXixVz<`5Z?4EDMt8;?|1kP&cybCtO+`7sh`O`)k=hlPn$!pk+`BS+<}@wlSYXm zILkij|6XN4))(|*bc0<~R7|2DQyPZbPmarjP#PK((KtLu;~ij^lqy`B*~i4*mWIX^ znHGRZUMDQ5vyP2PC{~8eHCEsNmOQpU!YPyX`8FNLQ6da$l4eoVnAKw;ApMmSsD$Q% zjee-xt1+NXVx-Cf&gxdeas|j`H-Lc!KzD9C6kXfBlX> zlBczhWYcwd`KC}e8y3}eT(!*ATlgqlZw}rOZE;#(^#;xhk1Top->j90a>*$~pY2Zv zKyV%lfh@)Krk@3tG=n%0#F)oX9GOtrf^c$=h$!YsQn-Ov-9-eDf?|K&_EsonkS>$$ z@x_hsP)3ocxUtB%lGceIo`hbC`o~Gz2E10@AaPLmn{c|C{`~j4Zs5yHmYz@J3fYO6 zEvMq=Wu{39HdQ54vT~HOS&2^?5j|ki+F9-#rEGV<$MQxV)&8PieiXcJi*^qTvSklq zKQGRJ<`}?9)Zcz*dTKFsb+4Nm#5-k?`ZoPmS63&Ja@fDl|JmJzRe7tS$+i#Wf09Lb z924`f>`uy8(}VUPA04B!mSkw6SZ?aN$xzh@p~rm>XL+#>wqtt-A5OJ(vvf^11lbHP zzB*Kiz2?JPnVJi!dQEjiC5q9mas2$K}5k_xt*ADK{K;D^whl&6BEAd zww%qfT=Er7(H`u_fp~O=uiZT^AG(WpPO6`5pBhn#KW($D^-&FI2SyR+Fnj-zhX*hi zRz3|DDuK$Y@mJK4y^L%Lb?$g<1^M~bW~<{2=xZ6A=H7M>;Q;nYLPMEwUN%v zjmdN}6GegXQ6nXF!z&i&FWmboSB;FKL z0EPq0`Jt4xZ~FAPfaX@JDOa~#kjKTn=lFp_Di}NgNDFg$+JjeMIe7)9E`T7S_n!9RX59~)VCMvhu_5m#(xWcF=~c}nO-{(!by-rr8}gV@c=G}t1kc!cHmAhO`Djn4gkMN06wOZOmRAJ4V;w! zaL1%u|5L!-%UnEHd^&UVZ)%-?0O;f%Fi!Zp0YXkA0HFka<{SX)fX505J$YsppMasg z@aQYXVgL@+O!*54hMkwLzr4Q=?Y-T|>;&R=l1557nP$EmNgcRWwEmcT3qVm-^`8OC zT)=1J{|GxlC2D1x@z7hDqz+b*2ga=U$EFG$?Mx{{Y{9qn-hf{KukG~YK47LP|9r5M zx#@F4vMGva(z2m6VJ;_rG9L;uh(E6Q&?q6CMRlnAHzo>Wd$|v^LB};`I*flYD5Shf zFcJ@&(vVVf^o;;#zpOM@Uw?H=ASDGYZ)J|qpM9ovlmShm?6~hHmUuQaw{-{{XfidK zeSNIF>pKnKC|>oGEmQUr^CWxpp4^3u@My0q3jY!*pY9;F)zDy~lqgyWOC*%|0lOkf zlogNi+g@ww69*M#_|ohFmBpjL8^F<@0>P44f2Hdd_|va`Y9|FTvz#GE|8@O2b6@iY z(BPX$sY%$uswAi+@&bV80KDB&S+~aNzba_}Tgn~qIAQNPfCp?YHRmkj=ty_^1k%L> zxb#3jesCMQ*Jy7CuxGblWq8zejyn~%vx`yIXrC}EFIpaBGZk#ci@6K+fB^LY;^(Ht z#bUe)E=#N>2CxjD0JPs=1-67tT;>ggXw&aK*yGaE$KEx3Jb#}7`E^Fv!ROi=-&a@x zui-FDLMs_!krrfQRexv41&JHALD9mta)^CSSZ0tH$@>pRJr?$40XoPR*fUA{oS6>4J{`1bm+ znEBx+ibdyEirP68o=5=0A4+aGbO7Ydsf7Och2&+DZ|SX(A9rXTyhf(~y#6_J@(^WR4rU)N{+v(mdzd*|NTe3@t z&F)rSkHEf)`y81km9!4mVCp6mKdk&{5~fwu{+9g*PZCY~>x zo>Z++bBy{U@`v=x2($9oE`l~f(|dE1(;;s;kq|oxsp5nQ$**E4`8hIc!@aI}d>~e| zA&;*}51XCO;G^Zbk9XB*dHPbj^qgW(cnN?rZlmr3$+z+M-t6OE7hq-)7A^YJA>uc9 z_WSBCXW0)p+S%{8Kzu)u02{?<%6QX>t_5(i_@RMG8b&%#mtVR-CAk6MiqB#1-lXzw z1E8YibQrav+lXdR-Bm>Qan~$u%HbdH}93G~0$wbYyfg)q<;UV5rBA0 z-d9^%JJ}_t9ZQ*j4rpC*`a6NA21Lywdb0Qx@Dosppe}V?vq9~gUoT9sUtM*eE0Ldl zJ5XPXHs8%_bKl1PYVm^z9cAO2@K8o5GJ*{Z1Hz~0BgD4N?^zh(h6Sf$%boEMg%?bz zzcz%*>L4@EqSzLBGz?=P#N5v3A~#sM66$x4*d`FgMNYNtb~@pIRlT3llC+z_2h^YW zcwEhW29q%7f|{XwQUVRd=6UVMicuno>o$ivvv{H_0*sBGXWfjH+TH3>{?v?Fu}0sX zSeZAE2LLSj12D1y$$M?A7I|DB;AS*PgHnPNvph7|B(4Ex3}BhV{9{aTQPCwtjP&qS z7vvde1Z#YD;;Ek8GEWFOYZAT`jFA7x=?n0j{~^tG0G~zA2=%P;h+OOupbLMdx=FYePn8lhm)+GF&Vm43T z_1b{u3s6<2fVh;-S1MlbNT_NJ7P6`ZB)KWTFEIERR+;sTvJxRrgF-_3SD`Kj1v}1> zs=wT(0$Y0=C$RX|>#YuLPlDNbZ>y)xUdu7v;-cd|fvA5WH*e_Pi)-0JX^hwvK6qY! zNah6s2K0EH-0nn@N^(Li7g*sS4A@=OP%u(gLsi+JL3y=xh{2(V%R8OLyp=&P&3 z1*3&r4F8czDf365w|P1bAdlRzEnDP|D%Ty6LC)`wl=BTswRgQ&~h zofgnk39mZtJE?Bn0*5%2K=O(Y8r<*H7zkMFG`E2y2_3Tr7&7-_t3{QUF9~O7y1soM zdZLe(0Tu}Wwc7xqbVdkbgAy62E!pSlnoZ#vxAzb+GX^}#2MVEV$d`nFjIHLD|JQP78?W>w(9$E z11#Jf*zij?0Z*g;$fJIK1U6QbUzA}zPAdVq{c0?Hg--8LmbP;WaK(?ff?DC->r>83 zcof3vI3A6^wdCH7oyV#~X7?htU6J$}alChpHe3Q~MkpaV_AZj}9VR*k0WOCpzLZoc z^Yg39?~|F!x7d&BIvDSFKR0}Tlgi|kJShX+rsT?Jp+`|i^Lt-j(Oz@UIN zgnkF0Le-q8f5-K~VZYXqMF5M{LB7DZ!_?05w`9M!X1ui=TY4TcD@d)h8l^B88$6(i zA^3LPw(nAOAu*qu!<(+*2+s_k{~(Z$Y_NKXA^yw;ISZi}p&o(87ugKE0iPh;oDe;u z=(hqMo-=w6$ZtUU73S^$#G`+)>T>NuRQszLD&Asr2oBd5CyWgqOz3fs+a`k&88o7X z!q!74Jh^E^n^hQTH@in<59JLvTGCtkVqZM{7*gJlA^M@Wv+gTdd=fwQWuaUw^Mi;p z`RkqlvXER2NboTD>lTKR>=%zmbii0TY)`xNnz)Kck2mLRHG=@o2mPmaJ zSPpr!S#*WI2ItE)&I8;>{y=S1^SRlTs#LCs5B#rS`&2xB%mOwA`xnlBmkyV`hwl=0qG zcJ;(Qp6k>u0?kN?yDo)nBOLKSQYNRXsQm3-kIcB{NegE5p>HSEWA8VO$NJ+OOY5?p z@h)G${RB0DZ;EjLWtU!K7y( zF)}3C6kmgLcAm5s`>$k@{xHiu#v|)FZa22AdiVUC_#>X^F6|T3sJi52sXg}OHb>^> zu5-^cd7!D=h&&}yJ=6EPzx!Z=d&8e>p!PtFK7Mt)O8M)QTl8_YzO+2}6>x2`;Kvyv zUooLeumoy7l9(Hc>my@Q0SwcZI4R1yHz}d-^=2(%mlz-0VQ4by94v&3od zeBOcn1`(dL@1860*GA)T^xkgu$}<2}RGuhtZMYj~=0zQ)>?>PBy~hxBkhkbbqhiyw zs2>%a{orHr9?&1Ccmjgmf{|x^a=w_863eJ^$aj^e*XF0yKnnsiA?QF8p&yyyr{XH7 zYc{UkGngI!RaL|Fa=eio0ZDzRU#I&u)E$lYSpG%3OancQx=`cpE5&w?iAbtg#=cQD zOJT^jh1BbvA&yO>lTLRB)`gD;V;A65Kx3tm+HDY4#_$_N;SAQcQEq3a*f3ReOb*q= zRxDUtpJ$NWE{%wA02Vt??vCLhOQKxx9e4`3ktm5cIR?;UHpHpR<)ZEU!l&~%LQ%pK zxr%F{8K3q)EeSJD#*AvKQRB9JwH6?LcOHAq{SWByw($SxAjjXY2`fD4KGoe3cOKBu zw546uW`=kf5TiRy^%3)siY)bI{pe|5vXj$iNuez+(C9;X4rP-DLD3O#;k3UNv|l6d z;$J99#Aj}3=*;#1`E`LTSd}i!Cf)NkfGhMTBXo=GP5d5>S7&QE*J?AaHFIt1aBp`= z5-kxmt`~hWx%8A)BaV&=%V)A*6X}NW;f9M@9O94X?<9dCJHkhO;(YxY{+mz_r$vp4{Y31E|*V*<)kJqpXv1h z)f=E>rs)v`m$d{yzii)N$xtZ0K<^z;Pvh%M$-nJRQ#CFs&Ed;kTV=}Oq&0` z#{Xe=f5~Gpyu4D^Lv;;Xih83T_M4Rn(cGQp^rNKkNmPg*NM&yF9}*r2j{R=|j94w= zT@+dLSnds%eCuo>1dCX9r2wHo)?yDUA%h=%#TTPXcqc*k$6S}udi7-@u*Zhar9*P=<4?#pAVNrN6j z0c2g@@JT90y4KIpWL7luJA2nxaZ2;3PRrV~++PM~hmdzz>Z9?F#9TJ_LeYsPb?{!} ztYK&iYuJsE1-*wg-BlqJ1GCkC7MUDqp;mt$lVYk+yN+Gqph>&nBUqQ!Q#`0G!3T}) zuy2y(TForLT=bNM;SOuyYVTgtI@wlC4aDyJF{ySN^bJ)Da;}u?f%MwJE&F%nVbkKp zobRUjKb1_~wB&zZE_yh2kEEtR7?cgkLgiIOa$d{HObY8uV3!ZQ;+{mIHeWWyc$s}n zO435(%jKTU<$KvoS-xh;g!MuBgZh9rzDtBcI;ozzhyM6kmzUK)&KO3<--+$YJCfIf z*#}JO7BqE%wcqwwj2h1CQR?0amm^w4s!R;J=4MM}DKjLA__(Vg!qPo)v)#!wH4%L- zvS19&jj}Ga?0x-VZx>zOS%|KCa3NA+)6F{7qOo&-ksO)p6=Ut$$Rq^@)0(>toq%;;lJ~UF7Ov0?@=!dvM<~z3ixnPw-_5<$OPM`E0?w%~Avj*{RAImEPi zzPVn^MdLUnkS_Oo!wr7bBazTRyo~org_@yua=dw9W%Pt%ER`}j)W&a@S5q>M&xa2$ z^j$yC@j2jn_!zN>oon%Mu$vcxl`Y`wR*#SUd-%uJ;R2BVp9~gH$+GG6rQ>6}$0KO~ zth)RH{e$I1>Lhxvnia_ARu2Tor%5PLnK80+qI5_L5p42JEH$d@Wrmx%f8knUn%D#R zP#CFs*kJ)v?k(3UVxLwSzlO+c1PjqGzLdf*2{K7{uYJEuCPnh}#r9BDI*zj9MH%+m zPnlGs4qVq|;m|0(EiM&dOe2a5c00Kd#BYx|7L4wU&U;U+HZ9FH-@jTpMIVt8K3ck$ zz0IEB0f;=FeB@6|zcH)*IoMLGXHa&46pl<9Z60XDd2E?(1}(-qE*x3MMk_!JLF(+O zj4TM1DFIWGk&KJ|{kmgoYyp;ZIf@iUBx(w2I#$yO;O;EOE91BtYoPM7{pz&M{BAOz zPMZpsO^)BIXBcgwu6Qr3DQ?EA8U)GJS{A~3j)^nsAICP_^F@r>1rU82VP}I$rvtW4 ze8th5i4XJ6#6s8Ogfu3Jk0;*dIO>Z1cO6o>`Y(Q}zwdq}{&3pm%1xP08bmuc+XE@6 z5jSKikumokjrXJpLzcB0u#Uw3#$q9EEe~%aOHveFoSXE`5RMO?Aw(hnK?fl4e|#kX zfUm;#H`$X88oQx67st-@X~ePDo>e-nFCIRNulx z!y#utD&bV1QbkzJeD>}IUA#39=@!oB-m!ZLs0UdSQ6ME+O}?h1u{aaifEqpb;)EW> zUju8Qoyg7s5KR(q6W$Qbv;j*?{+&fG^fH2#o?lK9r7pj*51li2kK*^WLsMfE)YN5( zPE^##P_Vs2TD?wT7pfqohoX4GB)QO2x;ts@1$t#>*@`(_S@?@1oD}3Y_H7O40X-82 z`c-7Um3^cE$<}5=G!1A|a33?k=~!F+XFaryOtD*Mau5sTjxWyXp2hcvBk`PV#l3~3>@9Gamk4$cFk+>q)3q4=A3=8o?)}%T!xS3 zg0Vo9VShODo^BMeD*$37GU(NRv7-w3cu&ds&Q+-S1o%y}FN;(ixHsB9BOe{*&M3Uz z-F*3rTu8UPG5vCGql!pYl&CPi5d)DW*a>vfjiC4!$Cf8cHdZ}QW1#oM%&Y&Q!Gg{-IYK|7JC(*8j9cO56EfM+M~-C^)yD8 zfE)kj+~0_RP!WZTmJAI9%afj=g*{JMESF~v*E5t&8SenW`88Skj>u5yteH07c_YeC z>;W~VaLkF&m2&8#pBHI>AKe;zz6c9jyb#A`{+`@_+&fRAT{dC$(%a{6l%(z4$Jhrk zYl_RV!gTMVSY=FE7~*>^5J2@LWEI{Box1MthRB* zhev7oeNCBJdR1o+d1-uHkTp6sFAXRLYQNR{H1 z@v<2aKubehNVS)BhON}Pc%c(o+uR%P7Dayr>)2#*=7*(1$HZmf9vW}W9Dcp}xM|7l zl*{3c@63AY@zz~Ci3IMq4ivWJoTT{eJRX7EY23xDgn=Fzdy6fCzTCdA6TLTG33Mzx zeF^RVUzxle8BDOHWxH~2wT#f5=VYSxY>~yQ4~ua?Gt8xRPpPtek+}CRg!>9x62Vj@ z*Ml?z@dwQG5{w6vk8w?G8a$)}mlOj05aIH0!M0<#6_j1eVKB~WQcgOc%#+xEPM*5} znSi>0YIiuP-_g(D`_4ww-9Y%xCuG*ekN!+Oc_$^QGpj>cBD<7c1wlW7oTM6N;*P6k z5~YC9kS%)$w-h{5jOQtB;loHl$iIyJj}hrS>fqVsWO!)wIpFlX%dI!w#(K}(^$p#A z6N;iYIp)AEy3Lb|O)l*aF~z=@OS0O%Y`cV9=73tl!O}C0>t`Zlvy>)0MP@N>!%FA- z#7dpTS&+=ycd>pC9Rl>7dK<(e&TiO<>}w)|O~_!FUZ|f{&~8 zy&>h0^((DGMi_?1Wj3_o7QO$O)U{7%ELt>Q0Lo7SdwyP|)LuO+!ms$`Z-! z8)`x2l2a^nwasOa(ElU8I{-Ur7hg_r`MIoKQz2cMP?TV-b!PS({-t};kKbxvr|_ea zAFOC{l(>&cGQCCJWH_Wq!hrsI!65qHbpebfbRf*3_s%;S8+=`k(k@?m?y?}>GAAglh>T~VAc36 z5KRyNJ6gs~zO!1t1hgDD5p7N%J2-L0Onxj^uSNx~vkZ=^0mr4lUfD9rvaVyzh+9{l$9jVX*2t2;_ol|T^swd%j?d?+;iWx+61hM`GG9aTk1^i5%kx$LB>LeoHbtzZDLG4PKLY zsQxJ>fXD_E^L|}&jH@(3hveGLPNhGq8r`Gpk8`sx>J{mcAKjU4S9=U_5>)-+DEO?; z03y=%Zu=V^uXL99O{Kd=yav*86ZSVl1M?W$7}1x0lm=t4?fVWhM!IH^D~-orR#J@GphO{S^1p_zvXq+-yZtQNto5Q`k@8V;f)*Gq-_uUbFZS_W8V77z!oz_1bR|NsL}Go%Dtj7l3=a?cC~X zaN?2~Yq8?jMr8{cC3&)31c*ohSN9Ro|J0q!XTg!mn?<$RgJ{sl&&*jiwM=@U!*U&J zf`&f`H^R4ZzTtl(eSf-IANl&VsYaWfGWLjHy8uWFhvmJ>5b9rnavjnuqCbPF^N9zp zuVoi=6_&a4F>^=GO#Viq$$H~3IKLS*=j~mChJGXoiRyR2Pocbt_=q3jv1y6xhAC@Y z>f7_CFa+HTB9v{8Rr5HWFUqC#%LAD=HBP`$v|Kp5;}6Aue%ZYjF9EP``0`ghcQxf9$GZ)_mwsZTp1%KC>l-oxJJNhMC{LwPyqI!AX#@ z+om@lMfM7WR|;Tlp1D7w|J&^S*(&Lobo9G(SG0iEYS{;UxYjpWUqlFrvE=aSAq@fB zXM@{5NT0)+>`D+k3Q^QezeXbK#&3D{YdT*Pp2%R-Q2tKLjBM7`Nv=6EuLitaVs;gKv`?-5*I_xh8j6OQ%Xg#1Dx^X8bVy7d)8o zJpv>7Po&E*D?Vj-h{TE%4V$N_sD|JCu8tX4oC zYV+~(`MbtpSi)s)8f3V29NOhXT{kt%IJy{|lVR37R-qNA!q+)w6IzwPKRBpbWIea> zyMa%5q(uYZjVIHqiVT?sMfL0Oz%}A_AIMj2=qle;QV+k8LDa3?yE)Q=Vf+Da&rMs8 z+0aHvKFdw|=$dX8Iz`XyyE@hlX^&@ zMshLJ-wdd!wAKHoPpvrBa5TKDJ;04X)!YV~vYik7n$hc!6}vgL;;0|zK2(d%j6r+` z#=z%XnoC$5BU)mZ48hHnBCbh;D2wnpoLnwPM_M_=BeLdVhY=uYWA^oCvumFpB~5G09nkRn`>Yp=0|9Z1RA;`~;08Z85;6;n z4@CokD$aE{(ARwO7gCQeDsgowe@*EHim@9ds+y8%UlfI{VOc1OLz$(f&qK3YIDO1+ zKhmzZ4-iR- zZOK|Pi{njGEN2HOX-q26E+wr0j}9ErpMJkTV<<0u&Xx4VYr?X(KA}j9OkNt>kFw~? z;F&C}qE?G6DxkX%g&MQ494f0x1=&JGy zO8KqnhB zk=6bHbripSv;fKSxHcfb2zz#iorpTs&1W4|70yhdZnc7;8FW=9sAWfRsaU%$YZ-OND z=K#K=-CjB#Xy!Y86pt_)>jz%lwy+gr`Be_w6x9CKlm`(2b=67ZT_B$KUDFWML>zAh zU07OENBnlICbF}VR2t$Pmy_ov;>6DecFoldzQ(6C8AWz3ASzB?BEQ+h)V}}MhGIa@ z zWV!xW-+s8M^WM6Wkc6&vIw+8k7a+~j=-8*R z)AJ!_EVz0usVCnKYR_ASr%5KA%o($Y@%1B-QT1cPxfB-2bmC}NXN_!_P zJwr@KvKTSSlKT#dH$l^7DfGY_Fal^rbtWT+KtXSknU25Ztn@^F#TembK~J=*o<7I3 z#?MKRSY&AYm|7bO{UC<2$ku0Xf=m0XSV9J29Xn@Nh@pCy+M&om$4qDiZhV&2TBEMT zLNc$_9+AR6DHr=AZKhSRswVrn14IKYM3PC7+LbAcd|jjdlX~yh+6s(>0L%$q#rpr| zjVJVjtv!{~{3A28;a#FG5BkpE$ol>U=Gu=V*xe0?EW_)Js=_ks_{Igu5AoGSH|Y6r zszS01>F;iCXFUM+HqQ-la_MVA1NKI}D&m+DIOh~rv8oouyETNP;G$0S9u1c1N5;fO ztI1Yjdy#j_I=jg_N1PPFEm5?P28N-*Ln!iZLD(&d;Er2 zyPbDlH1bm5loZv9R4&P9u6KU2y!bCy;7_$A^q8epY~B?V!ha`tHtO&&c8E&O({&So z6|1ES68ng_bm}_?*&S?Om{`};$4n|-Q?E*X$<$Rm>6mAtp4#bl3kx&CDXF(jvtuBn za|Bm$&Ive^BhZ3DJxy})0e3H{MOaQ{bs8+?HF(E&5tV$(rqaZ`xJ8LxY)C3GiujQ& zZ4GC=>1H5#vLLKp;&~$27vax#PxGtPo@p5;AgOQHZmbQhFXHtXZ13I zSs++J2+#dBdp-G#F#*Q$*(BU5XyqC`A4ddDTS%YK?&Xa z*yacX<=}y!lg<0Fyl{Pxcu^^!Es;LOo0I0 zQ4zS$gc2Ea_1j(>CvxMy4j+@(vLFBr0%t#Swx(QSkC=tg#*)PkhKr%#Y$hRn;5$KH5gtOM>W8Re=dm@zn?L)sDen4s zdAX6;oaw;M5F?_i8*BtI*L=@s24WC=$~8P3L-#<5qQUQ#o2 zdxDb@#d1Fsn_K>%X;lZo5`(P4a{X7xF5@ke77c9%&8&l@1^yMF zcch{3Gp{&n@*?_>uz6!_j%za=4YD0G{`82sz_~gtBIKG`yXJTD5hGa7h|wn?HtHMF zNL;^W4uT*`JRef~n=Ph97?5r0n%^s>1IA*%c>cIPZ%b~MOT#{@ywp~ORkM5 zy0iU}jDw6~A(k+D-tdKz6tJFn!{Yx@^_6i|bkS6cY}0yhk&G{ zfCv(Tba!`2cS$!=?>hJWd!GOE?hk&@b3A+RHEY()HP_5V5Uz77DKo!_Qi8O?QxJAd zUHh^)7b%RF*Ye7AM~r#xPqrQRU&)Ap;0Pr{aXc7b8P(%AEw3r{9NB*0haqU@9X;TM zRQ>tiFex2d+QGT7Qi_wtM5ZIxknQ?z?K%*4o+>E~Ch$E!21V$v-q)QxMqSDq{Dzxr zKb;to(dOYzh!g|zBII|BNUe|2&2xoq^J2X7bke?8^MA%mNd(`N0OiJ^OUzERkZ}WJ zGHaZh`eyBGuiq7OSel!=U1K{M}LA)E!SjVT-Y__ntuh3Pf|bOZp$?vpz`Xw zw+zr9fBAR}_|gN8EMCde3D4ywOB=T(>r9Gc_$H&w>pmg#aeWjyNuieuh#ERbjC zX)x6^P2?2A40}Der2r*0LE8?zzQ`P#&iU6R5f3R&rUCZpaoUR2*Fvb<_tC}14e()peXLL?&nE{jEoybF$d|k=ujAV#!qWJ%y z-g~(4+|K%1{->UJC7GU7w!1n>aYy8uGBJyMdz2bP*#EL4pr5w#*M2_=zA^tbW2htg zHqsdg89YLxowr!;u@=_`PPS?*X{{D$yLE63C$i$bV2F9{(=gw-g+e8w@^Mfc?r?es zeoxOdlI~)idCvHfu9w9@=zF|B5h;X)z$IpKO1^GXKqt+=^Y`ro)C(#neTvRj>~B!- zX8WM@*!#Bm&)Y5%+Nd$D-uz6UgyrGm3SsJ9J!iQ24-p5r5{+Y~LJuar96|}GY7)87 zWl?+~Pn^RywM%I)ougc?Owmd3*6P+(wdmkUlEl&I2sv{@luhVl(jzP!w<-lua5UmN zurY+inH&j4h=sc;xau;z!y<8KOfK=L>1_|u;9mdW#)U_5GEM9pHMPXu@D?do7^{i0 zb{!!)Frpg5#os)hdDRi#oBoZf_1x(zzkjdoI_s6u3^^1D_B@z32!BAZr5#HXi@NmLroo4L5g2`3_nQjV-A z@Ki&WgdW+gCY@L3R`^m_WZdeKEzj$}q20gL+dD{8Vgpt#5m^~3W@Wq zJjmZ2$%-;Od&*Yx9eX8uImuG7hz$3-L)&2uA_UPaT|5ZUtowJPh zpFBrHSIyhA=zXsCb$0Vb6Pqb z&?xJMfm&zUK_lzV7a^n$a~TYnT^5*Dh>JL-vVwhuFhnqpz@)z6V)khr=;n-ub{_GT;h$ zLA^%(etl+wh5)Y{SIW*U{0nL}i?JeO*MFdGr!JhrYcG#VD$M7|#z1Hs-&4ij_6Rx!EbCIb-*CtW(&1ZbY-_Xr8Z=Z<)K?Z?^_ z*DO;hPlpNVOnQy)OtfO2Y6HCHrDyO`P zLCm?;?mRZ5X&_=f&9J+aKqbZ6eA>C(`0s#TB@H=!s_mz$B<4~^FB3XCXh-Df z{*7hVv&9pJMOYtBW%IAy3j2&+DW0hMFE-f>GzCm4&w zu8tDILcNPynRA7gmuV{*R;*6g9#JP!p938=VcPmdMSV6lHlWPwMAi03Q+Wp>4}AfM$>^$_)PD8uB&sFhivNX7I|HEhD$42|0@1iU$IsF%~YeAyqb=~<&0bTu70 z*xQqWPc;~UZD;@!rnKa9N)Jp48y-qt2 z`E2JMp_m-|$lYz18?Rzt{qPdx1^a@{I%hLp;|1F0yyrq1ItFXogt;g#%#<*5-FM_q z6o-73MfyDqP!5=j{4Tyx^WlQ*)i43mZNm)SQUssk%$&AZN&WT`gvX4!^Y1LNZ_?iV z-J(WFZ~f!}YmFEB0$RD^>WVBmco$Bc)NVl1mV-gj4)iAYj51!6xT~~p3+74-^9c$H zLOr65FRAd4GV<5!5pkC1?W@W*C7q&4gcm${Hrp$sPHVXK6WLKnL;75GlpxxCVtx-% z_)NoRUTejzM6g+QGmwHCzlE#RNe&zqZkcfrfjmeN_uBO{Cf>T5A{l9vUlUGsgT zyo7oQf9So@CV`}y7rB1|Z7q2;i3_p)ySm}5LStg1KX7UdRaPLS^+hZrDY$S@Aw;p*|l__EUY z>Z4P;!TvD^dhvp+!1Nhn{{)ziX8m4TdH~YvR`8!$^}Nn{2>)n;cZZb-RL7I`!EE~E zH%WAn{a{Z;J^$pE6pvR<=ae3*7-wzS>O^HD<1~$Mv7i2?GH2i~LU;@Qn{^$%o(O)c z-6imi*AOAj^4*!h1$xP|S>UHQInccBz&%~U!PyFf$OYx+=lRdT3`dYXa2XZn6o@dRo&xs-QohF7xL{+YjjPU;;K6icthmW@NuqA$Lz<} zSg#J1sfh6N9b0w(Aipoo8(Gm^vwA&C-5l8BnYJMA4?`!~%g&E--al z3PWIPROm#v*7o;!o)kokK!gAJ=MXEYfb*8D*xw0cuy{G5zU!T#NC7Lgc9{`bV8nDG zq5j7i4Il@Pn+VQjz>flQ4nDuUZ;q#wgzUEZ6T$p@LIa<(W%t#`5@p}-&P|X*@ocki z)n!cN?PunOi%}tEp`#iwv7ckO<@xcXZ8zJS0LU4v>U(adJYOn5e>M13Tg%JC6WI@D zWNYi_R5TuZM>%Ra?L<9kI%yqZYkT;tV^0kB99VgX(TT2u;qYyjlW$KNb}3FCyCZR> zO?#s7PyCo6x6z(u63XiFn@b!1`Nwff_G-m^|i%pr$XpnE?c7;wEQP-&<-&oDzbj0Sb+u> z7DgKBok<8R?D!o8Df|vl-wF!~AkZh83+uHk{@40X)SV>=^IayhA#)Lb3y^OKW;s!k zJ>rqoHDJsLr1094mu8lv$*9_WOH&KDZ%2k7y?$OdxFr{VwN(s?5a~)|{ z8g_vA!S8O!zOoOE!y2-z?3i`0XU0_E-R?yS^cgSP^c>5Hd?*u0e@ol+J*@Bk2@ zf}Fq8#T5PzXFz@c{3W)*x(wg4>r@yzsozEBs^tJUyB>zx9)^Gi171u<=LVQ@RHm@g zMt3x8<2UC%N$?vs_V&EKljGy;KymghYXcnOuP3b;KF{+l_qO|G@Oxk0zW_)2Q3=In zd|~Cc2!rmow%@7VL01}&Nh~mQD~V*xvCm^o1est^yvk8Vzh=_sYw; zaiVa^5(#_32m0(p$iDZ3ctYQ^(B4 z^xI}KShvpc`@7%vcc#M2sSf}EqAyQwM4tFD{YW#TMYRGHUd9j~F|Mg8KCx9!&|VLl<^wd(B`%H=>Ot zs!e@0Lie3-BbE6QNzJa6kl>OuQno_*9?3#1%;Q*ak4TrzkRjBrQ+;SRCQ<7lV-Sl4 z)ol2$3i^WY<%ZiCI^qh?48-wo>fvVA=%&Y&Xw8{@4*4|i9{k^0?+m90BVx)#^u+S5 z@PpU8Q>@zZNAF~zxXI_L)PNlL=&#_&R7k5d?ukO#sq#tyK3PqM5^P~&th3&@CLr}H^v(^#Rg)&QUVr=sl%vbaDY1!O2_JI5_($2QMx zVB_!`2WWIvM2D41w#_!HgC)>wa4w8CixS!Yn&dSX1s3=Vc)8NGqW6c@Bi;cw&ATEy zSt}x%ApXB%(O{2!yTR1#k#{q_hR`fEw;8AZt7$&i)wRL-Wr2mPETSYfltO>z&^$B_ zK8z4N2^N01cy8x6SjQw6HuhcQz%LwTDtIUpxHV7p6$l<{+;D;}doTq=!O19w-Oy$A zzmAEG4hCAHHi_-%g2ozA(0^@{zwrTuhl(pFS<1!JHA#>3qCn76_A-GXj5A*Iuw&NF z!9jKnu~kxR>+F?Gm{P6P2wN%E9~%>aV2WxX7$VN71VA!+{_#o=?FQoc*g!r590K?7 zW$X;t2@tCX0Y0-qs}DFjX=LM?AFmhRGU}r1C28A(b%J~xsEz^Y$qLkol~a=IuVzD^ zW66bP$%L=xO{BN-!YTgl$%=iS5xSaI8xy`52ASfwhK9SV)l0=?w8D~-H+qf)eWhgW z&9o5s-R?-|p$eD2YGhywy0&XfpeqS0yE6(lB4FhlE6Bh0k-o2QEC!yFguZV!z)=x?!AEN3O> zAI)fV1@KK7&FmQv2(e-Q((^j2eS-b4fwK}3x2`O?!d>JTQ(q!Z@JWt{VtW^QjqVih z6uq41@Y@txJX}v+AAhGq??Xo&h&T!bYs^P7a)2)Y+7|I7&fx8kfy3Ez_sfl!F`w8) z`WUdoXYll@_m1aV11(Gzi?wzsT@)Z96aZ-w*u;uCqI&L+^Y@*=jeBp#^4ZT0a<8$t(SGPPz4yWx zB}nWDMic`!De~)EvGI*+IGJ<*U<#9>&g-q(MSBp~n6jZLfT%9oigJ@FYtP#NE-wgE zoJv7joI#XWZ2d5vAQ&Ztnwi$G3*)8adYHp}VUi?DZTSv->sBrdp(-Kl*BX{)A%ve= zxuW7Cxo;GWPAnr$tf3PnuN`GRpz0nPxkOZY94koY4!FX$LATSY*Od zCGa%R*`|)z^(m}DZ(Br;{$xp}Wu7*nhQlM#BFr~+{e`)Xk`*MSEG397<8ui*K`sKN z-lfG>CHj+MfRY`B)JP@ukjY z(@WcHAuCo(K!^pH`A&w-tNI4uh7eG#S1g~d>o?eGa*Ov(VXD3$5UEGO zdtzR_>v}k0!gc>Ke2R6yMEJ0WNRiW# zdnijnG7g2%Tx{-RT9;PQxvUaV%nwcYAm$h8@ag{NnN@$9L2`AArhGn>Y_Bdx!gz4I zT9Fjq5XZ}5e+BJ5+|j(!4Ls)$S$-0d)V#>LOf?4>n3#>E(N&As@g0D2jseXxt8IuEgc^YReHs@I%HB-|#wXt7^f9?plnRayp;=phRUjz1x{ zL!hOm)#Uc$L;Th6F+aEN2yDuy)9}@+a(9u_c3AgSUw7rZQLtqieD2QSQ3;m7-xOzi zeUAW+2NfjNOCU(n0C%vJC_4)Bp3V?tiyYtU>!ZbybN(3++k=H!0_j((|6MBhEr#p) z6&qkVNpy;Wz@3BFuPl1E6;A2r(HBP!&gQHYcW?vXCvHLs^=~7UeKrQ@b0D^$By_~R zVsw1kg-MwBmaRqoHAHg;rIf;<>8SQ-vCc-oItlW?_#0$l803GKPyF1$i}|()1heKR zC#laqN%+p+Qa*3`XSuIyznvIVg^BrMO&$Pm5E!)&?Thz7SjK#jT8cO>o$zf(S44DcR{=@!|Z-Pp3i;MD+ixy`2zx;YeIh17FIsW9rs^DTU%T%Bo?d>pDr_l^0-C-7ti%gmp zqEfwJ?WoW7VMQ<49KgD&;UV{etsCvqcj6B$)wWL9#p}rohns;i%NkZDM+#&&7kHP# z6ko-z>3Q-|jmTaba86(gfd?GP;3)+FG>qvUbu9=xmwj)Rz1#4)zIrQaUNbXUf-va$ z+Tq!4Ba$AHB!Oj{ls5F~guDf?TEk$$7iz44_Z?%YTT;zqaR(A`Aa!y(S!prs0ER~Z z@dGteN{hfqKxn`XyspqmGw89&)~PfMlyIB{Dvuy|=d_t+mhRQJ0sbLF+5>zM{El{w zB_y;@+}r@cm5sHvHkg4>V>M;pdYIPc5puUzQ=0;g8GNUR_ZnCzNY!$&cc+RJ zGkI)g!SlO!z!R!7xB*MPz2*_RZd!dj22b}B#4I3l+}C2$t;Z@^0&J+2(Q|6gv8Sri zwiQ3m$@RMjOgD_@YKE5bck-N6-k5u^X$eHC1>f-qyc^cKknikzw(SFulTQZnOrda` zJ=2{+4Uud^w2fNu40?d%e1G;INg{+fxMn18o?_bfMLw5Wq1*PN`T~7*SV4L_TrWee zO~2&(i)()%bI>ydYTouNX2^NbzQ>Z(Ts|@mgovS(m_D{~&Qt8r^*cp6?_h!`+kby! z5rlT%9n3`p9la0*ALkd4&nftC}mVDS^`gR)eL#Gg~67k zYK?Nsl+?u`WriVx^`^O9WY2H6DtsQ@Wx-s;%^@D0;d?N;qd6%@Y2Qw*_51yM7X0&s z>wV~yc+YT#gLL2cO<)e=pm@({ckCv0{^cD<3$Mwq$@=8RvFG^gNct<9zx)MStZXwh z;_?RE5}{#~b><87ymmBuZ242u4*3XiadP&JuusI?v?~$iasx~4)RqKnM$9`Qm`gG> z@bqg)1;X*Io(bXxKi~ZVkVhppcxUm+@IP5G7lEi6*p$!r-UJ8T{ zoLdr9Y^YpxH1=v_+iGTQ8e?jKp7cmK3%ndB0a%VrI%QZwNj3i4KoyPqBv?;!k;yd9 z39L&26OJi=9Y*3H+V1j00M-G3VtD>U;tY{bzA z;^yl^Jw^pR?n{SV=`=C?JK+Y8N?S)T3YFx08#hC`M%5KW;nzQ%{&an3uCEp+&Z9LR z=4Q8Sm^mEfoDWn};b`T-Lh(mA8b0jj+EGd(YI35oN6a>#cMe_K+z?Nb=-9UPInOQd zT9U@O;N~igXVEzE_4XEWBfH!>$rnF1y~JswY!Bi19puDz-QN&Kw?JwVg(<9D-wyEF zn`-&gT>Qe4sg=Wj0eadirG|>+wtQ3H>>HJQ1bwuv&1rR8^m7S1fk<+m$LfLt*bj}I zgN;ypb6cl4C{|{g_;5+#F<4-r1T2)G$~vf2a-?uxtULP^#7+|^`1R{0ObiOYOE$94 z3ds1=$wL_qO*FbA1SsHL?)+E<>3dmmq6bo<1^CgzfrhpzZQs;)i;N{i`v5 zG-yN-=`ZFrzT~YumfMWvX@N?&j=3mB#A`IK0)~Dss;xW6k($4jB4dgB=0BV^^v&*| zgeYo+{~aw=4t@_oBtcIjKWy0h_Ctqo+!~8_WmZD-Lwyb_cak-uiD_Yq-YTLeWqFfi z?PP^eZd-YX%^S1As(T`=h$(ZR(7Zk>DC2>~V0O&BVh=k-hxwLW#SrX{Ek>4P7ucQ* zi?DyRXdLQ~8~>DZ_kj)lNq%mZk=Dbp73Z6X?)*bprn$DD*-V$C=eeCUB3jD z;CJhl8F6&zwSMo>Ep2`A5|Ss9C@%$z&V;Aj<)49~k5mizSesc>KG^l}sx&T`fQax% z0uFuC***h~c?Y3!esZUonAC>BMYmk2QU^TRTDoP(y`6jGSy*LaM9nVc4yM-OaILqBkiJkCn|7b*|4 zkDmSdC4w<1wcIBn{rU2a9}yc>|J?|QS*3Uepqn^72@HAomFO}kVKX05S9e;|97F!$ zYb4OM48gApXK#CC)#vG{S>Kp9ei26{`Gf{zV!A$c%OCP8@N>u{XD-%eGv{+2X+ye? z5alkn_+ok<@vS3^6sa|;8#C|V)Mq~i=za|yoze+BG*g_DFB58)KZr%A3h6F8vHzIJ zr>#rz0Q}yA2FDcxp$Bo1qJy5yJb02lbiR@gy#sOOuFx9NOLzP<0dTuh&+EhAbp0NE z(aMT<6T`A@VqrAyqSw_W&sUmajn|(aHGBT$49uwlYTwIN>Uj5JlWu6`fb^gI#02?% zM!r^S&?w1RlY_lPsBj4?*6bc1MX#NtP=OnI#p{di!NKHy1=GWgnm!fBtWPBuS{GG! zVfm{YDNYHts%p~)Dsi=zFkK(!l-ND1DX4)=s$G5LYWK;#BZ;@aG>2ynu62^sN`ZaB z(mv1=W?ovXfRcUOlHWZ8qqLJls<<1IMf5dI`^C;caBsdCaddP+uPo$rVSt1V5X3`C z1Z0}ZB3B|Op7D3rIlRm!{7};PW}3B zoN9@FiPXF$_gynwKw0?2L3vuoYQ9-??JnL_Oq{AH*A5fP#NciX2WQl$+q2-()Nm~$ z+sfT6DN(Gvcea=wm9f|ehdA<6!8OV`dIw%B(BZ{>Ck5^ zk=<^ceDW;xIdsX{tsxn}HiSiw&9sbLdx50TUld9+uhAne7E=vHvy|#!WSMgEhXEm( zs$h?%vvhNTbMfxl^TSC z%7QiYY*=&4b1a(<6ROwGAfeuF-~V1(o&oSS0Nq3xh&&&lQlBT%h+c-bd2flphATg; z6Sw)FwOxC||J%`}FZH2^auP>$Gz)j%8LlHb%MqnlpCX(f;B5@C)v4r$+0(F~4{};p z-`k=PVd*uPw)#Hg9{0bJ5_kfkY?<0s;lkjBh0fN?lu|$MztZysV}P&nY~pQ&XUHU zzY4CGW2EbRFsqaF-7_uQqRB!CFD1S-P24w6Qfli=ATUg9_&2j;U z0mGBVc#)tOl*or!TGaSTx0a9MTU;Kx;TCEwYkwLp&TjH1j7@Djhr({mwBftMSj11G z8zPM30{nZOO&-UH|@k27b_!`lE$>e%f2;L6>yN%39NB;rGjvm46my0t6uq~6>t~fP=2rMg zqzEK>2KF+jR*up10i9uneJNhh1VGV8iUcplUT=yQbs*JEZ;Ah>ip*}kqnzp#$!=X} z2Ty%%;PquF%h|Z&5`0VSU>CI+?-gG4P%DkIjfa<6g(kpR$x6+$*>OV*D2N438xh4k)MepnELT? zsd+bFkQ{7q{f0B6#1?gx>1Z8p?PZr?H6=90JQqeBa|*@ggf2*2ZOcUPI=7j)+Y|R_ z7l5zk6y?lce^vg82KDoZEpob`!VmUK$-EkVN;4RgJ8qvLM?l~*(dmEJ=Mg9$_=AW> zIh%EiY(y?rzY{jTdkk}rLo{ypGa#nUo<JavRd*VCe-Z{S$VuiM%vVh?W zVZubY>~P$k&6~oT-yWjzedfV#+RvL_L;rlg$y$!IX>z3)0t z5QRh~k5~dx+k2Gz&tTI2ZPGbs5lO~&Vvk&vrgxf^p5!N(pz2_62Q;p=$vf(hv)IFaf|*L6yj4Dyp&*eh;UZdl z;dad7W+-Z(i+2qVcmKE3%~cLxS4U?^VZZ;eC&1WxpTTm}T#1*ygK*bRYBeLawbcK= zGv*z(ThwnES=LP``&i@*dCW&P{O?SuP`D*(+FwvEmhU37eSU(x2gxwT&ZT_gs0#@txU54PC%4u)|mVGH(x4>ycKuUU- zvo>q*GIbSfh8j{-k?QPNmV$QwXPML;Dh8Nf)J_>buPE&f9|o3p4zU~`U+VUAP)G*$ z?~!p+V&Vwc)qYZWClC4wdi)!F^+pAfur?1$E8IpwF>Cap0eDFO?(y%2p%FW;hY}vI zv}9H+02pLAo$I5QLK?dfzz=q005tlvFxScpI5{E~0F(wmi4-{jv(^i0kjOiao|y-N z!quj+3KI*!jM%1OK+11?jR(L`dHL^3kY%NMs%OS!xi`A~I7b5pt~N`-J%6(Z4bWtl z*GE#>uDDeA2%Y|s2#a_Eizq|IwlqZZnj|*LA<#y$Y{0PlUFfD(X=+b8fn%KD7cT=D zjoO@bjz8pp1x>0Q?)B3q`nX46Pu#?c28&<xmRM+a6@=-DAX+8VnLY|p9pyyKYuw_Sjo zWAXHGxB9TdN9nN^$W+nn48%_%00@8-{)@Z6q6W~|36ODYy4@P2@gB1{CeVF>yLpe0aJAq8kudm!u;gy93AmbbWzk^Se}L-dLn z(+dmVIR@2=6n=w!4r*g@{2LL76dt(^4W42*VA3SG*wojHYeM1$j5vcc@}Nba(M&xG zOTRIznNIgud&<41h32o}UP0CFA2C~lQfTiqU0N?g^>L@l>bd*S|FM0mk8L(xBKi$- zNYLxhfZ++LP(1yz;3MY+mUPXzJUXyOdw{zH^Y`jc--}U^c0QJ#_sGOJM4iH+g8V zaX9-om_nG4)=6&1ROn2U*RfD=Z_z>|dkkwkS}wLK&n2MHF;ISYw;atkyUGzPa= zAp4@xCp?Fc3`Y?sUD9srTgE>3y<28!sq6y@K92yhk_7Yjj{HIS-k zzI61hp@~TW>n14>M2~n_Y@5+8s=lI~*o< z$NCDB3ny098VVd-H@ap>JKOfA($y_4WM?2dv#{x z3MxIm?~k$YHW(R+ZX$~-;kbDVggchRdI&GG1N2E#)Y5*1TOTm{?2 zgm9KW0d%Jijo%4(wXg<1!&97_n*QbQott;~o6!n57C4AcF#Ywl0Tc+j^HIZb!+g59 zkp)O(N610r@UC>4uy~_*Or~!L{sf6nn7R~*L zlf)_}dFmx!gY@yj6zc8pZ+=;^+%O`EOHy|{6zn$iI%%>9kL#sS; z5J*HhG4|HYnfv{le95Zy^(+fi_#~R&6_5B-pE=8m;5yw|y}sK*F%#NzJB}X*N5aG{ z^N4X(VR<8nLht+MT({O>&c7lOjwijb{f5+@915j|yiy&h`ti)$rHGYsah*RK-`IjY zbmeDHMDT-cfRbSo-nF%&BD!1qsAaTOo|%s}f4m7nkchK(jOAKN4%0YnR=pzT4jxq3 zFL*`ccud~nXst2&Q}R%Lt>Azw=OZT8!ER0d1-}aG-L_`@U%vO(bHcklga%t;Gf?){ z);QRDN;hjjLH36Te@BlZ-*SynR~W>ZJ9#Ap)F2O&>rKY2Ett z7O(~eT}B1y8~Pz$VuqPbb-k`;DdL?)^qf z?eCz`9#Rn~JBjiS{V-Io9ke}VJ1Q99o@c~WYw*7IoNjICHtgXV%xl1T6z}d8jj+qB z_=kxh?}gp$_g4<}?BKx+RT0EJXdavD=SAp$3etN;HOID?ZhlMlqe}|i=^d&HTsMlq z5|T1WSUnfS(`b`_Fri=RVTxU|@*I?>yVN;0xu5FE z9Inb+^d+Q5uK$j+=*OSbgHXwcrJe`X;mGJT469QqS^k{^Mxq=!%z5=yQ1TlV#-f5Z{l5yXRRo6O&D_-$n0# zkBw%F=)8V9qkMJ(M5>-CZgI)6yR&%zX6Nm}q9Qt?Ucjqa2E_*@P_w$b*rjyp#)c42 z0TYD7@4@56d7>-@BX#`{IGZsAwy;>A|NkmggUc>;=k48Yj@ZR87w|Xt!0hZ-TYZ6d z0W>CGP&hLm%U+(J_c$M*7kfDE0*tOrz@CFp#rTT<%|cg*H2ko2DEzbf*h-)|Km`EB zzFi4xkUIeFG(Fq!$+gCv#C{jdo+u<14WEExH{EzI!7J$zh!B)MEHE5OEIq<$R{%ry zsbdWa^+{)!kOsqLL_g!?h+e9d&q4~j+zr;Fv zhpy+&;>pb2ty;zmPU^60t#WmqWPQVY(zL{X8@$OyzUBH4AG@Z(63MR;?m)&x8O(t~ z&r9mJsjMvkwFc#20sp55LVb@s%SU~Xj6kA#NNEqCDY0Y%=KyY)MAZO!OA8?9v9(;P zqBCZ5nDhcy1>x6av4esUU}@IW)Ij2&6F|S32b{2t5Ww$Z0i_>MzXWBQsY>)8i(m=v z;-7EhwGaCfX&@{=OutjW*YdeNg>dck8$fM-3{?HM2U8eBr6KWAO6fUf2`Js1U%Uz5 zHOM|Kra|}^ZcZ|7Xb~M-9`k84h=2VKnWfQq6E~u3*Cx;>NP-}%S1Y}*1c%HsiXSob zR3dz)^rNy%g?=3mI2kpr>D6VGAcXH``%@c3y>7q$}3!nEU436k(IeK8WT- z08?Tno7qK_m?olW6UjQdVw{xh8~PwzoP|^F4`Q2`3M}GXv-Ji`+r%~WGSu|GUiV#1 zbTB>#GVs?kb05Uz`jv*zZrgH@$XWj2i!YOY60xY==`oC=&6YdtP=qI2sb=XiE--8_5#Em)mF)(XM^Ui9I_XD7pyk5E zAB*%V3s|l%5cq9dYe5oZ|C+o}CUI@}lo-v*B?U8Y($PX=cuz91Y-!!xT~KNrN6aH_ zNHKiN2-f0Zpa-QPFD_fv@l922_OMm<=N)CLIMb+}WfkRaE6a0RQP3v-zZ3rCymhy` zsy?1a)iRg(~I zuEB7=he0|h%T_rt6VdkZJPeu1^Mq_{62|0oulvGsAT$x*Hb z6MEcMy*kI5SxbE~fVoi<<=zZ0vp|!|Ikic8!_bDZPwcb{`FO}bLkr1O=m`&nk-+Q7 zkX7O!9&i)?J8koO!h@Fl9sdpW z+@b4bT-t9u^}crzla5q5YOV@*$4E0~r^cu7X`eSLFiUgA^W%p1>zSI;=aU4E28y{Q zaS+-mQ|YL-vm~r*JvyS72KX_=nd9IuL`X(M22G2W`>zGUD13uNw#D174HBjc)yc#md{Of80RgPy(|NSO|d2DR}tVC>Eh ziEr^>{OXF2trZ*-h9-`4ABu*eYN+<>hMx=u-;h7JCxUMxf?y3(mnk4Io+i@Qwk+eo z$`_5BNr|eauBAn(pv9bfHXBLj+egwNZp+aD*S2|Z7yHk$v566Y#>uj8d(M&lX=LJ_$`VZ~U+e9i8Z zB5(0R5JK^EcmcJPNEQ4jpc|KzE=2osv9rmUjtb}}!QS(y@f6hH=R&GmR-8PPAt>x` z^J=r)=8~j_S$Z@TT9EX%tu2h~K6eK~qa622+*Dx>wxC$f1~>nqIOrXCjxAXs66RmUR zb{m4e6b*&7Tj#!soJ-vy_VlNEX?9CCHm9+A$Tz2z@g?2-kk?w+j(xu^mlm}~ zk$=Do`p|tbmDmt{ZH_0V2c*wWF(K0D;M$K>N%toU$lyR?=t7=u50bnz8JCaVa9=W{ zkzsfdijx=l2I|e8rfoKdfgtC#xcV0(HZyf1Lg%c25|(PDiucETBw?f^DK_IWY<3u{OA*o&&VC+V)g!13LK%BPH}@7KT*huHtrSJKGiz= z#>y(n=HlG*ELAjn#>&Yjdy?HSO1*v#IF1Q5-zM!uzxy?So78@ zP2?=3@*7x-51;3I5zdXp6-`m=3e)bOlVc`5*8UFur{i-$^T_21 zWmor@#$QFuQQ<3VuW`RgDJCHafswNrA$pH>ZgC)v8j?l%n#1p26E8!h?W9nw@g#3; zIC6DT4B8lRS+?!aNo;;ED*GVnpB||~?ZkqC`(D}8tTK-h;IhlT|BYSGHa!=#+^U(Y2K9!SaS`Shk|OOn*z)cdeE(s!R^P&;Wk>d%jN!@r$z|d? zb*MHy@8~u&u(Iw9OT5mVLN_e$ipcT<>Wn5<1o$oyMPr}dAu1#6mAX;6&L z?7>)E>yJ%rwjYh&l{6)GXY_Jzy)b!^oDdt{$Z?uywNss^wL_#HqcYzdJtie-kcBoX zHRc!qeK4RGem3cC&myUIkpCp^Y&$HmFH?th|?&x@MR^9{!aHVC3rFylFP-Iy;Vp%{9*U*Po~ zFvy8pS{Q~&&L`m@26NUyN2b}6vlw>XyLRcJUV&>sY2iHw&{{K;Q6GzjT9zJN!sfRZxcb8+DGxW7**#OKlqE?{9Uq z->=?z9t%b&4KMG{d-`T$udE)q1QOw`2t z{y!g0O*VCoRUcA=QOME@eB8OQ@L7BKle@el*ay2D5W+GJ)*p;T?(!mNn836nx_J7O z=r3#FMfb#kjxor!@b;+MpP3p*$6X$C4d>yy+NB69cb3qC20@{+0|95UDX=BvTWA65 zSLQ}_J`ovo0fHcdjNskjj90y8;w)u~>g`1NlE@4-3Un_u2}o=La8CNt>)I8x}e)BjKFqx+rB@4)4a%AhtU;vw|3tNLDQQIrk9q4zW_kntDWh>JQ;A=cUl;U zTk>`_k7H|VYxk#$E3|)oztym@DJ7V^Cu#dqV?Fb|Cz_CQPa8t`H@bTDlvc*3%#nCI z@;+|ML(vv_hp{o)e;HaC&>BBzHPMB3V;8|u@tepeVUhpY$LGEHP!btY5x^FA_-3gP zPa!(wRmg|iTBI)ufqQRSQIZE%s^e+$()oWA?uM}&-eJ-F=?da?jVpoui@SY#>nyfK zRRV*Axrr)->pE%*;))u$Q>Kl~zyRr`)V2EzH>dbF4*`Ksvf*hh1tOlOKJOyFmwG-? zYVmM$m+7~7T^-CoGGjn!^$P57F_(}Y1`TJA)g>iX;9pu8cF`wxMl$Eh^-A?P09H3s zs;Qj8UDA2?@#Du*%?i;!W!0Bsy}dH7%b@?FCV{VI5>eaxZtd*vFORd0N!dhja=*lO z`g!uiv1o!*AIKNBhK7Js;R(Z0sad>jN>vb4%s0or;;dZ?S07kWB+x@dEn$Ttvy<(}FeLA)&wtClhMSKJ6Lf#@7TWgQt>JRVDDG&0Pl zBU7vUz_yCq>Ff8kNH1c04*EX0?^AkH#0;2&-wyYiE3vy z&oQe0Up-RU3Tls5bF0qgLWFHk<^<4`FKB<Hzi#aM zI?X=lsHtob*idFvajIJ;O&0cT?k1pwbL*6Vx#qRZq zLrpB%)1tb4U#>d*3Cd2?Et&WvEz=2=y)GmKQ&Jc`Mg~NCIR!M0J7z|{MoQiWgo{IC z2x;1Bav%Ed*MqL&1`X*f!!PpR=$7XQ2@0O-syssU;BEo{!}e+?(*Xj)0*nZ>DrID3 zy#88Mg{|-K_U&6eJv|$nKRk1~G}Nestlb^J>cJX|*a4Q1qt=~=ukRzI%h2b}ndSZK z_Z9j-`0T8#CS2bC&@QA;b1qWOX?5LKZ7GOg)@!VpE?I8&jS;s7~+Cof&lWn`qbDcI9*v)1?e^?7j*r$^8cFp4tS{J|9_I5O;j=qCB)e? zBNRd^D}=JM&R&OXGD_JiSqa%rW;Vy!JA3cz?BnkLzVG+{`2Bw8@$hh*8}Ik)^?t4A z^ZD6GwJ(JOn*{V&>9^hS;MI4j^gf@T`?S+PFl{(JU5>-;I>COsEUS)m0@vGCY`Wbp z7dbTa0lkiF2LI>G6c)2@Ur(0V_%(aXwAyaW35J=8^WU-DDEwB9%m|Y?9yQ>;=4fK_ z7r>wHi&CkHgVrK|lY?GbahVz17W7h`_}@Jfnc(J1IuO39f#?V#B>D7+*P&T>cA;PL zmJ_{!;^GIVURF!VA_Mj|Q!k>}k?%1ac?9M*KNIt`Rom_^a7_12QdwCr&>gkzGDbR! z^d@>is6Fmd3Fc1M-J@PJ*SbYYb6`oJ{QYb8;Ox*)4u4x6xorM}Q=ZBkseV8U{OTVGDXf^iZrFDk;IG6__ zSbOXo9p|cS8Rkt?0^_plUlzae$IQ$N(tm$`Q=iD}9_#k1j}fpAFd}s6y4~eAU}tZS z0l4;pBvEm3yH!*Pi6tMu{q_N4&`i$9=nsc802M7{QtyUZ>M;8JSz8`nT3QNtK7gCnW&dyE%`n7q9 z|IM2>kMnH@x1EfDSiiAmDHm4~rV9}F_vbx#CS69fB;L)ZxD!` zC8!LaMx+vda9!MB-6dq;4>n%*@b0cAb&@QwVTiQN@* zX5F;K7BBY0#}H(D$TQfRYL8u`1>$C9YweTGf-HIL>GIi+^&o!fH+^@tbcu~{R!0EtR4=rsAYZYp`9J5Ju=^`fK?<9|EXQ-X?DUR^k2VPnS8IWA=GsFG^qq-J?E-%vBYYONE zwpH>F_QUOoxCwzEHi9Ro4rDyh5|3WZ4qbH?tnm%~_Fz)my^0qCk${N)B8lZ-SL{a# zVEc;15z$_eMENdejG3VqzY96H$}X%ud_58^sW00CyZwZ?qB;(I;C$pXOg=(h^?uX} zG}(}$&s@5Q@^->I4##QX49fL>GH%>$RlI01{*eA;pnxMQ03UcRj(f=({7H|^kqvbT z!D--D_arz2k3P}|^Zj_0M|XRSn`+Vk!~<~fXne32Q@@!&BliUz7WY8Gs^N*Wj+O@K zVvo3TF$HM!%?(SVI7uGSZ0w&*mRkY=fjB@Tn!*oWn41nlh5QyN@jp*lXI+B9%msk9 ziA9XRq$k!1Ch}_~buXW?eW0AfXL>2b%YMN5lc9+tn<0V3PevfC#E?9oq`i~#2gOGF zUClA0yERO59R#QGrUG$9s=7}ONqlRct6KyPxFserU)&Kj^^xc1h;mJ=GAPlh@kPh? zUHdZ1MlkdZayS2ZKtRiF_*ICYfg~U2T;TR*&(he8OV>Af$#C8;!}p)|@x39zih6R8 z^f|*5`(fx64i}NnmmtG2!*edl@1KGg+Be6Wbp{wErCwk%v504{^vzJ+5NTJ@!qYV| zDphM97dOnWVbs<Mry`IL-N7&wu89tsG#m!%)mHRAtsBLJIKc z7XXh7OoKC@TP|2DV5Wq-SkWy+G_zjIA8*3$B{syI(bPU%ysFenUb?Unq}6KvQ0B

      P>n4 zM~ZRAD`JhW{k0BBpx$g2&swsl`R=eCqhfC@JVd_^V(WC#HoceSbQ(7^EVjFm^O(QK zurO%zO|R^o^3KEVdk!ReSI8s1dvku&sW7YkX}lhFxnS(;8hSS%dB}8i*(d2z3al|c zt^%Q)@>f5rtKES|k`b&*>=&fF_D)yZCy>`wSHFC+kq#X&Z1R&TRF7723xR{Y%S2hZ zO`-`!#fr~<1^@`6vFxBr{t0#V;4ArRmjklQN-DqYZ>?sh?0GqTktRX}UQ$I~H zYw$vaD_oe%0TdZ#a!8F`;O!CljiA#-Qa{G|nm8~a1Bff1mBny&HYwLTZ-nD=y@Dtm zU|YK&fYkx6AIQe$!?a@t4TzjsNe0I*yqYDTYMiw~eIj=SW|J7`mm_#5q$p)REgUtL zH-^$qbr2RkGJWsJvgAIciAyq?}*5oBG@$Mx88-21ZJ_|t}XxX|#X~&sd zKTbXeU*2TN-_GvIDSw)tTK5K#ES&1s|5mxprSUCDe$T-QE7GJI%zzQ>+%qRLOL34^ z9U>q|K7p~ZF;ofDwp8Tg9J8@vDutGQrtlEgjT??9sX>GQ<12a-pA@$x)n{u_I@s70 z>cDP`wEz2>zjiua+cY*gS-9>j6shj-FK74M%*@Pa7o6JX=jR~ry}i-s-~dvtrH<(8 z6%d7|Dy@q{U+37S@>%XqS4%U15Q|S%*}a8I*TsBFu|Amo$ToCY`e{KMsfTbYu%(aq ztO1Dce0|e_2VVkxhtClJEw^55c6mQwz^U4Vf+trttlX*}i1A1cpO;yeUL6wXvVF)Er z_Vu|xjmf@`bm<=`AG;}9EvVBz+zR~cV#Z(_HKL=e{5a;FQelX1(aRW(144hn@)VN? zdK9|NvZ}LEv(A=mGEp0}BFUi_FXHcFs@HB1Y0GyMFvmV@{Y>;5D?8$>m)>Gp*Uq_+ z&v`93pD1Oz|Mb`q3vsSgG?m89qhdYPpFbCSf@Uvh_ybmFtZcR~YQCoyb}vKjyM{nN z{c7a__ip1nKqF}f{QC?v7M{Vnn=f~r07U(!g7E0!TCtm^~7-7q>D_tOe_5+KNHWF2OOF8VS>&rs=Z-OLRk!@^}nXN1V z9B=ZhB?nI_1cu27J)o_sJUe4Ul;`Q zI7e+n9MNvuNhP2pK;gO4WH}2l3eIokWf3Z=q%^OVWOxk!g%h8Mp9xi?Q|WN)-#X&5Zwi6SRxp@O zLHb$kOqNs7;z#{p*8v`KcxuWUUR+=JU41(vqVlOfHoRt)O1AJSwtO7XT@hTP|!8^(RKwS@%0`QY#x*Nc@Kn=mm zWp=T|T-JDOMCZK_MA{j9yO{TIe;$V?m<0{g{`HtqB)#nho)5QbhFz_mFvWndtH_U@ z0QkCnzjYbR$-aUWf~CDOxUeO9T7Q8z65XG|_-4U@{c8faZic?n=z|FOVV*2I;$Hv5 zTozB6$y)nlW#k8Rd=Sg)SVh8VD^8~jO1i2yW~^?B8Qjs99{#Lv0man?_`lUw(Plc}EdY$heNfY0iWL_lwh#4?YBi6w>6Iqb1AB&{o08{~ZN^3xlP%@27EpDM2!15pN8c9fGEU`oi~8XallBGpYLxza+EME3#Xq{2{{+D50Lc^(SJ?nM6o4C?K-LetSY`+G z*8u>oGO$0w!xgyx;kA;$lPv>q0!wJ94a?3I1(uB-rwcg0WOIm1XlR99Hk9Rqs}W)T zQl5LZsH(Ia)nZ3%K7l@sN^u%z8meQNa6oN_GoCLi?D~`R%^03{qx$r@_mQfO+)=LO z)p5p^t;oL}x1;SiVvLt)ttCQFY$yIi>k5M@`w=6D+M(|Hi}P;JhY5!btuwv^ zq6mWkwCBKtesarM_<6OVg=yKScEM?PE0FL z6hQ8)B+sgM8%KWaG7E=>ZJmAm_z|#(URYbNgLN#cTZ+n!mF|@~nLBAZ0slB?9|th6 z0HkckX?E7Df5-V6DZ@G=u9vnG%g>#P!a0+ZzR7;e?qHPu>aB=gg^S=&);aIs)B%^J zp>_d^$3wG9v)m??{2GCrMuXhba%<<{fWD@mLX!FUJx0oN$Dz6g5oz98cC%#fD8M`u zaW&^Q3td1S$019YOjG7roa16~osZJb{~275y||DPIEo`S)z4f9+G3K+F%S|Owx0^S z_%}C)nLBxwD!SPQpuM23m@5l7D(5h!c` zY9=KY#iT8ZQc=CZIoZQtG&DA58|vUlaBoy)sgNL%B!0DVgjK3S{&ZZknALMgY`Ap+ zfo9FmCr^J!$pFulC02iP6=H-4XR#<{u~4eB2()thX`2*e%SrFf7#;I@Nb~&_+M3Er zhP3bMi!Pz?S4-*kJSA$XzBcQe5@Zyu1dD!6AKKm_kI-2`sSj(0)4w~1*kt$fy2)pf8I zN!=hlo}0X~;|Tley^{%zlow)fc8u0lt3)dYZlfyUj*JPZfogd*esab3u?!SQcBKq0QID?RN_7qe=aN*9Nn#!Se z%F{Fa@}1u^_5hGYN-!G?hBhORq`@3(2}H!(cNU>*)jVVK%~5_AECWqcW~QJ#{&Rvjf1&LkIs3au4kJNgkukkQW7dnuTuGb!+>(%1C&*G zF;tK(q(eXRY6pPN57I_A?AiMA-&$TIvcYtM!7Vg}#v}Ix3sBI56HUirAKy!EWPca{ zQfo&ANFXZ&L^Q6Tn5@%X!i)+)OZEbA8$3Wh2#U!4*kEbuTl5T4`MfS}j9X}$FyXLruzM;rb3?@JaCp%wvdzyG*nFOVaa79IOo@7P7 zw^zOwnv=(B8VY>WkGwZWE=S^=@)}0&o3Qb4m9dgP=u`D$&8af!hf!14s551|HKvTvek8^*pqRpfKlmIDsiA3PEx*y;da^@l z7jsXXVojP+@#7ONO3H<(R+1Q%YenfFG?%I!@jL}UwPW*Mp|j%Yv=`^5$_vt~jHl{9 zE%GBziW4zsxBHU3`NgJEGKyK^UHi^WhaV-GRw4|PbW-wsf4=p|29rI0)FrYWRH9){ zcW1quzVlb`C-=Nm8kfasUBHku5R7Ph#loU+DNISJcQ^PGooSj8)?ApW0({OR0tI=(Y^_t(2KN9)tZbVZnO7 zk`43R9~}DHr2-R%WYWTk*K%3x4@5sS#pOyy{r$xBhZg{=cyW^dISY$CeY9|O53rMJ ztv>_Fui8Al#@dM_@*wcMbFo#---#m0j<=Aycn?Iq!dY8zeSFhQ604y)B+`VYAmQ}_ z8jmcz4vC+p|vI1A~|h8w)P9$XyE&|DcgpF2Y2Qda7*JXhE|@-@KjwAvecg3zI}pTZv(Gz9*s#( zq+Xbqs`s)V^yjZBw_L_LO#AqMXqVE*iJ4467n-nzJDn~+QO0O z<-$}tOe6ocSZtxs)B3{VyuHN5OpW9R4}Uj>cdN4*^Y0Q8u9w%m<$sQd@bIfA$c%*d zuWRDcXy3kwvDNH;BOX%HPx{KrF#n}U*xmbKm{bGmk++92H087l&mOWWsrVVd!cq^o z9zzCMUWs0Z-wt6Dmoz6n{jyF}&-g{<_CqPcy<|2PI*7^tWvsnC^Q@XxxE{Hqd1)JN za-Y$$FC?L3s8}hdJdh+5Vp@~e{b%&k$Py%Sin-=4N3wlrYM@S~mo4+KNS)WquW=_Z z@%9}`_zWnqb3en`U8Ay@EbbYk(ffWp4}vUH+^ry>lV11A%i#C@BJ|dIi~8mp!^?5v zc_Tj2;1g|C8fS%-L=P&yblnFJplLK1PD{;{+a?hPk9sylwL4|wrD-^)3l-Q1I3UoL z-f5za2RG!sb`LUdME~DUP`!_JVdjbsIe1DQz!@<5Wq6Xjay5+I%StGax-R^l&K2u} zANMYwCS1|sXJpD|`xW2MQ*|S4D&-o-pZpA(=sZ>_5BZ-8Z7F<&A1y=%mfo2oLes0Y z_-+fO=7tiih1AiiJ<=^jP%=||BH2oLL?%D)Th)LKw-hQJ$!=FhC>4Wzi6fXMBgHyLDkep;7qae zCoPDa^LB&8;0MYgKa-tB&O&DDlsL0GqUDfR{!hABTCQ@tv|n-TKh!y#^J^$ir!k~^ zO;#0HKxt)xSS=*4N`%TRXyyxMbE+3cxEXdMTBrq6iRybRG|@#VSY6cDJ|${?A0~-E zXWnEhEsqMD_biPQyZ-8`1g#Nu>R+S?-!6sNMHf)BD$8zE^ zJ%FocC07+b0cf#d7#!66_*fIFr1&ku2>nt19z~cB}gvY8nfC#GL0YiTVZ` zmol`yq$5Tah>phZ2+Pju8}F(XuqW@lmk?RAd>j?jw3rc|^hbOW5l#`&G(!hv>H_t~3k8S2{}p8ktp6OhO`B9W;9ge=2K( z>6*QRgM+PYQE{=ao)aEq0Oor2RSbBED#^u=C4Eqj;N>B~tO)#SW_sG$4~*>B5cmKI z#%`c@HBz8G!3`$$fJ`B24yrwnIgBEGc+BRer_a$@I6p9%^YxaW(BU5+91J`Ms0KSA zge8e55rTQ)QgNMglTMeC0#G)B`r{d|)OCInQNRB=`7T(xz>{KUCn8R`QX)K4paU|S z8wlt=gxB=-+)z>TB0TBly6ZmVqv!F`W0Cb~88iYu>x-I$BQOKA7=)D2fYeDr?7(zt zYOE|W@k%4}gnJ3YM9R86(&X#dTSGN#>$P;xsjO)kJ3G6^mD?HK&C}DdvYuR~>6ueQ zDbY}G>r$Sa8ks)3*RMuW)>G82_cGkZ`r$vpRaDc_-UWXavZSRmBKky7O%S9#W71<+ zp;pesXC;x6>vxf8gw!tKx?KYj%04alDVjkDzF%*t^$J}O8=Lw7ee>T^`btyrN&CBj z$hrYp<|OxzDM1ak&x8hi-`ffbGEB^+*!MiUbCSbjDhiJv!qs`6scG$hYutV8CJJ6jS{lmxt*i29XDAzk{z!^_-eYSGYwJv@f};}?l)_vj z!@6JQcI~u=;j8TqPap7n?VEnI3A4V3=GK{*+3mWOPxgLICri-%_G(YJ@$pd`tsnka zUsTif{BZ!*NicMH}*$g_t(0k;NLsCWD;<(EHj-M&>0Q6tbEsJwO>J_l|GuHF*BkqVK(n-U}B=5 zu?zuq&{4=aDmU&nI`^gLYnXpu7Q4}Ux~S0argE3kac_O&nLm%COATDdCWX6dYD$gk zY;@5T+tpRLfcp1)4Lk`KAq?_?^>Pho31ub?>iee$Yiid8jUv!zP4nmD5?vVwLGRFO zK0?-+XA^DIB{JIxNMlk>0S?nJh06*UhiDZ`IC&p-;e4wDGG(0Rc8m8;S9p%l|Ev+P8KEWsZ z^U0ib3fko1Vn-yU>~}_k&-d8tUi;~==+{W(<1FEZGMCa3;Ig|VtfJ{~ z*%OoHJ%25&ui+C!DSdzZ(B2ae)rn^3cY1P5?mQvuO05?=sSp$YoW}3GA>PCOFE`8! zDwVcheTF|HZYvFQ*ZQH^=O&2!Jw4{$ust8m>>^uia$1`W5l8yJ|LR^#iNlPIjeLV# zEm1W-9~)oE$uq$<1tSvnU@lD<q-VC=-xgycluH=S= z%6qFPGqq0V{Z0cHE4;sP)_hIOMvJ|6eZwM#LVIVR)6?ad?!Cr~+d-17EzVa&BWIiZ zF~Abi@J%AQ>LI4R2zfsjWG4GOYI)?DfDw`U+KO^k7H8N9X?-a$0yjb~7 zLVeL86tLQ!dw~JveSLjftc+s}C;<8ul0hp5q=dtzH3bSDTSe2~Kpm|Q3LX}S)z5L~ zOCgxl0+NKybCv}`vA(hi%pB+mW7D8W_nc_A7@aK8hx#!&qqG-2x4jrHQCq!xKG`L2 zb-o+PTZ3DZNW-3gwzfk3`H22&H zj8oqui2^dt)cK;fcST;Jvi{J_ZB@QVXJ+{LUj*aJi^t0_YM-$(&mJLc@s34_YC_!a zX8zfps+z^-#T{3el-(O~ z=Hyu)N3~j9Ml+SZHXfJ%$dRSv!@Sp$Y2~;2JK3IUiqYP9(d@M8*?nx~sRCi%-500x zW&ZR?Vd#aJwX61)E#p&+PH%nr_P`=6WDs(y?N#%QvZJFr7)RW;+pr-8$Kht+AMS=K zvJhmO<8WEON#8#q-}E}DklD{jkFw2XeBR{}lfbLt=)rR&y(?@nx@>J0%kA!(Zp(&V zp2(SqD-&lvWDUBp@tV_28?}9^(q3*Qwk6ivW?=oS9b+HFKRUeYyDZAOIckmFmrW8z z^baGw92xHa?S_0D-S8l0pI)!sqZ?;Fa(QRleChCB51CBk0f80Ke?6*E-L~+sOM6Gz z{B6wjm$7+0Yt3&1Q4B`BcJHsFd;jlUmoojD+9!M18p=A!0pN7XDX#iZ-W0HTi$`x literal 200075 zcmX_IbzGD0+Xayj7%4SMKn0~?bV;L#0wP@#gwfq8gV7);Aw60eq`N`7N2j!O_xs@Y z_j&)&51TxX&+hw*bIx_{1uMUk2jPNo(a_L9uN7oe(a<}q z?w~3!g;q2`vkAO-Xey~BiH24hiFXaf1YSR~RnT%kL!%(R|AXH1{73=~?Jn!JjHH^Y z{@-Nm_{XxBoha9o^&bO&=YG0uEsXL8@+L3!r3jgdISi1wW2(oyr+VQgSjo6&2Ot!riTgIjX483`gRyo9S>^p8hvFHq8@OjiT@K4IbO2 ztVPvQ^FDW8LYEsECzp2@gFePbYyIw)@;R*mCYj>uu<@_uY{f$p#Ri9k?PT};ca zGOaP~lGwDFw;7S*FG1A&W42najr$$e`W{KmL~LCL;^Tz}$Oa1HmX(*oh8b}#s;vs% zB@6$)zBq!%E99#e`hD$Amks?>yIq9$iScTuDm61Fr?-pVhbHs9+-gSMtNfsO&Sjxc zoKnoa{PLV;)@6Mlna_LehiOkNyG|zX*x*3?z63tSqWZ%(TGh75Y^2p|lYt~Ee^qLB zh^I=`5bQHfT%exI+{fFSJs)iD)ZMu{Y=)>BhjlDuI*naBu{O+CjK$2%%)Xxw1)~gi zCt@Gdt}y?d;;~EBE;H|SrpG?n*Y{TJ>}O62Zp69U)#*+?3Ug5Ws^Ie3$z&!86j|E5 zNEw(KwmF*9J5i_u*F5-J+C^u-feh?f?g(Ao$}c8Rl}+)!+^iP#?uH>-v?nW0elw@$ z`uvHK&m*+1Kajh)SWm5p!yL=kcyBV8!tQl>tg;PkZF2U?^x1+>(t0zcFD~0Xz^{zxp6cxKZIVSQ}W3;_d zO633jQA6(;2n-qWG)=NY{8?T74Fql*F4pp&f?orwP1bX@Wu6!IR6NE(o#?w(onch= zr&Ffe+l7QWuPpIK z`a46HIj6Y#qX7}{?sP>yn_jJ2o8aAHFDL2^RU_%E4@)~$3lm%;`}2f8Jgt7{xlzkr zjOK0Uzsi0LH+p%Tu!fclZ73@j@d8-{DPD>mLJ}!1#~FAJ`%Ehd%w_JRzn8dCo3RAe zdfbQCb-x9BwU@JLtdhLoL7HBGkHFnds@Lfcar^zsnVXDR_w7P=jv0$V(W9_SSGB{1 zh^`f{v$>qupzC2Mu?Qm+xfJC~kB`~$MuA5$U+Y)4ILS}xaB2Z{`Z@WBVkF^UzGz^_ zHuo{?=iN%JeUlRi5X`C>?zcrfFo?*i$x$+J(WjdkXp3;HU;{=>pR%6AVQj3=4X8_HbDS z#3rRLK(g~RvEhRj7?cr9dJ8Au;^V`92 zaX$R33VCY?PLhu6v0~d&AT6E0jQ%Z$B8PR8GWfb$_0-3r^7^2E%D!1AIIvx8*5N0F zZmo&x39Ef&?t)L{rkS08K<9&u#^IRun)MXcb*FlD^XorNwP^3Xf4zNYCS)K^RVR1q zZB&V$lE{Q|(q+4H4Zt=Bg@ICPR<_?xH4LzUa!hTa8@BtS3qan;lONCkbsBA$=hO6N zqHNZ}tdIPOc;6y-r+*Af!DW%YBXLDh;})pjQ{mY$JtJW|(z-~!3Crv-#X<5H`+*}? zoQk|}7;wDT-Ruv ziU)@zdn5Y;{g`cJXlu~3y#<3VN8c|P*jqLGQP^!1&T_3%4ti#IAe$U+aSROYT_B*J zjMMXlQG7#NQ9$!?9T@D4C();0xwy!tcHA71?J`;n=N}O|q%aaB3T(sE2(zB28kUmI zf@217u|8GcRgEl>_s3i#H{?;|tt7OI?3xy%=y27mmN>|(ddPv#TE>O^Y zU^LaMu{vYes};+%R9>l_4?ZEelM05o%!+vyZEac^R#n#e6Dj;XohKfE*g+8(>WVtB z>tVses(RZUHb1-TV6Ob5U{;7WIR6%SV%yF)ZgzuRLv~vUDx!7?&vmY~c!joau=rc$ zwvYjx@=H{p>^E1?ABWedBk65mMTSN+ZHwBNc&G-&&XSyoGFB+Ru?+pd)Au}(H5NzY-H2U| zYn3-+)1+tNHS8qOZPRp<{q2UFO*4&*s4uDJctp_&(Px&EO#X)?Ioa$ShD7?R_4=g{ zcPf5>$&Hidm=$I-K9mI!mb3*Qc+S8nF8Hifd`}hj_2? zXRhI){YUhXo-}368`MALld@|9)WP?u0bql#X*T;mO#Y!Ic_!NBf6*iLM$J`ji@53> zj|R8T>H#HiNmgl^?!x_M!St+`N*4jBRStPf0tt`o{DjxvIcnnqq_9(10FK7PoFU8E zn^T5?5#6pMHyOSzO*&%4X1TJH|-U+*nDNzA(X zelp^ceaGxpfa0lX_|^2bgMxJ8&736bp8)S$TDXp<3M>6lA3y zxWeh~)|9$xu)S#$moMSt^d;#?1>tQ1N9G&r+WJHu>t=h;N#2Tm#1453W*ZofkTSrFF}1eHR`DLt7^f> zV<&b^jn!Ffdfz6_s{=P6_ZYseYq%@I+Z#PCme4tM_ln)ciP^mgn&rab6hznWH>4)L zqx~U4fwtH9&RWR8dOPXGRE>`Rss~i(uGZD(blv6CUKfcK{ILHR6n#44*g$@$!Mw~C z9X4jDZ|4_Rlu-fZ2DV+B2`@ANK+I6&Fi@_; z;vUB0u@SKSru+P-J8CPEidW9dk8J&AYimH`#15N(q`dk`M$yx)v7Z^CHE5RSaIen@ zLi!@RdQJ?%d89P9+fD`Q&sw5QtjoNceB<4%ht~q4g7E-;mPb z0i3v=dtAE;(7|yoN(k($CqSw4JofDhPj_avOJKg~M~11k@|UZ2od| zKG$}7SpZm8p3JqXRpjQgoK)VM!lcHN-E$ewJKu>9u9Gxyl3@?WT-65SmO^4p)Wne4 zH3PWp6)K7jc%cz?OeYGOF#I+F)kr}l2kLQk*iS`GSW#Au5*pJ94t*rsQ(^L?DEG%N zAm@%jKv~sA)_^QCwUAlQk=dnblpIPTpgJyS-3kVQ;1eLOG>znlcq+-XVMPHgNOCQ( z()QTTZ;rdOS_G34>M)9jaEtwSY&$VjWgf{|wL$CBVzK6zw>JI5UqtIr!Jup^2($cA zgh4cC@yQ^r1`V1{2$j|T*;&Yfx|=*R8$_HyYbS>_7@%VYx5K+quj_cc=}r+!0ks7( z)1jlQ#d`zeWSEtYtz%Z^Q*)S70l*mhSJfjMad*CES+kno5q)~-NE`1^AGbcUdAt4z zjYwYghKceRK8}Ao?*1iAJD$19JBEs&W#u6G%l^Seqdc5d2}v~*xc`hrul$QuCY>yh zOkIBYxMjb70f-k2KxhSj2X>IQ2FWB^ca|g^OB=n#gAM=i0?-90XbxHw2Zl4`1M?XT zhX~b$TyIWLeAeG1hDOrKJ6r$Jk$TLvc%n1zNB^3Rrt*G<75_c=H$q1)!alPp-2d!Q z*jvHxA3nx3Ffz&8`T%YNB+d#rhFF|#Gy3C2_>Oc^)-b?*fvwSmjqyBwj7QKI5T_^9*|}|8#52X#$@rrBc&cwvW54qFk1e5|DaR>$it--Zf(u`eHTQ>2taJg z)a_Iz4j7p*fPc!*t{nK`aeS?>7fp5@fc$$jK6-L~fHsC_G%Is+13{w*mtI1aEE4gn zMpjEnGYoV8qZY~vo-!k?nn7|~QI&u~^Qj12bD$AqHLL~-W-Y(FYP!RdlD$}j6Snfb zBKhJZhK4E&iQbsTBR^lcZ5b#^omF_z({y)Z^Hb}W3DG?uWJ^({nY|+g?f)7OR@8T0 z!u;LS6J0g$u1KL#vz3?cnEW-6-doeUdI_uFV?bzqLy8rUd1~(ITCML?C}(3XuT_N5 z8l_f^eb)TrX3F0pyVcUgd;mq&YMfmlw>L#rOVw>=CoYq>qo2AKAT*I5rAH>|j4D#0 z*}%$zal6@{3T}74u^JnhOp6ev0iY(ND$*`a&sk;tG=%bJAdp-*kus0TX+|~UgBOb^ z3{iS6ASp(RiSz9Pql;H+o8P!?^oPx=I@m8v0hn02K+JKO%N7ApPY6y2`~-{+p3%&S zvJmhiW|G@@xvXhSy6B(>2q0N|hx;|WrUPRjXekS`23?n1wLU-$R{=6V0V&_E?p`l} zwvBZ?NTXc$b7+~ZxwWR8d`6kr_30hWtCbWVp0z>(|5&V4^|cAc&^Emq$4IeL9I1n} zX9gK^;ZL3)wv)c^p7+?JZNEMukhr$3xx2lBKc+t|GJL>Ty_R6{CpRM^+NSYBuBh>H z%ND9^+d-!BkReqm@%qLZCt~H=VNgs!;YG?b#mb%ClNi}tvvUSb<#N$>#brRIQ3Zvy z$}{7JduXnthDk{m6Gpc%hChrD()Z6WL=N5R2P<=*++T zl93H^j!*qFkiSSv0p|m11AuPfACi^XO5~`ImoLKUj^1-$67-GqouDK+yLM);UHxGXYXaigE_x%c_qThArJg6q zL$tLf0ZRjH`%71Vo^=$R%^Bfh*`L5SDkzzVyS=E;p zzf7?iQjyYuTZFqQ7=Un6%B0MLisc^0@Bo?KbfelRcNo$wJjTB$Q>rb3 zq6DkFt)%~H5!_kxI5l#PbGK%l&Z`&1LC;L~+<$%6 zHEEnZ?)W6MgVAJEwGGgz#hKgu(ENthcJk*e-BhgCD0=C&X|BL%1qXR(OAR>i!7QC+ zD}qO^)IUMJ+72F;RPml^_ zAtgFOXJwAOE5NY#w$^ET%fc%Y_49-LDEGrBZ+c_d;a@kZiNbEW;z^U>8dvuyhEDPQ zdz96?*`?KZ6H(*tuZ%`~&gA7olN=7TxCNO~`5MJ3Zxi{I3_kJD&nq_p+JbN&wM|@2 zP9Gp4XEFJp<39YxvCltE>j`%hjNon&dT3KJQ*K7uE<@+O!EjPq)jtqq4#o|}>!0-YCnKJUW-fN@{Tf$0K*$d20;+{N4D*0BVDy3F^50*BMMDTD zO5|#UO*;-7{t$ZZpJpWEawkx-^pl-dI$ijsl-jzNE4C+kxA;mwV<^6as6m26^m6MB zk(A33xvg)CP<1U?)P&h~d@)KI5B6*Aqj>y)Vy^v?p&JhAD+*R0 z9A=ScCr)lkN(+4C1AAlWP8yqlwl9P?y8lStsB~y!lTyfyqzR{;@3)h=o>yddaHEMhYaQ0H&e z;AIokq`)f?4FE-;T%eVu}7v{mO|r^8G9e=$EY2&>dn-8CIj}f_r3y zM5b|NuS^<6#sCF)gOX5f@4e9K|-5w6L{?Jp2@TLl^O|D{L{Dw38sN9Af(=no-45R zUIEj9U~2M+2krK+@#EBB0$x;!Z#BuiwTN^e(=7B$h99@Ucu{5@cHT3S&2;b3uCF|9 zDI=1U0-^yPZYE}4Av)T%plVSy&AS?yu9{)P`b()E8gOs@-Vu4n{t-lBH2|%<9KV~c>0FXY8$Ay^|8{7FaF@SZ;>jrY; z5=O+D-0Q?2FP3Hj`4&KqWW?m)R_lZ)cOV)80VxB3I@QxgcdY&=9O1W^t{ooip)zUY%D}Ucv5cO=EzgIf1(6N3C$mjF=U>tp{~YD$UdMy6%I{XwEn=rF(~0b2J32(pS-hNJ(Sreg_@Cgr^( z35fXYc;dL>kpTH%8G-&)Kf4!0hDK)n?CGQAwp3(BHDUYrZ`n@Z`9+~f1jnK)l)$y=*N&GU%*M9C1P`SJw zJ1?_+7C#-?M>{St+BIXBpdlHt?_AJITDC7X(ZL z_eK%f>k2mvtbF*lbKb~nND~Zs-~~Q6xpc4T?hTBK`D4_WdAzat7pFs1$tR-Wy`lk` z2O-L?-r%blpGkKd>BMimn^+4$-1!BoMUe_~UvhB%IU9uh=}0IBZDUCpT>FMeA^3~Z zmu7UE{@4Tz^^H&^-+o{1>uC1D(-Y>;`>Pvqq}TK=^u^7QUYvUGE)2cTQ?_UMx${?@ z?uI>6{@x(y#mkp;*@MmkO?y*z>q>pk>K!eKoiB3mR-+>+wqzm~8g|#~4njN1np`4X z6;n!uPnlmkm7i{qgK2QXZX=o#Xf1V${S(%-6QkVQ$r5Hr9|X3tMr@869sTaXoghJ< z;c}n?ZIbF za|~3xpLYjc^nu$)F544IH#w=^+NkgCp&xudVhKU1kM{_f4tEh+oO&Urjsr?|#zqBo2tw}V( zb$NkT&2GRHTy1W}zLrC?A;Tj z8lCYmv`dkc{6%wq>8zW0{5JEtJ`W32`cyOuAhvOm>Jagp85>I#iK;3R z%6i9IT+cIGNuSvusOSBT3oEm1Qk7C-5_{Mk?$Q|3NveLKb>B#(r0Jo_gx4xsXhz)A zx8&6R7>$XWV&(!D#aGmXp`b(bZXW=>of9vTzXqg^KVj-r_N%6$f08Ds>|HZz?2qC? zotCe5l5fNZ>gw2{0^QlhzsQ)nyA_{XB6Vk=QFJp=fHux1TGjlf3{vkXV=%uUajWrl zS+8K?t)7|T!sTrmHJ2!pMqILBxj&ie;5io)PB1yqE9m^WYTiWpoogFRV z+?;zT>G;i&D)k4ai)Zo+K!MK7e{6UW%0#_)E^^!n%p4!A7}B|j`sMS5B9Q^ji!SO=~)G9n?VD*Qmfq7P?lHx4iX@TgQM z(53f-AgYm!E5K7oPXYz4vjR}k1pXBvE@!+jb(8zaX;IG}`IACGs#rFUv_?NHHOr(E z_KyHGYx`s%9xTn9{a{Ht-(;T>I!UfL;uP#j&tD7Aer#N10@M5e0` zfx3CmNM-M@)dFXeie2xw*+nY;(@XjfI;m~ODB{^<{yjpcUt1nVeEE7d02y-4O4v|= zzoZnE00L_bZIMU6mt69xgarUtWY*iYcg{LX*?Ic>Cvu8(gzM$IQUn5;r5S>G!(^Ma zdOv|255M<8*jb*1APY2kvD-f09mX|v0}0M~b9wSDTPd*z2tG!u>GCK%j_OxO82BC? z+D??0+I7xW_p<4+@Z@!<#bJSV#hX#<+Rf)e06$#?92bw`QqUvCFLP;Zo6!@zXRNBs zrU7+@B~I5qILWs4kvlCLue9=sJ?csbAoGro5}R&Mibt{(DK^LRHLMOL6xs2aMNRtmB- zG^#U80w?p2ceOJiIUEU@!<> zZsH7GhFwiW*J4jw>g{pP6SeRCi2~S2*OKR?g3CcnW7vEa6KV?$DRrfNz_=gDnWch> zrM$wz^~q9PI(<(vLiAAK1PTN6q+|p&1ePYp>wXOL;wC7Or12KmuUoizcXP1Pl^^Me zh8N^@d$A677W!M#=BNA@*&6sraK9M?uKf4B;cPx%d{O!V_4v}6PNn6KfxSa5#r>=@Uz1bkVx#5*^lD ztR*VWmSFo>1H!X(CK3w4-JGrYbva3li;zpxAD$zblOUBVuytUd06VJ(_r7{(+>D+YAD( zrVjht`g~Lt_sBRhr!)WHgeo=5E!UNd8}io`pG!6y_^-RWhc-E~zUWvQ;evus`N>hg zw1`Vu8?Jr?zw&sT42gM^4VG=O9`&Vt(s2NYR=IaagA(}$B!$`)xKgVaP5ppJML&Db zKvmz-_~WTf4f`VyyY^?c?m^-g%@HVlk-j4{&HXuBw^xKua)BL;Yx z;_o_k|EgrjZKmQie0oUjdyovSq{F@*HG1}V_k+*0Sw5)&H2@W|PQxSC^k zA1+X#T0}*CJ%{I)?(Hic0q9{rKjgdvJA1Huoc?`5D1M%Xm^(7?xp6ufhKJcpO%Z`d zfVC;U1#DU4*w;4~L+y^tbf&jzQlS2iFHk|V{69QqokVaYuJ_?!{}aF1$c^nU%R#$} z@YfY080N6Qe{Df5Dl`#pn=j!TsnndhtZ&Tlv&+J8<+Sy4A9hBBgTeT(M@E+M!(OgC zN9+q8s<#gbMla1e4957}T`hp+L_#>jh6h^di9QOI52EFL%nhmTB}6NywFRl=pvfW9 z+&3o{gsySMYXHO1dycxlJmKE}=h?~dz$YF5aZa_@L)q=$D6U4+6MhrZdkRIwH81$w zH6XeoX!GkrxCxu_OsjhMU_(#lgvm;_TsO1g@)qh`YzpO;el^~l>HvO32gqFR{04-I zk`xq_Ty$TfNS_&W$?^C_UrfHv0B-(Q6Bt6p zxqM4u1zIueBq+CHMC10uno`bw89y9r_0pE>m2j!yr;9Dnt~`M+lfI92*grx_zY(7-cp0r`UUSO}e_?u$gV5wb^$u zI+lwoj24{_0{(9CYX1j8YS-dRZKw7kPRdxvyPGrY7mNb4w$el)>#KX$Dwh?|<=tKE9|>HokYDxBK3R$T)4SGMSmx3&#nXcKZGLnjaGlG`Rj$ZW z!UC>;6_wI!eA6lQ+MwdK``d#ftLd_ju>~`1O!c0|TlPL6qBa(Gb68PS%>dskFf}Ob z;LvtCm>G*9N?IrRX`FM7?5XRZfz`_p3)o`lqg$>#Ch9@ZjoTDvbV|eP`I{FyjXxUo zclR1)B6l%ZH?ZeGwRqHJO%8aLN1czaSm{d$Sgn8cV*U}ClZWFES` zbEkgI2g-o>?+qIYD!&xWqfE94f^Z>Ro?G9RnRm*7Md zww0W*AkA`E)Idom3HI(ZeMe!=mzqx;x+hg^YL2fRGA_SjNyCX-TGDjKL$X^K!n>Aw zFrI5ZC@B3hFMqvM62kS|qBj5U@?cn2UJZFWP$ix)$%WxCJK59XQMeQmH#-TIL}21a zT3FuCYqlID%==!ic-dXpy=BZAhVI}GFne4dbp3PXc`#JdnOYjng#ye)Soa&oS?K4g z(qlmhj0KV51iH?MU@$nQ&xz}K9vIXM1QhfoiC%gdN zaWC^NODY+sEjMspmot)22W}X)3~+NO#lreAxEiKxoz&Uoxr#1FHkXet6JGrCV%y*j?C+To!a*I8qEeK%?bk9K z%rE$qImuRv=;fQ&Sg^mEkGUaWvhZNDUGD6-D&B{R-pty|RvuK~+VlHT2)J;;eCFK? zx2FPnoFr$MZ7b7J59dxj$-V|fHxf=*IigY^&X!Wr4xk`ARI{O)wQyt%MFEN~KnG<_ zxPJq{bNcp>)?|LYH$0hu?N}HHCBh#e_3;9E^gy=-R}QB`h5v+RYdpMG8Rh_niZdkE zBu(s7fQPD_bPZ+TGj8Rb(c|Bcgsj)BCY#xnljP&kZg5 z73)>$PZXTo$jAl#hX+9j(vN(7xpdqP0oQ_7S+!(Sx2jl0E&sZ?GVr)vCv%Q3>B6HA zLiT~_2qtm_n3yF#QL_X7R(~Oas;*Adp~QLw0?Dliqq<3GGsXJoKjhu@Kx~7J|p}$x&0#2EWSMq{EUwFY~!7FRp#$vJg%jE+q5u;DiGL|VW0Ke|C zdPunw-(vWAmN1OeZR!U`TkEzjv<+ca&qEJ1C23+HL570Tx5)b8_bK}tj%+c6S?)tM zgTo^2Q2Y1*tOda0Q?RD@fcsSRUSMgb(Ytq_q#^&13l~_Ug@4s3xeH|P+y>0BsHVEL zShE)VSC{O-&+rGh!v5qUhhZCrj$GNy!dZ%^2`4-v4odNzD`9bgb}OA(nV}IQ0%1Lj z5XeigCzu8lDh`TvTk4Tcmv9?H2HKqOFFlI1Vl_pWSh9`{Qrgu%CeelGS6g;@m* zlw=dvgaquzhEp4Ne`l-tdGdFtL>KOF12nmjSdS0{RcnzwgKmD8ryhx?(XPADNuk+c z+jlZ^O+f;A_&qW-vpy3Kw{-B1__NlW%fBJ#FGM}joAk_^LLw>O@;@wz8V=fs$4c$& zHu~>%mGA~)Nf*N*oS;ZFX<=evyI{OHe-*)bz1k>X$@V>B1=YD@7JIrCX8WFZKh9;X zC&%bUtk1caSCL1Z0(Sm4lIKrv@NJ`+A>efzGpO|bMRTQJTTa`cJ+VgdrVyPq6JXe7 zI#xab`GAG2N6FyaA}(`0;U{WlR7Ai6-c)w5r=R+)!EdljE})v;_o#H3K?2*Oe95zo zCBoJR0w$&*3zZAtPoj3wa}%smLR@lHGu2C&^`mRmj;pG8Kcz@;7BD+e3790!P8|3g z{_dj3mNya|ark*jsi<%Vppkev{5o*L?i~ZSNtATOEXbalpJatuBus}j$BW2DImc&% z5TkAXMTue|Ff-^8)+(P^V8Ci?Xik(U_)evDyVZSXUG*w3fE}k()6b)}v$CV3q@XJ^1R2shN_ueijt}$bK*o{jip~A}DKt z+VixtU#G1!cD>@DD~kW(h0YDH-`+)4_R*hj+!n^6XBg0pNuEJy5O~pv>oErb@R_AS zAY4S;L=kZdL$Vp9ELZVObgM9OxXF0X#3$CoXd3IqL8h1pA5L(D#PuvM*gotmrz7o; zFkHPmE0yg#VEdkEY5eokCQea1oGOpV#Yu~i^EmV-D#F7iB?8{g_iFlRH1jCa>5}_uY9tKF#z?4ITS|$Pc z5o{NNMUN$$;YVl$-vd*(?f-x9Nl9lc4Kakv1(;`e^jWn%!wmRbbSa#nsw@p}Y0jO^ zOW)2lE;<ePYs0Y~il5_p+x3I2~zq4Xz zvrPA=F#sC`XKga+g!3P7%SjRnR4cyB|kJbFkg|`bt0!oMvZ@2=oCz>bQ<=;}b9LGPKuXtxJZqRr#&^CPsFoFrA z_-%fNj^~>ay{UT$A)|Pf5DNk7C|V93g6AB+jj$k>j{g}_jdx;cd@jKXuM+Yf9inR`H0 z!SWuMs@?wGZ69>;(av&cZT`|i!>epz7)vwToO&LtBs$V?v;@A{cz^ux{Ak6~H#qf5 zB++Z}R!9SM_KFJ`6G4L!U8r!4ZfdwBA?}v*V=)}y&8?+OaHYI$_NWh zoDWO6md9>M|6#2b*I9l_n*88ns%#{;fm^dDWGLr7eX=6r^xksH01V`64c}K;&l#`w z#4J4=22QEHU5`hO8viC~%0ocFqJMsiLL6RU~Q^ab2?2JA9kxH5B)~`cp4F%PN7l zu!9Vw8{yieB^2j(E(+SoCD^L;)q6$FLa<4UHNf8 zqZC-eefDd-bj}Ybl4KCeGqx80S5mOxb|3rscmxJktQ!xByr6n?zyZIUC*PB59By1R zbKQ$Hi9O{1RBmU#3ooR9WYT|VaCpDeTNr9fXnDVK57W&x!O!2u6ZwY(W*EIWN=(1m z@Y}LC$!?-ET4?kd$Npt{wYQ8Qpv`M6y-}9VNN;f^%7&_}ewE`hqC@n;XXK=rJMKM7 zHxGua8DaUhOSF#SPp$_<_F&f$BD>0|p<7`zLaHh5TQ7bBh8FM_#c$7*#^l!@fO`1U z%J(LV9=sR7FeW;j3Hf(iMYCElo)8RCxRIy#QuAWFhIf1!I!ypXz*}eFx)CE-)fd1V zwte=h3s2Y+2S0_?VYurc(Yp4v1h2@9fm6KW-nF5lf$A?4rIV=v=^WDOw9Zqe za4QJqcMC}ONT4VY*A!?t|E+GDO8L@u;3 zpe~sIKg`r`6=p5aIBg#2g>kv9Da|wm+|}g zxCFxGR>4&N$w(QJHTNLvC3V}qG%FAAuGN=h;k|rZ8cY8p-Eu4T;q2zd!z=&&LjOmu zmlQPNtnPjNM!*dL>R`+D992RTkw-(*3aLEwU3wFb=iK^;x%&$?UGB}w1O}tHME^45|y@b$d0!t!Hbdpl6*f1Yax=%2Hj&5=2+rQ0m)5oF-+4{E0MvHUC(A{ zx=%_nc5?+TK`thfpI+XWwyl0FuCO>9U9 zUd!bUdmS!~z>lKhz3zD36;7RVuLe8uFt_lz;-B@NNXBEE#Y2Jv>}}aCH3|2rDz)lM z*;N3jGxT-i>)NI5q+kj{4$elHbRPUV29399?nfUQtDM(SzkuZ1<6pbL2+9^ckvYYc zF=t11$J_eLsLXT0uG{M&}>JBzSOIy*?ZZ)LH^n;|D~Rq5VK-+7X!U zu3hIn_Q-{)VA!{*aSHUECjR@R{d^qYC<|q4y3QqPK=~XR3bDwj=}MQw`j3IcjA4a> zV?F-I$4lpAne1nvMRp7kMc&8aJahk8N(&5T=vWk0n!E;nN)z$lU0{L`LB!l~E*u@u zQvuqdk(FzrBI^(y3KjgvhsX;_T3dn^k0@90Kb!zU0l-?qalFTB5VF#6X`27Be^;2M z?eI&+WeAtR{kEt`JA{W|$z<5K6%F3&TBI+v8Kv7;Tqw!$xrY&l_v8oA8;Xdbp_#wG zF>gCd%G0@JW<%i)bb-9myui^h00#uCgNkd`5^Om%Ldn_x08ZgCPs{xOQLD;fn6a%I zyFl0qpch*LISQym;enm)TwVMl4D?692LnC`B_Sv|Q|(~!Uf|H4XjjB!g|;k` z)NYh2c-9CxtVP$BuYTBz%_1%0F&&uYx7QlojVXUMh2J(QXQ?gF1HidTzSkg7GCcyS z7DfWPpBvY%C~5)I80EXHIQ{793Jbu;q5g;?_@6^YAI~srd3iEqN0(-z;K0SP<%W3$ zP^NID#P7lB<>uz*R$Umqgg6eBoalnrS@I|9a{c#K69lm`4C zkpecd=Z65w-G)UQMF`1>-<}(}oz1zN48D)K2D;z4g86t}7SvY|1QNIbEQ39O7n*r$ zYRbNwA#lU%8gTnXQCn9_-p>zij*PTy3p_;~vYX~eT#tw4Pn=}#Pjm=2t1hCU{FXjF z+6NrYJx(Y+=CfIcNV+<}&_2e=#s=6F#I0Sq49PyTF*E{`#U5aa$C{I5AF{@)8tQ(s z6;PDda#t=Gtxnr}6exT=Bt1UZ+dFC(4II?22YP{?Tm;Pv&iZ{n%c(NiGubu~K})G~ zzzmfCrNtF3>`^(dEklU|)OkIlTOp7=Fz8eXlfX}hQ{^JBicD$tl|P>L2HdyyWfD{+r)Df#TgLZW)n00P2!VU1{~<$s<5>Irg96w2Ji1*I#@P8r0V`eFX=-W6D+p^m|w_EQMtlrki0us=EM^#{BQ@q*5h7pLW?~V9s4Z7zOcJ=0C^jE$b%oTS*x?f`G(~eo@K$a4RMzChPWa zwRar)M=U(lT%A~Y<<%!jKDjaK&WJaYR8kmzkx@Hb!tEKjYlvPQr}pDm05<7qS6S0$ zo*UxghH>ELR8=q12`x9K8=9aM#f8b7snfQ!jpk}g$z~i3#m^EDBFusyJoN=~)djlV z7puT`TmVxyL!ywScW9Vm?#DwfI9EEu@l<;Vvp0Pc_$>11F^@JBK2w5o9(=?CbXYH< zH}8OBr0}n>#F<>}v7w=D1?h}EaKbhW=)3iYEa2zX;bH+mba7}3VgvtCAd?!YT;(rMb^a0fsXc&fv~y#gRhVaT3*D|!ZppG z4&8=9i96jDqt37>05km`PwyQ_1^@p4lRb`=aU7dl*$$48nQ*j-Lb4B)EwZ!MAsnMc zBF;G_kyVmI#<8Pt$jHbznb{*Fr4K3`I0SdCtPCaP?^cKAL%+UbFnMbS_P|y9@<`Mo{`vFI(94 zv>6}v6w;p@3^#sHyzF#cx+&i5KKL6gc6`J&ttAXx57V0r=I|d+3Tm&UY0NP0?2dXW z?oi*2rm0eQ?R{C=$d0|g3M_U@b)SLRVLEte>{B^R^-SqcFuuq^Gjt~N$Rbk7pI7BS zjpKANoa>Re$$d~1vR=SF_923^qg>Z1a`!XEHKE^GBo#TR)T@q=;chNN89~_m&`K$_ z+J^v3!gxVxoga}cwUA9ottgnBw=eU6$pm={oTbZF#wFI_f2+c*Q0UNCSq z4O%2S| z&EoPYOBzY(KU!;_PsfKBMMk43poksns89cV7E@?UGN%lTwO#cL`tAKPl#)=WjPe5! z&%~*8b*H9i@u*ZoCr+W=OL?7rX5LyWRRg~O<%4A`mO&^WqxzhgQEIH7G&lQhj6c3B z@sAa_+_$yPsvw|h-xondaA=Pb9{By@5QL|hxAcIU%xF|kV}2$@@fm=jB<$M(&qLG$ zx&OH96DfsuJvJxt&-A6Ud9OMuG`NOtVlUwB+pEPO5Sg2weC&^oD%LsR24iZi{4h+H zsxtKY_w^|iV3d#;dr*(IIBOG#2+{_%u%$eVYXJJD7tY#S1T_1bC+Tzg_C;cv-; z686XRe4`vbMOf5rM$DPa`vhb{08DfXiZ)lqVu@}}W@Ry??Cd#M?u+4nM_kK{HXI6L zW0fnkhF6U!!31V}pOW~Up<0?AZqQhxmKaWANO;_s=sY4vfjwMJ9ibq@&&uiUOF0TB z`DdhI7*@2Qs@Cd`^rPSWwmv>-+T*CQckHPc`gSmvkR%J_-24j;mCm6uTgB@cvhL|= zPs8+HN~qSlUQDx+AP=%mzn@_{l!ufz926hCe$G1ps4=4d`Hdm{G8CFp#=WWO1<%qn zI^Kyzxj$^0n(B{!zWtEi_AIVypDX4EuTB{<%%qtLNXmKfI694FC0-^pxQ%b=d6Fo3YsoMTr!zDgYO#=F!vCOmKbjYxb3j zH%=EW#cRN;*?0BfxQU3f2_#-_o_?K&x6jza>VsZkroA_xvDqDp|J7Ok}Fg$)-Dj&jGr6ZWq)&@h(Q@ z_8s%vzlX26vTE;qzhU$zv*lv=avIG#KXhw>ZL+zD_Z3-J!-Z-p7m0x-tSnN9A`#JG z2!w_Vz>)8!)M+kubP9w!M&^S$M8CX+pFY0bA3U)owVPBfH!6krjImC)nakszbIZ9z z_coQCmy$SateNdk;*@Ci%gYW(&D4i7#bqkz-blPZ9b&=yxqU4^xt$LPT?}cb^-ylM zY7f-yGsp=Mba5?wSd@5FXcJtLwLZDO9&w0~%C_9|J1N5tpQ zE^XRS*voD4r{W3AJDsLJ4N(|7vvyL-3;y>ypu7ze!ne1Fh)d#S+078T(^PX<5`6u~ zYN3yr_@UT(Yb@3mE@zQI6Q|^`_Dy~AyWS6QRpHzP#}Y&Dge=|1{Ws?{t+Gzr&KQ}t zB>@j;_V?8b$#M2o(2X0g8kd$aW0jKVaG3FD6k&t@?Svm^*PJQ1jEoVY?C6AEjzSt8|nyFb}Duxv+Mk1h* z9SC7{R{ZT`XpXH>yh}Ek2Xl|b$UlrtHg-&`LY}z&Z1Yj_3KK;MZsCw4YQIs|fZ2vZ zFaz7?&T-{&EDRdh3wW0R9u4z@S;hy?D)JEz>c`c%rw|ceg@ztpU1t3We6Q#&6pGDLWEySVMOV7ngb zsh@Gh>G$wAP&`LSg}Pjl^!kwPJ$I;m&q#gdt^>jlAcrZX^v36X5k zVKb*R7rr;eQJuCo*(uforz$_t-Z=?*;&A0c;`yn8y{->;F9IK`rTs{0%Icj4!}fl1 z8CIXVVvb%nF)9Sg=qgR_O%Il%((wfaYWo4`1a3t{(>YaIP=|dkuvx%JAgH2;*_PFe z8JOy_Hqz+VVIe1Dcd~PTQ_;)}7kV`N=R)%*2jhP|rIvw{wndeWwj`b;Ca)J< z?=``FLj^Woy%2~<6~ff?a8x%s`RZN0B}Nz8;30Nw{U%iNQ9i|nc>@7@J39ePyMaON zyC1BX&311GJY(KD@I|rG)4L|$g?`x>bJH)E7))lPSM?fY{;~XV5V!bFGY7|yydSG( zgN4DyT;amSSptQb1V7LKP=4As)&HsoGv?5t;}l8%S}u+hVuyDIG6PFPNhG+;uG$Hd z%B6MP%@YHic)`*_`p-m7!l0qdGlAfiQ~_{%HsC^WzhI`IO>WbMpVw@GUp}+U`VjU+ zAUz0O(?BWQ&wAl2{b?G;NPbsd{J4*L%zwQ`+N$&wp2!cr-NVf;EWh0-Zftj-Nq>|+ zbSWi32T6nf(8ED_v21)A90Ol*niGTpe^Ga+-1)#clNU zdF)t=P8cgbR&Tf^D&bnryj2t0t+Fuy4^oTm$tXqDrLtX#z4sL(J*@7M)y;eD2S>Z# z+^1qZcxd2mKf|{@J>qcXm#-j_zERt0N%tAki1(+7fI#P#kxV8YAV%z2fC!7qSM7j1 zbS&eB!%Z5iHRM>c)XCu&lJ4bSGr;ifax?qx_OPv@Jb^CZ{p&tQK4HP#pPxm4ov#1c zzw`D}b7`eZ0UEs;F`R_E+^%MeU=<1NW`6d(y^vnP+E$mdcgG%ZoP?JuEox01&Qjty z?|5F^-ku5nQFW&zb>oow!_i;ss_OF(Om~KrC`^<6a67Mkcj%}h%jWI)`KEg*;UfE} zbYs;^Sq?!KXF|4WoN-P7&e($Q=l!NZNJOGUBnywLX* z#h00>JKU=)SlL<1Jk!L%O9Emg@jk-pW*^easl`9js9{jMGDz{jceVO0et_eflPp%?aCyYNy z{5Io%XQArpqpUjpG7lwL1RTa6F7VrpB6Fn#t*NlKz?1{;j8_)1-xRKqzy2iI!l-iM zQC;_0wS$(zgmFjKu`>}M?%ZGHegoq&sk%B83T%ZXCm>9G3FtqntTm3e#48*H{M3UK z<$=J&a-luV6u2QbYS6TN_V@C=5$X=YHR`aS;|`yfBjfBZ_EGngyr7H?`*Q*l9jvT^ z8fFn*${L`6BKi~vrd~B@W_u12-Z2dv9S-jC9fTOsKU(C7PryzW;YG{n5IW1V2Qo*!WNKJF5PP-{YUT>`<9;3OP7Xup{f0=n3NQUvRR! zm?&G0MUB}OafN$1vbfCT=h^;rHa1<3WugSZcQQqyY^3Nq0c(?oWx!{AICfnqjK_lK^WIF#bOcoq`=+yq`?5vylK85?aD11u=LE%@B^Pn*qLhS(9 za5DuPG0*q}>aWpV2@B7y63UTYiTt{K*tYZu`h*|GZ*K&FOw5L#t=4J!HSp-c=?yMe zkEDvqjk*oI&vbKw<{uT3l17G?^t5I2PWl7xYc5$lR#)P71s zYg=6frFZpxTP&`nWjh%&{b55>0`j-v+*H`{%DpHS$Dz88jaA6*ie{>yz9y^u16FhZ z_;CCtkX(FEfNZ&wT}kGG+Pqt0d=vGqsn5-9{ly>0SGof-{YcyT2OqEIYA7Y`8=fp% zegjgXNIchMH<%oX#3x_xulE44Olu$<6&Zw(^Z5Nj7M-w)b8iL8)!OQIg*v`e$5t_xoKI`QbtwsKp||o(wHOp z&3~$4Q!xy&X6EaEQ3M^AjyD$vGm&(BLdmmpSVsqgE8FwA>i1qA{u#Tc?=|KRq|Q!2 zt;kt-z_~-4pI#*SHsxl5?TE4?; z^xWoJ)QPRKvT|%T`zmK10_w(!Kb%;LO;=3${giMXK=aW~BD5h>cRwc{jNLDwl?(*|Un3+XTo+m5Bu)4EI|b;P?|Wt&;Agqxliv?J zgwbJJM_&4B@%dRA!_qv>5EX8g{U+s%W@;86su|3r!qryAI5n#4SHF!^uJg#Bt>(l6 zqEh;~&sAu1u?ba;JxYCN9r#L<)H(GhGU!5)9f;~DslcsNWsBX=l`2y=h5X53Leox$ zb-GHXk+}`m(V?qFo}+wsky{zo-M9lSxQK9mSS9jIS|qHjWnHr0IRoU( z_NQJ@N>8AkPWL52(+?hQT1bZ6OZdj}n1ap|wa^A^6d6n1mLjPb+&;QpMyy>!Tu`;h ztw!9^ST2{jFCxtob;nW8t1FOSX_?8%#PF5Bkny{%B$AYMt$@?x(5vIE$?aELRL2L= zcwgMvpk$7o+L}wR60o)zI0lac*fK*PyMbm{b@4wU0s*!vy{pE zT63RCI#XWsm58&ru-(<#gA^si(p7!dTf*pteUscWoTmI%kaAxO%zNhH4)Cfjh*_kDFhvS>I82v^nCi<;v~h{sx9? zP#coFve}2a(ca9;#S-l}o3q0a8nPh%AO%`j>pZ@{W^ZsRsor2l9CR4JQDbQw@9*#b zE3Nv&?7fd~Lg;7Th>2h@)9)X>d@1bH{L-TbUQOrWM%a%O!1P#_K}<(f6%J<-I~Oy>8nnv^qysPvE`6~L6QfJVW;yvZzGVu zCalnCX*qI7dKQ>r6i9NAO}R(vdx*kOt-;@#9J$<|;OICbGDLl=NQ;dU@r=vZupN_@K^pQS>pyIol( z@#)k4AhZ`d_#dYx`(i88;Ab?4Gr$dx|F9ZC=|NpD`k`A97W{Z5!%ZuA9ITt|)&Jhb z94+N|dStNC)^p8OzwY+dwc)M-iUccw62PEmtJ`=L93@VUoC>RiAH5y8ot=1@{^m>2 z)h&A!Vf{dXtZG*ul-FaVML4#&Rr#R)u)c@;OZUSajrT(Tnq{Wqv;=Gnk(e|me@p&N zy{d@~`?n|4D(_#J_Ob$sjmVo~F~`u|3boX{hXpFF_wcA4Ss00&*ROgwmix4pTjRS| z=aYB7UnNSi|NQ}1V34Yy7mbDnLHbPQ{~eBIf!k*z`-`B3Ye5-J!7W4Jv47d%`Q~|7 z|Lv3=D12BuvR4l-DzYc4=E&{_cW^O{z4X+SW4mw%Byf^_-g-jsNFoqWHcTR#_G4_N z5<~%}SdRPVXfIkGF7o%Z$nLRr=;vMKOJUx~3~@>_Ca6?LCF$W|y?gDe!ALtrflvSH!FO1Uk18<$)CKGrPpxIHeD4~eYxM`Yepu^=CA&1 zyq9fEP9CKHv5^TIej$Gjn3nU^@BSvZm-qDbiiOqdUO74mnLonsYlpUK&0k&H>bNu4 zt!Mi+%aUNbU4t@Yf_zgI)&SmL`UPM>=kfkh`)%|4r|#J7a^K+K4W6<##bYFoQ&v+2 z6^3qpb%tM*bN5B3$`8g?oCy$;>ot4 zbw#0Q(AT;%WjgZRlXVAWQ!lAl?_EK8O&mq4s4v8!`mgIL_Nb&9#seb`?rkjIA7@a?Thqvi1*2-yH{3Xlm`FCy+KgTAD7QxCv15- z5;a5VjU;G0!j?iJ$LL_k-sTQPHfH(na^QZ8xM52Ldpji!;%Ggd%#)=Wr z&`I!cSb;P}mvO_lvCE)03|l~4K_Ks+RAYgF@j|3wg_$I5mmBCIU$@*uxNhqTkx2m> zMFQ!Rx@$YK4hMN$hvW*$AgtOI_(F+^Td1bC%}i^ertC{HF=!vJ3_sjNI)Gc{75zWwUe z>*pn9Jw@CgL)UKDf}19wfP&?F@mexZcI9I{y4uG83p1_qMz%C7fu@3-{clPP9`Eg> z603l#ct0gYJMgxzO;!kAxb?7f1oedH?@F}@YEa3;8gT}V-$<4k1tWYp$MB5=%2Y!C zvU9&fHgCM)pCYX*yyfzLt1nyEFer32tI{nsj+8HVe~D13=U(Zjy?yqU9%MTU$;5@cDHnUSYN4{ouXqt0v6eU4Jd?_xg+GdIC`iy&~rjq{W&&5*QeBLd`2%( z@hAj)``sT5c_QEHi?`#Q%k{)#k@sziC4=`4wq)#0dtQT>LmW z)|*Cqg_5msgXVLSS8dBnJf~Hx=6No=tTp)TtcH^3NQOr5Bt0aot@Y3-IzFQEmIF z|MrYFaci2;&|oe|>b%x*6wPz)*p*l?F<6)8^QcUB=xJ+l&`0_M`b3`Q3gw%My&?MQ zy%kKt=c(E&1M2T-yYS6-6NyLa?9W#J`aILCmu7j{j)b}hI{BS__tg!fHj$bmsNPBA*#55iIXFTtIPv#|iHf=Zh>wE7nAfS=(N<$n<&@kR78?2; zoj}Q&p||q$zmL9caf=L3%>3wyA-24J_{J$39kd*F?7FXM`)A+K= zv;{fKSq+XFAOP_}Qq$alz`ob{;t3Zkd88wg0K*{mcm((48 zb^PV|1W&dk_1uZyU%#sgZX~vzD!ToAcl%mc=z}87c+c~=V)Xi*e1-lH8_e@f>`e&W zUaF^7`!oJTWz_Vb(aQ@pP1$}JcLyF0C#8|`*b9VG|3a8@@x7wEGYtnlBchXG?a=|S z`}IWGZ84hHIn$O$NILeMT76Z%<)zui!nmmPA{bf!Lwneilm3s%&=nggoz>Fx;E1L~ z>L?aDyA+-m*Z#0V2JN7te2-OS(!qsI#(5CB<}?eHuHAv!1a{betEr8#5g(1tPv06G z9#I2Y1kRvhp(SJ7TvQt!u*XxX32X0(b`0G1lJq#wIxxavoGn8?2};w;#vpZtfStx* zHVhZnuavsY6~9rDNiZYXk+J5arfi@e@KCHXK#^12C~(#+Bvp(9u@0Jh(0OSVq84dq9;nQ34Z!nJ#PCj>ky^Z`!o3n}(>Y?3IJlwPHZCkqPcNP+&#+oK2!mEw-TgB^+F-B6PT?ibcBVU=^zEw z#}QnDSub63quj7nPK>;%^j$_fIQF>ME4Rb{nFwI84$Wp_jh#fYraJr9|3)Q(K-2;z zU-#4jSLkJ63jRWyCsyhG!j8t-^3h_M*n1iGf4>!Q7P379Nbs$H+=cr%}zxAP%wLnXo`@xKn zDs~7!z;Euu4Ou8%;F&U&czVOQIQCiG0|IK!2$;k#pK-(U2*nyn_zwW1=FOkQWUw42 zkoqNfUo40BK<@lG_`Jo%y6j}2pA~6dG61i&Umgd=#7B#Ty7zXdiMO`%s@!}6u2{en z=JQGX^BPr|`cT*B`1v&H`>0^xbM+Lnewirw$n2gOLY=HkgM! z7I=dtF?QqKD6nacO`?ZY;L>*{XQdoW=a9Wq(=Cw7#vDh!%$LnOTlQFF?f|K)JaUIV zst`pq&7!TV`n)wDGx0Sh>|qQ*`aA{IWapL1JB!aQ#?9>wH(OoOi9PD@UF~w3tP)!! z)OvFt=Z^5u@1C!?!xiNDMRpy-H}6DlRNc3IwOh6G$g#pQIF`7oJhDUof^BB>*Vv-K ze`9}rMh4z>eBV)qkCeF+Tt!Fhx&MCh9dnE^LFUNWX#tx8x3Wj1f(2i}#jkN1y>F#j_|hL`K6k0o zZ!wuR!6=yPb%&1MjG<-~@fh6z8M0MK;i-nrY_zp z5_->7qS+-E!x##AcrA}RA#|dznLjG8`G`N}(4Fx#ws~};cuU_waAVypodK%3fBh#yUujd*5vz}YbZtr14{jK}+!<2K|$B=NL+x98eSs-JQvE9F_qym zPw5%)<@RZ>+et;2U!Ph~Z$2JGE=^O!eY{8IK#Quvu#)1Y-*fL4c=A~b1e7B+5&fjI zv%mq|pjS!YP;9dj!uRN~NxJAlfdQN{7RYlj9ws0=;6Sa}losMg%+5NQ%9Eo3YRFA{XMDGUe??=w-hpxR=Cf@T{&gQlaj2D5_`TZ(Q0t1pW&@o`0 zdgaoQ<^iRksvXwA;+p|&AIHiqD{5`;Lq~g%N=^Usfk+A&JrzP*^_0< zFUl&X-j4Q%z#lzuG^+4<{en(=#E*(hXP{72{o$HFxK`;qeL?lYve{*Wx@ok)_g-LD zpDcR0mke&KW7;-;uJBzA9!Mn6AY7X!Hit(DlnjL-Ym0Gi&o>&^HOgNea383|BaK{e z1~yf&O9=*)snm_uJ~zWumE~e+^TkAik$){UW{I|Cy1|WcpeaP#{NF!~0l-CZ7Lam# zD_%G_0NW2!w*l@F?lso2F;c%XvHoSWVmWn~B(<=%`MRbvz!;#iB9tF}yz@haDH801 z5q$zZ{G$NSiNMi{R$6fb%Z^}Y_DTM*po@C`+;b$SfF zd+YaEszWx0vf}K1W1P&&0P7CXU+G-HY zn##G?br=BGaBXG1i(10Wjk_#U&2va@x&H)=VM-$Ff>xS`*;Z+&ck>yczca)PVy%Jc z&7;WC%&g&~X=*Ya-Hu_L#?dp(TZv6eV3t6MhsRDYV)&}U*%SEsXxA#Jj(tJB_W`X3 zm`V|E;`JcM*&%1qE{Acb?M|0;okA2J6m~a=#*Su61$=V%*XizW*C7C`Fe04SLgJt& z1C1t0))=Qw6@ko`HUMx<*C{vj#$l(izJR&rp?gz@nza;c%-aM2JM>zQuYB}wVt7F` zF^&O@f)~0Uf3*>o5Zaaply2;S_ zJXjDGixJYY!lW=8NyeX|U=@M(Ts9oNXP~{DdQKKw%F3H)7z|+Y`|AWcspc z6!&F>-m@K=8U~lYQ=dq&Jsf4)R|hX->q1hx(D1`en9VILZslS{?Q_<&^Gd~vU|yFe z=354GVKle17cEp;|5v5PZPWnmNFeV8GC}2klG1H^V;GkmqQ^sWE9ak(1Hv!N?c`zs zp&3$Du?Lq%o8aK^CtHru+!*V?P-@l zn#te-lpaZkkDD={o$A87!K)~_mS=Le#KGFdTFU|8J`fSaknYXVf0_Jjc~SwCnl0{Y zw>L(=y?5`nl3urSAX?pe-!tjUv9BDres_)b7daoQn?`g!9t=H}G2iz4wmdHXKA=8I zaG$Sqhp&Tp4s0E&t8g(03a2lB3hECzmLA&%)Q5JWj(t|A%vuiB@C1h)jc!@G$=u1- zmkag5;cA^-KXAiT>o*_x39A$<`XwWc!Nz(sFx4L>e6-8;QD^Exx?V~^R%I`VkvTJO%zu;=H} zEv}=-C)HBdf=X0w%-y;7sO7UZe+kQN{H|;8rLa-Q>XprF5w8gi1I{}{Ah0RBrA;zz z+nmUq+o6df)Sm1ll@5%!ja&}h6o_K4e$lYrTVL1BwPTxZQ>t52hL2jNSG)$mvt}De^6IhaBNZ)su|@@c0T2!} zs@w8BVLwQp+j=#zpnBh}1sIRE-bb|UOM%T89}-RyPj06+E-bjzAL>c*%y{;i4SUNy z;p8V=5AI_o0E$6q_h0|~{(e37r~}0_dnH_N>b32UXeM(c@O<-c{T|W1#AeEVmYKXn zoS$jv^vG{ z)YS!ISH+%k&Koys^um2pU#aRLG+_AM?Hvy{(bA!-M-s;+Cg|n0qkZGhs8K?R+G6Eh ziT8IV)#p1WC$~|18(jWH+=Nn>Q z>&(i+EZDpDdY@GWiLV7>SF}s zxi)kA2SWBB>eJ6*CFJe|&n=3XhBhO>;tVf?5(UFCe{^PQ#nQz%+(uuiGtNtUgBU{%d)P{nw-jfX7*FrkHr)6J{l!l8g!G}tlk=W6O@$VeumW2gjH*wt3TfL&@w#mQ?=0SpBnmT1-@TQ!bHd;v47Ym7hE$CS}a$bQfPU9m~8Cr2O!ZmsF=PkMaTKLP_jH_U{$3{;< z)q07+ah0ePM*xhVMbDjxxtj$f)wL(Ux0F&rX7Tcwo<2L5`4d;>sM(7 zEC(J41GlFG$yuqWRr zzjw^d+{Jlh=azlIRyO56ZB_%beT1mSr(qI=36AZ{Ko%V6o*Ec-tPGt|B=P+_uBVj=jH=;*<3Y#xMAPzvPXZR~9L$;rPH4#0|g$ zRq~&^YLbW|?EiZKfyj-XE4Bjt$M+_%<=1^5xOxT)K+QRCwv*jEN|B6I5o|M=7|p_M0+{tv_eMJEV&o5+yiHAfft{p6F76euZIPPMu8xa z4ylaeG@=F0im$yPrcc2}9PX4yJ*8verImi#3j|vQAiR>+K{t12d886147UFQCWSg> zk8n5e&a0Mclr4sqXYK<}R#(*VR=#K(kl&u_ft}a~f+@9N zjWqo^nS7C`Lvygi_;jnYUD(P;{i1*;SNh<;mOy6**hqJ2rN^F8HaGnvB=l(YHV#wx zV@FX(za3?)DDaj;U~zj4TH0H5KA?lNVFcvJxZI#ocbJHVZ^6HX&_p`E1p;t+-e?3| zoA;noqlD`yF}}@a7R8G;HaP(+qn7D$lsNHRZ+-c?_7%<8IRGNamB6)R-fMoIn3X< z+P$AOisS4J44a$k#&o|rCDOlxx#!#e(U`e=LEps_Uo8Z7LRs%E3#fWnWY|3Dnz$gK z8Bmmb$r66MlOq(cY%MQ>3BVin(CS!I?F~a7gtnBJjoU}mQ2}@X6Aa)R72m-2qkm{s z@TzPtU~zG48x-(IpY}%U=?8)orsK4Ma7`>afw;a;(e#Z{c->)5`y6VFqhPr;&#QwO zIus3u0Am+eQ>2F>|6Hs6t>CR%zcXZ;Lre?30TkO>F^}Io3dxB#2Jdt%<;OW-{Q|z?;COqtWl~L<#l+L?$cVwmr?w9 zUyEce4;bCD0*vf)rQA?-<<@)f)}0Li8=l$jTj)|YF5J9q-gWTcb#v@pFyV*3jb;M9 zJG#=q>EC}Za}*VzZV4@?w(pd|Wzs!u0Z5}I;NfPAv1Ww2<97H77K;1UQ%SB-_g8W;$o)J4+k+><2o z{0d3a+2D7gES{M4)trd7CB~A`Vz&Y9&YXPi>lI^j|AA0Q;fBq>v%!4E#?7ZY8I^2# zsZ_ZY-<%MDUK}9o``LqE1pIG)aTla6_;LtoF!R<4Nh8bPq~L^Z6aTipZ#0R6|AC_h zJet;8K^^_LrW)KFGe^G|*q^mcdaA$B0@`^+1;}ykIsa`thjd)~Z=(LT?>OanlDTZh z@{I@nX=gT>qsb=R`oS0b$cKI!f*q%bKC<8H6^z(WzwaX`Ul>=TFUHNEoFR+k5M#D+ zZ^G4S57!IRJ<4~H|974#Ckb$0AoK3g@!ljDIR@)DJ zy-F=rtx+N+ohQJkI9zH|0b#3_YpRwW;hhIrT(AgyU$WDi@_I4M{KV?pjd0guqF3Cvcbv=qe_%fx}1L%4_ zq%`7r?kcb>vzwYhuwb|z{B+e)|M?yw&*3D?izhg`82j={iF4}a-hBlzs|y(W&*q#> z1d8iknC8~4TL*-Z^HpFxw+VzfPvO=70L*gj;aZ%1cP4`XftNu|t)8;njsiT;@3>p? zY5e|`%rNBd1IlJPh;t=LS~qLf9sm%&r3(#JZta6Z8!+~*87nqqgP4uG1?$4dDjP4b z>Qqy@l?3qyEw$V>0#twby%X`&5AZ|-&iWl5v+HbU9Mcz>0k-?qmJtKy;r3v9XkhBe zV-~fLww;ZW_IhVyzgB!5E&f7Zsja#O`nLC`VCy3UO1dS{hT_e_RxksYFs+ zbOBbCgKmF<7Y69_2yL&Iz*QrvsdwjHn|$8=2H@y1+7sGvOtwnJJwf*QmRB?yI-Te1 z%Kwimv??t#?IZ>DiVIud_e3IrzG18w=R}C*#@zTk?ow7jKxunT8GA;J!L(~g*EJSj zJ+89t;IYt-M(t6KwYVpnF^R&$)zGBa-iwCrbSnUIz*%<=qded~1vW6+tTV2h%|nyKJGTU+z>Fo5F!V3SFl=T%SU zo9L`LTa{$ZyH2W4+NNyVv31@1TvS1BObBk?V?7jEcfg41*=%zhQW$Xq>$;Ty#{vuD z2POD%WDT2)#=|a_Nl9ie-o@9U!yZt}hZ1g;yf%JpQMV5l`GW@dU4;w5VhOywYRkw^ zvp#TRH?%Ur5*VAwz)bzI8i!Jc^yn~j_?j?_8-1hwc9CwbC(rgaM+yo$m}1s94$&1; z;}%Zl%pH3_qjYmm%1K)q&;5FON!i7`dRV4Av)RO# z@LuU&oY&?!O@2>iR$b3-d~a{>R){yFc=?y!VrDr1^D7FRJ>>`c^ZA42a&SElTLqSQ z0&-;Y4D+1x3ZuM3cw!6o zS)>4HM>I7JBK0ZvxT;tt-*Ef=n}9n`xU8QgTBS$5xdo>%b&(~`NeSC+ICD?Wk zSgaqIg53nFX%S=aMV=DtuP@ZE4NwWkT5I#|VjdE5ty56*x$!B#rw%mAZsm+L~63TMvi zz6(wA4p`qOB`#E;S_1aZguDKv0ey#pZS_@hb_Ry&>mF;N{x2oY=e9J!19U~m>Y!;Y zVUqFmyr0m!+s*fhyMIB;jY#$1h=7YdKRJChy8WnbCT5aRL30td8ynWPU!zdQfI{A3 zZe%*6ahg$nbLOw}b${-|Nnf^2r&B6r2|RWc(JGNz(O>@5sB66Ar7=_3OP>y_xVo;_ zJU<<_xvNibY1TXjOOm0xF`FGxt$FbnRn-jvXD+q#(A~C6gL^M)jIVAd>X6l&qIgp- zx3v2@N}U~d@q7GrL!@axmoe>x)r;2e8RX>Np4{OdDUn^hq!TS&_E}bagZ&x3^fm^H zbk-|KrB|yaV@P+xWA~!N*ZZndM}$iZb@c1b^$7wM&CEy;)1TzuGj%hcI?jQy&m`+^ z;@{@m5mz6~&HGR=d!*3m?xK+M)OwYJ9R{Q zpEiEqP7UxZd!?gkm9Scnb>^~zX?Wyr4y!?@l$RwPm{#pIS5(yMOpgXzt8?PwHI9oy zl2DQ%(K~w;ZnCYc7n0VdV?Umj*5s&aOX2f`mZ+WYbb4hs$;mDY)v;>pD4qw4l}mJ? zPE^+NA|-GqNyg~G9~&J(M4D0i(o>!g=Y0w7+;yi!^XZzp|G0QRCJ?6`M0sgXr6tn$ z6SlclX-Xz(-q}%8U!=AA;Cu6+sUGL$-bsZTXR$Jg@w>1-A^DQaJ1};dbVq+3B0=~PNUx*L=jI;E6OQE36`hM^fiq;qJHlm>au{QUl(mtNp7b)S3hwb%YE zfZH+bWEYiqfx~cqZVx^Zd7M^qg@S@)Ij8;JxT|2VI$Mzyqa?vw&2xLF^7DD47aGot z4RwxwqSuUvGHiQ}o}gPSjx(l@kG-8hb$cD5iwv#4WK(FmL#RkJ?ejYZ(R16q#!9%h zNh=G7^p({#lkA~6Icli8c8qy96%Kn_FrZdHS@Lnh*m+a67Szw+LD=TBu9z?jCYRXl>D) zIUbTKu5p7&{XG{?%!Upd5#EnNtn=4x@&r2zcT04`q=^+E1H$c7&bL!M_YFGH`P^zf zz&JJQ;4XO2ncg^EkFR{M{3>QU0L97*{Of(f?B}=SBKC-Kj*>C*juHkEmecM9$nC{j z#g#5wES^u;OKOK_1Q-+MC(G%HTO_H` zd&jMf80*|$p>cZ>goQ2J5sWV5G_~Dc%NfzuNt;Y4m186;ubRBHjQ#=_-jMZ<+r1hu zJ~jn1jBYKN4^z`nIOAcQxl`j<77_=+Y(d{6ms4S~F4kIN9xSzc(c%Sd$g!I<#;n+5 zZ9!*<-&^q83tR#j%`X{mpI>|49Y7n1XCo2PvZ(uZ7bC`a-+ImI8`~7_d-jUQgqCsp z9sPHF9=(vdQ_4L>3??0O3!!wkl z9~?1P@jT`y99gcRg7g2_0brs|kc>erOS=282A^Ikm_=DSxvh~qR=lf?*wZ#vYX!7y zgmP>766vWa7z^dglJfd(n}QBg_02M(9E<2|Xsjb7_7!ibl(vaUh01eRAvA_B$>?EQ zhz>JOT=>+bSyaqMMK`Rej>pd=3jPfZFLo&hKRQQlApY^OS;ZZbE;LU{t7xCqH(|X| z4!U@Bb$~4`j6c~fPyITHT8S4enx|7myvc1N%Dah39pmz}ewhv1X-N`&A3ZTpe|_hU(!;!x@}{Gw&pI2)qE9>ahZEe-v&ep+nwf3$ceo;Vx^u|! z*q3mRz-lceu^e9Al4JB!94wC|*MrAS;X-@&`)O!xjAkqamy8T;Vcq77qeMqYK>LFS%ATV&JnP`Gh;jDF*R7nuKwvL^rz}SN<;C zY2^(eTgu|sy%)4z+u~&Ght)#4k-RM3OWzIvwsTGjG=YraVwj`!C+leZofQrNE#L)* zy+Hih=)$E@i00-lXf!={N|WJE_t%YQv`uDyu7#mp$0FCaql4+?w33Tm$>jCIj9qfQ znMi_*81BEk3=3mq_(Mehvuo5KPex`5DnZ@(mf4NysoMs4moP}P!|Dx)G>urr|Ii=n z#$(H8iuI8YI@DGp-UjL2sg{YSBo!MqiwL5if=QUGJjO^Kzw30{L)YywZmG}Ie)ul^nA%|KE@4PND@m22l(TjcMy>s8Qj%qd8Hq|q7iD&p+8_v zwF;N)5BbKli<1-DbD;<`-97JWmJhbpKro4u2}5X78lQsob59*V+i3M;uhJUhCJDn} z36;+k8VD-5Gr7k9gg>U198-oFnA|HPG+9^0u=y}U(Y1cXXP*anzw5l6BbS5)0%XIj zjfke9H5peHV>1sJfT09Opw|&GKxjf>av0ei7@nFt(_>}`mcEggh_Rw;I-8lm%DLM< zqdw>1HFvGLpdA5vsfK!R`k++AX8Cc->-Rab*6go|7$ONnaCk&Tl^OQ z`E6X7_>}Av-ZiW$yzBt0|R|Vg#vBI6meOd10}PMm$jwyJDQOf8C}#vkUaU z^RF_9g8cra8(8t-u2b-ygO(4tojqKe@IUNubb6&VTNZ=1oc;1xZWKHZ`IB-A4W2pYCp6ht>ZCWi2dca4F{H znRP+u)?>tuj5fR*p!_}KeP(Ha8lPIT0R$3=>%bkC}9_f3|Ca* z5Mn=QIMKL;YT549HAcBR1!)7_bA(RmG}Cjx1O`w1EM;ZW{1+@k|L!B;*+#p#bw_t- z{k%|pMQ`XC`SA5|0eo}KOF=k6A|Czo?PG#(_aJ(=`04w$r@( zwJR>w+=;ufIf?@%b_ZZ`8SdQ zrj3|KP9v5y3pz4Mr-8PyCBv#*ZSZE%=RVI38N2$2TMc;Q;{xVe^6bDQkHSy3Gj^iA z!e3n1YpIc?3rg43A0vn#dok~zDsE!s>mjxP@`+^Gdw|$s35NEBW_{je`!3!WjU`O$ z$NL_*Yv*ShePGoksUcWb#Q+3>a1e!ogqgS3Z2K8=L8YH`%-bMhZKR(+Wd)kdVlG^? zECp2q1GPIn!TYmo&O8sTZF zw4oAD@uz+uXgq$1YPorcXd)9hCDg2_VoQ0UKQJlWM_q|Nch+mSqwp%oIB5bi{s#A* z2iOa~Nd>}UdSjm$IBfRmIVdGu^__&oA~3jTeU4yC z%mE&rL=fX%u9(7XPO)K213d}GyRglec{(5ki2-PVbWmUCSMvR!fCb z2j^-oz0^n3-nJH#X9ORrVOJQ+iJBU+=#7&f**XPXEWut~m8qsF`%6NPR~$dwhm-tx z{RbOE@J%e^y2c9#fAOW?A>G+Cu4rpn_La=@&0U|BrPG@Zu@0zd;8LS zT-SSN_NrJvU)35@X4iT0-nYaOheAhve4@eholH3XN7B z`Q_%uSY|>CMrDT`Cv$v$>$3mdyHE-pK3&&??M69eSsHQsP_?vH16_344EPqHV&H*~ z1~t9VDLvY7P6!G@a}N!z%w1FKJh)*~O+gu9Dd-~LL)cFEMQoAiCFJ+QgaX#rhbqa1 zdx6ON#a8XX3XIm_MJr%*R@qGp7^jcj;2G@$ZXdpx6sJx}Jh%?up10oKl=Fzeu24n| z;piG}FoeF3%0jSs^X6>}U{EMMEC>bzI>jE4u4x*yKU!%HXIc;B*+bvDb{M@vgZ3cn zuvbl6P|9jm)wQ?(UVVtSx0K)6_2$W)eQX;X^pc$mFbTE+-e~$@sBAu>LRfKBj;e!{ zTmq6vYeglc2t3z|L#@r2_}Q&KCvP)TVPSM37=)fdVc@&$3&1#*!x>_-Y8Gwp?t(;& zVkQdoyd+?i{g$+3YEW*{ycFJR=-8a>_F{0Z-c_C%4HZL96iG~8y%|gc2fxn@V9+m3 zU0a`n*@wl^Y9E;Rf3(WFhl#&(07m3}sKH&7sPg+9Gh;QJ382~26+}kUimEqw{Qf!+ zJ`Ye#pJ2Ajt_hT_hjG$>*;P|{l56c}x1EDV7{QDl72l{5G1}tqdjaMPe+=%h%mRA~ zexuAP^H?2)7jS7zV4pW#9Brn8Tl&oMe>FDJ$=3OrZ6Tba~8**1ITgsTR8ns7|ta7Ji zvLh6?5ctYz;OLiNB#F?G12Gjs_%dDxzD&G~VtLZyHzQ}+6)>&7TsYz5Fd0~%OHM_)nNBm^03BzNg0+Qr{6LIMC7gmXTdAHD zXQ@R0yHNCEJNOEOvHb5SBH|y4QSOf2QgiJbl^8{83)@L^P!$#mZLsx!*lkLTeJGB_ z+^K#?W3FkFA*5G}qOS$r8j!+_qA1id#kD7Uxj6SWlGnd;qH$1Ji_yX=kwlYn`3M;V zI}}Jf#?0nY>#~4jckU1c8hj@yfcZz&srN94j4%67sEhJt_!%VO?hXc8_qXiKYETv( zYLv_;L&OasGPH~s+njpo+UY>!cjnha4Es-uUw$lfS$6QkFV8z|_@ZpAO`G>T?qtW1i;j(rfn;!k1bIS9EkGr6 zj3H!@fcDmy2VJ;>;Yi#rsL5OaXL`pIMCaa|G@1tqtp_J#JmhA*1qs;?C2!xM6ClpP z1`PFTBsRQ%g+Th+Npc^M%Aa{P-9G~kr0sfqS`jtykFY1ppznB2LI5%SHb{QoKG%Nu z1apW~L^Ly~=U5BT@``Fb*R^~D_Kk+?ECk!hZG}hd_WF1&%{(^3(BEA7?uR&4v=7OL zui+eY5pDO6I|&|_OzpgWDLf1h**S6=Rix}g*YHwevu%%GdEN|v8Y6fd%%h833}g%?rL(1N>GDurA4CH3KG&D07~_*+A$ z&Nm%yRC;)#)YNnFt^3}axnV(5!`+#l3y&s^T%Qp|X|x9Ti(PK!e~>z_6o6o$slG@K zMa8$HVl9|-d{FvuwrWwadiE3Mw-Fk{J#taD|=p%QDU9!dt_3j#WRkZnh)PTQc5YHUD-6pqtKWsgcmf?k3m^>By<6_J)G=uYv zLxb<{uVg|c#NlC#zh0^JfJtnTHz_x?i8ZK(5ETIA9~X`pM*1Ez9oWoLd1X* zo35VV0(!oOx+Pvx9fR1fIJJBome*nG}> zfU;|4xc|~;D{~INKF8-@Vj(7axXXUWlq)93l&C-8>NjQAQ$i2^DKNw@0462br(5kE zz2^kADFEK02Rc-F&(~UZo9u7O`07`>N23NiZJBr1kh6hnsu>FZ@eSuTF6koPy^2Maq*$HO1M%~Ai&aK;yI(WbZ{sG0Un;ydWyzh|w4 zW|l~>$%OYK>=EvHt1J$weHaM8IVn=X#m8bKX9>x7hJ4_B8LjLuN;vM!9iXHA{@SgBt6S6n)O*j6fPer2$R?}-o(M~=8^`nWJ~&9Bsm?!YchfLV8$5bPN!LUMDNvpD=*4uQ0DeN`O&b%u^RnNEo-p0OhrB0 z13q&phSn=!1SugMKIEys&*bH0b&4YPj)VpR&-M0I#aIx}tEO9yomHFvaj=w%EHQ7N zH|=veV0;E+)NDQ6AyT2*oIJU%>SC&TZ&ICJ2uC_xAuXKX7v)2130{Q ziBjYOyW@LqDmZ%4ymw|Xk36zNk31GbUA7H1*`!7PUKdlb3_@d36H%aRxQqD&rKr3! zT7FN6EjxP!Qk~)%NoCf3zwG$+4ILh{#%%BtC_9J50k1Twr5}D=eU2|>Jeo^%0T=1b z{Jq|*EH7ZWJEtumB562J#Vg@6%&{ftP*11pS;b|j?S=^7>0GY+@7D01*P7I<^E3*g zH>yM1^|r6SCh=oU&zU=8^+{H%jz8V2?>rA)?+Np5wl$~xH~j6w3dQI=WfmY3hC+zx zLa?3JbD2gx6(Iy0toX5$Pgk9qINF|4P<4CtP+Rqaz}P&_cdwJo72AkzEo>#tZaOVE zuTnA9&UpyacBA(Lw!eJtM@0e@M8g3*1^5`#P-D|D7uUiwRCBMJ(9z zcs7AxY3mQwsTI1O4An)yJRm=#N<#5v>P14=!#5xe!tA}bX`1IRun0I5HPTI@6S2Nx z%8=ejb)d@Id|&X*Ac8L>q4TWr*~rf?nrmP^bb_twPJrV(#rR4&9F8Y?XT)dn3EfqO z;hh^PJZt));L6O53)x4otC2D3hBN7q0n^W8Fau~Bgzt3lztZ*)Q^G6-AkJ;`hzElj zXp_dCnU~hy%kR|=-ocHy`J9$y$SJE4dA5>y}bF zW;^N*^l3c1f>O~&uhuoZU(KBHxT<+F|1i>_7%WzO_&ctH6_nI1?TaiV)|ak~*J7^$wCNYk>nv-SIfOb;iJh8N(8vTYW{8~O-0m5FOh-@MY>;`HH_=AD+aCX_ zu&k;vO2|}l?;sWm+~O3EB*TORJQC-5pZN?g*-Rci{^PZiCJK3v4>4cRW9%CN5DSD#oRZoSWuXG+YM*w&v|i{-@K* z$IF*`NmSXM;9h4@5s4%4@E*zAL3Wi z+?+M6W5i~jaVS}_wQbCn#QJ)SN$|zITZSgNmPab9PBF?BW&uJGUz(x{!j2T0SYaTA zH~{qGeAfD$>xedSr^%ZsIV=`fsd+3gX%7w9%H2U-h94!os~pB%fci54_C$F>B2Gb> zUYrC`4dAD$VjhLF#v+n;oEZU=G0tI40GP55e8}BVnzYtKa8K5F&+$kNF7#s!Q<}q1 z0_F#$5UneK6m!X@KlUuE4PWvA9hN;eGyPS%>}xQbB{xt7KEJRGfNVV~54=(RVfa30 zqRiM3vlLjOkIq_eCDjp3K~uglK^_y@x?fZ}4h6Hl*Qtl1B&NP%&X&vUR@~s#wk+3h zbpHD~;9%PO^VuXa!z1rHooUGu8-{_N61}Z}atbry z5O#;jDH7+^@efH-xJSgY4%)VrL(~xcdnoavSe=Ym2twe8L(?6NwpzrB$2e^7JzBrf z#vEfDQ}zvl&<>|B8cJTUw6w%*%>rNIZBhu0X9)}ke20rh++g#_ZH>1|>~p1cbN|dtx!3RaYqc(YML6)S?^8 zzI^&|_nox3Fz$puY_-xeahF^oeg7pjxJuCInZ06A%*84+9hSpSVx*{@?J3($q$_dja@rv^+z zV+AYp#cOtvvh$>*VIdglh0|c?nH3c4pI`+HV)cIwVs~i@mR|U6##4|B>E^H-L^p0U zZU``f?J87Na<7r@kqFNCt40rdqd9WvODO0Y#y5%JO!3wY|96^0ls=V;Ck@ks!_5EsluJ8n&m&C@)Zu?gu17Vkimt}ZT zI`7-Sm0&XdbWfx#dLKNugy=d78jK#$9;A5x(Ent$eyf! z;Xufxw>HSsdOhC&fdkyGy7ps#R3&qneOvhrLpL4D*D8B_>w-K?R0#-;6Za#!vKO+D zl3q91r+wTT-}aB-qE@QIMRNG^cT!4bxqQ7>LTwvm{CMns$dvuA&58(`WuSo%6b`6M`()6&|fEbHp*Y)qT| zP6*!hc)gY18`xRn+9c=hMUfYzqQ$2-LsGIQW!?hg`Vzkf;)6NDZn6i(pB;EBnRpqiArvR=gB z{FN&G<9^MXb3JnZrC>~3NI~`_%cu34r%F77n(gvlf?0bEAG4^qkB;hO@U8$U4B2Fx z=T5x#*}Hzh{rVtoVdKRdiu|+aoqh7{ObjFYi4$FEIXl?Y-SV~;UiN*LTyH33ub`A= z;+RZ{UH9tj6A|v5tIRrrIJdw38!~efXC89C%-GQ`46#ZbUM6{NJ>b zv^oRTf|$xpk+Vc5_|mm-n(T=+F|4?S3;vrSMuIlun&K0u4B5kQ0?Y{0g71cj!{j`o zF_UiNTkLlK&YTP$P@X>8{GXB^F-_|*C* znNxv`zOI;RbVF=#han0^9ftJ&wPuZ~GO==VObdx11fhN8Oq0y?ataBq^s$XwgZo*k zjHsIvYE+rQ1Mi~s>!|1Ett*aShQ=|+A{}UsLEG8;?|@Xqv==k5_9lT)Dui_eC&ZQI z974wt9WMS5@{IJjN%IVX|HiS-+(Hlvx=yl(IB`4jIdc-xf`mpwgmfWsaN=4XWz-!7 zwd#VF;M_e({z$xNe3|ZyDkB{Wz9S&*U$C~;O;I6?s%no`aAz=Hp^kkf-5e?yA=cyAcK@Pf) zxHi2io8qI3Y24bYv=%q|L#NBPtos#J&$*`!Q9n{*x894LI50kR#tetgLH$-kE7~jB zdd%JSPN+m=1*6|aPG=;TLAk5-Qq8qMvF>85Rkx{GGUtXvkKE%g(4_)3QnAnAdNdho zfRl%WByc)OV8K)Lv@+sTRGN&!kZR>g8nK0B)g>idVgOLFhSE*|=U-T*RH7D3Dh-^s zbhm$-m{J;=q`V4^rW|C61S3%~7pwWNbg?UcT6!sEW&AV?Ae!w-%K^_f12yrEB<&!p zF5ZVEr!$(aN36?>(~T3A_4B}4<0J%dBK!aVW$cIJB9o5Cuw$bP!|xid@C&?*53Ihw zGTA^{JHg9ZZmZh<_=qg0pgqlB178>i<47kIs?XUB)o=M&!y}recvaQyTI?C$fnnbO zPmR@6aIrF3&Z5@%7xojuJXihidMOGE;Jxu#TlVR;lT)zR(Qw6-zcB6lqY{?8QD#AJ z3aDCgwkrGsgP-fB8D*DpKt%_U4kkF{$9$PA@SVoVVm|PuSPrE0G2Wgl^V)vG1Bub& z2sw$r=SWLXOD3Y9O3VBzHGYVRiRr^d?d!EtBVZK;`{DKU=<|<_-g4XL6=m?g0nJ56ga2|X*^uhI(Py|Kux zW^7j4zxYHDB^3DM(N5D<7BiSW{)C=8t-hUZ{Y&Q`FEwZTz{9_SNyDk7S|YuHojEUUfIVO{r3Nh;#j#~{5|^%AXYQm zdYK#Wz>HK*6cYFt@m73*^i)%V9~%rmo5TJZc~6q&I~J9v4lUp>HOjqMWN3H^aHWMC zJh&Y6&;7ou5%}50E+C_BQdAeIX;Hj1m$b8Vsb9Wd{KT9~*JnXgj43YuiaD~&UR&4~dG6!0=p1u) z38dlMXycld9IOjHly#wf$_nuVj<4YKY!)Vv#XC< z1pEKYZr$7c3H<*2C;^T>94{2RR0KjuKbAll>rD-F9sig*Stvh%XEW>iLM0%eC32QC ze<872DGMRI@SMQWGqU>Q7=N#Z0JstL@zlI|doG>D^pmzpu9JzwI?x+V7(5pwgJ{AQ z%+0wg5q=<}Jk)r*i(e%?wi~2kw0ds=cL6<3O}|BhF*dkaCvO%lDzP|};&)z0Cyflk zX{ZFhlEP{RcU&ljfbbF~eR(D+B&l0=ZI?^8Be`@))N-x)it0lR;(#yIwf^$B`)Hl; zulu;k@jiCRq8>Z87n+bjF*H6^(lnr~{MJ{&(E7?7ZSd+QbK~?Rzz|24b-#tzp_Q+f z9G$y5ABYGLnt&^5uVwaPcA0nU>M+rFV>`kUSa z>0{sbUH;LraTsuR*23FRAzMXZpoNHaZD>yQBF_Qz&_s=>qk`iC_bjjO+vizl0j(bl zFDE~3-((-?*R>KLf4%L_!Fgb<6iE!B`Q;LVkg=HZ$+Ko2BEJuNWCU{CuGKz!G1HNY zb#bbRVcLKDOa|hD6Hj~o3Rtu|eQYv=6*RlP1Fi&UZ$ieyW*RAm_{}_*M^6xlc=4-z zy!tYvnSNc74A$UjBgbga)Jt{&MAYZ$K}GI0iKz$>$fZ7rOCVohB>8JKqWGcWxF@i{hP9Pe354oTNLB1 z9#g;96yvi0;xwn|mtbqT)h9EYf?9SPY(&E0)GfDO<(MCrjnBSU+6uKm&lk#a?&91s zn{eV0u49_~C8qY~xKqsjE~?4bZddXTCGgd>PBuz~;GRV-(pm;n%zT~W=AdHqDpfB) zGPkfpH=0CnSC_L?EkC7V%~8-8v{|1-pGq-W{v5C!U4~{|%*Y*M;3w0g$(mbsTgIRH z=IkD1&iZhVH#VGen_fGb92(f1({K3PqWh_vyys=VJ>?L%-Ko@S#T`44et)nejm8`c znW^0G{+miBbgg^Ghl)w(eAxOVFVWrL#q<`a`_33=?(2)CuYnTM2Dkj*M+YW(Pz^t$ zyDsBtyfjuVo0S%29Z8x9BdJdZ^%6Jo+*|zLUd6u@C;4fJ46iNYh_ZK^b}^>h&{_>( zvi1z1UzCfgDs6GJQTYjd#J%@L`+~mzxV7=y07?DUfZmzQOEp9^StoJz)G5D)DVRf3 zkc(bAOg-zofIb{`F6u1jOJ=g}IYnZXD|%;cM1RHHA4g$NPEY6zCbYO=FXMLWo5kttw5m1wSee}i^eEYylIH&`AIb_T~P82E070#fT(QxY8 zWI4S2Pi7)k1yua90}=OVLa7Je$Ng5IL(`#VW$=f}4_Y)D_Kkx^#Eu=Hvs{Tt z^()OnC4iqpw#20vKwwJ@l6^SUgzRUuHs+IIV3H?^15|D;MzERY5d8eS%(XjQZmlOD zK8GX{D_VvcYmb)b3mQ|e#)vMw;CIC=1(-YmmsJ&fPY`P@b-Brk|KX8lQ7_=^8D*fL z1Fh)4g6$^0CKnB*EsrGo0D6HXQYmn649vUANyii7Cewv&QzWhrI%&!bf0W^Y*Ku{U6 zq0v!6v1k9Zp!{8cAu;v`XfUt9Y859cW5Hp*!RCMXZhRUc1X#9La%UkEQY(RhPo$F% zdGHY{+orpwCoL}4`OFJwxpIgppP)7{fTPUK0sH`az)-RC&O@>AAhpfkO^#>1frAjFB9eJf9weF6*)TaI^TemL@inCEdmlsc>BCJP|D zT3XTS|Ak9;y<b1K;3h4@l8xXx`%$RYI@1@-~5ln1Y23F8t`O1VJfgI-rG`Y)S zXr4B0Ay`WHhIelY?m9PW*6FS=}MD3m3jj6l;R(jCyBLn{Xwe zDWrz>i}v>QQW=~^L>$0)RBtnCuE98odW`7Eyr9}S(rTmfP%P*72nEH+QZC)_&9qq8 zIf+4dMS9P*1pMFMO5jn(QDY$n2~_zV8<%cP4BfHboB!wk0hc6{j6*krB!aTjP0idy zm+s%iYX2l6Na-+lA3|pAe33?JL-xJ+MaK_WX4Lxt{I4`3=Wg8(G|~vrFr8PN!%0@k z!uhjlKf5CTd#9W+xDPA*A=+9Yk+$8Vo`&X5WTN79$eMp70w8lSivTGPeFH*r1H1yv zjJmfnQ$vK=8;JTXy#LfA^ljj|XZB^_v-z)nLH`tN{(NZG`J0b_ zvTCKm3mI&WYI}!Xz3Kl`5(6x3yM7@-we9-$*&VBqM94CyLue-%kLdg}q`Olzd|4N> zGmJ15oHjh+#*omVkH$WqSN8JK3Y4A1{^?_zUu!e@WAJ3!yX?Dzs?Uh$beX}R7z(dRhQZbwB% zM5rDI>rGGBd4Icp_1$~y0GC!9DA*$48hktZ1XZhMuC2|JhjK*2uT}lD;2Ms@|@#V@k$a zglVQM=O3Rl_hZ8p!Rs%ZpQ-|n}#;zG2!8oh0RiM7-$V9hFO6=(l3snJ=72kxIK zQ1$l1&3|p~znpC3X^}3wo#=9x-J|mK)Mr68fUQj*c-*nd;>V>kcmo~9pF^Cgu)7X~ zo`*2MJpcWGdzRhT+a}eo>V?TpYsc06_=!o|Yidl%flrGn8cJuL_?|I_42M;c2Nyne@N7y{z zk0_!x7aFyWZayP3-#=?#%ze1pcf_$p(CQ7D+1grPr0sh!M;4?5IrgT&J%A553HqPXktu|upaZVxe1#@H@iSp z@y8my@|^Vn)_8`58I+;r-40~s))x$i=uS(k zi0jYt>O8b|(+hkmesi4o%|W6mAp&QVdOp)gc-&OLB4YDy7OtFW?rIPwX`2+@7+x=)`V2nH*mG1%eVjc!&wjct1))1uKXOfS=eUP zvt0=Mc<>JkRyqC%^>bJKmyG3fxhtM$GfNj5Arud;K9GfWW@n~l#6?D>IkE)}IzDYB zto5|6lA;e5i*kh@9{1HBcVE``iWjUEr0qk~Ig%fQT6Fh82ra|oh92_V)l!k1(8v;A zv!O4rrF{@K2Wrk`U;;Bd2TU+}o~A!}PA=)V9mCwG1fGFo(3Hs};R&OtqF<5tKX=7z z1_UO!e-w!j3rS>bPrbM@Bqa)U@8)R`8S0h)P)r$Iqkjv#oEIO4S=2Bqb4rlVMG&TN zPueNo`?x*T@YIks&eCtD#q}EZ0}@a2bI|)ac~yzBky7fm@0|uIZdkzqEa9|yZn~Uk^9f}0wNO|Veg~W7dko= zvC@Cf`TTu`OfI@g;19FBSe{Kp$4OnXgN}izCzacfqLj*s3s_O6glfbAz#C^o`qs~{ z#j!7u&2+7Q;&UJFc7-GG$woRpxx0|o;gbFsP^xeNv*?+oEgYA(i3kKqd@SPVJoE#M zy743=G@XQ;!C-wtH-v<@LoVxMzZT*50rRilszcPB``<<>#n6Q6e|I4q5COgnsnBE@0Ml2n0uwolMrq_ED9T-;0@*;5ZN&ixDBQq7xoYT9uKa;jgdlZIDt?Ydu$Y_?CgW;~4Z{ z-Ox-kKw2=To2j*@eQe&f1B|M%-rR<@(U}dH`><4cLtyKsL2ZyCab`eB2?G`Z9n~@B zP99S69SX30yh*o}!|hfZe$T07EjKgZa*MxuiMj=tBKdh_&1dgJ-S%*(RS+m5nh9Xz zr9G52&nEVN@8q%bi#w844uX^TyGu;ut)WvBv4Gb`rsoR(+K-OMg8JA&6Tktj$J0xR z17RW1K`;bfAD&+k>l1#uNy({n46g;?B~va+I`l?HKq0ZC0vtH9M-dOMdc3Qz1|8+$ zL(Um7&)H+rXjAbC|;{p(r4jJX^nn%drr7inZPnT4o{qM3qT1Q_13hL#|SZa-i)+0`pvYz)E zgv1<9IT3i{WZN@>D4dc3Oze%1E)oH?>9u0n)vlo2==O<4{^aqN9sgEdGSy3Tf6c1< z2@ALp_T%8L5gWK>)L?2@PK`U$DO1S~47n)0CSs<2I0#83f3T7kGMr+$GgC`0{_jMi ztXA9#o**gMj=o|E-8M+*2N|ZLnko#r|IRA%pxU}4Nufa>O%fJ06IyS9wZ7_%7}BSB zmOR$r0o3_>acLYO3D76jB}Dqf92P%EtDbUdee8c?sNse>PfrTR3WzvWy4WO0*zSGk zzgKEiBrfu5pjgf3%_ohlOr=)l%8}d&vMj}_kuRmZ5`sN~rqlW!d7$mN&`%W(-P%=K zwyMpXp%-;9@>>6BwQ?xAmZZ7j^PSJ!8SHPUX_8;>yt@5*lXB`IFRtMItx`^4-hJX% zTZ-7#ZZCPta2^I00>rbVhpFR4?|grZGLKVjB%p6kO(zYWuR4k=R32u&@K}ID(k}H1*55n*fd? zMV8|Be4}TyV9YJ>ghn6UoX+y9U%>>2p{(j3mFXM+lQ0eb$A@7Mi($7&^Yd{7pqrU9 zjL-O-|&W(isI5|V8mcYob(VDb+AHtTh7h?QlrRm-N$W09_^Q2 z(YfHv$Ha^wNXBjz69E)K$4|6q>I;DP;me>n|5wBOqAamlEuiy0bEn1UgTKb{RjY zqtEa&!WwyP%~S7n#Gb1=lS)%_sB57z=DU+EeqzM;(6)MH!aastz1bf#(BTw0Ho_qY z!JFJ2j(zJHqfg4cKM!!5&?N_l1a)kK$*Tu=8o78$B<^o0*Ql=gFz-6~)lubW7P79_3nGpk^s9nk zOxqnRm2ieAxwwPb;W-x|p24j~^jhu12(mrA_zWn?y&|qb4cP7Nl@->7+g`c6>?^~5 zA$f4kw891s&HF_XkFh0o;QQ~R=y+a3G)QGT2iBQA+kL!F)%jlL9OIG*1!y*?pvBU+ zJ^_VE0;N!k-ZNzfMHOcSm6ZpwiR{xp9I5(oyt8E`B9cN)WF{M3$&_v(;&qKYkLM|YPk=G{8B4-TvKDCzlT(cScL@XT-} z(w@;b(f1#OR5@}G8;#Bq#1W+YUNU_v^YhOOp%=Q2GL?u3RXj|3k&T}nPE;#Hhs&lm z73F1PQWmDIhYH+uubQ;P{qIqC4D*lAD*yQ;fRUt5cfkIo(>a%QBPeu{4UXrC>!?hL zPiNK45`{~SG1YNck(ZBMtDh=i2fLcW8cvn;;QB1u3CQ?@J42Del=Qn{YUM1*Qr?ns zgi~RYc5S+S*KyNoqUsSPcI>fYrbiu5u<>0DYkmnDK6z=>s^(n(A@<*IfA__V8O}>6G9!{C|+kUcS zQ9%E%P{XAeKP^SPCSg^}(=Jw1k~*n!xBJAbl)e$P4yrV=;HN<_L@)Yx7K>vQ)#_eN zBbGvmvHs2^<@)|4kN=%)-8cr_)&BPq$QjgD6!lcVUzwJe<#A5YHnCTSID=oQHR70; z|DLB{lvh|?W0$4y)KaHfE46yNSLN~lRg*1ZghP>JLHA`p9OyY4Xtt2cQ+wBzt$-iL zes9q_LfjV;xEG6eSd|y@rHs5)&fCDmd95+*-xHj85UN+%*YoWu=U}9P2X%TmVm}vE zrgk&&S~p#CaH`O#C!P0d75Rm7m0Q{w*VrCwuQPlCkF1HufiWZz_69S&u1k3(snoo) z#8R>H#U^;!&>hu6U+dG*b`q{`V#a&%UF@7{9@J}AsY5WSRn#w#p$o329V70Gq+vYG zRkQqc^-?OAoPSL}K{GsI|K9_I0`Vbzjs5>|_0~~Qx83)!A}HOR64I&UFo1+0QU=l? zATTIMBaI;4-Hn2jbSWh@bV?&Ibi>d{{jQPw`>c1p_g}7?iBHXSowN5odkaLr;gIt! z(po3eh|Nzex0D!VO!p9P+W+tJW9hi#TfO$|eBnQFUk@_^{TZV?T~Oja%S&Q0zv}No z40fpPBUqZWay=-Z8fM#`BE#}b<5PLdSG$xkJK^GG)1_%Ay?-UU@pD@O9uIuH5gTKT z#8{2g!Qgmw71@xT;G^FT5dY)vu?2;kf6ZW zcAGml=qIwKeu6cDj^?{oz zC&7bpJUnqpQC8ZMi>1BIbAdP?3bYc)mPsZ^&thDrRkeIFY*(Xwz#S(~1~S#hw4KKXS(Dc)fu?joCpgo5|Xrp%QLuTz;=jiEaoIXHVQ%B9- zJtZe-HRlc6-u`3hKGAgMTl=RH?{gj>)?Cy3w-X0JNZZTG6M&&2X)mB+9jlGPLbxeq zf~i;Cv0C_C(Q_SFeQd1o4-TS`{Of6!nO0h^v7@=SULV!=@fGEe*BiJ59(lZ~N_6l^ zO0YB#(oiw^mYP0MWF0Cu#pZZL9aGCudGzkpAQ;N0;H_JV9t1gp>~9)ekFY^$?D=iF z%!u7$FJ~|Ao+tG)>MQ=(3x_`0aLg$YVgf7J`moLB`Ja_wy{Hw5@eM#TaKhtul?mVtktE61 ztX67@ZBH&(h!QDAvMOAZH2im27k+!_eGp#HApUjX-n}qbw3=!&tQ3>e+yJpLs4bJV z5S6qdAS55gwCsxeJTfCU_??cpJ7M{lkWm`en1IQ+*(Qn)XOT%Xb+@x@bWv!>xK+6( z!FIt$grOtb`(aa*Su^s}Q?rw^f{)J@pWK?)XH-T*oPD1RFBzw!$GA6Negb}7`$jD1f z76{<+n0L#+ay%wBS)UqI2KT&JD2m*Krd`l!wL-@_R>f2;F z3Ff?(2(p%TibuW{+?8$(`4#i&E0>0!^#i)&kV`w6mv)PT&*Pn~KE2_m#qvWB>%SP1 z8zlcSOV_I!&r`=y(<`){8!*R~%}z*M-zsumri$Tn?ZLG-(muy8IAQv5?q|?0 zqoBwo$cki8t;f+A0IfiZ=!GBDdkuus{ z_UpatLWS6nY!CKSRhQ(VH1=`QrL)AJRW?a3oO?+Knff6UlHDr8Y1YmBxv%A-x0xD0 zF5uyC!Bkv(!)2@nuneYRy8LckJS5sz4N71W-SvVkflZSp23uNbj+7~ekRu$Ej2J2t z6eqL%o@#mWpM9P{2xzOfWt@ zwQM+8kZFSJGy8O(pM{Jj)^lLRkg>H_EPScu)}4zdIk{KZL`h1G+8#JqU8EPq1Xb=z zHy2TIsIuF}uyd$6nrh4xyo-SRuRWQ{-VeT4_y9u8oV5S8Ab?-78MCn9y^70!FZi}M z_;4Ugo1kZft0Z##K~Cs$T(u*qrr3Y|k6CA#@l+!jlZ*MJ`}^0+lNUwftZMyp%m4Pm z&-IxCR)%OSLs5yQ2Uae^v8xXlnNaNB2w-96<@Vyfk_qQ zaxb*9Z~7@Y->e{gwH4@y!)lgSQmj=?z-gxtkom-`PA3dLwTw0QQ<;rxf2Nw3^X1$3-ytVT_TF0PN_XosL01E8@BWO~M#65t?z1{;6VNW9V z7ee^LPp+K5Z==8u7wd*24a@V~ln>a<@=In1sNTP<0kG13pkV;;j+q~r`u4wzN8Pp$ zOa|K=qrHHY{r8n(1N%N91emA~gC79X(oiNb(1)C2qQN6X(hqn3h{snjV2({&H_^?4 z8HiH%v;9*-v1!z(xc`W%I8VG60GJTqXu@o(fi-i!5g1Rm&B#ZM-1z~JB2RZ7)H-L+ zEjovSLwyyQ;>g&RN%EAL%nqtj_unpYWRz9|mtcb0!(k;^kkEDDZ<$J7Z{=^&JD;YAr-oqA?M6)#(qu*E&1zDV6z}r~w z{?kC-`!Da@!w)?I8w5&r9t`ypb5#-=Ao&}SPk)wt>4sGPX{Cx|VrXJB^AQe54 z^&(uU3+M?tZQ6(w+8{tRr(;mLH`u8uF5z~J3+6!{AI=i?l$XzN71M*!2liy=k7$et zt;c|XlbvhyFwraJZNr(+Fv!LQse7(^tND59$#WTiv=^dvnlM6uTrYeQww2k;AuvLv zRr0z}0|C0pUIH-`@=`WSWu8iOLSy^(C%(ktpeU{z$e@M0f;T(jf)Y&l9;ZJoiL|WV z7F_IsC^0Km!f-*(-|F;kQ_Kf0ziYD8{#CHS(guUhVrBKLT*|~OzWupYv=u$3Jwem% zx;3C9LDkVcUxy<>@F@*j5$9a+eOq0_BkZJN6m%fE*+Y$i7Zp8eCxb^b<-QyhUslwO zlXQbBh)HjzxQUga-$h1^n?B*vWz8zL7=4i>6lcWA_WywmAY&s;m1yP%EXD=8agkkH z`@YKLsKOec3f+tfEk)l<+n*WdR)$SiPI0J@|2v>ON_Aqvpa{8pWo1mPMA4$!);KZE z9IAC2-{_XPw*M=CvGK*8B@)uhaOosBM&ze=V?B8DFhygg`ahJndN-excEg+1hgj=C5L7ek1J zzE+%3+Qxsp`P}GCM$y-JLJCS{#YWAZ+LVDl3MCGj3&(NOe z`w_DZ>lir3mAJkOd42}I8T1iFD_M%pMK+3oq%{ksJzX^xRYoeN4>wRZ=^v!sSf|KH zOev>e5RcxS>>KRtn6>aOpi)lFH1Xzc6{=u&QMWMPj=|(e7wZ0&ax`BQXc~sXkN)@J zw}=K-ruU29D0UW+b!&QnCj+i+xKBUj^F&O#LN<)Jpa6XIK4w*_&^~(}&re#5n^$CK zs;C9fCdu$+MG-1G6j7KxQ9M%DU@uzqBQ=dJ)LPTo%3ec2V25XDsS@l!in+ zV`c7-|69OWU>d!onp6IXa>2E}N@f7dKFgOhb@%D`-h+Br#u9?vVC!E9gF?x;Wr8C2 z1C?sk*|^@mUXJPbjXDJY$dl10yOd4^zj$q%w9oRqJLaBQ*u#w%{^PknZq8BN8Mb~h zSoFM$`ISy?C7wV~+%V?=uL9jD^UcF*DkNR8z%1(^xD*IO=;Hx^e#UWJAF)+2fDfjD z5TG!?1$h*hU?+&1D%&oD+E&TV7^-f8?*?sVj0}rpARZbE<4Z{-aIf%1S>~fsOdNJ+ zC5m*aIE5?0ifRMa&;U4t7ZepTVuW01e^Famj~*(R`;Y?lGt8p|_gI^#98E5@M5zhX zC5ZhVz6dnboRlAk%)Bq`0H^yXSLOz`q*mYsLh6r4L;j=}n<|S;Y5ArXeQELXDPvjG zi)y>&?lliQV57hb1%u``W7_6^DEtcL0peT#5Os%o~Kha{TWRSF|Lg za(PclA``1dr&4E*)(K`a*KKLf`yrO+Y*Df&n zLeGlB(B{%dbl2YXKj`LQB>6&cOi zpE}0zdAD>9jJ=RZ+6T|d4S^FvuIXO(BXUivtUF%&MXTjhFqQ33+La1gux_Rrmrh9t za)}D_TH{nOeRYlPQ7?(iZ;b!ic=IT|7(8uW&Hfsc$)lHqIbE<;+^!v==sN2YCy=gG z5^TM!aN%5m=@`ebc|W)eubXpYVm}eSmpi5SUt6qQ{pRsP7M`Sp^5sP{f7R}<5C8s4 zNmF5Pc*nk7W6iEzooQWQ{qJ;L9$p@J`4e~0f#aezxA&hm|96r4%_4A6ZGOd*`F~J` zB~ejLCLYy8mg^`r)X#2Gt0*B8`KJQdz(7^3C{dQJ^>63_V_`H|Zi@W*9tCzggJI+a z&5FX$1d;nmDM#MB&B&lsAOwdafOSBqi=Ujkez*c4Tox#B#?Yrr0jwC1ak0dPB$3#} zW-$8$08?2IkC0qpcJ+6>spDwB>plt&fjDhZp4Sy!?gdCGzqh3HM1~lCDZ>WV(IhA` zN$~ZfG3`Or<~t$K;(s_u4*+&{V~`ny<#pC$*n(1rolMXJiCLxmQ9S@evp|-t#k)WA zy4I-LG86=YZlZo_p-67W_TiUC8m4~hInGRXzW6o&2sxU{1D9p``+X+2ujZ2J59 zDyPVAK9Sih@cvrs_xB6qO;?W8_TV~ZgN@Xp=pia;W@N(OTk?57S}3j9!;5t_uV=4> z%+t`ff&I(C$2}Tqbd+6B7EtYF0SXE+s%aRu{$2lPhaf#Qn>U|XLTs!rg@H38?+Fm? zzzFwJPvBBl0<^AcSx5lCh^7J_tc>R$ zm?7cnklg+2>bX~8adj}-IH340%JTY9ilUB5zIi6!A7DZqQzcn22yM39v`1@2v_BWa zBlE8W&h;W59<$ov5Eu%YzNR&l^V8>>-UC1 z#wsZWh7rm$sr8FuOba-3GE|@gM!YJS=W#{G6QT*=@niBA;530gPJo~CH){27heAB3 zOwZRN2Oyh8&kYRd0|adAc0uBRmfBl@je7t%1~EN%@UTrg)cj7U`_~) z>yZSIMu;v1vNr-WA0I5FdKZ)%RpSOUn;?X#(dgn7iO9IVFb65D2BN^1DO;o(*t^IP zmCjqygBT^FwZW_`a0Cb-?CLLB1$)BxCFyNoM}iFKf=mL#5qQUsPxqOfyv{)!p6g(y zv~5}-16cs~7A z2>|)^`@jHh)EK)Y&8xvrSE)D)j;3koc*|c7THK}v@2kS;-7KAfy3-{2T;1V|GYPSv zztpnTHekk#0N+&h`Cc^y3gj6~I`L%%e_B&j_Gf!xq;sGCL zUD#BX{n;fi1y9b;S{begy=ZV>+4TZH=`&}h-fA(v0rek?O-s6Yii z(CC)<2QpeZN8sjPozGq4Q|LRqIJ`@wB1iZwK%@it>$49?x)4mY>*f&Po!Hg=Q1^h= zrunw5I}qB<1~N5`8@RPwDWDS-qvQZ%t4#N7|A3Y!JCJE1P_oA^weCmJx`!x0z%#-e z3Bs9!e{Ju7m9}x@!C(+o+yO`ZUZYOFbUMSxm zEKjGlGQK(b?99H5s1#D4wfhf=Gl~fN(j~-kL1lpp>P7$0ckzO=`k33c?5ZXHk3|Vd z4G`v8&C(WNR!v6_jHI9}(W`rC4KU|mMt0S}ve5V(o~qAf_%i?9In>FCKIDRE1OoAW z&hwWqi5m~U^1Xil`}Wjx@oEWN0eflGGZ6gbiar?~o=hgP;0#0KD}q$&Rr91c{r5LO zE8^o3cgLC)Tpg~DDotG_JC`0HZIA%$Fm8ztO`qw!OafvTzci;Q z4)^W%h9N!Ao4~*#4-akxJ4hYpR3W?T%^+s?Hnc>mjLCr35}QBj-axXI?3PfMxkoLa z(^`NHU|Mc!7}lyi(7vNO2n)a!)PX0R%o@8aJC=+|*;tN!q`V-~D#T2=CEkdRSi&TRLTc zK41M_%N|Hb6!#bU%4xlo{Qf%@YJE?hI(3g~=sQ%s0LV84&HHSQG9)5Wf-{k0$r+bh<`(ZpK4qDOPxdA~ z8cAJ10$|4XU-<>f1#sov%f5m0Mo34JYCL$#`AR>f1Ul?Q)na)$WsE9bH?#6ksGPO? zB8?ESU}nyOqQ$&>}FxfvVukdiM`U z)HJ6UcA_e+=Ok6Tv#hE;RPIAjnN!KwL+>Zv6&AOw4dsla79e;8K(u4T`3xAH*#nGL zz}4kB{NYpsNU1cr01pfvO3?M_X%`7#V5wE>?k>{4Kng7HOQQN z(!xiYW*CAvr`pi@qxZ^xjrIww?3K^9Ut_>C4j$8u!Ci^u>0$;F`avP(S(Y=q|xT>&w%z@&-C|eI^FS=QSx2`Jzdo3$S&VxcrB!s;Ypq`VzS|1 zzXNJSC40O1GOV4iLtTzLGh)DL%?lINT7X{Wc$+5RmY9Zi;(T_vA3mPi+XQ_lEKtR( zi2_@~mZqzt60K@hSb%1nfZ|>2Sk-b?{?rrTaoMrm2tqVv05xMAfQLz)#?tBm0L*t= zZD1{$E(L{Jn_cF?HK@hO#1+E_w9V7V0PI??C2xLykZ}zK__VVFqwWjf?Sk$|- zMR+{_72Aga;H<=evW0`Y_YXyQ9_H+Y7+x^#@WDTs07MerVfQ!_4BRMmVLaME#a6be?VumHKv+ z`<64|)8t=lQw>s!o?v=;Z7c79-vD0#ePS(`xN5pi%N@hjEOQnm_oqp+jC#NYb1-wz zh&O0(9ep}jOKpBS_;QrHpWDH+cj*GGyyUaM=2Wm|g@j`*wSxW&#H#)gPWCaXH52XG z+nPgJ5k51(KKB(xywFA^igpyirPPz4)qpL|Z7$WrBH>MX>v(56}^a*+T#%=e1U@+JKsg9Ak zoNpv(2>|YX7y1aNRS(mWQA^VaGg5Fh_?XZUitYV)&}AHbYQ@ zXC8;nu!~vN|AB_TDBu?CrF@nfEHDHrfip`(&$ya&&}^siwBkM#Gr1uko~#lKZON4g zaRoO^h>rbw_$gDMiv@@ImUBROMLrRRm4QV~{Vm1Ja{9RLVvdOCO!38e(Dxck?{FZb zkZ0l}r4Y&vl$p`6dY{-rAoISgxn34C)DMy+;}ici*QcXVpdKFjr1~eTo^3lBqH;vF z=VMDCuR(T$m;CCt{$kFFovmYmnT}Fz)UeG;1P5B1TpFrb&&81ajQie}7UU`p)<>D? zZvQ~cyi4oe6i|-aIlDGY|MQbY`PjSZ7gc!6uJ>&LtS(Fbyfm@NspyKeG$XOJP;m!!Sc6c zfyNtSC%<88+x0y8xuy*)<{0~Ua5pPr*ylTFtV5@tu!WDqFLPuJ0{ooHrvoy{l9xLp zlgKLRoF*7O)dpG`zM|GBTe~*YQ{IJ&D|8R&Z%~1liyPhZ)@2|lj?5HrHxEEgtZdoP zZ7wfl5)xzSvy&1FLY3mpeUzLs#PGKs8QeE;aQrPdNZG=@Byp#;*fIq@?A#@_hZ{t* zMo`Fs+X<9SL6KyDM{Vm0rbEj3d=)fxqMH65Uu>1=`#2zj&VWS7<*BR6ypfI6XRet7 zR&DTUiAMgJrV%79y$wHPWE58w6tqT5=>`$DhJ0Kwn;xDTIkm9u{4NQF4O>Z`O=egx z_0s9ZkZ&%a;pRnB)q`v>6qN0sN~WC zgcs-4HjycaNlYCTczsXvT-k9zMxjSps{8#y)Wn)W3A*?^{SK{8$ z*$svIt_~~lso2{M5ZPH5vf9*BE>zr?QPwMqk-)~HMg!~bRV>CX`HR~1+?3%|+M=Eh z;sz2flUWvH)_xI2ifw!$Z7)ewC#<8$1UKx|_{D$sSO;Z2Wj(~C5Hz=E=7SMaatRBE zDIS))Xq>Lilpp;L-&a(c7bd^_dlW)4i(3)XUI-3?ey5e1U&fCacd~D8mz~ zG^SacSH&&{J+3fJjI=+XD51&QW`5XK_!*%*1r!!QN$i(uu@6$%e2x(LuSG`bCg7;` z)mHpSdF(GH^?X>Vm-4eWf2FJtRg-JsU2r`BZyl<87Ek1X069p$HcP4IB7%`os1U6dqPv**hM=&paxU4GE3p)&@p zgRsa;=^hEKG@&51*Z%C=oTko_r^C8<~4xmdltX+4_Dg=ga3NfXof6 z8%;RTTfbon-D#*lo_db}cGiKmI0T#{lXvLY&@@K{lA$hksrOqv7m-u=R1+WlBPPwE zAN<+@`3g2Lph@yuU9YWK6-}XjF_^dvd!k^Z@rnQYDQV5}MN(YJ!wn`Fv811lnF&sE z=d6frqw{^3AFCe#V$LG5bw0erTws=dIfEUEx9no1@hz|ruiZ+wn^|>DGzASn1Qll$ zQ(p+R8E;4D^PWvUutHRe4d=Lf#;6da zq7iD@xDfb4qgh=uT`vo|tkfHbqDoW+z75M(F!?gd#OlU;n}j$~>6$Gj$_?FoFll9h znb@;7mdBIhI*PIC0ncT=L2203Q(bT9i?U7vF`e7xx$bQ}xn#Wh_59p=kxEK4<&MRs z2Ppa>k8;VMHt%B>PMC~~F)@8xFx16#DUMH%aK}PK;E+m!i~H%OX#%4ak1py!fjkbf zq-6^fgpqQ}7Tj#=LFO8b_h*hfPHj9k%Z!@jTU+L_OpTD)*aOPhY!%y6?l-3=Cf(yc z|7cTN(Y;)k%%oW&}gr!1LgxM|{cbW&iwzi&skW=a52pekbySb>S8f1vE zGMkz4rR!O=U)I$$Nz1ksT*0U(Zh&A>Y1L1EhdS2zT}5j)S~ifLx!Bx52E&Z-8Eyq- z*-&EoWfH?g-;+jhjx7x@n}sAEOr>rLf3l$FV!a>iy=v(1UaqI^c~N-L|BXnY+k7Wh zWi+i}VD;-BB~N`#gtcXq6u>tHYee^Mx8q^WRWIaZk~fyU9zCfM77^uR@H{n2*7HM@c3S>;i1^~8jLp~B9>BYxV zPGb?H=y)-E?EMV9BDi8wxEbo?#~yEBTCq!WbDqW%8_@%@T`mo+-4B99i#Z9V4gT;c zXT-TBF!xL&dWsU{QHROR>TL53M8zi;WCD-L zEFcR9s&odIq77#-OH<#$a5*!9O9v55=Q__Ca`ZE4Ir|ffSWFQj`vdHug*{J6!vPk; z58}=#4K>3741GHEig)MK)v;{8wTR}9T(T!d?b@PA(KBnzQ-b}n(JJqfl1GTa zrq5B zeB2Ke%XND6X8z#JJt?U~x^NcNmo{M+@!eYVE9Gtc#(lc*um?qq<^o&Eo!T__^f{kQ zq~p3-UvhiN<2%!5K%N4xMUUUk5Vq2}U=nKi#&`b!!&0)r`Uz!3poz3wWe%4!G!TX4 zJCh&#IiZm572iG3=)#?}`RGgmYG_QSFX#?9ks+>?iBdZ43Dw5zBH`((_Y~733E#a< zx{wu`bCx*}w>2cT#sr)Sv=88R1gPevMZ=r+qI1?C<(+No^Wm`dr^W5+(OJ zo;14>e@y53F_7w7ajJ!cc#GsRWj^t6ds<}Y-Zk4_&iR^l>kN+o;APP^hjtG4N-k-$ z_x_czBJ{AuI_2*LJ~{=ATVeWQ2c)AMvY#?5gopM3mx@PYBVO@8d^{FweqE<6B8rmO zVNO$$tjO~9`dbgOt4=&*vorO_T`g15?S3-{-ItTrCH3^^`PAmt!^0&|v8}lD`-7D< zn{2?XqKxp{dj{M(Yxi&6x;|8tlU85r{G_%Zo2Qz#z;?dQ{o9rfaDB+`;B84@Wv!&nr_M8KXCV}t-X$7OKJ0ND`MJTi06e~pHm`qjT z==X&f$pvy!Ozyj;0l09@N3>_57dAiv@OcM*-MQg(0TPY^EHZ4bGh(39k|_ehc_Mp%0V^gUDcx{ zXr)7ZjvOluXFrz0;IsZ+x^OS|x2K4z%a(LlVBXR5JQDV0H#R z&OXljUT9b^IbEly*DrN_L5T*x8$tTQ_$Q8cAPRMHDT#RQC5a=;T`8T1eUarj+V|RB zBav|R9)ml7$NK#(YdN~**P8ldvN&kpP5SmNrOvw=7xllHco$`sHKo1}_lB766Vdx3 zL4-|U6P{;lM+T?iz7!L2E^?oqto5?`GM)HEJy z;_8YP>&ojLg|zGp2#&zMwTeH0vJ^iXx+DL#Xmyn|H#$?%(o(M_=i*Ee;%dSbO_J&x zi&UmYzE&dlT@FF6*!jp)^-Ncj=HV8q5aN3JqO|ifcOx^A_d1=vH}7cz6nT-Kz~@^Q zo|4AkX%@D=)sVo3np+DNTalA>K)8WV^It+ie|j7&>doQjq?!oKg;X*7eE=mFd^af0 zEW_Wx9>X}MXUH(s61nzmg+~J0j-wwqUZ+HyIzM2 zlU&~hrVrBcRE;pg76bM$+X4~N`&3N4=$bp)14&sg>Ny^-)dk4XI9Prvoquf)6@=WX z{Az-J!Mo&g`ov7}Z3<#~Zkv|*R8N2S*$zbyn}gnmQIDBQ32t#t zkh=)bx?SnsmnI4PT;EvGeBR1@+t-i+=Yo%j&bQfBqj^`BPE!2=jP_1Ao^fKsZYTdd z*n?wo?I=>5e_B?w4W|RvJ=WycRktjcg8LwAk;R8)L;kr^x8{;PL#;$>?E)JT9ge7NWeC3BLaQeo~C)N9jy@e3240j9 z^7x!b3$p}!3Yu&^8Bb)xClw#zl9kar8tVxiC{R#G`=XLUK=k;!0aX@6zB<5&MTt2rw}s3Q~>4=G_ZqdBNqV>`Ym#A4&pN z0MvKQGR9e8xP6GP*!6Vs5C^G{xpe>42e7ftH`-SwdWREpD8&iU4TVB5eV-b? z-RypY-;+9P(9@{Rg0y}W zn<{*VqOF>FNutf+jL-d%=MI>ZX|+2dgLP(4VzY1^SuXO448z&z7^h{#9W;KJx9(vW z7YCtXqHR{U+Wdf!JG>>vhp2vM;+ctgOIL*Rn=x_)?bBseMJB$i@Q;KR3}03iAW?|n z5}kDz^s&msb1ZLWXy7cGu&pOTm+PRH4JU%f9favCm-?k2i&3!4e#8AN03l&gzl-pNJ~ZivQY;cPsbR3tY?gS^UQ3 z&Wk2m;w-1PRQe~GJJt^eduma1{o)hUh_`-gOKWNfIWO|d_Uod;w==wV?D1HHvUBx_oAnfU%l7^andjFhQ@obV>jHS-BnDg z`T7%NhL;ePJk!V^1Fg6wGk4slPnPosL!rgaGGq&$YcHomnT}K#vFC$vs{*oPz{9bVu;|fbVVET-SupmlU)AD8t zGsPI}c;HZ(Ax4?iJ2LA z_-PxJx0p5vE?ZC~@l@DWea`={LB@~}3<^ibsxV0AsX-QL-)6R2)EQs7RWXUyglLg`~xAV_MD);!f>|NL0{8@Hc<1WGxi=-C;CPg{~7 ziAgq6l=Ju2+%X*?flv407zw8-N;pd}cXDWxS?!k%?#u6PLjtnqYk zEzu%mHRUjqb#IHdWMp9!+}F0&ym}(pfhSl73GG|*$6-g9^lQI2-9IgBMbN9ayDcNs z(>;a{W>R4>Mcr&12Hc4HsYyeXZHV@#B z2?nNA6Ggbz`WWk%WvrnH>E{h{iI=|x7P2%XT3bICqajQsnspgIxjHw$d7^edk(OY# zFz?vqDr`K;_QGW`IM;x}RaKF12m?Lo=wJo6fj0S`IuZLDhAJuG>|kC$A$`jc+1$EA ztn$R*0jAu6rcXh*7CG7-9W7d&1TY@S#RA8S6hQ1^Rr+#Ty%G0TS!# zE`8BZR)a@h|5~ychnQ!NKSORQkIBkn{${N3A|{rZorHTbh1c_Vi#V?dy(CB1EBT7H zT_J~m$m)_MlD3A2XL+J3zD+s~M_&Hf^`tQLemnOJjrP@fzYL!C)X9piD&Yqx*K83Z zHl8&(v7kYYDZ|q8Oqs`&#^YL{rOxR~F$zj}&=1I*9>2}S1fL}s;0rwS`a6;__BTZf z@cEScvf;#3atbo60@=!D?VL24bUfBpCfLbs-i(iYz47Y?r*H4wJ?yagK5_Jnh6{E~ z_T0VS2a6e#`pC~?TCz0>Gq*s7#QDyo=8MUXEaeTZ z(z__qfKsP6z%0N3Ollwg;BafgL&VuMpRMcuEgpOn3p0`;x{Wgpn`6lLsIit@6=9M# zaelt$^Q)yaqdG*B2kB#q-sh?C?A!%5+rcV5ywmP1lH=h18uVaEAa5^@JAYYd8}%=8FLuipcOT`ZA%_#HmQjsw$9A_9uN zHkKcHHfusponunH{OynWRiT2jzdFS#V`TOmj(jXwacy^mEQ>!LG0rGE12pis>yK5) zN779?pi_bgA_92?Q8#FnZG?Pqv1x921id|PKt>03r0O?uY4bg<3y^0^xWvV9geCMx zo$I)su}{lV@iTrlRjlCoz1*mu^>JZHphC@|d71t@FWomp81n(FjU&biYcQ*Tq}8p{skT|&&Bd1nw6y62#+AGS`KAH1 zA|D9_RlcAGTiAdWNsyQxD@jg~Nsxu8ST-3K=i0*tR$Dr{#_uentySeXWatqiXD1CVO^zR!-jlrT)BmKJrxS!zz*oE;t*vmLvtYL4yX!2@PO43Vm9ny)5 z$6L5mg;+@JFZ_oUgIyR*y8J>&`l4fPLSgc2Lhm$sUwL4~Y}89-3LYwa|6bfQ;upHHn8arVIr|{L({J2W1;+#4+nvB@;7csH z|2m`gM$k6%B{DzlK*j_^g>`5{ z_y3KZyh7(x!TyyZ;~>Zq_*~JwRNHb}32a)sjf!c?>B1Rk?A* z|48!JkJJcq^Ohv;c{>vo=m&kZ`i~ii^T`#=y;ry#CcyEw<**K6E^IDgv3f|HRwSzU$+D3LuKwL2i&0_PA2^nvq=}nKq=K`{Fd)urd6gD83FR`N z?8(QC$(&pkxWVq<*MqtJr`e_ld*!4xJza~fgf&H(%Lo6oftX7eD#m`G=zGcTU2gp4 zd9EF>mGa4jcHbxmzr@Jc@v+745$X{1xSDBKoVA&9=PdJMB^Q(Y_kPqXP6i1d1cj4v zx#&#RcE?#uJk<499Q^iqF#r3_qwrf+_j0-I3lW`+i!L!+oF-ZKqmg~^#E;#~!T{<8 zMcre2EBcwsQf)>(me2Zk>P&z=@UMOPyC~0ek&_JwA4kjL`zkEjEn08xn!zB;b7GpH zB$Yxvm*8m!jWtVc;hh^NhL8*JoC7+BFs-PTELisy4fp#4%cTGAw(8(BF2Je$dZ9y~ z%)MEbPtU~4_$p0iHf;kX;!_m}^yvWZHdI_tjZdUZGLx>=^^qdxnfJ&0D{X$-aVeJ>4HZ<<&XMZevzjm>ht!tIw=VSKeF-cG$r% z5IBUkbq9wF?SrR_ROcv>`ndihtoE$R7IB!T;P)9U8n4VWa22MUEOlJEZ-|uVU9yGm zzC~7soiK=qZ#hpluf>)1EvxJ_N|87dB8g^8oHnPkhuG_pXiQ%}`{OOw5 zJ14CwK{n+Oa^AoS8f&%s>PIONy?hx$RYw1@YI4$CN>D*LoZB&s!egy1iKBs<$9v~7 z`^M&0rc5?)D1<3A36d9Wqe!UjpA`P=70O@($b>%<6juT%Z4sgAL3}J9=3G;*VWN0R zd1O9*`qZO8dA^M%=Bo#mberpngf~C2B@8^E5m>@_H1g!L>1b6`vRMwX-ES61|#|SV3j1NX2l;5MiI)%B;4YuM26RvEL zg@r+N$2-WL{ay;2v}=DK0yx}%qq+cmWCJF#tRUxDe1~DIP_x7aB!~H;49|-7g$jpD zA^0D}1j4Ln{rj}2@nHteG%Gv?RN-!(c59DZZ2t`inF3kdFpwIHa{of+-m$W6 zA|`syR|ZyPK%wTpT|LeF;Z70IlmZzeTSq&fze&N+K}K%DO6b@tnXV&Q*{-l4eIe1< z8A0x{EJPax8+<>S#=pZx_MyejKL7inV8Pc(YHYCq(VN)Tvf5|CrROG#G7-pSARgs5 ztmDMx&`$=#_O`+V*_lW?W0zN8h)p)2yTVrc^(>`DRsO@DmR7&^7J$Bp2sJ!3f|>?G zi8@1Z{F$51|Lk^b7ln%ju`8!FK|@pP1l`Z#jf{}{uLV>jfBR=%E+fhiWokXc>ZS!G zmC5|T)8V<@cBJ4kpsHOWPk^~fU<7(VZQIkcF_veOKy^EohyLLRFX+Ofr75Rb{VKRaZ&bO$pz`a)<9mm$7i(~Hrc&57KxFy9eHMSk!ot8h`Eca zOZbf9J7x)9GJ|Vgt7ip?+U6ewj7_9i9el9d%djNT1qb^ za$3$x)Npoj^*tsue5x(m3u>=KVzv{Z)-K#ReKpahT5R{*wxg|FCA1Yv6hllr7bDCR z2r50wRVp9+h|ndS!cAqUan#dpm-G<)4n0gO7j>Ym<9DEL;QtB=@U%EiO4aE=4dF#i#E zeU!tM&H24Ytpq#tR3A3@nJG$^YCo!r?pEa^5NaAH!`Yd@V`A(4 zx3A6g`J>j1>J-HT7oCn2{KP^ueK%)$!VFfJ z6{iCkE{fM{_X^);eE%RKK|5hAGh^n@XH>$*>T9(Tj;S(Yb+)>=*pimU$vQcB*9xE< zmQPUy3U&~&3-JRkr|usA*Hk@&tVh55JB+~$);~{I6L=_|snUw?YCt8Hb@&e9?Bk)|`y^ zb~nAkXqipAp>R6+nS5j-yQLo(O%&<+;cJ)>czSDj~iAiILVo1dTf8gcq^Vs3hu~ z*g*q0=GKj^K30K}rL&L1Sv0D{^;NeCOL$N-RB|kw125jvc%H1z1u#e*tv!W3VSW{1os z#ydk7TdO~Y;i3#@dwwxchheF?YlLN*?qmu0b`EBuZ|69?>@=jOrfG}{eEp}5hLqWi zx0nTn_oEk^f@Ru>>g5lXEt~5^N`=7>%JolwIeCc?A;WX*N`%jK7P5F%+J`|EE*k|L zH-EjuW7K%?VbVP%&!Ku|Md_kwlpL2CP*}n$uWf7tXj*qucFCUY%(B*tRKGvntT^|} zJO6)7on=^5YrMse9#pzJrMnvjID|@vAT22k(l~>JBFxZT(ujf}-Hnpcjg;t+(%q={ z-RQl~{R{%`+56r9SnIdiVw3fUFK~=8rN!xKc7Zak3gAmJt2ozx@*&SQ*saEF2HwD3 z!)Fo~pAkf3X`Pq`%D);?nFEQ%jK2PA$z{eGBRkt--22^Ja<^aHX|%4yizO4Ouiviz z;cu1z_vmR8Xt*CE4bJLff=PTy+Yl9pc7@YnQb&6oo4&f^Bm)y30K>fkzCD7Um#12u z9<-OMGwAx-wcvx52*s~4J2Y<0ix@BG%#-e~VgU{&W+$s2Skkv31rK_~r8+s#DFkFmR{hWdt$* zo&9t7pE~HVx_kp_4?pkkR~%B{5b#RVz0v;2qxYjoQr>dB{OGuKt#$9D;$mbM!F^s_ zbB(F~&V=j*VJ_Hfe9HscS$STz`$SJ@zIQ!I4~U$ZQSN|H%Wvv3_O+2MZ_+YmxgSQ@~HU86%*)FjqV`lhk#1GlsQ(Y>%L z$iu-#Rz0NSTs)%u;t8g%etG4wOQ@0HhoaId8^)K`W0(o@A~m1^vr|k+CygKSNIWzA zRKa9>k3YTk{85)nnvc=K%)xZcdcB0_!Ka;uOC+cOYUBfeAsZb(Q{Ab2|8=W7+vr0R zt}h;rbIH;s^vy(_->?@YG+n^3S5jWljWDeklgJ=Vt7GqRwe$H^XENJ)M1sf4TE9B& zc%xy=|5mHb8HVF~EAlEYl+|JhtDapZA)6M`2+3bdNyaz@)E5rckGOx26p(XaPRS-} zRloL21FIA#hI>U8RjzuFh|B7H`S|v$_Oo?Q#eRZU&gL(siN!# z-)a+FOcd7tluzQzsR6S0-zakI_8AYy3AdM&#o%N|rcyz|8q9w35Tb;BtNPQQiXAW9 zZP1NVOYP+q6Q-At3Ecfs`RjxyiN^T(2Q=S-h+qoppD2uTurwE4_h4{-K@zP6 z#e{!U+_v19kpjHD=9GNSqEfI#xaEgrK5R?GkfKSAvkqxh_pS!EK^sggk-xY;&~~oI z;Tn`d`U=>mWKPd1Ut_4hxzC~Hv~YFHQs3w)=EIs-mFg?=cvyOT|UhnL#ZSAjzd5u<>)Q_atRK&h#^ol z3L#Vm(vmLKaiCfck|qnv`fN?Rf$&#UjNC7Y{4P*!LY@VnY$8#pvK?#(8PjwiM0U0O zNpC!aeQ|@#wg67k%}<~XlCSwXq!|2IeSfo*!v#ftehXt0#I1rZs;-^5>+>ep+`gijih(N(P4>tHYRA$ITmd^l-$OZEAoXTNq&a$GH9MnvC)l(-sF zphG@9K?Z`Sz@n84EMFBJJ?S(64tM1B9z}>L)eC``@##Q}G|?Hg5BQ%b0uxFH*uhh@ z6xn4V*dVT(AVU`D0^F9O#F0MRv-e`cq_P8lAtbiSJFFTY>aN66r0`;+9DvY@h(7>S z=)3|}Gms1e1aNVcnd0Rw3G78&=5q({ZoY_uqmfu zqd`3paT)Daxebp8MnWt|gRlZxm`HEJ6i99Z3#QTvTl(ygBL?x8M+yi?qPe~sdTx0Q zG(Fp;ha3^`);)!nhxto5wCPntQry6bEDf3LdIP^FMcj_g1g27agnXVbxCJu4SjMsO zRphC+CjvjCl1_i2>85sL?Pu&X7z#i$lynfk&euAC-LHeUZk|{Ug9{|jWHKa^c=cgo zT;AU5xpugdpTvm`%U%Na(hG&Ur(fHFzK(op(jABef{B>#cSV@&>a; zM!98WyZd)C$oLexY~HdOzAdpYGOa`PR>0JlC9>67Q2T~NmB@o~KI8~HAa$FuH^4C|p9#x>0H#NpWmgBug_ z^|!H;G9vB8^*WkaV~c*oOEEK(yLuo;`bkx|hNz0licyzioFCl`0 zca^~M?G3*Y)O~3<0i4t8JLHTa6@iHWd(V5!J7!5;^b{~IHo@<_<8gKsLERU|086m+ zB4?z~gwkh1n})=!*sjaBB%?cLPS1f;$L>aZViyOWYXW{D>z>5xO- z+W*85Jk00UWmH}BN9D*Tpo36YF3bv!l<=VLgJ}*}xM|ZXL3$PQC?k@d9w=92$j#N|jd|4tR)DU8bSBxj; zFp|Sx?E#op_wm?`@zxMV?PSK^z<(8mnBW!(%LS|o9f^Omdc&813W8=1n38ng^hPK& z&pi0rPn;pmeGz)2iZ@1T<30SU(k(mU5Hs}OO)JEX;$ltZFs5wJ5da;BD|A;RoT_Dj zYM#+22QA-8Ltscj=?1_pU5&Kj7UxhUn01GbTzMBL+$!+rUi5T#g(In`eofrN?TPvc zkQx1!K(p=Tm`axI{JycT>b$QichUI%wzUa%?b27m??%PzgIu^OedC3kn^j-u1E1(y z`J6D%6+M4ESs}K`rzf6nFn&VlzjFw#s!d!Q%2tMZ)16am1rVoiD$nz|E+vi<*>yea zmk?D{behyjkm~Bz%%#9Rom3hTBZqq!5%~aBc)^&Ah|+xppvz8`{l%GEW!t4<^-gFb zVaj9X8iRNi?UO`N9S?xdecI*e^1_EeGP|Hg^^ z;W5YMd!HpsHdZ$}3g0 zMe>Ec*T@v*pG~Cl?5LhO%p=N{@_d>qY8P;}^TxwxP};?FJs7mSrvoAkjP zR!aXzBWsX;-S*j@(wa(`hL{*9Y{o{lx}Zq|-@Ik{kWfF_z!5cqov}zm(^@%z<8y9H z&QNsq=A%Jb6R=UAX4ZW_{8?KQ;@Z34K(VkfJa_aVh=T2q^;L~vmi4lzvERWvZG`vj zX6s7rnY01-jKP#<;58GZDJnk985{9jE~ZS;d2p=E4=Sd zXU>5tDk^6ub!~KzB5M!uCIs@KgoS#46E45y_~G*MvTx@@&lX#)&CmM`+5tpn@~XhT z=+*Gj^$5?&{L(l8F*^sME^y39_gsYgzH~1D6waAO?YCbib+`IIfF$k>10BqB;{S3F zHX?`TA4{?AiaS>`Auwl+nK0bjF>N%$Ou5FTby8KX*rR6^);JpGk0d zpXJYjf^O+x`fPux18ArKaE^g&1$OwjL6qtnzx3JnR~^twIz=({tkEa8(Ma)08*rHR zlm-3kI{9HF5TDu;J&2T#iBPOD9d8X z!K{(|s(2vH0v>nr#pXwh*3{KON}IZ_=pFPW5Y(4Zx9N*sKcbb8X8F zqq(1?Nfdw9u?Ju5s$-s3rzb`ftRuJCg5y1XK{xxvXfA7!rb7{U|63`t02l|D%4FAm zL$-AH&l?flA7B1!eMb&3wM5wOFmx&{Q&pOhKo)xiz)b)yMvI5oo7>;o0@HLoAy&W- zszsL)-g#+=5Siuys6=f1_My>8;*vd!zU-9gjE2MZdBmaOOa@Cv+g+q*{82NDCY5_1 zYmm@fDOumFQb(9mBlTJU@o{SE-n}L8zToAs550AcxsX;5d`BICQjnJKc>9eP7#Y7U zOzYTVnG3P2uNBz30`V*|3pifjb7lvv-)Q{V=jRXU7n%FRb#r|aZ8W^Gwxt{sK#`B! z1&eZrBHte@G@_1)`K=PBfj^H&Nvw-n?gfc~WDSu5$5iKzavKfwDAw$1T}AB{P~$*+ zCUsq>J8idiTA;%|mO=yz*D6nd+f2Wj)S$(g&YvJkgus@huDzgKtl`I-2uIkfxLzX2 zZJl;u^-=Fx{=uQC5jm2!4PYTcKymv{@{uPn%s+Tp#EE;E>37iUP_$|v-`9wXSLZNp zTT(mfo}rNqh#i}>w{BOxVJ3?IXU6aKIL7xLk!vF>5VnI6cUs#j@A=aCva;~z0&F|MzzjHX(qyZ zVht(29eCnzLEGw#wG0qp_fr>%Sr>_!6}YX!?fRW%^Dnsawr7LUg+RzIpz&xJDoHf~ z_DQ71=4DFPzx|MmW3l)i#x0_23s;^1tf0GNVrFfC2Ui^EEdom_as)rbMWAXzz7ce! z!Hu2z0V$5C&b2d?2ml2nOm6CotlDHL=2ewDaBJ#+FBT{)O@2f-S=S$1;9G-5_Z^ax z=NGMkJ;Q<(uty=F)J*s8MIe?ZMOn4&N4W+=e)rsfpBD}#la@k*&%k`0BOs%V2ZDyu zg27XiXs$2dTxobZ;tP`?6nh(A6byAmf!|E7Ga}+*{wA+p!{AZYVAV|njuP!R`sn}` z(T0^`>YMK{b6%o&drUH+!#4RWrk?I|`$ z7aVmjd@Ze3kDx>f0?$eNnXx`1gSibg2|!+qau9FQV_?>D(8ul0LI)RFbUJ=8YDoKD07i$!+h zVtO=&E*>C|0ttyvH69UUy5!CTm}B6}UG0^F9^-9c4N5#5@*X=B38dwQ_EgsjP%W>? z{YIn}NnY*L-+=?L);s84QCUXOo>!>_mlxZsyZ|3smIldK^w^Bh>pn*k*@S~v3|DtG z9^uhrW^RKfFJ;xQ;=2ad*6+slN?#SXM;V~eK!XSId782G-q6%U03#HhQ}42Q5Y7Xp zU;Yo}KU~%NJ1whJC)NVShe+2Xz3nDP3Ebt4_>1CRZpaE#EDqoMF0vK@=n=dCzjnq) zo!|=RR`VW_-83>e+UY9V*?$C)-r51?WAM5&zfUTnF_-e$f|#9KJ+)JL#kjPwUV%F; z*wCdzn@RWJ!>jf6=6j0~XC7AdTb2EeN6kiz@DQ>D*P?$%6%!o~rs8<~`lC<_Uv9PD z{N522U9}SbXA4DArSN3D2qj^2t8c32ILwJEoy}~{%@y_G2=wO#l1cKN@V0NjFqsNn zgp9jluC3>`;Isq{T~+;78h}S+TKstCGTep?LXh;%J_Hd;DRk04&S29ulzblo#&FPB z>HpBnuMftmVA290`Ne?%<`M&onH8sW0MG4=kvw?eJ@v0O&>DT;vK+1?)T1b5}afI2hBvlaX0clXF0 zU^F@FD*{~=3+&)CGvHI4DLU7&k%+=I$oS<}KONVEtX~wP4r^-n1VqP=ajsWby!E!`*DVladK%^tHIlDT06AF@0u=@OQ4Gy4 zuk51&k zP=C0o1P`V?+(h%mMkov{IPU;-b5RDPyc7-=0pq!Th8{pXE`I=70s=LFpq_5^>s@ET5 zV-vh#)`=(NG%a`2Nlg#-D@^0pBRRO|6uDB8N~XGmB_#h>bP(_m)9TfayJDEhfRogh zwIRkjKX2=DTq4#d-ZjDftrc zo_bhqW`fAHkG!1bgaKJ_i__Y4!mJIchIm0-s*?U?Z4b+ALVZ2Bosrh?twAvIr0U(8%EKd{&R?$V!CeM)A4j;!&l5&FVay-=%K=F`CbM-XLHkTj<0vmK;0tzdZ){ zpB&Ls-vj|r?(b~G+O!)s2vt8OPT_=C%pQzjxAZvxQeAG~?_Um%+l3p)+D3*C=4xHW zCoTjnKE629sI%Gw*wdc!2Ql=5^LnoVUxMPK$qTG#=)frADZ*0W35(Rh0I6zdap3@; zYd_|8<-s&*884h@ACyDXZSl?E;0}gT!1#sB2>is0o10-8CHQ42i-QMUZvf?S^QgvV zA+`JlECIX{EJDFCY)3sOg8rHSjF6_FUh64L10CDb+1AeP@IkLADHx@U*4e)-6V$c!CVVK2Y>m+XygRsON%5aGBL`h3tHcw7xVuW;<7yF?zc73 z-f9kD-|pYwqr0hs*6omAu1)`=Y(*55#YUL0E6mkHv%P}Y@~fzhUI~Hj6kPn~>_QY;~7Z%2>DDU`yqW86@?so@x-JV#j9c`$Z(rG4g8af5hXJlOm5D$&1 z>y8)!c(2#vW*4JV@1{ZaNUQE!w|flNAh5ep!EUx>^kG*X7(l!xqgz~7d4b7l_Gq#< zJhP9Ci{XPtaSl4SS9s~Uh4UN$Q&LC={^td`2i+FK*jJ@5AqLK>O6Z=@kKmaYT}??= zUv_e-129^b>DH1!2UFfu_-v5*40ujblXEmOr9^#&U%2f{rhsBVJe=#hWa$S~x7aD5 zGzRqGg2W>23RgdRBy0mRBYyBlH#|SxxwZf?ib^9}Nx zQTiY(TK=Is6quND*)^Y&$B8tuo8o>TPo^C@PjGo`we ziS=Tq?c}xq__{j{kqG0kDntTvug9yW09xFtY%^eV)}XB<)gOVtuFVCW;6Cgjbj97n zAQHleI{qh%s>20t*ZFc6u|K(50}?U8N1BxH0Z^O-ndFPEftMzq_)QrA21mzhkL9H| zRH~kDHvuQ;Qp2is&c}+6|K1-l1N}xS%8+@)RKze9qrKr~a25_en6!vO0gpc{)SC=s zll`*>kbU6ZOSB0YqDIv8f+v;+MGa9GFd>jzxSP;MiJN@Ht&&!MM3vrT>dC5 z@)zK2=;s@aun5H`=+Pwp6!B^4M(|FoB7PW?Sisd;YR}1cNx@}gy(U<51QJAu?cbHm z0(54-qn!6Wd#kfS(^u!ifttFKEYlYrN9nGuRHrx4iisR{--zgNR@93|yZ&LS1$dzl zNM}-6St+rO{0R;2mn2KU5WTqPOQ}Odu1PR8q3#LFzmqxtnoNV=kOlgD!6-}*0stGZ z(@>IMTInRF#EOYB(Rr9P=5@cwx?isp*7eAIeUR+AdEvD4``XE!#@e>rq25HLs) z0ig?9I5A$v38?t7{1?1jNS{l_2GCOE@h@9T@*ewF{xwhZo&s@Ei&0za4!D^IMY}id`@h$A8ju$_6qxxhS zX5C#8XK}{)tJ(T;XLrkC9;ZK-4va6Yd@-qSFllngZ%Dlr zflYcpG{*gX^ zHEt-{k~8Jb%0=M-W23XFB>#?uQ-UbPa0)qbDG@}VmBd}5y308&Tu3cfsa9q{Y}og%Ox>QmkYgBwHrD}pw-K4di~_3<!;3SwZ%rhNv2T-gpNHFZmDHYrO@!j^Ld#c2ds<-i$QTTRDzZ^RW(R~L znayEGD5qz~iTDY@&z_`^B(?q}y`Lyzt*Bl`OPj71Vcs$um)78t+V5(U0IT5sA@>-Z zpE6JoRQerB`E-4w5zN%6%SVhncIrO_STfVedRUG|HlJP;xMyMD}wZDjx38 z@TMG>SpX*iv#I+#AUyTc1~_=axjS`f1fKd#|3dykCl=gau@fzlz2B&v)hyON+kVSs zdjOP48G}(A_I|Q#mzwvn;xyEPl}Y$i`&Nh8%M{A>>a@0kTCPSJ z9AD!m%O{;yQ1o`PJ{7`BKHd_jVXd;M3Bj42eGP$D(`gX$RaVTFOwkfRMaPuy#~U%t z`E+y67kg6EMTbZJ^6GH7gFV}ixDl-1qNrYmY`E3k3yPbyvn@jEW{F6uisBwtU4&Rv zMWjo1^=u(;IHNt>4kC`hK~Cy*oP{wOU~Neu&;pbz%5fX+{uY#PG|(hYrlD@Zm)mQ5 zR&)x8ulgNbo`K~n6tL;u08QjzeW6vj=fyGJIw_UlRV?5IIDAvAL%uFen~o4!1pu0^ zedI`rs-U+bxh*K$LoC*ZQvmEak0SK(gftL;3z=I ziLU@$sKhvL9V2s{oK*_Ygb=%}6P5KF%r84vh5&849C+-Z{bFzgf2#!c`&mo30M}^Xl;c5q%46U3D-fS1(fk+(YNj?R^Y&TxaUq^SnS@9Xq$zTS4y7 z&R*RNUvMQcG?4Z(U}TI2gaUlYh_}0DNrbM=xWK3LENq8FZX2WsotPQK+Vbz4G`UbUgxM__v)r^TL1ZE z_0mX#R6Im;fL%hOh6lU2ao0%c({~`30G+6-8Ma*qf_$L~ zC?2@U+}>FZ91B9nznJ(z5L?_Q7JJO-C~l=@7KyarIF(Jmi~DgQi{-HxXtm2CSurt1pyuN6#e$9)jao}?m5_Gf$GsAF7V zR_J5bpmN{v)QW_`q>;>F1OUU^#&cg55lZKfJi5ntUL9iLfY@+&oa)l__h;TW8#xlP z;#Lo5Rt`}LgYjCYJd&ZQ%WpJv(b;-#Z_@bZ!Pas6Oq5_jr20a{=xwY@vtG9Ld9Z%x zlf+4KK6|I@lmYO>ff^vP^D}nr*ug~ogM8m9J@bA;0(@qdeqgVosIC$IbLk#}7P8AR z4D_)m#;Tj_?hxy=I=OeMV*mdih9Il4^K*E7BrJrO3xo-R)62u;fy;-?*`PY7J#4PJ zG^!pD=3(c_ggu+lshDsE@WTvPU;v=Nl_FtT#C=2ec`)2pm0Rn)rt4s(|LfmZ4CFS| z23`vtHbLEm16G`lbbr;3$F3TfyLcRfa)I|{CM%AU^yw7-R27m0F2-vdV*1sU$z;M~ zWdUNMw7>Ss1>7&@_rBdhL4EVerpXOmQwR0UKZOKPa~MBb)P0ZJR54gD;4*bp?zP`O z@_gc2jU>pB%T(P@YMk}AW&s^NJ@q0Ju*`OQmY++j)00t#b&b${z2Y-1za&w|{_s{F?FcdM`5JS0v=K~M3Vq@(m10sb9P zDth{L5msyy;5S{{6|elQbc=Q=@tzzLl7=(2+JHX7$j2&P`Qu_{qI~O zbtSa^E{wQbK|$o%!quL3Pw%z4C$L1E1A8_YD9a2R@6sMlhmI`&R6)y~5`-aY@#c~h zPX9zb5?^PsJqe9MVwC*&d=ZmL7p)N-f$nbbyf!ZppkN|AxYTmeTYi^00*-wdBi}Rk z(XG$eyDgQut%TBTAOESMpqrBK0ao0kV zI0;vCW(*X`NozaVHurQkM;k%i0wKCEc=tzGBrs#iXcd5F{FSZ@Px=E>2i_0$vwuA> zu?!y73T*C`Og4&CE1~h~-V^s9^~dS^|G5T*IV%e*9F|-xPx?AS=c+MOnev6glGV>^ zAOHFKx=b|)EUOA))?s>DqAi&lS-nu{8UhS9JAY(#a-5yvk+|~l|1hfd8DwaKCoi#J z1UvuW?_YN-3ROr%8z~X=N}ExNn6WRBU!Ez^<`xcfiBEO&M!dO+7egHf&|wQ&HeKYk z4^u~DTlXi2JaU*>9cq8a-EqrRT}`*9AEYB<_8UCqd@u%TmDj+5gRq_=WaQS?|DNc2 zPu+cT+@q)rHmB*be^P!6{eF$@T_ItB|L-3nwZEKy?D%PH^P9DD(H;zRiadfjR+^gv zf`+F9sAa5yo_Ao)nvgauPJMyQ2JWVx_}SpSFPE-K=dmj9SltWIYmZF) zPm4@Q=AA!-5BuQyO_Iske{L_eXEwRmkSsti@X48KCH={bUsGPD91RG=V*Y4HQBFU} zLQj((Dl`xs8x1PX?XF{0WDxplnbEc;7Z)t&TcTHP9JYTSV|8zGNU_E*sLLYG+D)O& zra>YZ*v)|LXlVA~9(@{&*GT_6Fh~t|m(-6Um9+aUYPy;_D1yJi1f=G_BJ}GwGRO8- zN9G&%CwwD^v1aqK6GIvq1~3)Z-4cd;`alS#57Yg&`npQ-2fu&z2G0xqe(vpPe>A#9 zNfG+#8$&PFR}DJV4sI28S?BJty|Nz9o4So|h%+rFi)>Z}-~Q*q?af`>c>-Cd7ZZj< zmHN!Glr;i;{|2gJz!&0^(BX9jDDpyh#jl^~TA}Ud-}IEslsnOpQw=A`WWFf0T*7hH z5V`;A^67fXvP3zL-|x~m$T%Um;Q0_y&rbAN9JQ=;@}_pYJ>utT$lAq_hEk2l>eo3J z{WC?TA`mOTB`ckA^-xnnnsx4RmMQG&C@bT?L9N=RFK@dLXykT6<-4%hti8o$w;iVj z%W-CsPtGZ(FCe8h9>nz{V3TKls<`PgQ_s^>jG^wZnM?H0%tT-rZoinD#BV~@nix9y z-l##dl}rBegpS#2A)|}C-GF45t)E%tF$^CTzWHs?dv9^-)GpYLgddY_=rK8;pSAIi z1UTn}-Ph@%sGeXlZpG=%-u+P%MGl`pXTPH@!WbS@bp~aMok_i&&woq`V?-Fy{{QX} zX#(4duO=q8_l8df)vd889*I-$6`$k5jt-9t}8JLruBYgX8T}5wWdaA4u z(*-kU<#&nx3D(9{sXhHjE-6?v=YC&et)_64CS-FirF;8Eb53!NAnh5*0J+dKq78Vx zuO#}!-cmx3o0Sf!BHj;f`DNgGj#QZL{l_hYm2P|_@m|GKY z=cDicSS|;cR2?l$)NHGEe0^*i5+|I}eQ6&$GaknH^hFMO^2X`B83RlXH=~wCL<2TL zK!W~#sA!${{d=Z6U!D1(ljA6y#QFIDWyVt9~;n0-?h0%bL_JzhE zLh=PAqy65m&mlT{x3$cP57#Z$n_mu5$MC3qVJZ6=8d7n{5EmK}B1U=gFI$d%D8751 zZjUO(av#xMgn4N2&Y;ozh}gRVp}dNo@Tck=2+z+!5>F)W&ftGy#-4K6h;?R1!rjdY zX%e@%%ZFmR9~B?AyrrM(@%i_%_a{%X)-jtOtQAJj9~>bu$HX@Hm_B7~fwmn7H>~pK z@{OLCE0PS(Bw3EYD0MJ5Aox0&UJf+(Y4HpmN)}tMCWJN%jfPd3Y&Na*%bi0VjMCSx z--tP5K;@jG^dP^N)=0k6LA~F$Yd9@A>F+FvKvLBiJ1hyKZ>mtU*qNp_3q#i>{?9+W zyOx{eGZ>Lf#vexLps{tA?-R(sQ|-6gE#u7AKK}bYMbQ$`zE;8+c%z3mTcTs=O z*%)w>t!x3l!uj!{p-byUANUP3m0>|*Wglbn#zM7g)sr>2V=jmVSBQ$}(*G1}cY&TQ zP9BcAqQe>E!L4V=7&mrMOE;kMlP08Lk64m}7P-b zDo9F0JW5r1AN%Ybu*Zp&UWj$tNB9Q+9cN|aBc%y9MIzWw>c*OCk5Bv4v%-;}_9s1d7KArmFv(HEP51fi1Pwqsex66F# zoj*c$C=e7|Tdb4izLCzumZD}M1VU(%^*V14!n>}G6#qj;%%iylE@Eo!WS4^4O7s?8{KOLRG0x-`tv zH{Q4YwG>~gj1CvAySlM;AH8{USQ2N~6*tSX1e1e9G0v!2ZV{f&rsUk`3tw{QUL5osM_B2L?ZYK$x4MK2upKbyZ4 zAmEJ#Ccvn65PDHPn2^f(E&Q<$71jB~|5mYp_d2X*^=fY#2K)!P8^m=%??%#i#}()P zUS-HZX~f8t*e#M_zxkxY*%XAfhAXIqrKitz3-rtczxN^-^feKSX0({H&Qo8R(Y77$ ztbw`Dc7!YB%B6wtLW+a$Qby5wg6{AB8&<|X?1T;DIA+b(V6LX(MOE%Hjx&aScSj1q zt0s9;1N;ClQhl_PTWwj5D=HP(st}znRNWpz8)UbBTT5zgF9J$%(DJPkuF(oaaA@qJ znAUM|j*ey;Vb!^D?f?5pEZD{~6Z3N?pn-7Cg7IO+_f@Vt(+$+xE#3R{+b~+U37DeO z@9K~*E_}FwLLn9Vgz_0!1Wol+r`7myE zF@mZf!}rl+*bxeNzYUjqVq(z1HPIeU#%%?7O?^co^LmAo+h71BChtLSd~r@07I)lS ze8$1Y%)9@gG@v%xzsFkVJ(^*&xM~Rd4xN|w8Hi?J0G8jnwm^-P3;#U9+^^*tzd!9W zEXW8&Nj?$;4%@wm=MM@BHPX%H1lYV746^dY?(*3Wu_*(t#A0rVL#n`LAt%c>KBo{J zFtwy|*dPlLy{gbJHKl^KP#m^0zDH0l8y1Qo0DkR+u-=xaoP1mUB|*}4c+B@>vo=Vo zrfjSD89Cy*5l{JzkOwO5F9zQ3C4dz5lha7-OY!W~WIe4p#$I>xW+4q$)Xu7J|WH5R0jsQ8ONgUwAB1UsV9< zUczY~Ilmb#B;}zrr}$y0`qcC>=83B;<2-mniqu%HOL$nG>HO3YZ1w6Yx=yF}QCX{H zQ!S+;zCUc7obUKxL^A-PDzTl!>EPILFq?CpyPSVKSCDcsj3cMPM=U0~%G!QWGlwkT z?0k+;Z<8ulra(Hqy8h#!Y>}#)PeL&BBDI+k2iX(f8|gOmDRXOWa$q~1S)+4-8pI3@ z@>3!&M?l`&UQFN>v#)*U9RhmVO=xU|bYdE<+DpH4ABFsC`%bd=(bZVesI-Z^WqXpV z7J;H_O0Z4X^j!~EyvKy44hGa&8=~w-SW8 zvBYWE81%9V;PUIh@IJeNzS%iFG{E&f52^t;ZJ&eYhoV)GS7cL?eKlGr!t84pa@8Rx|Bv=B%qJvkt!#7+N=r&?HeA7fYZewzP5l8LtRtb9EgzZYVW{DHp9{Q#J zj^l0a=8>1Z=N8#U20jg;&>aD$6m{FoeENPYQbwbdi%&K=^kk0{^-aB%zvSnHL3mo{ znn``M$+ruA!&W~;HE^_Z`>m^)ho5^tEd-bn6Y^Vb8uLkBN^-7-?&j~z#?ZSbKkAi6 zJRCZsp4(#%;j5rp6&K}49TY#bdUh-fav^yN*c5`-Fl5-1Q2gJ7VDssrD>b{CT2dd1 zP{ag*K2~Q>TjF%yZvAXzm|~zp_42@zGUJCzmM?PA=(mS&J3?Gp6zYL9znwSC{_*Kk z2aX0uH?zpkzs<%1PTd>uX#_8aGMPIpht(rHeC1pOxWf5Fc16XnBvhDX+1p@}JOBD6 zdL`ar$=b~A74oT9kIbqOarWNatLF*&0y98TMef3(>(596vq=RBmDMtK$!|t}UC##Kc%V zd)`A8b}B8@9FNH~*Avn%zDr4z@-k3PQuaznvLJ?qf^|!7;Uc~F7S7$(w&!l@)7x?G zI!6IhZh8_sAu1I-I5t}hm)$-Z8BILl^L6pwnHkR33G`JV^i*2zwKjdAxE(7~ z@4cy*9nF9Tg?7@iM0$(3<_Ar`Ovc>>+lc?1#-9a$ek>s42qR}32D2WXbi00*0R8#m ziqbdQ9dc8EnMB_Kw3i`3iKfKA-N#*un?SCKXYj0$<`;aB9{tf8A3uRzBl@`L-`xoO zm(d}bv6qIXHaOh&a&6DN-hKGCfw6r;V5@Y4be^5Fb8ru(U5>X^FQ_Cf_ngL`?HNb^T4Ltvs3NTbrH|-heZm@r5wU+NSYMWa&5v> za%F`ReFTESi6Vc05QbI%cwB*(&7SoNdG%xO_w*Cz5nB2kicvJbI?QVHEU%KoO^vv0 zIqDP60i7`Hmyyw#Ka)W6?zg0L%vS=8i$;WI(#!U@wzqQ+^WO6dZMN|@oQ*6~W8hVg zxUwspzEiT;|6Y}7DlQV9x>Bp8zMrZDx`4&~8v$x2>5LE9K75Z79^fj@VeE5`kyt%f z8P$FDnFX-P_*K4g3G;;^(##kSk+?^A|+haQX1ke;3`HT zb1Lu-@?W5ZU?e%??+(ed*cUoK@fw^OufL$89#~McPCexgyIbBuIX6Ve;a6w&^s^XF zM+WBG@*sV2q73WoGQUr+ethR-WHMk|+uF0^h6%weYojbXdBm%;iMqlWHItTlh2{&b zBk%B5y!Gd{5825zl2@$X?&@nO)4&7WYj@4iFv;!+KL0D3r>NQt($-|>o?d>9Qm-3{ zJ+}sDFbYLDm6%?se11YKc~D|u)bDFmtG@1Rq+^JZn;Ltk@*s`pw8_K==Xb#Rd+mq6 zX)HUp1kum5cB!&{eBmm2B(uvBbi9V@?zXJ7PWWK1#wxESMZj%8>?bSka}{){%=$$i zlbR0SV8<&%TC`~E@jvt!ih46RYi)8;d|UCM+TMw#Ej~fEbu`0xqY7@Td}dU5L@(Q5 zFfn{_a4l;_!#<8}^jtISH3n z=6sEXcRy!YaB7&b-7)g`5nvjq2Y+_9QN>RcP~4|zjXC5S`6B0gp+_63ytT5v9=rVu z4)+^D+UOM~iTT6DXL;LQAi8PX@vglV3w=>&(3ImtWijDs>L>huhEwgef~138laAMA zB#2gD{p83kMl8Dd&gNc3<(3Cm-c!bXT}ge?sr{H5ul=#Tx;v+Mmo>7o`$EYfRSPXl zzK*=NTN9_=(>D{B<~(zRu^oxh-v)m|9tlB&X3F}Ox-4>wNzZHd$BJqx-Op3tF&{DTqGfu5kKJkaf~M^@2s95?@H~D;ynd6d!4sn}@1XZI zG|>~;BO_)M;NwvNn8|4Ip>u11#E8J(=|I0T%f^3P8kN&B?P@l#=EuZFs})T};y0~1 z)nALR93vPM#ZH-`5-sO5mwRF+FS1 zSTQC~0-1@RW`Tv>etqtQhz5&1_js)GjnZp>n!s8!{U6vh@@6`QF>?A#YYh0Tcx^PT z$0M%9f|r(Oj(ORrLL9Cg>0&HoN@{8x8G+OtDY(=Fr7#tG^3wKozaO-_Dt#>W{4ANY zndI%kUleq*j^}d4&0pdCTLf=Dwa6m>K_4r166)>r3SLG_?XoZ8VxFDG4~cHxcmb=vOgQ#q z-uDR2o@s1Pmp)$Mv^@1P>H7SHsx})8okJT!E)&$BI*f>>#1MMwy!^a~nDKOfu;|YC zK6GeEgR9wci2L&MG6gbNwD%UF4qHXJ+&3+l3XD$DIpYqJ@D_z=26Lx~8f}`!$qjTx zl^Mf^pmaF3jXK+yr+3D;r3B9o-`9y4gU{L5geAW;?r}DFxRH7{O9fC&;dH3227Hhx z7_6?xM@lqco~t&-!29R&*CiRBygd&=bx$F|ZpW#;k&k`Kb6=ITs$?THC>j0_{9)JKrms#- z43m@Qm$^N6M zyWiS}84>imLd=B49+ti~L64b+tLf|DaW<|v`7N*{7%I|0;(aI?n>tf|J(;Nbev!fe z_S=DE3eZZr)C%Bbqves>nX^kfe8NkfZr>U_m1u?5WZ&-ePeS2IByYhUEI0zL-^`&q zze-|fUm=C=L)JF`zb5l-JPK(KI8|@*Jv!AElX-RhYZ4wWfH4R+_OBj~jM*;eKn1fK zSAgBZWE9a4T}Id(vZ!|^>3`j-?9-LaRjT-ZKaE9v*`6&#*&a+wKpK5oq{r*AVErEg z3$$BL!s3Inl0Fcgj%9@!6`@*xKp<%LAa)?a{=-`8I zE52YcBxdSjRl;`p=`8DBJo4}K-~C(?th#tw`C}#1J&qedp6>Eh;imoO81m0JC?n_H z_(@f}^(~Hcw$k;Bw=3^@adhcu_>W#{|JhuD`TC}YN@8MxAMR+S0~MmS7*N4@KWGpD zd$+AVNzthT=%`GlIpy`R|f=p>3w;?HCj4$s&3_fT^m31c%XPwHra0nn> zPgHY`3LJBrN2!?0z0&OUMr>^^**&Ur__LZBcVL4T$#84OLIZn~hNpr(&>W_U6z+Wq z{t^O$EK!h|Uc*Jo59BoG0(S%ODnW1o0dL1H6a$bliBW(NOhAQkG8r>)>GU~gkqLD@ zDy{Ex_UF|#f#4w5;ikY8)c@Q8@ZOUl`G%?Y2h2){DGQ9PzDJ2fi({W4D_$2Z}+g_EItP| zn0vaC+Yf&OT|eHtcVy-!tso=C>T;?3QS<9xzz!cacQqh9ynHJPCk*6`uuXv2#{3$F z>Su?8;wbLY`u1x%QM_tUG6+mcW>h8?b>cEGzRAX2jjL~R*B(;D{`gX6UJqOXR#_N$ zmJ-Jky4Lj9(R0N?keCLU?RTI8-|wQZzG}ze$MsxYmdzFd!YBdTfz&-9i0M26EA^!d z!eL;~=jSm=zV!PHWU*8+x8`2SB$pcCmn113E3VG3H1IeD%6NG7HAsBUM; zt;`p4(*IEm*D*JHJr=H8RvVl1334pS6aihdC^q$J%HBsMz@j*~c_UO4IJhO&GCbc{ zOq7|+Mbb(NEhJRo0`x*N_+SM2BT;^&83F=+H0Oij}o$I%~P7F0f zxM?ns_3Dg39>dfgK?Jz3tmhvpk6s9?nSuyxUpaaYYjeWlVly(WZA#2&cfNpE6=TPh-VgOQ6EmmmFkzPC<1 ze)g4YDRdsVNIMq0B9{EcZAqYfWs!9PD;K6y`)%=egjlW~C9DEfv2TTC+$%kN*g-T3$uC`2*_L%^`l z&MP7_RjCK5UktYQ<3eJZuQx`Ki;jxN9L#^B#jke}TDfkI`$?Ici3Js!@BW?lVq>Qr zS7KHz>irL0Zypb2`@WAqMJ2M7ok6l^mt?G=i0ouvvM*VO>{PZ* zEJa&ZWu440w6;Q4^Gj=NrR&>d*$%s@^CSe2pc%aV=oaIG4zgVKGDoHNgqVmEu2uuc z(*RP^S;*XN>tKS!c5c9t*uBXX|1>A8h#}X}zo%Swz!%qm{(7=2yvKYB9ag*J#a0^= zVoOg4<06szX4)5}>$nojTiYR4SCkmzAB72<#J4N$RfVr}sU|5OOm6O8Bn%oetvWcl zHIevy8;)G*yp@g=_U|v!0l0ms8~B(h9ECIrzUZlWS$XtdrU2|}LbvF+#cl~3TK6r# zcrvs+#VnsIIC)-I55RDK4ta-SuV*&5xUR=8@EE3PL`GQwD>?AY%yC?BMR&l*M^XyB zrO2yr@Q=6JD0DpEu0X+L62A_M$SwBkQIrB9w^$9;%wAe={Lkuq2V$TThqQJMQ8@~E zgz~X8=uB`kRdG#GyU6X}6q=atAoM|Dyi4|OobzIZtoMJZ5x7W+8%4^d+z6cxD=ABf z#PvAkm#o^=3`y&ERSeJZa~NZC9bAXA*XMbUZc<4k@JKJM38whCanAApuGGoY%-r(9 zI=$MZVmg`HI`Lo4Cj2h&eG}jfVEMTBojOnp;E&6%^#vqIphE?8Jb~Pmlywsix72Qh zw!&WRwsj&~FJWR&h4amp^NbQ;;vp#^xg`%Ls&-keCw3jePqR7H9{TYU82$e9u>vw9g=rtYcC(7<6bQT}b8Y1AC{eeHu+r|5DppCytuF{I z9+(_r4e-`*N(W$piQ_I6GBgGLJH`Lp{g1x_PynS5K{Sd>Ab*<|pZ}Ig2SUVKws(=Q zyKW%nXgU)oyP=^N=3rpR|8G{wLWFIj|6&CBpcr!DM`u^GW#p zK52xy`C}yI?NN>9b~VP761C?0Jq}RU{{~x6-pl^?H*i+#*CDPU6B4|Mpdj;E*E_oZ zCu;?HO9tv_DcLbk<0zEo93&0lR)qSFl|WqS7uaA!fffNvTwGl6R?VywZU;95_StsC z;16uva$+*g^aq}riKJ5sh~J+bi!E2=airBr`3;zrn*e{#0+j_CU&q;J_!a+#P@B-; zxT*r6^adv_lJ~T@|D&)GIpCYnNhPU+41zJj;XW5Gzu>vk(4u1CbgT#IMGTu%E1AX&RpL1Ses}Wdj=ihOc5=7A5 zS8^k)oE;%=%^E1?!`}+!C1Cr07v9w5SbpISk6 zJI6dI^(5L`A0+~tt*RSQrI4#jKn%f?_cQU*>ISg3LA|TntTP56-EzsMU}QDKY&AT0 z9!QVM0>#km8gn>HA}eEyp`rp$XTJ$mljJ0gK|O0&2*MPXBy(<3F zRhdQ8=&hj+EB*dZ?XEiP$KbC+8#mefZ@xJ{cXNtIRv*uo0H#IMFyW_T+vyLhg^h{D z?_pnkWt68#(wPoAhWYi+rWENN9(*8e;@~Iol@gTN{Ndn7k;3ynp(OlR>9ijuRv;(- z;p`irI!QB{GH#%1Hlc+QUrM736*^s;s*UZY^Y>Y(Lf?$sMKCxvMmxAg=A=<_kMssZ z-|L1VP@gi3U%+I(UTOWjoe;V`N>5v3`0 zos#!DiVXVSrLK?r4X1EFsLr?bLCY5 za~a6b7o(m|hX=8X7Lv$hcTT#GmbDHk^*~Y4*`U!G8>zs(ZUtps`x=nw&{jjPRx-Lm zxlnI>$H~1n!3yPLxSvE{vw_QmK=i)1@N&rWujg3$6U-dCKUrsrL=Z{a3EXY`_R3^a zd7_3Pc2DrcLw6-JKc0pRVV$E<-K zYBi%AGvTU@k3*GjHde+sW?FQ%`9SqKq7LE>L*Y}>NLnhszO9i7$GlMIX{kFt^j(q} z4sLgzL#Bo*6GKN#l5UMe`1T^GZ+)#lOLbqUX?(!qkhnQ8x*gZ)7drC`HqqPwh<#t` zo!#}KiWi3;rw{ffS( zS^C~sgD^BPWKQo+!op#DoAjT$R1RO)DLb>WCE3@r-~3S?F6k3eeA+r}?^Abo<9?Nh z%eTALsa0N|UqLx5AIKf~`vc8j)TdOs{Z~G+hdLEo)7KvPLGy94p>*sk=EKug8cU+i z`RrS12a{Fh&(h}Sv5&NA>wgpuAzdC~ug`y2O1&Lu)C){$dhO*9VJgg*Sfo=pTq|By zY!yfyjaBvLeckMEYel!s5I7^&$*6dWCj86N$pPlQ=0)3_9dx8}N6*uTsuJ&*)WVx%Y2P$*}2Xc7BKkOYI;4Y3__Qw2a>%aG#PClu1?Z!$<1X7H>*2Qx zZ~jTc(3Wsde!6XI+Vs+^_IucmBD|Fl(^+Y;&YS#V0UF6(l!hF897(>gFb26`^sSbT zkVztU5M8R{C(TIf)Nz2b($LU;DknSNiMq25VQO z1&J<4;QkLE%7p`vP}O)&7nXR@$o=NItJ$SQjxEN)#@5)yg`9xIcNPQN+tc6k!4HEZHO>x{igL5Wh-QG@0f;xtU`d}Cms)!@Nb>5aZ znZl{xzCGpiJ8dxyC9U^VdRlaic}>Vi1CsE8{4+UIai(L2yGMjna$15mzwPTM0>RzA zpJfLNSuU@$?xd~`k|>LPB#$XNnUXFbE8r=%`CUvXlU@0Fa3bw*&o`Pg!;w$%)#5&C zivBO$PuAm{1ImPbhzLYCqT%kaJGNe`ArA+CxzHq2cwM{2j2|KL_o$O4IR@2-+u_(*%@fZp6s1kEd2eF4xz4P zwevj7ciST?Vd6NpizN0i7t6+er6P}A6qE2No?v$9nxH6zb!)J{(VX-#swQE+V>=Rj zOYFr`QE~NLQYB7qP#LLScdxNxq{OT%KQ>7HRmz~5!%8_CNbp+w8|LPYj#Lb!mUn@~ z;ypzU^k8^yOeWh*5M`*1R0h3=S_1hr9(P@}>|pI|2N|85?lD#E8#Oq({APNV6}-LZ z=%^{aDVm23C_iNivWDb$NG5?5Y(^!J zFM7|JFkJ?yLe4`*y1>qk5iII2OxfK}iCQO2;s63&@ygWkW3bV(ye|`bkW)o@$6L3D zBYp3yKrR=E8#C0=V^k7PPDjfE?&GkgK9sA&RArm1sXeVCZA^E-r7zS;{zu06D+7)GwH zm67Y1`KKrtFxBax)fsaR>QW>7;*AO@XWWNl#+|JP);$BedX9kJPtw0C5IW>{7ld|; z$+!?!O+qhx8loUgu#84+{3`6cn)`+nqqq;aH9(bRslFeB@dL(_b%- z!+;9ouwnk63=AA@|Ez>&saK~kn}p8dr%Byu`Q<_p^(gZSBQ3eGXjvGU9BkL5|7rim zjCCt1H65ESap`ZPl;^uw(3JyWqFruh-+b#u?P5`4$C8qQ{k2PwdzIP(T6^?0q>y2Uimrt!)ZLytxg7=x3X0h~F@-tVzDQiU6H1#qozcd< zi2M{$^D=e55|XBp4oXy-7F3vZ+#Tr9?~-;Mnk9q`6|6vklVodzOeCXZD}av~a5DTM zO@HfbYO^Lv=C?~oZd_~j(WDX0HeYo%=309DE%>FeDn;d&!jk5vatM!)fB!`N`1$!q z0*58(jD_F9q}gGk`Y(n**!EOZ@NA~!9Sn82%0`-J4gF-myiU0?Vo<1=9_PjI#MTp-F+O2qVb8E1_ak= zP%v`Ya#3kYf?K^B5}R+mF$GJBJP(NVR0aud^5niXBvodY=~>pb@sMYgZ#ah#fUXEs zrj1n_8LWKAvV$OYys&w<=zYgXIfC9aY` zOLny4lCy-V%4l^R!(R!fc`7OL%yNV20IjXE>@xzYw;H$Y30qx;6*)Sh_9(S(n|Nd5 z@77$|S?WN4txx392VOUU_2>kQ3DOq`N5GTrx$*Dj%9ZhcnvI%%`Q6ygVG9Wy%W>)( zAbOPevznddJlky71D2t;IPHY@qqmr^CsJk<-=44{AOhwx0O%Q|BA5h)evFIm`!%xx zzTu0XaP`OT+cT1RKoel=@JAIuYkBjokw9o>2h|kVnZ1EJsw{v%+v2z=XAgYhyz^zW({6+5KeR?74$?F4i^9M`Nemd01#phRc8MLS_Tm8uO;A*Of9~G6Qy`3 zxdpVK1>Z5;V3Lw>DneXwNfkA5c)w?fQ(+kV_^fF4NPpaek8%8gqbGp07xrBsZ-8t2 zlA)+tDrrmI+=DhyeDbWOHyQVIrkS zQZPZbG8%wraY$4}U_m*6*X0%VaH_8)eVMi?xl}UY{Sb?ex?4EO-y8b*p&ZbwxRUFwshYB?86N)TL-T3i zV$$_~_OeU#o2WvFvjQ+c_Cn~Cmwx&CN5I1YS_oCPnd}=8$TKR3CgT#WK%>O7X~Mi@rko+egp~wRFn?rYj02M|E*m_ zyl?ZT!Z%=$Oq0HCdm{1=Y5%*3Trru-gYI!P$5=3!={*>Xz7g!B7%L04@|Uk{fuS9~ zfhQqee#{dIZbT*MH{;|w(_xjY721K*Rm;F6k#}GWy*x_g(X9c5RgT$iNMDk(UH`SV zROgK6C6~+)<|&(xj-oyAoWqF#&ojdzx8xql1j^@kOVZ8FMEz8G#$j7kHZPDFYt{~q{U0Yby^-b=n-X`If3u7!jga%&%PIud!QgtQhWW+gAU1YPnY0n;wVxh)^+(Sf$67YIXyDHET?X*5>YY+Pn>T_k|`>AT9B7%OZ zRpI%YV}!#!0n1)89)TMu|EJGuk^ZuoZ^aQ>$H3q$P%b}5l>JgqGQMJ#gv7!`eGj_& zae!k>69YS+-l_{uqgXgTh=f6HJ;BgP(G6zaT}~@EZ3Ko>}! zR?*b#(TwHzi&u5lFU`A_y|b_|YpROic(T&}>1reM?oGkap4B-v*{`Qk4-2jw5Yake z($gBb*gfYuT+}`S=_PMaW*FsY^+bJe=cx9$peuKlvBtHK_%!@bPT+ z4&ai+dry82fCUgCk*;t(ElVS>M$p_(o z){zW0j&lK==@kHqXCtJmgp`aw33D*A>u@w^O)TLa>KThYj9w9aK}7EQ+cpq8&P&uW%=)sxR@0Rbu5!RwMn&mmq(R ztAq`Oj0|)=C!h?aG25+*U@( zy4m-+b$Vh6?nVk*e+OnvIIAs?!FoB^!jekt8;p3tH6n~Lz1 zC!BG$`*OhUHIO^w%yq~|zg@8;86Dh6RitNm@XC1ZAWN-H&x`hxiE2~nFOS&uxlyae z*;os^0qL$Vi(F4fLKCRi5s7!mBc%jh z?kXckja5wh{Wk}s!}=6NGj^hYoFM#+76JFyhpEgj#sM|@SAUJ)x`+7*rl>}dB6jC{ zc)rcIrBCpa{kmge5^D5B+xt7qcK(u~U10y;K{?Wr-)5TaacV8AvD|^w*RknOW_}d7 zf11N|?HA#1T;``=_K);vAS0e}Lp?=)k8dNDmZ&ylI1zy^pNKF99L^)Vd^x<|?16HJ z1z(9P+m|qY8zJbhlIDo622pRd{6)W;iX0)@ex$^ez^1RlEUR|-7LTFR60I# zGF_i3bA)yih~b&6KV9j5|Jr-%7@#(Kg>u=8Luk88kyp#EkiPL>u=ex)}8gPbWU0+`iCG( zDjE+$TKdcT$cY(P#EuG*f3xx3%J=lLkb1fGG~&wC3#_->m%Y@z&zA=U7txasjZF{^ zrklMff1y%dA0URAk_jV*C*I;xU7D*K|LBWS`Jo`L6vgkUNj4(Rsyd)Ua04iOcZTc* z-`&kmi)|mmBxeyt*S)&`{3iZ#W#?=&?FtgoHR=(+M6^OG+Uq)g>00WzV7uVGdzB1Y zz2~nAOL9JfzN7wCMzXiA=hJ&d@xn1W8@}l)s-Dy@?<>#xG<fN3b%bGi%m&XRwb@0{ zIBmEbEA!g@sGnbmdgU4ZzT#Do6iMW1OTPN=37Q#O{*YF~rI#9cpAm9$l51K*e!{T1 zuWwM7c9%V}9@J)&9aV@>3(xG9J;3_bW}@C|c=|8kyVx38?%C03%6Gf!M2$`_2?huU|uyP|%WbbUkhQT}a>0=1+NtK*~{=Q0L@3~6mqx`)hsIXMuhe+wm z89ei`d`2hu)a+cs5Kd~f=ETmBH2)m60)c^=p;{ML!6n1zo0az9N+h(6BeIvC@Xp=- ztTrCt!{pXOBw(|q)wxdQL3j!xJWs3uwom%|$abeXQaUDtw#O|P*9xB6b% za#~lXxP_i}R}&#hbP+RIS^sDxPMgTbf83$K4GUtz=-6oNP({u3+ndWPSgW4fk*)Fa z)j0(@gX&rZ3d49>+`Dh>WU48> z9|@r&RHg1+o@1c1QdE4MO6oGyZZ^;JsZV5z$GBYMHP1aZWqXB8y4ox9Oms)262HE> z&x7A<*A8M^H1-*&Eu7%@yRx!c8$Zs!7|t2uZGzCzi+YZ&NHe$n8Lyd+i8YuXU$17l z8%fl3X7G|^<#im*R0~`U`U)x)?3O+_cj*tghO=hrQeoan^5P)pz^jzVy+5S2u&3Y8 zOdI7!6rL3lZN%6U2ddGdvLd*@preUCdP)W8cQUEC(wIp_LehsB552oT7!2&~0gWE3&ICz9?D31CeX zoSSxO4KLNU2ol&LmooQhzp0R8aU=X|?=_#f!9z{xoWM7-D7kFL&8Kr?WpNK!Zq|+J zIts`)_i=Ld^R~E_{dU!gyFG<>bTHc}XK_}p@E0*8FOXM2oXfj9zkky)rDT)V^OAdZ0QKrkq(kx z^)xfg9qb+mNqR3ZC!tSDEz^TB509O@+yLU(+&>gf-EoR;XcbQphB zoGYGqP{4oo%ypl?>uFE&dolE1L)#oPaat!e|JTh5``pK0nI5#N$A1-Bu3^-#N#(3j zn~;8euU$sVbN%bi9F3CxEkv8{1oTK`(FMvFh?QGmU*1p@HSOr9e+DLu+BAr|?Mx5( zORlx#N5}`s9^$Q#gmY29*j^$?#GnZmsZt@yyC}cQ9wO9K8xjRr)){8S_Lrn9}K8;}@=@pV6`BqpI%9Y?$Cl z1t#Ft+~EH4_xD|QGhA>__oqDYwq8A0oVLAkI*~TXMfaer9TuXJAt;KKw)2+!&wS1PZ4`5%I z^lQkAn$dU%fsZq(dhc|5Z{U?=g5sX2$n z#nz>8q%Iwlx5F-7G_x1fM!m6ABk>fA{E}Cc8(4kZ**Ld0TtYBq27{!2pts(FRt?_iT!P1qBA>7s!CX;#kR(g z*6!_*?p=4>wbhB}oS+L{Fb?*7IZ<{i%t((b$}gZ-TtK?);`8M-IqY&;3?!-54W4I} zF)J>PN#v3O*Cnu*f!WewI9FJ%wQG|+LBo^{`qOmM;f1Zcx^^LQM7VD}Zp$Rw4qFOt zJo=@Cg{e!arBhu~ppzy(@6rO&K5?cS`HO9Cv3Jn%$P8V5Ayanrd9##iAeGx-C-;K4 zH$oC4(P>F)EFH^>Ryiye|IGqtSJ3LabR-PZN!Ae>zO_AK9{d7&-Yz+&Zwe4kmnLUe>B6~bJN^=^8Dwyh6olQ6ohesY1IyUp%4W5#3% zsn(yCoC-gQ1o5xaYg{F}M~URz66fF0&+7Bn3d@UE?(gOX=3bV`%NR~l?2O>uiz~ov zW92_PyNJ$Q_hy+EFEMiDO66M1*<3nlj5gW0{@)W*AyMg9WY1^iSYpu3EuSVxycZX% zbuo@ZrG%lZ+kQ*oza^3qxcj&zwL-XW6eWn9|33>{2X!QnkwTH6RwT-_9FI&zE?E9= z4EF4F-xS;&90r*EfxlOawmn`3`k`4K= zdpCS7W&z0Mc_us6{P3u5xk|5H1>AXuX1o?7j>M`afMCnYeZ1m6SIOeO9m!2Mj=ieB zpEQ~X;spGA?}G$vZW@xsG0TtjRh)VH@cS03-Owfsw2I%&j2bTYPenlD5-_g?pv-;T z{>{Y#T!NUPMzzWuy%!~)i-Ge%^^DJkewj&=12~6{HT(Pe&WBJtbVo6BIiPuKlu5Q0 z-t+UVe7y0!<%_B0*Zlx5q`!dW$0otd8J)%tUmRa;4?b@0zKYHNzPh&mdBjH_u9lY| zM+G4vkBGiaU_gq>Qi0q*z{{w+r&a4IYZ46(%!odCk#gVhA=?!MPA0E1LS&MYmkAu$ z_P3m0O#yrXIt3ESTH^p~opFHg*A!hHcO3v)FUTL??LM6TSqLC5`CGqM={TN~B;vlH zOs^}=9dZe~NR%S*vYI$a;2swqREFImzgNjSl-fJLk4J$bD)N_F#cowPsv~Y!Uc=<3 zDjlyD+n7v1{1Zv87k`R1yT6$m$KmbWQ^MvjZHzr`QlQ?;R^HWQw~FLy9j;d9D=E4a z*X1agtFp(FZ}o$PeV}TmLyA^7;3w}F`>E;bZHgCevZTI+p2j`b;&Lmlb35zc6-SDW z1|5lXxvOF9nT}2`L0DRc12}uAAk?kMTWU$0mA46iY>yMvr)@%;FxHzRK0jV7mWy=W zdpbt82I6V}kmygqiDD>EHO(GS_^W|3@%MDVD4)Wyf4j5NP8JGaVH2tc{^o|$P*&&- zK95;wQB8?7W32#tVs&Urk-$%ElJ>9djPdT_7Cy3c{nN=4* z${iMbp7IJ7kfBYwKQB1Y=jgC`+AVNA*nC;Yw_H!fpJ@8qS>I}>t`oAOZpiR(UP-%1i9uk+JC*cZ|H|(_SCg0K2ksPS@DLN z5`BlMaQhjs^s&jd@hU(Wx80WtmZJP<>`vxLIuzg7DT!e;ki$a8n%!Aj0AJq+06?zH zodva5$CalC;c^ZQL7o-5roN+m&9;9@95D;6;dhP?i1CP4hQ1(4ln^(3B9ojBsNSg* zdoSLeI{P$lmrgYIfC!%Tbk=*TbKLVi(H-?=E9Y<(>}zt_ra3bI+5Ww4MCCSxcR|-^ zM+j5CXq7s|Wi^&XGb6pU1TJ-dT7(}$;NZDExO8K#z(!$G>;Y-D#XGLKMouEW0DtA= z%XSF9d}!wQRY=g>*en3Y5W*Iu?W$6%zHgfO>1hp zQjfoes39^nVc}0inv*H#{+pFbj)a6VUOJ*#K04~=FUp56Ka5LxYLfcCQ1>@jMowcj zP;Xka9%sKk912-{O880d?1feSjPqvrw}MqcdmnJvdcLOaVe2+q&2N(+&IG-!a@qjF zimKc%v)X+!!R4UH49D3=O#uD$VaLute|&tmBEE0J6Hif6zC)xXecrRxOr~`ojQvmV zb2;9x6&W60xqPq_mXj?O339eKh)aIkk3^}P&Cv*wp@8s7wXSuuhEriROWfiMGlI97wOOdOO zv!D+OsxMTR4>ZgzCeMW{8TCUM76P=aQf&J8whSRXU2RIotF7NVS>Ydio;#B8j#^}! zPhp}Yi&5gjbSyJj{@CzN1Rba6uR~fkxK06-w7+ig&hND=GUcnR@Xqp6rFBIurWJ-; zc~-fJM^+f!+DJpqLAb|yVg4j2IY~_@YyM+zXz}^}W=g|Jdw|#CyO4Xwp~fRSI)<2^ z5t|<$I4jwGYYXtHO?cUg6a7x{yEhm2LP_zY)yDJ+@uPq3rSOVO?26 zXL!c%-|sPp^!)iEYvoFG3*K2$1#u$MakuRdOXPlE8-8RMrJP8?S*2fTJ@Mu5 z9)H97$D&Q(c2I-ntLy#iGGt#pRS6&Gh*cPW$>3ZwVDuZWVLyASr|xd7xUgtd?dsXz z;o(d&zTXYhh=24<{(fk#-p|MUGSDdN+AHNen!F%XYTej3L!kyZo<2le&K5Jye z=}Kr6zP2Hol<5yl5E*aqE98m`jLt^`t!CFmvuNC_S3bVuj1w z-1>{MN2)bBzRjpUPFBkF8f&&whbiS)4EAz&1O#3aSL30ui@XZIs^WN0ovMZg^PKjZ ztfb5DIJH+`O{pT@ulOW5y{wevv~$9{=MyU1u1;*}}=+B0(O$o*Ky0AX!V8EX;C7kjseV zEk+`epL>9wWNYMlHWNH?cKs&4Ou4A7x-H#&7)DhQJ;P=84xPcTmFj8oj-@H`Jd_0y zPVh~(5O$m3k!Y3})OE9&7OrV=?&WytjGia&&qGd5Xw`1eXq{HfqL~RA_FO7r*`GET z?HABtNB8fs`!-ZK0u~1VwP+OcGnlrrzo^;F1V*b5jf)d9sp9?&%EvXsL!ZIqXKs4K z+a>yY^G75w-9v(9RmjNmKuevGLQ~Tgrd?OLi&o}N8YuGfPF4Fa-X|s`zQ&@k^o-7| zjwLooGudw6Rr88arVV6kzZa=^wDO3WnH2m}ZV zrh1d!uS^sGDtoS{LN)$j6xVShG@L8}a)3cpLkUnP83TE9aEJp=pwEM@4fy+>d>GDGW5O{aMkJ;rExV@^$@o^4C$mIK42KeP`>(U({=%FQ&Ti9oWkOsy0TbRBH1dt!Ov=dHpK&7Q!_!2* zwGRQnUMOC!7neV{njfU;3*^GLKxRRiG-;*0uU!L?4=NY9QsHPE-JtT%*uLxA9yUz>XTpQR0@SW)(Z=IOB(R2RPR_5!lj`22eD%)j@5lYzDIJ zCNP@Q;{&zz8*J`Ca6FgaZ1HtfIxcGh<*Pmdh9xShxu9OK8n8zufjuBjCa4lnRrzxF zih+(1O5?+ye&B9J;ejhod`S#wf}^zKc{qV>M>KGFPHIgDI@?uElj%4UnGhz|_M0f2 zCvyX_Dx%Cwi)j}aWG!FZor|p~HIyF8i3?0|pq5msgw)IcI!O?B_GfqeYz5*et7JYD)$4!VzfRBkQH|9HP}=12X@ z%4~$#UB_!A$&u+W^fLstY!)~o6vsf4<)I5zwY47zm;4&t?l9hOt7x?}u>R;rZHd=*6DV4nsH7i; zrR;p_V&u-R%DLT!YZ%Y)lPnZUAQIJrk*A|Y!!)J%JRPK_`Ekv``%{mTH2*db(gXcj zyVxUWjmw5-M+Z1u>$$?{|64;G+k0>11XvACX3o$IJ&_*6IShjHSg|vpJ1J6LZ&ml4 z{%Ax4@7$70Wp$Y%Bf(+jM7KZ{ZMJa7&feD4gFd&0TPsh~8ewghDu04s*FnrtP=Li# z+Y8|)npwIbqAu_bgk`$RyDP^fsi$>mTsw4uvN`9W28QKS1Xvhp9wy(09IUzB>3=xz4_MwKxq3Wo!czr zOO0gAKSw1&(s>_uG zG$jw~8LOgcN|&h$cq)rk2*5Au00qPGPKq;tBZGt0p6h3VWoaM_wbM;& zCd%9@yf>e`Y-bsueSiiI>162*QFPXp0A89E4b{*HX3r;9Qr)j7%)E!XDq1opg+rD&-* zPCg-j2XiF4>}r3}d3#xkGIoslEF3xBNfZeS@w)R;kv--g-QS(>w1b22<+SkSBzqHt zlB%+qQntGg@9}RbBh?G!Pce(w*>H5{&^vd>Rf-7<(^hJ$idkdpxVSpNKUNkQsFzpv zt|O=Gygx6GJov1fe%>!QEOhcdOv&UW*EBzx_DD2C0fA0wjn~0m{FqA^%BF%T21}U* z3vohzOKn<#R|d(;{HkEV3-G!n3)M2`;38$vc_QJO6OD&GI*D^x#=`FZhd|R^4e3U8 zo1u=hVX{IQ@;gdx+Wp~$!^;<4GsLUlEXtZ1m8!{xW`<+B2%LQYPXb0!J)vW)d-0k zdjyPL;sFw^^Yg2~!gbwxr4fk;W!Lk*=^-gGZfl^#d|Ub|%>Oc8985ZILEs-1uZpJ- z_CGNCaGotBL7W?8Yh~kGF}=uxodA8+e)##gM&^^MAfBjp@pIn@32}=F+Fc&$k%>Wg zZx2#XpAVe*1eShz1VQYg+1(WuErSlhXGpaopM8CP+w1>qZ0I;C)7pMS5z&Op@2aq(n)%8TR)Xg+S{ll9A+jkY$q4TJKOCerVX{M`S| zZ3!^BB0SY+nC)m4mKLqzQ*S4Ti{=u8&<$jk-c`tgypoH+cKH%=DNG>Y)KHotBY!bg z_%1r7r{jE_2y5ETL}N%eNxvVAbhl|QkK9ZYhqg9e9K?wUU7ZP|vs<|4!=-5jMk6FP<8DO8fmt19$3RWA3UnX{NR9{TzJLWt0c)_| z{{$_BVUvo~LP9=-|Gs#DfHBcHvWrb#KsFj+Rl{BO%8rBxboHe!5(g~c_SL2KLRos! z$j7wPB@ie7<-ItCQ;F^p!dYU6WA2Q+C~dSD)}B{xlEos_Ft$nmt?U#a7Xyi+h=WAt z!Ja4s35T?0n_i^ZNWPjHwhm(zH2}Z3Q|_ux=c$AKF7CUzwD+vTe*ov(@W#Ou`iMDl9c$T`b*8gI?v6;(SoX5J5J`-b+9!n7sep$b#Of)~qh< z7Tz_IDsoj(=EBdw2KB++HgSPo@w)%5dm(bMEEezDqOlq@BfukQf>PHg8bXiv2>8}8 z9Cz>sm;ozmxpf7WAFnUrZ5CuBDgb_QzsC@SdjGfZd4pY1fY+@kdg?vSWDxco9ATYd zPMj5vH9tfsYk_&pIEX7!om3Wj8|AQ=3dV)=Arp5kr0Rt`z4~%|GGv%sO~MQugR}cm zp(7+xhjUlEe&cKcDGxVH&nB-D)5Q(n0=sh04(5DD+kyk}Z73~NSUNJRou-dKv`T!t zain^}ntlqfjf*|EXSje;%X~HPdYk~2!E`-ZP*}1Q&ws<+2kPnslhV{x22Aa(Z#JEC zq<>KVtlT$mCpZQMFc#oil}&&DY!Kh=E&Ak_wEN#um^aWhXL+K{ey#naJDSDu*IbKY zNDD5R(tt@Yj1g)8H?Gwv_4h5d^<+!l)cU`n%V2Qqof;7rM>--ABv(CdP9#3}8ZU-U zd>LthOG`W*$Qu3rJ->>Egh(qO#E$VIvV5sd&>va|A;W4K`OpLBnqPpi2quZ9Me_~i zBW*;hBK^OU|9QF$^9=KmcL$ma<0{nZFQ$wYl?~y#81^{Wm@^NlYiO{qLmjf)ReNi0lI7-+x!sZ*Y-6#wijV#iiva ztz|u9e><^4CsnRSJyon-9feLZe+Sn7Or30Vv;2Zq=2E1?4WdFZ6GDOV(zi-S635BH~Zr~I@ z!5^?g^x}JIT3_=0B1q+?0HD)bLWBF#C4B*5An}<}WoAKY!t3>zsaA(<{ui#TK2&)D zDjIguJdOo&B{f>wlQSKkOL2<`0hM&T-|>lq{@&^2*z(vbSLY4Qo3q81=LmC`*fRxZA2+Cf7IM_-|@9Xb=@$D)w>9AaWOWo025E&ofIW`VR zH}-0hdvSmsKLyC)KJ=n4nP6$Sm#a_12yDezVZeASWq)h<@*98P*EJ4+ROc>;TevZx z?0W!0#-zuTqs>OymuAUdU-3k&l(5ZyT>(=dI&sYK-&Z__0hdq=auSFnxlh^Ur#S#6 zrkYE5S9x|bBK!w|Jkt~~1p9Zj!zm`EZ2&q;+1;VAsWb?t%% zac4^ZKES>p)i_{uI}V~=GhEERyB&W6h`nu@OyZ;OfYO-?5OAZ%^el*dfd?2m3oF}T z4eCd#BOc6*{{&QNnC+JShs%y9hdYYOek; zrFy6R;|eV2;Nw(=4rTy7apru#Ws!md5vG8@Sz7CBmv}|ViC1wlM+A`lXK)gR;rh>f z)sbGq7PlnYwO;LCoBFV2J@Nk4Fc;(E;ipoNoECgbT+)?4v>%9|-B=ipn%%xOd?)zt z>GrEBpgi`BB#ru&pFj_mOzo)MPF(N7aoo$X@82I3CkpHvgIBT*Q%tB(A-6n@U3XV? zBPfX2hfANd^h=+exEGI`?2_d#UfmS$DP%3KgMON{FPZ=zWV(Vg**+V3ZUGx7i^$~_ zNv$onYND2YXn%coS)&8>u_8tjv99LLQ@K6<-NE<#IpV$9#}$Jf4K0^1yyNDpysR>a z_;)iYDy{$Me>e{(-ilzB3mxamPc=6^p8UQE9--|w9RmoD;2RHMXEvo4up67x{^fMb zd206WeofU5=yd61VY)rvpLI5MaS1@=x$!yJncUV}KHLOh`h!VOQI|%S3^tuITzJ0r zbvW|}49yF)v7ESOL4lIfmp`LroAJ6Pip0C1)}ga`uf&<{lP3U2@?e~aoqy+Ag0vX% ze*%j;3xIS4N&=-UFl}lkfDN6q^xvJx*oTY3X8ynRhF-}10Vfghy-CNaA^EXv1ybMT zB%4hzk5w<17eFliLMSXt^g2kltBJJ;Rl#~ zYfGTo=({7F!J`~Jx%;EX^KhpBkFocRYAWiwg%v?S2u&0WC3Hlj8X!nFNG}2^h!hc# zARR;@Qlz8w-kUU0x>Th|?;YvV0)#3hfb@JjKF@o<_x`(MFdR5cJjvN-pR?ASbIn=V zEz}@w3)~t2yrFl3mBS}i7K8d~mHHm@$udC6RF7&L1{}N&CM=^50qJ@&H9JWdOsT{G zPc@AxMSE5@;?J%b5`hW028E`N13vGGjYr z&kxN{8mT=a*0dOjbiGWx$Iaw60Xle)CwIn2{u5aE#+nQK3N?{JU*^LDG){d=3t>^} zks`6zquUPh4@d64*+}raauR!N@@B#U@`=jZ=K+Tdt{~V%<6s^DfYv}QYj>C7sKHT- zkaD>B7HtgXwD9Hl>hThxFp%$lnKtyNB=B$>KA+3=C7pLBz*@K)BERTU_?ad8@(7WQ zH})-0K47Xnamlk99ErkfZL&`-Vjm5aVpC*Jx104m@;N2m7|6BzV1A10%7rm3IVlI9 z{nU(too@$PB~JtbsfEDU&3|`iW-sI$g(oq!>cQGs@>k16P;#fBpi<*JN5v2DWEKA4 zGI&lD3i*^5=&Rfu$*x{V0`(=Mg#Lz4S_KV#CMBlp&P#n`2wi&v?vQzH+yfce48CpL zM4@R2XwL5+Z|!L$g07*dP%%S@ylH}KUZ~{pYZ3JZJsuE;gk#S zldqCJU;A02T9#vwI zetwFTtC~Ig^LCY^?|iud>G338&^?8hOsCHlJyhNK^ZUvXC**_`q;NdPmkN0ud`r)P zlc}APP8-d=yo}w7`kq0k1qzw$hy;OaA!O6{=!V2hO=ivQU90OT0LyA_l1*~F_8EBj zSh*wW*#~lXqcH#my=2L+K=qj2OK;B@(@Za!zWwbooc_4Z^5=omgB$Vc)Bz2_rm7k2 zx+?;a7m$U~0nt86d@^JWzz0aTm~7yg@-ugE1J|}f^$ZQ<(QX7@9r~HWOiaX<02Uq3 zt%KYmhFCx=_6i0swTe5WIH@RWL;5eVFG|y);JdWMK4}W)RW9!O*ahNsD3GjxxV9Idfhm#t6bty~Oi4;FPAXRwj-IRuk*f`NVh zyR?RT7hahTHGkMv_{lLkZfSG%xrvpNcbk78&YM*Y-;m{*%`R{PaeQPYdhuxfP%WG~mcHJSFihQ4ZSNq$OjPJ*W(V|Z5_PunEw zBiA0}hfRNeCUs~ZApft1C&3Kg9H{QpeitSFL#g_rE%~Hl`7CPowq0DcJZ`(7kI*?h zwaSUrE$%6!3{`=C1B#mi>Hbm2_f|iLd{^ct;2$`NZy+10Pr_GpeWO?}Ua?tu-G0Or8dxkri2r(7pp&~i*7frCweyJx~1u;l-Kc*iUkQlTi! zu7+UUd%SidpP6__@W)2fS_h1|vCDI3%6s5hdfBE8>Af5CJdw=~PYy_T$du4#v=JGs zT1_=UY>G6wWcmk}PAI)Yt99J`oT-FUqJ;Z66{TFVSkINnkyNXIc|H;zRV#tfxPZsm zOHrVd4|3KYz$igeuV&9HT{!UuJ`ae$r$_2SpA^f`Ew1@AQ(u_qZTQ=jurzpzb6;j& zV&;>}I@Q^KT>o|J*4~vD!+9L_Qqz!e{5Lkq7i!FY6kLH%+Lfo$B!)zNxxB@nQTPoA z;CIkOM_znCF-1~q0 zO9!#x>aSn_eHUl~qVgi;lM!F)erfZ27$uG=i}r>($X*HNgXr0RY~OV?QC*D}$@%&) zu1ea(%^k6HvLvl-V*jtp`*&ag@5|oeWrvBv3y+eGR<0>h&hj*KmBZ76S?X_OAUvoQ z+-mcsb9%8JhW3WxLnki$8oA#WbIZRZQ=9+eQvZE+IuzGHo0K=t#pq-PWi@?G;ZCRd zYYSkib-f7P~;Cc6rzJ7pY489UdD(t-TJ_jeqGNf zN3`z9X;*mnmGMka_x-fxSXlQu%l|n^bl}@dedYg~;pV8PI^yablNb43w|WSbn6KSk ztG$lHTHG?SO5_c(>=bT|v~Thw$7RRz-A+^Zw<`&7QqF*D5N5lrKSN~y6B*7&)r?Nc z@W4@4V?IeYt|d{T!EU)itASP1qTb!!EzLdA>OYGE{#4I!q@L_}13@zLlQRqDe#sfE zm1wHF*^PU)b{55`cPyQ{%sq3fwY#?DD}A_**8l&$XEW?!`{LmVU9Hi6VGCbB@Fg~> z#^<%xMnv%y?;gTsdx|;Jk6ryc%QYnb&!P%=e-t8*bluVO3t^Bbb5DHjIe|61mAN#$ zxLPguk=##-M94?R)M5ji4OAz^K9tXMRt*}b|+IF=U4On^WMKPbK)TvSA-i!+os zM1vzJpFx36>0>k-N7&Kv@$v4fSM4D;?m&Mb*B__SV|&{pXM*8z|MONdL!wZUq<6it zP515XV}3?5Mp=FSYf_Gn^b^!V5uj+?nt< zw?xfRw$>TjcL1vR36Sa?HJamsI%9OvHKtd-o9nkU&-f3T{_pN|Bbkh;fqhZx=rD-8 z`Q`f7eVYDsAQ6}*Sn)QLGSI z+#OHGsga9T@dNb9UGx9YN`wP|wZE}opic(>z%2Aa7?u_+W-luvv>!p}xHUoHHUoB+ z#*SK+n*itO!}`(r)`VhTzvQ%7oLLg@W*%)oa2Si!DEeT-3bdG&1hV!3G~{`!q%ikq zXUF>|BY%?ryT%5Fa5~gg<;tq>$2CH8+xJLu&CpV#l+pr*;Gdu)urNL9(%%5pT$#tF zwW<06{(Kg1EiAxaWLUfGrrH5Iri8AS#-gLVrAzC)(Kov>4%cN=D2$HVCx>ZZrKWdIr-Cd`3zt^D_rWizOS|53n* zoh-%ssr(eaKmN>w#_9D2aoPJkbbL5na70?VC>+%nsvsvOc@52+r20`wQ5 z7n>lU7C?FHNasYb_XX^(rm8S#70y?WO zuVLsm6>SZCf*^R-2FC7%FF>_XX$(v#Rpoc0uFd%6SD6Wtp|g1E?Dswbp?2XLFkwFh zV#w_qPM3siYnI}^fnk|(K*^i-l{#$GG5WFXH-H@Vp@>m`@A$6MHT?#)B_rovF}@I6 z*1NA!bYEr<+axw3kW{Mk-V>nL9LDk^-qwR^I`6E_@tJ8V!H}Rqz}EF(uY)sO!{rC? zlOEchW+S_OBwn-=0-u-b5#9%1_t`{lr{w@wlrVX!8b^CSwp*jKy_Vsn=93E1I#hRW zuyA^N@s#$p{&KNWu(v0Rz0R!PfmQEj52hw&LUP{Vc|zgcMq}6lgM@;5>+c(YF2$H9 zQ7?qt9gL9MC}}PLX6Ag%-jX)s!crg@eG|N>DiwGRtWF=6H=ToE_K3~0ZovaW2?%k{ z(cc5KeJMcFr@->2Deh{63yW)1OL8fubyxLDnoG8$s=d9Q&ol+RuR{BWJVvP-cu(tw zAIbckHV49UGfAF~`5fK7?@pTT01}8#)c!h`T%D$48RlH!oVG4FMG)kVhe`cOFlo95 zHsYb*moHZ<;9+r$3CB_cIkSKglAy2}v&e4#mCUwrv`yFX9(iS-H9 zBv`q4bOlhf*E@AA_@>2!BY%5I1VOoqhC~G*rhLdizXMyPFB(PR=C&iCBS|Jq}fdtXKg&ZGGtdwrgI7+(%$AAmNytmo&Ysr7$22k3-W zbEt2ZaLhZCjavN8-Veu)O=rs?ZIGF;cu7h8g3E4uk`(3EF;p2n?U8uhv)%@){#ZI{WPJ_n@>0@QfIN{uw-$@yyq4OSK z0#RP_#m+nlw7KsU`vA=o%J%H|bzC~W763tb^?R9;1DJ#4+0!=9y)4*-x=>xYd_UhK zI`7_V0lhh+O9EF;8wm3UBZmZtt}8P%GrkbmrmVUzARDwq4H?iUM4BmGDRMix6 zz6+x3hrGn|CS{*aw>w#-^Mh|)n5xvDvBOfXx=K<1}q0*4*s;m@tb(?P53B>?C@?_42&b?2#7w4a%{ZrUsaa$jA))Bc6MWe*9Wo zKUx2`ZYyU#%>7bvz9os31HnaPe~)b~447Cr_0)pp@=}3R0HIPXvnWITRJ*f&OFGaR z@rBIa--COA`=r*qw0(QG-W@4|nhCeRg<$LP zH)vi&Zo|p%tsxPmZGuV40U>HF6$$?+0n{t6P23P|DgQju)xI9s` z-dQ1*_s(}bludp%m%tAiDw!}AvcMri@A!}Tj9y15LqJwk-I?i!qbKtPdTvdtyY+2a4EiqFd@i-zXAcm`8A)PqPJmrz}w&AH0)>AGp#Ztf)Qw- zblG?K7MOhdlo}5%jBJk+FZ^FGJ{gz8iGI&G^rV{=rOb<(m4#}@kos+ZA^1pq{&Gcn zbz<|jLV&`R7E)|8SV>!;F1J<7+KW-P7oF;r^pmr?(zSpPCXP&|WtKwAJYoph)k4hs z?R8#NqO>XN{aEv6V{>L{D$~$NUsvuRiV7m#XbvA;7I6oINJ@u4|5&> zwTxoRXpacsa=BE`po~lkzz|execz56Y51Y~c(9e3$l=gxY5aZj0Hv!C@lk&o%oEO0 zZDdTFFcGi)fZ%PLOEOmQ3@blQyD>xS!jYe!B%-Qb3w~kTE9pJOj`Kj*nT5ibAlm@W z&-Unc%<%3x`s)0#jRRu0rs~V0(UPWxc5z)99wgXYxDH_d|hW?c!{Ex%cjcIN2H z56;k?dlPg+1-^Keei^4bOMAoG+St!wB3P26?{7Af>^?f29?Ie5EYerxTG2;xW!i4C z+I6id)F7Ax^*YTlBsP5CS-`A8w3cSR*-O)^rf<->vnHryK7iauI&haDv;<}+e$D|P zJ}eoh-u_{qwr&4XBWa2?a|5Us#D8DlkmDr3`+8;If&H$vsq?hhvN@B}Rf4Hp2*%1+xkonSfH%rgX4Y_GtjZO&oSDt81uA`o}bIMs*X+yQi zY8xX_*clyo;K4Qh*~4;vv>=F>nQ@Fb(GM)JT!*DctV@5Dd{wP#^O<|Czc}Gu$7Fs# zbV$_h9~o0OTeQ`jLpd%Z#tb1+1;lSPtQ;JxOzSi&0@{3_+k^;+`<(CkGS_TrI0$Ir_ZzyC+Aclew4QDFN6!U7| zbN`g}Q(Q?W$6_x|b zyaNc>>eBO*iH6?ICrdoU_$qsVHje^lBBvFjmBK8Iz6KzRt?gtY3Q|AEWMkzBN)xyy z&%km$R|^GvnLB{2J6;tNipc%g?k!yG>VM}^wQ2ki7`n{U@yrz^mlKE{ZO5+b8CYMk zRPiOocKsa~=dJMbXk&4PiUxgXC4bvLK^35|liR@jXVN->s$ab~e3=X`_F{PqQJ5ot ziI`7DwIF@og)F1>;?mHiR`d#Y2CpA0Wy>GOc9wYP~Gzqpx7m=pKFGF>Y2r@6P4UwVHbOg|0ZUCb0O0Q(wPrT2}6~)JT5d8z8 zx=*LtRy5y2$+`(u?rKWjIVE-X6Cbi8Vn_qJFv{kDRQv-<=urBGfKLDlwI zi_=>ifXx6=!I01b)XZHl;Dx7T`k1Jji2sSGNA=K2{!m#6UpRF%Z7yPInBLlUR^cjK zcjVB*mAV;q{TeiBn$N=EYA78P7Mr${&&>=A2px=2GTPY)%ZMlTR=gCzZc$>DRwwSY$?NgR9^H2&v%o)HTVgkJ>q}-%uQwA#5NcNx%?7(S2KM(+t5+i2 zXlgt!Hq6%URN_d;p>6=5xXw{$$;=dRA^>_T6q$BquvtZKjS~4O5B8dyBx#NJqC$qF zc?f>#bZ$~jn}1bOsdqIIs1y$2!z!SHgX5DtJ}@TwMN0_1N%(8U72?3A;gP0>yA|l} zhqbVNvMMrk>~d=+a48o)J@KMm%omeO+ttmAk`~xNPEPN%G!8$rBx4ReWra!@bihioLJ@(iXjC+E z_e-P1{7NFyK%@ud8T#y;Q(8z-o8}}$Vt#Pk;*d4e5q!B@>UtT2K`&j+b1Z|TDP5Kl zc1~l^e`v~k#Tvy2hLKP9hTy+kv4*^j_by3UI#R$D&7Db-&>NDN=AuJbGY39&AOdeBR)-aKNI#v#e4YL%xN@@QBKge_lwD39R zHNqom89T6-Q%AGM=6B>=Wy99l-1t38WC@al#)Yg>d8Wa>wJQxONInUub?-F|&l{Y^ zvRmDc+zfL=)RqpVfvD5%Mwzs%DRp-tOA2Rm9_r>GqCInWe)Py2kx{BZ&D_t+-c$Xp z0iID6XvvCN*-4>ne&gC^nG^e1tLaJF+<2a&UNvI=)Trn(lS_R*RXq3@QH^VJcR!T8$pA9oC2T&@wT1KL;d_mZN zixPH>;>py;Piee?<7N_;am>YO+{F$k30?a;s5#QPClWU>| zm)jOt8^kO#PE`mGn7aT`1DAq!xVTR~9quZM^6J>zx#~Y+mf07#VeO^^mkh1E{0JO_ zfjhucYFkT-P@L?BT(1(k+^ZSxYIqn5bgLxijfn>MMn>ow3Y>^0q8oE8``i=K|K`^A zoE*b{-LwhazAQT99`NmDS8~&7up+8#o|!L1vEXTC$+EgIXM+?1me1P@BD6D`PU!kjrHZE0kyVvhQrrMXL5w-RlgFAn{L= zM!z2q401RRhp#*06t>+QdjA<-@6v&N6#@4l_EJg|g-v z$hy?)Xyz&NUwGk$D25)NXtA^hVo6l9EEV_y&D&oq*k8DS^ykxF&m|2+A8%%-8Qnoh z?782tzficxGe$y-`dMP32(42hla<~7Svo3ib!K#Ov=tdQcyYSc4FCAuOgMYcNVIhl zI(>qtE0!$h4^VQvXs&d|y`PUd5_y@pkGrgs7Fh6l_@gDo4Xqx0s`WLFxHRcLd(-Ql zWb-)^kI>_Gc8WR-e%vy#KaV@}Fj8{fmxE-&xa-c0{?hJ^3~uRD!c>h_y1Nxt#FlR~ zsGW%YXS;B&D_{h|oaG*FYBnh^`)gMmx~~m)ySrAnHEdwSV#m9N9|!9ji=CA#ApHW` z0jw1bou1}i${{8bNlTsgc4CIt!4aci(XOYNXEyruZY9R4m3S=XL`L`u=L}}HJ#l_! zS{7by-gk~{VS8njuv5U$&&b~6`ji8ra3HaS>xs0NcV?9ZLl2O4UnSl;B1WGWiMbuk zT)=Z$d$aBp6GKFxX7F>ykFD#=6@qJ;S*FDqmInMX^yg3Y;YBpWuR3&vx}GwQ^VZ6Q zUl#vFY<{*uO3a5h&WH^9Y~evkZPO<^kj&r~*PY&OLmFxT&7fpjI%-`0xpOaOAlchh z{x$F@UEce?Jw$5<9Z<;?`N-IpY1WVb7_Z{sxotXJk2T87^R-N1H2FNk6)^M2N9oQ& zy2A8kse}h^5*WPZK%*NXpUNBqN0$$Icy=rSmy^ z+TXvnI3G=N+K^9*<-jKOY1`>;%Pmjm)Mux{QiM+5e!e520%%#cwg{^}pHcuH=TbB==jaGE-Cp`AGzOufA@B7>Ly1s;E4~pZ_QKT7LP?LGFXesAl zvNJp9Zg$d{6<_^eR+-g}Yty_)VXywN56+(n;;!YBd_CpFv!P6mri9XWdGfu1-IcWa zFH=v2u%trd^GOQF0O-wIKoJn{XM&+5fP=^<)dXo?Nk)r@4mWmWA-IoO(lR)IRc5}> z-6IRr+@AQnJ-6Bg@T5u@6V)4vTpp%^NTPcjQl=p$5$s0l$){mwO}hChhOq*GWEuJt zH#L}2cKxMC?C$OE6ED?YzvX-@Zwgg^ZYy)AH01bofL)mBcO-!I*M&lf3GO1pcTgrB z9b9h`UeymdapRVr$!Z*3OQR5q&2+hGvK;SmJndd1o8mMexIb8wA!NVX!_m~c07)PU*AYmF;Fm!jfS~|4qm19A8 zT50a6x^d|Wfin7hYNR7={g13uPjd@E>{1$Xn{kS8nPHl7uQgWZyWZ8;@=D>KWjfIWx-hE4JP@P7c#L63q31xrr+-M#~Ktnlw{6cL#Fnn&j-8 z%d+Sd!t|hpdff@TIz^-E(Em;CxuFNR2DogvfGPRT;(c1jo)dT36t@o?8jfIu!ePnG z#Nu6d_qJ6~H^#$2_MfhoaO?p()G1}sJFr;6%e3lrPfez8&g9`ZH0sPh@}@X(eRjXm zV?7Z+--~UIDbh96a2b`>YtT6RA5fh@$$)yl=uq!f75TPJ?B#Q_2e>vp%5ewUij+C%P!WuC0;!07ktA1to=a_iC#1;4IYXr>MsTv)bHL-Fvg2w*S=?KNUJ58t&?~ptz`T;u($!-23#H^to|2YhLiSfqfu@N z!J8y7+@ZTaL!TZvd`T&M;wSCZ&5?G}3B&l;RlZxRmd2OE_`8y(q?U1?;~|-ECNY<6 z>(qZt)mQx$*bUKKFBaOpS=i5?`FZ=5i*CYf+$bT3smobGoj2@P8M4CsTDvf+x8>+} zS;Fj25at?jVel6ra)l0+J=aFgMjl6BTAs#XVQw#xvueD-$zT89g}tm>Q_K4M@MHx~ zKZDdzs6^*6gvoTAcwNrjXJ24BFf8d=bg+BD)XTAnReu%hZzm@Q-O+caWb7gQ3+;I` zhz2bU7aT5jEv3Dp(sBT}#KH-J@C^{d$rsqu4SHG|QkK^dwjdtLiZH-gVOu%T26U2@ z<+bGrV%CrE^6c;LTg`kUOmq@_h?zuRs7St8z2m&x6JW`O#WDjn%ns-@^9hru2LODD zNAlxl-fc}ZlEQ4B+LYd(oLRnWa=?U72I~J9q>teakho0(d6_kVk^+MGH=5@Sal{0H zti-JQ@Tj4+0D<_h0ePZJ3C|Q5#a_j*0PjA6hSe}$(6}ozm}*Su6oT)Z_+}Z8RJQ>F zyf-5{$`jl3&E4$ktbOS_nD#vDgp48(;#qdK6YfL)$?yv87GTWr< zEXCh_WWhc2I@x7s+3LPQ+L;zeRb+Ylz))yjP0wE=6!_3xp{+cXjlytHG-Taq45G=E{WOPd)R_ zI}Pp?;|%Ia%Of?9rz%R8;1cQD`U2FlbHEl~8;=3L=dnosZ*2Q4(yk8Q`*zb6$=oU@ zU-3)L`&}K{x6^qt?%_(%U$1>FwgU-Zf`KuLOiddAHd6kjwBA%?Z??Vu{dBi`6Y#`U zga}e*U8&_N&5D_qrZY`3zX_9{zQwEuNfmVSd7WaO;ZjX(G{NatTw^c=m{@D!J(c4Z8zIddZ{uR)Lz;S zGZYE)m`GTQ>&Lnbi27(Wg_ex+49o$BOqHR&TkuDL4(EHR$9qu(Z<3X>Wva_#wToSbM8anUYuTfJM`)i`{b~gb!2#kS)*T23n}NW;yAhoO}w$;?1X1 z`<=Y$;{fA(M$jiso`c_n_kCo6t~TFH)jZ;C2auE9z`kAPDUiW#67Cp?hIe}_kwX#T zo0*hDWhT(*1wao}08&Qo*J>Aku|}Qi$Xj4cuF{@b5_0sW7`z~)XZg`gzpKm z*{xn%LfC&_&0R$hI7^6(g3ViCur-99U_H3jZcb>6eaJyXN;>rWVh&{&hvvz_rk?$U z65E(}E17{jk*%ecuo5qtvy^bnMn@i*_5=@YV-%x~;FJQ3)osUuas3VbKd*3d=Cfo6 z5P$%Pgp!0^gajJVJ5Uj(nh8v{*wT*0PjK+#2SuUGJ) zG@slnQ*lZ7_$}3!tb>grSffuGMaIm*1Q9(!A$)WNUYVGt*XJ^twNCnWzUDDqzn3qb zenELmv`FkUy~1?GJE!lTP*Lok*l=mNDF{zK=BOl9;!zN8t|0T;V`;Lje&HB+HovxE zn!^0OC_^?~J1_kLb_VDmjWK~R*a?uO;i<-GE4^_6c=CPBX*HN6Vu}p}J&zIW4H&G7 ziL-6O4oIn-r@oowGv<9led4qJtJ)Ex>$x@zLL3%_#+5hp!XPJl_d-0{4u*nTWVu<| zPr;?7;TdGo4=nA)QuP-t)4y#NG)PJ~zPG)1dt2`1Q@+4;(WNVW)|E@(R;@AS(D$y7 zeXU8X)fD-}zCTT77>EbFMe|`}rtaVV-r1XT@>ob}tXxkSLR~M?-e_oNeRrD$W=H4f zE@?UrJCrL@HcGCpIRf;5p8Eo@mscCJL{GW1$c&JicDwkOA>{VFEWEzikDRnrIu=a4 zv?F%@<6uL3u%WC-gQXgy>a*<{2U7ImeH95R)n<`pxn4&L*iQP~ant#Qwcfk0ZQJp> z*F81bW6y$27w;;2E==gBSQ?S$lj0UFSZpY!+9at`-rC$*r%Opr!ETtcNSsp}Rn^QF znz!Sl)@g0o`kdFgJlUvoU5Fb$0m0E%e&VDS3cVZMMr`f~+?96s>h!8aJ)5uh+;>LX znkug2Z$n*&H)Gl_=gyQK^Kmz}(RAz!a%L2o;3r8^099DPWjY7~db@zZ(YrY-uo#M<84Zr;+5SAMc;GG?-H0OFqx%*LuSdXS;J2-6d+dWKcHjeu^SeScjCT)e#^+q;ORORW zGcJs3X8B$AmJ5glAG}5-wSr|abLYOf^4k>2JjuV3c@sj+;RKPp{}SF9`rYQz^G;3? zC3BV?$Z0#{a-77$Yj;KtO=RT$GXAPvxr3|@4_*$c2_*DhS2THmOxv(X6E0rUskEi$ zEPug)MS1RX<5y>IJhe~!84nqD+RT)qsLse9F?PDMXq4yO?^)+dN`8q z(OT2#6^jeT1eo@OOX2y$n8wWI6-)4hNb~aBpXEH?^Np#Der5k<1DopIPs9ivdU0y( zq_ZAykLj3VnTzJ9vloy3O7=>6j=GKnOj~LKyjt<^s$cHF6dr!*y?APRsLf$?h`$nW z?0mME#IDj^YUy<>dO;+>VBw`t-=iXz4P`Hu=d)JtBrmTibXSF1i{PJ}a!mQdmM8tU zI?as9)G9-reR1)XRM;9=Y18+ka0jg@Ub5@{ZA85?z5!P)412j861sL>Kjcf^$sK43m~wuo_I3Fp>UI=anOd~=t9G=BKCQ0{NN+MyB6v=|ebg|YR#1jU3n z3pLKt0Fm&cU(v`>IX|i_lY2xMDUSn180St$Papr)xwzU8UsC6 z2GtaSP^AMQs<7ZqFi9E--7wmy{_J$IHFNRpYiD3@#q6Zwbm+!X^9-ZtocDJ`Pdn#F z<6g)`EtWjZOG6UEs1XMSsHHEb`P0)kgYwNs7(dj=H=%J;GTsF%gSi!hI9#4c%fYwQ zng<<){mvUXAa_YV4`cRp#)ri!-@c)O{pu*Qackp&Em0$PSFL z9XtOO!z4aEFkk&mYt;WiM{)SCxukG;%*zi&*K90v*u#vjT17bh-XTh7r9N-oU}|&; zyDYe$n^uFLlS5ugUKeRk!qY;WnqtG&S*Jo~X_#T>az~mhMUC09L35MYIt;!3_zUf^ z&XC6bidb6MIZq~<#7EK3hWvaEr80%b;cAYbOEb{Cq+__$-n0eHHJ33)mPP^v3jUGG|4T^Mr z%^5a{a0x68P<-5qc}8;1AA<~MIMKq^9 z;^f!#Vdn9r1@1Z3O&!rgaV_-yd9+3Ft~*vkEqj!PSJb;>$4u3v#^~D~x;&Wh)4#>p zaA`UzgVwiW;d$5nhWaC{&YBr0uMoHu1s3 zfn%%N`QG_$sl-sM>C6R7Cd8H%qr`n~?|_JgB{fb*LeH+iFCd^!x{z zgPoeg?eQ_Vu6tH#l03%iGrlZizE9lYPHVGdALLp<*kh)+tQm7V2M1Y4027e0;$ev} zqpLKYr>2s#<891PDKbbO{*(s-bP#w4+X(qAWeKkU|6`5;l)U>buttI=9FRrY_JdTfGeSE54ztcX(#>gJ6|M{nr5ndKL$;Hz=ypf!8+os z#wdX}@><3-toi=TshUVH?!l$Ersr!aNE*F0;KhELV_r1ub@{@V{?YWOrGvm=NrxI6 z*h1s|r@S(BC_g>rgKJ|QYFNhhxOLbjb5TW1uzWLqnJCo!{sa!kuOKW3rGU#mG&UOM zGI0{|U19H`U`gkp#!>@AZ7>!tv;p6@cx5u*l_xB>rMddz2yJ)=aZ4}>{2t$yZ|ajjH_IAs&}9d(9zAKx*Asl6x=ZsMPJia?OeQ>vl>GHG za?l{RFX*b5a^mrTJZeo)Jd7nToD7qay@Pzx^L0?ooHa6ZE_+8K)iKCM0!s`bJz&s^ zK2ys|b3NE12t5KkGz@p6sd?8ktKxC2%Cq!)jE-8R4K;tr6sfVap^tM%yp_O+W4Y%F zg%7QWx_zV1PuYyO!FWHv4|Au>Uc8wtUQF!m!ddR)^q}mAq%^}_C-OF={921a!efAv zq=d0b^LN!|Po>+=Mb<%VCs7`~#&*QQQ+<-Ho}-eg9;-*W%nMH#urQxtiC5AoUr%8) z$i2f-&%U>nwCwj8@gfJ8Abilln9cdq=PYoW{d6S*UG4Mc5#Io5Ja=WNW!^3FLuNnX zbu9jVs&Lmr!#&?$cm@>Q$z(9OQ+EDvefp&V{fXe#=7Rg8VUt_)fun}o%iztq)8}|y z%OY)~@R)RK{snJWW5BMoCtQUL`EYFsDmCwwQ+SaZEx)fN)WR5uOA~k7dJNT}7k?dGrYs!4}PD9R#oq zyqP_YOS!NyPp{P72XaN17W2|hB@nqWonoxxkBgp=Dfe-nvbije52^f>px@C+p$@Vx zDvs$Vv}xba`G*Z}F(r3-8}6Us)z&IS@L7UPmr!zrwf z&?FO8DPK2)*1BYu<=RECFT-2tTow#l@CXL!a+2!v2NGcv>tkLF>Fdgd4z~}(OSZPT zPxZ%N9+11d#5=KMF{d*4>BRX7t!Gtzbk-fa!gAFvWIm6!Cg|1qUuLNxPBw3A2D2Ic z()9eR*h}l?zf<&5vdS$NPin{&e^*~$F}hSFk&S5(lWU+O#$`pyW01exNj2{&0e(eE zwDnGF=`mb`+b>~PxiLY%b{D(c4PtGMgbVKoXv>TQ^AR<{-ChJ+G^_U!8Gk8CG4D{6YDa@omHsd1)aHUkI(nx;z^uL1ja7sKbiz_1Y}+U?Hx*fxsX+@4}zrMpo+>*qIQU(W!MsxAXV(>+{dXgLy`2iB^8idgC6_#weZuNTu{bLd(A_ z1D`l~3@iL^=9=0)Wg_KnI!W2Orizs0U30bd=3Rv8bzJOdJG@vw$90+eoSs1j^=m%1 zPFlX_t>5W-o!c*=`C9Javs)Opn-Igq_g=h9)66DKl!mBGLEkAd< ztD&|j=Hqu-9p4T+~{A=fmd2&9ut<4nl3m{oJ_Jtz0 zROhZcSDa@Y;=QJX{w=A$Wg2@J`f{N{Eus|3DD&VKx|eduyYC_jxYKuR3+{>fJu)qh$cZvQb0S`M);Dm*9L14>^OhVZh-{if7 z!S_qeZPvwgZ;o@XIKp4L)!l``xKqLdc6T&oX*&Pvube%rBM6O~N%@Wrxh!xBPdtcY z!hh`UJdkBo^)*@u$FwW6s;W!FKr*{KP1OF*$G0BaNvt%oJ!Zy@?x*RUgb1u7qiHG z9SPsGoT`vJWE5Q=AWb+bf}RB9?!ox#Fkw=<#^YM`3S8cu=Xn~k^j*g*sl;7o_-}%J z><6Ul3)e>6$r7kzcSZDM+j{Sgx2MD(3k$(`mfV-Jde#(><4&>>aeV79P5*%AJm048 z{v6O#!`7COE$&yf@W8p+SfaOoOKjAJ2^NRlpF7VbI|&Mx(Bpwg^Mo<+x@V{2G}=iq zjL+P|wJd~l0z0%B>`0yGS6{W>UnQW?06cAIz#X zLul#9c4R${vn><_iJ&@j3Im+ggz2~doZ7(E?iz(GV=M*ihtjD7tJ`?}BOs$G40nFq zbgA^GqXGiLDvkKSa6rBA9`DMH(5BrjI9bh07YvNcP$qNCVP)_0u)D{`i&CmI-V+?X0Na^;~v@&D2-IIiv>nehUn{)Y#3hVLU5 z4TY@<&{%fDi=!cB^Ek}5Eyk(`YHEl%t zu~xdQOsYCFtWPye>?GElMP`R^?-!20?44^lu-4U|VV3WWX`zBJY3wA$lj&ABaRtz~ z)%wv6yPM>`z7>6>w(7(QSza#?eqzG2{z`K|Mfur)!z4J}dO}2@gCN;52SAsK(9Iwb zVn!JYMu;Rde)^*RrH1Q7p(gai7iA!<==&>>4BEg1#eY%D`5OE6ZYZwdpBp3jdXm{( zh?|#0kXx5!`255eprLSjzLOX|Emg=PFxZU(SeF*$m4ffp`TM|;1GUF7=WoV9+pT0zrXAeh;%`C}3;_$(0yyXbC?unddjL~3!SnN!2V zfNs)2!Y2{);bvdv->9=pOrz+D2*U+3HbvrlWpo?XYuT(NAgivAb6~uf>}qB5<^sZs zX~HC~Q<*b;pL2ILvG6k1%9&&mutI5mXzraRF+UHDVm1(V3o>t`^GU_E`#taV965iX zn`V@E81`Kxfx<548Of@wlR%MIS5><+l_QwgHYDb9FG#?h*jpr9y=JH#nWf&?+)djc zJr6fxps7u%0(ly5eHp*<3?TkKk*Isc3_FOFzHkZu=(qrxZnp&O^-$rpg>?*A z&5*q>;mb9_vq{gURvyv7-ERaa7DET3y>EVEU&}1Le<`~5JCk-Zxq|n~wuO^4L1g}t z0uBw_lXqL$e1^IaDyn$7J#gNJ$+lbvSxotWA&yqT#@EE5@q6tBqRQwQ#+*$3FsBL` zNtz>ufXSMqV+{Ds>P42%(IgreWBKzh+;J?;9UR@a)MC9sh zjJ3*|%W-rt=6(@w;aW#7q7e+IN1?9wW8l~u2V5S~uO%7f zy_=%+*E4-fwo9l$f0@;#K*=$1a~4^%Aw_(xeWba}?iL#rBA2X0nguI?B|7m>d(rp* zQT3KlQFib9_bs9lk_HV@BAwD9ARsNF^dKO@NP{3Vlt@d7bPh;~NSCy-$$W477{PnY#XfLxM>ia|?{uKiGEZq_-x1K0K6R-5S353ltj2fpSW=nS+e!=#0QO}Q~%nyKr(@}^aFwX)-wk(VBP^y1tN z;(Wazq77VgYWvaxW|2u$R3ed@);X;K6?9>z>H{DKY!9z8f_w|b~MRi_%HGuQA@ZNo}tgq6yosW0cr*~}yDGhp=Z zc`0&h1?pI5JUjx2z90I&OxnbRc|ro#Y!tb0mFMZ}s=6mc=4n`(dHJ?fMga)RplN0C zl}S?MFhJNM`v8^;)`pSM3i{D zFV4Z%F`al0519vMOy~vqJ%CY}0Qvg;RAVP?A{BZ-(`|OU%_>yp5Y( zUGC+eap2e`C;g4_+&R!k+Br>T?~k+8y8jub1YJMbuYEXyY0NG$JKcS}A)7?SJCfR) zW~oP1wmhC(Vh;R2JQgcx)zvG!m*MlPMQy9`mTFEE{TYIJ>J12tNl{iU~fYtp=b-O_7zs!PlB`5QBAH~EIB?HA3$l8VV; z3bWjky)V5f#)}A%LCJk4D}zRn_9!pg2h6L-6GZv$WujgUP7K&+&9~9+pRQ>u=vZ(HRQ}x&#?VSG26?c=qMCqDD`SiGGh9F7N}$1f z5{lDWT0$FF8(C)=#0_WtG)xt4WcwpvPBzNE^kW^x%inxoCg5MTNlUrrC>Z2^_Bo6p zP%C%*=M80gh4oE{6-uScqa2+|X?O2=M(1DV>cwTjFK4W*hK6SQ34f%LS}*wUwWZ;cWd^6H+tkes zG4Hn*b|f^78S3nHaB^?*(0k=0Ya+cfLM6$H0uMc`wta_i{e)^XX(e;^-Ko7}-G=on zZ%R)dtRy!CD!9ua$Gt=l3_{szLf`mi$5I84gG#v;78A@ol7SLv6>Y9dJl#8t-t0~cp7>st zYw7;I(v}k9P8lczee!jvr-aT>^{X@?u!*q#4c< zXxw$S@MZk{4hDh{^ymq=j4H8luR1rKnT7lj>b|SNX0Dn9ZJgWlPS%)j>XSuu@4){1 zYTtv!t1If@>a9w6JfJvHMSXAhXV;?1CR|KBVVNU$1*uGBxtVpK*7)+LR9&otm(SJ+ zQdxYh;r-`Ih|FO;q48_R7w_dx2KNzFIfwW!nwmlJB}n{wfaY(_1;GR^>gae|Gw7}03PX}NHDy{ z#6t#b$UPxgfrqid`~Y097Qz`J9f+0Os5)=wF3RKj-y;G@W!D@I3pI&E@FT?#TFX~% zB;*&x$x(U2Bs-QYhz!yKlS+h&$oQpk@0=H}Hv5&Y<1Di4kYnOd32*DrI>6_YAgGjIEV|a*6PAYc5XwHJyWrDm{P|RwSXt;+0KaDtZB!%@9g5| zKZF}Fdmk7_b)QmIsI_6jvRl|9ez%k-D@SBbKX{1KA@>!`IDB5pkE(gQjoQpDG$$nyb#Wxpp#La9wZ|z zjql%hAtwW7?SV)6VriAFIjG{0qqnHY(=4OWQ^)%fS5tO~W>L3@AF_}wTE9p9pLfgb zb+u^64#V!q#jBoHrjbVFICoQyJr`lWwNI1!aFQ#C0Xy)ISK*3n#pHG2w3oBjqASn{ zn&%s)Lv3fy#x`Et=@z2C3T4GaOS*aHHDe{tqp{WqmF3}U|GN)p4>BeE@5ZoFEUfr6 zEVI91OK=^0Ua`IzMy4{grM+pXB0cc4j+E9$IA2q>HS*PBSKjFOP!CB$#*ud z%G@$&ZAGmdjbOFi9C}}W@4k{{%>MHCF$4bsDb!{l7=3*TrTiOd!sjTEak-5x;^~Qt=C+Bx)##W%F$B@V*l!uA|G8yhZp+jbBBd5!;wda zy28H_tu3eirhFmWtCR{9VC+912AEo=>--N545UtX{KxFRi>C@!v8{X073kfa-WI%p z!tD{=D;^bKZ%xZE(vx(8L5j4IhE-Hy_jus{HM0XtuQt}@ZzUuw^GMgy|!N!U53q3EWxT^|8o!jy2vAq`6{S2q}LBn+u znw!BBrGqzyrWv2eD#L`D9ecg>7@JXT+1LJqr&?f+Vue)wSQzO4_J8*^9LorH)nPYIf`mmG^dMAN9?hRwjkR-YW;ia706vdX1jE6=KPEdp z#U2B*r>Gq=Wy5IZ1&76nFr|~{6*PMGsKc-^uT^ocBCM^{LYO}^bb+yEuM9J*Y~(ZB zzNbJD9|rZIwDV0jF22q2-}~00_`$~4&ygV0aUZO2LWX?4DMG;7a@Q=qaRwGwkvqQ6iBwK(jXpj)5@;W3SB<^!=JSc|S67=U z-)gmUl-ylq2g}$}PukOUnAEcWS;0yX_ScSRA%UJuoXVP!4MdKq1lA$UenCdR*d^En zwuEiIWUsG+jFfZNqs=f3e`bE>KWfUbr>P?Uw&VvGtZ z*(Rf`W)6-##%!iyRR3LL)I*fPsWjzOA`(C1p(dZb;h4I3l8ssem6FD=5ITr6@^`%Q zlF$>HcY1Z4dbGrROFELttR5gp9nb zFL#fmBNGG(IXhr_wB0+8cxBPUF{#|9j_Tc8b7NzaL)E-B4_%fU^hJPcqO>Y~?n} zP(}*1hN4;e^R4Gn*B3PRcXoP&N8vY%g{owY>^9gxQhfpF=W1X~pH}5af6l5B#naVe z4F(G^z^6XFKW=VLTF?V<7j__o$b4OgPT<)CiC6Q~!qy41+jE{$hhg*8<85vB=Uu^* z86b?+4iFbUwxQp672J_A$fb2k#tv$Q?2T!Wuve2hw!8}NR-Zb@KgfDx^?GJw~J3IeYT0Qu2q(d-4YxdP?Z@B$BE_j!tl&orsxwf>|LEe^Bivg>c^jsS}}JIH6(dIQ`&Ssxxp+-SgAJdG}*FV z^}NbbiqyyTq1yOO)l4&8f=bKO5+9p1neCm2*m3vEDDM2*8+_eRH`8d5z?~BhtD&Y_ z2#qvoz3jGXca5V?$@ok)`RknxD->Dcf%kZ9YGGcjj?|W_8%ztKGlc z{!`6>>i5=marL}Iz-D(%XYL7oP2{_!-aq%o%tylK#tg7enhJL32MVfPViMpP`t%1a zH(tb9{axe}7{Cq&5@*$U?z6wW$-x@^+vh8limb*OThgv;6{_v?G{|D&=w; zBOv)2U_nMmGK6J_O-bswNNlbgXT$IS>DmdG?b_ZFRG!a>-@8B8?B(G!eKwahR&1L? zh7cJBDc%}yt$OK*FBydX^PBDVuLuKWj!O>}{Wj`DCQL4`oc>`@PgrkTu@nFmR0)qi>ehR%%glZFolnX8Bq}U_e$R&^&aR{%IaiAJ_ByH2&C^C`Vsrgr!v)bwZ+Iig{X z&)14L45;N#e-K#R;p$7Ps8;gJS0mEgW(Cji)cH@yC z6Hglw8mX-y^Rh+D?C&3OuxjD;uly)7HqD4GuVf6uiWIqoE?~Esop7x!xTY)`ZH3K0 zs97pLOW!=%^T+%tC9Phv@|se=JT?7>FktidL2=bm@o{>U1lrBRIwTb-@v`m1ZQH#{ z*Z^Z_6bM3(%czz7@=4vzoT0g`5s?GQ+zf}3S_Uw3W{4rLOf{z8oiZohX(R92AoB05 zfcAC}SH5&|u?H*?%@6O1pYA+lK09+aD{IzXwMcA~7*kH@c=}TzuGqte0%A{vQ2uTa zx-?GYe=u8t&BAcxW?y9+ZvRFgWR+GTmmd za~nL^d|mV9h4#KrSz5LzkAweRYN8~_TOCH)ugJ@Yi6>6c6;hHKj}+H1Uat({oP_<+ zgb;zZ-&;MrN*|q%iPtagmsR)5C~oEl8U9*gh=&hQ%c>rIu?s>T=X(ar&n?PwK8`dd ztbBcSoWte#*-996b@g))wbbd7&KgN`wztr+}~ENv2Pe&*WMDnXB53vGJ*R9yk5o94gE z?f{UG)(>@+iSaKRGYWf}kblZ9`kO#?gz^k10~NXT>ZOICC?F(=Y3BZDYkWd9E_9T9 z@H-sV>NA-FM1a_*UpVqXF@5l^OVyjEMXYJwBZ z4x@Dq-qzd}%Gqw|LlfPA%nZ)Q7O1Y?@jNjhGGEtA4DO*=G2e~}@LYh2Kqy^Jbr1nW zf-Pdro~Lqex56A_=^%BNY!k?WwW_#@29;0AV3rS4=CFegv7U#OY?+3>wT6DAmiR8O zhKRFKnJhmG_#-Y(?ytX_YMv5FN(34Pp|=2AL{8Quhk#k~12xXx9D!z@c50wzdw ziA^QB=?J<Z|3^?JT{=EhSD@AEuvWT+R3kJ7A{rcA z&Lr3_)KBy>>E0*PU}Ffj?~rW*!P|{sqIU`u3K` zsUF6F%W$7kt9Dz*7@=i-C?bS-iax6Irbaf=_ZG@_=Zhz=zYnqMX2NeN?-&L5Avg(2 z$;gEc{9QO~c}3RchfV0+C>E6T81oA>-u?(VvIbboC+~pEk0~*KR4Adu92EEu={9hp z6fe`g2mv`xO)xcN$6DjN=p2{t9M1 z$e!VVP7`|euWYt#FG@{;Tp4&I&U82SJ=%p!O1rPI+VJZJDl&D{|q#8c(aK{}_e;SoJ(_6s4@jD4OjOTMU@@ zFU#KRneO2nYr;}vXZ)F_0=6PcadSe7TckAzhV!!71B?Kj=!=h&D7f9YL#5BAA48F1 zvmj^xub73+1dQS)N0*OjXkCn`+xqkRg4xH|=F3tODyLnyq3d+(dHcui>iU*FSb^m# z4fxW32=m}3c)A8a5D!vb%2Fx%PQDm1n&x9I>h)!s*qBwJDolA<(})T4IW3JEbJ!M7 zmCPkq4!Yx2i++Udxx_RT;-iiixebJyGJd9^7RK{uo-rkJ87IyUbx5Jg`4G_}GMC)r zLpTh%z}6?i^k1I2$ZcCzHQ>km=GnsTACM$}6SlK}SlNZb`o375mtnTT>!#-q4r=%= zcNus2TG{8*c})YouFAtq<#u67jX_<68XoxgF3_U_(zZ<|r4yVE#TfJ+n@R3?ZFZKQ zBo=l013&dioca-^%@;lQ{r=t~5ut?1tGO-zRm_uC*qLMV<1*x9Gj}YNmpkb6_}|8r z_^PExrV9L+LrF}XdBSa`4=_zZ1ax-UU7F44TsYHncq%tcEKTN=tF7gHmZ0BG(V`WBSWJ}0ho>d7uK`~9oq$gAJEVY^8?_j^@I z1MpH}majbK3tnG;SE+Pd1CJ`Z!N~Y5QCe=|g$6JF6A9k7I~2AKME)3G#9)VOK}eM6 z+=QpYbe2*EGe(PfgrM!Dj;$|=rAJ>Z=%}DSG4aCEi4$}OD3c5_NBd77S5b*mipIA# z95ql|H0b)R$NhL3{fs+-E^rW4Fjl>>3RLr4syFw@hIN~U=oo)wi+5lveQS-uc#MAZ zQ|0rsQ`|syC5ZZB*{oszaY3;tie4MepT;pGaQR3KAk^vyh$egn=m~8oFl1SU0}<$n zz8L#rG*)6RCxw}?!sVXxg!JVCzJmvl3yf+d`ktA>K0u%-9biNJ+986|sci_g-to;y_6mMgcs4-FGqDfy|LZ zIgoGUfCGx+ZQwqyE~sM213+-RKggz&3abQsfNFY^k6s6VE|MLAac}evwGjtWg~45) z)gKqGHsybf(H3M{n*%eNg1P7X72L_e0XH=dSe-pU@k_YM%t0Ot0&#pPU%cHn1N;G1 z0a6;F9C~9K%rLrN4$-GK#*q;C&HTN)v#I!8JpOw5qi9AMd!TLA;Ko+Xh%YuOTNsYK z#uiv3&SKi|ZBTk%sAK7^+FE=Uap4R#o&>UhawV(>fJA!!sCiF9*5be_|FiDR4QIAqym8}sWTWPOHw>rv&%6z{TL z06ZVU;F9gfDs1|1Dwho2O|}1kZ$>KPNWdFrhfnLi?AHP(Hvyk{TDmcSJ{%}QmzXVSaQC!aW0qNr>>f_#KEY8RA5QyNpKYWq*&e(6|@%>KjY^q__-;E|ss z(5*&5G}rUo{1-6bbI0o?tOC9DxWt*!mC*qtw|ERHQQapHS_f=U$yJg@V7}FDoOsP+ za9O_hJlIX|oMe4|2l^_*+-(s z+>BDy8%V+_*PDPl;W+Z`q4+>HKEajXUxSaHQV$Tb$9xmTB`rjbsq|C0+kB!g5Nw1Uu;BWoM_rR~Ab5na(`&mW;kb8Kmk&?%u^(m)9M5e)B!q{=$dKrrVsZ|8 zz1<22dg8#QK)%QPePjSo@K$_2iDg70|5e`&3B!4gzK~9hZv!S32z>!a{ovsD;Ls~VJulR%S}4+kyopH6-s1}A zjJzEI>)`ftgiX%H1;Z|eR2meFb#l%gKfs2qjpxQZv z^Hx7nW>`~tT=D~uGh&AZF0W=$sPkW$?vpjVNnVVjkWVo_e0MDiiP=sw)a%jCWTv0w zgG(3siz}S4+?5vT0g(dpY&^jCgU>6Y0AV9I;~2$H$*{>j&|JZX-iwBO%ImuV|GMh0 zXul@T8Zi+KmIx2p<0QpXYL6ea%G!&qM3uPNg;yg8n{9EXRJ=}v6Zqp=ep9HZ0Qv<0) zDAsn_jf2*|{k{bGy92B8-1mFH`8%@`rRkDH*5BqD!5gUEJDBCP+^t1CjXF(q0tj(UL1vR<8vxxeW1?F(u%&b(QWZl zAB^H6zN?f(4xG))sloBBs;nN7k;?dl-ptMVv!_sAM9@u-PwSFqMuKAiW_zCoH-e~NG_$06UKM0=<(y!; zertKcl@S!FR#;COa%Wk$Idt>Rqs+nBl`FKRo5Vu;Vi(#3y9y2s{2a?R;0g})v@IIe zfj9D;5qV!%Ph6MMgKZ3{sA3H_7Nab8OmF=71)$Fo&pA-TI z7Zgf}EUt4r9B@fwj8SHdyLzYbW{$-n%^eooPb~0NpB&TR!okNcLfIZe*va__1W4K} zf7&Ib(JqNNLcNCs*cp&QK{ch&HE4>AWYE7yJ@ zi+Q5C_>YXV^y~Jf0ns7xWhL6Z+~<&bj_mxcJYGcVWPOAuJ}?0gG12STOYW+l-@ z9y3B?(J7eClSxmq|4^JS;z9QHjGcw$i0+F_<4o(AeXz#3{0aHYO-LKGf&@9{5OHXe zu4GVIpLC?QI!#IHQ3j|TlW89eQm z8fij#Xx&g$?ZoIDW;qfq{P@7o0Rg#gn7&fTi{aqv&ZDBeiF zb+(RBK=n<_?K_*6d5$>Gqt!u6x8o z|JZ!ne5hK;+We8{rH#Av**xpvnak&S=Oh;Pc5~{=>65S1rX^J*5vJ^37!1{c z!T|X(<^eaD_!0>WyPDZf+Q*R1%x%G%wUD0!3hx8uxeCBZ3PK(azt+<8REYso^XO{hrws#T-@S zgW%z#?o%z15Q8@Sx==(eE`P62ZxfZEuLRYj6qaCb#${kL`LWT){_%N}w^8mZuHlmL ze4U2hpJ`x#COEk*XHCu57)H$P{Z|7?xPpsgS^?BXXL60b448%D*Y=oYZo(WjB;<{1 zsRftzT6|s#G+j1Yj42NW?@2mP5ct<1kjegdo~CjL%?sd(Vf0K1U0#K8Kf45#cq}MA z-o@I+zF~o&)$*kQt5XojD)BJM?*A0ZBEDCFneC~8`Elq=K3f6)cS#2>L|troH#u5z zU!@$s(zwqrpOCn);FIwZScuH5bC_|M@{1qvx;VK+z!xH;E87>&w9NhoSkZ2Ejt~pv zsd4MU5yeC0{n>C&)<{IxCsrhU?f>=r<<*~MFjnGnzuF@L--DE!o^Y1d=SStO-d_`} zYY7SyR9uW}K(1S>&zWh%kvqkOxBmZ1KVV^G8JL=C|4|Y9CMIb|p))*7%~C}F~vcHxzB)p77=gkS5EB~)Z&0Hr};V%^kyTi2HhKBKCq3n8T z__2uojmJe=#+dn|@*ZNb`2V~n$hf;3WsiVRviJkHAaMN=GUPs??bYVX)4Qu(Uiafh zk#G0&RAX}+y>&yrkkR+jX+`=qc{DH^(tz>!c}jWJy`IlC zxKh8LemiTQNwnB-G@>={mgxNo%OG?hr>VLDboIK5viGNz}2jyXATi%doUY zp19F}DVrpCkqFi7sp&WcvL(=Cm*cVGVRhcEqy}^x484^D=6s;Z`SCUE)Vbu8K_i2) zDAm~eyW#5d9j>V|b2WC;q?&lWQz+_V%*Hqr`^XErMN`j0)Rg7^~4Z9z@k20!@YKqj;I9#>0M1N_}2j{JuOVLi6s zH)~=~*R=i0acMjqa)7QT>bdW&Tqb?wj;oLDEaTj9rN52}Lwp1b zL)eohF$^p;b|8j43I~t8h35al;L=V3_31&lbkblzN=u$Q-gq&nUI&4G@hioVJI_G| zyuv09G1tX?agVSgfzx1s8{i8l#R!=2Bk|vBASq?2Wo#YlBg#dC9(XnPCt22t@aV8W zeV4}t9lD>>2|K>!eci6&v4d75-Vv?Jq95%oNrllMOrKxp|3oE)H-Y<}{a>SD^Sbs3EFRRg@DOc4UT1@wYPVkAu<=vMR#$X+|B0TW{h z>Vg{Umt<`!`td!tyuz9!irKqbPtzb=MPVV z&d7mVUe(_D&k16GNA?Lr;KN4i zKUSQIZ#;M>RR?Tz0z;~7OUexor$;zrY4N9&`pHz=nBozh{D0!)_^0!2y35A~r?O&x z2nf-d1BjhHt!Q7SIOrImgb_y?l$<~tON(TbsiPkj0UB7X z&z9HEiW2W7ZV#ZNOaSGgTadUD*wT{w%;4uhV3DR1w0tP>Vn;sumW($oMm>7>!<&q5 zrqfjw)teQwiorL>>pOZT%B+S?s3x=N7ZSW16!rfM1b*eYxr*&MK}*_vnEK&JTEXW(_j z>3UA|rc_X=g6R^N$dRf&>YjINQ=30%l#wPB-w%eSQ@$WNaJT*p>%e{;BjOh{1dvVL zh46W6pob2!$mq4IQ`_3>G4i`TyZ3b9*dmF$-^gV~Y|1tpz#4;fgl;BS#7K92M_Y#< z^W5MUpR^3;)n&Ms>gM9|&CQz1?3IpjKklu20ihGzVPwH>vLFx)0~Q0hFaZB?;iVM$J>bWODK1UrZ!Z4UT7#L&zHzOS;};1Toow`h^GR*E0)FgTPuV_A}*r3 zuTr;-yu8Hkk|`ar682jnevFJiCsQnfIT$F*zr7L6iVD-R76^!c>9l6DHVl+EV>J&le%@%#CBJCKXjMCcw@CT z@^%)Gu`y4rtH+q5L_Wgwm`LPkFQU06UJU-ygf)<+2Q!q|F@XR_iMzIuueRo78fjt{ z8bMrJ?t)A+<89EK`=>kg(%Px<2&2du5@$Z5JyWSA=rC?2cJuUNQxt;PEdlA)Jj$qH zn})bL#0K>T5L91j8qaL^OyZ*9D) zLCo)27Bc7iwRAhhCs=fS6z$FT@hNztfEk@o9h>-eTOpSH(odS~kkpkK^0W)*BabZk z1QCR zYcf7E39y3X>X|^D|LSuRm*fC`3klwy6z=w zws0&B54@0?>jZoil0~uoR6L*GIFR}r@2Qpy*`yP+b)1&}wT0e}0&w`dx9~{(727(9 z(@p6)zYLWRF$a6o5E;Yq&uCa{JfUyCcmOc~3)S#j$8g8<-L z_uyP?3=4G4Dcre7-zj+QWvCU1MnXhqY6Mdch37>-=I2{AI|1E-;X>>rsiUj&@Jp9~ ze-=|;O7`tgtm8@!+uG;+gwVtcd9*^_Py?CXS1L=02FR`Bm1J&!eLE|g9ehdn1;|eb$1oexa;zf!byHLsEPnBPDB3?{ep)(gcGx0{)e|vLj ztk!L1PgEYFU$#+PKh+NanXk^ac`I-Mb;SG258ckSu75PO{y{hY2$vtNxMC zqq;uuDYu2D5`sI50t2+Q_K!*F>p4Y+N(=oLxp8z-WZb4#% zMe?`vI1B&9>;tF{1g^+`yCg{^txOBz`}UF9j3OOuzMDCO{=-<){EY99#ll03x$BcI;^GsI})9o6-`VmY7ipm(~Mw8u+3NMt@VACHy{!6~K)hW|>&qLE-mj$Xnb^9Nh72)}=J0Tr}| zyU&C#Z^UZ}xwGS&{tmd(=XNEb647W_m2ZSd5e03QO`3}`yjPar=aPRpXu|Z`e6W7YfKTs&BV(shjYte+&MEerbNfWNB+HR{7X)I{e5Q>7u~s{_L;P zMF^YELh)Ux+FOZ@JJOoD&IlE~=8Q1{1eqs5%hSs0_o_gtZqa(w9kP6J=dPM=-=V|qS7W^&WahMrZbQINQfcO z-1wpCn~CkjlH?yHA>dR6D{LIQsAlb~G7 z$=|o4bd^Q)thC)Mt~;vas<>YP&LMeMX_*RrL1T1Cn3I_J^{?6+{U%$h9fmVb4aCNz zq1Wd;zt=u2;pq?H4E>Gj={u5cvD!w2Xay+)*OYhWJ7$@+bf{auxk}BL#I`L^adB!bcfcDmt zxSmW8Vo)XS9*VpX_}#%kf6f{$Jp{rPpMYIaK!eJq)8tM+AdoB7wS1c<1~8%2J22ws zMNK3VH>J@X99JitKwHuPe%D_04)eRD7luOP^%rk6fu!7KKuyM09R2dQGBUoED_7?$ z6_nCIh>#t~y+ZumyWZ3;>qqDfOC#$;n30{2YG}xKf^g-#t8^uYpe#s43Zg^A=62*4 zex59gamqObFUFq+UgM?fa|*8GBciu~kiY%9ayZOg!3MeBwr!L#YMI`!_;x-%9FPC* z;PgETuZC(r7c${RrF-6%Z>UmBA^5*P`~n>i+f|7bKP2ozRcR?#>|l-xWk{=QC%fyi z7!(~LuwTuo@%EiS7)QK6MFugaliJ4c5;Qcn?29xQZG1UNXZ-;){0~#{9B72nLY$g9 zZkreaP zX*i&NF24^agBN7j7n}zZ^hC&ll|X}I6x1|A=7JBU8|$U*Fn{;NXce?(wbJI=M|;Rl zGiVIvxl$yD58W6yrB?W%(rm=>^ZKGgygDBI8jaQul`fih4WC$K{#MHBqltl@7OaJL z^PY>G-Q=gpu@1XSSoCs-2$_h6B`3r~EXo`Dh{mOd$D*h#ylWz&NzZ>>lY2y>5|L$h zJs?N0U%%0M0;CnB&y9WB(z${pm3DIn-Q{V}z?|K-ydGgwd$yM^H;H2?!Hucw>Ohw- zf8{20f}4Tq-E#c#-gh1iZDA)$C7w^xP3E23hJ9r~hqxm{*O5wsi#gBRLc|1%-Dd*%J~Ak$F*jlp)gHw(5gkvW2XHN>es+tiU?LI}pUpBipdX~hbT5yC-PUa2vRXf>(_uZXeVLD2xF2A=m z>^Rg4*dl6j_XX`ga3ULw1RekR>)wj{#5Dl=Mlac1*_`99w#0Q|y?q&xR}y%%6M=ZT zYhZ$C^-0V7%-t!C=jbA${8u{#>e20BkTJ4j3F=8gMjE`X{$Zme?tr(&=Vnk6Ob zqDA(@`C6*OAW7v%o>uYWbmsyFz z*IU2)3GX-a6>*TMcnfZAlx$i+_R0PgxoinRq!ESxU7VJf2bghUvXQ@&D1+~ZW*X_C zIz1FO3(q%f-D8PbUhH$)7mvoPM|8wRKP zD%Y9U5{(QTM^u%kE|xdk-%fZC0H!C0K4Ci>+$pp2&VJe3l%_7@LF@DtMW|ET}QI|k{g?&ZY$=95h>o+==uHhpvO zfWkI+<-0yvvu|FLuPnrZ(t-NF(LJ|-37=3TEIBVign(Xdt0Sg0|CWNoawVsz-SJH@ z1KO82s;Mz-q%_e3b?0zh4c!Tx8ZaYA&FcWpg_BsB{7%Z;|IAF*fmGr=Q0nWXl$4az0B&|mpEO#d z9xQ6e+5~CTfqcN#+%?o>1u~0R3nbp4K(SZ>h-j@^5=(KF>AXR>X+6H?6IU$IK#|Ph zRQMBzI}5`u%ZFC!lJ06q#Sl_WC^*tEf{pkrvG3B?#SiKzTzm>JQE~8IBkse^r2*x$ zY!>7ZEWQ7Gp9STAegGN<|LiVzkRU1L)R6kf9GzonEp!rpxXnx`+Co-FkAF9bt4ITy zY_pDhOt0KD1}sdhA0BOt6{XICb6LU8DQ@-+j5B_~AKY65;UUx2xPcqKgsawWUQqI< zfN|zYNnt7P2tgQ#94GjZ4Nb)z~k@e%vTME9c$aE^HZ$#EKoK4a?a9{dwR){MHPx8n^JNFOI6UDmRt; z%N#$wEv6IsOTv2L9|ba)6LpXnynC0X?S<^^1KI9ydLFk*iM0L#9n<8+_yoaHEr6ju zt5y5^wIu&yiedRgjLC#KNEZ-q0w_H`i+=V7Hg+TX?nuCtxzzRcdOK1SbAfrNQ}dCo z{dcAqg6kMy{>zs;PrrT#=7Ptxu@4>KD|NnRuKD|N}EF~PX8AZk3eo?u5p)0~ITfJW=_1dh@xW~3Pa*T>0U z*Y8#bZnLVl$J4g6K&F#gZ^AoN|90^4@PwKF<&)}Do&l1mbG%IL_zTrcT>G%P9MAb= zyEAI&+_hf8{X zngQ}2dW)97U_uLi2ZB5^U!0uqI5egz(;0e3ZE=6^xh2x91)(H@A9sZ|5DunYBpP`) zbp!BVN18riepg5(>4q-?F~k~9(EF06$`czsP=rf_GKP>c{gpsK&U=`tLo-M;R=@#FzeU|~ z$D#{_>CA%fo}U4Af+FmlYq;yXbY>r_X*SVNmR28*_m)0@NH6d594~+TOpqEaI+k(S z8OeMGhryCk%kS@)l{y@{zk4P_`>^Rc{>U-8aDf@!t zdbt{@i}2~&lP>9$CED@~YRP3}^(8>|^OK6?o{kSN8scPoUi|Noq=d(>lzApnUY92m zkQ}a$Fh4tOmd-f|Hg{8(*ptH$-=LX9f@wNJxqT`)n-z0EN?R7v2Zk|5k(&{5(+mN~ zo_jm5NG&bXbZMRy*pU zJq*7?T#L7-B<@yTzJ5=puS%QbL31L0a8>&qEA~%It#M019Cra@Gti6FwdVX7kXA?* z6Xr=FsVCi1x}4w}T~~Qh8z~{x2Y?_6645V)q<_`~?PkhAbM%LY<%rHggkbx> zjRQ>yX_`XC?wU(KPjVp@Cwh=>ogEuFoGo*Srz$V+mj;ey0uJhik+z!iZE@OshC|SMM&|;O!PO=>TTjWdss2fai zjus$_LBue`vZXqj3^P6ILxN5EZHLIk~G@I=jf533C_WYly zwrR@zv5Q`P5wm*9zlvHtYZBRa{t1}qzzkO3vvR7fU@QHStNpyv^MRZCAB$)peX))P zs+-u#*q9$T)t)v!>4<}vC1{ir=(FUM`lSr@afVe$3|%A?{p%(LShhHm%}lr;Oh4hTPejb6nhg0VdRS%iey)}_zZqrs{e%iG;r&~GFl`{4s3o8wt_@?J zEg;chHf}16eQEJXroB>n)jO)Q05$eG`T)jK3-r^o8|RDUlUpT4f3hoy({o{GUR$;~5TorPkND@h{3JuhAD}|d*(lTx*v?Nw8j;*K2W0xV;wl(=TKkJ)Dp`Z zZvvYo_G+a@@YlircfSu{5+@PFN(K~la?uF~fYeK{pZQ(VNwy-aNpb(Iu3!6rpSwf? z#F|4FU&0Unnh-Dbr(OddJCg+{*?_{wblA?ckNo+EgTD9(5g$}YWV&5*NJPz>pl+kJ zYnEjjnN>osItXaRvj+3W9&kR^jGChTa%6*8RJX~NZC#?@FK=;RVzTQ!7{2>*ygJr?AM2s@O?~s1 zFLpYG%Kc0H(3Z{43B#ujW8@nHQ?tBJ)CbNf|HqmLgP$VId$hyX}w#;@Vv-j>x{GUSV;C3wsOMq^X@CRNV z#DfA}o-qgAX1rNT-Sh$6x49c|7&;Pi*_8WsvSnW11~b{bu)Q_??)TEC$F#!cA0v4H zQW`h()8L(vhc@inqgQvSt!_~#J)(Admz-fvZ5()$H9baJ@g23C5|K0WHvYc}bd;~c z?EJjR#)8xQ!My30ZO9jKB~Outv!81Q%~0L(a_%)Zxb65);qWih-bzbzqBSnH4!Yx1 z5U}&b@EgGRdz(S$Xq*ax`LZ z3~8jSZNyHp_|Ud&C+axw9xhnT0bxP=8`{`GpSLPv>j|-F!tN930wmw5@o0Kav^f9L zg2s|ADA)kpy{I2A3_J$#EJ?bVLDHWG7i3BZ3?I2OMGnXAwrUq(?EuWmHdPF6GlR*N zL0kH^B)ypIA$F|jHxuz!LzwqueTh;5&2Mxbl6*T>nl*z6N(re-GIWk2BiC6d4G1Sqdu8j{_%;{GZi0{2!nXH z2X;#!<(gGDzX4>&U88uV<-(^a7{2(bxxE!K)M!TeqXdZi_deJfS4ciph^lHIWwo}m z2LiGcAB(Ck&5_DS|M~r6_?vp(**852f=)K(kqI)9(*NVD0GpR&!b6 zA1{g4E|~JN!~J%sP-^inX(0%C#Gu1*X)PS;=h}(s{Lr zu+GcqRf5J985{LBQc&8}k2_M@{qrT!i!6*JdDD?Zh7b6x8wJCdz_%H}`Fy6$ElDep z%mw)-6$~lJx4T^NuV_>2k#>q$3|YnM+E_Y`peT2$lrVSF7m3?!C}b}JDrG?TS;eu4 zc|NUDx~A++jr5<_Fn|Lwr4UEjNYPlZ-exLQdr~A(ABNax%#->W-wM{s^>8La|iKh{gvOq+f-$b5ufb)^t7prU1o ziZ_i-3Ioin6tAnSjOekFX@3yt-MG-{);+SP;+|Nl5E{6s(j4aCu95b2jrf9VK3xn) z1Bv7It2hn4$*zeMn*ba9eyYK)gNK1`0i|Ct36+|ruy}C!gkIn%%Pi`Ctd2N>$1@?O+=P1WZZTL-eN*peVt&lrY=jyP+C^mM|2Qr+F-E z0MIC<;Aen#(#tn9IpVty@I5FfpR+=`PdrBZL<(mUkG3pxdA6hdOva*JA{EZFRgP$c zEws;VOO_%ptMgJ3BDP#KJD*|yuCE!}VNzZJoBs93fu#Hz7d^Z2L?1JHS8_b~<1INY z{r4l`g&@B%b%!tf2#1``DvbsFLj!`gU$p?7kbeT81nBC%r+uG%gO$@NddVDddmvn_ z50F*A!6(X%Ks{dbQWSS_;QB<(eFqTfpg>o<@7;iU+4kBYfV&j94vMlh1AhPoiY=`f zfHn|2tOFeXR}Zwe%|i6WfU%*Yw`d(=@RG4SGaPo(;MM4{O$=?6251z zzQ6m!yfvTC?`&6Al-190;>>L~`vrznaM%i53cja9@a?bfbClOS@E8LirP&Z|JMCeP zUcSVu@X#^O?g)$3f9g> z`Fvr_#C&HRwSL*_AB^%~6bBitF)C3*DMoFL)Tg!7Oz_ zX#|GAp&T5!PyTEqd#aW2xqkeja=ws#MU%=F6a+rbK`uwfMsLNHzovjUQk1a{XOqEX zFGyKr`!B}LE_JX!)Da)?J$+z@;{|^lxYmpHUP~jS641J_12O|2^bOFdbd=@@iBWGk z5{uak`fE}2%Z>XYnUaQGS7_hJXA_DUmz%aV>oC?~yoRk7Fzs4de>61oyN_Is;Nj4K z#`{o!3jH=JPwN=xF=hVV4IolHy%O%@!k;#>D|FdCw~7{ua0Qx;1|hYU#Ovno=@amE zxP<9oXS(lpax@89sPy<~w=VC$TU;T4GF=Asv7H^E%^Le$be7#KF522X-zTiP+B6@D z=}0)P5ZlL)aGl3Eq5tffkV@%7Qppe2a$!KFR02SUJUr;#j9wDcCZwn@fFtw4Y=1E&l zGrLCw@G&m-FyAMBTSM6FSar`CaxNI?Ng#)L9|YzN;+WeGahXW$xX3nGDtfOr&B{PV>Kq=Hp=uU^4n?DvY(YU6<)8w#y|fTVFj5(q4TzASOBWt_>lYbDT(`ge$-GR zKxj01kvfUj7bcQ2c+NR{CqG#U6-jtpof?}LLByJV$;A1>Y?C%11hmL=TaZa}0kD4? z1;o7Qhw{Uux`!sWYt63q6C0u|fBDtq?n~hgq)_uC57N&3oG&8YJ1731?XE?j3fvQqU&v6Pdb#LT zSIFh6p5A`8m7^xoDRFe#Ri9^e7`c*{u}|)CC2m(T={2|kpqPC_0eCg(wBkVcJ*M}_P+hVS*_WL}4@QJ$ zm@`v|L0#Wn9YaMEc$pNR>?&%>(`!gYrV&wF(+G4crC5fINMnCdQy<{Ls*@ZSCZ|*` zIo4RnVA@RG$A9lldq4tne^F&I9~_>oVC|4&RvPa3B-_gR^E&N@a)7+aVI+FA0L)z0 zh`;0njZXf(vASIXCe~(Q*wb{_L~7oag?ylVTWDFZ>YQe|*b2)Biw0~AujV&?ZvW)t zpdv^@d?A zCpIQ55b%)9=RZ>z$*skPFNX3b_b%rkmAN*0-O^y7-X+=tgi`3h@l5~q0etFfb2M`J zsFvODNyH+5=ht|Wt_5W+qq>rfAh&5#YipzN*BSdcJV#k>n{3z;aKchwy*Qu4RHa1N z>cHPZvl!m(3J$G&!EF(IK0sZ=i6)g<+R3cyAmgKWq0aGEn-ayf53@N~9aMsi%*7@2 zLt(Hw6A3nMgJE6B7gDQ%W3ou+zLc{Lmy18=YXo2Z!}Z6*HY)4!tJ*Y5i+`5|M`f$> z$v*77Px&{Qd$Hc&XB!*`{s*6NMe z#c`}b%#okFONxY}uHnnDD(6qO`6UdXM2KNno%p$mB5Y)TCB^}IO?Uf!lgimT)c4Fn zjyMv3H~e{a_F>jzWmmwgBwALX?bfGCjt!ls*B&~q_8Y*qQw?C|EZ-@43LPLCCEn=Z zZwh%hiPLzujT#D|X424sxU@yMAu6iS6z9meZEt4_<#6$q^p-bwtslX{s%;=*41aT6qxZ`G{n}{D=7B}yX{>Kuk?1cEkFy{tlIVqiNK{B_t4HT zwVdrnw(dNf=tcZt^tYCnH@*nj6kcl^LtdvhG!Szev84b$wA0nDA9mloBEPvDln%VC zW(uFH$2s(Qb|<_#aw)g;f$Io+LGwRx?W(;_Pe9}3oJwy>uK6K@-GLM`)-9GdZE?UA z5K@Ufyv9=?SwWk?s{Yv^3@kUkDF~Y>t!-aYu}mR&j#tDMseZ`vcwh} zvut2%Efx%FtJ6BxoF=0vUwr$GCPpi;9jj-|?c~*7p>K>f796SL8i$~;GA+Vfqm0in zl!MG-LgFo?%OASC^3^v_EE=21?IlWtEW1jZ9_*WO;`9{M)cYt09d|$|>g=S_l4$pl z$$$3dpRXph6JR?Ygwo}F)u1V%kXha!mh@U zLRBWN+q7Xq#DcxM8VpNkPsayJ>s@V!ii2lTFTg2sv3^!^GrPY@^q70R?mPaRvtP(s zn2xW~CN~d}g1XGOb}ehgbcFzhOoZGvZ@jM6qIndPv&pl%0y+jjYPXfT%3WSc7?Hu{pi zY_Bj4V@31aAgT!NX=z{$E%8rDhM9bY^i|3uzqMDbTE1ESbF%&1c0(vBG6%9cYuS-r>VAOTq&9c6yQ; z+`&-nY@`T1OvqM1LMO(1xpz!lgvN30QYeP;h*z0&5XS5^)cDgYIZkeX9^TQak0J{xWqb?|E#z7vKVf_ zaH;dY6P^f}cMe;kzqBpbNflr!bN^8&=rEHl4^wuf;#T$53*2f^dz28h{VY!-Wpr5- zI$G-u9nEH;XX`mtFUHvL7^g7Pt7O`0Gg-84cEWyUTQ|&4C5P8UR`lxHAeyaUz315j zUkw}`*@jF$Qi4sLExTI1R`rk(GUw@2)aniXy}OghN`pHIHd0-DbuE3Fyh3Nrrrp}JLm7gCWv=K#@Gzy0TB;s)`9fj+le3H3yDI)w zuTs>SXH)(`@x~9nSGBYYQ^LrBDCndSqBe_rP5musU8K;~c*RR*(gfbhQ%>^<;=CE- zhAOFPd|)@m_hyUGQYuyqG`QE)@&nQGR0w%DYaI`47mj(e5*zHx~kA6;9}5)LYvNqE~~f1fdHRhXNYg$IF>QhhdoNrPj1&qq6l271mR`6qFQ3kCO}IN#OX z!`|SV)6tg5&9g^mUp>BATKIg$oHQod{>yY}Ke!2H`$Fluf&*q2B0jstA<~DQCM`(b6tYo4QLM_q#jgT{TzMIVgD0>hhAM zpZ`}!Ka6nE))Xm`C71JFS&hQ-65`ccBZAX4y$GdmKOu}}lb=nKbt29Eu*=TRM|VnG zBYWPtW~3*aoCy=&SEM!J6Pw@NFKr?zr=8rX?JlTa;A!VF#}$aP=K4$cy%Z~5TlTxp zvm?Ol2yg%DcSR}^#LCkzb=~iv^!J%*7Ek#`K{P03C}{g8!LCnYlp0PWY)GPu(e>cW z;0x!{>1k^wSHQ%#8R7Fw5BGjL+BNs?V%$JE18P?h{S)I?=Dt_x*DtIKA<;b-$!|me ze<9(Z>)G69O4ZriK64j(T>mW9FHbD`ka#E}J!42UTJk)9CtaN1WViqDaDCSsJ%xcR z(K(ya!-asg*N@3Xkt_UM4E6d=q73a(?5~Xf9@{fY84f6UTG&IZIJIc=boBIi!q1BZ z>MZHVtvI9Q4d{$Km$t9fp!9~Q6Rxf@uc6JNAEjR9k#p``9lQfeg!aTeHbl7m?m5(F zp<}YurI_-E*uNE94^R@dK#>G^Y)us}1fYLt9L%td$uUM@o{5IHxTdG1_caEF-n77k z#U6~-j0by_bS- zL#1Q78SaNhfPXZiVRC-J3UY?)`k5AX zP_NOq_9XdkPV=Ohg^jjqQRZjpAQnmqBrVAgL*M2`Eo~@gnixm=Mq=p74d!z~zf*7J z5L=sxI(i}HDb`9wdXL(^-aM1wOK+wjv)-m3EObDZ>j>`DsFq&J4&zxq8K zfSyUb_(FldYHF~B5A8w|*?qDrTS=uf!0|_UosD8ids72Uc_&!Z7ow`_2+Xf$hF(gKgn?8FCt=94h_O zgn@qr)SahM?B}Mfztr1}0QDV_n(^qtBT}lqN-762GK5`>>>Q8lLnZmYkP~fY5V2`6 zNWWtWCiN25Wx7SC8n@Mi@w=fR+Hr5>OGU;r355ru1*t|%%D9~|b9A8XtRGKlJx*sO z4D%wilnG0^L?lQs)HU9`zoeWw_=f2BM=oH>B;iuF(l=3ZZH40SE02l zN0z8}DLoW{8RuDC0rGr-7ii_b$l=zh7u1!rX%w!P==fI(zji!#a#ML^D(|H=vhRfZ z!avh?t-S7UZj*drBD$=D-T~m8dx8s2^&HMdg5ZqOO-s3)rc=OWve-A<79}$cZQ< zw~*!ap2uLFy@?Ieq{E?Xdh(fjO{5xJtP|u^@APFAE9so0zv-&sy|V?GbcqDzNG$F- zf6x8w`qp-@`X190m5Bhfum&BI9e8Cfo16^nyKKOm@L=0@sN+zofCP$j>&OHn<@Ewf z?yv62MMFFnhr#*;&~ts=lPddaT(hf!jfQw3xq3_S;BSQz{@}=8XM9mR6`a@J?KZSj zxsj31MUd@vL!Tjx!Z?BnNJnNjQ~117_d1#A*kT#WpT!E;u?~|~9sUq`uL7f}2u*7d zw|mw2JKlgk`1biyx-0>+{ngd40Pke`2*Z)|gVw$KC47GY0*WyqBsa+^K~S)dF>!0+|*~w!AJjMq#(ZWpn`hv1PQH zy-68`j0fP##Ekuwq--!FEi9A(b4e((y3ytzKjvuyi84%FdLk=JJC;vLjj;0f3hZm6x zYMhcOSww)vn_hqautSl~_MG5wD*W)r|~B<~ZK zb03n_(vxJ99sGznkT^D<%7G}DNJDz?+GX<>a#bSLsP{xPL+RJrsL2|Buk>Zi2inRH zL0cMqR49i+jRL5b4207SmgZKfbWd)L$nfQor}`U>yY?H?VjA90C7Ld_)`{#SqtDKG z6CjJvGbWLO0(ZDN&W=o)I%5w$&gyQRw!Yg4dn~zD1f$Q636&@pUix)$GF9fp&@%On z+;*pEa6r5mA;Qoh*e6X^Jv%S>G`dEe#lb)1RmJv*W@g&y`j}s;oXnq`TbC*=L4;g} zt207n#o_Z=PhleO2g;53=s+$*2eyT3uptM{XJUc)-wX2uhVu`E6UHYdAC?mgq%{A$ zYRopssOv^edHn5{ayGG5QL<#13~%ej2Ka5vG$kM~`Wg#d7=LTOSJr-w7S^*B>*+@0 zC(Fg#L-?{tUJ!n(?1508(z=|~3akQR@dV1s__qcdsJ?nC#0|F31y}68EGa!~w~NmB zU)A|c1gXsPuW=S3Wf*Nxr@G#R3a>f2;f!9XmVrqFHo{sN`n~hG*tP__eVPLQr@HAk z`UH@E^cgZ-WoqjkwZXcA@qHCQ4Y9(b)jVqbS@X1td)9nkr+NQB91g(IX01M|wKnKb z{M8euN6(r?ac_iz*~q@2nmtOJC&TWvsOgZg469Fd!1;Q@6xL<_A4sW8nlM1f)dJ6M z5U9d5=1LV`nV%LSOFZ_q#KE^k>%#Jnsge89E7r6}IhP|Lwg0|Wr+{5EV8RI8M>bFF zdJ-4e^7+n6${!d~TVvR;g{oXJ+U`5?e0A3$YSYq_1{l440e z{-p^?sClujcp9T?viba|TEE=wP|NT#PQF>r%%PyMnrEf&zh9ZgWaqkC*W6k4;03v$ z@`1~}`YMS8C6P{{5$!0YSMf)DW^AKR?&ox38~G!ZRvi8Xp6sx94Ijv9tjEbJEq>V7 zmR<{xNqp6~*CnOGKhX!Mcc75{A|jL^k`Pi^Brwjw{}3LZ zNUdptZr9z~d#zirUkzE^IDXid!}A}c{10>{6{OqLsS(KfAw^#=;e{4_+Vo6+BL27D zZ64s@XWb|UC!pT{8^APXyWcyR&nN^nHrdVesAgjmzH5qJRf}DtueYPly?Byar?ng=FuPzF@RyV6{#>gJb7n<6ddnU;33aavvw}opHdLST868ubl1lX zCGq9J7e?4pdjA^)8ky&Fa@QWbP*X`{BK|a0Tr-;JSF4}TC$~_Ywy!^rSkX(t{7-Go zS0=3xAcV9{83#=9m|o@;hQWwa?ea22&EiWOr%m(gbNBwcB1|&(hDw#1 zQFCXG{)L8%FDyc8JMI|~=Zrq7w-CF{QZHBkVE)4j|HabPnCT_i(Fe#tSKx0DYJ@$9 zQWx$b@~tsVMC3Go2E$I|BWS>$_}0& z6~uat;)`5a_HOKY>@P+T+`=f&vSAcc0B(O$s7T?=Ty|`26wgI}z}arL(mV87xWbw9 zKl^5t2fFt$=Kbg<&|H(#RIau%((BTpYeK+c9upRcv z6OEUCUaQzI_i0^&CVWxBI?vxB2eAUWwD=ZZR}FIHsGy~w>|Xj`fFvGlwf9#F4UQY- z;~5G18fINp4z4H(x32QX#_xtB_QNd7OT+V>UxNo2HdQA5B`WZksIw{gtsdI{>@Yl3G>|$a-tr`u>l%wQb3o8q_S@7o0P!4bQ51>NgX8u&o%ZhKU0Y^KH9-4=o_}D^AYfvIioZTHc4@*84h! zXGsa)nbZxhMhX*uX(nS|8uTx5jp$FR!LZN%dATHAV7&3`i!A#~dciOnVmgBd!UMt4 zGo96TwU*FB<+jqpR_!PfN)!;F65r2ODt*0h(ZE02fj^rY5;Sr8d^|LX{hfs=YgVq` zG;4waqXI2AG{SLt7F+@E^hv(3pudC?0R$1~zY7hBr%07via^EIPA1y@kX#@xevx&x zC^33}|C7@LYvq!(8H;@$RYwelBmCT!_C&z|7Kh4bSs!V)shM`D{}K&=YejjwnT)2S zPc?Ft`aArR6F7Kq`behO5YWm#PZ?KiNGIRK*-KXDXn*K0TrChIH_r?IG$7lIiGtDr zfLC@BVz#72Azb)Z50QTf>{4PVLeJ14smDN>xF|d42Q&qXJQ4r*JyHO<;Yh}bK@xn@wM<*lf zdg95wOP^W#j&pUWW=rn-?<<$IB)ocvD|iO5^=^QswE&Rpt{wmy?gh7tz3u{_yM!Nf zVieB;)k+cdhtrOrI8uWY5CN(bZW>FhRZ6tD=W0-l#SX~xN&6nV)Ye3Fz1rvZWwV&uZaKl@WV54!T(T6~2qyXVh ziN-g&j+r&cNki>Qf>FM0x_7=tBlfr6ukehtSO^{p8(}8Q15k<4!Xn$5CYJFhPMVY! zQjM>yFnVEiVutS3GY{$dqP|28$sTl%SEcRtjJYjw)l|P-(NB&j^PgT9^y$i$51$-* z#xtOjA@Sxd*1zCBG>Fv`^8VXAAKwvBQ(#Abw9~LSsoqjINV@U^kc}c`yQ_;2Bd}Kk zRY)E5Gq*Q}OLMVk6T-WSJP}62>~L2`!+GDSxeLo50FIGzzZCL0_RGf@znY|)w=lzl zw%D`t?Mg!NJGw}UiVDaH4n9)}0FEIA(2R_cLRii*VZ!!XwS`~!Q{ccO69tvE5eD$5 zcVQM#Yj?ChrD`Cj;RBt0EpG=cEWijLSAsMOu=;9^wcAgIMY@2NFhR0tG-T>EjgD@8lLpKW|WbEse_rCtrLiv&~ zBtZ~|zXUA|U9+l-S;6k}rR6_{0sN(4C{08Vjy=tS={q}ISX@n0gyi#RfBHphmNpJ4 z7f4S^7@7tODwUd&u!UZipC}ZtK(P50X`)Q3=_pZ7wt(Y|f>QlV7?{h~P#1-M4RBMn zM_(o*2fC||?k(wxU2kaYKJ{VmcH8+biq43pN&WkLxX8)4w#D?T6YlaW%n|^& zIgXVfeRDE0#=RYN^%ksKE*>8Vj{|LF(W zhC1!y#4IDc#fQDaELnz0pSmyJ8VOSTnDpT&?}rq&sPr(LaziD|86`tVABVhH;VA&5S5N7E*0W%Mb(sp@1_8V6+4A{#)~Uq} zXg@A6Z=YdZc~9q}Xb5O6P-@~^aZdqDXSb`fwE_~vZjiU=a&a*3E7=n;+Oqmb#onDe ze|P0BXJxsfaOr#!m+g!<4tRhOrU?omL#mP<-Yl1wGB;2I@$Ui}!V~iEq^G6dq=%MH zAg#1bpPmi?U^T8VcsQ1%?#0GaFB>19lMKRTv(g<$aB@UMa)StbZ`r)4`#ulAcNj1* z>c5PPRU8XR1bUn_Rn??imNO;lTcqry)hYncL~!L9Sc%SPYi(JfVD-nW@DNSf_r|B9`E(aUKt2r1wR;)&X)7Y2}szsn~!IlnescnM$ulO-p$c)kxbhhy)b(Q!n!T zd@ZV{kKKIe8|!LMe+#|%6BFEif9+m;4jz*J2yvUrtgk;m99rDohX{zPP*gb2lBbmI!r-)uTsU2Yfk1VP~k7M z?Rw(=Mz5P{jV5x&_KI47jdwh?yJZk-v#hlWA44}CoaetDI(6Sw@;6d-6P-BG?LJkH z2YDxql@nz<%7J|^(Bpm!Z|M<;&ZNUL%+D;)@c{hA^7^4NyQ@m9nX%6NkU!=#gyX9aZo`G0)obQI6-X!O86R9?$HQUQ9N-X>Vt^cGcxOF^SA-PX-g| z2ivBIoPZ@)r+%76W*{3NJ7Sssg90H43ab1Hy_4?>#e6NUxGQfk9oGqDaj{x{`Mq_& z_nEUb8)Q`D`+#Yspd>GF>>uav87%LenVT7_cb&Di-_o@NrIiS0=-A7Grp#&m+>M~#1QnGyy`^#|m^4f{c0=FN7AhM-6!g5)^N{iuh%FvmA zhLA*t!uIPy=Brd+Khxx45C4TxPhCtEimPEei_vj1x@Y#$xaX})mwO2K*3?BZ^X)U&lMD`IYHTlxLs%pyO#yc z^HaqOxlcT-*Ye6ReSU(yy$Fs9F0NU39i9ySdGgXlT&;Wrb!>*XIA94lTBtF;yb?e- zigz3U+zYn_@w5N%B1(KGWQ$0!?Ks|w@Nhqzr@#PZlivy_%)309kt*9udp25u*eh|H zr1#7R#ul(eGBhv#*zSF6!s3B6RQ)SSKkX%PG;vMho%{KED#~QHRK%3isYNS_HxfH< zQ)s@D?dv$!8t;f!y7|e$6hT&Ce`>6I#+!A9V4?K6kCupi6?j&rJT}su70IHcVnZsf z!rEdOCeLc7@*$b1nq)>o$^*fcHT^J@iWP=4RK1&Q#TRB1*yYS8giwm+AxLWRg0aYU zttyR?k*L1Oi1Yk=rpB+jn*m<)>Q(l=2%TmMndk2w8~fuq3;Sn$xg1+$Y2C-^hN}I9 zYf4htn#Ouz4HX#%s*A-xSOEJMvNW7=XW97j{%pM6(v+IFgJJseC{NcD3bHQui#Da_ zT-PK@;Qhu01LcoCu?2zMSB$m(=EbgzTkea_W~St}h#(p&mylDn#g?)WubyPz;yPe@ zM8NoI4!nE3m4ON><~OnRk?wIYB(Cz*{bZ1k_jCN~$-DChBW)ci)(P&hz4T7WF+a7^ zY@;5M$p%MnynEX&0;1K)j=5x(OUit`c_H$BIk^#l*M_WXO-4n`hICFq-BB@?qmjRI zZ-Y$pQ8g(MHD+?ZHJTH6>cor1aB?-t!OU+&CTo8uiFzQ29+Na(EPbG|Sw4TKbg3~8 z?>VK^5x4)EyEksjcqb79k*p!FzP@*QuB`7|v76J{9{+L-$%`?_{!oanqRI$}-8x?p z+xA!szJPz13 zgc3p)Z?J2a3)i_&vF}ttuIcvYzX`MQho}Ln_5Jlr#g2xR7Ye+MG+Y_#7~I;S`Ic1g zvTwPw+RpN$T1+abqra8ctZjrd^OyEsMEGih6YIfyOUKE!Xs_Us8bER|SSnjvM0Nt-NQ2)T9z_*FeVMB2}b8 zb-+deijI8oQO3ZDW6JJ&BEz&7<~b5Z#C7bM%d@4bFq5;wXuCM({i&`?PVS8AwBBbw zw@*EX^~Q!_EF^oGc9xi zBC~tZZV2So(QQH2H*yftNR_r0Bh~ceUD5!6gm81T&f-abai;&wqs#xzvuUl|Fw;<7 zUh`!t7^^&y0jnyZ6tC#zY*kPR@x{7CtPl5N0#ODmEq~s@z6b$Lb_h%20P7byHZRJz zHTIfZq;@KtWM-ivtZOV6qiTXHeFgXW$fOAvKEWa+PTpnvsk9|0$tUef>Z?jP6|#mj zk*=1q6%<5rk+oZ$5{@6e(&Qw4+EU!rUG=y!M8yO@Fm2ebPZZJA*v;guE%!0hg>EG2 z?Tzb^OLF@0fiZTh8l>6kD!<5#2B?iqKuq4oxJ$0Ag1l0d2$o?}>d9k+FuS$^$xh8F zzjR-9nAA`lV;tGyXTVM83u9ZSZ9w6jK-h~f4=qB&&e=+oB-?%^72`gN1<1FYGHD|< z(!>#e*>%m|uw7e!di~uH=ed>ATDhn8iH7^8->oxn!tQm(ZNgx2S-ZoChv5VWYHVW8 zdn=7EI_{TGeLQ@Q-~v41Q9U)|@J@lqP$+~@PEpjeG1{O}Q7&o%u%tLal1PZ|6In^iX7h=6mOX^iLO2R z+h1|vD`IPGY5k;tq1(T9Aj(f2+vzx)|N4C4BhvHe7MfPCG;N#O#XskWme9FoiF;|5 znc)U2cYjMljof>)^S(8{jt{^>)alACSU$R4OZ4eQ$AV8{WG{s{>k1JqlMMJb=63Ky z3deLFOK;M^oa880*~-o%$4`ih>1x3UqOsT3)&w*ZRpqASZ676B!&(|Vyydj6NB&@0 z`?j6vnlR1>lXoNcenswwcvcnRF^EDPGN-xo94t+EoMF0J4Et$oaN>ZGe2Nc2#N=Z%3yIgpYA!DbK{fi zBeLr9SJ}9dl5QIrS9=z*P@AeJVs~mWGrKwWPLzoIF#0|{&0TBt#(^_;qr%|Z-fJCx zIA#e_9MKjVt!()D2Nu+3hHyF1<}}1DFURpTJb0XY_%!RUEH^dgVk#NCYPtsjUE~hI z%#({Vi8iY{is{}P_M(gBz=3>8c{Amg>-Uo_Ast*(+c?%=Q3q<+W%8l>E?Rf zDgzK9Mnfz2wp$|3Dh}V_={yJk)9z>L)K5vpuV25+cNp++(!iSX}T zRA_~a%TwwWNH6JZ$UXNm{lH?$)xJlf{)35z%t(0TYCaNJmUbGMdtH6=G_jNk3djWE zSIU`u$<{Ecq1kv|j@5MOj=j?Pvdfut|KM^0noo4$0A9>lv*V3ynkKhGotg zln~M{1*1S*U!6pRwsGVgcVi!Hn_P;1cqo%`CYn>Mp75f4{gLvv8S7a@(9lp77sv1^ z*>#Ox(IwaFfqP4+2vWzeP5+%-KPl&XPb$wCZQY4#`A0eQ%X{jqk_DyWDj&pKmo${l zv}9kJWTlfO(cQ^75ew)#xjmx8ly6oZOe))Cr9&+E;_tIqHXhYC#-7|^5pUBBIKH3! z(o-`+cEsAfH6h3VO?V+Knp|+c8($q5e?GsPmWD zL+=H}FC<8wGS{UFt>`7Gk3Mwg(W2SMTU?W>BoSU;M=Zv_^Hen%VqN9Jt`6<7v-bSz zwN@5htYuGtahug0R@yv`G15z0E<~04H*dyDZl@+?uss*qUA%4jvC3EH7!@wR!cGA1 zAfln52K-HL>|S7++PRldRq>%y+pBxt)z|=g+2%nOF5E}b;CtsRqX#7Myw<=?r;#7| z6qJ^6$6T}1nYXnqqlbusGwM;xGaj1c`~G$=J`Le37T3x8Dt>K7x72l2{A?l!65hYo zt-e496+pC=;7XL3nB;e%7kb66ZFh*(N(oXD?B$dCoZ(?Yi{0U72!GURlc4?DY}eYC zr-=N(d6hE78>zzOC##cDO1?U9iX%qZ zf!x$Gh`_GZkpWf}=!=ge74@U^8jQ`0k*neHE?*+K@!3RD$p7jzz$y`Qu?v3OxB6E= zSC#q7zNqQ;K?#P2oPHTOX&Vi%a)=+IUyJ~#S)39f@7bD!b2Rx6A2BfFgOj_dX*X{! zp2fsJuuHvTs@)ECJ}wy?F&)?cI+(gZqP;+JAuTIM?^Pe3_-$A7ZU=PG&@v$ zUJPL;Vmz{mVD(pbsHpW-PqTk)Y@r@lNsoarKq~QFeR#wjv6MN=hp| zpdc`mltT?&0#YKNbV`?$AWAbLor54D-2xJlBOyadi-(+r zSkfB}y|0yG?q-#~NhId$T6kbi?s7`lyQ>{HfC@L3>sxq>nH=MYeFc$L4O)JaX!N+G znYNRe;*RO~#^%z^3;}v7n=~9JkpXWaR@+6{UO|h* zW`1OJ%%5)ib`y_a+3Q^mh5S3eIXe~Wo92d{Y*nTg?sx12?@S$zfGot%_#C}e{l7?40SlJt-@R9XPy1|q9%qo|;Qd<2S3s6QrMNans3bKPG&vuT$wyBCTVL!sR|9^uTr_ z?Z=EIw)N$U+|Kf?I#%TaK=(m@Jyu%KW4f{b=+mZpO=Q$bw3*Sp^B~-oyVvloIv!|Y zXMLA7CjA}$G255himL_U%yyyA_*SpwDVN1OiI9!!|QIeMO;JZJBx5`0kCJ{4zZ{cRx$Q& zimI?An|>Jlcky^zYZr{UO2-r5hh@F1T48H2O$I?1-Gs{c+Hmg?lnbr*0c&}_aJkW* z1wHC+6hEL^e*M~7qvREvHDJhCH6==cPTx*=d{ynK%Q0OpKJ60;@cDT_r<-we0t+4i2Dj@lFAL}B*o_c6vCAoT| z6Bj)`nD(66!}-|L{g0PzKn+Gz%A#r#AF~mNKQE6qpS#nEx|nBIRsTMA;s%LUbzLqX`jaU&?dZ6Iy!z`{nUBbtv!zkf}uk@u2JIc6>aD~Vuh^G#f zqwb~}gCw531AQz+O&Qc9%1!`fTg4??x#RuS#9LxZnG)(HiOVTK;m(4q?pV%>;8EVi zpdI6yoDV=kcMl_ZAsR*hutd`oytiNqNsY@{7+1~+0D`Cr4B+c2706|OsQTMR#N0u#Z>M1J)&k@8q6 z!wPdHI#5PH<$+6g`!E8DzAjGvHT0I+I0+Z~_Dh9&?<}~13e4OqBoch-p!vgl29&f1 z)G*7wTOg!y+5kl+=M2fxQgfbjVH~-B2jd+3%R?N~pkmM<4c92J4#PD=r0`oPZ(|;k;N5i!b-r{ z;K7$kQ2V!gu7{6V|I&Qs0PC#fWl6-T;@S$2Uq5)3lmTSC4U&Ca{-9JS%G6)hSo>57ZY>60*1|b;s%K8p+)>KaspW)H(E^g@&hY;e$t@ zu*ce%+lY={4lWhDiP-h+g`yUmUG7%3Cq5wS0?|(mTu8g?Bo7VbWK2N8Wr>~A|Boxc zzup(14pHr@lp+;_3hOD=4~7UUml)L?EHs%CyyH9k6%+T#!;%K4qd5CPhe$#X=|g(^ zGUv}}gaMI}qgLMvpxd>}fGD_^yQezb$f zg@j!MT_vv2xC1{UeMLwRoGg{;P~Jg>J#u?M_97Gk9Ed^<32ocMFmDb zH!9buE2bdYzZ}XM{r!yZPl?nNR2ZK3{F&Y}XE_*8`VjbdiA8Y3Z<{{2z938TNRYUF zdme>>I{Ssv4I)m*Di}*JuPkb!}uOO+NCkchsg;D34(|ugDzeEJ4yzMKrV&+q~ENHA{UV)(yzUw6$Q<}S%T@6 z7ah)JrS+>=kdL*5;uL(AF~N^npQ31LN$?M^1cecfR-$2(oW)k4c%?grlO>KUE2R0T zgLfh^t^$Dz|1KY|mZD>Xg5zsKElY?@vEZZo1N`Og?HJ|)Zz>Yzj@mI#qd1ZQxwsqK zJ)*6NC$D#nH&S8aBq;R$?-WfcbO=+yGJEu2IK=T57^%-ED)jH2(%R5s^&!$aKRp-q zj@w z47@Da>a|RYq)MR-USLF5NjQIG!&}Q(HB62>GiQTaduNb}u0@nzVM*Hc1NFD=uXrMz zSM_NhYQo?Y^PyXJ%S#zDGFW z-knJWJ6)a#_nil7CsDa#IbY}5VnfN${A6ljDnIdK{o1=OK>GU67ZF>n=p~u{Z4U+b zRdg})7$1BTT*+0fU#=VgrGeyT@Z;ySOe)uC3Fc?(IEd&Hgvn=TlS^@B1H9R?W#uM~ z4@k+R;Mb*Fca0;H#X2v5KB1vaz?$#_F0#$rHU+Golc*@>YuWEv2HR`BAdx;&PR(1~ zbnZAyOLkQT&ikNnwdac>xzIDa;_8aurmAV$_yVT4G((u94er01az-uY(=ZK(KI8Xa zv4}+Oq6QT*B`5egae9V3(J{LpF@tXDwao^{zabHi?=75RxG=@~OFz8poXizi*1e;d{sP|MwguP&GnvwZ<~O?G1ts{&gR1%4v5w0W z4-)JcC$vh=dR9(*&f0}{5HNT5g|8IuF~uLmknuJIT&suj1|uh$0i`)JqhjyGE_D1D z%ES<})fM$8f8%T3Uo{D<7RdyOXyK8;k-=(33f%E{Tt87&?OLjZCEO8yAdzjSI-zxU zs35{-G25hW4=m9B-oVba+(@m#BFiSrN*s@X zt@-_kefyCw-4+vH{$(S<4HxN{XEX1ki|1fKAkEJ8R^wiMmiuCM1HS$;wOZ@_aH0L| zCex;>F~~uOtJMUD;lH#TFd0-7y(tTW#AF}yn~YwQrM&l4j=nlJ2Ar~dsTu>KnWEky z$F+!h{ZcTD|N9qhu3iuP$pv6Q=$qGJK;?4}3y=M+DfaRn@9Gn($@2Iz7T(y>_VkH3 zs+Qa*;$pwPB}7uTSqMVOK(q>q_Cs0`?r7K zHJTwjH!r2{ZpP$;pfw_=Kjs^Aaf9!7)aY^#b%ZH#thH8sZ)KEU&jLlyl3|dFcTG8O z@(vy1^nZXmw=h8UrFV!CWosQh&ruAwIO=+s8(&JHPvcH*YP3I6q&e#SiprJod|V*A8Tl&SY(b|}7iNnRJ~tAoeqnf^;k~E%^z412iRiU| zUs6Dioj{LxsoDhYSt~>T zxze8odIWY#3UE|EaE8}@2a-8ad!4&-8k7dGM_$2i{hj%PZn2Zi+{3jWj)>UX2H7R>rdx-?+{(YK!f$f36;o z%EujE*ejX=;kTH(4Us_gM^!^?{CZi%roM&`_Hl00VyR!kdiVLt>GyfCY5Dtx{^hRy zPGxNlrfR@f#dQXQqKHY(c4e-Pm}AZpu*7^(&U4&evBVnTm(P7%-huk}83HccflM%r zhA7!O2kcr?=xs{Z%F+!0N@2duBRp` z>?t1oHVJ3lv86a+Rr{(BF&P2h9X)z}TNQ|-KT6#r>fSkKkN*2XE_;@_|02u`Eoi4c zNv=Rd2ZRg=IN)=0tnWv#6acwI_E9+1;SXKd#24Quyfd{VSg_qo@BQ}?tCI-=6>ix$l}jNU8%;>t@dVXWxLavl6)N`>xu zgc817p`G6GaI)`+=h_3^OG-w=F6DB`dUq2=bq-e@S5Npfmz8}h8GnA)+w)pQ)lUrB*;a+EQ$*Prx%K_(Ip+pahQldjv zsjp(sLY{}k45vAAg|2|1I{U%U(ol7aDZ&1n~j7T6cC70J^>UyGX z*cka~jrZxjf(6uheYcr25{md=f|al;nZoBwGaLSFkWxR>%ave6H4Al${#stuSYl^B|GIY5 zj&|~K$JYNMx~seEf)2ju(+}@Cok*eNqCfE8uiVp1FDl`YpDn9JjCtB;I|yc(91Xw@ zsH6NoGp@fWj&%9=GRIj*aE1&)7Hh&p&NSshuEeFV0yyaZl4=+%q}1smP3rYxh2&x|TG+n(4pS_TG(& zqH&c$b;Xa*zX4mUJi|R5*LjGg)vq^`WEj{1dl; zT-D?cxc$^!oSGW9GsM-q;6&)lz)qxuqdV#No=d_0FYMlYLk%e%!6J{#^7=Bb zgSMSzuvXOo5Sbp8)fm|Pr{fA6tGXbmpEQ7-c{z3F)RM}Pn3~6auOiK&CqYQd5$5i5 z-V+5#;@ju;xK&Xp;ueUr%}B?_TexHOqvcv|59#ZzcOTdL3hqB(rt&jOt?=_a6SppH zI<}>HHgo**%OK8XC69vz4WIyTd-hkdrU$xwxR*$sLcfAN?w8r^iDYPiP5ttS!7_;W z=7hZK`+>a;_5V2s!pZ_eT?loxQg!|JJsAu_y!&I7fJ{|rc9TOU*R2&RH-`}qMV0m{ z=jmY<0C2eDYJM)Q1gOPf|iI*PDh{ zVWk0{{ojV?5v93THjz`DLZxq=M?|MUgz__L!*A#iBQ1%o^FkwQz(!S+?Q@|#U790!5%e%4$jJJV6X zUoL#MD|z861{~_H`0M-p*8Q1PKtP^%_t7hJoP?ZCs5HIHHQ`gXkDAh^xcT$HQSW38 zb-Ur=N~f+0w^mkdZA9a7PH6^|`)_nS*I{s5H^b`&vL-*}o4Rs9b-=|QBgaj(fLeDM zDyx$z0q9w?c1Vur+Nh+1_jIkG!>94P4!Yi|9r1XgDN+JS70W* zH@Pz9Us|6S?VE4>dJ&zg)3R!L3QPi%shv5Vclel!{krn^zHdD|zcN>+p{8-+dR$hu zk&``Gbk*@R1a~_tL`IWUZ94#M?(3M)n58gm{f?G>JZ!+!h*B-7-N4@P_`7m*MP%_r zf=$s^;FZucv@e$vn~xNrV=uj#AoL5IXV`!f4@G*1DotF!&ybbm$@pH=VIwb2;B>Qe zl%)Aqb2d3d@~ia|I&oL$p{^-|_}3@;Ld<7*Z3HOEk2=j3hZ4@ok#M{fRTT|d^dtVXQ%omUS1^3+gGd?d;G!=z#7ig;d1+Wyf{ z;j*384Kzy~9B*Ax!=PMh$XL%~vv7H@n&M>hp^fzMk7_e*gx^VCu_H}lZm*H3^Vk2- zsc1l_0?4lqrOQzvmtxu(g%@psx+Yn%F`I@)DfopBW6 zZdy$NWNGhg+m>bA4AErsHMP@9()X9o*0;TVfeCfJ4%=tD;Z} zy($6qW-?S70cidbzheyH7)K$|s_@9Uu}W1TaA?>hPC^!x#sKQj*OQd1yI%Ur*)lql z?4IbxY&6C1*t_W|=Zj0s%ON9mh67C^j6PGMP`|zJ(xP}_m+Zc*`1&p{D4#Y?)kwIN zeue0wpiF)T!5=?sxc?HJAw;cx)o9)WzJc!psRY+NPt*8*^6H-bu0%hIbuoYYeQ8Gb zd`8p?PB%iDacVkKCvfX!icO<#sMGG!#63M{Z>gt1|ebv`^X2SdbqX z;W_wjK7XQIBP)tE_Y2W&mf}@C%+}_u0^b6=*4i+sKihh(apgs!(jagiRcN+WZZ+dO zlXkMVxAIg&6$$gVZtC1SIhQ5KMLrX$5F;5m)FpfSU1hLfw|m>@$+X#wq@%g<%3<<~ zFT;SV%U7>t5i95V26W_J^~(8)le@!?^ZGO|;?Q*jdvO*uzk7D`l&MANxKvqW$n#{s z4Ma&}3P7u}`cfIChoU<}KoMjfE?f6f%qsNE?3G3r%0Q<5PdBw?E>ahhg4WnT?&=$j z28dcZy($y?Mcw(}J7zAO;K`y+z)`!aYVbAv3=}5iWH}BcrtqD1CJdpfHj`g+azgSM zCL0B-wSu{}zLz*a6`&11&9q;&K^b;pT)!d2;2WVLDrNk-8?LZ7eq1vh?#kuwh>__T z=fz^MCIu=%Y|ERI@Wm866aMg3VU?~dRc?NQ9`WqJ6uPD%tkC|;S4J9T z3}LJm?ctjbS(b_*N2M#3=Y1>B7SXcqx6V(hUSM5i@RKCY63ME3xXRVB&36UZkam7e zk~-5qI3nw2;qkSStMld^c!x=S?lrb+c25pDTTS)~n_{DVyp)e;1m5KxZk_2yg`JZv zG#4IgHk&HB>n9#2Ckr<;9A^|ax$aiyAGFmr`yGVhOddN{U?0=Fn(d13pl*o&065cv zqk|vsY2O`S#U0J5Fk0;7sn01b-q&Unx!fR03I7_Ns@_2RAnz9)C%?wVgWfTP3|}HyOR=7&NA_Xy=9L$r)gp zGi1ex1tCH+Vs`M2`F?`Q1ShB_Y_a^asO>kl<5nxHg+*7w;PY6jPa*Gmf1snF?{0q_ z;A3tmCucHwu7$#nAc9h)**4ofG4rvu#*{mF?jG%tj9^V|7Q!<$%*emDzqhan(LuEY zul2-lEnpw@?Jv}+OmJv?)sfkF6mRXPCxku!Gv2oA8q}7{(~X&XyTY*H)e|fcXjzm9 zlVtr8xO#v4b-%@wNj{tceLaD~2$D!|3=`9kNq#aTX|2vaMYU)ZUkhWPpfK%ZM8jd6S9O1e;&Y}dJ|kUVtrgxEv6ePdeZYd}8a&nFu_7eyg& z`6s?dq0-BlCma~NmLr3du;-YgX3ca0|2Qdbtv&=b;TvLPvS!%(8YRA6GIizaY|6@R=cDfG*~;(bt}nf!D=1HX{5C#64U^qHR1^q2 zh*%M0tv!N$kn*XnuMw|oR*r0_tRJn_JDRnU5>k&2fV)39f=LZ;k6RirABt_YUBTOz z4I#0m{t?=(IZ~Z$%Ik8pbD{Q#wUl@FcC}ql7!1&YWy~nKRwTR?a-Ch3 zg)^ZGS$vuu8opSNt?Hih`a{R|^YY>wvv~(Q7FI!zQ}bhM*mQ%oRuHK4{OFWfVVDLHtW+Tr z+ErVU;zTws^O*lKhW)N;WRg?kPsT8`&#PC_c-txh1NYVbV07li_qRWLOKz4xKC50g zDL80j2 zS|wV3di$4)p;fz+6)()#Z}@xbObSVy5wTRf`Ku6m>Fw_EmC5!R%GsU0Rnp+j6;x0y z=VuD*`T(1@qtFROnmDF#EbKSImEg;g(N1?f8?)73Z@2Z#k6@bdXD{BYRJQETS8A~N z;_$#4v;8^?2^`(i#IgFDZma07|1(LNCr0!eciKrY6}J+YcN<^-c09O2H*=YRbu=C= zIKT^Mo=G(+hG8aQ}ztA648K5H~E`b+rMFt}boa0(yIm z%zo=T7k~}()v(x91BjU7iu02AkZ0*r$vY=|w9AEw#mO+|?}mlcdlHgJ6X1cJpiF$-+8s}gue|O{3L(F@DJ>}l z6$_r7vB>>RA2|vNh?l2MEHgw`w9g*-^Gz7W4rLH=h4)T=%UDx z=2iXiZ=S-yF7)k17duj~>5XUp@$A=?>T@p;wY3ygV+GvBz>~YhdolW^5t@)~9SlM) zFvqtjafArI&QXKdcZV>ty!`Z)0&E%8sjN+~-FkyHlP^=R-C`Kax9Nj?IfwaeRiX2K zY>q)6i5}Ed{ZcdhkEHT{!-J9IRrk_c&!g8EW zyV3aXh|&{E-nLfV2*u~~ zHXhHhk|5ZPVZF8(dKY~XM=EU=6iyS47e%yP^H7IE6Rs=t!olNWm^o0siX_nAZhpLz z5bqSMMHiGf(OWT8KpT@KrJ*+$W2b~qHQPbnA*NokLA0TfK*sWpa(s4THO{WFiAvDNY(zj&^1z#dljN;6bIA1Lys=27%sns&nOA&my}f8@=hjd}Hq$i4wc-AAcji0})uCk+(WHZYq+v zbCoV2zyA1wS3bp@T$tZCg$RcJTs@uaUjUMq%Lr&3>rd;`YZP@of+e zhOPsh`)3U#47-^Cyx)wCxLnqMMrUc7D8z8RhE7XL-X( ztkUYmbg^g4;;p>cysTs9LW##Z#}?Sx9!LG|^e8As6z`jPlGXEQFKd^K-rWk~ENu#_ z(kT@g{afuWEYX3OEw4+A%(B5@?12)PcDBT@`4sACRSsRVlSA7Nhk7I6i$#U|>ZhA3 z(gqV%ETlQAO-a95WV|}xN;*54m<=ih6slxGmob}P2M*3g7JM636c*1adnuSZOZT~n z;cVCaV=x9Zo$bLNh#vNACw+2l5|vbK4|rmP;Ou{$XvAbK8qm=HHu2$>Ow4WOz;{P; z4FTn1)OJP^VhUmU9^HmpBD$S>$h;ftWmV)LQxFs;!CUwH*{Q2LqFi#ruVfx2W5#E#AYf3Gm?1V5gV0jt7mNrW+?9r-8BS9aPJ} z&MV-xRNAJQb;9A6m4&E3Uj%jx=6qT2d)M&Ev`3){Vt&svCV$u*SD;7F3;A5T>2-yz zCt;i#FK*t-myiT**Ysy(n}YcR=jGtT6;kV|)P`?wx1D}?eT^eTef);#0V$QyGDC$tKaKa_b*zndl>z8 ziE75EYJ}L}DEjwR_Ng{Pn`ng9?d@518Q+;Q5`3|(XB-0}S*N~zq#p3OgIYToc0~fr zZkLt(VJ<+yM%9`7?<%|gscG!c#8WU;#8a>+Z{R`jf|FFur=U#zY14{|sY=s*4kM0M z^A)ZGYJ^fvmR031<>AH`&VZpRVOEgePDqM@ZYOT*|i_df8&QEJuV9TX=r6<+Hx~k={oXqtrgCpFy;p$ckv+K~fhFZ^AKgWqVe{iPM zrS^wH>iO-Anv@A6xYVHpmbtr)Jo|Qw7F$LL^90I!J}QCmN`?;Ju^bcAr<9h32qi&0 zMW=N2g5&YL6sDbCU96>S%jem|eJxxtvjtx@lJ1sac{A2sQEhyPGuQ zU0W*OPpLe!D|v)!!+Z!8;nieDH*&U&HMN)5>m6x^pl2V%Lt))@dWaPvc7$wJNwD<} zNFrHD_6d!Kl~V{U)@f(GNHd9kcy4gD=|n%P8xy+wZu`wZ_J}8G&uy{|U-czcnc>Jy zg&3b`F+L$|J!9s|8edp7p;2UcC^4>VT#oZ!0 z6n=8t$($j zBWQSPhWt?kI)^Ss^nljmj@#qEo`Oz#$28$-x1p*5dHNiavlYE%kaJd}fT&t~l|0SW zKxUM-4d$rOvlnK(C8o~(teuxD7eOVYtkv`mSMv&M0^JxDniF(RB>cJ6Kc8}`CG+QK z*6(l|RInNOV;60J7(rvTwAp_G49$jmc$?F1iTr+D1zKfu{LhYsB=l|_e+BKdgS?;> z*KL19?+YT#g=HRxhBo_0Q1hyzB`xV+2i*WBxinhd?gU8XCN)3Eup?G=8V*|m`=lo}=$gWcRY>$b8 z5^ilqi^(NzEBE!W?)q#gpT&4RfRCof^#Lr=w;@Q-LV>{<4qPO9*;S&Y`-wZCQJDpY zgxa(OU5)yngO1gJC3mP_oS)INr+XLA8>f?9#$UwMO!%MgBCTFvpL%b1P*;lhfEr&Q z5{a}#g+B%zF#d@z0VgWx_^UyFnchq%V{~+Kw7beM2Hm~kqrbCw)}gpBfJCoLN}RDEF8qcXF`KOuv^B2Qw~lxI<{@l>f>4 zGOlCxaN5%(gXt0I8pib&D-kgII*Ea4x#l zz~=-@ZkPrru??_tT&L)vtlRbSR%cSbhV4#zJ(@F?iohf>P_8os__2gT zImTxM_OWWh%OFl;YV6!`8!N#F>ATlii$hbv*fSZC2<1Fh!k_<>>e#oQoO!X02v9Za zjO_Bxvi-aH2hVU9x&{{MSYN&bFq3U;^Y;IfY&D2$HF5*0keu1JkUU%s3TB+duy1u6 z#fU6rMEy7t2_b(ur7&d{>byZvk{Ia$pP+o}1F+Ve#&7uPyJeeACx7NYO@prJ7Yu(Jdcg}Yxn=v6`T$_Q z4JI388-X|Vk{74Gr7Nzl zH*wH#=_C$KmJFFj9*K4X3X z6;$%u>*#W@^FXxSH_^F?T_YD}KGOT^03fsg_x6xn$ez8*G<_#$t7U=l zgv+mNP-AgL?*y?3%EIQ~n*fnrx#z~+mpnN5v*gKGVoK1=9vg-RJbEve8L|G(H z7EFIaSDrSxiuGEb_-2Ek`SqbfkWj{gelRjzMI@4YpHJ&k5aH~bRnNVqi zSjwEw*~-Nm)Jh4Z^YMTFLqo<9$=lk*X(dza#|$A0ixic)fIm#WAwXt%@k{_d3ND=K zE!!((VPh|_v}MC&(t#a>5HgZJu2Hg&H~fzGx+q@YM@HZNs6dONMN^NGYfAa_37ARX z00A&VP0Rqy`8z%ODZ9v6>yITQ^QMD+?svu9ta+{+&%I*aAuaTkCjp;dhS@s+bZ;vx zM&EuA#ahsAE*Z4+X%h$EW0n~|B7RHtUf+<#UuOxPr+|9|hIQ60-hwSG$Ud^$9(B zzx(S(FxlY~2}!A{V_b#SVH#|c!Dm_o`)oT~Dbk56sME!uh2)CwIkqX(DS&JmBcK=E z_V+Xw|(tUS6A~xHP zm~GPcggTJ7&g4DtR3%{<1fj+qi7y>ZUQGxeuGUBI^g~q`!k*#!o_bnyBsf%qMGpy8 z4}M@V$Ndm3&=iG$wm^cYrC&2WC8G;p7$y?LzhZGj9(K9JhSEARgdd*>&9)5e`XP$f zV+=}I4_Q#12t4R@B}2$M;RkSE=vU}qt*PFOSJNxTTnspc}(f}4g$lXWgJ{23@ z3GkDlal~pbv}5(g>DIT#KKHB#xx3MiG5&@0K!S~PR%wF?nrtT2*^GrXHZz9iLkE9# zgm)yN;xhF~RMRK+%wcMOutc0lkgq$|V=TW(g&Ll=u4yla<3)uTJiB#GHIvj$l~cu9 z0sn0m!wDY58(yRw_-^c5BD;~%K&2I0V%xlq?QFCqnDGUBV6Kt}rFD2FGo=^VH3}6h z5sMP8$SZ@vR)#CEv!a-@KU5yt^=I^)hBopyI{3q`Cd{hMoPL0k)tUr$^xRlR-i^R{ z^u~&Dgp`@7VYpK}6&~4kHA`S8_V?*>n$xcp;A_6RAeN}f^jnO{_qGx1^^W$`-8&su zC_GuJ7Tb-=c(a5;Z?ROn&(Sb$NG8Bp{;&`}f}BhReDe&%r$hQoQ-pE^Q)2WnrWPMb z+KID*83jx!5liIAJDt3N?`Rghuq{DQcRMB90tZRS>&g zwUy!*mdI(#_UegV!f3VGq$*n%D4^8#F47ZUgzgXY4)Z+Kqe%F2KlBD=AqcpF#zn*vu5U*OA~V zYZ#nz@S{@PuC&o3x|7c`P|?(YbKZtZ+U$aX3-9K3Yl0s$xiu;{t%*IM4wIy~D{;$g z_L)m0JTPg>Ig97kLt>+G~j zIEh?Ld|Izu6|?(|gvGayhIn4ejZ7)dM4&d2G~PGb?ZSm;oMe7J%{Gj6G!o4`8gi28 z+Ub{RC0|_?x7&-j;d?H6=*!D_9d$@7X{`9$1yL4ofI1{UBtKwlA7|gpJ&w1@_BAMN=r%RE zj{v^QJ(Z{Hrcd|n&$vTzPZB o#m(qP=`OT=qX#RNVAVK2AVH{?`-xj{%nwrrA481g#;LUdWaL&7a+cOU3t-fP*(U>}`2h^(;m z>oQGF6#35v_32xg%<4u z=>!oT!7#B_zrA}yM*F-GFlWYrEJ>=j^e4>I(_UczG=$srsf#Yg z34&yv{PN0+t`F>32K8iq_B_KVT)?r1=PNg^r_$zVYqr#8t_nCi1Ov`beeH>-S!qIdGG$oDJ-eK zUtHNIhJ`JMgKQoQgy8~|af>24N&izjv5>==fPmv!l7OUJu%q9Cw!``IHVPRapjib{ zEV-Kj7bl|Ax1Yu0(wD_xU%cEeO9C1&-?_Sh63iSm;c>RVX*!1D#)AoLnlnQjsK7K{ z21|1LD(gGfZqU5P#UkCh*b_fF&vyzb&pfN`1fi^_$Kz=K1P{>UC}=bIiKkS2MpS&Q zO!lc+l+aFHK;^6}6c^~*Y&^`By(P*vGg(TYt1|@-R+l}SPmGQic>|IqO(yLt)x<#b zZfI#Bo8H)A>Fd=Q+^!#+F#-PLE{$@nBNqA|&3U-_IWHpx#5YItjc#GEt;D>lpmcU~ zh!>1S8!m8rjr0TX0nGIox)+rDMMSw@aY<21X)3=d*+dTposRF~yXP^BS z+di#;_y0#M4_w(?CmM0Kw=pe_3;ivFMo|^3G-vsYcIZYeGK_*F7gx}E$Ln_>*jO3c z#^p+E%NC`1&4n$4lMaVCo;(JwSgB)CFpR5sJq!E%2HeNU!g2MS!jL2`pEVMREh!k) z!9H#b^LHl;5`$3_i)9F~H{vJ0d}^&nko5tI3x9fR^&&{QdO(Y35-!f^TiT?l`{!sT zlthxvDN59laBfs~&BvltFIX5zOD+EnjL*>S2DMHvvTImDBZ`LPBix+F0RM1#C{J@p z$bJ6RBeTU67e^N)%O_k+)(yl)g>6mfPf4{iTwx}Ev!ebQ65DW|HiB7?0Xb^-BeF=d z84xoSKlOU;1YeuGz{T2JaZ%Dd+zEligxBm_>YYd3-lG_NvhSEH+j<M?pW{?|W9jy>H6f`lGqMo?qCb%lPqbLOTMERP8;$$x9U| zM8yzMQ3TV3(Sl9I3H&A_gccXB&4BaIT2`FmPV3K3F_LIMvU|+7S_Co+NoLVq6svg| zuL?9LI&rPyhd+3GQqrctgI-pUJl3RoplS^+wJ%k;zTq>9JJNzSG72*chqx3mhX4aH zszX$2jZYpwg-LlEmkZXAD91&`Y*vfEr~^u*YhSf$45e%65RZsj2S*o)xMJD{UWj_* ztNm`6m?zvaiGhCr58|Ub96BKZKIT}x^Z3A37hDd_uY-sS)g$6_u$H_zPe`FqG6cRn zQdpB!Im0fc1)O7VB7{R}pa$lqU5zd7i)o2`%WT(M%qgT5o{(Iws{oVFwaWwy{XAKr zRPPns68In`tMdrS43uj-nZn-_DBH>38MUD9c1NflBx-ldJ#I@!I5pNLE**m4q+=Wp zfo4y&S(b^vvB<+`^C67>wVHzvr?8jI$8`rZWb%FYX6{KX#G^0AsBheiEO*_wI{My> zStjcw9_ms`F)f?9T={()>G{jMPV$sYZ4dRR)suZR;(HJ71P=$PPZDm3A7iF=>WpY> zI~l}J;73lIuIt^qZSH?|I}R@$iX0vTjC(X+&D(yj4Wwe6(nn1K&OFLLhLWQU&k6ZK zyEJ#Wh;elDMiW<$2xd>uGu?zYTo`ntZtc|l`HGmohq^)i%t^Y5L*(I<4|}L1%R-Kn zY=iT9okEtB8S?b?z*-0~xXn!?7V(PFUxuo-N7@}E5-Zbps1reZ0+ zeQU9(Ie2$^Wt*+s4O`yWO#({x^}r4o`Wm9QgG- z__9Dm(Hf|9BX&GHTI_yAE+MKNpKKtPkggL7Z)qO`8$neS3XTnqc2ZQXN#E62BZ!vj zFP1fv^E8tcTJe*@)aO43R5O`vlP|GalU^c&crtLbULNBeJk@CotJWGWzC3f(3|wTZHJ3t9FiF}RztppU9}St6gw;=9c> z`R!t*MT&25ky{he;gcL{HK1Rg#3)rJ$iRSdR`ltUbHWzy*(p~OCxix~-J1&y`WynRV9e!XP4nmG6Cpdp zDCZ`lt8^4_mTRhRVb7qN3wlnFZbEjs)Fif8Orj42CgIw`ro$I#o+Y;z3HusEL`eaI zKRu1VlZ4OzhqFJajG~c+<#wVTbbFpAEc2P~c851!Xy}5Ma?E!aEiyp_Z#2D&jU{OQ z&k=Scos$qP%zWv!PcYO;J#^#JnR72(T>obmJmP=`L-0a&I9w@!Vb|_svXt3epXizNKH&;c|K~{9K*Fk2I5gq%WgY3x4PK1zgLvhTEbByBX*dsDhB+7Q|V^b-6R*ro* z{NBgyTlaS#_g@`8pZ9r>*ZcK)J;PY0B@K_ab`rHq&d)KHsYBuHbeEoA=6d0=NADPY zvP@_FRQ!{Bb|KnO3;w1fmsafwH9|+(h7-gwRHys?xi%H_0@`%8Cmgc+&1`8barS=0 zjzdC>*j&<@Ms}0{qaQ6lj%!=nLRD5VHm1&G=tLz&IQI;WINx+q5zIMvA2Ob%)EI0% zXgqznat>9)b%u$6hFc$5jM3L@4+8W&+&b*b4Dxilwz#(b>bR=?b|@hEXJBKBRvN98 zqI&=n>s9REA0KcGC(ZjZwt}r^jaWK0a6hEc7Kg%T=fU{jV~dTrjbrAgLqwh0aVv>s_AQx5o5St~>(FUD5MLJXr*ek!_02-vh7=;_e%4o`mO z#y&K?v|xp%It^(I>=DOoU2@Bxs+-%ps7sdtzh}%e<{{>xQ|(T7n;i;XS5?@Ybm4WJHd?ZWa zS9lVJDrVJVpad;k2!eifI#gePa^JcpZUEV(^|(b{u$@66SG zy&sxyS6#wY^jxfj7or`gxB~+vQ7Nyyp7J(X^t}5~cUA1~>5BIK{HZVd;7a1TQa|#o zhy16|^^f}R-Znk$VVZpW@bZ^AUUvSiqr(OrS0B}}@b`GpU+Guq+7bwfT%F(14`Np_ zq!XXnyJzVw>U))k45x!XzyBQ?@QgP5&b-|H(;Z8l)nGQbP$#^2&B6n_cB^IXgjI_$ zH!g~1=ECgWPjcgf(@L`UbO0zyK7OQR-|E{t>LbScDGfU|d+Q(T<`aL|efMrLc*8>g zI@DG+h_6fUMx^KuJdJHo^V?}6ro_#Zk0=?DlAQL$ciQuft6S(>vjf(X{Pwu0TdqHrg*FB6>N0A{W$q~11UQB`L?+NrRAE%_9!LePS z7gX^SFj&%S?okPsaj#~{(Pjwzvxpzaa5LpIFqPV14t%|=zcXJNls4$(V#a_Wy{w*1 zTXENwY#C_WVu!$RVzu!JjI3L7ItXT>Ji2 z1K{B9r5IsrcGTwc7?tGzgY> zT~w6!p9C+J4!})97-A%vp2A~^g;8Aj>rordd6iY`41qXo@$%(Zotd%=!H60AV4>gT z0RXqM)DJwgAXrIt9FkQFk0G)^#8BDu41uFsuz1nt6oAYSBjAe^s|+edHqEOH(#P5i znGP-_{;PGf{5S2Ac-PMzauy8Tt;#KOdP% z=Xe$nh&ix7B6B@a=bH?oZB!xIGD3;qP+@bPb!FZdv;eFls}X@6m%l5e;aB&Y)i9NQr1jZe>e&{jcW;5a9qAasjW+&fCP}Wk zcn9HIJxxayhrswp$C*d_BYFl@p+tWO>i3WS>SAbi*~}V=|6ncrExVFfrUSD*uVYV4 zF0gEHRt?IY$*Wwnn;Frn_`{|K!e7Ol50fLkHD3FtKrt=jmaqs(m}3`d z=GT(%A?3o*G2{MQI*Ykx4lD=~B%ViE5;?qI@uWLXN(n%p-zsoR$09cR)OQ4iY^sSV zM}LFY9Z8^nGCGWzDa!)6C-BmEK3NeoT5J$eiOu@}yTz+R>QNwD?yaKDrDI=q;lQ!bn8Q4J^N)}P zToTJ@kS@rN-xgd0*F&@y1{u(ib=hbK?bOAADk*$c+*o0>2vR|H)214+d$W3M$>h@i z?^LLu2a+hf7hcA&R%S7&wIgRRE>~}2G^CE?v*wKoR5Q4BMKotH4kYaU2z7v&#-_~< zxk4|8*B-c?jZ$ou2w0>>G`C|ohXT+2ceuG7)|L}*TZXKdK)OYlM zYOrV)TNjG$K5ZtB7@Ot=u*V^G0Y=VyCVMoQ;3`5XR-*`mFX5o4^k*7b|F&jl8;>WC z@8TkkM&Gn^ICae0JE#mn7C#naY@eeCD;54TE^R@a9sEddn@wtyDXbNDyRazE&DPQl z?~iDRen}wO3MOJ++&!fJeF>E(UPGk9qAjf^(0^r#&SqIL!pqLOWoh~fa=b}O z_7*a@I#>b4PcsKfKdJfk{3rrsz%jQ5qLQJ=k$!Y9YR10CRlUabx>b3NOrKGe?v!u` zTI|jCpMDM}lx@H<9dp&3HtoMOKf(KWm1f?R3uJ4w$}CJl0~F)Le-h%F7#9T6Z0fr6!3|S!5z#TpWy0fBp{@A?c4G6dCk_65h@)E% zIMiK2rKE^1@%n3U2iOsfs{=Ybi7~`ATw7k9DHnk57OB5#KEDWLi;M zmBXSB7O7SvHO0tc6U#Ya18m>%BYa9|)m61W`F{X(>!VjkvC?LgP$wen$J8KC`YwFr z2_97a$Vj$*Na)j3EQ=xZ3FL7&kp#vK{#0Cm?(3;!AhAZW(6XYFnaEl|ZXu~d(H$en zTvmNr^(K7Sx4|){-rlpnYM3a+2>p_daFD1MJbD8*46WdcV`(tV^UN{k`NWfJlO(*U z?pGaWlIJ625O@pB;=g@Ul#YrWpEL@yPQd{b57H}?>wmiFi!*V)BWwT-OcK-CO>nZn z7m1kfIDZ<$1pT*);a~h52ox*#Ui1XCCm%bZR&`{hKqgNRsBm!RRwCS*5hq3L8Y*t) z$>g|?S^?nLpBVx46;1(rti@!9Jdd4?rG1XCemb!atQvVR%;lxaq^5n%)>{0}H~^Xw zau`pSrBtLH?DZUEy9Z32UvRP79Xnq|@og-aPmqkhP@27B-czhJ9c+iCHhVK*jC35F zNjn7zZT2Mk$E&Z4s50)1#8!^IYBnr&6T}(v9gL{u5>1};=`xKM6~7bl*rROD9^V9x zmj2!s*ZYCemwo~0kzT-4lSe7!ayPakKAe9MPRNQ=OuGx3j@C1_YWdTFMj7+IHYm5p zDuJW}n%zKlMM1$i=!=b>(ProT&ce*9Mb7! zlzNW0Cevd6C&>WYRZGGAg^RsG#6;|L8!M!=Cup<6 z3D}slDQbQrxBaRQd1E+_J5F9AN)n@L3DksznPjWGzS&-&6Cs;Ybwv@NSEyFP7<3&6 z>J;f59~e@_Sj|iX&wp5-+vSsXmQ&ezc;-UN{zO5eJ|z_yR`#yEFs}G!_W(XNYu9qL z`&3%_rImXf+XJ>gf}8*%I$JrBSqA*cLEal91C$Up@Wfx%G7@voTLPxkmRck@qk$5U zyy`WBcR!UsJjHB(#El@+7X{<&h2j=Q6am;SpX;T>&Z`{JDs(*_FZccf4<<3!VxqgdPO&C1iCUyk5G9p6v(NG#{&;_R4q`#^X?DP#^$01AMsMCQ@vS@gB>xeQb~Mnbfxd`?MHfxHVS@N>HCX(hpacg)zS+3J_E zq>;)>59yEOWZPqTfNBv;+6_IHt7o)dU+3fMZ|B>(w6iy|`q`_<#vpD*bJ zc{!6N+pn*ckv}W{P1x$@h%X5$s~MgXYfmJ(-DOW!G}_q$;4h|{2?Yl`xl%a?_|@B+ z4LMFr=UZ-0aXfu9%^fQI;*~8gBfuQR-ESli+Fk}a%s9>hzE)Dk`F^9zKA;9;^}b}` znxY(eT>Ls=!f5Wy?(ibp-eQ{g0-!v}-Re;KB*#hKz#h-0WCZ1=R-G2q=i(4Q@>}-W zZNsy*Gq8P%C94(8c@-JYF++e6MEVH{C3;B8bdL(g>9{GCpsfeiRTn6%rPj8<^@g`Q zXc|_uqGft%eL)NHQRA_hHE&{8KXHR;kLI3v{pgP6*Shhk5)>topWTywN$O-O^wy>F zZ==VCcP=-32L(^bx%-hvbo?FD|qB0~Cu zFR5R^oR%X!Y*BF?e)`yH_9UNi?>Fn;&h8n=t!x|gt2$Vv_>jo4PD>N6=nKKitLrb$ z20Eg_1-nfPy?Rr(d+GUS-`Ou+-C&ovOd;>pl+fEoR0Ye~+#?YL8wp2yd;r`tFU^&^ zWWS>DYVF*#mPV&;Tuh4jYi#0~hxa@)1|(l7?0+kWVG@iwOMTcK5@$%}qK^&s)$$L3 zk4w5!V#R^G%MicGy(wq<51bksh?@WrWTZ(targ4X))ynx8;73oD5$d2#P+# z_PxudSGAINGV#_umZN9baO|7^B)36-R^wbwUePMnl=fNA^GiI?3B?C`_>MlhYEboZ z0~Ky<`m<^62ng7l>a-o7rrpkqgC=wbIh$qWo(?-Ve0){L9XT#A%FnQnC3NJTt#>zQ zDJhlPS|ezpQ{cY$zC$qaD?-YjY=@2ej~DsW7nDf5X~h;$x7Hg{O=h84{cSbh8BCTV}df z(8BM>yQM==YaieHY$gJt#`N)!eqp6Y|9t-O1-0;gPyS0JwVJN99b54+e_pU$8M z0Gt)Wj3CXQ&L1Y&8-HLgOPnsEhK3}p;1*e0jmVtK5V!M&T&t`1KGV4hGrG1&j4nb=o z#i(xY@A1#5J5(!+MWx-iS_+r_9|Nhd6HKXGa=;shFVX-;hkG z&mhjMzX(-)R_EEowy^w8R3rFcA1FJz@`Af{mOQ<6k1rPTeMETf%y3-42&zC=PoJ)izv+cPvA!^%Z?+`dS1{tF(vp)5skgpErJr(d*q9^qkP!&HV#0=Mo z2)QWR4Z_;*9I0@85y@xSWiFAICy^Xn5y5rA`b<6(SKrWQ#PA`uQJt6C)#*5o`JTCV z&9<7O?}l zQuvR3@^zJyYIb8Fh?D74( z>fi>9#>nXb6!5>322oWbR_k&0-nOV*Pq!(3HT+`nRZ$PS0voJiAc10Kw~FgYP{YVJ z?95@YLngK{>lIis%&oc^v*3QP>E0jbvsdqIv%N7eH9~>p)LsT5MDBuC>mRySwc8J! zc8_mqVc&fG4hpMm8vu{`zqvDwUruJEMbP3hFdMefN;krh{TX zY}TVy{jPjvn~Oml80`csB)#wxyih+->hUE4b~^%2{@$`0!{kP_Vr(o~u#C-OuH`JB zE}t6*yAKjKM#{rZMc42#?_)$K%9$>HGKY^@UQ!{Zu;p(=_NW--D3|B0)j4OIgVn5Y zuB&MW6?&LgoP>zVB=&w6Ela|7!PGdH;>iYm73#60G?j}1k|GxcS#h%ZJ$ z0CZa5KJ?a41X=qI-2n5=)=*#ael@qJSEQuSqn6k5`E2Hby^gJ(bph#CccW^hr#@)q z-%s~z(eAlXqLB#^zy3;Mv#V(Bk!rccrxU%q|bFxPq6r^&lJqwDztmy5;n zE~t}l$*nz(VteQp2!CX>b&3tign3l9eoDDn@)`tZ0Joz6F*9Jvms0sjWjYY$4l1|$ zeN*aU@F)i3uL;l2U6E7C4(GkAu(@oEN~@yvh|RpYg0k6Li0yW7W}uW~^j)WJ0nA>m^@(@|au9P|M^DL)}n| zhy~b{Gc}X_W~9W9~T~MEo0QW*q_DvEv{F!jd~oIjH>I$-TH#=_V)r9w$;hEJASmx4Dz^} z{+iU<Yrd0!+YCcF)3V$+VDGTxBN;fuW{X5qb~3qz|rR|@-u zI6ZnkjPCed;Sxqjn9jCH>VKeq-p-?aG&O)>VRA$?=&pZIJFWJxPf^p!o_ml$+3iP~ z9PptTgWLaUDH1oQzi{vaiI!*S?o@lkvU#r_8+NYrR4oh2wd{ zq=!S8&F$iEpiaRxuutezqdh)>@O!z1Lz8A*_uxkU`|g{&RZH^K{p2ok+*^LF7DeBd zr;cTqOi!^rfS6k&t9miS`)NyyVshzUkG&a#&ZSF;gMN;HQqMRB@^$v~wSh``KFi2Z zr7e-3tRwH_)<3rUMMwV)X_ub)q5`LHcH`@%!vX+FJe~}P|NNAf{9`F|@r&B>nkkn} zR~(1j--jxAC%$i$wGzbvDhgF{yK$NN86sR7D*2tsfwlwaNgx>(Hi}i{Sa^3K+|pQA z-Z8-3_kM;eJwGU6EghX(i3Zn~cY_RUo#rlAwLbT^Ad&W!5DGrKy8~01Te%m)>x4IC z7ZnOxAy80UQ0zKZ7Q#wDJ=kUFu8apqhzuAM+UzJ=3VluSWaq^=UW3L#Qv(EPz-N*3x2&!lUyte4u zv)jmjn8T#1rN>JpRd!!nIDFl?3}-`v;(r+P=PGB0*B5cm$OoWFsami5IMO^!boeVy zYk;#>+xH!}wyEEe0QUS?*;$Na#@fKT?l9T~U;T|uJSa?FjL!N1=4XF}n`(Wgu$cNq z%QL-d{_(Aw>BmV^s)F9`Y17YFm)WrVmZyMqD`~a&EY^u4tE_0O0uBo3yk(}%6mZ6U zZAjZuJ&+Iy-pG=h8O%d?ZzG}Og<=~WMm^X9i}CWad+!(+_;ou=N9K4rh25?{$+d0_ z&-rGnmi^5@E%%$GTFy5~;b%spO+re}zMIdaD;|m*m;QWK#A6!06@dgF*pl*wt>Y+L z=_qtqvg`Th%`~!rzZQs(Ic{svSyv{TMDA;~DxzbV$Tsz5ikN0aoAkw{vD=?@GFjJr z_)bXSZh$EbbU#WvW0i%QQ=8(NbQrCOF-F6&Zc>A`Wf_$uqYI5tkb?eB$^~5-m zREyVHHH3MR)&56qo$f$9RoCG^pdhCdI%G20)**?@|41jL)se40eVd3{8Q{ZcUTpt~ z3hX#*z>!PNPbWBY8(iIhEOkf)g8evYKtWZbLmcy?{Pp0oosRyi^W;>oflXL6QwNWiO<-}> z*$swW14R-ZPi~PT(z{6PbPR}Ai3MsY{inAV*lP8t-AtK8{Xy0swwMuVKTs$NB@gO> zQdBAYR2@F(CKEZUbPt^yyDt#cI`nz}%&*Iw*_Ya_4!wNqS`~A^0&sUk?OSMDd~dug zxXBBEs7!Y#;@q8*v{O_KZgslIPorallG^daw_?A4Wz0z_%L*kR00TH1Ewh{Uw@}TC zW$0!f@t2B*mYX*>4Q6dkUGr*8jH+U6hgtCdxf}@6)Zhh@Gbe|t9?aNMQQRiCX1)i* z`&g^u<XU8z9$(p9+tf#SJwW9YV$^0I|1!z)IJzl@`YAyu8H>+q z-qccmlr4vdFEP3BCaIOIZlFMg^g{&NBqbU{ov;6?j_rn20supz=GQhlX^ELpe6k3# zK%XYwC>3@hcOJTQQ_U<;6*^di2*SHe2u1BS*4R?JefZ}Hg&v`y1ag`E!1!shn@7#3 zla_QBH2+hS(A>T(AlI2=DdE^;OMgL%t#_e`K@Y*L7VS8YLJ3`^dl57j60}7%|3^Hb z0K?lj!?OWv;+f8|*;0$_y>O;|u0H~reNFUhbmgt-b&xRCi90JeRqO~e-;3s| zW$me4#7a_2{*SxsE8~|b^6PIFdCfd7im<-W58&??dnpQYB}i$$=X+G;YC0TDdZ4;d zdNgbn(2JjeNL$V2y{$!~nYU(WVAB+`dQkF)daO|PJHM{5tmES;S*08R4r>N zqjwyXXX)dz&U%>v>gbIkIcP5g*f}$-RW_bQo(mi>3T&>Tx3l-VW$9GR=<2=jy#@Gj z6Lb}KroA>t9US8C17bz)A-X|AXXF{J6qg~Hw4n{m4G$0f%rc+uH6EsqfgE#1-O=a? zKzB%y*YlLR+$aXc!{lh3J?M=9_RL(}^t3Zddq3BUtjI#U6zg~OX_cwBQ?VU^uCG2G z8wE&&eKGZ;;b%C~Ffh{uZbynw`1{|oq9q%q4(aG2i~C*jcVftZ5YwSJxsZqLR+&vQ z(AA`@ZLwU0gTokd11*1X65Y4jzE+S0?pOSd-J9lL`0)2x1n4VUx)@DKjD827c&Mg= zW71`czx&Xg3WCV4;Tp^f;QcCq`a|!b_BrYUVDprd4{aock>D0+)hltD4u%7IYsuiL^e)Rfc#Xh1fJ zRDnf4s|kQbsa+u_g=l&&gG-@|O4zKX`lGyZ$FgG4mu`TH)1rSF4r!IO$0xz`=~M=e z*ymh3FMIE{CH{$qwLa7jWUl*x)jXZzV%N3d4EZU{Po#9Qfq~&%vppHL=KB?6ez$!} zIUD{>EnBZc7m~dE12|5X@1-+|Sw62Cv5DH8x*kmdk&JGE;pO7{TA5>)+$68ZIX zDSVH9Aj>7jS@&itg9Nw_zCkzxq~LZ{qCLC#5GhZOvd>9ca(B~C<({pw;O?F|XKWF_ zW%Xrl*@2Q?rqpz8+6P3uRSYCa$&X!war6D}0kTsj`Dy9h>{JbWn=P`oK)$Mg!LGdg z7EHLmPatce+``-b{7#1r>(ugH;PlGAAZv+}g}X$e6@KL|tZ#J4CX)mK^{8DcyK zg*kKpE~5)S8i%pK>_+b6lV{2@d_Kp>JvtUq*a{7nSHGL`7VxbEdQC{J)cYX0(5X^H zt*l}W*Zf?e1Gh1G@)iI@rd@dGj=VCOlf^Seo49Pj90vxS$2<)o8$xAdO5mTOx2n|K1l_-r6&HUzg_KCl7e9&Ww^ zp+6}^ccRDrKt0YaEPXn0)1|4x31OGT*F)`U#5GcO1%I=8J#MT^G~lu zaG9|PZ$0{&krgf1^5xufZk#79D*6=^_f)KI+lHwrI!c2RDNHTS74HENpJJ6kUBLZw zc_QFG(*v+%IWdj0{~a&iRLtcM;%!WjPD!ulmlx?AV9LBgt>R0pQnBbIWsVM!>dSNs z&+lWT7yU01OunEr-hpE5aq?R=8g*)g4q=F$1vgg~jnCmSUE#dIuIy6V9N%6DHxzVE zikmE4w=NP$=5i~mFOR{GYCZ3(-+bY@lTb1qoEo<>njp42e;4eV-^%{DC8EkB*B~tv z=%{yP@=RmgeRXOF)vt|pgP0(e;~|d}@qr$v=dE^8Q_834XjQ^EdEVZMK0V;Rd^UK+ zJdi5@?|3nAaj%Jn&IzBtVDXuqLn81X%VGiinVntS2IW!jgFYDl6$jp8HAA4zmd{*?*+0x2U zYOF0h=L}32)YI`rU@^WdT7(U!My1K6sd79%D?bGfF2VzNaRcE2 zhRnOk1@+~K87;{t<)_C-N~8k*-FQ-98o<#*%aZe2{>CKAbFkUVX}i^*_7&*!#=jCM zv8l!b|4-R-w`y>R6T=*SQ7CmQH!7OSR-|_&XxVAgN{D@nW36&k5jhgX7NZ8Oh8X`G zTl1NlxtlEe_Rk!Jwj}>h7(h_CyLLb{LQ9-M72LEIkgZ`AeP)rI1)MMKjPDWF_oJi{S#jtpSNpY0XuyJu7cAoniW3rM>7hy5nC#hrL z4T0GD6aD9{Q2=8oQe*@tM@U!DXVj3cnOQ!87W!s54!2_=vOI> z)44QJ0BqOBso~W5;u*+VSQF8M5=0O^vg}8Vyc#gwDUv|iFJi{^moF;!97rJgMsWip zM5V?l%_fcBCSnb#rd*#f-dL&3B3FVsxhaikFIUx=wow!?+VUSyj&x6^$jU`W9y`YL z$Vs8xGX1?aoYlhhI!5#CXB+31lJ4>i*?CVTDY^amsP$830bO;}r)+W=Wwly8zYz0l z;dFk{m88fObe`@;QZgBSFwabWjhz=W@H17nIy_W?P4|h)lT!PsR|+1ajhjreG$R1Qj#m?D_j^56YIhJV~BbID;+UnWgX2%|NpZy3!2gpEqU zC=?xQUx|Dtr-W{;BzEoHH0B?%$?oa-7c0kNYxcOC3haaz^+z-`tfyy~n{SR9sc6jD zgDa~zz$&$0b{8 zD6??dU=Z1i>k~st5X!7}Ug;@?{vIdJ$+BwVJV`dR~$N$x^*c2ajhEFNSwwmD0H0}*dm*|~4 ziryPS4*w?KDa*DI#iQ8`en&_n6DPNa!B7V-vk^~nEPGGrvkEL5?2w-%sJ@P>W6L5n zOs3=y(`(?xe{Fq0-u1)^RZQ?5-Nkg^F-$?(XfQSF-AWy6$NR%h2!dmNpCM*=g&%Xd zLhe9d%o)lUg$+%<)?MD{J z8~Lrf7=hrjhpRU@&cY3@?Emipo$v}e_Hs3W4ls#Wb0AXwu_vQcqTD*wvk)8NrBdb_ z1u|tYQfqB=(1skD;AoILsPt>(iNCzoN@K>`I}1=z-hiHZ89CBaxu;#mXHbn;v0*jh z|85fqyfaQIEnLtl?;wdki^O4icauq-mR&U)H;;Of8Hv-vX>I^URq0}l#0JArqfh!5 zmT+jUQiOWH@1HN_-l?%qRSvzlk%W}^SEvoVEs|ZD;YQ&wlM*fOph52bU>^R}e37Dw z52_&6$G$$>UI;iZ|M!qpK(f2C2^o^hsD=zvE#nq9Wb>xKv3Q*ia&t4>3A^|%)e0uO zn!|j;Wl2&i+2BGT`c9Et#tY#s<2jfA z{f^hb*Am{V1!=5egiD}`OnRzJCimC9-`~ia^T1^- z;t_45=7-{7wV@I27?~74C|AH~Y!FMAte85MHd#eT7^l?DQkrMKe!ohp|1sM9b4@Aq zq>Cs{Rvh1n0y(7W1%qdVIFW`33Dz0^oce$PHKyIzowv}`McyWx>Htlbi9Z9!Vp5jk z*n6-8ln~YUtlB0WC-1s346Z1(*@xbc{@(hFK$r8XX{4uCf^Bw-6aSeE=6C_m?)6C) z6k8PyE42=zGGHK4H~a6{=KK@s?QJh4cJ$`w{Ul5Q%*+)U7gziH*XB5C7Sy$0?(;1~ z!1g>?Jrq1lx%lemLs^8DY_WaGV8`J}v{!PS@=Y>=3W@DTPX5Pa2+Co)o{wDZN*xA6 z55*1~k?A$^=BCCw<+m1ug_jlsmI4;>wx-3lQPf(@$qczbJnkLiS{^I;wBucDKI zhZmJouD63Wnj41cOwfa5{}uADWd|YLD;2^A;eHXyc?b7_OXLOj5yP~Af#VDFMOBN* zm0`DGQTwh_6>hHRWB{8R3@5VeQrt4&$$)v1!fxI`NIHmhQK?PRL^-hn>-JeDRXRRv zLsB6iQ9-xVQ=5_kfR}fgdFeH_W|NqDNJ9Gc*_~FHSO}OoHa;aaM^PIKhTzcNU3+xu z#Fq?O_NJq8MEh#eO}X#&Beo4T_tDEn7moi|4h7m`4;ZArsE~YE;$Qmj@%BlYmjp{C&_%_FelbN*voN}E zGoDf^EcWI~Dk?V*ZJbFJ;h3vQAP}=2KGbwW;1i-`xy}D+lszJZ40g+}44Y zam`Zt&j$ioCA`ocNsU%}U!^rAES@bl1F-=`0&TdL4}N?(RPf$>_AxgDac(o9s`&#| zi$H+~e+O!kl*eS#@>Nhhu&G!%@m8<61ThmG?!}%+!o`aJ-ZKBYrw7Z-E6x}}kuvU& z3?h;F5^*$3!=+Y-9AD6G)b0gJfAc6x5T#xX9JsnQDVf_b`{Y{$z?@2@^mna;Dgrq- zV9#4X@n>j&n!LL|B-2_VKqG|Hgw~YRkfhr0LFvrp2o{*cS08!shE}uo^eXVYS3v9% zRaonkbee99r`Q{HfgyI7;sad!ivkfAt=pdT`r)2B;@Ghg4jieL0BQ~UL~$*SBc92Kd=5S!I{{B-52bT1 zha%4{0P)Gyiqs}ssn^2ams^InNu|EU=(B(I&kNMjevc9!PdEFbm+NXa?Ph znH#JOMoG>{ckAb?Mk)T;InML+GAbuNa!2VY7!GqZBBe*3{ zE8xN8pq(u0HgO!tkJ1YUSdwAvt0O(x@8=YLXi{j|W|fXeCI@v$cWOb#!$zF#e~H!YAF#SUhR_ssEA@o1;XbJt7L|V?E*Kl5?FVy zx>a<^EC9u$O9kcmWpVr61X+~BfBuCNak~8q;mM6D(@F}>chrQWVHXql3SQ3WWN)dK z;YoXB#9rMTyQ&3~d8f(X4-l z($s5`ylu-kyB=uk*u&8^eWuu;DcV;FaN2nR(Q8(bA_(u*vbl|h!y;8<3W`X+u%tgn z*L7AYS`pe*{plu8RuDT8V^F@$S>^kTyC*U5`+aOj@Y1P#2SFY+D7=;KF7{w=ZmnF+ zlHC&w4Tn`3kgtYy|FjLDHyabnm0M97aZRBYINJkNR}39HG$V z4$NuVR5EOsq6^oNSKRYJqFSEPez^1F1*Q1o&=*V*shMnRuT4Lk*tG-&4WYy+H9EJ* zG&HUlp`Pe2wSx@zLuLK@qH=FK)-*vlxjCOaMNtV1q3wwVifUzy$SG5)urW$*km9d? zQ;!HMr*w{R0HoYboLQ01CnfV7w6U3OLfoR(3#Rd3d~M1>NS7)mIV@>1m(j6Ye_JDS zaHqwy3O?v7%sq+l&KB&SxRMne_*3HP$XW9k%^j0GA_0dbF8{$+>h@%6W(u;MJ9-*0 zKno367X)Uf^IjqVC9}3Dz^QBTrmh_fgvi*iEsOstZiV&EdPirfdKh2^(ZV7}3`wd7 z0+}}NYGfAAa>upVN{F6d45$z=zQUU0oluLIx%)qTe8NsFNTPmLzUh>(nQ6x4|f}SroiVKF=W=sV--98?DM-`w+4@Qb5|W* z9fx$zs7onREBcR6tNvu=4rq(=u79*)5+xps%{a38b!W)MH`d_}dyr-V&*A^s!M%h` z>BljxF*6(}1+o3~%N8d0YwX>ozVGW9usUrqfWH)L)^^?1vBM7= zm>+NZJ$ Date: Tue, 14 May 2019 10:06:17 -0700 Subject: [PATCH 544/724] Moved supported value tag after ADMXmapped tag --- .../mdm/policy-csp-update.md | 32 ++++++++----------- 1 file changed, 13 insertions(+), 19 deletions(-) diff --git a/windows/client-management/mdm/policy-csp-update.md b/windows/client-management/mdm/policy-csp-update.md index 8e56b33127..3650b5f1c6 100644 --- a/windows/client-management/mdm/policy-csp-update.md +++ b/windows/client-management/mdm/policy-csp-update.md @@ -1188,12 +1188,6 @@ ADMX Info: Added in Windows 10, version 1903. Allows IT admins to specify the number of days a user has before quality updates are installed on their devices automatically. Updates and restarts will occur regardless of active hours and the user will not be able to reschedule. - -Supports a numeric value from 2 - 30, which indicates the number of days a device will wait until performing an aggressive installation of a required quality update. - -Default value is 7. - - ADMX Info: - GP English name: *Specify deadlines for automatic updates and restarts* @@ -1203,7 +1197,11 @@ ADMX Info: - GP ADMX file name: *WindowsUpdate.admx* + +Supports a numeric value from 2 - 30, which indicates the number of days a device will wait until performing an aggressive installation of a required quality update. +Default value is 7. + @@ -1253,12 +1251,6 @@ ADMX Info: Added in Windows 10, version 1903. Allows the IT admin (when used with [Update/ConfigureDeadlineForFeatureUpdates](#update-configuredeadlineforfeatureupdates) or [Update/ConfigureDeadlineForQualityUpdates](#update-configuredeadlineforqualityupdates)) to specify a minimum number of days until restarts occur automatically. Setting the grace period may extend the effective deadline set by the deadline policies. - -Supports a numeric value from 0 - 7, which indicates the minimum number of days a device will wait until performing an aggressive installation of a required update once deadline has been reached. - -Default value is 2. - - ADMX Info: - GP English name: *Specify deadlines for automatic updates and restarts* @@ -1268,7 +1260,11 @@ ADMX Info: - GP ADMX file name: *WindowsUpdate.admx* + +Supports a numeric value from 0 - 7, which indicates the minimum number of days a device will wait until performing an aggressive installation of a required update once deadline has been reached. +Default value is 2. + @@ -1320,12 +1316,6 @@ Added in Windows 10, version 1903. If enabled (when used with [Update/ConfigureD When disabled, if the device has installed the required updates and is outside of active hours, it may attempt an automatic restart before the deadline. - -Supported values: -- 1 - Enabled -- 0 (default) - Disabled - - ADMX Info: - GP English name: *Specify deadlines for automatic updates and restarts* @@ -1335,7 +1325,11 @@ ADMX Info: - GP ADMX file name: *WindowsUpdate.admx* - + +Supported values: +- 1 - Enabled +- 0 (default) - Disabled + From 5297438f59503b0aa8897169d609d4e185f8a9df Mon Sep 17 00:00:00 2001 From: ManikaDhiman Date: Tue, 14 May 2019 10:08:42 -0700 Subject: [PATCH 545/724] minor update --- windows/client-management/mdm/policy-csp-update.md | 12 +++++------- 1 file changed, 5 insertions(+), 7 deletions(-) diff --git a/windows/client-management/mdm/policy-csp-update.md b/windows/client-management/mdm/policy-csp-update.md index 3650b5f1c6..8e9d7a15c7 100644 --- a/windows/client-management/mdm/policy-csp-update.md +++ b/windows/client-management/mdm/policy-csp-update.md @@ -995,12 +995,6 @@ If you enable this policy setting, Automatic Maintenance attempts to set OS wake If you disable or do not configure this policy setting, the wake setting as specified in Security and Maintenance/Automatic Maintenance Control Panel applies. - -Supported values: -- true - Enable -- false - Disable (Default) - - ADMX Info: - GP English name: *Automatic Maintenance WakeUp Policy* @@ -1010,7 +1004,11 @@ ADMX Info: - GP ADMX file name: *msched.admx* - + +Supported values: +- true - Enable +- false - Disable (Default) + From 5ff55a4b81ad5d229a7ab3025a8d79c0e143c734 Mon Sep 17 00:00:00 2001 From: Greg Lindsay Date: Tue, 14 May 2019 11:13:31 -0700 Subject: [PATCH 546/724] draft0 --- windows/deployment/planning/windows-10-1903-removed-features.md | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/windows/deployment/planning/windows-10-1903-removed-features.md b/windows/deployment/planning/windows-10-1903-removed-features.md index 97d7fabc26..e2e49ffb14 100644 --- a/windows/deployment/planning/windows-10-1903-removed-features.md +++ b/windows/deployment/planning/windows-10-1903-removed-features.md @@ -23,7 +23,7 @@ The following features and functionalities are removed from the installed produc |Feature |Status|Details| |-----------|--------------------|--------- -|Cortana will be removed from Windows 10 in all non-English/US markets. Cortana will still be available for en-us markets. |Pending removal|A new Cortana UWP app is being developed. Precise dates for release not yet available.| +|Cortana something here about VCDs. |Pending removal|A new Cortana UWP app is being developed. Precise dates for release not yet available.| |Cortana on Android is removing all Cortana cross-device functionality from it's application in November. |Removed |This will remove all of the mirrored notifications and Cortana natural language skills for texting or calling a mobile device and finding their phone. The **Your Phone** applicaiton on PC is offering a partial replacement for text notifications from Android phones but not the full spectrum of features. | |XDDM-based remote display driver|Pending Removal|Starting with this release the Remote Desktop Services uses a Windows Display Driver Model (WDDM) based Indirect Display Driver (IDD) for a single session remote desktop. The support for Windows 2000 Display Driver Model (XDDM) based remote display drivers will be removed in a future release. Independent Software Vendors that use XDDM-based remote display driver should plan a migration to the WDDM driver model. For more information on implementing remote display indirect display driver ISVs can reach out to [rdsdev@microsoft.com](mailto:rdsdev@microsoft.com). |Desktop messaging app doesn't offer messages sync |Removed|The messaging app on Desktop has a sync feature that can be used to sync SMS text messages received from Windows Mobile and keep a copy of them on the Desktop. We will be removing the messaging app from Desktop devices in a future release. When sync is removed, you will only be able to access messages from the device that received the message.| From f066c23a3f08fe7488e8ba2a31922ea69343c763 Mon Sep 17 00:00:00 2001 From: ManikaDhiman Date: Tue, 14 May 2019 11:14:34 -0700 Subject: [PATCH 547/724] Added preview mode info --- .../mdm/new-in-windows-mdm-enrollment-management.md | 8 ++++---- .../mdm/policy-configuration-service-provider.md | 4 ++-- .../client-management/mdm/policy-csp-authentication.md | 10 ++++++++-- 3 files changed, 14 insertions(+), 8 deletions(-) diff --git a/windows/client-management/mdm/new-in-windows-mdm-enrollment-management.md b/windows/client-management/mdm/new-in-windows-mdm-enrollment-management.md index b7d977b310..d652e7d5f2 100644 --- a/windows/client-management/mdm/new-in-windows-mdm-enrollment-management.md +++ b/windows/client-management/mdm/new-in-windows-mdm-enrollment-management.md @@ -1398,8 +1398,8 @@ For details about Microsoft mobile device management protocols for Windows 10 s

    R;jWaV0WP7X^D-0HqaBMEj+!l}G<$Zy;{0O-SPP$HdcJTAqj_T8QiAKnvdKBE<`QIYok+*%d)&LfXsneEal0?fddN|Bv+-W z+6h~|$57uM;y$JjCt&6cx8D`2i+rzlSF<+2S4*K4i82|sqQZK*5Q@K6dy(w>iK@|= z_+kEWsLNLZ@cQfku*&~}BvVyTEexB1BWlzK34(0s2p8L|!2dE$W2G@+Ucr0gC;8Qn z-T}gDkdOUNCJdipZMr>NHllZP`Y>Nuep#C zyOcU+k(G&TFO0>pqYLJo3b8Co;AHZ5qybj`fR`{!Eo6TRR(*Y(>^tOGkuDS1%zqRd z9=>yP3X==tK&Ua+k=fvXNlaM62J6NiGgSX~9Myo7DcV5U-*3Hc=}B1R$2v)d@eDx1 zL6nEQ<}}HJJ^XBTCxWyv$86!a;aLqLNWMtxMSj=hTkHFgmCN-o44L4VML?&-*@`3R z5&Irj$?&t$&8cLDOb9*Cvi0dTQXEX)4b=8Oe)3ytc#(I0_=Q5dB}> zFCoc$L{HvHkkYJWLR#8QnG#ZB_PKAhj-dh|(pYp|PV6%%Z`2oKAeDdy`eau`i0a4G+{XY(O zfpvt(4^|Ka2y>x3N)zRXU4NV`mv-t}v%<^#4pUfJ+4U8WA>cx9VWAN=BSbGw83dLO(*q7 z0cc^`z+5mqA|%15|D+mLu)FAnx~D_i&ch<1WaUKU8bXRC)o8d_5nF*QOORmaZHzX3 zJsa0|go#7|_(^)W65PpzaJBlQpv%x*^v;1uspdXS&8lNA<2l9EFdKYcwzJELPDq+! z$r-NA>G$bHo1O`@XF#>5V0OfcKs0XR+8L|g*pOmUlzUO;)Y+!U@Ut7YfrUeETm`z0 z#Y>1)qsAVNon35C^)d?B>K_(j;PiwUJE8IYq&{R0lhhmn4KKsfEh+?9iB zT+J{_K@<1LFA@bq)>VZXwCNyy zgKh5-t)S?{ds*8s%*xsAuj^W8zg6&BzYC%)1CDExCTYEn7uO35!|CG|BpaD9(P&GflR)x(}70~-T?Uq24qioq5P zIfiLK7HhAkvi3PUWr7EZ?V^dj3|3qPj`CljNmRQ7fB2{9#F~v>{sk$=NVlE7bK4fW zM{xkc?{UCa969{dq1(&zdeKb>x_LAP|76Yy*;BpHwiID+8Dgrk0=Temp|(x2ZD0YfNGRdTwiC#Q-~hD?IX* zZwUzhwtIWD4!^J`QNp6!9ITuSkYIp(P&_|eVMSNVhGqja1c&v@fVt)j=TIaHo&WdB zuFaRa5D5ULb~^#f7nk+!)NT{`XkDlKu7B;f_UM^9ygy1#yLTHUe7~7m%^iC)#9>2` zh~#C&*9g;Dhg0NaH>pf9iSV0!*7^AoZ%KR? ziT%jso?*JpTm!M*hf!5eSs{6!T6X0c?W98}Q@-7H3F2~UQdOj3C3WIIx`lMEuKn2| zDHxZMEB_w7l^(?H)z8cyFmor@U3liPbNO=W>s^{U=HCb|d(8OKFMlT%ZmQBnoAW zV0SXk<_*aII0^@BxNfG5<+uEq+LERCTiA+H!%12JLX`}ZOIqel`m527rHlTwvjexf zxF_R)@p^d`BlLN~@?|E`8uX73IWF3dw4xPANbtc(<^j1%HzdEDsL?!yp%0aTIO>x;P}envNUg`j4d3I9oB)Fh{z zcAvh?WN1ieVc>>3kWls~s+fYUefL!RlPNR)dWZL(@|K)aK|0zoLVfzvL|^Vb7IlbQ z9QEg&<@T$KfBhrpl6|C%cfqYNx#q%lzF4PfH>qnI^ZPo&k3L6C?kZ@ZCuyIk?+GPkC{OA5)mi zl`B89)5{u#q{EqxTC~c4ilf|Q*~k!gc6#x(*3DJmpSElFSA}EES<(o#jZ@?)X?#PA zb2qHHe(PNtkbX!qOkGSBc&!-Yt=0O{7r1wQo-F#N^5ar?JR9ZoMLOhlb-OtMF1HBh zkj!>%s{{+7mwRf}mt_-3e0qds@ee#AUC37=$m+Pd}Z6!Nds>dW{F}TDSdiZMBD{{eH>P}M3)fwIwXA<$(q2*3;?&=SJ3dpjcdL5k{ z1Fb(%_U=<6cTW3CavCT76)A#+y-Q5{X4U~XGVMTG99_R1iz0EG2fmw{9;N;+N;Uz{2Nb70rHEFM^}HsOwc}BI`kTy7IT?G+~}6zxkUf+}!?V@;V()sb@SmTGRI}6y7GiFVa`~3*4c$)Y@gGxjUvha)%4BEWluIzW+p%X8xL3r{X_G{xe#q?Ws(NuXa7v%%y_Oo<6N) zTar5s;9H;gsp>*T3Ka^Qs#Bq!lXPPrGfrFS4y+X$`$(_<8n+(!O4`W(Bs+Jwwr*ta zR#~y^MLuY)*tGqPxa$`fa!j&zqUKIxSynmwZ1<4bb!^JKPb%{2zGv00U;iZOUXfz@ zy>^k`SRj&Rko0w#)P)wao!Zp93N4z9-wMzYeYYsn<0D=?kPW;TP}{O2(JV+tnjSy5 zTtW_PJY4Di_R<~jweN>rWgnE)C$C7M--k2zE@Ry`d!9JCpf5DZK(y7r^Zf4L?Pcw} zz-Z-?mHv{-)G`Neb^H6kOwnG2BtzN{uU;CGy256X@ED=Re|(N{K|+c~|GC7=4YB=* zA{JLqxn@0J--)S~-je&r%%nuU*^PVy_nfJAYSGIEuh@&I#Jxe}6Zgqt%Y@4xLw1Gr z7D8eaAIp&dB^(9rlCzsW&Zcww5tobjS)JY&_K8B~u3UjXpu%4PMAnE=E^KVDi|u#2!DeNaG*R*KPkY~%cv zZ1mbYfTN*Bq$9=i-v^J_`OKRtCtuLIiBl$WxNa6diFsVFrgZ}-M zPkI8%tK2~3%KY*EyztmA7QQGyGh7nFc3Qxu;G}o=mE-NFzqj~VTCI?uPwyu@dM$BD z8v=tl1KS<(H^0za48DQaOt_KEbnSkK>XX;(P)p=vC-q@#1Du_9EXjRgfd9%`cvUT0 z3)eN#obEp^<&fbF)AOc#VgPYy%J7t`HLdq(#yy1i&-VaqSz(jG<*!RSH-F(cdN-6q zwf_{}ycd7>{f)O$u{`-ZB?(nNcdllAS228ifOS=)8)0pby1`f|FB39XMjZ2(TCa1q z;{IbYYjh$1#qHkEN8YEg9cF$37u;o&EK9Axw<;+Ox)(#&dr6Xe6;0FQ@4d-vbSvCh zwpVg;i<*ov{;3u_Z0>o3`q9B-zMJzYm5&7|$3cayzFGsUh6y-6UIxj3h>B^AjV zt2K1%uBdE#?G&ui{hB7@i)#!1vZi-#z5+`5uR!k3?K#!YO}-Mc6`CV2K@PZ!YJn>= z6U$`{nZPb@%QNASB|@Q28+pL%u?x_a?#og)yraolt#4R50ci8aLmfzO{j+(1BHnwk z8M^iEyyZ5t_d(d7asTSPBG~=$t5-wC70f>0vP6Pnoq3)&n=o@fer%+5R|^#M&9$iq zIVqH~l6h!ls4hLgMa4B$B-#AKowj-k+w2ukq!-6U?1u2n?}>1VY-#{;4#zp_J|}B)aSn~nU%I7T&g9&*^pT)z5`1)M^xWvu-;8eLw4MOB3v=C^xAA?;@ZJN?=kio*>dtYl`Ism>CAaL9l*3<| zvmkjxnrr*>2a?US&af7e_}8D^S{Apcun#mR4@OMYM+-U7=Y*W7?}lGTx&=JL*$Qf? zxa2OKt2G?RG@pFZ1MW1uAWsc*I~Z|ePn;q9ttivFQw_m>4GRAd_MF~dr7pm&w=A-$ zsi`IyzXMRZpY%Q{h}=naJpw=flda?*%o@FI5xngx4l@|t@&QPR%q4aKbz5ns&Y9); zy>Rxq$g&^M>FgWlgm~@;uB`wSqAK@^XW@cC`-7Rs5J=SHD~5A>STiT;RpCcc*=!$?_lE$p&C40Og)s&pY+$pClp6{>jn_JLYpCQ}Y#hdRH@sYeaoe zot!HLX>QW9U9q!@`ZM0oPhYDDIiz=OS^TP_x>0)#TKIz1CiYy+aMs_0otuVvAFZmg zwS53I1F--D~ZlJF?||fH+G{N zare0+OSNSw2aPO+{0|(bEfn!Wje};syV8sz9{_5AG!_b^c%%wuaf0DwgTSUYN5GCL z+{Dzhdyg58RkmY_bjWu-nk-(T|3$rwvy}2V9VvJeJqHkK*y@(rvT5nGrd=-GIw$h3 zs2$hhUY(%lU8dRDuX)WowKTzNeK3nYR@P5sY}j&U6NYHo|}C0D_;Kn^M(qE|B=_r3K$KCM_>3I++;c($CrIG=XhtrOg?npQ9vFX${N*BED8VYe zavLF`J#y5t$LUS+za(>8m49TeyDR5C`KxMtNfSg16!6$yFaqi`j`0||`&R~8Ew~Le z2b6KLvD5*-$##u=mi)MlHb%|`lG9h^b!K^9HiS(?$|DPEfM#QE{iWZ)ux9T`tpQYj z%9VWxBJU974W~GZDp_*4I&^IX3IAEptRZ`|l%Au`2+%nE|020_{>A@yHQ)a(+=}{6 zMV${Ey88dpWOkizI&1vz8bS_d-~THllmAOB`Y%1=?f*@nxmlh6Z?E_CGq5G|-)hi* zd#S&g(En>Bx&J=$bCqfJ6YQ9$D^!8GS#_~`~U49ciisIzyIGq z53btO)o}kG&;R`_y$6=}KYSPPnfYy;|Ns0u=o4}THqyZ*5FP5$hB9;UU9N!BXWG7B* zKvvzfFTXkv(@pdMJ^QtA?nko4HtjxdO0US%jOA-(BL4;mnJGT5^ zHnpg>Z`WF}wYb5N435jkZ>)ijo8O&9K+iwk=l}Z^exDrr&!-%E=$IHN_jiEM??ku? z!6g{`Yi>H2==FVKWe|A6&P@3g>d<@5P<7@vuurDEhn8voX7Q}VfQ{y*3xO6aLgg=77k@3_W zd;19;JCea0c(xP$LCo0{v=jX<0e(^q_s7@35Ogl5UT5H&B_7PurT^H-s`;N_von2! zu*N^$vAVy;Cf_s#nOEh)Tp|8`l`feTy&;cjvp5+rlCk;VLJR^qiexV2J~}%>;QNSJ zHW0BbxYJIH3-f3L@DH$YzG}ds!xGv9n1c%VQJw{%i5j+{hzUX_=M#tMSpzrgxJ`rh z3;N_yZIK}C;V5h+kPW)xgb3bZ@qw;3xdb2H{dKDvikgMq)U>nE`p49SX*K_u8Vm#2 zN49^}{5KhB)+Ux~uSJODehZx|0-&wAs>|>~I(utAH5B%L=;fp+`Mj$wISbbLyN97ucdKi%BC^v`*gA-Ow;m7ke zxJe8YiSlv6@1Ph)**aF((7n>(|7}!2F7y|?7OZv`_W*-@7u-Ho9MikZYjN@%^SI>? z&DGLQLQK$swTNFX_F$C2LOpK>+F?U|5$MmCf#Y2|E!ZP- zzhO+wEJPkDPl|HcB_sU1uYphURL|O`p?Fm1DGajYGYU-jiFwi+8W1iV&{p=3LVF2J2m2aI4xnWF*9 z1r-@#*4LLNqHF=+i$#L0Xqh_5N!MfAuH9>OMVz~5PH`9 z`5WG|RfHUpnGKH=B+f+!5xfwaN_h&s=pi#nOz)$#|Fpo6JaY3f&S-(~Dy|%YXVu@y zT1WEkE&)r&Hf!PDZk<=MR>_&e@TkETSk_lD4ZeVJk`OG~R$NfK)8UmIn~cc~z2tCr z2f;qksJ{rZZv@B1V}d+)EJ~)22;^)K42(Q@kBlw&?}D1+&{e^8OMSsx%}W`5|B4=M z=^0l`|G`6WEEJMEyIMXy^8J4E&NIW`c7$2@G2@QJ!Hk-7QGRYdaZNzSlgCkfSxgPI zB1Vix_#G#}ksTXnp;JH5cpuOi1_AztY3h~hcj-jA2x)Nbbo*SVFkDfV0!g`XF?*=^ zu61^tm=V!9mz;_Fw1VW0!>!of(MaM7aYp81r{4xV0Mm&N!jp7$gK$0(SGfafwf_*) z^0AP-SNXVIwhy(uHK+4IQEYdgAubi#%TFn&KG5$HnX@$P=Mnl++qfvKNq*R~x!}qG<7-O&CL3{Y&iJRehU4`c497xRQ}fELV_!BDUqozslSnnZ z@#o$8xKR14w{}Zk>p44fn2C(j{l?*0)z^=ZgX>pXcoqic%;}v05;Ast8jj*coK{f> zo;BnX7P_I<<_Ya!N^)4-r zP#*nqAWk*xOibqCBVIqcG|!55?b@1m!87B@_hs{3NuADio|H%f)BMIKG~rAiqn`7{ z_wKc&vlU7FvLK4h2|=}ld5?(6WIqFrs+M?V^CB{jxb%sq*PHe}M)QiKLc80VL2!1a zh}$Gqq}}yO(D6ton?rMY9@j=Rq~xW^>%_3$BtD zlipRx-gwL<)nq9RKza`;BlS)8vGH|x21+-D@MJFLD%TIfn>Ps1i=&2@N3$BeZ5Y}z z&prE_CB#`fwSE}>y%y}ed|}c2f>xk{myn2vvTdq~)t(2k5U&4tG-98Q`6{n z*PR;4Z|8CF98UM4h!_kA`$90e(JKf^i}@R&P^L>B#+|F4@a*79$)kJ!vyW#!3Bpwc zcSlM|I*x1s6MK7txNJuZN%#di(pv);pU+y8d@@!Pg;>LwcfBFd!H)-mXYph0uedEW z259zr!f2Ci%7*CQ;lB;PEr~O}-*9)A;m-XZuMlfF3wy>S@U18$4X$~E{0n-fGSjLk zD}pw1D18g!a$)M5*=wzFq+&M0%_f3}#N&eCnO$&=hT2o~`#GU3tGk-ntXOsYy9cqO zP;4%9`xI;1kDo|BY%Tw1OwEE0!Il&(>q~2E`E8bUURX9!V!4P@e{%$$&8PRlrhtNc zVa_ME%drikmrZmvMZ#-~mo`S?Fzc_hTe zzmHr1lb+*$pY1R# z+)8+qe#A{gY2AGsD>wSD+_PdBfPkSRJ1L-oV?m2;FkRwjn`xY`F=p?1rR!c;>F zzhzQW=%6L4zBgSWZG5mBGoe;FltTU!lH!cqg4D@_SF+b;S^~ewdxP@7&u}*Ty3Z)x z!Cmq%x#*vO(hzM_{q*U{-1jJ+v}IF1SmK15%{TL`@9Rz$CUXKsj2|qg3z($!XOG{> zNgAxvrLmgD)iK`Pf({*y8)f(7WALx}H zHut!3{hO+{pD{3Le&>#v{wwo4edlQv2s78xxjl>kZikVdP`hg;06Gp=kw1zWg`$8I z6d4ckhpKP<4MAA&?v7|5nILgraTLM)4@5H6JX-cdBl|6UPt<~u77M2Z)Ik@dcQJ&K zzVm6sfC!z0?xQ~n3>b-E!iM=!3R@tyAWyE1ytTa^Ned#>%#2dAJ^EQOmmGjI4NlEH z@d@6rlEZPTRuB&mM6=NhASs{D0K%N{IzR`ILCtk~!LPwaTO>1ZfLW8TP-VNmCU=z? zf@;(?TKAYA*XQrkD5ZB9(rWS|wovY7*zQrnyCr2}x5a6;2;X`!`UUKr(?AjXvP{$n zKFJyKK7C=7d#s5xj~7iD$XkrLP7&aYhklk=d41h>HjOYNv^f}$5rF(1JXv@(&Db#-g~}!QnMQbrwzJt)~P8A(&X3{X1BCsYZjVhP>3m zr6gJQGD!V8QFHmZFQ;O=!0N+I{#!49RSKWeXYrU5A7SH*1+&UU>gd(3b`ylkTW@!SR#PTJpkvN~2d?&v0xk(qF7>|HEZ;$`v&Cn!8cb2UUSj2N zRkZm5Pj~Ni*Uec@jgnuQ`CXIie{+73f1!(w&jM=B!VeKCA5?s`6ps6o9<(7!y?`Qs z1tga*=C|#1#miY+z!`&3F^l4?XZgXiHG79&2W7R!4Dly=xrfZm^s|@?#KA-7x9>C2 zcbfYqF+LyToZqb$!v)=MoO=Jm&+x5>+;CQlf87GGmYfkXpZzW+k`)L zE$r7^o0J63|Hw7Ua6Mf>EMf|Yf2R6a16%E=1q21oCfNM;p`FKvd4bF?&5Tc}i3Iq~ zs=j>eVesT}hk&&&<@zNMenJi`(#G8HMg{IwJAxwoBvnXkM$elqf8A_$gDTad9dQYc z83^_h6}5qZ&UV?b&+uMp%o5ArWooaO`o$7*U4o$C6t^`j8WD`aPcMhxvoLToq8|;K z0?iG0d%7IzG_5&v0B;!uik?=SVyMlB=lCuNF& z<89KG`novoghndHIPV=bi<$PuMtHC9XGTxtCg+OLY>{<8>(JQtIsd+a+B&j3{(k{5 zPWn6osBNe(Z&HsVO|uTu{fQN-9MD=1g|euZ+8>*%55~7)2(8RO1^4x);VABKYCje zZqDI-_OjbAZsM@0VV=)*APOu4t$;BZN7pI-d0yM_ri$ery-9>j2kR)God=^&&iT@U zg4QpkpA~T32|BVMJ{@hPI%Tl{9j*``!q#^VzL6mUM+SJMCRKZC8WB!z85~6 z;m8yvDj?|KR3qF%Ak#cLZ=3KgA$QnXHzuGL$JdVZ^1)aD zLU(h4Y#->;)YEFR1*~YH{#i-z)l#0!1ZtvIuGXiGT5iT2(X%gKec=wwTc1bI1kL6z zq~&S3-|5RMlrwW*kL%QEb)Oq60`?03F4~(*{=F>AGxw#DK#(N9Q)rtne)SbkbF1LxfEI@XauK#9>|1OJ3u@G(4wKeSwPsf4M66 zD6+G}Z_^(8VEkUwH80~(Hj}%d-=!qTSAO|lZAf!M#5O-=ORp^$=)Ol#SX`!JQ`V@* zlt}key(X7J?jF@op_z_DUCzqQWj2z|!X*iFxFB4zg)er{A^`a}DeJ(%1pnr>#gL%m z4GUtt`I*`g(6P02xy_F|9TB2=7>rWqRv!q+X>0NL;4-=+y{p=5P2JI9;l+8i6x(0% z0i5(A#E$`_*I4*+xmO zM>|Ko1b@B3hElElAENf}zfPtW=Rx~0u#LsTVK9j3AsB>Qj`Y8t4?#4{oaZuMM$ZGE z|2Hk7XLeuLvx{LZohT!(7)>`Y5ckRwX{5iL*_3yaQ@=Wtqn?q8l1ak6YcxrcN&+Y@t|XO1Gp%Vn>pkY!p|mhT_By(Pqty~y8bBK;Vj;rld1J&q)dj6}FyYK*>t0hetD z%~y^|-D*Sq82DK@@>Ade_ety1YP(Tx2}bL&Kef5ADgXxDX@E`}Kl-$%bs|M2P6(@UJuk|_*=pW=Es9#H(~ zxe#@OTb6Y%x9SR!YV<$H^*TZiZS6s&vn9&<#Cx-LvAMt!s|Je;uh;KA^VT+ zzV*iZxNN$5+a94(A9>G{QvGy;_!jYVqV0y<`kzTvYRIod<0Sl?Nz906@`>sjSbyG` zsQ%){yrO2C!D;%Co-{vp`SY_x>1C>`h}jn|C0)Do5xd6&r-L%?Zzh#TYP6`SxaZqx(civ7~ARW;?jN{dkMuQYKs)n+RqJU*GAqUYrCMRu8-GaG$Ki@T=cYNK~ zy!u;d@5`1Jz&y}vMvJaHxyP*S8{bsenaewzGvyG`JGSwi$T?vXjW<(;Gw-A3t}RaK>wmgG$==<+Uh4q%xjzs!@ad5fea!<#LS$k);6<>Nz-ZscE@YFf@-Q$32auVYBfKs zmQkXo0V?-P+IuAQDd$e?oQPt8*W`G!&6o5|HvMc`JW86Y;t%A5!k0#a7`OpP(~V&# ztX7PMS*tY#PnO(#ahxk_*D`PopoG|b^K0`{mBE%mD$c^$56XK6`h0Q^$KAq-x+b>I z#JXWcJh|O6eWhIuK?X~abIPb5R}t>=5o)Q-yq7QhA>hXRrsp~g1V32Dqfam0dw_;N+%6wFL{}E2Lnk^vkO+;aP)`6>w z7*W^$T}Fi^EK7A>;-tWcWA-D;XnwAE&z^K%oJ@CLsMxhAh-X5oTa+DBDXc_G!{dY1 z#Tu%{Nyh0(TMo8a)xD|doVs#PUuCQ`mrzXdM;dswZ3c}2SVvgPuN}3>??#=c20oI7 z^t-+u)7>g6PWuv>KJ1NCW7RfxhUU=Xv2b)!+x0EuPXP_QGPsM0ySkq;d4j`s-wg!v z^~VP!vQj27s?Aj_M@EJfDPiE7xSCzq6JO%JNy&!Lh3p$Kuw#g!S}^rs(1rr@c+T!J zcW{G3v~!f$kdfJ1MW9+qPxQk%{_8i_=Huw`aYuuL^UOiD-o)?ZC;pQ~Hx0jX7vhBE zD3;(N^_K&EB>ELBU-;b48wm61O>xPz%(Q2%jH%7wEPQ=C4;_)|byR41n=Uy;@a!jF zNUb$s=R>v5S%rHKN~f8Er?wJvC$zca^L@8gvz^=b_GLGQ6C8^~+KJ052=Hd#gmW(V z8=Yj1_cw#W(Orv(i52*k_mj^eNf@QPwjWL(YC~MO19k02N*{6=B9oPtI-?w!Q}r*f zpYcCvI@lInR8FVpKr3+4SbXK(R^#l3b-kuyMjGmcnH-14J=l75BCSvP{M3FzD(1CN zfDi1&F9ordw#+u#YLToPgY*xLiG5J-!szNT@5QUbS0Vn}4=cOont3ZbAD-~06ZVjo zDviw$jh6KH*Bnfb_~%h(;oZ@O;}kEh4d`4$cPdfNuMyko)A%prsfbR`)`&WFntO0? z1+$sJWTi-qa+SKObXT)ey3Lm~B^xUvoZ%q-Pm6r3`XqwIhfO$5Du#c)If29IcE{^x zAu(|DH_81{&AoYZ@d|4(@W9Q7ulB-vDnrtA!Bv868K@+KVWQoVLcMfL=W~-x`(Ne{ zKbiu*g`YwI`%q}7B3C=o^0e5LZ6@Rp9%3Bb7LdwuNW+y z>fT>k)^?Oo_uAl|kX1KSo*zi8R1s%4{tAn=)+op{pI^v0;qyS1T-^kgyedfAmZlC$%AMP?3Xs|DPSq$T-J;o{DVX{^L?|Y2unX~| zR5?jJ)3}^ZO9-~d%kkr=VOw!GAqfSY@})tr?T2vZk!Nq}K1WYAeK_LmDG6x0v&2tX z{3FIYv(YGS#)-4Q;|a-ApM&!tB&!mp@qsPeDB-;kjvx@%J{5*Dn?pmwP7M$`k4%iS z)fMO4Fn{!i_63;cG-HYfO+X+fTODE5lP)d&)3D@G7pazkUrRqFo93ODU8Cm^;hNIN z3qMBQlnL8uFc6_T)g6R1wxKpjk>r8Rr4tYgN4PYt-nrL!t@;#gOsmPj++v|T_CTR$ zYyE*(&YAbNz`4W0^STbhE=5yvi?0R7+_2z7f&%UfWf+g| zdd9vsHQwy5FWliOd8bL$CQR#jR@^3>4rkP7cl%QLQYxa)o-BdDuj=7$!}~dtQW14T zc6CFqKG>-19xspB35>;QCNlIOKmW6KxRy!g1CHS+y5ok#`IK84S#)X%6sip@tU4wy zdAB@@76ejw0>;T-u48X)Pt!MODoM>O*2ptyu8hbWei0kN2<)$!)ayGg7=A|0k`l7Vi-C+IJJP z^KB!Jx~WamhS-iWZGgb%rk4=SGba@k9<=K`m!Qd8WEwlrsw{q z(y&uckc!(0-mbM)nlVt=^+k8y1mZcc@z8?1Tg6;CV3kZ}E^vJCdgxC#9bvltkQSb) zbP!(lcP7Y#HoM81<&_lG4YO3gZWBJ1e)^y-Oe#`_4^mhhS4N@Wb&FBjM(lJ5k?X%y z$*s7vKj*a;iVxWHu8%rsHbF-+2o zgZMp(qO85>LL*CrKI|L$^@_&dg}Ps-)*Fe&nKzt#3!m9I8euVKk2>=9{4P z)9ERE5!&+lUfVIK5!Zp-16S=VIh$=4sjIMD2~{G^COkB8vQ&i=mww+f+kA8=YBLCG zoffg^-Qul4&Ync~A(jL;{a_%)oYmq4xdqBNWj@tWbr7xhE?TgMR;Ce@Pu2q-aHyp* zHmRyEC%4t#!)nI7{=oJ9?a4>=H=5PAI`mh)Z(X|k=EvL`?_1NSybd08hJq9Z*rGP) zG4|){?k7|3*-4)>sxqE2tJ}~ruRqB2PHdVs8+u#3N6(T!<~ZLv5H>A?8gn(N3)s3x z#Hp=B<2k?`<;xD3ft}uR$(iB(%?LtzeV?Htc#Jjyo{Mjdk5)ymhAno)-ywzIS(Z#& zvey$`iZmyNw9$@{?N>zU%(EE#dudKDCV6d$(ls=Tw+lrqL?=yZD8^AzXXh-;ULo7> zaeOf-v5`gM9Y*D&Ke2ZN4`nSt~ z@n8Pzg{;?v&RX^5t>&AG@X+L!i%=+zE5GPfPS1L5KK0Dx>vf&^W@+_O6I~cxg(7T$&EGeH;#??Pbt1VH}j@q$*yjNWyndXrOStESUje;27tR*>Ix zv)4ZC$xYd%%3Ba`>LdQ$MgM~3B0&wpvnw_cdio**TaUKBHd}g!%yVRRmOW8AfhOmQ z=y1)6qE3|%x!$WdSR0XTX79e@{D4jnmd*R-+p-@&cnWEI%}@6l0G-WJ(O^xk+u*LB z&mvA6Fz56yFM}3i-O|k`Vk}&aqLptx)Ra_N3K8!7mS;`lA)l((DbSEc|~9r3(g>DQ|wy=!lt^xLnLGsB)C3LUU#uKY-eAE! z-q|`;c+li1(WR_zI6kU-D~V@V)rPK{JeA#8WsBn(lRHCbb2!}LITvvG(Yc~@-?pI%~T zzHcx_<+CG@+PedNXIdf1@Ms08r`Y{-Qv#K14m6ZdH#|6qD}o_{n}0f(xT z!!5>zGsb^8hOAvFvuB|mc$ZZQVzvCs= zWBufQwwcq70OlI__A!`7c{PrNS$8 zrP+l)T#rUMinXpo(eKs#14wwpb2=Jy;R#pq2|v$1o=r&9tV4%}K|3pKki(~YzNp40 zhLG~lpJD&^mQ?2gH?WUfnx_oS%r*rvX$`;68Ym|i;Vv%BSL`is8% zP0vyBc~oy8VlykMJN}$UcP+x+4@A($QztFx@~N6YySDV4_zro?)26J?8*eSPZCa+G z@zST8E(y}hy}u)~Dj)mfWZkdpoA>`B(G49)5K&y4swaN}xKzbve5aS4Zo~73N5}|B zmqhlHVEnTfg*fMZ2UAYGdGc_Cq^Q3n^W2&jw!p%`(u*aNR@eD}vv`W{G7DMIo@2Ad zfDws?qu5ECW|ZoQ#69n_u$b4!ufQ5p5H00#ftr%h5HFV0>AHd;A%$!z)Q*Qb0MN}I z30h5#c7_>@s$f0dL6c+h3{L#EZ+OA&)T^nG|AtM@U_F@LVhL&k>NA_!X$2ZRp1cXp zcKXPqnS>|ur(PA+$YPua4{T5ni3@o(>kOLsrzUQJ#8jYuedn}q)%f$F=%4#++P3;H z$P@SjiMi1-B8tUU3tas#75V*B;IdnDGr_?PRQG;4pypgeLTa21XvubAZX5*&XOREPj z##5LyJF5w|wDG0h9mGWW%vF|8KP-g(lDYPD%9_$`d-k7cF{ea#-04>_@8gVKWvhEm z?vQXJie06ToX!7T$r7Wc7gxvitw+1&#hCBI6;}{>ri^R$_a{GpRW!-L&*f3XBsPJ* zmjZdzH4HuiCZfckURG9{J{c`iTt?sYs=rpF#`Uf-c##VB2zCTNEJAX}>yIVPT}d{V zcnkO4|2mPQue1k#Q}aPY!?0y5LeH5*@0OEJe^Sp7_Lmz&R>{K>_52j~ore?j6|}Y1 zRKSS@tBWO&jU^jtJ(pHOt5rgs?3@a#8`i+c{4ge8Zf8)^3|$tv_*)|RD|}Zo)%5Fr zpc(-UrQ>xE`K(@Z+T^}RmAvSxm2X%MH+!H|9n`%Pvz;|fbLx?Zx6Opbj&5x^+NV=I z&1`!fibxz%I1YNjh+*erQ#~$RF=VDNXD%qTI=;dB$SLRDLiI2YCB2xtu7=F5?iqKx zArU)rQKkoUiowt3m)eB8piui-O*#wtxQ=H9oQ6+lAnB6bOVxq1x#bUl5WEw%H(#zO zLk%%%0|3yrJ^1<7Hx~l}{P_uPy~YA*-jLg6dN4Ki`D>|;@Y=1wqFUmt^}LcKvRh=$ zK%aNJ_^ix89a|*ry;Li#RAp@OW<}ySD9xQbZ@s8~UqF3{eA6bmR@S22t`nTX+{VJZ z?6{g18@+~pkU39pQxcPBYLp3k0Z$n9dOns6IwQNgplRQ)4%pPDU@A-xj~rorpC`QB6T<%rkEe;1o_`z!Z19~e7M_}XFAP} zv~gB9=O|+kqaH{JutnG^LfE@|^|`Ql1BO4F`R81R%;urY2p!L5OQn#-0O$6Hz4{Wy`g0Y*|nnuxJ#&RivH=q=3D#|+F>8ZLimtHjxQ5yu=18TD93>R&or4?pO z+7Zdu-&|so>%H~-_>;H+V?i8pmP_zhD7vG9zzb$5JMJw`HoLZM@y@>UXGzYfk+kga z@W<;OGA=4Iy2 z4yBV^`qGh|YAHCWL?aerVbHZUY7W(C3&>J6EKn1x^4@>!6Xum}VX@|_QuI*m%W=3W zMQ}S$z|DLkosVrd(=rb{Yr(PZh$z94rJxe6tG3TF475ErpwGtChAQv7SY_;12V(E0 z^!uOLqK;L@r~(_By2zsje!MLf#ETa8V043iJ>&`)S7uVO$vyRJzIj5DB{q-dSs2y* z3v{{COOt7^4jY1hc73eKb&$NhYwVlb6+1zbIDS6g=+T;T~21AjsfhGN7O_- zo9d?R!%S02zNx;IiTE(ra~l=S>D@DL*_yY~%y35;EM*uYzpr>#$aGY>NDidBNE`M- zt`Rg_GA}-74cau?6Y%q`fkUp#_gOENNAK15LTQst)oecZ>KPB|lvoo!A~f4k z#P`P3mQU>L_0=ua()6>xR22DWrxe0&Wph>u=Equx>f#bp*=IkTT_~0q2@$Wp{j0KQ z`>nBMWK&8_QP**k`c!NFVi2afNrHv1QuIToa>KtA z)i9*haW+KhIyAS8nA{K3R#eLOJ`KP8VSd#{GpRHCrL~mm`oLy#=VGn7A%3gmU@S7| z3yF=CD*9#Cl#WWPa+T633nWcS=2D9O@}B> zW}#EtN|WU__c+F?)yVCgsRCWy7j8)-Z3_J{+!_$iBjjLp+pOnus@^DUw_R_v^DQzn zJx~^0yH%-Ha&F-L6V4DDbVs%e1b52Vz`b}tW*}|Xg(@|3O{IvHc2L0Q`?Rlh)I9y0 zd){}s70#-NMN8Zd7|rh6cvil=>hUW}Fzrh`aXDD`LCYn!BDtv4ffhc#QhKV}e$u+R zKRi(CsI@R+U9pICc?Sy}nvUS9H})*%J@U2*gJo_lU1%b#$t6K&OwLV|qWLSJc|Z%IwHf(EF3WVhtE zPz!(Z=c~10m<5wJD~Y%1WOcXq4|e_HpV?Ao%-`e@V;KqwmxjD=vG!+p(0tlp9UbvWd1x=@x-CK>Jo@wV!3P)CO1o3Knv|~;oJPy< z?VikeZxPpmAvPfkn*1(Osh*|>IU%O&7ItAQ7b4oO6Mk%Q z_$dkuAQ0meZ(o`;x!SKwU*#{3Cuz9n6}DMaTQmMJUw*m_Do=h-%oTZ7%oYV0udtoD z_kdsW2w};KwmQ>oQNw2e8w#;qa2u`iS@P*yq#kOsBjkWtI{-suwjIgz9gb}fgzPsS z*PJ&y{~x;E0;;X8YZtDZ3KVH^=M;BZ+-Y$L?jE3MAVBc~A?+zrf)!2i;(_2=ENP*X zA}tV{Acf-YF8`+Iz2Enad&kdUBpHys_gZsJpU;}>+6|qMxByi1r)|h!@sf_z$s{i( z=#X-T7Jg!ewDj&89xT*s-dMzMVW68AfM0Q39>m=Ad-I;tly7#L{uvOX4iENya^6*U z0?Rdxc?a&dVPpOi*}u5oO1Py?6EFLlKo}-HQOR)Slf>nvkuPUV@_ z+*kHaXn^pI=iSv(wvL@=)qxXnn_Qmc06uK9=JXCB=VVYwBS$KCgWa-WvPedo`nyG^ zYo^{Abf{?gux!fb!5npTV zvGYx?4QX!zJPh_N#pBhHIuCi1kzy%aI3%^o{-^2~s9i5Ti8UCflewxA!@CmYVj(Ga z*EeT(B$HIm|JTSzAtR7)yH!r`HYN)7Qr?%U2waEK;w4{HbFpd6aWryu{ARbkSDYVK zq{$9bchwrJE-|C5d2?phD67HqG1ztFZh^I-W~yz~q>G`pVXqxIRb&FhtV^h~NO|tI zdsHAqBF42deSh;O6X6b1FA{Tnhy6mB#k%3r#?f@KdUa5n0~)mSj9y~`<_)K|kknX| zdX^yDWh=fs9OX}qfQSYgc38g24O*ruJGzaLUHoe%>27)c1`Z5WHFz{K42Gs_k!iH1 zgL1H9RNj`S67(EVy3P4qucf}=LzT3`s$ZIoCD<7xqoU`I?&N-6AKUIyTlAcdHTl8| z4jT6Q(0JzbnW8-N$7|pD2V-wC>t7hPG5A6i4cO}UQ%b!j(+tPLKkh>Eoe$d<`qc&< z>k2W^mku5zlt;-IMSE9vOBSVlb^T|czJ?_H0NjyGY=PsC)#rc)Q)u5nz*Vg<7;ELJ(<>Nxfe(? zc-a)Vh7Nn+;?>^y*V_EFx96I(moz_JcCUG)zC4?fZ-IYl-2)B>{-;x6>Zm_%3v;C^ zKIM0mJbLwOl3+AD_$TFzc=+*W7^y6s zDEp6~?Re=WS&@SjX+aERVl0XS9iO|DVGP^S$<+%*4F1pqJhF>UDx_epRn`+>(Tx0U z&ZucqtEc8eNtc*Y&4v~I&a3xrREBGfuDrXKh;8GP3BBHtFaVJZ);GaCH(+e zkn`5dNo3PPV^F%GaZzEranD{2^7anYGpBV0DImu4s!ZAF>L9f2#GGBtb|vWNCz#sO z2_UO{?rxG9G&fj1!?K%AZ;f4U<#7Zu?cn2rnIoMLzSEyu6S6Sd>DOLv$k7asbF8ry zyqz=15Vv_rJZDkv)vZSb=d=GmNG!h`vhj9pl znICc`{Kz4+c$51+_%|WPWU@xoazrul0ctg*;_e(HMNTZPxW-D)k4oiv1ekiC!VRU$q#7)L}%N4586um8!B7PVH>PBpi< z>u8Mpr?r&vJ;#~7UsI%fYUv4^LCXU{Ou_T9&CD$;^~}~lDCcA?vyi_d*(aIlwb-b4 z9uLI-hV~MzhOjfs<&h6EwvGUcg;{IA6D$mgvAj~`fjs9@1NSzN$IF!(R9|zD`fgB6 z?qjtOxixu`1sG1kp{e zZDRH6jypLde*Fzk(04~01nsl?IUGR#uBH=$e+E3kU`F3r7 z>+A9tEd_>RpZk?7mu$YOLcnhB9F`y6o@TCZQ%SY;fH!>tKH!JGaNbftMdPwxO1(V) zx--*!hyY|0h)m=84f9`-%6S3w{E;EM1-METtt*GzgYLppPxgMMdtieOW%sRpr`}1v`)H3@v zNs+n+A`7c%Iok7<{u>n6%&GJ&CZ=d7i?}VM^`C#xT=;2y}=2#yY=c%$vfjhSkSt1__ z70Cbg*=;ll_UP8Sh7>HdM6f8L)Q)8LU+iVLU(Mcb_|Xa}*^-!^4D7C z>;ESWZLeCrQGFX9EzXV{#<&n47^KFq)mAswCz@&1FY~mg@9Q@2|9*-Mns}plcr^yU zI*z!~mD)`Vn(+@ldUV#?^|rlr!uS=|B+YN$x}LWiseK$FuZuB%U#eMNYZBIAeQqsU zFwMUg)qaW3uUIeWt$fbSmxs!wcXsVN!3v(^w$SC2x?T9#k|SwWTbmO4jpQNBM%~}A zR~=MTiEd2$;@w+execq=+ys<=VL;ksk13c1%C*TkAlg+nWtZp=E|>1C=KVK;QhBzx zP-E8<{li4B+PenF!v~)wjvOWR5npSUP^Yi|3}D6k`R?u6+#RYaI~YdQ^)IqBf7*h} z17wo8irQknf5|eD=-@th$$Yjoz^Zk4{4=ieyj+quhy1q|<5ua10lU-zZ+T8b;-V+Q zqaU7fs>3f{s7!3nrds8f^V6E^Vi=PfXaoR02?|oTvgkp4^{iFz)i zyHOZVOX-(YdTxFSEZRU`l}kzi)q?4UzO*NoI9HFRjfi-H+A~qu$Rv;pIdmW7cFH>I z4s~y+P*EH_*z|xAb^{J;>E9#LTT$!TQxyObnu0{Zk&{nKdukDq4g7w;3`n?<-bOlCxPCbzOK zT3tC|S1I_-Ci!Z(AJ)Bf4?{58E3r4nP5$#_^RS0kQ6TUCmol`RjeV5rj@kSB1f1Em zOCf>w5(_H1ns|B#^BW1T6c%qEECBmWpz#)z!r7}d+L)O#YOFY;$xNN^-1|L_5cqCP z&9#ZRUJzgWu@etgkTa8R}mI z^lqgklP#o|mcM%9SR3jW3(z5d){v9z0qZF5wf0%hZl%yXZz|d@QvF5WGi?n~TzpGZ!}YSL-3%;ecfQPUY>vX!cPQJp#;* zHjZ9ijgTuXC7P7${==vou0NZ@*^!jPy(G{kbFmecplN{h>K-fPqEC;M9Tc!jnBP}X!@H@)vuvqOF9_+8fSkmSeihD^F^ z83%=Im(6H*`(LhdX|n=@VJw`P-lw*pvc{}9`Tvoj1MtdTwA`>#w)ZvZLc4pg$=bMY z1XtVlQua6FuZr_ME9_&FxJNyA-Bac>=?wsJv1L;Y@$&GF%oij%^SJC{Lp#T-VJaJt zn>`@`UHP{hRmbZE$+<<}xAZJ{msUuHC(i$NiJxWTPZbvPdhJ(~G9y>GR>IV*rT>SE z{yg^2i|&%kTE{hLz&huPH=x+$Yu|;)Ec*X=8-H#4NBzp*_$cfOgDxAhCwGgV=BaVO z90a$>xY?2kVsfcFFJtY{2A`2T)5*C!r|~=nkiX5wYy%vKIIrd~01plA;yab(`Zx6! z#aaak3-jkhuBZFI4}S=$5Ys-hpTApY_<*U&;|D)D(r!8a|NT~Ty_LMrKCT{lB-v)K6}Yy1Jiq14NO59T~;RdIs4GaytR@O6jFV3*pO|Cs?w(c>nOs zf0JqGUnlUt{}dYduX_G(V(J3^HXxS&{ilbk@pmtVJ1_N5KkOr!4^DgHLcXr$F~?ut zdK{Wojy>KZy*kN;AGgB~i-6xb_{GW<-6=La#CbX5a$e_hKJMx`?rMqW#{c|`@t2nG zdVLmzpY({*x{j7xHMmbzgdCv3SEr*DExX;}#PlJ1=`(JVpI#0YY5|4wi4=Z|diSYS zq9VkS;R^}hAnnxI(529a5KKvU;_;w-6mgNfA5#2(9&p21_NPO4FbAtw`d8kHmg{NQ;BDHch{QJ2-oq-lJt_G2MgYbPaoI3YG!<{na`MG3V@biBouDbKAe8 zzrOq#?@KC!VS6D3H1{YpaHDQ?eKZ|-AV76dV4?j(2P z{QKZqQvddA0!n3q?|tZF14cd#-3>Q57HSor3EnGfm@c8y_GR|kEs@f(-r0Bo_)8Vt z6%s}v-&fk}%42F%i*>{|oq-8S9-=a$bmlmvl{X1SMuQ z0{2R6)baq@3Swr5pwjGzWI&M@R2Ob=WO2~z=|%mYF*q}C8j}Op`$#$RDFgFq8KwZP z!kiQ~YHhXb{rrf%T*H>^WOzY2GdM$aAIuXK0g|x%m{T}olKnqJxE_dkWKA-p%R0-% z)?3A1G!;M3>`_9aeRh5T4$Cr#->~;uG(gRh2mv0^kgELYqZQVZ@WF^lqyL>m-}NMJ z-w;lbIh0AXH8wc58ML5X6uSsg>G0H$<#du}4<`pEpa)NVArX0XfEDWNvKqdA@{JoG zVV}}9f%hj*0$QnrQ@@Txe~0Y44;~UZNh}0vCj?CpTmf8o%ZRw>xGWG@Nf6zi%l^F7 zGC2ttJxx@%-|9n~YAuSrLUa41U;dWA%)@)~>}Kc>f6@iwAq&{Lp!_NF5TyMIV5ATK z%SfL$+t%6JH8~#14zo?aTFUH)1_E9BT!}ah)B(;9Jw-Kz59<1>zm-j1GKOA$e%S{i zy*M{Q4zH{SeT&+X++P}%J9Y&@6xAKf$yWRK^A?s}O7Y6yc8>m6!uU4qTZf+#~n5`^200obQhQfG@znaQ7MElqQjN>#V@l;%goCR;YHv zYcJqbo+MAZw`*jY9s8P1A%rl-J~ zDA$E2dS)eFL?l5A0^Q`WHn{XcDYaiAHk<{rK^0F?) zpsg?YCOP{I<4~omG?Dl>d!&O|Z%OzwZ>1e#rI*+C^G7ohtKlVx_8j$^5)Ay zo0MiyaOb+6&o$nX3I7auC1vjw!gXC(E}4saLXKUL!z7a%1zCG-f(`3%MXLJOuu;ZtxAR76T zE***-2{A?W23FFG<`?0K*XzV(;g8&uU#8KWmkPI%dNI}H3p8vT@mzmTHG$b~dyu@P z!M2Y=@IKmJ5QLj~FZ-FiJR>vI|FIfPUe1;DExO>HzYq($t62+svEgxVqqz?Zil3z@ z{sspeSDA|`&MUvm^Ly7y;feR|JUZL5maCWGz=Zj%CvIF&a#(KO9*~M?Ul9}QR|})q z%LAabd0)ZV=cl6;ulj8Ju4Z>YN3whDf(svNFXqz9%DMKb(s5hz=ky>*`{GDK5Xnqx zmA2|XAd%bjE7>7Vji7tc*o#rWXsu69tvw}Por&~OkOM~PU;hyc3vT4ti{k}-%pHukyxMCJvJNaJh)}vvM919A z%Isl0ryYZjtoAq*#fU`DjDW6wo-Pd58^x2ft~!{MGf2^vST6aO70xP#XSa{jwlP!6%Ke)m1>4dmVT4&<8ODANm``~?7BIi|C_IV^ogz~|s zd7|@WRe60|;_iZ+n&Vkg_y;B;ja8d+hA-nd`V>P<$tSOyvSoJ7mW@D@r--HnC3gNn zO2W!P4S3yAZj?ZETmM7vWR_lgA$@e$WTAU|aSq@=DERLCXP@IEn9?dheLuu!@}WH$ zLJrklS(dfmsiO>MJi7%PGW*z(mbrZuM>B9N=qTj{274$QAvgd=mJ7{h5yMZX7A6X? zpi#`MSB}YgQ3W(Yu+jDlI%Oz4p}TfI>utvhnbsUkwG}1C{OVE^S-xAmXFO5fUVd57 zQ?ffni|zj5L8yFBCIH8+ukRHp3-tUytxoczyx56@uj5+VNJjhM9(5p-)QfqJ1^n|Y zYlW!Yv!6^suLuUPf>imJg$ARn<}ZgKYG46Ym?a~9#ntuVMX?qM?q47Ve7YIb$}D!m zOHHfhLWuxGb;!6j{ZQxmvBKhX09%e;-pql7VeE50NVrIXn#B(=RauP!r&bo_^g`tf&O8LjlhLu z6H9lU<4*Xws*!(Wp&kEPdp&4Wxx>)Z$dXPfO8z8KK9b60Da_bXGgXLP#-|Rp(?N|d zU;eeCOxfcTN#v@u^T|iWoNq2#_^0m8Om_id*{=*7aVMJb!$ZjfPzhV<$Dx5mI)J!R z^97iWrlkryIpc*Y8XXZ{mm9@J!P+Hu?ZtDF4#pM*M~D|5$3_d@ zC&XB2h9NlTY8tP69t6t86q@ zdXI7e|Am3^iof;NdKD7+UMCZ4{v5LE!}#9Py`qxVFLFxxKg;aFD-d@v_kHDoR->H= zQs|!knsEye+PI7^Glv*C%)82L4wczn<$HcF_-@voM>-`|E_@uTdb;MfPu~3%y!4lz z?_P#RmfT3xWotb=$8c(c>rFQZSjetS^~^hB5du@pW48ql=ECXSpY(MV1cjwOy*?yo zqyoHE4IJ;805bfQ4fy<4O`IS2=gG7>=(Po`s68YaMSLDE?o4|3$qKZ>nq%#QbXSVx zFN%9g*ku=k^pv?&KPe?&9O4DLd-DZTwa~az{SJAV zS>PnZLqV)Z9{z~=s_J|cPm#Z2Bn^jO_V8>S4i|74w(r(GqB5Xa{YglJ`CzBJHG$dV ztQapBaZ8RYL4!ATtz57D6#e5{bk$)w)+E{0KPU7saay;Jtb+LNKG2LmMucw(q_ukv z@V{1b2hV($W#ePJWAhu4qAy9<$DWV}pwQh#R=1sZxCTkJVB9O{W-?ka;gE#kH1k6} zm-Z41+zYE_rSJ*8*pcrEwxKD^F(S&sd3MIuvRT1BfeoyA^JDGpT`AITs=RYcO8hA4 zWS=u39Cvk_z$1$OoaMZOyulgI`;BY3&Kg{7wwmo{*|zfBIN8Gwpd*I#dFPkV1kvCN zqiq54c8-2QM79oykewYmgcTsLxCLiJJxXUd*wipA#%_v*qF@%C&b}0JCHVSG31bsn zIm%POFAY^$FUkew6~ix7=?;#Rvf>Zh2^^ZEPZg;`7AX_tbN0nEA+BH9cT+US+>Q@$ zwW!Q(ROPwuijZCVg?<^c5iCc2!za|vTYz@1R29R`~>9yP!|ctoWu$a!V+7C+!!sGV7&lMaMrXn>8H z<;(lf0-2patLewduK?-fI~nf_0nQ~63WHjt-p3C=Boet3lB35oG5gvH5U2FUy6w04^mf}DEO#dT64{RI#D`-6KB zopGSdwAn{~Y^9ZVTrO5C2+{t$6O@|WzLG27RZv*y&*mzh}ParcQ#{7$EHMLP_LK}O@*s>)H zYlCU1XqNPg{)aV41t6SV6u!ug&Xo3Fq}OglY*Mg>_7`1lCd!`<+_LgUGn4-Rly`?_?6{b0C*C(HUFfyoT$B!m4FP2|4 zKu!eZ4-48bK4D;aA{ebM2IFd`k57Qom$;{{YX8sx`rqW~*Bri_5#nb%AcLucipfiI z^7C6K3T`3#F|{aZ6P9+wIG3i_W5Ul9wV&Ho56f`<)?np)a8T*%613<=9r1#5{z$P_ zl-56fVKHYk6j(v>yT6(fDYEE}4052nd6Ifo53K1q@WZNJqyz_OP33ay+DGN@l+im) zK41Jj(piWN)TNp7m(NPdFbF{RU}u-l2MVx|5u~9q{I!|3#0FK-Jkn^)ZhTbFf_kR; z4lR{-Rn0Raig5d$oK<)Kl`8yf{)l1k;pxsq25R9653k#u(1SVjecs<>!?z$`;(jU& zgXw)KEJPs8Z@W!dHNtP2@^91~UKpaxc(=!*JWQ<|Ae9p-t9?+|I?w6x@3>|kQUH#@ z)(dzgNKcRb`;xTsXBoFk3w-}p3p<%8)Kt$vBS#4D<4BEC~YD8VG8=mbAJx)l- z_M=zuxoejCq|(#!@@v)faCI*61L~YeeSUbFvoykZjH1A`M6;`&vZbjebs)UUFEU(_ zs@o*?TlpJQzF1o^NuNJ@jqDX@(Mb_L{Larz-H%%7!13sc^zjTPKbI?GT})_Ng1=;9G=+bdH$d=8sWBVJbPAl$9z(%x`yLsh+E) zqV$D~F=DF-y9BLLQPZX40q~l({_pyp&eE94)m5t#szy@vmxX8>hc@R8 zA+)CJWZ)Ok!y#i-#}ZEcH@oy z?mi7^tGR6n(5s6(u7)os@+!=5dpkRVON&9Jsz|QI@}dURhrp_Q-&VT|>6Crc2hn4v zqS8ZFVDoF6HD5`4#Yx@aY6aBv%w)2ny}CMQ)%fYEnq&fKeJsaL!~6lj)M5FBmN|~P zB8gP_P}hojBmEsyq7dYWA)XKyzBp=5Z~VEE$9PQRbQajb#KTkbGycU*-cCPta7%C| zcuMS}z~7f{h9%|1*a&X5rn zJs}2ULU%)cC4;;al&cs;kw7;PUa6Ku?pLN;w&R&^ODq2v@|<4fgGWd7scn?T0-yGV z{+lN}fG+4OyW>&jg5M~QHHk62YYbI#nB0_EzhP{P{8@=O7*#OH7m{k?8;{~qP@g5E zg*=xW_^Yr(f3p=R>;iF3c-F7p0`ouVyHy~~`cNT9?!Z4gcs`za1@Xc?(ZSk(s!mUv z@xs@tox3@Wm~Y*EMUhl?9w+-eJLkaG9Bw7`g)n3H?M$dT?5~FW{!uoV3Ud7{0VWlP zxidaW0Mn_-uV=?o9g6DkAK!X(2?_&I2YbJBrYX_AsSbV|94nS&=qT|QxVP`^c9}A` z&+Tqo2!9Bek9e9eRM;lQ!f~wlM}FVV(@+EIvSMG(;_`+2>E2zWmZmfU12XG95Skn> ziW)J#=qFFk$mq-K5^N2{q_{JvpuDO-ntXhRx(V)~9LvhH8Eo@NEXa-ZdEL82c+M7! zHG$}86(^6`*Mj0T!aBoup(X;2H&s=&yQ(bs!-@jhMoI&dirFh!e{?!_wEYRz{*Lxk zIDg7eUf4mkcuZs2MCw%V!<5DeT!~&L*O8gU$$puU_gaC(@+UG9Tpo{_ChbS0aHVaZ z3V&osZ`khLMHer4nk|e>-69$7@EURna2|hUyXFpHXv+@UZ4i}jj&1m8GwBB6xAY3< z$!Lvn>?KLG)s=R}I4>fLY9D1w7LP8z=fc~#foHp`GePX_W|;%J0UAB?y6w7NcOY|#A*7bvCqwS<=-X_FX+P zf1tHI^Ll zc^1VYpPy|s>-anX>MPyLO>5=D3y$Ns0{B%iwk8AEYbdR!4I38Es78-}o&%CD48o4l za##VYrXh#qZ*rch**%JFw+_uLnKz-xPRz-eI3dgeB>#n%^W6G6d>*c_P-dRn04a=p zw5@B~5_{~RKsk|eF0QE1E;jAag6C%C7?t8^D=Vv z%L}wi-XIuHnc0@>+_u*D%)F=4F65x6BB)lxF9826c*@g~>KTQ-;`;lMVSE94kKF2F zokqJ4?4a?7d06t!-$U=O+$=`uVG?Ww2j-D2(KO2JimOD=^@{Jv3yYl#jmCtxN2};@ zh651gLiVsZy;#!E<|%E3rT*Mfp>6P6eBmOy%Lv=Vhl~nTiW0+A;ov$cl<62o)hhHv zY}*;ZwGHS2Fy(D8?9duuS$U+kXAmj%stA!D27;STN+#;bSvslh46SvDCeA ztBSU~p1J*qY}M2R5QQe_6CnQj-->IjVSVv}nd1J5AnMAiurBJ~s{ozJ z^m2n&AT!5)VlkPtrLb4f^3oN#xr#`Wa!(_9`zhtP{VBTL4#t_rMXcd!@4YDuz1zl+ z=bQj_Z2MIf*mNo;nNq=SjHUayv8$vS>zgJJai{o|_X<(Zepru>tx>MB8{tw`PZf1Ce}E-3a}`HSAol$TC{(NNPlkJ^X`$d$zJ(|Dgj)SCxokdZgNUjEeQ|LHK% zxOautf10rk;Nn^bb+TWnAk!^8F5dK|if?6c6~(U7YmXPW-Pjqi@X$&Z)5^9S?BjK) z^bi_Y+I?U7Y#?H5xgEA&r^P&3Cw}gi1BkVm&_(}N)s6jRAa7%eY4Te!*9b3xcGb%o zbDWdB=-BV*DiB^rYwr(_Rtjp%iSe!^x}53VY`?p#D4N@({L~Z!Et;ZrIkPR}AcJ|t z#omMcFve|iJO6E~t_XOG6q-?$zb+UGH)!;HL4~Tw%H|sw`{UsujDqX^`hKyiloe7* z`q4}3@+gvY7DEYfn}xHwsDF->UNqPTd?S!1!U-#k)sC(xt9P*zwsA@Iw*7ge$CJ`I zb$lG;;Et7Yk!ETx(0uF2@REJ?j-P8UvznA)Zl3ZTK9^3-fbRvsu7PibBkjHm z)CcyS(q`f>%;gAhXJzJ{*-yFTX6nASk`9%7EHV<%kaHhev8Gyw{}$^-Z;;9lh_t2( z$g#^)OIGa7z})E#1WGv6*|FAYw`suh!$@(3Q3zcgtL2!iwESbe9wy*&y$*%yn^YY( zCn3h|JdeARELn<;?x9V6yiTax?AoO}a=9EI{YbB*YI|QAXv#sC$v!y7H&Y*UTA@Qb zQf?J=x>5uOY|ZA1mOd+xA*nSnxxL_Qj!5}9`#1+$+`B!<{_Y*&n2hRG3*p)Tdr8r2 zAeX-(PpA--ejpek&^S80ze{gNjowzGQigFGct!r>LO|U!rQiK&Wv6WGWCHQK@akK^ zp6M|T&$B20tz{iY3vQVk?UsRWIwF6fd@kxJA%oYF{19T`FoXd)q5K_q$dH%vSE^5W zop5g}ntfjH0v^KhP>Jg8hH>3jNbR)lGWPChw5ln9JdtuVlCX{vGpEkcWb6~ri`uOl zWiQFIxJbY9T;Un1CLXMhYjJPg*bQ|Ey~Dsr%EIGlT9~~gWHt62MXT1l{NOahWoEnq zieIememU-dB&HKl0}_m{!yZsi@O%ARo5UG3#>qLq2icpdBb`GJyhhBN8ht(&YNglq z-1{40_r1gX^0-re6L(YW_DC#r27Yx>&#MGD6xvA&LfPs!T}M}k(NnQ9h;YXf+Zw93 zDf%&R;AAwfM%sE_|B$v<_0TXUbsf`hrx*PZa`x(R3uyZfZZ!4vVbGx5!t+mjskyC< z4=BVE?CP^Y_DUBc&pS%p1xsjB43*n^L5~Dbm6|3f4JmZDrpaG{ZvZqw#(-f5t+w^R zhE3?hl8S8Ev(j?D8po+s@6A^KEU%<3Z$uJ}cJ7=cOkyvi8Z`237C31xOAdDWw3EU6 zY@?yMl*#LS-{j!czfQhp8n(lOx=Y+^-j_b9mdEZYDx_e36~Lk8SMJusj{2r?hn;<9 zu3Z!x)w_*NE0N-sjet-?)bWQXEr;;O3sgNnL`sha-SPJ7^#72GLgjgEOj+d&Sxe9x zQq@8({wfm~z&3Z7R_W@!=f3)lPu|+_BU0*YKamgq(eUww3SKJ24Vl9Lh-9I1sJH3T zM?^_P9gEvEMHxFbpo3RKAaI2d>grHe_Sp2Z9}55M+_s`MBzH*7otkM4trqgP!?!Gs znB1mtzYX7Y9=tY)hr3bfxq;YU%q5(qu9Q*p^tJiWAlxB8Ct)7-GEd+S(a~idDG%#~ znUB-9Xpe|;#*kTCw@xe+eq7tlpRgVH;b&0-riC-@W|@h(ic$yen__KGMKkepcpX%+ z|4S)wT)~ThFIx@7Kq!LySZW6wN^9Da4O~zA)yEhgMD$?o=O0U8pTz8ynV@%LBE`)@ zi83mevYz2mh$U$sZ4hc@OLx~XhPvxW-|NGOd8)ZWbDM9i-??7d@8_K@&?uC{wZDua z3%7qt(bY+1Oi*PfphukNtn^qZI)XhQ!>2?_eG?%lOH&n zXlLF}iN4gUG!jV2M&ynm?Cw`JT^gWlZI4k3=N;qO9V%Tri&Qlf$PA#(r5G*~ovsWQ4hw?2*jKgHL_CxA3cH(qaE9*udS1VBa4HI=ErllZ3EHw3 zHB3J&=*qtT*f*^Saj)Ya_fs2tN8G3uLNVecb$i56WQ^;3f|c`KAAK%W6E=qt01p4L zFZD3fDqF_N*o7(J*Ue@?3h(fl*Q#}Vi=lVw>T?(g6XIVfo-}3_`Tj56O${E^_sB%% z+SIy!fB#q@p8Bm3sU9sJ*b!{6Hs&($DYVXWIVS>eBNi=F0lle1XQ5^YTkg;49Z#P`6TMC`E-=Bh# z9i~d3S~BHsG4a@dkIO3MDqLBUulhY^2o9{2@uxnU4YJ+wZqlbD@9k!|h7^V}xm(B| z{cBY3FI75!XDMMCK~$=oXWGS> zt6La2oPJAoiDJ`tvGG8r@E7jO9w7=m3 zWHs6Ou2;`Hl<7pkJHHd(hOzb64fN2Iio#x*N`udWi8<(2#*+kuviLenX&B3iw-(A^ zK?z2{yYeTN7V0K#)K+&LxjM@QybNW-DlT)|o<}5F>dF3*w*WDNnf-3XxW5C;YFb>G zHh+#)2whlN>4Eb-{Q#sGWIRu^i@hZDb}da(UW}nJM+q5Oorf(jUTSiqebWbiU#KBG z&?n-9c~(F?8&($Oc`b7IlKJj#8uqIL7qyuwjvSgc_z^3g0`j|VtyG4Oo5lI1Cyu7f zQvy=qoZ{9jS5lC0x`rc|b+UQHAHlhy=hRx^eD&9{id*s@;~KK+m28dTpV-dk&zleM zjxswZrshTN?u=#=pB0&vHTp35b@Au}X^WK}!e*r@0wA&TQ_>S0J4GcU^-fwL(OMmk$l9 zpLf*uXi&v~OdrJ0+NZYlX+9c>n&_KDLdRhFf}1EESMJRa(3`q}pKeWV1to&lAuh<+U9$a|~7x}ipPhaXK!l#HC+(T;*` zvBB7nttgfx3IRQ3^hZs3&v*+yc7MKp*NjmLfR#Eu0q927s#BjFI;scS@MBjJz$H~& z+dln`y;1nVDEz_%eo%#tzQ)EG__eMEU&EJxR-fwGmRp~GlK|D#SggzMAWXgfb+s`) zJHQ|)BD3aaf{AQxo%ZbetDOz-rtdlgYUz2jR+5WI@!$eB${@uz`wt^@EL^*iSSzk# z2)W3R0;*lQ?P@XuC}sDj9i^HbTezEgy$~MF!VT3s(US#{tL8-YR!S3@@%0|IpOg%$ z7LMnV*StqN`tnKAMQ$vFrZx_;v`N;!d3*W$%3FoAkw z6aCPu2qf4Dr^#bwwdlkcVnz#Y=S~k=CnZ_t{vDm$&R3e=e9HZ= z;EA}Eku)K!gEs1#5Ys^(3p1H=cA)jqi3P{wu7)*R3U8@w4Hf=(&UX<%FHoi@zSNMx za{R>hy_&G1mn-LWt=tfepu7?N+R^TO{ho;eztVi)k}6Z&wa^F|ig&N{UHcQALZneetcJ(()rC*II-MDK(F@k?2|LEdDB=%VKI6s8#m-TU^^npzsq9hqMLlv*crhL#toTsFWOPpWrnChKOXY)Hf)G!(ED7$Ubu~kEM*6}Y7 z8M6uXQ=7s8C$pp9vjrl_Z|qg2A4q`}8Z4Jp_NK7|K+Y9IgyN8>M%2}WAe+SyOMZF!=Cbx?9 zs(3*>u%vnRvs@=j0KGJ}ClW=)@3kUR+S?iwW5Na?dCL zfW`_iZcn&YxFF4eFtF#K{qRHfBjckC&o%-Kqi-2B%(hv9PmFl7pys^@e|tEwL5*TK z(N1C_$h`F(z5A!x^FZf)%2GLfs=^Q7eJ;&Ra>_+4o%zD!RZGJ zN;n{Yk{efa`T^Zne5$rleJiQhibr?Xz^!JIBS#0XoZTo&c$T#lQRCc!TRsIyX<6jBXCQSg5x zWkSpP%0U8IE6oa>Y4eP9%u5mF7jqdfw_rQ85@=n^2iOh~H|9*T@sZFYknV7J)TChx zXt&D$0&u#li(*Z)WcqE^ws=eI<;_ znJthI&rgU-#^oKa^@cM_Dl6`dnWG$#B$ZU>%D4o=z67Q-&SzdL|De36hd2xttfVAU z0%0`!NkYVh19avN3lUBT+qLA&7iouftrid1<1%tz{}GAiw}Y|0wVmN2fN_D?_J4d1 zur8p6MlFr`f&GUf^1UaYX2a<%rP_(^&f;jZ*CJ=_%iH^N6bIG#zE`Tcjz{N)o4Ns< z9%*i@pW2qNSiumuoRdOSr5>=^xMbP1`Vr;eD$|g%w15N~(`r?Ns6W~ferqA5w;9XR zYTh7@yj7_iRm#|2LLs`a2MR9}0!qP3TH}NxsqA~b2$D7yH*J=NzP1s~@EYp5xL3$c zBg!0xSu&&b=O|Bi@2CRjyEw`>m|vEKH;4dG@ZkPl_QiTV-f`pVDEnVSBLoxDhqZTE z6-<1o^oAc~!OhrVYlT_@XaulhyBh#(;@PKKw)v4pNWkQ*jJ=2(mPZLp-Q%m|`UQ4B zE%Q1&UF@0g{W4`?>Hh5|H8!_b(5mrEfpC^(qbyLzG3J9>UTaFA#ExbPRO}+n#%R}B zjsV9I$;!j=O~y~Iet#9^d8nM*i11?R4h6&t<=_y`n{1(}<$}m}9>(e6-^@l`%N0@G z!#dX7rZjeT%C};Coe~#^qruw$8Y3kw(FYbJW!1U9W=3ul0Qe0txd7;=d9pi$EV+`k zb`XQkxP|)`X{bPVtW<3htyWrHu_oht0W@7pjDXDRyy03S-KR)x-5Wd)@04y-SY4HX zl9+;$_EFpmu4HWj6j;V@a>5(`rdld*st9xBHfhQ5(rdfG06>trmGTx)r$TNDACUf* z>V&rwhyzI#d!J4GOL{7Dc0l3;_QhpB81>GP3N}I>m!hGr{RQNF(aV)PW9uivJ(qgA zIR6~tbc-%8qA0P9zXtLYtq408q;YPaO38|zZ8j}gt0WmXrO1etZ)*}beeN{AYr1H7T+q!CK28v|es81EjE<|GAX+BKE6h|A`IK0g4jqkGjZ zP|HZ7Y8rPChoXS}tle6_y4S?`2S6$f@u&UC%?>}2kYBk?o@aDVpR8mO;bGT7H6wqUb^7y;g&DG}wZy2R| zCf98|n70EZ{%isG@Bd@(y@R6MmUvMV5haKyh=72I2$EEC9wjPa5D7!hIp;i}0z(E# zB3W|I3^^zxAX%7!A>&96L(cJisQa9K-uB$O_1?Qxw{E@p$8w7Ao3(m%_v-NL?(|jE zM|nd*P-AYo9FQALprkgbkuonM+ezo_7Z$G=R>1?xD^YU(HcE=&Xj)7Dk?M;N52e^w zqKnDAj7fX;& zfd!enT!V;?Oqdr5UyoLnTsRePJ`>F0jm`5eve&&E$C-8>k%-;4d|~rMe=71m-G{?h zoQD?;PYxeRo(Dh0iCMU)3^ma0dP+IP>@dOe_~+?R1SfJ6`lX#xJ{;3r%qOfdP#R`- z4LJyT)i@k^OLb2gqW0>=32`$CVXSgfrU5`=i0dLzYsMYtoXa~9==^YY`<1~r9?{3TDuC9&jTELSZrL2eI5<@5QlZH61ArrHAf2p>VU78Kq8=w zhA9fK?|wN7UUDF0|+^iQd$}TF;a^-GGc+f8FC=Q%!+qAf z!D1{GYNR5;x@x{llGG1&vhJ`V*GsF*a^>T|r5A(8qlW5d`b6aeVJ7jaQfkWmez^^t zP$gI=^RJuM!7^x^<4`RAGSW=sH1~?BREL>OQ78cQh^=Ih=vZGGjbm*tEgozFs0=jr z)2C<(b~)f5%*L`uGyx+&O_atTAd+aGI4yj`TYV3y_vcd<*+s5cLNw1~$L~v@S5$&Wm#n`rzy>88D z_P$Y>26QXwefJF(buXDYf-b>!1ol0rbxx+9?O|ono!H7u-WZf$E(1?iX7=+jMRxtk zAo3~$UNw+*9<@>C0Wsp13_)CO6fb#CQEBctP|=yg>AhIgFqRxJ;$YF4h0A>v=ypO5 zOUr!O+z$jxDub~Ovz%pvQ@iO#R*vC4KTuo#^}NYf-U zXwR_hTaFGk-;t@6!;R21@i#+o0!DiH2o zNUWVue}}3OMFv<~j5VdIUEnDwxh_fSK?Soo0JO}BMwDjvb6nZx8WyGcpIt5o#OL4u=BVjT&?K9MA0pzSaq zud2h09u7vqxy5Ef>JOb1;bmq}$B2T7P@1b$39|Sofm3R5O{5Sm#$xFUBtG5WtY#HP zOs}CesFDq!P+)@P4D#h&;SS?Xm+CjD;MetsA}^L^hTpUvn|*#k^Z8IR`8t_4oa)+0 zU&FQgpj#?0);PyF;+XmIWPmGl`VqQcl0mFritA(DEmQ8n#pj5NqN9h1mFY+Z?mMxH z7vhRvp~~TlH&g~LWZ$ILe&R4Mq2?a-F*RttR;NBu8xe92~y5SpsuPS&`6?3Exe0xgoA~&Tx z-uW>i5eVks&!v}o_pPfN2-fG2O%?bE;CMsl^vznBwcbEK7c4hZE+ikoXN8pu+*+;nl(=P7og{&RslS z3D1n>SEC8oL70@$a&EImiPKdoS^?*a;72>Pk?1usYRry|Gos7N(|xmpsga8wkR^v< z{Q&Zb3qC-Bpvv%SZ$YPDH(6P*>L)JIii{Xg;m~NFuOLsfc&@$kOc71rn~@&q+DBA- zBHb;QAv@P$QkD!a5Qzzv8HojZ-30*1Qebh3(ei}yv{?<+(W<-(&LRI((X-<%UavGM zht$G>cRd9+E$(Y{qKG*iwwC>@)tY3L0Y}{#sx(SXqqjIvKvP|U6AO6}mn-=!Uuf#% z%Lu-4J8}LFQjz>0GM6$LZrJFG@e8=94P7Pj2;fS{*8|!gjAkDK6)rO8bzfxbMTvaP z^SY|bC9cZ&nO9Z%Yf^ITh`$#N*tP1R+I^i_ybu-^i}1SLxuL{W|Tl}ds-FH2LV{s;YFCz&9e4Hjs{ZzrfOQl zNPzQ=pr)?nDGnkp@L+4+(qtQ*bwn=vo=tImx;?_x+>G)6_Vkp%NjSQB_aux?^aQeG zFkIX0QhRd8Cg>tg<;CLS$JamE#L7k zp8#JQE)P8LuTSy?pa3w}y2b9|zrI=^`r872ef!k(HGt)^NPK)=p!)kGi2G9w`eDvX z41ayTQT{yE2fwRg&%b=#i}T->2K4*hzVZ7>;GgZA|Mh1(Z-ZCO&ubBXe};X}g9iWG zY~&ZS{94=p8ybJ(MJ#Sj@11V)tVLfF-ofqX@cV{C`jZcSz5J=^`JZ&58`gB`Zr?X& z81=tSb@zYz=nl!XZA-lO2NYBHGa4@&uk1)mck9f%49>^A-ac2^CWSx>HOXp;BA2V(6PsMAdf#;Hgz~2 zgPV+;d1y|j&%blCPPM0$XVUUZmV&KwJZ?m>3KC>JzujK!meyrFG>}=*yo?0lUf{q!b|uB1B;|PjlgRDgOFI5bf;4otOr6vG9R}V4v%4ocnw5er47R#6PWk|YhCE0jIWR8^WS4lX|YwylP+osw+ z(W3=I?+D=>pm3<^>|_lh8OK5VQ|6WeV95He943-OvQqRLu1y=Yy*I8?Y8%KgCc2$k z5Y_zZl{Jp{3T2+_2J1N`3wg0H3<{L{Bu)FX&;KAF)TmyqZQ{I0FthIlLqxL3a*2l84!rA^6)E2(aZb9Q(+ zBcn||wc4zsE{qy-ye$o?I~h=f_lc4T-|rWq1&zR|CP^pRFM+>Int~>#FZ@2;4%*3) zU7W2UZD1;@IBw~ml$#1IefaKZ@kry7z*9S8^R9!KtJG^D&Hcf-q7EN{j@o)VIDcro*MHzi+DbB%h>k~n5+_>heFnXF1?}9`ZWr^eg}(G3`)BF3gYS^Fnk^~qC?NO z@O_N8rh%nL@QANl;J#h-jo7gczc*F2n`U_K^>MX{k#C|x5vSc3x&w7~Z#QN20F40*k zwe7_a(Ct3+;U*4Kc^nxE$NHjn&KKTX|euzxVmAk9jjG;RkO}ICl~(Lc6BcfZf_>Ha-z7#{{mF;`vs!_E;D_!(B!YRH2CVY42N`F!)AtRc7>$eVIj;P09vL_ ziXP}QEYiX&sd29}E7EBcb?L0D5lmMjySC9iOI*Ma+EXsQyLEWr-sXK*@ z878Y1LRWKS9YUMF5iE2>3@BfuA1u>k=);rUS@0NX#`@iqe(@9e6~E8o5lP6C zgp&8S!P+Ilc2@hA{3(FOiQI#g(MmR0q5+lT=BT&cEc$X9><6+@8nsy(J)X&8$QOll zXm5zgA8FF>-JvXG<~FVmfh%EVtJGuOZb3BaZGO( zKV8)(|5Q{Ny&J|#A$NOrSECEw(6p|s>pFF!P-nOSE8Srwp&M!BgB+zgDarffbCCb z-?PZio+R)F+U+|DB#`d)h`X~+$;bR)1%~45YC`a;0hmC5vTICLqJ_`9oXt=D@rEt! zHWr50Xo?ba*A_i?-&%0-9AHpdyc4c)G#y@uHTQ>vP6lzqUZT_sAvsyu1*~;BxnhQh zJkzb0W2g~|8h1#e8+O1ycd>)C*xhY(n>$}{Kj4F?2!m*0qVsM*lS(z7c4{g3yB{8s zTJAY|tc0!BG-+?@vd>}g{EyG`5UcKVuJI%(1-ajs$y1+JPq4gGqC_-tPG7{-5nz{; zgoY;_>2M`=JF;ZpDx5q;X@_%o?_#y#U0i*fi^w2CG@$w`=z4#MIJAgU^CEbtfA# zqNuf}LlIFl9 zE!>VaGsF109h>7?#*qyb7)8^G9h(RJDVg4e{QlMENK+8O`ktA8bM+V@B2OkGKP=aM zVqAxz4X;GobC0i2jwGds@_3Pw$FR^)B8EO!)U9-G#y0@GS0c3R;pyCiE5~zL!j|D$ zQkIP;liPM)S2K@WpdZC57& z)#_Q7dY3SzJ*a+k`P146;Z>ek61My^nZ}ep@o&m_tqbicH}#AfQFUg%dm_^*j1!OA zJom!L732gqHzhenLUMyQ9)(eR!EBpl_}@1roqWEkbx5ScH;pWolAr3|egIfUXZE$W zY*xyOGuQgtBe_6-={ALU0mp18CY8@NrE7^xo;RsU3u==`{%Ts$HLp#$N0&%xh5d9J)^g4tv=cMCHh#R~XESAh3MC(N#g3L4!1l_TnipCVq~A(u0mD^Yia$`o zqZ?j5s?cO9a;4^)TU}9mvh{t{psZN8rgH8e4Kosg>sp+oIRC6T{Q@nwV{5o}eN{=k zXOhotv&@qfmBB@UwZ&@GeqHSwN5@Y=(Hx=!RnpO(BVAGsNb56PUr{2Jk}Eh?O%n zLs>LLh{rR+J#z(RRfGL*VFJ$jp5s%8F32tzzd&B(XgimdUH#=dp+=$orpQ^GcX!2Q#=g#4a zvU1au{D|u+F{b=sAIdl_MLakchYNS=Ru$7%;&Z;|Whfuua{HRj*VRsl%1a_jJnaJ_ zK-67heL8n;tqYp@3YpD-3B+M~{Tzc;dmCO=Gqj80(Xj!kexw`IFn1 z1Q{c{BZ3GObekN}#YGBXMIA9WK<25D_{lCkSi%%_0MnXnJvMGjgC{CejNxXtJm~;# z7P+vA4CpSk{r5#B8_jj6S-8W*38M@6ow}uf?wivDDdvy1`38HxWKF`J&V__+ze@x+XWUPnG~CaT}}VYyL3+jjmz@ z{=)=J%CZ~7JzFYYn(!g%4qI>YY$BzXabkPBD5|oRdxO{aLJlexK*#yJP3oL1AtxH66%jO5}cCrf4CU z);r3vlXrQAL^$_iG#leFan9XJyC;_Sy!XPKF@5|&qwQTS!R3bvJ= zoI<;4&mRbD?UM@EoWh&mZI2`+aWNF1Oi92q(xfPrGp2c9x zFr&gCpj#{DL{53uHAR)9;h|gN6q>fM`x^{@LgCe5e%t%yNKB=T4Ytol+o&&JzNBMC zwZ!xWRuMhyq&Z2N`8Gv#yY_B8%TGQGQbWi=4rmRNSeS7T}A(Iojw&^q3h&3X=5 z3`?O_x}jqBnv)$gm_K9LpY?c4fl{O_afz6NQKujQf>HSjPfU2sL%h-Reu1U=dC6Rw zqOJRpti-To?qY=mJx}M8iCN!sXeMOf_ZE;HdF{Tc#g?!U z(cyG9yuS>K7SZ1Bg~g?tB(H+dafSV#E3|!-!k2ix%cb3AZiD-Au%yLPHtLDnDT_?V zaS|SE_1e0xLj7Vq+;;V=7mzXvDWQ&?jc~8zgk@8M?aNlKX4CX36a!>?1dvVt+`jGM zV#He$EnsvT(R6F)b0)FKt7vvZm)Dx!dh8m{`fAn0`&nK~C!^pk<3lh$Iwvq}oiBxD z=G0D+{@HW7qhM-PQj8tf+xY^{O>c`A+wK;-r`sDGeiw_iXTlqAXwOnC0$jMnZtD|t zrG62)l(|2*Nh@M8G(smDtFo?&(6I1EvQ*~2&FgFqM}07Q7Su*gn7hXS`PUuB?2s4= zh;yDzec8CUq!u4# zUNuZff%amT)2E;jkEQy_@^+Pgy|9$!l z0+F($x0<_nB_CPuyI0A~Xn>(92`v;Gj4^*>9(2!sWf#lFT-~`Op7M8wRjHf$EQk|} z8i5(+Sw3VgMCRHloVMO&BMr^7Z@qXt$aII~HyO4Wmg?oDrbKeWxsrBiyf-Rr&Gp7~ z-R)Ka%^;axpti}uD*Mk*^i7I3S;A{}TUX?riHVpz=_cCn+F|iwWS|?${p-tx%_-F2 zBjYvH*v1byL&mXSd4Da%IE_)CD|>vBnrg;eF_IP}NWC(|)P8u8oTft0ka1lK7Jcwa zh_CyRTA)tP{ZZt(AE~X~r?dX7ep&qNI>n$v!Eskz%>F)XZ{Gib$Z8?Yr(NqNf$M9 zP}9sQ-(Mbl$BO{{=n1&f^)RscyJ<*Ej^#1xl8tO0z70!^+Lz;djR^r#jkBvHu$?ki zo!lv<5(pEWtqYKHB{CZrp}P|cL}GH#0=Mc_<^SBEO=zKs<%k>z(wlj09f(+A#Pv7+}BngR}B z|IXsac-HcvRN?xgS+}EAE>6o6)Lo_+5lp4wPEkg_K*j^*qh){0%w}~-lCvAX0Dh8F z`=*a02X&7Bk_ zVVErT)ie`tz>wbU!Zpt%U2VKw-j?Vr8ox=*o$Nk8yj0-u`UyvYs7f0{$;>#1w<}g8 zBj7S$?Agwn1W)8==;k)q%bLWQD939oTQua+PW9)lHK%|^w4iX)zjpH7 zkZx0aS@sLpanE6Q-4$Zrf%iz**fkdwkC*1?DoIo2`tnv1IoKBmf}97op_q(UpHY4; zVxPMXZ^*D2Jd2#{7SEV;*hAOcPi-(csOJF1O%{RaLwfB(l-DmQDD`?1m+h*A&x@6qQpi{*&$Jk?NV zJ6E5<%`r&v*Tdy7Ol9BKvIv_(r&`DM#AWitQLQ75*_;Fy4p(3b@y_eme$(cF8JD3$ zsR$M7;nMt9CWD7oMB3DJLJZtxQax&s?BeL5!aN!AF$i0CcX=Dot5B@wO}$Qj6T}v< z8T6NQVM?u(0t_{YY`awUsF^XJZ6rB0pN&?vQGdhYv=o%PMn36?S;DQ|b-jr~c!Sy% zaxwuYNiDOLpWZn6{yix5b81uC>BPRUh0c>|bf7&+iFdt2i?Z9f{{t%bG@}zXR18ZS z{3>Ghl;5Zf{YEJzFT4&2{qi7+q1x(?7_Qk?AJJeedpi$r^4PwjZdjvyc1F3@RQ4n2 zp){Qc>xZaM!qk8dWh4FgLZk=~w!kMzKHcj1d|e!!=3>zjSD})BK*>`#>22I0GQA57 z@zKcna_<)TVk>Yv6zTb3Z$1SADW~166WV!+0gp~vW(S|_+{+hqW2*W7qGB%TB;9f_ z^qXux(H7x!cAsXYQSzwz29j<9h+3WOT|4UFx`&v~o)hff*|lV)rRBS~ptlxHM*^NJ z{b9d_GUO;3>@|8>wAJVQs^e`MrlE0TB!w~V|P;PiCHXvdJ z3ykuWqP3rW8%tdfjr>=r5~q5Pn(J-+@@TPpBJ|aM14J^T4U&x}zQ@Y7cAOxc%}EUM z9{RERiH|MC`FMSw_)RM;+Ue5^K6b6zCo5SGqEhQpsZ=!Y4jKGxz!Iuw-KGJs?=>?S!VyWO4w`+ zAJ32^cbk!g1)V|O$E!T~(n?r*WdqWXkZn6!sy)>jkoJa^QLW*UJrKep9o$ep^xidf zDoSuP2}tt4$_Vw5U>SAZ#8s!TF{WMje1qoe?xzfBj9xxNKWX zb@8AmBpv!0q48!Gm6PZ0dSJZ+4QXsU`9e<4c&kh&lD1piU#f9%q$Gudn65u47y2>B zRB^Bs#I3sbFhw-=B)q6k9#pscCig=puFgbX{ooBbUHV!k$N1omD5oR&&xDWu@?;!- zOK%shCNTSvY-o9ljN$I30{@J44HTw|EjztkucewX2_f z3{Y8nY^+{)GQ~y$E!nbW0&Fd&3eeGXr|z!Uo5=Qqof}JM2p}SCvMC~aT(BZ0`|t#t zGOBqp>9DkgaXb#<=Z@!Bm9aPN1@yp6Yx!O^iTYu#^acO_1E>RK0Os^k& z`}X6_MBtf9?&pB+k?)(Ag(pgUkB4JsIsP({KK_Jbjsb~ITxy~mk>FLP8Bw>-6~f(0 zpU*ZaOOUv~80htlzmlJ~hxPce`c9xeq%R+b3&*Kxhua+CZ!VL0^E;8Mr{{~QY%jC! zr!)~D2J%c7Yy|ZA{)((Am?vVk4>mk~4iffWj0U;@b7le`C;fZ`e*kWAn1khUpsWAk zf5B3~xvvFZ!P~2#>#sCyuEH3wyX!4>Z{GlUrr$q{<8bns=~f9HR{3H-I@zy9uj zl(7B(D$n`9Aea3AFYVU>{xJjpF&Tz5?M*nYmcBz_e9!N4_KB4; zLyx2;_nlfD4>uJRpZL9OC;SPf`1Q7rT*DJEB!$g>BrqGKZ+w%BD=D*C;Mgzsu~=?} z|9@Z!Rzwlz!&5#F91=4XCbpGq`Bj8-GQeRLzyJcZf3q;qqxrK9XOhFjgNK|z?n)rJ zZrz#KYBrRA%DjyL3x#4j>_x@QstZE@_HG`?p!j{M%b(`9zPB-qJ`X_M1d%U27|usX*VMm+92t&S~rV!6$MkfomzTlp5E30wa8 z%-uAg7c@=vi^Cr@eUhR|xfs)l>u}Xqe}8l3#rbP+9Q4m8pNbI@=N#HZZ!1(k3YW`% zj_7MwFTigC0m#|OLTYSrna0SX$W14}9_Hfq90nJ3enSBM|~-rIk!pnxa`2CN`n z)BBcyT%HF;U}xBliU%{&L!OgsdDI4%jpNV+qF9!5cdT{ztHvD5O(39JJ4bXldMJN5 zpLmQDZN8OZ*v>KD;F#l};yPGht2xmQ&a0Z5@Mo>)7RQLFYwFHM%8XoN?+cw(C!w=WX6jWta-A*kaR#Uzv#V;ww(A^?7nO!5M zMy(n7U+gV-@c-K?nlQ=()=@HmeIF>h7VMFikV8Ny z5VEc{>3#OzuxC|^>uBp)Szn(v#M}mmeyTw8f}3`~UpBV!b_!)w$U}|S+Sursy*Q7S zN;AG&f5z;0`NMCa(|F?;pz-=IX6b+_xmPb1IO+y!WgX_bff3SD6SJL3X~o#F%?@wL z4r=fjr%z+l@|++fPbxaKMEJ1MD}k|S1PEfUaNG@pIutlSrk3cmJGl*whXOB!s%Ch5wWCSAmHA>2Bckwf)uBG@#$VB`R6=p6o+Z zAS>PN-Pw$L(Blf-z`8CKT!x(8SdaL;O2dwsQO@j@j!bP<6E)7}kx@>S!P{VU3V$na zD<^Ahzsv9bxI4yX%nZ-U8tCSMoX)xG_-aHjnBlr02?Q>=q3*NNA2clZjkS+mfGV%9 z_j3zONDI1nF|)hBmH9_+Q`KfFi z558Z4V~og=kR^J*KdyurhSUdnZLqo?AJYNJuP<4y0@?>p>xptsdZC9!Kz_=`ZCy?G zllgvYpG99dMTw)7VhJ(R5qmDpBOT2nA%!dSzZv*Fz`!@y0I1ebp*n}+#lNH&Fbqm2 zcf6EWrhU%h0fl-*%jJXUJ%6wF<_fM?JT!pr$xf?v?6`EYIf?>dJ{4UdHU{Yx6y8p{ z#=jUod&b+tL`wDgHY3(UqmF>H$gT#4T&2Xud5;RF25YFCzubKx9W zV=01KOSk%Zcph{sPLLk~rU#e9N(Oa(4E)?%g!pT-0ac5*8oxDW(WhE*=O@+X!1BEj z*xZocjCcX@5E(d~&7oDhm>hgnxy*lZq{aaw&qQ;bY#|YIKTP;XCmt(b9qqY~Tkbvb z_Tf}6_F~$b-$<{YVr_6QIHdxTl%EziDi1h1(EMb<`+qk)em*a} zbX(R~nCUk~Fa8~tc1{l&GqZ<0Z2wXnwV3UZ5S!rb_=*S8t-I8so3`PCaH)XQ>v7Mn zI4Av$2P_^Q3^W|J{zbnc9spdI`_~P4E{qoOqEHX<>JGIktC1S}X#mlO`_~`;Wip+w z_&>Sv?@+a;tahs}3GM#dzW$}|{sVk>eh%!PoPW~d-G3NF|Dhm$L9hO#w*NsOiwng+ zEz#GP{*KH0Pr3hJxuNgU?1=x9_Va(-0sYTyD6IpAT;DPYZSYnM;XWQu%ve1iW%M`g z@h`6ZW`$ThrVDM@SiEJve^4zk0Ze9q|4s7#b<6#CCO)@*Y(b@LsJJz?!tRo@b$@0M zBsKYfYbu-qPyjT4*DwE)BeOKjj7Ki#d@CeYz-Q2sLpv@c)orAD+8^WhGT@JQ$K#~K z{CHNfwPiwupe@UD@REvEYd60S$*bBocTsYG5-%})DsYa;B$!xxtlC<=d1=u-j<(T9 zxn}L$@I(JyPyZ!$e&IYxbyc>6!;{9?)uquowzA$kpPIs{5L4+O zWqlfmtI)i-2&sZlO*I*`<=R1}fZ<{ zU2L`N3j2h=e@Ub$9^dW_PgX~3kMR|2J*M}#wDdZ9Rjolk#Pf+R zdbf!B)Oz!?P28TjvdQ8D)&V#)dX)bQgoHRp@#d{Ur&a)z;dt^xy*+G&!-UHF%fVJ% z{aEcZ4cuiGqgWOhE4EyHDE30hn^ua}XL*1<)*z9N8oL|L?-i9^N?))9Ypn>U3&;4m zH2;ZB^j)dJz}Z)vvjOaIlO_Zzq$B?%DSxu>@Icp5AilrcvE9-#j$OOXYB3)&Rb2Df zR>U)s&lU)AD!Q}fTaLk0SW2C&TRE0^O}ca3msWG8hSeV`K3q?r6iB37=Cw`2aF-0k zuvT@)X}U@2k#e$Lc20k_a&{!-QY*kV z#VdftX-Hi$K;_6gLp)aJg4Jr)H&g{+*I21Pu}{k?Z_;7<14^(7Y2(RCE62f!UzbktR!YFFBXATCYG~L#(<$Mm`=3iLkc2eUUD_!g8x(B7z(1GZ8`_ZQ8yC zfjD;4<&$|Xt*kalg=?!liE}AV^$G2w(SWAY!WY{3Ekj zduL4wHJ^Ywj}J+7fv!hIo>?i%y^)(kU7@iu=i7oCHc>~(I*JpmGzK6DV@jHiF3*nY$o8A^PA=q0t_UA*n}|(VI_C%$tvqr zNTe5`^yHb$?8D5SKJY=?g$b30m8&_WaJhJSa%wQZjnjn6v62;*t)ZQ}Xxj0QSZBvA zt*nALWm>3)sK{60?+da(47kQ^F`rnoO2y}G{@9apcekUF5U+#a2cQy@x6&nbDwY-W zl|p~BZ2oOm<9@TF619ZydYaAxscO?^vr6Eg0pD$`+c60vxL= zqEWj(w|?U3FDhS*L7nU?Ro|Wp<`9@=RDt(woA&G7~t$k zl3(?*e}2ALX>P7vDj*)vkd;S&JU!e#J1To@NPGd8fULK7Z$fgti?xq2hDX|U?D_8d zhJ;&Eciax;6-uB;S_VK}?T;$*_$M0i%WD?zcHIWgi)bHc=kdLtB0c7hCJ!XeF{5?R zW(JB9Mo<2z{4SXC(+K&T04DFG$6*qi`^()==VDv%Fxrq`#re~Vt#YOi00cHIoS1SO zygWy{0-Qs<+-j?3>reRpO4MAY&K$0no0!LA*kDOX|I-ooYM1*u2 zT#Ohgc~TZX;8Dkpe6uUZ&j&Wy@K}k8$2HmHGN1!={-guWFSqQ1M=<19UvT}wqVq__ zi$sd>oszVQb`O`r6zAtW^Y4P1bCpRn_}zcR2AJ|jM5}WFu(*-)HL>WR3mLrDe)_+j z@=x|~hI)GxQXF4*MM}{Eo%cGnMCj85IerL-S!aE_O~CGkqHfriV+cgJq` zf~eycdjMQ_v4i@G82j&F%|9+66dbC_w>E712)hJiB@3q;rE& z=(*w`UQe8BAF|GQj34Z7QcjYO&7;~`6fA%rs?v|`RF+v8Z!p*yD(t!pLy8_HJ4~_0 z*Q4OpC;6Qp3lCdzRME=PW_$pG`=7SA;E)}`;%JjKax`aN+d+AcOJoALicmRx4e{YzMoZ^@kcKs}2jYij z1f3%Hbw7-gytHW^1 zSf&bc{YjFC1aRk*rM$hv zYxQ9WVw&4UgY%(%D7Z^o=@U?T6!;GhD%%^tqtS|Zyli`ePs{&gx)gD(!Wxq9PDIUX z1+>lL=vVl5EU`Dm!DHy^bhG zDtNIhbYplxR$_T!qSbT>mDkv`o?rif3aEvGw*SKyJB-5^*+ieNrkpuU(yeJ{KUu@T zqAx1B_3$KlpdP@Ke2nypM}gw=0D$PCW%X{Rb3iu9HLP5@d*JzoY$Ox4`2MM zwg7P^0fP?&nLS@5$X2JEx~*}BQ6ln0p|$nISOegV@94#yl*e$rc67@@X22!`S+c)+bh4yE;s)F46Q|uQ$yP zTd>L2*!72(8Fk!{t((B(QwZrC4rytj(CJAL8S{p>ZZ414!KK8kBx-%-p+fQrGKUv| z6SdjDB8hOf;omLPAvRu>FQAb3kF9=*V47qDeZew+YQK3+cbZ^~oBNG7yE3P+9$6J9 zc@WTJ(U?cYlnO4ZqTI%}AOz2CsT=ZVPqHp(2&kN=} znUQFRJ<@gJb$5EK8F4T9ligis?~Jc?gjdJ%Dx~fu@e!&}1LGwK8G0ZURB^IKw$)oV zS(RDy)8&YVfaV(UwOhJ=*F0m(;vp|uZ4YP@;}>pU;X0Y|Y&ppD(YQKWfM*Poj(ISS z?F}^eN}ShArGD_v>6&;;R|Z~^>O(<1GMK{vgZ!Y%aOZHSdQ+Mg{JYSglv_XY`Nw<20HSk5Wd+QR9giA-={+_X^-W=2L?JoE8i6C-A!B)(tg zx%|SgD(Zb6FVG$SCip9GwlL#8WNhBW!vbr4S8d0KTz$mt#TvX)#u^N1(UBpsK-F>P zy$y0`wk>iqq|{Bhwc1=D;W{K;5Tu`IPFWwjqK#jHpFXxh5A^$diYlBc$Q-TAe5uP~ z#cGh_yPJ=vqU@~6X$-4wUUsGb*^9$Fj`2i)XnnYJGk;lV0OnAsj~8mDhzh4mPL}qL zi|E{yVtxz^thqu6@1`1QIH7Cf3%^#w(PH$q4uI#mung;Q$r$F^kgq z&Hcq>@^N$_c;88Q5u-s;WG1(?@A(yhopQ}yVh(ce;N2z5A+J!mGA|R~xzQul0kh1E z>Lj9oJQ*vFSqL0}*^bBNdJ+sLz;Zs6%8^%O`UCxy+e#m! zW}t&zmH`;M1vG>~T(HoL$DF7xKOuN1rjmYoh~Ipu9%!2VtWiS6kN8VO zOH>s$h?Cld%)tKytB2r3DDLIThcMNxS@C6`%#7WU+G}D*?vNmO9HCAX*)e!gABS}v!I9)Y8&$PcMXMhP%<*wn^a*2gSS|)nvs?#fl)7|7%U)*$!R0VqDmu?btC%{wlh3qJg)$yz z15y2%>hBbl%(J5u^?2D8E#FhVSAOM3o8R(Hm>GHWO3}5p+uiHw^+Fn zFoHR+V@dX;&b~=Rs&NKSy=2fh5ez7Ek%S(+zD?cVD6J_fr9^FMnXI@>^EXUr1#Dj~Bc1(4&Vz#Nm^>5qyn`2LF^PjyW_Z}TT5xGl zu&>I34Ff6qdrmGS0$gW|#&^LetE6 zMWXZ>^DL|rsdW}v3S-9VfMFhnD#*!R$-!{wm>C&SjCuIcS9J`NR`9sx2`o}=dhvxR zw{R%Cp4@}i7Xtql?*A1CasGfYay@Yfc{nu{*lo?;LsW2EKYZe8CHCDqZB}5ER6M76 zzU_%jo+J8|C)7_0@p;sGL~AMW67hU(_wZm~RB(G1S7B&7U#`H$7=8b3ByZ8vz%j+^ znYUGUl&!qeuY^?=TU>38*PJxG`9aoAddx)@**zUQOO%0)ea70EXFcMR= z1R7jtR4AxSzj8uNs&X}&5&b+S{(brfmHv4?VLY;i(f+p@?iDf0T~YT!zi5Q4uqq%B zYSAC9opW67=@Q@wQvXp>Ctj2|;*JK|xWbsv$-@5L1f~-Dn5lt+^2Y4^EmkEd0r3LR zK54%e;)PF<>X1ulY{X0N(QMMo?}Un(ksc9(8s$bon<6qA-otLs$s%~ud3g-gWhZKA z@SYLOYU;8iNttCjW1og`DzSa_2@+Uq6 z;`|RPq0hTKTjVUi#6^_eX6a#+u!c!Qq8IP6se_`f%h$W2+Dt+HGxBf8U))rj9#sXp z(n`cj%1eGwiIyEss8a=Vo12>`%Vr8lDFXvaHcxUhSoB}{Afo8|g(W()ls_`xPPJ`B zgYYUL##Z({uLw$t_3!6rVeKA>7iRL%VhYRNx>D~?%SqX46~0~zZq(>DHUjl6>Ul?D$S~N&^mi-awLF^HA>(BM8LcC8B7es6@IO41(X$U-jpE z9+Q#TQ_Iw&%t^r3^CZ2lwl#hJefqyh5fgul{A-v%cf{Kc#^Vwq4YRY#Xi}+H&2Y{q z)E1v<1A=MQabJU5|D<&8uQaEleZF?AnrA;+E3Z!%1?>&#C*&D9DR6a{)qgt0P#enb zzI})p7^IHu_c5W1YUJo+B(PDPQ?&}rmv|CKSy<)iv{x}B97kEtljR23i;|88e0EUp zsj<+@>Dcjuezg{_wLNB9Z2s0=js8n8=FBwl0G0;k+ltB}NdZ8c=V9%18HI>2QCdCK z@&$Qg$;?O!XVT)xo)_`B;*Pmd2_jtgTl&fItP0k);54m<%eh~*>-0{Q(h=Q;We1p< z%O(L5w|&TbOCP5zJ(b9btwKIdSJWhGs%MTLdmDIJ%|t_42d1G)O-V3 z3+UZ?+u?EP3oECF%Aaf)2;zz--w_*DC6&s#X(G9Vj>6ur_YI0>JVxZnHrSuV(1qVs;i0b?L3qURcm5cO6(tUCF!@So{?R5 zNnb3HsVijZznE3zPDR_MShT)!`HvSHFu49bn>r`Ar*8adc&~T7xDR{#)H{`U`uIo2 zcz)zpY|U7d1TgYyktQsZll5eZ;S(U0BX!VCxaDxEe!oa3k4mZ);9ap8UKk5ggrx5` zRW$opV8@7;(>42Gv1Lt#K))I#pHk81AoC&TIY7JncU~cXS;pKOW7f-_$BQ^> zumJjfF9Va@Iv|AJDb{!Och+^PV#_p^CSt#i_A_%E$>xU=pxl3a4!xvO*3qxKQ;>;; z(*t%T0Wj>%m(jW;s;REWHwq(+S`!;)2G~hb=X5x*lUmV4@Qp=}CIf+7eG89DM4Ek6 zl$4H1nAK!uSJtvYMNaMj7Z|_R#s6l3HEGHt@68G|me0erdBngzzL1n@oYn-FI`3^+ zaeZVFWhtO74xd$<@irR**Ibgxhp*d}U$jv2RB0QHpn`aRxCwNtk9?`zxt(EG3(u5) z$P2WjhU9*Ec(>Amg<+s69Z%+w$1PyhlL!H2ee%*q3z-XJ#oS<=1-*ZAwhtxP0PuN~ za=`GT*Db3H{;tBUfXlmLk{bJhP>#($M2nen;-;LVvZdLaLavZ={yH0PwU8m;{)y`0 zWvr)jnv;tc9qjrCOOoJc?zfRgkaGwO+YLCF@?>FzLtus!`NoE*srC0zQmVKK%PJPC zkO!UEu9v<*KdHFlkk*V_WI97ev!X}GUzmf3#Ee_urJ6JP5iBJw2}#UV*IO5bRP^Pu z=cEs6oe>iP zPDda0{O#xNeXW4{l{6)HwDwUTAgtRZt78p25Ni$iYv`0M=Jey5M?d9VlP$SN_ynlME%|Kaz7tFZk(o;gW{D8Kr z+u`(|Z?b$8=h$=ra-#JAxSjlfiqs*a=9wpTyTpn(J$MLnzQ;nIwmPd@e7H9OXZE$u z-w_~xr9|b8WOtw*7}@tY3D;mq06GDa#Q{<#PfPw07kB{lLwU@7B>66ga=IclgHCx* zS{f$-=+m!BEolc22`(&hyZ5W8h{#e^TV1cg~*@7XLl3^}k(m_D`hvnS1_UnQboOOoI6w(vj@9xx&t-pD8vu zeS3yaJ0h;kXmN=ib>WY3WT4oc0p#=bGliDzVZEZXlqZSEcEPmgS4C;4$p7%E)Pr3& zTYl&+N;bU_xCiNf_0Pfi&xmK`7rW83uhR_}r%z9&!gg1m!H^FLbY-qHHAQy-88 zieBVZi4S6N7>}AY!waa3jM668=ch-h{xMW6OT>hn3OzQ8sTgw(J&><=0fNzWn2t%H z%>_N`%^!dM78Mwau2pD;TcX3msH<0hn2w`sHAAdrX3XC{?&^wZRo=6ZHFX2m0IFO;HxN|dZF&Q9XPz6QFR9#~M zr%yeQ_*6f$jkffLEdERdwmLNqNTH#z;&XWXc1xwtB1fr@JX<1J7lxsJPnFPWk+vJ=Q!hBL_}EW_ z;ZM5*&}7>ikv@AtN)N(-oHWK%Yipy=OLSBSI0~lS>ncH1{}*-d8P;Ulv;nirs%t@% zsvsZ&(gZ|$x6vgKAoQXjEtJrEQ4|m`AYCAU)P#g0y@n`NKxz_DdKIaWP(tUsao_jZ zeRlW#etyUC{o}|%?%dZkbIr^-bIx22sJ=eqii#Pj3_bM`m<*5rB#hj_iXwmlVx76o z|2Co9I7+#Ybi)!br@}due6+ld2W>PBoxd2AxdSBxQS?Zt7|++T>2GbtDYF;&AWh~R8{f$%1@V8UR zCF6-SH#2!&n*4i>8(0i*xs?*R9jTSI)BDn%lpPW56-Xw0}O$PEFd^Hm<>V;`vGrdrjRIToucPM>t@%%GMm?3PxHWLi?y*W56Gu9T+w z?A>cI7p3s&tlS^|P;IvQKoexF8f6nosYjSrTem$5NEFzI z3(^!cd}sp3E6gi@q}Kht%HZEBbp3R|ypphr#%b{x@_r5$AX=8Irb!A*SEpIi$^&XW z!U8K;2-h>1TD232*$|`2s>>nk6Dybvow@axJ_BXZB1bXAfrln!{-9s~o0M1jQ?OHq z?SsJOuhH(~1&1o1jU37dn^slcC5Sj>>6X(TU?ZyRasK~9CB#?yf#bd@rJBXGI!+U= zw|#A}#LMG_6oE~?VMcn@OjJz#vA>J-Nw2Mb+Sh{>2~`ru>IiJop}PvUoM1hBa8*i)vp zlh&|bf%m&&o?dulbF^199Ox~aW!t9GgSz@z{R}}oR0s2~1vS86kMLDM&z+s97#3_% zX9@n{Af-^T-NTj&!B^R=du>N+0p+@)O*vKr-~#qrs+6o0h*XQi{DsN16s&(=;GK$& zp&lCfijgnnyl=hbmFnuH2H$qvN=}KteP=wRL_~)C4(}2yd+pJW4gKG%{+Go2UsR}m zzi|A$ucZ>JW9z-uiL2%;WMDP==P84(=%r`$3s^J1yQn=Q-R-4Dgy9kq^~Kd)>Ak++ zX~F$dHv#lmC|R9QVGF%h$YN94+wGTck-e?tFac$Kw3_hb_bQ!#RaZA4O=zI^F;{7O z6a-TUis@d=o#y^3B2;HM3Xtngg&Slp0i-)Nc^`9IOMrS|wNL_Z0;S}~Slhhawn12$ zjfTlOL#_av<&LzWbzRLx;VhMvXlNgYb3&J*Z_8w$SQuYUb>r|KXPZH#^V7O8T(H4H?j~$e}GSH8Og? zWzme%)wq#!a5ptq@6ay~Xjh$lTlTXftM~QyktVN}nXkO7mZrAH32Qp3D+@US7X5PR zLy8LfmDH*R=Lu4XmEm-E>re32X9+GQweGpgx8Msur_|u8FVNZ&$}hf_ z2Lpx1@Yn~O1gKa1v?oxC1I878;z{d@=h3_sEpOYqP>B{JiamT9T^a|UGH++QC= zT!g5be>EHWV10D3J8iZaj`4ixaohtPR{Et!p&{Vj8spt)Oo&Ee=@&BtZJoA)SX5oN z(1_wju{9;@wa{N9T)<*4KFif6hvSt39i1v`lC**0jC%=t(bM86VQ*yNqL0UGA=By$ zoo}Vxa)iTqU<=AMn%*tr^ljgeIhHS`34V{I`J2OAU|ozwpYz*oSAb$2KD>lgxaQOs zWrxl01H#yd=hFm+?YqD|^SZ~0_J*We5D0AVRa(Q?uPueRzaoMYFCKY#JndokNO~u9 znO1(eEAC7%=T9$gw|NPOZDe&1+g#JGJU$kklTFyrT`ugeZz;AM!1PMAl>C!`bKT~d z6B(}qZv6!Ty##{S0s<7cB1GqKJ;`6$$JxYFiWi#-3IFb`9x<-q!1PE{um76l;e@@V z{Z|6k&x&o=mAPPTR?gXfvs;6-cwe3+g8WtQ9f0#4YK&DUv6Gs+;2tu zLc6mQ@CD>w#t5CEsO={AC8ut6?!U^V_?L%`szx5)+XWSsV}15N!)`)Ke! zR_=k1n9UH1f5YG#LV*6!qzoXZqLe2s;ahuW8^`Nvu?^R@=5GuoGDiHr|J)y0ri}|o zKqmlf8VuZbG{P?HX}_nmJX~Zf2GqhVAJ4Q#Dl0KRt&zXqET;qDb++Wgn|1HK$6{Us zTd_8tz@wSGqt^N)g00}%X#Vvi`orzW_^wTxmnula$y`lSxZ~)g=Z1O!F14BnW_Z^B zh3I5-U5bzx-(pzFlEN5m0k=uztd{Z#()32sSU#GKGB7yhly@IX@SBboK);7+uu68a zJKk%%WfEq$J0C0D(zTCjw!Vw1ztf^l|D<4xJqK&>h|gAO_Z)x5C7?{WWxu+^^|0-L zPkj3}H<;HpTIiwBXo>6StC0Z<+zpnDv?{8>PeLXssEkXDOvxm$Iit=C;f!~`LR)W? ztp##7*H|v-mos%;yB%yrOjL4uZEuzn{P>2zJLk5-RX+Jxugg{&HwlR)h@nKah{Hks?5Rbq;kDg?!ubOy!p$xAQGYIV(=FMlK2?2HY-?9DdPF2f zN|F+X(`#FldThe2&J26g zfLYMmB8H_vI607p5xtGyhF+*MHnOCrGe}5K(Ml*ir72p||f)F}v&JZ>tp`0X|A@4Wnqc8?W=iVprwXMeQtwpBkMxM@fLpQQJ2kUj3 zapEH8*8_~<_A=w4>*&+T7l(X2DyPoHUu;!fkQMI4FsdjW2w@S=Sxaek!W@nQdc=>J zhQE&&nwk45nyZ$At*5`4v%HQG?}2D}>DsJ++8BN6GKPJ%gnCc>YBQ47USvodUIX?Q zlC2Tt_AN{{x-m^wD``AH^vYJ!B+Bd5I@O?Q>8XLxh&=4zo2MV%5*yA{EqQZ~CqvW~ z88b127<)&S#!=6@NolNq0;)j6YX0-tb>FDbm?P6=ACW;`qu__^M(e^Tym+4Hvy$s3 z2Axy%?GPvsC z`b}DhxqV&jZV5#*3@S7fKyKd4vP|jj50O`%pAd!M%PATmzqVaj;-p#SlSrQ!Iv@!y z6bx1dJkFd$iLS8usP3xs2zw$&l)H}}yti_K-acfbIqJ|*fF=m|a#a_=LS~qT`2a(*KU#MB60Ig`geS zgnn2(!?ncwd(Jif8;sS zd%%G(M;VsZF9%~-K7>#7EiQ1mW!Lsg=?tza3)y=Cx3>Z%0Sx^>^Ucv;gVZSPXgeg*tB@V^ zxuAMsiwx*k$HeDVhx?2WHBy*E)pt$#Oi%w>If$UHD%{h47pHF`G!Z&uR0N3A;lfO3 z-{eJglA6F~%#wI%L7nasS)i9Tig;NLD*xubwH~NUt%x?D15z?Sqy1nDZ(0aNzxmdM zX`8&CgN<6BYY508D=i&x)Taq7*d-e9D2a{lJQGtTCAQNGDio@&$^mACqi&Y~PkKJ4 zFRCf)1$i3-i2krN>Ky(zbW`Oa^)OUXbEetTeko_C#Vw3bkZju17;E#r(8wc9ywgRM zXSYF8!%{dA5I$MdQE#2}cCsKRhNUw$h$nhQ=S$(~~sXz9@GgW{>4_yWpML)7S1F-jqBF zLvzy%!nEAnFX~)#9|$gksOEXJbk8Uy%t!`-l9r31-0-1Q+9N%*gX2+weO0a7tu(tN zq|)?EZTQ8ab#3eKlcfyS8>VIyNMZo{>CaDR*fy?i;GA~VO|v9*nd|X^s!|d=9NOzK zTQbR6?8-iEORv}@*wwNv^_np3f?SQW=&USds7?dY`qnoz3bDbe|C;x>ql>!4u9O49 z9$3BKcf0Q%ljq8zikzoO6g9K6u6of0!j5*nYWfJpiNQ;Lw@^=Lc-Dt)b&Y7H4-dh` zr!0S{(mW!)_V1(&4jG6k%@i8phpZ|e99s{RmgY3Nu}6h;5Dd*b66gg5O`k@{Ui#UV z!$=4E?cSqXLl({a2268dO+5qlcLj24Qz2uzo%2DAKAh2z$-;H_5>z$k{`~7gi|S5B z`74ugGI58nDF;0))b9z7+Kt((PH621{p2&vTxd~pjTp#BIeXbrQIGVZ&~X(*|3GdD z-rr>M%9-e_Xgv0nCym}K@44U0`1Ybx#Z1&C=c`OEs89=Q6n&|gC@WJ<%G>Ba{o2^< zir{(u_`Sgxlj4mhk&=s>2I(Wpc1MdB%fXDR%+|tdw*C@_sSJUk5*id|)`dJ_r+{X) z;Al(oEQ{>>;1CuTU28uOBl)9mR1|e(qixWq!yOgZqochNpQDI=>E8PHYXn~HqNhdjzk_47^U%c7`OM$hYuG3lt=#6m+M zkz0Ejdr70uim5Luxz$;05OYTORzLMam8Uxsc#+J(ckgc`)6v1jYtY{U;-DWXc2(EX z_a}oKy}TXNdJF93{YxQupO&hrb0+=JG-1q%v4QmV%Jjd+T{I*L^75xq( zLd*76&{t--RDL1ZI=}B16AO>KRiTqjXX zizJtZ^)1%C^>YfKC9}tu@-|<56U$i0fsUZPE9HIlOJsI91h?jKas#MM!$q=63B6!Y z?{<4L;t0A~8iii06{lm4xg%tv!^Tlt*rZ{VuWIVSuQ>qI_p3AYh&?4SFG~$@zC{*t z2V-^%%q+AvMU3`nvB&huN3Zg}*BDhbzPFcOG|VIjIsOoMB=$IWGl?Sr=f~GoRixez zg}*!*Eztk!CH=ii^wC~#T?N)+FF;m^q@!1JL5##GBG{$%)AI?jM;);o!_DDg#|c52 zq%t}ork8{g$$I6?h~ro5*rrJ5#<;)c#IYp=Gc7 z{7BklCu5TDNU;&4R~}%!b6wFlwN)9dU7RX}2~g3u^{r7s%TTz&H)42W8*V<4wdqvr>mP{F-lqc<(YV}RdqA8=6Ath1W*SKYYXX!e&A&Wg5V)Tq&ng47uE$_F~~C+!>4Kqks$03z*&V{Bj=fdOC%Yiv$27kjV*v1wFphd*K_=o+>mC!_uT#>!U1^Q69b z;@0x`J{y^;EiMXn11TE7-R3tV^Em=Zw7TsgbIdVa{Px(tWA6)3sify;-Ql>#xb|5M za#}%xWtfA$^8VIaV)^LsX!b^4W&{E%nfX|K7BLs*71mB)u$I3QAQFRdOL;mFg3CF# z`$gP6iGVDDr69@eekjHTqnTfj!K`vyFXvvA%6X{=kr@)cmX5>&6`2*{CzwX&H9GBA zt$V*CbMoX9zR4);Sh2gNVSXw0`@AJLp?xT2(LXff)Mr>+_MU?+Z7IO`{0n5hv@2NE zf%1`14vI7~ekUcx;fxdG9G3pncKCb&iQ17LNS_DKNAL@D+EoF2#`VVUR={jhI#4+<*{ke$OE zJ@&;!7dHzvZt$&>rWZf<@{w`wi7hdzYH!Z_4#t;E`}uvZWH=+N=w)qlos>S|IUtXs z1XjZBLeFhTnKN>8JPkrKxWkalq#FU;62$#&NJ0h^ggJYc; zl^r3}3N$^BkA2v!JLZGG$%wWM?rsMh_Y%4Qo$tnkF<>Ydm1Xf`d0_#`feaVIgLly1 zPD46sDl5}CUZEc9-y_PupAj-`buzU;*=)_UFi3r0gEnau?6KF?d&K&~S%TJz80*eUZ-bfQ%z2? zI*U2Rx7l7EJ!=tYrd%;0XrOZC%gj-*G9$T6eIU_yds9*wuDGG|!!(POw2@xo-MEy! z^v<6xb8W!R9etg}2%TFjd<(?RQJa@~IVnI@0%KD+$-t&LVO}PX>&Y$b85X>e8wt_d zeJoyGO{(=v&fBTc--5h7t#jO6Xp6sg5kPx9CR;aUf_$m77(7MF20cU7t)Ju+A2C0O z!au$olHJyNQKv7Sc8mw?Fm0v<%TmeV%t@Ucz zF{iP9@E_>{EDvH1XryR@aIyv*5C4dKt|W^^E|zowK?bB`e7u)H(07Z4Y(Yw7;h5yu zrw>Rf5QX?z?0)es+qHF?+?feI(cbna!(mV*_&rrOppl_Hn@L3}P~tmO@xxwnKD0j6 zB8VOx+&$7;Js*~4#8yCpMkZGgi7XCZny^XX#q$T|dhIz@2^{^ zO{5TlBzhlwR5e7{Mk0Aa^auq3`q@YK9IrKYnXAH8!N&=_>bX4)d?v#6jw?a-syVVy zGsaDmMx;#D3e-ilqU@EA*`}}~MzU@1*Q!!-V^h6aM%2yQ#}rN_abhQ}R=T|8q7Oj^ z(%px$0wMu=uK^h1j<3lQbt$hmRgW&z%=*XKck@=2yGlqCovH(QpCIi1nu++Q?2xG! zlkX4_hPd+rpF50;Ow8ZPZl#a<3NW#-f}bd^>Kb-yi}@IGwDBFsFnZ)$kn3*zoCm|8 zCVlxg(J~|WSzgaBAF+-`H@!)rUz73c7R`mh*Qu5t&W^jj zyYIQz?4U4;-~Z@}O$&JlBywqHm6-20pQRTa-*?!9V=YMw>jhhnkiSs+%be=fq*q64 zw2@^M_cV8wAMP!fNYySV8=H3x(3lOg+*|CfJ>We0BMJS-#$pF10Bq;#+O zZ@ZTi$%C-ioK^Zk3E4i@H4AFP2}xf5tqk-}Y0+y+kCQc7GhAm(w|=)8KmCu5y$NtQ zH-9MkG#5t0h@)$v`KoONlCixI55lVS7ESe=8CkCBP5r#q!B_K9$nZqC*_OKW zWkK10EMw5G*@4s>lC+Sl@)~zU@Nw+ODIBm?YvzxCU@7O$O{YjRiLQCWqsvg7Peg9Z zR+y}qN+oF|%TMbA+k(0AkLQ(Nvn-_Ka2!A1jMmC+JwBWcaob`%uC~vETmVViIAn&M zdBM^I5#jNQimx;YT+O_pU`xQr#J$wRU1Pmh^y#09W~}5fuN}+LrZv~Tb668%8D|82 zZB06yP!373h}F1?NkPF+JDQ4^Og4Jea^I@hIJMjgkUTZ8MZLU#PaV6uCjWW=S-Sk z>fwiw<@Sd;z8q(*Wd29saevyMZlLbx*9aZO@sl6%pNQUE-@uOn9C?H4o!p-W zK3QUV^F)K>TTXsDV5jD|rg5%3`q;dzdnQM_nV-k0H&B}2COmU5xe=LpX^EdsUaOBb z-$@T`b`w!9d!9|mxLG|YW1TTX8~#49J^H$V?i<&%B6?ns(_~W+kU_Vzu`;EcMN*%+ zhzeU=Tr}!)nrJjmkKs^aUq0X1{nogo^ClwDzRbO#^Wudt8(+B-C6{IVkBhJ|rUwQ1 z90~F!AMNQ)7SG#R{2*=I4@=(Ii;nsBQtyFP=fIm+8nL1o+XTv@&_gIXF~5B2C0>tB zxc~}?QmpVWc-CPjn?Ka(9^jTk5shDgj#{9HZ+jDX4?p1j%Ifx6*Lbxv_4k45Kv^cZ zZe_GaWQZAfd-Hj(8|b8xSjXFRAWYj}6B|%<`oUpRL`~I?{fla)xso>?9aAEX+fK|l z*}WL8lOBVm1ZBiv{q=f zcG1#-=qrIp0f3?jyxQ&lHdo0UEYIrs+NbQ0;*CA&QmO-?z@P}Uya7}6OL~>EN?61Q z*pVB!_OF}&Kk-2qnFo>S_YrrztQ|xNnAj9Kd<=}d1N;WgvK~g{`rT?C&=B>j^V^g= zb4p`v&#BK?VLK+ps%^TNuqxob_1O+cIe;*YEQ@TUOMX$4E@sl)_kK-gK120kFzP?f zwmk4G5>vWUQ#!H@i)y}c;!)l~l{xQSasf^?BnW0XLZ2Y$BNmZTW5>3X6ztI{oR>E)~J!Sw>;~aCw#|!LBJPBpl!`359 zob#qt>hnv&LlHzNcn9fK-qjz_-ku@zPg7z-J&{bhRsMH=p?dQdvF|1M|90<^AE4~l zCyUoonB!(#YDr||{{CWnjiE9IswWAXC~{vf-u>uM3@jUEQnXoqeMC7It!Kr4x4sRB zO|e{O^IHdyp$C<~z+>HC?-KPqC8eA(<*OvH%38qPq3ZAPlK22V64TZXs*u zK`Kn+bDjl=-7Zg{P=RrB?`r2-_`Y|YMx%P*tenUIdhTkGCp9+s61Q77%WK1`028mS zkMrf(lw3UvZ_>yxCV8!`!yl$LA;|GzY8G7=92e*Q#BB%A1LPU2`A54S9#$-z-k=PJ z#h)90tVoxF0WP5cYYrIjI`SO+?abNRiJ?q7+=-7UB`}QGK`g%Rk4$m2NH)(d=v^STRnOihjc;Bzx$GqqhuhDzmnvj}8 zMRom8!}-4mqf#0$3t!&~8M-!;L7e#6OTE*cD(daiMSuV2$!0 zPEF6#iW!3~p1QO$M*SA6f=RR3e##_-ImP%5W?vHAkk7X{N84M&vuOSUI?KK9S3qcr z#k_rzrBs-KpskqP$FN89)4@4=bQPLEZh1`%Erbk8KhJ#>Iydivl;+b;{Kh-<3)T0? z{~Yl@s%fXrBHPxr7P!aB7Kj9FWkPyaR*7qNh2oa^{@&?&gXOpjAnR9xc@Z#jQy}a3 z1NU-HoW!Irp^Yt2Xqb4K!|%ETcu|A@T9*P^J6~@jh06+Cc}* zzSp+e7B(e0x;>wd!f9Xi%^S+{VY8Xm(s`^_RDm#`Onkf&a&vefbZL(3nhx#?w74wP zAX=Ek^wVTRJM=-o8LA@fe^EC3i1s5IWZH(pVs#ZMoHSYkd!W4zaoAFDp}lFqbivn! zOI=$;OIzEKQwae8J*9g&?t)i4>(po0Tk*MPzgDYc%-47EUux>ziLrA#Xxwz#0w2P-_%v? z-4Cs2DR4Z)p zu|i{|Kp_ZyI+UKyCHn#JQ5(FRH^Hc&Iu@pn5~j}$Vc-ENRXA!;6&c!RCw zjfWB&Wez^zx|rr3s0_&}QA{fdlA~2Nfj9b{>h3?aP^-TwXg^SHv~q06Ub&uCcr?I) zdh$Uj$*my{U=<;4A!6F_3vb9AWtnaUT)2fy`wva`L_qf$)VY!zZIKfY|OQGr7k^>G*F<<*&Wc)M(pP5dA-;&<$@D+yJaiu=hH?ASIj19 zDfTj6dGW!p2qr=k1;U0M-}<<|X* zT%R$3%z#ZXQc9TMa)x9Wb$l}DC1gmuSpj>QE(MF(f~YMlq{-7Fk;pR#Tg5j3R5I2S z)BqA=>jiY!pbf_gSW=evD(uTt@1cL&cB9LSx!XVhJ_bx4s)kKA0i~~sJ7vy(^q>=L z1AI>p%ZaE0AO;{3aqrc0Vd58%9CLs_6n4nVHONrsF;SBi${wHxwS6r)RgAtZDN^Xk zesc+g+yrof$|LKd)Rzgp!a%)Km2?@%2N~J^%{du7+(RkQffBr?K0L2r(v=JF2V$T` z;4Qw$-bt`smxm@fGFW~{! zNZ_R1u|`NAI!=X9S+h|MCI9zXxgvNYh`@dp**OB>KLUa9>^M54ubdkJ0MQZ)@wYi# zG)_PZ>xj650-Lgez|}W=WO(ob-5y&Si@r~}03C=WFNVjUy+R)L{mzD*qV$vZut~)% z#H0I&Q1~G(n;!d^s)z9tG8HV*MPGEnCvf#1EmDVu$TD95Bi=e^%vlaM1NV_cv6_j zsd@T!mo}3N5J?UVS7wuXTZ<1a|N24tZ%4Q2)h0NA8*%efA0s0zEo0O{D^L?TlzxQ^ zEouT|hyb+2jBKxtO5F+!_yQ;yV5+eLXvxP{)_9IJgei1_jKjm2@R7I5KURY|j;3BF z2!3}(kk!xR(6Lo*Jnc1S)W-Op);$Fg{)Wz!?Rl|aP&swRMgJp@I?MZ%=rX^@UUD<+ z=O^;Q2t^L=gK~U;Ip80B&i-~pAGiCY{hOk=rh`eIy(9pz202kp7X_f33<;z?6ZZaw zUSWuu9vI(*e$!;shj|cNaz)*ZbKL+Y?%J_e2W`538sYfw zG+UxZAjW*q*~U=k5GVm)LVXVkPw^LkV9yPR;L^Rt-=0YorZLG!V1WoF;d-tLJ+Utx611B1t;ZvN zc-?-Z41T9ZqUNfgmbeV`UWPwJt8VfaRjEyJ)Um94a0jFVqo@lR!tA`kF3HMT2r-A; z6!tW5`0fkcdg}ktR8@vX-U+K=!ONC1>d7V)eQr6`&C;Q|Dtcrcp$bbZ+48@=^J~U9MV60jK4We>KcC;`Rf<2t zFBYzs7w_-1RLTCuGkJC6i$43Zf`IzQyX^X}2d~|;Pa-KpO|QlgwSf7a`nbdoKkSM3 zgMU}t)}Jvy-RG=jdImQTKYVrmyFT&?bUl*^6J~{>)jJc9lVA_mB*Z0e)aZ&o3;g_| zL(c=b`}C&bL^krdX+Q3Q1*1eOpnfT}FmWa|tbs1hdP_#F|>Zid*oV|rx813qu z@PXD9_F!S?~{WN9OT!zMSSF5Xg{Vh3jWi;o|Gkqw9R)zE&cbkSA$ZRqO^c| zN{;Kc{cXGS%`_%`wPuHbKo7A(SX=eX37{oaH1yYuEC=9E_GgF-JgZz~=4M?32CH_n zGB*VYMmpQYbeSXLI7kXN;{_c3el!vp$L@3SQb!5LTa`pX0FE#eidJ(snq?@=bNj*a z%mmNrxEvlPZ{>t>zmhz>UUSo5W>|U(An-JY9+g0}usiR#tBgIL_)Wj^FvSnG*LBT% z5fTl~TpRDl-#s0xvGJ~Wadq3tSB5`)8sfDI!M5?2igo#(I~*3KNS4@`YR$Gh@a*SZz>rAsM5DH4Dqt8mA?b*uq@e)WzzQMnwx1oK7&Bf ztxB6b){27GEl$7yHt&L@@WE32)^b}E*ul1PiHoeTx2fMh<(*eD)eb>zI~Infcqsds zI|Di3CdQJ>Obr;hq>ip%lL#*;AJL~``_;o5)6PM1Cakf%rT8x?4Ad@8$gq9ue4n)9-<6qwjrv;n;A-F!o21sR(46;W{J>4SX=w@ojJPdH z@k5deSOmZHL#ekse&Cg_pI4ME>=KhnFzo2$dz|C&|?FN=NIl39csM zT5);|>CF4AAPFVkIG0%HJq%E^9qmt`0~<_gZaucL`S@&sI`4bgH;cg_Z-*5gew8Hm zvlgGkJYI~()i?K#b{q;Y%paoJq+LJwv~0{0ujtbOd{f=mJz}XG?*M$5t3e1TqRe@* z?8jSuIFaK`P}y9pE2A?LCYf2%;7#y+WP?GKQK`Kpr2n^X80Eu8SNqsIwJ}HTJO+D@ z0u(M}uugQVCnlD%*vN;~uaCV#-m|XCdCxxj*S&D*>XU{}kV815q40{7VTYo}4=^-e zn5mLg|6`_;=0VaDw&~aA5WibVsBp)niQA?>3Imc3$DdRcff-%%d_Na2;OXZ!S^WpT zKON$i0+0#6YvLjhftpf%UJj73GTlPe{4VHZ%M~n}L(#kDy({#SQzs<2A`#bKE;yR~ zDTqF&xJ-APLn?{ES`%haB*HyPhI+AeF4x{av}J@@o#1u#Aco#Fdy!H}fF~$DGd3ho z+x9gbrGr$>JaUkKlhaS*Uk9F@e#`N&+XDuNxhcF(v>W7}qh?B?W!L`L(!G%;KiOnVQm_4N8De*@Wk_-ls@C!=-icrt@u+hSnK5{6bQo(q4rA#21h?C)F+F zpZ2#q&6VYiv-=y58?PYDare*{K1qJ<0JI_ncQDU!^dmxDS_lUWXo?!NgChmy*5>Z(2BtKs;0aKLazJ%mW7vkcG>+5 zp-VkaSsG!Gg%0B}xqdmLJI4 zr68Do9JC%R!F00?Y<~}n;?}w^%4@(-AJ-V|@4_mB$!6bpoonwy%LS`gzZ=yII3*_i z>?=wB6#nAzTvSH~qu}|aC-#H-GuB{B@Q9eFyaYBot$t>#; z_dk{@?!j>ieoLK{khP}*fx8)&wcpbgtyDv=8@NB*`~K)bg%&wqBxsR~WA{_H#dbMu z@Q)YVh~!k#OBY~%Pj@rz(oSzcu;7@FK19q?t0sFnpwMK?+(}|aGUI}p(5A=KhhK*E zXGg$+ErwC7A9L<+%|JV+Mw`&3&A&t@tH2onV>z9@ccpD3*(D6gpr&}%9};O`j=YkW zd?@@1mW$LXFQpi%`=^_sfP@W*u2zIdFyKc!I0>wCW9~6Cc?GH}R?V(!2A5jSqxBk# z;bD>KS}+8Yyu47u{aIE+hL}4whqY-8yp1Mmys-|Lt}`5fW&gl6Eb5P`-&l`IHs@V0 z0Jx4=eWMF4$cVYZ>sMtnO+-^?QrCyTpr8BPCdcO$dHP+vrwi&7O_P0xgEh@{;J!S2 zPUz;<*yHV>*Zz?6nW~j&ZK;@#qm0ABFk%*+>8%Y?+^a6^?EMxi^^7w9_UM zywk#Qw3~J8M+fQ#FlA7aGt`9Le_^~PJOhIw<=6jD2F2rp5a|SW79f#9K1P-An#d*e zhI}Yhm~&$bW>)tF!2O-XfN|$o&?GZVsD;<-HfgUV{NJ(WTj^P1jHEl)}Kh8 zk}0cq{XTZ_UD_giV=b+3rvIUq14f|3U)x-INBjrM{ji?C2PXj7|Mn-+q?{%z1+mS_ zqWOl}uQQhh^)a9z7V(P>e4FxfB#`+HldZbx7|*34`0^J$ww|X!{!%f#N>3`^9C=0c zD6r_tiXD<5=BnfQ_o60xW=NImwLr%0vCN-X+&Jc?-l3NNeoSA`1`IT|^_4^KV2eKF zTLhwHFSpOqtz+S*F|B$CWDGo-BPU%=#Cn$!vY&7K<`4IxqSo4KJxBGp>`&==X1YQT z#tT?U0S|+Y+YBd)e95E7KVr@_?Ul>ne#|_GbH1@aa99~{SO6MnW97+eV8!*f85zV6 zF5@^HAFqM$AF$lJ7qk?cnQHFw9v&XbyU~#2ZtMT)UM|vusLQpYEcfxa z&EH*)J{wLPP8llQ4j?B*Z~&M)O4I|iv9YmcGu)feRsgwd9TPG-R9sO}p&E0Izbl0o z;X24EAHP2RDp{mqGu|r2Cc3ltGfVUz85cNb@r{7(l>zSW#DjfN07*}+-+VXFK0#Z( zOX4|vW4c#&hw86r*)z$N1>ro{%&K^ZQvFe|j|-gV=xv&PUdPiXGhQEp8}W&^wzVzz zQct!%SSO7K>><&->8|L2VYi;19)|=A-XxE-mCr?Gf8gz*D|8_DKNDaToWPWSL}sR< zANi@%Y1f;F&jDz&OH$rk$PGERW~F*8|7R2{t1eB`Bk3T)gYXX7(=;4guM>6$0gHy7 zEFS3}RV=8~&T-uJNSa@`VUunFaZ^H)4y1V{P7xaW2hrs(ya&xJSAlXZ*v@7yppmOG z+xhaNbMCQITUq`DLr}f0e7a7V|ujNxX2)+9V0g zDF5xCwz4!is8LyZJSik8>-5yEID4O}1W5@MQLu9Da$w29EkmgHL8P;s*x~lzP|muz zzQp%5+K}~Ve`1WELUmF9c{1Uf@k^&_yG}x zOhBJxr}Jvbw06KiW1O<9e#CyDEV7un_CY26v! zSH1z3z`BgqLrRy1<+iJ@IRNZt^bVX4t`jzrs4+%3IA~1Ya@*>DE~BsKwP})wbOm+i z>e{RAF1@91c$L~|x_#4YHBfh;HUcedW~_KvsO?~^%N8*y2hZlS)coTFoe`rNm5F_t^+Jq~+na1zbHT_UIr&aW{-v zVSTPE2dh7hBzKKc91UNOB8BM?#XZ;HqntDTSm>Wav$140F8oGY9vRrpNWC!Y4~lZz5P- zdMh+0{mG-0kab3%pzRL!ok94C%i7Sw?R4U6R`S)P6@1C2z?#EF=|R0xbFoPboq4jA z-GzEc@)=`9!WGeJZsp`=;*#AnLU$nE@XNgD%nl@bO^PigGK7%@w+` z6tGuBh);1Mt#X$51jKJ5$aE1D7WuO1^i(T(Ka`EL#zJ_63Ghy0eVY80)+|I5_)nwq zlToMkr~Pul>B1)0@qW>;qn=3I{yyv*z>QGa3p1z4uUuw0i`-vmDr|-!_Qq;556EY1 zwZEkc2d;NVt?h+nNpyP9jqV*A#kKG!A3VRZK&$ddnkXd48>h>l><2b#eKiYPk&11v z)Ce*I_2pUnSn|8g?0J=xl&#B0MWS<2Q>owz3$Oj?^e^pf8}`=%amkFqI{fe+iRHW$ zS%st^OeTE<^&rBL>;KyFJm20D1^%);-|nn~`F$lHvR=q8jn{TvX_otRG;L6c=(Hy# zHx~1-v_@g)tw5f8TSaMz;{X`UewX=wQgOP zO9fNXRjp0(+24=ot9M234CE8yVr#N;e!h4MqpoW2OkQ4Z4zKrs7~b*S|HIyUM>Uys z|D!t2;D`l9ioyUYO@e?9Jv2q>5Cjr>89}8R@P8UoU# zcR~rh-4k_QnR%V>`rUQ!x@+BgfBuVkp6Bed&u*X3-e)Uk`Ro< z(x`)}n-@vWi!?&zwYlMSurYkFzriA6`x)gqh4S1f_HsMe->Y0^th8Hg5w4uzvAO)E z^nMMd?|}NoHwAW2eRq>@Ugbmv4c8QjpJi*87A3%jMq6!HKdY!%NXg(Hzv22;!S3}& z%ALKB4~I3TY(0&wt#hvuqnB*eFHb-yrexqbYHFe(=jw;^hQ%4cdc_i&Dneiyp;FAL zg9eqtOJTZ7f`RSbr5obAaGj?5%#%6k6gy0>DARgejv=OtO_+1Xwz*tSheX;!n9tw^ zx~B+zftv%ppa@NC{Ue$dQsAQaGlRHLy?McD@0}dn@S2Ek0gC&>x`?8i(oO^X~Jj~ zE=su*f)f;$TbpZH6Cbvo1Kk>XyvObt`*Vi!ip`&^tEw`rDR+Q%?y7Eoqo_`2+Ht;Y zI>xSfYbG>#nR~6%g4v=*HN$0SHg8bR?OdW*KkJBq9hv(8%Eom;jBQOdWIyz$4?ax0 zFE{{icv2T}?@{h^ZKKtB%Eqp)h<#;a2UUZ54&>7#N4np>n_T=x)h<;O;bL%r!LE^y zHy}u!C{SsQ9;ccfA1PFHg~^QEkv0r_CM4?e;#v4dZ3az@$fUYz@C5#{~w!e%QZ$55x->xp^Q*Fz~$KfAz8Vhw#2~tVD zN*{4S2hCsw>6S|h$goA4sMK6`0Vub>e$X5xApy{sp?7vBj}jc;+!yQv7z_u$rfZbd z8C8%zY~1J;dzJDsHdc3G%6s@+M{n-L%#1lxgc6DVT;%U5Jv|>&Es~3Gd+Ey*CBuHd zH24d^$Z7>q-#V2$?^P+NjiYmSt9!ZWm>;^1HrgBv4kvnkRygTu5cVj%O4PfK?U}I_ zv42$^THp4niz|r6bDX{HW-75v$$-=x_%2U_P@rL9b@R&ob7MW1R(D^_re;`(za7>4 zdFQltOBNSKcxx)0_taBF-u1540~@^Vc4grjnhnfC);CAA?fFs zw2w_ygN=9m6}k}kGnqRUFAHIow?I^So`kD-J#e8$T^!;#awP1~KC6guskd^qagz7h zYi;;oJlx2+V=%D{IA~ZNufkh}5jnjTf!pVDU!#Z#&AhmAIN!nzetw74(I%Ku!~A?U zCCiKlCcc1ACLYR{EZ@sT%nep2%Cyj=gbZU_ef`R=)}_nWI|G+y+PZ!EQwcBE%1z1^ zfU?INIY}k<0w2{GTDNafX0^r z-KD*^mgA6P4XB$00NyR~o$m*CGJe5}!s~X3$Ryb^z#^m#=({#+DbD;dQ-}2#{DsHevjj^hR9!CVw2<?VBlimdUUU>Gem!xh^KFGGM&xXe;uIpAggJKPrrc<3*|+&3AVC9rvcJl>;@&wJ zBDqhn8JO_FS95x8?3dU~>d{AAUGbx(KJFHxkQOl>8}ij&H`-g=yD8nUf!8Rl;z~SP z+*6b#^kB70wM!)a?vz#-kbq2*g9%_pjL#(2HJ+ye6|x>poGaE%*~CeMi!;;)Vx}?V ztGO!vC!P@`!+c$ZX7%OgP~*}B%=+9B&}4ASHz>&LGGa*_be6g8 za=f5}zhtpjQ}IZvcAO9hXLzg`pQvF8Szb=39BR&S(SZ+((Glf6%ONDgy)zkV9ihil zv^s(l1R_apUNV9RPR-cO&~$;Ww`(46(o)*tX4VAhgt2S0ph+0>{cJ{Yfsom`elbG5 zZ@r^UYCVUu(r(rvfHPs&Y2U;3ew-hH+0)iyY0Suyi|n1*&~>0m>hf^<@PJ$9RmFah zilz28&|@`bwJo7jTICGhr;iOYeT`OBySHBs%U#}gQ=86RHBrtfdD!%)e-Qqh&|SW|Dh6>=cURG|E5FualcBmyFQRN&V;heK3ACo7 zy3*Yd8Y6@!>G{mJZViudtN_LX&sf4e5} z7#*DdlCp=3Y>uGRJpp_<9uxNAl$$-({bLAFrF$DUV0ZR6Hv7<&UK?hIqQ1M+sR6Klz$yM zmLV;)F6LUWG!eE(ar%|VYBiT`L3uDm3SnD2U`6drMih!oS5v`Gb9$QMeog=#!vwOg zdqeLPg6Y+?-)?jy3ucby>H1Gc-jCM&$KAZiKEWvy>d@r<=zPAb32{h*pPzrfG1Ifs zyGWDut99!L=6CI< z|29LpCi0RYZ9E(noqi{F&Ws+R6fnSe z!xHLw22Hez(DnvT4$RLcXg5(lNiY#!HjIU#q{{ z27NDH_cplfw>|XxVdQvWt4<@z`9|gEeAjP#^xN3MQ;ilQujs|6mWROx=mr2AZrN4i z+MN$@!zwP3VpIY}OSCSa?_RdNlGr7k0LSz8sg=1QYe=#Z3CT=g^uxuGcG=YY_ztlZ zJ)`@)h%gq|*!2}?5bYzgqN6*yLr=`e&HAtMuP>u`&P-RCw8Nc?tUL%^S(Lcgao;_% z;qX25t>L!n`b$sfrKVJfYT}l2ZFF(JKGBx>8XgvQ(x9q6qzrs{6JukW`1NES*u`t> zd_Ml5Q)TN3BUi;#OBtz*i+J3wFeNJfj|(qsu*ZAlkt_F~0^+WT9NmWkoPnDTr8v*{0oZZdsQBL9#~ zk)ZRmv!`3U#{BhQ=a^ZRP&Pe5Hs(-pIvq38z+ zl~=>3j=(b~b|>Awm@=p6?R57RTJ-|mrEonkK=ORg^XNKNg5a!p~{Sts~vM?cuhHXv@k30LFDvJV;t)DGTqo0 zrC{#Bp#Og&jV~-J6Pd3X|MOPe1~{zX&aF45Z3!SY9lqEWE-Z8AJvM7{{4RMht-_h- zigi-07}DIf`((PFR0^v$=e`D(t&kA8TI2mJhgxf?!U{B4l_bY9ztx~OA1AjyR*}4%Swr;Q2rCU{P`d}E%b;4l7EOuxon%WXBgbr*ea-CJwdo@WImcgT z;UIlIU3P<3*wy2-;RJ(smjA=|8c7DpvIx$Lwx0p-T=#pfM`prZ;Qs2CI4sFk>RUFt zywv^l4Is49D9DO=!*MM0+;HshJG+#``3`$PqpzqXQbJTi zZu>_eMzf#N$f;4i31v{2Il6`fUTz_IV)s+v7&+?GGI3CaDEIo6GGR^@nJ_#yBzRUJ zYh(-OUD~l3xLgh8=rckp(ZSF(b%6_DG})PYJr$x%EPHepa>XQcRQrBSHJ6#?keb9+ zr?$2R-`20lYk-T%;PfR+BIsXMYZ?9Xb!qU-QVIpIah(6LabL#dJg5Dds#t#1K`fH% zLgC+i*%zjBUBFi*7JN!B1HNxM_a9gH|Ja|uR(8Iht}mk)vcEdhpTH*{a=(Ya>3{$1 z`xKFHyZHY#ku-I3qFZs>+bY5=%)-{rJ)-o6@IvLYHI&c4DD6L&d(EzD27QtbdLT^H z3lrIxoeQi3J*|I!bt_+bkq=cva;af);F0{fgSdB>fH}ur{b~$=!aWZD9tw3Ls%8eb zQ8aO~&mDx~Rl&qCO|`E{&(|vJ4~^-UX*z%R%}`VPRzULg+RYOga?CDwj=u%jYBKtg zAMe*}@oSCnyLoDkw{@*6Dia=b*QOO3T*@^LA4985sp6(-GsZ@n165e-lF!5X-&)7V z$4l6c%d5f8);#{6a$i%J7Jo&?QzoR9I~qM zS(dN&ajK6kEiTB14=3L!@!9>75lh)BJ|oC8rA7+NvI5m`oCQvbE#8#W^G#dCC8pBz{3A$Z@epA;5*ST)lS%9;U-kBx~D zb(;SK3hIiJlau=Q01ncZr2^?%)TJwa^$T$>mW$y$%tFT?Qzs`qLOs+0>b&%r5}^`_ zm+wLvKKr+Aeo%5A7J#8IcbpwgF>T#90W4M_%QZr zzr(7`%>;RR6u5kwRzv?)ssPi{%>oh~!4Fp!b5O&qD_N-j^{v;CRp$7uxS`z%Ct&*N0B)8`6o4qa#KS73~%Y zJ@mA#B}>U*uSlf1+Grc_X(d{V@)O}IA}y`0lfD49Y6K_%Ji+xM`$+1`#KfK~Cso>C zjf=jf0RKG0pyd@VK2kU{SuNuWo(Z35d*`$v8rPZ#_6=TvK9K<}?&{wW1IdK4FG!bo zAH~^19jDLaw6?TNh;s68z8@xp(QgKt=O6(A?@|}hiPVjYk4I);e!7*N`$Jnm z#%h6ncmc)Gnu?kIM4F^h#eGgYuPU<8SAvg8C6D$McfJ%U);7Kp6B7f9X{pl>NIv1x zJZ1E11s1O}Z~m*5bOBZpo5ykk?4>(65I^6#X8J=b`9R03+T2WJ#1UEy-fja-($s=; z;3#P&PD+_|$vrJ}x;p2gv z|M|x94@J=wpaf=x{lC}#4oBqY zk7VDjmC$)|$xra&vg**C@73VHe?xatqysnI++9VAvv+#VO%43N_&+x0z8ekbsaP+{ zf1}PM;R+w?VjM@{JhmW5o?A~01k^$!!jAsjfvgb~R;w6als+`HMU$*Inp#x~CS}PA zkC?p~E|2&i>ZcyVPUTsYM75rc9|2W{4_-PLrjA)ZuXErK-F>jfNIiEFZcjjHc}(&r z`XjTib5Chr>rRR|b;&Q6wY9{5*1!&R<@+d-ujv97KwNkgVe`xMarM`?7uHSy%7Hf4 z@hNc#C#JdWHlJUgTRNMy>)t+N*CNy$TOLrbp4v}H~PGl?-A&z272)RbMX zIj=h4G8ON(v4~r)V=P`X+lnW;bCzJ!itMdxjhPf1k35-%j-ul-zbDRL+DE^x)uf86 zlBWVLTaJ^|0mEJV&$Y?MpU^Tu5==rQ=;o@O=C6#TdR+x$pc(d#C2toLOn68{(s1P` zN$&KvrHgAUeE#6AMrEQWT5OzuChh)_TaHY2tt#;E5y;^)@TjJLE*uoG<1b7+%4V?% z`yl2NYP)g)q$`zs>-{ML4nQCnSoSH0sd$tjY7iN!Kg*>l!)~ezxvHM2U6-@uyw=Tz-!Q3NNN;-S&omU8^s23ZYWP045rO} zlD|jaAt;KmQX+dg-wqDS-q0(;SD=}s0sk`^k+_*GY_59IZYYhFdP!e7_)d-ZWIF{O z`Js33EEm#LvQlE#K28NBS-@sfG+Diexp=U5PC`wJUQ~RtTKdrBSCI4zODJ?@sk1EG z9yz<+_%eLHx^Y6!A&80=!YOSXlI8+*>=KHZ;*D@#Z_WwX}nGb0qxDBok=Uk zEm*0NXePk!26G>ihI?n@38Y$bmsY=i%R5=O zl?Q8|y+Pw!JnZQ3s#DSaky2XnjW~jnJAuM^ zgiA!eYgG{*97i}XKX|`@B&Gp^aK_d0$ym$I7L<}|;=6Q?UhIlCai?89#C)7VTM^b3 zz#NDu<_Z$tL*#sd&x78j*|VKT)V&P}Bbm|(qIZ4aI`v^hZtJ_a8dn+G*=;B%Zg%9f zN5<~H#mZ`MS690?lWx*<1ACZk=7){+DGV`?F~9d{_@k_F)S&z`edXX&LmdvZ+@>q< zS44kovw?ftdi)}{(v8M+!tMn|3{0XJl3n{Y4JNV`S`mSuZF&0em2-1VP`x4xYRJVj zHB7dSPc+CJ7zP8+N&q>enH=O|E0?kdLn?Nej1bDW#ZY3&deSH5DvX=tUbiVgp%`w+ zi<}O|a}K1&SA1TS{V&^ZQZl@7+v0=Oz~_ z0`)vHA?bM8bnjh-8*Ew*xn>v+ox(onc~OFbL*zTY$SLD~bxyQnmQprp`eTpb+7_|S zBrRlHX>}Y}S=9RcKnZ`q?~suA{Hwsj%&+W_*SeSIxmly7I-G8ErwU_9UL>HvO^SF_ zsl@V?lpUIM{H270E82*3-C}YA70m%>Mx0SeQ0JQg&z*%Hl4sZyFmz4L2=$Dkk4^w; zT<3{g3}r@H_Pby@xSSvk49x`|A^m*y7C%#HD@$~lZs@Ot(7it_EaZs7FS=S62g?u| zJeG))xvwVFhA`Wi&zR?vO;e_IS1bap-|}XQWr2QTp^N1yLKx|6G-lxf#r>XH+<dx za?ACYj`k#ysAk9YFYlf0+Nj(fDfS%CGwDZFq^#^(Zr2!1Y|Qp2ZVNS}B<@5hQcyiq zS$Uq*c0pn!6^xCp97(N`+OhF+aHXzXWfELVF7`;XUaB(kBxxi{te?rsCVB|BCN8O}C#hn~lR+fQ?q1ZasHO7dcI~rog zV&8!LUY41QUt}cWt+AbEYtE;M4WQrJ^$DPl9VRk^SYAQ73xWwo?w!XE#sQrP7`Sz+ zTcWEGZ{)ye(JU84LeY*|hYU=W>q(~lni;9!|MsM=N+Kn`<*;q*;tv}&c_17E*I{t52NiyfP`Ai> zx0fTNQBi}5xFYfDPqI3hms~)kBgdJ|P- zzOguHNO&~uysB{57s?uD_O{5);_gXL`p%JebL5u$eOL)VDXx?LpciJ8=~0I>dWETA zp`F?@xA~2FI)abEOcF2G_Ok_5Gq*?V54LwZuG8&CQ*%q`GTCyxd`jbzs?1;tOqf4s z!jk5-)}|8LvR%nd&S6LU=^djzTa!2Spd7$I&Nteu1fMF)-Iq>Kr6x`b4R425cH1X( zt9z_rd$bQ)Q3-DN=vBhnZTrjMrD>x*gZ+1%!~wwVI3FvRxgH3W zDVXCCmkOUyTI4-6SMLiPU?a$Zw$Ae8ZZH}_I{Nr%Bot0BZ1)NVT_8DVVwp zkON3Z7B{C$k|9Al-z_W8K>>@g#6f?V$PuJMAO~XU1VkYnZ@8at!d&wH5+|gwEGoHg zGyIXHgn0Pg3KXKnl(^-u*crj$!qJH5mDJi3GDjQ>W;hAg7M{4}>MYaaAKTgOC<1lL znKUsYfiSyEYAj+h2POit+xEEEW@ICL2faBPPPS5eew`o&G5^TOv^P*}jN@#h#Z*AL zjC{2sEJY_W(QhEk=IU`S)RuegY}x&`RpyU9PjF5}86JGVXWV7pIuGM>?VoYT%Ut!4 z+Ndp$U!#Mr`>(R2=nvg6@FiO;2E``9;lXZf6rw&dhu0l6>I9uXR*{w~%|l<}6Kj!< z+x?_C^rnx5bL-7Fk+XYd5TErh3y|U|gIM!u3END0t4EVNEZ|%>UimtHc0~vx);ZL~ zAZO=6Dz5^j<>w%)#5;2>r$pxMBXxo6uUtC78HV3g$jETYOB^It*I%O;> zqFK?qby^h%1S-p0v|Sjw-D9vd)!RA8p-V_cn21N_h6hTwtz`@dG%ioYkPVR55*}9T z0H5xzycY)eXLSFZ#Wo?Sl{fLQZ-NVGpbxAp~Q2m+kKSve-xFnp~y?nlKAIFAJ#EL83lX9g^j{SEh@UN(&{Z^9x%=p0kuH4K@E#1i;olBGQN5XP3ekd?azY z%d9bZaQo~dI^rTL=xiKS#g}WuhPPTrG3ksp<;x%rACDtNwUdnu_2%&?Syhpe{q|wo zFrwF5b>A|f*lPiJx(4>#6gs$i@oShFMYq*8D7cSPN@|blbKuZAZ60)YM|l)MOpe9; zG_ny3QC2PR@}bF7GJ1#?EM9@dw8(kTE^l9Rx7qlzzgq% zPYsbCw8(CYrX`)=+yasBHi(cuKZ~O7X{=-?vRB$cCCIU1R^Zjy1uS)>uq0~{^Yo`4 z@>h)`78Vip8IoR#zF~?m;64*K`@I@g)rU76jP#48KBq42Do6b%po&aW6^VCSTLVQl zaqEFE#l=jsm`i@N7rqu|wPQft*`{RB9yi6c#H_&MpX|o6)JXyOeYQ(abYB%(EUTA7`H>sm+_8N@j)c7jXsAaPAq+-L7 zjDeuui8h38wNz>)NvlX~Yk6r2Y;IE}NFF19_vU7zR1(w`NeMw{+a&eAeD^)`2Xtr0 zR$uz~gSZVI1vFTK%oylWegCbv^%!aPC6>;s*t2Y97A@4j?=Pz$(%8}F(Trg&UInrf zlFSFwz&cYF^`*LdSlT{qKewZXQRXDq|7&2 z2AjQHQ|kgz~ql*!+VQ`JBq>Is@vMnfTn0?-{!h_^Q?g!+TlFyA!srK zaUN7!(eXhcyt=$^VM6PRgDGkfD-EnNTdC4xqR82g2U=5jm58kK|kvIFP$YBbT z5R(v04Fmlp%jRkqVoN|%x`1pOGj3VSi_i-S=%7sf$AZqkR$BhgVm%eqqo49kpqU`( zqM1+vmb9g<&GL-HEG|>0=I8S;?k$66lbZR^0u|wbr9jVC%%{@d|0;5Nv$-3?b_!1`%W$Qgs^9LGSss%vF5X}G&>YUx(-ObtA$S_bh z%j@mkJe$1y8`M!w?J^Y#F0VHj54A7R#b4;O6D?Ob**E^@+RlkgN5HB-*Jm)MTA#U{ z@IJy8qNzc$G$JZNl?AbNc#gKn9crG84`tC$7>UA(Md6JaSpx!|FOUdVeXb$>I^)g zE6=k`zv^lySd`6+UW+l1=b|kM0J@NQmjD+Hx??bfT)FE}6qRMJQ*I7gpj!Q$KVk$= zUuqM@+z~j%Cm;GiAxXASuxR)Kb0y$S;Gbcb*T5w8;J!93jjjbt^pF;7&t{QAedYrj zq!?6oV?tOS>snced|%cras+fqCe)EAX8hEdBC&T^FK$b|4LaJJ0_{)TY)stsH`?Jl zVCU1x{|oDxBm0 zO&Z^TWO}XeT|0Ij?0xIYWH?PmI+NL!3CUDso0ajY!<-hEPMs4Fj9N;82Y4QjyMm0B zVvPis%Z^qnW4UJ6<69f$;=tg`3HMy_G#8Hz#Pbs7$7S8YE|%uwt$(Ch{J!a-e+NW1 zpk-N8>l^&=9ts}_X9t|5@N);_hpVFJ?Z z0|q@lBa1$$&3A6*(jJp{c>|iQmKs8s#3m6Tw$nTB{LGX^a{hc2{ukuXoiv(o?bg|v z*yo#^Hiu5x%(W56wKZU+ygF_mmnSU7%Z1BTPp3buKRBHsKAS3UGMn5GntIjsVm=7c zSR&M1B*UPy-u4Rdx6}Zplsyd(xTa;Yc@=fEVJksonaRm)sTO1phk zQ-fwe5-;m%Pjx4AW$WOkTM!9Z-T-IJ=I_U&>{ z;@M*91&15V$RtAKdZep27-;<8AF=I&f4s!UpZ0|wK{=)G+|hN?&~9*>HUSKq zx&lV)&K5qa)aPCM-8k78NCF$All(!AC89uZ=0>`Bmy+v!xg?7)&Ew=f0#y4H%C%~3 zW@X73a9zpgCAHLbLa=6FiONU}--c;=i$5 z;DAO?WB{e$g(w4965<8q($?#^-&G54lbKK!5tLMC{Q|GHmdVdPsJT;{bQ@)cw6^AL zb2lql9*Gm5_3nF%oWmrP-yO-HVC~3CB^>P_UR8Gv=rWgNZ0(hojG5_QQdh`|DmK#6 za29fW+!tZ$@7@6UZ9BK*dfsHjOAgLN7bY1SO4YO~PyV}YUj3Iw;D1f%`VX%v@`0jA ze8J2vK&ah-+17a5Xa@jQ6bR1JEVxD@6n|?5>_(A9at{LF(vM=mJ!mCSQ{bN~{H5zf z3AGWQyB1bXPTle8ltCRYm*lyAJ1whX{?YS^BF_{-pObHfUXoHUd6AN<8XjVVg-vDZ zS~TIgvtC*Br5fn#U@@^8k`Q=?1sl_oVvD>&g+WX@9Xt$`YI`#4RgP!Rtndb4SS;&l zKG(;(tbF8u5z;;qO0zl)kryF+odnMGodB5D?}G;rwiF<3U{{rqk6c%uWf(4X`g5Xz z@rvoBK3>2VEY{h~U*ev=5ux0nguUad>%^D*knp)(S+>%r{%ww4yuY1gRuonLh>FZT zU_KZo45r2sK`SwbZ&YAoIr3n?Ja+P}U6eo!R~y^bWit&Z6tNVXJ4PA2ZD9FZNOFRU z${&VFc0QDXX)CV#av>oe^Cm=V|GzZX?)&kX5g%~`pnk{&V0|mtz|~3Ge=ax8|D26SU3Rb=ih!M4M-jUftTb&tDpGt zs=quMxX<7ahbS`AR-GJ+xAGHitUZaQi#+k{@m}IMg=y;dB1R)cXfFi;uN64TIdkvm>H_mW%`;C55x;h|HWEcL> zyOTqVo^B;yYWS^xKISR^vuwyz8o zlKweVjv0(i)bwxCIC1N&_g{$_xUoe3dqK$(*gDXV#xy=Kps%(_W+#sQn3UA*Ob%6s z>PsxAT8+cWx%hLIAFc=pv5&$2MD2a%A=>*zaPOY zg+o%iBIv$kJ$aa#4!)7`d-71_jVp^Xg$j8?SskwQ^sX-$WEHd0D7P-*7i*wDW~gTO zf-+yFLL+ltcgT6n^#{f@GJWYc;J3P773iEnI%aXQKctasRX#(w$PvVOy3reCf6d2Z z-iXbJW+b=J)HWEXcwb|1T+F#(%52T)m7VpH-E?K;sM(7>UDoc~KXyD;9B8y=OiRU` zR`W2E`e0Cs3RP4Ccq&9)61GHRq};1c zD8V&DM=eg=%977G6hI$Aa6>%aj#}YJ8XKj7R^Tb{4Tw+M8 zBWF`#B_$=>Nxa6mul)}Hr1ycEmO5K+y0{k1B-+D{@zJ*VYI_PxYZl0Rdg^>n=%Gqs zldh78s8N`yMu6=voDb0}I$=KHSN5F9-Cm)ra$uWQDrhY9*&!R6Q|1h-vY1~G?G~Z? zcE2mc4Mg;z=hW`aHX})~>xycmWA#H5%t%qio zx>yx_!*ykSIoKg8l_g{(f_a#$X;lOeLJ5Fb*|E|I2#tLmTa0#^9Bnn3mYg;^WR&!T}ok=VU?}*tQ zqi#kh;z_T)#kipzf3swhABz0&H!2Ld)z|0kx3C`6^Re)RDdZSe^SQ5t6%RO!xs|qv z*OCv%W5Q%M2N+VYu4xb`+YvLg-CbN-b>;8d`2Cs1t>mX5iyk94X2ljqZI zS~XKtJh;YZ^R8I_9P(V-UQwBptEpot+ZU~RZ^3U|#q}W0@x(T6cn8OZ-u^F|9aLGw zYNv%&MmH1O(3e-aVNh9lKLq+sKo27T+HKVd0W|XeLU4zuVbSGl30E!`o?0$6NZgI= zkDk)#InEX}+``Osg6#qrz0wbLUw?9-L5a* zCRLcSN8vSu{zG=+kb+H~he@ryEemv4#lG7)8B+giD~bQOq*2#z68kf`suer8pP9Jx zeA}3G7+SsE-|V|K z(9Y$b(yVs7kL!8m8-6=d41gdHu8unPU!05_4z%aqv1ftvu>McWNqn-y9`1X3URv{= zLcFf45;q1yze(z;556!d$|rD%e&<3s zzNr8ho2dC;XYPL0%;{pU=upJmEJTNqRIpd4(dfkUEy85H@3TUx=i!AQt z4b#uh6Dtn#FWh>#$f#=QI%h;9NYB)^#fPeIm-}{_7!9m=tH>(ysS@|j@yE>RZo{gX zQq*r;ze7#xl!o}-hO392SBM9ZhOie^H7H9J#EVKU7x1DBJCJxu}&L zQWQ_F^G@b)7X1(7hePkWHX^XMSQen)n&o$}_tb3+c+q~&@O8J!4L9-yZfiY8EOX5; z1Ir@}ve|rP{nlkxZ}?w76bIb%F6BDKiPE{;x#^&UP0>?Fv?=VEMAg3Iv){WebMk%g zA%l*pq0Krx%Vl0m%OX$z99?hx1nxYjC;%3JzMw65?YV=fjr$m*iN~KP7r>s!JRrlI zQB4ehdDW{6{h4PcBvVtlcAC}w^Pk6I8+P3~+pIy!ANz;**QX>mN^+M-8BzwPvpgRi zdtAi(H~Brf4iv;wrj1&>jr_)Fr1o-P)jU z#%N~tIJz`APHyKSP^C9Ct&%(Q;5)GuYx8A8Z61pbCLSNai=86H&K1Fh=km%|no3jD zGA&PE8muuoA;7QdwT(A$>o~#5 zGKf!DFNCUIv$*5+fLXS(()x%t_U{oF$g>?gWTaddih5wGs+E(1c_p8pweh`8aOgeR z=2pGadeE{%qx;gegFAq7N@7fZf!ktSr>*?;C&jZhOKmiP_(ucO-0jGYe{Gl;9cJNslGlBth`YscZkn+`5v7&OY zQi6PC9MKzNxzLZ~O^v*w_nP8b8yjC+IRQsr-G#pFx9eh4fwzJss|wmA^}G@~U#^gb zAB`F^B>MjJxQO%b+d^heY&>@`S_z{kFDoV?!Lzp6$S^gK+`d(AP%J`-ct+U<8m`LI zo!n<4wV(^BzEDeHN`lqm`apm2w*@o|EsV0=LI%iYk$8!S`N~ zx6WN`r-?i7`5LpA2DcZB$%G4U?fW{ixjvZeAVs zMEzEM({AU!|F|eynf=I(^if!`lDZRQkh14VWvpt#&cGC%QF}%XgtV&eN?61^A?8d` z3}{ypD|QO=`a2%mlr6lii<^X?vXlcBsi_)~0xQLpdkgtVa?fJkW~Cgxt;qlC0To9N zU&@Q8Ilr(3TR?BW`ryWa@Ek<;lz75!w`7!xII%?cXNQ2P)I>uECaQ|ikleHVt|1@H zeXQjKAg3kYt|b|Cie+k@78HW((6u~;_+_vM4d_W+r=285P`rS24M?{VVHS!fw`#hl zK7NkjOMPg9OU~JYg&0Gg3O(@TE6;Ypi@TMutR-9I|8&ICK)>)X5~_r@-Nw*Y*n<06 z*!f(RUD`y1X%he}f}zJ5H4hO0ZKNZGTRa;z zH%`$Mt48_R^iCP&t^tcM*!Va@V!_-r(c|sOi69&I6pM7ya~t2C)-@!cbnR8yRF9YW zDWcz=+nA`6QNdi#YbQ#2Hr;&3inHiF@z_0@+YR%kD^?4^F9k(rNuMSl#UJuGW1&rY z?ROC$;w)T#zuBzY9?Tmmp!SQEI@9SPllFWwgg5EE`(sG~o*GFB$=`5U`U6^?o4PG> zxdZ`1vUFr79?lsgWPw%)PghAu>;hx578;rdBPfWJMaP+)Zz6$&nTmevZ~gctHMUjA zf7a3xs;*jgMg=K;B#{a-A5EIwSbWE|mOwEXN;CD^RqdYL>#dLU1KAdJuC?)XO))E& z7fC8H^~4EdYs>xH*1H&ROG@}?^5Hl{XVeGJZMeSzhAZvP5n*1>hN{{GgP1eCKFy3~ zFuzz)g<_WB(x5AvY(K!9xTE=?8xdn9%20p(?trAul~#w;vbNTD&V-F#Jf6ArUMgak zGCJbI*iL>BUUced^X>{3*F{|4( z{QenbJ$wIg2(RY$-92~tQEG)P>JW``$Rf9@aS3dw^)tqa5A2*11mlKr$rEUtyx2T^ z#ttRZQj?*RaJGrFd&lC|?W|S5+6&^e>S!v4PJEna#Z?6yTaZeLF2pYW1HaJ{FN0II zR$ zp*&{e7aKJAB;Su>7(&=IU9mF1bf8a7=f1SaqjUMS?OuX4R~J#MvN*-4#AR~l!L82n zt;|3RAcqBHQ%%8*&)T!7jC{=KZ-zA=%X+0f!|1Uk#xJZD`OnU&2vl9cck{7KYTy!} zN3{F@t{4Ck8^5q8nt^W<0(fcdVxYVTd8+IOSUfb18n@V2QjiInIEwwg7o^B# z2g_?CB&mv0 zs+e>nTuW_Xk7*ET*lsKd!iWP zAe2So&XbmVvM;j2Mh!^L2zY5EIqx|p~9Eq)QJr4#mxa#kI(#VecJ_? z))Flvqm0JQv0Z0cBgqGAjyLp*~l$G6AvPJ5sIBM*O!(8gG{6>98b?!A~|O z_i}Tu|3ME1@25`duPCH-r27O-EiB-OZ?K%@(`sNaWRh0+(GWwOy+r{b1dWBu^ex)$ zpz9s^8)A70`=pGi!P8cX3j&kXUA|2zoj*lRX9v?B(H8!@mXHUz-EN-RYpCUw+B@xb zQfj_%<|)dYFcDojZtA&(W7&H@uTT%FbNUI<`c5uDDGl2xZYLPmlJMCtfJw=-OV zX|jd7QY>TTq0NHVd8RHFeVFZ-oV~bo!8na7B*{#Jy_Ssz@X8I;i|?MQ$R7qnkPL1$ zL%1rcRnTv)BU-gRU0UJ#=8U*n1qI z2v1T(z~eRbGQRNszK1Cr@vTQhiXl3c6>SK7LfrdLit#^!X?; zStaX*x`wVi5}r#9xLoh_C|n{6?Z zP~nNND_SGVsnWykS|}F{&&j&xt@F~OW$QBc)Z5-)Z9GBHig%~D!!A>rnb}R8R%eFk z9alw~R0jEqYF$-#gtBxw-{6s4hx!}KOkDAQneoIOGAXAEv`v?X;&YX;CneYwT$d-g zJM^|`MfayityXkXNl}R8756j8g#|zF!jptfC!9T^&H0bB04R84$(HGO-hcyAqR~d~ z4oj1UN^lxLLV)HM;2b;1Y)NUY=JWhAPio4>7asMO3QCNOH-S0sTl}hAq2aMSVcc8+ zw@L*~Jyw_ruflKcQOjFPsjiyQ3trKc_m$~#<3hKFCZ*VKwVR-dpq%iJ{#bvfwtDyJ zb|#2&8L_W~-v~LLa)pCDr3eSo;Zlp?&@Vc#S2e?Ou*>;1zg2=v*v#tndotV((60hk zCLS0;kaC92fh+jTaZ{P_WQ*KO)<$}WjA0dbD%G;G*jU0F#smgJf zDLm#~yn|*@^(y8B+HBt6#8(B2U(9mOoMj8@bpUrYV^d#Nd#Y@OsFj&%8Wg0f)S{g` zx7mL=`bSPc;M+q5@dv-3;Pe$LY0dN4RSgu^2mpL-Ab8#DISC-RZRMf8Nbei2+?wKC z?`h6xlXITAPita!5G!NPE|c%3SW0smI-^cpw6!*ubbHi1g4>?Rq{&!SQ@O~+S^PBE zqQ+!nF$)b5*=9$tkRq!uUW+d41ANmJ%J1pg-XxKU*Isn2<_$aAb6jPk=IE*OAX@J_ zMkQ{msk&F_V}tM6D3UAD$$N;8CxHxd=WV|=o`Yu!HAI}-yBR@=u)0|%y|ev)aQBvR zQJ`J;uxp_rprn$E#7L`vG$=^J&@G^Zl$3OfhzJNsD-0lA0@A|3Pyzx=GjumY$IvkE zJ-WNblN3h$_LIvUVizV%j~n6m#-IRFCw_ieSSXxwdoem0BvhH9?ojf%5Be(1J1Pc8 zP|i+9waEk!dIHU)Ax-m&mMqZHQb6gcRsLjm3+qdP+ zbzWQ8;nC!4>3%OveyZH;nd;=%m<@Qni5OkFV1hNiq#K^|q)ScL|KpeEOq<+xxh- zNh<&#L7!ZbuO&?IAEkJx6b}q&k@3UmK+|>n)fpNZX7B_z?lSLlJ7?|GNr^waz%!~a zl4)42qLTc|e9LfEqwr1mZ+N8K1k{4#=ija#Jy5IiYkz5sW!YmZ&X1<^#&rK$&ryiG zpoEAV$VB!s0FKF1^?xXgsq+xOs_PsxY{a>s#Yu9l_VGQej(``K)<_3;hO?W?x45>l zT)z*&E7130j!3%UOVOv7j-%UT@;iZLm!2zIGfDERtT9C@tA}Pp&^mH>dJ>ckI}K|FyWndC>8syC;t_=xhFMkq|H$@38!MW$y!l$*3Fy@NqLe03qII zaPk%=$p}jV_0<|Yp*4m<~i8hMui$BOQL65QTg9N6uO&Wk{CVj`fp;va!fn?_g zcI-^gBElbBu4cdzWr8J0Y2iV1$-Npg^mlolE917k-&KkiypLu4Ww)iJs7cB^O})D< zTh2R`R6{m{zk}r1>E_^iw5*1?70xMr%U+d^8ZHVd2a8Z^6sq(vR8Oc$=BQBpQ+wik z*cTxR2acUJpEA7zDH*5>+Ru$kIP?jvQc(ESvanrWXb@X2B6|Wmq%LX1x!oKSMXU2Z zm<5rlHirfUux3VZIG$|!Kx${705DMEeCd1GqrZYw&k^8 zf=B8{$;>`g?E zplIn(o3P32g0h)0`^|6_=W2)1K+V}Nci!~8n`UG$-)kFJcI|cdEqa(9qN;vM{%_Rm zhor*@BaD(vms2+-hH_LJ0#kjm9BW-Rt|bzqtqFi#B8qg<_>_TSyYwivTRc2Y)1N~D zRLv(4c8k*7#M9F=ZAU=Cb$P}E$~_wd>U>nFa!93FEtL~*moXJ*1`lhHr!=akI}$UA zCF?44WImGF%+R8G#=N^m5i6ra1DBlfki3d~*|-fvXDcyLCw(g5yaaQ>XR_`JKyd8G2M3_XCTe-s-qm_iR^)f5yIFg>{X znh`AQZb!$U5Q+`6;U?nRX%`>8tqcRHw**YZT;@Quo{O>GC`Z71X=_eC*E@u=uL>N|qx55>al?;YDY4>J>Nex^l@G>=SzK9@K zGOZpQIYo-(2-EqLf~6dksuMvszJPISMM1el&^(tu-J88%v524Tlzn$%Q-3q2PfkHW z-)*_L-KA}&z85Q=E`v?JOcPrcG??xd{SD5{f~llHPgVKMyWH6`1}ynS6VFwY`W-Gp zEiSWs4c2%kxIBh*#h;~H+Q-=Jm*!a?Ifwtn0r=Me6Suq0`f^lmG%v(wms+wQ^j7VC zb3_(t95+zQ1nzsfJ0kW#l%z>0T?F!+_gadzRez7VU1B+sMRW~A3ZFSo2+bDyq7rx~ z=*gD&v{PKP#naEH^9&#RUoocm3!N4J9_RwSs347n@t`hJ56zq&h=PH%jzwDK2Q=B( z8_a!`fUT4s(Eg#U|K6*sK$+I}je$OBNPYLx!!Z@mJ^V`-Dr-v!O!!ce=3uOG*PwFc zPYq-s`_tb80DRN>;hfMa%5td9t)WbO@A`UJbcH6I!%E-4W;c8Duuc_QqLgJ?oKbcW zl;r>Y6Vp6it7{^jt&l+X_LrSXwF?j{guvOpuZUFjjUTnHeXPwj^+&)J1fkF)z&(T1 zfF@etH3gc)N3j8R!1k9{z4ttPcsE{wm?`1%R4HaRAC6dau5um~5Yg$OVQBN3>b%mM z^w(wmK-l;O-;cUV@iw*W&@d5-5c#hj)Vqmng@!b~A^mR*gzN8H>Abb%O8h7zX|q*asbD6DDvxZ-|+TcME_iO0J6__7VEdJG!0g%3pEBUqeO? zZ)^(sj@oo}MNlA@v+9XSwDl^={EB}4lXmhAHd?$rVI*=83_tE$NX4k72adY83kW;& z?rSRlB}qR}IlhBv0SDm892jzqM9|4bI`Z#m1S8NM2`|$G{@YK|!@~64FcU1Jo;y_) ziRhiBBZWM~DhQ|MxL3;;F*|;;hi6=if67|DsJelutLiZ(6uV|Df{s}xTRlqf zI)3Gsa7=^QLtu>e!^bePJI8DB$yh9~>exxdb}lY|>ehcbN-)16TlNd)3MBj&NEm45 z{d2O)HyHp!4}QV=`F8yDuwU?VzTfHpIXa7(!+!xL|KD{qI&5F7Sdic97QR3Je-in= zwaEHcxx;_@Sd;)jareluU8(ge40piTnnkBtr8p>yJ(s>R1tQ{85=Gl zPi#BS-ThTvLKkSWH%SHeLY+#mWn8EUAA6FAolqsiF_XWXoG|9lUKh~kh3ZTgJz5l3 z`K~+|kTJe%qKkD1P4qFn*Aliqg^xKl@{C|+RGnMa^M;S+rwBxjc}61y*HZIH@CZ-m zcm0A^$Ozl^+CoH_%dGD!2$2iz#M@y<GBo|fR)JFj;;aXlqeA9FR}X$Pw@{wB z3=B0Z@z~lFpCSI@EbCsPYrxhRy$GS?Q;s0|r2LE96rQlJ!PTo+jQ1OH4drnKV*xA= z>lsOI3-?Df7M2`8?(Dp73+UX%B0M}A5gc}4?w-k4+u4|XCI`#{E6(T@2k?9OUzN`% zPQ0W02F$a1)GqK@ySA5vc#h_bJvn4yGPDOrMKX})M}whIdl|XvJ_km#ajE5swUSZ= z5i&IvV%gx`1@(a8DEI=~u9ODbAN%?2g@TG5hPERJmYit*fkIXj#lf82hq~-D*TnxaB0F(!qgybB* z04Bfzo^@z6=r8*7My1#`z0b%h`kNBrG#-Mk8G_*Etlie~BP5h7HrB+xNMMWzvDzo` zJ~^@xykHRUa(}d3>{St}@0~d>GHMTgU7YXk`?o)*2m^PTz5LN&Q{oV{JF6>iH<5zp z0T|2&dm_bzyC2mF@ith4}rw$(I>Ev=ELW$?qIXM=FLA4)jbdAv3uMA=h(Hg z3YvzJ>etLYVH?KI_1nrKeeoy^v`)ZwubtW|T{fc!oesKbQ*z8Qn71Y}(s1r$NF%&T zn-mmXPN4gC%x)hpMQ1QkJwd3A@aaPM|JZ-Xx*R`yw{F}l2Tl1?F~#D3#(86_(~7PJ znKqbV9+i`s!TYg0J-*shI+&P-|JgyPg$!J^2b zB~hy23*63m{DN6qpOia;Yp0rsq+C8G8;Ej|FxyvIReipZN_%!P;KA0YyL9p zu3|w5I{-0u1@nY!Y#L03d;%6meb5`OWL@I}shW{b7MW0`*ClSF1!)7;$m_8Cq5C=u zhZhx@L6XuijFeRVgFZk0=cOC~CU@ONTURFS_{ep-GhhNL8ZwBWUb`KAl?w%Z1Q-T-zp70( zg^AsV?;@&fd7YF6X{T-C8I7HaSkd8fRsm3dp?~sEP}t0@~|A;9sohe=1+VebB8iEDaX}>XXxzSEZR6 z9jFuR#gO&LsvOfYxCOHG+V*`{7AQ~wPrM@UyKYHNutKM%gvH}$w|*ymBI0t7H*_E_gFck?Am=j9+Dnv z4$@61QNW;H;2yj8zVw&6qfH2N5)$M%vT3um7PpEOYZ}i(>y6cB_(5l5DNrCxbv;*H z&ZNKdJQNqv1&7s^IbS?`TH5uR$sN+hcG}cWuc8<%7YQB)pH{AoCpW9U$$z^Y2VDirOj;Q>m03r`ZS>VN6N<~^g-Uo zDLY`Tjh)tj;f7`=1N}MdoAg8km69VCt`J~ZwO5mr+_1)RaYn=-!mnFufh+`8pBc^o zptF>)ZaOR18}p%hPgpQ_(=O8~@VclTh207M?K~vJ(aNgLA;2#v;CXnV%ATQ~xbuUY z0!i^F!M~CtKnBvqdP-n2t(Du_O{cZ-ChHlOWFSg2{*bC=`J@~@kKOgE0pO9iv|f`q z6c!Sx>0S+`!+cVbk>nGjt9P2@^9kdbGzS@N7siIB*qZiJnM`Ud8$6!O*Nr^{vs4E1 z`1w@XA}@lJn&5-Vtk9%9(9d-3lp53Gtdz*XbUuk>){H8)r}v)5HWO)_16{Ag&)u^H zP|7(sw%@sRqZ@#oq?vT$#~CUc;QZLLQWbr~$&P9X=83O{3f`{?nc@xP>`UG-6v}-U z=FSoMl9S&RG*^GgoN+Jv)V?zBRXQ+Dqmx}*jbkskO}7bvQ{)|BU zYNF*D$lgh2;iPXgW^QsrG0cl^bo_aEl9Xa< z$5S;u%FqPO4fdo*n+RfUc|&z>Dp7M6aI#Ei7|@7Mu3x7Q{?lc!53^Ao-b*Ja_tBvC zyxvYd6B?#`gnca}G>6kB0S(d2FCN({I}3`_-o5nmp4XrujPf6Xhta49cWM`+ru5f; zUjnkDoBoa(c+y^5lda+{vj3?_&F?&-R&Ig z`cEGMsKxr9ZhR3Spqx`f08Pe1zHse7)Wpq5@$zBEd17;X*Gg4CZF(O0fQ;q{+D9HV z&3^c&3|I4Sg?PF~{eI4%Rq`;L=SMJ=sUA3$OZ5Vd`XI_^KR^=*e;K25uwR<>S`c*O zY4}sOJ$1X!3?VJJIU*7C{G0+h0`@YA&?nnLq$bYnsqlbY; z{c>C^HW8WCN-Q3 zrWVQ?!C;n-a3k((c+7c(zuk#5F&0`Uf8)Zq`pItdqBP9t#Z@V}j}5kAkcX@ccTW1S z$vw~}w4Kj?rWjGw@J6#izB-5k=lxBIhLb}bD4YBnQdgem8`Dp6m7F0xJH4$&7@$oy zRWjpvAiA{EhsNwYvRG9?I+X9*t2udyELOS30W8if!7j@v3)Pq@^Q^SCA(;E-&3v~V zD4t9_nc^d=HlVvDR=WwlPkfhLLRUTTt|g-f?+JhGTL3k9?9 z^oz|S=VZmto;}OR$XLPiw5*$tralSR_r}wtEOxK9;>fDm+^5*`suM=%VAli8GY>sX zTmpZ$ks&X3uQ@{oiZ?$Mz!DQ_xf{v=^;W^!I*$!!P?w4;A_w)XpFOE9QK)0ryvVwa zh;80rduPYO1+;V=HH#_fh2yk1zFn7$w0G`R;nMy{*NiWq)Ngte?%tx#4X3uEN{n(S z;J-X3C~uN7FonN&Dv{JuIoY(ov-7RUqhqAu9*Mp zST#>U0+sLSAWgG-AKKU`wn(!Y1(AkpK1kLr%G1m;s);-=QbFt~-%M&Rgv^kgJ2K~b zG;fjOwW4273*lPr{oB1IiB8iAvZ z*4i7fvQ(~aZsCpBoxosmdQI{xS3bzY9hW!K%)ptK%Ac5(nR6!&WGAjY5s+1W$k(S{ ztT7zcBltAD$(eu``O@zV(;MW7J8v` zQrO!SVjM1q>_bC$s!!@uHAsE7qoX5) zu#g6@b!|Q}9Anj;rI!6Toc%qIICxp+I=}tl-?n$XAn^vA|i^Xi_6FZV8lKe z@#LD-lasUR;CzQj1y)@qi+ykugjc=SGVR^D&%v@t^|!6E&+c`Ah3CqzR&2k_A>?h9 zUYIP>T_$m2aL0~5`dw`No|3BU%&I_(&P#8VYtp7YPinR*W$qFd_4Cq_l2cM%yc~Fy zii(Pyyi2?zxUySB-YAy!x31Je{Z~nb9$?wmlpcsknZC>MwfZHb2B0L;lI)%H49@5{;W6!Ioil4K1Skkb;~M)x<2i@M^A22h){-5?ez>i zs=aB-Cz4XzFwIY&&1l6+c`wW{?p<6axxw6i)I@?I0vPx(55 z0%@xXS08mk4f?H!2%>L#(4I`s8tBdw2&^`Xw?Limv)T@WU%=L~op?=alXN{Rbz>)P zhV9vyjZ8+}8O}3MLIc{s=-Lr%Z?{f!_mEJo@S4+(8n5v(m}ETqVE&sqwQ|>$oTYq& znoNCtci-X~)OMHez9>HpLd#^z)SbKENG1(D_K1xH{@xOSW%=q|WsaccAG=nJZYq zS{y!e1bzx~ydc)8V01O`(*=dr73%Ka5qkHcN9`BKsJ00C7*1Qn}&inN^R&b{$lbI$+ z&!ycE?pmg7npXn$YDjjqSozBF+!y~;?Yb1azM4{AQ+LFDbl`cCV;|-giw`r?(;>se zk%gBmY;0}>7hEt)GNQ~eU;B_e!_!2iVg4%Q!;J{$$8x!1o?7%)Jt_QG{7neRK2e{e zlB+9+NE?%3iloFC^*gP!6U~Vkaf~Kpiu|}cxB;-g9G>DwIBv9|t z6(ta?Gi8B8Fi3D$YlFCpj?GkUnn)JC~@u#~DQ{UE|Q27?{W0S@s6 zYhbz#shkYnD$di9%XoQgZUx;Xhg9)ge~6Q|?oeY1(?-~d#-z&M*0y98N#X5OGNJe+ zVcPNLzF%!i7?*ZM%GKp_mX1ei$wHU*E!b3Wc#hmOf@tU#78f_Kn`uu~n}InM-}a5& zA+J5S+Y5EnxUfm1&xn^CR!Rxr$&k%S8wd=(i5}T~88xLTd&Hf042BD}S30ges2CKo zH!d%EM8z9duwUb!9xt@E#<{*M)3@yU81+ozl=)$b!mY=pk-7=n1<}K5|Fk7}v8Nz$ z2=b}vhNWDO_W0Wa>N&IUklCZOY*1`mr&#qzc%;nkHo&9ALF7@SJ7GT?zOcKmM3p$V0Bl? zN6cFHoSsL&l@kB5(7}cAE3*eDPGGjA@7-0kOOD$SoLJ&l&Zt)yiX zIoy?UbLvvI+x#_qORe#qJC)T<1*tn$Z(T3clZ;K+Z@7>WD6y;oK*9{t5+S!H+B7re(|UVMIPVda82VtvGTA zGFoix-HlfaW_&l_M&iPj(qkX<v+A?Jy!Cm{hz z+RR>KTGZYuBuf_aTYY_Gaiiq=W;JQ@v4ZMZhQMsW7cuIjPqh}o!x*w^p=w;#h^u9j z=R6A~RcXD#tHo|ysu1TsdMb)DuG6cUzkdYUK&3enXp|J`!#7wed14q1?MbPJD%AVyCZ}T0Y_waLBUJLp{1248{u4sM+4uG ziM*XDR)8z6M5PBD7QvJ0d?~V}U@GV6sGhE-wf64T@P~7)@3jganVNns{Y~=&c8M+} z3%!zk_*9jcwI09Y8lbaK=FbyUVs6@mfpw0jMD7g8%X*{zK{s6(OWLG25GvCP)>+Hh zq{U>TbVxk=6qhB4k%ZfhJ)!v~P8yk*_AD($1u#1M;c zs%|!(vG=-Rw$}qte_-wGW!~TJkfE>&`0WVHzN`5Fs8*X5q+fg4@JFInn5b=jLePK$!!hgQ+n2biFN zQwXP)9!?uzZLG`PL_N0pu4Qy24#{XFFCTI{o%!lpsaTE|J!*xsn(Tw+dD*t-Ss$zf zRz2CtyPeAc+C+NojO!29TozDLor?xhOGx$k6Xl9n6OI9fuXyXTOpCNkkK8yt@a$@n z=qTo19iQ@bV%5UY&+N4C9qWUK=;p7yS3e1fR1X0Q8-&EWZi6?epmp>>_?=^g1t#2_ z*g?Itn4+XJb_a!~vJ^ZQKZEaeZAq6@IOx!= z+C3ggBsCr{vK|xG-S_sE4clfm2T6q(S+8)%fSBwbo=K;#=#@K4YSAKdgU#P!n@w`w z84?p&Uv7A{S^dTg9UYyap`l|~czAena=zt1DwLb!iMd9a#rVH8THsWNbux; zJeo(B&q6gUhk5zr6~@k;DcjJH12H*a?IbAk&u+^L!)QB!=s9&yX!}4 z)h%B6PD?jl#hi^~EH|HO_>jy@S<hhv=8Gjca0JPvv?){CRnr`|~|n|Cr&NxNS$SCxhF$>a6dT!&lTe!1VD>6qt2~jOJ)_5GyE}Klp8wEr&{wFGiH$Igo)YWq3)JPFH+{1FpYR!Jym# zyL5rEOV}sxaMuPu^YqtC8BsQdDjC!4Ne&(!sN2HA)Y?l|=&!b(Ox(49L}^~YDBNaq zftf0H-;Z9-_^vkZBY{k32|VQQWGSRFe<~D^WeV8+TZujrKA8?)V)ol!ubHQ$TYcKp zE|YJqY1|L#1PFAi<{ny74FIafNeEJnf(Huqa=ITjlfg>vUl&$ekimGGz6tdzRoddW z*7N6sB1azd?4IbM^^e|&sx2tQ&35d!wK7UgW_}#Pa#f}UJhzA3>@87YaSvHn6aS`3fr9A947=w&D#&OuZ*fW&O;g!lEmB?Zn^G`CgL~)J@D4XO zTb_Hym~NQPJNG7`y6M)N&?NnEX2BC6&=GRmHqE9gA)Ul`2}G8I&S^s>=GQEXuglh| z3oM=WyIjge-K@>^fI4x2)#Z)RvSZqIkh|fbRd*80pW+8vlU(*{)%^|I<>$obKP1Pu z4xPMO5JC!G3JX;#Yy`rGDN)4_GP@vE4)=7%HWoVhF2deV_A|K;4SoLnQa$!irm~|| z9nE8JdVi1Svu{BPWSV_(e}Abl=pOE%xt$s9Qc|;yy`v*;=&O(ri)?7CL1IUG&BI2& z&Oa3Sp%$I!;X)II!y~ubszMWT%gupM&f^Us^Sggp*b^r*UVd}mW*2y1s$f>qyV=4q z8`rf7h-Hm(YTgJZiQ!={iBr4FxKVL#o^?TkRcrqB>zL!x6xP#Sh?2qI%b4CXhEqq% zrz8igQYr_Q`yy*eTdXe>CVb$Zdf1O>y_ni{8K1zqq+hxyx>!eHIoJQm`kV52)FZeB z%*G|tSLaW?0f-paj$_~_zdHACL#h{EVeCpr`nUWC~&O#56?eiA0a+ zU%KR9mua-#RZ1Xy{F$hIesy!~C})kqZ5C^JfEB~{4i^MQk|tP0O=+B1eKC~^Xmc|y z*~4OMV~~q1p8VY0TuYzt)2Ywqr{nv6X)gHDMOaVL)GHm)C{pdE51X9DE@B<2Ggtj& zn(@2XU$Q|=ZW`A6lNH&b`_~oPTyeaZ_2|WgxSYpE2SF_8 z(#w-ts)GzgrfW9A%xrzs;aerl<~7({G}f#8hs>?=z%DG3ja9iBjoDI3eujlHgG7Y8 zvAeswe$W|OU>|^Cyt4C(Gcu*nlyBvIL8w@}W*28q`JlC=Szdnr&1Km&+xLgrm|7`LQsd>`740B72`Q%c=*cj4D8x^U ztrtw1krq#K^ZlKcT&I zuu0HSZ09!8OLHS#WXEsy7*n}ktFO10h&h~f%GTQ&6xqwe9I-zNR<^f=Zn{P8%xWko@>_TwFVLv;TAioPK5#zyAr6 z#f3bg`6CN(m)yj99{?lD{2q?wla{Oi^r?hg zfH_vFhjZmpn=J0b3upz;SefjHm#9k6eFdZyl0oECbe&Tx6sQl!j`d6C)0@2lPSVg; zc3~a1)vCr2wQwW70oEwd3@%YyV7UIw*`6fkC$M z_^XC%L58+Qyc@nJ#Zqh!lEE~iKW1+RiMKun=y|hbL`1@D16%Bch zY!<@&#DaS7E*T-Ia}&{>`m0KT?iDjEv@j%4g~@GSDQK}$hq|}8e4?!}d^<&gK&X|$QnA?Ne(bl5!8cj#6Y>uCu%Q{t zPc(LTedC>@!v1s}uf3V)Khx28P{#d}V$$Pj$hv9BPNUidQnD#ND}Ld81LkNGrJ;BoaDP%eJ{tda1D zYiT(EFGeUE!awbtX9)XPs~*m@<(zr*6E*)5y~CwNq6Q_C9L9mLcz^|`i_pQ3d#l#V zhL+F;7vNgV1m%<4)BJBLl(ISXCLWzke}pf+vG9rA(3$r_h#R+DBW}3!}q@~Y84o;y7mPutuvUc7g@UmOx7q42j z)@4;F(alTk9~>;dVSq_JbiK?o_z*%xKhXIsToi3U%Ln*lCFYl?`eOz?1P!9I*US1^ ztU>LYf~VF!BHwirLEB{H)w~b7YWkVUZ^goD7wluq2_)5=r`LJW)VKTzir=z4s6!>1 zt^Lj@C>gMYMqB1FRn#%LPf(M-1v=dEIId^|q0%R8kD15}S-`!_tJaF$-)ZRPeHDd| zj+LBaKFo~P_KKn=OR6<*?%|85l*h%iWE2=DW-YYrN=LdyT>X~aIB5jQnoue zSHx7sN*MB%vZ{#!*H4C=g60(yrDRz5`#$;Qi41UY)af65z=l5PjPi1Er9eW+(GN(1 z-vTVI!1Ks;sK{wm&ze8fvi=&@#|IzFzaLf=tIczI?}W& zhTFmwdiWb{P}*ItCj~GI!MNKq(c+Ugaobs}St* ?uTrHik}f;ldf5SV^c|1fdUc zh-l0ombxCGn2efITC(2uce?!F#4lP?SLosv@6 zrhqo_`UZKApr%MN^6d%RAt%a2~!%R^C}F2 zleKVP9>04)dtEkO)D`ps$%@Ts22_Neq$-3k)m_VSw37ZRIsamAj{3>;mQn?wQ*2_& zT44H%b2S!;Y3PvD;WnG^uuSc?7N``>c=;7*WKaOatLM_5;-zomD|&EMlQ*>X zDXm%2-ASK|V=u_|Uj+x7tNAo)+zATmF5o3TZ}`HW9OgD*@2%^iYpI`?A09x#{W0w& zNAMZub!3P66boyUID5}Dt(n@S$;%hTQ-D8H8HSr}sBZYt-nX4=k%-(9wrj*-CdZCo z|A^n9fzqtB8y1EjQK)ElV1OW1fYZHMgP`$FPIZg}_+ZK1X4cvzT{lKe0 zIMmrt0pzZTvQZnA=YsC*OK@8O;Mo*%C6T4On0v8$0pOWXLG+ThUxL52M!8j=p$Zun zx#ASWBkUnOXKBAE`rE6U<+b5AnUNLVABcXu*Q+{6j1udsc&-z7-8?_)PZ7(%mk3xh z>1kHLKhiE~KdO5Qd?j<$z(J%W>v3i@MEd2!TJ~)fxe~SIps7m&SpeJ`(!h1>fB2kH z#c%hD{WHgyrr=(}*#ef=W8@_L^_}Y(g+XSGr0g0~b_(nt=M7$XSg!3pD2h3)>R4@F zB#e5zLt!@H#zn?EKqck)n7mtu6Ud-Lhx7o`kg<{>FGsROK7NUGi!D!(nF1TU!k|yR zP8&zbq}Vh(ua7=RyJR!$aFVzydG;%W3^+&It7FzW`Je3pL}6)*nMiL3#FvpI`$4yD zl358X=F?{}`CjS>NsD2wNYQPfO)mJ%T$U#F@zd?p5!2u#=~Lusj+SIc*JjD8Hq;6n>sY`-fQg8f!j7F z1yA4G*bJ*snlo_mnWuC}^A$jO<7?c(9UL4-&{$rWGd9esimDrs_OT;l^GjBy0p9MI z<77>L*&I%?1jT)-C3Q}=Mo22wu$h{3%lK4FKN6%bwlLDQJSw*0znil^YsTNU_GYm6 zu*=MdTbrk|B4(r%ISpZvPHxMtIfs4>*hi;QV}O4We#(Fr3lI){Hh{p1*A=+5#-~}j zCmV{zB#ZAmJ4Fm4yQA9YMK0aSvdjI#V<>uuAES!9eG0m#Am(r?&bcq@43wt_vC7Ug zq{?AakYH6X^KnuqtrkzA3~14daC^1Az0&U(dTCi>HU)o3dxdXn9CgNG*0S;t3wH2m z%SuQt55dvMVlU#$@q%+c>bPa?bzuCqN%~eWJto!(_&4Upm$O3&)E~P>;s@d)8OgH3MT;D$tYWW`#{bhyCl%{ z1%AX2G#HS#Qps@LxqURyN3;8R#cOxo3E%R#rt=c7R^|GzNTB3ye|U zemUJ@+vGMIeYW%g01gxshs#Q48&cEIDAY!RTO0;`iJsxMH~01sZI;c2Nx;WiZZkyJ zlTVR4CLrPN_P~p|za$fW_KVQJ|-K?`_bj+3ZTz5LT z7qASElmh34{&kvcrPM@x!9%%Q<8GyLLZ`6Uei|IoBk9HV>;hGJjy?Ba+c&^05(k=I zwYMzYV`MBc*z>Me7mk$pI5QjT@UHMB$S- zEUa#74x<-}S+8eW%ENubqpTM3XU6*f7!P5iI&*EC5v!I)rj7K|oB&Ow(eSnk76+zU z?u%V|k?5*lA5|z|c=jxN=LWzUCv{aF6M~Kh&F9muS|;%hgOqd`Intmm_|>aFuFwte z)S5M>RDR%!3I0?|5-Zw0bATG25*{jXd6Qls!DdPs%fIsOj71NV>Ga{a!#;2s9G@jE zzScJpkfM;Zrw^(k=_qFiN?f`|7B70=(L|?9N=@m{obP|Z`BU?pk+H(10{$`YM@2U3 z=pQyO5+w{Ii4DV@tOq!{RRE5rcA(9gpPQ%9;tN_}JR=GeYd#AFV7m5=66wvsr*7Lz zN?w8PTcvkrjY@eky}I-?$sw;Y2kMApxQ+*fWKD~tsd_Bk-35i2ED0?%a28q1?ahl| zO(j`3%g84@lRG<=hInAs^F;W!R)EaYayUe#+*Ca_oju|<>+;LW{U692#opc7$Mday zo~tjB$T6yeO)7%hZ}~=S#_9-!_|d)>LBM}>lqwtcFqR2dO0>u@JII=%;FYDsUG#Kfd)4O z=%~t$U-2W@W|J%T5SG;92WT*$VFR8_HhN!$R3uR%5_v#$%Iy z6A|tB76$vnE}HQa#9xIn(xIhFA6odF>pDlv>#)QN*`pJgOY97?Iq!9Ri28av_#%8I zn)I~Q40)4X{mKpYo)lZ0)?p(_)XJ=)53*&Tdd!_>NM{*S`aiHLNX|lA+JqNbN`th#@jI<^R{e+^PaY?zd8u+hPWJb>upM~yy zj%s|q%WS4VE{2q~-7vp2ouL%FbZ+?*1OnNdZ;{bqFk=;bHT|iWQaLqc$zZTxwm7~O z77@AcH-gKu@F1K25jX~3)vT`nVWnzkzN|FAky^m>aGl;}AD9$f_aW~?;q;x5Lz_*4 z;89`6!v!yQbw7tyx^SN1owc{CyDdijkIWagoCX+{lap2Q4seNL=wQdiw8l z@kNLmw;FNA=ev;^80z3h+%_tWhZr|!oRTR|Bz@`ksjYVkc|fYG!>JrsgM5v@-2G{ zf}EwH4B|`|8CxI6+YxeK+f^By0UOyCkQ7XFoxvQ8g@?v6!Bf-Xcipz%FCFYmo~X;x zOH*dHQ7#pgo>S!XMC)hN%6)FeXAYL^nHse{ST5Pe zAaZz~%h~F>9@H4?th%gP;!wM8Nux_CVy!-|PIOEt;N)E}ysc0BL3%KUb-BO9(!w;q zpV7)+HkPq4Z?>@7u%WtXHl|*qd?0w8O3>FhQ`xgFs#zk#i7eC-&pRlJ;c;=Z7?m0& zZzii+vq`?+yS3`~Tl3SL4XHV3{{9+>57~B~cV=j{88x>02n$u|{yHE3hsU`6+IS7N z5Nlw-#5byHf2oyL;sSa?05h?jKjnDI590a6FdP{vP_>iA=_&B4!(Hnsv1n)t>+^HA z5yrRiZk=yYo#bV9*B=8Wt~GK@AhmPjH6uHGp}9fM)jWI_FK7>Fm~(YskbIJoETH6T zf7g!sfNb99!iO!P7OqULJ3Mz(eW)*=((utISDJdNK6Qk_tmmntD!B-?V&qOA?Z88> z&2S~vz(29Sr|c2#jIv6^#n)Rf;eG1gQZ{b^IUDT4tOH09pOrfZ`W$B3R<*+H>pTd& zJjQkbH{W1#!ArHBPC@V}=v2rHSQDz;I_S8Krb3uHaSxDI{52;F@Btr6b0cvE5Ji?g zYntGO8`;~d1|68|H>Vo|uvfI2NJA?9v6DRUBL!DR5(A1(cJlk8vi%;q`U!E*_Fuhv zWqM(eNb=UiS`oK>M`*u#q&mZU?aV6j@Tr~^^PaH|gB=QK-n#5BCS}Ub zM04(7BXw4NYJ#LGIsEFuDbh&e+rahBIy@a-Swv3wt`^@#YwnH2m8)0JI~g;~#9iAn zQ%3%RD!^-_T{x>tZV!U$XwNkt5D&`am`?-`S$i$zH$E2L8_kEXnroM!sgXKWg8QAT zlm$f#bvz?`6nR?Y5^hZ_`czR&-?*?pqN{%lV_tNVS%0i)6z&|YbQ5u$iDc=m+#wL& zWeSWDtpri2zSmyV*n$uS_%>>SJzje)EqWDOLAHQ79H;(MBpf_->0-cm6$amh4ecUH zvE<#TI1lx%IW@1X+3vAJ$0LuKus#T1IEo?99UV9dN@t?C6ZYS(TF?&204D5T3gt)6 z1jwan=aF%EOnG@?X7wu;B-1_3Fkcq5F@zCXxTB=%_wx_(bJ-NQb`BjJgGmxmT*|~q zrJp0@!T6v>Ub9Aan8bI)*B@c!?oMohVVwR?cm4yK`r|qOh{*o9uOCp|AAjx}PWpcz z#r~16_6=P6{{cY%|AnnRW#3YG+EIzmujFeU~xY zk|6XQ%k*b#15@Rfm#$~+ZI~$N{0v_F+wPr-A-;Axz#MTn(EXjM_(7b%k^{UMeb0F( z#c+6S7kyVKJ1cDC+8uk`h;qt}A3}LZu3oKjalLgJyc5MA;--$2OSForn=|e4-!oDv zaiA@3QC?HEeQ(bo8_J@WVvPAuf>Pu!5Tkzh$e=MO*T9yea=JJ>YvM|VP^0lq1YpxQ zcfv)V-%)Cf7IFKYBw|O&tGmtPwV9eTBwT=|Xek-x^h4LQ>eB<3ciW%jI`aES&G3=g zF`#?<^7N~&6`CWnM&M3vkP{GWM)K$9JqRcmz-&p&KD^AUq}uprB!tUj6Z7WH6>4fd zP~t2pC*D)zcIxG?S7(U}8+9A<_M`StmRy^`@r-!f90=;M`Ae`dVjw778vry9iJ+u2 zIr}f>;spT0xWBW#ZLXrA&^|ssK0mJ@9Cl9Z|6=dGgPKhH{!!P4f`Ebs=@yD0K~#EG zdXe6Ph%|xF6%eV52#6S}^j+-TTlsA+D&|epFpKoXl;N`Uj0Naa;(aHHq9&bOeehgNVff+looy63J^v=fkt|}J{M+Cw7R_-^9%_(c`H!ny zuW?(BX5Q>+>^qnXP+J2Bqhdu9;C!ny5}B7(O>~0faugut79HH&a2b;`1(R2HQ%j*j+eGzhb!mi6&=?y{j==>qp`>gaVqdA9mad`A0AR@dEI4Nv@J(pryeUF17K zDYk7^J(%;V&T2mVc8fJAG?HxMX6Y`zlSbA8Sy4vylTS=388<;1LlQ=mIFap(PZE{Y z*8Ta#=G19)Ku$X!Nd1xpS)7VtuccwnIydP$1L!gDYn!D7M`Y zeEuwKLXRQ@;M$X>Z%czz3qEKgrbnE1D>?!2?i-*~V9s%7LXw$04?8=}<)PW@r9`DCP=Jo@1thN%*xF5KcpH*XT5E(( zYvg`8!C!<~6*rr~yE>POjA*9F$2~!I{6=mr^65+V-19M@6kWJ&!Ire&;$~DdU^dPx zTBSb)iZnL7BO)XuudAX4aI*eH0=P_WEKYTEPBdFG^% z#fTTOKHTrhAdl2d#&l>bc-ZXh#T^t2eHml?R|$}#?1op+jj{USYtyAcNzU-{^NKrg zeP~(h+;MD70?Y(#3rwtumY#^B1WQn))!hE`#6>}(kdE=2%z(twqOzLzQDjqN5-QOM zY2+~u^f^SW4)asxUJI{Rbqd;*yS6&+O@^m`zGI{D?=uA(Rm;nimd4-KedUtm$4+}M z4^l7ItaQhhkCaYc-)MH%=c5&b8a~cKWcisz0FJh}Eh9a>63!wY^q7J}Lf8>cw1ciX zq*eS_&U_9fSU&51megQY20uyO@H5!Dxw$#8$OpBUpr1R6 zK4_)?>Tw^a>gP>cycvY=moFB(qI<76Xef(0<2oKZ*8T89)4Fz1(6(~6v$)0H<6GFq z5)O&AuAOCmD*k;g!nd4xcj`t+;rr2j>%F3dg z0R>oL=QY}X41+wWFm?Ze4>dZ4NG>i1W(l-(bR}oAf%?~s2hwWEfc}yn0s$SM`LvvP zL{?j7^-|lUjrG)Bx`da5F*Q_yEhy^KEjFvo^{L^&^qcy;OCLu-iVDr$XknEeQVSaN z@Le1&xynJaHkSe^bv(Z<7%eInj?Wc<3N}o7hbXCgl<=e}l_;J|TV(FPxm-1S+CDK* z_^InS3P|moL!X3Gbxf!+DzOi4@vUG=NtnE50D{VfPnD%q-ecYmZ+->l4<7+zCGcAl z{OP!vbH_$-Lgk(~pVxPh0AllNH2!PtQn0Tso>mimQSh)6o;xab5Acj}u;qQ^Ntto2 zk$KG@Y67zB4sZw4?(y-5OaU)dIv!uDJcr~#Dp=-iW7=N59?41%oAM338r$s4+v$qR z;XwwraEXRh6+2{S6t8?Z?l-aoVcpTG9vvP1QkGFagqOW0^08Sr$7f=~xGU_+ag{r3 zKOP)F#sGcy0F)Bdav&-s^v7m{4!KDh_0l&u+xTTb!{~J^`whFqQ48vWhQVF*0ajo` zAH&NIBn(yS*Oj+!oYse20Qs(X(p?t0(;vEeSuJph8sO0&e5|BT%Q^3b_y-6CIPzwl z43R1VL?2+smL0MWu5x`G7}+>s8WH6^as&W)g!^2LIx-otc8pG*D7vR_doKy|RJu`x zm_lJ{N*CGNnLgnf;DV3nhkC^k$qY%6+>#!oTZWbu{wo~qll*+SX~Z@fG{3HO5)pd6 z(M@%ikn&<=!K@8t*{vC;aF=u~$rZBrkVCgKtDCSvpw>r4%)+OKVzQ6qm3|u4LE^!-yeOsB;Ejd?I0Hc_C;Y%|t#!dezpHY~u@O3c% z=}but^mOo)%Q@8eu<+|dN%jFi8<`gbD#$BVRGR6`){pH?Q}eic=yxuA&_GH>C)5+hM!D znzHuUqL?ENymig$<&M%b94aDk-IPlXCFk0|eVYNVRPRjs2~E(JN@B{Xh4DV8xYHIT zijdiO$j2%&JAD4_vZnr?4X=fZ-lj)MkwmJLmW^q>&Ja(l{ytEK zV=KTd;RM>5WKWIM=WbhTC$2Ss9$~!U2uA2kVW1=lG_UDoF$LlV4PP?x776&P5lPi; zaHBAba?EiTcTEOqRz@Npv)V>znF~~pm$|IO9bQFHk!M3z2(bM(%(=zX3U;BSHrZe7 zF2~=r!;HsWd7W}Xsp=7p-~}dy{0HUx`(7P+$NG!_g>awB2#&W4z%R<^DtLxJ>B5gx z4ghb3m~0*gPLE4}782Qoopa#jBMUu0M&S(ztJ00PG636fnMg=OJv}ey(qY-|}=RgS;okQpEpmzOQ1U?E(=V_snPg+TSj{ zKA>0Gj44^ivPD8{%%FM!DuuXbsMx;=ArRwn6hKbcA?(7r0I^HR52VLaz0fA}0uUw^ zN@1fFHPi^r#f{!3Q5i0?WfWf#$mDu@8Ua{%D-SqDI2j90o6H}&^o5rMiEbR<5SO}oFU`k3DyC2 z@vFJjf4%n?_mRL>As}}O^@cU@nj}dvy)Wuv{CCPyB(lY&n8F%9_MYbGX|yHUah%2Y z0Z2_nSWRutz~&QtPH%1ZR^U-8DU^$1bBPArxF0D?EKxb z)TrTvlP?kZFWynzr4uvo1n8>)A0(CqaanbhaP8v?VLpoJzTidk$)EIYupYBf>;uFs zyef#*ELx`gPE+k&^PT1Zma-kd5C}akF?;`}^Txf0BlXHEeo{bo+bU+zf6)yWTyaV` zhX-cS>*(T@2#hE)?-I`^Fas3Ia%F>RG?qabN0}2+klRIsFQ3)to;>4;3jOS3<|+9+ zQzKb48vf`CIX%fEmv{^igZo3UhC9hxR{p-5a;7PBgFRw~Sepm4PPC(pHQ++&(Ol9sms}GeNA52H-@v^!GKTJ@W ztZucGf{(8ya47r}x0N7Sq%&EbUrT<;yX*Nlv~o>imn2(dYiptE>Y#d}Ch=x)f<~~l zGf@OE6QLEMWZdsAv5qAVKb929`2E>>PhPg)=QBi*#@xRMh$P*Q)r!iO7=+OWI>&Fc{mpb-qr(n)Vr z&?tN$AmYC{j-caHe|O7-=97SGP?4_+%XlztA#0pChjX0M>qiZE*g;MIId&Ue;*>(h6*hp5R0&(^2F%E9vrU#P*<;1*f2 z-hLcK@28gQaE(#hwiEEUYT-Y=V??~^TC$=w+RdL*|t>$g8y5|6_(}iA{L4DBTWhSQZ^mO?nXA{YPuP`-<4JDD&Dt^IVDqu+M-oKRW8AzYc4+{dKKu{E6pRxg ztO~90P*e*?kQLjqRTZ3WW9V5IwF_mGV*Dg?3S8Ww_W|U7qT8gs8ko&=ED9^<$t#@c z7-yg75xJAeBEown-V|Sa`Z)R|YMp>@&ob`d3wd8{Ax4no6+M}6W|gN4b&g+Mj?CXc zhLzNKhTCih<^8qls}Mnb%=Z=}Cgtr$ZGJ!sfhtGA2gy}eKxK$6tW!N2E_(O0Ijusk z-mts>#YaGe9l>`vNwcBDDJwU_ zVB%&TDhM|<1eN{NRL(oEnA>E+zBg@$?Bw_%cZFdLrmnN+3On2)+Cw?aOM@G4FWXn! zqol%HAmHhMvLnFg_%2!ro9qcz2cRD7|C(WmA`9$6g%j2uazb5 z+TJfcmEdn(%VQ>S)XeBg^cY0*$9$2#5f#SU7js4<###Rq%JjieWc@M~11+t3Iw0Hc z&1g#dGk#DAViJJ|o|yJhOYC>))qd&@ z)o~W!N=9ss^|_`H*VjOy;m*eLM#m8%>(&OyDz{Fjwb>xT=lDi@Ch|IN7bJzeyk3;72#^^lnJX*U&^CNpQOB70oNb+ zR^gs%Gow~3`MuKkIpD)_Pn2NuIj!V8qAo|_Z>KFQi*bxc2k{O$qQ@&_Wkf3=EF5Q} zJ;Zt{kNi1vn>;Cf1Xqhj6wk|oWfQMIqDSZBmg^s8)b}#1NxWoLFZ9Dt`)P4o;Ydob;)8C1pD-eqnUPqAGY%l6bsL}ro1 zdX6OzbgLVjX7N#Fj7RqFr@;qw9WG(@LEW)V35*Yx^GDiw!8Lh;CY&qgJ$|&cd$z(b zB!|^WEokHsaa+Nr^*(2nx;zCepXf;gCw zu87|?gn-7mK^ufC*5g`F@PZY-%>HqM=7h}LJr`2O2VmN@YcQlwJJ@SptDIHfa?sF! zl@3wz<$BjEIhc!W_K8?nA`keAJIJ7$28*!jXvQ z{nol`0iS}-COp}%9IFP!6m}VAs0T!YAKdpBidGj4%DLxh2Z-%{-Kt&l*88`kJPi%r z>9TQD9yjJwRh#U+bXk}b0gM2+;)~bw`0d(Bat16~s*bC0c356U%*i{6^2fPQdgdDl zsu-37Z2HB{tNfeaQN-zafvHrnGFvRx)7ABfpnSZTQ@8PpQ;I0}cZ639FaE)Q`S+eX zz&PTH_rHIB(sko;r;xph8-NkFeu3>odE4(D+uwHN%MNbC24f57`U3ZNyuFosBS7>2 zpB69wiqZg;EmF67^@8^bjrRoj@aTGfIa?yYad-b0KQ@;JKp2>{I@)KQ^-?0329hX8(&({#!En%kk$oSl~As zn_oKCAJ#PgJK^rXTdDm2knaB*n(O})Al?6ma`JyZT9&O(A2XM``Z8zCoA zGBeWZWT=1r#@k~)nhE@#Q$8Cx^_;QPGSJ4KOZlJ7h4w0N6U3Rx-64Kc#lL@(w~wYV z&P;N~X-Htdfxc@;pfwoS2R#0D?(fZeizcVdlqNmxGfmB(Mixn&hmEd}jUuDG9Xs|? zrUtEJ4fa!~s%H06t^Iti5J1N7WQ$)I3msBmX@+LUgPqQ!YS=PY=S zegFh88RtH|fEeCH&n@^tfOKw-6#U0$=sERMP&X$`nj9x;?wnQ-Q%852oIcd8Q7S0u zG`y$u3TkdB4I=hLGAKzMuI>kkJYX;S%_Hr$D$vWLTC-OgD!uk6eHS-?q z)<=$XcYyP1AyYY5(1Fw_D;l$O3t2|O1Dw8e{~|H?ql#ER9ZRpQJ4^b#W5cLK@dK7^vJ8YuGLwi->48-xpiPT#Md{Fe$(Al zUJdh|%wD3WW3{63qO4re9SMMY0T=(vc;*K~FnattA^RD3jRqz73wK zpj@Th=*gu+w{B-YG4^-DHY51cvrCC|Zcu6gdopWx8r4+s1s)+GD^FCu;UvY@){F%* zozy_vn1=pyMb1syAx@zq&V8H4c^&2kd{e~!Ds4k%_ecI5{}SaDaP#qfQJw8aG|Q{< zqbJ%&JQ^x77k+FMf)a4(t>sWgHmng|QYggx`}=!%#^Fum22cC+0qMV!v9oAg)11>u z5)y#9 zhY~KNxE)u)h|>5FyNMM;fNEkz8Xw^@VpOiNR4-(wq2L7p_eoPn(waJ9ES9`@iy!=vbY#j&E z)7{m_mhNtDn6&lX%iT}JZLksd_waYm z;lCzk4Y3i+21)UJ;#n6;N94Z<%Dcv!nsKWDx4zJkk`{D)111yG) zMVw{$CKJE77u=Y*#n}6tR1vNM;?Op$B_rj0;15WldV67Y+pU9WKVfMVAfQaoz@U{r zBEef(*J?s(WaSflSMJ&tqXazgDy_0Wax^NGJBQVHOWCyIPq@*ONzX@7nqY-E0>M67 zfigh=`$ZSalq0ALpZ=u!A7&yC3x`NbYL05%XgqQrAWB`eWq-RFw}bg=?>z>f7SH`k z`xV+-s-kNl6K&rm#Q@%2vn3tTC0a85^*|`VM>G6oqq(uF@jDaq9sjUJWwRmeiSwy8 zV}b%DL<_>)Nl>yl1S!;98aIBz#MuA?9D6LS4-(*SNIg&>@IMx>i{p`%rL>SbO z?1$M_`JH3Pq$DOrq>SLR!S40CR*FmSO=Wcr5D*&{p8yr))9w9?-SPOFz)Frnio~=> z*EFsW3|*7N7ImH8%=rMRC>5-TNTt7{SF90sw3QU@$(icU}qg^+27~QQypC~fN#Z%P&QljHI?I&J!ZmGKYKOr z*n8DPMq#1gTvHldWsaC9&2v0rYCtCS2FxC_7SO2xUb~~*$u85XIYY6u2yAdp_Q7JJO&-&nYwp7B_&9u(VcrC#9(ci58)HXeHJo?3a{Rit0H4Vy6t}6rYn%J{z``KT1X^BB6 zsSpt44Iz>AX3wL9d)zs}-CsrXI{5hvJselbuC!jwJcqKmnq6C{;I#vL=xF+wQu7|; zqypY5;&a3KQr|%44bgigO6MiWfrYl!wXQc=LvINLoIL6izW%s!U27$VKxJhr*Xo!_O5CZTuy5bw^j~q%<~D7E#40yXCaSiI<6m)C ziFxv`hq^|={e!m454Lxoj)fmrVSYCa(!~sI`v4g~1T6P7?8eycZYVT|d-&O>rCv7T z;D4G?rYqoLEUs&%ivn5itBv8j?`HfnaQ zQuVrmW4>xhTvuUpw{3Ij+s*~GkK2~1qnCu!fzT5oqOiK>g*i&J>>YhhmJpn<$>&xU zXLbZ}j2+*r8RWqgz|()NKf7;$`*K3}a~&xYvvBMSKd}ix+v5fZ&9lXpocXv9N(>0S z+;gy1>UL8~k#teU)3Y&sSq_npGUg{c`5$|SgKUGp~q;P0V_1Q29d1?y~Ov z)o&lNs*5D4F`q-+x!8k8p|P7b7(G&DOeIvO+2X#t*R?&}a3D z;OtD8toYs^0hKDb(Gk%x_RRBC6ltCoE(0D4Y&z>XcG=1|L0|Y_oe8O|K!Qk_7Ti3I zy<~n`d->87vqnjLwiAnEfXAp=c556^Yjg_d_s1I|QsZUp$RDSewb#REH0F4m>K3Ay zDbbe>@u=~m?3K*dYMx}*)=HdKUrmwByFB>zoYU7bx<)*|x#D5^Jh!Ow}GtFHaZuMxOWxU#Zx7CU%J0T{YZy$G}AI}jFB zGKo8#uqqzaJvd=?10hu2S$8$#5ZhG0vq5-* zlD-D3v7C}7P{vKlH@m!PUI}E(ptxESsMzLW!~c+JYw$x}@m-+$*Sn~*1Dq8h+SN*L zoJuwOX`9#uMXQERmeap=5?$fQcIuG~GECdmV9_)vuRkC9qt6J~OgVSC&S{XhuEo5Q zO1ctbRjixH@WJh_d`ePT`Uw8~7z!Aj(+!J#FLr6Ad=TDTrRt^O zclTu=GN|daK6k8S+eA40UIB!H{%PrTT07I;`x9}4v^hvd)k006qM{w96$ll^15p;cS-=f@qksebTccvlVo-&Rxi&|u-4sW5+DDVpM$A12xJ zts?PuQu@pUcd?52)cXdwYeF0A3nX165QHI6H{hTdM8)_;vlN%7VSrzn8{(#-q5_LK zUmp%=C|Z>;ROLy9ifIm|`@&50qW6s3sK#!ajo5gQ=Y4=4*KqG;XNdIg&1LjYj58$V z>mO!)LpNnNaom}pJj0eAq7OhP4cBNs55O70O9Uz0>*SD<|M|s|M~v5|2%ci zAJ!3SL8_v~Ne>S-jt^Np!#0;a}V z^8p`fTZU$cb?=*jMA#VJiHYk3(nX(<9cM=_W8nkrF;%e@ClB|&OnY251zd|6Jw`w; zw@55yOuyCk_TKcBGN#U)yiPc53UE>;Xk8yTSRGs1B^JF};2gxS4OsHol*BpXGD>(^ zX##kGroDWZ&4!L?l%WhpWHnA-za=bOQCQS986k+&ulRD05BA9<=e2BMbV=idE6g1x zl|da;Py03}1hE~>n8zO6#@XHB4B;n>#Z#qff+E42(E)`Y`M_N=I#CsWUir;z!#*pa zns5TQ%*!km<_MVHPx6mu0&}C&700MhBn?ct_Z;3N&&Tt|eamuDsYJjVX+Q|}%N;b5 z%6**wldtH6&OI_C1AqJAayWb1htMKo^+{I!go zqx;8Lr~X!`3H*kK1N~e27~ZU+!ur>zST8|-%4AGj<1sB6H0uGp}h~hu*LYIB4 zj;r`N&&OwZ6=Ef`m_63Sq4ql;JIdy#^7sw*odyPKib^awKT|mG=aB$KA}ZPzTVk7* z|FdN?bJaluy3>{%w3Y#`aFc5T3~o!qEB!jXY_C9Hhu9`0yXMf_!<~0<0S>GZF4tKy z2wrIBbP>2m<&zz zVU}AKf%|fu{ecEY`{SkT$y6sEc=2)WXV=L3t`d4$w-sftTK9TfE2a(%QCs53Fbu!x zthFA)7CjO?rVDp+g$LfQuTs6;Uj&T$dQr_kQd>^^EFK_oirab9J_7fx;#p27Fo|z| zT%a*@>RH}HK=Nhs)h`H0o=RAVWL0?TX}f^d*(JEa_IpxSHlx@UO>4KD+W5+?gfcX9 zmBvsvximR{9*ECK6SOQ2npA5vZg?aoZGD)48dF<=-fBLvw+c-bS1&Yl z_9hHbN)klw=H})Uw*c}hqF8S9u<_+uBn;`5P{~n{4@!r#(3&8xw$e_M5a&#bU3G5^ z{7hK*w6O3)zE|Apx8(|xa7s>1OWT$-ZOy34r=PfUxDySpcWA`psr?+|UQmY=<-YiS z?e)WRy4CdIugh@K+w{Tx%{>#WnlFP}%HR(1O;lG;4?y24_bV^CqTF{wSv`-A-4CD` zPS3C+KZ*nweEgUM!I6b0VCk5?(FYWZMn&PWTY>*@WO#wmZuh`s!QJY0Zs596#O>K9 zy8{y~=20N5XlsteFwQFEt{I6rmoI{np(bhzjie1abU_}m*#||##{^KpzUn&o`~+0B zs~~XUl5JY{3D{wWh)QrM@uu~H_jFvR4C6`bF;4;0ah3(@@DOkt#mC6$S6YvqieAc2 zg6BU?*RH29Sj9A6NgJhJ&Iunnp<+V9=ID?n*Ka~q{F1fn;p2+)bREwbdI&w}UbU4P zxN6~Ryt!krB@H9eK4|c2W8pxj#pGCBFVY^R$IR{rUP4%&`1rSqLCWN|2mD`XKz z5&222C+=+@uX$fXtVC0^`Yr)}G;gO8KmH>xA)pdxa;PDfgvSM zna_t)CV$M~Cu`5SqzVqQKMWME%M8#H&l+Uv6`avcF1;dM%L$s6yX?L zkdpu5r1Eq;<5jJ}jq}7`()|+{z~8!gGptdm7)%S>v6@8G=?g^Wl!zjeVBkn=hU`(K z4!Bm5=RO!eUt?T!*Kj)vA+b5*xv-0&R(+DEdEX9Fpm2k$>zD2!hnQ~wjo?tTEI z1Yi&Q_9o{MHdh-y@ibnIW9Lr4E>8iEgWFu;u{)4T0nyQ$N8xB8r?dK9)KdzEH26I~gJ*6ku@bcZ3f1oPeem`b%eVqcA)b?1>JC@Py zZbK538*$z5)khR3dupf}weTKAo&=66xh>v+P(ZEPV)W)I*anwK60}-r=4`<>NoQ=< zRzB6tedFg}EhBnELxX>g)E%0V!>xD$Oh}`YXq!Epwg|QaoQ#G8Ppj8K6k%S?0Yd$7 z3ntIyaVR-6pTnNC|3P56k8KZq>Qh;+OkSBnrVDnfi0M?N=ApUq+@t@%E{WI2hcMr| z`JJ(g=%6SYZ0_F22sj~#8@E~O&s4Gar@d4o_c?7nKc5Kn!8ekCrK95e>479J%apaf z8Oj07qL1Q}+$QH;sV_turmg?Y-uox6`O`f3-@51jl#>2id;ImUfX_pz;m7~ck){0= z*Li5=@w3hUTLZ&^|xJLWQRQvA69`ul75|NE#M!IIrPA_I6QYri8W|IpI@bXit< zapX^cOYLs`E|LEi-D3~yrlJ@;DF`Im0a#7|U>83_{0_r~4&QY)lMgjt*H4^8_E(_d zVNl5%k6TJ0QN?rH-W)37xtH3#T6VB5j@}Kj{z?h8cO#g?x5}fJPeW^K&C+3B6GaE& zsNGKeWQ{g&!wo|B>Zfvh^|m&*+KaFUtFyz{$IS-*Qf)U3QA$vy2ky?6Tfp_$0P6kS zAUYr_d2dq;{;aLY^Ac*e-NGw7s{CNm$S=yD^VzO5b9DU6zfXUpiaq2^xY$mrfc&E@9G z=nA6dKIO@TNLu!!r$fXvQe{F?VBanMA!484Jy)4v-|wjfC0$6B>4Ko=VyR)@Uuy($ zqO$*)r1Bpc*ULM4QE4*;lV|Dx$|XtW69NA9=%-TXAB*Mx1hesfqQn1OTmM9N|G)BR zvF|ApIyXD|X5XqDAarXNB8$|jmj;aD?tw5-_J3F612=~4WPA7FgIJMhBd;w#ng_1? zD2YwqG1aW}Yq|KJ=p#5KezR+j1t3Cyq2Z#jdK-5wV7~x`ZW14McmDk>TOTlMU;nw~ zf)D-f+#dj>emDS1p2zz9`?so`Ng#e55L>9m0#(v~{r|vUA0-q%B`;eVS@znf)G6w; zp8gcs>I9-*|4a5ti%*}q_nLqauA(4vyWK)!r`5U;n!i!K?D;=FwV!(H2QZt%;!rWa zXmrqDZkH^B#}PV;y!U3R#CP6zMUy4~eJ4nJxW&)^h+PQ$BP=Y;}LvF{VJAEWK7inr?Ka}o5w5(qu8xw%Fb_A|n)bnqzhP;jB})uML+pnH1Q7{`5S=g0HK zeN!^ynBwUbbz(*sk+C4knENw68Dub-O-Ls|FGOvh6@-Gr zn;r?n6c#u#53|na^wfu0>LtQ@FW(^ad>9;0GiNmGm5XGsSj9gVHe!tQq)eT=2>8)A zZER<#hO*wtm{Tfypz#+mb^(UNR=HAwkA_*#g|mxvZkk0jq|6{i#X0{<8$e23_>nDn zkJYCSVYIa{V7Kjdn-B?%D@v1hb}hg=Y9`F5b|{}z0k_csePtCD$Vq4}Bi{mu!?J4w z=@_;|dOIvQtrqxv;mq<{E#bPRgPf2wy~-0jurgj5&-!3agy|oFIBd&mIFHI_&3KFn z39U(_L$;s!%4@gaey^2}vfXfoh8IsTA6gXt`sQhp>t^j6+{ym zjXgr*@Y$MV&|FdDUej|D44A6O7CB;Q-{FFG%KjOP0~QEw9ox0EsbU1`ys}PG(oFEkUKM0{Gh$3#qtn@&(mWKR9sWiyAwsn{ z%|$nAFxOnk(aY3)UOn8ZLl4K=uD5(dlCMTJdrK+9{Io&ADhO7I`m#fbhc}Ldw^^F+ zbZ(wiTT^3Vjy$Ym=8&Ve6oI$S+@ZJ5-!nP#xQfx%Hv7TX{U>x7fn@`iz73;2;EjxK z1ug?5ia->RiB6^?E!Nzxe6Z<*>lKpIYNHrx^0JVp&EIx#CvI?PY@`%GuFFJw1;=t zD`}G6$=t8#{EWq{|6FeWkx%h!S@-$ZS#jEKf3Rl@)0m2r88^GoqT<+{h85gW!;(p8 zL0mzv3zs|1t+1b30pBj;?6F+1PnDk=8sAUFsW24}ZW6w%`2)C>rY2F9O!y={XM&aQ zF|`iY1I@K)`8KLDn0~VBuG_Kx^`y%Vy;rR(gJz(joN%vCKlZGjxqMWYkECR8ae42f zBY&;5b`KJjQo!i|S&{ku1cGw^3;TzCvFxpiYgVr^1r_#-!HyMwrRI-o3W{|1QeBFt zL#eDT4_wkOMiKLUCU~{^-#`Tfk3=%s&L!yjj@XWEfpjS+wC&j*Nsq~2^Xq5a#c$xF zY5?cY)X7}H1?jKshx8-H+!o2bHv-J_mh1(m%?0TFY^2&8S5tv0sJiLxF&d!`Jo?H^r=7oDy0A3*ntmEnO&vvFk*n6umw%7S?{B_&>gs64x0am z`ARNJdc_{kJ`3_V1bU7cTK2@Y-(TEQ;DBqx%UM9ljjcq)`Nz zLl!qfUdSTSu`F@D3Vf#wxg2}cCakA1CVfpLMy|n^vr2$9>*mpgQw@IzJPTZUki7}F z4BdT*%8z0@hGdyjT<2Vp>QH^=p#>6WO)KbtH^}h&C&;3%6Ns#vd?iKYvImo(&BFa| z{HT!}d(Pz6vBP|Kh~bsvf1&QHzjm5fsDm$jCVt8?7KNJzy=q3S{KS?k}v0h5iUD?`Wq10Kw(_q} z6jEo^B4*)5_}UkKCPxb>VgZcc0UR5{&)nwc&x+cNV#E@Us5e(|bmhR`w&B*r;wqM4 z4K0x5w}+tD277mX3~mKf5%{wB3?yihx~zp3G>@!aZSA_kfj8+1+P0R9*KKobHXY&B zx~Ok3B~qv*yz1}*ve3B3|0Gb0P$=ucv(5v8R;_r+(_|A98SwxqE|6LE&6p_#XDyL{ z0b1D)K+rvazd$#;I)^TiS@1GHFE3_zc=0-8%F>$LK~ukGMcQn0W8;hci8*G#gLw-H zW)fSV?~Vl0I6bGpvq#hb>r3JQ_o*-SuZYvty7_*0ui7S*0!WWX-BAjWrXo|vND|8& zgA@SS7XhdBfNGFn6Pl~zQ)gxTe*8I^ldWgwu{WOkTHikp)_NZR*g@9}2rJP*<+uET z`!Jm5w|nE?+duZCipa93)S^`c+>u0OUCez2p>rPnCvkB@EXRRAZu*qy<1Zh9as=?4 zs?bNxkNG}2E2tfC7!Pw(RJ00?GBD?n_l{LYK`dusv)fVM_^?Yj2WlWhXt zoA$NebsLPTQV11xYX|xaK7GI*HQe5d{^GmFn&Tn%FVZ2FU|Ebxo=I>TY|FB@0myk* ztt8X~UJD+_xw`~J{IYF*mUuzEkaHLH8T>|S31Ic&94g4uty8>SCs}lIYzaxRvI*lp zbK(2h!6J=7S+W3lOY-NY%$s~#n1p&tbxL{9iL#aMiFOT8cZ(DZAER z?aXbntRR7Y#E%c%VX|j?#S~HeHeD>m7=q7yW~*r$*J+w*1s|&Mbf>y&3vkP)cLs>@ z>i<4kpn4bQ72G5$IDV^g@C^M|P9-d*4O8Ay*u0STMfc4$_#fI((Kv+PMM1*GMv;DL zbCmNJu)vhU|4c+n%Z-5D1CY?1WrZ1c-abGsC1xFCcYdq-tqE2?o+gVPoZY8mp}o6w zB)oYX*r?ETJSyhkjYeAziHL0^l(BiD;1Re@h1bT2ZR9E(q*>@yVpdiXozr$t&vSe6 zFqOOU^~DPB#BT?uWAz!5VEIxPhaTx#EQg&?0g(=KMV@Fnru*o@bZTL}dzO^hC(E0= zTh`$Zfl~?Lc_uIru#bz{y;`3}RPd$!>tqJfm+G(1Mb(q9LLO9G_4yw>X_Dg}<0*IU z6q;q}gT4dh9q|0a*ja@Ggcq=99PELOhBc>1TqFQx8HHA?zuP!FICSeEJo9g?Sjx=+DWW_mBJ#GD=$d(9^NFo+e^3R|*_5EsUTUbB3r z{KhBH-0Jdf_t(@?{B^&r53iq0FP(QfVqC%FSMciOYhYlW29DGkM`l*6V-`i>mk9-1BsC0`ZZ1FJb!+(g>-@YoM!T+%N~ekU#!jde zLbTbS8_+e1D#w)_hJ+A%tZ`+)i78z!1gCSTr2a2Q#T2o@Wp|ypn>hINf$WA|pBk3= zph4uiLh~h;WW|@VTnR4&s1WJRp^~i0OJH8fJ{c;pG_plRL`qY!Uo^DEUywY}5xG$; zg*I=it9QhmYqmgYCk8=>#~pLe#XA-z82Xsq5y_~(*VY)o0#lyBhGnaF-7!k;T&p)P zCK2}1li36Cx@B<-Mi(AOE7xXDsfvoTK=417PYs_{r?j6_-LsV|=CPd|KrK5J z@RsHD8LsMX!4)`_{)uPO#^DX6@m8cmANwWDF1pk>@~2=O>Z0DTY$@_g-GBdu6a@3M zq&I)~aF;Q#gNi~ST$_VI2P*7kP)5!1Cd24vM;b+qMqj%ijN9Ece3@0@{F{*U#ryz` zgBn!P$Rb-!!Ca1YSFz-?47$FnlR_G1SY9IubziceCM2*4!(W4N0CS|tPyv}!2{2=t zDAGgYp=h`7-F<#|fzMm6y(%4rMAUfgS6T4m33L7AN{infWe;*7ZDQV=O~%n%Qzq}v zPP|ZezX%1-r*ewZyu0I4$;}bc^b*u-@j8?(JocNghUmvlj*}XR_ios7`=j(V)-DM3fapV-LtJSZS zE!tWIA&^%t7>S#<*oIu~Va|mdVAU~rs-hky&)XS*!UBJYLDmCu_S3cBUf6Ym1@3Y_ z=ncpw65ksEAt&~UvVhg${z=_&NLgjMYF+-bD-gzMJCb1)hx&@D|E}_W_|6dzXX6tp z!kjyT;>O9ifR8K(m{Gm6RN{N(*XpB8Aqj&eCj*~`?c)SCt?u?&Y5G#`Ei%gX7EafH zz5;M;TH9WS@`ymW?57%8vG1w2E`+{Q?*g2Ur^77N(`!U3fVIaJ!WVbG+bW_(u`AzL z#+1T`ag&Z*1(+v%H3wWmqJ-B^qwB9)$r@*1e!`q{Cx0UURv>9=ZW(0Vto8#a^N?1d z>lM-GT*;)_23$o>L$!jm-Ph5vzwQ-3JKLFZrElLJMJA;sOH(Dv@7}ETgcoVP#n#mr zLOnj)Clgwd_k&KHG#=ZX@`_jT#>%xsEHRb-d3m3T-*jGG5Le$I|01FF)@|U6Mu&d! zrGY{(z#=d3(Tw63-8+-bRlbb2f-DL;nGS>R45p}aT2#7;3zI!*pdE-8)sX7Hj*@cmmpL3KLOAiI6D+}~+QgGmS;m1D! zMWjXaci{N3RiJ*hQd~;|h(dFMOi%X#M|=?1Gqky$)ptWY%=ijV3*HRz& zrJuq2OrVPKx0En+be7V3$B^a9S78=>Ve?texyjjpRKxJwhMMVrtQ}XX47k)-&qUz5 z7a5muUB~srq^v=Ix@o-hR30lsI7^;}pv~ukZ_=1SLARc-xa&ja&5o1LI$j5`!y?a4 zyv%x;96%M4UJDDJMF&WERA+}+)_rNs4}9eD6{PS1e$8n)gNuSqnh$%3Sz{uK3>=9- z=LpR9?ZI3)M7o0tz4ZXn-FYDZrR@!UMvOtKBFUOBQF{jVus;kL$YSj(+$GzHaVZ%Z zMAwRGRj}UQeM-x55Fw@tVA!0y9{_`avcOl?3#|iof0uVZ+OFttmi!R4akC9}ME_RK zWip{j)%AgV{XSyl)I&R@Q_!5_>qi|mnH@5SXM=rXa(+&NuoAP_{ZqVAN%#nPCL=yH zT;J&o{B(e^Mcj)!E{m_{)Yr1C;IDnp2HmWGAJj~V>~06LVD*46q>Tt*Q8Le4GI+jU z|8QfNe?+4g4NH_6P%HiN%%Ht6d^@|=rM#K8MPcTGv!>}(Ln)}qcE{P=S*Hg3nzx6I z2OEqH5Ohr^QH+F_c_F|eAJ1Pzuzv_JHYQeO>$8Bd(UZ>px!tF!;Bdw{W@OaD#PMP~ zHW4g7eMDOrt7%VQEhA6Xf2BYB75!y!Agq?K%mZVOfw9d+0?K22!eY`OE%rf+%} zDcKRKlA}_)c}Fixa-I{N_#Z3pM}LqoKkE*;o0!1VxwCMMMg4sjn!wjvwY(ix*`Agd2q6X^@236Uidphj-d*dIm;@(?19l~C*|yV;l0UY>u6UK<8Y!% z7DWf(@I%)lqR&~|E>1Io&sl%CF0#b&Z;I_HTaV=UBiMnN>vPaL*QzHo!dzfA-X&=W`1MJa;VfOA-vwtp;xpK%A$bl zS{TV83Qubntq#X?sd74jESCibMLbC|%B^pN`tvX*Who6E{U2}XNBeC{k=BJ$`F45C z!*d2_efk<3rNf1$0gs|9dfqwpuxMZj3%~C&g<)hN+QU>Tln_uGOV_LX0jUH$zZ>yD zwW~lIMCWro2k{*WP?if{;lx3CiuW!##GOk8?u~@Xv6>Gc|LxQXscY4ZdnBRHtGDx2 z+^O`$Il)-q{OJD9DGi{{R@58(&d9@G@x>=%F!3H7=-vH@4+;R+3Ho(9%sdVAyZNs< z2d`B{30&pE(|m+4)&jpSQ9p5{!(R7lB->n^WjkO`0eXR*ef?3=g!V$i%I`NkA3l5t zGDJc86>xPJtM#t6m)iJ&cLN_H;Acm)F9e5=Vi}IJb^^m*-#AiaYWfdoP)NN6esL<}gsBc0GoLN7`c=_QoV zM0yFm*SoUa=jY!0@9#Mu?(^JxJ{-UJMYGm=-?`?R?;K-}A!`FM0tAo{wM}eKbTrj! z;s358el+GxA+NRvCx~jF)RjX3&Gv;JAdxtt4rKbG%L~(+%x}t806n<8L_kRJ5Xof$ zxD_YX216=!0A>N8r%*H{MbuW>3))cCKmK_9B8+?gT+Ob%haMYIJ+J(O1}@PX_U}|r zY}5zc2MlqA28e}0IA9$$L^sc2C;+I2VTmSQfGAj+_qJ|ZHlO>=UFK*j-4O2FdcYh$ z4GopDfXqRJvfyQY;brXsYJ{N+Y{qigOqlx>Y$p!}8nTYx*gcJ@#EL3VE zO$^8@fKyL7u#8@ex8Q+U^?=7-?lGY2fIlw|KWYI!YV0Gyc^;lD2V{{n}902zPTfyiDwL!1*! z@`cU(>(lxdF!GmG@2@%(e*t~}+n(rOwaedE^_M5!zlZj@|A}({zh1zN7+yK`{uJI* zH50@Cx_bW@nEqD<{Ywn!$G7#b-6W!&|4NL1HAw%7bNyq>h&Il@e7}E~KmU4P{s~z9 zBUFeI-Tz69?c(QE1&sGsqD&9c(~1gBc51t_TzVf7wReAoRm6mRT1e-aIDQ*)Jk~bg zbsHkU>!vwpDpeo_N!ldBTzzYz5KKhOLMw+3M}2>z=rs!uu=yP1EDs*3#Uz zA%4qNz*nvqZK6NhZ~4b{qFqKp@BF+?FEfDbl^^6TEwMR59j=P<#r|@Uf&LV$7*rBg zT+C$ZGszXU(~Na(je+YJJQCK=1Jn=)ii(QTyqf{=XK8Qmd9SE0=(MK|zzG>zoHw8R zrW%y-OH>T-04u0Dx?Z9hmunUEfGD`vH0s3#np86 z{_C#+ZEm1{7U9igif$*umTo%RD`v64K*<1NR|<3+u#FWsmnrwZn$-V@6sr}IOa!Da z$M;aTz8KeLvY(PBw;gAFqERgt)DHQf6e$QOMfye<5tSn4$*z6@nx6kqifmW^yHaFI z)DNY|#cE6yhqahyf>y6)`T{_-&fv_U$XRdTw0(#6JKn(ofarWiaRJNY;IH{+UO~|p z205@(MJKI(#!gk-)6)s++^Q69gpCY6KKyxu`_(OVLDTug&W2j#nP@%iRz!aIYi6E z59}_$=!@%O>a(C%G8fb2FEPo+MGp8Ja!ax=q2&Rcy{|xUm1rwx3n3}xj~iSKE>_W) z;L0VoFl!p99z8{ApneErk`Je z0|VMi-2^Jci66)Sd44cWz;6>_gsVD?n_GM+Z#|4xRnFH(`v(3 zV@NWIu_bb>r$fWAX}m$Uu68pGqR+P;19--*UgF9}c4tYpy3!IF%aG_M^HR}nji8}o zrqaqLPh|M*2Vg>k5pFt{57rw2^x&7jzgF}M$PHSI|K*EA?1gRR*=C%}4DpfxJOXxi zd|5)%u81Ndfz5#|?HstA8rvL=i5yjfvW5DA>Gd>!?}e}K0nN?NViazw4%LXVarxK+ zQJ3~Itg+&aHqT2eP`+blYLjkBp^Z9;y5Yj zIv5_tJ{x4O(;48qnVn!fE-1P5KE4SZ-C?qq@KQ_Rmsn}c;e_J`iz8yf`g^lf?V4$V zZ-bP?YN`~qPuYU|#M)+#)P5iIk}2AH>|~ejM9N|1a4?y}OJSlQX^@4%nwR|U_vfwl z+)67UXycbcj$cU_Bal3b7O+)d0RS36H84=fgkAkyl57c>8xL`Wqpb9UQDLv4$r9rt zNuBoOh+vpK526@kF(=;+;160ZB12s40uc+{>_S zbf(j{wB8vq-N&Sms5YPHttr2Q?F{X`+TmKXtGFcyA-3m)6G$%|{9@6LyVr4$Uj{6I zZ)xROs}eKXawMm+`LaLPF$$ao$c^GZK>+bEO{tGU59obC@!ROzjv7I<&I2vkj$&#Cg#_~M=5Otx5gqrCEO3_X0uQKBw->ewoEDcYL zW)LugQ2V~4md!qQhr(fBLI}%q_wW!u7`H1R=y3s01PEr z4qea|O(5hy#3HW{Z1kggR<4nAr39gIM;Z5cs=k#PtuD({aTd4V>6{Mjb)^M^YL&DM zfB8uThUw8h$JHmgUdyW{KfVz-1l|(lX3;Y}U5PKCMgj8LhT8B;^-#ZW3Mi+p@_Q9? z&7sMFh!&^%+h<&?^szag(BmScv%n2KdsO)Zpgc@gZ3943_W9@Qtp?fQ@wHzm*^Jic zNx1k%EG(&XM!D`V`2%)qS|h&<1}#QW^j9lYmk42Wy~Mo(!{@t?|5T|86>an}yB%EI zZ&nO1QN7XV99teTCdKZ;EQ%KTphKw5e*y%c8eEHo$$Hd0y{BJNSeQ2CsR%@WnTA0d zerqvz{oxc5^15=J5oT zwhObe5$0O%5brVlg$n%dYcxv}gk0wXH08%Jtqkyc)*Zqm;xU%}Z1#Gfc zPbVpmGPT=r8<3a*?_4d(ALocNavspP_OKO+83|DWvpW_CXxDB6{~SP-LV4OFJoYfg zeoMYrH}2GvFvV@NwNa;vZLYCHQk%TtEBlNqLP3T#-}<=BkNz?)Wk+UF86L>b~f@ ztboeuw>8;hkXWhhji8-TNZ;uiW*!A@t=BMfJ*38?$rUQc1 zHl6QbmzJ;BWSx?K`t9sgVpsulhORRax{^Q~flrS%y}f+mftK+TT@49^{>8IaUHB}E2%n`^lv=Q{q|O<@6*3U-htBmB7S zB<`e+&fYf>=fQFuW2r}U+xiP=63AVTIH)K6xbw`$TIF;l*!wp6YCrM1-hNBT)1gvc?qzEdNa@Jp@2p$OLdxu5>@6diJ18DJ`>%ww%{YCse z@tb&_y3*J|d;da8G3SZ*MN{vZNYQ>&0oEZ^4p}|C1E!=;=b~8xndHaw&D@S^H4d8# z9pyu%%=)u}zVY;h${XUEirOM3`l#8vtc~GSl`(|Em!McyEL)nF-@7u|u@2vpd})YW7r|4C|)6GYM|rTGmLl>Ms;7IJRc>X%^me zQ0mI>Htm=42pt4Zyq3^dXS12J4SCf($lFTIX?MNjnggs5U1Y@!W{U1?Qq}ifPI}m$ zDCHDzwCs!wDS#E9ZJ_6%8%`v_>yn$fZx6m0PYu2xs1z1r=a-{CvickRJVO@`wEtV} z{hI8cj}}>kd)U~Uj{|=8N*BsMEriDTilwO#>Dl|lS{;}vBx6DEA-s23-yjAgqt-(B z0G2A;fZ%ep*(GHfx4e1vQqq^9y~W%-a~9<5t{L1$FurUbNx5@&z`b^piNc&kS#jRN z^Lnoi;Tq+`W2~p>yZD2gkb=j`45081#^6TDnBG^rU*JXLDYQ%_gp}0c$igUE3^eJ= zd5_ctw;L@PsylCoFQP(p+Sa4Rg!7tN?n1OZ1C3i9rwy*~4Pj9%<~?CXs8|HFTbaMe zHs$<;*R6zC!bl5hFxqh;)CrKje~ZX&O0+U~fAq?3q_pE;4}nV5bxLJ&JbGPpHjHZ9 z^-S%3J_ts;=atRv3CCNWl3abmt^QMGeQF19jIBNIv$LExNIeeg;a|5gpUYaxRgrHi zMXwtjgHgPFdP%VY6VORFCUIOgv@IBl7?g>f_ zO&jS${6*n}Rn0BON4;66m+>Z=egmD4d~x}d2HmcBgAwPz*<#~s_%z9#Ge}ZpJ_D>Z zvZ&ed18jPFXi@#Nz7sy|o&KP;?p#mB$d`kh9t=Y%QGJ86wBWU5X@M{V6#N`U2lR^p zWhrZ*nZcKJ&xpma`+UDCqo7@}F@sc9W2r$EjQh~xYsST6pydn=JOv>=GH0VDC*s{M zhI~wLxL^F*S8~U)RC7Rw2|iTzIioq&Yk6z%;Pob|#bLHCr2+wj8P0Y6#bQPnS=6nY z@cGndwndakhOVI_ww$_ayO%N{76vSQ%13qQ%uGgj_PfvkOoY#tptqxA)XbSAbCvv= zz&pv}`N!6MTOicHOp==qku(KB0m~1&E+h^9R)F@t80yt*$pURmvKg`#f|hB+-b(RF zz?Y*Bk|Mp|-8f+ENS9pCWM1sv6UDKvviQCUE9_g3fDpxbfh18klufe|8ehyG3#e=v zGPCCFEdK>tv|G)Muw2*bpf9?N<)yCD#)L$ zb!KqFAElrZw@0UlUZ+z>Okk%K}$$@mMPJ#keZ#i_gu zKD9@OMxdJ!LV*8f+7U0iq$;W)(vctFA{DCiW@XxV(OzTmrFb#+yiF$+a zdr1+-No(zp+%?%o%B~@t{SkYSB8N}8pCj;-tsFQRAKLZvn3L918Bm4pC|6`sEvoz5 zFbBTL>e65%b2#Uz3exW~$y<<;4X^lwku#YA?)P=K(x3u3-%=Llrc@Cqp=0Q2-@8~Z zn(sMK1veenkx1j|y)W2Y$=+{d?R$I8nNJ6~#UH~jx26d{9Sya)YazP+Tmx82`EXmwzdKa zvybt2pr46N7UJx#q^ZrChsslySL|0i$)TqT#-=fFJS4M;1U+Z#9cf>)}`3Xzc+*lXLvoLfm>qJoct3eV7nbJJdyOXy)r_%+Nz>{+@TI;jU!nZRWb7;-jsbEf)%Qli^bp z%VO+mX`I6(G>MGx_h$K)wybWC@*OuE%T8Wnt}=LiXDP8z<&WZjdLOC6kng+U7@el> z*GOd}Lnoc!olePk*Eh|zNvNE!>w6u0Q9bolm28#f{7fsmwF&xd0dXx0x(6q(jqT`+ z^-R0iqrT`&amgn?7a&&;^{@~FyS-8KZMKfGd9a|lI1%pFsm2a**zgL|v^jE^IJtA( ztK_vJJtH*?R99e=TzpiDSBmzVv2l!_5g#BgCREC z4cxSpH2mm*j-9Dk2 zIyqde+xW`UC3WhB`Uqe8Hu6?dq=?Ft40JMWV@RN5>df|*j@))wb9(F}7Aiz*5}$T& zyovvjB*Zzm%WxXXoXEA9aPLv0tk0ym zt?Bvh3+yZChO9xpNG~x+&g9eO7qADBm-A<)H6Hcq4RM)u%}t+E@-ib_BuDxx4VX&6 zv_qaA?OTY)+GsKhM$^xU=^Xlw+G^7kj)&zX9-S=?=%VDE;1*-Xw$D-bQa*H9NLCE> zGn%|Nq6j>lTi=UPgXixRQ}Y(hxR0zu)jsgV%WZu^dJ{rvp|hX!MC4>LKiaplT`wU` zAIFvEWL9|9a5~r>NpWoF>-p6zPgwc2b4ndsow#HIHyC~Z2%q_WTugAdC5f~;0b4XI z-uPZ3Od;H1LmOf|Y7?R*>2PwU2~b>5|J-(gg0UdBzWL+&yFBq?MT?q-+uKQfmO!-z z=lz+ZfzjS7=I6U%UGENA#dk-0TIvpy4Sj_JV{@&p5>2h9rl-^VnTTZV)bn{z)`ekp z&|SyYp`jt8baO!E@WK828da526_l(VN@87#K+UI34RoGF{^V4D1jy@wyNW_uUm1J~`Op3lVjjDIRsI;jYZ1WJm93D!3_aHmCIUF=#tUF}*fz98Es z-*QNnxZ6@ zzn}hQ1O}x@Z;sy{oXVFJqcgUE)^_5fql`MpPK=b)t5;Pq&yw?>n^=7iE*Wbr9S zAlh(}rUJo|5!ajMkZ##TG@k1vfW*dhU{ZvpLD@A|_Vo>B1X??$~2&$}eulO^+t{w=9 zlAfYplCW%z7Br!_BmS=V^nr?wikU^rPl_R6_^=hT8oxd*IF&uJYwA2jb+QMjZQ`7~ z4!?1QX0>M9eZv5FRv1XpITc3~4ovTZ0_v8PlrGmq7jEg5VgQ)U@)OWkUmY&tvX9B> zHHy6lNvljIo;=Q;SKYY-7fce!3PBtwsZ6PvOzROm*HpplbmXB<8`8j_0fJ?irnoEc zyC}5TqD@T!*atR6hAHDkl~|03U~VL+m`?=KY{qBwPLoWL^XnWRK;xq|eL2hF3GvE< z@|%V-0H+!Wx5&&U;lF>cE zB}-bqL2x1G+_mGD&nM4nzMU7a;f#M@|Cvzq#G)8WP|eUf_vxSfpI&Xn;NPCKc{>2r}94sYYPw;~=-^(p2j1~SI&Cxv>wrQeNRU*4cZ zsWoQ#RRTsavHK$04sWNqK`!jql4S17kW`uv z$!pHng)gA2?PflxFl;tNH~FfDX=@G*75$_T;;)Dj5Z}gP_jZn>h8F#ePvvs}wTDny z6`f}!nJ-_Wcds)g@?9Ue3An;IXv%%or~zgK@x)wvo<=nAxXyek#F&gD$^8a4{5W?9 zi9J=QE1=mfirgz1q@QWAO8Ua3*dt6GeAMnLLBQ|4AwZd>935oP@!ouIfvPw&oZPA?`v zj?|i)?`)ffMysf=MqBK7?L<7Tc?d$%J+S9pzB_e2&PiaY`d@>=bF;Y9754Sj>|ZgZZv#O4CoHuxuB0T>2bco|Ta8(8PKyM#IVs}@@P%rce| zNz|NUhiPcji2{z3v%rCCd1QyvR>~e@zQ2(c0tH-S(VLrn=c=05*MVELCR>++*-@>}ig3^A z5|GB@j&~ys8!N)GkA`~qwVc1=8CV?6n^Unfdwu+#d*9Wf{-Wb1K^I=Nut0N)KDU&I z8j0NT;vZg4Ru4$l2H~L=kzZ}}j<+*n>q!QRnKQ~Wn@HBfx($dSgW_Fxon(G!Qgr3vt07CrR&HFX6WzGXPQ3 zYXsejh)s)2aG3I)YJDg6R6@~<9k_YnZ zYl(C2JHCmn;-?imc+Z4m1iUtBoyB??G-%|~fgKnJSNbg1z(TG?E}4dJ zOQ1p&PerY;&&?-PuAR7RNddx}p_$K;LnTU`pBY>D=xokG8_G1xY{(c7bshzX{k{w! z0%yK#@j6x>1hWZ@oQ$lVPMq%Qi!iSpCz<3#Qo+EYsMy?WV1BObv5HFGO=fsbuTq_> z{n9`lAVayYQxwv4cTpHXi~Qnmgf*V%K*P&z#)M&bo4{Z_tuXuiIw*#gAQK`-no)sSF9L?9vgHHAWNRN8lJTXO2|x%7_qr&I(c1VpPgH7XzWmPTGzQLAazLHC;y z404*wVPX>CwIdq!&2$+rt+6Ar_~~Hqif9^KK+iV{=OeD@o5wLuV)?eD2Fi3tF9TAm0gNbL;}2QuNNSc0AcfJT1XZb+b`h z+gBA%xw&Xo(T;WS4$i9vQI7g!9}awj(?AuuEWif$H><8LTA0aK3M{3r;}miqw!+M} zo!B1XZQQHuB%y;}gguV2o!@EG9rXq~DDNivR&~$p-hvI9C3B9i_Hi?|9N1vGQv>6? z?|9NeboLcXxE_mNhhJi^QNEG%8e8#Lt(jjM@y))7xeN@JI>>2$Zq8U6{;os1*Dw+| z%{&$eL$L_Fh3B=DW_y_$XsN|zXJrnp*gbU1r_lU3eGaXj(~GS^$N*BEpLO)r%7U~e zucGT18e~+)J5|)M=|d^VAWg@ z>K+;T+50(Xd%({z4O4hqgwhpvx90}j$!qynF4ROK7%rDlT<`b zqt5Wu=xBa|t=+7#kgl^g?9+3m?N2*4wsH*_K^cYjv`^l}Zbo!4!X7fpmc%xUpbdqP zC~uy$hfG)C#DKM|WCApPJL_t9=SHwo1gV37uHb~i_24P(olBWZs|G88)F%#bdc9wq z4!7y6kUKC-z?grzYG_`3&5(DHK4-JZRahqMWgk%gHY;+4Iphyl(vo)pc3tK{N`BKQ z$nckKN^!pJm~6!oo;dk;UdxzAM>bJP$9eapQp#W1mSxp{q=}ris zU#3LzW{pWJuTBkR7rqDJhJdkyJEM!i_(5Nse|)V+c9Yl5?J`D<14f6ctb6uZaDoiD zSR2_{Fm|`N6Or4otw&YAc+2U2iZ{edL z$W+|y6p#zaGWM=_X4}E=dd=EoJ&#$on;vtmw7b7p2n_I8sp?9sw+Gc+*`PK&(YR0R z2hr9`RDT}R8O9Hl&J$Yb~B(<|G0zHL{eE!N)M zKTl9a;g$8WdR~;8DpFO;*0@{;qK&`q)x!Fs1ESg>UCxk0CBIi+JIJK1G&*hs+r}8@ zLD!MqV$0Zkf*&=Z+o@NtVqSWg=LW=F&z<4ac_(qk#lC4E@Ib2Z)v8E??AnA%IiN@@ zlM(AbYX*q_p7|qV(Bg-kKmNEc9AILKXYaf=sJDDvCL*DiXwY=2Vi`N~} z&nV_;O){DZ{1Cyw!EaFJ74NkP0OI;0aiO>jl|FZXaNQm;@Ya@>cf>+6TopgvPFi99 zZMrkLGm)Wh7_T*z^0hc!REt;nw<({cgj>*Btv4araUn0M#WG_IwdP-+$Bv-Q&YtPE zk8DMr{}}Z14z2D2bl2~A2g;@)$QT~$6mgypqKvm^RjRqmsgrm^AFcj9#jUNSRYYx< zS(!2W-m#8^a+8wer8Mk!2J*Jq_f*daJ9?Wv7T89tj2AihNVze z1>xqde@|V!82=uqKQGm6x#Hta?~;I+p1SVrreDRxT~V9fQklnK>zFWXZ|4N)hqlseYo|a^U}f- z($`GH^boT`s@k_8BLSm|&()!%Qo{{pdhkx(U}PLIXsoTvHzU(1XxK8t2mnLFQG>&| z%Oq<1)+N2gS-I6A5tV^VZk-1jMUGU9$;v0_7BBXFmNw_VXU>Nmau%r6@i5dy_vYMx4xc1I$A&qk>#D zMY|HLs$`mcV9<7Ncy-PAi&#HAU_}dLpN%A0=V!_N06EdNOF0#tY3rK4pA}-Ygol+L zFd8nu`JVFCDskry@43u<6IRLW;7^zCoXfQD^%xkIoPPiCQQVm`H?&xp7GD$ss!L~n z@B92|VJ4vNOS%dj?6^as4o|;h#7-4I?l`boX*Q<=`DXdy@yUn`1oRHZ>!j#wtO%%Q zG)4{p!81KQ-PqXJo6PEVJE=6nJICaR>@(uoT-s5|6S%AkdAwcy`r(o5Df3a+qd z6Ez;roN;~hvz%}R)L4zT(ob*pWhmF~yu+EEU~N~uHVM1=1-f(NTbF^tSZx1+eftIj z{cy3{tnIqFvE%3cod`r}`SYG03ln9f2X_CRNW$3o9eV|d!U7Q8utd91r#Fo z?m9b8Jcmn^d4<5<=48UYAJ{tC&2oLrjZ+O`ZlvVyU@f)rU+nYxHtk=$x*Oz)>Akr@ zvH5e`fSdgz;AezBwkF9OOkk+hUM(in9fz2n)EPzh7tXGEBWPcL0ahX(7?01$$mk8( z$jv>@4#RVCa$;HmCxT~kkSo^?ZGLmR!pIFTOk>a2wmxisGM*XpNwG>Zh={at8DlX! z>a2OaIz>g*->2mQGANp61&ZRl-zx*;7q?}6!FHhMAPL{>A$Bu9G5^B{K4{M@^xd(= zMQiI;or<%098z-qUg%#hG2q)+Gxv3(%I?s?_Z!dYXQU#9EpFCSYSCAG5H(O3Nl5{4 zj|}|HfUxTSE;(-@(bC*(&Yh|vFJIai!lMsSA8C%4_wEh(0|LAG`4uh5plc}8BvxZ6 z|1-?=U`dkOvIuqfNXG+$5KHmTlyNESVhs$I3+by7VgV>aqRuv`u zK_^flMtD1cXgb|(vCla!CF%qVJgP8NPRTm?FFOGOb^^Md+$ObtS{|=Re8eP2{7V6k z{UD>$;|k(VBLUYt1^Lo)Z5o`^uh$7k7CKz<@NW~ovr>&&ka?2RKq^4+Pdx9Jo4>{B zSS&V)A(=QyKHbZ13aEqwBBJWZy{yXp>!LLWxB|&t?qLf>n!EwVev?8`gs!U)kOx9W>Xd%yRsk@z{PkMnn4U(d)d9ZjNRQ=mnh5QQ5 zHmm2kq2Vu5!B1`HdXx(SmWBM0olBk6<%-6VJEcoGVfxy>iC%FLC$yX&Hjgj$x%}#u zF2+|Xf(flYU`=cHvI)|KPh26WZ#@rHEu@(u% zji1GHWE5%4iJThI$}M3N5U$WXI}_YwSgEMTSGYj z%i%3uFl?6Y{zmHEh+2BJ65PtxABGS^k)l~heXPd`!9>`u^^()_NAoioEtRzPE}+@n zYNJ#>=&JBX|6=9b4^x_QC2n(H#g?QGZgxK&o#{4@N@8Cu7(*iIofOO}-V9`iFnKB| z#G2%0M=1(PfQ?fsDvXD+HkFQMy@N!+(Bb#>TANXn8y8HdH_NO2New8<+`oU1?n zYmKGs;afU&rcuu~2Q65!ODk)dPMxvQ3H--c#SFiB>B$JPHjqbZb8E<0u#mO`!s%0} z@}1b|MD_vcQN>bejo3f*bkn9ebZXfkqLZN(4zuY@w2RfuW0qtKvCVT4^Tm~!I)ZF1 ztu}^?jd-?g-6~ZXy~Mmp{_igLc?YLa2K`TB{U~mzVdeQf2tzs$7J@`l_P9nbC4+w4 zYqwVVZq|8eaT2k&N0%lpGs;$VGh?emKN8^qimtOghc(p2Y>m_?IO9LQ7WyQ zsCiVcea$dQ)gMq@WrUL)Tb8=o4Oo_>IUk;VYrZF}v6O;baM=X9pCDV+7;CAQn0zTq zg13L@DiSHb9BGRXHF)e0f%oV$U9zxNP|hKM&2 zNHw!aMLqF}z}a{PdfS;V+<|Vyyr)Vb9gvp5T~jC&e44|cvrJ#LfFt5wyaY~ajN6-1 zM6h_fs6`mJ)p`fcU~FL-H@NepnjFk%@GOYap+7}6b!c+v@$$=|FVLQE3y=HFne0|m zuJ&hjCbzU>b*kLnbiFM^%wEAL`A%gkosNn+U8#~^uw>5%!MS^xAoqMrv&Is0*0*gl z@ugn{aymnW)vFTJmU!ViTe@8A`M56#JI0;5pH;yRo-47)*c5Z@{SKU^`wm6t2JLIZ zCj_rmtzV^uE{`i9s0U!SY&mKO<(c=>CZ$du8c=aiW z#}_`C^BjpaYgO>^M^UyU%w2;oiz%CV%wB7Z%S&nU`eQIlF0kut0xc8TpqJ;Fu3#NF zaz%NW*|Zuo8pfq4=A*S5NU*srVpbJ)+pI#qB{A`nGXr1Zm7=~l=8p-jp-VSJ6qAbJ zNm}*JR~aAF$lF^=bekg(c@N_qC0|YJ>IW^5f92#Yy}g*)&DpcaMs?q<&L_8 zUhgKeso>GavWH(YV{12U)cfs&gfk43OzsbG)qG6>bf?U%L7hrUl-(KOEXcG?OdDND zQwB{Y%*bLtM@<4`rI*!kfwv;uoHQ}fvS>J?uOzbYNdTcUVJItx2_$Hy&H}qZ3l*{x z6d)AdEz#Rh>T0?-HOj6kAS^8CEJp9S`-RJNRYNMey-fu z_wZ$}j41769ILm#Aq!(>L|MnLKODY5x_DblX6H`Oq+DlKK;+y?Z{8XRhM9N%h(&x{7JG(WL&(G$!(B(5L&d~LTziuxnp9aJoo3d=8It8 zXB`6QTZ$e!dVft?n-Pj_#^Tw%#uZ{P6E7EByHOQg(cI-+NuFo3LHt9-xxL}k%Ovy3lv}LYm}>TxE!v)(vGfb~fq! z+)&v48lc0?<1(!i{CkT=zL^x?-7>HU z>iW&LpWM`?56EFvOJnclyZssXc)M;!q2dd!cj)tpU0;M8qFQ+D)yd`xBKJZA)w1Iy zx?l|Ws6_4sl{p!tOQ|0jIcPwI1aCgcZk)IvTFra(uV1o>J>glkN#HhfSQBs`z{c|N&W1Hnwy=JyOBC4>3V#2`C zV`RDFm&sDZvABx0&C2KNt?Le0n(=Q}KpADKxp4+|E-eT1FAvJA9u;S7MNMlmNR6RK z?``_sB)2~8lpYNdn|Df+vlXebHOh7k5r8q z@^8e!^=xDX_}yqJQgRAlpr@4;_&&KXVOscm1VO#wgPdk>O2S$9$TZ7A^AK_Yb9`1E zBKHK^K6A`An5EdPn^UX{nVDEQ}ET+MkPIYN2N-i6#JOPy7{1eA67E=v)%V& z9)s8y>)8F&IyT@$=HU2dEc+t)c2)XU_e@P|cSEIfH;Av+&{+Idu%aO8^qGO|cv6!Mlzkb^g;0;1NuyIl$ zJiLpzzqG7hg)R$v9+AFwD+A@?!wC?J-wr7Yj1R%G0LgwfbWa|Zaec)tFY)m+bEzMGCY7a2;l;VSq0^2*c?T`GqRQ$61E?jOa0ac{> zQwuL}-VgZ4!cSL+m`F!<7}9E-K%swI`Pll+)yf&ez#8}AZ%98;WWW{BW)~`~>uZK3 zY5`wy{P4+hr9OKk6IsXPe_QW~PpvB|;S-P1?x!-S^?^Wj<<{dTkl73GkFA@`Si>ex zIx~|cDR#}5C7lJ!tZr7_%j;-xma%>+z0pSCSf+Gt@K~H5JsbH%4Mk6DRW2_9kGfOC zW;L2ZV*(!RfKLaHT?pyAC$Vx8)|hzB-aOWSX@EU0x$0r2g_@e&C8k(m_bxGaSvY4y z{X0yLJGMt)bp)9@(S}+93*Y&|U~6&U zQa`@iK%v2yCXsMs$$#cS4O}*8Ut3j8W^z2C{-NXOb>7Ux6}`sJY^#X;goYA1vNGqf zt@5KhkoLl#D=##X05VJd;NUgIIN4+OqYeMJsGsX&7`x%*6mBMd`d z8TP)!Q*CCq{vH1l#DlLhyO{v|!m?OQ>qg!t=iU)pL1F`TF2Oe6=-QfAOz9bI%$1X9 zaPHeke!LmgD*s5JW^5y@aJ114Bi$P&0JpbDlA%x#hEoy@rh8%;#y%TZEbBkN3cOaO zi-N2$*Df+o6_AGt=#`i)rcnH$MfRBeVKcV0?>UdD-NwScdyt0cDJCvm2XQ~MOB>WY z=MVm)3PxZ^t!FD`V!=M>E>wDvGXzMZZ%W)&45HYMTPghxvWpR!_%hjPDbZGWmM zmkq*m^Y+su`VOiDg{t0{y0nkgN!qH(S-bM14gk{@r4IalZLo84_*SVlVyDrK$Jf?P zLHDl>i#rL}eS4iJwl#iBsuL&3+fMrfw)-)qMg(!IDdU&n4X@6V>)?E3{_rJqKGHMR ztWvvwtbDop5CEY>~p_|d4^`eSK z%oY;DpU>$ULhi@DVEQ1dHd-z#J0@ z-9imwBeiye``QB**z%xxhPj=`j~KW0s)7Y>p*Z0XJ4Xt=k*pW;-J-x^bMcoK5Dad@Pe80+mN9!G3PvYhE_?%y%yHz!{7`nI@2H)GK42rZ7Pjea# zmfQQQV0qdLFPcG%m9~S>z%EixlM1?GcyhDoNViyAA_@G7m=~jx1(e!wq&>JlD{|wK zvd^+`ILc19&&vF`$@s&cQKF=&O-f;3Rhq*I)D#`>jD{4b2h?pag+``=Ro$bQ8%fO! z4}8fWfBTNb(ZUkpr3Ci!Jcg65xcY}rf+RjScIc3%bZq-S4SL`PZ!s6*$#b^Nku+>< z4&1z#Z@6!mLyI*9v!*0|KapE9WM%rQ7pj%`AY%6t7-;C8x&LFl4QTe-n~teI<*u>1(-__N8nn+9XxD9MH%a^9{X$x|!6B7@g)5?wH`u zB8Zv9hF3jCpt4+A1!bAO-{~dc!=uS_;%bA}-(cJmZZWA(`lC4&XyeR$vhzxI(j^vO zPU}{z-I_(YJm*XUG%v%hf=SlpGD)F5jdu4kVb}lNJ^k_-NEWst5y&f z*03{bK_s7H zbAU|`5#4@0D>Y*IKi7(=21A5NIv|p;(0^~!4=07c!973wcmER;{LfKP>`w=vj}L!V zutZ2*nd-3b^h6|})_(uMdWN-!a}e(%9)X)DnRJyDcit|}{TgQy0VGnC zP3~5od=#>NJ9CaJ2Q}fZJWB}?+Z zz^vSkV*6Wj6?W)CqiQWZYwz&(z?6fsU*GSCKNl$c$UaP`#=WmZ$LM4^OwD&(pT&DJ zKytT*v2Ons-Tey0nBhqy;T3R6BG@%(`EBbNF$;UMjVcrWzRz?i-hYr~S|&r!z-`Zz zHcdg{XeJ3Zv?CKG*o5EfpsP5c0r}dlr=)V(0tlpj+d!V-Hne|YsKq47sVIr(Pw<`y z)NKYIn_dV0{(bP|)54x+;;Ia1j*Eln8nC3hy}Cy+OGyLzEO~JcYFylA1O^PngfMPP z1IATwq{Ud7S_pup@tU||mWC7F3I^VLSW}#Mu!KjS6m0EV0dOb4K8xOAb-e$>KZ|(V zm*4G>s`BvrmIlS|$bLd#^68=F`L5>5Lp}mqwNN zm>2+C4Ykx)i0fQ;#l#kM($g38MYi2@vK|Z$4Mp>Z*)GctYbQoWNBh(h@ad#*P@90* zOJEj?cs<}xyDbb*K0yp6(Vigs)(-r>N{xi;)T|DGm%mum={eZhJ#G+jcU&CCT*Lq2Xz-?F!{E^Y)byte8?6^V)ESCL-Ds84}^`oa+} zGK&=^Rc)zVui%Fki!GMF>f%ap8;Ic^%o6)9aM~`XqT}G%#Zr-o#M%=Kn1%pNI`>+! z0_Zm(KpO@y*DxG4$Vq?r(7^U3{Yy>89NRfTz(Eoi?C`KK_)YasdlKR`?iOGlI3mV2 z{EYk45UUy1753RV`3L=guPDeb&Y`k3PXnNa1R3Ge4oq3>7nSz`s1sz@Fripn+$G+$ zD$!R8jEwA;5?A%S+mTnc>2Cv@&Dn+=qAZNrr>T ze+x+9Nk4tEarw5jLrz|+wu+&WY;glGxG7^+iBG$bS@3+xaN_$ww&YfY6kvP0SZzxQ zAKNGn5z+s>zmQfy3}1iwn2CvLOpLk#;7O(jHf5+V;%p#F%c(oWHO9QL8O%3E@bW_* z@yK5-4g7!F`|_wJudZJ!R%=mdMZtnVTNM-;N|`~x)}jIi6v8~oBxAx15(r4CA|j-U zfIk@1VP=9|Pdv^Hhrs%2dZAvV&b$VO3qMkN(dF^BRBolW?TGSVj7E)vX` zC9-zjS37Rr=ynovJKoe0R9(1eX&2BZI`90{)LDD6II~+!sP9H5zM#Q(>L2U4&G%o( zpp4IQp(CzX%XbtTj)P}a%ip%fVu0rSnc@k0>=p{H&h+H@&fRwCyT$OUJSN=`hfR=^ zygat21=^MQ)T-gMt@B*qa`BW(T8zI?acob9_uFEkqeMhc@#%zsS%9KI?GV3%t~!ME zMs=BI1t+w{c^Q>z6!}gcz z)OSD2mAn(HvgupPE2wgdxp_xkCJ_~=o25CLs_HKOpUj=QIP9}D-Qhg|y>y(_>^|fb zdBcNfnBtWUT|iEXsIii^W~t^W>s%yBY5z)mngsWm13%4%$;NtWe(3{FQ9b>{Od!1HfO(&xp3P->%5Jg zjyy1wFi&7T9CQszhUD&9t2vJU{P#nzz~Tm_1ixpCcB0P=sn=142^X&1k!XE!_vbk~ z*Rj-Ci1geI!FzrfzsUSzC*Gp`QXNL4*RwY(-_cA{f)#t=k0V@ku*7F>#=&`QrVs=Ye@rIcazIQ`oT)_UR2vVpEV$#OU zC+{f#)jZd!-eoU{>wsd5AMZUGr!YO$kFoDkHv`Gm4g?UXToRCEcAn5tb+gS2G3$}k z)knb!{-$9S6JRp}L`amv!KkN=E(M*(XT}t?ToEhEU+V(a)~UOUhEr05tn;XlraSi{ z5ojqFdr7Lho2Sr5#YZQCEq({?gMCI?ZC1~++g`qk^&`o^w{=ugtQsES3OyQJ<=ml| zT(OqPUy&Tpx3GFeS2yG36&sL!l;tREjg9a5njh^x3^IRP3T zk@uyH0j7ZZnB6pqoH}cFePsISLU9Sk#;;7@xjcz3k2BG+QN#LAOs2(RpmA8a`xl`B zM{H6W3tzm1m`KX}SYTO>g7wMSio|YfNNGW0+skxM`beUZj81pgN=x(MjGJkGao_S* zZcq1gUgyLO!i#>Lz$>cnV&M;aR;G#?Nwz>a9L6eNFJ&p7QqA_f2BsW%D6Qk?|Fl?6 zA;UhKXFB|^8RXn~LP$L&eR}g(HAC4UjAIE%lZ$&gOD<`-ebKB0xJJFl@E9q-tK+{# zbMr_D-ZeMP&_8BT(fs_IwnndSJikJjjUJakYH5_F^HF|Dnp`<;`iBjW8;MieJbmhe zCp~TbZmB3cOC7CjxcW-nKi#=JCg-JHBqcD1d^tF4ezP~cz~T^wOV8kkGOe8HPDfO} zCPW_QoZ%KkGO+?0Auv~rX-w6Oi1ceGT<{i>5Fy6MmQHO>-5n*oPCh*EuZee?NO`6fEw^JcbjI2$l3xgB^AJeXd{%^{%mEYS zb8ZDu8=%h;d;mw>D9>py%Lz;WF)!>OX!e$&E>)v_7WFeUPR_}Yoaq%+n%ice+9fRc zl{Ui(q`b!Z#rqX$c82yYnrT0aQ!2Pg?;;$obne7qCD6Qr5TW7-zOk!7%3K83v1FOJ zEA=XA&nqCd*lS&Ul^#_0IyAwHs<1d zjLMPEc0+c8X~|<{%c48Q*nJ?&zkzueWIXe4Oi!ocomDllpNU)hUfnE%!DS2n6Y{3y z_v!g-vWf!4+lBe=?N}mRz}V<^7_l_&;$LXBA^$6`5mJYc*~AaObdTAoST* z$gr!H*$t7=gE-$A;8fp?o~4wzlJX#l3OM)?htH>a0_5r~c3%hwVN+pxaeMX1d0!?{-634lcru^}%y1^tbJ9tp9&VHZ`ta|9?qK-1=c9 zCb?-0nqpiIWq%Gli16($z??+)Yjas1SkB*ftsMGjdfrkHYitK8i4UEkxCadPjO|AdX@Tqxg=VN{m)vGF{GrQP{2`)o&T1*uchmmN|+7 ztrWKq=S*W)H6f~YT7+d2OJ4!YUT^nLra!E=3RwDD#JmJ%oMTYqv#Mnt{64`~v1-jB zT&U>g1IWw@!MOal)Ay(yUmlKK+KWuMbI_Q&xW8WHGC`CmSfdo&6(^DzjbAbIeX-C( zsq}a6N2g{6=WScaKT5Le(swlNt*Q`6$6tA^*qa=^H8W=A+1=?Fw9b(7C@gNGzIo;^ zcS|Oczv3B~LH(Cz08pr;g>#U~iY*p{cC*ubaJ(x+wq|2Y&O?P>r-!9fuMTEI z+Er#+l`eN=`{mIqF5XLpZf8zMxESBo`I+GR=sZf5sq6_4a=web zeG9mm<(f93xjiH%IMX}CLiLRr{+znGJSxlY0B71$Lh-L=#m39`WVR6Zffc0tzVZ}H z17SjO{_JHg%yZokJnnm?xo`*LHhKLW;LzaGOqq1h^<^HBq{oP^=+S~p$!krhkbw5v zsuqgd$RrrMI8?`$9^+-PyL+68lREz zFhkT2$iNWmsbl##ssRWRf)=V*U2a$&LIV^_Nk&EnsZF0Fd;|A(MMZl44fY&iLBT`- zR;9A21!lHoH=6HcDN^dXq>9;hHdfH!x5Z-ju%ue9!JY8CXntBWO7lTVG#b zE|GL0@s^XEueWRjgE-M+fE*RY`kc+`;NWt;8T0CkJ&nTIZJPz*!WA~l_^pN~8rQ0W zmoNCM*{Ap+mXggE7*S7HAFv@Ou21L>ZscLDyn4^-RoFlOTGxGTbWN)y1>#U|vz6bchS;t5yJx*zJ?lwkZA$g#YXd6|us1$7NiwkCgka(rzTi?=8FT78G=@ zT|rp4+Rpg-E3g<5E-^|Z%jE*4lFxGDNXIi@!b)-we%MLShTR>bN6@_k* zklwx>YOAyT6$W~-3&@4QvY}vxWLf_bjol(R(Vevvk3aY8uZ022H+Ewxy7z?ySi{ID zwY3)B@EiF8IQQkSIAyic^{{6TzQ{cu01xxyXJ2T#2aq0ISSZYFqNZ|7Z%!r18-aL8 z%Pk*j$R+0bgP>rfBye8U40)f&PaDL3t?&?@Uic_o-^%s^XeS5|N6*T)C++A4XFMJ* zt(y;@bpAHIP}#}4pkZ&fle1!*_T<$$5TSL!0lfr%Q84RkCGc@BfSvH5o*!WH_>+E4 zZxk8uC^a|CE?U*achTo4-jjN{r?}CIUbN8UuXU5oMoKj|Txlpw2R>$bMXZDPB0;&-&_XaQrWX`}{g$HBe8)xIqmZ=? z^BBeM#@ty(g~o7)L+Rh2axL>d?M${$=gouz%&^pnAvvoxEElpPN>76~@FH1|jlm{I zhM|#0-+O{t_>;e!{f3X=qZcA5d5p!`gAANYBWGf_20gV}gY~0zZs9DDPsc(DXX4#_ zX!o86^*%)`wj5HWuB=M48cUqhMS@*wBya$9eH+&QuGP5A)UgF>`}5%zvYnz@TzSu* zF+pcz{T|TWOcbEYp)s0DD!4j`+rqlIytaj#7t8N(aeldikqT_aNGaizi2#8Qc6PNu zJUeSLikiZ)u5I>lVr_#bKI*{=*39Ct?9E9GwjP>YZ@pzi%6*c>k25iyc!r<0RVzr8B#)IFS|l2+ z59Ydr5s!{NLCAyJ%xXX%x~wnj6DgH6R3xN*=wVvjdfJIc_cOY(u-G$!7F`7Ti~u&^ z+O`?TGUb=KbU~}-#j+mtx<~tTL$-!t1nba>1%8d-_v=N9(_8=Ie=bSVaiQ|vG($?| zIxf#_ibU5^cHSf~sa$H`prK+1LVld{>vgpb0Y=W-IVQ_BG)AE_%;LEH2GnrB+tR{Q zooofa>r8N$sBWnzSL%Xz4lpcadxUO@du<}cU1{3gEh4rZZ!>IfAo&9%-Efa?nB~qq zX@k|OF5d9X{g_4!tDsbgS4l0XC5$k)qkFUzenZv09C=uY*0D9qSqRz07B{&pd)DY_ zJc@a(F_5qRHnCQVmPJB4A+0tG>#d6B_wvh|`u^l$R^|u8ndE2a8G46CAstd&CC&(D z4Z5|kPa-7!?mf9$-PwKGv!H1`evfXcHRVB4{RCb=-vhr#cbRisVz7_uND;w8HpF;( z)^)3%40&u!5Au`Deji?0iz(?)Q(GSpoFM2aHvEg2l0Ampj_D91)jawD!U~A5Hnq)t zuq>#;-N*O+OGaLGk768DWXg2d=XE^Z9m!&71icx*Qh)>fy@dq2Y)3kdq{}0-3Ts96 zY$cw7rm6mOryMR26JfHk7ynQozj+f^ZsbsO4+#ZAz=z4m;FC_E6`2FnbhH0qx;97$ z$|$r(-&-zVQr&02i>!5K8F9`x&oigG0%y6dpezGi_?j*0O>E#Eb(zVJtxav)y1xSym{5sR7Avn zc_VF@@(}S_HpA|u!DD66=hP^l?mA;AGUYJr1KhSFEFXiM z`8~QaPEXM2<3d72alzk0>_oP=DgZSCCKTuL0qI{ciMl-`VXVJxXFxYsa*42$HGMHd zPO-3wQgBzrT>WH$Ud(b?t(MTqLr#HEo!N|glW+YnUrD|u*e3kc7fe$ueFbhmrWy)Z zxDsUbXdxUYqP-i%TD+v!+bTj~yq{>>V(~k&-buGttqNHqrt-pF0=jC%7AnTE);AI2 zAd`Ja<0fT=QoG4Gg(1su*!k4o;;`)GM%T~=V2w`lJY%&KI3BT3tqHj@(A9MxVl@_F z%`AwFU!v*`rV(s3PaA7?6y9UVnGIG&2BW8cJvy>!|T-R{xO}DWb8qnP#413~S~rhV9|C z=GJU2vJYAYid)@@^}s8GTHSs^Kodj(*MMqmw5eKFJtFn*#z;W}Ji4}s?>6m*-;vLV zbMDS{H{lqj{0kK$gN>ph`%_#th!;=`Ya@fP3zQKAu2xGh`R0sW$qQ;zAUx?Pgyv0* z-ifNJ#~wbeAR2Nb!O`lf#e(9jA=o)xOr*SBPQmoI_s^~6vl?ED`c`{%g~WG@Wkvl* z>@;;0O#fMF%1Br`!nZAZv$R^g@znV?Xo7OdLj~-{`HtNfLQP?PgATZC=9~EqI#Yq8 z!JhzAG9 zUKUZi99zvQCsvu?sGR}Rff#K-5QjrLurAw+(s3`R{I3(j`dL`MU(8S?g+FMcxzmN< z$`llV$#$5pq&pLm)ka?S|B6w6TU0xJ(E7MPm>N0PQd915J98Mp-^OY?2r68j_~MKqj}X(Q2PgC5$C z@5Xe9EU0EGh)iB`tqJxU$iN5m5G0(If|rRR6?xd!CeQs>11gG}1k9Vz8|NLjFGkjI z048GIxAEU{B(-|<;bT!?X}-43aHP?QHulR;P9XPX3mG$H5_2dWDy?1V7|Av1Mu{J+ z)P1Nj9a{sK-I58g>lGe zhKFXSU|N>q+e=8MZRjZUt1d#vp8MyU24BC7PNv^MZJzVXGX^^o)ldtJU-sX}Z|hbg zk(f7Qs2hravE(phxXDmOFRK4a6mvOhXfw_oz1iNOD8zdhGi0iekV|8SURFW@_EXl6 z6-*mirzaA(H;9i}enO$VpONSWHS4yziuTNMWB3Dz*04_#f%zu4yKHEg|0hqCbE`g}gvyljw@wkd)Y8?CL4 zx9*$IP%|8YH7NNQWv@6>iAhn}KV2>&wUrTMEzQGs^U~=nuK0EG*Y2ZS2Q- zCVV?+!P4GXb9dF5>n({YYl6B$S?cFM!Nxv8N!XhHh%HbSk4WUO`Zr6fe*OJI5u~kPJApf}&SboIg;NTJ^M~Zd{cxYYG8o(nrjN>i9Q0X1toM_Q= zUv=f4QRQbK4Y8N-$d?iO%*Z~q1U_pIy`E=JIZ@@VPoSY4bYbsbI=0$?7V4+7jIV)O zCkaEV3>Td68u@*8h^r_J(Vpl|o>n~)53GrlvB-}esi(8jIr}VUF15G7T&i)C8yV_@ z_O$oOzpUxO>Dg4Gq$5L3A!QA8(;_IdO5J~@ zW^Q4?pDBn841lS(FOdUtl-e&$ULjiF-E{@Gl{{CWIg!v|U ziR@W2 zAGdaB+!rVs7{%9k)3_z^&`q`}eLE>+VX}aK35$*WuOeW!YGFM$1~E!uW+MaV4~2y+ zAIFzI0bfXIGN2WV|Ku)Sw8;(6&iSu|?ji@FQGX`n(?Y5i>ha@(iTQzft1eHMa%V&h`Wn1Oru^eqk0G8`P8m(7W>PO7KdZvxI=NKiQw*!v%8JLCuZUkf~1ZA z{uJI5&*}k#-R}Dz#$g-RL)}Sc%M4mbJr?pm{cg;K@dG0-fatRu{5E82#W7JONdfzd z;FmR!9#iKw05XACh4D4?l6+;~KI{U3*gCRJnKi3PHKQw}lobRiCN*;>p4&m@*(%eg z_id4{w1>*#D?Izh$a(J+MqS(kgzsVlKYnb^-Ct1u2=QNe0=K>zVFOLSn1hVAv1ql4 z6jDf?gU%`6X@~ggjr?e@u&YOiDWBr{A75zX!i+DNB?o6sHy;#KXHG{^%C=^>c+S0l za{{$F%8y?w3#puRrIaG+MWoG^l9V!a{*bl$l(l!UErSKE2Q{xjML4d@C&q`p^rVC6 zcD02nITsw0u3875DIa+)C|x;Qs28-Po$cMO+;|Xlg~R{r{DEz^*sls5K--d6Dms`g zM3M!spULtoUX(gkL+{)M!8*u)p?;M~?HsVtY`b$%@C|6Tuw5R9Q`Z5=#)m~wG*)8Nwl;_&Nl2z;%j%}fBkrY8FH`<;`2&8%{|_FHDvGxt@gqgN@Lv# zv}nxxLA6Px1q{fiF}Xs;t2BSit>a`!?kMc6*zG=WMri5Ta1;a)YY+se98YGZan9D-n9Zzs{!79Y7e++2=g$Gc-scvS^lDJ_D9Z{x_!D)(k~pWiR?i5NqzUTM=Cx1^Nj-!GVjl|85|;WJs!zob z{oaSAAYX#!Li6FTa|?tS>S`df5phS}s=_AhYh6fiHbCCS#s~}${f+jRv4H?`LBaHa z`@lCb`=`PP+rDuxi zerXj1$Uh`U@)503+?9Q!pyE<`rIm_YnrYwFUu9&Tb@q!DcUx!6qw;r8=^?&jygI4HuAOq}l3m$K z_;ZWlw9Y>y$*+VPD?lZ}(l(;$oWQH4w1|iZIqxnrd6%;@64c`)eW)Ji@N6fLtF4`a z4%kHmZ3kTXRlEq!13;>Iql&O{Sl`_y;(qX*TZ;$-2lS_;I&(J#9Gz^YYS< za{f;9np)0hr{P7R1YSLL)|)YW&};-&EI9~@%I%!3@mi0LIpk!b8m~SU5l(NF^yso{ zakKbac00Q)V^I$WGmEnXjl6qPPic+ni9T`?P)#n*hITXD&`d+zV@`sjhhiLYuSkL#R*! zexZ6m;B19g{a$XguF}XJpeA0}`^dDW-=Bh1)YpwhX7?9)z%JhQg=K_SZ#wWPA*lw& zeTRY<-{Ttr4!Oq5V;;Dy9@KP-Pe~}?)d;X0v6x>M4IriB!DOxUhGScqVSJTau?PjP zWos-5TWE%yK$Ja6@N6>*I+^UB?4YaaH~RwF&sa8>fMp@;rnOw%^f%S3WjoFh<}$6u zv8`|3@RgVdJYprsXiGY8+V!E3_s`^l#8MX#5s|V6`d-~Q@dlJky2CY7i&mbfRK!ks zFwTc|?Y+q0m?&;^UjK`i^hMC(We(v%!9#*C@Z_Wi#3SGR%8gFgR97=hZU&jvE8Wnw z^~{wqhjHRdZd1`g__L`_9+^dcFa5lN~Ilur= zB#ITl6qE4Afejy~Xn>l();Bg073BGX<5I-7Mwnfy1R5SGQd74$im#& zGmFm%z(_K5=TjbCFM6E9%%3ygJ_6|(nMfZWAE027^UEe=?WjGvQ0sr~b0Ej-LG5%V ze$yTBY2JIwi!tZ_m!+W(CATcsa#e;K9j!(`Ru=hC{EEY@>f%!7#i#&y8k~>2sk{4; zaOJ@glX4r`Py*2O#+Ph!Q+eZ9y=146^D76#n@&fFlutJ}PC^fstz)_Nx@7|h$|Wg$ zU025V*|^G=;OKehEa4+HRE{cP*A5}tV&SVPo$3FwU3?X($K2qOOsC-D6qTq<`K0QN6R+OF}1tK>kLFS^4o<| zpdQ|~rF*gUO_}mnyQ=vH<5iy)fi%ML=2#hT+*-W|>pf^QRbf+K3ZsYwy!)Q}iSW(g zPzt;n5*2TSFuk9kj`JHR^p`jR14XX#-&^T}xP5yf43tMA@26*1Mk*%ApG0ih|k*w*zcy&EEe&wLfPF<~C*SEfhd+*+bkgSsSKMzh-vq?2{dC(YK z%G}GhU3n7iQMW(nMFhKK)#^h~M{xUFy&->5(7SF~aWAw8y{)c2)3aX;{bE+AB`)7Y z-NJj~iKEM6uN_Kx>2AHH9=Mf(uM5-yCHS^qozFzq8e|vTO&=fm)1-L*rrLjBl z#4YBf^0xiErb^z|^nb+(Hb$z`a3I57P{FNybE&1C$VB3)7Klnr3HpR~meWdtI<#M~KagK>hcxwa)WvGgWk_Kxdinl%b zTfv~x5Qif13FZ@ja8QInog0kTiZ$O06ZyF?(#UBY$-TO1knJ_CRD2};17&+K*&~`I z(2;8UQl8-VVUx*$a8RmaH-?yPoPwnHkRo6`o{ZD@;#p_}`eA1pHYoGEZ z%Q&Q5&Yjheb=thZk#c!cDfk&K>;twVI)8H59r~nNhJ1ywKR4A$ou{JpZ^DwgjpN_ diff --git a/windows/deployment/windows-autopilot/white-glove.md b/windows/deployment/windows-autopilot/white-glove.md index 6f0bf9c606..65b0660df7 100644 --- a/windows/deployment/windows-autopilot/white-glove.md +++ b/windows/deployment/windows-autopilot/white-glove.md @@ -49,56 +49,56 @@ To ensure that your Intune tenant has been flighted with the needed white glove ![AAD](images/wg03.png) -The tenant ID can be found under “Azure Active Directory” and then “Properties” (click the icon next to the ID to copy to the clipboard): +The tenant ID can be found under **Azure Active Directory** and then **Properties**. Click the icon next to the ID to copy to the clipboard.: ![AAD](images/wg04.png) -Note: Please use a non-critical tenant for this evaluation process. If you do not currently have a non-critical tenant, you can create a new Azure Active Directory tenant and then add an EMS trial license to it. +>[!NOTE] +>Please use a non-critical tenant for this evaluation process. If you do not currently have a non-critical tenant, you can create a new Azure Active Directory tenant and then add an EMS trial license to it. Two features will be enabled as part of the flighting process: -• Support for Windows Autopilot “White Glove.” This will enable devices performing “White Glove” processes to enroll in Intune, and will expose a new Autopilot profile setting that enables “White Glove” for any devices that have been assigned that profile. -• Support for tracking Intune Management Extensions activities (Win32 apps, PowerShell scripts) in the Enrollment Status Page (ESP). This is needed to ensure that all Win32 apps are installed before the “White Glove” process completes. +- Support for Windows Autopilot for white glove deployment This will enable devices performing white glove deployment processes to enroll in Intune, and will expose a new Autopilot profile setting that enables white glove deployment for any devices that have been assigned that profile. +- Support for tracking Intune Management Extensions activities (Win32 apps, PowerShell scripts) in the Enrollment Status Page (ESP). This is needed to ensure that all Win32 apps are installed before the white glove deployment process completes. -Once the flighting is complete, you will be able to enable Windows Autopilot “White Glove” in any Autopilot profile; all devices with that profile assigned will be able to leverage the “White Glove” process. +Once the flighting is complete, you will be able to enable Windows Autopilot for white glove deployment in any Autopilot profile; all devices with that profile assigned will be able to leverage the "white glove" process. -Note: To see the “White Glove” Autopilot profile setting, use this URL to access the Intune portal: -https://portal.azure.com/?microsoft_intune_enrollment_enableWhiteGlove=true -This is a temporary requirement. +>[!TIP] +>To see the “White Glove” Autopilot profile setting, use this URL to access the Intune portal: https://portal.azure.com/?microsoft_intune_enrollment_enableWhiteGlove=true. This is a temporary requirement. ![OOBE](images/wg05.png) -The Windows Autopilot “White Glove” pre-provisioning process will apply all device-targeted policies from Intune. That includes certificates, security templates, settings, apps, and more – anything targeting the device. Additionally, any apps that are targeted to the user that has been pre-assigned to the Autopilot device will also be installed. (Note that other user-targeted policies will not apply until the user signs into the device.) To verify these behaviors, be sure to create appropriate apps and policies, targeted to devices and users. +The Windows Autopilot for white glove deployment pre-provisioning process will apply all device-targeted policies from Intune. That includes certificates, security templates, settings, apps, and more – anything targeting the device. Additionally, any apps that are targeted to the user that has been pre-assigned to the Autopilot device will also be installed. (Note that other user-targeted policies will not apply until the user signs into the device.) To verify these behaviors, be sure to create appropriate apps and policies, targeted to devices and users. ## Scenarios -Windows Autopilot “White Glove” supports two distinct scenarios: +Windows Autopilot for white glove deployment supports two distinct scenarios: - User-driven deployments with Azure AD Join. The device will be joined to an Azure AD tenant. - User-driven deployments with Hybrid Azure AD Join. The device will be joined to an on-premises Active Directory domain, and separately registered with Azure AD. Each of these scenarios consists of two parts, a technician flow and a user flow. At a high level, these parts are the same for Azure AD Join and Hybrid Azure AD join; differences are primarily seen by the end user in the authentication steps. ### Technican flow -The first part of the Windows Autopilot “White Glove” process is designed to be carried out by a technician; this could be a member of the IT staff, a services partner, or an OEM – each organization can decide who should perform these activities. +The first part of the Windows Autopilot for white glove deployment process is designed to be carried out by a technician; this could be a member of the IT staff, a services partner, or an OEM – each organization can decide who should perform these activities. Regardless of the scenario, the process to be performed by the technician is the same: - Boot the device (running Windows 10 Pro, Enterprise, or Education SKUs, Insider Preview build 18342 or higher). -- From the first OOBE screen (which could be a language selection or locale selection screen), do not click “Next.” Instead, press the Windows key five times to view an additional options dialog. From that screen, choose the “Windows Autopilot provisioning” option and then click “Continue.” +- From the first OOBE screen (which could be a language selection or locale selection screen), do not click **Next**. Instead, press the Windows key five times to view an additional options dialog. From that screen, choose the **Windows Autopilot provisioning** option and then click **Continue**. ![Autopilot](images/wg05.png) -- On the “Windows Autopilot Configuration” screen, information will be displayed about the device: +- On the **Windows Autopilot Configuration** screen, information will be displayed about the device: - The Autopilot profile assigned to the device. - The organization name for the device. - The user assigned to the device (if there is one). - A QR code containing a unique identifier for the device, useful to look up the device in Intune to make any configuration changes needed (e.g. assigning a user, adding the device to any additional groups needed for app or policy targeting). -- Validate the information displayed. If any changes are needed, make these and then click “Refresh” to re-download the updated Autopilot profile details. +- Validate the information displayed. If any changes are needed, make these and then click **Refresh** to re-download the updated Autopilot profile details. ![Autopilot](images/wg06.png) -- Click “Provision” to begin the provisioning process. +- Click **Provision** to begin the provisioning process. If the pre-provisioning process completes successfully: - A green status screen will be displayed with information about the device, including the same details presented previously (e.g. Autopilot profile, organization name, assigned user, QR code), as well as the elapsed time for the pre-provisioning steps. -- Click “Reseal” to shut the device down. At that point, the device can be shipped to the end user. +- Click **Reseal** to shut the device down. At that point, the device can be shipped to the end user. If the pre-provisioning process fails: - A red status screen will be displayed with information about the device, including the same details presented previously (e.g. Autopilot profile, organization name, assigned user, QR code), as well as the elapsed time for the pre-provisioning steps. - Diagnostic logs can be gathered from the device, and then it can be reset to start the process over again. @@ -117,25 +117,24 @@ If the pre-provisioning process completed successfully and the device was reseal ## Fixed issues Each Windows 10 19H1 Insider Preview build can contain additional fixes for Windows Autopilot and related functionality. These issues should already be addressed: -• Some failures may be displayed on the Enrollment Status Page, instead of advancing to the red “White Glove” summary page. Fixed in build 10.0.18345. (20355940) +• Some failures may be displayed on the Enrollment Status Page, instead of advancing to the red "white glove" summary page. Fixed in build 10.0.18345. (20355940) • Connectivity to the corporate network is presently required during the Hybrid AAD Join technician flow, even though it is only used to check that an Active Directory domain controller is accessible. Fixed in build 10.0.18345. (20301592) -• When enrolling a device in Intune during the technician flow, an enrollment error 80180003 is reported, indicating that White Glove is not enabled. Fixed in Intune on March 8th, 2019. -• When editing the Autopilot profile to enable White Glove, the setting change is not saved properly. Fixed in Intune on March 12th, 2019. - +• When enrolling a device in Intune during the technician flow, an enrollment error 80180003 is reported, indicating that white glove is not enabled. This is fixed in Intune on March 8th, 2019. +• When editing the Autopilot profile to enable white glove deployment, the setting change is not saved properly. This is fixed in Intune on March 12th, 2019. ## Known issues ### All scenarios -When installing Win32 apps via the Intune Management Extensions, the Enrollment Status Page may time out even though the apps are installed successfully. In some cases, this may indicate that the detection rules for the app are not correct, but this may happen even with properly configured apps. (Under investigation.) +When installing Win32 apps via the Intune Management Extensions, the Enrollment Status Page may time out even though the apps are installed successfully. In some cases, this may indicate that the detection rules for the app are not correct, but this may happen even with properly configured apps. This issue is currently under investigation. ### Hybrid Azure AD Join -The process of TPM attestation, joining the device to Active Directory, and enrolling in Intune happens when the “Provision” button is clicked from the initial “Windows Autopilot Configuration” screen. Additional status is being added. (20212277) +The process of TPM attestation, joining the device to Active Directory, and enrolling in Intune happens when the **Provision** button is clicked from the initial **Windows Autopilot Configuration** screen. Additional status is being added. (20212277) ### Azure AD Join -There are currently no existing known issues specific to Azure AD Join. +There are currently no known issues specific to Azure AD Join. ## Feedback From 023c770e62ea2ff8cc29b17f44d6a501afafd20d Mon Sep 17 00:00:00 2001 From: Greg Lindsay Date: Mon, 13 May 2019 13:25:58 -0700 Subject: [PATCH 521/724] draft4 --- windows/deployment/windows-autopilot/TOC.md | 2 +- windows/deployment/windows-autopilot/white-glove.md | 8 ++++---- 2 files changed, 5 insertions(+), 5 deletions(-) diff --git a/windows/deployment/windows-autopilot/TOC.md b/windows/deployment/windows-autopilot/TOC.md index e497301f56..30a33a05ff 100644 --- a/windows/deployment/windows-autopilot/TOC.md +++ b/windows/deployment/windows-autopilot/TOC.md @@ -5,8 +5,8 @@ ### [Network requirements](windows-autopilot-requirements-network.md) ### [Licensing requirements](windows-autopilot-requirements-licensing.md) ## [Scenarios and Capabilities](windows-autopilot-scenarios.md) -### [White glove](white-glove.md) ### [Support for existing devices](existing-devices.md) +### [White glove](white-glove.md) ### [User-driven mode](user-driven.md) #### [Azure Active Directory joined](user-driven-aad.md) #### [Hybrid Azure Active Directory joined](user-driven-hybrid.md) diff --git a/windows/deployment/windows-autopilot/white-glove.md b/windows/deployment/windows-autopilot/white-glove.md index 65b0660df7..c466935433 100644 --- a/windows/deployment/windows-autopilot/white-glove.md +++ b/windows/deployment/windows-autopilot/white-glove.md @@ -25,7 +25,7 @@ Windows Autopilot can also provide a "white glove" service enabling partners or ![OEM](images/wg02.png) -Enabled with Microsoft Intune in Windows 10, version 1903 and later, white glove deployment capabilities build on top of existing Windows Autopilot [user-driven scenarios](user-driven.md), supporting the user-driven [Azure AD join](user-driven-aad) and [Hybrid Azure AD](user-driven-hybrid.md) join scenarios. +Enabled with Microsoft Intune in Windows 10, version 1903 and later, white glove deployment capabilities build on top of existing Windows Autopilot [user-driven scenarios](user-driven.md), supporting the user-driven [Azure AD join](user-driven-aad.md) and [Hybrid Azure AD](user-driven-hybrid.md) join scenarios. ## Prerequisites @@ -64,7 +64,7 @@ Two features will be enabled as part of the flighting process: Once the flighting is complete, you will be able to enable Windows Autopilot for white glove deployment in any Autopilot profile; all devices with that profile assigned will be able to leverage the "white glove" process. >[!TIP] ->To see the “White Glove” Autopilot profile setting, use this URL to access the Intune portal: https://portal.azure.com/?microsoft_intune_enrollment_enableWhiteGlove=true. This is a temporary requirement. +>To see the white glove deployment Autopilot profile setting, use this URL to access the Intune portal: https://portal.azure.com/?microsoft_intune_enrollment_enableWhiteGlove=true. This is a temporary requirement. ![OOBE](images/wg05.png) @@ -136,10 +136,10 @@ The process of TPM attestation, joining the device to Active Directory, and enro There are currently no known issues specific to Azure AD Join. -## Feedback +## Questions and comments Depending on your method of participation in the Windows Autopilot for white glove deployment process, your feedback mechanism may be different. - If you are participating in the Windows TAP program, please provide feedback via the **Windows 10 TAP** Yammer group. - If you are participating via MVP programs, please provide feedback via the MVP distribution list for your specialty. -- For others, please provide feedback via the [Feedback Hub](https://www.microsoft.com/p/feedback-hub/9nblggh4r32n#activetab=pivot:overviewtab) or your specific Windows Autopilot team contact. +- For others, please use the feedback links provided below or your specific Windows Autopilot team contact. From 0e0a602102d712a74a297c084fe633824a554d8d Mon Sep 17 00:00:00 2001 From: Joey Caparas Date: Mon, 13 May 2019 13:36:11 -0700 Subject: [PATCH 522/724] indicators --- .../threat-protection/windows-defender-atp/manage-indicators.md | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/windows/security/threat-protection/windows-defender-atp/manage-indicators.md b/windows/security/threat-protection/windows-defender-atp/manage-indicators.md index 2a60cfdd55..c74b1a805e 100644 --- a/windows/security/threat-protection/windows-defender-atp/manage-indicators.md +++ b/windows/security/threat-protection/windows-defender-atp/manage-indicators.md @@ -62,7 +62,7 @@ On the top navigation you can: ## Manage indicators -1. In the navigation pane, select **Settings** > **Allowed/blocked list**. +1. In the navigation pane, select **Settings** > **Indicators**. 2. Select the tab of the entity type you'd like to manage. From ca6bb81791cf65f6bab765baaf73cb502ce8faa3 Mon Sep 17 00:00:00 2001 From: Greg Lindsay Date: Mon, 13 May 2019 13:37:25 -0700 Subject: [PATCH 523/724] draft5 --- .../windows-autopilot/white-glove.md | 22 ++++++++++--------- 1 file changed, 12 insertions(+), 10 deletions(-) diff --git a/windows/deployment/windows-autopilot/white-glove.md b/windows/deployment/windows-autopilot/white-glove.md index c466935433..41952b7b78 100644 --- a/windows/deployment/windows-autopilot/white-glove.md +++ b/windows/deployment/windows-autopilot/white-glove.md @@ -49,7 +49,7 @@ To ensure that your Intune tenant has been flighted with the needed white glove ![AAD](images/wg03.png) -The tenant ID can be found under **Azure Active Directory** and then **Properties**. Click the icon next to the ID to copy to the clipboard.: +The tenant ID can be found under **Azure Active Directory** and then **Properties**. Click the icon next to the ID to copy to the clipboard. ![AAD](images/wg04.png) @@ -58,17 +58,19 @@ The tenant ID can be found under **Azure Active Directory** and then **Propertie Two features will be enabled as part of the flighting process: -- Support for Windows Autopilot for white glove deployment This will enable devices performing white glove deployment processes to enroll in Intune, and will expose a new Autopilot profile setting that enables white glove deployment for any devices that have been assigned that profile. -- Support for tracking Intune Management Extensions activities (Win32 apps, PowerShell scripts) in the Enrollment Status Page (ESP). This is needed to ensure that all Win32 apps are installed before the white glove deployment process completes. +- Support for Windows Autopilot for white glove deployment. + - This will enable devices performing white glove deployment processes to enroll in Intune, and will expose a new Autopilot profile setting that enables white glove deployment for any devices that have been assigned that profile. +- Support for tracking Intune Management Extensions activities (Win32 apps, PowerShell scripts) in the Enrollment Status Page (ESP). + - This is needed to ensure that all Win32 apps are installed before the white glove deployment process completes. -Once the flighting is complete, you will be able to enable Windows Autopilot for white glove deployment in any Autopilot profile; all devices with that profile assigned will be able to leverage the "white glove" process. +Once the flighting is complete, you will be able to enable Windows Autopilot for white glove deployment in any Autopilot profile; all devices with that profile assigned will be able to leverage the white glove deployment process. >[!TIP] >To see the white glove deployment Autopilot profile setting, use this URL to access the Intune portal: https://portal.azure.com/?microsoft_intune_enrollment_enableWhiteGlove=true. This is a temporary requirement. ![OOBE](images/wg05.png) -The Windows Autopilot for white glove deployment pre-provisioning process will apply all device-targeted policies from Intune. That includes certificates, security templates, settings, apps, and more – anything targeting the device. Additionally, any apps that are targeted to the user that has been pre-assigned to the Autopilot device will also be installed. (Note that other user-targeted policies will not apply until the user signs into the device.) To verify these behaviors, be sure to create appropriate apps and policies, targeted to devices and users. +The Windows Autopilot for white glove deployment pre-provisioning process will apply all device-targeted policies from Intune. That includes certificates, security templates, settings, apps, and more – anything targeting the device. Additionally, any apps that are targeted to the user that has been pre-assigned to the Autopilot device will also be installed. **Note**: other user-targeted policies will not apply until the user signs into the device. To verify these behaviors, be sure to create appropriate apps and policies targeted to devices and users. ## Scenarios @@ -116,11 +118,11 @@ If the pre-provisioning process completed successfully and the device was reseal ## Fixed issues -Each Windows 10 19H1 Insider Preview build can contain additional fixes for Windows Autopilot and related functionality. These issues should already be addressed: -• Some failures may be displayed on the Enrollment Status Page, instead of advancing to the red "white glove" summary page. Fixed in build 10.0.18345. (20355940) -• Connectivity to the corporate network is presently required during the Hybrid AAD Join technician flow, even though it is only used to check that an Active Directory domain controller is accessible. Fixed in build 10.0.18345. (20301592) -• When enrolling a device in Intune during the technician flow, an enrollment error 80180003 is reported, indicating that white glove is not enabled. This is fixed in Intune on March 8th, 2019. -• When editing the Autopilot profile to enable white glove deployment, the setting change is not saved properly. This is fixed in Intune on March 12th, 2019. +Each Windows 10 19H1 Insider Preview build can contain additional fixes for Windows Autopilot and related functionality. The following issues should already be addressed: +- Some failures may be displayed on the Enrollment Status Page, instead of advancing to the red "white glove" summary page. This is fixed in build 10.0.18345. (20355940) +- Connectivity to the corporate network is presently required during the Hybrid AAD Join technician flow, even though it is only used to check that an Active Directory domain controller is accessible. This is fixed in build 10.0.18345. (20301592) +- When enrolling a device in Intune during the technician flow, an enrollment error 80180003 is reported, indicating that white glove is not enabled. This is fixed in Intune on March 8th, 2019. +- When editing the Autopilot profile to enable white glove deployment, the setting change is not saved properly. This is fixed in Intune on March 12th, 2019. ## Known issues From ab1a1d41333cd9417a031508f8bb98b6c8dd56b9 Mon Sep 17 00:00:00 2001 From: Greg Lindsay Date: Mon, 13 May 2019 14:23:06 -0700 Subject: [PATCH 524/724] draft6 --- windows/deployment/windows-autopilot/white-glove.md | 10 ++++++---- 1 file changed, 6 insertions(+), 4 deletions(-) diff --git a/windows/deployment/windows-autopilot/white-glove.md b/windows/deployment/windows-autopilot/white-glove.md index 41952b7b78..9854786c6a 100644 --- a/windows/deployment/windows-autopilot/white-glove.md +++ b/windows/deployment/windows-autopilot/white-glove.md @@ -17,15 +17,17 @@ ms.topic: article **Applies to: Windows 10, version 1903** -Windows Autopilot enables organizations to easily provision new devices, leveraging the preinstalled OEM image and drivers resulting in a simple process that can be performed by the end user. +Windows Autopilot enables organizations to easily provision new devices - leveraging the preinstalled OEM image and drivers with a simple process that can be performed by the end user to help get their device business-ready. ![OEM](images/wg01.png) -Windows Autopilot can also provide a "white glove" service enabling partners or IT staff to pre-provision a Windows 10 PC to be fully configured and business-ready​. With Windows Autopilot for white glove deployment, the provisioning process is split, with the time-consuming portions performed by IT, partners, or OEMs. From the end user’s perspective, the process is exactly the same, just faster – the Windows Autopilot user-driven experience is unchanged. +Windows Autopilot can also provide a white glove service that enables partners or IT staff to pre-provision a Windows 10 PC so that it is fully configured and business-ready​. From the end user’s perspective, the Windows Autopilot user-driven experience is unchanged, but getting their device to a fully provisioned state is faster. + +With **Windows Autopilot for white glove deployment**, the provisioning process is split. The time-consuming portions are performed by IT, partners, or OEMs. The end user simply completes a few neceesary settings and polices and then they can begin using their device. ![OEM](images/wg02.png) -Enabled with Microsoft Intune in Windows 10, version 1903 and later, white glove deployment capabilities build on top of existing Windows Autopilot [user-driven scenarios](user-driven.md), supporting the user-driven [Azure AD join](user-driven-aad.md) and [Hybrid Azure AD](user-driven-hybrid.md) join scenarios. +Enabled with Microsoft Intune in Windows 10, version 1903 and later, white glove deployment capabilities build on top of existing Windows Autopilot [user-driven scenarios](user-driven.md), supporting both the user-driven [Azure AD join](user-driven-aad.md) and [Hybrid Azure AD](user-driven-hybrid.md) join scenarios. ## Prerequisites @@ -144,4 +146,4 @@ Depending on your method of participation in the Windows Autopilot for white glo - If you are participating in the Windows TAP program, please provide feedback via the **Windows 10 TAP** Yammer group. - If you are participating via MVP programs, please provide feedback via the MVP distribution list for your specialty. -- For others, please use the feedback links provided below or your specific Windows Autopilot team contact. +- For others, please use the feedback link provided below (next to **This product**) or your specific Windows Autopilot team contact. From cbf9fa503667e7e718f929b9f7f255cbcd8350bf Mon Sep 17 00:00:00 2001 From: Justin Hall Date: Mon, 13 May 2019 14:54:28 -0700 Subject: [PATCH 525/724] added caveat about excluded apps --- .../customize-attack-surface-reduction.md | 16 +++++++--------- ...customize-controlled-folders-exploit-guard.md | 9 +++++---- .../enable-attack-surface-reduction.md | 4 ++-- .../enable-controlled-folders-exploit-guard.md | 6 +++--- 4 files changed, 17 insertions(+), 18 deletions(-) diff --git a/windows/security/threat-protection/windows-defender-exploit-guard/customize-attack-surface-reduction.md b/windows/security/threat-protection/windows-defender-exploit-guard/customize-attack-surface-reduction.md index 6dbb17c57d..fe9741366e 100644 --- a/windows/security/threat-protection/windows-defender-exploit-guard/customize-attack-surface-reduction.md +++ b/windows/security/threat-protection/windows-defender-exploit-guard/customize-attack-surface-reduction.md @@ -11,7 +11,7 @@ ms.pagetype: security ms.localizationpriority: medium author: andreabichsel ms.author: v-anbic -ms.date: 05/08/2019 +ms.date: 05/13/2019 --- # Customize attack surface reduction rules @@ -31,20 +31,18 @@ You can use Group Policy, PowerShell, and MDM CSPs to configure these settings. ## Exclude files and folders -You can exclude files and folders from being evaluated by all attack surface reduction rules. This means that even if the file or folder contains malicious behavior as determined by an attack surface reduction rule, the file will not be blocked from running. - -This could potentially allow unsafe files to run and infect your devices. +You can exclude files and folders from being evaluated by attack surface reduction rules. This means that even if an attack surface reduction rule detects that the file contains malicious behavior, the file will not be blocked from running. >[!WARNING] ->Excluding files or folders can severely reduce the protection provided by attack surface reduction rules. Files that would have been blocked by a rule will be allowed to run, and there will be no report or event recorded. -> ->If you are encountering problems with rules detecting files that you believe should not be detected, you should [use audit mode first to test the rule](evaluate-attack-surface-reduction.md). +>This could potentially allow unsafe files to run and infect your devices. Excluding files or folders can severely reduce the protection provided by attack surface reduction rules. Files that would have been blocked by a rule will be allowed to run, and there will be no report or event recorded. -You can specify individual files or folders (using folder paths or fully qualified resource names) but you cannot specify if the exclusions should only be applied to individual rules: the exclusions will apply to all rules that are enabled (or placed in audit mode) and that allow exclusions. +An exclusion applies to all rules that allow exclusions. You can specify an individual file, folder path, or the fully qualified domain name for a resource, but you cannot limit an exclusion to certain rules. + +An exclusion is applied only when when the excluded application or service starts. For example, if you add an exclusion for an update service that is already running, the update service will continue to trigger events until the service is stopped and restarted. Attack surface reduction supports environment variables and wildcards. For information about using wildcards, see [Use wildcards in the file name and folder path or extension exclusion lists](https://docs.microsoft.com/windows/security/threat-protection/windows-defender-antivirus/configure-extension-file-exclusions-windows-defender-antivirus#use-wildcards-in-the-file-name-and-folder-path-or-extension-exclusion-lists). +If you are encountering problems with rules detecting files that you believe should not be detected, you should [use audit mode first to test the rule](evaluate-attack-surface-reduction.md). -Exclusions apply to all attack surface reduction rules. Rule description | GUID -|:-:|- diff --git a/windows/security/threat-protection/windows-defender-exploit-guard/customize-controlled-folders-exploit-guard.md b/windows/security/threat-protection/windows-defender-exploit-guard/customize-controlled-folders-exploit-guard.md index bf18867655..deed0e6c2e 100644 --- a/windows/security/threat-protection/windows-defender-exploit-guard/customize-controlled-folders-exploit-guard.md +++ b/windows/security/threat-protection/windows-defender-exploit-guard/customize-controlled-folders-exploit-guard.md @@ -11,7 +11,7 @@ ms.pagetype: security ms.localizationpriority: medium author: andreabichsel ms.author: v-anbic -ms.date: 05/07/2019 +ms.date: 05/13/2019 --- # Customize controlled folder access @@ -89,13 +89,14 @@ Use the [./Vendor/MSFT/Policy/Config/Defender/GuardedFoldersList](https://docs.m You can specify if certain apps should always be considered safe and given write access to files in protected folders. Allowing apps can be useful if you're finding a particular app that you know and trust is being blocked by the controlled folder access feature. >[!IMPORTANT] ->By default, Windows adds apps that it considers friendly to the allowed list - apps added automatically by Windows are not recorded in the list shown in the Windows Security app or by using the associated PowerShell cmdlets. +>By default, Windows adds apps that it considers friendly to the allowed list—apps added automatically by Windows are not recorded in the list shown in the Windows Security app or by using the associated PowerShell cmdlets. >You shouldn't need to add most apps. Only add apps if they are being blocked and you can verify their trustworthiness. -You can use the Windows Security app or Group Policy to add and remove apps that should be allowed to access protected folders. - When you add an app, you have to specify the app's location. Only the app in that location will be permitted access to the protected folders - if the app (with the same name) is located in a different location, then it will not be added to the allow list and may be blocked by controlled folder access. +An allowed application or service only has write access to a controlled flder after it starts. For example, if you allow an update service that is already running, the update service will continue to trigger events until the service is stopped and restarted. + + ### Use the Windows Defender Security app to allow specific apps 1. Open the Windows Security by clicking the shield icon in the task bar or searching the start menu for **Defender**. diff --git a/windows/security/threat-protection/windows-defender-exploit-guard/enable-attack-surface-reduction.md b/windows/security/threat-protection/windows-defender-exploit-guard/enable-attack-surface-reduction.md index 1a68651c4f..3b305feed9 100644 --- a/windows/security/threat-protection/windows-defender-exploit-guard/enable-attack-surface-reduction.md +++ b/windows/security/threat-protection/windows-defender-exploit-guard/enable-attack-surface-reduction.md @@ -11,7 +11,7 @@ ms.pagetype: security ms.localizationpriority: medium author: andreabichsel ms.author: v-anbic -ms.date: 04/29/2019 +ms.date: 05/13/2019 --- # Enable attack surface reduction rules @@ -51,7 +51,7 @@ You can exclude files and folders from being evaluated by most attack surface re >- Block process creations originating from PSExec and WMI commands >- Block JavaScript or VBScript from launching downloaded executable content -You can specify individual files or folders (using folder paths or fully qualified resource names) but you can't specify which rules the exclusions apply to. +You can specify individual files or folders (using folder paths or fully qualified resource names) but you can't specify which rules the exclusions apply to. An exclusion is applied only when when the excluded application or service starts. For example, if you add an exclusion for an update service that is already running, the update service will continue to trigger events until the service is stopped and restarted. ASR rules support environment variables and wildcards. For information about using wildcards, see [Use wildcards in the file name and folder path or extension exclusion lists](https://docs.microsoft.com/windows/security/threat-protection/windows-defender-antivirus/configure-extension-file-exclusions-windows-defender-antivirus#use-wildcards-in-the-file-name-and-folder-path-or-extension-exclusion-lists). diff --git a/windows/security/threat-protection/windows-defender-exploit-guard/enable-controlled-folders-exploit-guard.md b/windows/security/threat-protection/windows-defender-exploit-guard/enable-controlled-folders-exploit-guard.md index d761ebfc85..f6e6986c98 100644 --- a/windows/security/threat-protection/windows-defender-exploit-guard/enable-controlled-folders-exploit-guard.md +++ b/windows/security/threat-protection/windows-defender-exploit-guard/enable-controlled-folders-exploit-guard.md @@ -11,7 +11,7 @@ ms.pagetype: security ms.localizationpriority: medium author: andreabichsel ms.author: v-anbic -ms.date: 04/29/2019 +ms.date: 05/13/2019 --- # Enable controlled folder access @@ -61,7 +61,7 @@ For more information about disabling local list merging, see [Prevent or allow u 1. Type the path to each application that has access to protected folders and the path to any additional folder that needs protection and click **Add**. ![Enable controlled folder access in Intune](images/enable-cfa-intune.png) >[!NOTE] - >Wilcard is supported for applications, but not for folders. Subfolders are not protected. + >Wilcard is supported for applications, but not for folders. Subfolders are not protected. Allowed apps will continue to trigger events until they are restarted. 1. Click **OK** to save each open blade and click **Create**. 1. Click the profile **Assignments**, assign to **All Users & All Devices**, and click **Save**. @@ -76,7 +76,7 @@ Use the [./Vendor/MSFT/Policy/Config/ControlledFolderAccessProtectedFolders](htt 1. Enter a name and a description, click **Controlled folder access**, and click **Next**. 1. Choose whether block or audit changes, allow other apps, or add other folders, and click **Next**. >[!NOTE] - >Wilcard is supported for applications, but not for folders. Subfolders are not protected. + >Wilcard is supported for applications, but not for folders. Subfolders are not protected. Allowed apps will continue to trigger events until they are restarted. 1. Review the settings and click **Next** to create the policy. 1. After the policy is created, click **Close**. From d3ed76ec25d361a5d558833ff41544c38d0fee03 Mon Sep 17 00:00:00 2001 From: ManikaDhiman Date: Mon, 13 May 2019 15:01:37 -0700 Subject: [PATCH 526/724] Formatting updates --- .../client-management/mdm/enrollmentstatustracking-csp.md | 6 +++--- 1 file changed, 3 insertions(+), 3 deletions(-) diff --git a/windows/client-management/mdm/enrollmentstatustracking-csp.md b/windows/client-management/mdm/enrollmentstatustracking-csp.md index 975a1a8c3b..b8c8725a1e 100644 --- a/windows/client-management/mdm/enrollmentstatustracking-csp.md +++ b/windows/client-management/mdm/enrollmentstatustracking-csp.md @@ -74,13 +74,13 @@ Root node for the app installations being tracked by the ESP. Scope is permanent. Supported operation is Get. -**EnrollmentStatusTracking/Setup/Apps/Tracking/*ProviderName*** +**EnrollmentStatusTracking/Setup/Apps/Tracking/_ProviderName_** Optional. This node is supported in both user context and device context. Indicates the provider name responsible for installing the apps and providing status back to ESP. Scope is dynamic. Supported operations are Get, Add, Delete, and Replace. -**EnrollmentStatusTracking/Setup/Apps/Tracking/*ProviderName*/*AppName*** +**EnrollmentStatusTracking/Setup/Apps/Tracking/*ProviderName*/_AppName_** Optional. This node is supported in both user context and device context. Represents a unique name for the app whose progress should be tracked by the ESP. The policy provider can define any arbitrary app name as ESP does not use the app name directly. @@ -131,7 +131,7 @@ Indicates to the ESP that it should wait in the device preparation phase until a Scope is permanent. Supported operation is Get. -**EnrollmentStatusTracking/DevicePreparation/PolicyProviders/*ProviderName*** +**EnrollmentStatusTracking/DevicePreparation/PolicyProviders/_ProviderName_** Optional. This node is supported only in device context. Represents a policy provider for the ESP. The node should be given a unique name for the policy provider. Registration of a policy provider indicates to ESP that it should block in the device preparation phase until the provider sets its InstallationState node to 2 (NotRequired) or 3 (Completed). Once all the registered policy providers are marked as Completed or NotRequired, the ESP progresses to the device setup phase. From 7e1f1cb739ba64bf813b7bcc0f3970c7b6d48b72 Mon Sep 17 00:00:00 2001 From: ManikaDhiman Date: Mon, 13 May 2019 15:08:33 -0700 Subject: [PATCH 527/724] Added feedback from dev --- windows/client-management/mdm/policy-csp-update.md | 4 ++-- 1 file changed, 2 insertions(+), 2 deletions(-) diff --git a/windows/client-management/mdm/policy-csp-update.md b/windows/client-management/mdm/policy-csp-update.md index 9d7ac6f259..8e56b33127 100644 --- a/windows/client-management/mdm/policy-csp-update.md +++ b/windows/client-management/mdm/policy-csp-update.md @@ -1254,7 +1254,7 @@ Added in Windows 10, version 1903. Allows the IT admin (when used with [Update/C -Supports a numeric value from 0 - 5, which indicates the minimum number of days a device will wait until performing an aggressive installation of a required update once deadline has been reached. +Supports a numeric value from 0 - 7, which indicates the minimum number of days a device will wait until performing an aggressive installation of a required update once deadline has been reached. Default value is 2. @@ -1323,7 +1323,7 @@ When disabled, if the device has installed the required updates and is outside o Supported values: - 1 - Enabled -- 0 - Disabled +- 0 (default) - Disabled From ddddfbbf4d4a8080cdf8e9cb625dd020253d2917 Mon Sep 17 00:00:00 2001 From: Justin Hall Date: Mon, 13 May 2019 15:16:26 -0700 Subject: [PATCH 528/724] edits --- .../customize-attack-surface-reduction.md | 4 ++-- .../customize-controlled-folders-exploit-guard.md | 6 +++--- .../enable-attack-surface-reduction.md | 4 ++-- .../enable-controlled-folders-exploit-guard.md | 4 ++-- .../enable-exploit-protection.md | 2 +- .../enable-network-protection.md | 3 ++- 6 files changed, 12 insertions(+), 11 deletions(-) diff --git a/windows/security/threat-protection/windows-defender-exploit-guard/customize-attack-surface-reduction.md b/windows/security/threat-protection/windows-defender-exploit-guard/customize-attack-surface-reduction.md index fe9741366e..20e1ca5eda 100644 --- a/windows/security/threat-protection/windows-defender-exploit-guard/customize-attack-surface-reduction.md +++ b/windows/security/threat-protection/windows-defender-exploit-guard/customize-attack-surface-reduction.md @@ -74,9 +74,9 @@ See the [attack surface reduction](attack-surface-reduction-exploit-guard.md) to 4. Double-click the **Exclude files and paths from Attack surface reduction Rules** setting and set the option to **Enabled**. Click **Show** and enter each file or folder in the **Value name** column. Enter **0** in the **Value** column for each item. -### Use PowerShell to exclude files and folderss +### Use PowerShell to exclude files and folders -1. Type **powershell** in the Start menu, right click **Windows PowerShell** and click **Run as administrator** +1. Type **powershell** in the Start menu, right-click **Windows PowerShell** and click **Run as administrator** 2. Enter the following cmdlet: ```PowerShell diff --git a/windows/security/threat-protection/windows-defender-exploit-guard/customize-controlled-folders-exploit-guard.md b/windows/security/threat-protection/windows-defender-exploit-guard/customize-controlled-folders-exploit-guard.md index deed0e6c2e..28a78453b2 100644 --- a/windows/security/threat-protection/windows-defender-exploit-guard/customize-controlled-folders-exploit-guard.md +++ b/windows/security/threat-protection/windows-defender-exploit-guard/customize-controlled-folders-exploit-guard.md @@ -94,7 +94,7 @@ You can specify if certain apps should always be considered safe and given write When you add an app, you have to specify the app's location. Only the app in that location will be permitted access to the protected folders - if the app (with the same name) is located in a different location, then it will not be added to the allow list and may be blocked by controlled folder access. -An allowed application or service only has write access to a controlled flder after it starts. For example, if you allow an update service that is already running, the update service will continue to trigger events until the service is stopped and restarted. +An allowed application or service only has write access to a controlled folder after it starts. For example, if you allow an update service that is already running, the update service will continue to trigger events until the service is stopped and restarted. ### Use the Windows Defender Security app to allow specific apps @@ -107,7 +107,7 @@ An allowed application or service only has write access to a controlled flder af 4. Click **Add an allowed app** and follow the prompts to add apps. - ![Screenshot of the add an allowed app button](images/cfa-allow-app.png) + ![Screenshot of how to add an allowed app button](images/cfa-allow-app.png) ### Use Group Policy to allow specific apps @@ -121,7 +121,7 @@ An allowed application or service only has write access to a controlled flder af ### Use PowerShell to allow specific apps -1. Type **powershell** in the Start menu, right click **Windows PowerShell** and click **Run as administrator** +1. Type **powershell** in the Start menu, right-click **Windows PowerShell** and click **Run as administrator** 2. Enter the following cmdlet: ```PowerShell diff --git a/windows/security/threat-protection/windows-defender-exploit-guard/enable-attack-surface-reduction.md b/windows/security/threat-protection/windows-defender-exploit-guard/enable-attack-surface-reduction.md index 3b305feed9..57d6a0abd8 100644 --- a/windows/security/threat-protection/windows-defender-exploit-guard/enable-attack-surface-reduction.md +++ b/windows/security/threat-protection/windows-defender-exploit-guard/enable-attack-surface-reduction.md @@ -26,7 +26,7 @@ Each ASR rule contains three settings: To use ASR rules, you need either a Windows 10 Enterprise E3 or E5 license. We recommend an E5 license so you can take advantage of the advanced monitoring and reporting capabilities available in Windows Defender Advanced Threat Protection (Windows Defender ATP). These advanced capabilities aren't available with an E3 license, but you can develop your own monitoring and reporting tools to use in conjunction with ASR rules. -You can enable attack surface reduction rules by using any of the these methods: +You can enable attack surface reduction rules by using any of these methods: - [Microsoft Intune](#intune) - [Mobile Device Management (MDM)](#mdm) @@ -131,7 +131,7 @@ Value: c:\path|e:\path|c:\Whitelisted.exe >[!WARNING] >If you manage your computers and devices with Intune, SCCM, or other enterprise-level management platform, the management software will overwrite any conflicting PowerShell settings on startup. -1. Type **powershell** in the Start menu, right click **Windows PowerShell** and click **Run as administrator**. +1. Type **powershell** in the Start menu, right-click **Windows PowerShell** and click **Run as administrator**. 2. Enter the following cmdlet: diff --git a/windows/security/threat-protection/windows-defender-exploit-guard/enable-controlled-folders-exploit-guard.md b/windows/security/threat-protection/windows-defender-exploit-guard/enable-controlled-folders-exploit-guard.md index f6e6986c98..0f4dcde83d 100644 --- a/windows/security/threat-protection/windows-defender-exploit-guard/enable-controlled-folders-exploit-guard.md +++ b/windows/security/threat-protection/windows-defender-exploit-guard/enable-controlled-folders-exploit-guard.md @@ -22,7 +22,7 @@ ms.date: 05/13/2019 [Controlled folder access](controlled-folders-exploit-guard.md) helps you protect valuable data from malicious apps and threats, such as ransomware. It is part of [Windows Defender Exploit Guard](windows-defender-exploit-guard.md). Controlled folder access is included with Windows 10 and Windows Server 2019. -You can enable controlled folder access by using any of the these methods: +You can enable controlled folder access by using any of these methods: - [Windows Security app](#windows-security-app) - [Microsoft Intune](#intune) @@ -100,7 +100,7 @@ Use the [./Vendor/MSFT/Policy/Config/ControlledFolderAccessProtectedFolders](htt ## PowerShell -1. Type **powershell** in the Start menu, right click **Windows PowerShell** and click **Run as administrator**. +1. Type **powershell** in the Start menu, right-click **Windows PowerShell** and click **Run as administrator**. 2. Enter the following cmdlet: diff --git a/windows/security/threat-protection/windows-defender-exploit-guard/enable-exploit-protection.md b/windows/security/threat-protection/windows-defender-exploit-guard/enable-exploit-protection.md index 58cb4ad00c..56932bf8a1 100644 --- a/windows/security/threat-protection/windows-defender-exploit-guard/enable-exploit-protection.md +++ b/windows/security/threat-protection/windows-defender-exploit-guard/enable-exploit-protection.md @@ -26,7 +26,7 @@ Many features from the Enhanced Mitigation Experience Toolkit (EMET) are include You can also set mitigations to [audit mode](evaluate-exploit-protection.md). Audit mode allows you to test how the mitigations would work (and review events) without impacting the normal use of the machine. -You can enable each mitigation separately by using any of the these methods: +You can enable each mitigation separately by using any of these methods: - [Windows Security app](#windows-security-app) - [Microsoft Intune](#intune) diff --git a/windows/security/threat-protection/windows-defender-exploit-guard/enable-network-protection.md b/windows/security/threat-protection/windows-defender-exploit-guard/enable-network-protection.md index 8df4d37da6..75c4d76f00 100644 --- a/windows/security/threat-protection/windows-defender-exploit-guard/enable-network-protection.md +++ b/windows/security/threat-protection/windows-defender-exploit-guard/enable-network-protection.md @@ -22,7 +22,8 @@ ms.date: 04/22/2019 [Network protection](network-protection-exploit-guard.md) helps to prevent employees from using any application to access dangerous domains that may host phishing scams, exploits, and other malicious content on the Internet. You can [audit network protection](evaluate-network-protection.md) in a test environment to see which apps would be blocked before you enable it. -You can enable network protection by using any of the these methods: + +You can enable network protection by using any of these methods: - [Microsoft Intune](#intune) - [Mobile Device Management (MDM)](#mdm) From 4a8b2dc1f690a7f0edfce207b4608dd30d5de124 Mon Sep 17 00:00:00 2001 From: Justin Hall Date: Mon, 13 May 2019 15:17:29 -0700 Subject: [PATCH 529/724] edits --- .../enable-network-protection.md | 4 ++-- 1 file changed, 2 insertions(+), 2 deletions(-) diff --git a/windows/security/threat-protection/windows-defender-exploit-guard/enable-network-protection.md b/windows/security/threat-protection/windows-defender-exploit-guard/enable-network-protection.md index 75c4d76f00..a3cad38060 100644 --- a/windows/security/threat-protection/windows-defender-exploit-guard/enable-network-protection.md +++ b/windows/security/threat-protection/windows-defender-exploit-guard/enable-network-protection.md @@ -11,7 +11,7 @@ ms.pagetype: security ms.localizationpriority: medium author: andreabichsel ms.author: v-anbic -ms.date: 04/22/2019 +ms.date: 05/13/2019 --- # Enable network protection @@ -88,7 +88,7 @@ You can confirm network protection is enabled on a local computer by using Regis ## PowerShell -1. Type **powershell** in the Start menu, right click **Windows PowerShell** and click **Run as administrator** +1. Type **powershell** in the Start menu, right-click **Windows PowerShell** and click **Run as administrator** 2. Enter the following cmdlet: ``` From 14dda06cdce07261d5b21e92d470bc045903c78b Mon Sep 17 00:00:00 2001 From: Greg Lindsay Date: Mon, 13 May 2019 15:38:34 -0700 Subject: [PATCH 530/724] draft7 --- windows/deployment/windows-autopilot/white-glove.md | 6 +++--- 1 file changed, 3 insertions(+), 3 deletions(-) diff --git a/windows/deployment/windows-autopilot/white-glove.md b/windows/deployment/windows-autopilot/white-glove.md index 9854786c6a..1896289840 100644 --- a/windows/deployment/windows-autopilot/white-glove.md +++ b/windows/deployment/windows-autopilot/white-glove.md @@ -33,7 +33,7 @@ Enabled with Microsoft Intune in Windows 10, version 1903 and later, white glove In addition to [Windows Autopilot requirements](windows-autopilot-requirements.md), Windows Autopilot for white glove deployment adds the following: -- Windows 10, version 1903 or later is required. Note: If you are a Windows Insider, Windows 10 build 18342 and above is required. The Insider Skip Ahead builds for the Windows 10 20H1 release with build numbers greater than 18800 may work, but 19H1 build numbers in the 18300 range are recommended. +- Windows 10, version 1903 or later is required. - Microsoft Intune subscriptions with additional flighted features that are not yet available publicly. Attempts to perform white glove deployment without these flighted features will fail with an Intune enrollment error. - Physical devices that support TPM 2.0 and device attestation; virtual machines are not supported. The white glove provisioning process leverages Windows Autopilot self-deploying capabilities, hence the TPM 2.0 requirements. - Physical devices with Ethernet connectivity; Wi-fi connectivity is not supported due to the requirement to choose a language, locale, and keyboard to make that Wi-fi connection; doing that in a pre-provisioning process could prevent the user from choosing their own language, locale, and keyboard when they receive the device. @@ -85,7 +85,7 @@ Each of these scenarios consists of two parts, a technician flow and a user flow The first part of the Windows Autopilot for white glove deployment process is designed to be carried out by a technician; this could be a member of the IT staff, a services partner, or an OEM – each organization can decide who should perform these activities. Regardless of the scenario, the process to be performed by the technician is the same: -- Boot the device (running Windows 10 Pro, Enterprise, or Education SKUs, Insider Preview build 18342 or higher). +- Boot the device (running Windows 10 Pro, Enterprise, or Education SKUs, version 1903 or later). - From the first OOBE screen (which could be a language selection or locale selection screen), do not click **Next**. Instead, press the Windows key five times to view an additional options dialog. From that screen, choose the **Windows Autopilot provisioning** option and then click **Continue**. ![Autopilot](images/wg05.png) @@ -120,7 +120,7 @@ If the pre-provisioning process completed successfully and the device was reseal ## Fixed issues -Each Windows 10 19H1 Insider Preview build can contain additional fixes for Windows Autopilot and related functionality. The following issues should already be addressed: +The following issues were fixed in Windows Insider 19H1 builds: - Some failures may be displayed on the Enrollment Status Page, instead of advancing to the red "white glove" summary page. This is fixed in build 10.0.18345. (20355940) - Connectivity to the corporate network is presently required during the Hybrid AAD Join technician flow, even though it is only used to check that an Active Directory domain controller is accessible. This is fixed in build 10.0.18345. (20301592) - When enrolling a device in Intune during the technician flow, an enrollment error 80180003 is reported, indicating that white glove is not enabled. This is fixed in Intune on March 8th, 2019. From 5dc8cb6c1852377314ebaac4ae1f4e8b1db9afa5 Mon Sep 17 00:00:00 2001 From: Jose Gabriel Ortega Castro Date: Mon, 13 May 2019 20:36:14 -0500 Subject: [PATCH 531/724] Update windows/deployment/deploy-enterprise-licenses.md Co-Authored-By: Trond B. Krokli <38162891+illfated@users.noreply.github.com> --- windows/deployment/deploy-enterprise-licenses.md | 1 - 1 file changed, 1 deletion(-) diff --git a/windows/deployment/deploy-enterprise-licenses.md b/windows/deployment/deploy-enterprise-licenses.md index c202b6f22e..353bb97445 100644 --- a/windows/deployment/deploy-enterprise-licenses.md +++ b/windows/deployment/deploy-enterprise-licenses.md @@ -13,7 +13,6 @@ ms.topic: article --- - # Deploy Windows 10 Enterprise licenses >[!IMPORTANT] From 6040e1162d7e9720e47d80be71d545ff288f0b50 Mon Sep 17 00:00:00 2001 From: Jose Gabriel Ortega Castro Date: Mon, 13 May 2019 20:36:22 -0500 Subject: [PATCH 532/724] Update windows/deployment/deploy-enterprise-licenses.md Co-Authored-By: Trond B. Krokli <38162891+illfated@users.noreply.github.com> --- windows/deployment/deploy-enterprise-licenses.md | 1 - 1 file changed, 1 deletion(-) diff --git a/windows/deployment/deploy-enterprise-licenses.md b/windows/deployment/deploy-enterprise-licenses.md index 353bb97445..1c21ee3718 100644 --- a/windows/deployment/deploy-enterprise-licenses.md +++ b/windows/deployment/deploy-enterprise-licenses.md @@ -224,7 +224,6 @@ Use the following figures to help you troubleshoot when users experience these c **Figure 10 - Windows 10 Pro, version 1703 edition not activated in Settings** - Windows 10 activated and subscription not active **Figure 11 - Windows 10 Enterprise subscription lapsed or removed in Settings** From 528382e2207c4d93ef968cce2d6fbc579998ec64 Mon Sep 17 00:00:00 2001 From: Jose Gabriel Ortega Castro Date: Mon, 13 May 2019 20:36:31 -0500 Subject: [PATCH 533/724] Update windows/deployment/deploy-enterprise-licenses.md Co-Authored-By: Trond B. Krokli <38162891+illfated@users.noreply.github.com> --- windows/deployment/deploy-enterprise-licenses.md | 1 - 1 file changed, 1 deletion(-) diff --git a/windows/deployment/deploy-enterprise-licenses.md b/windows/deployment/deploy-enterprise-licenses.md index 1c21ee3718..f2bf17ad13 100644 --- a/windows/deployment/deploy-enterprise-licenses.md +++ b/windows/deployment/deploy-enterprise-licenses.md @@ -229,7 +229,6 @@ Use the following figures to help you troubleshoot when users experience these c **Figure 11 - Windows 10 Enterprise subscription lapsed or removed in Settings** - Windows 10 not activated and subscription not active **Figure 12 - Windows 10 Pro, version 1703 edition not activated and Windows 10 Enterprise subscription lapsed or removed in Settings** From de56796a975c25c688fc74917111f6b3b1c795d7 Mon Sep 17 00:00:00 2001 From: Jose Gabriel Ortega Castro Date: Mon, 13 May 2019 21:28:02 -0500 Subject: [PATCH 534/724] Update windows/deployment/deploy-enterprise-licenses.md Co-Authored-By: Trond B. Krokli <38162891+illfated@users.noreply.github.com> --- windows/deployment/deploy-enterprise-licenses.md | 1 - 1 file changed, 1 deletion(-) diff --git a/windows/deployment/deploy-enterprise-licenses.md b/windows/deployment/deploy-enterprise-licenses.md index f2bf17ad13..25a638d45a 100644 --- a/windows/deployment/deploy-enterprise-licenses.md +++ b/windows/deployment/deploy-enterprise-licenses.md @@ -12,7 +12,6 @@ author: greg-lindsay ms.topic: article --- - # Deploy Windows 10 Enterprise licenses >[!IMPORTANT] From a86151ad466a3af1c0a8319715ca5dd7cddfb8eb Mon Sep 17 00:00:00 2001 From: Denis Gundarev Date: Mon, 13 May 2019 23:05:36 -0700 Subject: [PATCH 535/724] Changed XDDM deprecation notice --- windows/deployment/planning/windows-10-1903-removed-features.md | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/windows/deployment/planning/windows-10-1903-removed-features.md b/windows/deployment/planning/windows-10-1903-removed-features.md index c7352cabdb..97d7fabc26 100644 --- a/windows/deployment/planning/windows-10-1903-removed-features.md +++ b/windows/deployment/planning/windows-10-1903-removed-features.md @@ -25,7 +25,7 @@ The following features and functionalities are removed from the installed produc |-----------|--------------------|--------- |Cortana will be removed from Windows 10 in all non-English/US markets. Cortana will still be available for en-us markets. |Pending removal|A new Cortana UWP app is being developed. Precise dates for release not yet available.| |Cortana on Android is removing all Cortana cross-device functionality from it's application in November. |Removed |This will remove all of the mirrored notifications and Cortana natural language skills for texting or calling a mobile device and finding their phone. The **Your Phone** applicaiton on PC is offering a partial replacement for text notifications from Android phones but not the full spectrum of features. | -|XDDM-based Remote Desktop driver|Removed|The default driver for remote desktop was switched to the IDD for a single-user scenarios. We plan to use IDD as default for all use cases and anounce deprecation of XP Display Driver Model (XDDM) based RD fdriver| +|XDDM-based remote display driver|Pending Removal|Starting with this release the Remote Desktop Services uses a Windows Display Driver Model (WDDM) based Indirect Display Driver (IDD) for a single session remote desktop. The support for Windows 2000 Display Driver Model (XDDM) based remote display drivers will be removed in a future release. Independent Software Vendors that use XDDM-based remote display driver should plan a migration to the WDDM driver model. For more information on implementing remote display indirect display driver ISVs can reach out to [rdsdev@microsoft.com](mailto:rdsdev@microsoft.com). |Desktop messaging app doesn't offer messages sync |Removed|The messaging app on Desktop has a sync feature that can be used to sync SMS text messages received from Windows Mobile and keep a copy of them on the Desktop. We will be removing the messaging app from Desktop devices in a future release. When sync is removed, you will only be able to access messages from the device that received the message.| |Print 3D app|Removed|The Print 3D app will no longer be installed automatically in a future release of Windows. It will remain available for download from the Store. To 3D print objects on a new Windows devices, you must first install the app (1P or 3P app) from the Store.| |My People / People|Pending removal|The **My People** experience will be removed in a future release.| From c9e0b1d57e0067291f01e82ca694727663379631 Mon Sep 17 00:00:00 2001 From: MaratMussabekov <48041687+MaratMussabekov@users.noreply.github.com> Date: Tue, 14 May 2019 11:13:08 +0500 Subject: [PATCH 536/724] update windows-upgrade-and-migration-considerations.md --- .../upgrade/windows-upgrade-and-migration-considerations.md | 3 +++ 1 file changed, 3 insertions(+) diff --git a/windows/deployment/upgrade/windows-upgrade-and-migration-considerations.md b/windows/deployment/upgrade/windows-upgrade-and-migration-considerations.md index d5eff8daa4..b2bade848b 100644 --- a/windows/deployment/upgrade/windows-upgrade-and-migration-considerations.md +++ b/windows/deployment/upgrade/windows-upgrade-and-migration-considerations.md @@ -28,6 +28,9 @@ Windows Easy Transfer is a software wizard for transferring files and settings With Windows Easy Transfer, files and settings can be transferred using a network share, a USB flash drive (UFD), or the Easy Transfer cable. However, you cannot use a regular universal serial bus (USB) cable to transfer files and settings with Windows Easy Transfer. An Easy Transfer cable can be purchased on the Web, from your computer manufacturer, or at an electronics store. +> [!NOTE] +> Windows Easy Transfer [is not available in Windows 10](https://support.microsoft.com/help/4026265/windows-windows-easy-transfer-is-not-available-in-windows-10). + ### Migrate with the User State Migration Tool You can use USMT to automate migration during large deployments of the Windows operating system. USMT uses configurable migration rule (.xml) files to control exactly which user accounts, user files, operating system settings, and application settings are migrated and how they are migrated. You can use USMT for both *side-by-side* migrations, where one piece of hardware is being replaced, or *wipe-and-load* (or *refresh*) migrations, when only the operating system is being upgraded. From da0b5bab3173f4f76393ebb99c18ee787d942890 Mon Sep 17 00:00:00 2001 From: Deland-Han Date: Tue, 14 May 2019 15:59:53 +0800 Subject: [PATCH 537/724] finish --- ...windows-10-device-automatically-using-group-policy.md | 9 +++++++++ 1 file changed, 9 insertions(+) diff --git a/windows/client-management/mdm/enroll-a-windows-10-device-automatically-using-group-policy.md b/windows/client-management/mdm/enroll-a-windows-10-device-automatically-using-group-policy.md index 24e4a9039a..b79c6c1219 100644 --- a/windows/client-management/mdm/enroll-a-windows-10-device-automatically-using-group-policy.md +++ b/windows/client-management/mdm/enroll-a-windows-10-device-automatically-using-group-policy.md @@ -108,6 +108,15 @@ Requirements: - Ensure that PCs belong to same computer group. 1. Create a Group Policy Object (GPO) and enable the Group Policy **Computer Configuration** > **Policies** > **Administrative Templates** > **Windows Components** > **MDM** > **Enable automatic MDM enrollment using default Azure AD credentials**. + >[!Note] + >If you do not see the policy, it may be caused because you don’t have the ADMX installed for Windows 10, version 1803. To fix the issue, follow these steps: + > 1. Download [Administrative Templates (.admx) for Windows 10 April 2018 Update (1803) +](https://www.microsoft.com/en-us/download/details.aspx?id=56880). + > 2. Install the package on the Primary Domain Controller. + > 3. Navigate to the folder **C:\Program Files (x86)\Microsoft Group Policy\Windows 10 April 2018 Update (1803) v2**. + > 4. Copy policy definitions folder to **C:\Windows\SYSVOL\domain\Policies**. + > 5. Restart the Primary Domain Controller for the policy to be available. + 2. Create a Security Group for the PCs. 3. Link the GPO. 4. Filter using Security Groups. From 5fc15e6d8011d504592ad1eb4cac67532c55f208 Mon Sep 17 00:00:00 2001 From: Lindsay <45809756+lindspea@users.noreply.github.com> Date: Tue, 14 May 2019 10:47:09 +0200 Subject: [PATCH 538/724] Update troubleshoot-tcpip-port-exhaust.md Added updated blog link and added note. --- windows/client-management/troubleshoot-tcpip-port-exhaust.md | 4 ++-- 1 file changed, 2 insertions(+), 2 deletions(-) diff --git a/windows/client-management/troubleshoot-tcpip-port-exhaust.md b/windows/client-management/troubleshoot-tcpip-port-exhaust.md index 8fb6da7063..bd7c5fd2f8 100644 --- a/windows/client-management/troubleshoot-tcpip-port-exhaust.md +++ b/windows/client-management/troubleshoot-tcpip-port-exhaust.md @@ -99,7 +99,7 @@ You may also see CLOSE_WAIT state connections in the same output, however CLOSE_ >[!Note] >Having huge connections in TIME_WAIT state does not always indicate that the server is currently out of ports unless the first two points are verified. Having lot of TIME_WAIT connections does indicate that the process is creating lot of TCP connections and may eventually lead to port exhaustion. > ->Netstat has been updated in Windows 10 with the addition of the **-Q** switch to show ports that have transitioned out of time wait as in the BOUND state. An update for Windows 8.1 and Windows Server 2012R2 has been released that contains this functionality. The PowerShell cmdlet `Get-NetTCPConnection` in Windows 10 also shows these BOUND ports. +>Netstat has been updated in Windows 10 with the addition of the **-Q** switch to show ports that have transitioned out of time wait as in the BOUND state. An update for Windows 8.1 and Windows Server 2012R2 has been released that contains this functionality. The PowerShell cmdlet `Get-NetTCPConnection` in Windows 10 also shows these BOUND ports. Until 2016/10, netstat was inaccurate. Fixes for netstat were backported to 2012 R2. 4. Open a command prompt in admin mode and run the below command @@ -192,5 +192,5 @@ goto loop - [Port Exhaustion and You!](https://blogs.technet.microsoft.com/askds/2008/10/29/port-exhaustion-and-you-or-why-the-netstat-tool-is-your-friend/) - this article gives a detail on netstat states and how you can use netstat output to determine the port status -- [Detecting ephemeral port exhaustion](https://blogs.technet.microsoft.com/clinth/2013/08/09/detecting-ephemeral-port-exhaustion/): this article has a script which will run in a loop to report the port status. (Applicable for Windows 2012 R2, Windows 8, Windows 10) +- [Detecting ephemeral port exhaustion](https://blogs.technet.microsoft.com/yongrhee/2018/01/09/windows-server-2012-r2-ephemeral-ports-a-k-a-dynamic-ports-hotfixes/): this article has a script which will run in a loop to report the port status. (Applicable for Windows 2012 R2, Windows 8, Windows 10) From 0e1b2941d4194dc493eab21bc2c21ad9c8c16d05 Mon Sep 17 00:00:00 2001 From: Lindsay <45809756+lindspea@users.noreply.github.com> Date: Tue, 14 May 2019 11:08:49 +0200 Subject: [PATCH 539/724] Add files via upload Changed screenshot. --- .../client-management/images/tcp-ts-14.png | Bin 290534 -> 273444 bytes 1 file changed, 0 insertions(+), 0 deletions(-) diff --git a/windows/client-management/images/tcp-ts-14.png b/windows/client-management/images/tcp-ts-14.png index f3a3cc4a35df26eb8895c9d5582853fcd241f873..b1db37cd1a1844165e20e0c2b2dea8f9ca8c9c2d 100644 GIT binary patch literal 273444 zcmb@t1yq#nw>LcCC?Oyz0}{h9w7@WQ4=_jwh%`zw#L%50AuTa&6<0zd*8dR-`-c<6Q-&nM~F|24*&oN737g>007V% z0KoRZ#lCIva`)i8{lasQ*L4N}NL~JXu;$I_Jph1v9cT?57ae6K5mS3xE@PCvi5ZuN zt-~!h03asm;b3fPZRP?tF|$D1i9`0A+8|&wN*toiuMAUmkTJ7F%X>MQse7qtn0i^8 z3Zo#B5@0b8ky`<_W-i8H4_g~MXAuu^$X{|rZm<6|b3?#?vA9@^L!|yF1nVfPf@SQT z%)tCy0-UBieEeWRVJ;p4UOr*r$6z>&M~E9H#LdIY$s-`b2NQwA!T%=6tu`l=xriF_ z$-i~o{t|~+y0|!qaC5u6yK}koa@jjsaPtTY3v5R!Pem)v3Ab?4%2PGxIK&=xOuo>e_Z;D5oP)h zpM$HD&0oqNUChKGf9`X__&IraHF#hmJp3a30vs^72n_Zw zR%Lq>+T8R1WaSaz<^SLKZXts*b}|0%IZ>t}=Jrmu#<$+0ZH+C=xE<^)AmD#uC?aET zWAAjU^42ci|J<%1BctkMZ;rOPz2U4TCk%{T@4;Jk1?0TVM5KGfgOBkfIH z|MdT#=l_)oD0|ae8UJCPF)s`*AP6_%MDYspahjm`j5&qi{ARaT0>VPVJc7n>Grqs2 zJ##|eW}~sqf0p{kD%7n+L17^iQyxxZe#a9fgtz)&3GBxHELjB|Y|7ra#WZ@z_e1D_%|E2Z+4vwj%v7Lq4ZIR`M{D1K0 ze}v9|8Tw!P^G^!?|LP3)pW6B_oN@m@A^6w5|5S%>`|_`*+v5J`@}E)V_QyZtl9}CY zoSbe)9TC{7J^;vsr+}2w@JQcjarcADxt`w`Xu3ZmN^_oXNq@t|@>x9*a5oT$3&SQ5 zSjejE=oS!qWNHe7ghGL&U_7%;mCgL7@zwP4z4^6t3pX`)?Un_4abD4;I+nSNK%km0 zqRLtP+c(W`-}FzmfcQIXfxEHn*SKM9w3iQwxZgmi?p`KZg))RZ%*i|rSVNb1t?^-YxGwt z!L!l^N>H^{Ys!r61MoYfs)zE252N^zjbkapqo_!S>#X^}qiU;04u+^Ufymz?tx8m@ z@|5&3(8WM+MO;K+C=l4^jvr-~u1ltLqg-cj_zo|c^>&Vd71i{z_`X4}y0F$;N6)Ax z3cf`xRA%tcE81AV@b3yaow1G1^z~yqN(!0l+4g!o%<0M3HXc0>3C#}qcf(v&e}X$aV^eD zL^12mdacq&$_!p$=lQ7HCx_G_W4$vaN+x}EBxL(=^C>a0c@+8by(#B3vtKpx*dM-% z+Ll^kyz1VmC?;C$fC1nFgBKVteDHEHmEm~U+3Ku>SWXt|b-}>{OoG3XK*7BF0}$2M6>mj|qT-a?e3SV4ZIm}76R&cOWWk=QdCkz#J!RLN0YTM|>C4F@ zySy`ZyCoZnZFJ2=QC~$&Z4}nTT47ZBl-qLfG-m)M3B`>4GWcFr%C3OK z!8s~9wfxxtgR=+i0-P+aAl1@jE#=u^pb|VfeLpvaKZ8#f9?7TSGexrP(&e2()sj4U zbw#WsE=tz=5?A}V^|v0z>r`izP6cRr^Pcw6i~u+f#a(Hj7w8uV=mm`TD5xFMCez(x z^Q31o7n7TSrM#lVzJu9pF!5scqsm}kR>%HuaMZNoh#lPbYDiEjd4-HOOByw?Y_8mn zhq4Ma!j)EeWyRYw;n>iErUJw;$P1s+N!Z(wMQ1}(tM}q2-eMKLFprJBF_vVJKc_s! zOQyDETlR1Q0%GGY=z7JH3Jhz=hLulPQ!x@3%)-z54syLmXRgG~S`FJRtc)5qI9{|^ zmPRGHoSYSzaTOc3+;`tHnfV#rFt~6re6&#GUP0TPv>09an?>L17vuG-m&2d(_vfEB zr7gd!*BPH{2xZ)be&;6Pn_vkk-djfO(Z0a35f)7IuHI9^WyDt(~|4 z2_fU}qs{F1++NclH@m7wnlR=QWO<@*M%RWwtd2iOl>lS_e*jjDE*bJkD4-}u)jtp^ zRn$-&Gip2pT23c{$jHyDLx9p4`GNjG00{d20Io3Kmf3^ zOPK@*zE~^{#f6;m$u;n$VD7DI46~P)_fvgu{k^eKWFiENF#-aNHeE_Dv9OJtI0e`i zpp=qS#MrpqOmf8Kv!x%ub8HRh&pc|n_e2StyYihrK+{^O%uDyP;&!B(FYc5M&N~ft z2UI!_Molq1b>-M%Jwf@UV4e_scEqc(qT!u;7Yu;q4|=-k4nQ>~Q(27;Jk^zpJLDyW zDHbRsQ3BdyGw#ZVtvENL`0T)fevW*OHsbru;QISpg_>FqSF8y92q*R}cW8F-;@0rU zm0oJ4b*AHoj<$B3j$fsH;xm}sdaox`z}M7Xft`Yod3Q#$PZRN(nAXns`YY47=?&DH zrJ?mqO7H}33u-B*BQ_hq7yLW(MIP`-?kNg{| zXu3~0zvAGnEJ+_1em$=5T`pe4Chlo9G(m5s@4F~m=zXW){@BW=HF?&@qBo|yKWg!U zCt{uEMn<2KYx8jm>A=SBNy^iv%bA8mWoo2=L5D1|i`--@zmFxR9zcSXk_*TM!V91k zorVt6tJ;IQY7ec%T+XKjzyB)GT&;RYz)l-`22cR%W8KTn309IFp#rh0;u6!uV96Ac z!pkhp_l{S!Rh}V-e(kl7URT)`BHk&e5Z#k`Q>>zqVYFqmg%`@gx(JNEujj}{s#Zip zK@`E3?${|0G7sQEL?LMWbm5a}%4MZ;#JHh;xSn($wzkaPTBVeJed2tPBNGWLWgkVh z>#M1WR^;wam6HX6&YaNMumUUG&&Zry)xaNxs^kgeg!uqAc`0>SV|f@57Q_+$sSlHX zzxVJihlN3<`G-y9x`R;q4<+VgC0sRVk&@=~=ObS`M()O9sojmdBLg*pG7)2$_6lLh z)l$1M+B3jQtV^W5P&JS`$XNv6f;&@_hbeicW!Xl4pXwVUGlMpHxkI5mI+jn!BArJe zHlNS$QM<5Wl-eD28TBMR7L^UK3#$>k5%t*Df?|eo3=@bMAElvuBcc$BhIEW69(_d6m&Yq-T`q~Jn)oAsnWW2LIprr3U8TqHTq z(R&LG?(?4mr9Hk)P4tY7@>wqh_QS1Kl}dk)T)V}EN{a~cm3^>sn+y2%wCj{m4kzSO zB@#j+_rO`x&}YV`rm|&OL+)|i(w6uBiR3|7&SiP|^Q%E)Q&ZC;1BX`EqB^|-uR3|d zN5e;Rif`60UQ1k8Px{PfH1Q5i@VNqqbk(aopLW+VNR1h!sr`nv5ZL>$TO z99>P8>M{lr7luWAUOp%+EIh3rUUuwZaUKxSUdpX@bFL%*E;;J ztj&}vuvR?<$t?Omm(B$~5AY9plg36chZ~53DFlolmT2k$$`<8%AtE(U>w~YQg~93S z2NJSd%nbw%q^Sgi-QwY$Z^@OaX{4 z0N&;&a{Y_@LEAhQ@hEZE83F z{;kSld^1YLhtC)rFxmXk%PJvMkia!#bLUB?*hn?%g|__d>?qc zo}%upVl+LQyQJq{+o2T66znwvN!3z&`EmzKBZJAg#A5UL4thsjf4;v!opxinu-N03 zaQM8F%hl`7QuZSDRCNOyOjxE4WYMA6T#uiuFiPUt$l}U@hde#nb6JBC9}x%W7Pgey z+MZfZ{-qMyj!I8q7zF#&hutG954c-pPOv9Iy{zUWE44y8lEFHh@tm5^w3CqKk#Z6> z$Kwp$SVAvDAGs@et<_w(^8TVP5 zcM9NP+{Q3B+W^r-e1lVUbH_QNKF2uO6a1df-Dtm$j?v0;EMuEJ<)a9!{zO#{_v_(d z?$+UK%m%Iyh(Bw0Z!Cz{;&Q9l%Gq#aTS^nA+3$ZDXF*XQ#8D@boVFVx{4_~`&UW+O zkQ0a1J8};wAW&r3h3HA%i;iY#k=G@azF*_fR|t}~Pp|;>Yp`EfW_&bnKYx0nBPhKK z04P|4{bO{JT~hcOkw#s#vzH{yCPVM_r?*qaRp?X?xiw96nf0n`!!mEw+}| zCcf4u*A(fzTF&d_31zDsIj9=FJ3Wo{OwfXcS^Xbp_TM3t4%sCY+dE^iE0JFg+iOVaqVzb_MkKR#_|hZMU%;1 z|Egw#8BD3!>L7qkQ-X$$PC5B&%c9p05DLovAq`c(Y1cMJdJ%zv zq?)Sd_rEylN!V*;;uqGvJbv=5ng}#M`!QAbKIOn5rL??qa0}5q)gusFX3f?|wNB!g zYlk9D$q5*~m{c#u`;~vd=Fvm0UVH~af2!c}EZSF&^ut-2n$Hur&FyqPxM7J&!bC*E z35bc80^0**)yUHAXmTHUsas;S<(bA4E% z%S$J9q^6Bfua6lh>-Xd~OdS2+TIB zYYq_wTh-!xBz+vTXnsGO>|B+c;&7#k45`!Jg5 zG<~|Isu_2#_4_BZ>!kA4z}V2}@*{)q-iPw_%R1isOCJwE1ss+>kKQ_ClaaZT@w=R& zPRPl$vRl9BR8YL(%8z~ERYecapo36(W`?AL+gY?b9bSgjV-7v|ZuyLL3k#9WT+Nxw zRN4AK{ca;#yG$SIE=m?m47Wn28u)B(gubZq8vM9A{tME4mO_}(@MU69M?>&k>80ZS zG$(9|j1q`ca4$c4kq05p24VnRW|`RcqGS5V7;Vceg1;7=8Hny{WU*235z0DsE7k4E zFqL!@n?Z6sX7Svy3AlP?@l9j=7Sz{3b0-69J>PSKc=zisCYnl!>~};jW(DatSPibG zqxD;}KQz~6o3iGL-q|QhV>WoTIZ{5?Y4&u@_k7~PAett8^SOoX>5^u@^UXm;7&0-r zs;GB6U3A>r$X?Ge725r;F!?C&OnsSnE@7JIQZ z_YaTI9@!N&wpP14rHtOeu*uznhrmnGT0Y`Lu4K_k9xt~edwLNv?y>uc6|P16HLI12 z*$ikEl_h@`dMh4|N}IX5{l>!6pc|2&Ui%KE_7}5biR*Nd-#Mt?eBt6&KYEmPRq-wg zj{)Gf`ZW=CzY~_9ZaK15_M+Kny2QHVuJx;fCho6wr@?ADL>OlSxV1StCyU_jIKEB%$U-Pr`eu>rOAW;hf`)?fD z*vxZI5N^orPzKK%K5szLQ)JYNaS^ehx*4d(5cSPc`2&%|k z2>;vN&(p#hKk$KbKD2VDG;3N?CLVGg(Q}?1OSnF^bF1;2pD+8=xHAj9cp_(# z3wxWOe8A?vQ^GMhX;4%D?#uc_^M$b2jZ{KDKvqZ&neUkWUKDm>rOz>flg2kX@{NAW z{_Rlu+KOG4oH4@)(3S~6?!Gi$E%3Y?Z>{D%sqI>%|b z${z`S@Hx-rRHNw3#M=@APa<5 zqD&Y;?PqZWBiFn8{t6Ku%}o5x+UrT|yoVOEmuPqES&|*eudh)Krg>6=0|z3}jXdvQ z$*aTLo`+q1r$5p+U$1}Ur&la}Ax?dNeQjOj(V(_lO+V22W7mPUp@0{yxXc}_XB+iY z16d*&ZXxMj&DDIMAhY3$5YU|p#ZGJd7pUuzT2;Gy(NoLb6d@QEd z=KS(1r&EGHv7&x6>LMm@=9ETAO|ldlNV(wBL$2*xbntC~o+|&SzK@hJrLy)i&a(>t zunK3EcrW~0*4)?^#>UW7g7~`$=msfJV?E1XGrd2vz3#O!sq|M{;c<$37=l0|;3wc* zpb!E$BJ9zaH1OKTcld)YsM+a>O8J(Pv#DiuRjVhefUolQ%MDJy*rX`%mOh zr|Buq?1v?5^FQ(2S5sPM+#Yz$mM8!~366t(N7&cdXXNOz$ zqAY!FJP^HV_f~%3Ju$$G2n8qsr4fBfSi(dh*w~EbI$N}6Q}-E3A})nll_2s8Vq7Un z{sAcVk`fl=q&yDu<Vf{aHE|(NQ?A3f#1@-M`#4 zQq(PrCf6^mDkn2Is%UXg+Tn@No$;UWZ^a>bu_-1Rj*ZZx&r1RM#Cm3(k%S>Q5!a6m z=Nql<)?_Tsvc#R2P`*Wi0(~vSVWXp6mXF1tj8hu!-kH3_$08XRLFaG%h>i2j@xe0v zmc?Yp>z8anQW9;E}c|}2DA&G-Fa&{n*!T@=p(gwM*pEoWBFCY*TSX2^@exjMEO0K3knAf1Ig>a4pk?g5| zeCvY&QEl!X1GnYXyX2Qg$#y|8=7CDV)9rlsvJZtAqX8KRQoMUz7zMt90Y@QW`LALF z>ZKQNc&NiZ$md|=GX}?oeg@vh#${HP9X$?=km|BM&Ds;IZu%ApAdpfQD}lS51LxIW zY(3_RsO@pI7zQ`em}?}ln%Z`rghaV}>zVf=>x{~OK?pl279*6#zjUO4B1u?yN<;!k ze~%`E8Gz19@}`ENgePWK)-)XyPuZV}lE%bvz4Ludq7<6$uRFbml!ihYp)}M{GGYu= zLT~8ocg-~CeIBV~+U?S+G*9cJO5~0xHCB*$?{XJABpl2(&6pCdO?OE`xJ5;027@m} z$Yd_oj>WQu*Sm#|fbX6;KT#o!h-gK({(}>NBw&Ep0@uAbdA<1ARuC4#DFM^;M%Ik? zVSMyuwK1<@_GFr725&qs{JRiribN4g6BT?pG@82=;3qKqkREMC7{d7Cz@_esAUQSY ztB=os;Mfd`I2&dvE+MC;Q>EVl66;<=^F{YIRN4UpD=b+lV`EiCg0j z*SH&UXQ!>gL)o63U==VS!4z>~Kx%mB_mxLH{xHQt;gN^O&r+TnrJo+s@Yk6Kznp;+ znx2gKfZq#PciuN#TQ0{J>KQPJC&pUBz0p8kJpAD zJDi;a4`ovE=n+6q-Op-IJu@h*t=7LDsmf`nn^rPNkZ#hGbmA%b1%&4a5#T5m@^)5yqsG_RjpI#X>1Ly4y$m~Qz%)TpoILoBASiuW%R|hEd zRzz}nbK>T=w-%FkuY4|Q8YBdqb}U1LW5?O8XYcYKZ9AFzf7fg0_ipsdCl1|(S0Wa0sr z1rZ%ZKY^2_E$ls11L!^Bxu(rDCwKa-Cy z0YAtIejE;j-tD|i%9*L3U7aEO4QE?3N%KQ8;*VX{Rp6cD=S{qv)1%syaIjSGEFAh73JR0KrqGag+#-q}Fmi&9((HfXDol7^ z(em!sMj@^8sLoKcsMbR)fa>@VOVdkgLLS%HUMlmcm#t2lslux&L4fSnoo7UuHdgLK znW^g8+5`1f@RR}EGs2zA6GoXYTH0(wIdRXLT}*V83=d+g*ELqn7`lQRha_%xTOwhg zgeea%jlQd2a{Dhofm~>(nvU8hf?@5al(psyjdq`HwbyT%Qw`4deJs#0tG6%zDP+EY zq2(S~zxp5kVQu8K61rm-0ZT3bKOmR?edY5*A6fiJW-$UN&gP+lmG}(VL%h%Q>R*tP40L5!TZrt#p zad94Fp;rcVsoQQWUp;gpL-KSDcp(uv{-J6*d^JWzi@-<_UWK;<@Jr!}`L;|8;}a;! zbA83p_>vr6&KNuWHS*O-;lZfq<-#eQcQ;&)1&?LZgJ&YTH9{CGYPAR-1POnpV#>v{ z+21Ws7U%pv!5Kp4SV1O_jfWzL2{92FpIxQEQuLSuxmH^Gewi-HLqYS+DTLm#e+-VM zr5p8cs0zfWVTx0OO_E1#qUAW)GzMYyDcaHeAxIQ7aZZwyy{v@m0g?JX;wiUGo51aX z!SWHSE}c6POId2LIEb{V4>UcFc&>P-{0ml&tmO!L~$+zaz|%HbPMs4x1k+P9QR z$*;@=j3o`l2r=GmK&1zg2SACj01!BGt<)r{jut;=WjZqX)Pz(wew_R8p!~%&0g!-}iK}lj(ADQ

    R;jWaV0WP7X^D-0HqaBMEj+!l}G<$Zy;{0O-SPP$HdcJTAqj_T8QiAKnvdKBE<`QIYok+*%d)&LfXsneEal0?fddN|Bv+-W z+6h~|$57uM;y$JjCt&6cx8D`2i+rzlSF<+2S4*K4i82|sqQZK*5Q@K6dy(w>iK@|= z_+kEWsLNLZ@cQfku*&~}BvVyTEexB1BWlzK34(0s2p8L|!2dE$W2G@+Ucr0gC;8Qn z-T}gDkdOUNCJdipZMr>NHllZP`Y>Nuep#C zyOcU+k(G&TFO0>pqYLJo3b8Co;AHZ5qybj`fR`{!Eo6TRR(*Y(>^tOGkuDS1%zqRd z9=>yP3X==tK&Ua+k=fvXNlaM62J6NiGgSX~9Myo7DcV5U-*3Hc=}B1R$2v)d@eDx1 zL6nEQ<}}HJJ^XBTCxWyv$86!a;aLqLNWMtxMSj=hTkHFgmCN-o44L4VML?&-*@`3R z5&Irj$?&t$&8cLDOb9*Cvi0dTQXEX)4b=8Oe)3ytc#(I0_=Q5dB}> zFCoc$L{HvHkkYJWLR#8QnG#ZB_PKAhj-dh|(pYp|PV6%%Z`2oKAeDdy`eau`i0a4G+{XY(O zfpvt(4^|Ka2y>x3N)zRXU4NV`mv-t}v%<^#4pUfJ+4U8WA>cx9VWAN=BSbGw83dLO(*q7 z0cc^`z+5mqA|%15|D+mLu)FAnx~D_i&ch<1WaUKU8bXRC)o8d_5nF*QOORmaZHzX3 zJsa0|go#7|_(^)W65PpzaJBlQpv%x*^v;1uspdXS&8lNA<2l9EFdKYcwzJELPDq+! z$r-NA>G$bHo1O`@XF#>5V0OfcKs0XR+8L|g*pOmUlzUO;)Y+!U@Ut7YfrUeETm`z0 z#Y>1)qsAVNon35C^)d?B>K_(j;PiwUJE8IYq&{R0lhhmn4KKsfEh+?9iB zT+J{_K@<1LFA@bq)>VZXwCNyy zgKh5-t)S?{ds*8s%*xsAuj^W8zg6&BzYC%)1CDExCTYEn7uO35!|CG|BpaD9(P&GflR)x(}70~-T?Uq24qioq5P zIfiLK7HhAkvi3PUWr7EZ?V^dj3|3qPj`CljNmRQ7fB2{9#F~v>{sk$=NVlE7bK4fW zM{xkc?{UCa969{dq1(&zdeKb>x_LAP|76Yy*;BpHwiID+8Dgrk0=Temp|(x2ZD0YfNGRdTwiC#Q-~hD?IX* zZwUzhwtIWD4!^J`QNp6!9ITuSkYIp(P&_|eVMSNVhGqja1c&v@fVt)j=TIaHo&WdB zuFaRa5D5ULb~^#f7nk+!)NT{`XkDlKu7B;f_UM^9ygy1#yLTHUe7~7m%^iC)#9>2` zh~#C&*9g;Dhg0NaH>pf9iSV0!*7^AoZ%KR? ziT%jso?*JpTm!M*hf!5eSs{6!T6X0c?W98}Q@-7H3F2~UQdOj3C3WIIx`lMEuKn2| zDHxZMEB_w7l^(?H)z8cyFmor@U3liPbNO=W>s^{U=HCb|d(8OKFMlT%ZmQBnoAW zV0SXk<_*aII0^@BxNfG5<+uEq+LERCTiA+H!%12JLX`}ZOIqel`m527rHlTwvjexf zxF_R)@p^d`BlLN~@?|E`8uX73IWF3dw4xPANbtc(<^j1%HzdEDsL?!yp%0aTIO>x;P}envNUg`j4d3I9oB)Fh{z zcAvh?WN1ieVc>>3kWls~s+fYUefL!RlPNR)dWZL(@|K)aK|0zoLVfzvL|^Vb7IlbQ z9QEg&<@T$KfBhrpl6|C%cfqYNx#q%lzF4PfH>qnI^ZPo&k3L6C?kZ@ZCuyIk?+GPkC{OA5)mi zl`B89)5{u#q{EqxTC~c4ilf|Q*~k!gc6#x(*3DJmpSElFSA}EES<(o#jZ@?)X?#PA zb2qHHe(PNtkbX!qOkGSBc&!-Yt=0O{7r1wQo-F#N^5ar?JR9ZoMLOhlb-OtMF1HBh zkj!>%s{{+7mwRf}mt_-3e0qds@ee#AUC37=$m+Pd}Z6!Nds>dW{F}TDSdiZMBD{{eH>P}M3)fwIwXA<$(q2*3;?&=SJ3dpjcdL5k{ z1Fb(%_U=<6cTW3CavCT76)A#+y-Q5{X4U~XGVMTG99_R1iz0EG2fmw{9;N;+N;Uz{2Nb70rHEFM^}HsOwc}BI`kTy7IT?G+~}6zxkUf+}!?V@;V()sb@SmTGRI}6y7GiFVa`~3*4c$)Y@gGxjUvha)%4BEWluIzW+p%X8xL3r{X_G{xe#q?Ws(NuXa7v%%y_Oo<6N) zTar5s;9H;gsp>*T3Ka^Qs#Bq!lXPPrGfrFS4y+X$`$(_<8n+(!O4`W(Bs+Jwwr*ta zR#~y^MLuY)*tGqPxa$`fa!j&zqUKIxSynmwZ1<4bb!^JKPb%{2zGv00U;iZOUXfz@ zy>^k`SRj&Rko0w#)P)wao!Zp93N4z9-wMzYeYYsn<0D=?kPW;TP}{O2(JV+tnjSy5 zTtW_PJY4Di_R<~jweN>rWgnE)C$C7M--k2zE@Ry`d!9JCpf5DZK(y7r^Zf4L?Pcw} zz-Z-?mHv{-)G`Neb^H6kOwnG2BtzN{uU;CGy256X@ED=Re|(N{K|+c~|GC7=4YB=* zA{JLqxn@0J--)S~-je&r%%nuU*^PVy_nfJAYSGIEuh@&I#Jxe}6Zgqt%Y@4xLw1Gr z7D8eaAIp&dB^(9rlCzsW&Zcww5tobjS)JY&_K8B~u3UjXpu%4PMAnE=E^KVDi|u#2!DeNaG*R*KPkY~%cv zZ1mbYfTN*Bq$9=i-v^J_`OKRtCtuLIiBl$WxNa6diFsVFrgZ}-M zPkI8%tK2~3%KY*EyztmA7QQGyGh7nFc3Qxu;G}o=mE-NFzqj~VTCI?uPwyu@dM$BD z8v=tl1KS<(H^0za48DQaOt_KEbnSkK>XX;(P)p=vC-q@#1Du_9EXjRgfd9%`cvUT0 z3)eN#obEp^<&fbF)AOc#VgPYy%J7t`HLdq(#yy1i&-VaqSz(jG<*!RSH-F(cdN-6q zwf_{}ycd7>{f)O$u{`-ZB?(nNcdllAS228ifOS=)8)0pby1`f|FB39XMjZ2(TCa1q z;{IbYYjh$1#qHkEN8YEg9cF$37u;o&EK9Axw<;+Ox)(#&dr6Xe6;0FQ@4d-vbSvCh zwpVg;i<*ov{;3u_Z0>o3`q9B-zMJzYm5&7|$3cayzFGsUh6y-6UIxj3h>B^AjV zt2K1%uBdE#?G&ui{hB7@i)#!1vZi-#z5+`5uR!k3?K#!YO}-Mc6`CV2K@PZ!YJn>= z6U$`{nZPb@%QNASB|@Q28+pL%u?x_a?#og)yraolt#4R50ci8aLmfzO{j+(1BHnwk z8M^iEyyZ5t_d(d7asTSPBG~=$t5-wC70f>0vP6Pnoq3)&n=o@fer%+5R|^#M&9$iq zIVqH~l6h!ls4hLgMa4B$B-#AKowj-k+w2ukq!-6U?1u2n?}>1VY-#{;4#zp_J|}B)aSn~nU%I7T&g9&*^pT)z5`1)M^xWvu-;8eLw4MOB3v=C^xAA?;@ZJN?=kio*>dtYl`Ism>CAaL9l*3<| zvmkjxnrr*>2a?US&af7e_}8D^S{Apcun#mR4@OMYM+-U7=Y*W7?}lGTx&=JL*$Qf? zxa2OKt2G?RG@pFZ1MW1uAWsc*I~Z|ePn;q9ttivFQw_m>4GRAd_MF~dr7pm&w=A-$ zsi`IyzXMRZpY%Q{h}=naJpw=flda?*%o@FI5xngx4l@|t@&QPR%q4aKbz5ns&Y9); zy>Rxq$g&^M>FgWlgm~@;uB`wSqAK@^XW@cC`-7Rs5J=SHD~5A>STiT;RpCcc*=!$?_lE$p&C40Og)s&pY+$pClp6{>jn_JLYpCQ}Y#hdRH@sYeaoe zot!HLX>QW9U9q!@`ZM0oPhYDDIiz=OS^TP_x>0)#TKIz1CiYy+aMs_0otuVvAFZmg zwS53I1F--D~ZlJF?||fH+G{N zare0+OSNSw2aPO+{0|(bEfn!Wje};syV8sz9{_5AG!_b^c%%wuaf0DwgTSUYN5GCL z+{Dzhdyg58RkmY_bjWu-nk-(T|3$rwvy}2V9VvJeJqHkK*y@(rvT5nGrd=-GIw$h3 zs2$hhUY(%lU8dRDuX)WowKTzNeK3nYR@P5sY}j&U6NYHo|}C0D_;Kn^M(qE|B=_r3K$KCM_>3I++;c($CrIG=XhtrOg?npQ9vFX${N*BED8VYe zavLF`J#y5t$LUS+za(>8m49TeyDR5C`KxMtNfSg16!6$yFaqi`j`0||`&R~8Ew~Le z2b6KLvD5*-$##u=mi)MlHb%|`lG9h^b!K^9HiS(?$|DPEfM#QE{iWZ)ux9T`tpQYj z%9VWxBJU974W~GZDp_*4I&^IX3IAEptRZ`|l%Au`2+%nE|020_{>A@yHQ)a(+=}{6 zMV${Ey88dpWOkizI&1vz8bS_d-~THllmAOB`Y%1=?f*@nxmlh6Z?E_CGq5G|-)hi* zd#S&g(En>Bx&J=$bCqfJ6YQ9$D^!8GS#_~`~U49ciisIzyIGq z53btO)o}kG&;R`_y$6=}KYSPPnfYy;|Ns0u=o4}THqyZ*5FP5$hB9;UU9N!BXWG7B* zKvvzfFTXkv(@pdMJ^QtA?nko4HtjxdO0US%jOA-(BL4;mnJGT5^ zHnpg>Z`WF}wYb5N435jkZ>)ijo8O&9K+iwk=l}Z^exDrr&!-%E=$IHN_jiEM??ku? z!6g{`Yi>H2==FVKWe|A6&P@3g>d<@5P<7@vuurDEhn8voX7Q}VfQ{y*3xO6aLgg=77k@3_W zd;19;JCea0c(xP$LCo0{v=jX<0e(^q_s7@35Ogl5UT5H&B_7PurT^H-s`;N_von2! zu*N^$vAVy;Cf_s#nOEh)Tp|8`l`feTy&;cjvp5+rlCk;VLJR^qiexV2J~}%>;QNSJ zHW0BbxYJIH3-f3L@DH$YzG}ds!xGv9n1c%VQJw{%i5j+{hzUX_=M#tMSpzrgxJ`rh z3;N_yZIK}C;V5h+kPW)xgb3bZ@qw;3xdb2H{dKDvikgMq)U>nE`p49SX*K_u8Vm#2 zN49^}{5KhB)+Ux~uSJODehZx|0-&wAs>|>~I(utAH5B%L=;fp+`Mj$wISbbLyN97ucdKi%BC^v`*gA-Ow;m7ke zxJe8YiSlv6@1Ph)**aF((7n>(|7}!2F7y|?7OZv`_W*-@7u-Ho9MikZYjN@%^SI>? z&DGLQLQK$swTNFX_F$C2LOpK>+F?U|5$MmCf#Y2|E!ZP- zzhO+wEJPkDPl|HcB_sU1uYphURL|O`p?Fm1DGajYGYU-jiFwi+8W1iV&{p=3LVF2J2m2aI4xnWF*9 z1r-@#*4LLNqHF=+i$#L0Xqh_5N!MfAuH9>OMVz~5PH`9 z`5WG|RfHUpnGKH=B+f+!5xfwaN_h&s=pi#nOz)$#|Fpo6JaY3f&S-(~Dy|%YXVu@y zT1WEkE&)r&Hf!PDZk<=MR>_&e@TkETSk_lD4ZeVJk`OG~R$NfK)8UmIn~cc~z2tCr z2f;qksJ{rZZv@B1V}d+)EJ~)22;^)K42(Q@kBlw&?}D1+&{e^8OMSsx%}W`5|B4=M z=^0l`|G`6WEEJMEyIMXy^8J4E&NIW`c7$2@G2@QJ!Hk-7QGRYdaZNzSlgCkfSxgPI zB1Vix_#G#}ksTXnp;JH5cpuOi1_AztY3h~hcj-jA2x)Nbbo*SVFkDfV0!g`XF?*=^ zu61^tm=V!9mz;_Fw1VW0!>!of(MaM7aYp81r{4xV0Mm&N!jp7$gK$0(SGfafwf_*) z^0AP-SNXVIwhy(uHK+4IQEYdgAubi#%TFn&KG5$HnX@$P=Mnl++qfvKNq*R~x!}qG<7-O&CL3{Y&iJRehU4`c497xRQ}fELV_!BDUqozslSnnZ z@#o$8xKR14w{}Zk>p44fn2C(j{l?*0)z^=ZgX>pXcoqic%;}v05;Ast8jj*coK{f> zo;BnX7P_I<<_Ya!N^)4-r zP#*nqAWk*xOibqCBVIqcG|!55?b@1m!87B@_hs{3NuADio|H%f)BMIKG~rAiqn`7{ z_wKc&vlU7FvLK4h2|=}ld5?(6WIqFrs+M?V^CB{jxb%sq*PHe}M)QiKLc80VL2!1a zh}$Gqq}}yO(D6ton?rMY9@j=Rq~xW^>%_3$BtD zlipRx-gwL<)nq9RKza`;BlS)8vGH|x21+-D@MJFLD%TIfn>Ps1i=&2@N3$BeZ5Y}z z&prE_CB#`fwSE}>y%y}ed|}c2f>xk{myn2vvTdq~)t(2k5U&4tG-98Q`6{n z*PR;4Z|8CF98UM4h!_kA`$90e(JKf^i}@R&P^L>B#+|F4@a*79$)kJ!vyW#!3Bpwc zcSlM|I*x1s6MK7txNJuZN%#di(pv);pU+y8d@@!Pg;>LwcfBFd!H)-mXYph0uedEW z259zr!f2Ci%7*CQ;lB;PEr~O}-*9)A;m-XZuMlfF3wy>S@U18$4X$~E{0n-fGSjLk zD}pw1D18g!a$)M5*=wzFq+&M0%_f3}#N&eCnO$&=hT2o~`#GU3tGk-ntXOsYy9cqO zP;4%9`xI;1kDo|BY%Tw1OwEE0!Il&(>q~2E`E8bUURX9!V!4P@e{%$$&8PRlrhtNc zVa_ME%drikmrZmvMZ#-~mo`S?Fzc_hTe zzmHr1lb+*$pY1R# z+)8+qe#A{gY2AGsD>wSD+_PdBfPkSRJ1L-oV?m2;FkRwjn`xY`F=p?1rR!c;>F zzhzQW=%6L4zBgSWZG5mBGoe;FltTU!lH!cqg4D@_SF+b;S^~ewdxP@7&u}*Ty3Z)x z!Cmq%x#*vO(hzM_{q*U{-1jJ+v}IF1SmK15%{TL`@9Rz$CUXKsj2|qg3z($!XOG{> zNgAxvrLmgD)iK`Pf({*y8)f(7WALx}H zHut!3{hO+{pD{3Le&>#v{wwo4edlQv2s78xxjl>kZikVdP`hg;06Gp=kw1zWg`$8I z6d4ckhpKP<4MAA&?v7|5nILgraTLM)4@5H6JX-cdBl|6UPt<~u77M2Z)Ik@dcQJ&K zzVm6sfC!z0?xQ~n3>b-E!iM=!3R@tyAWyE1ytTa^Ned#>%#2dAJ^EQOmmGjI4NlEH z@d@6rlEZPTRuB&mM6=NhASs{D0K%N{IzR`ILCtk~!LPwaTO>1ZfLW8TP-VNmCU=z? zf@;(?TKAYA*XQrkD5ZB9(rWS|wovY7*zQrnyCr2}x5a6;2;X`!`UUKr(?AjXvP{$n zKFJyKK7C=7d#s5xj~7iD$XkrLP7&aYhklk=d41h>HjOYNv^f}$5rF(1JXv@(&Db#-g~}!QnMQbrwzJt)~P8A(&X3{X1BCsYZjVhP>3m zr6gJQGD!V8QFHmZFQ;O=!0N+I{#!49RSKWeXYrU5A7SH*1+&UU>gd(3b`ylkTW@!SR#PTJpkvN~2d?&v0xk(qF7>|HEZ;$`v&Cn!8cb2UUSj2N zRkZm5Pj~Ni*Uec@jgnuQ`CXIie{+73f1!(w&jM=B!VeKCA5?s`6ps6o9<(7!y?`Qs z1tga*=C|#1#miY+z!`&3F^l4?XZgXiHG79&2W7R!4Dly=xrfZm^s|@?#KA-7x9>C2 zcbfYqF+LyToZqb$!v)=MoO=Jm&+x5>+;CQlf87GGmYfkXpZzW+k`)L zE$r7^o0J63|Hw7Ua6Mf>EMf|Yf2R6a16%E=1q21oCfNM;p`FKvd4bF?&5Tc}i3Iq~ zs=j>eVesT}hk&&&<@zNMenJi`(#G8HMg{IwJAxwoBvnXkM$elqf8A_$gDTad9dQYc z83^_h6}5qZ&UV?b&+uMp%o5ArWooaO`o$7*U4o$C6t^`j8WD`aPcMhxvoLToq8|;K z0?iG0d%7IzG_5&v0B;!uik?=SVyMlB=lCuNF& z<89KG`novoghndHIPV=bi<$PuMtHC9XGTxtCg+OLY>{<8>(JQtIsd+a+B&j3{(k{5 zPWn6osBNe(Z&HsVO|uTu{fQN-9MD=1g|euZ+8>*%55~7)2(8RO1^4x);VABKYCje zZqDI-_OjbAZsM@0VV=)*APOu4t$;BZN7pI-d0yM_ri$ery-9>j2kR)God=^&&iT@U zg4QpkpA~T32|BVMJ{@hPI%Tl{9j*``!q#^VzL6mUM+SJMCRKZC8WB!z85~6 z;m8yvDj?|KR3qF%Ak#cLZ=3KgA$QnXHzuGL$JdVZ^1)aD zLU(h4Y#->;)YEFR1*~YH{#i-z)l#0!1ZtvIuGXiGT5iT2(X%gKec=wwTc1bI1kL6z zq~&S3-|5RMlrwW*kL%QEb)Oq60`?03F4~(*{=F>AGxw#DK#(N9Q)rtne)SbkbF1LxfEI@XauK#9>|1OJ3u@G(4wKeSwPsf4M66 zD6+G}Z_^(8VEkUwH80~(Hj}%d-=!qTSAO|lZAf!M#5O-=ORp^$=)Ol#SX`!JQ`V@* zlt}key(X7J?jF@op_z_DUCzqQWj2z|!X*iFxFB4zg)er{A^`a}DeJ(%1pnr>#gL%m z4GUtt`I*`g(6P02xy_F|9TB2=7>rWqRv!q+X>0NL;4-=+y{p=5P2JI9;l+8i6x(0% z0i5(A#E$`_*I4*+xmO zM>|Ko1b@B3hElElAENf}zfPtW=Rx~0u#LsTVK9j3AsB>Qj`Y8t4?#4{oaZuMM$ZGE z|2Hk7XLeuLvx{LZohT!(7)>`Y5ckRwX{5iL*_3yaQ@=Wtqn?q8l1ak6YcxrcN&+Y@t|XO1Gp%Vn>pkY!p|mhT_By(Pqty~y8bBK;Vj;rld1J&q)dj6}FyYK*>t0hetD z%~y^|-D*Sq82DK@@>Ade_ety1YP(Tx2}bL&Kef5ADgXxDX@E`}Kl-$%bs|M2P6(@UJuk|_*=pW=Es9#H(~ zxe#@OTb6Y%x9SR!YV<$H^*TZiZS6s&vn9&<#Cx-LvAMt!s|Je;uh;KA^VT+ zzV*iZxNN$5+a94(A9>G{QvGy;_!jYVqV0y<`kzTvYRIod<0Sl?Nz906@`>sjSbyG` zsQ%){yrO2C!D;%Co-{vp`SY_x>1C>`h}jn|C0)Do5xd6&r-L%?Zzh#TYP6`SxaZqx(civ7~ARW;?jN{dkMuQYKs)n+RqJU*GAqUYrCMRu8-GaG$Ki@T=cYNK~ zy!u;d@5`1Jz&y}vMvJaHxyP*S8{bsenaewzGvyG`JGSwi$T?vXjW<(;Gw-A3t}RaK>wmgG$==<+Uh4q%xjzs!@ad5fea!<#LS$k);6<>Nz-ZscE@YFf@-Q$32auVYBfKs zmQkXo0V?-P+IuAQDd$e?oQPt8*W`G!&6o5|HvMc`JW86Y;t%A5!k0#a7`OpP(~V&# ztX7PMS*tY#PnO(#ahxk_*D`PopoG|b^K0`{mBE%mD$c^$56XK6`h0Q^$KAq-x+b>I z#JXWcJh|O6eWhIuK?X~abIPb5R}t>=5o)Q-yq7QhA>hXRrsp~g1V32Dqfam0dw_;N+%6wFL{}E2Lnk^vkO+;aP)`6>w z7*W^$T}Fi^EK7A>;-tWcWA-D;XnwAE&z^K%oJ@CLsMxhAh-X5oTa+DBDXc_G!{dY1 z#Tu%{Nyh0(TMo8a)xD|doVs#PUuCQ`mrzXdM;dswZ3c}2SVvgPuN}3>??#=c20oI7 z^t-+u)7>g6PWuv>KJ1NCW7RfxhUU=Xv2b)!+x0EuPXP_QGPsM0ySkq;d4j`s-wg!v z^~VP!vQj27s?Aj_M@EJfDPiE7xSCzq6JO%JNy&!Lh3p$Kuw#g!S}^rs(1rr@c+T!J zcW{G3v~!f$kdfJ1MW9+qPxQk%{_8i_=Huw`aYuuL^UOiD-o)?ZC;pQ~Hx0jX7vhBE zD3;(N^_K&EB>ELBU-;b48wm61O>xPz%(Q2%jH%7wEPQ=C4;_)|byR41n=Uy;@a!jF zNUb$s=R>v5S%rHKN~f8Er?wJvC$zca^L@8gvz^=b_GLGQ6C8^~+KJ052=Hd#gmW(V z8=Yj1_cw#W(Orv(i52*k_mj^eNf@QPwjWL(YC~MO19k02N*{6=B9oPtI-?w!Q}r*f zpYcCvI@lInR8FVpKr3+4SbXK(R^#l3b-kuyMjGmcnH-14J=l75BCSvP{M3FzD(1CN zfDi1&F9ordw#+u#YLToPgY*xLiG5J-!szNT@5QUbS0Vn}4=cOont3ZbAD-~06ZVjo zDviw$jh6KH*Bnfb_~%h(;oZ@O;}kEh4d`4$cPdfNuMyko)A%prsfbR`)`&WFntO0? z1+$sJWTi-qa+SKObXT)ey3Lm~B^xUvoZ%q-Pm6r3`XqwIhfO$5Du#c)If29IcE{^x zAu(|DH_81{&AoYZ@d|4(@W9Q7ulB-vDnrtA!Bv868K@+KVWQoVLcMfL=W~-x`(Ne{ zKbiu*g`YwI`%q}7B3C=o^0e5LZ6@Rp9%3Bb7LdwuNW+y z>fT>k)^?Oo_uAl|kX1KSo*zi8R1s%4{tAn=)+op{pI^v0;qyS1T-^kgyedfAmZlC$%AMP?3Xs|DPSq$T-J;o{DVX{^L?|Y2unX~| zR5?jJ)3}^ZO9-~d%kkr=VOw!GAqfSY@})tr?T2vZk!Nq}K1WYAeK_LmDG6x0v&2tX z{3FIYv(YGS#)-4Q;|a-ApM&!tB&!mp@qsPeDB-;kjvx@%J{5*Dn?pmwP7M$`k4%iS z)fMO4Fn{!i_63;cG-HYfO+X+fTODE5lP)d&)3D@G7pazkUrRqFo93ODU8Cm^;hNIN z3qMBQlnL8uFc6_T)g6R1wxKpjk>r8Rr4tYgN4PYt-nrL!t@;#gOsmPj++v|T_CTR$ zYyE*(&YAbNz`4W0^STbhE=5yvi?0R7+_2z7f&%UfWf+g| zdd9vsHQwy5FWliOd8bL$CQR#jR@^3>4rkP7cl%QLQYxa)o-BdDuj=7$!}~dtQW14T zc6CFqKG>-19xspB35>;QCNlIOKmW6KxRy!g1CHS+y5ok#`IK84S#)X%6sip@tU4wy zdAB@@76ejw0>;T-u48X)Pt!MODoM>O*2ptyu8hbWei0kN2<)$!)ayGg7=A|0k`l7Vi-C+IJJP z^KB!Jx~WamhS-iWZGgb%rk4=SGba@k9<=K`m!Qd8WEwlrsw{q z(y&uckc!(0-mbM)nlVt=^+k8y1mZcc@z8?1Tg6;CV3kZ}E^vJCdgxC#9bvltkQSb) zbP!(lcP7Y#HoM81<&_lG4YO3gZWBJ1e)^y-Oe#`_4^mhhS4N@Wb&FBjM(lJ5k?X%y z$*s7vKj*a;iVxWHu8%rsHbF-+2o zgZMp(qO85>LL*CrKI|L$^@_&dg}Ps-)*Fe&nKzt#3!m9I8euVKk2>=9{4P z)9ERE5!&+lUfVIK5!Zp-16S=VIh$=4sjIMD2~{G^COkB8vQ&i=mww+f+kA8=YBLCG zoffg^-Qul4&Ync~A(jL;{a_%)oYmq4xdqBNWj@tWbr7xhE?TgMR;Ce@Pu2q-aHyp* zHmRyEC%4t#!)nI7{=oJ9?a4>=H=5PAI`mh)Z(X|k=EvL`?_1NSybd08hJq9Z*rGP) zG4|){?k7|3*-4)>sxqE2tJ}~ruRqB2PHdVs8+u#3N6(T!<~ZLv5H>A?8gn(N3)s3x z#Hp=B<2k?`<;xD3ft}uR$(iB(%?LtzeV?Htc#Jjyo{Mjdk5)ymhAno)-ywzIS(Z#& zvey$`iZmyNw9$@{?N>zU%(EE#dudKDCV6d$(ls=Tw+lrqL?=yZD8^AzXXh-;ULo7> zaeOf-v5`gM9Y*D&Ke2ZN4`nSt~ z@n8Pzg{;?v&RX^5t>&AG@X+L!i%=+zE5GPfPS1L5KK0Dx>vf&^W@+_O6I~cxg(7T$&EGeH;#??Pbt1VH}j@q$*yjNWyndXrOStESUje;27tR*>Ix zv)4ZC$xYd%%3Ba`>LdQ$MgM~3B0&wpvnw_cdio**TaUKBHd}g!%yVRRmOW8AfhOmQ z=y1)6qE3|%x!$WdSR0XTX79e@{D4jnmd*R-+p-@&cnWEI%}@6l0G-WJ(O^xk+u*LB z&mvA6Fz56yFM}3i-O|k`Vk}&aqLptx)Ra_N3K8!7mS;`lA)l((DbSEc|~9r3(g>DQ|wy=!lt^xLnLGsB)C3LUU#uKY-eAE! z-q|`;c+li1(WR_zI6kU-D~V@V)rPK{JeA#8WsBn(lRHCbb2!}LITvvG(Yc~@-?pI%~T zzHcx_<+CG@+PedNXIdf1@Ms08r`Y{-Qv#K14m6ZdH#|6qD}o_{n}0f(xT z!!5>zGsb^8hOAvFvuB|mc$ZZQVzvCs= zWBufQwwcq70OlI__A!`7c{PrNS$8 zrP+l)T#rUMinXpo(eKs#14wwpb2=Jy;R#pq2|v$1o=r&9tV4%}K|3pKki(~YzNp40 zhLG~lpJD&^mQ?2gH?WUfnx_oS%r*rvX$`;68Ym|i;Vv%BSL`is8% zP0vyBc~oy8VlykMJN}$UcP+x+4@A($QztFx@~N6YySDV4_zro?)26J?8*eSPZCa+G z@zST8E(y}hy}u)~Dj)mfWZkdpoA>`B(G49)5K&y4swaN}xKzbve5aS4Zo~73N5}|B zmqhlHVEnTfg*fMZ2UAYGdGc_Cq^Q3n^W2&jw!p%`(u*aNR@eD}vv`W{G7DMIo@2Ad zfDws?qu5ECW|ZoQ#69n_u$b4!ufQ5p5H00#ftr%h5HFV0>AHd;A%$!z)Q*Qb0MN}I z30h5#c7_>@s$f0dL6c+h3{L#EZ+OA&)T^nG|AtM@U_F@LVhL&k>NA_!X$2ZRp1cXp zcKXPqnS>|ur(PA+$YPua4{T5ni3@o(>kOLsrzUQJ#8jYuedn}q)%f$F=%4#++P3;H z$P@SjiMi1-B8tUU3tas#75V*B;IdnDGr_?PRQG;4pypgeLTa21XvubAZX5*&XOREPj z##5LyJF5w|wDG0h9mGWW%vF|8KP-g(lDYPD%9_$`d-k7cF{ea#-04>_@8gVKWvhEm z?vQXJie06ToX!7T$r7Wc7gxvitw+1&#hCBI6;}{>ri^R$_a{GpRW!-L&*f3XBsPJ* zmjZdzH4HuiCZfckURG9{J{c`iTt?sYs=rpF#`Uf-c##VB2zCTNEJAX}>yIVPT}d{V zcnkO4|2mPQue1k#Q}aPY!?0y5LeH5*@0OEJe^Sp7_Lmz&R>{K>_52j~ore?j6|}Y1 zRKSS@tBWO&jU^jtJ(pHOt5rgs?3@a#8`i+c{4ge8Zf8)^3|$tv_*)|RD|}Zo)%5Fr zpc(-UrQ>xE`K(@Z+T^}RmAvSxm2X%MH+!H|9n`%Pvz;|fbLx?Zx6Opbj&5x^+NV=I z&1`!fibxz%I1YNjh+*erQ#~$RF=VDNXD%qTI=;dB$SLRDLiI2YCB2xtu7=F5?iqKx zArU)rQKkoUiowt3m)eB8piui-O*#wtxQ=H9oQ6+lAnB6bOVxq1x#bUl5WEw%H(#zO zLk%%%0|3yrJ^1<7Hx~l}{P_uPy~YA*-jLg6dN4Ki`D>|;@Y=1wqFUmt^}LcKvRh=$ zK%aNJ_^ix89a|*ry;Li#RAp@OW<}ySD9xQbZ@s8~UqF3{eA6bmR@S22t`nTX+{VJZ z?6{g18@+~pkU39pQxcPBYLp3k0Z$n9dOns6IwQNgplRQ)4%pPDU@A-xj~rorpC`QB6T<%rkEe;1o_`z!Z19~e7M_}XFAP} zv~gB9=O|+kqaH{JutnG^LfE@|^|`Ql1BO4F`R81R%;urY2p!L5OQn#-0O$6Hz4{Wy`g0Y*|nnuxJ#&RivH=q=3D#|+F>8ZLimtHjxQ5yu=18TD93>R&or4?pO z+7Zdu-&|so>%H~-_>;H+V?i8pmP_zhD7vG9zzb$5JMJw`HoLZM@y@>UXGzYfk+kga z@W<;OGA=4Iy2 z4yBV^`qGh|YAHCWL?aerVbHZUY7W(C3&>J6EKn1x^4@>!6Xum}VX@|_QuI*m%W=3W zMQ}S$z|DLkosVrd(=rb{Yr(PZh$z94rJxe6tG3TF475ErpwGtChAQv7SY_;12V(E0 z^!uOLqK;L@r~(_By2zsje!MLf#ETa8V043iJ>&`)S7uVO$vyRJzIj5DB{q-dSs2y* z3v{{COOt7^4jY1hc73eKb&$NhYwVlb6+1zbIDS6g=+T;T~21AjsfhGN7O_- zo9d?R!%S02zNx;IiTE(ra~l=S>D@DL*_yY~%y35;EM*uYzpr>#$aGY>NDidBNE`M- zt`Rg_GA}-74cau?6Y%q`fkUp#_gOENNAK15LTQst)oecZ>KPB|lvoo!A~f4k z#P`P3mQU>L_0=ua()6>xR22DWrxe0&Wph>u=Equx>f#bp*=IkTT_~0q2@$Wp{j0KQ z`>nBMWK&8_QP**k`c!NFVi2afNrHv1QuIToa>KtA z)i9*haW+KhIyAS8nA{K3R#eLOJ`KP8VSd#{GpRHCrL~mm`oLy#=VGn7A%3gmU@S7| z3yF=CD*9#Cl#WWPa+T633nWcS=2D9O@}B> zW}#EtN|WU__c+F?)yVCgsRCWy7j8)-Z3_J{+!_$iBjjLp+pOnus@^DUw_R_v^DQzn zJx~^0yH%-Ha&F-L6V4DDbVs%e1b52Vz`b}tW*}|Xg(@|3O{IvHc2L0Q`?Rlh)I9y0 zd){}s70#-NMN8Zd7|rh6cvil=>hUW}Fzrh`aXDD`LCYn!BDtv4ffhc#QhKV}e$u+R zKRi(CsI@R+U9pICc?Sy}nvUS9H})*%J@U2*gJo_lU1%b#$t6K&OwLV|qWLSJc|Z%IwHf(EF3WVhtE zPz!(Z=c~10m<5wJD~Y%1WOcXq4|e_HpV?Ao%-`e@V;KqwmxjD=vG!+p(0tlp9UbvWd1x=@x-CK>Jo@wV!3P)CO1o3Knv|~;oJPy< z?VikeZxPpmAvPfkn*1(Osh*|>IU%O&7ItAQ7b4oO6Mk%Q z_$dkuAQ0meZ(o`;x!SKwU*#{3Cuz9n6}DMaTQmMJUw*m_Do=h-%oTZ7%oYV0udtoD z_kdsW2w};KwmQ>oQNw2e8w#;qa2u`iS@P*yq#kOsBjkWtI{-suwjIgz9gb}fgzPsS z*PJ&y{~x;E0;;X8YZtDZ3KVH^=M;BZ+-Y$L?jE3MAVBc~A?+zrf)!2i;(_2=ENP*X zA}tV{Acf-YF8`+Iz2Enad&kdUBpHys_gZsJpU;}>+6|qMxByi1r)|h!@sf_z$s{i( z=#X-T7Jg!ewDj&89xT*s-dMzMVW68AfM0Q39>m=Ad-I;tly7#L{uvOX4iENya^6*U z0?Rdxc?a&dVPpOi*}u5oO1Py?6EFLlKo}-HQOR)Slf>nvkuPUV@_ z+*kHaXn^pI=iSv(wvL@=)qxXnn_Qmc06uK9=JXCB=VVYwBS$KCgWa-WvPedo`nyG^ zYo^{Abf{?gux!fb!5npTV zvGYx?4QX!zJPh_N#pBhHIuCi1kzy%aI3%^o{-^2~s9i5Ti8UCflewxA!@CmYVj(Ga z*EeT(B$HIm|JTSzAtR7)yH!r`HYN)7Qr?%U2waEK;w4{HbFpd6aWryu{ARbkSDYVK zq{$9bchwrJE-|C5d2?phD67HqG1ztFZh^I-W~yz~q>G`pVXqxIRb&FhtV^h~NO|tI zdsHAqBF42deSh;O6X6b1FA{Tnhy6mB#k%3r#?f@KdUa5n0~)mSj9y~`<_)K|kknX| zdX^yDWh=fs9OX}qfQSYgc38g24O*ruJGzaLUHoe%>27)c1`Z5WHFz{K42Gs_k!iH1 zgL1H9RNj`S67(EVy3P4qucf}=LzT3`s$ZIoCD<7xqoU`I?&N-6AKUIyTlAcdHTl8| z4jT6Q(0JzbnW8-N$7|pD2V-wC>t7hPG5A6i4cO}UQ%b!j(+tPLKkh>Eoe$d<`qc&< z>k2W^mku5zlt;-IMSE9vOBSVlb^T|czJ?_H0NjyGY=PsC)#rc)Q)u5nz*Vg<7;ELJ(<>Nxfe(? zc-a)Vh7Nn+;?>^y*V_EFx96I(moz_JcCUG)zC4?fZ-IYl-2)B>{-;x6>Zm_%3v;C^ zKIM0mJbLwOl3+AD_$TFzc=+*W7^y6s zDEp6~?Re=WS&@SjX+aERVl0XS9iO|DVGP^S$<+%*4F1pqJhF>UDx_epRn`+>(Tx0U z&ZucqtEc8eNtc*Y&4v~I&a3xrREBGfuDrXKh;8GP3BBHtFaVJZ);GaCH(+e zkn`5dNo3PPV^F%GaZzEranD{2^7anYGpBV0DImu4s!ZAF>L9f2#GGBtb|vWNCz#sO z2_UO{?rxG9G&fj1!?K%AZ;f4U<#7Zu?cn2rnIoMLzSEyu6S6Sd>DOLv$k7asbF8ry zyqz=15Vv_rJZDkv)vZSb=d=GmNG!h`vhj9pl znICc`{Kz4+c$51+_%|WPWU@xoazrul0ctg*;_e(HMNTZPxW-D)k4oiv1ekiC!VRU$q#7)L}%N4586um8!B7PVH>PBpi< z>u8Mpr?r&vJ;#~7UsI%fYUv4^LCXU{Ou_T9&CD$;^~}~lDCcA?vyi_d*(aIlwb-b4 z9uLI-hV~MzhOjfs<&h6EwvGUcg;{IA6D$mgvAj~`fjs9@1NSzN$IF!(R9|zD`fgB6 z?qjtOxixu`1sG1kp{e zZDRH6jypLde*Fzk(04~01nsl?IUGR#uBH=$e+E3kU`F3r7 z>+A9tEd_>RpZk?7mu$YOLcnhB9F`y6o@TCZQ%SY;fH!>tKH!JGaNbftMdPwxO1(V) zx--*!hyY|0h)m=84f9`-%6S3w{E;EM1-METtt*GzgYLppPxgMMdtieOW%sRpr`}1v`)H3@v zNs+n+A`7c%Iok7<{u>n6%&GJ&CZ=d7i?}VM^`C#xT=;2y}=2#yY=c%$vfjhSkSt1__ z70Cbg*=;ll_UP8Sh7>HdM6f8L)Q)8LU+iVLU(Mcb_|Xa}*^-!^4D7C z>;ESWZLeCrQGFX9EzXV{#<&n47^KFq)mAswCz@&1FY~mg@9Q@2|9*-Mns}plcr^yU zI*z!~mD)`Vn(+@ldUV#?^|rlr!uS=|B+YN$x}LWiseK$FuZuB%U#eMNYZBIAeQqsU zFwMUg)qaW3uUIeWt$fbSmxs!wcXsVN!3v(^w$SC2x?T9#k|SwWTbmO4jpQNBM%~}A zR~=MTiEd2$;@w+execq=+ys<=VL;ksk13c1%C*TkAlg+nWtZp=E|>1C=KVK;QhBzx zP-E8<{li4B+PenF!v~)wjvOWR5npSUP^Yi|3}D6k`R?u6+#RYaI~YdQ^)IqBf7*h} z17wo8irQknf5|eD=-@th$$Yjoz^Zk4{4=ieyj+quhy1q|<5ua10lU-zZ+T8b;-V+Q zqaU7fs>3f{s7!3nrds8f^V6E^Vi=PfXaoR02?|oTvgkp4^{iFz)i zyHOZVOX-(YdTxFSEZRU`l}kzi)q?4UzO*NoI9HFRjfi-H+A~qu$Rv;pIdmW7cFH>I z4s~y+P*EH_*z|xAb^{J;>E9#LTT$!TQxyObnu0{Zk&{nKdukDq4g7w;3`n?<-bOlCxPCbzOK zT3tC|S1I_-Ci!Z(AJ)Bf4?{58E3r4nP5$#_^RS0kQ6TUCmol`RjeV5rj@kSB1f1Em zOCf>w5(_H1ns|B#^BW1T6c%qEECBmWpz#)z!r7}d+L)O#YOFY;$xNN^-1|L_5cqCP z&9#ZRUJzgWu@etgkTa8R}mI z^lqgklP#o|mcM%9SR3jW3(z5d){v9z0qZF5wf0%hZl%yXZz|d@QvF5WGi?n~TzpGZ!}YSL-3%;ecfQPUY>vX!cPQJp#;* zHjZ9ijgTuXC7P7${==vou0NZ@*^!jPy(G{kbFmecplN{h>K-fPqEC;M9Tc!jnBP}X!@H@)vuvqOF9_+8fSkmSeihD^F^ z83%=Im(6H*`(LhdX|n=@VJw`P-lw*pvc{}9`Tvoj1MtdTwA`>#w)ZvZLc4pg$=bMY z1XtVlQua6FuZr_ME9_&FxJNyA-Bac>=?wsJv1L;Y@$&GF%oij%^SJC{Lp#T-VJaJt zn>`@`UHP{hRmbZE$+<<}xAZJ{msUuHC(i$NiJxWTPZbvPdhJ(~G9y>GR>IV*rT>SE z{yg^2i|&%kTE{hLz&huPH=x+$Yu|;)Ec*X=8-H#4NBzp*_$cfOgDxAhCwGgV=BaVO z90a$>xY?2kVsfcFFJtY{2A`2T)5*C!r|~=nkiX5wYy%vKIIrd~01plA;yab(`Zx6! z#aaak3-jkhuBZFI4}S=$5Ys-hpTApY_<*U&;|D)D(r!8a|NT~Ty_LMrKCT{lB-v)K6}Yy1Jiq14NO59T~;RdIs4GaytR@O6jFV3*pO|Cs?w(c>nOs zf0JqGUnlUt{}dYduX_G(V(J3^HXxS&{ilbk@pmtVJ1_N5KkOr!4^DgHLcXr$F~?ut zdK{Wojy>KZy*kN;AGgB~i-6xb_{GW<-6=La#CbX5a$e_hKJMx`?rMqW#{c|`@t2nG zdVLmzpY({*x{j7xHMmbzgdCv3SEr*DExX;}#PlJ1=`(JVpI#0YY5|4wi4=Z|diSYS zq9VkS;R^}hAnnxI(529a5KKvU;_;w-6mgNfA5#2(9&p21_NPO4FbAtw`d8kHmg{NQ;BDHch{QJ2-oq-lJt_G2MgYbPaoI3YG!<{na`MG3V@biBouDbKAe8 zzrOq#?@KC!VS6D3H1{YpaHDQ?eKZ|-AV76dV4?j(2P z{QKZqQvddA0!n3q?|tZF14cd#-3>Q57HSor3EnGfm@c8y_GR|kEs@f(-r0Bo_)8Vt z6%s}v-&fk}%42F%i*>{|oq-8S9-=a$bmlmvl{X1SMuQ z0{2R6)baq@3Swr5pwjGzWI&M@R2Ob=WO2~z=|%mYF*q}C8j}Op`$#$RDFgFq8KwZP z!kiQ~YHhXb{rrf%T*H>^WOzY2GdM$aAIuXK0g|x%m{T}olKnqJxE_dkWKA-p%R0-% z)?3A1G!;M3>`_9aeRh5T4$Cr#->~;uG(gRh2mv0^kgELYqZQVZ@WF^lqyL>m-}NMJ z-w;lbIh0AXH8wc58ML5X6uSsg>G0H$<#du}4<`pEpa)NVArX0XfEDWNvKqdA@{JoG zVV}}9f%hj*0$QnrQ@@Txe~0Y44;~UZNh}0vCj?CpTmf8o%ZRw>xGWG@Nf6zi%l^F7 zGC2ttJxx@%-|9n~YAuSrLUa41U;dWA%)@)~>}Kc>f6@iwAq&{Lp!_NF5TyMIV5ATK z%SfL$+t%6JH8~#14zo?aTFUH)1_E9BT!}ah)B(;9Jw-Kz59<1>zm-j1GKOA$e%S{i zy*M{Q4zH{SeT&+X++P}%J9Y&@6xAKf$yWRK^A?s}O7Y6yc8>m6!uU4qTZf+#~n5`^200obQhQfG@znaQ7MElqQjN>#V@l;%goCR;YHv zYcJqbo+MAZw`*jY9s8P1A%rl-J~ zDA$E2dS)eFL?l5A0^Q`WHn{XcDYaiAHk<{rK^0F?) zpsg?YCOP{I<4~omG?Dl>d!&O|Z%OzwZ>1e#rI*+C^G7ohtKlVx_8j$^5)Ay zo0MiyaOb+6&o$nX3I7auC1vjw!gXC(E}4saLXKUL!z7a%1zCG-f(`3%MXLJOuu;ZtxAR76T zE***-2{A?W23FFG<`?0K*XzV(;g8&uU#8KWmkPI%dNI}H3p8vT@mzmTHG$b~dyu@P z!M2Y=@IKmJ5QLj~FZ-FiJR>vI|FIfPUe1;DExO>HzYq($t62+svEgxVqqz?Zil3z@ z{sspeSDA|`&MUvm^Ly7y;feR|JUZL5maCWGz=Zj%CvIF&a#(KO9*~M?Ul9}QR|})q z%LAabd0)ZV=cl6;ulj8Ju4Z>YN3whDf(svNFXqz9%DMKb(s5hz=ky>*`{GDK5Xnqx zmA2|XAd%bjE7>7Vji7tc*o#rWXsu69tvw}Por&~OkOM~PU;hyc3vT4ti{k}-%pHukyxMCJvJNaJh)}vvM919A z%Isl0ryYZjtoAq*#fU`DjDW6wo-Pd58^x2ft~!{MGf2^vST6aO70xP#XSa{jwlP!6%Ke)m1>4dmVT4&<8ODANm``~?7BIi|C_IV^ogz~|s zd7|@WRe60|;_iZ+n&Vkg_y;B;ja8d+hA-nd`V>P<$tSOyvSoJ7mW@D@r--HnC3gNn zO2W!P4S3yAZj?ZETmM7vWR_lgA$@e$WTAU|aSq@=DERLCXP@IEn9?dheLuu!@}WH$ zLJrklS(dfmsiO>MJi7%PGW*z(mbrZuM>B9N=qTj{274$QAvgd=mJ7{h5yMZX7A6X? zpi#`MSB}YgQ3W(Yu+jDlI%Oz4p}TfI>utvhnbsUkwG}1C{OVE^S-xAmXFO5fUVd57 zQ?ffni|zj5L8yFBCIH8+ukRHp3-tUytxoczyx56@uj5+VNJjhM9(5p-)QfqJ1^n|Y zYlW!Yv!6^suLuUPf>imJg$ARn<}ZgKYG46Ym?a~9#ntuVMX?qM?q47Ve7YIb$}D!m zOHHfhLWuxGb;!6j{ZQxmvBKhX09%e;-pql7VeE50NVrIXn#B(=RauP!r&bo_^g`tf&O8LjlhLu z6H9lU<4*Xws*!(Wp&kEPdp&4Wxx>)Z$dXPfO8z8KK9b60Da_bXGgXLP#-|Rp(?N|d zU;eeCOxfcTN#v@u^T|iWoNq2#_^0m8Om_id*{=*7aVMJb!$ZjfPzhV<$Dx5mI)J!R z^97iWrlkryIpc*Y8XXZ{mm9@J!P+Hu?ZtDF4#pM*M~D|5$3_d@ zC&XB2h9NlTY8tP69t6t86q@ zdXI7e|Am3^iof;NdKD7+UMCZ4{v5LE!}#9Py`qxVFLFxxKg;aFD-d@v_kHDoR->H= zQs|!knsEye+PI7^Glv*C%)82L4wczn<$HcF_-@voM>-`|E_@uTdb;MfPu~3%y!4lz z?_P#RmfT3xWotb=$8c(c>rFQZSjetS^~^hB5du@pW48ql=ECXSpY(MV1cjwOy*?yo zqyoHE4IJ;805bfQ4fy<4O`IS2=gG7>=(Po`s68YaMSLDE?o4|3$qKZ>nq%#QbXSVx zFN%9g*ku=k^pv?&KPe?&9O4DLd-DZTwa~az{SJAV zS>PnZLqV)Z9{z~=s_J|cPm#Z2Bn^jO_V8>S4i|74w(r(GqB5Xa{YglJ`CzBJHG$dV ztQapBaZ8RYL4!ATtz57D6#e5{bk$)w)+E{0KPU7saay;Jtb+LNKG2LmMucw(q_ukv z@V{1b2hV($W#ePJWAhu4qAy9<$DWV}pwQh#R=1sZxCTkJVB9O{W-?ka;gE#kH1k6} zm-Z41+zYE_rSJ*8*pcrEwxKD^F(S&sd3MIuvRT1BfeoyA^JDGpT`AITs=RYcO8hA4 zWS=u39Cvk_z$1$OoaMZOyulgI`;BY3&Kg{7wwmo{*|zfBIN8Gwpd*I#dFPkV1kvCN zqiq54c8-2QM79oykewYmgcTsLxCLiJJxXUd*wipA#%_v*qF@%C&b}0JCHVSG31bsn zIm%POFAY^$FUkew6~ix7=?;#Rvf>Zh2^^ZEPZg;`7AX_tbN0nEA+BH9cT+US+>Q@$ zwW!Q(ROPwuijZCVg?<^c5iCc2!za|vTYz@1R29R`~>9yP!|ctoWu$a!V+7C+!!sGV7&lMaMrXn>8H z<;(lf0-2patLewduK?-fI~nf_0nQ~63WHjt-p3C=Boet3lB35oG5gvH5U2FUy6w04^mf}DEO#dT64{RI#D`-6KB zopGSdwAn{~Y^9ZVTrO5C2+{t$6O@|WzLG27RZv*y&*mzh}ParcQ#{7$EHMLP_LK}O@*s>)H zYlCU1XqNPg{)aV41t6SV6u!ug&Xo3Fq}OglY*Mg>_7`1lCd!`<+_LgUGn4-Rly`?_?6{b0C*C(HUFfyoT$B!m4FP2|4 zKu!eZ4-48bK4D;aA{ebM2IFd`k57Qom$;{{YX8sx`rqW~*Bri_5#nb%AcLucipfiI z^7C6K3T`3#F|{aZ6P9+wIG3i_W5Ul9wV&Ho56f`<)?np)a8T*%613<=9r1#5{z$P_ zl-56fVKHYk6j(v>yT6(fDYEE}4052nd6Ifo53K1q@WZNJqyz_OP33ay+DGN@l+im) zK41Jj(piWN)TNp7m(NPdFbF{RU}u-l2MVx|5u~9q{I!|3#0FK-Jkn^)ZhTbFf_kR; z4lR{-Rn0Raig5d$oK<)Kl`8yf{)l1k;pxsq25R9653k#u(1SVjecs<>!?z$`;(jU& zgXw)KEJPs8Z@W!dHNtP2@^91~UKpaxc(=!*JWQ<|Ae9p-t9?+|I?w6x@3>|kQUH#@ z)(dzgNKcRb`;xTsXBoFk3w-}p3p<%8)Kt$vBS#4D<4BEC~YD8VG8=mbAJx)l- z_M=zuxoejCq|(#!@@v)faCI*61L~YeeSUbFvoykZjH1A`M6;`&vZbjebs)UUFEU(_ zs@o*?TlpJQzF1o^NuNJ@jqDX@(Mb_L{Larz-H%%7!13sc^zjTPKbI?GT})_Ng1=;9G=+bdH$d=8sWBVJbPAl$9z(%x`yLsh+E) zqV$D~F=DF-y9BLLQPZX40q~l({_pyp&eE94)m5t#szy@vmxX8>hc@R8 zA+)CJWZ)Ok!y#i-#}ZEcH@oy z?mi7^tGR6n(5s6(u7)os@+!=5dpkRVON&9Jsz|QI@}dURhrp_Q-&VT|>6Crc2hn4v zqS8ZFVDoF6HD5`4#Yx@aY6aBv%w)2ny}CMQ)%fYEnq&fKeJsaL!~6lj)M5FBmN|~P zB8gP_P}hojBmEsyq7dYWA)XKyzBp=5Z~VEE$9PQRbQajb#KTkbGycU*-cCPta7%C| zcuMS}z~7f{h9%|1*a&X5rn zJs}2ULU%)cC4;;al&cs;kw7;PUa6Ku?pLN;w&R&^ODq2v@|<4fgGWd7scn?T0-yGV z{+lN}fG+4OyW>&jg5M~QHHk62YYbI#nB0_EzhP{P{8@=O7*#OH7m{k?8;{~qP@g5E zg*=xW_^Yr(f3p=R>;iF3c-F7p0`ouVyHy~~`cNT9?!Z4gcs`za1@Xc?(ZSk(s!mUv z@xs@tox3@Wm~Y*EMUhl?9w+-eJLkaG9Bw7`g)n3H?M$dT?5~FW{!uoV3Ud7{0VWlP zxidaW0Mn_-uV=?o9g6DkAK!X(2?_&I2YbJBrYX_AsSbV|94nS&=qT|QxVP`^c9}A` z&+Tqo2!9Bek9e9eRM;lQ!f~wlM}FVV(@+EIvSMG(;_`+2>E2zWmZmfU12XG95Skn> ziW)J#=qFFk$mq-K5^N2{q_{JvpuDO-ntXhRx(V)~9LvhH8Eo@NEXa-ZdEL82c+M7! zHG$}86(^6`*Mj0T!aBoup(X;2H&s=&yQ(bs!-@jhMoI&dirFh!e{?!_wEYRz{*Lxk zIDg7eUf4mkcuZs2MCw%V!<5DeT!~&L*O8gU$$puU_gaC(@+UG9Tpo{_ChbS0aHVaZ z3V&osZ`khLMHer4nk|e>-69$7@EURna2|hUyXFpHXv+@UZ4i}jj&1m8GwBB6xAY3< z$!Lvn>?KLG)s=R}I4>fLY9D1w7LP8z=fc~#foHp`GePX_W|;%J0UAB?y6w7NcOY|#A*7bvCqwS<=-X_FX+P zf1tHI^Ll zc^1VYpPy|s>-anX>MPyLO>5=D3y$Ns0{B%iwk8AEYbdR!4I38Es78-}o&%CD48o4l za##VYrXh#qZ*rch**%JFw+_uLnKz-xPRz-eI3dgeB>#n%^W6G6d>*c_P-dRn04a=p zw5@B~5_{~RKsk|eF0QE1E;jAag6C%C7?t8^D=Vv z%L}wi-XIuHnc0@>+_u*D%)F=4F65x6BB)lxF9826c*@g~>KTQ-;`;lMVSE94kKF2F zokqJ4?4a?7d06t!-$U=O+$=`uVG?Ww2j-D2(KO2JimOD=^@{Jv3yYl#jmCtxN2};@ zh651gLiVsZy;#!E<|%E3rT*Mfp>6P6eBmOy%Lv=Vhl~nTiW0+A;ov$cl<62o)hhHv zY}*;ZwGHS2Fy(D8?9duuS$U+kXAmj%stA!D27;STN+#;bSvslh46SvDCeA ztBSU~p1J*qY}M2R5QQe_6CnQj-->IjVSVv}nd1J5AnMAiurBJ~s{ozJ z^m2n&AT!5)VlkPtrLb4f^3oN#xr#`Wa!(_9`zhtP{VBTL4#t_rMXcd!@4YDuz1zl+ z=bQj_Z2MIf*mNo;nNq=SjHUayv8$vS>zgJJai{o|_X<(Zepru>tx>MB8{tw`PZf1Ce}E-3a}`HSAol$TC{(NNPlkJ^X`$d$zJ(|Dgj)SCxokdZgNUjEeQ|LHK% zxOautf10rk;Nn^bb+TWnAk!^8F5dK|if?6c6~(U7YmXPW-Pjqi@X$&Z)5^9S?BjK) z^bi_Y+I?U7Y#?H5xgEA&r^P&3Cw}gi1BkVm&_(}N)s6jRAa7%eY4Te!*9b3xcGb%o zbDWdB=-BV*DiB^rYwr(_Rtjp%iSe!^x}53VY`?p#D4N@({L~Z!Et;ZrIkPR}AcJ|t z#omMcFve|iJO6E~t_XOG6q-?$zb+UGH)!;HL4~Tw%H|sw`{UsujDqX^`hKyiloe7* z`q4}3@+gvY7DEYfn}xHwsDF->UNqPTd?S!1!U-#k)sC(xt9P*zwsA@Iw*7ge$CJ`I zb$lG;;Et7Yk!ETx(0uF2@REJ?j-P8UvznA)Zl3ZTK9^3-fbRvsu7PibBkjHm z)CcyS(q`f>%;gAhXJzJ{*-yFTX6nASk`9%7EHV<%kaHhev8Gyw{}$^-Z;;9lh_t2( z$g#^)OIGa7z})E#1WGv6*|FAYw`suh!$@(3Q3zcgtL2!iwESbe9wy*&y$*%yn^YY( zCn3h|JdeARELn<;?x9V6yiTax?AoO}a=9EI{YbB*YI|QAXv#sC$v!y7H&Y*UTA@Qb zQf?J=x>5uOY|ZA1mOd+xA*nSnxxL_Qj!5}9`#1+$+`B!<{_Y*&n2hRG3*p)Tdr8r2 zAeX-(PpA--ejpek&^S80ze{gNjowzGQigFGct!r>LO|U!rQiK&Wv6WGWCHQK@akK^ zp6M|T&$B20tz{iY3vQVk?UsRWIwF6fd@kxJA%oYF{19T`FoXd)q5K_q$dH%vSE^5W zop5g}ntfjH0v^KhP>Jg8hH>3jNbR)lGWPChw5ln9JdtuVlCX{vGpEkcWb6~ri`uOl zWiQFIxJbY9T;Un1CLXMhYjJPg*bQ|Ey~Dsr%EIGlT9~~gWHt62MXT1l{NOahWoEnq zieIememU-dB&HKl0}_m{!yZsi@O%ARo5UG3#>qLq2icpdBb`GJyhhBN8ht(&YNglq z-1{40_r1gX^0-re6L(YW_DC#r27Yx>&#MGD6xvA&LfPs!T}M}k(NnQ9h;YXf+Zw93 zDf%&R;AAwfM%sE_|B$v<_0TXUbsf`hrx*PZa`x(R3uyZfZZ!4vVbGx5!t+mjskyC< z4=BVE?CP^Y_DUBc&pS%p1xsjB43*n^L5~Dbm6|3f4JmZDrpaG{ZvZqw#(-f5t+w^R zhE3?hl8S8Ev(j?D8po+s@6A^KEU%<3Z$uJ}cJ7=cOkyvi8Z`237C31xOAdDWw3EU6 zY@?yMl*#LS-{j!czfQhp8n(lOx=Y+^-j_b9mdEZYDx_e36~Lk8SMJusj{2r?hn;<9 zu3Z!x)w_*NE0N-sjet-?)bWQXEr;;O3sgNnL`sha-SPJ7^#72GLgjgEOj+d&Sxe9x zQq@8({wfm~z&3Z7R_W@!=f3)lPu|+_BU0*YKamgq(eUww3SKJ24Vl9Lh-9I1sJH3T zM?^_P9gEvEMHxFbpo3RKAaI2d>grHe_Sp2Z9}55M+_s`MBzH*7otkM4trqgP!?!Gs znB1mtzYX7Y9=tY)hr3bfxq;YU%q5(qu9Q*p^tJiWAlxB8Ct)7-GEd+S(a~idDG%#~ znUB-9Xpe|;#*kTCw@xe+eq7tlpRgVH;b&0-riC-@W|@h(ic$yen__KGMKkepcpX%+ z|4S)wT)~ThFIx@7Kq!LySZW6wN^9Da4O~zA)yEhgMD$?o=O0U8pTz8ynV@%LBE`)@ zi83mevYz2mh$U$sZ4hc@OLx~XhPvxW-|NGOd8)ZWbDM9i-??7d@8_K@&?uC{wZDua z3%7qt(bY+1Oi*PfphukNtn^qZI)XhQ!>2?_eG?%lOH&n zXlLF}iN4gUG!jV2M&ynm?Cw`JT^gWlZI4k3=N;qO9V%Tri&Qlf$PA#(r5G*~ovsWQ4hw?2*jKgHL_CxA3cH(qaE9*udS1VBa4HI=ErllZ3EHw3 zHB3J&=*qtT*f*^Saj)Ya_fs2tN8G3uLNVecb$i56WQ^;3f|c`KAAK%W6E=qt01p4L zFZD3fDqF_N*o7(J*Ue@?3h(fl*Q#}Vi=lVw>T?(g6XIVfo-}3_`Tj56O${E^_sB%% z+SIy!fB#q@p8Bm3sU9sJ*b!{6Hs&($DYVXWIVS>eBNi=F0lle1XQ5^YTkg;49Z#P`6TMC`E-=Bh# z9i~d3S~BHsG4a@dkIO3MDqLBUulhY^2o9{2@uxnU4YJ+wZqlbD@9k!|h7^V}xm(B| z{cBY3FI75!XDMMCK~$=oXWGS> zt6La2oPJAoiDJ`tvGG8r@E7jO9w7=m3 zWHs6Ou2;`Hl<7pkJHHd(hOzb64fN2Iio#x*N`udWi8<(2#*+kuviLenX&B3iw-(A^ zK?z2{yYeTN7V0K#)K+&LxjM@QybNW-DlT)|o<}5F>dF3*w*WDNnf-3XxW5C;YFb>G zHh+#)2whlN>4Eb-{Q#sGWIRu^i@hZDb}da(UW}nJM+q5Oorf(jUTSiqebWbiU#KBG z&?n-9c~(F?8&($Oc`b7IlKJj#8uqIL7qyuwjvSgc_z^3g0`j|VtyG4Oo5lI1Cyu7f zQvy=qoZ{9jS5lC0x`rc|b+UQHAHlhy=hRx^eD&9{id*s@;~KK+m28dTpV-dk&zleM zjxswZrshTN?u=#=pB0&vHTp35b@Au}X^WK}!e*r@0wA&TQ_>S0J4GcU^-fwL(OMmk$l9 zpLf*uXi&v~OdrJ0+NZYlX+9c>n&_KDLdRhFf}1EESMJRa(3`q}pKeWV1to&lAuh<+U9$a|~7x}ipPhaXK!l#HC+(T;*` zvBB7nttgfx3IRQ3^hZs3&v*+yc7MKp*NjmLfR#Eu0q927s#BjFI;scS@MBjJz$H~& z+dln`y;1nVDEz_%eo%#tzQ)EG__eMEU&EJxR-fwGmRp~GlK|D#SggzMAWXgfb+s`) zJHQ|)BD3aaf{AQxo%ZbetDOz-rtdlgYUz2jR+5WI@!$eB${@uz`wt^@EL^*iSSzk# z2)W3R0;*lQ?P@XuC}sDj9i^HbTezEgy$~MF!VT3s(US#{tL8-YR!S3@@%0|IpOg%$ z7LMnV*StqN`tnKAMQ$vFrZx_;v`N;!d3*W$%3FoAkw z6aCPu2qf4Dr^#bwwdlkcVnz#Y=S~k=CnZ_t{vDm$&R3e=e9HZ= z;EA}Eku)K!gEs1#5Ys^(3p1H=cA)jqi3P{wu7)*R3U8@w4Hf=(&UX<%FHoi@zSNMx za{R>hy_&G1mn-LWt=tfepu7?N+R^TO{ho;eztVi)k}6Z&wa^F|ig&N{UHcQALZneetcJ(()rC*II-MDK(F@k?2|LEdDB=%VKI6s8#m-TU^^npzsq9hqMLlv*crhL#toTsFWOPpWrnChKOXY)Hf)G!(ED7$Ubu~kEM*6}Y7 z8M6uXQ=7s8C$pp9vjrl_Z|qg2A4q`}8Z4Jp_NK7|K+Y9IgyN8>M%2}WAe+SyOMZF!=Cbx?9 zs(3*>u%vnRvs@=j0KGJ}ClW=)@3kUR+S?iwW5Na?dCL zfW`_iZcn&YxFF4eFtF#K{qRHfBjckC&o%-Kqi-2B%(hv9PmFl7pys^@e|tEwL5*TK z(N1C_$h`F(z5A!x^FZf)%2GLfs=^Q7eJ;&Ra>_+4o%zD!RZGJ zN;n{Yk{efa`T^Zne5$rleJiQhibr?Xz^!JIBS#0XoZTo&c$T#lQRCc!TRsIyX<6jBXCQSg5x zWkSpP%0U8IE6oa>Y4eP9%u5mF7jqdfw_rQ85@=n^2iOh~H|9*T@sZFYknV7J)TChx zXt&D$0&u#li(*Z)WcqE^ws=eI<;_ znJthI&rgU-#^oKa^@cM_Dl6`dnWG$#B$ZU>%D4o=z67Q-&SzdL|De36hd2xttfVAU z0%0`!NkYVh19avN3lUBT+qLA&7iouftrid1<1%tz{}GAiw}Y|0wVmN2fN_D?_J4d1 zur8p6MlFr`f&GUf^1UaYX2a<%rP_(^&f;jZ*CJ=_%iH^N6bIG#zE`Tcjz{N)o4Ns< z9%*i@pW2qNSiumuoRdOSr5>=^xMbP1`Vr;eD$|g%w15N~(`r?Ns6W~ferqA5w;9XR zYTh7@yj7_iRm#|2LLs`a2MR9}0!qP3TH}NxsqA~b2$D7yH*J=NzP1s~@EYp5xL3$c zBg!0xSu&&b=O|Bi@2CRjyEw`>m|vEKH;4dG@ZkPl_QiTV-f`pVDEnVSBLoxDhqZTE z6-<1o^oAc~!OhrVYlT_@XaulhyBh#(;@PKKw)v4pNWkQ*jJ=2(mPZLp-Q%m|`UQ4B zE%Q1&UF@0g{W4`?>Hh5|H8!_b(5mrEfpC^(qbyLzG3J9>UTaFA#ExbPRO}+n#%R}B zjsV9I$;!j=O~y~Iet#9^d8nM*i11?R4h6&t<=_y`n{1(}<$}m}9>(e6-^@l`%N0@G z!#dX7rZjeT%C};Coe~#^qruw$8Y3kw(FYbJW!1U9W=3ul0Qe0txd7;=d9pi$EV+`k zb`XQkxP|)`X{bPVtW<3htyWrHu_oht0W@7pjDXDRyy03S-KR)x-5Wd)@04y-SY4HX zl9+;$_EFpmu4HWj6j;V@a>5(`rdld*st9xBHfhQ5(rdfG06>trmGTx)r$TNDACUf* z>V&rwhyzI#d!J4GOL{7Dc0l3;_QhpB81>GP3N}I>m!hGr{RQNF(aV)PW9uivJ(qgA zIR6~tbc-%8qA0P9zXtLYtq408q;YPaO38|zZ8j}gt0WmXrO1etZ)*}beeN{AYr1H7T+q!CK28v|es81EjE<|GAX+BKE6h|A`IK0g4jqkGjZ zP|HZ7Y8rPChoXS}tle6_y4S?`2S6$f@u&UC%?>}2kYBk?o@aDVpR8mO;bGT7H6wqUb^7y;g&DG}wZy2R| zCf98|n70EZ{%isG@Bd@(y@R6MmUvMV5haKyh=72I2$EEC9wjPa5D7!hIp;i}0z(E# zB3W|I3^^zxAX%7!A>&96L(cJisQa9K-uB$O_1?Qxw{E@p$8w7Ao3(m%_v-NL?(|jE zM|nd*P-AYo9FQALprkgbkuonM+ezo_7Z$G=R>1?xD^YU(HcE=&Xj)7Dk?M;N52e^w zqKnDAj7fX;& zfd!enT!V;?Oqdr5UyoLnTsRePJ`>F0jm`5eve&&E$C-8>k%-;4d|~rMe=71m-G{?h zoQD?;PYxeRo(Dh0iCMU)3^ma0dP+IP>@dOe_~+?R1SfJ6`lX#xJ{;3r%qOfdP#R`- z4LJyT)i@k^OLb2gqW0>=32`$CVXSgfrU5`=i0dLzYsMYtoXa~9==^YY`<1~r9?{3TDuC9&jTELSZrL2eI5<@5QlZH61ArrHAf2p>VU78Kq8=w zhA9fK?|wN7UUDF0|+^iQd$}TF;a^-GGc+f8FC=Q%!+qAf z!D1{GYNR5;x@x{llGG1&vhJ`V*GsF*a^>T|r5A(8qlW5d`b6aeVJ7jaQfkWmez^^t zP$gI=^RJuM!7^x^<4`RAGSW=sH1~?BREL>OQ78cQh^=Ih=vZGGjbm*tEgozFs0=jr z)2C<(b~)f5%*L`uGyx+&O_atTAd+aGI4yj`TYV3y_vcd<*+s5cLNw1~$L~v@S5$&Wm#n`rzy>88D z_P$Y>26QXwefJF(buXDYf-b>!1ol0rbxx+9?O|ono!H7u-WZf$E(1?iX7=+jMRxtk zAo3~$UNw+*9<@>C0Wsp13_)CO6fb#CQEBctP|=yg>AhIgFqRxJ;$YF4h0A>v=ypO5 zOUr!O+z$jxDub~Ovz%pvQ@iO#R*vC4KTuo#^}NYf-U zXwR_hTaFGk-;t@6!;R21@i#+o0!DiH2o zNUWVue}}3OMFv<~j5VdIUEnDwxh_fSK?Soo0JO}BMwDjvb6nZx8WyGcpIt5o#OL4u=BVjT&?K9MA0pzSaq zud2h09u7vqxy5Ef>JOb1;bmq}$B2T7P@1b$39|Sofm3R5O{5Sm#$xFUBtG5WtY#HP zOs}CesFDq!P+)@P4D#h&;SS?Xm+CjD;MetsA}^L^hTpUvn|*#k^Z8IR`8t_4oa)+0 zU&FQgpj#?0);PyF;+XmIWPmGl`VqQcl0mFritA(DEmQ8n#pj5NqN9h1mFY+Z?mMxH z7vhRvp~~TlH&g~LWZ$ILe&R4Mq2?a-F*RttR;NBu8xe92~y5SpsuPS&`6?3Exe0xgoA~&Tx z-uW>i5eVks&!v}o_pPfN2-fG2O%?bE;CMsl^vznBwcbEK7c4hZE+ikoXN8pu+*+;nl(=P7og{&RslS z3D1n>SEC8oL70@$a&EImiPKdoS^?*a;72>Pk?1usYRry|Gos7N(|xmpsga8wkR^v< z{Q&Zb3qC-Bpvv%SZ$YPDH(6P*>L)JIii{Xg;m~NFuOLsfc&@$kOc71rn~@&q+DBA- zBHb;QAv@P$QkD!a5Qzzv8HojZ-30*1Qebh3(ei}yv{?<+(W<-(&LRI((X-<%UavGM zht$G>cRd9+E$(Y{qKG*iwwC>@)tY3L0Y}{#sx(SXqqjIvKvP|U6AO6}mn-=!Uuf#% z%Lu-4J8}LFQjz>0GM6$LZrJFG@e8=94P7Pj2;fS{*8|!gjAkDK6)rO8bzfxbMTvaP z^SY|bC9cZ&nO9Z%Yf^ITh`$#N*tP1R+I^i_ybu-^i}1SLxuL{W|Tl}ds-FH2LV{s;YFCz&9e4Hjs{ZzrfOQl zNPzQ=pr)?nDGnkp@L+4+(qtQ*bwn=vo=tImx;?_x+>G)6_Vkp%NjSQB_aux?^aQeG zFkIX0QhRd8Cg>tg<;CLS$JamE#L7k zp8#JQE)P8LuTSy?pa3w}y2b9|zrI=^`r872ef!k(HGt)^NPK)=p!)kGi2G9w`eDvX z41ayTQT{yE2fwRg&%b=#i}T->2K4*hzVZ7>;GgZA|Mh1(Z-ZCO&ubBXe};X}g9iWG zY~&ZS{94=p8ybJ(MJ#Sj@11V)tVLfF-ofqX@cV{C`jZcSz5J=^`JZ&58`gB`Zr?X& z81=tSb@zYz=nl!XZA-lO2NYBHGa4@&uk1)mck9f%49>^A-ac2^CWSx>HOXp;BA2V(6PsMAdf#;Hgz~2 zgPV+;d1y|j&%blCPPM0$XVUUZmV&KwJZ?m>3KC>JzujK!meyrFG>}=*yo?0lUf{q!b|uB1B;|PjlgRDgOFI5bf;4otOr6vG9R}V4v%4ocnw5er47R#6PWk|YhCE0jIWR8^WS4lX|YwylP+osw+ z(W3=I?+D=>pm3<^>|_lh8OK5VQ|6WeV95He943-OvQqRLu1y=Yy*I8?Y8%KgCc2$k z5Y_zZl{Jp{3T2+_2J1N`3wg0H3<{L{Bu)FX&;KAF)TmyqZQ{I0FthIlLqxL3a*2l84!rA^6)E2(aZb9Q(+ zBcn||wc4zsE{qy-ye$o?I~h=f_lc4T-|rWq1&zR|CP^pRFM+>Int~>#FZ@2;4%*3) zU7W2UZD1;@IBw~ml$#1IefaKZ@kry7z*9S8^R9!KtJG^D&Hcf-q7EN{j@o)VIDcro*MHzi+DbB%h>k~n5+_>heFnXF1?}9`ZWr^eg}(G3`)BF3gYS^Fnk^~qC?NO z@O_N8rh%nL@QANl;J#h-jo7gczc*F2n`U_K^>MX{k#C|x5vSc3x&w7~Z#QN20F40*k zwe7_a(Ct3+;U*4Kc^nxE$NHjn&KKTX|euzxVmAk9jjG;RkO}ICl~(Lc6BcfZf_>Ha-z7#{{mF;`vs!_E;D_!(B!YRH2CVY42N`F!)AtRc7>$eVIj;P09vL_ ziXP}QEYiX&sd29}E7EBcb?L0D5lmMjySC9iOI*Ma+EXsQyLEWr-sXK*@ z878Y1LRWKS9YUMF5iE2>3@BfuA1u>k=);rUS@0NX#`@iqe(@9e6~E8o5lP6C zgp&8S!P+Ilc2@hA{3(FOiQI#g(MmR0q5+lT=BT&cEc$X9><6+@8nsy(J)X&8$QOll zXm5zgA8FF>-JvXG<~FVmfh%EVtJGuOZb3BaZGO( zKV8)(|5Q{Ny&J|#A$NOrSECEw(6p|s>pFF!P-nOSE8Srwp&M!BgB+zgDarffbCCb z-?PZio+R)F+U+|DB#`d)h`X~+$;bR)1%~45YC`a;0hmC5vTICLqJ_`9oXt=D@rEt! zHWr50Xo?ba*A_i?-&%0-9AHpdyc4c)G#y@uHTQ>vP6lzqUZT_sAvsyu1*~;BxnhQh zJkzb0W2g~|8h1#e8+O1ycd>)C*xhY(n>$}{Kj4F?2!m*0qVsM*lS(z7c4{g3yB{8s zTJAY|tc0!BG-+?@vd>}g{EyG`5UcKVuJI%(1-ajs$y1+JPq4gGqC_-tPG7{-5nz{; zgoY;_>2M`=JF;ZpDx5q;X@_%o?_#y#U0i*fi^w2CG@$w`=z4#MIJAgU^CEbtfA# zqNuf}LlIFl9 zE!>VaGsF109h>7?#*qyb7)8^G9h(RJDVg4e{QlMENK+8O`ktA8bM+V@B2OkGKP=aM zVqAxz4X;GobC0i2jwGds@_3Pw$FR^)B8EO!)U9-G#y0@GS0c3R;pyCiE5~zL!j|D$ zQkIP;liPM)S2K@WpdZC57& z)#_Q7dY3SzJ*a+k`P146;Z>ek61My^nZ}ep@o&m_tqbicH}#AfQFUg%dm_^*j1!OA zJom!L732gqHzhenLUMyQ9)(eR!EBpl_}@1roqWEkbx5ScH;pWolAr3|egIfUXZE$W zY*xyOGuQgtBe_6-={ALU0mp18CY8@NrE7^xo;RsU3u==`{%Ts$HLp#$N0&%xh5d9J)^g4tv=cMCHh#R~XESAh3MC(N#g3L4!1l_TnipCVq~A(u0mD^Yia$`o zqZ?j5s?cO9a;4^)TU}9mvh{t{psZN8rgH8e4Kosg>sp+oIRC6T{Q@nwV{5o}eN{=k zXOhotv&@qfmBB@UwZ&@GeqHSwN5@Y=(Hx=!RnpO(BVAGsNb56PUr{2Jk}Eh?O%n zLs>LLh{rR+J#z(RRfGL*VFJ$jp5s%8F32tzzd&B(XgimdUH#=dp+=$orpQ^GcX!2Q#=g#4a zvU1au{D|u+F{b=sAIdl_MLakchYNS=Ru$7%;&Z;|Whfuua{HRj*VRsl%1a_jJnaJ_ zK-67heL8n;tqYp@3YpD-3B+M~{Tzc;dmCO=Gqj80(Xj!kexw`IFn1 z1Q{c{BZ3GObekN}#YGBXMIA9WK<25D_{lCkSi%%_0MnXnJvMGjgC{CejNxXtJm~;# z7P+vA4CpSk{r5#B8_jj6S-8W*38M@6ow}uf?wivDDdvy1`38HxWKF`J&V__+ze@x+XWUPnG~CaT}}VYyL3+jjmz@ z{=)=J%CZ~7JzFYYn(!g%4qI>YY$BzXabkPBD5|oRdxO{aLJlexK*#yJP3oL1AtxH66%jO5}cCrf4CU z);r3vlXrQAL^$_iG#leFan9XJyC;_Sy!XPKF@5|&qwQTS!R3bvJ= zoI<;4&mRbD?UM@EoWh&mZI2`+aWNF1Oi92q(xfPrGp2c9x zFr&gCpj#{DL{53uHAR)9;h|gN6q>fM`x^{@LgCe5e%t%yNKB=T4Ytol+o&&JzNBMC zwZ!xWRuMhyq&Z2N`8Gv#yY_B8%TGQGQbWi=4rmRNSeS7T}A(Iojw&^q3h&3X=5 z3`?O_x}jqBnv)$gm_K9LpY?c4fl{O_afz6NQKujQf>HSjPfU2sL%h-Reu1U=dC6Rw zqOJRpti-To?qY=mJx}M8iCN!sXeMOf_ZE;HdF{Tc#g?!U z(cyG9yuS>K7SZ1Bg~g?tB(H+dafSV#E3|!-!k2ix%cb3AZiD-Au%yLPHtLDnDT_?V zaS|SE_1e0xLj7Vq+;;V=7mzXvDWQ&?jc~8zgk@8M?aNlKX4CX36a!>?1dvVt+`jGM zV#He$EnsvT(R6F)b0)FKt7vvZm)Dx!dh8m{`fAn0`&nK~C!^pk<3lh$Iwvq}oiBxD z=G0D+{@HW7qhM-PQj8tf+xY^{O>c`A+wK;-r`sDGeiw_iXTlqAXwOnC0$jMnZtD|t zrG62)l(|2*Nh@M8G(smDtFo?&(6I1EvQ*~2&FgFqM}07Q7Su*gn7hXS`PUuB?2s4= zh;yDzec8CUq!u4# zUNuZff%amT)2E;jkEQy_@^+Pgy|9$!l z0+F($x0<_nB_CPuyI0A~Xn>(92`v;Gj4^*>9(2!sWf#lFT-~`Op7M8wRjHf$EQk|} z8i5(+Sw3VgMCRHloVMO&BMr^7Z@qXt$aII~HyO4Wmg?oDrbKeWxsrBiyf-Rr&Gp7~ z-R)Ka%^;axpti}uD*Mk*^i7I3S;A{}TUX?riHVpz=_cCn+F|iwWS|?${p-tx%_-F2 zBjYvH*v1byL&mXSd4Da%IE_)CD|>vBnrg;eF_IP}NWC(|)P8u8oTft0ka1lK7Jcwa zh_CyRTA)tP{ZZt(AE~X~r?dX7ep&qNI>n$v!Eskz%>F)XZ{Gib$Z8?Yr(NqNf$M9 zP}9sQ-(Mbl$BO{{=n1&f^)RscyJ<*Ej^#1xl8tO0z70!^+Lz;djR^r#jkBvHu$?ki zo!lv<5(pEWtqYKHB{CZrp}P|cL}GH#0=Mc_<^SBEO=zKs<%k>z(wlj09f(+A#Pv7+}BngR}B z|IXsac-HcvRN?xgS+}EAE>6o6)Lo_+5lp4wPEkg_K*j^*qh){0%w}~-lCvAX0Dh8F z`=*a02X&7Bk_ zVVErT)ie`tz>wbU!Zpt%U2VKw-j?Vr8ox=*o$Nk8yj0-u`UyvYs7f0{$;>#1w<}g8 zBj7S$?Agwn1W)8==;k)q%bLWQD939oTQua+PW9)lHK%|^w4iX)zjpH7 zkZx0aS@sLpanE6Q-4$Zrf%iz**fkdwkC*1?DoIo2`tnv1IoKBmf}97op_q(UpHY4; zVxPMXZ^*D2Jd2#{7SEV;*hAOcPi-(csOJF1O%{RaLwfB(l-DmQDD`?1m+h*A&x@6qQpi{*&$Jk?NV zJ6E5<%`r&v*Tdy7Ol9BKvIv_(r&`DM#AWitQLQ75*_;Fy4p(3b@y_eme$(cF8JD3$ zsR$M7;nMt9CWD7oMB3DJLJZtxQax&s?BeL5!aN!AF$i0CcX=Dot5B@wO}$Qj6T}v< z8T6NQVM?u(0t_{YY`awUsF^XJZ6rB0pN&?vQGdhYv=o%PMn36?S;DQ|b-jr~c!Sy% zaxwuYNiDOLpWZn6{yix5b81uC>BPRUh0c>|bf7&+iFdt2i?Z9f{{t%bG@}zXR18ZS z{3>Ghl;5Zf{YEJzFT4&2{qi7+q1x(?7_Qk?AJJeedpi$r^4PwjZdjvyc1F3@RQ4n2 zp){Qc>xZaM!qk8dWh4FgLZk=~w!kMzKHcj1d|e!!=3>zjSD})BK*>`#>22I0GQA57 z@zKcna_<)TVk>Yv6zTb3Z$1SADW~166WV!+0gp~vW(S|_+{+hqW2*W7qGB%TB;9f_ z^qXux(H7x!cAsXYQSzwz29j<9h+3WOT|4UFx`&v~o)hff*|lV)rRBS~ptlxHM*^NJ z{b9d_GUO;3>@|8>wAJVQs^e`MrlE0TB!w~V|P;PiCHXvdJ z3ykuWqP3rW8%tdfjr>=r5~q5Pn(J-+@@TPpBJ|aM14J^T4U&x}zQ@Y7cAOxc%}EUM z9{RERiH|MC`FMSw_)RM;+Ue5^K6b6zCo5SGqEhQpsZ=!Y4jKGxz!Iuw-KGJs?=>?S!VyWO4w`+ zAJ32^cbk!g1)V|O$E!T~(n?r*WdqWXkZn6!sy)>jkoJa^QLW*UJrKep9o$ep^xidf zDoSuP2}tt4$_Vw5U>SAZ#8s!TF{WMje1qoe?xzfBj9xxNKWX zb@8AmBpv!0q48!Gm6PZ0dSJZ+4QXsU`9e<4c&kh&lD1piU#f9%q$Gudn65u47y2>B zRB^Bs#I3sbFhw-=B)q6k9#pscCig=puFgbX{ooBbUHV!k$N1omD5oR&&xDWu@?;!- zOK%shCNTSvY-o9ljN$I30{@J44HTw|EjztkucewX2_f z3{Y8nY^+{)GQ~y$E!nbW0&Fd&3eeGXr|z!Uo5=Qqof}JM2p}SCvMC~aT(BZ0`|t#t zGOBqp>9DkgaXb#<=Z@!Bm9aPN1@yp6Yx!O^iTYu#^acO_1E>RK0Os^k& z`}X6_MBtf9?&pB+k?)(Ag(pgUkB4JsIsP({KK_Jbjsb~ITxy~mk>FLP8Bw>-6~f(0 zpU*ZaOOUv~80htlzmlJ~hxPce`c9xeq%R+b3&*Kxhua+CZ!VL0^E;8Mr{{~QY%jC! zr!)~D2J%c7Yy|ZA{)((Am?vVk4>mk~4iffWj0U;@b7le`C;fZ`e*kWAn1khUpsWAk zf5B3~xvvFZ!P~2#>#sCyuEH3wyX!4>Z{GlUrr$q{<8bns=~f9HR{3H-I@zy9uj zl(7B(D$n`9Aea3AFYVU>{xJjpF&Tz5?M*nYmcBz_e9!N4_KB4; zLyx2;_nlfD4>uJRpZL9OC;SPf`1Q7rT*DJEB!$g>BrqGKZ+w%BD=D*C;Mgzsu~=?} z|9@Z!Rzwlz!&5#F91=4XCbpGq`Bj8-GQeRLzyJcZf3q;qqxrK9XOhFjgNK|z?n)rJ zZrz#KYBrRA%DjyL3x#4j>_x@QstZE@_HG`?p!j{M%b(`9zPB-qJ`X_M1d%U27|usX*VMm+92t&S~rV!6$MkfomzTlp5E30wa8 z%-uAg7c@=vi^Cr@eUhR|xfs)l>u}Xqe}8l3#rbP+9Q4m8pNbI@=N#HZZ!1(k3YW`% zj_7MwFTigC0m#|OLTYSrna0SX$W14}9_Hfq90nJ3enSBM|~-rIk!pnxa`2CN`n z)BBcyT%HF;U}xBliU%{&L!OgsdDI4%jpNV+qF9!5cdT{ztHvD5O(39JJ4bXldMJN5 zpLmQDZN8OZ*v>KD;F#l};yPGht2xmQ&a0Z5@Mo>)7RQLFYwFHM%8XoN?+cw(C!w=WX6jWta-A*kaR#Uzv#V;ww(A^?7nO!5M zMy(n7U+gV-@c-K?nlQ=()=@HmeIF>h7VMFikV8Ny z5VEc{>3#OzuxC|^>uBp)Szn(v#M}mmeyTw8f}3`~UpBV!b_!)w$U}|S+Sursy*Q7S zN;AG&f5z;0`NMCa(|F?;pz-=IX6b+_xmPb1IO+y!WgX_bff3SD6SJL3X~o#F%?@wL z4r=fjr%z+l@|++fPbxaKMEJ1MD}k|S1PEfUaNG@pIutlSrk3cmJGl*whXOB!s%Ch5wWCSAmHA>2Bckwf)uBG@#$VB`R6=p6o+Z zAS>PN-Pw$L(Blf-z`8CKT!x(8SdaL;O2dwsQO@j@j!bP<6E)7}kx@>S!P{VU3V$na zD<^Ahzsv9bxI4yX%nZ-U8tCSMoX)xG_-aHjnBlr02?Q>=q3*NNA2clZjkS+mfGV%9 z_j3zONDI1nF|)hBmH9_+Q`KfFi z558Z4V~og=kR^J*KdyurhSUdnZLqo?AJYNJuP<4y0@?>p>xptsdZC9!Kz_=`ZCy?G zllgvYpG99dMTw)7VhJ(R5qmDpBOT2nA%!dSzZv*Fz`!@y0I1ebp*n}+#lNH&Fbqm2 zcf6EWrhU%h0fl-*%jJXUJ%6wF<_fM?JT!pr$xf?v?6`EYIf?>dJ{4UdHU{Yx6y8p{ z#=jUod&b+tL`wDgHY3(UqmF>H$gT#4T&2Xud5;RF25YFCzubKx9W zV=01KOSk%Zcph{sPLLk~rU#e9N(Oa(4E)?%g!pT-0ac5*8oxDW(WhE*=O@+X!1BEj z*xZocjCcX@5E(d~&7oDhm>hgnxy*lZq{aaw&qQ;bY#|YIKTP;XCmt(b9qqY~Tkbvb z_Tf}6_F~$b-$<{YVr_6QIHdxTl%EziDi1h1(EMb<`+qk)em*a} zbX(R~nCUk~Fa8~tc1{l&GqZ<0Z2wXnwV3UZ5S!rb_=*S8t-I8so3`PCaH)XQ>v7Mn zI4Av$2P_^Q3^W|J{zbnc9spdI`_~P4E{qoOqEHX<>JGIktC1S}X#mlO`_~`;Wip+w z_&>Sv?@+a;tahs}3GM#dzW$}|{sVk>eh%!PoPW~d-G3NF|Dhm$L9hO#w*NsOiwng+ zEz#GP{*KH0Pr3hJxuNgU?1=x9_Va(-0sYTyD6IpAT;DPYZSYnM;XWQu%ve1iW%M`g z@h`6ZW`$ThrVDM@SiEJve^4zk0Ze9q|4s7#b<6#CCO)@*Y(b@LsJJz?!tRo@b$@0M zBsKYfYbu-qPyjT4*DwE)BeOKjj7Ki#d@CeYz-Q2sLpv@c)orAD+8^WhGT@JQ$K#~K z{CHNfwPiwupe@UD@REvEYd60S$*bBocTsYG5-%})DsYa;B$!xxtlC<=d1=u-j<(T9 zxn}L$@I(JyPyZ!$e&IYxbyc>6!;{9?)uquowzA$kpPIs{5L4+O zWqlfmtI)i-2&sZlO*I*`<=R1}fZ<{ zU2L`N3j2h=e@Ub$9^dW_PgX~3kMR|2J*M}#wDdZ9Rjolk#Pf+R zdbf!B)Oz!?P28TjvdQ8D)&V#)dX)bQgoHRp@#d{Ur&a)z;dt^xy*+G&!-UHF%fVJ% z{aEcZ4cuiGqgWOhE4EyHDE30hn^ua}XL*1<)*z9N8oL|L?-i9^N?))9Ypn>U3&;4m zH2;ZB^j)dJz}Z)vvjOaIlO_Zzq$B?%DSxu>@Icp5AilrcvE9-#j$OOXYB3)&Rb2Df zR>U)s&lU)AD!Q}fTaLk0SW2C&TRE0^O}ca3msWG8hSeV`K3q?r6iB37=Cw`2aF-0k zuvT@)X}U@2k#e$Lc20k_a&{!-QY*kV z#VdftX-Hi$K;_6gLp)aJg4Jr)H&g{+*I21Pu}{k?Z_;7<14^(7Y2(RCE62f!UzbktR!YFFBXATCYG~L#(<$Mm`=3iLkc2eUUD_!g8x(B7z(1GZ8`_ZQ8yC zfjD;4<&$|Xt*kalg=?!liE}AV^$G2w(SWAY!WY{3Ekj zduL4wHJ^Ywj}J+7fv!hIo>?i%y^)(kU7@iu=i7oCHc>~(I*JpmGzK6DV@jHiF3*nY$o8A^PA=q0t_UA*n}|(VI_C%$tvqr zNTe5`^yHb$?8D5SKJY=?g$b30m8&_WaJhJSa%wQZjnjn6v62;*t)ZQ}Xxj0QSZBvA zt*nALWm>3)sK{60?+da(47kQ^F`rnoO2y}G{@9apcekUF5U+#a2cQy@x6&nbDwY-W zl|p~BZ2oOm<9@TF619ZydYaAxscO?^vr6Eg0pD$`+c60vxL= zqEWj(w|?U3FDhS*L7nU?Ro|Wp<`9@=RDt(woA&G7~t$k zl3(?*e}2ALX>P7vDj*)vkd;S&JU!e#J1To@NPGd8fULK7Z$fgti?xq2hDX|U?D_8d zhJ;&Eciax;6-uB;S_VK}?T;$*_$M0i%WD?zcHIWgi)bHc=kdLtB0c7hCJ!XeF{5?R zW(JB9Mo<2z{4SXC(+K&T04DFG$6*qi`^()==VDv%Fxrq`#re~Vt#YOi00cHIoS1SO zygWy{0-Qs<+-j?3>reRpO4MAY&K$0no0!LA*kDOX|I-ooYM1*u2 zT#Ohgc~TZX;8Dkpe6uUZ&j&Wy@K}k8$2HmHGN1!={-guWFSqQ1M=<19UvT}wqVq__ zi$sd>oszVQb`O`r6zAtW^Y4P1bCpRn_}zcR2AJ|jM5}WFu(*-)HL>WR3mLrDe)_+j z@=x|~hI)GxQXF4*MM}{Eo%cGnMCj85IerL-S!aE_O~CGkqHfriV+cgJq` zf~eycdjMQ_v4i@G82j&F%|9+66dbC_w>E712)hJiB@3q;rE& z=(*w`UQe8BAF|GQj34Z7QcjYO&7;~`6fA%rs?v|`RF+v8Z!p*yD(t!pLy8_HJ4~_0 z*Q4OpC;6Qp3lCdzRME=PW_$pG`=7SA;E)}`;%JjKax`aN+d+AcOJoALicmRx4e{YzMoZ^@kcKs}2jYij z1f3%Hbw7-gytHW^1 zSf&bc{YjFC1aRk*rM$hv zYxQ9WVw&4UgY%(%D7Z^o=@U?T6!;GhD%%^tqtS|Zyli`ePs{&gx)gD(!Wxq9PDIUX z1+>lL=vVl5EU`Dm!DHy^bhG zDtNIhbYplxR$_T!qSbT>mDkv`o?rif3aEvGw*SKyJB-5^*+ieNrkpuU(yeJ{KUu@T zqAx1B_3$KlpdP@Ke2nypM}gw=0D$PCW%X{Rb3iu9HLP5@d*JzoY$Ox4`2MM zwg7P^0fP?&nLS@5$X2JEx~*}BQ6ln0p|$nISOegV@94#yl*e$rc67@@X22!`S+c)+bh4yE;s)F46Q|uQ$yP zTd>L2*!72(8Fk!{t((B(QwZrC4rytj(CJAL8S{p>ZZ414!KK8kBx-%-p+fQrGKUv| z6SdjDB8hOf;omLPAvRu>FQAb3kF9=*V47qDeZew+YQK3+cbZ^~oBNG7yE3P+9$6J9 zc@WTJ(U?cYlnO4ZqTI%}AOz2CsT=ZVPqHp(2&kN=} znUQFRJ<@gJb$5EK8F4T9ligis?~Jc?gjdJ%Dx~fu@e!&}1LGwK8G0ZURB^IKw$)oV zS(RDy)8&YVfaV(UwOhJ=*F0m(;vp|uZ4YP@;}>pU;X0Y|Y&ppD(YQKWfM*Poj(ISS z?F}^eN}ShArGD_v>6&;;R|Z~^>O(<1GMK{vgZ!Y%aOZHSdQ+Mg{JYSglv_XY`Nw<20HSk5Wd+QR9giA-={+_X^-W=2L?JoE8i6C-A!B)(tg zx%|SgD(Zb6FVG$SCip9GwlL#8WNhBW!vbr4S8d0KTz$mt#TvX)#u^N1(UBpsK-F>P zy$y0`wk>iqq|{Bhwc1=D;W{K;5Tu`IPFWwjqK#jHpFXxh5A^$diYlBc$Q-TAe5uP~ z#cGh_yPJ=vqU@~6X$-4wUUsGb*^9$Fj`2i)XnnYJGk;lV0OnAsj~8mDhzh4mPL}qL zi|E{yVtxz^thqu6@1`1QIH7Cf3%^#w(PH$q4uI#mung;Q$r$F^kgq z&Hcq>@^N$_c;88Q5u-s;WG1(?@A(yhopQ}yVh(ce;N2z5A+J!mGA|R~xzQul0kh1E z>Lj9oJQ*vFSqL0}*^bBNdJ+sLz;Zs6%8^%O`UCxy+e#m! zW}t&zmH`;M1vG>~T(HoL$DF7xKOuN1rjmYoh~Ipu9%!2VtWiS6kN8VO zOH>s$h?Cld%)tKytB2r3DDLIThcMNxS@C6`%#7WU+G}D*?vNmO9HCAX*)e!gABS}v!I9)Y8&$PcMXMhP%<*wn^a*2gSS|)nvs?#fl)7|7%U)*$!R0VqDmu?btC%{wlh3qJg)$yz z15y2%>hBbl%(J5u^?2D8E#FhVSAOM3o8R(Hm>GHWO3}5p+uiHw^+Fn zFoHR+V@dX;&b~=Rs&NKSy=2fh5ez7Ek%S(+zD?cVD6J_fr9^FMnXI@>^EXUr1#Dj~Bc1(4&Vz#Nm^>5qyn`2LF^PjyW_Z}TT5xGl zu&>I34Ff6qdrmGS0$gW|#&^LetE6 zMWXZ>^DL|rsdW}v3S-9VfMFhnD#*!R$-!{wm>C&SjCuIcS9J`NR`9sx2`o}=dhvxR zw{R%Cp4@}i7Xtql?*A1CasGfYay@Yfc{nu{*lo?;LsW2EKYZe8CHCDqZB}5ER6M76 zzU_%jo+J8|C)7_0@p;sGL~AMW67hU(_wZm~RB(G1S7B&7U#`H$7=8b3ByZ8vz%j+^ znYUGUl&!qeuY^?=TU>38*PJxG`9aoAddx)@**zUQOO%0)ea70EXFcMR= z1R7jtR4AxSzj8uNs&X}&5&b+S{(brfmHv4?VLY;i(f+p@?iDf0T~YT!zi5Q4uqq%B zYSAC9opW67=@Q@wQvXp>Ctj2|;*JK|xWbsv$-@5L1f~-Dn5lt+^2Y4^EmkEd0r3LR zK54%e;)PF<>X1ulY{X0N(QMMo?}Un(ksc9(8s$bon<6qA-otLs$s%~ud3g-gWhZKA z@SYLOYU;8iNttCjW1og`DzSa_2@+Uq6 z;`|RPq0hTKTjVUi#6^_eX6a#+u!c!Qq8IP6se_`f%h$W2+Dt+HGxBf8U))rj9#sXp z(n`cj%1eGwiIyEss8a=Vo12>`%Vr8lDFXvaHcxUhSoB}{Afo8|g(W()ls_`xPPJ`B zgYYUL##Z({uLw$t_3!6rVeKA>7iRL%VhYRNx>D~?%SqX46~0~zZq(>DHUjl6>Ul?D$S~N&^mi-awLF^HA>(BM8LcC8B7es6@IO41(X$U-jpE z9+Q#TQ_Iw&%t^r3^CZ2lwl#hJefqyh5fgul{A-v%cf{Kc#^Vwq4YRY#Xi}+H&2Y{q z)E1v<1A=MQabJU5|D<&8uQaEleZF?AnrA;+E3Z!%1?>&#C*&D9DR6a{)qgt0P#enb zzI})p7^IHu_c5W1YUJo+B(PDPQ?&}rmv|CKSy<)iv{x}B97kEtljR23i;|88e0EUp zsj<+@>Dcjuezg{_wLNB9Z2s0=js8n8=FBwl0G0;k+ltB}NdZ8c=V9%18HI>2QCdCK z@&$Qg$;?O!XVT)xo)_`B;*Pmd2_jtgTl&fItP0k);54m<%eh~*>-0{Q(h=Q;We1p< z%O(L5w|&TbOCP5zJ(b9btwKIdSJWhGs%MTLdmDIJ%|t_42d1G)O-V3 z3+UZ?+u?EP3oECF%Aaf)2;zz--w_*DC6&s#X(G9Vj>6ur_YI0>JVxZnHrSuV(1qVs;i0b?L3qURcm5cO6(tUCF!@So{?R5 zNnb3HsVijZznE3zPDR_MShT)!`HvSHFu49bn>r`Ar*8adc&~T7xDR{#)H{`U`uIo2 zcz)zpY|U7d1TgYyktQsZll5eZ;S(U0BX!VCxaDxEe!oa3k4mZ);9ap8UKk5ggrx5` zRW$opV8@7;(>42Gv1Lt#K))I#pHk81AoC&TIY7JncU~cXS;pKOW7f-_$BQ^> zumJjfF9Va@Iv|AJDb{!Och+^PV#_p^CSt#i_A_%E$>xU=pxl3a4!xvO*3qxKQ;>;; z(*t%T0Wj>%m(jW;s;REWHwq(+S`!;)2G~hb=X5x*lUmV4@Qp=}CIf+7eG89DM4Ek6 zl$4H1nAK!uSJtvYMNaMj7Z|_R#s6l3HEGHt@68G|me0erdBngzzL1n@oYn-FI`3^+ zaeZVFWhtO74xd$<@irR**Ibgxhp*d}U$jv2RB0QHpn`aRxCwNtk9?`zxt(EG3(u5) z$P2WjhU9*Ec(>Amg<+s69Z%+w$1PyhlL!H2ee%*q3z-XJ#oS<=1-*ZAwhtxP0PuN~ za=`GT*Db3H{;tBUfXlmLk{bJhP>#($M2nen;-;LVvZdLaLavZ={yH0PwU8m;{)y`0 zWvr)jnv;tc9qjrCOOoJc?zfRgkaGwO+YLCF@?>FzLtus!`NoE*srC0zQmVKK%PJPC zkO!UEu9v<*KdHFlkk*V_WI97ev!X}GUzmf3#Ee_urJ6JP5iBJw2}#UV*IO5bRP^Pu z=cEs6oe>iP zPDda0{O#xNeXW4{l{6)HwDwUTAgtRZt78p25Ni$iYv`0M=Jey5M?d9VlP$SN_ynlME%|Kaz7tFZk(o;gW{D8Kr z+u`(|Z?b$8=h$=ra-#JAxSjlfiqs*a=9wpTyTpn(J$MLnzQ;nIwmPd@e7H9OXZE$u z-w_~xr9|b8WOtw*7}@tY3D;mq06GDa#Q{<#PfPw07kB{lLwU@7B>66ga=IclgHCx* zS{f$-=+m!BEolc22`(&hyZ5W8h{#e^TV1cg~*@7XLl3^}k(m_D`hvnS1_UnQboOOoI6w(vj@9xx&t-pD8vu zeS3yaJ0h;kXmN=ib>WY3WT4oc0p#=bGliDzVZEZXlqZSEcEPmgS4C;4$p7%E)Pr3& zTYl&+N;bU_xCiNf_0Pfi&xmK`7rW83uhR_}r%z9&!gg1m!H^FLbY-qHHAQy-88 zieBVZi4S6N7>}AY!waa3jM668=ch-h{xMW6OT>hn3OzQ8sTgw(J&><=0fNzWn2t%H z%>_N`%^!dM78Mwau2pD;TcX3msH<0hn2w`sHAAdrX3XC{?&^wZRo=6ZHFX2m0IFO;HxN|dZF&Q9XPz6QFR9#~M zr%yeQ_*6f$jkffLEdERdwmLNqNTH#z;&XWXc1xwtB1fr@JX<1J7lxsJPnFPWk+vJ=Q!hBL_}EW_ z;ZM5*&}7>ikv@AtN)N(-oHWK%Yipy=OLSBSI0~lS>ncH1{}*-d8P;Ulv;nirs%t@% zsvsZ&(gZ|$x6vgKAoQXjEtJrEQ4|m`AYCAU)P#g0y@n`NKxz_DdKIaWP(tUsao_jZ zeRlW#etyUC{o}|%?%dZkbIr^-bIx22sJ=eqii#Pj3_bM`m<*5rB#hj_iXwmlVx76o z|2Co9I7+#Ybi)!br@}due6+ld2W>PBoxd2AxdSBxQS?Zt7|++T>2GbtDYF;&AWh~R8{f$%1@V8UR zCF6-SH#2!&n*4i>8(0i*xs?*R9jTSI)BDn%lpPW56-Xw0}O$PEFd^Hm<>V;`vGrdrjRIToucPM>t@%%GMm?3PxHWLi?y*W56Gu9T+w z?A>cI7p3s&tlS^|P;IvQKoexF8f6nosYjSrTem$5NEFzI z3(^!cd}sp3E6gi@q}Kht%HZEBbp3R|ypphr#%b{x@_r5$AX=8Irb!A*SEpIi$^&XW z!U8K;2-h>1TD232*$|`2s>>nk6Dybvow@axJ_BXZB1bXAfrln!{-9s~o0M1jQ?OHq z?SsJOuhH(~1&1o1jU37dn^slcC5Sj>>6X(TU?ZyRasK~9CB#?yf#bd@rJBXGI!+U= zw|#A}#LMG_6oE~?VMcn@OjJz#vA>J-Nw2Mb+Sh{>2~`ru>IiJop}PvUoM1hBa8*i)vp zlh&|bf%m&&o?dulbF^199Ox~aW!t9GgSz@z{R}}oR0s2~1vS86kMLDM&z+s97#3_% zX9@n{Af-^T-NTj&!B^R=du>N+0p+@)O*vKr-~#qrs+6o0h*XQi{DsN16s&(=;GK$& zp&lCfijgnnyl=hbmFnuH2H$qvN=}KteP=wRL_~)C4(}2yd+pJW4gKG%{+Go2UsR}m zzi|A$ucZ>JW9z-uiL2%;WMDP==P84(=%r`$3s^J1yQn=Q-R-4Dgy9kq^~Kd)>Ak++ zX~F$dHv#lmC|R9QVGF%h$YN94+wGTck-e?tFac$Kw3_hb_bQ!#RaZA4O=zI^F;{7O z6a-TUis@d=o#y^3B2;HM3Xtngg&Slp0i-)Nc^`9IOMrS|wNL_Z0;S}~Slhhawn12$ zjfTlOL#_av<&LzWbzRLx;VhMvXlNgYb3&J*Z_8w$SQuYUb>r|KXPZH#^V7O8T(H4H?j~$e}GSH8Og? zWzme%)wq#!a5ptq@6ay~Xjh$lTlTXftM~QyktVN}nXkO7mZrAH32Qp3D+@US7X5PR zLy8LfmDH*R=Lu4XmEm-E>re32X9+GQweGpgx8Msur_|u8FVNZ&$}hf_ z2Lpx1@Yn~O1gKa1v?oxC1I878;z{d@=h3_sEpOYqP>B{JiamT9T^a|UGH++QC= zT!g5be>EHWV10D3J8iZaj`4ixaohtPR{Et!p&{Vj8spt)Oo&Ee=@&BtZJoA)SX5oN z(1_wju{9;@wa{N9T)<*4KFif6hvSt39i1v`lC**0jC%=t(bM86VQ*yNqL0UGA=By$ zoo}Vxa)iTqU<=AMn%*tr^ljgeIhHS`34V{I`J2OAU|ozwpYz*oSAb$2KD>lgxaQOs zWrxl01H#yd=hFm+?YqD|^SZ~0_J*We5D0AVRa(Q?uPueRzaoMYFCKY#JndokNO~u9 znO1(eEAC7%=T9$gw|NPOZDe&1+g#JGJU$kklTFyrT`ugeZz;AM!1PMAl>C!`bKT~d z6B(}qZv6!Ty##{S0s<7cB1GqKJ;`6$$JxYFiWi#-3IFb`9x<-q!1PE{um76l;e@@V z{Z|6k&x&o=mAPPTR?gXfvs;6-cwe3+g8WtQ9f0#4YK&DUv6Gs+;2tu zLc6mQ@CD>w#t5CEsO={AC8ut6?!U^V_?L%`szx5)+XWSsV}15N!)`)Ke! zR_=k1n9UH1f5YG#LV*6!qzoXZqLe2s;ahuW8^`Nvu?^R@=5GuoGDiHr|J)y0ri}|o zKqmlf8VuZbG{P?HX}_nmJX~Zf2GqhVAJ4Q#Dl0KRt&zXqET;qDb++Wgn|1HK$6{Us zTd_8tz@wSGqt^N)g00}%X#Vvi`orzW_^wTxmnula$y`lSxZ~)g=Z1O!F14BnW_Z^B zh3I5-U5bzx-(pzFlEN5m0k=uztd{Z#()32sSU#GKGB7yhly@IX@SBboK);7+uu68a zJKk%%WfEq$J0C0D(zTCjw!Vw1ztf^l|D<4xJqK&>h|gAO_Z)x5C7?{WWxu+^^|0-L zPkj3}H<;HpTIiwBXo>6StC0Z<+zpnDv?{8>PeLXssEkXDOvxm$Iit=C;f!~`LR)W? ztp##7*H|v-mos%;yB%yrOjL4uZEuzn{P>2zJLk5-RX+Jxugg{&HwlR)h@nKah{Hks?5Rbq;kDg?!ubOy!p$xAQGYIV(=FMlK2?2HY-?9DdPF2f zN|F+X(`#FldThe2&J26g zfLYMmB8H_vI607p5xtGyhF+*MHnOCrGe}5K(Ml*ir72p||f)F}v&JZ>tp`0X|A@4Wnqc8?W=iVprwXMeQtwpBkMxM@fLpQQJ2kUj3 zapEH8*8_~<_A=w4>*&+T7l(X2DyPoHUu;!fkQMI4FsdjW2w@S=Sxaek!W@nQdc=>J zhQE&&nwk45nyZ$At*5`4v%HQG?}2D}>DsJ++8BN6GKPJ%gnCc>YBQ47USvodUIX?Q zlC2Tt_AN{{x-m^wD``AH^vYJ!B+Bd5I@O?Q>8XLxh&=4zo2MV%5*yA{EqQZ~CqvW~ z88b127<)&S#!=6@NolNq0;)j6YX0-tb>FDbm?P6=ACW;`qu__^M(e^Tym+4Hvy$s3 z2Axy%?GPvsC z`b}DhxqV&jZV5#*3@S7fKyKd4vP|jj50O`%pAd!M%PATmzqVaj;-p#SlSrQ!Iv@!y z6bx1dJkFd$iLS8usP3xs2zw$&l)H}}yti_K-acfbIqJ|*fF=m|a#a_=LS~qT`2a(*KU#MB60Ig`geS zgnn2(!?ncwd(Jif8;sS zd%%G(M;VsZF9%~-K7>#7EiQ1mW!Lsg=?tza3)y=Cx3>Z%0Sx^>^Ucv;gVZSPXgeg*tB@V^ zxuAMsiwx*k$HeDVhx?2WHBy*E)pt$#Oi%w>If$UHD%{h47pHF`G!Z&uR0N3A;lfO3 z-{eJglA6F~%#wI%L7nasS)i9Tig;NLD*xubwH~NUt%x?D15z?Sqy1nDZ(0aNzxmdM zX`8&CgN<6BYY508D=i&x)Taq7*d-e9D2a{lJQGtTCAQNGDio@&$^mACqi&Y~PkKJ4 zFRCf)1$i3-i2krN>Ky(zbW`Oa^)OUXbEetTeko_C#Vw3bkZju17;E#r(8wc9ywgRM zXSYF8!%{dA5I$MdQE#2}cCsKRhNUw$h$nhQ=S$(~~sXz9@GgW{>4_yWpML)7S1F-jqBF zLvzy%!nEAnFX~)#9|$gksOEXJbk8Uy%t!`-l9r31-0-1Q+9N%*gX2+weO0a7tu(tN zq|)?EZTQ8ab#3eKlcfyS8>VIyNMZo{>CaDR*fy?i;GA~VO|v9*nd|X^s!|d=9NOzK zTQbR6?8-iEORv}@*wwNv^_np3f?SQW=&USds7?dY`qnoz3bDbe|C;x>ql>!4u9O49 z9$3BKcf0Q%ljq8zikzoO6g9K6u6of0!j5*nYWfJpiNQ;Lw@^=Lc-Dt)b&Y7H4-dh` zr!0S{(mW!)_V1(&4jG6k%@i8phpZ|e99s{RmgY3Nu}6h;5Dd*b66gg5O`k@{Ui#UV z!$=4E?cSqXLl({a2268dO+5qlcLj24Qz2uzo%2DAKAh2z$-;H_5>z$k{`~7gi|S5B z`74ugGI58nDF;0))b9z7+Kt((PH621{p2&vTxd~pjTp#BIeXbrQIGVZ&~X(*|3GdD z-rr>M%9-e_Xgv0nCym}K@44U0`1Ybx#Z1&C=c`OEs89=Q6n&|gC@WJ<%G>Ba{o2^< zir{(u_`Sgxlj4mhk&=s>2I(Wpc1MdB%fXDR%+|tdw*C@_sSJUk5*id|)`dJ_r+{X) z;Al(oEQ{>>;1CuTU28uOBl)9mR1|e(qixWq!yOgZqochNpQDI=>E8PHYXn~HqNhdjzk_47^U%c7`OM$hYuG3lt=#6m+M zkz0Ejdr70uim5Luxz$;05OYTORzLMam8Uxsc#+J(ckgc`)6v1jYtY{U;-DWXc2(EX z_a}oKy}TXNdJF93{YxQupO&hrb0+=JG-1q%v4QmV%Jjd+T{I*L^75xq( zLd*76&{t--RDL1ZI=}B16AO>KRiTqjXX zizJtZ^)1%C^>YfKC9}tu@-|<56U$i0fsUZPE9HIlOJsI91h?jKas#MM!$q=63B6!Y z?{<4L;t0A~8iii06{lm4xg%tv!^Tlt*rZ{VuWIVSuQ>qI_p3AYh&?4SFG~$@zC{*t z2V-^%%q+AvMU3`nvB&huN3Zg}*BDhbzPFcOG|VIjIsOoMB=$IWGl?Sr=f~GoRixez zg}*!*Eztk!CH=ii^wC~#T?N)+FF;m^q@!1JL5##GBG{$%)AI?jM;);o!_DDg#|c52 zq%t}ork8{g$$I6?h~ro5*rrJ5#<;)c#IYp=Gc7 z{7BklCu5TDNU;&4R~}%!b6wFlwN)9dU7RX}2~g3u^{r7s%TTz&H)42W8*V<4wdqvr>mP{F-lqc<(YV}RdqA8=6Ath1W*SKYYXX!e&A&Wg5V)Tq&ng47uE$_F~~C+!>4Kqks$03z*&V{Bj=fdOC%Yiv$27kjV*v1wFphd*K_=o+>mC!_uT#>!U1^Q69b z;@0x`J{y^;EiMXn11TE7-R3tV^Em=Zw7TsgbIdVa{Px(tWA6)3sify;-Ql>#xb|5M za#}%xWtfA$^8VIaV)^LsX!b^4W&{E%nfX|K7BLs*71mB)u$I3QAQFRdOL;mFg3CF# z`$gP6iGVDDr69@eekjHTqnTfj!K`vyFXvvA%6X{=kr@)cmX5>&6`2*{CzwX&H9GBA zt$V*CbMoX9zR4);Sh2gNVSXw0`@AJLp?xT2(LXff)Mr>+_MU?+Z7IO`{0n5hv@2NE zf%1`14vI7~ekUcx;fxdG9G3pncKCb&iQ17LNS_DKNAL@D+EoF2#`VVUR={jhI#4+<*{ke$OE zJ@&;!7dHzvZt$&>rWZf<@{w`wi7hdzYH!Z_4#t;E`}uvZWH=+N=w)qlos>S|IUtXs z1XjZBLeFhTnKN>8JPkrKxWkalq#FU;62$#&NJ0h^ggJYc; zl^r3}3N$^BkA2v!JLZGG$%wWM?rsMh_Y%4Qo$tnkF<>Ydm1Xf`d0_#`feaVIgLly1 zPD46sDl5}CUZEc9-y_PupAj-`buzU;*=)_UFi3r0gEnau?6KF?d&K&~S%TJz80*eUZ-bfQ%z2? zI*U2Rx7l7EJ!=tYrd%;0XrOZC%gj-*G9$T6eIU_yds9*wuDGG|!!(POw2@xo-MEy! z^v<6xb8W!R9etg}2%TFjd<(?RQJa@~IVnI@0%KD+$-t&LVO}PX>&Y$b85X>e8wt_d zeJoyGO{(=v&fBTc--5h7t#jO6Xp6sg5kPx9CR;aUf_$m77(7MF20cU7t)Ju+A2C0O z!au$olHJyNQKv7Sc8mw?Fm0v<%TmeV%t@Ucz zF{iP9@E_>{EDvH1XryR@aIyv*5C4dKt|W^^E|zowK?bB`e7u)H(07Z4Y(Yw7;h5yu zrw>Rf5QX?z?0)es+qHF?+?feI(cbna!(mV*_&rrOppl_Hn@L3}P~tmO@xxwnKD0j6 zB8VOx+&$7;Js*~4#8yCpMkZGgi7XCZny^XX#q$T|dhIz@2^{^ zO{5TlBzhlwR5e7{Mk0Aa^auq3`q@YK9IrKYnXAH8!N&=_>bX4)d?v#6jw?a-syVVy zGsaDmMx;#D3e-ilqU@EA*`}}~MzU@1*Q!!-V^h6aM%2yQ#}rN_abhQ}R=T|8q7Oj^ z(%px$0wMu=uK^h1j<3lQbt$hmRgW&z%=*XKck@=2yGlqCovH(QpCIi1nu++Q?2xG! zlkX4_hPd+rpF50;Ow8ZPZl#a<3NW#-f}bd^>Kb-yi}@IGwDBFsFnZ)$kn3*zoCm|8 zCVlxg(J~|WSzgaBAF+-`H@!)rUz73c7R`mh*Qu5t&W^jj zyYIQz?4U4;-~Z@}O$&JlBywqHm6-20pQRTa-*?!9V=YMw>jhhnkiSs+%be=fq*q64 zw2@^M_cV8wAMP!fNYySV8=H3x(3lOg+*|CfJ>We0BMJS-#$pF10Bq;#+O zZ@ZTi$%C-ioK^Zk3E4i@H4AFP2}xf5tqk-}Y0+y+kCQc7GhAm(w|=)8KmCu5y$NtQ zH-9MkG#5t0h@)$v`KoONlCixI55lVS7ESe=8CkCBP5r#q!B_K9$nZqC*_OKW zWkK10EMw5G*@4s>lC+Sl@)~zU@Nw+ODIBm?YvzxCU@7O$O{YjRiLQCWqsvg7Peg9Z zR+y}qN+oF|%TMbA+k(0AkLQ(Nvn-_Ka2!A1jMmC+JwBWcaob`%uC~vETmVViIAn&M zdBM^I5#jNQimx;YT+O_pU`xQr#J$wRU1Pmh^y#09W~}5fuN}+LrZv~Tb668%8D|82 zZB06yP!373h}F1?NkPF+JDQ4^Og4Jea^I@hIJMjgkUTZ8MZLU#PaV6uCjWW=S-Sk z>fwiw<@Sd;z8q(*Wd29saevyMZlLbx*9aZO@sl6%pNQUE-@uOn9C?H4o!p-W zK3QUV^F)K>TTXsDV5jD|rg5%3`q;dzdnQM_nV-k0H&B}2COmU5xe=LpX^EdsUaOBb z-$@T`b`w!9d!9|mxLG|YW1TTX8~#49J^H$V?i<&%B6?ns(_~W+kU_Vzu`;EcMN*%+ zhzeU=Tr}!)nrJjmkKs^aUq0X1{nogo^ClwDzRbO#^Wudt8(+B-C6{IVkBhJ|rUwQ1 z90~F!AMNQ)7SG#R{2*=I4@=(Ii;nsBQtyFP=fIm+8nL1o+XTv@&_gIXF~5B2C0>tB zxc~}?QmpVWc-CPjn?Ka(9^jTk5shDgj#{9HZ+jDX4?p1j%Ifx6*Lbxv_4k45Kv^cZ zZe_GaWQZAfd-Hj(8|b8xSjXFRAWYj}6B|%<`oUpRL`~I?{fla)xso>?9aAEX+fK|l z*}WL8lOBVm1ZBiv{q=f zcG1#-=qrIp0f3?jyxQ&lHdo0UEYIrs+NbQ0;*CA&QmO-?z@P}Uya7}6OL~>EN?61Q z*pVB!_OF}&Kk-2qnFo>S_YrrztQ|xNnAj9Kd<=}d1N;WgvK~g{`rT?C&=B>j^V^g= zb4p`v&#BK?VLK+ps%^TNuqxob_1O+cIe;*YEQ@TUOMX$4E@sl)_kK-gK120kFzP?f zwmk4G5>vWUQ#!H@i)y}c;!)l~l{xQSasf^?BnW0XLZ2Y$BNmZTW5>3X6ztI{oR>E)~J!Sw>;~aCw#|!LBJPBpl!`359 zob#qt>hnv&LlHzNcn9fK-qjz_-ku@zPg7z-J&{bhRsMH=p?dQdvF|1M|90<^AE4~l zCyUoonB!(#YDr||{{CWnjiE9IswWAXC~{vf-u>uM3@jUEQnXoqeMC7It!Kr4x4sRB zO|e{O^IHdyp$C<~z+>HC?-KPqC8eA(<*OvH%38qPq3ZAPlK22V64TZXs*u zK`Kn+bDjl=-7Zg{P=RrB?`r2-_`Y|YMx%P*tenUIdhTkGCp9+s61Q77%WK1`028mS zkMrf(lw3UvZ_>yxCV8!`!yl$LA;|GzY8G7=92e*Q#BB%A1LPU2`A54S9#$-z-k=PJ z#h)90tVoxF0WP5cYYrIjI`SO+?abNRiJ?q7+=-7UB`}QGK`g%Rk4$m2NH)(d=v^STRnOihjc;Bzx$GqqhuhDzmnvj}8 zMRom8!}-4mqf#0$3t!&~8M-!;L7e#6OTE*cD(daiMSuV2$!0 zPEF6#iW!3~p1QO$M*SA6f=RR3e##_-ImP%5W?vHAkk7X{N84M&vuOSUI?KK9S3qcr z#k_rzrBs-KpskqP$FN89)4@4=bQPLEZh1`%Erbk8KhJ#>Iydivl;+b;{Kh-<3)T0? z{~Yl@s%fXrBHPxr7P!aB7Kj9FWkPyaR*7qNh2oa^{@&?&gXOpjAnR9xc@Z#jQy}a3 z1NU-HoW!Irp^Yt2Xqb4K!|%ETcu|A@T9*P^J6~@jh06+Cc}* zzSp+e7B(e0x;>wd!f9Xi%^S+{VY8Xm(s`^_RDm#`Onkf&a&vefbZL(3nhx#?w74wP zAX=Ek^wVTRJM=-o8LA@fe^EC3i1s5IWZH(pVs#ZMoHSYkd!W4zaoAFDp}lFqbivn! zOI=$;OIzEKQwae8J*9g&?t)i4>(po0Tk*MPzgDYc%-47EUux>ziLrA#Xxwz#0w2P-_%v? z-4Cs2DR4Z)p zu|i{|Kp_ZyI+UKyCHn#JQ5(FRH^Hc&Iu@pn5~j}$Vc-ENRXA!;6&c!RCw zjfWB&Wez^zx|rr3s0_&}QA{fdlA~2Nfj9b{>h3?aP^-TwXg^SHv~q06Ub&uCcr?I) zdh$Uj$*my{U=<;4A!6F_3vb9AWtnaUT)2fy`wva`L_qf$)VY!zZIKfY|OQGr7k^>G*F<<*&Wc)M(pP5dA-;&<$@D+yJaiu=hH?ASIj19 zDfTj6dGW!p2qr=k1;U0M-}<<|X* zT%R$3%z#ZXQc9TMa)x9Wb$l}DC1gmuSpj>QE(MF(f~YMlq{-7Fk;pR#Tg5j3R5I2S z)BqA=>jiY!pbf_gSW=evD(uTt@1cL&cB9LSx!XVhJ_bx4s)kKA0i~~sJ7vy(^q>=L z1AI>p%ZaE0AO;{3aqrc0Vd58%9CLs_6n4nVHONrsF;SBi${wHxwS6r)RgAtZDN^Xk zesc+g+yrof$|LKd)Rzgp!a%)Km2?@%2N~J^%{du7+(RkQffBr?K0L2r(v=JF2V$T` z;4Qw$-bt`smxm@fGFW~{! zNZ_R1u|`NAI!=X9S+h|MCI9zXxgvNYh`@dp**OB>KLUa9>^M54ubdkJ0MQZ)@wYi# zG)_PZ>xj650-Lgez|}W=WO(ob-5y&Si@r~}03C=WFNVjUy+R)L{mzD*qV$vZut~)% z#H0I&Q1~G(n;!d^s)z9tG8HV*MPGEnCvf#1EmDVu$TD95Bi=e^%vlaM1NV_cv6_j zsd@T!mo}3N5J?UVS7wuXTZ<1a|N24tZ%4Q2)h0NA8*%efA0s0zEo0O{D^L?TlzxQ^ zEouT|hyb+2jBKxtO5F+!_yQ;yV5+eLXvxP{)_9IJgei1_jKjm2@R7I5KURY|j;3BF z2!3}(kk!xR(6Lo*Jnc1S)W-Op);$Fg{)Wz!?Rl|aP&swRMgJp@I?MZ%=rX^@UUD<+ z=O^;Q2t^L=gK~U;Ip80B&i-~pAGiCY{hOk=rh`eIy(9pz202kp7X_f33<;z?6ZZaw zUSWuu9vI(*e$!;shj|cNaz)*ZbKL+Y?%J_e2W`538sYfw zG+UxZAjW*q*~U=k5GVm)LVXVkPw^LkV9yPR;L^Rt-=0YorZLG!V1WoF;d-tLJ+Utx611B1t;ZvN zc-?-Z41T9ZqUNfgmbeV`UWPwJt8VfaRjEyJ)Um94a0jFVqo@lR!tA`kF3HMT2r-A; z6!tW5`0fkcdg}ktR8@vX-U+K=!ONC1>d7V)eQr6`&C;Q|Dtcrcp$bbZ+48@=^J~U9MV60jK4We>KcC;`Rf<2t zFBYzs7w_-1RLTCuGkJC6i$43Zf`IzQyX^X}2d~|;Pa-KpO|QlgwSf7a`nbdoKkSM3 zgMU}t)}Jvy-RG=jdImQTKYVrmyFT&?bUl*^6J~{>)jJc9lVA_mB*Z0e)aZ&o3;g_| zL(c=b`}C&bL^krdX+Q3Q1*1eOpnfT}FmWa|tbs1hdP_#F|>Zid*oV|rx813qu z@PXD9_F!S?~{WN9OT!zMSSF5Xg{Vh3jWi;o|Gkqw9R)zE&cbkSA$ZRqO^c| zN{;Kc{cXGS%`_%`wPuHbKo7A(SX=eX37{oaH1yYuEC=9E_GgF-JgZz~=4M?32CH_n zGB*VYMmpQYbeSXLI7kXN;{_c3el!vp$L@3SQb!5LTa`pX0FE#eidJ(snq?@=bNj*a z%mmNrxEvlPZ{>t>zmhz>UUSo5W>|U(An-JY9+g0}usiR#tBgIL_)Wj^FvSnG*LBT% z5fTl~TpRDl-#s0xvGJ~Wadq3tSB5`)8sfDI!M5?2igo#(I~*3KNS4@`YR$Gh@a*SZz>rAsM5DH4Dqt8mA?b*uq@e)WzzQMnwx1oK7&Bf ztxB6b){27GEl$7yHt&L@@WE32)^b}E*ul1PiHoeTx2fMh<(*eD)eb>zI~Infcqsds zI|Di3CdQJ>Obr;hq>ip%lL#*;AJL~``_;o5)6PM1Cakf%rT8x?4Ad@8$gq9ue4n)9-<6qwjrv;n;A-F!o21sR(46;W{J>4SX=w@ojJPdH z@k5deSOmZHL#ekse&Cg_pI4ME>=KhnFzo2$dz|C&|?FN=NIl39csM zT5);|>CF4AAPFVkIG0%HJq%E^9qmt`0~<_gZaucL`S@&sI`4bgH;cg_Z-*5gew8Hm zvlgGkJYI~()i?K#b{q;Y%paoJq+LJwv~0{0ujtbOd{f=mJz}XG?*M$5t3e1TqRe@* z?8jSuIFaK`P}y9pE2A?LCYf2%;7#y+WP?GKQK`Kpr2n^X80Eu8SNqsIwJ}HTJO+D@ z0u(M}uugQVCnlD%*vN;~uaCV#-m|XCdCxxj*S&D*>XU{}kV815q40{7VTYo}4=^-e zn5mLg|6`_;=0VaDw&~aA5WibVsBp)niQA?>3Imc3$DdRcff-%%d_Na2;OXZ!S^WpT zKON$i0+0#6YvLjhftpf%UJj73GTlPe{4VHZ%M~n}L(#kDy({#SQzs<2A`#bKE;yR~ zDTqF&xJ-APLn?{ES`%haB*HyPhI+AeF4x{av}J@@o#1u#Aco#Fdy!H}fF~$DGd3ho z+x9gbrGr$>JaUkKlhaS*Uk9F@e#`N&+XDuNxhcF(v>W7}qh?B?W!L`L(!G%;KiOnVQm_4N8De*@Wk_-ls@C!=-icrt@u+hSnK5{6bQo(q4rA#21h?C)F+F zpZ2#q&6VYiv-=y58?PYDare*{K1qJ<0JI_ncQDU!^dmxDS_lUWXo?!NgChmy*5>Z(2BtKs;0aKLazJ%mW7vkcG>+5 zp-VkaSsG!Gg%0B}xqdmLJI4 zr68Do9JC%R!F00?Y<~}n;?}w^%4@(-AJ-V|@4_mB$!6bpoonwy%LS`gzZ=yII3*_i z>?=wB6#nAzTvSH~qu}|aC-#H-GuB{B@Q9eFyaYBot$t>#; z_dk{@?!j>ieoLK{khP}*fx8)&wcpbgtyDv=8@NB*`~K)bg%&wqBxsR~WA{_H#dbMu z@Q)YVh~!k#OBY~%Pj@rz(oSzcu;7@FK19q?t0sFnpwMK?+(}|aGUI}p(5A=KhhK*E zXGg$+ErwC7A9L<+%|JV+Mw`&3&A&t@tH2onV>z9@ccpD3*(D6gpr&}%9};O`j=YkW zd?@@1mW$LXFQpi%`=^_sfP@W*u2zIdFyKc!I0>wCW9~6Cc?GH}R?V(!2A5jSqxBk# z;bD>KS}+8Yyu47u{aIE+hL}4whqY-8yp1Mmys-|Lt}`5fW&gl6Eb5P`-&l`IHs@V0 z0Jx4=eWMF4$cVYZ>sMtnO+-^?QrCyTpr8BPCdcO$dHP+vrwi&7O_P0xgEh@{;J!S2 zPUz;<*yHV>*Zz?6nW~j&ZK;@#qm0ABFk%*+>8%Y?+^a6^?EMxi^^7w9_UM zywk#Qw3~J8M+fQ#FlA7aGt`9Le_^~PJOhIw<=6jD2F2rp5a|SW79f#9K1P-An#d*e zhI}Yhm~&$bW>)tF!2O-XfN|$o&?GZVsD;<-HfgUV{NJ(WTj^P1jHEl)}Kh8 zk}0cq{XTZ_UD_giV=b+3rvIUq14f|3U)x-INBjrM{ji?C2PXj7|Mn-+q?{%z1+mS_ zqWOl}uQQhh^)a9z7V(P>e4FxfB#`+HldZbx7|*34`0^J$ww|X!{!%f#N>3`^9C=0c zD6r_tiXD<5=BnfQ_o60xW=NImwLr%0vCN-X+&Jc?-l3NNeoSA`1`IT|^_4^KV2eKF zTLhwHFSpOqtz+S*F|B$CWDGo-BPU%=#Cn$!vY&7K<`4IxqSo4KJxBGp>`&==X1YQT z#tT?U0S|+Y+YBd)e95E7KVr@_?Ul>ne#|_GbH1@aa99~{SO6MnW97+eV8!*f85zV6 zF5@^HAFqM$AF$lJ7qk?cnQHFw9v&XbyU~#2ZtMT)UM|vusLQpYEcfxa z&EH*)J{wLPP8llQ4j?B*Z~&M)O4I|iv9YmcGu)feRsgwd9TPG-R9sO}p&E0Izbl0o z;X24EAHP2RDp{mqGu|r2Cc3ltGfVUz85cNb@r{7(l>zSW#DjfN07*}+-+VXFK0#Z( zOX4|vW4c#&hw86r*)z$N1>ro{%&K^ZQvFe|j|-gV=xv&PUdPiXGhQEp8}W&^wzVzz zQct!%SSO7K>><&->8|L2VYi;19)|=A-XxE-mCr?Gf8gz*D|8_DKNDaToWPWSL}sR< zANi@%Y1f;F&jDz&OH$rk$PGERW~F*8|7R2{t1eB`Bk3T)gYXX7(=;4guM>6$0gHy7 zEFS3}RV=8~&T-uJNSa@`VUunFaZ^H)4y1V{P7xaW2hrs(ya&xJSAlXZ*v@7yppmOG z+xhaNbMCQITUq`DLr}f0e7a7V|ujNxX2)+9V0g zDF5xCwz4!is8LyZJSik8>-5yEID4O}1W5@MQLu9Da$w29EkmgHL8P;s*x~lzP|muz zzQp%5+K}~Ve`1WELUmF9c{1Uf@k^&_yG}x zOhBJxr}Jvbw06KiW1O<9e#CyDEV7un_CY26v! zSH1z3z`BgqLrRy1<+iJ@IRNZt^bVX4t`jzrs4+%3IA~1Ya@*>DE~BsKwP})wbOm+i z>e{RAF1@91c$L~|x_#4YHBfh;HUcedW~_KvsO?~^%N8*y2hZlS)coTFoe`rNm5F_t^+Jq~+na1zbHT_UIr&aW{-v zVSTPE2dh7hBzKKc91UNOB8BM?#XZ;HqntDTSm>Wav$140F8oGY9vRrpNWC!Y4~lZz5P- zdMh+0{mG-0kab3%pzRL!ok94C%i7Sw?R4U6R`S)P6@1C2z?#EF=|R0xbFoPboq4jA z-GzEc@)=`9!WGeJZsp`=;*#AnLU$nE@XNgD%nl@bO^PigGK7%@w+` z6tGuBh);1Mt#X$51jKJ5$aE1D7WuO1^i(T(Ka`EL#zJ_63Ghy0eVY80)+|I5_)nwq zlToMkr~Pul>B1)0@qW>;qn=3I{yyv*z>QGa3p1z4uUuw0i`-vmDr|-!_Qq;556EY1 zwZEkc2d;NVt?h+nNpyP9jqV*A#kKG!A3VRZK&$ddnkXd48>h>l><2b#eKiYPk&11v z)Ce*I_2pUnSn|8g?0J=xl&#B0MWS<2Q>owz3$Oj?^e^pf8}`=%amkFqI{fe+iRHW$ zS%st^OeTE<^&rBL>;KyFJm20D1^%);-|nn~`F$lHvR=q8jn{TvX_otRG;L6c=(Hy# zHx~1-v_@g)tw5f8TSaMz;{X`UewX=wQgOP zO9fNXRjp0(+24=ot9M234CE8yVr#N;e!h4MqpoW2OkQ4Z4zKrs7~b*S|HIyUM>Uys z|D!t2;D`l9ioyUYO@e?9Jv2q>5Cjr>89}8R@P8UoU# zcR~rh-4k_QnR%V>`rUQ!x@+BgfBuVkp6Bed&u*X3-e)Uk`Ro< z(x`)}n-@vWi!?&zwYlMSurYkFzriA6`x)gqh4S1f_HsMe->Y0^th8Hg5w4uzvAO)E z^nMMd?|}NoHwAW2eRq>@Ugbmv4c8QjpJi*87A3%jMq6!HKdY!%NXg(Hzv22;!S3}& z%ALKB4~I3TY(0&wt#hvuqnB*eFHb-yrexqbYHFe(=jw;^hQ%4cdc_i&Dneiyp;FAL zg9eqtOJTZ7f`RSbr5obAaGj?5%#%6k6gy0>DARgejv=OtO_+1Xwz*tSheX;!n9tw^ zx~B+zftv%ppa@NC{Ue$dQsAQaGlRHLy?McD@0}dn@S2Ek0gC&>x`?8i(oO^X~Jj~ zE=su*f)f;$TbpZH6Cbvo1Kk>XyvObt`*Vi!ip`&^tEw`rDR+Q%?y7Eoqo_`2+Ht;Y zI>xSfYbG>#nR~6%g4v=*HN$0SHg8bR?OdW*KkJBq9hv(8%Eom;jBQOdWIyz$4?ax0 zFE{{icv2T}?@{h^ZKKtB%Eqp)h<#;a2UUZ54&>7#N4np>n_T=x)h<;O;bL%r!LE^y zHy}u!C{SsQ9;ccfA1PFHg~^QEkv0r_CM4?e;#v4dZ3az@$fUYz@C5#{~w!e%QZ$55x->xp^Q*Fz~$KfAz8Vhw#2~tVD zN*{4S2hCsw>6S|h$goA4sMK6`0Vub>e$X5xApy{sp?7vBj}jc;+!yQv7z_u$rfZbd z8C8%zY~1J;dzJDsHdc3G%6s@+M{n-L%#1lxgc6DVT;%U5Jv|>&Es~3Gd+Ey*CBuHd zH24d^$Z7>q-#V2$?^P+NjiYmSt9!ZWm>;^1HrgBv4kvnkRygTu5cVj%O4PfK?U}I_ zv42$^THp4niz|r6bDX{HW-75v$$-=x_%2U_P@rL9b@R&ob7MW1R(D^_re;`(za7>4 zdFQltOBNSKcxx)0_taBF-u1540~@^Vc4grjnhnfC);CAA?fFs zw2w_ygN=9m6}k}kGnqRUFAHIow?I^So`kD-J#e8$T^!;#awP1~KC6guskd^qagz7h zYi;;oJlx2+V=%D{IA~ZNufkh}5jnjTf!pVDU!#Z#&AhmAIN!nzetw74(I%Ku!~A?U zCCiKlCcc1ACLYR{EZ@sT%nep2%Cyj=gbZU_ef`R=)}_nWI|G+y+PZ!EQwcBE%1z1^ zfU?INIY}k<0w2{GTDNafX0^r z-KD*^mgA6P4XB$00NyR~o$m*CGJe5}!s~X3$Ryb^z#^m#=({#+DbD;dQ-}2#{DsHevjj^hR9!CVw2<?VBlimdUUU>Gem!xh^KFGGM&xXe;uIpAggJKPrrc<3*|+&3AVC9rvcJl>;@&wJ zBDqhn8JO_FS95x8?3dU~>d{AAUGbx(KJFHxkQOl>8}ij&H`-g=yD8nUf!8Rl;z~SP z+*6b#^kB70wM!)a?vz#-kbq2*g9%_pjL#(2HJ+ye6|x>poGaE%*~CeMi!;;)Vx}?V ztGO!vC!P@`!+c$ZX7%OgP~*}B%=+9B&}4ASHz>&LGGa*_be6g8 za=f5}zhtpjQ}IZvcAO9hXLzg`pQvF8Szb=39BR&S(SZ+((Glf6%ONDgy)zkV9ihil zv^s(l1R_apUNV9RPR-cO&~$;Ww`(46(o)*tX4VAhgt2S0ph+0>{cJ{Yfsom`elbG5 zZ@r^UYCVUu(r(rvfHPs&Y2U;3ew-hH+0)iyY0Suyi|n1*&~>0m>hf^<@PJ$9RmFah zilz28&|@`bwJo7jTICGhr;iOYeT`OBySHBs%U#}gQ=86RHBrtfdD!%)e-Qqh&|SW|Dh6>=cURG|E5FualcBmyFQRN&V;heK3ACo7 zy3*Yd8Y6@!>G{mJZViudtN_LX&sf4e5} z7#*DdlCp=3Y>uGRJpp_<9uxNAl$$-({bLAFrF$DUV0ZR6Hv7<&UK?hIqQ1M+sR6Klz$yM zmLV;)F6LUWG!eE(ar%|VYBiT`L3uDm3SnD2U`6drMih!oS5v`Gb9$QMeog=#!vwOg zdqeLPg6Y+?-)?jy3ucby>H1Gc-jCM&$KAZiKEWvy>d@r<=zPAb32{h*pPzrfG1Ifs zyGWDut99!L=6CI< z|29LpCi0RYZ9E(noqi{F&Ws+R6fnSe z!xHLw22Hez(DnvT4$RLcXg5(lNiY#!HjIU#q{{ z27NDH_cplfw>|XxVdQvWt4<@z`9|gEeAjP#^xN3MQ;ilQujs|6mWROx=mr2AZrN4i z+MN$@!zwP3VpIY}OSCSa?_RdNlGr7k0LSz8sg=1QYe=#Z3CT=g^uxuGcG=YY_ztlZ zJ)`@)h%gq|*!2}?5bYzgqN6*yLr=`e&HAtMuP>u`&P-RCw8Nc?tUL%^S(Lcgao;_% z;qX25t>L!n`b$sfrKVJfYT}l2ZFF(JKGBx>8XgvQ(x9q6qzrs{6JukW`1NES*u`t> zd_Ml5Q)TN3BUi;#OBtz*i+J3wFeNJfj|(qsu*ZAlkt_F~0^+WT9NmWkoPnDTr8v*{0oZZdsQBL9#~ zk)ZRmv!`3U#{BhQ=a^ZRP&Pe5Hs(-pIvq38z+ zl~=>3j=(b~b|>Awm@=p6?R57RTJ-|mrEonkK=ORg^XNKNg5a!p~{Sts~vM?cuhHXv@k30LFDvJV;t)DGTqo0 zrC{#Bp#Og&jV~-J6Pd3X|MOPe1~{zX&aF45Z3!SY9lqEWE-Z8AJvM7{{4RMht-_h- zigi-07}DIf`((PFR0^v$=e`D(t&kA8TI2mJhgxf?!U{B4l_bY9ztx~OA1AjyR*}4%Swr;Q2rCU{P`d}E%b;4l7EOuxon%WXBgbr*ea-CJwdo@WImcgT z;UIlIU3P<3*wy2-;RJ(smjA=|8c7DpvIx$Lwx0p-T=#pfM`prZ;Qs2CI4sFk>RUFt zywv^l4Is49D9DO=!*MM0+;HshJG+#``3`$PqpzqXQbJTi zZu>_eMzf#N$f;4i31v{2Il6`fUTz_IV)s+v7&+?GGI3CaDEIo6GGR^@nJ_#yBzRUJ zYh(-OUD~l3xLgh8=rckp(ZSF(b%6_DG})PYJr$x%EPHepa>XQcRQrBSHJ6#?keb9+ zr?$2R-`20lYk-T%;PfR+BIsXMYZ?9Xb!qU-QVIpIah(6LabL#dJg5Dds#t#1K`fH% zLgC+i*%zjBUBFi*7JN!B1HNxM_a9gH|Ja|uR(8Iht}mk)vcEdhpTH*{a=(Ya>3{$1 z`xKFHyZHY#ku-I3qFZs>+bY5=%)-{rJ)-o6@IvLYHI&c4DD6L&d(EzD27QtbdLT^H z3lrIxoeQi3J*|I!bt_+bkq=cva;af);F0{fgSdB>fH}ur{b~$=!aWZD9tw3Ls%8eb zQ8aO~&mDx~Rl&qCO|`E{&(|vJ4~^-UX*z%R%}`VPRzULg+RYOga?CDwj=u%jYBKtg zAMe*}@oSCnyLoDkw{@*6Dia=b*QOO3T*@^LA4985sp6(-GsZ@n165e-lF!5X-&)7V z$4l6c%d5f8);#{6a$i%J7Jo&?QzoR9I~qM zS(dN&ajK6kEiTB14=3L!@!9>75lh)BJ|oC8rA7+NvI5m`oCQvbE#8#W^G#dCC8pBz{3A$Z@epA;5*ST)lS%9;U-kBx~D zb(;SK3hIiJlau=Q01ncZr2^?%)TJwa^$T$>mW$y$%tFT?Qzs`qLOs+0>b&%r5}^`_ zm+wLvKKr+Aeo%5A7J#8IcbpwgF>T#90W4M_%QZr zzr(7`%>;RR6u5kwRzv?)ssPi{%>oh~!4Fp!b5O&qD_N-j^{v;CRp$7uxS`z%Ct&*N0B)8`6o4qa#KS73~%Y zJ@mA#B}>U*uSlf1+Grc_X(d{V@)O}IA}y`0lfD49Y6K_%Ji+xM`$+1`#KfK~Cso>C zjf=jf0RKG0pyd@VK2kU{SuNuWo(Z35d*`$v8rPZ#_6=TvK9K<}?&{wW1IdK4FG!bo zAH~^19jDLaw6?TNh;s68z8@xp(QgKt=O6(A?@|}hiPVjYk4I);e!7*N`$Jnm z#%h6ncmc)Gnu?kIM4F^h#eGgYuPU<8SAvg8C6D$McfJ%U);7Kp6B7f9X{pl>NIv1x zJZ1E11s1O}Z~m*5bOBZpo5ykk?4>(65I^6#X8J=b`9R03+T2WJ#1UEy-fja-($s=; z;3#P&PD+_|$vrJ}x;p2gv z|M|x94@J=wpaf=x{lC}#4oBqY zk7VDjmC$)|$xra&vg**C@73VHe?xatqysnI++9VAvv+#VO%43N_&+x0z8ekbsaP+{ zf1}PM;R+w?VjM@{JhmW5o?A~01k^$!!jAsjfvgb~R;w6als+`HMU$*Inp#x~CS}PA zkC?p~E|2&i>ZcyVPUTsYM75rc9|2W{4_-PLrjA)ZuXErK-F>jfNIiEFZcjjHc}(&r z`XjTib5Chr>rRR|b;&Q6wY9{5*1!&R<@+d-ujv97KwNkgVe`xMarM`?7uHSy%7Hf4 z@hNc#C#JdWHlJUgTRNMy>)t+N*CNy$TOLrbp4v}H~PGl?-A&z272)RbMX zIj=h4G8ON(v4~r)V=P`X+lnW;bCzJ!itMdxjhPf1k35-%j-ul-zbDRL+DE^x)uf86 zlBWVLTaJ^|0mEJV&$Y?MpU^Tu5==rQ=;o@O=C6#TdR+x$pc(d#C2toLOn68{(s1P` zN$&KvrHgAUeE#6AMrEQWT5OzuChh)_TaHY2tt#;E5y;^)@TjJLE*uoG<1b7+%4V?% z`yl2NYP)g)q$`zs>-{ML4nQCnSoSH0sd$tjY7iN!Kg*>l!)~ezxvHM2U6-@uyw=Tz-!Q3NNN;-S&omU8^s23ZYWP045rO} zlD|jaAt;KmQX+dg-wqDS-q0(;SD=}s0sk`^k+_*GY_59IZYYhFdP!e7_)d-ZWIF{O z`Js33EEm#LvQlE#K28NBS-@sfG+Diexp=U5PC`wJUQ~RtTKdrBSCI4zODJ?@sk1EG z9yz<+_%eLHx^Y6!A&80=!YOSXlI8+*>=KHZ;*D@#Z_WwX}nGb0qxDBok=Uk zEm*0NXePk!26G>ihI?n@38Y$bmsY=i%R5=O zl?Q8|y+Pw!JnZQ3s#DSaky2XnjW~jnJAuM^ zgiA!eYgG{*97i}XKX|`@B&Gp^aK_d0$ym$I7L<}|;=6Q?UhIlCai?89#C)7VTM^b3 zz#NDu<_Z$tL*#sd&x78j*|VKT)V&P}Bbm|(qIZ4aI`v^hZtJ_a8dn+G*=;B%Zg%9f zN5<~H#mZ`MS690?lWx*<1ACZk=7){+DGV`?F~9d{_@k_F)S&z`edXX&LmdvZ+@>q< zS44kovw?ftdi)}{(v8M+!tMn|3{0XJl3n{Y4JNV`S`mSuZF&0em2-1VP`x4xYRJVj zHB7dSPc+CJ7zP8+N&q>enH=O|E0?kdLn?Nej1bDW#ZY3&deSH5DvX=tUbiVgp%`w+ zi<}O|a}K1&SA1TS{V&^ZQZl@7+v0=Oz~_ z0`)vHA?bM8bnjh-8*Ew*xn>v+ox(onc~OFbL*zTY$SLD~bxyQnmQprp`eTpb+7_|S zBrRlHX>}Y}S=9RcKnZ`q?~suA{Hwsj%&+W_*SeSIxmly7I-G8ErwU_9UL>HvO^SF_ zsl@V?lpUIM{H270E82*3-C}YA70m%>Mx0SeQ0JQg&z*%Hl4sZyFmz4L2=$Dkk4^w; zT<3{g3}r@H_Pby@xSSvk49x`|A^m*y7C%#HD@$~lZs@Ot(7it_EaZs7FS=S62g?u| zJeG))xvwVFhA`Wi&zR?vO;e_IS1bap-|}XQWr2QTp^N1yLKx|6G-lxf#r>XH+<dx za?ACYj`k#ysAk9YFYlf0+Nj(fDfS%CGwDZFq^#^(Zr2!1Y|Qp2ZVNS}B<@5hQcyiq zS$Uq*c0pn!6^xCp97(N`+OhF+aHXzXWfELVF7`;XUaB(kBxxi{te?rsCVB|BCN8O}C#hn~lR+fQ?q1ZasHO7dcI~rog zV&8!LUY41QUt}cWt+AbEYtE;M4WQrJ^$DPl9VRk^SYAQ73xWwo?w!XE#sQrP7`Sz+ zTcWEGZ{)ye(JU84LeY*|hYU=W>q(~lni;9!|MsM=N+Kn`<*;q*;tv}&c_17E*I{t52NiyfP`Ai> zx0fTNQBi}5xFYfDPqI3hms~)kBgdJ|P- zzOguHNO&~uysB{57s?uD_O{5);_gXL`p%JebL5u$eOL)VDXx?LpciJ8=~0I>dWETA zp`F?@xA~2FI)abEOcF2G_Ok_5Gq*?V54LwZuG8&CQ*%q`GTCyxd`jbzs?1;tOqf4s z!jk5-)}|8LvR%nd&S6LU=^djzTa!2Spd7$I&Nteu1fMF)-Iq>Kr6x`b4R425cH1X( zt9z_rd$bQ)Q3-DN=vBhnZTrjMrD>x*gZ+1%!~wwVI3FvRxgH3W zDVXCCmkOUyTI4-6SMLiPU?a$Zw$Ae8ZZH}_I{Nr%Bot0BZ1)NVT_8DVVwp zkON3Z7B{C$k|9Al-z_W8K>>@g#6f?V$PuJMAO~XU1VkYnZ@8at!d&wH5+|gwEGoHg zGyIXHgn0Pg3KXKnl(^-u*crj$!qJH5mDJi3GDjQ>W;hAg7M{4}>MYaaAKTgOC<1lL znKUsYfiSyEYAj+h2POit+xEEEW@ICL2faBPPPS5eew`o&G5^TOv^P*}jN@#h#Z*AL zjC{2sEJY_W(QhEk=IU`S)RuegY}x&`RpyU9PjF5}86JGVXWV7pIuGM>?VoYT%Ut!4 z+Ndp$U!#Mr`>(R2=nvg6@FiO;2E``9;lXZf6rw&dhu0l6>I9uXR*{w~%|l<}6Kj!< z+x?_C^rnx5bL-7Fk+XYd5TErh3y|U|gIM!u3END0t4EVNEZ|%>UimtHc0~vx);ZL~ zAZO=6Dz5^j<>w%)#5;2>r$pxMBXxo6uUtC78HV3g$jETYOB^It*I%O;> zqFK?qby^h%1S-p0v|Sjw-D9vd)!RA8p-V_cn21N_h6hTwtz`@dG%ioYkPVR55*}9T z0H5xzycY)eXLSFZ#Wo?Sl{fLQZ-NVGpbxAp~Q2m+kKSve-xFnp~y?nlKAIFAJ#EL83lX9g^j{SEh@UN(&{Z^9x%=p0kuH4K@E#1i;olBGQN5XP3ekd?azY z%d9bZaQo~dI^rTL=xiKS#g}WuhPPTrG3ksp<;x%rACDtNwUdnu_2%&?Syhpe{q|wo zFrwF5b>A|f*lPiJx(4>#6gs$i@oShFMYq*8D7cSPN@|blbKuZAZ60)YM|l)MOpe9; zG_ny3QC2PR@}bF7GJ1#?EM9@dw8(kTE^l9Rx7qlzzgq% zPYsbCw8(CYrX`)=+yasBHi(cuKZ~O7X{=-?vRB$cCCIU1R^Zjy1uS)>uq0~{^Yo`4 z@>h)`78Vip8IoR#zF~?m;64*K`@I@g)rU76jP#48KBq42Do6b%po&aW6^VCSTLVQl zaqEFE#l=jsm`i@N7rqu|wPQft*`{RB9yi6c#H_&MpX|o6)JXyOeYQ(abYB%(EUTA7`H>sm+_8N@j)c7jXsAaPAq+-L7 zjDeuui8h38wNz>)NvlX~Yk6r2Y;IE}NFF19_vU7zR1(w`NeMw{+a&eAeD^)`2Xtr0 zR$uz~gSZVI1vFTK%oylWegCbv^%!aPC6>;s*t2Y97A@4j?=Pz$(%8}F(Trg&UInrf zlFSFwz&cYF^`*LdSlT{qKewZXQRXDq|7&2 z2AjQHQ|kgz~ql*!+VQ`JBq>Is@vMnfTn0?-{!h_^Q?g!+TlFyA!srK zaUN7!(eXhcyt=$^VM6PRgDGkfD-EnNTdC4xqR82g2U=5jm58kK|kvIFP$YBbT z5R(v04Fmlp%jRkqVoN|%x`1pOGj3VSi_i-S=%7sf$AZqkR$BhgVm%eqqo49kpqU`( zqM1+vmb9g<&GL-HEG|>0=I8S;?k$66lbZR^0u|wbr9jVC%%{@d|0;5Nv$-3?b_!1`%W$Qgs^9LGSss%vF5X}G&>YUx(-ObtA$S_bh z%j@mkJe$1y8`M!w?J^Y#F0VHj54A7R#b4;O6D?Ob**E^@+RlkgN5HB-*Jm)MTA#U{ z@IJy8qNzc$G$JZNl?AbNc#gKn9crG84`tC$7>UA(Md6JaSpx!|FOUdVeXb$>I^)g zE6=k`zv^lySd`6+UW+l1=b|kM0J@NQmjD+Hx??bfT)FE}6qRMJQ*I7gpj!Q$KVk$= zUuqM@+z~j%Cm;GiAxXASuxR)Kb0y$S;Gbcb*T5w8;J!93jjjbt^pF;7&t{QAedYrj zq!?6oV?tOS>snced|%cras+fqCe)EAX8hEdBC&T^FK$b|4LaJJ0_{)TY)stsH`?Jl zVCU1x{|oDxBm0 zO&Z^TWO}XeT|0Ij?0xIYWH?PmI+NL!3CUDso0ajY!<-hEPMs4Fj9N;82Y4QjyMm0B zVvPis%Z^qnW4UJ6<69f$;=tg`3HMy_G#8Hz#Pbs7$7S8YE|%uwt$(Ch{J!a-e+NW1 zpk-N8>l^&=9ts}_X9t|5@N);_hpVFJ?Z z0|q@lBa1$$&3A6*(jJp{c>|iQmKs8s#3m6Tw$nTB{LGX^a{hc2{ukuXoiv(o?bg|v z*yo#^Hiu5x%(W56wKZU+ygF_mmnSU7%Z1BTPp3buKRBHsKAS3UGMn5GntIjsVm=7c zSR&M1B*UPy-u4Rdx6}Zplsyd(xTa;Yc@=fEVJksonaRm)sTO1phk zQ-fwe5-;m%Pjx4AW$WOkTM!9Z-T-IJ=I_U&>{ z;@M*91&15V$RtAKdZep27-;<8AF=I&f4s!UpZ0|wK{=)G+|hN?&~9*>HUSKq zx&lV)&K5qa)aPCM-8k78NCF$All(!AC89uZ=0>`Bmy+v!xg?7)&Ew=f0#y4H%C%~3 zW@X73a9zpgCAHLbLa=6FiONU}--c;=i$5 z;DAO?WB{e$g(w4965<8q($?#^-&G54lbKK!5tLMC{Q|GHmdVdPsJT;{bQ@)cw6^AL zb2lql9*Gm5_3nF%oWmrP-yO-HVC~3CB^>P_UR8Gv=rWgNZ0(hojG5_QQdh`|DmK#6 za29fW+!tZ$@7@6UZ9BK*dfsHjOAgLN7bY1SO4YO~PyV}YUj3Iw;D1f%`VX%v@`0jA ze8J2vK&ah-+17a5Xa@jQ6bR1JEVxD@6n|?5>_(A9at{LF(vM=mJ!mCSQ{bN~{H5zf z3AGWQyB1bXPTle8ltCRYm*lyAJ1whX{?YS^BF_{-pObHfUXoHUd6AN<8XjVVg-vDZ zS~TIgvtC*Br5fn#U@@^8k`Q=?1sl_oVvD>&g+WX@9Xt$`YI`#4RgP!Rtndb4SS;&l zKG(;(tbF8u5z;;qO0zl)kryF+odnMGodB5D?}G;rwiF<3U{{rqk6c%uWf(4X`g5Xz z@rvoBK3>2VEY{h~U*ev=5ux0nguUad>%^D*knp)(S+>%r{%ww4yuY1gRuonLh>FZT zU_KZo45r2sK`SwbZ&YAoIr3n?Ja+P}U6eo!R~y^bWit&Z6tNVXJ4PA2ZD9FZNOFRU z${&VFc0QDXX)CV#av>oe^Cm=V|GzZX?)&kX5g%~`pnk{&V0|mtz|~3Ge=ax8|D26SU3Rb=ih!M4M-jUftTb&tDpGt zs=quMxX<7ahbS`AR-GJ+xAGHitUZaQi#+k{@m}IMg=y;dB1R)cXfFi;uN64TIdkvm>H_mW%`;C55x;h|HWEcL> zyOTqVo^B;yYWS^xKISR^vuwyz8o zlKweVjv0(i)bwxCIC1N&_g{$_xUoe3dqK$(*gDXV#xy=Kps%(_W+#sQn3UA*Ob%6s z>PsxAT8+cWx%hLIAFc=pv5&$2MD2a%A=>*zaPOY zg+o%iBIv$kJ$aa#4!)7`d-71_jVp^Xg$j8?SskwQ^sX-$WEHd0D7P-*7i*wDW~gTO zf-+yFLL+ltcgT6n^#{f@GJWYc;J3P773iEnI%aXQKctasRX#(w$PvVOy3reCf6d2Z z-iXbJW+b=J)HWEXcwb|1T+F#(%52T)m7VpH-E?K;sM(7>UDoc~KXyD;9B8y=OiRU` zR`W2E`e0Cs3RP4Ccq&9)61GHRq};1c zD8V&DM=eg=%977G6hI$Aa6>%aj#}YJ8XKj7R^Tb{4Tw+M8 zBWF`#B_$=>Nxa6mul)}Hr1ycEmO5K+y0{k1B-+D{@zJ*VYI_PxYZl0Rdg^>n=%Gqs zldh78s8N`yMu6=voDb0}I$=KHSN5F9-Cm)ra$uWQDrhY9*&!R6Q|1h-vY1~G?G~Z? zcE2mc4Mg;z=hW`aHX})~>xycmWA#H5%t%qio zx>yx_!*ykSIoKg8l_g{(f_a#$X;lOeLJ5Fb*|E|I2#tLmTa0#^9Bnn3mYg;^WR&!T}ok=VU?}*tQ zqi#kh;z_T)#kipzf3swhABz0&H!2Ld)z|0kx3C`6^Re)RDdZSe^SQ5t6%RO!xs|qv z*OCv%W5Q%M2N+VYu4xb`+YvLg-CbN-b>;8d`2Cs1t>mX5iyk94X2ljqZI zS~XKtJh;YZ^R8I_9P(V-UQwBptEpot+ZU~RZ^3U|#q}W0@x(T6cn8OZ-u^F|9aLGw zYNv%&MmH1O(3e-aVNh9lKLq+sKo27T+HKVd0W|XeLU4zuVbSGl30E!`o?0$6NZgI= zkDk)#InEX}+``Osg6#qrz0wbLUw?9-L5a* zCRLcSN8vSu{zG=+kb+H~he@ryEemv4#lG7)8B+giD~bQOq*2#z68kf`suer8pP9Jx zeA}3G7+SsE-|V|K z(9Y$b(yVs7kL!8m8-6=d41gdHu8unPU!05_4z%aqv1ftvu>McWNqn-y9`1X3URv{= zLcFf45;q1yze(z;556!d$|rD%e&<3s zzNr8ho2dC;XYPL0%;{pU=upJmEJTNqRIpd4(dfkUEy85H@3TUx=i!AQt z4b#uh6Dtn#FWh>#$f#=QI%h;9NYB)^#fPeIm-}{_7!9m=tH>(ysS@|j@yE>RZo{gX zQq*r;ze7#xl!o}-hO392SBM9ZhOie^H7H9J#EVKU7x1DBJCJxu}&L zQWQ_F^G@b)7X1(7hePkWHX^XMSQen)n&o$}_tb3+c+q~&@O8J!4L9-yZfiY8EOX5; z1Ir@}ve|rP{nlkxZ}?w76bIb%F6BDKiPE{;x#^&UP0>?Fv?=VEMAg3Iv){WebMk%g zA%l*pq0Krx%Vl0m%OX$z99?hx1nxYjC;%3JzMw65?YV=fjr$m*iN~KP7r>s!JRrlI zQB4ehdDW{6{h4PcBvVtlcAC}w^Pk6I8+P3~+pIy!ANz;**QX>mN^+M-8BzwPvpgRi zdtAi(H~Brf4iv;wrj1&>jr_)Fr1o-P)jU z#%N~tIJz`APHyKSP^C9Ct&%(Q;5)GuYx8A8Z61pbCLSNai=86H&K1Fh=km%|no3jD zGA&PE8muuoA;7QdwT(A$>o~#5 zGKf!DFNCUIv$*5+fLXS(()x%t_U{oF$g>?gWTaddih5wGs+E(1c_p8pweh`8aOgeR z=2pGadeE{%qx;gegFAq7N@7fZf!ktSr>*?;C&jZhOKmiP_(ucO-0jGYe{Gl;9cJNslGlBth`YscZkn+`5v7&OY zQi6PC9MKzNxzLZ~O^v*w_nP8b8yjC+IRQsr-G#pFx9eh4fwzJss|wmA^}G@~U#^gb zAB`F^B>MjJxQO%b+d^heY&>@`S_z{kFDoV?!Lzp6$S^gK+`d(AP%J`-ct+U<8m`LI zo!n<4wV(^BzEDeHN`lqm`apm2w*@o|EsV0=LI%iYk$8!S`N~ zx6WN`r-?i7`5LpA2DcZB$%G4U?fW{ixjvZeAVs zMEzEM({AU!|F|eynf=I(^if!`lDZRQkh14VWvpt#&cGC%QF}%XgtV&eN?61^A?8d` z3}{ypD|QO=`a2%mlr6lii<^X?vXlcBsi_)~0xQLpdkgtVa?fJkW~Cgxt;qlC0To9N zU&@Q8Ilr(3TR?BW`ryWa@Ek<;lz75!w`7!xII%?cXNQ2P)I>uECaQ|ikleHVt|1@H zeXQjKAg3kYt|b|Cie+k@78HW((6u~;_+_vM4d_W+r=285P`rS24M?{VVHS!fw`#hl zK7NkjOMPg9OU~JYg&0Gg3O(@TE6;Ypi@TMutR-9I|8&ICK)>)X5~_r@-Nw*Y*n<06 z*!f(RUD`y1X%he}f}zJ5H4hO0ZKNZGTRa;z zH%`$Mt48_R^iCP&t^tcM*!Va@V!_-r(c|sOi69&I6pM7ya~t2C)-@!cbnR8yRF9YW zDWcz=+nA`6QNdi#YbQ#2Hr;&3inHiF@z_0@+YR%kD^?4^F9k(rNuMSl#UJuGW1&rY z?ROC$;w)T#zuBzY9?Tmmp!SQEI@9SPllFWwgg5EE`(sG~o*GFB$=`5U`U6^?o4PG> zxdZ`1vUFr79?lsgWPw%)PghAu>;hx578;rdBPfWJMaP+)Zz6$&nTmevZ~gctHMUjA zf7a3xs;*jgMg=K;B#{a-A5EIwSbWE|mOwEXN;CD^RqdYL>#dLU1KAdJuC?)XO))E& z7fC8H^~4EdYs>xH*1H&ROG@}?^5Hl{XVeGJZMeSzhAZvP5n*1>hN{{GgP1eCKFy3~ zFuzz)g<_WB(x5AvY(K!9xTE=?8xdn9%20p(?trAul~#w;vbNTD&V-F#Jf6ArUMgak zGCJbI*iL>BUUced^X>{3*F{|4( z{QenbJ$wIg2(RY$-92~tQEG)P>JW``$Rf9@aS3dw^)tqa5A2*11mlKr$rEUtyx2T^ z#ttRZQj?*RaJGrFd&lC|?W|S5+6&^e>S!v4PJEna#Z?6yTaZeLF2pYW1HaJ{FN0II zR$ zp*&{e7aKJAB;Su>7(&=IU9mF1bf8a7=f1SaqjUMS?OuX4R~J#MvN*-4#AR~l!L82n zt;|3RAcqBHQ%%8*&)T!7jC{=KZ-zA=%X+0f!|1Uk#xJZD`OnU&2vl9cck{7KYTy!} zN3{F@t{4Ck8^5q8nt^W<0(fcdVxYVTd8+IOSUfb18n@V2QjiInIEwwg7o^B# z2g_?CB&mv0 zs+e>nTuW_Xk7*ET*lsKd!iWP zAe2So&XbmVvM;j2Mh!^L2zY5EIqx|p~9Eq)QJr4#mxa#kI(#VecJ_? z))Flvqm0JQv0Z0cBgqGAjyLp*~l$G6AvPJ5sIBM*O!(8gG{6>98b?!A~|O z_i}Tu|3ME1@25`duPCH-r27O-EiB-OZ?K%@(`sNaWRh0+(GWwOy+r{b1dWBu^ex)$ zpz9s^8)A70`=pGi!P8cX3j&kXUA|2zoj*lRX9v?B(H8!@mXHUz-EN-RYpCUw+B@xb zQfj_%<|)dYFcDojZtA&(W7&H@uTT%FbNUI<`c5uDDGl2xZYLPmlJMCtfJw=-OV zX|jd7QY>TTq0NHVd8RHFeVFZ-oV~bo!8na7B*{#Jy_Ssz@X8I;i|?MQ$R7qnkPL1$ zL%1rcRnTv)BU-gRU0UJ#=8U*n1qI z2v1T(z~eRbGQRNszK1Cr@vTQhiXl3c6>SK7LfrdLit#^!X?; zStaX*x`wVi5}r#9xLoh_C|n{6?Z zP~nNND_SGVsnWykS|}F{&&j&xt@F~OW$QBc)Z5-)Z9GBHig%~D!!A>rnb}R8R%eFk z9alw~R0jEqYF$-#gtBxw-{6s4hx!}KOkDAQneoIOGAXAEv`v?X;&YX;CneYwT$d-g zJM^|`MfayityXkXNl}R8756j8g#|zF!jptfC!9T^&H0bB04R84$(HGO-hcyAqR~d~ z4oj1UN^lxLLV)HM;2b;1Y)NUY=JWhAPio4>7asMO3QCNOH-S0sTl}hAq2aMSVcc8+ zw@L*~Jyw_ruflKcQOjFPsjiyQ3trKc_m$~#<3hKFCZ*VKwVR-dpq%iJ{#bvfwtDyJ zb|#2&8L_W~-v~LLa)pCDr3eSo;Zlp?&@Vc#S2e?Ou*>;1zg2=v*v#tndotV((60hk zCLS0;kaC92fh+jTaZ{P_WQ*KO)<$}WjA0dbD%G;G*jU0F#smgJf zDLm#~yn|*@^(y8B+HBt6#8(B2U(9mOoMj8@bpUrYV^d#Nd#Y@OsFj&%8Wg0f)S{g` zx7mL=`bSPc;M+q5@dv-3;Pe$LY0dN4RSgu^2mpL-Ab8#DISC-RZRMf8Nbei2+?wKC z?`h6xlXITAPita!5G!NPE|c%3SW0smI-^cpw6!*ubbHi1g4>?Rq{&!SQ@O~+S^PBE zqQ+!nF$)b5*=9$tkRq!uUW+d41ANmJ%J1pg-XxKU*Isn2<_$aAb6jPk=IE*OAX@J_ zMkQ{msk&F_V}tM6D3UAD$$N;8CxHxd=WV|=o`Yu!HAI}-yBR@=u)0|%y|ev)aQBvR zQJ`J;uxp_rprn$E#7L`vG$=^J&@G^Zl$3OfhzJNsD-0lA0@A|3Pyzx=GjumY$IvkE zJ-WNblN3h$_LIvUVizV%j~n6m#-IRFCw_ieSSXxwdoem0BvhH9?ojf%5Be(1J1Pc8 zP|i+9waEk!dIHU)Ax-m&mMqZHQb6gcRsLjm3+qdP+ zbzWQ8;nC!4>3%OveyZH;nd;=%m<@Qni5OkFV1hNiq#K^|q)ScL|KpeEOq<+xxh- zNh<&#L7!ZbuO&?IAEkJx6b}q&k@3UmK+|>n)fpNZX7B_z?lSLlJ7?|GNr^waz%!~a zl4)42qLTc|e9LfEqwr1mZ+N8K1k{4#=ija#Jy5IiYkz5sW!YmZ&X1<^#&rK$&ryiG zpoEAV$VB!s0FKF1^?xXgsq+xOs_PsxY{a>s#Yu9l_VGQej(``K)<_3;hO?W?x45>l zT)z*&E7130j!3%UOVOv7j-%UT@;iZLm!2zIGfDERtT9C@tA}Pp&^mH>dJ>ckI}K|FyWndC>8syC;t_=xhFMkq|H$@38!MW$y!l$*3Fy@NqLe03qII zaPk%=$p}jV_0<|Yp*4m<~i8hMui$BOQL65QTg9N6uO&Wk{CVj`fp;va!fn?_g zcI-^gBElbBu4cdzWr8J0Y2iV1$-Npg^mlolE917k-&KkiypLu4Ww)iJs7cB^O})D< zTh2R`R6{m{zk}r1>E_^iw5*1?70xMr%U+d^8ZHVd2a8Z^6sq(vR8Oc$=BQBpQ+wik z*cTxR2acUJpEA7zDH*5>+Ru$kIP?jvQc(ESvanrWXb@X2B6|Wmq%LX1x!oKSMXU2Z zm<5rlHirfUux3VZIG$|!Kx${705DMEeCd1GqrZYw&k^8 zf=B8{$;>`g?E zplIn(o3P32g0h)0`^|6_=W2)1K+V}Nci!~8n`UG$-)kFJcI|cdEqa(9qN;vM{%_Rm zhor*@BaD(vms2+-hH_LJ0#kjm9BW-Rt|bzqtqFi#B8qg<_>_TSyYwivTRc2Y)1N~D zRLv(4c8k*7#M9F=ZAU=Cb$P}E$~_wd>U>nFa!93FEtL~*moXJ*1`lhHr!=akI}$UA zCF?44WImGF%+R8G#=N^m5i6ra1DBlfki3d~*|-fvXDcyLCw(g5yaaQ>XR_`JKyd8G2M3_XCTe-s-qm_iR^)f5yIFg>{X znh`AQZb!$U5Q+`6;U?nRX%`>8tqcRHw**YZT;@Quo{O>GC`Z71X=_eC*E@u=uL>N|qx55>al?;YDY4>J>Nex^l@G>=SzK9@K zGOZpQIYo-(2-EqLf~6dksuMvszJPISMM1el&^(tu-J88%v524Tlzn$%Q-3q2PfkHW z-)*_L-KA}&z85Q=E`v?JOcPrcG??xd{SD5{f~llHPgVKMyWH6`1}ynS6VFwY`W-Gp zEiSWs4c2%kxIBh*#h;~H+Q-=Jm*!a?Ifwtn0r=Me6Suq0`f^lmG%v(wms+wQ^j7VC zb3_(t95+zQ1nzsfJ0kW#l%z>0T?F!+_gadzRez7VU1B+sMRW~A3ZFSo2+bDyq7rx~ z=*gD&v{PKP#naEH^9&#RUoocm3!N4J9_RwSs347n@t`hJ56zq&h=PH%jzwDK2Q=B( z8_a!`fUT4s(Eg#U|K6*sK$+I}je$OBNPYLx!!Z@mJ^V`-Dr-v!O!!ce=3uOG*PwFc zPYq-s`_tb80DRN>;hfMa%5td9t)WbO@A`UJbcH6I!%E-4W;c8Duuc_QqLgJ?oKbcW zl;r>Y6Vp6it7{^jt&l+X_LrSXwF?j{guvOpuZUFjjUTnHeXPwj^+&)J1fkF)z&(T1 zfF@etH3gc)N3j8R!1k9{z4ttPcsE{wm?`1%R4HaRAC6dau5um~5Yg$OVQBN3>b%mM z^w(wmK-l;O-;cUV@iw*W&@d5-5c#hj)Vqmng@!b~A^mR*gzN8H>Abb%O8h7zX|q*asbD6DDvxZ-|+TcME_iO0J6__7VEdJG!0g%3pEBUqeO? zZ)^(sj@oo}MNlA@v+9XSwDl^={EB}4lXmhAHd?$rVI*=83_tE$NX4k72adY83kW;& z?rSRlB}qR}IlhBv0SDm892jzqM9|4bI`Z#m1S8NM2`|$G{@YK|!@~64FcU1Jo;y_) ziRhiBBZWM~DhQ|MxL3;;F*|;;hi6=if67|DsJelutLiZ(6uV|Df{s}xTRlqf zI)3Gsa7=^QLtu>e!^bePJI8DB$yh9~>exxdb}lY|>ehcbN-)16TlNd)3MBj&NEm45 z{d2O)HyHp!4}QV=`F8yDuwU?VzTfHpIXa7(!+!xL|KD{qI&5F7Sdic97QR3Je-in= zwaEHcxx;_@Sd;)jareluU8(ge40piTnnkBtr8p>yJ(s>R1tQ{85=Gl zPi#BS-ThTvLKkSWH%SHeLY+#mWn8EUAA6FAolqsiF_XWXoG|9lUKh~kh3ZTgJz5l3 z`K~+|kTJe%qKkD1P4qFn*Aliqg^xKl@{C|+RGnMa^M;S+rwBxjc}61y*HZIH@CZ-m zcm0A^$Ozl^+CoH_%dGD!2$2iz#M@y<GBo|fR)JFj;;aXlqeA9FR}X$Pw@{wB z3=B0Z@z~lFpCSI@EbCsPYrxhRy$GS?Q;s0|r2LE96rQlJ!PTo+jQ1OH4drnKV*xA= z>lsOI3-?Df7M2`8?(Dp73+UX%B0M}A5gc}4?w-k4+u4|XCI`#{E6(T@2k?9OUzN`% zPQ0W02F$a1)GqK@ySA5vc#h_bJvn4yGPDOrMKX})M}whIdl|XvJ_km#ajE5swUSZ= z5i&IvV%gx`1@(a8DEI=~u9ODbAN%?2g@TG5hPERJmYit*fkIXj#lf82hq~-D*TnxaB0F(!qgybB* z04Bfzo^@z6=r8*7My1#`z0b%h`kNBrG#-Mk8G_*Etlie~BP5h7HrB+xNMMWzvDzo` zJ~^@xykHRUa(}d3>{St}@0~d>GHMTgU7YXk`?o)*2m^PTz5LN&Q{oV{JF6>iH<5zp z0T|2&dm_bzyC2mF@ith4}rw$(I>Ev=ELW$?qIXM=FLA4)jbdAv3uMA=h(Hg z3YvzJ>etLYVH?KI_1nrKeeoy^v`)ZwubtW|T{fc!oesKbQ*z8Qn71Y}(s1r$NF%&T zn-mmXPN4gC%x)hpMQ1QkJwd3A@aaPM|JZ-Xx*R`yw{F}l2Tl1?F~#D3#(86_(~7PJ znKqbV9+i`s!TYg0J-*shI+&P-|JgyPg$!J^2b zB~hy23*63m{DN6qpOia;Yp0rsq+C8G8;Ej|FxyvIReipZN_%!P;KA0YyL9p zu3|w5I{-0u1@nY!Y#L03d;%6meb5`OWL@I}shW{b7MW0`*ClSF1!)7;$m_8Cq5C=u zhZhx@L6XuijFeRVgFZk0=cOC~CU@ONTURFS_{ep-GhhNL8ZwBWUb`KAl?w%Z1Q-T-zp70( zg^AsV?;@&fd7YF6X{T-C8I7HaSkd8fRsm3dp?~sEP}t0@~|A;9sohe=1+VebB8iEDaX}>XXxzSEZR6 z9jFuR#gO&LsvOfYxCOHG+V*`{7AQ~wPrM@UyKYHNutKM%gvH}$w|*ymBI0t7H*_E_gFck?Am=j9+Dnv z4$@61QNW;H;2yj8zVw&6qfH2N5)$M%vT3um7PpEOYZ}i(>y6cB_(5l5DNrCxbv;*H z&ZNKdJQNqv1&7s^IbS?`TH5uR$sN+hcG}cWuc8<%7YQB)pH{AoCpW9U$$z^Y2VDirOj;Q>m03r`ZS>VN6N<~^g-Uo zDLY`Tjh)tj;f7`=1N}MdoAg8km69VCt`J~ZwO5mr+_1)RaYn=-!mnFufh+`8pBc^o zptF>)ZaOR18}p%hPgpQ_(=O8~@VclTh207M?K~vJ(aNgLA;2#v;CXnV%ATQ~xbuUY z0!i^F!M~CtKnBvqdP-n2t(Du_O{cZ-ChHlOWFSg2{*bC=`J@~@kKOgE0pO9iv|f`q z6c!Sx>0S+`!+cVbk>nGjt9P2@^9kdbGzS@N7siIB*qZiJnM`Ud8$6!O*Nr^{vs4E1 z`1w@XA}@lJn&5-Vtk9%9(9d-3lp53Gtdz*XbUuk>){H8)r}v)5HWO)_16{Ag&)u^H zP|7(sw%@sRqZ@#oq?vT$#~CUc;QZLLQWbr~$&P9X=83O{3f`{?nc@xP>`UG-6v}-U z=FSoMl9S&RG*^GgoN+Jv)V?zBRXQ+Dqmx}*jbkskO}7bvQ{)|BU zYNF*D$lgh2;iPXgW^QsrG0cl^bo_aEl9Xa< z$5S;u%FqPO4fdo*n+RfUc|&z>Dp7M6aI#Ei7|@7Mu3x7Q{?lc!53^Ao-b*Ja_tBvC zyxvYd6B?#`gnca}G>6kB0S(d2FCN({I}3`_-o5nmp4XrujPf6Xhta49cWM`+ru5f; zUjnkDoBoa(c+y^5lda+{vj3?_&F?&-R&Ig z`cEGMsKxr9ZhR3Spqx`f08Pe1zHse7)Wpq5@$zBEd17;X*Gg4CZF(O0fQ;q{+D9HV z&3^c&3|I4Sg?PF~{eI4%Rq`;L=SMJ=sUA3$OZ5Vd`XI_^KR^=*e;K25uwR<>S`c*O zY4}sOJ$1X!3?VJJIU*7C{G0+h0`@YA&?nnLq$bYnsqlbY; z{c>C^HW8WCN-Q3 zrWVQ?!C;n-a3k((c+7c(zuk#5F&0`Uf8)Zq`pItdqBP9t#Z@V}j}5kAkcX@ccTW1S z$vw~}w4Kj?rWjGw@J6#izB-5k=lxBIhLb}bD4YBnQdgem8`Dp6m7F0xJH4$&7@$oy zRWjpvAiA{EhsNwYvRG9?I+X9*t2udyELOS30W8if!7j@v3)Pq@^Q^SCA(;E-&3v~V zD4t9_nc^d=HlVvDR=WwlPkfhLLRUTTt|g-f?+JhGTL3k9?9 z^oz|S=VZmto;}OR$XLPiw5*$tralSR_r}wtEOxK9;>fDm+^5*`suM=%VAli8GY>sX zTmpZ$ks&X3uQ@{oiZ?$Mz!DQ_xf{v=^;W^!I*$!!P?w4;A_w)XpFOE9QK)0ryvVwa zh;80rduPYO1+;V=HH#_fh2yk1zFn7$w0G`R;nMy{*NiWq)Ngte?%tx#4X3uEN{n(S z;J-X3C~uN7FonN&Dv{JuIoY(ov-7RUqhqAu9*Mp zST#>U0+sLSAWgG-AKKU`wn(!Y1(AkpK1kLr%G1m;s);-=QbFt~-%M&Rgv^kgJ2K~b zG;fjOwW4273*lPr{oB1IiB8iAvZ z*4i7fvQ(~aZsCpBoxosmdQI{xS3bzY9hW!K%)ptK%Ac5(nR6!&WGAjY5s+1W$k(S{ ztT7zcBltAD$(eu``O@zV(;MW7J8v` zQrO!SVjM1q>_bC$s!!@uHAsE7qoX5) zu#g6@b!|Q}9Anj;rI!6Toc%qIICxp+I=}tl-?n$XAn^vA|i^Xi_6FZV8lKe z@#LD-lasUR;CzQj1y)@qi+ykugjc=SGVR^D&%v@t^|!6E&+c`Ah3CqzR&2k_A>?h9 zUYIP>T_$m2aL0~5`dw`No|3BU%&I_(&P#8VYtp7YPinR*W$qFd_4Cq_l2cM%yc~Fy zii(Pyyi2?zxUySB-YAy!x31Je{Z~nb9$?wmlpcsknZC>MwfZHb2B0L;lI)%H49@5{;W6!Ioil4K1Skkb;~M)x<2i@M^A22h){-5?ez>i zs=aB-Cz4XzFwIY&&1l6+c`wW{?p<6axxw6i)I@?I0vPx(55 z0%@xXS08mk4f?H!2%>L#(4I`s8tBdw2&^`Xw?Limv)T@WU%=L~op?=alXN{Rbz>)P zhV9vyjZ8+}8O}3MLIc{s=-Lr%Z?{f!_mEJo@S4+(8n5v(m}ETqVE&sqwQ|>$oTYq& znoNCtci-X~)OMHez9>HpLd#^z)SbKENG1(D_K1xH{@xOSW%=q|WsaccAG=nJZYq zS{y!e1bzx~ydc)8V01O`(*=dr73%Ka5qkHcN9`BKsJ00C7*1Qn}&inN^R&b{$lbI$+ z&!ycE?pmg7npXn$YDjjqSozBF+!y~;?Yb1azM4{AQ+LFDbl`cCV;|-giw`r?(;>se zk%gBmY;0}>7hEt)GNQ~eU;B_e!_!2iVg4%Q!;J{$$8x!1o?7%)Jt_QG{7neRK2e{e zlB+9+NE?%3iloFC^*gP!6U~Vkaf~Kpiu|}cxB;-g9G>DwIBv9|t z6(ta?Gi8B8Fi3D$YlFCpj?GkUnn)JC~@u#~DQ{UE|Q27?{W0S@s6 zYhbz#shkYnD$di9%XoQgZUx;Xhg9)ge~6Q|?oeY1(?-~d#-z&M*0y98N#X5OGNJe+ zVcPNLzF%!i7?*ZM%GKp_mX1ei$wHU*E!b3Wc#hmOf@tU#78f_Kn`uu~n}InM-}a5& zA+J5S+Y5EnxUfm1&xn^CR!Rxr$&k%S8wd=(i5}T~88xLTd&Hf042BD}S30ges2CKo zH!d%EM8z9duwUb!9xt@E#<{*M)3@yU81+ozl=)$b!mY=pk-7=n1<}K5|Fk7}v8Nz$ z2=b}vhNWDO_W0Wa>N&IUklCZOY*1`mr&#qzc%;nkHo&9ALF7@SJ7GT?zOcKmM3p$V0Bl? zN6cFHoSsL&l@kB5(7}cAE3*eDPGGjA@7-0kOOD$SoLJ&l&Zt)yiX zIoy?UbLvvI+x#_qORe#qJC)T<1*tn$Z(T3clZ;K+Z@7>WD6y;oK*9{t5+S!H+B7re(|UVMIPVda82VtvGTA zGFoix-HlfaW_&l_M&iPj(qkX<v+A?Jy!Cm{hz z+RR>KTGZYuBuf_aTYY_Gaiiq=W;JQ@v4ZMZhQMsW7cuIjPqh}o!x*w^p=w;#h^u9j z=R6A~RcXD#tHo|ysu1TsdMb)DuG6cUzkdYUK&3enXp|J`!#7wed14q1?MbPJD%AVyCZ}T0Y_waLBUJLp{1248{u4sM+4uG ziM*XDR)8z6M5PBD7QvJ0d?~V}U@GV6sGhE-wf64T@P~7)@3jganVNns{Y~=&c8M+} z3%!zk_*9jcwI09Y8lbaK=FbyUVs6@mfpw0jMD7g8%X*{zK{s6(OWLG25GvCP)>+Hh zq{U>TbVxk=6qhB4k%ZfhJ)!v~P8yk*_AD($1u#1M;c zs%|!(vG=-Rw$}qte_-wGW!~TJkfE>&`0WVHzN`5Fs8*X5q+fg4@JFInn5b=jLePK$!!hgQ+n2biFN zQwXP)9!?uzZLG`PL_N0pu4Qy24#{XFFCTI{o%!lpsaTE|J!*xsn(Tw+dD*t-Ss$zf zRz2CtyPeAc+C+NojO!29TozDLor?xhOGx$k6Xl9n6OI9fuXyXTOpCNkkK8yt@a$@n z=qTo19iQ@bV%5UY&+N4C9qWUK=;p7yS3e1fR1X0Q8-&EWZi6?epmp>>_?=^g1t#2_ z*g?Itn4+XJb_a!~vJ^ZQKZEaeZAq6@IOx!= z+C3ggBsCr{vK|xG-S_sE4clfm2T6q(S+8)%fSBwbo=K;#=#@K4YSAKdgU#P!n@w`w z84?p&Uv7A{S^dTg9UYyap`l|~czAena=zt1DwLb!iMd9a#rVH8THsWNbux; zJeo(B&q6gUhk5zr6~@k;DcjJH12H*a?IbAk&u+^L!)QB!=s9&yX!}4 z)h%B6PD?jl#hi^~EH|HO_>jy@S<hhv=8Gjca0JPvv?){CRnr`|~|n|Cr&NxNS$SCxhF$>a6dT!&lTe!1VD>6qt2~jOJ)_5GyE}Klp8wEr&{wFGiH$Igo)YWq3)JPFH+{1FpYR!Jym# zyL5rEOV}sxaMuPu^YqtC8BsQdDjC!4Ne&(!sN2HA)Y?l|=&!b(Ox(49L}^~YDBNaq zftf0H-;Z9-_^vkZBY{k32|VQQWGSRFe<~D^WeV8+TZujrKA8?)V)ol!ubHQ$TYcKp zE|YJqY1|L#1PFAi<{ny74FIafNeEJnf(Huqa=ITjlfg>vUl&$ekimGGz6tdzRoddW z*7N6sB1azd?4IbM^^e|&sx2tQ&35d!wK7UgW_}#Pa#f}UJhzA3>@87YaSvHn6aS`3fr9A947=w&D#&OuZ*fW&O;g!lEmB?Zn^G`CgL~)J@D4XO zTb_Hym~NQPJNG7`y6M)N&?NnEX2BC6&=GRmHqE9gA)Ul`2}G8I&S^s>=GQEXuglh| z3oM=WyIjge-K@>^fI4x2)#Z)RvSZqIkh|fbRd*80pW+8vlU(*{)%^|I<>$obKP1Pu z4xPMO5JC!G3JX;#Yy`rGDN)4_GP@vE4)=7%HWoVhF2deV_A|K;4SoLnQa$!irm~|| z9nE8JdVi1Svu{BPWSV_(e}Abl=pOE%xt$s9Qc|;yy`v*;=&O(ri)?7CL1IUG&BI2& z&Oa3Sp%$I!;X)II!y~ubszMWT%gupM&f^Us^Sggp*b^r*UVd}mW*2y1s$f>qyV=4q z8`rf7h-Hm(YTgJZiQ!={iBr4FxKVL#o^?TkRcrqB>zL!x6xP#Sh?2qI%b4CXhEqq% zrz8igQYr_Q`yy*eTdXe>CVb$Zdf1O>y_ni{8K1zqq+hxyx>!eHIoJQm`kV52)FZeB z%*G|tSLaW?0f-paj$_~_zdHACL#h{EVeCpr`nUWC~&O#56?eiA0a+ zU%KR9mua-#RZ1Xy{F$hIesy!~C})kqZ5C^JfEB~{4i^MQk|tP0O=+B1eKC~^Xmc|y z*~4OMV~~q1p8VY0TuYzt)2Ywqr{nv6X)gHDMOaVL)GHm)C{pdE51X9DE@B<2Ggtj& zn(@2XU$Q|=ZW`A6lNH&b`_~oPTyeaZ_2|WgxSYpE2SF_8 z(#w-ts)GzgrfW9A%xrzs;aerl<~7({G}f#8hs>?=z%DG3ja9iBjoDI3eujlHgG7Y8 zvAeswe$W|OU>|^Cyt4C(Gcu*nlyBvIL8w@}W*28q`JlC=Szdnr&1Km&+xLgrm|7`LQsd>`740B72`Q%c=*cj4D8x^U ztrtw1krq#K^ZlKcT&I zuu0HSZ09!8OLHS#WXEsy7*n}ktFO10h&h~f%GTQ&6xqwe9I-zNR<^f=Zn{P8%xWko@>_TwFVLv;TAioPK5#zyAr6 z#f3bg`6CN(m)yj99{?lD{2q?wla{Oi^r?hg zfH_vFhjZmpn=J0b3upz;SefjHm#9k6eFdZyl0oECbe&Tx6sQl!j`d6C)0@2lPSVg; zc3~a1)vCr2wQwW70oEwd3@%YyV7UIw*`6fkC$M z_^XC%L58+Qyc@nJ#Zqh!lEE~iKW1+RiMKun=y|hbL`1@D16%Bch zY!<@&#DaS7E*T-Ia}&{>`m0KT?iDjEv@j%4g~@GSDQK}$hq|}8e4?!}d^<&gK&X|$QnA?Ne(bl5!8cj#6Y>uCu%Q{t zPc(LTedC>@!v1s}uf3V)Khx28P{#d}V$$Pj$hv9BPNUidQnD#ND}Ld81LkNGrJ;BoaDP%eJ{tda1D zYiT(EFGeUE!awbtX9)XPs~*m@<(zr*6E*)5y~CwNq6Q_C9L9mLcz^|`i_pQ3d#l#V zhL+F;7vNgV1m%<4)BJBLl(ISXCLWzke}pf+vG9rA(3$r_h#R+DBW}3!}q@~Y84o;y7mPutuvUc7g@UmOx7q42j z)@4;F(alTk9~>;dVSq_JbiK?o_z*%xKhXIsToi3U%Ln*lCFYl?`eOz?1P!9I*US1^ ztU>LYf~VF!BHwirLEB{H)w~b7YWkVUZ^goD7wluq2_)5=r`LJW)VKTzir=z4s6!>1 zt^Lj@C>gMYMqB1FRn#%LPf(M-1v=dEIId^|q0%R8kD15}S-`!_tJaF$-)ZRPeHDd| zj+LBaKFo~P_KKn=OR6<*?%|85l*h%iWE2=DW-YYrN=LdyT>X~aIB5jQnoue zSHx7sN*MB%vZ{#!*H4C=g60(yrDRz5`#$;Qi41UY)af65z=l5PjPi1Er9eW+(GN(1 z-vTVI!1Ks;sK{wm&ze8fvi=&@#|IzFzaLf=tIczI?}W& zhTFmwdiWb{P}*ItCj~GI!MNKq(c+Ugaobs}St* ?uTrHik}f;ldf5SV^c|1fdUc zh-l0ombxCGn2efITC(2uce?!F#4lP?SLosv@6 zrhqo_`UZKApr%MN^6d%RAt%a2~!%R^C}F2 zleKVP9>04)dtEkO)D`ps$%@Ts22_Neq$-3k)m_VSw37ZRIsamAj{3>;mQn?wQ*2_& zT44H%b2S!;Y3PvD;WnG^uuSc?7N``>c=;7*WKaOatLM_5;-zomD|&EMlQ*>X zDXm%2-ASK|V=u_|Uj+x7tNAo)+zATmF5o3TZ}`HW9OgD*@2%^iYpI`?A09x#{W0w& zNAMZub!3P66boyUID5}Dt(n@S$;%hTQ-D8H8HSr}sBZYt-nX4=k%-(9wrj*-CdZCo z|A^n9fzqtB8y1EjQK)ElV1OW1fYZHMgP`$FPIZg}_+ZK1X4cvzT{lKe0 zIMmrt0pzZTvQZnA=YsC*OK@8O;Mo*%C6T4On0v8$0pOWXLG+ThUxL52M!8j=p$Zun zx#ASWBkUnOXKBAE`rE6U<+b5AnUNLVABcXu*Q+{6j1udsc&-z7-8?_)PZ7(%mk3xh z>1kHLKhiE~KdO5Qd?j<$z(J%W>v3i@MEd2!TJ~)fxe~SIps7m&SpeJ`(!h1>fB2kH z#c%hD{WHgyrr=(}*#ef=W8@_L^_}Y(g+XSGr0g0~b_(nt=M7$XSg!3pD2h3)>R4@F zB#e5zLt!@H#zn?EKqck)n7mtu6Ud-Lhx7o`kg<{>FGsROK7NUGi!D!(nF1TU!k|yR zP8&zbq}Vh(ua7=RyJR!$aFVzydG;%W3^+&It7FzW`Je3pL}6)*nMiL3#FvpI`$4yD zl358X=F?{}`CjS>NsD2wNYQPfO)mJ%T$U#F@zd?p5!2u#=~Lusj+SIc*JjD8Hq;6n>sY`-fQg8f!j7F z1yA4G*bJ*snlo_mnWuC}^A$jO<7?c(9UL4-&{$rWGd9esimDrs_OT;l^GjBy0p9MI z<77>L*&I%?1jT)-C3Q}=Mo22wu$h{3%lK4FKN6%bwlLDQJSw*0znil^YsTNU_GYm6 zu*=MdTbrk|B4(r%ISpZvPHxMtIfs4>*hi;QV}O4We#(Fr3lI){Hh{p1*A=+5#-~}j zCmV{zB#ZAmJ4Fm4yQA9YMK0aSvdjI#V<>uuAES!9eG0m#Am(r?&bcq@43wt_vC7Ug zq{?AakYH6X^KnuqtrkzA3~14daC^1Az0&U(dTCi>HU)o3dxdXn9CgNG*0S;t3wH2m z%SuQt55dvMVlU#$@q%+c>bPa?bzuCqN%~eWJto!(_&4Upm$O3&)E~P>;s@d)8OgH3MT;D$tYWW`#{bhyCl%{ z1%AX2G#HS#Qps@LxqURyN3;8R#cOxo3E%R#rt=c7R^|GzNTB3ye|U zemUJ@+vGMIeYW%g01gxshs#Q48&cEIDAY!RTO0;`iJsxMH~01sZI;c2Nx;WiZZkyJ zlTVR4CLrPN_P~p|za$fW_KVQJ|-K?`_bj+3ZTz5LT z7qASElmh34{&kvcrPM@x!9%%Q<8GyLLZ`6Uei|IoBk9HV>;hGJjy?Ba+c&^05(k=I zwYMzYV`MBc*z>Me7mk$pI5QjT@UHMB$S- zEUa#74x<-}S+8eW%ENubqpTM3XU6*f7!P5iI&*EC5v!I)rj7K|oB&Ow(eSnk76+zU z?u%V|k?5*lA5|z|c=jxN=LWzUCv{aF6M~Kh&F9muS|;%hgOqd`Intmm_|>aFuFwte z)S5M>RDR%!3I0?|5-Zw0bATG25*{jXd6Qls!DdPs%fIsOj71NV>Ga{a!#;2s9G@jE zzScJpkfM;Zrw^(k=_qFiN?f`|7B70=(L|?9N=@m{obP|Z`BU?pk+H(10{$`YM@2U3 z=pQyO5+w{Ii4DV@tOq!{RRE5rcA(9gpPQ%9;tN_}JR=GeYd#AFV7m5=66wvsr*7Lz zN?w8PTcvkrjY@eky}I-?$sw;Y2kMApxQ+*fWKD~tsd_Bk-35i2ED0?%a28q1?ahl| zO(j`3%g84@lRG<=hInAs^F;W!R)EaYayUe#+*Ca_oju|<>+;LW{U692#opc7$Mday zo~tjB$T6yeO)7%hZ}~=S#_9-!_|d)>LBM}>lqwtcFqR2dO0>u@JII=%;FYDsUG#Kfd)4O z=%~t$U-2W@W|J%T5SG;92WT*$VFR8_HhN!$R3uR%5_v#$%Iy z6A|tB76$vnE}HQa#9xIn(xIhFA6odF>pDlv>#)QN*`pJgOY97?Iq!9Ri28av_#%8I zn)I~Q40)4X{mKpYo)lZ0)?p(_)XJ=)53*&Tdd!_>NM{*S`aiHLNX|lA+JqNbN`th#@jI<^R{e+^PaY?zd8u+hPWJb>upM~yy zj%s|q%WS4VE{2q~-7vp2ouL%FbZ+?*1OnNdZ;{bqFk=;bHT|iWQaLqc$zZTxwm7~O z77@AcH-gKu@F1K25jX~3)vT`nVWnzkzN|FAky^m>aGl;}AD9$f_aW~?;q;x5Lz_*4 z;89`6!v!yQbw7tyx^SN1owc{CyDdijkIWagoCX+{lap2Q4seNL=wQdiw8l z@kNLmw;FNA=ev;^80z3h+%_tWhZr|!oRTR|Bz@`ksjYVkc|fYG!>JrsgM5v@-2G{ zf}EwH4B|`|8CxI6+YxeK+f^By0UOyCkQ7XFoxvQ8g@?v6!Bf-Xcipz%FCFYmo~X;x zOH*dHQ7#pgo>S!XMC)hN%6)FeXAYL^nHse{ST5Pe zAaZz~%h~F>9@H4?th%gP;!wM8Nux_CVy!-|PIOEt;N)E}ysc0BL3%KUb-BO9(!w;q zpV7)+HkPq4Z?>@7u%WtXHl|*qd?0w8O3>FhQ`xgFs#zk#i7eC-&pRlJ;c;=Z7?m0& zZzii+vq`?+yS3`~Tl3SL4XHV3{{9+>57~B~cV=j{88x>02n$u|{yHE3hsU`6+IS7N z5Nlw-#5byHf2oyL;sSa?05h?jKjnDI590a6FdP{vP_>iA=_&B4!(Hnsv1n)t>+^HA z5yrRiZk=yYo#bV9*B=8Wt~GK@AhmPjH6uHGp}9fM)jWI_FK7>Fm~(YskbIJoETH6T zf7g!sfNb99!iO!P7OqULJ3Mz(eW)*=((utISDJdNK6Qk_tmmntD!B-?V&qOA?Z88> z&2S~vz(29Sr|c2#jIv6^#n)Rf;eG1gQZ{b^IUDT4tOH09pOrfZ`W$B3R<*+H>pTd& zJjQkbH{W1#!ArHBPC@V}=v2rHSQDz;I_S8Krb3uHaSxDI{52;F@Btr6b0cvE5Ji?g zYntGO8`;~d1|68|H>Vo|uvfI2NJA?9v6DRUBL!DR5(A1(cJlk8vi%;q`U!E*_Fuhv zWqM(eNb=UiS`oK>M`*u#q&mZU?aV6j@Tr~^^PaH|gB=QK-n#5BCS}Ub zM04(7BXw4NYJ#LGIsEFuDbh&e+rahBIy@a-Swv3wt`^@#YwnH2m8)0JI~g;~#9iAn zQ%3%RD!^-_T{x>tZV!U$XwNkt5D&`am`?-`S$i$zH$E2L8_kEXnroM!sgXKWg8QAT zlm$f#bvz?`6nR?Y5^hZ_`czR&-?*?pqN{%lV_tNVS%0i)6z&|YbQ5u$iDc=m+#wL& zWeSWDtpri2zSmyV*n$uS_%>>SJzje)EqWDOLAHQ79H;(MBpf_->0-cm6$amh4ecUH zvE<#TI1lx%IW@1X+3vAJ$0LuKus#T1IEo?99UV9dN@t?C6ZYS(TF?&204D5T3gt)6 z1jwan=aF%EOnG@?X7wu;B-1_3Fkcq5F@zCXxTB=%_wx_(bJ-NQb`BjJgGmxmT*|~q zrJp0@!T6v>Ub9Aan8bI)*B@c!?oMohVVwR?cm4yK`r|qOh{*o9uOCp|AAjx}PWpcz z#r~16_6=P6{{cY%|AnnRW#3YG+EIzmujFeU~xY zk|6XQ%k*b#15@Rfm#$~+ZI~$N{0v_F+wPr-A-;Axz#MTn(EXjM_(7b%k^{UMeb0F( z#c+6S7kyVKJ1cDC+8uk`h;qt}A3}LZu3oKjalLgJyc5MA;--$2OSForn=|e4-!oDv zaiA@3QC?HEeQ(bo8_J@WVvPAuf>Pu!5Tkzh$e=MO*T9yea=JJ>YvM|VP^0lq1YpxQ zcfv)V-%)Cf7IFKYBw|O&tGmtPwV9eTBwT=|Xek-x^h4LQ>eB<3ciW%jI`aES&G3=g zF`#?<^7N~&6`CWnM&M3vkP{GWM)K$9JqRcmz-&p&KD^AUq}uprB!tUj6Z7WH6>4fd zP~t2pC*D)zcIxG?S7(U}8+9A<_M`StmRy^`@r-!f90=;M`Ae`dVjw778vry9iJ+u2 zIr}f>;spT0xWBW#ZLXrA&^|ssK0mJ@9Cl9Z|6=dGgPKhH{!!P4f`Ebs=@yD0K~#EG zdXe6Ph%|xF6%eV52#6S}^j+-TTlsA+D&|epFpKoXl;N`Uj0Naa;(aHHq9&bOeehgNVff+looy63J^v=fkt|}J{M+Cw7R_-^9%_(c`H!ny zuW?(BX5Q>+>^qnXP+J2Bqhdu9;C!ny5}B7(O>~0faugut79HH&a2b;`1(R2HQ%j*j+eGzhb!mi6&=?y{j==>qp`>gaVqdA9mad`A0AR@dEI4Nv@J(pryeUF17K zDYk7^J(%;V&T2mVc8fJAG?HxMX6Y`zlSbA8Sy4vylTS=388<;1LlQ=mIFap(PZE{Y z*8Ta#=G19)Ku$X!Nd1xpS)7VtuccwnIydP$1L!gDYn!D7M`Y zeEuwKLXRQ@;M$X>Z%czz3qEKgrbnE1D>?!2?i-*~V9s%7LXw$04?8=}<)PW@r9`DCP=Jo@1thN%*xF5KcpH*XT5E(( zYvg`8!C!<~6*rr~yE>POjA*9F$2~!I{6=mr^65+V-19M@6kWJ&!Ire&;$~DdU^dPx zTBSb)iZnL7BO)XuudAX4aI*eH0=P_WEKYTEPBdFG^% z#fTTOKHTrhAdl2d#&l>bc-ZXh#T^t2eHml?R|$}#?1op+jj{USYtyAcNzU-{^NKrg zeP~(h+;MD70?Y(#3rwtumY#^B1WQn))!hE`#6>}(kdE=2%z(twqOzLzQDjqN5-QOM zY2+~u^f^SW4)asxUJI{Rbqd;*yS6&+O@^m`zGI{D?=uA(Rm;nimd4-KedUtm$4+}M z4^l7ItaQhhkCaYc-)MH%=c5&b8a~cKWcisz0FJh}Eh9a>63!wY^q7J}Lf8>cw1ciX zq*eS_&U_9fSU&51megQY20uyO@H5!Dxw$#8$OpBUpr1R6 zK4_)?>Tw^a>gP>cycvY=moFB(qI<76Xef(0<2oKZ*8T89)4Fz1(6(~6v$)0H<6GFq z5)O&AuAOCmD*k;g!nd4xcj`t+;rr2j>%F3dg z0R>oL=QY}X41+wWFm?Ze4>dZ4NG>i1W(l-(bR}oAf%?~s2hwWEfc}yn0s$SM`LvvP zL{?j7^-|lUjrG)Bx`da5F*Q_yEhy^KEjFvo^{L^&^qcy;OCLu-iVDr$XknEeQVSaN z@Le1&xynJaHkSe^bv(Z<7%eInj?Wc<3N}o7hbXCgl<=e}l_;J|TV(FPxm-1S+CDK* z_^InS3P|moL!X3Gbxf!+DzOi4@vUG=NtnE50D{VfPnD%q-ecYmZ+->l4<7+zCGcAl z{OP!vbH_$-Lgk(~pVxPh0AllNH2!PtQn0Tso>mimQSh)6o;xab5Acj}u;qQ^Ntto2 zk$KG@Y67zB4sZw4?(y-5OaU)dIv!uDJcr~#Dp=-iW7=N59?41%oAM338r$s4+v$qR z;XwwraEXRh6+2{S6t8?Z?l-aoVcpTG9vvP1QkGFagqOW0^08Sr$7f=~xGU_+ag{r3 zKOP)F#sGcy0F)Bdav&-s^v7m{4!KDh_0l&u+xTTb!{~J^`whFqQ48vWhQVF*0ajo` zAH&NIBn(yS*Oj+!oYse20Qs(X(p?t0(;vEeSuJph8sO0&e5|BT%Q^3b_y-6CIPzwl z43R1VL?2+smL0MWu5x`G7}+>s8WH6^as&W)g!^2LIx-otc8pG*D7vR_doKy|RJu`x zm_lJ{N*CGNnLgnf;DV3nhkC^k$qY%6+>#!oTZWbu{wo~qll*+SX~Z@fG{3HO5)pd6 z(M@%ikn&<=!K@8t*{vC;aF=u~$rZBrkVCgKtDCSvpw>r4%)+OKVzQ6qm3|u4LE^!-yeOsB;Ejd?I0Hc_C;Y%|t#!dezpHY~u@O3c% z=}but^mOo)%Q@8eu<+|dN%jFi8<`gbD#$BVRGR6`){pH?Q}eic=yxuA&_GH>C)5+hM!D znzHuUqL?ENymig$<&M%b94aDk-IPlXCFk0|eVYNVRPRjs2~E(JN@B{Xh4DV8xYHIT zijdiO$j2%&JAD4_vZnr?4X=fZ-lj)MkwmJLmW^q>&Ja(l{ytEK zV=KTd;RM>5WKWIM=WbhTC$2Ss9$~!U2uA2kVW1=lG_UDoF$LlV4PP?x776&P5lPi; zaHBAba?EiTcTEOqRz@Npv)V>znF~~pm$|IO9bQFHk!M3z2(bM(%(=zX3U;BSHrZe7 zF2~=r!;HsWd7W}Xsp=7p-~}dy{0HUx`(7P+$NG!_g>awB2#&W4z%R<^DtLxJ>B5gx z4ghb3m~0*gPLE4}782Qoopa#jBMUu0M&S(ztJ00PG636fnMg=OJv}ey(qY-|}=RgS;okQpEpmzOQ1U?E(=V_snPg+TSj{ zKA>0Gj44^ivPD8{%%FM!DuuXbsMx;=ArRwn6hKbcA?(7r0I^HR52VLaz0fA}0uUw^ zN@1fFHPi^r#f{!3Q5i0?WfWf#$mDu@8Ua{%D-SqDI2j90o6H}&^o5rMiEbR<5SO}oFU`k3DyC2 z@vFJjf4%n?_mRL>As}}O^@cU@nj}dvy)Wuv{CCPyB(lY&n8F%9_MYbGX|yHUah%2Y z0Z2_nSWRutz~&QtPH%1ZR^U-8DU^$1bBPArxF0D?EKxb z)TrTvlP?kZFWynzr4uvo1n8>)A0(CqaanbhaP8v?VLpoJzTidk$)EIYupYBf>;uFs zyef#*ELx`gPE+k&^PT1Zma-kd5C}akF?;`}^Txf0BlXHEeo{bo+bU+zf6)yWTyaV` zhX-cS>*(T@2#hE)?-I`^Fas3Ia%F>RG?qabN0}2+klRIsFQ3)to;>4;3jOS3<|+9+ zQzKb48vf`CIX%fEmv{^igZo3UhC9hxR{p-5a;7PBgFRw~Sepm4PPC(pHQ++&(Ol9sms}GeNA52H-@v^!GKTJ@W ztZucGf{(8ya47r}x0N7Sq%&EbUrT<;yX*Nlv~o>imn2(dYiptE>Y#d}Ch=x)f<~~l zGf@OE6QLEMWZdsAv5qAVKb929`2E>>PhPg)=QBi*#@xRMh$P*Q)r!iO7=+OWI>&Fc{mpb-qr(n)Vr z&?tN$AmYC{j-caHe|O7-=97SGP?4_+%XlztA#0pChjX0M>qiZE*g;MIId&Ue;*>(h6*hp5R0&(^2F%E9vrU#P*<;1*f2 z-hLcK@28gQaE(#hwiEEUYT-Y=V??~^TC$=w+RdL*|t>$g8y5|6_(}iA{L4DBTWhSQZ^mO?nXA{YPuP`-<4JDD&Dt^IVDqu+M-oKRW8AzYc4+{dKKu{E6pRxg ztO~90P*e*?kQLjqRTZ3WW9V5IwF_mGV*Dg?3S8Ww_W|U7qT8gs8ko&=ED9^<$t#@c z7-yg75xJAeBEown-V|Sa`Z)R|YMp>@&ob`d3wd8{Ax4no6+M}6W|gN4b&g+Mj?CXc zhLzNKhTCih<^8qls}Mnb%=Z=}Cgtr$ZGJ!sfhtGA2gy}eKxK$6tW!N2E_(O0Ijusk z-mts>#YaGe9l>`vNwcBDDJwU_ zVB%&TDhM|<1eN{NRL(oEnA>E+zBg@$?Bw_%cZFdLrmnN+3On2)+Cw?aOM@G4FWXn! zqol%HAmHhMvLnFg_%2!ro9qcz2cRD7|C(WmA`9$6g%j2uazb5 z+TJfcmEdn(%VQ>S)XeBg^cY0*$9$2#5f#SU7js4<###Rq%JjieWc@M~11+t3Iw0Hc z&1g#dGk#DAViJJ|o|yJhOYC>))qd&@ z)o~W!N=9ss^|_`H*VjOy;m*eLM#m8%>(&OyDz{Fjwb>xT=lDi@Ch|IN7bJzeyk3;72#^^lnJX*U&^CNpQOB70oNb+ zR^gs%Gow~3`MuKkIpD)_Pn2NuIj!V8qAo|_Z>KFQi*bxc2k{O$qQ@&_Wkf3=EF5Q} zJ;Zt{kNi1vn>;Cf1Xqhj6wk|oWfQMIqDSZBmg^s8)b}#1NxWoLFZ9Dt`)P4o;Ydob;)8C1pD-eqnUPqAGY%l6bsL}ro1 zdX6OzbgLVjX7N#Fj7RqFr@;qw9WG(@LEW)V35*Yx^GDiw!8Lh;CY&qgJ$|&cd$z(b zB!|^WEokHsaa+Nr^*(2nx;zCepXf;gCw zu87|?gn-7mK^ufC*5g`F@PZY-%>HqM=7h}LJr`2O2VmN@YcQlwJJ@SptDIHfa?sF! zl@3wz<$BjEIhc!W_K8?nA`keAJIJ7$28*!jXvQ z{nol`0iS}-COp}%9IFP!6m}VAs0T!YAKdpBidGj4%DLxh2Z-%{-Kt&l*88`kJPi%r z>9TQD9yjJwRh#U+bXk}b0gM2+;)~bw`0d(Bat16~s*bC0c356U%*i{6^2fPQdgdDl zsu-37Z2HB{tNfeaQN-zafvHrnGFvRx)7ABfpnSZTQ@8PpQ;I0}cZ639FaE)Q`S+eX zz&PTH_rHIB(sko;r;xph8-NkFeu3>odE4(D+uwHN%MNbC24f57`U3ZNyuFosBS7>2 zpB69wiqZg;EmF67^@8^bjrRoj@aTGfIa?yYad-b0KQ@;JKp2>{I@)KQ^-?0329hX8(&({#!En%kk$oSl~As zn_oKCAJ#PgJK^rXTdDm2knaB*n(O})Al?6ma`JyZT9&O(A2XM``Z8zCoA zGBeWZWT=1r#@k~)nhE@#Q$8Cx^_;QPGSJ4KOZlJ7h4w0N6U3Rx-64Kc#lL@(w~wYV z&P;N~X-Htdfxc@;pfwoS2R#0D?(fZeizcVdlqNmxGfmB(Mixn&hmEd}jUuDG9Xs|? zrUtEJ4fa!~s%H06t^Iti5J1N7WQ$)I3msBmX@+LUgPqQ!YS=PY=S zegFh88RtH|fEeCH&n@^tfOKw-6#U0$=sERMP&X$`nj9x;?wnQ-Q%852oIcd8Q7S0u zG`y$u3TkdB4I=hLGAKzMuI>kkJYX;S%_Hr$D$vWLTC-OgD!uk6eHS-?q z)<=$XcYyP1AyYY5(1Fw_D;l$O3t2|O1Dw8e{~|H?ql#ER9ZRpQJ4^b#W5cLK@dK7^vJ8YuGLwi->48-xpiPT#Md{Fe$(Al zUJdh|%wD3WW3{63qO4re9SMMY0T=(vc;*K~FnattA^RD3jRqz73wK zpj@Th=*gu+w{B-YG4^-DHY51cvrCC|Zcu6gdopWx8r4+s1s)+GD^FCu;UvY@){F%* zozy_vn1=pyMb1syAx@zq&V8H4c^&2kd{e~!Ds4k%_ecI5{}SaDaP#qfQJw8aG|Q{< zqbJ%&JQ^x77k+FMf)a4(t>sWgHmng|QYggx`}=!%#^Fum22cC+0qMV!v9oAg)11>u z5)y#9 zhY~KNxE)u)h|>5FyNMM;fNEkz8Xw^@VpOiNR4-(wq2L7p_eoPn(waJ9ES9`@iy!=vbY#j&E z)7{m_mhNtDn6&lX%iT}JZLksd_waYm z;lCzk4Y3i+21)UJ;#n6;N94Z<%Dcv!nsKWDx4zJkk`{D)111yG) zMVw{$CKJE77u=Y*#n}6tR1vNM;?Op$B_rj0;15WldV67Y+pU9WKVfMVAfQaoz@U{r zBEef(*J?s(WaSflSMJ&tqXazgDy_0Wax^NGJBQVHOWCyIPq@*ONzX@7nqY-E0>M67 zfigh=`$ZSalq0ALpZ=u!A7&yC3x`NbYL05%XgqQrAWB`eWq-RFw}bg=?>z>f7SH`k z`xV+-s-kNl6K&rm#Q@%2vn3tTC0a85^*|`VM>G6oqq(uF@jDaq9sjUJWwRmeiSwy8 zV}b%DL<_>)Nl>yl1S!;98aIBz#MuA?9D6LS4-(*SNIg&>@IMx>i{p`%rL>SbO z?1$M_`JH3Pq$DOrq>SLR!S40CR*FmSO=Wcr5D*&{p8yr))9w9?-SPOFz)Frnio~=> z*EFsW3|*7N7ImH8%=rMRC>5-TNTt7{SF90sw3QU@$(icU}qg^+27~QQypC~fN#Z%P&QljHI?I&J!ZmGKYKOr z*n8DPMq#1gTvHldWsaC9&2v0rYCtCS2FxC_7SO2xUb~~*$u85XIYY6u2yAdp_Q7JJO&-&nYwp7B_&9u(VcrC#9(ci58)HXeHJo?3a{Rit0H4Vy6t}6rYn%J{z``KT1X^BB6 zsSpt44Iz>AX3wL9d)zs}-CsrXI{5hvJselbuC!jwJcqKmnq6C{;I#vL=xF+wQu7|; zqypY5;&a3KQr|%44bgigO6MiWfrYl!wXQc=LvINLoIL6izW%s!U27$VKxJhr*Xo!_O5CZTuy5bw^j~q%<~D7E#40yXCaSiI<6m)C ziFxv`hq^|={e!m454Lxoj)fmrVSYCa(!~sI`v4g~1T6P7?8eycZYVT|d-&O>rCv7T z;D4G?rYqoLEUs&%ivn5itBv8j?`HfnaQ zQuVrmW4>xhTvuUpw{3Ij+s*~GkK2~1qnCu!fzT5oqOiK>g*i&J>>YhhmJpn<$>&xU zXLbZ}j2+*r8RWqgz|()NKf7;$`*K3}a~&xYvvBMSKd}ix+v5fZ&9lXpocXv9N(>0S z+;gy1>UL8~k#teU)3Y&sSq_npGUg{c`5$|SgKUGp~q;P0V_1Q29d1?y~Ov z)o&lNs*5D4F`q-+x!8k8p|P7b7(G&DOeIvO+2X#t*R?&}a3D z;OtD8toYs^0hKDb(Gk%x_RRBC6ltCoE(0D4Y&z>XcG=1|L0|Y_oe8O|K!Qk_7Ti3I zy<~n`d->87vqnjLwiAnEfXAp=c556^Yjg_d_s1I|QsZUp$RDSewb#REH0F4m>K3Ay zDbbe>@u=~m?3K*dYMx}*)=HdKUrmwByFB>zoYU7bx<)*|x#D5^Jh!Ow}GtFHaZuMxOWxU#Zx7CU%J0T{YZy$G}AI}jFB zGKo8#uqqzaJvd=?10hu2S$8$#5ZhG0vq5-* zlD-D3v7C}7P{vKlH@m!PUI}E(ptxESsMzLW!~c+JYw$x}@m-+$*Sn~*1Dq8h+SN*L zoJuwOX`9#uMXQERmeap=5?$fQcIuG~GECdmV9_)vuRkC9qt6J~OgVSC&S{XhuEo5Q zO1ctbRjixH@WJh_d`ePT`Uw8~7z!Aj(+!J#FLr6Ad=TDTrRt^O zclTu=GN|daK6k8S+eA40UIB!H{%PrTT07I;`x9}4v^hvd)k006qM{w96$ll^15p;cS-=f@qksebTccvlVo-&Rxi&|u-4sW5+DDVpM$A12xJ zts?PuQu@pUcd?52)cXdwYeF0A3nX165QHI6H{hTdM8)_;vlN%7VSrzn8{(#-q5_LK zUmp%=C|Z>;ROLy9ifIm|`@&50qW6s3sK#!ajo5gQ=Y4=4*KqG;XNdIg&1LjYj58$V z>mO!)LpNnNaom}pJj0eAq7OhP4cBNs55O70O9Uz0>*SD<|M|s|M~v5|2%ci zAJ!3SL8_v~Ne>S-jt^Np!#0;a}V z^8p`fTZU$cb?=*jMA#VJiHYk3(nX(<9cM=_W8nkrF;%e@ClB|&OnY251zd|6Jw`w; zw@55yOuyCk_TKcBGN#U)yiPc53UE>;Xk8yTSRGs1B^JF};2gxS4OsHol*BpXGD>(^ zX##kGroDWZ&4!L?l%WhpWHnA-za=bOQCQS986k+&ulRD05BA9<=e2BMbV=idE6g1x zl|da;Py03}1hE~>n8zO6#@XHB4B;n>#Z#qff+E42(E)`Y`M_N=I#CsWUir;z!#*pa zns5TQ%*!km<_MVHPx6mu0&}C&700MhBn?ct_Z;3N&&Tt|eamuDsYJjVX+Q|}%N;b5 z%6**wldtH6&OI_C1AqJAayWb1htMKo^+{I!go zqx;8Lr~X!`3H*kK1N~e27~ZU+!ur>zST8|-%4AGj<1sB6H0uGp}h~hu*LYIB4 zj;r`N&&OwZ6=Ef`m_63Sq4ql;JIdy#^7sw*odyPKib^awKT|mG=aB$KA}ZPzTVk7* z|FdN?bJaluy3>{%w3Y#`aFc5T3~o!qEB!jXY_C9Hhu9`0yXMf_!<~0<0S>GZF4tKy z2wrIBbP>2m<&zz zVU}AKf%|fu{ecEY`{SkT$y6sEc=2)WXV=L3t`d4$w-sftTK9TfE2a(%QCs53Fbu!x zthFA)7CjO?rVDp+g$LfQuTs6;Uj&T$dQr_kQd>^^EFK_oirab9J_7fx;#p27Fo|z| zT%a*@>RH}HK=Nhs)h`H0o=RAVWL0?TX}f^d*(JEa_IpxSHlx@UO>4KD+W5+?gfcX9 zmBvsvximR{9*ECK6SOQ2npA5vZg?aoZGD)48dF<=-fBLvw+c-bS1&Yl z_9hHbN)klw=H})Uw*c}hqF8S9u<_+uBn;`5P{~n{4@!r#(3&8xw$e_M5a&#bU3G5^ z{7hK*w6O3)zE|Apx8(|xa7s>1OWT$-ZOy34r=PfUxDySpcWA`psr?+|UQmY=<-YiS z?e)WRy4CdIugh@K+w{Tx%{>#WnlFP}%HR(1O;lG;4?y24_bV^CqTF{wSv`-A-4CD` zPS3C+KZ*nweEgUM!I6b0VCk5?(FYWZMn&PWTY>*@WO#wmZuh`s!QJY0Zs596#O>K9 zy8{y~=20N5XlsteFwQFEt{I6rmoI{np(bhzjie1abU_}m*#||##{^KpzUn&o`~+0B zs~~XUl5JY{3D{wWh)QrM@uu~H_jFvR4C6`bF;4;0ah3(@@DOkt#mC6$S6YvqieAc2 zg6BU?*RH29Sj9A6NgJhJ&Iunnp<+V9=ID?n*Ka~q{F1fn;p2+)bREwbdI&w}UbU4P zxN6~Ryt!krB@H9eK4|c2W8pxj#pGCBFVY^R$IR{rUP4%&`1rSqLCWN|2mD`XKz z5&222C+=+@uX$fXtVC0^`Yr)}G;gO8KmH>xA)pdxa;PDfgvSM zna_t)CV$M~Cu`5SqzVqQKMWME%M8#H&l+Uv6`avcF1;dM%L$s6yX?L zkdpu5r1Eq;<5jJ}jq}7`()|+{z~8!gGptdm7)%S>v6@8G=?g^Wl!zjeVBkn=hU`(K z4!Bm5=RO!eUt?T!*Kj)vA+b5*xv-0&R(+DEdEX9Fpm2k$>zD2!hnQ~wjo?tTEI z1Yi&Q_9o{MHdh-y@ibnIW9Lr4E>8iEgWFu;u{)4T0nyQ$N8xB8r?dK9)KdzEH26I~gJ*6ku@bcZ3f1oPeem`b%eVqcA)b?1>JC@Py zZbK538*$z5)khR3dupf}weTKAo&=66xh>v+P(ZEPV)W)I*anwK60}-r=4`<>NoQ=< zRzB6tedFg}EhBnELxX>g)E%0V!>xD$Oh}`YXq!Epwg|QaoQ#G8Ppj8K6k%S?0Yd$7 z3ntIyaVR-6pTnNC|3P56k8KZq>Qh;+OkSBnrVDnfi0M?N=ApUq+@t@%E{WI2hcMr| z`JJ(g=%6SYZ0_F22sj~#8@E~O&s4Gar@d4o_c?7nKc5Kn!8ekCrK95e>479J%apaf z8Oj07qL1Q}+$QH;sV_turmg?Y-uox6`O`f3-@51jl#>2id;ImUfX_pz;m7~ck){0= z*Li5=@w3hUTLZ&^|xJLWQRQvA69`ul75|NE#M!IIrPA_I6QYri8W|IpI@bXit< zapX^cOYLs`E|LEi-D3~yrlJ@;DF`Im0a#7|U>83_{0_r~4&QY)lMgjt*H4^8_E(_d zVNl5%k6TJ0QN?rH-W)37xtH3#T6VB5j@}Kj{z?h8cO#g?x5}fJPeW^K&C+3B6GaE& zsNGKeWQ{g&!wo|B>Zfvh^|m&*+KaFUtFyz{$IS-*Qf)U3QA$vy2ky?6Tfp_$0P6kS zAUYr_d2dq;{;aLY^Ac*e-NGw7s{CNm$S=yD^VzO5b9DU6zfXUpiaq2^xY$mrfc&E@9G z=nA6dKIO@TNLu!!r$fXvQe{F?VBanMA!484Jy)4v-|wjfC0$6B>4Ko=VyR)@Uuy($ zqO$*)r1Bpc*ULM4QE4*;lV|Dx$|XtW69NA9=%-TXAB*Mx1hesfqQn1OTmM9N|G)BR zvF|ApIyXD|X5XqDAarXNB8$|jmj;aD?tw5-_J3F612=~4WPA7FgIJMhBd;w#ng_1? zD2YwqG1aW}Yq|KJ=p#5KezR+j1t3Cyq2Z#jdK-5wV7~x`ZW14McmDk>TOTlMU;nw~ zf)D-f+#dj>emDS1p2zz9`?so`Ng#e55L>9m0#(v~{r|vUA0-q%B`;eVS@znf)G6w; zp8gcs>I9-*|4a5ti%*}q_nLqauA(4vyWK)!r`5U;n!i!K?D;=FwV!(H2QZt%;!rWa zXmrqDZkH^B#}PV;y!U3R#CP6zMUy4~eJ4nJxW&)^h+PQ$BP=Y;}LvF{VJAEWK7inr?Ka}o5w5(qu8xw%Fb_A|n)bnqzhP;jB})uML+pnH1Q7{`5S=g0HK zeN!^ynBwUbbz(*sk+C4knENw68Dub-O-Ls|FGOvh6@-Gr zn;r?n6c#u#53|na^wfu0>LtQ@FW(^ad>9;0GiNmGm5XGsSj9gVHe!tQq)eT=2>8)A zZER<#hO*wtm{Tfypz#+mb^(UNR=HAwkA_*#g|mxvZkk0jq|6{i#X0{<8$e23_>nDn zkJYCSVYIa{V7Kjdn-B?%D@v1hb}hg=Y9`F5b|{}z0k_csePtCD$Vq4}Bi{mu!?J4w z=@_;|dOIvQtrqxv;mq<{E#bPRgPf2wy~-0jurgj5&-!3agy|oFIBd&mIFHI_&3KFn z39U(_L$;s!%4@gaey^2}vfXfoh8IsTA6gXt`sQhp>t^j6+{ym zjXgr*@Y$MV&|FdDUej|D44A6O7CB;Q-{FFG%KjOP0~QEw9ox0EsbU1`ys}PG(oFEkUKM0{Gh$3#qtn@&(mWKR9sWiyAwsn{ z%|$nAFxOnk(aY3)UOn8ZLl4K=uD5(dlCMTJdrK+9{Io&ADhO7I`m#fbhc}Ldw^^F+ zbZ(wiTT^3Vjy$Ym=8&Ve6oI$S+@ZJ5-!nP#xQfx%Hv7TX{U>x7fn@`iz73;2;EjxK z1ug?5ia->RiB6^?E!Nzxe6Z<*>lKpIYNHrx^0JVp&EIx#CvI?PY@`%GuFFJw1;=t zD`}G6$=t8#{EWq{|6FeWkx%h!S@-$ZS#jEKf3Rl@)0m2r88^GoqT<+{h85gW!;(p8 zL0mzv3zs|1t+1b30pBj;?6F+1PnDk=8sAUFsW24}ZW6w%`2)C>rY2F9O!y={XM&aQ zF|`iY1I@K)`8KLDn0~VBuG_Kx^`y%Vy;rR(gJz(joN%vCKlZGjxqMWYkECR8ae42f zBY&;5b`KJjQo!i|S&{ku1cGw^3;TzCvFxpiYgVr^1r_#-!HyMwrRI-o3W{|1QeBFt zL#eDT4_wkOMiKLUCU~{^-#`Tfk3=%s&L!yjj@XWEfpjS+wC&j*Nsq~2^Xq5a#c$xF zY5?cY)X7}H1?jKshx8-H+!o2bHv-J_mh1(m%?0TFY^2&8S5tv0sJiLxF&d!`Jo?H^r=7oDy0A3*ntmEnO&vvFk*n6umw%7S?{B_&>gs64x0am z`ARNJdc_{kJ`3_V1bU7cTK2@Y-(TEQ;DBqx%UM9ljjcq)`Nz zLl!qfUdSTSu`F@D3Vf#wxg2}cCakA1CVfpLMy|n^vr2$9>*mpgQw@IzJPTZUki7}F z4BdT*%8z0@hGdyjT<2Vp>QH^=p#>6WO)KbtH^}h&C&;3%6Ns#vd?iKYvImo(&BFa| z{HT!}d(Pz6vBP|Kh~bsvf1&QHzjm5fsDm$jCVt8?7KNJzy=q3S{KS?k}v0h5iUD?`Wq10Kw(_q} z6jEo^B4*)5_}UkKCPxb>VgZcc0UR5{&)nwc&x+cNV#E@Us5e(|bmhR`w&B*r;wqM4 z4K0x5w}+tD277mX3~mKf5%{wB3?yihx~zp3G>@!aZSA_kfj8+1+P0R9*KKobHXY&B zx~Ok3B~qv*yz1}*ve3B3|0Gb0P$=ucv(5v8R;_r+(_|A98SwxqE|6LE&6p_#XDyL{ z0b1D)K+rvazd$#;I)^TiS@1GHFE3_zc=0-8%F>$LK~ukGMcQn0W8;hci8*G#gLw-H zW)fSV?~Vl0I6bGpvq#hb>r3JQ_o*-SuZYvty7_*0ui7S*0!WWX-BAjWrXo|vND|8& zgA@SS7XhdBfNGFn6Pl~zQ)gxTe*8I^ldWgwu{WOkTHikp)_NZR*g@9}2rJP*<+uET z`!Jm5w|nE?+duZCipa93)S^`c+>u0OUCez2p>rPnCvkB@EXRRAZu*qy<1Zh9as=?4 zs?bNxkNG}2E2tfC7!Pw(RJ00?GBD?n_l{LYK`dusv)fVM_^?Yj2WlWhXt zoA$NebsLPTQV11xYX|xaK7GI*HQe5d{^GmFn&Tn%FVZ2FU|Ebxo=I>TY|FB@0myk* ztt8X~UJD+_xw`~J{IYF*mUuzEkaHLH8T>|S31Ic&94g4uty8>SCs}lIYzaxRvI*lp zbK(2h!6J=7S+W3lOY-NY%$s~#n1p&tbxL{9iL#aMiFOT8cZ(DZAER z?aXbntRR7Y#E%c%VX|j?#S~HeHeD>m7=q7yW~*r$*J+w*1s|&Mbf>y&3vkP)cLs>@ z>i<4kpn4bQ72G5$IDV^g@C^M|P9-d*4O8Ay*u0STMfc4$_#fI((Kv+PMM1*GMv;DL zbCmNJu)vhU|4c+n%Z-5D1CY?1WrZ1c-abGsC1xFCcYdq-tqE2?o+gVPoZY8mp}o6w zB)oYX*r?ETJSyhkjYeAziHL0^l(BiD;1Re@h1bT2ZR9E(q*>@yVpdiXozr$t&vSe6 zFqOOU^~DPB#BT?uWAz!5VEIxPhaTx#EQg&?0g(=KMV@Fnru*o@bZTL}dzO^hC(E0= zTh`$Zfl~?Lc_uIru#bz{y;`3}RPd$!>tqJfm+G(1Mb(q9LLO9G_4yw>X_Dg}<0*IU z6q;q}gT4dh9q|0a*ja@Ggcq=99PELOhBc>1TqFQx8HHA?zuP!FICSeEJo9g?Sjx=+DWW_mBJ#GD=$d(9^NFo+e^3R|*_5EsUTUbB3r z{KhBH-0Jdf_t(@?{B^&r53iq0FP(QfVqC%FSMciOYhYlW29DGkM`l*6V-`i>mk9-1BsC0`ZZ1FJb!+(g>-@YoM!T+%N~ekU#!jde zLbTbS8_+e1D#w)_hJ+A%tZ`+)i78z!1gCSTr2a2Q#T2o@Wp|ypn>hINf$WA|pBk3= zph4uiLh~h;WW|@VTnR4&s1WJRp^~i0OJH8fJ{c;pG_plRL`qY!Uo^DEUywY}5xG$; zg*I=it9QhmYqmgYCk8=>#~pLe#XA-z82Xsq5y_~(*VY)o0#lyBhGnaF-7!k;T&p)P zCK2}1li36Cx@B<-Mi(AOE7xXDsfvoTK=417PYs_{r?j6_-LsV|=CPd|KrK5J z@RsHD8LsMX!4)`_{)uPO#^DX6@m8cmANwWDF1pk>@~2=O>Z0DTY$@_g-GBdu6a@3M zq&I)~aF;Q#gNi~ST$_VI2P*7kP)5!1Cd24vM;b+qMqj%ijN9Ece3@0@{F{*U#ryz` zgBn!P$Rb-!!Ca1YSFz-?47$FnlR_G1SY9IubziceCM2*4!(W4N0CS|tPyv}!2{2=t zDAGgYp=h`7-F<#|fzMm6y(%4rMAUfgS6T4m33L7AN{infWe;*7ZDQV=O~%n%Qzq}v zPP|ZezX%1-r*ewZyu0I4$;}bc^b*u-@j8?(JocNghUmvlj*}XR_ios7`=j(V)-DM3fapV-LtJSZS zE!tWIA&^%t7>S#<*oIu~Va|mdVAU~rs-hky&)XS*!UBJYLDmCu_S3cBUf6Ym1@3Y_ z=ncpw65ksEAt&~UvVhg${z=_&NLgjMYF+-bD-gzMJCb1)hx&@D|E}_W_|6dzXX6tp z!kjyT;>O9ifR8K(m{Gm6RN{N(*XpB8Aqj&eCj*~`?c)SCt?u?&Y5G#`Ei%gX7EafH zz5;M;TH9WS@`ymW?57%8vG1w2E`+{Q?*g2Ur^77N(`!U3fVIaJ!WVbG+bW_(u`AzL z#+1T`ag&Z*1(+v%H3wWmqJ-B^qwB9)$r@*1e!`q{Cx0UURv>9=ZW(0Vto8#a^N?1d z>lM-GT*;)_23$o>L$!jm-Ph5vzwQ-3JKLFZrElLJMJA;sOH(Dv@7}ETgcoVP#n#mr zLOnj)Clgwd_k&KHG#=ZX@`_jT#>%xsEHRb-d3m3T-*jGG5Le$I|01FF)@|U6Mu&d! zrGY{(z#=d3(Tw63-8+-bRlbb2f-DL;nGS>R45p}aT2#7;3zI!*pdE-8)sX7Hj*@cmmpL3KLOAiI6D+}~+QgGmS;m1D! zMWjXaci{N3RiJ*hQd~;|h(dFMOi%X#M|=?1Gqky$)ptWY%=ijV3*HRz& zrJuq2OrVPKx0En+be7V3$B^a9S78=>Ve?texyjjpRKxJwhMMVrtQ}XX47k)-&qUz5 z7a5muUB~srq^v=Ix@o-hR30lsI7^;}pv~ukZ_=1SLARc-xa&ja&5o1LI$j5`!y?a4 zyv%x;96%M4UJDDJMF&WERA+}+)_rNs4}9eD6{PS1e$8n)gNuSqnh$%3Sz{uK3>=9- z=LpR9?ZI3)M7o0tz4ZXn-FYDZrR@!UMvOtKBFUOBQF{jVus;kL$YSj(+$GzHaVZ%Z zMAwRGRj}UQeM-x55Fw@tVA!0y9{_`avcOl?3#|iof0uVZ+OFttmi!R4akC9}ME_RK zWip{j)%AgV{XSyl)I&R@Q_!5_>qi|mnH@5SXM=rXa(+&NuoAP_{ZqVAN%#nPCL=yH zT;J&o{B(e^Mcj)!E{m_{)Yr1C;IDnp2HmWGAJj~V>~06LVD*46q>Tt*Q8Le4GI+jU z|8QfNe?+4g4NH_6P%HiN%%Ht6d^@|=rM#K8MPcTGv!>}(Ln)}qcE{P=S*Hg3nzx6I z2OEqH5Ohr^QH+F_c_F|eAJ1Pzuzv_JHYQeO>$8Bd(UZ>px!tF!;Bdw{W@OaD#PMP~ zHW4g7eMDOrt7%VQEhA6Xf2BYB75!y!Agq?K%mZVOfw9d+0?K22!eY`OE%rf+%} zDcKRKlA}_)c}Fixa-I{N_#Z3pM}LqoKkE*;o0!1VxwCMMMg4sjn!wjvwY(ix*`Agd2q6X^@236Uidphj-d*dIm;@(?19l~C*|yV;l0UY>u6UK<8Y!% z7DWf(@I%)lqR&~|E>1Io&sl%CF0#b&Z;I_HTaV=UBiMnN>vPaL*QzHo!dzfA-X&=W`1MJa;VfOA-vwtp;xpK%A$bl zS{TV83Qubntq#X?sd74jESCibMLbC|%B^pN`tvX*Who6E{U2}XNBeC{k=BJ$`F45C z!*d2_efk<3rNf1$0gs|9dfqwpuxMZj3%~C&g<)hN+QU>Tln_uGOV_LX0jUH$zZ>yD zwW~lIMCWro2k{*WP?if{;lx3CiuW!##GOk8?u~@Xv6>Gc|LxQXscY4ZdnBRHtGDx2 z+^O`$Il)-q{OJD9DGi{{R@58(&d9@G@x>=%F!3H7=-vH@4+;R+3Ho(9%sdVAyZNs< z2d`B{30&pE(|m+4)&jpSQ9p5{!(R7lB->n^WjkO`0eXR*ef?3=g!V$i%I`NkA3l5t zGDJc86>xPJtM#t6m)iJ&cLN_H;Acm)F9e5=Vi}IJb^^m*-#AiaYWfdoP)NN6esL<}gsBc0GoLN7`c=_QoV zM0yFm*SoUa=jY!0@9#Mu?(^JxJ{-UJMYGm=-?`?R?;K-}A!`FM0tAo{wM}eKbTrj! z;s358el+GxA+NRvCx~jF)RjX3&Gv;JAdxtt4rKbG%L~(+%x}t806n<8L_kRJ5Xof$ zxD_YX216=!0A>N8r%*H{MbuW>3))cCKmK_9B8+?gT+Ob%haMYIJ+J(O1}@PX_U}|r zY}5zc2MlqA28e}0IA9$$L^sc2C;+I2VTmSQfGAj+_qJ|ZHlO>=UFK*j-4O2FdcYh$ z4GopDfXqRJvfyQY;brXsYJ{N+Y{qigOqlx>Y$p!}8nTYx*gcJ@#EL3VE zO$^8@fKyL7u#8@ex8Q+U^?=7-?lGY2fIlw|KWYI!YV0Gyc^;lD2V{{n}902zPTfyiDwL!1*! z@`cU(>(lxdF!GmG@2@%(e*t~}+n(rOwaedE^_M5!zlZj@|A}({zh1zN7+yK`{uJI* zH50@Cx_bW@nEqD<{Ywn!$G7#b-6W!&|4NL1HAw%7bNyq>h&Il@e7}E~KmU4P{s~z9 zBUFeI-Tz69?c(QE1&sGsqD&9c(~1gBc51t_TzVf7wReAoRm6mRT1e-aIDQ*)Jk~bg zbsHkU>!vwpDpeo_N!ldBTzzYz5KKhOLMw+3M}2>z=rs!uu=yP1EDs*3#Uz zA%4qNz*nvqZK6NhZ~4b{qFqKp@BF+?FEfDbl^^6TEwMR59j=P<#r|@Uf&LV$7*rBg zT+C$ZGszXU(~Na(je+YJJQCK=1Jn=)ii(QTyqf{=XK8Qmd9SE0=(MK|zzG>zoHw8R zrW%y-OH>T-04u0Dx?Z9hmunUEfGD`vH0s3#np86 z{_C#+ZEm1{7U9igif$*umTo%RD`v64K*<1NR|<3+u#FWsmnrwZn$-V@6sr}IOa!Da z$M;aTz8KeLvY(PBw;gAFqERgt)DHQf6e$QOMfye<5tSn4$*z6@nx6kqifmW^yHaFI z)DNY|#cE6yhqahyf>y6)`T{_-&fv_U$XRdTw0(#6JKn(ofarWiaRJNY;IH{+UO~|p z205@(MJKI(#!gk-)6)s++^Q69gpCY6KKyxu`_(OVLDTug&W2j#nP@%iRz!aIYi6E z59}_$=!@%O>a(C%G8fb2FEPo+MGp8Ja!ax=q2&Rcy{|xUm1rwx3n3}xj~iSKE>_W) z;L0VoFl!p99z8{ApneErk`Je z0|VMi-2^Jci66)Sd44cWz;6>_gsVD?n_GM+Z#|4xRnFH(`v(3 zV@NWIu_bb>r$fWAX}m$Uu68pGqR+P;19--*UgF9}c4tYpy3!IF%aG_M^HR}nji8}o zrqaqLPh|M*2Vg>k5pFt{57rw2^x&7jzgF}M$PHSI|K*EA?1gRR*=C%}4DpfxJOXxi zd|5)%u81Ndfz5#|?HstA8rvL=i5yjfvW5DA>Gd>!?}e}K0nN?NViazw4%LXVarxK+ zQJ3~Itg+&aHqT2eP`+blYLjkBp^Z9;y5Yj zIv5_tJ{x4O(;48qnVn!fE-1P5KE4SZ-C?qq@KQ_Rmsn}c;e_J`iz8yf`g^lf?V4$V zZ-bP?YN`~qPuYU|#M)+#)P5iIk}2AH>|~ejM9N|1a4?y}OJSlQX^@4%nwR|U_vfwl z+)67UXycbcj$cU_Bal3b7O+)d0RS36H84=fgkAkyl57c>8xL`Wqpb9UQDLv4$r9rt zNuBoOh+vpK526@kF(=;+;160ZB12s40uc+{>_S zbf(j{wB8vq-N&Sms5YPHttr2Q?F{X`+TmKXtGFcyA-3m)6G$%|{9@6LyVr4$Uj{6I zZ)xROs}eKXawMm+`LaLPF$$ao$c^GZK>+bEO{tGU59obC@!ROzjv7I<&I2vkj$&#Cg#_~M=5Otx5gqrCEO3_X0uQKBw->ewoEDcYL zW)LugQ2V~4md!qQhr(fBLI}%q_wW!u7`H1R=y3s01PEr z4qea|O(5hy#3HW{Z1kggR<4nAr39gIM;Z5cs=k#PtuD({aTd4V>6{Mjb)^M^YL&DM zfB8uThUw8h$JHmgUdyW{KfVz-1l|(lX3;Y}U5PKCMgj8LhT8B;^-#ZW3Mi+p@_Q9? z&7sMFh!&^%+h<&?^szag(BmScv%n2KdsO)Zpgc@gZ3943_W9@Qtp?fQ@wHzm*^Jic zNx1k%EG(&XM!D`V`2%)qS|h&<1}#QW^j9lYmk42Wy~Mo(!{@t?|5T|86>an}yB%EI zZ&nO1QN7XV99teTCdKZ;EQ%KTphKw5e*y%c8eEHo$$Hd0y{BJNSeQ2CsR%@WnTA0d zerqvz{oxc5^15=J5oT zwhObe5$0O%5brVlg$n%dYcxv}gk0wXH08%Jtqkyc)*Zqm;xU%}Z1#Gfc zPbVpmGPT=r8<3a*?_4d(ALocNavspP_OKO+83|DWvpW_CXxDB6{~SP-LV4OFJoYfg zeoMYrH}2GvFvV@NwNa;vZLYCHQk%TtEBlNqLP3T#-}<=BkNz?)Wk+UF86L>b~f@ ztboeuw>8;hkXWhhji8-TNZ;uiW*!A@t=BMfJ*38?$rUQc1 zHl6QbmzJ;BWSx?K`t9sgVpsulhORRax{^Q~flrS%y}f+mftK+TT@49^{>8IaUHB}E2%n`^lv=Q{q|O<@6*3U-htBmB7S zB<`e+&fYf>=fQFuW2r}U+xiP=63AVTIH)K6xbw`$TIF;l*!wp6YCrM1-hNBT)1gvc?qzEdNa@Jp@2p$OLdxu5>@6diJ18DJ`>%ww%{YCse z@tb&_y3*J|d;da8G3SZ*MN{vZNYQ>&0oEZ^4p}|C1E!=;=b~8xndHaw&D@S^H4d8# z9pyu%%=)u}zVY;h${XUEirOM3`l#8vtc~GSl`(|Em!McyEL)nF-@7u|u@2vpd})YW7r|4C|)6GYM|rTGmLl>Ms;7IJRc>X%^me zQ0mI>Htm=42pt4Zyq3^dXS12J4SCf($lFTIX?MNjnggs5U1Y@!W{U1?Qq}ifPI}m$ zDCHDzwCs!wDS#E9ZJ_6%8%`v_>yn$fZx6m0PYu2xs1z1r=a-{CvickRJVO@`wEtV} z{hI8cj}}>kd)U~Uj{|=8N*BsMEriDTilwO#>Dl|lS{;}vBx6DEA-s23-yjAgqt-(B z0G2A;fZ%ep*(GHfx4e1vQqq^9y~W%-a~9<5t{L1$FurUbNx5@&z`b^piNc&kS#jRN z^Lnoi;Tq+`W2~p>yZD2gkb=j`45081#^6TDnBG^rU*JXLDYQ%_gp}0c$igUE3^eJ= zd5_ctw;L@PsylCoFQP(p+Sa4Rg!7tN?n1OZ1C3i9rwy*~4Pj9%<~?CXs8|HFTbaMe zHs$<;*R6zC!bl5hFxqh;)CrKje~ZX&O0+U~fAq?3q_pE;4}nV5bxLJ&JbGPpHjHZ9 z^-S%3J_ts;=atRv3CCNWl3abmt^QMGeQF19jIBNIv$LExNIeeg;a|5gpUYaxRgrHi zMXwtjgHgPFdP%VY6VORFCUIOgv@IBl7?g>f_ zO&jS${6*n}Rn0BON4;66m+>Z=egmD4d~x}d2HmcBgAwPz*<#~s_%z9#Ge}ZpJ_D>Z zvZ&ed18jPFXi@#Nz7sy|o&KP;?p#mB$d`kh9t=Y%QGJ86wBWU5X@M{V6#N`U2lR^p zWhrZ*nZcKJ&xpma`+UDCqo7@}F@sc9W2r$EjQh~xYsST6pydn=JOv>=GH0VDC*s{M zhI~wLxL^F*S8~U)RC7Rw2|iTzIioq&Yk6z%;Pob|#bLHCr2+wj8P0Y6#bQPnS=6nY z@cGndwndakhOVI_ww$_ayO%N{76vSQ%13qQ%uGgj_PfvkOoY#tptqxA)XbSAbCvv= zz&pv}`N!6MTOicHOp==qku(KB0m~1&E+h^9R)F@t80yt*$pURmvKg`#f|hB+-b(RF zz?Y*Bk|Mp|-8f+ENS9pCWM1sv6UDKvviQCUE9_g3fDpxbfh18klufe|8ehyG3#e=v zGPCCFEdK>tv|G)Muw2*bpf9?N<)yCD#)L$ zb!KqFAElrZw@0UlUZ+z>Okk%K}$$@mMPJ#keZ#i_gu zKD9@OMxdJ!LV*8f+7U0iq$;W)(vctFA{DCiW@XxV(OzTmrFb#+yiF$+a zdr1+-No(zp+%?%o%B~@t{SkYSB8N}8pCj;-tsFQRAKLZvn3L918Bm4pC|6`sEvoz5 zFbBTL>e65%b2#Uz3exW~$y<<;4X^lwku#YA?)P=K(x3u3-%=Llrc@Cqp=0Q2-@8~Z zn(sMK1veenkx1j|y)W2Y$=+{d?R$I8nNJ6~#UH~jx26d{9Sya)YazP+Tmx82`EXmwzdKa zvybt2pr46N7UJx#q^ZrChsslySL|0i$)TqT#-=fFJS4M;1U+Z#9cf>)}`3Xzc+*lXLvoLfm>qJoct3eV7nbJJdyOXy)r_%+Nz>{+@TI;jU!nZRWb7;-jsbEf)%Qli^bp z%VO+mX`I6(G>MGx_h$K)wybWC@*OuE%T8Wnt}=LiXDP8z<&WZjdLOC6kng+U7@el> z*GOd}Lnoc!olePk*Eh|zNvNE!>w6u0Q9bolm28#f{7fsmwF&xd0dXx0x(6q(jqT`+ z^-R0iqrT`&amgn?7a&&;^{@~FyS-8KZMKfGd9a|lI1%pFsm2a**zgL|v^jE^IJtA( ztK_vJJtH*?R99e=TzpiDSBmzVv2l!_5g#BgCREC z4cxSpH2mm*j-9Dk2 zIyqde+xW`UC3WhB`Uqe8Hu6?dq=?Ft40JMWV@RN5>df|*j@))wb9(F}7Aiz*5}$T& zyovvjB*Zzm%WxXXoXEA9aPLv0tk0ym zt?Bvh3+yZChO9xpNG~x+&g9eO7qADBm-A<)H6Hcq4RM)u%}t+E@-ib_BuDxx4VX&6 zv_qaA?OTY)+GsKhM$^xU=^Xlw+G^7kj)&zX9-S=?=%VDE;1*-Xw$D-bQa*H9NLCE> zGn%|Nq6j>lTi=UPgXixRQ}Y(hxR0zu)jsgV%WZu^dJ{rvp|hX!MC4>LKiaplT`wU` zAIFvEWL9|9a5~r>NpWoF>-p6zPgwc2b4ndsow#HIHyC~Z2%q_WTugAdC5f~;0b4XI z-uPZ3Od;H1LmOf|Y7?R*>2PwU2~b>5|J-(gg0UdBzWL+&yFBq?MT?q-+uKQfmO!-z z=lz+ZfzjS7=I6U%UGENA#dk-0TIvpy4Sj_JV{@&p5>2h9rl-^VnTTZV)bn{z)`ekp z&|SyYp`jt8baO!E@WK828da526_l(VN@87#K+UI34RoGF{^V4D1jy@wyNW_uUm1J~`Op3lVjjDIRsI;jYZ1WJm93D!3_aHmCIUF=#tUF}*fz98Es z-*QNnxZ6@ zzn}hQ1O}x@Z;sy{oXVFJqcgUE)^_5fql`MpPK=b)t5;Pq&yw?>n^=7iE*Wbr9S zAlh(}rUJo|5!ajMkZ##TG@k1vfW*dhU{ZvpLD@A|_Vo>B1X??$~2&$}eulO^+t{w=9 zlAfYplCW%z7Br!_BmS=V^nr?wikU^rPl_R6_^=hT8oxd*IF&uJYwA2jb+QMjZQ`7~ z4!?1QX0>M9eZv5FRv1XpITc3~4ovTZ0_v8PlrGmq7jEg5VgQ)U@)OWkUmY&tvX9B> zHHy6lNvljIo;=Q;SKYY-7fce!3PBtwsZ6PvOzROm*HpplbmXB<8`8j_0fJ?irnoEc zyC}5TqD@T!*atR6hAHDkl~|03U~VL+m`?=KY{qBwPLoWL^XnWRK;xq|eL2hF3GvE< z@|%V-0H+!Wx5&&U;lF>cE zB}-bqL2x1G+_mGD&nM4nzMU7a;f#M@|Cvzq#G)8WP|eUf_vxSfpI&Xn;NPCKc{>2r}94sYYPw;~=-^(p2j1~SI&Cxv>wrQeNRU*4cZ zsWoQ#RRTsavHK$04sWNqK`!jql4S17kW`uv z$!pHng)gA2?PflxFl;tNH~FfDX=@G*75$_T;;)Dj5Z}gP_jZn>h8F#ePvvs}wTDny z6`f}!nJ-_Wcds)g@?9Ue3An;IXv%%or~zgK@x)wvo<=nAxXyek#F&gD$^8a4{5W?9 zi9J=QE1=mfirgz1q@QWAO8Ua3*dt6GeAMnLLBQ|4AwZd>935oP@!ouIfvPw&oZPA?`v zj?|i)?`)ffMysf=MqBK7?L<7Tc?d$%J+S9pzB_e2&PiaY`d@>=bF;Y9754Sj>|ZgZZv#O4CoHuxuB0T>2bco|Ta8(8PKyM#IVs}@@P%rce| zNz|NUhiPcji2{z3v%rCCd1QyvR>~e@zQ2(c0tH-S(VLrn=c=05*MVELCR>++*-@>}ig3^A z5|GB@j&~ys8!N)GkA`~qwVc1=8CV?6n^Unfdwu+#d*9Wf{-Wb1K^I=Nut0N)KDU&I z8j0NT;vZg4Ru4$l2H~L=kzZ}}j<+*n>q!QRnKQ~Wn@HBfx($dSgW_Fxon(G!Qgr3vt07CrR&HFX6WzGXPQ3 zYXsejh)s)2aG3I)YJDg6R6@~<9k_YnZ zYl(C2JHCmn;-?imc+Z4m1iUtBoyB??G-%|~fgKnJSNbg1z(TG?E}4dJ zOQ1p&PerY;&&?-PuAR7RNddx}p_$K;LnTU`pBY>D=xokG8_G1xY{(c7bshzX{k{w! z0%yK#@j6x>1hWZ@oQ$lVPMq%Qi!iSpCz<3#Qo+EYsMy?WV1BObv5HFGO=fsbuTq_> z{n9`lAVayYQxwv4cTpHXi~Qnmgf*V%K*P&z#)M&bo4{Z_tuXuiIw*#gAQK`-no)sSF9L?9vgHHAWNRN8lJTXO2|x%7_qr&I(c1VpPgH7XzWmPTGzQLAazLHC;y z404*wVPX>CwIdq!&2$+rt+6Ar_~~Hqif9^KK+iV{=OeD@o5wLuV)?eD2Fi3tF9TAm0gNbL;}2QuNNSc0AcfJT1XZb+b`h z+gBA%xw&Xo(T;WS4$i9vQI7g!9}awj(?AuuEWif$H><8LTA0aK3M{3r;}miqw!+M} zo!B1XZQQHuB%y;}gguV2o!@EG9rXq~DDNivR&~$p-hvI9C3B9i_Hi?|9N1vGQv>6? z?|9NeboLcXxE_mNhhJi^QNEG%8e8#Lt(jjM@y))7xeN@JI>>2$Zq8U6{;os1*Dw+| z%{&$eL$L_Fh3B=DW_y_$XsN|zXJrnp*gbU1r_lU3eGaXj(~GS^$N*BEpLO)r%7U~e zucGT18e~+)J5|)M=|d^VAWg@ z>K+;T+50(Xd%({z4O4hqgwhpvx90}j$!qynF4ROK7%rDlT<`b zqt5Wu=xBa|t=+7#kgl^g?9+3m?N2*4wsH*_K^cYjv`^l}Zbo!4!X7fpmc%xUpbdqP zC~uy$hfG)C#DKM|WCApPJL_t9=SHwo1gV37uHb~i_24P(olBWZs|G88)F%#bdc9wq z4!7y6kUKC-z?grzYG_`3&5(DHK4-JZRahqMWgk%gHY;+4Iphyl(vo)pc3tK{N`BKQ z$nckKN^!pJm~6!oo;dk;UdxzAM>bJP$9eapQp#W1mSxp{q=}ris zU#3LzW{pWJuTBkR7rqDJhJdkyJEM!i_(5Nse|)V+c9Yl5?J`D<14f6ctb6uZaDoiD zSR2_{Fm|`N6Or4otw&YAc+2U2iZ{edL z$W+|y6p#zaGWM=_X4}E=dd=EoJ&#$on;vtmw7b7p2n_I8sp?9sw+Gc+*`PK&(YR0R z2hr9`RDT}R8O9Hl&J$Yb~B(<|G0zHL{eE!N)M zKTl9a;g$8WdR~;8DpFO;*0@{;qK&`q)x!Fs1ESg>UCxk0CBIi+JIJK1G&*hs+r}8@ zLD!MqV$0Zkf*&=Z+o@NtVqSWg=LW=F&z<4ac_(qk#lC4E@Ib2Z)v8E??AnA%IiN@@ zlM(AbYX*q_p7|qV(Bg-kKmNEc9AILKXYaf=sJDDvCL*DiXwY=2Vi`N~} z&nV_;O){DZ{1Cyw!EaFJ74NkP0OI;0aiO>jl|FZXaNQm;@Ya@>cf>+6TopgvPFi99 zZMrkLGm)Wh7_T*z^0hc!REt;nw<({cgj>*Btv4araUn0M#WG_IwdP-+$Bv-Q&YtPE zk8DMr{}}Z14z2D2bl2~A2g;@)$QT~$6mgypqKvm^RjRqmsgrm^AFcj9#jUNSRYYx< zS(!2W-m#8^a+8wer8Mk!2J*Jq_f*daJ9?Wv7T89tj2AihNVze z1>xqde@|V!82=uqKQGm6x#Hta?~;I+p1SVrreDRxT~V9fQklnK>zFWXZ|4N)hqlseYo|a^U}f- z($`GH^boT`s@k_8BLSm|&()!%Qo{{pdhkx(U}PLIXsoTvHzU(1XxK8t2mnLFQG>&| z%Oq<1)+N2gS-I6A5tV^VZk-1jMUGU9$;v0_7BBXFmNw_VXU>Nmau%r6@i5dy_vYMx4xc1I$A&qk>#D zMY|HLs$`mcV9<7Ncy-PAi&#HAU_}dLpN%A0=V!_N06EdNOF0#tY3rK4pA}-Ygol+L zFd8nu`JVFCDskry@43u<6IRLW;7^zCoXfQD^%xkIoPPiCQQVm`H?&xp7GD$ss!L~n z@B92|VJ4vNOS%dj?6^as4o|;h#7-4I?l`boX*Q<=`DXdy@yUn`1oRHZ>!j#wtO%%Q zG)4{p!81KQ-PqXJo6PEVJE=6nJICaR>@(uoT-s5|6S%AkdAwcy`r(o5Df3a+qd z6Ez;roN;~hvz%}R)L4zT(ob*pWhmF~yu+EEU~N~uHVM1=1-f(NTbF^tSZx1+eftIj z{cy3{tnIqFvE%3cod`r}`SYG03ln9f2X_CRNW$3o9eV|d!U7Q8utd91r#Fo z?m9b8Jcmn^d4<5<=48UYAJ{tC&2oLrjZ+O`ZlvVyU@f)rU+nYxHtk=$x*Oz)>Akr@ zvH5e`fSdgz;AezBwkF9OOkk+hUM(in9fz2n)EPzh7tXGEBWPcL0ahX(7?01$$mk8( z$jv>@4#RVCa$;HmCxT~kkSo^?ZGLmR!pIFTOk>a2wmxisGM*XpNwG>Zh={at8DlX! z>a2OaIz>g*->2mQGANp61&ZRl-zx*;7q?}6!FHhMAPL{>A$Bu9G5^B{K4{M@^xd(= zMQiI;or<%098z-qUg%#hG2q)+Gxv3(%I?s?_Z!dYXQU#9EpFCSYSCAG5H(O3Nl5{4 zj|}|HfUxTSE;(-@(bC*(&Yh|vFJIai!lMsSA8C%4_wEh(0|LAG`4uh5plc}8BvxZ6 z|1-?=U`dkOvIuqfNXG+$5KHmTlyNESVhs$I3+by7VgV>aqRuv`u zK_^flMtD1cXgb|(vCla!CF%qVJgP8NPRTm?FFOGOb^^Md+$ObtS{|=Re8eP2{7V6k z{UD>$;|k(VBLUYt1^Lo)Z5o`^uh$7k7CKz<@NW~ovr>&&ka?2RKq^4+Pdx9Jo4>{B zSS&V)A(=QyKHbZ13aEqwBBJWZy{yXp>!LLWxB|&t?qLf>n!EwVev?8`gs!U)kOx9W>Xd%yRsk@z{PkMnn4U(d)d9ZjNRQ=mnh5QQ5 zHmm2kq2Vu5!B1`HdXx(SmWBM0olBk6<%-6VJEcoGVfxy>iC%FLC$yX&Hjgj$x%}#u zF2+|Xf(flYU`=cHvI)|KPh26WZ#@rHEu@(u% zji1GHWE5%4iJThI$}M3N5U$WXI}_YwSgEMTSGYj z%i%3uFl?6Y{zmHEh+2BJ65PtxABGS^k)l~heXPd`!9>`u^^()_NAoioEtRzPE}+@n zYNJ#>=&JBX|6=9b4^x_QC2n(H#g?QGZgxK&o#{4@N@8Cu7(*iIofOO}-V9`iFnKB| z#G2%0M=1(PfQ?fsDvXD+HkFQMy@N!+(Bb#>TANXn8y8HdH_NO2New8<+`oU1?n zYmKGs;afU&rcuu~2Q65!ODk)dPMxvQ3H--c#SFiB>B$JPHjqbZb8E<0u#mO`!s%0} z@}1b|MD_vcQN>bejo3f*bkn9ebZXfkqLZN(4zuY@w2RfuW0qtKvCVT4^Tm~!I)ZF1 ztu}^?jd-?g-6~ZXy~Mmp{_igLc?YLa2K`TB{U~mzVdeQf2tzs$7J@`l_P9nbC4+w4 zYqwVVZq|8eaT2k&N0%lpGs;$VGh?emKN8^qimtOghc(p2Y>m_?IO9LQ7WyQ zsCiVcea$dQ)gMq@WrUL)Tb8=o4Oo_>IUk;VYrZF}v6O;baM=X9pCDV+7;CAQn0zTq zg13L@DiSHb9BGRXHF)e0f%oV$U9zxNP|hKM&2 zNHw!aMLqF}z}a{PdfS;V+<|Vyyr)Vb9gvp5T~jC&e44|cvrJ#LfFt5wyaY~ajN6-1 zM6h_fs6`mJ)p`fcU~FL-H@NepnjFk%@GOYap+7}6b!c+v@$$=|FVLQE3y=HFne0|m zuJ&hjCbzU>b*kLnbiFM^%wEAL`A%gkosNn+U8#~^uw>5%!MS^xAoqMrv&Is0*0*gl z@ugn{aymnW)vFTJmU!ViTe@8A`M56#JI0;5pH;yRo-47)*c5Z@{SKU^`wm6t2JLIZ zCj_rmtzV^uE{`i9s0U!SY&mKO<(c=>CZ$du8c=aiW z#}_`C^BjpaYgO>^M^UyU%w2;oiz%CV%wB7Z%S&nU`eQIlF0kut0xc8TpqJ;Fu3#NF zaz%NW*|Zuo8pfq4=A*S5NU*srVpbJ)+pI#qB{A`nGXr1Zm7=~l=8p-jp-VSJ6qAbJ zNm}*JR~aAF$lF^=bekg(c@N_qC0|YJ>IW^5f92#Yy}g*)&DpcaMs?q<&L_8 zUhgKeso>GavWH(YV{12U)cfs&gfk43OzsbG)qG6>bf?U%L7hrUl-(KOEXcG?OdDND zQwB{Y%*bLtM@<4`rI*!kfwv;uoHQ}fvS>J?uOzbYNdTcUVJItx2_$Hy&H}qZ3l*{x z6d)AdEz#Rh>T0?-HOj6kAS^8CEJp9S`-RJNRYNMey-fu z_wZ$}j41769ILm#Aq!(>L|MnLKODY5x_DblX6H`Oq+DlKK;+y?Z{8XRhM9N%h(&x{7JG(WL&(G$!(B(5L&d~LTziuxnp9aJoo3d=8It8 zXB`6QTZ$e!dVft?n-Pj_#^Tw%#uZ{P6E7EByHOQg(cI-+NuFo3LHt9-xxL}k%Ovy3lv}LYm}>TxE!v)(vGfb~fq! z+)&v48lc0?<1(!i{CkT=zL^x?-7>HU z>iW&LpWM`?56EFvOJnclyZssXc)M;!q2dd!cj)tpU0;M8qFQ+D)yd`xBKJZA)w1Iy zx?l|Ws6_4sl{p!tOQ|0jIcPwI1aCgcZk)IvTFra(uV1o>J>glkN#HhfSQBs`z{c|N&W1Hnwy=JyOBC4>3V#2`C zV`RDFm&sDZvABx0&C2KNt?Le0n(=Q}KpADKxp4+|E-eT1FAvJA9u;S7MNMlmNR6RK z?``_sB)2~8lpYNdn|Df+vlXebHOh7k5r8q z@^8e!^=xDX_}yqJQgRAlpr@4;_&&KXVOscm1VO#wgPdk>O2S$9$TZ7A^AK_Yb9`1E zBKHK^K6A`An5EdPn^UX{nVDEQ}ET+MkPIYN2N-i6#JOPy7{1eA67E=v)%V& z9)s8y>)8F&IyT@$=HU2dEc+t)c2)XU_e@P|cSEIfH;Av+&{+Idu%aO8^qGO|cv6!Mlzkb^g;0;1NuyIl$ zJiLpzzqG7hg)R$v9+AFwD+A@?!wC?J-wr7Yj1R%G0LgwfbWa|Zaec)tFY)m+bEzMGCY7a2;l;VSq0^2*c?T`GqRQ$61E?jOa0ac{> zQwuL}-VgZ4!cSL+m`F!<7}9E-K%swI`Pll+)yf&ez#8}AZ%98;WWW{BW)~`~>uZK3 zY5`wy{P4+hr9OKk6IsXPe_QW~PpvB|;S-P1?x!-S^?^Wj<<{dTkl73GkFA@`Si>ex zIx~|cDR#}5C7lJ!tZr7_%j;-xma%>+z0pSCSf+Gt@K~H5JsbH%4Mk6DRW2_9kGfOC zW;L2ZV*(!RfKLaHT?pyAC$Vx8)|hzB-aOWSX@EU0x$0r2g_@e&C8k(m_bxGaSvY4y z{X0yLJGMt)bp)9@(S}+93*Y&|U~6&U zQa`@iK%v2yCXsMs$$#cS4O}*8Ut3j8W^z2C{-NXOb>7Ux6}`sJY^#X;goYA1vNGqf zt@5KhkoLl#D=##X05VJd;NUgIIN4+OqYeMJsGsX&7`x%*6mBMd`d z8TP)!Q*CCq{vH1l#DlLhyO{v|!m?OQ>qg!t=iU)pL1F`TF2Oe6=-QfAOz9bI%$1X9 zaPHeke!LmgD*s5JW^5y@aJ114Bi$P&0JpbDlA%x#hEoy@rh8%;#y%TZEbBkN3cOaO zi-N2$*Df+o6_AGt=#`i)rcnH$MfRBeVKcV0?>UdD-NwScdyt0cDJCvm2XQ~MOB>WY z=MVm)3PxZ^t!FD`V!=M>E>wDvGXzMZZ%W)&45HYMTPghxvWpR!_%hjPDbZGWmM zmkq*m^Y+su`VOiDg{t0{y0nkgN!qH(S-bM14gk{@r4IalZLo84_*SVlVyDrK$Jf?P zLHDl>i#rL}eS4iJwl#iBsuL&3+fMrfw)-)qMg(!IDdU&n4X@6V>)?E3{_rJqKGHMR ztWvvwtbDop5CEY>~p_|d4^`eSK z%oY;DpU>$ULhi@DVEQ1dHd-z#J0@ z-9imwBeiye``QB**z%xxhPj=`j~KW0s)7Y>p*Z0XJ4Xt=k*pW;-J-x^bMcoK5Dad@Pe80+mN9!G3PvYhE_?%y%yHz!{7`nI@2H)GK42rZ7Pjea# zmfQQQV0qdLFPcG%m9~S>z%EixlM1?GcyhDoNViyAA_@G7m=~jx1(e!wq&>JlD{|wK zvd^+`ILc19&&vF`$@s&cQKF=&O-f;3Rhq*I)D#`>jD{4b2h?pag+``=Ro$bQ8%fO! z4}8fWfBTNb(ZUkpr3Ci!Jcg65xcY}rf+RjScIc3%bZq-S4SL`PZ!s6*$#b^Nku+>< z4&1z#Z@6!mLyI*9v!*0|KapE9WM%rQ7pj%`AY%6t7-;C8x&LFl4QTe-n~teI<*u>1(-__N8nn+9XxD9MH%a^9{X$x|!6B7@g)5?wH`u zB8Zv9hF3jCpt4+A1!bAO-{~dc!=uS_;%bA}-(cJmZZWA(`lC4&XyeR$vhzxI(j^vO zPU}{z-I_(YJm*XUG%v%hf=SlpGD)F5jdu4kVb}lNJ^k_-NEWst5y&f z*03{bK_s7H zbAU|`5#4@0D>Y*IKi7(=21A5NIv|p;(0^~!4=07c!973wcmER;{LfKP>`w=vj}L!V zutZ2*nd-3b^h6|})_(uMdWN-!a}e(%9)X)DnRJyDcit|}{TgQy0VGnC zP3~5od=#>NJ9CaJ2Q}fZJWB}?+Z zz^vSkV*6Wj6?W)CqiQWZYwz&(z?6fsU*GSCKNl$c$UaP`#=WmZ$LM4^OwD&(pT&DJ zKytT*v2Ons-Tey0nBhqy;T3R6BG@%(`EBbNF$;UMjVcrWzRz?i-hYr~S|&r!z-`Zz zHcdg{XeJ3Zv?CKG*o5EfpsP5c0r}dlr=)V(0tlpj+d!V-Hne|YsKq47sVIr(Pw<`y z)NKYIn_dV0{(bP|)54x+;;Ia1j*Eln8nC3hy}Cy+OGyLzEO~JcYFylA1O^PngfMPP z1IATwq{Ud7S_pup@tU||mWC7F3I^VLSW}#Mu!KjS6m0EV0dOb4K8xOAb-e$>KZ|(V zm*4G>s`BvrmIlS|$bLd#^68=F`L5>5Lp}mqwNN zm>2+C4Ykx)i0fQ;#l#kM($g38MYi2@vK|Z$4Mp>Z*)GctYbQoWNBh(h@ad#*P@90* zOJEj?cs<}xyDbb*K0yp6(Vigs)(-r>N{xi;)T|DGm%mum={eZhJ#G+jcU&CCT*Lq2Xz-?F!{E^Y)byte8?6^V)ESCL-Ds84}^`oa+} zGK&=^Rc)zVui%Fki!GMF>f%ap8;Ic^%o6)9aM~`XqT}G%#Zr-o#M%=Kn1%pNI`>+! z0_Zm(KpO@y*DxG4$Vq?r(7^U3{Yy>89NRfTz(Eoi?C`KK_)YasdlKR`?iOGlI3mV2 z{EYk45UUy1753RV`3L=guPDeb&Y`k3PXnNa1R3Ge4oq3>7nSz`s1sz@Fripn+$G+$ zD$!R8jEwA;5?A%S+mTnc>2Cv@&Dn+=qAZNrr>T ze+x+9Nk4tEarw5jLrz|+wu+&WY;glGxG7^+iBG$bS@3+xaN_$ww&YfY6kvP0SZzxQ zAKNGn5z+s>zmQfy3}1iwn2CvLOpLk#;7O(jHf5+V;%p#F%c(oWHO9QL8O%3E@bW_* z@yK5-4g7!F`|_wJudZJ!R%=mdMZtnVTNM-;N|`~x)}jIi6v8~oBxAx15(r4CA|j-U zfIk@1VP=9|Pdv^Hhrs%2dZAvV&b$VO3qMkN(dF^BRBolW?TGSVj7E)vX` zC9-zjS37Rr=ynovJKoe0R9(1eX&2BZI`90{)LDD6II~+!sP9H5zM#Q(>L2U4&G%o( zpp4IQp(CzX%XbtTj)P}a%ip%fVu0rSnc@k0>=p{H&h+H@&fRwCyT$OUJSN=`hfR=^ zygat21=^MQ)T-gMt@B*qa`BW(T8zI?acob9_uFEkqeMhc@#%zsS%9KI?GV3%t~!ME zMs=BI1t+w{c^Q>z6!}gcz z)OSD2mAn(HvgupPE2wgdxp_xkCJ_~=o25CLs_HKOpUj=QIP9}D-Qhg|y>y(_>^|fb zdBcNfnBtWUT|iEXsIii^W~t^W>s%yBY5z)mngsWm13%4%$;NtWe(3{FQ9b>{Od!1HfO(&xp3P->%5Jg zjyy1wFi&7T9CQszhUD&9t2vJU{P#nzz~Tm_1ixpCcB0P=sn=142^X&1k!XE!_vbk~ z*Rj-Ci1geI!FzrfzsUSzC*Gp`QXNL4*RwY(-_cA{f)#t=k0V@ku*7F>#=&`QrVs=Ye@rIcazIQ`oT)_UR2vVpEV$#OU zC+{f#)jZd!-eoU{>wsd5AMZUGr!YO$kFoDkHv`Gm4g?UXToRCEcAn5tb+gS2G3$}k z)knb!{-$9S6JRp}L`amv!KkN=E(M*(XT}t?ToEhEU+V(a)~UOUhEr05tn;XlraSi{ z5ojqFdr7Lho2Sr5#YZQCEq({?gMCI?ZC1~++g`qk^&`o^w{=ugtQsES3OyQJ<=ml| zT(OqPUy&Tpx3GFeS2yG36&sL!l;tREjg9a5njh^x3^IRP3T zk@uyH0j7ZZnB6pqoH}cFePsISLU9Sk#;;7@xjcz3k2BG+QN#LAOs2(RpmA8a`xl`B zM{H6W3tzm1m`KX}SYTO>g7wMSio|YfNNGW0+skxM`beUZj81pgN=x(MjGJkGao_S* zZcq1gUgyLO!i#>Lz$>cnV&M;aR;G#?Nwz>a9L6eNFJ&p7QqA_f2BsW%D6Qk?|Fl?6 zA;UhKXFB|^8RXn~LP$L&eR}g(HAC4UjAIE%lZ$&gOD<`-ebKB0xJJFl@E9q-tK+{# zbMr_D-ZeMP&_8BT(fs_IwnndSJikJjjUJakYH5_F^HF|Dnp`<;`iBjW8;MieJbmhe zCp~TbZmB3cOC7CjxcW-nKi#=JCg-JHBqcD1d^tF4ezP~cz~T^wOV8kkGOe8HPDfO} zCPW_QoZ%KkGO+?0Auv~rX-w6Oi1ceGT<{i>5Fy6MmQHO>-5n*oPCh*EuZee?NO`6fEw^JcbjI2$l3xgB^AJeXd{%^{%mEYS zb8ZDu8=%h;d;mw>D9>py%Lz;WF)!>OX!e$&E>)v_7WFeUPR_}Yoaq%+n%ice+9fRc zl{Ui(q`b!Z#rqX$c82yYnrT0aQ!2Pg?;;$obne7qCD6Qr5TW7-zOk!7%3K83v1FOJ zEA=XA&nqCd*lS&Ul^#_0IyAwHs<1d zjLMPEc0+c8X~|<{%c48Q*nJ?&zkzueWIXe4Oi!ocomDllpNU)hUfnE%!DS2n6Y{3y z_v!g-vWf!4+lBe=?N}mRz}V<^7_l_&;$LXBA^$6`5mJYc*~AaObdTAoST* z$gr!H*$t7=gE-$A;8fp?o~4wzlJX#l3OM)?htH>a0_5r~c3%hwVN+pxaeMX1d0!?{-634lcru^}%y1^tbJ9tp9&VHZ`ta|9?qK-1=c9 zCb?-0nqpiIWq%Gli16($z??+)Yjas1SkB*ftsMGjdfrkHYitK8i4UEkxCadPjO|AdX@Tqxg=VN{m)vGF{GrQP{2`)o&T1*uchmmN|+7 ztrWKq=S*W)H6f~YT7+d2OJ4!YUT^nLra!E=3RwDD#JmJ%oMTYqv#Mnt{64`~v1-jB zT&U>g1IWw@!MOal)Ay(yUmlKK+KWuMbI_Q&xW8WHGC`CmSfdo&6(^DzjbAbIeX-C( zsq}a6N2g{6=WScaKT5Le(swlNt*Q`6$6tA^*qa=^H8W=A+1=?Fw9b(7C@gNGzIo;^ zcS|Oczv3B~LH(Cz08pr;g>#U~iY*p{cC*ubaJ(x+wq|2Y&O?P>r-!9fuMTEI z+Er#+l`eN=`{mIqF5XLpZf8zMxESBo`I+GR=sZf5sq6_4a=web zeG9mm<(f93xjiH%IMX}CLiLRr{+znGJSxlY0B71$Lh-L=#m39`WVR6Zffc0tzVZ}H z17SjO{_JHg%yZokJnnm?xo`*LHhKLW;LzaGOqq1h^<^HBq{oP^=+S~p$!krhkbw5v zsuqgd$RrrMI8?`$9^+-PyL+68lREz zFhkT2$iNWmsbl##ssRWRf)=V*U2a$&LIV^_Nk&EnsZF0Fd;|A(MMZl44fY&iLBT`- zR;9A21!lHoH=6HcDN^dXq>9;hHdfH!x5Z-ju%ue9!JY8CXntBWO7lTVG#b zE|GL0@s^XEueWRjgE-M+fE*RY`kc+`;NWt;8T0CkJ&nTIZJPz*!WA~l_^pN~8rQ0W zmoNCM*{Ap+mXggE7*S7HAFv@Ou21L>ZscLDyn4^-RoFlOTGxGTbWN)y1>#U|vz6bchS;t5yJx*zJ?lwkZA$g#YXd6|us1$7NiwkCgka(rzTi?=8FT78G=@ zT|rp4+Rpg-E3g<5E-^|Z%jE*4lFxGDNXIi@!b)-we%MLShTR>bN6@_k* zklwx>YOAyT6$W~-3&@4QvY}vxWLf_bjol(R(Vevvk3aY8uZ022H+Ewxy7z?ySi{ID zwY3)B@EiF8IQQkSIAyic^{{6TzQ{cu01xxyXJ2T#2aq0ISSZYFqNZ|7Z%!r18-aL8 z%Pk*j$R+0bgP>rfBye8U40)f&PaDL3t?&?@Uic_o-^%s^XeS5|N6*T)C++A4XFMJ* zt(y;@bpAHIP}#}4pkZ&fle1!*_T<$$5TSL!0lfr%Q84RkCGc@BfSvH5o*!WH_>+E4 zZxk8uC^a|CE?U*achTo4-jjN{r?}CIUbN8UuXU5oMoKj|Txlpw2R>$bMXZDPB0;&-&_XaQrWX`}{g$HBe8)xIqmZ=? z^BBeM#@ty(g~o7)L+Rh2axL>d?M${$=gouz%&^pnAvvoxEElpPN>76~@FH1|jlm{I zhM|#0-+O{t_>;e!{f3X=qZcA5d5p!`gAANYBWGf_20gV}gY~0zZs9DDPsc(DXX4#_ zX!o86^*%)`wj5HWuB=M48cUqhMS@*wBya$9eH+&QuGP5A)UgF>`}5%zvYnz@TzSu* zF+pcz{T|TWOcbEYp)s0DD!4j`+rqlIytaj#7t8N(aeldikqT_aNGaizi2#8Qc6PNu zJUeSLikiZ)u5I>lVr_#bKI*{=*39Ct?9E9GwjP>YZ@pzi%6*c>k25iyc!r<0RVzr8B#)IFS|l2+ z59Ydr5s!{NLCAyJ%xXX%x~wnj6DgH6R3xN*=wVvjdfJIc_cOY(u-G$!7F`7Ti~u&^ z+O`?TGUb=KbU~}-#j+mtx<~tTL$-!t1nba>1%8d-_v=N9(_8=Ie=bSVaiQ|vG($?| zIxf#_ibU5^cHSf~sa$H`prK+1LVld{>vgpb0Y=W-IVQ_BG)AE_%;LEH2GnrB+tR{Q zooofa>r8N$sBWnzSL%Xz4lpcadxUO@du<}cU1{3gEh4rZZ!>IfAo&9%-Efa?nB~qq zX@k|OF5d9X{g_4!tDsbgS4l0XC5$k)qkFUzenZv09C=uY*0D9qSqRz07B{&pd)DY_ zJc@a(F_5qRHnCQVmPJB4A+0tG>#d6B_wvh|`u^l$R^|u8ndE2a8G46CAstd&CC&(D z4Z5|kPa-7!?mf9$-PwKGv!H1`evfXcHRVB4{RCb=-vhr#cbRisVz7_uND;w8HpF;( z)^)3%40&u!5Au`Deji?0iz(?)Q(GSpoFM2aHvEg2l0Ampj_D91)jawD!U~A5Hnq)t zuq>#;-N*O+OGaLGk768DWXg2d=XE^Z9m!&71icx*Qh)>fy@dq2Y)3kdq{}0-3Ts96 zY$cw7rm6mOryMR26JfHk7ynQozj+f^ZsbsO4+#ZAz=z4m;FC_E6`2FnbhH0qx;97$ z$|$r(-&-zVQr&02i>!5K8F9`x&oigG0%y6dpezGi_?j*0O>E#Eb(zVJtxav)y1xSym{5sR7Avn zc_VF@@(}S_HpA|u!DD66=hP^l?mA;AGUYJr1KhSFEFXiM z`8~QaPEXM2<3d72alzk0>_oP=DgZSCCKTuL0qI{ciMl-`VXVJxXFxYsa*42$HGMHd zPO-3wQgBzrT>WH$Ud(b?t(MTqLr#HEo!N|glW+YnUrD|u*e3kc7fe$ueFbhmrWy)Z zxDsUbXdxUYqP-i%TD+v!+bTj~yq{>>V(~k&-buGttqNHqrt-pF0=jC%7AnTE);AI2 zAd`Ja<0fT=QoG4Gg(1su*!k4o;;`)GM%T~=V2w`lJY%&KI3BT3tqHj@(A9MxVl@_F z%`AwFU!v*`rV(s3PaA7?6y9UVnGIG&2BW8cJvy>!|T-R{xO}DWb8qnP#413~S~rhV9|C z=GJU2vJYAYid)@@^}s8GTHSs^Kodj(*MMqmw5eKFJtFn*#z;W}Ji4}s?>6m*-;vLV zbMDS{H{lqj{0kK$gN>ph`%_#th!;=`Ya@fP3zQKAu2xGh`R0sW$qQ;zAUx?Pgyv0* z-ifNJ#~wbeAR2Nb!O`lf#e(9jA=o)xOr*SBPQmoI_s^~6vl?ED`c`{%g~WG@Wkvl* z>@;;0O#fMF%1Br`!nZAZv$R^g@znV?Xo7OdLj~-{`HtNfLQP?PgATZC=9~EqI#Yq8 z!JhzAG9 zUKUZi99zvQCsvu?sGR}Rff#K-5QjrLurAw+(s3`R{I3(j`dL`MU(8S?g+FMcxzmN< z$`llV$#$5pq&pLm)ka?S|B6w6TU0xJ(E7MPm>N0PQd915J98Mp-^OY?2r68j_~MKqj}X(Q2PgC5$C z@5Xe9EU0EGh)iB`tqJxU$iN5m5G0(If|rRR6?xd!CeQs>11gG}1k9Vz8|NLjFGkjI z048GIxAEU{B(-|<;bT!?X}-43aHP?QHulR;P9XPX3mG$H5_2dWDy?1V7|Av1Mu{J+ z)P1Nj9a{sK-I58g>lGe zhKFXSU|N>q+e=8MZRjZUt1d#vp8MyU24BC7PNv^MZJzVXGX^^o)ldtJU-sX}Z|hbg zk(f7Qs2hravE(phxXDmOFRK4a6mvOhXfw_oz1iNOD8zdhGi0iekV|8SURFW@_EXl6 z6-*mirzaA(H;9i}enO$VpONSWHS4yziuTNMWB3Dz*04_#f%zu4yKHEg|0hqCbE`g}gvyljw@wkd)Y8?CL4 zx9*$IP%|8YH7NNQWv@6>iAhn}KV2>&wUrTMEzQGs^U~=nuK0EG*Y2ZS2Q- zCVV?+!P4GXb9dF5>n({YYl6B$S?cFM!Nxv8N!XhHh%HbSk4WUO`Zr6fe*OJI5u~kPJApf}&SboIg;NTJ^M~Zd{cxYYG8o(nrjN>i9Q0X1toM_Q= zUv=f4QRQbK4Y8N-$d?iO%*Z~q1U_pIy`E=JIZ@@VPoSY4bYbsbI=0$?7V4+7jIV)O zCkaEV3>Td68u@*8h^r_J(Vpl|o>n~)53GrlvB-}esi(8jIr}VUF15G7T&i)C8yV_@ z_O$oOzpUxO>Dg4Gq$5L3A!QA8(;_IdO5J~@ zW^Q4?pDBn841lS(FOdUtl-e&$ULjiF-E{@Gl{{CWIg!v|U ziR@W2 zAGdaB+!rVs7{%9k)3_z^&`q`}eLE>+VX}aK35$*WuOeW!YGFM$1~E!uW+MaV4~2y+ zAIFzI0bfXIGN2WV|Ku)Sw8;(6&iSu|?ji@FQGX`n(?Y5i>ha@(iTQzft1eHMa%V&h`Wn1Oru^eqk0G8`P8m(7W>PO7KdZvxI=NKiQw*!v%8JLCuZUkf~1ZA z{uJI5&*}k#-R}Dz#$g-RL)}Sc%M4mbJr?pm{cg;K@dG0-fatRu{5E82#W7JONdfzd z;FmR!9#iKw05XACh4D4?l6+;~KI{U3*gCRJnKi3PHKQw}lobRiCN*;>p4&m@*(%eg z_id4{w1>*#D?Izh$a(J+MqS(kgzsVlKYnb^-Ct1u2=QNe0=K>zVFOLSn1hVAv1ql4 z6jDf?gU%`6X@~ggjr?e@u&YOiDWBr{A75zX!i+DNB?o6sHy;#KXHG{^%C=^>c+S0l za{{$F%8y?w3#puRrIaG+MWoG^l9V!a{*bl$l(l!UErSKE2Q{xjML4d@C&q`p^rVC6 zcD02nITsw0u3875DIa+)C|x;Qs28-Po$cMO+;|Xlg~R{r{DEz^*sls5K--d6Dms`g zM3M!spULtoUX(gkL+{)M!8*u)p?;M~?HsVtY`b$%@C|6Tuw5R9Q`Z5=#)m~wG*)8Nwl;_&Nl2z;%j%}fBkrY8FH`<;`2&8%{|_FHDvGxt@gqgN@Lv# zv}nxxLA6Px1q{fiF}Xs;t2BSit>a`!?kMc6*zG=WMri5Ta1;a)YY+se98YGZan9D-n9Zzs{!79Y7e++2=g$Gc-scvS^lDJ_D9Z{x_!D)(k~pWiR?i5NqzUTM=Cx1^Nj-!GVjl|85|;WJs!zob z{oaSAAYX#!Li6FTa|?tS>S`df5phS}s=_AhYh6fiHbCCS#s~}${f+jRv4H?`LBaHa z`@lCb`=`PP+rDuxi zerXj1$Uh`U@)503+?9Q!pyE<`rIm_YnrYwFUu9&Tb@q!DcUx!6qw;r8=^?&jygI4HuAOq}l3m$K z_;ZWlw9Y>y$*+VPD?lZ}(l(;$oWQH4w1|iZIqxnrd6%;@64c`)eW)Ji@N6fLtF4`a z4%kHmZ3kTXRlEq!13;>Iql&O{Sl`_y;(qX*TZ;$-2lS_;I&(J#9Gz^YYS< za{f;9np)0hr{P7R1YSLL)|)YW&};-&EI9~@%I%!3@mi0LIpk!b8m~SU5l(NF^yso{ zakKbac00Q)V^I$WGmEnXjl6qPPic+ni9T`?P)#n*hITXD&`d+zV@`sjhhiLYuSkL#R*! zexZ6m;B19g{a$XguF}XJpeA0}`^dDW-=Bh1)YpwhX7?9)z%JhQg=K_SZ#wWPA*lw& zeTRY<-{Ttr4!Oq5V;;Dy9@KP-Pe~}?)d;X0v6x>M4IriB!DOxUhGScqVSJTau?PjP zWos-5TWE%yK$Ja6@N6>*I+^UB?4YaaH~RwF&sa8>fMp@;rnOw%^f%S3WjoFh<}$6u zv8`|3@RgVdJYprsXiGY8+V!E3_s`^l#8MX#5s|V6`d-~Q@dlJky2CY7i&mbfRK!ks zFwTc|?Y+q0m?&;^UjK`i^hMC(We(v%!9#*C@Z_Wi#3SGR%8gFgR97=hZU&jvE8Wnw z^~{wqhjHRdZd1`g__L`_9+^dcFa5lN~Ilur= zB#ITl6qE4Afejy~Xn>l();Bg073BGX<5I-7Mwnfy1R5SGQd74$im#& zGmFm%z(_K5=TjbCFM6E9%%3ygJ_6|(nMfZWAE027^UEe=?WjGvQ0sr~b0Ej-LG5%V ze$yTBY2JIwi!tZ_m!+W(CATcsa#e;K9j!(`Ru=hC{EEY@>f%!7#i#&y8k~>2sk{4; zaOJ@glX4r`Py*2O#+Ph!Q+eZ9y=146^D76#n@&fFlutJ}PC^fstz)_Nx@7|h$|Wg$ zU025V*|^G=;OKehEa4+HRE{cP*A5}tV&SVPo$3FwU3?X($K2qOOsC-D6qTq<`K0QN6R+OF}1tK>kLFS^4o<| zpdQ|~rF*gUO_}mnyQ=vH<5iy)fi%ML=2#hT+*-W|>pf^QRbf+K3ZsYwy!)Q}iSW(g zPzt;n5*2TSFuk9kj`JHR^p`jR14XX#-&^T}xP5yf43tMA@26*1Mk*%ApG0ih|k*w*zcy&EEe&wLfPF<~C*SEfhd+*+bkgSsSKMzh-vq?2{dC(YK z%G}GhU3n7iQMW(nMFhKK)#^h~M{xUFy&->5(7SF~aWAw8y{)c2)3aX;{bE+AB`)7Y z-NJj~iKEM6uN_Kx>2AHH9=Mf(uM5-yCHS^qozFzq8e|vTO&=fm)1-L*rrLjBl z#4YBf^0xiErb^z|^nb+(Hb$z`a3I57P{FNybE&1C$VB3)7Klnr3HpR~meWdtI<#M~KagK>hcxwa)WvGgWk_Kxdinl%b zTfv~x5Qif13FZ@ja8QInog0kTiZ$O06ZyF?(#UBY$-TO1knJ_CRD2};17&+K*&~`I z(2;8UQl8-VVUx*$a8RmaH-?yPoPwnHkRo6`o{ZD@;#p_}`eA1pHYoGEZ z%Q&Q5&Yjheb=thZk#c!cDfk&K>;twVI)8H59r~nNhJ1ywKR4A$ou{JpZ^DwgjpN_ literal 0 HcmV?d00001 diff --git a/windows/deployment/windows-autopilot/images/wg06.png b/windows/deployment/windows-autopilot/images/wg06.png new file mode 100644 index 0000000000000000000000000000000000000000..68cd29c24ddaff4f0ce7833284021651f35ff321 GIT binary patch literal 124860 zcmeFZdpy+nA3v&XvE{aH8&PPt4dqsZT*hSEl3dIEI!QywCD#ly+JtQ-m0NB@2{9NE z<2I&9a+hJ;Ni`V8eJ&Vg&ihl__tfwEJ^!Bbc$~-f*vn(4Vm|Np>+*a(pU;=u7G{Pb zJEeB=@$rcmo&DniAD>V)AD>{)58r`z#{8pw!2h-dUNHQfue57F4ZQf?!@$&lkMCK6 z(55Rtc)i2_tbHIK-)}R}zuRuQ@$cv3`173)MZasP|>k4G+e@ zg#88H=bW&*7qVBQqQKoG8#TH%8C8Yg33=x=qbaWiv+iO0I%u&zY2yn2q{0Q#m%oFO zOrl+V-FGmA6Ot|3zV|=b#+>+^C;Wwh7E^tmmbIGmeGFD#;ciTYORW*&W3TZ)N%91f z@hQU!4+M+0-5LIcm{(Cr+9W#1Z29Wt^Oui^3{yD>BV(N+X0fI>+9%OjKt#;^a@(zEg7eQj zwYr~7#issqC56-fd?(M!C^f{85B*N>&Cdr>rBcG2&x(;zuXH<2FxBV) z(1<)Ci%km|Oj*uH47v6_XN;$*=bNicTwNR7VVR%eYd@XSVOyntH6Yb9%d)_9??_mJ zbg136CX}qpm#f68e>%uLPhL-Rw|IuD&FWlvnV#y zk*V#P{deNq;!0*2O?vU6rh7s#PUZGgJbqa2KCM5bU5r2osD=xFQi`xPVkNl z#G&u*-K=0BMD*&vL@&(apWDoeQiBD}-gXlkUKkn6GS1Isvi9p-sgQ}eQhSGRXKX%> z=0oysZ|coCw>O7Y;{rb5@Y0PHPJaAQNov8c{g#;Om)P$9T(EccdI=))P1BCDa$uV4 z4kFtX`hBjySe6b|-zrlkXJBlnqwYdcV2Uf8Hb_%lP?O6tbszpKJ2>k#t!CqY97@-t z`{3LPugo%5`tO|Ue5ezW9gi!$@Vu5XOj`=#{JoySZgIH_E349-zh*HNR~K)(_;ibL zlnMWz4{M!zeB-11z(ylMbIfh#m}UEJb#*zB;j+}-?ZwP!JjN}{G_q<{CMrf$RzKu- zYOyJGjK_BQpt~3}JNPNNaoVn?2~leBefJlhVk?^ZwwAs`Iy3W2mT4*^I)s1NE|*vH z00dx>zEAt`oG<(ebR9R^M3?`hDcjbP2>6IT9wqJI?U>~ zQ6WP?S@@W^y(Qd*0q#_OxUe+5rrkQ-y(=@M&t+1|94DQm&AlN)&X~nj{g2FfZII?G zXkDdu71c75A3r>)Nb`9lwW#ks@8_#=h0aMml@9X8*~1zom9+la57^l75l9mlfp{P{l^c(dhVRp4U)8mjxQ0u|AER*4fG(zG@**I z_TM+te_Wx0LTT!)adZC^gz<|L&s!2}u156i@HC2#QnSx0DAW$=LD5X@VWMsIB+TnI zB3GAKa=SM2`j=vg>iUF*tnPX3OIYN~Y7@cXh7H^?iqb5m9{-==Nfd1>-s&`E?+qC(^la`(Ymw;*{*fA2 zcjqvo;L3{Y2)bmB-s*rDxzux>46Z=4MDLR2HMZ`Z^kczvgAqJ0`UJk5^;$3~*1PuZ zM~04q<+1zfZYzH|*Vc@DI`EfpV_yG@rY|j|FYuqD-KVV(IQ#tY9@8u?mv-@->Ap(K z=A)no)KF4lgRx%jQ+H^IEwcKXq48NqOWdlUY@Mgf?>9>ogsF^OSzBsqF<*#yQxw?5 z0D;d;mOf)LzYE}m6lXax{!3QnP`Fh zejggBF_vAHKOi{IdTFB$eaTLN_<0?r-5JLow@V^>M{02`aNL(tHuj~I5k=xNb$mc) zI3*Yy82`Amgt)+pI%EFuLD$Fy9pm;Mn5L0@HVp&9#2f9pH7_V48|gG%V#B@&bu{Px zP+hl;KDw{iup8O0G>fuXTKivN_$37Xg||@6`}Y+7Up$4K6JT5_oF~c~Ne$*L3V!Z6 zQrGiJPOHB9hTr>?9lb9Uefn`_l1YanXm&}z8TlyrB%XU9 z;6>y7`8j(8Ts(0u(VaOalg2HNe>3uO^USb%aNNRpLhSSJA747>$UJgY0J#&PBYw!} z!an1XCl8+d>9B!0@F^Fb{AoK}Wb3M~V7bO6EpCc~sTTTmCF;2~zR}$xe<|ASr_XQk zy)pXoCmWCL_~*TkzkT_5lMlcD=e>XjRkPLrGydG*Zvsuy&@XMHFQ4Ls+_uke-N=0M z<Gac71>TBF2WqkrBzAphkFg<5|5=e>K0|9-rGPw(H@`!_ZIEiC_* z<$t>d-@iTgUr6vTpyK-%j{b|5|D84doz(svB>DdT2??I}MDjKU*++zg_=XRlw;f?8 zo-!8^+Ng<}n#jPS3e`(%)s=2+o2etgev$r(+ITZ$qa|DVKK73q9*4NSNh(Kd>#cy` zlcC7kpIvl5HWG(mngN9k@p(-lGPQqd-H)8^TKU>dUhjha1p>3X#y-;LUD z*am5C0QnJ3@K5KBm97s>e=Ilnle9)j|d#}a7vSD7(MTS*hjGfC&>_` z30Y`Isg(&_Y0c?aj129$EisYlizh5MHmMYXx zIdE;#cN?Eq(${=akVDlamH;~MMpGDkglT7+k$_NP22u9$gQhd zXB5tNQu%8Z>V}zNcA)ddB%)?S=DJ$3XGXGLeKPhB#MS%UR<@W)!dPBezM}y01{aD) z4+{YbU#D1GL@>dvR~ffc(YF2b_tCi=IV9O`J1T;nrCEimtdhI+s)naI{6(nVQZeNA@HgC&KT?ibm8dq;1CEu zEx(uV3F8>~5}en%B7SSG%P`vTd%l^|U(ih z3UxX=5_1{V7r=&bo$ScFqttv@_v2&fn2s^kHH=-tP%qS|3yoor;J{p5V{ec`rS25B*dmusaWyMk#8wa+I$#x<$&-SGVn zT?}!i1{;4OQX9%X43^2+a3(aDA_Bf`yg3W2Q5KgmVL9t5ZT zQV~x~;}+HHNbePHGszBjY?0j@v&NOCllO-Ngoum}A1uc0RtMZ$9PA zu>>U}_^M*)yFTNlbf@6(3v({@%H^E!TS$aJT4(lG>@#Kc_5ef0KGinNfpmc)d3YU#6 zrA96dCF3uYn`MNC+imBwQ2si(eh|p|vAZCEOiYN?SYMx!6D%++nFZD3R04fGMZ+q^i6nh?Gk#7VT^jA3@FD_fSkKb(8?!<3$N(~DVJZmIe zTqG%cd{)L^6Wlk=uO8FedVx2N94&2^*?Rw`qW6?druzNcSIz56gY7#!V?-_-m5yV)=}c%0Ga#(pB+0S{#GedT); zWg}+S8M1jS_%$=TiGT#9uwP(yHDx)W0?1)G;Wnp$_AS?K!k1|;6h0M20pyiC25En` z=9r9QQQSPnePt>mh3|#eH=)vBQ~*mUxzd6h(2@)YK-ELBu$1X7kCyNd-;D!b$H9yZ zlrrpcmPVeewicS#Tc9(JQZd1dFjvz>C^kJ;ea%5^ zN_3L6zKYGS4sfK0mYSDvwQxFx^b=4~zW*9AoFq(*Z=BpnL(~|^JME`DA2r4|U}cK? zKK#rXF;_s5CXF1j+mkr6zAd*ja7d8f?#{s;8$YIkj^+G6!e#{YM%qEg*}`eW zP9Z+Nn_mk}Ir30r#n5e4NbNG{kdY>`TN0-mCKpogO+J-hpp`tr85Gj>8~lB;Ps85T zKp6@gNziOOzPh{)anMJ&589&np(_7z{$U{ATz2S!?P$XZB|g3%zCj+?2v8hpEf^{m zeGK0&Gavarld(5XCek--x=#Q3z;w06WlMEzhj(nBw>$EaSnrfkw-3uuw6~$q!s~c}pbQnqPP5+fB%~09Ltk^CfLf%jX zi?zl$*HJevBzBRW&4o{oMj%jzHBe116-u|=s;hDo&E7@ndpv27CRR$|fpW66da&z6 z1jSmun>fEYw^%dV6{}J={}R9keO9rzK$ib9XsN7exZZE0MfeEMf@|=7FvW124_&n^ zhT=l?%H7y<(n}#JfX)Lq^YMfh*s&KL0UJr?}F`#qy7#`wzx=m_*gC zTcMS&NQ)@OHp?mDEX>eflD0uV2uZO3NF54TyF&}~!!1|fax)gge+^edOrU?SCfKxM zd;hdloln{tYPzYnIrEO@EPH&nc%K6LP8(H6VU>^}HW9p8lR6p@i7M-7zUrk8NyLt4 zUm!^(wTj|SnKfMP*&(qAZc&;$+Y%e25yqL$mQ6!TwqjpDCFAK!&4@cf-cn1P32DaG zOL^(Q1*VujGh)MTz=FkOfkNr*N7~&)tZYjSks5fAo1>CFvhWuReue0up^!+tH{-S1 zWF{o!b)TJM5;6)6Y@qDAuh28f7e%ET)7>w(ScO<12up7n^zeCr*t%*$Cc*fLzMlKb zBxd6_eeS~bEVA{99S9q{p1LJF5zYq@K@U|_LN<)|_K<4+^!Za@p8B|CZ@aaq-x3?{ zxEc}IZDiO{yTO%D$%n7c)?y}ehZH;LXNB41!mTK^xrOk?hw7y+Yi}Mfu4^Qr)%J(K zjEA4NGAuYS0v~mRhki^Ocmh9F$S&1#I5Y+nT1c&(4L;Pqpv3B zcO3&`#NCH#(^Fa#82K^hQ^b|w45maXf4;y(~w(Mzn2zFsqVgR+mJ4wX*m#~SH@NVbWeMZgtAAlN7g=Qo0z;`euXh`##`1TrfnrvtCpauj zaj-vlJG>tWmra$)>6=NjjppwRcOUv2++@05Zbu{?Wx`yn)*_!WR~@<5VLy33eU|{T z6wH6k2)~fQK5fF2aKBQ}X8#F5Qz_hb2Zp0tk2-)4unXBhg9>XwpvPCIvmSRz)p(5o&^CG z0L*#0({h=ir>^IW=VeeWbOn)WVlbi-%)chZJOe3*MLb&_TY zFcH?K_A?iXtj$%>AY*NLJ1B3J+3;l$wXud*P4*_$OqEiy&2bLD2q0Mx{W0;R6Wqpj zMKW)$a*rZHY{Gs6#MwHaez50i@N_l(;?{1PgJ#g>h6^6QzV-5;yK~mU;}|S@Ihh_8 zzLC(Mj6S$VJwJUb)*F2BR+ryy@rNB%u*7EyAY;r(N@LEcIC`Ap z!=3Ym>i7mly+34UW24ldG1*x?Y$z7Sak21-?$IP_OQhI)I)qfunT#RQ9-6pKOw9FV6#h;(CdXVI-R%e+L`Z z52%Q=6r29xiQ*Eh(atf@%K=!ed;2aCYT=}DdRf;#?!=<>L)d!BnM}-Z{RkqWhC}R6 zvmJk1gQ@KG33%EGIJgl^n3JFfZN-*MOl{YX1U+Q`QKVVz#09^4W{90dE^pNB{fBO5 z2>MU@^-;f-<_Xz|UVv42ws8IDt1+@e*WV0}B(ygCY@)Xqb2!i!6Vw_<6BuIxC^%E^ z+62a383`y61@_n?2b#wb)0GNFr@e1ELis;X+sNl9L-Yi<-wztSn~>&u!`06UKQTA*2Uj1!8ReA;{Q2 zrhUCx1MD=PGaj;k(ko`5!9)JK5R%=q{+9@th!^We*0iXAQ7E*PiBjWa+bzfE=ZdiX z{FRDv72*2#O<1PWFA7uLRbN196}hs-FkAyu4$|-?G%cgywUgME-rk~FlyxGGtEsRG zin-m=J4+gCEcnCY7E$f>aynuguVLxcN6@jIr!nu2Nd2=7s#e$+1 zq=Fiovl8r-CdN6{F0X&Az`q`PwgeBC<(ZEp&``<51m6IER{x3cUy`=!-ra3BFX&J1 zbS$f0C7&P}q|ve6xOCZh2Ugal4oO=-Fi!f>^_LSJ@6tC5I>9*mqM%ADjd(2FmR0bE z`vlxYFr8nyq1P9;A7BmI;gnk1cnbvmvENMmL{3jk6xn=RJB+z$>}slRR;u^x6@8r@ z!=KeCmZVCg{#lmeN|R|f1*s3JNEzJ*w0AL3xsxo zhkfbDT%5*-iBOo%Sa52Uq_(<}_iIpD?k^DfmMiv2J{;LBBcpWSJW$3rKlWI{0Z-(g z=n?^NdbnwAS%LX5{mss~xjmrZ*ME3ac0g<^!eR;{6vB&@IOXe6QC_g2!Nn3?1&+x~ z$oM5dS_T)>`~X4siR3jcv_(X!E4^v;sJe|fDXL3dDRZwZSKSqt{dYmt>=i)Q&7YVm zhPa;5ClcAC0UrUSnMs;i4w6WQken-;2m)T6jDwhee2Q2b9nk)?yS04}D)!oB?>aIE zrdDM3>&VeD|By;^AC2-6q2G~N0Yf*-s?BdnXukyfc`DWyqEsfI+020|!5xx77$sQQ zvvf4WTZe;phE$eIoUgm1E6?$LxbV1K4*%Vdyyo8H)Of;?()@w9fTIz^YO)a_PlHpa zWXJef)^Dy^sm#58TRf1{7SKG}@PCEAHDHN0&7i8rW=?(1X5K3hAP+3ro<% zytL07@ZH4yBHny_sBfH|#gr&>ST;u7t~6SHLA2oIAkry8!uP2@JZu`Dt?35PP=1}_ zK*ypA8#GAT=00*pTReQaHo^A-TN{qiV1CaB*2bW7qSTyOkUDn&JF;q zcF|H$^BS~9f9=~62u#U`w$Lqqi~J38F>5Ht-AZ;$!*@P(7>FErYqRyBAi%0~XWr%K z3xtC5G#hA-%o=@F?+G}sdL~QP)j&qLtq%tlm|PcYa^>J~by+(PQk>u4h-#bS2sEiR zKJ)fRW8L^Vi0W~vJq`vMS7f9mdcCSFC%SQYWGGljcI;wLQdzYMP;|}{BsM&!*NI@l z&dbl;tx`+tj$Grmx_PCd$;JBQk&i=K$i+4{iz&x&X?9TPfL!>y);v?Qc|TpRsiyAw zdkdw;Lk6kDUZFTnn-0g!%pB(w;vWrA8u9Gce5H-|$2)7r&q2x@E%xlt3dw%B@NBdt zQcbCtX0?^b29I^D*z@Fx@DLk2i&QLVvL--ZsOtkDjyHf!)bX>%M~Y$S$I{- z_jaZ3^NU7`;Pf{dZ}vkak(T0I>$XhJ5Z2Z%zS;rj(*Lpt7;u4LENGIp+lHbd+}7cE z)L#$@al^O;`c$n`0>%z&C{g1TL$p`AlB3KJShO+!@J`Vj|jDUL01qGM274Qbgzw52_}j= zy6IPsbBC56ER>GU$7Q!+!|d!+cd3`2W%uXN6Mjr#D*Eh88Va$}vQ#ryb$na2TbA3O zASN=Au6v}dxC3x~PdrBR=#@PiQR!O}rc6Vwtzq`Sib2|JWOeZK#bt@;WD#70lc$Z4 z`N82kq_K$WEY)g8=DB!mm^ENzd+NSsqApfK)I2$1dwZo<(}}A)5FnFX4QwNqb02v+ z*Ie^(-bXq9ZoDPiIMjAFCR|2HXtsAg$7B#w2dX`sXk8+4bhZ^V>OyXGm)|1V$<78J zWSAEs9qD`B&#fGOm3iAM9ZovEH%WVX7z0ySC2{s=W3SZ6nTPaRvs&*hJTJ0||8Pra z;j-)|s7@2>rknhu#d8w+8>tzhB8nMSuzN|&5~7rzN~7;6k^tK){_#y9gp?X(nXIUxeg z-r=mKzqP$FUEtO)$^FX}e^2fs5dTYAK+ z%~}~JCQU1yUpLE!Y4Mt~ zB>ZqHS|7}5;(m9ce<`4gVY!GxjGDqK*>(9cUx}0g-ROku>%WunvHV0_gGmRNx;Tw@ z-I~f%1_R&o(~h+f>%6Sp5JIKmj73GdWRf=Rfg_oi)UH1z()}yDbmNa0`*>%;szc?fp=@hz zt_DZTlbCAoJ>Q#ekWl5r^TEp;IsBW%b$V570p|#T#d2#*zsTD?{Unddb)CyM>ntY^ zR*jQu#R>deI@Zv(_5cwf=j8@ej zdjs0MRv3$}7E>L##hpSM8M7h}Y_?eIjVh#fy66QT#kxC{V-X0U(f}qryoEe@i=UVg zMwO;Rj)&W#w`Gl+|2&Xbb~+vH4S0u( z7Wpnf&c2NQjjUYP_rQBEvc;_0-JWIWyI#tYj>|Sx=9@z|Y6<_(oh&Za`F~9hnB`47__j|fSDU<;@HzJD zm~&xPOBQ++y@xE&nO%J-GnWdnRzj#}fEXrsw!vx`d6c_x!MKf|v_&!>9{@VQ^nT8k zkHr+=!Hq)CmmZQ2pP@)Z9$SbfjGKvB+Viwum}A2oQD#(q!q_fXQ{4WLHY&)KevI!E z5q5UEFFB9rMJsHq)gaD(Aiqf6II6G;>QduPJt%(?A>wTxPsx6WP*zraY}y(#iQ4KU zI0paHSXxwY_Oo1W4kCmw;kle+!a~Ub9@ZKM1j)aR`&Fuc!5;Sp(R@o|>*WAO;};ky zfDM1fU{icPI)zs51+*IDsI>-|Ze;6Z5`8D~=-%#jlz_=S=P3Yl-_i(c=OPI~>p0q^ zF;cYxUe)@Gt0dpa_-{xcsl05_6fo;hT@8q(M9zJ1LuWdwe^r{HW|(o0=4vm)^#&8870W^`$}(k0J1UjmQil2T<+^^j0V1 zUS2sK?rIw852WjYXr8yYybfN^4XSKTjTIekUe zxW=2q);!F#RtDFH10df5=CYC9&=ElX>cGwv+PZkR96BNu*n5bO?_ob1ooXAy4mvkjA6=cX^EJcW;iTzTLcKn1 zpT;FqOc7oeoLv++knmDk4_*N2i*S0zUZ=<5H=7dz>hGS3^?w-Dhc}aih<2K1G78Xq zprsd?e`F;)zmC;_wd(hiecGI_ao(2!=q-af2V5CLsW;2=q4JbxE7JCx_iM1tAF7)_ zcj!CaVebp=F}Is6em7Pz7)(^<{)(lQvFv+8c1EfBRRw_o;3w^1Q>KPz%Q25UL*>*7 zCo4BdO-H#?rF7rVUf4?QJ->pDs)#~BpQ=D&%ri3grE#+Om~9SJb&LI&cuow z0?Pe$H_K^!(RrR^()#$efHrE2*wzsfq_a{=}nYD8VVGVMB*Q<+~3I}ZODl$jpZ>& z{0?$fN;~Jc`(&Rqq@mdL$bvcrsnSYU&YXzscl0Ac5{sC30HputwWtJlItM!)C>H@r zhAYZFZy}5^RCYj~FfNNXNb7%*W3sj&D)%KSC_T82z@UoRCO!yh&n=G5F1MzIdn zXH3S&+(Pp4F~70>c`@FazSq8}0?``zA=56l%a$K*Pfz?P&iJ_9dH^p8TP*^2GATHx ztnK^_{;MLW(kleccH&38c=<_0f=PmOhXg>p?O@{TKw65{ApQV8ITllVMgTbr9aTu8#}QS96b-<|xZ10i(ZL!31LJ>{|@-Ru$xvuQDa3IxUy+j5DE zH0@+aHg`2Os{#@(>~iWXn6PoOvgy9|rCHPRb4#5?ah?kRx&kjk5h)rXuUM;xzvE;4 z`n56R=@?Y(F)nrspHb4=3_nuh!sEV;C^KOp)HN3>%g2qBzTUD=)Qq4?=zJrdSwtK$ zNP9$96>4|zo;+yWdobCHCw_X~1*)1##`DJ}!E_P=EIs3i(TrqZ)Jel$D~xG5pySl= z?q!hSB9U;3%CVK##)LE%TCnu1UK%@WLiW%)1zQdmQN7j-S(+dN8?bu;Txl+bSm;5? zC6=E$JXUPQN|sl81B`b^RPrgdQEJ(EJ=ODIbXzZTm{jwz2faRj?$N+oK?hXTli3RM zXnx|S=_Dh-hda*`o&3&vdLVEOg!(kXt7UyV#2Ablq?!9_s|jComktO}L>#b2D3*!X zPOiUseX2Jqne)=X^GYQTT%n@lHEN5fhjqi=_KjY%d42pOWLmi%mWJNF!+WC*kVY9; z%fe9Gk`3T-iUnPPD-v6b5=4sPbU0JurXAH1_RIL(33eLwy5!C?;U0koKC&g+z;V zfgoLlRpyxdEo8}_((+?|26d4G6(NA!6E@!;)SCxLZP0QLr|xmHkh@cMc?)V#-d>E@ zIa`xwLDG9R-o7N09gQ_M=SaX$a39?M0|^%ZtS-PF1ZCm?+XBhN;H#x3dZhOO z+oxR!N5M6GLc+F1pkWlLRxVA$uTErIK1_Tw3z$4G!acy+*OVA$%21AffP5kxWep-$ zoucG;{#bk{O9G@cM^rzWJISP_|J08Vaie8PXxV-FqZHw72OSHI~a+ zXP+*HrJk!nFI&=<&uN5}R_lQ~{6rF7>5wfZMAo(hC~NDwZEw8jJr9_+Wa(Xa;<63O zEKf(}{*dN?E%xW5&_##Kpf$(JtysjvN>>tQ=Xe;s>{U%9Z?7;3%W?qo`gEl4eDPyd*HUYf9rk>RX||Tc1DEz0=$4XV!x{v)?10&fYR2 z5f*Z~*c6pbbU!AoB3pKs>gi>?uIwJlb3^7?r+N8qv8G?Aoks2g;yEf)25$vAf)c9u zl3#HrDT@atc4IN8QZR&EZrma4aN43n<(qHzm-Cj$zX~gP{u2`T$09RCqld9_O{3DR-#I9!= zM35rB(%k|mC$|TjXY0SeoMBCxT^kKCyrnU3i+)kHo^H`U9aZRUF~#$d!q)-!WC-F^ zMN_tKkOfMBstLP{vLpXA`8biSw{f-U10DRdw{QBv>`y9bj3sr|Tl|#}?hE2v$QX$H zX%P&bS)llS8r5tRGkKA3p4YebJ{2NRP-PbYd_Jx;1HW5W_CDf>yi<@R zV95PtvJ!;=q&4cU9vvDOl@{-NI;Zhw9L32JvvCoe2h``;Ma9aOIftDm9CLvtW=>FL zMyH3)6?7Et{i61tc>EPay3TyA^Y_&12=WSfJ znCgzaezw-W#xy2#Kjovc6Adp5e!3K(T^S$Sw#LK{Hm1M6961=2kSBA!{H`huG>YZ< z19J!W5kB0J8bkT6E7FXT04ypQxB&|PytXz7Z&d#Yg;h{>8`c}-d;bmq`n0B!_c-L@ z{?r0<`tG{TVjugO>^N}f%L1M|;dmXNoN;^yBU=lmL^#Tlij(CIkR zUJ1(ae3Zr1y+ltOVcRBvyaa-IrqILHk zquSY8c`KMt1^byqK0Dd#-AD7uk6Hke_}cZv0eV&iG=d54JW#5s483zAI*%w5v7(7T ziU@zyxcKo-gKW}{@YD7@KXM4~3{#nHOD|?OfhrI50$5Fe^13x=b|M4sT^IVgegwcV z;N*(RhASVNp5pYbDp+$6mw<7%TT3HKjah`WkPH7aw9|QyM_6k*uqnCP8*g@xFVp29 zBwgIvIvu({1NePCsyxZ31{CTooPfo;Ea#Z(Z|pW*nVmwzwES>Im4zW&i3s|U`f=T@ zzjYgL)}sNb2Al|>&?TagXSEdjv5Dc#%d?q|;M)h!k0spV?-a`JhM#!qXO{3iU-8g4 zGhOW_#MHIKQXz+r9l5SdWOVTMa?^8D3XhJCup`GEJ=L@Hbvx^Z z@eSkY>a)|6;1Z0x%dMK^En9CTsytusJ=!@43^n*Oxn84a~Xuv$figpQ_lipv*EDxPNc)!?eNBNcK5b>0#sc>W*UXhvZq{ zA3S<{P+tD~+K(w5a#Jd#`ldn7D=eZgB_apXQUO=kcyk<#D$T9Eki%8!O2N`?##&%I zfZ`zT3$T%gKLgi(;4+4YC3bTAV&Do`S};vGKbsXgw|C)cFJkM2%OiKS76TtAb%UUqG~5y!F;Ydd~)`*}RCNN?4U!t7qH#J}Sr`Ny2TVn}+SxAzsqMvD&Ne=;AI}$Z;UI%F)f|VW2-U!LrAwqavoT);zzb z(c?M~Fo@0f0heOC;7v;Zk<#}Gw4syJgD}$ar`I|(ubDGE(5U76vipxK!x9337Ju1} zTvDQ_#msi{vXDDW$?1sJQaQJ%kUA%k=&$)#h}qiKcx_Z~ZpsMb-e~NTxt|1(<*7Zc z2HUxA18%)z$s=no8uYfebSIoR2)>@|_|t9`z0@76ZT3TkO2w@s5IqMAsTl?u0&r6X zWduMbdJtB#-GtBJ_6|M!H-L(ngv8&s@p<3*nt{)8fm}daKRz3UyiLV4BPL!G6OLQjd8>9hU{{BLq)iVrJU07HdMIS1=SP29q*w`A8t`kZKQ7H6I5AuE8i1V2Nq4m* zu`J&nKNx=Ko($dz%xXVhv6zCqn10Hkz^0%xkr8W{0{EIjD>r$it9D@a9=V$?Db6VI zHzBSC2sNnkg6#BQ|M>az|MI9R@Ao!ZzbpeTSkNESK5Re5M9hHD^SwYr)S3b1df*eAz)X)Z zguQUAxOY~dUjA*62GqC1N;BQ845wq~9x&N(=!hkQKa^HjXGRI`^oF^}*18ht^@U>jX04o>X z!#N63YLk67s`!Y5N>AHc1O1Fct%}CoJmQ+nj0s8u1P=*LuE=|t`7@P7haUzC!auPF zdREyyIi(q~ztt3Wcm0suAA`@HR6E(y-9Uqf!18gC6U>>-TLW;2M$jWR0Ny>N#7uuPVtFh+S>kJ&6O`cEz0x=0RGB~7dPdH0ZO1}1wBv+ zmV7}s-e>4%zqKaTd`%$V4GqU{Xbn7MG+_k33V<{OJ946;FCx>|a+Z*&3N}jE@)Pi* zW5zYvve(XlyoO9Yz813^(Frm9olm*XRsf{1up`SC&(Bb_l7I^aJ8%X>H!G)AqUqfKl4Tz7t7NTu`6BbkNo z-yWLZn>4g`5;Sb^v+Ug4GXM75X5Z=L{_IS@r9IkF9q+da1W;@wtsjtLf>~C_et<}^ z#+#bB1}lsCz|F89Z2jti?HRmt1^noxjo%z2>nGop<#(2MKVw({crp1NxGsj+`9TGF zRgy!bt{?dMijBT$4gz{CdK}I0Hh^~lo_0MYv%B|1c;W5?db_lC^%2nc%t-I=mgP7S zR53>Y&F7M+A}j>i;cTj?f6Rq}y)|GshZYG%*m@}o#NhtmyNL%j8#k6KrepcHMlHK- zO{DrY)ESKOJv8@4VrcU`G5*nI*~#aneW4h2Z9wQQMiMSH$|)+%jDb7?nGsCU2#w|U zv4N!|Nf)@95*jU>!I_I{*Cc>EL=WTwwvO4VdS3znoK?_y$rVcdOC~QCS~61?9y{5A zVfuRkXtPA=3aJ!PT<*0Qv(GGkbxD1GE$Zs=wI_`0po4RBcw%iPI=t6lk777*#}o6b zySn9i36L9hQj%2ygukFLA#l$J-T>psF7fAx>T<6M7e2+zUy4OOTCtN3Q)LFB|N{cqX39wo#ruxseB7EIKY z_440dO?F8q`OTU2VeqQ|CD}mruO4W*!E%e6uVE=a0N~z5pR9 z9;E0rK(E#5u7$csfn&<-YT}kvw&%q};Jniq+c|L03$RAO0FmFK*v~ac^LND;>#rYL z`A($mRw5q~+6dVJrpfj#^Cu&zUKfS@>GpdhgyvRpSR_QPF|MAIwi#i(m;zfU^V*iD zt8JWtQ&^UsR-Sv{xFAMoYb7m2SfSo<&$D#2^_rjx1AK<(?0Rk-{XvaQ5p2B4 z`Xu8HCCzT}Ul=b>t)_(~r324vS&j&F_UyH|UY~QYPiP#Is`~WA(By3i0{xU!sg^@K z$!pvH!ABf_x3A9J1b$A50O6=~FUYX(;OqsqJQ{DJpsNT%P;J5=|1~cLKd7wCq{k@_ z9+^1;Alb6bc|l~A%(ac1f{JFuiebp*8zv-f4g!amK=cRJA7rF1iQrpLw>oj2_sQ#2 zsY@*fh2KrJ`k2zpbVKdPFxhsOD-a7fYEA&d{%KRNc8K4!o@#`c z1p})OHq`CrDyCZ37m52MVB+JB%Jh9qeLM0b9|syBU!N`M50@OU0f{77Z>Doh+4?f##Wt)xN@LZ18lkZL z;(fn5d6jhIQ7JnnOwFLh)1DG&iT3mLLFCeBBm|{||96jyt2*1PvUkosZ}-dAnND#B zJKcfGX7$zkhH$w{!W=Ll*aJ%g0H~$-{ZVsb@~k>0_iy9XJATZ#&Dv4h^;z$wB;(KZ ze+uknfRP3nIp%7>iFWN7$HN>_nS$04+tvX|23huOzWJegQh}h<7G%q%phEkLCV0Mj z=(Dzyj|CD`!j36jF{%Ec&x;`6WIyDH*#)VGHg5%x(9+p-imk9w5bJ$A-r2wDF|fJM zfb`mIVv7BsRs1$*w~84ski5@W06PW}UF(QfAn$R{#Pn*8D?Jr2Re8p{9oTr&3(|y2 zR4RuP3n80^r)MG9#Z*zUD>Y&h1Qknq=Qa)%y zNm6P)V30R6S1H*mrT_6G)QUmlm2*O`0GDMf|9mKy$$sKtc_e&~wD@s)yKaJcs6)}X zI$*B*zS-Lb$E#;ZVT(SLq6BHsHvdMXX8XIC4j}AGf>~Laz)A&-=5}`E!i`~ZSA$g$ z(7=Sf4|rm%qttZoXseGkl!G5!P{AgR4nu27G&8_PB<#cBpZ^7ZN^$A16YmqT^%7c9 zOi6L@9(n6(Q0adMTGn$lfJQBF;@k6!G2-&otOdi~cw=M>#;(U5cyZ67j!+xmYfpf# zH+kwU7I1dkv4FGV2qH0IecGVoLCPdxATL2_^`!lcBvA2)gTNyX(3F(^9(!V9u20!o zArc%_(Y1*ULqRsct<1wl|D5_JuoJHV+yqU~h1_ziOVzI&o&CP!4*jaP8tPZq%G?hK zsSa0=?gO~vs)kPs{JyFU@=Ie)3&CcO78tkvZ|3Q16HV2D`PQ`bVLJMgM9hg!O;y&r z{T9?#EGRla+7c1s<8wIlH6MD#Zo~6Z&3NSZ`!&rPi0o^w22H)NlsT%?E?2>gPwR`F z5Pvn~<_l)fGg0Q}v=(|Hi|G6mj %zENiL5MfkSyl>%&@lH6z$~BD2?Cug1x(P7^ zDU{U_qBDM(0ZHuPQT)KO^P_$C7;6cPU|qP)gw9YF~*8W z?x3I|5@QskDphF{V~{9KdIu3H(mPVe21F20X;Mc)K-z#5N7@iU+R&s6Op)G(4l}^O z%zqtx-sgXtJ9(Z@@0a(Ne98|GhjaGcXYIAFbzRpEmY(%QT4)nmIht+nx>{bSJ^vgq zRw|3cM?|jUc#Q+)WN!HJF@SA~qIh>z}wT1}&5Biy$`kkF7zrc6kQe%G`*(y zrev4xo_*22rKU;}2K zy(u;Sq66_EWS8Q;YHkJ34QtCwS!NBGB<@%O6JK-R__)$c4j|&dw!Z~YriaIlF?mKh z<;T;>55AOgzDNA^>&|yVvWZ|Q!z=%l>qCj0K%D`C**xau%XH*Z z0H(TpUy1&6!hkQa-}3#>Z+*vJsHuvjbD5u0U}>LVpTFpgdYbC!I)~!x4c*d!+YPjms69J2T1VkQ>xWMgLxAXX=$BC%PRvVv62&#tM@kpzd^v;1?2@@=i` zf_d|<(_#0|eT2F_Fu*w6H8Em9{P(!PORBiDJqs<@%xbD&S@81(q>rjN^ z6LOoHK%24icg-uP;kKZpQbL-9nJEassu-mme!^cy#O}eiqHi1N+0^N|-D!NMpSXJy z+7p00)3=+|t&QfJrhyZ+{lc@rUmKoNi91f5l>Tl9o8MPd7O9b@jKc!&@j#}wyfn`L z_Cze%EQe+`JwU?08>X*uUMx%EvQfJ*AF?v1U8~_V7Cb9|7|s{~cbkl)*mBU+)ZFLZ zFOXIpaB1X$gn+58n{^z7pj#&pYXe(BY0zlY+&{?AYAP&A>xL%des(|H!qd~xXaKO` zrRAm2ZTl3vVb4Rn97<<_$R<83B?bVZYb|mj<~4=6f>> zE}JhxNez%_C<25UC=Zy!$LC*d2}ig6ac)~@!(dEo`w=`WmN0d_EL$t3z8`gbp0+ZM z7^C?4WTPq4@jCWA&et>jth}~qOxy^=d&=?}Bs|i-v|}I?@UyAYM_6CqaeMBym48i7 zUI2mOQ)i=XdEu@E1RAcY=thhv*tcmLtNKL({JkYzq}a>9aJ9_@9m+QTWaQY69YoAz zq6~6Cm6~u`yfWEY-+nyS=ix4=?{+sLP#L!L&4AG#uEWXWw$EyO$`P&%BqY(onkT($ z6%|vPh4wC&8es;6=o}r>W&jJIVCPV?Aq9?jv>~h`NU#ISKD}~1T#N|VU~Ksfg5>>g zU8NUDO&`|yJ+>-!AN#;

    WindowsLogon/HideFastUserSwitching